========================================= Sat, 12 Apr 2008 - Debian 3.1r8 released ========================================= oldstable/main/binary-sparc/libxine-dev_1.0.1-1sarge7_sparc.deb oldstable/main/binary-sparc/libxine1_1.0.1-1sarge7_sparc.deb xine-lib (1.0.1-1sarge7) oldstable-security; urgency=high * Security bug fixes: - CVE-2007-1246, CVE-2007-1387: DirectShow video decoder opening functions (used with some Win32 codecs), fail to set biSize before use in a memcpy, which allows user-assisted remote attackers to cause a buffer overflow and possibly execute arbitrary code. - CVE-2008-1161: Buffer overflow which may allow remote attackers to crash the program and/or execute arbitrary code via a crafted Matroska file. - CVE-2008-0073: Array indexing vulnerability in Real SDP parsing. - Not applicable: + CVE-2008-0486: affected code is not present. + CVE-2008-1110: significantly different code. * Backport an SDP parser check for stream identifier before stream count. * Add myself to Uploaders, mainly to keep lintian quiet. oldstable/main/binary-s390/libxine1_1.0.1-1sarge7_s390.deb oldstable/main/binary-s390/libxine-dev_1.0.1-1sarge7_s390.deb xine-lib (1.0.1-1sarge7) oldstable-security; urgency=high * Security bug fixes: - CVE-2007-1246, CVE-2007-1387: DirectShow video decoder opening functions (used with some Win32 codecs), fail to set biSize before use in a memcpy, which allows user-assisted remote attackers to cause a buffer overflow and possibly execute arbitrary code. - CVE-2008-1161: Buffer overflow which may allow remote attackers to crash the program and/or execute arbitrary code via a crafted Matroska file. - CVE-2008-0073: Array indexing vulnerability in Real SDP parsing. - Not applicable: + CVE-2008-0486: affected code is not present. + CVE-2008-1110: significantly different code. * Backport an SDP parser check for stream identifier before stream count. * Add myself to Uploaders, mainly to keep lintian quiet. oldstable/main/binary-powerpc/libxine-dev_1.0.1-1sarge7_powerpc.deb oldstable/main/binary-powerpc/libxine1_1.0.1-1sarge7_powerpc.deb xine-lib (1.0.1-1sarge7) oldstable-security; urgency=high * Security bug fixes: - CVE-2007-1246, CVE-2007-1387: DirectShow video decoder opening functions (used with some Win32 codecs), fail to set biSize before use in a memcpy, which allows user-assisted remote attackers to cause a buffer overflow and possibly execute arbitrary code. - CVE-2008-1161: Buffer overflow which may allow remote attackers to crash the program and/or execute arbitrary code via a crafted Matroska file. - CVE-2008-0073: Array indexing vulnerability in Real SDP parsing. - Not applicable: + CVE-2008-0486: affected code is not present. + CVE-2008-1110: significantly different code. * Backport an SDP parser check for stream identifier before stream count. * Add myself to Uploaders, mainly to keep lintian quiet. oldstable/main/binary-mipsel/libxine1_1.0.1-1sarge7_mipsel.deb oldstable/main/binary-mipsel/libxine-dev_1.0.1-1sarge7_mipsel.deb xine-lib (1.0.1-1sarge7) oldstable-security; urgency=high * Security bug fixes: - CVE-2007-1246, CVE-2007-1387: DirectShow video decoder opening functions (used with some Win32 codecs), fail to set biSize before use in a memcpy, which allows user-assisted remote attackers to cause a buffer overflow and possibly execute arbitrary code. - CVE-2008-1161: Buffer overflow which may allow remote attackers to crash the program and/or execute arbitrary code via a crafted Matroska file. - CVE-2008-0073: Array indexing vulnerability in Real SDP parsing. - Not applicable: + CVE-2008-0486: affected code is not present. + CVE-2008-1110: significantly different code. * Backport an SDP parser check for stream identifier before stream count. * Add myself to Uploaders, mainly to keep lintian quiet. oldstable/main/binary-mips/libxine1_1.0.1-1sarge7_mips.deb oldstable/main/binary-mips/libxine-dev_1.0.1-1sarge7_mips.deb xine-lib (1.0.1-1sarge7) oldstable-security; urgency=high * Security bug fixes: - CVE-2007-1246, CVE-2007-1387: DirectShow video decoder opening functions (used with some Win32 codecs), fail to set biSize before use in a memcpy, which allows user-assisted remote attackers to cause a buffer overflow and possibly execute arbitrary code. - CVE-2008-1161: Buffer overflow which may allow remote attackers to crash the program and/or execute arbitrary code via a crafted Matroska file. - CVE-2008-0073: Array indexing vulnerability in Real SDP parsing. - Not applicable: + CVE-2008-0486: affected code is not present. + CVE-2008-1110: significantly different code. * Backport an SDP parser check for stream identifier before stream count. * Add myself to Uploaders, mainly to keep lintian quiet. oldstable/main/binary-m68k/libxine-dev_1.0.1-1sarge7_m68k.deb oldstable/main/binary-m68k/libxine1_1.0.1-1sarge7_m68k.deb xine-lib (1.0.1-1sarge7) oldstable-security; urgency=high * Security bug fixes: - CVE-2007-1246, CVE-2007-1387: DirectShow video decoder opening functions (used with some Win32 codecs), fail to set biSize before use in a memcpy, which allows user-assisted remote attackers to cause a buffer overflow and possibly execute arbitrary code. - CVE-2008-1161: Buffer overflow which may allow remote attackers to crash the program and/or execute arbitrary code via a crafted Matroska file. - CVE-2008-0073: Array indexing vulnerability in Real SDP parsing. - Not applicable: + CVE-2008-0486: affected code is not present. + CVE-2008-1110: significantly different code. * Backport an SDP parser check for stream identifier before stream count. * Add myself to Uploaders, mainly to keep lintian quiet. oldstable/main/binary-ia64/libxine-dev_1.0.1-1sarge7_ia64.deb oldstable/main/binary-ia64/libxine1_1.0.1-1sarge7_ia64.deb xine-lib (1.0.1-1sarge7) oldstable-security; urgency=high * Security bug fixes: - CVE-2007-1246, CVE-2007-1387: DirectShow video decoder opening functions (used with some Win32 codecs), fail to set biSize before use in a memcpy, which allows user-assisted remote attackers to cause a buffer overflow and possibly execute arbitrary code. - CVE-2008-1161: Buffer overflow which may allow remote attackers to crash the program and/or execute arbitrary code via a crafted Matroska file. - CVE-2008-0073: Array indexing vulnerability in Real SDP parsing. - Not applicable: + CVE-2008-0486: affected code is not present. + CVE-2008-1110: significantly different code. * Backport an SDP parser check for stream identifier before stream count. * Add myself to Uploaders, mainly to keep lintian quiet. oldstable/main/binary-hppa/libxine1_1.0.1-1sarge7_hppa.deb oldstable/main/binary-hppa/libxine-dev_1.0.1-1sarge7_hppa.deb xine-lib (1.0.1-1sarge7) oldstable-security; urgency=high * Security bug fixes: - CVE-2007-1246, CVE-2007-1387: DirectShow video decoder opening functions (used with some Win32 codecs), fail to set biSize before use in a memcpy, which allows user-assisted remote attackers to cause a buffer overflow and possibly execute arbitrary code. - CVE-2008-1161: Buffer overflow which may allow remote attackers to crash the program and/or execute arbitrary code via a crafted Matroska file. - CVE-2008-0073: Array indexing vulnerability in Real SDP parsing. - Not applicable: + CVE-2008-0486: affected code is not present. + CVE-2008-1110: significantly different code. * Backport an SDP parser check for stream identifier before stream count. * Add myself to Uploaders, mainly to keep lintian quiet. oldstable/main/binary-arm/libxine1_1.0.1-1sarge7_arm.deb oldstable/main/binary-arm/libxine-dev_1.0.1-1sarge7_arm.deb xine-lib (1.0.1-1sarge7) oldstable-security; urgency=high * Security bug fixes: - CVE-2007-1246, CVE-2007-1387: DirectShow video decoder opening functions (used with some Win32 codecs), fail to set biSize before use in a memcpy, which allows user-assisted remote attackers to cause a buffer overflow and possibly execute arbitrary code. - CVE-2008-1161: Buffer overflow which may allow remote attackers to crash the program and/or execute arbitrary code via a crafted Matroska file. - CVE-2008-0073: Array indexing vulnerability in Real SDP parsing. - Not applicable: + CVE-2008-0486: affected code is not present. + CVE-2008-1110: significantly different code. * Backport an SDP parser check for stream identifier before stream count. * Add myself to Uploaders, mainly to keep lintian quiet. oldstable/main/binary-amd64/libxine-dev_1.0.1-1sarge7_amd64.deb oldstable/main/binary-amd64/libxine1_1.0.1-1sarge7_amd64.deb xine-lib (1.0.1-1sarge7) oldstable-security; urgency=high * Security bug fixes: - CVE-2007-1246, CVE-2007-1387: DirectShow video decoder opening functions (used with some Win32 codecs), fail to set biSize before use in a memcpy, which allows user-assisted remote attackers to cause a buffer overflow and possibly execute arbitrary code. - CVE-2008-1161: Buffer overflow which may allow remote attackers to crash the program and/or execute arbitrary code via a crafted Matroska file. - CVE-2008-0073: Array indexing vulnerability in Real SDP parsing. - Not applicable: + CVE-2008-0486: affected code is not present. + CVE-2008-1110: significantly different code. * Backport an SDP parser check for stream identifier before stream count. * Add myself to Uploaders, mainly to keep lintian quiet. oldstable/main/binary-alpha/libxine-dev_1.0.1-1sarge7_alpha.deb oldstable/main/binary-alpha/libxine1_1.0.1-1sarge7_alpha.deb xine-lib (1.0.1-1sarge7) oldstable-security; urgency=high * Security bug fixes: - CVE-2007-1246, CVE-2007-1387: DirectShow video decoder opening functions (used with some Win32 codecs), fail to set biSize before use in a memcpy, which allows user-assisted remote attackers to cause a buffer overflow and possibly execute arbitrary code. - CVE-2008-1161: Buffer overflow which may allow remote attackers to crash the program and/or execute arbitrary code via a crafted Matroska file. - CVE-2008-0073: Array indexing vulnerability in Real SDP parsing. - Not applicable: + CVE-2008-0486: affected code is not present. + CVE-2008-1110: significantly different code. * Backport an SDP parser check for stream identifier before stream count. * Add myself to Uploaders, mainly to keep lintian quiet. oldstable/main/source/xine-lib_1.0.1-1sarge7.diff.gz oldstable/main/source/xine-lib_1.0.1-1sarge7.dsc oldstable/main/binary-i386/libxine-dev_1.0.1-1sarge7_i386.deb oldstable/main/binary-i386/libxine1_1.0.1-1sarge7_i386.deb xine-lib (1.0.1-1sarge7) oldstable-security; urgency=high * Security bug fixes: - CVE-2007-1246, CVE-2007-1387: DirectShow video decoder opening functions (used with some Win32 codecs), fail to set biSize before use in a memcpy, which allows user-assisted remote attackers to cause a buffer overflow and possibly execute arbitrary code. - CVE-2008-1161: Buffer overflow which may allow remote attackers to crash the program and/or execute arbitrary code via a crafted Matroska file. - CVE-2008-0073: Array indexing vulnerability in Real SDP parsing. - Not applicable: + CVE-2008-0486: affected code is not present. + CVE-2008-1110: significantly different code. * Backport an SDP parser check for stream identifier before stream count. * Add myself to Uploaders, mainly to keep lintian quiet. oldstable/main/binary-sparc/libxpm4_4.3.0.dfsg.1-14sarge7_sparc.deb oldstable/main/binary-sparc/libx11-6_4.3.0.dfsg.1-14sarge7_sparc.deb oldstable/main/binary-sparc/xserver-common_4.3.0.dfsg.1-14sarge7_sparc.deb oldstable/main/binary-sparc/libx11-6-dbg_4.3.0.dfsg.1-14sarge7_sparc.deb oldstable/main/binary-sparc/libxaw7_4.3.0.dfsg.1-14sarge7_sparc.deb oldstable/main/binary-sparc/libxmu6-dbg_4.3.0.dfsg.1-14sarge7_sparc.deb oldstable/main/binary-sparc/xlibmesa-glu-dbg_4.3.0.dfsg.1-14sarge7_sparc.deb oldstable/main/binary-sparc/libxmuu1_4.3.0.dfsg.1-14sarge7_sparc.deb oldstable/main/binary-sparc/libxext-dev_4.3.0.dfsg.1-14sarge7_sparc.deb oldstable/main/binary-sparc/libxpm4-dbg_4.3.0.dfsg.1-14sarge7_sparc.deb oldstable/main/binary-sparc/libdps-dev_4.3.0.dfsg.1-14sarge7_sparc.deb oldstable/main/binary-sparc/libx11-dev_4.3.0.dfsg.1-14sarge7_sparc.deb oldstable/main/binary-sparc/xlibmesa-gl-dbg_4.3.0.dfsg.1-14sarge7_sparc.deb oldstable/main/binary-sparc/xfs_4.3.0.dfsg.1-14sarge7_sparc.deb oldstable/main/binary-sparc/xutils_4.3.0.dfsg.1-14sarge7_sparc.deb oldstable/main/binary-sparc/xlibmesa-dri_4.3.0.dfsg.1-14sarge7_sparc.deb oldstable/main/binary-sparc/libxext6_4.3.0.dfsg.1-14sarge7_sparc.deb oldstable/main/binary-sparc/libxi-dev_4.3.0.dfsg.1-14sarge7_sparc.deb oldstable/main/binary-sparc/libxtrap6_4.3.0.dfsg.1-14sarge7_sparc.deb oldstable/main/binary-sparc/libxi6_4.3.0.dfsg.1-14sarge7_sparc.deb oldstable/main/binary-sparc/libxv1_4.3.0.dfsg.1-14sarge7_sparc.deb oldstable/main/binary-sparc/libxext6-dbg_4.3.0.dfsg.1-14sarge7_sparc.deb oldstable/main/binary-sparc/libice6_4.3.0.dfsg.1-14sarge7_sparc.deb oldstable/main/binary-sparc/libxtst6_4.3.0.dfsg.1-14sarge7_sparc.deb oldstable/main/binary-sparc/libxp6-dbg_4.3.0.dfsg.1-14sarge7_sparc.deb oldstable/main/binary-sparc/xlibosmesa-dev_4.3.0.dfsg.1-14sarge7_sparc.deb oldstable/main/binary-sparc/proxymngr_4.3.0.dfsg.1-14sarge7_sparc.deb oldstable/main/binary-sparc/libsm-dev_4.3.0.dfsg.1-14sarge7_sparc.deb oldstable/main/binary-sparc/x-window-system-core_4.3.0.dfsg.1-14sarge7_sparc.deb oldstable/main/binary-sparc/libxtrap6-dbg_4.3.0.dfsg.1-14sarge7_sparc.deb oldstable/main/binary-sparc/xlibmesa-gl_4.3.0.dfsg.1-14sarge7_sparc.deb oldstable/main/binary-sparc/libice6-dbg_4.3.0.dfsg.1-14sarge7_sparc.deb oldstable/main/binary-sparc/libxt6_4.3.0.dfsg.1-14sarge7_sparc.deb oldstable/main/binary-sparc/xlibs-static-dev_4.3.0.dfsg.1-14sarge7_sparc.deb oldstable/main/binary-sparc/libxmu6_4.3.0.dfsg.1-14sarge7_sparc.deb oldstable/main/binary-sparc/lbxproxy_4.3.0.dfsg.1-14sarge7_sparc.deb oldstable/main/binary-sparc/xlibs-static-pic_4.3.0.dfsg.1-14sarge7_sparc.deb oldstable/main/binary-sparc/libdps1-dbg_4.3.0.dfsg.1-14sarge7_sparc.deb oldstable/main/binary-sparc/xmh_4.3.0.dfsg.1-14sarge7_sparc.deb oldstable/main/binary-sparc/libxtst6-dbg_4.3.0.dfsg.1-14sarge7_sparc.deb oldstable/main/binary-sparc/libxmuu-dev_4.3.0.dfsg.1-14sarge7_sparc.deb oldstable/main/binary-sparc/libxmu-dev_4.3.0.dfsg.1-14sarge7_sparc.deb oldstable/main/binary-sparc/libxv-dev_4.3.0.dfsg.1-14sarge7_sparc.deb oldstable/main/binary-sparc/libxaw7-dbg_4.3.0.dfsg.1-14sarge7_sparc.deb oldstable/main/binary-sparc/libxp-dev_4.3.0.dfsg.1-14sarge7_sparc.deb oldstable/main/binary-sparc/twm_4.3.0.dfsg.1-14sarge7_sparc.deb oldstable/main/binary-sparc/libxtst-dev_4.3.0.dfsg.1-14sarge7_sparc.deb oldstable/main/binary-sparc/xterm_4.3.0.dfsg.1-14sarge7_sparc.deb oldstable/main/binary-sparc/xlibmesa-glu_4.3.0.dfsg.1-14sarge7_sparc.deb oldstable/main/binary-sparc/libxmuu1-dbg_4.3.0.dfsg.1-14sarge7_sparc.deb oldstable/main/binary-sparc/libxp6_4.3.0.dfsg.1-14sarge7_sparc.deb oldstable/main/binary-sparc/xvfb_4.3.0.dfsg.1-14sarge7_sparc.deb oldstable/main/binary-sparc/xbase-clients_4.3.0.dfsg.1-14sarge7_sparc.deb oldstable/main/binary-sparc/libdps1_4.3.0.dfsg.1-14sarge7_sparc.deb oldstable/main/binary-sparc/xlibmesa3_4.3.0.dfsg.1-14sarge7_sparc.deb oldstable/main/binary-sparc/libsm6-dbg_4.3.0.dfsg.1-14sarge7_sparc.deb oldstable/main/binary-sparc/xserver-xfree86-dbg_4.3.0.dfsg.1-14sarge7_sparc.deb oldstable/main/binary-sparc/libxt-dev_4.3.0.dfsg.1-14sarge7_sparc.deb oldstable/main/binary-sparc/xserver-xfree86_4.3.0.dfsg.1-14sarge7_sparc.deb oldstable/main/binary-sparc/xdm_4.3.0.dfsg.1-14sarge7_sparc.deb oldstable/main/binary-sparc/libxrandr2_4.3.0.dfsg.1-14sarge7_sparc.deb oldstable/main/binary-sparc/libxaw6-dev_4.3.0.dfsg.1-14sarge7_sparc.deb oldstable/main/binary-sparc/xlibmesa-glu-dev_4.3.0.dfsg.1-14sarge7_sparc.deb oldstable/main/binary-sparc/libxft1-dbg_4.3.0.dfsg.1-14sarge7_sparc.deb oldstable/main/binary-sparc/libxt6-dbg_4.3.0.dfsg.1-14sarge7_sparc.deb oldstable/main/binary-sparc/xlibmesa-dri-dbg_4.3.0.dfsg.1-14sarge7_sparc.deb oldstable/main/binary-sparc/libxft1_4.3.0.dfsg.1-14sarge7_sparc.deb oldstable/main/binary-sparc/libxi6-dbg_4.3.0.dfsg.1-14sarge7_sparc.deb oldstable/main/binary-sparc/xlibosmesa4_4.3.0.dfsg.1-14sarge7_sparc.deb oldstable/main/binary-sparc/libsm6_4.3.0.dfsg.1-14sarge7_sparc.deb oldstable/main/binary-sparc/xlibosmesa4-dbg_4.3.0.dfsg.1-14sarge7_sparc.deb oldstable/main/binary-sparc/xlibmesa-gl-dev_4.3.0.dfsg.1-14sarge7_sparc.deb oldstable/main/binary-sparc/libxaw6_4.3.0.dfsg.1-14sarge7_sparc.deb oldstable/main/binary-sparc/libxpm-dev_4.3.0.dfsg.1-14sarge7_sparc.deb oldstable/main/binary-sparc/libxaw7-dev_4.3.0.dfsg.1-14sarge7_sparc.deb oldstable/main/binary-sparc/libxv1-dbg_4.3.0.dfsg.1-14sarge7_sparc.deb oldstable/main/binary-sparc/libxrandr-dev_4.3.0.dfsg.1-14sarge7_sparc.deb oldstable/main/binary-sparc/libxrandr2-dbg_4.3.0.dfsg.1-14sarge7_sparc.deb oldstable/main/binary-sparc/xfwp_4.3.0.dfsg.1-14sarge7_sparc.deb oldstable/main/binary-sparc/libice-dev_4.3.0.dfsg.1-14sarge7_sparc.deb oldstable/main/binary-sparc/x-window-system-dev_4.3.0.dfsg.1-14sarge7_sparc.deb oldstable/main/binary-sparc/xnest_4.3.0.dfsg.1-14sarge7_sparc.deb oldstable/main/binary-sparc/libxaw6-dbg_4.3.0.dfsg.1-14sarge7_sparc.deb oldstable/main/binary-sparc/libxtrap-dev_4.3.0.dfsg.1-14sarge7_sparc.deb xfree86 (4.3.0.dfsg.1-14sarge7) oldstable-security; urgency=high * Fix regression introduced in -14sarge6 by the MIT-SHM security patch (closes: #461410). oldstable/main/binary-s390/xlibmesa-gl-dev_4.3.0.dfsg.1-14sarge7_s390.deb oldstable/main/binary-s390/libdps-dev_4.3.0.dfsg.1-14sarge7_s390.deb oldstable/main/binary-s390/libxaw7-dbg_4.3.0.dfsg.1-14sarge7_s390.deb oldstable/main/binary-s390/libxv1_4.3.0.dfsg.1-14sarge7_s390.deb oldstable/main/binary-s390/libxext-dev_4.3.0.dfsg.1-14sarge7_s390.deb oldstable/main/binary-s390/x-window-system-dev_4.3.0.dfsg.1-14sarge7_s390.deb oldstable/main/binary-s390/libxp-dev_4.3.0.dfsg.1-14sarge7_s390.deb oldstable/main/binary-s390/xlibmesa-glu-dbg_4.3.0.dfsg.1-14sarge7_s390.deb oldstable/main/binary-s390/libdps1_4.3.0.dfsg.1-14sarge7_s390.deb oldstable/main/binary-s390/xbase-clients_4.3.0.dfsg.1-14sarge7_s390.deb oldstable/main/binary-s390/twm_4.3.0.dfsg.1-14sarge7_s390.deb oldstable/main/binary-s390/libxext6_4.3.0.dfsg.1-14sarge7_s390.deb oldstable/main/binary-s390/xterm_4.3.0.dfsg.1-14sarge7_s390.deb oldstable/main/binary-s390/libxi6_4.3.0.dfsg.1-14sarge7_s390.deb oldstable/main/binary-s390/xlibmesa-gl_4.3.0.dfsg.1-14sarge7_s390.deb oldstable/main/binary-s390/libxmu-dev_4.3.0.dfsg.1-14sarge7_s390.deb oldstable/main/binary-s390/xlibs-static-pic_4.3.0.dfsg.1-14sarge7_s390.deb oldstable/main/binary-s390/x-window-system-core_4.3.0.dfsg.1-14sarge7_s390.deb oldstable/main/binary-s390/xlibmesa3_4.3.0.dfsg.1-14sarge7_s390.deb oldstable/main/binary-s390/libxmu6_4.3.0.dfsg.1-14sarge7_s390.deb oldstable/main/binary-s390/libxmuu1-dbg_4.3.0.dfsg.1-14sarge7_s390.deb oldstable/main/binary-s390/libxft1-dbg_4.3.0.dfsg.1-14sarge7_s390.deb oldstable/main/binary-s390/libxtst6_4.3.0.dfsg.1-14sarge7_s390.deb oldstable/main/binary-s390/libxpm-dev_4.3.0.dfsg.1-14sarge7_s390.deb oldstable/main/binary-s390/xutils_4.3.0.dfsg.1-14sarge7_s390.deb oldstable/main/binary-s390/libx11-dev_4.3.0.dfsg.1-14sarge7_s390.deb oldstable/main/binary-s390/xlibs-static-dev_4.3.0.dfsg.1-14sarge7_s390.deb oldstable/main/binary-s390/xmh_4.3.0.dfsg.1-14sarge7_s390.deb oldstable/main/binary-s390/libxaw6-dev_4.3.0.dfsg.1-14sarge7_s390.deb oldstable/main/binary-s390/libxv1-dbg_4.3.0.dfsg.1-14sarge7_s390.deb oldstable/main/binary-s390/xserver-common_4.3.0.dfsg.1-14sarge7_s390.deb oldstable/main/binary-s390/libice6_4.3.0.dfsg.1-14sarge7_s390.deb oldstable/main/binary-s390/libxp6-dbg_4.3.0.dfsg.1-14sarge7_s390.deb oldstable/main/binary-s390/libxtrap-dev_4.3.0.dfsg.1-14sarge7_s390.deb oldstable/main/binary-s390/libice-dev_4.3.0.dfsg.1-14sarge7_s390.deb oldstable/main/binary-s390/libxmuu1_4.3.0.dfsg.1-14sarge7_s390.deb oldstable/main/binary-s390/libx11-6-dbg_4.3.0.dfsg.1-14sarge7_s390.deb oldstable/main/binary-s390/libxpm4_4.3.0.dfsg.1-14sarge7_s390.deb oldstable/main/binary-s390/libsm-dev_4.3.0.dfsg.1-14sarge7_s390.deb oldstable/main/binary-s390/libsm6_4.3.0.dfsg.1-14sarge7_s390.deb oldstable/main/binary-s390/libxtrap6_4.3.0.dfsg.1-14sarge7_s390.deb oldstable/main/binary-s390/libxrandr-dev_4.3.0.dfsg.1-14sarge7_s390.deb oldstable/main/binary-s390/libxext6-dbg_4.3.0.dfsg.1-14sarge7_s390.deb oldstable/main/binary-s390/xnest_4.3.0.dfsg.1-14sarge7_s390.deb oldstable/main/binary-s390/libxmu6-dbg_4.3.0.dfsg.1-14sarge7_s390.deb oldstable/main/binary-s390/libxaw6-dbg_4.3.0.dfsg.1-14sarge7_s390.deb oldstable/main/binary-s390/libxt-dev_4.3.0.dfsg.1-14sarge7_s390.deb oldstable/main/binary-s390/libxi6-dbg_4.3.0.dfsg.1-14sarge7_s390.deb oldstable/main/binary-s390/libxaw7_4.3.0.dfsg.1-14sarge7_s390.deb oldstable/main/binary-s390/libdps1-dbg_4.3.0.dfsg.1-14sarge7_s390.deb oldstable/main/binary-s390/xlibmesa-glu_4.3.0.dfsg.1-14sarge7_s390.deb oldstable/main/binary-s390/libxtst-dev_4.3.0.dfsg.1-14sarge7_s390.deb oldstable/main/binary-s390/libxrandr2_4.3.0.dfsg.1-14sarge7_s390.deb oldstable/main/binary-s390/xvfb_4.3.0.dfsg.1-14sarge7_s390.deb oldstable/main/binary-s390/libxp6_4.3.0.dfsg.1-14sarge7_s390.deb oldstable/main/binary-s390/libxrandr2-dbg_4.3.0.dfsg.1-14sarge7_s390.deb oldstable/main/binary-s390/libxt6-dbg_4.3.0.dfsg.1-14sarge7_s390.deb oldstable/main/binary-s390/libxv-dev_4.3.0.dfsg.1-14sarge7_s390.deb oldstable/main/binary-s390/xfs_4.3.0.dfsg.1-14sarge7_s390.deb oldstable/main/binary-s390/xlibmesa-gl-dbg_4.3.0.dfsg.1-14sarge7_s390.deb oldstable/main/binary-s390/libxtrap6-dbg_4.3.0.dfsg.1-14sarge7_s390.deb oldstable/main/binary-s390/libice6-dbg_4.3.0.dfsg.1-14sarge7_s390.deb oldstable/main/binary-s390/libxt6_4.3.0.dfsg.1-14sarge7_s390.deb oldstable/main/binary-s390/xdm_4.3.0.dfsg.1-14sarge7_s390.deb oldstable/main/binary-s390/libsm6-dbg_4.3.0.dfsg.1-14sarge7_s390.deb oldstable/main/binary-s390/xfwp_4.3.0.dfsg.1-14sarge7_s390.deb oldstable/main/binary-s390/xlibmesa-glu-dev_4.3.0.dfsg.1-14sarge7_s390.deb oldstable/main/binary-s390/libxmuu-dev_4.3.0.dfsg.1-14sarge7_s390.deb oldstable/main/binary-s390/lbxproxy_4.3.0.dfsg.1-14sarge7_s390.deb oldstable/main/binary-s390/libxi-dev_4.3.0.dfsg.1-14sarge7_s390.deb oldstable/main/binary-s390/libxft1_4.3.0.dfsg.1-14sarge7_s390.deb oldstable/main/binary-s390/libxaw7-dev_4.3.0.dfsg.1-14sarge7_s390.deb oldstable/main/binary-s390/libxpm4-dbg_4.3.0.dfsg.1-14sarge7_s390.deb oldstable/main/binary-s390/libx11-6_4.3.0.dfsg.1-14sarge7_s390.deb oldstable/main/binary-s390/proxymngr_4.3.0.dfsg.1-14sarge7_s390.deb oldstable/main/binary-s390/libxtst6-dbg_4.3.0.dfsg.1-14sarge7_s390.deb oldstable/main/binary-s390/libxaw6_4.3.0.dfsg.1-14sarge7_s390.deb xfree86 (4.3.0.dfsg.1-14sarge7) oldstable-security; urgency=high * Fix regression introduced in -14sarge6 by the MIT-SHM security patch (closes: #461410). oldstable/main/binary-powerpc/xmh_4.3.0.dfsg.1-14sarge7_powerpc.deb oldstable/main/binary-powerpc/libxft1-dbg_4.3.0.dfsg.1-14sarge7_powerpc.deb oldstable/main/binary-powerpc/libxmuu1_4.3.0.dfsg.1-14sarge7_powerpc.deb oldstable/main/binary-powerpc/proxymngr_4.3.0.dfsg.1-14sarge7_powerpc.deb oldstable/main/binary-powerpc/xlibs-static-dev_4.3.0.dfsg.1-14sarge7_powerpc.deb oldstable/main/binary-powerpc/libxmu6_4.3.0.dfsg.1-14sarge7_powerpc.deb oldstable/main/binary-powerpc/xlibs-static-pic_4.3.0.dfsg.1-14sarge7_powerpc.deb oldstable/main/binary-powerpc/libx11-dev_4.3.0.dfsg.1-14sarge7_powerpc.deb oldstable/main/binary-powerpc/xutils_4.3.0.dfsg.1-14sarge7_powerpc.deb oldstable/main/binary-powerpc/xlibosmesa-dev_4.3.0.dfsg.1-14sarge7_powerpc.deb oldstable/main/binary-powerpc/x-window-system-core_4.3.0.dfsg.1-14sarge7_powerpc.deb oldstable/main/binary-powerpc/libice-dev_4.3.0.dfsg.1-14sarge7_powerpc.deb oldstable/main/binary-powerpc/libxaw7-dev_4.3.0.dfsg.1-14sarge7_powerpc.deb oldstable/main/binary-powerpc/libdps1-dbg_4.3.0.dfsg.1-14sarge7_powerpc.deb oldstable/main/binary-powerpc/libxrandr-dev_4.3.0.dfsg.1-14sarge7_powerpc.deb oldstable/main/binary-powerpc/libxpm4_4.3.0.dfsg.1-14sarge7_powerpc.deb oldstable/main/binary-powerpc/xnest_4.3.0.dfsg.1-14sarge7_powerpc.deb oldstable/main/binary-powerpc/xlibmesa3_4.3.0.dfsg.1-14sarge7_powerpc.deb oldstable/main/binary-powerpc/x-window-system-dev_4.3.0.dfsg.1-14sarge7_powerpc.deb oldstable/main/binary-powerpc/libxi6_4.3.0.dfsg.1-14sarge7_powerpc.deb oldstable/main/binary-powerpc/libsm6-dbg_4.3.0.dfsg.1-14sarge7_powerpc.deb oldstable/main/binary-powerpc/libxext6-dbg_4.3.0.dfsg.1-14sarge7_powerpc.deb oldstable/main/binary-powerpc/libxmu6-dbg_4.3.0.dfsg.1-14sarge7_powerpc.deb oldstable/main/binary-powerpc/libxmuu1-dbg_4.3.0.dfsg.1-14sarge7_powerpc.deb oldstable/main/binary-powerpc/xlibmesa-glu_4.3.0.dfsg.1-14sarge7_powerpc.deb oldstable/main/binary-powerpc/libxrandr2_4.3.0.dfsg.1-14sarge7_powerpc.deb oldstable/main/binary-powerpc/libxtst-dev_4.3.0.dfsg.1-14sarge7_powerpc.deb oldstable/main/binary-powerpc/lbxproxy_4.3.0.dfsg.1-14sarge7_powerpc.deb oldstable/main/binary-powerpc/xdm_4.3.0.dfsg.1-14sarge7_powerpc.deb oldstable/main/binary-powerpc/xlibmesa-glu-dbg_4.3.0.dfsg.1-14sarge7_powerpc.deb oldstable/main/binary-powerpc/libxft1_4.3.0.dfsg.1-14sarge7_powerpc.deb oldstable/main/binary-powerpc/xterm_4.3.0.dfsg.1-14sarge7_powerpc.deb oldstable/main/binary-powerpc/libxpm-dev_4.3.0.dfsg.1-14sarge7_powerpc.deb oldstable/main/binary-powerpc/xvfb_4.3.0.dfsg.1-14sarge7_powerpc.deb oldstable/main/binary-powerpc/twm_4.3.0.dfsg.1-14sarge7_powerpc.deb oldstable/main/binary-powerpc/libxi-dev_4.3.0.dfsg.1-14sarge7_powerpc.deb oldstable/main/binary-powerpc/xlibmesa-gl-dbg_4.3.0.dfsg.1-14sarge7_powerpc.deb oldstable/main/binary-powerpc/xbase-clients_4.3.0.dfsg.1-14sarge7_powerpc.deb oldstable/main/binary-powerpc/libxaw6-dev_4.3.0.dfsg.1-14sarge7_powerpc.deb oldstable/main/binary-powerpc/xfwp_4.3.0.dfsg.1-14sarge7_powerpc.deb oldstable/main/binary-powerpc/libice6_4.3.0.dfsg.1-14sarge7_powerpc.deb oldstable/main/binary-powerpc/libxext6_4.3.0.dfsg.1-14sarge7_powerpc.deb oldstable/main/binary-powerpc/xfs_4.3.0.dfsg.1-14sarge7_powerpc.deb oldstable/main/binary-powerpc/libxv1_4.3.0.dfsg.1-14sarge7_powerpc.deb oldstable/main/binary-powerpc/libxaw6_4.3.0.dfsg.1-14sarge7_powerpc.deb oldstable/main/binary-powerpc/libsm-dev_4.3.0.dfsg.1-14sarge7_powerpc.deb oldstable/main/binary-powerpc/libxt-dev_4.3.0.dfsg.1-14sarge7_powerpc.deb oldstable/main/binary-powerpc/libxrandr2-dbg_4.3.0.dfsg.1-14sarge7_powerpc.deb oldstable/main/binary-powerpc/libxv-dev_4.3.0.dfsg.1-14sarge7_powerpc.deb oldstable/main/binary-powerpc/xlibmesa-dri_4.3.0.dfsg.1-14sarge7_powerpc.deb oldstable/main/binary-powerpc/xserver-common_4.3.0.dfsg.1-14sarge7_powerpc.deb oldstable/main/binary-powerpc/xlibmesa-glu-dev_4.3.0.dfsg.1-14sarge7_powerpc.deb oldstable/main/binary-powerpc/libxaw7_4.3.0.dfsg.1-14sarge7_powerpc.deb oldstable/main/binary-powerpc/libsm6_4.3.0.dfsg.1-14sarge7_powerpc.deb oldstable/main/binary-powerpc/libx11-6_4.3.0.dfsg.1-14sarge7_powerpc.deb oldstable/main/binary-powerpc/libxp6_4.3.0.dfsg.1-14sarge7_powerpc.deb oldstable/main/binary-powerpc/libxmuu-dev_4.3.0.dfsg.1-14sarge7_powerpc.deb oldstable/main/binary-powerpc/libxtst6-dbg_4.3.0.dfsg.1-14sarge7_powerpc.deb oldstable/main/binary-powerpc/libxp6-dbg_4.3.0.dfsg.1-14sarge7_powerpc.deb oldstable/main/binary-powerpc/xlibosmesa4-dbg_4.3.0.dfsg.1-14sarge7_powerpc.deb oldstable/main/binary-powerpc/libxt6-dbg_4.3.0.dfsg.1-14sarge7_powerpc.deb oldstable/main/binary-powerpc/libxaw6-dbg_4.3.0.dfsg.1-14sarge7_powerpc.deb oldstable/main/binary-powerpc/libxpm4-dbg_4.3.0.dfsg.1-14sarge7_powerpc.deb oldstable/main/binary-powerpc/libxtrap6_4.3.0.dfsg.1-14sarge7_powerpc.deb oldstable/main/binary-powerpc/libdps-dev_4.3.0.dfsg.1-14sarge7_powerpc.deb oldstable/main/binary-powerpc/libxaw7-dbg_4.3.0.dfsg.1-14sarge7_powerpc.deb oldstable/main/binary-powerpc/libxi6-dbg_4.3.0.dfsg.1-14sarge7_powerpc.deb oldstable/main/binary-powerpc/libxp-dev_4.3.0.dfsg.1-14sarge7_powerpc.deb oldstable/main/binary-powerpc/libxt6_4.3.0.dfsg.1-14sarge7_powerpc.deb oldstable/main/binary-powerpc/xserver-xfree86_4.3.0.dfsg.1-14sarge7_powerpc.deb oldstable/main/binary-powerpc/libxtst6_4.3.0.dfsg.1-14sarge7_powerpc.deb oldstable/main/binary-powerpc/libxv1-dbg_4.3.0.dfsg.1-14sarge7_powerpc.deb oldstable/main/binary-powerpc/libxtrap6-dbg_4.3.0.dfsg.1-14sarge7_powerpc.deb oldstable/main/binary-powerpc/libice6-dbg_4.3.0.dfsg.1-14sarge7_powerpc.deb oldstable/main/binary-powerpc/xlibosmesa4_4.3.0.dfsg.1-14sarge7_powerpc.deb oldstable/main/binary-powerpc/xlibmesa-gl_4.3.0.dfsg.1-14sarge7_powerpc.deb oldstable/main/binary-powerpc/libxext-dev_4.3.0.dfsg.1-14sarge7_powerpc.deb oldstable/main/binary-powerpc/xlibmesa-gl-dev_4.3.0.dfsg.1-14sarge7_powerpc.deb oldstable/main/binary-powerpc/xlibmesa-dri-dbg_4.3.0.dfsg.1-14sarge7_powerpc.deb oldstable/main/binary-powerpc/libxtrap-dev_4.3.0.dfsg.1-14sarge7_powerpc.deb oldstable/main/binary-powerpc/libdps1_4.3.0.dfsg.1-14sarge7_powerpc.deb oldstable/main/binary-powerpc/xserver-xfree86-dbg_4.3.0.dfsg.1-14sarge7_powerpc.deb oldstable/main/binary-powerpc/libxmu-dev_4.3.0.dfsg.1-14sarge7_powerpc.deb oldstable/main/binary-powerpc/libx11-6-dbg_4.3.0.dfsg.1-14sarge7_powerpc.deb xfree86 (4.3.0.dfsg.1-14sarge7) oldstable-security; urgency=high * Fix regression introduced in -14sarge6 by the MIT-SHM security patch (closes: #461410). oldstable/main/binary-mipsel/libxrandr2-dbg_4.3.0.dfsg.1-14sarge7_mipsel.deb oldstable/main/binary-mipsel/libxmu6-dbg_4.3.0.dfsg.1-14sarge7_mipsel.deb oldstable/main/binary-mipsel/libxaw6-dev_4.3.0.dfsg.1-14sarge7_mipsel.deb oldstable/main/binary-mipsel/xserver-common_4.3.0.dfsg.1-14sarge7_mipsel.deb oldstable/main/binary-mipsel/libsm6-dbg_4.3.0.dfsg.1-14sarge7_mipsel.deb oldstable/main/binary-mipsel/libxft1-dbg_4.3.0.dfsg.1-14sarge7_mipsel.deb oldstable/main/binary-mipsel/libxpm-dev_4.3.0.dfsg.1-14sarge7_mipsel.deb oldstable/main/binary-mipsel/x-window-system-core_4.3.0.dfsg.1-14sarge7_mipsel.deb oldstable/main/binary-mipsel/libxft1_4.3.0.dfsg.1-14sarge7_mipsel.deb oldstable/main/binary-mipsel/libx11-6-dbg_4.3.0.dfsg.1-14sarge7_mipsel.deb oldstable/main/binary-mipsel/libxp6_4.3.0.dfsg.1-14sarge7_mipsel.deb oldstable/main/binary-mipsel/libxpm4_4.3.0.dfsg.1-14sarge7_mipsel.deb oldstable/main/binary-mipsel/xmh_4.3.0.dfsg.1-14sarge7_mipsel.deb oldstable/main/binary-mipsel/libxp-dev_4.3.0.dfsg.1-14sarge7_mipsel.deb oldstable/main/binary-mipsel/libxmuu-dev_4.3.0.dfsg.1-14sarge7_mipsel.deb oldstable/main/binary-mipsel/libxtst6-dbg_4.3.0.dfsg.1-14sarge7_mipsel.deb oldstable/main/binary-mipsel/xfs_4.3.0.dfsg.1-14sarge7_mipsel.deb oldstable/main/binary-mipsel/xterm_4.3.0.dfsg.1-14sarge7_mipsel.deb oldstable/main/binary-mipsel/libxtrap6-dbg_4.3.0.dfsg.1-14sarge7_mipsel.deb oldstable/main/binary-mipsel/libice6_4.3.0.dfsg.1-14sarge7_mipsel.deb oldstable/main/binary-mipsel/libxtrap6_4.3.0.dfsg.1-14sarge7_mipsel.deb oldstable/main/binary-mipsel/xnest_4.3.0.dfsg.1-14sarge7_mipsel.deb oldstable/main/binary-mipsel/libx11-6_4.3.0.dfsg.1-14sarge7_mipsel.deb oldstable/main/binary-mipsel/libdps1_4.3.0.dfsg.1-14sarge7_mipsel.deb oldstable/main/binary-mipsel/xdm_4.3.0.dfsg.1-14sarge7_mipsel.deb oldstable/main/binary-mipsel/libxrandr-dev_4.3.0.dfsg.1-14sarge7_mipsel.deb oldstable/main/binary-mipsel/libxext6_4.3.0.dfsg.1-14sarge7_mipsel.deb oldstable/main/binary-mipsel/libxpm4-dbg_4.3.0.dfsg.1-14sarge7_mipsel.deb oldstable/main/binary-mipsel/libx11-dev_4.3.0.dfsg.1-14sarge7_mipsel.deb oldstable/main/binary-mipsel/xserver-xfree86-dbg_4.3.0.dfsg.1-14sarge7_mipsel.deb oldstable/main/binary-mipsel/libxi6_4.3.0.dfsg.1-14sarge7_mipsel.deb oldstable/main/binary-mipsel/xlibmesa-gl_4.3.0.dfsg.1-14sarge7_mipsel.deb oldstable/main/binary-mipsel/xfwp_4.3.0.dfsg.1-14sarge7_mipsel.deb oldstable/main/binary-mipsel/xlibmesa-glu-dbg_4.3.0.dfsg.1-14sarge7_mipsel.deb oldstable/main/binary-mipsel/libxaw7_4.3.0.dfsg.1-14sarge7_mipsel.deb oldstable/main/binary-mipsel/libxmu6_4.3.0.dfsg.1-14sarge7_mipsel.deb oldstable/main/binary-mipsel/libxv-dev_4.3.0.dfsg.1-14sarge7_mipsel.deb oldstable/main/binary-mipsel/xbase-clients_4.3.0.dfsg.1-14sarge7_mipsel.deb oldstable/main/binary-mipsel/twm_4.3.0.dfsg.1-14sarge7_mipsel.deb oldstable/main/binary-mipsel/lbxproxy_4.3.0.dfsg.1-14sarge7_mipsel.deb oldstable/main/binary-mipsel/libxv1-dbg_4.3.0.dfsg.1-14sarge7_mipsel.deb oldstable/main/binary-mipsel/libxp6-dbg_4.3.0.dfsg.1-14sarge7_mipsel.deb oldstable/main/binary-mipsel/libxi6-dbg_4.3.0.dfsg.1-14sarge7_mipsel.deb oldstable/main/binary-mipsel/xlibmesa3_4.3.0.dfsg.1-14sarge7_mipsel.deb oldstable/main/binary-mipsel/xserver-xfree86_4.3.0.dfsg.1-14sarge7_mipsel.deb oldstable/main/binary-mipsel/libice6-dbg_4.3.0.dfsg.1-14sarge7_mipsel.deb oldstable/main/binary-mipsel/libxtst6_4.3.0.dfsg.1-14sarge7_mipsel.deb oldstable/main/binary-mipsel/xlibs-static-pic_4.3.0.dfsg.1-14sarge7_mipsel.deb oldstable/main/binary-mipsel/libxt-dev_4.3.0.dfsg.1-14sarge7_mipsel.deb oldstable/main/binary-mipsel/xutils_4.3.0.dfsg.1-14sarge7_mipsel.deb oldstable/main/binary-mipsel/xlibs-static-dev_4.3.0.dfsg.1-14sarge7_mipsel.deb oldstable/main/binary-mipsel/xlibmesa-gl-dev_4.3.0.dfsg.1-14sarge7_mipsel.deb oldstable/main/binary-mipsel/libsm6_4.3.0.dfsg.1-14sarge7_mipsel.deb oldstable/main/binary-mipsel/xlibmesa-gl-dbg_4.3.0.dfsg.1-14sarge7_mipsel.deb oldstable/main/binary-mipsel/xlibmesa-glu-dev_4.3.0.dfsg.1-14sarge7_mipsel.deb oldstable/main/binary-mipsel/libxaw6_4.3.0.dfsg.1-14sarge7_mipsel.deb oldstable/main/binary-mipsel/xvfb_4.3.0.dfsg.1-14sarge7_mipsel.deb oldstable/main/binary-mipsel/libxi-dev_4.3.0.dfsg.1-14sarge7_mipsel.deb oldstable/main/binary-mipsel/libxt6-dbg_4.3.0.dfsg.1-14sarge7_mipsel.deb oldstable/main/binary-mipsel/libdps-dev_4.3.0.dfsg.1-14sarge7_mipsel.deb oldstable/main/binary-mipsel/proxymngr_4.3.0.dfsg.1-14sarge7_mipsel.deb oldstable/main/binary-mipsel/x-window-system-dev_4.3.0.dfsg.1-14sarge7_mipsel.deb oldstable/main/binary-mipsel/libxv1_4.3.0.dfsg.1-14sarge7_mipsel.deb oldstable/main/binary-mipsel/libxaw7-dev_4.3.0.dfsg.1-14sarge7_mipsel.deb oldstable/main/binary-mipsel/libxmu-dev_4.3.0.dfsg.1-14sarge7_mipsel.deb oldstable/main/binary-mipsel/libxt6_4.3.0.dfsg.1-14sarge7_mipsel.deb oldstable/main/binary-mipsel/libxmuu1_4.3.0.dfsg.1-14sarge7_mipsel.deb oldstable/main/binary-mipsel/libxtrap-dev_4.3.0.dfsg.1-14sarge7_mipsel.deb oldstable/main/binary-mipsel/libice-dev_4.3.0.dfsg.1-14sarge7_mipsel.deb oldstable/main/binary-mipsel/libsm-dev_4.3.0.dfsg.1-14sarge7_mipsel.deb oldstable/main/binary-mipsel/libxaw7-dbg_4.3.0.dfsg.1-14sarge7_mipsel.deb oldstable/main/binary-mipsel/libxrandr2_4.3.0.dfsg.1-14sarge7_mipsel.deb oldstable/main/binary-mipsel/libxext-dev_4.3.0.dfsg.1-14sarge7_mipsel.deb oldstable/main/binary-mipsel/libdps1-dbg_4.3.0.dfsg.1-14sarge7_mipsel.deb oldstable/main/binary-mipsel/libxmuu1-dbg_4.3.0.dfsg.1-14sarge7_mipsel.deb oldstable/main/binary-mipsel/libxaw6-dbg_4.3.0.dfsg.1-14sarge7_mipsel.deb oldstable/main/binary-mipsel/libxtst-dev_4.3.0.dfsg.1-14sarge7_mipsel.deb oldstable/main/binary-mipsel/xlibmesa-glu_4.3.0.dfsg.1-14sarge7_mipsel.deb oldstable/main/binary-mipsel/libxext6-dbg_4.3.0.dfsg.1-14sarge7_mipsel.deb xfree86 (4.3.0.dfsg.1-14sarge7) oldstable-security; urgency=high * Fix regression introduced in -14sarge6 by the MIT-SHM security patch (closes: #461410). oldstable/main/binary-mips/libxmu6_4.3.0.dfsg.1-14sarge7_mips.deb oldstable/main/binary-mips/xlibmesa-glu-dbg_4.3.0.dfsg.1-14sarge7_mips.deb oldstable/main/binary-mips/libxext-dev_4.3.0.dfsg.1-14sarge7_mips.deb oldstable/main/binary-mips/libdps-dev_4.3.0.dfsg.1-14sarge7_mips.deb oldstable/main/binary-mips/twm_4.3.0.dfsg.1-14sarge7_mips.deb oldstable/main/binary-mips/xdm_4.3.0.dfsg.1-14sarge7_mips.deb oldstable/main/binary-mips/libxmuu-dev_4.3.0.dfsg.1-14sarge7_mips.deb oldstable/main/binary-mips/libxp6-dbg_4.3.0.dfsg.1-14sarge7_mips.deb oldstable/main/binary-mips/libxpm4-dbg_4.3.0.dfsg.1-14sarge7_mips.deb oldstable/main/binary-mips/libxext6_4.3.0.dfsg.1-14sarge7_mips.deb oldstable/main/binary-mips/libxaw6-dev_4.3.0.dfsg.1-14sarge7_mips.deb oldstable/main/binary-mips/libxi6_4.3.0.dfsg.1-14sarge7_mips.deb oldstable/main/binary-mips/libxt-dev_4.3.0.dfsg.1-14sarge7_mips.deb oldstable/main/binary-mips/libxt6-dbg_4.3.0.dfsg.1-14sarge7_mips.deb oldstable/main/binary-mips/xserver-common_4.3.0.dfsg.1-14sarge7_mips.deb oldstable/main/binary-mips/xbase-clients_4.3.0.dfsg.1-14sarge7_mips.deb oldstable/main/binary-mips/libxtst6-dbg_4.3.0.dfsg.1-14sarge7_mips.deb oldstable/main/binary-mips/xserver-xfree86-dbg_4.3.0.dfsg.1-14sarge7_mips.deb oldstable/main/binary-mips/libxtst6_4.3.0.dfsg.1-14sarge7_mips.deb oldstable/main/binary-mips/xlibs-static-pic_4.3.0.dfsg.1-14sarge7_mips.deb oldstable/main/binary-mips/libxft1-dbg_4.3.0.dfsg.1-14sarge7_mips.deb oldstable/main/binary-mips/xmh_4.3.0.dfsg.1-14sarge7_mips.deb oldstable/main/binary-mips/libxp-dev_4.3.0.dfsg.1-14sarge7_mips.deb oldstable/main/binary-mips/xlibmesa-gl_4.3.0.dfsg.1-14sarge7_mips.deb oldstable/main/binary-mips/xlibmesa-glu-dev_4.3.0.dfsg.1-14sarge7_mips.deb oldstable/main/binary-mips/libice6-dbg_4.3.0.dfsg.1-14sarge7_mips.deb oldstable/main/binary-mips/libxtrap6-dbg_4.3.0.dfsg.1-14sarge7_mips.deb oldstable/main/binary-mips/x-window-system-dev_4.3.0.dfsg.1-14sarge7_mips.deb oldstable/main/binary-mips/libxv1-dbg_4.3.0.dfsg.1-14sarge7_mips.deb oldstable/main/binary-mips/xlibs-static-dev_4.3.0.dfsg.1-14sarge7_mips.deb oldstable/main/binary-mips/libxmuu1_4.3.0.dfsg.1-14sarge7_mips.deb oldstable/main/binary-mips/libxaw6-dbg_4.3.0.dfsg.1-14sarge7_mips.deb oldstable/main/binary-mips/libx11-dev_4.3.0.dfsg.1-14sarge7_mips.deb oldstable/main/binary-mips/libsm6_4.3.0.dfsg.1-14sarge7_mips.deb oldstable/main/binary-mips/libxp6_4.3.0.dfsg.1-14sarge7_mips.deb oldstable/main/binary-mips/xutils_4.3.0.dfsg.1-14sarge7_mips.deb oldstable/main/binary-mips/xlibmesa-gl-dev_4.3.0.dfsg.1-14sarge7_mips.deb oldstable/main/binary-mips/libx11-6-dbg_4.3.0.dfsg.1-14sarge7_mips.deb oldstable/main/binary-mips/libdps1_4.3.0.dfsg.1-14sarge7_mips.deb oldstable/main/binary-mips/xfs_4.3.0.dfsg.1-14sarge7_mips.deb oldstable/main/binary-mips/libxmuu1-dbg_4.3.0.dfsg.1-14sarge7_mips.deb oldstable/main/binary-mips/libxi6-dbg_4.3.0.dfsg.1-14sarge7_mips.deb oldstable/main/binary-mips/xterm_4.3.0.dfsg.1-14sarge7_mips.deb oldstable/main/binary-mips/libxv-dev_4.3.0.dfsg.1-14sarge7_mips.deb oldstable/main/binary-mips/libxpm-dev_4.3.0.dfsg.1-14sarge7_mips.deb oldstable/main/binary-mips/libxft1_4.3.0.dfsg.1-14sarge7_mips.deb oldstable/main/binary-mips/libdps1-dbg_4.3.0.dfsg.1-14sarge7_mips.deb oldstable/main/binary-mips/xserver-xfree86_4.3.0.dfsg.1-14sarge7_mips.deb oldstable/main/binary-mips/proxymngr_4.3.0.dfsg.1-14sarge7_mips.deb oldstable/main/binary-mips/libxrandr2-dbg_4.3.0.dfsg.1-14sarge7_mips.deb oldstable/main/binary-mips/libsm6-dbg_4.3.0.dfsg.1-14sarge7_mips.deb oldstable/main/binary-mips/libxext6-dbg_4.3.0.dfsg.1-14sarge7_mips.deb oldstable/main/binary-mips/libxmu6-dbg_4.3.0.dfsg.1-14sarge7_mips.deb oldstable/main/binary-mips/xfwp_4.3.0.dfsg.1-14sarge7_mips.deb oldstable/main/binary-mips/libxaw6_4.3.0.dfsg.1-14sarge7_mips.deb oldstable/main/binary-mips/x-window-system-core_4.3.0.dfsg.1-14sarge7_mips.deb oldstable/main/binary-mips/xnest_4.3.0.dfsg.1-14sarge7_mips.deb oldstable/main/binary-mips/libxmu-dev_4.3.0.dfsg.1-14sarge7_mips.deb oldstable/main/binary-mips/libxrandr-dev_4.3.0.dfsg.1-14sarge7_mips.deb oldstable/main/binary-mips/libxaw7-dev_4.3.0.dfsg.1-14sarge7_mips.deb oldstable/main/binary-mips/libxv1_4.3.0.dfsg.1-14sarge7_mips.deb oldstable/main/binary-mips/libxaw7_4.3.0.dfsg.1-14sarge7_mips.deb oldstable/main/binary-mips/libxrandr2_4.3.0.dfsg.1-14sarge7_mips.deb oldstable/main/binary-mips/lbxproxy_4.3.0.dfsg.1-14sarge7_mips.deb oldstable/main/binary-mips/libxt6_4.3.0.dfsg.1-14sarge7_mips.deb oldstable/main/binary-mips/libsm-dev_4.3.0.dfsg.1-14sarge7_mips.deb oldstable/main/binary-mips/libxtrap-dev_4.3.0.dfsg.1-14sarge7_mips.deb oldstable/main/binary-mips/libice-dev_4.3.0.dfsg.1-14sarge7_mips.deb oldstable/main/binary-mips/libice6_4.3.0.dfsg.1-14sarge7_mips.deb oldstable/main/binary-mips/xvfb_4.3.0.dfsg.1-14sarge7_mips.deb oldstable/main/binary-mips/libxtrap6_4.3.0.dfsg.1-14sarge7_mips.deb oldstable/main/binary-mips/xlibmesa-gl-dbg_4.3.0.dfsg.1-14sarge7_mips.deb oldstable/main/binary-mips/xlibmesa-glu_4.3.0.dfsg.1-14sarge7_mips.deb oldstable/main/binary-mips/libxtst-dev_4.3.0.dfsg.1-14sarge7_mips.deb oldstable/main/binary-mips/libx11-6_4.3.0.dfsg.1-14sarge7_mips.deb oldstable/main/binary-mips/libxaw7-dbg_4.3.0.dfsg.1-14sarge7_mips.deb oldstable/main/binary-mips/libxi-dev_4.3.0.dfsg.1-14sarge7_mips.deb oldstable/main/binary-mips/libxpm4_4.3.0.dfsg.1-14sarge7_mips.deb oldstable/main/binary-mips/xlibmesa3_4.3.0.dfsg.1-14sarge7_mips.deb xfree86 (4.3.0.dfsg.1-14sarge7) oldstable-security; urgency=high * Fix regression introduced in -14sarge6 by the MIT-SHM security patch (closes: #461410). oldstable/main/binary-m68k/libsm6-dbg_4.3.0.dfsg.1-14sarge7_m68k.deb oldstable/main/binary-m68k/proxymngr_4.3.0.dfsg.1-14sarge7_m68k.deb oldstable/main/binary-m68k/xserver-xfree86-dbg_4.3.0.dfsg.1-14sarge7_m68k.deb oldstable/main/binary-m68k/x-window-system-core_4.3.0.dfsg.1-14sarge7_m68k.deb oldstable/main/binary-m68k/libice-dev_4.3.0.dfsg.1-14sarge7_m68k.deb oldstable/main/binary-m68k/libxmu6-dbg_4.3.0.dfsg.1-14sarge7_m68k.deb oldstable/main/binary-m68k/libxv1-dbg_4.3.0.dfsg.1-14sarge7_m68k.deb oldstable/main/binary-m68k/libxrandr-dev_4.3.0.dfsg.1-14sarge7_m68k.deb oldstable/main/binary-m68k/libxaw6-dbg_4.3.0.dfsg.1-14sarge7_m68k.deb oldstable/main/binary-m68k/libxaw7-dbg_4.3.0.dfsg.1-14sarge7_m68k.deb oldstable/main/binary-m68k/xserver-xfree86_4.3.0.dfsg.1-14sarge7_m68k.deb oldstable/main/binary-m68k/libsm6_4.3.0.dfsg.1-14sarge7_m68k.deb oldstable/main/binary-m68k/libxv-dev_4.3.0.dfsg.1-14sarge7_m68k.deb oldstable/main/binary-m68k/libxp6-dbg_4.3.0.dfsg.1-14sarge7_m68k.deb oldstable/main/binary-m68k/twm_4.3.0.dfsg.1-14sarge7_m68k.deb oldstable/main/binary-m68k/libxtrap6-dbg_4.3.0.dfsg.1-14sarge7_m68k.deb oldstable/main/binary-m68k/libxi6_4.3.0.dfsg.1-14sarge7_m68k.deb oldstable/main/binary-m68k/xbase-clients_4.3.0.dfsg.1-14sarge7_m68k.deb oldstable/main/binary-m68k/libx11-6-dbg_4.3.0.dfsg.1-14sarge7_m68k.deb oldstable/main/binary-m68k/libxmuu-dev_4.3.0.dfsg.1-14sarge7_m68k.deb oldstable/main/binary-m68k/libxtst6-dbg_4.3.0.dfsg.1-14sarge7_m68k.deb oldstable/main/binary-m68k/xterm_4.3.0.dfsg.1-14sarge7_m68k.deb oldstable/main/binary-m68k/libxtst-dev_4.3.0.dfsg.1-14sarge7_m68k.deb oldstable/main/binary-m68k/xlibmesa-glu_4.3.0.dfsg.1-14sarge7_m68k.deb oldstable/main/binary-m68k/xserver-common_4.3.0.dfsg.1-14sarge7_m68k.deb oldstable/main/binary-m68k/xvfb_4.3.0.dfsg.1-14sarge7_m68k.deb oldstable/main/binary-m68k/xlibmesa-gl-dbg_4.3.0.dfsg.1-14sarge7_m68k.deb oldstable/main/binary-m68k/libxrandr2-dbg_4.3.0.dfsg.1-14sarge7_m68k.deb oldstable/main/binary-m68k/xlibmesa3_4.3.0.dfsg.1-14sarge7_m68k.deb oldstable/main/binary-m68k/xdm_4.3.0.dfsg.1-14sarge7_m68k.deb oldstable/main/binary-m68k/libxtrap6_4.3.0.dfsg.1-14sarge7_m68k.deb oldstable/main/binary-m68k/xfwp_4.3.0.dfsg.1-14sarge7_m68k.deb oldstable/main/binary-m68k/libxt-dev_4.3.0.dfsg.1-14sarge7_m68k.deb oldstable/main/binary-m68k/libxrandr2_4.3.0.dfsg.1-14sarge7_m68k.deb oldstable/main/binary-m68k/libxmu-dev_4.3.0.dfsg.1-14sarge7_m68k.deb oldstable/main/binary-m68k/xlibs-static-dev_4.3.0.dfsg.1-14sarge7_m68k.deb oldstable/main/binary-m68k/xlibmesa-glu-dbg_4.3.0.dfsg.1-14sarge7_m68k.deb oldstable/main/binary-m68k/libxft1-dbg_4.3.0.dfsg.1-14sarge7_m68k.deb oldstable/main/binary-m68k/xlibmesa-glu-dev_4.3.0.dfsg.1-14sarge7_m68k.deb oldstable/main/binary-m68k/libdps1_4.3.0.dfsg.1-14sarge7_m68k.deb oldstable/main/binary-m68k/libxaw7-dev_4.3.0.dfsg.1-14sarge7_m68k.deb oldstable/main/binary-m68k/libxt6-dbg_4.3.0.dfsg.1-14sarge7_m68k.deb oldstable/main/binary-m68k/xfs_4.3.0.dfsg.1-14sarge7_m68k.deb oldstable/main/binary-m68k/libxmuu1_4.3.0.dfsg.1-14sarge7_m68k.deb oldstable/main/binary-m68k/libx11-dev_4.3.0.dfsg.1-14sarge7_m68k.deb oldstable/main/binary-m68k/lbxproxy_4.3.0.dfsg.1-14sarge7_m68k.deb oldstable/main/binary-m68k/libxt6_4.3.0.dfsg.1-14sarge7_m68k.deb oldstable/main/binary-m68k/libxext6-dbg_4.3.0.dfsg.1-14sarge7_m68k.deb oldstable/main/binary-m68k/libxp-dev_4.3.0.dfsg.1-14sarge7_m68k.deb oldstable/main/binary-m68k/libdps-dev_4.3.0.dfsg.1-14sarge7_m68k.deb oldstable/main/binary-m68k/xutils_4.3.0.dfsg.1-14sarge7_m68k.deb oldstable/main/binary-m68k/libxpm-dev_4.3.0.dfsg.1-14sarge7_m68k.deb oldstable/main/binary-m68k/libice6_4.3.0.dfsg.1-14sarge7_m68k.deb oldstable/main/binary-m68k/libxmu6_4.3.0.dfsg.1-14sarge7_m68k.deb oldstable/main/binary-m68k/xlibmesa-gl-dev_4.3.0.dfsg.1-14sarge7_m68k.deb oldstable/main/binary-m68k/libxext6_4.3.0.dfsg.1-14sarge7_m68k.deb oldstable/main/binary-m68k/libxaw6_4.3.0.dfsg.1-14sarge7_m68k.deb oldstable/main/binary-m68k/libsm-dev_4.3.0.dfsg.1-14sarge7_m68k.deb oldstable/main/binary-m68k/libxaw7_4.3.0.dfsg.1-14sarge7_m68k.deb oldstable/main/binary-m68k/libxp6_4.3.0.dfsg.1-14sarge7_m68k.deb oldstable/main/binary-m68k/libxi-dev_4.3.0.dfsg.1-14sarge7_m68k.deb oldstable/main/binary-m68k/libx11-6_4.3.0.dfsg.1-14sarge7_m68k.deb oldstable/main/binary-m68k/libxv1_4.3.0.dfsg.1-14sarge7_m68k.deb oldstable/main/binary-m68k/libxmuu1-dbg_4.3.0.dfsg.1-14sarge7_m68k.deb oldstable/main/binary-m68k/x-window-system-dev_4.3.0.dfsg.1-14sarge7_m68k.deb oldstable/main/binary-m68k/libxext-dev_4.3.0.dfsg.1-14sarge7_m68k.deb oldstable/main/binary-m68k/libxft1_4.3.0.dfsg.1-14sarge7_m68k.deb oldstable/main/binary-m68k/xlibs-static-pic_4.3.0.dfsg.1-14sarge7_m68k.deb oldstable/main/binary-m68k/libice6-dbg_4.3.0.dfsg.1-14sarge7_m68k.deb oldstable/main/binary-m68k/libxtrap-dev_4.3.0.dfsg.1-14sarge7_m68k.deb oldstable/main/binary-m68k/xlibmesa-gl_4.3.0.dfsg.1-14sarge7_m68k.deb oldstable/main/binary-m68k/libxpm4_4.3.0.dfsg.1-14sarge7_m68k.deb oldstable/main/binary-m68k/libxi6-dbg_4.3.0.dfsg.1-14sarge7_m68k.deb oldstable/main/binary-m68k/libdps1-dbg_4.3.0.dfsg.1-14sarge7_m68k.deb oldstable/main/binary-m68k/libxaw6-dev_4.3.0.dfsg.1-14sarge7_m68k.deb oldstable/main/binary-m68k/xmh_4.3.0.dfsg.1-14sarge7_m68k.deb oldstable/main/binary-m68k/libxtst6_4.3.0.dfsg.1-14sarge7_m68k.deb oldstable/main/binary-m68k/libxpm4-dbg_4.3.0.dfsg.1-14sarge7_m68k.deb oldstable/main/binary-m68k/xnest_4.3.0.dfsg.1-14sarge7_m68k.deb xfree86 (4.3.0.dfsg.1-14sarge7) oldstable-security; urgency=high * Fix regression introduced in -14sarge6 by the MIT-SHM security patch (closes: #461410). oldstable/main/binary-ia64/xutils_4.3.0.dfsg.1-14sarge7_ia64.deb oldstable/main/binary-ia64/libxext-dev_4.3.0.dfsg.1-14sarge7_ia64.deb oldstable/main/binary-ia64/libxaw6-dev_4.3.0.dfsg.1-14sarge7_ia64.deb oldstable/main/binary-ia64/libxmuu-dev_4.3.0.dfsg.1-14sarge7_ia64.deb oldstable/main/binary-ia64/libxtst6-dbg_4.3.0.dfsg.1-14sarge7_ia64.deb oldstable/main/binary-ia64/xlibosmesa4-dbg_4.3.0.dfsg.1-14sarge7_ia64.deb oldstable/main/binary-ia64/libxft1_4.3.0.dfsg.1-14sarge7_ia64.deb oldstable/main/binary-ia64/libxext6-dbg_4.3.0.dfsg.1-14sarge7_ia64.deb oldstable/main/binary-ia64/libxp6_4.3.0.dfsg.1-14sarge7_ia64.deb oldstable/main/binary-ia64/libxp6-dbg_4.3.0.dfsg.1-14sarge7_ia64.deb oldstable/main/binary-ia64/libsm-dev_4.3.0.dfsg.1-14sarge7_ia64.deb oldstable/main/binary-ia64/libdps1-dbg_4.3.0.dfsg.1-14sarge7_ia64.deb oldstable/main/binary-ia64/libdps1_4.3.0.dfsg.1-14sarge7_ia64.deb oldstable/main/binary-ia64/xlibosmesa4_4.3.0.dfsg.1-14sarge7_ia64.deb oldstable/main/binary-ia64/libx11-6-dbg_4.3.0.dfsg.1-14sarge7_ia64.deb oldstable/main/binary-ia64/libx11-dev_4.3.0.dfsg.1-14sarge7_ia64.deb oldstable/main/binary-ia64/xlibmesa-glu-dbg_4.3.0.dfsg.1-14sarge7_ia64.deb oldstable/main/binary-ia64/xbase-clients_4.3.0.dfsg.1-14sarge7_ia64.deb oldstable/main/binary-ia64/libxi6-dbg_4.3.0.dfsg.1-14sarge7_ia64.deb oldstable/main/binary-ia64/xlibmesa-dri_4.3.0.dfsg.1-14sarge7_ia64.deb oldstable/main/binary-ia64/libdps-dev_4.3.0.dfsg.1-14sarge7_ia64.deb oldstable/main/binary-ia64/libxaw6-dbg_4.3.0.dfsg.1-14sarge7_ia64.deb oldstable/main/binary-ia64/twm_4.3.0.dfsg.1-14sarge7_ia64.deb oldstable/main/binary-ia64/xdm_4.3.0.dfsg.1-14sarge7_ia64.deb oldstable/main/binary-ia64/x-window-system-dev_4.3.0.dfsg.1-14sarge7_ia64.deb oldstable/main/binary-ia64/libxp-dev_4.3.0.dfsg.1-14sarge7_ia64.deb oldstable/main/binary-ia64/libxaw7-dev_4.3.0.dfsg.1-14sarge7_ia64.deb oldstable/main/binary-ia64/libxext6_4.3.0.dfsg.1-14sarge7_ia64.deb oldstable/main/binary-ia64/libxv-dev_4.3.0.dfsg.1-14sarge7_ia64.deb oldstable/main/binary-ia64/libxaw7_4.3.0.dfsg.1-14sarge7_ia64.deb oldstable/main/binary-ia64/xlibosmesa-dev_4.3.0.dfsg.1-14sarge7_ia64.deb oldstable/main/binary-ia64/libxtst6_4.3.0.dfsg.1-14sarge7_ia64.deb oldstable/main/binary-ia64/libxv1-dbg_4.3.0.dfsg.1-14sarge7_ia64.deb oldstable/main/binary-ia64/libx11-6_4.3.0.dfsg.1-14sarge7_ia64.deb oldstable/main/binary-ia64/libxi6_4.3.0.dfsg.1-14sarge7_ia64.deb oldstable/main/binary-ia64/libxmu-dev_4.3.0.dfsg.1-14sarge7_ia64.deb oldstable/main/binary-ia64/libxaw7-dbg_4.3.0.dfsg.1-14sarge7_ia64.deb oldstable/main/binary-ia64/libxpm-dev_4.3.0.dfsg.1-14sarge7_ia64.deb oldstable/main/binary-ia64/x-window-system-core_4.3.0.dfsg.1-14sarge7_ia64.deb oldstable/main/binary-ia64/xlibmesa-dri-dbg_4.3.0.dfsg.1-14sarge7_ia64.deb oldstable/main/binary-ia64/libxtrap6-dbg_4.3.0.dfsg.1-14sarge7_ia64.deb oldstable/main/binary-ia64/xlibmesa-glu-dev_4.3.0.dfsg.1-14sarge7_ia64.deb oldstable/main/binary-ia64/xterm_4.3.0.dfsg.1-14sarge7_ia64.deb oldstable/main/binary-ia64/xlibmesa-gl-dbg_4.3.0.dfsg.1-14sarge7_ia64.deb oldstable/main/binary-ia64/libice6-dbg_4.3.0.dfsg.1-14sarge7_ia64.deb oldstable/main/binary-ia64/libsm6_4.3.0.dfsg.1-14sarge7_ia64.deb oldstable/main/binary-ia64/xlibmesa-gl_4.3.0.dfsg.1-14sarge7_ia64.deb oldstable/main/binary-ia64/libxpm4-dbg_4.3.0.dfsg.1-14sarge7_ia64.deb oldstable/main/binary-ia64/lbxproxy_4.3.0.dfsg.1-14sarge7_ia64.deb oldstable/main/binary-ia64/libxrandr2-dbg_4.3.0.dfsg.1-14sarge7_ia64.deb oldstable/main/binary-ia64/proxymngr_4.3.0.dfsg.1-14sarge7_ia64.deb oldstable/main/binary-ia64/libxtrap-dev_4.3.0.dfsg.1-14sarge7_ia64.deb oldstable/main/binary-ia64/libice-dev_4.3.0.dfsg.1-14sarge7_ia64.deb oldstable/main/binary-ia64/xserver-xfree86-dbg_4.3.0.dfsg.1-14sarge7_ia64.deb oldstable/main/binary-ia64/libxrandr2_4.3.0.dfsg.1-14sarge7_ia64.deb oldstable/main/binary-ia64/xlibs-static-dev_4.3.0.dfsg.1-14sarge7_ia64.deb oldstable/main/binary-ia64/libxt-dev_4.3.0.dfsg.1-14sarge7_ia64.deb oldstable/main/binary-ia64/xlibmesa-gl-dev_4.3.0.dfsg.1-14sarge7_ia64.deb oldstable/main/binary-ia64/libxft1-dbg_4.3.0.dfsg.1-14sarge7_ia64.deb oldstable/main/binary-ia64/libxi-dev_4.3.0.dfsg.1-14sarge7_ia64.deb oldstable/main/binary-ia64/libxmuu1_4.3.0.dfsg.1-14sarge7_ia64.deb oldstable/main/binary-ia64/libxpm4_4.3.0.dfsg.1-14sarge7_ia64.deb oldstable/main/binary-ia64/libxrandr-dev_4.3.0.dfsg.1-14sarge7_ia64.deb oldstable/main/binary-ia64/libxv1_4.3.0.dfsg.1-14sarge7_ia64.deb oldstable/main/binary-ia64/xnest_4.3.0.dfsg.1-14sarge7_ia64.deb oldstable/main/binary-ia64/libice6_4.3.0.dfsg.1-14sarge7_ia64.deb oldstable/main/binary-ia64/libxmu6-dbg_4.3.0.dfsg.1-14sarge7_ia64.deb oldstable/main/binary-ia64/xserver-xfree86_4.3.0.dfsg.1-14sarge7_ia64.deb oldstable/main/binary-ia64/libxmu6_4.3.0.dfsg.1-14sarge7_ia64.deb oldstable/main/binary-ia64/libxaw6_4.3.0.dfsg.1-14sarge7_ia64.deb oldstable/main/binary-ia64/xlibs-static-pic_4.3.0.dfsg.1-14sarge7_ia64.deb oldstable/main/binary-ia64/libxtrap6_4.3.0.dfsg.1-14sarge7_ia64.deb oldstable/main/binary-ia64/xfwp_4.3.0.dfsg.1-14sarge7_ia64.deb oldstable/main/binary-ia64/libxtst-dev_4.3.0.dfsg.1-14sarge7_ia64.deb oldstable/main/binary-ia64/xlibmesa-glu_4.3.0.dfsg.1-14sarge7_ia64.deb oldstable/main/binary-ia64/libxt6-dbg_4.3.0.dfsg.1-14sarge7_ia64.deb oldstable/main/binary-ia64/xmh_4.3.0.dfsg.1-14sarge7_ia64.deb oldstable/main/binary-ia64/libxmuu1-dbg_4.3.0.dfsg.1-14sarge7_ia64.deb oldstable/main/binary-ia64/xvfb_4.3.0.dfsg.1-14sarge7_ia64.deb oldstable/main/binary-ia64/xlibmesa3_4.3.0.dfsg.1-14sarge7_ia64.deb oldstable/main/binary-ia64/libxt6_4.3.0.dfsg.1-14sarge7_ia64.deb oldstable/main/binary-ia64/xserver-common_4.3.0.dfsg.1-14sarge7_ia64.deb oldstable/main/binary-ia64/libsm6-dbg_4.3.0.dfsg.1-14sarge7_ia64.deb oldstable/main/binary-ia64/xfs_4.3.0.dfsg.1-14sarge7_ia64.deb xfree86 (4.3.0.dfsg.1-14sarge7) oldstable-security; urgency=high * Fix regression introduced in -14sarge6 by the MIT-SHM security patch (closes: #461410). oldstable/main/binary-hppa/libxi6-dbg_4.3.0.dfsg.1-14sarge7_hppa.deb oldstable/main/binary-hppa/libxaw7-dev_4.3.0.dfsg.1-14sarge7_hppa.deb oldstable/main/binary-hppa/libxpm4_4.3.0.dfsg.1-14sarge7_hppa.deb oldstable/main/binary-hppa/xserver-xfree86-dbg_4.3.0.dfsg.1-14sarge7_hppa.deb oldstable/main/binary-hppa/xlibmesa-gl-dev_4.3.0.dfsg.1-14sarge7_hppa.deb oldstable/main/binary-hppa/xfs_4.3.0.dfsg.1-14sarge7_hppa.deb oldstable/main/binary-hppa/libx11-6-dbg_4.3.0.dfsg.1-14sarge7_hppa.deb oldstable/main/binary-hppa/libxft1_4.3.0.dfsg.1-14sarge7_hppa.deb oldstable/main/binary-hppa/libxt-dev_4.3.0.dfsg.1-14sarge7_hppa.deb oldstable/main/binary-hppa/xterm_4.3.0.dfsg.1-14sarge7_hppa.deb oldstable/main/binary-hppa/libxaw7-dbg_4.3.0.dfsg.1-14sarge7_hppa.deb oldstable/main/binary-hppa/libxext6_4.3.0.dfsg.1-14sarge7_hppa.deb oldstable/main/binary-hppa/xmh_4.3.0.dfsg.1-14sarge7_hppa.deb oldstable/main/binary-hppa/libxaw6-dev_4.3.0.dfsg.1-14sarge7_hppa.deb oldstable/main/binary-hppa/libxext6-dbg_4.3.0.dfsg.1-14sarge7_hppa.deb oldstable/main/binary-hppa/xlibmesa-gl_4.3.0.dfsg.1-14sarge7_hppa.deb oldstable/main/binary-hppa/libxi6_4.3.0.dfsg.1-14sarge7_hppa.deb oldstable/main/binary-hppa/xlibmesa-glu-dev_4.3.0.dfsg.1-14sarge7_hppa.deb oldstable/main/binary-hppa/libxt6-dbg_4.3.0.dfsg.1-14sarge7_hppa.deb oldstable/main/binary-hppa/libxv-dev_4.3.0.dfsg.1-14sarge7_hppa.deb oldstable/main/binary-hppa/libsm6_4.3.0.dfsg.1-14sarge7_hppa.deb oldstable/main/binary-hppa/libxmuu1_4.3.0.dfsg.1-14sarge7_hppa.deb oldstable/main/binary-hppa/libsm-dev_4.3.0.dfsg.1-14sarge7_hppa.deb oldstable/main/binary-hppa/libx11-dev_4.3.0.dfsg.1-14sarge7_hppa.deb oldstable/main/binary-hppa/xutils_4.3.0.dfsg.1-14sarge7_hppa.deb oldstable/main/binary-hppa/libxp-dev_4.3.0.dfsg.1-14sarge7_hppa.deb oldstable/main/binary-hppa/libxaw7_4.3.0.dfsg.1-14sarge7_hppa.deb oldstable/main/binary-hppa/libxv1_4.3.0.dfsg.1-14sarge7_hppa.deb oldstable/main/binary-hppa/xdm_4.3.0.dfsg.1-14sarge7_hppa.deb oldstable/main/binary-hppa/libxft1-dbg_4.3.0.dfsg.1-14sarge7_hppa.deb oldstable/main/binary-hppa/libxt6_4.3.0.dfsg.1-14sarge7_hppa.deb oldstable/main/binary-hppa/xlibmesa3_4.3.0.dfsg.1-14sarge7_hppa.deb oldstable/main/binary-hppa/libxaw6-dbg_4.3.0.dfsg.1-14sarge7_hppa.deb oldstable/main/binary-hppa/libxrandr2-dbg_4.3.0.dfsg.1-14sarge7_hppa.deb oldstable/main/binary-hppa/libxp6-dbg_4.3.0.dfsg.1-14sarge7_hppa.deb oldstable/main/binary-hppa/libxv1-dbg_4.3.0.dfsg.1-14sarge7_hppa.deb oldstable/main/binary-hppa/libxtst6-dbg_4.3.0.dfsg.1-14sarge7_hppa.deb oldstable/main/binary-hppa/libxmuu-dev_4.3.0.dfsg.1-14sarge7_hppa.deb oldstable/main/binary-hppa/libx11-6_4.3.0.dfsg.1-14sarge7_hppa.deb oldstable/main/binary-hppa/xlibmesa-gl-dbg_4.3.0.dfsg.1-14sarge7_hppa.deb oldstable/main/binary-hppa/x-window-system-dev_4.3.0.dfsg.1-14sarge7_hppa.deb oldstable/main/binary-hppa/libxmuu1-dbg_4.3.0.dfsg.1-14sarge7_hppa.deb oldstable/main/binary-hppa/libdps-dev_4.3.0.dfsg.1-14sarge7_hppa.deb oldstable/main/binary-hppa/libxpm4-dbg_4.3.0.dfsg.1-14sarge7_hppa.deb oldstable/main/binary-hppa/libxi-dev_4.3.0.dfsg.1-14sarge7_hppa.deb oldstable/main/binary-hppa/libsm6-dbg_4.3.0.dfsg.1-14sarge7_hppa.deb oldstable/main/binary-hppa/proxymngr_4.3.0.dfsg.1-14sarge7_hppa.deb oldstable/main/binary-hppa/xserver-xfree86_4.3.0.dfsg.1-14sarge7_hppa.deb oldstable/main/binary-hppa/libxaw6_4.3.0.dfsg.1-14sarge7_hppa.deb oldstable/main/binary-hppa/libxext-dev_4.3.0.dfsg.1-14sarge7_hppa.deb oldstable/main/binary-hppa/xfwp_4.3.0.dfsg.1-14sarge7_hppa.deb oldstable/main/binary-hppa/libxtst6_4.3.0.dfsg.1-14sarge7_hppa.deb oldstable/main/binary-hppa/libxtrap6_4.3.0.dfsg.1-14sarge7_hppa.deb oldstable/main/binary-hppa/libxmu-dev_4.3.0.dfsg.1-14sarge7_hppa.deb oldstable/main/binary-hppa/libdps1-dbg_4.3.0.dfsg.1-14sarge7_hppa.deb oldstable/main/binary-hppa/libice6_4.3.0.dfsg.1-14sarge7_hppa.deb oldstable/main/binary-hppa/libxp6_4.3.0.dfsg.1-14sarge7_hppa.deb oldstable/main/binary-hppa/libxrandr-dev_4.3.0.dfsg.1-14sarge7_hppa.deb oldstable/main/binary-hppa/libxrandr2_4.3.0.dfsg.1-14sarge7_hppa.deb oldstable/main/binary-hppa/libxmu6_4.3.0.dfsg.1-14sarge7_hppa.deb oldstable/main/binary-hppa/xnest_4.3.0.dfsg.1-14sarge7_hppa.deb oldstable/main/binary-hppa/libxtrap6-dbg_4.3.0.dfsg.1-14sarge7_hppa.deb oldstable/main/binary-hppa/xlibs-static-dev_4.3.0.dfsg.1-14sarge7_hppa.deb oldstable/main/binary-hppa/libice6-dbg_4.3.0.dfsg.1-14sarge7_hppa.deb oldstable/main/binary-hppa/libxtrap-dev_4.3.0.dfsg.1-14sarge7_hppa.deb oldstable/main/binary-hppa/x-window-system-core_4.3.0.dfsg.1-14sarge7_hppa.deb oldstable/main/binary-hppa/libice-dev_4.3.0.dfsg.1-14sarge7_hppa.deb oldstable/main/binary-hppa/libxmu6-dbg_4.3.0.dfsg.1-14sarge7_hppa.deb oldstable/main/binary-hppa/libxpm-dev_4.3.0.dfsg.1-14sarge7_hppa.deb oldstable/main/binary-hppa/xserver-common_4.3.0.dfsg.1-14sarge7_hppa.deb oldstable/main/binary-hppa/xlibmesa-glu_4.3.0.dfsg.1-14sarge7_hppa.deb oldstable/main/binary-hppa/libxtst-dev_4.3.0.dfsg.1-14sarge7_hppa.deb oldstable/main/binary-hppa/xvfb_4.3.0.dfsg.1-14sarge7_hppa.deb oldstable/main/binary-hppa/twm_4.3.0.dfsg.1-14sarge7_hppa.deb oldstable/main/binary-hppa/xlibs-static-pic_4.3.0.dfsg.1-14sarge7_hppa.deb oldstable/main/binary-hppa/lbxproxy_4.3.0.dfsg.1-14sarge7_hppa.deb oldstable/main/binary-hppa/xlibmesa-glu-dbg_4.3.0.dfsg.1-14sarge7_hppa.deb oldstable/main/binary-hppa/libdps1_4.3.0.dfsg.1-14sarge7_hppa.deb oldstable/main/binary-hppa/xbase-clients_4.3.0.dfsg.1-14sarge7_hppa.deb xfree86 (4.3.0.dfsg.1-14sarge7) oldstable-security; urgency=high * Fix regression introduced in -14sarge6 by the MIT-SHM security patch (closes: #461410). oldstable/main/binary-arm/libxi6_4.3.0.dfsg.1-14sarge7_arm.deb oldstable/main/binary-arm/libxext-dev_4.3.0.dfsg.1-14sarge7_arm.deb oldstable/main/binary-arm/xmh_4.3.0.dfsg.1-14sarge7_arm.deb oldstable/main/binary-arm/libxt6-dbg_4.3.0.dfsg.1-14sarge7_arm.deb oldstable/main/binary-arm/libxtst6_4.3.0.dfsg.1-14sarge7_arm.deb oldstable/main/binary-arm/libxaw7-dbg_4.3.0.dfsg.1-14sarge7_arm.deb oldstable/main/binary-arm/libxtst6-dbg_4.3.0.dfsg.1-14sarge7_arm.deb oldstable/main/binary-arm/libdps1_4.3.0.dfsg.1-14sarge7_arm.deb oldstable/main/binary-arm/libxmuu-dev_4.3.0.dfsg.1-14sarge7_arm.deb oldstable/main/binary-arm/xlibmesa-gl_4.3.0.dfsg.1-14sarge7_arm.deb oldstable/main/binary-arm/twm_4.3.0.dfsg.1-14sarge7_arm.deb oldstable/main/binary-arm/libxext6-dbg_4.3.0.dfsg.1-14sarge7_arm.deb oldstable/main/binary-arm/xlibmesa3_4.3.0.dfsg.1-14sarge7_arm.deb oldstable/main/binary-arm/xbase-clients_4.3.0.dfsg.1-14sarge7_arm.deb oldstable/main/binary-arm/xlibmesa-glu-dbg_4.3.0.dfsg.1-14sarge7_arm.deb oldstable/main/binary-arm/libxp6-dbg_4.3.0.dfsg.1-14sarge7_arm.deb oldstable/main/binary-arm/libxmuu1_4.3.0.dfsg.1-14sarge7_arm.deb oldstable/main/binary-arm/libxv-dev_4.3.0.dfsg.1-14sarge7_arm.deb oldstable/main/binary-arm/xdm_4.3.0.dfsg.1-14sarge7_arm.deb oldstable/main/binary-arm/libxaw6-dev_4.3.0.dfsg.1-14sarge7_arm.deb oldstable/main/binary-arm/libxv1_4.3.0.dfsg.1-14sarge7_arm.deb oldstable/main/binary-arm/libxft1_4.3.0.dfsg.1-14sarge7_arm.deb oldstable/main/binary-arm/libxp-dev_4.3.0.dfsg.1-14sarge7_arm.deb oldstable/main/binary-arm/xlibs-static-dev_4.3.0.dfsg.1-14sarge7_arm.deb oldstable/main/binary-arm/libxrandr2-dbg_4.3.0.dfsg.1-14sarge7_arm.deb oldstable/main/binary-arm/proxymngr_4.3.0.dfsg.1-14sarge7_arm.deb oldstable/main/binary-arm/libxft1-dbg_4.3.0.dfsg.1-14sarge7_arm.deb oldstable/main/binary-arm/libxtrap6_4.3.0.dfsg.1-14sarge7_arm.deb oldstable/main/binary-arm/libx11-6_4.3.0.dfsg.1-14sarge7_arm.deb oldstable/main/binary-arm/libsm6_4.3.0.dfsg.1-14sarge7_arm.deb oldstable/main/binary-arm/xlibmesa-glu-dev_4.3.0.dfsg.1-14sarge7_arm.deb oldstable/main/binary-arm/libxmu-dev_4.3.0.dfsg.1-14sarge7_arm.deb oldstable/main/binary-arm/lbxproxy_4.3.0.dfsg.1-14sarge7_arm.deb oldstable/main/binary-arm/xfs_4.3.0.dfsg.1-14sarge7_arm.deb oldstable/main/binary-arm/xnest_4.3.0.dfsg.1-14sarge7_arm.deb oldstable/main/binary-arm/xserver-xfree86-dbg_4.3.0.dfsg.1-14sarge7_arm.deb oldstable/main/binary-arm/libxi6-dbg_4.3.0.dfsg.1-14sarge7_arm.deb oldstable/main/binary-arm/libxrandr-dev_4.3.0.dfsg.1-14sarge7_arm.deb oldstable/main/binary-arm/libdps-dev_4.3.0.dfsg.1-14sarge7_arm.deb oldstable/main/binary-arm/libsm-dev_4.3.0.dfsg.1-14sarge7_arm.deb oldstable/main/binary-arm/xutils_4.3.0.dfsg.1-14sarge7_arm.deb oldstable/main/binary-arm/libxaw7_4.3.0.dfsg.1-14sarge7_arm.deb oldstable/main/binary-arm/xserver-xfree86_4.3.0.dfsg.1-14sarge7_arm.deb oldstable/main/binary-arm/libx11-dev_4.3.0.dfsg.1-14sarge7_arm.deb oldstable/main/binary-arm/libxi-dev_4.3.0.dfsg.1-14sarge7_arm.deb oldstable/main/binary-arm/libxaw6_4.3.0.dfsg.1-14sarge7_arm.deb oldstable/main/binary-arm/xvfb_4.3.0.dfsg.1-14sarge7_arm.deb oldstable/main/binary-arm/libxaw7-dev_4.3.0.dfsg.1-14sarge7_arm.deb oldstable/main/binary-arm/xfwp_4.3.0.dfsg.1-14sarge7_arm.deb oldstable/main/binary-arm/libxtst-dev_4.3.0.dfsg.1-14sarge7_arm.deb oldstable/main/binary-arm/xlibmesa-glu_4.3.0.dfsg.1-14sarge7_arm.deb oldstable/main/binary-arm/xterm_4.3.0.dfsg.1-14sarge7_arm.deb oldstable/main/binary-arm/libxmuu1-dbg_4.3.0.dfsg.1-14sarge7_arm.deb oldstable/main/binary-arm/libice6_4.3.0.dfsg.1-14sarge7_arm.deb oldstable/main/binary-arm/x-window-system-core_4.3.0.dfsg.1-14sarge7_arm.deb oldstable/main/binary-arm/libdps1-dbg_4.3.0.dfsg.1-14sarge7_arm.deb oldstable/main/binary-arm/libxaw6-dbg_4.3.0.dfsg.1-14sarge7_arm.deb oldstable/main/binary-arm/libxp6_4.3.0.dfsg.1-14sarge7_arm.deb oldstable/main/binary-arm/xlibmesa-gl-dev_4.3.0.dfsg.1-14sarge7_arm.deb oldstable/main/binary-arm/libxrandr2_4.3.0.dfsg.1-14sarge7_arm.deb oldstable/main/binary-arm/x-window-system-dev_4.3.0.dfsg.1-14sarge7_arm.deb oldstable/main/binary-arm/libsm6-dbg_4.3.0.dfsg.1-14sarge7_arm.deb oldstable/main/binary-arm/libice6-dbg_4.3.0.dfsg.1-14sarge7_arm.deb oldstable/main/binary-arm/libxmu6_4.3.0.dfsg.1-14sarge7_arm.deb oldstable/main/binary-arm/libxtrap6-dbg_4.3.0.dfsg.1-14sarge7_arm.deb oldstable/main/binary-arm/libxmu6-dbg_4.3.0.dfsg.1-14sarge7_arm.deb oldstable/main/binary-arm/xlibs-static-pic_4.3.0.dfsg.1-14sarge7_arm.deb oldstable/main/binary-arm/xserver-common_4.3.0.dfsg.1-14sarge7_arm.deb oldstable/main/binary-arm/libxv1-dbg_4.3.0.dfsg.1-14sarge7_arm.deb oldstable/main/binary-arm/libxpm4_4.3.0.dfsg.1-14sarge7_arm.deb oldstable/main/binary-arm/libxt6_4.3.0.dfsg.1-14sarge7_arm.deb oldstable/main/binary-arm/xlibmesa-gl-dbg_4.3.0.dfsg.1-14sarge7_arm.deb oldstable/main/binary-arm/libxt-dev_4.3.0.dfsg.1-14sarge7_arm.deb oldstable/main/binary-arm/libxpm-dev_4.3.0.dfsg.1-14sarge7_arm.deb oldstable/main/binary-arm/libx11-6-dbg_4.3.0.dfsg.1-14sarge7_arm.deb oldstable/main/binary-arm/libxpm4-dbg_4.3.0.dfsg.1-14sarge7_arm.deb oldstable/main/binary-arm/libxtrap-dev_4.3.0.dfsg.1-14sarge7_arm.deb oldstable/main/binary-arm/libxext6_4.3.0.dfsg.1-14sarge7_arm.deb oldstable/main/binary-arm/libice-dev_4.3.0.dfsg.1-14sarge7_arm.deb xfree86 (4.3.0.dfsg.1-14sarge7) oldstable-security; urgency=high * Fix regression introduced in -14sarge6 by the MIT-SHM security patch (closes: #461410). oldstable/main/binary-amd64/libxaw6_4.3.0.dfsg.1-14sarge7_amd64.deb oldstable/main/binary-amd64/libice6-dbg_4.3.0.dfsg.1-14sarge7_amd64.deb oldstable/main/binary-amd64/xfwp_4.3.0.dfsg.1-14sarge7_amd64.deb oldstable/main/binary-amd64/libxmuu1-dbg_4.3.0.dfsg.1-14sarge7_amd64.deb oldstable/main/binary-amd64/libxtrap6-dbg_4.3.0.dfsg.1-14sarge7_amd64.deb oldstable/main/binary-amd64/xvfb_4.3.0.dfsg.1-14sarge7_amd64.deb oldstable/main/binary-amd64/libxrandr2_4.3.0.dfsg.1-14sarge7_amd64.deb oldstable/main/binary-amd64/libx11-dev_4.3.0.dfsg.1-14sarge7_amd64.deb oldstable/main/binary-amd64/libxpm4-dbg_4.3.0.dfsg.1-14sarge7_amd64.deb oldstable/main/binary-amd64/xutils_4.3.0.dfsg.1-14sarge7_amd64.deb oldstable/main/binary-amd64/libxmu6_4.3.0.dfsg.1-14sarge7_amd64.deb oldstable/main/binary-amd64/libx11-6_4.3.0.dfsg.1-14sarge7_amd64.deb oldstable/main/binary-amd64/libxtst-dev_4.3.0.dfsg.1-14sarge7_amd64.deb oldstable/main/binary-amd64/xlibmesa-dri_4.3.0.dfsg.1-14sarge7_amd64.deb oldstable/main/binary-amd64/libxv1-dbg_4.3.0.dfsg.1-14sarge7_amd64.deb oldstable/main/binary-amd64/xbase-clients_4.3.0.dfsg.1-14sarge7_amd64.deb oldstable/main/binary-amd64/libxi6-dbg_4.3.0.dfsg.1-14sarge7_amd64.deb oldstable/main/binary-amd64/x-window-system-core_4.3.0.dfsg.1-14sarge7_amd64.deb oldstable/main/binary-amd64/twm_4.3.0.dfsg.1-14sarge7_amd64.deb oldstable/main/binary-amd64/libxext6-dbg_4.3.0.dfsg.1-14sarge7_amd64.deb oldstable/main/binary-amd64/libxft1-dbg_4.3.0.dfsg.1-14sarge7_amd64.deb oldstable/main/binary-amd64/xlibmesa-glu-dbg_4.3.0.dfsg.1-14sarge7_amd64.deb oldstable/main/binary-amd64/xlibosmesa-dev_4.3.0.dfsg.1-14sarge7_amd64.deb oldstable/main/binary-amd64/libsm6_4.3.0.dfsg.1-14sarge7_amd64.deb oldstable/main/binary-amd64/libx11-6-dbg_4.3.0.dfsg.1-14sarge7_amd64.deb oldstable/main/binary-amd64/x-window-system-dev_4.3.0.dfsg.1-14sarge7_amd64.deb oldstable/main/binary-amd64/libxp-dev_4.3.0.dfsg.1-14sarge7_amd64.deb oldstable/main/binary-amd64/libxpm4_4.3.0.dfsg.1-14sarge7_amd64.deb oldstable/main/binary-amd64/libxi6_4.3.0.dfsg.1-14sarge7_amd64.deb oldstable/main/binary-amd64/libxft1_4.3.0.dfsg.1-14sarge7_amd64.deb oldstable/main/binary-amd64/xlibosmesa4_4.3.0.dfsg.1-14sarge7_amd64.deb oldstable/main/binary-amd64/xlibmesa-dri-dbg_4.3.0.dfsg.1-14sarge7_amd64.deb oldstable/main/binary-amd64/xnest_4.3.0.dfsg.1-14sarge7_amd64.deb oldstable/main/binary-amd64/xlibosmesa4-dbg_4.3.0.dfsg.1-14sarge7_amd64.deb oldstable/main/binary-amd64/libxext-dev_4.3.0.dfsg.1-14sarge7_amd64.deb oldstable/main/binary-amd64/xlibmesa-glu-dev_4.3.0.dfsg.1-14sarge7_amd64.deb oldstable/main/binary-amd64/libxext6_4.3.0.dfsg.1-14sarge7_amd64.deb oldstable/main/binary-amd64/libxrandr-dev_4.3.0.dfsg.1-14sarge7_amd64.deb oldstable/main/binary-amd64/libsm6-dbg_4.3.0.dfsg.1-14sarge7_amd64.deb oldstable/main/binary-amd64/libice-dev_4.3.0.dfsg.1-14sarge7_amd64.deb oldstable/main/binary-amd64/libxtrap-dev_4.3.0.dfsg.1-14sarge7_amd64.deb oldstable/main/binary-amd64/xdm_4.3.0.dfsg.1-14sarge7_amd64.deb oldstable/main/binary-amd64/libice6_4.3.0.dfsg.1-14sarge7_amd64.deb oldstable/main/binary-amd64/libxtrap6_4.3.0.dfsg.1-14sarge7_amd64.deb oldstable/main/binary-amd64/xmh_4.3.0.dfsg.1-14sarge7_amd64.deb oldstable/main/binary-amd64/libsm-dev_4.3.0.dfsg.1-14sarge7_amd64.deb oldstable/main/binary-amd64/libxv-dev_4.3.0.dfsg.1-14sarge7_amd64.deb oldstable/main/binary-amd64/libxt-dev_4.3.0.dfsg.1-14sarge7_amd64.deb oldstable/main/binary-amd64/xlibmesa-glu_4.3.0.dfsg.1-14sarge7_amd64.deb oldstable/main/binary-amd64/libxaw7_4.3.0.dfsg.1-14sarge7_amd64.deb oldstable/main/binary-amd64/lbxproxy_4.3.0.dfsg.1-14sarge7_amd64.deb oldstable/main/binary-amd64/libxmuu1_4.3.0.dfsg.1-14sarge7_amd64.deb oldstable/main/binary-amd64/libxaw6-dev_4.3.0.dfsg.1-14sarge7_amd64.deb oldstable/main/binary-amd64/libdps1-dbg_4.3.0.dfsg.1-14sarge7_amd64.deb oldstable/main/binary-amd64/xserver-xfree86-dbg_4.3.0.dfsg.1-14sarge7_amd64.deb oldstable/main/binary-amd64/xserver-common_4.3.0.dfsg.1-14sarge7_amd64.deb oldstable/main/binary-amd64/libxp6-dbg_4.3.0.dfsg.1-14sarge7_amd64.deb oldstable/main/binary-amd64/libxt6_4.3.0.dfsg.1-14sarge7_amd64.deb oldstable/main/binary-amd64/libxt6-dbg_4.3.0.dfsg.1-14sarge7_amd64.deb oldstable/main/binary-amd64/libxaw7-dbg_4.3.0.dfsg.1-14sarge7_amd64.deb oldstable/main/binary-amd64/libxi-dev_4.3.0.dfsg.1-14sarge7_amd64.deb oldstable/main/binary-amd64/libdps-dev_4.3.0.dfsg.1-14sarge7_amd64.deb oldstable/main/binary-amd64/libxmu6-dbg_4.3.0.dfsg.1-14sarge7_amd64.deb oldstable/main/binary-amd64/libxpm-dev_4.3.0.dfsg.1-14sarge7_amd64.deb oldstable/main/binary-amd64/xlibmesa3_4.3.0.dfsg.1-14sarge7_amd64.deb oldstable/main/binary-amd64/xlibs-static-pic_4.3.0.dfsg.1-14sarge7_amd64.deb oldstable/main/binary-amd64/libxaw7-dev_4.3.0.dfsg.1-14sarge7_amd64.deb oldstable/main/binary-amd64/libxrandr2-dbg_4.3.0.dfsg.1-14sarge7_amd64.deb oldstable/main/binary-amd64/xfs_4.3.0.dfsg.1-14sarge7_amd64.deb oldstable/main/binary-amd64/xlibmesa-gl-dbg_4.3.0.dfsg.1-14sarge7_amd64.deb oldstable/main/binary-amd64/xlibs-static-dev_4.3.0.dfsg.1-14sarge7_amd64.deb oldstable/main/binary-amd64/proxymngr_4.3.0.dfsg.1-14sarge7_amd64.deb oldstable/main/binary-amd64/libxtst6_4.3.0.dfsg.1-14sarge7_amd64.deb oldstable/main/binary-amd64/libxp6_4.3.0.dfsg.1-14sarge7_amd64.deb oldstable/main/binary-amd64/xlibmesa-gl_4.3.0.dfsg.1-14sarge7_amd64.deb oldstable/main/binary-amd64/libxtst6-dbg_4.3.0.dfsg.1-14sarge7_amd64.deb oldstable/main/binary-amd64/libxaw6-dbg_4.3.0.dfsg.1-14sarge7_amd64.deb oldstable/main/binary-amd64/xlibmesa-gl-dev_4.3.0.dfsg.1-14sarge7_amd64.deb oldstable/main/binary-amd64/libxmuu-dev_4.3.0.dfsg.1-14sarge7_amd64.deb oldstable/main/binary-amd64/libxv1_4.3.0.dfsg.1-14sarge7_amd64.deb oldstable/main/binary-amd64/libxmu-dev_4.3.0.dfsg.1-14sarge7_amd64.deb oldstable/main/binary-amd64/libdps1_4.3.0.dfsg.1-14sarge7_amd64.deb oldstable/main/binary-amd64/xterm_4.3.0.dfsg.1-14sarge7_amd64.deb oldstable/main/binary-amd64/xserver-xfree86_4.3.0.dfsg.1-14sarge7_amd64.deb xfree86 (4.3.0.dfsg.1-14sarge7) oldstable-security; urgency=high * Fix regression introduced in -14sarge6 by the MIT-SHM security patch (closes: #461410). oldstable/main/binary-alpha/libxft1-dbg_4.3.0.dfsg.1-14sarge7_alpha.deb oldstable/main/binary-alpha/libx11-6-dbg_4.3.0.dfsg.1-14sarge7_alpha.deb oldstable/main/binary-alpha/xnest_4.3.0.dfsg.1-14sarge7_alpha.deb oldstable/main/binary-alpha/xfwp_4.3.0.dfsg.1-14sarge7_alpha.deb oldstable/main/binary-alpha/xlibmesa-dri-dbg_4.3.0.dfsg.1-14sarge7_alpha.deb oldstable/main/binary-alpha/libxrandr-dev_4.3.0.dfsg.1-14sarge7_alpha.deb oldstable/main/binary-alpha/libxaw6-dev_4.3.0.dfsg.1-14sarge7_alpha.deb oldstable/main/binary-alpha/libxt6-dbg_4.3.0.dfsg.1-14sarge7_alpha.deb oldstable/main/binary-alpha/libdps-dev_4.3.0.dfsg.1-14sarge7_alpha.deb oldstable/main/binary-alpha/libxaw7-dev_4.3.0.dfsg.1-14sarge7_alpha.deb oldstable/main/binary-alpha/libxtst6_4.3.0.dfsg.1-14sarge7_alpha.deb oldstable/main/binary-alpha/xvfb_4.3.0.dfsg.1-14sarge7_alpha.deb oldstable/main/binary-alpha/libsm6_4.3.0.dfsg.1-14sarge7_alpha.deb oldstable/main/binary-alpha/libxtst-dev_4.3.0.dfsg.1-14sarge7_alpha.deb oldstable/main/binary-alpha/libdps1_4.3.0.dfsg.1-14sarge7_alpha.deb oldstable/main/binary-alpha/xlibmesa-glu_4.3.0.dfsg.1-14sarge7_alpha.deb oldstable/main/binary-alpha/libxmu6-dbg_4.3.0.dfsg.1-14sarge7_alpha.deb oldstable/main/binary-alpha/xlibmesa-gl_4.3.0.dfsg.1-14sarge7_alpha.deb oldstable/main/binary-alpha/xdm_4.3.0.dfsg.1-14sarge7_alpha.deb oldstable/main/binary-alpha/xutils_4.3.0.dfsg.1-14sarge7_alpha.deb oldstable/main/binary-alpha/libxext6-dbg_4.3.0.dfsg.1-14sarge7_alpha.deb oldstable/main/binary-alpha/libx11-dev_4.3.0.dfsg.1-14sarge7_alpha.deb oldstable/main/binary-alpha/libxv1_4.3.0.dfsg.1-14sarge7_alpha.deb oldstable/main/binary-alpha/libxrandr2-dbg_4.3.0.dfsg.1-14sarge7_alpha.deb oldstable/main/binary-alpha/libxaw6-dbg_4.3.0.dfsg.1-14sarge7_alpha.deb oldstable/main/binary-alpha/libxaw6_4.3.0.dfsg.1-14sarge7_alpha.deb oldstable/main/binary-alpha/xfs_4.3.0.dfsg.1-14sarge7_alpha.deb oldstable/main/binary-alpha/libx11-6_4.3.0.dfsg.1-14sarge7_alpha.deb oldstable/main/binary-alpha/libxtrap6-dbg_4.3.0.dfsg.1-14sarge7_alpha.deb oldstable/main/binary-alpha/libice6-dbg_4.3.0.dfsg.1-14sarge7_alpha.deb oldstable/main/binary-alpha/libsm-dev_4.3.0.dfsg.1-14sarge7_alpha.deb oldstable/main/binary-alpha/xterm_4.3.0.dfsg.1-14sarge7_alpha.deb oldstable/main/binary-alpha/libxv1-dbg_4.3.0.dfsg.1-14sarge7_alpha.deb oldstable/main/binary-alpha/libdps1-dbg_4.3.0.dfsg.1-14sarge7_alpha.deb oldstable/main/binary-alpha/libxp6_4.3.0.dfsg.1-14sarge7_alpha.deb oldstable/main/binary-alpha/xlibmesa-gl-dbg_4.3.0.dfsg.1-14sarge7_alpha.deb oldstable/main/binary-alpha/libxp6-dbg_4.3.0.dfsg.1-14sarge7_alpha.deb oldstable/main/binary-alpha/libxrandr2_4.3.0.dfsg.1-14sarge7_alpha.deb oldstable/main/binary-alpha/libice-dev_4.3.0.dfsg.1-14sarge7_alpha.deb oldstable/main/binary-alpha/libxtrap-dev_4.3.0.dfsg.1-14sarge7_alpha.deb oldstable/main/binary-alpha/libxmuu1-dbg_4.3.0.dfsg.1-14sarge7_alpha.deb oldstable/main/binary-alpha/libxt-dev_4.3.0.dfsg.1-14sarge7_alpha.deb oldstable/main/binary-alpha/xbase-clients_4.3.0.dfsg.1-14sarge7_alpha.deb oldstable/main/binary-alpha/libxpm4_4.3.0.dfsg.1-14sarge7_alpha.deb oldstable/main/binary-alpha/libxi-dev_4.3.0.dfsg.1-14sarge7_alpha.deb oldstable/main/binary-alpha/libice6_4.3.0.dfsg.1-14sarge7_alpha.deb oldstable/main/binary-alpha/xlibmesa-glu-dbg_4.3.0.dfsg.1-14sarge7_alpha.deb oldstable/main/binary-alpha/libxtrap6_4.3.0.dfsg.1-14sarge7_alpha.deb oldstable/main/binary-alpha/x-window-system-core_4.3.0.dfsg.1-14sarge7_alpha.deb oldstable/main/binary-alpha/x-window-system-dev_4.3.0.dfsg.1-14sarge7_alpha.deb oldstable/main/binary-alpha/xlibosmesa-dev_4.3.0.dfsg.1-14sarge7_alpha.deb oldstable/main/binary-alpha/libxft1_4.3.0.dfsg.1-14sarge7_alpha.deb oldstable/main/binary-alpha/libxmuu-dev_4.3.0.dfsg.1-14sarge7_alpha.deb oldstable/main/binary-alpha/twm_4.3.0.dfsg.1-14sarge7_alpha.deb oldstable/main/binary-alpha/libxi6-dbg_4.3.0.dfsg.1-14sarge7_alpha.deb oldstable/main/binary-alpha/xlibmesa-gl-dev_4.3.0.dfsg.1-14sarge7_alpha.deb oldstable/main/binary-alpha/libxmu-dev_4.3.0.dfsg.1-14sarge7_alpha.deb oldstable/main/binary-alpha/libxext6_4.3.0.dfsg.1-14sarge7_alpha.deb oldstable/main/binary-alpha/libxpm4-dbg_4.3.0.dfsg.1-14sarge7_alpha.deb oldstable/main/binary-alpha/libxi6_4.3.0.dfsg.1-14sarge7_alpha.deb oldstable/main/binary-alpha/libxp-dev_4.3.0.dfsg.1-14sarge7_alpha.deb oldstable/main/binary-alpha/xlibosmesa4-dbg_4.3.0.dfsg.1-14sarge7_alpha.deb oldstable/main/binary-alpha/xlibosmesa4_4.3.0.dfsg.1-14sarge7_alpha.deb oldstable/main/binary-alpha/libxtst6-dbg_4.3.0.dfsg.1-14sarge7_alpha.deb oldstable/main/binary-alpha/libxmu6_4.3.0.dfsg.1-14sarge7_alpha.deb oldstable/main/binary-alpha/libxaw7-dbg_4.3.0.dfsg.1-14sarge7_alpha.deb oldstable/main/binary-alpha/libxv-dev_4.3.0.dfsg.1-14sarge7_alpha.deb oldstable/main/binary-alpha/xlibmesa-glu-dev_4.3.0.dfsg.1-14sarge7_alpha.deb oldstable/main/binary-alpha/xlibs-static-dev_4.3.0.dfsg.1-14sarge7_alpha.deb oldstable/main/binary-alpha/libxt6_4.3.0.dfsg.1-14sarge7_alpha.deb oldstable/main/binary-alpha/xmh_4.3.0.dfsg.1-14sarge7_alpha.deb oldstable/main/binary-alpha/libxext-dev_4.3.0.dfsg.1-14sarge7_alpha.deb oldstable/main/binary-alpha/libxaw7_4.3.0.dfsg.1-14sarge7_alpha.deb oldstable/main/binary-alpha/xserver-xfree86-dbg_4.3.0.dfsg.1-14sarge7_alpha.deb oldstable/main/binary-alpha/xlibs-static-pic_4.3.0.dfsg.1-14sarge7_alpha.deb oldstable/main/binary-alpha/lbxproxy_4.3.0.dfsg.1-14sarge7_alpha.deb oldstable/main/binary-alpha/xserver-common_4.3.0.dfsg.1-14sarge7_alpha.deb oldstable/main/binary-alpha/proxymngr_4.3.0.dfsg.1-14sarge7_alpha.deb oldstable/main/binary-alpha/libsm6-dbg_4.3.0.dfsg.1-14sarge7_alpha.deb oldstable/main/binary-alpha/xlibmesa-dri_4.3.0.dfsg.1-14sarge7_alpha.deb oldstable/main/binary-alpha/libxpm-dev_4.3.0.dfsg.1-14sarge7_alpha.deb oldstable/main/binary-alpha/xserver-xfree86_4.3.0.dfsg.1-14sarge7_alpha.deb oldstable/main/binary-alpha/xlibmesa3_4.3.0.dfsg.1-14sarge7_alpha.deb oldstable/main/binary-alpha/libxmuu1_4.3.0.dfsg.1-14sarge7_alpha.deb xfree86 (4.3.0.dfsg.1-14sarge7) oldstable-security; urgency=high * Fix regression introduced in -14sarge6 by the MIT-SHM security patch (closes: #461410). oldstable/main/binary-i386/libxmuu-dev_4.3.0.dfsg.1-14sarge7_i386.deb oldstable/main/binary-i386/libxtst6-dbg_4.3.0.dfsg.1-14sarge7_i386.deb oldstable/main/binary-i386/libice6-dbg_4.3.0.dfsg.1-14sarge7_i386.deb oldstable/main/binary-i386/libxp6_4.3.0.dfsg.1-14sarge7_i386.deb oldstable/main/binary-all/xfree86-common_4.3.0.dfsg.1-14sarge7_all.deb oldstable/main/binary-i386/libxtrap6_4.3.0.dfsg.1-14sarge7_i386.deb oldstable/main/binary-i386/libxtrap6-dbg_4.3.0.dfsg.1-14sarge7_i386.deb oldstable/main/binary-all/xlibs_4.3.0.dfsg.1-14sarge7_all.deb oldstable/main/binary-i386/libsm6-dbg_4.3.0.dfsg.1-14sarge7_i386.deb oldstable/main/binary-i386/libxrandr2_4.3.0.dfsg.1-14sarge7_i386.deb oldstable/main/binary-i386/libxmu-dev_4.3.0.dfsg.1-14sarge7_i386.deb oldstable/main/binary-i386/libxaw7-dbg_4.3.0.dfsg.1-14sarge7_i386.deb oldstable/main/binary-i386/libxpm4_4.3.0.dfsg.1-14sarge7_i386.deb oldstable/main/binary-i386/libxmuu1-dbg_4.3.0.dfsg.1-14sarge7_i386.deb oldstable/main/binary-i386/libxv1_4.3.0.dfsg.1-14sarge7_i386.deb oldstable/main/binary-i386/xserver-xfree86_4.3.0.dfsg.1-14sarge7_i386.deb oldstable/main/binary-i386/libxv1-dbg_4.3.0.dfsg.1-14sarge7_i386.deb oldstable/main/binary-i386/libxaw6-dev_4.3.0.dfsg.1-14sarge7_i386.deb oldstable/main/binary-i386/libx11-6-dbg_4.3.0.dfsg.1-14sarge7_i386.deb oldstable/main/binary-i386/libxaw6_4.3.0.dfsg.1-14sarge7_i386.deb oldstable/main/binary-i386/libxmu6_4.3.0.dfsg.1-14sarge7_i386.deb oldstable/main/binary-i386/xfwp_4.3.0.dfsg.1-14sarge7_i386.deb oldstable/main/binary-all/xfonts-base_4.3.0.dfsg.1-14sarge7_all.deb oldstable/main/binary-i386/libx11-dev_4.3.0.dfsg.1-14sarge7_i386.deb oldstable/main/binary-all/xlibmesa3-dbg_4.3.0.dfsg.1-14sarge7_all.deb oldstable/main/binary-all/xfonts-75dpi_4.3.0.dfsg.1-14sarge7_all.deb oldstable/main/binary-i386/xutils_4.3.0.dfsg.1-14sarge7_i386.deb oldstable/main/binary-all/x-window-system_4.3.0.dfsg.1-14sarge7_all.deb oldstable/main/binary-i386/proxymngr_4.3.0.dfsg.1-14sarge7_i386.deb oldstable/main/binary-i386/xlibmesa-gl-dbg_4.3.0.dfsg.1-14sarge7_i386.deb oldstable/main/binary-all/xlibs-dbg_4.3.0.dfsg.1-14sarge7_all.deb oldstable/main/binary-all/xfonts-base-transcoded_4.3.0.dfsg.1-14sarge7_all.deb oldstable/main/binary-i386/libxi-dev_4.3.0.dfsg.1-14sarge7_i386.deb oldstable/main/binary-i386/libdps-dev_4.3.0.dfsg.1-14sarge7_i386.deb oldstable/main/binary-i386/libxt6-dbg_4.3.0.dfsg.1-14sarge7_i386.deb oldstable/main/binary-i386/libxrandr2-dbg_4.3.0.dfsg.1-14sarge7_i386.deb oldstable/main/binary-i386/libxmuu1_4.3.0.dfsg.1-14sarge7_i386.deb oldstable/main/binary-i386/libdps1-dbg_4.3.0.dfsg.1-14sarge7_i386.deb oldstable/main/binary-i386/xserver-xfree86-dbg_4.3.0.dfsg.1-14sarge7_i386.deb oldstable/main/binary-i386/libxp6-dbg_4.3.0.dfsg.1-14sarge7_i386.deb oldstable/main/binary-i386/xnest_4.3.0.dfsg.1-14sarge7_i386.deb oldstable/main/binary-i386/libxext6_4.3.0.dfsg.1-14sarge7_i386.deb oldstable/main/binary-all/xfonts-scalable_4.3.0.dfsg.1-14sarge7_all.deb oldstable/main/binary-i386/libxt6_4.3.0.dfsg.1-14sarge7_i386.deb oldstable/main/binary-i386/libxrandr-dev_4.3.0.dfsg.1-14sarge7_i386.deb oldstable/main/binary-i386/libxpm-dev_4.3.0.dfsg.1-14sarge7_i386.deb oldstable/main/binary-all/xlibs-data_4.3.0.dfsg.1-14sarge7_all.deb oldstable/main/binary-i386/libxi6_4.3.0.dfsg.1-14sarge7_i386.deb oldstable/main/binary-i386/libxmu6-dbg_4.3.0.dfsg.1-14sarge7_i386.deb oldstable/main/binary-i386/xdm_4.3.0.dfsg.1-14sarge7_i386.deb oldstable/main/binary-i386/xterm_4.3.0.dfsg.1-14sarge7_i386.deb oldstable/main/binary-i386/xlibmesa-gl-dev_4.3.0.dfsg.1-14sarge7_i386.deb oldstable/main/binary-all/x-dev_4.3.0.dfsg.1-14sarge7_all.deb oldstable/main/binary-all/pm-dev_4.3.0.dfsg.1-14sarge7_all.deb oldstable/main/binary-i386/xlibmesa-glu-dev_4.3.0.dfsg.1-14sarge7_i386.deb oldstable/main/binary-i386/libxaw7_4.3.0.dfsg.1-14sarge7_i386.deb oldstable/main/binary-all/xlibs-pic_4.3.0.dfsg.1-14sarge7_all.deb oldstable/main/binary-all/xfonts-75dpi-transcoded_4.3.0.dfsg.1-14sarge7_all.deb oldstable/main/binary-i386/xlibosmesa4_4.3.0.dfsg.1-14sarge7_i386.deb oldstable/main/binary-all/xfonts-100dpi_4.3.0.dfsg.1-14sarge7_all.deb oldstable/main/binary-i386/libdps1_4.3.0.dfsg.1-14sarge7_i386.deb oldstable/main/source/xfree86_4.3.0.dfsg.1-14sarge7.dsc oldstable/main/binary-i386/xlibs-static-dev_4.3.0.dfsg.1-14sarge7_i386.deb oldstable/main/binary-i386/libsm-dev_4.3.0.dfsg.1-14sarge7_i386.deb oldstable/main/binary-i386/libsm6_4.3.0.dfsg.1-14sarge7_i386.deb oldstable/main/binary-i386/libxv-dev_4.3.0.dfsg.1-14sarge7_i386.deb oldstable/main/binary-i386/libice-dev_4.3.0.dfsg.1-14sarge7_i386.deb oldstable/main/binary-i386/libxtrap-dev_4.3.0.dfsg.1-14sarge7_i386.deb oldstable/main/binary-i386/libxt-dev_4.3.0.dfsg.1-14sarge7_i386.deb oldstable/main/binary-i386/libxpm4-dbg_4.3.0.dfsg.1-14sarge7_i386.deb oldstable/main/binary-i386/lbxproxy_4.3.0.dfsg.1-14sarge7_i386.deb oldstable/main/binary-i386/xmh_4.3.0.dfsg.1-14sarge7_i386.deb oldstable/main/binary-i386/libxtst6_4.3.0.dfsg.1-14sarge7_i386.deb oldstable/main/binary-i386/xvfb_4.3.0.dfsg.1-14sarge7_i386.deb oldstable/main/source/xfree86_4.3.0.dfsg.1-14sarge7.diff.gz oldstable/main/binary-i386/libxi6-dbg_4.3.0.dfsg.1-14sarge7_i386.deb oldstable/main/binary-all/xspecs_4.3.0.dfsg.1-14sarge7_all.deb oldstable/main/binary-i386/libx11-6_4.3.0.dfsg.1-14sarge7_i386.deb oldstable/main/binary-i386/xbase-clients_4.3.0.dfsg.1-14sarge7_i386.deb oldstable/main/binary-i386/xfs_4.3.0.dfsg.1-14sarge7_i386.deb oldstable/main/binary-i386/xlibmesa-glu-dbg_4.3.0.dfsg.1-14sarge7_i386.deb oldstable/main/binary-i386/libxft1_4.3.0.dfsg.1-14sarge7_i386.deb oldstable/main/binary-i386/xserver-common_4.3.0.dfsg.1-14sarge7_i386.deb oldstable/main/binary-all/xlibs-dev_4.3.0.dfsg.1-14sarge7_all.deb oldstable/main/binary-i386/xlibs-static-pic_4.3.0.dfsg.1-14sarge7_i386.deb oldstable/main/binary-i386/libxext6-dbg_4.3.0.dfsg.1-14sarge7_i386.deb oldstable/main/binary-i386/xlibosmesa-dev_4.3.0.dfsg.1-14sarge7_i386.deb oldstable/main/binary-i386/twm_4.3.0.dfsg.1-14sarge7_i386.deb oldstable/main/binary-i386/x-window-system-core_4.3.0.dfsg.1-14sarge7_i386.deb oldstable/main/binary-i386/libxft1-dbg_4.3.0.dfsg.1-14sarge7_i386.deb oldstable/main/binary-i386/xlibmesa3_4.3.0.dfsg.1-14sarge7_i386.deb oldstable/main/binary-i386/xlibmesa-dri-dbg_4.3.0.dfsg.1-14sarge7_i386.deb oldstable/main/binary-all/xfonts-100dpi-transcoded_4.3.0.dfsg.1-14sarge7_all.deb oldstable/main/binary-i386/libice6_4.3.0.dfsg.1-14sarge7_i386.deb oldstable/main/binary-i386/libxaw6-dbg_4.3.0.dfsg.1-14sarge7_i386.deb oldstable/main/binary-i386/xlibosmesa4-dbg_4.3.0.dfsg.1-14sarge7_i386.deb oldstable/main/binary-all/xfonts-cyrillic_4.3.0.dfsg.1-14sarge7_all.deb oldstable/main/binary-i386/libxp-dev_4.3.0.dfsg.1-14sarge7_i386.deb oldstable/main/binary-i386/x-window-system-dev_4.3.0.dfsg.1-14sarge7_i386.deb oldstable/main/binary-i386/libxext-dev_4.3.0.dfsg.1-14sarge7_i386.deb oldstable/main/binary-i386/xlibmesa-gl_4.3.0.dfsg.1-14sarge7_i386.deb oldstable/main/binary-all/xlibmesa-dev_4.3.0.dfsg.1-14sarge7_all.deb oldstable/main/binary-i386/libxaw7-dev_4.3.0.dfsg.1-14sarge7_i386.deb oldstable/main/binary-i386/libxtst-dev_4.3.0.dfsg.1-14sarge7_i386.deb oldstable/main/binary-i386/xlibmesa-glu_4.3.0.dfsg.1-14sarge7_i386.deb oldstable/main/binary-i386/xlibmesa-dri_4.3.0.dfsg.1-14sarge7_i386.deb xfree86 (4.3.0.dfsg.1-14sarge7) oldstable-security; urgency=high * Fix regression introduced in -14sarge6 by the MIT-SHM security patch (closes: #461410). oldstable/main/binary-sparc/wzdftpd-back-mysql_0.5.2-1.1sarge3_sparc.deb oldstable/main/binary-sparc/wzdftpd_0.5.2-1.1sarge3_sparc.deb oldstable/main/binary-sparc/wzdftpd-mod-perl_0.5.2-1.1sarge3_sparc.deb oldstable/main/binary-sparc/wzdftpd-mod-tcl_0.5.2-1.1sarge3_sparc.deb oldstable/main/binary-sparc/wzdftpd-dev_0.5.2-1.1sarge3_sparc.deb wzdftpd (0.5.2-1.1sarge3) oldstable-security; urgency=high * Non-maintainer upload by the security team * Backport patch to fix off-by-one in wzd_ClientThread.c which leads to a remote denial of service vulnerability Fixes: CVE-2007-5300 oldstable/main/binary-s390/wzdftpd-back-mysql_0.5.2-1.1sarge3_s390.deb oldstable/main/binary-s390/wzdftpd-mod-perl_0.5.2-1.1sarge3_s390.deb oldstable/main/binary-s390/wzdftpd-dev_0.5.2-1.1sarge3_s390.deb oldstable/main/binary-s390/wzdftpd-mod-tcl_0.5.2-1.1sarge3_s390.deb oldstable/main/binary-s390/wzdftpd_0.5.2-1.1sarge3_s390.deb wzdftpd (0.5.2-1.1sarge3) oldstable-security; urgency=high * Non-maintainer upload by the security team * Backport patch to fix off-by-one in wzd_ClientThread.c which leads to a remote denial of service vulnerability Fixes: CVE-2007-5300 oldstable/main/binary-powerpc/wzdftpd_0.5.2-1.1sarge3_powerpc.deb oldstable/main/binary-powerpc/wzdftpd-mod-perl_0.5.2-1.1sarge3_powerpc.deb oldstable/main/binary-powerpc/wzdftpd-mod-tcl_0.5.2-1.1sarge3_powerpc.deb oldstable/main/binary-powerpc/wzdftpd-dev_0.5.2-1.1sarge3_powerpc.deb oldstable/main/binary-powerpc/wzdftpd-back-mysql_0.5.2-1.1sarge3_powerpc.deb wzdftpd (0.5.2-1.1sarge3) oldstable-security; urgency=high * Non-maintainer upload by the security team * Backport patch to fix off-by-one in wzd_ClientThread.c which leads to a remote denial of service vulnerability Fixes: CVE-2007-5300 oldstable/main/binary-mipsel/wzdftpd-mod-tcl_0.5.2-1.1sarge3_mipsel.deb oldstable/main/binary-mipsel/wzdftpd-back-mysql_0.5.2-1.1sarge3_mipsel.deb oldstable/main/binary-mipsel/wzdftpd_0.5.2-1.1sarge3_mipsel.deb oldstable/main/binary-mipsel/wzdftpd-dev_0.5.2-1.1sarge3_mipsel.deb oldstable/main/binary-mipsel/wzdftpd-mod-perl_0.5.2-1.1sarge3_mipsel.deb wzdftpd (0.5.2-1.1sarge3) oldstable-security; urgency=high * Non-maintainer upload by the security team * Backport patch to fix off-by-one in wzd_ClientThread.c which leads to a remote denial of service vulnerability Fixes: CVE-2007-5300 oldstable/main/binary-mips/wzdftpd-back-mysql_0.5.2-1.1sarge3_mips.deb oldstable/main/binary-mips/wzdftpd-mod-tcl_0.5.2-1.1sarge3_mips.deb oldstable/main/binary-mips/wzdftpd-mod-perl_0.5.2-1.1sarge3_mips.deb oldstable/main/binary-mips/wzdftpd_0.5.2-1.1sarge3_mips.deb oldstable/main/binary-mips/wzdftpd-dev_0.5.2-1.1sarge3_mips.deb wzdftpd (0.5.2-1.1sarge3) oldstable-security; urgency=high * Non-maintainer upload by the security team * Backport patch to fix off-by-one in wzd_ClientThread.c which leads to a remote denial of service vulnerability Fixes: CVE-2007-5300 oldstable/main/binary-m68k/wzdftpd-back-mysql_0.5.2-1.1sarge3_m68k.deb oldstable/main/binary-m68k/wzdftpd-mod-tcl_0.5.2-1.1sarge3_m68k.deb oldstable/main/binary-m68k/wzdftpd-dev_0.5.2-1.1sarge3_m68k.deb oldstable/main/binary-m68k/wzdftpd_0.5.2-1.1sarge3_m68k.deb oldstable/main/binary-m68k/wzdftpd-mod-perl_0.5.2-1.1sarge3_m68k.deb wzdftpd (0.5.2-1.1sarge3) oldstable-security; urgency=high * Non-maintainer upload by the security team * Backport patch to fix off-by-one in wzd_ClientThread.c which leads to a remote denial of service vulnerability Fixes: CVE-2007-5300 oldstable/main/binary-ia64/wzdftpd-dev_0.5.2-1.1sarge3_ia64.deb oldstable/main/binary-ia64/wzdftpd_0.5.2-1.1sarge3_ia64.deb oldstable/main/binary-ia64/wzdftpd-mod-tcl_0.5.2-1.1sarge3_ia64.deb oldstable/main/binary-ia64/wzdftpd-back-mysql_0.5.2-1.1sarge3_ia64.deb oldstable/main/binary-ia64/wzdftpd-mod-perl_0.5.2-1.1sarge3_ia64.deb wzdftpd (0.5.2-1.1sarge3) oldstable-security; urgency=high * Non-maintainer upload by the security team * Backport patch to fix off-by-one in wzd_ClientThread.c which leads to a remote denial of service vulnerability Fixes: CVE-2007-5300 oldstable/main/binary-hppa/wzdftpd-back-mysql_0.5.2-1.1sarge3_hppa.deb oldstable/main/binary-hppa/wzdftpd-dev_0.5.2-1.1sarge3_hppa.deb oldstable/main/binary-hppa/wzdftpd_0.5.2-1.1sarge3_hppa.deb oldstable/main/binary-hppa/wzdftpd-mod-perl_0.5.2-1.1sarge3_hppa.deb oldstable/main/binary-hppa/wzdftpd-mod-tcl_0.5.2-1.1sarge3_hppa.deb wzdftpd (0.5.2-1.1sarge3) oldstable-security; urgency=high * Non-maintainer upload by the security team * Backport patch to fix off-by-one in wzd_ClientThread.c which leads to a remote denial of service vulnerability Fixes: CVE-2007-5300 oldstable/main/binary-arm/wzdftpd-back-mysql_0.5.2-1.1sarge3_arm.deb oldstable/main/binary-arm/wzdftpd-dev_0.5.2-1.1sarge3_arm.deb oldstable/main/binary-arm/wzdftpd-mod-tcl_0.5.2-1.1sarge3_arm.deb oldstable/main/binary-arm/wzdftpd-mod-perl_0.5.2-1.1sarge3_arm.deb oldstable/main/binary-arm/wzdftpd_0.5.2-1.1sarge3_arm.deb wzdftpd (0.5.2-1.1sarge3) oldstable-security; urgency=high * Non-maintainer upload by the security team * Backport patch to fix off-by-one in wzd_ClientThread.c which leads to a remote denial of service vulnerability Fixes: CVE-2007-5300 oldstable/main/binary-amd64/wzdftpd-mod-perl_0.5.2-1.1sarge3_amd64.deb oldstable/main/binary-amd64/wzdftpd-dev_0.5.2-1.1sarge3_amd64.deb oldstable/main/binary-amd64/wzdftpd_0.5.2-1.1sarge3_amd64.deb oldstable/main/binary-amd64/wzdftpd-mod-tcl_0.5.2-1.1sarge3_amd64.deb oldstable/main/binary-amd64/wzdftpd-back-mysql_0.5.2-1.1sarge3_amd64.deb wzdftpd (0.5.2-1.1sarge3) oldstable-security; urgency=high * Non-maintainer upload by the security team * Backport patch to fix off-by-one in wzd_ClientThread.c which leads to a remote denial of service vulnerability Fixes: CVE-2007-5300 oldstable/main/binary-alpha/wzdftpd-dev_0.5.2-1.1sarge3_alpha.deb oldstable/main/binary-alpha/wzdftpd-back-mysql_0.5.2-1.1sarge3_alpha.deb oldstable/main/binary-alpha/wzdftpd-mod-perl_0.5.2-1.1sarge3_alpha.deb oldstable/main/binary-alpha/wzdftpd_0.5.2-1.1sarge3_alpha.deb oldstable/main/binary-alpha/wzdftpd-mod-tcl_0.5.2-1.1sarge3_alpha.deb wzdftpd (0.5.2-1.1sarge3) oldstable-security; urgency=high * Non-maintainer upload by the security team * Backport patch to fix off-by-one in wzd_ClientThread.c which leads to a remote denial of service vulnerability Fixes: CVE-2007-5300 oldstable/main/binary-i386/wzdftpd_0.5.2-1.1sarge3_i386.deb oldstable/main/source/wzdftpd_0.5.2-1.1sarge3.diff.gz oldstable/main/binary-i386/wzdftpd-mod-tcl_0.5.2-1.1sarge3_i386.deb oldstable/main/binary-i386/wzdftpd-mod-perl_0.5.2-1.1sarge3_i386.deb oldstable/main/binary-i386/wzdftpd-dev_0.5.2-1.1sarge3_i386.deb oldstable/main/binary-i386/wzdftpd-back-mysql_0.5.2-1.1sarge3_i386.deb oldstable/main/source/wzdftpd_0.5.2-1.1sarge3.dsc wzdftpd (0.5.2-1.1sarge3) oldstable-security; urgency=high * Non-maintainer upload by the security team * Backport patch to fix off-by-one in wzd_ClientThread.c which leads to a remote denial of service vulnerability Fixes: CVE-2007-5300 oldstable/main/binary-m68k/wesnoth-server_0.9.0-8_m68k.deb oldstable/main/binary-m68k/wesnoth-editor_0.9.0-8_m68k.deb oldstable/main/binary-m68k/wesnoth_0.9.0-8_m68k.deb wesnoth (0.9.0-8) oldstable; urgency=low * Remove WML turn_cmd which can lead to forking yes and through that 100% CPU usage and stdout filling [CVE-2007-6201]. Patch 05_CVE-2007-6201 was pulled from upstream svn (revision 21907). oldstable/main/binary-arm/wesnoth-editor_0.9.0-8_arm.deb oldstable/main/binary-arm/wesnoth_0.9.0-8_arm.deb oldstable/main/binary-arm/wesnoth-server_0.9.0-8_arm.deb wesnoth (0.9.0-8) oldstable; urgency=low * Remove WML turn_cmd which can lead to forking yes and through that 100% CPU usage and stdout filling [CVE-2007-6201]. Patch 05_CVE-2007-6201 was pulled from upstream svn (revision 21907). oldstable/main/binary-sparc/mount_2.12p-4sarge2_sparc.deb oldstable/main/binary-sparc/util-linux_2.12p-4sarge2_sparc.deb oldstable/main/binary-sparc/fdisk-udeb_2.12p-4sarge2_sparc.udeb oldstable/main/binary-sparc/bsdutils_2.12p-4sarge2_sparc.deb util-linux (2.12p-4sarge2) oldstable-security; urgency=high * Non-maintainer upload by the security team * Fix privilege escalation by calling setuid() and setgid() in the wrong order and not checking the return values in mount and umount Fixes: CVE-2007-5191 oldstable/main/binary-s390/util-linux_2.12p-4sarge2_s390.deb oldstable/main/binary-s390/mount_2.12p-4sarge2_s390.deb oldstable/main/binary-s390/fdisk-udeb_2.12p-4sarge2_s390.udeb oldstable/main/binary-s390/bsdutils_2.12p-4sarge2_s390.deb util-linux (2.12p-4sarge2) oldstable-security; urgency=high * Non-maintainer upload by the security team * Fix privilege escalation by calling setuid() and setgid() in the wrong order and not checking the return values in mount and umount Fixes: CVE-2007-5191 oldstable/main/binary-powerpc/mount_2.12p-4sarge2_powerpc.deb oldstable/main/binary-powerpc/fdisk-udeb_2.12p-4sarge2_powerpc.udeb oldstable/main/binary-powerpc/util-linux_2.12p-4sarge2_powerpc.deb oldstable/main/binary-powerpc/bsdutils_2.12p-4sarge2_powerpc.deb util-linux (2.12p-4sarge2) oldstable-security; urgency=high * Non-maintainer upload by the security team * Fix privilege escalation by calling setuid() and setgid() in the wrong order and not checking the return values in mount and umount Fixes: CVE-2007-5191 oldstable/main/binary-mipsel/fdisk-udeb_2.12p-4sarge2_mipsel.udeb oldstable/main/binary-mipsel/mount_2.12p-4sarge2_mipsel.deb oldstable/main/binary-mipsel/util-linux_2.12p-4sarge2_mipsel.deb oldstable/main/binary-mipsel/bsdutils_2.12p-4sarge2_mipsel.deb util-linux (2.12p-4sarge2) oldstable-security; urgency=high * Non-maintainer upload by the security team * Fix privilege escalation by calling setuid() and setgid() in the wrong order and not checking the return values in mount and umount Fixes: CVE-2007-5191 oldstable/main/binary-mips/mount_2.12p-4sarge2_mips.deb oldstable/main/binary-mips/util-linux_2.12p-4sarge2_mips.deb oldstable/main/binary-mips/fdisk-udeb_2.12p-4sarge2_mips.udeb oldstable/main/binary-mips/bsdutils_2.12p-4sarge2_mips.deb util-linux (2.12p-4sarge2) oldstable-security; urgency=high * Non-maintainer upload by the security team * Fix privilege escalation by calling setuid() and setgid() in the wrong order and not checking the return values in mount and umount Fixes: CVE-2007-5191 oldstable/main/binary-m68k/mount_2.12p-4sarge2_m68k.deb oldstable/main/binary-m68k/bsdutils_2.12p-4sarge2_m68k.deb oldstable/main/binary-m68k/util-linux_2.12p-4sarge2_m68k.deb util-linux (2.12p-4sarge2) oldstable-security; urgency=high * Non-maintainer upload by the security team * Fix privilege escalation by calling setuid() and setgid() in the wrong order and not checking the return values in mount and umount Fixes: CVE-2007-5191 oldstable/main/binary-ia64/util-linux_2.12p-4sarge2_ia64.deb oldstable/main/binary-ia64/fdisk-udeb_2.12p-4sarge2_ia64.udeb oldstable/main/binary-ia64/mount_2.12p-4sarge2_ia64.deb oldstable/main/binary-ia64/bsdutils_2.12p-4sarge2_ia64.deb util-linux (2.12p-4sarge2) oldstable-security; urgency=high * Non-maintainer upload by the security team * Fix privilege escalation by calling setuid() and setgid() in the wrong order and not checking the return values in mount and umount Fixes: CVE-2007-5191 oldstable/main/binary-hppa/util-linux_2.12p-4sarge2_hppa.deb oldstable/main/binary-hppa/fdisk-udeb_2.12p-4sarge2_hppa.udeb oldstable/main/binary-hppa/mount_2.12p-4sarge2_hppa.deb oldstable/main/binary-hppa/bsdutils_2.12p-4sarge2_hppa.deb util-linux (2.12p-4sarge2) oldstable-security; urgency=high * Non-maintainer upload by the security team * Fix privilege escalation by calling setuid() and setgid() in the wrong order and not checking the return values in mount and umount Fixes: CVE-2007-5191 oldstable/main/binary-arm/util-linux_2.12p-4sarge2_arm.deb oldstable/main/binary-arm/bsdutils_2.12p-4sarge2_arm.deb oldstable/main/binary-arm/fdisk-udeb_2.12p-4sarge2_arm.udeb oldstable/main/binary-arm/mount_2.12p-4sarge2_arm.deb util-linux (2.12p-4sarge2) oldstable-security; urgency=high * Non-maintainer upload by the security team * Fix privilege escalation by calling setuid() and setgid() in the wrong order and not checking the return values in mount and umount Fixes: CVE-2007-5191 oldstable/main/binary-alpha/util-linux_2.12p-4sarge2_alpha.deb oldstable/main/binary-alpha/mount_2.12p-4sarge2_alpha.deb oldstable/main/binary-alpha/fdisk-udeb_2.12p-4sarge2_alpha.udeb oldstable/main/binary-alpha/bsdutils_2.12p-4sarge2_alpha.deb util-linux (2.12p-4sarge2) oldstable-security; urgency=high * Non-maintainer upload by the security team * Fix privilege escalation by calling setuid() and setgid() in the wrong order and not checking the return values in mount and umount Fixes: CVE-2007-5191 oldstable/main/source/util-linux_2.12p-4sarge2.dsc oldstable/main/binary-i386/fdisk-udeb_2.12p-4sarge2_i386.udeb oldstable/main/binary-i386/util-linux_2.12p-4sarge2_i386.deb oldstable/main/binary-i386/mount_2.12p-4sarge2_i386.deb oldstable/main/source/util-linux_2.12p-4sarge2.diff.gz oldstable/main/binary-i386/bsdutils_2.12p-4sarge2_i386.deb oldstable/main/binary-all/util-linux-locales_2.12p-4sarge2_all.deb util-linux (2.12p-4sarge2) oldstable-security; urgency=high * Non-maintainer upload by the security team * Fix privilege escalation by calling setuid() and setgid() in the wrong order and not checking the return values in mount and umount Fixes: CVE-2007-5191 oldstable/main/binary-sparc/unzip_5.52-1sarge5_sparc.deb unzip (5.52-1sarge5) oldstable-security; urgency=high * Apply patch from Tavis Ormandy to address invalid free() calls in the inflate_dynamic() function (CVE-2008-0888). oldstable/main/binary-s390/unzip_5.52-1sarge5_s390.deb unzip (5.52-1sarge5) oldstable-security; urgency=high * Apply patch from Tavis Ormandy to address invalid free() calls in the inflate_dynamic() function (CVE-2008-0888). oldstable/main/binary-powerpc/unzip_5.52-1sarge5_powerpc.deb unzip (5.52-1sarge5) oldstable-security; urgency=high * Apply patch from Tavis Ormandy to address invalid free() calls in the inflate_dynamic() function (CVE-2008-0888). oldstable/main/binary-mipsel/unzip_5.52-1sarge5_mipsel.deb unzip (5.52-1sarge5) oldstable-security; urgency=high * Apply patch from Tavis Ormandy to address invalid free() calls in the inflate_dynamic() function (CVE-2008-0888). oldstable/main/binary-mips/unzip_5.52-1sarge5_mips.deb unzip (5.52-1sarge5) oldstable-security; urgency=high * Apply patch from Tavis Ormandy to address invalid free() calls in the inflate_dynamic() function (CVE-2008-0888). oldstable/main/binary-m68k/unzip_5.52-1sarge5_m68k.deb unzip (5.52-1sarge5) oldstable-security; urgency=high * Apply patch from Tavis Ormandy to address invalid free() calls in the inflate_dynamic() function (CVE-2008-0888). oldstable/main/binary-ia64/unzip_5.52-1sarge5_ia64.deb unzip (5.52-1sarge5) oldstable-security; urgency=high * Apply patch from Tavis Ormandy to address invalid free() calls in the inflate_dynamic() function (CVE-2008-0888). oldstable/main/binary-hppa/unzip_5.52-1sarge5_hppa.deb unzip (5.52-1sarge5) oldstable-security; urgency=high * Apply patch from Tavis Ormandy to address invalid free() calls in the inflate_dynamic() function (CVE-2008-0888). oldstable/main/binary-arm/unzip_5.52-1sarge5_arm.deb unzip (5.52-1sarge5) oldstable-security; urgency=high * Apply patch from Tavis Ormandy to address invalid free() calls in the inflate_dynamic() function (CVE-2008-0888). oldstable/main/binary-amd64/unzip_5.52-1sarge5_amd64.deb unzip (5.52-1sarge5) oldstable-security; urgency=high * Apply patch from Tavis Ormandy to address invalid free() calls in the inflate_dynamic() function (CVE-2008-0888). oldstable/main/binary-alpha/unzip_5.52-1sarge5_alpha.deb unzip (5.52-1sarge5) oldstable-security; urgency=high * Apply patch from Tavis Ormandy to address invalid free() calls in the inflate_dynamic() function (CVE-2008-0888). oldstable/main/source/unzip_5.52-1sarge5.dsc oldstable/main/source/unzip_5.52-1sarge5.diff.gz oldstable/main/binary-i386/unzip_5.52-1sarge5_i386.deb unzip (5.52-1sarge5) oldstable-security; urgency=high * Apply patch from Tavis Ormandy to address invalid free() calls in the inflate_dynamic() function (CVE-2008-0888). oldstable/non-free/binary-sparc/unrar_3.5.2-0.2_sparc.deb unrar-nonfree (1:3.5.2-0.2) oldstable; urgency=low * Non-maintainer upload. * Fix CVE-2007-0855: stack based buffer overflow (Closes: #410580). oldstable/non-free/binary-s390/unrar_3.5.2-0.2_s390.deb unrar-nonfree (1:3.5.2-0.2) oldstable; urgency=low * Non-maintainer upload. * Fix CVE-2007-0855: stack based buffer overflow (Closes: #410580). oldstable/non-free/binary-powerpc/unrar_3.5.2-0.2_powerpc.deb unrar-nonfree (1:3.5.2-0.2) oldstable; urgency=low * Non-maintainer upload. * Fix CVE-2007-0855: stack based buffer overflow (Closes: #410580). oldstable/non-free/binary-mipsel/unrar_3.5.2-0.2_mipsel.deb unrar-nonfree (1:3.5.2-0.2) oldstable; urgency=low * Non-maintainer upload. * Fix CVE-2007-0855: stack based buffer overflow (Closes: #410580). oldstable/non-free/binary-mips/unrar_3.5.2-0.2_mips.deb unrar-nonfree (1:3.5.2-0.2) oldstable; urgency=low * Non-maintainer upload. * Fix CVE-2007-0855: stack based buffer overflow (Closes: #410580). oldstable/non-free/binary-m68k/unrar_3.5.2-0.2_m68k.deb unrar-nonfree (1:3.5.2-0.2) oldstable; urgency=low * Non-maintainer upload. * Fix CVE-2007-0855: stack based buffer overflow (Closes: #410580). oldstable/non-free/binary-ia64/unrar_3.5.2-0.2_ia64.deb unrar-nonfree (1:3.5.2-0.2) oldstable; urgency=low * Non-maintainer upload. * Fix CVE-2007-0855: stack based buffer overflow (Closes: #410580). oldstable/non-free/binary-hppa/unrar_3.5.2-0.2_hppa.deb unrar-nonfree (1:3.5.2-0.2) oldstable; urgency=low * Non-maintainer upload. * Fix CVE-2007-0855: stack based buffer overflow (Closes: #410580). oldstable/non-free/binary-arm/unrar_3.5.2-0.2_arm.deb unrar-nonfree (1:3.5.2-0.2) oldstable; urgency=low * Non-maintainer upload. * Fix CVE-2007-0855: stack based buffer overflow (Closes: #410580). oldstable/non-free/binary-alpha/unrar_3.5.2-0.2_alpha.deb unrar-nonfree (1:3.5.2-0.2) oldstable; urgency=low * Non-maintainer upload. * Fix CVE-2007-0855: stack based buffer overflow (Closes: #410580). oldstable/non-free/binary-i386/unrar_3.5.2-0.2_i386.deb oldstable/non-free/source/unrar-nonfree_3.5.2-0.2.dsc oldstable/non-free/source/unrar-nonfree_3.5.2-0.2.diff.gz unrar-nonfree (1:3.5.2-0.2) oldstable; urgency=low * Non-maintainer upload. * Fix CVE-2007-0855: stack based buffer overflow (Closes: #410580). oldstable/main/source/turba2_2.0.2-1sarge1.dsc oldstable/main/source/turba2_2.0.2-1sarge1.diff.gz oldstable/main/binary-all/turba2_2.0.2-1sarge1_all.deb turba2 (2.0.2-1sarge1) oldstable-security; urgency=high * Fix unchecked access to contacts in the same SQL table, if the unique key of another user's contact can be guessed. See CVE-2008-0807 for more informations. (Closes: #464058) * Fix privilege escalation in Horde API. * Close several XSS vulnerabilities with address book and contact data. oldstable/main/binary-sparc/tk8.4_8.4.9-1sarge2_sparc.deb oldstable/main/binary-sparc/tk8.4-dev_8.4.9-1sarge2_sparc.deb tk8.4 (8.4.9-1sarge2) oldstable-security; urgency=high * Fix CVE-2008-0553 oldstable/main/binary-s390/tk8.4-dev_8.4.9-1sarge2_s390.deb oldstable/main/binary-s390/tk8.4_8.4.9-1sarge2_s390.deb tk8.4 (8.4.9-1sarge2) oldstable-security; urgency=high * Fix CVE-2008-0553 oldstable/main/binary-powerpc/tk8.4_8.4.9-1sarge2_powerpc.deb oldstable/main/binary-powerpc/tk8.4-dev_8.4.9-1sarge2_powerpc.deb tk8.4 (8.4.9-1sarge2) oldstable-security; urgency=high * Fix CVE-2008-0553 oldstable/main/binary-mipsel/tk8.4-dev_8.4.9-1sarge2_mipsel.deb oldstable/main/binary-mipsel/tk8.4_8.4.9-1sarge2_mipsel.deb tk8.4 (8.4.9-1sarge2) oldstable-security; urgency=high * Fix CVE-2008-0553 oldstable/main/binary-mips/tk8.4-dev_8.4.9-1sarge2_mips.deb oldstable/main/binary-mips/tk8.4_8.4.9-1sarge2_mips.deb tk8.4 (8.4.9-1sarge2) oldstable-security; urgency=high * Fix CVE-2008-0553 oldstable/main/binary-m68k/tk8.4-dev_8.4.9-1sarge2_m68k.deb oldstable/main/binary-m68k/tk8.4_8.4.9-1sarge2_m68k.deb tk8.4 (8.4.9-1sarge2) oldstable-security; urgency=high * Fix CVE-2008-0553 oldstable/main/binary-ia64/tk8.4-dev_8.4.9-1sarge2_ia64.deb oldstable/main/binary-ia64/tk8.4_8.4.9-1sarge2_ia64.deb tk8.4 (8.4.9-1sarge2) oldstable-security; urgency=high * Fix CVE-2008-0553 oldstable/main/binary-hppa/tk8.4-dev_8.4.9-1sarge2_hppa.deb oldstable/main/binary-hppa/tk8.4_8.4.9-1sarge2_hppa.deb tk8.4 (8.4.9-1sarge2) oldstable-security; urgency=high * Fix CVE-2008-0553 oldstable/main/binary-arm/tk8.4-dev_8.4.9-1sarge2_arm.deb oldstable/main/binary-arm/tk8.4_8.4.9-1sarge2_arm.deb tk8.4 (8.4.9-1sarge2) oldstable-security; urgency=high * Fix CVE-2008-0553 oldstable/main/binary-amd64/tk8.4-dev_8.4.9-1sarge2_amd64.deb oldstable/main/binary-amd64/tk8.4_8.4.9-1sarge2_amd64.deb tk8.4 (8.4.9-1sarge2) oldstable-security; urgency=high * Fix CVE-2008-0553 oldstable/main/binary-alpha/tk8.4-dev_8.4.9-1sarge2_alpha.deb oldstable/main/binary-alpha/tk8.4_8.4.9-1sarge2_alpha.deb tk8.4 (8.4.9-1sarge2) oldstable-security; urgency=high * Fix CVE-2008-0553 oldstable/main/binary-all/tk8.4-doc_8.4.9-1sarge2_all.deb oldstable/main/binary-i386/tk8.4_8.4.9-1sarge2_i386.deb oldstable/main/source/tk8.4_8.4.9-1sarge2.dsc oldstable/main/source/tk8.4_8.4.9-1sarge2.diff.gz oldstable/main/binary-i386/tk8.4-dev_8.4.9-1sarge2_i386.deb tk8.4 (8.4.9-1sarge2) oldstable-security; urgency=high * Fix CVE-2008-0553 oldstable/main/binary-sparc/tk8.3_8.3.5-4sarge1_sparc.deb oldstable/main/binary-sparc/tk8.3-dev_8.3.5-4sarge1_sparc.deb tk8.3 (8.3.5-4sarge1) oldstable-security; urgency=high * Fix CVE-2008-0553. oldstable/main/binary-s390/tk8.3_8.3.5-4sarge1_s390.deb oldstable/main/binary-s390/tk8.3-dev_8.3.5-4sarge1_s390.deb tk8.3 (8.3.5-4sarge1) oldstable-security; urgency=high * Fix CVE-2008-0553. oldstable/main/binary-powerpc/tk8.3_8.3.5-4sarge1_powerpc.deb oldstable/main/binary-powerpc/tk8.3-dev_8.3.5-4sarge1_powerpc.deb tk8.3 (8.3.5-4sarge1) oldstable-security; urgency=high * Fix CVE-2008-0553. oldstable/main/binary-mipsel/tk8.3_8.3.5-4sarge1_mipsel.deb oldstable/main/binary-mipsel/tk8.3-dev_8.3.5-4sarge1_mipsel.deb tk8.3 (8.3.5-4sarge1) oldstable-security; urgency=high * Fix CVE-2008-0553. oldstable/main/binary-mips/tk8.3-dev_8.3.5-4sarge1_mips.deb oldstable/main/binary-mips/tk8.3_8.3.5-4sarge1_mips.deb tk8.3 (8.3.5-4sarge1) oldstable-security; urgency=high * Fix CVE-2008-0553. oldstable/main/binary-m68k/tk8.3-dev_8.3.5-4sarge1_m68k.deb oldstable/main/binary-m68k/tk8.3_8.3.5-4sarge1_m68k.deb tk8.3 (8.3.5-4sarge1) oldstable-security; urgency=high * Fix CVE-2008-0553. oldstable/main/binary-ia64/tk8.3-dev_8.3.5-4sarge1_ia64.deb oldstable/main/binary-ia64/tk8.3_8.3.5-4sarge1_ia64.deb tk8.3 (8.3.5-4sarge1) oldstable-security; urgency=high * Fix CVE-2008-0553. oldstable/main/binary-hppa/tk8.3_8.3.5-4sarge1_hppa.deb oldstable/main/binary-hppa/tk8.3-dev_8.3.5-4sarge1_hppa.deb tk8.3 (8.3.5-4sarge1) oldstable-security; urgency=high * Fix CVE-2008-0553. oldstable/main/binary-arm/tk8.3-dev_8.3.5-4sarge1_arm.deb oldstable/main/binary-arm/tk8.3_8.3.5-4sarge1_arm.deb tk8.3 (8.3.5-4sarge1) oldstable-security; urgency=high * Fix CVE-2008-0553. oldstable/main/binary-amd64/tk8.3_8.3.5-4sarge1_amd64.deb oldstable/main/binary-amd64/tk8.3-dev_8.3.5-4sarge1_amd64.deb tk8.3 (8.3.5-4sarge1) oldstable-security; urgency=high * Fix CVE-2008-0553. oldstable/main/binary-alpha/tk8.3-dev_8.3.5-4sarge1_alpha.deb oldstable/main/binary-alpha/tk8.3_8.3.5-4sarge1_alpha.deb tk8.3 (8.3.5-4sarge1) oldstable-security; urgency=high * Fix CVE-2008-0553. oldstable/main/source/tk8.3_8.3.5-4sarge1.dsc oldstable/main/binary-i386/tk8.3_8.3.5-4sarge1_i386.deb oldstable/main/source/tk8.3_8.3.5-4sarge1.diff.gz oldstable/main/binary-i386/tk8.3-dev_8.3.5-4sarge1_i386.deb oldstable/main/binary-all/tk8.3-doc_8.3.5-4sarge1_all.deb tk8.3 (8.3.5-4sarge1) oldstable-security; urgency=high * Fix CVE-2008-0553. oldstable/main/binary-sparc/tar_1.14-2.4_sparc.deb tar (1.14-2.4) oldstable-security; urgency=high * Non-maintainer upload by the security team * Apply patch from Dmitry V. Levin <ldv@owl.openwall.com> to avoid a stack-based buffer overflow while processing certain file names (CVE-2007-4476). Closes: #441444. * Apply patch from Dmitry V. Levin to fix double-dot recognition in case of duplicate / (CVE-2007-4131). Closes: #439335. oldstable/main/binary-s390/tar_1.14-2.4_s390.deb tar (1.14-2.4) oldstable-security; urgency=high * Non-maintainer upload by the security team * Apply patch from Dmitry V. Levin <ldv@owl.openwall.com> to avoid a stack-based buffer overflow while processing certain file names (CVE-2007-4476). Closes: #441444. * Apply patch from Dmitry V. Levin to fix double-dot recognition in case of duplicate / (CVE-2007-4131). Closes: #439335. oldstable/main/binary-powerpc/tar_1.14-2.4_powerpc.deb tar (1.14-2.4) oldstable-security; urgency=high * Non-maintainer upload by the security team * Apply patch from Dmitry V. Levin <ldv@owl.openwall.com> to avoid a stack-based buffer overflow while processing certain file names (CVE-2007-4476). Closes: #441444. * Apply patch from Dmitry V. Levin to fix double-dot recognition in case of duplicate / (CVE-2007-4131). Closes: #439335. oldstable/main/binary-mipsel/tar_1.14-2.4_mipsel.deb tar (1.14-2.4) oldstable-security; urgency=high * Non-maintainer upload by the security team * Apply patch from Dmitry V. Levin <ldv@owl.openwall.com> to avoid a stack-based buffer overflow while processing certain file names (CVE-2007-4476). Closes: #441444. * Apply patch from Dmitry V. Levin to fix double-dot recognition in case of duplicate / (CVE-2007-4131). Closes: #439335. oldstable/main/binary-mips/tar_1.14-2.4_mips.deb tar (1.14-2.4) oldstable-security; urgency=high * Non-maintainer upload by the security team * Apply patch from Dmitry V. Levin <ldv@owl.openwall.com> to avoid a stack-based buffer overflow while processing certain file names (CVE-2007-4476). Closes: #441444. * Apply patch from Dmitry V. Levin to fix double-dot recognition in case of duplicate / (CVE-2007-4131). Closes: #439335. oldstable/main/binary-m68k/tar_1.14-2.4_m68k.deb tar (1.14-2.4) oldstable-security; urgency=high * Non-maintainer upload by the security team * Apply patch from Dmitry V. Levin <ldv@owl.openwall.com> to avoid a stack-based buffer overflow while processing certain file names (CVE-2007-4476). Closes: #441444. * Apply patch from Dmitry V. Levin to fix double-dot recognition in case of duplicate / (CVE-2007-4131). Closes: #439335. oldstable/main/binary-ia64/tar_1.14-2.4_ia64.deb tar (1.14-2.4) oldstable-security; urgency=high * Non-maintainer upload by the security team * Apply patch from Dmitry V. Levin <ldv@owl.openwall.com> to avoid a stack-based buffer overflow while processing certain file names (CVE-2007-4476). Closes: #441444. * Apply patch from Dmitry V. Levin to fix double-dot recognition in case of duplicate / (CVE-2007-4131). Closes: #439335. oldstable/main/binary-hppa/tar_1.14-2.4_hppa.deb tar (1.14-2.4) oldstable-security; urgency=high * Non-maintainer upload by the security team * Apply patch from Dmitry V. Levin <ldv@owl.openwall.com> to avoid a stack-based buffer overflow while processing certain file names (CVE-2007-4476). Closes: #441444. * Apply patch from Dmitry V. Levin to fix double-dot recognition in case of duplicate / (CVE-2007-4131). Closes: #439335. oldstable/main/binary-arm/tar_1.14-2.4_arm.deb tar (1.14-2.4) oldstable-security; urgency=high * Non-maintainer upload by the security team * Apply patch from Dmitry V. Levin <ldv@owl.openwall.com> to avoid a stack-based buffer overflow while processing certain file names (CVE-2007-4476). Closes: #441444. * Apply patch from Dmitry V. Levin to fix double-dot recognition in case of duplicate / (CVE-2007-4131). Closes: #439335. oldstable/main/binary-amd64/tar_1.14-2.4_amd64.deb tar (1.14-2.4) oldstable-security; urgency=high * Non-maintainer upload by the security team * Apply patch from Dmitry V. Levin <ldv@owl.openwall.com> to avoid a stack-based buffer overflow while processing certain file names (CVE-2007-4476). Closes: #441444. * Apply patch from Dmitry V. Levin to fix double-dot recognition in case of duplicate / (CVE-2007-4131). Closes: #439335. oldstable/main/binary-alpha/tar_1.14-2.4_alpha.deb tar (1.14-2.4) oldstable-security; urgency=high * Non-maintainer upload by the security team * Apply patch from Dmitry V. Levin <ldv@owl.openwall.com> to avoid a stack-based buffer overflow while processing certain file names (CVE-2007-4476). Closes: #441444. * Apply patch from Dmitry V. Levin to fix double-dot recognition in case of duplicate / (CVE-2007-4131). Closes: #439335. oldstable/main/binary-i386/tar_1.14-2.4_i386.deb oldstable/main/source/tar_1.14-2.4.dsc oldstable/main/source/tar_1.14-2.4.diff.gz tar (1.14-2.4) oldstable-security; urgency=high * Non-maintainer upload by the security team * Apply patch from Dmitry V. Levin <ldv@owl.openwall.com> to avoid a stack-based buffer overflow while processing certain file names (CVE-2007-4476). Closes: #441444. * Apply patch from Dmitry V. Levin to fix double-dot recognition in case of duplicate / (CVE-2007-4131). Closes: #439335. oldstable/main/binary-sparc/libsword4_1.5.7-7sarge1_sparc.deb oldstable/main/binary-sparc/libsword-dev_1.5.7-7sarge1_sparc.deb oldstable/main/binary-sparc/diatheke_1.5.7-7sarge1_sparc.deb sword (1.5.7-7sarge1) oldstable-security; urgency=high * Non-maintainer upload by the security team. * Fix remote command execution in diatheke.pl (Closes: #466449) with maintainer-supplied patch. oldstable/main/binary-s390/diatheke_1.5.7-7sarge1_s390.deb oldstable/main/binary-s390/libsword4_1.5.7-7sarge1_s390.deb oldstable/main/binary-s390/libsword-dev_1.5.7-7sarge1_s390.deb sword (1.5.7-7sarge1) oldstable-security; urgency=high * Non-maintainer upload by the security team. * Fix remote command execution in diatheke.pl (Closes: #466449) with maintainer-supplied patch. oldstable/main/binary-powerpc/libsword4_1.5.7-7sarge1_powerpc.deb oldstable/main/binary-powerpc/diatheke_1.5.7-7sarge1_powerpc.deb oldstable/main/binary-powerpc/libsword-dev_1.5.7-7sarge1_powerpc.deb sword (1.5.7-7sarge1) oldstable-security; urgency=high * Non-maintainer upload by the security team. * Fix remote command execution in diatheke.pl (Closes: #466449) with maintainer-supplied patch. oldstable/main/binary-mipsel/diatheke_1.5.7-7sarge1_mipsel.deb oldstable/main/binary-mipsel/libsword4_1.5.7-7sarge1_mipsel.deb oldstable/main/binary-mipsel/libsword-dev_1.5.7-7sarge1_mipsel.deb sword (1.5.7-7sarge1) oldstable-security; urgency=high * Non-maintainer upload by the security team. * Fix remote command execution in diatheke.pl (Closes: #466449) with maintainer-supplied patch. oldstable/main/binary-mips/diatheke_1.5.7-7sarge1_mips.deb oldstable/main/binary-mips/libsword4_1.5.7-7sarge1_mips.deb oldstable/main/binary-mips/libsword-dev_1.5.7-7sarge1_mips.deb sword (1.5.7-7sarge1) oldstable-security; urgency=high * Non-maintainer upload by the security team. * Fix remote command execution in diatheke.pl (Closes: #466449) with maintainer-supplied patch. oldstable/main/binary-m68k/libsword4_1.5.7-7sarge1_m68k.deb oldstable/main/binary-m68k/diatheke_1.5.7-7sarge1_m68k.deb oldstable/main/binary-m68k/libsword-dev_1.5.7-7sarge1_m68k.deb sword (1.5.7-7sarge1) oldstable-security; urgency=high * Non-maintainer upload by the security team. * Fix remote command execution in diatheke.pl (Closes: #466449) with maintainer-supplied patch. oldstable/main/binary-ia64/libsword4_1.5.7-7sarge1_ia64.deb oldstable/main/binary-ia64/diatheke_1.5.7-7sarge1_ia64.deb oldstable/main/binary-ia64/libsword-dev_1.5.7-7sarge1_ia64.deb sword (1.5.7-7sarge1) oldstable-security; urgency=high * Non-maintainer upload by the security team. * Fix remote command execution in diatheke.pl (Closes: #466449) with maintainer-supplied patch. oldstable/main/binary-hppa/diatheke_1.5.7-7sarge1_hppa.deb oldstable/main/binary-hppa/libsword4_1.5.7-7sarge1_hppa.deb oldstable/main/binary-hppa/libsword-dev_1.5.7-7sarge1_hppa.deb sword (1.5.7-7sarge1) oldstable-security; urgency=high * Non-maintainer upload by the security team. * Fix remote command execution in diatheke.pl (Closes: #466449) with maintainer-supplied patch. oldstable/main/binary-arm/diatheke_1.5.7-7sarge1_arm.deb oldstable/main/binary-arm/libsword-dev_1.5.7-7sarge1_arm.deb oldstable/main/binary-arm/libsword4_1.5.7-7sarge1_arm.deb sword (1.5.7-7sarge1) oldstable-security; urgency=high * Non-maintainer upload by the security team. * Fix remote command execution in diatheke.pl (Closes: #466449) with maintainer-supplied patch. oldstable/main/binary-amd64/libsword-dev_1.5.7-7sarge1_amd64.deb oldstable/main/binary-amd64/diatheke_1.5.7-7sarge1_amd64.deb oldstable/main/binary-amd64/libsword4_1.5.7-7sarge1_amd64.deb sword (1.5.7-7sarge1) oldstable-security; urgency=high * Non-maintainer upload by the security team. * Fix remote command execution in diatheke.pl (Closes: #466449) with maintainer-supplied patch. oldstable/main/binary-alpha/libsword-dev_1.5.7-7sarge1_alpha.deb oldstable/main/binary-alpha/libsword4_1.5.7-7sarge1_alpha.deb oldstable/main/binary-alpha/diatheke_1.5.7-7sarge1_alpha.deb sword (1.5.7-7sarge1) oldstable-security; urgency=high * Non-maintainer upload by the security team. * Fix remote command execution in diatheke.pl (Closes: #466449) with maintainer-supplied patch. oldstable/main/binary-i386/libsword-dev_1.5.7-7sarge1_i386.deb oldstable/main/source/sword_1.5.7-7sarge1.dsc oldstable/main/binary-i386/diatheke_1.5.7-7sarge1_i386.deb oldstable/main/source/sword_1.5.7-7sarge1.diff.gz oldstable/main/binary-i386/libsword4_1.5.7-7sarge1_i386.deb sword (1.5.7-7sarge1) oldstable-security; urgency=high * Non-maintainer upload by the security team. * Fix remote command execution in diatheke.pl (Closes: #466449) with maintainer-supplied patch. oldstable/main/binary-sparc/squidclient_2.5.9-10sarge5_sparc.deb oldstable/main/binary-sparc/squid_2.5.9-10sarge5_sparc.deb oldstable/main/binary-sparc/squid-cgi_2.5.9-10sarge5_sparc.deb squid (2.5.9-10sarge5) oldstable-security; urgency=low * Doh, build for correct suite oldstable/main/binary-s390/squidclient_2.5.9-10sarge5_s390.deb oldstable/main/binary-s390/squid_2.5.9-10sarge5_s390.deb oldstable/main/binary-s390/squid-cgi_2.5.9-10sarge5_s390.deb squid (2.5.9-10sarge5) oldstable-security; urgency=low * Doh, build for correct suite oldstable/main/binary-powerpc/squid-cgi_2.5.9-10sarge5_powerpc.deb oldstable/main/binary-powerpc/squidclient_2.5.9-10sarge5_powerpc.deb oldstable/main/binary-powerpc/squid_2.5.9-10sarge5_powerpc.deb squid (2.5.9-10sarge5) oldstable-security; urgency=low * Doh, build for correct suite oldstable/main/binary-mipsel/squid-cgi_2.5.9-10sarge5_mipsel.deb oldstable/main/binary-mipsel/squidclient_2.5.9-10sarge5_mipsel.deb oldstable/main/binary-mipsel/squid_2.5.9-10sarge5_mipsel.deb squid (2.5.9-10sarge5) oldstable-security; urgency=low * Doh, build for correct suite oldstable/main/binary-mips/squidclient_2.5.9-10sarge5_mips.deb oldstable/main/binary-mips/squid_2.5.9-10sarge5_mips.deb oldstable/main/binary-mips/squid-cgi_2.5.9-10sarge5_mips.deb squid (2.5.9-10sarge5) oldstable-security; urgency=low * Doh, build for correct suite oldstable/main/binary-m68k/squid_2.5.9-10sarge5_m68k.deb oldstable/main/binary-m68k/squidclient_2.5.9-10sarge5_m68k.deb oldstable/main/binary-m68k/squid-cgi_2.5.9-10sarge5_m68k.deb squid (2.5.9-10sarge5) oldstable-security; urgency=low * Doh, build for correct suite oldstable/main/binary-ia64/squidclient_2.5.9-10sarge5_ia64.deb oldstable/main/binary-ia64/squid-cgi_2.5.9-10sarge5_ia64.deb oldstable/main/binary-ia64/squid_2.5.9-10sarge5_ia64.deb squid (2.5.9-10sarge5) oldstable-security; urgency=low * Doh, build for correct suite oldstable/main/binary-hppa/squid_2.5.9-10sarge5_hppa.deb oldstable/main/binary-hppa/squidclient_2.5.9-10sarge5_hppa.deb oldstable/main/binary-hppa/squid-cgi_2.5.9-10sarge5_hppa.deb squid (2.5.9-10sarge5) oldstable-security; urgency=low * Doh, build for correct suite oldstable/main/binary-arm/squid_2.5.9-10sarge5_arm.deb oldstable/main/binary-arm/squid-cgi_2.5.9-10sarge5_arm.deb oldstable/main/binary-arm/squidclient_2.5.9-10sarge5_arm.deb squid (2.5.9-10sarge5) oldstable-security; urgency=low * Doh, build for correct suite oldstable/main/binary-amd64/squid_2.5.9-10sarge5_amd64.deb oldstable/main/binary-amd64/squidclient_2.5.9-10sarge5_amd64.deb oldstable/main/binary-amd64/squid-cgi_2.5.9-10sarge5_amd64.deb squid (2.5.9-10sarge5) oldstable-security; urgency=low * Doh, build for correct suite oldstable/main/binary-alpha/squid_2.5.9-10sarge5_alpha.deb oldstable/main/binary-alpha/squid-cgi_2.5.9-10sarge5_alpha.deb oldstable/main/binary-alpha/squidclient_2.5.9-10sarge5_alpha.deb squid (2.5.9-10sarge5) oldstable-security; urgency=low * Doh, build for correct suite oldstable/main/binary-i386/squid-cgi_2.5.9-10sarge5_i386.deb oldstable/main/source/squid_2.5.9-10sarge5.diff.gz oldstable/main/binary-i386/squid_2.5.9-10sarge5_i386.deb oldstable/main/source/squid_2.5.9-10sarge5.dsc oldstable/main/binary-all/squid-common_2.5.9-10sarge5_all.deb oldstable/main/binary-i386/squidclient_2.5.9-10sarge5_i386.deb squid (2.5.9-10sarge5) oldstable-security; urgency=low * Doh, build for correct suite oldstable/main/source/smarty_2.6.9-1sarge1.dsc oldstable/main/binary-all/smarty_2.6.9-1sarge1_all.deb oldstable/main/source/smarty_2.6.9-1sarge1.diff.gz smarty (2.6.9-1sarge1) oldstable-security; urgency=high * Non-maintainer upload by the security team. * A \0 character in a search string could be abused to call arbitrary PHP functions via templates. CVE-2008-1066, closes: #469492 oldstable/main/binary-sparc/sing_1.1-9sarge1_sparc.deb sing (1.1-9sarge1) oldstable; urgency=low * Patched parser.c to drop privileges when opening log file and running sing SUID. (CVE-2007-6211) Thanks a lot to Nico Golde for the patch. (Closes: #454167) oldstable/main/binary-s390/sing_1.1-9sarge1_s390.deb sing (1.1-9sarge1) oldstable; urgency=low * Patched parser.c to drop privileges when opening log file and running sing SUID. (CVE-2007-6211) Thanks a lot to Nico Golde for the patch. (Closes: #454167) oldstable/main/binary-powerpc/sing_1.1-9sarge1_powerpc.deb sing (1.1-9sarge1) oldstable; urgency=low * Patched parser.c to drop privileges when opening log file and running sing SUID. (CVE-2007-6211) Thanks a lot to Nico Golde for the patch. (Closes: #454167) oldstable/main/binary-mipsel/sing_1.1-9sarge1_mipsel.deb sing (1.1-9sarge1) oldstable; urgency=low * Patched parser.c to drop privileges when opening log file and running sing SUID. (CVE-2007-6211) Thanks a lot to Nico Golde for the patch. (Closes: #454167) oldstable/main/binary-mips/sing_1.1-9sarge1_mips.deb sing (1.1-9sarge1) oldstable; urgency=low * Patched parser.c to drop privileges when opening log file and running sing SUID. (CVE-2007-6211) Thanks a lot to Nico Golde for the patch. (Closes: #454167) oldstable/main/binary-m68k/sing_1.1-9sarge1_m68k.deb sing (1.1-9sarge1) oldstable; urgency=low * Patched parser.c to drop privileges when opening log file and running sing SUID. (CVE-2007-6211) Thanks a lot to Nico Golde for the patch. (Closes: #454167) oldstable/main/binary-ia64/sing_1.1-9sarge1_ia64.deb sing (1.1-9sarge1) oldstable; urgency=low * Patched parser.c to drop privileges when opening log file and running sing SUID. (CVE-2007-6211) Thanks a lot to Nico Golde for the patch. (Closes: #454167) oldstable/main/binary-hppa/sing_1.1-9sarge1_hppa.deb sing (1.1-9sarge1) oldstable; urgency=low * Patched parser.c to drop privileges when opening log file and running sing SUID. (CVE-2007-6211) Thanks a lot to Nico Golde for the patch. (Closes: #454167) oldstable/main/binary-arm/sing_1.1-9sarge1_arm.deb sing (1.1-9sarge1) oldstable; urgency=low * Patched parser.c to drop privileges when opening log file and running sing SUID. (CVE-2007-6211) Thanks a lot to Nico Golde for the patch. (Closes: #454167) oldstable/main/binary-alpha/sing_1.1-9sarge1_alpha.deb sing (1.1-9sarge1) oldstable; urgency=low * Patched parser.c to drop privileges when opening log file and running sing SUID. (CVE-2007-6211) Thanks a lot to Nico Golde for the patch. (Closes: #454167) oldstable/main/source/sing_1.1-9sarge1.dsc oldstable/main/binary-i386/sing_1.1-9sarge1_i386.deb oldstable/main/source/sing_1.1-9sarge1.diff.gz sing (1.1-9sarge1) oldstable; urgency=low * Patched parser.c to drop privileges when opening log file and running sing SUID. (CVE-2007-6211) Thanks a lot to Nico Golde for the patch. (Closes: #454167) oldstable/main/binary-sparc/libsdl-image1.2_1.2.4-1etch1_sparc.deb oldstable/main/binary-sparc/libsdl-image1.2-dev_1.2.4-1etch1_sparc.deb sdl-image1.2 (1.2.4-1etch1) oldstable-security; urgency=high * CVE-2007-6697: Fix buffer overflow in GIF handling. * CVE-2008-0544: Fix heap based buffer overflow in IMG_LoadLBM_RW. oldstable/main/binary-s390/libsdl-image1.2_1.2.4-1etch1_s390.deb oldstable/main/binary-s390/libsdl-image1.2-dev_1.2.4-1etch1_s390.deb sdl-image1.2 (1.2.4-1etch1) oldstable-security; urgency=high * CVE-2007-6697: Fix buffer overflow in GIF handling. * CVE-2008-0544: Fix heap based buffer overflow in IMG_LoadLBM_RW. oldstable/main/binary-powerpc/libsdl-image1.2-dev_1.2.4-1etch1_powerpc.deb oldstable/main/binary-powerpc/libsdl-image1.2_1.2.4-1etch1_powerpc.deb sdl-image1.2 (1.2.4-1etch1) oldstable-security; urgency=high * CVE-2007-6697: Fix buffer overflow in GIF handling. * CVE-2008-0544: Fix heap based buffer overflow in IMG_LoadLBM_RW. oldstable/main/binary-mipsel/libsdl-image1.2-dev_1.2.4-1etch1_mipsel.deb oldstable/main/binary-mipsel/libsdl-image1.2_1.2.4-1etch1_mipsel.deb sdl-image1.2 (1.2.4-1etch1) oldstable-security; urgency=high * CVE-2007-6697: Fix buffer overflow in GIF handling. * CVE-2008-0544: Fix heap based buffer overflow in IMG_LoadLBM_RW. oldstable/main/binary-mips/libsdl-image1.2_1.2.4-1etch1_mips.deb oldstable/main/binary-mips/libsdl-image1.2-dev_1.2.4-1etch1_mips.deb sdl-image1.2 (1.2.4-1etch1) oldstable-security; urgency=high * CVE-2007-6697: Fix buffer overflow in GIF handling. * CVE-2008-0544: Fix heap based buffer overflow in IMG_LoadLBM_RW. oldstable/main/binary-m68k/libsdl-image1.2-dev_1.2.4-1etch1_m68k.deb oldstable/main/binary-m68k/libsdl-image1.2_1.2.4-1etch1_m68k.deb sdl-image1.2 (1.2.4-1etch1) oldstable-security; urgency=high * CVE-2007-6697: Fix buffer overflow in GIF handling. * CVE-2008-0544: Fix heap based buffer overflow in IMG_LoadLBM_RW. oldstable/main/binary-ia64/libsdl-image1.2_1.2.4-1etch1_ia64.deb oldstable/main/binary-ia64/libsdl-image1.2-dev_1.2.4-1etch1_ia64.deb sdl-image1.2 (1.2.4-1etch1) oldstable-security; urgency=high * CVE-2007-6697: Fix buffer overflow in GIF handling. * CVE-2008-0544: Fix heap based buffer overflow in IMG_LoadLBM_RW. oldstable/main/binary-hppa/libsdl-image1.2_1.2.4-1etch1_hppa.deb oldstable/main/binary-hppa/libsdl-image1.2-dev_1.2.4-1etch1_hppa.deb sdl-image1.2 (1.2.4-1etch1) oldstable-security; urgency=high * CVE-2007-6697: Fix buffer overflow in GIF handling. * CVE-2008-0544: Fix heap based buffer overflow in IMG_LoadLBM_RW. oldstable/main/binary-arm/libsdl-image1.2_1.2.4-1etch1_arm.deb oldstable/main/binary-arm/libsdl-image1.2-dev_1.2.4-1etch1_arm.deb sdl-image1.2 (1.2.4-1etch1) oldstable-security; urgency=high * CVE-2007-6697: Fix buffer overflow in GIF handling. * CVE-2008-0544: Fix heap based buffer overflow in IMG_LoadLBM_RW. oldstable/main/binary-amd64/libsdl-image1.2_1.2.4-1etch1_amd64.deb oldstable/main/binary-amd64/libsdl-image1.2-dev_1.2.4-1etch1_amd64.deb sdl-image1.2 (1.2.4-1etch1) oldstable-security; urgency=high * CVE-2007-6697: Fix buffer overflow in GIF handling. * CVE-2008-0544: Fix heap based buffer overflow in IMG_LoadLBM_RW. oldstable/main/binary-alpha/libsdl-image1.2_1.2.4-1etch1_alpha.deb oldstable/main/binary-alpha/libsdl-image1.2-dev_1.2.4-1etch1_alpha.deb sdl-image1.2 (1.2.4-1etch1) oldstable-security; urgency=high * CVE-2007-6697: Fix buffer overflow in GIF handling. * CVE-2008-0544: Fix heap based buffer overflow in IMG_LoadLBM_RW. oldstable/main/binary-i386/libsdl-image1.2-dev_1.2.4-1etch1_i386.deb oldstable/main/source/sdl-image1.2_1.2.4-1etch1.diff.gz oldstable/main/binary-i386/libsdl-image1.2_1.2.4-1etch1_i386.deb oldstable/main/source/sdl-image1.2_1.2.4-1etch1.dsc sdl-image1.2 (1.2.4-1etch1) oldstable-security; urgency=high * CVE-2007-6697: Fix buffer overflow in GIF handling. * CVE-2008-0544: Fix heap based buffer overflow in IMG_LoadLBM_RW. oldstable/main/binary-sparc/scponly_4.0-1sarge2_sparc.deb scponly (4.0-1sarge2) oldstable-security; urgency=high * Non-maintainer upload by the Security Team * Remove rsync, Subversion and Unison support because it was possible to gain shell access through them (CVE-2007-6350). Closes: #437148. * scp: -o and -F options are dangerous (CVE-2007-6415). oldstable/main/binary-s390/scponly_4.0-1sarge2_s390.deb scponly (4.0-1sarge2) oldstable-security; urgency=high * Non-maintainer upload by the Security Team * Remove rsync, Subversion and Unison support because it was possible to gain shell access through them (CVE-2007-6350). Closes: #437148. * scp: -o and -F options are dangerous (CVE-2007-6415). oldstable/main/binary-powerpc/scponly_4.0-1sarge2_powerpc.deb scponly (4.0-1sarge2) oldstable-security; urgency=high * Non-maintainer upload by the Security Team * Remove rsync, Subversion and Unison support because it was possible to gain shell access through them (CVE-2007-6350). Closes: #437148. * scp: -o and -F options are dangerous (CVE-2007-6415). oldstable/main/binary-mipsel/scponly_4.0-1sarge2_mipsel.deb scponly (4.0-1sarge2) oldstable-security; urgency=high * Non-maintainer upload by the Security Team * Remove rsync, Subversion and Unison support because it was possible to gain shell access through them (CVE-2007-6350). Closes: #437148. * scp: -o and -F options are dangerous (CVE-2007-6415). oldstable/main/binary-mips/scponly_4.0-1sarge2_mips.deb scponly (4.0-1sarge2) oldstable-security; urgency=high * Non-maintainer upload by the Security Team * Remove rsync, Subversion and Unison support because it was possible to gain shell access through them (CVE-2007-6350). Closes: #437148. * scp: -o and -F options are dangerous (CVE-2007-6415). oldstable/main/binary-m68k/scponly_4.0-1sarge2_m68k.deb scponly (4.0-1sarge2) oldstable-security; urgency=high * Non-maintainer upload by the Security Team * Remove rsync, Subversion and Unison support because it was possible to gain shell access through them (CVE-2007-6350). Closes: #437148. * scp: -o and -F options are dangerous (CVE-2007-6415). oldstable/main/binary-ia64/scponly_4.0-1sarge2_ia64.deb scponly (4.0-1sarge2) oldstable-security; urgency=high * Non-maintainer upload by the Security Team * Remove rsync, Subversion and Unison support because it was possible to gain shell access through them (CVE-2007-6350). Closes: #437148. * scp: -o and -F options are dangerous (CVE-2007-6415). oldstable/main/binary-hppa/scponly_4.0-1sarge2_hppa.deb scponly (4.0-1sarge2) oldstable-security; urgency=high * Non-maintainer upload by the Security Team * Remove rsync, Subversion and Unison support because it was possible to gain shell access through them (CVE-2007-6350). Closes: #437148. * scp: -o and -F options are dangerous (CVE-2007-6415). oldstable/main/binary-arm/scponly_4.0-1sarge2_arm.deb scponly (4.0-1sarge2) oldstable-security; urgency=high * Non-maintainer upload by the Security Team * Remove rsync, Subversion and Unison support because it was possible to gain shell access through them (CVE-2007-6350). Closes: #437148. * scp: -o and -F options are dangerous (CVE-2007-6415). oldstable/main/binary-amd64/scponly_4.0-1sarge2_amd64.deb scponly (4.0-1sarge2) oldstable-security; urgency=high * Non-maintainer upload by the Security Team * Remove rsync, Subversion and Unison support because it was possible to gain shell access through them (CVE-2007-6350). Closes: #437148. * scp: -o and -F options are dangerous (CVE-2007-6415). oldstable/main/binary-alpha/scponly_4.0-1sarge2_alpha.deb scponly (4.0-1sarge2) oldstable-security; urgency=high * Non-maintainer upload by the Security Team * Remove rsync, Subversion and Unison support because it was possible to gain shell access through them (CVE-2007-6350). Closes: #437148. * scp: -o and -F options are dangerous (CVE-2007-6415). oldstable/main/binary-i386/scponly_4.0-1sarge2_i386.deb oldstable/main/source/scponly_4.0-1sarge2.dsc oldstable/main/source/scponly_4.0-1sarge2.diff.gz scponly (4.0-1sarge2) oldstable-security; urgency=high * Non-maintainer upload by the Security Team * Remove rsync, Subversion and Unison support because it was possible to gain shell access through them (CVE-2007-6350). Closes: #437148. * scp: -o and -F options are dangerous (CVE-2007-6415). oldstable/main/binary-m68k/libpt-dbg_1.8.4-1+sarge1.1_m68k.deb oldstable/main/binary-m68k/libpt-plugins-v4l2_1.8.4-1+sarge1.1_m68k.deb oldstable/main/binary-m68k/libpt-plugins-alsa_1.8.4-1+sarge1.1_m68k.deb oldstable/main/binary-m68k/libpt-1.8.3_1.8.4-1+sarge1.1_m68k.deb oldstable/main/binary-m68k/libpt-plugins-avc_1.8.4-1+sarge1.1_m68k.deb oldstable/main/binary-m68k/libpt-dev_1.8.4-1+sarge1.1_m68k.deb oldstable/main/binary-m68k/libpt-plugins-v4l_1.8.4-1+sarge1.1_m68k.deb oldstable/main/binary-m68k/libpt-plugins-oss_1.8.4-1+sarge1.1_m68k.deb oldstable/main/binary-m68k/libpt-plugins-dc_1.8.4-1+sarge1.1_m68k.deb pwlib (1.8.4-1+sarge1.1) oldstable-proposed-updates; urgency=low * Non-maintainer upload. * Fix to build with sudo on the autobuilders. oldstable/main/binary-sparc/postgresql-contrib_7.4.7-6sarge6_sparc.deb oldstable/main/binary-sparc/postgresql-client_7.4.7-6sarge6_sparc.deb oldstable/main/binary-sparc/libecpg4_7.4.7-6sarge6_sparc.deb oldstable/main/binary-sparc/libpgtcl-dev_7.4.7-6sarge6_sparc.deb oldstable/main/binary-sparc/postgresql-dev_7.4.7-6sarge6_sparc.deb oldstable/main/binary-sparc/libpq3_7.4.7-6sarge6_sparc.deb oldstable/main/binary-sparc/libpgtcl_7.4.7-6sarge6_sparc.deb oldstable/main/binary-sparc/postgresql_7.4.7-6sarge6_sparc.deb oldstable/main/binary-sparc/libecpg-dev_7.4.7-6sarge6_sparc.deb postgresql (7.4.7-6sarge6) oldstable-security; urgency=low * SECURITY UPDATE: User privilege escalation. * Add debian/patches/63dblink_restrictions.patch: - Require non-superusers who use "/contrib/dblink" to use only password authentication, to prevent abusing the postmaster as source for remote attacks with trust or ident authentication. [CVE-2007-3278, CVE-2007-6601] - Patch backported from 7.4.19 CVS: http://developer.postgresql.org/cvsweb.cgi/pgsql/contrib/dblink/dblink.c.diff?r1=1.25.4.4;r2=1.25.4.6 http://developer.postgresql.org/cvsweb.cgi/pgsql/contrib/dblink/dblink.sql.in.diff?r1=1.8;r2=1.8.4.1 oldstable/main/binary-s390/libpgtcl-dev_7.4.7-6sarge6_s390.deb oldstable/main/binary-s390/postgresql_7.4.7-6sarge6_s390.deb oldstable/main/binary-s390/libecpg4_7.4.7-6sarge6_s390.deb oldstable/main/binary-s390/libpgtcl_7.4.7-6sarge6_s390.deb oldstable/main/binary-s390/postgresql-dev_7.4.7-6sarge6_s390.deb oldstable/main/binary-s390/postgresql-client_7.4.7-6sarge6_s390.deb oldstable/main/binary-s390/postgresql-contrib_7.4.7-6sarge6_s390.deb oldstable/main/binary-s390/libpq3_7.4.7-6sarge6_s390.deb oldstable/main/binary-s390/libecpg-dev_7.4.7-6sarge6_s390.deb postgresql (7.4.7-6sarge6) oldstable-security; urgency=low * SECURITY UPDATE: User privilege escalation. * Add debian/patches/63dblink_restrictions.patch: - Require non-superusers who use "/contrib/dblink" to use only password authentication, to prevent abusing the postmaster as source for remote attacks with trust or ident authentication. [CVE-2007-3278, CVE-2007-6601] - Patch backported from 7.4.19 CVS: http://developer.postgresql.org/cvsweb.cgi/pgsql/contrib/dblink/dblink.c.diff?r1=1.25.4.4;r2=1.25.4.6 http://developer.postgresql.org/cvsweb.cgi/pgsql/contrib/dblink/dblink.sql.in.diff?r1=1.8;r2=1.8.4.1 oldstable/main/binary-powerpc/libpq3_7.4.7-6sarge6_powerpc.deb oldstable/main/binary-powerpc/libecpg-dev_7.4.7-6sarge6_powerpc.deb oldstable/main/binary-powerpc/postgresql_7.4.7-6sarge6_powerpc.deb oldstable/main/binary-powerpc/libpgtcl-dev_7.4.7-6sarge6_powerpc.deb oldstable/main/binary-powerpc/postgresql-contrib_7.4.7-6sarge6_powerpc.deb oldstable/main/binary-powerpc/libpgtcl_7.4.7-6sarge6_powerpc.deb oldstable/main/binary-powerpc/postgresql-dev_7.4.7-6sarge6_powerpc.deb oldstable/main/binary-powerpc/libecpg4_7.4.7-6sarge6_powerpc.deb oldstable/main/binary-powerpc/postgresql-client_7.4.7-6sarge6_powerpc.deb postgresql (7.4.7-6sarge6) oldstable-security; urgency=low * SECURITY UPDATE: User privilege escalation. * Add debian/patches/63dblink_restrictions.patch: - Require non-superusers who use "/contrib/dblink" to use only password authentication, to prevent abusing the postmaster as source for remote attacks with trust or ident authentication. [CVE-2007-3278, CVE-2007-6601] - Patch backported from 7.4.19 CVS: http://developer.postgresql.org/cvsweb.cgi/pgsql/contrib/dblink/dblink.c.diff?r1=1.25.4.4;r2=1.25.4.6 http://developer.postgresql.org/cvsweb.cgi/pgsql/contrib/dblink/dblink.sql.in.diff?r1=1.8;r2=1.8.4.1 oldstable/main/binary-mipsel/libecpg4_7.4.7-6sarge6_mipsel.deb oldstable/main/binary-mipsel/postgresql-client_7.4.7-6sarge6_mipsel.deb oldstable/main/binary-mipsel/postgresql_7.4.7-6sarge6_mipsel.deb oldstable/main/binary-mipsel/libpgtcl-dev_7.4.7-6sarge6_mipsel.deb oldstable/main/binary-mipsel/libecpg-dev_7.4.7-6sarge6_mipsel.deb oldstable/main/binary-mipsel/libpq3_7.4.7-6sarge6_mipsel.deb oldstable/main/binary-mipsel/libpgtcl_7.4.7-6sarge6_mipsel.deb oldstable/main/binary-mipsel/postgresql-dev_7.4.7-6sarge6_mipsel.deb oldstable/main/binary-mipsel/postgresql-contrib_7.4.7-6sarge6_mipsel.deb postgresql (7.4.7-6sarge6) oldstable-security; urgency=low * SECURITY UPDATE: User privilege escalation. * Add debian/patches/63dblink_restrictions.patch: - Require non-superusers who use "/contrib/dblink" to use only password authentication, to prevent abusing the postmaster as source for remote attacks with trust or ident authentication. [CVE-2007-3278, CVE-2007-6601] - Patch backported from 7.4.19 CVS: http://developer.postgresql.org/cvsweb.cgi/pgsql/contrib/dblink/dblink.c.diff?r1=1.25.4.4;r2=1.25.4.6 http://developer.postgresql.org/cvsweb.cgi/pgsql/contrib/dblink/dblink.sql.in.diff?r1=1.8;r2=1.8.4.1 oldstable/main/binary-mips/postgresql_7.4.7-6sarge6_mips.deb oldstable/main/binary-mips/libecpg-dev_7.4.7-6sarge6_mips.deb oldstable/main/binary-mips/libpq3_7.4.7-6sarge6_mips.deb oldstable/main/binary-mips/libpgtcl_7.4.7-6sarge6_mips.deb oldstable/main/binary-mips/libecpg4_7.4.7-6sarge6_mips.deb oldstable/main/binary-mips/libpgtcl-dev_7.4.7-6sarge6_mips.deb oldstable/main/binary-mips/postgresql-dev_7.4.7-6sarge6_mips.deb oldstable/main/binary-mips/postgresql-contrib_7.4.7-6sarge6_mips.deb oldstable/main/binary-mips/postgresql-client_7.4.7-6sarge6_mips.deb postgresql (7.4.7-6sarge6) oldstable-security; urgency=low * SECURITY UPDATE: User privilege escalation. * Add debian/patches/63dblink_restrictions.patch: - Require non-superusers who use "/contrib/dblink" to use only password authentication, to prevent abusing the postmaster as source for remote attacks with trust or ident authentication. [CVE-2007-3278, CVE-2007-6601] - Patch backported from 7.4.19 CVS: http://developer.postgresql.org/cvsweb.cgi/pgsql/contrib/dblink/dblink.c.diff?r1=1.25.4.4;r2=1.25.4.6 http://developer.postgresql.org/cvsweb.cgi/pgsql/contrib/dblink/dblink.sql.in.diff?r1=1.8;r2=1.8.4.1 oldstable/main/binary-m68k/postgresql-contrib_7.4.7-6sarge6_m68k.deb oldstable/main/binary-m68k/libpgtcl_7.4.7-6sarge6_m68k.deb oldstable/main/binary-m68k/libpq3_7.4.7-6sarge6_m68k.deb oldstable/main/binary-m68k/libecpg4_7.4.7-6sarge6_m68k.deb oldstable/main/binary-m68k/libecpg-dev_7.4.7-6sarge6_m68k.deb oldstable/main/binary-m68k/postgresql_7.4.7-6sarge6_m68k.deb oldstable/main/binary-m68k/libpgtcl-dev_7.4.7-6sarge6_m68k.deb oldstable/main/binary-m68k/postgresql-client_7.4.7-6sarge6_m68k.deb oldstable/main/binary-m68k/postgresql-dev_7.4.7-6sarge6_m68k.deb postgresql (7.4.7-6sarge6) oldstable-security; urgency=low * SECURITY UPDATE: User privilege escalation. * Add debian/patches/63dblink_restrictions.patch: - Require non-superusers who use "/contrib/dblink" to use only password authentication, to prevent abusing the postmaster as source for remote attacks with trust or ident authentication. [CVE-2007-3278, CVE-2007-6601] - Patch backported from 7.4.19 CVS: http://developer.postgresql.org/cvsweb.cgi/pgsql/contrib/dblink/dblink.c.diff?r1=1.25.4.4;r2=1.25.4.6 http://developer.postgresql.org/cvsweb.cgi/pgsql/contrib/dblink/dblink.sql.in.diff?r1=1.8;r2=1.8.4.1 oldstable/main/binary-ia64/libpgtcl-dev_7.4.7-6sarge6_ia64.deb oldstable/main/binary-ia64/libpgtcl_7.4.7-6sarge6_ia64.deb oldstable/main/binary-ia64/postgresql-contrib_7.4.7-6sarge6_ia64.deb oldstable/main/binary-ia64/libecpg4_7.4.7-6sarge6_ia64.deb oldstable/main/binary-ia64/libecpg-dev_7.4.7-6sarge6_ia64.deb oldstable/main/binary-ia64/postgresql_7.4.7-6sarge6_ia64.deb oldstable/main/binary-ia64/libpq3_7.4.7-6sarge6_ia64.deb oldstable/main/binary-ia64/postgresql-client_7.4.7-6sarge6_ia64.deb oldstable/main/binary-ia64/postgresql-dev_7.4.7-6sarge6_ia64.deb postgresql (7.4.7-6sarge6) oldstable-security; urgency=low * SECURITY UPDATE: User privilege escalation. * Add debian/patches/63dblink_restrictions.patch: - Require non-superusers who use "/contrib/dblink" to use only password authentication, to prevent abusing the postmaster as source for remote attacks with trust or ident authentication. [CVE-2007-3278, CVE-2007-6601] - Patch backported from 7.4.19 CVS: http://developer.postgresql.org/cvsweb.cgi/pgsql/contrib/dblink/dblink.c.diff?r1=1.25.4.4;r2=1.25.4.6 http://developer.postgresql.org/cvsweb.cgi/pgsql/contrib/dblink/dblink.sql.in.diff?r1=1.8;r2=1.8.4.1 oldstable/main/binary-hppa/libpq3_7.4.7-6sarge6_hppa.deb oldstable/main/binary-hppa/postgresql-contrib_7.4.7-6sarge6_hppa.deb oldstable/main/binary-hppa/libecpg-dev_7.4.7-6sarge6_hppa.deb oldstable/main/binary-hppa/libpgtcl_7.4.7-6sarge6_hppa.deb oldstable/main/binary-hppa/libecpg4_7.4.7-6sarge6_hppa.deb oldstable/main/binary-hppa/postgresql-dev_7.4.7-6sarge6_hppa.deb oldstable/main/binary-hppa/postgresql_7.4.7-6sarge6_hppa.deb oldstable/main/binary-hppa/libpgtcl-dev_7.4.7-6sarge6_hppa.deb oldstable/main/binary-hppa/postgresql-client_7.4.7-6sarge6_hppa.deb postgresql (7.4.7-6sarge6) oldstable-security; urgency=low * SECURITY UPDATE: User privilege escalation. * Add debian/patches/63dblink_restrictions.patch: - Require non-superusers who use "/contrib/dblink" to use only password authentication, to prevent abusing the postmaster as source for remote attacks with trust or ident authentication. [CVE-2007-3278, CVE-2007-6601] - Patch backported from 7.4.19 CVS: http://developer.postgresql.org/cvsweb.cgi/pgsql/contrib/dblink/dblink.c.diff?r1=1.25.4.4;r2=1.25.4.6 http://developer.postgresql.org/cvsweb.cgi/pgsql/contrib/dblink/dblink.sql.in.diff?r1=1.8;r2=1.8.4.1 oldstable/main/binary-arm/postgresql-client_7.4.7-6sarge6_arm.deb oldstable/main/binary-arm/libpq3_7.4.7-6sarge6_arm.deb oldstable/main/binary-arm/postgresql_7.4.7-6sarge6_arm.deb oldstable/main/binary-arm/libecpg4_7.4.7-6sarge6_arm.deb oldstable/main/binary-arm/libpgtcl_7.4.7-6sarge6_arm.deb oldstable/main/binary-arm/postgresql-contrib_7.4.7-6sarge6_arm.deb oldstable/main/binary-arm/libpgtcl-dev_7.4.7-6sarge6_arm.deb oldstable/main/binary-arm/postgresql-dev_7.4.7-6sarge6_arm.deb oldstable/main/binary-arm/libecpg-dev_7.4.7-6sarge6_arm.deb postgresql (7.4.7-6sarge6) oldstable-security; urgency=low * SECURITY UPDATE: User privilege escalation. * Add debian/patches/63dblink_restrictions.patch: - Require non-superusers who use "/contrib/dblink" to use only password authentication, to prevent abusing the postmaster as source for remote attacks with trust or ident authentication. [CVE-2007-3278, CVE-2007-6601] - Patch backported from 7.4.19 CVS: http://developer.postgresql.org/cvsweb.cgi/pgsql/contrib/dblink/dblink.c.diff?r1=1.25.4.4;r2=1.25.4.6 http://developer.postgresql.org/cvsweb.cgi/pgsql/contrib/dblink/dblink.sql.in.diff?r1=1.8;r2=1.8.4.1 oldstable/main/binary-amd64/postgresql_7.4.7-6sarge6_amd64.deb oldstable/main/binary-amd64/postgresql-dev_7.4.7-6sarge6_amd64.deb oldstable/main/binary-amd64/libpgtcl_7.4.7-6sarge6_amd64.deb oldstable/main/binary-amd64/libecpg4_7.4.7-6sarge6_amd64.deb oldstable/main/binary-amd64/postgresql-client_7.4.7-6sarge6_amd64.deb oldstable/main/binary-amd64/libpq3_7.4.7-6sarge6_amd64.deb oldstable/main/binary-amd64/libecpg-dev_7.4.7-6sarge6_amd64.deb oldstable/main/binary-amd64/postgresql-contrib_7.4.7-6sarge6_amd64.deb oldstable/main/binary-amd64/libpgtcl-dev_7.4.7-6sarge6_amd64.deb postgresql (7.4.7-6sarge6) oldstable-security; urgency=low * SECURITY UPDATE: User privilege escalation. * Add debian/patches/63dblink_restrictions.patch: - Require non-superusers who use "/contrib/dblink" to use only password authentication, to prevent abusing the postmaster as source for remote attacks with trust or ident authentication. [CVE-2007-3278, CVE-2007-6601] - Patch backported from 7.4.19 CVS: http://developer.postgresql.org/cvsweb.cgi/pgsql/contrib/dblink/dblink.c.diff?r1=1.25.4.4;r2=1.25.4.6 http://developer.postgresql.org/cvsweb.cgi/pgsql/contrib/dblink/dblink.sql.in.diff?r1=1.8;r2=1.8.4.1 oldstable/main/binary-alpha/postgresql_7.4.7-6sarge6_alpha.deb oldstable/main/binary-alpha/libpq3_7.4.7-6sarge6_alpha.deb oldstable/main/binary-alpha/libpgtcl-dev_7.4.7-6sarge6_alpha.deb oldstable/main/binary-alpha/postgresql-dev_7.4.7-6sarge6_alpha.deb oldstable/main/binary-alpha/libpgtcl_7.4.7-6sarge6_alpha.deb oldstable/main/binary-alpha/libecpg4_7.4.7-6sarge6_alpha.deb oldstable/main/binary-alpha/postgresql-client_7.4.7-6sarge6_alpha.deb oldstable/main/binary-alpha/postgresql-contrib_7.4.7-6sarge6_alpha.deb oldstable/main/binary-alpha/libecpg-dev_7.4.7-6sarge6_alpha.deb postgresql (7.4.7-6sarge6) oldstable-security; urgency=low * SECURITY UPDATE: User privilege escalation. * Add debian/patches/63dblink_restrictions.patch: - Require non-superusers who use "/contrib/dblink" to use only password authentication, to prevent abusing the postmaster as source for remote attacks with trust or ident authentication. [CVE-2007-3278, CVE-2007-6601] - Patch backported from 7.4.19 CVS: http://developer.postgresql.org/cvsweb.cgi/pgsql/contrib/dblink/dblink.c.diff?r1=1.25.4.4;r2=1.25.4.6 http://developer.postgresql.org/cvsweb.cgi/pgsql/contrib/dblink/dblink.sql.in.diff?r1=1.8;r2=1.8.4.1 oldstable/main/binary-i386/postgresql-client_7.4.7-6sarge6_i386.deb oldstable/main/binary-i386/libecpg-dev_7.4.7-6sarge6_i386.deb oldstable/main/binary-i386/postgresql_7.4.7-6sarge6_i386.deb oldstable/main/binary-i386/libpq3_7.4.7-6sarge6_i386.deb oldstable/main/binary-i386/libpgtcl_7.4.7-6sarge6_i386.deb oldstable/main/binary-i386/postgresql-dev_7.4.7-6sarge6_i386.deb oldstable/main/source/postgresql_7.4.7-6sarge6.dsc oldstable/main/source/postgresql_7.4.7-6sarge6.diff.gz oldstable/main/binary-i386/libecpg4_7.4.7-6sarge6_i386.deb oldstable/main/binary-all/postgresql-doc_7.4.7-6sarge6_all.deb oldstable/main/binary-i386/postgresql-contrib_7.4.7-6sarge6_i386.deb oldstable/main/binary-i386/libpgtcl-dev_7.4.7-6sarge6_i386.deb postgresql (7.4.7-6sarge6) oldstable-security; urgency=low * SECURITY UPDATE: User privilege escalation. * Add debian/patches/63dblink_restrictions.patch: - Require non-superusers who use "/contrib/dblink" to use only password authentication, to prevent abusing the postmaster as source for remote attacks with trust or ident authentication. [CVE-2007-3278, CVE-2007-6601] - Patch backported from 7.4.19 CVS: http://developer.postgresql.org/cvsweb.cgi/pgsql/contrib/dblink/dblink.c.diff?r1=1.25.4.4;r2=1.25.4.6 http://developer.postgresql.org/cvsweb.cgi/pgsql/contrib/dblink/dblink.sql.in.diff?r1=1.8;r2=1.8.4.1 oldstable/main/source/phpbb2_2.0.13+1-6sarge4.dsc oldstable/main/binary-all/phpbb2_2.0.13-6sarge4_all.deb oldstable/main/binary-all/phpbb2-conf-mysql_2.0.13-6sarge4_all.deb oldstable/main/binary-all/phpbb2-languages_2.0.13-6sarge4_all.deb oldstable/main/source/phpbb2_2.0.13+1-6sarge4.diff.gz phpbb2 (2.0.13+1-6sarge4) oldstable-security; urgency=high * Upload to sarge to address security issues. * CVE-2006-4758: authenticated admin may upload arbitrary files (very minor issue, closes: 388120). * CVE-2006-6839: update criteria for redirection targets. * CVE-2006-6840: fix negative start parameter. * CVE-2006-6508/CVE-2006-6841: fix csrf (closes: 405980). * CVE-2008-0471: fix csrf (closes: 463589). oldstable/main/binary-sparc/libpcre3-dev_4.5+7.4-2_sparc.deb oldstable/main/binary-sparc/libpcre3_4.5+7.4-2_sparc.deb oldstable/main/binary-sparc/pcregrep_4.5+7.4-2_sparc.deb pcre3 (4.5+7.4-2) oldstable-security; urgency=high * Non-maintainer upload by the security team. * A character class containing a very large number of characters with codepoints greater than 255 caused a buffer overflow. (CVE-2008-0674) oldstable/main/binary-s390/libpcre3_4.5+7.4-2_s390.deb oldstable/main/binary-s390/pcregrep_4.5+7.4-2_s390.deb oldstable/main/binary-s390/libpcre3-dev_4.5+7.4-2_s390.deb pcre3 (4.5+7.4-2) oldstable-security; urgency=high * Non-maintainer upload by the security team. * A character class containing a very large number of characters with codepoints greater than 255 caused a buffer overflow. (CVE-2008-0674) oldstable/main/binary-powerpc/libpcre3_4.5+7.4-2_powerpc.deb oldstable/main/binary-powerpc/libpcre3-dev_4.5+7.4-2_powerpc.deb oldstable/main/binary-powerpc/pcregrep_4.5+7.4-2_powerpc.deb pcre3 (4.5+7.4-2) oldstable-security; urgency=high * Non-maintainer upload by the security team. * A character class containing a very large number of characters with codepoints greater than 255 caused a buffer overflow. (CVE-2008-0674) oldstable/main/binary-mipsel/libpcre3-dev_4.5+7.4-2_mipsel.deb oldstable/main/binary-mipsel/libpcre3_4.5+7.4-2_mipsel.deb oldstable/main/binary-mipsel/pcregrep_4.5+7.4-2_mipsel.deb pcre3 (4.5+7.4-2) oldstable-security; urgency=high * Non-maintainer upload by the security team. * A character class containing a very large number of characters with codepoints greater than 255 caused a buffer overflow. (CVE-2008-0674) oldstable/main/binary-mips/libpcre3_4.5+7.4-2_mips.deb oldstable/main/binary-mips/libpcre3-dev_4.5+7.4-2_mips.deb oldstable/main/binary-mips/pcregrep_4.5+7.4-2_mips.deb pcre3 (4.5+7.4-2) oldstable-security; urgency=high * Non-maintainer upload by the security team. * A character class containing a very large number of characters with codepoints greater than 255 caused a buffer overflow. (CVE-2008-0674) oldstable/main/binary-m68k/libpcre3_4.5+7.4-2_m68k.deb oldstable/main/binary-m68k/pcregrep_4.5+7.4-2_m68k.deb oldstable/main/binary-m68k/libpcre3-dev_4.5+7.4-2_m68k.deb pcre3 (4.5+7.4-2) oldstable-security; urgency=high * Non-maintainer upload by the security team. * A character class containing a very large number of characters with codepoints greater than 255 caused a buffer overflow. (CVE-2008-0674) oldstable/main/binary-ia64/libpcre3-dev_4.5+7.4-2_ia64.deb oldstable/main/binary-ia64/libpcre3_4.5+7.4-2_ia64.deb oldstable/main/binary-ia64/pcregrep_4.5+7.4-2_ia64.deb pcre3 (4.5+7.4-2) oldstable-security; urgency=high * Non-maintainer upload by the security team. * A character class containing a very large number of characters with codepoints greater than 255 caused a buffer overflow. (CVE-2008-0674) oldstable/main/binary-hppa/libpcre3-dev_4.5+7.4-2_hppa.deb oldstable/main/binary-hppa/libpcre3_4.5+7.4-2_hppa.deb oldstable/main/binary-hppa/pcregrep_4.5+7.4-2_hppa.deb pcre3 (4.5+7.4-2) oldstable-security; urgency=high * Non-maintainer upload by the security team. * A character class containing a very large number of characters with codepoints greater than 255 caused a buffer overflow. (CVE-2008-0674) oldstable/main/binary-arm/libpcre3_4.5+7.4-2_arm.deb oldstable/main/binary-arm/libpcre3-dev_4.5+7.4-2_arm.deb oldstable/main/binary-arm/pcregrep_4.5+7.4-2_arm.deb pcre3 (4.5+7.4-2) oldstable-security; urgency=high * Non-maintainer upload by the security team. * A character class containing a very large number of characters with codepoints greater than 255 caused a buffer overflow. (CVE-2008-0674) oldstable/main/binary-amd64/libpcre3_4.5+7.4-2_amd64.deb oldstable/main/binary-amd64/libpcre3-dev_4.5+7.4-2_amd64.deb oldstable/main/binary-amd64/pcregrep_4.5+7.4-2_amd64.deb pcre3 (4.5+7.4-2) oldstable-security; urgency=high * Non-maintainer upload by the security team. * A character class containing a very large number of characters with codepoints greater than 255 caused a buffer overflow. (CVE-2008-0674) oldstable/main/binary-alpha/libpcre3_4.5+7.4-2_alpha.deb oldstable/main/binary-alpha/libpcre3-dev_4.5+7.4-2_alpha.deb oldstable/main/binary-alpha/pcregrep_4.5+7.4-2_alpha.deb pcre3 (4.5+7.4-2) oldstable-security; urgency=high * Non-maintainer upload by the security team. * A character class containing a very large number of characters with codepoints greater than 255 caused a buffer overflow. (CVE-2008-0674) oldstable/main/binary-i386/libpcre3_4.5+7.4-2_i386.deb oldstable/main/binary-i386/libpcre3-dev_4.5+7.4-2_i386.deb oldstable/main/source/pcre3_4.5+7.4-2.dsc oldstable/main/binary-i386/pcregrep_4.5+7.4-2_i386.deb oldstable/main/binary-all/pgrep_4.5+7.4-2_all.deb oldstable/main/source/pcre3_4.5+7.4-2.diff.gz pcre3 (4.5+7.4-2) oldstable-security; urgency=high * Non-maintainer upload by the security team. * A character class containing a very large number of characters with codepoints greater than 255 caused a buffer overflow. (CVE-2008-0674) oldstable/main/binary-sparc/openafs-kpasswd_1.3.81-3sarge3_sparc.deb oldstable/main/binary-sparc/openafs-dbserver_1.3.81-3sarge3_sparc.deb oldstable/main/binary-sparc/libpam-openafs-kaserver_1.3.81-3sarge3_sparc.deb oldstable/main/binary-sparc/openafs-client_1.3.81-3sarge3_sparc.deb oldstable/main/binary-sparc/libopenafs-dev_1.3.81-3sarge3_sparc.deb oldstable/main/binary-sparc/openafs-fileserver_1.3.81-3sarge3_sparc.deb openafs (1.3.81-3sarge3) oldstable-security; urgency=high * upload by the security team to fix CVE-2007-6599 (OpenAFS SA-2007-003) oldstable/main/binary-s390/openafs-dbserver_1.3.81-3sarge3_s390.deb oldstable/main/binary-s390/libpam-openafs-kaserver_1.3.81-3sarge3_s390.deb oldstable/main/binary-s390/openafs-client_1.3.81-3sarge3_s390.deb oldstable/main/binary-s390/libopenafs-dev_1.3.81-3sarge3_s390.deb oldstable/main/binary-s390/openafs-fileserver_1.3.81-3sarge3_s390.deb oldstable/main/binary-s390/openafs-kpasswd_1.3.81-3sarge3_s390.deb openafs (1.3.81-3sarge3) oldstable-security; urgency=high * upload by the security team to fix CVE-2007-6599 (OpenAFS SA-2007-003) oldstable/main/binary-powerpc/openafs-dbserver_1.3.81-3sarge3_powerpc.deb oldstable/main/binary-powerpc/openafs-kpasswd_1.3.81-3sarge3_powerpc.deb oldstable/main/binary-powerpc/openafs-client_1.3.81-3sarge3_powerpc.deb oldstable/main/binary-powerpc/openafs-fileserver_1.3.81-3sarge3_powerpc.deb oldstable/main/binary-powerpc/libopenafs-dev_1.3.81-3sarge3_powerpc.deb oldstable/main/binary-powerpc/libpam-openafs-kaserver_1.3.81-3sarge3_powerpc.deb openafs (1.3.81-3sarge3) oldstable-security; urgency=high * upload by the security team to fix CVE-2007-6599 (OpenAFS SA-2007-003) oldstable/main/binary-ia64/libopenafs-dev_1.3.81-3sarge3_ia64.deb oldstable/main/binary-ia64/openafs-dbserver_1.3.81-3sarge3_ia64.deb oldstable/main/binary-ia64/openafs-client_1.3.81-3sarge3_ia64.deb oldstable/main/binary-ia64/openafs-kpasswd_1.3.81-3sarge3_ia64.deb oldstable/main/binary-ia64/libpam-openafs-kaserver_1.3.81-3sarge3_ia64.deb oldstable/main/binary-ia64/openafs-fileserver_1.3.81-3sarge3_ia64.deb openafs (1.3.81-3sarge3) oldstable-security; urgency=high * upload by the security team to fix CVE-2007-6599 (OpenAFS SA-2007-003) oldstable/main/binary-hppa/libopenafs-dev_1.3.81-3sarge3_hppa.deb oldstable/main/binary-hppa/openafs-kpasswd_1.3.81-3sarge3_hppa.deb oldstable/main/binary-hppa/openafs-fileserver_1.3.81-3sarge3_hppa.deb oldstable/main/binary-hppa/libpam-openafs-kaserver_1.3.81-3sarge3_hppa.deb oldstable/main/binary-hppa/openafs-dbserver_1.3.81-3sarge3_hppa.deb oldstable/main/binary-hppa/openafs-client_1.3.81-3sarge3_hppa.deb openafs (1.3.81-3sarge3) oldstable-security; urgency=high * upload by the security team to fix CVE-2007-6599 (OpenAFS SA-2007-003) oldstable/main/binary-amd64/libpam-openafs-kaserver_1.3.81-3sarge3_amd64.deb oldstable/main/binary-amd64/libopenafs-dev_1.3.81-3sarge3_amd64.deb oldstable/main/binary-amd64/openafs-client_1.3.81-3sarge3_amd64.deb oldstable/main/binary-amd64/openafs-fileserver_1.3.81-3sarge3_amd64.deb oldstable/main/binary-amd64/openafs-dbserver_1.3.81-3sarge3_amd64.deb oldstable/main/binary-amd64/openafs-kpasswd_1.3.81-3sarge3_amd64.deb openafs (1.3.81-3sarge3) oldstable-security; urgency=high * upload by the security team to fix CVE-2007-6599 (OpenAFS SA-2007-003) oldstable/main/binary-alpha/openafs-fileserver_1.3.81-3sarge3_alpha.deb oldstable/main/binary-alpha/openafs-client_1.3.81-3sarge3_alpha.deb oldstable/main/binary-alpha/libpam-openafs-kaserver_1.3.81-3sarge3_alpha.deb oldstable/main/binary-alpha/libopenafs-dev_1.3.81-3sarge3_alpha.deb oldstable/main/binary-alpha/openafs-dbserver_1.3.81-3sarge3_alpha.deb oldstable/main/binary-alpha/openafs-kpasswd_1.3.81-3sarge3_alpha.deb openafs (1.3.81-3sarge3) oldstable-security; urgency=high * upload by the security team to fix CVE-2007-6599 (OpenAFS SA-2007-003) oldstable/main/binary-i386/libpam-openafs-kaserver_1.3.81-3sarge3_i386.deb oldstable/main/binary-all/openafs-modules-source_1.3.81-3sarge3_all.deb oldstable/main/binary-i386/openafs-client_1.3.81-3sarge3_i386.deb oldstable/main/binary-i386/openafs-fileserver_1.3.81-3sarge3_i386.deb oldstable/main/binary-i386/libopenafs-dev_1.3.81-3sarge3_i386.deb oldstable/main/binary-i386/openafs-kpasswd_1.3.81-3sarge3_i386.deb oldstable/main/source/openafs_1.3.81-3sarge3.diff.gz oldstable/main/binary-i386/openafs-dbserver_1.3.81-3sarge3_i386.deb oldstable/main/source/openafs_1.3.81-3sarge3.dsc openafs (1.3.81-3sarge3) oldstable-security; urgency=high * upload by the security team to fix CVE-2007-6599 (OpenAFS SA-2007-003) oldstable/main/binary-sparc/nagios-plugins_1.4-6sarge2_sparc.deb nagios-plugins (1.4-6sarge2) oldstable-security; urgency=high * NMU prepared for the security team by the package maintainer. * Fix the following regressions in the previous security upload: - check_procs/check_nagios/check_swap all fail to build correctly unless /proc is mounted, so fail gracefully in that case. closes: #465530 - check_mailq may default to /usr/sbin/mailq instead of /usr/bin/mailq if the the ssmtp package is installed at build-time. closes: #465749. - check_ping may fail to build correctly due to assumptions about host configuration and/or network connectivity. closes: #465854. oldstable/main/binary-s390/nagios-plugins_1.4-6sarge2_s390.deb nagios-plugins (1.4-6sarge2) oldstable-security; urgency=high * NMU prepared for the security team by the package maintainer. * Fix the following regressions in the previous security upload: - check_procs/check_nagios/check_swap all fail to build correctly unless /proc is mounted, so fail gracefully in that case. closes: #465530 - check_mailq may default to /usr/sbin/mailq instead of /usr/bin/mailq if the the ssmtp package is installed at build-time. closes: #465749. - check_ping may fail to build correctly due to assumptions about host configuration and/or network connectivity. closes: #465854. oldstable/main/binary-powerpc/nagios-plugins_1.4-6sarge2_powerpc.deb nagios-plugins (1.4-6sarge2) oldstable-security; urgency=high * NMU prepared for the security team by the package maintainer. * Fix the following regressions in the previous security upload: - check_procs/check_nagios/check_swap all fail to build correctly unless /proc is mounted, so fail gracefully in that case. closes: #465530 - check_mailq may default to /usr/sbin/mailq instead of /usr/bin/mailq if the the ssmtp package is installed at build-time. closes: #465749. - check_ping may fail to build correctly due to assumptions about host configuration and/or network connectivity. closes: #465854. oldstable/main/binary-mipsel/nagios-plugins_1.4-6sarge2_mipsel.deb nagios-plugins (1.4-6sarge2) oldstable-security; urgency=high * NMU prepared for the security team by the package maintainer. * Fix the following regressions in the previous security upload: - check_procs/check_nagios/check_swap all fail to build correctly unless /proc is mounted, so fail gracefully in that case. closes: #465530 - check_mailq may default to /usr/sbin/mailq instead of /usr/bin/mailq if the the ssmtp package is installed at build-time. closes: #465749. - check_ping may fail to build correctly due to assumptions about host configuration and/or network connectivity. closes: #465854. oldstable/main/binary-mips/nagios-plugins_1.4-6sarge2_mips.deb nagios-plugins (1.4-6sarge2) oldstable-security; urgency=high * NMU prepared for the security team by the package maintainer. * Fix the following regressions in the previous security upload: - check_procs/check_nagios/check_swap all fail to build correctly unless /proc is mounted, so fail gracefully in that case. closes: #465530 - check_mailq may default to /usr/sbin/mailq instead of /usr/bin/mailq if the the ssmtp package is installed at build-time. closes: #465749. - check_ping may fail to build correctly due to assumptions about host configuration and/or network connectivity. closes: #465854. oldstable/main/binary-m68k/nagios-plugins_1.4-6sarge2_m68k.deb nagios-plugins (1.4-6sarge2) oldstable-security; urgency=high * NMU prepared for the security team by the package maintainer. * Fix the following regressions in the previous security upload: - check_procs/check_nagios/check_swap all fail to build correctly unless /proc is mounted, so fail gracefully in that case. closes: #465530 - check_mailq may default to /usr/sbin/mailq instead of /usr/bin/mailq if the the ssmtp package is installed at build-time. closes: #465749. - check_ping may fail to build correctly due to assumptions about host configuration and/or network connectivity. closes: #465854. oldstable/main/binary-ia64/nagios-plugins_1.4-6sarge2_ia64.deb nagios-plugins (1.4-6sarge2) oldstable-security; urgency=high * NMU prepared for the security team by the package maintainer. * Fix the following regressions in the previous security upload: - check_procs/check_nagios/check_swap all fail to build correctly unless /proc is mounted, so fail gracefully in that case. closes: #465530 - check_mailq may default to /usr/sbin/mailq instead of /usr/bin/mailq if the the ssmtp package is installed at build-time. closes: #465749. - check_ping may fail to build correctly due to assumptions about host configuration and/or network connectivity. closes: #465854. oldstable/main/binary-hppa/nagios-plugins_1.4-6sarge2_hppa.deb nagios-plugins (1.4-6sarge2) oldstable-security; urgency=high * NMU prepared for the security team by the package maintainer. * Fix the following regressions in the previous security upload: - check_procs/check_nagios/check_swap all fail to build correctly unless /proc is mounted, so fail gracefully in that case. closes: #465530 - check_mailq may default to /usr/sbin/mailq instead of /usr/bin/mailq if the the ssmtp package is installed at build-time. closes: #465749. - check_ping may fail to build correctly due to assumptions about host configuration and/or network connectivity. closes: #465854. oldstable/main/binary-arm/nagios-plugins_1.4-6sarge2_arm.deb nagios-plugins (1.4-6sarge2) oldstable-security; urgency=high * NMU prepared for the security team by the package maintainer. * Fix the following regressions in the previous security upload: - check_procs/check_nagios/check_swap all fail to build correctly unless /proc is mounted, so fail gracefully in that case. closes: #465530 - check_mailq may default to /usr/sbin/mailq instead of /usr/bin/mailq if the the ssmtp package is installed at build-time. closes: #465749. - check_ping may fail to build correctly due to assumptions about host configuration and/or network connectivity. closes: #465854. oldstable/main/binary-amd64/nagios-plugins_1.4-6sarge2_amd64.deb nagios-plugins (1.4-6sarge2) oldstable-security; urgency=high * NMU prepared for the security team by the package maintainer. * Fix the following regressions in the previous security upload: - check_procs/check_nagios/check_swap all fail to build correctly unless /proc is mounted, so fail gracefully in that case. closes: #465530 - check_mailq may default to /usr/sbin/mailq instead of /usr/bin/mailq if the the ssmtp package is installed at build-time. closes: #465749. - check_ping may fail to build correctly due to assumptions about host configuration and/or network connectivity. closes: #465854. oldstable/main/binary-alpha/nagios-plugins_1.4-6sarge2_alpha.deb nagios-plugins (1.4-6sarge2) oldstable-security; urgency=high * NMU prepared for the security team by the package maintainer. * Fix the following regressions in the previous security upload: - check_procs/check_nagios/check_swap all fail to build correctly unless /proc is mounted, so fail gracefully in that case. closes: #465530 - check_mailq may default to /usr/sbin/mailq instead of /usr/bin/mailq if the the ssmtp package is installed at build-time. closes: #465749. - check_ping may fail to build correctly due to assumptions about host configuration and/or network connectivity. closes: #465854. oldstable/main/binary-i386/nagios-plugins_1.4-6sarge2_i386.deb oldstable/main/source/nagios-plugins_1.4-6sarge2.dsc oldstable/main/source/nagios-plugins_1.4-6sarge2.diff.gz nagios-plugins (1.4-6sarge2) oldstable-security; urgency=high * NMU prepared for the security team by the package maintainer. * Fix the following regressions in the previous security upload: - check_procs/check_nagios/check_swap all fail to build correctly unless /proc is mounted, so fail gracefully in that case. closes: #465530 - check_mailq may default to /usr/sbin/mailq instead of /usr/bin/mailq if the the ssmtp package is installed at build-time. closes: #465749. - check_ping may fail to build correctly due to assumptions about host configuration and/or network connectivity. closes: #465854. oldstable/main/binary-sparc/maradns_1.0.27-2_sparc.deb maradns (1.0.27-2) oldstable-security; urgency=high * Fix remote DoS oldstable/main/binary-s390/maradns_1.0.27-2_s390.deb maradns (1.0.27-2) oldstable-security; urgency=high * Fix remote DoS oldstable/main/binary-powerpc/maradns_1.0.27-2_powerpc.deb maradns (1.0.27-2) oldstable-security; urgency=high * Fix remote DoS oldstable/main/binary-mipsel/maradns_1.0.27-2_mipsel.deb maradns (1.0.27-2) oldstable-security; urgency=high * Fix remote DoS oldstable/main/binary-mips/maradns_1.0.27-2_mips.deb maradns (1.0.27-2) oldstable-security; urgency=high * Fix remote DoS oldstable/main/binary-m68k/maradns_1.0.27-2_m68k.deb maradns (1.0.27-2) oldstable-security; urgency=high * Fix remote DoS oldstable/main/binary-ia64/maradns_1.0.27-2_ia64.deb maradns (1.0.27-2) oldstable-security; urgency=high * Fix remote DoS oldstable/main/binary-hppa/maradns_1.0.27-2_hppa.deb maradns (1.0.27-2) oldstable-security; urgency=high * Fix remote DoS oldstable/main/binary-arm/maradns_1.0.27-2_arm.deb maradns (1.0.27-2) oldstable-security; urgency=high * Fix remote DoS oldstable/main/binary-amd64/maradns_1.0.27-2_amd64.deb maradns (1.0.27-2) oldstable-security; urgency=high * Fix remote DoS oldstable/main/binary-alpha/maradns_1.0.27-2_alpha.deb maradns (1.0.27-2) oldstable-security; urgency=high * Fix remote DoS oldstable/main/binary-i386/maradns_1.0.27-2_i386.deb oldstable/main/source/maradns_1.0.27-2.dsc oldstable/main/source/maradns_1.0.27-2.diff.gz maradns (1.0.27-2) oldstable-security; urgency=high * Fix remote DoS oldstable/main/binary-all/mantis_0.19.2-5sarge5_all.deb oldstable/main/source/mantis_0.19.2-5sarge5.dsc oldstable/main/source/mantis_0.19.2-5sarge5.diff.gz mantis (0.19.2-5sarge5) oldstable-security; urgency=high * Maintainer upload for the security team * Fixed security issue CVE-2007-6611: "Upload File" Script insertion vulnerability by applying the patch from sid. (Closes: #458377) * Fixed security issue CVE-2006-6574: Custom Field Information Disclosure by backporting changes in history_api.php from sid (Closes: #402802) * Fixed security issue: Email notifications bypass security on custom fields * Fixed multiple XSS vulnerabilites by backporting changes from upstream version 1.0.7 oldstable/main/binary-sparc/loop-aes-utils_2.12p-4sarge2_sparc.deb loop-aes-utils (2.12p-4sarge2) oldstable-security; urgency=high * Non-maintainer upload by the security team * Fix privilege escalation by calling setuid() and setgid() in the wrong order and not checking the return values in mount and umount Fixes: CVE-2007-5191 oldstable/main/binary-s390/loop-aes-utils_2.12p-4sarge2_s390.deb loop-aes-utils (2.12p-4sarge2) oldstable-security; urgency=high * Non-maintainer upload by the security team * Fix privilege escalation by calling setuid() and setgid() in the wrong order and not checking the return values in mount and umount Fixes: CVE-2007-5191 oldstable/main/binary-powerpc/loop-aes-utils_2.12p-4sarge2_powerpc.deb loop-aes-utils (2.12p-4sarge2) oldstable-security; urgency=high * Non-maintainer upload by the security team * Fix privilege escalation by calling setuid() and setgid() in the wrong order and not checking the return values in mount and umount Fixes: CVE-2007-5191 oldstable/main/binary-mipsel/loop-aes-utils_2.12p-4sarge2_mipsel.deb loop-aes-utils (2.12p-4sarge2) oldstable-security; urgency=high * Non-maintainer upload by the security team * Fix privilege escalation by calling setuid() and setgid() in the wrong order and not checking the return values in mount and umount Fixes: CVE-2007-5191 oldstable/main/binary-mips/loop-aes-utils_2.12p-4sarge2_mips.deb loop-aes-utils (2.12p-4sarge2) oldstable-security; urgency=high * Non-maintainer upload by the security team * Fix privilege escalation by calling setuid() and setgid() in the wrong order and not checking the return values in mount and umount Fixes: CVE-2007-5191 oldstable/main/binary-m68k/loop-aes-utils_2.12p-4sarge2_m68k.deb loop-aes-utils (2.12p-4sarge2) oldstable-security; urgency=high * Non-maintainer upload by the security team * Fix privilege escalation by calling setuid() and setgid() in the wrong order and not checking the return values in mount and umount Fixes: CVE-2007-5191 oldstable/main/binary-ia64/loop-aes-utils_2.12p-4sarge2_ia64.deb loop-aes-utils (2.12p-4sarge2) oldstable-security; urgency=high * Non-maintainer upload by the security team * Fix privilege escalation by calling setuid() and setgid() in the wrong order and not checking the return values in mount and umount Fixes: CVE-2007-5191 oldstable/main/binary-hppa/loop-aes-utils_2.12p-4sarge2_hppa.deb loop-aes-utils (2.12p-4sarge2) oldstable-security; urgency=high * Non-maintainer upload by the security team * Fix privilege escalation by calling setuid() and setgid() in the wrong order and not checking the return values in mount and umount Fixes: CVE-2007-5191 oldstable/main/binary-arm/loop-aes-utils_2.12p-4sarge2_arm.deb loop-aes-utils (2.12p-4sarge2) oldstable-security; urgency=high * Non-maintainer upload by the security team * Fix privilege escalation by calling setuid() and setgid() in the wrong order and not checking the return values in mount and umount Fixes: CVE-2007-5191 oldstable/main/binary-amd64/loop-aes-utils_2.12p-4sarge2_amd64.deb loop-aes-utils (2.12p-4sarge2) oldstable-security; urgency=high * Non-maintainer upload by the security team * Fix privilege escalation by calling setuid() and setgid() in the wrong order and not checking the return values in mount and umount Fixes: CVE-2007-5191 oldstable/main/binary-alpha/loop-aes-utils_2.12p-4sarge2_alpha.deb loop-aes-utils (2.12p-4sarge2) oldstable-security; urgency=high * Non-maintainer upload by the security team * Fix privilege escalation by calling setuid() and setgid() in the wrong order and not checking the return values in mount and umount Fixes: CVE-2007-5191 oldstable/main/binary-i386/loop-aes-utils_2.12p-4sarge2_i386.deb oldstable/main/source/loop-aes-utils_2.12p-4sarge2.dsc oldstable/main/source/loop-aes-utils_2.12p-4sarge2.diff.gz loop-aes-utils (2.12p-4sarge2) oldstable-security; urgency=high * Non-maintainer upload by the security team * Fix privilege escalation by calling setuid() and setgid() in the wrong order and not checking the return values in mount and umount Fixes: CVE-2007-5191 oldstable/main/binary-sparc/libxml2-utils_2.6.16-7sarge1_sparc.deb oldstable/main/binary-sparc/libxml2-dev_2.6.16-7sarge1_sparc.deb oldstable/main/binary-sparc/python2.4-libxml2_2.6.16-7sarge1_sparc.deb oldstable/main/binary-sparc/libxml2_2.6.16-7sarge1_sparc.deb oldstable/main/binary-sparc/python2.3-libxml2_2.6.16-7sarge1_sparc.deb oldstable/main/binary-sparc/python2.2-libxml2_2.6.16-7sarge1_sparc.deb libxml2 (2.6.16-7sarge1) oldstable-security; urgency=high * Fix CVE-2007-6284. oldstable/main/binary-s390/python2.4-libxml2_2.6.16-7sarge1_s390.deb oldstable/main/binary-s390/libxml2-dev_2.6.16-7sarge1_s390.deb oldstable/main/binary-s390/python2.3-libxml2_2.6.16-7sarge1_s390.deb oldstable/main/binary-s390/libxml2-utils_2.6.16-7sarge1_s390.deb oldstable/main/binary-s390/libxml2_2.6.16-7sarge1_s390.deb oldstable/main/binary-s390/python2.2-libxml2_2.6.16-7sarge1_s390.deb libxml2 (2.6.16-7sarge1) oldstable-security; urgency=high * Fix CVE-2007-6284. oldstable/main/binary-powerpc/python2.2-libxml2_2.6.16-7sarge1_powerpc.deb oldstable/main/binary-powerpc/libxml2-utils_2.6.16-7sarge1_powerpc.deb oldstable/main/binary-powerpc/python2.4-libxml2_2.6.16-7sarge1_powerpc.deb oldstable/main/binary-powerpc/libxml2-dev_2.6.16-7sarge1_powerpc.deb oldstable/main/binary-powerpc/libxml2_2.6.16-7sarge1_powerpc.deb oldstable/main/binary-powerpc/python2.3-libxml2_2.6.16-7sarge1_powerpc.deb libxml2 (2.6.16-7sarge1) oldstable-security; urgency=high * Fix CVE-2007-6284. oldstable/main/binary-mipsel/libxml2_2.6.16-7sarge1_mipsel.deb oldstable/main/binary-mipsel/libxml2-dev_2.6.16-7sarge1_mipsel.deb oldstable/main/binary-mipsel/python2.3-libxml2_2.6.16-7sarge1_mipsel.deb oldstable/main/binary-mipsel/libxml2-utils_2.6.16-7sarge1_mipsel.deb oldstable/main/binary-mipsel/python2.2-libxml2_2.6.16-7sarge1_mipsel.deb oldstable/main/binary-mipsel/python2.4-libxml2_2.6.16-7sarge1_mipsel.deb libxml2 (2.6.16-7sarge1) oldstable-security; urgency=high * Fix CVE-2007-6284. oldstable/main/binary-mips/libxml2-dev_2.6.16-7sarge1_mips.deb oldstable/main/binary-mips/libxml2_2.6.16-7sarge1_mips.deb oldstable/main/binary-mips/python2.2-libxml2_2.6.16-7sarge1_mips.deb oldstable/main/binary-mips/python2.3-libxml2_2.6.16-7sarge1_mips.deb oldstable/main/binary-mips/python2.4-libxml2_2.6.16-7sarge1_mips.deb oldstable/main/binary-mips/libxml2-utils_2.6.16-7sarge1_mips.deb libxml2 (2.6.16-7sarge1) oldstable-security; urgency=high * Fix CVE-2007-6284. oldstable/main/binary-m68k/libxml2_2.6.16-7sarge1_m68k.deb oldstable/main/binary-m68k/libxml2-dev_2.6.16-7sarge1_m68k.deb oldstable/main/binary-m68k/python2.2-libxml2_2.6.16-7sarge1_m68k.deb oldstable/main/binary-m68k/libxml2-utils_2.6.16-7sarge1_m68k.deb oldstable/main/binary-m68k/python2.4-libxml2_2.6.16-7sarge1_m68k.deb oldstable/main/binary-m68k/python2.3-libxml2_2.6.16-7sarge1_m68k.deb libxml2 (2.6.16-7sarge1) oldstable-security; urgency=high * Fix CVE-2007-6284. oldstable/main/binary-ia64/python2.4-libxml2_2.6.16-7sarge1_ia64.deb oldstable/main/binary-ia64/libxml2_2.6.16-7sarge1_ia64.deb oldstable/main/binary-ia64/python2.2-libxml2_2.6.16-7sarge1_ia64.deb oldstable/main/binary-ia64/libxml2-utils_2.6.16-7sarge1_ia64.deb oldstable/main/binary-ia64/python2.3-libxml2_2.6.16-7sarge1_ia64.deb oldstable/main/binary-ia64/libxml2-dev_2.6.16-7sarge1_ia64.deb libxml2 (2.6.16-7sarge1) oldstable-security; urgency=high * Fix CVE-2007-6284. oldstable/main/binary-hppa/python2.4-libxml2_2.6.16-7sarge1_hppa.deb oldstable/main/binary-hppa/python2.3-libxml2_2.6.16-7sarge1_hppa.deb oldstable/main/binary-hppa/libxml2-dev_2.6.16-7sarge1_hppa.deb oldstable/main/binary-hppa/python2.2-libxml2_2.6.16-7sarge1_hppa.deb oldstable/main/binary-hppa/libxml2_2.6.16-7sarge1_hppa.deb oldstable/main/binary-hppa/libxml2-utils_2.6.16-7sarge1_hppa.deb libxml2 (2.6.16-7sarge1) oldstable-security; urgency=high * Fix CVE-2007-6284. oldstable/main/binary-arm/libxml2-utils_2.6.16-7sarge1_arm.deb oldstable/main/binary-arm/python2.2-libxml2_2.6.16-7sarge1_arm.deb oldstable/main/binary-arm/python2.4-libxml2_2.6.16-7sarge1_arm.deb oldstable/main/binary-arm/python2.3-libxml2_2.6.16-7sarge1_arm.deb oldstable/main/binary-arm/libxml2_2.6.16-7sarge1_arm.deb oldstable/main/binary-arm/libxml2-dev_2.6.16-7sarge1_arm.deb libxml2 (2.6.16-7sarge1) oldstable-security; urgency=high * Fix CVE-2007-6284. oldstable/main/binary-amd64/libxml2-dev_2.6.16-7sarge1_amd64.deb oldstable/main/binary-amd64/libxml2_2.6.16-7sarge1_amd64.deb oldstable/main/binary-amd64/python2.2-libxml2_2.6.16-7sarge1_amd64.deb oldstable/main/binary-amd64/libxml2-utils_2.6.16-7sarge1_amd64.deb oldstable/main/binary-amd64/python2.3-libxml2_2.6.16-7sarge1_amd64.deb oldstable/main/binary-amd64/python2.4-libxml2_2.6.16-7sarge1_amd64.deb libxml2 (2.6.16-7sarge1) oldstable-security; urgency=high * Fix CVE-2007-6284. oldstable/main/binary-alpha/libxml2_2.6.16-7sarge1_alpha.deb oldstable/main/binary-alpha/python2.3-libxml2_2.6.16-7sarge1_alpha.deb oldstable/main/binary-alpha/python2.4-libxml2_2.6.16-7sarge1_alpha.deb oldstable/main/binary-alpha/libxml2-dev_2.6.16-7sarge1_alpha.deb oldstable/main/binary-alpha/python2.2-libxml2_2.6.16-7sarge1_alpha.deb oldstable/main/binary-alpha/libxml2-utils_2.6.16-7sarge1_alpha.deb libxml2 (2.6.16-7sarge1) oldstable-security; urgency=high * Fix CVE-2007-6284. oldstable/main/binary-all/python-libxml2_2.6.16-7sarge1_all.deb oldstable/main/source/libxml2_2.6.16-7sarge1.diff.gz oldstable/main/binary-i386/libxml2-dev_2.6.16-7sarge1_i386.deb oldstable/main/source/libxml2_2.6.16-7sarge1.dsc oldstable/main/binary-all/libxml2-python2.3_2.6.16-7sarge1_all.deb oldstable/main/binary-i386/python2.2-libxml2_2.6.16-7sarge1_i386.deb oldstable/main/binary-i386/python2.3-libxml2_2.6.16-7sarge1_i386.deb oldstable/main/binary-i386/libxml2-utils_2.6.16-7sarge1_i386.deb oldstable/main/binary-i386/python2.4-libxml2_2.6.16-7sarge1_i386.deb oldstable/main/binary-i386/libxml2_2.6.16-7sarge1_i386.deb oldstable/main/binary-all/libxml2-doc_2.6.16-7sarge1_all.deb libxml2 (2.6.16-7sarge1) oldstable-security; urgency=high * Fix CVE-2007-6284. oldstable/main/binary-sparc/libvorbisenc2_1.1.0-2_sparc.deb oldstable/main/binary-sparc/libvorbis0a_1.1.0-2_sparc.deb oldstable/main/binary-sparc/libvorbisfile3_1.1.0-2_sparc.deb oldstable/main/binary-sparc/libvorbis-dev_1.1.0-2_sparc.deb libvorbis (1.1.0-2) oldstable-security; urgency=low * Fix CVE-2007-3106 CVE-2007-4029 CVE-2007-4065 CVE-2007-4066 oldstable/main/binary-s390/libvorbisfile3_1.1.0-2_s390.deb oldstable/main/binary-s390/libvorbis-dev_1.1.0-2_s390.deb oldstable/main/binary-s390/libvorbis0a_1.1.0-2_s390.deb oldstable/main/binary-s390/libvorbisenc2_1.1.0-2_s390.deb libvorbis (1.1.0-2) oldstable-security; urgency=low * Fix CVE-2007-3106 CVE-2007-4029 CVE-2007-4065 CVE-2007-4066 oldstable/main/binary-powerpc/libvorbis0a_1.1.0-2_powerpc.deb oldstable/main/binary-powerpc/libvorbisfile3_1.1.0-2_powerpc.deb oldstable/main/binary-powerpc/libvorbisenc2_1.1.0-2_powerpc.deb oldstable/main/binary-powerpc/libvorbis-dev_1.1.0-2_powerpc.deb libvorbis (1.1.0-2) oldstable-security; urgency=low * Fix CVE-2007-3106 CVE-2007-4029 CVE-2007-4065 CVE-2007-4066 oldstable/main/binary-mipsel/libvorbisenc2_1.1.0-2_mipsel.deb oldstable/main/binary-mipsel/libvorbis-dev_1.1.0-2_mipsel.deb oldstable/main/binary-mipsel/libvorbisfile3_1.1.0-2_mipsel.deb oldstable/main/binary-mipsel/libvorbis0a_1.1.0-2_mipsel.deb libvorbis (1.1.0-2) oldstable-security; urgency=low * Fix CVE-2007-3106 CVE-2007-4029 CVE-2007-4065 CVE-2007-4066 oldstable/main/binary-mips/libvorbisenc2_1.1.0-2_mips.deb oldstable/main/binary-mips/libvorbisfile3_1.1.0-2_mips.deb oldstable/main/binary-mips/libvorbis0a_1.1.0-2_mips.deb oldstable/main/binary-mips/libvorbis-dev_1.1.0-2_mips.deb libvorbis (1.1.0-2) oldstable-security; urgency=low * Fix CVE-2007-3106 CVE-2007-4029 CVE-2007-4065 CVE-2007-4066 oldstable/main/binary-m68k/libvorbisenc2_1.1.0-2_m68k.deb oldstable/main/binary-m68k/libvorbisfile3_1.1.0-2_m68k.deb oldstable/main/binary-m68k/libvorbis-dev_1.1.0-2_m68k.deb oldstable/main/binary-m68k/libvorbis0a_1.1.0-2_m68k.deb libvorbis (1.1.0-2) oldstable-security; urgency=low * Fix CVE-2007-3106 CVE-2007-4029 CVE-2007-4065 CVE-2007-4066 oldstable/main/binary-ia64/libvorbisfile3_1.1.0-2_ia64.deb oldstable/main/binary-ia64/libvorbisenc2_1.1.0-2_ia64.deb oldstable/main/binary-ia64/libvorbis-dev_1.1.0-2_ia64.deb oldstable/main/binary-ia64/libvorbis0a_1.1.0-2_ia64.deb libvorbis (1.1.0-2) oldstable-security; urgency=low * Fix CVE-2007-3106 CVE-2007-4029 CVE-2007-4065 CVE-2007-4066 oldstable/main/binary-hppa/libvorbisenc2_1.1.0-2_hppa.deb oldstable/main/binary-hppa/libvorbis0a_1.1.0-2_hppa.deb oldstable/main/binary-hppa/libvorbisfile3_1.1.0-2_hppa.deb oldstable/main/binary-hppa/libvorbis-dev_1.1.0-2_hppa.deb libvorbis (1.1.0-2) oldstable-security; urgency=low * Fix CVE-2007-3106 CVE-2007-4029 CVE-2007-4065 CVE-2007-4066 oldstable/main/binary-arm/libvorbis-dev_1.1.0-2_arm.deb oldstable/main/binary-arm/libvorbisenc2_1.1.0-2_arm.deb oldstable/main/binary-arm/libvorbis0a_1.1.0-2_arm.deb oldstable/main/binary-arm/libvorbisfile3_1.1.0-2_arm.deb libvorbis (1.1.0-2) oldstable-security; urgency=low * Fix CVE-2007-3106 CVE-2007-4029 CVE-2007-4065 CVE-2007-4066 oldstable/main/binary-amd64/libvorbis0a_1.1.0-2_amd64.deb oldstable/main/binary-amd64/libvorbis-dev_1.1.0-2_amd64.deb oldstable/main/binary-amd64/libvorbisenc2_1.1.0-2_amd64.deb oldstable/main/binary-amd64/libvorbisfile3_1.1.0-2_amd64.deb libvorbis (1.1.0-2) oldstable-security; urgency=low * Fix CVE-2007-3106 CVE-2007-4029 CVE-2007-4065 CVE-2007-4066 oldstable/main/binary-alpha/libvorbis-dev_1.1.0-2_alpha.deb oldstable/main/binary-alpha/libvorbisenc2_1.1.0-2_alpha.deb oldstable/main/binary-alpha/libvorbis0a_1.1.0-2_alpha.deb oldstable/main/binary-alpha/libvorbisfile3_1.1.0-2_alpha.deb libvorbis (1.1.0-2) oldstable-security; urgency=low * Fix CVE-2007-3106 CVE-2007-4029 CVE-2007-4065 CVE-2007-4066 oldstable/main/binary-i386/libvorbisfile3_1.1.0-2_i386.deb oldstable/main/binary-i386/libvorbisenc2_1.1.0-2_i386.deb oldstable/main/binary-i386/libvorbis-dev_1.1.0-2_i386.deb oldstable/main/binary-i386/libvorbis0a_1.1.0-2_i386.deb oldstable/main/source/libvorbis_1.1.0-2.diff.gz oldstable/main/source/libvorbis_1.1.0-2.dsc libvorbis (1.1.0-2) oldstable-security; urgency=low * Fix CVE-2007-3106 CVE-2007-4029 CVE-2007-4065 CVE-2007-4066 oldstable/main/binary-sparc/libnet-dns-perl_0.48-1sarge1_sparc.deb libnet-dns-perl (0.48-1sarge1) oldstable-security; urgency=high * Malformed A records could lead to a Perl exception and program crash (CVE-2007-6341). Closes: #457445. * A very weak random number generator was used for transaction IDs (CVE-2007-3377). Perl's rand() is used in the patch against this vulnerability--it is initialized from /dev/urandom, but the underlying LCG has only got 48 bits of state, so at the very least, a brute-force attack is still possible if an attacker has got three subsequently generated transaction IDs. * The Perl implementation of dn_expand could recurse infinitely (CVE-2007-3409). (On Debian systems, the C version is typically used.) oldstable/main/binary-s390/libnet-dns-perl_0.48-1sarge1_s390.deb libnet-dns-perl (0.48-1sarge1) oldstable-security; urgency=high * Malformed A records could lead to a Perl exception and program crash (CVE-2007-6341). Closes: #457445. * A very weak random number generator was used for transaction IDs (CVE-2007-3377). Perl's rand() is used in the patch against this vulnerability--it is initialized from /dev/urandom, but the underlying LCG has only got 48 bits of state, so at the very least, a brute-force attack is still possible if an attacker has got three subsequently generated transaction IDs. * The Perl implementation of dn_expand could recurse infinitely (CVE-2007-3409). (On Debian systems, the C version is typically used.) oldstable/main/binary-powerpc/libnet-dns-perl_0.48-1sarge1_powerpc.deb libnet-dns-perl (0.48-1sarge1) oldstable-security; urgency=high * Malformed A records could lead to a Perl exception and program crash (CVE-2007-6341). Closes: #457445. * A very weak random number generator was used for transaction IDs (CVE-2007-3377). Perl's rand() is used in the patch against this vulnerability--it is initialized from /dev/urandom, but the underlying LCG has only got 48 bits of state, so at the very least, a brute-force attack is still possible if an attacker has got three subsequently generated transaction IDs. * The Perl implementation of dn_expand could recurse infinitely (CVE-2007-3409). (On Debian systems, the C version is typically used.) oldstable/main/binary-mipsel/libnet-dns-perl_0.48-1sarge1_mipsel.deb libnet-dns-perl (0.48-1sarge1) oldstable-security; urgency=high * Malformed A records could lead to a Perl exception and program crash (CVE-2007-6341). Closes: #457445. * A very weak random number generator was used for transaction IDs (CVE-2007-3377). Perl's rand() is used in the patch against this vulnerability--it is initialized from /dev/urandom, but the underlying LCG has only got 48 bits of state, so at the very least, a brute-force attack is still possible if an attacker has got three subsequently generated transaction IDs. * The Perl implementation of dn_expand could recurse infinitely (CVE-2007-3409). (On Debian systems, the C version is typically used.) oldstable/main/binary-mips/libnet-dns-perl_0.48-1sarge1_mips.deb libnet-dns-perl (0.48-1sarge1) oldstable-security; urgency=high * Malformed A records could lead to a Perl exception and program crash (CVE-2007-6341). Closes: #457445. * A very weak random number generator was used for transaction IDs (CVE-2007-3377). Perl's rand() is used in the patch against this vulnerability--it is initialized from /dev/urandom, but the underlying LCG has only got 48 bits of state, so at the very least, a brute-force attack is still possible if an attacker has got three subsequently generated transaction IDs. * The Perl implementation of dn_expand could recurse infinitely (CVE-2007-3409). (On Debian systems, the C version is typically used.) oldstable/main/binary-m68k/libnet-dns-perl_0.48-1sarge1_m68k.deb libnet-dns-perl (0.48-1sarge1) oldstable-security; urgency=high * Malformed A records could lead to a Perl exception and program crash (CVE-2007-6341). Closes: #457445. * A very weak random number generator was used for transaction IDs (CVE-2007-3377). Perl's rand() is used in the patch against this vulnerability--it is initialized from /dev/urandom, but the underlying LCG has only got 48 bits of state, so at the very least, a brute-force attack is still possible if an attacker has got three subsequently generated transaction IDs. * The Perl implementation of dn_expand could recurse infinitely (CVE-2007-3409). (On Debian systems, the C version is typically used.) oldstable/main/binary-ia64/libnet-dns-perl_0.48-1sarge1_ia64.deb libnet-dns-perl (0.48-1sarge1) oldstable-security; urgency=high * Malformed A records could lead to a Perl exception and program crash (CVE-2007-6341). Closes: #457445. * A very weak random number generator was used for transaction IDs (CVE-2007-3377). Perl's rand() is used in the patch against this vulnerability--it is initialized from /dev/urandom, but the underlying LCG has only got 48 bits of state, so at the very least, a brute-force attack is still possible if an attacker has got three subsequently generated transaction IDs. * The Perl implementation of dn_expand could recurse infinitely (CVE-2007-3409). (On Debian systems, the C version is typically used.) oldstable/main/binary-hppa/libnet-dns-perl_0.48-1sarge1_hppa.deb libnet-dns-perl (0.48-1sarge1) oldstable-security; urgency=high * Malformed A records could lead to a Perl exception and program crash (CVE-2007-6341). Closes: #457445. * A very weak random number generator was used for transaction IDs (CVE-2007-3377). Perl's rand() is used in the patch against this vulnerability--it is initialized from /dev/urandom, but the underlying LCG has only got 48 bits of state, so at the very least, a brute-force attack is still possible if an attacker has got three subsequently generated transaction IDs. * The Perl implementation of dn_expand could recurse infinitely (CVE-2007-3409). (On Debian systems, the C version is typically used.) oldstable/main/binary-arm/libnet-dns-perl_0.48-1sarge1_arm.deb libnet-dns-perl (0.48-1sarge1) oldstable-security; urgency=high * Malformed A records could lead to a Perl exception and program crash (CVE-2007-6341). Closes: #457445. * A very weak random number generator was used for transaction IDs (CVE-2007-3377). Perl's rand() is used in the patch against this vulnerability--it is initialized from /dev/urandom, but the underlying LCG has only got 48 bits of state, so at the very least, a brute-force attack is still possible if an attacker has got three subsequently generated transaction IDs. * The Perl implementation of dn_expand could recurse infinitely (CVE-2007-3409). (On Debian systems, the C version is typically used.) oldstable/main/binary-amd64/libnet-dns-perl_0.48-1sarge1_amd64.deb libnet-dns-perl (0.48-1sarge1) oldstable-security; urgency=high * Malformed A records could lead to a Perl exception and program crash (CVE-2007-6341). Closes: #457445. * A very weak random number generator was used for transaction IDs (CVE-2007-3377). Perl's rand() is used in the patch against this vulnerability--it is initialized from /dev/urandom, but the underlying LCG has only got 48 bits of state, so at the very least, a brute-force attack is still possible if an attacker has got three subsequently generated transaction IDs. * The Perl implementation of dn_expand could recurse infinitely (CVE-2007-3409). (On Debian systems, the C version is typically used.) oldstable/main/binary-alpha/libnet-dns-perl_0.48-1sarge1_alpha.deb libnet-dns-perl (0.48-1sarge1) oldstable-security; urgency=high * Malformed A records could lead to a Perl exception and program crash (CVE-2007-6341). Closes: #457445. * A very weak random number generator was used for transaction IDs (CVE-2007-3377). Perl's rand() is used in the patch against this vulnerability--it is initialized from /dev/urandom, but the underlying LCG has only got 48 bits of state, so at the very least, a brute-force attack is still possible if an attacker has got three subsequently generated transaction IDs. * The Perl implementation of dn_expand could recurse infinitely (CVE-2007-3409). (On Debian systems, the C version is typically used.) oldstable/main/source/libnet-dns-perl_0.48-1sarge1.diff.gz oldstable/main/binary-i386/libnet-dns-perl_0.48-1sarge1_i386.deb oldstable/main/source/libnet-dns-perl_0.48-1sarge1.dsc libnet-dns-perl (0.48-1sarge1) oldstable-security; urgency=high * Malformed A records could lead to a Perl exception and program crash (CVE-2007-6341). Closes: #457445. * A very weak random number generator was used for transaction IDs (CVE-2007-3377). Perl's rand() is used in the patch against this vulnerability--it is initialized from /dev/urandom, but the underlying LCG has only got 48 bits of state, so at the very least, a brute-force attack is still possible if an attacker has got three subsequently generated transaction IDs. * The Perl implementation of dn_expand could recurse infinitely (CVE-2007-3409). (On Debian systems, the C version is typically used.) oldstable/main/binary-sparc/libexif-dev_0.6.9-6sarge2_sparc.deb oldstable/main/binary-sparc/libexif10_0.6.9-6sarge2_sparc.deb libexif (0.6.9-6sarge2) oldstable-security; urgency=high * Fix CVE-2007-2645, CVE-2007-6351, CVE-2007-6352 oldstable/main/binary-s390/libexif10_0.6.9-6sarge2_s390.deb oldstable/main/binary-s390/libexif-dev_0.6.9-6sarge2_s390.deb libexif (0.6.9-6sarge2) oldstable-security; urgency=high * Fix CVE-2007-2645, CVE-2007-6351, CVE-2007-6352 oldstable/main/binary-powerpc/libexif10_0.6.9-6sarge2_powerpc.deb oldstable/main/binary-powerpc/libexif-dev_0.6.9-6sarge2_powerpc.deb libexif (0.6.9-6sarge2) oldstable-security; urgency=high * Fix CVE-2007-2645, CVE-2007-6351, CVE-2007-6352 oldstable/main/binary-mipsel/libexif-dev_0.6.9-6sarge2_mipsel.deb oldstable/main/binary-mipsel/libexif10_0.6.9-6sarge2_mipsel.deb libexif (0.6.9-6sarge2) oldstable-security; urgency=high * Fix CVE-2007-2645, CVE-2007-6351, CVE-2007-6352 oldstable/main/binary-mips/libexif-dev_0.6.9-6sarge2_mips.deb oldstable/main/binary-mips/libexif10_0.6.9-6sarge2_mips.deb libexif (0.6.9-6sarge2) oldstable-security; urgency=high * Fix CVE-2007-2645, CVE-2007-6351, CVE-2007-6352 oldstable/main/binary-m68k/libexif-dev_0.6.9-6sarge2_m68k.deb oldstable/main/binary-m68k/libexif10_0.6.9-6sarge2_m68k.deb libexif (0.6.9-6sarge2) oldstable-security; urgency=high * Fix CVE-2007-2645, CVE-2007-6351, CVE-2007-6352 oldstable/main/binary-ia64/libexif-dev_0.6.9-6sarge2_ia64.deb oldstable/main/binary-ia64/libexif10_0.6.9-6sarge2_ia64.deb libexif (0.6.9-6sarge2) oldstable-security; urgency=high * Fix CVE-2007-2645, CVE-2007-6351, CVE-2007-6352 oldstable/main/binary-hppa/libexif-dev_0.6.9-6sarge2_hppa.deb oldstable/main/binary-hppa/libexif10_0.6.9-6sarge2_hppa.deb libexif (0.6.9-6sarge2) oldstable-security; urgency=high * Fix CVE-2007-2645, CVE-2007-6351, CVE-2007-6352 oldstable/main/binary-arm/libexif-dev_0.6.9-6sarge2_arm.deb oldstable/main/binary-arm/libexif10_0.6.9-6sarge2_arm.deb libexif (0.6.9-6sarge2) oldstable-security; urgency=high * Fix CVE-2007-2645, CVE-2007-6351, CVE-2007-6352 oldstable/main/binary-amd64/libexif-dev_0.6.9-6sarge2_amd64.deb oldstable/main/binary-amd64/libexif10_0.6.9-6sarge2_amd64.deb libexif (0.6.9-6sarge2) oldstable-security; urgency=high * Fix CVE-2007-2645, CVE-2007-6351, CVE-2007-6352 oldstable/main/binary-alpha/libexif-dev_0.6.9-6sarge2_alpha.deb oldstable/main/binary-alpha/libexif10_0.6.9-6sarge2_alpha.deb libexif (0.6.9-6sarge2) oldstable-security; urgency=high * Fix CVE-2007-2645, CVE-2007-6351, CVE-2007-6352 oldstable/main/binary-i386/libexif10_0.6.9-6sarge2_i386.deb oldstable/main/source/libexif_0.6.9-6sarge2.dsc oldstable/main/binary-i386/libexif-dev_0.6.9-6sarge2_i386.deb oldstable/main/source/libexif_0.6.9-6sarge2.diff.gz libexif (0.6.9-6sarge2) oldstable-security; urgency=high * Fix CVE-2007-2645, CVE-2007-6351, CVE-2007-6352 oldstable/main/binary-sparc/libkrb5-dev_1.3.6-2sarge6_sparc.deb oldstable/main/binary-sparc/krb5-telnetd_1.3.6-2sarge6_sparc.deb oldstable/main/binary-sparc/krb5-ftpd_1.3.6-2sarge6_sparc.deb oldstable/main/binary-sparc/krb5-rsh-server_1.3.6-2sarge6_sparc.deb oldstable/main/binary-sparc/krb5-admin-server_1.3.6-2sarge6_sparc.deb oldstable/main/binary-sparc/libkadm55_1.3.6-2sarge6_sparc.deb oldstable/main/binary-sparc/krb5-kdc_1.3.6-2sarge6_sparc.deb oldstable/main/binary-sparc/krb5-user_1.3.6-2sarge6_sparc.deb oldstable/main/binary-sparc/krb5-clients_1.3.6-2sarge6_sparc.deb oldstable/main/binary-sparc/libkrb53_1.3.6-2sarge6_sparc.deb krb5 (1.3.6-2sarge6) oldstable-security; urgency=emergency * MITKRB5-SA-2008-001: When Kerberos v4 support is enabled in the KDC, malformed messages may result in NULL pointer use, double-frees, or exposure of information. (CVE-2008-0062, CVE-2008-0063) oldstable/main/binary-s390/krb5-clients_1.3.6-2sarge6_s390.deb oldstable/main/binary-s390/krb5-user_1.3.6-2sarge6_s390.deb oldstable/main/binary-s390/krb5-telnetd_1.3.6-2sarge6_s390.deb oldstable/main/binary-s390/krb5-ftpd_1.3.6-2sarge6_s390.deb oldstable/main/binary-s390/libkrb5-dev_1.3.6-2sarge6_s390.deb oldstable/main/binary-s390/krb5-admin-server_1.3.6-2sarge6_s390.deb oldstable/main/binary-s390/libkrb53_1.3.6-2sarge6_s390.deb oldstable/main/binary-s390/krb5-rsh-server_1.3.6-2sarge6_s390.deb oldstable/main/binary-s390/libkadm55_1.3.6-2sarge6_s390.deb oldstable/main/binary-s390/krb5-kdc_1.3.6-2sarge6_s390.deb krb5 (1.3.6-2sarge6) oldstable-security; urgency=emergency * MITKRB5-SA-2008-001: When Kerberos v4 support is enabled in the KDC, malformed messages may result in NULL pointer use, double-frees, or exposure of information. (CVE-2008-0062, CVE-2008-0063) oldstable/main/binary-powerpc/krb5-rsh-server_1.3.6-2sarge6_powerpc.deb oldstable/main/binary-powerpc/krb5-clients_1.3.6-2sarge6_powerpc.deb oldstable/main/binary-powerpc/krb5-admin-server_1.3.6-2sarge6_powerpc.deb oldstable/main/binary-powerpc/krb5-user_1.3.6-2sarge6_powerpc.deb oldstable/main/binary-powerpc/krb5-ftpd_1.3.6-2sarge6_powerpc.deb oldstable/main/binary-powerpc/libkadm55_1.3.6-2sarge6_powerpc.deb oldstable/main/binary-powerpc/libkrb5-dev_1.3.6-2sarge6_powerpc.deb oldstable/main/binary-powerpc/libkrb53_1.3.6-2sarge6_powerpc.deb oldstable/main/binary-powerpc/krb5-telnetd_1.3.6-2sarge6_powerpc.deb oldstable/main/binary-powerpc/krb5-kdc_1.3.6-2sarge6_powerpc.deb krb5 (1.3.6-2sarge6) oldstable-security; urgency=emergency * MITKRB5-SA-2008-001: When Kerberos v4 support is enabled in the KDC, malformed messages may result in NULL pointer use, double-frees, or exposure of information. (CVE-2008-0062, CVE-2008-0063) oldstable/main/binary-mipsel/krb5-user_1.3.6-2sarge6_mipsel.deb oldstable/main/binary-mipsel/krb5-admin-server_1.3.6-2sarge6_mipsel.deb oldstable/main/binary-mipsel/krb5-telnetd_1.3.6-2sarge6_mipsel.deb oldstable/main/binary-mipsel/krb5-clients_1.3.6-2sarge6_mipsel.deb oldstable/main/binary-mipsel/krb5-rsh-server_1.3.6-2sarge6_mipsel.deb oldstable/main/binary-mipsel/libkrb53_1.3.6-2sarge6_mipsel.deb oldstable/main/binary-mipsel/krb5-ftpd_1.3.6-2sarge6_mipsel.deb oldstable/main/binary-mipsel/krb5-kdc_1.3.6-2sarge6_mipsel.deb oldstable/main/binary-mipsel/libkadm55_1.3.6-2sarge6_mipsel.deb oldstable/main/binary-mipsel/libkrb5-dev_1.3.6-2sarge6_mipsel.deb krb5 (1.3.6-2sarge6) oldstable-security; urgency=emergency * MITKRB5-SA-2008-001: When Kerberos v4 support is enabled in the KDC, malformed messages may result in NULL pointer use, double-frees, or exposure of information. (CVE-2008-0062, CVE-2008-0063) oldstable/main/binary-mips/krb5-user_1.3.6-2sarge6_mips.deb oldstable/main/binary-mips/libkadm55_1.3.6-2sarge6_mips.deb oldstable/main/binary-mips/krb5-ftpd_1.3.6-2sarge6_mips.deb oldstable/main/binary-mips/libkrb5-dev_1.3.6-2sarge6_mips.deb oldstable/main/binary-mips/krb5-kdc_1.3.6-2sarge6_mips.deb oldstable/main/binary-mips/krb5-admin-server_1.3.6-2sarge6_mips.deb oldstable/main/binary-mips/krb5-clients_1.3.6-2sarge6_mips.deb oldstable/main/binary-mips/krb5-rsh-server_1.3.6-2sarge6_mips.deb oldstable/main/binary-mips/libkrb53_1.3.6-2sarge6_mips.deb oldstable/main/binary-mips/krb5-telnetd_1.3.6-2sarge6_mips.deb krb5 (1.3.6-2sarge6) oldstable-security; urgency=emergency * MITKRB5-SA-2008-001: When Kerberos v4 support is enabled in the KDC, malformed messages may result in NULL pointer use, double-frees, or exposure of information. (CVE-2008-0062, CVE-2008-0063) oldstable/main/binary-m68k/libkadm55_1.3.6-2sarge6_m68k.deb oldstable/main/binary-m68k/libkrb5-dev_1.3.6-2sarge6_m68k.deb oldstable/main/binary-m68k/krb5-ftpd_1.3.6-2sarge6_m68k.deb oldstable/main/binary-m68k/krb5-kdc_1.3.6-2sarge6_m68k.deb oldstable/main/binary-m68k/krb5-rsh-server_1.3.6-2sarge6_m68k.deb oldstable/main/binary-m68k/libkrb53_1.3.6-2sarge6_m68k.deb oldstable/main/binary-m68k/krb5-user_1.3.6-2sarge6_m68k.deb oldstable/main/binary-m68k/krb5-clients_1.3.6-2sarge6_m68k.deb oldstable/main/binary-m68k/krb5-telnetd_1.3.6-2sarge6_m68k.deb oldstable/main/binary-m68k/krb5-admin-server_1.3.6-2sarge6_m68k.deb krb5 (1.3.6-2sarge6) oldstable-security; urgency=emergency * MITKRB5-SA-2008-001: When Kerberos v4 support is enabled in the KDC, malformed messages may result in NULL pointer use, double-frees, or exposure of information. (CVE-2008-0062, CVE-2008-0063) oldstable/main/binary-ia64/krb5-rsh-server_1.3.6-2sarge6_ia64.deb oldstable/main/binary-ia64/krb5-clients_1.3.6-2sarge6_ia64.deb oldstable/main/binary-ia64/libkrb53_1.3.6-2sarge6_ia64.deb oldstable/main/binary-ia64/krb5-user_1.3.6-2sarge6_ia64.deb oldstable/main/binary-ia64/libkadm55_1.3.6-2sarge6_ia64.deb oldstable/main/binary-ia64/krb5-telnetd_1.3.6-2sarge6_ia64.deb oldstable/main/binary-ia64/krb5-ftpd_1.3.6-2sarge6_ia64.deb oldstable/main/binary-ia64/krb5-admin-server_1.3.6-2sarge6_ia64.deb oldstable/main/binary-ia64/libkrb5-dev_1.3.6-2sarge6_ia64.deb oldstable/main/binary-ia64/krb5-kdc_1.3.6-2sarge6_ia64.deb krb5 (1.3.6-2sarge6) oldstable-security; urgency=emergency * MITKRB5-SA-2008-001: When Kerberos v4 support is enabled in the KDC, malformed messages may result in NULL pointer use, double-frees, or exposure of information. (CVE-2008-0062, CVE-2008-0063) oldstable/main/binary-hppa/krb5-admin-server_1.3.6-2sarge6_hppa.deb oldstable/main/binary-hppa/krb5-telnetd_1.3.6-2sarge6_hppa.deb oldstable/main/binary-hppa/krb5-ftpd_1.3.6-2sarge6_hppa.deb oldstable/main/binary-hppa/libkrb5-dev_1.3.6-2sarge6_hppa.deb oldstable/main/binary-hppa/libkadm55_1.3.6-2sarge6_hppa.deb oldstable/main/binary-hppa/krb5-kdc_1.3.6-2sarge6_hppa.deb oldstable/main/binary-hppa/libkrb53_1.3.6-2sarge6_hppa.deb oldstable/main/binary-hppa/krb5-rsh-server_1.3.6-2sarge6_hppa.deb oldstable/main/binary-hppa/krb5-user_1.3.6-2sarge6_hppa.deb oldstable/main/binary-hppa/krb5-clients_1.3.6-2sarge6_hppa.deb krb5 (1.3.6-2sarge6) oldstable-security; urgency=emergency * MITKRB5-SA-2008-001: When Kerberos v4 support is enabled in the KDC, malformed messages may result in NULL pointer use, double-frees, or exposure of information. (CVE-2008-0062, CVE-2008-0063) oldstable/main/binary-arm/krb5-kdc_1.3.6-2sarge6_arm.deb oldstable/main/binary-arm/libkrb5-dev_1.3.6-2sarge6_arm.deb oldstable/main/binary-arm/libkadm55_1.3.6-2sarge6_arm.deb oldstable/main/binary-arm/krb5-ftpd_1.3.6-2sarge6_arm.deb oldstable/main/binary-arm/krb5-telnetd_1.3.6-2sarge6_arm.deb oldstable/main/binary-arm/krb5-clients_1.3.6-2sarge6_arm.deb oldstable/main/binary-arm/krb5-user_1.3.6-2sarge6_arm.deb oldstable/main/binary-arm/krb5-rsh-server_1.3.6-2sarge6_arm.deb oldstable/main/binary-arm/libkrb53_1.3.6-2sarge6_arm.deb oldstable/main/binary-arm/krb5-admin-server_1.3.6-2sarge6_arm.deb krb5 (1.3.6-2sarge6) oldstable-security; urgency=emergency * MITKRB5-SA-2008-001: When Kerberos v4 support is enabled in the KDC, malformed messages may result in NULL pointer use, double-frees, or exposure of information. (CVE-2008-0062, CVE-2008-0063) oldstable/main/binary-amd64/krb5-user_1.3.6-2sarge6_amd64.deb oldstable/main/binary-amd64/libkadm55_1.3.6-2sarge6_amd64.deb oldstable/main/binary-amd64/krb5-kdc_1.3.6-2sarge6_amd64.deb oldstable/main/binary-amd64/krb5-admin-server_1.3.6-2sarge6_amd64.deb oldstable/main/binary-amd64/krb5-telnetd_1.3.6-2sarge6_amd64.deb oldstable/main/binary-amd64/libkrb53_1.3.6-2sarge6_amd64.deb oldstable/main/binary-amd64/krb5-rsh-server_1.3.6-2sarge6_amd64.deb oldstable/main/binary-amd64/krb5-ftpd_1.3.6-2sarge6_amd64.deb oldstable/main/binary-amd64/libkrb5-dev_1.3.6-2sarge6_amd64.deb oldstable/main/binary-amd64/krb5-clients_1.3.6-2sarge6_amd64.deb krb5 (1.3.6-2sarge6) oldstable-security; urgency=emergency * MITKRB5-SA-2008-001: When Kerberos v4 support is enabled in the KDC, malformed messages may result in NULL pointer use, double-frees, or exposure of information. (CVE-2008-0062, CVE-2008-0063) oldstable/main/binary-alpha/krb5-admin-server_1.3.6-2sarge6_alpha.deb oldstable/main/binary-alpha/libkrb53_1.3.6-2sarge6_alpha.deb oldstable/main/binary-alpha/libkadm55_1.3.6-2sarge6_alpha.deb oldstable/main/binary-alpha/krb5-ftpd_1.3.6-2sarge6_alpha.deb oldstable/main/binary-alpha/krb5-rsh-server_1.3.6-2sarge6_alpha.deb oldstable/main/binary-alpha/libkrb5-dev_1.3.6-2sarge6_alpha.deb oldstable/main/binary-alpha/krb5-telnetd_1.3.6-2sarge6_alpha.deb oldstable/main/binary-alpha/krb5-user_1.3.6-2sarge6_alpha.deb oldstable/main/binary-alpha/krb5-clients_1.3.6-2sarge6_alpha.deb oldstable/main/binary-alpha/krb5-kdc_1.3.6-2sarge6_alpha.deb krb5 (1.3.6-2sarge6) oldstable-security; urgency=emergency * MITKRB5-SA-2008-001: When Kerberos v4 support is enabled in the KDC, malformed messages may result in NULL pointer use, double-frees, or exposure of information. (CVE-2008-0062, CVE-2008-0063) oldstable/main/source/krb5_1.3.6-2sarge6.diff.gz oldstable/main/binary-i386/krb5-kdc_1.3.6-2sarge6_i386.deb oldstable/main/binary-i386/libkadm55_1.3.6-2sarge6_i386.deb oldstable/main/source/krb5_1.3.6-2sarge6.dsc oldstable/main/binary-i386/krb5-ftpd_1.3.6-2sarge6_i386.deb oldstable/main/binary-all/krb5-doc_1.3.6-2sarge6_all.deb oldstable/main/binary-i386/libkrb53_1.3.6-2sarge6_i386.deb oldstable/main/binary-i386/krb5-user_1.3.6-2sarge6_i386.deb oldstable/main/binary-i386/krb5-admin-server_1.3.6-2sarge6_i386.deb oldstable/main/binary-i386/libkrb5-dev_1.3.6-2sarge6_i386.deb oldstable/main/binary-i386/krb5-clients_1.3.6-2sarge6_i386.deb oldstable/main/binary-i386/krb5-telnetd_1.3.6-2sarge6_i386.deb oldstable/main/binary-i386/krb5-rsh-server_1.3.6-2sarge6_i386.deb krb5 (1.3.6-2sarge6) oldstable-security; urgency=emergency * MITKRB5-SA-2008-001: When Kerberos v4 support is enabled in the KDC, malformed messages may result in NULL pointer use, double-frees, or exposure of information. (CVE-2008-0062, CVE-2008-0063) oldstable/main/binary-all/kernel-source-2.6.8_2.6.8-17sarge1_all.deb oldstable/main/binary-all/kernel-tree-2.6.8_2.6.8-17sarge1_all.deb oldstable/main/source/kernel-source-2.6.8_2.6.8-17sarge1.dsc oldstable/main/binary-all/kernel-patch-debian-2.6.8_2.6.8-17sarge1_all.deb oldstable/main/source/kernel-source-2.6.8_2.6.8-17sarge1.diff.gz oldstable/main/binary-all/kernel-doc-2.6.8_2.6.8-17sarge1_all.deb kernel-source-2.6.8 (2.6.8-17sarge1) oldstable-security; urgency=high * compat_sys_mount-NULL-data_page.dpatch [SECURITY] Fix oops in compat_sys_mount triggered by NULL data_page See CVE-2006-7203 * pppoe-socket-release-mem-leak.dpatch [SECURITY] fix unpriveleged memory leak when a PPPoE socket is released after connect but before PPPIOCGCHAN ioctl is called upon it See CVE-2007-2525 * dn_fib-out-of-bounds.dpatch, ipv4-fib_props-out-of-bounds.dpatch [SECURITY] Fix out of bounds condition in dn_fib_props[] See CVE-2007-2172 * aacraid-ioctl-perm-check.dpatch [SECURITY] Require admin capabilities to issue ioctls to aacraid devices See CVE-2007-4308 * reset-pdeathsig-on-suid.dpatch [SECURITY] Fix potential privilege escalation caused by improper clearing of the child process' pdeath signal. See CVE-2007-3848 * bluetooth-l2cap-hci-info-leaks.dpatch [SECURITY] Fix information leaks in setsockopt() implementations See CVE-2007-1353 * coredump-only-to-same-uid.dpatch [SECURITY] Fix an issue where core dumping over a file that already exists retains the ownership of the original file See CVE-2007-6206 * i4l-isdn_ioctl-mem-overrun.dpatch [SECURITY] Fix potential isdn ioctl memory overrun See CVE-2007-6151 * cramfs-check-block-length.dpatch [SECURITY] Add a sanity check of the block length in cramfs_readpage to avoid a potential oops condition See CVE-2006-5823 * ext2-skip-pages-past-num-blocks.dpatch [SECURITY] Add some sanity checking for a corrupted i_size in ext2_find_entry() See CVE-2006-6054 * minixfs-printk-hang.dpatch [SECURITY] Rate-limit printks caused by accessing a corrupted minixfs filesystem that would otherwise cause a system to hang (printk storm) See CVE-2006-6058 * isdn-net-overflow.dpatch [SECURITY] Fix potential overflows in the ISDN subsystem See CVE-2007-6063 * prevent-stack-growth-into-hugetlb-region.dpatch [SECURITY] Prevent OOPS during stack expansion when the VMA crosses into address space reserved for hugetlb pages. See CVE-2007-3739 * cifs-honor-umask.dpatch [SECURITY] Make CIFS honor a process' umask See CVE-2007-3740 * hugetlb-prio_tree-unit-fix.dpatch [SECURITY] Fix misconversion of hugetlb_vmtruncate_list to prio_tree which could be used to trigger a BUG_ON() call in exit_mmap. See CVE-2007-4133 * amd64-zero-extend-32bit-ptrace.dpatch [SECURITY] Zero extend all registers after ptrace in 32-bit entry path. See CVE-2007-4573 * usb-pwc-disconnect-block.dpatch [SECURITY] Fix issue with unplugging webcams that use the pwc driver. If userspace still has the device open it can result, the driver would wait for the device to close, blocking the USB subsystem. See CVE-2007-5093 * powerpc-chrp-null-deref.dpatch [SECURITY][powerpc] Fix NULL pointer dereference if get_property fails on the subarchitecture See CVE-2007-6694 * random-bound-check-ordering.dpatch [SECURITY] Fix stack-based buffer overflow in the random number generator See CVE-2007-3105 * mmap-VM_DONTEXPAND.dpatch [SECURITY] Add VM_DONTEXPAND to vm_flags in drivers that register a fault handler but do not bounds check the offset argument See CVE-2008-0007 oldstable/main/source/kernel-patch-powerpc-2.6.8_2.6.8-13sarge1.dsc oldstable/main/binary-powerpc/kernel-headers-2.6.8-4_2.6.8-13sarge1_powerpc.deb oldstable/main/binary-powerpc/kernel-image-2.6.8-4-power3-smp_2.6.8-13sarge1_powerpc.deb oldstable/main/binary-powerpc/kernel-image-2.6.8-4-power3_2.6.8-13sarge1_powerpc.deb oldstable/main/binary-powerpc/kernel-image-2.6.8-4-powerpc-smp_2.6.8-13sarge1_powerpc.deb oldstable/main/binary-powerpc/kernel-image-2.6.8-4-power4-smp_2.6.8-13sarge1_powerpc.deb oldstable/main/binary-powerpc/kernel-build-2.6.8-4-power3_2.6.8-13sarge1_powerpc.deb oldstable/main/binary-powerpc/kernel-build-2.6.8-4-powerpc_2.6.8-13sarge1_powerpc.deb oldstable/main/binary-powerpc/kernel-build-2.6.8-4-power4-smp_2.6.8-13sarge1_powerpc.deb oldstable/main/binary-powerpc/kernel-image-2.6.8-4-powerpc_2.6.8-13sarge1_powerpc.deb oldstable/main/source/kernel-patch-powerpc-2.6.8_2.6.8-13sarge1.tar.gz oldstable/main/binary-powerpc/kernel-build-2.6.8-4-power4_2.6.8-13sarge1_powerpc.deb oldstable/main/binary-powerpc/kernel-build-2.6.8-4-powerpc-smp_2.6.8-13sarge1_powerpc.deb oldstable/main/binary-powerpc/kernel-build-2.6.8-4-power3-smp_2.6.8-13sarge1_powerpc.deb oldstable/main/binary-powerpc/kernel-image-2.6.8-4-power4_2.6.8-13sarge1_powerpc.deb kernel-patch-powerpc-2.6.8 (2.6.8-13sarge1) oldstable-security; urgency=high * Rebuild against kernel-tree-2.6.8-17sarge1 * compat_sys_mount-NULL-data_page.dpatch [SECURITY] Fix oops in compat_sys_mount triggered by NULL data_page See CVE-2006-7203 * pppoe-socket-release-mem-leak.dpatch [SECURITY] fix unpriveleged memory leak when a PPPoE socket is released after connect but before PPPIOCGCHAN ioctl is called upon it See CVE-2007-2525 * dn_fib-out-of-bounds.dpatch, ipv4-fib_props-out-of-bounds.dpatch [SECURITY] Fix out of bounds condition in dn_fib_props[] See CVE-2007-2172 * aacraid-ioctl-perm-check.dpatch [SECURITY] Require admin capabilities to issue ioctls to aacraid devices See CVE-2007-4308 * reset-pdeathsig-on-suid.dpatch [SECURITY] Fix potential privilege escalation caused by improper clearing of the child process' pdeath signal. See CVE-2007-3848 * bluetooth-l2cap-hci-info-leaks.dpatch [SECURITY] Fix information leaks in setsockopt() implementations See CVE-2007-1353 * coredump-only-to-same-uid.dpatch [SECURITY] Fix an issue where core dumping over a file that already exists retains the ownership of the original file See CVE-2007-6206 * i4l-isdn_ioctl-mem-overrun.dpatch [SECURITY] Fix potential isdn ioctl memory overrun See CVE-2007-6151 * cramfs-check-block-length.dpatch [SECURITY] Add a sanity check of the block length in cramfs_readpage to avoid a potential oops condition See CVE-2006-5823 * ext2-skip-pages-past-num-blocks.dpatch [SECURITY] Add some sanity checking for a corrupted i_size in ext2_find_entry() See CVE-2006-6054 * minixfs-printk-hang.dpatch [SECURITY] Rate-limit printks caused by accessing a corrupted minixfs filesystem that would otherwise cause a system to hang (printk storm) See CVE-2006-6058 * isdn-net-overflow.dpatch [SECURITY] Fix potential overflows in the ISDN subsystem See CVE-2007-6063 * prevent-stack-growth-into-hugetlb-region.dpatch [SECURITY] Prevent OOPS during stack expansion when the VMA crosses into address space reserved for hugetlb pages. See CVE-2007-3739 * cifs-honor-umask.dpatch [SECURITY] Make CIFS honor a process' umask See CVE-2007-3740 * hugetlb-prio_tree-unit-fix.dpatch [SECURITY] Fix misconversion of hugetlb_vmtruncate_list to prio_tree which could be used to trigger a BUG_ON() call in exit_mmap. See CVE-2007-4133 * amd64-zero-extend-32bit-ptrace.dpatch [SECURITY] Zero extend all registers after ptrace in 32-bit entry path. See CVE-2007-4573 * usb-pwc-disconnect-block.dpatch [SECURITY] Fix issue with unplugging webcams that use the pwc driver. If userspace still has the device open it can result, the driver would wait for the device to close, blocking the USB subsystem. See CVE-2007-5093 * powerpc-chrp-null-deref.dpatch [SECURITY][powerpc] Fix NULL pointer dereference if get_property fails on the subarchitecture See CVE-2007-6694 * random-bound-check-ordering.dpatch [SECURITY] Fix stack-based buffer overflow in the random number generator See CVE-2007-3105 * mmap-VM_DONTEXPAND.dpatch [SECURITY] Add VM_DONTEXPAND to vm_flags in drivers that register a fault handler but do not bounds check the offset argument See CVE-2008-0007 oldstable/main/binary-sparc/kernel-image-2.6.8-4-sparc64-smp_2.6.8-16sarge1_sparc.deb oldstable/main/binary-sparc/kernel-image-2.6.8-4-sparc64_2.6.8-16sarge1_sparc.deb oldstable/main/binary-sparc/kernel-headers-2.6.8-4_2.6.8-16sarge1_sparc.deb oldstable/main/binary-sparc/kernel-image-2.6.8-4-sparc32_2.6.8-16sarge1_sparc.deb oldstable/main/source/kernel-image-2.6.8-sparc_2.6.8-16sarge1.tar.gz oldstable/main/source/kernel-image-2.6.8-sparc_2.6.8-16sarge1.dsc oldstable/main/binary-sparc/kernel-headers-2.6.8-4-sparc32_2.6.8-16sarge1_sparc.deb oldstable/main/binary-sparc/kernel-headers-2.6.8-4-sparc64-smp_2.6.8-16sarge1_sparc.deb oldstable/main/binary-sparc/kernel-build-2.6.8-4_2.6.8-16sarge1_sparc.deb oldstable/main/binary-sparc/kernel-headers-2.6.8-4-sparc64_2.6.8-16sarge1_sparc.deb kernel-image-2.6.8-sparc (2.6.8-16sarge1) oldstable-security; urgency=high * Rebuild against kernel-tree-2.6.8-17sarge1 * compat_sys_mount-NULL-data_page.dpatch [SECURITY] Fix oops in compat_sys_mount triggered by NULL data_page See CVE-2006-7203 * pppoe-socket-release-mem-leak.dpatch [SECURITY] fix unpriveleged memory leak when a PPPoE socket is released after connect but before PPPIOCGCHAN ioctl is called upon it See CVE-2007-2525 * dn_fib-out-of-bounds.dpatch, ipv4-fib_props-out-of-bounds.dpatch [SECURITY] Fix out of bounds condition in dn_fib_props[] See CVE-2007-2172 * aacraid-ioctl-perm-check.dpatch [SECURITY] Require admin capabilities to issue ioctls to aacraid devices See CVE-2007-4308 * reset-pdeathsig-on-suid.dpatch [SECURITY] Fix potential privilege escalation caused by improper clearing of the child process' pdeath signal. See CVE-2007-3848 * bluetooth-l2cap-hci-info-leaks.dpatch [SECURITY] Fix information leaks in setsockopt() implementations See CVE-2007-1353 * coredump-only-to-same-uid.dpatch [SECURITY] Fix an issue where core dumping over a file that already exists retains the ownership of the original file See CVE-2007-6206 * i4l-isdn_ioctl-mem-overrun.dpatch [SECURITY] Fix potential isdn ioctl memory overrun See CVE-2007-6151 * cramfs-check-block-length.dpatch [SECURITY] Add a sanity check of the block length in cramfs_readpage to avoid a potential oops condition See CVE-2006-5823 * ext2-skip-pages-past-num-blocks.dpatch [SECURITY] Add some sanity checking for a corrupted i_size in ext2_find_entry() See CVE-2006-6054 * minixfs-printk-hang.dpatch [SECURITY] Rate-limit printks caused by accessing a corrupted minixfs filesystem that would otherwise cause a system to hang (printk storm) See CVE-2006-6058 * isdn-net-overflow.dpatch [SECURITY] Fix potential overflows in the ISDN subsystem See CVE-2007-6063 * prevent-stack-growth-into-hugetlb-region.dpatch [SECURITY] Prevent OOPS during stack expansion when the VMA crosses into address space reserved for hugetlb pages. See CVE-2007-3739 * cifs-honor-umask.dpatch [SECURITY] Make CIFS honor a process' umask See CVE-2007-3740 * hugetlb-prio_tree-unit-fix.dpatch [SECURITY] Fix misconversion of hugetlb_vmtruncate_list to prio_tree which could be used to trigger a BUG_ON() call in exit_mmap. See CVE-2007-4133 * amd64-zero-extend-32bit-ptrace.dpatch [SECURITY] Zero extend all registers after ptrace in 32-bit entry path. See CVE-2007-4573 * usb-pwc-disconnect-block.dpatch [SECURITY] Fix issue with unplugging webcams that use the pwc driver. If userspace still has the device open it can result, the driver would wait for the device to close, blocking the USB subsystem. See CVE-2007-5093 * powerpc-chrp-null-deref.dpatch [SECURITY][powerpc] Fix NULL pointer dereference if get_property fails on the subarchitecture See CVE-2007-6694 * random-bound-check-ordering.dpatch [SECURITY] Fix stack-based buffer overflow in the random number generator See CVE-2007-3105 * mmap-VM_DONTEXPAND.dpatch [SECURITY] Add VM_DONTEXPAND to vm_flags in drivers that register a fault handler but do not bounds check the offset argument See CVE-2008-0007 oldstable/main/binary-s390/kernel-image-2.6.8-4-s390x_2.6.8-6sarge1_s390.deb oldstable/main/source/kernel-image-2.6.8-s390_2.6.8-6sarge1.tar.gz oldstable/main/binary-all/kernel-patch-2.6.8-s390_2.6.8-6sarge1_all.deb oldstable/main/binary-s390/kernel-headers-2.6.8-4_2.6.8-6sarge1_s390.deb oldstable/main/source/kernel-image-2.6.8-s390_2.6.8-6sarge1.dsc oldstable/main/binary-s390/kernel-image-2.6.8-4-s390_2.6.8-6sarge1_s390.deb oldstable/main/binary-s390/kernel-image-2.6.8-4-s390-tape_2.6.8-6sarge1_s390.deb kernel-image-2.6.8-s390 (2.6.8-6sarge1) oldstable-security; urgency=high * Rebuild against kernel-tree-2.6.8-17sarge1 * compat_sys_mount-NULL-data_page.dpatch [SECURITY] Fix oops in compat_sys_mount triggered by NULL data_page See CVE-2006-7203 * pppoe-socket-release-mem-leak.dpatch [SECURITY] fix unpriveleged memory leak when a PPPoE socket is released after connect but before PPPIOCGCHAN ioctl is called upon it See CVE-2007-2525 * dn_fib-out-of-bounds.dpatch, ipv4-fib_props-out-of-bounds.dpatch [SECURITY] Fix out of bounds condition in dn_fib_props[] See CVE-2007-2172 * aacraid-ioctl-perm-check.dpatch [SECURITY] Require admin capabilities to issue ioctls to aacraid devices See CVE-2007-4308 * reset-pdeathsig-on-suid.dpatch [SECURITY] Fix potential privilege escalation caused by improper clearing of the child process' pdeath signal. See CVE-2007-3848 * bluetooth-l2cap-hci-info-leaks.dpatch [SECURITY] Fix information leaks in setsockopt() implementations See CVE-2007-1353 * coredump-only-to-same-uid.dpatch [SECURITY] Fix an issue where core dumping over a file that already exists retains the ownership of the original file See CVE-2007-6206 * i4l-isdn_ioctl-mem-overrun.dpatch [SECURITY] Fix potential isdn ioctl memory overrun See CVE-2007-6151 * cramfs-check-block-length.dpatch [SECURITY] Add a sanity check of the block length in cramfs_readpage to avoid a potential oops condition See CVE-2006-5823 * ext2-skip-pages-past-num-blocks.dpatch [SECURITY] Add some sanity checking for a corrupted i_size in ext2_find_entry() See CVE-2006-6054 * minixfs-printk-hang.dpatch [SECURITY] Rate-limit printks caused by accessing a corrupted minixfs filesystem that would otherwise cause a system to hang (printk storm) See CVE-2006-6058 * isdn-net-overflow.dpatch [SECURITY] Fix potential overflows in the ISDN subsystem See CVE-2007-6063 * prevent-stack-growth-into-hugetlb-region.dpatch [SECURITY] Prevent OOPS during stack expansion when the VMA crosses into address space reserved for hugetlb pages. See CVE-2007-3739 * cifs-honor-umask.dpatch [SECURITY] Make CIFS honor a process' umask See CVE-2007-3740 * hugetlb-prio_tree-unit-fix.dpatch [SECURITY] Fix misconversion of hugetlb_vmtruncate_list to prio_tree which could be used to trigger a BUG_ON() call in exit_mmap. See CVE-2007-4133 * amd64-zero-extend-32bit-ptrace.dpatch [SECURITY] Zero extend all registers after ptrace in 32-bit entry path. See CVE-2007-4573 * usb-pwc-disconnect-block.dpatch [SECURITY] Fix issue with unplugging webcams that use the pwc driver. If userspace still has the device open it can result, the driver would wait for the device to close, blocking the USB subsystem. See CVE-2007-5093 * powerpc-chrp-null-deref.dpatch [SECURITY][powerpc] Fix NULL pointer dereference if get_property fails on the subarchitecture See CVE-2007-6694 * random-bound-check-ordering.dpatch [SECURITY] Fix stack-based buffer overflow in the random number generator See CVE-2007-3105 * mmap-VM_DONTEXPAND.dpatch [SECURITY] Add VM_DONTEXPAND to vm_flags in drivers that register a fault handler but do not bounds check the offset argument See CVE-2008-0007 oldstable/main/binary-m68k/kernel-image-2.6.8-sun3_2.6.8-5sarge1_m68k.deb oldstable/main/binary-m68k/kernel-image-2.6.8-mvme16x_2.6.8-5sarge1_m68k.deb oldstable/main/binary-m68k/kernel-image-2.6.8-q40_2.6.8-5sarge1_m68k.deb oldstable/main/binary-m68k/kernel-image-2.6.8-atari_2.6.8-5sarge1_m68k.deb oldstable/main/binary-m68k/kernel-image-2.6.8-amiga_2.6.8-5sarge1_m68k.deb oldstable/main/binary-m68k/kernel-image-2.6.8-hp_2.6.8-5sarge1_m68k.deb oldstable/main/binary-m68k/kernel-image-2.6.8-mvme147_2.6.8-5sarge1_m68k.deb oldstable/main/source/kernel-image-2.6.8-m68k_2.6.8-5sarge1.tar.gz oldstable/main/binary-m68k/kernel-image-2.6.8-bvme6000_2.6.8-5sarge1_m68k.deb oldstable/main/binary-m68k/kernel-image-2.6.8-mac_2.6.8-5sarge1_m68k.deb oldstable/main/source/kernel-image-2.6.8-m68k_2.6.8-5sarge1.dsc kernel-image-2.6.8-m68k (2.6.8-5sarge1) oldstable-security; urgency=high * Rebuild against kernel-tree-2.6.8-17sarge1 * compat_sys_mount-NULL-data_page.dpatch [SECURITY] Fix oops in compat_sys_mount triggered by NULL data_page See CVE-2006-7203 * pppoe-socket-release-mem-leak.dpatch [SECURITY] fix unpriveleged memory leak when a PPPoE socket is released after connect but before PPPIOCGCHAN ioctl is called upon it See CVE-2007-2525 * dn_fib-out-of-bounds.dpatch, ipv4-fib_props-out-of-bounds.dpatch [SECURITY] Fix out of bounds condition in dn_fib_props[] See CVE-2007-2172 * aacraid-ioctl-perm-check.dpatch [SECURITY] Require admin capabilities to issue ioctls to aacraid devices See CVE-2007-4308 * reset-pdeathsig-on-suid.dpatch [SECURITY] Fix potential privilege escalation caused by improper clearing of the child process' pdeath signal. See CVE-2007-3848 * bluetooth-l2cap-hci-info-leaks.dpatch [SECURITY] Fix information leaks in setsockopt() implementations See CVE-2007-1353 * coredump-only-to-same-uid.dpatch [SECURITY] Fix an issue where core dumping over a file that already exists retains the ownership of the original file See CVE-2007-6206 * i4l-isdn_ioctl-mem-overrun.dpatch [SECURITY] Fix potential isdn ioctl memory overrun See CVE-2007-6151 * cramfs-check-block-length.dpatch [SECURITY] Add a sanity check of the block length in cramfs_readpage to avoid a potential oops condition See CVE-2006-5823 * ext2-skip-pages-past-num-blocks.dpatch [SECURITY] Add some sanity checking for a corrupted i_size in ext2_find_entry() See CVE-2006-6054 * minixfs-printk-hang.dpatch [SECURITY] Rate-limit printks caused by accessing a corrupted minixfs filesystem that would otherwise cause a system to hang (printk storm) See CVE-2006-6058 * isdn-net-overflow.dpatch [SECURITY] Fix potential overflows in the ISDN subsystem See CVE-2007-6063 * prevent-stack-growth-into-hugetlb-region.dpatch [SECURITY] Prevent OOPS during stack expansion when the VMA crosses into address space reserved for hugetlb pages. See CVE-2007-3739 * cifs-honor-umask.dpatch [SECURITY] Make CIFS honor a process' umask See CVE-2007-3740 * hugetlb-prio_tree-unit-fix.dpatch [SECURITY] Fix misconversion of hugetlb_vmtruncate_list to prio_tree which could be used to trigger a BUG_ON() call in exit_mmap. See CVE-2007-4133 * amd64-zero-extend-32bit-ptrace.dpatch [SECURITY] Zero extend all registers after ptrace in 32-bit entry path. See CVE-2007-4573 * usb-pwc-disconnect-block.dpatch [SECURITY] Fix issue with unplugging webcams that use the pwc driver. If userspace still has the device open it can result, the driver would wait for the device to close, blocking the USB subsystem. See CVE-2007-5093 * powerpc-chrp-null-deref.dpatch [SECURITY][powerpc] Fix NULL pointer dereference if get_property fails on the subarchitecture See CVE-2007-6694 * random-bound-check-ordering.dpatch [SECURITY] Fix stack-based buffer overflow in the random number generator See CVE-2007-3105 * mmap-VM_DONTEXPAND.dpatch [SECURITY] Add VM_DONTEXPAND to vm_flags in drivers that register a fault handler but do not bounds check the offset argument See CVE-2008-0007 oldstable/main/binary-ia64/kernel-image-2.6.8-4-itanium_2.6.8-15sarge1_ia64.deb oldstable/main/binary-ia64/kernel-image-2.6-mckinley-smp_2.6.8-15sarge1_ia64.deb oldstable/main/binary-ia64/kernel-image-2.6-mckinley_2.6.8-15sarge1_ia64.deb oldstable/main/source/kernel-image-2.6.8-ia64_2.6.8-15sarge1.dsc oldstable/main/binary-ia64/kernel-headers-2.6-mckinley-smp_2.6.8-15sarge1_ia64.deb oldstable/main/binary-ia64/kernel-headers-2.6-itanium_2.6.8-15sarge1_ia64.deb oldstable/main/binary-ia64/kernel-headers-2.6.8-4-itanium_2.6.8-15sarge1_ia64.deb oldstable/main/binary-ia64/kernel-headers-2.6.8-4-mckinley_2.6.8-15sarge1_ia64.deb oldstable/main/binary-ia64/kernel-image-2.6-itanium_2.6.8-15sarge1_ia64.deb oldstable/main/binary-ia64/kernel-image-2.6-itanium-smp_2.6.8-15sarge1_ia64.deb oldstable/main/binary-ia64/kernel-headers-2.6.8-4-itanium-smp_2.6.8-15sarge1_ia64.deb oldstable/main/binary-ia64/kernel-headers-2.6-itanium-smp_2.6.8-15sarge1_ia64.deb oldstable/main/binary-ia64/kernel-headers-2.6.8-4_2.6.8-15sarge1_ia64.deb oldstable/main/binary-ia64/kernel-headers-2.6-mckinley_2.6.8-15sarge1_ia64.deb oldstable/main/binary-ia64/kernel-image-2.6.8-4-mckinley_2.6.8-15sarge1_ia64.deb oldstable/main/binary-ia64/kernel-image-2.6.8-4-itanium-smp_2.6.8-15sarge1_ia64.deb oldstable/main/source/kernel-image-2.6.8-ia64_2.6.8-15sarge1.tar.gz oldstable/main/binary-ia64/kernel-image-2.6.8-4-mckinley-smp_2.6.8-15sarge1_ia64.deb oldstable/main/binary-ia64/kernel-headers-2.6.8-4-mckinley-smp_2.6.8-15sarge1_ia64.deb kernel-image-2.6.8-ia64 (2.6.8-15sarge1) oldstable-security; urgency=high * Rebuild against kernel-tree-2.6.8-17sarge1 * compat_sys_mount-NULL-data_page.dpatch [SECURITY] Fix oops in compat_sys_mount triggered by NULL data_page See CVE-2006-7203 * pppoe-socket-release-mem-leak.dpatch [SECURITY] fix unpriveleged memory leak when a PPPoE socket is released after connect but before PPPIOCGCHAN ioctl is called upon it See CVE-2007-2525 * dn_fib-out-of-bounds.dpatch, ipv4-fib_props-out-of-bounds.dpatch [SECURITY] Fix out of bounds condition in dn_fib_props[] See CVE-2007-2172 * aacraid-ioctl-perm-check.dpatch [SECURITY] Require admin capabilities to issue ioctls to aacraid devices See CVE-2007-4308 * reset-pdeathsig-on-suid.dpatch [SECURITY] Fix potential privilege escalation caused by improper clearing of the child process' pdeath signal. See CVE-2007-3848 * bluetooth-l2cap-hci-info-leaks.dpatch [SECURITY] Fix information leaks in setsockopt() implementations See CVE-2007-1353 * coredump-only-to-same-uid.dpatch [SECURITY] Fix an issue where core dumping over a file that already exists retains the ownership of the original file See CVE-2007-6206 * i4l-isdn_ioctl-mem-overrun.dpatch [SECURITY] Fix potential isdn ioctl memory overrun See CVE-2007-6151 * cramfs-check-block-length.dpatch [SECURITY] Add a sanity check of the block length in cramfs_readpage to avoid a potential oops condition See CVE-2006-5823 * ext2-skip-pages-past-num-blocks.dpatch [SECURITY] Add some sanity checking for a corrupted i_size in ext2_find_entry() See CVE-2006-6054 * minixfs-printk-hang.dpatch [SECURITY] Rate-limit printks caused by accessing a corrupted minixfs filesystem that would otherwise cause a system to hang (printk storm) See CVE-2006-6058 * isdn-net-overflow.dpatch [SECURITY] Fix potential overflows in the ISDN subsystem See CVE-2007-6063 * prevent-stack-growth-into-hugetlb-region.dpatch [SECURITY] Prevent OOPS during stack expansion when the VMA crosses into address space reserved for hugetlb pages. See CVE-2007-3739 * cifs-honor-umask.dpatch [SECURITY] Make CIFS honor a process' umask See CVE-2007-3740 * hugetlb-prio_tree-unit-fix.dpatch [SECURITY] Fix misconversion of hugetlb_vmtruncate_list to prio_tree which could be used to trigger a BUG_ON() call in exit_mmap. See CVE-2007-4133 * amd64-zero-extend-32bit-ptrace.dpatch [SECURITY] Zero extend all registers after ptrace in 32-bit entry path. See CVE-2007-4573 * usb-pwc-disconnect-block.dpatch [SECURITY] Fix issue with unplugging webcams that use the pwc driver. If userspace still has the device open it can result, the driver would wait for the device to close, blocking the USB subsystem. See CVE-2007-5093 * powerpc-chrp-null-deref.dpatch [SECURITY][powerpc] Fix NULL pointer dereference if get_property fails on the subarchitecture See CVE-2007-6694 * random-bound-check-ordering.dpatch [SECURITY] Fix stack-based buffer overflow in the random number generator See CVE-2007-3105 * mmap-VM_DONTEXPAND.dpatch [SECURITY] Add VM_DONTEXPAND to vm_flags in drivers that register a fault handler but do not bounds check the offset argument See CVE-2008-0007 oldstable/main/source/kernel-image-2.6.8-i386_2.6.8-17sarge1.dsc oldstable/main/binary-i386/kernel-headers-2.6.8-4-k7-smp_2.6.8-17sarge1_i386.deb oldstable/main/binary-i386/kernel-image-2.6.8-4-386_2.6.8-17sarge1_i386.deb oldstable/main/binary-i386/kernel-image-2.6.8-4-k7-smp_2.6.8-17sarge1_i386.deb oldstable/main/binary-i386/kernel-image-2.6.8-4-k7_2.6.8-17sarge1_i386.deb oldstable/main/binary-i386/kernel-image-2.6.8-4-686_2.6.8-17sarge1_i386.deb oldstable/main/binary-i386/kernel-headers-2.6.8-4_2.6.8-17sarge1_i386.deb oldstable/main/source/kernel-image-2.6.8-i386_2.6.8-17sarge1.tar.gz oldstable/main/binary-i386/kernel-image-2.6.8-4-686-smp_2.6.8-17sarge1_i386.deb oldstable/main/binary-i386/kernel-headers-2.6.8-4-686_2.6.8-17sarge1_i386.deb oldstable/main/binary-i386/kernel-headers-2.6.8-4-386_2.6.8-17sarge1_i386.deb oldstable/main/binary-i386/kernel-headers-2.6.8-4-k7_2.6.8-17sarge1_i386.deb oldstable/main/binary-i386/kernel-headers-2.6.8-4-686-smp_2.6.8-17sarge1_i386.deb kernel-image-2.6.8-i386 (2.6.8-17sarge1) oldstable-security; urgency=high * Rebuild against kernel-tree-2.6.8-17sarge1 * compat_sys_mount-NULL-data_page.dpatch [SECURITY] Fix oops in compat_sys_mount triggered by NULL data_page See CVE-2006-7203 * pppoe-socket-release-mem-leak.dpatch [SECURITY] fix unpriveleged memory leak when a PPPoE socket is released after connect but before PPPIOCGCHAN ioctl is called upon it See CVE-2007-2525 * dn_fib-out-of-bounds.dpatch, ipv4-fib_props-out-of-bounds.dpatch [SECURITY] Fix out of bounds condition in dn_fib_props[] See CVE-2007-2172 * aacraid-ioctl-perm-check.dpatch [SECURITY] Require admin capabilities to issue ioctls to aacraid devices See CVE-2007-4308 * reset-pdeathsig-on-suid.dpatch [SECURITY] Fix potential privilege escalation caused by improper clearing of the child process' pdeath signal. See CVE-2007-3848 * bluetooth-l2cap-hci-info-leaks.dpatch [SECURITY] Fix information leaks in setsockopt() implementations See CVE-2007-1353 * coredump-only-to-same-uid.dpatch [SECURITY] Fix an issue where core dumping over a file that already exists retains the ownership of the original file See CVE-2007-6206 * i4l-isdn_ioctl-mem-overrun.dpatch [SECURITY] Fix potential isdn ioctl memory overrun See CVE-2007-6151 * cramfs-check-block-length.dpatch [SECURITY] Add a sanity check of the block length in cramfs_readpage to avoid a potential oops condition See CVE-2006-5823 * ext2-skip-pages-past-num-blocks.dpatch [SECURITY] Add some sanity checking for a corrupted i_size in ext2_find_entry() See CVE-2006-6054 * minixfs-printk-hang.dpatch [SECURITY] Rate-limit printks caused by accessing a corrupted minixfs filesystem that would otherwise cause a system to hang (printk storm) See CVE-2006-6058 * isdn-net-overflow.dpatch [SECURITY] Fix potential overflows in the ISDN subsystem See CVE-2007-6063 * prevent-stack-growth-into-hugetlb-region.dpatch [SECURITY] Prevent OOPS during stack expansion when the VMA crosses into address space reserved for hugetlb pages. See CVE-2007-3739 * cifs-honor-umask.dpatch [SECURITY] Make CIFS honor a process' umask See CVE-2007-3740 * hugetlb-prio_tree-unit-fix.dpatch [SECURITY] Fix misconversion of hugetlb_vmtruncate_list to prio_tree which could be used to trigger a BUG_ON() call in exit_mmap. See CVE-2007-4133 * amd64-zero-extend-32bit-ptrace.dpatch [SECURITY] Zero extend all registers after ptrace in 32-bit entry path. See CVE-2007-4573 * usb-pwc-disconnect-block.dpatch [SECURITY] Fix issue with unplugging webcams that use the pwc driver. If userspace still has the device open it can result, the driver would wait for the device to close, blocking the USB subsystem. See CVE-2007-5093 * powerpc-chrp-null-deref.dpatch [SECURITY][powerpc] Fix NULL pointer dereference if get_property fails on the subarchitecture See CVE-2007-6694 * random-bound-check-ordering.dpatch [SECURITY] Fix stack-based buffer overflow in the random number generator See CVE-2007-3105 * mmap-VM_DONTEXPAND.dpatch [SECURITY] Add VM_DONTEXPAND to vm_flags in drivers that register a fault handler but do not bounds check the offset argument See CVE-2008-0007 oldstable/main/binary-hppa/kernel-headers-2.6.8-4_2.6.8-7sarge1_hppa.deb oldstable/main/binary-hppa/kernel-image-2.6.8-4-64_2.6.8-7sarge1_hppa.deb oldstable/main/binary-hppa/kernel-headers-2.6.8-4-64-smp_2.6.8-7sarge1_hppa.deb oldstable/main/binary-hppa/kernel-image-2.6.8-4-64-smp_2.6.8-7sarge1_hppa.deb oldstable/main/binary-hppa/kernel-headers-2.6.8-4-32-smp_2.6.8-7sarge1_hppa.deb oldstable/main/binary-hppa/kernel-image-2.6.8-4-32-smp_2.6.8-7sarge1_hppa.deb oldstable/main/source/kernel-image-2.6.8-hppa_2.6.8-7sarge1.dsc oldstable/main/binary-hppa/kernel-image-2.6.8-4-32_2.6.8-7sarge1_hppa.deb oldstable/main/source/kernel-image-2.6.8-hppa_2.6.8-7sarge1.tar.gz oldstable/main/binary-hppa/kernel-headers-2.6.8-4-64_2.6.8-7sarge1_hppa.deb oldstable/main/binary-hppa/kernel-headers-2.6.8-4-32_2.6.8-7sarge1_hppa.deb kernel-image-2.6.8-hppa (2.6.8-7sarge1) oldstable-security; urgency=high * Rebuild against kernel-tree-2.6.8-17sarge1 * compat_sys_mount-NULL-data_page.dpatch [SECURITY] Fix oops in compat_sys_mount triggered by NULL data_page See CVE-2006-7203 * pppoe-socket-release-mem-leak.dpatch [SECURITY] fix unpriveleged memory leak when a PPPoE socket is released after connect but before PPPIOCGCHAN ioctl is called upon it See CVE-2007-2525 * dn_fib-out-of-bounds.dpatch, ipv4-fib_props-out-of-bounds.dpatch [SECURITY] Fix out of bounds condition in dn_fib_props[] See CVE-2007-2172 * aacraid-ioctl-perm-check.dpatch [SECURITY] Require admin capabilities to issue ioctls to aacraid devices See CVE-2007-4308 * reset-pdeathsig-on-suid.dpatch [SECURITY] Fix potential privilege escalation caused by improper clearing of the child process' pdeath signal. See CVE-2007-3848 * bluetooth-l2cap-hci-info-leaks.dpatch [SECURITY] Fix information leaks in setsockopt() implementations See CVE-2007-1353 * coredump-only-to-same-uid.dpatch [SECURITY] Fix an issue where core dumping over a file that already exists retains the ownership of the original file See CVE-2007-6206 * i4l-isdn_ioctl-mem-overrun.dpatch [SECURITY] Fix potential isdn ioctl memory overrun See CVE-2007-6151 * cramfs-check-block-length.dpatch [SECURITY] Add a sanity check of the block length in cramfs_readpage to avoid a potential oops condition See CVE-2006-5823 * ext2-skip-pages-past-num-blocks.dpatch [SECURITY] Add some sanity checking for a corrupted i_size in ext2_find_entry() See CVE-2006-6054 * minixfs-printk-hang.dpatch [SECURITY] Rate-limit printks caused by accessing a corrupted minixfs filesystem that would otherwise cause a system to hang (printk storm) See CVE-2006-6058 * isdn-net-overflow.dpatch [SECURITY] Fix potential overflows in the ISDN subsystem See CVE-2007-6063 * prevent-stack-growth-into-hugetlb-region.dpatch [SECURITY] Prevent OOPS during stack expansion when the VMA crosses into address space reserved for hugetlb pages. See CVE-2007-3739 * cifs-honor-umask.dpatch [SECURITY] Make CIFS honor a process' umask See CVE-2007-3740 * hugetlb-prio_tree-unit-fix.dpatch [SECURITY] Fix misconversion of hugetlb_vmtruncate_list to prio_tree which could be used to trigger a BUG_ON() call in exit_mmap. See CVE-2007-4133 * amd64-zero-extend-32bit-ptrace.dpatch [SECURITY] Zero extend all registers after ptrace in 32-bit entry path. See CVE-2007-4573 * usb-pwc-disconnect-block.dpatch [SECURITY] Fix issue with unplugging webcams that use the pwc driver. If userspace still has the device open it can result, the driver would wait for the device to close, blocking the USB subsystem. See CVE-2007-5093 * powerpc-chrp-null-deref.dpatch [SECURITY][powerpc] Fix NULL pointer dereference if get_property fails on the subarchitecture See CVE-2007-6694 * random-bound-check-ordering.dpatch [SECURITY] Fix stack-based buffer overflow in the random number generator See CVE-2007-3105 * mmap-VM_DONTEXPAND.dpatch [SECURITY] Add VM_DONTEXPAND to vm_flags in drivers that register a fault handler but do not bounds check the offset argument See CVE-2008-0007 oldstable/main/binary-amd64/kernel-headers-2.6.8-13-em64t-p4-smp_2.6.8-17sarge1_amd64.deb oldstable/main/binary-amd64/kernel-headers-2.6.8-13-em64t-p4_2.6.8-17sarge1_amd64.deb oldstable/main/binary-amd64/kernel-image-2.6.8-13-amd64-generic_2.6.8-17sarge1_amd64.deb oldstable/main/binary-amd64/kernel-headers-2.6.8-13-amd64-generic_2.6.8-17sarge1_amd64.deb oldstable/main/binary-amd64/kernel-image-2.6.8-13-amd64-k8-smp_2.6.8-17sarge1_amd64.deb oldstable/main/binary-amd64/kernel-image-2.6.8-13-em64t-p4-smp_2.6.8-17sarge1_amd64.deb oldstable/main/binary-amd64/kernel-image-2.6.8-13-amd64-k8_2.6.8-17sarge1_amd64.deb oldstable/main/binary-amd64/kernel-headers-2.6.8-13_2.6.8-17sarge1_amd64.deb oldstable/main/binary-amd64/kernel-headers-2.6.8-13-amd64-k8-smp_2.6.8-17sarge1_amd64.deb oldstable/main/binary-amd64/kernel-headers-2.6.8-13-amd64-k8_2.6.8-17sarge1_amd64.deb oldstable/main/binary-amd64/kernel-image-2.6.8-13-em64t-p4_2.6.8-17sarge1_amd64.deb kernel-image-2.6.8-amd64 (2.6.8-17sarge1) oldstable-security; urgency=high * Rebuild against kernel-tree-2.6.8-17sarge1 * compat_sys_mount-NULL-data_page.dpatch [SECURITY] Fix oops in compat_sys_mount triggered by NULL data_page See CVE-2006-7203 * pppoe-socket-release-mem-leak.dpatch [SECURITY] fix unpriveleged memory leak when a PPPoE socket is released after connect but before PPPIOCGCHAN ioctl is called upon it See CVE-2007-2525 * dn_fib-out-of-bounds.dpatch, ipv4-fib_props-out-of-bounds.dpatch [SECURITY] Fix out of bounds condition in dn_fib_props[] See CVE-2007-2172 * aacraid-ioctl-perm-check.dpatch [SECURITY] Require admin capabilities to issue ioctls to aacraid devices See CVE-2007-4308 * reset-pdeathsig-on-suid.dpatch [SECURITY] Fix potential privilege escalation caused by improper clearing of the child process' pdeath signal. See CVE-2007-3848 * bluetooth-l2cap-hci-info-leaks.dpatch [SECURITY] Fix information leaks in setsockopt() implementations See CVE-2007-1353 * coredump-only-to-same-uid.dpatch [SECURITY] Fix an issue where core dumping over a file that already exists retains the ownership of the original file See CVE-2007-6206 * i4l-isdn_ioctl-mem-overrun.dpatch [SECURITY] Fix potential isdn ioctl memory overrun See CVE-2007-6151 * cramfs-check-block-length.dpatch [SECURITY] Add a sanity check of the block length in cramfs_readpage to avoid a potential oops condition See CVE-2006-5823 * ext2-skip-pages-past-num-blocks.dpatch [SECURITY] Add some sanity checking for a corrupted i_size in ext2_find_entry() See CVE-2006-6054 * minixfs-printk-hang.dpatch [SECURITY] Rate-limit printks caused by accessing a corrupted minixfs filesystem that would otherwise cause a system to hang (printk storm) See CVE-2006-6058 * isdn-net-overflow.dpatch [SECURITY] Fix potential overflows in the ISDN subsystem See CVE-2007-6063 * prevent-stack-growth-into-hugetlb-region.dpatch [SECURITY] Prevent OOPS during stack expansion when the VMA crosses into address space reserved for hugetlb pages. See CVE-2007-3739 * cifs-honor-umask.dpatch [SECURITY] Make CIFS honor a process' umask See CVE-2007-3740 * hugetlb-prio_tree-unit-fix.dpatch [SECURITY] Fix misconversion of hugetlb_vmtruncate_list to prio_tree which could be used to trigger a BUG_ON() call in exit_mmap. See CVE-2007-4133 * amd64-zero-extend-32bit-ptrace.dpatch [SECURITY] Zero extend all registers after ptrace in 32-bit entry path. See CVE-2007-4573 * usb-pwc-disconnect-block.dpatch [SECURITY] Fix issue with unplugging webcams that use the pwc driver. If userspace still has the device open it can result, the driver would wait for the device to close, blocking the USB subsystem. See CVE-2007-5093 * powerpc-chrp-null-deref.dpatch [SECURITY][powerpc] Fix NULL pointer dereference if get_property fails on the subarchitecture See CVE-2007-6694 * random-bound-check-ordering.dpatch [SECURITY] Fix stack-based buffer overflow in the random number generator See CVE-2007-3105 * mmap-VM_DONTEXPAND.dpatch [SECURITY] Add VM_DONTEXPAND to vm_flags in drivers that register a fault handler but do not bounds check the offset argument See CVE-2008-0007 oldstable/main/binary-i386/kernel-headers-2.6.8-13_2.6.8-17sarge1_i386.deb oldstable/main/binary-i386/kernel-headers-2.6.8-13-amd64-generic_2.6.8-17sarge1_i386.deb oldstable/main/binary-i386/kernel-headers-2.6.8-13-em64t-p4-smp_2.6.8-17sarge1_i386.deb oldstable/main/binary-i386/kernel-headers-2.6.8-13-amd64-k8_2.6.8-17sarge1_i386.deb oldstable/main/binary-i386/kernel-image-2.6.8-13-amd64-k8_2.6.8-17sarge1_i386.deb oldstable/main/binary-i386/kernel-headers-2.6.8-13-amd64-k8-smp_2.6.8-17sarge1_i386.deb oldstable/main/binary-i386/kernel-headers-2.6.8-13-em64t-p4_2.6.8-17sarge1_i386.deb oldstable/main/binary-i386/kernel-image-2.6.8-13-amd64-k8-smp_2.6.8-17sarge1_i386.deb oldstable/main/binary-i386/kernel-image-2.6.8-13-em64t-p4-smp_2.6.8-17sarge1_i386.deb oldstable/main/binary-i386/kernel-image-2.6.8-13-em64t-p4_2.6.8-17sarge1_i386.deb oldstable/main/binary-i386/kernel-image-2.6.8-13-amd64-generic_2.6.8-17sarge1_i386.deb oldstable/main/source/kernel-image-2.6.8-amd64_2.6.8-17sarge1.tar.gz oldstable/main/source/kernel-image-2.6.8-amd64_2.6.8-17sarge1.dsc kernel-image-2.6.8-amd64 (2.6.8-17sarge1) oldstable-security; urgency=high * Rebuild against kernel-tree-2.6.8-17sarge1 * compat_sys_mount-NULL-data_page.dpatch [SECURITY] Fix oops in compat_sys_mount triggered by NULL data_page See CVE-2006-7203 * pppoe-socket-release-mem-leak.dpatch [SECURITY] fix unpriveleged memory leak when a PPPoE socket is released after connect but before PPPIOCGCHAN ioctl is called upon it See CVE-2007-2525 * dn_fib-out-of-bounds.dpatch, ipv4-fib_props-out-of-bounds.dpatch [SECURITY] Fix out of bounds condition in dn_fib_props[] See CVE-2007-2172 * aacraid-ioctl-perm-check.dpatch [SECURITY] Require admin capabilities to issue ioctls to aacraid devices See CVE-2007-4308 * reset-pdeathsig-on-suid.dpatch [SECURITY] Fix potential privilege escalation caused by improper clearing of the child process' pdeath signal. See CVE-2007-3848 * bluetooth-l2cap-hci-info-leaks.dpatch [SECURITY] Fix information leaks in setsockopt() implementations See CVE-2007-1353 * coredump-only-to-same-uid.dpatch [SECURITY] Fix an issue where core dumping over a file that already exists retains the ownership of the original file See CVE-2007-6206 * i4l-isdn_ioctl-mem-overrun.dpatch [SECURITY] Fix potential isdn ioctl memory overrun See CVE-2007-6151 * cramfs-check-block-length.dpatch [SECURITY] Add a sanity check of the block length in cramfs_readpage to avoid a potential oops condition See CVE-2006-5823 * ext2-skip-pages-past-num-blocks.dpatch [SECURITY] Add some sanity checking for a corrupted i_size in ext2_find_entry() See CVE-2006-6054 * minixfs-printk-hang.dpatch [SECURITY] Rate-limit printks caused by accessing a corrupted minixfs filesystem that would otherwise cause a system to hang (printk storm) See CVE-2006-6058 * isdn-net-overflow.dpatch [SECURITY] Fix potential overflows in the ISDN subsystem See CVE-2007-6063 * prevent-stack-growth-into-hugetlb-region.dpatch [SECURITY] Prevent OOPS during stack expansion when the VMA crosses into address space reserved for hugetlb pages. See CVE-2007-3739 * cifs-honor-umask.dpatch [SECURITY] Make CIFS honor a process' umask See CVE-2007-3740 * hugetlb-prio_tree-unit-fix.dpatch [SECURITY] Fix misconversion of hugetlb_vmtruncate_list to prio_tree which could be used to trigger a BUG_ON() call in exit_mmap. See CVE-2007-4133 * amd64-zero-extend-32bit-ptrace.dpatch [SECURITY] Zero extend all registers after ptrace in 32-bit entry path. See CVE-2007-4573 * usb-pwc-disconnect-block.dpatch [SECURITY] Fix issue with unplugging webcams that use the pwc driver. If userspace still has the device open it can result, the driver would wait for the device to close, blocking the USB subsystem. See CVE-2007-5093 * powerpc-chrp-null-deref.dpatch [SECURITY][powerpc] Fix NULL pointer dereference if get_property fails on the subarchitecture See CVE-2007-6694 * random-bound-check-ordering.dpatch [SECURITY] Fix stack-based buffer overflow in the random number generator See CVE-2007-3105 * mmap-VM_DONTEXPAND.dpatch [SECURITY] Add VM_DONTEXPAND to vm_flags in drivers that register a fault handler but do not bounds check the offset argument See CVE-2008-0007 oldstable/main/binary-alpha/kernel-headers-2.6.8-4-generic_2.6.8-17sarge1_alpha.deb oldstable/main/binary-alpha/kernel-image-2.6.8-4-smp_2.6.8-17sarge1_alpha.deb oldstable/main/source/kernel-image-2.6.8-alpha_2.6.8-17sarge1.tar.gz oldstable/main/binary-alpha/kernel-image-2.6.8-4-generic_2.6.8-17sarge1_alpha.deb oldstable/main/binary-alpha/kernel-headers-2.6.8-4_2.6.8-17sarge1_alpha.deb oldstable/main/source/kernel-image-2.6.8-alpha_2.6.8-17sarge1.dsc oldstable/main/binary-alpha/kernel-headers-2.6.8-4-smp_2.6.8-17sarge1_alpha.deb kernel-image-2.6.8-alpha (2.6.8-17sarge1) oldstable-security; urgency=high * Rebuild against kernel-tree-2.6.8-17sarge1 * compat_sys_mount-NULL-data_page.dpatch [SECURITY] Fix oops in compat_sys_mount triggered by NULL data_page See CVE-2006-7203 * pppoe-socket-release-mem-leak.dpatch [SECURITY] fix unpriveleged memory leak when a PPPoE socket is released after connect but before PPPIOCGCHAN ioctl is called upon it See CVE-2007-2525 * dn_fib-out-of-bounds.dpatch, ipv4-fib_props-out-of-bounds.dpatch [SECURITY] Fix out of bounds condition in dn_fib_props[] See CVE-2007-2172 * aacraid-ioctl-perm-check.dpatch [SECURITY] Require admin capabilities to issue ioctls to aacraid devices See CVE-2007-4308 * reset-pdeathsig-on-suid.dpatch [SECURITY] Fix potential privilege escalation caused by improper clearing of the child process' pdeath signal. See CVE-2007-3848 * bluetooth-l2cap-hci-info-leaks.dpatch [SECURITY] Fix information leaks in setsockopt() implementations See CVE-2007-1353 * coredump-only-to-same-uid.dpatch [SECURITY] Fix an issue where core dumping over a file that already exists retains the ownership of the original file See CVE-2007-6206 * i4l-isdn_ioctl-mem-overrun.dpatch [SECURITY] Fix potential isdn ioctl memory overrun See CVE-2007-6151 * cramfs-check-block-length.dpatch [SECURITY] Add a sanity check of the block length in cramfs_readpage to avoid a potential oops condition See CVE-2006-5823 * ext2-skip-pages-past-num-blocks.dpatch [SECURITY] Add some sanity checking for a corrupted i_size in ext2_find_entry() See CVE-2006-6054 * minixfs-printk-hang.dpatch [SECURITY] Rate-limit printks caused by accessing a corrupted minixfs filesystem that would otherwise cause a system to hang (printk storm) See CVE-2006-6058 * isdn-net-overflow.dpatch [SECURITY] Fix potential overflows in the ISDN subsystem See CVE-2007-6063 * prevent-stack-growth-into-hugetlb-region.dpatch [SECURITY] Prevent OOPS during stack expansion when the VMA crosses into address space reserved for hugetlb pages. See CVE-2007-3739 * cifs-honor-umask.dpatch [SECURITY] Make CIFS honor a process' umask See CVE-2007-3740 * hugetlb-prio_tree-unit-fix.dpatch [SECURITY] Fix misconversion of hugetlb_vmtruncate_list to prio_tree which could be used to trigger a BUG_ON() call in exit_mmap. See CVE-2007-4133 * amd64-zero-extend-32bit-ptrace.dpatch [SECURITY] Zero extend all registers after ptrace in 32-bit entry path. See CVE-2007-4573 * usb-pwc-disconnect-block.dpatch [SECURITY] Fix issue with unplugging webcams that use the pwc driver. If userspace still has the device open it can result, the driver would wait for the device to close, blocking the USB subsystem. See CVE-2007-5093 * powerpc-chrp-null-deref.dpatch [SECURITY][powerpc] Fix NULL pointer dereference if get_property fails on the subarchitecture See CVE-2007-6694 * random-bound-check-ordering.dpatch [SECURITY] Fix stack-based buffer overflow in the random number generator See CVE-2007-3105 * mmap-VM_DONTEXPAND.dpatch [SECURITY] Add VM_DONTEXPAND to vm_flags in drivers that register a fault handler but do not bounds check the offset argument See CVE-2008-0007 oldstable/main/source/horde3_3.0.4-4sarge7.dsc oldstable/main/binary-all/horde3_3.0.4-4sarge7_all.deb oldstable/main/source/horde3_3.0.4-4sarge7.diff.gz horde3 (3.0.4-4sarge7) oldstable-security; urgency=high * Fix arbitrary file inclusion through abuse of the theme preference (see CVE-2008-1284 for more informations). (Closes: #470640) oldstable/main/binary-sparc/gs-gpl_8.01-6_sparc.deb gs-gpl (8.01-6) oldstable-security; urgency=high * Fix CVE-2008-0411 oldstable/main/binary-s390/gs-gpl_8.01-6_s390.deb gs-gpl (8.01-6) oldstable-security; urgency=high * Fix CVE-2008-0411 oldstable/main/binary-powerpc/gs-gpl_8.01-6_powerpc.deb gs-gpl (8.01-6) oldstable-security; urgency=high * Fix CVE-2008-0411 oldstable/main/binary-mipsel/gs-gpl_8.01-6_mipsel.deb gs-gpl (8.01-6) oldstable-security; urgency=high * Fix CVE-2008-0411 oldstable/main/binary-mips/gs-gpl_8.01-6_mips.deb gs-gpl (8.01-6) oldstable-security; urgency=high * Fix CVE-2008-0411 oldstable/main/binary-m68k/gs-gpl_8.01-6_m68k.deb gs-gpl (8.01-6) oldstable-security; urgency=high * Fix CVE-2008-0411 oldstable/main/binary-ia64/gs-gpl_8.01-6_ia64.deb gs-gpl (8.01-6) oldstable-security; urgency=high * Fix CVE-2008-0411 oldstable/main/binary-hppa/gs-gpl_8.01-6_hppa.deb gs-gpl (8.01-6) oldstable-security; urgency=high * Fix CVE-2008-0411 oldstable/main/binary-arm/gs-gpl_8.01-6_arm.deb gs-gpl (8.01-6) oldstable-security; urgency=high * Fix CVE-2008-0411 oldstable/main/binary-amd64/gs-gpl_8.01-6_amd64.deb gs-gpl (8.01-6) oldstable-security; urgency=high * Fix CVE-2008-0411 oldstable/main/binary-alpha/gs-gpl_8.01-6_alpha.deb gs-gpl (8.01-6) oldstable-security; urgency=high * Fix CVE-2008-0411 oldstable/main/binary-i386/gs-gpl_8.01-6_i386.deb oldstable/main/source/gs-gpl_8.01-6.diff.gz oldstable/main/binary-all/gs_8.01-6_all.deb oldstable/main/source/gs-gpl_8.01-6.dsc gs-gpl (8.01-6) oldstable-security; urgency=high * Fix CVE-2008-0411 oldstable/main/binary-sparc/gs-esp_7.07.1-9sarge1_sparc.deb gs-esp (7.07.1-9sarge1) oldstable-security; urgency=high * Fix CVE-2008-0411 oldstable/main/binary-s390/gs-esp_7.07.1-9sarge1_s390.deb gs-esp (7.07.1-9sarge1) oldstable-security; urgency=high * Fix CVE-2008-0411 oldstable/main/binary-powerpc/gs-esp_7.07.1-9sarge1_powerpc.deb gs-esp (7.07.1-9sarge1) oldstable-security; urgency=high * Fix CVE-2008-0411 oldstable/main/binary-mipsel/gs-esp_7.07.1-9sarge1_mipsel.deb gs-esp (7.07.1-9sarge1) oldstable-security; urgency=high * Fix CVE-2008-0411 oldstable/main/binary-mips/gs-esp_7.07.1-9sarge1_mips.deb gs-esp (7.07.1-9sarge1) oldstable-security; urgency=high * Fix CVE-2008-0411 oldstable/main/binary-m68k/gs-esp_7.07.1-9sarge1_m68k.deb gs-esp (7.07.1-9sarge1) oldstable-security; urgency=high * Fix CVE-2008-0411 oldstable/main/binary-ia64/gs-esp_7.07.1-9sarge1_ia64.deb gs-esp (7.07.1-9sarge1) oldstable-security; urgency=high * Fix CVE-2008-0411 oldstable/main/binary-hppa/gs-esp_7.07.1-9sarge1_hppa.deb gs-esp (7.07.1-9sarge1) oldstable-security; urgency=high * Fix CVE-2008-0411 oldstable/main/binary-arm/gs-esp_7.07.1-9sarge1_arm.deb gs-esp (7.07.1-9sarge1) oldstable-security; urgency=high * Fix CVE-2008-0411 oldstable/main/binary-amd64/gs-esp_7.07.1-9sarge1_amd64.deb gs-esp (7.07.1-9sarge1) oldstable-security; urgency=high * Fix CVE-2008-0411 oldstable/main/binary-alpha/gs-esp_7.07.1-9sarge1_alpha.deb gs-esp (7.07.1-9sarge1) oldstable-security; urgency=high * Fix CVE-2008-0411 oldstable/main/binary-i386/gs-esp_7.07.1-9sarge1_i386.deb oldstable/main/source/gs-esp_7.07.1-9sarge1.dsc oldstable/main/source/gs-esp_7.07.1-9sarge1.diff.gz gs-esp (7.07.1-9sarge1) oldstable-security; urgency=high * Fix CVE-2008-0411 oldstable/main/binary-all/gforge-web-apache_3.1-31sarge5_all.deb oldstable/main/binary-all/gforge-lists-mailman_3.1-31sarge5_all.deb oldstable/main/binary-all/gforge-ftp-proftpd_3.1-31sarge5_all.deb oldstable/main/source/gforge_3.1-31sarge5.diff.gz oldstable/main/source/gforge_3.1-31sarge5.dsc oldstable/main/binary-all/gforge-sourceforge-transition_3.1-31sarge5_all.deb oldstable/main/binary-all/sourceforge_3.1-31sarge5_all.deb oldstable/main/binary-all/gforge-mta-exim4_3.1-31sarge5_all.deb oldstable/main/binary-all/gforge-db-postgresql_3.1-31sarge5_all.deb oldstable/main/binary-all/gforge-common_3.1-31sarge5_all.deb oldstable/main/binary-all/gforge-dns-bind9_3.1-31sarge5_all.deb oldstable/main/binary-all/gforge_3.1-31sarge5_all.deb oldstable/main/binary-all/gforge-cvs_3.1-31sarge5_all.deb oldstable/main/binary-all/gforge-mta-exim_3.1-31sarge5_all.deb oldstable/main/binary-all/gforge-shell-ldap_3.1-31sarge5_all.deb oldstable/main/binary-all/gforge-mta-postfix_3.1-31sarge5_all.deb oldstable/main/binary-all/gforge-ldap-openldap_3.1-31sarge5_all.deb gforge (3.1-31sarge5) oldstable-security; urgency=high * Fixed SQL injection vulnerability due to insufficient input sanitizing (CVE-2008-0173). oldstable/main/binary-sparc/libflac6_1.1.1-5sarge1_sparc.deb oldstable/main/binary-sparc/liboggflac++0c102_1.1.1-5sarge1_sparc.deb oldstable/main/binary-sparc/flac_1.1.1-5sarge1_sparc.deb oldstable/main/binary-sparc/libflac++4_1.1.1-5sarge1_sparc.deb oldstable/main/binary-sparc/libflac++-dev_1.1.1-5sarge1_sparc.deb oldstable/main/binary-sparc/xmms-flac_1.1.1-5sarge1_sparc.deb oldstable/main/binary-sparc/liboggflac++-dev_1.1.1-5sarge1_sparc.deb oldstable/main/binary-sparc/liboggflac1_1.1.1-5sarge1_sparc.deb oldstable/main/binary-sparc/liboggflac-dev_1.1.1-5sarge1_sparc.deb oldstable/main/binary-sparc/libflac-dev_1.1.1-5sarge1_sparc.deb flac (1.1.1-5sarge1) oldstable-security; urgency=high * Fix several vulnerabilities. oldstable/main/binary-s390/liboggflac-dev_1.1.1-5sarge1_s390.deb oldstable/main/binary-s390/xmms-flac_1.1.1-5sarge1_s390.deb oldstable/main/binary-s390/liboggflac++0c102_1.1.1-5sarge1_s390.deb oldstable/main/binary-s390/libflac-dev_1.1.1-5sarge1_s390.deb oldstable/main/binary-s390/liboggflac1_1.1.1-5sarge1_s390.deb oldstable/main/binary-s390/flac_1.1.1-5sarge1_s390.deb oldstable/main/binary-s390/libflac6_1.1.1-5sarge1_s390.deb oldstable/main/binary-s390/liboggflac++-dev_1.1.1-5sarge1_s390.deb oldstable/main/binary-s390/libflac++-dev_1.1.1-5sarge1_s390.deb oldstable/main/binary-s390/libflac++4_1.1.1-5sarge1_s390.deb flac (1.1.1-5sarge1) oldstable-security; urgency=high * Fix several vulnerabilities. oldstable/main/binary-powerpc/libflac6_1.1.1-5sarge1_powerpc.deb oldstable/main/binary-powerpc/libflac-dev_1.1.1-5sarge1_powerpc.deb oldstable/main/binary-powerpc/flac_1.1.1-5sarge1_powerpc.deb oldstable/main/binary-powerpc/liboggflac1_1.1.1-5sarge1_powerpc.deb oldstable/main/binary-powerpc/liboggflac-dev_1.1.1-5sarge1_powerpc.deb oldstable/main/binary-powerpc/liboggflac++-dev_1.1.1-5sarge1_powerpc.deb oldstable/main/binary-powerpc/libflac++4_1.1.1-5sarge1_powerpc.deb oldstable/main/binary-powerpc/xmms-flac_1.1.1-5sarge1_powerpc.deb oldstable/main/binary-powerpc/liboggflac++0c102_1.1.1-5sarge1_powerpc.deb oldstable/main/binary-powerpc/libflac++-dev_1.1.1-5sarge1_powerpc.deb flac (1.1.1-5sarge1) oldstable-security; urgency=high * Fix several vulnerabilities. oldstable/main/binary-mipsel/liboggflac-dev_1.1.1-5sarge1_mipsel.deb oldstable/main/binary-mipsel/liboggflac++0c102_1.1.1-5sarge1_mipsel.deb oldstable/main/binary-mipsel/liboggflac1_1.1.1-5sarge1_mipsel.deb oldstable/main/binary-mipsel/libflac++4_1.1.1-5sarge1_mipsel.deb oldstable/main/binary-mipsel/libflac6_1.1.1-5sarge1_mipsel.deb oldstable/main/binary-mipsel/libflac-dev_1.1.1-5sarge1_mipsel.deb oldstable/main/binary-mipsel/liboggflac++-dev_1.1.1-5sarge1_mipsel.deb oldstable/main/binary-mipsel/libflac++-dev_1.1.1-5sarge1_mipsel.deb oldstable/main/binary-mipsel/flac_1.1.1-5sarge1_mipsel.deb oldstable/main/binary-mipsel/xmms-flac_1.1.1-5sarge1_mipsel.deb flac (1.1.1-5sarge1) oldstable-security; urgency=high * Fix several vulnerabilities. oldstable/main/binary-mips/liboggflac++0c102_1.1.1-5sarge1_mips.deb oldstable/main/binary-mips/liboggflac1_1.1.1-5sarge1_mips.deb oldstable/main/binary-mips/libflac6_1.1.1-5sarge1_mips.deb oldstable/main/binary-mips/liboggflac-dev_1.1.1-5sarge1_mips.deb oldstable/main/binary-mips/libflac++4_1.1.1-5sarge1_mips.deb oldstable/main/binary-mips/xmms-flac_1.1.1-5sarge1_mips.deb oldstable/main/binary-mips/flac_1.1.1-5sarge1_mips.deb oldstable/main/binary-mips/libflac++-dev_1.1.1-5sarge1_mips.deb oldstable/main/binary-mips/libflac-dev_1.1.1-5sarge1_mips.deb oldstable/main/binary-mips/liboggflac++-dev_1.1.1-5sarge1_mips.deb flac (1.1.1-5sarge1) oldstable-security; urgency=high * Fix several vulnerabilities. oldstable/main/binary-m68k/flac_1.1.1-5sarge1_m68k.deb oldstable/main/binary-m68k/libflac++-dev_1.1.1-5sarge1_m68k.deb oldstable/main/binary-m68k/liboggflac-dev_1.1.1-5sarge1_m68k.deb oldstable/main/binary-m68k/liboggflac1_1.1.1-5sarge1_m68k.deb oldstable/main/binary-m68k/liboggflac++0c102_1.1.1-5sarge1_m68k.deb oldstable/main/binary-m68k/liboggflac++-dev_1.1.1-5sarge1_m68k.deb oldstable/main/binary-m68k/libflac-dev_1.1.1-5sarge1_m68k.deb oldstable/main/binary-m68k/xmms-flac_1.1.1-5sarge1_m68k.deb oldstable/main/binary-m68k/libflac6_1.1.1-5sarge1_m68k.deb oldstable/main/binary-m68k/libflac++4_1.1.1-5sarge1_m68k.deb flac (1.1.1-5sarge1) oldstable-security; urgency=high * Fix several vulnerabilities. oldstable/main/binary-ia64/libflac6_1.1.1-5sarge1_ia64.deb oldstable/main/binary-ia64/libflac++-dev_1.1.1-5sarge1_ia64.deb oldstable/main/binary-ia64/xmms-flac_1.1.1-5sarge1_ia64.deb oldstable/main/binary-ia64/libflac-dev_1.1.1-5sarge1_ia64.deb oldstable/main/binary-ia64/liboggflac++0c102_1.1.1-5sarge1_ia64.deb oldstable/main/binary-ia64/liboggflac-dev_1.1.1-5sarge1_ia64.deb oldstable/main/binary-ia64/liboggflac1_1.1.1-5sarge1_ia64.deb oldstable/main/binary-ia64/libflac++4_1.1.1-5sarge1_ia64.deb oldstable/main/binary-ia64/liboggflac++-dev_1.1.1-5sarge1_ia64.deb oldstable/main/binary-ia64/flac_1.1.1-5sarge1_ia64.deb flac (1.1.1-5sarge1) oldstable-security; urgency=high * Fix several vulnerabilities. oldstable/main/binary-hppa/liboggflac-dev_1.1.1-5sarge1_hppa.deb oldstable/main/binary-hppa/libflac-dev_1.1.1-5sarge1_hppa.deb oldstable/main/binary-hppa/liboggflac++-dev_1.1.1-5sarge1_hppa.deb oldstable/main/binary-hppa/libflac++-dev_1.1.1-5sarge1_hppa.deb oldstable/main/binary-hppa/liboggflac++0c102_1.1.1-5sarge1_hppa.deb oldstable/main/binary-hppa/libflac++4_1.1.1-5sarge1_hppa.deb oldstable/main/binary-hppa/liboggflac1_1.1.1-5sarge1_hppa.deb oldstable/main/binary-hppa/libflac6_1.1.1-5sarge1_hppa.deb oldstable/main/binary-hppa/xmms-flac_1.1.1-5sarge1_hppa.deb oldstable/main/binary-hppa/flac_1.1.1-5sarge1_hppa.deb flac (1.1.1-5sarge1) oldstable-security; urgency=high * Fix several vulnerabilities. oldstable/main/binary-arm/liboggflac++-dev_1.1.1-5sarge1_arm.deb oldstable/main/binary-arm/liboggflac1_1.1.1-5sarge1_arm.deb oldstable/main/binary-arm/libflac++4_1.1.1-5sarge1_arm.deb oldstable/main/binary-arm/flac_1.1.1-5sarge1_arm.deb oldstable/main/binary-arm/xmms-flac_1.1.1-5sarge1_arm.deb oldstable/main/binary-arm/liboggflac++0c102_1.1.1-5sarge1_arm.deb oldstable/main/binary-arm/libflac++-dev_1.1.1-5sarge1_arm.deb oldstable/main/binary-arm/liboggflac-dev_1.1.1-5sarge1_arm.deb oldstable/main/binary-arm/libflac6_1.1.1-5sarge1_arm.deb oldstable/main/binary-arm/libflac-dev_1.1.1-5sarge1_arm.deb flac (1.1.1-5sarge1) oldstable-security; urgency=high * Fix several vulnerabilities. oldstable/main/binary-amd64/liboggflac1_1.1.1-5sarge1_amd64.deb oldstable/main/binary-amd64/libflac++4_1.1.1-5sarge1_amd64.deb oldstable/main/binary-amd64/liboggflac++-dev_1.1.1-5sarge1_amd64.deb oldstable/main/binary-amd64/libflac++-dev_1.1.1-5sarge1_amd64.deb oldstable/main/binary-amd64/liboggflac++0c102_1.1.1-5sarge1_amd64.deb oldstable/main/binary-amd64/flac_1.1.1-5sarge1_amd64.deb oldstable/main/binary-amd64/libflac6_1.1.1-5sarge1_amd64.deb oldstable/main/binary-amd64/libflac-dev_1.1.1-5sarge1_amd64.deb oldstable/main/binary-amd64/xmms-flac_1.1.1-5sarge1_amd64.deb oldstable/main/binary-amd64/liboggflac-dev_1.1.1-5sarge1_amd64.deb flac (1.1.1-5sarge1) oldstable-security; urgency=high * Fix several vulnerabilities. oldstable/main/binary-alpha/xmms-flac_1.1.1-5sarge1_alpha.deb oldstable/main/binary-alpha/liboggflac-dev_1.1.1-5sarge1_alpha.deb oldstable/main/binary-alpha/libflac6_1.1.1-5sarge1_alpha.deb oldstable/main/binary-alpha/liboggflac++0c102_1.1.1-5sarge1_alpha.deb oldstable/main/binary-alpha/liboggflac1_1.1.1-5sarge1_alpha.deb oldstable/main/binary-alpha/flac_1.1.1-5sarge1_alpha.deb oldstable/main/binary-alpha/liboggflac++-dev_1.1.1-5sarge1_alpha.deb oldstable/main/binary-alpha/libflac-dev_1.1.1-5sarge1_alpha.deb oldstable/main/binary-alpha/libflac++4_1.1.1-5sarge1_alpha.deb oldstable/main/binary-alpha/libflac++-dev_1.1.1-5sarge1_alpha.deb flac (1.1.1-5sarge1) oldstable-security; urgency=high * Fix several vulnerabilities. oldstable/main/binary-i386/liboggflac-dev_1.1.1-5sarge1_i386.deb oldstable/main/binary-i386/libflac6_1.1.1-5sarge1_i386.deb oldstable/main/binary-i386/libflac-dev_1.1.1-5sarge1_i386.deb oldstable/main/binary-i386/flac_1.1.1-5sarge1_i386.deb oldstable/main/binary-i386/libflac++4_1.1.1-5sarge1_i386.deb oldstable/main/binary-i386/liboggflac++-dev_1.1.1-5sarge1_i386.deb oldstable/main/binary-i386/liboggflac1_1.1.1-5sarge1_i386.deb oldstable/main/binary-i386/libflac++-dev_1.1.1-5sarge1_i386.deb oldstable/main/source/flac_1.1.1-5sarge1.diff.gz oldstable/main/source/flac_1.1.1-5sarge1.dsc oldstable/main/binary-i386/xmms-flac_1.1.1-5sarge1_i386.deb oldstable/main/binary-i386/liboggflac++0c102_1.1.1-5sarge1_i386.deb flac (1.1.1-5sarge1) oldstable-security; urgency=high * Fix several vulnerabilities. oldstable/main/source/fai-kernels_1.9.1sarge7.1.tar.gz oldstable/main/source/fai-kernels_1.9.1sarge7.1.dsc oldstable/main/binary-i386/fai-kernels_1.9.1sarge7.1_i386.deb fai-kernels (1.9.1sarge7.1) oldstable; urgency=high * Build against kernel-tree-2.6.8-17sarge1: * compat_sys_mount-NULL-data_page.dpatch [SECURITY] Fix oops in compat_sys_mount triggered by NULL data_page See CVE-2006-7203 * pppoe-socket-release-mem-leak.dpatch [SECURITY] fix unpriveleged memory leak when a PPPoE socket is released after connect but before PPPIOCGCHAN ioctl is called upon it See CVE-2007-2525 * dn_fib-out-of-bounds.dpatch, ipv4-fib_props-out-of-bounds.dpatch [SECURITY] Fix out of bounds condition in dn_fib_props[] See CVE-2007-2172 * aacraid-ioctl-perm-check.dpatch [SECURITY] Require admin capabilities to issue ioctls to aacraid devices See CVE-2007-4308 * reset-pdeathsig-on-suid.dpatch [SECURITY] Fix potential privilege escalation caused by improper clearing of the child process' pdeath signal. See CVE-2007-3848 * bluetooth-l2cap-hci-info-leaks.dpatch [SECURITY] Fix information leaks in setsockopt() implementations See CVE-2007-1353 * coredump-only-to-same-uid.dpatch [SECURITY] Fix an issue where core dumping over a file that already exists retains the ownership of the original file See CVE-2007-6206 * i4l-isdn_ioctl-mem-overrun.dpatch [SECURITY] Fix potential isdn ioctl memory overrun See CVE-2007-6151 * cramfs-check-block-length.dpatch [SECURITY] Add a sanity check of the block length in cramfs_readpage to avoid a potential oops condition See CVE-2006-5823 * ext2-skip-pages-past-num-blocks.dpatch [SECURITY] Add some sanity checking for a corrupted i_size in ext2_find_entry() See CVE-2006-6054 * minixfs-printk-hang.dpatch [SECURITY] Rate-limit printks caused by accessing a corrupted minixfs filesystem that would otherwise cause a system to hang (printk storm) See CVE-2006-6058 * isdn-net-overflow.dpatch [SECURITY] Fix potential overflows in the ISDN subsystem See CVE-2007-6063 * prevent-stack-growth-into-hugetlb-region.dpatch [SECURITY] Prevent OOPS during stack expansion when the VMA crosses into address space reserved for hugetlb pages. See CVE-2007-3739 * cifs-honor-umask.dpatch [SECURITY] Make CIFS honor a process' umask See CVE-2007-3740 * hugetlb-prio_tree-unit-fix.dpatch [SECURITY] Fix misconversion of hugetlb_vmtruncate_list to prio_tree which could be used to trigger a BUG_ON() call in exit_mmap. See CVE-2007-4133 * amd64-zero-extend-32bit-ptrace.dpatch [SECURITY] Zero extend all registers after ptrace in 32-bit entry path. See CVE-2007-4573 * usb-pwc-disconnect-block.dpatch [SECURITY] Fix issue with unplugging webcams that use the pwc driver. If userspace still has the device open it can result, the driver would wait for the device to close, blocking the USB subsystem. See CVE-2007-5093 * powerpc-chrp-null-deref.dpatch [SECURITY][powerpc] Fix NULL pointer dereference if get_property fails on the subarchitecture See CVE-2007-6694 * random-bound-check-ordering.dpatch [SECURITY] Fix stack-based buffer overflow in the random number generator See CVE-2007-3105 * mmap-VM_DONTEXPAND.dpatch [SECURITY] Add VM_DONTEXPAND to vm_flags in drivers that register a fault handler but do not bounds check the offset argument See CVE-2008-0007 oldstable/main/binary-sparc/exiftags_0.98-1.1+0sarge1_sparc.deb exiftags (0.98-1.1+0sarge1) oldstable-security; urgency=high * Non-maintainer upload by the Security Team. * Backport upstream fixes from v1.01: - CVE-2007-6354, CVE-2007-6355: integer overflow and memory access errors through inadequate EXIF data validation - CVE-2007-6356: recursive IFD references in EXIF data would cause a denial of service via infinite loop oldstable/main/binary-s390/exiftags_0.98-1.1+0sarge1_s390.deb exiftags (0.98-1.1+0sarge1) oldstable-security; urgency=high * Non-maintainer upload by the Security Team. * Backport upstream fixes from v1.01: - CVE-2007-6354, CVE-2007-6355: integer overflow and memory access errors through inadequate EXIF data validation - CVE-2007-6356: recursive IFD references in EXIF data would cause a denial of service via infinite loop oldstable/main/binary-powerpc/exiftags_0.98-1.1+0sarge1_powerpc.deb exiftags (0.98-1.1+0sarge1) oldstable-security; urgency=high * Non-maintainer upload by the Security Team. * Backport upstream fixes from v1.01: - CVE-2007-6354, CVE-2007-6355: integer overflow and memory access errors through inadequate EXIF data validation - CVE-2007-6356: recursive IFD references in EXIF data would cause a denial of service via infinite loop oldstable/main/binary-mipsel/exiftags_0.98-1.1+0sarge1_mipsel.deb exiftags (0.98-1.1+0sarge1) oldstable-security; urgency=high * Non-maintainer upload by the Security Team. * Backport upstream fixes from v1.01: - CVE-2007-6354, CVE-2007-6355: integer overflow and memory access errors through inadequate EXIF data validation - CVE-2007-6356: recursive IFD references in EXIF data would cause a denial of service via infinite loop oldstable/main/binary-mips/exiftags_0.98-1.1+0sarge1_mips.deb exiftags (0.98-1.1+0sarge1) oldstable-security; urgency=high * Non-maintainer upload by the Security Team. * Backport upstream fixes from v1.01: - CVE-2007-6354, CVE-2007-6355: integer overflow and memory access errors through inadequate EXIF data validation - CVE-2007-6356: recursive IFD references in EXIF data would cause a denial of service via infinite loop oldstable/main/binary-m68k/exiftags_0.98-1.1+0sarge1_m68k.deb exiftags (0.98-1.1+0sarge1) oldstable-security; urgency=high * Non-maintainer upload by the Security Team. * Backport upstream fixes from v1.01: - CVE-2007-6354, CVE-2007-6355: integer overflow and memory access errors through inadequate EXIF data validation - CVE-2007-6356: recursive IFD references in EXIF data would cause a denial of service via infinite loop oldstable/main/binary-ia64/exiftags_0.98-1.1+0sarge1_ia64.deb exiftags (0.98-1.1+0sarge1) oldstable-security; urgency=high * Non-maintainer upload by the Security Team. * Backport upstream fixes from v1.01: - CVE-2007-6354, CVE-2007-6355: integer overflow and memory access errors through inadequate EXIF data validation - CVE-2007-6356: recursive IFD references in EXIF data would cause a denial of service via infinite loop oldstable/main/binary-hppa/exiftags_0.98-1.1+0sarge1_hppa.deb exiftags (0.98-1.1+0sarge1) oldstable-security; urgency=high * Non-maintainer upload by the Security Team. * Backport upstream fixes from v1.01: - CVE-2007-6354, CVE-2007-6355: integer overflow and memory access errors through inadequate EXIF data validation - CVE-2007-6356: recursive IFD references in EXIF data would cause a denial of service via infinite loop oldstable/main/binary-arm/exiftags_0.98-1.1+0sarge1_arm.deb exiftags (0.98-1.1+0sarge1) oldstable-security; urgency=high * Non-maintainer upload by the Security Team. * Backport upstream fixes from v1.01: - CVE-2007-6354, CVE-2007-6355: integer overflow and memory access errors through inadequate EXIF data validation - CVE-2007-6356: recursive IFD references in EXIF data would cause a denial of service via infinite loop oldstable/main/binary-amd64/exiftags_0.98-1.1+0sarge1_amd64.deb exiftags (0.98-1.1+0sarge1) oldstable-security; urgency=high * Non-maintainer upload by the Security Team. * Backport upstream fixes from v1.01: - CVE-2007-6354, CVE-2007-6355: integer overflow and memory access errors through inadequate EXIF data validation - CVE-2007-6356: recursive IFD references in EXIF data would cause a denial of service via infinite loop oldstable/main/binary-alpha/exiftags_0.98-1.1+0sarge1_alpha.deb exiftags (0.98-1.1+0sarge1) oldstable-security; urgency=high * Non-maintainer upload by the Security Team. * Backport upstream fixes from v1.01: - CVE-2007-6354, CVE-2007-6355: integer overflow and memory access errors through inadequate EXIF data validation - CVE-2007-6356: recursive IFD references in EXIF data would cause a denial of service via infinite loop oldstable/main/source/exiftags_0.98-1.1+0sarge1.diff.gz oldstable/main/binary-i386/exiftags_0.98-1.1+0sarge1_i386.deb oldstable/main/source/exiftags_0.98-1.1+0sarge1.dsc exiftags (0.98-1.1+0sarge1) oldstable-security; urgency=high * Non-maintainer upload by the Security Team. * Backport upstream fixes from v1.01: - CVE-2007-6354, CVE-2007-6355: integer overflow and memory access errors through inadequate EXIF data validation - CVE-2007-6356: recursive IFD references in EXIF data would cause a denial of service via infinite loop oldstable/main/binary-sparc/evolution-dev_2.0.4-2sarge3_sparc.deb oldstable/main/binary-sparc/evolution_2.0.4-2sarge3_sparc.deb evolution (2.0.4-2sarge3) oldstable-security; urgency=high * Non-maintainer upload by the security team. * Fix Encrypted Message Version Format String Vulnerability (CVE-2008-0072). oldstable/main/binary-s390/evolution-dev_2.0.4-2sarge3_s390.deb oldstable/main/binary-s390/evolution_2.0.4-2sarge3_s390.deb evolution (2.0.4-2sarge3) oldstable-security; urgency=high * Non-maintainer upload by the security team. * Fix Encrypted Message Version Format String Vulnerability (CVE-2008-0072). oldstable/main/binary-powerpc/evolution-dev_2.0.4-2sarge3_powerpc.deb oldstable/main/binary-powerpc/evolution_2.0.4-2sarge3_powerpc.deb evolution (2.0.4-2sarge3) oldstable-security; urgency=high * Non-maintainer upload by the security team. * Fix Encrypted Message Version Format String Vulnerability (CVE-2008-0072). oldstable/main/binary-mipsel/evolution_2.0.4-2sarge3_mipsel.deb oldstable/main/binary-mipsel/evolution-dev_2.0.4-2sarge3_mipsel.deb evolution (2.0.4-2sarge3) oldstable-security; urgency=high * Non-maintainer upload by the security team. * Fix Encrypted Message Version Format String Vulnerability (CVE-2008-0072). oldstable/main/binary-mips/evolution_2.0.4-2sarge3_mips.deb oldstable/main/binary-mips/evolution-dev_2.0.4-2sarge3_mips.deb evolution (2.0.4-2sarge3) oldstable-security; urgency=high * Non-maintainer upload by the security team. * Fix Encrypted Message Version Format String Vulnerability (CVE-2008-0072). oldstable/main/binary-m68k/evolution-dev_2.0.4-2sarge3_m68k.deb oldstable/main/binary-m68k/evolution_2.0.4-2sarge3_m68k.deb evolution (2.0.4-2sarge3) oldstable-security; urgency=high * Non-maintainer upload by the security team. * Fix Encrypted Message Version Format String Vulnerability (CVE-2008-0072). oldstable/main/binary-ia64/evolution_2.0.4-2sarge3_ia64.deb oldstable/main/binary-ia64/evolution-dev_2.0.4-2sarge3_ia64.deb evolution (2.0.4-2sarge3) oldstable-security; urgency=high * Non-maintainer upload by the security team. * Fix Encrypted Message Version Format String Vulnerability (CVE-2008-0072). oldstable/main/binary-hppa/evolution-dev_2.0.4-2sarge3_hppa.deb oldstable/main/binary-hppa/evolution_2.0.4-2sarge3_hppa.deb evolution (2.0.4-2sarge3) oldstable-security; urgency=high * Non-maintainer upload by the security team. * Fix Encrypted Message Version Format String Vulnerability (CVE-2008-0072). oldstable/main/binary-arm/evolution_2.0.4-2sarge3_arm.deb oldstable/main/binary-arm/evolution-dev_2.0.4-2sarge3_arm.deb evolution (2.0.4-2sarge3) oldstable-security; urgency=high * Non-maintainer upload by the security team. * Fix Encrypted Message Version Format String Vulnerability (CVE-2008-0072). oldstable/main/binary-amd64/evolution-dev_2.0.4-2sarge3_amd64.deb oldstable/main/binary-amd64/evolution_2.0.4-2sarge3_amd64.deb evolution (2.0.4-2sarge3) oldstable-security; urgency=high * Non-maintainer upload by the security team. * Fix Encrypted Message Version Format String Vulnerability (CVE-2008-0072). oldstable/main/binary-alpha/evolution-dev_2.0.4-2sarge3_alpha.deb oldstable/main/binary-alpha/evolution_2.0.4-2sarge3_alpha.deb evolution (2.0.4-2sarge3) oldstable-security; urgency=high * Non-maintainer upload by the security team. * Fix Encrypted Message Version Format String Vulnerability (CVE-2008-0072). oldstable/main/source/evolution_2.0.4-2sarge3.dsc oldstable/main/source/evolution_2.0.4-2sarge3.diff.gz oldstable/main/binary-i386/evolution-dev_2.0.4-2sarge3_i386.deb oldstable/main/binary-i386/evolution_2.0.4-2sarge3_i386.deb evolution (2.0.4-2sarge3) oldstable-security; urgency=high * Non-maintainer upload by the security team. * Fix Encrypted Message Version Format String Vulnerability (CVE-2008-0072). oldstable/main/binary-sparc/ethereal-common_0.10.10-2sarge11_sparc.deb oldstable/main/binary-sparc/ethereal-dev_0.10.10-2sarge11_sparc.deb oldstable/main/binary-sparc/tethereal_0.10.10-2sarge11_sparc.deb oldstable/main/binary-sparc/ethereal_0.10.10-2sarge11_sparc.deb ethereal (0.10.10-2sarge11) oldstable-security; urgency=high * Backport two further security fixes from 0.99.7 reported later: CVE-2007-6450, CVE-2007-6451 oldstable/main/binary-s390/ethereal-common_0.10.10-2sarge11_s390.deb oldstable/main/binary-s390/ethereal-dev_0.10.10-2sarge11_s390.deb oldstable/main/binary-s390/tethereal_0.10.10-2sarge11_s390.deb oldstable/main/binary-s390/ethereal_0.10.10-2sarge11_s390.deb ethereal (0.10.10-2sarge11) oldstable-security; urgency=high * Backport two further security fixes from 0.99.7 reported later: CVE-2007-6450, CVE-2007-6451 oldstable/main/binary-powerpc/ethereal-common_0.10.10-2sarge11_powerpc.deb oldstable/main/binary-powerpc/ethereal_0.10.10-2sarge11_powerpc.deb oldstable/main/binary-powerpc/tethereal_0.10.10-2sarge11_powerpc.deb oldstable/main/binary-powerpc/ethereal-dev_0.10.10-2sarge11_powerpc.deb ethereal (0.10.10-2sarge11) oldstable-security; urgency=high * Backport two further security fixes from 0.99.7 reported later: CVE-2007-6450, CVE-2007-6451 oldstable/main/binary-mipsel/tethereal_0.10.10-2sarge11_mipsel.deb oldstable/main/binary-mipsel/ethereal-dev_0.10.10-2sarge11_mipsel.deb oldstable/main/binary-mipsel/ethereal_0.10.10-2sarge11_mipsel.deb oldstable/main/binary-mipsel/ethereal-common_0.10.10-2sarge11_mipsel.deb ethereal (0.10.10-2sarge11) oldstable-security; urgency=high * Backport two further security fixes from 0.99.7 reported later: CVE-2007-6450, CVE-2007-6451 oldstable/main/binary-mips/ethereal-common_0.10.10-2sarge11_mips.deb oldstable/main/binary-mips/ethereal_0.10.10-2sarge11_mips.deb oldstable/main/binary-mips/ethereal-dev_0.10.10-2sarge11_mips.deb oldstable/main/binary-mips/tethereal_0.10.10-2sarge11_mips.deb ethereal (0.10.10-2sarge11) oldstable-security; urgency=high * Backport two further security fixes from 0.99.7 reported later: CVE-2007-6450, CVE-2007-6451 oldstable/main/binary-m68k/ethereal_0.10.10-2sarge11_m68k.deb oldstable/main/binary-m68k/ethereal-common_0.10.10-2sarge11_m68k.deb oldstable/main/binary-m68k/tethereal_0.10.10-2sarge11_m68k.deb oldstable/main/binary-m68k/ethereal-dev_0.10.10-2sarge11_m68k.deb ethereal (0.10.10-2sarge11) oldstable-security; urgency=high * Backport two further security fixes from 0.99.7 reported later: CVE-2007-6450, CVE-2007-6451 oldstable/main/binary-ia64/ethereal-dev_0.10.10-2sarge11_ia64.deb oldstable/main/binary-ia64/tethereal_0.10.10-2sarge11_ia64.deb oldstable/main/binary-ia64/ethereal_0.10.10-2sarge11_ia64.deb oldstable/main/binary-ia64/ethereal-common_0.10.10-2sarge11_ia64.deb ethereal (0.10.10-2sarge11) oldstable-security; urgency=high * Backport two further security fixes from 0.99.7 reported later: CVE-2007-6450, CVE-2007-6451 oldstable/main/binary-hppa/ethereal-dev_0.10.10-2sarge11_hppa.deb oldstable/main/binary-hppa/ethereal-common_0.10.10-2sarge11_hppa.deb oldstable/main/binary-hppa/tethereal_0.10.10-2sarge11_hppa.deb oldstable/main/binary-hppa/ethereal_0.10.10-2sarge11_hppa.deb ethereal (0.10.10-2sarge11) oldstable-security; urgency=high * Backport two further security fixes from 0.99.7 reported later: CVE-2007-6450, CVE-2007-6451 oldstable/main/binary-arm/ethereal-common_0.10.10-2sarge11_arm.deb oldstable/main/binary-arm/ethereal-dev_0.10.10-2sarge11_arm.deb oldstable/main/binary-arm/tethereal_0.10.10-2sarge11_arm.deb oldstable/main/binary-arm/ethereal_0.10.10-2sarge11_arm.deb ethereal (0.10.10-2sarge11) oldstable-security; urgency=high * Backport two further security fixes from 0.99.7 reported later: CVE-2007-6450, CVE-2007-6451 oldstable/main/binary-amd64/ethereal_0.10.10-2sarge11_amd64.deb oldstable/main/binary-amd64/ethereal-common_0.10.10-2sarge11_amd64.deb oldstable/main/binary-amd64/tethereal_0.10.10-2sarge11_amd64.deb oldstable/main/binary-amd64/ethereal-dev_0.10.10-2sarge11_amd64.deb ethereal (0.10.10-2sarge11) oldstable-security; urgency=high * Backport two further security fixes from 0.99.7 reported later: CVE-2007-6450, CVE-2007-6451 oldstable/main/binary-alpha/ethereal-common_0.10.10-2sarge11_alpha.deb oldstable/main/binary-alpha/ethereal_0.10.10-2sarge11_alpha.deb oldstable/main/binary-alpha/tethereal_0.10.10-2sarge11_alpha.deb oldstable/main/binary-alpha/ethereal-dev_0.10.10-2sarge11_alpha.deb ethereal (0.10.10-2sarge11) oldstable-security; urgency=high * Backport two further security fixes from 0.99.7 reported later: CVE-2007-6450, CVE-2007-6451 oldstable/main/binary-i386/tethereal_0.10.10-2sarge11_i386.deb oldstable/main/source/ethereal_0.10.10-2sarge11.diff.gz oldstable/main/binary-i386/ethereal-dev_0.10.10-2sarge11_i386.deb oldstable/main/binary-i386/ethereal_0.10.10-2sarge11_i386.deb oldstable/main/binary-i386/ethereal-common_0.10.10-2sarge11_i386.deb oldstable/main/source/ethereal_0.10.10-2sarge11.dsc ethereal (0.10.10-2sarge11) oldstable-security; urgency=high * Backport two further security fixes from 0.99.7 reported later: CVE-2007-6450, CVE-2007-6451 oldstable/main/binary-sparc/eggdrop_1.6.17-3sarge1_sparc.deb eggdrop (1.6.17-3sarge1) oldstable-security; urgency=high * Non-maintainer upload by the security team * Fix stack based buffer-overflow in mod/server.mod/servrmsg.c, which allows user-assisted, remote IRC servers to execute arbitrary code via a long private message Fixes: CVE-2007-2807 oldstable/main/binary-s390/eggdrop_1.6.17-3sarge1_s390.deb eggdrop (1.6.17-3sarge1) oldstable-security; urgency=high * Non-maintainer upload by the security team * Fix stack based buffer-overflow in mod/server.mod/servrmsg.c, which allows user-assisted, remote IRC servers to execute arbitrary code via a long private message Fixes: CVE-2007-2807 oldstable/main/binary-powerpc/eggdrop_1.6.17-3sarge1_powerpc.deb eggdrop (1.6.17-3sarge1) oldstable-security; urgency=high * Non-maintainer upload by the security team * Fix stack based buffer-overflow in mod/server.mod/servrmsg.c, which allows user-assisted, remote IRC servers to execute arbitrary code via a long private message Fixes: CVE-2007-2807 oldstable/main/binary-mipsel/eggdrop_1.6.17-3sarge1_mipsel.deb eggdrop (1.6.17-3sarge1) oldstable-security; urgency=high * Non-maintainer upload by the security team * Fix stack based buffer-overflow in mod/server.mod/servrmsg.c, which allows user-assisted, remote IRC servers to execute arbitrary code via a long private message Fixes: CVE-2007-2807 oldstable/main/binary-mips/eggdrop_1.6.17-3sarge1_mips.deb eggdrop (1.6.17-3sarge1) oldstable-security; urgency=high * Non-maintainer upload by the security team * Fix stack based buffer-overflow in mod/server.mod/servrmsg.c, which allows user-assisted, remote IRC servers to execute arbitrary code via a long private message Fixes: CVE-2007-2807 oldstable/main/binary-m68k/eggdrop_1.6.17-3sarge1_m68k.deb eggdrop (1.6.17-3sarge1) oldstable-security; urgency=high * Non-maintainer upload by the security team * Fix stack based buffer-overflow in mod/server.mod/servrmsg.c, which allows user-assisted, remote IRC servers to execute arbitrary code via a long private message Fixes: CVE-2007-2807 oldstable/main/binary-ia64/eggdrop_1.6.17-3sarge1_ia64.deb eggdrop (1.6.17-3sarge1) oldstable-security; urgency=high * Non-maintainer upload by the security team * Fix stack based buffer-overflow in mod/server.mod/servrmsg.c, which allows user-assisted, remote IRC servers to execute arbitrary code via a long private message Fixes: CVE-2007-2807 oldstable/main/binary-hppa/eggdrop_1.6.17-3sarge1_hppa.deb eggdrop (1.6.17-3sarge1) oldstable-security; urgency=high * Non-maintainer upload by the security team * Fix stack based buffer-overflow in mod/server.mod/servrmsg.c, which allows user-assisted, remote IRC servers to execute arbitrary code via a long private message Fixes: CVE-2007-2807 oldstable/main/binary-arm/eggdrop_1.6.17-3sarge1_arm.deb eggdrop (1.6.17-3sarge1) oldstable-security; urgency=high * Non-maintainer upload by the security team * Fix stack based buffer-overflow in mod/server.mod/servrmsg.c, which allows user-assisted, remote IRC servers to execute arbitrary code via a long private message Fixes: CVE-2007-2807 oldstable/main/binary-amd64/eggdrop_1.6.17-3sarge1_amd64.deb eggdrop (1.6.17-3sarge1) oldstable-security; urgency=high * Non-maintainer upload by the security team * Fix stack based buffer-overflow in mod/server.mod/servrmsg.c, which allows user-assisted, remote IRC servers to execute arbitrary code via a long private message Fixes: CVE-2007-2807 oldstable/main/binary-alpha/eggdrop_1.6.17-3sarge1_alpha.deb eggdrop (1.6.17-3sarge1) oldstable-security; urgency=high * Non-maintainer upload by the security team * Fix stack based buffer-overflow in mod/server.mod/servrmsg.c, which allows user-assisted, remote IRC servers to execute arbitrary code via a long private message Fixes: CVE-2007-2807 oldstable/main/binary-all/eggdrop-data_1.6.17-3sarge1_all.deb oldstable/main/source/eggdrop_1.6.17-3sarge1.dsc oldstable/main/binary-i386/eggdrop_1.6.17-3sarge1_i386.deb oldstable/main/source/eggdrop_1.6.17-3sarge1.diff.gz eggdrop (1.6.17-3sarge1) oldstable-security; urgency=high * Non-maintainer upload by the security team * Fix stack based buffer-overflow in mod/server.mod/servrmsg.c, which allows user-assisted, remote IRC servers to execute arbitrary code via a long private message Fixes: CVE-2007-2807 oldstable/main/source/debian-goodies_0.23+sarge1.tar.gz oldstable/main/source/debian-goodies_0.23+sarge1.dsc oldstable/main/binary-all/debian-goodies_0.23+sarge1_all.deb debian-goodies (0.23+sarge1) oldstable-security; urgency=high * Non-maintainer upload by the security team. * Fix security bug that enables users to generate files in the filesystem with shell metacharacters and have the checkrestart script run external code (as root, since the script will only run as admin). (CVE-2007-3912, closes: 440411) oldstable/main/source/backup-manager_0.5.7-1sarge2.dsc oldstable/main/binary-all/backup-manager_0.5.7-1sarge2_all.deb oldstable/main/source/backup-manager_0.5.7-1sarge2.diff.gz backup-manager (0.5.7-1sarge2) oldstable-security; urgency=high * Non-maintainer upload by the security team. * Fix FTP password disclosure during FTP uploads, based on maintainer-supplied patch. Closes: #439392. CVE-2007-4656 oldstable/main/binary-i386/alsa-modules-2.4-386_1.0.8+2sarge1.1_i386.deb oldstable/main/binary-i386/alsa-modules-2.4-686-smp_1.0.8+2sarge1.1_i386.deb oldstable/main/binary-i386/alsa-modules-2.4-k7_1.0.8+2sarge1.1_i386.deb oldstable/main/binary-i386/alsa-modules-2.4.27-3-k6_1.0.8+2sarge1.1_i386.deb oldstable/main/source/alsa-modules-i386_1.0.8+2sarge1.1.dsc oldstable/main/binary-i386/alsa-modules-2.4.27-3-k7-smp_1.0.8+2sarge1.1_i386.deb oldstable/main/binary-i386/alsa-modules-2.4-686_1.0.8+2sarge1.1_i386.deb oldstable/main/binary-i386/alsa-modules-2.4.27-3-386_1.0.8+2sarge1.1_i386.deb oldstable/main/binary-i386/alsa-modules-2.4-586tsc_1.0.8+2sarge1.1_i386.deb oldstable/main/binary-i386/alsa-modules-2.4.27-3-686-smp_1.0.8+2sarge1.1_i386.deb oldstable/main/binary-i386/alsa-modules-2.4-k6_1.0.8+2sarge1.1_i386.deb oldstable/main/source/alsa-modules-i386_1.0.8+2sarge1.1.tar.gz oldstable/main/binary-i386/alsa-modules-2.4.27-3-k7_1.0.8+2sarge1.1_i386.deb oldstable/main/binary-i386/alsa-modules-2.4-k7-smp_1.0.8+2sarge1.1_i386.deb oldstable/main/binary-i386/alsa-modules-2.4.27-3-686_1.0.8+2sarge1.1_i386.deb oldstable/main/binary-i386/alsa-modules-2.4.27-3-586tsc_1.0.8+2sarge1.1_i386.deb alsa-modules-i386 (1.0.8+2sarge1.1) oldstable; urgency=high * Rebuild against alsa-driver_1.0.8-7sarge1: * NMU by the Security Team * 20_snd-page-alloc-leak.dpatch: Fix an issue in the alsa subsystem that allows a local user to read potentially sensitive kernel memory from the proc filesystem. See CVE-2007-4571 oldstable/main/source/alsa-driver_1.0.8-7sarge1.dsc oldstable/main/source/alsa-driver_1.0.8-7sarge1.diff.gz oldstable/main/binary-all/alsa-source_1.0.8-7sarge1_all.deb oldstable/main/binary-all/alsa-base_1.0.8-7sarge1_all.deb oldstable/main/binary-all/alsa-headers_1.0.8-7sarge1_all.deb alsa-driver (1.0.8-7sarge1) oldstable-security; urgency=high * NMU by the Security Team * 20_snd-page-alloc-leak.dpatch: Fix an issue in the alsa subsystem that allows a local user to read potentially sensitive kernel memory from the proc filesystem. See CVE-2007-4571 Removals: flyspray | 0.9.7-2.1 | source, all Closed bugs: 459345 ------------------- Reason ------------------- RoM: security nightmare, unsupported upstream, not in unstable anymore ---------------------------------------------- flashplugin-nonfree | 7.0.25-5 | source, i386 Closed bugs: 473556 ------------------- Reason ------------------- RoSRM; security nightmare ---------------------------------------------- ========================================= Thu, 27 Dec 2007 - Debian 3.1r7 released ========================================= oldstable/main/binary-arm/adesklets_0.4.7-1_arm.deb adesklets (0.4.7-1) unstable; urgency=low * New upstream release. oldstable/main/binary-mipsel/agenda.app_0.1-2_mipsel.deb agenda.app (0.1-2) unstable; urgency=low * Updated debian/control build-depends for GNUstep 0.9.4. * Renamed source package to agenda.app. * Fixed debian/copyright. oldstable/main/binary-arm/libantlr-dev_2.7.2-6_arm.deb antlr (2.7.2-6) unstable; urgency=low * changed debhelper compatibility level to 4 * added versioned dependency on debhelper oldstable/main/binary-alpha/apache2-common_2.0.54-5sarge2_alpha.deb oldstable/main/binary-alpha/apache2-utils_2.0.54-5sarge2_alpha.deb oldstable/main/binary-alpha/apache2-mpm-worker_2.0.54-5sarge2_alpha.deb oldstable/main/binary-alpha/apache2-mpm-perchild_2.0.54-5sarge2_alpha.deb oldstable/main/binary-alpha/apache2-mpm-prefork_2.0.54-5sarge2_alpha.deb oldstable/main/binary-alpha/apache2-prefork-dev_2.0.54-5sarge2_alpha.deb oldstable/main/binary-alpha/apache2-threaded-dev_2.0.54-5sarge2_alpha.deb oldstable/main/binary-alpha/libapr0_2.0.54-5sarge2_alpha.deb oldstable/main/binary-alpha/libapr0-dev_2.0.54-5sarge2_alpha.deb oldstable/main/binary-alpha/apache2_2.0.54-5sarge2_alpha.deb apache2 (2.0.54-5sarge2) oldstable-proposed-updates; urgency=low * Fix some less critical security issues: * Denial of service for threaded MPMs: - CVE-2005-2970: mpm_worker memory leak - CVE-2005-3357: mod_ssl with custom errorpage - CVE-2007-1863: mod_cache * Cross site scripting: - CVE-2005-3352: mod_imap - CVE-2006-3918: via Expect header - CVE-2006-5752: mod_status * Add check for scoreboard PID protection (CVE-2007-3304) oldstable/main/binary-arm/apache2-common_2.0.54-5sarge2_arm.deb oldstable/main/binary-arm/apache2-utils_2.0.54-5sarge2_arm.deb oldstable/main/binary-arm/apache2-mpm-worker_2.0.54-5sarge2_arm.deb oldstable/main/binary-arm/apache2-mpm-perchild_2.0.54-5sarge2_arm.deb oldstable/main/binary-arm/apache2-mpm-prefork_2.0.54-5sarge2_arm.deb oldstable/main/binary-arm/apache2-prefork-dev_2.0.54-5sarge2_arm.deb oldstable/main/binary-arm/apache2-threaded-dev_2.0.54-5sarge2_arm.deb oldstable/main/binary-arm/libapr0_2.0.54-5sarge2_arm.deb oldstable/main/binary-arm/libapr0-dev_2.0.54-5sarge2_arm.deb oldstable/main/binary-arm/apache2_2.0.54-5sarge2_arm.deb apache2 (2.0.54-5sarge2) oldstable-proposed-updates; urgency=low * Fix some less critical security issues: * Denial of service for threaded MPMs: - CVE-2005-2970: mpm_worker memory leak - CVE-2005-3357: mod_ssl with custom errorpage - CVE-2007-1863: mod_cache * Cross site scripting: - CVE-2005-3352: mod_imap - CVE-2006-3918: via Expect header - CVE-2006-5752: mod_status * Add check for scoreboard PID protection (CVE-2007-3304) oldstable/main/binary-hppa/apache2-common_2.0.54-5sarge2_hppa.deb oldstable/main/binary-hppa/apache2-utils_2.0.54-5sarge2_hppa.deb oldstable/main/binary-hppa/apache2-mpm-worker_2.0.54-5sarge2_hppa.deb oldstable/main/binary-hppa/apache2-mpm-perchild_2.0.54-5sarge2_hppa.deb oldstable/main/binary-hppa/apache2-mpm-prefork_2.0.54-5sarge2_hppa.deb oldstable/main/binary-hppa/apache2-prefork-dev_2.0.54-5sarge2_hppa.deb oldstable/main/binary-hppa/apache2-threaded-dev_2.0.54-5sarge2_hppa.deb oldstable/main/binary-hppa/libapr0_2.0.54-5sarge2_hppa.deb oldstable/main/binary-hppa/libapr0-dev_2.0.54-5sarge2_hppa.deb oldstable/main/binary-hppa/apache2_2.0.54-5sarge2_hppa.deb apache2 (2.0.54-5sarge2) oldstable-proposed-updates; urgency=low * Fix some less critical security issues: * Denial of service for threaded MPMs: - CVE-2005-2970: mpm_worker memory leak - CVE-2005-3357: mod_ssl with custom errorpage - CVE-2007-1863: mod_cache * Cross site scripting: - CVE-2005-3352: mod_imap - CVE-2006-3918: via Expect header - CVE-2006-5752: mod_status * Add check for scoreboard PID protection (CVE-2007-3304) oldstable/main/source/apache2_2.0.54-5sarge2.dsc oldstable/main/source/apache2_2.0.54-5sarge2.diff.gz oldstable/main/binary-all/apache2-mpm-threadpool_2.0.54-5sarge2_all.deb oldstable/main/binary-all/apache2-doc_2.0.54-5sarge2_all.deb oldstable/main/binary-i386/apache2-common_2.0.54-5sarge2_i386.deb oldstable/main/binary-i386/apache2-utils_2.0.54-5sarge2_i386.deb oldstable/main/binary-i386/apache2-mpm-worker_2.0.54-5sarge2_i386.deb oldstable/main/binary-i386/apache2-mpm-perchild_2.0.54-5sarge2_i386.deb oldstable/main/binary-i386/apache2-mpm-prefork_2.0.54-5sarge2_i386.deb oldstable/main/binary-i386/apache2-prefork-dev_2.0.54-5sarge2_i386.deb oldstable/main/binary-i386/apache2-threaded-dev_2.0.54-5sarge2_i386.deb oldstable/main/binary-i386/libapr0_2.0.54-5sarge2_i386.deb oldstable/main/binary-i386/libapr0-dev_2.0.54-5sarge2_i386.deb oldstable/main/binary-i386/apache2_2.0.54-5sarge2_i386.deb apache2 (2.0.54-5sarge2) oldstable-proposed-updates; urgency=low * Fix some less critical security issues: * Denial of service for threaded MPMs: - CVE-2005-2970: mpm_worker memory leak - CVE-2005-3357: mod_ssl with custom errorpage - CVE-2007-1863: mod_cache * Cross site scripting: - CVE-2005-3352: mod_imap - CVE-2006-3918: via Expect header - CVE-2006-5752: mod_status * Add check for scoreboard PID protection (CVE-2007-3304) oldstable/main/binary-ia64/apache2-common_2.0.54-5sarge2_ia64.deb oldstable/main/binary-ia64/apache2-utils_2.0.54-5sarge2_ia64.deb oldstable/main/binary-ia64/apache2-mpm-worker_2.0.54-5sarge2_ia64.deb oldstable/main/binary-ia64/apache2-mpm-perchild_2.0.54-5sarge2_ia64.deb oldstable/main/binary-ia64/apache2-mpm-prefork_2.0.54-5sarge2_ia64.deb oldstable/main/binary-ia64/apache2-prefork-dev_2.0.54-5sarge2_ia64.deb oldstable/main/binary-ia64/apache2-threaded-dev_2.0.54-5sarge2_ia64.deb oldstable/main/binary-ia64/libapr0_2.0.54-5sarge2_ia64.deb oldstable/main/binary-ia64/libapr0-dev_2.0.54-5sarge2_ia64.deb oldstable/main/binary-ia64/apache2_2.0.54-5sarge2_ia64.deb apache2 (2.0.54-5sarge2) oldstable-proposed-updates; urgency=low * Fix some less critical security issues: * Denial of service for threaded MPMs: - CVE-2005-2970: mpm_worker memory leak - CVE-2005-3357: mod_ssl with custom errorpage - CVE-2007-1863: mod_cache * Cross site scripting: - CVE-2005-3352: mod_imap - CVE-2006-3918: via Expect header - CVE-2006-5752: mod_status * Add check for scoreboard PID protection (CVE-2007-3304) oldstable/main/binary-m68k/apache2-common_2.0.54-5sarge2_m68k.deb oldstable/main/binary-m68k/apache2-utils_2.0.54-5sarge2_m68k.deb oldstable/main/binary-m68k/apache2-mpm-worker_2.0.54-5sarge2_m68k.deb oldstable/main/binary-m68k/apache2-mpm-perchild_2.0.54-5sarge2_m68k.deb oldstable/main/binary-m68k/apache2-mpm-prefork_2.0.54-5sarge2_m68k.deb oldstable/main/binary-m68k/apache2-prefork-dev_2.0.54-5sarge2_m68k.deb oldstable/main/binary-m68k/apache2-threaded-dev_2.0.54-5sarge2_m68k.deb oldstable/main/binary-m68k/libapr0_2.0.54-5sarge2_m68k.deb oldstable/main/binary-m68k/libapr0-dev_2.0.54-5sarge2_m68k.deb oldstable/main/binary-m68k/apache2_2.0.54-5sarge2_m68k.deb apache2 (2.0.54-5sarge2) oldstable-proposed-updates; urgency=low * Fix some less critical security issues: * Denial of service for threaded MPMs: - CVE-2005-2970: mpm_worker memory leak - CVE-2005-3357: mod_ssl with custom errorpage - CVE-2007-1863: mod_cache * Cross site scripting: - CVE-2005-3352: mod_imap - CVE-2006-3918: via Expect header - CVE-2006-5752: mod_status * Add check for scoreboard PID protection (CVE-2007-3304) oldstable/main/binary-mips/apache2-common_2.0.54-5sarge2_mips.deb oldstable/main/binary-mips/apache2-utils_2.0.54-5sarge2_mips.deb oldstable/main/binary-mips/apache2-mpm-worker_2.0.54-5sarge2_mips.deb oldstable/main/binary-mips/apache2-mpm-perchild_2.0.54-5sarge2_mips.deb oldstable/main/binary-mips/apache2-mpm-prefork_2.0.54-5sarge2_mips.deb oldstable/main/binary-mips/apache2-prefork-dev_2.0.54-5sarge2_mips.deb oldstable/main/binary-mips/apache2-threaded-dev_2.0.54-5sarge2_mips.deb oldstable/main/binary-mips/libapr0_2.0.54-5sarge2_mips.deb oldstable/main/binary-mips/libapr0-dev_2.0.54-5sarge2_mips.deb oldstable/main/binary-mips/apache2_2.0.54-5sarge2_mips.deb apache2 (2.0.54-5sarge2) oldstable-proposed-updates; urgency=low * Fix some less critical security issues: * Denial of service for threaded MPMs: - CVE-2005-2970: mpm_worker memory leak - CVE-2005-3357: mod_ssl with custom errorpage - CVE-2007-1863: mod_cache * Cross site scripting: - CVE-2005-3352: mod_imap - CVE-2006-3918: via Expect header - CVE-2006-5752: mod_status * Add check for scoreboard PID protection (CVE-2007-3304) oldstable/main/binary-mipsel/apache2-common_2.0.54-5sarge2_mipsel.deb oldstable/main/binary-mipsel/apache2-utils_2.0.54-5sarge2_mipsel.deb oldstable/main/binary-mipsel/apache2-mpm-worker_2.0.54-5sarge2_mipsel.deb oldstable/main/binary-mipsel/apache2-mpm-perchild_2.0.54-5sarge2_mipsel.deb oldstable/main/binary-mipsel/apache2-mpm-prefork_2.0.54-5sarge2_mipsel.deb oldstable/main/binary-mipsel/apache2-prefork-dev_2.0.54-5sarge2_mipsel.deb oldstable/main/binary-mipsel/apache2-threaded-dev_2.0.54-5sarge2_mipsel.deb oldstable/main/binary-mipsel/libapr0_2.0.54-5sarge2_mipsel.deb oldstable/main/binary-mipsel/libapr0-dev_2.0.54-5sarge2_mipsel.deb oldstable/main/binary-mipsel/apache2_2.0.54-5sarge2_mipsel.deb apache2 (2.0.54-5sarge2) oldstable-proposed-updates; urgency=low * Fix some less critical security issues: * Denial of service for threaded MPMs: - CVE-2005-2970: mpm_worker memory leak - CVE-2005-3357: mod_ssl with custom errorpage - CVE-2007-1863: mod_cache * Cross site scripting: - CVE-2005-3352: mod_imap - CVE-2006-3918: via Expect header - CVE-2006-5752: mod_status * Add check for scoreboard PID protection (CVE-2007-3304) oldstable/main/binary-powerpc/apache2-common_2.0.54-5sarge2_powerpc.deb oldstable/main/binary-powerpc/apache2-utils_2.0.54-5sarge2_powerpc.deb oldstable/main/binary-powerpc/apache2-mpm-worker_2.0.54-5sarge2_powerpc.deb oldstable/main/binary-powerpc/apache2-mpm-perchild_2.0.54-5sarge2_powerpc.deb oldstable/main/binary-powerpc/apache2-mpm-prefork_2.0.54-5sarge2_powerpc.deb oldstable/main/binary-powerpc/apache2-prefork-dev_2.0.54-5sarge2_powerpc.deb oldstable/main/binary-powerpc/apache2-threaded-dev_2.0.54-5sarge2_powerpc.deb oldstable/main/binary-powerpc/libapr0_2.0.54-5sarge2_powerpc.deb oldstable/main/binary-powerpc/libapr0-dev_2.0.54-5sarge2_powerpc.deb oldstable/main/binary-powerpc/apache2_2.0.54-5sarge2_powerpc.deb apache2 (2.0.54-5sarge2) oldstable-proposed-updates; urgency=low * Fix some less critical security issues: * Denial of service for threaded MPMs: - CVE-2005-2970: mpm_worker memory leak - CVE-2005-3357: mod_ssl with custom errorpage - CVE-2007-1863: mod_cache * Cross site scripting: - CVE-2005-3352: mod_imap - CVE-2006-3918: via Expect header - CVE-2006-5752: mod_status * Add check for scoreboard PID protection (CVE-2007-3304) oldstable/main/binary-s390/apache2-common_2.0.54-5sarge2_s390.deb oldstable/main/binary-s390/apache2-utils_2.0.54-5sarge2_s390.deb oldstable/main/binary-s390/apache2-mpm-worker_2.0.54-5sarge2_s390.deb oldstable/main/binary-s390/apache2-mpm-perchild_2.0.54-5sarge2_s390.deb oldstable/main/binary-s390/apache2-mpm-prefork_2.0.54-5sarge2_s390.deb oldstable/main/binary-s390/apache2-prefork-dev_2.0.54-5sarge2_s390.deb oldstable/main/binary-s390/apache2-threaded-dev_2.0.54-5sarge2_s390.deb oldstable/main/binary-s390/libapr0_2.0.54-5sarge2_s390.deb oldstable/main/binary-s390/libapr0-dev_2.0.54-5sarge2_s390.deb oldstable/main/binary-s390/apache2_2.0.54-5sarge2_s390.deb apache2 (2.0.54-5sarge2) oldstable-proposed-updates; urgency=low * Fix some less critical security issues: * Denial of service for threaded MPMs: - CVE-2005-2970: mpm_worker memory leak - CVE-2005-3357: mod_ssl with custom errorpage - CVE-2007-1863: mod_cache * Cross site scripting: - CVE-2005-3352: mod_imap - CVE-2006-3918: via Expect header - CVE-2006-5752: mod_status * Add check for scoreboard PID protection (CVE-2007-3304) oldstable/main/binary-sparc/apache2-common_2.0.54-5sarge2_sparc.deb oldstable/main/binary-sparc/apache2-utils_2.0.54-5sarge2_sparc.deb oldstable/main/binary-sparc/apache2-mpm-worker_2.0.54-5sarge2_sparc.deb oldstable/main/binary-sparc/apache2-mpm-perchild_2.0.54-5sarge2_sparc.deb oldstable/main/binary-sparc/apache2-mpm-prefork_2.0.54-5sarge2_sparc.deb oldstable/main/binary-sparc/apache2-prefork-dev_2.0.54-5sarge2_sparc.deb oldstable/main/binary-sparc/apache2-threaded-dev_2.0.54-5sarge2_sparc.deb oldstable/main/binary-sparc/libapr0_2.0.54-5sarge2_sparc.deb oldstable/main/binary-sparc/libapr0-dev_2.0.54-5sarge2_sparc.deb oldstable/main/binary-sparc/apache2_2.0.54-5sarge2_sparc.deb apache2 (2.0.54-5sarge2) oldstable-proposed-updates; urgency=low * Fix some less critical security issues: * Denial of service for threaded MPMs: - CVE-2005-2970: mpm_worker memory leak - CVE-2005-3357: mod_ssl with custom errorpage - CVE-2007-1863: mod_cache * Cross site scripting: - CVE-2005-3352: mod_imap - CVE-2006-3918: via Expect header - CVE-2006-5752: mod_status * Add check for scoreboard PID protection (CVE-2007-3304) oldstable/main/binary-alpha/asterisk_1.0.7.dfsg.1-2sarge5_alpha.deb oldstable/main/binary-alpha/asterisk-h323_1.0.7.dfsg.1-2sarge5_alpha.deb oldstable/main/binary-alpha/asterisk-gtk-console_1.0.7.dfsg.1-2sarge5_alpha.deb asterisk (1:1.0.7.dfsg.1-2sarge5) oldstable-security; urgency=high * Add myself to Uploaders to mark this as a maintainer upload. * Multiple upstream security fixes: - channels/chan_sip.c: Only try to handle a response if it has a response code. (ASA-2007-011, CVE-2007-1594, CVE-2007-2297) - manager.c: Don't crash if a manager connection provides a username that exists in manager.conf but does not have a password, and also requests MD5 authentication. (ASA-2007-012, CVE-2007-2294) - channels/iax2-parser.h, channels/chan_iax2.c, channels/iax2-parser.c: Ensure that when encoding the contents of an ast_frame into an iax_frame, that the size of the destination buffer is known in the iax_frame so that code won't write past the end of the allocated buffer when sending outgoing frames. (ASA-2007-014, CVE-2007-3762) - channels/chan_iax2.c: if a text frame is sent with no terminating NULL through a bridged IAX connection, the remote end will receive garbage characters tacked onto the end. (CVE-2007-2488) - channels/chan_iax2.c: After parsing information elements in IAX frames, set the data length to zero, so that code later on does not think it has data to copy. (ASA-2007-015, CVE-2007-3763) oldstable/main/binary-amd64/asterisk_1.0.7.dfsg.1-2sarge5_amd64.deb oldstable/main/binary-amd64/asterisk-h323_1.0.7.dfsg.1-2sarge5_amd64.deb oldstable/main/binary-amd64/asterisk-gtk-console_1.0.7.dfsg.1-2sarge5_amd64.deb asterisk (1:1.0.7.dfsg.1-2sarge5) oldstable-security; urgency=high * Add myself to Uploaders to mark this as a maintainer upload. * Multiple upstream security fixes: - channels/chan_sip.c: Only try to handle a response if it has a response code. (ASA-2007-011, CVE-2007-1594, CVE-2007-2297) - manager.c: Don't crash if a manager connection provides a username that exists in manager.conf but does not have a password, and also requests MD5 authentication. (ASA-2007-012, CVE-2007-2294) - channels/iax2-parser.h, channels/chan_iax2.c, channels/iax2-parser.c: Ensure that when encoding the contents of an ast_frame into an iax_frame, that the size of the destination buffer is known in the iax_frame so that code won't write past the end of the allocated buffer when sending outgoing frames. (ASA-2007-014, CVE-2007-3762) - channels/chan_iax2.c: if a text frame is sent with no terminating NULL through a bridged IAX connection, the remote end will receive garbage characters tacked onto the end. (CVE-2007-2488) - channels/chan_iax2.c: After parsing information elements in IAX frames, set the data length to zero, so that code later on does not think it has data to copy. (ASA-2007-015, CVE-2007-3763) oldstable/main/binary-arm/asterisk_1.0.7.dfsg.1-2sarge5_arm.deb oldstable/main/binary-arm/asterisk-h323_1.0.7.dfsg.1-2sarge5_arm.deb oldstable/main/binary-arm/asterisk-gtk-console_1.0.7.dfsg.1-2sarge5_arm.deb asterisk (1:1.0.7.dfsg.1-2sarge5) oldstable-security; urgency=high * Add myself to Uploaders to mark this as a maintainer upload. * Multiple upstream security fixes: - channels/chan_sip.c: Only try to handle a response if it has a response code. (ASA-2007-011, CVE-2007-1594, CVE-2007-2297) - manager.c: Don't crash if a manager connection provides a username that exists in manager.conf but does not have a password, and also requests MD5 authentication. (ASA-2007-012, CVE-2007-2294) - channels/iax2-parser.h, channels/chan_iax2.c, channels/iax2-parser.c: Ensure that when encoding the contents of an ast_frame into an iax_frame, that the size of the destination buffer is known in the iax_frame so that code won't write past the end of the allocated buffer when sending outgoing frames. (ASA-2007-014, CVE-2007-3762) - channels/chan_iax2.c: if a text frame is sent with no terminating NULL through a bridged IAX connection, the remote end will receive garbage characters tacked onto the end. (CVE-2007-2488) - channels/chan_iax2.c: After parsing information elements in IAX frames, set the data length to zero, so that code later on does not think it has data to copy. (ASA-2007-015, CVE-2007-3763) oldstable/main/binary-hppa/asterisk_1.0.7.dfsg.1-2sarge5_hppa.deb oldstable/main/binary-hppa/asterisk-h323_1.0.7.dfsg.1-2sarge5_hppa.deb oldstable/main/binary-hppa/asterisk-gtk-console_1.0.7.dfsg.1-2sarge5_hppa.deb asterisk (1:1.0.7.dfsg.1-2sarge5) oldstable-security; urgency=high * Add myself to Uploaders to mark this as a maintainer upload. * Multiple upstream security fixes: - channels/chan_sip.c: Only try to handle a response if it has a response code. (ASA-2007-011, CVE-2007-1594, CVE-2007-2297) - manager.c: Don't crash if a manager connection provides a username that exists in manager.conf but does not have a password, and also requests MD5 authentication. (ASA-2007-012, CVE-2007-2294) - channels/iax2-parser.h, channels/chan_iax2.c, channels/iax2-parser.c: Ensure that when encoding the contents of an ast_frame into an iax_frame, that the size of the destination buffer is known in the iax_frame so that code won't write past the end of the allocated buffer when sending outgoing frames. (ASA-2007-014, CVE-2007-3762) - channels/chan_iax2.c: if a text frame is sent with no terminating NULL through a bridged IAX connection, the remote end will receive garbage characters tacked onto the end. (CVE-2007-2488) - channels/chan_iax2.c: After parsing information elements in IAX frames, set the data length to zero, so that code later on does not think it has data to copy. (ASA-2007-015, CVE-2007-3763) oldstable/main/source/asterisk_1.0.7.dfsg.1-2sarge5.dsc oldstable/main/source/asterisk_1.0.7.dfsg.1-2sarge5.diff.gz oldstable/main/binary-all/asterisk-doc_1.0.7.dfsg.1-2sarge5_all.deb oldstable/main/binary-all/asterisk-dev_1.0.7.dfsg.1-2sarge5_all.deb oldstable/main/binary-all/asterisk-sounds-main_1.0.7.dfsg.1-2sarge5_all.deb oldstable/main/binary-all/asterisk-web-vmail_1.0.7.dfsg.1-2sarge5_all.deb oldstable/main/binary-all/asterisk-config_1.0.7.dfsg.1-2sarge5_all.deb oldstable/main/binary-i386/asterisk_1.0.7.dfsg.1-2sarge5_i386.deb oldstable/main/binary-i386/asterisk-h323_1.0.7.dfsg.1-2sarge5_i386.deb oldstable/main/binary-i386/asterisk-gtk-console_1.0.7.dfsg.1-2sarge5_i386.deb asterisk (1:1.0.7.dfsg.1-2sarge5) oldstable-security; urgency=high * Add myself to Uploaders to mark this as a maintainer upload. * Multiple upstream security fixes: - channels/chan_sip.c: Only try to handle a response if it has a response code. (ASA-2007-011, CVE-2007-1594, CVE-2007-2297) - manager.c: Don't crash if a manager connection provides a username that exists in manager.conf but does not have a password, and also requests MD5 authentication. (ASA-2007-012, CVE-2007-2294) - channels/iax2-parser.h, channels/chan_iax2.c, channels/iax2-parser.c: Ensure that when encoding the contents of an ast_frame into an iax_frame, that the size of the destination buffer is known in the iax_frame so that code won't write past the end of the allocated buffer when sending outgoing frames. (ASA-2007-014, CVE-2007-3762) - channels/chan_iax2.c: if a text frame is sent with no terminating NULL through a bridged IAX connection, the remote end will receive garbage characters tacked onto the end. (CVE-2007-2488) - channels/chan_iax2.c: After parsing information elements in IAX frames, set the data length to zero, so that code later on does not think it has data to copy. (ASA-2007-015, CVE-2007-3763) oldstable/main/binary-ia64/asterisk_1.0.7.dfsg.1-2sarge5_ia64.deb oldstable/main/binary-ia64/asterisk-h323_1.0.7.dfsg.1-2sarge5_ia64.deb oldstable/main/binary-ia64/asterisk-gtk-console_1.0.7.dfsg.1-2sarge5_ia64.deb asterisk (1:1.0.7.dfsg.1-2sarge5) oldstable-security; urgency=high * Add myself to Uploaders to mark this as a maintainer upload. * Multiple upstream security fixes: - channels/chan_sip.c: Only try to handle a response if it has a response code. (ASA-2007-011, CVE-2007-1594, CVE-2007-2297) - manager.c: Don't crash if a manager connection provides a username that exists in manager.conf but does not have a password, and also requests MD5 authentication. (ASA-2007-012, CVE-2007-2294) - channels/iax2-parser.h, channels/chan_iax2.c, channels/iax2-parser.c: Ensure that when encoding the contents of an ast_frame into an iax_frame, that the size of the destination buffer is known in the iax_frame so that code won't write past the end of the allocated buffer when sending outgoing frames. (ASA-2007-014, CVE-2007-3762) - channels/chan_iax2.c: if a text frame is sent with no terminating NULL through a bridged IAX connection, the remote end will receive garbage characters tacked onto the end. (CVE-2007-2488) - channels/chan_iax2.c: After parsing information elements in IAX frames, set the data length to zero, so that code later on does not think it has data to copy. (ASA-2007-015, CVE-2007-3763) oldstable/main/binary-m68k/asterisk_1.0.7.dfsg.1-2sarge5_m68k.deb oldstable/main/binary-m68k/asterisk-h323_1.0.7.dfsg.1-2sarge5_m68k.deb oldstable/main/binary-m68k/asterisk-gtk-console_1.0.7.dfsg.1-2sarge5_m68k.deb asterisk (1:1.0.7.dfsg.1-2sarge5) oldstable-security; urgency=high * Add myself to Uploaders to mark this as a maintainer upload. * Multiple upstream security fixes: - channels/chan_sip.c: Only try to handle a response if it has a response code. (ASA-2007-011, CVE-2007-1594, CVE-2007-2297) - manager.c: Don't crash if a manager connection provides a username that exists in manager.conf but does not have a password, and also requests MD5 authentication. (ASA-2007-012, CVE-2007-2294) - channels/iax2-parser.h, channels/chan_iax2.c, channels/iax2-parser.c: Ensure that when encoding the contents of an ast_frame into an iax_frame, that the size of the destination buffer is known in the iax_frame so that code won't write past the end of the allocated buffer when sending outgoing frames. (ASA-2007-014, CVE-2007-3762) - channels/chan_iax2.c: if a text frame is sent with no terminating NULL through a bridged IAX connection, the remote end will receive garbage characters tacked onto the end. (CVE-2007-2488) - channels/chan_iax2.c: After parsing information elements in IAX frames, set the data length to zero, so that code later on does not think it has data to copy. (ASA-2007-015, CVE-2007-3763) oldstable/main/binary-mips/asterisk_1.0.7.dfsg.1-2sarge5_mips.deb oldstable/main/binary-mips/asterisk-h323_1.0.7.dfsg.1-2sarge5_mips.deb oldstable/main/binary-mips/asterisk-gtk-console_1.0.7.dfsg.1-2sarge5_mips.deb asterisk (1:1.0.7.dfsg.1-2sarge5) oldstable-security; urgency=high * Add myself to Uploaders to mark this as a maintainer upload. * Multiple upstream security fixes: - channels/chan_sip.c: Only try to handle a response if it has a response code. (ASA-2007-011, CVE-2007-1594, CVE-2007-2297) - manager.c: Don't crash if a manager connection provides a username that exists in manager.conf but does not have a password, and also requests MD5 authentication. (ASA-2007-012, CVE-2007-2294) - channels/iax2-parser.h, channels/chan_iax2.c, channels/iax2-parser.c: Ensure that when encoding the contents of an ast_frame into an iax_frame, that the size of the destination buffer is known in the iax_frame so that code won't write past the end of the allocated buffer when sending outgoing frames. (ASA-2007-014, CVE-2007-3762) - channels/chan_iax2.c: if a text frame is sent with no terminating NULL through a bridged IAX connection, the remote end will receive garbage characters tacked onto the end. (CVE-2007-2488) - channels/chan_iax2.c: After parsing information elements in IAX frames, set the data length to zero, so that code later on does not think it has data to copy. (ASA-2007-015, CVE-2007-3763) oldstable/main/binary-mipsel/asterisk_1.0.7.dfsg.1-2sarge5_mipsel.deb oldstable/main/binary-mipsel/asterisk-h323_1.0.7.dfsg.1-2sarge5_mipsel.deb oldstable/main/binary-mipsel/asterisk-gtk-console_1.0.7.dfsg.1-2sarge5_mipsel.deb asterisk (1:1.0.7.dfsg.1-2sarge5) oldstable-security; urgency=high * Add myself to Uploaders to mark this as a maintainer upload. * Multiple upstream security fixes: - channels/chan_sip.c: Only try to handle a response if it has a response code. (ASA-2007-011, CVE-2007-1594, CVE-2007-2297) - manager.c: Don't crash if a manager connection provides a username that exists in manager.conf but does not have a password, and also requests MD5 authentication. (ASA-2007-012, CVE-2007-2294) - channels/iax2-parser.h, channels/chan_iax2.c, channels/iax2-parser.c: Ensure that when encoding the contents of an ast_frame into an iax_frame, that the size of the destination buffer is known in the iax_frame so that code won't write past the end of the allocated buffer when sending outgoing frames. (ASA-2007-014, CVE-2007-3762) - channels/chan_iax2.c: if a text frame is sent with no terminating NULL through a bridged IAX connection, the remote end will receive garbage characters tacked onto the end. (CVE-2007-2488) - channels/chan_iax2.c: After parsing information elements in IAX frames, set the data length to zero, so that code later on does not think it has data to copy. (ASA-2007-015, CVE-2007-3763) oldstable/main/binary-powerpc/asterisk_1.0.7.dfsg.1-2sarge5_powerpc.deb oldstable/main/binary-powerpc/asterisk-h323_1.0.7.dfsg.1-2sarge5_powerpc.deb oldstable/main/binary-powerpc/asterisk-gtk-console_1.0.7.dfsg.1-2sarge5_powerpc.deb asterisk (1:1.0.7.dfsg.1-2sarge5) oldstable-security; urgency=high * Add myself to Uploaders to mark this as a maintainer upload. * Multiple upstream security fixes: - channels/chan_sip.c: Only try to handle a response if it has a response code. (ASA-2007-011, CVE-2007-1594, CVE-2007-2297) - manager.c: Don't crash if a manager connection provides a username that exists in manager.conf but does not have a password, and also requests MD5 authentication. (ASA-2007-012, CVE-2007-2294) - channels/iax2-parser.h, channels/chan_iax2.c, channels/iax2-parser.c: Ensure that when encoding the contents of an ast_frame into an iax_frame, that the size of the destination buffer is known in the iax_frame so that code won't write past the end of the allocated buffer when sending outgoing frames. (ASA-2007-014, CVE-2007-3762) - channels/chan_iax2.c: if a text frame is sent with no terminating NULL through a bridged IAX connection, the remote end will receive garbage characters tacked onto the end. (CVE-2007-2488) - channels/chan_iax2.c: After parsing information elements in IAX frames, set the data length to zero, so that code later on does not think it has data to copy. (ASA-2007-015, CVE-2007-3763) oldstable/main/binary-s390/asterisk_1.0.7.dfsg.1-2sarge5_s390.deb oldstable/main/binary-s390/asterisk-h323_1.0.7.dfsg.1-2sarge5_s390.deb oldstable/main/binary-s390/asterisk-gtk-console_1.0.7.dfsg.1-2sarge5_s390.deb asterisk (1:1.0.7.dfsg.1-2sarge5) oldstable-security; urgency=high * Add myself to Uploaders to mark this as a maintainer upload. * Multiple upstream security fixes: - channels/chan_sip.c: Only try to handle a response if it has a response code. (ASA-2007-011, CVE-2007-1594, CVE-2007-2297) - manager.c: Don't crash if a manager connection provides a username that exists in manager.conf but does not have a password, and also requests MD5 authentication. (ASA-2007-012, CVE-2007-2294) - channels/iax2-parser.h, channels/chan_iax2.c, channels/iax2-parser.c: Ensure that when encoding the contents of an ast_frame into an iax_frame, that the size of the destination buffer is known in the iax_frame so that code won't write past the end of the allocated buffer when sending outgoing frames. (ASA-2007-014, CVE-2007-3762) - channels/chan_iax2.c: if a text frame is sent with no terminating NULL through a bridged IAX connection, the remote end will receive garbage characters tacked onto the end. (CVE-2007-2488) - channels/chan_iax2.c: After parsing information elements in IAX frames, set the data length to zero, so that code later on does not think it has data to copy. (ASA-2007-015, CVE-2007-3763) oldstable/main/binary-sparc/asterisk_1.0.7.dfsg.1-2sarge5_sparc.deb oldstable/main/binary-sparc/asterisk-h323_1.0.7.dfsg.1-2sarge5_sparc.deb oldstable/main/binary-sparc/asterisk-gtk-console_1.0.7.dfsg.1-2sarge5_sparc.deb asterisk (1:1.0.7.dfsg.1-2sarge5) oldstable-security; urgency=high * Add myself to Uploaders to mark this as a maintainer upload. * Multiple upstream security fixes: - channels/chan_sip.c: Only try to handle a response if it has a response code. (ASA-2007-011, CVE-2007-1594, CVE-2007-2297) - manager.c: Don't crash if a manager connection provides a username that exists in manager.conf but does not have a password, and also requests MD5 authentication. (ASA-2007-012, CVE-2007-2294) - channels/iax2-parser.h, channels/chan_iax2.c, channels/iax2-parser.c: Ensure that when encoding the contents of an ast_frame into an iax_frame, that the size of the destination buffer is known in the iax_frame so that code won't write past the end of the allocated buffer when sending outgoing frames. (ASA-2007-014, CVE-2007-3762) - channels/chan_iax2.c: if a text frame is sent with no terminating NULL through a bridged IAX connection, the remote end will receive garbage characters tacked onto the end. (CVE-2007-2488) - channels/chan_iax2.c: After parsing information elements in IAX frames, set the data length to zero, so that code later on does not think it has data to copy. (ASA-2007-015, CVE-2007-3763) oldstable/main/binary-alpha/asterisk_1.0.7.dfsg.1-2sarge6_alpha.deb oldstable/main/binary-alpha/asterisk-h323_1.0.7.dfsg.1-2sarge6_alpha.deb oldstable/main/binary-alpha/asterisk-gtk-console_1.0.7.dfsg.1-2sarge6_alpha.deb asterisk (1:1.0.7.dfsg.1-2sarge6) oldstable-security; urgency=high * cdr/cdr_pgsql.c: properly escape src and dst to avoid SQL injections (AST-2007-026). oldstable/main/binary-amd64/asterisk_1.0.7.dfsg.1-2sarge6_amd64.deb oldstable/main/binary-amd64/asterisk-h323_1.0.7.dfsg.1-2sarge6_amd64.deb oldstable/main/binary-amd64/asterisk-gtk-console_1.0.7.dfsg.1-2sarge6_amd64.deb asterisk (1:1.0.7.dfsg.1-2sarge6) oldstable-security; urgency=high * cdr/cdr_pgsql.c: properly escape src and dst to avoid SQL injections (AST-2007-026). oldstable/main/binary-arm/asterisk_1.0.7.dfsg.1-2sarge6_arm.deb oldstable/main/binary-arm/asterisk-h323_1.0.7.dfsg.1-2sarge6_arm.deb oldstable/main/binary-arm/asterisk-gtk-console_1.0.7.dfsg.1-2sarge6_arm.deb asterisk (1:1.0.7.dfsg.1-2sarge6) oldstable-security; urgency=high * cdr/cdr_pgsql.c: properly escape src and dst to avoid SQL injections (AST-2007-026). oldstable/main/binary-hppa/asterisk_1.0.7.dfsg.1-2sarge6_hppa.deb oldstable/main/binary-hppa/asterisk-h323_1.0.7.dfsg.1-2sarge6_hppa.deb oldstable/main/binary-hppa/asterisk-gtk-console_1.0.7.dfsg.1-2sarge6_hppa.deb asterisk (1:1.0.7.dfsg.1-2sarge6) oldstable-security; urgency=high * cdr/cdr_pgsql.c: properly escape src and dst to avoid SQL injections (AST-2007-026). oldstable/main/source/asterisk_1.0.7.dfsg.1-2sarge6.dsc oldstable/main/source/asterisk_1.0.7.dfsg.1-2sarge6.diff.gz oldstable/main/binary-all/asterisk-doc_1.0.7.dfsg.1-2sarge6_all.deb oldstable/main/binary-all/asterisk-dev_1.0.7.dfsg.1-2sarge6_all.deb oldstable/main/binary-all/asterisk-sounds-main_1.0.7.dfsg.1-2sarge6_all.deb oldstable/main/binary-all/asterisk-web-vmail_1.0.7.dfsg.1-2sarge6_all.deb oldstable/main/binary-all/asterisk-config_1.0.7.dfsg.1-2sarge6_all.deb oldstable/main/binary-i386/asterisk_1.0.7.dfsg.1-2sarge6_i386.deb oldstable/main/binary-i386/asterisk-h323_1.0.7.dfsg.1-2sarge6_i386.deb oldstable/main/binary-i386/asterisk-gtk-console_1.0.7.dfsg.1-2sarge6_i386.deb asterisk (1:1.0.7.dfsg.1-2sarge6) oldstable-security; urgency=high * cdr/cdr_pgsql.c: properly escape src and dst to avoid SQL injections (AST-2007-026). oldstable/main/binary-ia64/asterisk_1.0.7.dfsg.1-2sarge6_ia64.deb oldstable/main/binary-ia64/asterisk-h323_1.0.7.dfsg.1-2sarge6_ia64.deb oldstable/main/binary-ia64/asterisk-gtk-console_1.0.7.dfsg.1-2sarge6_ia64.deb asterisk (1:1.0.7.dfsg.1-2sarge6) oldstable-security; urgency=high * cdr/cdr_pgsql.c: properly escape src and dst to avoid SQL injections (AST-2007-026). oldstable/main/binary-m68k/asterisk_1.0.7.dfsg.1-2sarge6_m68k.deb oldstable/main/binary-m68k/asterisk-h323_1.0.7.dfsg.1-2sarge6_m68k.deb oldstable/main/binary-m68k/asterisk-gtk-console_1.0.7.dfsg.1-2sarge6_m68k.deb asterisk (1:1.0.7.dfsg.1-2sarge6) oldstable-security; urgency=high * cdr/cdr_pgsql.c: properly escape src and dst to avoid SQL injections (AST-2007-026). oldstable/main/binary-mips/asterisk_1.0.7.dfsg.1-2sarge6_mips.deb oldstable/main/binary-mips/asterisk-h323_1.0.7.dfsg.1-2sarge6_mips.deb oldstable/main/binary-mips/asterisk-gtk-console_1.0.7.dfsg.1-2sarge6_mips.deb asterisk (1:1.0.7.dfsg.1-2sarge6) oldstable-security; urgency=high * cdr/cdr_pgsql.c: properly escape src and dst to avoid SQL injections (AST-2007-026). oldstable/main/binary-mipsel/asterisk_1.0.7.dfsg.1-2sarge6_mipsel.deb oldstable/main/binary-mipsel/asterisk-h323_1.0.7.dfsg.1-2sarge6_mipsel.deb oldstable/main/binary-mipsel/asterisk-gtk-console_1.0.7.dfsg.1-2sarge6_mipsel.deb asterisk (1:1.0.7.dfsg.1-2sarge6) oldstable-security; urgency=high * cdr/cdr_pgsql.c: properly escape src and dst to avoid SQL injections (AST-2007-026). oldstable/main/binary-powerpc/asterisk_1.0.7.dfsg.1-2sarge6_powerpc.deb oldstable/main/binary-powerpc/asterisk-h323_1.0.7.dfsg.1-2sarge6_powerpc.deb oldstable/main/binary-powerpc/asterisk-gtk-console_1.0.7.dfsg.1-2sarge6_powerpc.deb asterisk (1:1.0.7.dfsg.1-2sarge6) oldstable-security; urgency=high * cdr/cdr_pgsql.c: properly escape src and dst to avoid SQL injections (AST-2007-026). oldstable/main/binary-s390/asterisk_1.0.7.dfsg.1-2sarge6_s390.deb oldstable/main/binary-s390/asterisk-h323_1.0.7.dfsg.1-2sarge6_s390.deb oldstable/main/binary-s390/asterisk-gtk-console_1.0.7.dfsg.1-2sarge6_s390.deb asterisk (1:1.0.7.dfsg.1-2sarge6) oldstable-security; urgency=high * cdr/cdr_pgsql.c: properly escape src and dst to avoid SQL injections (AST-2007-026). oldstable/main/binary-sparc/asterisk_1.0.7.dfsg.1-2sarge6_sparc.deb oldstable/main/binary-sparc/asterisk-h323_1.0.7.dfsg.1-2sarge6_sparc.deb oldstable/main/binary-sparc/asterisk-gtk-console_1.0.7.dfsg.1-2sarge6_sparc.deb asterisk (1:1.0.7.dfsg.1-2sarge6) oldstable-security; urgency=high * cdr/cdr_pgsql.c: properly escape src and dst to avoid SQL injections (AST-2007-026). oldstable/main/binary-alpha/asterisk-app-fax_0.0.20050203-4_alpha.deb oldstable/main/binary-alpha/asterisk-app-dtmftotext_0.0.20050203-4_alpha.deb asterisk-spandsp-plugins (0.0.20050203-4) testing; urgency=low * Fix Build-Dependency problem in Sarge. (Closes: #311008) oldstable/main/binary-arm/asterisk-app-fax_0.0.20050203-4_arm.deb oldstable/main/binary-arm/asterisk-app-dtmftotext_0.0.20050203-4_arm.deb asterisk-spandsp-plugins (0.0.20050203-4) testing; urgency=low * Fix Build-Dependency problem in Sarge. (Closes: #311008) oldstable/main/binary-hppa/asterisk-app-fax_0.0.20050203-4_hppa.deb oldstable/main/binary-hppa/asterisk-app-dtmftotext_0.0.20050203-4_hppa.deb asterisk-spandsp-plugins (0.0.20050203-4) testing; urgency=low * Fix Build-Dependency problem in Sarge. (Closes: #311008) oldstable/main/binary-ia64/asterisk-app-fax_0.0.20050203-4_ia64.deb oldstable/main/binary-ia64/asterisk-app-dtmftotext_0.0.20050203-4_ia64.deb asterisk-spandsp-plugins (0.0.20050203-4) testing; urgency=low * Fix Build-Dependency problem in Sarge. (Closes: #311008) oldstable/main/binary-m68k/asterisk-app-fax_0.0.20050203-4_m68k.deb oldstable/main/binary-m68k/asterisk-app-dtmftotext_0.0.20050203-4_m68k.deb asterisk-spandsp-plugins (0.0.20050203-4) testing; urgency=low * Fix Build-Dependency problem in Sarge. (Closes: #311008) oldstable/main/binary-mips/asterisk-app-fax_0.0.20050203-4_mips.deb oldstable/main/binary-mips/asterisk-app-dtmftotext_0.0.20050203-4_mips.deb asterisk-spandsp-plugins (0.0.20050203-4) testing; urgency=low * Fix Build-Dependency problem in Sarge. (Closes: #311008) oldstable/main/binary-mipsel/asterisk-app-fax_0.0.20050203-4_mipsel.deb oldstable/main/binary-mipsel/asterisk-app-dtmftotext_0.0.20050203-4_mipsel.deb asterisk-spandsp-plugins (0.0.20050203-4) testing; urgency=low * Fix Build-Dependency problem in Sarge. (Closes: #311008) oldstable/main/binary-powerpc/asterisk-app-fax_0.0.20050203-4_powerpc.deb oldstable/main/binary-powerpc/asterisk-app-dtmftotext_0.0.20050203-4_powerpc.deb asterisk-spandsp-plugins (0.0.20050203-4) testing; urgency=low * Fix Build-Dependency problem in Sarge. (Closes: #311008) oldstable/main/binary-s390/asterisk-app-fax_0.0.20050203-4_s390.deb oldstable/main/binary-s390/asterisk-app-dtmftotext_0.0.20050203-4_s390.deb asterisk-spandsp-plugins (0.0.20050203-4) testing; urgency=low * Fix Build-Dependency problem in Sarge. (Closes: #311008) oldstable/main/binary-sparc/asterisk-app-fax_0.0.20050203-4_sparc.deb oldstable/main/binary-sparc/asterisk-app-dtmftotext_0.0.20050203-4_sparc.deb asterisk-spandsp-plugins (0.0.20050203-4) testing; urgency=low * Fix Build-Dependency problem in Sarge. (Closes: #311008) oldstable/main/binary-arm/atomix_1.1.2-1_arm.deb atomix (1.1.2-1) unstable; urgency=medium * New upstream release * debian/copyright: - Fixed plural ("Upstream Author" -> "Upstream Authors") * debian/rules: - Included simple-patchsys.mk from CDBS - Made dh_fixperms ignore /usr/games, in order not to mess with the executable's permissions - Moved creation of scores file to postinst, so that we do not override it on every single upgrade * debian/patches: - 00_amd64_gcc4_ftbfs.patch: apply patch from Andreas Jochens <aj@andaco.de> to fix FTBFS on amd64 with gcc 4 (Closes: #301776). Thanks! oldstable/main/source/base-config_2.53.10.3.dsc oldstable/main/source/base-config_2.53.10.3.tar.gz oldstable/main/binary-all/base-config_2.53.10.3_all.deb base-config (2.53.10.3) oldstable; urgency=low * Add support for installing oldstable. * Update mirror list. * Update translations with thanks to translators. * Add myself to uploaders. oldstable/main/base-installer_1.13.4sarge3_alpha.udeb base-installer (1.13.4sarge3) oldstable; urgency=low * Revert hack in last version as rootskel has now been updated for the kernels to be released with Sarge 3.1r7. oldstable/main/base-installer_1.13.4sarge3_arm.udeb base-installer (1.13.4sarge3) oldstable; urgency=low * Revert hack in last version as rootskel has now been updated for the kernels to be released with Sarge 3.1r7. oldstable/main/base-installer_1.13.4sarge3_hppa.udeb base-installer (1.13.4sarge3) oldstable; urgency=low * Revert hack in last version as rootskel has now been updated for the kernels to be released with Sarge 3.1r7. oldstable/main/source/base-installer_1.13.4sarge3.dsc oldstable/main/source/base-installer_1.13.4sarge3.tar.gz oldstable/main/base-installer_1.13.4sarge3_i386.udeb base-installer (1.13.4sarge3) oldstable; urgency=low * Revert hack in last version as rootskel has now been updated for the kernels to be released with Sarge 3.1r7. oldstable/main/base-installer_1.13.4sarge3_ia64.udeb base-installer (1.13.4sarge3) oldstable; urgency=low * Revert hack in last version as rootskel has now been updated for the kernels to be released with Sarge 3.1r7. oldstable/main/base-installer_1.13.4sarge3_m68k.udeb base-installer (1.13.4sarge3) oldstable; urgency=low * Revert hack in last version as rootskel has now been updated for the kernels to be released with Sarge 3.1r7. oldstable/main/base-installer_1.13.4sarge3_mips.udeb base-installer (1.13.4sarge3) oldstable; urgency=low * Revert hack in last version as rootskel has now been updated for the kernels to be released with Sarge 3.1r7. oldstable/main/base-installer_1.13.4sarge3_mipsel.udeb base-installer (1.13.4sarge3) oldstable; urgency=low * Revert hack in last version as rootskel has now been updated for the kernels to be released with Sarge 3.1r7. oldstable/main/base-installer_1.13.4sarge3_powerpc.udeb base-installer (1.13.4sarge3) oldstable; urgency=low * Revert hack in last version as rootskel has now been updated for the kernels to be released with Sarge 3.1r7. oldstable/main/base-installer_1.13.4sarge3_s390.udeb base-installer (1.13.4sarge3) oldstable; urgency=low * Revert hack in last version as rootskel has now been updated for the kernels to be released with Sarge 3.1r7. oldstable/main/base-installer_1.13.4sarge3_sparc.udeb base-installer (1.13.4sarge3) oldstable; urgency=low * Revert hack in last version as rootskel has now been updated for the kernels to be released with Sarge 3.1r7. oldstable/main/binary-arm/bazaar_1.1.1-1_arm.deb bazaar (1.1.1-1) unstable; urgency=low * Initial Debian Release. oldstable/main/binary-alpha/bind9_9.2.4-1sarge3_alpha.deb oldstable/main/binary-alpha/bind9-host_9.2.4-1sarge3_alpha.deb oldstable/main/binary-alpha/libbind-dev_9.2.4-1sarge3_alpha.deb oldstable/main/binary-alpha/libdns16_9.2.4-1sarge3_alpha.deb oldstable/main/binary-alpha/libisc7_9.2.4-1sarge3_alpha.deb oldstable/main/binary-alpha/liblwres1_9.2.4-1sarge3_alpha.deb oldstable/main/binary-alpha/libisccc0_9.2.4-1sarge3_alpha.deb oldstable/main/binary-alpha/libisccfg0_9.2.4-1sarge3_alpha.deb oldstable/main/binary-alpha/dnsutils_9.2.4-1sarge3_alpha.deb oldstable/main/binary-alpha/lwresd_9.2.4-1sarge3_alpha.deb bind9 (1:9.2.4-1sarge3) oldstable-security; urgency=high * Backport fix for CVE-2007-2926 oldstable/main/binary-arm/bind9_9.2.4-1sarge3_arm.deb oldstable/main/binary-arm/bind9-host_9.2.4-1sarge3_arm.deb oldstable/main/binary-arm/libbind-dev_9.2.4-1sarge3_arm.deb oldstable/main/binary-arm/libdns16_9.2.4-1sarge3_arm.deb oldstable/main/binary-arm/libisc7_9.2.4-1sarge3_arm.deb oldstable/main/binary-arm/liblwres1_9.2.4-1sarge3_arm.deb oldstable/main/binary-arm/libisccc0_9.2.4-1sarge3_arm.deb oldstable/main/binary-arm/libisccfg0_9.2.4-1sarge3_arm.deb oldstable/main/binary-arm/dnsutils_9.2.4-1sarge3_arm.deb oldstable/main/binary-arm/lwresd_9.2.4-1sarge3_arm.deb bind9 (1:9.2.4-1sarge3) oldstable-security; urgency=high * Backport fix for CVE-2007-2926 oldstable/main/binary-hppa/bind9_9.2.4-1sarge3_hppa.deb oldstable/main/binary-hppa/bind9-host_9.2.4-1sarge3_hppa.deb oldstable/main/binary-hppa/libbind-dev_9.2.4-1sarge3_hppa.deb oldstable/main/binary-hppa/libdns16_9.2.4-1sarge3_hppa.deb oldstable/main/binary-hppa/libisc7_9.2.4-1sarge3_hppa.deb oldstable/main/binary-hppa/liblwres1_9.2.4-1sarge3_hppa.deb oldstable/main/binary-hppa/libisccc0_9.2.4-1sarge3_hppa.deb oldstable/main/binary-hppa/libisccfg0_9.2.4-1sarge3_hppa.deb oldstable/main/binary-hppa/dnsutils_9.2.4-1sarge3_hppa.deb oldstable/main/binary-hppa/lwresd_9.2.4-1sarge3_hppa.deb bind9 (1:9.2.4-1sarge3) oldstable-security; urgency=high * Backport fix for CVE-2007-2926 oldstable/main/source/bind9_9.2.4-1sarge3.dsc oldstable/main/source/bind9_9.2.4-1sarge3.diff.gz oldstable/main/binary-all/bind9-doc_9.2.4-1sarge3_all.deb oldstable/main/binary-i386/bind9_9.2.4-1sarge3_i386.deb oldstable/main/binary-i386/bind9-host_9.2.4-1sarge3_i386.deb oldstable/main/binary-i386/libbind-dev_9.2.4-1sarge3_i386.deb oldstable/main/binary-i386/libdns16_9.2.4-1sarge3_i386.deb oldstable/main/binary-i386/libisc7_9.2.4-1sarge3_i386.deb oldstable/main/binary-i386/liblwres1_9.2.4-1sarge3_i386.deb oldstable/main/binary-i386/libisccc0_9.2.4-1sarge3_i386.deb oldstable/main/binary-i386/libisccfg0_9.2.4-1sarge3_i386.deb oldstable/main/binary-i386/dnsutils_9.2.4-1sarge3_i386.deb oldstable/main/binary-i386/lwresd_9.2.4-1sarge3_i386.deb bind9 (1:9.2.4-1sarge3) oldstable-security; urgency=high * Backport fix for CVE-2007-2926 oldstable/main/binary-ia64/bind9_9.2.4-1sarge3_ia64.deb oldstable/main/binary-ia64/bind9-host_9.2.4-1sarge3_ia64.deb oldstable/main/binary-ia64/libbind-dev_9.2.4-1sarge3_ia64.deb oldstable/main/binary-ia64/libdns16_9.2.4-1sarge3_ia64.deb oldstable/main/binary-ia64/libisc7_9.2.4-1sarge3_ia64.deb oldstable/main/binary-ia64/liblwres1_9.2.4-1sarge3_ia64.deb oldstable/main/binary-ia64/libisccc0_9.2.4-1sarge3_ia64.deb oldstable/main/binary-ia64/libisccfg0_9.2.4-1sarge3_ia64.deb oldstable/main/binary-ia64/dnsutils_9.2.4-1sarge3_ia64.deb oldstable/main/binary-ia64/lwresd_9.2.4-1sarge3_ia64.deb bind9 (1:9.2.4-1sarge3) oldstable-security; urgency=high * Backport fix for CVE-2007-2926 oldstable/main/binary-m68k/bind9_9.2.4-1sarge3_m68k.deb oldstable/main/binary-m68k/bind9-host_9.2.4-1sarge3_m68k.deb oldstable/main/binary-m68k/libbind-dev_9.2.4-1sarge3_m68k.deb oldstable/main/binary-m68k/libdns16_9.2.4-1sarge3_m68k.deb oldstable/main/binary-m68k/libisc7_9.2.4-1sarge3_m68k.deb oldstable/main/binary-m68k/liblwres1_9.2.4-1sarge3_m68k.deb oldstable/main/binary-m68k/libisccc0_9.2.4-1sarge3_m68k.deb oldstable/main/binary-m68k/libisccfg0_9.2.4-1sarge3_m68k.deb oldstable/main/binary-m68k/dnsutils_9.2.4-1sarge3_m68k.deb oldstable/main/binary-m68k/lwresd_9.2.4-1sarge3_m68k.deb bind9 (1:9.2.4-1sarge3) oldstable-security; urgency=high * Backport fix for CVE-2007-2926 oldstable/main/binary-mips/bind9_9.2.4-1sarge3_mips.deb oldstable/main/binary-mips/bind9-host_9.2.4-1sarge3_mips.deb oldstable/main/binary-mips/libbind-dev_9.2.4-1sarge3_mips.deb oldstable/main/binary-mips/libdns16_9.2.4-1sarge3_mips.deb oldstable/main/binary-mips/libisc7_9.2.4-1sarge3_mips.deb oldstable/main/binary-mips/liblwres1_9.2.4-1sarge3_mips.deb oldstable/main/binary-mips/libisccc0_9.2.4-1sarge3_mips.deb oldstable/main/binary-mips/libisccfg0_9.2.4-1sarge3_mips.deb oldstable/main/binary-mips/dnsutils_9.2.4-1sarge3_mips.deb oldstable/main/binary-mips/lwresd_9.2.4-1sarge3_mips.deb bind9 (1:9.2.4-1sarge3) oldstable-security; urgency=high * Backport fix for CVE-2007-2926 oldstable/main/binary-mipsel/bind9_9.2.4-1sarge3_mipsel.deb oldstable/main/binary-mipsel/bind9-host_9.2.4-1sarge3_mipsel.deb oldstable/main/binary-mipsel/libbind-dev_9.2.4-1sarge3_mipsel.deb oldstable/main/binary-mipsel/libdns16_9.2.4-1sarge3_mipsel.deb oldstable/main/binary-mipsel/libisc7_9.2.4-1sarge3_mipsel.deb oldstable/main/binary-mipsel/liblwres1_9.2.4-1sarge3_mipsel.deb oldstable/main/binary-mipsel/libisccc0_9.2.4-1sarge3_mipsel.deb oldstable/main/binary-mipsel/libisccfg0_9.2.4-1sarge3_mipsel.deb oldstable/main/binary-mipsel/dnsutils_9.2.4-1sarge3_mipsel.deb oldstable/main/binary-mipsel/lwresd_9.2.4-1sarge3_mipsel.deb bind9 (1:9.2.4-1sarge3) oldstable-security; urgency=high * Backport fix for CVE-2007-2926 oldstable/main/binary-powerpc/bind9_9.2.4-1sarge3_powerpc.deb oldstable/main/binary-powerpc/bind9-host_9.2.4-1sarge3_powerpc.deb oldstable/main/binary-powerpc/libbind-dev_9.2.4-1sarge3_powerpc.deb oldstable/main/binary-powerpc/libdns16_9.2.4-1sarge3_powerpc.deb oldstable/main/binary-powerpc/libisc7_9.2.4-1sarge3_powerpc.deb oldstable/main/binary-powerpc/liblwres1_9.2.4-1sarge3_powerpc.deb oldstable/main/binary-powerpc/libisccc0_9.2.4-1sarge3_powerpc.deb oldstable/main/binary-powerpc/libisccfg0_9.2.4-1sarge3_powerpc.deb oldstable/main/binary-powerpc/dnsutils_9.2.4-1sarge3_powerpc.deb oldstable/main/binary-powerpc/lwresd_9.2.4-1sarge3_powerpc.deb bind9 (1:9.2.4-1sarge3) oldstable-security; urgency=high * Backport fix for CVE-2007-2926 oldstable/main/binary-s390/bind9_9.2.4-1sarge3_s390.deb oldstable/main/binary-s390/bind9-host_9.2.4-1sarge3_s390.deb oldstable/main/binary-s390/libbind-dev_9.2.4-1sarge3_s390.deb oldstable/main/binary-s390/libdns16_9.2.4-1sarge3_s390.deb oldstable/main/binary-s390/libisc7_9.2.4-1sarge3_s390.deb oldstable/main/binary-s390/liblwres1_9.2.4-1sarge3_s390.deb oldstable/main/binary-s390/libisccc0_9.2.4-1sarge3_s390.deb oldstable/main/binary-s390/libisccfg0_9.2.4-1sarge3_s390.deb oldstable/main/binary-s390/dnsutils_9.2.4-1sarge3_s390.deb oldstable/main/binary-s390/lwresd_9.2.4-1sarge3_s390.deb bind9 (1:9.2.4-1sarge3) oldstable-security; urgency=high * Backport fix for CVE-2007-2926 oldstable/main/binary-sparc/bind9_9.2.4-1sarge3_sparc.deb oldstable/main/binary-sparc/bind9-host_9.2.4-1sarge3_sparc.deb oldstable/main/binary-sparc/libbind-dev_9.2.4-1sarge3_sparc.deb oldstable/main/binary-sparc/libdns16_9.2.4-1sarge3_sparc.deb oldstable/main/binary-sparc/libisc7_9.2.4-1sarge3_sparc.deb oldstable/main/binary-sparc/liblwres1_9.2.4-1sarge3_sparc.deb oldstable/main/binary-sparc/libisccc0_9.2.4-1sarge3_sparc.deb oldstable/main/binary-sparc/libisccfg0_9.2.4-1sarge3_sparc.deb oldstable/main/binary-sparc/dnsutils_9.2.4-1sarge3_sparc.deb oldstable/main/binary-sparc/lwresd_9.2.4-1sarge3_sparc.deb bind9 (1:9.2.4-1sarge3) oldstable-security; urgency=high * Backport fix for CVE-2007-2926 oldstable/main/binary-alpha/bochs_2.1.1+20041109-3sarge1_alpha.deb oldstable/main/binary-alpha/bochs-wx_2.1.1+20041109-3sarge1_alpha.deb oldstable/main/binary-alpha/bochs-sdl_2.1.1+20041109-3sarge1_alpha.deb oldstable/main/binary-alpha/bochs-term_2.1.1+20041109-3sarge1_alpha.deb oldstable/main/binary-alpha/bochs-x_2.1.1+20041109-3sarge1_alpha.deb oldstable/main/binary-alpha/bximage_2.1.1+20041109-3sarge1_alpha.deb bochs (2.1.1+20041109-3sarge1) oldstable-security; urgency=high * Fix heap buffer overflow in ne2k emulated driver. (Closes: #427144) CVE-2007-2893 - debian/patches/05_security_ne2k.patch: New file. oldstable/main/binary-arm/bochs_2.1.1+20041109-3sarge1_arm.deb oldstable/main/binary-arm/bochs-wx_2.1.1+20041109-3sarge1_arm.deb oldstable/main/binary-arm/bochs-sdl_2.1.1+20041109-3sarge1_arm.deb oldstable/main/binary-arm/bochs-term_2.1.1+20041109-3sarge1_arm.deb oldstable/main/binary-arm/bochs-x_2.1.1+20041109-3sarge1_arm.deb oldstable/main/binary-arm/bximage_2.1.1+20041109-3sarge1_arm.deb bochs (2.1.1+20041109-3sarge1) oldstable-security; urgency=high * Fix heap buffer overflow in ne2k emulated driver. (Closes: #427144) CVE-2007-2893 - debian/patches/05_security_ne2k.patch: New file. oldstable/main/binary-hppa/bochs_2.1.1+20041109-3sarge1_hppa.deb oldstable/main/binary-hppa/bochs-wx_2.1.1+20041109-3sarge1_hppa.deb oldstable/main/binary-hppa/bochs-sdl_2.1.1+20041109-3sarge1_hppa.deb oldstable/main/binary-hppa/bochs-term_2.1.1+20041109-3sarge1_hppa.deb oldstable/main/binary-hppa/bochs-x_2.1.1+20041109-3sarge1_hppa.deb oldstable/main/binary-hppa/bximage_2.1.1+20041109-3sarge1_hppa.deb bochs (2.1.1+20041109-3sarge1) oldstable-security; urgency=high * Fix heap buffer overflow in ne2k emulated driver. (Closes: #427144) CVE-2007-2893 - debian/patches/05_security_ne2k.patch: New file. oldstable/main/source/bochs_2.1.1+20041109-3sarge1.dsc oldstable/main/source/bochs_2.1.1+20041109.orig.tar.gz oldstable/main/source/bochs_2.1.1+20041109-3sarge1.diff.gz oldstable/main/binary-i386/bochs_2.1.1+20041109-3sarge1_i386.deb oldstable/main/binary-i386/bochs-wx_2.1.1+20041109-3sarge1_i386.deb oldstable/main/binary-i386/bochs-sdl_2.1.1+20041109-3sarge1_i386.deb oldstable/main/binary-i386/bochs-term_2.1.1+20041109-3sarge1_i386.deb oldstable/main/binary-i386/bochs-x_2.1.1+20041109-3sarge1_i386.deb oldstable/main/binary-i386/bochs-svga_2.1.1+20041109-3sarge1_i386.deb oldstable/main/binary-i386/bximage_2.1.1+20041109-3sarge1_i386.deb oldstable/main/binary-i386/sb16ctrl-bochs_2.1.1+20041109-3sarge1_i386.deb oldstable/main/binary-all/bochs-doc_2.1.1+20041109-3sarge1_all.deb oldstable/main/binary-all/bochsbios_2.1.1+20041109-3sarge1_all.deb bochs (2.1.1+20041109-3sarge1) oldstable-security; urgency=high * Fix heap buffer overflow in ne2k emulated driver. (Closes: #427144) CVE-2007-2893 - debian/patches/05_security_ne2k.patch: New file. oldstable/main/binary-ia64/bochs_2.1.1+20041109-3sarge1_ia64.deb oldstable/main/binary-ia64/bochs-wx_2.1.1+20041109-3sarge1_ia64.deb oldstable/main/binary-ia64/bochs-sdl_2.1.1+20041109-3sarge1_ia64.deb oldstable/main/binary-ia64/bochs-term_2.1.1+20041109-3sarge1_ia64.deb oldstable/main/binary-ia64/bochs-x_2.1.1+20041109-3sarge1_ia64.deb oldstable/main/binary-ia64/bximage_2.1.1+20041109-3sarge1_ia64.deb bochs (2.1.1+20041109-3sarge1) oldstable-security; urgency=high * Fix heap buffer overflow in ne2k emulated driver. (Closes: #427144) CVE-2007-2893 - debian/patches/05_security_ne2k.patch: New file. oldstable/main/binary-m68k/bochs_2.1.1+20041109-3sarge1_m68k.deb oldstable/main/binary-m68k/bochs-wx_2.1.1+20041109-3sarge1_m68k.deb oldstable/main/binary-m68k/bochs-sdl_2.1.1+20041109-3sarge1_m68k.deb oldstable/main/binary-m68k/bochs-term_2.1.1+20041109-3sarge1_m68k.deb oldstable/main/binary-m68k/bochs-x_2.1.1+20041109-3sarge1_m68k.deb oldstable/main/binary-m68k/bximage_2.1.1+20041109-3sarge1_m68k.deb bochs (2.1.1+20041109-3sarge1) oldstable-security; urgency=high * Fix heap buffer overflow in ne2k emulated driver. (Closes: #427144) CVE-2007-2893 - debian/patches/05_security_ne2k.patch: New file. oldstable/main/binary-mips/bochs_2.1.1+20041109-3sarge1_mips.deb oldstable/main/binary-mips/bochs-wx_2.1.1+20041109-3sarge1_mips.deb oldstable/main/binary-mips/bochs-sdl_2.1.1+20041109-3sarge1_mips.deb oldstable/main/binary-mips/bochs-term_2.1.1+20041109-3sarge1_mips.deb oldstable/main/binary-mips/bochs-x_2.1.1+20041109-3sarge1_mips.deb oldstable/main/binary-mips/bximage_2.1.1+20041109-3sarge1_mips.deb bochs (2.1.1+20041109-3sarge1) oldstable-security; urgency=high * Fix heap buffer overflow in ne2k emulated driver. (Closes: #427144) CVE-2007-2893 - debian/patches/05_security_ne2k.patch: New file. oldstable/main/binary-mipsel/bochs_2.1.1+20041109-3sarge1_mipsel.deb oldstable/main/binary-mipsel/bochs-wx_2.1.1+20041109-3sarge1_mipsel.deb oldstable/main/binary-mipsel/bochs-sdl_2.1.1+20041109-3sarge1_mipsel.deb oldstable/main/binary-mipsel/bochs-term_2.1.1+20041109-3sarge1_mipsel.deb oldstable/main/binary-mipsel/bochs-x_2.1.1+20041109-3sarge1_mipsel.deb oldstable/main/binary-mipsel/bximage_2.1.1+20041109-3sarge1_mipsel.deb bochs (2.1.1+20041109-3sarge1) oldstable-security; urgency=high * Fix heap buffer overflow in ne2k emulated driver. (Closes: #427144) CVE-2007-2893 - debian/patches/05_security_ne2k.patch: New file. oldstable/main/binary-powerpc/bochs_2.1.1+20041109-3sarge1_powerpc.deb oldstable/main/binary-powerpc/bochs-wx_2.1.1+20041109-3sarge1_powerpc.deb oldstable/main/binary-powerpc/bochs-sdl_2.1.1+20041109-3sarge1_powerpc.deb oldstable/main/binary-powerpc/bochs-term_2.1.1+20041109-3sarge1_powerpc.deb oldstable/main/binary-powerpc/bochs-x_2.1.1+20041109-3sarge1_powerpc.deb oldstable/main/binary-powerpc/bximage_2.1.1+20041109-3sarge1_powerpc.deb bochs (2.1.1+20041109-3sarge1) oldstable-security; urgency=high * Fix heap buffer overflow in ne2k emulated driver. (Closes: #427144) CVE-2007-2893 - debian/patches/05_security_ne2k.patch: New file. oldstable/main/binary-s390/bochs_2.1.1+20041109-3sarge1_s390.deb oldstable/main/binary-s390/bochs-wx_2.1.1+20041109-3sarge1_s390.deb oldstable/main/binary-s390/bochs-sdl_2.1.1+20041109-3sarge1_s390.deb oldstable/main/binary-s390/bochs-term_2.1.1+20041109-3sarge1_s390.deb oldstable/main/binary-s390/bochs-x_2.1.1+20041109-3sarge1_s390.deb oldstable/main/binary-s390/bximage_2.1.1+20041109-3sarge1_s390.deb bochs (2.1.1+20041109-3sarge1) oldstable-security; urgency=high * Fix heap buffer overflow in ne2k emulated driver. (Closes: #427144) CVE-2007-2893 - debian/patches/05_security_ne2k.patch: New file. oldstable/main/binary-sparc/bochs_2.1.1+20041109-3sarge1_sparc.deb oldstable/main/binary-sparc/bochs-wx_2.1.1+20041109-3sarge1_sparc.deb oldstable/main/binary-sparc/bochs-sdl_2.1.1+20041109-3sarge1_sparc.deb oldstable/main/binary-sparc/bochs-term_2.1.1+20041109-3sarge1_sparc.deb oldstable/main/binary-sparc/bochs-x_2.1.1+20041109-3sarge1_sparc.deb oldstable/main/binary-sparc/bximage_2.1.1+20041109-3sarge1_sparc.deb bochs (2.1.1+20041109-3sarge1) oldstable-security; urgency=high * Fix heap buffer overflow in ne2k emulated driver. (Closes: #427144) CVE-2007-2893 - debian/patches/05_security_ne2k.patch: New file. oldstable/main/source/cacti_0.8.6c-7sarge5.dsc oldstable/main/source/cacti_0.8.6c-7sarge5.diff.gz oldstable/main/binary-all/cacti_0.8.6c-7sarge5_all.deb cacti (0.8.6c-7sarge5) oldstable-security; urgency=high * SECURITY UPDATE: + CVE-2007-6035: SQL injection vulnerability in Cacti before 0.8.7a allows remote attackers to execute arbitrary SQL commands via unspecified vectors. * debian/patches/10_CVE-2007-6035.dpatch: applied patch by upstream (Link: http://www.cacti.net/downloads/patches/0.8.6j/sec_sql_injection-0.8.6j.patch) * References: CVE-2007-6035 oldstable/main/binary-ia64/camediaplay_20010211-4_ia64.deb camediaplay (20010211-4) unstable; urgency=low * removed a nonstandard abbreviation in the package description Closes: #124480: Spelling error in description oldstable/main/binary-m68k/camediaplay_20010211-4_m68k.deb camediaplay (20010211-4) unstable; urgency=low * removed a nonstandard abbreviation in the package description Closes: #124480: Spelling error in description oldstable/main/binary-mipsel/camediaplay_20010211-4_mipsel.deb camediaplay (20010211-4) unstable; urgency=low * removed a nonstandard abbreviation in the package description Closes: #124480: Spelling error in description oldstable/main/binary-s390/camediaplay_20010211-4_s390.deb camediaplay (20010211-4) unstable; urgency=low * removed a nonstandard abbreviation in the package description Closes: #124480: Spelling error in description oldstable/main/source/cdrom-detect_1.05sarge1.dsc oldstable/main/source/cdrom-detect_1.05sarge1.tar.gz oldstable/main/cdrom-detect_1.05sarge1_all.udeb cdrom-detect (1.05sarge1) oldstable; urgency=low * Add support for installing oldstable (checking for oldstable in the postinst should not be necessary). * Update translations with thanks to translators. oldstable/main/binary-alpha/centericq-common_4.20.0-1sarge5_alpha.deb oldstable/main/binary-alpha/centericq_4.20.0-1sarge5_alpha.deb oldstable/main/binary-alpha/centericq-utf8_4.20.0-1sarge5_alpha.deb oldstable/main/binary-alpha/centericq-fribidi_4.20.0-1sarge5_alpha.deb centericq (4.20.0-1sarge5) oldstable-security; urgency=high * Non-maintainer upload by the security team * Backport upstream patch to fix buffer overflows, which can allow remote attackers to execute arbitrary code Fixes: CVE-2007-3713 oldstable/main/binary-amd64/centericq-common_4.20.0-1sarge5_amd64.deb oldstable/main/binary-amd64/centericq_4.20.0-1sarge5_amd64.deb oldstable/main/binary-amd64/centericq-utf8_4.20.0-1sarge5_amd64.deb oldstable/main/binary-amd64/centericq-fribidi_4.20.0-1sarge5_amd64.deb centericq (4.20.0-1sarge5) oldstable-security; urgency=high * Non-maintainer upload by the security team * Backport upstream patch to fix buffer overflows, which can allow remote attackers to execute arbitrary code Fixes: CVE-2007-3713 oldstable/main/binary-arm/centericq-common_4.20.0-1sarge5_arm.deb oldstable/main/binary-arm/centericq_4.20.0-1sarge5_arm.deb oldstable/main/binary-arm/centericq-utf8_4.20.0-1sarge5_arm.deb oldstable/main/binary-arm/centericq-fribidi_4.20.0-1sarge5_arm.deb centericq (4.20.0-1sarge5) oldstable-security; urgency=high * Non-maintainer upload by the security team * Backport upstream patch to fix buffer overflows, which can allow remote attackers to execute arbitrary code Fixes: CVE-2007-3713 oldstable/main/binary-hppa/centericq-common_4.20.0-1sarge5_hppa.deb oldstable/main/binary-hppa/centericq_4.20.0-1sarge5_hppa.deb oldstable/main/binary-hppa/centericq-utf8_4.20.0-1sarge5_hppa.deb oldstable/main/binary-hppa/centericq-fribidi_4.20.0-1sarge5_hppa.deb centericq (4.20.0-1sarge5) oldstable-security; urgency=high * Non-maintainer upload by the security team * Backport upstream patch to fix buffer overflows, which can allow remote attackers to execute arbitrary code Fixes: CVE-2007-3713 oldstable/main/source/centericq_4.20.0-1sarge5.dsc oldstable/main/source/centericq_4.20.0-1sarge5.diff.gz oldstable/main/binary-i386/centericq-common_4.20.0-1sarge5_i386.deb oldstable/main/binary-i386/centericq_4.20.0-1sarge5_i386.deb oldstable/main/binary-i386/centericq-utf8_4.20.0-1sarge5_i386.deb oldstable/main/binary-i386/centericq-fribidi_4.20.0-1sarge5_i386.deb centericq (4.20.0-1sarge5) oldstable-security; urgency=high * Non-maintainer upload by the security team * Backport upstream patch to fix buffer overflows, which can allow remote attackers to execute arbitrary code Fixes: CVE-2007-3713 oldstable/main/binary-ia64/centericq-common_4.20.0-1sarge5_ia64.deb oldstable/main/binary-ia64/centericq_4.20.0-1sarge5_ia64.deb oldstable/main/binary-ia64/centericq-utf8_4.20.0-1sarge5_ia64.deb oldstable/main/binary-ia64/centericq-fribidi_4.20.0-1sarge5_ia64.deb centericq (4.20.0-1sarge5) oldstable-security; urgency=high * Non-maintainer upload by the security team * Backport upstream patch to fix buffer overflows, which can allow remote attackers to execute arbitrary code Fixes: CVE-2007-3713 oldstable/main/binary-m68k/centericq-common_4.20.0-1sarge5_m68k.deb oldstable/main/binary-m68k/centericq_4.20.0-1sarge5_m68k.deb oldstable/main/binary-m68k/centericq-utf8_4.20.0-1sarge5_m68k.deb oldstable/main/binary-m68k/centericq-fribidi_4.20.0-1sarge5_m68k.deb centericq (4.20.0-1sarge5) oldstable-security; urgency=high * Non-maintainer upload by the security team * Backport upstream patch to fix buffer overflows, which can allow remote attackers to execute arbitrary code Fixes: CVE-2007-3713 oldstable/main/binary-mips/centericq-common_4.20.0-1sarge5_mips.deb oldstable/main/binary-mips/centericq_4.20.0-1sarge5_mips.deb oldstable/main/binary-mips/centericq-utf8_4.20.0-1sarge5_mips.deb oldstable/main/binary-mips/centericq-fribidi_4.20.0-1sarge5_mips.deb centericq (4.20.0-1sarge5) oldstable-security; urgency=high * Non-maintainer upload by the security team * Backport upstream patch to fix buffer overflows, which can allow remote attackers to execute arbitrary code Fixes: CVE-2007-3713 oldstable/main/binary-mipsel/centericq-common_4.20.0-1sarge5_mipsel.deb oldstable/main/binary-mipsel/centericq_4.20.0-1sarge5_mipsel.deb oldstable/main/binary-mipsel/centericq-utf8_4.20.0-1sarge5_mipsel.deb oldstable/main/binary-mipsel/centericq-fribidi_4.20.0-1sarge5_mipsel.deb centericq (4.20.0-1sarge5) oldstable-security; urgency=high * Non-maintainer upload by the security team * Backport upstream patch to fix buffer overflows, which can allow remote attackers to execute arbitrary code Fixes: CVE-2007-3713 oldstable/main/binary-powerpc/centericq-common_4.20.0-1sarge5_powerpc.deb oldstable/main/binary-powerpc/centericq_4.20.0-1sarge5_powerpc.deb oldstable/main/binary-powerpc/centericq-utf8_4.20.0-1sarge5_powerpc.deb oldstable/main/binary-powerpc/centericq-fribidi_4.20.0-1sarge5_powerpc.deb centericq (4.20.0-1sarge5) oldstable-security; urgency=high * Non-maintainer upload by the security team * Backport upstream patch to fix buffer overflows, which can allow remote attackers to execute arbitrary code Fixes: CVE-2007-3713 oldstable/main/binary-s390/centericq-common_4.20.0-1sarge5_s390.deb oldstable/main/binary-s390/centericq_4.20.0-1sarge5_s390.deb oldstable/main/binary-s390/centericq-utf8_4.20.0-1sarge5_s390.deb oldstable/main/binary-s390/centericq-fribidi_4.20.0-1sarge5_s390.deb centericq (4.20.0-1sarge5) oldstable-security; urgency=high * Non-maintainer upload by the security team * Backport upstream patch to fix buffer overflows, which can allow remote attackers to execute arbitrary code Fixes: CVE-2007-3713 oldstable/main/binary-sparc/centericq-common_4.20.0-1sarge5_sparc.deb oldstable/main/binary-sparc/centericq_4.20.0-1sarge5_sparc.deb oldstable/main/binary-sparc/centericq-utf8_4.20.0-1sarge5_sparc.deb oldstable/main/binary-sparc/centericq-fribidi_4.20.0-1sarge5_sparc.deb centericq (4.20.0-1sarge5) oldstable-security; urgency=high * Non-maintainer upload by the security team * Backport upstream patch to fix buffer overflows, which can allow remote attackers to execute arbitrary code Fixes: CVE-2007-3713 oldstable/main/choose-mirror_1.07sarge1_alpha.udeb choose-mirror (1.07sarge1) oldstable; urgency=low * Add support for installing oldstable. * Update mirror list. * Add translations (from iso-codes) for Venezuela for the HTTP country list. * Update translations with thanks to translators. oldstable/main/choose-mirror_1.07sarge1_arm.udeb choose-mirror (1.07sarge1) oldstable; urgency=low * Add support for installing oldstable. * Update mirror list. * Add translations (from iso-codes) for Venezuela for the HTTP country list. * Update translations with thanks to translators. oldstable/main/choose-mirror_1.07sarge1_hppa.udeb choose-mirror (1.07sarge1) oldstable; urgency=low * Add support for installing oldstable. * Update mirror list. * Add translations (from iso-codes) for Venezuela for the HTTP country list. * Update translations with thanks to translators. oldstable/main/source/choose-mirror_1.07sarge1.dsc oldstable/main/source/choose-mirror_1.07sarge1.tar.gz oldstable/main/choose-mirror_1.07sarge1_i386.udeb choose-mirror (1.07sarge1) oldstable; urgency=low * Add support for installing oldstable. * Update mirror list. * Add translations (from iso-codes) for Venezuela for the HTTP country list. * Update translations with thanks to translators. oldstable/main/choose-mirror_1.07sarge1_ia64.udeb choose-mirror (1.07sarge1) oldstable; urgency=low * Add support for installing oldstable. * Update mirror list. * Add translations (from iso-codes) for Venezuela for the HTTP country list. * Update translations with thanks to translators. oldstable/main/choose-mirror_1.07sarge1_m68k.udeb choose-mirror (1.07sarge1) oldstable; urgency=low * Add support for installing oldstable. * Update mirror list. * Add translations (from iso-codes) for Venezuela for the HTTP country list. * Update translations with thanks to translators. oldstable/main/choose-mirror_1.07sarge1_mips.udeb choose-mirror (1.07sarge1) oldstable; urgency=low * Add support for installing oldstable. * Update mirror list. * Add translations (from iso-codes) for Venezuela for the HTTP country list. * Update translations with thanks to translators. oldstable/main/choose-mirror_1.07sarge1_mipsel.udeb choose-mirror (1.07sarge1) oldstable; urgency=low * Add support for installing oldstable. * Update mirror list. * Add translations (from iso-codes) for Venezuela for the HTTP country list. * Update translations with thanks to translators. oldstable/main/choose-mirror_1.07sarge1_powerpc.udeb choose-mirror (1.07sarge1) oldstable; urgency=low * Add support for installing oldstable. * Update mirror list. * Add translations (from iso-codes) for Venezuela for the HTTP country list. * Update translations with thanks to translators. oldstable/main/choose-mirror_1.07sarge1_s390.udeb choose-mirror (1.07sarge1) oldstable; urgency=low * Add support for installing oldstable. * Update mirror list. * Add translations (from iso-codes) for Venezuela for the HTTP country list. * Update translations with thanks to translators. oldstable/main/choose-mirror_1.07sarge1_sparc.udeb choose-mirror (1.07sarge1) oldstable; urgency=low * Add support for installing oldstable. * Update mirror list. * Add translations (from iso-codes) for Venezuela for the HTTP country list. * Update translations with thanks to translators. oldstable/main/binary-alpha/libclamav1_0.84-2.sarge.17_alpha.deb oldstable/main/binary-alpha/clamav_0.84-2.sarge.17_alpha.deb oldstable/main/binary-alpha/clamav-daemon_0.84-2.sarge.17_alpha.deb oldstable/main/binary-alpha/clamav-freshclam_0.84-2.sarge.17_alpha.deb oldstable/main/binary-alpha/clamav-milter_0.84-2.sarge.17_alpha.deb oldstable/main/binary-alpha/libclamav-dev_0.84-2.sarge.17_alpha.deb clamav (0.84-2.sarge.17) oldstable-security; urgency=low * [CVE-2007-2650]: libclamav/ole2_extract.c: detect block list loop oldstable/main/binary-arm/libclamav1_0.84-2.sarge.17_arm.deb oldstable/main/binary-arm/clamav_0.84-2.sarge.17_arm.deb oldstable/main/binary-arm/clamav-daemon_0.84-2.sarge.17_arm.deb oldstable/main/binary-arm/clamav-freshclam_0.84-2.sarge.17_arm.deb oldstable/main/binary-arm/clamav-milter_0.84-2.sarge.17_arm.deb oldstable/main/binary-arm/libclamav-dev_0.84-2.sarge.17_arm.deb clamav (0.84-2.sarge.17) oldstable-security; urgency=low * [CVE-2007-2650]: libclamav/ole2_extract.c: detect block list loop oldstable/main/binary-hppa/libclamav1_0.84-2.sarge.17_hppa.deb oldstable/main/binary-hppa/clamav_0.84-2.sarge.17_hppa.deb oldstable/main/binary-hppa/clamav-daemon_0.84-2.sarge.17_hppa.deb oldstable/main/binary-hppa/clamav-freshclam_0.84-2.sarge.17_hppa.deb oldstable/main/binary-hppa/clamav-milter_0.84-2.sarge.17_hppa.deb oldstable/main/binary-hppa/libclamav-dev_0.84-2.sarge.17_hppa.deb clamav (0.84-2.sarge.17) oldstable-security; urgency=low * [CVE-2007-2650]: libclamav/ole2_extract.c: detect block list loop oldstable/main/source/clamav_0.84-2.sarge.17.dsc oldstable/main/source/clamav_0.84-2.sarge.17.diff.gz oldstable/main/binary-all/clamav-base_0.84-2.sarge.17_all.deb oldstable/main/binary-all/clamav-testfiles_0.84-2.sarge.17_all.deb oldstable/main/binary-all/clamav-docs_0.84-2.sarge.17_all.deb oldstable/main/binary-i386/libclamav1_0.84-2.sarge.17_i386.deb oldstable/main/binary-i386/clamav_0.84-2.sarge.17_i386.deb oldstable/main/binary-i386/clamav-daemon_0.84-2.sarge.17_i386.deb oldstable/main/binary-i386/clamav-freshclam_0.84-2.sarge.17_i386.deb oldstable/main/binary-i386/clamav-milter_0.84-2.sarge.17_i386.deb oldstable/main/binary-i386/libclamav-dev_0.84-2.sarge.17_i386.deb clamav (0.84-2.sarge.17) oldstable-security; urgency=low * [CVE-2007-2650]: libclamav/ole2_extract.c: detect block list loop oldstable/main/binary-ia64/libclamav1_0.84-2.sarge.17_ia64.deb oldstable/main/binary-ia64/clamav_0.84-2.sarge.17_ia64.deb oldstable/main/binary-ia64/clamav-daemon_0.84-2.sarge.17_ia64.deb oldstable/main/binary-ia64/clamav-freshclam_0.84-2.sarge.17_ia64.deb oldstable/main/binary-ia64/clamav-milter_0.84-2.sarge.17_ia64.deb oldstable/main/binary-ia64/libclamav-dev_0.84-2.sarge.17_ia64.deb clamav (0.84-2.sarge.17) oldstable-security; urgency=low * [CVE-2007-2650]: libclamav/ole2_extract.c: detect block list loop oldstable/main/binary-m68k/libclamav1_0.84-2.sarge.17_m68k.deb oldstable/main/binary-m68k/clamav_0.84-2.sarge.17_m68k.deb oldstable/main/binary-m68k/clamav-daemon_0.84-2.sarge.17_m68k.deb oldstable/main/binary-m68k/clamav-freshclam_0.84-2.sarge.17_m68k.deb oldstable/main/binary-m68k/clamav-milter_0.84-2.sarge.17_m68k.deb oldstable/main/binary-m68k/libclamav-dev_0.84-2.sarge.17_m68k.deb clamav (0.84-2.sarge.17) oldstable-security; urgency=low * [CVE-2007-2650]: libclamav/ole2_extract.c: detect block list loop oldstable/main/binary-mips/libclamav1_0.84-2.sarge.17_mips.deb oldstable/main/binary-mips/clamav_0.84-2.sarge.17_mips.deb oldstable/main/binary-mips/clamav-daemon_0.84-2.sarge.17_mips.deb oldstable/main/binary-mips/clamav-freshclam_0.84-2.sarge.17_mips.deb oldstable/main/binary-mips/clamav-milter_0.84-2.sarge.17_mips.deb oldstable/main/binary-mips/libclamav-dev_0.84-2.sarge.17_mips.deb clamav (0.84-2.sarge.17) oldstable-security; urgency=low * [CVE-2007-2650]: libclamav/ole2_extract.c: detect block list loop oldstable/main/binary-mipsel/libclamav1_0.84-2.sarge.17_mipsel.deb oldstable/main/binary-mipsel/clamav_0.84-2.sarge.17_mipsel.deb oldstable/main/binary-mipsel/clamav-daemon_0.84-2.sarge.17_mipsel.deb oldstable/main/binary-mipsel/clamav-freshclam_0.84-2.sarge.17_mipsel.deb oldstable/main/binary-mipsel/clamav-milter_0.84-2.sarge.17_mipsel.deb oldstable/main/binary-mipsel/libclamav-dev_0.84-2.sarge.17_mipsel.deb clamav (0.84-2.sarge.17) oldstable-security; urgency=low * [CVE-2007-2650]: libclamav/ole2_extract.c: detect block list loop oldstable/main/binary-powerpc/libclamav1_0.84-2.sarge.17_powerpc.deb oldstable/main/binary-powerpc/clamav_0.84-2.sarge.17_powerpc.deb oldstable/main/binary-powerpc/clamav-daemon_0.84-2.sarge.17_powerpc.deb oldstable/main/binary-powerpc/clamav-freshclam_0.84-2.sarge.17_powerpc.deb oldstable/main/binary-powerpc/clamav-milter_0.84-2.sarge.17_powerpc.deb oldstable/main/binary-powerpc/libclamav-dev_0.84-2.sarge.17_powerpc.deb clamav (0.84-2.sarge.17) oldstable-security; urgency=low * [CVE-2007-2650]: libclamav/ole2_extract.c: detect block list loop oldstable/main/binary-s390/libclamav1_0.84-2.sarge.17_s390.deb oldstable/main/binary-s390/clamav_0.84-2.sarge.17_s390.deb oldstable/main/binary-s390/clamav-daemon_0.84-2.sarge.17_s390.deb oldstable/main/binary-s390/clamav-freshclam_0.84-2.sarge.17_s390.deb oldstable/main/binary-s390/clamav-milter_0.84-2.sarge.17_s390.deb oldstable/main/binary-s390/libclamav-dev_0.84-2.sarge.17_s390.deb clamav (0.84-2.sarge.17) oldstable-security; urgency=low * [CVE-2007-2650]: libclamav/ole2_extract.c: detect block list loop oldstable/main/binary-sparc/libclamav1_0.84-2.sarge.17_sparc.deb oldstable/main/binary-sparc/clamav_0.84-2.sarge.17_sparc.deb oldstable/main/binary-sparc/clamav-daemon_0.84-2.sarge.17_sparc.deb oldstable/main/binary-sparc/clamav-freshclam_0.84-2.sarge.17_sparc.deb oldstable/main/binary-sparc/clamav-milter_0.84-2.sarge.17_sparc.deb oldstable/main/binary-sparc/libclamav-dev_0.84-2.sarge.17_sparc.deb clamav (0.84-2.sarge.17) oldstable-security; urgency=low * [CVE-2007-2650]: libclamav/ole2_extract.c: detect block list loop oldstable/main/binary-sparc/jsvc_1.0-5_sparc.deb commons-daemon (1.0-5) unstable; urgency=low * upload with the sources. * Build with free tools now, therefore buildable on all architectures and a jsvc binary should be provided (closes: #286871) * Move to main as built with free tools * Shortened and clarified description (closes: #279752) oldstable/main/binary-alpha/debian-installer-manual_20050317sarge2_alpha.deb oldstable/main/source/debian-installer-images_20050317sarge2_alpha.tar.gz debian-installer (20050317sarge2) oldstable; urgency=low * Change amd64 kernel from 2.6.8-11 to 2.6.8-12. Thanks Kurt Roeckx. * Fix kernel base version for sparc32 2.6 netboot kernel. * Support distribution equal to oldstable. * Update kernel versions for Sarge security updates with ABI change. oldstable/main/binary-arm/debian-installer-manual_20050317sarge2_arm.deb oldstable/main/source/debian-installer-images_20050317sarge2_arm.tar.gz debian-installer (20050317sarge2) oldstable; urgency=low * Change amd64 kernel from 2.6.8-11 to 2.6.8-12. Thanks Kurt Roeckx. * Fix kernel base version for sparc32 2.6 netboot kernel. * Support distribution equal to oldstable. * Update kernel versions for Sarge security updates with ABI change. oldstable/main/binary-hppa/debian-installer-manual_20050317sarge2_hppa.deb oldstable/main/source/debian-installer-images_20050317sarge2_hppa.tar.gz debian-installer (20050317sarge2) oldstable; urgency=low * Change amd64 kernel from 2.6.8-11 to 2.6.8-12. Thanks Kurt Roeckx. * Fix kernel base version for sparc32 2.6 netboot kernel. * Support distribution equal to oldstable. * Update kernel versions for Sarge security updates with ABI change. oldstable/main/source/debian-installer_20050317sarge2.dsc oldstable/main/source/debian-installer_20050317sarge2.tar.gz oldstable/main/binary-i386/debian-installer-manual_20050317sarge2_i386.deb oldstable/main/source/debian-installer-images_20050317sarge2_i386.tar.gz debian-installer (20050317sarge2) oldstable; urgency=low * Change amd64 kernel from 2.6.8-11 to 2.6.8-12. Thanks Kurt Roeckx. * Fix kernel base version for sparc32 2.6 netboot kernel. * Support distribution equal to oldstable. * Update kernel versions for Sarge security updates with ABI change. oldstable/main/binary-ia64/debian-installer-manual_20050317sarge2_ia64.deb oldstable/main/source/debian-installer-images_20050317sarge2_ia64.tar.gz debian-installer (20050317sarge2) oldstable; urgency=low * Change amd64 kernel from 2.6.8-11 to 2.6.8-12. Thanks Kurt Roeckx. * Fix kernel base version for sparc32 2.6 netboot kernel. * Support distribution equal to oldstable. * Update kernel versions for Sarge security updates with ABI change. oldstable/main/binary-m68k/debian-installer-manual_20050317sarge2_m68k.deb oldstable/main/source/debian-installer-images_20050317sarge2_m68k.tar.gz debian-installer (20050317sarge2) oldstable; urgency=low * Change amd64 kernel from 2.6.8-11 to 2.6.8-12. Thanks Kurt Roeckx. * Fix kernel base version for sparc32 2.6 netboot kernel. * Support distribution equal to oldstable. * Update kernel versions for Sarge security updates with ABI change. oldstable/main/binary-mips/debian-installer-manual_20050317sarge2_mips.deb oldstable/main/source/debian-installer-images_20050317sarge2_mips.tar.gz debian-installer (20050317sarge2) oldstable; urgency=low * Change amd64 kernel from 2.6.8-11 to 2.6.8-12. Thanks Kurt Roeckx. * Fix kernel base version for sparc32 2.6 netboot kernel. * Support distribution equal to oldstable. * Update kernel versions for Sarge security updates with ABI change. oldstable/main/binary-mipsel/debian-installer-manual_20050317sarge2_mipsel.deb oldstable/main/source/debian-installer-images_20050317sarge2_mipsel.tar.gz debian-installer (20050317sarge2) oldstable; urgency=low * Change amd64 kernel from 2.6.8-11 to 2.6.8-12. Thanks Kurt Roeckx. * Fix kernel base version for sparc32 2.6 netboot kernel. * Support distribution equal to oldstable. * Update kernel versions for Sarge security updates with ABI change. oldstable/main/binary-powerpc/debian-installer-manual_20050317sarge2_powerpc.deb oldstable/main/source/debian-installer-images_20050317sarge2_powerpc.tar.gz debian-installer (20050317sarge2) oldstable; urgency=low * Change amd64 kernel from 2.6.8-11 to 2.6.8-12. Thanks Kurt Roeckx. * Fix kernel base version for sparc32 2.6 netboot kernel. * Support distribution equal to oldstable. * Update kernel versions for Sarge security updates with ABI change. oldstable/main/binary-s390/debian-installer-manual_20050317sarge2_s390.deb oldstable/main/source/debian-installer-images_20050317sarge2_s390.tar.gz debian-installer (20050317sarge2) oldstable; urgency=low * Change amd64 kernel from 2.6.8-11 to 2.6.8-12. Thanks Kurt Roeckx. * Fix kernel base version for sparc32 2.6 netboot kernel. * Support distribution equal to oldstable. * Update kernel versions for Sarge security updates with ABI change. oldstable/main/binary-sparc/debian-installer-manual_20050317sarge2_sparc.deb oldstable/main/source/debian-installer-images_20050317sarge2_sparc.tar.gz debian-installer (20050317sarge2) oldstable; urgency=low * Change amd64 kernel from 2.6.8-11 to 2.6.8-12. Thanks Kurt Roeckx. * Fix kernel base version for sparc32 2.6 netboot kernel. * Support distribution equal to oldstable. * Update kernel versions for Sarge security updates with ABI change. oldstable/main/binary-hppa/debtags-edit_0.9.2_hppa.deb debtags-edit (0.9.2) unstable; urgency=low * Compiles with gcc 3.4. Closes: bug#264146. Thanks to Andreas Jochens for the patch. oldstable/main/binary-alpha/dhcp_2.0pl5-19.1sarge3_alpha.deb oldstable/main/binary-alpha/dhcp-client_2.0pl5-19.1sarge3_alpha.deb oldstable/main/binary-alpha/dhcp-relay_2.0pl5-19.1sarge3_alpha.deb oldstable/main/dhcp-client-udeb_2.0pl5-19.1sarge3_alpha.udeb dhcp (2.0pl5-19.1sarge3) oldstable-security; urgency=high * Non-maintainer upload by the Security Team. * Fix stack-based buffer overflow in options.c, which allows arbitrary code execution or remote denial of service. Fixes: CVE-2007-5365 oldstable/main/binary-amd64/dhcp_2.0pl5-19.1sarge3_amd64.deb oldstable/main/binary-amd64/dhcp-client_2.0pl5-19.1sarge3_amd64.deb oldstable/main/binary-amd64/dhcp-relay_2.0pl5-19.1sarge3_amd64.deb oldstable/main/dhcp-client-udeb_2.0pl5-19.1sarge3_amd64.udeb dhcp (2.0pl5-19.1sarge3) oldstable-security; urgency=high * Non-maintainer upload by the Security Team. * Fix stack-based buffer overflow in options.c, which allows arbitrary code execution or remote denial of service. Fixes: CVE-2007-5365 oldstable/main/binary-arm/dhcp_2.0pl5-19.1sarge3_arm.deb oldstable/main/binary-arm/dhcp-client_2.0pl5-19.1sarge3_arm.deb oldstable/main/binary-arm/dhcp-relay_2.0pl5-19.1sarge3_arm.deb oldstable/main/dhcp-client-udeb_2.0pl5-19.1sarge3_arm.udeb dhcp (2.0pl5-19.1sarge3) oldstable-security; urgency=high * Non-maintainer upload by the Security Team. * Fix stack-based buffer overflow in options.c, which allows arbitrary code execution or remote denial of service. Fixes: CVE-2007-5365 oldstable/main/binary-hppa/dhcp_2.0pl5-19.1sarge3_hppa.deb oldstable/main/binary-hppa/dhcp-client_2.0pl5-19.1sarge3_hppa.deb oldstable/main/binary-hppa/dhcp-relay_2.0pl5-19.1sarge3_hppa.deb oldstable/main/dhcp-client-udeb_2.0pl5-19.1sarge3_hppa.udeb dhcp (2.0pl5-19.1sarge3) oldstable-security; urgency=high * Non-maintainer upload by the Security Team. * Fix stack-based buffer overflow in options.c, which allows arbitrary code execution or remote denial of service. Fixes: CVE-2007-5365 oldstable/main/source/dhcp_2.0pl5-19.1sarge3.dsc oldstable/main/source/dhcp_2.0pl5-19.1sarge3.diff.gz oldstable/main/binary-i386/dhcp_2.0pl5-19.1sarge3_i386.deb oldstable/main/binary-i386/dhcp-client_2.0pl5-19.1sarge3_i386.deb oldstable/main/binary-i386/dhcp-relay_2.0pl5-19.1sarge3_i386.deb oldstable/main/dhcp-client-udeb_2.0pl5-19.1sarge3_i386.udeb dhcp (2.0pl5-19.1sarge3) oldstable-security; urgency=high * Non-maintainer upload by the Security Team. * Fix stack-based buffer overflow in options.c, which allows arbitrary code execution or remote denial of service. Fixes: CVE-2007-5365 oldstable/main/binary-ia64/dhcp_2.0pl5-19.1sarge3_ia64.deb oldstable/main/binary-ia64/dhcp-client_2.0pl5-19.1sarge3_ia64.deb oldstable/main/binary-ia64/dhcp-relay_2.0pl5-19.1sarge3_ia64.deb oldstable/main/dhcp-client-udeb_2.0pl5-19.1sarge3_ia64.udeb dhcp (2.0pl5-19.1sarge3) oldstable-security; urgency=high * Non-maintainer upload by the Security Team. * Fix stack-based buffer overflow in options.c, which allows arbitrary code execution or remote denial of service. Fixes: CVE-2007-5365 oldstable/main/binary-m68k/dhcp_2.0pl5-19.1sarge3_m68k.deb oldstable/main/binary-m68k/dhcp-client_2.0pl5-19.1sarge3_m68k.deb oldstable/main/binary-m68k/dhcp-relay_2.0pl5-19.1sarge3_m68k.deb oldstable/main/dhcp-client-udeb_2.0pl5-19.1sarge3_m68k.udeb dhcp (2.0pl5-19.1sarge3) oldstable-security; urgency=high * Non-maintainer upload by the Security Team. * Fix stack-based buffer overflow in options.c, which allows arbitrary code execution or remote denial of service. Fixes: CVE-2007-5365 oldstable/main/binary-mips/dhcp_2.0pl5-19.1sarge3_mips.deb oldstable/main/binary-mips/dhcp-client_2.0pl5-19.1sarge3_mips.deb oldstable/main/binary-mips/dhcp-relay_2.0pl5-19.1sarge3_mips.deb oldstable/main/dhcp-client-udeb_2.0pl5-19.1sarge3_mips.udeb dhcp (2.0pl5-19.1sarge3) oldstable-security; urgency=high * Non-maintainer upload by the Security Team. * Fix stack-based buffer overflow in options.c, which allows arbitrary code execution or remote denial of service. Fixes: CVE-2007-5365 oldstable/main/binary-mipsel/dhcp_2.0pl5-19.1sarge3_mipsel.deb oldstable/main/binary-mipsel/dhcp-client_2.0pl5-19.1sarge3_mipsel.deb oldstable/main/binary-mipsel/dhcp-relay_2.0pl5-19.1sarge3_mipsel.deb oldstable/main/dhcp-client-udeb_2.0pl5-19.1sarge3_mipsel.udeb dhcp (2.0pl5-19.1sarge3) oldstable-security; urgency=high * Non-maintainer upload by the Security Team. * Fix stack-based buffer overflow in options.c, which allows arbitrary code execution or remote denial of service. Fixes: CVE-2007-5365 oldstable/main/binary-powerpc/dhcp_2.0pl5-19.1sarge3_powerpc.deb oldstable/main/binary-powerpc/dhcp-client_2.0pl5-19.1sarge3_powerpc.deb oldstable/main/binary-powerpc/dhcp-relay_2.0pl5-19.1sarge3_powerpc.deb oldstable/main/dhcp-client-udeb_2.0pl5-19.1sarge3_powerpc.udeb dhcp (2.0pl5-19.1sarge3) oldstable-security; urgency=high * Non-maintainer upload by the Security Team. * Fix stack-based buffer overflow in options.c, which allows arbitrary code execution or remote denial of service. Fixes: CVE-2007-5365 oldstable/main/binary-s390/dhcp_2.0pl5-19.1sarge3_s390.deb oldstable/main/binary-s390/dhcp-client_2.0pl5-19.1sarge3_s390.deb oldstable/main/binary-s390/dhcp-relay_2.0pl5-19.1sarge3_s390.deb oldstable/main/dhcp-client-udeb_2.0pl5-19.1sarge3_s390.udeb dhcp (2.0pl5-19.1sarge3) oldstable-security; urgency=high * Non-maintainer upload by the Security Team. * Fix stack-based buffer overflow in options.c, which allows arbitrary code execution or remote denial of service. Fixes: CVE-2007-5365 oldstable/main/binary-sparc/dhcp_2.0pl5-19.1sarge3_sparc.deb oldstable/main/binary-sparc/dhcp-client_2.0pl5-19.1sarge3_sparc.deb oldstable/main/binary-sparc/dhcp-relay_2.0pl5-19.1sarge3_sparc.deb oldstable/main/dhcp-client-udeb_2.0pl5-19.1sarge3_sparc.udeb dhcp (2.0pl5-19.1sarge3) oldstable-security; urgency=high * Non-maintainer upload by the Security Team. * Fix stack-based buffer overflow in options.c, which allows arbitrary code execution or remote denial of service. Fixes: CVE-2007-5365 oldstable/main/binary-alpha/ekg_1.5+20050411-7_alpha.deb oldstable/main/binary-alpha/libgadu-dev_1.5+20050411-7_alpha.deb oldstable/main/binary-alpha/libgadu3_1.5+20050411-7_alpha.deb ekg (1:1.5+20050411-7) oldstable-security; urgency=medium * Security upload, fixing two problems missed when preparing DSA-767: - Using revision -7, as -6 was used for a sarge-volatile upload (-7 does not contain any changes from -6) * Fixes a memory alignment error in libgadu, which could lead to a DoS on some architectures (CAN-2005-2370) * Fixes endianness conversion problems, which could cause invalid behavior on big endian machines (CAN-2005-2448) oldstable/main/binary-arm/ekg_1.5+20050411-7_arm.deb oldstable/main/binary-arm/libgadu-dev_1.5+20050411-7_arm.deb oldstable/main/binary-arm/libgadu3_1.5+20050411-7_arm.deb ekg (1:1.5+20050411-7) oldstable-security; urgency=medium * Security upload, fixing two problems missed when preparing DSA-767: - Using revision -7, as -6 was used for a sarge-volatile upload (-7 does not contain any changes from -6) * Fixes a memory alignment error in libgadu, which could lead to a DoS on some architectures (CAN-2005-2370) * Fixes endianness conversion problems, which could cause invalid behavior on big endian machines (CAN-2005-2448) oldstable/main/binary-hppa/ekg_1.5+20050411-7_hppa.deb oldstable/main/binary-hppa/libgadu-dev_1.5+20050411-7_hppa.deb oldstable/main/binary-hppa/libgadu3_1.5+20050411-7_hppa.deb ekg (1:1.5+20050411-7) oldstable-security; urgency=medium * Security upload, fixing two problems missed when preparing DSA-767: - Using revision -7, as -6 was used for a sarge-volatile upload (-7 does not contain any changes from -6) * Fixes a memory alignment error in libgadu, which could lead to a DoS on some architectures (CAN-2005-2370) * Fixes endianness conversion problems, which could cause invalid behavior on big endian machines (CAN-2005-2448) oldstable/main/source/ekg_1.5+20050411-7.dsc oldstable/main/source/ekg_1.5+20050411-7.diff.gz oldstable/main/binary-i386/ekg_1.5+20050411-7_i386.deb oldstable/main/binary-i386/libgadu-dev_1.5+20050411-7_i386.deb oldstable/main/binary-i386/libgadu3_1.5+20050411-7_i386.deb ekg (1:1.5+20050411-7) oldstable-security; urgency=medium * Security upload, fixing two problems missed when preparing DSA-767: - Using revision -7, as -6 was used for a sarge-volatile upload (-7 does not contain any changes from -6) * Fixes a memory alignment error in libgadu, which could lead to a DoS on some architectures (CAN-2005-2370) * Fixes endianness conversion problems, which could cause invalid behavior on big endian machines (CAN-2005-2448) oldstable/main/binary-ia64/ekg_1.5+20050411-7_ia64.deb oldstable/main/binary-ia64/libgadu-dev_1.5+20050411-7_ia64.deb oldstable/main/binary-ia64/libgadu3_1.5+20050411-7_ia64.deb ekg (1:1.5+20050411-7) oldstable-security; urgency=medium * Security upload, fixing two problems missed when preparing DSA-767: - Using revision -7, as -6 was used for a sarge-volatile upload (-7 does not contain any changes from -6) * Fixes a memory alignment error in libgadu, which could lead to a DoS on some architectures (CAN-2005-2370) * Fixes endianness conversion problems, which could cause invalid behavior on big endian machines (CAN-2005-2448) oldstable/main/binary-m68k/ekg_1.5+20050411-7_m68k.deb oldstable/main/binary-m68k/libgadu-dev_1.5+20050411-7_m68k.deb oldstable/main/binary-m68k/libgadu3_1.5+20050411-7_m68k.deb ekg (1:1.5+20050411-7) oldstable-security; urgency=medium * Security upload, fixing two problems missed when preparing DSA-767: - Using revision -7, as -6 was used for a sarge-volatile upload (-7 does not contain any changes from -6) * Fixes a memory alignment error in libgadu, which could lead to a DoS on some architectures (CAN-2005-2370) * Fixes endianness conversion problems, which could cause invalid behavior on big endian machines (CAN-2005-2448) oldstable/main/binary-mips/ekg_1.5+20050411-7_mips.deb oldstable/main/binary-mips/libgadu-dev_1.5+20050411-7_mips.deb oldstable/main/binary-mips/libgadu3_1.5+20050411-7_mips.deb ekg (1:1.5+20050411-7) oldstable-security; urgency=medium * Security upload, fixing two problems missed when preparing DSA-767: - Using revision -7, as -6 was used for a sarge-volatile upload (-7 does not contain any changes from -6) * Fixes a memory alignment error in libgadu, which could lead to a DoS on some architectures (CAN-2005-2370) * Fixes endianness conversion problems, which could cause invalid behavior on big endian machines (CAN-2005-2448) oldstable/main/binary-mipsel/ekg_1.5+20050411-7_mipsel.deb oldstable/main/binary-mipsel/libgadu-dev_1.5+20050411-7_mipsel.deb oldstable/main/binary-mipsel/libgadu3_1.5+20050411-7_mipsel.deb ekg (1:1.5+20050411-7) oldstable-security; urgency=medium * Security upload, fixing two problems missed when preparing DSA-767: - Using revision -7, as -6 was used for a sarge-volatile upload (-7 does not contain any changes from -6) * Fixes a memory alignment error in libgadu, which could lead to a DoS on some architectures (CAN-2005-2370) * Fixes endianness conversion problems, which could cause invalid behavior on big endian machines (CAN-2005-2448) oldstable/main/binary-powerpc/ekg_1.5+20050411-7_powerpc.deb oldstable/main/binary-powerpc/libgadu-dev_1.5+20050411-7_powerpc.deb oldstable/main/binary-powerpc/libgadu3_1.5+20050411-7_powerpc.deb ekg (1:1.5+20050411-7) oldstable-security; urgency=medium * Security upload, fixing two problems missed when preparing DSA-767: - Using revision -7, as -6 was used for a sarge-volatile upload (-7 does not contain any changes from -6) * Fixes a memory alignment error in libgadu, which could lead to a DoS on some architectures (CAN-2005-2370) * Fixes endianness conversion problems, which could cause invalid behavior on big endian machines (CAN-2005-2448) oldstable/main/binary-s390/ekg_1.5+20050411-7_s390.deb oldstable/main/binary-s390/libgadu-dev_1.5+20050411-7_s390.deb oldstable/main/binary-s390/libgadu3_1.5+20050411-7_s390.deb ekg (1:1.5+20050411-7) oldstable-security; urgency=medium * Security upload, fixing two problems missed when preparing DSA-767: - Using revision -7, as -6 was used for a sarge-volatile upload (-7 does not contain any changes from -6) * Fixes a memory alignment error in libgadu, which could lead to a DoS on some architectures (CAN-2005-2370) * Fixes endianness conversion problems, which could cause invalid behavior on big endian machines (CAN-2005-2448) oldstable/main/binary-sparc/ekg_1.5+20050411-7_sparc.deb oldstable/main/binary-sparc/libgadu-dev_1.5+20050411-7_sparc.deb oldstable/main/binary-sparc/libgadu3_1.5+20050411-7_sparc.deb ekg (1:1.5+20050411-7) oldstable-security; urgency=medium * Security upload, fixing two problems missed when preparing DSA-767: - Using revision -7, as -6 was used for a sarge-volatile upload (-7 does not contain any changes from -6) * Fixes a memory alignment error in libgadu, which could lead to a DoS on some architectures (CAN-2005-2370) * Fixes endianness conversion problems, which could cause invalid behavior on big endian machines (CAN-2005-2448) oldstable/main/binary-alpha/ethereal-common_0.10.10-2sarge10_alpha.deb oldstable/main/binary-alpha/ethereal_0.10.10-2sarge10_alpha.deb oldstable/main/binary-alpha/tethereal_0.10.10-2sarge10_alpha.deb oldstable/main/binary-alpha/ethereal-dev_0.10.10-2sarge10_alpha.deb ethereal (0.10.10-2sarge10) oldstable-security; urgency=high * Non-maintainer upload by the Security Team * Backported fixes from 0.99.7 for several vulnerabilities: * Resource exhaustion in MEGAGO dissector * Crasher in RPC dissector oldstable/main/binary-amd64/ethereal-common_0.10.10-2sarge10_amd64.deb oldstable/main/binary-amd64/ethereal_0.10.10-2sarge10_amd64.deb oldstable/main/binary-amd64/tethereal_0.10.10-2sarge10_amd64.deb oldstable/main/binary-amd64/ethereal-dev_0.10.10-2sarge10_amd64.deb ethereal (0.10.10-2sarge10) oldstable-security; urgency=high * Non-maintainer upload by the Security Team * Backported fixes from 0.99.7 for several vulnerabilities: * Resource exhaustion in MEGAGO dissector * Crasher in RPC dissector oldstable/main/binary-arm/ethereal-common_0.10.10-2sarge10_arm.deb oldstable/main/binary-arm/ethereal_0.10.10-2sarge10_arm.deb oldstable/main/binary-arm/tethereal_0.10.10-2sarge10_arm.deb oldstable/main/binary-arm/ethereal-dev_0.10.10-2sarge10_arm.deb ethereal (0.10.10-2sarge10) oldstable-security; urgency=high * Non-maintainer upload by the Security Team * Backported fixes from 0.99.7 for several vulnerabilities: * Resource exhaustion in MEGAGO dissector * Crasher in RPC dissector oldstable/main/binary-hppa/ethereal-common_0.10.10-2sarge10_hppa.deb oldstable/main/binary-hppa/ethereal_0.10.10-2sarge10_hppa.deb oldstable/main/binary-hppa/tethereal_0.10.10-2sarge10_hppa.deb oldstable/main/binary-hppa/ethereal-dev_0.10.10-2sarge10_hppa.deb ethereal (0.10.10-2sarge10) oldstable-security; urgency=high * Non-maintainer upload by the Security Team * Backported fixes from 0.99.7 for several vulnerabilities: * Resource exhaustion in MEGAGO dissector * Crasher in RPC dissector oldstable/main/source/ethereal_0.10.10-2sarge10.dsc oldstable/main/source/ethereal_0.10.10-2sarge10.diff.gz oldstable/main/binary-i386/ethereal-common_0.10.10-2sarge10_i386.deb oldstable/main/binary-i386/ethereal_0.10.10-2sarge10_i386.deb oldstable/main/binary-i386/tethereal_0.10.10-2sarge10_i386.deb oldstable/main/binary-i386/ethereal-dev_0.10.10-2sarge10_i386.deb ethereal (0.10.10-2sarge10) oldstable-security; urgency=high * Non-maintainer upload by the Security Team * Backported fixes from 0.99.7 for several vulnerabilities: * Resource exhaustion in MEGAGO dissector * Crasher in RPC dissector oldstable/main/binary-ia64/ethereal-common_0.10.10-2sarge10_ia64.deb oldstable/main/binary-ia64/ethereal_0.10.10-2sarge10_ia64.deb oldstable/main/binary-ia64/tethereal_0.10.10-2sarge10_ia64.deb oldstable/main/binary-ia64/ethereal-dev_0.10.10-2sarge10_ia64.deb ethereal (0.10.10-2sarge10) oldstable-security; urgency=high * Non-maintainer upload by the Security Team * Backported fixes from 0.99.7 for several vulnerabilities: * Resource exhaustion in MEGAGO dissector * Crasher in RPC dissector oldstable/main/binary-m68k/ethereal-common_0.10.10-2sarge10_m68k.deb oldstable/main/binary-m68k/ethereal_0.10.10-2sarge10_m68k.deb oldstable/main/binary-m68k/tethereal_0.10.10-2sarge10_m68k.deb oldstable/main/binary-m68k/ethereal-dev_0.10.10-2sarge10_m68k.deb ethereal (0.10.10-2sarge10) oldstable-security; urgency=high * Non-maintainer upload by the Security Team * Backported fixes from 0.99.7 for several vulnerabilities: * Resource exhaustion in MEGAGO dissector * Crasher in RPC dissector oldstable/main/binary-mips/ethereal-common_0.10.10-2sarge10_mips.deb oldstable/main/binary-mips/ethereal_0.10.10-2sarge10_mips.deb oldstable/main/binary-mips/tethereal_0.10.10-2sarge10_mips.deb oldstable/main/binary-mips/ethereal-dev_0.10.10-2sarge10_mips.deb ethereal (0.10.10-2sarge10) oldstable-security; urgency=high * Non-maintainer upload by the Security Team * Backported fixes from 0.99.7 for several vulnerabilities: * Resource exhaustion in MEGAGO dissector * Crasher in RPC dissector oldstable/main/binary-mipsel/ethereal-common_0.10.10-2sarge10_mipsel.deb oldstable/main/binary-mipsel/ethereal_0.10.10-2sarge10_mipsel.deb oldstable/main/binary-mipsel/tethereal_0.10.10-2sarge10_mipsel.deb oldstable/main/binary-mipsel/ethereal-dev_0.10.10-2sarge10_mipsel.deb ethereal (0.10.10-2sarge10) oldstable-security; urgency=high * Non-maintainer upload by the Security Team * Backported fixes from 0.99.7 for several vulnerabilities: * Resource exhaustion in MEGAGO dissector * Crasher in RPC dissector oldstable/main/binary-powerpc/ethereal-common_0.10.10-2sarge10_powerpc.deb oldstable/main/binary-powerpc/ethereal_0.10.10-2sarge10_powerpc.deb oldstable/main/binary-powerpc/tethereal_0.10.10-2sarge10_powerpc.deb oldstable/main/binary-powerpc/ethereal-dev_0.10.10-2sarge10_powerpc.deb ethereal (0.10.10-2sarge10) oldstable-security; urgency=high * Non-maintainer upload by the Security Team * Backported fixes from 0.99.7 for several vulnerabilities: * Resource exhaustion in MEGAGO dissector * Crasher in RPC dissector oldstable/main/binary-s390/ethereal-common_0.10.10-2sarge10_s390.deb oldstable/main/binary-s390/ethereal_0.10.10-2sarge10_s390.deb oldstable/main/binary-s390/tethereal_0.10.10-2sarge10_s390.deb oldstable/main/binary-s390/ethereal-dev_0.10.10-2sarge10_s390.deb ethereal (0.10.10-2sarge10) oldstable-security; urgency=high * Non-maintainer upload by the Security Team * Backported fixes from 0.99.7 for several vulnerabilities: * Resource exhaustion in MEGAGO dissector * Crasher in RPC dissector oldstable/main/binary-sparc/ethereal-common_0.10.10-2sarge10_sparc.deb oldstable/main/binary-sparc/ethereal_0.10.10-2sarge10_sparc.deb oldstable/main/binary-sparc/tethereal_0.10.10-2sarge10_sparc.deb oldstable/main/binary-sparc/ethereal-dev_0.10.10-2sarge10_sparc.deb ethereal (0.10.10-2sarge10) oldstable-security; urgency=high * Non-maintainer upload by the Security Team * Backported fixes from 0.99.7 for several vulnerabilities: * Resource exhaustion in MEGAGO dissector * Crasher in RPC dissector oldstable/main/binary-alpha/evolution_2.0.4-2sarge2_alpha.deb oldstable/main/binary-alpha/evolution-dev_2.0.4-2sarge2_alpha.deb evolution (2.0.4-2sarge2) oldstable-security; urgency=high * SECURITY: New patch, z_10_imap-negative-array-index, fixes potential negative array index usage in IMAP code (remote); FEDORA-2007-0464; GNOME #447414; closes: #429876. oldstable/main/binary-arm/evolution_2.0.4-2sarge2_arm.deb oldstable/main/binary-arm/evolution-dev_2.0.4-2sarge2_arm.deb evolution (2.0.4-2sarge2) oldstable-security; urgency=high * SECURITY: New patch, z_10_imap-negative-array-index, fixes potential negative array index usage in IMAP code (remote); FEDORA-2007-0464; GNOME #447414; closes: #429876. oldstable/main/binary-hppa/evolution_2.0.4-2sarge2_hppa.deb oldstable/main/binary-hppa/evolution-dev_2.0.4-2sarge2_hppa.deb evolution (2.0.4-2sarge2) oldstable-security; urgency=high * SECURITY: New patch, z_10_imap-negative-array-index, fixes potential negative array index usage in IMAP code (remote); FEDORA-2007-0464; GNOME #447414; closes: #429876. oldstable/main/source/evolution_2.0.4-2sarge2.dsc oldstable/main/source/evolution_2.0.4-2sarge2.diff.gz oldstable/main/binary-i386/evolution_2.0.4-2sarge2_i386.deb oldstable/main/binary-i386/evolution-dev_2.0.4-2sarge2_i386.deb evolution (2.0.4-2sarge2) oldstable-security; urgency=high * SECURITY: New patch, z_10_imap-negative-array-index, fixes potential negative array index usage in IMAP code (remote); FEDORA-2007-0464; GNOME #447414; closes: #429876. oldstable/main/binary-ia64/evolution_2.0.4-2sarge2_ia64.deb oldstable/main/binary-ia64/evolution-dev_2.0.4-2sarge2_ia64.deb evolution (2.0.4-2sarge2) oldstable-security; urgency=high * SECURITY: New patch, z_10_imap-negative-array-index, fixes potential negative array index usage in IMAP code (remote); FEDORA-2007-0464; GNOME #447414; closes: #429876. oldstable/main/binary-m68k/evolution_2.0.4-2sarge2_m68k.deb oldstable/main/binary-m68k/evolution-dev_2.0.4-2sarge2_m68k.deb evolution (2.0.4-2sarge2) oldstable-security; urgency=high * SECURITY: New patch, z_10_imap-negative-array-index, fixes potential negative array index usage in IMAP code (remote); FEDORA-2007-0464; GNOME #447414; closes: #429876. oldstable/main/binary-mips/evolution_2.0.4-2sarge2_mips.deb oldstable/main/binary-mips/evolution-dev_2.0.4-2sarge2_mips.deb evolution (2.0.4-2sarge2) oldstable-security; urgency=high * SECURITY: New patch, z_10_imap-negative-array-index, fixes potential negative array index usage in IMAP code (remote); FEDORA-2007-0464; GNOME #447414; closes: #429876. oldstable/main/binary-mipsel/evolution_2.0.4-2sarge2_mipsel.deb oldstable/main/binary-mipsel/evolution-dev_2.0.4-2sarge2_mipsel.deb evolution (2.0.4-2sarge2) oldstable-security; urgency=high * SECURITY: New patch, z_10_imap-negative-array-index, fixes potential negative array index usage in IMAP code (remote); FEDORA-2007-0464; GNOME #447414; closes: #429876. oldstable/main/binary-powerpc/evolution_2.0.4-2sarge2_powerpc.deb oldstable/main/binary-powerpc/evolution-dev_2.0.4-2sarge2_powerpc.deb evolution (2.0.4-2sarge2) oldstable-security; urgency=high * SECURITY: New patch, z_10_imap-negative-array-index, fixes potential negative array index usage in IMAP code (remote); FEDORA-2007-0464; GNOME #447414; closes: #429876. oldstable/main/binary-s390/evolution_2.0.4-2sarge2_s390.deb oldstable/main/binary-s390/evolution-dev_2.0.4-2sarge2_s390.deb evolution (2.0.4-2sarge2) oldstable-security; urgency=high * SECURITY: New patch, z_10_imap-negative-array-index, fixes potential negative array index usage in IMAP code (remote); FEDORA-2007-0464; GNOME #447414; closes: #429876. oldstable/main/binary-sparc/evolution_2.0.4-2sarge2_sparc.deb oldstable/main/binary-sparc/evolution-dev_2.0.4-2sarge2_sparc.deb evolution (2.0.4-2sarge2) oldstable-security; urgency=high * SECURITY: New patch, z_10_imap-negative-array-index, fixes potential negative array index usage in IMAP code (remote); FEDORA-2007-0464; GNOME #447414; closes: #429876. oldstable/main/source/fai-kernels_1.9.1sarge7.dsc oldstable/main/source/fai-kernels_1.9.1sarge7.tar.gz oldstable/main/binary-i386/fai-kernels_1.9.1sarge7_i386.deb fai-kernels (1.9.1sarge7) oldstable; urgency=low * Build against kerenl-tree-2.6.8-17 oldstable/main/binary-sparc/fet_3.12.30-1_sparc.deb fet (3.12.30-1) unstable; urgency=low * New upstream release (closes: #298292) (new Catalan translation) oldstable/main/binary-alpha/file_4.12-1sarge2_alpha.deb oldstable/main/binary-alpha/libmagic1_4.12-1sarge2_alpha.deb oldstable/main/binary-alpha/libmagic-dev_4.12-1sarge2_alpha.deb file (4.12-1sarge2) oldstable-security; urgency=high * Applied patch from Josh Bressers (also picked up by upstream) to src/funcs.c to fix CVE-2007-2799. The previous security patch was incorrect. oldstable/main/binary-arm/file_4.12-1sarge2_arm.deb oldstable/main/binary-arm/libmagic1_4.12-1sarge2_arm.deb oldstable/main/binary-arm/libmagic-dev_4.12-1sarge2_arm.deb file (4.12-1sarge2) oldstable-security; urgency=high * Applied patch from Josh Bressers (also picked up by upstream) to src/funcs.c to fix CVE-2007-2799. The previous security patch was incorrect. oldstable/main/binary-hppa/file_4.12-1sarge2_hppa.deb oldstable/main/binary-hppa/libmagic1_4.12-1sarge2_hppa.deb oldstable/main/binary-hppa/libmagic-dev_4.12-1sarge2_hppa.deb file (4.12-1sarge2) oldstable-security; urgency=high * Applied patch from Josh Bressers (also picked up by upstream) to src/funcs.c to fix CVE-2007-2799. The previous security patch was incorrect. oldstable/main/source/file_4.12-1sarge2.dsc oldstable/main/source/file_4.12-1sarge2.diff.gz oldstable/main/binary-i386/file_4.12-1sarge2_i386.deb oldstable/main/binary-i386/libmagic1_4.12-1sarge2_i386.deb oldstable/main/binary-i386/libmagic-dev_4.12-1sarge2_i386.deb file (4.12-1sarge2) oldstable-security; urgency=high * Applied patch from Josh Bressers (also picked up by upstream) to src/funcs.c to fix CVE-2007-2799. The previous security patch was incorrect. oldstable/main/binary-ia64/file_4.12-1sarge2_ia64.deb oldstable/main/binary-ia64/libmagic1_4.12-1sarge2_ia64.deb oldstable/main/binary-ia64/libmagic-dev_4.12-1sarge2_ia64.deb file (4.12-1sarge2) oldstable-security; urgency=high * Applied patch from Josh Bressers (also picked up by upstream) to src/funcs.c to fix CVE-2007-2799. The previous security patch was incorrect. oldstable/main/binary-m68k/file_4.12-1sarge2_m68k.deb oldstable/main/binary-m68k/libmagic1_4.12-1sarge2_m68k.deb oldstable/main/binary-m68k/libmagic-dev_4.12-1sarge2_m68k.deb file (4.12-1sarge2) oldstable-security; urgency=high * Applied patch from Josh Bressers (also picked up by upstream) to src/funcs.c to fix CVE-2007-2799. The previous security patch was incorrect. oldstable/main/binary-mips/file_4.12-1sarge2_mips.deb oldstable/main/binary-mips/libmagic1_4.12-1sarge2_mips.deb oldstable/main/binary-mips/libmagic-dev_4.12-1sarge2_mips.deb file (4.12-1sarge2) oldstable-security; urgency=high * Applied patch from Josh Bressers (also picked up by upstream) to src/funcs.c to fix CVE-2007-2799. The previous security patch was incorrect. oldstable/main/binary-mipsel/file_4.12-1sarge2_mipsel.deb oldstable/main/binary-mipsel/libmagic1_4.12-1sarge2_mipsel.deb oldstable/main/binary-mipsel/libmagic-dev_4.12-1sarge2_mipsel.deb file (4.12-1sarge2) oldstable-security; urgency=high * Applied patch from Josh Bressers (also picked up by upstream) to src/funcs.c to fix CVE-2007-2799. The previous security patch was incorrect. oldstable/main/binary-powerpc/file_4.12-1sarge2_powerpc.deb oldstable/main/binary-powerpc/libmagic1_4.12-1sarge2_powerpc.deb oldstable/main/binary-powerpc/libmagic-dev_4.12-1sarge2_powerpc.deb file (4.12-1sarge2) oldstable-security; urgency=high * Applied patch from Josh Bressers (also picked up by upstream) to src/funcs.c to fix CVE-2007-2799. The previous security patch was incorrect. oldstable/main/binary-s390/file_4.12-1sarge2_s390.deb oldstable/main/binary-s390/libmagic1_4.12-1sarge2_s390.deb oldstable/main/binary-s390/libmagic-dev_4.12-1sarge2_s390.deb file (4.12-1sarge2) oldstable-security; urgency=high * Applied patch from Josh Bressers (also picked up by upstream) to src/funcs.c to fix CVE-2007-2799. The previous security patch was incorrect. oldstable/main/binary-sparc/file_4.12-1sarge2_sparc.deb oldstable/main/binary-sparc/libmagic1_4.12-1sarge2_sparc.deb oldstable/main/binary-sparc/libmagic-dev_4.12-1sarge2_sparc.deb file (4.12-1sarge2) oldstable-security; urgency=high * Applied patch from Josh Bressers (also picked up by upstream) to src/funcs.c to fix CVE-2007-2799. The previous security patch was incorrect. oldstable/main/binary-alpha/fireflier-server_1.1.5-1sarge1_alpha.deb oldstable/main/binary-alpha/fireflier-client-qt_1.1.5-1sarge1_alpha.deb oldstable/main/binary-alpha/fireflier-client-kde_1.1.5-1sarge1_alpha.deb oldstable/main/binary-alpha/fireflier-client-gtk_1.1.5-1sarge1_alpha.deb fireflier (1.1.5-1sarge1) oldstable-security; urgency=high * Non-maintainer upload by The Security Team. * Fix the unsafe usage of temporary files, allowing arbitary file deletion. [CVE-2007-2837] oldstable/main/binary-arm/fireflier-server_1.1.5-1sarge1_arm.deb oldstable/main/binary-arm/fireflier-client-qt_1.1.5-1sarge1_arm.deb oldstable/main/binary-arm/fireflier-client-kde_1.1.5-1sarge1_arm.deb oldstable/main/binary-arm/fireflier-client-gtk_1.1.5-1sarge1_arm.deb fireflier (1.1.5-1sarge1) oldstable-security; urgency=high * Non-maintainer upload by The Security Team. * Fix the unsafe usage of temporary files, allowing arbitary file deletion. [CVE-2007-2837] oldstable/main/binary-hppa/fireflier-server_1.1.5-1sarge1_hppa.deb oldstable/main/binary-hppa/fireflier-client-qt_1.1.5-1sarge1_hppa.deb oldstable/main/binary-hppa/fireflier-client-kde_1.1.5-1sarge1_hppa.deb oldstable/main/binary-hppa/fireflier-client-gtk_1.1.5-1sarge1_hppa.deb fireflier (1.1.5-1sarge1) oldstable-security; urgency=high * Non-maintainer upload by The Security Team. * Fix the unsafe usage of temporary files, allowing arbitary file deletion. [CVE-2007-2837] oldstable/main/source/fireflier_1.1.5-1sarge1.dsc oldstable/main/source/fireflier_1.1.5-1sarge1.tar.gz oldstable/main/binary-i386/fireflier-server_1.1.5-1sarge1_i386.deb oldstable/main/binary-i386/fireflier-client-qt_1.1.5-1sarge1_i386.deb oldstable/main/binary-i386/fireflier-client-kde_1.1.5-1sarge1_i386.deb oldstable/main/binary-i386/fireflier-client-gtk_1.1.5-1sarge1_i386.deb fireflier (1.1.5-1sarge1) oldstable-security; urgency=high * Non-maintainer upload by The Security Team. * Fix the unsafe usage of temporary files, allowing arbitary file deletion. [CVE-2007-2837] oldstable/main/binary-ia64/fireflier-server_1.1.5-1sarge1_ia64.deb oldstable/main/binary-ia64/fireflier-client-qt_1.1.5-1sarge1_ia64.deb oldstable/main/binary-ia64/fireflier-client-kde_1.1.5-1sarge1_ia64.deb oldstable/main/binary-ia64/fireflier-client-gtk_1.1.5-1sarge1_ia64.deb fireflier (1.1.5-1sarge1) oldstable-security; urgency=high * Non-maintainer upload by The Security Team. * Fix the unsafe usage of temporary files, allowing arbitary file deletion. [CVE-2007-2837] oldstable/main/binary-m68k/fireflier-server_1.1.5-1sarge1_m68k.deb oldstable/main/binary-m68k/fireflier-client-qt_1.1.5-1sarge1_m68k.deb oldstable/main/binary-m68k/fireflier-client-kde_1.1.5-1sarge1_m68k.deb oldstable/main/binary-m68k/fireflier-client-gtk_1.1.5-1sarge1_m68k.deb fireflier (1.1.5-1sarge1) oldstable-security; urgency=high * Non-maintainer upload by The Security Team. * Fix the unsafe usage of temporary files, allowing arbitary file deletion. [CVE-2007-2837] oldstable/main/binary-mips/fireflier-server_1.1.5-1sarge1_mips.deb oldstable/main/binary-mips/fireflier-client-qt_1.1.5-1sarge1_mips.deb oldstable/main/binary-mips/fireflier-client-kde_1.1.5-1sarge1_mips.deb oldstable/main/binary-mips/fireflier-client-gtk_1.1.5-1sarge1_mips.deb fireflier (1.1.5-1sarge1) oldstable-security; urgency=high * Non-maintainer upload by The Security Team. * Fix the unsafe usage of temporary files, allowing arbitary file deletion. [CVE-2007-2837] oldstable/main/binary-mipsel/fireflier-server_1.1.5-1sarge1_mipsel.deb oldstable/main/binary-mipsel/fireflier-client-qt_1.1.5-1sarge1_mipsel.deb oldstable/main/binary-mipsel/fireflier-client-kde_1.1.5-1sarge1_mipsel.deb oldstable/main/binary-mipsel/fireflier-client-gtk_1.1.5-1sarge1_mipsel.deb fireflier (1.1.5-1sarge1) oldstable-security; urgency=high * Non-maintainer upload by The Security Team. * Fix the unsafe usage of temporary files, allowing arbitary file deletion. [CVE-2007-2837] oldstable/main/binary-powerpc/fireflier-server_1.1.5-1sarge1_powerpc.deb oldstable/main/binary-powerpc/fireflier-client-qt_1.1.5-1sarge1_powerpc.deb oldstable/main/binary-powerpc/fireflier-client-kde_1.1.5-1sarge1_powerpc.deb oldstable/main/binary-powerpc/fireflier-client-gtk_1.1.5-1sarge1_powerpc.deb fireflier (1.1.5-1sarge1) oldstable-security; urgency=high * Non-maintainer upload by The Security Team. * Fix the unsafe usage of temporary files, allowing arbitary file deletion. [CVE-2007-2837] oldstable/main/binary-s390/fireflier-server_1.1.5-1sarge1_s390.deb oldstable/main/binary-s390/fireflier-client-qt_1.1.5-1sarge1_s390.deb oldstable/main/binary-s390/fireflier-client-kde_1.1.5-1sarge1_s390.deb oldstable/main/binary-s390/fireflier-client-gtk_1.1.5-1sarge1_s390.deb fireflier (1.1.5-1sarge1) oldstable-security; urgency=high * Non-maintainer upload by The Security Team. * Fix the unsafe usage of temporary files, allowing arbitary file deletion. [CVE-2007-2837] oldstable/main/binary-sparc/fireflier-server_1.1.5-1sarge1_sparc.deb oldstable/main/binary-sparc/fireflier-client-qt_1.1.5-1sarge1_sparc.deb oldstable/main/binary-sparc/fireflier-client-kde_1.1.5-1sarge1_sparc.deb oldstable/main/binary-sparc/fireflier-client-gtk_1.1.5-1sarge1_sparc.deb fireflier (1.1.5-1sarge1) oldstable-security; urgency=high * Non-maintainer upload by The Security Team. * Fix the unsafe usage of temporary files, allowing arbitary file deletion. [CVE-2007-2837] oldstable/main/binary-arm/freepops_0.0.27-1_arm.deb freepops (0.0.27-1) unstable; urgency=low * new upastream release oldstable/main/binary-alpha/libfreetype6_2.1.7-8_alpha.deb oldstable/main/binary-alpha/libfreetype6-dev_2.1.7-8_alpha.deb oldstable/main/binary-alpha/freetype2-demos_2.1.7-8_alpha.deb oldstable/main/libfreetype6-udeb_2.1.7-8_alpha.udeb freetype (2.1.7-8) oldstable-security; urgency=high * debian/patches-freetype/500-CVE-2007-2754_ttgfload.diff: address CVE-2007-2754, a bug allowing execution of arbitrary code via a crafted TTF image by way of an integer overflow. Closes: #425625. oldstable/main/binary-arm/libfreetype6_2.1.7-8_arm.deb oldstable/main/binary-arm/libfreetype6-dev_2.1.7-8_arm.deb oldstable/main/binary-arm/freetype2-demos_2.1.7-8_arm.deb oldstable/main/libfreetype6-udeb_2.1.7-8_arm.udeb freetype (2.1.7-8) oldstable-security; urgency=high * debian/patches-freetype/500-CVE-2007-2754_ttgfload.diff: address CVE-2007-2754, a bug allowing execution of arbitrary code via a crafted TTF image by way of an integer overflow. Closes: #425625. oldstable/main/binary-hppa/libfreetype6_2.1.7-8_hppa.deb oldstable/main/binary-hppa/libfreetype6-dev_2.1.7-8_hppa.deb oldstable/main/binary-hppa/freetype2-demos_2.1.7-8_hppa.deb oldstable/main/libfreetype6-udeb_2.1.7-8_hppa.udeb freetype (2.1.7-8) oldstable-security; urgency=high * debian/patches-freetype/500-CVE-2007-2754_ttgfload.diff: address CVE-2007-2754, a bug allowing execution of arbitrary code via a crafted TTF image by way of an integer overflow. Closes: #425625. oldstable/main/source/freetype_2.1.7-8.dsc oldstable/main/source/freetype_2.1.7-8.diff.gz oldstable/main/binary-i386/libfreetype6_2.1.7-8_i386.deb oldstable/main/binary-i386/libfreetype6-dev_2.1.7-8_i386.deb oldstable/main/binary-i386/freetype2-demos_2.1.7-8_i386.deb oldstable/main/libfreetype6-udeb_2.1.7-8_i386.udeb freetype (2.1.7-8) oldstable-security; urgency=high * debian/patches-freetype/500-CVE-2007-2754_ttgfload.diff: address CVE-2007-2754, a bug allowing execution of arbitrary code via a crafted TTF image by way of an integer overflow. Closes: #425625. oldstable/main/binary-ia64/libfreetype6_2.1.7-8_ia64.deb oldstable/main/binary-ia64/libfreetype6-dev_2.1.7-8_ia64.deb oldstable/main/binary-ia64/freetype2-demos_2.1.7-8_ia64.deb oldstable/main/libfreetype6-udeb_2.1.7-8_ia64.udeb freetype (2.1.7-8) oldstable-security; urgency=high * debian/patches-freetype/500-CVE-2007-2754_ttgfload.diff: address CVE-2007-2754, a bug allowing execution of arbitrary code via a crafted TTF image by way of an integer overflow. Closes: #425625. oldstable/main/binary-m68k/libfreetype6_2.1.7-8_m68k.deb oldstable/main/binary-m68k/libfreetype6-dev_2.1.7-8_m68k.deb oldstable/main/binary-m68k/freetype2-demos_2.1.7-8_m68k.deb oldstable/main/libfreetype6-udeb_2.1.7-8_m68k.udeb freetype (2.1.7-8) oldstable-security; urgency=high * debian/patches-freetype/500-CVE-2007-2754_ttgfload.diff: address CVE-2007-2754, a bug allowing execution of arbitrary code via a crafted TTF image by way of an integer overflow. Closes: #425625. oldstable/main/binary-mips/libfreetype6_2.1.7-8_mips.deb oldstable/main/binary-mips/libfreetype6-dev_2.1.7-8_mips.deb oldstable/main/binary-mips/freetype2-demos_2.1.7-8_mips.deb oldstable/main/libfreetype6-udeb_2.1.7-8_mips.udeb freetype (2.1.7-8) oldstable-security; urgency=high * debian/patches-freetype/500-CVE-2007-2754_ttgfload.diff: address CVE-2007-2754, a bug allowing execution of arbitrary code via a crafted TTF image by way of an integer overflow. Closes: #425625. oldstable/main/binary-mipsel/libfreetype6_2.1.7-8_mipsel.deb oldstable/main/binary-mipsel/libfreetype6-dev_2.1.7-8_mipsel.deb oldstable/main/binary-mipsel/freetype2-demos_2.1.7-8_mipsel.deb oldstable/main/libfreetype6-udeb_2.1.7-8_mipsel.udeb freetype (2.1.7-8) oldstable-security; urgency=high * debian/patches-freetype/500-CVE-2007-2754_ttgfload.diff: address CVE-2007-2754, a bug allowing execution of arbitrary code via a crafted TTF image by way of an integer overflow. Closes: #425625. oldstable/main/binary-powerpc/libfreetype6_2.1.7-8_powerpc.deb oldstable/main/binary-powerpc/libfreetype6-dev_2.1.7-8_powerpc.deb oldstable/main/binary-powerpc/freetype2-demos_2.1.7-8_powerpc.deb oldstable/main/libfreetype6-udeb_2.1.7-8_powerpc.udeb freetype (2.1.7-8) oldstable-security; urgency=high * debian/patches-freetype/500-CVE-2007-2754_ttgfload.diff: address CVE-2007-2754, a bug allowing execution of arbitrary code via a crafted TTF image by way of an integer overflow. Closes: #425625. oldstable/main/binary-s390/libfreetype6_2.1.7-8_s390.deb oldstable/main/binary-s390/libfreetype6-dev_2.1.7-8_s390.deb oldstable/main/binary-s390/freetype2-demos_2.1.7-8_s390.deb oldstable/main/libfreetype6-udeb_2.1.7-8_s390.udeb freetype (2.1.7-8) oldstable-security; urgency=high * debian/patches-freetype/500-CVE-2007-2754_ttgfload.diff: address CVE-2007-2754, a bug allowing execution of arbitrary code via a crafted TTF image by way of an integer overflow. Closes: #425625. oldstable/main/binary-sparc/libfreetype6_2.1.7-8_sparc.deb oldstable/main/binary-sparc/libfreetype6-dev_2.1.7-8_sparc.deb oldstable/main/binary-sparc/freetype2-demos_2.1.7-8_sparc.deb oldstable/main/libfreetype6-udeb_2.1.7-8_sparc.udeb freetype (2.1.7-8) oldstable-security; urgency=high * debian/patches-freetype/500-CVE-2007-2754_ttgfload.diff: address CVE-2007-2754, a bug allowing execution of arbitrary code via a crafted TTF image by way of an integer overflow. Closes: #425625. oldstable/main/binary-arm/gaim-encryption_2.36-3_arm.deb gaim-encryption (2.36-3) unstable; urgency=low * re-compile with new version of Gaim to make the warning go away (while I don't come up with a permanent fix) (closes: #303732) * depend on gaim >= 1.2 (closes: #302838) oldstable/main/binary-alpha/gfax_0.4.2-11sarge1_alpha.deb gfax (0.4.2-11sarge1) oldstable-security; urgency=high * Non-maintainer upload by The Security Team. * Fix the unsafe use of temporary files when manipulating the system crontab. [CVE-2007-2839] oldstable/main/binary-arm/gfax_0.4.2-11sarge1_arm.deb gfax (0.4.2-11sarge1) oldstable-security; urgency=high * Non-maintainer upload by The Security Team. * Fix the unsafe use of temporary files when manipulating the system crontab. [CVE-2007-2839] oldstable/main/binary-hppa/gfax_0.4.2-11sarge1_hppa.deb gfax (0.4.2-11sarge1) oldstable-security; urgency=high * Non-maintainer upload by The Security Team. * Fix the unsafe use of temporary files when manipulating the system crontab. [CVE-2007-2839] oldstable/main/source/gfax_0.4.2-11sarge1.dsc oldstable/main/source/gfax_0.4.2-11sarge1.diff.gz oldstable/main/binary-i386/gfax_0.4.2-11sarge1_i386.deb gfax (0.4.2-11sarge1) oldstable-security; urgency=high * Non-maintainer upload by The Security Team. * Fix the unsafe use of temporary files when manipulating the system crontab. [CVE-2007-2839] oldstable/main/binary-ia64/gfax_0.4.2-11sarge1_ia64.deb gfax (0.4.2-11sarge1) oldstable-security; urgency=high * Non-maintainer upload by The Security Team. * Fix the unsafe use of temporary files when manipulating the system crontab. [CVE-2007-2839] oldstable/main/binary-m68k/gfax_0.4.2-11sarge1_m68k.deb gfax (0.4.2-11sarge1) oldstable-security; urgency=high * Non-maintainer upload by The Security Team. * Fix the unsafe use of temporary files when manipulating the system crontab. [CVE-2007-2839] oldstable/main/binary-mips/gfax_0.4.2-11sarge1_mips.deb gfax (0.4.2-11sarge1) oldstable-security; urgency=high * Non-maintainer upload by The Security Team. * Fix the unsafe use of temporary files when manipulating the system crontab. [CVE-2007-2839] oldstable/main/binary-mipsel/gfax_0.4.2-11sarge1_mipsel.deb gfax (0.4.2-11sarge1) oldstable-security; urgency=high * Non-maintainer upload by The Security Team. * Fix the unsafe use of temporary files when manipulating the system crontab. [CVE-2007-2839] oldstable/main/binary-powerpc/gfax_0.4.2-11sarge1_powerpc.deb gfax (0.4.2-11sarge1) oldstable-security; urgency=high * Non-maintainer upload by The Security Team. * Fix the unsafe use of temporary files when manipulating the system crontab. [CVE-2007-2839] oldstable/main/binary-s390/gfax_0.4.2-11sarge1_s390.deb gfax (0.4.2-11sarge1) oldstable-security; urgency=high * Non-maintainer upload by The Security Team. * Fix the unsafe use of temporary files when manipulating the system crontab. [CVE-2007-2839] oldstable/main/binary-sparc/gfax_0.4.2-11sarge1_sparc.deb gfax (0.4.2-11sarge1) oldstable-security; urgency=high * Non-maintainer upload by The Security Team. * Fix the unsafe use of temporary files when manipulating the system crontab. [CVE-2007-2839] oldstable/main/binary-arm/gff2aplot_2.0-1_arm.deb gff2aplot (2.0-1) unstable; urgency=low * Initial Release (Closes: #300828) oldstable/main/source/gforge_3.1-31sarge2.dsc oldstable/main/source/gforge_3.1-31sarge2.diff.gz oldstable/main/binary-all/gforge_3.1-31sarge2_all.deb oldstable/main/binary-all/gforge-common_3.1-31sarge2_all.deb oldstable/main/binary-all/gforge-web-apache_3.1-31sarge2_all.deb oldstable/main/binary-all/gforge-db-postgresql_3.1-31sarge2_all.deb oldstable/main/binary-all/gforge-mta-exim4_3.1-31sarge2_all.deb oldstable/main/binary-all/gforge-mta-exim_3.1-31sarge2_all.deb oldstable/main/binary-all/gforge-mta-postfix_3.1-31sarge2_all.deb oldstable/main/binary-all/gforge-shell-ldap_3.1-31sarge2_all.deb oldstable/main/binary-all/gforge-cvs_3.1-31sarge2_all.deb oldstable/main/binary-all/gforge-ftp-proftpd_3.1-31sarge2_all.deb oldstable/main/binary-all/gforge-ldap-openldap_3.1-31sarge2_all.deb oldstable/main/binary-all/gforge-dns-bind9_3.1-31sarge2_all.deb oldstable/main/binary-all/gforge-lists-mailman_3.1-31sarge2_all.deb oldstable/main/binary-all/gforge-sourceforge-transition_3.1-31sarge2_all.deb oldstable/main/binary-all/sourceforge_3.1-31sarge2_all.deb gforge (3.1-31sarge2) oldstable-security; urgency=high * Fixed SQL injection vulnerability due to insufficient input sanitizing (CVE-2007-3913). oldstable/main/source/gforge_3.1-31sarge3.dsc oldstable/main/source/gforge_3.1-31sarge3.diff.gz oldstable/main/binary-all/gforge_3.1-31sarge3_all.deb oldstable/main/binary-all/gforge-common_3.1-31sarge3_all.deb oldstable/main/binary-all/gforge-web-apache_3.1-31sarge3_all.deb oldstable/main/binary-all/gforge-db-postgresql_3.1-31sarge3_all.deb oldstable/main/binary-all/gforge-mta-exim4_3.1-31sarge3_all.deb oldstable/main/binary-all/gforge-mta-exim_3.1-31sarge3_all.deb oldstable/main/binary-all/gforge-mta-postfix_3.1-31sarge3_all.deb oldstable/main/binary-all/gforge-shell-ldap_3.1-31sarge3_all.deb oldstable/main/binary-all/gforge-cvs_3.1-31sarge3_all.deb oldstable/main/binary-all/gforge-ftp-proftpd_3.1-31sarge3_all.deb oldstable/main/binary-all/gforge-ldap-openldap_3.1-31sarge3_all.deb oldstable/main/binary-all/gforge-dns-bind9_3.1-31sarge3_all.deb oldstable/main/binary-all/gforge-lists-mailman_3.1-31sarge3_all.deb oldstable/main/binary-all/gforge-sourceforge-transition_3.1-31sarge3_all.deb oldstable/main/binary-all/sourceforge_3.1-31sarge3_all.deb gforge (3.1-31sarge3) oldstable-security; urgency=high * Fixed cross-site scripting vulnerability (CVE-2007-3918). oldstable/main/source/gforge_3.1-31sarge4.dsc oldstable/main/source/gforge_3.1-31sarge4.diff.gz oldstable/main/binary-all/gforge_3.1-31sarge4_all.deb oldstable/main/binary-all/gforge-common_3.1-31sarge4_all.deb oldstable/main/binary-all/gforge-web-apache_3.1-31sarge4_all.deb oldstable/main/binary-all/gforge-db-postgresql_3.1-31sarge4_all.deb oldstable/main/binary-all/gforge-mta-exim4_3.1-31sarge4_all.deb oldstable/main/binary-all/gforge-mta-exim_3.1-31sarge4_all.deb oldstable/main/binary-all/gforge-mta-postfix_3.1-31sarge4_all.deb oldstable/main/binary-all/gforge-shell-ldap_3.1-31sarge4_all.deb oldstable/main/binary-all/gforge-cvs_3.1-31sarge4_all.deb oldstable/main/binary-all/gforge-ftp-proftpd_3.1-31sarge4_all.deb oldstable/main/binary-all/gforge-ldap-openldap_3.1-31sarge4_all.deb oldstable/main/binary-all/gforge-dns-bind9_3.1-31sarge4_all.deb oldstable/main/binary-all/gforge-lists-mailman_3.1-31sarge4_all.deb oldstable/main/binary-all/gforge-sourceforge-transition_3.1-31sarge4_all.deb oldstable/main/binary-all/sourceforge_3.1-31sarge4_all.deb gforge (3.1-31sarge4) oldstable-security; urgency=high * Fixed file truncation vulnerabilities (CVE-2007-3921) (this version of Gforge isn't vulnerable to the denial of service part of that CVE). oldstable/main/binary-alpha/libgimp2.0_2.2.6-1sarge4_alpha.deb oldstable/main/binary-alpha/gimp-helpbrowser_2.2.6-1sarge4_alpha.deb oldstable/main/binary-alpha/gimp-python_2.2.6-1sarge4_alpha.deb oldstable/main/binary-alpha/gimp-svg_2.2.6-1sarge4_alpha.deb oldstable/main/binary-alpha/gimp_2.2.6-1sarge4_alpha.deb oldstable/main/binary-alpha/libgimp2.0-dev_2.2.6-1sarge4_alpha.deb gimp (2.2.6-1sarge4) oldstable-security; urgency=high * Fix regresion in XCF loader oldstable/main/binary-arm/libgimp2.0_2.2.6-1sarge4_arm.deb oldstable/main/binary-arm/gimp-helpbrowser_2.2.6-1sarge4_arm.deb oldstable/main/binary-arm/gimp-python_2.2.6-1sarge4_arm.deb oldstable/main/binary-arm/gimp-svg_2.2.6-1sarge4_arm.deb oldstable/main/binary-arm/gimp_2.2.6-1sarge4_arm.deb oldstable/main/binary-arm/libgimp2.0-dev_2.2.6-1sarge4_arm.deb gimp (2.2.6-1sarge4) oldstable-security; urgency=high * Fix regresion in XCF loader oldstable/main/binary-hppa/libgimp2.0_2.2.6-1sarge4_hppa.deb oldstable/main/binary-hppa/gimp-helpbrowser_2.2.6-1sarge4_hppa.deb oldstable/main/binary-hppa/gimp-python_2.2.6-1sarge4_hppa.deb oldstable/main/binary-hppa/gimp-svg_2.2.6-1sarge4_hppa.deb oldstable/main/binary-hppa/gimp_2.2.6-1sarge4_hppa.deb oldstable/main/binary-hppa/libgimp2.0-dev_2.2.6-1sarge4_hppa.deb gimp (2.2.6-1sarge4) oldstable-security; urgency=high * Fix regresion in XCF loader oldstable/main/source/gimp_2.2.6-1sarge4.dsc oldstable/main/source/gimp_2.2.6-1sarge4.diff.gz oldstable/main/binary-all/gimp-data_2.2.6-1sarge4_all.deb oldstable/main/binary-all/libgimp2.0-doc_2.2.6-1sarge4_all.deb oldstable/main/binary-all/gimp1.2_2.2.6-1sarge4_all.deb oldstable/main/binary-i386/libgimp2.0_2.2.6-1sarge4_i386.deb oldstable/main/binary-i386/gimp-helpbrowser_2.2.6-1sarge4_i386.deb oldstable/main/binary-i386/gimp-python_2.2.6-1sarge4_i386.deb oldstable/main/binary-i386/gimp-svg_2.2.6-1sarge4_i386.deb oldstable/main/binary-i386/gimp_2.2.6-1sarge4_i386.deb oldstable/main/binary-i386/libgimp2.0-dev_2.2.6-1sarge4_i386.deb gimp (2.2.6-1sarge4) oldstable-security; urgency=high * Fix regresion in XCF loader oldstable/main/binary-ia64/libgimp2.0_2.2.6-1sarge4_ia64.deb oldstable/main/binary-ia64/gimp-helpbrowser_2.2.6-1sarge4_ia64.deb oldstable/main/binary-ia64/gimp-python_2.2.6-1sarge4_ia64.deb oldstable/main/binary-ia64/gimp-svg_2.2.6-1sarge4_ia64.deb oldstable/main/binary-ia64/gimp_2.2.6-1sarge4_ia64.deb oldstable/main/binary-ia64/libgimp2.0-dev_2.2.6-1sarge4_ia64.deb gimp (2.2.6-1sarge4) oldstable-security; urgency=high * Fix regresion in XCF loader oldstable/main/binary-m68k/libgimp2.0_2.2.6-1sarge4_m68k.deb oldstable/main/binary-m68k/gimp-helpbrowser_2.2.6-1sarge4_m68k.deb oldstable/main/binary-m68k/gimp-python_2.2.6-1sarge4_m68k.deb oldstable/main/binary-m68k/gimp-svg_2.2.6-1sarge4_m68k.deb oldstable/main/binary-m68k/gimp_2.2.6-1sarge4_m68k.deb oldstable/main/binary-m68k/libgimp2.0-dev_2.2.6-1sarge4_m68k.deb gimp (2.2.6-1sarge4) oldstable-security; urgency=high * Fix regresion in XCF loader oldstable/main/binary-mips/libgimp2.0_2.2.6-1sarge4_mips.deb oldstable/main/binary-mips/gimp-helpbrowser_2.2.6-1sarge4_mips.deb oldstable/main/binary-mips/gimp-python_2.2.6-1sarge4_mips.deb oldstable/main/binary-mips/gimp-svg_2.2.6-1sarge4_mips.deb oldstable/main/binary-mips/gimp_2.2.6-1sarge4_mips.deb oldstable/main/binary-mips/libgimp2.0-dev_2.2.6-1sarge4_mips.deb gimp (2.2.6-1sarge4) oldstable-security; urgency=high * Fix regresion in XCF loader oldstable/main/binary-mipsel/libgimp2.0_2.2.6-1sarge4_mipsel.deb oldstable/main/binary-mipsel/gimp-helpbrowser_2.2.6-1sarge4_mipsel.deb oldstable/main/binary-mipsel/gimp-python_2.2.6-1sarge4_mipsel.deb oldstable/main/binary-mipsel/gimp-svg_2.2.6-1sarge4_mipsel.deb oldstable/main/binary-mipsel/gimp_2.2.6-1sarge4_mipsel.deb oldstable/main/binary-mipsel/libgimp2.0-dev_2.2.6-1sarge4_mipsel.deb gimp (2.2.6-1sarge4) oldstable-security; urgency=high * Fix regresion in XCF loader oldstable/main/binary-powerpc/libgimp2.0_2.2.6-1sarge4_powerpc.deb oldstable/main/binary-powerpc/gimp-helpbrowser_2.2.6-1sarge4_powerpc.deb oldstable/main/binary-powerpc/gimp-python_2.2.6-1sarge4_powerpc.deb oldstable/main/binary-powerpc/gimp-svg_2.2.6-1sarge4_powerpc.deb oldstable/main/binary-powerpc/gimp_2.2.6-1sarge4_powerpc.deb oldstable/main/binary-powerpc/libgimp2.0-dev_2.2.6-1sarge4_powerpc.deb gimp (2.2.6-1sarge4) oldstable-security; urgency=high * Fix regresion in XCF loader oldstable/main/binary-s390/libgimp2.0_2.2.6-1sarge4_s390.deb oldstable/main/binary-s390/gimp-helpbrowser_2.2.6-1sarge4_s390.deb oldstable/main/binary-s390/gimp-python_2.2.6-1sarge4_s390.deb oldstable/main/binary-s390/gimp-svg_2.2.6-1sarge4_s390.deb oldstable/main/binary-s390/gimp_2.2.6-1sarge4_s390.deb oldstable/main/binary-s390/libgimp2.0-dev_2.2.6-1sarge4_s390.deb gimp (2.2.6-1sarge4) oldstable-security; urgency=high * Fix regresion in XCF loader oldstable/main/binary-sparc/libgimp2.0_2.2.6-1sarge4_sparc.deb oldstable/main/binary-sparc/gimp-helpbrowser_2.2.6-1sarge4_sparc.deb oldstable/main/binary-sparc/gimp-python_2.2.6-1sarge4_sparc.deb oldstable/main/binary-sparc/gimp-svg_2.2.6-1sarge4_sparc.deb oldstable/main/binary-sparc/gimp_2.2.6-1sarge4_sparc.deb oldstable/main/binary-sparc/libgimp2.0-dev_2.2.6-1sarge4_sparc.deb gimp (2.2.6-1sarge4) oldstable-security; urgency=high * Fix regresion in XCF loader oldstable/main/binary-arm/libgnuradio-core0-dev_2.4-2_arm.deb oldstable/main/binary-arm/libgnuradio-core0_2.4-2_arm.deb oldstable/main/binary-arm/gnuradio-doc_2.4-2_arm.deb oldstable/main/binary-arm/python-gnuradio_2.4-2_arm.deb gnuradio-core (2.4-2) unstable; urgency=low * Changed Section of libgnuradio-core0-devel from 'devel' to 'libdevel'. oldstable/main/binary-alpha/gpdf_2.8.2-1.2sarge6_alpha.deb gpdf (2.8.2-1.2sarge6) oldstable-security; urgency=high * Fix integer overflow in stream predictor (CVE-2007-3387) oldstable/main/binary-arm/gpdf_2.8.2-1.2sarge6_arm.deb gpdf (2.8.2-1.2sarge6) oldstable-security; urgency=high * Fix integer overflow in stream predictor (CVE-2007-3387) oldstable/main/binary-hppa/gpdf_2.8.2-1.2sarge6_hppa.deb gpdf (2.8.2-1.2sarge6) oldstable-security; urgency=high * Fix integer overflow in stream predictor (CVE-2007-3387) oldstable/main/source/gpdf_2.8.2-1.2sarge6.dsc oldstable/main/source/gpdf_2.8.2-1.2sarge6.diff.gz oldstable/main/binary-i386/gpdf_2.8.2-1.2sarge6_i386.deb gpdf (2.8.2-1.2sarge6) oldstable-security; urgency=high * Fix integer overflow in stream predictor (CVE-2007-3387) oldstable/main/binary-ia64/gpdf_2.8.2-1.2sarge6_ia64.deb gpdf (2.8.2-1.2sarge6) oldstable-security; urgency=high * Fix integer overflow in stream predictor (CVE-2007-3387) oldstable/main/binary-m68k/gpdf_2.8.2-1.2sarge6_m68k.deb gpdf (2.8.2-1.2sarge6) oldstable-security; urgency=high * Fix integer overflow in stream predictor (CVE-2007-3387) oldstable/main/binary-mips/gpdf_2.8.2-1.2sarge6_mips.deb gpdf (2.8.2-1.2sarge6) oldstable-security; urgency=high * Fix integer overflow in stream predictor (CVE-2007-3387) oldstable/main/binary-mipsel/gpdf_2.8.2-1.2sarge6_mipsel.deb gpdf (2.8.2-1.2sarge6) oldstable-security; urgency=high * Fix integer overflow in stream predictor (CVE-2007-3387) oldstable/main/binary-powerpc/gpdf_2.8.2-1.2sarge6_powerpc.deb gpdf (2.8.2-1.2sarge6) oldstable-security; urgency=high * Fix integer overflow in stream predictor (CVE-2007-3387) oldstable/main/binary-s390/gpdf_2.8.2-1.2sarge6_s390.deb gpdf (2.8.2-1.2sarge6) oldstable-security; urgency=high * Fix integer overflow in stream predictor (CVE-2007-3387) oldstable/main/binary-sparc/gpdf_2.8.2-1.2sarge6_sparc.deb gpdf (2.8.2-1.2sarge6) oldstable-security; urgency=high * Fix integer overflow in stream predictor (CVE-2007-3387) oldstable/main/binary-mips/gr-audio-oss_0.5-3_mips.deb gr-audio-oss (0.5-3) unstable; urgency=low * Added Build-Depends on cppunit, fftw3-dev, libboost-dev. (closes: #302217) oldstable/main/source/horde3_3.0.4-4sarge5.dsc oldstable/main/source/horde3_3.0.4-4sarge5.diff.gz oldstable/main/binary-all/horde3_3.0.4-4sarge5_all.deb horde3 (3.0.4-4sarge5) oldstable-security; urgency=high * Fix XSS vulnerability. See CVE-2007-1473 for more information. (Closes: #434045) oldstable/main/source/horde3_3.0.4-4sarge6.dsc oldstable/main/source/horde3_3.0.4-4sarge6.diff.gz oldstable/main/binary-all/horde3_3.0.4-4sarge6_all.deb horde3 (3.0.4-4sarge6) oldstable-security; urgency=high * Non-maintainer upload by the security team. * Argument injection vulnerability in the cleanup cron script in Horde Project Horde and IMP before Horde Application Framework 3.1.4 allows local users to delete arbitrary files and possibly gain privileges via multiple space-delimited pathnames. (CVE-2007-1474) * services/go.php in Horde Application Framework 3.0.0 through 3.0.10 and 3.1.0 through 3.1.1 does not properly restrict its image proxy capability, which allows remote attackers to perform "Web tunneling" attacks and use the server as a proxy via (1) http, (2) https, and (3) ftp URL in the url parameter, which is requested from the server. (CVE-2006-3549) * Multiple cross-site scripting (XSS) vulnerabilities in Horde Application Framework 3.0.0 through 3.0.10 and 3.1.0 through 3.1.1 allow remote attackers to inject arbitrary web script or HTML via a (1) javascript URI or an external (2) http, (3) https, or (4) ftp URI in the url parameter in services/go.php (aka the dereferrer), (5) a javascript URI in the module parameter in services/help (aka the help viewer), and (6) the name parameter in services/problem.php (aka the problem reporting screen). (CVE-2006-3548) * index.php in Horde Application Framework before 3.1.2 allows remote attackers to include web pages from other sites, which could be useful for phishing attacks, via a URL in the url parameter, aka "cross-site referencing." NOTE: some sources have referred to this issue as XSS, but it is different than classic XSS. (CVE-2006-4256) * Closes: 383416, 378281 oldstable/main/source/hostap-modules-i386_0.3.7-1sarge2.dsc oldstable/main/source/hostap-modules-i386_0.3.7-1sarge2.tar.gz oldstable/main/binary-i386/hostap-modules-2.4.27-3-386_0.3.7-1sarge2_i386.deb oldstable/main/binary-i386/hostap-modules-2.4.27-3-586tsc_0.3.7-1sarge2_i386.deb oldstable/main/binary-i386/hostap-modules-2.4.27-3-686_0.3.7-1sarge2_i386.deb oldstable/main/binary-i386/hostap-modules-2.4.27-3-686-smp_0.3.7-1sarge2_i386.deb oldstable/main/binary-i386/hostap-modules-2.4.27-3-k6_0.3.7-1sarge2_i386.deb oldstable/main/binary-i386/hostap-modules-2.4.27-3-k7_0.3.7-1sarge2_i386.deb oldstable/main/binary-i386/hostap-modules-2.4.27-3-k7-smp_0.3.7-1sarge2_i386.deb oldstable/main/binary-i386/hostap-modules-2.6.8-4-386_0.3.7-1sarge2_i386.deb oldstable/main/binary-i386/hostap-modules-2.6.8-4-686_0.3.7-1sarge2_i386.deb oldstable/main/binary-i386/hostap-modules-2.6.8-4-686-smp_0.3.7-1sarge2_i386.deb oldstable/main/binary-i386/hostap-modules-2.6.8-4-k7_0.3.7-1sarge2_i386.deb oldstable/main/binary-i386/hostap-modules-2.6.8-4-k7-smp_0.3.7-1sarge2_i386.deb hostap-modules-i386 (1:0.3.7-1sarge2) oldstable-security; urgency=high * Rebuild for 2.6.8-4 ABI oldstable/main/binary-alpha/libid3-3.8.3-dev_3.8.3-4.1sarge1_alpha.deb oldstable/main/binary-alpha/libid3-3.8.3_3.8.3-4.1sarge1_alpha.deb id3lib3.8.3 (3.8.3-4.1sarge1) oldstable-security; urgency=high * Create temp files securely oldstable/main/binary-amd64/libid3-3.8.3-dev_3.8.3-4.1sarge1_amd64.deb oldstable/main/binary-amd64/libid3-3.8.3_3.8.3-4.1sarge1_amd64.deb id3lib3.8.3 (3.8.3-4.1sarge1) oldstable-security; urgency=high * Create temp files securely oldstable/main/binary-arm/libid3-3.8.3-dev_3.8.3-4.1sarge1_arm.deb oldstable/main/binary-arm/libid3-3.8.3_3.8.3-4.1sarge1_arm.deb id3lib3.8.3 (3.8.3-4.1sarge1) oldstable-security; urgency=high * Create temp files securely oldstable/main/binary-hppa/libid3-3.8.3-dev_3.8.3-4.1sarge1_hppa.deb oldstable/main/binary-hppa/libid3-3.8.3_3.8.3-4.1sarge1_hppa.deb id3lib3.8.3 (3.8.3-4.1sarge1) oldstable-security; urgency=high * Create temp files securely oldstable/main/source/id3lib3.8.3_3.8.3-4.1sarge1.dsc oldstable/main/source/id3lib3.8.3_3.8.3.orig.tar.gz oldstable/main/source/id3lib3.8.3_3.8.3-4.1sarge1.diff.gz oldstable/main/binary-i386/libid3-3.8.3-dev_3.8.3-4.1sarge1_i386.deb oldstable/main/binary-i386/libid3-3.8.3_3.8.3-4.1sarge1_i386.deb id3lib3.8.3 (3.8.3-4.1sarge1) oldstable-security; urgency=high * Create temp files securely oldstable/main/binary-ia64/libid3-3.8.3-dev_3.8.3-4.1sarge1_ia64.deb oldstable/main/binary-ia64/libid3-3.8.3_3.8.3-4.1sarge1_ia64.deb id3lib3.8.3 (3.8.3-4.1sarge1) oldstable-security; urgency=high * Create temp files securely oldstable/main/binary-m68k/libid3-3.8.3-dev_3.8.3-4.1sarge1_m68k.deb oldstable/main/binary-m68k/libid3-3.8.3_3.8.3-4.1sarge1_m68k.deb id3lib3.8.3 (3.8.3-4.1sarge1) oldstable-security; urgency=high * Create temp files securely oldstable/main/binary-mips/libid3-3.8.3-dev_3.8.3-4.1sarge1_mips.deb oldstable/main/binary-mips/libid3-3.8.3_3.8.3-4.1sarge1_mips.deb id3lib3.8.3 (3.8.3-4.1sarge1) oldstable-security; urgency=high * Create temp files securely oldstable/main/binary-mipsel/libid3-3.8.3-dev_3.8.3-4.1sarge1_mipsel.deb oldstable/main/binary-mipsel/libid3-3.8.3_3.8.3-4.1sarge1_mipsel.deb id3lib3.8.3 (3.8.3-4.1sarge1) oldstable-security; urgency=high * Create temp files securely oldstable/main/binary-powerpc/libid3-3.8.3-dev_3.8.3-4.1sarge1_powerpc.deb oldstable/main/binary-powerpc/libid3-3.8.3_3.8.3-4.1sarge1_powerpc.deb id3lib3.8.3 (3.8.3-4.1sarge1) oldstable-security; urgency=high * Create temp files securely oldstable/main/binary-s390/libid3-3.8.3-dev_3.8.3-4.1sarge1_s390.deb oldstable/main/binary-s390/libid3-3.8.3_3.8.3-4.1sarge1_s390.deb id3lib3.8.3 (3.8.3-4.1sarge1) oldstable-security; urgency=high * Create temp files securely oldstable/main/binary-sparc/libid3-3.8.3-dev_3.8.3-4.1sarge1_sparc.deb oldstable/main/binary-sparc/libid3-3.8.3_3.8.3-4.1sarge1_sparc.deb id3lib3.8.3 (3.8.3-4.1sarge1) oldstable-security; urgency=high * Create temp files securely oldstable/main/binary-arm/iroffer_1.4.b02-1_arm.deb iroffer (1.4.b02-1) unstable; urgency=low * New upstream release (Closes: #291941) * Created debian/watch file. oldstable/main/binary-hppa/iroffer_1.4.b02-1_hppa.deb iroffer (1.4.b02-1) unstable; urgency=low * New upstream release (Closes: #291941) * Created debian/watch file. oldstable/main/binary-ia64/iroffer_1.4.b02-1_ia64.deb iroffer (1.4.b02-1) unstable; urgency=low * New upstream release (Closes: #291941) * Created debian/watch file. oldstable/main/binary-m68k/iroffer_1.4.b02-1_m68k.deb iroffer (1.4.b02-1) unstable; urgency=low * New upstream release (Closes: #291941) * Created debian/watch file. oldstable/main/binary-mips/iroffer_1.4.b02-1_mips.deb iroffer (1.4.b02-1) unstable; urgency=low * New upstream release (Closes: #291941) * Created debian/watch file. oldstable/main/binary-mipsel/iroffer_1.4.b02-1_mipsel.deb iroffer (1.4.b02-1) unstable; urgency=low * New upstream release (Closes: #291941) * Created debian/watch file. oldstable/main/binary-s390/iroffer_1.4.b02-1_s390.deb iroffer (1.4.b02-1) unstable; urgency=low * New upstream release (Closes: #291941) * Created debian/watch file. oldstable/main/source/iso-scan_1.04sarge1.dsc oldstable/main/source/iso-scan_1.04sarge1.tar.gz oldstable/main/iso-scan_1.04sarge1_all.udeb oldstable/main/load-iso_1.04sarge1_all.udeb iso-scan (1.04sarge1) oldstable; urgency=low * Matt Kraai - Fix the spelling of "file system". * Frans Pop - Add support for installing oldstable (checking for oldstable in the postinst should not be necessary). - Update translations with thanks to translators. oldstable/main/binary-powerpc/joystick_20010903-2_powerpc.deb joystick (20010903-2) unstable; urgency=low * debian/control: updated Standards-Version. * debian/control: added version number to debhelper Build-Depends. * debian/copyright: improved with more text from the GPL and a description of changes to the package. * debian/template: German translation from Sebastian Feltel <sebastian@feltel.de>. (Closes: Bug#119939) oldstable/main/binary-arm/k3d_0.4.3.0-3_arm.deb oldstable/main/binary-arm/k3d-dev_0.4.3.0-3_arm.deb k3d (0.4.3.0-3) unstable; urgency=low * _Really_ apply patch from #274172 (closes: #274172). Sorry. :-( oldstable/main/binary-alpha/kamera_3.3.2-2sarge5_alpha.deb oldstable/main/binary-alpha/kcoloredit_3.3.2-2sarge5_alpha.deb oldstable/main/binary-alpha/kdegraphics-dev_3.3.2-2sarge5_alpha.deb oldstable/main/binary-alpha/kdegraphics-kfile-plugins_3.3.2-2sarge5_alpha.deb oldstable/main/binary-alpha/kdvi_3.3.2-2sarge5_alpha.deb oldstable/main/binary-alpha/kfax_3.3.2-2sarge5_alpha.deb oldstable/main/binary-alpha/kgamma_3.3.2-2sarge5_alpha.deb oldstable/main/binary-alpha/kghostview_3.3.2-2sarge5_alpha.deb oldstable/main/binary-alpha/kiconedit_3.3.2-2sarge5_alpha.deb oldstable/main/binary-alpha/kmrml_3.3.2-2sarge5_alpha.deb oldstable/main/binary-alpha/kolourpaint_3.3.2-2sarge5_alpha.deb oldstable/main/binary-alpha/kooka_3.3.2-2sarge5_alpha.deb oldstable/main/binary-alpha/kpdf_3.3.2-2sarge5_alpha.deb oldstable/main/binary-alpha/kpovmodeler_3.3.2-2sarge5_alpha.deb oldstable/main/binary-alpha/kruler_3.3.2-2sarge5_alpha.deb oldstable/main/binary-alpha/ksnapshot_3.3.2-2sarge5_alpha.deb oldstable/main/binary-alpha/ksvg_3.3.2-2sarge5_alpha.deb oldstable/main/binary-alpha/kuickshow_3.3.2-2sarge5_alpha.deb oldstable/main/binary-alpha/kview_3.3.2-2sarge5_alpha.deb oldstable/main/binary-alpha/kviewshell_3.3.2-2sarge5_alpha.deb oldstable/main/binary-alpha/libkscan-dev_3.3.2-2sarge5_alpha.deb oldstable/main/binary-alpha/libkscan1_3.3.2-2sarge5_alpha.deb kdegraphics (4:3.3.2-2sarge5) oldstable-security; urgency=high * Fix integer overflow in stream predictor (CVE-2007-3387). oldstable/main/binary-arm/kamera_3.3.2-2sarge5_arm.deb oldstable/main/binary-arm/kcoloredit_3.3.2-2sarge5_arm.deb oldstable/main/binary-arm/kdegraphics-dev_3.3.2-2sarge5_arm.deb oldstable/main/binary-arm/kdegraphics-kfile-plugins_3.3.2-2sarge5_arm.deb oldstable/main/binary-arm/kdvi_3.3.2-2sarge5_arm.deb oldstable/main/binary-arm/kfax_3.3.2-2sarge5_arm.deb oldstable/main/binary-arm/kgamma_3.3.2-2sarge5_arm.deb oldstable/main/binary-arm/kghostview_3.3.2-2sarge5_arm.deb oldstable/main/binary-arm/kiconedit_3.3.2-2sarge5_arm.deb oldstable/main/binary-arm/kmrml_3.3.2-2sarge5_arm.deb oldstable/main/binary-arm/kolourpaint_3.3.2-2sarge5_arm.deb oldstable/main/binary-arm/kooka_3.3.2-2sarge5_arm.deb oldstable/main/binary-arm/kpdf_3.3.2-2sarge5_arm.deb oldstable/main/binary-arm/kpovmodeler_3.3.2-2sarge5_arm.deb oldstable/main/binary-arm/kruler_3.3.2-2sarge5_arm.deb oldstable/main/binary-arm/ksnapshot_3.3.2-2sarge5_arm.deb oldstable/main/binary-arm/ksvg_3.3.2-2sarge5_arm.deb oldstable/main/binary-arm/kuickshow_3.3.2-2sarge5_arm.deb oldstable/main/binary-arm/kview_3.3.2-2sarge5_arm.deb oldstable/main/binary-arm/kviewshell_3.3.2-2sarge5_arm.deb oldstable/main/binary-arm/libkscan-dev_3.3.2-2sarge5_arm.deb oldstable/main/binary-arm/libkscan1_3.3.2-2sarge5_arm.deb kdegraphics (4:3.3.2-2sarge5) oldstable-security; urgency=high * Fix integer overflow in stream predictor (CVE-2007-3387). oldstable/main/binary-hppa/kamera_3.3.2-2sarge5_hppa.deb oldstable/main/binary-hppa/kcoloredit_3.3.2-2sarge5_hppa.deb oldstable/main/binary-hppa/kdegraphics-dev_3.3.2-2sarge5_hppa.deb oldstable/main/binary-hppa/kdegraphics-kfile-plugins_3.3.2-2sarge5_hppa.deb oldstable/main/binary-hppa/kdvi_3.3.2-2sarge5_hppa.deb oldstable/main/binary-hppa/kfax_3.3.2-2sarge5_hppa.deb oldstable/main/binary-hppa/kgamma_3.3.2-2sarge5_hppa.deb oldstable/main/binary-hppa/kghostview_3.3.2-2sarge5_hppa.deb oldstable/main/binary-hppa/kiconedit_3.3.2-2sarge5_hppa.deb oldstable/main/binary-hppa/kmrml_3.3.2-2sarge5_hppa.deb oldstable/main/binary-hppa/kolourpaint_3.3.2-2sarge5_hppa.deb oldstable/main/binary-hppa/kooka_3.3.2-2sarge5_hppa.deb oldstable/main/binary-hppa/kpdf_3.3.2-2sarge5_hppa.deb oldstable/main/binary-hppa/kpovmodeler_3.3.2-2sarge5_hppa.deb oldstable/main/binary-hppa/kruler_3.3.2-2sarge5_hppa.deb oldstable/main/binary-hppa/ksnapshot_3.3.2-2sarge5_hppa.deb oldstable/main/binary-hppa/ksvg_3.3.2-2sarge5_hppa.deb oldstable/main/binary-hppa/kuickshow_3.3.2-2sarge5_hppa.deb oldstable/main/binary-hppa/kview_3.3.2-2sarge5_hppa.deb oldstable/main/binary-hppa/kviewshell_3.3.2-2sarge5_hppa.deb oldstable/main/binary-hppa/libkscan-dev_3.3.2-2sarge5_hppa.deb oldstable/main/binary-hppa/libkscan1_3.3.2-2sarge5_hppa.deb kdegraphics (4:3.3.2-2sarge5) oldstable-security; urgency=high * Fix integer overflow in stream predictor (CVE-2007-3387). oldstable/main/source/kdegraphics_3.3.2-2sarge5.dsc oldstable/main/source/kdegraphics_3.3.2-2sarge5.diff.gz oldstable/main/binary-i386/kamera_3.3.2-2sarge5_i386.deb oldstable/main/binary-i386/kcoloredit_3.3.2-2sarge5_i386.deb oldstable/main/binary-i386/kdegraphics-dev_3.3.2-2sarge5_i386.deb oldstable/main/binary-i386/kdegraphics-kfile-plugins_3.3.2-2sarge5_i386.deb oldstable/main/binary-i386/kdvi_3.3.2-2sarge5_i386.deb oldstable/main/binary-i386/kfax_3.3.2-2sarge5_i386.deb oldstable/main/binary-i386/kgamma_3.3.2-2sarge5_i386.deb oldstable/main/binary-i386/kghostview_3.3.2-2sarge5_i386.deb oldstable/main/binary-i386/kiconedit_3.3.2-2sarge5_i386.deb oldstable/main/binary-i386/kmrml_3.3.2-2sarge5_i386.deb oldstable/main/binary-i386/kolourpaint_3.3.2-2sarge5_i386.deb oldstable/main/binary-i386/kooka_3.3.2-2sarge5_i386.deb oldstable/main/binary-i386/kpdf_3.3.2-2sarge5_i386.deb oldstable/main/binary-i386/kpovmodeler_3.3.2-2sarge5_i386.deb oldstable/main/binary-i386/kruler_3.3.2-2sarge5_i386.deb oldstable/main/binary-i386/ksnapshot_3.3.2-2sarge5_i386.deb oldstable/main/binary-i386/ksvg_3.3.2-2sarge5_i386.deb oldstable/main/binary-i386/kuickshow_3.3.2-2sarge5_i386.deb oldstable/main/binary-i386/kview_3.3.2-2sarge5_i386.deb oldstable/main/binary-i386/kviewshell_3.3.2-2sarge5_i386.deb oldstable/main/binary-i386/libkscan-dev_3.3.2-2sarge5_i386.deb oldstable/main/binary-i386/libkscan1_3.3.2-2sarge5_i386.deb oldstable/main/binary-all/kdegraphics_3.3.2-2sarge5_all.deb kdegraphics (4:3.3.2-2sarge5) oldstable-security; urgency=high * Fix integer overflow in stream predictor (CVE-2007-3387). oldstable/main/binary-ia64/kamera_3.3.2-2sarge5_ia64.deb oldstable/main/binary-ia64/kcoloredit_3.3.2-2sarge5_ia64.deb oldstable/main/binary-ia64/kdegraphics-dev_3.3.2-2sarge5_ia64.deb oldstable/main/binary-ia64/kdegraphics-kfile-plugins_3.3.2-2sarge5_ia64.deb oldstable/main/binary-ia64/kdvi_3.3.2-2sarge5_ia64.deb oldstable/main/binary-ia64/kfax_3.3.2-2sarge5_ia64.deb oldstable/main/binary-ia64/kgamma_3.3.2-2sarge5_ia64.deb oldstable/main/binary-ia64/kghostview_3.3.2-2sarge5_ia64.deb oldstable/main/binary-ia64/kiconedit_3.3.2-2sarge5_ia64.deb oldstable/main/binary-ia64/kmrml_3.3.2-2sarge5_ia64.deb oldstable/main/binary-ia64/kolourpaint_3.3.2-2sarge5_ia64.deb oldstable/main/binary-ia64/kooka_3.3.2-2sarge5_ia64.deb oldstable/main/binary-ia64/kpdf_3.3.2-2sarge5_ia64.deb oldstable/main/binary-ia64/kpovmodeler_3.3.2-2sarge5_ia64.deb oldstable/main/binary-ia64/kruler_3.3.2-2sarge5_ia64.deb oldstable/main/binary-ia64/ksnapshot_3.3.2-2sarge5_ia64.deb oldstable/main/binary-ia64/ksvg_3.3.2-2sarge5_ia64.deb oldstable/main/binary-ia64/kuickshow_3.3.2-2sarge5_ia64.deb oldstable/main/binary-ia64/kview_3.3.2-2sarge5_ia64.deb oldstable/main/binary-ia64/kviewshell_3.3.2-2sarge5_ia64.deb oldstable/main/binary-ia64/libkscan-dev_3.3.2-2sarge5_ia64.deb oldstable/main/binary-ia64/libkscan1_3.3.2-2sarge5_ia64.deb kdegraphics (4:3.3.2-2sarge5) oldstable-security; urgency=high * Fix integer overflow in stream predictor (CVE-2007-3387). oldstable/main/binary-m68k/kamera_3.3.2-2sarge5_m68k.deb oldstable/main/binary-m68k/kcoloredit_3.3.2-2sarge5_m68k.deb oldstable/main/binary-m68k/kdegraphics-dev_3.3.2-2sarge5_m68k.deb oldstable/main/binary-m68k/kdegraphics-kfile-plugins_3.3.2-2sarge5_m68k.deb oldstable/main/binary-m68k/kdvi_3.3.2-2sarge5_m68k.deb oldstable/main/binary-m68k/kfax_3.3.2-2sarge5_m68k.deb oldstable/main/binary-m68k/kgamma_3.3.2-2sarge5_m68k.deb oldstable/main/binary-m68k/kghostview_3.3.2-2sarge5_m68k.deb oldstable/main/binary-m68k/kiconedit_3.3.2-2sarge5_m68k.deb oldstable/main/binary-m68k/kmrml_3.3.2-2sarge5_m68k.deb oldstable/main/binary-m68k/kolourpaint_3.3.2-2sarge5_m68k.deb oldstable/main/binary-m68k/kooka_3.3.2-2sarge5_m68k.deb oldstable/main/binary-m68k/kpdf_3.3.2-2sarge5_m68k.deb oldstable/main/binary-m68k/kpovmodeler_3.3.2-2sarge5_m68k.deb oldstable/main/binary-m68k/kruler_3.3.2-2sarge5_m68k.deb oldstable/main/binary-m68k/ksnapshot_3.3.2-2sarge5_m68k.deb oldstable/main/binary-m68k/ksvg_3.3.2-2sarge5_m68k.deb oldstable/main/binary-m68k/kuickshow_3.3.2-2sarge5_m68k.deb oldstable/main/binary-m68k/kview_3.3.2-2sarge5_m68k.deb oldstable/main/binary-m68k/kviewshell_3.3.2-2sarge5_m68k.deb oldstable/main/binary-m68k/libkscan-dev_3.3.2-2sarge5_m68k.deb oldstable/main/binary-m68k/libkscan1_3.3.2-2sarge5_m68k.deb kdegraphics (4:3.3.2-2sarge5) oldstable-security; urgency=high * Fix integer overflow in stream predictor (CVE-2007-3387). oldstable/main/binary-mips/kamera_3.3.2-2sarge5_mips.deb oldstable/main/binary-mips/kcoloredit_3.3.2-2sarge5_mips.deb oldstable/main/binary-mips/kdegraphics-dev_3.3.2-2sarge5_mips.deb oldstable/main/binary-mips/kdegraphics-kfile-plugins_3.3.2-2sarge5_mips.deb oldstable/main/binary-mips/kdvi_3.3.2-2sarge5_mips.deb oldstable/main/binary-mips/kfax_3.3.2-2sarge5_mips.deb oldstable/main/binary-mips/kgamma_3.3.2-2sarge5_mips.deb oldstable/main/binary-mips/kghostview_3.3.2-2sarge5_mips.deb oldstable/main/binary-mips/kiconedit_3.3.2-2sarge5_mips.deb oldstable/main/binary-mips/kmrml_3.3.2-2sarge5_mips.deb oldstable/main/binary-mips/kolourpaint_3.3.2-2sarge5_mips.deb oldstable/main/binary-mips/kooka_3.3.2-2sarge5_mips.deb oldstable/main/binary-mips/kpdf_3.3.2-2sarge5_mips.deb oldstable/main/binary-mips/kpovmodeler_3.3.2-2sarge5_mips.deb oldstable/main/binary-mips/kruler_3.3.2-2sarge5_mips.deb oldstable/main/binary-mips/ksnapshot_3.3.2-2sarge5_mips.deb oldstable/main/binary-mips/ksvg_3.3.2-2sarge5_mips.deb oldstable/main/binary-mips/kuickshow_3.3.2-2sarge5_mips.deb oldstable/main/binary-mips/kview_3.3.2-2sarge5_mips.deb oldstable/main/binary-mips/kviewshell_3.3.2-2sarge5_mips.deb oldstable/main/binary-mips/libkscan-dev_3.3.2-2sarge5_mips.deb oldstable/main/binary-mips/libkscan1_3.3.2-2sarge5_mips.deb kdegraphics (4:3.3.2-2sarge5) oldstable-security; urgency=high * Fix integer overflow in stream predictor (CVE-2007-3387). oldstable/main/binary-mipsel/kamera_3.3.2-2sarge5_mipsel.deb oldstable/main/binary-mipsel/kcoloredit_3.3.2-2sarge5_mipsel.deb oldstable/main/binary-mipsel/kdegraphics-dev_3.3.2-2sarge5_mipsel.deb oldstable/main/binary-mipsel/kdegraphics-kfile-plugins_3.3.2-2sarge5_mipsel.deb oldstable/main/binary-mipsel/kdvi_3.3.2-2sarge5_mipsel.deb oldstable/main/binary-mipsel/kfax_3.3.2-2sarge5_mipsel.deb oldstable/main/binary-mipsel/kgamma_3.3.2-2sarge5_mipsel.deb oldstable/main/binary-mipsel/kghostview_3.3.2-2sarge5_mipsel.deb oldstable/main/binary-mipsel/kiconedit_3.3.2-2sarge5_mipsel.deb oldstable/main/binary-mipsel/kmrml_3.3.2-2sarge5_mipsel.deb oldstable/main/binary-mipsel/kolourpaint_3.3.2-2sarge5_mipsel.deb oldstable/main/binary-mipsel/kooka_3.3.2-2sarge5_mipsel.deb oldstable/main/binary-mipsel/kpdf_3.3.2-2sarge5_mipsel.deb oldstable/main/binary-mipsel/kpovmodeler_3.3.2-2sarge5_mipsel.deb oldstable/main/binary-mipsel/kruler_3.3.2-2sarge5_mipsel.deb oldstable/main/binary-mipsel/ksnapshot_3.3.2-2sarge5_mipsel.deb oldstable/main/binary-mipsel/ksvg_3.3.2-2sarge5_mipsel.deb oldstable/main/binary-mipsel/kuickshow_3.3.2-2sarge5_mipsel.deb oldstable/main/binary-mipsel/kview_3.3.2-2sarge5_mipsel.deb oldstable/main/binary-mipsel/kviewshell_3.3.2-2sarge5_mipsel.deb oldstable/main/binary-mipsel/libkscan-dev_3.3.2-2sarge5_mipsel.deb oldstable/main/binary-mipsel/libkscan1_3.3.2-2sarge5_mipsel.deb kdegraphics (4:3.3.2-2sarge5) oldstable-security; urgency=high * Fix integer overflow in stream predictor (CVE-2007-3387). oldstable/main/binary-powerpc/kamera_3.3.2-2sarge5_powerpc.deb oldstable/main/binary-powerpc/kcoloredit_3.3.2-2sarge5_powerpc.deb oldstable/main/binary-powerpc/kdegraphics-dev_3.3.2-2sarge5_powerpc.deb oldstable/main/binary-powerpc/kdegraphics-kfile-plugins_3.3.2-2sarge5_powerpc.deb oldstable/main/binary-powerpc/kdvi_3.3.2-2sarge5_powerpc.deb oldstable/main/binary-powerpc/kfax_3.3.2-2sarge5_powerpc.deb oldstable/main/binary-powerpc/kgamma_3.3.2-2sarge5_powerpc.deb oldstable/main/binary-powerpc/kghostview_3.3.2-2sarge5_powerpc.deb oldstable/main/binary-powerpc/kiconedit_3.3.2-2sarge5_powerpc.deb oldstable/main/binary-powerpc/kmrml_3.3.2-2sarge5_powerpc.deb oldstable/main/binary-powerpc/kolourpaint_3.3.2-2sarge5_powerpc.deb oldstable/main/binary-powerpc/kooka_3.3.2-2sarge5_powerpc.deb oldstable/main/binary-powerpc/kpdf_3.3.2-2sarge5_powerpc.deb oldstable/main/binary-powerpc/kpovmodeler_3.3.2-2sarge5_powerpc.deb oldstable/main/binary-powerpc/kruler_3.3.2-2sarge5_powerpc.deb oldstable/main/binary-powerpc/ksnapshot_3.3.2-2sarge5_powerpc.deb oldstable/main/binary-powerpc/ksvg_3.3.2-2sarge5_powerpc.deb oldstable/main/binary-powerpc/kuickshow_3.3.2-2sarge5_powerpc.deb oldstable/main/binary-powerpc/kview_3.3.2-2sarge5_powerpc.deb oldstable/main/binary-powerpc/kviewshell_3.3.2-2sarge5_powerpc.deb oldstable/main/binary-powerpc/libkscan-dev_3.3.2-2sarge5_powerpc.deb oldstable/main/binary-powerpc/libkscan1_3.3.2-2sarge5_powerpc.deb kdegraphics (4:3.3.2-2sarge5) oldstable-security; urgency=high * Fix integer overflow in stream predictor (CVE-2007-3387). oldstable/main/binary-s390/kamera_3.3.2-2sarge5_s390.deb oldstable/main/binary-s390/kcoloredit_3.3.2-2sarge5_s390.deb oldstable/main/binary-s390/kdegraphics-dev_3.3.2-2sarge5_s390.deb oldstable/main/binary-s390/kdegraphics-kfile-plugins_3.3.2-2sarge5_s390.deb oldstable/main/binary-s390/kdvi_3.3.2-2sarge5_s390.deb oldstable/main/binary-s390/kfax_3.3.2-2sarge5_s390.deb oldstable/main/binary-s390/kgamma_3.3.2-2sarge5_s390.deb oldstable/main/binary-s390/kghostview_3.3.2-2sarge5_s390.deb oldstable/main/binary-s390/kiconedit_3.3.2-2sarge5_s390.deb oldstable/main/binary-s390/kmrml_3.3.2-2sarge5_s390.deb oldstable/main/binary-s390/kolourpaint_3.3.2-2sarge5_s390.deb oldstable/main/binary-s390/kooka_3.3.2-2sarge5_s390.deb oldstable/main/binary-s390/kpdf_3.3.2-2sarge5_s390.deb oldstable/main/binary-s390/kpovmodeler_3.3.2-2sarge5_s390.deb oldstable/main/binary-s390/kruler_3.3.2-2sarge5_s390.deb oldstable/main/binary-s390/ksnapshot_3.3.2-2sarge5_s390.deb oldstable/main/binary-s390/ksvg_3.3.2-2sarge5_s390.deb oldstable/main/binary-s390/kuickshow_3.3.2-2sarge5_s390.deb oldstable/main/binary-s390/kview_3.3.2-2sarge5_s390.deb oldstable/main/binary-s390/kviewshell_3.3.2-2sarge5_s390.deb oldstable/main/binary-s390/libkscan-dev_3.3.2-2sarge5_s390.deb oldstable/main/binary-s390/libkscan1_3.3.2-2sarge5_s390.deb kdegraphics (4:3.3.2-2sarge5) oldstable-security; urgency=high * Fix integer overflow in stream predictor (CVE-2007-3387). oldstable/main/binary-sparc/kamera_3.3.2-2sarge5_sparc.deb oldstable/main/binary-sparc/kcoloredit_3.3.2-2sarge5_sparc.deb oldstable/main/binary-sparc/kdegraphics-dev_3.3.2-2sarge5_sparc.deb oldstable/main/binary-sparc/kdegraphics-kfile-plugins_3.3.2-2sarge5_sparc.deb oldstable/main/binary-sparc/kdvi_3.3.2-2sarge5_sparc.deb oldstable/main/binary-sparc/kfax_3.3.2-2sarge5_sparc.deb oldstable/main/binary-sparc/kgamma_3.3.2-2sarge5_sparc.deb oldstable/main/binary-sparc/kghostview_3.3.2-2sarge5_sparc.deb oldstable/main/binary-sparc/kiconedit_3.3.2-2sarge5_sparc.deb oldstable/main/binary-sparc/kmrml_3.3.2-2sarge5_sparc.deb oldstable/main/binary-sparc/kolourpaint_3.3.2-2sarge5_sparc.deb oldstable/main/binary-sparc/kooka_3.3.2-2sarge5_sparc.deb oldstable/main/binary-sparc/kpdf_3.3.2-2sarge5_sparc.deb oldstable/main/binary-sparc/kpovmodeler_3.3.2-2sarge5_sparc.deb oldstable/main/binary-sparc/kruler_3.3.2-2sarge5_sparc.deb oldstable/main/binary-sparc/ksnapshot_3.3.2-2sarge5_sparc.deb oldstable/main/binary-sparc/ksvg_3.3.2-2sarge5_sparc.deb oldstable/main/binary-sparc/kuickshow_3.3.2-2sarge5_sparc.deb oldstable/main/binary-sparc/kview_3.3.2-2sarge5_sparc.deb oldstable/main/binary-sparc/kviewshell_3.3.2-2sarge5_sparc.deb oldstable/main/binary-sparc/libkscan-dev_3.3.2-2sarge5_sparc.deb oldstable/main/binary-sparc/libkscan1_3.3.2-2sarge5_sparc.deb kdegraphics (4:3.3.2-2sarge5) oldstable-security; urgency=high * Fix integer overflow in stream predictor (CVE-2007-3387). oldstable/main/binary-arm/kdissert_0.3.8-1_arm.deb kdissert (0.3.8-1) unstable; urgency=low * New upstream release * Converted to CDBS * Do not compress .docbook files (closes: #302109) oldstable/main/source/kernel-image-2.6.8-alpha_2.6.8-17.dsc oldstable/main/source/kernel-image-2.6.8-alpha_2.6.8-17.tar.gz oldstable/main/binary-alpha/kernel-headers-2.6.8-4_2.6.8-17_alpha.deb oldstable/main/binary-alpha/kernel-headers-2.6.8-4-smp_2.6.8-17_alpha.deb oldstable/main/binary-alpha/kernel-image-2.6.8-4-smp_2.6.8-17_alpha.deb oldstable/main/binary-alpha/kernel-headers-2.6.8-4-generic_2.6.8-17_alpha.deb oldstable/main/binary-alpha/kernel-image-2.6.8-4-generic_2.6.8-17_alpha.deb kernel-image-2.6.8-alpha (2.6.8-17) oldstable; urgency=high * Rebuild against kernel-tree-2.6.8-17 [ Simon Horman ] * drivers-net-via-rhine-wol-oops.dpatch (removed): This patch breaks the via-rhine driver and 2.6.8 and is completely bogus for this version of the kernel (closes: #311357) * drivers-media-vidio-bttv-vc100xp-detect.dpatch Allow Leadtek WinFast VC100 XP cards to work. * fs-jbd-checkpoint-assertion.dpatch Fix possible false assertion failure in log_do_checkpoint(). We might fail to detect that we actually made a progress when cleaning up the checkpoint lists if we don't retry after writing something to disk. * mm-rmap-out-of-bounds-pte.dpatch Stop try_to_unmap_cluster() passing out-of-bounds pte to pte_unmap() * net-ipv4-netfilter-ip_queue-deadlock.dpatch Fix deadlock with ip_queue and tcp local input path. * asm-i386-mem-clobber.dpatch: Make sure gcc doesn't reorder memory accesses in strncmp and friends on i386. * drivers-acpi-pci_irq-elcr.dpatch: Make sure we call acpi_register_gsi() even for default PCI interrupt assignment. That's the part that keeps track of the ELCR register, and we want to make sure that the PCI interrupts are properly marked level/low. [ dann frazier ] * Merge in applicable fixes from 2.6.12.4 - netfilter-deadlock-ip6_queue.dpatch - rocket_c-fix-ldisc-ref-count.dpatch - early-vlan-fix.dpatch [ Simon Horman ] * drivers-sata-promise-sataii_tx2_tx4.dpatch Add SATAII TX2 and TX2/TX4 support to sata promise driver (Closes: #317286) * module-per-cpu-alignment-fix.dpatch Module per-cpu alignment cannot always be met From 2.6.12.5 * genelink-usbnet-skb-typo.dpatch fix gl_skb/skb type error in genelink driver in usbnet Backported From 2.6.12.6 * drivers-ide-ppp-pmac-build.dpatch Make sure BLK_DEV_IDEDMA_PCI is defined for pmac ide driver builds (closes: #321442) * fs-ext3-nfs-parent-fix.dpatch ext3 file systems mounted over nfs may lookup .. in dx directories causing an oops. (closes: #323557) * sparc-request_irq-in-RTC-fix.dpatch Use SA_SHIRQ in sparc specific code. From 2.6.13.1 * forcedeth-init-link-settings-in-nv_open.patch forcedeth: Initialize link settings in every nv_open() From 2.6.13.2 * fix-MPOL_F_VERIFY.patch Fix MPOL_F_VERIFY From 2.6.13.2 * fix-more-byte-to-dword-writes-to-PCI_ROM_ADDRESS-config-word.patch Fix up more strange byte writes to the PCI_ROM_ADDRESS config word From 2.6.13.2 * yenta-oops-fix.patch yenta oops fix From 2.6.13.3 * fix-de_thread-BUG_ON.patch Fix fs/exec.c:788 (de_thread()) BUG_ON From 2.6.13.3 * ipv6-fix-per-socket-multicast-filtering.patch fix IPv6 per-socket multicast filtering in exact-match case From 2.6.13.3 * ipvs-ip_vs_ftp-breaks-connections.patch ipvs: ip_vs_ftp breaks connections using persistence From 2.6.13.3 * ieee1394-sbp2-fixes-for-hot-unplug-and-module-unloading.dpatch ieee1394/sbp2: fixes for hot-unplug and module unloading From 2.6.13.4 * fix-sparc64-fpu-register-corruption.dpatch [SPARC64]: Fix userland FPU state corruption. From 2.6.13.4 [ dann frazier ] * drivers-block-raw-ioctl2.dpatch, drivers-block-ioctl-enotty.dpatch: Fix a bug in the block layer that causes a bootloader installation error under certain conditions - breaks installation on cciss devices. (closes: #354493) * Fix data corruption with dm-crypt over RAID5 (closes: #336153) * Fix VLAN support for 3c59x/90x series hardware (closes: #349774) * Fix erroneous calculation of 'len' parameter to NLMSG_PUT resulting in bogus 'error during NLMSG_PUT' messages (closes: #372621) * hp-diva-rmp3.dpatch, hp-diva-hurricane.dpatch: Add PCI IDs for newer Diva console ports oldstable/main/source/kernel-image-2.6.8-amd64_2.6.8-17.dsc oldstable/main/source/kernel-image-2.6.8-amd64_2.6.8-17.tar.gz oldstable/main/binary-i386/kernel-headers-2.6.8-13_2.6.8-17_i386.deb oldstable/main/binary-i386/kernel-headers-2.6.8-13-amd64-k8_2.6.8-17_i386.deb oldstable/main/binary-i386/kernel-image-2.6.8-13-amd64-k8_2.6.8-17_i386.deb oldstable/main/binary-i386/kernel-headers-2.6.8-13-amd64-generic_2.6.8-17_i386.deb oldstable/main/binary-i386/kernel-image-2.6.8-13-amd64-generic_2.6.8-17_i386.deb oldstable/main/binary-i386/kernel-headers-2.6.8-13-em64t-p4_2.6.8-17_i386.deb oldstable/main/binary-i386/kernel-image-2.6.8-13-em64t-p4_2.6.8-17_i386.deb oldstable/main/binary-i386/kernel-headers-2.6.8-13-amd64-k8-smp_2.6.8-17_i386.deb oldstable/main/binary-i386/kernel-image-2.6.8-13-amd64-k8-smp_2.6.8-17_i386.deb oldstable/main/binary-i386/kernel-headers-2.6.8-13-em64t-p4-smp_2.6.8-17_i386.deb oldstable/main/binary-i386/kernel-image-2.6.8-13-em64t-p4-smp_2.6.8-17_i386.deb kernel-image-2.6.8-amd64 (2.6.8-17) oldstable; urgency=high * Rebuild against kernel-tree-2.6.8-17 [ Simon Horman ] * drivers-net-via-rhine-wol-oops.dpatch (removed): This patch breaks the via-rhine driver and 2.6.8 and is completely bogus for this version of the kernel (closes: #311357) * drivers-media-vidio-bttv-vc100xp-detect.dpatch Allow Leadtek WinFast VC100 XP cards to work. * fs-jbd-checkpoint-assertion.dpatch Fix possible false assertion failure in log_do_checkpoint(). We might fail to detect that we actually made a progress when cleaning up the checkpoint lists if we don't retry after writing something to disk. * mm-rmap-out-of-bounds-pte.dpatch Stop try_to_unmap_cluster() passing out-of-bounds pte to pte_unmap() * net-ipv4-netfilter-ip_queue-deadlock.dpatch Fix deadlock with ip_queue and tcp local input path. * asm-i386-mem-clobber.dpatch: Make sure gcc doesn't reorder memory accesses in strncmp and friends on i386. * drivers-acpi-pci_irq-elcr.dpatch: Make sure we call acpi_register_gsi() even for default PCI interrupt assignment. That's the part that keeps track of the ELCR register, and we want to make sure that the PCI interrupts are properly marked level/low. [ dann frazier ] * Merge in applicable fixes from 2.6.12.4 - netfilter-deadlock-ip6_queue.dpatch - rocket_c-fix-ldisc-ref-count.dpatch - early-vlan-fix.dpatch [ Simon Horman ] * drivers-sata-promise-sataii_tx2_tx4.dpatch Add SATAII TX2 and TX2/TX4 support to sata promise driver (Closes: #317286) * module-per-cpu-alignment-fix.dpatch Module per-cpu alignment cannot always be met From 2.6.12.5 * genelink-usbnet-skb-typo.dpatch fix gl_skb/skb type error in genelink driver in usbnet Backported From 2.6.12.6 * drivers-ide-ppp-pmac-build.dpatch Make sure BLK_DEV_IDEDMA_PCI is defined for pmac ide driver builds (closes: #321442) * fs-ext3-nfs-parent-fix.dpatch ext3 file systems mounted over nfs may lookup .. in dx directories causing an oops. (closes: #323557) * sparc-request_irq-in-RTC-fix.dpatch Use SA_SHIRQ in sparc specific code. From 2.6.13.1 * forcedeth-init-link-settings-in-nv_open.patch forcedeth: Initialize link settings in every nv_open() From 2.6.13.2 * fix-MPOL_F_VERIFY.patch Fix MPOL_F_VERIFY From 2.6.13.2 * fix-more-byte-to-dword-writes-to-PCI_ROM_ADDRESS-config-word.patch Fix up more strange byte writes to the PCI_ROM_ADDRESS config word From 2.6.13.2 * yenta-oops-fix.patch yenta oops fix From 2.6.13.3 * fix-de_thread-BUG_ON.patch Fix fs/exec.c:788 (de_thread()) BUG_ON From 2.6.13.3 * ipv6-fix-per-socket-multicast-filtering.patch fix IPv6 per-socket multicast filtering in exact-match case From 2.6.13.3 * ipvs-ip_vs_ftp-breaks-connections.patch ipvs: ip_vs_ftp breaks connections using persistence From 2.6.13.3 * ieee1394-sbp2-fixes-for-hot-unplug-and-module-unloading.dpatch ieee1394/sbp2: fixes for hot-unplug and module unloading From 2.6.13.4 * fix-sparc64-fpu-register-corruption.dpatch [SPARC64]: Fix userland FPU state corruption. From 2.6.13.4 [ dann frazier ] * drivers-block-raw-ioctl2.dpatch, drivers-block-ioctl-enotty.dpatch: Fix a bug in the block layer that causes a bootloader installation error under certain conditions - breaks installation on cciss devices. (closes: #354493) * Fix data corruption with dm-crypt over RAID5 (closes: #336153) * Fix VLAN support for 3c59x/90x series hardware (closes: #349774) * Fix erroneous calculation of 'len' parameter to NLMSG_PUT resulting in bogus 'error during NLMSG_PUT' messages (closes: #372621) * hp-diva-rmp3.dpatch, hp-diva-hurricane.dpatch: Add PCI IDs for newer Diva console ports oldstable/main/source/kernel-image-2.6.8-hppa_2.6.8-7.dsc oldstable/main/source/kernel-image-2.6.8-hppa_2.6.8-7.tar.gz oldstable/main/binary-hppa/kernel-headers-2.6.8-4_2.6.8-7_hppa.deb oldstable/main/binary-hppa/kernel-headers-2.6.8-4-32-smp_2.6.8-7_hppa.deb oldstable/main/binary-hppa/kernel-image-2.6.8-4-32-smp_2.6.8-7_hppa.deb oldstable/main/binary-hppa/kernel-headers-2.6.8-4-64_2.6.8-7_hppa.deb oldstable/main/binary-hppa/kernel-image-2.6.8-4-64_2.6.8-7_hppa.deb oldstable/main/binary-hppa/kernel-headers-2.6.8-4-32_2.6.8-7_hppa.deb oldstable/main/binary-hppa/kernel-image-2.6.8-4-32_2.6.8-7_hppa.deb oldstable/main/binary-hppa/kernel-headers-2.6.8-4-64-smp_2.6.8-7_hppa.deb oldstable/main/binary-hppa/kernel-image-2.6.8-4-64-smp_2.6.8-7_hppa.deb kernel-image-2.6.8-hppa (2.6.8-7) oldstable; urgency=high * Rebuild against kernel-tree-2.6.8-17 [ Simon Horman ] * drivers-net-via-rhine-wol-oops.dpatch (removed): This patch breaks the via-rhine driver and 2.6.8 and is completely bogus for this version of the kernel (closes: #311357) * drivers-media-vidio-bttv-vc100xp-detect.dpatch Allow Leadtek WinFast VC100 XP cards to work. * fs-jbd-checkpoint-assertion.dpatch Fix possible false assertion failure in log_do_checkpoint(). We might fail to detect that we actually made a progress when cleaning up the checkpoint lists if we don't retry after writing something to disk. * mm-rmap-out-of-bounds-pte.dpatch Stop try_to_unmap_cluster() passing out-of-bounds pte to pte_unmap() * net-ipv4-netfilter-ip_queue-deadlock.dpatch Fix deadlock with ip_queue and tcp local input path. * asm-i386-mem-clobber.dpatch: Make sure gcc doesn't reorder memory accesses in strncmp and friends on i386. * drivers-acpi-pci_irq-elcr.dpatch: Make sure we call acpi_register_gsi() even for default PCI interrupt assignment. That's the part that keeps track of the ELCR register, and we want to make sure that the PCI interrupts are properly marked level/low. [ dann frazier ] * Merge in applicable fixes from 2.6.12.4 - netfilter-deadlock-ip6_queue.dpatch - rocket_c-fix-ldisc-ref-count.dpatch - early-vlan-fix.dpatch [ Simon Horman ] * drivers-sata-promise-sataii_tx2_tx4.dpatch Add SATAII TX2 and TX2/TX4 support to sata promise driver (Closes: #317286) * module-per-cpu-alignment-fix.dpatch Module per-cpu alignment cannot always be met From 2.6.12.5 * genelink-usbnet-skb-typo.dpatch fix gl_skb/skb type error in genelink driver in usbnet Backported From 2.6.12.6 * drivers-ide-ppp-pmac-build.dpatch Make sure BLK_DEV_IDEDMA_PCI is defined for pmac ide driver builds (closes: #321442) * fs-ext3-nfs-parent-fix.dpatch ext3 file systems mounted over nfs may lookup .. in dx directories causing an oops. (closes: #323557) * sparc-request_irq-in-RTC-fix.dpatch Use SA_SHIRQ in sparc specific code. From 2.6.13.1 * forcedeth-init-link-settings-in-nv_open.patch forcedeth: Initialize link settings in every nv_open() From 2.6.13.2 * fix-MPOL_F_VERIFY.patch Fix MPOL_F_VERIFY From 2.6.13.2 * fix-more-byte-to-dword-writes-to-PCI_ROM_ADDRESS-config-word.patch Fix up more strange byte writes to the PCI_ROM_ADDRESS config word From 2.6.13.2 * yenta-oops-fix.patch yenta oops fix From 2.6.13.3 * fix-de_thread-BUG_ON.patch Fix fs/exec.c:788 (de_thread()) BUG_ON From 2.6.13.3 * ipv6-fix-per-socket-multicast-filtering.patch fix IPv6 per-socket multicast filtering in exact-match case From 2.6.13.3 * ipvs-ip_vs_ftp-breaks-connections.patch ipvs: ip_vs_ftp breaks connections using persistence From 2.6.13.3 * ieee1394-sbp2-fixes-for-hot-unplug-and-module-unloading.dpatch ieee1394/sbp2: fixes for hot-unplug and module unloading From 2.6.13.4 * fix-sparc64-fpu-register-corruption.dpatch [SPARC64]: Fix userland FPU state corruption. From 2.6.13.4 [ dann frazier ] * drivers-block-raw-ioctl2.dpatch, drivers-block-ioctl-enotty.dpatch: Fix a bug in the block layer that causes a bootloader installation error under certain conditions - breaks installation on cciss devices. (closes: #354493) * Fix data corruption with dm-crypt over RAID5 (closes: #336153) * Fix VLAN support for 3c59x/90x series hardware (closes: #349774) * Fix erroneous calculation of 'len' parameter to NLMSG_PUT resulting in bogus 'error during NLMSG_PUT' messages (closes: #372621) * hp-diva-rmp3.dpatch, hp-diva-hurricane.dpatch: Add PCI IDs for newer Diva console ports oldstable/main/source/kernel-image-2.6.8-i386_2.6.8-17.dsc oldstable/main/source/kernel-image-2.6.8-i386_2.6.8-17.tar.gz oldstable/main/binary-i386/kernel-headers-2.6.8-4_2.6.8-17_i386.deb oldstable/main/binary-i386/kernel-headers-2.6.8-4-686_2.6.8-17_i386.deb oldstable/main/binary-i386/kernel-image-2.6.8-4-686_2.6.8-17_i386.deb oldstable/main/binary-i386/kernel-headers-2.6.8-4-k7-smp_2.6.8-17_i386.deb oldstable/main/binary-i386/kernel-image-2.6.8-4-k7-smp_2.6.8-17_i386.deb oldstable/main/binary-i386/kernel-headers-2.6.8-4-686-smp_2.6.8-17_i386.deb oldstable/main/binary-i386/kernel-image-2.6.8-4-686-smp_2.6.8-17_i386.deb oldstable/main/binary-i386/kernel-headers-2.6.8-4-k7_2.6.8-17_i386.deb oldstable/main/binary-i386/kernel-image-2.6.8-4-k7_2.6.8-17_i386.deb oldstable/main/binary-i386/kernel-headers-2.6.8-4-386_2.6.8-17_i386.deb oldstable/main/binary-i386/kernel-image-2.6.8-4-386_2.6.8-17_i386.deb kernel-image-2.6.8-i386 (2.6.8-17) oldstable; urgency=high * Rebuild against kernel-tree-2.6.8-17 [ Simon Horman ] * drivers-net-via-rhine-wol-oops.dpatch (removed): This patch breaks the via-rhine driver and 2.6.8 and is completely bogus for this version of the kernel (closes: #311357) * drivers-media-vidio-bttv-vc100xp-detect.dpatch Allow Leadtek WinFast VC100 XP cards to work. * fs-jbd-checkpoint-assertion.dpatch Fix possible false assertion failure in log_do_checkpoint(). We might fail to detect that we actually made a progress when cleaning up the checkpoint lists if we don't retry after writing something to disk. * mm-rmap-out-of-bounds-pte.dpatch Stop try_to_unmap_cluster() passing out-of-bounds pte to pte_unmap() * net-ipv4-netfilter-ip_queue-deadlock.dpatch Fix deadlock with ip_queue and tcp local input path. * asm-i386-mem-clobber.dpatch: Make sure gcc doesn't reorder memory accesses in strncmp and friends on i386. * drivers-acpi-pci_irq-elcr.dpatch: Make sure we call acpi_register_gsi() even for default PCI interrupt assignment. That's the part that keeps track of the ELCR register, and we want to make sure that the PCI interrupts are properly marked level/low. [ dann frazier ] * Merge in applicable fixes from 2.6.12.4 - netfilter-deadlock-ip6_queue.dpatch - rocket_c-fix-ldisc-ref-count.dpatch - early-vlan-fix.dpatch [ Simon Horman ] * drivers-sata-promise-sataii_tx2_tx4.dpatch Add SATAII TX2 and TX2/TX4 support to sata promise driver (Closes: #317286) * module-per-cpu-alignment-fix.dpatch Module per-cpu alignment cannot always be met From 2.6.12.5 * genelink-usbnet-skb-typo.dpatch fix gl_skb/skb type error in genelink driver in usbnet Backported From 2.6.12.6 * drivers-ide-ppp-pmac-build.dpatch Make sure BLK_DEV_IDEDMA_PCI is defined for pmac ide driver builds (closes: #321442) * fs-ext3-nfs-parent-fix.dpatch ext3 file systems mounted over nfs may lookup .. in dx directories causing an oops. (closes: #323557) * sparc-request_irq-in-RTC-fix.dpatch Use SA_SHIRQ in sparc specific code. From 2.6.13.1 * forcedeth-init-link-settings-in-nv_open.patch forcedeth: Initialize link settings in every nv_open() From 2.6.13.2 * fix-MPOL_F_VERIFY.patch Fix MPOL_F_VERIFY From 2.6.13.2 * fix-more-byte-to-dword-writes-to-PCI_ROM_ADDRESS-config-word.patch Fix up more strange byte writes to the PCI_ROM_ADDRESS config word From 2.6.13.2 * yenta-oops-fix.patch yenta oops fix From 2.6.13.3 * fix-de_thread-BUG_ON.patch Fix fs/exec.c:788 (de_thread()) BUG_ON From 2.6.13.3 * ipv6-fix-per-socket-multicast-filtering.patch fix IPv6 per-socket multicast filtering in exact-match case From 2.6.13.3 * ipvs-ip_vs_ftp-breaks-connections.patch ipvs: ip_vs_ftp breaks connections using persistence From 2.6.13.3 * ieee1394-sbp2-fixes-for-hot-unplug-and-module-unloading.dpatch ieee1394/sbp2: fixes for hot-unplug and module unloading From 2.6.13.4 * fix-sparc64-fpu-register-corruption.dpatch [SPARC64]: Fix userland FPU state corruption. From 2.6.13.4 [ dann frazier ] * drivers-block-raw-ioctl2.dpatch, drivers-block-ioctl-enotty.dpatch: Fix a bug in the block layer that causes a bootloader installation error under certain conditions - breaks installation on cciss devices. (closes: #354493) * Fix data corruption with dm-crypt over RAID5 (closes: #336153) * Fix VLAN support for 3c59x/90x series hardware (closes: #349774) * Fix erroneous calculation of 'len' parameter to NLMSG_PUT resulting in bogus 'error during NLMSG_PUT' messages (closes: #372621) * hp-diva-rmp3.dpatch, hp-diva-hurricane.dpatch: Add PCI IDs for newer Diva console ports oldstable/main/source/kernel-image-2.6.8-ia64_2.6.8-15.dsc oldstable/main/source/kernel-image-2.6.8-ia64_2.6.8-15.tar.gz oldstable/main/binary-ia64/kernel-headers-2.6.8-4_2.6.8-15_ia64.deb oldstable/main/binary-ia64/kernel-headers-2.6-itanium-smp_2.6.8-15_ia64.deb oldstable/main/binary-ia64/kernel-image-2.6-itanium-smp_2.6.8-15_ia64.deb oldstable/main/binary-ia64/kernel-headers-2.6.8-4-itanium-smp_2.6.8-15_ia64.deb oldstable/main/binary-ia64/kernel-image-2.6.8-4-itanium-smp_2.6.8-15_ia64.deb oldstable/main/binary-ia64/kernel-headers-2.6-mckinley-smp_2.6.8-15_ia64.deb oldstable/main/binary-ia64/kernel-image-2.6-mckinley-smp_2.6.8-15_ia64.deb oldstable/main/binary-ia64/kernel-headers-2.6.8-4-mckinley-smp_2.6.8-15_ia64.deb oldstable/main/binary-ia64/kernel-image-2.6.8-4-mckinley-smp_2.6.8-15_ia64.deb oldstable/main/binary-ia64/kernel-headers-2.6-itanium_2.6.8-15_ia64.deb oldstable/main/binary-ia64/kernel-image-2.6-itanium_2.6.8-15_ia64.deb oldstable/main/binary-ia64/kernel-headers-2.6.8-4-itanium_2.6.8-15_ia64.deb oldstable/main/binary-ia64/kernel-image-2.6.8-4-itanium_2.6.8-15_ia64.deb oldstable/main/binary-ia64/kernel-headers-2.6-mckinley_2.6.8-15_ia64.deb oldstable/main/binary-ia64/kernel-image-2.6-mckinley_2.6.8-15_ia64.deb oldstable/main/binary-ia64/kernel-headers-2.6.8-4-mckinley_2.6.8-15_ia64.deb oldstable/main/binary-ia64/kernel-image-2.6.8-4-mckinley_2.6.8-15_ia64.deb kernel-image-2.6.8-ia64 (2.6.8-15) oldstable; urgency=high * Rebuild against kernel-tree-2.6.8-17 [ Simon Horman ] * drivers-net-via-rhine-wol-oops.dpatch (removed): This patch breaks the via-rhine driver and 2.6.8 and is completely bogus for this version of the kernel (closes: #311357) * drivers-media-vidio-bttv-vc100xp-detect.dpatch Allow Leadtek WinFast VC100 XP cards to work. * fs-jbd-checkpoint-assertion.dpatch Fix possible false assertion failure in log_do_checkpoint(). We might fail to detect that we actually made a progress when cleaning up the checkpoint lists if we don't retry after writing something to disk. * mm-rmap-out-of-bounds-pte.dpatch Stop try_to_unmap_cluster() passing out-of-bounds pte to pte_unmap() * net-ipv4-netfilter-ip_queue-deadlock.dpatch Fix deadlock with ip_queue and tcp local input path. * asm-i386-mem-clobber.dpatch: Make sure gcc doesn't reorder memory accesses in strncmp and friends on i386. * drivers-acpi-pci_irq-elcr.dpatch: Make sure we call acpi_register_gsi() even for default PCI interrupt assignment. That's the part that keeps track of the ELCR register, and we want to make sure that the PCI interrupts are properly marked level/low. [ dann frazier ] * Merge in applicable fixes from 2.6.12.4 - netfilter-deadlock-ip6_queue.dpatch - rocket_c-fix-ldisc-ref-count.dpatch - early-vlan-fix.dpatch [ Simon Horman ] * drivers-sata-promise-sataii_tx2_tx4.dpatch Add SATAII TX2 and TX2/TX4 support to sata promise driver (Closes: #317286) * module-per-cpu-alignment-fix.dpatch Module per-cpu alignment cannot always be met From 2.6.12.5 * genelink-usbnet-skb-typo.dpatch fix gl_skb/skb type error in genelink driver in usbnet Backported From 2.6.12.6 * drivers-ide-ppp-pmac-build.dpatch Make sure BLK_DEV_IDEDMA_PCI is defined for pmac ide driver builds (closes: #321442) * fs-ext3-nfs-parent-fix.dpatch ext3 file systems mounted over nfs may lookup .. in dx directories causing an oops. (closes: #323557) * sparc-request_irq-in-RTC-fix.dpatch Use SA_SHIRQ in sparc specific code. From 2.6.13.1 * forcedeth-init-link-settings-in-nv_open.patch forcedeth: Initialize link settings in every nv_open() From 2.6.13.2 * fix-MPOL_F_VERIFY.patch Fix MPOL_F_VERIFY From 2.6.13.2 * fix-more-byte-to-dword-writes-to-PCI_ROM_ADDRESS-config-word.patch Fix up more strange byte writes to the PCI_ROM_ADDRESS config word From 2.6.13.2 * yenta-oops-fix.patch yenta oops fix From 2.6.13.3 * fix-de_thread-BUG_ON.patch Fix fs/exec.c:788 (de_thread()) BUG_ON From 2.6.13.3 * ipv6-fix-per-socket-multicast-filtering.patch fix IPv6 per-socket multicast filtering in exact-match case From 2.6.13.3 * ipvs-ip_vs_ftp-breaks-connections.patch ipvs: ip_vs_ftp breaks connections using persistence From 2.6.13.3 * ieee1394-sbp2-fixes-for-hot-unplug-and-module-unloading.dpatch ieee1394/sbp2: fixes for hot-unplug and module unloading From 2.6.13.4 * fix-sparc64-fpu-register-corruption.dpatch [SPARC64]: Fix userland FPU state corruption. From 2.6.13.4 [ dann frazier ] * drivers-block-raw-ioctl2.dpatch, drivers-block-ioctl-enotty.dpatch: Fix a bug in the block layer that causes a bootloader installation error under certain conditions - breaks installation on cciss devices. (closes: #354493) * Fix data corruption with dm-crypt over RAID5 (closes: #336153) * Fix VLAN support for 3c59x/90x series hardware (closes: #349774) * Fix erroneous calculation of 'len' parameter to NLMSG_PUT resulting in bogus 'error during NLMSG_PUT' messages (closes: #372621) * hp-diva-rmp3.dpatch, hp-diva-hurricane.dpatch: Add PCI IDs for newer Diva console ports oldstable/main/source/kernel-image-2.6.8-m68k_2.6.8-5.dsc oldstable/main/source/kernel-image-2.6.8-m68k_2.6.8-5.tar.gz oldstable/main/binary-m68k/kernel-image-2.6.8-sun3_2.6.8-5_m68k.deb oldstable/main/binary-m68k/kernel-image-2.6.8-bvme6000_2.6.8-5_m68k.deb oldstable/main/binary-m68k/kernel-image-2.6.8-atari_2.6.8-5_m68k.deb oldstable/main/binary-m68k/kernel-image-2.6.8-mvme16x_2.6.8-5_m68k.deb oldstable/main/binary-m68k/kernel-image-2.6.8-mac_2.6.8-5_m68k.deb oldstable/main/binary-m68k/kernel-image-2.6.8-amiga_2.6.8-5_m68k.deb oldstable/main/binary-m68k/kernel-image-2.6.8-mvme147_2.6.8-5_m68k.deb oldstable/main/binary-m68k/kernel-image-2.6.8-q40_2.6.8-5_m68k.deb oldstable/main/binary-m68k/kernel-image-2.6.8-hp_2.6.8-5_m68k.deb kernel-image-2.6.8-m68k (2.6.8-5) oldstable; urgency=high * Rebuild against kernel-tree-2.6.8-17 [ Simon Horman ] * drivers-net-via-rhine-wol-oops.dpatch (removed): This patch breaks the via-rhine driver and 2.6.8 and is completely bogus for this version of the kernel (closes: #311357) * drivers-media-vidio-bttv-vc100xp-detect.dpatch Allow Leadtek WinFast VC100 XP cards to work. * fs-jbd-checkpoint-assertion.dpatch Fix possible false assertion failure in log_do_checkpoint(). We might fail to detect that we actually made a progress when cleaning up the checkpoint lists if we don't retry after writing something to disk. * mm-rmap-out-of-bounds-pte.dpatch Stop try_to_unmap_cluster() passing out-of-bounds pte to pte_unmap() * net-ipv4-netfilter-ip_queue-deadlock.dpatch Fix deadlock with ip_queue and tcp local input path. * asm-i386-mem-clobber.dpatch: Make sure gcc doesn't reorder memory accesses in strncmp and friends on i386. * drivers-acpi-pci_irq-elcr.dpatch: Make sure we call acpi_register_gsi() even for default PCI interrupt assignment. That's the part that keeps track of the ELCR register, and we want to make sure that the PCI interrupts are properly marked level/low. [ dann frazier ] * Merge in applicable fixes from 2.6.12.4 - netfilter-deadlock-ip6_queue.dpatch - rocket_c-fix-ldisc-ref-count.dpatch - early-vlan-fix.dpatch [ Simon Horman ] * drivers-sata-promise-sataii_tx2_tx4.dpatch Add SATAII TX2 and TX2/TX4 support to sata promise driver (Closes: #317286) * module-per-cpu-alignment-fix.dpatch Module per-cpu alignment cannot always be met From 2.6.12.5 * genelink-usbnet-skb-typo.dpatch fix gl_skb/skb type error in genelink driver in usbnet Backported From 2.6.12.6 * drivers-ide-ppp-pmac-build.dpatch Make sure BLK_DEV_IDEDMA_PCI is defined for pmac ide driver builds (closes: #321442) * fs-ext3-nfs-parent-fix.dpatch ext3 file systems mounted over nfs may lookup .. in dx directories causing an oops. (closes: #323557) * sparc-request_irq-in-RTC-fix.dpatch Use SA_SHIRQ in sparc specific code. From 2.6.13.1 * forcedeth-init-link-settings-in-nv_open.patch forcedeth: Initialize link settings in every nv_open() From 2.6.13.2 * fix-MPOL_F_VERIFY.patch Fix MPOL_F_VERIFY From 2.6.13.2 * fix-more-byte-to-dword-writes-to-PCI_ROM_ADDRESS-config-word.patch Fix up more strange byte writes to the PCI_ROM_ADDRESS config word From 2.6.13.2 * yenta-oops-fix.patch yenta oops fix From 2.6.13.3 * fix-de_thread-BUG_ON.patch Fix fs/exec.c:788 (de_thread()) BUG_ON From 2.6.13.3 * ipv6-fix-per-socket-multicast-filtering.patch fix IPv6 per-socket multicast filtering in exact-match case From 2.6.13.3 * ipvs-ip_vs_ftp-breaks-connections.patch ipvs: ip_vs_ftp breaks connections using persistence From 2.6.13.3 * ieee1394-sbp2-fixes-for-hot-unplug-and-module-unloading.dpatch ieee1394/sbp2: fixes for hot-unplug and module unloading From 2.6.13.4 * fix-sparc64-fpu-register-corruption.dpatch [SPARC64]: Fix userland FPU state corruption. From 2.6.13.4 [ dann frazier ] * drivers-block-raw-ioctl2.dpatch, drivers-block-ioctl-enotty.dpatch: Fix a bug in the block layer that causes a bootloader installation error under certain conditions - breaks installation on cciss devices. (closes: #354493) * Fix data corruption with dm-crypt over RAID5 (closes: #336153) * Fix VLAN support for 3c59x/90x series hardware (closes: #349774) * Fix erroneous calculation of 'len' parameter to NLMSG_PUT resulting in bogus 'error during NLMSG_PUT' messages (closes: #372621) * hp-diva-rmp3.dpatch, hp-diva-hurricane.dpatch: Add PCI IDs for newer Diva console ports oldstable/main/source/kernel-image-2.6.8-s390_2.6.8-6.dsc oldstable/main/source/kernel-image-2.6.8-s390_2.6.8-6.tar.gz oldstable/main/binary-all/kernel-patch-2.6.8-s390_2.6.8-6_all.deb oldstable/main/binary-s390/kernel-headers-2.6.8-4_2.6.8-6_s390.deb oldstable/main/binary-s390/kernel-image-2.6.8-4-s390_2.6.8-6_s390.deb oldstable/main/binary-s390/kernel-image-2.6.8-4-s390x_2.6.8-6_s390.deb oldstable/main/binary-s390/kernel-image-2.6.8-4-s390-tape_2.6.8-6_s390.deb kernel-image-2.6.8-s390 (2.6.8-6) oldstable; urgency=high * Rebuild against kernel-tree-2.6.8-17 [ Simon Horman ] * drivers-net-via-rhine-wol-oops.dpatch (removed): This patch breaks the via-rhine driver and 2.6.8 and is completely bogus for this version of the kernel (closes: #311357) * drivers-media-vidio-bttv-vc100xp-detect.dpatch Allow Leadtek WinFast VC100 XP cards to work. * fs-jbd-checkpoint-assertion.dpatch Fix possible false assertion failure in log_do_checkpoint(). We might fail to detect that we actually made a progress when cleaning up the checkpoint lists if we don't retry after writing something to disk. * mm-rmap-out-of-bounds-pte.dpatch Stop try_to_unmap_cluster() passing out-of-bounds pte to pte_unmap() * net-ipv4-netfilter-ip_queue-deadlock.dpatch Fix deadlock with ip_queue and tcp local input path. * asm-i386-mem-clobber.dpatch: Make sure gcc doesn't reorder memory accesses in strncmp and friends on i386. * drivers-acpi-pci_irq-elcr.dpatch: Make sure we call acpi_register_gsi() even for default PCI interrupt assignment. That's the part that keeps track of the ELCR register, and we want to make sure that the PCI interrupts are properly marked level/low. [ dann frazier ] * Merge in applicable fixes from 2.6.12.4 - netfilter-deadlock-ip6_queue.dpatch - rocket_c-fix-ldisc-ref-count.dpatch - early-vlan-fix.dpatch [ Simon Horman ] * drivers-sata-promise-sataii_tx2_tx4.dpatch Add SATAII TX2 and TX2/TX4 support to sata promise driver (Closes: #317286) * module-per-cpu-alignment-fix.dpatch Module per-cpu alignment cannot always be met From 2.6.12.5 * genelink-usbnet-skb-typo.dpatch fix gl_skb/skb type error in genelink driver in usbnet Backported From 2.6.12.6 * drivers-ide-ppp-pmac-build.dpatch Make sure BLK_DEV_IDEDMA_PCI is defined for pmac ide driver builds (closes: #321442) * fs-ext3-nfs-parent-fix.dpatch ext3 file systems mounted over nfs may lookup .. in dx directories causing an oops. (closes: #323557) * sparc-request_irq-in-RTC-fix.dpatch Use SA_SHIRQ in sparc specific code. From 2.6.13.1 * forcedeth-init-link-settings-in-nv_open.patch forcedeth: Initialize link settings in every nv_open() From 2.6.13.2 * fix-MPOL_F_VERIFY.patch Fix MPOL_F_VERIFY From 2.6.13.2 * fix-more-byte-to-dword-writes-to-PCI_ROM_ADDRESS-config-word.patch Fix up more strange byte writes to the PCI_ROM_ADDRESS config word From 2.6.13.2 * yenta-oops-fix.patch yenta oops fix From 2.6.13.3 * fix-de_thread-BUG_ON.patch Fix fs/exec.c:788 (de_thread()) BUG_ON From 2.6.13.3 * ipv6-fix-per-socket-multicast-filtering.patch fix IPv6 per-socket multicast filtering in exact-match case From 2.6.13.3 * ipvs-ip_vs_ftp-breaks-connections.patch ipvs: ip_vs_ftp breaks connections using persistence From 2.6.13.3 * ieee1394-sbp2-fixes-for-hot-unplug-and-module-unloading.dpatch ieee1394/sbp2: fixes for hot-unplug and module unloading From 2.6.13.4 * fix-sparc64-fpu-register-corruption.dpatch [SPARC64]: Fix userland FPU state corruption. From 2.6.13.4 [ dann frazier ] * drivers-block-raw-ioctl2.dpatch, drivers-block-ioctl-enotty.dpatch: Fix a bug in the block layer that causes a bootloader installation error under certain conditions - breaks installation on cciss devices. (closes: #354493) * Fix data corruption with dm-crypt over RAID5 (closes: #336153) * Fix VLAN support for 3c59x/90x series hardware (closes: #349774) * Fix erroneous calculation of 'len' parameter to NLMSG_PUT resulting in bogus 'error during NLMSG_PUT' messages (closes: #372621) * hp-diva-rmp3.dpatch, hp-diva-hurricane.dpatch: Add PCI IDs for newer Diva console ports oldstable/main/source/kernel-image-2.6.8-sparc_2.6.8-16.dsc oldstable/main/source/kernel-image-2.6.8-sparc_2.6.8-16.tar.gz oldstable/main/binary-sparc/kernel-headers-2.6.8-4_2.6.8-16_sparc.deb oldstable/main/binary-sparc/kernel-headers-2.6.8-4-sparc32_2.6.8-16_sparc.deb oldstable/main/binary-sparc/kernel-image-2.6.8-4-sparc32_2.6.8-16_sparc.deb oldstable/main/binary-sparc/kernel-headers-2.6.8-4-sparc64_2.6.8-16_sparc.deb oldstable/main/binary-sparc/kernel-image-2.6.8-4-sparc64_2.6.8-16_sparc.deb oldstable/main/binary-sparc/kernel-headers-2.6.8-4-sparc64-smp_2.6.8-16_sparc.deb oldstable/main/binary-sparc/kernel-image-2.6.8-4-sparc64-smp_2.6.8-16_sparc.deb oldstable/main/binary-sparc/kernel-build-2.6.8-4_2.6.8-16_sparc.deb kernel-image-2.6.8-sparc (2.6.8-16) oldstable; urgency=high * Rebuild against kernel-tree-2.6.8-17: [ Simon Horman ] * drivers-net-via-rhine-wol-oops.dpatch (removed): This patch breaks the via-rhine driver and 2.6.8 and is completely bogus for this version of the kernel (closes: #311357) * drivers-media-vidio-bttv-vc100xp-detect.dpatch Allow Leadtek WinFast VC100 XP cards to work. * fs-jbd-checkpoint-assertion.dpatch Fix possible false assertion failure in log_do_checkpoint(). We might fail to detect that we actually made a progress when cleaning up the checkpoint lists if we don't retry after writing something to disk. * mm-rmap-out-of-bounds-pte.dpatch Stop try_to_unmap_cluster() passing out-of-bounds pte to pte_unmap() * net-ipv4-netfilter-ip_queue-deadlock.dpatch Fix deadlock with ip_queue and tcp local input path. * asm-i386-mem-clobber.dpatch: Make sure gcc doesn't reorder memory accesses in strncmp and friends on i386. * drivers-acpi-pci_irq-elcr.dpatch: Make sure we call acpi_register_gsi() even for default PCI interrupt assignment. That's the part that keeps track of the ELCR register, and we want to make sure that the PCI interrupts are properly marked level/low. [ dann frazier ] * Merge in applicable fixes from 2.6.12.4 - netfilter-deadlock-ip6_queue.dpatch - rocket_c-fix-ldisc-ref-count.dpatch - early-vlan-fix.dpatch [ Simon Horman ] * drivers-sata-promise-sataii_tx2_tx4.dpatch Add SATAII TX2 and TX2/TX4 support to sata promise driver (Closes: #317286) * module-per-cpu-alignment-fix.dpatch Module per-cpu alignment cannot always be met From 2.6.12.5 * genelink-usbnet-skb-typo.dpatch fix gl_skb/skb type error in genelink driver in usbnet Backported From 2.6.12.6 * drivers-ide-ppp-pmac-build.dpatch Make sure BLK_DEV_IDEDMA_PCI is defined for pmac ide driver builds (closes: #321442) * fs-ext3-nfs-parent-fix.dpatch ext3 file systems mounted over nfs may lookup .. in dx directories causing an oops. (closes: #323557) * sparc-request_irq-in-RTC-fix.dpatch Use SA_SHIRQ in sparc specific code. From 2.6.13.1 * forcedeth-init-link-settings-in-nv_open.patch forcedeth: Initialize link settings in every nv_open() From 2.6.13.2 * fix-MPOL_F_VERIFY.patch Fix MPOL_F_VERIFY From 2.6.13.2 * fix-more-byte-to-dword-writes-to-PCI_ROM_ADDRESS-config-word.patch Fix up more strange byte writes to the PCI_ROM_ADDRESS config word From 2.6.13.2 * yenta-oops-fix.patch yenta oops fix From 2.6.13.3 * fix-de_thread-BUG_ON.patch Fix fs/exec.c:788 (de_thread()) BUG_ON From 2.6.13.3 * ipv6-fix-per-socket-multicast-filtering.patch fix IPv6 per-socket multicast filtering in exact-match case From 2.6.13.3 * ipvs-ip_vs_ftp-breaks-connections.patch ipvs: ip_vs_ftp breaks connections using persistence From 2.6.13.3 * ieee1394-sbp2-fixes-for-hot-unplug-and-module-unloading.dpatch ieee1394/sbp2: fixes for hot-unplug and module unloading From 2.6.13.4 * fix-sparc64-fpu-register-corruption.dpatch [SPARC64]: Fix userland FPU state corruption. From 2.6.13.4 [ dann frazier ] * drivers-block-raw-ioctl2.dpatch, drivers-block-ioctl-enotty.dpatch: Fix a bug in the block layer that causes a bootloader installation error under certain conditions - breaks installation on cciss devices. (closes: #354493) * Fix data corruption with dm-crypt over RAID5 (closes: #336153) * Fix VLAN support for 3c59x/90x series hardware (closes: #349774) * Fix erroneous calculation of 'len' parameter to NLMSG_PUT resulting in bogus 'error during NLMSG_PUT' messages (closes: #372621) * hp-diva-rmp3.dpatch, hp-diva-hurricane.dpatch: Add PCI IDs for newer Diva console ports oldstable/main/source/kernel-latest-2.6-alpha_101sarge2.dsc oldstable/main/source/kernel-latest-2.6-alpha_101sarge2.tar.gz oldstable/main/binary-alpha/kernel-image-2.6-generic_101sarge2_alpha.deb oldstable/main/binary-alpha/kernel-headers-2.6-generic_101sarge2_alpha.deb oldstable/main/binary-alpha/kernel-image-2.6-smp_101sarge2_alpha.deb oldstable/main/binary-alpha/kernel-headers-2.6-smp_101sarge2_alpha.deb kernel-latest-2.6-alpha (101sarge2) oldstable-security; urgency=high * Update for the -4 ABI oldstable/main/binary-i386/kernel-headers-2.6-em64t-p4-smp_103sarge2_i386.deb oldstable/main/binary-i386/kernel-headers-2.6-amd64-k8-smp_103sarge2_i386.deb oldstable/main/binary-i386/kernel-image-2.6-amd64-k8-smp_103sarge2_i386.deb oldstable/main/binary-amd64/kernel-headers-2.6-amd64-generic_103sarge2_amd64.deb oldstable/main/binary-amd64/kernel-image-2.6-amd64-generic_103sarge2_amd64.deb oldstable/main/binary-amd64/kernel-image-2.6-em64t-p4_103sarge2_amd64.deb oldstable/main/source/kernel-latest-2.6-amd64_103sarge2.tar.gz oldstable/main/binary-amd64/kernel-image-2.6-amd64-k8-smp_103sarge2_amd64.deb oldstable/main/binary-amd64/kernel-headers-2.6-em64t-p4-smp_103sarge2_amd64.deb oldstable/main/binary-i386/kernel-image-2.6-amd64-k8_103sarge2_i386.deb oldstable/main/binary-i386/kernel-headers-2.6-amd64-generic_103sarge2_i386.deb oldstable/main/binary-i386/kernel-image-2.6-em64t-p4_103sarge2_i386.deb oldstable/main/binary-amd64/kernel-image-2.6-amd64-k8_103sarge2_amd64.deb oldstable/main/binary-i386/kernel-image-2.6-amd64-generic_103sarge2_i386.deb oldstable/main/binary-i386/kernel-headers-2.6-amd64-k8_103sarge2_i386.deb oldstable/main/binary-i386/kernel-headers-2.6-em64t-p4_103sarge2_i386.deb oldstable/main/binary-amd64/kernel-headers-2.6-em64t-p4_103sarge2_amd64.deb oldstable/main/binary-amd64/kernel-image-2.6-em64t-p4-smp_103sarge2_amd64.deb oldstable/main/binary-amd64/kernel-headers-2.6-amd64-k8_103sarge2_amd64.deb oldstable/main/binary-amd64/kernel-headers-2.6-amd64-k8-smp_103sarge2_amd64.deb oldstable/main/binary-i386/kernel-image-2.6-em64t-p4-smp_103sarge2_i386.deb oldstable/main/source/kernel-latest-2.6-amd64_103sarge2.dsc kernel-latest-2.6-amd64 (103sarge2) oldstable-security; urgency=high * Update for the -13 ABI oldstable/main/source/kernel-latest-2.6-hppa_2.6.8-1sarge2.dsc oldstable/main/source/kernel-latest-2.6-hppa_2.6.8-1sarge2.tar.gz oldstable/main/binary-hppa/kernel-headers-2.6_2.6.8-1sarge2_hppa.deb oldstable/main/binary-hppa/kernel-headers-2.6-32_2.6.8-1sarge2_hppa.deb oldstable/main/binary-hppa/kernel-image-2.6-32_2.6.8-1sarge2_hppa.deb oldstable/main/binary-hppa/kernel-headers-2.6-32-smp_2.6.8-1sarge2_hppa.deb oldstable/main/binary-hppa/kernel-image-2.6-32-smp_2.6.8-1sarge2_hppa.deb oldstable/main/binary-hppa/kernel-headers-2.6-64_2.6.8-1sarge2_hppa.deb oldstable/main/binary-hppa/kernel-image-2.6-64_2.6.8-1sarge2_hppa.deb oldstable/main/binary-hppa/kernel-headers-2.6-64-smp_2.6.8-1sarge2_hppa.deb oldstable/main/binary-hppa/kernel-image-2.6-64-smp_2.6.8-1sarge2_hppa.deb kernel-latest-2.6-hppa (2.6.8-1sarge2) oldstable-security; urgency=high * Update for the -4 ABI oldstable/main/source/kernel-latest-2.6-i386_101sarge2.dsc oldstable/main/source/kernel-latest-2.6-i386_101sarge2.tar.gz oldstable/main/binary-i386/kernel-headers-2.6-386_101sarge2_i386.deb oldstable/main/binary-i386/kernel-image-2.6-386_101sarge2_i386.deb oldstable/main/binary-i386/kernel-headers-2.6-686_101sarge2_i386.deb oldstable/main/binary-i386/kernel-image-2.6-686_101sarge2_i386.deb oldstable/main/binary-i386/kernel-headers-2.6-686-smp_101sarge2_i386.deb oldstable/main/binary-i386/kernel-image-2.6-686-smp_101sarge2_i386.deb oldstable/main/binary-i386/kernel-headers-2.6-k7_101sarge2_i386.deb oldstable/main/binary-i386/kernel-image-2.6-k7_101sarge2_i386.deb oldstable/main/binary-i386/kernel-headers-2.6-k7-smp_101sarge2_i386.deb oldstable/main/binary-i386/kernel-image-2.6-k7-smp_101sarge2_i386.deb kernel-latest-2.6-i386 (101sarge2) oldstable-security; urgency=high * Update for the -4 ABI oldstable/main/source/kernel-latest-2.6-sparc_101sarge2.dsc oldstable/main/source/kernel-latest-2.6-sparc_101sarge2.tar.gz oldstable/main/binary-sparc/kernel-image-2.6-sparc32_101sarge2_sparc.deb oldstable/main/binary-sparc/kernel-headers-2.6-sparc32_101sarge2_sparc.deb oldstable/main/binary-sparc/kernel-image-2.6-sparc64_101sarge2_sparc.deb oldstable/main/binary-sparc/kernel-headers-2.6-sparc64_101sarge2_sparc.deb oldstable/main/binary-sparc/kernel-image-2.6-sparc64-smp_101sarge2_sparc.deb oldstable/main/binary-sparc/kernel-headers-2.6-sparc64-smp_101sarge2_sparc.deb kernel-latest-2.6-sparc (101sarge2) oldstable-security; urgency=high * Update for the -4 ABI oldstable/main/source/kernel-latest-powerpc_102sarge2.dsc oldstable/main/source/kernel-latest-powerpc_102sarge2.tar.gz oldstable/main/binary-powerpc/kernel-headers-2.6_102sarge2_powerpc.deb oldstable/main/binary-powerpc/kernel-headers_102sarge2_powerpc.deb oldstable/main/binary-powerpc/kernel-image-2.6-powerpc_102sarge2_powerpc.deb oldstable/main/binary-powerpc/kernel-image-powerpc_102sarge2_powerpc.deb oldstable/main/binary-powerpc/kernel-image-2.6-powerpc-smp_102sarge2_powerpc.deb oldstable/main/binary-powerpc/kernel-image-powerpc-smp_102sarge2_powerpc.deb oldstable/main/binary-powerpc/kernel-image-2.6-power3_102sarge2_powerpc.deb oldstable/main/binary-powerpc/kernel-image-power3_102sarge2_powerpc.deb oldstable/main/binary-powerpc/kernel-image-2.6-power3-smp_102sarge2_powerpc.deb oldstable/main/binary-powerpc/kernel-image-power3-smp_102sarge2_powerpc.deb oldstable/main/binary-powerpc/kernel-image-2.6-power4_102sarge2_powerpc.deb oldstable/main/binary-powerpc/kernel-image-power4_102sarge2_powerpc.deb oldstable/main/binary-powerpc/kernel-image-2.6-power4-smp_102sarge2_powerpc.deb oldstable/main/binary-powerpc/kernel-image-power4-smp_102sarge2_powerpc.deb oldstable/main/binary-powerpc/kernel-headers-2.4_102sarge2_powerpc.deb oldstable/main/binary-powerpc/kernel-image-2.4-powerpc_102sarge2_powerpc.deb oldstable/main/binary-powerpc/kernel-image-2.4-powerpc-smp_102sarge2_powerpc.deb kernel-latest-powerpc (102sarge2) oldstable-security; urgency=high * Update 2.6 dependencies for the -4 ABI. oldstable/main/source/kernel-patch-powerpc-2.6.8_2.6.8-13.dsc oldstable/main/source/kernel-patch-powerpc-2.6.8_2.6.8-13.tar.gz oldstable/main/binary-powerpc/kernel-headers-2.6.8-4_2.6.8-13_powerpc.deb oldstable/main/binary-powerpc/kernel-image-2.6.8-4-power3_2.6.8-13_powerpc.deb oldstable/main/binary-powerpc/kernel-build-2.6.8-4-power3_2.6.8-13_powerpc.deb oldstable/main/binary-powerpc/kernel-image-2.6.8-4-power3-smp_2.6.8-13_powerpc.deb oldstable/main/binary-powerpc/kernel-build-2.6.8-4-power3-smp_2.6.8-13_powerpc.deb oldstable/main/binary-powerpc/kernel-image-2.6.8-4-power4_2.6.8-13_powerpc.deb oldstable/main/binary-powerpc/kernel-build-2.6.8-4-power4_2.6.8-13_powerpc.deb oldstable/main/binary-powerpc/kernel-image-2.6.8-4-power4-smp_2.6.8-13_powerpc.deb oldstable/main/binary-powerpc/kernel-build-2.6.8-4-power4-smp_2.6.8-13_powerpc.deb oldstable/main/binary-powerpc/kernel-image-2.6.8-4-powerpc_2.6.8-13_powerpc.deb oldstable/main/binary-powerpc/kernel-build-2.6.8-4-powerpc_2.6.8-13_powerpc.deb oldstable/main/binary-powerpc/kernel-image-2.6.8-4-powerpc-smp_2.6.8-13_powerpc.deb oldstable/main/binary-powerpc/kernel-build-2.6.8-4-powerpc-smp_2.6.8-13_powerpc.deb kernel-patch-powerpc-2.6.8 (2.6.8-13) oldstable; urgency=high * Rebuild against kernel-tree-2.6.8-17 [ Simon Horman ] * drivers-net-via-rhine-wol-oops.dpatch (removed): This patch breaks the via-rhine driver and 2.6.8 and is completely bogus for this version of the kernel (closes: #311357) * drivers-media-vidio-bttv-vc100xp-detect.dpatch Allow Leadtek WinFast VC100 XP cards to work. * fs-jbd-checkpoint-assertion.dpatch Fix possible false assertion failure in log_do_checkpoint(). We might fail to detect that we actually made a progress when cleaning up the checkpoint lists if we don't retry after writing something to disk. * mm-rmap-out-of-bounds-pte.dpatch Stop try_to_unmap_cluster() passing out-of-bounds pte to pte_unmap() * net-ipv4-netfilter-ip_queue-deadlock.dpatch Fix deadlock with ip_queue and tcp local input path. * asm-i386-mem-clobber.dpatch: Make sure gcc doesn't reorder memory accesses in strncmp and friends on i386. * drivers-acpi-pci_irq-elcr.dpatch: Make sure we call acpi_register_gsi() even for default PCI interrupt assignment. That's the part that keeps track of the ELCR register, and we want to make sure that the PCI interrupts are properly marked level/low. [ dann frazier ] * Merge in applicable fixes from 2.6.12.4 - netfilter-deadlock-ip6_queue.dpatch - rocket_c-fix-ldisc-ref-count.dpatch - early-vlan-fix.dpatch [ Simon Horman ] * drivers-sata-promise-sataii_tx2_tx4.dpatch Add SATAII TX2 and TX2/TX4 support to sata promise driver (Closes: #317286) * module-per-cpu-alignment-fix.dpatch Module per-cpu alignment cannot always be met From 2.6.12.5 * genelink-usbnet-skb-typo.dpatch fix gl_skb/skb type error in genelink driver in usbnet Backported From 2.6.12.6 * drivers-ide-ppp-pmac-build.dpatch Make sure BLK_DEV_IDEDMA_PCI is defined for pmac ide driver builds (closes: #321442) * fs-ext3-nfs-parent-fix.dpatch ext3 file systems mounted over nfs may lookup .. in dx directories causing an oops. (closes: #323557) * sparc-request_irq-in-RTC-fix.dpatch Use SA_SHIRQ in sparc specific code. From 2.6.13.1 * forcedeth-init-link-settings-in-nv_open.patch forcedeth: Initialize link settings in every nv_open() From 2.6.13.2 * fix-MPOL_F_VERIFY.patch Fix MPOL_F_VERIFY From 2.6.13.2 * fix-more-byte-to-dword-writes-to-PCI_ROM_ADDRESS-config-word.patch Fix up more strange byte writes to the PCI_ROM_ADDRESS config word From 2.6.13.2 * yenta-oops-fix.patch yenta oops fix From 2.6.13.3 * fix-de_thread-BUG_ON.patch Fix fs/exec.c:788 (de_thread()) BUG_ON From 2.6.13.3 * ipv6-fix-per-socket-multicast-filtering.patch fix IPv6 per-socket multicast filtering in exact-match case From 2.6.13.3 * ipvs-ip_vs_ftp-breaks-connections.patch ipvs: ip_vs_ftp breaks connections using persistence From 2.6.13.3 * ieee1394-sbp2-fixes-for-hot-unplug-and-module-unloading.dpatch ieee1394/sbp2: fixes for hot-unplug and module unloading From 2.6.13.4 * fix-sparc64-fpu-register-corruption.dpatch [SPARC64]: Fix userland FPU state corruption. From 2.6.13.4 [ dann frazier ] * drivers-block-raw-ioctl2.dpatch, drivers-block-ioctl-enotty.dpatch: Fix a bug in the block layer that causes a bootloader installation error under certain conditions - breaks installation on cciss devices. (closes: #354493) * Fix data corruption with dm-crypt over RAID5 (closes: #336153) * Fix VLAN support for 3c59x/90x series hardware (closes: #349774) * Fix erroneous calculation of 'len' parameter to NLMSG_PUT resulting in bogus 'error during NLMSG_PUT' messages (closes: #372621) * hp-diva-rmp3.dpatch, hp-diva-hurricane.dpatch: Add PCI IDs for newer Diva console ports oldstable/main/source/kernel-source-2.6.8_2.6.8-17.dsc oldstable/main/source/kernel-source-2.6.8_2.6.8-17.diff.gz oldstable/main/binary-all/kernel-patch-debian-2.6.8_2.6.8-17_all.deb oldstable/main/binary-all/kernel-source-2.6.8_2.6.8-17_all.deb oldstable/main/binary-all/kernel-tree-2.6.8_2.6.8-17_all.deb oldstable/main/binary-all/kernel-doc-2.6.8_2.6.8-17_all.deb kernel-source-2.6.8 (2.6.8-17) oldstable; urgency=high [ Simon Horman ] * drivers-net-via-rhine-wol-oops.dpatch (removed): This patch breaks the via-rhine driver and 2.6.8 and is completely bogus for this version of the kernel (closes: #311357) * drivers-media-vidio-bttv-vc100xp-detect.dpatch Allow Leadtek WinFast VC100 XP cards to work. * fs-jbd-checkpoint-assertion.dpatch Fix possible false assertion failure in log_do_checkpoint(). We might fail to detect that we actually made a progress when cleaning up the checkpoint lists if we don't retry after writing something to disk. * mm-rmap-out-of-bounds-pte.dpatch Stop try_to_unmap_cluster() passing out-of-bounds pte to pte_unmap() * net-ipv4-netfilter-ip_queue-deadlock.dpatch Fix deadlock with ip_queue and tcp local input path. * asm-i386-mem-clobber.dpatch: Make sure gcc doesn't reorder memory accesses in strncmp and friends on i386. * drivers-acpi-pci_irq-elcr.dpatch: Make sure we call acpi_register_gsi() even for default PCI interrupt assignment. That's the part that keeps track of the ELCR register, and we want to make sure that the PCI interrupts are properly marked level/low. [ dann frazier ] * Merge in applicable fixes from 2.6.12.4 - netfilter-deadlock-ip6_queue.dpatch - rocket_c-fix-ldisc-ref-count.dpatch - early-vlan-fix.dpatch [ Simon Horman ] * drivers-sata-promise-sataii_tx2_tx4.dpatch Add SATAII TX2 and TX2/TX4 support to sata promise driver (Closes: #317286) * module-per-cpu-alignment-fix.dpatch Module per-cpu alignment cannot always be met From 2.6.12.5 * genelink-usbnet-skb-typo.dpatch fix gl_skb/skb type error in genelink driver in usbnet Backported From 2.6.12.6 * drivers-ide-ppp-pmac-build.dpatch Make sure BLK_DEV_IDEDMA_PCI is defined for pmac ide driver builds (closes: #321442) * fs-ext3-nfs-parent-fix.dpatch ext3 file systems mounted over nfs may lookup .. in dx directories causing an oops. (closes: #323557) * sparc-request_irq-in-RTC-fix.dpatch Use SA_SHIRQ in sparc specific code. From 2.6.13.1 * forcedeth-init-link-settings-in-nv_open.patch forcedeth: Initialize link settings in every nv_open() From 2.6.13.2 * fix-MPOL_F_VERIFY.patch Fix MPOL_F_VERIFY From 2.6.13.2 * fix-more-byte-to-dword-writes-to-PCI_ROM_ADDRESS-config-word.patch Fix up more strange byte writes to the PCI_ROM_ADDRESS config word From 2.6.13.2 * yenta-oops-fix.patch yenta oops fix From 2.6.13.3 * fix-de_thread-BUG_ON.patch Fix fs/exec.c:788 (de_thread()) BUG_ON From 2.6.13.3 * ipv6-fix-per-socket-multicast-filtering.patch fix IPv6 per-socket multicast filtering in exact-match case From 2.6.13.3 * ipvs-ip_vs_ftp-breaks-connections.patch ipvs: ip_vs_ftp breaks connections using persistence From 2.6.13.3 * ieee1394-sbp2-fixes-for-hot-unplug-and-module-unloading.dpatch ieee1394/sbp2: fixes for hot-unplug and module unloading From 2.6.13.4 * fix-sparc64-fpu-register-corruption.dpatch [SPARC64]: Fix userland FPU state corruption. From 2.6.13.4 [ dann frazier ] * drivers-block-raw-ioctl2.dpatch, drivers-block-ioctl-enotty.dpatch: Fix a bug in the block layer that causes a bootloader installation error under certain conditions - breaks installation on cciss devices. (closes: #354493) * Fix data corruption with dm-crypt over RAID5 (closes: #336153) * Fix VLAN support for 3c59x/90x series hardware (closes: #349774) * Fix erroneous calculation of 'len' parameter to NLMSG_PUT resulting in bogus 'error during NLMSG_PUT' messages (closes: #372621) * hp-diva-rmp3.dpatch, hp-diva-hurricane.dpatch: Add PCI IDs for newer Diva console ports oldstable/main/binary-arm/kexi_0.1cvs20050408-1_arm.deb oldstable/main/binary-arm/kexi-postgresql-driver_0.1cvs20050408-1_arm.deb oldstable/main/binary-arm/kexi-mysql-driver_0.1cvs20050408-1_arm.deb oldstable/main/binary-arm/libkexi-dev_0.1cvs20050408-1_arm.deb kexi (0.1cvs20050408-1) unstable; urgency=low * New CVS Snapshot * new upload packages do not have missing files more and closes all the related bugs (Closes: #303525, #260613, #298172) oldstable/main/binary-ia64/kimdaba_2.0-4_ia64.deb kimdaba (2.0-4) unstable; urgency=low * Broken i386 package on Sid, unnecessary dependency on kdelibs 4:4.3.0 removed (closes: #309752). * Upstream KDE-help documentation is only in Docbook format. Only HTML, DebianDoc-SGML or Text are acceptable. Removed debian/kimdaba.doc-base (closes: #308985). oldstable/main/binary-alpha/libkadm55_1.3.6-2sarge5_alpha.deb oldstable/main/binary-alpha/libkrb53_1.3.6-2sarge5_alpha.deb oldstable/main/binary-alpha/krb5-user_1.3.6-2sarge5_alpha.deb oldstable/main/binary-alpha/krb5-clients_1.3.6-2sarge5_alpha.deb oldstable/main/binary-alpha/krb5-rsh-server_1.3.6-2sarge5_alpha.deb oldstable/main/binary-alpha/krb5-ftpd_1.3.6-2sarge5_alpha.deb oldstable/main/binary-alpha/krb5-telnetd_1.3.6-2sarge5_alpha.deb oldstable/main/binary-alpha/krb5-kdc_1.3.6-2sarge5_alpha.deb oldstable/main/binary-alpha/krb5-admin-server_1.3.6-2sarge5_alpha.deb oldstable/main/binary-alpha/libkrb5-dev_1.3.6-2sarge5_alpha.deb krb5 (1.3.6-2sarge5) oldstable-security; urgency=emergency * MIT-SA-2007-4: The kadmin RPC library can free an uninitialized pointer or write past the end of a stack buffer. This may lead to execution of arbitrary code. (CVE-2007-2442, CVE-2007-2443) * MIT-SA-2007-5: kadmind is vulnerable to a stack buffer overflow that may lead to execution of arbitrary code. (CVE-2007-2798) oldstable/main/binary-arm/libkadm55_1.3.6-2sarge5_arm.deb oldstable/main/binary-arm/libkrb53_1.3.6-2sarge5_arm.deb oldstable/main/binary-arm/krb5-user_1.3.6-2sarge5_arm.deb oldstable/main/binary-arm/krb5-clients_1.3.6-2sarge5_arm.deb oldstable/main/binary-arm/krb5-rsh-server_1.3.6-2sarge5_arm.deb oldstable/main/binary-arm/krb5-ftpd_1.3.6-2sarge5_arm.deb oldstable/main/binary-arm/krb5-telnetd_1.3.6-2sarge5_arm.deb oldstable/main/binary-arm/krb5-kdc_1.3.6-2sarge5_arm.deb oldstable/main/binary-arm/krb5-admin-server_1.3.6-2sarge5_arm.deb oldstable/main/binary-arm/libkrb5-dev_1.3.6-2sarge5_arm.deb krb5 (1.3.6-2sarge5) oldstable-security; urgency=emergency * MIT-SA-2007-4: The kadmin RPC library can free an uninitialized pointer or write past the end of a stack buffer. This may lead to execution of arbitrary code. (CVE-2007-2442, CVE-2007-2443) * MIT-SA-2007-5: kadmind is vulnerable to a stack buffer overflow that may lead to execution of arbitrary code. (CVE-2007-2798) oldstable/main/binary-hppa/libkadm55_1.3.6-2sarge5_hppa.deb oldstable/main/binary-hppa/libkrb53_1.3.6-2sarge5_hppa.deb oldstable/main/binary-hppa/krb5-user_1.3.6-2sarge5_hppa.deb oldstable/main/binary-hppa/krb5-clients_1.3.6-2sarge5_hppa.deb oldstable/main/binary-hppa/krb5-rsh-server_1.3.6-2sarge5_hppa.deb oldstable/main/binary-hppa/krb5-ftpd_1.3.6-2sarge5_hppa.deb oldstable/main/binary-hppa/krb5-telnetd_1.3.6-2sarge5_hppa.deb oldstable/main/binary-hppa/krb5-kdc_1.3.6-2sarge5_hppa.deb oldstable/main/binary-hppa/krb5-admin-server_1.3.6-2sarge5_hppa.deb oldstable/main/binary-hppa/libkrb5-dev_1.3.6-2sarge5_hppa.deb krb5 (1.3.6-2sarge5) oldstable-security; urgency=emergency * MIT-SA-2007-4: The kadmin RPC library can free an uninitialized pointer or write past the end of a stack buffer. This may lead to execution of arbitrary code. (CVE-2007-2442, CVE-2007-2443) * MIT-SA-2007-5: kadmind is vulnerable to a stack buffer overflow that may lead to execution of arbitrary code. (CVE-2007-2798) oldstable/main/source/krb5_1.3.6-2sarge5.dsc oldstable/main/source/krb5_1.3.6-2sarge5.diff.gz oldstable/main/binary-all/krb5-doc_1.3.6-2sarge5_all.deb oldstable/main/binary-i386/libkadm55_1.3.6-2sarge5_i386.deb oldstable/main/binary-i386/libkrb53_1.3.6-2sarge5_i386.deb oldstable/main/binary-i386/krb5-user_1.3.6-2sarge5_i386.deb oldstable/main/binary-i386/krb5-clients_1.3.6-2sarge5_i386.deb oldstable/main/binary-i386/krb5-rsh-server_1.3.6-2sarge5_i386.deb oldstable/main/binary-i386/krb5-ftpd_1.3.6-2sarge5_i386.deb oldstable/main/binary-i386/krb5-telnetd_1.3.6-2sarge5_i386.deb oldstable/main/binary-i386/krb5-kdc_1.3.6-2sarge5_i386.deb oldstable/main/binary-i386/krb5-admin-server_1.3.6-2sarge5_i386.deb oldstable/main/binary-i386/libkrb5-dev_1.3.6-2sarge5_i386.deb krb5 (1.3.6-2sarge5) oldstable-security; urgency=emergency * MIT-SA-2007-4: The kadmin RPC library can free an uninitialized pointer or write past the end of a stack buffer. This may lead to execution of arbitrary code. (CVE-2007-2442, CVE-2007-2443) * MIT-SA-2007-5: kadmind is vulnerable to a stack buffer overflow that may lead to execution of arbitrary code. (CVE-2007-2798) oldstable/main/binary-ia64/libkadm55_1.3.6-2sarge5_ia64.deb oldstable/main/binary-ia64/libkrb53_1.3.6-2sarge5_ia64.deb oldstable/main/binary-ia64/krb5-user_1.3.6-2sarge5_ia64.deb oldstable/main/binary-ia64/krb5-clients_1.3.6-2sarge5_ia64.deb oldstable/main/binary-ia64/krb5-rsh-server_1.3.6-2sarge5_ia64.deb oldstable/main/binary-ia64/krb5-ftpd_1.3.6-2sarge5_ia64.deb oldstable/main/binary-ia64/krb5-telnetd_1.3.6-2sarge5_ia64.deb oldstable/main/binary-ia64/krb5-kdc_1.3.6-2sarge5_ia64.deb oldstable/main/binary-ia64/krb5-admin-server_1.3.6-2sarge5_ia64.deb oldstable/main/binary-ia64/libkrb5-dev_1.3.6-2sarge5_ia64.deb krb5 (1.3.6-2sarge5) oldstable-security; urgency=emergency * MIT-SA-2007-4: The kadmin RPC library can free an uninitialized pointer or write past the end of a stack buffer. This may lead to execution of arbitrary code. (CVE-2007-2442, CVE-2007-2443) * MIT-SA-2007-5: kadmind is vulnerable to a stack buffer overflow that may lead to execution of arbitrary code. (CVE-2007-2798) oldstable/main/binary-m68k/libkadm55_1.3.6-2sarge5_m68k.deb oldstable/main/binary-m68k/libkrb53_1.3.6-2sarge5_m68k.deb oldstable/main/binary-m68k/krb5-user_1.3.6-2sarge5_m68k.deb oldstable/main/binary-m68k/krb5-clients_1.3.6-2sarge5_m68k.deb oldstable/main/binary-m68k/krb5-rsh-server_1.3.6-2sarge5_m68k.deb oldstable/main/binary-m68k/krb5-ftpd_1.3.6-2sarge5_m68k.deb oldstable/main/binary-m68k/krb5-telnetd_1.3.6-2sarge5_m68k.deb oldstable/main/binary-m68k/krb5-kdc_1.3.6-2sarge5_m68k.deb oldstable/main/binary-m68k/krb5-admin-server_1.3.6-2sarge5_m68k.deb oldstable/main/binary-m68k/libkrb5-dev_1.3.6-2sarge5_m68k.deb krb5 (1.3.6-2sarge5) oldstable-security; urgency=emergency * MIT-SA-2007-4: The kadmin RPC library can free an uninitialized pointer or write past the end of a stack buffer. This may lead to execution of arbitrary code. (CVE-2007-2442, CVE-2007-2443) * MIT-SA-2007-5: kadmind is vulnerable to a stack buffer overflow that may lead to execution of arbitrary code. (CVE-2007-2798) oldstable/main/binary-mips/libkadm55_1.3.6-2sarge5_mips.deb oldstable/main/binary-mips/libkrb53_1.3.6-2sarge5_mips.deb oldstable/main/binary-mips/krb5-user_1.3.6-2sarge5_mips.deb oldstable/main/binary-mips/krb5-clients_1.3.6-2sarge5_mips.deb oldstable/main/binary-mips/krb5-rsh-server_1.3.6-2sarge5_mips.deb oldstable/main/binary-mips/krb5-ftpd_1.3.6-2sarge5_mips.deb oldstable/main/binary-mips/krb5-telnetd_1.3.6-2sarge5_mips.deb oldstable/main/binary-mips/krb5-kdc_1.3.6-2sarge5_mips.deb oldstable/main/binary-mips/krb5-admin-server_1.3.6-2sarge5_mips.deb oldstable/main/binary-mips/libkrb5-dev_1.3.6-2sarge5_mips.deb krb5 (1.3.6-2sarge5) oldstable-security; urgency=emergency * MIT-SA-2007-4: The kadmin RPC library can free an uninitialized pointer or write past the end of a stack buffer. This may lead to execution of arbitrary code. (CVE-2007-2442, CVE-2007-2443) * MIT-SA-2007-5: kadmind is vulnerable to a stack buffer overflow that may lead to execution of arbitrary code. (CVE-2007-2798) oldstable/main/binary-mipsel/libkadm55_1.3.6-2sarge5_mipsel.deb oldstable/main/binary-mipsel/libkrb53_1.3.6-2sarge5_mipsel.deb oldstable/main/binary-mipsel/krb5-user_1.3.6-2sarge5_mipsel.deb oldstable/main/binary-mipsel/krb5-clients_1.3.6-2sarge5_mipsel.deb oldstable/main/binary-mipsel/krb5-rsh-server_1.3.6-2sarge5_mipsel.deb oldstable/main/binary-mipsel/krb5-ftpd_1.3.6-2sarge5_mipsel.deb oldstable/main/binary-mipsel/krb5-telnetd_1.3.6-2sarge5_mipsel.deb oldstable/main/binary-mipsel/krb5-kdc_1.3.6-2sarge5_mipsel.deb oldstable/main/binary-mipsel/krb5-admin-server_1.3.6-2sarge5_mipsel.deb oldstable/main/binary-mipsel/libkrb5-dev_1.3.6-2sarge5_mipsel.deb krb5 (1.3.6-2sarge5) oldstable-security; urgency=emergency * MIT-SA-2007-4: The kadmin RPC library can free an uninitialized pointer or write past the end of a stack buffer. This may lead to execution of arbitrary code. (CVE-2007-2442, CVE-2007-2443) * MIT-SA-2007-5: kadmind is vulnerable to a stack buffer overflow that may lead to execution of arbitrary code. (CVE-2007-2798) oldstable/main/binary-powerpc/libkadm55_1.3.6-2sarge5_powerpc.deb oldstable/main/binary-powerpc/libkrb53_1.3.6-2sarge5_powerpc.deb oldstable/main/binary-powerpc/krb5-user_1.3.6-2sarge5_powerpc.deb oldstable/main/binary-powerpc/krb5-clients_1.3.6-2sarge5_powerpc.deb oldstable/main/binary-powerpc/krb5-rsh-server_1.3.6-2sarge5_powerpc.deb oldstable/main/binary-powerpc/krb5-ftpd_1.3.6-2sarge5_powerpc.deb oldstable/main/binary-powerpc/krb5-telnetd_1.3.6-2sarge5_powerpc.deb oldstable/main/binary-powerpc/krb5-kdc_1.3.6-2sarge5_powerpc.deb oldstable/main/binary-powerpc/krb5-admin-server_1.3.6-2sarge5_powerpc.deb oldstable/main/binary-powerpc/libkrb5-dev_1.3.6-2sarge5_powerpc.deb krb5 (1.3.6-2sarge5) oldstable-security; urgency=emergency * MIT-SA-2007-4: The kadmin RPC library can free an uninitialized pointer or write past the end of a stack buffer. This may lead to execution of arbitrary code. (CVE-2007-2442, CVE-2007-2443) * MIT-SA-2007-5: kadmind is vulnerable to a stack buffer overflow that may lead to execution of arbitrary code. (CVE-2007-2798) oldstable/main/binary-s390/libkadm55_1.3.6-2sarge5_s390.deb oldstable/main/binary-s390/libkrb53_1.3.6-2sarge5_s390.deb oldstable/main/binary-s390/krb5-user_1.3.6-2sarge5_s390.deb oldstable/main/binary-s390/krb5-clients_1.3.6-2sarge5_s390.deb oldstable/main/binary-s390/krb5-rsh-server_1.3.6-2sarge5_s390.deb oldstable/main/binary-s390/krb5-ftpd_1.3.6-2sarge5_s390.deb oldstable/main/binary-s390/krb5-telnetd_1.3.6-2sarge5_s390.deb oldstable/main/binary-s390/krb5-kdc_1.3.6-2sarge5_s390.deb oldstable/main/binary-s390/krb5-admin-server_1.3.6-2sarge5_s390.deb oldstable/main/binary-s390/libkrb5-dev_1.3.6-2sarge5_s390.deb krb5 (1.3.6-2sarge5) oldstable-security; urgency=emergency * MIT-SA-2007-4: The kadmin RPC library can free an uninitialized pointer or write past the end of a stack buffer. This may lead to execution of arbitrary code. (CVE-2007-2442, CVE-2007-2443) * MIT-SA-2007-5: kadmind is vulnerable to a stack buffer overflow that may lead to execution of arbitrary code. (CVE-2007-2798) oldstable/main/binary-sparc/libkadm55_1.3.6-2sarge5_sparc.deb oldstable/main/binary-sparc/libkrb53_1.3.6-2sarge5_sparc.deb oldstable/main/binary-sparc/krb5-user_1.3.6-2sarge5_sparc.deb oldstable/main/binary-sparc/krb5-clients_1.3.6-2sarge5_sparc.deb oldstable/main/binary-sparc/krb5-rsh-server_1.3.6-2sarge5_sparc.deb oldstable/main/binary-sparc/krb5-ftpd_1.3.6-2sarge5_sparc.deb oldstable/main/binary-sparc/krb5-telnetd_1.3.6-2sarge5_sparc.deb oldstable/main/binary-sparc/krb5-kdc_1.3.6-2sarge5_sparc.deb oldstable/main/binary-sparc/krb5-admin-server_1.3.6-2sarge5_sparc.deb oldstable/main/binary-sparc/libkrb5-dev_1.3.6-2sarge5_sparc.deb krb5 (1.3.6-2sarge5) oldstable-security; urgency=emergency * MIT-SA-2007-4: The kadmin RPC library can free an uninitialized pointer or write past the end of a stack buffer. This may lead to execution of arbitrary code. (CVE-2007-2442, CVE-2007-2443) * MIT-SA-2007-5: kadmind is vulnerable to a stack buffer overflow that may lead to execution of arbitrary code. (CVE-2007-2798) oldstable/main/source/ldap-account-manager_0.4.9-2sarge1.dsc oldstable/main/source/ldap-account-manager_0.4.9.orig.tar.gz oldstable/main/source/ldap-account-manager_0.4.9-2sarge1.diff.gz oldstable/main/binary-all/ldap-account-manager_0.4.9-2sarge1_all.deb ldap-account-manager (0.4.9-2sarge1) oldstable-security; urgency=high * Non-maintainer upload by the security team. * Fix improper quoting of user description field in lib/modules.inc that lead to a cross-site scripting vulnerability. (CVE-2007-1840) * Fix local root vulnerability in lamdaemon.pl that allowed local users to execute arbitrary code by specifying a PATH variable pointing to a malicius rm program (CVE-2006-7191) oldstable/main/binary-arm/leafpad_0.7.9-4_arm.deb leafpad (0.7.9-4) unstable; urgency=low * debian/leafpad.lintian-overrides, debian/source.lintian-overrides - use override to prevent lintian warning, thanks Lucas Wall * upload to official debian repository (Closes: #274512, #288577) oldstable/main/binary-alpha/libapache-mod-jk_1.2.5-2sarge1_alpha.deb libapache-mod-jk (1:1.2.5-2sarge1) oldstable-security; urgency=high * Forward unparsed URI to tomcat. Closes: #425836. CVE-2007-1860 oldstable/main/binary-arm/libapache-mod-jk_1.2.5-2sarge1_arm.deb libapache-mod-jk (1:1.2.5-2sarge1) oldstable-security; urgency=high * Forward unparsed URI to tomcat. Closes: #425836. CVE-2007-1860 oldstable/main/binary-hppa/libapache-mod-jk_1.2.5-2sarge1_hppa.deb libapache-mod-jk (1:1.2.5-2sarge1) oldstable-security; urgency=high * Forward unparsed URI to tomcat. Closes: #425836. CVE-2007-1860 oldstable/main/source/libapache-mod-jk_1.2.5-2sarge1.dsc oldstable/main/source/libapache-mod-jk_1.2.5-2sarge1.diff.gz oldstable/main/binary-i386/libapache-mod-jk_1.2.5-2sarge1_i386.deb libapache-mod-jk (1:1.2.5-2sarge1) oldstable-security; urgency=high * Forward unparsed URI to tomcat. Closes: #425836. CVE-2007-1860 oldstable/main/binary-ia64/libapache-mod-jk_1.2.5-2sarge1_ia64.deb libapache-mod-jk (1:1.2.5-2sarge1) oldstable-security; urgency=high * Forward unparsed URI to tomcat. Closes: #425836. CVE-2007-1860 oldstable/main/binary-m68k/libapache-mod-jk_1.2.5-2sarge1_m68k.deb libapache-mod-jk (1:1.2.5-2sarge1) oldstable-security; urgency=high * Forward unparsed URI to tomcat. Closes: #425836. CVE-2007-1860 oldstable/main/binary-mips/libapache-mod-jk_1.2.5-2sarge1_mips.deb libapache-mod-jk (1:1.2.5-2sarge1) oldstable-security; urgency=high * Forward unparsed URI to tomcat. Closes: #425836. CVE-2007-1860 oldstable/main/binary-mipsel/libapache-mod-jk_1.2.5-2sarge1_mipsel.deb libapache-mod-jk (1:1.2.5-2sarge1) oldstable-security; urgency=high * Forward unparsed URI to tomcat. Closes: #425836. CVE-2007-1860 oldstable/main/binary-powerpc/libapache-mod-jk_1.2.5-2sarge1_powerpc.deb libapache-mod-jk (1:1.2.5-2sarge1) oldstable-security; urgency=high * Forward unparsed URI to tomcat. Closes: #425836. CVE-2007-1860 oldstable/main/binary-s390/libapache-mod-jk_1.2.5-2sarge1_s390.deb libapache-mod-jk (1:1.2.5-2sarge1) oldstable-security; urgency=high * Forward unparsed URI to tomcat. Closes: #425836. CVE-2007-1860 oldstable/main/binary-sparc/libapache-mod-jk_1.2.5-2sarge1_sparc.deb libapache-mod-jk (1:1.2.5-2sarge1) oldstable-security; urgency=high * Forward unparsed URI to tomcat. Closes: #425836. CVE-2007-1860 oldstable/main/binary-arm/libdbd-sqlite2-perl_0.33-3_arm.deb libdbd-sqlite2-perl (2:0.33-3) unstable; urgency=low * debian/control: changed maintainer to DPG. oldstable/main/binary-alpha/libexif-dev_0.6.9-6sarge1_alpha.deb oldstable/main/binary-alpha/libexif10_0.6.9-6sarge1_alpha.deb libexif (0.6.9-6sarge1) oldstable-security; urgency=high * Non-maintainer upload by The Security Team * Fix integer overflow in loading images. [CVE-2006-4168] oldstable/main/binary-arm/libexif-dev_0.6.9-6sarge1_arm.deb oldstable/main/binary-arm/libexif10_0.6.9-6sarge1_arm.deb libexif (0.6.9-6sarge1) oldstable-security; urgency=high * Non-maintainer upload by The Security Team * Fix integer overflow in loading images. [CVE-2006-4168] oldstable/main/binary-hppa/libexif-dev_0.6.9-6sarge1_hppa.deb oldstable/main/binary-hppa/libexif10_0.6.9-6sarge1_hppa.deb libexif (0.6.9-6sarge1) oldstable-security; urgency=high * Non-maintainer upload by The Security Team * Fix integer overflow in loading images. [CVE-2006-4168] oldstable/main/source/libexif_0.6.9-6sarge1.dsc oldstable/main/source/libexif_0.6.9-6sarge1.diff.gz oldstable/main/binary-i386/libexif-dev_0.6.9-6sarge1_i386.deb oldstable/main/binary-i386/libexif10_0.6.9-6sarge1_i386.deb libexif (0.6.9-6sarge1) oldstable-security; urgency=high * Non-maintainer upload by The Security Team * Fix integer overflow in loading images. [CVE-2006-4168] oldstable/main/binary-ia64/libexif-dev_0.6.9-6sarge1_ia64.deb oldstable/main/binary-ia64/libexif10_0.6.9-6sarge1_ia64.deb libexif (0.6.9-6sarge1) oldstable-security; urgency=high * Non-maintainer upload by The Security Team * Fix integer overflow in loading images. [CVE-2006-4168] oldstable/main/binary-m68k/libexif-dev_0.6.9-6sarge1_m68k.deb oldstable/main/binary-m68k/libexif10_0.6.9-6sarge1_m68k.deb libexif (0.6.9-6sarge1) oldstable-security; urgency=high * Non-maintainer upload by The Security Team * Fix integer overflow in loading images. [CVE-2006-4168] oldstable/main/binary-mips/libexif-dev_0.6.9-6sarge1_mips.deb oldstable/main/binary-mips/libexif10_0.6.9-6sarge1_mips.deb libexif (0.6.9-6sarge1) oldstable-security; urgency=high * Non-maintainer upload by The Security Team * Fix integer overflow in loading images. [CVE-2006-4168] oldstable/main/binary-mipsel/libexif-dev_0.6.9-6sarge1_mipsel.deb oldstable/main/binary-mipsel/libexif10_0.6.9-6sarge1_mipsel.deb libexif (0.6.9-6sarge1) oldstable-security; urgency=high * Non-maintainer upload by The Security Team * Fix integer overflow in loading images. [CVE-2006-4168] oldstable/main/binary-powerpc/libexif-dev_0.6.9-6sarge1_powerpc.deb oldstable/main/binary-powerpc/libexif10_0.6.9-6sarge1_powerpc.deb libexif (0.6.9-6sarge1) oldstable-security; urgency=high * Non-maintainer upload by The Security Team * Fix integer overflow in loading images. [CVE-2006-4168] oldstable/main/binary-s390/libexif-dev_0.6.9-6sarge1_s390.deb oldstable/main/binary-s390/libexif10_0.6.9-6sarge1_s390.deb libexif (0.6.9-6sarge1) oldstable-security; urgency=high * Non-maintainer upload by The Security Team * Fix integer overflow in loading images. [CVE-2006-4168] oldstable/main/binary-sparc/libexif-dev_0.6.9-6sarge1_sparc.deb oldstable/main/binary-sparc/libexif10_0.6.9-6sarge1_sparc.deb libexif (0.6.9-6sarge1) oldstable-security; urgency=high * Non-maintainer upload by The Security Team * Fix integer overflow in loading images. [CVE-2006-4168] oldstable/main/binary-alpha/extract_0.4.2-2sarge6_alpha.deb oldstable/main/binary-alpha/libextractor1_0.4.2-2sarge6_alpha.deb oldstable/main/binary-alpha/libextractor1-dev_0.4.2-2sarge6_alpha.deb libextractor (0.4.2-2sarge6) oldstable-security; urgency=high * Fix integer overflow in stream predictor (CVE-2007-3387) oldstable/main/binary-arm/extract_0.4.2-2sarge6_arm.deb oldstable/main/binary-arm/libextractor1_0.4.2-2sarge6_arm.deb oldstable/main/binary-arm/libextractor1-dev_0.4.2-2sarge6_arm.deb libextractor (0.4.2-2sarge6) oldstable-security; urgency=high * Fix integer overflow in stream predictor (CVE-2007-3387) oldstable/main/binary-hppa/extract_0.4.2-2sarge6_hppa.deb oldstable/main/binary-hppa/libextractor1_0.4.2-2sarge6_hppa.deb oldstable/main/binary-hppa/libextractor1-dev_0.4.2-2sarge6_hppa.deb libextractor (0.4.2-2sarge6) oldstable-security; urgency=high * Fix integer overflow in stream predictor (CVE-2007-3387) oldstable/main/source/libextractor_0.4.2-2sarge6.dsc oldstable/main/source/libextractor_0.4.2-2sarge6.diff.gz oldstable/main/binary-i386/extract_0.4.2-2sarge6_i386.deb oldstable/main/binary-i386/libextractor1_0.4.2-2sarge6_i386.deb oldstable/main/binary-i386/libextractor1-dev_0.4.2-2sarge6_i386.deb libextractor (0.4.2-2sarge6) oldstable-security; urgency=high * Fix integer overflow in stream predictor (CVE-2007-3387) oldstable/main/binary-ia64/extract_0.4.2-2sarge6_ia64.deb oldstable/main/binary-ia64/libextractor1_0.4.2-2sarge6_ia64.deb oldstable/main/binary-ia64/libextractor1-dev_0.4.2-2sarge6_ia64.deb libextractor (0.4.2-2sarge6) oldstable-security; urgency=high * Fix integer overflow in stream predictor (CVE-2007-3387) oldstable/main/binary-m68k/extract_0.4.2-2sarge6_m68k.deb oldstable/main/binary-m68k/libextractor1_0.4.2-2sarge6_m68k.deb oldstable/main/binary-m68k/libextractor1-dev_0.4.2-2sarge6_m68k.deb libextractor (0.4.2-2sarge6) oldstable-security; urgency=high * Fix integer overflow in stream predictor (CVE-2007-3387) oldstable/main/binary-mips/extract_0.4.2-2sarge6_mips.deb oldstable/main/binary-mips/libextractor1_0.4.2-2sarge6_mips.deb oldstable/main/binary-mips/libextractor1-dev_0.4.2-2sarge6_mips.deb libextractor (0.4.2-2sarge6) oldstable-security; urgency=high * Fix integer overflow in stream predictor (CVE-2007-3387) oldstable/main/binary-mipsel/extract_0.4.2-2sarge6_mipsel.deb oldstable/main/binary-mipsel/libextractor1_0.4.2-2sarge6_mipsel.deb oldstable/main/binary-mipsel/libextractor1-dev_0.4.2-2sarge6_mipsel.deb libextractor (0.4.2-2sarge6) oldstable-security; urgency=high * Fix integer overflow in stream predictor (CVE-2007-3387) oldstable/main/binary-powerpc/extract_0.4.2-2sarge6_powerpc.deb oldstable/main/binary-powerpc/libextractor1_0.4.2-2sarge6_powerpc.deb oldstable/main/binary-powerpc/libextractor1-dev_0.4.2-2sarge6_powerpc.deb libextractor (0.4.2-2sarge6) oldstable-security; urgency=high * Fix integer overflow in stream predictor (CVE-2007-3387) oldstable/main/binary-s390/extract_0.4.2-2sarge6_s390.deb oldstable/main/binary-s390/libextractor1_0.4.2-2sarge6_s390.deb oldstable/main/binary-s390/libextractor1-dev_0.4.2-2sarge6_s390.deb libextractor (0.4.2-2sarge6) oldstable-security; urgency=high * Fix integer overflow in stream predictor (CVE-2007-3387) oldstable/main/binary-sparc/extract_0.4.2-2sarge6_sparc.deb oldstable/main/binary-sparc/libextractor1_0.4.2-2sarge6_sparc.deb oldstable/main/binary-sparc/libextractor1-dev_0.4.2-2sarge6_sparc.deb libextractor (0.4.2-2sarge6) oldstable-security; urgency=high * Fix integer overflow in stream predictor (CVE-2007-3387) oldstable/main/binary-sparc/libgconf-java_2.8.3.1-2_sparc.deb libgconf-java (2.8.3.1-2) unstable; urgency=medium * Changed libgcj4-dev build dependency to new libgcj-dev * Clean *.Plo files. Closes: #303470. Thanks to Andreas Jochens * Patch Makefile.in to fix distclean and run full distclean. Closes: #304643 oldstable/main/binary-powerpc/libglade-java_2.8.3.1-2_powerpc.deb libglade-java (2.8.3.1-2) unstable; urgency=medium * Patched Makefile.in to distclean correctly. * Build-depend on libgcj-dev instead of libgcj4-dev * Clean up *.Plo files oldstable/main/binary-sparc/libgnome-jni_2.8.3.1-2_sparc.deb libgnome-java (2.8.3.1-2) unstable; urgency=medium * Use distclean as clean target, patch scripts to ensure *.ac and *.am aren't deleted. Closes: #303646 * Build-depend on libgcj-dev instead of libgcj4-dev * Clean up *.Plo files oldstable/main/binary-alpha/libnss-ldap_238-1sarge1_alpha.deb libnss-ldap (238-1sarge1) oldstable-security; urgency=high * Non-maintainer upload by the security team * Fix race condition, which could lead to a DoS, when applications use pthread and fork after a call to nss_ldap Fixes: CVE-2007-5794 oldstable/main/binary-amd64/libnss-ldap_238-1sarge1_amd64.deb libnss-ldap (238-1sarge1) oldstable-security; urgency=high * Non-maintainer upload by the security team * Fix race condition, which could lead to a DoS, when applications use pthread and fork after a call to nss_ldap Fixes: CVE-2007-5794 oldstable/main/binary-arm/libnss-ldap_238-1sarge1_arm.deb libnss-ldap (238-1sarge1) oldstable-security; urgency=high * Non-maintainer upload by the security team * Fix race condition, which could lead to a DoS, when applications use pthread and fork after a call to nss_ldap Fixes: CVE-2007-5794 oldstable/main/binary-hppa/libnss-ldap_238-1sarge1_hppa.deb libnss-ldap (238-1sarge1) oldstable-security; urgency=high * Non-maintainer upload by the security team * Fix race condition, which could lead to a DoS, when applications use pthread and fork after a call to nss_ldap Fixes: CVE-2007-5794 oldstable/main/source/libnss-ldap_238-1sarge1.dsc oldstable/main/source/libnss-ldap_238.orig.tar.gz oldstable/main/source/libnss-ldap_238-1sarge1.diff.gz oldstable/main/binary-i386/libnss-ldap_238-1sarge1_i386.deb libnss-ldap (238-1sarge1) oldstable-security; urgency=high * Non-maintainer upload by the security team * Fix race condition, which could lead to a DoS, when applications use pthread and fork after a call to nss_ldap Fixes: CVE-2007-5794 oldstable/main/binary-ia64/libnss-ldap_238-1sarge1_ia64.deb libnss-ldap (238-1sarge1) oldstable-security; urgency=high * Non-maintainer upload by the security team * Fix race condition, which could lead to a DoS, when applications use pthread and fork after a call to nss_ldap Fixes: CVE-2007-5794 oldstable/main/binary-m68k/libnss-ldap_238-1sarge1_m68k.deb libnss-ldap (238-1sarge1) oldstable-security; urgency=high * Non-maintainer upload by the security team * Fix race condition, which could lead to a DoS, when applications use pthread and fork after a call to nss_ldap Fixes: CVE-2007-5794 oldstable/main/binary-mips/libnss-ldap_238-1sarge1_mips.deb libnss-ldap (238-1sarge1) oldstable-security; urgency=high * Non-maintainer upload by the security team * Fix race condition, which could lead to a DoS, when applications use pthread and fork after a call to nss_ldap Fixes: CVE-2007-5794 oldstable/main/binary-mipsel/libnss-ldap_238-1sarge1_mipsel.deb libnss-ldap (238-1sarge1) oldstable-security; urgency=high * Non-maintainer upload by the security team * Fix race condition, which could lead to a DoS, when applications use pthread and fork after a call to nss_ldap Fixes: CVE-2007-5794 oldstable/main/binary-powerpc/libnss-ldap_238-1sarge1_powerpc.deb libnss-ldap (238-1sarge1) oldstable-security; urgency=high * Non-maintainer upload by the security team * Fix race condition, which could lead to a DoS, when applications use pthread and fork after a call to nss_ldap Fixes: CVE-2007-5794 oldstable/main/binary-s390/libnss-ldap_238-1sarge1_s390.deb libnss-ldap (238-1sarge1) oldstable-security; urgency=high * Non-maintainer upload by the security team * Fix race condition, which could lead to a DoS, when applications use pthread and fork after a call to nss_ldap Fixes: CVE-2007-5794 oldstable/main/binary-sparc/libnss-ldap_238-1sarge1_sparc.deb libnss-ldap (238-1sarge1) oldstable-security; urgency=high * Non-maintainer upload by the security team * Fix race condition, which could lead to a DoS, when applications use pthread and fork after a call to nss_ldap Fixes: CVE-2007-5794 oldstable/main/binary-alpha/libopenssl-ruby1.6_0.1.4a-1sarge1_alpha.deb libopenssl-ruby (0.1.4a-1sarge1) oldstable-security; urgency=high * security fixes for CVE-2007-5162. It is backported r13500, r13501 and r13657 from ruby_1_8 branch. oldstable/main/binary-amd64/libopenssl-ruby1.6_0.1.4a-1sarge1_amd64.deb libopenssl-ruby (0.1.4a-1sarge1) oldstable-security; urgency=high * security fixes for CVE-2007-5162. It is backported r13500, r13501 and r13657 from ruby_1_8 branch. oldstable/main/binary-arm/libopenssl-ruby1.6_0.1.4a-1sarge1_arm.deb libopenssl-ruby (0.1.4a-1sarge1) oldstable-security; urgency=high * security fixes for CVE-2007-5162. It is backported r13500, r13501 and r13657 from ruby_1_8 branch. oldstable/main/binary-hppa/libopenssl-ruby1.6_0.1.4a-1sarge1_hppa.deb libopenssl-ruby (0.1.4a-1sarge1) oldstable-security; urgency=high * security fixes for CVE-2007-5162. It is backported r13500, r13501 and r13657 from ruby_1_8 branch. oldstable/main/source/libopenssl-ruby_0.1.4a-1sarge1.dsc oldstable/main/source/libopenssl-ruby_0.1.4a.orig.tar.gz oldstable/main/source/libopenssl-ruby_0.1.4a-1sarge1.diff.gz oldstable/main/binary-i386/libopenssl-ruby1.6_0.1.4a-1sarge1_i386.deb libopenssl-ruby (0.1.4a-1sarge1) oldstable-security; urgency=high * security fixes for CVE-2007-5162. It is backported r13500, r13501 and r13657 from ruby_1_8 branch. oldstable/main/binary-ia64/libopenssl-ruby1.6_0.1.4a-1sarge1_ia64.deb libopenssl-ruby (0.1.4a-1sarge1) oldstable-security; urgency=high * security fixes for CVE-2007-5162. It is backported r13500, r13501 and r13657 from ruby_1_8 branch. oldstable/main/binary-m68k/libopenssl-ruby1.6_0.1.4a-1sarge1_m68k.deb libopenssl-ruby (0.1.4a-1sarge1) oldstable-security; urgency=high * security fixes for CVE-2007-5162. It is backported r13500, r13501 and r13657 from ruby_1_8 branch. oldstable/main/binary-mips/libopenssl-ruby1.6_0.1.4a-1sarge1_mips.deb libopenssl-ruby (0.1.4a-1sarge1) oldstable-security; urgency=high * security fixes for CVE-2007-5162. It is backported r13500, r13501 and r13657 from ruby_1_8 branch. oldstable/main/binary-mipsel/libopenssl-ruby1.6_0.1.4a-1sarge1_mipsel.deb libopenssl-ruby (0.1.4a-1sarge1) oldstable-security; urgency=high * security fixes for CVE-2007-5162. It is backported r13500, r13501 and r13657 from ruby_1_8 branch. oldstable/main/binary-powerpc/libopenssl-ruby1.6_0.1.4a-1sarge1_powerpc.deb libopenssl-ruby (0.1.4a-1sarge1) oldstable-security; urgency=high * security fixes for CVE-2007-5162. It is backported r13500, r13501 and r13657 from ruby_1_8 branch. oldstable/main/binary-s390/libopenssl-ruby1.6_0.1.4a-1sarge1_s390.deb libopenssl-ruby (0.1.4a-1sarge1) oldstable-security; urgency=high * security fixes for CVE-2007-5162. It is backported r13500, r13501 and r13657 from ruby_1_8 branch. oldstable/main/binary-sparc/libopenssl-ruby1.6_0.1.4a-1sarge1_sparc.deb libopenssl-ruby (0.1.4a-1sarge1) oldstable-security; urgency=high * security fixes for CVE-2007-5162. It is backported r13500, r13501 and r13657 from ruby_1_8 branch. oldstable/main/source/linux-kernel-di-hppa-2.6_1.1sarge3.dsc oldstable/main/source/linux-kernel-di-hppa-2.6_1.1sarge3.tar.gz oldstable/main/kernel-image-2.6.8-4-32-di_1.1sarge3_hppa.udeb oldstable/main/nic-modules-2.6.8-4-32-di_1.1sarge3_hppa.udeb oldstable/main/ppp-modules-2.6.8-4-32-di_1.1sarge3_hppa.udeb oldstable/main/socket-modules-2.6.8-4-32-di_1.1sarge3_hppa.udeb oldstable/main/ide-modules-2.6.8-4-32-di_1.1sarge3_hppa.udeb oldstable/main/cdrom-core-modules-2.6.8-4-32-di_1.1sarge3_hppa.udeb oldstable/main/cdrom-modules-2.6.8-4-32-di_1.1sarge3_hppa.udeb oldstable/main/firewire-core-modules-2.6.8-4-32-di_1.1sarge3_hppa.udeb oldstable/main/scsi-modules-2.6.8-4-32-di_1.1sarge3_hppa.udeb oldstable/main/loop-modules-2.6.8-4-32-di_1.1sarge3_hppa.udeb oldstable/main/ipv6-modules-2.6.8-4-32-di_1.1sarge3_hppa.udeb oldstable/main/ext3-modules-2.6.8-4-32-di_1.1sarge3_hppa.udeb oldstable/main/xfs-modules-2.6.8-4-32-di_1.1sarge3_hppa.udeb oldstable/main/md-modules-2.6.8-4-32-di_1.1sarge3_hppa.udeb oldstable/main/usb-modules-2.6.8-4-32-di_1.1sarge3_hppa.udeb oldstable/main/usb-storage-modules-2.6.8-4-32-di_1.1sarge3_hppa.udeb oldstable/main/input-modules-2.6.8-4-32-di_1.1sarge3_hppa.udeb oldstable/main/sata-modules-2.6.8-4-32-di_1.1sarge3_hppa.udeb oldstable/main/kernel-image-2.6.8-4-64-di_1.1sarge3_hppa.udeb oldstable/main/nic-modules-2.6.8-4-64-di_1.1sarge3_hppa.udeb oldstable/main/ppp-modules-2.6.8-4-64-di_1.1sarge3_hppa.udeb oldstable/main/socket-modules-2.6.8-4-64-di_1.1sarge3_hppa.udeb oldstable/main/ide-modules-2.6.8-4-64-di_1.1sarge3_hppa.udeb oldstable/main/cdrom-core-modules-2.6.8-4-64-di_1.1sarge3_hppa.udeb oldstable/main/cdrom-modules-2.6.8-4-64-di_1.1sarge3_hppa.udeb oldstable/main/firewire-core-modules-2.6.8-4-64-di_1.1sarge3_hppa.udeb oldstable/main/scsi-modules-2.6.8-4-64-di_1.1sarge3_hppa.udeb oldstable/main/loop-modules-2.6.8-4-64-di_1.1sarge3_hppa.udeb oldstable/main/ipv6-modules-2.6.8-4-64-di_1.1sarge3_hppa.udeb oldstable/main/ext3-modules-2.6.8-4-64-di_1.1sarge3_hppa.udeb oldstable/main/xfs-modules-2.6.8-4-64-di_1.1sarge3_hppa.udeb oldstable/main/md-modules-2.6.8-4-64-di_1.1sarge3_hppa.udeb oldstable/main/usb-modules-2.6.8-4-64-di_1.1sarge3_hppa.udeb oldstable/main/usb-storage-modules-2.6.8-4-64-di_1.1sarge3_hppa.udeb oldstable/main/input-modules-2.6.8-4-64-di_1.1sarge3_hppa.udeb oldstable/main/sata-modules-2.6.8-4-64-di_1.1sarge3_hppa.udeb linux-kernel-di-hppa-2.6 (1.1sarge3) oldstable; urgency=low * Update to kernel image version 2.6.8-7. oldstable/main/source/linux-kernel-di-i386-2.6_1.02sarge5.dsc oldstable/main/source/linux-kernel-di-i386-2.6_1.02sarge5.tar.gz oldstable/main/kernel-image-2.6.8-4-386-di_1.02sarge5_i386.udeb oldstable/main/nic-modules-2.6.8-4-386-di_1.02sarge5_i386.udeb oldstable/main/nic-extra-modules-2.6.8-4-386-di_1.02sarge5_i386.udeb oldstable/main/nic-shared-modules-2.6.8-4-386-di_1.02sarge5_i386.udeb oldstable/main/serial-modules-2.6.8-4-386-di_1.02sarge5_i386.udeb oldstable/main/ppp-modules-2.6.8-4-386-di_1.02sarge5_i386.udeb oldstable/main/socket-modules-2.6.8-4-386-di_1.02sarge5_i386.udeb oldstable/main/ide-modules-2.6.8-4-386-di_1.02sarge5_i386.udeb oldstable/main/ide-core-modules-2.6.8-4-386-di_1.02sarge5_i386.udeb oldstable/main/cdrom-core-modules-2.6.8-4-386-di_1.02sarge5_i386.udeb oldstable/main/cdrom-modules-2.6.8-4-386-di_1.02sarge5_i386.udeb oldstable/main/firewire-core-modules-2.6.8-4-386-di_1.02sarge5_i386.udeb oldstable/main/scsi-core-modules-2.6.8-4-386-di_1.02sarge5_i386.udeb oldstable/main/scsi-modules-2.6.8-4-386-di_1.02sarge5_i386.udeb oldstable/main/scsi-common-modules-2.6.8-4-386-di_1.02sarge5_i386.udeb oldstable/main/scsi-extra-modules-2.6.8-4-386-di_1.02sarge5_i386.udeb oldstable/main/plip-modules-2.6.8-4-386-di_1.02sarge5_i386.udeb oldstable/main/floppy-modules-2.6.8-4-386-di_1.02sarge5_i386.udeb oldstable/main/loop-modules-2.6.8-4-386-di_1.02sarge5_i386.udeb oldstable/main/ipv6-modules-2.6.8-4-386-di_1.02sarge5_i386.udeb oldstable/main/ext3-modules-2.6.8-4-386-di_1.02sarge5_i386.udeb oldstable/main/jfs-modules-2.6.8-4-386-di_1.02sarge5_i386.udeb oldstable/main/ntfs-modules-2.6.8-4-386-di_1.02sarge5_i386.udeb oldstable/main/reiserfs-modules-2.6.8-4-386-di_1.02sarge5_i386.udeb oldstable/main/xfs-modules-2.6.8-4-386-di_1.02sarge5_i386.udeb oldstable/main/fat-modules-2.6.8-4-386-di_1.02sarge5_i386.udeb oldstable/main/ufs-modules-2.6.8-4-386-di_1.02sarge5_i386.udeb oldstable/main/md-modules-2.6.8-4-386-di_1.02sarge5_i386.udeb oldstable/main/usb-modules-2.6.8-4-386-di_1.02sarge5_i386.udeb oldstable/main/usb-storage-modules-2.6.8-4-386-di_1.02sarge5_i386.udeb oldstable/main/pcmcia-storage-modules-2.6.8-4-386-di_1.02sarge5_i386.udeb oldstable/main/fb-modules-2.6.8-4-386-di_1.02sarge5_i386.udeb oldstable/main/input-modules-2.6.8-4-386-di_1.02sarge5_i386.udeb oldstable/main/irda-modules-2.6.8-4-386-di_1.02sarge5_i386.udeb oldstable/main/parport-modules-2.6.8-4-386-di_1.02sarge5_i386.udeb oldstable/main/nic-pcmcia-modules-2.6.8-4-386-di_1.02sarge5_i386.udeb oldstable/main/pcmcia-modules-2.6.8-4-386-di_1.02sarge5_i386.udeb oldstable/main/nic-usb-modules-2.6.8-4-386-di_1.02sarge5_i386.udeb oldstable/main/sata-modules-2.6.8-4-386-di_1.02sarge5_i386.udeb oldstable/main/firmware-modules-2.6.8-4-386-di_1.02sarge5_i386.udeb oldstable/main/acpi-modules-2.6.8-4-386-di_1.02sarge5_i386.udeb linux-kernel-di-i386-2.6 (1.02sarge5) oldstable; urgency=low * Update to kernel image version 2.6.8-17. oldstable/main/source/linux-kernel-di-ia64-2.6_1.1sarge3.dsc oldstable/main/source/linux-kernel-di-ia64-2.6_1.1sarge3.tar.gz oldstable/main/kernel-image-2.6.8-4-itanium-smp-di_1.1sarge3_ia64.udeb oldstable/main/nic-modules-2.6.8-4-itanium-smp-di_1.1sarge3_ia64.udeb oldstable/main/nic-shared-modules-2.6.8-4-itanium-smp-di_1.1sarge3_ia64.udeb oldstable/main/serial-modules-2.6.8-4-itanium-smp-di_1.1sarge3_ia64.udeb oldstable/main/ppp-modules-2.6.8-4-itanium-smp-di_1.1sarge3_ia64.udeb oldstable/main/ide-modules-2.6.8-4-itanium-smp-di_1.1sarge3_ia64.udeb oldstable/main/ide-core-modules-2.6.8-4-itanium-smp-di_1.1sarge3_ia64.udeb oldstable/main/cdrom-core-modules-2.6.8-4-itanium-smp-di_1.1sarge3_ia64.udeb oldstable/main/firewire-core-modules-2.6.8-4-itanium-smp-di_1.1sarge3_ia64.udeb oldstable/main/scsi-core-modules-2.6.8-4-itanium-smp-di_1.1sarge3_ia64.udeb oldstable/main/scsi-modules-2.6.8-4-itanium-smp-di_1.1sarge3_ia64.udeb oldstable/main/plip-modules-2.6.8-4-itanium-smp-di_1.1sarge3_ia64.udeb oldstable/main/loop-modules-2.6.8-4-itanium-smp-di_1.1sarge3_ia64.udeb oldstable/main/ipv6-modules-2.6.8-4-itanium-smp-di_1.1sarge3_ia64.udeb oldstable/main/ext3-modules-2.6.8-4-itanium-smp-di_1.1sarge3_ia64.udeb oldstable/main/ntfs-modules-2.6.8-4-itanium-smp-di_1.1sarge3_ia64.udeb oldstable/main/reiserfs-modules-2.6.8-4-itanium-smp-di_1.1sarge3_ia64.udeb oldstable/main/xfs-modules-2.6.8-4-itanium-smp-di_1.1sarge3_ia64.udeb oldstable/main/fat-modules-2.6.8-4-itanium-smp-di_1.1sarge3_ia64.udeb oldstable/main/ufs-modules-2.6.8-4-itanium-smp-di_1.1sarge3_ia64.udeb oldstable/main/md-modules-2.6.8-4-itanium-smp-di_1.1sarge3_ia64.udeb oldstable/main/usb-modules-2.6.8-4-itanium-smp-di_1.1sarge3_ia64.udeb oldstable/main/usb-storage-modules-2.6.8-4-itanium-smp-di_1.1sarge3_ia64.udeb oldstable/main/fb-modules-2.6.8-4-itanium-smp-di_1.1sarge3_ia64.udeb oldstable/main/input-modules-2.6.8-4-itanium-smp-di_1.1sarge3_ia64.udeb oldstable/main/irda-modules-2.6.8-4-itanium-smp-di_1.1sarge3_ia64.udeb oldstable/main/parport-modules-2.6.8-4-itanium-smp-di_1.1sarge3_ia64.udeb oldstable/main/pcmcia-modules-2.6.8-4-itanium-smp-di_1.1sarge3_ia64.udeb oldstable/main/nic-usb-modules-2.6.8-4-itanium-smp-di_1.1sarge3_ia64.udeb oldstable/main/sata-modules-2.6.8-4-itanium-smp-di_1.1sarge3_ia64.udeb oldstable/main/firmware-modules-2.6.8-4-itanium-smp-di_1.1sarge3_ia64.udeb linux-kernel-di-ia64-2.6 (1.1sarge3) oldstable; urgency=low * Update to kernel image version 2.6.8-15. oldstable/main/source/linux-kernel-di-m68k-2.6_0.66sarge3.dsc oldstable/main/source/linux-kernel-di-m68k-2.6_0.66sarge3.tar.gz oldstable/main/kernel-image-2.6.8-amiga-di_0.66sarge3_m68k.udeb oldstable/main/nic-shared-modules-2.6.8-amiga-di_0.66sarge3_m68k.udeb oldstable/main/ppp-modules-2.6.8-amiga-di_0.66sarge3_m68k.udeb oldstable/main/scsi-modules-2.6.8-amiga-di_0.66sarge3_m68k.udeb oldstable/main/jfs-modules-2.6.8-amiga-di_0.66sarge3_m68k.udeb oldstable/main/reiserfs-modules-2.6.8-amiga-di_0.66sarge3_m68k.udeb oldstable/main/fat-modules-2.6.8-amiga-di_0.66sarge3_m68k.udeb oldstable/main/kernel-image-2.6.8-atari-di_0.66sarge3_m68k.udeb oldstable/main/nic-shared-modules-2.6.8-atari-di_0.66sarge3_m68k.udeb oldstable/main/ppp-modules-2.6.8-atari-di_0.66sarge3_m68k.udeb oldstable/main/scsi-modules-2.6.8-atari-di_0.66sarge3_m68k.udeb oldstable/main/jfs-modules-2.6.8-atari-di_0.66sarge3_m68k.udeb oldstable/main/reiserfs-modules-2.6.8-atari-di_0.66sarge3_m68k.udeb oldstable/main/fat-modules-2.6.8-atari-di_0.66sarge3_m68k.udeb oldstable/main/kernel-image-2.6.8-bvme6000-di_0.66sarge3_m68k.udeb oldstable/main/nic-shared-modules-2.6.8-bvme6000-di_0.66sarge3_m68k.udeb oldstable/main/ppp-modules-2.6.8-bvme6000-di_0.66sarge3_m68k.udeb oldstable/main/scsi-modules-2.6.8-bvme6000-di_0.66sarge3_m68k.udeb oldstable/main/jfs-modules-2.6.8-bvme6000-di_0.66sarge3_m68k.udeb oldstable/main/reiserfs-modules-2.6.8-bvme6000-di_0.66sarge3_m68k.udeb oldstable/main/fat-modules-2.6.8-bvme6000-di_0.66sarge3_m68k.udeb oldstable/main/kernel-image-2.6.8-hp-di_0.66sarge3_m68k.udeb oldstable/main/nic-shared-modules-2.6.8-hp-di_0.66sarge3_m68k.udeb oldstable/main/ppp-modules-2.6.8-hp-di_0.66sarge3_m68k.udeb oldstable/main/scsi-modules-2.6.8-hp-di_0.66sarge3_m68k.udeb oldstable/main/jfs-modules-2.6.8-hp-di_0.66sarge3_m68k.udeb oldstable/main/reiserfs-modules-2.6.8-hp-di_0.66sarge3_m68k.udeb oldstable/main/fat-modules-2.6.8-hp-di_0.66sarge3_m68k.udeb oldstable/main/kernel-image-2.6.8-mac-di_0.66sarge3_m68k.udeb oldstable/main/nic-shared-modules-2.6.8-mac-di_0.66sarge3_m68k.udeb oldstable/main/ppp-modules-2.6.8-mac-di_0.66sarge3_m68k.udeb oldstable/main/scsi-modules-2.6.8-mac-di_0.66sarge3_m68k.udeb oldstable/main/jfs-modules-2.6.8-mac-di_0.66sarge3_m68k.udeb oldstable/main/reiserfs-modules-2.6.8-mac-di_0.66sarge3_m68k.udeb oldstable/main/fat-modules-2.6.8-mac-di_0.66sarge3_m68k.udeb oldstable/main/kernel-image-2.6.8-mvme147-di_0.66sarge3_m68k.udeb oldstable/main/nic-shared-modules-2.6.8-mvme147-di_0.66sarge3_m68k.udeb oldstable/main/ppp-modules-2.6.8-mvme147-di_0.66sarge3_m68k.udeb oldstable/main/scsi-modules-2.6.8-mvme147-di_0.66sarge3_m68k.udeb oldstable/main/jfs-modules-2.6.8-mvme147-di_0.66sarge3_m68k.udeb oldstable/main/reiserfs-modules-2.6.8-mvme147-di_0.66sarge3_m68k.udeb oldstable/main/fat-modules-2.6.8-mvme147-di_0.66sarge3_m68k.udeb oldstable/main/kernel-image-2.6.8-mvme16x-di_0.66sarge3_m68k.udeb oldstable/main/nic-shared-modules-2.6.8-mvme16x-di_0.66sarge3_m68k.udeb oldstable/main/ppp-modules-2.6.8-mvme16x-di_0.66sarge3_m68k.udeb oldstable/main/scsi-modules-2.6.8-mvme16x-di_0.66sarge3_m68k.udeb oldstable/main/jfs-modules-2.6.8-mvme16x-di_0.66sarge3_m68k.udeb oldstable/main/reiserfs-modules-2.6.8-mvme16x-di_0.66sarge3_m68k.udeb oldstable/main/fat-modules-2.6.8-mvme16x-di_0.66sarge3_m68k.udeb oldstable/main/kernel-image-2.6.8-q40-di_0.66sarge3_m68k.udeb oldstable/main/nic-shared-modules-2.6.8-q40-di_0.66sarge3_m68k.udeb oldstable/main/ppp-modules-2.6.8-q40-di_0.66sarge3_m68k.udeb oldstable/main/scsi-modules-2.6.8-q40-di_0.66sarge3_m68k.udeb oldstable/main/jfs-modules-2.6.8-q40-di_0.66sarge3_m68k.udeb oldstable/main/reiserfs-modules-2.6.8-q40-di_0.66sarge3_m68k.udeb oldstable/main/fat-modules-2.6.8-q40-di_0.66sarge3_m68k.udeb oldstable/main/kernel-image-2.6.8-sun3-di_0.66sarge3_m68k.udeb oldstable/main/nic-shared-modules-2.6.8-sun3-di_0.66sarge3_m68k.udeb oldstable/main/ppp-modules-2.6.8-sun3-di_0.66sarge3_m68k.udeb oldstable/main/scsi-modules-2.6.8-sun3-di_0.66sarge3_m68k.udeb oldstable/main/jfs-modules-2.6.8-sun3-di_0.66sarge3_m68k.udeb oldstable/main/reiserfs-modules-2.6.8-sun3-di_0.66sarge3_m68k.udeb oldstable/main/fat-modules-2.6.8-sun3-di_0.66sarge3_m68k.udeb linux-kernel-di-m68k-2.6 (0.66sarge3) oldstable; urgency=low * Update to kernel image version 2.6.8-5. oldstable/main/source/linux-kernel-di-powerpc-2.6_0.78sarge3.dsc oldstable/main/source/linux-kernel-di-powerpc-2.6_0.78sarge3.tar.gz oldstable/main/kernel-image-2.6.8-4-powerpc-di_0.78sarge3_powerpc.udeb oldstable/main/nic-modules-2.6.8-4-powerpc-di_0.78sarge3_powerpc.udeb oldstable/main/nic-extra-modules-2.6.8-4-powerpc-di_0.78sarge3_powerpc.udeb oldstable/main/nic-shared-modules-2.6.8-4-powerpc-di_0.78sarge3_powerpc.udeb oldstable/main/serial-modules-2.6.8-4-powerpc-di_0.78sarge3_powerpc.udeb oldstable/main/ppp-modules-2.6.8-4-powerpc-di_0.78sarge3_powerpc.udeb oldstable/main/socket-modules-2.6.8-4-powerpc-di_0.78sarge3_powerpc.udeb oldstable/main/ide-modules-2.6.8-4-powerpc-di_0.78sarge3_powerpc.udeb oldstable/main/cdrom-core-modules-2.6.8-4-powerpc-di_0.78sarge3_powerpc.udeb oldstable/main/firewire-core-modules-2.6.8-4-powerpc-di_0.78sarge3_powerpc.udeb oldstable/main/scsi-core-modules-2.6.8-4-powerpc-di_0.78sarge3_powerpc.udeb oldstable/main/scsi-modules-2.6.8-4-powerpc-di_0.78sarge3_powerpc.udeb oldstable/main/scsi-common-modules-2.6.8-4-powerpc-di_0.78sarge3_powerpc.udeb oldstable/main/scsi-extra-modules-2.6.8-4-powerpc-di_0.78sarge3_powerpc.udeb oldstable/main/floppy-modules-2.6.8-4-powerpc-di_0.78sarge3_powerpc.udeb oldstable/main/loop-modules-2.6.8-4-powerpc-di_0.78sarge3_powerpc.udeb oldstable/main/ipv6-modules-2.6.8-4-powerpc-di_0.78sarge3_powerpc.udeb oldstable/main/ext2-modules-2.6.8-4-powerpc-di_0.78sarge3_powerpc.udeb oldstable/main/ext3-modules-2.6.8-4-powerpc-di_0.78sarge3_powerpc.udeb oldstable/main/jfs-modules-2.6.8-4-powerpc-di_0.78sarge3_powerpc.udeb oldstable/main/reiserfs-modules-2.6.8-4-powerpc-di_0.78sarge3_powerpc.udeb oldstable/main/xfs-modules-2.6.8-4-powerpc-di_0.78sarge3_powerpc.udeb oldstable/main/fat-modules-2.6.8-4-powerpc-di_0.78sarge3_powerpc.udeb oldstable/main/hfs-modules-2.6.8-4-powerpc-di_0.78sarge3_powerpc.udeb oldstable/main/affs-modules-2.6.8-4-powerpc-di_0.78sarge3_powerpc.udeb oldstable/main/ufs-modules-2.6.8-4-powerpc-di_0.78sarge3_powerpc.udeb oldstable/main/md-modules-2.6.8-4-powerpc-di_0.78sarge3_powerpc.udeb oldstable/main/usb-modules-2.6.8-4-powerpc-di_0.78sarge3_powerpc.udeb oldstable/main/usb-storage-modules-2.6.8-4-powerpc-di_0.78sarge3_powerpc.udeb oldstable/main/pcmcia-storage-modules-2.6.8-4-powerpc-di_0.78sarge3_powerpc.udeb oldstable/main/fb-modules-2.6.8-4-powerpc-di_0.78sarge3_powerpc.udeb oldstable/main/input-modules-2.6.8-4-powerpc-di_0.78sarge3_powerpc.udeb oldstable/main/irda-modules-2.6.8-4-powerpc-di_0.78sarge3_powerpc.udeb oldstable/main/nic-pcmcia-modules-2.6.8-4-powerpc-di_0.78sarge3_powerpc.udeb oldstable/main/pcmcia-modules-2.6.8-4-powerpc-di_0.78sarge3_powerpc.udeb oldstable/main/sata-modules-2.6.8-4-powerpc-di_0.78sarge3_powerpc.udeb oldstable/main/firmware-modules-2.6.8-4-powerpc-di_0.78sarge3_powerpc.udeb oldstable/main/fs-common-modules-2.6.8-4-powerpc-di_0.78sarge3_powerpc.udeb oldstable/main/kernel-image-2.6.8-4-power3-di_0.78sarge3_powerpc.udeb oldstable/main/nic-modules-2.6.8-4-power3-di_0.78sarge3_powerpc.udeb oldstable/main/nic-extra-modules-2.6.8-4-power3-di_0.78sarge3_powerpc.udeb oldstable/main/nic-shared-modules-2.6.8-4-power3-di_0.78sarge3_powerpc.udeb oldstable/main/serial-modules-2.6.8-4-power3-di_0.78sarge3_powerpc.udeb oldstable/main/ppp-modules-2.6.8-4-power3-di_0.78sarge3_powerpc.udeb oldstable/main/socket-modules-2.6.8-4-power3-di_0.78sarge3_powerpc.udeb oldstable/main/ide-modules-2.6.8-4-power3-di_0.78sarge3_powerpc.udeb oldstable/main/cdrom-core-modules-2.6.8-4-power3-di_0.78sarge3_powerpc.udeb oldstable/main/firewire-core-modules-2.6.8-4-power3-di_0.78sarge3_powerpc.udeb oldstable/main/scsi-core-modules-2.6.8-4-power3-di_0.78sarge3_powerpc.udeb oldstable/main/scsi-modules-2.6.8-4-power3-di_0.78sarge3_powerpc.udeb oldstable/main/scsi-common-modules-2.6.8-4-power3-di_0.78sarge3_powerpc.udeb oldstable/main/scsi-extra-modules-2.6.8-4-power3-di_0.78sarge3_powerpc.udeb oldstable/main/floppy-modules-2.6.8-4-power3-di_0.78sarge3_powerpc.udeb oldstable/main/loop-modules-2.6.8-4-power3-di_0.78sarge3_powerpc.udeb oldstable/main/ipv6-modules-2.6.8-4-power3-di_0.78sarge3_powerpc.udeb oldstable/main/ext2-modules-2.6.8-4-power3-di_0.78sarge3_powerpc.udeb oldstable/main/ext3-modules-2.6.8-4-power3-di_0.78sarge3_powerpc.udeb oldstable/main/jfs-modules-2.6.8-4-power3-di_0.78sarge3_powerpc.udeb oldstable/main/reiserfs-modules-2.6.8-4-power3-di_0.78sarge3_powerpc.udeb oldstable/main/xfs-modules-2.6.8-4-power3-di_0.78sarge3_powerpc.udeb oldstable/main/fat-modules-2.6.8-4-power3-di_0.78sarge3_powerpc.udeb oldstable/main/hfs-modules-2.6.8-4-power3-di_0.78sarge3_powerpc.udeb oldstable/main/affs-modules-2.6.8-4-power3-di_0.78sarge3_powerpc.udeb oldstable/main/ufs-modules-2.6.8-4-power3-di_0.78sarge3_powerpc.udeb oldstable/main/md-modules-2.6.8-4-power3-di_0.78sarge3_powerpc.udeb oldstable/main/usb-modules-2.6.8-4-power3-di_0.78sarge3_powerpc.udeb oldstable/main/usb-storage-modules-2.6.8-4-power3-di_0.78sarge3_powerpc.udeb oldstable/main/pcmcia-storage-modules-2.6.8-4-power3-di_0.78sarge3_powerpc.udeb oldstable/main/fb-modules-2.6.8-4-power3-di_0.78sarge3_powerpc.udeb oldstable/main/input-modules-2.6.8-4-power3-di_0.78sarge3_powerpc.udeb oldstable/main/irda-modules-2.6.8-4-power3-di_0.78sarge3_powerpc.udeb oldstable/main/nic-pcmcia-modules-2.6.8-4-power3-di_0.78sarge3_powerpc.udeb oldstable/main/pcmcia-modules-2.6.8-4-power3-di_0.78sarge3_powerpc.udeb oldstable/main/sata-modules-2.6.8-4-power3-di_0.78sarge3_powerpc.udeb oldstable/main/firmware-modules-2.6.8-4-power3-di_0.78sarge3_powerpc.udeb oldstable/main/fs-common-modules-2.6.8-4-power3-di_0.78sarge3_powerpc.udeb oldstable/main/kernel-image-2.6.8-4-power4-di_0.78sarge3_powerpc.udeb oldstable/main/nic-modules-2.6.8-4-power4-di_0.78sarge3_powerpc.udeb oldstable/main/nic-extra-modules-2.6.8-4-power4-di_0.78sarge3_powerpc.udeb oldstable/main/nic-shared-modules-2.6.8-4-power4-di_0.78sarge3_powerpc.udeb oldstable/main/serial-modules-2.6.8-4-power4-di_0.78sarge3_powerpc.udeb oldstable/main/ppp-modules-2.6.8-4-power4-di_0.78sarge3_powerpc.udeb oldstable/main/socket-modules-2.6.8-4-power4-di_0.78sarge3_powerpc.udeb oldstable/main/ide-modules-2.6.8-4-power4-di_0.78sarge3_powerpc.udeb oldstable/main/cdrom-core-modules-2.6.8-4-power4-di_0.78sarge3_powerpc.udeb oldstable/main/firewire-core-modules-2.6.8-4-power4-di_0.78sarge3_powerpc.udeb oldstable/main/scsi-core-modules-2.6.8-4-power4-di_0.78sarge3_powerpc.udeb oldstable/main/scsi-modules-2.6.8-4-power4-di_0.78sarge3_powerpc.udeb oldstable/main/scsi-common-modules-2.6.8-4-power4-di_0.78sarge3_powerpc.udeb oldstable/main/scsi-extra-modules-2.6.8-4-power4-di_0.78sarge3_powerpc.udeb oldstable/main/floppy-modules-2.6.8-4-power4-di_0.78sarge3_powerpc.udeb oldstable/main/loop-modules-2.6.8-4-power4-di_0.78sarge3_powerpc.udeb oldstable/main/ipv6-modules-2.6.8-4-power4-di_0.78sarge3_powerpc.udeb oldstable/main/ext2-modules-2.6.8-4-power4-di_0.78sarge3_powerpc.udeb oldstable/main/ext3-modules-2.6.8-4-power4-di_0.78sarge3_powerpc.udeb oldstable/main/jfs-modules-2.6.8-4-power4-di_0.78sarge3_powerpc.udeb oldstable/main/reiserfs-modules-2.6.8-4-power4-di_0.78sarge3_powerpc.udeb oldstable/main/xfs-modules-2.6.8-4-power4-di_0.78sarge3_powerpc.udeb oldstable/main/fat-modules-2.6.8-4-power4-di_0.78sarge3_powerpc.udeb oldstable/main/hfs-modules-2.6.8-4-power4-di_0.78sarge3_powerpc.udeb oldstable/main/affs-modules-2.6.8-4-power4-di_0.78sarge3_powerpc.udeb oldstable/main/ufs-modules-2.6.8-4-power4-di_0.78sarge3_powerpc.udeb oldstable/main/md-modules-2.6.8-4-power4-di_0.78sarge3_powerpc.udeb oldstable/main/usb-modules-2.6.8-4-power4-di_0.78sarge3_powerpc.udeb oldstable/main/usb-storage-modules-2.6.8-4-power4-di_0.78sarge3_powerpc.udeb oldstable/main/pcmcia-storage-modules-2.6.8-4-power4-di_0.78sarge3_powerpc.udeb oldstable/main/fb-modules-2.6.8-4-power4-di_0.78sarge3_powerpc.udeb oldstable/main/input-modules-2.6.8-4-power4-di_0.78sarge3_powerpc.udeb oldstable/main/irda-modules-2.6.8-4-power4-di_0.78sarge3_powerpc.udeb oldstable/main/nic-pcmcia-modules-2.6.8-4-power4-di_0.78sarge3_powerpc.udeb oldstable/main/pcmcia-modules-2.6.8-4-power4-di_0.78sarge3_powerpc.udeb oldstable/main/sata-modules-2.6.8-4-power4-di_0.78sarge3_powerpc.udeb oldstable/main/firmware-modules-2.6.8-4-power4-di_0.78sarge3_powerpc.udeb oldstable/main/fs-common-modules-2.6.8-4-power4-di_0.78sarge3_powerpc.udeb linux-kernel-di-powerpc-2.6 (0.78sarge3) oldstable; urgency=low * Update to kernel image version 2.6.8-13. oldstable/main/source/linux-kernel-di-sparc-2.6_0.05sarge3.dsc oldstable/main/source/linux-kernel-di-sparc-2.6_0.05sarge3.tar.gz oldstable/main/kernel-image-2.6.8-4-sparc64-di_0.05sarge3_sparc.udeb oldstable/main/nic-modules-2.6.8-4-sparc64-di_0.05sarge3_sparc.udeb oldstable/main/ppp-modules-2.6.8-4-sparc64-di_0.05sarge3_sparc.udeb oldstable/main/ide-modules-2.6.8-4-sparc64-di_0.05sarge3_sparc.udeb oldstable/main/cdrom-core-modules-2.6.8-4-sparc64-di_0.05sarge3_sparc.udeb oldstable/main/scsi-core-modules-2.6.8-4-sparc64-di_0.05sarge3_sparc.udeb oldstable/main/scsi-common-modules-2.6.8-4-sparc64-di_0.05sarge3_sparc.udeb oldstable/main/plip-modules-2.6.8-4-sparc64-di_0.05sarge3_sparc.udeb oldstable/main/ipv6-modules-2.6.8-4-sparc64-di_0.05sarge3_sparc.udeb oldstable/main/ext3-modules-2.6.8-4-sparc64-di_0.05sarge3_sparc.udeb oldstable/main/reiserfs-modules-2.6.8-4-sparc64-di_0.05sarge3_sparc.udeb oldstable/main/xfs-modules-2.6.8-4-sparc64-di_0.05sarge3_sparc.udeb oldstable/main/fat-modules-2.6.8-4-sparc64-di_0.05sarge3_sparc.udeb oldstable/main/md-modules-2.6.8-4-sparc64-di_0.05sarge3_sparc.udeb oldstable/main/usb-modules-2.6.8-4-sparc64-di_0.05sarge3_sparc.udeb oldstable/main/kernel-image-2.6.8-4-sparc32-di_0.05sarge3_sparc.udeb oldstable/main/nic-modules-2.6.8-4-sparc32-di_0.05sarge3_sparc.udeb oldstable/main/ppp-modules-2.6.8-4-sparc32-di_0.05sarge3_sparc.udeb oldstable/main/cdrom-core-modules-2.6.8-4-sparc32-di_0.05sarge3_sparc.udeb oldstable/main/scsi-core-modules-2.6.8-4-sparc32-di_0.05sarge3_sparc.udeb oldstable/main/scsi-common-modules-2.6.8-4-sparc32-di_0.05sarge3_sparc.udeb oldstable/main/plip-modules-2.6.8-4-sparc32-di_0.05sarge3_sparc.udeb oldstable/main/ipv6-modules-2.6.8-4-sparc32-di_0.05sarge3_sparc.udeb oldstable/main/ext3-modules-2.6.8-4-sparc32-di_0.05sarge3_sparc.udeb oldstable/main/reiserfs-modules-2.6.8-4-sparc32-di_0.05sarge3_sparc.udeb oldstable/main/xfs-modules-2.6.8-4-sparc32-di_0.05sarge3_sparc.udeb oldstable/main/fat-modules-2.6.8-4-sparc32-di_0.05sarge3_sparc.udeb oldstable/main/md-modules-2.6.8-4-sparc32-di_0.05sarge3_sparc.udeb linux-kernel-di-sparc-2.6 (0.05sarge3) oldstable; urgency=low * Update to kernel image version 2.6.8-16. oldstable/main/source/mol-modules-2.6.8_0.9.70+2.6.8+12sarge2.dsc oldstable/main/source/mol-modules-2.6.8_0.9.70+2.6.8+12sarge2.tar.gz oldstable/main/binary-powerpc/mol-modules-2.6.8-4-powerpc_0.9.70+2.6.8+12sarge2_powerpc.deb oldstable/main/binary-powerpc/mol-modules-2.6.8-4-powerpc-smp_0.9.70+2.6.8+12sarge2_powerpc.deb mol-modules-2.6.8 (1:0.9.70+2.6.8+12sarge2) oldstable-security; urgency=high * NMU by the Security Team * Rebuild against the -4 ABI oldstable/main/binary-alpha/mozilla-firefox_1.0.4-2sarge17_alpha.deb oldstable/main/binary-alpha/mozilla-firefox-dom-inspector_1.0.4-2sarge17_alpha.deb oldstable/main/binary-alpha/mozilla-firefox-gnome-support_1.0.4-2sarge17_alpha.deb mozilla-firefox (1.0.4-2sarge17) oldstable-security; urgency=critical * fix a bunch of security issues (all fixed in 1.5.0.10 except mfsa2007-01-Part3/3). Patches available at http://people.debian.org/~asac/ffox-patches-1.5.0.10_for_1.0.x.tar.gz: 0001-mfsa-2007-10-CVE-2007-1282-bz362735.txt 0002-mfsa-2007-09-CVE-2007-0994-Part1-2-bz368763.txt 0003-mfsa-2007-09-CVE-2007-0994-Part2-2-bz368655.txt 0004-mfsa-2007-07-CVE-2007-0981-bz370445.txt 0005-mfsa-2007-06-Part1-2-CVE-2007-0008-bz364319.txt 0006-mfsa-2007-06-Part2-2-CVE-2007-0009-bz364323.txt 0007-mfsa-2007-01-Part-1-3-CVE-2007-0775-Part-1-x-bz326864.txt 0008-mfsa-2007-02-Part1-3-CVE-2007-0995-Part1-2-bz314980.txt 0009-mfsa-2007-02-Part1-3-CVE-2007-0995-Part2-2-bz315473.txt 0010-mfsa-2007-02-Part2-3-CVE-2007-0996-bz356280.txt 0011-mfsa-2007-02-Part3-4-CVE-2006-6077-bz360493.txt 0012-mfsa-2007-02-Part4-4-CVE-2007-0045-bz366082.txt 0013-mfsa-2007-03-CVE-2007-0778-bz347852.txt oldstable/main/binary-arm/mozilla-firefox_1.0.4-2sarge17_arm.deb oldstable/main/binary-arm/mozilla-firefox-dom-inspector_1.0.4-2sarge17_arm.deb oldstable/main/binary-arm/mozilla-firefox-gnome-support_1.0.4-2sarge17_arm.deb mozilla-firefox (1.0.4-2sarge17) oldstable-security; urgency=critical * fix a bunch of security issues (all fixed in 1.5.0.10 except mfsa2007-01-Part3/3). Patches available at http://people.debian.org/~asac/ffox-patches-1.5.0.10_for_1.0.x.tar.gz: 0001-mfsa-2007-10-CVE-2007-1282-bz362735.txt 0002-mfsa-2007-09-CVE-2007-0994-Part1-2-bz368763.txt 0003-mfsa-2007-09-CVE-2007-0994-Part2-2-bz368655.txt 0004-mfsa-2007-07-CVE-2007-0981-bz370445.txt 0005-mfsa-2007-06-Part1-2-CVE-2007-0008-bz364319.txt 0006-mfsa-2007-06-Part2-2-CVE-2007-0009-bz364323.txt 0007-mfsa-2007-01-Part-1-3-CVE-2007-0775-Part-1-x-bz326864.txt 0008-mfsa-2007-02-Part1-3-CVE-2007-0995-Part1-2-bz314980.txt 0009-mfsa-2007-02-Part1-3-CVE-2007-0995-Part2-2-bz315473.txt 0010-mfsa-2007-02-Part2-3-CVE-2007-0996-bz356280.txt 0011-mfsa-2007-02-Part3-4-CVE-2006-6077-bz360493.txt 0012-mfsa-2007-02-Part4-4-CVE-2007-0045-bz366082.txt 0013-mfsa-2007-03-CVE-2007-0778-bz347852.txt oldstable/main/binary-hppa/mozilla-firefox_1.0.4-2sarge17_hppa.deb oldstable/main/binary-hppa/mozilla-firefox-dom-inspector_1.0.4-2sarge17_hppa.deb oldstable/main/binary-hppa/mozilla-firefox-gnome-support_1.0.4-2sarge17_hppa.deb mozilla-firefox (1.0.4-2sarge17) oldstable-security; urgency=critical * fix a bunch of security issues (all fixed in 1.5.0.10 except mfsa2007-01-Part3/3). Patches available at http://people.debian.org/~asac/ffox-patches-1.5.0.10_for_1.0.x.tar.gz: 0001-mfsa-2007-10-CVE-2007-1282-bz362735.txt 0002-mfsa-2007-09-CVE-2007-0994-Part1-2-bz368763.txt 0003-mfsa-2007-09-CVE-2007-0994-Part2-2-bz368655.txt 0004-mfsa-2007-07-CVE-2007-0981-bz370445.txt 0005-mfsa-2007-06-Part1-2-CVE-2007-0008-bz364319.txt 0006-mfsa-2007-06-Part2-2-CVE-2007-0009-bz364323.txt 0007-mfsa-2007-01-Part-1-3-CVE-2007-0775-Part-1-x-bz326864.txt 0008-mfsa-2007-02-Part1-3-CVE-2007-0995-Part1-2-bz314980.txt 0009-mfsa-2007-02-Part1-3-CVE-2007-0995-Part2-2-bz315473.txt 0010-mfsa-2007-02-Part2-3-CVE-2007-0996-bz356280.txt 0011-mfsa-2007-02-Part3-4-CVE-2006-6077-bz360493.txt 0012-mfsa-2007-02-Part4-4-CVE-2007-0045-bz366082.txt 0013-mfsa-2007-03-CVE-2007-0778-bz347852.txt oldstable/main/source/mozilla-firefox_1.0.4-2sarge17.dsc oldstable/main/source/mozilla-firefox_1.0.4-2sarge17.diff.gz oldstable/main/binary-i386/mozilla-firefox_1.0.4-2sarge17_i386.deb oldstable/main/binary-i386/mozilla-firefox-dom-inspector_1.0.4-2sarge17_i386.deb oldstable/main/binary-i386/mozilla-firefox-gnome-support_1.0.4-2sarge17_i386.deb mozilla-firefox (1.0.4-2sarge17) oldstable-security; urgency=critical * fix a bunch of security issues (all fixed in 1.5.0.10 except mfsa2007-01-Part3/3). Patches available at http://people.debian.org/~asac/ffox-patches-1.5.0.10_for_1.0.x.tar.gz: 0001-mfsa-2007-10-CVE-2007-1282-bz362735.txt 0002-mfsa-2007-09-CVE-2007-0994-Part1-2-bz368763.txt 0003-mfsa-2007-09-CVE-2007-0994-Part2-2-bz368655.txt 0004-mfsa-2007-07-CVE-2007-0981-bz370445.txt 0005-mfsa-2007-06-Part1-2-CVE-2007-0008-bz364319.txt 0006-mfsa-2007-06-Part2-2-CVE-2007-0009-bz364323.txt 0007-mfsa-2007-01-Part-1-3-CVE-2007-0775-Part-1-x-bz326864.txt 0008-mfsa-2007-02-Part1-3-CVE-2007-0995-Part1-2-bz314980.txt 0009-mfsa-2007-02-Part1-3-CVE-2007-0995-Part2-2-bz315473.txt 0010-mfsa-2007-02-Part2-3-CVE-2007-0996-bz356280.txt 0011-mfsa-2007-02-Part3-4-CVE-2006-6077-bz360493.txt 0012-mfsa-2007-02-Part4-4-CVE-2007-0045-bz366082.txt 0013-mfsa-2007-03-CVE-2007-0778-bz347852.txt oldstable/main/binary-ia64/mozilla-firefox_1.0.4-2sarge17_ia64.deb oldstable/main/binary-ia64/mozilla-firefox-dom-inspector_1.0.4-2sarge17_ia64.deb oldstable/main/binary-ia64/mozilla-firefox-gnome-support_1.0.4-2sarge17_ia64.deb mozilla-firefox (1.0.4-2sarge17) oldstable-security; urgency=critical * fix a bunch of security issues (all fixed in 1.5.0.10 except mfsa2007-01-Part3/3). Patches available at http://people.debian.org/~asac/ffox-patches-1.5.0.10_for_1.0.x.tar.gz: 0001-mfsa-2007-10-CVE-2007-1282-bz362735.txt 0002-mfsa-2007-09-CVE-2007-0994-Part1-2-bz368763.txt 0003-mfsa-2007-09-CVE-2007-0994-Part2-2-bz368655.txt 0004-mfsa-2007-07-CVE-2007-0981-bz370445.txt 0005-mfsa-2007-06-Part1-2-CVE-2007-0008-bz364319.txt 0006-mfsa-2007-06-Part2-2-CVE-2007-0009-bz364323.txt 0007-mfsa-2007-01-Part-1-3-CVE-2007-0775-Part-1-x-bz326864.txt 0008-mfsa-2007-02-Part1-3-CVE-2007-0995-Part1-2-bz314980.txt 0009-mfsa-2007-02-Part1-3-CVE-2007-0995-Part2-2-bz315473.txt 0010-mfsa-2007-02-Part2-3-CVE-2007-0996-bz356280.txt 0011-mfsa-2007-02-Part3-4-CVE-2006-6077-bz360493.txt 0012-mfsa-2007-02-Part4-4-CVE-2007-0045-bz366082.txt 0013-mfsa-2007-03-CVE-2007-0778-bz347852.txt oldstable/main/binary-m68k/mozilla-firefox_1.0.4-2sarge17_m68k.deb oldstable/main/binary-m68k/mozilla-firefox-dom-inspector_1.0.4-2sarge17_m68k.deb oldstable/main/binary-m68k/mozilla-firefox-gnome-support_1.0.4-2sarge17_m68k.deb mozilla-firefox (1.0.4-2sarge17) oldstable-security; urgency=critical * fix a bunch of security issues (all fixed in 1.5.0.10 except mfsa2007-01-Part3/3). Patches available at http://people.debian.org/~asac/ffox-patches-1.5.0.10_for_1.0.x.tar.gz: 0001-mfsa-2007-10-CVE-2007-1282-bz362735.txt 0002-mfsa-2007-09-CVE-2007-0994-Part1-2-bz368763.txt 0003-mfsa-2007-09-CVE-2007-0994-Part2-2-bz368655.txt 0004-mfsa-2007-07-CVE-2007-0981-bz370445.txt 0005-mfsa-2007-06-Part1-2-CVE-2007-0008-bz364319.txt 0006-mfsa-2007-06-Part2-2-CVE-2007-0009-bz364323.txt 0007-mfsa-2007-01-Part-1-3-CVE-2007-0775-Part-1-x-bz326864.txt 0008-mfsa-2007-02-Part1-3-CVE-2007-0995-Part1-2-bz314980.txt 0009-mfsa-2007-02-Part1-3-CVE-2007-0995-Part2-2-bz315473.txt 0010-mfsa-2007-02-Part2-3-CVE-2007-0996-bz356280.txt 0011-mfsa-2007-02-Part3-4-CVE-2006-6077-bz360493.txt 0012-mfsa-2007-02-Part4-4-CVE-2007-0045-bz366082.txt 0013-mfsa-2007-03-CVE-2007-0778-bz347852.txt oldstable/main/binary-mips/mozilla-firefox_1.0.4-2sarge17_mips.deb oldstable/main/binary-mips/mozilla-firefox-dom-inspector_1.0.4-2sarge17_mips.deb oldstable/main/binary-mips/mozilla-firefox-gnome-support_1.0.4-2sarge17_mips.deb mozilla-firefox (1.0.4-2sarge17) oldstable-security; urgency=critical * fix a bunch of security issues (all fixed in 1.5.0.10 except mfsa2007-01-Part3/3). Patches available at http://people.debian.org/~asac/ffox-patches-1.5.0.10_for_1.0.x.tar.gz: 0001-mfsa-2007-10-CVE-2007-1282-bz362735.txt 0002-mfsa-2007-09-CVE-2007-0994-Part1-2-bz368763.txt 0003-mfsa-2007-09-CVE-2007-0994-Part2-2-bz368655.txt 0004-mfsa-2007-07-CVE-2007-0981-bz370445.txt 0005-mfsa-2007-06-Part1-2-CVE-2007-0008-bz364319.txt 0006-mfsa-2007-06-Part2-2-CVE-2007-0009-bz364323.txt 0007-mfsa-2007-01-Part-1-3-CVE-2007-0775-Part-1-x-bz326864.txt 0008-mfsa-2007-02-Part1-3-CVE-2007-0995-Part1-2-bz314980.txt 0009-mfsa-2007-02-Part1-3-CVE-2007-0995-Part2-2-bz315473.txt 0010-mfsa-2007-02-Part2-3-CVE-2007-0996-bz356280.txt 0011-mfsa-2007-02-Part3-4-CVE-2006-6077-bz360493.txt 0012-mfsa-2007-02-Part4-4-CVE-2007-0045-bz366082.txt 0013-mfsa-2007-03-CVE-2007-0778-bz347852.txt oldstable/main/binary-mipsel/mozilla-firefox_1.0.4-2sarge17_mipsel.deb oldstable/main/binary-mipsel/mozilla-firefox-dom-inspector_1.0.4-2sarge17_mipsel.deb oldstable/main/binary-mipsel/mozilla-firefox-gnome-support_1.0.4-2sarge17_mipsel.deb mozilla-firefox (1.0.4-2sarge17) oldstable-security; urgency=critical * fix a bunch of security issues (all fixed in 1.5.0.10 except mfsa2007-01-Part3/3). Patches available at http://people.debian.org/~asac/ffox-patches-1.5.0.10_for_1.0.x.tar.gz: 0001-mfsa-2007-10-CVE-2007-1282-bz362735.txt 0002-mfsa-2007-09-CVE-2007-0994-Part1-2-bz368763.txt 0003-mfsa-2007-09-CVE-2007-0994-Part2-2-bz368655.txt 0004-mfsa-2007-07-CVE-2007-0981-bz370445.txt 0005-mfsa-2007-06-Part1-2-CVE-2007-0008-bz364319.txt 0006-mfsa-2007-06-Part2-2-CVE-2007-0009-bz364323.txt 0007-mfsa-2007-01-Part-1-3-CVE-2007-0775-Part-1-x-bz326864.txt 0008-mfsa-2007-02-Part1-3-CVE-2007-0995-Part1-2-bz314980.txt 0009-mfsa-2007-02-Part1-3-CVE-2007-0995-Part2-2-bz315473.txt 0010-mfsa-2007-02-Part2-3-CVE-2007-0996-bz356280.txt 0011-mfsa-2007-02-Part3-4-CVE-2006-6077-bz360493.txt 0012-mfsa-2007-02-Part4-4-CVE-2007-0045-bz366082.txt 0013-mfsa-2007-03-CVE-2007-0778-bz347852.txt oldstable/main/binary-powerpc/mozilla-firefox_1.0.4-2sarge17_powerpc.deb oldstable/main/binary-powerpc/mozilla-firefox-dom-inspector_1.0.4-2sarge17_powerpc.deb oldstable/main/binary-powerpc/mozilla-firefox-gnome-support_1.0.4-2sarge17_powerpc.deb mozilla-firefox (1.0.4-2sarge17) oldstable-security; urgency=critical * fix a bunch of security issues (all fixed in 1.5.0.10 except mfsa2007-01-Part3/3). Patches available at http://people.debian.org/~asac/ffox-patches-1.5.0.10_for_1.0.x.tar.gz: 0001-mfsa-2007-10-CVE-2007-1282-bz362735.txt 0002-mfsa-2007-09-CVE-2007-0994-Part1-2-bz368763.txt 0003-mfsa-2007-09-CVE-2007-0994-Part2-2-bz368655.txt 0004-mfsa-2007-07-CVE-2007-0981-bz370445.txt 0005-mfsa-2007-06-Part1-2-CVE-2007-0008-bz364319.txt 0006-mfsa-2007-06-Part2-2-CVE-2007-0009-bz364323.txt 0007-mfsa-2007-01-Part-1-3-CVE-2007-0775-Part-1-x-bz326864.txt 0008-mfsa-2007-02-Part1-3-CVE-2007-0995-Part1-2-bz314980.txt 0009-mfsa-2007-02-Part1-3-CVE-2007-0995-Part2-2-bz315473.txt 0010-mfsa-2007-02-Part2-3-CVE-2007-0996-bz356280.txt 0011-mfsa-2007-02-Part3-4-CVE-2006-6077-bz360493.txt 0012-mfsa-2007-02-Part4-4-CVE-2007-0045-bz366082.txt 0013-mfsa-2007-03-CVE-2007-0778-bz347852.txt oldstable/main/binary-s390/mozilla-firefox_1.0.4-2sarge17_s390.deb oldstable/main/binary-s390/mozilla-firefox-dom-inspector_1.0.4-2sarge17_s390.deb oldstable/main/binary-s390/mozilla-firefox-gnome-support_1.0.4-2sarge17_s390.deb mozilla-firefox (1.0.4-2sarge17) oldstable-security; urgency=critical * fix a bunch of security issues (all fixed in 1.5.0.10 except mfsa2007-01-Part3/3). Patches available at http://people.debian.org/~asac/ffox-patches-1.5.0.10_for_1.0.x.tar.gz: 0001-mfsa-2007-10-CVE-2007-1282-bz362735.txt 0002-mfsa-2007-09-CVE-2007-0994-Part1-2-bz368763.txt 0003-mfsa-2007-09-CVE-2007-0994-Part2-2-bz368655.txt 0004-mfsa-2007-07-CVE-2007-0981-bz370445.txt 0005-mfsa-2007-06-Part1-2-CVE-2007-0008-bz364319.txt 0006-mfsa-2007-06-Part2-2-CVE-2007-0009-bz364323.txt 0007-mfsa-2007-01-Part-1-3-CVE-2007-0775-Part-1-x-bz326864.txt 0008-mfsa-2007-02-Part1-3-CVE-2007-0995-Part1-2-bz314980.txt 0009-mfsa-2007-02-Part1-3-CVE-2007-0995-Part2-2-bz315473.txt 0010-mfsa-2007-02-Part2-3-CVE-2007-0996-bz356280.txt 0011-mfsa-2007-02-Part3-4-CVE-2006-6077-bz360493.txt 0012-mfsa-2007-02-Part4-4-CVE-2007-0045-bz366082.txt 0013-mfsa-2007-03-CVE-2007-0778-bz347852.txt oldstable/main/binary-sparc/mozilla-firefox_1.0.4-2sarge17_sparc.deb oldstable/main/binary-sparc/mozilla-firefox-dom-inspector_1.0.4-2sarge17_sparc.deb oldstable/main/binary-sparc/mozilla-firefox-gnome-support_1.0.4-2sarge17_sparc.deb mozilla-firefox (1.0.4-2sarge17) oldstable-security; urgency=critical * fix a bunch of security issues (all fixed in 1.5.0.10 except mfsa2007-01-Part3/3). Patches available at http://people.debian.org/~asac/ffox-patches-1.5.0.10_for_1.0.x.tar.gz: 0001-mfsa-2007-10-CVE-2007-1282-bz362735.txt 0002-mfsa-2007-09-CVE-2007-0994-Part1-2-bz368763.txt 0003-mfsa-2007-09-CVE-2007-0994-Part2-2-bz368655.txt 0004-mfsa-2007-07-CVE-2007-0981-bz370445.txt 0005-mfsa-2007-06-Part1-2-CVE-2007-0008-bz364319.txt 0006-mfsa-2007-06-Part2-2-CVE-2007-0009-bz364323.txt 0007-mfsa-2007-01-Part-1-3-CVE-2007-0775-Part-1-x-bz326864.txt 0008-mfsa-2007-02-Part1-3-CVE-2007-0995-Part1-2-bz314980.txt 0009-mfsa-2007-02-Part1-3-CVE-2007-0995-Part2-2-bz315473.txt 0010-mfsa-2007-02-Part2-3-CVE-2007-0996-bz356280.txt 0011-mfsa-2007-02-Part3-4-CVE-2006-6077-bz360493.txt 0012-mfsa-2007-02-Part4-4-CVE-2007-0045-bz366082.txt 0013-mfsa-2007-03-CVE-2007-0778-bz347852.txt oldstable/main/binary-alpha/libmysqlclient12_4.0.24-10sarge3_alpha.deb oldstable/main/binary-alpha/libmysqlclient12-dev_4.0.24-10sarge3_alpha.deb oldstable/main/binary-alpha/mysql-client_4.0.24-10sarge3_alpha.deb oldstable/main/binary-alpha/mysql-server_4.0.24-10sarge3_alpha.deb mysql-dfsg (4.0.24-10sarge3) oldstable-security; urgency=high * Security upload prepared for the security team by the debian mysql package maintainers. * CVE-2007-2691: Fixes the problem that MySQL did not require the DROP privilege for RENAME TABLE statements which allows remote authenticated users to rename arbitrary tables. Closes: #424778 oldstable/main/binary-amd64/libmysqlclient12_4.0.24-10sarge3_amd64.deb oldstable/main/binary-amd64/libmysqlclient12-dev_4.0.24-10sarge3_amd64.deb oldstable/main/binary-amd64/mysql-client_4.0.24-10sarge3_amd64.deb oldstable/main/binary-amd64/mysql-server_4.0.24-10sarge3_amd64.deb mysql-dfsg (4.0.24-10sarge3) oldstable-security; urgency=high * Security upload prepared for the security team by the debian mysql package maintainers. * CVE-2007-2691: Fixes the problem that MySQL did not require the DROP privilege for RENAME TABLE statements which allows remote authenticated users to rename arbitrary tables. Closes: #424778 oldstable/main/binary-arm/libmysqlclient12_4.0.24-10sarge3_arm.deb oldstable/main/binary-arm/libmysqlclient12-dev_4.0.24-10sarge3_arm.deb oldstable/main/binary-arm/mysql-client_4.0.24-10sarge3_arm.deb oldstable/main/binary-arm/mysql-server_4.0.24-10sarge3_arm.deb mysql-dfsg (4.0.24-10sarge3) oldstable-security; urgency=high * Security upload prepared for the security team by the debian mysql package maintainers. * CVE-2007-2691: Fixes the problem that MySQL did not require the DROP privilege for RENAME TABLE statements which allows remote authenticated users to rename arbitrary tables. Closes: #424778 oldstable/main/binary-hppa/libmysqlclient12_4.0.24-10sarge3_hppa.deb oldstable/main/binary-hppa/libmysqlclient12-dev_4.0.24-10sarge3_hppa.deb oldstable/main/binary-hppa/mysql-client_4.0.24-10sarge3_hppa.deb oldstable/main/binary-hppa/mysql-server_4.0.24-10sarge3_hppa.deb mysql-dfsg (4.0.24-10sarge3) oldstable-security; urgency=high * Security upload prepared for the security team by the debian mysql package maintainers. * CVE-2007-2691: Fixes the problem that MySQL did not require the DROP privilege for RENAME TABLE statements which allows remote authenticated users to rename arbitrary tables. Closes: #424778 oldstable/main/source/mysql-dfsg_4.0.24-10sarge3.dsc oldstable/main/source/mysql-dfsg_4.0.24-10sarge3.diff.gz oldstable/main/binary-all/mysql-common_4.0.24-10sarge3_all.deb oldstable/main/binary-i386/libmysqlclient12_4.0.24-10sarge3_i386.deb oldstable/main/binary-i386/libmysqlclient12-dev_4.0.24-10sarge3_i386.deb oldstable/main/binary-i386/mysql-client_4.0.24-10sarge3_i386.deb oldstable/main/binary-i386/mysql-server_4.0.24-10sarge3_i386.deb mysql-dfsg (4.0.24-10sarge3) oldstable-security; urgency=high * Security upload prepared for the security team by the debian mysql package maintainers. * CVE-2007-2691: Fixes the problem that MySQL did not require the DROP privilege for RENAME TABLE statements which allows remote authenticated users to rename arbitrary tables. Closes: #424778 oldstable/main/binary-ia64/libmysqlclient12_4.0.24-10sarge3_ia64.deb oldstable/main/binary-ia64/libmysqlclient12-dev_4.0.24-10sarge3_ia64.deb oldstable/main/binary-ia64/mysql-client_4.0.24-10sarge3_ia64.deb oldstable/main/binary-ia64/mysql-server_4.0.24-10sarge3_ia64.deb mysql-dfsg (4.0.24-10sarge3) oldstable-security; urgency=high * Security upload prepared for the security team by the debian mysql package maintainers. * CVE-2007-2691: Fixes the problem that MySQL did not require the DROP privilege for RENAME TABLE statements which allows remote authenticated users to rename arbitrary tables. Closes: #424778 oldstable/main/binary-m68k/libmysqlclient12_4.0.24-10sarge3_m68k.deb oldstable/main/binary-m68k/libmysqlclient12-dev_4.0.24-10sarge3_m68k.deb oldstable/main/binary-m68k/mysql-client_4.0.24-10sarge3_m68k.deb oldstable/main/binary-m68k/mysql-server_4.0.24-10sarge3_m68k.deb mysql-dfsg (4.0.24-10sarge3) oldstable-security; urgency=high * Security upload prepared for the security team by the debian mysql package maintainers. * CVE-2007-2691: Fixes the problem that MySQL did not require the DROP privilege for RENAME TABLE statements which allows remote authenticated users to rename arbitrary tables. Closes: #424778 oldstable/main/binary-mips/libmysqlclient12_4.0.24-10sarge3_mips.deb oldstable/main/binary-mips/libmysqlclient12-dev_4.0.24-10sarge3_mips.deb oldstable/main/binary-mips/mysql-client_4.0.24-10sarge3_mips.deb oldstable/main/binary-mips/mysql-server_4.0.24-10sarge3_mips.deb mysql-dfsg (4.0.24-10sarge3) oldstable-security; urgency=high * Security upload prepared for the security team by the debian mysql package maintainers. * CVE-2007-2691: Fixes the problem that MySQL did not require the DROP privilege for RENAME TABLE statements which allows remote authenticated users to rename arbitrary tables. Closes: #424778 oldstable/main/binary-mipsel/libmysqlclient12_4.0.24-10sarge3_mipsel.deb oldstable/main/binary-mipsel/libmysqlclient12-dev_4.0.24-10sarge3_mipsel.deb oldstable/main/binary-mipsel/mysql-client_4.0.24-10sarge3_mipsel.deb oldstable/main/binary-mipsel/mysql-server_4.0.24-10sarge3_mipsel.deb mysql-dfsg (4.0.24-10sarge3) oldstable-security; urgency=high * Security upload prepared for the security team by the debian mysql package maintainers. * CVE-2007-2691: Fixes the problem that MySQL did not require the DROP privilege for RENAME TABLE statements which allows remote authenticated users to rename arbitrary tables. Closes: #424778 oldstable/main/binary-powerpc/libmysqlclient12_4.0.24-10sarge3_powerpc.deb oldstable/main/binary-powerpc/libmysqlclient12-dev_4.0.24-10sarge3_powerpc.deb oldstable/main/binary-powerpc/mysql-client_4.0.24-10sarge3_powerpc.deb oldstable/main/binary-powerpc/mysql-server_4.0.24-10sarge3_powerpc.deb mysql-dfsg (4.0.24-10sarge3) oldstable-security; urgency=high * Security upload prepared for the security team by the debian mysql package maintainers. * CVE-2007-2691: Fixes the problem that MySQL did not require the DROP privilege for RENAME TABLE statements which allows remote authenticated users to rename arbitrary tables. Closes: #424778 oldstable/main/binary-s390/libmysqlclient12_4.0.24-10sarge3_s390.deb oldstable/main/binary-s390/libmysqlclient12-dev_4.0.24-10sarge3_s390.deb oldstable/main/binary-s390/mysql-client_4.0.24-10sarge3_s390.deb oldstable/main/binary-s390/mysql-server_4.0.24-10sarge3_s390.deb mysql-dfsg (4.0.24-10sarge3) oldstable-security; urgency=high * Security upload prepared for the security team by the debian mysql package maintainers. * CVE-2007-2691: Fixes the problem that MySQL did not require the DROP privilege for RENAME TABLE statements which allows remote authenticated users to rename arbitrary tables. Closes: #424778 oldstable/main/binary-sparc/libmysqlclient12_4.0.24-10sarge3_sparc.deb oldstable/main/binary-sparc/libmysqlclient12-dev_4.0.24-10sarge3_sparc.deb oldstable/main/binary-sparc/mysql-client_4.0.24-10sarge3_sparc.deb oldstable/main/binary-sparc/mysql-server_4.0.24-10sarge3_sparc.deb mysql-dfsg (4.0.24-10sarge3) oldstable-security; urgency=high * Security upload prepared for the security team by the debian mysql package maintainers. * CVE-2007-2691: Fixes the problem that MySQL did not require the DROP privilege for RENAME TABLE statements which allows remote authenticated users to rename arbitrary tables. Closes: #424778 oldstable/main/binary-alpha/libmysqlclient14_4.1.11a-4sarge8_alpha.deb oldstable/main/binary-alpha/libmysqlclient14-dev_4.1.11a-4sarge8_alpha.deb oldstable/main/binary-alpha/mysql-client-4.1_4.1.11a-4sarge8_alpha.deb oldstable/main/binary-alpha/mysql-server-4.1_4.1.11a-4sarge8_alpha.deb mysql-dfsg-4.1 (4.1.11a-4sarge8) oldstable-security; urgency=high * Security release prepared for the security team by the Debian MySQL maintainers. Some patches were taken from the Ubuntu project. * CVE-2007-2691: Fixes the problem that MySQL did not require the DROP privilege for RENAME TABLE statements, which allows remote authenticated users to rename arbitrary tables. Closes: #424778 * CVE-2007-3780: It was discovered that MySQL could be made to overflow a signed char during authentication. Remote attackers could use crafted authentication requests to cause a denial of service. oldstable/main/binary-amd64/libmysqlclient14_4.1.11a-4sarge8_amd64.deb oldstable/main/binary-amd64/libmysqlclient14-dev_4.1.11a-4sarge8_amd64.deb oldstable/main/binary-amd64/mysql-client-4.1_4.1.11a-4sarge8_amd64.deb oldstable/main/binary-amd64/mysql-server-4.1_4.1.11a-4sarge8_amd64.deb mysql-dfsg-4.1 (4.1.11a-4sarge8) oldstable-security; urgency=high * Security release prepared for the security team by the Debian MySQL maintainers. Some patches were taken from the Ubuntu project. * CVE-2007-2691: Fixes the problem that MySQL did not require the DROP privilege for RENAME TABLE statements, which allows remote authenticated users to rename arbitrary tables. Closes: #424778 * CVE-2007-3780: It was discovered that MySQL could be made to overflow a signed char during authentication. Remote attackers could use crafted authentication requests to cause a denial of service. oldstable/main/binary-arm/libmysqlclient14_4.1.11a-4sarge8_arm.deb oldstable/main/binary-arm/libmysqlclient14-dev_4.1.11a-4sarge8_arm.deb oldstable/main/binary-arm/mysql-client-4.1_4.1.11a-4sarge8_arm.deb oldstable/main/binary-arm/mysql-server-4.1_4.1.11a-4sarge8_arm.deb mysql-dfsg-4.1 (4.1.11a-4sarge8) oldstable-security; urgency=high * Security release prepared for the security team by the Debian MySQL maintainers. Some patches were taken from the Ubuntu project. * CVE-2007-2691: Fixes the problem that MySQL did not require the DROP privilege for RENAME TABLE statements, which allows remote authenticated users to rename arbitrary tables. Closes: #424778 * CVE-2007-3780: It was discovered that MySQL could be made to overflow a signed char during authentication. Remote attackers could use crafted authentication requests to cause a denial of service. oldstable/main/binary-hppa/libmysqlclient14_4.1.11a-4sarge8_hppa.deb oldstable/main/binary-hppa/libmysqlclient14-dev_4.1.11a-4sarge8_hppa.deb oldstable/main/binary-hppa/mysql-client-4.1_4.1.11a-4sarge8_hppa.deb oldstable/main/binary-hppa/mysql-server-4.1_4.1.11a-4sarge8_hppa.deb mysql-dfsg-4.1 (4.1.11a-4sarge8) oldstable-security; urgency=high * Security release prepared for the security team by the Debian MySQL maintainers. Some patches were taken from the Ubuntu project. * CVE-2007-2691: Fixes the problem that MySQL did not require the DROP privilege for RENAME TABLE statements, which allows remote authenticated users to rename arbitrary tables. Closes: #424778 * CVE-2007-3780: It was discovered that MySQL could be made to overflow a signed char during authentication. Remote attackers could use crafted authentication requests to cause a denial of service. oldstable/main/source/mysql-dfsg-4.1_4.1.11a-4sarge8.dsc oldstable/main/source/mysql-dfsg-4.1_4.1.11a-4sarge8.diff.gz oldstable/main/binary-all/mysql-common-4.1_4.1.11a-4sarge8_all.deb oldstable/main/binary-i386/libmysqlclient14_4.1.11a-4sarge8_i386.deb oldstable/main/binary-i386/libmysqlclient14-dev_4.1.11a-4sarge8_i386.deb oldstable/main/binary-i386/mysql-client-4.1_4.1.11a-4sarge8_i386.deb oldstable/main/binary-i386/mysql-server-4.1_4.1.11a-4sarge8_i386.deb mysql-dfsg-4.1 (4.1.11a-4sarge8) oldstable-security; urgency=high * Security release prepared for the security team by the Debian MySQL maintainers. Some patches were taken from the Ubuntu project. * CVE-2007-2691: Fixes the problem that MySQL did not require the DROP privilege for RENAME TABLE statements, which allows remote authenticated users to rename arbitrary tables. Closes: #424778 * CVE-2007-3780: It was discovered that MySQL could be made to overflow a signed char during authentication. Remote attackers could use crafted authentication requests to cause a denial of service. oldstable/main/binary-ia64/libmysqlclient14_4.1.11a-4sarge8_ia64.deb oldstable/main/binary-ia64/libmysqlclient14-dev_4.1.11a-4sarge8_ia64.deb oldstable/main/binary-ia64/mysql-client-4.1_4.1.11a-4sarge8_ia64.deb oldstable/main/binary-ia64/mysql-server-4.1_4.1.11a-4sarge8_ia64.deb mysql-dfsg-4.1 (4.1.11a-4sarge8) oldstable-security; urgency=high * Security release prepared for the security team by the Debian MySQL maintainers. Some patches were taken from the Ubuntu project. * CVE-2007-2691: Fixes the problem that MySQL did not require the DROP privilege for RENAME TABLE statements, which allows remote authenticated users to rename arbitrary tables. Closes: #424778 * CVE-2007-3780: It was discovered that MySQL could be made to overflow a signed char during authentication. Remote attackers could use crafted authentication requests to cause a denial of service. oldstable/main/binary-m68k/libmysqlclient14_4.1.11a-4sarge8_m68k.deb oldstable/main/binary-m68k/libmysqlclient14-dev_4.1.11a-4sarge8_m68k.deb oldstable/main/binary-m68k/mysql-client-4.1_4.1.11a-4sarge8_m68k.deb oldstable/main/binary-m68k/mysql-server-4.1_4.1.11a-4sarge8_m68k.deb mysql-dfsg-4.1 (4.1.11a-4sarge8) oldstable-security; urgency=high * Security release prepared for the security team by the Debian MySQL maintainers. Some patches were taken from the Ubuntu project. * CVE-2007-2691: Fixes the problem that MySQL did not require the DROP privilege for RENAME TABLE statements, which allows remote authenticated users to rename arbitrary tables. Closes: #424778 * CVE-2007-3780: It was discovered that MySQL could be made to overflow a signed char during authentication. Remote attackers could use crafted authentication requests to cause a denial of service. oldstable/main/binary-mips/libmysqlclient14_4.1.11a-4sarge8_mips.deb oldstable/main/binary-mips/libmysqlclient14-dev_4.1.11a-4sarge8_mips.deb oldstable/main/binary-mips/mysql-client-4.1_4.1.11a-4sarge8_mips.deb oldstable/main/binary-mips/mysql-server-4.1_4.1.11a-4sarge8_mips.deb mysql-dfsg-4.1 (4.1.11a-4sarge8) oldstable-security; urgency=high * Security release prepared for the security team by the Debian MySQL maintainers. Some patches were taken from the Ubuntu project. * CVE-2007-2691: Fixes the problem that MySQL did not require the DROP privilege for RENAME TABLE statements, which allows remote authenticated users to rename arbitrary tables. Closes: #424778 * CVE-2007-3780: It was discovered that MySQL could be made to overflow a signed char during authentication. Remote attackers could use crafted authentication requests to cause a denial of service. oldstable/main/binary-mipsel/libmysqlclient14_4.1.11a-4sarge8_mipsel.deb oldstable/main/binary-mipsel/libmysqlclient14-dev_4.1.11a-4sarge8_mipsel.deb oldstable/main/binary-mipsel/mysql-client-4.1_4.1.11a-4sarge8_mipsel.deb oldstable/main/binary-mipsel/mysql-server-4.1_4.1.11a-4sarge8_mipsel.deb mysql-dfsg-4.1 (4.1.11a-4sarge8) oldstable-security; urgency=high * Security release prepared for the security team by the Debian MySQL maintainers. Some patches were taken from the Ubuntu project. * CVE-2007-2691: Fixes the problem that MySQL did not require the DROP privilege for RENAME TABLE statements, which allows remote authenticated users to rename arbitrary tables. Closes: #424778 * CVE-2007-3780: It was discovered that MySQL could be made to overflow a signed char during authentication. Remote attackers could use crafted authentication requests to cause a denial of service. oldstable/main/binary-powerpc/libmysqlclient14_4.1.11a-4sarge8_powerpc.deb oldstable/main/binary-powerpc/libmysqlclient14-dev_4.1.11a-4sarge8_powerpc.deb oldstable/main/binary-powerpc/mysql-client-4.1_4.1.11a-4sarge8_powerpc.deb oldstable/main/binary-powerpc/mysql-server-4.1_4.1.11a-4sarge8_powerpc.deb mysql-dfsg-4.1 (4.1.11a-4sarge8) oldstable-security; urgency=high * Security release prepared for the security team by the Debian MySQL maintainers. Some patches were taken from the Ubuntu project. * CVE-2007-2691: Fixes the problem that MySQL did not require the DROP privilege for RENAME TABLE statements, which allows remote authenticated users to rename arbitrary tables. Closes: #424778 * CVE-2007-3780: It was discovered that MySQL could be made to overflow a signed char during authentication. Remote attackers could use crafted authentication requests to cause a denial of service. oldstable/main/binary-s390/libmysqlclient14_4.1.11a-4sarge8_s390.deb oldstable/main/binary-s390/libmysqlclient14-dev_4.1.11a-4sarge8_s390.deb oldstable/main/binary-s390/mysql-client-4.1_4.1.11a-4sarge8_s390.deb oldstable/main/binary-s390/mysql-server-4.1_4.1.11a-4sarge8_s390.deb mysql-dfsg-4.1 (4.1.11a-4sarge8) oldstable-security; urgency=high * Security release prepared for the security team by the Debian MySQL maintainers. Some patches were taken from the Ubuntu project. * CVE-2007-2691: Fixes the problem that MySQL did not require the DROP privilege for RENAME TABLE statements, which allows remote authenticated users to rename arbitrary tables. Closes: #424778 * CVE-2007-3780: It was discovered that MySQL could be made to overflow a signed char during authentication. Remote attackers could use crafted authentication requests to cause a denial of service. oldstable/main/binary-sparc/libmysqlclient14_4.1.11a-4sarge8_sparc.deb oldstable/main/binary-sparc/libmysqlclient14-dev_4.1.11a-4sarge8_sparc.deb oldstable/main/binary-sparc/mysql-client-4.1_4.1.11a-4sarge8_sparc.deb oldstable/main/binary-sparc/mysql-server-4.1_4.1.11a-4sarge8_sparc.deb mysql-dfsg-4.1 (4.1.11a-4sarge8) oldstable-security; urgency=high * Security release prepared for the security team by the Debian MySQL maintainers. Some patches were taken from the Ubuntu project. * CVE-2007-2691: Fixes the problem that MySQL did not require the DROP privilege for RENAME TABLE statements, which allows remote authenticated users to rename arbitrary tables. Closes: #424778 * CVE-2007-3780: It was discovered that MySQL could be made to overflow a signed char during authentication. Remote attackers could use crafted authentication requests to cause a denial of service. oldstable/main/source/ndiswrapper-modules-i386_1.1-2sarge2.dsc oldstable/main/source/ndiswrapper-modules-i386_1.1-2sarge2.tar.gz oldstable/main/binary-i386/ndiswrapper-modules-2.6.8-4-386_1.1-2sarge2_i386.deb oldstable/main/binary-i386/ndiswrapper-modules-2.6.8-4-686_1.1-2sarge2_i386.deb oldstable/main/binary-i386/ndiswrapper-modules-2.6.8-4-686-smp_1.1-2sarge2_i386.deb oldstable/main/binary-i386/ndiswrapper-modules-2.6.8-4-k7_1.1-2sarge2_i386.deb oldstable/main/binary-i386/ndiswrapper-modules-2.6.8-4-k7-smp_1.1-2sarge2_i386.deb ndiswrapper-modules-i386 (1.1-2sarge2) oldstable-security; urgency=high * Non-maintainer upload by the Security Team * Rebuild for -4 ABI oldstable/main/binary-arm/libhttp-ocaml-dev_0.1.0-3_arm.deb ocaml-http (0.1.0-3) unstable; urgency=low * rebuilt against ocamlnet 1.0 * uses dpatch, changed debian/{control,rules,patches} accordingly * patched http_daemon.ml so that it doesn't flush data, this apparently solves some issues with approx (see debian/patches/17_flush.dpatch) oldstable/main/binary-ia64/libhttp-ocaml-dev_0.1.0-3_ia64.deb ocaml-http (0.1.0-3) unstable; urgency=low * rebuilt against ocamlnet 1.0 * uses dpatch, changed debian/{control,rules,patches} accordingly * patched http_daemon.ml so that it doesn't flush data, this apparently solves some issues with approx (see debian/patches/17_flush.dpatch) oldstable/main/binary-alpha/octaviz_0.4.0-10sarge1_alpha.deb octaviz (0.4.0-10sarge1) stable; urgency=low +++ Changes by Thomas Weber * recompile to pick up correct Octave version (Closes: #341676, #304162) * Apply 40-cast-pointer-long.patch. This should bring all released stable architectures back in sync oldstable/main/binary-ia64/octaviz_0.4.0-10sarge1_ia64.deb octaviz (0.4.0-10sarge1) stable; urgency=low +++ Changes by Thomas Weber * recompile to pick up correct Octave version (Closes: #341676, #304162) * Apply 40-cast-pointer-long.patch. This should bring all released stable architectures back in sync oldstable/main/binary-i386/openoffice.org-bin_1.1.3-9sarge7_i386.deb oldstable/main/binary-i386/openoffice.org-kde_1.1.3-9sarge7_i386.deb oldstable/main/binary-i386/openoffice.org-gtk-gnome_1.1.3-9sarge7_i386.deb oldstable/main/binary-i386/openoffice.org-dev_1.1.3-9sarge7_i386.deb oldstable/main/binary-i386/openoffice.org-evolution_1.1.3-9sarge7_i386.deb openoffice.org (1.1.3-9sarge7) oldstable-security; urgency=high * ooo-build/patches/OOO_1_1/sw.rtf.prtdata.patch: add, fix heap overflow in parsing of RTF data (CVE-2007-0244) oldstable/main/binary-s390/openoffice.org-bin_1.1.3-9sarge7_s390.deb oldstable/main/binary-s390/openoffice.org-kde_1.1.3-9sarge7_s390.deb oldstable/main/binary-s390/openoffice.org-gtk-gnome_1.1.3-9sarge7_s390.deb oldstable/main/binary-s390/openoffice.org-dev_1.1.3-9sarge7_s390.deb oldstable/main/binary-s390/openoffice.org-evolution_1.1.3-9sarge7_s390.deb openoffice.org (1.1.3-9sarge7) oldstable-security; urgency=high * ooo-build/patches/OOO_1_1/sw.rtf.prtdata.patch: add, fix heap overflow in parsing of RTF data (CVE-2007-0244) oldstable/main/binary-all/openoffice.org-l10n-ns_1.1.3-9sarge7_all.deb oldstable/main/source/openoffice.org_1.1.3-9sarge7.diff.gz oldstable/main/binary-powerpc/openoffice.org-gtk-gnome_1.1.3-9sarge7_powerpc.deb oldstable/main/binary-all/openoffice.org-l10n-el_1.1.3-9sarge7_all.deb oldstable/main/binary-all/openoffice.org-l10n-et_1.1.3-9sarge7_all.deb oldstable/main/binary-all/openoffice.org-l10n-sl_1.1.3-9sarge7_all.deb oldstable/main/binary-sparc/openoffice.org-evolution_1.1.3-9sarge7_sparc.deb oldstable/main/binary-all/openoffice.org-l10n-tn_1.1.3-9sarge7_all.deb oldstable/main/binary-all/openoffice.org-l10n-sk_1.1.3-9sarge7_all.deb oldstable/main/binary-all/openoffice.org-l10n-sv_1.1.3-9sarge7_all.deb oldstable/main/binary-all/openoffice.org-l10n-da_1.1.3-9sarge7_all.deb oldstable/main/binary-all/openoffice.org-l10n-hu_1.1.3-9sarge7_all.deb oldstable/main/binary-all/openoffice.org-l10n-es_1.1.3-9sarge7_all.deb oldstable/main/binary-sparc/openoffice.org-dev_1.1.3-9sarge7_sparc.deb oldstable/main/binary-all/openoffice.org-l10n-pl_1.1.3-9sarge7_all.deb oldstable/main/binary-all/openoffice.org-l10n-zu_1.1.3-9sarge7_all.deb oldstable/main/binary-all/openoffice.org-l10n-ru_1.1.3-9sarge7_all.deb oldstable/main/binary-sparc/openoffice.org-gtk-gnome_1.1.3-9sarge7_sparc.deb oldstable/main/binary-sparc/openoffice.org-bin_1.1.3-9sarge7_sparc.deb oldstable/main/binary-all/openoffice.org_1.1.3-9sarge7_all.deb oldstable/main/binary-all/openoffice.org-l10n-pt_1.1.3-9sarge7_all.deb oldstable/main/binary-all/openoffice.org-l10n-eu_1.1.3-9sarge7_all.deb oldstable/main/binary-all/openoffice.org-l10n-he_1.1.3-9sarge7_all.deb oldstable/main/source/openoffice.org_1.1.3-9sarge7.dsc oldstable/main/binary-all/openoffice.org-mimelnk_1.1.3-9sarge7_all.deb oldstable/main/binary-all/openoffice.org-l10n-fr_1.1.3-9sarge7_all.deb oldstable/main/binary-powerpc/openoffice.org-evolution_1.1.3-9sarge7_powerpc.deb oldstable/main/binary-all/openoffice.org-l10n-cy_1.1.3-9sarge7_all.deb oldstable/main/binary-powerpc/openoffice.org-kde_1.1.3-9sarge7_powerpc.deb oldstable/main/binary-all/openoffice.org-thesaurus-en-us_1.1.3-9sarge7_all.deb oldstable/main/binary-all/openoffice.org-l10n-th_1.1.3-9sarge7_all.deb oldstable/main/binary-all/openoffice.org-l10n-de_1.1.3-9sarge7_all.deb oldstable/main/binary-all/openoffice.org-l10n-ja_1.1.3-9sarge7_all.deb oldstable/main/binary-all/openoffice.org-l10n-en_1.1.3-9sarge7_all.deb oldstable/main/binary-all/openoffice.org-l10n-zh-tw_1.1.3-9sarge7_all.deb oldstable/main/binary-all/ttf-opensymbol_1.1.3-9sarge7_all.deb oldstable/main/binary-sparc/openoffice.org-kde_1.1.3-9sarge7_sparc.deb oldstable/main/binary-powerpc/openoffice.org-bin_1.1.3-9sarge7_powerpc.deb oldstable/main/binary-all/openoffice.org-l10n-ca_1.1.3-9sarge7_all.deb oldstable/main/binary-all/openoffice.org-l10n-nl_1.1.3-9sarge7_all.deb oldstable/main/binary-all/openoffice.org-l10n-gl_1.1.3-9sarge7_all.deb oldstable/main/binary-all/openoffice.org-l10n-ko_1.1.3-9sarge7_all.deb oldstable/main/binary-all/openoffice.org-l10n-tr_1.1.3-9sarge7_all.deb oldstable/main/binary-all/openoffice.org-l10n-lt_1.1.3-9sarge7_all.deb oldstable/main/binary-powerpc/openoffice.org-dev_1.1.3-9sarge7_powerpc.deb oldstable/main/binary-all/openoffice.org-l10n-fi_1.1.3-9sarge7_all.deb oldstable/main/binary-all/openoffice.org-l10n-ar_1.1.3-9sarge7_all.deb oldstable/main/binary-all/openoffice.org-l10n-pt-br_1.1.3-9sarge7_all.deb oldstable/main/binary-all/openoffice.org-l10n-nb_1.1.3-9sarge7_all.deb oldstable/main/binary-all/openoffice.org-l10n-nn_1.1.3-9sarge7_all.deb oldstable/main/binary-all/openoffice.org-l10n-cs_1.1.3-9sarge7_all.deb oldstable/main/binary-all/openoffice.org-l10n-zh-cn_1.1.3-9sarge7_all.deb oldstable/main/binary-all/openoffice.org-l10n-hi_1.1.3-9sarge7_all.deb oldstable/main/binary-all/openoffice.org-l10n-kn_1.1.3-9sarge7_all.deb oldstable/main/binary-all/openoffice.org-l10n-it_1.1.3-9sarge7_all.deb oldstable/main/binary-all/openoffice.org-l10n-af_1.1.3-9sarge7_all.deb openoffice.org (1.1.3-9sarge7) oldstable-security; urgency=high * ooo-build/patches/OOO_1_1/sw.rtf.prtdata.patch: add, fix heap overflow in parsing of RTF data (CVE-2007-0244) oldstable/main/binary-i386/openoffice.org-bin_1.1.3-9sarge8_i386.deb oldstable/main/binary-i386/openoffice.org-kde_1.1.3-9sarge8_i386.deb oldstable/main/binary-i386/openoffice.org-gtk-gnome_1.1.3-9sarge8_i386.deb oldstable/main/binary-i386/openoffice.org-dev_1.1.3-9sarge8_i386.deb oldstable/main/binary-i386/openoffice.org-evolution_1.1.3-9sarge8_i386.deb openoffice.org (1.1.3-9sarge8) oldstable-security; urgency=high * ooo-build/patches/OOO_1_1/itiff.patch: fix tiff heap overflow (CVE-2007-2834) oldstable/main/binary-s390/openoffice.org-bin_1.1.3-9sarge8_s390.deb oldstable/main/binary-s390/openoffice.org-kde_1.1.3-9sarge8_s390.deb oldstable/main/binary-s390/openoffice.org-gtk-gnome_1.1.3-9sarge8_s390.deb oldstable/main/binary-s390/openoffice.org-dev_1.1.3-9sarge8_s390.deb oldstable/main/binary-s390/openoffice.org-evolution_1.1.3-9sarge8_s390.deb openoffice.org (1.1.3-9sarge8) oldstable-security; urgency=high * ooo-build/patches/OOO_1_1/itiff.patch: fix tiff heap overflow (CVE-2007-2834) oldstable/main/binary-all/openoffice.org-l10n-zu_1.1.3-9sarge8_all.deb oldstable/main/binary-all/openoffice.org-l10n-cs_1.1.3-9sarge8_all.deb oldstable/main/binary-all/openoffice.org-l10n-hi_1.1.3-9sarge8_all.deb oldstable/main/binary-all/openoffice.org-l10n-ko_1.1.3-9sarge8_all.deb oldstable/main/binary-all/openoffice.org-l10n-nl_1.1.3-9sarge8_all.deb oldstable/main/binary-all/openoffice.org-l10n-tn_1.1.3-9sarge8_all.deb oldstable/main/binary-all/openoffice.org-l10n-ru_1.1.3-9sarge8_all.deb oldstable/main/binary-all/openoffice.org-l10n-pt-br_1.1.3-9sarge8_all.deb oldstable/main/binary-all/openoffice.org-l10n-sk_1.1.3-9sarge8_all.deb oldstable/main/binary-all/openoffice.org-l10n-sl_1.1.3-9sarge8_all.deb oldstable/main/binary-all/openoffice.org-l10n-af_1.1.3-9sarge8_all.deb oldstable/main/binary-all/openoffice.org-l10n-eu_1.1.3-9sarge8_all.deb oldstable/main/binary-all/openoffice.org-thesaurus-en-us_1.1.3-9sarge8_all.deb oldstable/main/binary-all/openoffice.org-mimelnk_1.1.3-9sarge8_all.deb oldstable/main/binary-all/openoffice.org-l10n-it_1.1.3-9sarge8_all.deb oldstable/main/binary-all/openoffice.org-l10n-de_1.1.3-9sarge8_all.deb oldstable/main/binary-all/openoffice.org-l10n-fi_1.1.3-9sarge8_all.deb oldstable/main/binary-all/openoffice.org-l10n-th_1.1.3-9sarge8_all.deb oldstable/main/binary-all/openoffice.org-l10n-gl_1.1.3-9sarge8_all.deb oldstable/main/binary-all/openoffice.org-l10n-el_1.1.3-9sarge8_all.deb oldstable/main/binary-all/openoffice.org-l10n-sv_1.1.3-9sarge8_all.deb oldstable/main/binary-all/openoffice.org-l10n-es_1.1.3-9sarge8_all.deb oldstable/main/binary-all/openoffice.org_1.1.3-9sarge8_all.deb oldstable/main/binary-all/openoffice.org-l10n-pl_1.1.3-9sarge8_all.deb oldstable/main/source/openoffice.org_1.1.3-9sarge8.dsc oldstable/main/binary-all/openoffice.org-l10n-tr_1.1.3-9sarge8_all.deb oldstable/main/binary-all/ttf-opensymbol_1.1.3-9sarge8_all.deb oldstable/main/binary-all/openoffice.org-l10n-ns_1.1.3-9sarge8_all.deb oldstable/main/binary-all/openoffice.org-l10n-fr_1.1.3-9sarge8_all.deb oldstable/main/binary-all/openoffice.org-l10n-cy_1.1.3-9sarge8_all.deb oldstable/main/binary-powerpc/openoffice.org-gtk-gnome_1.1.3-9sarge8_powerpc.deb oldstable/main/source/openoffice.org_1.1.3-9sarge8.diff.gz oldstable/main/binary-all/openoffice.org-l10n-nb_1.1.3-9sarge8_all.deb oldstable/main/binary-powerpc/openoffice.org-dev_1.1.3-9sarge8_powerpc.deb oldstable/main/binary-all/openoffice.org-l10n-ca_1.1.3-9sarge8_all.deb oldstable/main/binary-powerpc/openoffice.org-kde_1.1.3-9sarge8_powerpc.deb oldstable/main/binary-all/openoffice.org-l10n-en_1.1.3-9sarge8_all.deb oldstable/main/binary-all/openoffice.org-l10n-kn_1.1.3-9sarge8_all.deb oldstable/main/binary-powerpc/openoffice.org-bin_1.1.3-9sarge8_powerpc.deb oldstable/main/binary-all/openoffice.org-l10n-nn_1.1.3-9sarge8_all.deb oldstable/main/binary-all/openoffice.org-l10n-ar_1.1.3-9sarge8_all.deb oldstable/main/binary-all/openoffice.org-l10n-da_1.1.3-9sarge8_all.deb oldstable/main/binary-all/openoffice.org-l10n-ja_1.1.3-9sarge8_all.deb oldstable/main/binary-all/openoffice.org-l10n-he_1.1.3-9sarge8_all.deb oldstable/main/binary-all/openoffice.org-l10n-pt_1.1.3-9sarge8_all.deb oldstable/main/binary-all/openoffice.org-l10n-zh-tw_1.1.3-9sarge8_all.deb oldstable/main/binary-all/openoffice.org-l10n-et_1.1.3-9sarge8_all.deb oldstable/main/binary-powerpc/openoffice.org-evolution_1.1.3-9sarge8_powerpc.deb oldstable/main/binary-all/openoffice.org-l10n-lt_1.1.3-9sarge8_all.deb oldstable/main/binary-all/openoffice.org-l10n-zh-cn_1.1.3-9sarge8_all.deb oldstable/main/binary-all/openoffice.org-l10n-hu_1.1.3-9sarge8_all.deb openoffice.org (1.1.3-9sarge8) oldstable-security; urgency=high * ooo-build/patches/OOO_1_1/itiff.patch: fix tiff heap overflow (CVE-2007-2834) oldstable/main/binary-sparc/openoffice.org-bin_1.1.3-9sarge8_sparc.deb oldstable/main/binary-sparc/openoffice.org-kde_1.1.3-9sarge8_sparc.deb oldstable/main/binary-sparc/openoffice.org-gtk-gnome_1.1.3-9sarge8_sparc.deb oldstable/main/binary-sparc/openoffice.org-dev_1.1.3-9sarge8_sparc.deb oldstable/main/binary-sparc/openoffice.org-evolution_1.1.3-9sarge8_sparc.deb openoffice.org (1.1.3-9sarge8) oldstable-security; urgency=high * ooo-build/patches/OOO_1_1/itiff.patch: fix tiff heap overflow (CVE-2007-2834) oldstable/main/binary-alpha/libssl0.9.6_0.9.6m-1sarge5_alpha.deb openssl096 (0.9.6m-1sarge5) oldstable-security; urgency=low * CVE-2007-5135: Fix off by one error in SSL_get_shared_ciphers(). * Call dh_fixperms before dh_strip so that stripping actually works. oldstable/main/binary-amd64/libssl0.9.6_0.9.6m-1sarge5_amd64.deb openssl096 (0.9.6m-1sarge5) oldstable-security; urgency=low * CVE-2007-5135: Fix off by one error in SSL_get_shared_ciphers(). * Call dh_fixperms before dh_strip so that stripping actually works. oldstable/main/binary-arm/libssl0.9.6_0.9.6m-1sarge5_arm.deb openssl096 (0.9.6m-1sarge5) oldstable-security; urgency=low * CVE-2007-5135: Fix off by one error in SSL_get_shared_ciphers(). * Call dh_fixperms before dh_strip so that stripping actually works. oldstable/main/binary-hppa/libssl0.9.6_0.9.6m-1sarge5_hppa.deb openssl096 (0.9.6m-1sarge5) oldstable-security; urgency=low * CVE-2007-5135: Fix off by one error in SSL_get_shared_ciphers(). * Call dh_fixperms before dh_strip so that stripping actually works. oldstable/main/source/openssl096_0.9.6m-1sarge5.dsc oldstable/main/source/openssl096_0.9.6m-1sarge5.diff.gz oldstable/main/binary-i386/libssl0.9.6_0.9.6m-1sarge5_i386.deb openssl096 (0.9.6m-1sarge5) oldstable-security; urgency=low * CVE-2007-5135: Fix off by one error in SSL_get_shared_ciphers(). * Call dh_fixperms before dh_strip so that stripping actually works. oldstable/main/binary-ia64/libssl0.9.6_0.9.6m-1sarge5_ia64.deb openssl096 (0.9.6m-1sarge5) oldstable-security; urgency=low * CVE-2007-5135: Fix off by one error in SSL_get_shared_ciphers(). * Call dh_fixperms before dh_strip so that stripping actually works. oldstable/main/binary-m68k/libssl0.9.6_0.9.6m-1sarge5_m68k.deb openssl096 (0.9.6m-1sarge5) oldstable-security; urgency=low * CVE-2007-5135: Fix off by one error in SSL_get_shared_ciphers(). * Call dh_fixperms before dh_strip so that stripping actually works. oldstable/main/binary-mips/libssl0.9.6_0.9.6m-1sarge5_mips.deb openssl096 (0.9.6m-1sarge5) oldstable-security; urgency=low * CVE-2007-5135: Fix off by one error in SSL_get_shared_ciphers(). * Call dh_fixperms before dh_strip so that stripping actually works. oldstable/main/binary-mipsel/libssl0.9.6_0.9.6m-1sarge5_mipsel.deb openssl096 (0.9.6m-1sarge5) oldstable-security; urgency=low * CVE-2007-5135: Fix off by one error in SSL_get_shared_ciphers(). * Call dh_fixperms before dh_strip so that stripping actually works. oldstable/main/binary-powerpc/libssl0.9.6_0.9.6m-1sarge5_powerpc.deb openssl096 (0.9.6m-1sarge5) oldstable-security; urgency=low * CVE-2007-5135: Fix off by one error in SSL_get_shared_ciphers(). * Call dh_fixperms before dh_strip so that stripping actually works. oldstable/main/binary-s390/libssl0.9.6_0.9.6m-1sarge5_s390.deb openssl096 (0.9.6m-1sarge5) oldstable-security; urgency=low * CVE-2007-5135: Fix off by one error in SSL_get_shared_ciphers(). * Call dh_fixperms before dh_strip so that stripping actually works. oldstable/main/binary-sparc/libssl0.9.6_0.9.6m-1sarge5_sparc.deb openssl096 (0.9.6m-1sarge5) oldstable-security; urgency=low * CVE-2007-5135: Fix off by one error in SSL_get_shared_ciphers(). * Call dh_fixperms before dh_strip so that stripping actually works. oldstable/main/binary-alpha/openssl_0.9.7e-3sarge5_alpha.deb oldstable/main/binary-alpha/libssl0.9.7_0.9.7e-3sarge5_alpha.deb oldstable/main/libcrypto0.9.7-udeb_0.9.7e-3sarge5_alpha.udeb oldstable/main/binary-alpha/libssl-dev_0.9.7e-3sarge5_alpha.deb openssl (0.9.7e-3sarge5) oldstable-security; urgency=low * CVE-2007-5135: Fix off by one error in SSL_get_shared_ciphers(). (Closes: #444435) * Call dh_fixperms before dh_strip so that stripping actually works. oldstable/main/binary-amd64/openssl_0.9.7e-3sarge5_amd64.deb oldstable/main/binary-amd64/libssl0.9.7_0.9.7e-3sarge5_amd64.deb oldstable/main/libcrypto0.9.7-udeb_0.9.7e-3sarge5_amd64.udeb oldstable/main/binary-amd64/libssl-dev_0.9.7e-3sarge5_amd64.deb openssl (0.9.7e-3sarge5) oldstable-security; urgency=low * CVE-2007-5135: Fix off by one error in SSL_get_shared_ciphers(). (Closes: #444435) * Call dh_fixperms before dh_strip so that stripping actually works. oldstable/main/binary-arm/openssl_0.9.7e-3sarge5_arm.deb oldstable/main/binary-arm/libssl0.9.7_0.9.7e-3sarge5_arm.deb oldstable/main/libcrypto0.9.7-udeb_0.9.7e-3sarge5_arm.udeb oldstable/main/binary-arm/libssl-dev_0.9.7e-3sarge5_arm.deb openssl (0.9.7e-3sarge5) oldstable-security; urgency=low * CVE-2007-5135: Fix off by one error in SSL_get_shared_ciphers(). (Closes: #444435) * Call dh_fixperms before dh_strip so that stripping actually works. oldstable/main/binary-hppa/openssl_0.9.7e-3sarge5_hppa.deb oldstable/main/binary-hppa/libssl0.9.7_0.9.7e-3sarge5_hppa.deb oldstable/main/libcrypto0.9.7-udeb_0.9.7e-3sarge5_hppa.udeb oldstable/main/binary-hppa/libssl-dev_0.9.7e-3sarge5_hppa.deb openssl (0.9.7e-3sarge5) oldstable-security; urgency=low * CVE-2007-5135: Fix off by one error in SSL_get_shared_ciphers(). (Closes: #444435) * Call dh_fixperms before dh_strip so that stripping actually works. oldstable/main/source/openssl_0.9.7e-3sarge5.dsc oldstable/main/source/openssl_0.9.7e-3sarge5.diff.gz oldstable/main/binary-i386/openssl_0.9.7e-3sarge5_i386.deb oldstable/main/binary-i386/libssl0.9.7_0.9.7e-3sarge5_i386.deb oldstable/main/libcrypto0.9.7-udeb_0.9.7e-3sarge5_i386.udeb oldstable/main/binary-i386/libssl-dev_0.9.7e-3sarge5_i386.deb openssl (0.9.7e-3sarge5) oldstable-security; urgency=low * CVE-2007-5135: Fix off by one error in SSL_get_shared_ciphers(). (Closes: #444435) * Call dh_fixperms before dh_strip so that stripping actually works. oldstable/main/binary-ia64/openssl_0.9.7e-3sarge5_ia64.deb oldstable/main/binary-ia64/libssl0.9.7_0.9.7e-3sarge5_ia64.deb oldstable/main/libcrypto0.9.7-udeb_0.9.7e-3sarge5_ia64.udeb oldstable/main/binary-ia64/libssl-dev_0.9.7e-3sarge5_ia64.deb openssl (0.9.7e-3sarge5) oldstable-security; urgency=low * CVE-2007-5135: Fix off by one error in SSL_get_shared_ciphers(). (Closes: #444435) * Call dh_fixperms before dh_strip so that stripping actually works. oldstable/main/binary-m68k/openssl_0.9.7e-3sarge5_m68k.deb oldstable/main/binary-m68k/libssl0.9.7_0.9.7e-3sarge5_m68k.deb oldstable/main/libcrypto0.9.7-udeb_0.9.7e-3sarge5_m68k.udeb oldstable/main/binary-m68k/libssl-dev_0.9.7e-3sarge5_m68k.deb openssl (0.9.7e-3sarge5) oldstable-security; urgency=low * CVE-2007-5135: Fix off by one error in SSL_get_shared_ciphers(). (Closes: #444435) * Call dh_fixperms before dh_strip so that stripping actually works. oldstable/main/binary-mips/openssl_0.9.7e-3sarge5_mips.deb oldstable/main/binary-mips/libssl0.9.7_0.9.7e-3sarge5_mips.deb oldstable/main/libcrypto0.9.7-udeb_0.9.7e-3sarge5_mips.udeb oldstable/main/binary-mips/libssl-dev_0.9.7e-3sarge5_mips.deb openssl (0.9.7e-3sarge5) oldstable-security; urgency=low * CVE-2007-5135: Fix off by one error in SSL_get_shared_ciphers(). (Closes: #444435) * Call dh_fixperms before dh_strip so that stripping actually works. oldstable/main/binary-mipsel/openssl_0.9.7e-3sarge5_mipsel.deb oldstable/main/binary-mipsel/libssl0.9.7_0.9.7e-3sarge5_mipsel.deb oldstable/main/libcrypto0.9.7-udeb_0.9.7e-3sarge5_mipsel.udeb oldstable/main/binary-mipsel/libssl-dev_0.9.7e-3sarge5_mipsel.deb openssl (0.9.7e-3sarge5) oldstable-security; urgency=low * CVE-2007-5135: Fix off by one error in SSL_get_shared_ciphers(). (Closes: #444435) * Call dh_fixperms before dh_strip so that stripping actually works. oldstable/main/binary-powerpc/openssl_0.9.7e-3sarge5_powerpc.deb oldstable/main/binary-powerpc/libssl0.9.7_0.9.7e-3sarge5_powerpc.deb oldstable/main/libcrypto0.9.7-udeb_0.9.7e-3sarge5_powerpc.udeb oldstable/main/binary-powerpc/libssl-dev_0.9.7e-3sarge5_powerpc.deb openssl (0.9.7e-3sarge5) oldstable-security; urgency=low * CVE-2007-5135: Fix off by one error in SSL_get_shared_ciphers(). (Closes: #444435) * Call dh_fixperms before dh_strip so that stripping actually works. oldstable/main/binary-s390/openssl_0.9.7e-3sarge5_s390.deb oldstable/main/binary-s390/libssl0.9.7_0.9.7e-3sarge5_s390.deb oldstable/main/libcrypto0.9.7-udeb_0.9.7e-3sarge5_s390.udeb oldstable/main/binary-s390/libssl-dev_0.9.7e-3sarge5_s390.deb openssl (0.9.7e-3sarge5) oldstable-security; urgency=low * CVE-2007-5135: Fix off by one error in SSL_get_shared_ciphers(). (Closes: #444435) * Call dh_fixperms before dh_strip so that stripping actually works. oldstable/main/binary-sparc/openssl_0.9.7e-3sarge5_sparc.deb oldstable/main/binary-sparc/libssl0.9.7_0.9.7e-3sarge5_sparc.deb oldstable/main/libcrypto0.9.7-udeb_0.9.7e-3sarge5_sparc.udeb oldstable/main/binary-sparc/libssl-dev_0.9.7e-3sarge5_sparc.deb openssl (0.9.7e-3sarge5) oldstable-security; urgency=low * CVE-2007-5135: Fix off by one error in SSL_get_shared_ciphers(). (Closes: #444435) * Call dh_fixperms before dh_strip so that stripping actually works. oldstable/main/binary-arm/libossp-sa-dev_1.2.2-1_arm.deb oldstable/main/binary-arm/libossp-sa12_1.2.2-1_arm.deb osspsa (1.2.2-1) unstable; urgency=low * Initial Release (Closes: #285820). oldstable/main/binary-arm/paje.app_1.3.2-3_arm.deb paje.app (1.3.2-3) unstable; urgency=low * Do really drop this build-dep by editing control.in, not control (which gets rewritten by cdbs). Sorry for the noise. oldstable/main/binary-m68k/paje.app_1.3.2-3_m68k.deb paje.app (1.3.2-3) unstable; urgency=low * Do really drop this build-dep by editing control.in, not control (which gets rewritten by cdbs). Sorry for the noise. oldstable/main/source/partman-jfs_13sarge1.dsc oldstable/main/source/partman-jfs_13sarge1.tar.gz oldstable/main/partman-jfs_13sarge1_all.udeb partman-jfs (13sarge1) oldstable; urgency=low * Frans Pop Fix script error from missing ']' in commit script. * Christian Perrier - Fix the spelling of "a JFS file system" oldstable/main/binary-arm/pasmo_0.5.1-3_arm.deb pasmo (0.5.1-3) unstable; urgency=low * Fixes ITP (Closes: #286947) * fix cleanup manual page on clean target oldstable/main/binary-alpha/libpcre3_4.5+7.4-1_alpha.deb oldstable/main/binary-alpha/libpcre3-dev_4.5+7.4-1_alpha.deb oldstable/main/binary-alpha/pcregrep_4.5+7.4-1_alpha.deb pcre3 (4.5+7.4-1) oldstable-security; urgency=high * Non-maintainer upload by the security team. * Upgrade to upstream version 7.4 to incorporate results of a security audit. The version included here tries to expose the 4.5 API unchanged, and the pattern language is compatible with version 4.5. * This update fixes CVE-2007-1659, CVE-2007-1660, CVE-2007-1661, CVE-2007-1662, CVE-2007-4766, CVE-2007-4767, CVE-2007-4768. * Note that externally stored compiled patterns need to be recompiled becaue the internal bytecodes have changed. (This feature is only rarely used; no further action is required by most users.) oldstable/main/binary-arm/libpcre3_4.5+7.4-1_arm.deb oldstable/main/binary-arm/libpcre3-dev_4.5+7.4-1_arm.deb oldstable/main/binary-arm/pcregrep_4.5+7.4-1_arm.deb pcre3 (4.5+7.4-1) oldstable-security; urgency=high * Non-maintainer upload by the security team. * Upgrade to upstream version 7.4 to incorporate results of a security audit. The version included here tries to expose the 4.5 API unchanged, and the pattern language is compatible with version 4.5. * This update fixes CVE-2007-1659, CVE-2007-1660, CVE-2007-1661, CVE-2007-1662, CVE-2007-4766, CVE-2007-4767, CVE-2007-4768. * Note that externally stored compiled patterns need to be recompiled becaue the internal bytecodes have changed. (This feature is only rarely used; no further action is required by most users.) oldstable/main/binary-hppa/libpcre3_4.5+7.4-1_hppa.deb oldstable/main/binary-hppa/libpcre3-dev_4.5+7.4-1_hppa.deb oldstable/main/binary-hppa/pcregrep_4.5+7.4-1_hppa.deb pcre3 (4.5+7.4-1) oldstable-security; urgency=high * Non-maintainer upload by the security team. * Upgrade to upstream version 7.4 to incorporate results of a security audit. The version included here tries to expose the 4.5 API unchanged, and the pattern language is compatible with version 4.5. * This update fixes CVE-2007-1659, CVE-2007-1660, CVE-2007-1661, CVE-2007-1662, CVE-2007-4766, CVE-2007-4767, CVE-2007-4768. * Note that externally stored compiled patterns need to be recompiled becaue the internal bytecodes have changed. (This feature is only rarely used; no further action is required by most users.) oldstable/main/source/pcre3_4.5+7.4-1.dsc oldstable/main/source/pcre3_4.5+7.4.orig.tar.gz oldstable/main/source/pcre3_4.5+7.4-1.diff.gz oldstable/main/binary-all/pgrep_4.5+7.4-1_all.deb oldstable/main/binary-i386/libpcre3_4.5+7.4-1_i386.deb oldstable/main/binary-i386/libpcre3-dev_4.5+7.4-1_i386.deb oldstable/main/binary-i386/pcregrep_4.5+7.4-1_i386.deb pcre3 (4.5+7.4-1) oldstable-security; urgency=high * Non-maintainer upload by the security team. * Upgrade to upstream version 7.4 to incorporate results of a security audit. The version included here tries to expose the 4.5 API unchanged, and the pattern language is compatible with version 4.5. * This update fixes CVE-2007-1659, CVE-2007-1660, CVE-2007-1661, CVE-2007-1662, CVE-2007-4766, CVE-2007-4767, CVE-2007-4768. * Note that externally stored compiled patterns need to be recompiled becaue the internal bytecodes have changed. (This feature is only rarely used; no further action is required by most users.) oldstable/main/binary-ia64/libpcre3_4.5+7.4-1_ia64.deb oldstable/main/binary-ia64/libpcre3-dev_4.5+7.4-1_ia64.deb oldstable/main/binary-ia64/pcregrep_4.5+7.4-1_ia64.deb pcre3 (4.5+7.4-1) oldstable-security; urgency=high * Non-maintainer upload by the security team. * Upgrade to upstream version 7.4 to incorporate results of a security audit. The version included here tries to expose the 4.5 API unchanged, and the pattern language is compatible with version 4.5. * This update fixes CVE-2007-1659, CVE-2007-1660, CVE-2007-1661, CVE-2007-1662, CVE-2007-4766, CVE-2007-4767, CVE-2007-4768. * Note that externally stored compiled patterns need to be recompiled becaue the internal bytecodes have changed. (This feature is only rarely used; no further action is required by most users.) oldstable/main/binary-m68k/libpcre3_4.5+7.4-1_m68k.deb oldstable/main/binary-m68k/libpcre3-dev_4.5+7.4-1_m68k.deb oldstable/main/binary-m68k/pcregrep_4.5+7.4-1_m68k.deb pcre3 (4.5+7.4-1) oldstable-security; urgency=high * Non-maintainer upload by the security team. * Upgrade to upstream version 7.4 to incorporate results of a security audit. The version included here tries to expose the 4.5 API unchanged, and the pattern language is compatible with version 4.5. * This update fixes CVE-2007-1659, CVE-2007-1660, CVE-2007-1661, CVE-2007-1662, CVE-2007-4766, CVE-2007-4767, CVE-2007-4768. * Note that externally stored compiled patterns need to be recompiled becaue the internal bytecodes have changed. (This feature is only rarely used; no further action is required by most users.) oldstable/main/binary-mips/libpcre3_4.5+7.4-1_mips.deb oldstable/main/binary-mips/libpcre3-dev_4.5+7.4-1_mips.deb oldstable/main/binary-mips/pcregrep_4.5+7.4-1_mips.deb pcre3 (4.5+7.4-1) oldstable-security; urgency=high * Non-maintainer upload by the security team. * Upgrade to upstream version 7.4 to incorporate results of a security audit. The version included here tries to expose the 4.5 API unchanged, and the pattern language is compatible with version 4.5. * This update fixes CVE-2007-1659, CVE-2007-1660, CVE-2007-1661, CVE-2007-1662, CVE-2007-4766, CVE-2007-4767, CVE-2007-4768. * Note that externally stored compiled patterns need to be recompiled becaue the internal bytecodes have changed. (This feature is only rarely used; no further action is required by most users.) oldstable/main/binary-mipsel/libpcre3_4.5+7.4-1_mipsel.deb oldstable/main/binary-mipsel/libpcre3-dev_4.5+7.4-1_mipsel.deb oldstable/main/binary-mipsel/pcregrep_4.5+7.4-1_mipsel.deb pcre3 (4.5+7.4-1) oldstable-security; urgency=high * Non-maintainer upload by the security team. * Upgrade to upstream version 7.4 to incorporate results of a security audit. The version included here tries to expose the 4.5 API unchanged, and the pattern language is compatible with version 4.5. * This update fixes CVE-2007-1659, CVE-2007-1660, CVE-2007-1661, CVE-2007-1662, CVE-2007-4766, CVE-2007-4767, CVE-2007-4768. * Note that externally stored compiled patterns need to be recompiled becaue the internal bytecodes have changed. (This feature is only rarely used; no further action is required by most users.) oldstable/main/binary-powerpc/libpcre3_4.5+7.4-1_powerpc.deb oldstable/main/binary-powerpc/libpcre3-dev_4.5+7.4-1_powerpc.deb oldstable/main/binary-powerpc/pcregrep_4.5+7.4-1_powerpc.deb pcre3 (4.5+7.4-1) oldstable-security; urgency=high * Non-maintainer upload by the security team. * Upgrade to upstream version 7.4 to incorporate results of a security audit. The version included here tries to expose the 4.5 API unchanged, and the pattern language is compatible with version 4.5. * This update fixes CVE-2007-1659, CVE-2007-1660, CVE-2007-1661, CVE-2007-1662, CVE-2007-4766, CVE-2007-4767, CVE-2007-4768. * Note that externally stored compiled patterns need to be recompiled becaue the internal bytecodes have changed. (This feature is only rarely used; no further action is required by most users.) oldstable/main/binary-s390/libpcre3_4.5+7.4-1_s390.deb oldstable/main/binary-s390/libpcre3-dev_4.5+7.4-1_s390.deb oldstable/main/binary-s390/pcregrep_4.5+7.4-1_s390.deb pcre3 (4.5+7.4-1) oldstable-security; urgency=high * Non-maintainer upload by the security team. * Upgrade to upstream version 7.4 to incorporate results of a security audit. The version included here tries to expose the 4.5 API unchanged, and the pattern language is compatible with version 4.5. * This update fixes CVE-2007-1659, CVE-2007-1660, CVE-2007-1661, CVE-2007-1662, CVE-2007-4766, CVE-2007-4767, CVE-2007-4768. * Note that externally stored compiled patterns need to be recompiled becaue the internal bytecodes have changed. (This feature is only rarely used; no further action is required by most users.) oldstable/main/binary-sparc/libpcre3_4.5+7.4-1_sparc.deb oldstable/main/binary-sparc/libpcre3-dev_4.5+7.4-1_sparc.deb oldstable/main/binary-sparc/pcregrep_4.5+7.4-1_sparc.deb pcre3 (4.5+7.4-1) oldstable-security; urgency=high * Non-maintainer upload by the security team. * Upgrade to upstream version 7.4 to incorporate results of a security audit. The version included here tries to expose the 4.5 API unchanged, and the pattern language is compatible with version 4.5. * This update fixes CVE-2007-1659, CVE-2007-1660, CVE-2007-1661, CVE-2007-1662, CVE-2007-4766, CVE-2007-4767, CVE-2007-4768. * Note that externally stored compiled patterns need to be recompiled becaue the internal bytecodes have changed. (This feature is only rarely used; no further action is required by most users.) oldstable/main/binary-alpha/pdfkit.framework_0.8-2sarge4_alpha.deb pdfkit.framework (0.8-2sarge4) oldstable-security; urgency=high * Fix integer overflow in stream predictor. (CVE-2007-3387) oldstable/main/binary-arm/pdfkit.framework_0.8-2sarge4_arm.deb pdfkit.framework (0.8-2sarge4) oldstable-security; urgency=high * Fix integer overflow in stream predictor. (CVE-2007-3387) oldstable/main/binary-hppa/pdfkit.framework_0.8-2sarge4_hppa.deb pdfkit.framework (0.8-2sarge4) oldstable-security; urgency=high * Fix integer overflow in stream predictor. (CVE-2007-3387) oldstable/main/source/pdfkit.framework_0.8-2sarge4.dsc oldstable/main/source/pdfkit.framework_0.8-2sarge4.diff.gz oldstable/main/binary-i386/pdfkit.framework_0.8-2sarge4_i386.deb pdfkit.framework (0.8-2sarge4) oldstable-security; urgency=high * Fix integer overflow in stream predictor. (CVE-2007-3387) oldstable/main/binary-ia64/pdfkit.framework_0.8-2sarge4_ia64.deb pdfkit.framework (0.8-2sarge4) oldstable-security; urgency=high * Fix integer overflow in stream predictor. (CVE-2007-3387) oldstable/main/binary-m68k/pdfkit.framework_0.8-2sarge4_m68k.deb pdfkit.framework (0.8-2sarge4) oldstable-security; urgency=high * Fix integer overflow in stream predictor. (CVE-2007-3387) oldstable/main/binary-mips/pdfkit.framework_0.8-2sarge4_mips.deb pdfkit.framework (0.8-2sarge4) oldstable-security; urgency=high * Fix integer overflow in stream predictor. (CVE-2007-3387) oldstable/main/binary-mipsel/pdfkit.framework_0.8-2sarge4_mipsel.deb pdfkit.framework (0.8-2sarge4) oldstable-security; urgency=high * Fix integer overflow in stream predictor. (CVE-2007-3387) oldstable/main/binary-powerpc/pdfkit.framework_0.8-2sarge4_powerpc.deb pdfkit.framework (0.8-2sarge4) oldstable-security; urgency=high * Fix integer overflow in stream predictor. (CVE-2007-3387) oldstable/main/binary-s390/pdfkit.framework_0.8-2sarge4_s390.deb pdfkit.framework (0.8-2sarge4) oldstable-security; urgency=high * Fix integer overflow in stream predictor. (CVE-2007-3387) oldstable/main/binary-sparc/pdfkit.framework_0.8-2sarge4_sparc.deb pdfkit.framework (0.8-2sarge4) oldstable-security; urgency=high * Fix integer overflow in stream predictor. (CVE-2007-3387) oldstable/main/binary-alpha/perdition_1.15-5sarge1_alpha.deb oldstable/main/binary-alpha/perdition-dev_1.15-5sarge1_alpha.deb oldstable/main/binary-alpha/perdition-ldap_1.15-5sarge1_alpha.deb oldstable/main/binary-alpha/perdition-mysql_1.15-5sarge1_alpha.deb oldstable/main/binary-alpha/perdition-odbc_1.15-5sarge1_alpha.deb oldstable/main/binary-alpha/perdition-postgresql_1.15-5sarge1_alpha.deb perdition (1.15-5sarge1) oldstable-security; urgency=high * Verify that tag read from end-users is valid - CVE-2007-5740 The format string protection mechanism in IMAPD for Perdition Mail Retrieval Proxy 1.17 and earlier allows remote attackers to execute arbitrary code via an IMAP tag with a null byte followed by a format string specifier, which is not counted by the mechanism. oldstable/main/binary-arm/perdition_1.15-5sarge1_arm.deb oldstable/main/binary-arm/perdition-dev_1.15-5sarge1_arm.deb oldstable/main/binary-arm/perdition-ldap_1.15-5sarge1_arm.deb oldstable/main/binary-arm/perdition-mysql_1.15-5sarge1_arm.deb oldstable/main/binary-arm/perdition-odbc_1.15-5sarge1_arm.deb oldstable/main/binary-arm/perdition-postgresql_1.15-5sarge1_arm.deb perdition (1.15-5sarge1) oldstable-security; urgency=high * Verify that tag read from end-users is valid - CVE-2007-5740 The format string protection mechanism in IMAPD for Perdition Mail Retrieval Proxy 1.17 and earlier allows remote attackers to execute arbitrary code via an IMAP tag with a null byte followed by a format string specifier, which is not counted by the mechanism. oldstable/main/binary-hppa/perdition_1.15-5sarge1_hppa.deb oldstable/main/binary-hppa/perdition-dev_1.15-5sarge1_hppa.deb oldstable/main/binary-hppa/perdition-ldap_1.15-5sarge1_hppa.deb oldstable/main/binary-hppa/perdition-mysql_1.15-5sarge1_hppa.deb oldstable/main/binary-hppa/perdition-odbc_1.15-5sarge1_hppa.deb oldstable/main/binary-hppa/perdition-postgresql_1.15-5sarge1_hppa.deb perdition (1.15-5sarge1) oldstable-security; urgency=high * Verify that tag read from end-users is valid - CVE-2007-5740 The format string protection mechanism in IMAPD for Perdition Mail Retrieval Proxy 1.17 and earlier allows remote attackers to execute arbitrary code via an IMAP tag with a null byte followed by a format string specifier, which is not counted by the mechanism. oldstable/main/source/perdition_1.15-5sarge1.dsc oldstable/main/source/perdition_1.15-5sarge1.diff.gz oldstable/main/source/perdition_1.15.orig.tar.gz oldstable/main/binary-i386/perdition_1.15-5sarge1_i386.deb oldstable/main/binary-i386/perdition-dev_1.15-5sarge1_i386.deb oldstable/main/binary-i386/perdition-ldap_1.15-5sarge1_i386.deb oldstable/main/binary-i386/perdition-mysql_1.15-5sarge1_i386.deb oldstable/main/binary-i386/perdition-odbc_1.15-5sarge1_i386.deb oldstable/main/binary-i386/perdition-postgresql_1.15-5sarge1_i386.deb perdition (1.15-5sarge1) oldstable-security; urgency=high * Verify that tag read from end-users is valid - CVE-2007-5740 The format string protection mechanism in IMAPD for Perdition Mail Retrieval Proxy 1.17 and earlier allows remote attackers to execute arbitrary code via an IMAP tag with a null byte followed by a format string specifier, which is not counted by the mechanism. oldstable/main/binary-ia64/perdition_1.15-5sarge1_ia64.deb oldstable/main/binary-ia64/perdition-dev_1.15-5sarge1_ia64.deb oldstable/main/binary-ia64/perdition-ldap_1.15-5sarge1_ia64.deb oldstable/main/binary-ia64/perdition-mysql_1.15-5sarge1_ia64.deb oldstable/main/binary-ia64/perdition-odbc_1.15-5sarge1_ia64.deb oldstable/main/binary-ia64/perdition-postgresql_1.15-5sarge1_ia64.deb perdition (1.15-5sarge1) oldstable-security; urgency=high * Verify that tag read from end-users is valid - CVE-2007-5740 The format string protection mechanism in IMAPD for Perdition Mail Retrieval Proxy 1.17 and earlier allows remote attackers to execute arbitrary code via an IMAP tag with a null byte followed by a format string specifier, which is not counted by the mechanism. oldstable/main/binary-m68k/perdition_1.15-5sarge1_m68k.deb oldstable/main/binary-m68k/perdition-dev_1.15-5sarge1_m68k.deb oldstable/main/binary-m68k/perdition-ldap_1.15-5sarge1_m68k.deb oldstable/main/binary-m68k/perdition-mysql_1.15-5sarge1_m68k.deb oldstable/main/binary-m68k/perdition-odbc_1.15-5sarge1_m68k.deb oldstable/main/binary-m68k/perdition-postgresql_1.15-5sarge1_m68k.deb perdition (1.15-5sarge1) oldstable-security; urgency=high * Verify that tag read from end-users is valid - CVE-2007-5740 The format string protection mechanism in IMAPD for Perdition Mail Retrieval Proxy 1.17 and earlier allows remote attackers to execute arbitrary code via an IMAP tag with a null byte followed by a format string specifier, which is not counted by the mechanism. oldstable/main/binary-mips/perdition_1.15-5sarge1_mips.deb oldstable/main/binary-mips/perdition-dev_1.15-5sarge1_mips.deb oldstable/main/binary-mips/perdition-ldap_1.15-5sarge1_mips.deb oldstable/main/binary-mips/perdition-mysql_1.15-5sarge1_mips.deb oldstable/main/binary-mips/perdition-odbc_1.15-5sarge1_mips.deb oldstable/main/binary-mips/perdition-postgresql_1.15-5sarge1_mips.deb perdition (1.15-5sarge1) oldstable-security; urgency=high * Verify that tag read from end-users is valid - CVE-2007-5740 The format string protection mechanism in IMAPD for Perdition Mail Retrieval Proxy 1.17 and earlier allows remote attackers to execute arbitrary code via an IMAP tag with a null byte followed by a format string specifier, which is not counted by the mechanism. oldstable/main/binary-mipsel/perdition_1.15-5sarge1_mipsel.deb oldstable/main/binary-mipsel/perdition-dev_1.15-5sarge1_mipsel.deb oldstable/main/binary-mipsel/perdition-ldap_1.15-5sarge1_mipsel.deb oldstable/main/binary-mipsel/perdition-mysql_1.15-5sarge1_mipsel.deb oldstable/main/binary-mipsel/perdition-odbc_1.15-5sarge1_mipsel.deb oldstable/main/binary-mipsel/perdition-postgresql_1.15-5sarge1_mipsel.deb perdition (1.15-5sarge1) oldstable-security; urgency=high * Verify that tag read from end-users is valid - CVE-2007-5740 The format string protection mechanism in IMAPD for Perdition Mail Retrieval Proxy 1.17 and earlier allows remote attackers to execute arbitrary code via an IMAP tag with a null byte followed by a format string specifier, which is not counted by the mechanism. oldstable/main/binary-powerpc/perdition_1.15-5sarge1_powerpc.deb oldstable/main/binary-powerpc/perdition-dev_1.15-5sarge1_powerpc.deb oldstable/main/binary-powerpc/perdition-ldap_1.15-5sarge1_powerpc.deb oldstable/main/binary-powerpc/perdition-mysql_1.15-5sarge1_powerpc.deb oldstable/main/binary-powerpc/perdition-odbc_1.15-5sarge1_powerpc.deb oldstable/main/binary-powerpc/perdition-postgresql_1.15-5sarge1_powerpc.deb perdition (1.15-5sarge1) oldstable-security; urgency=high * Verify that tag read from end-users is valid - CVE-2007-5740 The format string protection mechanism in IMAPD for Perdition Mail Retrieval Proxy 1.17 and earlier allows remote attackers to execute arbitrary code via an IMAP tag with a null byte followed by a format string specifier, which is not counted by the mechanism. oldstable/main/binary-s390/perdition_1.15-5sarge1_s390.deb oldstable/main/binary-s390/perdition-dev_1.15-5sarge1_s390.deb oldstable/main/binary-s390/perdition-ldap_1.15-5sarge1_s390.deb oldstable/main/binary-s390/perdition-mysql_1.15-5sarge1_s390.deb oldstable/main/binary-s390/perdition-odbc_1.15-5sarge1_s390.deb oldstable/main/binary-s390/perdition-postgresql_1.15-5sarge1_s390.deb perdition (1.15-5sarge1) oldstable-security; urgency=high * Verify that tag read from end-users is valid - CVE-2007-5740 The format string protection mechanism in IMAPD for Perdition Mail Retrieval Proxy 1.17 and earlier allows remote attackers to execute arbitrary code via an IMAP tag with a null byte followed by a format string specifier, which is not counted by the mechanism. oldstable/main/binary-sparc/perdition_1.15-5sarge1_sparc.deb oldstable/main/binary-sparc/perdition-dev_1.15-5sarge1_sparc.deb oldstable/main/binary-sparc/perdition-ldap_1.15-5sarge1_sparc.deb oldstable/main/binary-sparc/perdition-mysql_1.15-5sarge1_sparc.deb oldstable/main/binary-sparc/perdition-odbc_1.15-5sarge1_sparc.deb oldstable/main/binary-sparc/perdition-postgresql_1.15-5sarge1_sparc.deb perdition (1.15-5sarge1) oldstable-security; urgency=high * Verify that tag read from end-users is valid - CVE-2007-5740 The format string protection mechanism in IMAPD for Perdition Mail Retrieval Proxy 1.17 and earlier allows remote attackers to execute arbitrary code via an IMAP tag with a null byte followed by a format string specifier, which is not counted by the mechanism. oldstable/main/binary-alpha/perl-base_5.8.4-8sarge6_alpha.deb oldstable/main/binary-alpha/perl-debug_5.8.4-8sarge6_alpha.deb oldstable/main/binary-alpha/perl-suid_5.8.4-8sarge6_alpha.deb oldstable/main/binary-alpha/libperl5.8_5.8.4-8sarge6_alpha.deb oldstable/main/binary-alpha/libperl-dev_5.8.4-8sarge6_alpha.deb oldstable/main/binary-alpha/perl_5.8.4-8sarge6_alpha.deb perl (5.8.4-8sarge6) oldstable-security; urgency=high * Non-maintainer upload by the security team. * Apply patch by Yves Orton to fix CVE-2007-5116. oldstable/main/binary-amd64/perl-base_5.8.4-8sarge6_amd64.deb oldstable/main/binary-amd64/perl-debug_5.8.4-8sarge6_amd64.deb oldstable/main/binary-amd64/perl-suid_5.8.4-8sarge6_amd64.deb oldstable/main/binary-amd64/libperl5.8_5.8.4-8sarge6_amd64.deb oldstable/main/binary-amd64/libperl-dev_5.8.4-8sarge6_amd64.deb oldstable/main/binary-amd64/perl_5.8.4-8sarge6_amd64.deb perl (5.8.4-8sarge6) oldstable-security; urgency=high * Non-maintainer upload by the security team. * Apply patch by Yves Orton to fix CVE-2007-5116. oldstable/main/binary-arm/perl-base_5.8.4-8sarge6_arm.deb oldstable/main/binary-arm/perl-debug_5.8.4-8sarge6_arm.deb oldstable/main/binary-arm/perl-suid_5.8.4-8sarge6_arm.deb oldstable/main/binary-arm/libperl5.8_5.8.4-8sarge6_arm.deb oldstable/main/binary-arm/libperl-dev_5.8.4-8sarge6_arm.deb oldstable/main/binary-arm/perl_5.8.4-8sarge6_arm.deb perl (5.8.4-8sarge6) oldstable-security; urgency=high * Non-maintainer upload by the security team. * Apply patch by Yves Orton to fix CVE-2007-5116. oldstable/main/binary-hppa/perl-base_5.8.4-8sarge6_hppa.deb oldstable/main/binary-hppa/perl-debug_5.8.4-8sarge6_hppa.deb oldstable/main/binary-hppa/perl-suid_5.8.4-8sarge6_hppa.deb oldstable/main/binary-hppa/libperl5.8_5.8.4-8sarge6_hppa.deb oldstable/main/binary-hppa/libperl-dev_5.8.4-8sarge6_hppa.deb oldstable/main/binary-hppa/perl_5.8.4-8sarge6_hppa.deb perl (5.8.4-8sarge6) oldstable-security; urgency=high * Non-maintainer upload by the security team. * Apply patch by Yves Orton to fix CVE-2007-5116. oldstable/main/source/perl_5.8.4-8sarge6.dsc oldstable/main/source/perl_5.8.4-8sarge6.diff.gz oldstable/main/binary-all/libcgi-fast-perl_5.8.4-8sarge6_all.deb oldstable/main/binary-all/perl-doc_5.8.4-8sarge6_all.deb oldstable/main/binary-all/perl-modules_5.8.4-8sarge6_all.deb oldstable/main/binary-i386/perl-base_5.8.4-8sarge6_i386.deb oldstable/main/binary-i386/perl-debug_5.8.4-8sarge6_i386.deb oldstable/main/binary-i386/perl-suid_5.8.4-8sarge6_i386.deb oldstable/main/binary-i386/libperl5.8_5.8.4-8sarge6_i386.deb oldstable/main/binary-i386/libperl-dev_5.8.4-8sarge6_i386.deb oldstable/main/binary-i386/perl_5.8.4-8sarge6_i386.deb perl (5.8.4-8sarge6) oldstable-security; urgency=high * Non-maintainer upload by the security team. * Apply patch by Yves Orton to fix CVE-2007-5116. oldstable/main/binary-ia64/perl-base_5.8.4-8sarge6_ia64.deb oldstable/main/binary-ia64/perl-debug_5.8.4-8sarge6_ia64.deb oldstable/main/binary-ia64/perl-suid_5.8.4-8sarge6_ia64.deb oldstable/main/binary-ia64/libperl5.8_5.8.4-8sarge6_ia64.deb oldstable/main/binary-ia64/libperl-dev_5.8.4-8sarge6_ia64.deb oldstable/main/binary-ia64/perl_5.8.4-8sarge6_ia64.deb perl (5.8.4-8sarge6) oldstable-security; urgency=high * Non-maintainer upload by the security team. * Apply patch by Yves Orton to fix CVE-2007-5116. oldstable/main/binary-m68k/perl-base_5.8.4-8sarge6_m68k.deb oldstable/main/binary-m68k/perl-debug_5.8.4-8sarge6_m68k.deb oldstable/main/binary-m68k/perl-suid_5.8.4-8sarge6_m68k.deb oldstable/main/binary-m68k/libperl5.8_5.8.4-8sarge6_m68k.deb oldstable/main/binary-m68k/libperl-dev_5.8.4-8sarge6_m68k.deb oldstable/main/binary-m68k/perl_5.8.4-8sarge6_m68k.deb perl (5.8.4-8sarge6) oldstable-security; urgency=high * Non-maintainer upload by the security team. * Apply patch by Yves Orton to fix CVE-2007-5116. oldstable/main/binary-mips/perl-base_5.8.4-8sarge6_mips.deb oldstable/main/binary-mips/perl-debug_5.8.4-8sarge6_mips.deb oldstable/main/binary-mips/perl-suid_5.8.4-8sarge6_mips.deb oldstable/main/binary-mips/libperl5.8_5.8.4-8sarge6_mips.deb oldstable/main/binary-mips/libperl-dev_5.8.4-8sarge6_mips.deb oldstable/main/binary-mips/perl_5.8.4-8sarge6_mips.deb perl (5.8.4-8sarge6) oldstable-security; urgency=high * Non-maintainer upload by the security team. * Apply patch by Yves Orton to fix CVE-2007-5116. oldstable/main/binary-mipsel/perl-base_5.8.4-8sarge6_mipsel.deb oldstable/main/binary-mipsel/perl-debug_5.8.4-8sarge6_mipsel.deb oldstable/main/binary-mipsel/perl-suid_5.8.4-8sarge6_mipsel.deb oldstable/main/binary-mipsel/libperl5.8_5.8.4-8sarge6_mipsel.deb oldstable/main/binary-mipsel/libperl-dev_5.8.4-8sarge6_mipsel.deb oldstable/main/binary-mipsel/perl_5.8.4-8sarge6_mipsel.deb perl (5.8.4-8sarge6) oldstable-security; urgency=high * Non-maintainer upload by the security team. * Apply patch by Yves Orton to fix CVE-2007-5116. oldstable/main/binary-powerpc/perl-base_5.8.4-8sarge6_powerpc.deb oldstable/main/binary-powerpc/perl-debug_5.8.4-8sarge6_powerpc.deb oldstable/main/binary-powerpc/perl-suid_5.8.4-8sarge6_powerpc.deb oldstable/main/binary-powerpc/libperl5.8_5.8.4-8sarge6_powerpc.deb oldstable/main/binary-powerpc/libperl-dev_5.8.4-8sarge6_powerpc.deb oldstable/main/binary-powerpc/perl_5.8.4-8sarge6_powerpc.deb perl (5.8.4-8sarge6) oldstable-security; urgency=high * Non-maintainer upload by the security team. * Apply patch by Yves Orton to fix CVE-2007-5116. oldstable/main/binary-s390/perl-base_5.8.4-8sarge6_s390.deb oldstable/main/binary-s390/perl-debug_5.8.4-8sarge6_s390.deb oldstable/main/binary-s390/perl-suid_5.8.4-8sarge6_s390.deb oldstable/main/binary-s390/libperl5.8_5.8.4-8sarge6_s390.deb oldstable/main/binary-s390/libperl-dev_5.8.4-8sarge6_s390.deb oldstable/main/binary-s390/perl_5.8.4-8sarge6_s390.deb perl (5.8.4-8sarge6) oldstable-security; urgency=high * Non-maintainer upload by the security team. * Apply patch by Yves Orton to fix CVE-2007-5116. oldstable/main/binary-sparc/perl-base_5.8.4-8sarge6_sparc.deb oldstable/main/binary-sparc/perl-debug_5.8.4-8sarge6_sparc.deb oldstable/main/binary-sparc/perl-suid_5.8.4-8sarge6_sparc.deb oldstable/main/binary-sparc/libperl5.8_5.8.4-8sarge6_sparc.deb oldstable/main/binary-sparc/libperl-dev_5.8.4-8sarge6_sparc.deb oldstable/main/binary-sparc/perl_5.8.4-8sarge6_sparc.deb perl (5.8.4-8sarge6) oldstable-security; urgency=high * Non-maintainer upload by the security team. * Apply patch by Yves Orton to fix CVE-2007-5116. oldstable/main/binary-alpha/php4-common_4.3.10-20_alpha.deb oldstable/main/binary-alpha/libapache-mod-php4_4.3.10-20_alpha.deb oldstable/main/binary-alpha/php4-curl_4.3.10-20_alpha.deb oldstable/main/binary-alpha/php4-domxml_4.3.10-20_alpha.deb oldstable/main/binary-alpha/php4-gd_4.3.10-20_alpha.deb oldstable/main/binary-alpha/php4-imap_4.3.10-20_alpha.deb oldstable/main/binary-alpha/php4-ldap_4.3.10-20_alpha.deb oldstable/main/binary-alpha/php4-mcal_4.3.10-20_alpha.deb oldstable/main/binary-alpha/php4-mhash_4.3.10-20_alpha.deb oldstable/main/binary-alpha/php4-mysql_4.3.10-20_alpha.deb oldstable/main/binary-alpha/php4-odbc_4.3.10-20_alpha.deb oldstable/main/binary-alpha/php4-recode_4.3.10-20_alpha.deb oldstable/main/binary-alpha/php4-xslt_4.3.10-20_alpha.deb oldstable/main/binary-alpha/php4-snmp_4.3.10-20_alpha.deb oldstable/main/binary-alpha/php4-sybase_4.3.10-20_alpha.deb oldstable/main/binary-alpha/php4-cgi_4.3.10-20_alpha.deb oldstable/main/binary-alpha/php4-cli_4.3.10-20_alpha.deb oldstable/main/binary-alpha/php4-dev_4.3.10-20_alpha.deb oldstable/main/binary-alpha/libapache2-mod-php4_4.3.10-20_alpha.deb php4 (4:4.3.10-20) oldstable-security; urgency=high * NMU prepared for the security team by the package maintainer. * The following security issues are addressed with this update: - CVE-2007-0910/MOPB-32 session_decode() Double Free Vulnerability * note that this is an update to the previous version of the upstream fix for CVE-2007-0910, which introduced a seperate exploit path. - CVE-2007-1286/MOPB-04 unserialize() ZVAL Reference Counter Overflow - CVE-2007-1380/MOPB-10 php_binary Session Deserialization Information Leak - CVE-2007-1521/MOPB-22 session_regenerate_id() Double Free Vulnerability - CVE-2007-1583/MOPB-26 mb_parse_str() register_globals Activation Vuln. - CVE-2007-1777/MOPB-35 zip_entry_read() Integer Overflow Vulnerability * The other security issues resulting from the "Month of PHP bugs" either did not affect the version of php4 shipped in sarge, or did not merit a security update according to the established security policy for php in debian. You are encouraged to verify that your configuration is not affected by any of the other vulnerabilities by visiting: http://www.php-security.org/ oldstable/main/binary-arm/php4-common_4.3.10-20_arm.deb oldstable/main/binary-arm/libapache-mod-php4_4.3.10-20_arm.deb oldstable/main/binary-arm/php4-curl_4.3.10-20_arm.deb oldstable/main/binary-arm/php4-domxml_4.3.10-20_arm.deb oldstable/main/binary-arm/php4-gd_4.3.10-20_arm.deb oldstable/main/binary-arm/php4-imap_4.3.10-20_arm.deb oldstable/main/binary-arm/php4-ldap_4.3.10-20_arm.deb oldstable/main/binary-arm/php4-mcal_4.3.10-20_arm.deb oldstable/main/binary-arm/php4-mhash_4.3.10-20_arm.deb oldstable/main/binary-arm/php4-mysql_4.3.10-20_arm.deb oldstable/main/binary-arm/php4-odbc_4.3.10-20_arm.deb oldstable/main/binary-arm/php4-recode_4.3.10-20_arm.deb oldstable/main/binary-arm/php4-xslt_4.3.10-20_arm.deb oldstable/main/binary-arm/php4-snmp_4.3.10-20_arm.deb oldstable/main/binary-arm/php4-sybase_4.3.10-20_arm.deb oldstable/main/binary-arm/php4-cgi_4.3.10-20_arm.deb oldstable/main/binary-arm/php4-cli_4.3.10-20_arm.deb oldstable/main/binary-arm/php4-dev_4.3.10-20_arm.deb oldstable/main/binary-arm/libapache2-mod-php4_4.3.10-20_arm.deb php4 (4:4.3.10-20) oldstable-security; urgency=high * NMU prepared for the security team by the package maintainer. * The following security issues are addressed with this update: - CVE-2007-0910/MOPB-32 session_decode() Double Free Vulnerability * note that this is an update to the previous version of the upstream fix for CVE-2007-0910, which introduced a seperate exploit path. - CVE-2007-1286/MOPB-04 unserialize() ZVAL Reference Counter Overflow - CVE-2007-1380/MOPB-10 php_binary Session Deserialization Information Leak - CVE-2007-1521/MOPB-22 session_regenerate_id() Double Free Vulnerability - CVE-2007-1583/MOPB-26 mb_parse_str() register_globals Activation Vuln. - CVE-2007-1777/MOPB-35 zip_entry_read() Integer Overflow Vulnerability * The other security issues resulting from the "Month of PHP bugs" either did not affect the version of php4 shipped in sarge, or did not merit a security update according to the established security policy for php in debian. You are encouraged to verify that your configuration is not affected by any of the other vulnerabilities by visiting: http://www.php-security.org/ oldstable/main/binary-hppa/php4-common_4.3.10-20_hppa.deb oldstable/main/binary-hppa/libapache-mod-php4_4.3.10-20_hppa.deb oldstable/main/binary-hppa/php4-curl_4.3.10-20_hppa.deb oldstable/main/binary-hppa/php4-domxml_4.3.10-20_hppa.deb oldstable/main/binary-hppa/php4-gd_4.3.10-20_hppa.deb oldstable/main/binary-hppa/php4-imap_4.3.10-20_hppa.deb oldstable/main/binary-hppa/php4-ldap_4.3.10-20_hppa.deb oldstable/main/binary-hppa/php4-mcal_4.3.10-20_hppa.deb oldstable/main/binary-hppa/php4-mhash_4.3.10-20_hppa.deb oldstable/main/binary-hppa/php4-mysql_4.3.10-20_hppa.deb oldstable/main/binary-hppa/php4-odbc_4.3.10-20_hppa.deb oldstable/main/binary-hppa/php4-recode_4.3.10-20_hppa.deb oldstable/main/binary-hppa/php4-xslt_4.3.10-20_hppa.deb oldstable/main/binary-hppa/php4-snmp_4.3.10-20_hppa.deb oldstable/main/binary-hppa/php4-sybase_4.3.10-20_hppa.deb oldstable/main/binary-hppa/php4-cgi_4.3.10-20_hppa.deb oldstable/main/binary-hppa/php4-cli_4.3.10-20_hppa.deb oldstable/main/binary-hppa/php4-dev_4.3.10-20_hppa.deb oldstable/main/binary-hppa/libapache2-mod-php4_4.3.10-20_hppa.deb php4 (4:4.3.10-20) oldstable-security; urgency=high * NMU prepared for the security team by the package maintainer. * The following security issues are addressed with this update: - CVE-2007-0910/MOPB-32 session_decode() Double Free Vulnerability * note that this is an update to the previous version of the upstream fix for CVE-2007-0910, which introduced a seperate exploit path. - CVE-2007-1286/MOPB-04 unserialize() ZVAL Reference Counter Overflow - CVE-2007-1380/MOPB-10 php_binary Session Deserialization Information Leak - CVE-2007-1521/MOPB-22 session_regenerate_id() Double Free Vulnerability - CVE-2007-1583/MOPB-26 mb_parse_str() register_globals Activation Vuln. - CVE-2007-1777/MOPB-35 zip_entry_read() Integer Overflow Vulnerability * The other security issues resulting from the "Month of PHP bugs" either did not affect the version of php4 shipped in sarge, or did not merit a security update according to the established security policy for php in debian. You are encouraged to verify that your configuration is not affected by any of the other vulnerabilities by visiting: http://www.php-security.org/ oldstable/main/source/php4_4.3.10-20.dsc oldstable/main/source/php4_4.3.10.orig.tar.gz oldstable/main/source/php4_4.3.10-20.diff.gz oldstable/main/binary-i386/php4-common_4.3.10-20_i386.deb oldstable/main/binary-i386/libapache-mod-php4_4.3.10-20_i386.deb oldstable/main/binary-i386/php4-curl_4.3.10-20_i386.deb oldstable/main/binary-i386/php4-domxml_4.3.10-20_i386.deb oldstable/main/binary-i386/php4-gd_4.3.10-20_i386.deb oldstable/main/binary-i386/php4-imap_4.3.10-20_i386.deb oldstable/main/binary-i386/php4-ldap_4.3.10-20_i386.deb oldstable/main/binary-i386/php4-mcal_4.3.10-20_i386.deb oldstable/main/binary-i386/php4-mhash_4.3.10-20_i386.deb oldstable/main/binary-i386/php4-mysql_4.3.10-20_i386.deb oldstable/main/binary-i386/php4-odbc_4.3.10-20_i386.deb oldstable/main/binary-i386/php4-recode_4.3.10-20_i386.deb oldstable/main/binary-i386/php4-xslt_4.3.10-20_i386.deb oldstable/main/binary-i386/php4-snmp_4.3.10-20_i386.deb oldstable/main/binary-i386/php4-sybase_4.3.10-20_i386.deb oldstable/main/binary-i386/php4-cgi_4.3.10-20_i386.deb oldstable/main/binary-i386/php4-cli_4.3.10-20_i386.deb oldstable/main/binary-i386/php4-dev_4.3.10-20_i386.deb oldstable/main/binary-i386/libapache2-mod-php4_4.3.10-20_i386.deb oldstable/main/binary-all/php4_4.3.10-20_all.deb oldstable/main/binary-all/php4-pear_4.3.10-20_all.deb php4 (4:4.3.10-20) oldstable-security; urgency=high * NMU prepared for the security team by the package maintainer. * The following security issues are addressed with this update: - CVE-2007-0910/MOPB-32 session_decode() Double Free Vulnerability * note that this is an update to the previous version of the upstream fix for CVE-2007-0910, which introduced a seperate exploit path. - CVE-2007-1286/MOPB-04 unserialize() ZVAL Reference Counter Overflow - CVE-2007-1380/MOPB-10 php_binary Session Deserialization Information Leak - CVE-2007-1521/MOPB-22 session_regenerate_id() Double Free Vulnerability - CVE-2007-1583/MOPB-26 mb_parse_str() register_globals Activation Vuln. - CVE-2007-1777/MOPB-35 zip_entry_read() Integer Overflow Vulnerability * The other security issues resulting from the "Month of PHP bugs" either did not affect the version of php4 shipped in sarge, or did not merit a security update according to the established security policy for php in debian. You are encouraged to verify that your configuration is not affected by any of the other vulnerabilities by visiting: http://www.php-security.org/ oldstable/main/binary-ia64/php4-common_4.3.10-20_ia64.deb oldstable/main/binary-ia64/libapache-mod-php4_4.3.10-20_ia64.deb oldstable/main/binary-ia64/php4-curl_4.3.10-20_ia64.deb oldstable/main/binary-ia64/php4-domxml_4.3.10-20_ia64.deb oldstable/main/binary-ia64/php4-gd_4.3.10-20_ia64.deb oldstable/main/binary-ia64/php4-imap_4.3.10-20_ia64.deb oldstable/main/binary-ia64/php4-ldap_4.3.10-20_ia64.deb oldstable/main/binary-ia64/php4-mcal_4.3.10-20_ia64.deb oldstable/main/binary-ia64/php4-mhash_4.3.10-20_ia64.deb oldstable/main/binary-ia64/php4-mysql_4.3.10-20_ia64.deb oldstable/main/binary-ia64/php4-odbc_4.3.10-20_ia64.deb oldstable/main/binary-ia64/php4-recode_4.3.10-20_ia64.deb oldstable/main/binary-ia64/php4-xslt_4.3.10-20_ia64.deb oldstable/main/binary-ia64/php4-snmp_4.3.10-20_ia64.deb oldstable/main/binary-ia64/php4-sybase_4.3.10-20_ia64.deb oldstable/main/binary-ia64/php4-cgi_4.3.10-20_ia64.deb oldstable/main/binary-ia64/php4-cli_4.3.10-20_ia64.deb oldstable/main/binary-ia64/php4-dev_4.3.10-20_ia64.deb oldstable/main/binary-ia64/libapache2-mod-php4_4.3.10-20_ia64.deb php4 (4:4.3.10-20) oldstable-security; urgency=high * NMU prepared for the security team by the package maintainer. * The following security issues are addressed with this update: - CVE-2007-0910/MOPB-32 session_decode() Double Free Vulnerability * note that this is an update to the previous version of the upstream fix for CVE-2007-0910, which introduced a seperate exploit path. - CVE-2007-1286/MOPB-04 unserialize() ZVAL Reference Counter Overflow - CVE-2007-1380/MOPB-10 php_binary Session Deserialization Information Leak - CVE-2007-1521/MOPB-22 session_regenerate_id() Double Free Vulnerability - CVE-2007-1583/MOPB-26 mb_parse_str() register_globals Activation Vuln. - CVE-2007-1777/MOPB-35 zip_entry_read() Integer Overflow Vulnerability * The other security issues resulting from the "Month of PHP bugs" either did not affect the version of php4 shipped in sarge, or did not merit a security update according to the established security policy for php in debian. You are encouraged to verify that your configuration is not affected by any of the other vulnerabilities by visiting: http://www.php-security.org/ oldstable/main/binary-mips/php4-common_4.3.10-20_mips.deb oldstable/main/binary-mips/libapache-mod-php4_4.3.10-20_mips.deb oldstable/main/binary-mips/php4-curl_4.3.10-20_mips.deb oldstable/main/binary-mips/php4-domxml_4.3.10-20_mips.deb oldstable/main/binary-mips/php4-gd_4.3.10-20_mips.deb oldstable/main/binary-mips/php4-imap_4.3.10-20_mips.deb oldstable/main/binary-mips/php4-ldap_4.3.10-20_mips.deb oldstable/main/binary-mips/php4-mcal_4.3.10-20_mips.deb oldstable/main/binary-mips/php4-mhash_4.3.10-20_mips.deb oldstable/main/binary-mips/php4-mysql_4.3.10-20_mips.deb oldstable/main/binary-mips/php4-odbc_4.3.10-20_mips.deb oldstable/main/binary-mips/php4-recode_4.3.10-20_mips.deb oldstable/main/binary-mips/php4-xslt_4.3.10-20_mips.deb oldstable/main/binary-mips/php4-snmp_4.3.10-20_mips.deb oldstable/main/binary-mips/php4-sybase_4.3.10-20_mips.deb oldstable/main/binary-mips/php4-cgi_4.3.10-20_mips.deb oldstable/main/binary-mips/php4-cli_4.3.10-20_mips.deb oldstable/main/binary-mips/php4-dev_4.3.10-20_mips.deb oldstable/main/binary-mips/libapache2-mod-php4_4.3.10-20_mips.deb php4 (4:4.3.10-20) oldstable-security; urgency=high * NMU prepared for the security team by the package maintainer. * The following security issues are addressed with this update: - CVE-2007-0910/MOPB-32 session_decode() Double Free Vulnerability * note that this is an update to the previous version of the upstream fix for CVE-2007-0910, which introduced a seperate exploit path. - CVE-2007-1286/MOPB-04 unserialize() ZVAL Reference Counter Overflow - CVE-2007-1380/MOPB-10 php_binary Session Deserialization Information Leak - CVE-2007-1521/MOPB-22 session_regenerate_id() Double Free Vulnerability - CVE-2007-1583/MOPB-26 mb_parse_str() register_globals Activation Vuln. - CVE-2007-1777/MOPB-35 zip_entry_read() Integer Overflow Vulnerability * The other security issues resulting from the "Month of PHP bugs" either did not affect the version of php4 shipped in sarge, or did not merit a security update according to the established security policy for php in debian. You are encouraged to verify that your configuration is not affected by any of the other vulnerabilities by visiting: http://www.php-security.org/ oldstable/main/binary-mipsel/php4-common_4.3.10-20_mipsel.deb oldstable/main/binary-mipsel/libapache-mod-php4_4.3.10-20_mipsel.deb oldstable/main/binary-mipsel/php4-curl_4.3.10-20_mipsel.deb oldstable/main/binary-mipsel/php4-domxml_4.3.10-20_mipsel.deb oldstable/main/binary-mipsel/php4-gd_4.3.10-20_mipsel.deb oldstable/main/binary-mipsel/php4-imap_4.3.10-20_mipsel.deb oldstable/main/binary-mipsel/php4-ldap_4.3.10-20_mipsel.deb oldstable/main/binary-mipsel/php4-mcal_4.3.10-20_mipsel.deb oldstable/main/binary-mipsel/php4-mhash_4.3.10-20_mipsel.deb oldstable/main/binary-mipsel/php4-mysql_4.3.10-20_mipsel.deb oldstable/main/binary-mipsel/php4-odbc_4.3.10-20_mipsel.deb oldstable/main/binary-mipsel/php4-recode_4.3.10-20_mipsel.deb oldstable/main/binary-mipsel/php4-xslt_4.3.10-20_mipsel.deb oldstable/main/binary-mipsel/php4-snmp_4.3.10-20_mipsel.deb oldstable/main/binary-mipsel/php4-sybase_4.3.10-20_mipsel.deb oldstable/main/binary-mipsel/php4-cgi_4.3.10-20_mipsel.deb oldstable/main/binary-mipsel/php4-cli_4.3.10-20_mipsel.deb oldstable/main/binary-mipsel/php4-dev_4.3.10-20_mipsel.deb oldstable/main/binary-mipsel/libapache2-mod-php4_4.3.10-20_mipsel.deb php4 (4:4.3.10-20) oldstable-security; urgency=high * NMU prepared for the security team by the package maintainer. * The following security issues are addressed with this update: - CVE-2007-0910/MOPB-32 session_decode() Double Free Vulnerability * note that this is an update to the previous version of the upstream fix for CVE-2007-0910, which introduced a seperate exploit path. - CVE-2007-1286/MOPB-04 unserialize() ZVAL Reference Counter Overflow - CVE-2007-1380/MOPB-10 php_binary Session Deserialization Information Leak - CVE-2007-1521/MOPB-22 session_regenerate_id() Double Free Vulnerability - CVE-2007-1583/MOPB-26 mb_parse_str() register_globals Activation Vuln. - CVE-2007-1777/MOPB-35 zip_entry_read() Integer Overflow Vulnerability * The other security issues resulting from the "Month of PHP bugs" either did not affect the version of php4 shipped in sarge, or did not merit a security update according to the established security policy for php in debian. You are encouraged to verify that your configuration is not affected by any of the other vulnerabilities by visiting: http://www.php-security.org/ oldstable/main/binary-powerpc/php4-common_4.3.10-20_powerpc.deb oldstable/main/binary-powerpc/libapache-mod-php4_4.3.10-20_powerpc.deb oldstable/main/binary-powerpc/php4-curl_4.3.10-20_powerpc.deb oldstable/main/binary-powerpc/php4-domxml_4.3.10-20_powerpc.deb oldstable/main/binary-powerpc/php4-gd_4.3.10-20_powerpc.deb oldstable/main/binary-powerpc/php4-imap_4.3.10-20_powerpc.deb oldstable/main/binary-powerpc/php4-ldap_4.3.10-20_powerpc.deb oldstable/main/binary-powerpc/php4-mcal_4.3.10-20_powerpc.deb oldstable/main/binary-powerpc/php4-mhash_4.3.10-20_powerpc.deb oldstable/main/binary-powerpc/php4-mysql_4.3.10-20_powerpc.deb oldstable/main/binary-powerpc/php4-odbc_4.3.10-20_powerpc.deb oldstable/main/binary-powerpc/php4-recode_4.3.10-20_powerpc.deb oldstable/main/binary-powerpc/php4-xslt_4.3.10-20_powerpc.deb oldstable/main/binary-powerpc/php4-snmp_4.3.10-20_powerpc.deb oldstable/main/binary-powerpc/php4-sybase_4.3.10-20_powerpc.deb oldstable/main/binary-powerpc/php4-cgi_4.3.10-20_powerpc.deb oldstable/main/binary-powerpc/php4-cli_4.3.10-20_powerpc.deb oldstable/main/binary-powerpc/php4-dev_4.3.10-20_powerpc.deb oldstable/main/binary-powerpc/libapache2-mod-php4_4.3.10-20_powerpc.deb php4 (4:4.3.10-20) oldstable-security; urgency=high * NMU prepared for the security team by the package maintainer. * The following security issues are addressed with this update: - CVE-2007-0910/MOPB-32 session_decode() Double Free Vulnerability * note that this is an update to the previous version of the upstream fix for CVE-2007-0910, which introduced a seperate exploit path. - CVE-2007-1286/MOPB-04 unserialize() ZVAL Reference Counter Overflow - CVE-2007-1380/MOPB-10 php_binary Session Deserialization Information Leak - CVE-2007-1521/MOPB-22 session_regenerate_id() Double Free Vulnerability - CVE-2007-1583/MOPB-26 mb_parse_str() register_globals Activation Vuln. - CVE-2007-1777/MOPB-35 zip_entry_read() Integer Overflow Vulnerability * The other security issues resulting from the "Month of PHP bugs" either did not affect the version of php4 shipped in sarge, or did not merit a security update according to the established security policy for php in debian. You are encouraged to verify that your configuration is not affected by any of the other vulnerabilities by visiting: http://www.php-security.org/ oldstable/main/binary-s390/php4-common_4.3.10-20_s390.deb oldstable/main/binary-s390/libapache-mod-php4_4.3.10-20_s390.deb oldstable/main/binary-s390/php4-curl_4.3.10-20_s390.deb oldstable/main/binary-s390/php4-domxml_4.3.10-20_s390.deb oldstable/main/binary-s390/php4-gd_4.3.10-20_s390.deb oldstable/main/binary-s390/php4-imap_4.3.10-20_s390.deb oldstable/main/binary-s390/php4-ldap_4.3.10-20_s390.deb oldstable/main/binary-s390/php4-mcal_4.3.10-20_s390.deb oldstable/main/binary-s390/php4-mhash_4.3.10-20_s390.deb oldstable/main/binary-s390/php4-mysql_4.3.10-20_s390.deb oldstable/main/binary-s390/php4-odbc_4.3.10-20_s390.deb oldstable/main/binary-s390/php4-recode_4.3.10-20_s390.deb oldstable/main/binary-s390/php4-xslt_4.3.10-20_s390.deb oldstable/main/binary-s390/php4-snmp_4.3.10-20_s390.deb oldstable/main/binary-s390/php4-sybase_4.3.10-20_s390.deb oldstable/main/binary-s390/php4-cgi_4.3.10-20_s390.deb oldstable/main/binary-s390/php4-cli_4.3.10-20_s390.deb oldstable/main/binary-s390/php4-dev_4.3.10-20_s390.deb oldstable/main/binary-s390/libapache2-mod-php4_4.3.10-20_s390.deb php4 (4:4.3.10-20) oldstable-security; urgency=high * NMU prepared for the security team by the package maintainer. * The following security issues are addressed with this update: - CVE-2007-0910/MOPB-32 session_decode() Double Free Vulnerability * note that this is an update to the previous version of the upstream fix for CVE-2007-0910, which introduced a seperate exploit path. - CVE-2007-1286/MOPB-04 unserialize() ZVAL Reference Counter Overflow - CVE-2007-1380/MOPB-10 php_binary Session Deserialization Information Leak - CVE-2007-1521/MOPB-22 session_regenerate_id() Double Free Vulnerability - CVE-2007-1583/MOPB-26 mb_parse_str() register_globals Activation Vuln. - CVE-2007-1777/MOPB-35 zip_entry_read() Integer Overflow Vulnerability * The other security issues resulting from the "Month of PHP bugs" either did not affect the version of php4 shipped in sarge, or did not merit a security update according to the established security policy for php in debian. You are encouraged to verify that your configuration is not affected by any of the other vulnerabilities by visiting: http://www.php-security.org/ oldstable/main/binary-sparc/php4-common_4.3.10-20_sparc.deb oldstable/main/binary-sparc/libapache-mod-php4_4.3.10-20_sparc.deb oldstable/main/binary-sparc/php4-curl_4.3.10-20_sparc.deb oldstable/main/binary-sparc/php4-domxml_4.3.10-20_sparc.deb oldstable/main/binary-sparc/php4-gd_4.3.10-20_sparc.deb oldstable/main/binary-sparc/php4-imap_4.3.10-20_sparc.deb oldstable/main/binary-sparc/php4-ldap_4.3.10-20_sparc.deb oldstable/main/binary-sparc/php4-mcal_4.3.10-20_sparc.deb oldstable/main/binary-sparc/php4-mhash_4.3.10-20_sparc.deb oldstable/main/binary-sparc/php4-mysql_4.3.10-20_sparc.deb oldstable/main/binary-sparc/php4-odbc_4.3.10-20_sparc.deb oldstable/main/binary-sparc/php4-recode_4.3.10-20_sparc.deb oldstable/main/binary-sparc/php4-xslt_4.3.10-20_sparc.deb oldstable/main/binary-sparc/php4-snmp_4.3.10-20_sparc.deb oldstable/main/binary-sparc/php4-sybase_4.3.10-20_sparc.deb oldstable/main/binary-sparc/php4-cgi_4.3.10-20_sparc.deb oldstable/main/binary-sparc/php4-cli_4.3.10-20_sparc.deb oldstable/main/binary-sparc/php4-dev_4.3.10-20_sparc.deb oldstable/main/binary-sparc/libapache2-mod-php4_4.3.10-20_sparc.deb php4 (4:4.3.10-20) oldstable-security; urgency=high * NMU prepared for the security team by the package maintainer. * The following security issues are addressed with this update: - CVE-2007-0910/MOPB-32 session_decode() Double Free Vulnerability * note that this is an update to the previous version of the upstream fix for CVE-2007-0910, which introduced a seperate exploit path. - CVE-2007-1286/MOPB-04 unserialize() ZVAL Reference Counter Overflow - CVE-2007-1380/MOPB-10 php_binary Session Deserialization Information Leak - CVE-2007-1521/MOPB-22 session_regenerate_id() Double Free Vulnerability - CVE-2007-1583/MOPB-26 mb_parse_str() register_globals Activation Vuln. - CVE-2007-1777/MOPB-35 zip_entry_read() Integer Overflow Vulnerability * The other security issues resulting from the "Month of PHP bugs" either did not affect the version of php4 shipped in sarge, or did not merit a security update according to the established security policy for php in debian. You are encouraged to verify that your configuration is not affected by any of the other vulnerabilities by visiting: http://www.php-security.org/ oldstable/main/binary-alpha/php4-common_4.3.10-22_alpha.deb oldstable/main/binary-alpha/libapache-mod-php4_4.3.10-22_alpha.deb oldstable/main/binary-alpha/php4-curl_4.3.10-22_alpha.deb oldstable/main/binary-alpha/php4-domxml_4.3.10-22_alpha.deb oldstable/main/binary-alpha/php4-gd_4.3.10-22_alpha.deb oldstable/main/binary-alpha/php4-imap_4.3.10-22_alpha.deb oldstable/main/binary-alpha/php4-ldap_4.3.10-22_alpha.deb oldstable/main/binary-alpha/php4-mcal_4.3.10-22_alpha.deb oldstable/main/binary-alpha/php4-mhash_4.3.10-22_alpha.deb oldstable/main/binary-alpha/php4-mysql_4.3.10-22_alpha.deb oldstable/main/binary-alpha/php4-odbc_4.3.10-22_alpha.deb oldstable/main/binary-alpha/php4-recode_4.3.10-22_alpha.deb oldstable/main/binary-alpha/php4-xslt_4.3.10-22_alpha.deb oldstable/main/binary-alpha/php4-snmp_4.3.10-22_alpha.deb oldstable/main/binary-alpha/php4-sybase_4.3.10-22_alpha.deb oldstable/main/binary-alpha/php4-cgi_4.3.10-22_alpha.deb oldstable/main/binary-alpha/php4-cli_4.3.10-22_alpha.deb oldstable/main/binary-alpha/php4-dev_4.3.10-22_alpha.deb oldstable/main/binary-alpha/libapache2-mod-php4_4.3.10-22_alpha.deb php4 (4:4.3.10-22) oldstable-security; urgency=low * NMU prepared for the security team by the package maintainer. * The following security issue is addressed with this update: - CVE-2007-1864: Buffer overflow in the bundled libxmlrpc library. (Thanks to Joe Orton from redhat for sharing the patch.) - CVE-2006-0207: HTTP response splitting vulnerabilities. This was reported to not affect this version of PHP, but it has been independantly verified that it does (closes: #354683). - CVE-2006-4486: Int. overflows in memory mgmt code for 64bit architectures. oldstable/main/binary-arm/php4-common_4.3.10-22_arm.deb oldstable/main/binary-arm/libapache-mod-php4_4.3.10-22_arm.deb oldstable/main/binary-arm/php4-curl_4.3.10-22_arm.deb oldstable/main/binary-arm/php4-domxml_4.3.10-22_arm.deb oldstable/main/binary-arm/php4-gd_4.3.10-22_arm.deb oldstable/main/binary-arm/php4-imap_4.3.10-22_arm.deb oldstable/main/binary-arm/php4-ldap_4.3.10-22_arm.deb oldstable/main/binary-arm/php4-mcal_4.3.10-22_arm.deb oldstable/main/binary-arm/php4-mhash_4.3.10-22_arm.deb oldstable/main/binary-arm/php4-mysql_4.3.10-22_arm.deb oldstable/main/binary-arm/php4-odbc_4.3.10-22_arm.deb oldstable/main/binary-arm/php4-recode_4.3.10-22_arm.deb oldstable/main/binary-arm/php4-xslt_4.3.10-22_arm.deb oldstable/main/binary-arm/php4-snmp_4.3.10-22_arm.deb oldstable/main/binary-arm/php4-sybase_4.3.10-22_arm.deb oldstable/main/binary-arm/php4-cgi_4.3.10-22_arm.deb oldstable/main/binary-arm/php4-cli_4.3.10-22_arm.deb oldstable/main/binary-arm/php4-dev_4.3.10-22_arm.deb oldstable/main/binary-arm/libapache2-mod-php4_4.3.10-22_arm.deb php4 (4:4.3.10-22) oldstable-security; urgency=low * NMU prepared for the security team by the package maintainer. * The following security issue is addressed with this update: - CVE-2007-1864: Buffer overflow in the bundled libxmlrpc library. (Thanks to Joe Orton from redhat for sharing the patch.) - CVE-2006-0207: HTTP response splitting vulnerabilities. This was reported to not affect this version of PHP, but it has been independantly verified that it does (closes: #354683). - CVE-2006-4486: Int. overflows in memory mgmt code for 64bit architectures. oldstable/main/binary-hppa/php4-common_4.3.10-22_hppa.deb oldstable/main/binary-hppa/libapache-mod-php4_4.3.10-22_hppa.deb oldstable/main/binary-hppa/php4-curl_4.3.10-22_hppa.deb oldstable/main/binary-hppa/php4-domxml_4.3.10-22_hppa.deb oldstable/main/binary-hppa/php4-gd_4.3.10-22_hppa.deb oldstable/main/binary-hppa/php4-imap_4.3.10-22_hppa.deb oldstable/main/binary-hppa/php4-ldap_4.3.10-22_hppa.deb oldstable/main/binary-hppa/php4-mcal_4.3.10-22_hppa.deb oldstable/main/binary-hppa/php4-mhash_4.3.10-22_hppa.deb oldstable/main/binary-hppa/php4-mysql_4.3.10-22_hppa.deb oldstable/main/binary-hppa/php4-odbc_4.3.10-22_hppa.deb oldstable/main/binary-hppa/php4-recode_4.3.10-22_hppa.deb oldstable/main/binary-hppa/php4-xslt_4.3.10-22_hppa.deb oldstable/main/binary-hppa/php4-snmp_4.3.10-22_hppa.deb oldstable/main/binary-hppa/php4-sybase_4.3.10-22_hppa.deb oldstable/main/binary-hppa/php4-cgi_4.3.10-22_hppa.deb oldstable/main/binary-hppa/php4-cli_4.3.10-22_hppa.deb oldstable/main/binary-hppa/php4-dev_4.3.10-22_hppa.deb oldstable/main/binary-hppa/libapache2-mod-php4_4.3.10-22_hppa.deb php4 (4:4.3.10-22) oldstable-security; urgency=low * NMU prepared for the security team by the package maintainer. * The following security issue is addressed with this update: - CVE-2007-1864: Buffer overflow in the bundled libxmlrpc library. (Thanks to Joe Orton from redhat for sharing the patch.) - CVE-2006-0207: HTTP response splitting vulnerabilities. This was reported to not affect this version of PHP, but it has been independantly verified that it does (closes: #354683). - CVE-2006-4486: Int. overflows in memory mgmt code for 64bit architectures. oldstable/main/source/php4_4.3.10-22.dsc oldstable/main/source/php4_4.3.10-22.diff.gz oldstable/main/binary-i386/php4-common_4.3.10-22_i386.deb oldstable/main/binary-i386/libapache-mod-php4_4.3.10-22_i386.deb oldstable/main/binary-i386/php4-curl_4.3.10-22_i386.deb oldstable/main/binary-i386/php4-domxml_4.3.10-22_i386.deb oldstable/main/binary-i386/php4-gd_4.3.10-22_i386.deb oldstable/main/binary-i386/php4-imap_4.3.10-22_i386.deb oldstable/main/binary-i386/php4-ldap_4.3.10-22_i386.deb oldstable/main/binary-i386/php4-mcal_4.3.10-22_i386.deb oldstable/main/binary-i386/php4-mhash_4.3.10-22_i386.deb oldstable/main/binary-i386/php4-mysql_4.3.10-22_i386.deb oldstable/main/binary-i386/php4-odbc_4.3.10-22_i386.deb oldstable/main/binary-i386/php4-recode_4.3.10-22_i386.deb oldstable/main/binary-i386/php4-xslt_4.3.10-22_i386.deb oldstable/main/binary-i386/php4-snmp_4.3.10-22_i386.deb oldstable/main/binary-i386/php4-sybase_4.3.10-22_i386.deb oldstable/main/binary-i386/php4-cgi_4.3.10-22_i386.deb oldstable/main/binary-i386/php4-cli_4.3.10-22_i386.deb oldstable/main/binary-i386/php4-dev_4.3.10-22_i386.deb oldstable/main/binary-i386/libapache2-mod-php4_4.3.10-22_i386.deb oldstable/main/binary-all/php4_4.3.10-22_all.deb oldstable/main/binary-all/php4-pear_4.3.10-22_all.deb php4 (4:4.3.10-22) oldstable-security; urgency=low * NMU prepared for the security team by the package maintainer. * The following security issue is addressed with this update: - CVE-2007-1864: Buffer overflow in the bundled libxmlrpc library. (Thanks to Joe Orton from redhat for sharing the patch.) - CVE-2006-0207: HTTP response splitting vulnerabilities. This was reported to not affect this version of PHP, but it has been independantly verified that it does (closes: #354683). - CVE-2006-4486: Int. overflows in memory mgmt code for 64bit architectures. oldstable/main/binary-ia64/php4-common_4.3.10-22_ia64.deb oldstable/main/binary-ia64/libapache-mod-php4_4.3.10-22_ia64.deb oldstable/main/binary-ia64/php4-curl_4.3.10-22_ia64.deb oldstable/main/binary-ia64/php4-domxml_4.3.10-22_ia64.deb oldstable/main/binary-ia64/php4-gd_4.3.10-22_ia64.deb oldstable/main/binary-ia64/php4-imap_4.3.10-22_ia64.deb oldstable/main/binary-ia64/php4-ldap_4.3.10-22_ia64.deb oldstable/main/binary-ia64/php4-mcal_4.3.10-22_ia64.deb oldstable/main/binary-ia64/php4-mhash_4.3.10-22_ia64.deb oldstable/main/binary-ia64/php4-mysql_4.3.10-22_ia64.deb oldstable/main/binary-ia64/php4-odbc_4.3.10-22_ia64.deb oldstable/main/binary-ia64/php4-recode_4.3.10-22_ia64.deb oldstable/main/binary-ia64/php4-xslt_4.3.10-22_ia64.deb oldstable/main/binary-ia64/php4-snmp_4.3.10-22_ia64.deb oldstable/main/binary-ia64/php4-sybase_4.3.10-22_ia64.deb oldstable/main/binary-ia64/php4-cgi_4.3.10-22_ia64.deb oldstable/main/binary-ia64/php4-cli_4.3.10-22_ia64.deb oldstable/main/binary-ia64/php4-dev_4.3.10-22_ia64.deb oldstable/main/binary-ia64/libapache2-mod-php4_4.3.10-22_ia64.deb php4 (4:4.3.10-22) oldstable-security; urgency=low * NMU prepared for the security team by the package maintainer. * The following security issue is addressed with this update: - CVE-2007-1864: Buffer overflow in the bundled libxmlrpc library. (Thanks to Joe Orton from redhat for sharing the patch.) - CVE-2006-0207: HTTP response splitting vulnerabilities. This was reported to not affect this version of PHP, but it has been independantly verified that it does (closes: #354683). - CVE-2006-4486: Int. overflows in memory mgmt code for 64bit architectures. oldstable/main/binary-m68k/php4-common_4.3.10-22_m68k.deb oldstable/main/binary-m68k/libapache-mod-php4_4.3.10-22_m68k.deb oldstable/main/binary-m68k/php4-curl_4.3.10-22_m68k.deb oldstable/main/binary-m68k/php4-domxml_4.3.10-22_m68k.deb oldstable/main/binary-m68k/php4-gd_4.3.10-22_m68k.deb oldstable/main/binary-m68k/php4-imap_4.3.10-22_m68k.deb oldstable/main/binary-m68k/php4-ldap_4.3.10-22_m68k.deb oldstable/main/binary-m68k/php4-mcal_4.3.10-22_m68k.deb oldstable/main/binary-m68k/php4-mhash_4.3.10-22_m68k.deb oldstable/main/binary-m68k/php4-mysql_4.3.10-22_m68k.deb oldstable/main/binary-m68k/php4-odbc_4.3.10-22_m68k.deb oldstable/main/binary-m68k/php4-recode_4.3.10-22_m68k.deb oldstable/main/binary-m68k/php4-xslt_4.3.10-22_m68k.deb oldstable/main/binary-m68k/php4-snmp_4.3.10-22_m68k.deb oldstable/main/binary-m68k/php4-sybase_4.3.10-22_m68k.deb oldstable/main/binary-m68k/php4-cgi_4.3.10-22_m68k.deb oldstable/main/binary-m68k/php4-cli_4.3.10-22_m68k.deb oldstable/main/binary-m68k/php4-dev_4.3.10-22_m68k.deb oldstable/main/binary-m68k/libapache2-mod-php4_4.3.10-22_m68k.deb php4 (4:4.3.10-22) oldstable-security; urgency=low * NMU prepared for the security team by the package maintainer. * The following security issue is addressed with this update: - CVE-2007-1864: Buffer overflow in the bundled libxmlrpc library. (Thanks to Joe Orton from redhat for sharing the patch.) - CVE-2006-0207: HTTP response splitting vulnerabilities. This was reported to not affect this version of PHP, but it has been independantly verified that it does (closes: #354683). - CVE-2006-4486: Int. overflows in memory mgmt code for 64bit architectures. oldstable/main/binary-mips/php4-common_4.3.10-22_mips.deb oldstable/main/binary-mips/libapache-mod-php4_4.3.10-22_mips.deb oldstable/main/binary-mips/php4-curl_4.3.10-22_mips.deb oldstable/main/binary-mips/php4-domxml_4.3.10-22_mips.deb oldstable/main/binary-mips/php4-gd_4.3.10-22_mips.deb oldstable/main/binary-mips/php4-imap_4.3.10-22_mips.deb oldstable/main/binary-mips/php4-ldap_4.3.10-22_mips.deb oldstable/main/binary-mips/php4-mcal_4.3.10-22_mips.deb oldstable/main/binary-mips/php4-mhash_4.3.10-22_mips.deb oldstable/main/binary-mips/php4-mysql_4.3.10-22_mips.deb oldstable/main/binary-mips/php4-odbc_4.3.10-22_mips.deb oldstable/main/binary-mips/php4-recode_4.3.10-22_mips.deb oldstable/main/binary-mips/php4-xslt_4.3.10-22_mips.deb oldstable/main/binary-mips/php4-snmp_4.3.10-22_mips.deb oldstable/main/binary-mips/php4-sybase_4.3.10-22_mips.deb oldstable/main/binary-mips/php4-cgi_4.3.10-22_mips.deb oldstable/main/binary-mips/php4-cli_4.3.10-22_mips.deb oldstable/main/binary-mips/php4-dev_4.3.10-22_mips.deb oldstable/main/binary-mips/libapache2-mod-php4_4.3.10-22_mips.deb php4 (4:4.3.10-22) oldstable-security; urgency=low * NMU prepared for the security team by the package maintainer. * The following security issue is addressed with this update: - CVE-2007-1864: Buffer overflow in the bundled libxmlrpc library. (Thanks to Joe Orton from redhat for sharing the patch.) - CVE-2006-0207: HTTP response splitting vulnerabilities. This was reported to not affect this version of PHP, but it has been independantly verified that it does (closes: #354683). - CVE-2006-4486: Int. overflows in memory mgmt code for 64bit architectures. oldstable/main/binary-mipsel/php4-common_4.3.10-22_mipsel.deb oldstable/main/binary-mipsel/libapache-mod-php4_4.3.10-22_mipsel.deb oldstable/main/binary-mipsel/php4-curl_4.3.10-22_mipsel.deb oldstable/main/binary-mipsel/php4-domxml_4.3.10-22_mipsel.deb oldstable/main/binary-mipsel/php4-gd_4.3.10-22_mipsel.deb oldstable/main/binary-mipsel/php4-imap_4.3.10-22_mipsel.deb oldstable/main/binary-mipsel/php4-ldap_4.3.10-22_mipsel.deb oldstable/main/binary-mipsel/php4-mcal_4.3.10-22_mipsel.deb oldstable/main/binary-mipsel/php4-mhash_4.3.10-22_mipsel.deb oldstable/main/binary-mipsel/php4-mysql_4.3.10-22_mipsel.deb oldstable/main/binary-mipsel/php4-odbc_4.3.10-22_mipsel.deb oldstable/main/binary-mipsel/php4-recode_4.3.10-22_mipsel.deb oldstable/main/binary-mipsel/php4-xslt_4.3.10-22_mipsel.deb oldstable/main/binary-mipsel/php4-snmp_4.3.10-22_mipsel.deb oldstable/main/binary-mipsel/php4-sybase_4.3.10-22_mipsel.deb oldstable/main/binary-mipsel/php4-cgi_4.3.10-22_mipsel.deb oldstable/main/binary-mipsel/php4-cli_4.3.10-22_mipsel.deb oldstable/main/binary-mipsel/php4-dev_4.3.10-22_mipsel.deb oldstable/main/binary-mipsel/libapache2-mod-php4_4.3.10-22_mipsel.deb php4 (4:4.3.10-22) oldstable-security; urgency=low * NMU prepared for the security team by the package maintainer. * The following security issue is addressed with this update: - CVE-2007-1864: Buffer overflow in the bundled libxmlrpc library. (Thanks to Joe Orton from redhat for sharing the patch.) - CVE-2006-0207: HTTP response splitting vulnerabilities. This was reported to not affect this version of PHP, but it has been independantly verified that it does (closes: #354683). - CVE-2006-4486: Int. overflows in memory mgmt code for 64bit architectures. oldstable/main/binary-powerpc/php4-common_4.3.10-22_powerpc.deb oldstable/main/binary-powerpc/libapache-mod-php4_4.3.10-22_powerpc.deb oldstable/main/binary-powerpc/php4-curl_4.3.10-22_powerpc.deb oldstable/main/binary-powerpc/php4-domxml_4.3.10-22_powerpc.deb oldstable/main/binary-powerpc/php4-gd_4.3.10-22_powerpc.deb oldstable/main/binary-powerpc/php4-imap_4.3.10-22_powerpc.deb oldstable/main/binary-powerpc/php4-ldap_4.3.10-22_powerpc.deb oldstable/main/binary-powerpc/php4-mcal_4.3.10-22_powerpc.deb oldstable/main/binary-powerpc/php4-mhash_4.3.10-22_powerpc.deb oldstable/main/binary-powerpc/php4-mysql_4.3.10-22_powerpc.deb oldstable/main/binary-powerpc/php4-odbc_4.3.10-22_powerpc.deb oldstable/main/binary-powerpc/php4-recode_4.3.10-22_powerpc.deb oldstable/main/binary-powerpc/php4-xslt_4.3.10-22_powerpc.deb oldstable/main/binary-powerpc/php4-snmp_4.3.10-22_powerpc.deb oldstable/main/binary-powerpc/php4-sybase_4.3.10-22_powerpc.deb oldstable/main/binary-powerpc/php4-cgi_4.3.10-22_powerpc.deb oldstable/main/binary-powerpc/php4-cli_4.3.10-22_powerpc.deb oldstable/main/binary-powerpc/php4-dev_4.3.10-22_powerpc.deb oldstable/main/binary-powerpc/libapache2-mod-php4_4.3.10-22_powerpc.deb php4 (4:4.3.10-22) oldstable-security; urgency=low * NMU prepared for the security team by the package maintainer. * The following security issue is addressed with this update: - CVE-2007-1864: Buffer overflow in the bundled libxmlrpc library. (Thanks to Joe Orton from redhat for sharing the patch.) - CVE-2006-0207: HTTP response splitting vulnerabilities. This was reported to not affect this version of PHP, but it has been independantly verified that it does (closes: #354683). - CVE-2006-4486: Int. overflows in memory mgmt code for 64bit architectures. oldstable/main/binary-s390/php4-common_4.3.10-22_s390.deb oldstable/main/binary-s390/libapache-mod-php4_4.3.10-22_s390.deb oldstable/main/binary-s390/php4-curl_4.3.10-22_s390.deb oldstable/main/binary-s390/php4-domxml_4.3.10-22_s390.deb oldstable/main/binary-s390/php4-gd_4.3.10-22_s390.deb oldstable/main/binary-s390/php4-imap_4.3.10-22_s390.deb oldstable/main/binary-s390/php4-ldap_4.3.10-22_s390.deb oldstable/main/binary-s390/php4-mcal_4.3.10-22_s390.deb oldstable/main/binary-s390/php4-mhash_4.3.10-22_s390.deb oldstable/main/binary-s390/php4-mysql_4.3.10-22_s390.deb oldstable/main/binary-s390/php4-odbc_4.3.10-22_s390.deb oldstable/main/binary-s390/php4-recode_4.3.10-22_s390.deb oldstable/main/binary-s390/php4-xslt_4.3.10-22_s390.deb oldstable/main/binary-s390/php4-snmp_4.3.10-22_s390.deb oldstable/main/binary-s390/php4-sybase_4.3.10-22_s390.deb oldstable/main/binary-s390/php4-cgi_4.3.10-22_s390.deb oldstable/main/binary-s390/php4-cli_4.3.10-22_s390.deb oldstable/main/binary-s390/php4-dev_4.3.10-22_s390.deb oldstable/main/binary-s390/libapache2-mod-php4_4.3.10-22_s390.deb php4 (4:4.3.10-22) oldstable-security; urgency=low * NMU prepared for the security team by the package maintainer. * The following security issue is addressed with this update: - CVE-2007-1864: Buffer overflow in the bundled libxmlrpc library. (Thanks to Joe Orton from redhat for sharing the patch.) - CVE-2006-0207: HTTP response splitting vulnerabilities. This was reported to not affect this version of PHP, but it has been independantly verified that it does (closes: #354683). - CVE-2006-4486: Int. overflows in memory mgmt code for 64bit architectures. oldstable/main/binary-sparc/php4-common_4.3.10-22_sparc.deb oldstable/main/binary-sparc/libapache-mod-php4_4.3.10-22_sparc.deb oldstable/main/binary-sparc/php4-curl_4.3.10-22_sparc.deb oldstable/main/binary-sparc/php4-domxml_4.3.10-22_sparc.deb oldstable/main/binary-sparc/php4-gd_4.3.10-22_sparc.deb oldstable/main/binary-sparc/php4-imap_4.3.10-22_sparc.deb oldstable/main/binary-sparc/php4-ldap_4.3.10-22_sparc.deb oldstable/main/binary-sparc/php4-mcal_4.3.10-22_sparc.deb oldstable/main/binary-sparc/php4-mhash_4.3.10-22_sparc.deb oldstable/main/binary-sparc/php4-mysql_4.3.10-22_sparc.deb oldstable/main/binary-sparc/php4-odbc_4.3.10-22_sparc.deb oldstable/main/binary-sparc/php4-recode_4.3.10-22_sparc.deb oldstable/main/binary-sparc/php4-xslt_4.3.10-22_sparc.deb oldstable/main/binary-sparc/php4-snmp_4.3.10-22_sparc.deb oldstable/main/binary-sparc/php4-sybase_4.3.10-22_sparc.deb oldstable/main/binary-sparc/php4-cgi_4.3.10-22_sparc.deb oldstable/main/binary-sparc/php4-cli_4.3.10-22_sparc.deb oldstable/main/binary-sparc/php4-dev_4.3.10-22_sparc.deb oldstable/main/binary-sparc/libapache2-mod-php4_4.3.10-22_sparc.deb php4 (4:4.3.10-22) oldstable-security; urgency=low * NMU prepared for the security team by the package maintainer. * The following security issue is addressed with this update: - CVE-2007-1864: Buffer overflow in the bundled libxmlrpc library. (Thanks to Joe Orton from redhat for sharing the patch.) - CVE-2006-0207: HTTP response splitting vulnerabilities. This was reported to not affect this version of PHP, but it has been independantly verified that it does (closes: #354683). - CVE-2006-4486: Int. overflows in memory mgmt code for 64bit architectures. oldstable/main/source/phpmyadmin_2.6.2-3sarge5.dsc oldstable/main/source/phpmyadmin_2.6.2-3sarge5.diff.gz oldstable/main/binary-all/phpmyadmin_2.6.2-3sarge5_all.deb phpmyadmin (4:2.6.2-3sarge5) oldstable-security; urgency=low * Upload to oldstable-security. oldstable/main/source/phpmyadmin_2.6.2-3sarge6.dsc oldstable/main/source/phpmyadmin_2.6.2-3sarge6.diff.gz oldstable/main/binary-all/phpmyadmin_2.6.2-3sarge6_all.deb phpmyadmin (4:2.6.2-3sarge6) oldstable-security; urgency=high * Update for sarge to address a security issue. * Muliple cross-site scripting (XSS) vulnerabilities in phpMyAdmin before 2.11.1.2 allow remote attackers to inject arbitrary web script or HTML via certain input available in (1) PHP_SELF in (a) server_status.php, and (b) grab_globals.lib.php, (c) display_change_password.lib.php, and (d) common.lib.php in libraries/; and certain input available in PHP_SELF and (2) PATH_INFO in libraries/common.inc.php. (CVE-2007-5589, PMASA-2007-6) oldstable/main/binary-arm/plptools_0.12-5_arm.deb oldstable/main/binary-arm/plptools-dev_0.12-5_arm.deb plptools (0.12-5) unstable; urgency=low * Only build plptools and plptools-dev, remove the KDE dependent targets as a workaround to get plptools into testing (Closes: #246475) oldstable/main/source/po4a_0.20-2sarge1.dsc oldstable/main/source/po4a_0.20-2sarge1.diff.gz oldstable/main/binary-all/po4a_0.20-2sarge1_all.deb po4a (0.20-2sarge1) oldstable-proposed-updates; urgency=low * Fix possible arbitrary files overwriting via a symlink attack. (CVE-2007-4462). Closes: #439226 oldstable/main/binary-alpha/postgresql_7.4.7-6sarge5_alpha.deb oldstable/main/binary-alpha/postgresql-client_7.4.7-6sarge5_alpha.deb oldstable/main/binary-alpha/postgresql-dev_7.4.7-6sarge5_alpha.deb oldstable/main/binary-alpha/libpq3_7.4.7-6sarge5_alpha.deb oldstable/main/binary-alpha/libecpg4_7.4.7-6sarge5_alpha.deb oldstable/main/binary-alpha/libecpg-dev_7.4.7-6sarge5_alpha.deb oldstable/main/binary-alpha/libpgtcl_7.4.7-6sarge5_alpha.deb oldstable/main/binary-alpha/libpgtcl-dev_7.4.7-6sarge5_alpha.deb oldstable/main/binary-alpha/postgresql-contrib_7.4.7-6sarge5_alpha.deb postgresql (7.4.7-6sarge5) oldstable-security; urgency=high * SECURITY UPDATE: User privilege escalation. * Add debian/patches/62secure_search_path.path: - Support explicit placement of the temporary-table schema within search_path. This is needed to allow a security-definer function to set a truly secure value of search_path. Without it, a malicious user can use temporary objects to execute code with the privileges of the security-definer function. Even pushing the temp schema to the back of the search path is not quite good enough, because a function or operator at the back of the path might still capture control from one nearer the front due to having a more exact datatype match. Hence, disable searching the temp schema altogether for functions and operators. [CVE-2007-2138] - Patch backported from 7.4.17 CVS: http://developer.postgresql.org/cvsweb.cgi/pgsql/src/backend/catalog/namespace.c.diff?r1=1.58;r2=1.58.2.1 - Add test cases for the placement of the temp schema in the search path. Backported from 7.4.17 CVS: http://developer.postgresql.org/cvsweb.cgi/pgsql/src/test/regress/expected/temp.out.diff?r1=1.9;r2=1.9.2.1 http://developer.postgresql.org/cvsweb.cgi/pgsql/src/test/regress/sql/temp.sql.diff?r1=1.5;r2=1.5.4.1 * Add debian/docs.patch: manpage and HTML documentation patches which explain the changes above. Upstream keeps them in the SGML source, but since we do not build this and instead use the pre-built files which come in man.tar.gz and postgresql.tar.gz, we cannot use a regular debian/patches/ patch for this. * debian/rules: Apply debian/docs.patch in the install target to update the files in the binary install directories. oldstable/main/binary-arm/postgresql_7.4.7-6sarge5_arm.deb oldstable/main/binary-arm/postgresql-client_7.4.7-6sarge5_arm.deb oldstable/main/binary-arm/postgresql-dev_7.4.7-6sarge5_arm.deb oldstable/main/binary-arm/libpq3_7.4.7-6sarge5_arm.deb oldstable/main/binary-arm/libecpg4_7.4.7-6sarge5_arm.deb oldstable/main/binary-arm/libecpg-dev_7.4.7-6sarge5_arm.deb oldstable/main/binary-arm/libpgtcl_7.4.7-6sarge5_arm.deb oldstable/main/binary-arm/libpgtcl-dev_7.4.7-6sarge5_arm.deb oldstable/main/binary-arm/postgresql-contrib_7.4.7-6sarge5_arm.deb postgresql (7.4.7-6sarge5) oldstable-security; urgency=high * SECURITY UPDATE: User privilege escalation. * Add debian/patches/62secure_search_path.path: - Support explicit placement of the temporary-table schema within search_path. This is needed to allow a security-definer function to set a truly secure value of search_path. Without it, a malicious user can use temporary objects to execute code with the privileges of the security-definer function. Even pushing the temp schema to the back of the search path is not quite good enough, because a function or operator at the back of the path might still capture control from one nearer the front due to having a more exact datatype match. Hence, disable searching the temp schema altogether for functions and operators. [CVE-2007-2138] - Patch backported from 7.4.17 CVS: http://developer.postgresql.org/cvsweb.cgi/pgsql/src/backend/catalog/namespace.c.diff?r1=1.58;r2=1.58.2.1 - Add test cases for the placement of the temp schema in the search path. Backported from 7.4.17 CVS: http://developer.postgresql.org/cvsweb.cgi/pgsql/src/test/regress/expected/temp.out.diff?r1=1.9;r2=1.9.2.1 http://developer.postgresql.org/cvsweb.cgi/pgsql/src/test/regress/sql/temp.sql.diff?r1=1.5;r2=1.5.4.1 * Add debian/docs.patch: manpage and HTML documentation patches which explain the changes above. Upstream keeps them in the SGML source, but since we do not build this and instead use the pre-built files which come in man.tar.gz and postgresql.tar.gz, we cannot use a regular debian/patches/ patch for this. * debian/rules: Apply debian/docs.patch in the install target to update the files in the binary install directories. oldstable/main/binary-hppa/postgresql_7.4.7-6sarge5_hppa.deb oldstable/main/binary-hppa/postgresql-client_7.4.7-6sarge5_hppa.deb oldstable/main/binary-hppa/postgresql-dev_7.4.7-6sarge5_hppa.deb oldstable/main/binary-hppa/libpq3_7.4.7-6sarge5_hppa.deb oldstable/main/binary-hppa/libecpg4_7.4.7-6sarge5_hppa.deb oldstable/main/binary-hppa/libecpg-dev_7.4.7-6sarge5_hppa.deb oldstable/main/binary-hppa/libpgtcl_7.4.7-6sarge5_hppa.deb oldstable/main/binary-hppa/libpgtcl-dev_7.4.7-6sarge5_hppa.deb oldstable/main/binary-hppa/postgresql-contrib_7.4.7-6sarge5_hppa.deb postgresql (7.4.7-6sarge5) oldstable-security; urgency=high * SECURITY UPDATE: User privilege escalation. * Add debian/patches/62secure_search_path.path: - Support explicit placement of the temporary-table schema within search_path. This is needed to allow a security-definer function to set a truly secure value of search_path. Without it, a malicious user can use temporary objects to execute code with the privileges of the security-definer function. Even pushing the temp schema to the back of the search path is not quite good enough, because a function or operator at the back of the path might still capture control from one nearer the front due to having a more exact datatype match. Hence, disable searching the temp schema altogether for functions and operators. [CVE-2007-2138] - Patch backported from 7.4.17 CVS: http://developer.postgresql.org/cvsweb.cgi/pgsql/src/backend/catalog/namespace.c.diff?r1=1.58;r2=1.58.2.1 - Add test cases for the placement of the temp schema in the search path. Backported from 7.4.17 CVS: http://developer.postgresql.org/cvsweb.cgi/pgsql/src/test/regress/expected/temp.out.diff?r1=1.9;r2=1.9.2.1 http://developer.postgresql.org/cvsweb.cgi/pgsql/src/test/regress/sql/temp.sql.diff?r1=1.5;r2=1.5.4.1 * Add debian/docs.patch: manpage and HTML documentation patches which explain the changes above. Upstream keeps them in the SGML source, but since we do not build this and instead use the pre-built files which come in man.tar.gz and postgresql.tar.gz, we cannot use a regular debian/patches/ patch for this. * debian/rules: Apply debian/docs.patch in the install target to update the files in the binary install directories. oldstable/main/source/postgresql_7.4.7-6sarge5.dsc oldstable/main/source/postgresql_7.4.7-6sarge5.diff.gz oldstable/main/binary-all/postgresql-doc_7.4.7-6sarge5_all.deb oldstable/main/binary-i386/postgresql_7.4.7-6sarge5_i386.deb oldstable/main/binary-i386/postgresql-client_7.4.7-6sarge5_i386.deb oldstable/main/binary-i386/postgresql-dev_7.4.7-6sarge5_i386.deb oldstable/main/binary-i386/libpq3_7.4.7-6sarge5_i386.deb oldstable/main/binary-i386/libecpg4_7.4.7-6sarge5_i386.deb oldstable/main/binary-i386/libecpg-dev_7.4.7-6sarge5_i386.deb oldstable/main/binary-i386/libpgtcl_7.4.7-6sarge5_i386.deb oldstable/main/binary-i386/libpgtcl-dev_7.4.7-6sarge5_i386.deb oldstable/main/binary-i386/postgresql-contrib_7.4.7-6sarge5_i386.deb postgresql (7.4.7-6sarge5) oldstable-security; urgency=high * SECURITY UPDATE: User privilege escalation. * Add debian/patches/62secure_search_path.path: - Support explicit placement of the temporary-table schema within search_path. This is needed to allow a security-definer function to set a truly secure value of search_path. Without it, a malicious user can use temporary objects to execute code with the privileges of the security-definer function. Even pushing the temp schema to the back of the search path is not quite good enough, because a function or operator at the back of the path might still capture control from one nearer the front due to having a more exact datatype match. Hence, disable searching the temp schema altogether for functions and operators. [CVE-2007-2138] - Patch backported from 7.4.17 CVS: http://developer.postgresql.org/cvsweb.cgi/pgsql/src/backend/catalog/namespace.c.diff?r1=1.58;r2=1.58.2.1 - Add test cases for the placement of the temp schema in the search path. Backported from 7.4.17 CVS: http://developer.postgresql.org/cvsweb.cgi/pgsql/src/test/regress/expected/temp.out.diff?r1=1.9;r2=1.9.2.1 http://developer.postgresql.org/cvsweb.cgi/pgsql/src/test/regress/sql/temp.sql.diff?r1=1.5;r2=1.5.4.1 * Add debian/docs.patch: manpage and HTML documentation patches which explain the changes above. Upstream keeps them in the SGML source, but since we do not build this and instead use the pre-built files which come in man.tar.gz and postgresql.tar.gz, we cannot use a regular debian/patches/ patch for this. * debian/rules: Apply debian/docs.patch in the install target to update the files in the binary install directories. oldstable/main/binary-ia64/postgresql_7.4.7-6sarge5_ia64.deb oldstable/main/binary-ia64/postgresql-client_7.4.7-6sarge5_ia64.deb oldstable/main/binary-ia64/postgresql-dev_7.4.7-6sarge5_ia64.deb oldstable/main/binary-ia64/libpq3_7.4.7-6sarge5_ia64.deb oldstable/main/binary-ia64/libecpg4_7.4.7-6sarge5_ia64.deb oldstable/main/binary-ia64/libecpg-dev_7.4.7-6sarge5_ia64.deb oldstable/main/binary-ia64/libpgtcl_7.4.7-6sarge5_ia64.deb oldstable/main/binary-ia64/libpgtcl-dev_7.4.7-6sarge5_ia64.deb oldstable/main/binary-ia64/postgresql-contrib_7.4.7-6sarge5_ia64.deb postgresql (7.4.7-6sarge5) oldstable-security; urgency=high * SECURITY UPDATE: User privilege escalation. * Add debian/patches/62secure_search_path.path: - Support explicit placement of the temporary-table schema within search_path. This is needed to allow a security-definer function to set a truly secure value of search_path. Without it, a malicious user can use temporary objects to execute code with the privileges of the security-definer function. Even pushing the temp schema to the back of the search path is not quite good enough, because a function or operator at the back of the path might still capture control from one nearer the front due to having a more exact datatype match. Hence, disable searching the temp schema altogether for functions and operators. [CVE-2007-2138] - Patch backported from 7.4.17 CVS: http://developer.postgresql.org/cvsweb.cgi/pgsql/src/backend/catalog/namespace.c.diff?r1=1.58;r2=1.58.2.1 - Add test cases for the placement of the temp schema in the search path. Backported from 7.4.17 CVS: http://developer.postgresql.org/cvsweb.cgi/pgsql/src/test/regress/expected/temp.out.diff?r1=1.9;r2=1.9.2.1 http://developer.postgresql.org/cvsweb.cgi/pgsql/src/test/regress/sql/temp.sql.diff?r1=1.5;r2=1.5.4.1 * Add debian/docs.patch: manpage and HTML documentation patches which explain the changes above. Upstream keeps them in the SGML source, but since we do not build this and instead use the pre-built files which come in man.tar.gz and postgresql.tar.gz, we cannot use a regular debian/patches/ patch for this. * debian/rules: Apply debian/docs.patch in the install target to update the files in the binary install directories. oldstable/main/binary-m68k/postgresql_7.4.7-6sarge5_m68k.deb oldstable/main/binary-m68k/postgresql-client_7.4.7-6sarge5_m68k.deb oldstable/main/binary-m68k/postgresql-dev_7.4.7-6sarge5_m68k.deb oldstable/main/binary-m68k/libpq3_7.4.7-6sarge5_m68k.deb oldstable/main/binary-m68k/libecpg4_7.4.7-6sarge5_m68k.deb oldstable/main/binary-m68k/libecpg-dev_7.4.7-6sarge5_m68k.deb oldstable/main/binary-m68k/libpgtcl_7.4.7-6sarge5_m68k.deb oldstable/main/binary-m68k/libpgtcl-dev_7.4.7-6sarge5_m68k.deb oldstable/main/binary-m68k/postgresql-contrib_7.4.7-6sarge5_m68k.deb postgresql (7.4.7-6sarge5) oldstable-security; urgency=high * SECURITY UPDATE: User privilege escalation. * Add debian/patches/62secure_search_path.path: - Support explicit placement of the temporary-table schema within search_path. This is needed to allow a security-definer function to set a truly secure value of search_path. Without it, a malicious user can use temporary objects to execute code with the privileges of the security-definer function. Even pushing the temp schema to the back of the search path is not quite good enough, because a function or operator at the back of the path might still capture control from one nearer the front due to having a more exact datatype match. Hence, disable searching the temp schema altogether for functions and operators. [CVE-2007-2138] - Patch backported from 7.4.17 CVS: http://developer.postgresql.org/cvsweb.cgi/pgsql/src/backend/catalog/namespace.c.diff?r1=1.58;r2=1.58.2.1 - Add test cases for the placement of the temp schema in the search path. Backported from 7.4.17 CVS: http://developer.postgresql.org/cvsweb.cgi/pgsql/src/test/regress/expected/temp.out.diff?r1=1.9;r2=1.9.2.1 http://developer.postgresql.org/cvsweb.cgi/pgsql/src/test/regress/sql/temp.sql.diff?r1=1.5;r2=1.5.4.1 * Add debian/docs.patch: manpage and HTML documentation patches which explain the changes above. Upstream keeps them in the SGML source, but since we do not build this and instead use the pre-built files which come in man.tar.gz and postgresql.tar.gz, we cannot use a regular debian/patches/ patch for this. * debian/rules: Apply debian/docs.patch in the install target to update the files in the binary install directories. oldstable/main/binary-mips/postgresql_7.4.7-6sarge5_mips.deb oldstable/main/binary-mips/postgresql-client_7.4.7-6sarge5_mips.deb oldstable/main/binary-mips/postgresql-dev_7.4.7-6sarge5_mips.deb oldstable/main/binary-mips/libpq3_7.4.7-6sarge5_mips.deb oldstable/main/binary-mips/libecpg4_7.4.7-6sarge5_mips.deb oldstable/main/binary-mips/libecpg-dev_7.4.7-6sarge5_mips.deb oldstable/main/binary-mips/libpgtcl_7.4.7-6sarge5_mips.deb oldstable/main/binary-mips/libpgtcl-dev_7.4.7-6sarge5_mips.deb oldstable/main/binary-mips/postgresql-contrib_7.4.7-6sarge5_mips.deb postgresql (7.4.7-6sarge5) oldstable-security; urgency=high * SECURITY UPDATE: User privilege escalation. * Add debian/patches/62secure_search_path.path: - Support explicit placement of the temporary-table schema within search_path. This is needed to allow a security-definer function to set a truly secure value of search_path. Without it, a malicious user can use temporary objects to execute code with the privileges of the security-definer function. Even pushing the temp schema to the back of the search path is not quite good enough, because a function or operator at the back of the path might still capture control from one nearer the front due to having a more exact datatype match. Hence, disable searching the temp schema altogether for functions and operators. [CVE-2007-2138] - Patch backported from 7.4.17 CVS: http://developer.postgresql.org/cvsweb.cgi/pgsql/src/backend/catalog/namespace.c.diff?r1=1.58;r2=1.58.2.1 - Add test cases for the placement of the temp schema in the search path. Backported from 7.4.17 CVS: http://developer.postgresql.org/cvsweb.cgi/pgsql/src/test/regress/expected/temp.out.diff?r1=1.9;r2=1.9.2.1 http://developer.postgresql.org/cvsweb.cgi/pgsql/src/test/regress/sql/temp.sql.diff?r1=1.5;r2=1.5.4.1 * Add debian/docs.patch: manpage and HTML documentation patches which explain the changes above. Upstream keeps them in the SGML source, but since we do not build this and instead use the pre-built files which come in man.tar.gz and postgresql.tar.gz, we cannot use a regular debian/patches/ patch for this. * debian/rules: Apply debian/docs.patch in the install target to update the files in the binary install directories. oldstable/main/binary-mipsel/postgresql_7.4.7-6sarge5_mipsel.deb oldstable/main/binary-mipsel/postgresql-client_7.4.7-6sarge5_mipsel.deb oldstable/main/binary-mipsel/postgresql-dev_7.4.7-6sarge5_mipsel.deb oldstable/main/binary-mipsel/libpq3_7.4.7-6sarge5_mipsel.deb oldstable/main/binary-mipsel/libecpg4_7.4.7-6sarge5_mipsel.deb oldstable/main/binary-mipsel/libecpg-dev_7.4.7-6sarge5_mipsel.deb oldstable/main/binary-mipsel/libpgtcl_7.4.7-6sarge5_mipsel.deb oldstable/main/binary-mipsel/libpgtcl-dev_7.4.7-6sarge5_mipsel.deb oldstable/main/binary-mipsel/postgresql-contrib_7.4.7-6sarge5_mipsel.deb postgresql (7.4.7-6sarge5) oldstable-security; urgency=high * SECURITY UPDATE: User privilege escalation. * Add debian/patches/62secure_search_path.path: - Support explicit placement of the temporary-table schema within search_path. This is needed to allow a security-definer function to set a truly secure value of search_path. Without it, a malicious user can use temporary objects to execute code with the privileges of the security-definer function. Even pushing the temp schema to the back of the search path is not quite good enough, because a function or operator at the back of the path might still capture control from one nearer the front due to having a more exact datatype match. Hence, disable searching the temp schema altogether for functions and operators. [CVE-2007-2138] - Patch backported from 7.4.17 CVS: http://developer.postgresql.org/cvsweb.cgi/pgsql/src/backend/catalog/namespace.c.diff?r1=1.58;r2=1.58.2.1 - Add test cases for the placement of the temp schema in the search path. Backported from 7.4.17 CVS: http://developer.postgresql.org/cvsweb.cgi/pgsql/src/test/regress/expected/temp.out.diff?r1=1.9;r2=1.9.2.1 http://developer.postgresql.org/cvsweb.cgi/pgsql/src/test/regress/sql/temp.sql.diff?r1=1.5;r2=1.5.4.1 * Add debian/docs.patch: manpage and HTML documentation patches which explain the changes above. Upstream keeps them in the SGML source, but since we do not build this and instead use the pre-built files which come in man.tar.gz and postgresql.tar.gz, we cannot use a regular debian/patches/ patch for this. * debian/rules: Apply debian/docs.patch in the install target to update the files in the binary install directories. oldstable/main/binary-powerpc/postgresql_7.4.7-6sarge5_powerpc.deb oldstable/main/binary-powerpc/postgresql-client_7.4.7-6sarge5_powerpc.deb oldstable/main/binary-powerpc/postgresql-dev_7.4.7-6sarge5_powerpc.deb oldstable/main/binary-powerpc/libpq3_7.4.7-6sarge5_powerpc.deb oldstable/main/binary-powerpc/libecpg4_7.4.7-6sarge5_powerpc.deb oldstable/main/binary-powerpc/libecpg-dev_7.4.7-6sarge5_powerpc.deb oldstable/main/binary-powerpc/libpgtcl_7.4.7-6sarge5_powerpc.deb oldstable/main/binary-powerpc/libpgtcl-dev_7.4.7-6sarge5_powerpc.deb oldstable/main/binary-powerpc/postgresql-contrib_7.4.7-6sarge5_powerpc.deb postgresql (7.4.7-6sarge5) oldstable-security; urgency=high * SECURITY UPDATE: User privilege escalation. * Add debian/patches/62secure_search_path.path: - Support explicit placement of the temporary-table schema within search_path. This is needed to allow a security-definer function to set a truly secure value of search_path. Without it, a malicious user can use temporary objects to execute code with the privileges of the security-definer function. Even pushing the temp schema to the back of the search path is not quite good enough, because a function or operator at the back of the path might still capture control from one nearer the front due to having a more exact datatype match. Hence, disable searching the temp schema altogether for functions and operators. [CVE-2007-2138] - Patch backported from 7.4.17 CVS: http://developer.postgresql.org/cvsweb.cgi/pgsql/src/backend/catalog/namespace.c.diff?r1=1.58;r2=1.58.2.1 - Add test cases for the placement of the temp schema in the search path. Backported from 7.4.17 CVS: http://developer.postgresql.org/cvsweb.cgi/pgsql/src/test/regress/expected/temp.out.diff?r1=1.9;r2=1.9.2.1 http://developer.postgresql.org/cvsweb.cgi/pgsql/src/test/regress/sql/temp.sql.diff?r1=1.5;r2=1.5.4.1 * Add debian/docs.patch: manpage and HTML documentation patches which explain the changes above. Upstream keeps them in the SGML source, but since we do not build this and instead use the pre-built files which come in man.tar.gz and postgresql.tar.gz, we cannot use a regular debian/patches/ patch for this. * debian/rules: Apply debian/docs.patch in the install target to update the files in the binary install directories. oldstable/main/binary-s390/postgresql_7.4.7-6sarge5_s390.deb oldstable/main/binary-s390/postgresql-client_7.4.7-6sarge5_s390.deb oldstable/main/binary-s390/postgresql-dev_7.4.7-6sarge5_s390.deb oldstable/main/binary-s390/libpq3_7.4.7-6sarge5_s390.deb oldstable/main/binary-s390/libecpg4_7.4.7-6sarge5_s390.deb oldstable/main/binary-s390/libecpg-dev_7.4.7-6sarge5_s390.deb oldstable/main/binary-s390/libpgtcl_7.4.7-6sarge5_s390.deb oldstable/main/binary-s390/libpgtcl-dev_7.4.7-6sarge5_s390.deb oldstable/main/binary-s390/postgresql-contrib_7.4.7-6sarge5_s390.deb postgresql (7.4.7-6sarge5) oldstable-security; urgency=high * SECURITY UPDATE: User privilege escalation. * Add debian/patches/62secure_search_path.path: - Support explicit placement of the temporary-table schema within search_path. This is needed to allow a security-definer function to set a truly secure value of search_path. Without it, a malicious user can use temporary objects to execute code with the privileges of the security-definer function. Even pushing the temp schema to the back of the search path is not quite good enough, because a function or operator at the back of the path might still capture control from one nearer the front due to having a more exact datatype match. Hence, disable searching the temp schema altogether for functions and operators. [CVE-2007-2138] - Patch backported from 7.4.17 CVS: http://developer.postgresql.org/cvsweb.cgi/pgsql/src/backend/catalog/namespace.c.diff?r1=1.58;r2=1.58.2.1 - Add test cases for the placement of the temp schema in the search path. Backported from 7.4.17 CVS: http://developer.postgresql.org/cvsweb.cgi/pgsql/src/test/regress/expected/temp.out.diff?r1=1.9;r2=1.9.2.1 http://developer.postgresql.org/cvsweb.cgi/pgsql/src/test/regress/sql/temp.sql.diff?r1=1.5;r2=1.5.4.1 * Add debian/docs.patch: manpage and HTML documentation patches which explain the changes above. Upstream keeps them in the SGML source, but since we do not build this and instead use the pre-built files which come in man.tar.gz and postgresql.tar.gz, we cannot use a regular debian/patches/ patch for this. * debian/rules: Apply debian/docs.patch in the install target to update the files in the binary install directories. oldstable/main/binary-sparc/postgresql_7.4.7-6sarge5_sparc.deb oldstable/main/binary-sparc/postgresql-client_7.4.7-6sarge5_sparc.deb oldstable/main/binary-sparc/postgresql-dev_7.4.7-6sarge5_sparc.deb oldstable/main/binary-sparc/libpq3_7.4.7-6sarge5_sparc.deb oldstable/main/binary-sparc/libecpg4_7.4.7-6sarge5_sparc.deb oldstable/main/binary-sparc/libecpg-dev_7.4.7-6sarge5_sparc.deb oldstable/main/binary-sparc/libpgtcl_7.4.7-6sarge5_sparc.deb oldstable/main/binary-sparc/libpgtcl-dev_7.4.7-6sarge5_sparc.deb oldstable/main/binary-sparc/postgresql-contrib_7.4.7-6sarge5_sparc.deb postgresql (7.4.7-6sarge5) oldstable-security; urgency=high * SECURITY UPDATE: User privilege escalation. * Add debian/patches/62secure_search_path.path: - Support explicit placement of the temporary-table schema within search_path. This is needed to allow a security-definer function to set a truly secure value of search_path. Without it, a malicious user can use temporary objects to execute code with the privileges of the security-definer function. Even pushing the temp schema to the back of the search path is not quite good enough, because a function or operator at the back of the path might still capture control from one nearer the front due to having a more exact datatype match. Hence, disable searching the temp schema altogether for functions and operators. [CVE-2007-2138] - Patch backported from 7.4.17 CVS: http://developer.postgresql.org/cvsweb.cgi/pgsql/src/backend/catalog/namespace.c.diff?r1=1.58;r2=1.58.2.1 - Add test cases for the placement of the temp schema in the search path. Backported from 7.4.17 CVS: http://developer.postgresql.org/cvsweb.cgi/pgsql/src/test/regress/expected/temp.out.diff?r1=1.9;r2=1.9.2.1 http://developer.postgresql.org/cvsweb.cgi/pgsql/src/test/regress/sql/temp.sql.diff?r1=1.5;r2=1.5.4.1 * Add debian/docs.patch: manpage and HTML documentation patches which explain the changes above. Upstream keeps them in the SGML source, but since we do not build this and instead use the pre-built files which come in man.tar.gz and postgresql.tar.gz, we cannot use a regular debian/patches/ patch for this. * debian/rules: Apply debian/docs.patch in the install target to update the files in the binary install directories. oldstable/main/source/prebaseconfig_1.07sarge1.dsc oldstable/main/source/prebaseconfig_1.07sarge1.tar.gz oldstable/main/prebaseconfig_1.07sarge1_all.udeb prebaseconfig (1.07sarge1) oldstable; urgency=low * Change permissions of log files and cdebconf files to 600 to guard against any possible leakage of sensitive data. This has previously been worked around by changes in base-installer. oldstable/main/binary-alpha/libpt-1.8.3_1.8.4-1+sarge1.1_alpha.deb oldstable/main/binary-alpha/libpt-dev_1.8.4-1+sarge1.1_alpha.deb oldstable/main/binary-alpha/libpt-dbg_1.8.4-1+sarge1.1_alpha.deb oldstable/main/binary-alpha/libpt-plugins-v4l_1.8.4-1+sarge1.1_alpha.deb oldstable/main/binary-alpha/libpt-plugins-v4l2_1.8.4-1+sarge1.1_alpha.deb oldstable/main/binary-alpha/libpt-plugins-avc_1.8.4-1+sarge1.1_alpha.deb oldstable/main/binary-alpha/libpt-plugins-dc_1.8.4-1+sarge1.1_alpha.deb oldstable/main/binary-alpha/libpt-plugins-oss_1.8.4-1+sarge1.1_alpha.deb oldstable/main/binary-alpha/libpt-plugins-alsa_1.8.4-1+sarge1.1_alpha.deb pwlib (1.8.4-1+sarge1.1) oldstable-proposed-updates; urgency=low * Non-maintainer upload. * Fix to build with sudo on the autobuilders. oldstable/main/binary-arm/libpt-1.8.3_1.8.4-1+sarge1.1_arm.deb oldstable/main/binary-arm/libpt-dev_1.8.4-1+sarge1.1_arm.deb oldstable/main/binary-arm/libpt-dbg_1.8.4-1+sarge1.1_arm.deb oldstable/main/binary-arm/libpt-plugins-v4l_1.8.4-1+sarge1.1_arm.deb oldstable/main/binary-arm/libpt-plugins-v4l2_1.8.4-1+sarge1.1_arm.deb oldstable/main/binary-arm/libpt-plugins-avc_1.8.4-1+sarge1.1_arm.deb oldstable/main/binary-arm/libpt-plugins-dc_1.8.4-1+sarge1.1_arm.deb oldstable/main/binary-arm/libpt-plugins-oss_1.8.4-1+sarge1.1_arm.deb oldstable/main/binary-arm/libpt-plugins-alsa_1.8.4-1+sarge1.1_arm.deb pwlib (1.8.4-1+sarge1.1) oldstable-proposed-updates; urgency=low * Non-maintainer upload. * Fix to build with sudo on the autobuilders. oldstable/main/binary-hppa/libpt-1.8.3_1.8.4-1+sarge1.1_hppa.deb oldstable/main/binary-hppa/libpt-dev_1.8.4-1+sarge1.1_hppa.deb oldstable/main/binary-hppa/libpt-dbg_1.8.4-1+sarge1.1_hppa.deb oldstable/main/binary-hppa/libpt-plugins-v4l_1.8.4-1+sarge1.1_hppa.deb oldstable/main/binary-hppa/libpt-plugins-v4l2_1.8.4-1+sarge1.1_hppa.deb oldstable/main/binary-hppa/libpt-plugins-avc_1.8.4-1+sarge1.1_hppa.deb oldstable/main/binary-hppa/libpt-plugins-dc_1.8.4-1+sarge1.1_hppa.deb oldstable/main/binary-hppa/libpt-plugins-oss_1.8.4-1+sarge1.1_hppa.deb oldstable/main/binary-hppa/libpt-plugins-alsa_1.8.4-1+sarge1.1_hppa.deb pwlib (1.8.4-1+sarge1.1) oldstable-proposed-updates; urgency=low * Non-maintainer upload. * Fix to build with sudo on the autobuilders. oldstable/main/source/pwlib_1.8.4-1+sarge1.1.dsc oldstable/main/source/pwlib_1.8.4-1+sarge1.1.diff.gz oldstable/main/binary-i386/libpt-1.8.3_1.8.4-1+sarge1.1_i386.deb oldstable/main/binary-i386/libpt-dev_1.8.4-1+sarge1.1_i386.deb oldstable/main/binary-i386/libpt-dbg_1.8.4-1+sarge1.1_i386.deb oldstable/main/binary-i386/libpt-plugins-v4l_1.8.4-1+sarge1.1_i386.deb oldstable/main/binary-i386/libpt-plugins-v4l2_1.8.4-1+sarge1.1_i386.deb oldstable/main/binary-i386/libpt-plugins-avc_1.8.4-1+sarge1.1_i386.deb oldstable/main/binary-i386/libpt-plugins-dc_1.8.4-1+sarge1.1_i386.deb oldstable/main/binary-i386/libpt-plugins-oss_1.8.4-1+sarge1.1_i386.deb oldstable/main/binary-i386/libpt-plugins-alsa_1.8.4-1+sarge1.1_i386.deb oldstable/main/binary-all/libpt-doc_1.8.4-1+sarge1.1_all.deb pwlib (1.8.4-1+sarge1.1) oldstable-proposed-updates; urgency=low * Non-maintainer upload. * Fix to build with sudo on the autobuilders. oldstable/main/binary-ia64/libpt-1.8.3_1.8.4-1+sarge1.1_ia64.deb oldstable/main/binary-ia64/libpt-dev_1.8.4-1+sarge1.1_ia64.deb oldstable/main/binary-ia64/libpt-dbg_1.8.4-1+sarge1.1_ia64.deb oldstable/main/binary-ia64/libpt-plugins-v4l_1.8.4-1+sarge1.1_ia64.deb oldstable/main/binary-ia64/libpt-plugins-v4l2_1.8.4-1+sarge1.1_ia64.deb oldstable/main/binary-ia64/libpt-plugins-avc_1.8.4-1+sarge1.1_ia64.deb oldstable/main/binary-ia64/libpt-plugins-dc_1.8.4-1+sarge1.1_ia64.deb oldstable/main/binary-ia64/libpt-plugins-oss_1.8.4-1+sarge1.1_ia64.deb oldstable/main/binary-ia64/libpt-plugins-alsa_1.8.4-1+sarge1.1_ia64.deb pwlib (1.8.4-1+sarge1.1) oldstable-proposed-updates; urgency=low * Non-maintainer upload. * Fix to build with sudo on the autobuilders. oldstable/main/binary-mips/libpt-1.8.3_1.8.4-1+sarge1.1_mips.deb oldstable/main/binary-mips/libpt-dev_1.8.4-1+sarge1.1_mips.deb oldstable/main/binary-mips/libpt-dbg_1.8.4-1+sarge1.1_mips.deb oldstable/main/binary-mips/libpt-plugins-v4l_1.8.4-1+sarge1.1_mips.deb oldstable/main/binary-mips/libpt-plugins-v4l2_1.8.4-1+sarge1.1_mips.deb oldstable/main/binary-mips/libpt-plugins-avc_1.8.4-1+sarge1.1_mips.deb oldstable/main/binary-mips/libpt-plugins-dc_1.8.4-1+sarge1.1_mips.deb oldstable/main/binary-mips/libpt-plugins-oss_1.8.4-1+sarge1.1_mips.deb oldstable/main/binary-mips/libpt-plugins-alsa_1.8.4-1+sarge1.1_mips.deb pwlib (1.8.4-1+sarge1.1) oldstable-proposed-updates; urgency=low * Non-maintainer upload. * Fix to build with sudo on the autobuilders. oldstable/main/binary-mipsel/libpt-1.8.3_1.8.4-1+sarge1.1_mipsel.deb oldstable/main/binary-mipsel/libpt-dev_1.8.4-1+sarge1.1_mipsel.deb oldstable/main/binary-mipsel/libpt-dbg_1.8.4-1+sarge1.1_mipsel.deb oldstable/main/binary-mipsel/libpt-plugins-v4l_1.8.4-1+sarge1.1_mipsel.deb oldstable/main/binary-mipsel/libpt-plugins-v4l2_1.8.4-1+sarge1.1_mipsel.deb oldstable/main/binary-mipsel/libpt-plugins-avc_1.8.4-1+sarge1.1_mipsel.deb oldstable/main/binary-mipsel/libpt-plugins-dc_1.8.4-1+sarge1.1_mipsel.deb oldstable/main/binary-mipsel/libpt-plugins-oss_1.8.4-1+sarge1.1_mipsel.deb oldstable/main/binary-mipsel/libpt-plugins-alsa_1.8.4-1+sarge1.1_mipsel.deb pwlib (1.8.4-1+sarge1.1) oldstable-proposed-updates; urgency=low * Non-maintainer upload. * Fix to build with sudo on the autobuilders. oldstable/main/binary-powerpc/libpt-1.8.3_1.8.4-1+sarge1.1_powerpc.deb oldstable/main/binary-powerpc/libpt-dev_1.8.4-1+sarge1.1_powerpc.deb oldstable/main/binary-powerpc/libpt-dbg_1.8.4-1+sarge1.1_powerpc.deb oldstable/main/binary-powerpc/libpt-plugins-v4l_1.8.4-1+sarge1.1_powerpc.deb oldstable/main/binary-powerpc/libpt-plugins-v4l2_1.8.4-1+sarge1.1_powerpc.deb oldstable/main/binary-powerpc/libpt-plugins-avc_1.8.4-1+sarge1.1_powerpc.deb oldstable/main/binary-powerpc/libpt-plugins-dc_1.8.4-1+sarge1.1_powerpc.deb oldstable/main/binary-powerpc/libpt-plugins-oss_1.8.4-1+sarge1.1_powerpc.deb oldstable/main/binary-powerpc/libpt-plugins-alsa_1.8.4-1+sarge1.1_powerpc.deb pwlib (1.8.4-1+sarge1.1) oldstable-proposed-updates; urgency=low * Non-maintainer upload. * Fix to build with sudo on the autobuilders. oldstable/main/binary-s390/libpt-1.8.3_1.8.4-1+sarge1.1_s390.deb oldstable/main/binary-s390/libpt-dev_1.8.4-1+sarge1.1_s390.deb oldstable/main/binary-s390/libpt-dbg_1.8.4-1+sarge1.1_s390.deb oldstable/main/binary-s390/libpt-plugins-v4l_1.8.4-1+sarge1.1_s390.deb oldstable/main/binary-s390/libpt-plugins-v4l2_1.8.4-1+sarge1.1_s390.deb oldstable/main/binary-s390/libpt-plugins-avc_1.8.4-1+sarge1.1_s390.deb oldstable/main/binary-s390/libpt-plugins-dc_1.8.4-1+sarge1.1_s390.deb oldstable/main/binary-s390/libpt-plugins-oss_1.8.4-1+sarge1.1_s390.deb oldstable/main/binary-s390/libpt-plugins-alsa_1.8.4-1+sarge1.1_s390.deb pwlib (1.8.4-1+sarge1.1) oldstable-proposed-updates; urgency=low * Non-maintainer upload. * Fix to build with sudo on the autobuilders. oldstable/main/binary-sparc/libpt-1.8.3_1.8.4-1+sarge1.1_sparc.deb oldstable/main/binary-sparc/libpt-dev_1.8.4-1+sarge1.1_sparc.deb oldstable/main/binary-sparc/libpt-dbg_1.8.4-1+sarge1.1_sparc.deb oldstable/main/binary-sparc/libpt-plugins-v4l_1.8.4-1+sarge1.1_sparc.deb oldstable/main/binary-sparc/libpt-plugins-v4l2_1.8.4-1+sarge1.1_sparc.deb oldstable/main/binary-sparc/libpt-plugins-avc_1.8.4-1+sarge1.1_sparc.deb oldstable/main/binary-sparc/libpt-plugins-dc_1.8.4-1+sarge1.1_sparc.deb oldstable/main/binary-sparc/libpt-plugins-oss_1.8.4-1+sarge1.1_sparc.deb oldstable/main/binary-sparc/libpt-plugins-alsa_1.8.4-1+sarge1.1_sparc.deb pwlib (1.8.4-1+sarge1.1) oldstable-proposed-updates; urgency=low * Non-maintainer upload. * Fix to build with sudo on the autobuilders. oldstable/main/binary-arm/libpt-1.8.3_1.8.4-1+sarge1_arm.deb oldstable/main/binary-arm/libpt-dev_1.8.4-1+sarge1_arm.deb oldstable/main/binary-arm/libpt-dbg_1.8.4-1+sarge1_arm.deb oldstable/main/binary-arm/libpt-plugins-v4l_1.8.4-1+sarge1_arm.deb oldstable/main/binary-arm/libpt-plugins-v4l2_1.8.4-1+sarge1_arm.deb oldstable/main/binary-arm/libpt-plugins-avc_1.8.4-1+sarge1_arm.deb oldstable/main/binary-arm/libpt-plugins-dc_1.8.4-1+sarge1_arm.deb oldstable/main/binary-arm/libpt-plugins-oss_1.8.4-1+sarge1_arm.deb oldstable/main/binary-arm/libpt-plugins-alsa_1.8.4-1+sarge1_arm.deb pwlib (1.8.4-1+sarge1) oldstable-proposed-updates; urgency=high * Fix remote denial of service vulnerability caused by a call to PString::vsprintf if the used object already contained more than 1000 characters (CVE-2007-4897; Closes: #454133). oldstable/main/binary-hppa/libpt-1.8.3_1.8.4-1+sarge1_hppa.deb oldstable/main/binary-hppa/libpt-dev_1.8.4-1+sarge1_hppa.deb oldstable/main/binary-hppa/libpt-dbg_1.8.4-1+sarge1_hppa.deb oldstable/main/binary-hppa/libpt-plugins-v4l_1.8.4-1+sarge1_hppa.deb oldstable/main/binary-hppa/libpt-plugins-v4l2_1.8.4-1+sarge1_hppa.deb oldstable/main/binary-hppa/libpt-plugins-avc_1.8.4-1+sarge1_hppa.deb oldstable/main/binary-hppa/libpt-plugins-dc_1.8.4-1+sarge1_hppa.deb oldstable/main/binary-hppa/libpt-plugins-oss_1.8.4-1+sarge1_hppa.deb oldstable/main/binary-hppa/libpt-plugins-alsa_1.8.4-1+sarge1_hppa.deb pwlib (1.8.4-1+sarge1) oldstable-proposed-updates; urgency=high * Fix remote denial of service vulnerability caused by a call to PString::vsprintf if the used object already contained more than 1000 characters (CVE-2007-4897; Closes: #454133). oldstable/main/source/pwlib_1.8.4-1+sarge1.dsc oldstable/main/source/pwlib_1.8.4-1+sarge1.diff.gz oldstable/main/binary-i386/libpt-1.8.3_1.8.4-1+sarge1_i386.deb oldstable/main/binary-i386/libpt-dev_1.8.4-1+sarge1_i386.deb oldstable/main/binary-i386/libpt-dbg_1.8.4-1+sarge1_i386.deb oldstable/main/binary-i386/libpt-plugins-v4l_1.8.4-1+sarge1_i386.deb oldstable/main/binary-i386/libpt-plugins-v4l2_1.8.4-1+sarge1_i386.deb oldstable/main/binary-i386/libpt-plugins-avc_1.8.4-1+sarge1_i386.deb oldstable/main/binary-i386/libpt-plugins-dc_1.8.4-1+sarge1_i386.deb oldstable/main/binary-i386/libpt-plugins-oss_1.8.4-1+sarge1_i386.deb oldstable/main/binary-i386/libpt-plugins-alsa_1.8.4-1+sarge1_i386.deb oldstable/main/binary-all/libpt-doc_1.8.4-1+sarge1_all.deb pwlib (1.8.4-1+sarge1) oldstable-proposed-updates; urgency=high * Fix remote denial of service vulnerability caused by a call to PString::vsprintf if the used object already contained more than 1000 characters (CVE-2007-4897; Closes: #454133). oldstable/main/binary-ia64/libpt-1.8.3_1.8.4-1+sarge1_ia64.deb oldstable/main/binary-ia64/libpt-dev_1.8.4-1+sarge1_ia64.deb oldstable/main/binary-ia64/libpt-dbg_1.8.4-1+sarge1_ia64.deb oldstable/main/binary-ia64/libpt-plugins-v4l_1.8.4-1+sarge1_ia64.deb oldstable/main/binary-ia64/libpt-plugins-v4l2_1.8.4-1+sarge1_ia64.deb oldstable/main/binary-ia64/libpt-plugins-avc_1.8.4-1+sarge1_ia64.deb oldstable/main/binary-ia64/libpt-plugins-dc_1.8.4-1+sarge1_ia64.deb oldstable/main/binary-ia64/libpt-plugins-oss_1.8.4-1+sarge1_ia64.deb oldstable/main/binary-ia64/libpt-plugins-alsa_1.8.4-1+sarge1_ia64.deb pwlib (1.8.4-1+sarge1) oldstable-proposed-updates; urgency=high * Fix remote denial of service vulnerability caused by a call to PString::vsprintf if the used object already contained more than 1000 characters (CVE-2007-4897; Closes: #454133). oldstable/main/binary-powerpc/libpt-1.8.3_1.8.4-1+sarge1_powerpc.deb oldstable/main/binary-powerpc/libpt-dev_1.8.4-1+sarge1_powerpc.deb oldstable/main/binary-powerpc/libpt-dbg_1.8.4-1+sarge1_powerpc.deb oldstable/main/binary-powerpc/libpt-plugins-v4l_1.8.4-1+sarge1_powerpc.deb oldstable/main/binary-powerpc/libpt-plugins-v4l2_1.8.4-1+sarge1_powerpc.deb oldstable/main/binary-powerpc/libpt-plugins-avc_1.8.4-1+sarge1_powerpc.deb oldstable/main/binary-powerpc/libpt-plugins-dc_1.8.4-1+sarge1_powerpc.deb oldstable/main/binary-powerpc/libpt-plugins-oss_1.8.4-1+sarge1_powerpc.deb oldstable/main/binary-powerpc/libpt-plugins-alsa_1.8.4-1+sarge1_powerpc.deb pwlib (1.8.4-1+sarge1) oldstable-proposed-updates; urgency=high * Fix remote denial of service vulnerability caused by a call to PString::vsprintf if the used object already contained more than 1000 characters (CVE-2007-4897; Closes: #454133). oldstable/main/binary-s390/libpt-1.8.3_1.8.4-1+sarge1_s390.deb oldstable/main/binary-s390/libpt-dev_1.8.4-1+sarge1_s390.deb oldstable/main/binary-s390/libpt-dbg_1.8.4-1+sarge1_s390.deb oldstable/main/binary-s390/libpt-plugins-v4l_1.8.4-1+sarge1_s390.deb oldstable/main/binary-s390/libpt-plugins-v4l2_1.8.4-1+sarge1_s390.deb oldstable/main/binary-s390/libpt-plugins-avc_1.8.4-1+sarge1_s390.deb oldstable/main/binary-s390/libpt-plugins-dc_1.8.4-1+sarge1_s390.deb oldstable/main/binary-s390/libpt-plugins-oss_1.8.4-1+sarge1_s390.deb oldstable/main/binary-s390/libpt-plugins-alsa_1.8.4-1+sarge1_s390.deb pwlib (1.8.4-1+sarge1) oldstable-proposed-updates; urgency=high * Fix remote denial of service vulnerability caused by a call to PString::vsprintf if the used object already contained more than 1000 characters (CVE-2007-4897; Closes: #454133). oldstable/main/binary-sparc/libpt-1.8.3_1.8.4-1+sarge1_sparc.deb oldstable/main/binary-sparc/libpt-dev_1.8.4-1+sarge1_sparc.deb oldstable/main/binary-sparc/libpt-dbg_1.8.4-1+sarge1_sparc.deb oldstable/main/binary-sparc/libpt-plugins-v4l_1.8.4-1+sarge1_sparc.deb oldstable/main/binary-sparc/libpt-plugins-v4l2_1.8.4-1+sarge1_sparc.deb oldstable/main/binary-sparc/libpt-plugins-avc_1.8.4-1+sarge1_sparc.deb oldstable/main/binary-sparc/libpt-plugins-dc_1.8.4-1+sarge1_sparc.deb oldstable/main/binary-sparc/libpt-plugins-oss_1.8.4-1+sarge1_sparc.deb oldstable/main/binary-sparc/libpt-plugins-alsa_1.8.4-1+sarge1_sparc.deb pwlib (1.8.4-1+sarge1) oldstable-proposed-updates; urgency=high * Fix remote denial of service vulnerability caused by a call to PString::vsprintf if the used object already contained more than 1000 characters (CVE-2007-4897; Closes: #454133). oldstable/main/binary-hppa/python2.2-biopython_1.30-2_hppa.deb oldstable/main/binary-hppa/python2.3-biopython_1.30-2_hppa.deb python-biopython (1.30-2) unstable; urgency=low * Fixed bugs in debian/rules and debian/control which prevented porting the package. * Using -fPIC to build shared lib KDTree. (closes: #278959) oldstable/main/source/qemu_0.6.1+20050407-1sarge1.dsc oldstable/main/source/qemu_0.6.1+20050407.orig.tar.gz oldstable/main/source/qemu_0.6.1+20050407-1sarge1.diff.gz oldstable/main/binary-i386/qemu_0.6.1+20050407-1sarge1_i386.deb qemu (0.6.1+20050407-1sarge1) oldstable-security; urgency=high [ Guillem Jover ] * Fix several security issues found by Tavis Ormandy <taviso@google.com>: - Cirrus LGD-54XX "bitblt" heap overflow. CVE-2007-1320 - NE2000 "mtu" heap overflow. - QEMU NE2000 "receive" integer signedness error. CVE-2007-1321 - Infinite loop in the emulated SB16 device. - Unprivileged 'aam' instruction does not correctly handle the undocumented divisor operand. CVE-2007-1322 - Unprivileged 'icebp' instruction will halt emulation. CVE-2007-1322 - debian/patches/90_security.patch: New file. oldstable/main/binary-powerpc/qemu_0.6.1+20050407-1sarge1_powerpc.deb qemu (0.6.1+20050407-1sarge1) oldstable-security; urgency=high [ Guillem Jover ] * Fix several security issues found by Tavis Ormandy <taviso@google.com>: - Cirrus LGD-54XX "bitblt" heap overflow. CVE-2007-1320 - NE2000 "mtu" heap overflow. - QEMU NE2000 "receive" integer signedness error. CVE-2007-1321 - Infinite loop in the emulated SB16 device. - Unprivileged 'aam' instruction does not correctly handle the undocumented divisor operand. CVE-2007-1322 - Unprivileged 'icebp' instruction will halt emulation. CVE-2007-1322 - debian/patches/90_security.patch: New file. oldstable/main/binary-alpha/libqt3c102_3.3.4-3sarge3_alpha.deb oldstable/main/binary-alpha/libqt3c102-mt_3.3.4-3sarge3_alpha.deb oldstable/main/binary-alpha/libqt3c102-mysql_3.3.4-3sarge3_alpha.deb oldstable/main/binary-alpha/libqt3c102-mt-mysql_3.3.4-3sarge3_alpha.deb oldstable/main/binary-alpha/libqt3c102-odbc_3.3.4-3sarge3_alpha.deb oldstable/main/binary-alpha/libqt3c102-mt-odbc_3.3.4-3sarge3_alpha.deb oldstable/main/binary-alpha/libqt3c102-psql_3.3.4-3sarge3_alpha.deb oldstable/main/binary-alpha/libqt3c102-mt-psql_3.3.4-3sarge3_alpha.deb oldstable/main/binary-alpha/libqt3c102-sqlite_3.3.4-3sarge3_alpha.deb oldstable/main/binary-alpha/libqt3c102-mt-sqlite_3.3.4-3sarge3_alpha.deb oldstable/main/binary-alpha/libqt3-dev_3.3.4-3sarge3_alpha.deb oldstable/main/binary-alpha/libqt3-mt-dev_3.3.4-3sarge3_alpha.deb oldstable/main/binary-alpha/libqt3-headers_3.3.4-3sarge3_alpha.deb oldstable/main/binary-alpha/libqt3-compat-headers_3.3.4-3sarge3_alpha.deb oldstable/main/binary-alpha/qt3-dev-tools_3.3.4-3sarge3_alpha.deb oldstable/main/binary-alpha/qt3-designer_3.3.4-3sarge3_alpha.deb oldstable/main/binary-alpha/qt3-apps-dev_3.3.4-3sarge3_alpha.deb oldstable/main/binary-alpha/qt3-linguist_3.3.4-3sarge3_alpha.deb oldstable/main/binary-alpha/qt3-assistant_3.3.4-3sarge3_alpha.deb oldstable/main/binary-alpha/qt3-qtconfig_3.3.4-3sarge3_alpha.deb oldstable/main/binary-alpha/qt3-dev-tools-embedded_3.3.4-3sarge3_alpha.deb oldstable/main/binary-alpha/qt3-dev-tools-compat_3.3.4-3sarge3_alpha.deb qt-x11-free (3:3.3.4-3sarge3) oldstable-security; urgency=high * Fix format string vulnerabilities. (CVE-2007-3388) * Fix off-by-one in UTF codec. (CVE-2007-4137) oldstable/main/binary-amd64/libqt3c102_3.3.4-3sarge3_amd64.deb oldstable/main/binary-amd64/libqt3c102-mt_3.3.4-3sarge3_amd64.deb oldstable/main/binary-amd64/libqt3c102-mysql_3.3.4-3sarge3_amd64.deb oldstable/main/binary-amd64/libqt3c102-mt-mysql_3.3.4-3sarge3_amd64.deb oldstable/main/binary-amd64/libqt3c102-odbc_3.3.4-3sarge3_amd64.deb oldstable/main/binary-amd64/libqt3c102-mt-odbc_3.3.4-3sarge3_amd64.deb oldstable/main/binary-amd64/libqt3c102-psql_3.3.4-3sarge3_amd64.deb oldstable/main/binary-amd64/libqt3c102-mt-psql_3.3.4-3sarge3_amd64.deb oldstable/main/binary-amd64/libqt3c102-sqlite_3.3.4-3sarge3_amd64.deb oldstable/main/binary-amd64/libqt3c102-mt-sqlite_3.3.4-3sarge3_amd64.deb oldstable/main/binary-amd64/libqt3-dev_3.3.4-3sarge3_amd64.deb oldstable/main/binary-amd64/libqt3-mt-dev_3.3.4-3sarge3_amd64.deb oldstable/main/binary-amd64/libqt3-headers_3.3.4-3sarge3_amd64.deb oldstable/main/binary-amd64/libqt3-compat-headers_3.3.4-3sarge3_amd64.deb oldstable/main/binary-amd64/qt3-dev-tools_3.3.4-3sarge3_amd64.deb oldstable/main/binary-amd64/qt3-designer_3.3.4-3sarge3_amd64.deb oldstable/main/binary-amd64/qt3-apps-dev_3.3.4-3sarge3_amd64.deb oldstable/main/binary-amd64/qt3-linguist_3.3.4-3sarge3_amd64.deb oldstable/main/binary-amd64/qt3-assistant_3.3.4-3sarge3_amd64.deb oldstable/main/binary-amd64/qt3-qtconfig_3.3.4-3sarge3_amd64.deb oldstable/main/binary-amd64/qt3-dev-tools-embedded_3.3.4-3sarge3_amd64.deb oldstable/main/binary-amd64/qt3-dev-tools-compat_3.3.4-3sarge3_amd64.deb qt-x11-free (3:3.3.4-3sarge3) oldstable-security; urgency=high * Fix format string vulnerabilities. (CVE-2007-3388) * Fix off-by-one in UTF codec. (CVE-2007-4137) oldstable/main/binary-arm/libqt3c102_3.3.4-3sarge3_arm.deb oldstable/main/binary-arm/libqt3c102-mt_3.3.4-3sarge3_arm.deb oldstable/main/binary-arm/libqt3c102-mysql_3.3.4-3sarge3_arm.deb oldstable/main/binary-arm/libqt3c102-mt-mysql_3.3.4-3sarge3_arm.deb oldstable/main/binary-arm/libqt3c102-odbc_3.3.4-3sarge3_arm.deb oldstable/main/binary-arm/libqt3c102-mt-odbc_3.3.4-3sarge3_arm.deb oldstable/main/binary-arm/libqt3c102-psql_3.3.4-3sarge3_arm.deb oldstable/main/binary-arm/libqt3c102-mt-psql_3.3.4-3sarge3_arm.deb oldstable/main/binary-arm/libqt3c102-sqlite_3.3.4-3sarge3_arm.deb oldstable/main/binary-arm/libqt3c102-mt-sqlite_3.3.4-3sarge3_arm.deb oldstable/main/binary-arm/libqt3-dev_3.3.4-3sarge3_arm.deb oldstable/main/binary-arm/libqt3-mt-dev_3.3.4-3sarge3_arm.deb oldstable/main/binary-arm/libqt3-headers_3.3.4-3sarge3_arm.deb oldstable/main/binary-arm/libqt3-compat-headers_3.3.4-3sarge3_arm.deb oldstable/main/binary-arm/qt3-dev-tools_3.3.4-3sarge3_arm.deb oldstable/main/binary-arm/qt3-designer_3.3.4-3sarge3_arm.deb oldstable/main/binary-arm/qt3-apps-dev_3.3.4-3sarge3_arm.deb oldstable/main/binary-arm/qt3-linguist_3.3.4-3sarge3_arm.deb oldstable/main/binary-arm/qt3-assistant_3.3.4-3sarge3_arm.deb oldstable/main/binary-arm/qt3-qtconfig_3.3.4-3sarge3_arm.deb oldstable/main/binary-arm/qt3-dev-tools-embedded_3.3.4-3sarge3_arm.deb oldstable/main/binary-arm/qt3-dev-tools-compat_3.3.4-3sarge3_arm.deb qt-x11-free (3:3.3.4-3sarge3) oldstable-security; urgency=high * Fix format string vulnerabilities. (CVE-2007-3388) * Fix off-by-one in UTF codec. (CVE-2007-4137) oldstable/main/binary-hppa/libqt3c102_3.3.4-3sarge3_hppa.deb oldstable/main/binary-hppa/libqt3c102-mt_3.3.4-3sarge3_hppa.deb oldstable/main/binary-hppa/libqt3c102-mysql_3.3.4-3sarge3_hppa.deb oldstable/main/binary-hppa/libqt3c102-mt-mysql_3.3.4-3sarge3_hppa.deb oldstable/main/binary-hppa/libqt3c102-odbc_3.3.4-3sarge3_hppa.deb oldstable/main/binary-hppa/libqt3c102-mt-odbc_3.3.4-3sarge3_hppa.deb oldstable/main/binary-hppa/libqt3c102-psql_3.3.4-3sarge3_hppa.deb oldstable/main/binary-hppa/libqt3c102-mt-psql_3.3.4-3sarge3_hppa.deb oldstable/main/binary-hppa/libqt3c102-sqlite_3.3.4-3sarge3_hppa.deb oldstable/main/binary-hppa/libqt3c102-mt-sqlite_3.3.4-3sarge3_hppa.deb oldstable/main/binary-hppa/libqt3-dev_3.3.4-3sarge3_hppa.deb oldstable/main/binary-hppa/libqt3-mt-dev_3.3.4-3sarge3_hppa.deb oldstable/main/binary-hppa/libqt3-headers_3.3.4-3sarge3_hppa.deb oldstable/main/binary-hppa/libqt3-compat-headers_3.3.4-3sarge3_hppa.deb oldstable/main/binary-hppa/qt3-dev-tools_3.3.4-3sarge3_hppa.deb oldstable/main/binary-hppa/qt3-designer_3.3.4-3sarge3_hppa.deb oldstable/main/binary-hppa/qt3-apps-dev_3.3.4-3sarge3_hppa.deb oldstable/main/binary-hppa/qt3-linguist_3.3.4-3sarge3_hppa.deb oldstable/main/binary-hppa/qt3-assistant_3.3.4-3sarge3_hppa.deb oldstable/main/binary-hppa/qt3-qtconfig_3.3.4-3sarge3_hppa.deb oldstable/main/binary-hppa/qt3-dev-tools-embedded_3.3.4-3sarge3_hppa.deb oldstable/main/binary-hppa/qt3-dev-tools-compat_3.3.4-3sarge3_hppa.deb qt-x11-free (3:3.3.4-3sarge3) oldstable-security; urgency=high * Fix format string vulnerabilities. (CVE-2007-3388) * Fix off-by-one in UTF codec. (CVE-2007-4137) oldstable/main/source/qt-x11-free_3.3.4-3sarge3.dsc oldstable/main/source/qt-x11-free_3.3.4-3sarge3.diff.gz oldstable/main/binary-all/libqt3-i18n_3.3.4-3sarge3_all.deb oldstable/main/binary-all/qt3-doc_3.3.4-3sarge3_all.deb oldstable/main/binary-all/qt3-examples_3.3.4-3sarge3_all.deb oldstable/main/binary-i386/libqt3c102_3.3.4-3sarge3_i386.deb oldstable/main/binary-i386/libqt3c102-mt_3.3.4-3sarge3_i386.deb oldstable/main/binary-i386/libqt3c102-mysql_3.3.4-3sarge3_i386.deb oldstable/main/binary-i386/libqt3c102-mt-mysql_3.3.4-3sarge3_i386.deb oldstable/main/binary-i386/libqt3c102-odbc_3.3.4-3sarge3_i386.deb oldstable/main/binary-i386/libqt3c102-mt-odbc_3.3.4-3sarge3_i386.deb oldstable/main/binary-i386/libqt3c102-psql_3.3.4-3sarge3_i386.deb oldstable/main/binary-i386/libqt3c102-mt-psql_3.3.4-3sarge3_i386.deb oldstable/main/binary-i386/libqt3c102-ibase_3.3.4-3sarge3_i386.deb oldstable/main/binary-i386/libqt3c102-mt-ibase_3.3.4-3sarge3_i386.deb oldstable/main/binary-i386/libqt3c102-sqlite_3.3.4-3sarge3_i386.deb oldstable/main/binary-i386/libqt3c102-mt-sqlite_3.3.4-3sarge3_i386.deb oldstable/main/binary-i386/libqt3-dev_3.3.4-3sarge3_i386.deb oldstable/main/binary-i386/libqt3-mt-dev_3.3.4-3sarge3_i386.deb oldstable/main/binary-i386/libqt3-headers_3.3.4-3sarge3_i386.deb oldstable/main/binary-i386/libqt3-compat-headers_3.3.4-3sarge3_i386.deb oldstable/main/binary-i386/qt3-dev-tools_3.3.4-3sarge3_i386.deb oldstable/main/binary-i386/qt3-designer_3.3.4-3sarge3_i386.deb oldstable/main/binary-i386/qt3-apps-dev_3.3.4-3sarge3_i386.deb oldstable/main/binary-i386/qt3-linguist_3.3.4-3sarge3_i386.deb oldstable/main/binary-i386/qt3-assistant_3.3.4-3sarge3_i386.deb oldstable/main/binary-i386/qt3-qtconfig_3.3.4-3sarge3_i386.deb oldstable/main/binary-i386/qt3-dev-tools-embedded_3.3.4-3sarge3_i386.deb oldstable/main/binary-i386/qt3-dev-tools-compat_3.3.4-3sarge3_i386.deb qt-x11-free (3:3.3.4-3sarge3) oldstable-security; urgency=high * Fix format string vulnerabilities. (CVE-2007-3388) * Fix off-by-one in UTF codec. (CVE-2007-4137) oldstable/main/binary-ia64/libqt3c102_3.3.4-3sarge3_ia64.deb oldstable/main/binary-ia64/libqt3c102-mt_3.3.4-3sarge3_ia64.deb oldstable/main/binary-ia64/libqt3c102-mysql_3.3.4-3sarge3_ia64.deb oldstable/main/binary-ia64/libqt3c102-mt-mysql_3.3.4-3sarge3_ia64.deb oldstable/main/binary-ia64/libqt3c102-odbc_3.3.4-3sarge3_ia64.deb oldstable/main/binary-ia64/libqt3c102-mt-odbc_3.3.4-3sarge3_ia64.deb oldstable/main/binary-ia64/libqt3c102-psql_3.3.4-3sarge3_ia64.deb oldstable/main/binary-ia64/libqt3c102-mt-psql_3.3.4-3sarge3_ia64.deb oldstable/main/binary-ia64/libqt3c102-sqlite_3.3.4-3sarge3_ia64.deb oldstable/main/binary-ia64/libqt3c102-mt-sqlite_3.3.4-3sarge3_ia64.deb oldstable/main/binary-ia64/libqt3-dev_3.3.4-3sarge3_ia64.deb oldstable/main/binary-ia64/libqt3-mt-dev_3.3.4-3sarge3_ia64.deb oldstable/main/binary-ia64/libqt3-headers_3.3.4-3sarge3_ia64.deb oldstable/main/binary-ia64/libqt3-compat-headers_3.3.4-3sarge3_ia64.deb oldstable/main/binary-ia64/qt3-dev-tools_3.3.4-3sarge3_ia64.deb oldstable/main/binary-ia64/qt3-designer_3.3.4-3sarge3_ia64.deb oldstable/main/binary-ia64/qt3-apps-dev_3.3.4-3sarge3_ia64.deb oldstable/main/binary-ia64/qt3-linguist_3.3.4-3sarge3_ia64.deb oldstable/main/binary-ia64/qt3-assistant_3.3.4-3sarge3_ia64.deb oldstable/main/binary-ia64/qt3-qtconfig_3.3.4-3sarge3_ia64.deb oldstable/main/binary-ia64/qt3-dev-tools-embedded_3.3.4-3sarge3_ia64.deb oldstable/main/binary-ia64/qt3-dev-tools-compat_3.3.4-3sarge3_ia64.deb qt-x11-free (3:3.3.4-3sarge3) oldstable-security; urgency=high * Fix format string vulnerabilities. (CVE-2007-3388) * Fix off-by-one in UTF codec. (CVE-2007-4137) oldstable/main/binary-m68k/libqt3c102_3.3.4-3sarge3_m68k.deb oldstable/main/binary-m68k/libqt3c102-mt_3.3.4-3sarge3_m68k.deb oldstable/main/binary-m68k/libqt3c102-mysql_3.3.4-3sarge3_m68k.deb oldstable/main/binary-m68k/libqt3c102-mt-mysql_3.3.4-3sarge3_m68k.deb oldstable/main/binary-m68k/libqt3c102-odbc_3.3.4-3sarge3_m68k.deb oldstable/main/binary-m68k/libqt3c102-mt-odbc_3.3.4-3sarge3_m68k.deb oldstable/main/binary-m68k/libqt3c102-psql_3.3.4-3sarge3_m68k.deb oldstable/main/binary-m68k/libqt3c102-mt-psql_3.3.4-3sarge3_m68k.deb oldstable/main/binary-m68k/libqt3c102-sqlite_3.3.4-3sarge3_m68k.deb oldstable/main/binary-m68k/libqt3c102-mt-sqlite_3.3.4-3sarge3_m68k.deb oldstable/main/binary-m68k/libqt3-dev_3.3.4-3sarge3_m68k.deb oldstable/main/binary-m68k/libqt3-mt-dev_3.3.4-3sarge3_m68k.deb oldstable/main/binary-m68k/libqt3-headers_3.3.4-3sarge3_m68k.deb oldstable/main/binary-m68k/libqt3-compat-headers_3.3.4-3sarge3_m68k.deb oldstable/main/binary-m68k/qt3-dev-tools_3.3.4-3sarge3_m68k.deb oldstable/main/binary-m68k/qt3-designer_3.3.4-3sarge3_m68k.deb oldstable/main/binary-m68k/qt3-apps-dev_3.3.4-3sarge3_m68k.deb oldstable/main/binary-m68k/qt3-linguist_3.3.4-3sarge3_m68k.deb oldstable/main/binary-m68k/qt3-assistant_3.3.4-3sarge3_m68k.deb oldstable/main/binary-m68k/qt3-qtconfig_3.3.4-3sarge3_m68k.deb oldstable/main/binary-m68k/qt3-dev-tools-embedded_3.3.4-3sarge3_m68k.deb oldstable/main/binary-m68k/qt3-dev-tools-compat_3.3.4-3sarge3_m68k.deb qt-x11-free (3:3.3.4-3sarge3) oldstable-security; urgency=high * Fix format string vulnerabilities. (CVE-2007-3388) * Fix off-by-one in UTF codec. (CVE-2007-4137) oldstable/main/binary-mips/libqt3c102_3.3.4-3sarge3_mips.deb oldstable/main/binary-mips/libqt3c102-mt_3.3.4-3sarge3_mips.deb oldstable/main/binary-mips/libqt3c102-mysql_3.3.4-3sarge3_mips.deb oldstable/main/binary-mips/libqt3c102-mt-mysql_3.3.4-3sarge3_mips.deb oldstable/main/binary-mips/libqt3c102-odbc_3.3.4-3sarge3_mips.deb oldstable/main/binary-mips/libqt3c102-mt-odbc_3.3.4-3sarge3_mips.deb oldstable/main/binary-mips/libqt3c102-psql_3.3.4-3sarge3_mips.deb oldstable/main/binary-mips/libqt3c102-mt-psql_3.3.4-3sarge3_mips.deb oldstable/main/binary-mips/libqt3c102-sqlite_3.3.4-3sarge3_mips.deb oldstable/main/binary-mips/libqt3c102-mt-sqlite_3.3.4-3sarge3_mips.deb oldstable/main/binary-mips/libqt3-dev_3.3.4-3sarge3_mips.deb oldstable/main/binary-mips/libqt3-mt-dev_3.3.4-3sarge3_mips.deb oldstable/main/binary-mips/libqt3-headers_3.3.4-3sarge3_mips.deb oldstable/main/binary-mips/libqt3-compat-headers_3.3.4-3sarge3_mips.deb oldstable/main/binary-mips/qt3-dev-tools_3.3.4-3sarge3_mips.deb oldstable/main/binary-mips/qt3-designer_3.3.4-3sarge3_mips.deb oldstable/main/binary-mips/qt3-apps-dev_3.3.4-3sarge3_mips.deb oldstable/main/binary-mips/qt3-linguist_3.3.4-3sarge3_mips.deb oldstable/main/binary-mips/qt3-assistant_3.3.4-3sarge3_mips.deb oldstable/main/binary-mips/qt3-qtconfig_3.3.4-3sarge3_mips.deb oldstable/main/binary-mips/qt3-dev-tools-embedded_3.3.4-3sarge3_mips.deb oldstable/main/binary-mips/qt3-dev-tools-compat_3.3.4-3sarge3_mips.deb qt-x11-free (3:3.3.4-3sarge3) oldstable-security; urgency=high * Fix format string vulnerabilities. (CVE-2007-3388) * Fix off-by-one in UTF codec. (CVE-2007-4137) oldstable/main/binary-mipsel/libqt3c102_3.3.4-3sarge3_mipsel.deb oldstable/main/binary-mipsel/libqt3c102-mt_3.3.4-3sarge3_mipsel.deb oldstable/main/binary-mipsel/libqt3c102-mysql_3.3.4-3sarge3_mipsel.deb oldstable/main/binary-mipsel/libqt3c102-mt-mysql_3.3.4-3sarge3_mipsel.deb oldstable/main/binary-mipsel/libqt3c102-odbc_3.3.4-3sarge3_mipsel.deb oldstable/main/binary-mipsel/libqt3c102-mt-odbc_3.3.4-3sarge3_mipsel.deb oldstable/main/binary-mipsel/libqt3c102-psql_3.3.4-3sarge3_mipsel.deb oldstable/main/binary-mipsel/libqt3c102-mt-psql_3.3.4-3sarge3_mipsel.deb oldstable/main/binary-mipsel/libqt3c102-sqlite_3.3.4-3sarge3_mipsel.deb oldstable/main/binary-mipsel/libqt3c102-mt-sqlite_3.3.4-3sarge3_mipsel.deb oldstable/main/binary-mipsel/libqt3-dev_3.3.4-3sarge3_mipsel.deb oldstable/main/binary-mipsel/libqt3-mt-dev_3.3.4-3sarge3_mipsel.deb oldstable/main/binary-mipsel/libqt3-headers_3.3.4-3sarge3_mipsel.deb oldstable/main/binary-mipsel/libqt3-compat-headers_3.3.4-3sarge3_mipsel.deb oldstable/main/binary-mipsel/qt3-dev-tools_3.3.4-3sarge3_mipsel.deb oldstable/main/binary-mipsel/qt3-designer_3.3.4-3sarge3_mipsel.deb oldstable/main/binary-mipsel/qt3-apps-dev_3.3.4-3sarge3_mipsel.deb oldstable/main/binary-mipsel/qt3-linguist_3.3.4-3sarge3_mipsel.deb oldstable/main/binary-mipsel/qt3-assistant_3.3.4-3sarge3_mipsel.deb oldstable/main/binary-mipsel/qt3-qtconfig_3.3.4-3sarge3_mipsel.deb oldstable/main/binary-mipsel/qt3-dev-tools-embedded_3.3.4-3sarge3_mipsel.deb oldstable/main/binary-mipsel/qt3-dev-tools-compat_3.3.4-3sarge3_mipsel.deb qt-x11-free (3:3.3.4-3sarge3) oldstable-security; urgency=high * Fix format string vulnerabilities. (CVE-2007-3388) * Fix off-by-one in UTF codec. (CVE-2007-4137) oldstable/main/binary-powerpc/libqt3c102_3.3.4-3sarge3_powerpc.deb oldstable/main/binary-powerpc/libqt3c102-mt_3.3.4-3sarge3_powerpc.deb oldstable/main/binary-powerpc/libqt3c102-mysql_3.3.4-3sarge3_powerpc.deb oldstable/main/binary-powerpc/libqt3c102-mt-mysql_3.3.4-3sarge3_powerpc.deb oldstable/main/binary-powerpc/libqt3c102-odbc_3.3.4-3sarge3_powerpc.deb oldstable/main/binary-powerpc/libqt3c102-mt-odbc_3.3.4-3sarge3_powerpc.deb oldstable/main/binary-powerpc/libqt3c102-psql_3.3.4-3sarge3_powerpc.deb oldstable/main/binary-powerpc/libqt3c102-mt-psql_3.3.4-3sarge3_powerpc.deb oldstable/main/binary-powerpc/libqt3c102-sqlite_3.3.4-3sarge3_powerpc.deb oldstable/main/binary-powerpc/libqt3c102-mt-sqlite_3.3.4-3sarge3_powerpc.deb oldstable/main/binary-powerpc/libqt3-dev_3.3.4-3sarge3_powerpc.deb oldstable/main/binary-powerpc/libqt3-mt-dev_3.3.4-3sarge3_powerpc.deb oldstable/main/binary-powerpc/libqt3-headers_3.3.4-3sarge3_powerpc.deb oldstable/main/binary-powerpc/libqt3-compat-headers_3.3.4-3sarge3_powerpc.deb oldstable/main/binary-powerpc/qt3-dev-tools_3.3.4-3sarge3_powerpc.deb oldstable/main/binary-powerpc/qt3-designer_3.3.4-3sarge3_powerpc.deb oldstable/main/binary-powerpc/qt3-apps-dev_3.3.4-3sarge3_powerpc.deb oldstable/main/binary-powerpc/qt3-linguist_3.3.4-3sarge3_powerpc.deb oldstable/main/binary-powerpc/qt3-assistant_3.3.4-3sarge3_powerpc.deb oldstable/main/binary-powerpc/qt3-qtconfig_3.3.4-3sarge3_powerpc.deb oldstable/main/binary-powerpc/qt3-dev-tools-embedded_3.3.4-3sarge3_powerpc.deb oldstable/main/binary-powerpc/qt3-dev-tools-compat_3.3.4-3sarge3_powerpc.deb qt-x11-free (3:3.3.4-3sarge3) oldstable-security; urgency=high * Fix format string vulnerabilities. (CVE-2007-3388) * Fix off-by-one in UTF codec. (CVE-2007-4137) oldstable/main/binary-s390/libqt3c102_3.3.4-3sarge3_s390.deb oldstable/main/binary-s390/libqt3c102-mt_3.3.4-3sarge3_s390.deb oldstable/main/binary-s390/libqt3c102-mysql_3.3.4-3sarge3_s390.deb oldstable/main/binary-s390/libqt3c102-mt-mysql_3.3.4-3sarge3_s390.deb oldstable/main/binary-s390/libqt3c102-odbc_3.3.4-3sarge3_s390.deb oldstable/main/binary-s390/libqt3c102-mt-odbc_3.3.4-3sarge3_s390.deb oldstable/main/binary-s390/libqt3c102-psql_3.3.4-3sarge3_s390.deb oldstable/main/binary-s390/libqt3c102-mt-psql_3.3.4-3sarge3_s390.deb oldstable/main/binary-s390/libqt3c102-sqlite_3.3.4-3sarge3_s390.deb oldstable/main/binary-s390/libqt3c102-mt-sqlite_3.3.4-3sarge3_s390.deb oldstable/main/binary-s390/libqt3-dev_3.3.4-3sarge3_s390.deb oldstable/main/binary-s390/libqt3-mt-dev_3.3.4-3sarge3_s390.deb oldstable/main/binary-s390/libqt3-headers_3.3.4-3sarge3_s390.deb oldstable/main/binary-s390/libqt3-compat-headers_3.3.4-3sarge3_s390.deb oldstable/main/binary-s390/qt3-dev-tools_3.3.4-3sarge3_s390.deb oldstable/main/binary-s390/qt3-designer_3.3.4-3sarge3_s390.deb oldstable/main/binary-s390/qt3-apps-dev_3.3.4-3sarge3_s390.deb oldstable/main/binary-s390/qt3-linguist_3.3.4-3sarge3_s390.deb oldstable/main/binary-s390/qt3-assistant_3.3.4-3sarge3_s390.deb oldstable/main/binary-s390/qt3-qtconfig_3.3.4-3sarge3_s390.deb oldstable/main/binary-s390/qt3-dev-tools-embedded_3.3.4-3sarge3_s390.deb oldstable/main/binary-s390/qt3-dev-tools-compat_3.3.4-3sarge3_s390.deb qt-x11-free (3:3.3.4-3sarge3) oldstable-security; urgency=high * Fix format string vulnerabilities. (CVE-2007-3388) * Fix off-by-one in UTF codec. (CVE-2007-4137) oldstable/main/binary-sparc/libqt3c102_3.3.4-3sarge3_sparc.deb oldstable/main/binary-sparc/libqt3c102-mt_3.3.4-3sarge3_sparc.deb oldstable/main/binary-sparc/libqt3c102-mysql_3.3.4-3sarge3_sparc.deb oldstable/main/binary-sparc/libqt3c102-mt-mysql_3.3.4-3sarge3_sparc.deb oldstable/main/binary-sparc/libqt3c102-odbc_3.3.4-3sarge3_sparc.deb oldstable/main/binary-sparc/libqt3c102-mt-odbc_3.3.4-3sarge3_sparc.deb oldstable/main/binary-sparc/libqt3c102-psql_3.3.4-3sarge3_sparc.deb oldstable/main/binary-sparc/libqt3c102-mt-psql_3.3.4-3sarge3_sparc.deb oldstable/main/binary-sparc/libqt3c102-sqlite_3.3.4-3sarge3_sparc.deb oldstable/main/binary-sparc/libqt3c102-mt-sqlite_3.3.4-3sarge3_sparc.deb oldstable/main/binary-sparc/libqt3-dev_3.3.4-3sarge3_sparc.deb oldstable/main/binary-sparc/libqt3-mt-dev_3.3.4-3sarge3_sparc.deb oldstable/main/binary-sparc/libqt3-headers_3.3.4-3sarge3_sparc.deb oldstable/main/binary-sparc/libqt3-compat-headers_3.3.4-3sarge3_sparc.deb oldstable/main/binary-sparc/qt3-dev-tools_3.3.4-3sarge3_sparc.deb oldstable/main/binary-sparc/qt3-designer_3.3.4-3sarge3_sparc.deb oldstable/main/binary-sparc/qt3-apps-dev_3.3.4-3sarge3_sparc.deb oldstable/main/binary-sparc/qt3-linguist_3.3.4-3sarge3_sparc.deb oldstable/main/binary-sparc/qt3-assistant_3.3.4-3sarge3_sparc.deb oldstable/main/binary-sparc/qt3-qtconfig_3.3.4-3sarge3_sparc.deb oldstable/main/binary-sparc/qt3-dev-tools-embedded_3.3.4-3sarge3_sparc.deb oldstable/main/binary-sparc/qt3-dev-tools-compat_3.3.4-3sarge3_sparc.deb qt-x11-free (3:3.3.4-3sarge3) oldstable-security; urgency=high * Fix format string vulnerabilities. (CVE-2007-3388) * Fix off-by-one in UTF codec. (CVE-2007-4137) oldstable/main/binary-alpha/quagga_0.98.3-7.4_alpha.deb quagga (0.98.3-7.4) oldstable-security; urgency=high * Backport fix for Debian bug #335695, to allow building on Linux 2.6/ARM. oldstable/main/binary-arm/quagga_0.98.3-7.4_arm.deb quagga (0.98.3-7.4) oldstable-security; urgency=high * Backport fix for Debian bug #335695, to allow building on Linux 2.6/ARM. oldstable/main/binary-hppa/quagga_0.98.3-7.4_hppa.deb quagga (0.98.3-7.4) oldstable-security; urgency=high * Backport fix for Debian bug #335695, to allow building on Linux 2.6/ARM. oldstable/main/source/quagga_0.98.3-7.4.dsc oldstable/main/source/quagga_0.98.3-7.4.diff.gz oldstable/main/binary-all/quagga-doc_0.98.3-7.4_all.deb oldstable/main/binary-i386/quagga_0.98.3-7.4_i386.deb quagga (0.98.3-7.4) oldstable-security; urgency=high * Backport fix for Debian bug #335695, to allow building on Linux 2.6/ARM. oldstable/main/binary-ia64/quagga_0.98.3-7.4_ia64.deb quagga (0.98.3-7.4) oldstable-security; urgency=high * Backport fix for Debian bug #335695, to allow building on Linux 2.6/ARM. oldstable/main/binary-m68k/quagga_0.98.3-7.4_m68k.deb quagga (0.98.3-7.4) oldstable-security; urgency=high * Backport fix for Debian bug #335695, to allow building on Linux 2.6/ARM. oldstable/main/binary-mips/quagga_0.98.3-7.4_mips.deb quagga (0.98.3-7.4) oldstable-security; urgency=high * Backport fix for Debian bug #335695, to allow building on Linux 2.6/ARM. oldstable/main/binary-mipsel/quagga_0.98.3-7.4_mipsel.deb quagga (0.98.3-7.4) oldstable-security; urgency=high * Backport fix for Debian bug #335695, to allow building on Linux 2.6/ARM. oldstable/main/binary-powerpc/quagga_0.98.3-7.4_powerpc.deb quagga (0.98.3-7.4) oldstable-security; urgency=high * Backport fix for Debian bug #335695, to allow building on Linux 2.6/ARM. oldstable/main/binary-s390/quagga_0.98.3-7.4_s390.deb quagga (0.98.3-7.4) oldstable-security; urgency=high * Backport fix for Debian bug #335695, to allow building on Linux 2.6/ARM. oldstable/main/binary-sparc/quagga_0.98.3-7.4_sparc.deb quagga (0.98.3-7.4) oldstable-security; urgency=high * Backport fix for Debian bug #335695, to allow building on Linux 2.6/ARM. oldstable/main/binary-alpha/quagga_0.98.3-7.5_alpha.deb quagga (0.98.3-7.5) oldstable-security; urgency=high * SECURITY: A bgpd could be crashed if a peer sent a malformed OPEN message or a malformed COMMUNITY attribute. Only configured peers can do this. The bug is fixed by 96_SECURITY_ubuntu_fix_dos_malformed_community.dpatch. CVE-2007-4826. Closes: 442133 oldstable/main/binary-amd64/quagga_0.98.3-7.5_amd64.deb quagga (0.98.3-7.5) oldstable-security; urgency=high * SECURITY: A bgpd could be crashed if a peer sent a malformed OPEN message or a malformed COMMUNITY attribute. Only configured peers can do this. The bug is fixed by 96_SECURITY_ubuntu_fix_dos_malformed_community.dpatch. CVE-2007-4826. Closes: 442133 oldstable/main/binary-arm/quagga_0.98.3-7.5_arm.deb quagga (0.98.3-7.5) oldstable-security; urgency=high * SECURITY: A bgpd could be crashed if a peer sent a malformed OPEN message or a malformed COMMUNITY attribute. Only configured peers can do this. The bug is fixed by 96_SECURITY_ubuntu_fix_dos_malformed_community.dpatch. CVE-2007-4826. Closes: 442133 oldstable/main/binary-hppa/quagga_0.98.3-7.5_hppa.deb quagga (0.98.3-7.5) oldstable-security; urgency=high * SECURITY: A bgpd could be crashed if a peer sent a malformed OPEN message or a malformed COMMUNITY attribute. Only configured peers can do this. The bug is fixed by 96_SECURITY_ubuntu_fix_dos_malformed_community.dpatch. CVE-2007-4826. Closes: 442133 oldstable/main/source/quagga_0.98.3-7.5.dsc oldstable/main/source/quagga_0.98.3-7.5.diff.gz oldstable/main/binary-all/quagga-doc_0.98.3-7.5_all.deb oldstable/main/binary-i386/quagga_0.98.3-7.5_i386.deb quagga (0.98.3-7.5) oldstable-security; urgency=high * SECURITY: A bgpd could be crashed if a peer sent a malformed OPEN message or a malformed COMMUNITY attribute. Only configured peers can do this. The bug is fixed by 96_SECURITY_ubuntu_fix_dos_malformed_community.dpatch. CVE-2007-4826. Closes: 442133 oldstable/main/binary-ia64/quagga_0.98.3-7.5_ia64.deb quagga (0.98.3-7.5) oldstable-security; urgency=high * SECURITY: A bgpd could be crashed if a peer sent a malformed OPEN message or a malformed COMMUNITY attribute. Only configured peers can do this. The bug is fixed by 96_SECURITY_ubuntu_fix_dos_malformed_community.dpatch. CVE-2007-4826. Closes: 442133 oldstable/main/binary-m68k/quagga_0.98.3-7.5_m68k.deb quagga (0.98.3-7.5) oldstable-security; urgency=high * SECURITY: A bgpd could be crashed if a peer sent a malformed OPEN message or a malformed COMMUNITY attribute. Only configured peers can do this. The bug is fixed by 96_SECURITY_ubuntu_fix_dos_malformed_community.dpatch. CVE-2007-4826. Closes: 442133 oldstable/main/binary-mips/quagga_0.98.3-7.5_mips.deb quagga (0.98.3-7.5) oldstable-security; urgency=high * SECURITY: A bgpd could be crashed if a peer sent a malformed OPEN message or a malformed COMMUNITY attribute. Only configured peers can do this. The bug is fixed by 96_SECURITY_ubuntu_fix_dos_malformed_community.dpatch. CVE-2007-4826. Closes: 442133 oldstable/main/binary-mipsel/quagga_0.98.3-7.5_mipsel.deb quagga (0.98.3-7.5) oldstable-security; urgency=high * SECURITY: A bgpd could be crashed if a peer sent a malformed OPEN message or a malformed COMMUNITY attribute. Only configured peers can do this. The bug is fixed by 96_SECURITY_ubuntu_fix_dos_malformed_community.dpatch. CVE-2007-4826. Closes: 442133 oldstable/main/binary-powerpc/quagga_0.98.3-7.5_powerpc.deb quagga (0.98.3-7.5) oldstable-security; urgency=high * SECURITY: A bgpd could be crashed if a peer sent a malformed OPEN message or a malformed COMMUNITY attribute. Only configured peers can do this. The bug is fixed by 96_SECURITY_ubuntu_fix_dos_malformed_community.dpatch. CVE-2007-4826. Closes: 442133 oldstable/main/binary-s390/quagga_0.98.3-7.5_s390.deb quagga (0.98.3-7.5) oldstable-security; urgency=high * SECURITY: A bgpd could be crashed if a peer sent a malformed OPEN message or a malformed COMMUNITY attribute. Only configured peers can do this. The bug is fixed by 96_SECURITY_ubuntu_fix_dos_malformed_community.dpatch. CVE-2007-4826. Closes: 442133 oldstable/main/binary-sparc/quagga_0.98.3-7.5_sparc.deb quagga (0.98.3-7.5) oldstable-security; urgency=high * SECURITY: A bgpd could be crashed if a peer sent a malformed OPEN message or a malformed COMMUNITY attribute. Only configured peers can do this. The bug is fixed by 96_SECURITY_ubuntu_fix_dos_malformed_community.dpatch. CVE-2007-4826. Closes: 442133 oldstable/main/binary-alpha/rdesktop_1.4.0-2sarge1_alpha.deb rdesktop (1.4.0-2sarge1) oldstable-security; urgency=low * Fix segfault regression caused by libx11-6 security fix. oldstable/main/binary-arm/rdesktop_1.4.0-2sarge1_arm.deb rdesktop (1.4.0-2sarge1) oldstable-security; urgency=low * Fix segfault regression caused by libx11-6 security fix. oldstable/main/binary-hppa/rdesktop_1.4.0-2sarge1_hppa.deb rdesktop (1.4.0-2sarge1) oldstable-security; urgency=low * Fix segfault regression caused by libx11-6 security fix. oldstable/main/source/rdesktop_1.4.0-2sarge1.dsc oldstable/main/source/rdesktop_1.4.0.orig.tar.gz oldstable/main/source/rdesktop_1.4.0-2sarge1.diff.gz oldstable/main/binary-i386/rdesktop_1.4.0-2sarge1_i386.deb rdesktop (1.4.0-2sarge1) oldstable-security; urgency=low * Fix segfault regression caused by libx11-6 security fix. oldstable/main/binary-ia64/rdesktop_1.4.0-2sarge1_ia64.deb rdesktop (1.4.0-2sarge1) oldstable-security; urgency=low * Fix segfault regression caused by libx11-6 security fix. oldstable/main/binary-m68k/rdesktop_1.4.0-2sarge1_m68k.deb rdesktop (1.4.0-2sarge1) oldstable-security; urgency=low * Fix segfault regression caused by libx11-6 security fix. oldstable/main/binary-mips/rdesktop_1.4.0-2sarge1_mips.deb rdesktop (1.4.0-2sarge1) oldstable-security; urgency=low * Fix segfault regression caused by libx11-6 security fix. oldstable/main/binary-mipsel/rdesktop_1.4.0-2sarge1_mipsel.deb rdesktop (1.4.0-2sarge1) oldstable-security; urgency=low * Fix segfault regression caused by libx11-6 security fix. oldstable/main/binary-powerpc/rdesktop_1.4.0-2sarge1_powerpc.deb rdesktop (1.4.0-2sarge1) oldstable-security; urgency=low * Fix segfault regression caused by libx11-6 security fix. oldstable/main/binary-s390/rdesktop_1.4.0-2sarge1_s390.deb rdesktop (1.4.0-2sarge1) oldstable-security; urgency=low * Fix segfault regression caused by libx11-6 security fix. oldstable/main/binary-sparc/rdesktop_1.4.0-2sarge1_sparc.deb rdesktop (1.4.0-2sarge1) oldstable-security; urgency=low * Fix segfault regression caused by libx11-6 security fix. oldstable/main/binary-mips/realtimebattle_1.0.7-5_mips.deb realtimebattle (1.0.7-5) unstable; urgency=low * Move image out of /usr/lib * Make RTB use the icon * Correction of the menu entry * use jikes and not gcj to compile the java files oldstable/main/binary-mipsel/realtimebattle_1.0.7-5_mipsel.deb realtimebattle (1.0.7-5) unstable; urgency=low * Move image out of /usr/lib * Make RTB use the icon * Correction of the menu entry * use jikes and not gcj to compile the java files oldstable/main/rootskel_1.10.3sarge1_alpha.udeb oldstable/main/rootskel-bootfloppy_1.10.3sarge1_alpha.udeb oldstable/main/rootskel-locale_1.10.3sarge1_alpha.udeb rootskel (1.10.3sarge1) oldstable; urgency=low * Update kernel defaults to 2.4.27-3 and 2.6.8-4. oldstable/main/rootskel_1.10.3sarge1_arm.udeb oldstable/main/rootskel-bootfloppy_1.10.3sarge1_arm.udeb oldstable/main/rootskel-locale_1.10.3sarge1_arm.udeb rootskel (1.10.3sarge1) oldstable; urgency=low * Update kernel defaults to 2.4.27-3 and 2.6.8-4. oldstable/main/rootskel_1.10.3sarge1_hppa.udeb oldstable/main/rootskel-bootfloppy_1.10.3sarge1_hppa.udeb oldstable/main/rootskel-locale_1.10.3sarge1_hppa.udeb rootskel (1.10.3sarge1) oldstable; urgency=low * Update kernel defaults to 2.4.27-3 and 2.6.8-4. oldstable/main/source/rootskel_1.10.3sarge1.dsc oldstable/main/source/rootskel_1.10.3sarge1.tar.gz oldstable/main/rootskel_1.10.3sarge1_i386.udeb oldstable/main/rootskel-bootfloppy_1.10.3sarge1_i386.udeb oldstable/main/rootskel-locale_1.10.3sarge1_i386.udeb rootskel (1.10.3sarge1) oldstable; urgency=low * Update kernel defaults to 2.4.27-3 and 2.6.8-4. oldstable/main/rootskel_1.10.3sarge1_ia64.udeb oldstable/main/rootskel-bootfloppy_1.10.3sarge1_ia64.udeb oldstable/main/rootskel-locale_1.10.3sarge1_ia64.udeb rootskel (1.10.3sarge1) oldstable; urgency=low * Update kernel defaults to 2.4.27-3 and 2.6.8-4. oldstable/main/rootskel_1.10.3sarge1_m68k.udeb oldstable/main/rootskel-bootfloppy_1.10.3sarge1_m68k.udeb oldstable/main/rootskel-locale_1.10.3sarge1_m68k.udeb rootskel (1.10.3sarge1) oldstable; urgency=low * Update kernel defaults to 2.4.27-3 and 2.6.8-4. oldstable/main/rootskel_1.10.3sarge1_mips.udeb oldstable/main/rootskel-bootfloppy_1.10.3sarge1_mips.udeb oldstable/main/rootskel-locale_1.10.3sarge1_mips.udeb rootskel (1.10.3sarge1) oldstable; urgency=low * Update kernel defaults to 2.4.27-3 and 2.6.8-4. oldstable/main/rootskel_1.10.3sarge1_mipsel.udeb oldstable/main/rootskel-bootfloppy_1.10.3sarge1_mipsel.udeb oldstable/main/rootskel-locale_1.10.3sarge1_mipsel.udeb rootskel (1.10.3sarge1) oldstable; urgency=low * Update kernel defaults to 2.4.27-3 and 2.6.8-4. oldstable/main/rootskel_1.10.3sarge1_powerpc.udeb oldstable/main/rootskel-bootfloppy_1.10.3sarge1_powerpc.udeb oldstable/main/rootskel-locale_1.10.3sarge1_powerpc.udeb rootskel (1.10.3sarge1) oldstable; urgency=low * Update kernel defaults to 2.4.27-3 and 2.6.8-4. oldstable/main/rootskel_1.10.3sarge1_s390.udeb oldstable/main/rootskel-bootfloppy_1.10.3sarge1_s390.udeb oldstable/main/rootskel-locale_1.10.3sarge1_s390.udeb rootskel (1.10.3sarge1) oldstable; urgency=low * Update kernel defaults to 2.4.27-3 and 2.6.8-4. oldstable/main/rootskel_1.10.3sarge1_sparc.udeb oldstable/main/rootskel-bootfloppy_1.10.3sarge1_sparc.udeb oldstable/main/rootskel-locale_1.10.3sarge1_sparc.udeb rootskel (1.10.3sarge1) oldstable; urgency=low * Update kernel defaults to 2.4.27-3 and 2.6.8-4. oldstable/main/binary-alpha/ruby1.8_1.8.2-7sarge6_alpha.deb oldstable/main/binary-alpha/libruby1.8_1.8.2-7sarge6_alpha.deb oldstable/main/binary-alpha/libruby1.8-dbg_1.8.2-7sarge6_alpha.deb oldstable/main/binary-alpha/ruby1.8-dev_1.8.2-7sarge6_alpha.deb oldstable/main/binary-alpha/libdbm-ruby1.8_1.8.2-7sarge6_alpha.deb oldstable/main/binary-alpha/libgdbm-ruby1.8_1.8.2-7sarge6_alpha.deb oldstable/main/binary-alpha/libreadline-ruby1.8_1.8.2-7sarge6_alpha.deb oldstable/main/binary-alpha/libtcltk-ruby1.8_1.8.2-7sarge6_alpha.deb oldstable/main/binary-alpha/libopenssl-ruby1.8_1.8.2-7sarge6_alpha.deb ruby1.8 (1.8.2-7sarge6) oldstable-security; urgency=low * security fixes for CVE-2007-5162. It is backported r13500, r13501 and r13657 from ruby_1_8 branch. oldstable/main/binary-amd64/ruby1.8_1.8.2-7sarge6_amd64.deb oldstable/main/binary-amd64/libruby1.8_1.8.2-7sarge6_amd64.deb oldstable/main/binary-amd64/libruby1.8-dbg_1.8.2-7sarge6_amd64.deb oldstable/main/binary-amd64/ruby1.8-dev_1.8.2-7sarge6_amd64.deb oldstable/main/binary-amd64/libdbm-ruby1.8_1.8.2-7sarge6_amd64.deb oldstable/main/binary-amd64/libgdbm-ruby1.8_1.8.2-7sarge6_amd64.deb oldstable/main/binary-amd64/libreadline-ruby1.8_1.8.2-7sarge6_amd64.deb oldstable/main/binary-amd64/libtcltk-ruby1.8_1.8.2-7sarge6_amd64.deb oldstable/main/binary-amd64/libopenssl-ruby1.8_1.8.2-7sarge6_amd64.deb ruby1.8 (1.8.2-7sarge6) oldstable-security; urgency=low * security fixes for CVE-2007-5162. It is backported r13500, r13501 and r13657 from ruby_1_8 branch. oldstable/main/binary-arm/ruby1.8_1.8.2-7sarge6_arm.deb oldstable/main/binary-arm/libruby1.8_1.8.2-7sarge6_arm.deb oldstable/main/binary-arm/libruby1.8-dbg_1.8.2-7sarge6_arm.deb oldstable/main/binary-arm/ruby1.8-dev_1.8.2-7sarge6_arm.deb oldstable/main/binary-arm/libdbm-ruby1.8_1.8.2-7sarge6_arm.deb oldstable/main/binary-arm/libgdbm-ruby1.8_1.8.2-7sarge6_arm.deb oldstable/main/binary-arm/libreadline-ruby1.8_1.8.2-7sarge6_arm.deb oldstable/main/binary-arm/libtcltk-ruby1.8_1.8.2-7sarge6_arm.deb oldstable/main/binary-arm/libopenssl-ruby1.8_1.8.2-7sarge6_arm.deb ruby1.8 (1.8.2-7sarge6) oldstable-security; urgency=low * security fixes for CVE-2007-5162. It is backported r13500, r13501 and r13657 from ruby_1_8 branch. oldstable/main/binary-hppa/ruby1.8_1.8.2-7sarge6_hppa.deb oldstable/main/binary-hppa/libruby1.8_1.8.2-7sarge6_hppa.deb oldstable/main/binary-hppa/libruby1.8-dbg_1.8.2-7sarge6_hppa.deb oldstable/main/binary-hppa/ruby1.8-dev_1.8.2-7sarge6_hppa.deb oldstable/main/binary-hppa/libdbm-ruby1.8_1.8.2-7sarge6_hppa.deb oldstable/main/binary-hppa/libgdbm-ruby1.8_1.8.2-7sarge6_hppa.deb oldstable/main/binary-hppa/libreadline-ruby1.8_1.8.2-7sarge6_hppa.deb oldstable/main/binary-hppa/libtcltk-ruby1.8_1.8.2-7sarge6_hppa.deb oldstable/main/binary-hppa/libopenssl-ruby1.8_1.8.2-7sarge6_hppa.deb ruby1.8 (1.8.2-7sarge6) oldstable-security; urgency=low * security fixes for CVE-2007-5162. It is backported r13500, r13501 and r13657 from ruby_1_8 branch. oldstable/main/source/ruby1.8_1.8.2-7sarge6.dsc oldstable/main/source/ruby1.8_1.8.2-7sarge6.diff.gz oldstable/main/binary-i386/ruby1.8_1.8.2-7sarge6_i386.deb oldstable/main/binary-i386/libruby1.8_1.8.2-7sarge6_i386.deb oldstable/main/binary-i386/libruby1.8-dbg_1.8.2-7sarge6_i386.deb oldstable/main/binary-i386/ruby1.8-dev_1.8.2-7sarge6_i386.deb oldstable/main/binary-i386/libdbm-ruby1.8_1.8.2-7sarge6_i386.deb oldstable/main/binary-i386/libgdbm-ruby1.8_1.8.2-7sarge6_i386.deb oldstable/main/binary-i386/libreadline-ruby1.8_1.8.2-7sarge6_i386.deb oldstable/main/binary-i386/libtcltk-ruby1.8_1.8.2-7sarge6_i386.deb oldstable/main/binary-i386/libopenssl-ruby1.8_1.8.2-7sarge6_i386.deb oldstable/main/binary-all/ruby1.8-examples_1.8.2-7sarge6_all.deb oldstable/main/binary-all/ruby1.8-elisp_1.8.2-7sarge6_all.deb oldstable/main/binary-all/ri1.8_1.8.2-7sarge6_all.deb oldstable/main/binary-all/rdoc1.8_1.8.2-7sarge6_all.deb oldstable/main/binary-all/irb1.8_1.8.2-7sarge6_all.deb ruby1.8 (1.8.2-7sarge6) oldstable-security; urgency=low * security fixes for CVE-2007-5162. It is backported r13500, r13501 and r13657 from ruby_1_8 branch. oldstable/main/binary-ia64/ruby1.8_1.8.2-7sarge6_ia64.deb oldstable/main/binary-ia64/libruby1.8_1.8.2-7sarge6_ia64.deb oldstable/main/binary-ia64/libruby1.8-dbg_1.8.2-7sarge6_ia64.deb oldstable/main/binary-ia64/ruby1.8-dev_1.8.2-7sarge6_ia64.deb oldstable/main/binary-ia64/libdbm-ruby1.8_1.8.2-7sarge6_ia64.deb oldstable/main/binary-ia64/libgdbm-ruby1.8_1.8.2-7sarge6_ia64.deb oldstable/main/binary-ia64/libreadline-ruby1.8_1.8.2-7sarge6_ia64.deb oldstable/main/binary-ia64/libtcltk-ruby1.8_1.8.2-7sarge6_ia64.deb oldstable/main/binary-ia64/libopenssl-ruby1.8_1.8.2-7sarge6_ia64.deb ruby1.8 (1.8.2-7sarge6) oldstable-security; urgency=low * security fixes for CVE-2007-5162. It is backported r13500, r13501 and r13657 from ruby_1_8 branch. oldstable/main/binary-m68k/ruby1.8_1.8.2-7sarge6_m68k.deb oldstable/main/binary-m68k/libruby1.8_1.8.2-7sarge6_m68k.deb oldstable/main/binary-m68k/libruby1.8-dbg_1.8.2-7sarge6_m68k.deb oldstable/main/binary-m68k/ruby1.8-dev_1.8.2-7sarge6_m68k.deb oldstable/main/binary-m68k/libdbm-ruby1.8_1.8.2-7sarge6_m68k.deb oldstable/main/binary-m68k/libgdbm-ruby1.8_1.8.2-7sarge6_m68k.deb oldstable/main/binary-m68k/libreadline-ruby1.8_1.8.2-7sarge6_m68k.deb oldstable/main/binary-m68k/libtcltk-ruby1.8_1.8.2-7sarge6_m68k.deb oldstable/main/binary-m68k/libopenssl-ruby1.8_1.8.2-7sarge6_m68k.deb ruby1.8 (1.8.2-7sarge6) oldstable-security; urgency=low * security fixes for CVE-2007-5162. It is backported r13500, r13501 and r13657 from ruby_1_8 branch. oldstable/main/binary-mips/ruby1.8_1.8.2-7sarge6_mips.deb oldstable/main/binary-mips/libruby1.8_1.8.2-7sarge6_mips.deb oldstable/main/binary-mips/libruby1.8-dbg_1.8.2-7sarge6_mips.deb oldstable/main/binary-mips/ruby1.8-dev_1.8.2-7sarge6_mips.deb oldstable/main/binary-mips/libdbm-ruby1.8_1.8.2-7sarge6_mips.deb oldstable/main/binary-mips/libgdbm-ruby1.8_1.8.2-7sarge6_mips.deb oldstable/main/binary-mips/libreadline-ruby1.8_1.8.2-7sarge6_mips.deb oldstable/main/binary-mips/libtcltk-ruby1.8_1.8.2-7sarge6_mips.deb oldstable/main/binary-mips/libopenssl-ruby1.8_1.8.2-7sarge6_mips.deb ruby1.8 (1.8.2-7sarge6) oldstable-security; urgency=low * security fixes for CVE-2007-5162. It is backported r13500, r13501 and r13657 from ruby_1_8 branch. oldstable/main/binary-mipsel/ruby1.8_1.8.2-7sarge6_mipsel.deb oldstable/main/binary-mipsel/libruby1.8_1.8.2-7sarge6_mipsel.deb oldstable/main/binary-mipsel/libruby1.8-dbg_1.8.2-7sarge6_mipsel.deb oldstable/main/binary-mipsel/ruby1.8-dev_1.8.2-7sarge6_mipsel.deb oldstable/main/binary-mipsel/libdbm-ruby1.8_1.8.2-7sarge6_mipsel.deb oldstable/main/binary-mipsel/libgdbm-ruby1.8_1.8.2-7sarge6_mipsel.deb oldstable/main/binary-mipsel/libreadline-ruby1.8_1.8.2-7sarge6_mipsel.deb oldstable/main/binary-mipsel/libtcltk-ruby1.8_1.8.2-7sarge6_mipsel.deb oldstable/main/binary-mipsel/libopenssl-ruby1.8_1.8.2-7sarge6_mipsel.deb ruby1.8 (1.8.2-7sarge6) oldstable-security; urgency=low * security fixes for CVE-2007-5162. It is backported r13500, r13501 and r13657 from ruby_1_8 branch. oldstable/main/binary-powerpc/ruby1.8_1.8.2-7sarge6_powerpc.deb oldstable/main/binary-powerpc/libruby1.8_1.8.2-7sarge6_powerpc.deb oldstable/main/binary-powerpc/libruby1.8-dbg_1.8.2-7sarge6_powerpc.deb oldstable/main/binary-powerpc/ruby1.8-dev_1.8.2-7sarge6_powerpc.deb oldstable/main/binary-powerpc/libdbm-ruby1.8_1.8.2-7sarge6_powerpc.deb oldstable/main/binary-powerpc/libgdbm-ruby1.8_1.8.2-7sarge6_powerpc.deb oldstable/main/binary-powerpc/libreadline-ruby1.8_1.8.2-7sarge6_powerpc.deb oldstable/main/binary-powerpc/libtcltk-ruby1.8_1.8.2-7sarge6_powerpc.deb oldstable/main/binary-powerpc/libopenssl-ruby1.8_1.8.2-7sarge6_powerpc.deb ruby1.8 (1.8.2-7sarge6) oldstable-security; urgency=low * security fixes for CVE-2007-5162. It is backported r13500, r13501 and r13657 from ruby_1_8 branch. oldstable/main/binary-s390/ruby1.8_1.8.2-7sarge6_s390.deb oldstable/main/binary-s390/libruby1.8_1.8.2-7sarge6_s390.deb oldstable/main/binary-s390/libruby1.8-dbg_1.8.2-7sarge6_s390.deb oldstable/main/binary-s390/ruby1.8-dev_1.8.2-7sarge6_s390.deb oldstable/main/binary-s390/libdbm-ruby1.8_1.8.2-7sarge6_s390.deb oldstable/main/binary-s390/libgdbm-ruby1.8_1.8.2-7sarge6_s390.deb oldstable/main/binary-s390/libreadline-ruby1.8_1.8.2-7sarge6_s390.deb oldstable/main/binary-s390/libtcltk-ruby1.8_1.8.2-7sarge6_s390.deb oldstable/main/binary-s390/libopenssl-ruby1.8_1.8.2-7sarge6_s390.deb ruby1.8 (1.8.2-7sarge6) oldstable-security; urgency=low * security fixes for CVE-2007-5162. It is backported r13500, r13501 and r13657 from ruby_1_8 branch. oldstable/main/binary-sparc/ruby1.8_1.8.2-7sarge6_sparc.deb oldstable/main/binary-sparc/libruby1.8_1.8.2-7sarge6_sparc.deb oldstable/main/binary-sparc/libruby1.8-dbg_1.8.2-7sarge6_sparc.deb oldstable/main/binary-sparc/ruby1.8-dev_1.8.2-7sarge6_sparc.deb oldstable/main/binary-sparc/libdbm-ruby1.8_1.8.2-7sarge6_sparc.deb oldstable/main/binary-sparc/libgdbm-ruby1.8_1.8.2-7sarge6_sparc.deb oldstable/main/binary-sparc/libreadline-ruby1.8_1.8.2-7sarge6_sparc.deb oldstable/main/binary-sparc/libtcltk-ruby1.8_1.8.2-7sarge6_sparc.deb oldstable/main/binary-sparc/libopenssl-ruby1.8_1.8.2-7sarge6_sparc.deb ruby1.8 (1.8.2-7sarge6) oldstable-security; urgency=low * security fixes for CVE-2007-5162. It is backported r13500, r13501 and r13657 from ruby_1_8 branch. oldstable/main/binary-alpha/libglib2-ruby_0.12.0-2sarge1_alpha.deb oldstable/main/binary-alpha/libatk1-ruby_0.12.0-2sarge1_alpha.deb oldstable/main/binary-alpha/libpango1-ruby_0.12.0-2sarge1_alpha.deb oldstable/main/binary-alpha/libgdk-pixbuf2-ruby_0.12.0-2sarge1_alpha.deb oldstable/main/binary-alpha/libgtk2-ruby_0.12.0-2sarge1_alpha.deb oldstable/main/binary-alpha/libart2-ruby_0.12.0-2sarge1_alpha.deb oldstable/main/binary-alpha/libgnomecanvas2-ruby_0.12.0-2sarge1_alpha.deb oldstable/main/binary-alpha/libgnome2-ruby_0.12.0-2sarge1_alpha.deb oldstable/main/binary-alpha/libgconf2-ruby_0.12.0-2sarge1_alpha.deb oldstable/main/binary-alpha/libglade2-ruby_0.12.0-2sarge1_alpha.deb oldstable/main/binary-alpha/libgtkhtml2-ruby_0.12.0-2sarge1_alpha.deb oldstable/main/binary-alpha/libgda2-ruby_0.12.0-2sarge1_alpha.deb oldstable/main/binary-alpha/libgtkglext1-ruby_0.12.0-2sarge1_alpha.deb oldstable/main/binary-alpha/libgnomevfs2-ruby_0.12.0-2sarge1_alpha.deb oldstable/main/binary-alpha/libgstreamer0.8-ruby_0.12.0-2sarge1_alpha.deb oldstable/main/binary-alpha/libgtksourceview1-ruby_0.12.0-2sarge1_alpha.deb oldstable/main/binary-alpha/libpanel-applet2-ruby_0.12.0-2sarge1_alpha.deb oldstable/main/binary-alpha/libgnomeprint2-ruby_0.12.0-2sarge1_alpha.deb oldstable/main/binary-alpha/libgnomeprintui2-ruby_0.12.0-2sarge1_alpha.deb oldstable/main/binary-alpha/librsvg2-ruby_0.12.0-2sarge1_alpha.deb ruby-gnome2 (0.12.0-2sarge1) oldstable-security; urgency=low * Non-maintainer upload by the security team * Included patch to fix format string vulnerability in rbgtkmessagedialog.c which might lead to arbitrary code execution Fixes: CVE-2007-6183 oldstable/main/binary-amd64/libglib2-ruby_0.12.0-2sarge1_amd64.deb oldstable/main/binary-amd64/libatk1-ruby_0.12.0-2sarge1_amd64.deb oldstable/main/binary-amd64/libpango1-ruby_0.12.0-2sarge1_amd64.deb oldstable/main/binary-amd64/libgdk-pixbuf2-ruby_0.12.0-2sarge1_amd64.deb oldstable/main/binary-amd64/libgtk2-ruby_0.12.0-2sarge1_amd64.deb oldstable/main/binary-amd64/libart2-ruby_0.12.0-2sarge1_amd64.deb oldstable/main/binary-amd64/libgnomecanvas2-ruby_0.12.0-2sarge1_amd64.deb oldstable/main/binary-amd64/libgnome2-ruby_0.12.0-2sarge1_amd64.deb oldstable/main/binary-amd64/libgconf2-ruby_0.12.0-2sarge1_amd64.deb oldstable/main/binary-amd64/libglade2-ruby_0.12.0-2sarge1_amd64.deb oldstable/main/binary-amd64/libgtkhtml2-ruby_0.12.0-2sarge1_amd64.deb oldstable/main/binary-amd64/libgda2-ruby_0.12.0-2sarge1_amd64.deb oldstable/main/binary-amd64/libgtkglext1-ruby_0.12.0-2sarge1_amd64.deb oldstable/main/binary-amd64/libgnomevfs2-ruby_0.12.0-2sarge1_amd64.deb oldstable/main/binary-amd64/libgstreamer0.8-ruby_0.12.0-2sarge1_amd64.deb oldstable/main/binary-amd64/libgtksourceview1-ruby_0.12.0-2sarge1_amd64.deb oldstable/main/binary-amd64/libpanel-applet2-ruby_0.12.0-2sarge1_amd64.deb oldstable/main/binary-amd64/libgnomeprint2-ruby_0.12.0-2sarge1_amd64.deb oldstable/main/binary-amd64/libgnomeprintui2-ruby_0.12.0-2sarge1_amd64.deb oldstable/main/binary-amd64/librsvg2-ruby_0.12.0-2sarge1_amd64.deb ruby-gnome2 (0.12.0-2sarge1) oldstable-security; urgency=low * Non-maintainer upload by the security team * Included patch to fix format string vulnerability in rbgtkmessagedialog.c which might lead to arbitrary code execution Fixes: CVE-2007-6183 oldstable/main/binary-arm/libglib2-ruby_0.12.0-2sarge1_arm.deb oldstable/main/binary-arm/libatk1-ruby_0.12.0-2sarge1_arm.deb oldstable/main/binary-arm/libpango1-ruby_0.12.0-2sarge1_arm.deb oldstable/main/binary-arm/libgdk-pixbuf2-ruby_0.12.0-2sarge1_arm.deb oldstable/main/binary-arm/libgtk2-ruby_0.12.0-2sarge1_arm.deb oldstable/main/binary-arm/libart2-ruby_0.12.0-2sarge1_arm.deb oldstable/main/binary-arm/libgnomecanvas2-ruby_0.12.0-2sarge1_arm.deb oldstable/main/binary-arm/libgnome2-ruby_0.12.0-2sarge1_arm.deb oldstable/main/binary-arm/libgconf2-ruby_0.12.0-2sarge1_arm.deb oldstable/main/binary-arm/libglade2-ruby_0.12.0-2sarge1_arm.deb oldstable/main/binary-arm/libgtkhtml2-ruby_0.12.0-2sarge1_arm.deb oldstable/main/binary-arm/libgda2-ruby_0.12.0-2sarge1_arm.deb oldstable/main/binary-arm/libgtkglext1-ruby_0.12.0-2sarge1_arm.deb oldstable/main/binary-arm/libgnomevfs2-ruby_0.12.0-2sarge1_arm.deb oldstable/main/binary-arm/libgstreamer0.8-ruby_0.12.0-2sarge1_arm.deb oldstable/main/binary-arm/libgtksourceview1-ruby_0.12.0-2sarge1_arm.deb oldstable/main/binary-arm/libpanel-applet2-ruby_0.12.0-2sarge1_arm.deb oldstable/main/binary-arm/libgnomeprint2-ruby_0.12.0-2sarge1_arm.deb oldstable/main/binary-arm/libgnomeprintui2-ruby_0.12.0-2sarge1_arm.deb oldstable/main/binary-arm/librsvg2-ruby_0.12.0-2sarge1_arm.deb ruby-gnome2 (0.12.0-2sarge1) oldstable-security; urgency=low * Non-maintainer upload by the security team * Included patch to fix format string vulnerability in rbgtkmessagedialog.c which might lead to arbitrary code execution Fixes: CVE-2007-6183 oldstable/main/binary-hppa/libglib2-ruby_0.12.0-2sarge1_hppa.deb oldstable/main/binary-hppa/libatk1-ruby_0.12.0-2sarge1_hppa.deb oldstable/main/binary-hppa/libpango1-ruby_0.12.0-2sarge1_hppa.deb oldstable/main/binary-hppa/libgdk-pixbuf2-ruby_0.12.0-2sarge1_hppa.deb oldstable/main/binary-hppa/libgtk2-ruby_0.12.0-2sarge1_hppa.deb oldstable/main/binary-hppa/libart2-ruby_0.12.0-2sarge1_hppa.deb oldstable/main/binary-hppa/libgnomecanvas2-ruby_0.12.0-2sarge1_hppa.deb oldstable/main/binary-hppa/libgnome2-ruby_0.12.0-2sarge1_hppa.deb oldstable/main/binary-hppa/libgconf2-ruby_0.12.0-2sarge1_hppa.deb oldstable/main/binary-hppa/libglade2-ruby_0.12.0-2sarge1_hppa.deb oldstable/main/binary-hppa/libgtkhtml2-ruby_0.12.0-2sarge1_hppa.deb oldstable/main/binary-hppa/libgda2-ruby_0.12.0-2sarge1_hppa.deb oldstable/main/binary-hppa/libgtkglext1-ruby_0.12.0-2sarge1_hppa.deb oldstable/main/binary-hppa/libgnomevfs2-ruby_0.12.0-2sarge1_hppa.deb oldstable/main/binary-hppa/libgstreamer0.8-ruby_0.12.0-2sarge1_hppa.deb oldstable/main/binary-hppa/libgtksourceview1-ruby_0.12.0-2sarge1_hppa.deb oldstable/main/binary-hppa/libpanel-applet2-ruby_0.12.0-2sarge1_hppa.deb oldstable/main/binary-hppa/libgnomeprint2-ruby_0.12.0-2sarge1_hppa.deb oldstable/main/binary-hppa/libgnomeprintui2-ruby_0.12.0-2sarge1_hppa.deb oldstable/main/binary-hppa/librsvg2-ruby_0.12.0-2sarge1_hppa.deb ruby-gnome2 (0.12.0-2sarge1) oldstable-security; urgency=low * Non-maintainer upload by the security team * Included patch to fix format string vulnerability in rbgtkmessagedialog.c which might lead to arbitrary code execution Fixes: CVE-2007-6183 oldstable/main/source/ruby-gnome2_0.12.0-2sarge1.dsc oldstable/main/source/ruby-gnome2_0.12.0.orig.tar.gz oldstable/main/source/ruby-gnome2_0.12.0-2sarge1.diff.gz oldstable/main/binary-all/ruby-gnome2_0.12.0-2sarge1_all.deb oldstable/main/binary-i386/libglib2-ruby_0.12.0-2sarge1_i386.deb oldstable/main/binary-i386/libatk1-ruby_0.12.0-2sarge1_i386.deb oldstable/main/binary-i386/libpango1-ruby_0.12.0-2sarge1_i386.deb oldstable/main/binary-i386/libgdk-pixbuf2-ruby_0.12.0-2sarge1_i386.deb oldstable/main/binary-i386/libgtk2-ruby_0.12.0-2sarge1_i386.deb oldstable/main/binary-i386/libart2-ruby_0.12.0-2sarge1_i386.deb oldstable/main/binary-i386/libgnomecanvas2-ruby_0.12.0-2sarge1_i386.deb oldstable/main/binary-i386/libgnome2-ruby_0.12.0-2sarge1_i386.deb oldstable/main/binary-i386/libgconf2-ruby_0.12.0-2sarge1_i386.deb oldstable/main/binary-i386/libglade2-ruby_0.12.0-2sarge1_i386.deb oldstable/main/binary-i386/libgtkhtml2-ruby_0.12.0-2sarge1_i386.deb oldstable/main/binary-i386/libgda2-ruby_0.12.0-2sarge1_i386.deb oldstable/main/binary-i386/libgtkglext1-ruby_0.12.0-2sarge1_i386.deb oldstable/main/binary-i386/libgnomevfs2-ruby_0.12.0-2sarge1_i386.deb oldstable/main/binary-i386/libgstreamer0.8-ruby_0.12.0-2sarge1_i386.deb oldstable/main/binary-i386/libgtksourceview1-ruby_0.12.0-2sarge1_i386.deb oldstable/main/binary-i386/libpanel-applet2-ruby_0.12.0-2sarge1_i386.deb oldstable/main/binary-i386/libgnomeprint2-ruby_0.12.0-2sarge1_i386.deb oldstable/main/binary-i386/libgnomeprintui2-ruby_0.12.0-2sarge1_i386.deb oldstable/main/binary-i386/librsvg2-ruby_0.12.0-2sarge1_i386.deb ruby-gnome2 (0.12.0-2sarge1) oldstable-security; urgency=low * Non-maintainer upload by the security team * Included patch to fix format string vulnerability in rbgtkmessagedialog.c which might lead to arbitrary code execution Fixes: CVE-2007-6183 oldstable/main/binary-ia64/libglib2-ruby_0.12.0-2sarge1_ia64.deb oldstable/main/binary-ia64/libatk1-ruby_0.12.0-2sarge1_ia64.deb oldstable/main/binary-ia64/libpango1-ruby_0.12.0-2sarge1_ia64.deb oldstable/main/binary-ia64/libgdk-pixbuf2-ruby_0.12.0-2sarge1_ia64.deb oldstable/main/binary-ia64/libgtk2-ruby_0.12.0-2sarge1_ia64.deb oldstable/main/binary-ia64/libart2-ruby_0.12.0-2sarge1_ia64.deb oldstable/main/binary-ia64/libgnomecanvas2-ruby_0.12.0-2sarge1_ia64.deb oldstable/main/binary-ia64/libgnome2-ruby_0.12.0-2sarge1_ia64.deb oldstable/main/binary-ia64/libgconf2-ruby_0.12.0-2sarge1_ia64.deb oldstable/main/binary-ia64/libglade2-ruby_0.12.0-2sarge1_ia64.deb oldstable/main/binary-ia64/libgtkhtml2-ruby_0.12.0-2sarge1_ia64.deb oldstable/main/binary-ia64/libgda2-ruby_0.12.0-2sarge1_ia64.deb oldstable/main/binary-ia64/libgtkglext1-ruby_0.12.0-2sarge1_ia64.deb oldstable/main/binary-ia64/libgnomevfs2-ruby_0.12.0-2sarge1_ia64.deb oldstable/main/binary-ia64/libgstreamer0.8-ruby_0.12.0-2sarge1_ia64.deb oldstable/main/binary-ia64/libgtksourceview1-ruby_0.12.0-2sarge1_ia64.deb oldstable/main/binary-ia64/libpanel-applet2-ruby_0.12.0-2sarge1_ia64.deb oldstable/main/binary-ia64/libgnomeprint2-ruby_0.12.0-2sarge1_ia64.deb oldstable/main/binary-ia64/libgnomeprintui2-ruby_0.12.0-2sarge1_ia64.deb oldstable/main/binary-ia64/librsvg2-ruby_0.12.0-2sarge1_ia64.deb ruby-gnome2 (0.12.0-2sarge1) oldstable-security; urgency=low * Non-maintainer upload by the security team * Included patch to fix format string vulnerability in rbgtkmessagedialog.c which might lead to arbitrary code execution Fixes: CVE-2007-6183 oldstable/main/binary-m68k/libglib2-ruby_0.12.0-2sarge1_m68k.deb oldstable/main/binary-m68k/libatk1-ruby_0.12.0-2sarge1_m68k.deb oldstable/main/binary-m68k/libpango1-ruby_0.12.0-2sarge1_m68k.deb oldstable/main/binary-m68k/libgdk-pixbuf2-ruby_0.12.0-2sarge1_m68k.deb oldstable/main/binary-m68k/libgtk2-ruby_0.12.0-2sarge1_m68k.deb oldstable/main/binary-m68k/libart2-ruby_0.12.0-2sarge1_m68k.deb oldstable/main/binary-m68k/libgnomecanvas2-ruby_0.12.0-2sarge1_m68k.deb oldstable/main/binary-m68k/libgnome2-ruby_0.12.0-2sarge1_m68k.deb oldstable/main/binary-m68k/libgconf2-ruby_0.12.0-2sarge1_m68k.deb oldstable/main/binary-m68k/libglade2-ruby_0.12.0-2sarge1_m68k.deb oldstable/main/binary-m68k/libgtkhtml2-ruby_0.12.0-2sarge1_m68k.deb oldstable/main/binary-m68k/libgda2-ruby_0.12.0-2sarge1_m68k.deb oldstable/main/binary-m68k/libgtkglext1-ruby_0.12.0-2sarge1_m68k.deb oldstable/main/binary-m68k/libgnomevfs2-ruby_0.12.0-2sarge1_m68k.deb oldstable/main/binary-m68k/libgstreamer0.8-ruby_0.12.0-2sarge1_m68k.deb oldstable/main/binary-m68k/libgtksourceview1-ruby_0.12.0-2sarge1_m68k.deb oldstable/main/binary-m68k/libpanel-applet2-ruby_0.12.0-2sarge1_m68k.deb oldstable/main/binary-m68k/libgnomeprint2-ruby_0.12.0-2sarge1_m68k.deb oldstable/main/binary-m68k/libgnomeprintui2-ruby_0.12.0-2sarge1_m68k.deb oldstable/main/binary-m68k/librsvg2-ruby_0.12.0-2sarge1_m68k.deb ruby-gnome2 (0.12.0-2sarge1) oldstable-security; urgency=low * Non-maintainer upload by the security team * Included patch to fix format string vulnerability in rbgtkmessagedialog.c which might lead to arbitrary code execution Fixes: CVE-2007-6183 oldstable/main/binary-mips/libglib2-ruby_0.12.0-2sarge1_mips.deb oldstable/main/binary-mips/libatk1-ruby_0.12.0-2sarge1_mips.deb oldstable/main/binary-mips/libpango1-ruby_0.12.0-2sarge1_mips.deb oldstable/main/binary-mips/libgdk-pixbuf2-ruby_0.12.0-2sarge1_mips.deb oldstable/main/binary-mips/libgtk2-ruby_0.12.0-2sarge1_mips.deb oldstable/main/binary-mips/libart2-ruby_0.12.0-2sarge1_mips.deb oldstable/main/binary-mips/libgnomecanvas2-ruby_0.12.0-2sarge1_mips.deb oldstable/main/binary-mips/libgnome2-ruby_0.12.0-2sarge1_mips.deb oldstable/main/binary-mips/libgconf2-ruby_0.12.0-2sarge1_mips.deb oldstable/main/binary-mips/libglade2-ruby_0.12.0-2sarge1_mips.deb oldstable/main/binary-mips/libgtkhtml2-ruby_0.12.0-2sarge1_mips.deb oldstable/main/binary-mips/libgda2-ruby_0.12.0-2sarge1_mips.deb oldstable/main/binary-mips/libgtkglext1-ruby_0.12.0-2sarge1_mips.deb oldstable/main/binary-mips/libgnomevfs2-ruby_0.12.0-2sarge1_mips.deb oldstable/main/binary-mips/libgstreamer0.8-ruby_0.12.0-2sarge1_mips.deb oldstable/main/binary-mips/libgtksourceview1-ruby_0.12.0-2sarge1_mips.deb oldstable/main/binary-mips/libpanel-applet2-ruby_0.12.0-2sarge1_mips.deb oldstable/main/binary-mips/libgnomeprint2-ruby_0.12.0-2sarge1_mips.deb oldstable/main/binary-mips/libgnomeprintui2-ruby_0.12.0-2sarge1_mips.deb oldstable/main/binary-mips/librsvg2-ruby_0.12.0-2sarge1_mips.deb ruby-gnome2 (0.12.0-2sarge1) oldstable-security; urgency=low * Non-maintainer upload by the security team * Included patch to fix format string vulnerability in rbgtkmessagedialog.c which might lead to arbitrary code execution Fixes: CVE-2007-6183 oldstable/main/binary-mipsel/libglib2-ruby_0.12.0-2sarge1_mipsel.deb oldstable/main/binary-mipsel/libatk1-ruby_0.12.0-2sarge1_mipsel.deb oldstable/main/binary-mipsel/libpango1-ruby_0.12.0-2sarge1_mipsel.deb oldstable/main/binary-mipsel/libgdk-pixbuf2-ruby_0.12.0-2sarge1_mipsel.deb oldstable/main/binary-mipsel/libgtk2-ruby_0.12.0-2sarge1_mipsel.deb oldstable/main/binary-mipsel/libart2-ruby_0.12.0-2sarge1_mipsel.deb oldstable/main/binary-mipsel/libgnomecanvas2-ruby_0.12.0-2sarge1_mipsel.deb oldstable/main/binary-mipsel/libgnome2-ruby_0.12.0-2sarge1_mipsel.deb oldstable/main/binary-mipsel/libgconf2-ruby_0.12.0-2sarge1_mipsel.deb oldstable/main/binary-mipsel/libglade2-ruby_0.12.0-2sarge1_mipsel.deb oldstable/main/binary-mipsel/libgtkhtml2-ruby_0.12.0-2sarge1_mipsel.deb oldstable/main/binary-mipsel/libgda2-ruby_0.12.0-2sarge1_mipsel.deb oldstable/main/binary-mipsel/libgtkglext1-ruby_0.12.0-2sarge1_mipsel.deb oldstable/main/binary-mipsel/libgnomevfs2-ruby_0.12.0-2sarge1_mipsel.deb oldstable/main/binary-mipsel/libgstreamer0.8-ruby_0.12.0-2sarge1_mipsel.deb oldstable/main/binary-mipsel/libgtksourceview1-ruby_0.12.0-2sarge1_mipsel.deb oldstable/main/binary-mipsel/libpanel-applet2-ruby_0.12.0-2sarge1_mipsel.deb oldstable/main/binary-mipsel/libgnomeprint2-ruby_0.12.0-2sarge1_mipsel.deb oldstable/main/binary-mipsel/libgnomeprintui2-ruby_0.12.0-2sarge1_mipsel.deb oldstable/main/binary-mipsel/librsvg2-ruby_0.12.0-2sarge1_mipsel.deb ruby-gnome2 (0.12.0-2sarge1) oldstable-security; urgency=low * Non-maintainer upload by the security team * Included patch to fix format string vulnerability in rbgtkmessagedialog.c which might lead to arbitrary code execution Fixes: CVE-2007-6183 oldstable/main/binary-powerpc/libglib2-ruby_0.12.0-2sarge1_powerpc.deb oldstable/main/binary-powerpc/libatk1-ruby_0.12.0-2sarge1_powerpc.deb oldstable/main/binary-powerpc/libpango1-ruby_0.12.0-2sarge1_powerpc.deb oldstable/main/binary-powerpc/libgdk-pixbuf2-ruby_0.12.0-2sarge1_powerpc.deb oldstable/main/binary-powerpc/libgtk2-ruby_0.12.0-2sarge1_powerpc.deb oldstable/main/binary-powerpc/libart2-ruby_0.12.0-2sarge1_powerpc.deb oldstable/main/binary-powerpc/libgnomecanvas2-ruby_0.12.0-2sarge1_powerpc.deb oldstable/main/binary-powerpc/libgnome2-ruby_0.12.0-2sarge1_powerpc.deb oldstable/main/binary-powerpc/libgconf2-ruby_0.12.0-2sarge1_powerpc.deb oldstable/main/binary-powerpc/libglade2-ruby_0.12.0-2sarge1_powerpc.deb oldstable/main/binary-powerpc/libgtkhtml2-ruby_0.12.0-2sarge1_powerpc.deb oldstable/main/binary-powerpc/libgda2-ruby_0.12.0-2sarge1_powerpc.deb oldstable/main/binary-powerpc/libgtkglext1-ruby_0.12.0-2sarge1_powerpc.deb oldstable/main/binary-powerpc/libgnomevfs2-ruby_0.12.0-2sarge1_powerpc.deb oldstable/main/binary-powerpc/libgstreamer0.8-ruby_0.12.0-2sarge1_powerpc.deb oldstable/main/binary-powerpc/libgtksourceview1-ruby_0.12.0-2sarge1_powerpc.deb oldstable/main/binary-powerpc/libpanel-applet2-ruby_0.12.0-2sarge1_powerpc.deb oldstable/main/binary-powerpc/libgnomeprint2-ruby_0.12.0-2sarge1_powerpc.deb oldstable/main/binary-powerpc/libgnomeprintui2-ruby_0.12.0-2sarge1_powerpc.deb oldstable/main/binary-powerpc/librsvg2-ruby_0.12.0-2sarge1_powerpc.deb ruby-gnome2 (0.12.0-2sarge1) oldstable-security; urgency=low * Non-maintainer upload by the security team * Included patch to fix format string vulnerability in rbgtkmessagedialog.c which might lead to arbitrary code execution Fixes: CVE-2007-6183 oldstable/main/binary-s390/libglib2-ruby_0.12.0-2sarge1_s390.deb oldstable/main/binary-s390/libatk1-ruby_0.12.0-2sarge1_s390.deb oldstable/main/binary-s390/libpango1-ruby_0.12.0-2sarge1_s390.deb oldstable/main/binary-s390/libgdk-pixbuf2-ruby_0.12.0-2sarge1_s390.deb oldstable/main/binary-s390/libgtk2-ruby_0.12.0-2sarge1_s390.deb oldstable/main/binary-s390/libart2-ruby_0.12.0-2sarge1_s390.deb oldstable/main/binary-s390/libgnomecanvas2-ruby_0.12.0-2sarge1_s390.deb oldstable/main/binary-s390/libgnome2-ruby_0.12.0-2sarge1_s390.deb oldstable/main/binary-s390/libgconf2-ruby_0.12.0-2sarge1_s390.deb oldstable/main/binary-s390/libglade2-ruby_0.12.0-2sarge1_s390.deb oldstable/main/binary-s390/libgtkhtml2-ruby_0.12.0-2sarge1_s390.deb oldstable/main/binary-s390/libgda2-ruby_0.12.0-2sarge1_s390.deb oldstable/main/binary-s390/libgtkglext1-ruby_0.12.0-2sarge1_s390.deb oldstable/main/binary-s390/libgnomevfs2-ruby_0.12.0-2sarge1_s390.deb oldstable/main/binary-s390/libgstreamer0.8-ruby_0.12.0-2sarge1_s390.deb oldstable/main/binary-s390/libgtksourceview1-ruby_0.12.0-2sarge1_s390.deb oldstable/main/binary-s390/libpanel-applet2-ruby_0.12.0-2sarge1_s390.deb oldstable/main/binary-s390/libgnomeprint2-ruby_0.12.0-2sarge1_s390.deb oldstable/main/binary-s390/libgnomeprintui2-ruby_0.12.0-2sarge1_s390.deb oldstable/main/binary-s390/librsvg2-ruby_0.12.0-2sarge1_s390.deb ruby-gnome2 (0.12.0-2sarge1) oldstable-security; urgency=low * Non-maintainer upload by the security team * Included patch to fix format string vulnerability in rbgtkmessagedialog.c which might lead to arbitrary code execution Fixes: CVE-2007-6183 oldstable/main/binary-sparc/libglib2-ruby_0.12.0-2sarge1_sparc.deb oldstable/main/binary-sparc/libatk1-ruby_0.12.0-2sarge1_sparc.deb oldstable/main/binary-sparc/libpango1-ruby_0.12.0-2sarge1_sparc.deb oldstable/main/binary-sparc/libgdk-pixbuf2-ruby_0.12.0-2sarge1_sparc.deb oldstable/main/binary-sparc/libgtk2-ruby_0.12.0-2sarge1_sparc.deb oldstable/main/binary-sparc/libart2-ruby_0.12.0-2sarge1_sparc.deb oldstable/main/binary-sparc/libgnomecanvas2-ruby_0.12.0-2sarge1_sparc.deb oldstable/main/binary-sparc/libgnome2-ruby_0.12.0-2sarge1_sparc.deb oldstable/main/binary-sparc/libgconf2-ruby_0.12.0-2sarge1_sparc.deb oldstable/main/binary-sparc/libglade2-ruby_0.12.0-2sarge1_sparc.deb oldstable/main/binary-sparc/libgtkhtml2-ruby_0.12.0-2sarge1_sparc.deb oldstable/main/binary-sparc/libgda2-ruby_0.12.0-2sarge1_sparc.deb oldstable/main/binary-sparc/libgtkglext1-ruby_0.12.0-2sarge1_sparc.deb oldstable/main/binary-sparc/libgnomevfs2-ruby_0.12.0-2sarge1_sparc.deb oldstable/main/binary-sparc/libgstreamer0.8-ruby_0.12.0-2sarge1_sparc.deb oldstable/main/binary-sparc/libgtksourceview1-ruby_0.12.0-2sarge1_sparc.deb oldstable/main/binary-sparc/libpanel-applet2-ruby_0.12.0-2sarge1_sparc.deb oldstable/main/binary-sparc/libgnomeprint2-ruby_0.12.0-2sarge1_sparc.deb oldstable/main/binary-sparc/libgnomeprintui2-ruby_0.12.0-2sarge1_sparc.deb oldstable/main/binary-sparc/librsvg2-ruby_0.12.0-2sarge1_sparc.deb ruby-gnome2 (0.12.0-2sarge1) oldstable-security; urgency=low * Non-maintainer upload by the security team * Included patch to fix format string vulnerability in rbgtkmessagedialog.c which might lead to arbitrary code execution Fixes: CVE-2007-6183 oldstable/main/binary-alpha/samba_3.0.14a-3sarge10_alpha.deb oldstable/main/binary-alpha/samba-common_3.0.14a-3sarge10_alpha.deb oldstable/main/binary-alpha/smbclient_3.0.14a-3sarge10_alpha.deb oldstable/main/binary-alpha/swat_3.0.14a-3sarge10_alpha.deb oldstable/main/binary-alpha/smbfs_3.0.14a-3sarge10_alpha.deb oldstable/main/binary-alpha/libpam-smbpass_3.0.14a-3sarge10_alpha.deb oldstable/main/binary-alpha/libsmbclient_3.0.14a-3sarge10_alpha.deb oldstable/main/binary-alpha/libsmbclient-dev_3.0.14a-3sarge10_alpha.deb oldstable/main/binary-alpha/winbind_3.0.14a-3sarge10_alpha.deb oldstable/main/binary-alpha/python2.3-samba_3.0.14a-3sarge10_alpha.deb oldstable/main/binary-alpha/samba-dbg_3.0.14a-3sarge10_alpha.deb samba (3.0.14a-3sarge10) oldstable-security; urgency=low * Fix for yet another regression in the fix for CVE-2007-4572 due to one other missed patch in the 3.0.27a diff. Closes: #453050. oldstable/main/binary-amd64/samba_3.0.14a-3sarge10_amd64.deb oldstable/main/binary-amd64/samba-common_3.0.14a-3sarge10_amd64.deb oldstable/main/binary-amd64/smbclient_3.0.14a-3sarge10_amd64.deb oldstable/main/binary-amd64/swat_3.0.14a-3sarge10_amd64.deb oldstable/main/binary-amd64/smbfs_3.0.14a-3sarge10_amd64.deb oldstable/main/binary-amd64/libpam-smbpass_3.0.14a-3sarge10_amd64.deb oldstable/main/binary-amd64/libsmbclient_3.0.14a-3sarge10_amd64.deb oldstable/main/binary-amd64/libsmbclient-dev_3.0.14a-3sarge10_amd64.deb oldstable/main/binary-amd64/winbind_3.0.14a-3sarge10_amd64.deb oldstable/main/binary-amd64/python2.3-samba_3.0.14a-3sarge10_amd64.deb oldstable/main/binary-amd64/samba-dbg_3.0.14a-3sarge10_amd64.deb samba (3.0.14a-3sarge10) oldstable-security; urgency=low * Fix for yet another regression in the fix for CVE-2007-4572 due to one other missed patch in the 3.0.27a diff. Closes: #453050. oldstable/main/binary-arm/samba_3.0.14a-3sarge10_arm.deb oldstable/main/binary-arm/samba-common_3.0.14a-3sarge10_arm.deb oldstable/main/binary-arm/smbclient_3.0.14a-3sarge10_arm.deb oldstable/main/binary-arm/swat_3.0.14a-3sarge10_arm.deb oldstable/main/binary-arm/smbfs_3.0.14a-3sarge10_arm.deb oldstable/main/binary-arm/libpam-smbpass_3.0.14a-3sarge10_arm.deb oldstable/main/binary-arm/libsmbclient_3.0.14a-3sarge10_arm.deb oldstable/main/binary-arm/libsmbclient-dev_3.0.14a-3sarge10_arm.deb oldstable/main/binary-arm/winbind_3.0.14a-3sarge10_arm.deb oldstable/main/binary-arm/python2.3-samba_3.0.14a-3sarge10_arm.deb oldstable/main/binary-arm/samba-dbg_3.0.14a-3sarge10_arm.deb samba (3.0.14a-3sarge10) oldstable-security; urgency=low * Fix for yet another regression in the fix for CVE-2007-4572 due to one other missed patch in the 3.0.27a diff. Closes: #453050. oldstable/main/binary-hppa/samba_3.0.14a-3sarge10_hppa.deb oldstable/main/binary-hppa/samba-common_3.0.14a-3sarge10_hppa.deb oldstable/main/binary-hppa/smbclient_3.0.14a-3sarge10_hppa.deb oldstable/main/binary-hppa/swat_3.0.14a-3sarge10_hppa.deb oldstable/main/binary-hppa/smbfs_3.0.14a-3sarge10_hppa.deb oldstable/main/binary-hppa/libpam-smbpass_3.0.14a-3sarge10_hppa.deb oldstable/main/binary-hppa/libsmbclient_3.0.14a-3sarge10_hppa.deb oldstable/main/binary-hppa/libsmbclient-dev_3.0.14a-3sarge10_hppa.deb oldstable/main/binary-hppa/winbind_3.0.14a-3sarge10_hppa.deb oldstable/main/binary-hppa/python2.3-samba_3.0.14a-3sarge10_hppa.deb oldstable/main/binary-hppa/samba-dbg_3.0.14a-3sarge10_hppa.deb samba (3.0.14a-3sarge10) oldstable-security; urgency=low * Fix for yet another regression in the fix for CVE-2007-4572 due to one other missed patch in the 3.0.27a diff. Closes: #453050. oldstable/main/source/samba_3.0.14a-3sarge10.dsc oldstable/main/source/samba_3.0.14a-3sarge10.diff.gz oldstable/main/binary-all/samba-doc_3.0.14a-3sarge10_all.deb oldstable/main/binary-i386/samba_3.0.14a-3sarge10_i386.deb oldstable/main/binary-i386/samba-common_3.0.14a-3sarge10_i386.deb oldstable/main/binary-i386/smbclient_3.0.14a-3sarge10_i386.deb oldstable/main/binary-i386/swat_3.0.14a-3sarge10_i386.deb oldstable/main/binary-i386/smbfs_3.0.14a-3sarge10_i386.deb oldstable/main/binary-i386/libpam-smbpass_3.0.14a-3sarge10_i386.deb oldstable/main/binary-i386/libsmbclient_3.0.14a-3sarge10_i386.deb oldstable/main/binary-i386/libsmbclient-dev_3.0.14a-3sarge10_i386.deb oldstable/main/binary-i386/winbind_3.0.14a-3sarge10_i386.deb oldstable/main/binary-i386/python2.3-samba_3.0.14a-3sarge10_i386.deb oldstable/main/binary-i386/samba-dbg_3.0.14a-3sarge10_i386.deb samba (3.0.14a-3sarge10) oldstable-security; urgency=low * Fix for yet another regression in the fix for CVE-2007-4572 due to one other missed patch in the 3.0.27a diff. Closes: #453050. oldstable/main/binary-ia64/samba_3.0.14a-3sarge10_ia64.deb oldstable/main/binary-ia64/samba-common_3.0.14a-3sarge10_ia64.deb oldstable/main/binary-ia64/smbclient_3.0.14a-3sarge10_ia64.deb oldstable/main/binary-ia64/swat_3.0.14a-3sarge10_ia64.deb oldstable/main/binary-ia64/smbfs_3.0.14a-3sarge10_ia64.deb oldstable/main/binary-ia64/libpam-smbpass_3.0.14a-3sarge10_ia64.deb oldstable/main/binary-ia64/libsmbclient_3.0.14a-3sarge10_ia64.deb oldstable/main/binary-ia64/libsmbclient-dev_3.0.14a-3sarge10_ia64.deb oldstable/main/binary-ia64/winbind_3.0.14a-3sarge10_ia64.deb oldstable/main/binary-ia64/python2.3-samba_3.0.14a-3sarge10_ia64.deb oldstable/main/binary-ia64/samba-dbg_3.0.14a-3sarge10_ia64.deb samba (3.0.14a-3sarge10) oldstable-security; urgency=low * Fix for yet another regression in the fix for CVE-2007-4572 due to one other missed patch in the 3.0.27a diff. Closes: #453050. oldstable/main/binary-m68k/samba_3.0.14a-3sarge10_m68k.deb oldstable/main/binary-m68k/samba-common_3.0.14a-3sarge10_m68k.deb oldstable/main/binary-m68k/smbclient_3.0.14a-3sarge10_m68k.deb oldstable/main/binary-m68k/swat_3.0.14a-3sarge10_m68k.deb oldstable/main/binary-m68k/smbfs_3.0.14a-3sarge10_m68k.deb oldstable/main/binary-m68k/libpam-smbpass_3.0.14a-3sarge10_m68k.deb oldstable/main/binary-m68k/libsmbclient_3.0.14a-3sarge10_m68k.deb oldstable/main/binary-m68k/libsmbclient-dev_3.0.14a-3sarge10_m68k.deb oldstable/main/binary-m68k/winbind_3.0.14a-3sarge10_m68k.deb oldstable/main/binary-m68k/python2.3-samba_3.0.14a-3sarge10_m68k.deb oldstable/main/binary-m68k/samba-dbg_3.0.14a-3sarge10_m68k.deb samba (3.0.14a-3sarge10) oldstable-security; urgency=low * Fix for yet another regression in the fix for CVE-2007-4572 due to one other missed patch in the 3.0.27a diff. Closes: #453050. oldstable/main/binary-mips/samba_3.0.14a-3sarge10_mips.deb oldstable/main/binary-mips/samba-common_3.0.14a-3sarge10_mips.deb oldstable/main/binary-mips/smbclient_3.0.14a-3sarge10_mips.deb oldstable/main/binary-mips/swat_3.0.14a-3sarge10_mips.deb oldstable/main/binary-mips/smbfs_3.0.14a-3sarge10_mips.deb oldstable/main/binary-mips/libpam-smbpass_3.0.14a-3sarge10_mips.deb oldstable/main/binary-mips/libsmbclient_3.0.14a-3sarge10_mips.deb oldstable/main/binary-mips/libsmbclient-dev_3.0.14a-3sarge10_mips.deb oldstable/main/binary-mips/winbind_3.0.14a-3sarge10_mips.deb oldstable/main/binary-mips/python2.3-samba_3.0.14a-3sarge10_mips.deb oldstable/main/binary-mips/samba-dbg_3.0.14a-3sarge10_mips.deb samba (3.0.14a-3sarge10) oldstable-security; urgency=low * Fix for yet another regression in the fix for CVE-2007-4572 due to one other missed patch in the 3.0.27a diff. Closes: #453050. oldstable/main/binary-mipsel/samba_3.0.14a-3sarge10_mipsel.deb oldstable/main/binary-mipsel/samba-common_3.0.14a-3sarge10_mipsel.deb oldstable/main/binary-mipsel/smbclient_3.0.14a-3sarge10_mipsel.deb oldstable/main/binary-mipsel/swat_3.0.14a-3sarge10_mipsel.deb oldstable/main/binary-mipsel/smbfs_3.0.14a-3sarge10_mipsel.deb oldstable/main/binary-mipsel/libpam-smbpass_3.0.14a-3sarge10_mipsel.deb oldstable/main/binary-mipsel/libsmbclient_3.0.14a-3sarge10_mipsel.deb oldstable/main/binary-mipsel/libsmbclient-dev_3.0.14a-3sarge10_mipsel.deb oldstable/main/binary-mipsel/winbind_3.0.14a-3sarge10_mipsel.deb oldstable/main/binary-mipsel/python2.3-samba_3.0.14a-3sarge10_mipsel.deb oldstable/main/binary-mipsel/samba-dbg_3.0.14a-3sarge10_mipsel.deb samba (3.0.14a-3sarge10) oldstable-security; urgency=low * Fix for yet another regression in the fix for CVE-2007-4572 due to one other missed patch in the 3.0.27a diff. Closes: #453050. oldstable/main/binary-powerpc/samba_3.0.14a-3sarge10_powerpc.deb oldstable/main/binary-powerpc/samba-common_3.0.14a-3sarge10_powerpc.deb oldstable/main/binary-powerpc/smbclient_3.0.14a-3sarge10_powerpc.deb oldstable/main/binary-powerpc/swat_3.0.14a-3sarge10_powerpc.deb oldstable/main/binary-powerpc/smbfs_3.0.14a-3sarge10_powerpc.deb oldstable/main/binary-powerpc/libpam-smbpass_3.0.14a-3sarge10_powerpc.deb oldstable/main/binary-powerpc/libsmbclient_3.0.14a-3sarge10_powerpc.deb oldstable/main/binary-powerpc/libsmbclient-dev_3.0.14a-3sarge10_powerpc.deb oldstable/main/binary-powerpc/winbind_3.0.14a-3sarge10_powerpc.deb oldstable/main/binary-powerpc/python2.3-samba_3.0.14a-3sarge10_powerpc.deb oldstable/main/binary-powerpc/samba-dbg_3.0.14a-3sarge10_powerpc.deb samba (3.0.14a-3sarge10) oldstable-security; urgency=low * Fix for yet another regression in the fix for CVE-2007-4572 due to one other missed patch in the 3.0.27a diff. Closes: #453050. oldstable/main/binary-s390/samba_3.0.14a-3sarge10_s390.deb oldstable/main/binary-s390/samba-common_3.0.14a-3sarge10_s390.deb oldstable/main/binary-s390/smbclient_3.0.14a-3sarge10_s390.deb oldstable/main/binary-s390/swat_3.0.14a-3sarge10_s390.deb oldstable/main/binary-s390/smbfs_3.0.14a-3sarge10_s390.deb oldstable/main/binary-s390/libpam-smbpass_3.0.14a-3sarge10_s390.deb oldstable/main/binary-s390/libsmbclient_3.0.14a-3sarge10_s390.deb oldstable/main/binary-s390/libsmbclient-dev_3.0.14a-3sarge10_s390.deb oldstable/main/binary-s390/winbind_3.0.14a-3sarge10_s390.deb oldstable/main/binary-s390/python2.3-samba_3.0.14a-3sarge10_s390.deb oldstable/main/binary-s390/samba-dbg_3.0.14a-3sarge10_s390.deb samba (3.0.14a-3sarge10) oldstable-security; urgency=low * Fix for yet another regression in the fix for CVE-2007-4572 due to one other missed patch in the 3.0.27a diff. Closes: #453050. oldstable/main/binary-sparc/samba_3.0.14a-3sarge10_sparc.deb oldstable/main/binary-sparc/samba-common_3.0.14a-3sarge10_sparc.deb oldstable/main/binary-sparc/smbclient_3.0.14a-3sarge10_sparc.deb oldstable/main/binary-sparc/swat_3.0.14a-3sarge10_sparc.deb oldstable/main/binary-sparc/smbfs_3.0.14a-3sarge10_sparc.deb oldstable/main/binary-sparc/libpam-smbpass_3.0.14a-3sarge10_sparc.deb oldstable/main/binary-sparc/libsmbclient_3.0.14a-3sarge10_sparc.deb oldstable/main/binary-sparc/libsmbclient-dev_3.0.14a-3sarge10_sparc.deb oldstable/main/binary-sparc/winbind_3.0.14a-3sarge10_sparc.deb oldstable/main/binary-sparc/python2.3-samba_3.0.14a-3sarge10_sparc.deb oldstable/main/binary-sparc/samba-dbg_3.0.14a-3sarge10_sparc.deb samba (3.0.14a-3sarge10) oldstable-security; urgency=low * Fix for yet another regression in the fix for CVE-2007-4572 due to one other missed patch in the 3.0.27a diff. Closes: #453050. oldstable/main/binary-alpha/samba_3.0.14a-3sarge11_alpha.deb oldstable/main/binary-alpha/samba-common_3.0.14a-3sarge11_alpha.deb oldstable/main/binary-alpha/smbclient_3.0.14a-3sarge11_alpha.deb oldstable/main/binary-alpha/swat_3.0.14a-3sarge11_alpha.deb oldstable/main/binary-alpha/smbfs_3.0.14a-3sarge11_alpha.deb oldstable/main/binary-alpha/libpam-smbpass_3.0.14a-3sarge11_alpha.deb oldstable/main/binary-alpha/libsmbclient_3.0.14a-3sarge11_alpha.deb oldstable/main/binary-alpha/libsmbclient-dev_3.0.14a-3sarge11_alpha.deb oldstable/main/binary-alpha/winbind_3.0.14a-3sarge11_alpha.deb oldstable/main/binary-alpha/python2.3-samba_3.0.14a-3sarge11_alpha.deb oldstable/main/binary-alpha/samba-dbg_3.0.14a-3sarge11_alpha.deb samba (3.0.14a-3sarge11) oldstable-security; urgency=high * debian/patches/security-CVE-2007-6015.patch: fix a remote code execution vulnerability when running as a domain logon server (PDC or BDC). (CVE-2007-6015) oldstable/main/binary-amd64/samba_3.0.14a-3sarge11_amd64.deb oldstable/main/binary-amd64/samba-common_3.0.14a-3sarge11_amd64.deb oldstable/main/binary-amd64/smbclient_3.0.14a-3sarge11_amd64.deb oldstable/main/binary-amd64/swat_3.0.14a-3sarge11_amd64.deb oldstable/main/binary-amd64/smbfs_3.0.14a-3sarge11_amd64.deb oldstable/main/binary-amd64/libpam-smbpass_3.0.14a-3sarge11_amd64.deb oldstable/main/binary-amd64/libsmbclient_3.0.14a-3sarge11_amd64.deb oldstable/main/binary-amd64/libsmbclient-dev_3.0.14a-3sarge11_amd64.deb oldstable/main/binary-amd64/winbind_3.0.14a-3sarge11_amd64.deb oldstable/main/binary-amd64/python2.3-samba_3.0.14a-3sarge11_amd64.deb oldstable/main/binary-amd64/samba-dbg_3.0.14a-3sarge11_amd64.deb samba (3.0.14a-3sarge11) oldstable-security; urgency=high * debian/patches/security-CVE-2007-6015.patch: fix a remote code execution vulnerability when running as a domain logon server (PDC or BDC). (CVE-2007-6015) oldstable/main/binary-arm/samba_3.0.14a-3sarge11_arm.deb oldstable/main/binary-arm/samba-common_3.0.14a-3sarge11_arm.deb oldstable/main/binary-arm/smbclient_3.0.14a-3sarge11_arm.deb oldstable/main/binary-arm/swat_3.0.14a-3sarge11_arm.deb oldstable/main/binary-arm/smbfs_3.0.14a-3sarge11_arm.deb oldstable/main/binary-arm/libpam-smbpass_3.0.14a-3sarge11_arm.deb oldstable/main/binary-arm/libsmbclient_3.0.14a-3sarge11_arm.deb oldstable/main/binary-arm/libsmbclient-dev_3.0.14a-3sarge11_arm.deb oldstable/main/binary-arm/winbind_3.0.14a-3sarge11_arm.deb oldstable/main/binary-arm/python2.3-samba_3.0.14a-3sarge11_arm.deb oldstable/main/binary-arm/samba-dbg_3.0.14a-3sarge11_arm.deb samba (3.0.14a-3sarge11) oldstable-security; urgency=high * debian/patches/security-CVE-2007-6015.patch: fix a remote code execution vulnerability when running as a domain logon server (PDC or BDC). (CVE-2007-6015) oldstable/main/binary-hppa/samba_3.0.14a-3sarge11_hppa.deb oldstable/main/binary-hppa/samba-common_3.0.14a-3sarge11_hppa.deb oldstable/main/binary-hppa/smbclient_3.0.14a-3sarge11_hppa.deb oldstable/main/binary-hppa/swat_3.0.14a-3sarge11_hppa.deb oldstable/main/binary-hppa/smbfs_3.0.14a-3sarge11_hppa.deb oldstable/main/binary-hppa/libpam-smbpass_3.0.14a-3sarge11_hppa.deb oldstable/main/binary-hppa/libsmbclient_3.0.14a-3sarge11_hppa.deb oldstable/main/binary-hppa/libsmbclient-dev_3.0.14a-3sarge11_hppa.deb oldstable/main/binary-hppa/winbind_3.0.14a-3sarge11_hppa.deb oldstable/main/binary-hppa/python2.3-samba_3.0.14a-3sarge11_hppa.deb oldstable/main/binary-hppa/samba-dbg_3.0.14a-3sarge11_hppa.deb samba (3.0.14a-3sarge11) oldstable-security; urgency=high * debian/patches/security-CVE-2007-6015.patch: fix a remote code execution vulnerability when running as a domain logon server (PDC or BDC). (CVE-2007-6015) oldstable/main/source/samba_3.0.14a-3sarge11.dsc oldstable/main/source/samba_3.0.14a-3sarge11.diff.gz oldstable/main/binary-all/samba-doc_3.0.14a-3sarge11_all.deb oldstable/main/binary-i386/samba_3.0.14a-3sarge11_i386.deb oldstable/main/binary-i386/samba-common_3.0.14a-3sarge11_i386.deb oldstable/main/binary-i386/smbclient_3.0.14a-3sarge11_i386.deb oldstable/main/binary-i386/swat_3.0.14a-3sarge11_i386.deb oldstable/main/binary-i386/smbfs_3.0.14a-3sarge11_i386.deb oldstable/main/binary-i386/libpam-smbpass_3.0.14a-3sarge11_i386.deb oldstable/main/binary-i386/libsmbclient_3.0.14a-3sarge11_i386.deb oldstable/main/binary-i386/libsmbclient-dev_3.0.14a-3sarge11_i386.deb oldstable/main/binary-i386/winbind_3.0.14a-3sarge11_i386.deb oldstable/main/binary-i386/python2.3-samba_3.0.14a-3sarge11_i386.deb oldstable/main/binary-i386/samba-dbg_3.0.14a-3sarge11_i386.deb samba (3.0.14a-3sarge11) oldstable-security; urgency=high * debian/patches/security-CVE-2007-6015.patch: fix a remote code execution vulnerability when running as a domain logon server (PDC or BDC). (CVE-2007-6015) oldstable/main/binary-ia64/samba_3.0.14a-3sarge11_ia64.deb oldstable/main/binary-ia64/samba-common_3.0.14a-3sarge11_ia64.deb oldstable/main/binary-ia64/smbclient_3.0.14a-3sarge11_ia64.deb oldstable/main/binary-ia64/swat_3.0.14a-3sarge11_ia64.deb oldstable/main/binary-ia64/smbfs_3.0.14a-3sarge11_ia64.deb oldstable/main/binary-ia64/libpam-smbpass_3.0.14a-3sarge11_ia64.deb oldstable/main/binary-ia64/libsmbclient_3.0.14a-3sarge11_ia64.deb oldstable/main/binary-ia64/libsmbclient-dev_3.0.14a-3sarge11_ia64.deb oldstable/main/binary-ia64/winbind_3.0.14a-3sarge11_ia64.deb oldstable/main/binary-ia64/python2.3-samba_3.0.14a-3sarge11_ia64.deb oldstable/main/binary-ia64/samba-dbg_3.0.14a-3sarge11_ia64.deb samba (3.0.14a-3sarge11) oldstable-security; urgency=high * debian/patches/security-CVE-2007-6015.patch: fix a remote code execution vulnerability when running as a domain logon server (PDC or BDC). (CVE-2007-6015) oldstable/main/binary-m68k/samba_3.0.14a-3sarge11_m68k.deb oldstable/main/binary-m68k/samba-common_3.0.14a-3sarge11_m68k.deb oldstable/main/binary-m68k/smbclient_3.0.14a-3sarge11_m68k.deb oldstable/main/binary-m68k/swat_3.0.14a-3sarge11_m68k.deb oldstable/main/binary-m68k/smbfs_3.0.14a-3sarge11_m68k.deb oldstable/main/binary-m68k/libpam-smbpass_3.0.14a-3sarge11_m68k.deb oldstable/main/binary-m68k/libsmbclient_3.0.14a-3sarge11_m68k.deb oldstable/main/binary-m68k/libsmbclient-dev_3.0.14a-3sarge11_m68k.deb oldstable/main/binary-m68k/winbind_3.0.14a-3sarge11_m68k.deb oldstable/main/binary-m68k/python2.3-samba_3.0.14a-3sarge11_m68k.deb oldstable/main/binary-m68k/samba-dbg_3.0.14a-3sarge11_m68k.deb samba (3.0.14a-3sarge11) oldstable-security; urgency=high * debian/patches/security-CVE-2007-6015.patch: fix a remote code execution vulnerability when running as a domain logon server (PDC or BDC). (CVE-2007-6015) oldstable/main/binary-mips/samba_3.0.14a-3sarge11_mips.deb oldstable/main/binary-mips/samba-common_3.0.14a-3sarge11_mips.deb oldstable/main/binary-mips/smbclient_3.0.14a-3sarge11_mips.deb oldstable/main/binary-mips/swat_3.0.14a-3sarge11_mips.deb oldstable/main/binary-mips/smbfs_3.0.14a-3sarge11_mips.deb oldstable/main/binary-mips/libpam-smbpass_3.0.14a-3sarge11_mips.deb oldstable/main/binary-mips/libsmbclient_3.0.14a-3sarge11_mips.deb oldstable/main/binary-mips/libsmbclient-dev_3.0.14a-3sarge11_mips.deb oldstable/main/binary-mips/winbind_3.0.14a-3sarge11_mips.deb oldstable/main/binary-mips/python2.3-samba_3.0.14a-3sarge11_mips.deb oldstable/main/binary-mips/samba-dbg_3.0.14a-3sarge11_mips.deb samba (3.0.14a-3sarge11) oldstable-security; urgency=high * debian/patches/security-CVE-2007-6015.patch: fix a remote code execution vulnerability when running as a domain logon server (PDC or BDC). (CVE-2007-6015) oldstable/main/binary-mipsel/samba_3.0.14a-3sarge11_mipsel.deb oldstable/main/binary-mipsel/samba-common_3.0.14a-3sarge11_mipsel.deb oldstable/main/binary-mipsel/smbclient_3.0.14a-3sarge11_mipsel.deb oldstable/main/binary-mipsel/swat_3.0.14a-3sarge11_mipsel.deb oldstable/main/binary-mipsel/smbfs_3.0.14a-3sarge11_mipsel.deb oldstable/main/binary-mipsel/libpam-smbpass_3.0.14a-3sarge11_mipsel.deb oldstable/main/binary-mipsel/libsmbclient_3.0.14a-3sarge11_mipsel.deb oldstable/main/binary-mipsel/libsmbclient-dev_3.0.14a-3sarge11_mipsel.deb oldstable/main/binary-mipsel/winbind_3.0.14a-3sarge11_mipsel.deb oldstable/main/binary-mipsel/python2.3-samba_3.0.14a-3sarge11_mipsel.deb oldstable/main/binary-mipsel/samba-dbg_3.0.14a-3sarge11_mipsel.deb samba (3.0.14a-3sarge11) oldstable-security; urgency=high * debian/patches/security-CVE-2007-6015.patch: fix a remote code execution vulnerability when running as a domain logon server (PDC or BDC). (CVE-2007-6015) oldstable/main/binary-powerpc/samba_3.0.14a-3sarge11_powerpc.deb oldstable/main/binary-powerpc/samba-common_3.0.14a-3sarge11_powerpc.deb oldstable/main/binary-powerpc/smbclient_3.0.14a-3sarge11_powerpc.deb oldstable/main/binary-powerpc/swat_3.0.14a-3sarge11_powerpc.deb oldstable/main/binary-powerpc/smbfs_3.0.14a-3sarge11_powerpc.deb oldstable/main/binary-powerpc/libpam-smbpass_3.0.14a-3sarge11_powerpc.deb oldstable/main/binary-powerpc/libsmbclient_3.0.14a-3sarge11_powerpc.deb oldstable/main/binary-powerpc/libsmbclient-dev_3.0.14a-3sarge11_powerpc.deb oldstable/main/binary-powerpc/winbind_3.0.14a-3sarge11_powerpc.deb oldstable/main/binary-powerpc/python2.3-samba_3.0.14a-3sarge11_powerpc.deb oldstable/main/binary-powerpc/samba-dbg_3.0.14a-3sarge11_powerpc.deb samba (3.0.14a-3sarge11) oldstable-security; urgency=high * debian/patches/security-CVE-2007-6015.patch: fix a remote code execution vulnerability when running as a domain logon server (PDC or BDC). (CVE-2007-6015) oldstable/main/binary-s390/samba_3.0.14a-3sarge11_s390.deb oldstable/main/binary-s390/samba-common_3.0.14a-3sarge11_s390.deb oldstable/main/binary-s390/smbclient_3.0.14a-3sarge11_s390.deb oldstable/main/binary-s390/swat_3.0.14a-3sarge11_s390.deb oldstable/main/binary-s390/smbfs_3.0.14a-3sarge11_s390.deb oldstable/main/binary-s390/libpam-smbpass_3.0.14a-3sarge11_s390.deb oldstable/main/binary-s390/libsmbclient_3.0.14a-3sarge11_s390.deb oldstable/main/binary-s390/libsmbclient-dev_3.0.14a-3sarge11_s390.deb oldstable/main/binary-s390/winbind_3.0.14a-3sarge11_s390.deb oldstable/main/binary-s390/python2.3-samba_3.0.14a-3sarge11_s390.deb oldstable/main/binary-s390/samba-dbg_3.0.14a-3sarge11_s390.deb samba (3.0.14a-3sarge11) oldstable-security; urgency=high * debian/patches/security-CVE-2007-6015.patch: fix a remote code execution vulnerability when running as a domain logon server (PDC or BDC). (CVE-2007-6015) oldstable/main/binary-sparc/samba_3.0.14a-3sarge11_sparc.deb oldstable/main/binary-sparc/samba-common_3.0.14a-3sarge11_sparc.deb oldstable/main/binary-sparc/smbclient_3.0.14a-3sarge11_sparc.deb oldstable/main/binary-sparc/swat_3.0.14a-3sarge11_sparc.deb oldstable/main/binary-sparc/smbfs_3.0.14a-3sarge11_sparc.deb oldstable/main/binary-sparc/libpam-smbpass_3.0.14a-3sarge11_sparc.deb oldstable/main/binary-sparc/libsmbclient_3.0.14a-3sarge11_sparc.deb oldstable/main/binary-sparc/libsmbclient-dev_3.0.14a-3sarge11_sparc.deb oldstable/main/binary-sparc/winbind_3.0.14a-3sarge11_sparc.deb oldstable/main/binary-sparc/python2.3-samba_3.0.14a-3sarge11_sparc.deb oldstable/main/binary-sparc/samba-dbg_3.0.14a-3sarge11_sparc.deb samba (3.0.14a-3sarge11) oldstable-security; urgency=high * debian/patches/security-CVE-2007-6015.patch: fix a remote code execution vulnerability when running as a domain logon server (PDC or BDC). (CVE-2007-6015) oldstable/main/binary-alpha/samba_3.0.14a-3sarge6_alpha.deb oldstable/main/binary-alpha/samba-common_3.0.14a-3sarge6_alpha.deb oldstable/main/binary-alpha/smbclient_3.0.14a-3sarge6_alpha.deb oldstable/main/binary-alpha/swat_3.0.14a-3sarge6_alpha.deb oldstable/main/binary-alpha/smbfs_3.0.14a-3sarge6_alpha.deb oldstable/main/binary-alpha/libpam-smbpass_3.0.14a-3sarge6_alpha.deb oldstable/main/binary-alpha/libsmbclient_3.0.14a-3sarge6_alpha.deb oldstable/main/binary-alpha/libsmbclient-dev_3.0.14a-3sarge6_alpha.deb oldstable/main/binary-alpha/winbind_3.0.14a-3sarge6_alpha.deb oldstable/main/binary-alpha/python2.3-samba_3.0.14a-3sarge6_alpha.deb oldstable/main/binary-alpha/samba-dbg_3.0.14a-3sarge6_alpha.deb samba (3.0.14a-3sarge6) oldstable-security; urgency=high * Fix typo in patch for CVE-2007-2447 that would cause segfaults when performing string comparisons. oldstable/main/binary-arm/samba_3.0.14a-3sarge6_arm.deb oldstable/main/binary-arm/samba-common_3.0.14a-3sarge6_arm.deb oldstable/main/binary-arm/smbclient_3.0.14a-3sarge6_arm.deb oldstable/main/binary-arm/swat_3.0.14a-3sarge6_arm.deb oldstable/main/binary-arm/smbfs_3.0.14a-3sarge6_arm.deb oldstable/main/binary-arm/libpam-smbpass_3.0.14a-3sarge6_arm.deb oldstable/main/binary-arm/libsmbclient_3.0.14a-3sarge6_arm.deb oldstable/main/binary-arm/libsmbclient-dev_3.0.14a-3sarge6_arm.deb oldstable/main/binary-arm/winbind_3.0.14a-3sarge6_arm.deb oldstable/main/binary-arm/python2.3-samba_3.0.14a-3sarge6_arm.deb oldstable/main/binary-arm/samba-dbg_3.0.14a-3sarge6_arm.deb samba (3.0.14a-3sarge6) oldstable-security; urgency=high * Fix typo in patch for CVE-2007-2447 that would cause segfaults when performing string comparisons. oldstable/main/binary-hppa/samba_3.0.14a-3sarge6_hppa.deb oldstable/main/binary-hppa/samba-common_3.0.14a-3sarge6_hppa.deb oldstable/main/binary-hppa/smbclient_3.0.14a-3sarge6_hppa.deb oldstable/main/binary-hppa/swat_3.0.14a-3sarge6_hppa.deb oldstable/main/binary-hppa/smbfs_3.0.14a-3sarge6_hppa.deb oldstable/main/binary-hppa/libpam-smbpass_3.0.14a-3sarge6_hppa.deb oldstable/main/binary-hppa/libsmbclient_3.0.14a-3sarge6_hppa.deb oldstable/main/binary-hppa/libsmbclient-dev_3.0.14a-3sarge6_hppa.deb oldstable/main/binary-hppa/winbind_3.0.14a-3sarge6_hppa.deb oldstable/main/binary-hppa/python2.3-samba_3.0.14a-3sarge6_hppa.deb oldstable/main/binary-hppa/samba-dbg_3.0.14a-3sarge6_hppa.deb samba (3.0.14a-3sarge6) oldstable-security; urgency=high * Fix typo in patch for CVE-2007-2447 that would cause segfaults when performing string comparisons. oldstable/main/source/samba_3.0.14a-3sarge6.dsc oldstable/main/source/samba_3.0.14a-3sarge6.diff.gz oldstable/main/binary-all/samba-doc_3.0.14a-3sarge6_all.deb oldstable/main/binary-i386/samba_3.0.14a-3sarge6_i386.deb oldstable/main/binary-i386/samba-common_3.0.14a-3sarge6_i386.deb oldstable/main/binary-i386/smbclient_3.0.14a-3sarge6_i386.deb oldstable/main/binary-i386/swat_3.0.14a-3sarge6_i386.deb oldstable/main/binary-i386/smbfs_3.0.14a-3sarge6_i386.deb oldstable/main/binary-i386/libpam-smbpass_3.0.14a-3sarge6_i386.deb oldstable/main/binary-i386/libsmbclient_3.0.14a-3sarge6_i386.deb oldstable/main/binary-i386/libsmbclient-dev_3.0.14a-3sarge6_i386.deb oldstable/main/binary-i386/winbind_3.0.14a-3sarge6_i386.deb oldstable/main/binary-i386/python2.3-samba_3.0.14a-3sarge6_i386.deb oldstable/main/binary-i386/samba-dbg_3.0.14a-3sarge6_i386.deb samba (3.0.14a-3sarge6) oldstable-security; urgency=high * Fix typo in patch for CVE-2007-2447 that would cause segfaults when performing string comparisons. oldstable/main/binary-ia64/samba_3.0.14a-3sarge6_ia64.deb oldstable/main/binary-ia64/samba-common_3.0.14a-3sarge6_ia64.deb oldstable/main/binary-ia64/smbclient_3.0.14a-3sarge6_ia64.deb oldstable/main/binary-ia64/swat_3.0.14a-3sarge6_ia64.deb oldstable/main/binary-ia64/smbfs_3.0.14a-3sarge6_ia64.deb oldstable/main/binary-ia64/libpam-smbpass_3.0.14a-3sarge6_ia64.deb oldstable/main/binary-ia64/libsmbclient_3.0.14a-3sarge6_ia64.deb oldstable/main/binary-ia64/libsmbclient-dev_3.0.14a-3sarge6_ia64.deb oldstable/main/binary-ia64/winbind_3.0.14a-3sarge6_ia64.deb oldstable/main/binary-ia64/python2.3-samba_3.0.14a-3sarge6_ia64.deb oldstable/main/binary-ia64/samba-dbg_3.0.14a-3sarge6_ia64.deb samba (3.0.14a-3sarge6) oldstable-security; urgency=high * Fix typo in patch for CVE-2007-2447 that would cause segfaults when performing string comparisons. oldstable/main/binary-m68k/samba_3.0.14a-3sarge6_m68k.deb oldstable/main/binary-m68k/samba-common_3.0.14a-3sarge6_m68k.deb oldstable/main/binary-m68k/smbclient_3.0.14a-3sarge6_m68k.deb oldstable/main/binary-m68k/swat_3.0.14a-3sarge6_m68k.deb oldstable/main/binary-m68k/smbfs_3.0.14a-3sarge6_m68k.deb oldstable/main/binary-m68k/libpam-smbpass_3.0.14a-3sarge6_m68k.deb oldstable/main/binary-m68k/libsmbclient_3.0.14a-3sarge6_m68k.deb oldstable/main/binary-m68k/libsmbclient-dev_3.0.14a-3sarge6_m68k.deb oldstable/main/binary-m68k/winbind_3.0.14a-3sarge6_m68k.deb oldstable/main/binary-m68k/python2.3-samba_3.0.14a-3sarge6_m68k.deb oldstable/main/binary-m68k/samba-dbg_3.0.14a-3sarge6_m68k.deb samba (3.0.14a-3sarge6) oldstable-security; urgency=high * Fix typo in patch for CVE-2007-2447 that would cause segfaults when performing string comparisons. oldstable/main/binary-mips/samba_3.0.14a-3sarge6_mips.deb oldstable/main/binary-mips/samba-common_3.0.14a-3sarge6_mips.deb oldstable/main/binary-mips/smbclient_3.0.14a-3sarge6_mips.deb oldstable/main/binary-mips/swat_3.0.14a-3sarge6_mips.deb oldstable/main/binary-mips/smbfs_3.0.14a-3sarge6_mips.deb oldstable/main/binary-mips/libpam-smbpass_3.0.14a-3sarge6_mips.deb oldstable/main/binary-mips/libsmbclient_3.0.14a-3sarge6_mips.deb oldstable/main/binary-mips/libsmbclient-dev_3.0.14a-3sarge6_mips.deb oldstable/main/binary-mips/winbind_3.0.14a-3sarge6_mips.deb oldstable/main/binary-mips/python2.3-samba_3.0.14a-3sarge6_mips.deb oldstable/main/binary-mips/samba-dbg_3.0.14a-3sarge6_mips.deb samba (3.0.14a-3sarge6) oldstable-security; urgency=high * Fix typo in patch for CVE-2007-2447 that would cause segfaults when performing string comparisons. oldstable/main/binary-mipsel/samba_3.0.14a-3sarge6_mipsel.deb oldstable/main/binary-mipsel/samba-common_3.0.14a-3sarge6_mipsel.deb oldstable/main/binary-mipsel/smbclient_3.0.14a-3sarge6_mipsel.deb oldstable/main/binary-mipsel/swat_3.0.14a-3sarge6_mipsel.deb oldstable/main/binary-mipsel/smbfs_3.0.14a-3sarge6_mipsel.deb oldstable/main/binary-mipsel/libpam-smbpass_3.0.14a-3sarge6_mipsel.deb oldstable/main/binary-mipsel/libsmbclient_3.0.14a-3sarge6_mipsel.deb oldstable/main/binary-mipsel/libsmbclient-dev_3.0.14a-3sarge6_mipsel.deb oldstable/main/binary-mipsel/winbind_3.0.14a-3sarge6_mipsel.deb oldstable/main/binary-mipsel/python2.3-samba_3.0.14a-3sarge6_mipsel.deb oldstable/main/binary-mipsel/samba-dbg_3.0.14a-3sarge6_mipsel.deb samba (3.0.14a-3sarge6) oldstable-security; urgency=high * Fix typo in patch for CVE-2007-2447 that would cause segfaults when performing string comparisons. oldstable/main/binary-powerpc/samba_3.0.14a-3sarge6_powerpc.deb oldstable/main/binary-powerpc/samba-common_3.0.14a-3sarge6_powerpc.deb oldstable/main/binary-powerpc/smbclient_3.0.14a-3sarge6_powerpc.deb oldstable/main/binary-powerpc/swat_3.0.14a-3sarge6_powerpc.deb oldstable/main/binary-powerpc/smbfs_3.0.14a-3sarge6_powerpc.deb oldstable/main/binary-powerpc/libpam-smbpass_3.0.14a-3sarge6_powerpc.deb oldstable/main/binary-powerpc/libsmbclient_3.0.14a-3sarge6_powerpc.deb oldstable/main/binary-powerpc/libsmbclient-dev_3.0.14a-3sarge6_powerpc.deb oldstable/main/binary-powerpc/winbind_3.0.14a-3sarge6_powerpc.deb oldstable/main/binary-powerpc/python2.3-samba_3.0.14a-3sarge6_powerpc.deb oldstable/main/binary-powerpc/samba-dbg_3.0.14a-3sarge6_powerpc.deb samba (3.0.14a-3sarge6) oldstable-security; urgency=high * Fix typo in patch for CVE-2007-2447 that would cause segfaults when performing string comparisons. oldstable/main/binary-s390/samba_3.0.14a-3sarge6_s390.deb oldstable/main/binary-s390/samba-common_3.0.14a-3sarge6_s390.deb oldstable/main/binary-s390/smbclient_3.0.14a-3sarge6_s390.deb oldstable/main/binary-s390/swat_3.0.14a-3sarge6_s390.deb oldstable/main/binary-s390/smbfs_3.0.14a-3sarge6_s390.deb oldstable/main/binary-s390/libpam-smbpass_3.0.14a-3sarge6_s390.deb oldstable/main/binary-s390/libsmbclient_3.0.14a-3sarge6_s390.deb oldstable/main/binary-s390/libsmbclient-dev_3.0.14a-3sarge6_s390.deb oldstable/main/binary-s390/winbind_3.0.14a-3sarge6_s390.deb oldstable/main/binary-s390/python2.3-samba_3.0.14a-3sarge6_s390.deb oldstable/main/binary-s390/samba-dbg_3.0.14a-3sarge6_s390.deb samba (3.0.14a-3sarge6) oldstable-security; urgency=high * Fix typo in patch for CVE-2007-2447 that would cause segfaults when performing string comparisons. oldstable/main/binary-sparc/samba_3.0.14a-3sarge6_sparc.deb oldstable/main/binary-sparc/samba-common_3.0.14a-3sarge6_sparc.deb oldstable/main/binary-sparc/smbclient_3.0.14a-3sarge6_sparc.deb oldstable/main/binary-sparc/swat_3.0.14a-3sarge6_sparc.deb oldstable/main/binary-sparc/smbfs_3.0.14a-3sarge6_sparc.deb oldstable/main/binary-sparc/libpam-smbpass_3.0.14a-3sarge6_sparc.deb oldstable/main/binary-sparc/libsmbclient_3.0.14a-3sarge6_sparc.deb oldstable/main/binary-sparc/libsmbclient-dev_3.0.14a-3sarge6_sparc.deb oldstable/main/binary-sparc/winbind_3.0.14a-3sarge6_sparc.deb oldstable/main/binary-sparc/python2.3-samba_3.0.14a-3sarge6_sparc.deb oldstable/main/binary-sparc/samba-dbg_3.0.14a-3sarge6_sparc.deb samba (3.0.14a-3sarge6) oldstable-security; urgency=high * Fix typo in patch for CVE-2007-2447 that would cause segfaults when performing string comparisons. oldstable/main/binary-alpha/samba_3.0.14a-3sarge7_alpha.deb oldstable/main/binary-alpha/samba-common_3.0.14a-3sarge7_alpha.deb oldstable/main/binary-alpha/smbclient_3.0.14a-3sarge7_alpha.deb oldstable/main/binary-alpha/swat_3.0.14a-3sarge7_alpha.deb oldstable/main/binary-alpha/smbfs_3.0.14a-3sarge7_alpha.deb oldstable/main/binary-alpha/libpam-smbpass_3.0.14a-3sarge7_alpha.deb oldstable/main/binary-alpha/libsmbclient_3.0.14a-3sarge7_alpha.deb oldstable/main/binary-alpha/libsmbclient-dev_3.0.14a-3sarge7_alpha.deb oldstable/main/binary-alpha/winbind_3.0.14a-3sarge7_alpha.deb oldstable/main/binary-alpha/python2.3-samba_3.0.14a-3sarge7_alpha.deb oldstable/main/binary-alpha/samba-dbg_3.0.14a-3sarge7_alpha.deb samba (3.0.14a-3sarge7) oldstable-security; urgency=low * Fix a remote code execution vulnerability when running nmbd as a WINS server. (CVE-2007-5398) * Fix a buffer overflow in nmbd when running as a domain controller during the processing GETDC logon server requests. (CVE-2007-4572) oldstable/main/binary-amd64/samba_3.0.14a-3sarge7_amd64.deb oldstable/main/binary-amd64/samba-common_3.0.14a-3sarge7_amd64.deb oldstable/main/binary-amd64/smbclient_3.0.14a-3sarge7_amd64.deb oldstable/main/binary-amd64/swat_3.0.14a-3sarge7_amd64.deb oldstable/main/binary-amd64/smbfs_3.0.14a-3sarge7_amd64.deb oldstable/main/binary-amd64/libpam-smbpass_3.0.14a-3sarge7_amd64.deb oldstable/main/binary-amd64/libsmbclient_3.0.14a-3sarge7_amd64.deb oldstable/main/binary-amd64/libsmbclient-dev_3.0.14a-3sarge7_amd64.deb oldstable/main/binary-amd64/winbind_3.0.14a-3sarge7_amd64.deb oldstable/main/binary-amd64/python2.3-samba_3.0.14a-3sarge7_amd64.deb oldstable/main/binary-amd64/samba-dbg_3.0.14a-3sarge7_amd64.deb samba (3.0.14a-3sarge7) oldstable-security; urgency=low * Fix a remote code execution vulnerability when running nmbd as a WINS server. (CVE-2007-5398) * Fix a buffer overflow in nmbd when running as a domain controller during the processing GETDC logon server requests. (CVE-2007-4572) oldstable/main/binary-arm/samba_3.0.14a-3sarge7_arm.deb oldstable/main/binary-arm/samba-common_3.0.14a-3sarge7_arm.deb oldstable/main/binary-arm/smbclient_3.0.14a-3sarge7_arm.deb oldstable/main/binary-arm/swat_3.0.14a-3sarge7_arm.deb oldstable/main/binary-arm/smbfs_3.0.14a-3sarge7_arm.deb oldstable/main/binary-arm/libpam-smbpass_3.0.14a-3sarge7_arm.deb oldstable/main/binary-arm/libsmbclient_3.0.14a-3sarge7_arm.deb oldstable/main/binary-arm/libsmbclient-dev_3.0.14a-3sarge7_arm.deb oldstable/main/binary-arm/winbind_3.0.14a-3sarge7_arm.deb oldstable/main/binary-arm/python2.3-samba_3.0.14a-3sarge7_arm.deb oldstable/main/binary-arm/samba-dbg_3.0.14a-3sarge7_arm.deb samba (3.0.14a-3sarge7) oldstable-security; urgency=low * Fix a remote code execution vulnerability when running nmbd as a WINS server. (CVE-2007-5398) * Fix a buffer overflow in nmbd when running as a domain controller during the processing GETDC logon server requests. (CVE-2007-4572) oldstable/main/binary-hppa/samba_3.0.14a-3sarge7_hppa.deb oldstable/main/binary-hppa/samba-common_3.0.14a-3sarge7_hppa.deb oldstable/main/binary-hppa/smbclient_3.0.14a-3sarge7_hppa.deb oldstable/main/binary-hppa/swat_3.0.14a-3sarge7_hppa.deb oldstable/main/binary-hppa/smbfs_3.0.14a-3sarge7_hppa.deb oldstable/main/binary-hppa/libpam-smbpass_3.0.14a-3sarge7_hppa.deb oldstable/main/binary-hppa/libsmbclient_3.0.14a-3sarge7_hppa.deb oldstable/main/binary-hppa/libsmbclient-dev_3.0.14a-3sarge7_hppa.deb oldstable/main/binary-hppa/winbind_3.0.14a-3sarge7_hppa.deb oldstable/main/binary-hppa/python2.3-samba_3.0.14a-3sarge7_hppa.deb oldstable/main/binary-hppa/samba-dbg_3.0.14a-3sarge7_hppa.deb samba (3.0.14a-3sarge7) oldstable-security; urgency=low * Fix a remote code execution vulnerability when running nmbd as a WINS server. (CVE-2007-5398) * Fix a buffer overflow in nmbd when running as a domain controller during the processing GETDC logon server requests. (CVE-2007-4572) oldstable/main/source/samba_3.0.14a-3sarge7.dsc oldstable/main/source/samba_3.0.14a-3sarge7.diff.gz oldstable/main/binary-all/samba-doc_3.0.14a-3sarge7_all.deb oldstable/main/binary-i386/samba_3.0.14a-3sarge7_i386.deb oldstable/main/binary-i386/samba-common_3.0.14a-3sarge7_i386.deb oldstable/main/binary-i386/smbclient_3.0.14a-3sarge7_i386.deb oldstable/main/binary-i386/swat_3.0.14a-3sarge7_i386.deb oldstable/main/binary-i386/smbfs_3.0.14a-3sarge7_i386.deb oldstable/main/binary-i386/libpam-smbpass_3.0.14a-3sarge7_i386.deb oldstable/main/binary-i386/libsmbclient_3.0.14a-3sarge7_i386.deb oldstable/main/binary-i386/libsmbclient-dev_3.0.14a-3sarge7_i386.deb oldstable/main/binary-i386/winbind_3.0.14a-3sarge7_i386.deb oldstable/main/binary-i386/python2.3-samba_3.0.14a-3sarge7_i386.deb oldstable/main/binary-i386/samba-dbg_3.0.14a-3sarge7_i386.deb samba (3.0.14a-3sarge7) oldstable-security; urgency=low * Fix a remote code execution vulnerability when running nmbd as a WINS server. (CVE-2007-5398) * Fix a buffer overflow in nmbd when running as a domain controller during the processing GETDC logon server requests. (CVE-2007-4572) oldstable/main/binary-ia64/samba_3.0.14a-3sarge7_ia64.deb oldstable/main/binary-ia64/samba-common_3.0.14a-3sarge7_ia64.deb oldstable/main/binary-ia64/smbclient_3.0.14a-3sarge7_ia64.deb oldstable/main/binary-ia64/swat_3.0.14a-3sarge7_ia64.deb oldstable/main/binary-ia64/smbfs_3.0.14a-3sarge7_ia64.deb oldstable/main/binary-ia64/libpam-smbpass_3.0.14a-3sarge7_ia64.deb oldstable/main/binary-ia64/libsmbclient_3.0.14a-3sarge7_ia64.deb oldstable/main/binary-ia64/libsmbclient-dev_3.0.14a-3sarge7_ia64.deb oldstable/main/binary-ia64/winbind_3.0.14a-3sarge7_ia64.deb oldstable/main/binary-ia64/python2.3-samba_3.0.14a-3sarge7_ia64.deb oldstable/main/binary-ia64/samba-dbg_3.0.14a-3sarge7_ia64.deb samba (3.0.14a-3sarge7) oldstable-security; urgency=low * Fix a remote code execution vulnerability when running nmbd as a WINS server. (CVE-2007-5398) * Fix a buffer overflow in nmbd when running as a domain controller during the processing GETDC logon server requests. (CVE-2007-4572) oldstable/main/binary-m68k/samba_3.0.14a-3sarge7_m68k.deb oldstable/main/binary-m68k/samba-common_3.0.14a-3sarge7_m68k.deb oldstable/main/binary-m68k/smbclient_3.0.14a-3sarge7_m68k.deb oldstable/main/binary-m68k/swat_3.0.14a-3sarge7_m68k.deb oldstable/main/binary-m68k/smbfs_3.0.14a-3sarge7_m68k.deb oldstable/main/binary-m68k/libpam-smbpass_3.0.14a-3sarge7_m68k.deb oldstable/main/binary-m68k/libsmbclient_3.0.14a-3sarge7_m68k.deb oldstable/main/binary-m68k/libsmbclient-dev_3.0.14a-3sarge7_m68k.deb oldstable/main/binary-m68k/winbind_3.0.14a-3sarge7_m68k.deb oldstable/main/binary-m68k/python2.3-samba_3.0.14a-3sarge7_m68k.deb oldstable/main/binary-m68k/samba-dbg_3.0.14a-3sarge7_m68k.deb samba (3.0.14a-3sarge7) oldstable-security; urgency=low * Fix a remote code execution vulnerability when running nmbd as a WINS server. (CVE-2007-5398) * Fix a buffer overflow in nmbd when running as a domain controller during the processing GETDC logon server requests. (CVE-2007-4572) oldstable/main/binary-mips/samba_3.0.14a-3sarge7_mips.deb oldstable/main/binary-mips/samba-common_3.0.14a-3sarge7_mips.deb oldstable/main/binary-mips/smbclient_3.0.14a-3sarge7_mips.deb oldstable/main/binary-mips/swat_3.0.14a-3sarge7_mips.deb oldstable/main/binary-mips/smbfs_3.0.14a-3sarge7_mips.deb oldstable/main/binary-mips/libpam-smbpass_3.0.14a-3sarge7_mips.deb oldstable/main/binary-mips/libsmbclient_3.0.14a-3sarge7_mips.deb oldstable/main/binary-mips/libsmbclient-dev_3.0.14a-3sarge7_mips.deb oldstable/main/binary-mips/winbind_3.0.14a-3sarge7_mips.deb oldstable/main/binary-mips/python2.3-samba_3.0.14a-3sarge7_mips.deb oldstable/main/binary-mips/samba-dbg_3.0.14a-3sarge7_mips.deb samba (3.0.14a-3sarge7) oldstable-security; urgency=low * Fix a remote code execution vulnerability when running nmbd as a WINS server. (CVE-2007-5398) * Fix a buffer overflow in nmbd when running as a domain controller during the processing GETDC logon server requests. (CVE-2007-4572) oldstable/main/binary-mipsel/samba_3.0.14a-3sarge7_mipsel.deb oldstable/main/binary-mipsel/samba-common_3.0.14a-3sarge7_mipsel.deb oldstable/main/binary-mipsel/smbclient_3.0.14a-3sarge7_mipsel.deb oldstable/main/binary-mipsel/swat_3.0.14a-3sarge7_mipsel.deb oldstable/main/binary-mipsel/smbfs_3.0.14a-3sarge7_mipsel.deb oldstable/main/binary-mipsel/libpam-smbpass_3.0.14a-3sarge7_mipsel.deb oldstable/main/binary-mipsel/libsmbclient_3.0.14a-3sarge7_mipsel.deb oldstable/main/binary-mipsel/libsmbclient-dev_3.0.14a-3sarge7_mipsel.deb oldstable/main/binary-mipsel/winbind_3.0.14a-3sarge7_mipsel.deb oldstable/main/binary-mipsel/python2.3-samba_3.0.14a-3sarge7_mipsel.deb oldstable/main/binary-mipsel/samba-dbg_3.0.14a-3sarge7_mipsel.deb samba (3.0.14a-3sarge7) oldstable-security; urgency=low * Fix a remote code execution vulnerability when running nmbd as a WINS server. (CVE-2007-5398) * Fix a buffer overflow in nmbd when running as a domain controller during the processing GETDC logon server requests. (CVE-2007-4572) oldstable/main/binary-powerpc/samba_3.0.14a-3sarge7_powerpc.deb oldstable/main/binary-powerpc/samba-common_3.0.14a-3sarge7_powerpc.deb oldstable/main/binary-powerpc/smbclient_3.0.14a-3sarge7_powerpc.deb oldstable/main/binary-powerpc/swat_3.0.14a-3sarge7_powerpc.deb oldstable/main/binary-powerpc/smbfs_3.0.14a-3sarge7_powerpc.deb oldstable/main/binary-powerpc/libpam-smbpass_3.0.14a-3sarge7_powerpc.deb oldstable/main/binary-powerpc/libsmbclient_3.0.14a-3sarge7_powerpc.deb oldstable/main/binary-powerpc/libsmbclient-dev_3.0.14a-3sarge7_powerpc.deb oldstable/main/binary-powerpc/winbind_3.0.14a-3sarge7_powerpc.deb oldstable/main/binary-powerpc/python2.3-samba_3.0.14a-3sarge7_powerpc.deb oldstable/main/binary-powerpc/samba-dbg_3.0.14a-3sarge7_powerpc.deb samba (3.0.14a-3sarge7) oldstable-security; urgency=low * Fix a remote code execution vulnerability when running nmbd as a WINS server. (CVE-2007-5398) * Fix a buffer overflow in nmbd when running as a domain controller during the processing GETDC logon server requests. (CVE-2007-4572) oldstable/main/binary-s390/samba_3.0.14a-3sarge7_s390.deb oldstable/main/binary-s390/samba-common_3.0.14a-3sarge7_s390.deb oldstable/main/binary-s390/smbclient_3.0.14a-3sarge7_s390.deb oldstable/main/binary-s390/swat_3.0.14a-3sarge7_s390.deb oldstable/main/binary-s390/smbfs_3.0.14a-3sarge7_s390.deb oldstable/main/binary-s390/libpam-smbpass_3.0.14a-3sarge7_s390.deb oldstable/main/binary-s390/libsmbclient_3.0.14a-3sarge7_s390.deb oldstable/main/binary-s390/libsmbclient-dev_3.0.14a-3sarge7_s390.deb oldstable/main/binary-s390/winbind_3.0.14a-3sarge7_s390.deb oldstable/main/binary-s390/python2.3-samba_3.0.14a-3sarge7_s390.deb oldstable/main/binary-s390/samba-dbg_3.0.14a-3sarge7_s390.deb samba (3.0.14a-3sarge7) oldstable-security; urgency=low * Fix a remote code execution vulnerability when running nmbd as a WINS server. (CVE-2007-5398) * Fix a buffer overflow in nmbd when running as a domain controller during the processing GETDC logon server requests. (CVE-2007-4572) oldstable/main/binary-sparc/samba_3.0.14a-3sarge7_sparc.deb oldstable/main/binary-sparc/samba-common_3.0.14a-3sarge7_sparc.deb oldstable/main/binary-sparc/smbclient_3.0.14a-3sarge7_sparc.deb oldstable/main/binary-sparc/swat_3.0.14a-3sarge7_sparc.deb oldstable/main/binary-sparc/smbfs_3.0.14a-3sarge7_sparc.deb oldstable/main/binary-sparc/libpam-smbpass_3.0.14a-3sarge7_sparc.deb oldstable/main/binary-sparc/libsmbclient_3.0.14a-3sarge7_sparc.deb oldstable/main/binary-sparc/libsmbclient-dev_3.0.14a-3sarge7_sparc.deb oldstable/main/binary-sparc/winbind_3.0.14a-3sarge7_sparc.deb oldstable/main/binary-sparc/python2.3-samba_3.0.14a-3sarge7_sparc.deb oldstable/main/binary-sparc/samba-dbg_3.0.14a-3sarge7_sparc.deb samba (3.0.14a-3sarge7) oldstable-security; urgency=low * Fix a remote code execution vulnerability when running nmbd as a WINS server. (CVE-2007-5398) * Fix a buffer overflow in nmbd when running as a domain controller during the processing GETDC logon server requests. (CVE-2007-4572) oldstable/main/source/samba_3.0.14a-3sarge8.dsc oldstable/main/source/samba_3.0.14a-3sarge8.diff.gz oldstable/main/binary-all/samba-doc_3.0.14a-3sarge8_all.deb oldstable/main/binary-i386/samba_3.0.14a-3sarge8_i386.deb oldstable/main/binary-i386/samba-common_3.0.14a-3sarge8_i386.deb oldstable/main/binary-i386/smbclient_3.0.14a-3sarge8_i386.deb oldstable/main/binary-i386/swat_3.0.14a-3sarge8_i386.deb oldstable/main/binary-i386/smbfs_3.0.14a-3sarge8_i386.deb oldstable/main/binary-i386/libpam-smbpass_3.0.14a-3sarge8_i386.deb oldstable/main/binary-i386/libsmbclient_3.0.14a-3sarge8_i386.deb oldstable/main/binary-i386/libsmbclient-dev_3.0.14a-3sarge8_i386.deb oldstable/main/binary-i386/winbind_3.0.14a-3sarge8_i386.deb oldstable/main/binary-i386/python2.3-samba_3.0.14a-3sarge8_i386.deb oldstable/main/binary-i386/samba-dbg_3.0.14a-3sarge8_i386.deb samba (3.0.14a-3sarge8) oldstable-security; urgency=high * debian/patches/security-CVE-2007-4572_part2.patch: fix a regression introduced by the previous build that broke smbfs clients. oldstable/main/binary-alpha/samba_3.0.14a-3sarge9_alpha.deb oldstable/main/binary-alpha/samba-common_3.0.14a-3sarge9_alpha.deb oldstable/main/binary-alpha/smbclient_3.0.14a-3sarge9_alpha.deb oldstable/main/binary-alpha/swat_3.0.14a-3sarge9_alpha.deb oldstable/main/binary-alpha/smbfs_3.0.14a-3sarge9_alpha.deb oldstable/main/binary-alpha/libpam-smbpass_3.0.14a-3sarge9_alpha.deb oldstable/main/binary-alpha/libsmbclient_3.0.14a-3sarge9_alpha.deb oldstable/main/binary-alpha/libsmbclient-dev_3.0.14a-3sarge9_alpha.deb oldstable/main/binary-alpha/winbind_3.0.14a-3sarge9_alpha.deb oldstable/main/binary-alpha/python2.3-samba_3.0.14a-3sarge9_alpha.deb oldstable/main/binary-alpha/samba-dbg_3.0.14a-3sarge9_alpha.deb samba (3.0.14a-3sarge9) oldstable-security; urgency=low * Fix for one final regression related to the fix for CVE-2007-4572, pulled from upstream. Thanks to Santiago Garcia Mantinan <manty@debian.org> for catching this. oldstable/main/binary-amd64/samba_3.0.14a-3sarge9_amd64.deb oldstable/main/binary-amd64/samba-common_3.0.14a-3sarge9_amd64.deb oldstable/main/binary-amd64/smbclient_3.0.14a-3sarge9_amd64.deb oldstable/main/binary-amd64/swat_3.0.14a-3sarge9_amd64.deb oldstable/main/binary-amd64/smbfs_3.0.14a-3sarge9_amd64.deb oldstable/main/binary-amd64/libpam-smbpass_3.0.14a-3sarge9_amd64.deb oldstable/main/binary-amd64/libsmbclient_3.0.14a-3sarge9_amd64.deb oldstable/main/binary-amd64/libsmbclient-dev_3.0.14a-3sarge9_amd64.deb oldstable/main/binary-amd64/winbind_3.0.14a-3sarge9_amd64.deb oldstable/main/binary-amd64/python2.3-samba_3.0.14a-3sarge9_amd64.deb oldstable/main/binary-amd64/samba-dbg_3.0.14a-3sarge9_amd64.deb samba (3.0.14a-3sarge9) oldstable-security; urgency=low * Fix for one final regression related to the fix for CVE-2007-4572, pulled from upstream. Thanks to Santiago Garcia Mantinan <manty@debian.org> for catching this. oldstable/main/binary-arm/samba_3.0.14a-3sarge9_arm.deb oldstable/main/binary-arm/samba-common_3.0.14a-3sarge9_arm.deb oldstable/main/binary-arm/smbclient_3.0.14a-3sarge9_arm.deb oldstable/main/binary-arm/swat_3.0.14a-3sarge9_arm.deb oldstable/main/binary-arm/smbfs_3.0.14a-3sarge9_arm.deb oldstable/main/binary-arm/libpam-smbpass_3.0.14a-3sarge9_arm.deb oldstable/main/binary-arm/libsmbclient_3.0.14a-3sarge9_arm.deb oldstable/main/binary-arm/libsmbclient-dev_3.0.14a-3sarge9_arm.deb oldstable/main/binary-arm/winbind_3.0.14a-3sarge9_arm.deb oldstable/main/binary-arm/python2.3-samba_3.0.14a-3sarge9_arm.deb oldstable/main/binary-arm/samba-dbg_3.0.14a-3sarge9_arm.deb samba (3.0.14a-3sarge9) oldstable-security; urgency=low * Fix for one final regression related to the fix for CVE-2007-4572, pulled from upstream. Thanks to Santiago Garcia Mantinan <manty@debian.org> for catching this. oldstable/main/binary-hppa/samba_3.0.14a-3sarge9_hppa.deb oldstable/main/binary-hppa/samba-common_3.0.14a-3sarge9_hppa.deb oldstable/main/binary-hppa/smbclient_3.0.14a-3sarge9_hppa.deb oldstable/main/binary-hppa/swat_3.0.14a-3sarge9_hppa.deb oldstable/main/binary-hppa/smbfs_3.0.14a-3sarge9_hppa.deb oldstable/main/binary-hppa/libpam-smbpass_3.0.14a-3sarge9_hppa.deb oldstable/main/binary-hppa/libsmbclient_3.0.14a-3sarge9_hppa.deb oldstable/main/binary-hppa/libsmbclient-dev_3.0.14a-3sarge9_hppa.deb oldstable/main/binary-hppa/winbind_3.0.14a-3sarge9_hppa.deb oldstable/main/binary-hppa/python2.3-samba_3.0.14a-3sarge9_hppa.deb oldstable/main/binary-hppa/samba-dbg_3.0.14a-3sarge9_hppa.deb samba (3.0.14a-3sarge9) oldstable-security; urgency=low * Fix for one final regression related to the fix for CVE-2007-4572, pulled from upstream. Thanks to Santiago Garcia Mantinan <manty@debian.org> for catching this. oldstable/main/source/samba_3.0.14a-3sarge9.dsc oldstable/main/source/samba_3.0.14a-3sarge9.diff.gz oldstable/main/binary-all/samba-doc_3.0.14a-3sarge9_all.deb oldstable/main/binary-i386/samba_3.0.14a-3sarge9_i386.deb oldstable/main/binary-i386/samba-common_3.0.14a-3sarge9_i386.deb oldstable/main/binary-i386/smbclient_3.0.14a-3sarge9_i386.deb oldstable/main/binary-i386/swat_3.0.14a-3sarge9_i386.deb oldstable/main/binary-i386/smbfs_3.0.14a-3sarge9_i386.deb oldstable/main/binary-i386/libpam-smbpass_3.0.14a-3sarge9_i386.deb oldstable/main/binary-i386/libsmbclient_3.0.14a-3sarge9_i386.deb oldstable/main/binary-i386/libsmbclient-dev_3.0.14a-3sarge9_i386.deb oldstable/main/binary-i386/winbind_3.0.14a-3sarge9_i386.deb oldstable/main/binary-i386/python2.3-samba_3.0.14a-3sarge9_i386.deb oldstable/main/binary-i386/samba-dbg_3.0.14a-3sarge9_i386.deb samba (3.0.14a-3sarge9) oldstable-security; urgency=low * Fix for one final regression related to the fix for CVE-2007-4572, pulled from upstream. Thanks to Santiago Garcia Mantinan <manty@debian.org> for catching this. oldstable/main/binary-ia64/samba_3.0.14a-3sarge9_ia64.deb oldstable/main/binary-ia64/samba-common_3.0.14a-3sarge9_ia64.deb oldstable/main/binary-ia64/smbclient_3.0.14a-3sarge9_ia64.deb oldstable/main/binary-ia64/swat_3.0.14a-3sarge9_ia64.deb oldstable/main/binary-ia64/smbfs_3.0.14a-3sarge9_ia64.deb oldstable/main/binary-ia64/libpam-smbpass_3.0.14a-3sarge9_ia64.deb oldstable/main/binary-ia64/libsmbclient_3.0.14a-3sarge9_ia64.deb oldstable/main/binary-ia64/libsmbclient-dev_3.0.14a-3sarge9_ia64.deb oldstable/main/binary-ia64/winbind_3.0.14a-3sarge9_ia64.deb oldstable/main/binary-ia64/python2.3-samba_3.0.14a-3sarge9_ia64.deb oldstable/main/binary-ia64/samba-dbg_3.0.14a-3sarge9_ia64.deb samba (3.0.14a-3sarge9) oldstable-security; urgency=low * Fix for one final regression related to the fix for CVE-2007-4572, pulled from upstream. Thanks to Santiago Garcia Mantinan <manty@debian.org> for catching this. oldstable/main/binary-m68k/samba_3.0.14a-3sarge9_m68k.deb oldstable/main/binary-m68k/samba-common_3.0.14a-3sarge9_m68k.deb oldstable/main/binary-m68k/smbclient_3.0.14a-3sarge9_m68k.deb oldstable/main/binary-m68k/swat_3.0.14a-3sarge9_m68k.deb oldstable/main/binary-m68k/smbfs_3.0.14a-3sarge9_m68k.deb oldstable/main/binary-m68k/libpam-smbpass_3.0.14a-3sarge9_m68k.deb oldstable/main/binary-m68k/libsmbclient_3.0.14a-3sarge9_m68k.deb oldstable/main/binary-m68k/libsmbclient-dev_3.0.14a-3sarge9_m68k.deb oldstable/main/binary-m68k/winbind_3.0.14a-3sarge9_m68k.deb oldstable/main/binary-m68k/python2.3-samba_3.0.14a-3sarge9_m68k.deb oldstable/main/binary-m68k/samba-dbg_3.0.14a-3sarge9_m68k.deb samba (3.0.14a-3sarge9) oldstable-security; urgency=low * Fix for one final regression related to the fix for CVE-2007-4572, pulled from upstream. Thanks to Santiago Garcia Mantinan <manty@debian.org> for catching this. oldstable/main/binary-mips/samba_3.0.14a-3sarge9_mips.deb oldstable/main/binary-mips/samba-common_3.0.14a-3sarge9_mips.deb oldstable/main/binary-mips/smbclient_3.0.14a-3sarge9_mips.deb oldstable/main/binary-mips/swat_3.0.14a-3sarge9_mips.deb oldstable/main/binary-mips/smbfs_3.0.14a-3sarge9_mips.deb oldstable/main/binary-mips/libpam-smbpass_3.0.14a-3sarge9_mips.deb oldstable/main/binary-mips/libsmbclient_3.0.14a-3sarge9_mips.deb oldstable/main/binary-mips/libsmbclient-dev_3.0.14a-3sarge9_mips.deb oldstable/main/binary-mips/winbind_3.0.14a-3sarge9_mips.deb oldstable/main/binary-mips/python2.3-samba_3.0.14a-3sarge9_mips.deb oldstable/main/binary-mips/samba-dbg_3.0.14a-3sarge9_mips.deb samba (3.0.14a-3sarge9) oldstable-security; urgency=low * Fix for one final regression related to the fix for CVE-2007-4572, pulled from upstream. Thanks to Santiago Garcia Mantinan <manty@debian.org> for catching this. oldstable/main/binary-mipsel/samba_3.0.14a-3sarge9_mipsel.deb oldstable/main/binary-mipsel/samba-common_3.0.14a-3sarge9_mipsel.deb oldstable/main/binary-mipsel/smbclient_3.0.14a-3sarge9_mipsel.deb oldstable/main/binary-mipsel/swat_3.0.14a-3sarge9_mipsel.deb oldstable/main/binary-mipsel/smbfs_3.0.14a-3sarge9_mipsel.deb oldstable/main/binary-mipsel/libpam-smbpass_3.0.14a-3sarge9_mipsel.deb oldstable/main/binary-mipsel/libsmbclient_3.0.14a-3sarge9_mipsel.deb oldstable/main/binary-mipsel/libsmbclient-dev_3.0.14a-3sarge9_mipsel.deb oldstable/main/binary-mipsel/winbind_3.0.14a-3sarge9_mipsel.deb oldstable/main/binary-mipsel/python2.3-samba_3.0.14a-3sarge9_mipsel.deb oldstable/main/binary-mipsel/samba-dbg_3.0.14a-3sarge9_mipsel.deb samba (3.0.14a-3sarge9) oldstable-security; urgency=low * Fix for one final regression related to the fix for CVE-2007-4572, pulled from upstream. Thanks to Santiago Garcia Mantinan <manty@debian.org> for catching this. oldstable/main/binary-powerpc/samba_3.0.14a-3sarge9_powerpc.deb oldstable/main/binary-powerpc/samba-common_3.0.14a-3sarge9_powerpc.deb oldstable/main/binary-powerpc/smbclient_3.0.14a-3sarge9_powerpc.deb oldstable/main/binary-powerpc/swat_3.0.14a-3sarge9_powerpc.deb oldstable/main/binary-powerpc/smbfs_3.0.14a-3sarge9_powerpc.deb oldstable/main/binary-powerpc/libpam-smbpass_3.0.14a-3sarge9_powerpc.deb oldstable/main/binary-powerpc/libsmbclient_3.0.14a-3sarge9_powerpc.deb oldstable/main/binary-powerpc/libsmbclient-dev_3.0.14a-3sarge9_powerpc.deb oldstable/main/binary-powerpc/winbind_3.0.14a-3sarge9_powerpc.deb oldstable/main/binary-powerpc/python2.3-samba_3.0.14a-3sarge9_powerpc.deb oldstable/main/binary-powerpc/samba-dbg_3.0.14a-3sarge9_powerpc.deb samba (3.0.14a-3sarge9) oldstable-security; urgency=low * Fix for one final regression related to the fix for CVE-2007-4572, pulled from upstream. Thanks to Santiago Garcia Mantinan <manty@debian.org> for catching this. oldstable/main/binary-s390/samba_3.0.14a-3sarge9_s390.deb oldstable/main/binary-s390/samba-common_3.0.14a-3sarge9_s390.deb oldstable/main/binary-s390/smbclient_3.0.14a-3sarge9_s390.deb oldstable/main/binary-s390/swat_3.0.14a-3sarge9_s390.deb oldstable/main/binary-s390/smbfs_3.0.14a-3sarge9_s390.deb oldstable/main/binary-s390/libpam-smbpass_3.0.14a-3sarge9_s390.deb oldstable/main/binary-s390/libsmbclient_3.0.14a-3sarge9_s390.deb oldstable/main/binary-s390/libsmbclient-dev_3.0.14a-3sarge9_s390.deb oldstable/main/binary-s390/winbind_3.0.14a-3sarge9_s390.deb oldstable/main/binary-s390/python2.3-samba_3.0.14a-3sarge9_s390.deb oldstable/main/binary-s390/samba-dbg_3.0.14a-3sarge9_s390.deb samba (3.0.14a-3sarge9) oldstable-security; urgency=low * Fix for one final regression related to the fix for CVE-2007-4572, pulled from upstream. Thanks to Santiago Garcia Mantinan <manty@debian.org> for catching this. oldstable/main/binary-sparc/scalapack1-mpich_1.7-7_sparc.deb oldstable/main/binary-sparc/scalapack-mpich-dev_1.7-7_sparc.deb oldstable/main/binary-sparc/scalapack-mpich-test_1.7-7_sparc.deb oldstable/main/binary-sparc/scalapack1-lam_1.7-7_sparc.deb oldstable/main/binary-sparc/scalapack-lam-dev_1.7-7_sparc.deb oldstable/main/binary-sparc/scalapack-lam-test_1.7-7_sparc.deb oldstable/main/binary-sparc/scalapack1-pvm_1.7-7_sparc.deb oldstable/main/binary-sparc/scalapack-pvm-dev_1.7-7_sparc.deb oldstable/main/binary-sparc/scalapack-pvm-test_1.7-7_sparc.deb scalapack (1.7-7) unstable; urgency=low * Adjust manual dependencies. Closes: #229831 oldstable/main/source/sitebar_3.2.6-7.1sarge1.dsc oldstable/main/source/sitebar_3.2.6-7.1sarge1.diff.gz oldstable/main/binary-all/sitebar_3.2.6-7.1sarge1_all.deb sitebar (3.2.6-7.1sarge1) oldstable-security; urgency=high * Non-maintainer upload by the security team * Fix multiple cross-site scripting vulnerabilities in command.php and translator.php Fixes: CVE-2007-5692 * Fix possible redirect via the forward parameter Fixes: CVE-2007-5695 oldstable/main/binary-arm/skippy_0.5.1rc1-1_arm.deb skippy (0.5.1rc1-1) unstable; urgency=low * The "All Bugs Free Release". * New Upstream Release. . ported debian/patches/10_config_file_overflow_fix.patch to the new code. * Fixed the watch file. * Bug fix: "skippy's postinst should not echo", thanks to Michael Urman (Closes: #302091). . removed the skippy.postinst notification, ... let's hope the user will find the doc. * Bug fix: "~/.skippyrc not loaded", thanks to Nick Hastings (Closes: #302131). . my patch was broken, this bug in fact was a missplaced printf. oldstable/main/source/squirrelmail_1.4.4-11.dsc oldstable/main/source/squirrelmail_1.4.4-11.diff.gz oldstable/main/binary-all/squirrelmail_1.4.4-11_all.deb squirrelmail (2:1.4.4-11) oldstable-security; urgency=high * Security upload for stable. * Fixes cross site scripting in the HTML filter [CVE-2007-1262] oldstable/main/binary-alpha/libswt-gtk3_3.0-6_alpha.deb oldstable/main/binary-alpha/libswt-gtk3-jni_3.0-6_alpha.deb oldstable/main/binary-alpha/libswt-mozilla3-jni_3.0-6_alpha.deb swt-gtk (3.0-6) unstable; urgency=low * Use libgcj4-dev as long as gcj provides gcj-3.3 (closes: #276052). * Change section to libdevel. oldstable/main/binary-powerpc/libswt-gtk3_3.0-6_powerpc.deb oldstable/main/binary-powerpc/libswt-gtk3-jni_3.0-6_powerpc.deb oldstable/main/binary-powerpc/libswt-mozilla3-jni_3.0-6_powerpc.deb swt-gtk (3.0-6) unstable; urgency=low * Use libgcj4-dev as long as gcj provides gcj-3.3 (closes: #276052). * Change section to libdevel. oldstable/main/binary-alpha/libt1-5_5.0.2-3sarge1_alpha.deb oldstable/main/binary-alpha/libt1-dev_5.0.2-3sarge1_alpha.deb oldstable/main/binary-alpha/t1lib-bin_5.0.2-3sarge1_alpha.deb t1lib (5.0.2-3sarge1) oldstable-security; urgency=high * Non-maintainer upload by the security team * Apply patch from Artur R. Czechowski to fix CVE-2007-4033. (Closes: #439927) oldstable/main/binary-amd64/libt1-5_5.0.2-3sarge1_amd64.deb oldstable/main/binary-amd64/libt1-dev_5.0.2-3sarge1_amd64.deb oldstable/main/binary-amd64/t1lib-bin_5.0.2-3sarge1_amd64.deb t1lib (5.0.2-3sarge1) oldstable-security; urgency=high * Non-maintainer upload by the security team * Apply patch from Artur R. Czechowski to fix CVE-2007-4033. (Closes: #439927) oldstable/main/binary-arm/libt1-5_5.0.2-3sarge1_arm.deb oldstable/main/binary-arm/libt1-dev_5.0.2-3sarge1_arm.deb oldstable/main/binary-arm/t1lib-bin_5.0.2-3sarge1_arm.deb t1lib (5.0.2-3sarge1) oldstable-security; urgency=high * Non-maintainer upload by the security team * Apply patch from Artur R. Czechowski to fix CVE-2007-4033. (Closes: #439927) oldstable/main/binary-hppa/libt1-5_5.0.2-3sarge1_hppa.deb oldstable/main/binary-hppa/libt1-dev_5.0.2-3sarge1_hppa.deb oldstable/main/binary-hppa/t1lib-bin_5.0.2-3sarge1_hppa.deb t1lib (5.0.2-3sarge1) oldstable-security; urgency=high * Non-maintainer upload by the security team * Apply patch from Artur R. Czechowski to fix CVE-2007-4033. (Closes: #439927) oldstable/main/source/t1lib_5.0.2-3sarge1.dsc oldstable/main/source/t1lib_5.0.2.orig.tar.gz oldstable/main/source/t1lib_5.0.2-3sarge1.diff.gz oldstable/main/binary-all/libt1-doc_5.0.2-3sarge1_all.deb oldstable/main/binary-i386/libt1-5_5.0.2-3sarge1_i386.deb oldstable/main/binary-i386/libt1-dev_5.0.2-3sarge1_i386.deb oldstable/main/binary-i386/t1lib-bin_5.0.2-3sarge1_i386.deb t1lib (5.0.2-3sarge1) oldstable-security; urgency=high * Non-maintainer upload by the security team * Apply patch from Artur R. Czechowski to fix CVE-2007-4033. (Closes: #439927) oldstable/main/binary-ia64/libt1-5_5.0.2-3sarge1_ia64.deb oldstable/main/binary-ia64/libt1-dev_5.0.2-3sarge1_ia64.deb oldstable/main/binary-ia64/t1lib-bin_5.0.2-3sarge1_ia64.deb t1lib (5.0.2-3sarge1) oldstable-security; urgency=high * Non-maintainer upload by the security team * Apply patch from Artur R. Czechowski to fix CVE-2007-4033. (Closes: #439927) oldstable/main/binary-m68k/libt1-5_5.0.2-3sarge1_m68k.deb oldstable/main/binary-m68k/libt1-dev_5.0.2-3sarge1_m68k.deb oldstable/main/binary-m68k/t1lib-bin_5.0.2-3sarge1_m68k.deb t1lib (5.0.2-3sarge1) oldstable-security; urgency=high * Non-maintainer upload by the security team * Apply patch from Artur R. Czechowski to fix CVE-2007-4033. (Closes: #439927) oldstable/main/binary-mips/libt1-5_5.0.2-3sarge1_mips.deb oldstable/main/binary-mips/libt1-dev_5.0.2-3sarge1_mips.deb oldstable/main/binary-mips/t1lib-bin_5.0.2-3sarge1_mips.deb t1lib (5.0.2-3sarge1) oldstable-security; urgency=high * Non-maintainer upload by the security team * Apply patch from Artur R. Czechowski to fix CVE-2007-4033. (Closes: #439927) oldstable/main/binary-mipsel/libt1-5_5.0.2-3sarge1_mipsel.deb oldstable/main/binary-mipsel/libt1-dev_5.0.2-3sarge1_mipsel.deb oldstable/main/binary-mipsel/t1lib-bin_5.0.2-3sarge1_mipsel.deb t1lib (5.0.2-3sarge1) oldstable-security; urgency=high * Non-maintainer upload by the security team * Apply patch from Artur R. Czechowski to fix CVE-2007-4033. (Closes: #439927) oldstable/main/binary-powerpc/libt1-5_5.0.2-3sarge1_powerpc.deb oldstable/main/binary-powerpc/libt1-dev_5.0.2-3sarge1_powerpc.deb oldstable/main/binary-powerpc/t1lib-bin_5.0.2-3sarge1_powerpc.deb t1lib (5.0.2-3sarge1) oldstable-security; urgency=high * Non-maintainer upload by the security team * Apply patch from Artur R. Czechowski to fix CVE-2007-4033. (Closes: #439927) oldstable/main/binary-s390/libt1-5_5.0.2-3sarge1_s390.deb oldstable/main/binary-s390/libt1-dev_5.0.2-3sarge1_s390.deb oldstable/main/binary-s390/t1lib-bin_5.0.2-3sarge1_s390.deb t1lib (5.0.2-3sarge1) oldstable-security; urgency=high * Non-maintainer upload by the security team * Apply patch from Artur R. Czechowski to fix CVE-2007-4033. (Closes: #439927) oldstable/main/binary-sparc/libt1-5_5.0.2-3sarge1_sparc.deb oldstable/main/binary-sparc/libt1-dev_5.0.2-3sarge1_sparc.deb oldstable/main/binary-sparc/t1lib-bin_5.0.2-3sarge1_sparc.deb t1lib (5.0.2-3sarge1) oldstable-security; urgency=high * Non-maintainer upload by the security team * Apply patch from Artur R. Czechowski to fix CVE-2007-4033. (Closes: #439927) oldstable/main/binary-alpha/tcpdump_3.8.3-5sarge3_alpha.deb tcpdump (3.8.3-5sarge3) oldstable-security; urgency=high * Fix buffer overflow in BGP dissector (CVE-2007-3798). oldstable/main/binary-arm/tcpdump_3.8.3-5sarge3_arm.deb tcpdump (3.8.3-5sarge3) oldstable-security; urgency=high * Fix buffer overflow in BGP dissector (CVE-2007-3798). oldstable/main/binary-hppa/tcpdump_3.8.3-5sarge3_hppa.deb tcpdump (3.8.3-5sarge3) oldstable-security; urgency=high * Fix buffer overflow in BGP dissector (CVE-2007-3798). oldstable/main/source/tcpdump_3.8.3-5sarge3.dsc oldstable/main/source/tcpdump_3.8.3-5sarge3.diff.gz oldstable/main/binary-i386/tcpdump_3.8.3-5sarge3_i386.deb tcpdump (3.8.3-5sarge3) oldstable-security; urgency=high * Fix buffer overflow in BGP dissector (CVE-2007-3798). oldstable/main/binary-ia64/tcpdump_3.8.3-5sarge3_ia64.deb tcpdump (3.8.3-5sarge3) oldstable-security; urgency=high * Fix buffer overflow in BGP dissector (CVE-2007-3798). oldstable/main/binary-m68k/tcpdump_3.8.3-5sarge3_m68k.deb tcpdump (3.8.3-5sarge3) oldstable-security; urgency=high * Fix buffer overflow in BGP dissector (CVE-2007-3798). oldstable/main/binary-mips/tcpdump_3.8.3-5sarge3_mips.deb tcpdump (3.8.3-5sarge3) oldstable-security; urgency=high * Fix buffer overflow in BGP dissector (CVE-2007-3798). oldstable/main/binary-mipsel/tcpdump_3.8.3-5sarge3_mipsel.deb tcpdump (3.8.3-5sarge3) oldstable-security; urgency=high * Fix buffer overflow in BGP dissector (CVE-2007-3798). oldstable/main/binary-powerpc/tcpdump_3.8.3-5sarge3_powerpc.deb tcpdump (3.8.3-5sarge3) oldstable-security; urgency=high * Fix buffer overflow in BGP dissector (CVE-2007-3798). oldstable/main/binary-s390/tcpdump_3.8.3-5sarge3_s390.deb tcpdump (3.8.3-5sarge3) oldstable-security; urgency=high * Fix buffer overflow in BGP dissector (CVE-2007-3798). oldstable/main/binary-sparc/tcpdump_3.8.3-5sarge3_sparc.deb tcpdump (3.8.3-5sarge3) oldstable-security; urgency=high * Fix buffer overflow in BGP dissector (CVE-2007-3798). oldstable/main/binary-alpha/tetex-bin_2.0.2-30sarge5_alpha.deb oldstable/main/binary-alpha/libkpathsea3_2.0.2-30sarge5_alpha.deb oldstable/main/binary-alpha/libkpathsea-dev_2.0.2-30sarge5_alpha.deb tetex-bin (2.0.2-30sarge5) oldstable-security; urgency=high * Fix integer overflow in stream predictor. (CVE-2007-3387) oldstable/main/binary-arm/tetex-bin_2.0.2-30sarge5_arm.deb oldstable/main/binary-arm/libkpathsea3_2.0.2-30sarge5_arm.deb oldstable/main/binary-arm/libkpathsea-dev_2.0.2-30sarge5_arm.deb tetex-bin (2.0.2-30sarge5) oldstable-security; urgency=high * Fix integer overflow in stream predictor. (CVE-2007-3387) oldstable/main/binary-hppa/tetex-bin_2.0.2-30sarge5_hppa.deb oldstable/main/binary-hppa/libkpathsea3_2.0.2-30sarge5_hppa.deb oldstable/main/binary-hppa/libkpathsea-dev_2.0.2-30sarge5_hppa.deb tetex-bin (2.0.2-30sarge5) oldstable-security; urgency=high * Fix integer overflow in stream predictor. (CVE-2007-3387) oldstable/main/source/tetex-bin_2.0.2-30sarge5.dsc oldstable/main/source/tetex-bin_2.0.2-30sarge5.diff.gz oldstable/main/binary-i386/tetex-bin_2.0.2-30sarge5_i386.deb oldstable/main/binary-i386/libkpathsea3_2.0.2-30sarge5_i386.deb oldstable/main/binary-i386/libkpathsea-dev_2.0.2-30sarge5_i386.deb tetex-bin (2.0.2-30sarge5) oldstable-security; urgency=high * Fix integer overflow in stream predictor. (CVE-2007-3387) oldstable/main/binary-ia64/tetex-bin_2.0.2-30sarge5_ia64.deb oldstable/main/binary-ia64/libkpathsea3_2.0.2-30sarge5_ia64.deb oldstable/main/binary-ia64/libkpathsea-dev_2.0.2-30sarge5_ia64.deb tetex-bin (2.0.2-30sarge5) oldstable-security; urgency=high * Fix integer overflow in stream predictor. (CVE-2007-3387) oldstable/main/binary-m68k/tetex-bin_2.0.2-30sarge5_m68k.deb oldstable/main/binary-m68k/libkpathsea3_2.0.2-30sarge5_m68k.deb oldstable/main/binary-m68k/libkpathsea-dev_2.0.2-30sarge5_m68k.deb tetex-bin (2.0.2-30sarge5) oldstable-security; urgency=high * Fix integer overflow in stream predictor. (CVE-2007-3387) oldstable/main/binary-mips/tetex-bin_2.0.2-30sarge5_mips.deb oldstable/main/binary-mips/libkpathsea3_2.0.2-30sarge5_mips.deb oldstable/main/binary-mips/libkpathsea-dev_2.0.2-30sarge5_mips.deb tetex-bin (2.0.2-30sarge5) oldstable-security; urgency=high * Fix integer overflow in stream predictor. (CVE-2007-3387) oldstable/main/binary-mipsel/tetex-bin_2.0.2-30sarge5_mipsel.deb oldstable/main/binary-mipsel/libkpathsea3_2.0.2-30sarge5_mipsel.deb oldstable/main/binary-mipsel/libkpathsea-dev_2.0.2-30sarge5_mipsel.deb tetex-bin (2.0.2-30sarge5) oldstable-security; urgency=high * Fix integer overflow in stream predictor. (CVE-2007-3387) oldstable/main/binary-powerpc/tetex-bin_2.0.2-30sarge5_powerpc.deb oldstable/main/binary-powerpc/libkpathsea3_2.0.2-30sarge5_powerpc.deb oldstable/main/binary-powerpc/libkpathsea-dev_2.0.2-30sarge5_powerpc.deb tetex-bin (2.0.2-30sarge5) oldstable-security; urgency=high * Fix integer overflow in stream predictor. (CVE-2007-3387) oldstable/main/binary-s390/tetex-bin_2.0.2-30sarge5_s390.deb oldstable/main/binary-s390/libkpathsea3_2.0.2-30sarge5_s390.deb oldstable/main/binary-s390/libkpathsea-dev_2.0.2-30sarge5_s390.deb tetex-bin (2.0.2-30sarge5) oldstable-security; urgency=high * Fix integer overflow in stream predictor. (CVE-2007-3387) oldstable/main/binary-sparc/tetex-bin_2.0.2-30sarge5_sparc.deb oldstable/main/binary-sparc/libkpathsea3_2.0.2-30sarge5_sparc.deb oldstable/main/binary-sparc/libkpathsea-dev_2.0.2-30sarge5_sparc.deb tetex-bin (2.0.2-30sarge5) oldstable-security; urgency=high * Fix integer overflow in stream predictor. (CVE-2007-3387) oldstable/main/binary-alpha/tk8.4_8.4.9-1sarge1_alpha.deb oldstable/main/binary-alpha/tk8.4-dev_8.4.9-1sarge1_alpha.deb tk8.4 (8.4.9-1sarge1) oldstable-security; urgency=high * Applied patches by Nico Golde which correctly fix security vulnerability CVE-2007-5137 arbitrary code execution via multi-frame interlaced GIF not introducing CVE-2007-5378. oldstable/main/binary-amd64/tk8.4_8.4.9-1sarge1_amd64.deb oldstable/main/binary-amd64/tk8.4-dev_8.4.9-1sarge1_amd64.deb tk8.4 (8.4.9-1sarge1) oldstable-security; urgency=high * Applied patches by Nico Golde which correctly fix security vulnerability CVE-2007-5137 arbitrary code execution via multi-frame interlaced GIF not introducing CVE-2007-5378. oldstable/main/binary-arm/tk8.4_8.4.9-1sarge1_arm.deb oldstable/main/binary-arm/tk8.4-dev_8.4.9-1sarge1_arm.deb tk8.4 (8.4.9-1sarge1) oldstable-security; urgency=high * Applied patches by Nico Golde which correctly fix security vulnerability CVE-2007-5137 arbitrary code execution via multi-frame interlaced GIF not introducing CVE-2007-5378. oldstable/main/binary-hppa/tk8.4_8.4.9-1sarge1_hppa.deb oldstable/main/binary-hppa/tk8.4-dev_8.4.9-1sarge1_hppa.deb tk8.4 (8.4.9-1sarge1) oldstable-security; urgency=high * Applied patches by Nico Golde which correctly fix security vulnerability CVE-2007-5137 arbitrary code execution via multi-frame interlaced GIF not introducing CVE-2007-5378. oldstable/main/source/tk8.4_8.4.9-1sarge1.dsc oldstable/main/source/tk8.4_8.4.9.orig.tar.gz oldstable/main/source/tk8.4_8.4.9-1sarge1.diff.gz oldstable/main/binary-all/tk8.4-doc_8.4.9-1sarge1_all.deb oldstable/main/binary-i386/tk8.4_8.4.9-1sarge1_i386.deb oldstable/main/binary-i386/tk8.4-dev_8.4.9-1sarge1_i386.deb tk8.4 (8.4.9-1sarge1) oldstable-security; urgency=high * Applied patches by Nico Golde which correctly fix security vulnerability CVE-2007-5137 arbitrary code execution via multi-frame interlaced GIF not introducing CVE-2007-5378. oldstable/main/binary-ia64/tk8.4_8.4.9-1sarge1_ia64.deb oldstable/main/binary-ia64/tk8.4-dev_8.4.9-1sarge1_ia64.deb tk8.4 (8.4.9-1sarge1) oldstable-security; urgency=high * Applied patches by Nico Golde which correctly fix security vulnerability CVE-2007-5137 arbitrary code execution via multi-frame interlaced GIF not introducing CVE-2007-5378. oldstable/main/binary-m68k/tk8.4_8.4.9-1sarge1_m68k.deb oldstable/main/binary-m68k/tk8.4-dev_8.4.9-1sarge1_m68k.deb tk8.4 (8.4.9-1sarge1) oldstable-security; urgency=high * Applied patches by Nico Golde which correctly fix security vulnerability CVE-2007-5137 arbitrary code execution via multi-frame interlaced GIF not introducing CVE-2007-5378. oldstable/main/binary-mips/tk8.4_8.4.9-1sarge1_mips.deb oldstable/main/binary-mips/tk8.4-dev_8.4.9-1sarge1_mips.deb tk8.4 (8.4.9-1sarge1) oldstable-security; urgency=high * Applied patches by Nico Golde which correctly fix security vulnerability CVE-2007-5137 arbitrary code execution via multi-frame interlaced GIF not introducing CVE-2007-5378. oldstable/main/binary-mipsel/tk8.4_8.4.9-1sarge1_mipsel.deb oldstable/main/binary-mipsel/tk8.4-dev_8.4.9-1sarge1_mipsel.deb tk8.4 (8.4.9-1sarge1) oldstable-security; urgency=high * Applied patches by Nico Golde which correctly fix security vulnerability CVE-2007-5137 arbitrary code execution via multi-frame interlaced GIF not introducing CVE-2007-5378. oldstable/main/binary-powerpc/tk8.4_8.4.9-1sarge1_powerpc.deb oldstable/main/binary-powerpc/tk8.4-dev_8.4.9-1sarge1_powerpc.deb tk8.4 (8.4.9-1sarge1) oldstable-security; urgency=high * Applied patches by Nico Golde which correctly fix security vulnerability CVE-2007-5137 arbitrary code execution via multi-frame interlaced GIF not introducing CVE-2007-5378. oldstable/main/binary-s390/tk8.4_8.4.9-1sarge1_s390.deb oldstable/main/binary-s390/tk8.4-dev_8.4.9-1sarge1_s390.deb tk8.4 (8.4.9-1sarge1) oldstable-security; urgency=high * Applied patches by Nico Golde which correctly fix security vulnerability CVE-2007-5137 arbitrary code execution via multi-frame interlaced GIF not introducing CVE-2007-5378. oldstable/main/binary-sparc/tk8.4_8.4.9-1sarge1_sparc.deb oldstable/main/binary-sparc/tk8.4-dev_8.4.9-1sarge1_sparc.deb tk8.4 (8.4.9-1sarge1) oldstable-security; urgency=high * Applied patches by Nico Golde which correctly fix security vulnerability CVE-2007-5137 arbitrary code execution via multi-frame interlaced GIF not introducing CVE-2007-5378. oldstable/main/binary-alpha/vgrabbj_0.9.3-1_alpha.deb vgrabbj (0.9.3-1) unstable; urgency=low * New upstream release - boolean command line option fix (Closes: #157236) * Use libpng3 instead of libpng2 oldstable/main/binary-arm/vgrabbj_0.9.3-1_arm.deb vgrabbj (0.9.3-1) unstable; urgency=low * New upstream release - boolean command line option fix (Closes: #157236) * Use libpng3 instead of libpng2 oldstable/main/binary-hppa/vgrabbj_0.9.3-1_hppa.deb vgrabbj (0.9.3-1) unstable; urgency=low * New upstream release - boolean command line option fix (Closes: #157236) * Use libpng3 instead of libpng2 oldstable/main/binary-ia64/vgrabbj_0.9.3-1_ia64.deb vgrabbj (0.9.3-1) unstable; urgency=low * New upstream release - boolean command line option fix (Closes: #157236) * Use libpng3 instead of libpng2 oldstable/main/binary-m68k/vgrabbj_0.9.3-1_m68k.deb vgrabbj (0.9.3-1) unstable; urgency=low * New upstream release - boolean command line option fix (Closes: #157236) * Use libpng3 instead of libpng2 oldstable/main/binary-mipsel/vgrabbj_0.9.3-1_mipsel.deb vgrabbj (0.9.3-1) unstable; urgency=low * New upstream release - boolean command line option fix (Closes: #157236) * Use libpng3 instead of libpng2 oldstable/main/binary-powerpc/vgrabbj_0.9.3-1_powerpc.deb vgrabbj (0.9.3-1) unstable; urgency=low * New upstream release - boolean command line option fix (Closes: #157236) * Use libpng3 instead of libpng2 oldstable/main/binary-s390/vgrabbj_0.9.3-1_s390.deb vgrabbj (0.9.3-1) unstable; urgency=low * New upstream release - boolean command line option fix (Closes: #157236) * Use libpng3 instead of libpng2 oldstable/main/binary-sparc/vgrabbj_0.9.3-1_sparc.deb vgrabbj (0.9.3-1) unstable; urgency=low * New upstream release - boolean command line option fix (Closes: #157236) * Use libpng3 instead of libpng2 oldstable/main/binary-alpha/vim_6.3-071+1sarge2_alpha.deb oldstable/main/binary-alpha/vim-perl_6.3-071+1sarge2_alpha.deb oldstable/main/binary-alpha/vim-python_6.3-071+1sarge2_alpha.deb oldstable/main/binary-alpha/vim-ruby_6.3-071+1sarge2_alpha.deb oldstable/main/binary-alpha/vim-tcl_6.3-071+1sarge2_alpha.deb oldstable/main/binary-alpha/vim-gtk_6.3-071+1sarge2_alpha.deb oldstable/main/binary-alpha/vim-lesstif_6.3-071+1sarge2_alpha.deb oldstable/main/binary-alpha/vim-gnome_6.3-071+1sarge2_alpha.deb oldstable/main/binary-alpha/vim-full_6.3-071+1sarge2_alpha.deb vim (1:6.3-071+1sarge2) oldstable-security; urgency=high * Fix format string vulnerability in helptags handling (CVE-2007-2953). oldstable/main/binary-amd64/vim_6.3-071+1sarge2_amd64.deb oldstable/main/binary-amd64/vim-perl_6.3-071+1sarge2_amd64.deb oldstable/main/binary-amd64/vim-python_6.3-071+1sarge2_amd64.deb oldstable/main/binary-amd64/vim-ruby_6.3-071+1sarge2_amd64.deb oldstable/main/binary-amd64/vim-tcl_6.3-071+1sarge2_amd64.deb oldstable/main/binary-amd64/vim-gtk_6.3-071+1sarge2_amd64.deb oldstable/main/binary-amd64/vim-lesstif_6.3-071+1sarge2_amd64.deb oldstable/main/binary-amd64/vim-gnome_6.3-071+1sarge2_amd64.deb oldstable/main/binary-amd64/vim-full_6.3-071+1sarge2_amd64.deb vim (1:6.3-071+1sarge2) oldstable-security; urgency=high * Fix format string vulnerability in helptags handling (CVE-2007-2953). oldstable/main/binary-arm/vim_6.3-071+1sarge2_arm.deb oldstable/main/binary-arm/vim-perl_6.3-071+1sarge2_arm.deb oldstable/main/binary-arm/vim-python_6.3-071+1sarge2_arm.deb oldstable/main/binary-arm/vim-ruby_6.3-071+1sarge2_arm.deb oldstable/main/binary-arm/vim-tcl_6.3-071+1sarge2_arm.deb oldstable/main/binary-arm/vim-gtk_6.3-071+1sarge2_arm.deb oldstable/main/binary-arm/vim-lesstif_6.3-071+1sarge2_arm.deb oldstable/main/binary-arm/vim-gnome_6.3-071+1sarge2_arm.deb oldstable/main/binary-arm/vim-full_6.3-071+1sarge2_arm.deb vim (1:6.3-071+1sarge2) oldstable-security; urgency=high * Fix format string vulnerability in helptags handling (CVE-2007-2953). oldstable/main/binary-alpha/vim_6.3-071+1sarge2+b1_alpha.deb oldstable/main/binary-alpha/vim-perl_6.3-071+1sarge2+b1_alpha.deb oldstable/main/binary-alpha/vim-python_6.3-071+1sarge2+b1_alpha.deb oldstable/main/binary-alpha/vim-ruby_6.3-071+1sarge2+b1_alpha.deb oldstable/main/binary-alpha/vim-tcl_6.3-071+1sarge2+b1_alpha.deb oldstable/main/binary-alpha/vim-gtk_6.3-071+1sarge2+b1_alpha.deb oldstable/main/binary-alpha/vim-lesstif_6.3-071+1sarge2+b1_alpha.deb oldstable/main/binary-alpha/vim-gnome_6.3-071+1sarge2+b1_alpha.deb oldstable/main/binary-alpha/vim-full_6.3-071+1sarge2+b1_alpha.deb vim (1:6.3-071+1sarge2+b1) oldstable-security; urgency=high * Binary-only non-maintainer upload for alpha; no source changes. * Rebuild to get CURDIR working. oldstable/main/binary-mips/vim_6.3-071+1sarge2+b1_mips.deb oldstable/main/binary-mips/vim-perl_6.3-071+1sarge2+b1_mips.deb oldstable/main/binary-mips/vim-python_6.3-071+1sarge2+b1_mips.deb oldstable/main/binary-mips/vim-ruby_6.3-071+1sarge2+b1_mips.deb oldstable/main/binary-mips/vim-tcl_6.3-071+1sarge2+b1_mips.deb oldstable/main/binary-mips/vim-gtk_6.3-071+1sarge2+b1_mips.deb oldstable/main/binary-mips/vim-lesstif_6.3-071+1sarge2+b1_mips.deb oldstable/main/binary-mips/vim-gnome_6.3-071+1sarge2+b1_mips.deb oldstable/main/binary-mips/vim-full_6.3-071+1sarge2+b1_mips.deb vim (1:6.3-071+1sarge2+b1) oldstable-security; urgency=high * Binary-only non-maintainer upload for mips; no source changes. * Rebuild to get CURDIR working. oldstable/main/binary-mipsel/vim_6.3-071+1sarge2+b1_mipsel.deb oldstable/main/binary-mipsel/vim-perl_6.3-071+1sarge2+b1_mipsel.deb oldstable/main/binary-mipsel/vim-python_6.3-071+1sarge2+b1_mipsel.deb oldstable/main/binary-mipsel/vim-ruby_6.3-071+1sarge2+b1_mipsel.deb oldstable/main/binary-mipsel/vim-tcl_6.3-071+1sarge2+b1_mipsel.deb oldstable/main/binary-mipsel/vim-gtk_6.3-071+1sarge2+b1_mipsel.deb oldstable/main/binary-mipsel/vim-lesstif_6.3-071+1sarge2+b1_mipsel.deb oldstable/main/binary-mipsel/vim-gnome_6.3-071+1sarge2+b1_mipsel.deb oldstable/main/binary-mipsel/vim-full_6.3-071+1sarge2+b1_mipsel.deb vim (1:6.3-071+1sarge2+b1) oldstable-security; urgency=high * Binary-only non-maintainer upload for mipsel; no source changes. * Rebuild to get CURDIR working. oldstable/main/binary-hppa/vim_6.3-071+1sarge2_hppa.deb oldstable/main/binary-hppa/vim-perl_6.3-071+1sarge2_hppa.deb oldstable/main/binary-hppa/vim-python_6.3-071+1sarge2_hppa.deb oldstable/main/binary-hppa/vim-ruby_6.3-071+1sarge2_hppa.deb oldstable/main/binary-hppa/vim-tcl_6.3-071+1sarge2_hppa.deb oldstable/main/binary-hppa/vim-gtk_6.3-071+1sarge2_hppa.deb oldstable/main/binary-hppa/vim-lesstif_6.3-071+1sarge2_hppa.deb oldstable/main/binary-hppa/vim-gnome_6.3-071+1sarge2_hppa.deb oldstable/main/binary-hppa/vim-full_6.3-071+1sarge2_hppa.deb vim (1:6.3-071+1sarge2) oldstable-security; urgency=high * Fix format string vulnerability in helptags handling (CVE-2007-2953). oldstable/main/source/vim_6.3-071+1sarge2.dsc oldstable/main/source/vim_6.3.orig.tar.gz oldstable/main/source/vim_6.3-071+1sarge2.diff.gz oldstable/main/binary-all/vim-doc_6.3-071+1sarge2_all.deb oldstable/main/binary-all/vim-common_6.3-071+1sarge2_all.deb oldstable/main/binary-i386/vim_6.3-071+1sarge2_i386.deb oldstable/main/binary-i386/vim-perl_6.3-071+1sarge2_i386.deb oldstable/main/binary-i386/vim-python_6.3-071+1sarge2_i386.deb oldstable/main/binary-i386/vim-ruby_6.3-071+1sarge2_i386.deb oldstable/main/binary-i386/vim-tcl_6.3-071+1sarge2_i386.deb oldstable/main/binary-i386/vim-gtk_6.3-071+1sarge2_i386.deb oldstable/main/binary-i386/vim-lesstif_6.3-071+1sarge2_i386.deb oldstable/main/binary-i386/vim-gnome_6.3-071+1sarge2_i386.deb oldstable/main/binary-i386/vim-full_6.3-071+1sarge2_i386.deb vim (1:6.3-071+1sarge2) oldstable-security; urgency=high * Fix format string vulnerability in helptags handling (CVE-2007-2953). oldstable/main/binary-ia64/vim_6.3-071+1sarge2_ia64.deb oldstable/main/binary-ia64/vim-perl_6.3-071+1sarge2_ia64.deb oldstable/main/binary-ia64/vim-python_6.3-071+1sarge2_ia64.deb oldstable/main/binary-ia64/vim-ruby_6.3-071+1sarge2_ia64.deb oldstable/main/binary-ia64/vim-tcl_6.3-071+1sarge2_ia64.deb oldstable/main/binary-ia64/vim-gtk_6.3-071+1sarge2_ia64.deb oldstable/main/binary-ia64/vim-lesstif_6.3-071+1sarge2_ia64.deb oldstable/main/binary-ia64/vim-gnome_6.3-071+1sarge2_ia64.deb oldstable/main/binary-ia64/vim-full_6.3-071+1sarge2_ia64.deb vim (1:6.3-071+1sarge2) oldstable-security; urgency=high * Fix format string vulnerability in helptags handling (CVE-2007-2953). oldstable/main/binary-m68k/vim_6.3-071+1sarge2_m68k.deb oldstable/main/binary-m68k/vim-perl_6.3-071+1sarge2_m68k.deb oldstable/main/binary-m68k/vim-python_6.3-071+1sarge2_m68k.deb oldstable/main/binary-m68k/vim-ruby_6.3-071+1sarge2_m68k.deb oldstable/main/binary-m68k/vim-tcl_6.3-071+1sarge2_m68k.deb oldstable/main/binary-m68k/vim-gtk_6.3-071+1sarge2_m68k.deb oldstable/main/binary-m68k/vim-lesstif_6.3-071+1sarge2_m68k.deb oldstable/main/binary-m68k/vim-gnome_6.3-071+1sarge2_m68k.deb oldstable/main/binary-m68k/vim-full_6.3-071+1sarge2_m68k.deb vim (1:6.3-071+1sarge2) oldstable-security; urgency=high * Fix format string vulnerability in helptags handling (CVE-2007-2953). oldstable/main/binary-mips/vim_6.3-071+1sarge2_mips.deb oldstable/main/binary-mips/vim-perl_6.3-071+1sarge2_mips.deb oldstable/main/binary-mips/vim-python_6.3-071+1sarge2_mips.deb oldstable/main/binary-mips/vim-ruby_6.3-071+1sarge2_mips.deb oldstable/main/binary-mips/vim-tcl_6.3-071+1sarge2_mips.deb oldstable/main/binary-mips/vim-gtk_6.3-071+1sarge2_mips.deb oldstable/main/binary-mips/vim-lesstif_6.3-071+1sarge2_mips.deb oldstable/main/binary-mips/vim-gnome_6.3-071+1sarge2_mips.deb oldstable/main/binary-mips/vim-full_6.3-071+1sarge2_mips.deb vim (1:6.3-071+1sarge2) oldstable-security; urgency=high * Fix format string vulnerability in helptags handling (CVE-2007-2953). oldstable/main/binary-mipsel/vim_6.3-071+1sarge2_mipsel.deb oldstable/main/binary-mipsel/vim-perl_6.3-071+1sarge2_mipsel.deb oldstable/main/binary-mipsel/vim-python_6.3-071+1sarge2_mipsel.deb oldstable/main/binary-mipsel/vim-ruby_6.3-071+1sarge2_mipsel.deb oldstable/main/binary-mipsel/vim-tcl_6.3-071+1sarge2_mipsel.deb oldstable/main/binary-mipsel/vim-gtk_6.3-071+1sarge2_mipsel.deb oldstable/main/binary-mipsel/vim-lesstif_6.3-071+1sarge2_mipsel.deb oldstable/main/binary-mipsel/vim-gnome_6.3-071+1sarge2_mipsel.deb oldstable/main/binary-mipsel/vim-full_6.3-071+1sarge2_mipsel.deb vim (1:6.3-071+1sarge2) oldstable-security; urgency=high * Fix format string vulnerability in helptags handling (CVE-2007-2953). oldstable/main/binary-powerpc/vim_6.3-071+1sarge2_powerpc.deb oldstable/main/binary-powerpc/vim-perl_6.3-071+1sarge2_powerpc.deb oldstable/main/binary-powerpc/vim-python_6.3-071+1sarge2_powerpc.deb oldstable/main/binary-powerpc/vim-ruby_6.3-071+1sarge2_powerpc.deb oldstable/main/binary-powerpc/vim-tcl_6.3-071+1sarge2_powerpc.deb oldstable/main/binary-powerpc/vim-gtk_6.3-071+1sarge2_powerpc.deb oldstable/main/binary-powerpc/vim-lesstif_6.3-071+1sarge2_powerpc.deb oldstable/main/binary-powerpc/vim-gnome_6.3-071+1sarge2_powerpc.deb oldstable/main/binary-powerpc/vim-full_6.3-071+1sarge2_powerpc.deb vim (1:6.3-071+1sarge2) oldstable-security; urgency=high * Fix format string vulnerability in helptags handling (CVE-2007-2953). oldstable/main/binary-s390/vim_6.3-071+1sarge2_s390.deb oldstable/main/binary-s390/vim-perl_6.3-071+1sarge2_s390.deb oldstable/main/binary-s390/vim-python_6.3-071+1sarge2_s390.deb oldstable/main/binary-s390/vim-ruby_6.3-071+1sarge2_s390.deb oldstable/main/binary-s390/vim-tcl_6.3-071+1sarge2_s390.deb oldstable/main/binary-s390/vim-gtk_6.3-071+1sarge2_s390.deb oldstable/main/binary-s390/vim-lesstif_6.3-071+1sarge2_s390.deb oldstable/main/binary-s390/vim-gnome_6.3-071+1sarge2_s390.deb oldstable/main/binary-s390/vim-full_6.3-071+1sarge2_s390.deb vim (1:6.3-071+1sarge2) oldstable-security; urgency=high * Fix format string vulnerability in helptags handling (CVE-2007-2953). oldstable/main/binary-sparc/vim_6.3-071+1sarge2_sparc.deb oldstable/main/binary-sparc/vim-perl_6.3-071+1sarge2_sparc.deb oldstable/main/binary-sparc/vim-python_6.3-071+1sarge2_sparc.deb oldstable/main/binary-sparc/vim-ruby_6.3-071+1sarge2_sparc.deb oldstable/main/binary-sparc/vim-tcl_6.3-071+1sarge2_sparc.deb oldstable/main/binary-sparc/vim-gtk_6.3-071+1sarge2_sparc.deb oldstable/main/binary-sparc/vim-lesstif_6.3-071+1sarge2_sparc.deb oldstable/main/binary-sparc/vim-gnome_6.3-071+1sarge2_sparc.deb oldstable/main/binary-sparc/vim-full_6.3-071+1sarge2_sparc.deb vim (1:6.3-071+1sarge2) oldstable-security; urgency=high * Fix format string vulnerability in helptags handling (CVE-2007-2953). oldstable/main/binary-alpha/vim_6.3-071+1sarge3_alpha.deb oldstable/main/binary-alpha/vim-perl_6.3-071+1sarge3_alpha.deb oldstable/main/binary-alpha/vim-python_6.3-071+1sarge3_alpha.deb oldstable/main/binary-alpha/vim-ruby_6.3-071+1sarge3_alpha.deb oldstable/main/binary-alpha/vim-tcl_6.3-071+1sarge3_alpha.deb oldstable/main/binary-alpha/vim-gtk_6.3-071+1sarge3_alpha.deb oldstable/main/binary-alpha/vim-lesstif_6.3-071+1sarge3_alpha.deb oldstable/main/binary-alpha/vim-gnome_6.3-071+1sarge3_alpha.deb oldstable/main/binary-alpha/vim-full_6.3-071+1sarge3_alpha.deb vim (1:6.3-071+1sarge3) oldstable-proposed-updates; urgency=low * debian/control: - vim now Depends on vim-common >= ${Source-Version} so it's binNMU safe. * debian/rules: - Change use of $(PWD) to $(CURDIR) so the package can be built properly with sudo. oldstable/main/binary-arm/vim_6.3-071+1sarge3_arm.deb oldstable/main/binary-arm/vim-perl_6.3-071+1sarge3_arm.deb oldstable/main/binary-arm/vim-python_6.3-071+1sarge3_arm.deb oldstable/main/binary-arm/vim-ruby_6.3-071+1sarge3_arm.deb oldstable/main/binary-arm/vim-tcl_6.3-071+1sarge3_arm.deb oldstable/main/binary-arm/vim-gtk_6.3-071+1sarge3_arm.deb oldstable/main/binary-arm/vim-lesstif_6.3-071+1sarge3_arm.deb oldstable/main/binary-arm/vim-gnome_6.3-071+1sarge3_arm.deb oldstable/main/binary-arm/vim-full_6.3-071+1sarge3_arm.deb vim (1:6.3-071+1sarge3) oldstable-proposed-updates; urgency=low * debian/control: - vim now Depends on vim-common >= ${Source-Version} so it's binNMU safe. * debian/rules: - Change use of $(PWD) to $(CURDIR) so the package can be built properly with sudo. oldstable/main/binary-hppa/vim_6.3-071+1sarge3_hppa.deb oldstable/main/binary-hppa/vim-perl_6.3-071+1sarge3_hppa.deb oldstable/main/binary-hppa/vim-python_6.3-071+1sarge3_hppa.deb oldstable/main/binary-hppa/vim-ruby_6.3-071+1sarge3_hppa.deb oldstable/main/binary-hppa/vim-tcl_6.3-071+1sarge3_hppa.deb oldstable/main/binary-hppa/vim-gtk_6.3-071+1sarge3_hppa.deb oldstable/main/binary-hppa/vim-lesstif_6.3-071+1sarge3_hppa.deb oldstable/main/binary-hppa/vim-gnome_6.3-071+1sarge3_hppa.deb oldstable/main/binary-hppa/vim-full_6.3-071+1sarge3_hppa.deb vim (1:6.3-071+1sarge3) oldstable-proposed-updates; urgency=low * debian/control: - vim now Depends on vim-common >= ${Source-Version} so it's binNMU safe. * debian/rules: - Change use of $(PWD) to $(CURDIR) so the package can be built properly with sudo. oldstable/main/source/vim_6.3-071+1sarge3.dsc oldstable/main/source/vim_6.3-071+1sarge3.diff.gz oldstable/main/binary-all/vim-doc_6.3-071+1sarge3_all.deb oldstable/main/binary-all/vim-common_6.3-071+1sarge3_all.deb oldstable/main/binary-i386/vim_6.3-071+1sarge3_i386.deb oldstable/main/binary-i386/vim-perl_6.3-071+1sarge3_i386.deb oldstable/main/binary-i386/vim-python_6.3-071+1sarge3_i386.deb oldstable/main/binary-i386/vim-ruby_6.3-071+1sarge3_i386.deb oldstable/main/binary-i386/vim-tcl_6.3-071+1sarge3_i386.deb oldstable/main/binary-i386/vim-gtk_6.3-071+1sarge3_i386.deb oldstable/main/binary-i386/vim-lesstif_6.3-071+1sarge3_i386.deb oldstable/main/binary-i386/vim-gnome_6.3-071+1sarge3_i386.deb oldstable/main/binary-i386/vim-full_6.3-071+1sarge3_i386.deb vim (1:6.3-071+1sarge3) oldstable-proposed-updates; urgency=low * debian/control: - vim now Depends on vim-common >= ${Source-Version} so it's binNMU safe. * debian/rules: - Change use of $(PWD) to $(CURDIR) so the package can be built properly with sudo. oldstable/main/binary-ia64/vim_6.3-071+1sarge3_ia64.deb oldstable/main/binary-ia64/vim-perl_6.3-071+1sarge3_ia64.deb oldstable/main/binary-ia64/vim-python_6.3-071+1sarge3_ia64.deb oldstable/main/binary-ia64/vim-ruby_6.3-071+1sarge3_ia64.deb oldstable/main/binary-ia64/vim-tcl_6.3-071+1sarge3_ia64.deb oldstable/main/binary-ia64/vim-gtk_6.3-071+1sarge3_ia64.deb oldstable/main/binary-ia64/vim-lesstif_6.3-071+1sarge3_ia64.deb oldstable/main/binary-ia64/vim-gnome_6.3-071+1sarge3_ia64.deb oldstable/main/binary-ia64/vim-full_6.3-071+1sarge3_ia64.deb vim (1:6.3-071+1sarge3) oldstable-proposed-updates; urgency=low * debian/control: - vim now Depends on vim-common >= ${Source-Version} so it's binNMU safe. * debian/rules: - Change use of $(PWD) to $(CURDIR) so the package can be built properly with sudo. oldstable/main/binary-m68k/vim_6.3-071+1sarge3_m68k.deb oldstable/main/binary-m68k/vim-perl_6.3-071+1sarge3_m68k.deb oldstable/main/binary-m68k/vim-python_6.3-071+1sarge3_m68k.deb oldstable/main/binary-m68k/vim-ruby_6.3-071+1sarge3_m68k.deb oldstable/main/binary-m68k/vim-tcl_6.3-071+1sarge3_m68k.deb oldstable/main/binary-m68k/vim-gtk_6.3-071+1sarge3_m68k.deb oldstable/main/binary-m68k/vim-lesstif_6.3-071+1sarge3_m68k.deb oldstable/main/binary-m68k/vim-gnome_6.3-071+1sarge3_m68k.deb oldstable/main/binary-m68k/vim-full_6.3-071+1sarge3_m68k.deb vim (1:6.3-071+1sarge3) oldstable-proposed-updates; urgency=low * debian/control: - vim now Depends on vim-common >= ${Source-Version} so it's binNMU safe. * debian/rules: - Change use of $(PWD) to $(CURDIR) so the package can be built properly with sudo. oldstable/main/binary-mips/vim_6.3-071+1sarge3_mips.deb oldstable/main/binary-mips/vim-perl_6.3-071+1sarge3_mips.deb oldstable/main/binary-mips/vim-python_6.3-071+1sarge3_mips.deb oldstable/main/binary-mips/vim-ruby_6.3-071+1sarge3_mips.deb oldstable/main/binary-mips/vim-tcl_6.3-071+1sarge3_mips.deb oldstable/main/binary-mips/vim-gtk_6.3-071+1sarge3_mips.deb oldstable/main/binary-mips/vim-lesstif_6.3-071+1sarge3_mips.deb oldstable/main/binary-mips/vim-gnome_6.3-071+1sarge3_mips.deb oldstable/main/binary-mips/vim-full_6.3-071+1sarge3_mips.deb vim (1:6.3-071+1sarge3) oldstable-proposed-updates; urgency=low * debian/control: - vim now Depends on vim-common >= ${Source-Version} so it's binNMU safe. * debian/rules: - Change use of $(PWD) to $(CURDIR) so the package can be built properly with sudo. oldstable/main/binary-mipsel/vim_6.3-071+1sarge3_mipsel.deb oldstable/main/binary-mipsel/vim-perl_6.3-071+1sarge3_mipsel.deb oldstable/main/binary-mipsel/vim-python_6.3-071+1sarge3_mipsel.deb oldstable/main/binary-mipsel/vim-ruby_6.3-071+1sarge3_mipsel.deb oldstable/main/binary-mipsel/vim-tcl_6.3-071+1sarge3_mipsel.deb oldstable/main/binary-mipsel/vim-gtk_6.3-071+1sarge3_mipsel.deb oldstable/main/binary-mipsel/vim-lesstif_6.3-071+1sarge3_mipsel.deb oldstable/main/binary-mipsel/vim-gnome_6.3-071+1sarge3_mipsel.deb oldstable/main/binary-mipsel/vim-full_6.3-071+1sarge3_mipsel.deb vim (1:6.3-071+1sarge3) oldstable-proposed-updates; urgency=low * debian/control: - vim now Depends on vim-common >= ${Source-Version} so it's binNMU safe. * debian/rules: - Change use of $(PWD) to $(CURDIR) so the package can be built properly with sudo. oldstable/main/binary-powerpc/vim_6.3-071+1sarge3_powerpc.deb oldstable/main/binary-powerpc/vim-perl_6.3-071+1sarge3_powerpc.deb oldstable/main/binary-powerpc/vim-python_6.3-071+1sarge3_powerpc.deb oldstable/main/binary-powerpc/vim-ruby_6.3-071+1sarge3_powerpc.deb oldstable/main/binary-powerpc/vim-tcl_6.3-071+1sarge3_powerpc.deb oldstable/main/binary-powerpc/vim-gtk_6.3-071+1sarge3_powerpc.deb oldstable/main/binary-powerpc/vim-lesstif_6.3-071+1sarge3_powerpc.deb oldstable/main/binary-powerpc/vim-gnome_6.3-071+1sarge3_powerpc.deb oldstable/main/binary-powerpc/vim-full_6.3-071+1sarge3_powerpc.deb vim (1:6.3-071+1sarge3) oldstable-proposed-updates; urgency=low * debian/control: - vim now Depends on vim-common >= ${Source-Version} so it's binNMU safe. * debian/rules: - Change use of $(PWD) to $(CURDIR) so the package can be built properly with sudo. oldstable/main/binary-s390/vim_6.3-071+1sarge3_s390.deb oldstable/main/binary-s390/vim-perl_6.3-071+1sarge3_s390.deb oldstable/main/binary-s390/vim-python_6.3-071+1sarge3_s390.deb oldstable/main/binary-s390/vim-ruby_6.3-071+1sarge3_s390.deb oldstable/main/binary-s390/vim-tcl_6.3-071+1sarge3_s390.deb oldstable/main/binary-s390/vim-gtk_6.3-071+1sarge3_s390.deb oldstable/main/binary-s390/vim-lesstif_6.3-071+1sarge3_s390.deb oldstable/main/binary-s390/vim-gnome_6.3-071+1sarge3_s390.deb oldstable/main/binary-s390/vim-full_6.3-071+1sarge3_s390.deb vim (1:6.3-071+1sarge3) oldstable-proposed-updates; urgency=low * debian/control: - vim now Depends on vim-common >= ${Source-Version} so it's binNMU safe. * debian/rules: - Change use of $(PWD) to $(CURDIR) so the package can be built properly with sudo. oldstable/main/binary-sparc/vim_6.3-071+1sarge3_sparc.deb oldstable/main/binary-sparc/vim-perl_6.3-071+1sarge3_sparc.deb oldstable/main/binary-sparc/vim-python_6.3-071+1sarge3_sparc.deb oldstable/main/binary-sparc/vim-ruby_6.3-071+1sarge3_sparc.deb oldstable/main/binary-sparc/vim-tcl_6.3-071+1sarge3_sparc.deb oldstable/main/binary-sparc/vim-gtk_6.3-071+1sarge3_sparc.deb oldstable/main/binary-sparc/vim-lesstif_6.3-071+1sarge3_sparc.deb oldstable/main/binary-sparc/vim-gnome_6.3-071+1sarge3_sparc.deb oldstable/main/binary-sparc/vim-full_6.3-071+1sarge3_sparc.deb vim (1:6.3-071+1sarge3) oldstable-proposed-updates; urgency=low * debian/control: - vim now Depends on vim-common >= ${Source-Version} so it's binNMU safe. * debian/rules: - Change use of $(PWD) to $(CURDIR) so the package can be built properly with sudo. oldstable/main/binary-arm/visitors_0.4a-1_arm.deb visitors (0.4a-1) unstable; urgency=low * Initial release (closes: #303924). oldstable/main/binary-alpha/vlc_0.8.1.svn20050314-1sarge3_alpha.deb oldstable/main/binary-alpha/libvlc0-dev_0.8.1.svn20050314-1sarge3_alpha.deb oldstable/main/binary-alpha/gnome-vlc_0.8.1.svn20050314-1sarge3_alpha.deb oldstable/main/binary-alpha/gvlc_0.8.1.svn20050314-1sarge3_alpha.deb oldstable/main/binary-alpha/vlc-plugin-esd_0.8.1.svn20050314-1sarge3_alpha.deb oldstable/main/binary-alpha/vlc-plugin-alsa_0.8.1.svn20050314-1sarge3_alpha.deb oldstable/main/binary-alpha/vlc-plugin-sdl_0.8.1.svn20050314-1sarge3_alpha.deb oldstable/main/binary-alpha/vlc-plugin-ggi_0.8.1.svn20050314-1sarge3_alpha.deb oldstable/main/binary-alpha/qvlc_0.8.1.svn20050314-1sarge3_alpha.deb oldstable/main/binary-alpha/vlc-plugin-arts_0.8.1.svn20050314-1sarge3_alpha.deb oldstable/main/binary-alpha/mozilla-plugin-vlc_0.8.1.svn20050314-1sarge3_alpha.deb oldstable/main/binary-alpha/kvlc_0.8.1.svn20050314-1sarge3_alpha.deb oldstable/main/binary-alpha/wxvlc_0.8.1.svn20050314-1sarge3_alpha.deb oldstable/main/binary-alpha/vlc-alsa_0.8.1.svn20050314-1sarge3_alpha.deb oldstable/main/binary-alpha/vlc-esd_0.8.1.svn20050314-1sarge3_alpha.deb oldstable/main/binary-alpha/vlc-ggi_0.8.1.svn20050314-1sarge3_alpha.deb oldstable/main/binary-alpha/vlc-gnome_0.8.1.svn20050314-1sarge3_alpha.deb oldstable/main/binary-alpha/vlc-gtk_0.8.1.svn20050314-1sarge3_alpha.deb oldstable/main/binary-alpha/vlc-qt_0.8.1.svn20050314-1sarge3_alpha.deb oldstable/main/binary-alpha/vlc-sdl_0.8.1.svn20050314-1sarge3_alpha.deb vlc (0.8.1.svn20050314-1sarge3) oldstable-security; urgency=high * modules/codec/theora.c modules/codec/vorbis.c modules/services_discovery/sap.c: + Fix format string vulnerabilities (VideoLAN-SA-0702) (Closes: #429726). * modules/misc/svg.c: + Fix memory leaks that could cause denials of service. * modules/demux/avi/libavi.c: + Fix a buffer overflow. * modules/codec/flac.c modules/demux/wav.c modules/misc/freetype.c src/video_output/vout_subpictures.c src/audio_output/dec.c: + Fix missing checks that could cause denials of service. oldstable/main/binary-arm/vlc_0.8.1.svn20050314-1sarge3_arm.deb oldstable/main/binary-arm/libvlc0-dev_0.8.1.svn20050314-1sarge3_arm.deb oldstable/main/binary-arm/gnome-vlc_0.8.1.svn20050314-1sarge3_arm.deb oldstable/main/binary-arm/gvlc_0.8.1.svn20050314-1sarge3_arm.deb oldstable/main/binary-arm/vlc-plugin-esd_0.8.1.svn20050314-1sarge3_arm.deb oldstable/main/binary-arm/vlc-plugin-alsa_0.8.1.svn20050314-1sarge3_arm.deb oldstable/main/binary-arm/vlc-plugin-sdl_0.8.1.svn20050314-1sarge3_arm.deb oldstable/main/binary-arm/vlc-plugin-ggi_0.8.1.svn20050314-1sarge3_arm.deb oldstable/main/binary-arm/qvlc_0.8.1.svn20050314-1sarge3_arm.deb oldstable/main/binary-arm/vlc-plugin-arts_0.8.1.svn20050314-1sarge3_arm.deb oldstable/main/binary-arm/mozilla-plugin-vlc_0.8.1.svn20050314-1sarge3_arm.deb oldstable/main/binary-arm/kvlc_0.8.1.svn20050314-1sarge3_arm.deb oldstable/main/binary-arm/wxvlc_0.8.1.svn20050314-1sarge3_arm.deb oldstable/main/binary-arm/vlc-alsa_0.8.1.svn20050314-1sarge3_arm.deb oldstable/main/binary-arm/vlc-esd_0.8.1.svn20050314-1sarge3_arm.deb oldstable/main/binary-arm/vlc-ggi_0.8.1.svn20050314-1sarge3_arm.deb oldstable/main/binary-arm/vlc-gnome_0.8.1.svn20050314-1sarge3_arm.deb oldstable/main/binary-arm/vlc-gtk_0.8.1.svn20050314-1sarge3_arm.deb oldstable/main/binary-arm/vlc-qt_0.8.1.svn20050314-1sarge3_arm.deb oldstable/main/binary-arm/vlc-sdl_0.8.1.svn20050314-1sarge3_arm.deb vlc (0.8.1.svn20050314-1sarge3) oldstable-security; urgency=high * modules/codec/theora.c modules/codec/vorbis.c modules/services_discovery/sap.c: + Fix format string vulnerabilities (VideoLAN-SA-0702) (Closes: #429726). * modules/misc/svg.c: + Fix memory leaks that could cause denials of service. * modules/demux/avi/libavi.c: + Fix a buffer overflow. * modules/codec/flac.c modules/demux/wav.c modules/misc/freetype.c src/video_output/vout_subpictures.c src/audio_output/dec.c: + Fix missing checks that could cause denials of service. oldstable/main/binary-hppa/vlc_0.8.1.svn20050314-1sarge3_hppa.deb oldstable/main/binary-hppa/libvlc0-dev_0.8.1.svn20050314-1sarge3_hppa.deb oldstable/main/binary-hppa/gnome-vlc_0.8.1.svn20050314-1sarge3_hppa.deb oldstable/main/binary-hppa/gvlc_0.8.1.svn20050314-1sarge3_hppa.deb oldstable/main/binary-hppa/vlc-plugin-esd_0.8.1.svn20050314-1sarge3_hppa.deb oldstable/main/binary-hppa/vlc-plugin-alsa_0.8.1.svn20050314-1sarge3_hppa.deb oldstable/main/binary-hppa/vlc-plugin-sdl_0.8.1.svn20050314-1sarge3_hppa.deb oldstable/main/binary-hppa/vlc-plugin-ggi_0.8.1.svn20050314-1sarge3_hppa.deb oldstable/main/binary-hppa/qvlc_0.8.1.svn20050314-1sarge3_hppa.deb oldstable/main/binary-hppa/vlc-plugin-arts_0.8.1.svn20050314-1sarge3_hppa.deb oldstable/main/binary-hppa/mozilla-plugin-vlc_0.8.1.svn20050314-1sarge3_hppa.deb oldstable/main/binary-hppa/kvlc_0.8.1.svn20050314-1sarge3_hppa.deb oldstable/main/binary-hppa/wxvlc_0.8.1.svn20050314-1sarge3_hppa.deb oldstable/main/binary-hppa/vlc-alsa_0.8.1.svn20050314-1sarge3_hppa.deb oldstable/main/binary-hppa/vlc-esd_0.8.1.svn20050314-1sarge3_hppa.deb oldstable/main/binary-hppa/vlc-ggi_0.8.1.svn20050314-1sarge3_hppa.deb oldstable/main/binary-hppa/vlc-gnome_0.8.1.svn20050314-1sarge3_hppa.deb oldstable/main/binary-hppa/vlc-gtk_0.8.1.svn20050314-1sarge3_hppa.deb oldstable/main/binary-hppa/vlc-qt_0.8.1.svn20050314-1sarge3_hppa.deb oldstable/main/binary-hppa/vlc-sdl_0.8.1.svn20050314-1sarge3_hppa.deb vlc (0.8.1.svn20050314-1sarge3) oldstable-security; urgency=high * modules/codec/theora.c modules/codec/vorbis.c modules/services_discovery/sap.c: + Fix format string vulnerabilities (VideoLAN-SA-0702) (Closes: #429726). * modules/misc/svg.c: + Fix memory leaks that could cause denials of service. * modules/demux/avi/libavi.c: + Fix a buffer overflow. * modules/codec/flac.c modules/demux/wav.c modules/misc/freetype.c src/video_output/vout_subpictures.c src/audio_output/dec.c: + Fix missing checks that could cause denials of service. oldstable/main/source/vlc_0.8.1.svn20050314-1sarge3.dsc oldstable/main/source/vlc_0.8.1.svn20050314-1sarge3.diff.gz oldstable/main/binary-i386/vlc_0.8.1.svn20050314-1sarge3_i386.deb oldstable/main/binary-i386/libvlc0-dev_0.8.1.svn20050314-1sarge3_i386.deb oldstable/main/binary-i386/gnome-vlc_0.8.1.svn20050314-1sarge3_i386.deb oldstable/main/binary-i386/gvlc_0.8.1.svn20050314-1sarge3_i386.deb oldstable/main/binary-i386/vlc-plugin-esd_0.8.1.svn20050314-1sarge3_i386.deb oldstable/main/binary-i386/vlc-plugin-alsa_0.8.1.svn20050314-1sarge3_i386.deb oldstable/main/binary-i386/vlc-plugin-sdl_0.8.1.svn20050314-1sarge3_i386.deb oldstable/main/binary-i386/vlc-plugin-ggi_0.8.1.svn20050314-1sarge3_i386.deb oldstable/main/binary-i386/vlc-plugin-glide_0.8.1.svn20050314-1sarge3_i386.deb oldstable/main/binary-i386/qvlc_0.8.1.svn20050314-1sarge3_i386.deb oldstable/main/binary-i386/vlc-plugin-arts_0.8.1.svn20050314-1sarge3_i386.deb oldstable/main/binary-i386/mozilla-plugin-vlc_0.8.1.svn20050314-1sarge3_i386.deb oldstable/main/binary-i386/kvlc_0.8.1.svn20050314-1sarge3_i386.deb oldstable/main/binary-i386/vlc-plugin-svgalib_0.8.1.svn20050314-1sarge3_i386.deb oldstable/main/binary-i386/wxvlc_0.8.1.svn20050314-1sarge3_i386.deb oldstable/main/binary-i386/vlc-alsa_0.8.1.svn20050314-1sarge3_i386.deb oldstable/main/binary-i386/vlc-esd_0.8.1.svn20050314-1sarge3_i386.deb oldstable/main/binary-i386/vlc-ggi_0.8.1.svn20050314-1sarge3_i386.deb oldstable/main/binary-i386/vlc-glide_0.8.1.svn20050314-1sarge3_i386.deb oldstable/main/binary-i386/vlc-gnome_0.8.1.svn20050314-1sarge3_i386.deb oldstable/main/binary-i386/vlc-gtk_0.8.1.svn20050314-1sarge3_i386.deb oldstable/main/binary-i386/vlc-qt_0.8.1.svn20050314-1sarge3_i386.deb oldstable/main/binary-i386/vlc-sdl_0.8.1.svn20050314-1sarge3_i386.deb vlc (0.8.1.svn20050314-1sarge3) oldstable-security; urgency=high * modules/codec/theora.c modules/codec/vorbis.c modules/services_discovery/sap.c: + Fix format string vulnerabilities (VideoLAN-SA-0702) (Closes: #429726). * modules/misc/svg.c: + Fix memory leaks that could cause denials of service. * modules/demux/avi/libavi.c: + Fix a buffer overflow. * modules/codec/flac.c modules/demux/wav.c modules/misc/freetype.c src/video_output/vout_subpictures.c src/audio_output/dec.c: + Fix missing checks that could cause denials of service. oldstable/main/binary-ia64/vlc_0.8.1.svn20050314-1sarge3_ia64.deb oldstable/main/binary-ia64/libvlc0-dev_0.8.1.svn20050314-1sarge3_ia64.deb oldstable/main/binary-ia64/gnome-vlc_0.8.1.svn20050314-1sarge3_ia64.deb oldstable/main/binary-ia64/gvlc_0.8.1.svn20050314-1sarge3_ia64.deb oldstable/main/binary-ia64/vlc-plugin-esd_0.8.1.svn20050314-1sarge3_ia64.deb oldstable/main/binary-ia64/vlc-plugin-alsa_0.8.1.svn20050314-1sarge3_ia64.deb oldstable/main/binary-ia64/vlc-plugin-sdl_0.8.1.svn20050314-1sarge3_ia64.deb oldstable/main/binary-ia64/vlc-plugin-ggi_0.8.1.svn20050314-1sarge3_ia64.deb oldstable/main/binary-ia64/qvlc_0.8.1.svn20050314-1sarge3_ia64.deb oldstable/main/binary-ia64/vlc-plugin-arts_0.8.1.svn20050314-1sarge3_ia64.deb oldstable/main/binary-ia64/mozilla-plugin-vlc_0.8.1.svn20050314-1sarge3_ia64.deb oldstable/main/binary-ia64/kvlc_0.8.1.svn20050314-1sarge3_ia64.deb oldstable/main/binary-ia64/wxvlc_0.8.1.svn20050314-1sarge3_ia64.deb oldstable/main/binary-ia64/vlc-alsa_0.8.1.svn20050314-1sarge3_ia64.deb oldstable/main/binary-ia64/vlc-esd_0.8.1.svn20050314-1sarge3_ia64.deb oldstable/main/binary-ia64/vlc-ggi_0.8.1.svn20050314-1sarge3_ia64.deb oldstable/main/binary-ia64/vlc-gnome_0.8.1.svn20050314-1sarge3_ia64.deb oldstable/main/binary-ia64/vlc-gtk_0.8.1.svn20050314-1sarge3_ia64.deb oldstable/main/binary-ia64/vlc-qt_0.8.1.svn20050314-1sarge3_ia64.deb oldstable/main/binary-ia64/vlc-sdl_0.8.1.svn20050314-1sarge3_ia64.deb vlc (0.8.1.svn20050314-1sarge3) oldstable-security; urgency=high * modules/codec/theora.c modules/codec/vorbis.c modules/services_discovery/sap.c: + Fix format string vulnerabilities (VideoLAN-SA-0702) (Closes: #429726). * modules/misc/svg.c: + Fix memory leaks that could cause denials of service. * modules/demux/avi/libavi.c: + Fix a buffer overflow. * modules/codec/flac.c modules/demux/wav.c modules/misc/freetype.c src/video_output/vout_subpictures.c src/audio_output/dec.c: + Fix missing checks that could cause denials of service. oldstable/main/binary-m68k/vlc_0.8.1.svn20050314-1sarge3_m68k.deb oldstable/main/binary-m68k/libvlc0-dev_0.8.1.svn20050314-1sarge3_m68k.deb oldstable/main/binary-m68k/gnome-vlc_0.8.1.svn20050314-1sarge3_m68k.deb oldstable/main/binary-m68k/gvlc_0.8.1.svn20050314-1sarge3_m68k.deb oldstable/main/binary-m68k/vlc-plugin-esd_0.8.1.svn20050314-1sarge3_m68k.deb oldstable/main/binary-m68k/vlc-plugin-alsa_0.8.1.svn20050314-1sarge3_m68k.deb oldstable/main/binary-m68k/vlc-plugin-sdl_0.8.1.svn20050314-1sarge3_m68k.deb oldstable/main/binary-m68k/vlc-plugin-ggi_0.8.1.svn20050314-1sarge3_m68k.deb oldstable/main/binary-m68k/qvlc_0.8.1.svn20050314-1sarge3_m68k.deb oldstable/main/binary-m68k/vlc-plugin-arts_0.8.1.svn20050314-1sarge3_m68k.deb oldstable/main/binary-m68k/mozilla-plugin-vlc_0.8.1.svn20050314-1sarge3_m68k.deb oldstable/main/binary-m68k/kvlc_0.8.1.svn20050314-1sarge3_m68k.deb oldstable/main/binary-m68k/wxvlc_0.8.1.svn20050314-1sarge3_m68k.deb oldstable/main/binary-m68k/vlc-alsa_0.8.1.svn20050314-1sarge3_m68k.deb oldstable/main/binary-m68k/vlc-esd_0.8.1.svn20050314-1sarge3_m68k.deb oldstable/main/binary-m68k/vlc-ggi_0.8.1.svn20050314-1sarge3_m68k.deb oldstable/main/binary-m68k/vlc-gnome_0.8.1.svn20050314-1sarge3_m68k.deb oldstable/main/binary-m68k/vlc-gtk_0.8.1.svn20050314-1sarge3_m68k.deb oldstable/main/binary-m68k/vlc-qt_0.8.1.svn20050314-1sarge3_m68k.deb oldstable/main/binary-m68k/vlc-sdl_0.8.1.svn20050314-1sarge3_m68k.deb vlc (0.8.1.svn20050314-1sarge3) oldstable-security; urgency=high * modules/codec/theora.c modules/codec/vorbis.c modules/services_discovery/sap.c: + Fix format string vulnerabilities (VideoLAN-SA-0702) (Closes: #429726). * modules/misc/svg.c: + Fix memory leaks that could cause denials of service. * modules/demux/avi/libavi.c: + Fix a buffer overflow. * modules/codec/flac.c modules/demux/wav.c modules/misc/freetype.c src/video_output/vout_subpictures.c src/audio_output/dec.c: + Fix missing checks that could cause denials of service. oldstable/main/binary-mips/vlc_0.8.1.svn20050314-1sarge3_mips.deb oldstable/main/binary-mips/libvlc0-dev_0.8.1.svn20050314-1sarge3_mips.deb oldstable/main/binary-mips/gnome-vlc_0.8.1.svn20050314-1sarge3_mips.deb oldstable/main/binary-mips/gvlc_0.8.1.svn20050314-1sarge3_mips.deb oldstable/main/binary-mips/vlc-plugin-esd_0.8.1.svn20050314-1sarge3_mips.deb oldstable/main/binary-mips/vlc-plugin-alsa_0.8.1.svn20050314-1sarge3_mips.deb oldstable/main/binary-mips/vlc-plugin-sdl_0.8.1.svn20050314-1sarge3_mips.deb oldstable/main/binary-mips/vlc-plugin-ggi_0.8.1.svn20050314-1sarge3_mips.deb oldstable/main/binary-mips/qvlc_0.8.1.svn20050314-1sarge3_mips.deb oldstable/main/binary-mips/vlc-plugin-arts_0.8.1.svn20050314-1sarge3_mips.deb oldstable/main/binary-mips/mozilla-plugin-vlc_0.8.1.svn20050314-1sarge3_mips.deb oldstable/main/binary-mips/kvlc_0.8.1.svn20050314-1sarge3_mips.deb oldstable/main/binary-mips/wxvlc_0.8.1.svn20050314-1sarge3_mips.deb oldstable/main/binary-mips/vlc-alsa_0.8.1.svn20050314-1sarge3_mips.deb oldstable/main/binary-mips/vlc-esd_0.8.1.svn20050314-1sarge3_mips.deb oldstable/main/binary-mips/vlc-ggi_0.8.1.svn20050314-1sarge3_mips.deb oldstable/main/binary-mips/vlc-gnome_0.8.1.svn20050314-1sarge3_mips.deb oldstable/main/binary-mips/vlc-gtk_0.8.1.svn20050314-1sarge3_mips.deb oldstable/main/binary-mips/vlc-qt_0.8.1.svn20050314-1sarge3_mips.deb oldstable/main/binary-mips/vlc-sdl_0.8.1.svn20050314-1sarge3_mips.deb vlc (0.8.1.svn20050314-1sarge3) oldstable-security; urgency=high * modules/codec/theora.c modules/codec/vorbis.c modules/services_discovery/sap.c: + Fix format string vulnerabilities (VideoLAN-SA-0702) (Closes: #429726). * modules/misc/svg.c: + Fix memory leaks that could cause denials of service. * modules/demux/avi/libavi.c: + Fix a buffer overflow. * modules/codec/flac.c modules/demux/wav.c modules/misc/freetype.c src/video_output/vout_subpictures.c src/audio_output/dec.c: + Fix missing checks that could cause denials of service. oldstable/main/binary-mipsel/vlc_0.8.1.svn20050314-1sarge3_mipsel.deb oldstable/main/binary-mipsel/libvlc0-dev_0.8.1.svn20050314-1sarge3_mipsel.deb oldstable/main/binary-mipsel/gnome-vlc_0.8.1.svn20050314-1sarge3_mipsel.deb oldstable/main/binary-mipsel/gvlc_0.8.1.svn20050314-1sarge3_mipsel.deb oldstable/main/binary-mipsel/vlc-plugin-esd_0.8.1.svn20050314-1sarge3_mipsel.deb oldstable/main/binary-mipsel/vlc-plugin-alsa_0.8.1.svn20050314-1sarge3_mipsel.deb oldstable/main/binary-mipsel/vlc-plugin-sdl_0.8.1.svn20050314-1sarge3_mipsel.deb oldstable/main/binary-mipsel/vlc-plugin-ggi_0.8.1.svn20050314-1sarge3_mipsel.deb oldstable/main/binary-mipsel/qvlc_0.8.1.svn20050314-1sarge3_mipsel.deb oldstable/main/binary-mipsel/vlc-plugin-arts_0.8.1.svn20050314-1sarge3_mipsel.deb oldstable/main/binary-mipsel/mozilla-plugin-vlc_0.8.1.svn20050314-1sarge3_mipsel.deb oldstable/main/binary-mipsel/kvlc_0.8.1.svn20050314-1sarge3_mipsel.deb oldstable/main/binary-mipsel/wxvlc_0.8.1.svn20050314-1sarge3_mipsel.deb oldstable/main/binary-mipsel/vlc-alsa_0.8.1.svn20050314-1sarge3_mipsel.deb oldstable/main/binary-mipsel/vlc-esd_0.8.1.svn20050314-1sarge3_mipsel.deb oldstable/main/binary-mipsel/vlc-ggi_0.8.1.svn20050314-1sarge3_mipsel.deb oldstable/main/binary-mipsel/vlc-gnome_0.8.1.svn20050314-1sarge3_mipsel.deb oldstable/main/binary-mipsel/vlc-gtk_0.8.1.svn20050314-1sarge3_mipsel.deb oldstable/main/binary-mipsel/vlc-qt_0.8.1.svn20050314-1sarge3_mipsel.deb oldstable/main/binary-mipsel/vlc-sdl_0.8.1.svn20050314-1sarge3_mipsel.deb vlc (0.8.1.svn20050314-1sarge3) oldstable-security; urgency=high * modules/codec/theora.c modules/codec/vorbis.c modules/services_discovery/sap.c: + Fix format string vulnerabilities (VideoLAN-SA-0702) (Closes: #429726). * modules/misc/svg.c: + Fix memory leaks that could cause denials of service. * modules/demux/avi/libavi.c: + Fix a buffer overflow. * modules/codec/flac.c modules/demux/wav.c modules/misc/freetype.c src/video_output/vout_subpictures.c src/audio_output/dec.c: + Fix missing checks that could cause denials of service. oldstable/main/binary-powerpc/vlc_0.8.1.svn20050314-1sarge3_powerpc.deb oldstable/main/binary-powerpc/libvlc0-dev_0.8.1.svn20050314-1sarge3_powerpc.deb oldstable/main/binary-powerpc/gnome-vlc_0.8.1.svn20050314-1sarge3_powerpc.deb oldstable/main/binary-powerpc/gvlc_0.8.1.svn20050314-1sarge3_powerpc.deb oldstable/main/binary-powerpc/vlc-plugin-esd_0.8.1.svn20050314-1sarge3_powerpc.deb oldstable/main/binary-powerpc/vlc-plugin-alsa_0.8.1.svn20050314-1sarge3_powerpc.deb oldstable/main/binary-powerpc/vlc-plugin-sdl_0.8.1.svn20050314-1sarge3_powerpc.deb oldstable/main/binary-powerpc/vlc-plugin-ggi_0.8.1.svn20050314-1sarge3_powerpc.deb oldstable/main/binary-powerpc/qvlc_0.8.1.svn20050314-1sarge3_powerpc.deb oldstable/main/binary-powerpc/vlc-plugin-arts_0.8.1.svn20050314-1sarge3_powerpc.deb oldstable/main/binary-powerpc/mozilla-plugin-vlc_0.8.1.svn20050314-1sarge3_powerpc.deb oldstable/main/binary-powerpc/kvlc_0.8.1.svn20050314-1sarge3_powerpc.deb oldstable/main/binary-powerpc/wxvlc_0.8.1.svn20050314-1sarge3_powerpc.deb oldstable/main/binary-powerpc/vlc-alsa_0.8.1.svn20050314-1sarge3_powerpc.deb oldstable/main/binary-powerpc/vlc-esd_0.8.1.svn20050314-1sarge3_powerpc.deb oldstable/main/binary-powerpc/vlc-ggi_0.8.1.svn20050314-1sarge3_powerpc.deb oldstable/main/binary-powerpc/vlc-gnome_0.8.1.svn20050314-1sarge3_powerpc.deb oldstable/main/binary-powerpc/vlc-gtk_0.8.1.svn20050314-1sarge3_powerpc.deb oldstable/main/binary-powerpc/vlc-qt_0.8.1.svn20050314-1sarge3_powerpc.deb oldstable/main/binary-powerpc/vlc-sdl_0.8.1.svn20050314-1sarge3_powerpc.deb vlc (0.8.1.svn20050314-1sarge3) oldstable-security; urgency=high * modules/codec/theora.c modules/codec/vorbis.c modules/services_discovery/sap.c: + Fix format string vulnerabilities (VideoLAN-SA-0702) (Closes: #429726). * modules/misc/svg.c: + Fix memory leaks that could cause denials of service. * modules/demux/avi/libavi.c: + Fix a buffer overflow. * modules/codec/flac.c modules/demux/wav.c modules/misc/freetype.c src/video_output/vout_subpictures.c src/audio_output/dec.c: + Fix missing checks that could cause denials of service. oldstable/main/binary-s390/vlc_0.8.1.svn20050314-1sarge3_s390.deb oldstable/main/binary-s390/libvlc0-dev_0.8.1.svn20050314-1sarge3_s390.deb oldstable/main/binary-s390/gnome-vlc_0.8.1.svn20050314-1sarge3_s390.deb oldstable/main/binary-s390/gvlc_0.8.1.svn20050314-1sarge3_s390.deb oldstable/main/binary-s390/vlc-plugin-esd_0.8.1.svn20050314-1sarge3_s390.deb oldstable/main/binary-s390/vlc-plugin-alsa_0.8.1.svn20050314-1sarge3_s390.deb oldstable/main/binary-s390/vlc-plugin-sdl_0.8.1.svn20050314-1sarge3_s390.deb oldstable/main/binary-s390/vlc-plugin-ggi_0.8.1.svn20050314-1sarge3_s390.deb oldstable/main/binary-s390/qvlc_0.8.1.svn20050314-1sarge3_s390.deb oldstable/main/binary-s390/vlc-plugin-arts_0.8.1.svn20050314-1sarge3_s390.deb oldstable/main/binary-s390/mozilla-plugin-vlc_0.8.1.svn20050314-1sarge3_s390.deb oldstable/main/binary-s390/kvlc_0.8.1.svn20050314-1sarge3_s390.deb oldstable/main/binary-s390/wxvlc_0.8.1.svn20050314-1sarge3_s390.deb oldstable/main/binary-s390/vlc-alsa_0.8.1.svn20050314-1sarge3_s390.deb oldstable/main/binary-s390/vlc-esd_0.8.1.svn20050314-1sarge3_s390.deb oldstable/main/binary-s390/vlc-ggi_0.8.1.svn20050314-1sarge3_s390.deb oldstable/main/binary-s390/vlc-gnome_0.8.1.svn20050314-1sarge3_s390.deb oldstable/main/binary-s390/vlc-gtk_0.8.1.svn20050314-1sarge3_s390.deb oldstable/main/binary-s390/vlc-qt_0.8.1.svn20050314-1sarge3_s390.deb oldstable/main/binary-s390/vlc-sdl_0.8.1.svn20050314-1sarge3_s390.deb vlc (0.8.1.svn20050314-1sarge3) oldstable-security; urgency=high * modules/codec/theora.c modules/codec/vorbis.c modules/services_discovery/sap.c: + Fix format string vulnerabilities (VideoLAN-SA-0702) (Closes: #429726). * modules/misc/svg.c: + Fix memory leaks that could cause denials of service. * modules/demux/avi/libavi.c: + Fix a buffer overflow. * modules/codec/flac.c modules/demux/wav.c modules/misc/freetype.c src/video_output/vout_subpictures.c src/audio_output/dec.c: + Fix missing checks that could cause denials of service. oldstable/main/binary-sparc/vlc_0.8.1.svn20050314-1sarge3_sparc.deb oldstable/main/binary-sparc/libvlc0-dev_0.8.1.svn20050314-1sarge3_sparc.deb oldstable/main/binary-sparc/gnome-vlc_0.8.1.svn20050314-1sarge3_sparc.deb oldstable/main/binary-sparc/gvlc_0.8.1.svn20050314-1sarge3_sparc.deb oldstable/main/binary-sparc/vlc-plugin-esd_0.8.1.svn20050314-1sarge3_sparc.deb oldstable/main/binary-sparc/vlc-plugin-alsa_0.8.1.svn20050314-1sarge3_sparc.deb oldstable/main/binary-sparc/vlc-plugin-sdl_0.8.1.svn20050314-1sarge3_sparc.deb oldstable/main/binary-sparc/vlc-plugin-ggi_0.8.1.svn20050314-1sarge3_sparc.deb oldstable/main/binary-sparc/qvlc_0.8.1.svn20050314-1sarge3_sparc.deb oldstable/main/binary-sparc/vlc-plugin-arts_0.8.1.svn20050314-1sarge3_sparc.deb oldstable/main/binary-sparc/mozilla-plugin-vlc_0.8.1.svn20050314-1sarge3_sparc.deb oldstable/main/binary-sparc/kvlc_0.8.1.svn20050314-1sarge3_sparc.deb oldstable/main/binary-sparc/wxvlc_0.8.1.svn20050314-1sarge3_sparc.deb oldstable/main/binary-sparc/vlc-alsa_0.8.1.svn20050314-1sarge3_sparc.deb oldstable/main/binary-sparc/vlc-esd_0.8.1.svn20050314-1sarge3_sparc.deb oldstable/main/binary-sparc/vlc-ggi_0.8.1.svn20050314-1sarge3_sparc.deb oldstable/main/binary-sparc/vlc-gnome_0.8.1.svn20050314-1sarge3_sparc.deb oldstable/main/binary-sparc/vlc-gtk_0.8.1.svn20050314-1sarge3_sparc.deb oldstable/main/binary-sparc/vlc-qt_0.8.1.svn20050314-1sarge3_sparc.deb oldstable/main/binary-sparc/vlc-sdl_0.8.1.svn20050314-1sarge3_sparc.deb vlc (0.8.1.svn20050314-1sarge3) oldstable-security; urgency=high * modules/codec/theora.c modules/codec/vorbis.c modules/services_discovery/sap.c: + Fix format string vulnerabilities (VideoLAN-SA-0702) (Closes: #429726). * modules/misc/svg.c: + Fix memory leaks that could cause denials of service. * modules/demux/avi/libavi.c: + Fix a buffer overflow. * modules/codec/flac.c modules/demux/wav.c modules/misc/freetype.c src/video_output/vout_subpictures.c src/audio_output/dec.c: + Fix missing checks that could cause denials of service. oldstable/main/source/webcalendar_0.9.45-4sarge7.dsc oldstable/main/source/webcalendar_0.9.45-4sarge7.diff.gz oldstable/main/binary-all/webcalendar_0.9.45-4sarge7_all.deb webcalendar (0.9.45-4sarge7) oldstable-security; urgency=high * Security upload by the current co-maintainer team (Elizabeth Bevilacqua and Rafael Laboissiere) * Fixes cross-site scripting (XSS) vulnerability in export_handler.php that allows remote attackers to inject arbitrary web script or HTML via the format parameter [CVE-2006-6669]. Thanks to Thijs Kinkhorst. * The previous security releases included fixes for CVE-2005-2320 (assistant_edit.php unauthorized access vulnerability) and CVE-2007-1483 (execute arbitrary PHP code via a URL in the includedir parameter, file includes/config.php) oldstable/main/binary-alpha/wesnoth_0.9.0-6_alpha.deb oldstable/main/binary-alpha/wesnoth-server_0.9.0-6_alpha.deb oldstable/main/binary-alpha/wesnoth-editor_0.9.0-6_alpha.deb wesnoth (0.9.0-6) oldstable-security; urgency=high * Fix insecure truncate of a multibyte chat message that can lead to invalid utf-8 and throw an uncaught exception. Both wesnoth client and server are affected [CVE-2007-3917]. Patch 03_CVE-2007-3917 was pulled from upstream svn (revisions 20786, 20802, 20809, 20862). oldstable/main/binary-amd64/wesnoth_0.9.0-6_amd64.deb oldstable/main/binary-amd64/wesnoth-server_0.9.0-6_amd64.deb oldstable/main/binary-amd64/wesnoth-editor_0.9.0-6_amd64.deb wesnoth (0.9.0-6) oldstable-security; urgency=high * Fix insecure truncate of a multibyte chat message that can lead to invalid utf-8 and throw an uncaught exception. Both wesnoth client and server are affected [CVE-2007-3917]. Patch 03_CVE-2007-3917 was pulled from upstream svn (revisions 20786, 20802, 20809, 20862). oldstable/main/binary-arm/wesnoth_0.9.0-6_arm.deb oldstable/main/binary-arm/wesnoth-server_0.9.0-6_arm.deb oldstable/main/binary-arm/wesnoth-editor_0.9.0-6_arm.deb wesnoth (0.9.0-6) oldstable-security; urgency=high * Fix insecure truncate of a multibyte chat message that can lead to invalid utf-8 and throw an uncaught exception. Both wesnoth client and server are affected [CVE-2007-3917]. Patch 03_CVE-2007-3917 was pulled from upstream svn (revisions 20786, 20802, 20809, 20862). oldstable/main/binary-hppa/wesnoth_0.9.0-6_hppa.deb oldstable/main/binary-hppa/wesnoth-server_0.9.0-6_hppa.deb oldstable/main/binary-hppa/wesnoth-editor_0.9.0-6_hppa.deb wesnoth (0.9.0-6) oldstable-security; urgency=high * Fix insecure truncate of a multibyte chat message that can lead to invalid utf-8 and throw an uncaught exception. Both wesnoth client and server are affected [CVE-2007-3917]. Patch 03_CVE-2007-3917 was pulled from upstream svn (revisions 20786, 20802, 20809, 20862). oldstable/main/binary-i386/wesnoth_0.9.0-6_i386.deb oldstable/main/binary-i386/wesnoth-server_0.9.0-6_i386.deb oldstable/main/binary-i386/wesnoth-editor_0.9.0-6_i386.deb wesnoth (0.9.0-6) oldstable-security; urgency=high * Fix insecure truncate of a multibyte chat message that can lead to invalid utf-8 and throw an uncaught exception. Both wesnoth client and server are affected [CVE-2007-3917]. Patch 03_CVE-2007-3917 was pulled from upstream svn (revisions 20786, 20802, 20809, 20862). oldstable/main/binary-ia64/wesnoth_0.9.0-6_ia64.deb oldstable/main/binary-ia64/wesnoth-server_0.9.0-6_ia64.deb oldstable/main/binary-ia64/wesnoth-editor_0.9.0-6_ia64.deb wesnoth (0.9.0-6) oldstable-security; urgency=high * Fix insecure truncate of a multibyte chat message that can lead to invalid utf-8 and throw an uncaught exception. Both wesnoth client and server are affected [CVE-2007-3917]. Patch 03_CVE-2007-3917 was pulled from upstream svn (revisions 20786, 20802, 20809, 20862). oldstable/main/binary-m68k/wesnoth_0.9.0-6_m68k.deb oldstable/main/binary-m68k/wesnoth-server_0.9.0-6_m68k.deb oldstable/main/binary-m68k/wesnoth-editor_0.9.0-6_m68k.deb wesnoth (0.9.0-6) oldstable-security; urgency=high * Fix insecure truncate of a multibyte chat message that can lead to invalid utf-8 and throw an uncaught exception. Both wesnoth client and server are affected [CVE-2007-3917]. Patch 03_CVE-2007-3917 was pulled from upstream svn (revisions 20786, 20802, 20809, 20862). oldstable/main/binary-mips/wesnoth_0.9.0-6_mips.deb oldstable/main/binary-mips/wesnoth-server_0.9.0-6_mips.deb oldstable/main/binary-mips/wesnoth-editor_0.9.0-6_mips.deb wesnoth (0.9.0-6) oldstable-security; urgency=high * Fix insecure truncate of a multibyte chat message that can lead to invalid utf-8 and throw an uncaught exception. Both wesnoth client and server are affected [CVE-2007-3917]. Patch 03_CVE-2007-3917 was pulled from upstream svn (revisions 20786, 20802, 20809, 20862). oldstable/main/binary-mipsel/wesnoth_0.9.0-6_mipsel.deb oldstable/main/binary-mipsel/wesnoth-server_0.9.0-6_mipsel.deb oldstable/main/binary-mipsel/wesnoth-editor_0.9.0-6_mipsel.deb wesnoth (0.9.0-6) oldstable-security; urgency=high * Fix insecure truncate of a multibyte chat message that can lead to invalid utf-8 and throw an uncaught exception. Both wesnoth client and server are affected [CVE-2007-3917]. Patch 03_CVE-2007-3917 was pulled from upstream svn (revisions 20786, 20802, 20809, 20862). oldstable/main/source/wesnoth_0.9.0-6.dsc oldstable/main/source/wesnoth_0.9.0-6.diff.gz oldstable/main/source/wesnoth_0.9.0.orig.tar.gz oldstable/main/binary-all/wesnoth-data_0.9.0-6_all.deb oldstable/main/binary-all/wesnoth-music_0.9.0-6_all.deb oldstable/main/binary-all/wesnoth-httt_0.9.0-6_all.deb oldstable/main/binary-all/wesnoth-trow_0.9.0-6_all.deb oldstable/main/binary-all/wesnoth-tdh_0.9.0-6_all.deb oldstable/main/binary-all/wesnoth-ei_0.9.0-6_all.deb oldstable/main/binary-all/wesnoth-sotbe_0.9.0-6_all.deb oldstable/main/binary-powerpc/wesnoth_0.9.0-6_powerpc.deb oldstable/main/binary-powerpc/wesnoth-server_0.9.0-6_powerpc.deb oldstable/main/binary-powerpc/wesnoth-editor_0.9.0-6_powerpc.deb wesnoth (0.9.0-6) oldstable-security; urgency=high * Fix insecure truncate of a multibyte chat message that can lead to invalid utf-8 and throw an uncaught exception. Both wesnoth client and server are affected [CVE-2007-3917]. Patch 03_CVE-2007-3917 was pulled from upstream svn (revisions 20786, 20802, 20809, 20862). oldstable/main/binary-s390/wesnoth_0.9.0-6_s390.deb oldstable/main/binary-s390/wesnoth-server_0.9.0-6_s390.deb oldstable/main/binary-s390/wesnoth-editor_0.9.0-6_s390.deb wesnoth (0.9.0-6) oldstable-security; urgency=high * Fix insecure truncate of a multibyte chat message that can lead to invalid utf-8 and throw an uncaught exception. Both wesnoth client and server are affected [CVE-2007-3917]. Patch 03_CVE-2007-3917 was pulled from upstream svn (revisions 20786, 20802, 20809, 20862). oldstable/main/binary-sparc/wesnoth_0.9.0-6_sparc.deb oldstable/main/binary-sparc/wesnoth-server_0.9.0-6_sparc.deb oldstable/main/binary-sparc/wesnoth-editor_0.9.0-6_sparc.deb wesnoth (0.9.0-6) oldstable-security; urgency=high * Fix insecure truncate of a multibyte chat message that can lead to invalid utf-8 and throw an uncaught exception. Both wesnoth client and server are affected [CVE-2007-3917]. Patch 03_CVE-2007-3917 was pulled from upstream svn (revisions 20786, 20802, 20809, 20862). oldstable/main/binary-alpha/wesnoth_0.9.0-7_alpha.deb oldstable/main/binary-alpha/wesnoth-server_0.9.0-7_alpha.deb oldstable/main/binary-alpha/wesnoth-editor_0.9.0-7_alpha.deb wesnoth (0.9.0-7) oldstable-security; urgency=medium * Ignore filenames that contain .. to not send arbitrary files around in multiplayer missions [CVE-2007-5742]. Patch 04_CVE-2007-5742 was pulled from upstream svn (revision 21904). oldstable/main/binary-amd64/wesnoth_0.9.0-7_amd64.deb oldstable/main/binary-amd64/wesnoth-server_0.9.0-7_amd64.deb oldstable/main/binary-amd64/wesnoth-editor_0.9.0-7_amd64.deb wesnoth (0.9.0-7) oldstable-security; urgency=medium * Ignore filenames that contain .. to not send arbitrary files around in multiplayer missions [CVE-2007-5742]. Patch 04_CVE-2007-5742 was pulled from upstream svn (revision 21904). oldstable/main/binary-arm/wesnoth_0.9.0-7_arm.deb oldstable/main/binary-arm/wesnoth-server_0.9.0-7_arm.deb oldstable/main/binary-arm/wesnoth-editor_0.9.0-7_arm.deb wesnoth (0.9.0-7) oldstable-security; urgency=medium * Ignore filenames that contain .. to not send arbitrary files around in multiplayer missions [CVE-2007-5742]. Patch 04_CVE-2007-5742 was pulled from upstream svn (revision 21904). oldstable/main/binary-hppa/wesnoth_0.9.0-7_hppa.deb oldstable/main/binary-hppa/wesnoth-server_0.9.0-7_hppa.deb oldstable/main/binary-hppa/wesnoth-editor_0.9.0-7_hppa.deb wesnoth (0.9.0-7) oldstable-security; urgency=medium * Ignore filenames that contain .. to not send arbitrary files around in multiplayer missions [CVE-2007-5742]. Patch 04_CVE-2007-5742 was pulled from upstream svn (revision 21904). oldstable/main/binary-i386/wesnoth_0.9.0-7_i386.deb oldstable/main/binary-i386/wesnoth-server_0.9.0-7_i386.deb oldstable/main/binary-i386/wesnoth-editor_0.9.0-7_i386.deb wesnoth (0.9.0-7) oldstable-security; urgency=medium * Ignore filenames that contain .. to not send arbitrary files around in multiplayer missions [CVE-2007-5742]. Patch 04_CVE-2007-5742 was pulled from upstream svn (revision 21904). oldstable/main/binary-ia64/wesnoth_0.9.0-7_ia64.deb oldstable/main/binary-ia64/wesnoth-server_0.9.0-7_ia64.deb oldstable/main/binary-ia64/wesnoth-editor_0.9.0-7_ia64.deb wesnoth (0.9.0-7) oldstable-security; urgency=medium * Ignore filenames that contain .. to not send arbitrary files around in multiplayer missions [CVE-2007-5742]. Patch 04_CVE-2007-5742 was pulled from upstream svn (revision 21904). oldstable/main/binary-m68k/wesnoth_0.9.0-7_m68k.deb oldstable/main/binary-m68k/wesnoth-server_0.9.0-7_m68k.deb oldstable/main/binary-m68k/wesnoth-editor_0.9.0-7_m68k.deb wesnoth (0.9.0-7) oldstable-security; urgency=medium * Ignore filenames that contain .. to not send arbitrary files around in multiplayer missions [CVE-2007-5742]. Patch 04_CVE-2007-5742 was pulled from upstream svn (revision 21904). oldstable/main/binary-mips/wesnoth_0.9.0-7_mips.deb oldstable/main/binary-mips/wesnoth-server_0.9.0-7_mips.deb oldstable/main/binary-mips/wesnoth-editor_0.9.0-7_mips.deb wesnoth (0.9.0-7) oldstable-security; urgency=medium * Ignore filenames that contain .. to not send arbitrary files around in multiplayer missions [CVE-2007-5742]. Patch 04_CVE-2007-5742 was pulled from upstream svn (revision 21904). oldstable/main/binary-mipsel/wesnoth_0.9.0-7_mipsel.deb oldstable/main/binary-mipsel/wesnoth-server_0.9.0-7_mipsel.deb oldstable/main/binary-mipsel/wesnoth-editor_0.9.0-7_mipsel.deb wesnoth (0.9.0-7) oldstable-security; urgency=medium * Ignore filenames that contain .. to not send arbitrary files around in multiplayer missions [CVE-2007-5742]. Patch 04_CVE-2007-5742 was pulled from upstream svn (revision 21904). oldstable/main/source/wesnoth_0.9.0-7.dsc oldstable/main/source/wesnoth_0.9.0-7.diff.gz oldstable/main/binary-all/wesnoth-data_0.9.0-7_all.deb oldstable/main/binary-all/wesnoth-music_0.9.0-7_all.deb oldstable/main/binary-all/wesnoth-httt_0.9.0-7_all.deb oldstable/main/binary-all/wesnoth-trow_0.9.0-7_all.deb oldstable/main/binary-all/wesnoth-tdh_0.9.0-7_all.deb oldstable/main/binary-all/wesnoth-ei_0.9.0-7_all.deb oldstable/main/binary-all/wesnoth-sotbe_0.9.0-7_all.deb oldstable/main/binary-powerpc/wesnoth_0.9.0-7_powerpc.deb oldstable/main/binary-powerpc/wesnoth-server_0.9.0-7_powerpc.deb oldstable/main/binary-powerpc/wesnoth-editor_0.9.0-7_powerpc.deb wesnoth (0.9.0-7) oldstable-security; urgency=medium * Ignore filenames that contain .. to not send arbitrary files around in multiplayer missions [CVE-2007-5742]. Patch 04_CVE-2007-5742 was pulled from upstream svn (revision 21904). oldstable/main/binary-s390/wesnoth_0.9.0-7_s390.deb oldstable/main/binary-s390/wesnoth-server_0.9.0-7_s390.deb oldstable/main/binary-s390/wesnoth-editor_0.9.0-7_s390.deb wesnoth (0.9.0-7) oldstable-security; urgency=medium * Ignore filenames that contain .. to not send arbitrary files around in multiplayer missions [CVE-2007-5742]. Patch 04_CVE-2007-5742 was pulled from upstream svn (revision 21904). oldstable/main/binary-sparc/wesnoth_0.9.0-7_sparc.deb oldstable/main/binary-sparc/wesnoth-server_0.9.0-7_sparc.deb oldstable/main/binary-sparc/wesnoth-editor_0.9.0-7_sparc.deb wesnoth (0.9.0-7) oldstable-security; urgency=medium * Ignore filenames that contain .. to not send arbitrary files around in multiplayer missions [CVE-2007-5742]. Patch 04_CVE-2007-5742 was pulled from upstream svn (revision 21904). oldstable/main/binary-alpha/wesnoth_0.9.0-8_alpha.deb oldstable/main/binary-alpha/wesnoth-server_0.9.0-8_alpha.deb oldstable/main/binary-alpha/wesnoth-editor_0.9.0-8_alpha.deb wesnoth (0.9.0-8) oldstable; urgency=low * Remove WML turn_cmd which can lead to forking yes and through that 100% CPU usage and stdout filling [CVE-2007-6201]. Patch 05_CVE-2007-6201 was pulled from upstream svn (revision 21907). oldstable/main/binary-hppa/wesnoth_0.9.0-8_hppa.deb oldstable/main/binary-hppa/wesnoth-server_0.9.0-8_hppa.deb oldstable/main/binary-hppa/wesnoth-editor_0.9.0-8_hppa.deb wesnoth (0.9.0-8) oldstable; urgency=low * Remove WML turn_cmd which can lead to forking yes and through that 100% CPU usage and stdout filling [CVE-2007-6201]. Patch 05_CVE-2007-6201 was pulled from upstream svn (revision 21907). oldstable/main/binary-i386/wesnoth_0.9.0-8_i386.deb oldstable/main/binary-i386/wesnoth-server_0.9.0-8_i386.deb oldstable/main/binary-i386/wesnoth-editor_0.9.0-8_i386.deb wesnoth (0.9.0-8) oldstable; urgency=low * Remove WML turn_cmd which can lead to forking yes and through that 100% CPU usage and stdout filling [CVE-2007-6201]. Patch 05_CVE-2007-6201 was pulled from upstream svn (revision 21907). oldstable/main/binary-ia64/wesnoth_0.9.0-8_ia64.deb oldstable/main/binary-ia64/wesnoth-server_0.9.0-8_ia64.deb oldstable/main/binary-ia64/wesnoth-editor_0.9.0-8_ia64.deb wesnoth (0.9.0-8) oldstable; urgency=low * Remove WML turn_cmd which can lead to forking yes and through that 100% CPU usage and stdout filling [CVE-2007-6201]. Patch 05_CVE-2007-6201 was pulled from upstream svn (revision 21907). oldstable/main/binary-mips/wesnoth_0.9.0-8_mips.deb oldstable/main/binary-mips/wesnoth-server_0.9.0-8_mips.deb oldstable/main/binary-mips/wesnoth-editor_0.9.0-8_mips.deb wesnoth (0.9.0-8) oldstable; urgency=low * Remove WML turn_cmd which can lead to forking yes and through that 100% CPU usage and stdout filling [CVE-2007-6201]. Patch 05_CVE-2007-6201 was pulled from upstream svn (revision 21907). oldstable/main/binary-mipsel/wesnoth_0.9.0-8_mipsel.deb oldstable/main/binary-mipsel/wesnoth-server_0.9.0-8_mipsel.deb oldstable/main/binary-mipsel/wesnoth-editor_0.9.0-8_mipsel.deb wesnoth (0.9.0-8) oldstable; urgency=low * Remove WML turn_cmd which can lead to forking yes and through that 100% CPU usage and stdout filling [CVE-2007-6201]. Patch 05_CVE-2007-6201 was pulled from upstream svn (revision 21907). oldstable/main/source/wesnoth_0.9.0-8.dsc oldstable/main/source/wesnoth_0.9.0-8.diff.gz oldstable/main/binary-all/wesnoth-data_0.9.0-8_all.deb oldstable/main/binary-all/wesnoth-music_0.9.0-8_all.deb oldstable/main/binary-all/wesnoth-httt_0.9.0-8_all.deb oldstable/main/binary-all/wesnoth-trow_0.9.0-8_all.deb oldstable/main/binary-all/wesnoth-tdh_0.9.0-8_all.deb oldstable/main/binary-all/wesnoth-ei_0.9.0-8_all.deb oldstable/main/binary-all/wesnoth-sotbe_0.9.0-8_all.deb oldstable/main/binary-powerpc/wesnoth_0.9.0-8_powerpc.deb oldstable/main/binary-powerpc/wesnoth-server_0.9.0-8_powerpc.deb oldstable/main/binary-powerpc/wesnoth-editor_0.9.0-8_powerpc.deb wesnoth (0.9.0-8) oldstable; urgency=low * Remove WML turn_cmd which can lead to forking yes and through that 100% CPU usage and stdout filling [CVE-2007-6201]. Patch 05_CVE-2007-6201 was pulled from upstream svn (revision 21907). oldstable/main/binary-s390/wesnoth_0.9.0-8_s390.deb oldstable/main/binary-s390/wesnoth-server_0.9.0-8_s390.deb oldstable/main/binary-s390/wesnoth-editor_0.9.0-8_s390.deb wesnoth (0.9.0-8) oldstable; urgency=low * Remove WML turn_cmd which can lead to forking yes and through that 100% CPU usage and stdout filling [CVE-2007-6201]. Patch 05_CVE-2007-6201 was pulled from upstream svn (revision 21907). oldstable/main/binary-sparc/wesnoth_0.9.0-8_sparc.deb oldstable/main/binary-sparc/wesnoth-server_0.9.0-8_sparc.deb oldstable/main/binary-sparc/wesnoth-editor_0.9.0-8_sparc.deb wesnoth (0.9.0-8) oldstable; urgency=low * Remove WML turn_cmd which can lead to forking yes and through that 100% CPU usage and stdout filling [CVE-2007-6201]. Patch 05_CVE-2007-6201 was pulled from upstream svn (revision 21907). oldstable/main/binary-alpha/lbxproxy_4.3.0.dfsg.1-14sarge4_alpha.deb oldstable/main/binary-alpha/libdps1_4.3.0.dfsg.1-14sarge4_alpha.deb oldstable/main/binary-alpha/libdps1-dbg_4.3.0.dfsg.1-14sarge4_alpha.deb oldstable/main/binary-alpha/libdps-dev_4.3.0.dfsg.1-14sarge4_alpha.deb oldstable/main/binary-alpha/libice6_4.3.0.dfsg.1-14sarge4_alpha.deb oldstable/main/binary-alpha/libice6-dbg_4.3.0.dfsg.1-14sarge4_alpha.deb oldstable/main/binary-alpha/libice-dev_4.3.0.dfsg.1-14sarge4_alpha.deb oldstable/main/binary-alpha/libsm6_4.3.0.dfsg.1-14sarge4_alpha.deb oldstable/main/binary-alpha/libsm6-dbg_4.3.0.dfsg.1-14sarge4_alpha.deb oldstable/main/binary-alpha/libsm-dev_4.3.0.dfsg.1-14sarge4_alpha.deb oldstable/main/binary-alpha/libx11-6_4.3.0.dfsg.1-14sarge4_alpha.deb oldstable/main/binary-alpha/libx11-6-dbg_4.3.0.dfsg.1-14sarge4_alpha.deb oldstable/main/binary-alpha/libx11-dev_4.3.0.dfsg.1-14sarge4_alpha.deb oldstable/main/binary-alpha/libxaw6_4.3.0.dfsg.1-14sarge4_alpha.deb oldstable/main/binary-alpha/libxaw6-dbg_4.3.0.dfsg.1-14sarge4_alpha.deb oldstable/main/binary-alpha/libxaw6-dev_4.3.0.dfsg.1-14sarge4_alpha.deb oldstable/main/binary-alpha/libxaw7_4.3.0.dfsg.1-14sarge4_alpha.deb oldstable/main/binary-alpha/libxaw7-dbg_4.3.0.dfsg.1-14sarge4_alpha.deb oldstable/main/binary-alpha/libxaw7-dev_4.3.0.dfsg.1-14sarge4_alpha.deb oldstable/main/binary-alpha/libxext6_4.3.0.dfsg.1-14sarge4_alpha.deb oldstable/main/binary-alpha/libxext6-dbg_4.3.0.dfsg.1-14sarge4_alpha.deb oldstable/main/binary-alpha/libxext-dev_4.3.0.dfsg.1-14sarge4_alpha.deb oldstable/main/binary-alpha/libxft1_4.3.0.dfsg.1-14sarge4_alpha.deb oldstable/main/binary-alpha/libxft1-dbg_4.3.0.dfsg.1-14sarge4_alpha.deb oldstable/main/binary-alpha/libxi6_4.3.0.dfsg.1-14sarge4_alpha.deb oldstable/main/binary-alpha/libxi6-dbg_4.3.0.dfsg.1-14sarge4_alpha.deb oldstable/main/binary-alpha/libxi-dev_4.3.0.dfsg.1-14sarge4_alpha.deb oldstable/main/binary-alpha/libxmu6_4.3.0.dfsg.1-14sarge4_alpha.deb oldstable/main/binary-alpha/libxmu6-dbg_4.3.0.dfsg.1-14sarge4_alpha.deb oldstable/main/binary-alpha/libxmu-dev_4.3.0.dfsg.1-14sarge4_alpha.deb oldstable/main/binary-alpha/libxmuu1_4.3.0.dfsg.1-14sarge4_alpha.deb oldstable/main/binary-alpha/libxmuu1-dbg_4.3.0.dfsg.1-14sarge4_alpha.deb oldstable/main/binary-alpha/libxmuu-dev_4.3.0.dfsg.1-14sarge4_alpha.deb oldstable/main/binary-alpha/libxp6_4.3.0.dfsg.1-14sarge4_alpha.deb oldstable/main/binary-alpha/libxp6-dbg_4.3.0.dfsg.1-14sarge4_alpha.deb oldstable/main/binary-alpha/libxp-dev_4.3.0.dfsg.1-14sarge4_alpha.deb oldstable/main/binary-alpha/libxpm4_4.3.0.dfsg.1-14sarge4_alpha.deb oldstable/main/binary-alpha/libxpm4-dbg_4.3.0.dfsg.1-14sarge4_alpha.deb oldstable/main/binary-alpha/libxpm-dev_4.3.0.dfsg.1-14sarge4_alpha.deb oldstable/main/binary-alpha/libxrandr2_4.3.0.dfsg.1-14sarge4_alpha.deb oldstable/main/binary-alpha/libxrandr2-dbg_4.3.0.dfsg.1-14sarge4_alpha.deb oldstable/main/binary-alpha/libxrandr-dev_4.3.0.dfsg.1-14sarge4_alpha.deb oldstable/main/binary-alpha/libxt6_4.3.0.dfsg.1-14sarge4_alpha.deb oldstable/main/binary-alpha/libxt6-dbg_4.3.0.dfsg.1-14sarge4_alpha.deb oldstable/main/binary-alpha/libxt-dev_4.3.0.dfsg.1-14sarge4_alpha.deb oldstable/main/binary-alpha/libxtrap6_4.3.0.dfsg.1-14sarge4_alpha.deb oldstable/main/binary-alpha/libxtrap6-dbg_4.3.0.dfsg.1-14sarge4_alpha.deb oldstable/main/binary-alpha/libxtrap-dev_4.3.0.dfsg.1-14sarge4_alpha.deb oldstable/main/binary-alpha/libxtst6_4.3.0.dfsg.1-14sarge4_alpha.deb oldstable/main/binary-alpha/libxtst6-dbg_4.3.0.dfsg.1-14sarge4_alpha.deb oldstable/main/binary-alpha/libxtst-dev_4.3.0.dfsg.1-14sarge4_alpha.deb oldstable/main/binary-alpha/libxv1_4.3.0.dfsg.1-14sarge4_alpha.deb oldstable/main/binary-alpha/libxv1-dbg_4.3.0.dfsg.1-14sarge4_alpha.deb oldstable/main/binary-alpha/libxv-dev_4.3.0.dfsg.1-14sarge4_alpha.deb oldstable/main/binary-alpha/proxymngr_4.3.0.dfsg.1-14sarge4_alpha.deb oldstable/main/binary-alpha/twm_4.3.0.dfsg.1-14sarge4_alpha.deb oldstable/main/binary-alpha/xbase-clients_4.3.0.dfsg.1-14sarge4_alpha.deb oldstable/main/binary-alpha/xdm_4.3.0.dfsg.1-14sarge4_alpha.deb oldstable/main/binary-alpha/xfs_4.3.0.dfsg.1-14sarge4_alpha.deb oldstable/main/binary-alpha/xfwp_4.3.0.dfsg.1-14sarge4_alpha.deb oldstable/main/binary-alpha/xlibmesa-dri_4.3.0.dfsg.1-14sarge4_alpha.deb oldstable/main/binary-alpha/xlibmesa-dri-dbg_4.3.0.dfsg.1-14sarge4_alpha.deb oldstable/main/binary-alpha/xlibmesa-gl_4.3.0.dfsg.1-14sarge4_alpha.deb oldstable/main/binary-alpha/xlibmesa-gl-dbg_4.3.0.dfsg.1-14sarge4_alpha.deb oldstable/main/binary-alpha/xlibmesa-gl-dev_4.3.0.dfsg.1-14sarge4_alpha.deb oldstable/main/binary-alpha/xlibmesa-glu_4.3.0.dfsg.1-14sarge4_alpha.deb oldstable/main/binary-alpha/xlibmesa-glu-dbg_4.3.0.dfsg.1-14sarge4_alpha.deb oldstable/main/binary-alpha/xlibmesa-glu-dev_4.3.0.dfsg.1-14sarge4_alpha.deb oldstable/main/binary-alpha/xlibosmesa4_4.3.0.dfsg.1-14sarge4_alpha.deb oldstable/main/binary-alpha/xlibosmesa4-dbg_4.3.0.dfsg.1-14sarge4_alpha.deb oldstable/main/binary-alpha/xlibosmesa-dev_4.3.0.dfsg.1-14sarge4_alpha.deb oldstable/main/binary-alpha/xlibs-static-dev_4.3.0.dfsg.1-14sarge4_alpha.deb oldstable/main/binary-alpha/xlibs-static-pic_4.3.0.dfsg.1-14sarge4_alpha.deb oldstable/main/binary-alpha/xmh_4.3.0.dfsg.1-14sarge4_alpha.deb oldstable/main/binary-alpha/xnest_4.3.0.dfsg.1-14sarge4_alpha.deb oldstable/main/binary-alpha/xserver-common_4.3.0.dfsg.1-14sarge4_alpha.deb oldstable/main/binary-alpha/xserver-xfree86_4.3.0.dfsg.1-14sarge4_alpha.deb oldstable/main/binary-alpha/xserver-xfree86-dbg_4.3.0.dfsg.1-14sarge4_alpha.deb oldstable/main/binary-alpha/xterm_4.3.0.dfsg.1-14sarge4_alpha.deb oldstable/main/binary-alpha/xutils_4.3.0.dfsg.1-14sarge4_alpha.deb oldstable/main/binary-alpha/xvfb_4.3.0.dfsg.1-14sarge4_alpha.deb oldstable/main/binary-alpha/x-window-system-core_4.3.0.dfsg.1-14sarge4_alpha.deb oldstable/main/binary-alpha/x-window-system-dev_4.3.0.dfsg.1-14sarge4_alpha.deb oldstable/main/binary-alpha/xlibmesa3_4.3.0.dfsg.1-14sarge4_alpha.deb xfree86 (4.3.0.dfsg.1-14sarge4) oldstable-security; urgency=high * Security upload, fixes several vulnerabilities: + CVE-2007-1351, CVE-2007-1352: integer overflows in the BDF font and fonts.dir parsing components of libXfont; + CVE-2007-1667: integer overflows in the XGetPixel() and XInitImage() functions in libX11 (closes: #414046); + CVE-2007-1003: integer overflow in the ProcXCMiscGetXIDList() function in the XC-MISC extension in the X server. oldstable/main/binary-arm/lbxproxy_4.3.0.dfsg.1-14sarge4_arm.deb oldstable/main/binary-arm/libdps1_4.3.0.dfsg.1-14sarge4_arm.deb oldstable/main/binary-arm/libdps1-dbg_4.3.0.dfsg.1-14sarge4_arm.deb oldstable/main/binary-arm/libdps-dev_4.3.0.dfsg.1-14sarge4_arm.deb oldstable/main/binary-arm/libice6_4.3.0.dfsg.1-14sarge4_arm.deb oldstable/main/binary-arm/libice6-dbg_4.3.0.dfsg.1-14sarge4_arm.deb oldstable/main/binary-arm/libice-dev_4.3.0.dfsg.1-14sarge4_arm.deb oldstable/main/binary-arm/libsm6_4.3.0.dfsg.1-14sarge4_arm.deb oldstable/main/binary-arm/libsm6-dbg_4.3.0.dfsg.1-14sarge4_arm.deb oldstable/main/binary-arm/libsm-dev_4.3.0.dfsg.1-14sarge4_arm.deb oldstable/main/binary-arm/libx11-6_4.3.0.dfsg.1-14sarge4_arm.deb oldstable/main/binary-arm/libx11-6-dbg_4.3.0.dfsg.1-14sarge4_arm.deb oldstable/main/binary-arm/libx11-dev_4.3.0.dfsg.1-14sarge4_arm.deb oldstable/main/binary-arm/libxaw6_4.3.0.dfsg.1-14sarge4_arm.deb oldstable/main/binary-arm/libxaw6-dbg_4.3.0.dfsg.1-14sarge4_arm.deb oldstable/main/binary-arm/libxaw6-dev_4.3.0.dfsg.1-14sarge4_arm.deb oldstable/main/binary-arm/libxaw7_4.3.0.dfsg.1-14sarge4_arm.deb oldstable/main/binary-arm/libxaw7-dbg_4.3.0.dfsg.1-14sarge4_arm.deb oldstable/main/binary-arm/libxaw7-dev_4.3.0.dfsg.1-14sarge4_arm.deb oldstable/main/binary-arm/libxext6_4.3.0.dfsg.1-14sarge4_arm.deb oldstable/main/binary-arm/libxext6-dbg_4.3.0.dfsg.1-14sarge4_arm.deb oldstable/main/binary-arm/libxext-dev_4.3.0.dfsg.1-14sarge4_arm.deb oldstable/main/binary-arm/libxft1_4.3.0.dfsg.1-14sarge4_arm.deb oldstable/main/binary-arm/libxft1-dbg_4.3.0.dfsg.1-14sarge4_arm.deb oldstable/main/binary-arm/libxi6_4.3.0.dfsg.1-14sarge4_arm.deb oldstable/main/binary-arm/libxi6-dbg_4.3.0.dfsg.1-14sarge4_arm.deb oldstable/main/binary-arm/libxi-dev_4.3.0.dfsg.1-14sarge4_arm.deb oldstable/main/binary-arm/libxmu6_4.3.0.dfsg.1-14sarge4_arm.deb oldstable/main/binary-arm/libxmu6-dbg_4.3.0.dfsg.1-14sarge4_arm.deb oldstable/main/binary-arm/libxmu-dev_4.3.0.dfsg.1-14sarge4_arm.deb oldstable/main/binary-arm/libxmuu1_4.3.0.dfsg.1-14sarge4_arm.deb oldstable/main/binary-arm/libxmuu1-dbg_4.3.0.dfsg.1-14sarge4_arm.deb oldstable/main/binary-arm/libxmuu-dev_4.3.0.dfsg.1-14sarge4_arm.deb oldstable/main/binary-arm/libxp6_4.3.0.dfsg.1-14sarge4_arm.deb oldstable/main/binary-arm/libxp6-dbg_4.3.0.dfsg.1-14sarge4_arm.deb oldstable/main/binary-arm/libxp-dev_4.3.0.dfsg.1-14sarge4_arm.deb oldstable/main/binary-arm/libxpm4_4.3.0.dfsg.1-14sarge4_arm.deb oldstable/main/binary-arm/libxpm4-dbg_4.3.0.dfsg.1-14sarge4_arm.deb oldstable/main/binary-arm/libxpm-dev_4.3.0.dfsg.1-14sarge4_arm.deb oldstable/main/binary-arm/libxrandr2_4.3.0.dfsg.1-14sarge4_arm.deb oldstable/main/binary-arm/libxrandr2-dbg_4.3.0.dfsg.1-14sarge4_arm.deb oldstable/main/binary-arm/libxrandr-dev_4.3.0.dfsg.1-14sarge4_arm.deb oldstable/main/binary-arm/libxt6_4.3.0.dfsg.1-14sarge4_arm.deb oldstable/main/binary-arm/libxt6-dbg_4.3.0.dfsg.1-14sarge4_arm.deb oldstable/main/binary-arm/libxt-dev_4.3.0.dfsg.1-14sarge4_arm.deb oldstable/main/binary-arm/libxtrap6_4.3.0.dfsg.1-14sarge4_arm.deb oldstable/main/binary-arm/libxtrap6-dbg_4.3.0.dfsg.1-14sarge4_arm.deb oldstable/main/binary-arm/libxtrap-dev_4.3.0.dfsg.1-14sarge4_arm.deb oldstable/main/binary-arm/libxtst6_4.3.0.dfsg.1-14sarge4_arm.deb oldstable/main/binary-arm/libxtst6-dbg_4.3.0.dfsg.1-14sarge4_arm.deb oldstable/main/binary-arm/libxtst-dev_4.3.0.dfsg.1-14sarge4_arm.deb oldstable/main/binary-arm/libxv1_4.3.0.dfsg.1-14sarge4_arm.deb oldstable/main/binary-arm/libxv1-dbg_4.3.0.dfsg.1-14sarge4_arm.deb oldstable/main/binary-arm/libxv-dev_4.3.0.dfsg.1-14sarge4_arm.deb oldstable/main/binary-arm/proxymngr_4.3.0.dfsg.1-14sarge4_arm.deb oldstable/main/binary-arm/twm_4.3.0.dfsg.1-14sarge4_arm.deb oldstable/main/binary-arm/xbase-clients_4.3.0.dfsg.1-14sarge4_arm.deb oldstable/main/binary-arm/xdm_4.3.0.dfsg.1-14sarge4_arm.deb oldstable/main/binary-arm/xfs_4.3.0.dfsg.1-14sarge4_arm.deb oldstable/main/binary-arm/xfwp_4.3.0.dfsg.1-14sarge4_arm.deb oldstable/main/binary-arm/xlibmesa-gl_4.3.0.dfsg.1-14sarge4_arm.deb oldstable/main/binary-arm/xlibmesa-gl-dbg_4.3.0.dfsg.1-14sarge4_arm.deb oldstable/main/binary-arm/xlibmesa-gl-dev_4.3.0.dfsg.1-14sarge4_arm.deb oldstable/main/binary-arm/xlibmesa-glu_4.3.0.dfsg.1-14sarge4_arm.deb oldstable/main/binary-arm/xlibmesa-glu-dbg_4.3.0.dfsg.1-14sarge4_arm.deb oldstable/main/binary-arm/xlibmesa-glu-dev_4.3.0.dfsg.1-14sarge4_arm.deb oldstable/main/binary-arm/xlibs-static-dev_4.3.0.dfsg.1-14sarge4_arm.deb oldstable/main/binary-arm/xlibs-static-pic_4.3.0.dfsg.1-14sarge4_arm.deb oldstable/main/binary-arm/xmh_4.3.0.dfsg.1-14sarge4_arm.deb oldstable/main/binary-arm/xnest_4.3.0.dfsg.1-14sarge4_arm.deb oldstable/main/binary-arm/xserver-common_4.3.0.dfsg.1-14sarge4_arm.deb oldstable/main/binary-arm/xserver-xfree86_4.3.0.dfsg.1-14sarge4_arm.deb oldstable/main/binary-arm/xserver-xfree86-dbg_4.3.0.dfsg.1-14sarge4_arm.deb oldstable/main/binary-arm/xterm_4.3.0.dfsg.1-14sarge4_arm.deb oldstable/main/binary-arm/xutils_4.3.0.dfsg.1-14sarge4_arm.deb oldstable/main/binary-arm/xvfb_4.3.0.dfsg.1-14sarge4_arm.deb oldstable/main/binary-arm/x-window-system-core_4.3.0.dfsg.1-14sarge4_arm.deb oldstable/main/binary-arm/x-window-system-dev_4.3.0.dfsg.1-14sarge4_arm.deb oldstable/main/binary-arm/xlibmesa3_4.3.0.dfsg.1-14sarge4_arm.deb xfree86 (4.3.0.dfsg.1-14sarge4) oldstable-security; urgency=high * Security upload, fixes several vulnerabilities: + CVE-2007-1351, CVE-2007-1352: integer overflows in the BDF font and fonts.dir parsing components of libXfont; + CVE-2007-1667: integer overflows in the XGetPixel() and XInitImage() functions in libX11 (closes: #414046); + CVE-2007-1003: integer overflow in the ProcXCMiscGetXIDList() function in the XC-MISC extension in the X server. oldstable/main/binary-hppa/lbxproxy_4.3.0.dfsg.1-14sarge4_hppa.deb oldstable/main/binary-hppa/libdps1_4.3.0.dfsg.1-14sarge4_hppa.deb oldstable/main/binary-hppa/libdps1-dbg_4.3.0.dfsg.1-14sarge4_hppa.deb oldstable/main/binary-hppa/libdps-dev_4.3.0.dfsg.1-14sarge4_hppa.deb oldstable/main/binary-hppa/libice6_4.3.0.dfsg.1-14sarge4_hppa.deb oldstable/main/binary-hppa/libice6-dbg_4.3.0.dfsg.1-14sarge4_hppa.deb oldstable/main/binary-hppa/libice-dev_4.3.0.dfsg.1-14sarge4_hppa.deb oldstable/main/binary-hppa/libsm6_4.3.0.dfsg.1-14sarge4_hppa.deb oldstable/main/binary-hppa/libsm6-dbg_4.3.0.dfsg.1-14sarge4_hppa.deb oldstable/main/binary-hppa/libsm-dev_4.3.0.dfsg.1-14sarge4_hppa.deb oldstable/main/binary-hppa/libx11-6_4.3.0.dfsg.1-14sarge4_hppa.deb oldstable/main/binary-hppa/libx11-6-dbg_4.3.0.dfsg.1-14sarge4_hppa.deb oldstable/main/binary-hppa/libx11-dev_4.3.0.dfsg.1-14sarge4_hppa.deb oldstable/main/binary-hppa/libxaw6_4.3.0.dfsg.1-14sarge4_hppa.deb oldstable/main/binary-hppa/libxaw6-dbg_4.3.0.dfsg.1-14sarge4_hppa.deb oldstable/main/binary-hppa/libxaw6-dev_4.3.0.dfsg.1-14sarge4_hppa.deb oldstable/main/binary-hppa/libxaw7_4.3.0.dfsg.1-14sarge4_hppa.deb oldstable/main/binary-hppa/libxaw7-dbg_4.3.0.dfsg.1-14sarge4_hppa.deb oldstable/main/binary-hppa/libxaw7-dev_4.3.0.dfsg.1-14sarge4_hppa.deb oldstable/main/binary-hppa/libxext6_4.3.0.dfsg.1-14sarge4_hppa.deb oldstable/main/binary-hppa/libxext6-dbg_4.3.0.dfsg.1-14sarge4_hppa.deb oldstable/main/binary-hppa/libxext-dev_4.3.0.dfsg.1-14sarge4_hppa.deb oldstable/main/binary-hppa/libxft1_4.3.0.dfsg.1-14sarge4_hppa.deb oldstable/main/binary-hppa/libxft1-dbg_4.3.0.dfsg.1-14sarge4_hppa.deb oldstable/main/binary-hppa/libxi6_4.3.0.dfsg.1-14sarge4_hppa.deb oldstable/main/binary-hppa/libxi6-dbg_4.3.0.dfsg.1-14sarge4_hppa.deb oldstable/main/binary-hppa/libxi-dev_4.3.0.dfsg.1-14sarge4_hppa.deb oldstable/main/binary-hppa/libxmu6_4.3.0.dfsg.1-14sarge4_hppa.deb oldstable/main/binary-hppa/libxmu6-dbg_4.3.0.dfsg.1-14sarge4_hppa.deb oldstable/main/binary-hppa/libxmu-dev_4.3.0.dfsg.1-14sarge4_hppa.deb oldstable/main/binary-hppa/libxmuu1_4.3.0.dfsg.1-14sarge4_hppa.deb oldstable/main/binary-hppa/libxmuu1-dbg_4.3.0.dfsg.1-14sarge4_hppa.deb oldstable/main/binary-hppa/libxmuu-dev_4.3.0.dfsg.1-14sarge4_hppa.deb oldstable/main/binary-hppa/libxp6_4.3.0.dfsg.1-14sarge4_hppa.deb oldstable/main/binary-hppa/libxp6-dbg_4.3.0.dfsg.1-14sarge4_hppa.deb oldstable/main/binary-hppa/libxp-dev_4.3.0.dfsg.1-14sarge4_hppa.deb oldstable/main/binary-hppa/libxpm4_4.3.0.dfsg.1-14sarge4_hppa.deb oldstable/main/binary-hppa/libxpm4-dbg_4.3.0.dfsg.1-14sarge4_hppa.deb oldstable/main/binary-hppa/libxpm-dev_4.3.0.dfsg.1-14sarge4_hppa.deb oldstable/main/binary-hppa/libxrandr2_4.3.0.dfsg.1-14sarge4_hppa.deb oldstable/main/binary-hppa/libxrandr2-dbg_4.3.0.dfsg.1-14sarge4_hppa.deb oldstable/main/binary-hppa/libxrandr-dev_4.3.0.dfsg.1-14sarge4_hppa.deb oldstable/main/binary-hppa/libxt6_4.3.0.dfsg.1-14sarge4_hppa.deb oldstable/main/binary-hppa/libxt6-dbg_4.3.0.dfsg.1-14sarge4_hppa.deb oldstable/main/binary-hppa/libxt-dev_4.3.0.dfsg.1-14sarge4_hppa.deb oldstable/main/binary-hppa/libxtrap6_4.3.0.dfsg.1-14sarge4_hppa.deb oldstable/main/binary-hppa/libxtrap6-dbg_4.3.0.dfsg.1-14sarge4_hppa.deb oldstable/main/binary-hppa/libxtrap-dev_4.3.0.dfsg.1-14sarge4_hppa.deb oldstable/main/binary-hppa/libxtst6_4.3.0.dfsg.1-14sarge4_hppa.deb oldstable/main/binary-hppa/libxtst6-dbg_4.3.0.dfsg.1-14sarge4_hppa.deb oldstable/main/binary-hppa/libxtst-dev_4.3.0.dfsg.1-14sarge4_hppa.deb oldstable/main/binary-hppa/libxv1_4.3.0.dfsg.1-14sarge4_hppa.deb oldstable/main/binary-hppa/libxv1-dbg_4.3.0.dfsg.1-14sarge4_hppa.deb oldstable/main/binary-hppa/libxv-dev_4.3.0.dfsg.1-14sarge4_hppa.deb oldstable/main/binary-hppa/proxymngr_4.3.0.dfsg.1-14sarge4_hppa.deb oldstable/main/binary-hppa/twm_4.3.0.dfsg.1-14sarge4_hppa.deb oldstable/main/binary-hppa/xbase-clients_4.3.0.dfsg.1-14sarge4_hppa.deb oldstable/main/binary-hppa/xdm_4.3.0.dfsg.1-14sarge4_hppa.deb oldstable/main/binary-hppa/xfs_4.3.0.dfsg.1-14sarge4_hppa.deb oldstable/main/binary-hppa/xfwp_4.3.0.dfsg.1-14sarge4_hppa.deb oldstable/main/binary-hppa/xlibmesa-gl_4.3.0.dfsg.1-14sarge4_hppa.deb oldstable/main/binary-hppa/xlibmesa-gl-dbg_4.3.0.dfsg.1-14sarge4_hppa.deb oldstable/main/binary-hppa/xlibmesa-gl-dev_4.3.0.dfsg.1-14sarge4_hppa.deb oldstable/main/binary-hppa/xlibmesa-glu_4.3.0.dfsg.1-14sarge4_hppa.deb oldstable/main/binary-hppa/xlibmesa-glu-dbg_4.3.0.dfsg.1-14sarge4_hppa.deb oldstable/main/binary-hppa/xlibmesa-glu-dev_4.3.0.dfsg.1-14sarge4_hppa.deb oldstable/main/binary-hppa/xlibs-static-dev_4.3.0.dfsg.1-14sarge4_hppa.deb oldstable/main/binary-hppa/xlibs-static-pic_4.3.0.dfsg.1-14sarge4_hppa.deb oldstable/main/binary-hppa/xmh_4.3.0.dfsg.1-14sarge4_hppa.deb oldstable/main/binary-hppa/xnest_4.3.0.dfsg.1-14sarge4_hppa.deb oldstable/main/binary-hppa/xserver-common_4.3.0.dfsg.1-14sarge4_hppa.deb oldstable/main/binary-hppa/xserver-xfree86_4.3.0.dfsg.1-14sarge4_hppa.deb oldstable/main/binary-hppa/xserver-xfree86-dbg_4.3.0.dfsg.1-14sarge4_hppa.deb oldstable/main/binary-hppa/xterm_4.3.0.dfsg.1-14sarge4_hppa.deb oldstable/main/binary-hppa/xutils_4.3.0.dfsg.1-14sarge4_hppa.deb oldstable/main/binary-hppa/xvfb_4.3.0.dfsg.1-14sarge4_hppa.deb oldstable/main/binary-hppa/x-window-system-core_4.3.0.dfsg.1-14sarge4_hppa.deb oldstable/main/binary-hppa/x-window-system-dev_4.3.0.dfsg.1-14sarge4_hppa.deb oldstable/main/binary-hppa/xlibmesa3_4.3.0.dfsg.1-14sarge4_hppa.deb xfree86 (4.3.0.dfsg.1-14sarge4) oldstable-security; urgency=high * Security upload, fixes several vulnerabilities: + CVE-2007-1351, CVE-2007-1352: integer overflows in the BDF font and fonts.dir parsing components of libXfont; + CVE-2007-1667: integer overflows in the XGetPixel() and XInitImage() functions in libX11 (closes: #414046); + CVE-2007-1003: integer overflow in the ProcXCMiscGetXIDList() function in the XC-MISC extension in the X server. oldstable/main/source/xfree86_4.3.0.dfsg.1-14sarge4.dsc oldstable/main/source/xfree86_4.3.0.dfsg.1-14sarge4.diff.gz oldstable/main/binary-all/pm-dev_4.3.0.dfsg.1-14sarge4_all.deb oldstable/main/binary-all/x-dev_4.3.0.dfsg.1-14sarge4_all.deb oldstable/main/binary-all/xfonts-100dpi_4.3.0.dfsg.1-14sarge4_all.deb oldstable/main/binary-all/xfonts-100dpi-transcoded_4.3.0.dfsg.1-14sarge4_all.deb oldstable/main/binary-all/xfonts-75dpi_4.3.0.dfsg.1-14sarge4_all.deb oldstable/main/binary-all/xfonts-75dpi-transcoded_4.3.0.dfsg.1-14sarge4_all.deb oldstable/main/binary-all/xfonts-base_4.3.0.dfsg.1-14sarge4_all.deb oldstable/main/binary-all/xfonts-base-transcoded_4.3.0.dfsg.1-14sarge4_all.deb oldstable/main/binary-all/xfonts-cyrillic_4.3.0.dfsg.1-14sarge4_all.deb oldstable/main/binary-all/xfonts-scalable_4.3.0.dfsg.1-14sarge4_all.deb oldstable/main/binary-all/xfree86-common_4.3.0.dfsg.1-14sarge4_all.deb oldstable/main/binary-all/xlibs_4.3.0.dfsg.1-14sarge4_all.deb oldstable/main/binary-all/xlibs-data_4.3.0.dfsg.1-14sarge4_all.deb oldstable/main/binary-all/xspecs_4.3.0.dfsg.1-14sarge4_all.deb oldstable/main/binary-all/x-window-system_4.3.0.dfsg.1-14sarge4_all.deb oldstable/main/binary-all/xlibmesa3-dbg_4.3.0.dfsg.1-14sarge4_all.deb oldstable/main/binary-all/xlibmesa-dev_4.3.0.dfsg.1-14sarge4_all.deb oldstable/main/binary-all/xlibs-dbg_4.3.0.dfsg.1-14sarge4_all.deb oldstable/main/binary-all/xlibs-dev_4.3.0.dfsg.1-14sarge4_all.deb oldstable/main/binary-all/xlibs-pic_4.3.0.dfsg.1-14sarge4_all.deb oldstable/main/binary-i386/lbxproxy_4.3.0.dfsg.1-14sarge4_i386.deb oldstable/main/binary-i386/libdps1_4.3.0.dfsg.1-14sarge4_i386.deb oldstable/main/binary-i386/libdps1-dbg_4.3.0.dfsg.1-14sarge4_i386.deb oldstable/main/binary-i386/libdps-dev_4.3.0.dfsg.1-14sarge4_i386.deb oldstable/main/binary-i386/libice6_4.3.0.dfsg.1-14sarge4_i386.deb oldstable/main/binary-i386/libice6-dbg_4.3.0.dfsg.1-14sarge4_i386.deb oldstable/main/binary-i386/libice-dev_4.3.0.dfsg.1-14sarge4_i386.deb oldstable/main/binary-i386/libsm6_4.3.0.dfsg.1-14sarge4_i386.deb oldstable/main/binary-i386/libsm6-dbg_4.3.0.dfsg.1-14sarge4_i386.deb oldstable/main/binary-i386/libsm-dev_4.3.0.dfsg.1-14sarge4_i386.deb oldstable/main/binary-i386/libx11-6_4.3.0.dfsg.1-14sarge4_i386.deb oldstable/main/binary-i386/libx11-6-dbg_4.3.0.dfsg.1-14sarge4_i386.deb oldstable/main/binary-i386/libx11-dev_4.3.0.dfsg.1-14sarge4_i386.deb oldstable/main/binary-i386/libxaw6_4.3.0.dfsg.1-14sarge4_i386.deb oldstable/main/binary-i386/libxaw6-dbg_4.3.0.dfsg.1-14sarge4_i386.deb oldstable/main/binary-i386/libxaw6-dev_4.3.0.dfsg.1-14sarge4_i386.deb oldstable/main/binary-i386/libxaw7_4.3.0.dfsg.1-14sarge4_i386.deb oldstable/main/binary-i386/libxaw7-dbg_4.3.0.dfsg.1-14sarge4_i386.deb oldstable/main/binary-i386/libxaw7-dev_4.3.0.dfsg.1-14sarge4_i386.deb oldstable/main/binary-i386/libxext6_4.3.0.dfsg.1-14sarge4_i386.deb oldstable/main/binary-i386/libxext6-dbg_4.3.0.dfsg.1-14sarge4_i386.deb oldstable/main/binary-i386/libxext-dev_4.3.0.dfsg.1-14sarge4_i386.deb oldstable/main/binary-i386/libxft1_4.3.0.dfsg.1-14sarge4_i386.deb oldstable/main/binary-i386/libxft1-dbg_4.3.0.dfsg.1-14sarge4_i386.deb oldstable/main/binary-i386/libxi6_4.3.0.dfsg.1-14sarge4_i386.deb oldstable/main/binary-i386/libxi6-dbg_4.3.0.dfsg.1-14sarge4_i386.deb oldstable/main/binary-i386/libxi-dev_4.3.0.dfsg.1-14sarge4_i386.deb oldstable/main/binary-i386/libxmu6_4.3.0.dfsg.1-14sarge4_i386.deb oldstable/main/binary-i386/libxmu6-dbg_4.3.0.dfsg.1-14sarge4_i386.deb oldstable/main/binary-i386/libxmu-dev_4.3.0.dfsg.1-14sarge4_i386.deb oldstable/main/binary-i386/libxmuu1_4.3.0.dfsg.1-14sarge4_i386.deb oldstable/main/binary-i386/libxmuu1-dbg_4.3.0.dfsg.1-14sarge4_i386.deb oldstable/main/binary-i386/libxmuu-dev_4.3.0.dfsg.1-14sarge4_i386.deb oldstable/main/binary-i386/libxp6_4.3.0.dfsg.1-14sarge4_i386.deb oldstable/main/binary-i386/libxp6-dbg_4.3.0.dfsg.1-14sarge4_i386.deb oldstable/main/binary-i386/libxp-dev_4.3.0.dfsg.1-14sarge4_i386.deb oldstable/main/binary-i386/libxpm4_4.3.0.dfsg.1-14sarge4_i386.deb oldstable/main/binary-i386/libxpm4-dbg_4.3.0.dfsg.1-14sarge4_i386.deb oldstable/main/binary-i386/libxpm-dev_4.3.0.dfsg.1-14sarge4_i386.deb oldstable/main/binary-i386/libxrandr2_4.3.0.dfsg.1-14sarge4_i386.deb oldstable/main/binary-i386/libxrandr2-dbg_4.3.0.dfsg.1-14sarge4_i386.deb oldstable/main/binary-i386/libxrandr-dev_4.3.0.dfsg.1-14sarge4_i386.deb oldstable/main/binary-i386/libxt6_4.3.0.dfsg.1-14sarge4_i386.deb oldstable/main/binary-i386/libxt6-dbg_4.3.0.dfsg.1-14sarge4_i386.deb oldstable/main/binary-i386/libxt-dev_4.3.0.dfsg.1-14sarge4_i386.deb oldstable/main/binary-i386/libxtrap6_4.3.0.dfsg.1-14sarge4_i386.deb oldstable/main/binary-i386/libxtrap6-dbg_4.3.0.dfsg.1-14sarge4_i386.deb oldstable/main/binary-i386/libxtrap-dev_4.3.0.dfsg.1-14sarge4_i386.deb oldstable/main/binary-i386/libxtst6_4.3.0.dfsg.1-14sarge4_i386.deb oldstable/main/binary-i386/libxtst6-dbg_4.3.0.dfsg.1-14sarge4_i386.deb oldstable/main/binary-i386/libxtst-dev_4.3.0.dfsg.1-14sarge4_i386.deb oldstable/main/binary-i386/libxv1_4.3.0.dfsg.1-14sarge4_i386.deb oldstable/main/binary-i386/libxv1-dbg_4.3.0.dfsg.1-14sarge4_i386.deb oldstable/main/binary-i386/libxv-dev_4.3.0.dfsg.1-14sarge4_i386.deb oldstable/main/binary-i386/proxymngr_4.3.0.dfsg.1-14sarge4_i386.deb oldstable/main/binary-i386/twm_4.3.0.dfsg.1-14sarge4_i386.deb oldstable/main/binary-i386/xbase-clients_4.3.0.dfsg.1-14sarge4_i386.deb oldstable/main/binary-i386/xdm_4.3.0.dfsg.1-14sarge4_i386.deb oldstable/main/binary-i386/xfs_4.3.0.dfsg.1-14sarge4_i386.deb oldstable/main/binary-i386/xfwp_4.3.0.dfsg.1-14sarge4_i386.deb oldstable/main/binary-i386/xlibmesa-dri_4.3.0.dfsg.1-14sarge4_i386.deb oldstable/main/binary-i386/xlibmesa-dri-dbg_4.3.0.dfsg.1-14sarge4_i386.deb oldstable/main/binary-i386/xlibmesa-gl_4.3.0.dfsg.1-14sarge4_i386.deb oldstable/main/binary-i386/xlibmesa-gl-dbg_4.3.0.dfsg.1-14sarge4_i386.deb oldstable/main/binary-i386/xlibmesa-gl-dev_4.3.0.dfsg.1-14sarge4_i386.deb oldstable/main/binary-i386/xlibmesa-glu_4.3.0.dfsg.1-14sarge4_i386.deb oldstable/main/binary-i386/xlibmesa-glu-dbg_4.3.0.dfsg.1-14sarge4_i386.deb oldstable/main/binary-i386/xlibmesa-glu-dev_4.3.0.dfsg.1-14sarge4_i386.deb oldstable/main/binary-i386/xlibosmesa4_4.3.0.dfsg.1-14sarge4_i386.deb oldstable/main/binary-i386/xlibosmesa4-dbg_4.3.0.dfsg.1-14sarge4_i386.deb oldstable/main/binary-i386/xlibosmesa-dev_4.3.0.dfsg.1-14sarge4_i386.deb oldstable/main/binary-i386/xlibs-static-dev_4.3.0.dfsg.1-14sarge4_i386.deb oldstable/main/binary-i386/xlibs-static-pic_4.3.0.dfsg.1-14sarge4_i386.deb oldstable/main/binary-i386/xmh_4.3.0.dfsg.1-14sarge4_i386.deb oldstable/main/binary-i386/xnest_4.3.0.dfsg.1-14sarge4_i386.deb oldstable/main/binary-i386/xserver-common_4.3.0.dfsg.1-14sarge4_i386.deb oldstable/main/binary-i386/xserver-xfree86_4.3.0.dfsg.1-14sarge4_i386.deb oldstable/main/binary-i386/xserver-xfree86-dbg_4.3.0.dfsg.1-14sarge4_i386.deb oldstable/main/binary-i386/xterm_4.3.0.dfsg.1-14sarge4_i386.deb oldstable/main/binary-i386/xutils_4.3.0.dfsg.1-14sarge4_i386.deb oldstable/main/binary-i386/xvfb_4.3.0.dfsg.1-14sarge4_i386.deb oldstable/main/binary-i386/x-window-system-core_4.3.0.dfsg.1-14sarge4_i386.deb oldstable/main/binary-i386/x-window-system-dev_4.3.0.dfsg.1-14sarge4_i386.deb oldstable/main/binary-i386/xlibmesa3_4.3.0.dfsg.1-14sarge4_i386.deb xfree86 (4.3.0.dfsg.1-14sarge4) oldstable-security; urgency=high * Security upload, fixes several vulnerabilities: + CVE-2007-1351, CVE-2007-1352: integer overflows in the BDF font and fonts.dir parsing components of libXfont; + CVE-2007-1667: integer overflows in the XGetPixel() and XInitImage() functions in libX11 (closes: #414046); + CVE-2007-1003: integer overflow in the ProcXCMiscGetXIDList() function in the XC-MISC extension in the X server. oldstable/main/binary-ia64/lbxproxy_4.3.0.dfsg.1-14sarge4_ia64.deb oldstable/main/binary-ia64/libdps1_4.3.0.dfsg.1-14sarge4_ia64.deb oldstable/main/binary-ia64/libdps1-dbg_4.3.0.dfsg.1-14sarge4_ia64.deb oldstable/main/binary-ia64/libdps-dev_4.3.0.dfsg.1-14sarge4_ia64.deb oldstable/main/binary-ia64/libice6_4.3.0.dfsg.1-14sarge4_ia64.deb oldstable/main/binary-ia64/libice6-dbg_4.3.0.dfsg.1-14sarge4_ia64.deb oldstable/main/binary-ia64/libice-dev_4.3.0.dfsg.1-14sarge4_ia64.deb oldstable/main/binary-ia64/libsm6_4.3.0.dfsg.1-14sarge4_ia64.deb oldstable/main/binary-ia64/libsm6-dbg_4.3.0.dfsg.1-14sarge4_ia64.deb oldstable/main/binary-ia64/libsm-dev_4.3.0.dfsg.1-14sarge4_ia64.deb oldstable/main/binary-ia64/libx11-6_4.3.0.dfsg.1-14sarge4_ia64.deb oldstable/main/binary-ia64/libx11-6-dbg_4.3.0.dfsg.1-14sarge4_ia64.deb oldstable/main/binary-ia64/libx11-dev_4.3.0.dfsg.1-14sarge4_ia64.deb oldstable/main/binary-ia64/libxaw6_4.3.0.dfsg.1-14sarge4_ia64.deb oldstable/main/binary-ia64/libxaw6-dbg_4.3.0.dfsg.1-14sarge4_ia64.deb oldstable/main/binary-ia64/libxaw6-dev_4.3.0.dfsg.1-14sarge4_ia64.deb oldstable/main/binary-ia64/libxaw7_4.3.0.dfsg.1-14sarge4_ia64.deb oldstable/main/binary-ia64/libxaw7-dbg_4.3.0.dfsg.1-14sarge4_ia64.deb oldstable/main/binary-ia64/libxaw7-dev_4.3.0.dfsg.1-14sarge4_ia64.deb oldstable/main/binary-ia64/libxext6_4.3.0.dfsg.1-14sarge4_ia64.deb oldstable/main/binary-ia64/libxext6-dbg_4.3.0.dfsg.1-14sarge4_ia64.deb oldstable/main/binary-ia64/libxext-dev_4.3.0.dfsg.1-14sarge4_ia64.deb oldstable/main/binary-ia64/libxft1_4.3.0.dfsg.1-14sarge4_ia64.deb oldstable/main/binary-ia64/libxft1-dbg_4.3.0.dfsg.1-14sarge4_ia64.deb oldstable/main/binary-ia64/libxi6_4.3.0.dfsg.1-14sarge4_ia64.deb oldstable/main/binary-ia64/libxi6-dbg_4.3.0.dfsg.1-14sarge4_ia64.deb oldstable/main/binary-ia64/libxi-dev_4.3.0.dfsg.1-14sarge4_ia64.deb oldstable/main/binary-ia64/libxmu6_4.3.0.dfsg.1-14sarge4_ia64.deb oldstable/main/binary-ia64/libxmu6-dbg_4.3.0.dfsg.1-14sarge4_ia64.deb oldstable/main/binary-ia64/libxmu-dev_4.3.0.dfsg.1-14sarge4_ia64.deb oldstable/main/binary-ia64/libxmuu1_4.3.0.dfsg.1-14sarge4_ia64.deb oldstable/main/binary-ia64/libxmuu1-dbg_4.3.0.dfsg.1-14sarge4_ia64.deb oldstable/main/binary-ia64/libxmuu-dev_4.3.0.dfsg.1-14sarge4_ia64.deb oldstable/main/binary-ia64/libxp6_4.3.0.dfsg.1-14sarge4_ia64.deb oldstable/main/binary-ia64/libxp6-dbg_4.3.0.dfsg.1-14sarge4_ia64.deb oldstable/main/binary-ia64/libxp-dev_4.3.0.dfsg.1-14sarge4_ia64.deb oldstable/main/binary-ia64/libxpm4_4.3.0.dfsg.1-14sarge4_ia64.deb oldstable/main/binary-ia64/libxpm4-dbg_4.3.0.dfsg.1-14sarge4_ia64.deb oldstable/main/binary-ia64/libxpm-dev_4.3.0.dfsg.1-14sarge4_ia64.deb oldstable/main/binary-ia64/libxrandr2_4.3.0.dfsg.1-14sarge4_ia64.deb oldstable/main/binary-ia64/libxrandr2-dbg_4.3.0.dfsg.1-14sarge4_ia64.deb oldstable/main/binary-ia64/libxrandr-dev_4.3.0.dfsg.1-14sarge4_ia64.deb oldstable/main/binary-ia64/libxt6_4.3.0.dfsg.1-14sarge4_ia64.deb oldstable/main/binary-ia64/libxt6-dbg_4.3.0.dfsg.1-14sarge4_ia64.deb oldstable/main/binary-ia64/libxt-dev_4.3.0.dfsg.1-14sarge4_ia64.deb oldstable/main/binary-ia64/libxtrap6_4.3.0.dfsg.1-14sarge4_ia64.deb oldstable/main/binary-ia64/libxtrap6-dbg_4.3.0.dfsg.1-14sarge4_ia64.deb oldstable/main/binary-ia64/libxtrap-dev_4.3.0.dfsg.1-14sarge4_ia64.deb oldstable/main/binary-ia64/libxtst6_4.3.0.dfsg.1-14sarge4_ia64.deb oldstable/main/binary-ia64/libxtst6-dbg_4.3.0.dfsg.1-14sarge4_ia64.deb oldstable/main/binary-ia64/libxtst-dev_4.3.0.dfsg.1-14sarge4_ia64.deb oldstable/main/binary-ia64/libxv1_4.3.0.dfsg.1-14sarge4_ia64.deb oldstable/main/binary-ia64/libxv1-dbg_4.3.0.dfsg.1-14sarge4_ia64.deb oldstable/main/binary-ia64/libxv-dev_4.3.0.dfsg.1-14sarge4_ia64.deb oldstable/main/binary-ia64/proxymngr_4.3.0.dfsg.1-14sarge4_ia64.deb oldstable/main/binary-ia64/twm_4.3.0.dfsg.1-14sarge4_ia64.deb oldstable/main/binary-ia64/xbase-clients_4.3.0.dfsg.1-14sarge4_ia64.deb oldstable/main/binary-ia64/xdm_4.3.0.dfsg.1-14sarge4_ia64.deb oldstable/main/binary-ia64/xfs_4.3.0.dfsg.1-14sarge4_ia64.deb oldstable/main/binary-ia64/xfwp_4.3.0.dfsg.1-14sarge4_ia64.deb oldstable/main/binary-ia64/xlibmesa-dri_4.3.0.dfsg.1-14sarge4_ia64.deb oldstable/main/binary-ia64/xlibmesa-dri-dbg_4.3.0.dfsg.1-14sarge4_ia64.deb oldstable/main/binary-ia64/xlibmesa-gl_4.3.0.dfsg.1-14sarge4_ia64.deb oldstable/main/binary-ia64/xlibmesa-gl-dbg_4.3.0.dfsg.1-14sarge4_ia64.deb oldstable/main/binary-ia64/xlibmesa-gl-dev_4.3.0.dfsg.1-14sarge4_ia64.deb oldstable/main/binary-ia64/xlibmesa-glu_4.3.0.dfsg.1-14sarge4_ia64.deb oldstable/main/binary-ia64/xlibmesa-glu-dbg_4.3.0.dfsg.1-14sarge4_ia64.deb oldstable/main/binary-ia64/xlibmesa-glu-dev_4.3.0.dfsg.1-14sarge4_ia64.deb oldstable/main/binary-ia64/xlibosmesa4_4.3.0.dfsg.1-14sarge4_ia64.deb oldstable/main/binary-ia64/xlibosmesa4-dbg_4.3.0.dfsg.1-14sarge4_ia64.deb oldstable/main/binary-ia64/xlibosmesa-dev_4.3.0.dfsg.1-14sarge4_ia64.deb oldstable/main/binary-ia64/xlibs-static-dev_4.3.0.dfsg.1-14sarge4_ia64.deb oldstable/main/binary-ia64/xlibs-static-pic_4.3.0.dfsg.1-14sarge4_ia64.deb oldstable/main/binary-ia64/xmh_4.3.0.dfsg.1-14sarge4_ia64.deb oldstable/main/binary-ia64/xnest_4.3.0.dfsg.1-14sarge4_ia64.deb oldstable/main/binary-ia64/xserver-common_4.3.0.dfsg.1-14sarge4_ia64.deb oldstable/main/binary-ia64/xserver-xfree86_4.3.0.dfsg.1-14sarge4_ia64.deb oldstable/main/binary-ia64/xserver-xfree86-dbg_4.3.0.dfsg.1-14sarge4_ia64.deb oldstable/main/binary-ia64/xterm_4.3.0.dfsg.1-14sarge4_ia64.deb oldstable/main/binary-ia64/xutils_4.3.0.dfsg.1-14sarge4_ia64.deb oldstable/main/binary-ia64/xvfb_4.3.0.dfsg.1-14sarge4_ia64.deb oldstable/main/binary-ia64/x-window-system-core_4.3.0.dfsg.1-14sarge4_ia64.deb oldstable/main/binary-ia64/x-window-system-dev_4.3.0.dfsg.1-14sarge4_ia64.deb oldstable/main/binary-ia64/xlibmesa3_4.3.0.dfsg.1-14sarge4_ia64.deb xfree86 (4.3.0.dfsg.1-14sarge4) oldstable-security; urgency=high * Security upload, fixes several vulnerabilities: + CVE-2007-1351, CVE-2007-1352: integer overflows in the BDF font and fonts.dir parsing components of libXfont; + CVE-2007-1667: integer overflows in the XGetPixel() and XInitImage() functions in libX11 (closes: #414046); + CVE-2007-1003: integer overflow in the ProcXCMiscGetXIDList() function in the XC-MISC extension in the X server. oldstable/main/binary-m68k/lbxproxy_4.3.0.dfsg.1-14sarge4_m68k.deb oldstable/main/binary-m68k/libdps1_4.3.0.dfsg.1-14sarge4_m68k.deb oldstable/main/binary-m68k/libdps1-dbg_4.3.0.dfsg.1-14sarge4_m68k.deb oldstable/main/binary-m68k/libdps-dev_4.3.0.dfsg.1-14sarge4_m68k.deb oldstable/main/binary-m68k/libice6_4.3.0.dfsg.1-14sarge4_m68k.deb oldstable/main/binary-m68k/libice6-dbg_4.3.0.dfsg.1-14sarge4_m68k.deb oldstable/main/binary-m68k/libice-dev_4.3.0.dfsg.1-14sarge4_m68k.deb oldstable/main/binary-m68k/libsm6_4.3.0.dfsg.1-14sarge4_m68k.deb oldstable/main/binary-m68k/libsm6-dbg_4.3.0.dfsg.1-14sarge4_m68k.deb oldstable/main/binary-m68k/libsm-dev_4.3.0.dfsg.1-14sarge4_m68k.deb oldstable/main/binary-m68k/libx11-6_4.3.0.dfsg.1-14sarge4_m68k.deb oldstable/main/binary-m68k/libx11-6-dbg_4.3.0.dfsg.1-14sarge4_m68k.deb oldstable/main/binary-m68k/libx11-dev_4.3.0.dfsg.1-14sarge4_m68k.deb oldstable/main/binary-m68k/libxaw6_4.3.0.dfsg.1-14sarge4_m68k.deb oldstable/main/binary-m68k/libxaw6-dbg_4.3.0.dfsg.1-14sarge4_m68k.deb oldstable/main/binary-m68k/libxaw6-dev_4.3.0.dfsg.1-14sarge4_m68k.deb oldstable/main/binary-m68k/libxaw7_4.3.0.dfsg.1-14sarge4_m68k.deb oldstable/main/binary-m68k/libxaw7-dbg_4.3.0.dfsg.1-14sarge4_m68k.deb oldstable/main/binary-m68k/libxaw7-dev_4.3.0.dfsg.1-14sarge4_m68k.deb oldstable/main/binary-m68k/libxext6_4.3.0.dfsg.1-14sarge4_m68k.deb oldstable/main/binary-m68k/libxext6-dbg_4.3.0.dfsg.1-14sarge4_m68k.deb oldstable/main/binary-m68k/libxext-dev_4.3.0.dfsg.1-14sarge4_m68k.deb oldstable/main/binary-m68k/libxft1_4.3.0.dfsg.1-14sarge4_m68k.deb oldstable/main/binary-m68k/libxft1-dbg_4.3.0.dfsg.1-14sarge4_m68k.deb oldstable/main/binary-m68k/libxi6_4.3.0.dfsg.1-14sarge4_m68k.deb oldstable/main/binary-m68k/libxi6-dbg_4.3.0.dfsg.1-14sarge4_m68k.deb oldstable/main/binary-m68k/libxi-dev_4.3.0.dfsg.1-14sarge4_m68k.deb oldstable/main/binary-m68k/libxmu6_4.3.0.dfsg.1-14sarge4_m68k.deb oldstable/main/binary-m68k/libxmu6-dbg_4.3.0.dfsg.1-14sarge4_m68k.deb oldstable/main/binary-m68k/libxmu-dev_4.3.0.dfsg.1-14sarge4_m68k.deb oldstable/main/binary-m68k/libxmuu1_4.3.0.dfsg.1-14sarge4_m68k.deb oldstable/main/binary-m68k/libxmuu1-dbg_4.3.0.dfsg.1-14sarge4_m68k.deb oldstable/main/binary-m68k/libxmuu-dev_4.3.0.dfsg.1-14sarge4_m68k.deb oldstable/main/binary-m68k/libxp6_4.3.0.dfsg.1-14sarge4_m68k.deb oldstable/main/binary-m68k/libxp6-dbg_4.3.0.dfsg.1-14sarge4_m68k.deb oldstable/main/binary-m68k/libxp-dev_4.3.0.dfsg.1-14sarge4_m68k.deb oldstable/main/binary-m68k/libxpm4_4.3.0.dfsg.1-14sarge4_m68k.deb oldstable/main/binary-m68k/libxpm4-dbg_4.3.0.dfsg.1-14sarge4_m68k.deb oldstable/main/binary-m68k/libxpm-dev_4.3.0.dfsg.1-14sarge4_m68k.deb oldstable/main/binary-m68k/libxrandr2_4.3.0.dfsg.1-14sarge4_m68k.deb oldstable/main/binary-m68k/libxrandr2-dbg_4.3.0.dfsg.1-14sarge4_m68k.deb oldstable/main/binary-m68k/libxrandr-dev_4.3.0.dfsg.1-14sarge4_m68k.deb oldstable/main/binary-m68k/libxt6_4.3.0.dfsg.1-14sarge4_m68k.deb oldstable/main/binary-m68k/libxt6-dbg_4.3.0.dfsg.1-14sarge4_m68k.deb oldstable/main/binary-m68k/libxt-dev_4.3.0.dfsg.1-14sarge4_m68k.deb oldstable/main/binary-m68k/libxtrap6_4.3.0.dfsg.1-14sarge4_m68k.deb oldstable/main/binary-m68k/libxtrap6-dbg_4.3.0.dfsg.1-14sarge4_m68k.deb oldstable/main/binary-m68k/libxtrap-dev_4.3.0.dfsg.1-14sarge4_m68k.deb oldstable/main/binary-m68k/libxtst6_4.3.0.dfsg.1-14sarge4_m68k.deb oldstable/main/binary-m68k/libxtst6-dbg_4.3.0.dfsg.1-14sarge4_m68k.deb oldstable/main/binary-m68k/libxtst-dev_4.3.0.dfsg.1-14sarge4_m68k.deb oldstable/main/binary-m68k/libxv1_4.3.0.dfsg.1-14sarge4_m68k.deb oldstable/main/binary-m68k/libxv1-dbg_4.3.0.dfsg.1-14sarge4_m68k.deb oldstable/main/binary-m68k/libxv-dev_4.3.0.dfsg.1-14sarge4_m68k.deb oldstable/main/binary-m68k/proxymngr_4.3.0.dfsg.1-14sarge4_m68k.deb oldstable/main/binary-m68k/twm_4.3.0.dfsg.1-14sarge4_m68k.deb oldstable/main/binary-m68k/xbase-clients_4.3.0.dfsg.1-14sarge4_m68k.deb oldstable/main/binary-m68k/xdm_4.3.0.dfsg.1-14sarge4_m68k.deb oldstable/main/binary-m68k/xfs_4.3.0.dfsg.1-14sarge4_m68k.deb oldstable/main/binary-m68k/xfwp_4.3.0.dfsg.1-14sarge4_m68k.deb oldstable/main/binary-m68k/xlibmesa-gl_4.3.0.dfsg.1-14sarge4_m68k.deb oldstable/main/binary-m68k/xlibmesa-gl-dbg_4.3.0.dfsg.1-14sarge4_m68k.deb oldstable/main/binary-m68k/xlibmesa-gl-dev_4.3.0.dfsg.1-14sarge4_m68k.deb oldstable/main/binary-m68k/xlibmesa-glu_4.3.0.dfsg.1-14sarge4_m68k.deb oldstable/main/binary-m68k/xlibmesa-glu-dbg_4.3.0.dfsg.1-14sarge4_m68k.deb oldstable/main/binary-m68k/xlibmesa-glu-dev_4.3.0.dfsg.1-14sarge4_m68k.deb oldstable/main/binary-m68k/xlibs-static-dev_4.3.0.dfsg.1-14sarge4_m68k.deb oldstable/main/binary-m68k/xlibs-static-pic_4.3.0.dfsg.1-14sarge4_m68k.deb oldstable/main/binary-m68k/xmh_4.3.0.dfsg.1-14sarge4_m68k.deb oldstable/main/binary-m68k/xnest_4.3.0.dfsg.1-14sarge4_m68k.deb oldstable/main/binary-m68k/xserver-common_4.3.0.dfsg.1-14sarge4_m68k.deb oldstable/main/binary-m68k/xserver-xfree86_4.3.0.dfsg.1-14sarge4_m68k.deb oldstable/main/binary-m68k/xserver-xfree86-dbg_4.3.0.dfsg.1-14sarge4_m68k.deb oldstable/main/binary-m68k/xterm_4.3.0.dfsg.1-14sarge4_m68k.deb oldstable/main/binary-m68k/xutils_4.3.0.dfsg.1-14sarge4_m68k.deb oldstable/main/binary-m68k/xvfb_4.3.0.dfsg.1-14sarge4_m68k.deb oldstable/main/binary-m68k/x-window-system-core_4.3.0.dfsg.1-14sarge4_m68k.deb oldstable/main/binary-m68k/x-window-system-dev_4.3.0.dfsg.1-14sarge4_m68k.deb oldstable/main/binary-m68k/xlibmesa3_4.3.0.dfsg.1-14sarge4_m68k.deb xfree86 (4.3.0.dfsg.1-14sarge4) oldstable-security; urgency=high * Security upload, fixes several vulnerabilities: + CVE-2007-1351, CVE-2007-1352: integer overflows in the BDF font and fonts.dir parsing components of libXfont; + CVE-2007-1667: integer overflows in the XGetPixel() and XInitImage() functions in libX11 (closes: #414046); + CVE-2007-1003: integer overflow in the ProcXCMiscGetXIDList() function in the XC-MISC extension in the X server. oldstable/main/binary-mips/lbxproxy_4.3.0.dfsg.1-14sarge4_mips.deb oldstable/main/binary-mips/libdps1_4.3.0.dfsg.1-14sarge4_mips.deb oldstable/main/binary-mips/libdps1-dbg_4.3.0.dfsg.1-14sarge4_mips.deb oldstable/main/binary-mips/libdps-dev_4.3.0.dfsg.1-14sarge4_mips.deb oldstable/main/binary-mips/libice6_4.3.0.dfsg.1-14sarge4_mips.deb oldstable/main/binary-mips/libice6-dbg_4.3.0.dfsg.1-14sarge4_mips.deb oldstable/main/binary-mips/libice-dev_4.3.0.dfsg.1-14sarge4_mips.deb oldstable/main/binary-mips/libsm6_4.3.0.dfsg.1-14sarge4_mips.deb oldstable/main/binary-mips/libsm6-dbg_4.3.0.dfsg.1-14sarge4_mips.deb oldstable/main/binary-mips/libsm-dev_4.3.0.dfsg.1-14sarge4_mips.deb oldstable/main/binary-mips/libx11-6_4.3.0.dfsg.1-14sarge4_mips.deb oldstable/main/binary-mips/libx11-6-dbg_4.3.0.dfsg.1-14sarge4_mips.deb oldstable/main/binary-mips/libx11-dev_4.3.0.dfsg.1-14sarge4_mips.deb oldstable/main/binary-mips/libxaw6_4.3.0.dfsg.1-14sarge4_mips.deb oldstable/main/binary-mips/libxaw6-dbg_4.3.0.dfsg.1-14sarge4_mips.deb oldstable/main/binary-mips/libxaw6-dev_4.3.0.dfsg.1-14sarge4_mips.deb oldstable/main/binary-mips/libxaw7_4.3.0.dfsg.1-14sarge4_mips.deb oldstable/main/binary-mips/libxaw7-dbg_4.3.0.dfsg.1-14sarge4_mips.deb oldstable/main/binary-mips/libxaw7-dev_4.3.0.dfsg.1-14sarge4_mips.deb oldstable/main/binary-mips/libxext6_4.3.0.dfsg.1-14sarge4_mips.deb oldstable/main/binary-mips/libxext6-dbg_4.3.0.dfsg.1-14sarge4_mips.deb oldstable/main/binary-mips/libxext-dev_4.3.0.dfsg.1-14sarge4_mips.deb oldstable/main/binary-mips/libxft1_4.3.0.dfsg.1-14sarge4_mips.deb oldstable/main/binary-mips/libxft1-dbg_4.3.0.dfsg.1-14sarge4_mips.deb oldstable/main/binary-mips/libxi6_4.3.0.dfsg.1-14sarge4_mips.deb oldstable/main/binary-mips/libxi6-dbg_4.3.0.dfsg.1-14sarge4_mips.deb oldstable/main/binary-mips/libxi-dev_4.3.0.dfsg.1-14sarge4_mips.deb oldstable/main/binary-mips/libxmu6_4.3.0.dfsg.1-14sarge4_mips.deb oldstable/main/binary-mips/libxmu6-dbg_4.3.0.dfsg.1-14sarge4_mips.deb oldstable/main/binary-mips/libxmu-dev_4.3.0.dfsg.1-14sarge4_mips.deb oldstable/main/binary-mips/libxmuu1_4.3.0.dfsg.1-14sarge4_mips.deb oldstable/main/binary-mips/libxmuu1-dbg_4.3.0.dfsg.1-14sarge4_mips.deb oldstable/main/binary-mips/libxmuu-dev_4.3.0.dfsg.1-14sarge4_mips.deb oldstable/main/binary-mips/libxp6_4.3.0.dfsg.1-14sarge4_mips.deb oldstable/main/binary-mips/libxp6-dbg_4.3.0.dfsg.1-14sarge4_mips.deb oldstable/main/binary-mips/libxp-dev_4.3.0.dfsg.1-14sarge4_mips.deb oldstable/main/binary-mips/libxpm4_4.3.0.dfsg.1-14sarge4_mips.deb oldstable/main/binary-mips/libxpm4-dbg_4.3.0.dfsg.1-14sarge4_mips.deb oldstable/main/binary-mips/libxpm-dev_4.3.0.dfsg.1-14sarge4_mips.deb oldstable/main/binary-mips/libxrandr2_4.3.0.dfsg.1-14sarge4_mips.deb oldstable/main/binary-mips/libxrandr2-dbg_4.3.0.dfsg.1-14sarge4_mips.deb oldstable/main/binary-mips/libxrandr-dev_4.3.0.dfsg.1-14sarge4_mips.deb oldstable/main/binary-mips/libxt6_4.3.0.dfsg.1-14sarge4_mips.deb oldstable/main/binary-mips/libxt6-dbg_4.3.0.dfsg.1-14sarge4_mips.deb oldstable/main/binary-mips/libxt-dev_4.3.0.dfsg.1-14sarge4_mips.deb oldstable/main/binary-mips/libxtrap6_4.3.0.dfsg.1-14sarge4_mips.deb oldstable/main/binary-mips/libxtrap6-dbg_4.3.0.dfsg.1-14sarge4_mips.deb oldstable/main/binary-mips/libxtrap-dev_4.3.0.dfsg.1-14sarge4_mips.deb oldstable/main/binary-mips/libxtst6_4.3.0.dfsg.1-14sarge4_mips.deb oldstable/main/binary-mips/libxtst6-dbg_4.3.0.dfsg.1-14sarge4_mips.deb oldstable/main/binary-mips/libxtst-dev_4.3.0.dfsg.1-14sarge4_mips.deb oldstable/main/binary-mips/libxv1_4.3.0.dfsg.1-14sarge4_mips.deb oldstable/main/binary-mips/libxv1-dbg_4.3.0.dfsg.1-14sarge4_mips.deb oldstable/main/binary-mips/libxv-dev_4.3.0.dfsg.1-14sarge4_mips.deb oldstable/main/binary-mips/proxymngr_4.3.0.dfsg.1-14sarge4_mips.deb oldstable/main/binary-mips/twm_4.3.0.dfsg.1-14sarge4_mips.deb oldstable/main/binary-mips/xbase-clients_4.3.0.dfsg.1-14sarge4_mips.deb oldstable/main/binary-mips/xdm_4.3.0.dfsg.1-14sarge4_mips.deb oldstable/main/binary-mips/xfs_4.3.0.dfsg.1-14sarge4_mips.deb oldstable/main/binary-mips/xfwp_4.3.0.dfsg.1-14sarge4_mips.deb oldstable/main/binary-mips/xlibmesa-gl_4.3.0.dfsg.1-14sarge4_mips.deb oldstable/main/binary-mips/xlibmesa-gl-dbg_4.3.0.dfsg.1-14sarge4_mips.deb oldstable/main/binary-mips/xlibmesa-gl-dev_4.3.0.dfsg.1-14sarge4_mips.deb oldstable/main/binary-mips/xlibmesa-glu_4.3.0.dfsg.1-14sarge4_mips.deb oldstable/main/binary-mips/xlibmesa-glu-dbg_4.3.0.dfsg.1-14sarge4_mips.deb oldstable/main/binary-mips/xlibmesa-glu-dev_4.3.0.dfsg.1-14sarge4_mips.deb oldstable/main/binary-mips/xlibs-static-dev_4.3.0.dfsg.1-14sarge4_mips.deb oldstable/main/binary-mips/xlibs-static-pic_4.3.0.dfsg.1-14sarge4_mips.deb oldstable/main/binary-mips/xmh_4.3.0.dfsg.1-14sarge4_mips.deb oldstable/main/binary-mips/xnest_4.3.0.dfsg.1-14sarge4_mips.deb oldstable/main/binary-mips/xserver-common_4.3.0.dfsg.1-14sarge4_mips.deb oldstable/main/binary-mips/xserver-xfree86_4.3.0.dfsg.1-14sarge4_mips.deb oldstable/main/binary-mips/xserver-xfree86-dbg_4.3.0.dfsg.1-14sarge4_mips.deb oldstable/main/binary-mips/xterm_4.3.0.dfsg.1-14sarge4_mips.deb oldstable/main/binary-mips/xutils_4.3.0.dfsg.1-14sarge4_mips.deb oldstable/main/binary-mips/xvfb_4.3.0.dfsg.1-14sarge4_mips.deb oldstable/main/binary-mips/x-window-system-core_4.3.0.dfsg.1-14sarge4_mips.deb oldstable/main/binary-mips/x-window-system-dev_4.3.0.dfsg.1-14sarge4_mips.deb oldstable/main/binary-mips/xlibmesa3_4.3.0.dfsg.1-14sarge4_mips.deb xfree86 (4.3.0.dfsg.1-14sarge4) oldstable-security; urgency=high * Security upload, fixes several vulnerabilities: + CVE-2007-1351, CVE-2007-1352: integer overflows in the BDF font and fonts.dir parsing components of libXfont; + CVE-2007-1667: integer overflows in the XGetPixel() and XInitImage() functions in libX11 (closes: #414046); + CVE-2007-1003: integer overflow in the ProcXCMiscGetXIDList() function in the XC-MISC extension in the X server. oldstable/main/binary-mipsel/lbxproxy_4.3.0.dfsg.1-14sarge4_mipsel.deb oldstable/main/binary-mipsel/libdps1_4.3.0.dfsg.1-14sarge4_mipsel.deb oldstable/main/binary-mipsel/libdps1-dbg_4.3.0.dfsg.1-14sarge4_mipsel.deb oldstable/main/binary-mipsel/libdps-dev_4.3.0.dfsg.1-14sarge4_mipsel.deb oldstable/main/binary-mipsel/libice6_4.3.0.dfsg.1-14sarge4_mipsel.deb oldstable/main/binary-mipsel/libice6-dbg_4.3.0.dfsg.1-14sarge4_mipsel.deb oldstable/main/binary-mipsel/libice-dev_4.3.0.dfsg.1-14sarge4_mipsel.deb oldstable/main/binary-mipsel/libsm6_4.3.0.dfsg.1-14sarge4_mipsel.deb oldstable/main/binary-mipsel/libsm6-dbg_4.3.0.dfsg.1-14sarge4_mipsel.deb oldstable/main/binary-mipsel/libsm-dev_4.3.0.dfsg.1-14sarge4_mipsel.deb oldstable/main/binary-mipsel/libx11-6_4.3.0.dfsg.1-14sarge4_mipsel.deb oldstable/main/binary-mipsel/libx11-6-dbg_4.3.0.dfsg.1-14sarge4_mipsel.deb oldstable/main/binary-mipsel/libx11-dev_4.3.0.dfsg.1-14sarge4_mipsel.deb oldstable/main/binary-mipsel/libxaw6_4.3.0.dfsg.1-14sarge4_mipsel.deb oldstable/main/binary-mipsel/libxaw6-dbg_4.3.0.dfsg.1-14sarge4_mipsel.deb oldstable/main/binary-mipsel/libxaw6-dev_4.3.0.dfsg.1-14sarge4_mipsel.deb oldstable/main/binary-mipsel/libxaw7_4.3.0.dfsg.1-14sarge4_mipsel.deb oldstable/main/binary-mipsel/libxaw7-dbg_4.3.0.dfsg.1-14sarge4_mipsel.deb oldstable/main/binary-mipsel/libxaw7-dev_4.3.0.dfsg.1-14sarge4_mipsel.deb oldstable/main/binary-mipsel/libxext6_4.3.0.dfsg.1-14sarge4_mipsel.deb oldstable/main/binary-mipsel/libxext6-dbg_4.3.0.dfsg.1-14sarge4_mipsel.deb oldstable/main/binary-mipsel/libxext-dev_4.3.0.dfsg.1-14sarge4_mipsel.deb oldstable/main/binary-mipsel/libxft1_4.3.0.dfsg.1-14sarge4_mipsel.deb oldstable/main/binary-mipsel/libxft1-dbg_4.3.0.dfsg.1-14sarge4_mipsel.deb oldstable/main/binary-mipsel/libxi6_4.3.0.dfsg.1-14sarge4_mipsel.deb oldstable/main/binary-mipsel/libxi6-dbg_4.3.0.dfsg.1-14sarge4_mipsel.deb oldstable/main/binary-mipsel/libxi-dev_4.3.0.dfsg.1-14sarge4_mipsel.deb oldstable/main/binary-mipsel/libxmu6_4.3.0.dfsg.1-14sarge4_mipsel.deb oldstable/main/binary-mipsel/libxmu6-dbg_4.3.0.dfsg.1-14sarge4_mipsel.deb oldstable/main/binary-mipsel/libxmu-dev_4.3.0.dfsg.1-14sarge4_mipsel.deb oldstable/main/binary-mipsel/libxmuu1_4.3.0.dfsg.1-14sarge4_mipsel.deb oldstable/main/binary-mipsel/libxmuu1-dbg_4.3.0.dfsg.1-14sarge4_mipsel.deb oldstable/main/binary-mipsel/libxmuu-dev_4.3.0.dfsg.1-14sarge4_mipsel.deb oldstable/main/binary-mipsel/libxp6_4.3.0.dfsg.1-14sarge4_mipsel.deb oldstable/main/binary-mipsel/libxp6-dbg_4.3.0.dfsg.1-14sarge4_mipsel.deb oldstable/main/binary-mipsel/libxp-dev_4.3.0.dfsg.1-14sarge4_mipsel.deb oldstable/main/binary-mipsel/libxpm4_4.3.0.dfsg.1-14sarge4_mipsel.deb oldstable/main/binary-mipsel/libxpm4-dbg_4.3.0.dfsg.1-14sarge4_mipsel.deb oldstable/main/binary-mipsel/libxpm-dev_4.3.0.dfsg.1-14sarge4_mipsel.deb oldstable/main/binary-mipsel/libxrandr2_4.3.0.dfsg.1-14sarge4_mipsel.deb oldstable/main/binary-mipsel/libxrandr2-dbg_4.3.0.dfsg.1-14sarge4_mipsel.deb oldstable/main/binary-mipsel/libxrandr-dev_4.3.0.dfsg.1-14sarge4_mipsel.deb oldstable/main/binary-mipsel/libxt6_4.3.0.dfsg.1-14sarge4_mipsel.deb oldstable/main/binary-mipsel/libxt6-dbg_4.3.0.dfsg.1-14sarge4_mipsel.deb oldstable/main/binary-mipsel/libxt-dev_4.3.0.dfsg.1-14sarge4_mipsel.deb oldstable/main/binary-mipsel/libxtrap6_4.3.0.dfsg.1-14sarge4_mipsel.deb oldstable/main/binary-mipsel/libxtrap6-dbg_4.3.0.dfsg.1-14sarge4_mipsel.deb oldstable/main/binary-mipsel/libxtrap-dev_4.3.0.dfsg.1-14sarge4_mipsel.deb oldstable/main/binary-mipsel/libxtst6_4.3.0.dfsg.1-14sarge4_mipsel.deb oldstable/main/binary-mipsel/libxtst6-dbg_4.3.0.dfsg.1-14sarge4_mipsel.deb oldstable/main/binary-mipsel/libxtst-dev_4.3.0.dfsg.1-14sarge4_mipsel.deb oldstable/main/binary-mipsel/libxv1_4.3.0.dfsg.1-14sarge4_mipsel.deb oldstable/main/binary-mipsel/libxv1-dbg_4.3.0.dfsg.1-14sarge4_mipsel.deb oldstable/main/binary-mipsel/libxv-dev_4.3.0.dfsg.1-14sarge4_mipsel.deb oldstable/main/binary-mipsel/proxymngr_4.3.0.dfsg.1-14sarge4_mipsel.deb oldstable/main/binary-mipsel/twm_4.3.0.dfsg.1-14sarge4_mipsel.deb oldstable/main/binary-mipsel/xbase-clients_4.3.0.dfsg.1-14sarge4_mipsel.deb oldstable/main/binary-mipsel/xdm_4.3.0.dfsg.1-14sarge4_mipsel.deb oldstable/main/binary-mipsel/xfs_4.3.0.dfsg.1-14sarge4_mipsel.deb oldstable/main/binary-mipsel/xfwp_4.3.0.dfsg.1-14sarge4_mipsel.deb oldstable/main/binary-mipsel/xlibmesa-gl_4.3.0.dfsg.1-14sarge4_mipsel.deb oldstable/main/binary-mipsel/xlibmesa-gl-dbg_4.3.0.dfsg.1-14sarge4_mipsel.deb oldstable/main/binary-mipsel/xlibmesa-gl-dev_4.3.0.dfsg.1-14sarge4_mipsel.deb oldstable/main/binary-mipsel/xlibmesa-glu_4.3.0.dfsg.1-14sarge4_mipsel.deb oldstable/main/binary-mipsel/xlibmesa-glu-dbg_4.3.0.dfsg.1-14sarge4_mipsel.deb oldstable/main/binary-mipsel/xlibmesa-glu-dev_4.3.0.dfsg.1-14sarge4_mipsel.deb oldstable/main/binary-mipsel/xlibs-static-dev_4.3.0.dfsg.1-14sarge4_mipsel.deb oldstable/main/binary-mipsel/xlibs-static-pic_4.3.0.dfsg.1-14sarge4_mipsel.deb oldstable/main/binary-mipsel/xmh_4.3.0.dfsg.1-14sarge4_mipsel.deb oldstable/main/binary-mipsel/xnest_4.3.0.dfsg.1-14sarge4_mipsel.deb oldstable/main/binary-mipsel/xserver-common_4.3.0.dfsg.1-14sarge4_mipsel.deb oldstable/main/binary-mipsel/xserver-xfree86_4.3.0.dfsg.1-14sarge4_mipsel.deb oldstable/main/binary-mipsel/xserver-xfree86-dbg_4.3.0.dfsg.1-14sarge4_mipsel.deb oldstable/main/binary-mipsel/xterm_4.3.0.dfsg.1-14sarge4_mipsel.deb oldstable/main/binary-mipsel/xutils_4.3.0.dfsg.1-14sarge4_mipsel.deb oldstable/main/binary-mipsel/xvfb_4.3.0.dfsg.1-14sarge4_mipsel.deb oldstable/main/binary-mipsel/x-window-system-core_4.3.0.dfsg.1-14sarge4_mipsel.deb oldstable/main/binary-mipsel/x-window-system-dev_4.3.0.dfsg.1-14sarge4_mipsel.deb oldstable/main/binary-mipsel/xlibmesa3_4.3.0.dfsg.1-14sarge4_mipsel.deb xfree86 (4.3.0.dfsg.1-14sarge4) oldstable-security; urgency=high * Security upload, fixes several vulnerabilities: + CVE-2007-1351, CVE-2007-1352: integer overflows in the BDF font and fonts.dir parsing components of libXfont; + CVE-2007-1667: integer overflows in the XGetPixel() and XInitImage() functions in libX11 (closes: #414046); + CVE-2007-1003: integer overflow in the ProcXCMiscGetXIDList() function in the XC-MISC extension in the X server. oldstable/main/binary-powerpc/lbxproxy_4.3.0.dfsg.1-14sarge4_powerpc.deb oldstable/main/binary-powerpc/libdps1_4.3.0.dfsg.1-14sarge4_powerpc.deb oldstable/main/binary-powerpc/libdps1-dbg_4.3.0.dfsg.1-14sarge4_powerpc.deb oldstable/main/binary-powerpc/libdps-dev_4.3.0.dfsg.1-14sarge4_powerpc.deb oldstable/main/binary-powerpc/libice6_4.3.0.dfsg.1-14sarge4_powerpc.deb oldstable/main/binary-powerpc/libice6-dbg_4.3.0.dfsg.1-14sarge4_powerpc.deb oldstable/main/binary-powerpc/libice-dev_4.3.0.dfsg.1-14sarge4_powerpc.deb oldstable/main/binary-powerpc/libsm6_4.3.0.dfsg.1-14sarge4_powerpc.deb oldstable/main/binary-powerpc/libsm6-dbg_4.3.0.dfsg.1-14sarge4_powerpc.deb oldstable/main/binary-powerpc/libsm-dev_4.3.0.dfsg.1-14sarge4_powerpc.deb oldstable/main/binary-powerpc/libx11-6_4.3.0.dfsg.1-14sarge4_powerpc.deb oldstable/main/binary-powerpc/libx11-6-dbg_4.3.0.dfsg.1-14sarge4_powerpc.deb oldstable/main/binary-powerpc/libx11-dev_4.3.0.dfsg.1-14sarge4_powerpc.deb oldstable/main/binary-powerpc/libxaw6_4.3.0.dfsg.1-14sarge4_powerpc.deb oldstable/main/binary-powerpc/libxaw6-dbg_4.3.0.dfsg.1-14sarge4_powerpc.deb oldstable/main/binary-powerpc/libxaw6-dev_4.3.0.dfsg.1-14sarge4_powerpc.deb oldstable/main/binary-powerpc/libxaw7_4.3.0.dfsg.1-14sarge4_powerpc.deb oldstable/main/binary-powerpc/libxaw7-dbg_4.3.0.dfsg.1-14sarge4_powerpc.deb oldstable/main/binary-powerpc/libxaw7-dev_4.3.0.dfsg.1-14sarge4_powerpc.deb oldstable/main/binary-powerpc/libxext6_4.3.0.dfsg.1-14sarge4_powerpc.deb oldstable/main/binary-powerpc/libxext6-dbg_4.3.0.dfsg.1-14sarge4_powerpc.deb oldstable/main/binary-powerpc/libxext-dev_4.3.0.dfsg.1-14sarge4_powerpc.deb oldstable/main/binary-powerpc/libxft1_4.3.0.dfsg.1-14sarge4_powerpc.deb oldstable/main/binary-powerpc/libxft1-dbg_4.3.0.dfsg.1-14sarge4_powerpc.deb oldstable/main/binary-powerpc/libxi6_4.3.0.dfsg.1-14sarge4_powerpc.deb oldstable/main/binary-powerpc/libxi6-dbg_4.3.0.dfsg.1-14sarge4_powerpc.deb oldstable/main/binary-powerpc/libxi-dev_4.3.0.dfsg.1-14sarge4_powerpc.deb oldstable/main/binary-powerpc/libxmu6_4.3.0.dfsg.1-14sarge4_powerpc.deb oldstable/main/binary-powerpc/libxmu6-dbg_4.3.0.dfsg.1-14sarge4_powerpc.deb oldstable/main/binary-powerpc/libxmu-dev_4.3.0.dfsg.1-14sarge4_powerpc.deb oldstable/main/binary-powerpc/libxmuu1_4.3.0.dfsg.1-14sarge4_powerpc.deb oldstable/main/binary-powerpc/libxmuu1-dbg_4.3.0.dfsg.1-14sarge4_powerpc.deb oldstable/main/binary-powerpc/libxmuu-dev_4.3.0.dfsg.1-14sarge4_powerpc.deb oldstable/main/binary-powerpc/libxp6_4.3.0.dfsg.1-14sarge4_powerpc.deb oldstable/main/binary-powerpc/libxp6-dbg_4.3.0.dfsg.1-14sarge4_powerpc.deb oldstable/main/binary-powerpc/libxp-dev_4.3.0.dfsg.1-14sarge4_powerpc.deb oldstable/main/binary-powerpc/libxpm4_4.3.0.dfsg.1-14sarge4_powerpc.deb oldstable/main/binary-powerpc/libxpm4-dbg_4.3.0.dfsg.1-14sarge4_powerpc.deb oldstable/main/binary-powerpc/libxpm-dev_4.3.0.dfsg.1-14sarge4_powerpc.deb oldstable/main/binary-powerpc/libxrandr2_4.3.0.dfsg.1-14sarge4_powerpc.deb oldstable/main/binary-powerpc/libxrandr2-dbg_4.3.0.dfsg.1-14sarge4_powerpc.deb oldstable/main/binary-powerpc/libxrandr-dev_4.3.0.dfsg.1-14sarge4_powerpc.deb oldstable/main/binary-powerpc/libxt6_4.3.0.dfsg.1-14sarge4_powerpc.deb oldstable/main/binary-powerpc/libxt6-dbg_4.3.0.dfsg.1-14sarge4_powerpc.deb oldstable/main/binary-powerpc/libxt-dev_4.3.0.dfsg.1-14sarge4_powerpc.deb oldstable/main/binary-powerpc/libxtrap6_4.3.0.dfsg.1-14sarge4_powerpc.deb oldstable/main/binary-powerpc/libxtrap6-dbg_4.3.0.dfsg.1-14sarge4_powerpc.deb oldstable/main/binary-powerpc/libxtrap-dev_4.3.0.dfsg.1-14sarge4_powerpc.deb oldstable/main/binary-powerpc/libxtst6_4.3.0.dfsg.1-14sarge4_powerpc.deb oldstable/main/binary-powerpc/libxtst6-dbg_4.3.0.dfsg.1-14sarge4_powerpc.deb oldstable/main/binary-powerpc/libxtst-dev_4.3.0.dfsg.1-14sarge4_powerpc.deb oldstable/main/binary-powerpc/libxv1_4.3.0.dfsg.1-14sarge4_powerpc.deb oldstable/main/binary-powerpc/libxv1-dbg_4.3.0.dfsg.1-14sarge4_powerpc.deb oldstable/main/binary-powerpc/libxv-dev_4.3.0.dfsg.1-14sarge4_powerpc.deb oldstable/main/binary-powerpc/proxymngr_4.3.0.dfsg.1-14sarge4_powerpc.deb oldstable/main/binary-powerpc/twm_4.3.0.dfsg.1-14sarge4_powerpc.deb oldstable/main/binary-powerpc/xbase-clients_4.3.0.dfsg.1-14sarge4_powerpc.deb oldstable/main/binary-powerpc/xdm_4.3.0.dfsg.1-14sarge4_powerpc.deb oldstable/main/binary-powerpc/xfs_4.3.0.dfsg.1-14sarge4_powerpc.deb oldstable/main/binary-powerpc/xfwp_4.3.0.dfsg.1-14sarge4_powerpc.deb oldstable/main/binary-powerpc/xlibmesa-dri_4.3.0.dfsg.1-14sarge4_powerpc.deb oldstable/main/binary-powerpc/xlibmesa-dri-dbg_4.3.0.dfsg.1-14sarge4_powerpc.deb oldstable/main/binary-powerpc/xlibmesa-gl_4.3.0.dfsg.1-14sarge4_powerpc.deb oldstable/main/binary-powerpc/xlibmesa-gl-dbg_4.3.0.dfsg.1-14sarge4_powerpc.deb oldstable/main/binary-powerpc/xlibmesa-gl-dev_4.3.0.dfsg.1-14sarge4_powerpc.deb oldstable/main/binary-powerpc/xlibmesa-glu_4.3.0.dfsg.1-14sarge4_powerpc.deb oldstable/main/binary-powerpc/xlibmesa-glu-dbg_4.3.0.dfsg.1-14sarge4_powerpc.deb oldstable/main/binary-powerpc/xlibmesa-glu-dev_4.3.0.dfsg.1-14sarge4_powerpc.deb oldstable/main/binary-powerpc/xlibosmesa4_4.3.0.dfsg.1-14sarge4_powerpc.deb oldstable/main/binary-powerpc/xlibosmesa4-dbg_4.3.0.dfsg.1-14sarge4_powerpc.deb oldstable/main/binary-powerpc/xlibosmesa-dev_4.3.0.dfsg.1-14sarge4_powerpc.deb oldstable/main/binary-powerpc/xlibs-static-dev_4.3.0.dfsg.1-14sarge4_powerpc.deb oldstable/main/binary-powerpc/xlibs-static-pic_4.3.0.dfsg.1-14sarge4_powerpc.deb oldstable/main/binary-powerpc/xmh_4.3.0.dfsg.1-14sarge4_powerpc.deb oldstable/main/binary-powerpc/xnest_4.3.0.dfsg.1-14sarge4_powerpc.deb oldstable/main/binary-powerpc/xserver-common_4.3.0.dfsg.1-14sarge4_powerpc.deb oldstable/main/binary-powerpc/xserver-xfree86_4.3.0.dfsg.1-14sarge4_powerpc.deb oldstable/main/binary-powerpc/xserver-xfree86-dbg_4.3.0.dfsg.1-14sarge4_powerpc.deb oldstable/main/binary-powerpc/xterm_4.3.0.dfsg.1-14sarge4_powerpc.deb oldstable/main/binary-powerpc/xutils_4.3.0.dfsg.1-14sarge4_powerpc.deb oldstable/main/binary-powerpc/xvfb_4.3.0.dfsg.1-14sarge4_powerpc.deb oldstable/main/binary-powerpc/x-window-system-core_4.3.0.dfsg.1-14sarge4_powerpc.deb oldstable/main/binary-powerpc/x-window-system-dev_4.3.0.dfsg.1-14sarge4_powerpc.deb oldstable/main/binary-powerpc/xlibmesa3_4.3.0.dfsg.1-14sarge4_powerpc.deb xfree86 (4.3.0.dfsg.1-14sarge4) oldstable-security; urgency=high * Security upload, fixes several vulnerabilities: + CVE-2007-1351, CVE-2007-1352: integer overflows in the BDF font and fonts.dir parsing components of libXfont; + CVE-2007-1667: integer overflows in the XGetPixel() and XInitImage() functions in libX11 (closes: #414046); + CVE-2007-1003: integer overflow in the ProcXCMiscGetXIDList() function in the XC-MISC extension in the X server. oldstable/main/binary-s390/lbxproxy_4.3.0.dfsg.1-14sarge4_s390.deb oldstable/main/binary-s390/libdps1_4.3.0.dfsg.1-14sarge4_s390.deb oldstable/main/binary-s390/libdps1-dbg_4.3.0.dfsg.1-14sarge4_s390.deb oldstable/main/binary-s390/libdps-dev_4.3.0.dfsg.1-14sarge4_s390.deb oldstable/main/binary-s390/libice6_4.3.0.dfsg.1-14sarge4_s390.deb oldstable/main/binary-s390/libice6-dbg_4.3.0.dfsg.1-14sarge4_s390.deb oldstable/main/binary-s390/libice-dev_4.3.0.dfsg.1-14sarge4_s390.deb oldstable/main/binary-s390/libsm6_4.3.0.dfsg.1-14sarge4_s390.deb oldstable/main/binary-s390/libsm6-dbg_4.3.0.dfsg.1-14sarge4_s390.deb oldstable/main/binary-s390/libsm-dev_4.3.0.dfsg.1-14sarge4_s390.deb oldstable/main/binary-s390/libx11-6_4.3.0.dfsg.1-14sarge4_s390.deb oldstable/main/binary-s390/libx11-6-dbg_4.3.0.dfsg.1-14sarge4_s390.deb oldstable/main/binary-s390/libx11-dev_4.3.0.dfsg.1-14sarge4_s390.deb oldstable/main/binary-s390/libxaw6_4.3.0.dfsg.1-14sarge4_s390.deb oldstable/main/binary-s390/libxaw6-dbg_4.3.0.dfsg.1-14sarge4_s390.deb oldstable/main/binary-s390/libxaw6-dev_4.3.0.dfsg.1-14sarge4_s390.deb oldstable/main/binary-s390/libxaw7_4.3.0.dfsg.1-14sarge4_s390.deb oldstable/main/binary-s390/libxaw7-dbg_4.3.0.dfsg.1-14sarge4_s390.deb oldstable/main/binary-s390/libxaw7-dev_4.3.0.dfsg.1-14sarge4_s390.deb oldstable/main/binary-s390/libxext6_4.3.0.dfsg.1-14sarge4_s390.deb oldstable/main/binary-s390/libxext6-dbg_4.3.0.dfsg.1-14sarge4_s390.deb oldstable/main/binary-s390/libxext-dev_4.3.0.dfsg.1-14sarge4_s390.deb oldstable/main/binary-s390/libxft1_4.3.0.dfsg.1-14sarge4_s390.deb oldstable/main/binary-s390/libxft1-dbg_4.3.0.dfsg.1-14sarge4_s390.deb oldstable/main/binary-s390/libxi6_4.3.0.dfsg.1-14sarge4_s390.deb oldstable/main/binary-s390/libxi6-dbg_4.3.0.dfsg.1-14sarge4_s390.deb oldstable/main/binary-s390/libxi-dev_4.3.0.dfsg.1-14sarge4_s390.deb oldstable/main/binary-s390/libxmu6_4.3.0.dfsg.1-14sarge4_s390.deb oldstable/main/binary-s390/libxmu6-dbg_4.3.0.dfsg.1-14sarge4_s390.deb oldstable/main/binary-s390/libxmu-dev_4.3.0.dfsg.1-14sarge4_s390.deb oldstable/main/binary-s390/libxmuu1_4.3.0.dfsg.1-14sarge4_s390.deb oldstable/main/binary-s390/libxmuu1-dbg_4.3.0.dfsg.1-14sarge4_s390.deb oldstable/main/binary-s390/libxmuu-dev_4.3.0.dfsg.1-14sarge4_s390.deb oldstable/main/binary-s390/libxp6_4.3.0.dfsg.1-14sarge4_s390.deb oldstable/main/binary-s390/libxp6-dbg_4.3.0.dfsg.1-14sarge4_s390.deb oldstable/main/binary-s390/libxp-dev_4.3.0.dfsg.1-14sarge4_s390.deb oldstable/main/binary-s390/libxpm4_4.3.0.dfsg.1-14sarge4_s390.deb oldstable/main/binary-s390/libxpm4-dbg_4.3.0.dfsg.1-14sarge4_s390.deb oldstable/main/binary-s390/libxpm-dev_4.3.0.dfsg.1-14sarge4_s390.deb oldstable/main/binary-s390/libxrandr2_4.3.0.dfsg.1-14sarge4_s390.deb oldstable/main/binary-s390/libxrandr2-dbg_4.3.0.dfsg.1-14sarge4_s390.deb oldstable/main/binary-s390/libxrandr-dev_4.3.0.dfsg.1-14sarge4_s390.deb oldstable/main/binary-s390/libxt6_4.3.0.dfsg.1-14sarge4_s390.deb oldstable/main/binary-s390/libxt6-dbg_4.3.0.dfsg.1-14sarge4_s390.deb oldstable/main/binary-s390/libxt-dev_4.3.0.dfsg.1-14sarge4_s390.deb oldstable/main/binary-s390/libxtrap6_4.3.0.dfsg.1-14sarge4_s390.deb oldstable/main/binary-s390/libxtrap6-dbg_4.3.0.dfsg.1-14sarge4_s390.deb oldstable/main/binary-s390/libxtrap-dev_4.3.0.dfsg.1-14sarge4_s390.deb oldstable/main/binary-s390/libxtst6_4.3.0.dfsg.1-14sarge4_s390.deb oldstable/main/binary-s390/libxtst6-dbg_4.3.0.dfsg.1-14sarge4_s390.deb oldstable/main/binary-s390/libxtst-dev_4.3.0.dfsg.1-14sarge4_s390.deb oldstable/main/binary-s390/libxv1_4.3.0.dfsg.1-14sarge4_s390.deb oldstable/main/binary-s390/libxv1-dbg_4.3.0.dfsg.1-14sarge4_s390.deb oldstable/main/binary-s390/libxv-dev_4.3.0.dfsg.1-14sarge4_s390.deb oldstable/main/binary-s390/proxymngr_4.3.0.dfsg.1-14sarge4_s390.deb oldstable/main/binary-s390/twm_4.3.0.dfsg.1-14sarge4_s390.deb oldstable/main/binary-s390/xbase-clients_4.3.0.dfsg.1-14sarge4_s390.deb oldstable/main/binary-s390/xdm_4.3.0.dfsg.1-14sarge4_s390.deb oldstable/main/binary-s390/xfs_4.3.0.dfsg.1-14sarge4_s390.deb oldstable/main/binary-s390/xfwp_4.3.0.dfsg.1-14sarge4_s390.deb oldstable/main/binary-s390/xlibmesa-gl_4.3.0.dfsg.1-14sarge4_s390.deb oldstable/main/binary-s390/xlibmesa-gl-dbg_4.3.0.dfsg.1-14sarge4_s390.deb oldstable/main/binary-s390/xlibmesa-gl-dev_4.3.0.dfsg.1-14sarge4_s390.deb oldstable/main/binary-s390/xlibmesa-glu_4.3.0.dfsg.1-14sarge4_s390.deb oldstable/main/binary-s390/xlibmesa-glu-dbg_4.3.0.dfsg.1-14sarge4_s390.deb oldstable/main/binary-s390/xlibmesa-glu-dev_4.3.0.dfsg.1-14sarge4_s390.deb oldstable/main/binary-s390/xlibs-static-dev_4.3.0.dfsg.1-14sarge4_s390.deb oldstable/main/binary-s390/xlibs-static-pic_4.3.0.dfsg.1-14sarge4_s390.deb oldstable/main/binary-s390/xmh_4.3.0.dfsg.1-14sarge4_s390.deb oldstable/main/binary-s390/xnest_4.3.0.dfsg.1-14sarge4_s390.deb oldstable/main/binary-s390/xserver-common_4.3.0.dfsg.1-14sarge4_s390.deb oldstable/main/binary-s390/xterm_4.3.0.dfsg.1-14sarge4_s390.deb oldstable/main/binary-s390/xutils_4.3.0.dfsg.1-14sarge4_s390.deb oldstable/main/binary-s390/xvfb_4.3.0.dfsg.1-14sarge4_s390.deb oldstable/main/binary-s390/x-window-system-core_4.3.0.dfsg.1-14sarge4_s390.deb oldstable/main/binary-s390/x-window-system-dev_4.3.0.dfsg.1-14sarge4_s390.deb oldstable/main/binary-s390/xlibmesa3_4.3.0.dfsg.1-14sarge4_s390.deb xfree86 (4.3.0.dfsg.1-14sarge4) oldstable-security; urgency=high * Security upload, fixes several vulnerabilities: + CVE-2007-1351, CVE-2007-1352: integer overflows in the BDF font and fonts.dir parsing components of libXfont; + CVE-2007-1667: integer overflows in the XGetPixel() and XInitImage() functions in libX11 (closes: #414046); + CVE-2007-1003: integer overflow in the ProcXCMiscGetXIDList() function in the XC-MISC extension in the X server. oldstable/main/binary-sparc/lbxproxy_4.3.0.dfsg.1-14sarge4_sparc.deb oldstable/main/binary-sparc/libdps1_4.3.0.dfsg.1-14sarge4_sparc.deb oldstable/main/binary-sparc/libdps1-dbg_4.3.0.dfsg.1-14sarge4_sparc.deb oldstable/main/binary-sparc/libdps-dev_4.3.0.dfsg.1-14sarge4_sparc.deb oldstable/main/binary-sparc/libice6_4.3.0.dfsg.1-14sarge4_sparc.deb oldstable/main/binary-sparc/libice6-dbg_4.3.0.dfsg.1-14sarge4_sparc.deb oldstable/main/binary-sparc/libice-dev_4.3.0.dfsg.1-14sarge4_sparc.deb oldstable/main/binary-sparc/libsm6_4.3.0.dfsg.1-14sarge4_sparc.deb oldstable/main/binary-sparc/libsm6-dbg_4.3.0.dfsg.1-14sarge4_sparc.deb oldstable/main/binary-sparc/libsm-dev_4.3.0.dfsg.1-14sarge4_sparc.deb oldstable/main/binary-sparc/libx11-6_4.3.0.dfsg.1-14sarge4_sparc.deb oldstable/main/binary-sparc/libx11-6-dbg_4.3.0.dfsg.1-14sarge4_sparc.deb oldstable/main/binary-sparc/libx11-dev_4.3.0.dfsg.1-14sarge4_sparc.deb oldstable/main/binary-sparc/libxaw6_4.3.0.dfsg.1-14sarge4_sparc.deb oldstable/main/binary-sparc/libxaw6-dbg_4.3.0.dfsg.1-14sarge4_sparc.deb oldstable/main/binary-sparc/libxaw6-dev_4.3.0.dfsg.1-14sarge4_sparc.deb oldstable/main/binary-sparc/libxaw7_4.3.0.dfsg.1-14sarge4_sparc.deb oldstable/main/binary-sparc/libxaw7-dbg_4.3.0.dfsg.1-14sarge4_sparc.deb oldstable/main/binary-sparc/libxaw7-dev_4.3.0.dfsg.1-14sarge4_sparc.deb oldstable/main/binary-sparc/libxext6_4.3.0.dfsg.1-14sarge4_sparc.deb oldstable/main/binary-sparc/libxext6-dbg_4.3.0.dfsg.1-14sarge4_sparc.deb oldstable/main/binary-sparc/libxext-dev_4.3.0.dfsg.1-14sarge4_sparc.deb oldstable/main/binary-sparc/libxft1_4.3.0.dfsg.1-14sarge4_sparc.deb oldstable/main/binary-sparc/libxft1-dbg_4.3.0.dfsg.1-14sarge4_sparc.deb oldstable/main/binary-sparc/libxi6_4.3.0.dfsg.1-14sarge4_sparc.deb oldstable/main/binary-sparc/libxi6-dbg_4.3.0.dfsg.1-14sarge4_sparc.deb oldstable/main/binary-sparc/libxi-dev_4.3.0.dfsg.1-14sarge4_sparc.deb oldstable/main/binary-sparc/libxmu6_4.3.0.dfsg.1-14sarge4_sparc.deb oldstable/main/binary-sparc/libxmu6-dbg_4.3.0.dfsg.1-14sarge4_sparc.deb oldstable/main/binary-sparc/libxmu-dev_4.3.0.dfsg.1-14sarge4_sparc.deb oldstable/main/binary-sparc/libxmuu1_4.3.0.dfsg.1-14sarge4_sparc.deb oldstable/main/binary-sparc/libxmuu1-dbg_4.3.0.dfsg.1-14sarge4_sparc.deb oldstable/main/binary-sparc/libxmuu-dev_4.3.0.dfsg.1-14sarge4_sparc.deb oldstable/main/binary-sparc/libxp6_4.3.0.dfsg.1-14sarge4_sparc.deb oldstable/main/binary-sparc/libxp6-dbg_4.3.0.dfsg.1-14sarge4_sparc.deb oldstable/main/binary-sparc/libxp-dev_4.3.0.dfsg.1-14sarge4_sparc.deb oldstable/main/binary-sparc/libxpm4_4.3.0.dfsg.1-14sarge4_sparc.deb oldstable/main/binary-sparc/libxpm4-dbg_4.3.0.dfsg.1-14sarge4_sparc.deb oldstable/main/binary-sparc/libxpm-dev_4.3.0.dfsg.1-14sarge4_sparc.deb oldstable/main/binary-sparc/libxrandr2_4.3.0.dfsg.1-14sarge4_sparc.deb oldstable/main/binary-sparc/libxrandr2-dbg_4.3.0.dfsg.1-14sarge4_sparc.deb oldstable/main/binary-sparc/libxrandr-dev_4.3.0.dfsg.1-14sarge4_sparc.deb oldstable/main/binary-sparc/libxt6_4.3.0.dfsg.1-14sarge4_sparc.deb oldstable/main/binary-sparc/libxt6-dbg_4.3.0.dfsg.1-14sarge4_sparc.deb oldstable/main/binary-sparc/libxt-dev_4.3.0.dfsg.1-14sarge4_sparc.deb oldstable/main/binary-sparc/libxtrap6_4.3.0.dfsg.1-14sarge4_sparc.deb oldstable/main/binary-sparc/libxtrap6-dbg_4.3.0.dfsg.1-14sarge4_sparc.deb oldstable/main/binary-sparc/libxtrap-dev_4.3.0.dfsg.1-14sarge4_sparc.deb oldstable/main/binary-sparc/libxtst6_4.3.0.dfsg.1-14sarge4_sparc.deb oldstable/main/binary-sparc/libxtst6-dbg_4.3.0.dfsg.1-14sarge4_sparc.deb oldstable/main/binary-sparc/libxtst-dev_4.3.0.dfsg.1-14sarge4_sparc.deb oldstable/main/binary-sparc/libxv1_4.3.0.dfsg.1-14sarge4_sparc.deb oldstable/main/binary-sparc/libxv1-dbg_4.3.0.dfsg.1-14sarge4_sparc.deb oldstable/main/binary-sparc/libxv-dev_4.3.0.dfsg.1-14sarge4_sparc.deb oldstable/main/binary-sparc/proxymngr_4.3.0.dfsg.1-14sarge4_sparc.deb oldstable/main/binary-sparc/twm_4.3.0.dfsg.1-14sarge4_sparc.deb oldstable/main/binary-sparc/xbase-clients_4.3.0.dfsg.1-14sarge4_sparc.deb oldstable/main/binary-sparc/xdm_4.3.0.dfsg.1-14sarge4_sparc.deb oldstable/main/binary-sparc/xfs_4.3.0.dfsg.1-14sarge4_sparc.deb oldstable/main/binary-sparc/xfwp_4.3.0.dfsg.1-14sarge4_sparc.deb oldstable/main/binary-sparc/xlibmesa-dri_4.3.0.dfsg.1-14sarge4_sparc.deb oldstable/main/binary-sparc/xlibmesa-dri-dbg_4.3.0.dfsg.1-14sarge4_sparc.deb oldstable/main/binary-sparc/xlibmesa-gl_4.3.0.dfsg.1-14sarge4_sparc.deb oldstable/main/binary-sparc/xlibmesa-gl-dbg_4.3.0.dfsg.1-14sarge4_sparc.deb oldstable/main/binary-sparc/xlibmesa-gl-dev_4.3.0.dfsg.1-14sarge4_sparc.deb oldstable/main/binary-sparc/xlibmesa-glu_4.3.0.dfsg.1-14sarge4_sparc.deb oldstable/main/binary-sparc/xlibmesa-glu-dbg_4.3.0.dfsg.1-14sarge4_sparc.deb oldstable/main/binary-sparc/xlibmesa-glu-dev_4.3.0.dfsg.1-14sarge4_sparc.deb oldstable/main/binary-sparc/xlibosmesa4_4.3.0.dfsg.1-14sarge4_sparc.deb oldstable/main/binary-sparc/xlibosmesa4-dbg_4.3.0.dfsg.1-14sarge4_sparc.deb oldstable/main/binary-sparc/xlibosmesa-dev_4.3.0.dfsg.1-14sarge4_sparc.deb oldstable/main/binary-sparc/xlibs-static-dev_4.3.0.dfsg.1-14sarge4_sparc.deb oldstable/main/binary-sparc/xlibs-static-pic_4.3.0.dfsg.1-14sarge4_sparc.deb oldstable/main/binary-sparc/xmh_4.3.0.dfsg.1-14sarge4_sparc.deb oldstable/main/binary-sparc/xnest_4.3.0.dfsg.1-14sarge4_sparc.deb oldstable/main/binary-sparc/xserver-common_4.3.0.dfsg.1-14sarge4_sparc.deb oldstable/main/binary-sparc/xserver-xfree86_4.3.0.dfsg.1-14sarge4_sparc.deb oldstable/main/binary-sparc/xserver-xfree86-dbg_4.3.0.dfsg.1-14sarge4_sparc.deb oldstable/main/binary-sparc/xterm_4.3.0.dfsg.1-14sarge4_sparc.deb oldstable/main/binary-sparc/xutils_4.3.0.dfsg.1-14sarge4_sparc.deb oldstable/main/binary-sparc/xvfb_4.3.0.dfsg.1-14sarge4_sparc.deb oldstable/main/binary-sparc/x-window-system-core_4.3.0.dfsg.1-14sarge4_sparc.deb oldstable/main/binary-sparc/x-window-system-dev_4.3.0.dfsg.1-14sarge4_sparc.deb oldstable/main/binary-sparc/xlibmesa3_4.3.0.dfsg.1-14sarge4_sparc.deb xfree86 (4.3.0.dfsg.1-14sarge4) oldstable-security; urgency=high * Security upload, fixes several vulnerabilities: + CVE-2007-1351, CVE-2007-1352: integer overflows in the BDF font and fonts.dir parsing components of libXfont; + CVE-2007-1667: integer overflows in the XGetPixel() and XInitImage() functions in libX11 (closes: #414046); + CVE-2007-1003: integer overflow in the ProcXCMiscGetXIDList() function in the XC-MISC extension in the X server. oldstable/main/binary-alpha/lbxproxy_4.3.0.dfsg.1-14sarge5_alpha.deb oldstable/main/binary-alpha/libdps1_4.3.0.dfsg.1-14sarge5_alpha.deb oldstable/main/binary-alpha/libdps1-dbg_4.3.0.dfsg.1-14sarge5_alpha.deb oldstable/main/binary-alpha/libdps-dev_4.3.0.dfsg.1-14sarge5_alpha.deb oldstable/main/binary-alpha/libice6_4.3.0.dfsg.1-14sarge5_alpha.deb oldstable/main/binary-alpha/libice6-dbg_4.3.0.dfsg.1-14sarge5_alpha.deb oldstable/main/binary-alpha/libice-dev_4.3.0.dfsg.1-14sarge5_alpha.deb oldstable/main/binary-alpha/libsm6_4.3.0.dfsg.1-14sarge5_alpha.deb oldstable/main/binary-alpha/libsm6-dbg_4.3.0.dfsg.1-14sarge5_alpha.deb oldstable/main/binary-alpha/libsm-dev_4.3.0.dfsg.1-14sarge5_alpha.deb oldstable/main/binary-alpha/libx11-6_4.3.0.dfsg.1-14sarge5_alpha.deb oldstable/main/binary-alpha/libx11-6-dbg_4.3.0.dfsg.1-14sarge5_alpha.deb oldstable/main/binary-alpha/libx11-dev_4.3.0.dfsg.1-14sarge5_alpha.deb oldstable/main/binary-alpha/libxaw6_4.3.0.dfsg.1-14sarge5_alpha.deb oldstable/main/binary-alpha/libxaw6-dbg_4.3.0.dfsg.1-14sarge5_alpha.deb oldstable/main/binary-alpha/libxaw6-dev_4.3.0.dfsg.1-14sarge5_alpha.deb oldstable/main/binary-alpha/libxaw7_4.3.0.dfsg.1-14sarge5_alpha.deb oldstable/main/binary-alpha/libxaw7-dbg_4.3.0.dfsg.1-14sarge5_alpha.deb oldstable/main/binary-alpha/libxaw7-dev_4.3.0.dfsg.1-14sarge5_alpha.deb oldstable/main/binary-alpha/libxext6_4.3.0.dfsg.1-14sarge5_alpha.deb oldstable/main/binary-alpha/libxext6-dbg_4.3.0.dfsg.1-14sarge5_alpha.deb oldstable/main/binary-alpha/libxext-dev_4.3.0.dfsg.1-14sarge5_alpha.deb oldstable/main/binary-alpha/libxft1_4.3.0.dfsg.1-14sarge5_alpha.deb oldstable/main/binary-alpha/libxft1-dbg_4.3.0.dfsg.1-14sarge5_alpha.deb oldstable/main/binary-alpha/libxi6_4.3.0.dfsg.1-14sarge5_alpha.deb oldstable/main/binary-alpha/libxi6-dbg_4.3.0.dfsg.1-14sarge5_alpha.deb oldstable/main/binary-alpha/libxi-dev_4.3.0.dfsg.1-14sarge5_alpha.deb oldstable/main/binary-alpha/libxmu6_4.3.0.dfsg.1-14sarge5_alpha.deb oldstable/main/binary-alpha/libxmu6-dbg_4.3.0.dfsg.1-14sarge5_alpha.deb oldstable/main/binary-alpha/libxmu-dev_4.3.0.dfsg.1-14sarge5_alpha.deb oldstable/main/binary-alpha/libxmuu1_4.3.0.dfsg.1-14sarge5_alpha.deb oldstable/main/binary-alpha/libxmuu1-dbg_4.3.0.dfsg.1-14sarge5_alpha.deb oldstable/main/binary-alpha/libxmuu-dev_4.3.0.dfsg.1-14sarge5_alpha.deb oldstable/main/binary-alpha/libxp6_4.3.0.dfsg.1-14sarge5_alpha.deb oldstable/main/binary-alpha/libxp6-dbg_4.3.0.dfsg.1-14sarge5_alpha.deb oldstable/main/binary-alpha/libxp-dev_4.3.0.dfsg.1-14sarge5_alpha.deb oldstable/main/binary-alpha/libxpm4_4.3.0.dfsg.1-14sarge5_alpha.deb oldstable/main/binary-alpha/libxpm4-dbg_4.3.0.dfsg.1-14sarge5_alpha.deb oldstable/main/binary-alpha/libxpm-dev_4.3.0.dfsg.1-14sarge5_alpha.deb oldstable/main/binary-alpha/libxrandr2_4.3.0.dfsg.1-14sarge5_alpha.deb oldstable/main/binary-alpha/libxrandr2-dbg_4.3.0.dfsg.1-14sarge5_alpha.deb oldstable/main/binary-alpha/libxrandr-dev_4.3.0.dfsg.1-14sarge5_alpha.deb oldstable/main/binary-alpha/libxt6_4.3.0.dfsg.1-14sarge5_alpha.deb oldstable/main/binary-alpha/libxt6-dbg_4.3.0.dfsg.1-14sarge5_alpha.deb oldstable/main/binary-alpha/libxt-dev_4.3.0.dfsg.1-14sarge5_alpha.deb oldstable/main/binary-alpha/libxtrap6_4.3.0.dfsg.1-14sarge5_alpha.deb oldstable/main/binary-alpha/libxtrap6-dbg_4.3.0.dfsg.1-14sarge5_alpha.deb oldstable/main/binary-alpha/libxtrap-dev_4.3.0.dfsg.1-14sarge5_alpha.deb oldstable/main/binary-alpha/libxtst6_4.3.0.dfsg.1-14sarge5_alpha.deb oldstable/main/binary-alpha/libxtst6-dbg_4.3.0.dfsg.1-14sarge5_alpha.deb oldstable/main/binary-alpha/libxtst-dev_4.3.0.dfsg.1-14sarge5_alpha.deb oldstable/main/binary-alpha/libxv1_4.3.0.dfsg.1-14sarge5_alpha.deb oldstable/main/binary-alpha/libxv1-dbg_4.3.0.dfsg.1-14sarge5_alpha.deb oldstable/main/binary-alpha/libxv-dev_4.3.0.dfsg.1-14sarge5_alpha.deb oldstable/main/binary-alpha/proxymngr_4.3.0.dfsg.1-14sarge5_alpha.deb oldstable/main/binary-alpha/twm_4.3.0.dfsg.1-14sarge5_alpha.deb oldstable/main/binary-alpha/xbase-clients_4.3.0.dfsg.1-14sarge5_alpha.deb oldstable/main/binary-alpha/xdm_4.3.0.dfsg.1-14sarge5_alpha.deb oldstable/main/binary-alpha/xfs_4.3.0.dfsg.1-14sarge5_alpha.deb oldstable/main/binary-alpha/xfwp_4.3.0.dfsg.1-14sarge5_alpha.deb oldstable/main/binary-alpha/xlibmesa-dri_4.3.0.dfsg.1-14sarge5_alpha.deb oldstable/main/binary-alpha/xlibmesa-dri-dbg_4.3.0.dfsg.1-14sarge5_alpha.deb oldstable/main/binary-alpha/xlibmesa-gl_4.3.0.dfsg.1-14sarge5_alpha.deb oldstable/main/binary-alpha/xlibmesa-gl-dbg_4.3.0.dfsg.1-14sarge5_alpha.deb oldstable/main/binary-alpha/xlibmesa-gl-dev_4.3.0.dfsg.1-14sarge5_alpha.deb oldstable/main/binary-alpha/xlibmesa-glu_4.3.0.dfsg.1-14sarge5_alpha.deb oldstable/main/binary-alpha/xlibmesa-glu-dbg_4.3.0.dfsg.1-14sarge5_alpha.deb oldstable/main/binary-alpha/xlibmesa-glu-dev_4.3.0.dfsg.1-14sarge5_alpha.deb oldstable/main/binary-alpha/xlibosmesa4_4.3.0.dfsg.1-14sarge5_alpha.deb oldstable/main/binary-alpha/xlibosmesa4-dbg_4.3.0.dfsg.1-14sarge5_alpha.deb oldstable/main/binary-alpha/xlibosmesa-dev_4.3.0.dfsg.1-14sarge5_alpha.deb oldstable/main/binary-alpha/xlibs-static-dev_4.3.0.dfsg.1-14sarge5_alpha.deb oldstable/main/binary-alpha/xlibs-static-pic_4.3.0.dfsg.1-14sarge5_alpha.deb oldstable/main/binary-alpha/xmh_4.3.0.dfsg.1-14sarge5_alpha.deb oldstable/main/binary-alpha/xnest_4.3.0.dfsg.1-14sarge5_alpha.deb oldstable/main/binary-alpha/xserver-common_4.3.0.dfsg.1-14sarge5_alpha.deb oldstable/main/binary-alpha/xserver-xfree86_4.3.0.dfsg.1-14sarge5_alpha.deb oldstable/main/binary-alpha/xserver-xfree86-dbg_4.3.0.dfsg.1-14sarge5_alpha.deb oldstable/main/binary-alpha/xterm_4.3.0.dfsg.1-14sarge5_alpha.deb oldstable/main/binary-alpha/xutils_4.3.0.dfsg.1-14sarge5_alpha.deb oldstable/main/binary-alpha/xvfb_4.3.0.dfsg.1-14sarge5_alpha.deb oldstable/main/binary-alpha/x-window-system-core_4.3.0.dfsg.1-14sarge5_alpha.deb oldstable/main/binary-alpha/x-window-system-dev_4.3.0.dfsg.1-14sarge5_alpha.deb oldstable/main/binary-alpha/xlibmesa3_4.3.0.dfsg.1-14sarge5_alpha.deb xfree86 (4.3.0.dfsg.1-14sarge5) oldstable-security; urgency=high * Security upload, fixes several vulnerabilities + CVE-2007-4568: integer overflow in the computation of the size of a dynamic buffer can lead to a heap overflow in the build_range() function. Also, an arbitrary number of bytes on the heap can be swapped by the swap_char2b() function. + CVE-2007-3103: race condition in xfs init script oldstable/main/binary-amd64/lbxproxy_4.3.0.dfsg.1-14sarge5_amd64.deb oldstable/main/binary-amd64/libdps1_4.3.0.dfsg.1-14sarge5_amd64.deb oldstable/main/binary-amd64/libdps1-dbg_4.3.0.dfsg.1-14sarge5_amd64.deb oldstable/main/binary-amd64/libdps-dev_4.3.0.dfsg.1-14sarge5_amd64.deb oldstable/main/binary-amd64/libice6_4.3.0.dfsg.1-14sarge5_amd64.deb oldstable/main/binary-amd64/libice6-dbg_4.3.0.dfsg.1-14sarge5_amd64.deb oldstable/main/binary-amd64/libice-dev_4.3.0.dfsg.1-14sarge5_amd64.deb oldstable/main/binary-amd64/libsm6_4.3.0.dfsg.1-14sarge5_amd64.deb oldstable/main/binary-amd64/libsm6-dbg_4.3.0.dfsg.1-14sarge5_amd64.deb oldstable/main/binary-amd64/libsm-dev_4.3.0.dfsg.1-14sarge5_amd64.deb oldstable/main/binary-amd64/libx11-6_4.3.0.dfsg.1-14sarge5_amd64.deb oldstable/main/binary-amd64/libx11-6-dbg_4.3.0.dfsg.1-14sarge5_amd64.deb oldstable/main/binary-amd64/libx11-dev_4.3.0.dfsg.1-14sarge5_amd64.deb oldstable/main/binary-amd64/libxaw6_4.3.0.dfsg.1-14sarge5_amd64.deb oldstable/main/binary-amd64/libxaw6-dbg_4.3.0.dfsg.1-14sarge5_amd64.deb oldstable/main/binary-amd64/libxaw6-dev_4.3.0.dfsg.1-14sarge5_amd64.deb oldstable/main/binary-amd64/libxaw7_4.3.0.dfsg.1-14sarge5_amd64.deb oldstable/main/binary-amd64/libxaw7-dbg_4.3.0.dfsg.1-14sarge5_amd64.deb oldstable/main/binary-amd64/libxaw7-dev_4.3.0.dfsg.1-14sarge5_amd64.deb oldstable/main/binary-amd64/libxext6_4.3.0.dfsg.1-14sarge5_amd64.deb oldstable/main/binary-amd64/libxext6-dbg_4.3.0.dfsg.1-14sarge5_amd64.deb oldstable/main/binary-amd64/libxext-dev_4.3.0.dfsg.1-14sarge5_amd64.deb oldstable/main/binary-amd64/libxft1_4.3.0.dfsg.1-14sarge5_amd64.deb oldstable/main/binary-amd64/libxft1-dbg_4.3.0.dfsg.1-14sarge5_amd64.deb oldstable/main/binary-amd64/libxi6_4.3.0.dfsg.1-14sarge5_amd64.deb oldstable/main/binary-amd64/libxi6-dbg_4.3.0.dfsg.1-14sarge5_amd64.deb oldstable/main/binary-amd64/libxi-dev_4.3.0.dfsg.1-14sarge5_amd64.deb oldstable/main/binary-amd64/libxmu6_4.3.0.dfsg.1-14sarge5_amd64.deb oldstable/main/binary-amd64/libxmu6-dbg_4.3.0.dfsg.1-14sarge5_amd64.deb oldstable/main/binary-amd64/libxmu-dev_4.3.0.dfsg.1-14sarge5_amd64.deb oldstable/main/binary-amd64/libxmuu1_4.3.0.dfsg.1-14sarge5_amd64.deb oldstable/main/binary-amd64/libxmuu1-dbg_4.3.0.dfsg.1-14sarge5_amd64.deb oldstable/main/binary-amd64/libxmuu-dev_4.3.0.dfsg.1-14sarge5_amd64.deb oldstable/main/binary-amd64/libxp6_4.3.0.dfsg.1-14sarge5_amd64.deb oldstable/main/binary-amd64/libxp6-dbg_4.3.0.dfsg.1-14sarge5_amd64.deb oldstable/main/binary-amd64/libxp-dev_4.3.0.dfsg.1-14sarge5_amd64.deb oldstable/main/binary-amd64/libxpm4_4.3.0.dfsg.1-14sarge5_amd64.deb oldstable/main/binary-amd64/libxpm4-dbg_4.3.0.dfsg.1-14sarge5_amd64.deb oldstable/main/binary-amd64/libxpm-dev_4.3.0.dfsg.1-14sarge5_amd64.deb oldstable/main/binary-amd64/libxrandr2_4.3.0.dfsg.1-14sarge5_amd64.deb oldstable/main/binary-amd64/libxrandr2-dbg_4.3.0.dfsg.1-14sarge5_amd64.deb oldstable/main/binary-amd64/libxrandr-dev_4.3.0.dfsg.1-14sarge5_amd64.deb oldstable/main/binary-amd64/libxt6_4.3.0.dfsg.1-14sarge5_amd64.deb oldstable/main/binary-amd64/libxt6-dbg_4.3.0.dfsg.1-14sarge5_amd64.deb oldstable/main/binary-amd64/libxt-dev_4.3.0.dfsg.1-14sarge5_amd64.deb oldstable/main/binary-amd64/libxtrap6_4.3.0.dfsg.1-14sarge5_amd64.deb oldstable/main/binary-amd64/libxtrap6-dbg_4.3.0.dfsg.1-14sarge5_amd64.deb oldstable/main/binary-amd64/libxtrap-dev_4.3.0.dfsg.1-14sarge5_amd64.deb oldstable/main/binary-amd64/libxtst6_4.3.0.dfsg.1-14sarge5_amd64.deb oldstable/main/binary-amd64/libxtst6-dbg_4.3.0.dfsg.1-14sarge5_amd64.deb oldstable/main/binary-amd64/libxtst-dev_4.3.0.dfsg.1-14sarge5_amd64.deb oldstable/main/binary-amd64/libxv1_4.3.0.dfsg.1-14sarge5_amd64.deb oldstable/main/binary-amd64/libxv1-dbg_4.3.0.dfsg.1-14sarge5_amd64.deb oldstable/main/binary-amd64/libxv-dev_4.3.0.dfsg.1-14sarge5_amd64.deb oldstable/main/binary-amd64/proxymngr_4.3.0.dfsg.1-14sarge5_amd64.deb oldstable/main/binary-amd64/twm_4.3.0.dfsg.1-14sarge5_amd64.deb oldstable/main/binary-amd64/xbase-clients_4.3.0.dfsg.1-14sarge5_amd64.deb oldstable/main/binary-amd64/xdm_4.3.0.dfsg.1-14sarge5_amd64.deb oldstable/main/binary-amd64/xfs_4.3.0.dfsg.1-14sarge5_amd64.deb oldstable/main/binary-amd64/xfwp_4.3.0.dfsg.1-14sarge5_amd64.deb oldstable/main/binary-amd64/xlibmesa-dri_4.3.0.dfsg.1-14sarge5_amd64.deb oldstable/main/binary-amd64/xlibmesa-dri-dbg_4.3.0.dfsg.1-14sarge5_amd64.deb oldstable/main/binary-amd64/xlibmesa-gl_4.3.0.dfsg.1-14sarge5_amd64.deb oldstable/main/binary-amd64/xlibmesa-gl-dbg_4.3.0.dfsg.1-14sarge5_amd64.deb oldstable/main/binary-amd64/xlibmesa-gl-dev_4.3.0.dfsg.1-14sarge5_amd64.deb oldstable/main/binary-amd64/xlibmesa-glu_4.3.0.dfsg.1-14sarge5_amd64.deb oldstable/main/binary-amd64/xlibmesa-glu-dbg_4.3.0.dfsg.1-14sarge5_amd64.deb oldstable/main/binary-amd64/xlibmesa-glu-dev_4.3.0.dfsg.1-14sarge5_amd64.deb oldstable/main/binary-amd64/xlibosmesa4_4.3.0.dfsg.1-14sarge5_amd64.deb oldstable/main/binary-amd64/xlibosmesa4-dbg_4.3.0.dfsg.1-14sarge5_amd64.deb oldstable/main/binary-amd64/xlibosmesa-dev_4.3.0.dfsg.1-14sarge5_amd64.deb oldstable/main/binary-amd64/xlibs-static-dev_4.3.0.dfsg.1-14sarge5_amd64.deb oldstable/main/binary-amd64/xlibs-static-pic_4.3.0.dfsg.1-14sarge5_amd64.deb oldstable/main/binary-amd64/xmh_4.3.0.dfsg.1-14sarge5_amd64.deb oldstable/main/binary-amd64/xnest_4.3.0.dfsg.1-14sarge5_amd64.deb oldstable/main/binary-amd64/xserver-common_4.3.0.dfsg.1-14sarge5_amd64.deb oldstable/main/binary-amd64/xserver-xfree86_4.3.0.dfsg.1-14sarge5_amd64.deb oldstable/main/binary-amd64/xserver-xfree86-dbg_4.3.0.dfsg.1-14sarge5_amd64.deb oldstable/main/binary-amd64/xterm_4.3.0.dfsg.1-14sarge5_amd64.deb oldstable/main/binary-amd64/xutils_4.3.0.dfsg.1-14sarge5_amd64.deb oldstable/main/binary-amd64/xvfb_4.3.0.dfsg.1-14sarge5_amd64.deb oldstable/main/binary-amd64/x-window-system-core_4.3.0.dfsg.1-14sarge5_amd64.deb oldstable/main/binary-amd64/x-window-system-dev_4.3.0.dfsg.1-14sarge5_amd64.deb oldstable/main/binary-amd64/xlibmesa3_4.3.0.dfsg.1-14sarge5_amd64.deb xfree86 (4.3.0.dfsg.1-14sarge5) oldstable-security; urgency=high * Security upload, fixes several vulnerabilities + CVE-2007-4568: integer overflow in the computation of the size of a dynamic buffer can lead to a heap overflow in the build_range() function. Also, an arbitrary number of bytes on the heap can be swapped by the swap_char2b() function. + CVE-2007-3103: race condition in xfs init script oldstable/main/binary-arm/lbxproxy_4.3.0.dfsg.1-14sarge5_arm.deb oldstable/main/binary-arm/libdps1_4.3.0.dfsg.1-14sarge5_arm.deb oldstable/main/binary-arm/libdps1-dbg_4.3.0.dfsg.1-14sarge5_arm.deb oldstable/main/binary-arm/libdps-dev_4.3.0.dfsg.1-14sarge5_arm.deb oldstable/main/binary-arm/libice6_4.3.0.dfsg.1-14sarge5_arm.deb oldstable/main/binary-arm/libice6-dbg_4.3.0.dfsg.1-14sarge5_arm.deb oldstable/main/binary-arm/libice-dev_4.3.0.dfsg.1-14sarge5_arm.deb oldstable/main/binary-arm/libsm6_4.3.0.dfsg.1-14sarge5_arm.deb oldstable/main/binary-arm/libsm6-dbg_4.3.0.dfsg.1-14sarge5_arm.deb oldstable/main/binary-arm/libsm-dev_4.3.0.dfsg.1-14sarge5_arm.deb oldstable/main/binary-arm/libx11-6_4.3.0.dfsg.1-14sarge5_arm.deb oldstable/main/binary-arm/libx11-6-dbg_4.3.0.dfsg.1-14sarge5_arm.deb oldstable/main/binary-arm/libx11-dev_4.3.0.dfsg.1-14sarge5_arm.deb oldstable/main/binary-arm/libxaw6_4.3.0.dfsg.1-14sarge5_arm.deb oldstable/main/binary-arm/libxaw6-dbg_4.3.0.dfsg.1-14sarge5_arm.deb oldstable/main/binary-arm/libxaw6-dev_4.3.0.dfsg.1-14sarge5_arm.deb oldstable/main/binary-arm/libxaw7_4.3.0.dfsg.1-14sarge5_arm.deb oldstable/main/binary-arm/libxaw7-dbg_4.3.0.dfsg.1-14sarge5_arm.deb oldstable/main/binary-arm/libxaw7-dev_4.3.0.dfsg.1-14sarge5_arm.deb oldstable/main/binary-arm/libxext6_4.3.0.dfsg.1-14sarge5_arm.deb oldstable/main/binary-arm/libxext6-dbg_4.3.0.dfsg.1-14sarge5_arm.deb oldstable/main/binary-arm/libxext-dev_4.3.0.dfsg.1-14sarge5_arm.deb oldstable/main/binary-arm/libxft1_4.3.0.dfsg.1-14sarge5_arm.deb oldstable/main/binary-arm/libxft1-dbg_4.3.0.dfsg.1-14sarge5_arm.deb oldstable/main/binary-arm/libxi6_4.3.0.dfsg.1-14sarge5_arm.deb oldstable/main/binary-arm/libxi6-dbg_4.3.0.dfsg.1-14sarge5_arm.deb oldstable/main/binary-arm/libxi-dev_4.3.0.dfsg.1-14sarge5_arm.deb oldstable/main/binary-arm/libxmu6_4.3.0.dfsg.1-14sarge5_arm.deb oldstable/main/binary-arm/libxmu6-dbg_4.3.0.dfsg.1-14sarge5_arm.deb oldstable/main/binary-arm/libxmu-dev_4.3.0.dfsg.1-14sarge5_arm.deb oldstable/main/binary-arm/libxmuu1_4.3.0.dfsg.1-14sarge5_arm.deb oldstable/main/binary-arm/libxmuu1-dbg_4.3.0.dfsg.1-14sarge5_arm.deb oldstable/main/binary-arm/libxmuu-dev_4.3.0.dfsg.1-14sarge5_arm.deb oldstable/main/binary-arm/libxp6_4.3.0.dfsg.1-14sarge5_arm.deb oldstable/main/binary-arm/libxp6-dbg_4.3.0.dfsg.1-14sarge5_arm.deb oldstable/main/binary-arm/libxp-dev_4.3.0.dfsg.1-14sarge5_arm.deb oldstable/main/binary-arm/libxpm4_4.3.0.dfsg.1-14sarge5_arm.deb oldstable/main/binary-arm/libxpm4-dbg_4.3.0.dfsg.1-14sarge5_arm.deb oldstable/main/binary-arm/libxpm-dev_4.3.0.dfsg.1-14sarge5_arm.deb oldstable/main/binary-arm/libxrandr2_4.3.0.dfsg.1-14sarge5_arm.deb oldstable/main/binary-arm/libxrandr2-dbg_4.3.0.dfsg.1-14sarge5_arm.deb oldstable/main/binary-arm/libxrandr-dev_4.3.0.dfsg.1-14sarge5_arm.deb oldstable/main/binary-arm/libxt6_4.3.0.dfsg.1-14sarge5_arm.deb oldstable/main/binary-arm/libxt6-dbg_4.3.0.dfsg.1-14sarge5_arm.deb oldstable/main/binary-arm/libxt-dev_4.3.0.dfsg.1-14sarge5_arm.deb oldstable/main/binary-arm/libxtrap6_4.3.0.dfsg.1-14sarge5_arm.deb oldstable/main/binary-arm/libxtrap6-dbg_4.3.0.dfsg.1-14sarge5_arm.deb oldstable/main/binary-arm/libxtrap-dev_4.3.0.dfsg.1-14sarge5_arm.deb oldstable/main/binary-arm/libxtst6_4.3.0.dfsg.1-14sarge5_arm.deb oldstable/main/binary-arm/libxtst6-dbg_4.3.0.dfsg.1-14sarge5_arm.deb oldstable/main/binary-arm/libxtst-dev_4.3.0.dfsg.1-14sarge5_arm.deb oldstable/main/binary-arm/libxv1_4.3.0.dfsg.1-14sarge5_arm.deb oldstable/main/binary-arm/libxv1-dbg_4.3.0.dfsg.1-14sarge5_arm.deb oldstable/main/binary-arm/libxv-dev_4.3.0.dfsg.1-14sarge5_arm.deb oldstable/main/binary-arm/proxymngr_4.3.0.dfsg.1-14sarge5_arm.deb oldstable/main/binary-arm/twm_4.3.0.dfsg.1-14sarge5_arm.deb oldstable/main/binary-arm/xbase-clients_4.3.0.dfsg.1-14sarge5_arm.deb oldstable/main/binary-arm/xdm_4.3.0.dfsg.1-14sarge5_arm.deb oldstable/main/binary-arm/xfs_4.3.0.dfsg.1-14sarge5_arm.deb oldstable/main/binary-arm/xfwp_4.3.0.dfsg.1-14sarge5_arm.deb oldstable/main/binary-arm/xlibmesa-gl_4.3.0.dfsg.1-14sarge5_arm.deb oldstable/main/binary-arm/xlibmesa-gl-dbg_4.3.0.dfsg.1-14sarge5_arm.deb oldstable/main/binary-arm/xlibmesa-gl-dev_4.3.0.dfsg.1-14sarge5_arm.deb oldstable/main/binary-arm/xlibmesa-glu_4.3.0.dfsg.1-14sarge5_arm.deb oldstable/main/binary-arm/xlibmesa-glu-dbg_4.3.0.dfsg.1-14sarge5_arm.deb oldstable/main/binary-arm/xlibmesa-glu-dev_4.3.0.dfsg.1-14sarge5_arm.deb oldstable/main/binary-arm/xlibs-static-dev_4.3.0.dfsg.1-14sarge5_arm.deb oldstable/main/binary-arm/xlibs-static-pic_4.3.0.dfsg.1-14sarge5_arm.deb oldstable/main/binary-arm/xmh_4.3.0.dfsg.1-14sarge5_arm.deb oldstable/main/binary-arm/xnest_4.3.0.dfsg.1-14sarge5_arm.deb oldstable/main/binary-arm/xserver-common_4.3.0.dfsg.1-14sarge5_arm.deb oldstable/main/binary-arm/xserver-xfree86_4.3.0.dfsg.1-14sarge5_arm.deb oldstable/main/binary-arm/xserver-xfree86-dbg_4.3.0.dfsg.1-14sarge5_arm.deb oldstable/main/binary-arm/xterm_4.3.0.dfsg.1-14sarge5_arm.deb oldstable/main/binary-arm/xutils_4.3.0.dfsg.1-14sarge5_arm.deb oldstable/main/binary-arm/xvfb_4.3.0.dfsg.1-14sarge5_arm.deb oldstable/main/binary-arm/x-window-system-core_4.3.0.dfsg.1-14sarge5_arm.deb oldstable/main/binary-arm/x-window-system-dev_4.3.0.dfsg.1-14sarge5_arm.deb oldstable/main/binary-arm/xlibmesa3_4.3.0.dfsg.1-14sarge5_arm.deb xfree86 (4.3.0.dfsg.1-14sarge5) oldstable-security; urgency=high * Security upload, fixes several vulnerabilities + CVE-2007-4568: integer overflow in the computation of the size of a dynamic buffer can lead to a heap overflow in the build_range() function. Also, an arbitrary number of bytes on the heap can be swapped by the swap_char2b() function. + CVE-2007-3103: race condition in xfs init script oldstable/main/binary-hppa/lbxproxy_4.3.0.dfsg.1-14sarge5_hppa.deb oldstable/main/binary-hppa/libdps1_4.3.0.dfsg.1-14sarge5_hppa.deb oldstable/main/binary-hppa/libdps1-dbg_4.3.0.dfsg.1-14sarge5_hppa.deb oldstable/main/binary-hppa/libdps-dev_4.3.0.dfsg.1-14sarge5_hppa.deb oldstable/main/binary-hppa/libice6_4.3.0.dfsg.1-14sarge5_hppa.deb oldstable/main/binary-hppa/libice6-dbg_4.3.0.dfsg.1-14sarge5_hppa.deb oldstable/main/binary-hppa/libice-dev_4.3.0.dfsg.1-14sarge5_hppa.deb oldstable/main/binary-hppa/libsm6_4.3.0.dfsg.1-14sarge5_hppa.deb oldstable/main/binary-hppa/libsm6-dbg_4.3.0.dfsg.1-14sarge5_hppa.deb oldstable/main/binary-hppa/libsm-dev_4.3.0.dfsg.1-14sarge5_hppa.deb oldstable/main/binary-hppa/libx11-6_4.3.0.dfsg.1-14sarge5_hppa.deb oldstable/main/binary-hppa/libx11-6-dbg_4.3.0.dfsg.1-14sarge5_hppa.deb oldstable/main/binary-hppa/libx11-dev_4.3.0.dfsg.1-14sarge5_hppa.deb oldstable/main/binary-hppa/libxaw6_4.3.0.dfsg.1-14sarge5_hppa.deb oldstable/main/binary-hppa/libxaw6-dbg_4.3.0.dfsg.1-14sarge5_hppa.deb oldstable/main/binary-hppa/libxaw6-dev_4.3.0.dfsg.1-14sarge5_hppa.deb oldstable/main/binary-hppa/libxaw7_4.3.0.dfsg.1-14sarge5_hppa.deb oldstable/main/binary-hppa/libxaw7-dbg_4.3.0.dfsg.1-14sarge5_hppa.deb oldstable/main/binary-hppa/libxaw7-dev_4.3.0.dfsg.1-14sarge5_hppa.deb oldstable/main/binary-hppa/libxext6_4.3.0.dfsg.1-14sarge5_hppa.deb oldstable/main/binary-hppa/libxext6-dbg_4.3.0.dfsg.1-14sarge5_hppa.deb oldstable/main/binary-hppa/libxext-dev_4.3.0.dfsg.1-14sarge5_hppa.deb oldstable/main/binary-hppa/libxft1_4.3.0.dfsg.1-14sarge5_hppa.deb oldstable/main/binary-hppa/libxft1-dbg_4.3.0.dfsg.1-14sarge5_hppa.deb oldstable/main/binary-hppa/libxi6_4.3.0.dfsg.1-14sarge5_hppa.deb oldstable/main/binary-hppa/libxi6-dbg_4.3.0.dfsg.1-14sarge5_hppa.deb oldstable/main/binary-hppa/libxi-dev_4.3.0.dfsg.1-14sarge5_hppa.deb oldstable/main/binary-hppa/libxmu6_4.3.0.dfsg.1-14sarge5_hppa.deb oldstable/main/binary-hppa/libxmu6-dbg_4.3.0.dfsg.1-14sarge5_hppa.deb oldstable/main/binary-hppa/libxmu-dev_4.3.0.dfsg.1-14sarge5_hppa.deb oldstable/main/binary-hppa/libxmuu1_4.3.0.dfsg.1-14sarge5_hppa.deb oldstable/main/binary-hppa/libxmuu1-dbg_4.3.0.dfsg.1-14sarge5_hppa.deb oldstable/main/binary-hppa/libxmuu-dev_4.3.0.dfsg.1-14sarge5_hppa.deb oldstable/main/binary-hppa/libxp6_4.3.0.dfsg.1-14sarge5_hppa.deb oldstable/main/binary-hppa/libxp6-dbg_4.3.0.dfsg.1-14sarge5_hppa.deb oldstable/main/binary-hppa/libxp-dev_4.3.0.dfsg.1-14sarge5_hppa.deb oldstable/main/binary-hppa/libxpm4_4.3.0.dfsg.1-14sarge5_hppa.deb oldstable/main/binary-hppa/libxpm4-dbg_4.3.0.dfsg.1-14sarge5_hppa.deb oldstable/main/binary-hppa/libxpm-dev_4.3.0.dfsg.1-14sarge5_hppa.deb oldstable/main/binary-hppa/libxrandr2_4.3.0.dfsg.1-14sarge5_hppa.deb oldstable/main/binary-hppa/libxrandr2-dbg_4.3.0.dfsg.1-14sarge5_hppa.deb oldstable/main/binary-hppa/libxrandr-dev_4.3.0.dfsg.1-14sarge5_hppa.deb oldstable/main/binary-hppa/libxt6_4.3.0.dfsg.1-14sarge5_hppa.deb oldstable/main/binary-hppa/libxt6-dbg_4.3.0.dfsg.1-14sarge5_hppa.deb oldstable/main/binary-hppa/libxt-dev_4.3.0.dfsg.1-14sarge5_hppa.deb oldstable/main/binary-hppa/libxtrap6_4.3.0.dfsg.1-14sarge5_hppa.deb oldstable/main/binary-hppa/libxtrap6-dbg_4.3.0.dfsg.1-14sarge5_hppa.deb oldstable/main/binary-hppa/libxtrap-dev_4.3.0.dfsg.1-14sarge5_hppa.deb oldstable/main/binary-hppa/libxtst6_4.3.0.dfsg.1-14sarge5_hppa.deb oldstable/main/binary-hppa/libxtst6-dbg_4.3.0.dfsg.1-14sarge5_hppa.deb oldstable/main/binary-hppa/libxtst-dev_4.3.0.dfsg.1-14sarge5_hppa.deb oldstable/main/binary-hppa/libxv1_4.3.0.dfsg.1-14sarge5_hppa.deb oldstable/main/binary-hppa/libxv1-dbg_4.3.0.dfsg.1-14sarge5_hppa.deb oldstable/main/binary-hppa/libxv-dev_4.3.0.dfsg.1-14sarge5_hppa.deb oldstable/main/binary-hppa/proxymngr_4.3.0.dfsg.1-14sarge5_hppa.deb oldstable/main/binary-hppa/twm_4.3.0.dfsg.1-14sarge5_hppa.deb oldstable/main/binary-hppa/xbase-clients_4.3.0.dfsg.1-14sarge5_hppa.deb oldstable/main/binary-hppa/xdm_4.3.0.dfsg.1-14sarge5_hppa.deb oldstable/main/binary-hppa/xfs_4.3.0.dfsg.1-14sarge5_hppa.deb oldstable/main/binary-hppa/xfwp_4.3.0.dfsg.1-14sarge5_hppa.deb oldstable/main/binary-hppa/xlibmesa-gl_4.3.0.dfsg.1-14sarge5_hppa.deb oldstable/main/binary-hppa/xlibmesa-gl-dbg_4.3.0.dfsg.1-14sarge5_hppa.deb oldstable/main/binary-hppa/xlibmesa-gl-dev_4.3.0.dfsg.1-14sarge5_hppa.deb oldstable/main/binary-hppa/xlibmesa-glu_4.3.0.dfsg.1-14sarge5_hppa.deb oldstable/main/binary-hppa/xlibmesa-glu-dbg_4.3.0.dfsg.1-14sarge5_hppa.deb oldstable/main/binary-hppa/xlibmesa-glu-dev_4.3.0.dfsg.1-14sarge5_hppa.deb oldstable/main/binary-hppa/xlibs-static-dev_4.3.0.dfsg.1-14sarge5_hppa.deb oldstable/main/binary-hppa/xlibs-static-pic_4.3.0.dfsg.1-14sarge5_hppa.deb oldstable/main/binary-hppa/xmh_4.3.0.dfsg.1-14sarge5_hppa.deb oldstable/main/binary-hppa/xnest_4.3.0.dfsg.1-14sarge5_hppa.deb oldstable/main/binary-hppa/xserver-common_4.3.0.dfsg.1-14sarge5_hppa.deb oldstable/main/binary-hppa/xserver-xfree86_4.3.0.dfsg.1-14sarge5_hppa.deb oldstable/main/binary-hppa/xserver-xfree86-dbg_4.3.0.dfsg.1-14sarge5_hppa.deb oldstable/main/binary-hppa/xterm_4.3.0.dfsg.1-14sarge5_hppa.deb oldstable/main/binary-hppa/xutils_4.3.0.dfsg.1-14sarge5_hppa.deb oldstable/main/binary-hppa/xvfb_4.3.0.dfsg.1-14sarge5_hppa.deb oldstable/main/binary-hppa/x-window-system-core_4.3.0.dfsg.1-14sarge5_hppa.deb oldstable/main/binary-hppa/x-window-system-dev_4.3.0.dfsg.1-14sarge5_hppa.deb oldstable/main/binary-hppa/xlibmesa3_4.3.0.dfsg.1-14sarge5_hppa.deb xfree86 (4.3.0.dfsg.1-14sarge5) oldstable-security; urgency=high * Security upload, fixes several vulnerabilities + CVE-2007-4568: integer overflow in the computation of the size of a dynamic buffer can lead to a heap overflow in the build_range() function. Also, an arbitrary number of bytes on the heap can be swapped by the swap_char2b() function. + CVE-2007-3103: race condition in xfs init script oldstable/main/source/xfree86_4.3.0.dfsg.1-14sarge5.dsc oldstable/main/source/xfree86_4.3.0.dfsg.1-14sarge5.diff.gz oldstable/main/binary-all/pm-dev_4.3.0.dfsg.1-14sarge5_all.deb oldstable/main/binary-all/x-dev_4.3.0.dfsg.1-14sarge5_all.deb oldstable/main/binary-all/xfonts-100dpi_4.3.0.dfsg.1-14sarge5_all.deb oldstable/main/binary-all/xfonts-100dpi-transcoded_4.3.0.dfsg.1-14sarge5_all.deb oldstable/main/binary-all/xfonts-75dpi_4.3.0.dfsg.1-14sarge5_all.deb oldstable/main/binary-all/xfonts-75dpi-transcoded_4.3.0.dfsg.1-14sarge5_all.deb oldstable/main/binary-all/xfonts-base_4.3.0.dfsg.1-14sarge5_all.deb oldstable/main/binary-all/xfonts-base-transcoded_4.3.0.dfsg.1-14sarge5_all.deb oldstable/main/binary-all/xfonts-cyrillic_4.3.0.dfsg.1-14sarge5_all.deb oldstable/main/binary-all/xfonts-scalable_4.3.0.dfsg.1-14sarge5_all.deb oldstable/main/binary-all/xfree86-common_4.3.0.dfsg.1-14sarge5_all.deb oldstable/main/binary-all/xlibs_4.3.0.dfsg.1-14sarge5_all.deb oldstable/main/binary-all/xlibs-data_4.3.0.dfsg.1-14sarge5_all.deb oldstable/main/binary-all/xspecs_4.3.0.dfsg.1-14sarge5_all.deb oldstable/main/binary-all/x-window-system_4.3.0.dfsg.1-14sarge5_all.deb oldstable/main/binary-all/xlibmesa3-dbg_4.3.0.dfsg.1-14sarge5_all.deb oldstable/main/binary-all/xlibmesa-dev_4.3.0.dfsg.1-14sarge5_all.deb oldstable/main/binary-all/xlibs-dbg_4.3.0.dfsg.1-14sarge5_all.deb oldstable/main/binary-all/xlibs-dev_4.3.0.dfsg.1-14sarge5_all.deb oldstable/main/binary-all/xlibs-pic_4.3.0.dfsg.1-14sarge5_all.deb oldstable/main/binary-i386/lbxproxy_4.3.0.dfsg.1-14sarge5_i386.deb oldstable/main/binary-i386/libdps1_4.3.0.dfsg.1-14sarge5_i386.deb oldstable/main/binary-i386/libdps1-dbg_4.3.0.dfsg.1-14sarge5_i386.deb oldstable/main/binary-i386/libdps-dev_4.3.0.dfsg.1-14sarge5_i386.deb oldstable/main/binary-i386/libice6_4.3.0.dfsg.1-14sarge5_i386.deb oldstable/main/binary-i386/libice6-dbg_4.3.0.dfsg.1-14sarge5_i386.deb oldstable/main/binary-i386/libice-dev_4.3.0.dfsg.1-14sarge5_i386.deb oldstable/main/binary-i386/libsm6_4.3.0.dfsg.1-14sarge5_i386.deb oldstable/main/binary-i386/libsm6-dbg_4.3.0.dfsg.1-14sarge5_i386.deb oldstable/main/binary-i386/libsm-dev_4.3.0.dfsg.1-14sarge5_i386.deb oldstable/main/binary-i386/libx11-6_4.3.0.dfsg.1-14sarge5_i386.deb oldstable/main/binary-i386/libx11-6-dbg_4.3.0.dfsg.1-14sarge5_i386.deb oldstable/main/binary-i386/libx11-dev_4.3.0.dfsg.1-14sarge5_i386.deb oldstable/main/binary-i386/libxaw6_4.3.0.dfsg.1-14sarge5_i386.deb oldstable/main/binary-i386/libxaw6-dbg_4.3.0.dfsg.1-14sarge5_i386.deb oldstable/main/binary-i386/libxaw6-dev_4.3.0.dfsg.1-14sarge5_i386.deb oldstable/main/binary-i386/libxaw7_4.3.0.dfsg.1-14sarge5_i386.deb oldstable/main/binary-i386/libxaw7-dbg_4.3.0.dfsg.1-14sarge5_i386.deb oldstable/main/binary-i386/libxaw7-dev_4.3.0.dfsg.1-14sarge5_i386.deb oldstable/main/binary-i386/libxext6_4.3.0.dfsg.1-14sarge5_i386.deb oldstable/main/binary-i386/libxext6-dbg_4.3.0.dfsg.1-14sarge5_i386.deb oldstable/main/binary-i386/libxext-dev_4.3.0.dfsg.1-14sarge5_i386.deb oldstable/main/binary-i386/libxft1_4.3.0.dfsg.1-14sarge5_i386.deb oldstable/main/binary-i386/libxft1-dbg_4.3.0.dfsg.1-14sarge5_i386.deb oldstable/main/binary-i386/libxi6_4.3.0.dfsg.1-14sarge5_i386.deb oldstable/main/binary-i386/libxi6-dbg_4.3.0.dfsg.1-14sarge5_i386.deb oldstable/main/binary-i386/libxi-dev_4.3.0.dfsg.1-14sarge5_i386.deb oldstable/main/binary-i386/libxmu6_4.3.0.dfsg.1-14sarge5_i386.deb oldstable/main/binary-i386/libxmu6-dbg_4.3.0.dfsg.1-14sarge5_i386.deb oldstable/main/binary-i386/libxmu-dev_4.3.0.dfsg.1-14sarge5_i386.deb oldstable/main/binary-i386/libxmuu1_4.3.0.dfsg.1-14sarge5_i386.deb oldstable/main/binary-i386/libxmuu1-dbg_4.3.0.dfsg.1-14sarge5_i386.deb oldstable/main/binary-i386/libxmuu-dev_4.3.0.dfsg.1-14sarge5_i386.deb oldstable/main/binary-i386/libxp6_4.3.0.dfsg.1-14sarge5_i386.deb oldstable/main/binary-i386/libxp6-dbg_4.3.0.dfsg.1-14sarge5_i386.deb oldstable/main/binary-i386/libxp-dev_4.3.0.dfsg.1-14sarge5_i386.deb oldstable/main/binary-i386/libxpm4_4.3.0.dfsg.1-14sarge5_i386.deb oldstable/main/binary-i386/libxpm4-dbg_4.3.0.dfsg.1-14sarge5_i386.deb oldstable/main/binary-i386/libxpm-dev_4.3.0.dfsg.1-14sarge5_i386.deb oldstable/main/binary-i386/libxrandr2_4.3.0.dfsg.1-14sarge5_i386.deb oldstable/main/binary-i386/libxrandr2-dbg_4.3.0.dfsg.1-14sarge5_i386.deb oldstable/main/binary-i386/libxrandr-dev_4.3.0.dfsg.1-14sarge5_i386.deb oldstable/main/binary-i386/libxt6_4.3.0.dfsg.1-14sarge5_i386.deb oldstable/main/binary-i386/libxt6-dbg_4.3.0.dfsg.1-14sarge5_i386.deb oldstable/main/binary-i386/libxt-dev_4.3.0.dfsg.1-14sarge5_i386.deb oldstable/main/binary-i386/libxtrap6_4.3.0.dfsg.1-14sarge5_i386.deb oldstable/main/binary-i386/libxtrap6-dbg_4.3.0.dfsg.1-14sarge5_i386.deb oldstable/main/binary-i386/libxtrap-dev_4.3.0.dfsg.1-14sarge5_i386.deb oldstable/main/binary-i386/libxtst6_4.3.0.dfsg.1-14sarge5_i386.deb oldstable/main/binary-i386/libxtst6-dbg_4.3.0.dfsg.1-14sarge5_i386.deb oldstable/main/binary-i386/libxtst-dev_4.3.0.dfsg.1-14sarge5_i386.deb oldstable/main/binary-i386/libxv1_4.3.0.dfsg.1-14sarge5_i386.deb oldstable/main/binary-i386/libxv1-dbg_4.3.0.dfsg.1-14sarge5_i386.deb oldstable/main/binary-i386/libxv-dev_4.3.0.dfsg.1-14sarge5_i386.deb oldstable/main/binary-i386/proxymngr_4.3.0.dfsg.1-14sarge5_i386.deb oldstable/main/binary-i386/twm_4.3.0.dfsg.1-14sarge5_i386.deb oldstable/main/binary-i386/xbase-clients_4.3.0.dfsg.1-14sarge5_i386.deb oldstable/main/binary-i386/xdm_4.3.0.dfsg.1-14sarge5_i386.deb oldstable/main/binary-i386/xfs_4.3.0.dfsg.1-14sarge5_i386.deb oldstable/main/binary-i386/xfwp_4.3.0.dfsg.1-14sarge5_i386.deb oldstable/main/binary-i386/xlibmesa-dri_4.3.0.dfsg.1-14sarge5_i386.deb oldstable/main/binary-i386/xlibmesa-dri-dbg_4.3.0.dfsg.1-14sarge5_i386.deb oldstable/main/binary-i386/xlibmesa-gl_4.3.0.dfsg.1-14sarge5_i386.deb oldstable/main/binary-i386/xlibmesa-gl-dbg_4.3.0.dfsg.1-14sarge5_i386.deb oldstable/main/binary-i386/xlibmesa-gl-dev_4.3.0.dfsg.1-14sarge5_i386.deb oldstable/main/binary-i386/xlibmesa-glu_4.3.0.dfsg.1-14sarge5_i386.deb oldstable/main/binary-i386/xlibmesa-glu-dbg_4.3.0.dfsg.1-14sarge5_i386.deb oldstable/main/binary-i386/xlibmesa-glu-dev_4.3.0.dfsg.1-14sarge5_i386.deb oldstable/main/binary-i386/xlibosmesa4_4.3.0.dfsg.1-14sarge5_i386.deb oldstable/main/binary-i386/xlibosmesa4-dbg_4.3.0.dfsg.1-14sarge5_i386.deb oldstable/main/binary-i386/xlibosmesa-dev_4.3.0.dfsg.1-14sarge5_i386.deb oldstable/main/binary-i386/xlibs-static-dev_4.3.0.dfsg.1-14sarge5_i386.deb oldstable/main/binary-i386/xlibs-static-pic_4.3.0.dfsg.1-14sarge5_i386.deb oldstable/main/binary-i386/xmh_4.3.0.dfsg.1-14sarge5_i386.deb oldstable/main/binary-i386/xnest_4.3.0.dfsg.1-14sarge5_i386.deb oldstable/main/binary-i386/xserver-common_4.3.0.dfsg.1-14sarge5_i386.deb oldstable/main/binary-i386/xserver-xfree86_4.3.0.dfsg.1-14sarge5_i386.deb oldstable/main/binary-i386/xserver-xfree86-dbg_4.3.0.dfsg.1-14sarge5_i386.deb oldstable/main/binary-i386/xterm_4.3.0.dfsg.1-14sarge5_i386.deb oldstable/main/binary-i386/xutils_4.3.0.dfsg.1-14sarge5_i386.deb oldstable/main/binary-i386/xvfb_4.3.0.dfsg.1-14sarge5_i386.deb oldstable/main/binary-i386/x-window-system-core_4.3.0.dfsg.1-14sarge5_i386.deb oldstable/main/binary-i386/x-window-system-dev_4.3.0.dfsg.1-14sarge5_i386.deb oldstable/main/binary-i386/xlibmesa3_4.3.0.dfsg.1-14sarge5_i386.deb xfree86 (4.3.0.dfsg.1-14sarge5) oldstable-security; urgency=high * Security upload, fixes several vulnerabilities + CVE-2007-4568: integer overflow in the computation of the size of a dynamic buffer can lead to a heap overflow in the build_range() function. Also, an arbitrary number of bytes on the heap can be swapped by the swap_char2b() function. + CVE-2007-3103: race condition in xfs init script oldstable/main/binary-ia64/lbxproxy_4.3.0.dfsg.1-14sarge5_ia64.deb oldstable/main/binary-ia64/libdps1_4.3.0.dfsg.1-14sarge5_ia64.deb oldstable/main/binary-ia64/libdps1-dbg_4.3.0.dfsg.1-14sarge5_ia64.deb oldstable/main/binary-ia64/libdps-dev_4.3.0.dfsg.1-14sarge5_ia64.deb oldstable/main/binary-ia64/libice6_4.3.0.dfsg.1-14sarge5_ia64.deb oldstable/main/binary-ia64/libice6-dbg_4.3.0.dfsg.1-14sarge5_ia64.deb oldstable/main/binary-ia64/libice-dev_4.3.0.dfsg.1-14sarge5_ia64.deb oldstable/main/binary-ia64/libsm6_4.3.0.dfsg.1-14sarge5_ia64.deb oldstable/main/binary-ia64/libsm6-dbg_4.3.0.dfsg.1-14sarge5_ia64.deb oldstable/main/binary-ia64/libsm-dev_4.3.0.dfsg.1-14sarge5_ia64.deb oldstable/main/binary-ia64/libx11-6_4.3.0.dfsg.1-14sarge5_ia64.deb oldstable/main/binary-ia64/libx11-6-dbg_4.3.0.dfsg.1-14sarge5_ia64.deb oldstable/main/binary-ia64/libx11-dev_4.3.0.dfsg.1-14sarge5_ia64.deb oldstable/main/binary-ia64/libxaw6_4.3.0.dfsg.1-14sarge5_ia64.deb oldstable/main/binary-ia64/libxaw6-dbg_4.3.0.dfsg.1-14sarge5_ia64.deb oldstable/main/binary-ia64/libxaw6-dev_4.3.0.dfsg.1-14sarge5_ia64.deb oldstable/main/binary-ia64/libxaw7_4.3.0.dfsg.1-14sarge5_ia64.deb oldstable/main/binary-ia64/libxaw7-dbg_4.3.0.dfsg.1-14sarge5_ia64.deb oldstable/main/binary-ia64/libxaw7-dev_4.3.0.dfsg.1-14sarge5_ia64.deb oldstable/main/binary-ia64/libxext6_4.3.0.dfsg.1-14sarge5_ia64.deb oldstable/main/binary-ia64/libxext6-dbg_4.3.0.dfsg.1-14sarge5_ia64.deb oldstable/main/binary-ia64/libxext-dev_4.3.0.dfsg.1-14sarge5_ia64.deb oldstable/main/binary-ia64/libxft1_4.3.0.dfsg.1-14sarge5_ia64.deb oldstable/main/binary-ia64/libxft1-dbg_4.3.0.dfsg.1-14sarge5_ia64.deb oldstable/main/binary-ia64/libxi6_4.3.0.dfsg.1-14sarge5_ia64.deb oldstable/main/binary-ia64/libxi6-dbg_4.3.0.dfsg.1-14sarge5_ia64.deb oldstable/main/binary-ia64/libxi-dev_4.3.0.dfsg.1-14sarge5_ia64.deb oldstable/main/binary-ia64/libxmu6_4.3.0.dfsg.1-14sarge5_ia64.deb oldstable/main/binary-ia64/libxmu6-dbg_4.3.0.dfsg.1-14sarge5_ia64.deb oldstable/main/binary-ia64/libxmu-dev_4.3.0.dfsg.1-14sarge5_ia64.deb oldstable/main/binary-ia64/libxmuu1_4.3.0.dfsg.1-14sarge5_ia64.deb oldstable/main/binary-ia64/libxmuu1-dbg_4.3.0.dfsg.1-14sarge5_ia64.deb oldstable/main/binary-ia64/libxmuu-dev_4.3.0.dfsg.1-14sarge5_ia64.deb oldstable/main/binary-ia64/libxp6_4.3.0.dfsg.1-14sarge5_ia64.deb oldstable/main/binary-ia64/libxp6-dbg_4.3.0.dfsg.1-14sarge5_ia64.deb oldstable/main/binary-ia64/libxp-dev_4.3.0.dfsg.1-14sarge5_ia64.deb oldstable/main/binary-ia64/libxpm4_4.3.0.dfsg.1-14sarge5_ia64.deb oldstable/main/binary-ia64/libxpm4-dbg_4.3.0.dfsg.1-14sarge5_ia64.deb oldstable/main/binary-ia64/libxpm-dev_4.3.0.dfsg.1-14sarge5_ia64.deb oldstable/main/binary-ia64/libxrandr2_4.3.0.dfsg.1-14sarge5_ia64.deb oldstable/main/binary-ia64/libxrandr2-dbg_4.3.0.dfsg.1-14sarge5_ia64.deb oldstable/main/binary-ia64/libxrandr-dev_4.3.0.dfsg.1-14sarge5_ia64.deb oldstable/main/binary-ia64/libxt6_4.3.0.dfsg.1-14sarge5_ia64.deb oldstable/main/binary-ia64/libxt6-dbg_4.3.0.dfsg.1-14sarge5_ia64.deb oldstable/main/binary-ia64/libxt-dev_4.3.0.dfsg.1-14sarge5_ia64.deb oldstable/main/binary-ia64/libxtrap6_4.3.0.dfsg.1-14sarge5_ia64.deb oldstable/main/binary-ia64/libxtrap6-dbg_4.3.0.dfsg.1-14sarge5_ia64.deb oldstable/main/binary-ia64/libxtrap-dev_4.3.0.dfsg.1-14sarge5_ia64.deb oldstable/main/binary-ia64/libxtst6_4.3.0.dfsg.1-14sarge5_ia64.deb oldstable/main/binary-ia64/libxtst6-dbg_4.3.0.dfsg.1-14sarge5_ia64.deb oldstable/main/binary-ia64/libxtst-dev_4.3.0.dfsg.1-14sarge5_ia64.deb oldstable/main/binary-ia64/libxv1_4.3.0.dfsg.1-14sarge5_ia64.deb oldstable/main/binary-ia64/libxv1-dbg_4.3.0.dfsg.1-14sarge5_ia64.deb oldstable/main/binary-ia64/libxv-dev_4.3.0.dfsg.1-14sarge5_ia64.deb oldstable/main/binary-ia64/proxymngr_4.3.0.dfsg.1-14sarge5_ia64.deb oldstable/main/binary-ia64/twm_4.3.0.dfsg.1-14sarge5_ia64.deb oldstable/main/binary-ia64/xbase-clients_4.3.0.dfsg.1-14sarge5_ia64.deb oldstable/main/binary-ia64/xdm_4.3.0.dfsg.1-14sarge5_ia64.deb oldstable/main/binary-ia64/xfs_4.3.0.dfsg.1-14sarge5_ia64.deb oldstable/main/binary-ia64/xfwp_4.3.0.dfsg.1-14sarge5_ia64.deb oldstable/main/binary-ia64/xlibmesa-dri_4.3.0.dfsg.1-14sarge5_ia64.deb oldstable/main/binary-ia64/xlibmesa-dri-dbg_4.3.0.dfsg.1-14sarge5_ia64.deb oldstable/main/binary-ia64/xlibmesa-gl_4.3.0.dfsg.1-14sarge5_ia64.deb oldstable/main/binary-ia64/xlibmesa-gl-dbg_4.3.0.dfsg.1-14sarge5_ia64.deb oldstable/main/binary-ia64/xlibmesa-gl-dev_4.3.0.dfsg.1-14sarge5_ia64.deb oldstable/main/binary-ia64/xlibmesa-glu_4.3.0.dfsg.1-14sarge5_ia64.deb oldstable/main/binary-ia64/xlibmesa-glu-dbg_4.3.0.dfsg.1-14sarge5_ia64.deb oldstable/main/binary-ia64/xlibmesa-glu-dev_4.3.0.dfsg.1-14sarge5_ia64.deb oldstable/main/binary-ia64/xlibosmesa4_4.3.0.dfsg.1-14sarge5_ia64.deb oldstable/main/binary-ia64/xlibosmesa4-dbg_4.3.0.dfsg.1-14sarge5_ia64.deb oldstable/main/binary-ia64/xlibosmesa-dev_4.3.0.dfsg.1-14sarge5_ia64.deb oldstable/main/binary-ia64/xlibs-static-dev_4.3.0.dfsg.1-14sarge5_ia64.deb oldstable/main/binary-ia64/xlibs-static-pic_4.3.0.dfsg.1-14sarge5_ia64.deb oldstable/main/binary-ia64/xmh_4.3.0.dfsg.1-14sarge5_ia64.deb oldstable/main/binary-ia64/xnest_4.3.0.dfsg.1-14sarge5_ia64.deb oldstable/main/binary-ia64/xserver-common_4.3.0.dfsg.1-14sarge5_ia64.deb oldstable/main/binary-ia64/xserver-xfree86_4.3.0.dfsg.1-14sarge5_ia64.deb oldstable/main/binary-ia64/xserver-xfree86-dbg_4.3.0.dfsg.1-14sarge5_ia64.deb oldstable/main/binary-ia64/xterm_4.3.0.dfsg.1-14sarge5_ia64.deb oldstable/main/binary-ia64/xutils_4.3.0.dfsg.1-14sarge5_ia64.deb oldstable/main/binary-ia64/xvfb_4.3.0.dfsg.1-14sarge5_ia64.deb oldstable/main/binary-ia64/x-window-system-core_4.3.0.dfsg.1-14sarge5_ia64.deb oldstable/main/binary-ia64/x-window-system-dev_4.3.0.dfsg.1-14sarge5_ia64.deb oldstable/main/binary-ia64/xlibmesa3_4.3.0.dfsg.1-14sarge5_ia64.deb xfree86 (4.3.0.dfsg.1-14sarge5) oldstable-security; urgency=high * Security upload, fixes several vulnerabilities + CVE-2007-4568: integer overflow in the computation of the size of a dynamic buffer can lead to a heap overflow in the build_range() function. Also, an arbitrary number of bytes on the heap can be swapped by the swap_char2b() function. + CVE-2007-3103: race condition in xfs init script oldstable/main/binary-m68k/lbxproxy_4.3.0.dfsg.1-14sarge5_m68k.deb oldstable/main/binary-m68k/libdps1_4.3.0.dfsg.1-14sarge5_m68k.deb oldstable/main/binary-m68k/libdps1-dbg_4.3.0.dfsg.1-14sarge5_m68k.deb oldstable/main/binary-m68k/libdps-dev_4.3.0.dfsg.1-14sarge5_m68k.deb oldstable/main/binary-m68k/libice6_4.3.0.dfsg.1-14sarge5_m68k.deb oldstable/main/binary-m68k/libice6-dbg_4.3.0.dfsg.1-14sarge5_m68k.deb oldstable/main/binary-m68k/libice-dev_4.3.0.dfsg.1-14sarge5_m68k.deb oldstable/main/binary-m68k/libsm6_4.3.0.dfsg.1-14sarge5_m68k.deb oldstable/main/binary-m68k/libsm6-dbg_4.3.0.dfsg.1-14sarge5_m68k.deb oldstable/main/binary-m68k/libsm-dev_4.3.0.dfsg.1-14sarge5_m68k.deb oldstable/main/binary-m68k/libx11-6_4.3.0.dfsg.1-14sarge5_m68k.deb oldstable/main/binary-m68k/libx11-6-dbg_4.3.0.dfsg.1-14sarge5_m68k.deb oldstable/main/binary-m68k/libx11-dev_4.3.0.dfsg.1-14sarge5_m68k.deb oldstable/main/binary-m68k/libxaw6_4.3.0.dfsg.1-14sarge5_m68k.deb oldstable/main/binary-m68k/libxaw6-dbg_4.3.0.dfsg.1-14sarge5_m68k.deb oldstable/main/binary-m68k/libxaw6-dev_4.3.0.dfsg.1-14sarge5_m68k.deb oldstable/main/binary-m68k/libxaw7_4.3.0.dfsg.1-14sarge5_m68k.deb oldstable/main/binary-m68k/libxaw7-dbg_4.3.0.dfsg.1-14sarge5_m68k.deb oldstable/main/binary-m68k/libxaw7-dev_4.3.0.dfsg.1-14sarge5_m68k.deb oldstable/main/binary-m68k/libxext6_4.3.0.dfsg.1-14sarge5_m68k.deb oldstable/main/binary-m68k/libxext6-dbg_4.3.0.dfsg.1-14sarge5_m68k.deb oldstable/main/binary-m68k/libxext-dev_4.3.0.dfsg.1-14sarge5_m68k.deb oldstable/main/binary-m68k/libxft1_4.3.0.dfsg.1-14sarge5_m68k.deb oldstable/main/binary-m68k/libxft1-dbg_4.3.0.dfsg.1-14sarge5_m68k.deb oldstable/main/binary-m68k/libxi6_4.3.0.dfsg.1-14sarge5_m68k.deb oldstable/main/binary-m68k/libxi6-dbg_4.3.0.dfsg.1-14sarge5_m68k.deb oldstable/main/binary-m68k/libxi-dev_4.3.0.dfsg.1-14sarge5_m68k.deb oldstable/main/binary-m68k/libxmu6_4.3.0.dfsg.1-14sarge5_m68k.deb oldstable/main/binary-m68k/libxmu6-dbg_4.3.0.dfsg.1-14sarge5_m68k.deb oldstable/main/binary-m68k/libxmu-dev_4.3.0.dfsg.1-14sarge5_m68k.deb oldstable/main/binary-m68k/libxmuu1_4.3.0.dfsg.1-14sarge5_m68k.deb oldstable/main/binary-m68k/libxmuu1-dbg_4.3.0.dfsg.1-14sarge5_m68k.deb oldstable/main/binary-m68k/libxmuu-dev_4.3.0.dfsg.1-14sarge5_m68k.deb oldstable/main/binary-m68k/libxp6_4.3.0.dfsg.1-14sarge5_m68k.deb oldstable/main/binary-m68k/libxp6-dbg_4.3.0.dfsg.1-14sarge5_m68k.deb oldstable/main/binary-m68k/libxp-dev_4.3.0.dfsg.1-14sarge5_m68k.deb oldstable/main/binary-m68k/libxpm4_4.3.0.dfsg.1-14sarge5_m68k.deb oldstable/main/binary-m68k/libxpm4-dbg_4.3.0.dfsg.1-14sarge5_m68k.deb oldstable/main/binary-m68k/libxpm-dev_4.3.0.dfsg.1-14sarge5_m68k.deb oldstable/main/binary-m68k/libxrandr2_4.3.0.dfsg.1-14sarge5_m68k.deb oldstable/main/binary-m68k/libxrandr2-dbg_4.3.0.dfsg.1-14sarge5_m68k.deb oldstable/main/binary-m68k/libxrandr-dev_4.3.0.dfsg.1-14sarge5_m68k.deb oldstable/main/binary-m68k/libxt6_4.3.0.dfsg.1-14sarge5_m68k.deb oldstable/main/binary-m68k/libxt6-dbg_4.3.0.dfsg.1-14sarge5_m68k.deb oldstable/main/binary-m68k/libxt-dev_4.3.0.dfsg.1-14sarge5_m68k.deb oldstable/main/binary-m68k/libxtrap6_4.3.0.dfsg.1-14sarge5_m68k.deb oldstable/main/binary-m68k/libxtrap6-dbg_4.3.0.dfsg.1-14sarge5_m68k.deb oldstable/main/binary-m68k/libxtrap-dev_4.3.0.dfsg.1-14sarge5_m68k.deb oldstable/main/binary-m68k/libxtst6_4.3.0.dfsg.1-14sarge5_m68k.deb oldstable/main/binary-m68k/libxtst6-dbg_4.3.0.dfsg.1-14sarge5_m68k.deb oldstable/main/binary-m68k/libxtst-dev_4.3.0.dfsg.1-14sarge5_m68k.deb oldstable/main/binary-m68k/libxv1_4.3.0.dfsg.1-14sarge5_m68k.deb oldstable/main/binary-m68k/libxv1-dbg_4.3.0.dfsg.1-14sarge5_m68k.deb oldstable/main/binary-m68k/libxv-dev_4.3.0.dfsg.1-14sarge5_m68k.deb oldstable/main/binary-m68k/proxymngr_4.3.0.dfsg.1-14sarge5_m68k.deb oldstable/main/binary-m68k/twm_4.3.0.dfsg.1-14sarge5_m68k.deb oldstable/main/binary-m68k/xbase-clients_4.3.0.dfsg.1-14sarge5_m68k.deb oldstable/main/binary-m68k/xdm_4.3.0.dfsg.1-14sarge5_m68k.deb oldstable/main/binary-m68k/xfs_4.3.0.dfsg.1-14sarge5_m68k.deb oldstable/main/binary-m68k/xfwp_4.3.0.dfsg.1-14sarge5_m68k.deb oldstable/main/binary-m68k/xlibmesa-gl_4.3.0.dfsg.1-14sarge5_m68k.deb oldstable/main/binary-m68k/xlibmesa-gl-dbg_4.3.0.dfsg.1-14sarge5_m68k.deb oldstable/main/binary-m68k/xlibmesa-gl-dev_4.3.0.dfsg.1-14sarge5_m68k.deb oldstable/main/binary-m68k/xlibmesa-glu_4.3.0.dfsg.1-14sarge5_m68k.deb oldstable/main/binary-m68k/xlibmesa-glu-dbg_4.3.0.dfsg.1-14sarge5_m68k.deb oldstable/main/binary-m68k/xlibmesa-glu-dev_4.3.0.dfsg.1-14sarge5_m68k.deb oldstable/main/binary-m68k/xlibs-static-dev_4.3.0.dfsg.1-14sarge5_m68k.deb oldstable/main/binary-m68k/xlibs-static-pic_4.3.0.dfsg.1-14sarge5_m68k.deb oldstable/main/binary-m68k/xmh_4.3.0.dfsg.1-14sarge5_m68k.deb oldstable/main/binary-m68k/xnest_4.3.0.dfsg.1-14sarge5_m68k.deb oldstable/main/binary-m68k/xserver-common_4.3.0.dfsg.1-14sarge5_m68k.deb oldstable/main/binary-m68k/xserver-xfree86_4.3.0.dfsg.1-14sarge5_m68k.deb oldstable/main/binary-m68k/xserver-xfree86-dbg_4.3.0.dfsg.1-14sarge5_m68k.deb oldstable/main/binary-m68k/xterm_4.3.0.dfsg.1-14sarge5_m68k.deb oldstable/main/binary-m68k/xutils_4.3.0.dfsg.1-14sarge5_m68k.deb oldstable/main/binary-m68k/xvfb_4.3.0.dfsg.1-14sarge5_m68k.deb oldstable/main/binary-m68k/x-window-system-core_4.3.0.dfsg.1-14sarge5_m68k.deb oldstable/main/binary-m68k/x-window-system-dev_4.3.0.dfsg.1-14sarge5_m68k.deb oldstable/main/binary-m68k/xlibmesa3_4.3.0.dfsg.1-14sarge5_m68k.deb xfree86 (4.3.0.dfsg.1-14sarge5) oldstable-security; urgency=high * Security upload, fixes several vulnerabilities + CVE-2007-4568: integer overflow in the computation of the size of a dynamic buffer can lead to a heap overflow in the build_range() function. Also, an arbitrary number of bytes on the heap can be swapped by the swap_char2b() function. + CVE-2007-3103: race condition in xfs init script oldstable/main/binary-mips/lbxproxy_4.3.0.dfsg.1-14sarge5_mips.deb oldstable/main/binary-mips/libdps1_4.3.0.dfsg.1-14sarge5_mips.deb oldstable/main/binary-mips/libdps1-dbg_4.3.0.dfsg.1-14sarge5_mips.deb oldstable/main/binary-mips/libdps-dev_4.3.0.dfsg.1-14sarge5_mips.deb oldstable/main/binary-mips/libice6_4.3.0.dfsg.1-14sarge5_mips.deb oldstable/main/binary-mips/libice6-dbg_4.3.0.dfsg.1-14sarge5_mips.deb oldstable/main/binary-mips/libice-dev_4.3.0.dfsg.1-14sarge5_mips.deb oldstable/main/binary-mips/libsm6_4.3.0.dfsg.1-14sarge5_mips.deb oldstable/main/binary-mips/libsm6-dbg_4.3.0.dfsg.1-14sarge5_mips.deb oldstable/main/binary-mips/libsm-dev_4.3.0.dfsg.1-14sarge5_mips.deb oldstable/main/binary-mips/libx11-6_4.3.0.dfsg.1-14sarge5_mips.deb oldstable/main/binary-mips/libx11-6-dbg_4.3.0.dfsg.1-14sarge5_mips.deb oldstable/main/binary-mips/libx11-dev_4.3.0.dfsg.1-14sarge5_mips.deb oldstable/main/binary-mips/libxaw6_4.3.0.dfsg.1-14sarge5_mips.deb oldstable/main/binary-mips/libxaw6-dbg_4.3.0.dfsg.1-14sarge5_mips.deb oldstable/main/binary-mips/libxaw6-dev_4.3.0.dfsg.1-14sarge5_mips.deb oldstable/main/binary-mips/libxaw7_4.3.0.dfsg.1-14sarge5_mips.deb oldstable/main/binary-mips/libxaw7-dbg_4.3.0.dfsg.1-14sarge5_mips.deb oldstable/main/binary-mips/libxaw7-dev_4.3.0.dfsg.1-14sarge5_mips.deb oldstable/main/binary-mips/libxext6_4.3.0.dfsg.1-14sarge5_mips.deb oldstable/main/binary-mips/libxext6-dbg_4.3.0.dfsg.1-14sarge5_mips.deb oldstable/main/binary-mips/libxext-dev_4.3.0.dfsg.1-14sarge5_mips.deb oldstable/main/binary-mips/libxft1_4.3.0.dfsg.1-14sarge5_mips.deb oldstable/main/binary-mips/libxft1-dbg_4.3.0.dfsg.1-14sarge5_mips.deb oldstable/main/binary-mips/libxi6_4.3.0.dfsg.1-14sarge5_mips.deb oldstable/main/binary-mips/libxi6-dbg_4.3.0.dfsg.1-14sarge5_mips.deb oldstable/main/binary-mips/libxi-dev_4.3.0.dfsg.1-14sarge5_mips.deb oldstable/main/binary-mips/libxmu6_4.3.0.dfsg.1-14sarge5_mips.deb oldstable/main/binary-mips/libxmu6-dbg_4.3.0.dfsg.1-14sarge5_mips.deb oldstable/main/binary-mips/libxmu-dev_4.3.0.dfsg.1-14sarge5_mips.deb oldstable/main/binary-mips/libxmuu1_4.3.0.dfsg.1-14sarge5_mips.deb oldstable/main/binary-mips/libxmuu1-dbg_4.3.0.dfsg.1-14sarge5_mips.deb oldstable/main/binary-mips/libxmuu-dev_4.3.0.dfsg.1-14sarge5_mips.deb oldstable/main/binary-mips/libxp6_4.3.0.dfsg.1-14sarge5_mips.deb oldstable/main/binary-mips/libxp6-dbg_4.3.0.dfsg.1-14sarge5_mips.deb oldstable/main/binary-mips/libxp-dev_4.3.0.dfsg.1-14sarge5_mips.deb oldstable/main/binary-mips/libxpm4_4.3.0.dfsg.1-14sarge5_mips.deb oldstable/main/binary-mips/libxpm4-dbg_4.3.0.dfsg.1-14sarge5_mips.deb oldstable/main/binary-mips/libxpm-dev_4.3.0.dfsg.1-14sarge5_mips.deb oldstable/main/binary-mips/libxrandr2_4.3.0.dfsg.1-14sarge5_mips.deb oldstable/main/binary-mips/libxrandr2-dbg_4.3.0.dfsg.1-14sarge5_mips.deb oldstable/main/binary-mips/libxrandr-dev_4.3.0.dfsg.1-14sarge5_mips.deb oldstable/main/binary-mips/libxt6_4.3.0.dfsg.1-14sarge5_mips.deb oldstable/main/binary-mips/libxt6-dbg_4.3.0.dfsg.1-14sarge5_mips.deb oldstable/main/binary-mips/libxt-dev_4.3.0.dfsg.1-14sarge5_mips.deb oldstable/main/binary-mips/libxtrap6_4.3.0.dfsg.1-14sarge5_mips.deb oldstable/main/binary-mips/libxtrap6-dbg_4.3.0.dfsg.1-14sarge5_mips.deb oldstable/main/binary-mips/libxtrap-dev_4.3.0.dfsg.1-14sarge5_mips.deb oldstable/main/binary-mips/libxtst6_4.3.0.dfsg.1-14sarge5_mips.deb oldstable/main/binary-mips/libxtst6-dbg_4.3.0.dfsg.1-14sarge5_mips.deb oldstable/main/binary-mips/libxtst-dev_4.3.0.dfsg.1-14sarge5_mips.deb oldstable/main/binary-mips/libxv1_4.3.0.dfsg.1-14sarge5_mips.deb oldstable/main/binary-mips/libxv1-dbg_4.3.0.dfsg.1-14sarge5_mips.deb oldstable/main/binary-mips/libxv-dev_4.3.0.dfsg.1-14sarge5_mips.deb oldstable/main/binary-mips/proxymngr_4.3.0.dfsg.1-14sarge5_mips.deb oldstable/main/binary-mips/twm_4.3.0.dfsg.1-14sarge5_mips.deb oldstable/main/binary-mips/xbase-clients_4.3.0.dfsg.1-14sarge5_mips.deb oldstable/main/binary-mips/xdm_4.3.0.dfsg.1-14sarge5_mips.deb oldstable/main/binary-mips/xfs_4.3.0.dfsg.1-14sarge5_mips.deb oldstable/main/binary-mips/xfwp_4.3.0.dfsg.1-14sarge5_mips.deb oldstable/main/binary-mips/xlibmesa-gl_4.3.0.dfsg.1-14sarge5_mips.deb oldstable/main/binary-mips/xlibmesa-gl-dbg_4.3.0.dfsg.1-14sarge5_mips.deb oldstable/main/binary-mips/xlibmesa-gl-dev_4.3.0.dfsg.1-14sarge5_mips.deb oldstable/main/binary-mips/xlibmesa-glu_4.3.0.dfsg.1-14sarge5_mips.deb oldstable/main/binary-mips/xlibmesa-glu-dbg_4.3.0.dfsg.1-14sarge5_mips.deb oldstable/main/binary-mips/xlibmesa-glu-dev_4.3.0.dfsg.1-14sarge5_mips.deb oldstable/main/binary-mips/xlibs-static-dev_4.3.0.dfsg.1-14sarge5_mips.deb oldstable/main/binary-mips/xlibs-static-pic_4.3.0.dfsg.1-14sarge5_mips.deb oldstable/main/binary-mips/xmh_4.3.0.dfsg.1-14sarge5_mips.deb oldstable/main/binary-mips/xnest_4.3.0.dfsg.1-14sarge5_mips.deb oldstable/main/binary-mips/xserver-common_4.3.0.dfsg.1-14sarge5_mips.deb oldstable/main/binary-mips/xserver-xfree86_4.3.0.dfsg.1-14sarge5_mips.deb oldstable/main/binary-mips/xserver-xfree86-dbg_4.3.0.dfsg.1-14sarge5_mips.deb oldstable/main/binary-mips/xterm_4.3.0.dfsg.1-14sarge5_mips.deb oldstable/main/binary-mips/xutils_4.3.0.dfsg.1-14sarge5_mips.deb oldstable/main/binary-mips/xvfb_4.3.0.dfsg.1-14sarge5_mips.deb oldstable/main/binary-mips/x-window-system-core_4.3.0.dfsg.1-14sarge5_mips.deb oldstable/main/binary-mips/x-window-system-dev_4.3.0.dfsg.1-14sarge5_mips.deb oldstable/main/binary-mips/xlibmesa3_4.3.0.dfsg.1-14sarge5_mips.deb xfree86 (4.3.0.dfsg.1-14sarge5) oldstable-security; urgency=high * Security upload, fixes several vulnerabilities + CVE-2007-4568: integer overflow in the computation of the size of a dynamic buffer can lead to a heap overflow in the build_range() function. Also, an arbitrary number of bytes on the heap can be swapped by the swap_char2b() function. + CVE-2007-3103: race condition in xfs init script oldstable/main/binary-mipsel/lbxproxy_4.3.0.dfsg.1-14sarge5_mipsel.deb oldstable/main/binary-mipsel/libdps1_4.3.0.dfsg.1-14sarge5_mipsel.deb oldstable/main/binary-mipsel/libdps1-dbg_4.3.0.dfsg.1-14sarge5_mipsel.deb oldstable/main/binary-mipsel/libdps-dev_4.3.0.dfsg.1-14sarge5_mipsel.deb oldstable/main/binary-mipsel/libice6_4.3.0.dfsg.1-14sarge5_mipsel.deb oldstable/main/binary-mipsel/libice6-dbg_4.3.0.dfsg.1-14sarge5_mipsel.deb oldstable/main/binary-mipsel/libice-dev_4.3.0.dfsg.1-14sarge5_mipsel.deb oldstable/main/binary-mipsel/libsm6_4.3.0.dfsg.1-14sarge5_mipsel.deb oldstable/main/binary-mipsel/libsm6-dbg_4.3.0.dfsg.1-14sarge5_mipsel.deb oldstable/main/binary-mipsel/libsm-dev_4.3.0.dfsg.1-14sarge5_mipsel.deb oldstable/main/binary-mipsel/libx11-6_4.3.0.dfsg.1-14sarge5_mipsel.deb oldstable/main/binary-mipsel/libx11-6-dbg_4.3.0.dfsg.1-14sarge5_mipsel.deb oldstable/main/binary-mipsel/libx11-dev_4.3.0.dfsg.1-14sarge5_mipsel.deb oldstable/main/binary-mipsel/libxaw6_4.3.0.dfsg.1-14sarge5_mipsel.deb oldstable/main/binary-mipsel/libxaw6-dbg_4.3.0.dfsg.1-14sarge5_mipsel.deb oldstable/main/binary-mipsel/libxaw6-dev_4.3.0.dfsg.1-14sarge5_mipsel.deb oldstable/main/binary-mipsel/libxaw7_4.3.0.dfsg.1-14sarge5_mipsel.deb oldstable/main/binary-mipsel/libxaw7-dbg_4.3.0.dfsg.1-14sarge5_mipsel.deb oldstable/main/binary-mipsel/libxaw7-dev_4.3.0.dfsg.1-14sarge5_mipsel.deb oldstable/main/binary-mipsel/libxext6_4.3.0.dfsg.1-14sarge5_mipsel.deb oldstable/main/binary-mipsel/libxext6-dbg_4.3.0.dfsg.1-14sarge5_mipsel.deb oldstable/main/binary-mipsel/libxext-dev_4.3.0.dfsg.1-14sarge5_mipsel.deb oldstable/main/binary-mipsel/libxft1_4.3.0.dfsg.1-14sarge5_mipsel.deb oldstable/main/binary-mipsel/libxft1-dbg_4.3.0.dfsg.1-14sarge5_mipsel.deb oldstable/main/binary-mipsel/libxi6_4.3.0.dfsg.1-14sarge5_mipsel.deb oldstable/main/binary-mipsel/libxi6-dbg_4.3.0.dfsg.1-14sarge5_mipsel.deb oldstable/main/binary-mipsel/libxi-dev_4.3.0.dfsg.1-14sarge5_mipsel.deb oldstable/main/binary-mipsel/libxmu6_4.3.0.dfsg.1-14sarge5_mipsel.deb oldstable/main/binary-mipsel/libxmu6-dbg_4.3.0.dfsg.1-14sarge5_mipsel.deb oldstable/main/binary-mipsel/libxmu-dev_4.3.0.dfsg.1-14sarge5_mipsel.deb oldstable/main/binary-mipsel/libxmuu1_4.3.0.dfsg.1-14sarge5_mipsel.deb oldstable/main/binary-mipsel/libxmuu1-dbg_4.3.0.dfsg.1-14sarge5_mipsel.deb oldstable/main/binary-mipsel/libxmuu-dev_4.3.0.dfsg.1-14sarge5_mipsel.deb oldstable/main/binary-mipsel/libxp6_4.3.0.dfsg.1-14sarge5_mipsel.deb oldstable/main/binary-mipsel/libxp6-dbg_4.3.0.dfsg.1-14sarge5_mipsel.deb oldstable/main/binary-mipsel/libxp-dev_4.3.0.dfsg.1-14sarge5_mipsel.deb oldstable/main/binary-mipsel/libxpm4_4.3.0.dfsg.1-14sarge5_mipsel.deb oldstable/main/binary-mipsel/libxpm4-dbg_4.3.0.dfsg.1-14sarge5_mipsel.deb oldstable/main/binary-mipsel/libxpm-dev_4.3.0.dfsg.1-14sarge5_mipsel.deb oldstable/main/binary-mipsel/libxrandr2_4.3.0.dfsg.1-14sarge5_mipsel.deb oldstable/main/binary-mipsel/libxrandr2-dbg_4.3.0.dfsg.1-14sarge5_mipsel.deb oldstable/main/binary-mipsel/libxrandr-dev_4.3.0.dfsg.1-14sarge5_mipsel.deb oldstable/main/binary-mipsel/libxt6_4.3.0.dfsg.1-14sarge5_mipsel.deb oldstable/main/binary-mipsel/libxt6-dbg_4.3.0.dfsg.1-14sarge5_mipsel.deb oldstable/main/binary-mipsel/libxt-dev_4.3.0.dfsg.1-14sarge5_mipsel.deb oldstable/main/binary-mipsel/libxtrap6_4.3.0.dfsg.1-14sarge5_mipsel.deb oldstable/main/binary-mipsel/libxtrap6-dbg_4.3.0.dfsg.1-14sarge5_mipsel.deb oldstable/main/binary-mipsel/libxtrap-dev_4.3.0.dfsg.1-14sarge5_mipsel.deb oldstable/main/binary-mipsel/libxtst6_4.3.0.dfsg.1-14sarge5_mipsel.deb oldstable/main/binary-mipsel/libxtst6-dbg_4.3.0.dfsg.1-14sarge5_mipsel.deb oldstable/main/binary-mipsel/libxtst-dev_4.3.0.dfsg.1-14sarge5_mipsel.deb oldstable/main/binary-mipsel/libxv1_4.3.0.dfsg.1-14sarge5_mipsel.deb oldstable/main/binary-mipsel/libxv1-dbg_4.3.0.dfsg.1-14sarge5_mipsel.deb oldstable/main/binary-mipsel/libxv-dev_4.3.0.dfsg.1-14sarge5_mipsel.deb oldstable/main/binary-mipsel/proxymngr_4.3.0.dfsg.1-14sarge5_mipsel.deb oldstable/main/binary-mipsel/twm_4.3.0.dfsg.1-14sarge5_mipsel.deb oldstable/main/binary-mipsel/xbase-clients_4.3.0.dfsg.1-14sarge5_mipsel.deb oldstable/main/binary-mipsel/xdm_4.3.0.dfsg.1-14sarge5_mipsel.deb oldstable/main/binary-mipsel/xfs_4.3.0.dfsg.1-14sarge5_mipsel.deb oldstable/main/binary-mipsel/xfwp_4.3.0.dfsg.1-14sarge5_mipsel.deb oldstable/main/binary-mipsel/xlibmesa-gl_4.3.0.dfsg.1-14sarge5_mipsel.deb oldstable/main/binary-mipsel/xlibmesa-gl-dbg_4.3.0.dfsg.1-14sarge5_mipsel.deb oldstable/main/binary-mipsel/xlibmesa-gl-dev_4.3.0.dfsg.1-14sarge5_mipsel.deb oldstable/main/binary-mipsel/xlibmesa-glu_4.3.0.dfsg.1-14sarge5_mipsel.deb oldstable/main/binary-mipsel/xlibmesa-glu-dbg_4.3.0.dfsg.1-14sarge5_mipsel.deb oldstable/main/binary-mipsel/xlibmesa-glu-dev_4.3.0.dfsg.1-14sarge5_mipsel.deb oldstable/main/binary-mipsel/xlibs-static-dev_4.3.0.dfsg.1-14sarge5_mipsel.deb oldstable/main/binary-mipsel/xlibs-static-pic_4.3.0.dfsg.1-14sarge5_mipsel.deb oldstable/main/binary-mipsel/xmh_4.3.0.dfsg.1-14sarge5_mipsel.deb oldstable/main/binary-mipsel/xnest_4.3.0.dfsg.1-14sarge5_mipsel.deb oldstable/main/binary-mipsel/xserver-common_4.3.0.dfsg.1-14sarge5_mipsel.deb oldstable/main/binary-mipsel/xserver-xfree86_4.3.0.dfsg.1-14sarge5_mipsel.deb oldstable/main/binary-mipsel/xserver-xfree86-dbg_4.3.0.dfsg.1-14sarge5_mipsel.deb oldstable/main/binary-mipsel/xterm_4.3.0.dfsg.1-14sarge5_mipsel.deb oldstable/main/binary-mipsel/xutils_4.3.0.dfsg.1-14sarge5_mipsel.deb oldstable/main/binary-mipsel/xvfb_4.3.0.dfsg.1-14sarge5_mipsel.deb oldstable/main/binary-mipsel/x-window-system-core_4.3.0.dfsg.1-14sarge5_mipsel.deb oldstable/main/binary-mipsel/x-window-system-dev_4.3.0.dfsg.1-14sarge5_mipsel.deb oldstable/main/binary-mipsel/xlibmesa3_4.3.0.dfsg.1-14sarge5_mipsel.deb xfree86 (4.3.0.dfsg.1-14sarge5) oldstable-security; urgency=high * Security upload, fixes several vulnerabilities + CVE-2007-4568: integer overflow in the computation of the size of a dynamic buffer can lead to a heap overflow in the build_range() function. Also, an arbitrary number of bytes on the heap can be swapped by the swap_char2b() function. + CVE-2007-3103: race condition in xfs init script oldstable/main/binary-powerpc/lbxproxy_4.3.0.dfsg.1-14sarge5_powerpc.deb oldstable/main/binary-powerpc/libdps1_4.3.0.dfsg.1-14sarge5_powerpc.deb oldstable/main/binary-powerpc/libdps1-dbg_4.3.0.dfsg.1-14sarge5_powerpc.deb oldstable/main/binary-powerpc/libdps-dev_4.3.0.dfsg.1-14sarge5_powerpc.deb oldstable/main/binary-powerpc/libice6_4.3.0.dfsg.1-14sarge5_powerpc.deb oldstable/main/binary-powerpc/libice6-dbg_4.3.0.dfsg.1-14sarge5_powerpc.deb oldstable/main/binary-powerpc/libice-dev_4.3.0.dfsg.1-14sarge5_powerpc.deb oldstable/main/binary-powerpc/libsm6_4.3.0.dfsg.1-14sarge5_powerpc.deb oldstable/main/binary-powerpc/libsm6-dbg_4.3.0.dfsg.1-14sarge5_powerpc.deb oldstable/main/binary-powerpc/libsm-dev_4.3.0.dfsg.1-14sarge5_powerpc.deb oldstable/main/binary-powerpc/libx11-6_4.3.0.dfsg.1-14sarge5_powerpc.deb oldstable/main/binary-powerpc/libx11-6-dbg_4.3.0.dfsg.1-14sarge5_powerpc.deb oldstable/main/binary-powerpc/libx11-dev_4.3.0.dfsg.1-14sarge5_powerpc.deb oldstable/main/binary-powerpc/libxaw6_4.3.0.dfsg.1-14sarge5_powerpc.deb oldstable/main/binary-powerpc/libxaw6-dbg_4.3.0.dfsg.1-14sarge5_powerpc.deb oldstable/main/binary-powerpc/libxaw6-dev_4.3.0.dfsg.1-14sarge5_powerpc.deb oldstable/main/binary-powerpc/libxaw7_4.3.0.dfsg.1-14sarge5_powerpc.deb oldstable/main/binary-powerpc/libxaw7-dbg_4.3.0.dfsg.1-14sarge5_powerpc.deb oldstable/main/binary-powerpc/libxaw7-dev_4.3.0.dfsg.1-14sarge5_powerpc.deb oldstable/main/binary-powerpc/libxext6_4.3.0.dfsg.1-14sarge5_powerpc.deb oldstable/main/binary-powerpc/libxext6-dbg_4.3.0.dfsg.1-14sarge5_powerpc.deb oldstable/main/binary-powerpc/libxext-dev_4.3.0.dfsg.1-14sarge5_powerpc.deb oldstable/main/binary-powerpc/libxft1_4.3.0.dfsg.1-14sarge5_powerpc.deb oldstable/main/binary-powerpc/libxft1-dbg_4.3.0.dfsg.1-14sarge5_powerpc.deb oldstable/main/binary-powerpc/libxi6_4.3.0.dfsg.1-14sarge5_powerpc.deb oldstable/main/binary-powerpc/libxi6-dbg_4.3.0.dfsg.1-14sarge5_powerpc.deb oldstable/main/binary-powerpc/libxi-dev_4.3.0.dfsg.1-14sarge5_powerpc.deb oldstable/main/binary-powerpc/libxmu6_4.3.0.dfsg.1-14sarge5_powerpc.deb oldstable/main/binary-powerpc/libxmu6-dbg_4.3.0.dfsg.1-14sarge5_powerpc.deb oldstable/main/binary-powerpc/libxmu-dev_4.3.0.dfsg.1-14sarge5_powerpc.deb oldstable/main/binary-powerpc/libxmuu1_4.3.0.dfsg.1-14sarge5_powerpc.deb oldstable/main/binary-powerpc/libxmuu1-dbg_4.3.0.dfsg.1-14sarge5_powerpc.deb oldstable/main/binary-powerpc/libxmuu-dev_4.3.0.dfsg.1-14sarge5_powerpc.deb oldstable/main/binary-powerpc/libxp6_4.3.0.dfsg.1-14sarge5_powerpc.deb oldstable/main/binary-powerpc/libxp6-dbg_4.3.0.dfsg.1-14sarge5_powerpc.deb oldstable/main/binary-powerpc/libxp-dev_4.3.0.dfsg.1-14sarge5_powerpc.deb oldstable/main/binary-powerpc/libxpm4_4.3.0.dfsg.1-14sarge5_powerpc.deb oldstable/main/binary-powerpc/libxpm4-dbg_4.3.0.dfsg.1-14sarge5_powerpc.deb oldstable/main/binary-powerpc/libxpm-dev_4.3.0.dfsg.1-14sarge5_powerpc.deb oldstable/main/binary-powerpc/libxrandr2_4.3.0.dfsg.1-14sarge5_powerpc.deb oldstable/main/binary-powerpc/libxrandr2-dbg_4.3.0.dfsg.1-14sarge5_powerpc.deb oldstable/main/binary-powerpc/libxrandr-dev_4.3.0.dfsg.1-14sarge5_powerpc.deb oldstable/main/binary-powerpc/libxt6_4.3.0.dfsg.1-14sarge5_powerpc.deb oldstable/main/binary-powerpc/libxt6-dbg_4.3.0.dfsg.1-14sarge5_powerpc.deb oldstable/main/binary-powerpc/libxt-dev_4.3.0.dfsg.1-14sarge5_powerpc.deb oldstable/main/binary-powerpc/libxtrap6_4.3.0.dfsg.1-14sarge5_powerpc.deb oldstable/main/binary-powerpc/libxtrap6-dbg_4.3.0.dfsg.1-14sarge5_powerpc.deb oldstable/main/binary-powerpc/libxtrap-dev_4.3.0.dfsg.1-14sarge5_powerpc.deb oldstable/main/binary-powerpc/libxtst6_4.3.0.dfsg.1-14sarge5_powerpc.deb oldstable/main/binary-powerpc/libxtst6-dbg_4.3.0.dfsg.1-14sarge5_powerpc.deb oldstable/main/binary-powerpc/libxtst-dev_4.3.0.dfsg.1-14sarge5_powerpc.deb oldstable/main/binary-powerpc/libxv1_4.3.0.dfsg.1-14sarge5_powerpc.deb oldstable/main/binary-powerpc/libxv1-dbg_4.3.0.dfsg.1-14sarge5_powerpc.deb oldstable/main/binary-powerpc/libxv-dev_4.3.0.dfsg.1-14sarge5_powerpc.deb oldstable/main/binary-powerpc/proxymngr_4.3.0.dfsg.1-14sarge5_powerpc.deb oldstable/main/binary-powerpc/twm_4.3.0.dfsg.1-14sarge5_powerpc.deb oldstable/main/binary-powerpc/xbase-clients_4.3.0.dfsg.1-14sarge5_powerpc.deb oldstable/main/binary-powerpc/xdm_4.3.0.dfsg.1-14sarge5_powerpc.deb oldstable/main/binary-powerpc/xfs_4.3.0.dfsg.1-14sarge5_powerpc.deb oldstable/main/binary-powerpc/xfwp_4.3.0.dfsg.1-14sarge5_powerpc.deb oldstable/main/binary-powerpc/xlibmesa-dri_4.3.0.dfsg.1-14sarge5_powerpc.deb oldstable/main/binary-powerpc/xlibmesa-dri-dbg_4.3.0.dfsg.1-14sarge5_powerpc.deb oldstable/main/binary-powerpc/xlibmesa-gl_4.3.0.dfsg.1-14sarge5_powerpc.deb oldstable/main/binary-powerpc/xlibmesa-gl-dbg_4.3.0.dfsg.1-14sarge5_powerpc.deb oldstable/main/binary-powerpc/xlibmesa-gl-dev_4.3.0.dfsg.1-14sarge5_powerpc.deb oldstable/main/binary-powerpc/xlibmesa-glu_4.3.0.dfsg.1-14sarge5_powerpc.deb oldstable/main/binary-powerpc/xlibmesa-glu-dbg_4.3.0.dfsg.1-14sarge5_powerpc.deb oldstable/main/binary-powerpc/xlibmesa-glu-dev_4.3.0.dfsg.1-14sarge5_powerpc.deb oldstable/main/binary-powerpc/xlibosmesa4_4.3.0.dfsg.1-14sarge5_powerpc.deb oldstable/main/binary-powerpc/xlibosmesa4-dbg_4.3.0.dfsg.1-14sarge5_powerpc.deb oldstable/main/binary-powerpc/xlibosmesa-dev_4.3.0.dfsg.1-14sarge5_powerpc.deb oldstable/main/binary-powerpc/xlibs-static-dev_4.3.0.dfsg.1-14sarge5_powerpc.deb oldstable/main/binary-powerpc/xlibs-static-pic_4.3.0.dfsg.1-14sarge5_powerpc.deb oldstable/main/binary-powerpc/xmh_4.3.0.dfsg.1-14sarge5_powerpc.deb oldstable/main/binary-powerpc/xnest_4.3.0.dfsg.1-14sarge5_powerpc.deb oldstable/main/binary-powerpc/xserver-common_4.3.0.dfsg.1-14sarge5_powerpc.deb oldstable/main/binary-powerpc/xserver-xfree86_4.3.0.dfsg.1-14sarge5_powerpc.deb oldstable/main/binary-powerpc/xserver-xfree86-dbg_4.3.0.dfsg.1-14sarge5_powerpc.deb oldstable/main/binary-powerpc/xterm_4.3.0.dfsg.1-14sarge5_powerpc.deb oldstable/main/binary-powerpc/xutils_4.3.0.dfsg.1-14sarge5_powerpc.deb oldstable/main/binary-powerpc/xvfb_4.3.0.dfsg.1-14sarge5_powerpc.deb oldstable/main/binary-powerpc/x-window-system-core_4.3.0.dfsg.1-14sarge5_powerpc.deb oldstable/main/binary-powerpc/x-window-system-dev_4.3.0.dfsg.1-14sarge5_powerpc.deb oldstable/main/binary-powerpc/xlibmesa3_4.3.0.dfsg.1-14sarge5_powerpc.deb xfree86 (4.3.0.dfsg.1-14sarge5) oldstable-security; urgency=high * Security upload, fixes several vulnerabilities + CVE-2007-4568: integer overflow in the computation of the size of a dynamic buffer can lead to a heap overflow in the build_range() function. Also, an arbitrary number of bytes on the heap can be swapped by the swap_char2b() function. + CVE-2007-3103: race condition in xfs init script oldstable/main/binary-s390/lbxproxy_4.3.0.dfsg.1-14sarge5_s390.deb oldstable/main/binary-s390/libdps1_4.3.0.dfsg.1-14sarge5_s390.deb oldstable/main/binary-s390/libdps1-dbg_4.3.0.dfsg.1-14sarge5_s390.deb oldstable/main/binary-s390/libdps-dev_4.3.0.dfsg.1-14sarge5_s390.deb oldstable/main/binary-s390/libice6_4.3.0.dfsg.1-14sarge5_s390.deb oldstable/main/binary-s390/libice6-dbg_4.3.0.dfsg.1-14sarge5_s390.deb oldstable/main/binary-s390/libice-dev_4.3.0.dfsg.1-14sarge5_s390.deb oldstable/main/binary-s390/libsm6_4.3.0.dfsg.1-14sarge5_s390.deb oldstable/main/binary-s390/libsm6-dbg_4.3.0.dfsg.1-14sarge5_s390.deb oldstable/main/binary-s390/libsm-dev_4.3.0.dfsg.1-14sarge5_s390.deb oldstable/main/binary-s390/libx11-6_4.3.0.dfsg.1-14sarge5_s390.deb oldstable/main/binary-s390/libx11-6-dbg_4.3.0.dfsg.1-14sarge5_s390.deb oldstable/main/binary-s390/libx11-dev_4.3.0.dfsg.1-14sarge5_s390.deb oldstable/main/binary-s390/libxaw6_4.3.0.dfsg.1-14sarge5_s390.deb oldstable/main/binary-s390/libxaw6-dbg_4.3.0.dfsg.1-14sarge5_s390.deb oldstable/main/binary-s390/libxaw6-dev_4.3.0.dfsg.1-14sarge5_s390.deb oldstable/main/binary-s390/libxaw7_4.3.0.dfsg.1-14sarge5_s390.deb oldstable/main/binary-s390/libxaw7-dbg_4.3.0.dfsg.1-14sarge5_s390.deb oldstable/main/binary-s390/libxaw7-dev_4.3.0.dfsg.1-14sarge5_s390.deb oldstable/main/binary-s390/libxext6_4.3.0.dfsg.1-14sarge5_s390.deb oldstable/main/binary-s390/libxext6-dbg_4.3.0.dfsg.1-14sarge5_s390.deb oldstable/main/binary-s390/libxext-dev_4.3.0.dfsg.1-14sarge5_s390.deb oldstable/main/binary-s390/libxft1_4.3.0.dfsg.1-14sarge5_s390.deb oldstable/main/binary-s390/libxft1-dbg_4.3.0.dfsg.1-14sarge5_s390.deb oldstable/main/binary-s390/libxi6_4.3.0.dfsg.1-14sarge5_s390.deb oldstable/main/binary-s390/libxi6-dbg_4.3.0.dfsg.1-14sarge5_s390.deb oldstable/main/binary-s390/libxi-dev_4.3.0.dfsg.1-14sarge5_s390.deb oldstable/main/binary-s390/libxmu6_4.3.0.dfsg.1-14sarge5_s390.deb oldstable/main/binary-s390/libxmu6-dbg_4.3.0.dfsg.1-14sarge5_s390.deb oldstable/main/binary-s390/libxmu-dev_4.3.0.dfsg.1-14sarge5_s390.deb oldstable/main/binary-s390/libxmuu1_4.3.0.dfsg.1-14sarge5_s390.deb oldstable/main/binary-s390/libxmuu1-dbg_4.3.0.dfsg.1-14sarge5_s390.deb oldstable/main/binary-s390/libxmuu-dev_4.3.0.dfsg.1-14sarge5_s390.deb oldstable/main/binary-s390/libxp6_4.3.0.dfsg.1-14sarge5_s390.deb oldstable/main/binary-s390/libxp6-dbg_4.3.0.dfsg.1-14sarge5_s390.deb oldstable/main/binary-s390/libxp-dev_4.3.0.dfsg.1-14sarge5_s390.deb oldstable/main/binary-s390/libxpm4_4.3.0.dfsg.1-14sarge5_s390.deb oldstable/main/binary-s390/libxpm4-dbg_4.3.0.dfsg.1-14sarge5_s390.deb oldstable/main/binary-s390/libxpm-dev_4.3.0.dfsg.1-14sarge5_s390.deb oldstable/main/binary-s390/libxrandr2_4.3.0.dfsg.1-14sarge5_s390.deb oldstable/main/binary-s390/libxrandr2-dbg_4.3.0.dfsg.1-14sarge5_s390.deb oldstable/main/binary-s390/libxrandr-dev_4.3.0.dfsg.1-14sarge5_s390.deb oldstable/main/binary-s390/libxt6_4.3.0.dfsg.1-14sarge5_s390.deb oldstable/main/binary-s390/libxt6-dbg_4.3.0.dfsg.1-14sarge5_s390.deb oldstable/main/binary-s390/libxt-dev_4.3.0.dfsg.1-14sarge5_s390.deb oldstable/main/binary-s390/libxtrap6_4.3.0.dfsg.1-14sarge5_s390.deb oldstable/main/binary-s390/libxtrap6-dbg_4.3.0.dfsg.1-14sarge5_s390.deb oldstable/main/binary-s390/libxtrap-dev_4.3.0.dfsg.1-14sarge5_s390.deb oldstable/main/binary-s390/libxtst6_4.3.0.dfsg.1-14sarge5_s390.deb oldstable/main/binary-s390/libxtst6-dbg_4.3.0.dfsg.1-14sarge5_s390.deb oldstable/main/binary-s390/libxtst-dev_4.3.0.dfsg.1-14sarge5_s390.deb oldstable/main/binary-s390/libxv1_4.3.0.dfsg.1-14sarge5_s390.deb oldstable/main/binary-s390/libxv1-dbg_4.3.0.dfsg.1-14sarge5_s390.deb oldstable/main/binary-s390/libxv-dev_4.3.0.dfsg.1-14sarge5_s390.deb oldstable/main/binary-s390/proxymngr_4.3.0.dfsg.1-14sarge5_s390.deb oldstable/main/binary-s390/twm_4.3.0.dfsg.1-14sarge5_s390.deb oldstable/main/binary-s390/xbase-clients_4.3.0.dfsg.1-14sarge5_s390.deb oldstable/main/binary-s390/xdm_4.3.0.dfsg.1-14sarge5_s390.deb oldstable/main/binary-s390/xfs_4.3.0.dfsg.1-14sarge5_s390.deb oldstable/main/binary-s390/xfwp_4.3.0.dfsg.1-14sarge5_s390.deb oldstable/main/binary-s390/xlibmesa-gl_4.3.0.dfsg.1-14sarge5_s390.deb oldstable/main/binary-s390/xlibmesa-gl-dbg_4.3.0.dfsg.1-14sarge5_s390.deb oldstable/main/binary-s390/xlibmesa-gl-dev_4.3.0.dfsg.1-14sarge5_s390.deb oldstable/main/binary-s390/xlibmesa-glu_4.3.0.dfsg.1-14sarge5_s390.deb oldstable/main/binary-s390/xlibmesa-glu-dbg_4.3.0.dfsg.1-14sarge5_s390.deb oldstable/main/binary-s390/xlibmesa-glu-dev_4.3.0.dfsg.1-14sarge5_s390.deb oldstable/main/binary-s390/xlibs-static-dev_4.3.0.dfsg.1-14sarge5_s390.deb oldstable/main/binary-s390/xlibs-static-pic_4.3.0.dfsg.1-14sarge5_s390.deb oldstable/main/binary-s390/xmh_4.3.0.dfsg.1-14sarge5_s390.deb oldstable/main/binary-s390/xnest_4.3.0.dfsg.1-14sarge5_s390.deb oldstable/main/binary-s390/xserver-common_4.3.0.dfsg.1-14sarge5_s390.deb oldstable/main/binary-s390/xterm_4.3.0.dfsg.1-14sarge5_s390.deb oldstable/main/binary-s390/xutils_4.3.0.dfsg.1-14sarge5_s390.deb oldstable/main/binary-s390/xvfb_4.3.0.dfsg.1-14sarge5_s390.deb oldstable/main/binary-s390/x-window-system-core_4.3.0.dfsg.1-14sarge5_s390.deb oldstable/main/binary-s390/x-window-system-dev_4.3.0.dfsg.1-14sarge5_s390.deb oldstable/main/binary-s390/xlibmesa3_4.3.0.dfsg.1-14sarge5_s390.deb xfree86 (4.3.0.dfsg.1-14sarge5) oldstable-security; urgency=high * Security upload, fixes several vulnerabilities + CVE-2007-4568: integer overflow in the computation of the size of a dynamic buffer can lead to a heap overflow in the build_range() function. Also, an arbitrary number of bytes on the heap can be swapped by the swap_char2b() function. + CVE-2007-3103: race condition in xfs init script oldstable/main/binary-sparc/lbxproxy_4.3.0.dfsg.1-14sarge5_sparc.deb oldstable/main/binary-sparc/libdps1_4.3.0.dfsg.1-14sarge5_sparc.deb oldstable/main/binary-sparc/libdps1-dbg_4.3.0.dfsg.1-14sarge5_sparc.deb oldstable/main/binary-sparc/libdps-dev_4.3.0.dfsg.1-14sarge5_sparc.deb oldstable/main/binary-sparc/libice6_4.3.0.dfsg.1-14sarge5_sparc.deb oldstable/main/binary-sparc/libice6-dbg_4.3.0.dfsg.1-14sarge5_sparc.deb oldstable/main/binary-sparc/libice-dev_4.3.0.dfsg.1-14sarge5_sparc.deb oldstable/main/binary-sparc/libsm6_4.3.0.dfsg.1-14sarge5_sparc.deb oldstable/main/binary-sparc/libsm6-dbg_4.3.0.dfsg.1-14sarge5_sparc.deb oldstable/main/binary-sparc/libsm-dev_4.3.0.dfsg.1-14sarge5_sparc.deb oldstable/main/binary-sparc/libx11-6_4.3.0.dfsg.1-14sarge5_sparc.deb oldstable/main/binary-sparc/libx11-6-dbg_4.3.0.dfsg.1-14sarge5_sparc.deb oldstable/main/binary-sparc/libx11-dev_4.3.0.dfsg.1-14sarge5_sparc.deb oldstable/main/binary-sparc/libxaw6_4.3.0.dfsg.1-14sarge5_sparc.deb oldstable/main/binary-sparc/libxaw6-dbg_4.3.0.dfsg.1-14sarge5_sparc.deb oldstable/main/binary-sparc/libxaw6-dev_4.3.0.dfsg.1-14sarge5_sparc.deb oldstable/main/binary-sparc/libxaw7_4.3.0.dfsg.1-14sarge5_sparc.deb oldstable/main/binary-sparc/libxaw7-dbg_4.3.0.dfsg.1-14sarge5_sparc.deb oldstable/main/binary-sparc/libxaw7-dev_4.3.0.dfsg.1-14sarge5_sparc.deb oldstable/main/binary-sparc/libxext6_4.3.0.dfsg.1-14sarge5_sparc.deb oldstable/main/binary-sparc/libxext6-dbg_4.3.0.dfsg.1-14sarge5_sparc.deb oldstable/main/binary-sparc/libxext-dev_4.3.0.dfsg.1-14sarge5_sparc.deb oldstable/main/binary-sparc/libxft1_4.3.0.dfsg.1-14sarge5_sparc.deb oldstable/main/binary-sparc/libxft1-dbg_4.3.0.dfsg.1-14sarge5_sparc.deb oldstable/main/binary-sparc/libxi6_4.3.0.dfsg.1-14sarge5_sparc.deb oldstable/main/binary-sparc/libxi6-dbg_4.3.0.dfsg.1-14sarge5_sparc.deb oldstable/main/binary-sparc/libxi-dev_4.3.0.dfsg.1-14sarge5_sparc.deb oldstable/main/binary-sparc/libxmu6_4.3.0.dfsg.1-14sarge5_sparc.deb oldstable/main/binary-sparc/libxmu6-dbg_4.3.0.dfsg.1-14sarge5_sparc.deb oldstable/main/binary-sparc/libxmu-dev_4.3.0.dfsg.1-14sarge5_sparc.deb oldstable/main/binary-sparc/libxmuu1_4.3.0.dfsg.1-14sarge5_sparc.deb oldstable/main/binary-sparc/libxmuu1-dbg_4.3.0.dfsg.1-14sarge5_sparc.deb oldstable/main/binary-sparc/libxmuu-dev_4.3.0.dfsg.1-14sarge5_sparc.deb oldstable/main/binary-sparc/libxp6_4.3.0.dfsg.1-14sarge5_sparc.deb oldstable/main/binary-sparc/libxp6-dbg_4.3.0.dfsg.1-14sarge5_sparc.deb oldstable/main/binary-sparc/libxp-dev_4.3.0.dfsg.1-14sarge5_sparc.deb oldstable/main/binary-sparc/libxpm4_4.3.0.dfsg.1-14sarge5_sparc.deb oldstable/main/binary-sparc/libxpm4-dbg_4.3.0.dfsg.1-14sarge5_sparc.deb oldstable/main/binary-sparc/libxpm-dev_4.3.0.dfsg.1-14sarge5_sparc.deb oldstable/main/binary-sparc/libxrandr2_4.3.0.dfsg.1-14sarge5_sparc.deb oldstable/main/binary-sparc/libxrandr2-dbg_4.3.0.dfsg.1-14sarge5_sparc.deb oldstable/main/binary-sparc/libxrandr-dev_4.3.0.dfsg.1-14sarge5_sparc.deb oldstable/main/binary-sparc/libxt6_4.3.0.dfsg.1-14sarge5_sparc.deb oldstable/main/binary-sparc/libxt6-dbg_4.3.0.dfsg.1-14sarge5_sparc.deb oldstable/main/binary-sparc/libxt-dev_4.3.0.dfsg.1-14sarge5_sparc.deb oldstable/main/binary-sparc/libxtrap6_4.3.0.dfsg.1-14sarge5_sparc.deb oldstable/main/binary-sparc/libxtrap6-dbg_4.3.0.dfsg.1-14sarge5_sparc.deb oldstable/main/binary-sparc/libxtrap-dev_4.3.0.dfsg.1-14sarge5_sparc.deb oldstable/main/binary-sparc/libxtst6_4.3.0.dfsg.1-14sarge5_sparc.deb oldstable/main/binary-sparc/libxtst6-dbg_4.3.0.dfsg.1-14sarge5_sparc.deb oldstable/main/binary-sparc/libxtst-dev_4.3.0.dfsg.1-14sarge5_sparc.deb oldstable/main/binary-sparc/libxv1_4.3.0.dfsg.1-14sarge5_sparc.deb oldstable/main/binary-sparc/libxv1-dbg_4.3.0.dfsg.1-14sarge5_sparc.deb oldstable/main/binary-sparc/libxv-dev_4.3.0.dfsg.1-14sarge5_sparc.deb oldstable/main/binary-sparc/proxymngr_4.3.0.dfsg.1-14sarge5_sparc.deb oldstable/main/binary-sparc/twm_4.3.0.dfsg.1-14sarge5_sparc.deb oldstable/main/binary-sparc/xbase-clients_4.3.0.dfsg.1-14sarge5_sparc.deb oldstable/main/binary-sparc/xdm_4.3.0.dfsg.1-14sarge5_sparc.deb oldstable/main/binary-sparc/xfs_4.3.0.dfsg.1-14sarge5_sparc.deb oldstable/main/binary-sparc/xfwp_4.3.0.dfsg.1-14sarge5_sparc.deb oldstable/main/binary-sparc/xlibmesa-dri_4.3.0.dfsg.1-14sarge5_sparc.deb oldstable/main/binary-sparc/xlibmesa-dri-dbg_4.3.0.dfsg.1-14sarge5_sparc.deb oldstable/main/binary-sparc/xlibmesa-gl_4.3.0.dfsg.1-14sarge5_sparc.deb oldstable/main/binary-sparc/xlibmesa-gl-dbg_4.3.0.dfsg.1-14sarge5_sparc.deb oldstable/main/binary-sparc/xlibmesa-gl-dev_4.3.0.dfsg.1-14sarge5_sparc.deb oldstable/main/binary-sparc/xlibmesa-glu_4.3.0.dfsg.1-14sarge5_sparc.deb oldstable/main/binary-sparc/xlibmesa-glu-dbg_4.3.0.dfsg.1-14sarge5_sparc.deb oldstable/main/binary-sparc/xlibmesa-glu-dev_4.3.0.dfsg.1-14sarge5_sparc.deb oldstable/main/binary-sparc/xlibosmesa4_4.3.0.dfsg.1-14sarge5_sparc.deb oldstable/main/binary-sparc/xlibosmesa4-dbg_4.3.0.dfsg.1-14sarge5_sparc.deb oldstable/main/binary-sparc/xlibosmesa-dev_4.3.0.dfsg.1-14sarge5_sparc.deb oldstable/main/binary-sparc/xlibs-static-dev_4.3.0.dfsg.1-14sarge5_sparc.deb oldstable/main/binary-sparc/xlibs-static-pic_4.3.0.dfsg.1-14sarge5_sparc.deb oldstable/main/binary-sparc/xmh_4.3.0.dfsg.1-14sarge5_sparc.deb oldstable/main/binary-sparc/xnest_4.3.0.dfsg.1-14sarge5_sparc.deb oldstable/main/binary-sparc/xserver-common_4.3.0.dfsg.1-14sarge5_sparc.deb oldstable/main/binary-sparc/xserver-xfree86_4.3.0.dfsg.1-14sarge5_sparc.deb oldstable/main/binary-sparc/xserver-xfree86-dbg_4.3.0.dfsg.1-14sarge5_sparc.deb oldstable/main/binary-sparc/xterm_4.3.0.dfsg.1-14sarge5_sparc.deb oldstable/main/binary-sparc/xutils_4.3.0.dfsg.1-14sarge5_sparc.deb oldstable/main/binary-sparc/xvfb_4.3.0.dfsg.1-14sarge5_sparc.deb oldstable/main/binary-sparc/x-window-system-core_4.3.0.dfsg.1-14sarge5_sparc.deb oldstable/main/binary-sparc/x-window-system-dev_4.3.0.dfsg.1-14sarge5_sparc.deb oldstable/main/binary-sparc/xlibmesa3_4.3.0.dfsg.1-14sarge5_sparc.deb xfree86 (4.3.0.dfsg.1-14sarge5) oldstable-security; urgency=high * Security upload, fixes several vulnerabilities + CVE-2007-4568: integer overflow in the computation of the size of a dynamic buffer can lead to a heap overflow in the build_range() function. Also, an arbitrary number of bytes on the heap can be swapped by the swap_char2b() function. + CVE-2007-3103: race condition in xfs init script oldstable/main/binary-hppa/evolution-exchange_2.0.4-1_hppa.deb ximian-connector (2.0.4-1) testing-proposed-updates; urgency=medium * New upstream release This package is necessary to sync up with evolution 2.0.4, Evolution and evolution-exchange should match up, and the 2.0.4 package fixes many bugs. Closes #299504 Closes #306439 Closes #283605 - Remove CVS the spam loop patch, It's no longer needed. * Added manpage for ximian-connector-setup * Changed build depends from libdb4.2-dev to libdb4.1-dev oldstable/main/binary-alpha/xpdf-reader_3.00-13.7_alpha.deb oldstable/main/binary-alpha/xpdf-utils_3.00-13.7_alpha.deb xpdf (3.00-13.7) oldstable-security; urgency=high * Fix integer overflow in stream predictor (CVE-2007-3387). oldstable/main/binary-arm/xpdf-reader_3.00-13.7_arm.deb oldstable/main/binary-arm/xpdf-utils_3.00-13.7_arm.deb xpdf (3.00-13.7) oldstable-security; urgency=high * Fix integer overflow in stream predictor (CVE-2007-3387). oldstable/main/binary-hppa/xpdf-reader_3.00-13.7_hppa.deb oldstable/main/binary-hppa/xpdf-utils_3.00-13.7_hppa.deb xpdf (3.00-13.7) oldstable-security; urgency=high * Fix integer overflow in stream predictor (CVE-2007-3387). oldstable/main/source/xpdf_3.00-13.7.dsc oldstable/main/source/xpdf_3.00-13.7.diff.gz oldstable/main/binary-all/xpdf_3.00-13.7_all.deb oldstable/main/binary-all/xpdf-common_3.00-13.7_all.deb oldstable/main/binary-i386/xpdf-reader_3.00-13.7_i386.deb oldstable/main/binary-i386/xpdf-utils_3.00-13.7_i386.deb xpdf (3.00-13.7) oldstable-security; urgency=high * Fix integer overflow in stream predictor (CVE-2007-3387). oldstable/main/binary-ia64/xpdf-reader_3.00-13.7_ia64.deb oldstable/main/binary-ia64/xpdf-utils_3.00-13.7_ia64.deb xpdf (3.00-13.7) oldstable-security; urgency=high * Fix integer overflow in stream predictor (CVE-2007-3387). oldstable/main/binary-m68k/xpdf-reader_3.00-13.7_m68k.deb oldstable/main/binary-m68k/xpdf-utils_3.00-13.7_m68k.deb xpdf (3.00-13.7) oldstable-security; urgency=high * Fix integer overflow in stream predictor (CVE-2007-3387). oldstable/main/binary-mips/xpdf-reader_3.00-13.7_mips.deb oldstable/main/binary-mips/xpdf-utils_3.00-13.7_mips.deb xpdf (3.00-13.7) oldstable-security; urgency=high * Fix integer overflow in stream predictor (CVE-2007-3387). oldstable/main/binary-mipsel/xpdf-reader_3.00-13.7_mipsel.deb oldstable/main/binary-mipsel/xpdf-utils_3.00-13.7_mipsel.deb xpdf (3.00-13.7) oldstable-security; urgency=high * Fix integer overflow in stream predictor (CVE-2007-3387). oldstable/main/binary-powerpc/xpdf-reader_3.00-13.7_powerpc.deb oldstable/main/binary-powerpc/xpdf-utils_3.00-13.7_powerpc.deb xpdf (3.00-13.7) oldstable-security; urgency=high * Fix integer overflow in stream predictor (CVE-2007-3387). oldstable/main/binary-s390/xpdf-reader_3.00-13.7_s390.deb oldstable/main/binary-s390/xpdf-utils_3.00-13.7_s390.deb xpdf (3.00-13.7) oldstable-security; urgency=high * Fix integer overflow in stream predictor (CVE-2007-3387). oldstable/main/binary-sparc/xpdf-reader_3.00-13.7_sparc.deb oldstable/main/binary-sparc/xpdf-utils_3.00-13.7_sparc.deb xpdf (3.00-13.7) oldstable-security; urgency=high * Fix integer overflow in stream predictor (CVE-2007-3387). oldstable/main/binary-arm/xwine_1.0-1_arm.deb xwine (1.0-1) unstable; urgency=low * Initial Release. * Closes ITPs. Closes: #290593, #290595 oldstable/main/source/zoph_0.3.3-12sarge3.dsc oldstable/main/source/zoph_0.3.3-12sarge3.diff.gz oldstable/main/binary-all/zoph_0.3.3-12sarge3_all.deb zoph (0.3.3-12sarge3) oldstable-security; urgency=high * Non-maintainer upload by the security team. * Fix SQL injection vulnerability in photos.php (CVE-2007-3905, closes: 435711) Removed the following packages from oldstable: kernel-headers-2.6.8-12 | 2.6.8-16sarge6 | i386 kernel-headers-2.6.8-12-amd64-generic | 2.6.8-16sarge6 | i386 kernel-headers-2.6.8-12-amd64-k8 | 2.6.8-16sarge6 | i386 kernel-headers-2.6.8-12-amd64-k8-smp | 2.6.8-16sarge6 | i386 kernel-headers-2.6.8-12-em64t-p4 | 2.6.8-16sarge6 | i386 kernel-headers-2.6.8-12-em64t-p4-smp | 2.6.8-16sarge6 | i386 kernel-image-2.6.8-12-amd64-generic | 2.6.8-16sarge6 | i386 kernel-image-2.6.8-12-amd64-k8 | 2.6.8-16sarge6 | i386 kernel-image-2.6.8-12-amd64-k8-smp | 2.6.8-16sarge6 | i386 kernel-image-2.6.8-12-em64t-p4 | 2.6.8-16sarge6 | i386 kernel-image-2.6.8-12-em64t-p4-smp | 2.6.8-16sarge6 | i386 acpi-modules-2.6.8-3-386-di | 1.02sarge4 | i386 affs-modules-2.6.8-3-power3-di | 0.78sarge2 | powerpc affs-modules-2.6.8-3-power4-di | 0.78sarge2 | powerpc affs-modules-2.6.8-3-powerpc-di | 0.78sarge2 | powerpc cdrom-core-modules-2.6.8-3-32-di | 1.1sarge2 | hppa cdrom-core-modules-2.6.8-3-386-di | 1.02sarge4 | i386 cdrom-core-modules-2.6.8-3-64-di | 1.1sarge2 | hppa cdrom-core-modules-2.6.8-3-itanium-smp-di | 1.1sarge2 | ia64 cdrom-core-modules-2.6.8-3-power3-di | 0.78sarge2 | powerpc cdrom-core-modules-2.6.8-3-power4-di | 0.78sarge2 | powerpc cdrom-core-modules-2.6.8-3-powerpc-di | 0.78sarge2 | powerpc cdrom-core-modules-2.6.8-3-sparc32-di | 0.05sarge2 | sparc cdrom-core-modules-2.6.8-3-sparc64-di | 0.05sarge2 | sparc cdrom-modules-2.6.8-3-32-di | 1.1sarge2 | hppa cdrom-modules-2.6.8-3-386-di | 1.02sarge4 | i386 cdrom-modules-2.6.8-3-64-di | 1.1sarge2 | hppa ext2-modules-2.6.8-3-power3-di | 0.78sarge2 | powerpc ext2-modules-2.6.8-3-power4-di | 0.78sarge2 | powerpc ext2-modules-2.6.8-3-powerpc-di | 0.78sarge2 | powerpc ext3-modules-2.6.8-3-32-di | 1.1sarge2 | hppa ext3-modules-2.6.8-3-386-di | 1.02sarge4 | i386 ext3-modules-2.6.8-3-64-di | 1.1sarge2 | hppa ext3-modules-2.6.8-3-itanium-smp-di | 1.1sarge2 | ia64 ext3-modules-2.6.8-3-power3-di | 0.78sarge2 | powerpc ext3-modules-2.6.8-3-power4-di | 0.78sarge2 | powerpc ext3-modules-2.6.8-3-powerpc-di | 0.78sarge2 | powerpc ext3-modules-2.6.8-3-sparc32-di | 0.05sarge2 | sparc ext3-modules-2.6.8-3-sparc64-di | 0.05sarge2 | sparc fat-modules-2.6.8-3-386-di | 1.02sarge4 | i386 fat-modules-2.6.8-3-itanium-smp-di | 1.1sarge2 | ia64 fat-modules-2.6.8-3-power3-di | 0.78sarge2 | powerpc fat-modules-2.6.8-3-power4-di | 0.78sarge2 | powerpc fat-modules-2.6.8-3-powerpc-di | 0.78sarge2 | powerpc fat-modules-2.6.8-3-sparc32-di | 0.05sarge2 | sparc fat-modules-2.6.8-3-sparc64-di | 0.05sarge2 | sparc fb-modules-2.6.8-3-386-di | 1.02sarge4 | i386 fb-modules-2.6.8-3-itanium-smp-di | 1.1sarge2 | ia64 fb-modules-2.6.8-3-power3-di | 0.78sarge2 | powerpc fb-modules-2.6.8-3-power4-di | 0.78sarge2 | powerpc fb-modules-2.6.8-3-powerpc-di | 0.78sarge2 | powerpc firewire-core-modules-2.6.8-3-32-di | 1.1sarge2 | hppa firewire-core-modules-2.6.8-3-386-di | 1.02sarge4 | i386 firewire-core-modules-2.6.8-3-64-di | 1.1sarge2 | hppa firewire-core-modules-2.6.8-3-itanium-smp-di | 1.1sarge2 | ia64 firewire-core-modules-2.6.8-3-power3-di | 0.78sarge2 | powerpc firewire-core-modules-2.6.8-3-power4-di | 0.78sarge2 | powerpc firewire-core-modules-2.6.8-3-powerpc-di | 0.78sarge2 | powerpc firmware-modules-2.6.8-3-386-di | 1.02sarge4 | i386 firmware-modules-2.6.8-3-itanium-smp-di | 1.1sarge2 | ia64 firmware-modules-2.6.8-3-power3-di | 0.78sarge2 | powerpc firmware-modules-2.6.8-3-power4-di | 0.78sarge2 | powerpc firmware-modules-2.6.8-3-powerpc-di | 0.78sarge2 | powerpc floppy-modules-2.6.8-3-386-di | 1.02sarge4 | i386 floppy-modules-2.6.8-3-power3-di | 0.78sarge2 | powerpc floppy-modules-2.6.8-3-power4-di | 0.78sarge2 | powerpc floppy-modules-2.6.8-3-powerpc-di | 0.78sarge2 | powerpc fs-common-modules-2.6.8-3-power3-di | 0.78sarge2 | powerpc fs-common-modules-2.6.8-3-power4-di | 0.78sarge2 | powerpc fs-common-modules-2.6.8-3-powerpc-di | 0.78sarge2 | powerpc hfs-modules-2.6.8-3-power3-di | 0.78sarge2 | powerpc hfs-modules-2.6.8-3-power4-di | 0.78sarge2 | powerpc hfs-modules-2.6.8-3-powerpc-di | 0.78sarge2 | powerpc hostap-modules-2.6.8-3-386 | 1:0.3.7-1sarge1 | i386 hostap-modules-2.6.8-3-686 | 1:0.3.7-1sarge1 | i386 hostap-modules-2.6.8-3-686-smp | 1:0.3.7-1sarge1 | i386 hostap-modules-2.6.8-3-k7 | 1:0.3.7-1sarge1 | i386 hostap-modules-2.6.8-3-k7-smp | 1:0.3.7-1sarge1 | i386 ide-core-modules-2.6.8-3-386-di | 1.02sarge4 | i386 ide-core-modules-2.6.8-3-itanium-smp-di | 1.1sarge2 | ia64 ide-modules-2.6.8-3-32-di | 1.1sarge2 | hppa ide-modules-2.6.8-3-386-di | 1.02sarge4 | i386 ide-modules-2.6.8-3-64-di | 1.1sarge2 | hppa ide-modules-2.6.8-3-itanium-smp-di | 1.1sarge2 | ia64 ide-modules-2.6.8-3-power3-di | 0.78sarge2 | powerpc ide-modules-2.6.8-3-power4-di | 0.78sarge2 | powerpc ide-modules-2.6.8-3-powerpc-di | 0.78sarge2 | powerpc ide-modules-2.6.8-3-sparc64-di | 0.05sarge2 | sparc input-modules-2.6.8-3-32-di | 1.1sarge2 | hppa input-modules-2.6.8-3-386-di | 1.02sarge4 | i386 input-modules-2.6.8-3-64-di | 1.1sarge2 | hppa input-modules-2.6.8-3-itanium-smp-di | 1.1sarge2 | ia64 input-modules-2.6.8-3-power3-di | 0.78sarge2 | powerpc input-modules-2.6.8-3-power4-di | 0.78sarge2 | powerpc input-modules-2.6.8-3-powerpc-di | 0.78sarge2 | powerpc ipv6-modules-2.6.8-3-32-di | 1.1sarge2 | hppa ipv6-modules-2.6.8-3-386-di | 1.02sarge4 | i386 ipv6-modules-2.6.8-3-64-di | 1.1sarge2 | hppa ipv6-modules-2.6.8-3-itanium-smp-di | 1.1sarge2 | ia64 ipv6-modules-2.6.8-3-power3-di | 0.78sarge2 | powerpc ipv6-modules-2.6.8-3-power4-di | 0.78sarge2 | powerpc ipv6-modules-2.6.8-3-powerpc-di | 0.78sarge2 | powerpc ipv6-modules-2.6.8-3-sparc32-di | 0.05sarge2 | sparc ipv6-modules-2.6.8-3-sparc64-di | 0.05sarge2 | sparc irda-modules-2.6.8-3-386-di | 1.02sarge4 | i386 irda-modules-2.6.8-3-itanium-smp-di | 1.1sarge2 | ia64 irda-modules-2.6.8-3-power3-di | 0.78sarge2 | powerpc irda-modules-2.6.8-3-power4-di | 0.78sarge2 | powerpc irda-modules-2.6.8-3-powerpc-di | 0.78sarge2 | powerpc jfs-modules-2.6.8-3-386-di | 1.02sarge4 | i386 jfs-modules-2.6.8-3-power3-di | 0.78sarge2 | powerpc jfs-modules-2.6.8-3-power4-di | 0.78sarge2 | powerpc jfs-modules-2.6.8-3-powerpc-di | 0.78sarge2 | powerpc kernel-build-2.6.8-3 | 2.6.8-15sarge6 | sparc kernel-build-2.6.8-3-power3 | 2.6.8-12sarge6 | powerpc kernel-build-2.6.8-3-power3-smp | 2.6.8-12sarge6 | powerpc kernel-build-2.6.8-3-power4 | 2.6.8-12sarge6 | powerpc kernel-build-2.6.8-3-power4-smp | 2.6.8-12sarge6 | powerpc kernel-build-2.6.8-3-powerpc | 2.6.8-12sarge6 | powerpc kernel-build-2.6.8-3-powerpc-smp | 2.6.8-12sarge6 | powerpc kernel-headers-2.6.8-3 | 2.6.8-5sarge6 | s390 kernel-headers-2.6.8-3 | 2.6.8-6sarge6 | hppa kernel-headers-2.6.8-3 | 2.6.8-12sarge6 | powerpc kernel-headers-2.6.8-3 | 2.6.8-14sarge6 | ia64 kernel-headers-2.6.8-3 | 2.6.8-15sarge6 | sparc kernel-headers-2.6.8-3 | 2.6.8-16sarge6 | alpha, i386 kernel-headers-2.6.8-3-32 | 2.6.8-6sarge6 | hppa kernel-headers-2.6.8-3-32-smp | 2.6.8-6sarge6 | hppa kernel-headers-2.6.8-3-386 | 2.6.8-16sarge6 | i386 kernel-headers-2.6.8-3-64 | 2.6.8-6sarge6 | hppa kernel-headers-2.6.8-3-64-smp | 2.6.8-6sarge6 | hppa kernel-headers-2.6.8-3-686 | 2.6.8-16sarge6 | i386 kernel-headers-2.6.8-3-686-smp | 2.6.8-16sarge6 | i386 kernel-headers-2.6.8-3-generic | 2.6.8-16sarge6 | alpha kernel-headers-2.6.8-3-itanium | 2.6.8-14sarge6 | ia64 kernel-headers-2.6.8-3-itanium-smp | 2.6.8-14sarge6 | ia64 kernel-headers-2.6.8-3-k7 | 2.6.8-16sarge6 | i386 kernel-headers-2.6.8-3-k7-smp | 2.6.8-16sarge6 | i386 kernel-headers-2.6.8-3-mckinley | 2.6.8-14sarge6 | ia64 kernel-headers-2.6.8-3-mckinley-smp | 2.6.8-14sarge6 | ia64 kernel-headers-2.6.8-3-smp | 2.6.8-16sarge6 | alpha kernel-headers-2.6.8-3-sparc32 | 2.6.8-15sarge6 | sparc kernel-headers-2.6.8-3-sparc64 | 2.6.8-15sarge6 | sparc kernel-headers-2.6.8-3-sparc64-smp | 2.6.8-15sarge6 | sparc kernel-image-2.6.8-3-32 | 2.6.8-6sarge6 | hppa kernel-image-2.6.8-3-32-di | 1.1sarge2 | hppa kernel-image-2.6.8-3-32-smp | 2.6.8-6sarge6 | hppa kernel-image-2.6.8-3-386 | 2.6.8-16sarge6 | i386 kernel-image-2.6.8-3-386-di | 1.02sarge4 | i386 kernel-image-2.6.8-3-64 | 2.6.8-6sarge6 | hppa kernel-image-2.6.8-3-64-di | 1.1sarge2 | hppa kernel-image-2.6.8-3-64-smp | 2.6.8-6sarge6 | hppa kernel-image-2.6.8-3-686 | 2.6.8-16sarge6 | i386 kernel-image-2.6.8-3-686-smp | 2.6.8-16sarge6 | i386 kernel-image-2.6.8-3-generic | 2.6.8-16sarge6 | alpha kernel-image-2.6.8-3-itanium | 2.6.8-14sarge6 | ia64 kernel-image-2.6.8-3-itanium-smp | 2.6.8-14sarge6 | ia64 kernel-image-2.6.8-3-itanium-smp-di | 1.1sarge2 | ia64 kernel-image-2.6.8-3-k7 | 2.6.8-16sarge6 | i386 kernel-image-2.6.8-3-k7-smp | 2.6.8-16sarge6 | i386 kernel-image-2.6.8-3-mckinley | 2.6.8-14sarge6 | ia64 kernel-image-2.6.8-3-mckinley-smp | 2.6.8-14sarge6 | ia64 kernel-image-2.6.8-3-power3 | 2.6.8-12sarge6 | powerpc kernel-image-2.6.8-3-power3-di | 0.78sarge2 | powerpc kernel-image-2.6.8-3-power3-smp | 2.6.8-12sarge6 | powerpc kernel-image-2.6.8-3-power4 | 2.6.8-12sarge6 | powerpc kernel-image-2.6.8-3-power4-di | 0.78sarge2 | powerpc kernel-image-2.6.8-3-power4-smp | 2.6.8-12sarge6 | powerpc kernel-image-2.6.8-3-powerpc | 2.6.8-12sarge6 | powerpc kernel-image-2.6.8-3-powerpc-di | 0.78sarge2 | powerpc kernel-image-2.6.8-3-powerpc-smp | 2.6.8-12sarge6 | powerpc kernel-image-2.6.8-3-s390 | 2.6.8-5sarge6 | s390 kernel-image-2.6.8-3-s390-tape | 2.6.8-5sarge6 | s390 kernel-image-2.6.8-3-s390x | 2.6.8-5sarge6 | s390 kernel-image-2.6.8-3-smp | 2.6.8-16sarge6 | alpha kernel-image-2.6.8-3-sparc32 | 2.6.8-15sarge6 | sparc kernel-image-2.6.8-3-sparc32-di | 0.05sarge2 | sparc kernel-image-2.6.8-3-sparc64 | 2.6.8-15sarge6 | sparc kernel-image-2.6.8-3-sparc64-di | 0.05sarge2 | sparc kernel-image-2.6.8-3-sparc64-smp | 2.6.8-15sarge6 | sparc loop-modules-2.6.8-3-32-di | 1.1sarge2 | hppa loop-modules-2.6.8-3-386-di | 1.02sarge4 | i386 loop-modules-2.6.8-3-64-di | 1.1sarge2 | hppa loop-modules-2.6.8-3-itanium-smp-di | 1.1sarge2 | ia64 loop-modules-2.6.8-3-power3-di | 0.78sarge2 | powerpc loop-modules-2.6.8-3-power4-di | 0.78sarge2 | powerpc loop-modules-2.6.8-3-powerpc-di | 0.78sarge2 | powerpc md-modules-2.6.8-3-32-di | 1.1sarge2 | hppa md-modules-2.6.8-3-386-di | 1.02sarge4 | i386 md-modules-2.6.8-3-64-di | 1.1sarge2 | hppa md-modules-2.6.8-3-itanium-smp-di | 1.1sarge2 | ia64 md-modules-2.6.8-3-power3-di | 0.78sarge2 | powerpc md-modules-2.6.8-3-power4-di | 0.78sarge2 | powerpc md-modules-2.6.8-3-powerpc-di | 0.78sarge2 | powerpc md-modules-2.6.8-3-sparc32-di | 0.05sarge2 | sparc md-modules-2.6.8-3-sparc64-di | 0.05sarge2 | sparc mol-modules-2.6.8-3-powerpc | 1:0.9.70+2.6.8+12sarge1 | powerpc mol-modules-2.6.8-3-powerpc-smp | 1:0.9.70+2.6.8+12sarge1 | powerpc ndiswrapper-modules-2.6.8-3-386 | 1.1-2sarge1 | i386 ndiswrapper-modules-2.6.8-3-686 | 1.1-2sarge1 | i386 ndiswrapper-modules-2.6.8-3-686-smp | 1.1-2sarge1 | i386 ndiswrapper-modules-2.6.8-3-k7 | 1.1-2sarge1 | i386 ndiswrapper-modules-2.6.8-3-k7-smp | 1.1-2sarge1 | i386 nic-extra-modules-2.6.8-3-386-di | 1.02sarge4 | i386 nic-extra-modules-2.6.8-3-power3-di | 0.78sarge2 | powerpc nic-extra-modules-2.6.8-3-power4-di | 0.78sarge2 | powerpc nic-extra-modules-2.6.8-3-powerpc-di | 0.78sarge2 | powerpc nic-modules-2.6.8-3-32-di | 1.1sarge2 | hppa nic-modules-2.6.8-3-386-di | 1.02sarge4 | i386 nic-modules-2.6.8-3-64-di | 1.1sarge2 | hppa nic-modules-2.6.8-3-itanium-smp-di | 1.1sarge2 | ia64 nic-modules-2.6.8-3-power3-di | 0.78sarge2 | powerpc nic-modules-2.6.8-3-power4-di | 0.78sarge2 | powerpc nic-modules-2.6.8-3-powerpc-di | 0.78sarge2 | powerpc nic-modules-2.6.8-3-sparc32-di | 0.05sarge2 | sparc nic-modules-2.6.8-3-sparc64-di | 0.05sarge2 | sparc nic-pcmcia-modules-2.6.8-3-386-di | 1.02sarge4 | i386 nic-pcmcia-modules-2.6.8-3-power3-di | 0.78sarge2 | powerpc nic-pcmcia-modules-2.6.8-3-power4-di | 0.78sarge2 | powerpc nic-pcmcia-modules-2.6.8-3-powerpc-di | 0.78sarge2 | powerpc nic-shared-modules-2.6.8-3-386-di | 1.02sarge4 | i386 nic-shared-modules-2.6.8-3-itanium-smp-di | 1.1sarge2 | ia64 nic-shared-modules-2.6.8-3-power3-di | 0.78sarge2 | powerpc nic-shared-modules-2.6.8-3-power4-di | 0.78sarge2 | powerpc nic-shared-modules-2.6.8-3-powerpc-di | 0.78sarge2 | powerpc nic-usb-modules-2.6.8-3-386-di | 1.02sarge4 | i386 nic-usb-modules-2.6.8-3-itanium-smp-di | 1.1sarge2 | ia64 ntfs-modules-2.6.8-3-386-di | 1.02sarge4 | i386 ntfs-modules-2.6.8-3-itanium-smp-di | 1.1sarge2 | ia64 parport-modules-2.6.8-3-386-di | 1.02sarge4 | i386 parport-modules-2.6.8-3-itanium-smp-di | 1.1sarge2 | ia64 pcmcia-modules-2.6.8-3-386-di | 1.02sarge4 | i386 pcmcia-modules-2.6.8-3-itanium-smp-di | 1.1sarge2 | ia64 pcmcia-modules-2.6.8-3-power3-di | 0.78sarge2 | powerpc pcmcia-modules-2.6.8-3-power4-di | 0.78sarge2 | powerpc pcmcia-modules-2.6.8-3-powerpc-di | 0.78sarge2 | powerpc pcmcia-storage-modules-2.6.8-3-386-di | 1.02sarge4 | i386 pcmcia-storage-modules-2.6.8-3-power3-di | 0.78sarge2 | powerpc pcmcia-storage-modules-2.6.8-3-power4-di | 0.78sarge2 | powerpc pcmcia-storage-modules-2.6.8-3-powerpc-di | 0.78sarge2 | powerpc plip-modules-2.6.8-3-386-di | 1.02sarge4 | i386 plip-modules-2.6.8-3-itanium-smp-di | 1.1sarge2 | ia64 plip-modules-2.6.8-3-sparc32-di | 0.05sarge2 | sparc plip-modules-2.6.8-3-sparc64-di | 0.05sarge2 | sparc ppp-modules-2.6.8-3-32-di | 1.1sarge2 | hppa ppp-modules-2.6.8-3-386-di | 1.02sarge4 | i386 ppp-modules-2.6.8-3-64-di | 1.1sarge2 | hppa ppp-modules-2.6.8-3-itanium-smp-di | 1.1sarge2 | ia64 ppp-modules-2.6.8-3-power3-di | 0.78sarge2 | powerpc ppp-modules-2.6.8-3-power4-di | 0.78sarge2 | powerpc ppp-modules-2.6.8-3-powerpc-di | 0.78sarge2 | powerpc ppp-modules-2.6.8-3-sparc32-di | 0.05sarge2 | sparc ppp-modules-2.6.8-3-sparc64-di | 0.05sarge2 | sparc reiserfs-modules-2.6.8-3-386-di | 1.02sarge4 | i386 reiserfs-modules-2.6.8-3-itanium-smp-di | 1.1sarge2 | ia64 reiserfs-modules-2.6.8-3-power3-di | 0.78sarge2 | powerpc reiserfs-modules-2.6.8-3-power4-di | 0.78sarge2 | powerpc reiserfs-modules-2.6.8-3-powerpc-di | 0.78sarge2 | powerpc reiserfs-modules-2.6.8-3-sparc32-di | 0.05sarge2 | sparc reiserfs-modules-2.6.8-3-sparc64-di | 0.05sarge2 | sparc sata-modules-2.6.8-3-32-di | 1.1sarge2 | hppa sata-modules-2.6.8-3-386-di | 1.02sarge4 | i386 sata-modules-2.6.8-3-64-di | 1.1sarge2 | hppa sata-modules-2.6.8-3-itanium-smp-di | 1.1sarge2 | ia64 sata-modules-2.6.8-3-power3-di | 0.78sarge2 | powerpc sata-modules-2.6.8-3-power4-di | 0.78sarge2 | powerpc sata-modules-2.6.8-3-powerpc-di | 0.78sarge2 | powerpc scsi-common-modules-2.6.8-3-386-di | 1.02sarge4 | i386 scsi-common-modules-2.6.8-3-power3-di | 0.78sarge2 | powerpc scsi-common-modules-2.6.8-3-power4-di | 0.78sarge2 | powerpc scsi-common-modules-2.6.8-3-powerpc-di | 0.78sarge2 | powerpc scsi-common-modules-2.6.8-3-sparc32-di | 0.05sarge2 | sparc scsi-common-modules-2.6.8-3-sparc64-di | 0.05sarge2 | sparc scsi-core-modules-2.6.8-3-386-di | 1.02sarge4 | i386 scsi-core-modules-2.6.8-3-itanium-smp-di | 1.1sarge2 | ia64 scsi-core-modules-2.6.8-3-power3-di | 0.78sarge2 | powerpc scsi-core-modules-2.6.8-3-power4-di | 0.78sarge2 | powerpc scsi-core-modules-2.6.8-3-powerpc-di | 0.78sarge2 | powerpc scsi-core-modules-2.6.8-3-sparc32-di | 0.05sarge2 | sparc scsi-core-modules-2.6.8-3-sparc64-di | 0.05sarge2 | sparc scsi-extra-modules-2.6.8-3-386-di | 1.02sarge4 | i386 scsi-extra-modules-2.6.8-3-power3-di | 0.78sarge2 | powerpc scsi-extra-modules-2.6.8-3-power4-di | 0.78sarge2 | powerpc scsi-extra-modules-2.6.8-3-powerpc-di | 0.78sarge2 | powerpc scsi-modules-2.6.8-3-32-di | 1.1sarge2 | hppa scsi-modules-2.6.8-3-386-di | 1.02sarge4 | i386 scsi-modules-2.6.8-3-64-di | 1.1sarge2 | hppa scsi-modules-2.6.8-3-itanium-smp-di | 1.1sarge2 | ia64 scsi-modules-2.6.8-3-power3-di | 0.78sarge2 | powerpc scsi-modules-2.6.8-3-power4-di | 0.78sarge2 | powerpc scsi-modules-2.6.8-3-powerpc-di | 0.78sarge2 | powerpc serial-modules-2.6.8-3-386-di | 1.02sarge4 | i386 serial-modules-2.6.8-3-itanium-smp-di | 1.1sarge2 | ia64 serial-modules-2.6.8-3-power3-di | 0.78sarge2 | powerpc serial-modules-2.6.8-3-power4-di | 0.78sarge2 | powerpc serial-modules-2.6.8-3-powerpc-di | 0.78sarge2 | powerpc socket-modules-2.6.8-3-32-di | 1.1sarge2 | hppa socket-modules-2.6.8-3-386-di | 1.02sarge4 | i386 socket-modules-2.6.8-3-64-di | 1.1sarge2 | hppa socket-modules-2.6.8-3-power3-di | 0.78sarge2 | powerpc socket-modules-2.6.8-3-power4-di | 0.78sarge2 | powerpc socket-modules-2.6.8-3-powerpc-di | 0.78sarge2 | powerpc ufs-modules-2.6.8-3-386-di | 1.02sarge4 | i386 ufs-modules-2.6.8-3-itanium-smp-di | 1.1sarge2 | ia64 ufs-modules-2.6.8-3-power3-di | 0.78sarge2 | powerpc ufs-modules-2.6.8-3-power4-di | 0.78sarge2 | powerpc ufs-modules-2.6.8-3-powerpc-di | 0.78sarge2 | powerpc usb-modules-2.6.8-3-32-di | 1.1sarge2 | hppa usb-modules-2.6.8-3-386-di | 1.02sarge4 | i386 usb-modules-2.6.8-3-64-di | 1.1sarge2 | hppa usb-modules-2.6.8-3-itanium-smp-di | 1.1sarge2 | ia64 usb-modules-2.6.8-3-power3-di | 0.78sarge2 | powerpc usb-modules-2.6.8-3-power4-di | 0.78sarge2 | powerpc usb-modules-2.6.8-3-powerpc-di | 0.78sarge2 | powerpc usb-modules-2.6.8-3-sparc64-di | 0.05sarge2 | sparc usb-storage-modules-2.6.8-3-32-di | 1.1sarge2 | hppa usb-storage-modules-2.6.8-3-386-di | 1.02sarge4 | i386 usb-storage-modules-2.6.8-3-64-di | 1.1sarge2 | hppa usb-storage-modules-2.6.8-3-itanium-smp-di | 1.1sarge2 | ia64 usb-storage-modules-2.6.8-3-power3-di | 0.78sarge2 | powerpc usb-storage-modules-2.6.8-3-power4-di | 0.78sarge2 | powerpc usb-storage-modules-2.6.8-3-powerpc-di | 0.78sarge2 | powerpc xfs-modules-2.6.8-3-32-di | 1.1sarge2 | hppa xfs-modules-2.6.8-3-386-di | 1.02sarge4 | i386 xfs-modules-2.6.8-3-64-di | 1.1sarge2 | hppa xfs-modules-2.6.8-3-itanium-smp-di | 1.1sarge2 | ia64 xfs-modules-2.6.8-3-power3-di | 0.78sarge2 | powerpc xfs-modules-2.6.8-3-power4-di | 0.78sarge2 | powerpc xfs-modules-2.6.8-3-powerpc-di | 0.78sarge2 | powerpc xfs-modules-2.6.8-3-sparc32-di | 0.05sarge2 | sparc xfs-modules-2.6.8-3-sparc64-di | 0.05sarge2 | sparc ------------------- Reason ------------------- [auto-cruft] NBS ---------------------------------------------- ========================================= Sat, 7 Apr 2007 - Debian 3.1r6 released ========================================= stable/main/binary-sparc/zope2.7_2.7.5-2sarge4_sparc.deb zope2.7 (2.7.5-2sarge4) stable-security; urgency=high * SECURITY UPDATE: Prevent privileges elevation through misuse of HTTP GET. Refs: http://www.zope.org/Products/Zope/Hotfix-2007-03-20/announcement/view CVE-2007-0240 (Closes: #416500) stable/main/binary-s390/zope2.7_2.7.5-2sarge4_s390.deb zope2.7 (2.7.5-2sarge4) stable-security; urgency=high * SECURITY UPDATE: Prevent privileges elevation through misuse of HTTP GET. Refs: http://www.zope.org/Products/Zope/Hotfix-2007-03-20/announcement/view CVE-2007-0240 (Closes: #416500) stable/main/binary-powerpc/zope2.7_2.7.5-2sarge4_powerpc.deb zope2.7 (2.7.5-2sarge4) stable-security; urgency=high * SECURITY UPDATE: Prevent privileges elevation through misuse of HTTP GET. Refs: http://www.zope.org/Products/Zope/Hotfix-2007-03-20/announcement/view CVE-2007-0240 (Closes: #416500) stable/main/binary-mipsel/zope2.7_2.7.5-2sarge4_mipsel.deb zope2.7 (2.7.5-2sarge4) stable-security; urgency=high * SECURITY UPDATE: Prevent privileges elevation through misuse of HTTP GET. Refs: http://www.zope.org/Products/Zope/Hotfix-2007-03-20/announcement/view CVE-2007-0240 (Closes: #416500) stable/main/binary-mips/zope2.7_2.7.5-2sarge4_mips.deb zope2.7 (2.7.5-2sarge4) stable-security; urgency=high * SECURITY UPDATE: Prevent privileges elevation through misuse of HTTP GET. Refs: http://www.zope.org/Products/Zope/Hotfix-2007-03-20/announcement/view CVE-2007-0240 (Closes: #416500) stable/main/binary-m68k/zope2.7_2.7.5-2sarge4_m68k.deb zope2.7 (2.7.5-2sarge4) stable-security; urgency=high * SECURITY UPDATE: Prevent privileges elevation through misuse of HTTP GET. Refs: http://www.zope.org/Products/Zope/Hotfix-2007-03-20/announcement/view CVE-2007-0240 (Closes: #416500) stable/main/binary-ia64/zope2.7_2.7.5-2sarge4_ia64.deb zope2.7 (2.7.5-2sarge4) stable-security; urgency=high * SECURITY UPDATE: Prevent privileges elevation through misuse of HTTP GET. Refs: http://www.zope.org/Products/Zope/Hotfix-2007-03-20/announcement/view CVE-2007-0240 (Closes: #416500) stable/main/binary-hppa/zope2.7_2.7.5-2sarge4_hppa.deb zope2.7 (2.7.5-2sarge4) stable-security; urgency=high * SECURITY UPDATE: Prevent privileges elevation through misuse of HTTP GET. Refs: http://www.zope.org/Products/Zope/Hotfix-2007-03-20/announcement/view CVE-2007-0240 (Closes: #416500) stable/main/binary-arm/zope2.7_2.7.5-2sarge4_arm.deb zope2.7 (2.7.5-2sarge4) stable-security; urgency=high * SECURITY UPDATE: Prevent privileges elevation through misuse of HTTP GET. Refs: http://www.zope.org/Products/Zope/Hotfix-2007-03-20/announcement/view CVE-2007-0240 (Closes: #416500) stable/main/binary-alpha/zope2.7_2.7.5-2sarge4_alpha.deb zope2.7 (2.7.5-2sarge4) stable-security; urgency=high * SECURITY UPDATE: Prevent privileges elevation through misuse of HTTP GET. Refs: http://www.zope.org/Products/Zope/Hotfix-2007-03-20/announcement/view CVE-2007-0240 (Closes: #416500) stable/main/source/zope2.7_2.7.5-2sarge4.diff.gz stable/main/source/zope2.7_2.7.5-2sarge4.dsc stable/main/binary-i386/zope2.7_2.7.5-2sarge4_i386.deb zope2.7 (2.7.5-2sarge4) stable-security; urgency=high * SECURITY UPDATE: Prevent privileges elevation through misuse of HTTP GET. Refs: http://www.zope.org/Products/Zope/Hotfix-2007-03-20/announcement/view CVE-2007-0240 (Closes: #416500) stable/main/binary-sparc/xmms-dev_1.2.10+cvs20050209-2sarge1_sparc.deb stable/main/binary-sparc/xmms_1.2.10+cvs20050209-2sarge1_sparc.deb xmms (1.2.10+cvs20050209-2sarge1) stable-security; urgency=high * Backported patch from Kees Cook <kees@ubuntu.com> to address integer underflow CVE-2007-0654 and overflow CVE-2007-0653 in BMP loader xmms/bmp.c (see #416423). stable/main/binary-s390/xmms_1.2.10+cvs20050209-2sarge1_s390.deb stable/main/binary-s390/xmms-dev_1.2.10+cvs20050209-2sarge1_s390.deb xmms (1.2.10+cvs20050209-2sarge1) stable-security; urgency=high * Backported patch from Kees Cook <kees@ubuntu.com> to address integer underflow CVE-2007-0654 and overflow CVE-2007-0653 in BMP loader xmms/bmp.c (see #416423). stable/main/binary-powerpc/xmms-dev_1.2.10+cvs20050209-2sarge1_powerpc.deb stable/main/binary-powerpc/xmms_1.2.10+cvs20050209-2sarge1_powerpc.deb xmms (1.2.10+cvs20050209-2sarge1) stable-security; urgency=high * Backported patch from Kees Cook <kees@ubuntu.com> to address integer underflow CVE-2007-0654 and overflow CVE-2007-0653 in BMP loader xmms/bmp.c (see #416423). stable/main/binary-mipsel/xmms_1.2.10+cvs20050209-2sarge1_mipsel.deb stable/main/binary-mipsel/xmms-dev_1.2.10+cvs20050209-2sarge1_mipsel.deb xmms (1.2.10+cvs20050209-2sarge1) stable-security; urgency=high * Backported patch from Kees Cook <kees@ubuntu.com> to address integer underflow CVE-2007-0654 and overflow CVE-2007-0653 in BMP loader xmms/bmp.c (see #416423). stable/main/binary-mips/xmms_1.2.10+cvs20050209-2sarge1_mips.deb stable/main/binary-mips/xmms-dev_1.2.10+cvs20050209-2sarge1_mips.deb xmms (1.2.10+cvs20050209-2sarge1) stable-security; urgency=high * Backported patch from Kees Cook <kees@ubuntu.com> to address integer underflow CVE-2007-0654 and overflow CVE-2007-0653 in BMP loader xmms/bmp.c (see #416423). stable/main/binary-m68k/xmms_1.2.10+cvs20050209-2sarge1_m68k.deb stable/main/binary-m68k/xmms-dev_1.2.10+cvs20050209-2sarge1_m68k.deb xmms (1.2.10+cvs20050209-2sarge1) stable-security; urgency=high * Backported patch from Kees Cook <kees@ubuntu.com> to address integer underflow CVE-2007-0654 and overflow CVE-2007-0653 in BMP loader xmms/bmp.c (see #416423). stable/main/binary-ia64/xmms_1.2.10+cvs20050209-2sarge1_ia64.deb stable/main/binary-ia64/xmms-dev_1.2.10+cvs20050209-2sarge1_ia64.deb xmms (1.2.10+cvs20050209-2sarge1) stable-security; urgency=high * Backported patch from Kees Cook <kees@ubuntu.com> to address integer underflow CVE-2007-0654 and overflow CVE-2007-0653 in BMP loader xmms/bmp.c (see #416423). stable/main/binary-hppa/xmms_1.2.10+cvs20050209-2sarge1_hppa.deb stable/main/binary-hppa/xmms-dev_1.2.10+cvs20050209-2sarge1_hppa.deb xmms (1.2.10+cvs20050209-2sarge1) stable-security; urgency=high * Backported patch from Kees Cook <kees@ubuntu.com> to address integer underflow CVE-2007-0654 and overflow CVE-2007-0653 in BMP loader xmms/bmp.c (see #416423). stable/main/binary-arm/xmms_1.2.10+cvs20050209-2sarge1_arm.deb stable/main/binary-arm/xmms-dev_1.2.10+cvs20050209-2sarge1_arm.deb xmms (1.2.10+cvs20050209-2sarge1) stable-security; urgency=high * Backported patch from Kees Cook <kees@ubuntu.com> to address integer underflow CVE-2007-0654 and overflow CVE-2007-0653 in BMP loader xmms/bmp.c (see #416423). stable/main/binary-alpha/xmms_1.2.10+cvs20050209-2sarge1_alpha.deb stable/main/binary-alpha/xmms-dev_1.2.10+cvs20050209-2sarge1_alpha.deb xmms (1.2.10+cvs20050209-2sarge1) stable-security; urgency=high * Backported patch from Kees Cook <kees@ubuntu.com> to address integer underflow CVE-2007-0654 and overflow CVE-2007-0653 in BMP loader xmms/bmp.c (see #416423). stable/main/source/xmms_1.2.10+cvs20050209-2sarge1.diff.gz stable/main/binary-i386/xmms-dev_1.2.10+cvs20050209-2sarge1_i386.deb stable/main/source/xmms_1.2.10+cvs20050209-2sarge1.dsc stable/main/binary-i386/xmms_1.2.10+cvs20050209-2sarge1_i386.deb xmms (1.2.10+cvs20050209-2sarge1) stable-security; urgency=high * Backported patch from Kees Cook <kees@ubuntu.com> to address integer underflow CVE-2007-0654 and overflow CVE-2007-0653 in BMP loader xmms/bmp.c (see #416423). stable/main/source/webcalendar_0.9.45-4sarge6.dsc stable/main/binary-all/webcalendar_0.9.45-4sarge6_all.deb stable/main/source/webcalendar_0.9.45-4sarge6.diff.gz webcalendar (0.9.45-4sarge6) stable-security; urgency=high * Non-maintainer upload by the Security Team * Protect noSet variable against external modification [CVE-2007-1343] stable/main/binary-sparc/tcpdump_3.8.3-5sarge2_sparc.deb tcpdump (3.8.3-5sarge2) stable-security; urgency=high * debian/patches/60_CVE-2007-1218.dpatch: New patch, fixes a potential buffer overflow in the 802.11 printer. References: + CVE-2007-1218 + http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=413430 * debian/patches/00list: Update. stable/main/binary-s390/tcpdump_3.8.3-5sarge2_s390.deb tcpdump (3.8.3-5sarge2) stable-security; urgency=high * debian/patches/60_CVE-2007-1218.dpatch: New patch, fixes a potential buffer overflow in the 802.11 printer. References: + CVE-2007-1218 + http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=413430 * debian/patches/00list: Update. stable/main/binary-powerpc/tcpdump_3.8.3-5sarge2_powerpc.deb tcpdump (3.8.3-5sarge2) stable-security; urgency=high * debian/patches/60_CVE-2007-1218.dpatch: New patch, fixes a potential buffer overflow in the 802.11 printer. References: + CVE-2007-1218 + http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=413430 * debian/patches/00list: Update. stable/main/binary-mipsel/tcpdump_3.8.3-5sarge2_mipsel.deb tcpdump (3.8.3-5sarge2) stable-security; urgency=high * debian/patches/60_CVE-2007-1218.dpatch: New patch, fixes a potential buffer overflow in the 802.11 printer. References: + CVE-2007-1218 + http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=413430 * debian/patches/00list: Update. stable/main/binary-mips/tcpdump_3.8.3-5sarge2_mips.deb tcpdump (3.8.3-5sarge2) stable-security; urgency=high * debian/patches/60_CVE-2007-1218.dpatch: New patch, fixes a potential buffer overflow in the 802.11 printer. References: + CVE-2007-1218 + http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=413430 * debian/patches/00list: Update. stable/main/binary-m68k/tcpdump_3.8.3-5sarge2_m68k.deb tcpdump (3.8.3-5sarge2) stable-security; urgency=high * debian/patches/60_CVE-2007-1218.dpatch: New patch, fixes a potential buffer overflow in the 802.11 printer. References: + CVE-2007-1218 + http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=413430 * debian/patches/00list: Update. stable/main/binary-ia64/tcpdump_3.8.3-5sarge2_ia64.deb tcpdump (3.8.3-5sarge2) stable-security; urgency=high * debian/patches/60_CVE-2007-1218.dpatch: New patch, fixes a potential buffer overflow in the 802.11 printer. References: + CVE-2007-1218 + http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=413430 * debian/patches/00list: Update. stable/main/binary-hppa/tcpdump_3.8.3-5sarge2_hppa.deb tcpdump (3.8.3-5sarge2) stable-security; urgency=high * debian/patches/60_CVE-2007-1218.dpatch: New patch, fixes a potential buffer overflow in the 802.11 printer. References: + CVE-2007-1218 + http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=413430 * debian/patches/00list: Update. stable/main/binary-arm/tcpdump_3.8.3-5sarge2_arm.deb tcpdump (3.8.3-5sarge2) stable-security; urgency=high * debian/patches/60_CVE-2007-1218.dpatch: New patch, fixes a potential buffer overflow in the 802.11 printer. References: + CVE-2007-1218 + http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=413430 * debian/patches/00list: Update. stable/main/binary-alpha/tcpdump_3.8.3-5sarge2_alpha.deb tcpdump (3.8.3-5sarge2) stable-security; urgency=high * debian/patches/60_CVE-2007-1218.dpatch: New patch, fixes a potential buffer overflow in the 802.11 printer. References: + CVE-2007-1218 + http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=413430 * debian/patches/00list: Update. stable/main/binary-i386/tcpdump_3.8.3-5sarge2_i386.deb stable/main/source/tcpdump_3.8.3-5sarge2.dsc stable/main/source/tcpdump_3.8.3-5sarge2.diff.gz tcpdump (3.8.3-5sarge2) stable-security; urgency=high * debian/patches/60_CVE-2007-1218.dpatch: New patch, fixes a potential buffer overflow in the 802.11 printer. References: + CVE-2007-1218 + http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=413430 * debian/patches/00list: Update. stable/main/binary-sparc/php4-gd_4.3.10-19_sparc.deb stable/main/binary-sparc/php4-cgi_4.3.10-19_sparc.deb stable/main/binary-sparc/php4-dev_4.3.10-19_sparc.deb stable/main/binary-sparc/libapache-mod-php4_4.3.10-19_sparc.deb stable/main/binary-sparc/php4-domxml_4.3.10-19_sparc.deb stable/main/binary-sparc/php4-imap_4.3.10-19_sparc.deb stable/main/binary-sparc/php4-common_4.3.10-19_sparc.deb stable/main/binary-sparc/php4-ldap_4.3.10-19_sparc.deb stable/main/binary-sparc/php4-mcal_4.3.10-19_sparc.deb stable/main/binary-sparc/php4-snmp_4.3.10-19_sparc.deb stable/main/binary-sparc/php4-cli_4.3.10-19_sparc.deb stable/main/binary-sparc/php4-xslt_4.3.10-19_sparc.deb stable/main/binary-sparc/php4-odbc_4.3.10-19_sparc.deb stable/main/binary-sparc/php4-recode_4.3.10-19_sparc.deb stable/main/binary-sparc/php4-sybase_4.3.10-19_sparc.deb stable/main/binary-sparc/libapache2-mod-php4_4.3.10-19_sparc.deb stable/main/binary-sparc/php4-mhash_4.3.10-19_sparc.deb stable/main/binary-sparc/php4-mysql_4.3.10-19_sparc.deb stable/main/binary-sparc/php4-curl_4.3.10-19_sparc.deb php4 (4:4.3.10-19) stable-security; urgency=high * NMU prepared for the security team by the package maintainer * The following security issues are addressed with this update: - CVE-2007-0906: Multiple buffer overflows in various code: * session (addressed in patch for CVE-2007-0910 below) * imap (CVE-2007-0906-imap.patch) * str_replace: (CVE-2007-0906-strreplace.patch) * the zip, sqlite, stream filters, mail, and interbase related vulnerabilities in this CVE do not affect the debian sarge php4 source package. - CVE-2007-0907: Buffer underflow in sapi_header_op (CVE-2007-0907.patch) - CVE-2007-0908: wddx module information disclosure (CVE-2007-0908.patch) - CVE-2007-0909: More buffer overflows: * the odbc_result_all function (CVE-2007-0909-odbc.patch) * various formatted print functions (CVE-2007-0909-printf.patch) - CVE-2007-0910: Clobbering of super-global variables (CVE-2007-0910.patch) - CVE-2007-0988: DoS in unserialize on 64bit platforms (CVE-2007-0988.patch) * The package maintainers would like to thank Joe Orton from redhat and Martin Pitt from ubuntu for their help in the preparation of this update. stable/main/binary-s390/php4-cli_4.3.10-19_s390.deb stable/main/binary-s390/php4-mysql_4.3.10-19_s390.deb stable/main/binary-s390/php4-imap_4.3.10-19_s390.deb stable/main/binary-s390/php4-common_4.3.10-19_s390.deb stable/main/binary-s390/php4-sybase_4.3.10-19_s390.deb stable/main/binary-s390/php4-ldap_4.3.10-19_s390.deb stable/main/binary-s390/php4-cgi_4.3.10-19_s390.deb stable/main/binary-s390/php4-recode_4.3.10-19_s390.deb stable/main/binary-s390/php4-snmp_4.3.10-19_s390.deb stable/main/binary-s390/libapache-mod-php4_4.3.10-19_s390.deb stable/main/binary-s390/php4-xslt_4.3.10-19_s390.deb stable/main/binary-s390/libapache2-mod-php4_4.3.10-19_s390.deb stable/main/binary-s390/php4-curl_4.3.10-19_s390.deb stable/main/binary-s390/php4-gd_4.3.10-19_s390.deb stable/main/binary-s390/php4-odbc_4.3.10-19_s390.deb stable/main/binary-s390/php4-mhash_4.3.10-19_s390.deb stable/main/binary-s390/php4-domxml_4.3.10-19_s390.deb stable/main/binary-s390/php4-dev_4.3.10-19_s390.deb stable/main/binary-s390/php4-mcal_4.3.10-19_s390.deb php4 (4:4.3.10-19) stable-security; urgency=high * NMU prepared for the security team by the package maintainer * The following security issues are addressed with this update: - CVE-2007-0906: Multiple buffer overflows in various code: * session (addressed in patch for CVE-2007-0910 below) * imap (CVE-2007-0906-imap.patch) * str_replace: (CVE-2007-0906-strreplace.patch) * the zip, sqlite, stream filters, mail, and interbase related vulnerabilities in this CVE do not affect the debian sarge php4 source package. - CVE-2007-0907: Buffer underflow in sapi_header_op (CVE-2007-0907.patch) - CVE-2007-0908: wddx module information disclosure (CVE-2007-0908.patch) - CVE-2007-0909: More buffer overflows: * the odbc_result_all function (CVE-2007-0909-odbc.patch) * various formatted print functions (CVE-2007-0909-printf.patch) - CVE-2007-0910: Clobbering of super-global variables (CVE-2007-0910.patch) - CVE-2007-0988: DoS in unserialize on 64bit platforms (CVE-2007-0988.patch) * The package maintainers would like to thank Joe Orton from redhat and Martin Pitt from ubuntu for their help in the preparation of this update. stable/main/binary-powerpc/php4-mhash_4.3.10-19_powerpc.deb stable/main/binary-powerpc/php4-cli_4.3.10-19_powerpc.deb stable/main/binary-powerpc/php4-gd_4.3.10-19_powerpc.deb stable/main/binary-powerpc/php4-odbc_4.3.10-19_powerpc.deb stable/main/binary-powerpc/libapache2-mod-php4_4.3.10-19_powerpc.deb stable/main/binary-powerpc/php4-curl_4.3.10-19_powerpc.deb stable/main/binary-powerpc/php4-xslt_4.3.10-19_powerpc.deb stable/main/binary-powerpc/php4-dev_4.3.10-19_powerpc.deb stable/main/binary-powerpc/php4-mcal_4.3.10-19_powerpc.deb stable/main/binary-powerpc/php4-ldap_4.3.10-19_powerpc.deb stable/main/binary-powerpc/libapache-mod-php4_4.3.10-19_powerpc.deb stable/main/binary-powerpc/php4-domxml_4.3.10-19_powerpc.deb stable/main/binary-powerpc/php4-cgi_4.3.10-19_powerpc.deb stable/main/binary-powerpc/php4-snmp_4.3.10-19_powerpc.deb stable/main/binary-powerpc/php4-mysql_4.3.10-19_powerpc.deb stable/main/binary-powerpc/php4-imap_4.3.10-19_powerpc.deb stable/main/binary-powerpc/php4-recode_4.3.10-19_powerpc.deb stable/main/binary-powerpc/php4-sybase_4.3.10-19_powerpc.deb stable/main/binary-powerpc/php4-common_4.3.10-19_powerpc.deb php4 (4:4.3.10-19) stable-security; urgency=high * NMU prepared for the security team by the package maintainer * The following security issues are addressed with this update: - CVE-2007-0906: Multiple buffer overflows in various code: * session (addressed in patch for CVE-2007-0910 below) * imap (CVE-2007-0906-imap.patch) * str_replace: (CVE-2007-0906-strreplace.patch) * the zip, sqlite, stream filters, mail, and interbase related vulnerabilities in this CVE do not affect the debian sarge php4 source package. - CVE-2007-0907: Buffer underflow in sapi_header_op (CVE-2007-0907.patch) - CVE-2007-0908: wddx module information disclosure (CVE-2007-0908.patch) - CVE-2007-0909: More buffer overflows: * the odbc_result_all function (CVE-2007-0909-odbc.patch) * various formatted print functions (CVE-2007-0909-printf.patch) - CVE-2007-0910: Clobbering of super-global variables (CVE-2007-0910.patch) - CVE-2007-0988: DoS in unserialize on 64bit platforms (CVE-2007-0988.patch) * The package maintainers would like to thank Joe Orton from redhat and Martin Pitt from ubuntu for their help in the preparation of this update. stable/main/binary-mipsel/php4-common_4.3.10-19_mipsel.deb stable/main/binary-mipsel/libapache-mod-php4_4.3.10-19_mipsel.deb stable/main/binary-mipsel/php4-recode_4.3.10-19_mipsel.deb stable/main/binary-mipsel/php4-snmp_4.3.10-19_mipsel.deb stable/main/binary-mipsel/php4-mysql_4.3.10-19_mipsel.deb stable/main/binary-mipsel/php4-dev_4.3.10-19_mipsel.deb stable/main/binary-mipsel/php4-mhash_4.3.10-19_mipsel.deb stable/main/binary-mipsel/php4-sybase_4.3.10-19_mipsel.deb stable/main/binary-mipsel/php4-mcal_4.3.10-19_mipsel.deb stable/main/binary-mipsel/php4-cli_4.3.10-19_mipsel.deb stable/main/binary-mipsel/php4-curl_4.3.10-19_mipsel.deb stable/main/binary-mipsel/php4-domxml_4.3.10-19_mipsel.deb stable/main/binary-mipsel/libapache2-mod-php4_4.3.10-19_mipsel.deb stable/main/binary-mipsel/php4-ldap_4.3.10-19_mipsel.deb stable/main/binary-mipsel/php4-gd_4.3.10-19_mipsel.deb stable/main/binary-mipsel/php4-xslt_4.3.10-19_mipsel.deb stable/main/binary-mipsel/php4-odbc_4.3.10-19_mipsel.deb stable/main/binary-mipsel/php4-imap_4.3.10-19_mipsel.deb stable/main/binary-mipsel/php4-cgi_4.3.10-19_mipsel.deb php4 (4:4.3.10-19) stable-security; urgency=high * NMU prepared for the security team by the package maintainer * The following security issues are addressed with this update: - CVE-2007-0906: Multiple buffer overflows in various code: * session (addressed in patch for CVE-2007-0910 below) * imap (CVE-2007-0906-imap.patch) * str_replace: (CVE-2007-0906-strreplace.patch) * the zip, sqlite, stream filters, mail, and interbase related vulnerabilities in this CVE do not affect the debian sarge php4 source package. - CVE-2007-0907: Buffer underflow in sapi_header_op (CVE-2007-0907.patch) - CVE-2007-0908: wddx module information disclosure (CVE-2007-0908.patch) - CVE-2007-0909: More buffer overflows: * the odbc_result_all function (CVE-2007-0909-odbc.patch) * various formatted print functions (CVE-2007-0909-printf.patch) - CVE-2007-0910: Clobbering of super-global variables (CVE-2007-0910.patch) - CVE-2007-0988: DoS in unserialize on 64bit platforms (CVE-2007-0988.patch) * The package maintainers would like to thank Joe Orton from redhat and Martin Pitt from ubuntu for their help in the preparation of this update. stable/main/binary-mips/libapache-mod-php4_4.3.10-19_mips.deb stable/main/binary-mips/php4-dev_4.3.10-19_mips.deb stable/main/binary-mips/php4-snmp_4.3.10-19_mips.deb stable/main/binary-mips/php4-mhash_4.3.10-19_mips.deb stable/main/binary-mips/php4-imap_4.3.10-19_mips.deb stable/main/binary-mips/php4-ldap_4.3.10-19_mips.deb stable/main/binary-mips/php4-sybase_4.3.10-19_mips.deb stable/main/binary-mips/php4-common_4.3.10-19_mips.deb stable/main/binary-mips/php4-mysql_4.3.10-19_mips.deb stable/main/binary-mips/libapache2-mod-php4_4.3.10-19_mips.deb stable/main/binary-mips/php4-cgi_4.3.10-19_mips.deb stable/main/binary-mips/php4-curl_4.3.10-19_mips.deb stable/main/binary-mips/php4-domxml_4.3.10-19_mips.deb stable/main/binary-mips/php4-cli_4.3.10-19_mips.deb stable/main/binary-mips/php4-recode_4.3.10-19_mips.deb stable/main/binary-mips/php4-odbc_4.3.10-19_mips.deb stable/main/binary-mips/php4-xslt_4.3.10-19_mips.deb stable/main/binary-mips/php4-mcal_4.3.10-19_mips.deb stable/main/binary-mips/php4-gd_4.3.10-19_mips.deb php4 (4:4.3.10-19) stable-security; urgency=high * NMU prepared for the security team by the package maintainer * The following security issues are addressed with this update: - CVE-2007-0906: Multiple buffer overflows in various code: * session (addressed in patch for CVE-2007-0910 below) * imap (CVE-2007-0906-imap.patch) * str_replace: (CVE-2007-0906-strreplace.patch) * the zip, sqlite, stream filters, mail, and interbase related vulnerabilities in this CVE do not affect the debian sarge php4 source package. - CVE-2007-0907: Buffer underflow in sapi_header_op (CVE-2007-0907.patch) - CVE-2007-0908: wddx module information disclosure (CVE-2007-0908.patch) - CVE-2007-0909: More buffer overflows: * the odbc_result_all function (CVE-2007-0909-odbc.patch) * various formatted print functions (CVE-2007-0909-printf.patch) - CVE-2007-0910: Clobbering of super-global variables (CVE-2007-0910.patch) - CVE-2007-0988: DoS in unserialize on 64bit platforms (CVE-2007-0988.patch) * The package maintainers would like to thank Joe Orton from redhat and Martin Pitt from ubuntu for their help in the preparation of this update. stable/main/binary-m68k/php4-mcal_4.3.10-19_m68k.deb stable/main/binary-m68k/php4-odbc_4.3.10-19_m68k.deb stable/main/binary-m68k/php4-recode_4.3.10-19_m68k.deb stable/main/binary-m68k/php4-cgi_4.3.10-19_m68k.deb stable/main/binary-m68k/php4-cli_4.3.10-19_m68k.deb stable/main/binary-m68k/php4-xslt_4.3.10-19_m68k.deb stable/main/binary-m68k/php4-mysql_4.3.10-19_m68k.deb stable/main/binary-m68k/php4-gd_4.3.10-19_m68k.deb stable/main/binary-m68k/php4-sybase_4.3.10-19_m68k.deb stable/main/binary-m68k/php4-mhash_4.3.10-19_m68k.deb stable/main/binary-m68k/php4-snmp_4.3.10-19_m68k.deb stable/main/binary-m68k/php4-imap_4.3.10-19_m68k.deb stable/main/binary-m68k/php4-dev_4.3.10-19_m68k.deb stable/main/binary-m68k/libapache-mod-php4_4.3.10-19_m68k.deb stable/main/binary-m68k/php4-domxml_4.3.10-19_m68k.deb stable/main/binary-m68k/php4-common_4.3.10-19_m68k.deb stable/main/binary-m68k/libapache2-mod-php4_4.3.10-19_m68k.deb stable/main/binary-m68k/php4-ldap_4.3.10-19_m68k.deb stable/main/binary-m68k/php4-curl_4.3.10-19_m68k.deb php4 (4:4.3.10-19) stable-security; urgency=high * NMU prepared for the security team by the package maintainer * The following security issues are addressed with this update: - CVE-2007-0906: Multiple buffer overflows in various code: * session (addressed in patch for CVE-2007-0910 below) * imap (CVE-2007-0906-imap.patch) * str_replace: (CVE-2007-0906-strreplace.patch) * the zip, sqlite, stream filters, mail, and interbase related vulnerabilities in this CVE do not affect the debian sarge php4 source package. - CVE-2007-0907: Buffer underflow in sapi_header_op (CVE-2007-0907.patch) - CVE-2007-0908: wddx module information disclosure (CVE-2007-0908.patch) - CVE-2007-0909: More buffer overflows: * the odbc_result_all function (CVE-2007-0909-odbc.patch) * various formatted print functions (CVE-2007-0909-printf.patch) - CVE-2007-0910: Clobbering of super-global variables (CVE-2007-0910.patch) - CVE-2007-0988: DoS in unserialize on 64bit platforms (CVE-2007-0988.patch) * The package maintainers would like to thank Joe Orton from redhat and Martin Pitt from ubuntu for their help in the preparation of this update. stable/main/binary-ia64/php4-cli_4.3.10-19_ia64.deb stable/main/binary-ia64/php4-dev_4.3.10-19_ia64.deb stable/main/binary-ia64/php4-mhash_4.3.10-19_ia64.deb stable/main/binary-ia64/php4-imap_4.3.10-19_ia64.deb stable/main/binary-ia64/php4-curl_4.3.10-19_ia64.deb stable/main/binary-ia64/php4-mcal_4.3.10-19_ia64.deb stable/main/binary-ia64/libapache-mod-php4_4.3.10-19_ia64.deb stable/main/binary-ia64/php4-common_4.3.10-19_ia64.deb stable/main/binary-ia64/php4-cgi_4.3.10-19_ia64.deb stable/main/binary-ia64/php4-sybase_4.3.10-19_ia64.deb stable/main/binary-ia64/libapache2-mod-php4_4.3.10-19_ia64.deb stable/main/binary-ia64/php4-recode_4.3.10-19_ia64.deb stable/main/binary-ia64/php4-ldap_4.3.10-19_ia64.deb stable/main/binary-ia64/php4-snmp_4.3.10-19_ia64.deb stable/main/binary-ia64/php4-gd_4.3.10-19_ia64.deb stable/main/binary-ia64/php4-xslt_4.3.10-19_ia64.deb stable/main/binary-ia64/php4-domxml_4.3.10-19_ia64.deb stable/main/binary-ia64/php4-odbc_4.3.10-19_ia64.deb stable/main/binary-ia64/php4-mysql_4.3.10-19_ia64.deb php4 (4:4.3.10-19) stable-security; urgency=high * NMU prepared for the security team by the package maintainer * The following security issues are addressed with this update: - CVE-2007-0906: Multiple buffer overflows in various code: * session (addressed in patch for CVE-2007-0910 below) * imap (CVE-2007-0906-imap.patch) * str_replace: (CVE-2007-0906-strreplace.patch) * the zip, sqlite, stream filters, mail, and interbase related vulnerabilities in this CVE do not affect the debian sarge php4 source package. - CVE-2007-0907: Buffer underflow in sapi_header_op (CVE-2007-0907.patch) - CVE-2007-0908: wddx module information disclosure (CVE-2007-0908.patch) - CVE-2007-0909: More buffer overflows: * the odbc_result_all function (CVE-2007-0909-odbc.patch) * various formatted print functions (CVE-2007-0909-printf.patch) - CVE-2007-0910: Clobbering of super-global variables (CVE-2007-0910.patch) - CVE-2007-0988: DoS in unserialize on 64bit platforms (CVE-2007-0988.patch) * The package maintainers would like to thank Joe Orton from redhat and Martin Pitt from ubuntu for their help in the preparation of this update. stable/main/binary-hppa/php4-recode_4.3.10-19_hppa.deb stable/main/binary-hppa/php4-odbc_4.3.10-19_hppa.deb stable/main/binary-hppa/php4-dev_4.3.10-19_hppa.deb stable/main/binary-hppa/php4-imap_4.3.10-19_hppa.deb stable/main/binary-hppa/php4-cgi_4.3.10-19_hppa.deb stable/main/binary-hppa/libapache-mod-php4_4.3.10-19_hppa.deb stable/main/binary-hppa/php4-cli_4.3.10-19_hppa.deb stable/main/binary-hppa/php4-xslt_4.3.10-19_hppa.deb stable/main/binary-hppa/php4-curl_4.3.10-19_hppa.deb stable/main/binary-hppa/php4-common_4.3.10-19_hppa.deb stable/main/binary-hppa/php4-mhash_4.3.10-19_hppa.deb stable/main/binary-hppa/php4-mcal_4.3.10-19_hppa.deb stable/main/binary-hppa/php4-domxml_4.3.10-19_hppa.deb stable/main/binary-hppa/php4-snmp_4.3.10-19_hppa.deb stable/main/binary-hppa/php4-gd_4.3.10-19_hppa.deb stable/main/binary-hppa/php4-sybase_4.3.10-19_hppa.deb stable/main/binary-hppa/php4-mysql_4.3.10-19_hppa.deb stable/main/binary-hppa/php4-ldap_4.3.10-19_hppa.deb stable/main/binary-hppa/libapache2-mod-php4_4.3.10-19_hppa.deb php4 (4:4.3.10-19) stable-security; urgency=high * NMU prepared for the security team by the package maintainer * The following security issues are addressed with this update: - CVE-2007-0906: Multiple buffer overflows in various code: * session (addressed in patch for CVE-2007-0910 below) * imap (CVE-2007-0906-imap.patch) * str_replace: (CVE-2007-0906-strreplace.patch) * the zip, sqlite, stream filters, mail, and interbase related vulnerabilities in this CVE do not affect the debian sarge php4 source package. - CVE-2007-0907: Buffer underflow in sapi_header_op (CVE-2007-0907.patch) - CVE-2007-0908: wddx module information disclosure (CVE-2007-0908.patch) - CVE-2007-0909: More buffer overflows: * the odbc_result_all function (CVE-2007-0909-odbc.patch) * various formatted print functions (CVE-2007-0909-printf.patch) - CVE-2007-0910: Clobbering of super-global variables (CVE-2007-0910.patch) - CVE-2007-0988: DoS in unserialize on 64bit platforms (CVE-2007-0988.patch) * The package maintainers would like to thank Joe Orton from redhat and Martin Pitt from ubuntu for their help in the preparation of this update. stable/main/binary-arm/php4-mcal_4.3.10-19_arm.deb stable/main/binary-arm/php4-odbc_4.3.10-19_arm.deb stable/main/binary-arm/php4-common_4.3.10-19_arm.deb stable/main/binary-arm/php4-gd_4.3.10-19_arm.deb stable/main/binary-arm/libapache-mod-php4_4.3.10-19_arm.deb stable/main/binary-arm/php4-dev_4.3.10-19_arm.deb stable/main/binary-arm/php4-sybase_4.3.10-19_arm.deb stable/main/binary-arm/php4-recode_4.3.10-19_arm.deb stable/main/binary-arm/php4-xslt_4.3.10-19_arm.deb stable/main/binary-arm/php4-imap_4.3.10-19_arm.deb stable/main/binary-arm/php4-ldap_4.3.10-19_arm.deb stable/main/binary-arm/php4-snmp_4.3.10-19_arm.deb stable/main/binary-arm/php4-curl_4.3.10-19_arm.deb stable/main/binary-arm/php4-cli_4.3.10-19_arm.deb stable/main/binary-arm/php4-domxml_4.3.10-19_arm.deb stable/main/binary-arm/libapache2-mod-php4_4.3.10-19_arm.deb stable/main/binary-arm/php4-mhash_4.3.10-19_arm.deb stable/main/binary-arm/php4-mysql_4.3.10-19_arm.deb stable/main/binary-arm/php4-cgi_4.3.10-19_arm.deb php4 (4:4.3.10-19) stable-security; urgency=high * NMU prepared for the security team by the package maintainer * The following security issues are addressed with this update: - CVE-2007-0906: Multiple buffer overflows in various code: * session (addressed in patch for CVE-2007-0910 below) * imap (CVE-2007-0906-imap.patch) * str_replace: (CVE-2007-0906-strreplace.patch) * the zip, sqlite, stream filters, mail, and interbase related vulnerabilities in this CVE do not affect the debian sarge php4 source package. - CVE-2007-0907: Buffer underflow in sapi_header_op (CVE-2007-0907.patch) - CVE-2007-0908: wddx module information disclosure (CVE-2007-0908.patch) - CVE-2007-0909: More buffer overflows: * the odbc_result_all function (CVE-2007-0909-odbc.patch) * various formatted print functions (CVE-2007-0909-printf.patch) - CVE-2007-0910: Clobbering of super-global variables (CVE-2007-0910.patch) - CVE-2007-0988: DoS in unserialize on 64bit platforms (CVE-2007-0988.patch) * The package maintainers would like to thank Joe Orton from redhat and Martin Pitt from ubuntu for their help in the preparation of this update. stable/main/binary-alpha/libapache-mod-php4_4.3.10-19_alpha.deb stable/main/binary-alpha/php4-domxml_4.3.10-19_alpha.deb stable/main/binary-alpha/libapache2-mod-php4_4.3.10-19_alpha.deb stable/main/binary-alpha/php4-cgi_4.3.10-19_alpha.deb stable/main/binary-alpha/php4-common_4.3.10-19_alpha.deb stable/main/binary-alpha/php4-imap_4.3.10-19_alpha.deb stable/main/binary-alpha/php4-curl_4.3.10-19_alpha.deb stable/main/binary-alpha/php4-ldap_4.3.10-19_alpha.deb stable/main/binary-alpha/php4-recode_4.3.10-19_alpha.deb stable/main/binary-alpha/php4-mcal_4.3.10-19_alpha.deb stable/main/binary-alpha/php4-snmp_4.3.10-19_alpha.deb stable/main/binary-alpha/php4-mysql_4.3.10-19_alpha.deb stable/main/binary-alpha/php4-xslt_4.3.10-19_alpha.deb stable/main/binary-alpha/php4-cli_4.3.10-19_alpha.deb stable/main/binary-alpha/php4-sybase_4.3.10-19_alpha.deb stable/main/binary-alpha/php4-odbc_4.3.10-19_alpha.deb stable/main/binary-alpha/php4-mhash_4.3.10-19_alpha.deb stable/main/binary-alpha/php4-dev_4.3.10-19_alpha.deb stable/main/binary-alpha/php4-gd_4.3.10-19_alpha.deb php4 (4:4.3.10-19) stable-security; urgency=high * NMU prepared for the security team by the package maintainer * The following security issues are addressed with this update: - CVE-2007-0906: Multiple buffer overflows in various code: * session (addressed in patch for CVE-2007-0910 below) * imap (CVE-2007-0906-imap.patch) * str_replace: (CVE-2007-0906-strreplace.patch) * the zip, sqlite, stream filters, mail, and interbase related vulnerabilities in this CVE do not affect the debian sarge php4 source package. - CVE-2007-0907: Buffer underflow in sapi_header_op (CVE-2007-0907.patch) - CVE-2007-0908: wddx module information disclosure (CVE-2007-0908.patch) - CVE-2007-0909: More buffer overflows: * the odbc_result_all function (CVE-2007-0909-odbc.patch) * various formatted print functions (CVE-2007-0909-printf.patch) - CVE-2007-0910: Clobbering of super-global variables (CVE-2007-0910.patch) - CVE-2007-0988: DoS in unserialize on 64bit platforms (CVE-2007-0988.patch) * The package maintainers would like to thank Joe Orton from redhat and Martin Pitt from ubuntu for their help in the preparation of this update. stable/main/binary-i386/php4-ldap_4.3.10-19_i386.deb stable/main/binary-all/php4-pear_4.3.10-19_all.deb stable/main/binary-i386/php4-mhash_4.3.10-19_i386.deb stable/main/binary-i386/php4-sybase_4.3.10-19_i386.deb stable/main/binary-i386/libapache-mod-php4_4.3.10-19_i386.deb stable/main/binary-i386/php4-cgi_4.3.10-19_i386.deb stable/main/binary-i386/libapache2-mod-php4_4.3.10-19_i386.deb stable/main/binary-i386/php4-mcal_4.3.10-19_i386.deb stable/main/source/php4_4.3.10-19.diff.gz stable/main/binary-i386/php4-imap_4.3.10-19_i386.deb stable/main/binary-all/php4_4.3.10-19_all.deb stable/main/binary-i386/php4-odbc_4.3.10-19_i386.deb stable/main/binary-i386/php4-recode_4.3.10-19_i386.deb stable/main/binary-i386/php4-domxml_4.3.10-19_i386.deb stable/main/binary-i386/php4-gd_4.3.10-19_i386.deb stable/main/binary-i386/php4-snmp_4.3.10-19_i386.deb stable/main/binary-i386/php4-common_4.3.10-19_i386.deb stable/main/binary-i386/php4-xslt_4.3.10-19_i386.deb stable/main/source/php4_4.3.10-19.dsc stable/main/binary-i386/php4-curl_4.3.10-19_i386.deb stable/main/binary-i386/php4-dev_4.3.10-19_i386.deb stable/main/binary-i386/php4-mysql_4.3.10-19_i386.deb stable/main/binary-i386/php4-cli_4.3.10-19_i386.deb php4 (4:4.3.10-19) stable-security; urgency=high * NMU prepared for the security team by the package maintainer * The following security issues are addressed with this update: - CVE-2007-0906: Multiple buffer overflows in various code: * session (addressed in patch for CVE-2007-0910 below) * imap (CVE-2007-0906-imap.patch) * str_replace: (CVE-2007-0906-strreplace.patch) * the zip, sqlite, stream filters, mail, and interbase related vulnerabilities in this CVE do not affect the debian sarge php4 source package. - CVE-2007-0907: Buffer underflow in sapi_header_op (CVE-2007-0907.patch) - CVE-2007-0908: wddx module information disclosure (CVE-2007-0908.patch) - CVE-2007-0909: More buffer overflows: * the odbc_result_all function (CVE-2007-0909-odbc.patch) * various formatted print functions (CVE-2007-0909-printf.patch) - CVE-2007-0910: Clobbering of super-global variables (CVE-2007-0910.patch) - CVE-2007-0988: DoS in unserialize on 64bit platforms (CVE-2007-0988.patch) * The package maintainers would like to thank Joe Orton from redhat and Martin Pitt from ubuntu for their help in the preparation of this update. stable/main/binary-s390/openoffice.org-dev_1.1.3-9sarge6_s390.deb stable/main/binary-s390/openoffice.org-kde_1.1.3-9sarge6_s390.deb stable/main/binary-s390/openoffice.org-bin_1.1.3-9sarge6_s390.deb stable/main/binary-s390/openoffice.org-evolution_1.1.3-9sarge6_s390.deb stable/main/binary-s390/openoffice.org-gtk-gnome_1.1.3-9sarge6_s390.deb openoffice.org (1.1.3-9sarge6) stable-security; urgency=high * ooo-build/patches/wpd/libwpd-CVE-2007-0002.diff: add, fix CVE-2007-0002 (various problems which could be used by remote attackers to execute arbitrary code or crash OOo) for the internal libwpd copy here - thanks Steve Langasek stable/main/binary-powerpc/openoffice.org-gtk-gnome_1.1.3-9sarge6_powerpc.deb stable/main/binary-powerpc/openoffice.org-evolution_1.1.3-9sarge6_powerpc.deb stable/main/binary-powerpc/openoffice.org-bin_1.1.3-9sarge6_powerpc.deb stable/main/binary-powerpc/openoffice.org-kde_1.1.3-9sarge6_powerpc.deb stable/main/binary-powerpc/openoffice.org-dev_1.1.3-9sarge6_powerpc.deb openoffice.org (1.1.3-9sarge6) stable-security; urgency=high * ooo-build/patches/wpd/libwpd-CVE-2007-0002.diff: add, fix CVE-2007-0002 (various problems which could be used by remote attackers to execute arbitrary code or crash OOo) for the internal libwpd copy here - thanks Steve Langasek stable/main/binary-i386/openoffice.org-evolution_1.1.3-9sarge6_i386.deb stable/main/binary-i386/openoffice.org-dev_1.1.3-9sarge6_i386.deb stable/main/binary-i386/openoffice.org-kde_1.1.3-9sarge6_i386.deb stable/main/binary-i386/openoffice.org-gtk-gnome_1.1.3-9sarge6_i386.deb stable/main/binary-i386/openoffice.org-bin_1.1.3-9sarge6_i386.deb openoffice.org (1.1.3-9sarge6) stable-security; urgency=high * ooo-build/patches/wpd/libwpd-CVE-2007-0002.diff: add, fix CVE-2007-0002 (various problems which could be used by remote attackers to execute arbitrary code or crash OOo) for the internal libwpd copy here - thanks Steve Langasek stable/main/binary-all/openoffice.org-l10n-pt-br_1.1.3-9sarge6_all.deb stable/main/binary-all/openoffice.org-l10n-hu_1.1.3-9sarge6_all.deb stable/main/binary-all/openoffice.org-l10n-it_1.1.3-9sarge6_all.deb stable/main/binary-all/openoffice.org-l10n-pt_1.1.3-9sarge6_all.deb stable/main/binary-sparc/openoffice.org-evolution_1.1.3-9sarge6_sparc.deb stable/main/binary-all/openoffice.org-l10n-tr_1.1.3-9sarge6_all.deb stable/main/binary-all/openoffice.org-l10n-nb_1.1.3-9sarge6_all.deb stable/main/binary-all/openoffice.org-l10n-ja_1.1.3-9sarge6_all.deb stable/main/binary-all/openoffice.org-l10n-af_1.1.3-9sarge6_all.deb stable/main/binary-all/openoffice.org-l10n-nl_1.1.3-9sarge6_all.deb stable/main/binary-all/openoffice.org-l10n-ru_1.1.3-9sarge6_all.deb stable/main/binary-all/openoffice.org-l10n-fr_1.1.3-9sarge6_all.deb stable/main/binary-all/openoffice.org-l10n-zh-tw_1.1.3-9sarge6_all.deb stable/main/binary-all/openoffice.org-l10n-kn_1.1.3-9sarge6_all.deb stable/main/binary-all/openoffice.org-l10n-th_1.1.3-9sarge6_all.deb stable/main/binary-all/openoffice.org-l10n-eu_1.1.3-9sarge6_all.deb stable/main/binary-all/openoffice.org-l10n-sk_1.1.3-9sarge6_all.deb stable/main/binary-all/openoffice.org-l10n-ar_1.1.3-9sarge6_all.deb stable/main/binary-all/openoffice.org-l10n-gl_1.1.3-9sarge6_all.deb stable/main/binary-all/openoffice.org-l10n-sl_1.1.3-9sarge6_all.deb stable/main/binary-all/openoffice.org-l10n-cs_1.1.3-9sarge6_all.deb stable/main/binary-all/openoffice.org-l10n-sv_1.1.3-9sarge6_all.deb stable/main/binary-all/openoffice.org-l10n-lt_1.1.3-9sarge6_all.deb stable/main/source/openoffice.org_1.1.3-9sarge6.diff.gz stable/main/binary-sparc/openoffice.org-gtk-gnome_1.1.3-9sarge6_sparc.deb stable/main/binary-all/openoffice.org-l10n-nn_1.1.3-9sarge6_all.deb stable/main/binary-all/openoffice.org-l10n-zu_1.1.3-9sarge6_all.deb stable/main/binary-all/openoffice.org-l10n-zh-cn_1.1.3-9sarge6_all.deb stable/main/binary-sparc/openoffice.org-kde_1.1.3-9sarge6_sparc.deb stable/main/binary-all/ttf-opensymbol_1.1.3-9sarge6_all.deb stable/main/binary-all/openoffice.org-l10n-es_1.1.3-9sarge6_all.deb stable/main/binary-all/openoffice.org-l10n-ko_1.1.3-9sarge6_all.deb stable/main/binary-sparc/openoffice.org-bin_1.1.3-9sarge6_sparc.deb stable/main/source/openoffice.org_1.1.3-9sarge6.dsc stable/main/binary-all/openoffice.org-l10n-el_1.1.3-9sarge6_all.deb stable/main/binary-all/openoffice.org-l10n-tn_1.1.3-9sarge6_all.deb stable/main/binary-all/openoffice.org-l10n-cy_1.1.3-9sarge6_all.deb stable/main/binary-all/openoffice.org_1.1.3-9sarge6_all.deb stable/main/binary-all/openoffice.org-l10n-en_1.1.3-9sarge6_all.deb stable/main/binary-all/openoffice.org-l10n-et_1.1.3-9sarge6_all.deb stable/main/binary-sparc/openoffice.org-dev_1.1.3-9sarge6_sparc.deb stable/main/binary-all/openoffice.org-l10n-ca_1.1.3-9sarge6_all.deb stable/main/binary-all/openoffice.org-l10n-de_1.1.3-9sarge6_all.deb stable/main/binary-all/openoffice.org-mimelnk_1.1.3-9sarge6_all.deb stable/main/binary-all/openoffice.org-l10n-fi_1.1.3-9sarge6_all.deb stable/main/binary-all/openoffice.org-l10n-hi_1.1.3-9sarge6_all.deb stable/main/binary-all/openoffice.org-l10n-ns_1.1.3-9sarge6_all.deb stable/main/binary-all/openoffice.org-l10n-he_1.1.3-9sarge6_all.deb stable/main/binary-all/openoffice.org-l10n-pl_1.1.3-9sarge6_all.deb stable/main/binary-all/openoffice.org-thesaurus-en-us_1.1.3-9sarge6_all.deb stable/main/binary-all/openoffice.org-l10n-da_1.1.3-9sarge6_all.deb openoffice.org (1.1.3-9sarge6) stable-security; urgency=high * ooo-build/patches/wpd/libwpd-CVE-2007-0002.diff: add, fix CVE-2007-0002 (various problems which could be used by remote attackers to execute arbitrary code or crash OOo) for the internal libwpd copy here - thanks Steve Langasek stable/main/binary-sparc/libpam-openafs-kaserver_1.3.81-3sarge2_sparc.deb stable/main/binary-sparc/openafs-fileserver_1.3.81-3sarge2_sparc.deb stable/main/binary-sparc/libopenafs-dev_1.3.81-3sarge2_sparc.deb stable/main/binary-sparc/openafs-client_1.3.81-3sarge2_sparc.deb stable/main/binary-sparc/openafs-dbserver_1.3.81-3sarge2_sparc.deb stable/main/binary-sparc/openafs-kpasswd_1.3.81-3sarge2_sparc.deb openafs (1.3.81-3sarge2) stable-security; urgency=high * Non-maintainer upload by the Security Team. * Apply upstream patch to disable setuid status on all cells by default. Prior versions of AFS defaulted to honoring setuid bits in the local cell, but since unauthenticated file access in AFS is unencrypted, an attacker could forge packets from an AFS file server to synthesize a setuid binary in AFS. (CVE-2007-1507, OPENAFS-SA-2007-001) stable/main/binary-s390/openafs-kpasswd_1.3.81-3sarge2_s390.deb stable/main/binary-s390/openafs-client_1.3.81-3sarge2_s390.deb stable/main/binary-s390/libpam-openafs-kaserver_1.3.81-3sarge2_s390.deb stable/main/binary-s390/openafs-fileserver_1.3.81-3sarge2_s390.deb stable/main/binary-s390/libopenafs-dev_1.3.81-3sarge2_s390.deb stable/main/binary-s390/openafs-dbserver_1.3.81-3sarge2_s390.deb openafs (1.3.81-3sarge2) stable-security; urgency=high * Non-maintainer upload by the Security Team. * Apply upstream patch to disable setuid status on all cells by default. Prior versions of AFS defaulted to honoring setuid bits in the local cell, but since unauthenticated file access in AFS is unencrypted, an attacker could forge packets from an AFS file server to synthesize a setuid binary in AFS. (CVE-2007-1507, OPENAFS-SA-2007-001) stable/main/binary-powerpc/libpam-openafs-kaserver_1.3.81-3sarge2_powerpc.deb stable/main/binary-powerpc/openafs-kpasswd_1.3.81-3sarge2_powerpc.deb stable/main/binary-powerpc/openafs-dbserver_1.3.81-3sarge2_powerpc.deb stable/main/binary-powerpc/libopenafs-dev_1.3.81-3sarge2_powerpc.deb stable/main/binary-powerpc/openafs-fileserver_1.3.81-3sarge2_powerpc.deb stable/main/binary-powerpc/openafs-client_1.3.81-3sarge2_powerpc.deb openafs (1.3.81-3sarge2) stable-security; urgency=high * Non-maintainer upload by the Security Team. * Apply upstream patch to disable setuid status on all cells by default. Prior versions of AFS defaulted to honoring setuid bits in the local cell, but since unauthenticated file access in AFS is unencrypted, an attacker could forge packets from an AFS file server to synthesize a setuid binary in AFS. (CVE-2007-1507, OPENAFS-SA-2007-001) stable/main/binary-ia64/libpam-openafs-kaserver_1.3.81-3sarge2_ia64.deb stable/main/binary-ia64/openafs-client_1.3.81-3sarge2_ia64.deb stable/main/binary-ia64/libopenafs-dev_1.3.81-3sarge2_ia64.deb stable/main/binary-ia64/openafs-fileserver_1.3.81-3sarge2_ia64.deb stable/main/binary-ia64/openafs-dbserver_1.3.81-3sarge2_ia64.deb stable/main/binary-ia64/openafs-kpasswd_1.3.81-3sarge2_ia64.deb openafs (1.3.81-3sarge2) stable-security; urgency=high * Non-maintainer upload by the Security Team. * Apply upstream patch to disable setuid status on all cells by default. Prior versions of AFS defaulted to honoring setuid bits in the local cell, but since unauthenticated file access in AFS is unencrypted, an attacker could forge packets from an AFS file server to synthesize a setuid binary in AFS. (CVE-2007-1507, OPENAFS-SA-2007-001) stable/main/binary-hppa/openafs-client_1.3.81-3sarge2_hppa.deb stable/main/binary-hppa/openafs-dbserver_1.3.81-3sarge2_hppa.deb stable/main/binary-hppa/openafs-kpasswd_1.3.81-3sarge2_hppa.deb stable/main/binary-hppa/libopenafs-dev_1.3.81-3sarge2_hppa.deb stable/main/binary-hppa/libpam-openafs-kaserver_1.3.81-3sarge2_hppa.deb stable/main/binary-hppa/openafs-fileserver_1.3.81-3sarge2_hppa.deb openafs (1.3.81-3sarge2) stable-security; urgency=high * Non-maintainer upload by the Security Team. * Apply upstream patch to disable setuid status on all cells by default. Prior versions of AFS defaulted to honoring setuid bits in the local cell, but since unauthenticated file access in AFS is unencrypted, an attacker could forge packets from an AFS file server to synthesize a setuid binary in AFS. (CVE-2007-1507, OPENAFS-SA-2007-001) stable/main/binary-alpha/openafs-fileserver_1.3.81-3sarge2_alpha.deb stable/main/binary-alpha/libpam-openafs-kaserver_1.3.81-3sarge2_alpha.deb stable/main/binary-alpha/openafs-client_1.3.81-3sarge2_alpha.deb stable/main/binary-alpha/libopenafs-dev_1.3.81-3sarge2_alpha.deb stable/main/binary-alpha/openafs-kpasswd_1.3.81-3sarge2_alpha.deb stable/main/binary-alpha/openafs-dbserver_1.3.81-3sarge2_alpha.deb openafs (1.3.81-3sarge2) stable-security; urgency=high * Non-maintainer upload by the Security Team. * Apply upstream patch to disable setuid status on all cells by default. Prior versions of AFS defaulted to honoring setuid bits in the local cell, but since unauthenticated file access in AFS is unencrypted, an attacker could forge packets from an AFS file server to synthesize a setuid binary in AFS. (CVE-2007-1507, OPENAFS-SA-2007-001) stable/main/binary-i386/openafs-kpasswd_1.3.81-3sarge2_i386.deb stable/main/binary-all/openafs-modules-source_1.3.81-3sarge2_all.deb stable/main/source/openafs_1.3.81-3sarge2.dsc stable/main/binary-i386/openafs-client_1.3.81-3sarge2_i386.deb stable/main/binary-i386/openafs-dbserver_1.3.81-3sarge2_i386.deb stable/main/binary-i386/openafs-fileserver_1.3.81-3sarge2_i386.deb stable/main/binary-i386/libpam-openafs-kaserver_1.3.81-3sarge2_i386.deb stable/main/source/openafs_1.3.81-3sarge2.diff.gz stable/main/binary-i386/libopenafs-dev_1.3.81-3sarge2_i386.deb openafs (1.3.81-3sarge2) stable-security; urgency=high * Non-maintainer upload by the Security Team. * Apply upstream patch to disable setuid status on all cells by default. Prior versions of AFS defaulted to honoring setuid bits in the local cell, but since unauthenticated file access in AFS is unencrypted, an attacker could forge packets from an AFS file server to synthesize a setuid binary in AFS. (CVE-2007-1507, OPENAFS-SA-2007-001) stable/main/binary-sparc/libaudio2_1.7-2sarge1_sparc.deb stable/main/binary-sparc/nas_1.7-2sarge1_sparc.deb stable/main/binary-sparc/libaudio-dev_1.7-2sarge1_sparc.deb stable/main/binary-sparc/nas-bin_1.7-2sarge1_sparc.deb nas (1.7-2sarge1) stable-security; urgency=high * High-urgency upload to fix multiple security holes (CVE-2007-1543, CVE-2007-1544, CVE-2007-1545, CVE-2007-1546 and CVE-2007-1547): + accept_att_local buffer overflow through USL connection + server termination through unexistent ID in AddResource + bcopy crash caused by integer overflow in ProcAuWriteElement + invalid memory pointer caused by big num_actions in ProcAuSetElements + another invalid memory pointer caused by big num_actions in ProcAuSetElements + invalid memory pointer in compileInputs + exploits bug 3 in read mode (requires something playing on the server) + NULL pointer caused by too much connections stable/main/binary-s390/libaudio2_1.7-2sarge1_s390.deb stable/main/binary-s390/libaudio-dev_1.7-2sarge1_s390.deb stable/main/binary-s390/nas-bin_1.7-2sarge1_s390.deb stable/main/binary-s390/nas_1.7-2sarge1_s390.deb nas (1.7-2sarge1) stable-security; urgency=high * High-urgency upload to fix multiple security holes (CVE-2007-1543, CVE-2007-1544, CVE-2007-1545, CVE-2007-1546 and CVE-2007-1547): + accept_att_local buffer overflow through USL connection + server termination through unexistent ID in AddResource + bcopy crash caused by integer overflow in ProcAuWriteElement + invalid memory pointer caused by big num_actions in ProcAuSetElements + another invalid memory pointer caused by big num_actions in ProcAuSetElements + invalid memory pointer in compileInputs + exploits bug 3 in read mode (requires something playing on the server) + NULL pointer caused by too much connections stable/main/binary-powerpc/nas_1.7-2sarge1_powerpc.deb stable/main/binary-powerpc/nas-bin_1.7-2sarge1_powerpc.deb stable/main/binary-powerpc/libaudio-dev_1.7-2sarge1_powerpc.deb stable/main/binary-powerpc/libaudio2_1.7-2sarge1_powerpc.deb nas (1.7-2sarge1) stable-security; urgency=high * High-urgency upload to fix multiple security holes (CVE-2007-1543, CVE-2007-1544, CVE-2007-1545, CVE-2007-1546 and CVE-2007-1547): + accept_att_local buffer overflow through USL connection + server termination through unexistent ID in AddResource + bcopy crash caused by integer overflow in ProcAuWriteElement + invalid memory pointer caused by big num_actions in ProcAuSetElements + another invalid memory pointer caused by big num_actions in ProcAuSetElements + invalid memory pointer in compileInputs + exploits bug 3 in read mode (requires something playing on the server) + NULL pointer caused by too much connections stable/main/binary-mipsel/libaudio2_1.7-2sarge1_mipsel.deb stable/main/binary-mipsel/libaudio-dev_1.7-2sarge1_mipsel.deb stable/main/binary-mipsel/nas-bin_1.7-2sarge1_mipsel.deb stable/main/binary-mipsel/nas_1.7-2sarge1_mipsel.deb nas (1.7-2sarge1) stable-security; urgency=high * High-urgency upload to fix multiple security holes (CVE-2007-1543, CVE-2007-1544, CVE-2007-1545, CVE-2007-1546 and CVE-2007-1547): + accept_att_local buffer overflow through USL connection + server termination through unexistent ID in AddResource + bcopy crash caused by integer overflow in ProcAuWriteElement + invalid memory pointer caused by big num_actions in ProcAuSetElements + another invalid memory pointer caused by big num_actions in ProcAuSetElements + invalid memory pointer in compileInputs + exploits bug 3 in read mode (requires something playing on the server) + NULL pointer caused by too much connections stable/main/binary-mips/libaudio-dev_1.7-2sarge1_mips.deb stable/main/binary-mips/libaudio2_1.7-2sarge1_mips.deb stable/main/binary-mips/nas-bin_1.7-2sarge1_mips.deb stable/main/binary-mips/nas_1.7-2sarge1_mips.deb nas (1.7-2sarge1) stable-security; urgency=high * High-urgency upload to fix multiple security holes (CVE-2007-1543, CVE-2007-1544, CVE-2007-1545, CVE-2007-1546 and CVE-2007-1547): + accept_att_local buffer overflow through USL connection + server termination through unexistent ID in AddResource + bcopy crash caused by integer overflow in ProcAuWriteElement + invalid memory pointer caused by big num_actions in ProcAuSetElements + another invalid memory pointer caused by big num_actions in ProcAuSetElements + invalid memory pointer in compileInputs + exploits bug 3 in read mode (requires something playing on the server) + NULL pointer caused by too much connections stable/main/binary-m68k/libaudio2_1.7-2sarge1_m68k.deb stable/main/binary-m68k/libaudio-dev_1.7-2sarge1_m68k.deb stable/main/binary-m68k/nas_1.7-2sarge1_m68k.deb stable/main/binary-m68k/nas-bin_1.7-2sarge1_m68k.deb nas (1.7-2sarge1) stable-security; urgency=high * High-urgency upload to fix multiple security holes (CVE-2007-1543, CVE-2007-1544, CVE-2007-1545, CVE-2007-1546 and CVE-2007-1547): + accept_att_local buffer overflow through USL connection + server termination through unexistent ID in AddResource + bcopy crash caused by integer overflow in ProcAuWriteElement + invalid memory pointer caused by big num_actions in ProcAuSetElements + another invalid memory pointer caused by big num_actions in ProcAuSetElements + invalid memory pointer in compileInputs + exploits bug 3 in read mode (requires something playing on the server) + NULL pointer caused by too much connections stable/main/binary-ia64/nas-bin_1.7-2sarge1_ia64.deb stable/main/binary-ia64/libaudio2_1.7-2sarge1_ia64.deb stable/main/binary-ia64/libaudio-dev_1.7-2sarge1_ia64.deb stable/main/binary-ia64/nas_1.7-2sarge1_ia64.deb nas (1.7-2sarge1) stable-security; urgency=high * High-urgency upload to fix multiple security holes (CVE-2007-1543, CVE-2007-1544, CVE-2007-1545, CVE-2007-1546 and CVE-2007-1547): + accept_att_local buffer overflow through USL connection + server termination through unexistent ID in AddResource + bcopy crash caused by integer overflow in ProcAuWriteElement + invalid memory pointer caused by big num_actions in ProcAuSetElements + another invalid memory pointer caused by big num_actions in ProcAuSetElements + invalid memory pointer in compileInputs + exploits bug 3 in read mode (requires something playing on the server) + NULL pointer caused by too much connections stable/main/binary-hppa/libaudio2_1.7-2sarge1_hppa.deb stable/main/binary-hppa/nas_1.7-2sarge1_hppa.deb stable/main/binary-hppa/libaudio-dev_1.7-2sarge1_hppa.deb stable/main/binary-hppa/nas-bin_1.7-2sarge1_hppa.deb nas (1.7-2sarge1) stable-security; urgency=high * High-urgency upload to fix multiple security holes (CVE-2007-1543, CVE-2007-1544, CVE-2007-1545, CVE-2007-1546 and CVE-2007-1547): + accept_att_local buffer overflow through USL connection + server termination through unexistent ID in AddResource + bcopy crash caused by integer overflow in ProcAuWriteElement + invalid memory pointer caused by big num_actions in ProcAuSetElements + another invalid memory pointer caused by big num_actions in ProcAuSetElements + invalid memory pointer in compileInputs + exploits bug 3 in read mode (requires something playing on the server) + NULL pointer caused by too much connections stable/main/binary-arm/libaudio2_1.7-2sarge1_arm.deb stable/main/binary-arm/libaudio-dev_1.7-2sarge1_arm.deb stable/main/binary-arm/nas-bin_1.7-2sarge1_arm.deb stable/main/binary-arm/nas_1.7-2sarge1_arm.deb nas (1.7-2sarge1) stable-security; urgency=high * High-urgency upload to fix multiple security holes (CVE-2007-1543, CVE-2007-1544, CVE-2007-1545, CVE-2007-1546 and CVE-2007-1547): + accept_att_local buffer overflow through USL connection + server termination through unexistent ID in AddResource + bcopy crash caused by integer overflow in ProcAuWriteElement + invalid memory pointer caused by big num_actions in ProcAuSetElements + another invalid memory pointer caused by big num_actions in ProcAuSetElements + invalid memory pointer in compileInputs + exploits bug 3 in read mode (requires something playing on the server) + NULL pointer caused by too much connections stable/main/binary-alpha/libaudio2_1.7-2sarge1_alpha.deb stable/main/binary-alpha/libaudio-dev_1.7-2sarge1_alpha.deb stable/main/binary-alpha/nas-bin_1.7-2sarge1_alpha.deb stable/main/binary-alpha/nas_1.7-2sarge1_alpha.deb nas (1.7-2sarge1) stable-security; urgency=high * High-urgency upload to fix multiple security holes (CVE-2007-1543, CVE-2007-1544, CVE-2007-1545, CVE-2007-1546 and CVE-2007-1547): + accept_att_local buffer overflow through USL connection + server termination through unexistent ID in AddResource + bcopy crash caused by integer overflow in ProcAuWriteElement + invalid memory pointer caused by big num_actions in ProcAuSetElements + another invalid memory pointer caused by big num_actions in ProcAuSetElements + invalid memory pointer in compileInputs + exploits bug 3 in read mode (requires something playing on the server) + NULL pointer caused by too much connections stable/main/binary-all/nas-doc_1.7-2sarge1_all.deb stable/main/binary-i386/nas_1.7-2sarge1_i386.deb stable/main/binary-i386/libaudio2_1.7-2sarge1_i386.deb stable/main/source/nas_1.7-2sarge1.dsc stable/main/binary-i386/nas-bin_1.7-2sarge1_i386.deb stable/main/source/nas_1.7-2sarge1.diff.gz stable/main/binary-i386/libaudio-dev_1.7-2sarge1_i386.deb nas (1.7-2sarge1) stable-security; urgency=high * High-urgency upload to fix multiple security holes (CVE-2007-1543, CVE-2007-1544, CVE-2007-1545, CVE-2007-1546 and CVE-2007-1547): + accept_att_local buffer overflow through USL connection + server termination through unexistent ID in AddResource + bcopy crash caused by integer overflow in ProcAuWriteElement + invalid memory pointer caused by big num_actions in ProcAuSetElements + another invalid memory pointer caused by big num_actions in ProcAuSetElements + invalid memory pointer in compileInputs + exploits bug 3 in read mode (requires something playing on the server) + NULL pointer caused by too much connections stable/main/binary-sparc/mozilla-chatzilla_1.7.8-1sarge10_sparc.deb stable/main/binary-sparc/libnspr4_1.7.8-1sarge10_sparc.deb stable/main/binary-sparc/mozilla-dev_1.7.8-1sarge10_sparc.deb stable/main/binary-sparc/mozilla-calendar_1.7.8-1sarge10_sparc.deb stable/main/binary-sparc/mozilla_1.7.8-1sarge10_sparc.deb stable/main/binary-sparc/libnspr-dev_1.7.8-1sarge10_sparc.deb stable/main/binary-sparc/mozilla-dom-inspector_1.7.8-1sarge10_sparc.deb stable/main/binary-sparc/libnss3_1.7.8-1sarge10_sparc.deb stable/main/binary-sparc/mozilla-psm_1.7.8-1sarge10_sparc.deb stable/main/binary-sparc/libnss-dev_1.7.8-1sarge10_sparc.deb stable/main/binary-sparc/mozilla-js-debugger_1.7.8-1sarge10_sparc.deb stable/main/binary-sparc/mozilla-mailnews_1.7.8-1sarge10_sparc.deb stable/main/binary-sparc/mozilla-browser_1.7.8-1sarge10_sparc.deb mozilla (2:1.7.8-1sarge10) stable-security; urgency=critical * fix crash regression in mailnews. updated 5_0013-MFSA-2006-74-CVE-2006-6505-Part-2-2-362512.txt to include that fix stable/main/binary-s390/mozilla-mailnews_1.7.8-1sarge10_s390.deb stable/main/binary-s390/mozilla-js-debugger_1.7.8-1sarge10_s390.deb stable/main/binary-s390/libnss3_1.7.8-1sarge10_s390.deb stable/main/binary-s390/mozilla-chatzilla_1.7.8-1sarge10_s390.deb stable/main/binary-s390/libnspr-dev_1.7.8-1sarge10_s390.deb stable/main/binary-s390/mozilla-dev_1.7.8-1sarge10_s390.deb stable/main/binary-s390/libnss-dev_1.7.8-1sarge10_s390.deb stable/main/binary-s390/mozilla-dom-inspector_1.7.8-1sarge10_s390.deb stable/main/binary-s390/mozilla_1.7.8-1sarge10_s390.deb stable/main/binary-s390/mozilla-browser_1.7.8-1sarge10_s390.deb stable/main/binary-s390/mozilla-calendar_1.7.8-1sarge10_s390.deb stable/main/binary-s390/libnspr4_1.7.8-1sarge10_s390.deb stable/main/binary-s390/mozilla-psm_1.7.8-1sarge10_s390.deb mozilla (2:1.7.8-1sarge10) stable-security; urgency=critical * fix crash regression in mailnews. updated 5_0013-MFSA-2006-74-CVE-2006-6505-Part-2-2-362512.txt to include that fix stable/main/binary-powerpc/mozilla-dom-inspector_1.7.8-1sarge10_powerpc.deb stable/main/binary-powerpc/mozilla-mailnews_1.7.8-1sarge10_powerpc.deb stable/main/binary-powerpc/libnspr-dev_1.7.8-1sarge10_powerpc.deb stable/main/binary-powerpc/mozilla-js-debugger_1.7.8-1sarge10_powerpc.deb stable/main/binary-powerpc/mozilla-chatzilla_1.7.8-1sarge10_powerpc.deb stable/main/binary-powerpc/libnss-dev_1.7.8-1sarge10_powerpc.deb stable/main/binary-powerpc/mozilla-psm_1.7.8-1sarge10_powerpc.deb stable/main/binary-powerpc/mozilla_1.7.8-1sarge10_powerpc.deb stable/main/binary-powerpc/mozilla-dev_1.7.8-1sarge10_powerpc.deb stable/main/binary-powerpc/mozilla-calendar_1.7.8-1sarge10_powerpc.deb stable/main/binary-powerpc/libnss3_1.7.8-1sarge10_powerpc.deb stable/main/binary-powerpc/libnspr4_1.7.8-1sarge10_powerpc.deb stable/main/binary-powerpc/mozilla-browser_1.7.8-1sarge10_powerpc.deb mozilla (2:1.7.8-1sarge10) stable-security; urgency=critical * fix crash regression in mailnews. updated 5_0013-MFSA-2006-74-CVE-2006-6505-Part-2-2-362512.txt to include that fix stable/main/binary-mipsel/mozilla-mailnews_1.7.8-1sarge10_mipsel.deb stable/main/binary-mipsel/mozilla-js-debugger_1.7.8-1sarge10_mipsel.deb stable/main/binary-mipsel/libnss3_1.7.8-1sarge10_mipsel.deb stable/main/binary-mipsel/mozilla-chatzilla_1.7.8-1sarge10_mipsel.deb stable/main/binary-mipsel/libnspr4_1.7.8-1sarge10_mipsel.deb stable/main/binary-mipsel/mozilla_1.7.8-1sarge10_mipsel.deb stable/main/binary-mipsel/mozilla-dom-inspector_1.7.8-1sarge10_mipsel.deb stable/main/binary-mipsel/libnss-dev_1.7.8-1sarge10_mipsel.deb stable/main/binary-mipsel/mozilla-browser_1.7.8-1sarge10_mipsel.deb stable/main/binary-mipsel/libnspr-dev_1.7.8-1sarge10_mipsel.deb stable/main/binary-mipsel/mozilla-psm_1.7.8-1sarge10_mipsel.deb stable/main/binary-mipsel/mozilla-dev_1.7.8-1sarge10_mipsel.deb stable/main/binary-mipsel/mozilla-calendar_1.7.8-1sarge10_mipsel.deb mozilla (2:1.7.8-1sarge10) stable-security; urgency=critical * fix crash regression in mailnews. updated 5_0013-MFSA-2006-74-CVE-2006-6505-Part-2-2-362512.txt to include that fix stable/main/binary-mips/mozilla_1.7.8-1sarge10_mips.deb stable/main/binary-mips/libnss-dev_1.7.8-1sarge10_mips.deb stable/main/binary-mips/libnss3_1.7.8-1sarge10_mips.deb stable/main/binary-mips/mozilla-js-debugger_1.7.8-1sarge10_mips.deb stable/main/binary-mips/mozilla-dom-inspector_1.7.8-1sarge10_mips.deb stable/main/binary-mips/mozilla-mailnews_1.7.8-1sarge10_mips.deb stable/main/binary-mips/mozilla-psm_1.7.8-1sarge10_mips.deb stable/main/binary-mips/mozilla-chatzilla_1.7.8-1sarge10_mips.deb stable/main/binary-mips/libnspr4_1.7.8-1sarge10_mips.deb stable/main/binary-mips/mozilla-calendar_1.7.8-1sarge10_mips.deb stable/main/binary-mips/mozilla-browser_1.7.8-1sarge10_mips.deb stable/main/binary-mips/libnspr-dev_1.7.8-1sarge10_mips.deb stable/main/binary-mips/mozilla-dev_1.7.8-1sarge10_mips.deb mozilla (2:1.7.8-1sarge10) stable-security; urgency=critical * fix crash regression in mailnews. updated 5_0013-MFSA-2006-74-CVE-2006-6505-Part-2-2-362512.txt to include that fix stable/main/binary-m68k/mozilla-psm_1.7.8-1sarge10_m68k.deb stable/main/binary-m68k/libnspr4_1.7.8-1sarge10_m68k.deb stable/main/binary-m68k/mozilla_1.7.8-1sarge10_m68k.deb stable/main/binary-m68k/mozilla-browser_1.7.8-1sarge10_m68k.deb stable/main/binary-m68k/libnss3_1.7.8-1sarge10_m68k.deb stable/main/binary-m68k/mozilla-mailnews_1.7.8-1sarge10_m68k.deb stable/main/binary-m68k/mozilla-dom-inspector_1.7.8-1sarge10_m68k.deb stable/main/binary-m68k/mozilla-calendar_1.7.8-1sarge10_m68k.deb stable/main/binary-m68k/libnspr-dev_1.7.8-1sarge10_m68k.deb stable/main/binary-m68k/libnss-dev_1.7.8-1sarge10_m68k.deb stable/main/binary-m68k/mozilla-dev_1.7.8-1sarge10_m68k.deb stable/main/binary-m68k/mozilla-chatzilla_1.7.8-1sarge10_m68k.deb stable/main/binary-m68k/mozilla-js-debugger_1.7.8-1sarge10_m68k.deb mozilla (2:1.7.8-1sarge10) stable-security; urgency=critical * fix crash regression in mailnews. updated 5_0013-MFSA-2006-74-CVE-2006-6505-Part-2-2-362512.txt to include that fix stable/main/binary-ia64/mozilla-psm_1.7.8-1sarge10_ia64.deb stable/main/binary-ia64/mozilla-mailnews_1.7.8-1sarge10_ia64.deb stable/main/binary-ia64/mozilla_1.7.8-1sarge10_ia64.deb stable/main/binary-ia64/mozilla-browser_1.7.8-1sarge10_ia64.deb stable/main/binary-ia64/libnss-dev_1.7.8-1sarge10_ia64.deb stable/main/binary-ia64/libnss3_1.7.8-1sarge10_ia64.deb stable/main/binary-ia64/libnspr-dev_1.7.8-1sarge10_ia64.deb stable/main/binary-ia64/mozilla-calendar_1.7.8-1sarge10_ia64.deb stable/main/binary-ia64/mozilla-dev_1.7.8-1sarge10_ia64.deb stable/main/binary-ia64/mozilla-dom-inspector_1.7.8-1sarge10_ia64.deb stable/main/binary-ia64/libnspr4_1.7.8-1sarge10_ia64.deb stable/main/binary-ia64/mozilla-js-debugger_1.7.8-1sarge10_ia64.deb stable/main/binary-ia64/mozilla-chatzilla_1.7.8-1sarge10_ia64.deb mozilla (2:1.7.8-1sarge10) stable-security; urgency=critical * fix crash regression in mailnews. updated 5_0013-MFSA-2006-74-CVE-2006-6505-Part-2-2-362512.txt to include that fix stable/main/binary-hppa/mozilla_1.7.8-1sarge10_hppa.deb stable/main/binary-hppa/mozilla-dom-inspector_1.7.8-1sarge10_hppa.deb stable/main/binary-hppa/mozilla-psm_1.7.8-1sarge10_hppa.deb stable/main/binary-hppa/libnss-dev_1.7.8-1sarge10_hppa.deb stable/main/binary-hppa/libnspr4_1.7.8-1sarge10_hppa.deb stable/main/binary-hppa/mozilla-mailnews_1.7.8-1sarge10_hppa.deb stable/main/binary-hppa/mozilla-js-debugger_1.7.8-1sarge10_hppa.deb stable/main/binary-hppa/mozilla-dev_1.7.8-1sarge10_hppa.deb stable/main/binary-hppa/libnspr-dev_1.7.8-1sarge10_hppa.deb stable/main/binary-hppa/mozilla-calendar_1.7.8-1sarge10_hppa.deb stable/main/binary-hppa/libnss3_1.7.8-1sarge10_hppa.deb stable/main/binary-hppa/mozilla-chatzilla_1.7.8-1sarge10_hppa.deb stable/main/binary-hppa/mozilla-browser_1.7.8-1sarge10_hppa.deb mozilla (2:1.7.8-1sarge10) stable-security; urgency=critical * fix crash regression in mailnews. updated 5_0013-MFSA-2006-74-CVE-2006-6505-Part-2-2-362512.txt to include that fix stable/main/binary-arm/mozilla_1.7.8-1sarge10_arm.deb stable/main/binary-arm/mozilla-browser_1.7.8-1sarge10_arm.deb stable/main/binary-arm/libnss3_1.7.8-1sarge10_arm.deb stable/main/binary-arm/mozilla-psm_1.7.8-1sarge10_arm.deb stable/main/binary-arm/mozilla-dom-inspector_1.7.8-1sarge10_arm.deb stable/main/binary-arm/mozilla-calendar_1.7.8-1sarge10_arm.deb stable/main/binary-arm/mozilla-mailnews_1.7.8-1sarge10_arm.deb stable/main/binary-arm/libnspr4_1.7.8-1sarge10_arm.deb stable/main/binary-arm/libnss-dev_1.7.8-1sarge10_arm.deb stable/main/binary-arm/mozilla-chatzilla_1.7.8-1sarge10_arm.deb stable/main/binary-arm/mozilla-js-debugger_1.7.8-1sarge10_arm.deb stable/main/binary-arm/libnspr-dev_1.7.8-1sarge10_arm.deb stable/main/binary-arm/mozilla-dev_1.7.8-1sarge10_arm.deb mozilla (2:1.7.8-1sarge10) stable-security; urgency=critical * fix crash regression in mailnews. updated 5_0013-MFSA-2006-74-CVE-2006-6505-Part-2-2-362512.txt to include that fix stable/main/binary-alpha/mozilla-mailnews_1.7.8-1sarge10_alpha.deb stable/main/binary-alpha/mozilla-dom-inspector_1.7.8-1sarge10_alpha.deb stable/main/binary-alpha/mozilla_1.7.8-1sarge10_alpha.deb stable/main/binary-alpha/libnspr4_1.7.8-1sarge10_alpha.deb stable/main/binary-alpha/libnss-dev_1.7.8-1sarge10_alpha.deb stable/main/binary-alpha/libnspr-dev_1.7.8-1sarge10_alpha.deb stable/main/binary-alpha/mozilla-js-debugger_1.7.8-1sarge10_alpha.deb stable/main/binary-alpha/mozilla-chatzilla_1.7.8-1sarge10_alpha.deb stable/main/binary-alpha/mozilla-dev_1.7.8-1sarge10_alpha.deb stable/main/binary-alpha/mozilla-browser_1.7.8-1sarge10_alpha.deb stable/main/binary-alpha/mozilla-calendar_1.7.8-1sarge10_alpha.deb stable/main/binary-alpha/mozilla-psm_1.7.8-1sarge10_alpha.deb stable/main/binary-alpha/libnss3_1.7.8-1sarge10_alpha.deb mozilla (2:1.7.8-1sarge10) stable-security; urgency=critical * fix crash regression in mailnews. updated 5_0013-MFSA-2006-74-CVE-2006-6505-Part-2-2-362512.txt to include that fix stable/main/binary-i386/mozilla-dom-inspector_1.7.8-1sarge10_i386.deb stable/main/binary-i386/mozilla-browser_1.7.8-1sarge10_i386.deb stable/main/binary-i386/mozilla-dev_1.7.8-1sarge10_i386.deb stable/main/binary-i386/libnspr-dev_1.7.8-1sarge10_i386.deb stable/main/source/mozilla_1.7.8-1sarge10.dsc stable/main/binary-i386/mozilla-js-debugger_1.7.8-1sarge10_i386.deb stable/main/binary-i386/mozilla-chatzilla_1.7.8-1sarge10_i386.deb stable/main/binary-i386/mozilla-psm_1.7.8-1sarge10_i386.deb stable/main/binary-i386/libnss-dev_1.7.8-1sarge10_i386.deb stable/main/source/mozilla_1.7.8-1sarge10.diff.gz stable/main/binary-i386/libnss3_1.7.8-1sarge10_i386.deb stable/main/binary-i386/mozilla-calendar_1.7.8-1sarge10_i386.deb stable/main/binary-i386/mozilla-mailnews_1.7.8-1sarge10_i386.deb stable/main/binary-i386/libnspr4_1.7.8-1sarge10_i386.deb stable/main/binary-i386/mozilla_1.7.8-1sarge10_i386.deb mozilla (2:1.7.8-1sarge10) stable-security; urgency=critical * fix crash regression in mailnews. updated 5_0013-MFSA-2006-74-CVE-2006-6505-Part-2-2-362512.txt to include that fix mozilla (2:1.7.8-1sarge9) stable-security; urgency=critical * fixes various security issues. Patches are: 5_0001-MFSA-2006-68-CVE-2006-6497-Part-1-335047.txt 5_0002-MFSA-2006-68-CVE-2006-6497-Part-2-339494.txt 5_0003-MFSA-2006-68-CVE-2006-6497-Part-4-354766.txt 5_0004-INFRASTRUCTURE-BACKPORT-backport-nsWeakFrame-infrastructure-to-1.7-branch.txt 5_0005-MFSA-2006-68-CVE-2006-6497-Part-5-359203.txt 5_0006-MFSA-2006-68-CVE-2006-6497-Part-6-360642.txt 5_0007-MFSA-2006-68-CVE-2006-6498-Part-1-352846.txt 5_0008-MFSA-2006-68-CVE-2006-6498-Part-2-361346.txt 5_0009-MFSA-2006-70-CVE-2006-6501-354978-r361964.txt 5_0010-MFSA-2006-71-CVE-2006-6502-352064.txt 5_0011-MFSA-2006-72-CVE-2006-6503-351370.txt 5_0012-MFSA-2006-74-CVE-2006-6505-Part-1-2-362213.txt 5_0013-MFSA-2006-74-CVE-2006-6505-Part-2-2-362512.txt 5_0014-MFSA-2006-68-CVE-2006-6499-358569.txt 5_0015-MFSA-2006-68-CVE-2006-6497-Part-3-348304.txt stable/main/binary-sparc/man-db_2.4.2-21sarge1_sparc.deb man-db (2.4.2-21sarge1) stable-security; urgency=low * CVE-2006-4250: Fix a buffer overrun if using -H and the designated web browser (argument to -H or $BROWSER) contains multiple %s expansions. Thanks to Jochen Voß for the report. stable/main/binary-s390/man-db_2.4.2-21sarge1_s390.deb man-db (2.4.2-21sarge1) stable-security; urgency=low * CVE-2006-4250: Fix a buffer overrun if using -H and the designated web browser (argument to -H or $BROWSER) contains multiple %s expansions. Thanks to Jochen Voß for the report. stable/main/binary-powerpc/man-db_2.4.2-21sarge1_powerpc.deb man-db (2.4.2-21sarge1) stable-security; urgency=low * CVE-2006-4250: Fix a buffer overrun if using -H and the designated web browser (argument to -H or $BROWSER) contains multiple %s expansions. Thanks to Jochen Voß for the report. stable/main/binary-mipsel/man-db_2.4.2-21sarge1_mipsel.deb man-db (2.4.2-21sarge1) stable-security; urgency=low * CVE-2006-4250: Fix a buffer overrun if using -H and the designated web browser (argument to -H or $BROWSER) contains multiple %s expansions. Thanks to Jochen Voß for the report. stable/main/binary-mips/man-db_2.4.2-21sarge1_mips.deb man-db (2.4.2-21sarge1) stable-security; urgency=low * CVE-2006-4250: Fix a buffer overrun if using -H and the designated web browser (argument to -H or $BROWSER) contains multiple %s expansions. Thanks to Jochen Voß for the report. stable/main/binary-m68k/man-db_2.4.2-21sarge1_m68k.deb man-db (2.4.2-21sarge1) stable-security; urgency=low * CVE-2006-4250: Fix a buffer overrun if using -H and the designated web browser (argument to -H or $BROWSER) contains multiple %s expansions. Thanks to Jochen Voß for the report. stable/main/binary-ia64/man-db_2.4.2-21sarge1_ia64.deb man-db (2.4.2-21sarge1) stable-security; urgency=low * CVE-2006-4250: Fix a buffer overrun if using -H and the designated web browser (argument to -H or $BROWSER) contains multiple %s expansions. Thanks to Jochen Voß for the report. stable/main/binary-hppa/man-db_2.4.2-21sarge1_hppa.deb man-db (2.4.2-21sarge1) stable-security; urgency=low * CVE-2006-4250: Fix a buffer overrun if using -H and the designated web browser (argument to -H or $BROWSER) contains multiple %s expansions. Thanks to Jochen Voß for the report. stable/main/binary-arm/man-db_2.4.2-21sarge1_arm.deb man-db (2.4.2-21sarge1) stable-security; urgency=low * CVE-2006-4250: Fix a buffer overrun if using -H and the designated web browser (argument to -H or $BROWSER) contains multiple %s expansions. Thanks to Jochen Voß for the report. stable/main/binary-alpha/man-db_2.4.2-21sarge1_alpha.deb man-db (2.4.2-21sarge1) stable-security; urgency=low * CVE-2006-4250: Fix a buffer overrun if using -H and the designated web browser (argument to -H or $BROWSER) contains multiple %s expansions. Thanks to Jochen Voß for the report. stable/main/source/man-db_2.4.2-21sarge1.dsc stable/main/binary-i386/man-db_2.4.2-21sarge1_i386.deb stable/main/source/man-db_2.4.2-21sarge1.diff.gz man-db (2.4.2-21sarge1) stable-security; urgency=low * CVE-2006-4250: Fix a buffer overrun if using -H and the designated web browser (argument to -H or $BROWSER) contains multiple %s expansions. Thanks to Jochen Voß for the report. stable/main/source/lookup-el_1.4-3sarge1.diff.gz stable/main/source/lookup-el_1.4-3sarge1.dsc stable/main/binary-all/lookup-el_1.4-3sarge1_all.deb lookup-el (1.4-3sarge1) stable-security; urgency=high * lisp/ndeb-binary.el: Make a temporary subdirectory securely. [CVE-2007-0237] stable/main/binary-sparc/links2_2.1pre16-1sarge1_sparc.deb links2 (2.1pre16-1sarge1) stable-security; urgency=high * Non-maintainer upload by the Security Team. * Build without smb:// support to avoid potential command execution [CVE-2006-5925]. stable/main/binary-s390/links2_2.1pre16-1sarge1_s390.deb links2 (2.1pre16-1sarge1) stable-security; urgency=high * Non-maintainer upload by the Security Team. * Build without smb:// support to avoid potential command execution [CVE-2006-5925]. stable/main/binary-powerpc/links2_2.1pre16-1sarge1_powerpc.deb links2 (2.1pre16-1sarge1) stable-security; urgency=high * Non-maintainer upload by the Security Team. * Build without smb:// support to avoid potential command execution [CVE-2006-5925]. stable/main/binary-mipsel/links2_2.1pre16-1sarge1_mipsel.deb links2 (2.1pre16-1sarge1) stable-security; urgency=high * Non-maintainer upload by the Security Team. * Build without smb:// support to avoid potential command execution [CVE-2006-5925]. stable/main/binary-mips/links2_2.1pre16-1sarge1_mips.deb links2 (2.1pre16-1sarge1) stable-security; urgency=high * Non-maintainer upload by the Security Team. * Build without smb:// support to avoid potential command execution [CVE-2006-5925]. stable/main/binary-m68k/links2_2.1pre16-1sarge1_m68k.deb links2 (2.1pre16-1sarge1) stable-security; urgency=high * Non-maintainer upload by the Security Team. * Build without smb:// support to avoid potential command execution [CVE-2006-5925]. stable/main/binary-ia64/links2_2.1pre16-1sarge1_ia64.deb links2 (2.1pre16-1sarge1) stable-security; urgency=high * Non-maintainer upload by the Security Team. * Build without smb:// support to avoid potential command execution [CVE-2006-5925]. stable/main/binary-hppa/links2_2.1pre16-1sarge1_hppa.deb links2 (2.1pre16-1sarge1) stable-security; urgency=high * Non-maintainer upload by the Security Team. * Build without smb:// support to avoid potential command execution [CVE-2006-5925]. stable/main/binary-arm/links2_2.1pre16-1sarge1_arm.deb links2 (2.1pre16-1sarge1) stable-security; urgency=high * Non-maintainer upload by the Security Team. * Build without smb:// support to avoid potential command execution [CVE-2006-5925]. stable/main/binary-alpha/links2_2.1pre16-1sarge1_alpha.deb links2 (2.1pre16-1sarge1) stable-security; urgency=high * Non-maintainer upload by the Security Team. * Build without smb:// support to avoid potential command execution [CVE-2006-5925]. stable/main/binary-i386/links2_2.1pre16-1sarge1_i386.deb stable/main/source/links2_2.1pre16-1sarge1.diff.gz stable/main/source/links2_2.1pre16-1sarge1.dsc links2 (2.1pre16-1sarge1) stable-security; urgency=high * Non-maintainer upload by the Security Team. * Build without smb:// support to avoid potential command execution [CVE-2006-5925]. stable/main/binary-sparc/libwpd-tools_0.8.1-1sarge1_sparc.deb stable/main/binary-sparc/libwpd8_0.8.1-1sarge1_sparc.deb stable/main/binary-sparc/libwpd8-dev_0.8.1-1sarge1_sparc.deb stable/main/binary-sparc/libwpd-stream8_0.8.1-1sarge1_sparc.deb libwpd (0.8.1-1sarge1) stable-security; urgency=high * fix CVE-2007-0002 (various problems which could be used by remote attackers to execute arbitrary code or crash OOo) - thanks Steve Langasek stable/main/binary-s390/libwpd8_0.8.1-1sarge1_s390.deb stable/main/binary-s390/libwpd-stream8_0.8.1-1sarge1_s390.deb stable/main/binary-s390/libwpd8-dev_0.8.1-1sarge1_s390.deb stable/main/binary-s390/libwpd-tools_0.8.1-1sarge1_s390.deb libwpd (0.8.1-1sarge1) stable-security; urgency=high * fix CVE-2007-0002 (various problems which could be used by remote attackers to execute arbitrary code or crash OOo) - thanks Steve Langasek stable/main/binary-mipsel/libwpd8_0.8.1-1sarge1_mipsel.deb stable/main/binary-mipsel/libwpd-tools_0.8.1-1sarge1_mipsel.deb stable/main/binary-mipsel/libwpd8-dev_0.8.1-1sarge1_mipsel.deb stable/main/binary-mipsel/libwpd-stream8_0.8.1-1sarge1_mipsel.deb libwpd (0.8.1-1sarge1) stable-security; urgency=high * fix CVE-2007-0002 (various problems which could be used by remote attackers to execute arbitrary code or crash OOo) - thanks Steve Langasek stable/main/binary-mips/libwpd8-dev_0.8.1-1sarge1_mips.deb stable/main/binary-mips/libwpd-tools_0.8.1-1sarge1_mips.deb stable/main/binary-mips/libwpd8_0.8.1-1sarge1_mips.deb stable/main/binary-mips/libwpd-stream8_0.8.1-1sarge1_mips.deb libwpd (0.8.1-1sarge1) stable-security; urgency=high * fix CVE-2007-0002 (various problems which could be used by remote attackers to execute arbitrary code or crash OOo) - thanks Steve Langasek stable/main/binary-m68k/libwpd-tools_0.8.1-1sarge1_m68k.deb stable/main/binary-m68k/libwpd8-dev_0.8.1-1sarge1_m68k.deb stable/main/binary-m68k/libwpd-stream8_0.8.1-1sarge1_m68k.deb stable/main/binary-m68k/libwpd8_0.8.1-1sarge1_m68k.deb libwpd (0.8.1-1sarge1) stable-security; urgency=high * fix CVE-2007-0002 (various problems which could be used by remote attackers to execute arbitrary code or crash OOo) - thanks Steve Langasek stable/main/binary-ia64/libwpd-tools_0.8.1-1sarge1_ia64.deb stable/main/binary-ia64/libwpd-stream8_0.8.1-1sarge1_ia64.deb stable/main/binary-ia64/libwpd8_0.8.1-1sarge1_ia64.deb stable/main/binary-ia64/libwpd8-dev_0.8.1-1sarge1_ia64.deb libwpd (0.8.1-1sarge1) stable-security; urgency=high * fix CVE-2007-0002 (various problems which could be used by remote attackers to execute arbitrary code or crash OOo) - thanks Steve Langasek stable/main/binary-i386/libwpd-stream8_0.8.1-1sarge1_i386.deb stable/main/binary-i386/libwpd8_0.8.1-1sarge1_i386.deb stable/main/binary-i386/libwpd-tools_0.8.1-1sarge1_i386.deb stable/main/binary-i386/libwpd8-dev_0.8.1-1sarge1_i386.deb libwpd (0.8.1-1sarge1) stable-security; urgency=high * fix CVE-2007-0002 (various problems which could be used by remote attackers to execute arbitrary code or crash OOo) - thanks Steve Langasek stable/main/binary-hppa/libwpd8_0.8.1-1sarge1_hppa.deb stable/main/binary-hppa/libwpd8-dev_0.8.1-1sarge1_hppa.deb stable/main/binary-hppa/libwpd-tools_0.8.1-1sarge1_hppa.deb stable/main/binary-hppa/libwpd-stream8_0.8.1-1sarge1_hppa.deb libwpd (0.8.1-1sarge1) stable-security; urgency=high * fix CVE-2007-0002 (various problems which could be used by remote attackers to execute arbitrary code or crash OOo) - thanks Steve Langasek stable/main/binary-arm/libwpd8_0.8.1-1sarge1_arm.deb stable/main/binary-arm/libwpd-stream8_0.8.1-1sarge1_arm.deb stable/main/binary-arm/libwpd8-dev_0.8.1-1sarge1_arm.deb stable/main/binary-arm/libwpd-tools_0.8.1-1sarge1_arm.deb libwpd (0.8.1-1sarge1) stable-security; urgency=high * fix CVE-2007-0002 (various problems which could be used by remote attackers to execute arbitrary code or crash OOo) - thanks Steve Langasek stable/main/binary-alpha/libwpd8-dev_0.8.1-1sarge1_alpha.deb stable/main/binary-alpha/libwpd8_0.8.1-1sarge1_alpha.deb stable/main/binary-alpha/libwpd-tools_0.8.1-1sarge1_alpha.deb stable/main/binary-alpha/libwpd-stream8_0.8.1-1sarge1_alpha.deb libwpd (0.8.1-1sarge1) stable-security; urgency=high * fix CVE-2007-0002 (various problems which could be used by remote attackers to execute arbitrary code or crash OOo) - thanks Steve Langasek stable/main/binary-powerpc/libwpd-stream8_0.8.1-1sarge1_powerpc.deb stable/main/source/libwpd_0.8.1-1sarge1.diff.gz stable/main/binary-powerpc/libwpd8-dev_0.8.1-1sarge1_powerpc.deb stable/main/binary-powerpc/libwpd8_0.8.1-1sarge1_powerpc.deb stable/main/source/libwpd_0.8.1-1sarge1.dsc stable/main/binary-all/libwpd8-doc_0.8.1-1sarge1_all.deb stable/main/binary-powerpc/libwpd-tools_0.8.1-1sarge1_powerpc.deb libwpd (0.8.1-1sarge1) stable-security; urgency=high * fix CVE-2007-0002 (various problems which could be used by remote attackers to execute arbitrary code or crash OOo) - thanks Steve Langasek stable/main/binary-sparc/krb5-telnetd_1.3.6-2sarge4_sparc.deb stable/main/binary-sparc/krb5-ftpd_1.3.6-2sarge4_sparc.deb stable/main/binary-sparc/libkrb5-dev_1.3.6-2sarge4_sparc.deb stable/main/binary-sparc/krb5-rsh-server_1.3.6-2sarge4_sparc.deb stable/main/binary-sparc/krb5-user_1.3.6-2sarge4_sparc.deb stable/main/binary-sparc/krb5-admin-server_1.3.6-2sarge4_sparc.deb stable/main/binary-sparc/libkadm55_1.3.6-2sarge4_sparc.deb stable/main/binary-sparc/krb5-kdc_1.3.6-2sarge4_sparc.deb stable/main/binary-sparc/krb5-clients_1.3.6-2sarge4_sparc.deb stable/main/binary-sparc/libkrb53_1.3.6-2sarge4_sparc.deb krb5 (1.3.6-2sarge4) stable-security; urgency=emergency * MIT-SA-2007-1: telnet allows login as an arbitrary user when presented with a specially crafted username; CVE-2007-0956 * krb5_klog_syslog has a trivial buffer overflow that can be exploited by network data; CVE-2007-0957. The upstream patch is very intrusive because it fixes each call to syslog to have proper length checking as well as the actual krb5_klog_syslog internals to use vsnprintf rather than vsprintf. I have chosen to only include the change to krb5_klog_syslog for sarge. This is sufficient to fix the problem but is much smaller and less intrusive. (MIT-SA-2007-2) * MIT-SA-2007-3: The GSS-API library can cause a double free if applications treat certain errors decoding a message as errors that require freeing the output buffer. At least the gssapi rpc library does this, so kadmind is vulnerable. Fix the gssapi library because the spec allows applications to treat errors this way. CVE-2007-1216 stable/main/binary-s390/libkadm55_1.3.6-2sarge4_s390.deb stable/main/binary-s390/libkrb5-dev_1.3.6-2sarge4_s390.deb stable/main/binary-s390/krb5-telnetd_1.3.6-2sarge4_s390.deb stable/main/binary-s390/krb5-clients_1.3.6-2sarge4_s390.deb stable/main/binary-s390/krb5-rsh-server_1.3.6-2sarge4_s390.deb stable/main/binary-s390/krb5-kdc_1.3.6-2sarge4_s390.deb stable/main/binary-s390/krb5-user_1.3.6-2sarge4_s390.deb stable/main/binary-s390/krb5-admin-server_1.3.6-2sarge4_s390.deb stable/main/binary-s390/libkrb53_1.3.6-2sarge4_s390.deb stable/main/binary-s390/krb5-ftpd_1.3.6-2sarge4_s390.deb krb5 (1.3.6-2sarge4) stable-security; urgency=emergency * MIT-SA-2007-1: telnet allows login as an arbitrary user when presented with a specially crafted username; CVE-2007-0956 * krb5_klog_syslog has a trivial buffer overflow that can be exploited by network data; CVE-2007-0957. The upstream patch is very intrusive because it fixes each call to syslog to have proper length checking as well as the actual krb5_klog_syslog internals to use vsnprintf rather than vsprintf. I have chosen to only include the change to krb5_klog_syslog for sarge. This is sufficient to fix the problem but is much smaller and less intrusive. (MIT-SA-2007-2) * MIT-SA-2007-3: The GSS-API library can cause a double free if applications treat certain errors decoding a message as errors that require freeing the output buffer. At least the gssapi rpc library does this, so kadmind is vulnerable. Fix the gssapi library because the spec allows applications to treat errors this way. CVE-2007-1216 stable/main/binary-powerpc/libkadm55_1.3.6-2sarge4_powerpc.deb stable/main/binary-powerpc/krb5-clients_1.3.6-2sarge4_powerpc.deb stable/main/binary-powerpc/krb5-kdc_1.3.6-2sarge4_powerpc.deb stable/main/binary-powerpc/krb5-rsh-server_1.3.6-2sarge4_powerpc.deb stable/main/binary-powerpc/libkrb53_1.3.6-2sarge4_powerpc.deb stable/main/binary-powerpc/krb5-ftpd_1.3.6-2sarge4_powerpc.deb stable/main/binary-powerpc/libkrb5-dev_1.3.6-2sarge4_powerpc.deb stable/main/binary-powerpc/krb5-admin-server_1.3.6-2sarge4_powerpc.deb stable/main/binary-powerpc/krb5-telnetd_1.3.6-2sarge4_powerpc.deb stable/main/binary-powerpc/krb5-user_1.3.6-2sarge4_powerpc.deb krb5 (1.3.6-2sarge4) stable-security; urgency=emergency * MIT-SA-2007-1: telnet allows login as an arbitrary user when presented with a specially crafted username; CVE-2007-0956 * krb5_klog_syslog has a trivial buffer overflow that can be exploited by network data; CVE-2007-0957. The upstream patch is very intrusive because it fixes each call to syslog to have proper length checking as well as the actual krb5_klog_syslog internals to use vsnprintf rather than vsprintf. I have chosen to only include the change to krb5_klog_syslog for sarge. This is sufficient to fix the problem but is much smaller and less intrusive. (MIT-SA-2007-2) * MIT-SA-2007-3: The GSS-API library can cause a double free if applications treat certain errors decoding a message as errors that require freeing the output buffer. At least the gssapi rpc library does this, so kadmind is vulnerable. Fix the gssapi library because the spec allows applications to treat errors this way. CVE-2007-1216 stable/main/binary-mipsel/krb5-user_1.3.6-2sarge4_mipsel.deb stable/main/binary-mipsel/krb5-rsh-server_1.3.6-2sarge4_mipsel.deb stable/main/binary-mipsel/libkrb53_1.3.6-2sarge4_mipsel.deb stable/main/binary-mipsel/krb5-clients_1.3.6-2sarge4_mipsel.deb stable/main/binary-mipsel/krb5-kdc_1.3.6-2sarge4_mipsel.deb stable/main/binary-mipsel/libkadm55_1.3.6-2sarge4_mipsel.deb stable/main/binary-mipsel/krb5-admin-server_1.3.6-2sarge4_mipsel.deb stable/main/binary-mipsel/libkrb5-dev_1.3.6-2sarge4_mipsel.deb stable/main/binary-mipsel/krb5-telnetd_1.3.6-2sarge4_mipsel.deb stable/main/binary-mipsel/krb5-ftpd_1.3.6-2sarge4_mipsel.deb krb5 (1.3.6-2sarge4) stable-security; urgency=emergency * MIT-SA-2007-1: telnet allows login as an arbitrary user when presented with a specially crafted username; CVE-2007-0956 * krb5_klog_syslog has a trivial buffer overflow that can be exploited by network data; CVE-2007-0957. The upstream patch is very intrusive because it fixes each call to syslog to have proper length checking as well as the actual krb5_klog_syslog internals to use vsnprintf rather than vsprintf. I have chosen to only include the change to krb5_klog_syslog for sarge. This is sufficient to fix the problem but is much smaller and less intrusive. (MIT-SA-2007-2) * MIT-SA-2007-3: The GSS-API library can cause a double free if applications treat certain errors decoding a message as errors that require freeing the output buffer. At least the gssapi rpc library does this, so kadmind is vulnerable. Fix the gssapi library because the spec allows applications to treat errors this way. CVE-2007-1216 stable/main/binary-mips/krb5-kdc_1.3.6-2sarge4_mips.deb stable/main/binary-mips/libkrb5-dev_1.3.6-2sarge4_mips.deb stable/main/binary-mips/libkadm55_1.3.6-2sarge4_mips.deb stable/main/binary-mips/krb5-ftpd_1.3.6-2sarge4_mips.deb stable/main/binary-mips/krb5-user_1.3.6-2sarge4_mips.deb stable/main/binary-mips/krb5-rsh-server_1.3.6-2sarge4_mips.deb stable/main/binary-mips/krb5-telnetd_1.3.6-2sarge4_mips.deb stable/main/binary-mips/krb5-admin-server_1.3.6-2sarge4_mips.deb stable/main/binary-mips/libkrb53_1.3.6-2sarge4_mips.deb stable/main/binary-mips/krb5-clients_1.3.6-2sarge4_mips.deb krb5 (1.3.6-2sarge4) stable-security; urgency=emergency * MIT-SA-2007-1: telnet allows login as an arbitrary user when presented with a specially crafted username; CVE-2007-0956 * krb5_klog_syslog has a trivial buffer overflow that can be exploited by network data; CVE-2007-0957. The upstream patch is very intrusive because it fixes each call to syslog to have proper length checking as well as the actual krb5_klog_syslog internals to use vsnprintf rather than vsprintf. I have chosen to only include the change to krb5_klog_syslog for sarge. This is sufficient to fix the problem but is much smaller and less intrusive. (MIT-SA-2007-2) * MIT-SA-2007-3: The GSS-API library can cause a double free if applications treat certain errors decoding a message as errors that require freeing the output buffer. At least the gssapi rpc library does this, so kadmind is vulnerable. Fix the gssapi library because the spec allows applications to treat errors this way. CVE-2007-1216 stable/main/binary-m68k/krb5-ftpd_1.3.6-2sarge4_m68k.deb stable/main/binary-m68k/krb5-rsh-server_1.3.6-2sarge4_m68k.deb stable/main/binary-m68k/libkrb53_1.3.6-2sarge4_m68k.deb stable/main/binary-m68k/krb5-kdc_1.3.6-2sarge4_m68k.deb stable/main/binary-m68k/libkrb5-dev_1.3.6-2sarge4_m68k.deb stable/main/binary-m68k/krb5-user_1.3.6-2sarge4_m68k.deb stable/main/binary-m68k/krb5-telnetd_1.3.6-2sarge4_m68k.deb stable/main/binary-m68k/krb5-clients_1.3.6-2sarge4_m68k.deb stable/main/binary-m68k/libkadm55_1.3.6-2sarge4_m68k.deb stable/main/binary-m68k/krb5-admin-server_1.3.6-2sarge4_m68k.deb krb5 (1.3.6-2sarge4) stable-security; urgency=emergency * MIT-SA-2007-1: telnet allows login as an arbitrary user when presented with a specially crafted username; CVE-2007-0956 * krb5_klog_syslog has a trivial buffer overflow that can be exploited by network data; CVE-2007-0957. The upstream patch is very intrusive because it fixes each call to syslog to have proper length checking as well as the actual krb5_klog_syslog internals to use vsnprintf rather than vsprintf. I have chosen to only include the change to krb5_klog_syslog for sarge. This is sufficient to fix the problem but is much smaller and less intrusive. (MIT-SA-2007-2) * MIT-SA-2007-3: The GSS-API library can cause a double free if applications treat certain errors decoding a message as errors that require freeing the output buffer. At least the gssapi rpc library does this, so kadmind is vulnerable. Fix the gssapi library because the spec allows applications to treat errors this way. CVE-2007-1216 stable/main/binary-ia64/libkadm55_1.3.6-2sarge4_ia64.deb stable/main/binary-ia64/krb5-kdc_1.3.6-2sarge4_ia64.deb stable/main/binary-ia64/libkrb53_1.3.6-2sarge4_ia64.deb stable/main/binary-ia64/krb5-user_1.3.6-2sarge4_ia64.deb stable/main/binary-ia64/libkrb5-dev_1.3.6-2sarge4_ia64.deb stable/main/binary-ia64/krb5-ftpd_1.3.6-2sarge4_ia64.deb stable/main/binary-ia64/krb5-telnetd_1.3.6-2sarge4_ia64.deb stable/main/binary-ia64/krb5-rsh-server_1.3.6-2sarge4_ia64.deb stable/main/binary-ia64/krb5-clients_1.3.6-2sarge4_ia64.deb stable/main/binary-ia64/krb5-admin-server_1.3.6-2sarge4_ia64.deb krb5 (1.3.6-2sarge4) stable-security; urgency=emergency * MIT-SA-2007-1: telnet allows login as an arbitrary user when presented with a specially crafted username; CVE-2007-0956 * krb5_klog_syslog has a trivial buffer overflow that can be exploited by network data; CVE-2007-0957. The upstream patch is very intrusive because it fixes each call to syslog to have proper length checking as well as the actual krb5_klog_syslog internals to use vsnprintf rather than vsprintf. I have chosen to only include the change to krb5_klog_syslog for sarge. This is sufficient to fix the problem but is much smaller and less intrusive. (MIT-SA-2007-2) * MIT-SA-2007-3: The GSS-API library can cause a double free if applications treat certain errors decoding a message as errors that require freeing the output buffer. At least the gssapi rpc library does this, so kadmind is vulnerable. Fix the gssapi library because the spec allows applications to treat errors this way. CVE-2007-1216 stable/main/binary-hppa/libkadm55_1.3.6-2sarge4_hppa.deb stable/main/binary-hppa/libkrb53_1.3.6-2sarge4_hppa.deb stable/main/binary-hppa/krb5-rsh-server_1.3.6-2sarge4_hppa.deb stable/main/binary-hppa/libkrb5-dev_1.3.6-2sarge4_hppa.deb stable/main/binary-hppa/krb5-ftpd_1.3.6-2sarge4_hppa.deb stable/main/binary-hppa/krb5-user_1.3.6-2sarge4_hppa.deb stable/main/binary-hppa/krb5-telnetd_1.3.6-2sarge4_hppa.deb stable/main/binary-hppa/krb5-admin-server_1.3.6-2sarge4_hppa.deb stable/main/binary-hppa/krb5-clients_1.3.6-2sarge4_hppa.deb stable/main/binary-hppa/krb5-kdc_1.3.6-2sarge4_hppa.deb krb5 (1.3.6-2sarge4) stable-security; urgency=emergency * MIT-SA-2007-1: telnet allows login as an arbitrary user when presented with a specially crafted username; CVE-2007-0956 * krb5_klog_syslog has a trivial buffer overflow that can be exploited by network data; CVE-2007-0957. The upstream patch is very intrusive because it fixes each call to syslog to have proper length checking as well as the actual krb5_klog_syslog internals to use vsnprintf rather than vsprintf. I have chosen to only include the change to krb5_klog_syslog for sarge. This is sufficient to fix the problem but is much smaller and less intrusive. (MIT-SA-2007-2) * MIT-SA-2007-3: The GSS-API library can cause a double free if applications treat certain errors decoding a message as errors that require freeing the output buffer. At least the gssapi rpc library does this, so kadmind is vulnerable. Fix the gssapi library because the spec allows applications to treat errors this way. CVE-2007-1216 stable/main/binary-arm/libkrb5-dev_1.3.6-2sarge4_arm.deb stable/main/binary-arm/krb5-rsh-server_1.3.6-2sarge4_arm.deb stable/main/binary-arm/krb5-kdc_1.3.6-2sarge4_arm.deb stable/main/binary-arm/krb5-user_1.3.6-2sarge4_arm.deb stable/main/binary-arm/krb5-clients_1.3.6-2sarge4_arm.deb stable/main/binary-arm/libkrb53_1.3.6-2sarge4_arm.deb stable/main/binary-arm/libkadm55_1.3.6-2sarge4_arm.deb stable/main/binary-arm/krb5-admin-server_1.3.6-2sarge4_arm.deb stable/main/binary-arm/krb5-ftpd_1.3.6-2sarge4_arm.deb stable/main/binary-arm/krb5-telnetd_1.3.6-2sarge4_arm.deb krb5 (1.3.6-2sarge4) stable-security; urgency=emergency * MIT-SA-2007-1: telnet allows login as an arbitrary user when presented with a specially crafted username; CVE-2007-0956 * krb5_klog_syslog has a trivial buffer overflow that can be exploited by network data; CVE-2007-0957. The upstream patch is very intrusive because it fixes each call to syslog to have proper length checking as well as the actual krb5_klog_syslog internals to use vsnprintf rather than vsprintf. I have chosen to only include the change to krb5_klog_syslog for sarge. This is sufficient to fix the problem but is much smaller and less intrusive. (MIT-SA-2007-2) * MIT-SA-2007-3: The GSS-API library can cause a double free if applications treat certain errors decoding a message as errors that require freeing the output buffer. At least the gssapi rpc library does this, so kadmind is vulnerable. Fix the gssapi library because the spec allows applications to treat errors this way. CVE-2007-1216 stable/main/binary-alpha/libkrb53_1.3.6-2sarge4_alpha.deb stable/main/binary-alpha/krb5-admin-server_1.3.6-2sarge4_alpha.deb stable/main/binary-alpha/krb5-rsh-server_1.3.6-2sarge4_alpha.deb stable/main/binary-alpha/krb5-clients_1.3.6-2sarge4_alpha.deb stable/main/binary-alpha/krb5-kdc_1.3.6-2sarge4_alpha.deb stable/main/binary-alpha/krb5-user_1.3.6-2sarge4_alpha.deb stable/main/binary-alpha/libkadm55_1.3.6-2sarge4_alpha.deb stable/main/binary-alpha/libkrb5-dev_1.3.6-2sarge4_alpha.deb stable/main/binary-alpha/krb5-ftpd_1.3.6-2sarge4_alpha.deb stable/main/binary-alpha/krb5-telnetd_1.3.6-2sarge4_alpha.deb krb5 (1.3.6-2sarge4) stable-security; urgency=emergency * MIT-SA-2007-1: telnet allows login as an arbitrary user when presented with a specially crafted username; CVE-2007-0956 * krb5_klog_syslog has a trivial buffer overflow that can be exploited by network data; CVE-2007-0957. The upstream patch is very intrusive because it fixes each call to syslog to have proper length checking as well as the actual krb5_klog_syslog internals to use vsnprintf rather than vsprintf. I have chosen to only include the change to krb5_klog_syslog for sarge. This is sufficient to fix the problem but is much smaller and less intrusive. (MIT-SA-2007-2) * MIT-SA-2007-3: The GSS-API library can cause a double free if applications treat certain errors decoding a message as errors that require freeing the output buffer. At least the gssapi rpc library does this, so kadmind is vulnerable. Fix the gssapi library because the spec allows applications to treat errors this way. CVE-2007-1216 stable/main/source/krb5_1.3.6-2sarge4.diff.gz stable/main/binary-i386/krb5-ftpd_1.3.6-2sarge4_i386.deb stable/main/binary-i386/krb5-admin-server_1.3.6-2sarge4_i386.deb stable/main/binary-i386/libkrb5-dev_1.3.6-2sarge4_i386.deb stable/main/binary-i386/krb5-telnetd_1.3.6-2sarge4_i386.deb stable/main/binary-all/krb5-doc_1.3.6-2sarge4_all.deb stable/main/binary-i386/krb5-user_1.3.6-2sarge4_i386.deb stable/main/binary-i386/krb5-clients_1.3.6-2sarge4_i386.deb stable/main/binary-i386/krb5-kdc_1.3.6-2sarge4_i386.deb stable/main/binary-i386/libkadm55_1.3.6-2sarge4_i386.deb stable/main/binary-i386/libkrb53_1.3.6-2sarge4_i386.deb stable/main/source/krb5_1.3.6-2sarge4.dsc stable/main/binary-i386/krb5-rsh-server_1.3.6-2sarge4_i386.deb krb5 (1.3.6-2sarge4) stable-security; urgency=emergency * MIT-SA-2007-1: telnet allows login as an arbitrary user when presented with a specially crafted username; CVE-2007-0956 * krb5_klog_syslog has a trivial buffer overflow that can be exploited by network data; CVE-2007-0957. The upstream patch is very intrusive because it fixes each call to syslog to have proper length checking as well as the actual krb5_klog_syslog internals to use vsnprintf rather than vsprintf. I have chosen to only include the change to krb5_klog_syslog for sarge. This is sufficient to fix the problem but is much smaller and less intrusive. (MIT-SA-2007-2) * MIT-SA-2007-3: The GSS-API library can cause a double free if applications treat certain errors decoding a message as errors that require freeing the output buffer. At least the gssapi rpc library does this, so kadmind is vulnerable. Fix the gssapi library because the spec allows applications to treat errors this way. CVE-2007-1216 stable/main/binary-sparc/gnupg_1.4.1-1.sarge7_sparc.deb stable/main/binary-sparc/gpgv-udeb_1.4.1-1.sarge7_sparc.udeb gnupg (1.4.1-1.sarge7) stable-security; urgency=high * Non-maintainer upload by the Security Team * Backported patch from upstream 1.4.7 for CVE-2007-1263. stable/main/binary-s390/gnupg_1.4.1-1.sarge7_s390.deb stable/main/binary-s390/gpgv-udeb_1.4.1-1.sarge7_s390.udeb gnupg (1.4.1-1.sarge7) stable-security; urgency=high * Non-maintainer upload by the Security Team * Backported patch from upstream 1.4.7 for CVE-2007-1263. stable/main/binary-powerpc/gpgv-udeb_1.4.1-1.sarge7_powerpc.udeb stable/main/binary-powerpc/gnupg_1.4.1-1.sarge7_powerpc.deb gnupg (1.4.1-1.sarge7) stable-security; urgency=high * Non-maintainer upload by the Security Team * Backported patch from upstream 1.4.7 for CVE-2007-1263. stable/main/binary-mipsel/gnupg_1.4.1-1.sarge7_mipsel.deb stable/main/binary-mipsel/gpgv-udeb_1.4.1-1.sarge7_mipsel.udeb gnupg (1.4.1-1.sarge7) stable-security; urgency=high * Non-maintainer upload by the Security Team * Backported patch from upstream 1.4.7 for CVE-2007-1263. stable/main/binary-mips/gpgv-udeb_1.4.1-1.sarge7_mips.udeb stable/main/binary-mips/gnupg_1.4.1-1.sarge7_mips.deb gnupg (1.4.1-1.sarge7) stable-security; urgency=high * Non-maintainer upload by the Security Team * Backported patch from upstream 1.4.7 for CVE-2007-1263. stable/main/binary-m68k/gpgv-udeb_1.4.1-1.sarge7_m68k.udeb stable/main/binary-m68k/gnupg_1.4.1-1.sarge7_m68k.deb gnupg (1.4.1-1.sarge7) stable-security; urgency=high * Non-maintainer upload by the Security Team * Backported patch from upstream 1.4.7 for CVE-2007-1263. stable/main/binary-ia64/gpgv-udeb_1.4.1-1.sarge7_ia64.udeb stable/main/binary-ia64/gnupg_1.4.1-1.sarge7_ia64.deb gnupg (1.4.1-1.sarge7) stable-security; urgency=high * Non-maintainer upload by the Security Team * Backported patch from upstream 1.4.7 for CVE-2007-1263. stable/main/binary-hppa/gnupg_1.4.1-1.sarge7_hppa.deb stable/main/binary-hppa/gpgv-udeb_1.4.1-1.sarge7_hppa.udeb gnupg (1.4.1-1.sarge7) stable-security; urgency=high * Non-maintainer upload by the Security Team * Backported patch from upstream 1.4.7 for CVE-2007-1263. stable/main/binary-arm/gnupg_1.4.1-1.sarge7_arm.deb stable/main/binary-arm/gpgv-udeb_1.4.1-1.sarge7_arm.udeb gnupg (1.4.1-1.sarge7) stable-security; urgency=high * Non-maintainer upload by the Security Team * Backported patch from upstream 1.4.7 for CVE-2007-1263. stable/main/binary-alpha/gpgv-udeb_1.4.1-1.sarge7_alpha.udeb stable/main/binary-alpha/gnupg_1.4.1-1.sarge7_alpha.deb gnupg (1.4.1-1.sarge7) stable-security; urgency=high * Non-maintainer upload by the Security Team * Backported patch from upstream 1.4.7 for CVE-2007-1263. stable/main/binary-i386/gnupg_1.4.1-1.sarge7_i386.deb stable/main/source/gnupg_1.4.1-1.sarge7.diff.gz stable/main/binary-i386/gpgv-udeb_1.4.1-1.sarge7_i386.udeb stable/main/source/gnupg_1.4.1-1.sarge7.dsc gnupg (1.4.1-1.sarge7) stable-security; urgency=high * Non-maintainer upload by the Security Team * Backported patch from upstream 1.4.7 for CVE-2007-1263. stable/main/binary-sparc/gnomemeeting_1.2.1-1sarge1_sparc.deb gnomemeeting (1.2.1-1sarge1) stable-security; urgency=high * Backported fixes for Ekiga/GnomeMeeting CVE-2007-1006/CVE-2007-1007 stable/main/binary-s390/gnomemeeting_1.2.1-1sarge1_s390.deb gnomemeeting (1.2.1-1sarge1) stable-security; urgency=high * Backported fixes for Ekiga/GnomeMeeting CVE-2007-1006/CVE-2007-1007 stable/main/binary-powerpc/gnomemeeting_1.2.1-1sarge1_powerpc.deb gnomemeeting (1.2.1-1sarge1) stable-security; urgency=high * Backported fixes for Ekiga/GnomeMeeting CVE-2007-1006/CVE-2007-1007 stable/main/binary-mipsel/gnomemeeting_1.2.1-1sarge1_mipsel.deb gnomemeeting (1.2.1-1sarge1) stable-security; urgency=high * Backported fixes for Ekiga/GnomeMeeting CVE-2007-1006/CVE-2007-1007 stable/main/binary-mips/gnomemeeting_1.2.1-1sarge1_mips.deb gnomemeeting (1.2.1-1sarge1) stable-security; urgency=high * Backported fixes for Ekiga/GnomeMeeting CVE-2007-1006/CVE-2007-1007 stable/main/binary-m68k/gnomemeeting_1.2.1-1sarge1_m68k.deb gnomemeeting (1.2.1-1sarge1) stable-security; urgency=high * Backported fixes for Ekiga/GnomeMeeting CVE-2007-1006/CVE-2007-1007 stable/main/binary-ia64/gnomemeeting_1.2.1-1sarge1_ia64.deb gnomemeeting (1.2.1-1sarge1) stable-security; urgency=high * Backported fixes for Ekiga/GnomeMeeting CVE-2007-1006/CVE-2007-1007 stable/main/binary-hppa/gnomemeeting_1.2.1-1sarge1_hppa.deb gnomemeeting (1.2.1-1sarge1) stable-security; urgency=high * Backported fixes for Ekiga/GnomeMeeting CVE-2007-1006/CVE-2007-1007 stable/main/binary-arm/gnomemeeting_1.2.1-1sarge1_arm.deb gnomemeeting (1.2.1-1sarge1) stable-security; urgency=high * Backported fixes for Ekiga/GnomeMeeting CVE-2007-1006/CVE-2007-1007 stable/main/binary-alpha/gnomemeeting_1.2.1-1sarge1_alpha.deb gnomemeeting (1.2.1-1sarge1) stable-security; urgency=high * Backported fixes for Ekiga/GnomeMeeting CVE-2007-1006/CVE-2007-1007 stable/main/source/gnomemeeting_1.2.1-1sarge1.diff.gz stable/main/binary-i386/gnomemeeting_1.2.1-1sarge1_i386.deb stable/main/source/gnomemeeting_1.2.1-1sarge1.dsc gnomemeeting (1.2.1-1sarge1) stable-security; urgency=high * Backported fixes for Ekiga/GnomeMeeting CVE-2007-1006/CVE-2007-1007 stable/main/binary-s390/libnss-files-udeb_2.3.2.ds1-22sarge6_s390.udeb stable/main/binary-s390/libc6-pic_2.3.2.ds1-22sarge6_s390.deb stable/main/binary-s390/libc6-s390x_2.3.2.ds1-22sarge6_s390.deb stable/main/binary-s390/libnss-dns-udeb_2.3.2.ds1-22sarge6_s390.udeb stable/main/binary-s390/libc6-dev-s390x_2.3.2.ds1-22sarge6_s390.deb stable/main/binary-s390/libc6-dbg_2.3.2.ds1-22sarge6_s390.deb stable/main/binary-s390/libc6_2.3.2.ds1-22sarge6_s390.deb stable/main/binary-s390/libc6-prof_2.3.2.ds1-22sarge6_s390.deb stable/main/binary-s390/libc6-dev_2.3.2.ds1-22sarge6_s390.deb stable/main/binary-s390/nscd_2.3.2.ds1-22sarge6_s390.deb stable/main/binary-s390/libc6-udeb_2.3.2.ds1-22sarge6_s390.udeb glibc (2.3.2.ds1-22sarge6) stable; urgency=low * control.in/main, rules.d/debhelper.mk: use dh_shlibdeps to set the dependencies of nscd. stable/main/binary-powerpc/libc6-pic_2.3.2.ds1-22sarge6_powerpc.deb stable/main/binary-powerpc/libc6-dbg_2.3.2.ds1-22sarge6_powerpc.deb stable/main/binary-powerpc/libc6-udeb_2.3.2.ds1-22sarge6_powerpc.udeb stable/main/binary-powerpc/libc6-dev_2.3.2.ds1-22sarge6_powerpc.deb stable/main/binary-powerpc/nscd_2.3.2.ds1-22sarge6_powerpc.deb stable/main/binary-powerpc/libc6_2.3.2.ds1-22sarge6_powerpc.deb stable/main/binary-powerpc/libc6-prof_2.3.2.ds1-22sarge6_powerpc.deb stable/main/binary-powerpc/libnss-files-udeb_2.3.2.ds1-22sarge6_powerpc.udeb stable/main/binary-powerpc/libnss-dns-udeb_2.3.2.ds1-22sarge6_powerpc.udeb glibc (2.3.2.ds1-22sarge6) stable; urgency=low * control.in/main, rules.d/debhelper.mk: use dh_shlibdeps to set the dependencies of nscd. stable/main/binary-mipsel/libnss-files-udeb_2.3.2.ds1-22sarge6_mipsel.udeb stable/main/binary-mipsel/libnss-dns-udeb_2.3.2.ds1-22sarge6_mipsel.udeb stable/main/binary-mipsel/libc6-udeb_2.3.2.ds1-22sarge6_mipsel.udeb stable/main/binary-mipsel/libc6-prof_2.3.2.ds1-22sarge6_mipsel.deb stable/main/binary-mipsel/libc6-dbg_2.3.2.ds1-22sarge6_mipsel.deb stable/main/binary-mipsel/libc6-pic_2.3.2.ds1-22sarge6_mipsel.deb stable/main/binary-mipsel/libc6_2.3.2.ds1-22sarge6_mipsel.deb stable/main/binary-mipsel/libc6-dev_2.3.2.ds1-22sarge6_mipsel.deb stable/main/binary-mipsel/nscd_2.3.2.ds1-22sarge6_mipsel.deb glibc (2.3.2.ds1-22sarge6) stable; urgency=low * control.in/main, rules.d/debhelper.mk: use dh_shlibdeps to set the dependencies of nscd. stable/main/binary-mips/libc6-prof_2.3.2.ds1-22sarge6_mips.deb stable/main/binary-mips/libc6_2.3.2.ds1-22sarge6_mips.deb stable/main/binary-mips/libc6-dbg_2.3.2.ds1-22sarge6_mips.deb stable/main/binary-mips/nscd_2.3.2.ds1-22sarge6_mips.deb stable/main/binary-mips/libnss-dns-udeb_2.3.2.ds1-22sarge6_mips.udeb stable/main/binary-mips/libc6-udeb_2.3.2.ds1-22sarge6_mips.udeb stable/main/binary-mips/libnss-files-udeb_2.3.2.ds1-22sarge6_mips.udeb stable/main/binary-mips/libc6-pic_2.3.2.ds1-22sarge6_mips.deb stable/main/binary-mips/libc6-dev_2.3.2.ds1-22sarge6_mips.deb glibc (2.3.2.ds1-22sarge6) stable; urgency=low * control.in/main, rules.d/debhelper.mk: use dh_shlibdeps to set the dependencies of nscd. stable/main/binary-m68k/libc6-prof_2.3.2.ds1-22sarge6_m68k.deb stable/main/binary-m68k/libnss-dns-udeb_2.3.2.ds1-22sarge6_m68k.udeb stable/main/binary-m68k/libc6-dbg_2.3.2.ds1-22sarge6_m68k.deb stable/main/binary-m68k/nscd_2.3.2.ds1-22sarge6_m68k.deb stable/main/binary-m68k/libc6_2.3.2.ds1-22sarge6_m68k.deb stable/main/binary-m68k/libc6-udeb_2.3.2.ds1-22sarge6_m68k.udeb stable/main/binary-m68k/libc6-dev_2.3.2.ds1-22sarge6_m68k.deb stable/main/binary-m68k/libnss-files-udeb_2.3.2.ds1-22sarge6_m68k.udeb stable/main/binary-m68k/libc6-pic_2.3.2.ds1-22sarge6_m68k.deb glibc (2.3.2.ds1-22sarge6) stable; urgency=low * control.in/main, rules.d/debhelper.mk: use dh_shlibdeps to set the dependencies of nscd. stable/main/binary-ia64/libnss-dns-udeb_2.3.2.ds1-22sarge6_ia64.udeb stable/main/binary-ia64/libc6.1-dbg_2.3.2.ds1-22sarge6_ia64.deb stable/main/binary-ia64/libc6.1_2.3.2.ds1-22sarge6_ia64.deb stable/main/binary-ia64/libc6.1-udeb_2.3.2.ds1-22sarge6_ia64.udeb stable/main/binary-ia64/libc6.1-dev_2.3.2.ds1-22sarge6_ia64.deb stable/main/binary-ia64/libnss-files-udeb_2.3.2.ds1-22sarge6_ia64.udeb stable/main/binary-ia64/nscd_2.3.2.ds1-22sarge6_ia64.deb stable/main/binary-ia64/libc6.1-prof_2.3.2.ds1-22sarge6_ia64.deb stable/main/binary-ia64/libc6.1-pic_2.3.2.ds1-22sarge6_ia64.deb glibc (2.3.2.ds1-22sarge6) stable; urgency=low * control.in/main, rules.d/debhelper.mk: use dh_shlibdeps to set the dependencies of nscd. stable/main/binary-i386/nscd_2.3.2.ds1-22sarge6_i386.deb stable/main/binary-i386/libc6-pic_2.3.2.ds1-22sarge6_i386.deb stable/main/binary-i386/libc6-dev_2.3.2.ds1-22sarge6_i386.deb stable/main/binary-i386/libc6_2.3.2.ds1-22sarge6_i386.deb stable/main/binary-i386/libc6-prof_2.3.2.ds1-22sarge6_i386.deb stable/main/binary-i386/libnss-dns-udeb_2.3.2.ds1-22sarge6_i386.udeb stable/main/binary-i386/libc6-dbg_2.3.2.ds1-22sarge6_i386.deb stable/main/binary-i386/libc6-i686_2.3.2.ds1-22sarge6_i386.deb stable/main/binary-i386/libnss-files-udeb_2.3.2.ds1-22sarge6_i386.udeb stable/main/binary-i386/libc6-udeb_2.3.2.ds1-22sarge6_i386.udeb glibc (2.3.2.ds1-22sarge6) stable; urgency=low * control.in/main, rules.d/debhelper.mk: use dh_shlibdeps to set the dependencies of nscd. stable/main/binary-hppa/libc6-dbg_2.3.2.ds1-22sarge6_hppa.deb stable/main/binary-hppa/libc6-udeb_2.3.2.ds1-22sarge6_hppa.udeb stable/main/binary-hppa/libc6-prof_2.3.2.ds1-22sarge6_hppa.deb stable/main/binary-hppa/libc6-dev_2.3.2.ds1-22sarge6_hppa.deb stable/main/binary-hppa/libc6_2.3.2.ds1-22sarge6_hppa.deb stable/main/binary-hppa/libnss-files-udeb_2.3.2.ds1-22sarge6_hppa.udeb stable/main/binary-hppa/libc6-pic_2.3.2.ds1-22sarge6_hppa.deb stable/main/binary-hppa/nscd_2.3.2.ds1-22sarge6_hppa.deb stable/main/binary-hppa/libnss-dns-udeb_2.3.2.ds1-22sarge6_hppa.udeb glibc (2.3.2.ds1-22sarge6) stable; urgency=low * control.in/main, rules.d/debhelper.mk: use dh_shlibdeps to set the dependencies of nscd. stable/main/binary-arm/libc6-dev_2.3.2.ds1-22sarge6_arm.deb stable/main/binary-arm/libnss-dns-udeb_2.3.2.ds1-22sarge6_arm.udeb stable/main/binary-arm/libc6-dbg_2.3.2.ds1-22sarge6_arm.deb stable/main/binary-arm/libc6_2.3.2.ds1-22sarge6_arm.deb stable/main/binary-arm/libc6-prof_2.3.2.ds1-22sarge6_arm.deb stable/main/binary-arm/libnss-files-udeb_2.3.2.ds1-22sarge6_arm.udeb stable/main/binary-arm/libc6-pic_2.3.2.ds1-22sarge6_arm.deb stable/main/binary-arm/libc6-udeb_2.3.2.ds1-22sarge6_arm.udeb stable/main/binary-arm/nscd_2.3.2.ds1-22sarge6_arm.deb glibc (2.3.2.ds1-22sarge6) stable; urgency=low * control.in/main, rules.d/debhelper.mk: use dh_shlibdeps to set the dependencies of nscd. stable/main/binary-alpha/libnss-dns-udeb_2.3.2.ds1-22sarge6_alpha.udeb stable/main/binary-alpha/libc6.1-dev_2.3.2.ds1-22sarge6_alpha.deb stable/main/binary-alpha/libc6.1-dbg_2.3.2.ds1-22sarge6_alpha.deb stable/main/binary-alpha/libc6.1-udeb_2.3.2.ds1-22sarge6_alpha.udeb stable/main/binary-alpha/libc6.1-prof_2.3.2.ds1-22sarge6_alpha.deb stable/main/binary-alpha/libc6.1-pic_2.3.2.ds1-22sarge6_alpha.deb stable/main/binary-alpha/libnss-files-udeb_2.3.2.ds1-22sarge6_alpha.udeb stable/main/binary-alpha/libc6.1_2.3.2.ds1-22sarge6_alpha.deb stable/main/binary-alpha/nscd_2.3.2.ds1-22sarge6_alpha.deb glibc (2.3.2.ds1-22sarge6) stable; urgency=low * control.in/main, rules.d/debhelper.mk: use dh_shlibdeps to set the dependencies of nscd. stable/main/binary-sparc/libc6-udeb_2.3.2.ds1-22sarge6_sparc.udeb stable/main/binary-sparc/nscd_2.3.2.ds1-22sarge6_sparc.deb stable/main/binary-sparc/libnss-files-udeb_2.3.2.ds1-22sarge6_sparc.udeb stable/main/binary-sparc/libc6-prof_2.3.2.ds1-22sarge6_sparc.deb stable/main/binary-all/locales_2.3.2.ds1-22sarge6_all.deb stable/main/binary-sparc/libc6-sparcv9b_2.3.2.ds1-22sarge6_sparc.deb stable/main/source/glibc_2.3.2.ds1-22sarge6.diff.gz stable/main/binary-sparc/libc6-sparc64_2.3.2.ds1-22sarge6_sparc.deb stable/main/source/glibc_2.3.2.ds1-22sarge6.dsc stable/main/binary-sparc/libc6_2.3.2.ds1-22sarge6_sparc.deb stable/main/binary-all/glibc-doc_2.3.2.ds1-22sarge6_all.deb stable/main/binary-sparc/libc6-pic_2.3.2.ds1-22sarge6_sparc.deb stable/main/binary-sparc/libc6-dev-sparc64_2.3.2.ds1-22sarge6_sparc.deb stable/main/binary-sparc/libnss-dns-udeb_2.3.2.ds1-22sarge6_sparc.udeb stable/main/binary-sparc/libc6-dbg_2.3.2.ds1-22sarge6_sparc.deb stable/main/binary-sparc/libc6-sparcv9_2.3.2.ds1-22sarge6_sparc.deb stable/main/binary-sparc/libc6-dev_2.3.2.ds1-22sarge6_sparc.deb glibc (2.3.2.ds1-22sarge6) stable; urgency=low * control.in/main, rules.d/debhelper.mk: use dh_shlibdeps to set the dependencies of nscd. stable/main/binary-sparc/file_4.12-1sarge1_sparc.deb stable/main/binary-sparc/libmagic-dev_4.12-1sarge1_sparc.deb stable/main/binary-sparc/libmagic1_4.12-1sarge1_sparc.deb file (4.12-1sarge1) stable-security; urgency=high * Applied patch from upstream to src/file.h, src/funcs.c and src/magic.c to fix integer underflow in file_printf which can lead to to exploitable heap overflow CVE-2007-1536 (Closes: #415362, #416678). stable/main/binary-s390/file_4.12-1sarge1_s390.deb stable/main/binary-s390/libmagic-dev_4.12-1sarge1_s390.deb stable/main/binary-s390/libmagic1_4.12-1sarge1_s390.deb file (4.12-1sarge1) stable-security; urgency=high * Applied patch from upstream to src/file.h, src/funcs.c and src/magic.c to fix integer underflow in file_printf which can lead to to exploitable heap overflow CVE-2007-1536 (Closes: #415362, #416678). stable/main/binary-powerpc/libmagic1_4.12-1sarge1_powerpc.deb stable/main/binary-powerpc/file_4.12-1sarge1_powerpc.deb stable/main/binary-powerpc/libmagic-dev_4.12-1sarge1_powerpc.deb file (4.12-1sarge1) stable-security; urgency=high * Applied patch from upstream to src/file.h, src/funcs.c and src/magic.c to fix integer underflow in file_printf which can lead to to exploitable heap overflow CVE-2007-1536 (Closes: #415362, #416678). stable/main/binary-mipsel/libmagic-dev_4.12-1sarge1_mipsel.deb stable/main/binary-mipsel/libmagic1_4.12-1sarge1_mipsel.deb stable/main/binary-mipsel/file_4.12-1sarge1_mipsel.deb file (4.12-1sarge1) stable-security; urgency=high * Applied patch from upstream to src/file.h, src/funcs.c and src/magic.c to fix integer underflow in file_printf which can lead to to exploitable heap overflow CVE-2007-1536 (Closes: #415362, #416678). stable/main/binary-mips/libmagic1_4.12-1sarge1_mips.deb stable/main/binary-mips/libmagic-dev_4.12-1sarge1_mips.deb stable/main/binary-mips/file_4.12-1sarge1_mips.deb file (4.12-1sarge1) stable-security; urgency=high * Applied patch from upstream to src/file.h, src/funcs.c and src/magic.c to fix integer underflow in file_printf which can lead to to exploitable heap overflow CVE-2007-1536 (Closes: #415362, #416678). stable/main/binary-m68k/libmagic1_4.12-1sarge1_m68k.deb stable/main/binary-m68k/file_4.12-1sarge1_m68k.deb stable/main/binary-m68k/libmagic-dev_4.12-1sarge1_m68k.deb file (4.12-1sarge1) stable-security; urgency=high * Applied patch from upstream to src/file.h, src/funcs.c and src/magic.c to fix integer underflow in file_printf which can lead to to exploitable heap overflow CVE-2007-1536 (Closes: #415362, #416678). stable/main/binary-ia64/libmagic1_4.12-1sarge1_ia64.deb stable/main/binary-ia64/libmagic-dev_4.12-1sarge1_ia64.deb stable/main/binary-ia64/file_4.12-1sarge1_ia64.deb file (4.12-1sarge1) stable-security; urgency=high * Applied patch from upstream to src/file.h, src/funcs.c and src/magic.c to fix integer underflow in file_printf which can lead to to exploitable heap overflow CVE-2007-1536 (Closes: #415362, #416678). stable/main/binary-hppa/libmagic-dev_4.12-1sarge1_hppa.deb stable/main/binary-hppa/libmagic1_4.12-1sarge1_hppa.deb stable/main/binary-hppa/file_4.12-1sarge1_hppa.deb file (4.12-1sarge1) stable-security; urgency=high * Applied patch from upstream to src/file.h, src/funcs.c and src/magic.c to fix integer underflow in file_printf which can lead to to exploitable heap overflow CVE-2007-1536 (Closes: #415362, #416678). stable/main/binary-arm/libmagic-dev_4.12-1sarge1_arm.deb stable/main/binary-arm/file_4.12-1sarge1_arm.deb stable/main/binary-arm/libmagic1_4.12-1sarge1_arm.deb file (4.12-1sarge1) stable-security; urgency=high * Applied patch from upstream to src/file.h, src/funcs.c and src/magic.c to fix integer underflow in file_printf which can lead to to exploitable heap overflow CVE-2007-1536 (Closes: #415362, #416678). stable/main/binary-alpha/libmagic1_4.12-1sarge1_alpha.deb stable/main/binary-alpha/libmagic-dev_4.12-1sarge1_alpha.deb stable/main/binary-alpha/file_4.12-1sarge1_alpha.deb file (4.12-1sarge1) stable-security; urgency=high * Applied patch from upstream to src/file.h, src/funcs.c and src/magic.c to fix integer underflow in file_printf which can lead to to exploitable heap overflow CVE-2007-1536 (Closes: #415362, #416678). stable/main/binary-i386/file_4.12-1sarge1_i386.deb stable/main/source/file_4.12-1sarge1.diff.gz stable/main/binary-i386/libmagic-dev_4.12-1sarge1_i386.deb stable/main/binary-i386/libmagic1_4.12-1sarge1_i386.deb stable/main/source/file_4.12-1sarge1.dsc file (4.12-1sarge1) stable-security; urgency=high * Applied patch from upstream to src/file.h, src/funcs.c and src/magic.c to fix integer underflow in file_printf which can lead to to exploitable heap overflow CVE-2007-1536 (Closes: #415362, #416678). stable/main/binary-sparc/clamav-freshclam_0.84-2.sarge.15_sparc.deb stable/main/binary-sparc/clamav-milter_0.84-2.sarge.15_sparc.deb stable/main/binary-sparc/libclamav-dev_0.84-2.sarge.15_sparc.deb stable/main/binary-sparc/libclamav1_0.84-2.sarge.15_sparc.deb stable/main/binary-sparc/clamav_0.84-2.sarge.15_sparc.deb stable/main/binary-sparc/clamav-daemon_0.84-2.sarge.15_sparc.deb clamav (0.84-2.sarge.15) stable-security; urgency=high * Trigger rebuild to cope with expired builds, no code changes. stable/main/binary-s390/libclamav1_0.84-2.sarge.15_s390.deb stable/main/binary-s390/libclamav-dev_0.84-2.sarge.15_s390.deb stable/main/binary-s390/clamav-freshclam_0.84-2.sarge.15_s390.deb stable/main/binary-s390/clamav-milter_0.84-2.sarge.15_s390.deb stable/main/binary-s390/clamav_0.84-2.sarge.15_s390.deb stable/main/binary-s390/clamav-daemon_0.84-2.sarge.15_s390.deb clamav (0.84-2.sarge.15) stable-security; urgency=high * Trigger rebuild to cope with expired builds, no code changes. stable/main/binary-powerpc/libclamav1_0.84-2.sarge.15_powerpc.deb stable/main/binary-powerpc/clamav-daemon_0.84-2.sarge.15_powerpc.deb stable/main/binary-powerpc/clamav-freshclam_0.84-2.sarge.15_powerpc.deb stable/main/binary-powerpc/libclamav-dev_0.84-2.sarge.15_powerpc.deb stable/main/binary-powerpc/clamav-milter_0.84-2.sarge.15_powerpc.deb stable/main/binary-powerpc/clamav_0.84-2.sarge.15_powerpc.deb clamav (0.84-2.sarge.15) stable-security; urgency=high * Trigger rebuild to cope with expired builds, no code changes. stable/main/binary-mipsel/clamav-freshclam_0.84-2.sarge.15_mipsel.deb stable/main/binary-mipsel/clamav_0.84-2.sarge.15_mipsel.deb stable/main/binary-mipsel/libclamav-dev_0.84-2.sarge.15_mipsel.deb stable/main/binary-mipsel/clamav-milter_0.84-2.sarge.15_mipsel.deb stable/main/binary-mipsel/clamav-daemon_0.84-2.sarge.15_mipsel.deb stable/main/binary-mipsel/libclamav1_0.84-2.sarge.15_mipsel.deb clamav (0.84-2.sarge.15) stable-security; urgency=high * Trigger rebuild to cope with expired builds, no code changes. stable/main/binary-mips/libclamav-dev_0.84-2.sarge.15_mips.deb stable/main/binary-mips/clamav-milter_0.84-2.sarge.15_mips.deb stable/main/binary-mips/clamav-daemon_0.84-2.sarge.15_mips.deb stable/main/binary-mips/libclamav1_0.84-2.sarge.15_mips.deb stable/main/binary-mips/clamav_0.84-2.sarge.15_mips.deb stable/main/binary-mips/clamav-freshclam_0.84-2.sarge.15_mips.deb clamav (0.84-2.sarge.15) stable-security; urgency=high * Trigger rebuild to cope with expired builds, no code changes. stable/main/binary-m68k/clamav-freshclam_0.84-2.sarge.15_m68k.deb stable/main/binary-m68k/clamav-milter_0.84-2.sarge.15_m68k.deb stable/main/binary-m68k/libclamav-dev_0.84-2.sarge.15_m68k.deb stable/main/binary-m68k/clamav-daemon_0.84-2.sarge.15_m68k.deb stable/main/binary-m68k/clamav_0.84-2.sarge.15_m68k.deb stable/main/binary-m68k/libclamav1_0.84-2.sarge.15_m68k.deb clamav (0.84-2.sarge.15) stable-security; urgency=high * Trigger rebuild to cope with expired builds, no code changes. stable/main/binary-ia64/libclamav1_0.84-2.sarge.15_ia64.deb stable/main/binary-ia64/clamav_0.84-2.sarge.15_ia64.deb stable/main/binary-ia64/clamav-milter_0.84-2.sarge.15_ia64.deb stable/main/binary-ia64/clamav-daemon_0.84-2.sarge.15_ia64.deb stable/main/binary-ia64/libclamav-dev_0.84-2.sarge.15_ia64.deb stable/main/binary-ia64/clamav-freshclam_0.84-2.sarge.15_ia64.deb clamav (0.84-2.sarge.15) stable-security; urgency=high * Trigger rebuild to cope with expired builds, no code changes. stable/main/binary-hppa/libclamav-dev_0.84-2.sarge.15_hppa.deb stable/main/binary-hppa/clamav-daemon_0.84-2.sarge.15_hppa.deb stable/main/binary-hppa/clamav_0.84-2.sarge.15_hppa.deb stable/main/binary-hppa/libclamav1_0.84-2.sarge.15_hppa.deb stable/main/binary-hppa/clamav-milter_0.84-2.sarge.15_hppa.deb stable/main/binary-hppa/clamav-freshclam_0.84-2.sarge.15_hppa.deb clamav (0.84-2.sarge.15) stable-security; urgency=high * Trigger rebuild to cope with expired builds, no code changes. stable/main/binary-arm/clamav-milter_0.84-2.sarge.15_arm.deb stable/main/binary-arm/clamav-freshclam_0.84-2.sarge.15_arm.deb stable/main/binary-arm/clamav_0.84-2.sarge.15_arm.deb stable/main/binary-arm/clamav-daemon_0.84-2.sarge.15_arm.deb stable/main/binary-arm/libclamav-dev_0.84-2.sarge.15_arm.deb stable/main/binary-arm/libclamav1_0.84-2.sarge.15_arm.deb clamav (0.84-2.sarge.15) stable-security; urgency=high * Trigger rebuild to cope with expired builds, no code changes. stable/main/binary-alpha/clamav_0.84-2.sarge.15_alpha.deb stable/main/binary-alpha/clamav-milter_0.84-2.sarge.15_alpha.deb stable/main/binary-alpha/clamav-daemon_0.84-2.sarge.15_alpha.deb stable/main/binary-alpha/libclamav1_0.84-2.sarge.15_alpha.deb stable/main/binary-alpha/libclamav-dev_0.84-2.sarge.15_alpha.deb stable/main/binary-alpha/clamav-freshclam_0.84-2.sarge.15_alpha.deb clamav (0.84-2.sarge.15) stable-security; urgency=high * Trigger rebuild to cope with expired builds, no code changes. stable/main/source/clamav_0.84-2.sarge.15.dsc stable/main/binary-i386/libclamav-dev_0.84-2.sarge.15_i386.deb stable/main/binary-i386/libclamav1_0.84-2.sarge.15_i386.deb stable/main/binary-all/clamav-docs_0.84-2.sarge.15_all.deb stable/main/binary-i386/clamav-milter_0.84-2.sarge.15_i386.deb stable/main/binary-i386/clamav_0.84-2.sarge.15_i386.deb stable/main/binary-all/clamav-base_0.84-2.sarge.15_all.deb stable/main/binary-all/clamav-testfiles_0.84-2.sarge.15_all.deb stable/main/source/clamav_0.84-2.sarge.15.diff.gz stable/main/binary-i386/clamav-daemon_0.84-2.sarge.15_i386.deb stable/main/binary-i386/clamav-freshclam_0.84-2.sarge.15_i386.deb clamav (0.84-2.sarge.15) stable-security; urgency=high * Trigger rebuild to cope with expired builds, no code changes. stable/main/binary-sparc/base-installer_1.13.4sarge2_sparc.udeb base-installer (1.13.4sarge2) stable; urgency=high * For the kernel ABI change in Sarge 3.1r3 we should also have updated the default values for debian-installer/kernel/image* in rootskel. Because this was missed, incorrect kernels are now being selected on some architectures. Correcting this in rootskel would mean rebuilding D-I, which we'd like to avoid. As an alternative solution we correct the default in base-installer after reading it. Closes: #412909. * Add myself to uploaders. stable/main/binary-s390/base-installer_1.13.4sarge2_s390.udeb base-installer (1.13.4sarge2) stable; urgency=high * For the kernel ABI change in Sarge 3.1r3 we should also have updated the default values for debian-installer/kernel/image* in rootskel. Because this was missed, incorrect kernels are now being selected on some architectures. Correcting this in rootskel would mean rebuilding D-I, which we'd like to avoid. As an alternative solution we correct the default in base-installer after reading it. Closes: #412909. * Add myself to uploaders. stable/main/binary-powerpc/base-installer_1.13.4sarge2_powerpc.udeb base-installer (1.13.4sarge2) stable; urgency=high * For the kernel ABI change in Sarge 3.1r3 we should also have updated the default values for debian-installer/kernel/image* in rootskel. Because this was missed, incorrect kernels are now being selected on some architectures. Correcting this in rootskel would mean rebuilding D-I, which we'd like to avoid. As an alternative solution we correct the default in base-installer after reading it. Closes: #412909. * Add myself to uploaders. stable/main/binary-mipsel/base-installer_1.13.4sarge2_mipsel.udeb base-installer (1.13.4sarge2) stable; urgency=high * For the kernel ABI change in Sarge 3.1r3 we should also have updated the default values for debian-installer/kernel/image* in rootskel. Because this was missed, incorrect kernels are now being selected on some architectures. Correcting this in rootskel would mean rebuilding D-I, which we'd like to avoid. As an alternative solution we correct the default in base-installer after reading it. Closes: #412909. * Add myself to uploaders. stable/main/binary-mips/base-installer_1.13.4sarge2_mips.udeb base-installer (1.13.4sarge2) stable; urgency=high * For the kernel ABI change in Sarge 3.1r3 we should also have updated the default values for debian-installer/kernel/image* in rootskel. Because this was missed, incorrect kernels are now being selected on some architectures. Correcting this in rootskel would mean rebuilding D-I, which we'd like to avoid. As an alternative solution we correct the default in base-installer after reading it. Closes: #412909. * Add myself to uploaders. stable/main/binary-m68k/base-installer_1.13.4sarge2_m68k.udeb base-installer (1.13.4sarge2) stable; urgency=high * For the kernel ABI change in Sarge 3.1r3 we should also have updated the default values for debian-installer/kernel/image* in rootskel. Because this was missed, incorrect kernels are now being selected on some architectures. Correcting this in rootskel would mean rebuilding D-I, which we'd like to avoid. As an alternative solution we correct the default in base-installer after reading it. Closes: #412909. * Add myself to uploaders. stable/main/binary-ia64/base-installer_1.13.4sarge2_ia64.udeb base-installer (1.13.4sarge2) stable; urgency=high * For the kernel ABI change in Sarge 3.1r3 we should also have updated the default values for debian-installer/kernel/image* in rootskel. Because this was missed, incorrect kernels are now being selected on some architectures. Correcting this in rootskel would mean rebuilding D-I, which we'd like to avoid. As an alternative solution we correct the default in base-installer after reading it. Closes: #412909. * Add myself to uploaders. stable/main/binary-hppa/base-installer_1.13.4sarge2_hppa.udeb base-installer (1.13.4sarge2) stable; urgency=high * For the kernel ABI change in Sarge 3.1r3 we should also have updated the default values for debian-installer/kernel/image* in rootskel. Because this was missed, incorrect kernels are now being selected on some architectures. Correcting this in rootskel would mean rebuilding D-I, which we'd like to avoid. As an alternative solution we correct the default in base-installer after reading it. Closes: #412909. * Add myself to uploaders. stable/main/binary-arm/base-installer_1.13.4sarge2_arm.udeb base-installer (1.13.4sarge2) stable; urgency=high * For the kernel ABI change in Sarge 3.1r3 we should also have updated the default values for debian-installer/kernel/image* in rootskel. Because this was missed, incorrect kernels are now being selected on some architectures. Correcting this in rootskel would mean rebuilding D-I, which we'd like to avoid. As an alternative solution we correct the default in base-installer after reading it. Closes: #412909. * Add myself to uploaders. stable/main/binary-alpha/base-installer_1.13.4sarge2_alpha.udeb base-installer (1.13.4sarge2) stable; urgency=high * For the kernel ABI change in Sarge 3.1r3 we should also have updated the default values for debian-installer/kernel/image* in rootskel. Because this was missed, incorrect kernels are now being selected on some architectures. Correcting this in rootskel would mean rebuilding D-I, which we'd like to avoid. As an alternative solution we correct the default in base-installer after reading it. Closes: #412909. * Add myself to uploaders. stable/main/binary-i386/base-installer_1.13.4sarge2_i386.udeb stable/main/source/base-installer_1.13.4sarge2.tar.gz stable/main/source/base-installer_1.13.4sarge2.dsc base-installer (1.13.4sarge2) stable; urgency=high * For the kernel ABI change in Sarge 3.1r3 we should also have updated the default values for debian-installer/kernel/image* in rootskel. Because this was missed, incorrect kernels are now being selected on some architectures. Correcting this in rootskel would mean rebuilding D-I, which we'd like to avoid. As an alternative solution we correct the default in base-installer after reading it. Closes: #412909. * Add myself to uploaders. ========================================= Sat, 17 Feb 2007 - Debian 3.1r5 released ========================================= stable/main/binary-sparc/libxine1_1.0.1-1sarge5_sparc.deb stable/main/binary-sparc/libxine-dev_1.0.1-1sarge5_sparc.deb xine-lib (1.0.1-1sarge5) stable-security; urgency=high * Fix buffer overflow in Real Media handler. (CVE-2006-6172) stable/main/binary-s390/libxine-dev_1.0.1-1sarge5_s390.deb stable/main/binary-s390/libxine1_1.0.1-1sarge5_s390.deb xine-lib (1.0.1-1sarge5) stable-security; urgency=high * Fix buffer overflow in Real Media handler. (CVE-2006-6172) stable/main/binary-powerpc/libxine-dev_1.0.1-1sarge5_powerpc.deb stable/main/binary-powerpc/libxine1_1.0.1-1sarge5_powerpc.deb xine-lib (1.0.1-1sarge5) stable-security; urgency=high * Fix buffer overflow in Real Media handler. (CVE-2006-6172) stable/main/binary-mipsel/libxine1_1.0.1-1sarge5_mipsel.deb stable/main/binary-mipsel/libxine-dev_1.0.1-1sarge5_mipsel.deb xine-lib (1.0.1-1sarge5) stable-security; urgency=high * Fix buffer overflow in Real Media handler. (CVE-2006-6172) stable/main/binary-mips/libxine-dev_1.0.1-1sarge5_mips.deb stable/main/binary-mips/libxine1_1.0.1-1sarge5_mips.deb xine-lib (1.0.1-1sarge5) stable-security; urgency=high * Fix buffer overflow in Real Media handler. (CVE-2006-6172) stable/main/binary-m68k/libxine-dev_1.0.1-1sarge5_m68k.deb stable/main/binary-m68k/libxine1_1.0.1-1sarge5_m68k.deb xine-lib (1.0.1-1sarge5) stable-security; urgency=high * Fix buffer overflow in Real Media handler. (CVE-2006-6172) stable/main/binary-ia64/libxine-dev_1.0.1-1sarge5_ia64.deb stable/main/binary-ia64/libxine1_1.0.1-1sarge5_ia64.deb xine-lib (1.0.1-1sarge5) stable-security; urgency=high * Fix buffer overflow in Real Media handler. (CVE-2006-6172) stable/main/binary-hppa/libxine1_1.0.1-1sarge5_hppa.deb stable/main/binary-hppa/libxine-dev_1.0.1-1sarge5_hppa.deb xine-lib (1.0.1-1sarge5) stable-security; urgency=high * Fix buffer overflow in Real Media handler. (CVE-2006-6172) stable/main/binary-arm/libxine1_1.0.1-1sarge5_arm.deb stable/main/binary-arm/libxine-dev_1.0.1-1sarge5_arm.deb xine-lib (1.0.1-1sarge5) stable-security; urgency=high * Fix buffer overflow in Real Media handler. (CVE-2006-6172) stable/main/binary-alpha/libxine-dev_1.0.1-1sarge5_alpha.deb stable/main/binary-alpha/libxine1_1.0.1-1sarge5_alpha.deb xine-lib (1.0.1-1sarge5) stable-security; urgency=high * Fix buffer overflow in Real Media handler. (CVE-2006-6172) stable/main/binary-i386/libxine1_1.0.1-1sarge5_i386.deb stable/main/source/xine-lib_1.0.1-1sarge5.dsc stable/main/source/xine-lib_1.0.1-1sarge5.diff.gz stable/main/binary-i386/libxine-dev_1.0.1-1sarge5_i386.deb xine-lib (1.0.1-1sarge5) stable-security; urgency=high * Fix buffer overflow in Real Media handler. (CVE-2006-6172) stable/main/binary-sparc/xvfb_4.3.0.dfsg.1-14sarge3_sparc.deb stable/main/binary-sparc/xbase-clients_4.3.0.dfsg.1-14sarge3_sparc.deb stable/main/binary-sparc/xlibmesa-gl-dev_4.3.0.dfsg.1-14sarge3_sparc.deb stable/main/binary-sparc/libxv1_4.3.0.dfsg.1-14sarge3_sparc.deb stable/main/binary-sparc/xlibs-static-pic_4.3.0.dfsg.1-14sarge3_sparc.deb stable/main/binary-sparc/libxp6_4.3.0.dfsg.1-14sarge3_sparc.deb stable/main/binary-sparc/xlibmesa-glu_4.3.0.dfsg.1-14sarge3_sparc.deb stable/main/binary-sparc/twm_4.3.0.dfsg.1-14sarge3_sparc.deb stable/main/binary-sparc/libxtst-dev_4.3.0.dfsg.1-14sarge3_sparc.deb stable/main/binary-sparc/libxaw6_4.3.0.dfsg.1-14sarge3_sparc.deb stable/main/binary-sparc/libxaw7-dev_4.3.0.dfsg.1-14sarge3_sparc.deb stable/main/binary-sparc/libxext6-dbg_4.3.0.dfsg.1-14sarge3_sparc.deb stable/main/binary-sparc/libxmuu-dev_4.3.0.dfsg.1-14sarge3_sparc.deb stable/main/binary-sparc/xlibmesa-glu-dbg_4.3.0.dfsg.1-14sarge3_sparc.deb stable/main/binary-sparc/libxmuu1_4.3.0.dfsg.1-14sarge3_sparc.deb stable/main/binary-sparc/libdps-dev_4.3.0.dfsg.1-14sarge3_sparc.deb stable/main/binary-sparc/libdps1_4.3.0.dfsg.1-14sarge3_sparc.deb stable/main/binary-sparc/xdm_4.3.0.dfsg.1-14sarge3_sparc.deb stable/main/binary-sparc/libxmuu1-dbg_4.3.0.dfsg.1-14sarge3_sparc.deb stable/main/binary-sparc/libx11-dev_4.3.0.dfsg.1-14sarge3_sparc.deb stable/main/binary-sparc/libxtrap6_4.3.0.dfsg.1-14sarge3_sparc.deb stable/main/binary-sparc/xlibmesa-dri-dbg_4.3.0.dfsg.1-14sarge3_sparc.deb stable/main/binary-sparc/libxaw6-dbg_4.3.0.dfsg.1-14sarge3_sparc.deb stable/main/binary-sparc/xlibmesa-dri_4.3.0.dfsg.1-14sarge3_sparc.deb stable/main/binary-sparc/libxp-dev_4.3.0.dfsg.1-14sarge3_sparc.deb stable/main/binary-sparc/xlibmesa-glu-dev_4.3.0.dfsg.1-14sarge3_sparc.deb stable/main/binary-sparc/xutils_4.3.0.dfsg.1-14sarge3_sparc.deb stable/main/binary-sparc/x-window-system-core_4.3.0.dfsg.1-14sarge3_sparc.deb stable/main/binary-sparc/libxi-dev_4.3.0.dfsg.1-14sarge3_sparc.deb stable/main/binary-sparc/xserver-xfree86_4.3.0.dfsg.1-14sarge3_sparc.deb stable/main/binary-sparc/xfwp_4.3.0.dfsg.1-14sarge3_sparc.deb stable/main/binary-sparc/xlibmesa-gl_4.3.0.dfsg.1-14sarge3_sparc.deb stable/main/binary-sparc/libxi6_4.3.0.dfsg.1-14sarge3_sparc.deb stable/main/binary-sparc/libxp6-dbg_4.3.0.dfsg.1-14sarge3_sparc.deb stable/main/binary-sparc/xlibosmesa4_4.3.0.dfsg.1-14sarge3_sparc.deb stable/main/binary-sparc/xterm_4.3.0.dfsg.1-14sarge3_sparc.deb stable/main/binary-sparc/xlibosmesa-dev_4.3.0.dfsg.1-14sarge3_sparc.deb stable/main/binary-sparc/libxv-dev_4.3.0.dfsg.1-14sarge3_sparc.deb stable/main/binary-sparc/xnest_4.3.0.dfsg.1-14sarge3_sparc.deb stable/main/binary-sparc/libice6-dbg_4.3.0.dfsg.1-14sarge3_sparc.deb stable/main/binary-sparc/libxmu6-dbg_4.3.0.dfsg.1-14sarge3_sparc.deb stable/main/binary-sparc/libxtrap6-dbg_4.3.0.dfsg.1-14sarge3_sparc.deb stable/main/binary-sparc/libxrandr-dev_4.3.0.dfsg.1-14sarge3_sparc.deb stable/main/binary-sparc/x-window-system-dev_4.3.0.dfsg.1-14sarge3_sparc.deb stable/main/binary-sparc/libsm6_4.3.0.dfsg.1-14sarge3_sparc.deb stable/main/binary-sparc/xlibosmesa4-dbg_4.3.0.dfsg.1-14sarge3_sparc.deb stable/main/binary-sparc/libxpm4-dbg_4.3.0.dfsg.1-14sarge3_sparc.deb stable/main/binary-sparc/xserver-common_4.3.0.dfsg.1-14sarge3_sparc.deb stable/main/binary-sparc/xserver-xfree86-dbg_4.3.0.dfsg.1-14sarge3_sparc.deb stable/main/binary-sparc/libxtst6_4.3.0.dfsg.1-14sarge3_sparc.deb stable/main/binary-sparc/xmh_4.3.0.dfsg.1-14sarge3_sparc.deb stable/main/binary-sparc/libxmu-dev_4.3.0.dfsg.1-14sarge3_sparc.deb stable/main/binary-sparc/libsm6-dbg_4.3.0.dfsg.1-14sarge3_sparc.deb stable/main/binary-sparc/libxrandr2-dbg_4.3.0.dfsg.1-14sarge3_sparc.deb stable/main/binary-sparc/libdps1-dbg_4.3.0.dfsg.1-14sarge3_sparc.deb stable/main/binary-sparc/xlibmesa3_4.3.0.dfsg.1-14sarge3_sparc.deb stable/main/binary-sparc/xfs_4.3.0.dfsg.1-14sarge3_sparc.deb stable/main/binary-sparc/libxpm4_4.3.0.dfsg.1-14sarge3_sparc.deb stable/main/binary-sparc/libsm-dev_4.3.0.dfsg.1-14sarge3_sparc.deb stable/main/binary-sparc/lbxproxy_4.3.0.dfsg.1-14sarge3_sparc.deb stable/main/binary-sparc/libx11-6_4.3.0.dfsg.1-14sarge3_sparc.deb stable/main/binary-sparc/libxext6_4.3.0.dfsg.1-14sarge3_sparc.deb stable/main/binary-sparc/libxft1_4.3.0.dfsg.1-14sarge3_sparc.deb stable/main/binary-sparc/libxaw7-dbg_4.3.0.dfsg.1-14sarge3_sparc.deb stable/main/binary-sparc/libxaw6-dev_4.3.0.dfsg.1-14sarge3_sparc.deb stable/main/binary-sparc/libxt6_4.3.0.dfsg.1-14sarge3_sparc.deb stable/main/binary-sparc/libxtst6-dbg_4.3.0.dfsg.1-14sarge3_sparc.deb stable/main/binary-sparc/libxt-dev_4.3.0.dfsg.1-14sarge3_sparc.deb stable/main/binary-sparc/libx11-6-dbg_4.3.0.dfsg.1-14sarge3_sparc.deb stable/main/binary-sparc/proxymngr_4.3.0.dfsg.1-14sarge3_sparc.deb stable/main/binary-sparc/libice6_4.3.0.dfsg.1-14sarge3_sparc.deb stable/main/binary-sparc/libxmu6_4.3.0.dfsg.1-14sarge3_sparc.deb stable/main/binary-sparc/libxext-dev_4.3.0.dfsg.1-14sarge3_sparc.deb stable/main/binary-sparc/libxt6-dbg_4.3.0.dfsg.1-14sarge3_sparc.deb stable/main/binary-sparc/libxi6-dbg_4.3.0.dfsg.1-14sarge3_sparc.deb stable/main/binary-sparc/libxtrap-dev_4.3.0.dfsg.1-14sarge3_sparc.deb stable/main/binary-sparc/libice-dev_4.3.0.dfsg.1-14sarge3_sparc.deb stable/main/binary-sparc/libxv1-dbg_4.3.0.dfsg.1-14sarge3_sparc.deb stable/main/binary-sparc/xlibmesa-gl-dbg_4.3.0.dfsg.1-14sarge3_sparc.deb stable/main/binary-sparc/libxaw7_4.3.0.dfsg.1-14sarge3_sparc.deb stable/main/binary-sparc/libxft1-dbg_4.3.0.dfsg.1-14sarge3_sparc.deb stable/main/binary-sparc/xlibs-static-dev_4.3.0.dfsg.1-14sarge3_sparc.deb stable/main/binary-sparc/libxrandr2_4.3.0.dfsg.1-14sarge3_sparc.deb stable/main/binary-sparc/libxpm-dev_4.3.0.dfsg.1-14sarge3_sparc.deb xfree86 (4.3.0.dfsg.1-14sarge3) stable-security; urgency=high * Non-maintainer update by the Security Team: Fixes several vulnerabilities reported by iDefense (CVE-2006-6101, CVE-2006-6102, CVE-2006-6103) stable/main/binary-s390/x-window-system-dev_4.3.0.dfsg.1-14sarge3_s390.deb stable/main/binary-s390/libxv1-dbg_4.3.0.dfsg.1-14sarge3_s390.deb stable/main/binary-s390/libxv1_4.3.0.dfsg.1-14sarge3_s390.deb stable/main/binary-s390/xlibmesa-glu-dev_4.3.0.dfsg.1-14sarge3_s390.deb stable/main/binary-s390/libxaw6-dev_4.3.0.dfsg.1-14sarge3_s390.deb stable/main/binary-s390/libxi6-dbg_4.3.0.dfsg.1-14sarge3_s390.deb stable/main/binary-s390/libxaw7-dbg_4.3.0.dfsg.1-14sarge3_s390.deb stable/main/binary-s390/libxaw6_4.3.0.dfsg.1-14sarge3_s390.deb stable/main/binary-s390/libice6_4.3.0.dfsg.1-14sarge3_s390.deb stable/main/binary-s390/xfwp_4.3.0.dfsg.1-14sarge3_s390.deb stable/main/binary-s390/libxpm4-dbg_4.3.0.dfsg.1-14sarge3_s390.deb stable/main/binary-s390/libx11-6_4.3.0.dfsg.1-14sarge3_s390.deb stable/main/binary-s390/libxtrap6_4.3.0.dfsg.1-14sarge3_s390.deb stable/main/binary-s390/libxtrap-dev_4.3.0.dfsg.1-14sarge3_s390.deb stable/main/binary-s390/libice-dev_4.3.0.dfsg.1-14sarge3_s390.deb stable/main/binary-s390/xlibmesa-gl-dev_4.3.0.dfsg.1-14sarge3_s390.deb stable/main/binary-s390/libxrandr2_4.3.0.dfsg.1-14sarge3_s390.deb stable/main/binary-s390/libxmu-dev_4.3.0.dfsg.1-14sarge3_s390.deb stable/main/binary-s390/libxmuu1_4.3.0.dfsg.1-14sarge3_s390.deb stable/main/binary-s390/libxt-dev_4.3.0.dfsg.1-14sarge3_s390.deb stable/main/binary-s390/xlibs-static-dev_4.3.0.dfsg.1-14sarge3_s390.deb stable/main/binary-s390/libdps1-dbg_4.3.0.dfsg.1-14sarge3_s390.deb stable/main/binary-s390/libxft1-dbg_4.3.0.dfsg.1-14sarge3_s390.deb stable/main/binary-s390/libxi-dev_4.3.0.dfsg.1-14sarge3_s390.deb stable/main/binary-s390/xlibmesa-glu-dbg_4.3.0.dfsg.1-14sarge3_s390.deb stable/main/binary-s390/xbase-clients_4.3.0.dfsg.1-14sarge3_s390.deb stable/main/binary-s390/xdm_4.3.0.dfsg.1-14sarge3_s390.deb stable/main/binary-s390/libdps1_4.3.0.dfsg.1-14sarge3_s390.deb stable/main/binary-s390/libxi6_4.3.0.dfsg.1-14sarge3_s390.deb stable/main/binary-s390/twm_4.3.0.dfsg.1-14sarge3_s390.deb stable/main/binary-s390/libx11-dev_4.3.0.dfsg.1-14sarge3_s390.deb stable/main/binary-s390/libxmu6-dbg_4.3.0.dfsg.1-14sarge3_s390.deb stable/main/binary-s390/libxaw7-dev_4.3.0.dfsg.1-14sarge3_s390.deb stable/main/binary-s390/libxmuu-dev_4.3.0.dfsg.1-14sarge3_s390.deb stable/main/binary-s390/libsm-dev_4.3.0.dfsg.1-14sarge3_s390.deb stable/main/binary-s390/libxaw7_4.3.0.dfsg.1-14sarge3_s390.deb stable/main/binary-s390/libxpm-dev_4.3.0.dfsg.1-14sarge3_s390.deb stable/main/binary-s390/libice6-dbg_4.3.0.dfsg.1-14sarge3_s390.deb stable/main/binary-s390/libxv-dev_4.3.0.dfsg.1-14sarge3_s390.deb stable/main/binary-s390/libxtrap6-dbg_4.3.0.dfsg.1-14sarge3_s390.deb stable/main/binary-s390/xlibmesa-glu_4.3.0.dfsg.1-14sarge3_s390.deb stable/main/binary-s390/libxtst-dev_4.3.0.dfsg.1-14sarge3_s390.deb stable/main/binary-s390/x-window-system-core_4.3.0.dfsg.1-14sarge3_s390.deb stable/main/binary-s390/libxmuu1-dbg_4.3.0.dfsg.1-14sarge3_s390.deb stable/main/binary-s390/libxrandr2-dbg_4.3.0.dfsg.1-14sarge3_s390.deb stable/main/binary-s390/xvfb_4.3.0.dfsg.1-14sarge3_s390.deb stable/main/binary-s390/libxp6-dbg_4.3.0.dfsg.1-14sarge3_s390.deb stable/main/binary-s390/xlibmesa3_4.3.0.dfsg.1-14sarge3_s390.deb stable/main/binary-s390/libxtst6-dbg_4.3.0.dfsg.1-14sarge3_s390.deb stable/main/binary-s390/xserver-common_4.3.0.dfsg.1-14sarge3_s390.deb stable/main/binary-s390/lbxproxy_4.3.0.dfsg.1-14sarge3_s390.deb stable/main/binary-s390/xmh_4.3.0.dfsg.1-14sarge3_s390.deb stable/main/binary-s390/xlibmesa-gl_4.3.0.dfsg.1-14sarge3_s390.deb stable/main/binary-s390/libxft1_4.3.0.dfsg.1-14sarge3_s390.deb stable/main/binary-s390/libxpm4_4.3.0.dfsg.1-14sarge3_s390.deb stable/main/binary-s390/libdps-dev_4.3.0.dfsg.1-14sarge3_s390.deb stable/main/binary-s390/libxp6_4.3.0.dfsg.1-14sarge3_s390.deb stable/main/binary-s390/proxymngr_4.3.0.dfsg.1-14sarge3_s390.deb stable/main/binary-s390/libxext-dev_4.3.0.dfsg.1-14sarge3_s390.deb stable/main/binary-s390/libxt6_4.3.0.dfsg.1-14sarge3_s390.deb stable/main/binary-s390/xfs_4.3.0.dfsg.1-14sarge3_s390.deb stable/main/binary-s390/libxext6-dbg_4.3.0.dfsg.1-14sarge3_s390.deb stable/main/binary-s390/libx11-6-dbg_4.3.0.dfsg.1-14sarge3_s390.deb stable/main/binary-s390/libxrandr-dev_4.3.0.dfsg.1-14sarge3_s390.deb stable/main/binary-s390/libxext6_4.3.0.dfsg.1-14sarge3_s390.deb stable/main/binary-s390/xnest_4.3.0.dfsg.1-14sarge3_s390.deb stable/main/binary-s390/libxaw6-dbg_4.3.0.dfsg.1-14sarge3_s390.deb stable/main/binary-s390/xlibmesa-gl-dbg_4.3.0.dfsg.1-14sarge3_s390.deb stable/main/binary-s390/libxt6-dbg_4.3.0.dfsg.1-14sarge3_s390.deb stable/main/binary-s390/libxp-dev_4.3.0.dfsg.1-14sarge3_s390.deb stable/main/binary-s390/xlibs-static-pic_4.3.0.dfsg.1-14sarge3_s390.deb stable/main/binary-s390/libsm6_4.3.0.dfsg.1-14sarge3_s390.deb stable/main/binary-s390/xterm_4.3.0.dfsg.1-14sarge3_s390.deb stable/main/binary-s390/xutils_4.3.0.dfsg.1-14sarge3_s390.deb stable/main/binary-s390/libxtst6_4.3.0.dfsg.1-14sarge3_s390.deb stable/main/binary-s390/libxmu6_4.3.0.dfsg.1-14sarge3_s390.deb stable/main/binary-s390/libsm6-dbg_4.3.0.dfsg.1-14sarge3_s390.deb xfree86 (4.3.0.dfsg.1-14sarge3) stable-security; urgency=high * Non-maintainer update by the Security Team: Fixes several vulnerabilities reported by iDefense (CVE-2006-6101, CVE-2006-6102, CVE-2006-6103) stable/main/binary-powerpc/xlibosmesa4-dbg_4.3.0.dfsg.1-14sarge3_powerpc.deb stable/main/binary-powerpc/libxtrap6-dbg_4.3.0.dfsg.1-14sarge3_powerpc.deb stable/main/binary-powerpc/libice6-dbg_4.3.0.dfsg.1-14sarge3_powerpc.deb stable/main/binary-powerpc/libxaw7-dbg_4.3.0.dfsg.1-14sarge3_powerpc.deb stable/main/binary-powerpc/libxext-dev_4.3.0.dfsg.1-14sarge3_powerpc.deb stable/main/binary-powerpc/libdps1-dbg_4.3.0.dfsg.1-14sarge3_powerpc.deb stable/main/binary-powerpc/libxpm4-dbg_4.3.0.dfsg.1-14sarge3_powerpc.deb stable/main/binary-powerpc/libsm6_4.3.0.dfsg.1-14sarge3_powerpc.deb stable/main/binary-powerpc/libxaw6_4.3.0.dfsg.1-14sarge3_powerpc.deb stable/main/binary-powerpc/libxt-dev_4.3.0.dfsg.1-14sarge3_powerpc.deb stable/main/binary-powerpc/xlibmesa3_4.3.0.dfsg.1-14sarge3_powerpc.deb stable/main/binary-powerpc/xlibmesa-glu-dbg_4.3.0.dfsg.1-14sarge3_powerpc.deb stable/main/binary-powerpc/libxrandr2_4.3.0.dfsg.1-14sarge3_powerpc.deb stable/main/binary-powerpc/libxaw7_4.3.0.dfsg.1-14sarge3_powerpc.deb stable/main/binary-powerpc/xfwp_4.3.0.dfsg.1-14sarge3_powerpc.deb stable/main/binary-powerpc/xlibmesa-glu_4.3.0.dfsg.1-14sarge3_powerpc.deb stable/main/binary-powerpc/twm_4.3.0.dfsg.1-14sarge3_powerpc.deb stable/main/binary-powerpc/libxtst-dev_4.3.0.dfsg.1-14sarge3_powerpc.deb stable/main/binary-powerpc/xvfb_4.3.0.dfsg.1-14sarge3_powerpc.deb stable/main/binary-powerpc/xbase-clients_4.3.0.dfsg.1-14sarge3_powerpc.deb stable/main/binary-powerpc/lbxproxy_4.3.0.dfsg.1-14sarge3_powerpc.deb stable/main/binary-powerpc/xserver-xfree86-dbg_4.3.0.dfsg.1-14sarge3_powerpc.deb stable/main/binary-powerpc/xlibmesa-gl-dbg_4.3.0.dfsg.1-14sarge3_powerpc.deb stable/main/binary-powerpc/libxv1_4.3.0.dfsg.1-14sarge3_powerpc.deb stable/main/binary-powerpc/libxft1-dbg_4.3.0.dfsg.1-14sarge3_powerpc.deb stable/main/binary-powerpc/libxmu6-dbg_4.3.0.dfsg.1-14sarge3_powerpc.deb stable/main/binary-powerpc/xlibs-static-dev_4.3.0.dfsg.1-14sarge3_powerpc.deb stable/main/binary-powerpc/libxpm4_4.3.0.dfsg.1-14sarge3_powerpc.deb stable/main/binary-powerpc/libxi6-dbg_4.3.0.dfsg.1-14sarge3_powerpc.deb stable/main/binary-powerpc/libx11-6-dbg_4.3.0.dfsg.1-14sarge3_powerpc.deb stable/main/binary-powerpc/x-window-system-core_4.3.0.dfsg.1-14sarge3_powerpc.deb stable/main/binary-powerpc/libxrandr2-dbg_4.3.0.dfsg.1-14sarge3_powerpc.deb stable/main/binary-powerpc/xserver-common_4.3.0.dfsg.1-14sarge3_powerpc.deb stable/main/binary-powerpc/xlibosmesa-dev_4.3.0.dfsg.1-14sarge3_powerpc.deb stable/main/binary-powerpc/xfs_4.3.0.dfsg.1-14sarge3_powerpc.deb stable/main/binary-powerpc/xlibmesa-glu-dev_4.3.0.dfsg.1-14sarge3_powerpc.deb stable/main/binary-powerpc/libxaw6-dbg_4.3.0.dfsg.1-14sarge3_powerpc.deb stable/main/binary-powerpc/xserver-xfree86_4.3.0.dfsg.1-14sarge3_powerpc.deb stable/main/binary-powerpc/xlibmesa-gl-dev_4.3.0.dfsg.1-14sarge3_powerpc.deb stable/main/binary-powerpc/xutils_4.3.0.dfsg.1-14sarge3_powerpc.deb stable/main/binary-powerpc/libx11-dev_4.3.0.dfsg.1-14sarge3_powerpc.deb stable/main/binary-powerpc/libxtst6_4.3.0.dfsg.1-14sarge3_powerpc.deb stable/main/binary-powerpc/xterm_4.3.0.dfsg.1-14sarge3_powerpc.deb stable/main/binary-powerpc/libdps1_4.3.0.dfsg.1-14sarge3_powerpc.deb stable/main/binary-powerpc/libice6_4.3.0.dfsg.1-14sarge3_powerpc.deb stable/main/binary-powerpc/xlibosmesa4_4.3.0.dfsg.1-14sarge3_powerpc.deb stable/main/binary-powerpc/libxtrap6_4.3.0.dfsg.1-14sarge3_powerpc.deb stable/main/binary-powerpc/libxt6_4.3.0.dfsg.1-14sarge3_powerpc.deb stable/main/binary-powerpc/xlibmesa-dri-dbg_4.3.0.dfsg.1-14sarge3_powerpc.deb stable/main/binary-powerpc/xdm_4.3.0.dfsg.1-14sarge3_powerpc.deb stable/main/binary-powerpc/libxrandr-dev_4.3.0.dfsg.1-14sarge3_powerpc.deb stable/main/binary-powerpc/libxft1_4.3.0.dfsg.1-14sarge3_powerpc.deb stable/main/binary-powerpc/libxp6-dbg_4.3.0.dfsg.1-14sarge3_powerpc.deb stable/main/binary-powerpc/libice-dev_4.3.0.dfsg.1-14sarge3_powerpc.deb stable/main/binary-powerpc/xnest_4.3.0.dfsg.1-14sarge3_powerpc.deb stable/main/binary-powerpc/libxtrap-dev_4.3.0.dfsg.1-14sarge3_powerpc.deb stable/main/binary-powerpc/xlibmesa-dri_4.3.0.dfsg.1-14sarge3_powerpc.deb stable/main/binary-powerpc/libxmu6_4.3.0.dfsg.1-14sarge3_powerpc.deb stable/main/binary-powerpc/libxext6-dbg_4.3.0.dfsg.1-14sarge3_powerpc.deb stable/main/binary-powerpc/libsm6-dbg_4.3.0.dfsg.1-14sarge3_powerpc.deb stable/main/binary-powerpc/x-window-system-dev_4.3.0.dfsg.1-14sarge3_powerpc.deb stable/main/binary-powerpc/xlibmesa-gl_4.3.0.dfsg.1-14sarge3_powerpc.deb stable/main/binary-powerpc/libxv1-dbg_4.3.0.dfsg.1-14sarge3_powerpc.deb stable/main/binary-powerpc/libsm-dev_4.3.0.dfsg.1-14sarge3_powerpc.deb stable/main/binary-powerpc/libxmuu1_4.3.0.dfsg.1-14sarge3_powerpc.deb stable/main/binary-powerpc/libxt6-dbg_4.3.0.dfsg.1-14sarge3_powerpc.deb stable/main/binary-powerpc/libdps-dev_4.3.0.dfsg.1-14sarge3_powerpc.deb stable/main/binary-powerpc/xmh_4.3.0.dfsg.1-14sarge3_powerpc.deb stable/main/binary-powerpc/libxp-dev_4.3.0.dfsg.1-14sarge3_powerpc.deb stable/main/binary-powerpc/libxmu-dev_4.3.0.dfsg.1-14sarge3_powerpc.deb stable/main/binary-powerpc/libxpm-dev_4.3.0.dfsg.1-14sarge3_powerpc.deb stable/main/binary-powerpc/libxi-dev_4.3.0.dfsg.1-14sarge3_powerpc.deb stable/main/binary-powerpc/xlibs-static-pic_4.3.0.dfsg.1-14sarge3_powerpc.deb stable/main/binary-powerpc/libxmuu1-dbg_4.3.0.dfsg.1-14sarge3_powerpc.deb stable/main/binary-powerpc/libxi6_4.3.0.dfsg.1-14sarge3_powerpc.deb stable/main/binary-powerpc/libxv-dev_4.3.0.dfsg.1-14sarge3_powerpc.deb stable/main/binary-powerpc/libxaw7-dev_4.3.0.dfsg.1-14sarge3_powerpc.deb stable/main/binary-powerpc/libx11-6_4.3.0.dfsg.1-14sarge3_powerpc.deb stable/main/binary-powerpc/libxp6_4.3.0.dfsg.1-14sarge3_powerpc.deb stable/main/binary-powerpc/libxext6_4.3.0.dfsg.1-14sarge3_powerpc.deb stable/main/binary-powerpc/proxymngr_4.3.0.dfsg.1-14sarge3_powerpc.deb stable/main/binary-powerpc/libxaw6-dev_4.3.0.dfsg.1-14sarge3_powerpc.deb stable/main/binary-powerpc/libxmuu-dev_4.3.0.dfsg.1-14sarge3_powerpc.deb stable/main/binary-powerpc/libxtst6-dbg_4.3.0.dfsg.1-14sarge3_powerpc.deb xfree86 (4.3.0.dfsg.1-14sarge3) stable-security; urgency=high * Non-maintainer update by the Security Team: Fixes several vulnerabilities reported by iDefense (CVE-2006-6101, CVE-2006-6102, CVE-2006-6103) stable/main/binary-mipsel/xmh_4.3.0.dfsg.1-14sarge3_mipsel.deb stable/main/binary-mipsel/x-window-system-core_4.3.0.dfsg.1-14sarge3_mipsel.deb stable/main/binary-mipsel/libxt6_4.3.0.dfsg.1-14sarge3_mipsel.deb stable/main/binary-mipsel/libdps-dev_4.3.0.dfsg.1-14sarge3_mipsel.deb stable/main/binary-mipsel/libx11-6-dbg_4.3.0.dfsg.1-14sarge3_mipsel.deb stable/main/binary-mipsel/libice6_4.3.0.dfsg.1-14sarge3_mipsel.deb stable/main/binary-mipsel/xlibmesa-glu-dev_4.3.0.dfsg.1-14sarge3_mipsel.deb stable/main/binary-mipsel/libxtrap6_4.3.0.dfsg.1-14sarge3_mipsel.deb stable/main/binary-mipsel/libxmu-dev_4.3.0.dfsg.1-14sarge3_mipsel.deb stable/main/binary-mipsel/libxext6_4.3.0.dfsg.1-14sarge3_mipsel.deb stable/main/binary-mipsel/libice-dev_4.3.0.dfsg.1-14sarge3_mipsel.deb stable/main/binary-mipsel/libxtrap-dev_4.3.0.dfsg.1-14sarge3_mipsel.deb stable/main/binary-mipsel/libxaw7_4.3.0.dfsg.1-14sarge3_mipsel.deb stable/main/binary-mipsel/xserver-xfree86-dbg_4.3.0.dfsg.1-14sarge3_mipsel.deb stable/main/binary-mipsel/xlibmesa-gl-dev_4.3.0.dfsg.1-14sarge3_mipsel.deb stable/main/binary-mipsel/libxaw7-dbg_4.3.0.dfsg.1-14sarge3_mipsel.deb stable/main/binary-mipsel/xvfb_4.3.0.dfsg.1-14sarge3_mipsel.deb stable/main/binary-mipsel/libxtst-dev_4.3.0.dfsg.1-14sarge3_mipsel.deb stable/main/binary-mipsel/xlibmesa-glu_4.3.0.dfsg.1-14sarge3_mipsel.deb stable/main/binary-mipsel/xlibs-static-pic_4.3.0.dfsg.1-14sarge3_mipsel.deb stable/main/binary-mipsel/x-window-system-dev_4.3.0.dfsg.1-14sarge3_mipsel.deb stable/main/binary-mipsel/libxtrap6-dbg_4.3.0.dfsg.1-14sarge3_mipsel.deb stable/main/binary-mipsel/libice6-dbg_4.3.0.dfsg.1-14sarge3_mipsel.deb stable/main/binary-mipsel/libxmu6_4.3.0.dfsg.1-14sarge3_mipsel.deb stable/main/binary-mipsel/libsm6-dbg_4.3.0.dfsg.1-14sarge3_mipsel.deb stable/main/binary-mipsel/libxaw6-dev_4.3.0.dfsg.1-14sarge3_mipsel.deb stable/main/binary-mipsel/xlibs-static-dev_4.3.0.dfsg.1-14sarge3_mipsel.deb stable/main/binary-mipsel/libxmu6-dbg_4.3.0.dfsg.1-14sarge3_mipsel.deb stable/main/binary-mipsel/xfs_4.3.0.dfsg.1-14sarge3_mipsel.deb stable/main/binary-mipsel/libxv1_4.3.0.dfsg.1-14sarge3_mipsel.deb stable/main/binary-mipsel/xterm_4.3.0.dfsg.1-14sarge3_mipsel.deb stable/main/binary-mipsel/lbxproxy_4.3.0.dfsg.1-14sarge3_mipsel.deb stable/main/binary-mipsel/libxft1-dbg_4.3.0.dfsg.1-14sarge3_mipsel.deb stable/main/binary-mipsel/libxaw7-dev_4.3.0.dfsg.1-14sarge3_mipsel.deb stable/main/binary-mipsel/libxi6-dbg_4.3.0.dfsg.1-14sarge3_mipsel.deb stable/main/binary-mipsel/xfwp_4.3.0.dfsg.1-14sarge3_mipsel.deb stable/main/binary-mipsel/libxrandr2_4.3.0.dfsg.1-14sarge3_mipsel.deb stable/main/binary-mipsel/libsm-dev_4.3.0.dfsg.1-14sarge3_mipsel.deb stable/main/binary-mipsel/libsm6_4.3.0.dfsg.1-14sarge3_mipsel.deb stable/main/binary-mipsel/libx11-6_4.3.0.dfsg.1-14sarge3_mipsel.deb stable/main/binary-mipsel/xserver-xfree86_4.3.0.dfsg.1-14sarge3_mipsel.deb stable/main/binary-mipsel/libdps1-dbg_4.3.0.dfsg.1-14sarge3_mipsel.deb stable/main/binary-mipsel/libxpm4-dbg_4.3.0.dfsg.1-14sarge3_mipsel.deb stable/main/binary-mipsel/libdps1_4.3.0.dfsg.1-14sarge3_mipsel.deb stable/main/binary-mipsel/libxaw6_4.3.0.dfsg.1-14sarge3_mipsel.deb stable/main/binary-mipsel/libxi-dev_4.3.0.dfsg.1-14sarge3_mipsel.deb stable/main/binary-mipsel/xnest_4.3.0.dfsg.1-14sarge3_mipsel.deb stable/main/binary-mipsel/libxaw6-dbg_4.3.0.dfsg.1-14sarge3_mipsel.deb stable/main/binary-mipsel/libxt6-dbg_4.3.0.dfsg.1-14sarge3_mipsel.deb stable/main/binary-mipsel/libxrandr-dev_4.3.0.dfsg.1-14sarge3_mipsel.deb stable/main/binary-mipsel/libxi6_4.3.0.dfsg.1-14sarge3_mipsel.deb stable/main/binary-mipsel/xlibmesa-gl_4.3.0.dfsg.1-14sarge3_mipsel.deb stable/main/binary-mipsel/libxv1-dbg_4.3.0.dfsg.1-14sarge3_mipsel.deb stable/main/binary-mipsel/libxext6-dbg_4.3.0.dfsg.1-14sarge3_mipsel.deb stable/main/binary-mipsel/libxmuu1_4.3.0.dfsg.1-14sarge3_mipsel.deb stable/main/binary-mipsel/xutils_4.3.0.dfsg.1-14sarge3_mipsel.deb stable/main/binary-mipsel/libxv-dev_4.3.0.dfsg.1-14sarge3_mipsel.deb stable/main/binary-mipsel/libxmuu1-dbg_4.3.0.dfsg.1-14sarge3_mipsel.deb stable/main/binary-mipsel/libxtst6_4.3.0.dfsg.1-14sarge3_mipsel.deb stable/main/binary-mipsel/libx11-dev_4.3.0.dfsg.1-14sarge3_mipsel.deb stable/main/binary-mipsel/xbase-clients_4.3.0.dfsg.1-14sarge3_mipsel.deb stable/main/binary-mipsel/xlibmesa3_4.3.0.dfsg.1-14sarge3_mipsel.deb stable/main/binary-mipsel/twm_4.3.0.dfsg.1-14sarge3_mipsel.deb stable/main/binary-mipsel/xlibmesa-gl-dbg_4.3.0.dfsg.1-14sarge3_mipsel.deb stable/main/binary-mipsel/libxp6_4.3.0.dfsg.1-14sarge3_mipsel.deb stable/main/binary-mipsel/libxpm-dev_4.3.0.dfsg.1-14sarge3_mipsel.deb stable/main/binary-mipsel/xlibmesa-glu-dbg_4.3.0.dfsg.1-14sarge3_mipsel.deb stable/main/binary-mipsel/libxp6-dbg_4.3.0.dfsg.1-14sarge3_mipsel.deb stable/main/binary-mipsel/libxrandr2-dbg_4.3.0.dfsg.1-14sarge3_mipsel.deb stable/main/binary-mipsel/xserver-common_4.3.0.dfsg.1-14sarge3_mipsel.deb stable/main/binary-mipsel/libxt-dev_4.3.0.dfsg.1-14sarge3_mipsel.deb stable/main/binary-mipsel/libxext-dev_4.3.0.dfsg.1-14sarge3_mipsel.deb stable/main/binary-mipsel/libxp-dev_4.3.0.dfsg.1-14sarge3_mipsel.deb stable/main/binary-mipsel/libxft1_4.3.0.dfsg.1-14sarge3_mipsel.deb stable/main/binary-mipsel/libxmuu-dev_4.3.0.dfsg.1-14sarge3_mipsel.deb stable/main/binary-mipsel/libxtst6-dbg_4.3.0.dfsg.1-14sarge3_mipsel.deb stable/main/binary-mipsel/xdm_4.3.0.dfsg.1-14sarge3_mipsel.deb stable/main/binary-mipsel/proxymngr_4.3.0.dfsg.1-14sarge3_mipsel.deb stable/main/binary-mipsel/libxpm4_4.3.0.dfsg.1-14sarge3_mipsel.deb xfree86 (4.3.0.dfsg.1-14sarge3) stable-security; urgency=high * Non-maintainer update by the Security Team: Fixes several vulnerabilities reported by iDefense (CVE-2006-6101, CVE-2006-6102, CVE-2006-6103) stable/main/binary-mips/libxaw6_4.3.0.dfsg.1-14sarge3_mips.deb stable/main/binary-mips/libxv1-dbg_4.3.0.dfsg.1-14sarge3_mips.deb stable/main/binary-mips/xfwp_4.3.0.dfsg.1-14sarge3_mips.deb stable/main/binary-mips/xserver-xfree86_4.3.0.dfsg.1-14sarge3_mips.deb stable/main/binary-mips/libsm-dev_4.3.0.dfsg.1-14sarge3_mips.deb stable/main/binary-mips/libxi6_4.3.0.dfsg.1-14sarge3_mips.deb stable/main/binary-mips/libxmu-dev_4.3.0.dfsg.1-14sarge3_mips.deb stable/main/binary-mips/libxi-dev_4.3.0.dfsg.1-14sarge3_mips.deb stable/main/binary-mips/xfs_4.3.0.dfsg.1-14sarge3_mips.deb stable/main/binary-mips/libxpm4-dbg_4.3.0.dfsg.1-14sarge3_mips.deb stable/main/binary-mips/libdps1_4.3.0.dfsg.1-14sarge3_mips.deb stable/main/binary-mips/libxrandr-dev_4.3.0.dfsg.1-14sarge3_mips.deb stable/main/binary-mips/xutils_4.3.0.dfsg.1-14sarge3_mips.deb stable/main/binary-mips/libdps1-dbg_4.3.0.dfsg.1-14sarge3_mips.deb stable/main/binary-mips/libxaw7-dev_4.3.0.dfsg.1-14sarge3_mips.deb stable/main/binary-mips/libx11-dev_4.3.0.dfsg.1-14sarge3_mips.deb stable/main/binary-mips/libxv-dev_4.3.0.dfsg.1-14sarge3_mips.deb stable/main/binary-mips/libxext6-dbg_4.3.0.dfsg.1-14sarge3_mips.deb stable/main/binary-mips/libxrandr2_4.3.0.dfsg.1-14sarge3_mips.deb stable/main/binary-mips/libxtrap6-dbg_4.3.0.dfsg.1-14sarge3_mips.deb stable/main/binary-mips/libice-dev_4.3.0.dfsg.1-14sarge3_mips.deb stable/main/binary-mips/libxp-dev_4.3.0.dfsg.1-14sarge3_mips.deb stable/main/binary-mips/xlibs-static-dev_4.3.0.dfsg.1-14sarge3_mips.deb stable/main/binary-mips/libxi6-dbg_4.3.0.dfsg.1-14sarge3_mips.deb stable/main/binary-mips/libxaw7-dbg_4.3.0.dfsg.1-14sarge3_mips.deb stable/main/binary-mips/xlibs-static-pic_4.3.0.dfsg.1-14sarge3_mips.deb stable/main/binary-mips/x-window-system-dev_4.3.0.dfsg.1-14sarge3_mips.deb stable/main/binary-mips/libxaw7_4.3.0.dfsg.1-14sarge3_mips.deb stable/main/binary-mips/libxaw6-dev_4.3.0.dfsg.1-14sarge3_mips.deb stable/main/binary-mips/xterm_4.3.0.dfsg.1-14sarge3_mips.deb stable/main/binary-mips/xserver-xfree86-dbg_4.3.0.dfsg.1-14sarge3_mips.deb stable/main/binary-mips/libdps-dev_4.3.0.dfsg.1-14sarge3_mips.deb stable/main/binary-mips/libxv1_4.3.0.dfsg.1-14sarge3_mips.deb stable/main/binary-mips/libxtst6-dbg_4.3.0.dfsg.1-14sarge3_mips.deb stable/main/binary-mips/libxmuu-dev_4.3.0.dfsg.1-14sarge3_mips.deb stable/main/binary-mips/libxext6_4.3.0.dfsg.1-14sarge3_mips.deb stable/main/binary-mips/xmh_4.3.0.dfsg.1-14sarge3_mips.deb stable/main/binary-mips/xlibmesa3_4.3.0.dfsg.1-14sarge3_mips.deb stable/main/binary-mips/libxtrap-dev_4.3.0.dfsg.1-14sarge3_mips.deb stable/main/binary-mips/lbxproxy_4.3.0.dfsg.1-14sarge3_mips.deb stable/main/binary-mips/proxymngr_4.3.0.dfsg.1-14sarge3_mips.deb stable/main/binary-mips/libxrandr2-dbg_4.3.0.dfsg.1-14sarge3_mips.deb stable/main/binary-mips/libx11-6_4.3.0.dfsg.1-14sarge3_mips.deb stable/main/binary-mips/libxft1-dbg_4.3.0.dfsg.1-14sarge3_mips.deb stable/main/binary-mips/libx11-6-dbg_4.3.0.dfsg.1-14sarge3_mips.deb stable/main/binary-mips/twm_4.3.0.dfsg.1-14sarge3_mips.deb stable/main/binary-mips/libxft1_4.3.0.dfsg.1-14sarge3_mips.deb stable/main/binary-mips/xlibmesa-glu-dbg_4.3.0.dfsg.1-14sarge3_mips.deb stable/main/binary-mips/libxt-dev_4.3.0.dfsg.1-14sarge3_mips.deb stable/main/binary-mips/xbase-clients_4.3.0.dfsg.1-14sarge3_mips.deb stable/main/binary-mips/xvfb_4.3.0.dfsg.1-14sarge3_mips.deb stable/main/binary-mips/libxaw6-dbg_4.3.0.dfsg.1-14sarge3_mips.deb stable/main/binary-mips/xlibmesa-gl_4.3.0.dfsg.1-14sarge3_mips.deb stable/main/binary-mips/libxext-dev_4.3.0.dfsg.1-14sarge3_mips.deb stable/main/binary-mips/libsm6_4.3.0.dfsg.1-14sarge3_mips.deb stable/main/binary-mips/libice6-dbg_4.3.0.dfsg.1-14sarge3_mips.deb stable/main/binary-mips/xlibmesa-gl-dbg_4.3.0.dfsg.1-14sarge3_mips.deb stable/main/binary-mips/libxmuu1_4.3.0.dfsg.1-14sarge3_mips.deb stable/main/binary-mips/libxt6-dbg_4.3.0.dfsg.1-14sarge3_mips.deb stable/main/binary-mips/libxmu6_4.3.0.dfsg.1-14sarge3_mips.deb stable/main/binary-mips/libxmuu1-dbg_4.3.0.dfsg.1-14sarge3_mips.deb stable/main/binary-mips/libxt6_4.3.0.dfsg.1-14sarge3_mips.deb stable/main/binary-mips/libsm6-dbg_4.3.0.dfsg.1-14sarge3_mips.deb stable/main/binary-mips/libxmu6-dbg_4.3.0.dfsg.1-14sarge3_mips.deb stable/main/binary-mips/libxp6_4.3.0.dfsg.1-14sarge3_mips.deb stable/main/binary-mips/libxtrap6_4.3.0.dfsg.1-14sarge3_mips.deb stable/main/binary-mips/libice6_4.3.0.dfsg.1-14sarge3_mips.deb stable/main/binary-mips/xlibmesa-gl-dev_4.3.0.dfsg.1-14sarge3_mips.deb stable/main/binary-mips/libxtst6_4.3.0.dfsg.1-14sarge3_mips.deb stable/main/binary-mips/libxp6-dbg_4.3.0.dfsg.1-14sarge3_mips.deb stable/main/binary-mips/libxpm-dev_4.3.0.dfsg.1-14sarge3_mips.deb stable/main/binary-mips/libxpm4_4.3.0.dfsg.1-14sarge3_mips.deb stable/main/binary-mips/xserver-common_4.3.0.dfsg.1-14sarge3_mips.deb stable/main/binary-mips/x-window-system-core_4.3.0.dfsg.1-14sarge3_mips.deb stable/main/binary-mips/xlibmesa-glu-dev_4.3.0.dfsg.1-14sarge3_mips.deb stable/main/binary-mips/xdm_4.3.0.dfsg.1-14sarge3_mips.deb stable/main/binary-mips/xlibmesa-glu_4.3.0.dfsg.1-14sarge3_mips.deb stable/main/binary-mips/libxtst-dev_4.3.0.dfsg.1-14sarge3_mips.deb stable/main/binary-mips/xnest_4.3.0.dfsg.1-14sarge3_mips.deb xfree86 (4.3.0.dfsg.1-14sarge3) stable-security; urgency=high * Non-maintainer update by the Security Team: Fixes several vulnerabilities reported by iDefense (CVE-2006-6101, CVE-2006-6102, CVE-2006-6103) stable/main/binary-m68k/libsm6-dbg_4.3.0.dfsg.1-14sarge3_m68k.deb stable/main/binary-m68k/xvfb_4.3.0.dfsg.1-14sarge3_m68k.deb stable/main/binary-m68k/libxmu6_4.3.0.dfsg.1-14sarge3_m68k.deb stable/main/binary-m68k/libxtst-dev_4.3.0.dfsg.1-14sarge3_m68k.deb stable/main/binary-m68k/libxt-dev_4.3.0.dfsg.1-14sarge3_m68k.deb stable/main/binary-m68k/libxaw7-dev_4.3.0.dfsg.1-14sarge3_m68k.deb stable/main/binary-m68k/libxtrap6-dbg_4.3.0.dfsg.1-14sarge3_m68k.deb stable/main/binary-m68k/libice6-dbg_4.3.0.dfsg.1-14sarge3_m68k.deb stable/main/binary-m68k/xutils_4.3.0.dfsg.1-14sarge3_m68k.deb stable/main/binary-m68k/libxpm-dev_4.3.0.dfsg.1-14sarge3_m68k.deb stable/main/binary-m68k/xlibmesa3_4.3.0.dfsg.1-14sarge3_m68k.deb stable/main/binary-m68k/xlibs-static-dev_4.3.0.dfsg.1-14sarge3_m68k.deb stable/main/binary-m68k/libxp6-dbg_4.3.0.dfsg.1-14sarge3_m68k.deb stable/main/binary-m68k/libxaw7-dbg_4.3.0.dfsg.1-14sarge3_m68k.deb stable/main/binary-m68k/libxext-dev_4.3.0.dfsg.1-14sarge3_m68k.deb stable/main/binary-m68k/libsm-dev_4.3.0.dfsg.1-14sarge3_m68k.deb stable/main/binary-m68k/x-window-system-core_4.3.0.dfsg.1-14sarge3_m68k.deb stable/main/binary-m68k/xlibmesa-glu_4.3.0.dfsg.1-14sarge3_m68k.deb stable/main/binary-m68k/xdm_4.3.0.dfsg.1-14sarge3_m68k.deb stable/main/binary-m68k/libxi6-dbg_4.3.0.dfsg.1-14sarge3_m68k.deb stable/main/binary-m68k/libxv1-dbg_4.3.0.dfsg.1-14sarge3_m68k.deb stable/main/binary-m68k/libx11-6_4.3.0.dfsg.1-14sarge3_m68k.deb stable/main/binary-m68k/libxpm4_4.3.0.dfsg.1-14sarge3_m68k.deb stable/main/binary-m68k/x-window-system-dev_4.3.0.dfsg.1-14sarge3_m68k.deb stable/main/binary-m68k/libxrandr2_4.3.0.dfsg.1-14sarge3_m68k.deb stable/main/binary-m68k/xlibmesa-gl_4.3.0.dfsg.1-14sarge3_m68k.deb stable/main/binary-m68k/libice6_4.3.0.dfsg.1-14sarge3_m68k.deb stable/main/binary-m68k/libdps1-dbg_4.3.0.dfsg.1-14sarge3_m68k.deb stable/main/binary-m68k/xserver-xfree86_4.3.0.dfsg.1-14sarge3_m68k.deb stable/main/binary-m68k/libx11-6-dbg_4.3.0.dfsg.1-14sarge3_m68k.deb stable/main/binary-m68k/libxtst6-dbg_4.3.0.dfsg.1-14sarge3_m68k.deb stable/main/binary-m68k/libxmuu1-dbg_4.3.0.dfsg.1-14sarge3_m68k.deb stable/main/binary-m68k/libxft1-dbg_4.3.0.dfsg.1-14sarge3_m68k.deb stable/main/binary-m68k/xmh_4.3.0.dfsg.1-14sarge3_m68k.deb stable/main/binary-m68k/libxrandr2-dbg_4.3.0.dfsg.1-14sarge3_m68k.deb stable/main/binary-m68k/libxext6-dbg_4.3.0.dfsg.1-14sarge3_m68k.deb stable/main/binary-m68k/libxext6_4.3.0.dfsg.1-14sarge3_m68k.deb stable/main/binary-m68k/libx11-dev_4.3.0.dfsg.1-14sarge3_m68k.deb stable/main/binary-m68k/libxmu6-dbg_4.3.0.dfsg.1-14sarge3_m68k.deb stable/main/binary-m68k/libxmuu1_4.3.0.dfsg.1-14sarge3_m68k.deb stable/main/binary-m68k/libxv-dev_4.3.0.dfsg.1-14sarge3_m68k.deb stable/main/binary-m68k/libxaw6-dev_4.3.0.dfsg.1-14sarge3_m68k.deb stable/main/binary-m68k/xfwp_4.3.0.dfsg.1-14sarge3_m68k.deb stable/main/binary-m68k/libice-dev_4.3.0.dfsg.1-14sarge3_m68k.deb stable/main/binary-m68k/libxp6_4.3.0.dfsg.1-14sarge3_m68k.deb stable/main/binary-m68k/libxtrap-dev_4.3.0.dfsg.1-14sarge3_m68k.deb stable/main/binary-m68k/libxv1_4.3.0.dfsg.1-14sarge3_m68k.deb stable/main/binary-m68k/libxt6-dbg_4.3.0.dfsg.1-14sarge3_m68k.deb stable/main/binary-m68k/xlibmesa-gl-dbg_4.3.0.dfsg.1-14sarge3_m68k.deb stable/main/binary-m68k/xserver-common_4.3.0.dfsg.1-14sarge3_m68k.deb stable/main/binary-m68k/libxtst6_4.3.0.dfsg.1-14sarge3_m68k.deb stable/main/binary-m68k/libxtrap6_4.3.0.dfsg.1-14sarge3_m68k.deb stable/main/binary-m68k/twm_4.3.0.dfsg.1-14sarge3_m68k.deb stable/main/binary-m68k/xbase-clients_4.3.0.dfsg.1-14sarge3_m68k.deb stable/main/binary-m68k/libxaw7_4.3.0.dfsg.1-14sarge3_m68k.deb stable/main/binary-m68k/libxmuu-dev_4.3.0.dfsg.1-14sarge3_m68k.deb stable/main/binary-m68k/xlibmesa-glu-dbg_4.3.0.dfsg.1-14sarge3_m68k.deb stable/main/binary-m68k/proxymngr_4.3.0.dfsg.1-14sarge3_m68k.deb stable/main/binary-m68k/xterm_4.3.0.dfsg.1-14sarge3_m68k.deb stable/main/binary-m68k/xlibmesa-gl-dev_4.3.0.dfsg.1-14sarge3_m68k.deb stable/main/binary-m68k/libsm6_4.3.0.dfsg.1-14sarge3_m68k.deb stable/main/binary-m68k/libxaw6-dbg_4.3.0.dfsg.1-14sarge3_m68k.deb stable/main/binary-m68k/lbxproxy_4.3.0.dfsg.1-14sarge3_m68k.deb stable/main/binary-m68k/libxpm4-dbg_4.3.0.dfsg.1-14sarge3_m68k.deb stable/main/binary-m68k/libdps-dev_4.3.0.dfsg.1-14sarge3_m68k.deb stable/main/binary-m68k/libxft1_4.3.0.dfsg.1-14sarge3_m68k.deb stable/main/binary-m68k/libxi-dev_4.3.0.dfsg.1-14sarge3_m68k.deb stable/main/binary-m68k/xlibmesa-glu-dev_4.3.0.dfsg.1-14sarge3_m68k.deb stable/main/binary-m68k/libdps1_4.3.0.dfsg.1-14sarge3_m68k.deb stable/main/binary-m68k/xnest_4.3.0.dfsg.1-14sarge3_m68k.deb stable/main/binary-m68k/xfs_4.3.0.dfsg.1-14sarge3_m68k.deb stable/main/binary-m68k/xserver-xfree86-dbg_4.3.0.dfsg.1-14sarge3_m68k.deb stable/main/binary-m68k/libxaw6_4.3.0.dfsg.1-14sarge3_m68k.deb stable/main/binary-m68k/libxrandr-dev_4.3.0.dfsg.1-14sarge3_m68k.deb stable/main/binary-m68k/libxt6_4.3.0.dfsg.1-14sarge3_m68k.deb stable/main/binary-m68k/xlibs-static-pic_4.3.0.dfsg.1-14sarge3_m68k.deb stable/main/binary-m68k/libxmu-dev_4.3.0.dfsg.1-14sarge3_m68k.deb stable/main/binary-m68k/libxi6_4.3.0.dfsg.1-14sarge3_m68k.deb stable/main/binary-m68k/libxp-dev_4.3.0.dfsg.1-14sarge3_m68k.deb xfree86 (4.3.0.dfsg.1-14sarge3) stable-security; urgency=high * Non-maintainer update by the Security Team: Fixes several vulnerabilities reported by iDefense (CVE-2006-6101, CVE-2006-6102, CVE-2006-6103) stable/main/binary-ia64/xlibmesa-gl-dbg_4.3.0.dfsg.1-14sarge3_ia64.deb stable/main/binary-ia64/xutils_4.3.0.dfsg.1-14sarge3_ia64.deb stable/main/binary-ia64/xserver-xfree86_4.3.0.dfsg.1-14sarge3_ia64.deb stable/main/binary-ia64/libdps1_4.3.0.dfsg.1-14sarge3_ia64.deb stable/main/binary-ia64/libx11-dev_4.3.0.dfsg.1-14sarge3_ia64.deb stable/main/binary-ia64/libxi6-dbg_4.3.0.dfsg.1-14sarge3_ia64.deb stable/main/binary-ia64/libxmu6-dbg_4.3.0.dfsg.1-14sarge3_ia64.deb stable/main/binary-ia64/libxrandr2-dbg_4.3.0.dfsg.1-14sarge3_ia64.deb stable/main/binary-ia64/libx11-6_4.3.0.dfsg.1-14sarge3_ia64.deb stable/main/binary-ia64/libxpm4-dbg_4.3.0.dfsg.1-14sarge3_ia64.deb stable/main/binary-ia64/libxt6_4.3.0.dfsg.1-14sarge3_ia64.deb stable/main/binary-ia64/xlibmesa-gl_4.3.0.dfsg.1-14sarge3_ia64.deb stable/main/binary-ia64/xserver-xfree86-dbg_4.3.0.dfsg.1-14sarge3_ia64.deb stable/main/binary-ia64/libxmu6_4.3.0.dfsg.1-14sarge3_ia64.deb stable/main/binary-ia64/libxaw7_4.3.0.dfsg.1-14sarge3_ia64.deb stable/main/binary-ia64/libsm-dev_4.3.0.dfsg.1-14sarge3_ia64.deb stable/main/binary-ia64/libxp6-dbg_4.3.0.dfsg.1-14sarge3_ia64.deb stable/main/binary-ia64/libsm6_4.3.0.dfsg.1-14sarge3_ia64.deb stable/main/binary-ia64/xlibosmesa4_4.3.0.dfsg.1-14sarge3_ia64.deb stable/main/binary-ia64/libxaw6-dev_4.3.0.dfsg.1-14sarge3_ia64.deb stable/main/binary-ia64/libxt-dev_4.3.0.dfsg.1-14sarge3_ia64.deb stable/main/binary-ia64/libxaw7-dbg_4.3.0.dfsg.1-14sarge3_ia64.deb stable/main/binary-ia64/xfs_4.3.0.dfsg.1-14sarge3_ia64.deb stable/main/binary-ia64/libxv1-dbg_4.3.0.dfsg.1-14sarge3_ia64.deb stable/main/binary-ia64/libxtrap6_4.3.0.dfsg.1-14sarge3_ia64.deb stable/main/binary-ia64/xmh_4.3.0.dfsg.1-14sarge3_ia64.deb stable/main/binary-ia64/libice6_4.3.0.dfsg.1-14sarge3_ia64.deb stable/main/binary-ia64/libxrandr-dev_4.3.0.dfsg.1-14sarge3_ia64.deb stable/main/binary-ia64/xlibosmesa-dev_4.3.0.dfsg.1-14sarge3_ia64.deb stable/main/binary-ia64/libxrandr2_4.3.0.dfsg.1-14sarge3_ia64.deb stable/main/binary-ia64/libxi-dev_4.3.0.dfsg.1-14sarge3_ia64.deb stable/main/binary-ia64/libxmu-dev_4.3.0.dfsg.1-14sarge3_ia64.deb stable/main/binary-ia64/libxmuu1_4.3.0.dfsg.1-14sarge3_ia64.deb stable/main/binary-ia64/libdps-dev_4.3.0.dfsg.1-14sarge3_ia64.deb stable/main/binary-ia64/proxymngr_4.3.0.dfsg.1-14sarge3_ia64.deb stable/main/binary-ia64/libdps1-dbg_4.3.0.dfsg.1-14sarge3_ia64.deb stable/main/binary-ia64/x-window-system-core_4.3.0.dfsg.1-14sarge3_ia64.deb stable/main/binary-ia64/libxtrap-dev_4.3.0.dfsg.1-14sarge3_ia64.deb stable/main/binary-ia64/libice-dev_4.3.0.dfsg.1-14sarge3_ia64.deb stable/main/binary-ia64/xlibs-static-dev_4.3.0.dfsg.1-14sarge3_ia64.deb stable/main/binary-ia64/libxaw6-dbg_4.3.0.dfsg.1-14sarge3_ia64.deb stable/main/binary-ia64/libxft1-dbg_4.3.0.dfsg.1-14sarge3_ia64.deb stable/main/binary-ia64/libxext6_4.3.0.dfsg.1-14sarge3_ia64.deb stable/main/binary-ia64/twm_4.3.0.dfsg.1-14sarge3_ia64.deb stable/main/binary-ia64/xlibs-static-pic_4.3.0.dfsg.1-14sarge3_ia64.deb stable/main/binary-ia64/libxp-dev_4.3.0.dfsg.1-14sarge3_ia64.deb stable/main/binary-ia64/xnest_4.3.0.dfsg.1-14sarge3_ia64.deb stable/main/binary-ia64/libxmuu-dev_4.3.0.dfsg.1-14sarge3_ia64.deb stable/main/binary-ia64/xdm_4.3.0.dfsg.1-14sarge3_ia64.deb stable/main/binary-ia64/xlibmesa-glu-dbg_4.3.0.dfsg.1-14sarge3_ia64.deb stable/main/binary-ia64/libxmuu1-dbg_4.3.0.dfsg.1-14sarge3_ia64.deb stable/main/binary-ia64/libxpm-dev_4.3.0.dfsg.1-14sarge3_ia64.deb stable/main/binary-ia64/libxaw7-dev_4.3.0.dfsg.1-14sarge3_ia64.deb stable/main/binary-ia64/libxv-dev_4.3.0.dfsg.1-14sarge3_ia64.deb stable/main/binary-ia64/xlibmesa-gl-dev_4.3.0.dfsg.1-14sarge3_ia64.deb stable/main/binary-ia64/libxi6_4.3.0.dfsg.1-14sarge3_ia64.deb stable/main/binary-ia64/libice6-dbg_4.3.0.dfsg.1-14sarge3_ia64.deb stable/main/binary-ia64/libxtrap6-dbg_4.3.0.dfsg.1-14sarge3_ia64.deb stable/main/binary-ia64/xbase-clients_4.3.0.dfsg.1-14sarge3_ia64.deb stable/main/binary-ia64/libxtst-dev_4.3.0.dfsg.1-14sarge3_ia64.deb stable/main/binary-ia64/xlibmesa-glu_4.3.0.dfsg.1-14sarge3_ia64.deb stable/main/binary-ia64/libxext6-dbg_4.3.0.dfsg.1-14sarge3_ia64.deb stable/main/binary-ia64/xlibmesa-dri-dbg_4.3.0.dfsg.1-14sarge3_ia64.deb stable/main/binary-ia64/xvfb_4.3.0.dfsg.1-14sarge3_ia64.deb stable/main/binary-ia64/xlibmesa-dri_4.3.0.dfsg.1-14sarge3_ia64.deb stable/main/binary-ia64/lbxproxy_4.3.0.dfsg.1-14sarge3_ia64.deb stable/main/binary-ia64/xlibmesa3_4.3.0.dfsg.1-14sarge3_ia64.deb stable/main/binary-ia64/libxtst6-dbg_4.3.0.dfsg.1-14sarge3_ia64.deb stable/main/binary-ia64/xserver-common_4.3.0.dfsg.1-14sarge3_ia64.deb stable/main/binary-ia64/libxaw6_4.3.0.dfsg.1-14sarge3_ia64.deb stable/main/binary-ia64/xfwp_4.3.0.dfsg.1-14sarge3_ia64.deb stable/main/binary-ia64/xlibosmesa4-dbg_4.3.0.dfsg.1-14sarge3_ia64.deb stable/main/binary-ia64/xlibmesa-glu-dev_4.3.0.dfsg.1-14sarge3_ia64.deb stable/main/binary-ia64/libxt6-dbg_4.3.0.dfsg.1-14sarge3_ia64.deb stable/main/binary-ia64/libxtst6_4.3.0.dfsg.1-14sarge3_ia64.deb stable/main/binary-ia64/libxft1_4.3.0.dfsg.1-14sarge3_ia64.deb stable/main/binary-ia64/libxpm4_4.3.0.dfsg.1-14sarge3_ia64.deb stable/main/binary-ia64/libx11-6-dbg_4.3.0.dfsg.1-14sarge3_ia64.deb stable/main/binary-ia64/xterm_4.3.0.dfsg.1-14sarge3_ia64.deb stable/main/binary-ia64/libxext-dev_4.3.0.dfsg.1-14sarge3_ia64.deb stable/main/binary-ia64/libsm6-dbg_4.3.0.dfsg.1-14sarge3_ia64.deb stable/main/binary-ia64/libxv1_4.3.0.dfsg.1-14sarge3_ia64.deb stable/main/binary-ia64/libxp6_4.3.0.dfsg.1-14sarge3_ia64.deb stable/main/binary-ia64/x-window-system-dev_4.3.0.dfsg.1-14sarge3_ia64.deb xfree86 (4.3.0.dfsg.1-14sarge3) stable-security; urgency=high * Non-maintainer update by the Security Team: Fixes several vulnerabilities reported by iDefense (CVE-2006-6101, CVE-2006-6102, CVE-2006-6103) stable/main/binary-hppa/xfs_4.3.0.dfsg.1-14sarge3_hppa.deb stable/main/binary-hppa/xlibmesa-glu_4.3.0.dfsg.1-14sarge3_hppa.deb stable/main/binary-hppa/xserver-xfree86_4.3.0.dfsg.1-14sarge3_hppa.deb stable/main/binary-hppa/xvfb_4.3.0.dfsg.1-14sarge3_hppa.deb stable/main/binary-hppa/libxext6-dbg_4.3.0.dfsg.1-14sarge3_hppa.deb stable/main/binary-hppa/lbxproxy_4.3.0.dfsg.1-14sarge3_hppa.deb stable/main/binary-hppa/libxmuu1_4.3.0.dfsg.1-14sarge3_hppa.deb stable/main/binary-hppa/libxt6_4.3.0.dfsg.1-14sarge3_hppa.deb stable/main/binary-hppa/libxi6-dbg_4.3.0.dfsg.1-14sarge3_hppa.deb stable/main/binary-hppa/x-window-system-dev_4.3.0.dfsg.1-14sarge3_hppa.deb stable/main/binary-hppa/libxaw6-dev_4.3.0.dfsg.1-14sarge3_hppa.deb stable/main/binary-hppa/libxtst-dev_4.3.0.dfsg.1-14sarge3_hppa.deb stable/main/binary-hppa/libxft1-dbg_4.3.0.dfsg.1-14sarge3_hppa.deb stable/main/binary-hppa/libice6-dbg_4.3.0.dfsg.1-14sarge3_hppa.deb stable/main/binary-hppa/libxtrap6-dbg_4.3.0.dfsg.1-14sarge3_hppa.deb stable/main/binary-hppa/xlibmesa-glu-dev_4.3.0.dfsg.1-14sarge3_hppa.deb stable/main/binary-hppa/libdps1_4.3.0.dfsg.1-14sarge3_hppa.deb stable/main/binary-hppa/libxp6_4.3.0.dfsg.1-14sarge3_hppa.deb stable/main/binary-hppa/xterm_4.3.0.dfsg.1-14sarge3_hppa.deb stable/main/binary-hppa/xlibmesa-gl_4.3.0.dfsg.1-14sarge3_hppa.deb stable/main/binary-hppa/libxp6-dbg_4.3.0.dfsg.1-14sarge3_hppa.deb stable/main/binary-hppa/libxt-dev_4.3.0.dfsg.1-14sarge3_hppa.deb stable/main/binary-hppa/libxv-dev_4.3.0.dfsg.1-14sarge3_hppa.deb stable/main/binary-hppa/libsm6_4.3.0.dfsg.1-14sarge3_hppa.deb stable/main/binary-hppa/xdm_4.3.0.dfsg.1-14sarge3_hppa.deb stable/main/binary-hppa/libxtrap6_4.3.0.dfsg.1-14sarge3_hppa.deb stable/main/binary-hppa/libice6_4.3.0.dfsg.1-14sarge3_hppa.deb stable/main/binary-hppa/libxrandr-dev_4.3.0.dfsg.1-14sarge3_hppa.deb stable/main/binary-hppa/xlibmesa-gl-dbg_4.3.0.dfsg.1-14sarge3_hppa.deb stable/main/binary-hppa/libxaw6-dbg_4.3.0.dfsg.1-14sarge3_hppa.deb stable/main/binary-hppa/xnest_4.3.0.dfsg.1-14sarge3_hppa.deb stable/main/binary-hppa/libxrandr2_4.3.0.dfsg.1-14sarge3_hppa.deb stable/main/binary-hppa/libxrandr2-dbg_4.3.0.dfsg.1-14sarge3_hppa.deb stable/main/binary-hppa/xfwp_4.3.0.dfsg.1-14sarge3_hppa.deb stable/main/binary-hppa/libxp-dev_4.3.0.dfsg.1-14sarge3_hppa.deb stable/main/binary-hppa/libxaw6_4.3.0.dfsg.1-14sarge3_hppa.deb stable/main/binary-hppa/libx11-6-dbg_4.3.0.dfsg.1-14sarge3_hppa.deb stable/main/binary-hppa/libsm-dev_4.3.0.dfsg.1-14sarge3_hppa.deb stable/main/binary-hppa/libxtst6-dbg_4.3.0.dfsg.1-14sarge3_hppa.deb stable/main/binary-hppa/libxmuu-dev_4.3.0.dfsg.1-14sarge3_hppa.deb stable/main/binary-hppa/xlibmesa3_4.3.0.dfsg.1-14sarge3_hppa.deb stable/main/binary-hppa/libxmu6_4.3.0.dfsg.1-14sarge3_hppa.deb stable/main/binary-hppa/libxmuu1-dbg_4.3.0.dfsg.1-14sarge3_hppa.deb stable/main/binary-hppa/xserver-xfree86-dbg_4.3.0.dfsg.1-14sarge3_hppa.deb stable/main/binary-hppa/libxmu-dev_4.3.0.dfsg.1-14sarge3_hppa.deb stable/main/binary-hppa/libxext6_4.3.0.dfsg.1-14sarge3_hppa.deb stable/main/binary-hppa/xlibs-static-pic_4.3.0.dfsg.1-14sarge3_hppa.deb stable/main/binary-hppa/libxtst6_4.3.0.dfsg.1-14sarge3_hppa.deb stable/main/binary-hppa/libxt6-dbg_4.3.0.dfsg.1-14sarge3_hppa.deb stable/main/binary-hppa/libxi6_4.3.0.dfsg.1-14sarge3_hppa.deb stable/main/binary-hppa/xmh_4.3.0.dfsg.1-14sarge3_hppa.deb stable/main/binary-hppa/xserver-common_4.3.0.dfsg.1-14sarge3_hppa.deb stable/main/binary-hppa/libxv1_4.3.0.dfsg.1-14sarge3_hppa.deb stable/main/binary-hppa/xutils_4.3.0.dfsg.1-14sarge3_hppa.deb stable/main/binary-hppa/libxv1-dbg_4.3.0.dfsg.1-14sarge3_hppa.deb stable/main/binary-hppa/libx11-dev_4.3.0.dfsg.1-14sarge3_hppa.deb stable/main/binary-hppa/libxft1_4.3.0.dfsg.1-14sarge3_hppa.deb stable/main/binary-hppa/libxi-dev_4.3.0.dfsg.1-14sarge3_hppa.deb stable/main/binary-hppa/x-window-system-core_4.3.0.dfsg.1-14sarge3_hppa.deb stable/main/binary-hppa/libx11-6_4.3.0.dfsg.1-14sarge3_hppa.deb stable/main/binary-hppa/proxymngr_4.3.0.dfsg.1-14sarge3_hppa.deb stable/main/binary-hppa/libsm6-dbg_4.3.0.dfsg.1-14sarge3_hppa.deb stable/main/binary-hppa/libxaw7-dev_4.3.0.dfsg.1-14sarge3_hppa.deb stable/main/binary-hppa/libxext-dev_4.3.0.dfsg.1-14sarge3_hppa.deb stable/main/binary-hppa/libdps1-dbg_4.3.0.dfsg.1-14sarge3_hppa.deb stable/main/binary-hppa/libxmu6-dbg_4.3.0.dfsg.1-14sarge3_hppa.deb stable/main/binary-hppa/libxpm-dev_4.3.0.dfsg.1-14sarge3_hppa.deb stable/main/binary-hppa/libxtrap-dev_4.3.0.dfsg.1-14sarge3_hppa.deb stable/main/binary-hppa/libice-dev_4.3.0.dfsg.1-14sarge3_hppa.deb stable/main/binary-hppa/xbase-clients_4.3.0.dfsg.1-14sarge3_hppa.deb stable/main/binary-hppa/xlibs-static-dev_4.3.0.dfsg.1-14sarge3_hppa.deb stable/main/binary-hppa/libxaw7-dbg_4.3.0.dfsg.1-14sarge3_hppa.deb stable/main/binary-hppa/libxpm4_4.3.0.dfsg.1-14sarge3_hppa.deb stable/main/binary-hppa/libdps-dev_4.3.0.dfsg.1-14sarge3_hppa.deb stable/main/binary-hppa/libxpm4-dbg_4.3.0.dfsg.1-14sarge3_hppa.deb stable/main/binary-hppa/twm_4.3.0.dfsg.1-14sarge3_hppa.deb stable/main/binary-hppa/xlibmesa-glu-dbg_4.3.0.dfsg.1-14sarge3_hppa.deb stable/main/binary-hppa/libxaw7_4.3.0.dfsg.1-14sarge3_hppa.deb stable/main/binary-hppa/xlibmesa-gl-dev_4.3.0.dfsg.1-14sarge3_hppa.deb xfree86 (4.3.0.dfsg.1-14sarge3) stable-security; urgency=high * Non-maintainer update by the Security Team: Fixes several vulnerabilities reported by iDefense (CVE-2006-6101, CVE-2006-6102, CVE-2006-6103) stable/main/binary-arm/libxaw6-dev_4.3.0.dfsg.1-14sarge3_arm.deb stable/main/binary-arm/libxp6_4.3.0.dfsg.1-14sarge3_arm.deb stable/main/binary-arm/xserver-xfree86_4.3.0.dfsg.1-14sarge3_arm.deb stable/main/binary-arm/libsm-dev_4.3.0.dfsg.1-14sarge3_arm.deb stable/main/binary-arm/x-window-system-dev_4.3.0.dfsg.1-14sarge3_arm.deb stable/main/binary-arm/xfs_4.3.0.dfsg.1-14sarge3_arm.deb stable/main/binary-arm/libdps1_4.3.0.dfsg.1-14sarge3_arm.deb stable/main/binary-arm/libxtrap6-dbg_4.3.0.dfsg.1-14sarge3_arm.deb stable/main/binary-arm/libx11-6_4.3.0.dfsg.1-14sarge3_arm.deb stable/main/binary-arm/libx11-6-dbg_4.3.0.dfsg.1-14sarge3_arm.deb stable/main/binary-arm/libxext6_4.3.0.dfsg.1-14sarge3_arm.deb stable/main/binary-arm/xlibmesa-gl-dbg_4.3.0.dfsg.1-14sarge3_arm.deb stable/main/binary-arm/xdm_4.3.0.dfsg.1-14sarge3_arm.deb stable/main/binary-arm/xnest_4.3.0.dfsg.1-14sarge3_arm.deb stable/main/binary-arm/libxrandr-dev_4.3.0.dfsg.1-14sarge3_arm.deb stable/main/binary-arm/libxv-dev_4.3.0.dfsg.1-14sarge3_arm.deb stable/main/binary-arm/libxaw6-dbg_4.3.0.dfsg.1-14sarge3_arm.deb stable/main/binary-arm/libxi-dev_4.3.0.dfsg.1-14sarge3_arm.deb stable/main/binary-arm/libxt6-dbg_4.3.0.dfsg.1-14sarge3_arm.deb stable/main/binary-arm/libxp6-dbg_4.3.0.dfsg.1-14sarge3_arm.deb stable/main/binary-arm/libdps1-dbg_4.3.0.dfsg.1-14sarge3_arm.deb stable/main/binary-arm/xlibs-static-dev_4.3.0.dfsg.1-14sarge3_arm.deb stable/main/binary-arm/xfwp_4.3.0.dfsg.1-14sarge3_arm.deb stable/main/binary-arm/libxaw6_4.3.0.dfsg.1-14sarge3_arm.deb stable/main/binary-arm/xterm_4.3.0.dfsg.1-14sarge3_arm.deb stable/main/binary-arm/libxmuu1-dbg_4.3.0.dfsg.1-14sarge3_arm.deb stable/main/binary-arm/lbxproxy_4.3.0.dfsg.1-14sarge3_arm.deb stable/main/binary-arm/libxrandr2-dbg_4.3.0.dfsg.1-14sarge3_arm.deb stable/main/binary-arm/libxrandr2_4.3.0.dfsg.1-14sarge3_arm.deb stable/main/binary-arm/libxp-dev_4.3.0.dfsg.1-14sarge3_arm.deb stable/main/binary-arm/xserver-xfree86-dbg_4.3.0.dfsg.1-14sarge3_arm.deb stable/main/binary-arm/libxtst6_4.3.0.dfsg.1-14sarge3_arm.deb stable/main/binary-arm/libxft1_4.3.0.dfsg.1-14sarge3_arm.deb stable/main/binary-arm/libxpm4_4.3.0.dfsg.1-14sarge3_arm.deb stable/main/binary-arm/libxv1_4.3.0.dfsg.1-14sarge3_arm.deb stable/main/binary-arm/twm_4.3.0.dfsg.1-14sarge3_arm.deb stable/main/binary-arm/xlibmesa-glu-dbg_4.3.0.dfsg.1-14sarge3_arm.deb stable/main/binary-arm/xbase-clients_4.3.0.dfsg.1-14sarge3_arm.deb stable/main/binary-arm/libxtst6-dbg_4.3.0.dfsg.1-14sarge3_arm.deb stable/main/binary-arm/proxymngr_4.3.0.dfsg.1-14sarge3_arm.deb stable/main/binary-arm/libdps-dev_4.3.0.dfsg.1-14sarge3_arm.deb stable/main/binary-arm/libxmuu-dev_4.3.0.dfsg.1-14sarge3_arm.deb stable/main/binary-arm/libxaw7-dev_4.3.0.dfsg.1-14sarge3_arm.deb stable/main/binary-arm/libxmu-dev_4.3.0.dfsg.1-14sarge3_arm.deb stable/main/binary-arm/libsm6_4.3.0.dfsg.1-14sarge3_arm.deb stable/main/binary-arm/libxt-dev_4.3.0.dfsg.1-14sarge3_arm.deb stable/main/binary-arm/libsm6-dbg_4.3.0.dfsg.1-14sarge3_arm.deb stable/main/binary-arm/libxi6-dbg_4.3.0.dfsg.1-14sarge3_arm.deb stable/main/binary-arm/libxi6_4.3.0.dfsg.1-14sarge3_arm.deb stable/main/binary-arm/libxtrap6_4.3.0.dfsg.1-14sarge3_arm.deb stable/main/binary-arm/libice6_4.3.0.dfsg.1-14sarge3_arm.deb stable/main/binary-arm/xlibmesa-gl_4.3.0.dfsg.1-14sarge3_arm.deb stable/main/binary-arm/libxt6_4.3.0.dfsg.1-14sarge3_arm.deb stable/main/binary-arm/libxaw7_4.3.0.dfsg.1-14sarge3_arm.deb stable/main/binary-arm/libxmu6_4.3.0.dfsg.1-14sarge3_arm.deb stable/main/binary-arm/libx11-dev_4.3.0.dfsg.1-14sarge3_arm.deb stable/main/binary-arm/xlibmesa-glu-dev_4.3.0.dfsg.1-14sarge3_arm.deb stable/main/binary-arm/xutils_4.3.0.dfsg.1-14sarge3_arm.deb stable/main/binary-arm/xlibmesa-gl-dev_4.3.0.dfsg.1-14sarge3_arm.deb stable/main/binary-arm/libxext-dev_4.3.0.dfsg.1-14sarge3_arm.deb stable/main/binary-arm/xvfb_4.3.0.dfsg.1-14sarge3_arm.deb stable/main/binary-arm/xmh_4.3.0.dfsg.1-14sarge3_arm.deb stable/main/binary-arm/libice6-dbg_4.3.0.dfsg.1-14sarge3_arm.deb stable/main/binary-arm/libxpm4-dbg_4.3.0.dfsg.1-14sarge3_arm.deb stable/main/binary-arm/libxtst-dev_4.3.0.dfsg.1-14sarge3_arm.deb stable/main/binary-arm/xlibmesa-glu_4.3.0.dfsg.1-14sarge3_arm.deb stable/main/binary-arm/x-window-system-core_4.3.0.dfsg.1-14sarge3_arm.deb stable/main/binary-arm/libxext6-dbg_4.3.0.dfsg.1-14sarge3_arm.deb stable/main/binary-arm/xlibmesa3_4.3.0.dfsg.1-14sarge3_arm.deb stable/main/binary-arm/libxv1-dbg_4.3.0.dfsg.1-14sarge3_arm.deb stable/main/binary-arm/xserver-common_4.3.0.dfsg.1-14sarge3_arm.deb stable/main/binary-arm/libxtrap-dev_4.3.0.dfsg.1-14sarge3_arm.deb stable/main/binary-arm/libice-dev_4.3.0.dfsg.1-14sarge3_arm.deb stable/main/binary-arm/xlibs-static-pic_4.3.0.dfsg.1-14sarge3_arm.deb stable/main/binary-arm/libxmu6-dbg_4.3.0.dfsg.1-14sarge3_arm.deb stable/main/binary-arm/libxpm-dev_4.3.0.dfsg.1-14sarge3_arm.deb stable/main/binary-arm/libxmuu1_4.3.0.dfsg.1-14sarge3_arm.deb stable/main/binary-arm/libxaw7-dbg_4.3.0.dfsg.1-14sarge3_arm.deb stable/main/binary-arm/libxft1-dbg_4.3.0.dfsg.1-14sarge3_arm.deb xfree86 (4.3.0.dfsg.1-14sarge3) stable-security; urgency=high * Non-maintainer update by the Security Team: Fixes several vulnerabilities reported by iDefense (CVE-2006-6101, CVE-2006-6102, CVE-2006-6103) stable/main/binary-alpha/libxmuu1-dbg_4.3.0.dfsg.1-14sarge3_alpha.deb stable/main/binary-alpha/libxmu6-dbg_4.3.0.dfsg.1-14sarge3_alpha.deb stable/main/binary-alpha/libxft1-dbg_4.3.0.dfsg.1-14sarge3_alpha.deb stable/main/binary-alpha/xserver-common_4.3.0.dfsg.1-14sarge3_alpha.deb stable/main/binary-alpha/xlibmesa-glu-dbg_4.3.0.dfsg.1-14sarge3_alpha.deb stable/main/binary-alpha/libx11-6-dbg_4.3.0.dfsg.1-14sarge3_alpha.deb stable/main/binary-alpha/xbase-clients_4.3.0.dfsg.1-14sarge3_alpha.deb stable/main/binary-alpha/libxmuu-dev_4.3.0.dfsg.1-14sarge3_alpha.deb stable/main/binary-alpha/libxi6_4.3.0.dfsg.1-14sarge3_alpha.deb stable/main/binary-alpha/libdps1_4.3.0.dfsg.1-14sarge3_alpha.deb stable/main/binary-alpha/twm_4.3.0.dfsg.1-14sarge3_alpha.deb stable/main/binary-alpha/libxt-dev_4.3.0.dfsg.1-14sarge3_alpha.deb stable/main/binary-alpha/xterm_4.3.0.dfsg.1-14sarge3_alpha.deb stable/main/binary-alpha/libxpm4_4.3.0.dfsg.1-14sarge3_alpha.deb stable/main/binary-alpha/libxaw6-dev_4.3.0.dfsg.1-14sarge3_alpha.deb stable/main/binary-alpha/libxrandr2-dbg_4.3.0.dfsg.1-14sarge3_alpha.deb stable/main/binary-alpha/libxi-dev_4.3.0.dfsg.1-14sarge3_alpha.deb stable/main/binary-alpha/xlibosmesa4_4.3.0.dfsg.1-14sarge3_alpha.deb stable/main/binary-alpha/libxv-dev_4.3.0.dfsg.1-14sarge3_alpha.deb stable/main/binary-alpha/libxft1_4.3.0.dfsg.1-14sarge3_alpha.deb stable/main/binary-alpha/libxt6-dbg_4.3.0.dfsg.1-14sarge3_alpha.deb stable/main/binary-alpha/xlibosmesa4-dbg_4.3.0.dfsg.1-14sarge3_alpha.deb stable/main/binary-alpha/xmh_4.3.0.dfsg.1-14sarge3_alpha.deb stable/main/binary-alpha/xlibmesa-glu-dev_4.3.0.dfsg.1-14sarge3_alpha.deb stable/main/binary-alpha/xserver-xfree86_4.3.0.dfsg.1-14sarge3_alpha.deb stable/main/binary-alpha/libxv1_4.3.0.dfsg.1-14sarge3_alpha.deb stable/main/binary-alpha/proxymngr_4.3.0.dfsg.1-14sarge3_alpha.deb stable/main/binary-alpha/xlibs-static-dev_4.3.0.dfsg.1-14sarge3_alpha.deb stable/main/binary-alpha/libxt6_4.3.0.dfsg.1-14sarge3_alpha.deb stable/main/binary-alpha/libxp6-dbg_4.3.0.dfsg.1-14sarge3_alpha.deb stable/main/binary-alpha/libice6_4.3.0.dfsg.1-14sarge3_alpha.deb stable/main/binary-alpha/libdps1-dbg_4.3.0.dfsg.1-14sarge3_alpha.deb stable/main/binary-alpha/lbxproxy_4.3.0.dfsg.1-14sarge3_alpha.deb stable/main/binary-alpha/libxaw6-dbg_4.3.0.dfsg.1-14sarge3_alpha.deb stable/main/binary-alpha/libsm-dev_4.3.0.dfsg.1-14sarge3_alpha.deb stable/main/binary-alpha/libxext6-dbg_4.3.0.dfsg.1-14sarge3_alpha.deb stable/main/binary-alpha/libxtrap6_4.3.0.dfsg.1-14sarge3_alpha.deb stable/main/binary-alpha/libxmuu1_4.3.0.dfsg.1-14sarge3_alpha.deb stable/main/binary-alpha/libxaw7_4.3.0.dfsg.1-14sarge3_alpha.deb stable/main/binary-alpha/libxpm-dev_4.3.0.dfsg.1-14sarge3_alpha.deb stable/main/binary-alpha/libdps-dev_4.3.0.dfsg.1-14sarge3_alpha.deb stable/main/binary-alpha/libxtst6-dbg_4.3.0.dfsg.1-14sarge3_alpha.deb stable/main/binary-alpha/libxi6-dbg_4.3.0.dfsg.1-14sarge3_alpha.deb stable/main/binary-alpha/libxtst6_4.3.0.dfsg.1-14sarge3_alpha.deb stable/main/binary-alpha/x-window-system-dev_4.3.0.dfsg.1-14sarge3_alpha.deb stable/main/binary-alpha/libxp-dev_4.3.0.dfsg.1-14sarge3_alpha.deb stable/main/binary-alpha/xlibmesa-glu_4.3.0.dfsg.1-14sarge3_alpha.deb stable/main/binary-alpha/libxtst-dev_4.3.0.dfsg.1-14sarge3_alpha.deb stable/main/binary-alpha/xvfb_4.3.0.dfsg.1-14sarge3_alpha.deb stable/main/binary-alpha/xlibmesa-dri-dbg_4.3.0.dfsg.1-14sarge3_alpha.deb stable/main/binary-alpha/libxmu-dev_4.3.0.dfsg.1-14sarge3_alpha.deb stable/main/binary-alpha/xlibmesa3_4.3.0.dfsg.1-14sarge3_alpha.deb stable/main/binary-alpha/xlibmesa-gl_4.3.0.dfsg.1-14sarge3_alpha.deb stable/main/binary-alpha/xlibmesa-dri_4.3.0.dfsg.1-14sarge3_alpha.deb stable/main/binary-alpha/xlibmesa-gl-dbg_4.3.0.dfsg.1-14sarge3_alpha.deb stable/main/binary-alpha/xutils_4.3.0.dfsg.1-14sarge3_alpha.deb stable/main/binary-alpha/xserver-xfree86-dbg_4.3.0.dfsg.1-14sarge3_alpha.deb stable/main/binary-alpha/xlibs-static-pic_4.3.0.dfsg.1-14sarge3_alpha.deb stable/main/binary-alpha/libice6-dbg_4.3.0.dfsg.1-14sarge3_alpha.deb stable/main/binary-alpha/libx11-dev_4.3.0.dfsg.1-14sarge3_alpha.deb stable/main/binary-alpha/libxmu6_4.3.0.dfsg.1-14sarge3_alpha.deb stable/main/binary-alpha/libxtrap6-dbg_4.3.0.dfsg.1-14sarge3_alpha.deb stable/main/binary-alpha/libxaw6_4.3.0.dfsg.1-14sarge3_alpha.deb stable/main/binary-alpha/xfwp_4.3.0.dfsg.1-14sarge3_alpha.deb stable/main/binary-alpha/xlibosmesa-dev_4.3.0.dfsg.1-14sarge3_alpha.deb stable/main/binary-alpha/libxaw7-dbg_4.3.0.dfsg.1-14sarge3_alpha.deb stable/main/binary-alpha/libxext6_4.3.0.dfsg.1-14sarge3_alpha.deb stable/main/binary-alpha/libxpm4-dbg_4.3.0.dfsg.1-14sarge3_alpha.deb stable/main/binary-alpha/libsm6-dbg_4.3.0.dfsg.1-14sarge3_alpha.deb stable/main/binary-alpha/xlibmesa-gl-dev_4.3.0.dfsg.1-14sarge3_alpha.deb stable/main/binary-alpha/libxext-dev_4.3.0.dfsg.1-14sarge3_alpha.deb stable/main/binary-alpha/libxp6_4.3.0.dfsg.1-14sarge3_alpha.deb stable/main/binary-alpha/x-window-system-core_4.3.0.dfsg.1-14sarge3_alpha.deb stable/main/binary-alpha/libx11-6_4.3.0.dfsg.1-14sarge3_alpha.deb stable/main/binary-alpha/xfs_4.3.0.dfsg.1-14sarge3_alpha.deb stable/main/binary-alpha/xnest_4.3.0.dfsg.1-14sarge3_alpha.deb stable/main/binary-alpha/libxv1-dbg_4.3.0.dfsg.1-14sarge3_alpha.deb stable/main/binary-alpha/libxrandr-dev_4.3.0.dfsg.1-14sarge3_alpha.deb stable/main/binary-alpha/libxtrap-dev_4.3.0.dfsg.1-14sarge3_alpha.deb stable/main/binary-alpha/xdm_4.3.0.dfsg.1-14sarge3_alpha.deb stable/main/binary-alpha/libsm6_4.3.0.dfsg.1-14sarge3_alpha.deb stable/main/binary-alpha/libxrandr2_4.3.0.dfsg.1-14sarge3_alpha.deb stable/main/binary-alpha/libice-dev_4.3.0.dfsg.1-14sarge3_alpha.deb stable/main/binary-alpha/libxaw7-dev_4.3.0.dfsg.1-14sarge3_alpha.deb xfree86 (4.3.0.dfsg.1-14sarge3) stable-security; urgency=high * Non-maintainer update by the Security Team: Fixes several vulnerabilities reported by iDefense (CVE-2006-6101, CVE-2006-6102, CVE-2006-6103) stable/main/binary-i386/libx11-dev_4.3.0.dfsg.1-14sarge3_i386.deb stable/main/binary-i386/libdps-dev_4.3.0.dfsg.1-14sarge3_i386.deb stable/main/binary-i386/xlibmesa-gl-dev_4.3.0.dfsg.1-14sarge3_i386.deb stable/main/binary-i386/xutils_4.3.0.dfsg.1-14sarge3_i386.deb stable/main/binary-i386/libxrandr2-dbg_4.3.0.dfsg.1-14sarge3_i386.deb stable/main/binary-i386/lbxproxy_4.3.0.dfsg.1-14sarge3_i386.deb stable/main/binary-i386/libxtst-dev_4.3.0.dfsg.1-14sarge3_i386.deb stable/main/binary-i386/xlibmesa-glu_4.3.0.dfsg.1-14sarge3_i386.deb stable/main/binary-all/xfonts-100dpi-transcoded_4.3.0.dfsg.1-14sarge3_all.deb stable/main/binary-i386/xserver-xfree86_4.3.0.dfsg.1-14sarge3_i386.deb stable/main/binary-i386/xvfb_4.3.0.dfsg.1-14sarge3_i386.deb stable/main/binary-i386/libxt6_4.3.0.dfsg.1-14sarge3_i386.deb stable/main/binary-all/xfonts-100dpi_4.3.0.dfsg.1-14sarge3_all.deb stable/main/binary-i386/libxmu6-dbg_4.3.0.dfsg.1-14sarge3_i386.deb stable/main/binary-i386/xlibosmesa4-dbg_4.3.0.dfsg.1-14sarge3_i386.deb stable/main/binary-i386/libdps1_4.3.0.dfsg.1-14sarge3_i386.deb stable/main/binary-all/x-window-system_4.3.0.dfsg.1-14sarge3_all.deb stable/main/binary-all/xfonts-scalable_4.3.0.dfsg.1-14sarge3_all.deb stable/main/binary-i386/libxmu-dev_4.3.0.dfsg.1-14sarge3_i386.deb stable/main/binary-i386/libxp6_4.3.0.dfsg.1-14sarge3_i386.deb stable/main/binary-i386/libx11-6_4.3.0.dfsg.1-14sarge3_i386.deb stable/main/binary-i386/libx11-6-dbg_4.3.0.dfsg.1-14sarge3_i386.deb stable/main/source/xfree86_4.3.0.dfsg.1-14sarge3.dsc stable/main/binary-i386/libxaw6-dbg_4.3.0.dfsg.1-14sarge3_i386.deb stable/main/binary-i386/libxmuu-dev_4.3.0.dfsg.1-14sarge3_i386.deb stable/main/binary-i386/libxv-dev_4.3.0.dfsg.1-14sarge3_i386.deb stable/main/binary-all/xspecs_4.3.0.dfsg.1-14sarge3_all.deb stable/main/binary-i386/libxtst6_4.3.0.dfsg.1-14sarge3_i386.deb stable/main/binary-all/xfonts-base_4.3.0.dfsg.1-14sarge3_all.deb stable/main/binary-i386/libxft1-dbg_4.3.0.dfsg.1-14sarge3_i386.deb stable/main/binary-i386/xdm_4.3.0.dfsg.1-14sarge3_i386.deb stable/main/binary-i386/proxymngr_4.3.0.dfsg.1-14sarge3_i386.deb stable/main/binary-i386/libxp-dev_4.3.0.dfsg.1-14sarge3_i386.deb stable/main/binary-all/xfree86-common_4.3.0.dfsg.1-14sarge3_all.deb stable/main/binary-i386/libxmuu1-dbg_4.3.0.dfsg.1-14sarge3_i386.deb stable/main/binary-i386/libice-dev_4.3.0.dfsg.1-14sarge3_i386.deb stable/main/binary-i386/xserver-common_4.3.0.dfsg.1-14sarge3_i386.deb stable/main/binary-i386/libxtrap-dev_4.3.0.dfsg.1-14sarge3_i386.deb stable/main/binary-all/x-dev_4.3.0.dfsg.1-14sarge3_all.deb stable/main/binary-i386/libice6-dbg_4.3.0.dfsg.1-14sarge3_i386.deb stable/main/binary-all/xlibmesa3-dbg_4.3.0.dfsg.1-14sarge3_all.deb stable/main/binary-i386/libxaw7-dbg_4.3.0.dfsg.1-14sarge3_i386.deb stable/main/binary-i386/libxtrap6-dbg_4.3.0.dfsg.1-14sarge3_i386.deb stable/main/binary-i386/xlibmesa-gl-dbg_4.3.0.dfsg.1-14sarge3_i386.deb stable/main/binary-i386/xlibmesa-dri-dbg_4.3.0.dfsg.1-14sarge3_i386.deb stable/main/binary-i386/libxtrap6_4.3.0.dfsg.1-14sarge3_i386.deb stable/main/binary-i386/libxaw7-dev_4.3.0.dfsg.1-14sarge3_i386.deb stable/main/binary-all/xlibs_4.3.0.dfsg.1-14sarge3_all.deb stable/main/binary-i386/xmh_4.3.0.dfsg.1-14sarge3_i386.deb stable/main/binary-all/xlibs-data_4.3.0.dfsg.1-14sarge3_all.deb stable/main/binary-i386/libxt-dev_4.3.0.dfsg.1-14sarge3_i386.deb stable/main/binary-i386/xlibmesa-gl_4.3.0.dfsg.1-14sarge3_i386.deb stable/main/binary-i386/libxaw6-dev_4.3.0.dfsg.1-14sarge3_i386.deb stable/main/binary-all/xfonts-75dpi-transcoded_4.3.0.dfsg.1-14sarge3_all.deb stable/main/binary-i386/xbase-clients_4.3.0.dfsg.1-14sarge3_i386.deb stable/main/binary-i386/x-window-system-core_4.3.0.dfsg.1-14sarge3_i386.deb stable/main/binary-i386/xlibmesa-glu-dbg_4.3.0.dfsg.1-14sarge3_i386.deb stable/main/binary-i386/twm_4.3.0.dfsg.1-14sarge3_i386.deb stable/main/binary-i386/libxrandr2_4.3.0.dfsg.1-14sarge3_i386.deb stable/main/binary-i386/libxtst6-dbg_4.3.0.dfsg.1-14sarge3_i386.deb stable/main/binary-i386/libxext6_4.3.0.dfsg.1-14sarge3_i386.deb stable/main/binary-i386/xlibosmesa-dev_4.3.0.dfsg.1-14sarge3_i386.deb stable/main/binary-i386/libxv1_4.3.0.dfsg.1-14sarge3_i386.deb stable/main/binary-i386/libxext6-dbg_4.3.0.dfsg.1-14sarge3_i386.deb stable/main/binary-i386/libxi6-dbg_4.3.0.dfsg.1-14sarge3_i386.deb stable/main/binary-i386/libxmuu1_4.3.0.dfsg.1-14sarge3_i386.deb stable/main/binary-i386/libxv1-dbg_4.3.0.dfsg.1-14sarge3_i386.deb stable/main/binary-i386/libxp6-dbg_4.3.0.dfsg.1-14sarge3_i386.deb stable/main/binary-all/xlibmesa-dev_4.3.0.dfsg.1-14sarge3_all.deb stable/main/source/xfree86_4.3.0.dfsg.1-14sarge3.diff.gz stable/main/binary-i386/libxpm-dev_4.3.0.dfsg.1-14sarge3_i386.deb stable/main/binary-i386/libxaw7_4.3.0.dfsg.1-14sarge3_i386.deb stable/main/binary-i386/libxt6-dbg_4.3.0.dfsg.1-14sarge3_i386.deb stable/main/binary-i386/libxi6_4.3.0.dfsg.1-14sarge3_i386.deb stable/main/binary-i386/libxrandr-dev_4.3.0.dfsg.1-14sarge3_i386.deb stable/main/binary-i386/xlibs-static-pic_4.3.0.dfsg.1-14sarge3_i386.deb stable/main/binary-i386/xlibs-static-dev_4.3.0.dfsg.1-14sarge3_i386.deb stable/main/binary-i386/libsm6_4.3.0.dfsg.1-14sarge3_i386.deb stable/main/binary-i386/xlibmesa-glu-dev_4.3.0.dfsg.1-14sarge3_i386.deb stable/main/binary-i386/libdps1-dbg_4.3.0.dfsg.1-14sarge3_i386.deb stable/main/binary-i386/libxi-dev_4.3.0.dfsg.1-14sarge3_i386.deb stable/main/binary-i386/xterm_4.3.0.dfsg.1-14sarge3_i386.deb stable/main/binary-i386/libsm6-dbg_4.3.0.dfsg.1-14sarge3_i386.deb stable/main/binary-i386/xserver-xfree86-dbg_4.3.0.dfsg.1-14sarge3_i386.deb stable/main/binary-i386/xlibmesa3_4.3.0.dfsg.1-14sarge3_i386.deb stable/main/binary-i386/libxmu6_4.3.0.dfsg.1-14sarge3_i386.deb stable/main/binary-all/xlibs-dev_4.3.0.dfsg.1-14sarge3_all.deb stable/main/binary-i386/libxpm4-dbg_4.3.0.dfsg.1-14sarge3_i386.deb stable/main/binary-all/xlibs-pic_4.3.0.dfsg.1-14sarge3_all.deb stable/main/binary-i386/xlibosmesa4_4.3.0.dfsg.1-14sarge3_i386.deb stable/main/binary-all/xfonts-cyrillic_4.3.0.dfsg.1-14sarge3_all.deb stable/main/binary-i386/x-window-system-dev_4.3.0.dfsg.1-14sarge3_i386.deb stable/main/binary-i386/xnest_4.3.0.dfsg.1-14sarge3_i386.deb stable/main/binary-all/xfonts-base-transcoded_4.3.0.dfsg.1-14sarge3_all.deb stable/main/binary-all/xfonts-75dpi_4.3.0.dfsg.1-14sarge3_all.deb stable/main/binary-i386/xfs_4.3.0.dfsg.1-14sarge3_i386.deb stable/main/binary-i386/libice6_4.3.0.dfsg.1-14sarge3_i386.deb stable/main/binary-i386/libxft1_4.3.0.dfsg.1-14sarge3_i386.deb stable/main/binary-i386/libxext-dev_4.3.0.dfsg.1-14sarge3_i386.deb stable/main/binary-i386/libxpm4_4.3.0.dfsg.1-14sarge3_i386.deb stable/main/binary-i386/libsm-dev_4.3.0.dfsg.1-14sarge3_i386.deb stable/main/binary-all/xlibs-dbg_4.3.0.dfsg.1-14sarge3_all.deb stable/main/binary-all/pm-dev_4.3.0.dfsg.1-14sarge3_all.deb stable/main/binary-i386/xfwp_4.3.0.dfsg.1-14sarge3_i386.deb stable/main/binary-i386/xlibmesa-dri_4.3.0.dfsg.1-14sarge3_i386.deb stable/main/binary-i386/libxaw6_4.3.0.dfsg.1-14sarge3_i386.deb xfree86 (4.3.0.dfsg.1-14sarge3) stable-security; urgency=high * Non-maintainer update by the Security Team: Fixes several vulnerabilities reported by iDefense (CVE-2006-6101, CVE-2006-6102, CVE-2006-6103) stable/main/binary-all/webmin-core_1.180-3sarge1_all.deb stable/main/binary-all/webmin_1.180-3sarge1_all.deb stable/main/source/webmin_1.180-3sarge1.dsc stable/main/source/webmin_1.180-3sarge1.diff.gz webmin (1.180-3sarge1) stable-security; urgency=high * Non-maintainer upload by the security team. * CVE-2005-3912 Fix syslog format string vulnerability in miniserv.pl (Closes: #341394) This string vulnerability could be used to gain access to the account running miniserv.pl by creating a specialy crafted username. * CVE-2006-3392 Fix input sanitization bug that could be exploited to allow an attacker to read arbitrary files. * CVE-2006-4542 Fix cross-site scripting vulnerability caused by the failure to properly cope with null characters in a URL. stable/main/binary-sparc/gvlc_0.8.1.svn20050314-1sarge2_sparc.deb stable/main/binary-sparc/vlc-plugin-esd_0.8.1.svn20050314-1sarge2_sparc.deb stable/main/binary-sparc/vlc-qt_0.8.1.svn20050314-1sarge2_sparc.deb stable/main/binary-sparc/vlc-gnome_0.8.1.svn20050314-1sarge2_sparc.deb stable/main/binary-sparc/vlc-sdl_0.8.1.svn20050314-1sarge2_sparc.deb stable/main/binary-sparc/vlc-plugin-sdl_0.8.1.svn20050314-1sarge2_sparc.deb stable/main/binary-sparc/libvlc0-dev_0.8.1.svn20050314-1sarge2_sparc.deb stable/main/binary-sparc/vlc-alsa_0.8.1.svn20050314-1sarge2_sparc.deb stable/main/binary-sparc/mozilla-plugin-vlc_0.8.1.svn20050314-1sarge2_sparc.deb stable/main/binary-sparc/gnome-vlc_0.8.1.svn20050314-1sarge2_sparc.deb stable/main/binary-sparc/vlc_0.8.1.svn20050314-1sarge2_sparc.deb stable/main/binary-sparc/kvlc_0.8.1.svn20050314-1sarge2_sparc.deb stable/main/binary-sparc/vlc-gtk_0.8.1.svn20050314-1sarge2_sparc.deb stable/main/binary-sparc/vlc-esd_0.8.1.svn20050314-1sarge2_sparc.deb stable/main/binary-sparc/vlc-plugin-alsa_0.8.1.svn20050314-1sarge2_sparc.deb stable/main/binary-sparc/vlc-plugin-arts_0.8.1.svn20050314-1sarge2_sparc.deb stable/main/binary-sparc/wxvlc_0.8.1.svn20050314-1sarge2_sparc.deb stable/main/binary-sparc/vlc-ggi_0.8.1.svn20050314-1sarge2_sparc.deb stable/main/binary-sparc/qvlc_0.8.1.svn20050314-1sarge2_sparc.deb stable/main/binary-sparc/vlc-plugin-ggi_0.8.1.svn20050314-1sarge2_sparc.deb vlc (0.8.1.svn20050314-1sarge2) stable-security; urgency=high * modules/access/cdda/access.c modules/access/vcdx/access.c: + Fix format string vulnerabilities (CVE-2007-0017) (Closes: #405425). * debian/control: + Build-conflict against libsmbclient-dev to avoid accidentally depending on Samba libraries (Closes: #358026). stable/main/binary-s390/vlc-plugin-sdl_0.8.1.svn20050314-1sarge2_s390.deb stable/main/binary-s390/vlc-plugin-ggi_0.8.1.svn20050314-1sarge2_s390.deb stable/main/binary-s390/wxvlc_0.8.1.svn20050314-1sarge2_s390.deb stable/main/binary-s390/mozilla-plugin-vlc_0.8.1.svn20050314-1sarge2_s390.deb stable/main/binary-s390/kvlc_0.8.1.svn20050314-1sarge2_s390.deb stable/main/binary-s390/vlc-esd_0.8.1.svn20050314-1sarge2_s390.deb stable/main/binary-s390/vlc-sdl_0.8.1.svn20050314-1sarge2_s390.deb stable/main/binary-s390/vlc-ggi_0.8.1.svn20050314-1sarge2_s390.deb stable/main/binary-s390/vlc-plugin-esd_0.8.1.svn20050314-1sarge2_s390.deb stable/main/binary-s390/vlc-gnome_0.8.1.svn20050314-1sarge2_s390.deb stable/main/binary-s390/gvlc_0.8.1.svn20050314-1sarge2_s390.deb stable/main/binary-s390/vlc-gtk_0.8.1.svn20050314-1sarge2_s390.deb stable/main/binary-s390/vlc-plugin-alsa_0.8.1.svn20050314-1sarge2_s390.deb stable/main/binary-s390/vlc-plugin-arts_0.8.1.svn20050314-1sarge2_s390.deb stable/main/binary-s390/vlc_0.8.1.svn20050314-1sarge2_s390.deb stable/main/binary-s390/libvlc0-dev_0.8.1.svn20050314-1sarge2_s390.deb stable/main/binary-s390/gnome-vlc_0.8.1.svn20050314-1sarge2_s390.deb stable/main/binary-s390/vlc-qt_0.8.1.svn20050314-1sarge2_s390.deb stable/main/binary-s390/qvlc_0.8.1.svn20050314-1sarge2_s390.deb stable/main/binary-s390/vlc-alsa_0.8.1.svn20050314-1sarge2_s390.deb vlc (0.8.1.svn20050314-1sarge2) stable-security; urgency=high * modules/access/cdda/access.c modules/access/vcdx/access.c: + Fix format string vulnerabilities (CVE-2007-0017) (Closes: #405425). * debian/control: + Build-conflict against libsmbclient-dev to avoid accidentally depending on Samba libraries (Closes: #358026). stable/main/binary-powerpc/vlc-plugin-ggi_0.8.1.svn20050314-1sarge2_powerpc.deb stable/main/binary-powerpc/vlc-plugin-alsa_0.8.1.svn20050314-1sarge2_powerpc.deb stable/main/binary-powerpc/vlc-ggi_0.8.1.svn20050314-1sarge2_powerpc.deb stable/main/binary-powerpc/wxvlc_0.8.1.svn20050314-1sarge2_powerpc.deb stable/main/binary-powerpc/vlc-sdl_0.8.1.svn20050314-1sarge2_powerpc.deb stable/main/binary-powerpc/vlc-alsa_0.8.1.svn20050314-1sarge2_powerpc.deb stable/main/binary-powerpc/qvlc_0.8.1.svn20050314-1sarge2_powerpc.deb stable/main/binary-powerpc/vlc-gnome_0.8.1.svn20050314-1sarge2_powerpc.deb stable/main/binary-powerpc/gvlc_0.8.1.svn20050314-1sarge2_powerpc.deb stable/main/binary-powerpc/vlc-esd_0.8.1.svn20050314-1sarge2_powerpc.deb stable/main/binary-powerpc/gnome-vlc_0.8.1.svn20050314-1sarge2_powerpc.deb stable/main/binary-powerpc/vlc-plugin-sdl_0.8.1.svn20050314-1sarge2_powerpc.deb stable/main/binary-powerpc/libvlc0-dev_0.8.1.svn20050314-1sarge2_powerpc.deb stable/main/binary-powerpc/vlc-plugin-arts_0.8.1.svn20050314-1sarge2_powerpc.deb stable/main/binary-powerpc/mozilla-plugin-vlc_0.8.1.svn20050314-1sarge2_powerpc.deb stable/main/binary-powerpc/vlc-gtk_0.8.1.svn20050314-1sarge2_powerpc.deb stable/main/binary-powerpc/vlc_0.8.1.svn20050314-1sarge2_powerpc.deb stable/main/binary-powerpc/vlc-plugin-esd_0.8.1.svn20050314-1sarge2_powerpc.deb stable/main/binary-powerpc/kvlc_0.8.1.svn20050314-1sarge2_powerpc.deb stable/main/binary-powerpc/vlc-qt_0.8.1.svn20050314-1sarge2_powerpc.deb vlc (0.8.1.svn20050314-1sarge2) stable-security; urgency=high * modules/access/cdda/access.c modules/access/vcdx/access.c: + Fix format string vulnerabilities (CVE-2007-0017) (Closes: #405425). * debian/control: + Build-conflict against libsmbclient-dev to avoid accidentally depending on Samba libraries (Closes: #358026). stable/main/binary-mipsel/vlc-gtk_0.8.1.svn20050314-1sarge2_mipsel.deb stable/main/binary-mipsel/vlc-plugin-sdl_0.8.1.svn20050314-1sarge2_mipsel.deb stable/main/binary-mipsel/vlc-sdl_0.8.1.svn20050314-1sarge2_mipsel.deb stable/main/binary-mipsel/vlc-plugin-esd_0.8.1.svn20050314-1sarge2_mipsel.deb stable/main/binary-mipsel/qvlc_0.8.1.svn20050314-1sarge2_mipsel.deb stable/main/binary-mipsel/vlc-alsa_0.8.1.svn20050314-1sarge2_mipsel.deb stable/main/binary-mipsel/vlc-plugin-alsa_0.8.1.svn20050314-1sarge2_mipsel.deb stable/main/binary-mipsel/mozilla-plugin-vlc_0.8.1.svn20050314-1sarge2_mipsel.deb stable/main/binary-mipsel/vlc-plugin-ggi_0.8.1.svn20050314-1sarge2_mipsel.deb stable/main/binary-mipsel/gnome-vlc_0.8.1.svn20050314-1sarge2_mipsel.deb stable/main/binary-mipsel/vlc-gnome_0.8.1.svn20050314-1sarge2_mipsel.deb stable/main/binary-mipsel/vlc_0.8.1.svn20050314-1sarge2_mipsel.deb stable/main/binary-mipsel/libvlc0-dev_0.8.1.svn20050314-1sarge2_mipsel.deb stable/main/binary-mipsel/gvlc_0.8.1.svn20050314-1sarge2_mipsel.deb stable/main/binary-mipsel/wxvlc_0.8.1.svn20050314-1sarge2_mipsel.deb stable/main/binary-mipsel/kvlc_0.8.1.svn20050314-1sarge2_mipsel.deb stable/main/binary-mipsel/vlc-plugin-arts_0.8.1.svn20050314-1sarge2_mipsel.deb stable/main/binary-mipsel/vlc-ggi_0.8.1.svn20050314-1sarge2_mipsel.deb stable/main/binary-mipsel/vlc-qt_0.8.1.svn20050314-1sarge2_mipsel.deb stable/main/binary-mipsel/vlc-esd_0.8.1.svn20050314-1sarge2_mipsel.deb vlc (0.8.1.svn20050314-1sarge2) stable-security; urgency=high * modules/access/cdda/access.c modules/access/vcdx/access.c: + Fix format string vulnerabilities (CVE-2007-0017) (Closes: #405425). * debian/control: + Build-conflict against libsmbclient-dev to avoid accidentally depending on Samba libraries (Closes: #358026). stable/main/binary-mips/gnome-vlc_0.8.1.svn20050314-1sarge2_mips.deb stable/main/binary-mips/libvlc0-dev_0.8.1.svn20050314-1sarge2_mips.deb stable/main/binary-mips/vlc-gnome_0.8.1.svn20050314-1sarge2_mips.deb stable/main/binary-mips/kvlc_0.8.1.svn20050314-1sarge2_mips.deb stable/main/binary-mips/vlc-plugin-esd_0.8.1.svn20050314-1sarge2_mips.deb stable/main/binary-mips/vlc-gtk_0.8.1.svn20050314-1sarge2_mips.deb stable/main/binary-mips/gvlc_0.8.1.svn20050314-1sarge2_mips.deb stable/main/binary-mips/vlc_0.8.1.svn20050314-1sarge2_mips.deb stable/main/binary-mips/vlc-plugin-alsa_0.8.1.svn20050314-1sarge2_mips.deb stable/main/binary-mips/vlc-alsa_0.8.1.svn20050314-1sarge2_mips.deb stable/main/binary-mips/wxvlc_0.8.1.svn20050314-1sarge2_mips.deb stable/main/binary-mips/vlc-plugin-ggi_0.8.1.svn20050314-1sarge2_mips.deb stable/main/binary-mips/vlc-qt_0.8.1.svn20050314-1sarge2_mips.deb stable/main/binary-mips/qvlc_0.8.1.svn20050314-1sarge2_mips.deb stable/main/binary-mips/vlc-ggi_0.8.1.svn20050314-1sarge2_mips.deb stable/main/binary-mips/mozilla-plugin-vlc_0.8.1.svn20050314-1sarge2_mips.deb stable/main/binary-mips/vlc-plugin-sdl_0.8.1.svn20050314-1sarge2_mips.deb stable/main/binary-mips/vlc-sdl_0.8.1.svn20050314-1sarge2_mips.deb stable/main/binary-mips/vlc-plugin-arts_0.8.1.svn20050314-1sarge2_mips.deb stable/main/binary-mips/vlc-esd_0.8.1.svn20050314-1sarge2_mips.deb vlc (0.8.1.svn20050314-1sarge2) stable-security; urgency=high * modules/access/cdda/access.c modules/access/vcdx/access.c: + Fix format string vulnerabilities (CVE-2007-0017) (Closes: #405425). * debian/control: + Build-conflict against libsmbclient-dev to avoid accidentally depending on Samba libraries (Closes: #358026). stable/main/binary-m68k/vlc-plugin-esd_0.8.1.svn20050314-1sarge2_m68k.deb stable/main/binary-m68k/libvlc0-dev_0.8.1.svn20050314-1sarge2_m68k.deb stable/main/binary-m68k/vlc-esd_0.8.1.svn20050314-1sarge2_m68k.deb stable/main/binary-m68k/vlc-gtk_0.8.1.svn20050314-1sarge2_m68k.deb stable/main/binary-m68k/vlc-qt_0.8.1.svn20050314-1sarge2_m68k.deb stable/main/binary-m68k/kvlc_0.8.1.svn20050314-1sarge2_m68k.deb stable/main/binary-m68k/vlc-gnome_0.8.1.svn20050314-1sarge2_m68k.deb stable/main/binary-m68k/vlc-plugin-sdl_0.8.1.svn20050314-1sarge2_m68k.deb stable/main/binary-m68k/qvlc_0.8.1.svn20050314-1sarge2_m68k.deb stable/main/binary-m68k/gnome-vlc_0.8.1.svn20050314-1sarge2_m68k.deb stable/main/binary-m68k/vlc-sdl_0.8.1.svn20050314-1sarge2_m68k.deb stable/main/binary-m68k/vlc-plugin-arts_0.8.1.svn20050314-1sarge2_m68k.deb stable/main/binary-m68k/mozilla-plugin-vlc_0.8.1.svn20050314-1sarge2_m68k.deb stable/main/binary-m68k/vlc-ggi_0.8.1.svn20050314-1sarge2_m68k.deb stable/main/binary-m68k/vlc-plugin-ggi_0.8.1.svn20050314-1sarge2_m68k.deb stable/main/binary-m68k/wxvlc_0.8.1.svn20050314-1sarge2_m68k.deb stable/main/binary-m68k/vlc-plugin-alsa_0.8.1.svn20050314-1sarge2_m68k.deb stable/main/binary-m68k/vlc-alsa_0.8.1.svn20050314-1sarge2_m68k.deb stable/main/binary-m68k/vlc_0.8.1.svn20050314-1sarge2_m68k.deb stable/main/binary-m68k/gvlc_0.8.1.svn20050314-1sarge2_m68k.deb vlc (0.8.1.svn20050314-1sarge2) stable-security; urgency=high * modules/access/cdda/access.c modules/access/vcdx/access.c: + Fix format string vulnerabilities (CVE-2007-0017) (Closes: #405425). * debian/control: + Build-conflict against libsmbclient-dev to avoid accidentally depending on Samba libraries (Closes: #358026). stable/main/binary-ia64/kvlc_0.8.1.svn20050314-1sarge2_ia64.deb stable/main/binary-ia64/vlc-plugin-alsa_0.8.1.svn20050314-1sarge2_ia64.deb stable/main/binary-ia64/vlc-plugin-ggi_0.8.1.svn20050314-1sarge2_ia64.deb stable/main/binary-ia64/libvlc0-dev_0.8.1.svn20050314-1sarge2_ia64.deb stable/main/binary-ia64/vlc-sdl_0.8.1.svn20050314-1sarge2_ia64.deb stable/main/binary-ia64/wxvlc_0.8.1.svn20050314-1sarge2_ia64.deb stable/main/binary-ia64/vlc-gtk_0.8.1.svn20050314-1sarge2_ia64.deb stable/main/binary-ia64/vlc-ggi_0.8.1.svn20050314-1sarge2_ia64.deb stable/main/binary-ia64/vlc-plugin-esd_0.8.1.svn20050314-1sarge2_ia64.deb stable/main/binary-ia64/gvlc_0.8.1.svn20050314-1sarge2_ia64.deb stable/main/binary-ia64/vlc-plugin-sdl_0.8.1.svn20050314-1sarge2_ia64.deb stable/main/binary-ia64/vlc-qt_0.8.1.svn20050314-1sarge2_ia64.deb stable/main/binary-ia64/qvlc_0.8.1.svn20050314-1sarge2_ia64.deb stable/main/binary-ia64/mozilla-plugin-vlc_0.8.1.svn20050314-1sarge2_ia64.deb stable/main/binary-ia64/vlc-alsa_0.8.1.svn20050314-1sarge2_ia64.deb stable/main/binary-ia64/vlc-esd_0.8.1.svn20050314-1sarge2_ia64.deb stable/main/binary-ia64/vlc-gnome_0.8.1.svn20050314-1sarge2_ia64.deb stable/main/binary-ia64/vlc-plugin-arts_0.8.1.svn20050314-1sarge2_ia64.deb stable/main/binary-ia64/vlc_0.8.1.svn20050314-1sarge2_ia64.deb stable/main/binary-ia64/gnome-vlc_0.8.1.svn20050314-1sarge2_ia64.deb vlc (0.8.1.svn20050314-1sarge2) stable-security; urgency=high * modules/access/cdda/access.c modules/access/vcdx/access.c: + Fix format string vulnerabilities (CVE-2007-0017) (Closes: #405425). * debian/control: + Build-conflict against libsmbclient-dev to avoid accidentally depending on Samba libraries (Closes: #358026). stable/main/binary-hppa/vlc-plugin-ggi_0.8.1.svn20050314-1sarge2_hppa.deb stable/main/binary-hppa/vlc-qt_0.8.1.svn20050314-1sarge2_hppa.deb stable/main/binary-hppa/vlc-alsa_0.8.1.svn20050314-1sarge2_hppa.deb stable/main/binary-hppa/vlc-plugin-esd_0.8.1.svn20050314-1sarge2_hppa.deb stable/main/binary-hppa/kvlc_0.8.1.svn20050314-1sarge2_hppa.deb stable/main/binary-hppa/qvlc_0.8.1.svn20050314-1sarge2_hppa.deb stable/main/binary-hppa/vlc-plugin-alsa_0.8.1.svn20050314-1sarge2_hppa.deb stable/main/binary-hppa/libvlc0-dev_0.8.1.svn20050314-1sarge2_hppa.deb stable/main/binary-hppa/vlc-sdl_0.8.1.svn20050314-1sarge2_hppa.deb stable/main/binary-hppa/gvlc_0.8.1.svn20050314-1sarge2_hppa.deb stable/main/binary-hppa/vlc-plugin-sdl_0.8.1.svn20050314-1sarge2_hppa.deb stable/main/binary-hppa/mozilla-plugin-vlc_0.8.1.svn20050314-1sarge2_hppa.deb stable/main/binary-hppa/gnome-vlc_0.8.1.svn20050314-1sarge2_hppa.deb stable/main/binary-hppa/vlc-ggi_0.8.1.svn20050314-1sarge2_hppa.deb stable/main/binary-hppa/vlc-gnome_0.8.1.svn20050314-1sarge2_hppa.deb stable/main/binary-hppa/wxvlc_0.8.1.svn20050314-1sarge2_hppa.deb stable/main/binary-hppa/vlc_0.8.1.svn20050314-1sarge2_hppa.deb stable/main/binary-hppa/vlc-esd_0.8.1.svn20050314-1sarge2_hppa.deb stable/main/binary-hppa/vlc-gtk_0.8.1.svn20050314-1sarge2_hppa.deb stable/main/binary-hppa/vlc-plugin-arts_0.8.1.svn20050314-1sarge2_hppa.deb vlc (0.8.1.svn20050314-1sarge2) stable-security; urgency=high * modules/access/cdda/access.c modules/access/vcdx/access.c: + Fix format string vulnerabilities (CVE-2007-0017) (Closes: #405425). * debian/control: + Build-conflict against libsmbclient-dev to avoid accidentally depending on Samba libraries (Closes: #358026). stable/main/binary-arm/vlc-qt_0.8.1.svn20050314-1sarge2_arm.deb stable/main/binary-arm/vlc-ggi_0.8.1.svn20050314-1sarge2_arm.deb stable/main/binary-arm/gnome-vlc_0.8.1.svn20050314-1sarge2_arm.deb stable/main/binary-arm/mozilla-plugin-vlc_0.8.1.svn20050314-1sarge2_arm.deb stable/main/binary-arm/vlc-plugin-esd_0.8.1.svn20050314-1sarge2_arm.deb stable/main/binary-arm/vlc-esd_0.8.1.svn20050314-1sarge2_arm.deb stable/main/binary-arm/vlc_0.8.1.svn20050314-1sarge2_arm.deb stable/main/binary-arm/vlc-plugin-sdl_0.8.1.svn20050314-1sarge2_arm.deb stable/main/binary-arm/vlc-plugin-arts_0.8.1.svn20050314-1sarge2_arm.deb stable/main/binary-arm/libvlc0-dev_0.8.1.svn20050314-1sarge2_arm.deb stable/main/binary-arm/vlc-alsa_0.8.1.svn20050314-1sarge2_arm.deb stable/main/binary-arm/kvlc_0.8.1.svn20050314-1sarge2_arm.deb stable/main/binary-arm/vlc-gtk_0.8.1.svn20050314-1sarge2_arm.deb stable/main/binary-arm/vlc-gnome_0.8.1.svn20050314-1sarge2_arm.deb stable/main/binary-arm/wxvlc_0.8.1.svn20050314-1sarge2_arm.deb stable/main/binary-arm/vlc-sdl_0.8.1.svn20050314-1sarge2_arm.deb stable/main/binary-arm/gvlc_0.8.1.svn20050314-1sarge2_arm.deb stable/main/binary-arm/qvlc_0.8.1.svn20050314-1sarge2_arm.deb stable/main/binary-arm/vlc-plugin-alsa_0.8.1.svn20050314-1sarge2_arm.deb stable/main/binary-arm/vlc-plugin-ggi_0.8.1.svn20050314-1sarge2_arm.deb vlc (0.8.1.svn20050314-1sarge2) stable-security; urgency=high * modules/access/cdda/access.c modules/access/vcdx/access.c: + Fix format string vulnerabilities (CVE-2007-0017) (Closes: #405425). * debian/control: + Build-conflict against libsmbclient-dev to avoid accidentally depending on Samba libraries (Closes: #358026). stable/main/binary-alpha/gnome-vlc_0.8.1.svn20050314-1sarge2_alpha.deb stable/main/binary-alpha/vlc-plugin-esd_0.8.1.svn20050314-1sarge2_alpha.deb stable/main/binary-alpha/wxvlc_0.8.1.svn20050314-1sarge2_alpha.deb stable/main/binary-alpha/mozilla-plugin-vlc_0.8.1.svn20050314-1sarge2_alpha.deb stable/main/binary-alpha/vlc-esd_0.8.1.svn20050314-1sarge2_alpha.deb stable/main/binary-alpha/vlc-plugin-ggi_0.8.1.svn20050314-1sarge2_alpha.deb stable/main/binary-alpha/vlc-qt_0.8.1.svn20050314-1sarge2_alpha.deb stable/main/binary-alpha/vlc-ggi_0.8.1.svn20050314-1sarge2_alpha.deb stable/main/binary-alpha/gvlc_0.8.1.svn20050314-1sarge2_alpha.deb stable/main/binary-alpha/vlc-alsa_0.8.1.svn20050314-1sarge2_alpha.deb stable/main/binary-alpha/vlc_0.8.1.svn20050314-1sarge2_alpha.deb stable/main/binary-alpha/vlc-plugin-alsa_0.8.1.svn20050314-1sarge2_alpha.deb stable/main/binary-alpha/libvlc0-dev_0.8.1.svn20050314-1sarge2_alpha.deb stable/main/binary-alpha/vlc-gtk_0.8.1.svn20050314-1sarge2_alpha.deb stable/main/binary-alpha/kvlc_0.8.1.svn20050314-1sarge2_alpha.deb stable/main/binary-alpha/vlc-plugin-arts_0.8.1.svn20050314-1sarge2_alpha.deb stable/main/binary-alpha/qvlc_0.8.1.svn20050314-1sarge2_alpha.deb stable/main/binary-alpha/vlc-gnome_0.8.1.svn20050314-1sarge2_alpha.deb stable/main/binary-alpha/vlc-sdl_0.8.1.svn20050314-1sarge2_alpha.deb stable/main/binary-alpha/vlc-plugin-sdl_0.8.1.svn20050314-1sarge2_alpha.deb vlc (0.8.1.svn20050314-1sarge2) stable-security; urgency=high * modules/access/cdda/access.c modules/access/vcdx/access.c: + Fix format string vulnerabilities (CVE-2007-0017) (Closes: #405425). * debian/control: + Build-conflict against libsmbclient-dev to avoid accidentally depending on Samba libraries (Closes: #358026). stable/main/binary-i386/vlc-plugin-glide_0.8.1.svn20050314-1sarge2_i386.deb stable/main/binary-i386/vlc-plugin-arts_0.8.1.svn20050314-1sarge2_i386.deb stable/main/binary-i386/vlc_0.8.1.svn20050314-1sarge2_i386.deb stable/main/binary-i386/gvlc_0.8.1.svn20050314-1sarge2_i386.deb stable/main/binary-i386/vlc-plugin-ggi_0.8.1.svn20050314-1sarge2_i386.deb stable/main/binary-i386/vlc-qt_0.8.1.svn20050314-1sarge2_i386.deb stable/main/binary-i386/vlc-glide_0.8.1.svn20050314-1sarge2_i386.deb stable/main/binary-i386/vlc-esd_0.8.1.svn20050314-1sarge2_i386.deb stable/main/binary-i386/wxvlc_0.8.1.svn20050314-1sarge2_i386.deb stable/main/binary-i386/kvlc_0.8.1.svn20050314-1sarge2_i386.deb stable/main/binary-i386/libvlc0-dev_0.8.1.svn20050314-1sarge2_i386.deb stable/main/binary-i386/vlc-gnome_0.8.1.svn20050314-1sarge2_i386.deb stable/main/binary-i386/vlc-plugin-sdl_0.8.1.svn20050314-1sarge2_i386.deb stable/main/binary-i386/mozilla-plugin-vlc_0.8.1.svn20050314-1sarge2_i386.deb stable/main/binary-i386/vlc-plugin-esd_0.8.1.svn20050314-1sarge2_i386.deb stable/main/source/vlc_0.8.1.svn20050314-1sarge2.diff.gz stable/main/binary-i386/vlc-alsa_0.8.1.svn20050314-1sarge2_i386.deb stable/main/binary-i386/gnome-vlc_0.8.1.svn20050314-1sarge2_i386.deb stable/main/binary-i386/vlc-ggi_0.8.1.svn20050314-1sarge2_i386.deb stable/main/source/vlc_0.8.1.svn20050314-1sarge2.dsc stable/main/binary-i386/qvlc_0.8.1.svn20050314-1sarge2_i386.deb stable/main/binary-i386/vlc-sdl_0.8.1.svn20050314-1sarge2_i386.deb stable/main/binary-i386/vlc-gtk_0.8.1.svn20050314-1sarge2_i386.deb stable/main/binary-i386/vlc-plugin-svgalib_0.8.1.svn20050314-1sarge2_i386.deb stable/main/binary-i386/vlc-plugin-alsa_0.8.1.svn20050314-1sarge2_i386.deb vlc (0.8.1.svn20050314-1sarge2) stable-security; urgency=high * modules/access/cdda/access.c modules/access/vcdx/access.c: + Fix format string vulnerabilities (CVE-2007-0017) (Closes: #405425). * debian/control: + Build-conflict against libsmbclient-dev to avoid accidentally depending on Samba libraries (Closes: #358026). stable/main/source/trac_0.8.1-3sarge7.dsc stable/main/source/trac_0.8.1-3sarge7.diff.gz stable/main/binary-all/trac_0.8.1-3sarge7_all.deb trac (0.8.1-3sarge7) stable-security; urgency=high * debian/patches/13_CSRF.patch: add a missing hook to fix a regression. Thanks to Simone Piccardi <piccardi@truelite.it> for the patch. Closes: #398317. stable/main/binary-sparc/thttpd-util_2.23beta1-3sarge2_sparc.deb stable/main/binary-sparc/thttpd_2.23beta1-3sarge2_sparc.deb thttpd (2.23beta1-3sarge2) stable-security; urgency=high * Non-maintainer upload by the Security Team. * Fix the insecure use of temporary files when invoked by logrotate. [CVE-2006-4248] stable/main/binary-s390/thttpd_2.23beta1-3sarge2_s390.deb stable/main/binary-s390/thttpd-util_2.23beta1-3sarge2_s390.deb thttpd (2.23beta1-3sarge2) stable-security; urgency=high * Non-maintainer upload by the Security Team. * Fix the insecure use of temporary files when invoked by logrotate. [CVE-2006-4248] stable/main/binary-powerpc/thttpd_2.23beta1-3sarge2_powerpc.deb stable/main/binary-powerpc/thttpd-util_2.23beta1-3sarge2_powerpc.deb thttpd (2.23beta1-3sarge2) stable-security; urgency=high * Non-maintainer upload by the Security Team. * Fix the insecure use of temporary files when invoked by logrotate. [CVE-2006-4248] stable/main/binary-mipsel/thttpd_2.23beta1-3sarge2_mipsel.deb stable/main/binary-mipsel/thttpd-util_2.23beta1-3sarge2_mipsel.deb thttpd (2.23beta1-3sarge2) stable-security; urgency=high * Non-maintainer upload by the Security Team. * Fix the insecure use of temporary files when invoked by logrotate. [CVE-2006-4248] stable/main/binary-mips/thttpd-util_2.23beta1-3sarge2_mips.deb stable/main/binary-mips/thttpd_2.23beta1-3sarge2_mips.deb thttpd (2.23beta1-3sarge2) stable-security; urgency=high * Non-maintainer upload by the Security Team. * Fix the insecure use of temporary files when invoked by logrotate. [CVE-2006-4248] stable/main/binary-m68k/thttpd_2.23beta1-3sarge2_m68k.deb stable/main/binary-m68k/thttpd-util_2.23beta1-3sarge2_m68k.deb thttpd (2.23beta1-3sarge2) stable-security; urgency=high * Non-maintainer upload by the Security Team. * Fix the insecure use of temporary files when invoked by logrotate. [CVE-2006-4248] stable/main/binary-ia64/thttpd_2.23beta1-3sarge2_ia64.deb stable/main/binary-ia64/thttpd-util_2.23beta1-3sarge2_ia64.deb thttpd (2.23beta1-3sarge2) stable-security; urgency=high * Non-maintainer upload by the Security Team. * Fix the insecure use of temporary files when invoked by logrotate. [CVE-2006-4248] stable/main/binary-hppa/thttpd-util_2.23beta1-3sarge2_hppa.deb stable/main/binary-hppa/thttpd_2.23beta1-3sarge2_hppa.deb thttpd (2.23beta1-3sarge2) stable-security; urgency=high * Non-maintainer upload by the Security Team. * Fix the insecure use of temporary files when invoked by logrotate. [CVE-2006-4248] stable/main/binary-arm/thttpd_2.23beta1-3sarge2_arm.deb stable/main/binary-arm/thttpd-util_2.23beta1-3sarge2_arm.deb thttpd (2.23beta1-3sarge2) stable-security; urgency=high * Non-maintainer upload by the Security Team. * Fix the insecure use of temporary files when invoked by logrotate. [CVE-2006-4248] stable/main/binary-alpha/thttpd_2.23beta1-3sarge2_alpha.deb stable/main/binary-alpha/thttpd-util_2.23beta1-3sarge2_alpha.deb thttpd (2.23beta1-3sarge2) stable-security; urgency=high * Non-maintainer upload by the Security Team. * Fix the insecure use of temporary files when invoked by logrotate. [CVE-2006-4248] stable/main/binary-i386/thttpd-util_2.23beta1-3sarge2_i386.deb stable/main/binary-i386/thttpd_2.23beta1-3sarge2_i386.deb stable/main/source/thttpd_2.23beta1-3sarge2.dsc stable/main/source/thttpd_2.23beta1-3sarge2.diff.gz thttpd (2.23beta1-3sarge2) stable-security; urgency=high * Non-maintainer upload by the Security Team. * Fix the insecure use of temporary files when invoked by logrotate. [CVE-2006-4248] stable/main/binary-sparc/info_4.7-2.2sarge2_sparc.deb stable/main/binary-sparc/texinfo_4.7-2.2sarge2_sparc.deb texinfo (4.7-2.2sarge2) stable-security; urgency=high * Non-maintainer upload by the Security team. * Incorporate Ubuntu's patch for CAN-2005-3011 (insecure temporary file handling.) stable/main/binary-s390/info_4.7-2.2sarge2_s390.deb stable/main/binary-s390/texinfo_4.7-2.2sarge2_s390.deb texinfo (4.7-2.2sarge2) stable-security; urgency=high * Non-maintainer upload by the Security team. * Incorporate Ubuntu's patch for CAN-2005-3011 (insecure temporary file handling.) stable/main/binary-powerpc/texinfo_4.7-2.2sarge2_powerpc.deb stable/main/binary-powerpc/info_4.7-2.2sarge2_powerpc.deb texinfo (4.7-2.2sarge2) stable-security; urgency=high * Non-maintainer upload by the Security team. * Incorporate Ubuntu's patch for CAN-2005-3011 (insecure temporary file handling.) stable/main/binary-mipsel/info_4.7-2.2sarge2_mipsel.deb stable/main/binary-mipsel/texinfo_4.7-2.2sarge2_mipsel.deb texinfo (4.7-2.2sarge2) stable-security; urgency=high * Non-maintainer upload by the Security team. * Incorporate Ubuntu's patch for CAN-2005-3011 (insecure temporary file handling.) stable/main/binary-mips/info_4.7-2.2sarge2_mips.deb stable/main/binary-mips/texinfo_4.7-2.2sarge2_mips.deb texinfo (4.7-2.2sarge2) stable-security; urgency=high * Non-maintainer upload by the Security team. * Incorporate Ubuntu's patch for CAN-2005-3011 (insecure temporary file handling.) stable/main/binary-m68k/info_4.7-2.2sarge2_m68k.deb stable/main/binary-m68k/texinfo_4.7-2.2sarge2_m68k.deb texinfo (4.7-2.2sarge2) stable-security; urgency=high * Non-maintainer upload by the Security team. * Incorporate Ubuntu's patch for CAN-2005-3011 (insecure temporary file handling.) stable/main/binary-ia64/texinfo_4.7-2.2sarge2_ia64.deb stable/main/binary-ia64/info_4.7-2.2sarge2_ia64.deb texinfo (4.7-2.2sarge2) stable-security; urgency=high * Non-maintainer upload by the Security team. * Incorporate Ubuntu's patch for CAN-2005-3011 (insecure temporary file handling.) stable/main/binary-hppa/texinfo_4.7-2.2sarge2_hppa.deb stable/main/binary-hppa/info_4.7-2.2sarge2_hppa.deb texinfo (4.7-2.2sarge2) stable-security; urgency=high * Non-maintainer upload by the Security team. * Incorporate Ubuntu's patch for CAN-2005-3011 (insecure temporary file handling.) stable/main/binary-arm/info_4.7-2.2sarge2_arm.deb stable/main/binary-arm/texinfo_4.7-2.2sarge2_arm.deb texinfo (4.7-2.2sarge2) stable-security; urgency=high * Non-maintainer upload by the Security team. * Incorporate Ubuntu's patch for CAN-2005-3011 (insecure temporary file handling.) stable/main/binary-alpha/info_4.7-2.2sarge2_alpha.deb stable/main/binary-alpha/texinfo_4.7-2.2sarge2_alpha.deb texinfo (4.7-2.2sarge2) stable-security; urgency=high * Non-maintainer upload by the Security team. * Incorporate Ubuntu's patch for CAN-2005-3011 (insecure temporary file handling.) stable/main/binary-i386/texinfo_4.7-2.2sarge2_i386.deb stable/main/source/texinfo_4.7-2.2sarge2.dsc stable/main/binary-i386/info_4.7-2.2sarge2_i386.deb stable/main/source/texinfo_4.7-2.2sarge2.diff.gz texinfo (4.7-2.2sarge2) stable-security; urgency=high * Non-maintainer upload by the Security team. * Incorporate Ubuntu's patch for CAN-2005-3011 (insecure temporary file handling.) stable/main/binary-sparc/tar_1.14-2.3_sparc.deb tar (1.14-2.3) stable-security; urgency=high * Non-maintainer upload by the Security Team. * Fix arbitrary file overwrite vulnerability in the handling of GNUTYPE_NAMES records in tar files. CVE-2006-6097 stable/main/binary-s390/tar_1.14-2.3_s390.deb tar (1.14-2.3) stable-security; urgency=high * Non-maintainer upload by the Security Team. * Fix arbitrary file overwrite vulnerability in the handling of GNUTYPE_NAMES records in tar files. CVE-2006-6097 stable/main/binary-powerpc/tar_1.14-2.3_powerpc.deb tar (1.14-2.3) stable-security; urgency=high * Non-maintainer upload by the Security Team. * Fix arbitrary file overwrite vulnerability in the handling of GNUTYPE_NAMES records in tar files. CVE-2006-6097 stable/main/binary-mipsel/tar_1.14-2.3_mipsel.deb tar (1.14-2.3) stable-security; urgency=high * Non-maintainer upload by the Security Team. * Fix arbitrary file overwrite vulnerability in the handling of GNUTYPE_NAMES records in tar files. CVE-2006-6097 stable/main/binary-mips/tar_1.14-2.3_mips.deb tar (1.14-2.3) stable-security; urgency=high * Non-maintainer upload by the Security Team. * Fix arbitrary file overwrite vulnerability in the handling of GNUTYPE_NAMES records in tar files. CVE-2006-6097 stable/main/binary-m68k/tar_1.14-2.3_m68k.deb tar (1.14-2.3) stable-security; urgency=high * Non-maintainer upload by the Security Team. * Fix arbitrary file overwrite vulnerability in the handling of GNUTYPE_NAMES records in tar files. CVE-2006-6097 stable/main/binary-ia64/tar_1.14-2.3_ia64.deb tar (1.14-2.3) stable-security; urgency=high * Non-maintainer upload by the Security Team. * Fix arbitrary file overwrite vulnerability in the handling of GNUTYPE_NAMES records in tar files. CVE-2006-6097 stable/main/binary-hppa/tar_1.14-2.3_hppa.deb tar (1.14-2.3) stable-security; urgency=high * Non-maintainer upload by the Security Team. * Fix arbitrary file overwrite vulnerability in the handling of GNUTYPE_NAMES records in tar files. CVE-2006-6097 stable/main/binary-arm/tar_1.14-2.3_arm.deb tar (1.14-2.3) stable-security; urgency=high * Non-maintainer upload by the Security Team. * Fix arbitrary file overwrite vulnerability in the handling of GNUTYPE_NAMES records in tar files. CVE-2006-6097 stable/main/binary-alpha/tar_1.14-2.3_alpha.deb tar (1.14-2.3) stable-security; urgency=high * Non-maintainer upload by the Security Team. * Fix arbitrary file overwrite vulnerability in the handling of GNUTYPE_NAMES records in tar files. CVE-2006-6097 stable/main/source/tar_1.14-2.3.diff.gz stable/main/binary-i386/tar_1.14-2.3_i386.deb stable/main/source/tar_1.14-2.3.dsc tar (1.14-2.3) stable-security; urgency=high * Non-maintainer upload by the Security Team. * Fix arbitrary file overwrite vulnerability in the handling of GNUTYPE_NAMES records in tar files. CVE-2006-6097 stable/main/binary-all/systemimager-server-flamethrowerd_3.2.3-6sarge4_all.deb stable/main/binary-all/systemimager-doc_3.2.3-6sarge4_all.deb stable/main/source/systemimager_3.2.3-6sarge4.dsc stable/main/binary-all/systemimager-common_3.2.3-6sarge4_all.deb stable/main/source/systemimager_3.2.3-6sarge4.tar.gz stable/main/binary-all/systemimager-boot-i386-standard_3.2.3-6sarge4_all.deb stable/main/binary-all/systemimager-client_3.2.3-6sarge4_all.deb stable/main/binary-all/systemimager-server_3.2.3-6sarge4_all.deb stable/main/binary-all/systemimager-boot-ia64-standard_3.2.3-6sarge4_all.deb systemimager (3.2.3-6sarge4) stable-security; urgency=high * Build against kernel-tree-2.4.27-10sarge5: * 233_ia64-sparc-cross-region-mappings.diff [SECURITY] Prevent cross-region mappings on ia64 and sparc which could be used in a local DoS attack (system crash) See CVE-2006-4538 * 234_atm-clip-freed-skb-deref.diff [SECURITY] Avoid dereferencing an already freed skb, preventing a potential remote DoS (system crash) vector See CVE-2006-4997 * 235_ppc-alignment-exception-table-check.diff [SECURITY][ppc] Avoid potential DoS which can be triggered by some futex ops See CVE-2006-5649 * 236_s390-uaccess-memleak.diff [SECURITY][s390] Fix memory leak in copy_from_user by clearing the remaining bytes of the kernel buffer after a fault on the userspace address in copy_from_user() See CVE-2006-5174 * 237_smbfs-honor-mount-opts.diff Honor uid, gid and mode mount options for smbfs even when unix extensions are enabled (closes: #310982) See CVE-2006-5871 * 238_ppc-hid0-dos.diff [SECURITY] [ppc] Fix local DoS by clearing HID0 attention enable on PPC970 at boot time See CVE-2006-4093 stable/main/binary-all/squirrelmail_1.4.4-10_all.deb stable/main/source/squirrelmail_1.4.4-10.dsc stable/main/source/squirrelmail_1.4.4-10.diff.gz squirrelmail (2:1.4.4-10) stable-security; urgency=high * Fix cross site scripting in malicious input the mailto parameter of webmail.php, the session and delete_draft parameters of compose.php, and via a shortcoming in the magicHTML filter. [CVE-2006-6142] * Work around dangerous Internet Explorer MIME type guessing. http://www.squirrelmail.org/security/issue/2006-12-03 * Patches from upstream. stable/main/source/sql-ledger_2.4.7-2sarge1.dsc stable/main/source/sql-ledger_2.4.7-2sarge1.diff.gz stable/main/binary-all/sql-ledger_2.4.7-2sarge1_all.deb sql-ledger (2.4.7-2sarge1) stable-security; urgency=high * Security upload. * Fix bad handling of sessionid: CVE-2006-4244 Closes: #386519 (backported from 2.6.18) * Fix directory traversal security issues (backported from 2.6.19) * Fix a remote execution vulnerability too (backported from 2.6.21). stable/main/binary-sparc/screen_4.0.2-4.1sarge1_sparc.deb screen (4.0.2-4.1sarge1) stable-security; urgency=high * Fix out-of-bands write when processing character codes in UTF-8 sequences. (CVE-2006-4573) stable/main/binary-s390/screen_4.0.2-4.1sarge1_s390.deb screen (4.0.2-4.1sarge1) stable-security; urgency=high * Fix out-of-bands write when processing character codes in UTF-8 sequences. (CVE-2006-4573) stable/main/binary-powerpc/screen_4.0.2-4.1sarge1_powerpc.deb screen (4.0.2-4.1sarge1) stable-security; urgency=high * Fix out-of-bands write when processing character codes in UTF-8 sequences. (CVE-2006-4573) stable/main/binary-mipsel/screen_4.0.2-4.1sarge1_mipsel.deb screen (4.0.2-4.1sarge1) stable-security; urgency=high * Fix out-of-bands write when processing character codes in UTF-8 sequences. (CVE-2006-4573) stable/main/binary-mips/screen_4.0.2-4.1sarge1_mips.deb screen (4.0.2-4.1sarge1) stable-security; urgency=high * Fix out-of-bands write when processing character codes in UTF-8 sequences. (CVE-2006-4573) stable/main/binary-m68k/screen_4.0.2-4.1sarge1_m68k.deb screen (4.0.2-4.1sarge1) stable-security; urgency=high * Fix out-of-bands write when processing character codes in UTF-8 sequences. (CVE-2006-4573) stable/main/binary-ia64/screen_4.0.2-4.1sarge1_ia64.deb screen (4.0.2-4.1sarge1) stable-security; urgency=high * Fix out-of-bands write when processing character codes in UTF-8 sequences. (CVE-2006-4573) stable/main/binary-hppa/screen_4.0.2-4.1sarge1_hppa.deb screen (4.0.2-4.1sarge1) stable-security; urgency=high * Fix out-of-bands write when processing character codes in UTF-8 sequences. (CVE-2006-4573) stable/main/binary-arm/screen_4.0.2-4.1sarge1_arm.deb screen (4.0.2-4.1sarge1) stable-security; urgency=high * Fix out-of-bands write when processing character codes in UTF-8 sequences. (CVE-2006-4573) stable/main/binary-alpha/screen_4.0.2-4.1sarge1_alpha.deb screen (4.0.2-4.1sarge1) stable-security; urgency=high * Fix out-of-bands write when processing character codes in UTF-8 sequences. (CVE-2006-4573) stable/main/source/screen_4.0.2-4.1sarge1.diff.gz stable/main/source/screen_4.0.2-4.1sarge1.dsc stable/main/binary-i386/screen_4.0.2-4.1sarge1_i386.deb screen (4.0.2-4.1sarge1) stable-security; urgency=high * Fix out-of-bands write when processing character codes in UTF-8 sequences. (CVE-2006-4573) stable/main/binary-sparc/python2.3-samba_3.0.14a-3sarge4_sparc.deb stable/main/binary-sparc/libsmbclient-dev_3.0.14a-3sarge4_sparc.deb stable/main/binary-sparc/samba-dbg_3.0.14a-3sarge4_sparc.deb stable/main/binary-sparc/smbclient_3.0.14a-3sarge4_sparc.deb stable/main/binary-sparc/libpam-smbpass_3.0.14a-3sarge4_sparc.deb stable/main/binary-sparc/libsmbclient_3.0.14a-3sarge4_sparc.deb stable/main/binary-sparc/samba_3.0.14a-3sarge4_sparc.deb stable/main/binary-sparc/smbfs_3.0.14a-3sarge4_sparc.deb stable/main/binary-sparc/winbind_3.0.14a-3sarge4_sparc.deb stable/main/binary-sparc/swat_3.0.14a-3sarge4_sparc.deb stable/main/binary-sparc/samba-common_3.0.14a-3sarge4_sparc.deb samba (3.0.14a-3sarge4) stable-security; urgency=high * Update endless-loop DoS fix to cover another attack vector. stable/main/binary-s390/libsmbclient_3.0.14a-3sarge4_s390.deb stable/main/binary-s390/samba_3.0.14a-3sarge4_s390.deb stable/main/binary-s390/python2.3-samba_3.0.14a-3sarge4_s390.deb stable/main/binary-s390/smbfs_3.0.14a-3sarge4_s390.deb stable/main/binary-s390/swat_3.0.14a-3sarge4_s390.deb stable/main/binary-s390/samba-common_3.0.14a-3sarge4_s390.deb stable/main/binary-s390/libsmbclient-dev_3.0.14a-3sarge4_s390.deb stable/main/binary-s390/libpam-smbpass_3.0.14a-3sarge4_s390.deb stable/main/binary-s390/smbclient_3.0.14a-3sarge4_s390.deb stable/main/binary-s390/winbind_3.0.14a-3sarge4_s390.deb stable/main/binary-s390/samba-dbg_3.0.14a-3sarge4_s390.deb samba (3.0.14a-3sarge4) stable-security; urgency=high * Update endless-loop DoS fix to cover another attack vector. stable/main/binary-powerpc/samba-dbg_3.0.14a-3sarge4_powerpc.deb stable/main/binary-powerpc/swat_3.0.14a-3sarge4_powerpc.deb stable/main/binary-powerpc/smbclient_3.0.14a-3sarge4_powerpc.deb stable/main/binary-powerpc/samba-common_3.0.14a-3sarge4_powerpc.deb stable/main/binary-powerpc/python2.3-samba_3.0.14a-3sarge4_powerpc.deb stable/main/binary-powerpc/smbfs_3.0.14a-3sarge4_powerpc.deb stable/main/binary-powerpc/winbind_3.0.14a-3sarge4_powerpc.deb stable/main/binary-powerpc/libsmbclient-dev_3.0.14a-3sarge4_powerpc.deb stable/main/binary-powerpc/libpam-smbpass_3.0.14a-3sarge4_powerpc.deb stable/main/binary-powerpc/libsmbclient_3.0.14a-3sarge4_powerpc.deb stable/main/binary-powerpc/samba_3.0.14a-3sarge4_powerpc.deb samba (3.0.14a-3sarge4) stable-security; urgency=high * Update endless-loop DoS fix to cover another attack vector. stable/main/binary-mipsel/libsmbclient-dev_3.0.14a-3sarge4_mipsel.deb stable/main/binary-mipsel/smbclient_3.0.14a-3sarge4_mipsel.deb stable/main/binary-mipsel/samba_3.0.14a-3sarge4_mipsel.deb stable/main/binary-mipsel/samba-common_3.0.14a-3sarge4_mipsel.deb stable/main/binary-mipsel/winbind_3.0.14a-3sarge4_mipsel.deb stable/main/binary-mipsel/libpam-smbpass_3.0.14a-3sarge4_mipsel.deb stable/main/binary-mipsel/samba-dbg_3.0.14a-3sarge4_mipsel.deb stable/main/binary-mipsel/smbfs_3.0.14a-3sarge4_mipsel.deb stable/main/binary-mipsel/python2.3-samba_3.0.14a-3sarge4_mipsel.deb stable/main/binary-mipsel/libsmbclient_3.0.14a-3sarge4_mipsel.deb stable/main/binary-mipsel/swat_3.0.14a-3sarge4_mipsel.deb samba (3.0.14a-3sarge4) stable-security; urgency=high * Update endless-loop DoS fix to cover another attack vector. stable/main/binary-mips/libpam-smbpass_3.0.14a-3sarge4_mips.deb stable/main/binary-mips/winbind_3.0.14a-3sarge4_mips.deb stable/main/binary-mips/libsmbclient_3.0.14a-3sarge4_mips.deb stable/main/binary-mips/python2.3-samba_3.0.14a-3sarge4_mips.deb stable/main/binary-mips/smbfs_3.0.14a-3sarge4_mips.deb stable/main/binary-mips/swat_3.0.14a-3sarge4_mips.deb stable/main/binary-mips/samba-dbg_3.0.14a-3sarge4_mips.deb stable/main/binary-mips/libsmbclient-dev_3.0.14a-3sarge4_mips.deb stable/main/binary-mips/samba_3.0.14a-3sarge4_mips.deb stable/main/binary-mips/samba-common_3.0.14a-3sarge4_mips.deb stable/main/binary-mips/smbclient_3.0.14a-3sarge4_mips.deb samba (3.0.14a-3sarge4) stable-security; urgency=high * Update endless-loop DoS fix to cover another attack vector. stable/main/binary-m68k/libpam-smbpass_3.0.14a-3sarge4_m68k.deb stable/main/binary-m68k/samba-dbg_3.0.14a-3sarge4_m68k.deb stable/main/binary-m68k/winbind_3.0.14a-3sarge4_m68k.deb stable/main/binary-m68k/smbfs_3.0.14a-3sarge4_m68k.deb stable/main/binary-m68k/python2.3-samba_3.0.14a-3sarge4_m68k.deb stable/main/binary-m68k/samba_3.0.14a-3sarge4_m68k.deb stable/main/binary-m68k/swat_3.0.14a-3sarge4_m68k.deb stable/main/binary-m68k/smbclient_3.0.14a-3sarge4_m68k.deb stable/main/binary-m68k/libsmbclient_3.0.14a-3sarge4_m68k.deb stable/main/binary-m68k/libsmbclient-dev_3.0.14a-3sarge4_m68k.deb stable/main/binary-m68k/samba-common_3.0.14a-3sarge4_m68k.deb samba (3.0.14a-3sarge4) stable-security; urgency=high * Update endless-loop DoS fix to cover another attack vector. stable/main/binary-ia64/python2.3-samba_3.0.14a-3sarge4_ia64.deb stable/main/binary-ia64/libsmbclient_3.0.14a-3sarge4_ia64.deb stable/main/binary-ia64/swat_3.0.14a-3sarge4_ia64.deb stable/main/binary-ia64/smbfs_3.0.14a-3sarge4_ia64.deb stable/main/binary-ia64/samba_3.0.14a-3sarge4_ia64.deb stable/main/binary-ia64/samba-common_3.0.14a-3sarge4_ia64.deb stable/main/binary-ia64/libpam-smbpass_3.0.14a-3sarge4_ia64.deb stable/main/binary-ia64/samba-dbg_3.0.14a-3sarge4_ia64.deb stable/main/binary-ia64/libsmbclient-dev_3.0.14a-3sarge4_ia64.deb stable/main/binary-ia64/winbind_3.0.14a-3sarge4_ia64.deb stable/main/binary-ia64/smbclient_3.0.14a-3sarge4_ia64.deb samba (3.0.14a-3sarge4) stable-security; urgency=high * Update endless-loop DoS fix to cover another attack vector. stable/main/binary-hppa/samba-common_3.0.14a-3sarge4_hppa.deb stable/main/binary-hppa/python2.3-samba_3.0.14a-3sarge4_hppa.deb stable/main/binary-hppa/libpam-smbpass_3.0.14a-3sarge4_hppa.deb stable/main/binary-hppa/samba_3.0.14a-3sarge4_hppa.deb stable/main/binary-hppa/swat_3.0.14a-3sarge4_hppa.deb stable/main/binary-hppa/smbfs_3.0.14a-3sarge4_hppa.deb stable/main/binary-hppa/samba-dbg_3.0.14a-3sarge4_hppa.deb stable/main/binary-hppa/libsmbclient_3.0.14a-3sarge4_hppa.deb stable/main/binary-hppa/smbclient_3.0.14a-3sarge4_hppa.deb stable/main/binary-hppa/winbind_3.0.14a-3sarge4_hppa.deb stable/main/binary-hppa/libsmbclient-dev_3.0.14a-3sarge4_hppa.deb samba (3.0.14a-3sarge4) stable-security; urgency=high * Update endless-loop DoS fix to cover another attack vector. stable/main/binary-arm/swat_3.0.14a-3sarge4_arm.deb stable/main/binary-arm/smbclient_3.0.14a-3sarge4_arm.deb stable/main/binary-arm/python2.3-samba_3.0.14a-3sarge4_arm.deb stable/main/binary-arm/libsmbclient_3.0.14a-3sarge4_arm.deb stable/main/binary-arm/libpam-smbpass_3.0.14a-3sarge4_arm.deb stable/main/binary-arm/libsmbclient-dev_3.0.14a-3sarge4_arm.deb stable/main/binary-arm/winbind_3.0.14a-3sarge4_arm.deb stable/main/binary-arm/smbfs_3.0.14a-3sarge4_arm.deb stable/main/binary-arm/samba-dbg_3.0.14a-3sarge4_arm.deb stable/main/binary-arm/samba-common_3.0.14a-3sarge4_arm.deb stable/main/binary-arm/samba_3.0.14a-3sarge4_arm.deb samba (3.0.14a-3sarge4) stable-security; urgency=high * Update endless-loop DoS fix to cover another attack vector. stable/main/binary-alpha/samba_3.0.14a-3sarge4_alpha.deb stable/main/binary-alpha/libpam-smbpass_3.0.14a-3sarge4_alpha.deb stable/main/binary-alpha/libsmbclient_3.0.14a-3sarge4_alpha.deb stable/main/binary-alpha/python2.3-samba_3.0.14a-3sarge4_alpha.deb stable/main/binary-alpha/smbfs_3.0.14a-3sarge4_alpha.deb stable/main/binary-alpha/winbind_3.0.14a-3sarge4_alpha.deb stable/main/binary-alpha/smbclient_3.0.14a-3sarge4_alpha.deb stable/main/binary-alpha/samba-common_3.0.14a-3sarge4_alpha.deb stable/main/binary-alpha/libsmbclient-dev_3.0.14a-3sarge4_alpha.deb stable/main/binary-alpha/samba-dbg_3.0.14a-3sarge4_alpha.deb stable/main/binary-alpha/swat_3.0.14a-3sarge4_alpha.deb samba (3.0.14a-3sarge4) stable-security; urgency=high * Update endless-loop DoS fix to cover another attack vector. stable/main/binary-i386/smbclient_3.0.14a-3sarge4_i386.deb stable/main/binary-i386/samba-common_3.0.14a-3sarge4_i386.deb stable/main/source/samba_3.0.14a-3sarge4.dsc stable/main/binary-i386/samba-dbg_3.0.14a-3sarge4_i386.deb stable/main/binary-i386/smbfs_3.0.14a-3sarge4_i386.deb stable/main/binary-i386/libpam-smbpass_3.0.14a-3sarge4_i386.deb stable/main/binary-i386/winbind_3.0.14a-3sarge4_i386.deb stable/main/binary-i386/libsmbclient_3.0.14a-3sarge4_i386.deb stable/main/binary-i386/libsmbclient-dev_3.0.14a-3sarge4_i386.deb stable/main/binary-i386/samba_3.0.14a-3sarge4_i386.deb stable/main/binary-i386/swat_3.0.14a-3sarge4_i386.deb stable/main/binary-i386/python2.3-samba_3.0.14a-3sarge4_i386.deb stable/main/source/samba_3.0.14a-3sarge4.diff.gz stable/main/binary-all/samba-doc_3.0.14a-3sarge4_all.deb samba (3.0.14a-3sarge4) stable-security; urgency=high * Update endless-loop DoS fix to cover another attack vector. stable/main/binary-sparc/libdbm-ruby1.8_1.8.2-7sarge5_sparc.deb stable/main/binary-sparc/libgdbm-ruby1.8_1.8.2-7sarge5_sparc.deb stable/main/binary-sparc/libopenssl-ruby1.8_1.8.2-7sarge5_sparc.deb stable/main/binary-sparc/libruby1.8-dbg_1.8.2-7sarge5_sparc.deb stable/main/binary-sparc/libruby1.8_1.8.2-7sarge5_sparc.deb stable/main/binary-sparc/libtcltk-ruby1.8_1.8.2-7sarge5_sparc.deb stable/main/binary-sparc/libreadline-ruby1.8_1.8.2-7sarge5_sparc.deb stable/main/binary-sparc/ruby1.8-dev_1.8.2-7sarge5_sparc.deb stable/main/binary-sparc/ruby1.8_1.8.2-7sarge5_sparc.deb ruby1.8 (1.8.2-7sarge5) stable-security; urgency=high * Non-matainer upload by the Security Team. * Fix a denial of service attack in CGI handling (CVE-2006-6303). - Added 905_CVE-2006-6303.patch stable/main/binary-s390/ruby1.8-dev_1.8.2-7sarge5_s390.deb stable/main/binary-s390/libopenssl-ruby1.8_1.8.2-7sarge5_s390.deb stable/main/binary-s390/libgdbm-ruby1.8_1.8.2-7sarge5_s390.deb stable/main/binary-s390/libruby1.8_1.8.2-7sarge5_s390.deb stable/main/binary-s390/libtcltk-ruby1.8_1.8.2-7sarge5_s390.deb stable/main/binary-s390/ruby1.8_1.8.2-7sarge5_s390.deb stable/main/binary-s390/libruby1.8-dbg_1.8.2-7sarge5_s390.deb stable/main/binary-s390/libreadline-ruby1.8_1.8.2-7sarge5_s390.deb stable/main/binary-s390/libdbm-ruby1.8_1.8.2-7sarge5_s390.deb ruby1.8 (1.8.2-7sarge5) stable-security; urgency=high * Non-matainer upload by the Security Team. * Fix a denial of service attack in CGI handling (CVE-2006-6303). - Added 905_CVE-2006-6303.patch stable/main/binary-powerpc/ruby1.8_1.8.2-7sarge5_powerpc.deb stable/main/binary-powerpc/libruby1.8-dbg_1.8.2-7sarge5_powerpc.deb stable/main/binary-powerpc/libruby1.8_1.8.2-7sarge5_powerpc.deb stable/main/binary-powerpc/libgdbm-ruby1.8_1.8.2-7sarge5_powerpc.deb stable/main/binary-powerpc/libtcltk-ruby1.8_1.8.2-7sarge5_powerpc.deb stable/main/binary-powerpc/libdbm-ruby1.8_1.8.2-7sarge5_powerpc.deb stable/main/binary-powerpc/libreadline-ruby1.8_1.8.2-7sarge5_powerpc.deb stable/main/binary-powerpc/libopenssl-ruby1.8_1.8.2-7sarge5_powerpc.deb stable/main/binary-powerpc/ruby1.8-dev_1.8.2-7sarge5_powerpc.deb ruby1.8 (1.8.2-7sarge5) stable-security; urgency=high * Non-matainer upload by the Security Team. * Fix a denial of service attack in CGI handling (CVE-2006-6303). - Added 905_CVE-2006-6303.patch stable/main/binary-mipsel/libtcltk-ruby1.8_1.8.2-7sarge5_mipsel.deb stable/main/binary-mipsel/libgdbm-ruby1.8_1.8.2-7sarge5_mipsel.deb stable/main/binary-mipsel/libdbm-ruby1.8_1.8.2-7sarge5_mipsel.deb stable/main/binary-mipsel/ruby1.8_1.8.2-7sarge5_mipsel.deb stable/main/binary-mipsel/libruby1.8_1.8.2-7sarge5_mipsel.deb stable/main/binary-mipsel/libopenssl-ruby1.8_1.8.2-7sarge5_mipsel.deb stable/main/binary-mipsel/ruby1.8-dev_1.8.2-7sarge5_mipsel.deb stable/main/binary-mipsel/libruby1.8-dbg_1.8.2-7sarge5_mipsel.deb stable/main/binary-mipsel/libreadline-ruby1.8_1.8.2-7sarge5_mipsel.deb ruby1.8 (1.8.2-7sarge5) stable-security; urgency=high * Non-matainer upload by the Security Team. * Fix a denial of service attack in CGI handling (CVE-2006-6303). - Added 905_CVE-2006-6303.patch stable/main/binary-mips/libopenssl-ruby1.8_1.8.2-7sarge5_mips.deb stable/main/binary-mips/ruby1.8_1.8.2-7sarge5_mips.deb stable/main/binary-mips/ruby1.8-dev_1.8.2-7sarge5_mips.deb stable/main/binary-mips/libruby1.8-dbg_1.8.2-7sarge5_mips.deb stable/main/binary-mips/libreadline-ruby1.8_1.8.2-7sarge5_mips.deb stable/main/binary-mips/libdbm-ruby1.8_1.8.2-7sarge5_mips.deb stable/main/binary-mips/libgdbm-ruby1.8_1.8.2-7sarge5_mips.deb stable/main/binary-mips/libtcltk-ruby1.8_1.8.2-7sarge5_mips.deb stable/main/binary-mips/libruby1.8_1.8.2-7sarge5_mips.deb ruby1.8 (1.8.2-7sarge5) stable-security; urgency=high * Non-matainer upload by the Security Team. * Fix a denial of service attack in CGI handling (CVE-2006-6303). - Added 905_CVE-2006-6303.patch stable/main/binary-m68k/libopenssl-ruby1.8_1.8.2-7sarge5_m68k.deb stable/main/binary-m68k/libruby1.8-dbg_1.8.2-7sarge5_m68k.deb stable/main/binary-m68k/libgdbm-ruby1.8_1.8.2-7sarge5_m68k.deb stable/main/binary-m68k/ruby1.8-dev_1.8.2-7sarge5_m68k.deb stable/main/binary-m68k/libruby1.8_1.8.2-7sarge5_m68k.deb stable/main/binary-m68k/libreadline-ruby1.8_1.8.2-7sarge5_m68k.deb stable/main/binary-m68k/libdbm-ruby1.8_1.8.2-7sarge5_m68k.deb stable/main/binary-m68k/libtcltk-ruby1.8_1.8.2-7sarge5_m68k.deb stable/main/binary-m68k/ruby1.8_1.8.2-7sarge5_m68k.deb ruby1.8 (1.8.2-7sarge5) stable-security; urgency=high * Non-matainer upload by the Security Team. * Fix a denial of service attack in CGI handling (CVE-2006-6303). - Added 905_CVE-2006-6303.patch stable/main/binary-ia64/ruby1.8_1.8.2-7sarge5_ia64.deb stable/main/binary-ia64/libruby1.8-dbg_1.8.2-7sarge5_ia64.deb stable/main/binary-ia64/ruby1.8-dev_1.8.2-7sarge5_ia64.deb stable/main/binary-ia64/libopenssl-ruby1.8_1.8.2-7sarge5_ia64.deb stable/main/binary-ia64/libreadline-ruby1.8_1.8.2-7sarge5_ia64.deb stable/main/binary-ia64/libtcltk-ruby1.8_1.8.2-7sarge5_ia64.deb stable/main/binary-ia64/libruby1.8_1.8.2-7sarge5_ia64.deb stable/main/binary-ia64/libgdbm-ruby1.8_1.8.2-7sarge5_ia64.deb stable/main/binary-ia64/libdbm-ruby1.8_1.8.2-7sarge5_ia64.deb ruby1.8 (1.8.2-7sarge5) stable-security; urgency=high * Non-matainer upload by the Security Team. * Fix a denial of service attack in CGI handling (CVE-2006-6303). - Added 905_CVE-2006-6303.patch stable/main/binary-hppa/libtcltk-ruby1.8_1.8.2-7sarge5_hppa.deb stable/main/binary-hppa/libruby1.8-dbg_1.8.2-7sarge5_hppa.deb stable/main/binary-hppa/libgdbm-ruby1.8_1.8.2-7sarge5_hppa.deb stable/main/binary-hppa/ruby1.8-dev_1.8.2-7sarge5_hppa.deb stable/main/binary-hppa/ruby1.8_1.8.2-7sarge5_hppa.deb stable/main/binary-hppa/libdbm-ruby1.8_1.8.2-7sarge5_hppa.deb stable/main/binary-hppa/libruby1.8_1.8.2-7sarge5_hppa.deb stable/main/binary-hppa/libopenssl-ruby1.8_1.8.2-7sarge5_hppa.deb stable/main/binary-hppa/libreadline-ruby1.8_1.8.2-7sarge5_hppa.deb ruby1.8 (1.8.2-7sarge5) stable-security; urgency=high * Non-matainer upload by the Security Team. * Fix a denial of service attack in CGI handling (CVE-2006-6303). - Added 905_CVE-2006-6303.patch stable/main/binary-arm/ruby1.8-dev_1.8.2-7sarge5_arm.deb stable/main/binary-arm/libruby1.8-dbg_1.8.2-7sarge5_arm.deb stable/main/binary-arm/libopenssl-ruby1.8_1.8.2-7sarge5_arm.deb stable/main/binary-arm/libgdbm-ruby1.8_1.8.2-7sarge5_arm.deb stable/main/binary-arm/libreadline-ruby1.8_1.8.2-7sarge5_arm.deb stable/main/binary-arm/libruby1.8_1.8.2-7sarge5_arm.deb stable/main/binary-arm/libdbm-ruby1.8_1.8.2-7sarge5_arm.deb stable/main/binary-arm/libtcltk-ruby1.8_1.8.2-7sarge5_arm.deb stable/main/binary-arm/ruby1.8_1.8.2-7sarge5_arm.deb ruby1.8 (1.8.2-7sarge5) stable-security; urgency=high * Non-matainer upload by the Security Team. * Fix a denial of service attack in CGI handling (CVE-2006-6303). - Added 905_CVE-2006-6303.patch stable/main/binary-alpha/ruby1.8-dev_1.8.2-7sarge5_alpha.deb stable/main/binary-alpha/libopenssl-ruby1.8_1.8.2-7sarge5_alpha.deb stable/main/binary-alpha/libreadline-ruby1.8_1.8.2-7sarge5_alpha.deb stable/main/binary-alpha/libruby1.8_1.8.2-7sarge5_alpha.deb stable/main/binary-alpha/libgdbm-ruby1.8_1.8.2-7sarge5_alpha.deb stable/main/binary-alpha/libtcltk-ruby1.8_1.8.2-7sarge5_alpha.deb stable/main/binary-alpha/ruby1.8_1.8.2-7sarge5_alpha.deb stable/main/binary-alpha/libdbm-ruby1.8_1.8.2-7sarge5_alpha.deb stable/main/binary-alpha/libruby1.8-dbg_1.8.2-7sarge5_alpha.deb ruby1.8 (1.8.2-7sarge5) stable-security; urgency=high * Non-matainer upload by the Security Team. * Fix a denial of service attack in CGI handling (CVE-2006-6303). - Added 905_CVE-2006-6303.patch stable/main/binary-i386/libdbm-ruby1.8_1.8.2-7sarge5_i386.deb stable/main/binary-i386/libtcltk-ruby1.8_1.8.2-7sarge5_i386.deb stable/main/binary-all/ri1.8_1.8.2-7sarge5_all.deb stable/main/binary-all/irb1.8_1.8.2-7sarge5_all.deb stable/main/binary-i386/libruby1.8_1.8.2-7sarge5_i386.deb stable/main/binary-all/rdoc1.8_1.8.2-7sarge5_all.deb stable/main/source/ruby1.8_1.8.2-7sarge5.dsc stable/main/binary-i386/libreadline-ruby1.8_1.8.2-7sarge5_i386.deb stable/main/binary-all/ruby1.8-elisp_1.8.2-7sarge5_all.deb stable/main/binary-i386/libruby1.8-dbg_1.8.2-7sarge5_i386.deb stable/main/binary-i386/ruby1.8-dev_1.8.2-7sarge5_i386.deb stable/main/binary-i386/ruby1.8_1.8.2-7sarge5_i386.deb stable/main/binary-all/ruby1.8-examples_1.8.2-7sarge5_all.deb stable/main/binary-i386/libgdbm-ruby1.8_1.8.2-7sarge5_i386.deb stable/main/binary-i386/libopenssl-ruby1.8_1.8.2-7sarge5_i386.deb stable/main/source/ruby1.8_1.8.2-7sarge5.diff.gz ruby1.8 (1.8.2-7sarge5) stable-security; urgency=high * Non-matainer upload by the Security Team. * Fix a denial of service attack in CGI handling (CVE-2006-6303). - Added 905_CVE-2006-6303.patch stable/main/binary-sparc/libdbm-ruby1.6_1.6.8-12sarge3_sparc.deb stable/main/binary-sparc/libruby1.6_1.6.8-12sarge3_sparc.deb stable/main/binary-sparc/libtcltk-ruby1.6_1.6.8-12sarge3_sparc.deb stable/main/binary-sparc/ruby1.6_1.6.8-12sarge3_sparc.deb stable/main/binary-sparc/libcurses-ruby1.6_1.6.8-12sarge3_sparc.deb stable/main/binary-sparc/libsyslog-ruby1.6_1.6.8-12sarge3_sparc.deb stable/main/binary-sparc/libruby1.6-dbg_1.6.8-12sarge3_sparc.deb stable/main/binary-sparc/ruby1.6-dev_1.6.8-12sarge3_sparc.deb stable/main/binary-sparc/libtk-ruby1.6_1.6.8-12sarge3_sparc.deb stable/main/binary-sparc/libgdbm-ruby1.6_1.6.8-12sarge3_sparc.deb stable/main/binary-sparc/libreadline-ruby1.6_1.6.8-12sarge3_sparc.deb stable/main/binary-sparc/libpty-ruby1.6_1.6.8-12sarge3_sparc.deb stable/main/binary-sparc/libsdbm-ruby1.6_1.6.8-12sarge3_sparc.deb ruby1.6 (1.6.8-12sarge3) stable-security; urgency=high * akira yamada <akira@debian.org> - added debian/patches/817_CVE-2006-5467.patch: - invalid multipart data can make cgi.rb infinite loop and CPU consumption. (CVE-2006-5467) - added debian/patches/818_cgi.rb_quote_boundary.patch: - invalid multipart boundary can make cgi.rb infinite loop and CPU consumption. (JVN#84798830) stable/main/binary-s390/libtk-ruby1.6_1.6.8-12sarge3_s390.deb stable/main/binary-s390/libreadline-ruby1.6_1.6.8-12sarge3_s390.deb stable/main/binary-s390/libgdbm-ruby1.6_1.6.8-12sarge3_s390.deb stable/main/binary-s390/libruby1.6_1.6.8-12sarge3_s390.deb stable/main/binary-s390/libsyslog-ruby1.6_1.6.8-12sarge3_s390.deb stable/main/binary-s390/libdbm-ruby1.6_1.6.8-12sarge3_s390.deb stable/main/binary-s390/libsdbm-ruby1.6_1.6.8-12sarge3_s390.deb stable/main/binary-s390/ruby1.6-dev_1.6.8-12sarge3_s390.deb stable/main/binary-s390/libpty-ruby1.6_1.6.8-12sarge3_s390.deb stable/main/binary-s390/libtcltk-ruby1.6_1.6.8-12sarge3_s390.deb stable/main/binary-s390/libruby1.6-dbg_1.6.8-12sarge3_s390.deb stable/main/binary-s390/ruby1.6_1.6.8-12sarge3_s390.deb stable/main/binary-s390/libcurses-ruby1.6_1.6.8-12sarge3_s390.deb ruby1.6 (1.6.8-12sarge3) stable-security; urgency=high * akira yamada <akira@debian.org> - added debian/patches/817_CVE-2006-5467.patch: - invalid multipart data can make cgi.rb infinite loop and CPU consumption. (CVE-2006-5467) - added debian/patches/818_cgi.rb_quote_boundary.patch: - invalid multipart boundary can make cgi.rb infinite loop and CPU consumption. (JVN#84798830) stable/main/binary-powerpc/ruby1.6_1.6.8-12sarge3_powerpc.deb stable/main/binary-powerpc/libreadline-ruby1.6_1.6.8-12sarge3_powerpc.deb stable/main/binary-powerpc/libpty-ruby1.6_1.6.8-12sarge3_powerpc.deb stable/main/binary-powerpc/libruby1.6-dbg_1.6.8-12sarge3_powerpc.deb stable/main/binary-powerpc/libsyslog-ruby1.6_1.6.8-12sarge3_powerpc.deb stable/main/binary-powerpc/libruby1.6_1.6.8-12sarge3_powerpc.deb stable/main/binary-powerpc/libtcltk-ruby1.6_1.6.8-12sarge3_powerpc.deb stable/main/binary-powerpc/libsdbm-ruby1.6_1.6.8-12sarge3_powerpc.deb stable/main/binary-powerpc/libtk-ruby1.6_1.6.8-12sarge3_powerpc.deb stable/main/binary-powerpc/libgdbm-ruby1.6_1.6.8-12sarge3_powerpc.deb stable/main/binary-powerpc/ruby1.6-dev_1.6.8-12sarge3_powerpc.deb stable/main/binary-powerpc/libcurses-ruby1.6_1.6.8-12sarge3_powerpc.deb stable/main/binary-powerpc/libdbm-ruby1.6_1.6.8-12sarge3_powerpc.deb ruby1.6 (1.6.8-12sarge3) stable-security; urgency=high * akira yamada <akira@debian.org> - added debian/patches/817_CVE-2006-5467.patch: - invalid multipart data can make cgi.rb infinite loop and CPU consumption. (CVE-2006-5467) - added debian/patches/818_cgi.rb_quote_boundary.patch: - invalid multipart boundary can make cgi.rb infinite loop and CPU consumption. (JVN#84798830) stable/main/binary-mipsel/libtk-ruby1.6_1.6.8-12sarge3_mipsel.deb stable/main/binary-mipsel/libruby1.6-dbg_1.6.8-12sarge3_mipsel.deb stable/main/binary-mipsel/libgdbm-ruby1.6_1.6.8-12sarge3_mipsel.deb stable/main/binary-mipsel/libtcltk-ruby1.6_1.6.8-12sarge3_mipsel.deb stable/main/binary-mipsel/libsyslog-ruby1.6_1.6.8-12sarge3_mipsel.deb stable/main/binary-mipsel/ruby1.6_1.6.8-12sarge3_mipsel.deb stable/main/binary-mipsel/libsdbm-ruby1.6_1.6.8-12sarge3_mipsel.deb stable/main/binary-mipsel/libdbm-ruby1.6_1.6.8-12sarge3_mipsel.deb stable/main/binary-mipsel/libpty-ruby1.6_1.6.8-12sarge3_mipsel.deb stable/main/binary-mipsel/ruby1.6-dev_1.6.8-12sarge3_mipsel.deb stable/main/binary-mipsel/libreadline-ruby1.6_1.6.8-12sarge3_mipsel.deb stable/main/binary-mipsel/libcurses-ruby1.6_1.6.8-12sarge3_mipsel.deb stable/main/binary-mipsel/libruby1.6_1.6.8-12sarge3_mipsel.deb ruby1.6 (1.6.8-12sarge3) stable-security; urgency=high * akira yamada <akira@debian.org> - added debian/patches/817_CVE-2006-5467.patch: - invalid multipart data can make cgi.rb infinite loop and CPU consumption. (CVE-2006-5467) - added debian/patches/818_cgi.rb_quote_boundary.patch: - invalid multipart boundary can make cgi.rb infinite loop and CPU consumption. (JVN#84798830) stable/main/binary-mips/libruby1.6_1.6.8-12sarge3_mips.deb stable/main/binary-mips/libtk-ruby1.6_1.6.8-12sarge3_mips.deb stable/main/binary-mips/libtcltk-ruby1.6_1.6.8-12sarge3_mips.deb stable/main/binary-mips/ruby1.6-dev_1.6.8-12sarge3_mips.deb stable/main/binary-mips/libsyslog-ruby1.6_1.6.8-12sarge3_mips.deb stable/main/binary-mips/libgdbm-ruby1.6_1.6.8-12sarge3_mips.deb stable/main/binary-mips/libruby1.6-dbg_1.6.8-12sarge3_mips.deb stable/main/binary-mips/libpty-ruby1.6_1.6.8-12sarge3_mips.deb stable/main/binary-mips/libdbm-ruby1.6_1.6.8-12sarge3_mips.deb stable/main/binary-mips/ruby1.6_1.6.8-12sarge3_mips.deb stable/main/binary-mips/libreadline-ruby1.6_1.6.8-12sarge3_mips.deb stable/main/binary-mips/libsdbm-ruby1.6_1.6.8-12sarge3_mips.deb stable/main/binary-mips/libcurses-ruby1.6_1.6.8-12sarge3_mips.deb ruby1.6 (1.6.8-12sarge3) stable-security; urgency=high * akira yamada <akira@debian.org> - added debian/patches/817_CVE-2006-5467.patch: - invalid multipart data can make cgi.rb infinite loop and CPU consumption. (CVE-2006-5467) - added debian/patches/818_cgi.rb_quote_boundary.patch: - invalid multipart boundary can make cgi.rb infinite loop and CPU consumption. (JVN#84798830) stable/main/binary-m68k/libgdbm-ruby1.6_1.6.8-12sarge3_m68k.deb stable/main/binary-m68k/libsyslog-ruby1.6_1.6.8-12sarge3_m68k.deb stable/main/binary-m68k/libruby1.6_1.6.8-12sarge3_m68k.deb stable/main/binary-m68k/libtcltk-ruby1.6_1.6.8-12sarge3_m68k.deb stable/main/binary-m68k/libpty-ruby1.6_1.6.8-12sarge3_m68k.deb stable/main/binary-m68k/ruby1.6-dev_1.6.8-12sarge3_m68k.deb stable/main/binary-m68k/libtk-ruby1.6_1.6.8-12sarge3_m68k.deb stable/main/binary-m68k/libruby1.6-dbg_1.6.8-12sarge3_m68k.deb stable/main/binary-m68k/libdbm-ruby1.6_1.6.8-12sarge3_m68k.deb stable/main/binary-m68k/libcurses-ruby1.6_1.6.8-12sarge3_m68k.deb stable/main/binary-m68k/libreadline-ruby1.6_1.6.8-12sarge3_m68k.deb stable/main/binary-m68k/ruby1.6_1.6.8-12sarge3_m68k.deb stable/main/binary-m68k/libsdbm-ruby1.6_1.6.8-12sarge3_m68k.deb ruby1.6 (1.6.8-12sarge3) stable-security; urgency=high * akira yamada <akira@debian.org> - added debian/patches/817_CVE-2006-5467.patch: - invalid multipart data can make cgi.rb infinite loop and CPU consumption. (CVE-2006-5467) - added debian/patches/818_cgi.rb_quote_boundary.patch: - invalid multipart boundary can make cgi.rb infinite loop and CPU consumption. (JVN#84798830) stable/main/binary-ia64/libsyslog-ruby1.6_1.6.8-12sarge3_ia64.deb stable/main/binary-ia64/libtcltk-ruby1.6_1.6.8-12sarge3_ia64.deb stable/main/binary-ia64/libruby1.6-dbg_1.6.8-12sarge3_ia64.deb stable/main/binary-ia64/libgdbm-ruby1.6_1.6.8-12sarge3_ia64.deb stable/main/binary-ia64/libdbm-ruby1.6_1.6.8-12sarge3_ia64.deb stable/main/binary-ia64/libpty-ruby1.6_1.6.8-12sarge3_ia64.deb stable/main/binary-ia64/libtk-ruby1.6_1.6.8-12sarge3_ia64.deb stable/main/binary-ia64/ruby1.6-dev_1.6.8-12sarge3_ia64.deb stable/main/binary-ia64/libcurses-ruby1.6_1.6.8-12sarge3_ia64.deb stable/main/binary-ia64/libsdbm-ruby1.6_1.6.8-12sarge3_ia64.deb stable/main/binary-ia64/libreadline-ruby1.6_1.6.8-12sarge3_ia64.deb stable/main/binary-ia64/libruby1.6_1.6.8-12sarge3_ia64.deb stable/main/binary-ia64/ruby1.6_1.6.8-12sarge3_ia64.deb ruby1.6 (1.6.8-12sarge3) stable-security; urgency=high * akira yamada <akira@debian.org> - added debian/patches/817_CVE-2006-5467.patch: - invalid multipart data can make cgi.rb infinite loop and CPU consumption. (CVE-2006-5467) - added debian/patches/818_cgi.rb_quote_boundary.patch: - invalid multipart boundary can make cgi.rb infinite loop and CPU consumption. (JVN#84798830) stable/main/binary-hppa/libsdbm-ruby1.6_1.6.8-12sarge3_hppa.deb stable/main/binary-hppa/libruby1.6_1.6.8-12sarge3_hppa.deb stable/main/binary-hppa/libtk-ruby1.6_1.6.8-12sarge3_hppa.deb stable/main/binary-hppa/libgdbm-ruby1.6_1.6.8-12sarge3_hppa.deb stable/main/binary-hppa/libtcltk-ruby1.6_1.6.8-12sarge3_hppa.deb stable/main/binary-hppa/libsyslog-ruby1.6_1.6.8-12sarge3_hppa.deb stable/main/binary-hppa/libcurses-ruby1.6_1.6.8-12sarge3_hppa.deb stable/main/binary-hppa/libdbm-ruby1.6_1.6.8-12sarge3_hppa.deb stable/main/binary-hppa/ruby1.6-dev_1.6.8-12sarge3_hppa.deb stable/main/binary-hppa/libpty-ruby1.6_1.6.8-12sarge3_hppa.deb stable/main/binary-hppa/libreadline-ruby1.6_1.6.8-12sarge3_hppa.deb stable/main/binary-hppa/libruby1.6-dbg_1.6.8-12sarge3_hppa.deb stable/main/binary-hppa/ruby1.6_1.6.8-12sarge3_hppa.deb ruby1.6 (1.6.8-12sarge3) stable-security; urgency=high * akira yamada <akira@debian.org> - added debian/patches/817_CVE-2006-5467.patch: - invalid multipart data can make cgi.rb infinite loop and CPU consumption. (CVE-2006-5467) - added debian/patches/818_cgi.rb_quote_boundary.patch: - invalid multipart boundary can make cgi.rb infinite loop and CPU consumption. (JVN#84798830) stable/main/binary-arm/libcurses-ruby1.6_1.6.8-12sarge3_arm.deb stable/main/binary-arm/libpty-ruby1.6_1.6.8-12sarge3_arm.deb stable/main/binary-arm/libdbm-ruby1.6_1.6.8-12sarge3_arm.deb stable/main/binary-arm/libtcltk-ruby1.6_1.6.8-12sarge3_arm.deb stable/main/binary-arm/libruby1.6_1.6.8-12sarge3_arm.deb stable/main/binary-arm/libgdbm-ruby1.6_1.6.8-12sarge3_arm.deb stable/main/binary-arm/ruby1.6-dev_1.6.8-12sarge3_arm.deb stable/main/binary-arm/libreadline-ruby1.6_1.6.8-12sarge3_arm.deb stable/main/binary-arm/ruby1.6_1.6.8-12sarge3_arm.deb stable/main/binary-arm/libsyslog-ruby1.6_1.6.8-12sarge3_arm.deb stable/main/binary-arm/libsdbm-ruby1.6_1.6.8-12sarge3_arm.deb stable/main/binary-arm/libtk-ruby1.6_1.6.8-12sarge3_arm.deb stable/main/binary-arm/libruby1.6-dbg_1.6.8-12sarge3_arm.deb ruby1.6 (1.6.8-12sarge3) stable-security; urgency=high * akira yamada <akira@debian.org> - added debian/patches/817_CVE-2006-5467.patch: - invalid multipart data can make cgi.rb infinite loop and CPU consumption. (CVE-2006-5467) - added debian/patches/818_cgi.rb_quote_boundary.patch: - invalid multipart boundary can make cgi.rb infinite loop and CPU consumption. (JVN#84798830) stable/main/binary-alpha/libtk-ruby1.6_1.6.8-12sarge3_alpha.deb stable/main/binary-alpha/libruby1.6_1.6.8-12sarge3_alpha.deb stable/main/binary-alpha/libsyslog-ruby1.6_1.6.8-12sarge3_alpha.deb stable/main/binary-alpha/libcurses-ruby1.6_1.6.8-12sarge3_alpha.deb stable/main/binary-alpha/libgdbm-ruby1.6_1.6.8-12sarge3_alpha.deb stable/main/binary-alpha/libsdbm-ruby1.6_1.6.8-12sarge3_alpha.deb stable/main/binary-alpha/libdbm-ruby1.6_1.6.8-12sarge3_alpha.deb stable/main/binary-alpha/libreadline-ruby1.6_1.6.8-12sarge3_alpha.deb stable/main/binary-alpha/libruby1.6-dbg_1.6.8-12sarge3_alpha.deb stable/main/binary-alpha/ruby1.6-dev_1.6.8-12sarge3_alpha.deb stable/main/binary-alpha/libtcltk-ruby1.6_1.6.8-12sarge3_alpha.deb stable/main/binary-alpha/libpty-ruby1.6_1.6.8-12sarge3_alpha.deb stable/main/binary-alpha/ruby1.6_1.6.8-12sarge3_alpha.deb ruby1.6 (1.6.8-12sarge3) stable-security; urgency=high * akira yamada <akira@debian.org> - added debian/patches/817_CVE-2006-5467.patch: - invalid multipart data can make cgi.rb infinite loop and CPU consumption. (CVE-2006-5467) - added debian/patches/818_cgi.rb_quote_boundary.patch: - invalid multipart boundary can make cgi.rb infinite loop and CPU consumption. (JVN#84798830) stable/main/binary-i386/libsdbm-ruby1.6_1.6.8-12sarge3_i386.deb stable/main/binary-all/ruby1.6-elisp_1.6.8-12sarge3_all.deb stable/main/binary-all/irb1.6_1.6.8-12sarge3_all.deb stable/main/binary-i386/libpty-ruby1.6_1.6.8-12sarge3_i386.deb stable/main/source/ruby1.6_1.6.8-12sarge3.diff.gz stable/main/binary-i386/ruby1.6-dev_1.6.8-12sarge3_i386.deb stable/main/binary-i386/libsyslog-ruby1.6_1.6.8-12sarge3_i386.deb stable/main/binary-all/ruby1.6-examples_1.6.8-12sarge3_all.deb stable/main/binary-i386/libtcltk-ruby1.6_1.6.8-12sarge3_i386.deb stable/main/binary-i386/ruby1.6_1.6.8-12sarge3_i386.deb stable/main/binary-i386/libcurses-ruby1.6_1.6.8-12sarge3_i386.deb stable/main/binary-i386/libtk-ruby1.6_1.6.8-12sarge3_i386.deb stable/main/binary-i386/libreadline-ruby1.6_1.6.8-12sarge3_i386.deb stable/main/binary-i386/libdbm-ruby1.6_1.6.8-12sarge3_i386.deb stable/main/binary-i386/libgdbm-ruby1.6_1.6.8-12sarge3_i386.deb stable/main/binary-i386/libruby1.6_1.6.8-12sarge3_i386.deb stable/main/binary-i386/libruby1.6-dbg_1.6.8-12sarge3_i386.deb stable/main/source/ruby1.6_1.6.8-12sarge3.dsc ruby1.6 (1.6.8-12sarge3) stable-security; urgency=high * akira yamada <akira@debian.org> - added debian/patches/817_CVE-2006-5467.patch: - invalid multipart data can make cgi.rb infinite loop and CPU consumption. (CVE-2006-5467) - added debian/patches/818_cgi.rb_quote_boundary.patch: - invalid multipart boundary can make cgi.rb infinite loop and CPU consumption. (JVN#84798830) stable/main/binary-sparc/libqt3-dev_3.3.4-3sarge1_sparc.deb stable/main/binary-sparc/libqt3c102-mt-sqlite_3.3.4-3sarge1_sparc.deb stable/main/binary-sparc/libqt3c102-mysql_3.3.4-3sarge1_sparc.deb stable/main/binary-sparc/qt3-dev-tools-embedded_3.3.4-3sarge1_sparc.deb stable/main/binary-sparc/qt3-dev-tools-compat_3.3.4-3sarge1_sparc.deb stable/main/binary-sparc/qt3-assistant_3.3.4-3sarge1_sparc.deb stable/main/binary-sparc/libqt3c102-mt-psql_3.3.4-3sarge1_sparc.deb stable/main/binary-sparc/libqt3-mt-dev_3.3.4-3sarge1_sparc.deb stable/main/binary-sparc/libqt3c102-mt-odbc_3.3.4-3sarge1_sparc.deb stable/main/binary-sparc/libqt3c102_3.3.4-3sarge1_sparc.deb stable/main/binary-sparc/qt3-designer_3.3.4-3sarge1_sparc.deb stable/main/binary-sparc/libqt3-headers_3.3.4-3sarge1_sparc.deb stable/main/binary-sparc/libqt3c102-odbc_3.3.4-3sarge1_sparc.deb stable/main/binary-sparc/libqt3c102-mt_3.3.4-3sarge1_sparc.deb stable/main/binary-sparc/libqt3c102-psql_3.3.4-3sarge1_sparc.deb stable/main/binary-sparc/libqt3c102-mt-mysql_3.3.4-3sarge1_sparc.deb stable/main/binary-sparc/libqt3c102-sqlite_3.3.4-3sarge1_sparc.deb stable/main/binary-sparc/qt3-apps-dev_3.3.4-3sarge1_sparc.deb stable/main/binary-sparc/libqt3-compat-headers_3.3.4-3sarge1_sparc.deb stable/main/binary-sparc/qt3-dev-tools_3.3.4-3sarge1_sparc.deb stable/main/binary-sparc/qt3-linguist_3.3.4-3sarge1_sparc.deb stable/main/binary-sparc/qt3-qtconfig_3.3.4-3sarge1_sparc.deb qt-x11-free (3:3.3.4-3sarge1) stable-security; urgency=high * Non-maintainer upload by the security team. * Fix an integer overflow in image handing routines. CVE-2006-4811 stable/main/binary-s390/libqt3-compat-headers_3.3.4-3sarge1_s390.deb stable/main/binary-s390/libqt3c102-mt_3.3.4-3sarge1_s390.deb stable/main/binary-s390/qt3-assistant_3.3.4-3sarge1_s390.deb stable/main/binary-s390/qt3-dev-tools-embedded_3.3.4-3sarge1_s390.deb stable/main/binary-s390/qt3-qtconfig_3.3.4-3sarge1_s390.deb stable/main/binary-s390/qt3-linguist_3.3.4-3sarge1_s390.deb stable/main/binary-s390/qt3-dev-tools-compat_3.3.4-3sarge1_s390.deb stable/main/binary-s390/libqt3c102-mt-sqlite_3.3.4-3sarge1_s390.deb stable/main/binary-s390/libqt3c102-psql_3.3.4-3sarge1_s390.deb stable/main/binary-s390/libqt3-mt-dev_3.3.4-3sarge1_s390.deb stable/main/binary-s390/qt3-apps-dev_3.3.4-3sarge1_s390.deb stable/main/binary-s390/libqt3c102-mt-odbc_3.3.4-3sarge1_s390.deb stable/main/binary-s390/libqt3c102_3.3.4-3sarge1_s390.deb stable/main/binary-s390/libqt3c102-mt-mysql_3.3.4-3sarge1_s390.deb stable/main/binary-s390/libqt3c102-mt-psql_3.3.4-3sarge1_s390.deb stable/main/binary-s390/libqt3c102-sqlite_3.3.4-3sarge1_s390.deb stable/main/binary-s390/libqt3-headers_3.3.4-3sarge1_s390.deb stable/main/binary-s390/libqt3-dev_3.3.4-3sarge1_s390.deb stable/main/binary-s390/qt3-dev-tools_3.3.4-3sarge1_s390.deb stable/main/binary-s390/qt3-designer_3.3.4-3sarge1_s390.deb stable/main/binary-s390/libqt3c102-odbc_3.3.4-3sarge1_s390.deb stable/main/binary-s390/libqt3c102-mysql_3.3.4-3sarge1_s390.deb qt-x11-free (3:3.3.4-3sarge1) stable-security; urgency=high * Non-maintainer upload by the security team. * Fix an integer overflow in image handing routines. CVE-2006-4811 stable/main/binary-powerpc/qt3-linguist_3.3.4-3sarge1_powerpc.deb stable/main/binary-powerpc/libqt3c102-sqlite_3.3.4-3sarge1_powerpc.deb stable/main/binary-powerpc/libqt3-dev_3.3.4-3sarge1_powerpc.deb stable/main/binary-powerpc/libqt3c102-mt-mysql_3.3.4-3sarge1_powerpc.deb stable/main/binary-powerpc/libqt3c102-mt-sqlite_3.3.4-3sarge1_powerpc.deb stable/main/binary-powerpc/libqt3c102-mt_3.3.4-3sarge1_powerpc.deb stable/main/binary-powerpc/libqt3c102-psql_3.3.4-3sarge1_powerpc.deb stable/main/binary-powerpc/libqt3-mt-dev_3.3.4-3sarge1_powerpc.deb stable/main/binary-powerpc/libqt3-compat-headers_3.3.4-3sarge1_powerpc.deb stable/main/binary-powerpc/libqt3c102_3.3.4-3sarge1_powerpc.deb stable/main/binary-powerpc/qt3-assistant_3.3.4-3sarge1_powerpc.deb stable/main/binary-powerpc/qt3-apps-dev_3.3.4-3sarge1_powerpc.deb stable/main/binary-powerpc/libqt3c102-odbc_3.3.4-3sarge1_powerpc.deb stable/main/binary-powerpc/qt3-dev-tools_3.3.4-3sarge1_powerpc.deb stable/main/binary-powerpc/libqt3c102-mt-psql_3.3.4-3sarge1_powerpc.deb stable/main/binary-powerpc/qt3-dev-tools-compat_3.3.4-3sarge1_powerpc.deb stable/main/binary-powerpc/libqt3-headers_3.3.4-3sarge1_powerpc.deb stable/main/binary-powerpc/libqt3c102-mysql_3.3.4-3sarge1_powerpc.deb stable/main/binary-powerpc/qt3-dev-tools-embedded_3.3.4-3sarge1_powerpc.deb stable/main/binary-powerpc/libqt3c102-mt-odbc_3.3.4-3sarge1_powerpc.deb stable/main/binary-powerpc/qt3-designer_3.3.4-3sarge1_powerpc.deb stable/main/binary-powerpc/qt3-qtconfig_3.3.4-3sarge1_powerpc.deb qt-x11-free (3:3.3.4-3sarge1) stable-security; urgency=high * Non-maintainer upload by the security team. * Fix an integer overflow in image handing routines. CVE-2006-4811 stable/main/binary-mipsel/libqt3c102-mt-sqlite_3.3.4-3sarge1_mipsel.deb stable/main/binary-mipsel/qt3-assistant_3.3.4-3sarge1_mipsel.deb stable/main/binary-mipsel/qt3-apps-dev_3.3.4-3sarge1_mipsel.deb stable/main/binary-mipsel/libqt3-headers_3.3.4-3sarge1_mipsel.deb stable/main/binary-mipsel/qt3-dev-tools_3.3.4-3sarge1_mipsel.deb stable/main/binary-mipsel/libqt3c102-sqlite_3.3.4-3sarge1_mipsel.deb stable/main/binary-mipsel/qt3-qtconfig_3.3.4-3sarge1_mipsel.deb stable/main/binary-mipsel/libqt3-mt-dev_3.3.4-3sarge1_mipsel.deb stable/main/binary-mipsel/libqt3-compat-headers_3.3.4-3sarge1_mipsel.deb stable/main/binary-mipsel/libqt3c102_3.3.4-3sarge1_mipsel.deb stable/main/binary-mipsel/libqt3c102-odbc_3.3.4-3sarge1_mipsel.deb stable/main/binary-mipsel/qt3-designer_3.3.4-3sarge1_mipsel.deb stable/main/binary-mipsel/qt3-dev-tools-embedded_3.3.4-3sarge1_mipsel.deb stable/main/binary-mipsel/qt3-dev-tools-compat_3.3.4-3sarge1_mipsel.deb stable/main/binary-mipsel/libqt3-dev_3.3.4-3sarge1_mipsel.deb stable/main/binary-mipsel/libqt3c102-mt_3.3.4-3sarge1_mipsel.deb stable/main/binary-mipsel/libqt3c102-mt-psql_3.3.4-3sarge1_mipsel.deb stable/main/binary-mipsel/libqt3c102-mt-mysql_3.3.4-3sarge1_mipsel.deb stable/main/binary-mipsel/libqt3c102-mysql_3.3.4-3sarge1_mipsel.deb stable/main/binary-mipsel/libqt3c102-psql_3.3.4-3sarge1_mipsel.deb stable/main/binary-mipsel/qt3-linguist_3.3.4-3sarge1_mipsel.deb stable/main/binary-mipsel/libqt3c102-mt-odbc_3.3.4-3sarge1_mipsel.deb qt-x11-free (3:3.3.4-3sarge1) stable-security; urgency=high * Non-maintainer upload by the security team. * Fix an integer overflow in image handing routines. CVE-2006-4811 stable/main/binary-mips/libqt3-compat-headers_3.3.4-3sarge1_mips.deb stable/main/binary-mips/libqt3c102-odbc_3.3.4-3sarge1_mips.deb stable/main/binary-mips/libqt3c102-sqlite_3.3.4-3sarge1_mips.deb stable/main/binary-mips/qt3-qtconfig_3.3.4-3sarge1_mips.deb stable/main/binary-mips/libqt3c102-mt-sqlite_3.3.4-3sarge1_mips.deb stable/main/binary-mips/libqt3-mt-dev_3.3.4-3sarge1_mips.deb stable/main/binary-mips/libqt3c102_3.3.4-3sarge1_mips.deb stable/main/binary-mips/qt3-linguist_3.3.4-3sarge1_mips.deb stable/main/binary-mips/libqt3c102-psql_3.3.4-3sarge1_mips.deb stable/main/binary-mips/libqt3c102-mt-odbc_3.3.4-3sarge1_mips.deb stable/main/binary-mips/qt3-apps-dev_3.3.4-3sarge1_mips.deb stable/main/binary-mips/qt3-assistant_3.3.4-3sarge1_mips.deb stable/main/binary-mips/qt3-dev-tools_3.3.4-3sarge1_mips.deb stable/main/binary-mips/libqt3-headers_3.3.4-3sarge1_mips.deb stable/main/binary-mips/libqt3-dev_3.3.4-3sarge1_mips.deb stable/main/binary-mips/qt3-dev-tools-compat_3.3.4-3sarge1_mips.deb stable/main/binary-mips/qt3-designer_3.3.4-3sarge1_mips.deb stable/main/binary-mips/qt3-dev-tools-embedded_3.3.4-3sarge1_mips.deb stable/main/binary-mips/libqt3c102-mt_3.3.4-3sarge1_mips.deb stable/main/binary-mips/libqt3c102-mt-mysql_3.3.4-3sarge1_mips.deb stable/main/binary-mips/libqt3c102-mysql_3.3.4-3sarge1_mips.deb stable/main/binary-mips/libqt3c102-mt-psql_3.3.4-3sarge1_mips.deb qt-x11-free (3:3.3.4-3sarge1) stable-security; urgency=high * Non-maintainer upload by the security team. * Fix an integer overflow in image handing routines. CVE-2006-4811 stable/main/binary-m68k/libqt3c102-mt-odbc_3.3.4-3sarge1_m68k.deb stable/main/binary-m68k/libqt3c102-mt-mysql_3.3.4-3sarge1_m68k.deb stable/main/binary-m68k/libqt3c102-mysql_3.3.4-3sarge1_m68k.deb stable/main/binary-m68k/libqt3-mt-dev_3.3.4-3sarge1_m68k.deb stable/main/binary-m68k/libqt3c102-mt-psql_3.3.4-3sarge1_m68k.deb stable/main/binary-m68k/libqt3c102-psql_3.3.4-3sarge1_m68k.deb stable/main/binary-m68k/qt3-designer_3.3.4-3sarge1_m68k.deb stable/main/binary-m68k/qt3-apps-dev_3.3.4-3sarge1_m68k.deb stable/main/binary-m68k/libqt3c102-odbc_3.3.4-3sarge1_m68k.deb stable/main/binary-m68k/libqt3-compat-headers_3.3.4-3sarge1_m68k.deb stable/main/binary-m68k/qt3-assistant_3.3.4-3sarge1_m68k.deb stable/main/binary-m68k/libqt3c102-mt_3.3.4-3sarge1_m68k.deb stable/main/binary-m68k/qt3-dev-tools_3.3.4-3sarge1_m68k.deb stable/main/binary-m68k/libqt3-headers_3.3.4-3sarge1_m68k.deb stable/main/binary-m68k/qt3-dev-tools-compat_3.3.4-3sarge1_m68k.deb stable/main/binary-m68k/libqt3c102-sqlite_3.3.4-3sarge1_m68k.deb stable/main/binary-m68k/libqt3c102_3.3.4-3sarge1_m68k.deb stable/main/binary-m68k/qt3-dev-tools-embedded_3.3.4-3sarge1_m68k.deb stable/main/binary-m68k/qt3-linguist_3.3.4-3sarge1_m68k.deb stable/main/binary-m68k/qt3-qtconfig_3.3.4-3sarge1_m68k.deb stable/main/binary-m68k/libqt3-dev_3.3.4-3sarge1_m68k.deb stable/main/binary-m68k/libqt3c102-mt-sqlite_3.3.4-3sarge1_m68k.deb qt-x11-free (3:3.3.4-3sarge1) stable-security; urgency=high * Non-maintainer upload by the security team. * Fix an integer overflow in image handing routines. CVE-2006-4811 stable/main/binary-ia64/libqt3c102-psql_3.3.4-3sarge1_ia64.deb stable/main/binary-ia64/libqt3-compat-headers_3.3.4-3sarge1_ia64.deb stable/main/binary-ia64/qt3-dev-tools-compat_3.3.4-3sarge1_ia64.deb stable/main/binary-ia64/libqt3-mt-dev_3.3.4-3sarge1_ia64.deb stable/main/binary-ia64/qt3-dev-tools-embedded_3.3.4-3sarge1_ia64.deb stable/main/binary-ia64/libqt3c102-mt_3.3.4-3sarge1_ia64.deb stable/main/binary-ia64/qt3-qtconfig_3.3.4-3sarge1_ia64.deb stable/main/binary-ia64/libqt3c102_3.3.4-3sarge1_ia64.deb stable/main/binary-ia64/libqt3c102-mt-odbc_3.3.4-3sarge1_ia64.deb stable/main/binary-ia64/qt3-dev-tools_3.3.4-3sarge1_ia64.deb stable/main/binary-ia64/libqt3c102-mt-sqlite_3.3.4-3sarge1_ia64.deb stable/main/binary-ia64/libqt3-headers_3.3.4-3sarge1_ia64.deb stable/main/binary-ia64/libqt3c102-sqlite_3.3.4-3sarge1_ia64.deb stable/main/binary-ia64/libqt3c102-mt-mysql_3.3.4-3sarge1_ia64.deb stable/main/binary-ia64/qt3-designer_3.3.4-3sarge1_ia64.deb stable/main/binary-ia64/libqt3c102-mt-psql_3.3.4-3sarge1_ia64.deb stable/main/binary-ia64/qt3-linguist_3.3.4-3sarge1_ia64.deb stable/main/binary-ia64/qt3-apps-dev_3.3.4-3sarge1_ia64.deb stable/main/binary-ia64/libqt3c102-odbc_3.3.4-3sarge1_ia64.deb stable/main/binary-ia64/libqt3-dev_3.3.4-3sarge1_ia64.deb stable/main/binary-ia64/libqt3c102-mysql_3.3.4-3sarge1_ia64.deb stable/main/binary-ia64/qt3-assistant_3.3.4-3sarge1_ia64.deb qt-x11-free (3:3.3.4-3sarge1) stable-security; urgency=high * Non-maintainer upload by the security team. * Fix an integer overflow in image handing routines. CVE-2006-4811 stable/main/binary-hppa/qt3-apps-dev_3.3.4-3sarge1_hppa.deb stable/main/binary-hppa/libqt3-headers_3.3.4-3sarge1_hppa.deb stable/main/binary-hppa/qt3-designer_3.3.4-3sarge1_hppa.deb stable/main/binary-hppa/libqt3c102-mysql_3.3.4-3sarge1_hppa.deb stable/main/binary-hppa/qt3-dev-tools-compat_3.3.4-3sarge1_hppa.deb stable/main/binary-hppa/qt3-dev-tools-embedded_3.3.4-3sarge1_hppa.deb stable/main/binary-hppa/libqt3c102-mt-psql_3.3.4-3sarge1_hppa.deb stable/main/binary-hppa/libqt3c102-odbc_3.3.4-3sarge1_hppa.deb stable/main/binary-hppa/libqt3c102-mt_3.3.4-3sarge1_hppa.deb stable/main/binary-hppa/qt3-dev-tools_3.3.4-3sarge1_hppa.deb stable/main/binary-hppa/libqt3c102-mt-odbc_3.3.4-3sarge1_hppa.deb stable/main/binary-hppa/libqt3c102-mt-mysql_3.3.4-3sarge1_hppa.deb stable/main/binary-hppa/qt3-linguist_3.3.4-3sarge1_hppa.deb stable/main/binary-hppa/libqt3-compat-headers_3.3.4-3sarge1_hppa.deb stable/main/binary-hppa/libqt3c102_3.3.4-3sarge1_hppa.deb stable/main/binary-hppa/qt3-assistant_3.3.4-3sarge1_hppa.deb stable/main/binary-hppa/libqt3c102-psql_3.3.4-3sarge1_hppa.deb stable/main/binary-hppa/libqt3-mt-dev_3.3.4-3sarge1_hppa.deb stable/main/binary-hppa/libqt3c102-sqlite_3.3.4-3sarge1_hppa.deb stable/main/binary-hppa/libqt3-dev_3.3.4-3sarge1_hppa.deb stable/main/binary-hppa/libqt3c102-mt-sqlite_3.3.4-3sarge1_hppa.deb stable/main/binary-hppa/qt3-qtconfig_3.3.4-3sarge1_hppa.deb qt-x11-free (3:3.3.4-3sarge1) stable-security; urgency=high * Non-maintainer upload by the security team. * Fix an integer overflow in image handing routines. CVE-2006-4811 stable/main/binary-arm/libqt3c102-mt-mysql_3.3.4-3sarge1_arm.deb stable/main/binary-arm/libqt3c102-mt-sqlite_3.3.4-3sarge1_arm.deb stable/main/binary-arm/libqt3c102-sqlite_3.3.4-3sarge1_arm.deb stable/main/binary-arm/libqt3c102-mysql_3.3.4-3sarge1_arm.deb stable/main/binary-arm/qt3-dev-tools-embedded_3.3.4-3sarge1_arm.deb stable/main/binary-arm/qt3-assistant_3.3.4-3sarge1_arm.deb stable/main/binary-arm/qt3-apps-dev_3.3.4-3sarge1_arm.deb stable/main/binary-arm/qt3-dev-tools-compat_3.3.4-3sarge1_arm.deb stable/main/binary-arm/libqt3c102-mt-psql_3.3.4-3sarge1_arm.deb stable/main/binary-arm/libqt3c102_3.3.4-3sarge1_arm.deb stable/main/binary-arm/qt3-qtconfig_3.3.4-3sarge1_arm.deb stable/main/binary-arm/libqt3c102-odbc_3.3.4-3sarge1_arm.deb stable/main/binary-arm/libqt3-headers_3.3.4-3sarge1_arm.deb stable/main/binary-arm/libqt3-mt-dev_3.3.4-3sarge1_arm.deb stable/main/binary-arm/libqt3-dev_3.3.4-3sarge1_arm.deb stable/main/binary-arm/libqt3c102-mt-odbc_3.3.4-3sarge1_arm.deb stable/main/binary-arm/qt3-designer_3.3.4-3sarge1_arm.deb stable/main/binary-arm/libqt3c102-mt_3.3.4-3sarge1_arm.deb stable/main/binary-arm/libqt3-compat-headers_3.3.4-3sarge1_arm.deb stable/main/binary-arm/qt3-linguist_3.3.4-3sarge1_arm.deb stable/main/binary-arm/libqt3c102-psql_3.3.4-3sarge1_arm.deb stable/main/binary-arm/qt3-dev-tools_3.3.4-3sarge1_arm.deb qt-x11-free (3:3.3.4-3sarge1) stable-security; urgency=high * Non-maintainer upload by the security team. * Fix an integer overflow in image handing routines. CVE-2006-4811 stable/main/binary-alpha/qt3-qtconfig_3.3.4-3sarge1_alpha.deb stable/main/binary-alpha/qt3-linguist_3.3.4-3sarge1_alpha.deb stable/main/binary-alpha/libqt3c102-sqlite_3.3.4-3sarge1_alpha.deb stable/main/binary-alpha/qt3-assistant_3.3.4-3sarge1_alpha.deb stable/main/binary-alpha/qt3-apps-dev_3.3.4-3sarge1_alpha.deb stable/main/binary-alpha/libqt3c102-mysql_3.3.4-3sarge1_alpha.deb stable/main/binary-alpha/libqt3-dev_3.3.4-3sarge1_alpha.deb stable/main/binary-alpha/libqt3c102-mt-sqlite_3.3.4-3sarge1_alpha.deb stable/main/binary-alpha/libqt3c102-mt-odbc_3.3.4-3sarge1_alpha.deb stable/main/binary-alpha/libqt3c102-odbc_3.3.4-3sarge1_alpha.deb stable/main/binary-alpha/libqt3c102-mt_3.3.4-3sarge1_alpha.deb stable/main/binary-alpha/libqt3c102-mt-psql_3.3.4-3sarge1_alpha.deb stable/main/binary-alpha/libqt3c102-mt-mysql_3.3.4-3sarge1_alpha.deb stable/main/binary-alpha/qt3-dev-tools-compat_3.3.4-3sarge1_alpha.deb stable/main/binary-alpha/libqt3-headers_3.3.4-3sarge1_alpha.deb stable/main/binary-alpha/qt3-dev-tools-embedded_3.3.4-3sarge1_alpha.deb stable/main/binary-alpha/qt3-designer_3.3.4-3sarge1_alpha.deb stable/main/binary-alpha/libqt3-compat-headers_3.3.4-3sarge1_alpha.deb stable/main/binary-alpha/libqt3c102-psql_3.3.4-3sarge1_alpha.deb stable/main/binary-alpha/libqt3-mt-dev_3.3.4-3sarge1_alpha.deb stable/main/binary-alpha/qt3-dev-tools_3.3.4-3sarge1_alpha.deb stable/main/binary-alpha/libqt3c102_3.3.4-3sarge1_alpha.deb qt-x11-free (3:3.3.4-3sarge1) stable-security; urgency=high * Non-maintainer upload by the security team. * Fix an integer overflow in image handing routines. CVE-2006-4811 stable/main/binary-all/libqt3-i18n_3.3.4-3sarge1_all.deb stable/main/binary-i386/libqt3c102-mt-sqlite_3.3.4-3sarge1_i386.deb stable/main/binary-i386/libqt3c102-sqlite_3.3.4-3sarge1_i386.deb stable/main/binary-i386/qt3-dev-tools_3.3.4-3sarge1_i386.deb stable/main/binary-all/qt3-examples_3.3.4-3sarge1_all.deb stable/main/binary-i386/libqt3-dev_3.3.4-3sarge1_i386.deb stable/main/binary-i386/qt3-qtconfig_3.3.4-3sarge1_i386.deb stable/main/binary-i386/libqt3c102-psql_3.3.4-3sarge1_i386.deb stable/main/binary-i386/qt3-designer_3.3.4-3sarge1_i386.deb stable/main/binary-i386/libqt3-headers_3.3.4-3sarge1_i386.deb stable/main/binary-i386/libqt3c102-mysql_3.3.4-3sarge1_i386.deb stable/main/binary-i386/qt3-linguist_3.3.4-3sarge1_i386.deb stable/main/binary-i386/libqt3c102-mt-odbc_3.3.4-3sarge1_i386.deb stable/main/binary-i386/libqt3c102_3.3.4-3sarge1_i386.deb stable/main/source/qt-x11-free_3.3.4-3sarge1.dsc stable/main/binary-all/qt3-doc_3.3.4-3sarge1_all.deb stable/main/binary-i386/libqt3-mt-dev_3.3.4-3sarge1_i386.deb stable/main/source/qt-x11-free_3.3.4-3sarge1.diff.gz stable/main/binary-i386/libqt3c102-ibase_3.3.4-3sarge1_i386.deb stable/main/binary-i386/libqt3c102-mt-ibase_3.3.4-3sarge1_i386.deb stable/main/binary-i386/qt3-dev-tools-embedded_3.3.4-3sarge1_i386.deb stable/main/binary-i386/qt3-dev-tools-compat_3.3.4-3sarge1_i386.deb stable/main/binary-i386/libqt3c102-odbc_3.3.4-3sarge1_i386.deb stable/main/binary-i386/libqt3c102-mt-psql_3.3.4-3sarge1_i386.deb stable/main/binary-i386/libqt3c102-mt-mysql_3.3.4-3sarge1_i386.deb stable/main/binary-i386/libqt3c102-mt_3.3.4-3sarge1_i386.deb stable/main/binary-i386/qt3-assistant_3.3.4-3sarge1_i386.deb stable/main/binary-i386/qt3-apps-dev_3.3.4-3sarge1_i386.deb stable/main/binary-i386/libqt3-compat-headers_3.3.4-3sarge1_i386.deb qt-x11-free (3:3.3.4-3sarge1) stable-security; urgency=high * Non-maintainer upload by the security team. * Fix an integer overflow in image handing routines. CVE-2006-4811 stable/main/binary-sparc/python2.4-tk_2.4.1-2sarge1_sparc.deb stable/main/binary-sparc/python2.4_2.4.1-2sarge1_sparc.deb stable/main/binary-sparc/python2.4-gdbm_2.4.1-2sarge1_sparc.deb stable/main/binary-sparc/python2.4-dbg_2.4.1-2sarge1_sparc.deb stable/main/binary-sparc/python2.4-dev_2.4.1-2sarge1_sparc.deb python2.4 (2.4.1-2sarge1) stable-security; urgency=high * SECURITY UPDATE: crafted wide unicode strings can overflow heap leading to arbitrary code execution. * Add 'debian/patches/sf1541585.dpatch' to fix overflow. * References CVE-2006-4980 http://svn.python.org/view?view=rev&rev=51466 stable/main/binary-s390/python2.4-dbg_2.4.1-2sarge1_s390.deb stable/main/binary-s390/python2.4_2.4.1-2sarge1_s390.deb stable/main/binary-s390/python2.4-dev_2.4.1-2sarge1_s390.deb stable/main/binary-s390/python2.4-tk_2.4.1-2sarge1_s390.deb stable/main/binary-s390/python2.4-gdbm_2.4.1-2sarge1_s390.deb python2.4 (2.4.1-2sarge1) stable-security; urgency=high * SECURITY UPDATE: crafted wide unicode strings can overflow heap leading to arbitrary code execution. * Add 'debian/patches/sf1541585.dpatch' to fix overflow. * References CVE-2006-4980 http://svn.python.org/view?view=rev&rev=51466 stable/main/binary-powerpc/python2.4-tk_2.4.1-2sarge1_powerpc.deb stable/main/binary-powerpc/python2.4_2.4.1-2sarge1_powerpc.deb stable/main/binary-powerpc/python2.4-dbg_2.4.1-2sarge1_powerpc.deb stable/main/binary-powerpc/python2.4-dev_2.4.1-2sarge1_powerpc.deb stable/main/binary-powerpc/python2.4-gdbm_2.4.1-2sarge1_powerpc.deb python2.4 (2.4.1-2sarge1) stable-security; urgency=high * SECURITY UPDATE: crafted wide unicode strings can overflow heap leading to arbitrary code execution. * Add 'debian/patches/sf1541585.dpatch' to fix overflow. * References CVE-2006-4980 http://svn.python.org/view?view=rev&rev=51466 stable/main/binary-mipsel/python2.4-dev_2.4.1-2sarge1_mipsel.deb stable/main/binary-mipsel/python2.4-dbg_2.4.1-2sarge1_mipsel.deb stable/main/binary-mipsel/python2.4-gdbm_2.4.1-2sarge1_mipsel.deb stable/main/binary-mipsel/python2.4_2.4.1-2sarge1_mipsel.deb stable/main/binary-mipsel/python2.4-tk_2.4.1-2sarge1_mipsel.deb python2.4 (2.4.1-2sarge1) stable-security; urgency=high * SECURITY UPDATE: crafted wide unicode strings can overflow heap leading to arbitrary code execution. * Add 'debian/patches/sf1541585.dpatch' to fix overflow. * References CVE-2006-4980 http://svn.python.org/view?view=rev&rev=51466 stable/main/binary-mips/python2.4-dbg_2.4.1-2sarge1_mips.deb stable/main/binary-mips/python2.4-tk_2.4.1-2sarge1_mips.deb stable/main/binary-mips/python2.4_2.4.1-2sarge1_mips.deb stable/main/binary-mips/python2.4-dev_2.4.1-2sarge1_mips.deb stable/main/binary-mips/python2.4-gdbm_2.4.1-2sarge1_mips.deb python2.4 (2.4.1-2sarge1) stable-security; urgency=high * SECURITY UPDATE: crafted wide unicode strings can overflow heap leading to arbitrary code execution. * Add 'debian/patches/sf1541585.dpatch' to fix overflow. * References CVE-2006-4980 http://svn.python.org/view?view=rev&rev=51466 stable/main/binary-m68k/python2.4_2.4.1-2sarge1_m68k.deb stable/main/binary-m68k/python2.4-tk_2.4.1-2sarge1_m68k.deb stable/main/binary-m68k/python2.4-dev_2.4.1-2sarge1_m68k.deb stable/main/binary-m68k/python2.4-gdbm_2.4.1-2sarge1_m68k.deb stable/main/binary-m68k/python2.4-dbg_2.4.1-2sarge1_m68k.deb python2.4 (2.4.1-2sarge1) stable-security; urgency=high * SECURITY UPDATE: crafted wide unicode strings can overflow heap leading to arbitrary code execution. * Add 'debian/patches/sf1541585.dpatch' to fix overflow. * References CVE-2006-4980 http://svn.python.org/view?view=rev&rev=51466 stable/main/binary-ia64/python2.4-dbg_2.4.1-2sarge1_ia64.deb stable/main/binary-ia64/python2.4-dev_2.4.1-2sarge1_ia64.deb stable/main/binary-ia64/python2.4-gdbm_2.4.1-2sarge1_ia64.deb stable/main/binary-ia64/python2.4_2.4.1-2sarge1_ia64.deb stable/main/binary-ia64/python2.4-tk_2.4.1-2sarge1_ia64.deb python2.4 (2.4.1-2sarge1) stable-security; urgency=high * SECURITY UPDATE: crafted wide unicode strings can overflow heap leading to arbitrary code execution. * Add 'debian/patches/sf1541585.dpatch' to fix overflow. * References CVE-2006-4980 http://svn.python.org/view?view=rev&rev=51466 stable/main/binary-hppa/python2.4-dbg_2.4.1-2sarge1_hppa.deb stable/main/binary-hppa/python2.4_2.4.1-2sarge1_hppa.deb stable/main/binary-hppa/python2.4-gdbm_2.4.1-2sarge1_hppa.deb stable/main/binary-hppa/python2.4-tk_2.4.1-2sarge1_hppa.deb stable/main/binary-hppa/python2.4-dev_2.4.1-2sarge1_hppa.deb python2.4 (2.4.1-2sarge1) stable-security; urgency=high * SECURITY UPDATE: crafted wide unicode strings can overflow heap leading to arbitrary code execution. * Add 'debian/patches/sf1541585.dpatch' to fix overflow. * References CVE-2006-4980 http://svn.python.org/view?view=rev&rev=51466 stable/main/binary-arm/python2.4-gdbm_2.4.1-2sarge1_arm.deb stable/main/binary-arm/python2.4-dev_2.4.1-2sarge1_arm.deb stable/main/binary-arm/python2.4-dbg_2.4.1-2sarge1_arm.deb stable/main/binary-arm/python2.4_2.4.1-2sarge1_arm.deb stable/main/binary-arm/python2.4-tk_2.4.1-2sarge1_arm.deb python2.4 (2.4.1-2sarge1) stable-security; urgency=high * SECURITY UPDATE: crafted wide unicode strings can overflow heap leading to arbitrary code execution. * Add 'debian/patches/sf1541585.dpatch' to fix overflow. * References CVE-2006-4980 http://svn.python.org/view?view=rev&rev=51466 stable/main/binary-alpha/python2.4_2.4.1-2sarge1_alpha.deb stable/main/binary-alpha/python2.4-tk_2.4.1-2sarge1_alpha.deb stable/main/binary-alpha/python2.4-dbg_2.4.1-2sarge1_alpha.deb stable/main/binary-alpha/python2.4-gdbm_2.4.1-2sarge1_alpha.deb stable/main/binary-alpha/python2.4-dev_2.4.1-2sarge1_alpha.deb python2.4 (2.4.1-2sarge1) stable-security; urgency=high * SECURITY UPDATE: crafted wide unicode strings can overflow heap leading to arbitrary code execution. * Add 'debian/patches/sf1541585.dpatch' to fix overflow. * References CVE-2006-4980 http://svn.python.org/view?view=rev&rev=51466 stable/main/binary-i386/python2.4-tk_2.4.1-2sarge1_i386.deb stable/main/binary-i386/python2.4_2.4.1-2sarge1_i386.deb stable/main/binary-all/python2.4-doc_2.4.1-2sarge1_all.deb stable/main/binary-i386/python2.4-dbg_2.4.1-2sarge1_i386.deb stable/main/binary-all/python2.4-examples_2.4.1-2sarge1_all.deb stable/main/binary-i386/python2.4-gdbm_2.4.1-2sarge1_i386.deb stable/main/source/python2.4_2.4.1-2sarge1.dsc stable/main/binary-all/idle-python2.4_2.4.1-2sarge1_all.deb stable/main/source/python2.4_2.4.1-2sarge1.diff.gz stable/main/binary-i386/python2.4-dev_2.4.1-2sarge1_i386.deb python2.4 (2.4.1-2sarge1) stable-security; urgency=high * SECURITY UPDATE: crafted wide unicode strings can overflow heap leading to arbitrary code execution. * Add 'debian/patches/sf1541585.dpatch' to fix overflow. * References CVE-2006-4980 http://svn.python.org/view?view=rev&rev=51466 stable/main/binary-sparc/python2.3-tk_2.3.5-3sarge2_sparc.deb stable/main/binary-sparc/python2.3-dev_2.3.5-3sarge2_sparc.deb stable/main/binary-sparc/python2.3-mpz_2.3.5-3sarge2_sparc.deb stable/main/binary-sparc/python2.3_2.3.5-3sarge2_sparc.deb stable/main/binary-sparc/python2.3-gdbm_2.3.5-3sarge2_sparc.deb python2.3 (2.3.5-3sarge2) stable-security; urgency=high * SECURITY UPDATE: crafted wide unicode strings can overflow heap leading to arbitrary code execution. * Add 'debian/patches/unicode-repr.dpatch' to fix overflow. * References CVE-2006-4980 http://svn.python.org/view?view=rev&rev=51466 stable/main/binary-s390/python2.3-gdbm_2.3.5-3sarge2_s390.deb stable/main/binary-s390/python2.3-dev_2.3.5-3sarge2_s390.deb stable/main/binary-s390/python2.3_2.3.5-3sarge2_s390.deb stable/main/binary-s390/python2.3-tk_2.3.5-3sarge2_s390.deb stable/main/binary-s390/python2.3-mpz_2.3.5-3sarge2_s390.deb python2.3 (2.3.5-3sarge2) stable-security; urgency=high * SECURITY UPDATE: crafted wide unicode strings can overflow heap leading to arbitrary code execution. * Add 'debian/patches/unicode-repr.dpatch' to fix overflow. * References CVE-2006-4980 http://svn.python.org/view?view=rev&rev=51466 stable/main/binary-powerpc/python2.3-tk_2.3.5-3sarge2_powerpc.deb stable/main/binary-powerpc/python2.3-gdbm_2.3.5-3sarge2_powerpc.deb stable/main/binary-powerpc/python2.3-dev_2.3.5-3sarge2_powerpc.deb stable/main/binary-powerpc/python2.3_2.3.5-3sarge2_powerpc.deb stable/main/binary-powerpc/python2.3-mpz_2.3.5-3sarge2_powerpc.deb python2.3 (2.3.5-3sarge2) stable-security; urgency=high * SECURITY UPDATE: crafted wide unicode strings can overflow heap leading to arbitrary code execution. * Add 'debian/patches/unicode-repr.dpatch' to fix overflow. * References CVE-2006-4980 http://svn.python.org/view?view=rev&rev=51466 stable/main/binary-mipsel/python2.3_2.3.5-3sarge2_mipsel.deb stable/main/binary-mipsel/python2.3-mpz_2.3.5-3sarge2_mipsel.deb stable/main/binary-mipsel/python2.3-gdbm_2.3.5-3sarge2_mipsel.deb stable/main/binary-mipsel/python2.3-dev_2.3.5-3sarge2_mipsel.deb stable/main/binary-mipsel/python2.3-tk_2.3.5-3sarge2_mipsel.deb python2.3 (2.3.5-3sarge2) stable-security; urgency=high * SECURITY UPDATE: crafted wide unicode strings can overflow heap leading to arbitrary code execution. * Add 'debian/patches/unicode-repr.dpatch' to fix overflow. * References CVE-2006-4980 http://svn.python.org/view?view=rev&rev=51466 stable/main/binary-mips/python2.3_2.3.5-3sarge2_mips.deb stable/main/binary-mips/python2.3-tk_2.3.5-3sarge2_mips.deb stable/main/binary-mips/python2.3-gdbm_2.3.5-3sarge2_mips.deb stable/main/binary-mips/python2.3-dev_2.3.5-3sarge2_mips.deb stable/main/binary-mips/python2.3-mpz_2.3.5-3sarge2_mips.deb python2.3 (2.3.5-3sarge2) stable-security; urgency=high * SECURITY UPDATE: crafted wide unicode strings can overflow heap leading to arbitrary code execution. * Add 'debian/patches/unicode-repr.dpatch' to fix overflow. * References CVE-2006-4980 http://svn.python.org/view?view=rev&rev=51466 stable/main/binary-m68k/python2.3-gdbm_2.3.5-3sarge2_m68k.deb stable/main/binary-m68k/python2.3-tk_2.3.5-3sarge2_m68k.deb stable/main/binary-m68k/python2.3_2.3.5-3sarge2_m68k.deb stable/main/binary-m68k/python2.3-mpz_2.3.5-3sarge2_m68k.deb stable/main/binary-m68k/python2.3-dev_2.3.5-3sarge2_m68k.deb python2.3 (2.3.5-3sarge2) stable-security; urgency=high * SECURITY UPDATE: crafted wide unicode strings can overflow heap leading to arbitrary code execution. * Add 'debian/patches/unicode-repr.dpatch' to fix overflow. * References CVE-2006-4980 http://svn.python.org/view?view=rev&rev=51466 stable/main/binary-ia64/python2.3-mpz_2.3.5-3sarge2_ia64.deb stable/main/binary-ia64/python2.3-gdbm_2.3.5-3sarge2_ia64.deb stable/main/binary-ia64/python2.3_2.3.5-3sarge2_ia64.deb stable/main/binary-ia64/python2.3-dev_2.3.5-3sarge2_ia64.deb stable/main/binary-ia64/python2.3-tk_2.3.5-3sarge2_ia64.deb python2.3 (2.3.5-3sarge2) stable-security; urgency=high * SECURITY UPDATE: crafted wide unicode strings can overflow heap leading to arbitrary code execution. * Add 'debian/patches/unicode-repr.dpatch' to fix overflow. * References CVE-2006-4980 http://svn.python.org/view?view=rev&rev=51466 stable/main/binary-hppa/python2.3-mpz_2.3.5-3sarge2_hppa.deb stable/main/binary-hppa/python2.3-dev_2.3.5-3sarge2_hppa.deb stable/main/binary-hppa/python2.3_2.3.5-3sarge2_hppa.deb stable/main/binary-hppa/python2.3-tk_2.3.5-3sarge2_hppa.deb stable/main/binary-hppa/python2.3-gdbm_2.3.5-3sarge2_hppa.deb python2.3 (2.3.5-3sarge2) stable-security; urgency=high * SECURITY UPDATE: crafted wide unicode strings can overflow heap leading to arbitrary code execution. * Add 'debian/patches/unicode-repr.dpatch' to fix overflow. * References CVE-2006-4980 http://svn.python.org/view?view=rev&rev=51466 stable/main/binary-arm/python2.3-gdbm_2.3.5-3sarge2_arm.deb stable/main/binary-arm/python2.3-mpz_2.3.5-3sarge2_arm.deb stable/main/binary-arm/python2.3-dev_2.3.5-3sarge2_arm.deb stable/main/binary-arm/python2.3-tk_2.3.5-3sarge2_arm.deb stable/main/binary-arm/python2.3_2.3.5-3sarge2_arm.deb python2.3 (2.3.5-3sarge2) stable-security; urgency=high * SECURITY UPDATE: crafted wide unicode strings can overflow heap leading to arbitrary code execution. * Add 'debian/patches/unicode-repr.dpatch' to fix overflow. * References CVE-2006-4980 http://svn.python.org/view?view=rev&rev=51466 stable/main/binary-alpha/python2.3-gdbm_2.3.5-3sarge2_alpha.deb stable/main/binary-alpha/python2.3-tk_2.3.5-3sarge2_alpha.deb stable/main/binary-alpha/python2.3-mpz_2.3.5-3sarge2_alpha.deb stable/main/binary-alpha/python2.3-dev_2.3.5-3sarge2_alpha.deb stable/main/binary-alpha/python2.3_2.3.5-3sarge2_alpha.deb python2.3 (2.3.5-3sarge2) stable-security; urgency=high * SECURITY UPDATE: crafted wide unicode strings can overflow heap leading to arbitrary code execution. * Add 'debian/patches/unicode-repr.dpatch' to fix overflow. * References CVE-2006-4980 http://svn.python.org/view?view=rev&rev=51466 stable/main/binary-all/python2.3-doc_2.3.5-3sarge2_all.deb stable/main/binary-all/idle-python2.3_2.3.5-3sarge2_all.deb stable/main/source/python2.3_2.3.5-3sarge2.diff.gz stable/main/binary-i386/python2.3_2.3.5-3sarge2_i386.deb stable/main/binary-i386/python2.3-dev_2.3.5-3sarge2_i386.deb stable/main/source/python2.3_2.3.5-3sarge2.dsc stable/main/binary-i386/python2.3-gdbm_2.3.5-3sarge2_i386.deb stable/main/binary-i386/python2.3-tk_2.3.5-3sarge2_i386.deb stable/main/binary-i386/python2.3-mpz_2.3.5-3sarge2_i386.deb stable/main/binary-all/python2.3-examples_2.3.5-3sarge2_all.deb python2.3 (2.3.5-3sarge2) stable-security; urgency=high * SECURITY UPDATE: crafted wide unicode strings can overflow heap leading to arbitrary code execution. * Add 'debian/patches/unicode-repr.dpatch' to fix overflow. * References CVE-2006-4980 http://svn.python.org/view?view=rev&rev=51466 stable/main/binary-sparc/pstotext_1.9-1sarge2_sparc.deb pstotext (1.9-1sarge2) stable-security; urgency=high * Non-maintainer upload by the Security Team * Fix arbitrary shell commmand execution due to insufficient sanitising of filenames. Patch by J.H.M. Dassen. stable/main/binary-s390/pstotext_1.9-1sarge2_s390.deb pstotext (1.9-1sarge2) stable-security; urgency=high * Non-maintainer upload by the Security Team * Fix arbitrary shell commmand execution due to insufficient sanitising of filenames. Patch by J.H.M. Dassen. stable/main/binary-powerpc/pstotext_1.9-1sarge2_powerpc.deb pstotext (1.9-1sarge2) stable-security; urgency=high * Non-maintainer upload by the Security Team * Fix arbitrary shell commmand execution due to insufficient sanitising of filenames. Patch by J.H.M. Dassen. stable/main/binary-mipsel/pstotext_1.9-1sarge2_mipsel.deb pstotext (1.9-1sarge2) stable-security; urgency=high * Non-maintainer upload by the Security Team * Fix arbitrary shell commmand execution due to insufficient sanitising of filenames. Patch by J.H.M. Dassen. stable/main/binary-mips/pstotext_1.9-1sarge2_mips.deb pstotext (1.9-1sarge2) stable-security; urgency=high * Non-maintainer upload by the Security Team * Fix arbitrary shell commmand execution due to insufficient sanitising of filenames. Patch by J.H.M. Dassen. stable/main/binary-m68k/pstotext_1.9-1sarge2_m68k.deb pstotext (1.9-1sarge2) stable-security; urgency=high * Non-maintainer upload by the Security Team * Fix arbitrary shell commmand execution due to insufficient sanitising of filenames. Patch by J.H.M. Dassen. stable/main/binary-ia64/pstotext_1.9-1sarge2_ia64.deb pstotext (1.9-1sarge2) stable-security; urgency=high * Non-maintainer upload by the Security Team * Fix arbitrary shell commmand execution due to insufficient sanitising of filenames. Patch by J.H.M. Dassen. stable/main/binary-hppa/pstotext_1.9-1sarge2_hppa.deb pstotext (1.9-1sarge2) stable-security; urgency=high * Non-maintainer upload by the Security Team * Fix arbitrary shell commmand execution due to insufficient sanitising of filenames. Patch by J.H.M. Dassen. stable/main/binary-arm/pstotext_1.9-1sarge2_arm.deb pstotext (1.9-1sarge2) stable-security; urgency=high * Non-maintainer upload by the Security Team * Fix arbitrary shell commmand execution due to insufficient sanitising of filenames. Patch by J.H.M. Dassen. stable/main/binary-alpha/pstotext_1.9-1sarge2_alpha.deb pstotext (1.9-1sarge2) stable-security; urgency=high * Non-maintainer upload by the Security Team * Fix arbitrary shell commmand execution due to insufficient sanitising of filenames. Patch by J.H.M. Dassen. stable/main/source/pstotext_1.9-1sarge2.diff.gz stable/main/source/pstotext_1.9-1sarge2.dsc stable/main/binary-i386/pstotext_1.9-1sarge2_i386.deb pstotext (1.9-1sarge2) stable-security; urgency=high * Non-maintainer upload by the Security Team * Fix arbitrary shell commmand execution due to insufficient sanitising of filenames. Patch by J.H.M. Dassen. stable/main/binary-sparc/proftpd-common_1.2.10-15sarge4_sparc.deb stable/main/binary-sparc/proftpd-pgsql_1.2.10-15sarge4_sparc.deb stable/main/binary-sparc/proftpd_1.2.10-15sarge4_sparc.deb stable/main/binary-sparc/proftpd-mysql_1.2.10-15sarge4_sparc.deb stable/main/binary-sparc/proftpd-ldap_1.2.10-15sarge4_sparc.deb proftpd (1.2.10-15sarge4) stable-security; urgency=high Fixes a buffer overflow for mod_radius, found in 1.2.10 and missed before releasing. http://www.securityfocus.com/bid/16535 http://bugs.proftpd.org/show_bug.cgi?id=2658 Patch: 35.CVE_2005_4816 stable/main/binary-s390/proftpd-common_1.2.10-15sarge4_s390.deb stable/main/binary-s390/proftpd_1.2.10-15sarge4_s390.deb stable/main/binary-s390/proftpd-ldap_1.2.10-15sarge4_s390.deb stable/main/binary-s390/proftpd-pgsql_1.2.10-15sarge4_s390.deb stable/main/binary-s390/proftpd-mysql_1.2.10-15sarge4_s390.deb proftpd (1.2.10-15sarge4) stable-security; urgency=high Fixes a buffer overflow for mod_radius, found in 1.2.10 and missed before releasing. http://www.securityfocus.com/bid/16535 http://bugs.proftpd.org/show_bug.cgi?id=2658 Patch: 35.CVE_2005_4816 stable/main/binary-powerpc/proftpd-common_1.2.10-15sarge4_powerpc.deb stable/main/binary-powerpc/proftpd-mysql_1.2.10-15sarge4_powerpc.deb stable/main/binary-powerpc/proftpd_1.2.10-15sarge4_powerpc.deb stable/main/binary-powerpc/proftpd-pgsql_1.2.10-15sarge4_powerpc.deb stable/main/binary-powerpc/proftpd-ldap_1.2.10-15sarge4_powerpc.deb proftpd (1.2.10-15sarge4) stable-security; urgency=high Fixes a buffer overflow for mod_radius, found in 1.2.10 and missed before releasing. http://www.securityfocus.com/bid/16535 http://bugs.proftpd.org/show_bug.cgi?id=2658 Patch: 35.CVE_2005_4816 stable/main/binary-mipsel/proftpd-ldap_1.2.10-15sarge4_mipsel.deb stable/main/binary-mipsel/proftpd_1.2.10-15sarge4_mipsel.deb stable/main/binary-mipsel/proftpd-common_1.2.10-15sarge4_mipsel.deb stable/main/binary-mipsel/proftpd-mysql_1.2.10-15sarge4_mipsel.deb stable/main/binary-mipsel/proftpd-pgsql_1.2.10-15sarge4_mipsel.deb proftpd (1.2.10-15sarge4) stable-security; urgency=high Fixes a buffer overflow for mod_radius, found in 1.2.10 and missed before releasing. http://www.securityfocus.com/bid/16535 http://bugs.proftpd.org/show_bug.cgi?id=2658 Patch: 35.CVE_2005_4816 stable/main/binary-mips/proftpd-common_1.2.10-15sarge4_mips.deb stable/main/binary-mips/proftpd_1.2.10-15sarge4_mips.deb stable/main/binary-mips/proftpd-mysql_1.2.10-15sarge4_mips.deb stable/main/binary-mips/proftpd-pgsql_1.2.10-15sarge4_mips.deb stable/main/binary-mips/proftpd-ldap_1.2.10-15sarge4_mips.deb proftpd (1.2.10-15sarge4) stable-security; urgency=high Fixes a buffer overflow for mod_radius, found in 1.2.10 and missed before releasing. http://www.securityfocus.com/bid/16535 http://bugs.proftpd.org/show_bug.cgi?id=2658 Patch: 35.CVE_2005_4816 stable/main/binary-m68k/proftpd-mysql_1.2.10-15sarge4_m68k.deb stable/main/binary-m68k/proftpd_1.2.10-15sarge4_m68k.deb stable/main/binary-m68k/proftpd-common_1.2.10-15sarge4_m68k.deb stable/main/binary-m68k/proftpd-ldap_1.2.10-15sarge4_m68k.deb stable/main/binary-m68k/proftpd-pgsql_1.2.10-15sarge4_m68k.deb proftpd (1.2.10-15sarge4) stable-security; urgency=high Fixes a buffer overflow for mod_radius, found in 1.2.10 and missed before releasing. http://www.securityfocus.com/bid/16535 http://bugs.proftpd.org/show_bug.cgi?id=2658 Patch: 35.CVE_2005_4816 stable/main/binary-ia64/proftpd-common_1.2.10-15sarge4_ia64.deb stable/main/binary-ia64/proftpd-ldap_1.2.10-15sarge4_ia64.deb stable/main/binary-ia64/proftpd_1.2.10-15sarge4_ia64.deb stable/main/binary-ia64/proftpd-mysql_1.2.10-15sarge4_ia64.deb stable/main/binary-ia64/proftpd-pgsql_1.2.10-15sarge4_ia64.deb proftpd (1.2.10-15sarge4) stable-security; urgency=high Fixes a buffer overflow for mod_radius, found in 1.2.10 and missed before releasing. http://www.securityfocus.com/bid/16535 http://bugs.proftpd.org/show_bug.cgi?id=2658 Patch: 35.CVE_2005_4816 stable/main/binary-hppa/proftpd-pgsql_1.2.10-15sarge4_hppa.deb stable/main/binary-hppa/proftpd-ldap_1.2.10-15sarge4_hppa.deb stable/main/binary-hppa/proftpd-common_1.2.10-15sarge4_hppa.deb stable/main/binary-hppa/proftpd_1.2.10-15sarge4_hppa.deb stable/main/binary-hppa/proftpd-mysql_1.2.10-15sarge4_hppa.deb proftpd (1.2.10-15sarge4) stable-security; urgency=high Fixes a buffer overflow for mod_radius, found in 1.2.10 and missed before releasing. http://www.securityfocus.com/bid/16535 http://bugs.proftpd.org/show_bug.cgi?id=2658 Patch: 35.CVE_2005_4816 stable/main/binary-arm/proftpd_1.2.10-15sarge4_arm.deb stable/main/binary-arm/proftpd-ldap_1.2.10-15sarge4_arm.deb stable/main/binary-arm/proftpd-mysql_1.2.10-15sarge4_arm.deb stable/main/binary-arm/proftpd-pgsql_1.2.10-15sarge4_arm.deb stable/main/binary-arm/proftpd-common_1.2.10-15sarge4_arm.deb proftpd (1.2.10-15sarge4) stable-security; urgency=high Fixes a buffer overflow for mod_radius, found in 1.2.10 and missed before releasing. http://www.securityfocus.com/bid/16535 http://bugs.proftpd.org/show_bug.cgi?id=2658 Patch: 35.CVE_2005_4816 stable/main/binary-alpha/proftpd-ldap_1.2.10-15sarge4_alpha.deb stable/main/binary-alpha/proftpd_1.2.10-15sarge4_alpha.deb stable/main/binary-alpha/proftpd-mysql_1.2.10-15sarge4_alpha.deb stable/main/binary-alpha/proftpd-pgsql_1.2.10-15sarge4_alpha.deb stable/main/binary-alpha/proftpd-common_1.2.10-15sarge4_alpha.deb proftpd (1.2.10-15sarge4) stable-security; urgency=high Fixes a buffer overflow for mod_radius, found in 1.2.10 and missed before releasing. http://www.securityfocus.com/bid/16535 http://bugs.proftpd.org/show_bug.cgi?id=2658 Patch: 35.CVE_2005_4816 stable/main/binary-all/proftpd-doc_1.2.10-15sarge4_all.deb stable/main/source/proftpd_1.2.10-15sarge4.diff.gz stable/main/source/proftpd_1.2.10-15sarge4.dsc stable/main/binary-i386/proftpd-mysql_1.2.10-15sarge4_i386.deb stable/main/binary-i386/proftpd_1.2.10-15sarge4_i386.deb stable/main/binary-i386/proftpd-pgsql_1.2.10-15sarge4_i386.deb stable/main/binary-i386/proftpd-ldap_1.2.10-15sarge4_i386.deb stable/main/binary-i386/proftpd-common_1.2.10-15sarge4_i386.deb proftpd (1.2.10-15sarge4) stable-security; urgency=high Fixes a buffer overflow for mod_radius, found in 1.2.10 and missed before releasing. http://www.securityfocus.com/bid/16535 http://bugs.proftpd.org/show_bug.cgi?id=2658 Patch: 35.CVE_2005_4816 stable/main/binary-sparc/postgresql-contrib_7.4.7-6sarge4_sparc.deb stable/main/binary-sparc/postgresql-dev_7.4.7-6sarge4_sparc.deb stable/main/binary-sparc/libpgtcl_7.4.7-6sarge4_sparc.deb stable/main/binary-sparc/libpgtcl-dev_7.4.7-6sarge4_sparc.deb stable/main/binary-sparc/libecpg-dev_7.4.7-6sarge4_sparc.deb stable/main/binary-sparc/libpq3_7.4.7-6sarge4_sparc.deb stable/main/binary-sparc/postgresql-client_7.4.7-6sarge4_sparc.deb stable/main/binary-sparc/libecpg4_7.4.7-6sarge4_sparc.deb stable/main/binary-sparc/postgresql_7.4.7-6sarge4_sparc.deb postgresql (7.4.7-6sarge4) stable-security; urgency=low * SECURITY UPDATE: Read out arbitrary memory locations from the server, local DoS. * Add debian/patches/60sql_fun_typecheck.patch: - Repair insufficiently careful type checking for SQL-language functions. Not only can one trivially crash the backend, but with appropriate misuse of pass-by-reference datatypes it is possible to read out arbitrary locations in the server process's memory, which could allow retrieving database content the user should not be able to see. - Discovered by Jeff Trout. - Patch backported from 7.4.16 from CVS: http://developer.postgresql.org/cvsweb.cgi/pgsql/src/backend/executor/functions.c.diff?r1=1.75.2.1;r2=1.75.2.2 http://developer.postgresql.org/cvsweb.cgi/pgsql/src/backend/optimizer/util/clauses.c.diff?r1=1.154.2.4;r2=1.154.2.5 - CVE-2007-0555 * Add debian/patches/61max_utf8_wchar_len.patch: - Update various string functions to support the maximum UTF-8 sequence length for 4-byte character set to prevent buffer overflows. - Patch backported from 7.4.16 from CVS: http://developer.postgresql.org/cvsweb.cgi/pgsql/src/backend/utils/mb/wchar.c.diff?r1=1.34.2.2;r2=1.34.2.3 stable/main/binary-s390/libecpg-dev_7.4.7-6sarge4_s390.deb stable/main/binary-s390/postgresql_7.4.7-6sarge4_s390.deb stable/main/binary-s390/postgresql-dev_7.4.7-6sarge4_s390.deb stable/main/binary-s390/postgresql-client_7.4.7-6sarge4_s390.deb stable/main/binary-s390/postgresql-contrib_7.4.7-6sarge4_s390.deb stable/main/binary-s390/libecpg4_7.4.7-6sarge4_s390.deb stable/main/binary-s390/libpq3_7.4.7-6sarge4_s390.deb stable/main/binary-s390/libpgtcl-dev_7.4.7-6sarge4_s390.deb stable/main/binary-s390/libpgtcl_7.4.7-6sarge4_s390.deb postgresql (7.4.7-6sarge4) stable-security; urgency=low * SECURITY UPDATE: Read out arbitrary memory locations from the server, local DoS. * Add debian/patches/60sql_fun_typecheck.patch: - Repair insufficiently careful type checking for SQL-language functions. Not only can one trivially crash the backend, but with appropriate misuse of pass-by-reference datatypes it is possible to read out arbitrary locations in the server process's memory, which could allow retrieving database content the user should not be able to see. - Discovered by Jeff Trout. - Patch backported from 7.4.16 from CVS: http://developer.postgresql.org/cvsweb.cgi/pgsql/src/backend/executor/functions.c.diff?r1=1.75.2.1;r2=1.75.2.2 http://developer.postgresql.org/cvsweb.cgi/pgsql/src/backend/optimizer/util/clauses.c.diff?r1=1.154.2.4;r2=1.154.2.5 - CVE-2007-0555 * Add debian/patches/61max_utf8_wchar_len.patch: - Update various string functions to support the maximum UTF-8 sequence length for 4-byte character set to prevent buffer overflows. - Patch backported from 7.4.16 from CVS: http://developer.postgresql.org/cvsweb.cgi/pgsql/src/backend/utils/mb/wchar.c.diff?r1=1.34.2.2;r2=1.34.2.3 stable/main/binary-powerpc/libpq3_7.4.7-6sarge4_powerpc.deb stable/main/binary-powerpc/postgresql-contrib_7.4.7-6sarge4_powerpc.deb stable/main/binary-powerpc/postgresql-dev_7.4.7-6sarge4_powerpc.deb stable/main/binary-powerpc/libecpg4_7.4.7-6sarge4_powerpc.deb stable/main/binary-powerpc/postgresql-client_7.4.7-6sarge4_powerpc.deb stable/main/binary-powerpc/libecpg-dev_7.4.7-6sarge4_powerpc.deb stable/main/binary-powerpc/libpgtcl-dev_7.4.7-6sarge4_powerpc.deb stable/main/binary-powerpc/libpgtcl_7.4.7-6sarge4_powerpc.deb stable/main/binary-powerpc/postgresql_7.4.7-6sarge4_powerpc.deb postgresql (7.4.7-6sarge4) stable-security; urgency=low * SECURITY UPDATE: Read out arbitrary memory locations from the server, local DoS. * Add debian/patches/60sql_fun_typecheck.patch: - Repair insufficiently careful type checking for SQL-language functions. Not only can one trivially crash the backend, but with appropriate misuse of pass-by-reference datatypes it is possible to read out arbitrary locations in the server process's memory, which could allow retrieving database content the user should not be able to see. - Discovered by Jeff Trout. - Patch backported from 7.4.16 from CVS: http://developer.postgresql.org/cvsweb.cgi/pgsql/src/backend/executor/functions.c.diff?r1=1.75.2.1;r2=1.75.2.2 http://developer.postgresql.org/cvsweb.cgi/pgsql/src/backend/optimizer/util/clauses.c.diff?r1=1.154.2.4;r2=1.154.2.5 - CVE-2007-0555 * Add debian/patches/61max_utf8_wchar_len.patch: - Update various string functions to support the maximum UTF-8 sequence length for 4-byte character set to prevent buffer overflows. - Patch backported from 7.4.16 from CVS: http://developer.postgresql.org/cvsweb.cgi/pgsql/src/backend/utils/mb/wchar.c.diff?r1=1.34.2.2;r2=1.34.2.3 stable/main/binary-mipsel/postgresql-client_7.4.7-6sarge4_mipsel.deb stable/main/binary-mipsel/libecpg4_7.4.7-6sarge4_mipsel.deb stable/main/binary-mipsel/libpgtcl_7.4.7-6sarge4_mipsel.deb stable/main/binary-mipsel/postgresql-dev_7.4.7-6sarge4_mipsel.deb stable/main/binary-mipsel/libecpg-dev_7.4.7-6sarge4_mipsel.deb stable/main/binary-mipsel/postgresql-contrib_7.4.7-6sarge4_mipsel.deb stable/main/binary-mipsel/libpgtcl-dev_7.4.7-6sarge4_mipsel.deb stable/main/binary-mipsel/libpq3_7.4.7-6sarge4_mipsel.deb stable/main/binary-mipsel/postgresql_7.4.7-6sarge4_mipsel.deb postgresql (7.4.7-6sarge4) stable-security; urgency=low * SECURITY UPDATE: Read out arbitrary memory locations from the server, local DoS. * Add debian/patches/60sql_fun_typecheck.patch: - Repair insufficiently careful type checking for SQL-language functions. Not only can one trivially crash the backend, but with appropriate misuse of pass-by-reference datatypes it is possible to read out arbitrary locations in the server process's memory, which could allow retrieving database content the user should not be able to see. - Discovered by Jeff Trout. - Patch backported from 7.4.16 from CVS: http://developer.postgresql.org/cvsweb.cgi/pgsql/src/backend/executor/functions.c.diff?r1=1.75.2.1;r2=1.75.2.2 http://developer.postgresql.org/cvsweb.cgi/pgsql/src/backend/optimizer/util/clauses.c.diff?r1=1.154.2.4;r2=1.154.2.5 - CVE-2007-0555 * Add debian/patches/61max_utf8_wchar_len.patch: - Update various string functions to support the maximum UTF-8 sequence length for 4-byte character set to prevent buffer overflows. - Patch backported from 7.4.16 from CVS: http://developer.postgresql.org/cvsweb.cgi/pgsql/src/backend/utils/mb/wchar.c.diff?r1=1.34.2.2;r2=1.34.2.3 stable/main/binary-mips/libpq3_7.4.7-6sarge4_mips.deb stable/main/binary-mips/postgresql_7.4.7-6sarge4_mips.deb stable/main/binary-mips/libecpg-dev_7.4.7-6sarge4_mips.deb stable/main/binary-mips/postgresql-client_7.4.7-6sarge4_mips.deb stable/main/binary-mips/libpgtcl-dev_7.4.7-6sarge4_mips.deb stable/main/binary-mips/postgresql-dev_7.4.7-6sarge4_mips.deb stable/main/binary-mips/postgresql-contrib_7.4.7-6sarge4_mips.deb stable/main/binary-mips/libecpg4_7.4.7-6sarge4_mips.deb stable/main/binary-mips/libpgtcl_7.4.7-6sarge4_mips.deb postgresql (7.4.7-6sarge4) stable-security; urgency=low * SECURITY UPDATE: Read out arbitrary memory locations from the server, local DoS. * Add debian/patches/60sql_fun_typecheck.patch: - Repair insufficiently careful type checking for SQL-language functions. Not only can one trivially crash the backend, but with appropriate misuse of pass-by-reference datatypes it is possible to read out arbitrary locations in the server process's memory, which could allow retrieving database content the user should not be able to see. - Discovered by Jeff Trout. - Patch backported from 7.4.16 from CVS: http://developer.postgresql.org/cvsweb.cgi/pgsql/src/backend/executor/functions.c.diff?r1=1.75.2.1;r2=1.75.2.2 http://developer.postgresql.org/cvsweb.cgi/pgsql/src/backend/optimizer/util/clauses.c.diff?r1=1.154.2.4;r2=1.154.2.5 - CVE-2007-0555 * Add debian/patches/61max_utf8_wchar_len.patch: - Update various string functions to support the maximum UTF-8 sequence length for 4-byte character set to prevent buffer overflows. - Patch backported from 7.4.16 from CVS: http://developer.postgresql.org/cvsweb.cgi/pgsql/src/backend/utils/mb/wchar.c.diff?r1=1.34.2.2;r2=1.34.2.3 stable/main/binary-m68k/postgresql-dev_7.4.7-6sarge4_m68k.deb stable/main/binary-m68k/libpgtcl_7.4.7-6sarge4_m68k.deb stable/main/binary-m68k/libpq3_7.4.7-6sarge4_m68k.deb stable/main/binary-m68k/libecpg4_7.4.7-6sarge4_m68k.deb stable/main/binary-m68k/postgresql_7.4.7-6sarge4_m68k.deb stable/main/binary-m68k/postgresql-client_7.4.7-6sarge4_m68k.deb stable/main/binary-m68k/libecpg-dev_7.4.7-6sarge4_m68k.deb stable/main/binary-m68k/postgresql-contrib_7.4.7-6sarge4_m68k.deb stable/main/binary-m68k/libpgtcl-dev_7.4.7-6sarge4_m68k.deb postgresql (7.4.7-6sarge4) stable-security; urgency=low * SECURITY UPDATE: Read out arbitrary memory locations from the server, local DoS. * Add debian/patches/60sql_fun_typecheck.patch: - Repair insufficiently careful type checking for SQL-language functions. Not only can one trivially crash the backend, but with appropriate misuse of pass-by-reference datatypes it is possible to read out arbitrary locations in the server process's memory, which could allow retrieving database content the user should not be able to see. - Discovered by Jeff Trout. - Patch backported from 7.4.16 from CVS: http://developer.postgresql.org/cvsweb.cgi/pgsql/src/backend/executor/functions.c.diff?r1=1.75.2.1;r2=1.75.2.2 http://developer.postgresql.org/cvsweb.cgi/pgsql/src/backend/optimizer/util/clauses.c.diff?r1=1.154.2.4;r2=1.154.2.5 - CVE-2007-0555 * Add debian/patches/61max_utf8_wchar_len.patch: - Update various string functions to support the maximum UTF-8 sequence length for 4-byte character set to prevent buffer overflows. - Patch backported from 7.4.16 from CVS: http://developer.postgresql.org/cvsweb.cgi/pgsql/src/backend/utils/mb/wchar.c.diff?r1=1.34.2.2;r2=1.34.2.3 stable/main/binary-ia64/libpq3_7.4.7-6sarge4_ia64.deb stable/main/binary-ia64/postgresql_7.4.7-6sarge4_ia64.deb stable/main/binary-ia64/libecpg-dev_7.4.7-6sarge4_ia64.deb stable/main/binary-ia64/postgresql-contrib_7.4.7-6sarge4_ia64.deb stable/main/binary-ia64/libecpg4_7.4.7-6sarge4_ia64.deb stable/main/binary-ia64/libpgtcl_7.4.7-6sarge4_ia64.deb stable/main/binary-ia64/libpgtcl-dev_7.4.7-6sarge4_ia64.deb stable/main/binary-ia64/postgresql-dev_7.4.7-6sarge4_ia64.deb stable/main/binary-ia64/postgresql-client_7.4.7-6sarge4_ia64.deb postgresql (7.4.7-6sarge4) stable-security; urgency=low * SECURITY UPDATE: Read out arbitrary memory locations from the server, local DoS. * Add debian/patches/60sql_fun_typecheck.patch: - Repair insufficiently careful type checking for SQL-language functions. Not only can one trivially crash the backend, but with appropriate misuse of pass-by-reference datatypes it is possible to read out arbitrary locations in the server process's memory, which could allow retrieving database content the user should not be able to see. - Discovered by Jeff Trout. - Patch backported from 7.4.16 from CVS: http://developer.postgresql.org/cvsweb.cgi/pgsql/src/backend/executor/functions.c.diff?r1=1.75.2.1;r2=1.75.2.2 http://developer.postgresql.org/cvsweb.cgi/pgsql/src/backend/optimizer/util/clauses.c.diff?r1=1.154.2.4;r2=1.154.2.5 - CVE-2007-0555 * Add debian/patches/61max_utf8_wchar_len.patch: - Update various string functions to support the maximum UTF-8 sequence length for 4-byte character set to prevent buffer overflows. - Patch backported from 7.4.16 from CVS: http://developer.postgresql.org/cvsweb.cgi/pgsql/src/backend/utils/mb/wchar.c.diff?r1=1.34.2.2;r2=1.34.2.3 stable/main/binary-hppa/libpgtcl_7.4.7-6sarge4_hppa.deb stable/main/binary-hppa/libecpg4_7.4.7-6sarge4_hppa.deb stable/main/binary-hppa/postgresql-dev_7.4.7-6sarge4_hppa.deb stable/main/binary-hppa/libpq3_7.4.7-6sarge4_hppa.deb stable/main/binary-hppa/postgresql_7.4.7-6sarge4_hppa.deb stable/main/binary-hppa/postgresql-client_7.4.7-6sarge4_hppa.deb stable/main/binary-hppa/postgresql-contrib_7.4.7-6sarge4_hppa.deb stable/main/binary-hppa/libpgtcl-dev_7.4.7-6sarge4_hppa.deb stable/main/binary-hppa/libecpg-dev_7.4.7-6sarge4_hppa.deb postgresql (7.4.7-6sarge4) stable-security; urgency=low * SECURITY UPDATE: Read out arbitrary memory locations from the server, local DoS. * Add debian/patches/60sql_fun_typecheck.patch: - Repair insufficiently careful type checking for SQL-language functions. Not only can one trivially crash the backend, but with appropriate misuse of pass-by-reference datatypes it is possible to read out arbitrary locations in the server process's memory, which could allow retrieving database content the user should not be able to see. - Discovered by Jeff Trout. - Patch backported from 7.4.16 from CVS: http://developer.postgresql.org/cvsweb.cgi/pgsql/src/backend/executor/functions.c.diff?r1=1.75.2.1;r2=1.75.2.2 http://developer.postgresql.org/cvsweb.cgi/pgsql/src/backend/optimizer/util/clauses.c.diff?r1=1.154.2.4;r2=1.154.2.5 - CVE-2007-0555 * Add debian/patches/61max_utf8_wchar_len.patch: - Update various string functions to support the maximum UTF-8 sequence length for 4-byte character set to prevent buffer overflows. - Patch backported from 7.4.16 from CVS: http://developer.postgresql.org/cvsweb.cgi/pgsql/src/backend/utils/mb/wchar.c.diff?r1=1.34.2.2;r2=1.34.2.3 stable/main/binary-arm/postgresql_7.4.7-6sarge4_arm.deb stable/main/binary-arm/postgresql-dev_7.4.7-6sarge4_arm.deb stable/main/binary-arm/libecpg-dev_7.4.7-6sarge4_arm.deb stable/main/binary-arm/libpgtcl_7.4.7-6sarge4_arm.deb stable/main/binary-arm/libpq3_7.4.7-6sarge4_arm.deb stable/main/binary-arm/libpgtcl-dev_7.4.7-6sarge4_arm.deb stable/main/binary-arm/postgresql-contrib_7.4.7-6sarge4_arm.deb stable/main/binary-arm/libecpg4_7.4.7-6sarge4_arm.deb stable/main/binary-arm/postgresql-client_7.4.7-6sarge4_arm.deb postgresql (7.4.7-6sarge4) stable-security; urgency=low * SECURITY UPDATE: Read out arbitrary memory locations from the server, local DoS. * Add debian/patches/60sql_fun_typecheck.patch: - Repair insufficiently careful type checking for SQL-language functions. Not only can one trivially crash the backend, but with appropriate misuse of pass-by-reference datatypes it is possible to read out arbitrary locations in the server process's memory, which could allow retrieving database content the user should not be able to see. - Discovered by Jeff Trout. - Patch backported from 7.4.16 from CVS: http://developer.postgresql.org/cvsweb.cgi/pgsql/src/backend/executor/functions.c.diff?r1=1.75.2.1;r2=1.75.2.2 http://developer.postgresql.org/cvsweb.cgi/pgsql/src/backend/optimizer/util/clauses.c.diff?r1=1.154.2.4;r2=1.154.2.5 - CVE-2007-0555 * Add debian/patches/61max_utf8_wchar_len.patch: - Update various string functions to support the maximum UTF-8 sequence length for 4-byte character set to prevent buffer overflows. - Patch backported from 7.4.16 from CVS: http://developer.postgresql.org/cvsweb.cgi/pgsql/src/backend/utils/mb/wchar.c.diff?r1=1.34.2.2;r2=1.34.2.3 stable/main/binary-alpha/postgresql_7.4.7-6sarge4_alpha.deb stable/main/binary-alpha/libpgtcl_7.4.7-6sarge4_alpha.deb stable/main/binary-alpha/postgresql-dev_7.4.7-6sarge4_alpha.deb stable/main/binary-alpha/libpq3_7.4.7-6sarge4_alpha.deb stable/main/binary-alpha/libpgtcl-dev_7.4.7-6sarge4_alpha.deb stable/main/binary-alpha/libecpg4_7.4.7-6sarge4_alpha.deb stable/main/binary-alpha/postgresql-client_7.4.7-6sarge4_alpha.deb stable/main/binary-alpha/postgresql-contrib_7.4.7-6sarge4_alpha.deb stable/main/binary-alpha/libecpg-dev_7.4.7-6sarge4_alpha.deb postgresql (7.4.7-6sarge4) stable-security; urgency=low * SECURITY UPDATE: Read out arbitrary memory locations from the server, local DoS. * Add debian/patches/60sql_fun_typecheck.patch: - Repair insufficiently careful type checking for SQL-language functions. Not only can one trivially crash the backend, but with appropriate misuse of pass-by-reference datatypes it is possible to read out arbitrary locations in the server process's memory, which could allow retrieving database content the user should not be able to see. - Discovered by Jeff Trout. - Patch backported from 7.4.16 from CVS: http://developer.postgresql.org/cvsweb.cgi/pgsql/src/backend/executor/functions.c.diff?r1=1.75.2.1;r2=1.75.2.2 http://developer.postgresql.org/cvsweb.cgi/pgsql/src/backend/optimizer/util/clauses.c.diff?r1=1.154.2.4;r2=1.154.2.5 - CVE-2007-0555 * Add debian/patches/61max_utf8_wchar_len.patch: - Update various string functions to support the maximum UTF-8 sequence length for 4-byte character set to prevent buffer overflows. - Patch backported from 7.4.16 from CVS: http://developer.postgresql.org/cvsweb.cgi/pgsql/src/backend/utils/mb/wchar.c.diff?r1=1.34.2.2;r2=1.34.2.3 stable/main/source/postgresql_7.4.7-6sarge4.dsc stable/main/binary-i386/libpgtcl_7.4.7-6sarge4_i386.deb stable/main/binary-i386/libecpg-dev_7.4.7-6sarge4_i386.deb stable/main/binary-i386/postgresql-contrib_7.4.7-6sarge4_i386.deb stable/main/binary-i386/libpq3_7.4.7-6sarge4_i386.deb stable/main/binary-i386/postgresql-client_7.4.7-6sarge4_i386.deb stable/main/binary-i386/libecpg4_7.4.7-6sarge4_i386.deb stable/main/binary-i386/postgresql_7.4.7-6sarge4_i386.deb stable/main/binary-i386/libpgtcl-dev_7.4.7-6sarge4_i386.deb stable/main/source/postgresql_7.4.7-6sarge4.diff.gz stable/main/binary-i386/postgresql-dev_7.4.7-6sarge4_i386.deb stable/main/binary-all/postgresql-doc_7.4.7-6sarge4_all.deb postgresql (7.4.7-6sarge4) stable-security; urgency=low * SECURITY UPDATE: Read out arbitrary memory locations from the server, local DoS. * Add debian/patches/60sql_fun_typecheck.patch: - Repair insufficiently careful type checking for SQL-language functions. Not only can one trivially crash the backend, but with appropriate misuse of pass-by-reference datatypes it is possible to read out arbitrary locations in the server process's memory, which could allow retrieving database content the user should not be able to see. - Discovered by Jeff Trout. - Patch backported from 7.4.16 from CVS: http://developer.postgresql.org/cvsweb.cgi/pgsql/src/backend/executor/functions.c.diff?r1=1.75.2.1;r2=1.75.2.2 http://developer.postgresql.org/cvsweb.cgi/pgsql/src/backend/optimizer/util/clauses.c.diff?r1=1.154.2.4;r2=1.154.2.5 - CVE-2007-0555 * Add debian/patches/61max_utf8_wchar_len.patch: - Update various string functions to support the maximum UTF-8 sequence length for 4-byte character set to prevent buffer overflows. - Patch backported from 7.4.16 from CVS: http://developer.postgresql.org/cvsweb.cgi/pgsql/src/backend/utils/mb/wchar.c.diff?r1=1.34.2.2;r2=1.34.2.3 stable/main/binary-sparc/pinball_0.3.1-3.sarge1_sparc.deb stable/main/binary-sparc/pinball-dev_0.3.1-3.sarge1_sparc.deb pinball (0.3.1-3.sarge1) stable; urgency=high * Non-maintainer upload by the Stable Release team. * Fix uninstallability on powerpc. stable/main/binary-s390/pinball-dev_0.3.1-3.sarge1_s390.deb stable/main/binary-s390/pinball_0.3.1-3.sarge1_s390.deb pinball (0.3.1-3.sarge1) stable; urgency=high * Non-maintainer upload by the Stable Release team. * Fix uninstallability on powerpc. stable/main/binary-powerpc/pinball_0.3.1-3.sarge1_powerpc.deb stable/main/binary-powerpc/pinball-dev_0.3.1-3.sarge1_powerpc.deb pinball (0.3.1-3.sarge1) stable; urgency=high * Non-maintainer upload by the Stable Release team. * Fix uninstallability on powerpc. stable/main/binary-mipsel/pinball-dev_0.3.1-3.sarge1_mipsel.deb stable/main/binary-mipsel/pinball_0.3.1-3.sarge1_mipsel.deb pinball (0.3.1-3.sarge1) stable; urgency=high * Non-maintainer upload by the Stable Release team. * Fix uninstallability on powerpc. stable/main/binary-mips/pinball_0.3.1-3.sarge1_mips.deb stable/main/binary-mips/pinball-dev_0.3.1-3.sarge1_mips.deb pinball (0.3.1-3.sarge1) stable; urgency=high * Non-maintainer upload by the Stable Release team. * Fix uninstallability on powerpc. stable/main/binary-m68k/pinball-dev_0.3.1-3.sarge1_m68k.deb stable/main/binary-m68k/pinball_0.3.1-3.sarge1_m68k.deb pinball (0.3.1-3.sarge1) stable; urgency=high * Non-maintainer upload by the Stable Release team. * Fix uninstallability on powerpc. stable/main/binary-ia64/pinball_0.3.1-3.sarge1_ia64.deb stable/main/binary-ia64/pinball-dev_0.3.1-3.sarge1_ia64.deb pinball (0.3.1-3.sarge1) stable; urgency=high * Non-maintainer upload by the Stable Release team. * Fix uninstallability on powerpc. stable/main/binary-hppa/pinball-dev_0.3.1-3.sarge1_hppa.deb stable/main/binary-hppa/pinball_0.3.1-3.sarge1_hppa.deb pinball (0.3.1-3.sarge1) stable; urgency=high * Non-maintainer upload by the Stable Release team. * Fix uninstallability on powerpc. stable/main/binary-arm/pinball-dev_0.3.1-3.sarge1_arm.deb stable/main/binary-arm/pinball_0.3.1-3.sarge1_arm.deb pinball (0.3.1-3.sarge1) stable; urgency=high * Non-maintainer upload by the Stable Release team. * Fix uninstallability on powerpc. stable/main/binary-alpha/pinball_0.3.1-3.sarge1_alpha.deb stable/main/binary-alpha/pinball-dev_0.3.1-3.sarge1_alpha.deb pinball (0.3.1-3.sarge1) stable; urgency=high * Non-maintainer upload by the Stable Release team. * Fix uninstallability on powerpc. stable/main/source/pinball_0.3.1-3.sarge1.dsc stable/main/binary-all/pinball-data_0.3.1-3.sarge1_all.deb stable/main/binary-i386/pinball_0.3.1-3.sarge1_i386.deb stable/main/source/pinball_0.3.1-3.sarge1.diff.gz stable/main/binary-i386/pinball-dev_0.3.1-3.sarge1_i386.deb pinball (0.3.1-3.sarge1) stable; urgency=high * Non-maintainer upload by the Stable Release team. * Fix uninstallability on powerpc. stable/main/source/phpmyadmin_2.6.2-3sarge3.dsc stable/main/binary-all/phpmyadmin_2.6.2-3sarge3_all.deb stable/main/source/phpmyadmin_2.6.2-3sarge3.diff.gz phpmyadmin (4:2.6.2-3sarge3) stable-security; urgency=high * Upload targeted at sarge to fix regression in security update. * Fix broken style sheets in PMASA-2006-5.patch (Closes: #397855). * Fix missing _import_blacklist in 104-bug_PMASA-2006-5.patch (Closes: #397992) stable/main/binary-sparc/php4-imap_4.3.10-18_sparc.deb stable/main/binary-sparc/php4-odbc_4.3.10-18_sparc.deb stable/main/binary-sparc/php4-recode_4.3.10-18_sparc.deb stable/main/binary-sparc/php4-cli_4.3.10-18_sparc.deb stable/main/binary-sparc/libapache-mod-php4_4.3.10-18_sparc.deb stable/main/binary-sparc/php4-cgi_4.3.10-18_sparc.deb stable/main/binary-sparc/php4-domxml_4.3.10-18_sparc.deb stable/main/binary-sparc/php4-snmp_4.3.10-18_sparc.deb stable/main/binary-sparc/libapache2-mod-php4_4.3.10-18_sparc.deb stable/main/binary-sparc/php4-xslt_4.3.10-18_sparc.deb stable/main/binary-sparc/php4-mysql_4.3.10-18_sparc.deb stable/main/binary-sparc/php4-sybase_4.3.10-18_sparc.deb stable/main/binary-sparc/php4-curl_4.3.10-18_sparc.deb stable/main/binary-sparc/php4-dev_4.3.10-18_sparc.deb stable/main/binary-sparc/php4-mhash_4.3.10-18_sparc.deb stable/main/binary-sparc/php4-mcal_4.3.10-18_sparc.deb stable/main/binary-sparc/php4-gd_4.3.10-18_sparc.deb stable/main/binary-sparc/php4-ldap_4.3.10-18_sparc.deb stable/main/binary-sparc/php4-common_4.3.10-18_sparc.deb php4 (4:4.3.10-18) stable-security; urgency=high * NMU by the Security Team: * Fix buffer overflows in htmlentities() and htmlspecialchars() (CVE-2006-5465) stable/main/binary-s390/php4-mhash_4.3.10-18_s390.deb stable/main/binary-s390/php4-common_4.3.10-18_s390.deb stable/main/binary-s390/libapache-mod-php4_4.3.10-18_s390.deb stable/main/binary-s390/php4-gd_4.3.10-18_s390.deb stable/main/binary-s390/libapache2-mod-php4_4.3.10-18_s390.deb stable/main/binary-s390/php4-mysql_4.3.10-18_s390.deb stable/main/binary-s390/php4-cli_4.3.10-18_s390.deb stable/main/binary-s390/php4-curl_4.3.10-18_s390.deb stable/main/binary-s390/php4-domxml_4.3.10-18_s390.deb stable/main/binary-s390/php4-mcal_4.3.10-18_s390.deb stable/main/binary-s390/php4-ldap_4.3.10-18_s390.deb stable/main/binary-s390/php4-imap_4.3.10-18_s390.deb stable/main/binary-s390/php4-xslt_4.3.10-18_s390.deb stable/main/binary-s390/php4-dev_4.3.10-18_s390.deb stable/main/binary-s390/php4-odbc_4.3.10-18_s390.deb stable/main/binary-s390/php4-recode_4.3.10-18_s390.deb stable/main/binary-s390/php4-sybase_4.3.10-18_s390.deb stable/main/binary-s390/php4-cgi_4.3.10-18_s390.deb stable/main/binary-s390/php4-snmp_4.3.10-18_s390.deb php4 (4:4.3.10-18) stable-security; urgency=high * NMU by the Security Team: * Fix buffer overflows in htmlentities() and htmlspecialchars() (CVE-2006-5465) stable/main/binary-powerpc/php4-snmp_4.3.10-18_powerpc.deb stable/main/binary-powerpc/php4-gd_4.3.10-18_powerpc.deb stable/main/binary-powerpc/php4-ldap_4.3.10-18_powerpc.deb stable/main/binary-powerpc/libapache2-mod-php4_4.3.10-18_powerpc.deb stable/main/binary-powerpc/php4-curl_4.3.10-18_powerpc.deb stable/main/binary-powerpc/php4-odbc_4.3.10-18_powerpc.deb stable/main/binary-powerpc/php4-xslt_4.3.10-18_powerpc.deb stable/main/binary-powerpc/php4-sybase_4.3.10-18_powerpc.deb stable/main/binary-powerpc/libapache-mod-php4_4.3.10-18_powerpc.deb stable/main/binary-powerpc/php4-dev_4.3.10-18_powerpc.deb stable/main/binary-powerpc/php4-common_4.3.10-18_powerpc.deb stable/main/binary-powerpc/php4-mcal_4.3.10-18_powerpc.deb stable/main/binary-powerpc/php4-mhash_4.3.10-18_powerpc.deb stable/main/binary-powerpc/php4-domxml_4.3.10-18_powerpc.deb stable/main/binary-powerpc/php4-cgi_4.3.10-18_powerpc.deb stable/main/binary-powerpc/php4-mysql_4.3.10-18_powerpc.deb stable/main/binary-powerpc/php4-imap_4.3.10-18_powerpc.deb stable/main/binary-powerpc/php4-recode_4.3.10-18_powerpc.deb stable/main/binary-powerpc/php4-cli_4.3.10-18_powerpc.deb php4 (4:4.3.10-18) stable-security; urgency=high * NMU by the Security Team: * Fix buffer overflows in htmlentities() and htmlspecialchars() (CVE-2006-5465) stable/main/binary-mipsel/php4-mhash_4.3.10-18_mipsel.deb stable/main/binary-mipsel/php4-common_4.3.10-18_mipsel.deb stable/main/binary-mipsel/libapache-mod-php4_4.3.10-18_mipsel.deb stable/main/binary-mipsel/php4-imap_4.3.10-18_mipsel.deb stable/main/binary-mipsel/php4-mcal_4.3.10-18_mipsel.deb stable/main/binary-mipsel/php4-domxml_4.3.10-18_mipsel.deb stable/main/binary-mipsel/php4-recode_4.3.10-18_mipsel.deb stable/main/binary-mipsel/php4-cgi_4.3.10-18_mipsel.deb stable/main/binary-mipsel/php4-mysql_4.3.10-18_mipsel.deb stable/main/binary-mipsel/libapache2-mod-php4_4.3.10-18_mipsel.deb stable/main/binary-mipsel/php4-ldap_4.3.10-18_mipsel.deb stable/main/binary-mipsel/php4-curl_4.3.10-18_mipsel.deb stable/main/binary-mipsel/php4-sybase_4.3.10-18_mipsel.deb stable/main/binary-mipsel/php4-odbc_4.3.10-18_mipsel.deb stable/main/binary-mipsel/php4-dev_4.3.10-18_mipsel.deb stable/main/binary-mipsel/php4-snmp_4.3.10-18_mipsel.deb stable/main/binary-mipsel/php4-xslt_4.3.10-18_mipsel.deb stable/main/binary-mipsel/php4-cli_4.3.10-18_mipsel.deb stable/main/binary-mipsel/php4-gd_4.3.10-18_mipsel.deb php4 (4:4.3.10-18) stable-security; urgency=high * NMU by the Security Team: * Fix buffer overflows in htmlentities() and htmlspecialchars() (CVE-2006-5465) stable/main/binary-mips/php4-common_4.3.10-18_mips.deb stable/main/binary-mips/libapache-mod-php4_4.3.10-18_mips.deb stable/main/binary-mips/php4-imap_4.3.10-18_mips.deb stable/main/binary-mips/php4-curl_4.3.10-18_mips.deb stable/main/binary-mips/php4-mcal_4.3.10-18_mips.deb stable/main/binary-mips/php4-domxml_4.3.10-18_mips.deb stable/main/binary-mips/php4-cli_4.3.10-18_mips.deb stable/main/binary-mips/php4-snmp_4.3.10-18_mips.deb stable/main/binary-mips/php4-ldap_4.3.10-18_mips.deb stable/main/binary-mips/php4-cgi_4.3.10-18_mips.deb stable/main/binary-mips/php4-sybase_4.3.10-18_mips.deb stable/main/binary-mips/php4-xslt_4.3.10-18_mips.deb stable/main/binary-mips/php4-gd_4.3.10-18_mips.deb stable/main/binary-mips/php4-mysql_4.3.10-18_mips.deb stable/main/binary-mips/php4-mhash_4.3.10-18_mips.deb stable/main/binary-mips/php4-dev_4.3.10-18_mips.deb stable/main/binary-mips/php4-odbc_4.3.10-18_mips.deb stable/main/binary-mips/php4-recode_4.3.10-18_mips.deb stable/main/binary-mips/libapache2-mod-php4_4.3.10-18_mips.deb php4 (4:4.3.10-18) stable-security; urgency=high * NMU by the Security Team: * Fix buffer overflows in htmlentities() and htmlspecialchars() (CVE-2006-5465) stable/main/binary-m68k/php4-gd_4.3.10-18_m68k.deb stable/main/binary-m68k/php4-mcal_4.3.10-18_m68k.deb stable/main/binary-m68k/php4-recode_4.3.10-18_m68k.deb stable/main/binary-m68k/php4-snmp_4.3.10-18_m68k.deb stable/main/binary-m68k/php4-sybase_4.3.10-18_m68k.deb stable/main/binary-m68k/libapache-mod-php4_4.3.10-18_m68k.deb stable/main/binary-m68k/php4-cli_4.3.10-18_m68k.deb stable/main/binary-m68k/php4-dev_4.3.10-18_m68k.deb stable/main/binary-m68k/php4-domxml_4.3.10-18_m68k.deb stable/main/binary-m68k/php4-odbc_4.3.10-18_m68k.deb stable/main/binary-m68k/php4-xslt_4.3.10-18_m68k.deb stable/main/binary-m68k/php4-common_4.3.10-18_m68k.deb stable/main/binary-m68k/php4-cgi_4.3.10-18_m68k.deb stable/main/binary-m68k/php4-mysql_4.3.10-18_m68k.deb stable/main/binary-m68k/php4-curl_4.3.10-18_m68k.deb stable/main/binary-m68k/php4-ldap_4.3.10-18_m68k.deb stable/main/binary-m68k/libapache2-mod-php4_4.3.10-18_m68k.deb stable/main/binary-m68k/php4-mhash_4.3.10-18_m68k.deb stable/main/binary-m68k/php4-imap_4.3.10-18_m68k.deb php4 (4:4.3.10-18) stable-security; urgency=high * NMU by the Security Team: * Fix buffer overflows in htmlentities() and htmlspecialchars() (CVE-2006-5465) stable/main/binary-ia64/php4-common_4.3.10-18_ia64.deb stable/main/binary-ia64/php4-dev_4.3.10-18_ia64.deb stable/main/binary-ia64/libapache-mod-php4_4.3.10-18_ia64.deb stable/main/binary-ia64/php4-sybase_4.3.10-18_ia64.deb stable/main/binary-ia64/php4-cgi_4.3.10-18_ia64.deb stable/main/binary-ia64/php4-xslt_4.3.10-18_ia64.deb stable/main/binary-ia64/php4-domxml_4.3.10-18_ia64.deb stable/main/binary-ia64/php4-mysql_4.3.10-18_ia64.deb stable/main/binary-ia64/php4-gd_4.3.10-18_ia64.deb stable/main/binary-ia64/php4-cli_4.3.10-18_ia64.deb stable/main/binary-ia64/php4-mhash_4.3.10-18_ia64.deb stable/main/binary-ia64/php4-curl_4.3.10-18_ia64.deb stable/main/binary-ia64/php4-mcal_4.3.10-18_ia64.deb stable/main/binary-ia64/php4-imap_4.3.10-18_ia64.deb stable/main/binary-ia64/libapache2-mod-php4_4.3.10-18_ia64.deb stable/main/binary-ia64/php4-odbc_4.3.10-18_ia64.deb stable/main/binary-ia64/php4-recode_4.3.10-18_ia64.deb stable/main/binary-ia64/php4-ldap_4.3.10-18_ia64.deb stable/main/binary-ia64/php4-snmp_4.3.10-18_ia64.deb php4 (4:4.3.10-18) stable-security; urgency=high * NMU by the Security Team: * Fix buffer overflows in htmlentities() and htmlspecialchars() (CVE-2006-5465) stable/main/binary-hppa/libapache2-mod-php4_4.3.10-18_hppa.deb stable/main/binary-hppa/php4-gd_4.3.10-18_hppa.deb stable/main/binary-hppa/php4-ldap_4.3.10-18_hppa.deb stable/main/binary-hppa/php4-imap_4.3.10-18_hppa.deb stable/main/binary-hppa/php4-xslt_4.3.10-18_hppa.deb stable/main/binary-hppa/libapache-mod-php4_4.3.10-18_hppa.deb stable/main/binary-hppa/php4-dev_4.3.10-18_hppa.deb stable/main/binary-hppa/php4-mhash_4.3.10-18_hppa.deb stable/main/binary-hppa/php4-mysql_4.3.10-18_hppa.deb stable/main/binary-hppa/php4-cgi_4.3.10-18_hppa.deb stable/main/binary-hppa/php4-common_4.3.10-18_hppa.deb stable/main/binary-hppa/php4-mcal_4.3.10-18_hppa.deb stable/main/binary-hppa/php4-odbc_4.3.10-18_hppa.deb stable/main/binary-hppa/php4-recode_4.3.10-18_hppa.deb stable/main/binary-hppa/php4-cli_4.3.10-18_hppa.deb stable/main/binary-hppa/php4-curl_4.3.10-18_hppa.deb stable/main/binary-hppa/php4-domxml_4.3.10-18_hppa.deb stable/main/binary-hppa/php4-sybase_4.3.10-18_hppa.deb stable/main/binary-hppa/php4-snmp_4.3.10-18_hppa.deb php4 (4:4.3.10-18) stable-security; urgency=high * NMU by the Security Team: * Fix buffer overflows in htmlentities() and htmlspecialchars() (CVE-2006-5465) stable/main/binary-arm/php4-cgi_4.3.10-18_arm.deb stable/main/binary-arm/php4-xslt_4.3.10-18_arm.deb stable/main/binary-arm/php4-mysql_4.3.10-18_arm.deb stable/main/binary-arm/php4-cli_4.3.10-18_arm.deb stable/main/binary-arm/php4-mcal_4.3.10-18_arm.deb stable/main/binary-arm/libapache2-mod-php4_4.3.10-18_arm.deb stable/main/binary-arm/php4-odbc_4.3.10-18_arm.deb stable/main/binary-arm/php4-recode_4.3.10-18_arm.deb stable/main/binary-arm/php4-common_4.3.10-18_arm.deb stable/main/binary-arm/libapache-mod-php4_4.3.10-18_arm.deb stable/main/binary-arm/php4-sybase_4.3.10-18_arm.deb stable/main/binary-arm/php4-snmp_4.3.10-18_arm.deb stable/main/binary-arm/php4-gd_4.3.10-18_arm.deb stable/main/binary-arm/php4-curl_4.3.10-18_arm.deb stable/main/binary-arm/php4-ldap_4.3.10-18_arm.deb stable/main/binary-arm/php4-domxml_4.3.10-18_arm.deb stable/main/binary-arm/php4-dev_4.3.10-18_arm.deb stable/main/binary-arm/php4-mhash_4.3.10-18_arm.deb stable/main/binary-arm/php4-imap_4.3.10-18_arm.deb php4 (4:4.3.10-18) stable-security; urgency=high * NMU by the Security Team: * Fix buffer overflows in htmlentities() and htmlspecialchars() (CVE-2006-5465) stable/main/binary-alpha/php4-cli_4.3.10-18_alpha.deb stable/main/binary-alpha/php4-mhash_4.3.10-18_alpha.deb stable/main/binary-alpha/php4-common_4.3.10-18_alpha.deb stable/main/binary-alpha/php4-mcal_4.3.10-18_alpha.deb stable/main/binary-alpha/php4-ldap_4.3.10-18_alpha.deb stable/main/binary-alpha/php4-curl_4.3.10-18_alpha.deb stable/main/binary-alpha/php4-gd_4.3.10-18_alpha.deb stable/main/binary-alpha/libapache2-mod-php4_4.3.10-18_alpha.deb stable/main/binary-alpha/php4-cgi_4.3.10-18_alpha.deb stable/main/binary-alpha/php4-sybase_4.3.10-18_alpha.deb stable/main/binary-alpha/libapache-mod-php4_4.3.10-18_alpha.deb stable/main/binary-alpha/php4-imap_4.3.10-18_alpha.deb stable/main/binary-alpha/php4-recode_4.3.10-18_alpha.deb stable/main/binary-alpha/php4-mysql_4.3.10-18_alpha.deb stable/main/binary-alpha/php4-xslt_4.3.10-18_alpha.deb stable/main/binary-alpha/php4-dev_4.3.10-18_alpha.deb stable/main/binary-alpha/php4-snmp_4.3.10-18_alpha.deb stable/main/binary-alpha/php4-domxml_4.3.10-18_alpha.deb stable/main/binary-alpha/php4-odbc_4.3.10-18_alpha.deb php4 (4:4.3.10-18) stable-security; urgency=high * NMU by the Security Team: * Fix buffer overflows in htmlentities() and htmlspecialchars() (CVE-2006-5465) stable/main/binary-i386/php4-xslt_4.3.10-18_i386.deb stable/main/binary-i386/php4-curl_4.3.10-18_i386.deb stable/main/source/php4_4.3.10-18.diff.gz stable/main/binary-i386/php4-dev_4.3.10-18_i386.deb stable/main/binary-i386/php4-recode_4.3.10-18_i386.deb stable/main/binary-i386/libapache-mod-php4_4.3.10-18_i386.deb stable/main/binary-i386/php4-imap_4.3.10-18_i386.deb stable/main/binary-i386/php4-mcal_4.3.10-18_i386.deb stable/main/binary-i386/php4-snmp_4.3.10-18_i386.deb stable/main/source/php4_4.3.10-18.dsc stable/main/binary-i386/php4-sybase_4.3.10-18_i386.deb stable/main/binary-i386/libapache2-mod-php4_4.3.10-18_i386.deb stable/main/binary-i386/php4-cli_4.3.10-18_i386.deb stable/main/binary-i386/php4-cgi_4.3.10-18_i386.deb stable/main/binary-i386/php4-gd_4.3.10-18_i386.deb stable/main/binary-i386/php4-mysql_4.3.10-18_i386.deb stable/main/binary-all/php4-pear_4.3.10-18_all.deb stable/main/binary-i386/php4-odbc_4.3.10-18_i386.deb stable/main/binary-i386/php4-domxml_4.3.10-18_i386.deb stable/main/binary-i386/php4-mhash_4.3.10-18_i386.deb stable/main/binary-i386/php4-ldap_4.3.10-18_i386.deb stable/main/binary-all/php4_4.3.10-18_all.deb stable/main/binary-i386/php4-common_4.3.10-18_i386.deb php4 (4:4.3.10-18) stable-security; urgency=high * NMU by the Security Team: * Fix buffer overflows in htmlentities() and htmlspecialchars() (CVE-2006-5465) stable/main/binary-sparc/pdns-server_2.9.17-13sarge3_sparc.deb stable/main/binary-sparc/pdns-backend-geo_2.9.17-13sarge3_sparc.deb stable/main/binary-sparc/pdns-backend-sqlite_2.9.17-13sarge3_sparc.deb stable/main/binary-sparc/pdns-backend-pipe_2.9.17-13sarge3_sparc.deb stable/main/binary-sparc/pdns_2.9.17-13sarge3_sparc.deb stable/main/binary-sparc/pdns-backend-mysql_2.9.17-13sarge3_sparc.deb stable/main/binary-sparc/pdns-recursor_2.9.17-13sarge3_sparc.deb stable/main/binary-sparc/pdns-backend-ldap_2.9.17-13sarge3_sparc.deb stable/main/binary-sparc/pdns-backend-pgsql_2.9.17-13sarge3_sparc.deb pdns (2.9.17-13sarge3) stable-security; urgency=high * NMU by the Security Team: * Fix stack overflow in DNS recursor. stable/main/binary-s390/pdns_2.9.17-13sarge3_s390.deb stable/main/binary-s390/pdns-recursor_2.9.17-13sarge3_s390.deb stable/main/binary-s390/pdns-backend-pipe_2.9.17-13sarge3_s390.deb stable/main/binary-s390/pdns-backend-sqlite_2.9.17-13sarge3_s390.deb stable/main/binary-s390/pdns-backend-mysql_2.9.17-13sarge3_s390.deb stable/main/binary-s390/pdns-backend-geo_2.9.17-13sarge3_s390.deb stable/main/binary-s390/pdns-backend-pgsql_2.9.17-13sarge3_s390.deb stable/main/binary-s390/pdns-backend-ldap_2.9.17-13sarge3_s390.deb stable/main/binary-s390/pdns-server_2.9.17-13sarge3_s390.deb pdns (2.9.17-13sarge3) stable-security; urgency=high * NMU by the Security Team: * Fix stack overflow in DNS recursor. stable/main/binary-powerpc/pdns-backend-sqlite_2.9.17-13sarge3_powerpc.deb stable/main/binary-powerpc/pdns-backend-pgsql_2.9.17-13sarge3_powerpc.deb stable/main/binary-powerpc/pdns_2.9.17-13sarge3_powerpc.deb stable/main/binary-powerpc/pdns-backend-ldap_2.9.17-13sarge3_powerpc.deb stable/main/binary-powerpc/pdns-backend-geo_2.9.17-13sarge3_powerpc.deb stable/main/binary-powerpc/pdns-server_2.9.17-13sarge3_powerpc.deb stable/main/binary-powerpc/pdns-backend-pipe_2.9.17-13sarge3_powerpc.deb stable/main/binary-powerpc/pdns-backend-mysql_2.9.17-13sarge3_powerpc.deb stable/main/binary-powerpc/pdns-recursor_2.9.17-13sarge3_powerpc.deb pdns (2.9.17-13sarge3) stable-security; urgency=high * NMU by the Security Team: * Fix stack overflow in DNS recursor. stable/main/binary-mipsel/pdns_2.9.17-13sarge3_mipsel.deb stable/main/binary-mipsel/pdns-recursor_2.9.17-13sarge3_mipsel.deb stable/main/binary-mipsel/pdns-backend-pipe_2.9.17-13sarge3_mipsel.deb stable/main/binary-mipsel/pdns-server_2.9.17-13sarge3_mipsel.deb stable/main/binary-mipsel/pdns-backend-sqlite_2.9.17-13sarge3_mipsel.deb stable/main/binary-mipsel/pdns-backend-ldap_2.9.17-13sarge3_mipsel.deb stable/main/binary-mipsel/pdns-backend-mysql_2.9.17-13sarge3_mipsel.deb stable/main/binary-mipsel/pdns-backend-geo_2.9.17-13sarge3_mipsel.deb stable/main/binary-mipsel/pdns-backend-pgsql_2.9.17-13sarge3_mipsel.deb pdns (2.9.17-13sarge3) stable-security; urgency=high * NMU by the Security Team: * Fix stack overflow in DNS recursor. stable/main/binary-mips/pdns-backend-pipe_2.9.17-13sarge3_mips.deb stable/main/binary-mips/pdns-backend-ldap_2.9.17-13sarge3_mips.deb stable/main/binary-mips/pdns-backend-sqlite_2.9.17-13sarge3_mips.deb stable/main/binary-mips/pdns-recursor_2.9.17-13sarge3_mips.deb stable/main/binary-mips/pdns-backend-geo_2.9.17-13sarge3_mips.deb stable/main/binary-mips/pdns_2.9.17-13sarge3_mips.deb stable/main/binary-mips/pdns-server_2.9.17-13sarge3_mips.deb stable/main/binary-mips/pdns-backend-pgsql_2.9.17-13sarge3_mips.deb stable/main/binary-mips/pdns-backend-mysql_2.9.17-13sarge3_mips.deb pdns (2.9.17-13sarge3) stable-security; urgency=high * NMU by the Security Team: * Fix stack overflow in DNS recursor. stable/main/binary-m68k/pdns-backend-sqlite_2.9.17-13sarge3_m68k.deb stable/main/binary-m68k/pdns-backend-ldap_2.9.17-13sarge3_m68k.deb stable/main/binary-m68k/pdns-backend-mysql_2.9.17-13sarge3_m68k.deb stable/main/binary-m68k/pdns-backend-pgsql_2.9.17-13sarge3_m68k.deb stable/main/binary-m68k/pdns-backend-pipe_2.9.17-13sarge3_m68k.deb stable/main/binary-m68k/pdns-server_2.9.17-13sarge3_m68k.deb stable/main/binary-m68k/pdns-recursor_2.9.17-13sarge3_m68k.deb stable/main/binary-m68k/pdns_2.9.17-13sarge3_m68k.deb stable/main/binary-m68k/pdns-backend-geo_2.9.17-13sarge3_m68k.deb pdns (2.9.17-13sarge3) stable-security; urgency=high * NMU by the Security Team: * Fix stack overflow in DNS recursor. stable/main/binary-ia64/pdns-backend-ldap_2.9.17-13sarge3_ia64.deb stable/main/binary-ia64/pdns-backend-mysql_2.9.17-13sarge3_ia64.deb stable/main/binary-ia64/pdns-recursor_2.9.17-13sarge3_ia64.deb stable/main/binary-ia64/pdns-backend-pipe_2.9.17-13sarge3_ia64.deb stable/main/binary-ia64/pdns-backend-pgsql_2.9.17-13sarge3_ia64.deb stable/main/binary-ia64/pdns-backend-geo_2.9.17-13sarge3_ia64.deb stable/main/binary-ia64/pdns-backend-sqlite_2.9.17-13sarge3_ia64.deb stable/main/binary-ia64/pdns_2.9.17-13sarge3_ia64.deb stable/main/binary-ia64/pdns-server_2.9.17-13sarge3_ia64.deb pdns (2.9.17-13sarge3) stable-security; urgency=high * NMU by the Security Team: * Fix stack overflow in DNS recursor. stable/main/binary-hppa/pdns-backend-mysql_2.9.17-13sarge3_hppa.deb stable/main/binary-hppa/pdns_2.9.17-13sarge3_hppa.deb stable/main/binary-hppa/pdns-backend-pgsql_2.9.17-13sarge3_hppa.deb stable/main/binary-hppa/pdns-backend-geo_2.9.17-13sarge3_hppa.deb stable/main/binary-hppa/pdns-server_2.9.17-13sarge3_hppa.deb stable/main/binary-hppa/pdns-backend-pipe_2.9.17-13sarge3_hppa.deb stable/main/binary-hppa/pdns-recursor_2.9.17-13sarge3_hppa.deb stable/main/binary-hppa/pdns-backend-sqlite_2.9.17-13sarge3_hppa.deb stable/main/binary-hppa/pdns-backend-ldap_2.9.17-13sarge3_hppa.deb pdns (2.9.17-13sarge3) stable-security; urgency=high * NMU by the Security Team: * Fix stack overflow in DNS recursor. stable/main/binary-arm/pdns-backend-geo_2.9.17-13sarge3_arm.deb stable/main/binary-arm/pdns-backend-ldap_2.9.17-13sarge3_arm.deb stable/main/binary-arm/pdns-backend-pgsql_2.9.17-13sarge3_arm.deb stable/main/binary-arm/pdns-backend-mysql_2.9.17-13sarge3_arm.deb stable/main/binary-arm/pdns-recursor_2.9.17-13sarge3_arm.deb stable/main/binary-arm/pdns-backend-sqlite_2.9.17-13sarge3_arm.deb stable/main/binary-arm/pdns_2.9.17-13sarge3_arm.deb stable/main/binary-arm/pdns-backend-pipe_2.9.17-13sarge3_arm.deb stable/main/binary-arm/pdns-server_2.9.17-13sarge3_arm.deb pdns (2.9.17-13sarge3) stable-security; urgency=high * NMU by the Security Team: * Fix stack overflow in DNS recursor. stable/main/binary-alpha/pdns-backend-geo_2.9.17-13sarge3_alpha.deb stable/main/binary-alpha/pdns-backend-pgsql_2.9.17-13sarge3_alpha.deb stable/main/binary-alpha/pdns-recursor_2.9.17-13sarge3_alpha.deb stable/main/binary-alpha/pdns_2.9.17-13sarge3_alpha.deb stable/main/binary-alpha/pdns-backend-pipe_2.9.17-13sarge3_alpha.deb stable/main/binary-alpha/pdns-backend-sqlite_2.9.17-13sarge3_alpha.deb stable/main/binary-alpha/pdns-backend-mysql_2.9.17-13sarge3_alpha.deb stable/main/binary-alpha/pdns-server_2.9.17-13sarge3_alpha.deb stable/main/binary-alpha/pdns-backend-ldap_2.9.17-13sarge3_alpha.deb pdns (2.9.17-13sarge3) stable-security; urgency=high * NMU by the Security Team: * Fix stack overflow in DNS recursor. stable/main/binary-i386/pdns-server_2.9.17-13sarge3_i386.deb stable/main/binary-i386/pdns-backend-geo_2.9.17-13sarge3_i386.deb stable/main/source/pdns_2.9.17-13sarge3.diff.gz stable/main/binary-all/pdns-doc_2.9.17-13sarge3_all.deb stable/main/source/pdns_2.9.17-13sarge3.dsc stable/main/binary-i386/pdns-backend-mysql_2.9.17-13sarge3_i386.deb stable/main/binary-i386/pdns_2.9.17-13sarge3_i386.deb stable/main/binary-i386/pdns-backend-pgsql_2.9.17-13sarge3_i386.deb stable/main/binary-i386/pdns-backend-sqlite_2.9.17-13sarge3_i386.deb stable/main/binary-i386/pdns-backend-pipe_2.9.17-13sarge3_i386.deb stable/main/binary-i386/pdns-backend-ldap_2.9.17-13sarge3_i386.deb stable/main/binary-i386/pdns-recursor_2.9.17-13sarge3_i386.deb pdns (2.9.17-13sarge3) stable-security; urgency=high * NMU by the Security Team: * Fix stack overflow in DNS recursor. stable/main/binary-sparc/openvpn_2.0-1sarge4_sparc.deb openvpn (2.0-1sarge4) stable; urgency=low * Fixed bug in init.d script that made the restart action to fail, this was specially nasty when remotely upgrading the package through a VPN connection. (Reported in: #337951, #317339, #338162) stable/main/binary-s390/openvpn_2.0-1sarge4_s390.deb openvpn (2.0-1sarge4) stable; urgency=low * Fixed bug in init.d script that made the restart action to fail, this was specially nasty when remotely upgrading the package through a VPN connection. (Reported in: #337951, #317339, #338162) stable/main/binary-powerpc/openvpn_2.0-1sarge4_powerpc.deb openvpn (2.0-1sarge4) stable; urgency=low * Fixed bug in init.d script that made the restart action to fail, this was specially nasty when remotely upgrading the package through a VPN connection. (Reported in: #337951, #317339, #338162) stable/main/binary-mipsel/openvpn_2.0-1sarge4_mipsel.deb openvpn (2.0-1sarge4) stable; urgency=low * Fixed bug in init.d script that made the restart action to fail, this was specially nasty when remotely upgrading the package through a VPN connection. (Reported in: #337951, #317339, #338162) stable/main/binary-mips/openvpn_2.0-1sarge4_mips.deb openvpn (2.0-1sarge4) stable; urgency=low * Fixed bug in init.d script that made the restart action to fail, this was specially nasty when remotely upgrading the package through a VPN connection. (Reported in: #337951, #317339, #338162) stable/main/binary-m68k/openvpn_2.0-1sarge4_m68k.deb openvpn (2.0-1sarge4) stable; urgency=low * Fixed bug in init.d script that made the restart action to fail, this was specially nasty when remotely upgrading the package through a VPN connection. (Reported in: #337951, #317339, #338162) stable/main/binary-ia64/openvpn_2.0-1sarge4_ia64.deb openvpn (2.0-1sarge4) stable; urgency=low * Fixed bug in init.d script that made the restart action to fail, this was specially nasty when remotely upgrading the package through a VPN connection. (Reported in: #337951, #317339, #338162) stable/main/binary-hppa/openvpn_2.0-1sarge4_hppa.deb openvpn (2.0-1sarge4) stable; urgency=low * Fixed bug in init.d script that made the restart action to fail, this was specially nasty when remotely upgrading the package through a VPN connection. (Reported in: #337951, #317339, #338162) stable/main/binary-arm/openvpn_2.0-1sarge4_arm.deb openvpn (2.0-1sarge4) stable; urgency=low * Fixed bug in init.d script that made the restart action to fail, this was specially nasty when remotely upgrading the package through a VPN connection. (Reported in: #337951, #317339, #338162) stable/main/binary-alpha/openvpn_2.0-1sarge4_alpha.deb openvpn (2.0-1sarge4) stable; urgency=low * Fixed bug in init.d script that made the restart action to fail, this was specially nasty when remotely upgrading the package through a VPN connection. (Reported in: #337951, #317339, #338162) stable/main/binary-i386/openvpn_2.0-1sarge4_i386.deb stable/main/source/openvpn_2.0-1sarge4.diff.gz stable/main/source/openvpn_2.0-1sarge4.dsc openvpn (2.0-1sarge4) stable; urgency=low * Fixed bug in init.d script that made the restart action to fail, this was specially nasty when remotely upgrading the package through a VPN connection. (Reported in: #337951, #317339, #338162) stable/main/binary-sparc/ssh_3.8.1p1-8.sarge.6_sparc.deb stable/main/binary-sparc/openssh-server-udeb_3.8.1p1-8.sarge.6_sparc.udeb stable/main/binary-sparc/ssh-askpass-gnome_3.8.1p1-8.sarge.6_sparc.deb stable/main/binary-sparc/openssh-client-udeb_3.8.1p1-8.sarge.6_sparc.udeb openssh (1:3.8.1p1-8.sarge.6) stable-security; urgency=high * Non-maintainer upload by the Security team * Apply patch to correct a possible denial of service vulnerability caused by a signal handler race condition. CVE-2006-5051 stable/main/binary-s390/ssh-askpass-gnome_3.8.1p1-8.sarge.6_s390.deb stable/main/binary-s390/openssh-client-udeb_3.8.1p1-8.sarge.6_s390.udeb stable/main/binary-s390/ssh_3.8.1p1-8.sarge.6_s390.deb stable/main/binary-s390/openssh-server-udeb_3.8.1p1-8.sarge.6_s390.udeb openssh (1:3.8.1p1-8.sarge.6) stable-security; urgency=high * Non-maintainer upload by the Security team * Apply patch to correct a possible denial of service vulnerability caused by a signal handler race condition. CVE-2006-5051 stable/main/binary-powerpc/openssh-server-udeb_3.8.1p1-8.sarge.6_powerpc.udeb stable/main/binary-powerpc/ssh-askpass-gnome_3.8.1p1-8.sarge.6_powerpc.deb stable/main/binary-powerpc/ssh_3.8.1p1-8.sarge.6_powerpc.deb stable/main/binary-powerpc/openssh-client-udeb_3.8.1p1-8.sarge.6_powerpc.udeb openssh (1:3.8.1p1-8.sarge.6) stable-security; urgency=high * Non-maintainer upload by the Security team * Apply patch to correct a possible denial of service vulnerability caused by a signal handler race condition. CVE-2006-5051 stable/main/binary-mipsel/ssh-askpass-gnome_3.8.1p1-8.sarge.6_mipsel.deb stable/main/binary-mipsel/openssh-client-udeb_3.8.1p1-8.sarge.6_mipsel.udeb stable/main/binary-mipsel/openssh-server-udeb_3.8.1p1-8.sarge.6_mipsel.udeb stable/main/binary-mipsel/ssh_3.8.1p1-8.sarge.6_mipsel.deb openssh (1:3.8.1p1-8.sarge.6) stable-security; urgency=high * Non-maintainer upload by the Security team * Apply patch to correct a possible denial of service vulnerability caused by a signal handler race condition. CVE-2006-5051 stable/main/binary-mips/openssh-server-udeb_3.8.1p1-8.sarge.6_mips.udeb stable/main/binary-mips/ssh-askpass-gnome_3.8.1p1-8.sarge.6_mips.deb stable/main/binary-mips/openssh-client-udeb_3.8.1p1-8.sarge.6_mips.udeb stable/main/binary-mips/ssh_3.8.1p1-8.sarge.6_mips.deb openssh (1:3.8.1p1-8.sarge.6) stable-security; urgency=high * Non-maintainer upload by the Security team * Apply patch to correct a possible denial of service vulnerability caused by a signal handler race condition. CVE-2006-5051 stable/main/binary-m68k/openssh-server-udeb_3.8.1p1-8.sarge.6_m68k.udeb stable/main/binary-m68k/openssh-client-udeb_3.8.1p1-8.sarge.6_m68k.udeb stable/main/binary-m68k/ssh_3.8.1p1-8.sarge.6_m68k.deb stable/main/binary-m68k/ssh-askpass-gnome_3.8.1p1-8.sarge.6_m68k.deb openssh (1:3.8.1p1-8.sarge.6) stable-security; urgency=high * Non-maintainer upload by the Security team * Apply patch to correct a possible denial of service vulnerability caused by a signal handler race condition. CVE-2006-5051 stable/main/binary-ia64/openssh-server-udeb_3.8.1p1-8.sarge.6_ia64.udeb stable/main/binary-ia64/ssh-askpass-gnome_3.8.1p1-8.sarge.6_ia64.deb stable/main/binary-ia64/openssh-client-udeb_3.8.1p1-8.sarge.6_ia64.udeb stable/main/binary-ia64/ssh_3.8.1p1-8.sarge.6_ia64.deb openssh (1:3.8.1p1-8.sarge.6) stable-security; urgency=high * Non-maintainer upload by the Security team * Apply patch to correct a possible denial of service vulnerability caused by a signal handler race condition. CVE-2006-5051 stable/main/binary-hppa/openssh-client-udeb_3.8.1p1-8.sarge.6_hppa.udeb stable/main/binary-hppa/ssh-askpass-gnome_3.8.1p1-8.sarge.6_hppa.deb stable/main/binary-hppa/openssh-server-udeb_3.8.1p1-8.sarge.6_hppa.udeb stable/main/binary-hppa/ssh_3.8.1p1-8.sarge.6_hppa.deb openssh (1:3.8.1p1-8.sarge.6) stable-security; urgency=high * Non-maintainer upload by the Security team * Apply patch to correct a possible denial of service vulnerability caused by a signal handler race condition. CVE-2006-5051 stable/main/binary-arm/ssh_3.8.1p1-8.sarge.6_arm.deb stable/main/binary-arm/openssh-server-udeb_3.8.1p1-8.sarge.6_arm.udeb stable/main/binary-arm/ssh-askpass-gnome_3.8.1p1-8.sarge.6_arm.deb stable/main/binary-arm/openssh-client-udeb_3.8.1p1-8.sarge.6_arm.udeb openssh (1:3.8.1p1-8.sarge.6) stable-security; urgency=high * Non-maintainer upload by the Security team * Apply patch to correct a possible denial of service vulnerability caused by a signal handler race condition. CVE-2006-5051 stable/main/binary-alpha/openssh-server-udeb_3.8.1p1-8.sarge.6_alpha.udeb stable/main/binary-alpha/ssh-askpass-gnome_3.8.1p1-8.sarge.6_alpha.deb stable/main/binary-alpha/ssh_3.8.1p1-8.sarge.6_alpha.deb stable/main/binary-alpha/openssh-client-udeb_3.8.1p1-8.sarge.6_alpha.udeb openssh (1:3.8.1p1-8.sarge.6) stable-security; urgency=high * Non-maintainer upload by the Security team * Apply patch to correct a possible denial of service vulnerability caused by a signal handler race condition. CVE-2006-5051 stable/main/binary-i386/ssh_3.8.1p1-8.sarge.6_i386.deb stable/main/binary-i386/openssh-client-udeb_3.8.1p1-8.sarge.6_i386.udeb stable/main/source/openssh_3.8.1p1-8.sarge.6.dsc stable/main/binary-i386/ssh-askpass-gnome_3.8.1p1-8.sarge.6_i386.deb stable/main/binary-i386/openssh-server-udeb_3.8.1p1-8.sarge.6_i386.udeb stable/main/source/openssh_3.8.1p1-8.sarge.6.diff.gz openssh (1:3.8.1p1-8.sarge.6) stable-security; urgency=high * Non-maintainer upload by the Security team * Apply patch to correct a possible denial of service vulnerability caused by a signal handler race condition. CVE-2006-5051 stable/main/binary-s390/openoffice.org-dev_1.1.3-9sarge4_s390.deb stable/main/binary-s390/openoffice.org-evolution_1.1.3-9sarge4_s390.deb stable/main/binary-s390/openoffice.org-gtk-gnome_1.1.3-9sarge4_s390.deb stable/main/binary-s390/openoffice.org-kde_1.1.3-9sarge4_s390.deb stable/main/binary-s390/openoffice.org-bin_1.1.3-9sarge4_s390.deb openoffice.org (1.1.3-9sarge4) stable-security; urgency=high * ooo-build/patches/OOO_1_1/alloc.overflows.wmf.patch: fix WMF heap overflow (CVE-2006-5870) * move dh_fixperms in front of dh_strip to fix stripping problems on XFS stable/main/binary-powerpc/openoffice.org-bin_1.1.3-9sarge4_powerpc.deb stable/main/binary-powerpc/openoffice.org-kde_1.1.3-9sarge4_powerpc.deb stable/main/binary-powerpc/openoffice.org-gtk-gnome_1.1.3-9sarge4_powerpc.deb stable/main/binary-powerpc/openoffice.org-evolution_1.1.3-9sarge4_powerpc.deb stable/main/binary-powerpc/openoffice.org-dev_1.1.3-9sarge4_powerpc.deb openoffice.org (1.1.3-9sarge4) stable-security; urgency=high * ooo-build/patches/OOO_1_1/alloc.overflows.wmf.patch: fix WMF heap overflow (CVE-2006-5870) * move dh_fixperms in front of dh_strip to fix stripping problems on XFS stable/main/binary-all/openoffice.org-l10n-da_1.1.3-9sarge4_all.deb stable/main/binary-i386/openoffice.org-bin_1.1.3-9sarge4_i386.deb stable/main/binary-all/openoffice.org-l10n-pt-br_1.1.3-9sarge4_all.deb stable/main/binary-sparc/openoffice.org-bin_1.1.3-9sarge4_sparc.deb stable/main/binary-all/openoffice.org-l10n-hi_1.1.3-9sarge4_all.deb stable/main/binary-all/ttf-opensymbol_1.1.3-9sarge4_all.deb stable/main/binary-sparc/openoffice.org-dev_1.1.3-9sarge4_sparc.deb stable/main/source/openoffice.org_1.1.3-9sarge4.diff.gz stable/main/binary-all/openoffice.org-l10n-tn_1.1.3-9sarge4_all.deb stable/main/binary-all/openoffice.org-l10n-ru_1.1.3-9sarge4_all.deb stable/main/binary-i386/openoffice.org-gtk-gnome_1.1.3-9sarge4_i386.deb stable/main/binary-all/openoffice.org-l10n-sv_1.1.3-9sarge4_all.deb stable/main/binary-all/openoffice.org-l10n-ar_1.1.3-9sarge4_all.deb stable/main/binary-all/openoffice.org-l10n-zu_1.1.3-9sarge4_all.deb stable/main/binary-all/openoffice.org-l10n-he_1.1.3-9sarge4_all.deb stable/main/binary-all/openoffice.org-l10n-it_1.1.3-9sarge4_all.deb stable/main/binary-all/openoffice.org-l10n-pl_1.1.3-9sarge4_all.deb stable/main/binary-all/openoffice.org-l10n-kn_1.1.3-9sarge4_all.deb stable/main/binary-all/openoffice.org-l10n-gl_1.1.3-9sarge4_all.deb stable/main/binary-all/openoffice.org-l10n-tr_1.1.3-9sarge4_all.deb stable/main/binary-all/openoffice.org-l10n-zh-cn_1.1.3-9sarge4_all.deb stable/main/binary-all/openoffice.org-l10n-es_1.1.3-9sarge4_all.deb stable/main/binary-sparc/openoffice.org-gtk-gnome_1.1.3-9sarge4_sparc.deb stable/main/binary-all/openoffice.org-l10n-cy_1.1.3-9sarge4_all.deb stable/main/binary-all/openoffice.org-l10n-sl_1.1.3-9sarge4_all.deb stable/main/binary-all/openoffice.org_1.1.3-9sarge4_all.deb stable/main/binary-all/openoffice.org-l10n-lt_1.1.3-9sarge4_all.deb stable/main/binary-all/openoffice.org-l10n-hu_1.1.3-9sarge4_all.deb stable/main/binary-i386/openoffice.org-dev_1.1.3-9sarge4_i386.deb stable/main/binary-all/openoffice.org-l10n-cs_1.1.3-9sarge4_all.deb stable/main/binary-sparc/openoffice.org-evolution_1.1.3-9sarge4_sparc.deb stable/main/binary-all/openoffice.org-l10n-zh-tw_1.1.3-9sarge4_all.deb stable/main/binary-all/openoffice.org-l10n-ca_1.1.3-9sarge4_all.deb stable/main/binary-all/openoffice.org-mimelnk_1.1.3-9sarge4_all.deb stable/main/binary-all/openoffice.org-l10n-nl_1.1.3-9sarge4_all.deb stable/main/binary-all/openoffice.org-l10n-et_1.1.3-9sarge4_all.deb stable/main/binary-sparc/openoffice.org-kde_1.1.3-9sarge4_sparc.deb stable/main/binary-all/openoffice.org-l10n-nn_1.1.3-9sarge4_all.deb stable/main/binary-i386/openoffice.org-kde_1.1.3-9sarge4_i386.deb stable/main/binary-i386/openoffice.org-evolution_1.1.3-9sarge4_i386.deb stable/main/binary-all/openoffice.org-l10n-ns_1.1.3-9sarge4_all.deb stable/main/binary-all/openoffice.org-l10n-pt_1.1.3-9sarge4_all.deb stable/main/binary-all/openoffice.org-l10n-th_1.1.3-9sarge4_all.deb stable/main/binary-all/openoffice.org-l10n-ko_1.1.3-9sarge4_all.deb stable/main/binary-all/openoffice.org-l10n-nb_1.1.3-9sarge4_all.deb stable/main/binary-all/openoffice.org-l10n-ja_1.1.3-9sarge4_all.deb stable/main/binary-all/openoffice.org-l10n-fi_1.1.3-9sarge4_all.deb stable/main/binary-all/openoffice.org-l10n-af_1.1.3-9sarge4_all.deb stable/main/binary-all/openoffice.org-l10n-fr_1.1.3-9sarge4_all.deb stable/main/binary-all/openoffice.org-l10n-en_1.1.3-9sarge4_all.deb stable/main/binary-all/openoffice.org-l10n-eu_1.1.3-9sarge4_all.deb stable/main/source/openoffice.org_1.1.3-9sarge4.dsc stable/main/binary-all/openoffice.org-l10n-de_1.1.3-9sarge4_all.deb stable/main/binary-all/openoffice.org-l10n-sk_1.1.3-9sarge4_all.deb stable/main/binary-all/openoffice.org-l10n-el_1.1.3-9sarge4_all.deb stable/main/binary-all/openoffice.org-thesaurus-en-us_1.1.3-9sarge4_all.deb openoffice.org (1.1.3-9sarge4) stable-security; urgency=high * ooo-build/patches/OOO_1_1/alloc.overflows.wmf.patch: fix WMF heap overflow (CVE-2006-5870) * move dh_fixperms in front of dh_strip to fix stripping problems on XFS stable/main/binary-sparc/netrik_1.15.3-1sarge1_sparc.deb netrik (1.15.3-1sarge1) stable-security; urgency=high * Non-maintainer upload by The Security Team. * Properly sanitize filenames used for editing form fields. [CVE-2006-6678] stable/main/binary-s390/netrik_1.15.3-1sarge1_s390.deb netrik (1.15.3-1sarge1) stable-security; urgency=high * Non-maintainer upload by The Security Team. * Properly sanitize filenames used for editing form fields. [CVE-2006-6678] stable/main/binary-powerpc/netrik_1.15.3-1sarge1_powerpc.deb netrik (1.15.3-1sarge1) stable-security; urgency=high * Non-maintainer upload by The Security Team. * Properly sanitize filenames used for editing form fields. [CVE-2006-6678] stable/main/binary-mipsel/netrik_1.15.3-1sarge1_mipsel.deb netrik (1.15.3-1sarge1) stable-security; urgency=high * Non-maintainer upload by The Security Team. * Properly sanitize filenames used for editing form fields. [CVE-2006-6678] stable/main/binary-mips/netrik_1.15.3-1sarge1_mips.deb netrik (1.15.3-1sarge1) stable-security; urgency=high * Non-maintainer upload by The Security Team. * Properly sanitize filenames used for editing form fields. [CVE-2006-6678] stable/main/binary-m68k/netrik_1.15.3-1sarge1_m68k.deb netrik (1.15.3-1sarge1) stable-security; urgency=high * Non-maintainer upload by The Security Team. * Properly sanitize filenames used for editing form fields. [CVE-2006-6678] stable/main/binary-ia64/netrik_1.15.3-1sarge1_ia64.deb netrik (1.15.3-1sarge1) stable-security; urgency=high * Non-maintainer upload by The Security Team. * Properly sanitize filenames used for editing form fields. [CVE-2006-6678] stable/main/binary-hppa/netrik_1.15.3-1sarge1_hppa.deb netrik (1.15.3-1sarge1) stable-security; urgency=high * Non-maintainer upload by The Security Team. * Properly sanitize filenames used for editing form fields. [CVE-2006-6678] stable/main/binary-arm/netrik_1.15.3-1sarge1_arm.deb netrik (1.15.3-1sarge1) stable-security; urgency=high * Non-maintainer upload by The Security Team. * Properly sanitize filenames used for editing form fields. [CVE-2006-6678] stable/main/binary-alpha/netrik_1.15.3-1sarge1_alpha.deb netrik (1.15.3-1sarge1) stable-security; urgency=high * Non-maintainer upload by The Security Team. * Properly sanitize filenames used for editing form fields. [CVE-2006-6678] stable/main/source/netrik_1.15.3-1sarge1.dsc stable/main/binary-i386/netrik_1.15.3-1sarge1_i386.deb stable/main/source/netrik_1.15.3-1sarge1.diff.gz netrik (1.15.3-1sarge1) stable-security; urgency=high * Non-maintainer upload by The Security Team. * Properly sanitize filenames used for editing form fields. [CVE-2006-6678] stable/main/binary-sparc/mozilla-thunderbird-dev_1.0.2-2.sarge1.0.8e.2_sparc.deb stable/main/binary-sparc/mozilla-thunderbird_1.0.2-2.sarge1.0.8e.2_sparc.deb stable/main/binary-sparc/mozilla-thunderbird-typeaheadfind_1.0.2-2.sarge1.0.8e.2_sparc.deb stable/main/binary-sparc/mozilla-thunderbird-offline_1.0.2-2.sarge1.0.8e.2_sparc.deb stable/main/binary-sparc/mozilla-thunderbird-inspector_1.0.2-2.sarge1.0.8e.2_sparc.deb mozilla-thunderbird (1.0.2-2.sarge1.0.8e.2) stable-security; urgency=critical * fix regression in 0015-MFSA-2006-68-CVE-2006-6497-Part-3-348304.txt stable/main/binary-s390/mozilla-thunderbird-inspector_1.0.2-2.sarge1.0.8e.2_s390.deb stable/main/binary-s390/mozilla-thunderbird_1.0.2-2.sarge1.0.8e.2_s390.deb stable/main/binary-s390/mozilla-thunderbird-typeaheadfind_1.0.2-2.sarge1.0.8e.2_s390.deb stable/main/binary-s390/mozilla-thunderbird-offline_1.0.2-2.sarge1.0.8e.2_s390.deb stable/main/binary-s390/mozilla-thunderbird-dev_1.0.2-2.sarge1.0.8e.2_s390.deb mozilla-thunderbird (1.0.2-2.sarge1.0.8e.2) stable-security; urgency=critical * fix regression in 0015-MFSA-2006-68-CVE-2006-6497-Part-3-348304.txt stable/main/binary-powerpc/mozilla-thunderbird-offline_1.0.2-2.sarge1.0.8e.2_powerpc.deb stable/main/binary-powerpc/mozilla-thunderbird-dev_1.0.2-2.sarge1.0.8e.2_powerpc.deb stable/main/binary-powerpc/mozilla-thunderbird-inspector_1.0.2-2.sarge1.0.8e.2_powerpc.deb stable/main/binary-powerpc/mozilla-thunderbird-typeaheadfind_1.0.2-2.sarge1.0.8e.2_powerpc.deb stable/main/binary-powerpc/mozilla-thunderbird_1.0.2-2.sarge1.0.8e.2_powerpc.deb mozilla-thunderbird (1.0.2-2.sarge1.0.8e.2) stable-security; urgency=critical * fix regression in 0015-MFSA-2006-68-CVE-2006-6497-Part-3-348304.txt stable/main/binary-mipsel/mozilla-thunderbird-typeaheadfind_1.0.2-2.sarge1.0.8e.2_mipsel.deb stable/main/binary-mipsel/mozilla-thunderbird_1.0.2-2.sarge1.0.8e.2_mipsel.deb stable/main/binary-mipsel/mozilla-thunderbird-inspector_1.0.2-2.sarge1.0.8e.2_mipsel.deb stable/main/binary-mipsel/mozilla-thunderbird-offline_1.0.2-2.sarge1.0.8e.2_mipsel.deb stable/main/binary-mipsel/mozilla-thunderbird-dev_1.0.2-2.sarge1.0.8e.2_mipsel.deb mozilla-thunderbird (1.0.2-2.sarge1.0.8e.2) stable-security; urgency=critical * fix regression in 0015-MFSA-2006-68-CVE-2006-6497-Part-3-348304.txt stable/main/binary-mips/mozilla-thunderbird-typeaheadfind_1.0.2-2.sarge1.0.8e.2_mips.deb stable/main/binary-mips/mozilla-thunderbird-offline_1.0.2-2.sarge1.0.8e.2_mips.deb stable/main/binary-mips/mozilla-thunderbird_1.0.2-2.sarge1.0.8e.2_mips.deb stable/main/binary-mips/mozilla-thunderbird-inspector_1.0.2-2.sarge1.0.8e.2_mips.deb stable/main/binary-mips/mozilla-thunderbird-dev_1.0.2-2.sarge1.0.8e.2_mips.deb mozilla-thunderbird (1.0.2-2.sarge1.0.8e.2) stable-security; urgency=critical * fix regression in 0015-MFSA-2006-68-CVE-2006-6497-Part-3-348304.txt stable/main/binary-m68k/mozilla-thunderbird-inspector_1.0.2-2.sarge1.0.8e.2_m68k.deb stable/main/binary-m68k/mozilla-thunderbird-typeaheadfind_1.0.2-2.sarge1.0.8e.2_m68k.deb stable/main/binary-m68k/mozilla-thunderbird-offline_1.0.2-2.sarge1.0.8e.2_m68k.deb stable/main/binary-m68k/mozilla-thunderbird-dev_1.0.2-2.sarge1.0.8e.2_m68k.deb stable/main/binary-m68k/mozilla-thunderbird_1.0.2-2.sarge1.0.8e.2_m68k.deb mozilla-thunderbird (1.0.2-2.sarge1.0.8e.2) stable-security; urgency=critical * fix regression in 0015-MFSA-2006-68-CVE-2006-6497-Part-3-348304.txt stable/main/binary-ia64/mozilla-thunderbird-inspector_1.0.2-2.sarge1.0.8e.2_ia64.deb stable/main/binary-ia64/mozilla-thunderbird-offline_1.0.2-2.sarge1.0.8e.2_ia64.deb stable/main/binary-ia64/mozilla-thunderbird-typeaheadfind_1.0.2-2.sarge1.0.8e.2_ia64.deb stable/main/binary-ia64/mozilla-thunderbird_1.0.2-2.sarge1.0.8e.2_ia64.deb stable/main/binary-ia64/mozilla-thunderbird-dev_1.0.2-2.sarge1.0.8e.2_ia64.deb mozilla-thunderbird (1.0.2-2.sarge1.0.8e.2) stable-security; urgency=critical * fix regression in 0015-MFSA-2006-68-CVE-2006-6497-Part-3-348304.txt stable/main/binary-hppa/mozilla-thunderbird_1.0.2-2.sarge1.0.8e.2_hppa.deb stable/main/binary-hppa/mozilla-thunderbird-dev_1.0.2-2.sarge1.0.8e.2_hppa.deb stable/main/binary-hppa/mozilla-thunderbird-offline_1.0.2-2.sarge1.0.8e.2_hppa.deb stable/main/binary-hppa/mozilla-thunderbird-typeaheadfind_1.0.2-2.sarge1.0.8e.2_hppa.deb stable/main/binary-hppa/mozilla-thunderbird-inspector_1.0.2-2.sarge1.0.8e.2_hppa.deb mozilla-thunderbird (1.0.2-2.sarge1.0.8e.2) stable-security; urgency=critical * fix regression in 0015-MFSA-2006-68-CVE-2006-6497-Part-3-348304.txt stable/main/binary-arm/mozilla-thunderbird_1.0.2-2.sarge1.0.8e.2_arm.deb stable/main/binary-arm/mozilla-thunderbird-inspector_1.0.2-2.sarge1.0.8e.2_arm.deb stable/main/binary-arm/mozilla-thunderbird-typeaheadfind_1.0.2-2.sarge1.0.8e.2_arm.deb stable/main/binary-arm/mozilla-thunderbird-dev_1.0.2-2.sarge1.0.8e.2_arm.deb stable/main/binary-arm/mozilla-thunderbird-offline_1.0.2-2.sarge1.0.8e.2_arm.deb mozilla-thunderbird (1.0.2-2.sarge1.0.8e.2) stable-security; urgency=critical * fix regression in 0015-MFSA-2006-68-CVE-2006-6497-Part-3-348304.txt stable/main/binary-alpha/mozilla-thunderbird-offline_1.0.2-2.sarge1.0.8e.2_alpha.deb stable/main/binary-alpha/mozilla-thunderbird_1.0.2-2.sarge1.0.8e.2_alpha.deb stable/main/binary-alpha/mozilla-thunderbird-inspector_1.0.2-2.sarge1.0.8e.2_alpha.deb stable/main/binary-alpha/mozilla-thunderbird-dev_1.0.2-2.sarge1.0.8e.2_alpha.deb stable/main/binary-alpha/mozilla-thunderbird-typeaheadfind_1.0.2-2.sarge1.0.8e.2_alpha.deb mozilla-thunderbird (1.0.2-2.sarge1.0.8e.2) stable-security; urgency=critical * fix regression in 0015-MFSA-2006-68-CVE-2006-6497-Part-3-348304.txt stable/main/source/mozilla-thunderbird_1.0.2-2.sarge1.0.8e.2.diff.gz stable/main/binary-i386/mozilla-thunderbird-dev_1.0.2-2.sarge1.0.8e.2_i386.deb stable/main/binary-i386/mozilla-thunderbird_1.0.2-2.sarge1.0.8e.2_i386.deb stable/main/binary-i386/mozilla-thunderbird-inspector_1.0.2-2.sarge1.0.8e.2_i386.deb stable/main/binary-i386/mozilla-thunderbird-typeaheadfind_1.0.2-2.sarge1.0.8e.2_i386.deb stable/main/source/mozilla-thunderbird_1.0.2-2.sarge1.0.8e.2.dsc stable/main/binary-i386/mozilla-thunderbird-offline_1.0.2-2.sarge1.0.8e.2_i386.deb mozilla-thunderbird (1.0.2-2.sarge1.0.8e.2) stable-security; urgency=critical * fix regression in 0015-MFSA-2006-68-CVE-2006-6497-Part-3-348304.txt mozilla-thunderbird (1.0.2-2.sarge1.0.8e.1) stable-security; urgency=critical * Security update fixing issued announced together with release of tbird 1.5.0.9 * 0001-MFSA-2006-68-CVE-2006-6497-Part-1-335047.txt, 0002-MFSA-2006-68-CVE-2006-6497-Part-2-339494.txt, 0003-MFSA-2006-68-CVE-2006-6497-Part-4-354766.txt, 0005-MFSA-2006-68-CVE-2006-6497-Part-5-359203.txt, 0006-MFSA-2006-68-CVE-2006-6497-Part-6-360642.txt, 0015-MFSA-2006-68-CVE-2006-6497-Part-3-348304.txt: Fixes for CVE-2006-6497 aka first part of mfsa2006-68 (Crashes with evidence of memory corruption in layout engine) * 0007-MFSA-2006-68-CVE-2006-6498-Part-1-352846.txt, 0008-MFSA-2006-68-CVE-2006-6498-Part-2-361346.txt: Fixes for CVE-2006-6498 aka second part of mfsa2006-68 (Crashes with evidence of memory corruption in java script engine) * 0014-MFSA-2006-68-CVE-2006-6499-358569.txt: Fix for CVE-2006-6499 aka thirs part of mfsa 2006-69 (Crashes with evidence of memory corruption on floating point reduction. * 0009-MFSA-2006-70-CVE-2006-6501-354978-r361964.txt: Fix for "Privilege escallation using watch point", CVE-2006-6501 aka mfsa-2006-70. * 0010-MFSA-2006-71-CVE-2006-6502-352064.txt: Fix for "LiveConnect crash finalizing JS objects", CVE-2006-6502 aka mfsa-2006-71. * 0011-MFSA-2006-72-CVE-2006-6503-351370.txt: Fix for "XSS by setting img.src to javascript: URI", CVE-2006-6503 aka mfsa-2006-72. * 0012-MFSA-2006-74-CVE-2006-6505-Part-1-2-362213.txt, 0013-MFSA-2006-74-CVE-2006-6505-Part-2-2-362512.txt: Fix for "Mail header processing heap overflows", CVE-2006-6505 aka mfsa2006-74. stable/main/binary-sparc/mozilla-firefox-dom-inspector_1.0.4-2sarge15_sparc.deb stable/main/binary-sparc/mozilla-firefox_1.0.4-2sarge15_sparc.deb stable/main/binary-sparc/mozilla-firefox-gnome-support_1.0.4-2sarge15_sparc.deb mozilla-firefox (1.0.4-2sarge15) stable-security; urgency=critical * layout/xul/base/src/nsMenuFrame.cpp: Fix for regression from Alexander Sack. stable/main/binary-s390/mozilla-firefox-gnome-support_1.0.4-2sarge15_s390.deb stable/main/binary-s390/mozilla-firefox-dom-inspector_1.0.4-2sarge15_s390.deb stable/main/binary-s390/mozilla-firefox_1.0.4-2sarge15_s390.deb mozilla-firefox (1.0.4-2sarge15) stable-security; urgency=critical * layout/xul/base/src/nsMenuFrame.cpp: Fix for regression from Alexander Sack. stable/main/binary-powerpc/mozilla-firefox_1.0.4-2sarge15_powerpc.deb stable/main/binary-powerpc/mozilla-firefox-dom-inspector_1.0.4-2sarge15_powerpc.deb stable/main/binary-powerpc/mozilla-firefox-gnome-support_1.0.4-2sarge15_powerpc.deb mozilla-firefox (1.0.4-2sarge15) stable-security; urgency=critical * layout/xul/base/src/nsMenuFrame.cpp: Fix for regression from Alexander Sack. stable/main/binary-mipsel/mozilla-firefox_1.0.4-2sarge15_mipsel.deb stable/main/binary-mipsel/mozilla-firefox-gnome-support_1.0.4-2sarge15_mipsel.deb stable/main/binary-mipsel/mozilla-firefox-dom-inspector_1.0.4-2sarge15_mipsel.deb mozilla-firefox (1.0.4-2sarge15) stable-security; urgency=critical * layout/xul/base/src/nsMenuFrame.cpp: Fix for regression from Alexander Sack. stable/main/binary-mips/mozilla-firefox-dom-inspector_1.0.4-2sarge15_mips.deb stable/main/binary-mips/mozilla-firefox_1.0.4-2sarge15_mips.deb stable/main/binary-mips/mozilla-firefox-gnome-support_1.0.4-2sarge15_mips.deb mozilla-firefox (1.0.4-2sarge15) stable-security; urgency=critical * layout/xul/base/src/nsMenuFrame.cpp: Fix for regression from Alexander Sack. stable/main/binary-m68k/mozilla-firefox_1.0.4-2sarge15_m68k.deb stable/main/binary-m68k/mozilla-firefox-dom-inspector_1.0.4-2sarge15_m68k.deb stable/main/binary-m68k/mozilla-firefox-gnome-support_1.0.4-2sarge15_m68k.deb mozilla-firefox (1.0.4-2sarge15) stable-security; urgency=critical * layout/xul/base/src/nsMenuFrame.cpp: Fix for regression from Alexander Sack. stable/main/binary-ia64/mozilla-firefox-gnome-support_1.0.4-2sarge15_ia64.deb stable/main/binary-ia64/mozilla-firefox_1.0.4-2sarge15_ia64.deb stable/main/binary-ia64/mozilla-firefox-dom-inspector_1.0.4-2sarge15_ia64.deb mozilla-firefox (1.0.4-2sarge15) stable-security; urgency=critical * layout/xul/base/src/nsMenuFrame.cpp: Fix for regression from Alexander Sack. stable/main/binary-hppa/mozilla-firefox-gnome-support_1.0.4-2sarge15_hppa.deb stable/main/binary-hppa/mozilla-firefox-dom-inspector_1.0.4-2sarge15_hppa.deb stable/main/binary-hppa/mozilla-firefox_1.0.4-2sarge15_hppa.deb mozilla-firefox (1.0.4-2sarge15) stable-security; urgency=critical * layout/xul/base/src/nsMenuFrame.cpp: Fix for regression from Alexander Sack. stable/main/binary-arm/mozilla-firefox-gnome-support_1.0.4-2sarge15_arm.deb stable/main/binary-arm/mozilla-firefox-dom-inspector_1.0.4-2sarge15_arm.deb stable/main/binary-arm/mozilla-firefox_1.0.4-2sarge15_arm.deb mozilla-firefox (1.0.4-2sarge15) stable-security; urgency=critical * layout/xul/base/src/nsMenuFrame.cpp: Fix for regression from Alexander Sack. stable/main/binary-alpha/mozilla-firefox-gnome-support_1.0.4-2sarge15_alpha.deb stable/main/binary-alpha/mozilla-firefox-dom-inspector_1.0.4-2sarge15_alpha.deb stable/main/binary-alpha/mozilla-firefox_1.0.4-2sarge15_alpha.deb mozilla-firefox (1.0.4-2sarge15) stable-security; urgency=critical * layout/xul/base/src/nsMenuFrame.cpp: Fix for regression from Alexander Sack. stable/main/source/mozilla-firefox_1.0.4-2sarge15.dsc stable/main/binary-i386/mozilla-firefox-gnome-support_1.0.4-2sarge15_i386.deb stable/main/binary-i386/mozilla-firefox_1.0.4-2sarge15_i386.deb stable/main/source/mozilla-firefox_1.0.4-2sarge15.diff.gz stable/main/binary-i386/mozilla-firefox-dom-inspector_1.0.4-2sarge15_i386.deb mozilla-firefox (1.0.4-2sarge15) stable-security; urgency=critical * layout/xul/base/src/nsMenuFrame.cpp: Fix for regression from Alexander Sack. stable/main/binary-sparc/mozilla-calendar_1.7.8-1sarge8_sparc.deb stable/main/binary-sparc/mozilla-mailnews_1.7.8-1sarge8_sparc.deb stable/main/binary-sparc/mozilla-dev_1.7.8-1sarge8_sparc.deb stable/main/binary-sparc/mozilla-dom-inspector_1.7.8-1sarge8_sparc.deb stable/main/binary-sparc/libnss-dev_1.7.8-1sarge8_sparc.deb stable/main/binary-sparc/libnspr4_1.7.8-1sarge8_sparc.deb stable/main/binary-sparc/mozilla-psm_1.7.8-1sarge8_sparc.deb stable/main/binary-sparc/mozilla-browser_1.7.8-1sarge8_sparc.deb stable/main/binary-sparc/libnss3_1.7.8-1sarge8_sparc.deb stable/main/binary-sparc/mozilla_1.7.8-1sarge8_sparc.deb stable/main/binary-sparc/mozilla-js-debugger_1.7.8-1sarge8_sparc.deb stable/main/binary-sparc/libnspr-dev_1.7.8-1sarge8_sparc.deb stable/main/binary-sparc/mozilla-chatzilla_1.7.8-1sarge8_sparc.deb mozilla (2:1.7.8-1sarge8) stable-security; urgency=critical * Security update to backport the fixes from Mozilla branch 1.8.0.8. * 4_0014-MFSA2006-65-CVE-2006-5464-Part-1-310267.patch, 4_0015-MFSA2006-65-CVE-2006-5464-Part-2-350370.patch, 4_0016-MFSA2006-65-CVE-2006-5464-Part-3-307809.patch, 4_0018-MFSA2006-65-CVE-2006-5464-Part-4-351328.patch: Fixes for CVE-2006-5464 aka first part of mfsa2006-65 (Crashes with evidence of memory corruption (rv:1.8.0.8)). * 4_0001-MFSA2006-65-CVE-2006-5748-Part-1-350238.patch, 4_0002-MFSA2006-65-CVE-2006-5748-Part-2-351973.patch, 4_0005-MFSA2006-65-CVE-2006-5748-Part-3-352606.patch, 4_0008-MFSA2006-65-CVE-2006-5748-Part-4-349527.patch, 4_0010-MFSA2006-65-CVE-2006-5748-Part-5-354924.patch: Fixes for CVE-2006-5748 aka last part of mfsa2006-65 (Crashes with evidence of memory corruption (rv:1.8.0.8)). * 4_0019-MFSA2006-66-CVE-2006-5462-356215.patch: Fix for "RSA Signature Forgery (variant)", CVE-2006-5462 aka mfsa2006-66. * 4_0020-MFSA2006-67-CVE-2006-5463-355655.patch: Fix for "Running Script can be recompiled", CVE-2006-5463 aka mfsa2006-67. * 4_0006-noMFSA-CVE-2006-4310-351255.patch: Fix for CVE-2006-4310 (Remote DOS in FTP error handling), from bz#351255. * 4_0003-noMFSA-353264.patch, 4_0011-noMFSA-313400.patch, 4_0012-noMFSA-353704.patch, 4_0013-noMFSA-352264.patch, 4_0017-noMFSA-350524.patch: Many patches to fix crashes that can be triggered by malicious pages, no mfsa. bz#313400, bz#350524, bz#352264, bz#353264, bz#353704. * 4_0004-noMFSA-regression-fix-352873.patch: Fixes a regression introduced by a previous security update. bz#352873. * 4_0007-noMFSA-337744.patch: Protocol parsing tightening to avoid reading from the filesystem by unexpected resource or chrome urls. bz#337744. * 4_0009-noMFSA-334110.patch: A fix that goes along fixing a buffer overflow in libpng. bz#334110. stable/main/binary-s390/mozilla_1.7.8-1sarge8_s390.deb stable/main/binary-s390/mozilla-psm_1.7.8-1sarge8_s390.deb stable/main/binary-s390/libnspr4_1.7.8-1sarge8_s390.deb stable/main/binary-s390/mozilla-browser_1.7.8-1sarge8_s390.deb stable/main/binary-s390/mozilla-js-debugger_1.7.8-1sarge8_s390.deb stable/main/binary-s390/mozilla-chatzilla_1.7.8-1sarge8_s390.deb stable/main/binary-s390/libnss3_1.7.8-1sarge8_s390.deb stable/main/binary-s390/mozilla-dom-inspector_1.7.8-1sarge8_s390.deb stable/main/binary-s390/libnss-dev_1.7.8-1sarge8_s390.deb stable/main/binary-s390/mozilla-mailnews_1.7.8-1sarge8_s390.deb stable/main/binary-s390/mozilla-dev_1.7.8-1sarge8_s390.deb stable/main/binary-s390/libnspr-dev_1.7.8-1sarge8_s390.deb stable/main/binary-s390/mozilla-calendar_1.7.8-1sarge8_s390.deb mozilla (2:1.7.8-1sarge8) stable-security; urgency=critical * Security update to backport the fixes from Mozilla branch 1.8.0.8. * 4_0014-MFSA2006-65-CVE-2006-5464-Part-1-310267.patch, 4_0015-MFSA2006-65-CVE-2006-5464-Part-2-350370.patch, 4_0016-MFSA2006-65-CVE-2006-5464-Part-3-307809.patch, 4_0018-MFSA2006-65-CVE-2006-5464-Part-4-351328.patch: Fixes for CVE-2006-5464 aka first part of mfsa2006-65 (Crashes with evidence of memory corruption (rv:1.8.0.8)). * 4_0001-MFSA2006-65-CVE-2006-5748-Part-1-350238.patch, 4_0002-MFSA2006-65-CVE-2006-5748-Part-2-351973.patch, 4_0005-MFSA2006-65-CVE-2006-5748-Part-3-352606.patch, 4_0008-MFSA2006-65-CVE-2006-5748-Part-4-349527.patch, 4_0010-MFSA2006-65-CVE-2006-5748-Part-5-354924.patch: Fixes for CVE-2006-5748 aka last part of mfsa2006-65 (Crashes with evidence of memory corruption (rv:1.8.0.8)). * 4_0019-MFSA2006-66-CVE-2006-5462-356215.patch: Fix for "RSA Signature Forgery (variant)", CVE-2006-5462 aka mfsa2006-66. * 4_0020-MFSA2006-67-CVE-2006-5463-355655.patch: Fix for "Running Script can be recompiled", CVE-2006-5463 aka mfsa2006-67. * 4_0006-noMFSA-CVE-2006-4310-351255.patch: Fix for CVE-2006-4310 (Remote DOS in FTP error handling), from bz#351255. * 4_0003-noMFSA-353264.patch, 4_0011-noMFSA-313400.patch, 4_0012-noMFSA-353704.patch, 4_0013-noMFSA-352264.patch, 4_0017-noMFSA-350524.patch: Many patches to fix crashes that can be triggered by malicious pages, no mfsa. bz#313400, bz#350524, bz#352264, bz#353264, bz#353704. * 4_0004-noMFSA-regression-fix-352873.patch: Fixes a regression introduced by a previous security update. bz#352873. * 4_0007-noMFSA-337744.patch: Protocol parsing tightening to avoid reading from the filesystem by unexpected resource or chrome urls. bz#337744. * 4_0009-noMFSA-334110.patch: A fix that goes along fixing a buffer overflow in libpng. bz#334110. stable/main/binary-powerpc/mozilla-calendar_1.7.8-1sarge8_powerpc.deb stable/main/binary-powerpc/libnspr4_1.7.8-1sarge8_powerpc.deb stable/main/binary-powerpc/libnss-dev_1.7.8-1sarge8_powerpc.deb stable/main/binary-powerpc/mozilla-psm_1.7.8-1sarge8_powerpc.deb stable/main/binary-powerpc/mozilla-js-debugger_1.7.8-1sarge8_powerpc.deb stable/main/binary-powerpc/libnss3_1.7.8-1sarge8_powerpc.deb stable/main/binary-powerpc/mozilla-browser_1.7.8-1sarge8_powerpc.deb stable/main/binary-powerpc/mozilla_1.7.8-1sarge8_powerpc.deb stable/main/binary-powerpc/mozilla-dom-inspector_1.7.8-1sarge8_powerpc.deb stable/main/binary-powerpc/mozilla-mailnews_1.7.8-1sarge8_powerpc.deb stable/main/binary-powerpc/mozilla-dev_1.7.8-1sarge8_powerpc.deb stable/main/binary-powerpc/mozilla-chatzilla_1.7.8-1sarge8_powerpc.deb stable/main/binary-powerpc/libnspr-dev_1.7.8-1sarge8_powerpc.deb mozilla (2:1.7.8-1sarge8) stable-security; urgency=critical * Security update to backport the fixes from Mozilla branch 1.8.0.8. * 4_0014-MFSA2006-65-CVE-2006-5464-Part-1-310267.patch, 4_0015-MFSA2006-65-CVE-2006-5464-Part-2-350370.patch, 4_0016-MFSA2006-65-CVE-2006-5464-Part-3-307809.patch, 4_0018-MFSA2006-65-CVE-2006-5464-Part-4-351328.patch: Fixes for CVE-2006-5464 aka first part of mfsa2006-65 (Crashes with evidence of memory corruption (rv:1.8.0.8)). * 4_0001-MFSA2006-65-CVE-2006-5748-Part-1-350238.patch, 4_0002-MFSA2006-65-CVE-2006-5748-Part-2-351973.patch, 4_0005-MFSA2006-65-CVE-2006-5748-Part-3-352606.patch, 4_0008-MFSA2006-65-CVE-2006-5748-Part-4-349527.patch, 4_0010-MFSA2006-65-CVE-2006-5748-Part-5-354924.patch: Fixes for CVE-2006-5748 aka last part of mfsa2006-65 (Crashes with evidence of memory corruption (rv:1.8.0.8)). * 4_0019-MFSA2006-66-CVE-2006-5462-356215.patch: Fix for "RSA Signature Forgery (variant)", CVE-2006-5462 aka mfsa2006-66. * 4_0020-MFSA2006-67-CVE-2006-5463-355655.patch: Fix for "Running Script can be recompiled", CVE-2006-5463 aka mfsa2006-67. * 4_0006-noMFSA-CVE-2006-4310-351255.patch: Fix for CVE-2006-4310 (Remote DOS in FTP error handling), from bz#351255. * 4_0003-noMFSA-353264.patch, 4_0011-noMFSA-313400.patch, 4_0012-noMFSA-353704.patch, 4_0013-noMFSA-352264.patch, 4_0017-noMFSA-350524.patch: Many patches to fix crashes that can be triggered by malicious pages, no mfsa. bz#313400, bz#350524, bz#352264, bz#353264, bz#353704. * 4_0004-noMFSA-regression-fix-352873.patch: Fixes a regression introduced by a previous security update. bz#352873. * 4_0007-noMFSA-337744.patch: Protocol parsing tightening to avoid reading from the filesystem by unexpected resource or chrome urls. bz#337744. * 4_0009-noMFSA-334110.patch: A fix that goes along fixing a buffer overflow in libpng. bz#334110. stable/main/binary-mipsel/mozilla-dev_1.7.8-1sarge8_mipsel.deb stable/main/binary-mipsel/mozilla-browser_1.7.8-1sarge8_mipsel.deb stable/main/binary-mipsel/mozilla-js-debugger_1.7.8-1sarge8_mipsel.deb stable/main/binary-mipsel/mozilla-psm_1.7.8-1sarge8_mipsel.deb stable/main/binary-mipsel/libnss-dev_1.7.8-1sarge8_mipsel.deb stable/main/binary-mipsel/libnspr4_1.7.8-1sarge8_mipsel.deb stable/main/binary-mipsel/mozilla-calendar_1.7.8-1sarge8_mipsel.deb stable/main/binary-mipsel/libnspr-dev_1.7.8-1sarge8_mipsel.deb stable/main/binary-mipsel/mozilla-chatzilla_1.7.8-1sarge8_mipsel.deb stable/main/binary-mipsel/mozilla-dom-inspector_1.7.8-1sarge8_mipsel.deb stable/main/binary-mipsel/mozilla-mailnews_1.7.8-1sarge8_mipsel.deb stable/main/binary-mipsel/libnss3_1.7.8-1sarge8_mipsel.deb stable/main/binary-mipsel/mozilla_1.7.8-1sarge8_mipsel.deb mozilla (2:1.7.8-1sarge8) stable-security; urgency=critical * Security update to backport the fixes from Mozilla branch 1.8.0.8. * 4_0014-MFSA2006-65-CVE-2006-5464-Part-1-310267.patch, 4_0015-MFSA2006-65-CVE-2006-5464-Part-2-350370.patch, 4_0016-MFSA2006-65-CVE-2006-5464-Part-3-307809.patch, 4_0018-MFSA2006-65-CVE-2006-5464-Part-4-351328.patch: Fixes for CVE-2006-5464 aka first part of mfsa2006-65 (Crashes with evidence of memory corruption (rv:1.8.0.8)). * 4_0001-MFSA2006-65-CVE-2006-5748-Part-1-350238.patch, 4_0002-MFSA2006-65-CVE-2006-5748-Part-2-351973.patch, 4_0005-MFSA2006-65-CVE-2006-5748-Part-3-352606.patch, 4_0008-MFSA2006-65-CVE-2006-5748-Part-4-349527.patch, 4_0010-MFSA2006-65-CVE-2006-5748-Part-5-354924.patch: Fixes for CVE-2006-5748 aka last part of mfsa2006-65 (Crashes with evidence of memory corruption (rv:1.8.0.8)). * 4_0019-MFSA2006-66-CVE-2006-5462-356215.patch: Fix for "RSA Signature Forgery (variant)", CVE-2006-5462 aka mfsa2006-66. * 4_0020-MFSA2006-67-CVE-2006-5463-355655.patch: Fix for "Running Script can be recompiled", CVE-2006-5463 aka mfsa2006-67. * 4_0006-noMFSA-CVE-2006-4310-351255.patch: Fix for CVE-2006-4310 (Remote DOS in FTP error handling), from bz#351255. * 4_0003-noMFSA-353264.patch, 4_0011-noMFSA-313400.patch, 4_0012-noMFSA-353704.patch, 4_0013-noMFSA-352264.patch, 4_0017-noMFSA-350524.patch: Many patches to fix crashes that can be triggered by malicious pages, no mfsa. bz#313400, bz#350524, bz#352264, bz#353264, bz#353704. * 4_0004-noMFSA-regression-fix-352873.patch: Fixes a regression introduced by a previous security update. bz#352873. * 4_0007-noMFSA-337744.patch: Protocol parsing tightening to avoid reading from the filesystem by unexpected resource or chrome urls. bz#337744. * 4_0009-noMFSA-334110.patch: A fix that goes along fixing a buffer overflow in libpng. bz#334110. stable/main/binary-mips/libnspr4_1.7.8-1sarge8_mips.deb stable/main/binary-mips/mozilla-browser_1.7.8-1sarge8_mips.deb stable/main/binary-mips/libnss-dev_1.7.8-1sarge8_mips.deb stable/main/binary-mips/libnspr-dev_1.7.8-1sarge8_mips.deb stable/main/binary-mips/mozilla-psm_1.7.8-1sarge8_mips.deb stable/main/binary-mips/mozilla-dev_1.7.8-1sarge8_mips.deb stable/main/binary-mips/mozilla-calendar_1.7.8-1sarge8_mips.deb stable/main/binary-mips/mozilla-mailnews_1.7.8-1sarge8_mips.deb stable/main/binary-mips/mozilla_1.7.8-1sarge8_mips.deb stable/main/binary-mips/mozilla-chatzilla_1.7.8-1sarge8_mips.deb stable/main/binary-mips/libnss3_1.7.8-1sarge8_mips.deb stable/main/binary-mips/mozilla-dom-inspector_1.7.8-1sarge8_mips.deb stable/main/binary-mips/mozilla-js-debugger_1.7.8-1sarge8_mips.deb mozilla (2:1.7.8-1sarge8) stable-security; urgency=critical * Security update to backport the fixes from Mozilla branch 1.8.0.8. * 4_0014-MFSA2006-65-CVE-2006-5464-Part-1-310267.patch, 4_0015-MFSA2006-65-CVE-2006-5464-Part-2-350370.patch, 4_0016-MFSA2006-65-CVE-2006-5464-Part-3-307809.patch, 4_0018-MFSA2006-65-CVE-2006-5464-Part-4-351328.patch: Fixes for CVE-2006-5464 aka first part of mfsa2006-65 (Crashes with evidence of memory corruption (rv:1.8.0.8)). * 4_0001-MFSA2006-65-CVE-2006-5748-Part-1-350238.patch, 4_0002-MFSA2006-65-CVE-2006-5748-Part-2-351973.patch, 4_0005-MFSA2006-65-CVE-2006-5748-Part-3-352606.patch, 4_0008-MFSA2006-65-CVE-2006-5748-Part-4-349527.patch, 4_0010-MFSA2006-65-CVE-2006-5748-Part-5-354924.patch: Fixes for CVE-2006-5748 aka last part of mfsa2006-65 (Crashes with evidence of memory corruption (rv:1.8.0.8)). * 4_0019-MFSA2006-66-CVE-2006-5462-356215.patch: Fix for "RSA Signature Forgery (variant)", CVE-2006-5462 aka mfsa2006-66. * 4_0020-MFSA2006-67-CVE-2006-5463-355655.patch: Fix for "Running Script can be recompiled", CVE-2006-5463 aka mfsa2006-67. * 4_0006-noMFSA-CVE-2006-4310-351255.patch: Fix for CVE-2006-4310 (Remote DOS in FTP error handling), from bz#351255. * 4_0003-noMFSA-353264.patch, 4_0011-noMFSA-313400.patch, 4_0012-noMFSA-353704.patch, 4_0013-noMFSA-352264.patch, 4_0017-noMFSA-350524.patch: Many patches to fix crashes that can be triggered by malicious pages, no mfsa. bz#313400, bz#350524, bz#352264, bz#353264, bz#353704. * 4_0004-noMFSA-regression-fix-352873.patch: Fixes a regression introduced by a previous security update. bz#352873. * 4_0007-noMFSA-337744.patch: Protocol parsing tightening to avoid reading from the filesystem by unexpected resource or chrome urls. bz#337744. * 4_0009-noMFSA-334110.patch: A fix that goes along fixing a buffer overflow in libpng. bz#334110. stable/main/binary-m68k/mozilla-browser_1.7.8-1sarge8_m68k.deb stable/main/binary-m68k/mozilla-psm_1.7.8-1sarge8_m68k.deb stable/main/binary-m68k/libnspr-dev_1.7.8-1sarge8_m68k.deb stable/main/binary-m68k/libnss-dev_1.7.8-1sarge8_m68k.deb stable/main/binary-m68k/libnspr4_1.7.8-1sarge8_m68k.deb stable/main/binary-m68k/mozilla-dom-inspector_1.7.8-1sarge8_m68k.deb stable/main/binary-m68k/mozilla-mailnews_1.7.8-1sarge8_m68k.deb stable/main/binary-m68k/libnss3_1.7.8-1sarge8_m68k.deb stable/main/binary-m68k/mozilla-chatzilla_1.7.8-1sarge8_m68k.deb stable/main/binary-m68k/mozilla-js-debugger_1.7.8-1sarge8_m68k.deb stable/main/binary-m68k/mozilla-calendar_1.7.8-1sarge8_m68k.deb stable/main/binary-m68k/mozilla-dev_1.7.8-1sarge8_m68k.deb stable/main/binary-m68k/mozilla_1.7.8-1sarge8_m68k.deb mozilla (2:1.7.8-1sarge8) stable-security; urgency=critical * Security update to backport the fixes from Mozilla branch 1.8.0.8. * 4_0014-MFSA2006-65-CVE-2006-5464-Part-1-310267.patch, 4_0015-MFSA2006-65-CVE-2006-5464-Part-2-350370.patch, 4_0016-MFSA2006-65-CVE-2006-5464-Part-3-307809.patch, 4_0018-MFSA2006-65-CVE-2006-5464-Part-4-351328.patch: Fixes for CVE-2006-5464 aka first part of mfsa2006-65 (Crashes with evidence of memory corruption (rv:1.8.0.8)). * 4_0001-MFSA2006-65-CVE-2006-5748-Part-1-350238.patch, 4_0002-MFSA2006-65-CVE-2006-5748-Part-2-351973.patch, 4_0005-MFSA2006-65-CVE-2006-5748-Part-3-352606.patch, 4_0008-MFSA2006-65-CVE-2006-5748-Part-4-349527.patch, 4_0010-MFSA2006-65-CVE-2006-5748-Part-5-354924.patch: Fixes for CVE-2006-5748 aka last part of mfsa2006-65 (Crashes with evidence of memory corruption (rv:1.8.0.8)). * 4_0019-MFSA2006-66-CVE-2006-5462-356215.patch: Fix for "RSA Signature Forgery (variant)", CVE-2006-5462 aka mfsa2006-66. * 4_0020-MFSA2006-67-CVE-2006-5463-355655.patch: Fix for "Running Script can be recompiled", CVE-2006-5463 aka mfsa2006-67. * 4_0006-noMFSA-CVE-2006-4310-351255.patch: Fix for CVE-2006-4310 (Remote DOS in FTP error handling), from bz#351255. * 4_0003-noMFSA-353264.patch, 4_0011-noMFSA-313400.patch, 4_0012-noMFSA-353704.patch, 4_0013-noMFSA-352264.patch, 4_0017-noMFSA-350524.patch: Many patches to fix crashes that can be triggered by malicious pages, no mfsa. bz#313400, bz#350524, bz#352264, bz#353264, bz#353704. * 4_0004-noMFSA-regression-fix-352873.patch: Fixes a regression introduced by a previous security update. bz#352873. * 4_0007-noMFSA-337744.patch: Protocol parsing tightening to avoid reading from the filesystem by unexpected resource or chrome urls. bz#337744. * 4_0009-noMFSA-334110.patch: A fix that goes along fixing a buffer overflow in libpng. bz#334110. stable/main/binary-ia64/libnspr4_1.7.8-1sarge8_ia64.deb stable/main/binary-ia64/mozilla-mailnews_1.7.8-1sarge8_ia64.deb stable/main/binary-ia64/mozilla-psm_1.7.8-1sarge8_ia64.deb stable/main/binary-ia64/mozilla-browser_1.7.8-1sarge8_ia64.deb stable/main/binary-ia64/libnss-dev_1.7.8-1sarge8_ia64.deb stable/main/binary-ia64/libnss3_1.7.8-1sarge8_ia64.deb stable/main/binary-ia64/mozilla-calendar_1.7.8-1sarge8_ia64.deb stable/main/binary-ia64/libnspr-dev_1.7.8-1sarge8_ia64.deb stable/main/binary-ia64/mozilla-dom-inspector_1.7.8-1sarge8_ia64.deb stable/main/binary-ia64/mozilla-chatzilla_1.7.8-1sarge8_ia64.deb stable/main/binary-ia64/mozilla-dev_1.7.8-1sarge8_ia64.deb stable/main/binary-ia64/mozilla-js-debugger_1.7.8-1sarge8_ia64.deb stable/main/binary-ia64/mozilla_1.7.8-1sarge8_ia64.deb mozilla (2:1.7.8-1sarge8) stable-security; urgency=critical * Security update to backport the fixes from Mozilla branch 1.8.0.8. * 4_0014-MFSA2006-65-CVE-2006-5464-Part-1-310267.patch, 4_0015-MFSA2006-65-CVE-2006-5464-Part-2-350370.patch, 4_0016-MFSA2006-65-CVE-2006-5464-Part-3-307809.patch, 4_0018-MFSA2006-65-CVE-2006-5464-Part-4-351328.patch: Fixes for CVE-2006-5464 aka first part of mfsa2006-65 (Crashes with evidence of memory corruption (rv:1.8.0.8)). * 4_0001-MFSA2006-65-CVE-2006-5748-Part-1-350238.patch, 4_0002-MFSA2006-65-CVE-2006-5748-Part-2-351973.patch, 4_0005-MFSA2006-65-CVE-2006-5748-Part-3-352606.patch, 4_0008-MFSA2006-65-CVE-2006-5748-Part-4-349527.patch, 4_0010-MFSA2006-65-CVE-2006-5748-Part-5-354924.patch: Fixes for CVE-2006-5748 aka last part of mfsa2006-65 (Crashes with evidence of memory corruption (rv:1.8.0.8)). * 4_0019-MFSA2006-66-CVE-2006-5462-356215.patch: Fix for "RSA Signature Forgery (variant)", CVE-2006-5462 aka mfsa2006-66. * 4_0020-MFSA2006-67-CVE-2006-5463-355655.patch: Fix for "Running Script can be recompiled", CVE-2006-5463 aka mfsa2006-67. * 4_0006-noMFSA-CVE-2006-4310-351255.patch: Fix for CVE-2006-4310 (Remote DOS in FTP error handling), from bz#351255. * 4_0003-noMFSA-353264.patch, 4_0011-noMFSA-313400.patch, 4_0012-noMFSA-353704.patch, 4_0013-noMFSA-352264.patch, 4_0017-noMFSA-350524.patch: Many patches to fix crashes that can be triggered by malicious pages, no mfsa. bz#313400, bz#350524, bz#352264, bz#353264, bz#353704. * 4_0004-noMFSA-regression-fix-352873.patch: Fixes a regression introduced by a previous security update. bz#352873. * 4_0007-noMFSA-337744.patch: Protocol parsing tightening to avoid reading from the filesystem by unexpected resource or chrome urls. bz#337744. * 4_0009-noMFSA-334110.patch: A fix that goes along fixing a buffer overflow in libpng. bz#334110. stable/main/binary-hppa/mozilla-dom-inspector_1.7.8-1sarge8_hppa.deb stable/main/binary-hppa/mozilla-psm_1.7.8-1sarge8_hppa.deb stable/main/binary-hppa/libnspr4_1.7.8-1sarge8_hppa.deb stable/main/binary-hppa/mozilla_1.7.8-1sarge8_hppa.deb stable/main/binary-hppa/mozilla-browser_1.7.8-1sarge8_hppa.deb stable/main/binary-hppa/libnss3_1.7.8-1sarge8_hppa.deb stable/main/binary-hppa/libnss-dev_1.7.8-1sarge8_hppa.deb stable/main/binary-hppa/mozilla-mailnews_1.7.8-1sarge8_hppa.deb stable/main/binary-hppa/mozilla-dev_1.7.8-1sarge8_hppa.deb stable/main/binary-hppa/mozilla-js-debugger_1.7.8-1sarge8_hppa.deb stable/main/binary-hppa/mozilla-chatzilla_1.7.8-1sarge8_hppa.deb stable/main/binary-hppa/mozilla-calendar_1.7.8-1sarge8_hppa.deb stable/main/binary-hppa/libnspr-dev_1.7.8-1sarge8_hppa.deb mozilla (2:1.7.8-1sarge8) stable-security; urgency=critical * Security update to backport the fixes from Mozilla branch 1.8.0.8. * 4_0014-MFSA2006-65-CVE-2006-5464-Part-1-310267.patch, 4_0015-MFSA2006-65-CVE-2006-5464-Part-2-350370.patch, 4_0016-MFSA2006-65-CVE-2006-5464-Part-3-307809.patch, 4_0018-MFSA2006-65-CVE-2006-5464-Part-4-351328.patch: Fixes for CVE-2006-5464 aka first part of mfsa2006-65 (Crashes with evidence of memory corruption (rv:1.8.0.8)). * 4_0001-MFSA2006-65-CVE-2006-5748-Part-1-350238.patch, 4_0002-MFSA2006-65-CVE-2006-5748-Part-2-351973.patch, 4_0005-MFSA2006-65-CVE-2006-5748-Part-3-352606.patch, 4_0008-MFSA2006-65-CVE-2006-5748-Part-4-349527.patch, 4_0010-MFSA2006-65-CVE-2006-5748-Part-5-354924.patch: Fixes for CVE-2006-5748 aka last part of mfsa2006-65 (Crashes with evidence of memory corruption (rv:1.8.0.8)). * 4_0019-MFSA2006-66-CVE-2006-5462-356215.patch: Fix for "RSA Signature Forgery (variant)", CVE-2006-5462 aka mfsa2006-66. * 4_0020-MFSA2006-67-CVE-2006-5463-355655.patch: Fix for "Running Script can be recompiled", CVE-2006-5463 aka mfsa2006-67. * 4_0006-noMFSA-CVE-2006-4310-351255.patch: Fix for CVE-2006-4310 (Remote DOS in FTP error handling), from bz#351255. * 4_0003-noMFSA-353264.patch, 4_0011-noMFSA-313400.patch, 4_0012-noMFSA-353704.patch, 4_0013-noMFSA-352264.patch, 4_0017-noMFSA-350524.patch: Many patches to fix crashes that can be triggered by malicious pages, no mfsa. bz#313400, bz#350524, bz#352264, bz#353264, bz#353704. * 4_0004-noMFSA-regression-fix-352873.patch: Fixes a regression introduced by a previous security update. bz#352873. * 4_0007-noMFSA-337744.patch: Protocol parsing tightening to avoid reading from the filesystem by unexpected resource or chrome urls. bz#337744. * 4_0009-noMFSA-334110.patch: A fix that goes along fixing a buffer overflow in libpng. bz#334110. stable/main/binary-arm/mozilla-dev_1.7.8-1sarge8_arm.deb stable/main/binary-arm/libnss3_1.7.8-1sarge8_arm.deb stable/main/binary-arm/mozilla-psm_1.7.8-1sarge8_arm.deb stable/main/binary-arm/mozilla-browser_1.7.8-1sarge8_arm.deb stable/main/binary-arm/libnspr4_1.7.8-1sarge8_arm.deb stable/main/binary-arm/mozilla-js-debugger_1.7.8-1sarge8_arm.deb stable/main/binary-arm/libnspr-dev_1.7.8-1sarge8_arm.deb stable/main/binary-arm/mozilla-calendar_1.7.8-1sarge8_arm.deb stable/main/binary-arm/mozilla-chatzilla_1.7.8-1sarge8_arm.deb stable/main/binary-arm/mozilla_1.7.8-1sarge8_arm.deb stable/main/binary-arm/mozilla-mailnews_1.7.8-1sarge8_arm.deb stable/main/binary-arm/libnss-dev_1.7.8-1sarge8_arm.deb stable/main/binary-arm/mozilla-dom-inspector_1.7.8-1sarge8_arm.deb mozilla (2:1.7.8-1sarge8) stable-security; urgency=critical * Security update to backport the fixes from Mozilla branch 1.8.0.8. * 4_0014-MFSA2006-65-CVE-2006-5464-Part-1-310267.patch, 4_0015-MFSA2006-65-CVE-2006-5464-Part-2-350370.patch, 4_0016-MFSA2006-65-CVE-2006-5464-Part-3-307809.patch, 4_0018-MFSA2006-65-CVE-2006-5464-Part-4-351328.patch: Fixes for CVE-2006-5464 aka first part of mfsa2006-65 (Crashes with evidence of memory corruption (rv:1.8.0.8)). * 4_0001-MFSA2006-65-CVE-2006-5748-Part-1-350238.patch, 4_0002-MFSA2006-65-CVE-2006-5748-Part-2-351973.patch, 4_0005-MFSA2006-65-CVE-2006-5748-Part-3-352606.patch, 4_0008-MFSA2006-65-CVE-2006-5748-Part-4-349527.patch, 4_0010-MFSA2006-65-CVE-2006-5748-Part-5-354924.patch: Fixes for CVE-2006-5748 aka last part of mfsa2006-65 (Crashes with evidence of memory corruption (rv:1.8.0.8)). * 4_0019-MFSA2006-66-CVE-2006-5462-356215.patch: Fix for "RSA Signature Forgery (variant)", CVE-2006-5462 aka mfsa2006-66. * 4_0020-MFSA2006-67-CVE-2006-5463-355655.patch: Fix for "Running Script can be recompiled", CVE-2006-5463 aka mfsa2006-67. * 4_0006-noMFSA-CVE-2006-4310-351255.patch: Fix for CVE-2006-4310 (Remote DOS in FTP error handling), from bz#351255. * 4_0003-noMFSA-353264.patch, 4_0011-noMFSA-313400.patch, 4_0012-noMFSA-353704.patch, 4_0013-noMFSA-352264.patch, 4_0017-noMFSA-350524.patch: Many patches to fix crashes that can be triggered by malicious pages, no mfsa. bz#313400, bz#350524, bz#352264, bz#353264, bz#353704. * 4_0004-noMFSA-regression-fix-352873.patch: Fixes a regression introduced by a previous security update. bz#352873. * 4_0007-noMFSA-337744.patch: Protocol parsing tightening to avoid reading from the filesystem by unexpected resource or chrome urls. bz#337744. * 4_0009-noMFSA-334110.patch: A fix that goes along fixing a buffer overflow in libpng. bz#334110. stable/main/binary-alpha/libnspr-dev_1.7.8-1sarge8_alpha.deb stable/main/binary-alpha/mozilla_1.7.8-1sarge8_alpha.deb stable/main/binary-alpha/mozilla-dom-inspector_1.7.8-1sarge8_alpha.deb stable/main/binary-alpha/mozilla-chatzilla_1.7.8-1sarge8_alpha.deb stable/main/binary-alpha/libnspr4_1.7.8-1sarge8_alpha.deb stable/main/binary-alpha/libnss3_1.7.8-1sarge8_alpha.deb stable/main/binary-alpha/libnss-dev_1.7.8-1sarge8_alpha.deb stable/main/binary-alpha/mozilla-js-debugger_1.7.8-1sarge8_alpha.deb stable/main/binary-alpha/mozilla-dev_1.7.8-1sarge8_alpha.deb stable/main/binary-alpha/mozilla-psm_1.7.8-1sarge8_alpha.deb stable/main/binary-alpha/mozilla-calendar_1.7.8-1sarge8_alpha.deb stable/main/binary-alpha/mozilla-mailnews_1.7.8-1sarge8_alpha.deb stable/main/binary-alpha/mozilla-browser_1.7.8-1sarge8_alpha.deb mozilla (2:1.7.8-1sarge8) stable-security; urgency=critical * Security update to backport the fixes from Mozilla branch 1.8.0.8. * 4_0014-MFSA2006-65-CVE-2006-5464-Part-1-310267.patch, 4_0015-MFSA2006-65-CVE-2006-5464-Part-2-350370.patch, 4_0016-MFSA2006-65-CVE-2006-5464-Part-3-307809.patch, 4_0018-MFSA2006-65-CVE-2006-5464-Part-4-351328.patch: Fixes for CVE-2006-5464 aka first part of mfsa2006-65 (Crashes with evidence of memory corruption (rv:1.8.0.8)). * 4_0001-MFSA2006-65-CVE-2006-5748-Part-1-350238.patch, 4_0002-MFSA2006-65-CVE-2006-5748-Part-2-351973.patch, 4_0005-MFSA2006-65-CVE-2006-5748-Part-3-352606.patch, 4_0008-MFSA2006-65-CVE-2006-5748-Part-4-349527.patch, 4_0010-MFSA2006-65-CVE-2006-5748-Part-5-354924.patch: Fixes for CVE-2006-5748 aka last part of mfsa2006-65 (Crashes with evidence of memory corruption (rv:1.8.0.8)). * 4_0019-MFSA2006-66-CVE-2006-5462-356215.patch: Fix for "RSA Signature Forgery (variant)", CVE-2006-5462 aka mfsa2006-66. * 4_0020-MFSA2006-67-CVE-2006-5463-355655.patch: Fix for "Running Script can be recompiled", CVE-2006-5463 aka mfsa2006-67. * 4_0006-noMFSA-CVE-2006-4310-351255.patch: Fix for CVE-2006-4310 (Remote DOS in FTP error handling), from bz#351255. * 4_0003-noMFSA-353264.patch, 4_0011-noMFSA-313400.patch, 4_0012-noMFSA-353704.patch, 4_0013-noMFSA-352264.patch, 4_0017-noMFSA-350524.patch: Many patches to fix crashes that can be triggered by malicious pages, no mfsa. bz#313400, bz#350524, bz#352264, bz#353264, bz#353704. * 4_0004-noMFSA-regression-fix-352873.patch: Fixes a regression introduced by a previous security update. bz#352873. * 4_0007-noMFSA-337744.patch: Protocol parsing tightening to avoid reading from the filesystem by unexpected resource or chrome urls. bz#337744. * 4_0009-noMFSA-334110.patch: A fix that goes along fixing a buffer overflow in libpng. bz#334110. stable/main/binary-i386/mozilla-calendar_1.7.8-1sarge8_i386.deb stable/main/source/mozilla_1.7.8-1sarge8.dsc stable/main/binary-i386/mozilla-dev_1.7.8-1sarge8_i386.deb stable/main/binary-i386/mozilla-chatzilla_1.7.8-1sarge8_i386.deb stable/main/binary-i386/libnss3_1.7.8-1sarge8_i386.deb stable/main/binary-i386/libnspr4_1.7.8-1sarge8_i386.deb stable/main/binary-i386/libnspr-dev_1.7.8-1sarge8_i386.deb stable/main/binary-i386/mozilla-dom-inspector_1.7.8-1sarge8_i386.deb stable/main/binary-i386/mozilla-mailnews_1.7.8-1sarge8_i386.deb stable/main/binary-i386/libnss-dev_1.7.8-1sarge8_i386.deb stable/main/binary-i386/mozilla-psm_1.7.8-1sarge8_i386.deb stable/main/binary-i386/mozilla-js-debugger_1.7.8-1sarge8_i386.deb stable/main/binary-i386/mozilla-browser_1.7.8-1sarge8_i386.deb stable/main/source/mozilla_1.7.8-1sarge8.diff.gz stable/main/binary-i386/mozilla_1.7.8-1sarge8_i386.deb mozilla (2:1.7.8-1sarge8) stable-security; urgency=critical * Security update to backport the fixes from Mozilla branch 1.8.0.8. * 4_0014-MFSA2006-65-CVE-2006-5464-Part-1-310267.patch, 4_0015-MFSA2006-65-CVE-2006-5464-Part-2-350370.patch, 4_0016-MFSA2006-65-CVE-2006-5464-Part-3-307809.patch, 4_0018-MFSA2006-65-CVE-2006-5464-Part-4-351328.patch: Fixes for CVE-2006-5464 aka first part of mfsa2006-65 (Crashes with evidence of memory corruption (rv:1.8.0.8)). * 4_0001-MFSA2006-65-CVE-2006-5748-Part-1-350238.patch, 4_0002-MFSA2006-65-CVE-2006-5748-Part-2-351973.patch, 4_0005-MFSA2006-65-CVE-2006-5748-Part-3-352606.patch, 4_0008-MFSA2006-65-CVE-2006-5748-Part-4-349527.patch, 4_0010-MFSA2006-65-CVE-2006-5748-Part-5-354924.patch: Fixes for CVE-2006-5748 aka last part of mfsa2006-65 (Crashes with evidence of memory corruption (rv:1.8.0.8)). * 4_0019-MFSA2006-66-CVE-2006-5462-356215.patch: Fix for "RSA Signature Forgery (variant)", CVE-2006-5462 aka mfsa2006-66. * 4_0020-MFSA2006-67-CVE-2006-5463-355655.patch: Fix for "Running Script can be recompiled", CVE-2006-5463 aka mfsa2006-67. * 4_0006-noMFSA-CVE-2006-4310-351255.patch: Fix for CVE-2006-4310 (Remote DOS in FTP error handling), from bz#351255. * 4_0003-noMFSA-353264.patch, 4_0011-noMFSA-313400.patch, 4_0012-noMFSA-353704.patch, 4_0013-noMFSA-352264.patch, 4_0017-noMFSA-350524.patch: Many patches to fix crashes that can be triggered by malicious pages, no mfsa. bz#313400, bz#350524, bz#352264, bz#353264, bz#353704. * 4_0004-noMFSA-regression-fix-352873.patch: Fixes a regression introduced by a previous security update. bz#352873. * 4_0007-noMFSA-337744.patch: Protocol parsing tightening to avoid reading from the filesystem by unexpected resource or chrome urls. bz#337744. * 4_0009-noMFSA-334110.patch: A fix that goes along fixing a buffer overflow in libpng. bz#334110. stable/main/source/mindi-kernel_2.4.27-2sarge4.dsc stable/main/source/mindi-kernel_2.4.27-2sarge4.diff.gz stable/main/binary-i386/mindi-kernel_2.4.27-2sarge4_i386.deb mindi-kernel (2.4.27-2sarge4) stable-security; urgency=high * Build against kernel-tree-2.4.27-10sarge5: * 233_ia64-sparc-cross-region-mappings.diff [SECURITY] Prevent cross-region mappings on ia64 and sparc which could be used in a local DoS attack (system crash) See CVE-2006-4538 * 234_atm-clip-freed-skb-deref.diff [SECURITY] Avoid dereferencing an already freed skb, preventing a potential remote DoS (system crash) vector See CVE-2006-4997 * 235_ppc-alignment-exception-table-check.diff [SECURITY][ppc] Avoid potential DoS which can be triggered by some futex ops See CVE-2006-5649 * 236_s390-uaccess-memleak.diff [SECURITY][s390] Fix memory leak in copy_from_user by clearing the remaining bytes of the kernel buffer after a fault on the userspace address in copy_from_user() See CVE-2006-5174 * 237_smbfs-honor-mount-opts.diff Honor uid, gid and mode mount options for smbfs even when unix extensions are enabled (closes: #310982) See CVE-2006-5871 * 238_ppc-hid0-dos.diff [SECURITY] [ppc] Fix local DoS by clearing HID0 attention enable on PPC970 at boot time See CVE-2006-4093 stable/main/binary-sparc/ftpd_0.17-20sarge2_sparc.deb linux-ftpd (0.17-20sarge2) stable-security; urgency=high * Sarge security release. * Fixed ftpd from doing chdir while runing as root. (Closes: #384454) Thanks a lot to Paul Szabo for finding out and the patch. (CVE-2006-5778) stable/main/binary-s390/ftpd_0.17-20sarge2_s390.deb linux-ftpd (0.17-20sarge2) stable-security; urgency=high * Sarge security release. * Fixed ftpd from doing chdir while runing as root. (Closes: #384454) Thanks a lot to Paul Szabo for finding out and the patch. (CVE-2006-5778) stable/main/binary-powerpc/ftpd_0.17-20sarge2_powerpc.deb linux-ftpd (0.17-20sarge2) stable-security; urgency=high * Sarge security release. * Fixed ftpd from doing chdir while runing as root. (Closes: #384454) Thanks a lot to Paul Szabo for finding out and the patch. (CVE-2006-5778) stable/main/binary-mipsel/ftpd_0.17-20sarge2_mipsel.deb linux-ftpd (0.17-20sarge2) stable-security; urgency=high * Sarge security release. * Fixed ftpd from doing chdir while runing as root. (Closes: #384454) Thanks a lot to Paul Szabo for finding out and the patch. (CVE-2006-5778) stable/main/binary-mips/ftpd_0.17-20sarge2_mips.deb linux-ftpd (0.17-20sarge2) stable-security; urgency=high * Sarge security release. * Fixed ftpd from doing chdir while runing as root. (Closes: #384454) Thanks a lot to Paul Szabo for finding out and the patch. (CVE-2006-5778) stable/main/binary-m68k/ftpd_0.17-20sarge2_m68k.deb linux-ftpd (0.17-20sarge2) stable-security; urgency=high * Sarge security release. * Fixed ftpd from doing chdir while runing as root. (Closes: #384454) Thanks a lot to Paul Szabo for finding out and the patch. (CVE-2006-5778) stable/main/binary-ia64/ftpd_0.17-20sarge2_ia64.deb linux-ftpd (0.17-20sarge2) stable-security; urgency=high * Sarge security release. * Fixed ftpd from doing chdir while runing as root. (Closes: #384454) Thanks a lot to Paul Szabo for finding out and the patch. (CVE-2006-5778) stable/main/binary-hppa/ftpd_0.17-20sarge2_hppa.deb linux-ftpd (0.17-20sarge2) stable-security; urgency=high * Sarge security release. * Fixed ftpd from doing chdir while runing as root. (Closes: #384454) Thanks a lot to Paul Szabo for finding out and the patch. (CVE-2006-5778) stable/main/binary-arm/ftpd_0.17-20sarge2_arm.deb linux-ftpd (0.17-20sarge2) stable-security; urgency=high * Sarge security release. * Fixed ftpd from doing chdir while runing as root. (Closes: #384454) Thanks a lot to Paul Szabo for finding out and the patch. (CVE-2006-5778) stable/main/binary-alpha/ftpd_0.17-20sarge2_alpha.deb linux-ftpd (0.17-20sarge2) stable-security; urgency=high * Sarge security release. * Fixed ftpd from doing chdir while runing as root. (Closes: #384454) Thanks a lot to Paul Szabo for finding out and the patch. (CVE-2006-5778) stable/main/binary-i386/ftpd_0.17-20sarge2_i386.deb stable/main/source/linux-ftpd_0.17-20sarge2.dsc stable/main/source/linux-ftpd_0.17-20sarge2.diff.gz linux-ftpd (0.17-20sarge2) stable-security; urgency=high * Sarge security release. * Fixed ftpd from doing chdir while runing as root. (Closes: #384454) Thanks a lot to Paul Szabo for finding out and the patch. (CVE-2006-5778) stable/main/binary-sparc/links_0.99+1.00pre12-1sarge1_sparc.deb links (0.99+1.00pre12-1sarge1) stable-security; urgency=high * Security non-maintainer upload. * Fix vulnerability in smb:// URI handling by rejecting '"' and ';' characters which could be used for remote command execution; patch backported from upstream 1.00pre19. (CVE-2006-5925) stable/main/binary-s390/links_0.99+1.00pre12-1sarge1_s390.deb links (0.99+1.00pre12-1sarge1) stable-security; urgency=high * Security non-maintainer upload. * Fix vulnerability in smb:// URI handling by rejecting '"' and ';' characters which could be used for remote command execution; patch backported from upstream 1.00pre19. (CVE-2006-5925) stable/main/binary-powerpc/links_0.99+1.00pre12-1sarge1_powerpc.deb links (0.99+1.00pre12-1sarge1) stable-security; urgency=high * Security non-maintainer upload. * Fix vulnerability in smb:// URI handling by rejecting '"' and ';' characters which could be used for remote command execution; patch backported from upstream 1.00pre19. (CVE-2006-5925) stable/main/binary-mipsel/links_0.99+1.00pre12-1sarge1_mipsel.deb links (0.99+1.00pre12-1sarge1) stable-security; urgency=high * Security non-maintainer upload. * Fix vulnerability in smb:// URI handling by rejecting '"' and ';' characters which could be used for remote command execution; patch backported from upstream 1.00pre19. (CVE-2006-5925) stable/main/binary-mips/links_0.99+1.00pre12-1sarge1_mips.deb links (0.99+1.00pre12-1sarge1) stable-security; urgency=high * Security non-maintainer upload. * Fix vulnerability in smb:// URI handling by rejecting '"' and ';' characters which could be used for remote command execution; patch backported from upstream 1.00pre19. (CVE-2006-5925) stable/main/binary-m68k/links_0.99+1.00pre12-1sarge1_m68k.deb links (0.99+1.00pre12-1sarge1) stable-security; urgency=high * Security non-maintainer upload. * Fix vulnerability in smb:// URI handling by rejecting '"' and ';' characters which could be used for remote command execution; patch backported from upstream 1.00pre19. (CVE-2006-5925) stable/main/binary-ia64/links_0.99+1.00pre12-1sarge1_ia64.deb links (0.99+1.00pre12-1sarge1) stable-security; urgency=high * Security non-maintainer upload. * Fix vulnerability in smb:// URI handling by rejecting '"' and ';' characters which could be used for remote command execution; patch backported from upstream 1.00pre19. (CVE-2006-5925) stable/main/binary-hppa/links_0.99+1.00pre12-1sarge1_hppa.deb links (0.99+1.00pre12-1sarge1) stable-security; urgency=high * Security non-maintainer upload. * Fix vulnerability in smb:// URI handling by rejecting '"' and ';' characters which could be used for remote command execution; patch backported from upstream 1.00pre19. (CVE-2006-5925) stable/main/binary-arm/links_0.99+1.00pre12-1sarge1_arm.deb links (0.99+1.00pre12-1sarge1) stable-security; urgency=high * Security non-maintainer upload. * Fix vulnerability in smb:// URI handling by rejecting '"' and ';' characters which could be used for remote command execution; patch backported from upstream 1.00pre19. (CVE-2006-5925) stable/main/binary-alpha/links_0.99+1.00pre12-1sarge1_alpha.deb links (0.99+1.00pre12-1sarge1) stable-security; urgency=high * Security non-maintainer upload. * Fix vulnerability in smb:// URI handling by rejecting '"' and ';' characters which could be used for remote command execution; patch backported from upstream 1.00pre19. (CVE-2006-5925) stable/main/binary-i386/links_0.99+1.00pre12-1sarge1_i386.deb stable/main/source/links_0.99+1.00pre12-1sarge1.diff.gz stable/main/binary-all/links-ssl_0.99+1.00pre12-1sarge1_all.deb stable/main/source/links_0.99+1.00pre12-1sarge1.dsc links (0.99+1.00pre12-1sarge1) stable-security; urgency=high * Security non-maintainer upload. * Fix vulnerability in smb:// URI handling by rejecting '"' and ';' characters which could be used for remote command execution; patch backported from upstream 1.00pre19. (CVE-2006-5925) stable/main/binary-sparc/libsoup2.2-dev_2.2.3-2sarge1_sparc.deb stable/main/binary-sparc/libsoup2.2-7_2.2.3-2sarge1_sparc.deb libsoup (2.2.3-2sarge1) stable-security; urgency=high * Fix remotely exploitable DoS vulnerability stable/main/binary-s390/libsoup2.2-dev_2.2.3-2sarge1_s390.deb stable/main/binary-s390/libsoup2.2-7_2.2.3-2sarge1_s390.deb libsoup (2.2.3-2sarge1) stable-security; urgency=high * Fix remotely exploitable DoS vulnerability stable/main/binary-powerpc/libsoup2.2-7_2.2.3-2sarge1_powerpc.deb stable/main/binary-powerpc/libsoup2.2-dev_2.2.3-2sarge1_powerpc.deb libsoup (2.2.3-2sarge1) stable-security; urgency=high * Fix remotely exploitable DoS vulnerability stable/main/binary-mipsel/libsoup2.2-7_2.2.3-2sarge1_mipsel.deb stable/main/binary-mipsel/libsoup2.2-dev_2.2.3-2sarge1_mipsel.deb libsoup (2.2.3-2sarge1) stable-security; urgency=high * Fix remotely exploitable DoS vulnerability stable/main/binary-mips/libsoup2.2-7_2.2.3-2sarge1_mips.deb stable/main/binary-mips/libsoup2.2-dev_2.2.3-2sarge1_mips.deb libsoup (2.2.3-2sarge1) stable-security; urgency=high * Fix remotely exploitable DoS vulnerability stable/main/binary-m68k/libsoup2.2-7_2.2.3-2sarge1_m68k.deb stable/main/binary-m68k/libsoup2.2-dev_2.2.3-2sarge1_m68k.deb libsoup (2.2.3-2sarge1) stable-security; urgency=high * Fix remotely exploitable DoS vulnerability stable/main/binary-ia64/libsoup2.2-dev_2.2.3-2sarge1_ia64.deb stable/main/binary-ia64/libsoup2.2-7_2.2.3-2sarge1_ia64.deb libsoup (2.2.3-2sarge1) stable-security; urgency=high * Fix remotely exploitable DoS vulnerability stable/main/binary-hppa/libsoup2.2-dev_2.2.3-2sarge1_hppa.deb stable/main/binary-hppa/libsoup2.2-7_2.2.3-2sarge1_hppa.deb libsoup (2.2.3-2sarge1) stable-security; urgency=high * Fix remotely exploitable DoS vulnerability stable/main/binary-arm/libsoup2.2-dev_2.2.3-2sarge1_arm.deb stable/main/binary-arm/libsoup2.2-7_2.2.3-2sarge1_arm.deb libsoup (2.2.3-2sarge1) stable-security; urgency=high * Fix remotely exploitable DoS vulnerability stable/main/binary-alpha/libsoup2.2-dev_2.2.3-2sarge1_alpha.deb stable/main/binary-alpha/libsoup2.2-7_2.2.3-2sarge1_alpha.deb libsoup (2.2.3-2sarge1) stable-security; urgency=high * Fix remotely exploitable DoS vulnerability stable/main/binary-all/libsoup2.2-doc_2.2.3-2sarge1_all.deb stable/main/source/libsoup_2.2.3-2sarge1.dsc stable/main/binary-i386/libsoup2.2-7_2.2.3-2sarge1_i386.deb stable/main/binary-i386/libsoup2.2-dev_2.2.3-2sarge1_i386.deb stable/main/source/libsoup_2.2.3-2sarge1.diff.gz libsoup (2.2.3-2sarge1) stable-security; urgency=high * Fix remotely exploitable DoS vulnerability stable/main/binary-sparc/libpam-ldap_178-1sarge3_sparc.deb libpam-ldap (178-1sarge3) stable-security; urgency=high * Non-maintainer upload by the Security Team * Applied Red Hat patch to fix authentication bypass [CVE-2006-5170] stable/main/binary-s390/libpam-ldap_178-1sarge3_s390.deb libpam-ldap (178-1sarge3) stable-security; urgency=high * Non-maintainer upload by the Security Team * Applied Red Hat patch to fix authentication bypass [CVE-2006-5170] stable/main/binary-powerpc/libpam-ldap_178-1sarge3_powerpc.deb libpam-ldap (178-1sarge3) stable-security; urgency=high * Non-maintainer upload by the Security Team * Applied Red Hat patch to fix authentication bypass [CVE-2006-5170] stable/main/binary-mipsel/libpam-ldap_178-1sarge3_mipsel.deb libpam-ldap (178-1sarge3) stable-security; urgency=high * Non-maintainer upload by the Security Team * Applied Red Hat patch to fix authentication bypass [CVE-2006-5170] stable/main/binary-mips/libpam-ldap_178-1sarge3_mips.deb libpam-ldap (178-1sarge3) stable-security; urgency=high * Non-maintainer upload by the Security Team * Applied Red Hat patch to fix authentication bypass [CVE-2006-5170] stable/main/binary-m68k/libpam-ldap_178-1sarge3_m68k.deb libpam-ldap (178-1sarge3) stable-security; urgency=high * Non-maintainer upload by the Security Team * Applied Red Hat patch to fix authentication bypass [CVE-2006-5170] stable/main/binary-ia64/libpam-ldap_178-1sarge3_ia64.deb libpam-ldap (178-1sarge3) stable-security; urgency=high * Non-maintainer upload by the Security Team * Applied Red Hat patch to fix authentication bypass [CVE-2006-5170] stable/main/binary-hppa/libpam-ldap_178-1sarge3_hppa.deb libpam-ldap (178-1sarge3) stable-security; urgency=high * Non-maintainer upload by the Security Team * Applied Red Hat patch to fix authentication bypass [CVE-2006-5170] stable/main/binary-arm/libpam-ldap_178-1sarge3_arm.deb libpam-ldap (178-1sarge3) stable-security; urgency=high * Non-maintainer upload by the Security Team * Applied Red Hat patch to fix authentication bypass [CVE-2006-5170] stable/main/binary-alpha/libpam-ldap_178-1sarge3_alpha.deb libpam-ldap (178-1sarge3) stable-security; urgency=high * Non-maintainer upload by the Security Team * Applied Red Hat patch to fix authentication bypass [CVE-2006-5170] stable/main/source/libpam-ldap_178-1sarge3.diff.gz stable/main/source/libpam-ldap_178-1sarge3.dsc stable/main/binary-i386/libpam-ldap_178-1sarge3_i386.deb libpam-ldap (178-1sarge3) stable-security; urgency=high * Non-maintainer upload by the Security Team * Applied Red Hat patch to fix authentication bypass [CVE-2006-5170] stable/main/binary-sparc/libgtop2-daemon_2.6.0-4sarge1_sparc.deb stable/main/binary-sparc/libgtop2-dev_2.6.0-4sarge1_sparc.deb stable/main/binary-sparc/libgtop2-2_2.6.0-4sarge1_sparc.deb libgtop2 (2.6.0-4sarge1) stable-security; urgency=high * SECURITY: New patch, 20_proc_map-overflow.patch, fixes overflow in /proc/maps parsing code; (CVE-2006-0235) stable/main/binary-s390/libgtop2-daemon_2.6.0-4sarge1_s390.deb stable/main/binary-s390/libgtop2-2_2.6.0-4sarge1_s390.deb stable/main/binary-s390/libgtop2-dev_2.6.0-4sarge1_s390.deb libgtop2 (2.6.0-4sarge1) stable-security; urgency=high * SECURITY: New patch, 20_proc_map-overflow.patch, fixes overflow in /proc/maps parsing code; (CVE-2006-0235) stable/main/binary-powerpc/libgtop2-dev_2.6.0-4sarge1_powerpc.deb stable/main/binary-powerpc/libgtop2-2_2.6.0-4sarge1_powerpc.deb stable/main/binary-powerpc/libgtop2-daemon_2.6.0-4sarge1_powerpc.deb libgtop2 (2.6.0-4sarge1) stable-security; urgency=high * SECURITY: New patch, 20_proc_map-overflow.patch, fixes overflow in /proc/maps parsing code; (CVE-2006-0235) stable/main/binary-mipsel/libgtop2-2_2.6.0-4sarge1_mipsel.deb stable/main/binary-mipsel/libgtop2-dev_2.6.0-4sarge1_mipsel.deb stable/main/binary-mipsel/libgtop2-daemon_2.6.0-4sarge1_mipsel.deb libgtop2 (2.6.0-4sarge1) stable-security; urgency=high * SECURITY: New patch, 20_proc_map-overflow.patch, fixes overflow in /proc/maps parsing code; (CVE-2006-0235) stable/main/binary-mips/libgtop2-2_2.6.0-4sarge1_mips.deb stable/main/binary-mips/libgtop2-dev_2.6.0-4sarge1_mips.deb stable/main/binary-mips/libgtop2-daemon_2.6.0-4sarge1_mips.deb libgtop2 (2.6.0-4sarge1) stable-security; urgency=high * SECURITY: New patch, 20_proc_map-overflow.patch, fixes overflow in /proc/maps parsing code; (CVE-2006-0235) stable/main/binary-m68k/libgtop2-2_2.6.0-4sarge1_m68k.deb stable/main/binary-m68k/libgtop2-daemon_2.6.0-4sarge1_m68k.deb stable/main/binary-m68k/libgtop2-dev_2.6.0-4sarge1_m68k.deb libgtop2 (2.6.0-4sarge1) stable-security; urgency=high * SECURITY: New patch, 20_proc_map-overflow.patch, fixes overflow in /proc/maps parsing code; (CVE-2006-0235) stable/main/binary-ia64/libgtop2-dev_2.6.0-4sarge1_ia64.deb stable/main/binary-ia64/libgtop2-2_2.6.0-4sarge1_ia64.deb stable/main/binary-ia64/libgtop2-daemon_2.6.0-4sarge1_ia64.deb libgtop2 (2.6.0-4sarge1) stable-security; urgency=high * SECURITY: New patch, 20_proc_map-overflow.patch, fixes overflow in /proc/maps parsing code; (CVE-2006-0235) stable/main/binary-hppa/libgtop2-dev_2.6.0-4sarge1_hppa.deb stable/main/binary-hppa/libgtop2-daemon_2.6.0-4sarge1_hppa.deb stable/main/binary-hppa/libgtop2-2_2.6.0-4sarge1_hppa.deb libgtop2 (2.6.0-4sarge1) stable-security; urgency=high * SECURITY: New patch, 20_proc_map-overflow.patch, fixes overflow in /proc/maps parsing code; (CVE-2006-0235) stable/main/binary-arm/libgtop2-daemon_2.6.0-4sarge1_arm.deb stable/main/binary-arm/libgtop2-dev_2.6.0-4sarge1_arm.deb stable/main/binary-arm/libgtop2-2_2.6.0-4sarge1_arm.deb libgtop2 (2.6.0-4sarge1) stable-security; urgency=high * SECURITY: New patch, 20_proc_map-overflow.patch, fixes overflow in /proc/maps parsing code; (CVE-2006-0235) stable/main/binary-alpha/libgtop2-dev_2.6.0-4sarge1_alpha.deb stable/main/binary-alpha/libgtop2-2_2.6.0-4sarge1_alpha.deb stable/main/binary-alpha/libgtop2-daemon_2.6.0-4sarge1_alpha.deb libgtop2 (2.6.0-4sarge1) stable-security; urgency=high * SECURITY: New patch, 20_proc_map-overflow.patch, fixes overflow in /proc/maps parsing code; (CVE-2006-0235) stable/main/binary-i386/libgtop2-daemon_2.6.0-4sarge1_i386.deb stable/main/source/libgtop2_2.6.0-4sarge1.diff.gz stable/main/binary-i386/libgtop2-dev_2.6.0-4sarge1_i386.deb stable/main/binary-i386/libgtop2-2_2.6.0-4sarge1_i386.deb stable/main/source/libgtop2_2.6.0-4sarge1.dsc libgtop2 (2.6.0-4sarge1) stable-security; urgency=high * SECURITY: New patch, 20_proc_map-overflow.patch, fixes overflow in /proc/maps parsing code; (CVE-2006-0235) stable/main/binary-sparc/libgsf-gnome-1-dbg_1.11.1-1sarge1_sparc.deb stable/main/binary-sparc/libgsf-gnome-1-dev_1.11.1-1sarge1_sparc.deb stable/main/binary-sparc/libgsf-1-dbg_1.11.1-1sarge1_sparc.deb stable/main/binary-sparc/libgsf-1_1.11.1-1sarge1_sparc.deb stable/main/binary-sparc/libgsf-gnome-1_1.11.1-1sarge1_sparc.deb stable/main/binary-sparc/libgsf-1-dev_1.11.1-1sarge1_sparc.deb libgsf (1.11.1-1sarge1) stable-security; urgency=high * Non-maintainer upload by the Security Team * Applied patch forwarded by Ray Dassen to fix a heap overflow problem stable/main/binary-s390/libgsf-1_1.11.1-1sarge1_s390.deb stable/main/binary-s390/libgsf-gnome-1-dev_1.11.1-1sarge1_s390.deb stable/main/binary-s390/libgsf-1-dbg_1.11.1-1sarge1_s390.deb stable/main/binary-s390/libgsf-gnome-1-dbg_1.11.1-1sarge1_s390.deb stable/main/binary-s390/libgsf-1-dev_1.11.1-1sarge1_s390.deb stable/main/binary-s390/libgsf-gnome-1_1.11.1-1sarge1_s390.deb libgsf (1.11.1-1sarge1) stable-security; urgency=high * Non-maintainer upload by the Security Team * Applied patch forwarded by Ray Dassen to fix a heap overflow problem stable/main/binary-mipsel/libgsf-gnome-1-dev_1.11.1-1sarge1_mipsel.deb stable/main/binary-mipsel/libgsf-1-dev_1.11.1-1sarge1_mipsel.deb stable/main/binary-mipsel/libgsf-gnome-1-dbg_1.11.1-1sarge1_mipsel.deb stable/main/binary-mipsel/libgsf-1-dbg_1.11.1-1sarge1_mipsel.deb stable/main/binary-mipsel/libgsf-1_1.11.1-1sarge1_mipsel.deb stable/main/binary-mipsel/libgsf-gnome-1_1.11.1-1sarge1_mipsel.deb libgsf (1.11.1-1sarge1) stable-security; urgency=high * Non-maintainer upload by the Security Team * Applied patch forwarded by Ray Dassen to fix a heap overflow problem stable/main/binary-mips/libgsf-gnome-1_1.11.1-1sarge1_mips.deb stable/main/binary-mips/libgsf-gnome-1-dev_1.11.1-1sarge1_mips.deb stable/main/binary-mips/libgsf-1-dev_1.11.1-1sarge1_mips.deb stable/main/binary-mips/libgsf-gnome-1-dbg_1.11.1-1sarge1_mips.deb stable/main/binary-mips/libgsf-1_1.11.1-1sarge1_mips.deb stable/main/binary-mips/libgsf-1-dbg_1.11.1-1sarge1_mips.deb libgsf (1.11.1-1sarge1) stable-security; urgency=high * Non-maintainer upload by the Security Team * Applied patch forwarded by Ray Dassen to fix a heap overflow problem stable/main/binary-m68k/libgsf-gnome-1-dbg_1.11.1-1sarge1_m68k.deb stable/main/binary-m68k/libgsf-1-dbg_1.11.1-1sarge1_m68k.deb stable/main/binary-m68k/libgsf-gnome-1_1.11.1-1sarge1_m68k.deb stable/main/binary-m68k/libgsf-1_1.11.1-1sarge1_m68k.deb stable/main/binary-m68k/libgsf-1-dev_1.11.1-1sarge1_m68k.deb stable/main/binary-m68k/libgsf-gnome-1-dev_1.11.1-1sarge1_m68k.deb libgsf (1.11.1-1sarge1) stable-security; urgency=high * Non-maintainer upload by the Security Team * Applied patch forwarded by Ray Dassen to fix a heap overflow problem stable/main/binary-ia64/libgsf-gnome-1-dev_1.11.1-1sarge1_ia64.deb stable/main/binary-ia64/libgsf-1_1.11.1-1sarge1_ia64.deb stable/main/binary-ia64/libgsf-1-dbg_1.11.1-1sarge1_ia64.deb stable/main/binary-ia64/libgsf-1-dev_1.11.1-1sarge1_ia64.deb stable/main/binary-ia64/libgsf-gnome-1-dbg_1.11.1-1sarge1_ia64.deb stable/main/binary-ia64/libgsf-gnome-1_1.11.1-1sarge1_ia64.deb libgsf (1.11.1-1sarge1) stable-security; urgency=high * Non-maintainer upload by the Security Team * Applied patch forwarded by Ray Dassen to fix a heap overflow problem stable/main/binary-i386/libgsf-gnome-1_1.11.1-1sarge1_i386.deb stable/main/binary-i386/libgsf-gnome-1-dbg_1.11.1-1sarge1_i386.deb stable/main/binary-i386/libgsf-1-dev_1.11.1-1sarge1_i386.deb stable/main/binary-i386/libgsf-1-dbg_1.11.1-1sarge1_i386.deb stable/main/binary-i386/libgsf-1_1.11.1-1sarge1_i386.deb stable/main/binary-i386/libgsf-gnome-1-dev_1.11.1-1sarge1_i386.deb libgsf (1.11.1-1sarge1) stable-security; urgency=high * Non-maintainer upload by the Security Team * Applied patch forwarded by Ray Dassen to fix a heap overflow problem stable/main/binary-hppa/libgsf-1-dev_1.11.1-1sarge1_hppa.deb stable/main/binary-hppa/libgsf-gnome-1-dbg_1.11.1-1sarge1_hppa.deb stable/main/binary-hppa/libgsf-gnome-1-dev_1.11.1-1sarge1_hppa.deb stable/main/binary-hppa/libgsf-1-dbg_1.11.1-1sarge1_hppa.deb stable/main/binary-hppa/libgsf-1_1.11.1-1sarge1_hppa.deb stable/main/binary-hppa/libgsf-gnome-1_1.11.1-1sarge1_hppa.deb libgsf (1.11.1-1sarge1) stable-security; urgency=high * Non-maintainer upload by the Security Team * Applied patch forwarded by Ray Dassen to fix a heap overflow problem stable/main/binary-arm/libgsf-1-dev_1.11.1-1sarge1_arm.deb stable/main/binary-arm/libgsf-gnome-1-dbg_1.11.1-1sarge1_arm.deb stable/main/binary-arm/libgsf-1-dbg_1.11.1-1sarge1_arm.deb stable/main/binary-arm/libgsf-gnome-1-dev_1.11.1-1sarge1_arm.deb stable/main/binary-arm/libgsf-1_1.11.1-1sarge1_arm.deb stable/main/binary-arm/libgsf-gnome-1_1.11.1-1sarge1_arm.deb libgsf (1.11.1-1sarge1) stable-security; urgency=high * Non-maintainer upload by the Security Team * Applied patch forwarded by Ray Dassen to fix a heap overflow problem stable/main/binary-alpha/libgsf-1-dev_1.11.1-1sarge1_alpha.deb stable/main/binary-alpha/libgsf-1_1.11.1-1sarge1_alpha.deb stable/main/binary-alpha/libgsf-gnome-1-dev_1.11.1-1sarge1_alpha.deb stable/main/binary-alpha/libgsf-gnome-1_1.11.1-1sarge1_alpha.deb stable/main/binary-alpha/libgsf-gnome-1-dbg_1.11.1-1sarge1_alpha.deb stable/main/binary-alpha/libgsf-1-dbg_1.11.1-1sarge1_alpha.deb libgsf (1.11.1-1sarge1) stable-security; urgency=high * Non-maintainer upload by the Security Team * Applied patch forwarded by Ray Dassen to fix a heap overflow problem stable/main/binary-powerpc/libgsf-gnome-1_1.11.1-1sarge1_powerpc.deb stable/main/binary-powerpc/libgsf-gnome-1-dev_1.11.1-1sarge1_powerpc.deb stable/main/source/libgsf_1.11.1-1sarge1.dsc stable/main/binary-powerpc/libgsf-1-dbg_1.11.1-1sarge1_powerpc.deb stable/main/binary-powerpc/libgsf-1-dev_1.11.1-1sarge1_powerpc.deb stable/main/binary-powerpc/libgsf-1_1.11.1-1sarge1_powerpc.deb stable/main/source/libgsf_1.11.1-1sarge1.diff.gz stable/main/binary-powerpc/libgsf-gnome-1-dbg_1.11.1-1sarge1_powerpc.deb libgsf (1.11.1-1sarge1) stable-security; urgency=high * Non-maintainer upload by the Security Team * Applied patch forwarded by Ray Dassen to fix a heap overflow problem stable/main/binary-all/libcrypt-cbc-perl_2.12-1sarge2_all.deb stable/main/source/libcrypt-cbc-perl_2.12-1sarge2.diff.gz stable/main/source/libcrypt-cbc-perl_2.12-1sarge2.dsc libcrypt-cbc-perl (2.12-1sarge2) stable-security; urgency=high * SECURITY FIX: Solves weakness when using certain block algorithms (CVE-2006-0898) + This release fixes the vulnerability in a different way, introducing backward compatibility in more scenarios. stable/main/binary-sparc/libapache-mod-auth-kerb_4.996-5.0-rc6-1sarge1_sparc.deb stable/main/binary-sparc/libapache2-mod-auth-kerb_4.996-5.0-rc6-1sarge1_sparc.deb libapache-mod-auth-kerb (4.996-5.0-rc6-1sarge1) stable-security; urgency=high * Non-Maintainer upload by the Security Team. * Apply patch to fix off-by-one error in der_get_oid function CVE-2006-5989 stable/main/binary-s390/libapache2-mod-auth-kerb_4.996-5.0-rc6-1sarge1_s390.deb stable/main/binary-s390/libapache-mod-auth-kerb_4.996-5.0-rc6-1sarge1_s390.deb libapache-mod-auth-kerb (4.996-5.0-rc6-1sarge1) stable-security; urgency=high * Non-Maintainer upload by the Security Team. * Apply patch to fix off-by-one error in der_get_oid function CVE-2006-5989 stable/main/binary-powerpc/libapache2-mod-auth-kerb_4.996-5.0-rc6-1sarge1_powerpc.deb stable/main/binary-powerpc/libapache-mod-auth-kerb_4.996-5.0-rc6-1sarge1_powerpc.deb libapache-mod-auth-kerb (4.996-5.0-rc6-1sarge1) stable-security; urgency=high * Non-Maintainer upload by the Security Team. * Apply patch to fix off-by-one error in der_get_oid function CVE-2006-5989 stable/main/binary-mipsel/libapache-mod-auth-kerb_4.996-5.0-rc6-1sarge1_mipsel.deb stable/main/binary-mipsel/libapache2-mod-auth-kerb_4.996-5.0-rc6-1sarge1_mipsel.deb libapache-mod-auth-kerb (4.996-5.0-rc6-1sarge1) stable-security; urgency=high * Non-Maintainer upload by the Security Team. * Apply patch to fix off-by-one error in der_get_oid function CVE-2006-5989 stable/main/binary-mips/libapache2-mod-auth-kerb_4.996-5.0-rc6-1sarge1_mips.deb stable/main/binary-mips/libapache-mod-auth-kerb_4.996-5.0-rc6-1sarge1_mips.deb libapache-mod-auth-kerb (4.996-5.0-rc6-1sarge1) stable-security; urgency=high * Non-Maintainer upload by the Security Team. * Apply patch to fix off-by-one error in der_get_oid function CVE-2006-5989 stable/main/binary-m68k/libapache-mod-auth-kerb_4.996-5.0-rc6-1sarge1_m68k.deb stable/main/binary-m68k/libapache2-mod-auth-kerb_4.996-5.0-rc6-1sarge1_m68k.deb libapache-mod-auth-kerb (4.996-5.0-rc6-1sarge1) stable-security; urgency=high * Non-Maintainer upload by the Security Team. * Apply patch to fix off-by-one error in der_get_oid function CVE-2006-5989 stable/main/binary-ia64/libapache-mod-auth-kerb_4.996-5.0-rc6-1sarge1_ia64.deb stable/main/binary-ia64/libapache2-mod-auth-kerb_4.996-5.0-rc6-1sarge1_ia64.deb libapache-mod-auth-kerb (4.996-5.0-rc6-1sarge1) stable-security; urgency=high * Non-Maintainer upload by the Security Team. * Apply patch to fix off-by-one error in der_get_oid function CVE-2006-5989 stable/main/binary-hppa/libapache2-mod-auth-kerb_4.996-5.0-rc6-1sarge1_hppa.deb stable/main/binary-hppa/libapache-mod-auth-kerb_4.996-5.0-rc6-1sarge1_hppa.deb libapache-mod-auth-kerb (4.996-5.0-rc6-1sarge1) stable-security; urgency=high * Non-Maintainer upload by the Security Team. * Apply patch to fix off-by-one error in der_get_oid function CVE-2006-5989 stable/main/binary-arm/libapache-mod-auth-kerb_4.996-5.0-rc6-1sarge1_arm.deb stable/main/binary-arm/libapache2-mod-auth-kerb_4.996-5.0-rc6-1sarge1_arm.deb libapache-mod-auth-kerb (4.996-5.0-rc6-1sarge1) stable-security; urgency=high * Non-Maintainer upload by the Security Team. * Apply patch to fix off-by-one error in der_get_oid function CVE-2006-5989 stable/main/binary-alpha/libapache-mod-auth-kerb_4.996-5.0-rc6-1sarge1_alpha.deb stable/main/binary-alpha/libapache2-mod-auth-kerb_4.996-5.0-rc6-1sarge1_alpha.deb libapache-mod-auth-kerb (4.996-5.0-rc6-1sarge1) stable-security; urgency=high * Non-Maintainer upload by the Security Team. * Apply patch to fix off-by-one error in der_get_oid function CVE-2006-5989 stable/main/binary-i386/libapache-mod-auth-kerb_4.996-5.0-rc6-1sarge1_i386.deb stable/main/source/libapache-mod-auth-kerb_4.996-5.0-rc6-1sarge1.dsc stable/main/binary-i386/libapache2-mod-auth-kerb_4.996-5.0-rc6-1sarge1_i386.deb stable/main/source/libapache-mod-auth-kerb_4.996-5.0-rc6-1sarge1.diff.gz libapache-mod-auth-kerb (4.996-5.0-rc6-1sarge1) stable-security; urgency=high * Non-Maintainer upload by the Security Team. * Apply patch to fix off-by-one error in der_get_oid function CVE-2006-5989 stable/main/binary-sparc/l2tpns_2.0.14-1sarge1_sparc.deb l2tpns (2.0.14-1sarge1) stable-security; urgency=high * Non-maintainer upload by the Secrutiy Team * Fix potential remote code execution in cluster code. [CVE-2006-5873] stable/main/binary-s390/l2tpns_2.0.14-1sarge1_s390.deb l2tpns (2.0.14-1sarge1) stable-security; urgency=high * Non-maintainer upload by the Secrutiy Team * Fix potential remote code execution in cluster code. [CVE-2006-5873] stable/main/binary-powerpc/l2tpns_2.0.14-1sarge1_powerpc.deb l2tpns (2.0.14-1sarge1) stable-security; urgency=high * Non-maintainer upload by the Secrutiy Team * Fix potential remote code execution in cluster code. [CVE-2006-5873] stable/main/binary-mipsel/l2tpns_2.0.14-1sarge1_mipsel.deb l2tpns (2.0.14-1sarge1) stable-security; urgency=high * Non-maintainer upload by the Secrutiy Team * Fix potential remote code execution in cluster code. [CVE-2006-5873] stable/main/binary-mips/l2tpns_2.0.14-1sarge1_mips.deb l2tpns (2.0.14-1sarge1) stable-security; urgency=high * Non-maintainer upload by the Secrutiy Team * Fix potential remote code execution in cluster code. [CVE-2006-5873] stable/main/binary-m68k/l2tpns_2.0.14-1sarge1_m68k.deb l2tpns (2.0.14-1sarge1) stable-security; urgency=high * Non-maintainer upload by the Secrutiy Team * Fix potential remote code execution in cluster code. [CVE-2006-5873] stable/main/binary-ia64/l2tpns_2.0.14-1sarge1_ia64.deb l2tpns (2.0.14-1sarge1) stable-security; urgency=high * Non-maintainer upload by the Secrutiy Team * Fix potential remote code execution in cluster code. [CVE-2006-5873] stable/main/binary-hppa/l2tpns_2.0.14-1sarge1_hppa.deb l2tpns (2.0.14-1sarge1) stable-security; urgency=high * Non-maintainer upload by the Secrutiy Team * Fix potential remote code execution in cluster code. [CVE-2006-5873] stable/main/binary-arm/l2tpns_2.0.14-1sarge1_arm.deb l2tpns (2.0.14-1sarge1) stable-security; urgency=high * Non-maintainer upload by the Secrutiy Team * Fix potential remote code execution in cluster code. [CVE-2006-5873] stable/main/binary-alpha/l2tpns_2.0.14-1sarge1_alpha.deb l2tpns (2.0.14-1sarge1) stable-security; urgency=high * Non-maintainer upload by the Secrutiy Team * Fix potential remote code execution in cluster code. [CVE-2006-5873] stable/main/source/l2tpns_2.0.14-1sarge1.diff.gz stable/main/binary-i386/l2tpns_2.0.14-1sarge1_i386.deb stable/main/source/l2tpns_2.0.14-1sarge1.dsc l2tpns (2.0.14-1sarge1) stable-security; urgency=high * Non-maintainer upload by the Secrutiy Team * Fix potential remote code execution in cluster code. [CVE-2006-5873] stable/main/source/kernel-source-2.6.8_2.6.8-16sarge6.dsc stable/main/binary-all/kernel-tree-2.6.8_2.6.8-16sarge6_all.deb stable/main/binary-all/kernel-doc-2.6.8_2.6.8-16sarge6_all.deb stable/main/binary-all/kernel-patch-debian-2.6.8_2.6.8-16sarge6_all.deb stable/main/binary-all/kernel-source-2.6.8_2.6.8-16sarge6_all.deb stable/main/source/kernel-source-2.6.8_2.6.8-16sarge6.diff.gz kernel-source-2.6.8 (2.6.8-16sarge6) stable-security; urgency=high * perfmon-fd-refcnt.dpatch [SECURITY][ia64] Fix file descriptor leak in perfmonctl system call which could be used as a local denial of service attack by depleting the system of file descriptors See CVE-2006-3741 * ia64-sparc-cross-region-mappings.dpatch [SECURITY] Prevent cross-region mappings on ia64 and sparc which could be used in a local DoS attack (system crash) See CVE-2006-4538 * __block_prepare_write-recovery.dpatch [SECURITY] Fix an information leak in __block_prepare_write() See CVE-2006-4813 * atm-clip-freed-skb-deref.dpatch [SECURITY] Avoid dereferencing an already freed skb, preventing a potential remote DoS (system crash) vector See CVE-2006-4997 * ip6_flowlabel-lockup.dpatch [SECURITY] Fix local DoS attack vector (lockups, oopses) in the sequence handling for /proc/net/ip6_flowlabel See CVE-2006-5619 * ppc-alignment-exception-table-check.dpatch [SECURITY][ppc] Avoid potential DoS which can be triggered by some futex ops See CVE-2006-5649 * s390-uaccess-memleak.dpatch [SECURITY][s390] Fix memory leak in copy_from_user by clearing the remaining bytes of the kernel buffer after a fault on the userspace address in copy_from_user() See CVE-2006-5174 * smbfs-honor-mount-opts.dpatch Honor uid, gid and mode mount options for smbfs even when unix extensions are enabled See CVE-2006-5871 * bridge-get_fdb_entries-overflow.dpatch Protect against possible overflow in get_fdb_entries See CVE-2006-5751 stable/main/binary-all/kernel-tree-2.4.27_2.4.27-10sarge5_all.deb stable/main/binary-all/kernel-doc-2.4.27_2.4.27-10sarge5_all.deb stable/main/source/kernel-source-2.4.27_2.4.27-10sarge5.dsc stable/main/binary-all/kernel-source-2.4.27_2.4.27-10sarge5_all.deb stable/main/source/kernel-source-2.4.27_2.4.27-10sarge5.diff.gz stable/main/binary-all/kernel-patch-debian-2.4.27_2.4.27-10sarge5_all.deb kernel-source-2.4.27 (2.4.27-10sarge5) stable-security; urgency=high * 233_ia64-sparc-cross-region-mappings.diff [SECURITY] Prevent cross-region mappings on ia64 and sparc which could be used in a local DoS attack (system crash) See CVE-2006-4538 * 234_atm-clip-freed-skb-deref.diff [SECURITY] Avoid dereferencing an already freed skb, preventing a potential remote DoS (system crash) vector See CVE-2006-4997 * 235_ppc-alignment-exception-table-check.diff [SECURITY][ppc] Avoid potential DoS which can be triggered by some futex ops See CVE-2006-5649 * 236_s390-uaccess-memleak.diff [SECURITY][s390] Fix memory leak in copy_from_user by clearing the remaining bytes of the kernel buffer after a fault on the userspace address in copy_from_user() See CVE-2006-5174 * 237_smbfs-honor-mount-opts.diff Honor uid, gid and mode mount options for smbfs even when unix extensions are enabled (closes: #310982) See CVE-2006-5871 * 238_ppc-hid0-dos.diff [SECURITY] [ppc] Fix local DoS by clearing HID0 attention enable on PPC970 at boot time See CVE-2006-4093 stable/main/binary-powerpc/kernel-image-2.6.8-3-power3_2.6.8-12sarge6_powerpc.deb stable/main/binary-powerpc/kernel-headers-2.6.8-3_2.6.8-12sarge6_powerpc.deb stable/main/binary-powerpc/kernel-build-2.6.8-3-power4_2.6.8-12sarge6_powerpc.deb stable/main/binary-powerpc/kernel-build-2.6.8-3-power4-smp_2.6.8-12sarge6_powerpc.deb stable/main/binary-powerpc/kernel-build-2.6.8-3-powerpc_2.6.8-12sarge6_powerpc.deb stable/main/source/kernel-patch-powerpc-2.6.8_2.6.8-12sarge6.tar.gz stable/main/source/kernel-patch-powerpc-2.6.8_2.6.8-12sarge6.dsc stable/main/binary-powerpc/kernel-image-2.6.8-3-power4-smp_2.6.8-12sarge6_powerpc.deb stable/main/binary-powerpc/kernel-image-2.6.8-3-power4_2.6.8-12sarge6_powerpc.deb stable/main/binary-powerpc/kernel-build-2.6.8-3-power3-smp_2.6.8-12sarge6_powerpc.deb stable/main/binary-powerpc/kernel-image-2.6.8-3-powerpc_2.6.8-12sarge6_powerpc.deb stable/main/binary-powerpc/kernel-build-2.6.8-3-powerpc-smp_2.6.8-12sarge6_powerpc.deb stable/main/binary-powerpc/kernel-build-2.6.8-3-power3_2.6.8-12sarge6_powerpc.deb stable/main/binary-powerpc/kernel-image-2.6.8-3-powerpc-smp_2.6.8-12sarge6_powerpc.deb stable/main/binary-powerpc/kernel-image-2.6.8-3-power3-smp_2.6.8-12sarge6_powerpc.deb kernel-patch-powerpc-2.6.8 (2.6.8-12sarge6) stable-security; urgency=high * Build against kernel-tree-2.6.8-16sarge6: * perfmon-fd-refcnt.dpatch [SECURITY][ia64] Fix file descriptor leak in perfmonctl system call which could be used as a local denial of service attack by depleting the system of file descriptors See CVE-2006-3741 * ia64-sparc-cross-region-mappings.dpatch [SECURITY] Prevent cross-region mappings on ia64 and sparc which could be used in a local DoS attack (system crash) See CVE-2006-4538 * __block_prepare_write-recovery.dpatch [SECURITY] Fix an information leak in __block_prepare_write() See CVE-2006-4813 * atm-clip-freed-skb-deref.dpatch [SECURITY] Avoid dereferencing an already freed skb, preventing a potential remote DoS (system crash) vector See CVE-2006-4997 * ip6_flowlabel-lockup.dpatch [SECURITY] Fix local DoS attack vector (lockups, oopses) in the sequence handling for /proc/net/ip6_flowlabel See CVE-2006-5619 * ppc-alignment-exception-table-check.dpatch [SECURITY][ppc] Avoid potential DoS which can be triggered by some futex ops See CVE-2006-5649 * s390-uaccess-memleak.dpatch [SECURITY][s390] Fix memory leak in copy_from_user by clearing the remaining bytes of the kernel buffer after a fault on the userspace address in copy_from_user() See CVE-2006-5174 * smbfs-honor-mount-opts.dpatch Honor uid, gid and mode mount options for smbfs even when unix extensions are enabled See CVE-2006-5871 * bridge-get_fdb_entries-overflow.dpatch Protect against possible overflow in get_fdb_entries See CVE-2006-5751 stable/main/binary-powerpc/kernel-image-2.4.27-apus_2.4.27-10sarge5_powerpc.deb stable/main/binary-powerpc/kernel-patch-2.4.27-apus_2.4.27-10sarge5_powerpc.deb stable/main/binary-powerpc/kernel-image-2.4.27-powerpc-small_2.4.27-10sarge5_powerpc.deb stable/main/binary-powerpc/kernel-build-2.4.27-powerpc-smp_2.4.27-10sarge5_powerpc.deb stable/main/binary-powerpc/kernel-image-2.4.27-powerpc-smp_2.4.27-10sarge5_powerpc.deb stable/main/binary-powerpc/kernel-patch-2.4.27-nubus_2.4.27-10sarge5_powerpc.deb stable/main/binary-powerpc/kernel-image-2.4.27-powerpc_2.4.27-10sarge5_powerpc.deb stable/main/binary-powerpc/kernel-build-2.4.27-nubus_2.4.27-10sarge5_powerpc.deb stable/main/binary-powerpc/kernel-headers-2.4.27-nubus_2.4.27-10sarge5_powerpc.deb stable/main/binary-powerpc/kernel-image-2.4.27-nubus_2.4.27-10sarge5_powerpc.deb stable/main/binary-powerpc/kernel-build-2.4.27-apus_2.4.27-10sarge5_powerpc.deb stable/main/binary-powerpc/kernel-build-2.4.27-powerpc-small_2.4.27-10sarge5_powerpc.deb stable/main/source/kernel-patch-powerpc-2.4.27_2.4.27-10sarge5.dsc stable/main/binary-powerpc/kernel-headers-2.4.27-powerpc_2.4.27-10sarge5_powerpc.deb stable/main/source/kernel-patch-powerpc-2.4.27_2.4.27-10sarge5.tar.gz stable/main/binary-powerpc/kernel-build-2.4.27-powerpc_2.4.27-10sarge5_powerpc.deb stable/main/binary-powerpc/kernel-patch-2.4.27-powerpc_2.4.27-10sarge5_powerpc.deb stable/main/binary-powerpc/kernel-headers-2.4.27-apus_2.4.27-10sarge5_powerpc.deb kernel-patch-powerpc-2.4.27 (2.4.27-10sarge5) stable-security; urgency=high * Build against kernel-tree-2.4.27-10sarge5: * 233_ia64-sparc-cross-region-mappings.diff [SECURITY] Prevent cross-region mappings on ia64 and sparc which could be used in a local DoS attack (system crash) See CVE-2006-4538 * 234_atm-clip-freed-skb-deref.diff [SECURITY] Avoid dereferencing an already freed skb, preventing a potential remote DoS (system crash) vector See CVE-2006-4997 * 235_ppc-alignment-exception-table-check.diff [SECURITY][ppc] Avoid potential DoS which can be triggered by some futex ops See CVE-2006-5649 * 236_s390-uaccess-memleak.diff [SECURITY][s390] Fix memory leak in copy_from_user by clearing the remaining bytes of the kernel buffer after a fault on the userspace address in copy_from_user() See CVE-2006-5174 * 237_smbfs-honor-mount-opts.diff Honor uid, gid and mode mount options for smbfs even when unix extensions are enabled (closes: #310982) See CVE-2006-5871 * 238_ppc-hid0-dos.diff [SECURITY] [ppc] Fix local DoS by clearing HID0 attention enable on PPC970 at boot time See CVE-2006-4093 stable/main/source/kernel-patch-2.6.8-hppa_2.6.8-5sarge1.dsc stable/main/source/kernel-patch-2.6.8-hppa_2.6.8-5sarge1.tar.gz stable/main/binary-all/kernel-patch-2.6.8-hppa_2.6.8-5sarge1_all.deb kernel-patch-2.6.8-hppa (2.6.8-5sarge1) stable-security; urgency=high * Update patch to apply to kernel-tree-2.6.8-16sarge6 stable/main/binary-sparc/mips-tools_2.4.27-10.sarge4.040815-2_sparc.deb kernel-patch-2.4.27-mips (2.4.27-10.sarge4.040815-2) stable-security; urgency=high * Build against kernel-tree-2.4.27-10sarge5: * 233_ia64-sparc-cross-region-mappings.diff [SECURITY] Prevent cross-region mappings on ia64 and sparc which could be used in a local DoS attack (system crash) See CVE-2006-4538 * 234_atm-clip-freed-skb-deref.diff [SECURITY] Avoid dereferencing an already freed skb, preventing a potential remote DoS (system crash) vector See CVE-2006-4997 * 235_ppc-alignment-exception-table-check.diff [SECURITY][ppc] Avoid potential DoS which can be triggered by some futex ops See CVE-2006-5649 * 236_s390-uaccess-memleak.diff [SECURITY][s390] Fix memory leak in copy_from_user by clearing the remaining bytes of the kernel buffer after a fault on the userspace address in copy_from_user() See CVE-2006-5174 * 237_smbfs-honor-mount-opts.diff Honor uid, gid and mode mount options for smbfs even when unix extensions are enabled (closes: #310982) See CVE-2006-5871 * 238_ppc-hid0-dos.diff [SECURITY] [ppc] Fix local DoS by clearing HID0 attention enable on PPC970 at boot time See CVE-2006-4093 stable/main/binary-s390/mips-tools_2.4.27-10.sarge4.040815-2_s390.deb kernel-patch-2.4.27-mips (2.4.27-10.sarge4.040815-2) stable-security; urgency=high * Build against kernel-tree-2.4.27-10sarge5: * 233_ia64-sparc-cross-region-mappings.diff [SECURITY] Prevent cross-region mappings on ia64 and sparc which could be used in a local DoS attack (system crash) See CVE-2006-4538 * 234_atm-clip-freed-skb-deref.diff [SECURITY] Avoid dereferencing an already freed skb, preventing a potential remote DoS (system crash) vector See CVE-2006-4997 * 235_ppc-alignment-exception-table-check.diff [SECURITY][ppc] Avoid potential DoS which can be triggered by some futex ops See CVE-2006-5649 * 236_s390-uaccess-memleak.diff [SECURITY][s390] Fix memory leak in copy_from_user by clearing the remaining bytes of the kernel buffer after a fault on the userspace address in copy_from_user() See CVE-2006-5174 * 237_smbfs-honor-mount-opts.diff Honor uid, gid and mode mount options for smbfs even when unix extensions are enabled (closes: #310982) See CVE-2006-5871 * 238_ppc-hid0-dos.diff [SECURITY] [ppc] Fix local DoS by clearing HID0 attention enable on PPC970 at boot time See CVE-2006-4093 stable/main/binary-powerpc/mips-tools_2.4.27-10.sarge4.040815-2_powerpc.deb kernel-patch-2.4.27-mips (2.4.27-10.sarge4.040815-2) stable-security; urgency=high * Build against kernel-tree-2.4.27-10sarge5: * 233_ia64-sparc-cross-region-mappings.diff [SECURITY] Prevent cross-region mappings on ia64 and sparc which could be used in a local DoS attack (system crash) See CVE-2006-4538 * 234_atm-clip-freed-skb-deref.diff [SECURITY] Avoid dereferencing an already freed skb, preventing a potential remote DoS (system crash) vector See CVE-2006-4997 * 235_ppc-alignment-exception-table-check.diff [SECURITY][ppc] Avoid potential DoS which can be triggered by some futex ops See CVE-2006-5649 * 236_s390-uaccess-memleak.diff [SECURITY][s390] Fix memory leak in copy_from_user by clearing the remaining bytes of the kernel buffer after a fault on the userspace address in copy_from_user() See CVE-2006-5174 * 237_smbfs-honor-mount-opts.diff Honor uid, gid and mode mount options for smbfs even when unix extensions are enabled (closes: #310982) See CVE-2006-5871 * 238_ppc-hid0-dos.diff [SECURITY] [ppc] Fix local DoS by clearing HID0 attention enable on PPC970 at boot time See CVE-2006-4093 stable/main/binary-mipsel/kernel-image-2.4.27-r4k-kn04_2.4.27-10.sarge4.040815-2_mipsel.deb stable/main/binary-mipsel/kernel-image-2.4.27-r5k-cobalt_2.4.27-10.sarge4.040815-2_mipsel.deb stable/main/binary-mipsel/kernel-image-2.4.27-r5k-lasat_2.4.27-10.sarge4.040815-2_mipsel.deb stable/main/binary-mipsel/mips-tools_2.4.27-10.sarge4.040815-2_mipsel.deb stable/main/binary-mipsel/kernel-image-2.4.27-r3k-kn02_2.4.27-10.sarge4.040815-2_mipsel.deb stable/main/binary-mipsel/kernel-image-2.4.27-xxs1500_2.4.27-10.sarge4.040815-2_mipsel.deb stable/main/binary-mipsel/kernel-image-2.4.27-sb1-swarm-bn_2.4.27-10.sarge4.040815-2_mipsel.deb stable/main/binary-mipsel/kernel-headers-2.4.27_2.4.27-10.sarge4.040815-2_mipsel.deb kernel-patch-2.4.27-mips (2.4.27-10.sarge4.040815-2) stable-security; urgency=high * Build against kernel-tree-2.4.27-10sarge5: * 233_ia64-sparc-cross-region-mappings.diff [SECURITY] Prevent cross-region mappings on ia64 and sparc which could be used in a local DoS attack (system crash) See CVE-2006-4538 * 234_atm-clip-freed-skb-deref.diff [SECURITY] Avoid dereferencing an already freed skb, preventing a potential remote DoS (system crash) vector See CVE-2006-4997 * 235_ppc-alignment-exception-table-check.diff [SECURITY][ppc] Avoid potential DoS which can be triggered by some futex ops See CVE-2006-5649 * 236_s390-uaccess-memleak.diff [SECURITY][s390] Fix memory leak in copy_from_user by clearing the remaining bytes of the kernel buffer after a fault on the userspace address in copy_from_user() See CVE-2006-5174 * 237_smbfs-honor-mount-opts.diff Honor uid, gid and mode mount options for smbfs even when unix extensions are enabled (closes: #310982) See CVE-2006-5871 * 238_ppc-hid0-dos.diff [SECURITY] [ppc] Fix local DoS by clearing HID0 attention enable on PPC970 at boot time See CVE-2006-4093 stable/main/binary-mips/kernel-headers-2.4.27_2.4.27-10.sarge4.040815-2_mips.deb stable/main/binary-mips/kernel-image-2.4.27-r4k-ip22_2.4.27-10.sarge4.040815-2_mips.deb stable/main/binary-mips/kernel-image-2.4.27-r5k-ip22_2.4.27-10.sarge4.040815-2_mips.deb stable/main/binary-mips/mips-tools_2.4.27-10.sarge4.040815-2_mips.deb stable/main/binary-mips/kernel-image-2.4.27-sb1-swarm-bn_2.4.27-10.sarge4.040815-2_mips.deb kernel-patch-2.4.27-mips (2.4.27-10.sarge4.040815-2) stable-security; urgency=high * Build against kernel-tree-2.4.27-10sarge5: * 233_ia64-sparc-cross-region-mappings.diff [SECURITY] Prevent cross-region mappings on ia64 and sparc which could be used in a local DoS attack (system crash) See CVE-2006-4538 * 234_atm-clip-freed-skb-deref.diff [SECURITY] Avoid dereferencing an already freed skb, preventing a potential remote DoS (system crash) vector See CVE-2006-4997 * 235_ppc-alignment-exception-table-check.diff [SECURITY][ppc] Avoid potential DoS which can be triggered by some futex ops See CVE-2006-5649 * 236_s390-uaccess-memleak.diff [SECURITY][s390] Fix memory leak in copy_from_user by clearing the remaining bytes of the kernel buffer after a fault on the userspace address in copy_from_user() See CVE-2006-5174 * 237_smbfs-honor-mount-opts.diff Honor uid, gid and mode mount options for smbfs even when unix extensions are enabled (closes: #310982) See CVE-2006-5871 * 238_ppc-hid0-dos.diff [SECURITY] [ppc] Fix local DoS by clearing HID0 attention enable on PPC970 at boot time See CVE-2006-4093 stable/main/binary-m68k/mips-tools_2.4.27-10.sarge4.040815-2_m68k.deb kernel-patch-2.4.27-mips (2.4.27-10.sarge4.040815-2) stable-security; urgency=high * Build against kernel-tree-2.4.27-10sarge5: * 233_ia64-sparc-cross-region-mappings.diff [SECURITY] Prevent cross-region mappings on ia64 and sparc which could be used in a local DoS attack (system crash) See CVE-2006-4538 * 234_atm-clip-freed-skb-deref.diff [SECURITY] Avoid dereferencing an already freed skb, preventing a potential remote DoS (system crash) vector See CVE-2006-4997 * 235_ppc-alignment-exception-table-check.diff [SECURITY][ppc] Avoid potential DoS which can be triggered by some futex ops See CVE-2006-5649 * 236_s390-uaccess-memleak.diff [SECURITY][s390] Fix memory leak in copy_from_user by clearing the remaining bytes of the kernel buffer after a fault on the userspace address in copy_from_user() See CVE-2006-5174 * 237_smbfs-honor-mount-opts.diff Honor uid, gid and mode mount options for smbfs even when unix extensions are enabled (closes: #310982) See CVE-2006-5871 * 238_ppc-hid0-dos.diff [SECURITY] [ppc] Fix local DoS by clearing HID0 attention enable on PPC970 at boot time See CVE-2006-4093 stable/main/binary-ia64/mips-tools_2.4.27-10.sarge4.040815-2_ia64.deb kernel-patch-2.4.27-mips (2.4.27-10.sarge4.040815-2) stable-security; urgency=high * Build against kernel-tree-2.4.27-10sarge5: * 233_ia64-sparc-cross-region-mappings.diff [SECURITY] Prevent cross-region mappings on ia64 and sparc which could be used in a local DoS attack (system crash) See CVE-2006-4538 * 234_atm-clip-freed-skb-deref.diff [SECURITY] Avoid dereferencing an already freed skb, preventing a potential remote DoS (system crash) vector See CVE-2006-4997 * 235_ppc-alignment-exception-table-check.diff [SECURITY][ppc] Avoid potential DoS which can be triggered by some futex ops See CVE-2006-5649 * 236_s390-uaccess-memleak.diff [SECURITY][s390] Fix memory leak in copy_from_user by clearing the remaining bytes of the kernel buffer after a fault on the userspace address in copy_from_user() See CVE-2006-5174 * 237_smbfs-honor-mount-opts.diff Honor uid, gid and mode mount options for smbfs even when unix extensions are enabled (closes: #310982) See CVE-2006-5871 * 238_ppc-hid0-dos.diff [SECURITY] [ppc] Fix local DoS by clearing HID0 attention enable on PPC970 at boot time See CVE-2006-4093 stable/main/binary-hppa/mips-tools_2.4.27-10.sarge4.040815-2_hppa.deb kernel-patch-2.4.27-mips (2.4.27-10.sarge4.040815-2) stable-security; urgency=high * Build against kernel-tree-2.4.27-10sarge5: * 233_ia64-sparc-cross-region-mappings.diff [SECURITY] Prevent cross-region mappings on ia64 and sparc which could be used in a local DoS attack (system crash) See CVE-2006-4538 * 234_atm-clip-freed-skb-deref.diff [SECURITY] Avoid dereferencing an already freed skb, preventing a potential remote DoS (system crash) vector See CVE-2006-4997 * 235_ppc-alignment-exception-table-check.diff [SECURITY][ppc] Avoid potential DoS which can be triggered by some futex ops See CVE-2006-5649 * 236_s390-uaccess-memleak.diff [SECURITY][s390] Fix memory leak in copy_from_user by clearing the remaining bytes of the kernel buffer after a fault on the userspace address in copy_from_user() See CVE-2006-5174 * 237_smbfs-honor-mount-opts.diff Honor uid, gid and mode mount options for smbfs even when unix extensions are enabled (closes: #310982) See CVE-2006-5871 * 238_ppc-hid0-dos.diff [SECURITY] [ppc] Fix local DoS by clearing HID0 attention enable on PPC970 at boot time See CVE-2006-4093 stable/main/binary-arm/mips-tools_2.4.27-10.sarge4.040815-2_arm.deb kernel-patch-2.4.27-mips (2.4.27-10.sarge4.040815-2) stable-security; urgency=high * Build against kernel-tree-2.4.27-10sarge5: * 233_ia64-sparc-cross-region-mappings.diff [SECURITY] Prevent cross-region mappings on ia64 and sparc which could be used in a local DoS attack (system crash) See CVE-2006-4538 * 234_atm-clip-freed-skb-deref.diff [SECURITY] Avoid dereferencing an already freed skb, preventing a potential remote DoS (system crash) vector See CVE-2006-4997 * 235_ppc-alignment-exception-table-check.diff [SECURITY][ppc] Avoid potential DoS which can be triggered by some futex ops See CVE-2006-5649 * 236_s390-uaccess-memleak.diff [SECURITY][s390] Fix memory leak in copy_from_user by clearing the remaining bytes of the kernel buffer after a fault on the userspace address in copy_from_user() See CVE-2006-5174 * 237_smbfs-honor-mount-opts.diff Honor uid, gid and mode mount options for smbfs even when unix extensions are enabled (closes: #310982) See CVE-2006-5871 * 238_ppc-hid0-dos.diff [SECURITY] [ppc] Fix local DoS by clearing HID0 attention enable on PPC970 at boot time See CVE-2006-4093 stable/main/binary-alpha/mips-tools_2.4.27-10.sarge4.040815-2_alpha.deb kernel-patch-2.4.27-mips (2.4.27-10.sarge4.040815-2) stable-security; urgency=high * Build against kernel-tree-2.4.27-10sarge5: * 233_ia64-sparc-cross-region-mappings.diff [SECURITY] Prevent cross-region mappings on ia64 and sparc which could be used in a local DoS attack (system crash) See CVE-2006-4538 * 234_atm-clip-freed-skb-deref.diff [SECURITY] Avoid dereferencing an already freed skb, preventing a potential remote DoS (system crash) vector See CVE-2006-4997 * 235_ppc-alignment-exception-table-check.diff [SECURITY][ppc] Avoid potential DoS which can be triggered by some futex ops See CVE-2006-5649 * 236_s390-uaccess-memleak.diff [SECURITY][s390] Fix memory leak in copy_from_user by clearing the remaining bytes of the kernel buffer after a fault on the userspace address in copy_from_user() See CVE-2006-5174 * 237_smbfs-honor-mount-opts.diff Honor uid, gid and mode mount options for smbfs even when unix extensions are enabled (closes: #310982) See CVE-2006-5871 * 238_ppc-hid0-dos.diff [SECURITY] [ppc] Fix local DoS by clearing HID0 attention enable on PPC970 at boot time See CVE-2006-4093 stable/main/source/kernel-patch-2.4.27-mips_2.4.27-10.sarge4.040815-2.dsc stable/main/binary-i386/mips-tools_2.4.27-10.sarge4.040815-2_i386.deb stable/main/source/kernel-patch-2.4.27-mips_2.4.27-10.sarge4.040815-2.tar.gz kernel-patch-2.4.27-mips (2.4.27-10.sarge4.040815-2) stable-security; urgency=high * Build against kernel-tree-2.4.27-10sarge5: * 233_ia64-sparc-cross-region-mappings.diff [SECURITY] Prevent cross-region mappings on ia64 and sparc which could be used in a local DoS attack (system crash) See CVE-2006-4538 * 234_atm-clip-freed-skb-deref.diff [SECURITY] Avoid dereferencing an already freed skb, preventing a potential remote DoS (system crash) vector See CVE-2006-4997 * 235_ppc-alignment-exception-table-check.diff [SECURITY][ppc] Avoid potential DoS which can be triggered by some futex ops See CVE-2006-5649 * 236_s390-uaccess-memleak.diff [SECURITY][s390] Fix memory leak in copy_from_user by clearing the remaining bytes of the kernel buffer after a fault on the userspace address in copy_from_user() See CVE-2006-5174 * 237_smbfs-honor-mount-opts.diff Honor uid, gid and mode mount options for smbfs even when unix extensions are enabled (closes: #310982) See CVE-2006-5871 * 238_ppc-hid0-dos.diff [SECURITY] [ppc] Fix local DoS by clearing HID0 attention enable on PPC970 at boot time See CVE-2006-4093 stable/main/binary-all/kernel-doc-2.4.27-speakup_2.4.27-1.1sarge4_all.deb stable/main/source/kernel-image-speakup-i386_2.4.27-1.1sarge4.tar.gz stable/main/binary-i386/kernel-headers-2.4.27-speakup_2.4.27-1.1sarge4_i386.deb stable/main/source/kernel-image-speakup-i386_2.4.27-1.1sarge4.dsc stable/main/binary-i386/kernel-image-2.4.27-speakup_2.4.27-1.1sarge4_i386.deb kernel-image-speakup-i386 (2.4.27-1.1sarge4) stable-security; urgency=high * Build against kernel-tree-2.4.27-10sarge5: * 233_ia64-sparc-cross-region-mappings.diff [SECURITY] Prevent cross-region mappings on ia64 and sparc which could be used in a local DoS attack (system crash) See CVE-2006-4538 * 234_atm-clip-freed-skb-deref.diff [SECURITY] Avoid dereferencing an already freed skb, preventing a potential remote DoS (system crash) vector See CVE-2006-4997 * 235_ppc-alignment-exception-table-check.diff [SECURITY][ppc] Avoid potential DoS which can be triggered by some futex ops See CVE-2006-5649 * 236_s390-uaccess-memleak.diff [SECURITY][s390] Fix memory leak in copy_from_user by clearing the remaining bytes of the kernel buffer after a fault on the userspace address in copy_from_user() See CVE-2006-5174 * 237_smbfs-honor-mount-opts.diff Honor uid, gid and mode mount options for smbfs even when unix extensions are enabled (closes: #310982) See CVE-2006-5871 * 238_ppc-hid0-dos.diff [SECURITY] [ppc] Fix local DoS by clearing HID0 attention enable on PPC970 at boot time See CVE-2006-4093 stable/main/binary-sparc/kernel-headers-2.6.8-3-sparc64-smp_2.6.8-15sarge6_sparc.deb stable/main/binary-sparc/kernel-image-2.6.8-3-sparc64-smp_2.6.8-15sarge6_sparc.deb stable/main/binary-sparc/kernel-headers-2.6.8-3_2.6.8-15sarge6_sparc.deb stable/main/binary-sparc/kernel-headers-2.6.8-3-sparc64_2.6.8-15sarge6_sparc.deb stable/main/binary-sparc/kernel-headers-2.6.8-3-sparc32_2.6.8-15sarge6_sparc.deb stable/main/binary-sparc/kernel-image-2.6.8-3-sparc32_2.6.8-15sarge6_sparc.deb stable/main/binary-sparc/kernel-image-2.6.8-3-sparc64_2.6.8-15sarge6_sparc.deb stable/main/source/kernel-image-2.6.8-sparc_2.6.8-15sarge6.dsc stable/main/binary-sparc/kernel-build-2.6.8-3_2.6.8-15sarge6_sparc.deb stable/main/source/kernel-image-2.6.8-sparc_2.6.8-15sarge6.tar.gz kernel-image-2.6.8-sparc (2.6.8-15sarge6) stable-security; urgency=high * Build against kernel-tree-2.6.8-16sarge6: * perfmon-fd-refcnt.dpatch [SECURITY][ia64] Fix file descriptor leak in perfmonctl system call which could be used as a local denial of service attack by depleting the system of file descriptors See CVE-2006-3741 * ia64-sparc-cross-region-mappings.dpatch [SECURITY] Prevent cross-region mappings on ia64 and sparc which could be used in a local DoS attack (system crash) See CVE-2006-4538 * __block_prepare_write-recovery.dpatch [SECURITY] Fix an information leak in __block_prepare_write() See CVE-2006-4813 * atm-clip-freed-skb-deref.dpatch [SECURITY] Avoid dereferencing an already freed skb, preventing a potential remote DoS (system crash) vector See CVE-2006-4997 * ip6_flowlabel-lockup.dpatch [SECURITY] Fix local DoS attack vector (lockups, oopses) in the sequence handling for /proc/net/ip6_flowlabel See CVE-2006-5619 * ppc-alignment-exception-table-check.dpatch [SECURITY][ppc] Avoid potential DoS which can be triggered by some futex ops See CVE-2006-5649 * s390-uaccess-memleak.dpatch [SECURITY][s390] Fix memory leak in copy_from_user by clearing the remaining bytes of the kernel buffer after a fault on the userspace address in copy_from_user() See CVE-2006-5174 * smbfs-honor-mount-opts.dpatch Honor uid, gid and mode mount options for smbfs even when unix extensions are enabled See CVE-2006-5871 * bridge-get_fdb_entries-overflow.dpatch Protect against possible overflow in get_fdb_entries See CVE-2006-5751 stable/main/binary-s390/kernel-image-2.6.8-3-s390_2.6.8-5sarge6_s390.deb stable/main/binary-s390/kernel-image-2.6.8-3-s390x_2.6.8-5sarge6_s390.deb stable/main/binary-s390/kernel-headers-2.6.8-3_2.6.8-5sarge6_s390.deb stable/main/source/kernel-image-2.6.8-s390_2.6.8-5sarge6.dsc stable/main/binary-all/kernel-patch-2.6.8-s390_2.6.8-5sarge6_all.deb stable/main/binary-s390/kernel-image-2.6.8-3-s390-tape_2.6.8-5sarge6_s390.deb stable/main/source/kernel-image-2.6.8-s390_2.6.8-5sarge6.tar.gz kernel-image-2.6.8-s390 (2.6.8-5sarge6) stable-security; urgency=high * Build against kernel-tree-2.6.8-16sarge6: * perfmon-fd-refcnt.dpatch [SECURITY][ia64] Fix file descriptor leak in perfmonctl system call which could be used as a local denial of service attack by depleting the system of file descriptors See CVE-2006-3741 * ia64-sparc-cross-region-mappings.dpatch [SECURITY] Prevent cross-region mappings on ia64 and sparc which could be used in a local DoS attack (system crash) See CVE-2006-4538 * __block_prepare_write-recovery.dpatch [SECURITY] Fix an information leak in __block_prepare_write() See CVE-2006-4813 * atm-clip-freed-skb-deref.dpatch [SECURITY] Avoid dereferencing an already freed skb, preventing a potential remote DoS (system crash) vector See CVE-2006-4997 * ip6_flowlabel-lockup.dpatch [SECURITY] Fix local DoS attack vector (lockups, oopses) in the sequence handling for /proc/net/ip6_flowlabel See CVE-2006-5619 * ppc-alignment-exception-table-check.dpatch [SECURITY][ppc] Avoid potential DoS which can be triggered by some futex ops See CVE-2006-5649 * s390-uaccess-memleak.dpatch [SECURITY][s390] Fix memory leak in copy_from_user by clearing the remaining bytes of the kernel buffer after a fault on the userspace address in copy_from_user() See CVE-2006-5174 * smbfs-honor-mount-opts.dpatch Honor uid, gid and mode mount options for smbfs even when unix extensions are enabled See CVE-2006-5871 * bridge-get_fdb_entries-overflow.dpatch Protect against possible overflow in get_fdb_entries See CVE-2006-5751 stable/main/binary-m68k/kernel-image-2.6.8-hp_2.6.8-4sarge6_m68k.deb stable/main/binary-m68k/kernel-image-2.6.8-q40_2.6.8-4sarge6_m68k.deb stable/main/binary-m68k/kernel-image-2.6.8-bvme6000_2.6.8-4sarge6_m68k.deb stable/main/binary-m68k/kernel-image-2.6.8-mvme16x_2.6.8-4sarge6_m68k.deb stable/main/source/kernel-image-2.6.8-m68k_2.6.8-4sarge6.tar.gz stable/main/source/kernel-image-2.6.8-m68k_2.6.8-4sarge6.dsc stable/main/binary-m68k/kernel-image-2.6.8-mac_2.6.8-4sarge6_m68k.deb stable/main/binary-m68k/kernel-image-2.6.8-sun3_2.6.8-4sarge6_m68k.deb stable/main/binary-m68k/kernel-image-2.6.8-atari_2.6.8-4sarge6_m68k.deb stable/main/binary-m68k/kernel-image-2.6.8-mvme147_2.6.8-4sarge6_m68k.deb stable/main/binary-m68k/kernel-image-2.6.8-amiga_2.6.8-4sarge6_m68k.deb kernel-image-2.6.8-m68k (2.6.8-4sarge6) stable-security; urgency=high * Build against kernel-tree-2.6.8-16sarge6: * perfmon-fd-refcnt.dpatch [SECURITY][ia64] Fix file descriptor leak in perfmonctl system call which could be used as a local denial of service attack by depleting the system of file descriptors See CVE-2006-3741 * ia64-sparc-cross-region-mappings.dpatch [SECURITY] Prevent cross-region mappings on ia64 and sparc which could be used in a local DoS attack (system crash) See CVE-2006-4538 * __block_prepare_write-recovery.dpatch [SECURITY] Fix an information leak in __block_prepare_write() See CVE-2006-4813 * atm-clip-freed-skb-deref.dpatch [SECURITY] Avoid dereferencing an already freed skb, preventing a potential remote DoS (system crash) vector See CVE-2006-4997 * ip6_flowlabel-lockup.dpatch [SECURITY] Fix local DoS attack vector (lockups, oopses) in the sequence handling for /proc/net/ip6_flowlabel See CVE-2006-5619 * ppc-alignment-exception-table-check.dpatch [SECURITY][ppc] Avoid potential DoS which can be triggered by some futex ops See CVE-2006-5649 * s390-uaccess-memleak.dpatch [SECURITY][s390] Fix memory leak in copy_from_user by clearing the remaining bytes of the kernel buffer after a fault on the userspace address in copy_from_user() See CVE-2006-5174 * smbfs-honor-mount-opts.dpatch Honor uid, gid and mode mount options for smbfs even when unix extensions are enabled See CVE-2006-5871 * bridge-get_fdb_entries-overflow.dpatch Protect against possible overflow in get_fdb_entries See CVE-2006-5751 stable/main/binary-ia64/kernel-headers-2.6-itanium_2.6.8-14sarge6_ia64.deb stable/main/binary-ia64/kernel-image-2.6.8-3-mckinley_2.6.8-14sarge6_ia64.deb stable/main/binary-ia64/kernel-image-2.6-itanium-smp_2.6.8-14sarge6_ia64.deb stable/main/binary-ia64/kernel-headers-2.6-mckinley_2.6.8-14sarge6_ia64.deb stable/main/binary-ia64/kernel-image-2.6.8-3-mckinley-smp_2.6.8-14sarge6_ia64.deb stable/main/source/kernel-image-2.6.8-ia64_2.6.8-14sarge6.tar.gz stable/main/binary-ia64/kernel-headers-2.6.8-3-mckinley-smp_2.6.8-14sarge6_ia64.deb stable/main/binary-ia64/kernel-headers-2.6.8-3-itanium-smp_2.6.8-14sarge6_ia64.deb stable/main/binary-ia64/kernel-image-2.6.8-3-itanium-smp_2.6.8-14sarge6_ia64.deb stable/main/binary-ia64/kernel-headers-2.6.8-3-mckinley_2.6.8-14sarge6_ia64.deb stable/main/binary-ia64/kernel-image-2.6-itanium_2.6.8-14sarge6_ia64.deb stable/main/binary-ia64/kernel-headers-2.6.8-3_2.6.8-14sarge6_ia64.deb stable/main/binary-ia64/kernel-image-2.6-mckinley_2.6.8-14sarge6_ia64.deb stable/main/source/kernel-image-2.6.8-ia64_2.6.8-14sarge6.dsc stable/main/binary-ia64/kernel-headers-2.6.8-3-itanium_2.6.8-14sarge6_ia64.deb stable/main/binary-ia64/kernel-headers-2.6-itanium-smp_2.6.8-14sarge6_ia64.deb stable/main/binary-ia64/kernel-image-2.6.8-3-itanium_2.6.8-14sarge6_ia64.deb stable/main/binary-ia64/kernel-image-2.6-mckinley-smp_2.6.8-14sarge6_ia64.deb stable/main/binary-ia64/kernel-headers-2.6-mckinley-smp_2.6.8-14sarge6_ia64.deb kernel-image-2.6.8-ia64 (2.6.8-14sarge6) stable-security; urgency=high * Build against kernel-tree-2.6.8-16sarge6: * perfmon-fd-refcnt.dpatch [SECURITY][ia64] Fix file descriptor leak in perfmonctl system call which could be used as a local denial of service attack by depleting the system of file descriptors See CVE-2006-3741 * ia64-sparc-cross-region-mappings.dpatch [SECURITY] Prevent cross-region mappings on ia64 and sparc which could be used in a local DoS attack (system crash) See CVE-2006-4538 * __block_prepare_write-recovery.dpatch [SECURITY] Fix an information leak in __block_prepare_write() See CVE-2006-4813 * atm-clip-freed-skb-deref.dpatch [SECURITY] Avoid dereferencing an already freed skb, preventing a potential remote DoS (system crash) vector See CVE-2006-4997 * ip6_flowlabel-lockup.dpatch [SECURITY] Fix local DoS attack vector (lockups, oopses) in the sequence handling for /proc/net/ip6_flowlabel See CVE-2006-5619 * ppc-alignment-exception-table-check.dpatch [SECURITY][ppc] Avoid potential DoS which can be triggered by some futex ops See CVE-2006-5649 * s390-uaccess-memleak.dpatch [SECURITY][s390] Fix memory leak in copy_from_user by clearing the remaining bytes of the kernel buffer after a fault on the userspace address in copy_from_user() See CVE-2006-5174 * smbfs-honor-mount-opts.dpatch Honor uid, gid and mode mount options for smbfs even when unix extensions are enabled See CVE-2006-5871 * bridge-get_fdb_entries-overflow.dpatch Protect against possible overflow in get_fdb_entries See CVE-2006-5751 stable/main/binary-i386/kernel-headers-2.6.8-3-686-smp_2.6.8-16sarge6_i386.deb stable/main/binary-i386/kernel-image-2.6.8-3-k7_2.6.8-16sarge6_i386.deb stable/main/binary-i386/kernel-headers-2.6.8-3-k7_2.6.8-16sarge6_i386.deb stable/main/binary-i386/kernel-image-2.6.8-3-k7-smp_2.6.8-16sarge6_i386.deb stable/main/binary-i386/kernel-image-2.6.8-3-686-smp_2.6.8-16sarge6_i386.deb stable/main/source/kernel-image-2.6.8-i386_2.6.8-16sarge6.tar.gz stable/main/binary-i386/kernel-image-2.6.8-3-686_2.6.8-16sarge6_i386.deb stable/main/binary-i386/kernel-headers-2.6.8-3-k7-smp_2.6.8-16sarge6_i386.deb stable/main/source/kernel-image-2.6.8-i386_2.6.8-16sarge6.dsc stable/main/binary-i386/kernel-image-2.6.8-3-386_2.6.8-16sarge6_i386.deb stable/main/binary-i386/kernel-headers-2.6.8-3-386_2.6.8-16sarge6_i386.deb stable/main/binary-i386/kernel-headers-2.6.8-3-686_2.6.8-16sarge6_i386.deb stable/main/binary-i386/kernel-headers-2.6.8-3_2.6.8-16sarge6_i386.deb kernel-image-2.6.8-i386 (2.6.8-16sarge6) stable-security; urgency=high * Build against kernel-tree-2.6.8-16sarge6: * perfmon-fd-refcnt.dpatch [SECURITY][ia64] Fix file descriptor leak in perfmonctl system call which could be used as a local denial of service attack by depleting the system of file descriptors See CVE-2006-3741 * ia64-sparc-cross-region-mappings.dpatch [SECURITY] Prevent cross-region mappings on ia64 and sparc which could be used in a local DoS attack (system crash) See CVE-2006-4538 * __block_prepare_write-recovery.dpatch [SECURITY] Fix an information leak in __block_prepare_write() See CVE-2006-4813 * atm-clip-freed-skb-deref.dpatch [SECURITY] Avoid dereferencing an already freed skb, preventing a potential remote DoS (system crash) vector See CVE-2006-4997 * ip6_flowlabel-lockup.dpatch [SECURITY] Fix local DoS attack vector (lockups, oopses) in the sequence handling for /proc/net/ip6_flowlabel See CVE-2006-5619 * ppc-alignment-exception-table-check.dpatch [SECURITY][ppc] Avoid potential DoS which can be triggered by some futex ops See CVE-2006-5649 * s390-uaccess-memleak.dpatch [SECURITY][s390] Fix memory leak in copy_from_user by clearing the remaining bytes of the kernel buffer after a fault on the userspace address in copy_from_user() See CVE-2006-5174 * smbfs-honor-mount-opts.dpatch Honor uid, gid and mode mount options for smbfs even when unix extensions are enabled See CVE-2006-5871 * bridge-get_fdb_entries-overflow.dpatch Protect against possible overflow in get_fdb_entries See CVE-2006-5751 stable/main/binary-hppa/kernel-headers-2.6.8-3_2.6.8-6sarge6_hppa.deb stable/main/binary-hppa/kernel-image-2.6.8-3-64_2.6.8-6sarge6_hppa.deb stable/main/binary-hppa/kernel-image-2.6.8-3-64-smp_2.6.8-6sarge6_hppa.deb stable/main/binary-hppa/kernel-headers-2.6.8-3-64-smp_2.6.8-6sarge6_hppa.deb stable/main/binary-hppa/kernel-image-2.6.8-3-32_2.6.8-6sarge6_hppa.deb stable/main/source/kernel-image-2.6.8-hppa_2.6.8-6sarge6.tar.gz stable/main/source/kernel-image-2.6.8-hppa_2.6.8-6sarge6.dsc stable/main/binary-hppa/kernel-headers-2.6.8-3-32-smp_2.6.8-6sarge6_hppa.deb stable/main/binary-hppa/kernel-image-2.6.8-3-32-smp_2.6.8-6sarge6_hppa.deb stable/main/binary-hppa/kernel-headers-2.6.8-3-64_2.6.8-6sarge6_hppa.deb stable/main/binary-hppa/kernel-headers-2.6.8-3-32_2.6.8-6sarge6_hppa.deb kernel-image-2.6.8-hppa (2.6.8-6sarge6) stable-security; urgency=high * Build against kernel-tree-2.6.8-16sarge6: * perfmon-fd-refcnt.dpatch [SECURITY][ia64] Fix file descriptor leak in perfmonctl system call which could be used as a local denial of service attack by depleting the system of file descriptors See CVE-2006-3741 * ia64-sparc-cross-region-mappings.dpatch [SECURITY] Prevent cross-region mappings on ia64 and sparc which could be used in a local DoS attack (system crash) See CVE-2006-4538 * __block_prepare_write-recovery.dpatch [SECURITY] Fix an information leak in __block_prepare_write() See CVE-2006-4813 * atm-clip-freed-skb-deref.dpatch [SECURITY] Avoid dereferencing an already freed skb, preventing a potential remote DoS (system crash) vector See CVE-2006-4997 * ip6_flowlabel-lockup.dpatch [SECURITY] Fix local DoS attack vector (lockups, oopses) in the sequence handling for /proc/net/ip6_flowlabel See CVE-2006-5619 * ppc-alignment-exception-table-check.dpatch [SECURITY][ppc] Avoid potential DoS which can be triggered by some futex ops See CVE-2006-5649 * s390-uaccess-memleak.dpatch [SECURITY][s390] Fix memory leak in copy_from_user by clearing the remaining bytes of the kernel buffer after a fault on the userspace address in copy_from_user() See CVE-2006-5174 * smbfs-honor-mount-opts.dpatch Honor uid, gid and mode mount options for smbfs even when unix extensions are enabled See CVE-2006-5871 * bridge-get_fdb_entries-overflow.dpatch Protect against possible overflow in get_fdb_entries See CVE-2006-5751 * Build against kernel-patch-2.6.8-hppa (2.6.8-5sarge1) * Update patch to apply to kernel-tree-2.6.8-16sarge6 stable/main/binary-i386/kernel-headers-2.6.8-12-amd64-k8-smp_2.6.8-16sarge6_i386.deb stable/main/binary-i386/kernel-image-2.6.8-12-amd64-k8_2.6.8-16sarge6_i386.deb stable/main/binary-i386/kernel-image-2.6.8-12-amd64-k8-smp_2.6.8-16sarge6_i386.deb stable/main/binary-i386/kernel-image-2.6.8-12-em64t-p4_2.6.8-16sarge6_i386.deb stable/main/binary-i386/kernel-image-2.6.8-12-amd64-generic_2.6.8-16sarge6_i386.deb stable/main/binary-i386/kernel-headers-2.6.8-12_2.6.8-16sarge6_i386.deb stable/main/source/kernel-image-2.6.8-amd64_2.6.8-16sarge6.dsc stable/main/source/kernel-image-2.6.8-amd64_2.6.8-16sarge6.tar.gz stable/main/binary-i386/kernel-image-2.6.8-12-em64t-p4-smp_2.6.8-16sarge6_i386.deb stable/main/binary-i386/kernel-headers-2.6.8-12-em64t-p4-smp_2.6.8-16sarge6_i386.deb stable/main/binary-i386/kernel-headers-2.6.8-12-amd64-generic_2.6.8-16sarge6_i386.deb stable/main/binary-i386/kernel-headers-2.6.8-12-amd64-k8_2.6.8-16sarge6_i386.deb stable/main/binary-i386/kernel-headers-2.6.8-12-em64t-p4_2.6.8-16sarge6_i386.deb kernel-image-2.6.8-amd64 (2.6.8-16sarge6) stable-security; urgency=high * Build against kernel-tree-2.6.8-16sarge6: * perfmon-fd-refcnt.dpatch [SECURITY][ia64] Fix file descriptor leak in perfmonctl system call which could be used as a local denial of service attack by depleting the system of file descriptors See CVE-2006-3741 * ia64-sparc-cross-region-mappings.dpatch [SECURITY] Prevent cross-region mappings on ia64 and sparc which could be used in a local DoS attack (system crash) See CVE-2006-4538 * __block_prepare_write-recovery.dpatch [SECURITY] Fix an information leak in __block_prepare_write() See CVE-2006-4813 * atm-clip-freed-skb-deref.dpatch [SECURITY] Avoid dereferencing an already freed skb, preventing a potential remote DoS (system crash) vector See CVE-2006-4997 * ip6_flowlabel-lockup.dpatch [SECURITY] Fix local DoS attack vector (lockups, oopses) in the sequence handling for /proc/net/ip6_flowlabel See CVE-2006-5619 * ppc-alignment-exception-table-check.dpatch [SECURITY][ppc] Avoid potential DoS which can be triggered by some futex ops See CVE-2006-5649 * s390-uaccess-memleak.dpatch [SECURITY][s390] Fix memory leak in copy_from_user by clearing the remaining bytes of the kernel buffer after a fault on the userspace address in copy_from_user() See CVE-2006-5174 * smbfs-honor-mount-opts.dpatch Honor uid, gid and mode mount options for smbfs even when unix extensions are enabled See CVE-2006-5871 * bridge-get_fdb_entries-overflow.dpatch Protect against possible overflow in get_fdb_entries See CVE-2006-5751 stable/main/binary-alpha/kernel-image-2.6.8-3-generic_2.6.8-16sarge6_alpha.deb stable/main/binary-alpha/kernel-image-2.6.8-3-smp_2.6.8-16sarge6_alpha.deb stable/main/binary-alpha/kernel-headers-2.6.8-3-smp_2.6.8-16sarge6_alpha.deb stable/main/source/kernel-image-2.6.8-alpha_2.6.8-16sarge6.dsc stable/main/binary-alpha/kernel-headers-2.6.8-3_2.6.8-16sarge6_alpha.deb stable/main/source/kernel-image-2.6.8-alpha_2.6.8-16sarge6.tar.gz stable/main/binary-alpha/kernel-headers-2.6.8-3-generic_2.6.8-16sarge6_alpha.deb kernel-image-2.6.8-alpha (2.6.8-16sarge6) stable-security; urgency=high * Build against kernel-tree-2.6.8-16sarge6: * perfmon-fd-refcnt.dpatch [SECURITY][ia64] Fix file descriptor leak in perfmonctl system call which could be used as a local denial of service attack by depleting the system of file descriptors See CVE-2006-3741 * ia64-sparc-cross-region-mappings.dpatch [SECURITY] Prevent cross-region mappings on ia64 and sparc which could be used in a local DoS attack (system crash) See CVE-2006-4538 * __block_prepare_write-recovery.dpatch [SECURITY] Fix an information leak in __block_prepare_write() See CVE-2006-4813 * atm-clip-freed-skb-deref.dpatch [SECURITY] Avoid dereferencing an already freed skb, preventing a potential remote DoS (system crash) vector See CVE-2006-4997 * ip6_flowlabel-lockup.dpatch [SECURITY] Fix local DoS attack vector (lockups, oopses) in the sequence handling for /proc/net/ip6_flowlabel See CVE-2006-5619 * ppc-alignment-exception-table-check.dpatch [SECURITY][ppc] Avoid potential DoS which can be triggered by some futex ops See CVE-2006-5649 * s390-uaccess-memleak.dpatch [SECURITY][s390] Fix memory leak in copy_from_user by clearing the remaining bytes of the kernel buffer after a fault on the userspace address in copy_from_user() See CVE-2006-5174 * smbfs-honor-mount-opts.dpatch Honor uid, gid and mode mount options for smbfs even when unix extensions are enabled See CVE-2006-5871 * bridge-get_fdb_entries-overflow.dpatch Protect against possible overflow in get_fdb_entries See CVE-2006-5751 stable/main/binary-sparc/kernel-build-2.4.27-3_2.4.27-9sarge5_sparc.deb stable/main/binary-sparc/kernel-headers-2.4.27-3-sparc64_2.4.27-9sarge5_sparc.deb stable/main/binary-sparc/kernel-image-2.4.27-3-sparc32-smp_2.4.27-9sarge5_sparc.deb stable/main/binary-sparc/kernel-headers-2.4.27-3-sparc32_2.4.27-9sarge5_sparc.deb stable/main/binary-sparc/kernel-image-2.4.27-3-sparc32_2.4.27-9sarge5_sparc.deb stable/main/source/kernel-image-2.4.27-sparc_2.4.27-9sarge5.dsc stable/main/binary-sparc/kernel-image-2.4.27-3-sparc64-smp_2.4.27-9sarge5_sparc.deb stable/main/binary-sparc/kernel-headers-2.4.27-3_2.4.27-9sarge5_sparc.deb stable/main/binary-sparc/kernel-image-2.4.27-3-sparc64_2.4.27-9sarge5_sparc.deb stable/main/source/kernel-image-2.4.27-sparc_2.4.27-9sarge5.tar.gz stable/main/binary-sparc/kernel-headers-2.4.27-3-sparc32-smp_2.4.27-9sarge5_sparc.deb stable/main/binary-sparc/kernel-headers-2.4.27-3-sparc64-smp_2.4.27-9sarge5_sparc.deb kernel-image-2.4.27-sparc (2.4.27-9sarge5) stable-security; urgency=high * Build against kernel-tree-2.4.27-10sarge5: * 233_ia64-sparc-cross-region-mappings.diff [SECURITY] Prevent cross-region mappings on ia64 and sparc which could be used in a local DoS attack (system crash) See CVE-2006-4538 * 234_atm-clip-freed-skb-deref.diff [SECURITY] Avoid dereferencing an already freed skb, preventing a potential remote DoS (system crash) vector See CVE-2006-4997 * 235_ppc-alignment-exception-table-check.diff [SECURITY][ppc] Avoid potential DoS which can be triggered by some futex ops See CVE-2006-5649 * 236_s390-uaccess-memleak.diff [SECURITY][s390] Fix memory leak in copy_from_user by clearing the remaining bytes of the kernel buffer after a fault on the userspace address in copy_from_user() See CVE-2006-5174 * 237_smbfs-honor-mount-opts.diff Honor uid, gid and mode mount options for smbfs even when unix extensions are enabled (closes: #310982) See CVE-2006-5871 * 238_ppc-hid0-dos.diff [SECURITY] [ppc] Fix local DoS by clearing HID0 attention enable on PPC970 at boot time See CVE-2006-4093 stable/main/source/kernel-image-2.4.27-s390_2.4.27-2sarge5.dsc stable/main/binary-s390/kernel-image-2.4.27-3-s390-tape_2.4.27-2sarge5_s390.deb stable/main/binary-s390/kernel-image-2.4.27-3-s390_2.4.27-2sarge5_s390.deb stable/main/binary-s390/kernel-headers-2.4.27-3_2.4.27-2sarge5_s390.deb stable/main/source/kernel-image-2.4.27-s390_2.4.27-2sarge5.tar.gz stable/main/binary-s390/kernel-image-2.4.27-3-s390x_2.4.27-2sarge5_s390.deb kernel-image-2.4.27-s390 (2.4.27-2sarge5) stable-security; urgency=high * Build against kernel-tree-2.4.27-10sarge5: * 233_ia64-sparc-cross-region-mappings.diff [SECURITY] Prevent cross-region mappings on ia64 and sparc which could be used in a local DoS attack (system crash) See CVE-2006-4538 * 234_atm-clip-freed-skb-deref.diff [SECURITY] Avoid dereferencing an already freed skb, preventing a potential remote DoS (system crash) vector See CVE-2006-4997 * 235_ppc-alignment-exception-table-check.diff [SECURITY][ppc] Avoid potential DoS which can be triggered by some futex ops See CVE-2006-5649 * 236_s390-uaccess-memleak.diff [SECURITY][s390] Fix memory leak in copy_from_user by clearing the remaining bytes of the kernel buffer after a fault on the userspace address in copy_from_user() See CVE-2006-5174 * 237_smbfs-honor-mount-opts.diff Honor uid, gid and mode mount options for smbfs even when unix extensions are enabled (closes: #310982) See CVE-2006-5871 * 238_ppc-hid0-dos.diff [SECURITY] [ppc] Fix local DoS by clearing HID0 attention enable on PPC970 at boot time See CVE-2006-4093 stable/main/binary-m68k/kernel-image-2.4.27-amiga_2.4.27-3sarge5_m68k.deb stable/main/binary-m68k/kernel-image-2.4.27-mvme16x_2.4.27-3sarge5_m68k.deb stable/main/binary-m68k/kernel-image-2.4.27-mvme147_2.4.27-3sarge5_m68k.deb stable/main/source/kernel-image-2.4.27-m68k_2.4.27-3sarge5.dsc stable/main/binary-m68k/kernel-image-2.4.27-atari_2.4.27-3sarge5_m68k.deb stable/main/source/kernel-image-2.4.27-m68k_2.4.27-3sarge5.tar.gz stable/main/binary-m68k/kernel-image-2.4.27-bvme6000_2.4.27-3sarge5_m68k.deb stable/main/binary-m68k/kernel-image-2.4.27-q40_2.4.27-3sarge5_m68k.deb stable/main/binary-m68k/kernel-image-2.4.27-mac_2.4.27-3sarge5_m68k.deb kernel-image-2.4.27-m68k (2.4.27-3sarge5) stable-security; urgency=high * Build against kernel-tree-2.4.27-10sarge5: * 233_ia64-sparc-cross-region-mappings.diff [SECURITY] Prevent cross-region mappings on ia64 and sparc which could be used in a local DoS attack (system crash) See CVE-2006-4538 * 234_atm-clip-freed-skb-deref.diff [SECURITY] Avoid dereferencing an already freed skb, preventing a potential remote DoS (system crash) vector See CVE-2006-4997 * 235_ppc-alignment-exception-table-check.diff [SECURITY][ppc] Avoid potential DoS which can be triggered by some futex ops See CVE-2006-5649 * 236_s390-uaccess-memleak.diff [SECURITY][s390] Fix memory leak in copy_from_user by clearing the remaining bytes of the kernel buffer after a fault on the userspace address in copy_from_user() See CVE-2006-5174 * 237_smbfs-honor-mount-opts.diff Honor uid, gid and mode mount options for smbfs even when unix extensions are enabled (closes: #310982) See CVE-2006-5871 * 238_ppc-hid0-dos.diff [SECURITY] [ppc] Fix local DoS by clearing HID0 attention enable on PPC970 at boot time See CVE-2006-4093 stable/main/binary-ia64/kernel-image-2.4-mckinley_2.4.27-10sarge5_ia64.deb stable/main/binary-ia64/kernel-image-2.4.27-3-itanium-smp_2.4.27-10sarge5_ia64.deb stable/main/binary-ia64/kernel-image-2.4.27-3-mckinley_2.4.27-10sarge5_ia64.deb stable/main/binary-ia64/kernel-build-2.4.27-3_2.4.27-10sarge5_ia64.deb stable/main/binary-ia64/kernel-headers-2.4.27-3-mckinley-smp_2.4.27-10sarge5_ia64.deb stable/main/binary-ia64/kernel-headers-2.4.27-3-itanium_2.4.27-10sarge5_ia64.deb stable/main/source/kernel-image-2.4.27-ia64_2.4.27-10sarge5.dsc stable/main/binary-ia64/kernel-image-2.4.27-3-mckinley-smp_2.4.27-10sarge5_ia64.deb stable/main/binary-ia64/kernel-headers-2.4.27-3-itanium-smp_2.4.27-10sarge5_ia64.deb stable/main/binary-ia64/kernel-headers-2.4.27-3_2.4.27-10sarge5_ia64.deb stable/main/source/kernel-image-2.4.27-ia64_2.4.27-10sarge5.tar.gz stable/main/binary-ia64/kernel-image-2.4-itanium_2.4.27-10sarge5_ia64.deb stable/main/binary-ia64/kernel-image-2.4-mckinley-smp_2.4.27-10sarge5_ia64.deb stable/main/binary-ia64/kernel-headers-2.4.27-3-mckinley_2.4.27-10sarge5_ia64.deb stable/main/binary-ia64/kernel-image-2.4.27-3-itanium_2.4.27-10sarge5_ia64.deb stable/main/binary-ia64/kernel-image-2.4-itanium-smp_2.4.27-10sarge5_ia64.deb kernel-image-2.4.27-ia64 (2.4.27-10sarge5) stable-security; urgency=high * Build against kernel-tree-2.4.27-10sarge5: * 233_ia64-sparc-cross-region-mappings.diff [SECURITY] Prevent cross-region mappings on ia64 and sparc which could be used in a local DoS attack (system crash) See CVE-2006-4538 * 234_atm-clip-freed-skb-deref.diff [SECURITY] Avoid dereferencing an already freed skb, preventing a potential remote DoS (system crash) vector See CVE-2006-4997 * 235_ppc-alignment-exception-table-check.diff [SECURITY][ppc] Avoid potential DoS which can be triggered by some futex ops See CVE-2006-5649 * 236_s390-uaccess-memleak.diff [SECURITY][s390] Fix memory leak in copy_from_user by clearing the remaining bytes of the kernel buffer after a fault on the userspace address in copy_from_user() See CVE-2006-5174 * 237_smbfs-honor-mount-opts.diff Honor uid, gid and mode mount options for smbfs even when unix extensions are enabled (closes: #310982) See CVE-2006-5871 * 238_ppc-hid0-dos.diff [SECURITY] [ppc] Fix local DoS by clearing HID0 attention enable on PPC970 at boot time See CVE-2006-4093 stable/main/binary-i386/kernel-pcmcia-modules-2.4.27-3-586tsc_2.4.27-10sarge5_i386.deb stable/main/binary-i386/kernel-headers-2.4.27-3-k7_2.4.27-10sarge5_i386.deb stable/main/binary-i386/kernel-headers-2.4.27-3-k6_2.4.27-10sarge5_i386.deb stable/main/binary-i386/kernel-image-2.4.27-3-686-smp_2.4.27-10sarge5_i386.deb stable/main/binary-i386/kernel-headers-2.4.27-3_2.4.27-10sarge5_i386.deb stable/main/binary-i386/kernel-pcmcia-modules-2.4.27-3-k7-smp_2.4.27-10sarge5_i386.deb stable/main/binary-i386/kernel-headers-2.4.27-3-686_2.4.27-10sarge5_i386.deb stable/main/binary-i386/kernel-pcmcia-modules-2.4.27-3-k7_2.4.27-10sarge5_i386.deb stable/main/binary-i386/kernel-image-2.4.27-3-k6_2.4.27-10sarge5_i386.deb stable/main/binary-i386/kernel-image-2.4.27-3-586tsc_2.4.27-10sarge5_i386.deb stable/main/binary-i386/kernel-pcmcia-modules-2.4.27-3-686-smp_2.4.27-10sarge5_i386.deb stable/main/binary-i386/kernel-image-2.4.27-3-686_2.4.27-10sarge5_i386.deb stable/main/binary-i386/kernel-headers-2.4.27-3-k7-smp_2.4.27-10sarge5_i386.deb stable/main/binary-i386/kernel-pcmcia-modules-2.4.27-3-686_2.4.27-10sarge5_i386.deb stable/main/binary-i386/kernel-pcmcia-modules-2.4.27-3-386_2.4.27-10sarge5_i386.deb stable/main/binary-i386/kernel-image-2.4.27-3-k7-smp_2.4.27-10sarge5_i386.deb stable/main/binary-i386/kernel-pcmcia-modules-2.4.27-3-k6_2.4.27-10sarge5_i386.deb stable/main/binary-i386/kernel-headers-2.4.27-3-686-smp_2.4.27-10sarge5_i386.deb stable/main/source/kernel-image-2.4.27-i386_2.4.27-10sarge5.tar.gz stable/main/binary-i386/kernel-image-2.4.27-3-386_2.4.27-10sarge5_i386.deb stable/main/binary-i386/kernel-build-2.4.27-3_2.4.27-10sarge5_i386.deb stable/main/binary-i386/kernel-headers-2.4.27-3-586tsc_2.4.27-10sarge5_i386.deb stable/main/binary-i386/kernel-image-2.4.27-3-k7_2.4.27-10sarge5_i386.deb stable/main/binary-i386/kernel-headers-2.4.27-3-386_2.4.27-10sarge5_i386.deb stable/main/source/kernel-image-2.4.27-i386_2.4.27-10sarge5.dsc kernel-image-2.4.27-i386 (2.4.27-10sarge5) stable-security; urgency=high * Build against kernel-tree-2.4.27-10sarge5: * 233_ia64-sparc-cross-region-mappings.diff [SECURITY] Prevent cross-region mappings on ia64 and sparc which could be used in a local DoS attack (system crash) See CVE-2006-4538 * 234_atm-clip-freed-skb-deref.diff [SECURITY] Avoid dereferencing an already freed skb, preventing a potential remote DoS (system crash) vector See CVE-2006-4997 * 235_ppc-alignment-exception-table-check.diff [SECURITY][ppc] Avoid potential DoS which can be triggered by some futex ops See CVE-2006-5649 * 236_s390-uaccess-memleak.diff [SECURITY][s390] Fix memory leak in copy_from_user by clearing the remaining bytes of the kernel buffer after a fault on the userspace address in copy_from_user() See CVE-2006-5174 * 237_smbfs-honor-mount-opts.diff Honor uid, gid and mode mount options for smbfs even when unix extensions are enabled (closes: #310982) See CVE-2006-5871 * 238_ppc-hid0-dos.diff [SECURITY] [ppc] Fix local DoS by clearing HID0 attention enable on PPC970 at boot time See CVE-2006-4093 stable/main/binary-arm/kernel-image-2.4.27-riscstation_2.4.27-2sarge5_arm.deb stable/main/source/kernel-image-2.4.27-arm_2.4.27-2sarge5.dsc stable/main/binary-arm/kernel-image-2.4.27-riscpc_2.4.27-2sarge5_arm.deb stable/main/binary-arm/kernel-build-2.4.27_2.4.27-2sarge5_arm.deb stable/main/binary-arm/kernel-image-2.4.27-bast_2.4.27-2sarge5_arm.deb stable/main/binary-arm/kernel-image-2.4.27-netwinder_2.4.27-2sarge5_arm.deb stable/main/source/kernel-image-2.4.27-arm_2.4.27-2sarge5.tar.gz stable/main/binary-arm/kernel-image-2.4.27-lart_2.4.27-2sarge5_arm.deb stable/main/binary-arm/kernel-headers-2.4.27_2.4.27-2sarge5_arm.deb kernel-image-2.4.27-arm (2.4.27-2sarge5) stable-security; urgency=high * Build against kernel-tree-2.4.27-10sarge5: * 233_ia64-sparc-cross-region-mappings.diff [SECURITY] Prevent cross-region mappings on ia64 and sparc which could be used in a local DoS attack (system crash) See CVE-2006-4538 * 234_atm-clip-freed-skb-deref.diff [SECURITY] Avoid dereferencing an already freed skb, preventing a potential remote DoS (system crash) vector See CVE-2006-4997 * 235_ppc-alignment-exception-table-check.diff [SECURITY][ppc] Avoid potential DoS which can be triggered by some futex ops See CVE-2006-5649 * 236_s390-uaccess-memleak.diff [SECURITY][s390] Fix memory leak in copy_from_user by clearing the remaining bytes of the kernel buffer after a fault on the userspace address in copy_from_user() See CVE-2006-5174 * 237_smbfs-honor-mount-opts.diff Honor uid, gid and mode mount options for smbfs even when unix extensions are enabled (closes: #310982) See CVE-2006-5871 * 238_ppc-hid0-dos.diff [SECURITY] [ppc] Fix local DoS by clearing HID0 attention enable on PPC970 at boot time See CVE-2006-4093 stable/main/binary-alpha/kernel-headers-2.4.27-3-generic_2.4.27-10sarge5_alpha.deb stable/main/source/kernel-image-2.4.27-alpha_2.4.27-10sarge5.tar.gz stable/main/source/kernel-image-2.4.27-alpha_2.4.27-10sarge5.dsc stable/main/binary-alpha/kernel-image-2.4.27-3-generic_2.4.27-10sarge5_alpha.deb stable/main/binary-alpha/kernel-headers-2.4.27-3-smp_2.4.27-10sarge5_alpha.deb stable/main/binary-alpha/kernel-build-2.4.27-3_2.4.27-10sarge5_alpha.deb stable/main/binary-alpha/kernel-headers-2.4.27-3_2.4.27-10sarge5_alpha.deb stable/main/binary-alpha/kernel-image-2.4.27-3-smp_2.4.27-10sarge5_alpha.deb kernel-image-2.4.27-alpha (2.4.27-10sarge5) stable-security; urgency=high * Build against kernel-tree-2.4.27-10sarge5: * 233_ia64-sparc-cross-region-mappings.diff [SECURITY] Prevent cross-region mappings on ia64 and sparc which could be used in a local DoS attack (system crash) See CVE-2006-4538 * 234_atm-clip-freed-skb-deref.diff [SECURITY] Avoid dereferencing an already freed skb, preventing a potential remote DoS (system crash) vector See CVE-2006-4997 * 235_ppc-alignment-exception-table-check.diff [SECURITY][ppc] Avoid potential DoS which can be triggered by some futex ops See CVE-2006-5649 * 236_s390-uaccess-memleak.diff [SECURITY][s390] Fix memory leak in copy_from_user by clearing the remaining bytes of the kernel buffer after a fault on the userspace address in copy_from_user() See CVE-2006-5174 * 237_smbfs-honor-mount-opts.diff Honor uid, gid and mode mount options for smbfs even when unix extensions are enabled (closes: #310982) See CVE-2006-5871 * 238_ppc-hid0-dos.diff [SECURITY] [ppc] Fix local DoS by clearing HID0 attention enable on PPC970 at boot time See CVE-2006-4093 stable/main/binary-all/ingo1_1.0.1-1sarge1_all.deb stable/main/source/ingo1_1.0.1-1sarge1.diff.gz stable/main/source/ingo1_1.0.1-1sarge1.dsc ingo1 (1.0.1-1sarge1) stable-security; urgency=high * Security update: - Fix remote autenticated user arbitrary command execution via shell metacharacters in mailbox name (closes: #396099) This is CVE-2006-5449. * Change maintainer to Horde team. stable/main/binary-sparc/libmagick6-dev_6.0.6.2-2.9_sparc.deb stable/main/binary-sparc/perlmagick_6.0.6.2-2.9_sparc.deb stable/main/binary-sparc/imagemagick_6.0.6.2-2.9_sparc.deb stable/main/binary-sparc/libmagick6_6.0.6.2-2.9_sparc.deb stable/main/binary-sparc/libmagick++6-dev_6.0.6.2-2.9_sparc.deb stable/main/binary-sparc/libmagick++6_6.0.6.2-2.9_sparc.deb imagemagick (6:6.0.6.2-2.9) stable-security; urgency=high * Non-maintainer upload for the Security Team. * coders/palm.c: Fix regression introduced in patch for CVE-2006-5456. Avoid bogus second read in macro call. Patch thanks to Vladimir Nadvornik. (CVE-2007-0770) stable/main/binary-s390/perlmagick_6.0.6.2-2.9_s390.deb stable/main/binary-s390/libmagick6_6.0.6.2-2.9_s390.deb stable/main/binary-s390/libmagick++6-dev_6.0.6.2-2.9_s390.deb stable/main/binary-s390/libmagick++6_6.0.6.2-2.9_s390.deb stable/main/binary-s390/imagemagick_6.0.6.2-2.9_s390.deb stable/main/binary-s390/libmagick6-dev_6.0.6.2-2.9_s390.deb imagemagick (6:6.0.6.2-2.9) stable-security; urgency=high * Non-maintainer upload for the Security Team. * coders/palm.c: Fix regression introduced in patch for CVE-2006-5456. Avoid bogus second read in macro call. Patch thanks to Vladimir Nadvornik. (CVE-2007-0770) stable/main/binary-powerpc/perlmagick_6.0.6.2-2.9_powerpc.deb stable/main/binary-powerpc/libmagick6-dev_6.0.6.2-2.9_powerpc.deb stable/main/binary-powerpc/libmagick++6_6.0.6.2-2.9_powerpc.deb stable/main/binary-powerpc/libmagick++6-dev_6.0.6.2-2.9_powerpc.deb stable/main/binary-powerpc/imagemagick_6.0.6.2-2.9_powerpc.deb stable/main/binary-powerpc/libmagick6_6.0.6.2-2.9_powerpc.deb imagemagick (6:6.0.6.2-2.9) stable-security; urgency=high * Non-maintainer upload for the Security Team. * coders/palm.c: Fix regression introduced in patch for CVE-2006-5456. Avoid bogus second read in macro call. Patch thanks to Vladimir Nadvornik. (CVE-2007-0770) stable/main/binary-mipsel/imagemagick_6.0.6.2-2.9_mipsel.deb stable/main/binary-mipsel/libmagick++6_6.0.6.2-2.9_mipsel.deb stable/main/binary-mipsel/libmagick6-dev_6.0.6.2-2.9_mipsel.deb stable/main/binary-mipsel/libmagick++6-dev_6.0.6.2-2.9_mipsel.deb stable/main/binary-mipsel/libmagick6_6.0.6.2-2.9_mipsel.deb stable/main/binary-mipsel/perlmagick_6.0.6.2-2.9_mipsel.deb imagemagick (6:6.0.6.2-2.9) stable-security; urgency=high * Non-maintainer upload for the Security Team. * coders/palm.c: Fix regression introduced in patch for CVE-2006-5456. Avoid bogus second read in macro call. Patch thanks to Vladimir Nadvornik. (CVE-2007-0770) stable/main/binary-mips/libmagick6_6.0.6.2-2.9_mips.deb stable/main/binary-mips/libmagick++6_6.0.6.2-2.9_mips.deb stable/main/binary-mips/libmagick6-dev_6.0.6.2-2.9_mips.deb stable/main/binary-mips/perlmagick_6.0.6.2-2.9_mips.deb stable/main/binary-mips/imagemagick_6.0.6.2-2.9_mips.deb stable/main/binary-mips/libmagick++6-dev_6.0.6.2-2.9_mips.deb imagemagick (6:6.0.6.2-2.9) stable-security; urgency=high * Non-maintainer upload for the Security Team. * coders/palm.c: Fix regression introduced in patch for CVE-2006-5456. Avoid bogus second read in macro call. Patch thanks to Vladimir Nadvornik. (CVE-2007-0770) stable/main/binary-m68k/libmagick++6-dev_6.0.6.2-2.9_m68k.deb stable/main/binary-m68k/imagemagick_6.0.6.2-2.9_m68k.deb stable/main/binary-m68k/libmagick6_6.0.6.2-2.9_m68k.deb stable/main/binary-m68k/libmagick++6_6.0.6.2-2.9_m68k.deb stable/main/binary-m68k/libmagick6-dev_6.0.6.2-2.9_m68k.deb stable/main/binary-m68k/perlmagick_6.0.6.2-2.9_m68k.deb imagemagick (6:6.0.6.2-2.9) stable-security; urgency=high * Non-maintainer upload for the Security Team. * coders/palm.c: Fix regression introduced in patch for CVE-2006-5456. Avoid bogus second read in macro call. Patch thanks to Vladimir Nadvornik. (CVE-2007-0770) stable/main/binary-ia64/libmagick6_6.0.6.2-2.9_ia64.deb stable/main/binary-ia64/libmagick++6-dev_6.0.6.2-2.9_ia64.deb stable/main/binary-ia64/perlmagick_6.0.6.2-2.9_ia64.deb stable/main/binary-ia64/imagemagick_6.0.6.2-2.9_ia64.deb stable/main/binary-ia64/libmagick++6_6.0.6.2-2.9_ia64.deb stable/main/binary-ia64/libmagick6-dev_6.0.6.2-2.9_ia64.deb imagemagick (6:6.0.6.2-2.9) stable-security; urgency=high * Non-maintainer upload for the Security Team. * coders/palm.c: Fix regression introduced in patch for CVE-2006-5456. Avoid bogus second read in macro call. Patch thanks to Vladimir Nadvornik. (CVE-2007-0770) stable/main/binary-hppa/libmagick6_6.0.6.2-2.9_hppa.deb stable/main/binary-hppa/libmagick++6-dev_6.0.6.2-2.9_hppa.deb stable/main/binary-hppa/libmagick6-dev_6.0.6.2-2.9_hppa.deb stable/main/binary-hppa/libmagick++6_6.0.6.2-2.9_hppa.deb stable/main/binary-hppa/imagemagick_6.0.6.2-2.9_hppa.deb stable/main/binary-hppa/perlmagick_6.0.6.2-2.9_hppa.deb imagemagick (6:6.0.6.2-2.9) stable-security; urgency=high * Non-maintainer upload for the Security Team. * coders/palm.c: Fix regression introduced in patch for CVE-2006-5456. Avoid bogus second read in macro call. Patch thanks to Vladimir Nadvornik. (CVE-2007-0770) stable/main/binary-arm/libmagick6_6.0.6.2-2.9_arm.deb stable/main/binary-arm/libmagick++6-dev_6.0.6.2-2.9_arm.deb stable/main/binary-arm/libmagick++6_6.0.6.2-2.9_arm.deb stable/main/binary-arm/perlmagick_6.0.6.2-2.9_arm.deb stable/main/binary-arm/libmagick6-dev_6.0.6.2-2.9_arm.deb stable/main/binary-arm/imagemagick_6.0.6.2-2.9_arm.deb imagemagick (6:6.0.6.2-2.9) stable-security; urgency=high * Non-maintainer upload for the Security Team. * coders/palm.c: Fix regression introduced in patch for CVE-2006-5456. Avoid bogus second read in macro call. Patch thanks to Vladimir Nadvornik. (CVE-2007-0770) stable/main/binary-alpha/libmagick6-dev_6.0.6.2-2.9_alpha.deb stable/main/binary-alpha/libmagick6_6.0.6.2-2.9_alpha.deb stable/main/binary-alpha/imagemagick_6.0.6.2-2.9_alpha.deb stable/main/binary-alpha/libmagick++6_6.0.6.2-2.9_alpha.deb stable/main/binary-alpha/libmagick++6-dev_6.0.6.2-2.9_alpha.deb stable/main/binary-alpha/perlmagick_6.0.6.2-2.9_alpha.deb imagemagick (6:6.0.6.2-2.9) stable-security; urgency=high * Non-maintainer upload for the Security Team. * coders/palm.c: Fix regression introduced in patch for CVE-2006-5456. Avoid bogus second read in macro call. Patch thanks to Vladimir Nadvornik. (CVE-2007-0770) stable/main/binary-i386/perlmagick_6.0.6.2-2.9_i386.deb stable/main/binary-i386/libmagick6-dev_6.0.6.2-2.9_i386.deb stable/main/binary-i386/libmagick++6_6.0.6.2-2.9_i386.deb stable/main/source/imagemagick_6.0.6.2-2.9.dsc stable/main/source/imagemagick_6.0.6.2-2.9.diff.gz stable/main/binary-i386/libmagick++6-dev_6.0.6.2-2.9_i386.deb stable/main/binary-i386/imagemagick_6.0.6.2-2.9_i386.deb stable/main/binary-i386/libmagick6_6.0.6.2-2.9_i386.deb imagemagick (6:6.0.6.2-2.9) stable-security; urgency=high * Non-maintainer upload for the Security Team. * coders/palm.c: Fix regression introduced in patch for CVE-2006-5456. Avoid bogus second read in macro call. Patch thanks to Vladimir Nadvornik. (CVE-2007-0770) stable/main/binary-sparc/gv_3.6.1-10sarge2_sparc.deb gv (1:3.6.1-10sarge2) stable-security; urgency=high * Fix patch application breakage * Also extent patch for corner case previously unhandled stable/main/binary-s390/gv_3.6.1-10sarge2_s390.deb gv (1:3.6.1-10sarge2) stable-security; urgency=high * Fix patch application breakage * Also extent patch for corner case previously unhandled stable/main/binary-powerpc/gv_3.6.1-10sarge2_powerpc.deb gv (1:3.6.1-10sarge2) stable-security; urgency=high * Fix patch application breakage * Also extent patch for corner case previously unhandled stable/main/binary-mipsel/gv_3.6.1-10sarge2_mipsel.deb gv (1:3.6.1-10sarge2) stable-security; urgency=high * Fix patch application breakage * Also extent patch for corner case previously unhandled stable/main/binary-mips/gv_3.6.1-10sarge2_mips.deb gv (1:3.6.1-10sarge2) stable-security; urgency=high * Fix patch application breakage * Also extent patch for corner case previously unhandled stable/main/binary-m68k/gv_3.6.1-10sarge2_m68k.deb gv (1:3.6.1-10sarge2) stable-security; urgency=high * Fix patch application breakage * Also extent patch for corner case previously unhandled stable/main/binary-ia64/gv_3.6.1-10sarge2_ia64.deb gv (1:3.6.1-10sarge2) stable-security; urgency=high * Fix patch application breakage * Also extent patch for corner case previously unhandled stable/main/binary-hppa/gv_3.6.1-10sarge2_hppa.deb gv (1:3.6.1-10sarge2) stable-security; urgency=high * Fix patch application breakage * Also extent patch for corner case previously unhandled stable/main/binary-arm/gv_3.6.1-10sarge2_arm.deb gv (1:3.6.1-10sarge2) stable-security; urgency=high * Fix patch application breakage * Also extent patch for corner case previously unhandled stable/main/binary-alpha/gv_3.6.1-10sarge2_alpha.deb gv (1:3.6.1-10sarge2) stable-security; urgency=high * Fix patch application breakage * Also extent patch for corner case previously unhandled stable/main/binary-i386/gv_3.6.1-10sarge2_i386.deb stable/main/source/gv_3.6.1-10sarge2.dsc stable/main/source/gv_3.6.1-10sarge2.diff.gz gv (1:3.6.1-10sarge2) stable-security; urgency=high * Fix patch application breakage * Also extent patch for corner case previously unhandled stable/main/binary-sparc/libgtk2.0-bin_2.6.4-3.2_sparc.deb stable/main/binary-sparc/libgtk2.0-0-dbg_2.6.4-3.2_sparc.deb stable/main/binary-sparc/gtk2-engines-pixbuf_2.6.4-3.2_sparc.deb stable/main/binary-sparc/libgtk2.0-0_2.6.4-3.2_sparc.deb stable/main/binary-sparc/libgtk2.0-dev_2.6.4-3.2_sparc.deb stable/main/binary-sparc/gtk2.0-examples_2.6.4-3.2_sparc.deb gtk+2.0 (2.6.4-3.2) stable-security; urgency=high * Non-maintainer upload targetted at stable-security. * SECURITY: New patch, 030_CVE-2007-0010_error-handling-in-pixbuf-loaders, to fix error handling in pixbuf loaders; CVE-2007-0010; RedHat #218755, #218932. stable/main/binary-s390/libgtk2.0-bin_2.6.4-3.2_s390.deb stable/main/binary-s390/libgtk2.0-0_2.6.4-3.2_s390.deb stable/main/binary-s390/libgtk2.0-dev_2.6.4-3.2_s390.deb stable/main/binary-s390/gtk2.0-examples_2.6.4-3.2_s390.deb stable/main/binary-s390/libgtk2.0-0-dbg_2.6.4-3.2_s390.deb stable/main/binary-s390/gtk2-engines-pixbuf_2.6.4-3.2_s390.deb gtk+2.0 (2.6.4-3.2) stable-security; urgency=high * Non-maintainer upload targetted at stable-security. * SECURITY: New patch, 030_CVE-2007-0010_error-handling-in-pixbuf-loaders, to fix error handling in pixbuf loaders; CVE-2007-0010; RedHat #218755, #218932. stable/main/binary-powerpc/libgtk2.0-bin_2.6.4-3.2_powerpc.deb stable/main/binary-powerpc/libgtk2.0-0-dbg_2.6.4-3.2_powerpc.deb stable/main/binary-powerpc/libgtk2.0-0_2.6.4-3.2_powerpc.deb stable/main/binary-powerpc/gtk2-engines-pixbuf_2.6.4-3.2_powerpc.deb stable/main/binary-powerpc/gtk2.0-examples_2.6.4-3.2_powerpc.deb stable/main/binary-powerpc/libgtk2.0-dev_2.6.4-3.2_powerpc.deb gtk+2.0 (2.6.4-3.2) stable-security; urgency=high * Non-maintainer upload targetted at stable-security. * SECURITY: New patch, 030_CVE-2007-0010_error-handling-in-pixbuf-loaders, to fix error handling in pixbuf loaders; CVE-2007-0010; RedHat #218755, #218932. stable/main/binary-mipsel/libgtk2.0-dev_2.6.4-3.2_mipsel.deb stable/main/binary-mipsel/libgtk2.0-0_2.6.4-3.2_mipsel.deb stable/main/binary-mipsel/gtk2-engines-pixbuf_2.6.4-3.2_mipsel.deb stable/main/binary-mipsel/gtk2.0-examples_2.6.4-3.2_mipsel.deb stable/main/binary-mipsel/libgtk2.0-0-dbg_2.6.4-3.2_mipsel.deb stable/main/binary-mipsel/libgtk2.0-bin_2.6.4-3.2_mipsel.deb gtk+2.0 (2.6.4-3.2) stable-security; urgency=high * Non-maintainer upload targetted at stable-security. * SECURITY: New patch, 030_CVE-2007-0010_error-handling-in-pixbuf-loaders, to fix error handling in pixbuf loaders; CVE-2007-0010; RedHat #218755, #218932. stable/main/binary-mips/gtk2.0-examples_2.6.4-3.2_mips.deb stable/main/binary-mips/libgtk2.0-0_2.6.4-3.2_mips.deb stable/main/binary-mips/libgtk2.0-bin_2.6.4-3.2_mips.deb stable/main/binary-mips/libgtk2.0-0-dbg_2.6.4-3.2_mips.deb stable/main/binary-mips/gtk2-engines-pixbuf_2.6.4-3.2_mips.deb stable/main/binary-mips/libgtk2.0-dev_2.6.4-3.2_mips.deb gtk+2.0 (2.6.4-3.2) stable-security; urgency=high * Non-maintainer upload targetted at stable-security. * SECURITY: New patch, 030_CVE-2007-0010_error-handling-in-pixbuf-loaders, to fix error handling in pixbuf loaders; CVE-2007-0010; RedHat #218755, #218932. stable/main/binary-m68k/libgtk2.0-0_2.6.4-3.2_m68k.deb stable/main/binary-m68k/gtk2.0-examples_2.6.4-3.2_m68k.deb stable/main/binary-m68k/libgtk2.0-bin_2.6.4-3.2_m68k.deb stable/main/binary-m68k/gtk2-engines-pixbuf_2.6.4-3.2_m68k.deb stable/main/binary-m68k/libgtk2.0-0-dbg_2.6.4-3.2_m68k.deb stable/main/binary-m68k/libgtk2.0-dev_2.6.4-3.2_m68k.deb gtk+2.0 (2.6.4-3.2) stable-security; urgency=high * Non-maintainer upload targetted at stable-security. * SECURITY: New patch, 030_CVE-2007-0010_error-handling-in-pixbuf-loaders, to fix error handling in pixbuf loaders; CVE-2007-0010; RedHat #218755, #218932. stable/main/binary-ia64/libgtk2.0-bin_2.6.4-3.2_ia64.deb stable/main/binary-ia64/libgtk2.0-0_2.6.4-3.2_ia64.deb stable/main/binary-ia64/gtk2-engines-pixbuf_2.6.4-3.2_ia64.deb stable/main/binary-ia64/gtk2.0-examples_2.6.4-3.2_ia64.deb stable/main/binary-ia64/libgtk2.0-dev_2.6.4-3.2_ia64.deb stable/main/binary-ia64/libgtk2.0-0-dbg_2.6.4-3.2_ia64.deb gtk+2.0 (2.6.4-3.2) stable-security; urgency=high * Non-maintainer upload targetted at stable-security. * SECURITY: New patch, 030_CVE-2007-0010_error-handling-in-pixbuf-loaders, to fix error handling in pixbuf loaders; CVE-2007-0010; RedHat #218755, #218932. stable/main/binary-hppa/libgtk2.0-bin_2.6.4-3.2_hppa.deb stable/main/binary-hppa/gtk2.0-examples_2.6.4-3.2_hppa.deb stable/main/binary-hppa/gtk2-engines-pixbuf_2.6.4-3.2_hppa.deb stable/main/binary-hppa/libgtk2.0-0-dbg_2.6.4-3.2_hppa.deb stable/main/binary-hppa/libgtk2.0-0_2.6.4-3.2_hppa.deb stable/main/binary-hppa/libgtk2.0-dev_2.6.4-3.2_hppa.deb gtk+2.0 (2.6.4-3.2) stable-security; urgency=high * Non-maintainer upload targetted at stable-security. * SECURITY: New patch, 030_CVE-2007-0010_error-handling-in-pixbuf-loaders, to fix error handling in pixbuf loaders; CVE-2007-0010; RedHat #218755, #218932. stable/main/binary-arm/libgtk2.0-0-dbg_2.6.4-3.2_arm.deb stable/main/binary-arm/libgtk2.0-dev_2.6.4-3.2_arm.deb stable/main/binary-arm/gtk2-engines-pixbuf_2.6.4-3.2_arm.deb stable/main/binary-arm/libgtk2.0-bin_2.6.4-3.2_arm.deb stable/main/binary-arm/gtk2.0-examples_2.6.4-3.2_arm.deb stable/main/binary-arm/libgtk2.0-0_2.6.4-3.2_arm.deb gtk+2.0 (2.6.4-3.2) stable-security; urgency=high * Non-maintainer upload targetted at stable-security. * SECURITY: New patch, 030_CVE-2007-0010_error-handling-in-pixbuf-loaders, to fix error handling in pixbuf loaders; CVE-2007-0010; RedHat #218755, #218932. stable/main/binary-alpha/libgtk2.0-dev_2.6.4-3.2_alpha.deb stable/main/binary-alpha/gtk2.0-examples_2.6.4-3.2_alpha.deb stable/main/binary-alpha/libgtk2.0-0_2.6.4-3.2_alpha.deb stable/main/binary-alpha/libgtk2.0-bin_2.6.4-3.2_alpha.deb stable/main/binary-alpha/libgtk2.0-0-dbg_2.6.4-3.2_alpha.deb stable/main/binary-alpha/gtk2-engines-pixbuf_2.6.4-3.2_alpha.deb gtk+2.0 (2.6.4-3.2) stable-security; urgency=high * Non-maintainer upload targetted at stable-security. * SECURITY: New patch, 030_CVE-2007-0010_error-handling-in-pixbuf-loaders, to fix error handling in pixbuf loaders; CVE-2007-0010; RedHat #218755, #218932. stable/main/source/gtk+2.0_2.6.4-3.2.diff.gz stable/main/source/gtk+2.0_2.6.4-3.2.dsc stable/main/binary-i386/libgtk2.0-bin_2.6.4-3.2_i386.deb stable/main/binary-i386/libgtk2.0-dev_2.6.4-3.2_i386.deb stable/main/binary-all/libgtk2.0-common_2.6.4-3.2_all.deb stable/main/binary-i386/libgtk2.0-0-dbg_2.6.4-3.2_i386.deb stable/main/binary-i386/gtk2.0-examples_2.6.4-3.2_i386.deb stable/main/binary-all/libgtk2.0-doc_2.6.4-3.2_all.deb stable/main/binary-i386/gtk2-engines-pixbuf_2.6.4-3.2_i386.deb stable/main/binary-i386/libgtk2.0-0_2.6.4-3.2_i386.deb gtk+2.0 (2.6.4-3.2) stable-security; urgency=high * Non-maintainer upload targetted at stable-security. * SECURITY: New patch, 030_CVE-2007-0010_error-handling-in-pixbuf-loaders, to fix error handling in pixbuf loaders; CVE-2007-0010; RedHat #218755, #218932. stable/main/binary-sparc/gpgv-udeb_1.4.1-1.sarge6_sparc.udeb stable/main/binary-sparc/gnupg_1.4.1-1.sarge6_sparc.deb gnupg (1.4.1-1.sarge6) stable-security; urgency=high * Non-maintainer upload by the Security Team, based on a patch by Bernhard Herzog. * Added patch to fix crash in ask_outfile_name [g10/openfile.c, 24_CVE-2006-6169.dpatch] * Added patch to fix remotely controllable function pointer bug [g10/encr-data.c, 24_CVE-2006-6235.dpatch] stable/main/binary-s390/gpgv-udeb_1.4.1-1.sarge6_s390.udeb stable/main/binary-s390/gnupg_1.4.1-1.sarge6_s390.deb gnupg (1.4.1-1.sarge6) stable-security; urgency=high * Non-maintainer upload by the Security Team, based on a patch by Bernhard Herzog. * Added patch to fix crash in ask_outfile_name [g10/openfile.c, 24_CVE-2006-6169.dpatch] * Added patch to fix remotely controllable function pointer bug [g10/encr-data.c, 24_CVE-2006-6235.dpatch] stable/main/binary-powerpc/gnupg_1.4.1-1.sarge6_powerpc.deb stable/main/binary-powerpc/gpgv-udeb_1.4.1-1.sarge6_powerpc.udeb gnupg (1.4.1-1.sarge6) stable-security; urgency=high * Non-maintainer upload by the Security Team, based on a patch by Bernhard Herzog. * Added patch to fix crash in ask_outfile_name [g10/openfile.c, 24_CVE-2006-6169.dpatch] * Added patch to fix remotely controllable function pointer bug [g10/encr-data.c, 24_CVE-2006-6235.dpatch] stable/main/binary-mipsel/gnupg_1.4.1-1.sarge6_mipsel.deb stable/main/binary-mipsel/gpgv-udeb_1.4.1-1.sarge6_mipsel.udeb gnupg (1.4.1-1.sarge6) stable-security; urgency=high * Non-maintainer upload by the Security Team, based on a patch by Bernhard Herzog. * Added patch to fix crash in ask_outfile_name [g10/openfile.c, 24_CVE-2006-6169.dpatch] * Added patch to fix remotely controllable function pointer bug [g10/encr-data.c, 24_CVE-2006-6235.dpatch] stable/main/binary-mips/gpgv-udeb_1.4.1-1.sarge6_mips.udeb stable/main/binary-mips/gnupg_1.4.1-1.sarge6_mips.deb gnupg (1.4.1-1.sarge6) stable-security; urgency=high * Non-maintainer upload by the Security Team, based on a patch by Bernhard Herzog. * Added patch to fix crash in ask_outfile_name [g10/openfile.c, 24_CVE-2006-6169.dpatch] * Added patch to fix remotely controllable function pointer bug [g10/encr-data.c, 24_CVE-2006-6235.dpatch] stable/main/binary-m68k/gnupg_1.4.1-1.sarge6_m68k.deb stable/main/binary-m68k/gpgv-udeb_1.4.1-1.sarge6_m68k.udeb gnupg (1.4.1-1.sarge6) stable-security; urgency=high * Non-maintainer upload by the Security Team, based on a patch by Bernhard Herzog. * Added patch to fix crash in ask_outfile_name [g10/openfile.c, 24_CVE-2006-6169.dpatch] * Added patch to fix remotely controllable function pointer bug [g10/encr-data.c, 24_CVE-2006-6235.dpatch] stable/main/binary-ia64/gnupg_1.4.1-1.sarge6_ia64.deb stable/main/binary-ia64/gpgv-udeb_1.4.1-1.sarge6_ia64.udeb gnupg (1.4.1-1.sarge6) stable-security; urgency=high * Non-maintainer upload by the Security Team, based on a patch by Bernhard Herzog. * Added patch to fix crash in ask_outfile_name [g10/openfile.c, 24_CVE-2006-6169.dpatch] * Added patch to fix remotely controllable function pointer bug [g10/encr-data.c, 24_CVE-2006-6235.dpatch] stable/main/binary-hppa/gpgv-udeb_1.4.1-1.sarge6_hppa.udeb stable/main/binary-hppa/gnupg_1.4.1-1.sarge6_hppa.deb gnupg (1.4.1-1.sarge6) stable-security; urgency=high * Non-maintainer upload by the Security Team, based on a patch by Bernhard Herzog. * Added patch to fix crash in ask_outfile_name [g10/openfile.c, 24_CVE-2006-6169.dpatch] * Added patch to fix remotely controllable function pointer bug [g10/encr-data.c, 24_CVE-2006-6235.dpatch] stable/main/binary-arm/gpgv-udeb_1.4.1-1.sarge6_arm.udeb stable/main/binary-arm/gnupg_1.4.1-1.sarge6_arm.deb gnupg (1.4.1-1.sarge6) stable-security; urgency=high * Non-maintainer upload by the Security Team, based on a patch by Bernhard Herzog. * Added patch to fix crash in ask_outfile_name [g10/openfile.c, 24_CVE-2006-6169.dpatch] * Added patch to fix remotely controllable function pointer bug [g10/encr-data.c, 24_CVE-2006-6235.dpatch] stable/main/binary-alpha/gpgv-udeb_1.4.1-1.sarge6_alpha.udeb stable/main/binary-alpha/gnupg_1.4.1-1.sarge6_alpha.deb gnupg (1.4.1-1.sarge6) stable-security; urgency=high * Non-maintainer upload by the Security Team, based on a patch by Bernhard Herzog. * Added patch to fix crash in ask_outfile_name [g10/openfile.c, 24_CVE-2006-6169.dpatch] * Added patch to fix remotely controllable function pointer bug [g10/encr-data.c, 24_CVE-2006-6235.dpatch] stable/main/binary-i386/gnupg_1.4.1-1.sarge6_i386.deb stable/main/source/gnupg_1.4.1-1.sarge6.dsc stable/main/source/gnupg_1.4.1-1.sarge6.diff.gz stable/main/binary-i386/gpgv-udeb_1.4.1-1.sarge6_i386.udeb gnupg (1.4.1-1.sarge6) stable-security; urgency=high * Non-maintainer upload by the Security Team, based on a patch by Bernhard Herzog. * Added patch to fix crash in ask_outfile_name [g10/openfile.c, 24_CVE-2006-6169.dpatch] * Added patch to fix remotely controllable function pointer bug [g10/encr-data.c, 24_CVE-2006-6235.dpatch] stable/main/binary-sparc/libc6-udeb_2.3.2.ds1-22sarge5_sparc.udeb stable/main/binary-sparc/libc6-dev-sparc64_2.3.2.ds1-22sarge5_sparc.deb stable/main/binary-sparc/libc6-dbg_2.3.2.ds1-22sarge5_sparc.deb stable/main/binary-sparc/libc6-prof_2.3.2.ds1-22sarge5_sparc.deb stable/main/binary-sparc/libc6-dev_2.3.2.ds1-22sarge5_sparc.deb stable/main/binary-sparc/libc6-sparcv9_2.3.2.ds1-22sarge5_sparc.deb stable/main/binary-sparc/libc6_2.3.2.ds1-22sarge5_sparc.deb stable/main/binary-sparc/libnss-files-udeb_2.3.2.ds1-22sarge5_sparc.udeb stable/main/binary-sparc/nscd_2.3.2.ds1-22sarge5_sparc.deb stable/main/binary-sparc/libnss-dns-udeb_2.3.2.ds1-22sarge5_sparc.udeb stable/main/binary-sparc/libc6-sparc64_2.3.2.ds1-22sarge5_sparc.deb stable/main/binary-sparc/libc6-pic_2.3.2.ds1-22sarge5_sparc.deb stable/main/binary-sparc/libc6-sparcv9b_2.3.2.ds1-22sarge5_sparc.deb glibc (2.3.2.ds1-22sarge5) stable; urgency=low * Aurelien Jarno <aurel32@debian.org> - Update debian/patches/90_glibc232-timezones.dpatch with tzdata 2006p-1. This includes DST rules for West Australia and support for the "Energy Policy Act 2005". stable/main/binary-s390/libnss-dns-udeb_2.3.2.ds1-22sarge5_s390.udeb stable/main/binary-s390/libc6-prof_2.3.2.ds1-22sarge5_s390.deb stable/main/binary-s390/libc6_2.3.2.ds1-22sarge5_s390.deb stable/main/binary-s390/libc6-dbg_2.3.2.ds1-22sarge5_s390.deb stable/main/binary-s390/nscd_2.3.2.ds1-22sarge5_s390.deb stable/main/binary-s390/libc6-pic_2.3.2.ds1-22sarge5_s390.deb stable/main/binary-s390/libc6-udeb_2.3.2.ds1-22sarge5_s390.udeb stable/main/binary-s390/libc6-dev_2.3.2.ds1-22sarge5_s390.deb stable/main/binary-s390/libnss-files-udeb_2.3.2.ds1-22sarge5_s390.udeb stable/main/binary-s390/libc6-dev-s390x_2.3.2.ds1-22sarge5_s390.deb stable/main/binary-s390/libc6-s390x_2.3.2.ds1-22sarge5_s390.deb glibc (2.3.2.ds1-22sarge5) stable; urgency=low * Aurelien Jarno <aurel32@debian.org> - Update debian/patches/90_glibc232-timezones.dpatch with tzdata 2006p-1. This includes DST rules for West Australia and support for the "Energy Policy Act 2005". stable/main/binary-powerpc/nscd_2.3.2.ds1-22sarge5_powerpc.deb stable/main/binary-powerpc/libc6-dbg_2.3.2.ds1-22sarge5_powerpc.deb stable/main/binary-powerpc/libnss-dns-udeb_2.3.2.ds1-22sarge5_powerpc.udeb stable/main/binary-powerpc/libc6-dev_2.3.2.ds1-22sarge5_powerpc.deb stable/main/binary-powerpc/libnss-files-udeb_2.3.2.ds1-22sarge5_powerpc.udeb stable/main/binary-powerpc/libc6_2.3.2.ds1-22sarge5_powerpc.deb stable/main/binary-powerpc/libc6-pic_2.3.2.ds1-22sarge5_powerpc.deb stable/main/binary-powerpc/libc6-udeb_2.3.2.ds1-22sarge5_powerpc.udeb stable/main/binary-powerpc/libc6-prof_2.3.2.ds1-22sarge5_powerpc.deb glibc (2.3.2.ds1-22sarge5) stable; urgency=low * Aurelien Jarno <aurel32@debian.org> - Update debian/patches/90_glibc232-timezones.dpatch with tzdata 2006p-1. This includes DST rules for West Australia and support for the "Energy Policy Act 2005". stable/main/binary-mipsel/libc6-udeb_2.3.2.ds1-22sarge5_mipsel.udeb stable/main/binary-mipsel/libnss-files-udeb_2.3.2.ds1-22sarge5_mipsel.udeb stable/main/binary-mipsel/libc6-dbg_2.3.2.ds1-22sarge5_mipsel.deb stable/main/binary-mipsel/libc6-pic_2.3.2.ds1-22sarge5_mipsel.deb stable/main/binary-mipsel/libc6-prof_2.3.2.ds1-22sarge5_mipsel.deb stable/main/binary-mipsel/libc6-dev_2.3.2.ds1-22sarge5_mipsel.deb stable/main/binary-mipsel/libnss-dns-udeb_2.3.2.ds1-22sarge5_mipsel.udeb stable/main/binary-mipsel/libc6_2.3.2.ds1-22sarge5_mipsel.deb stable/main/binary-mipsel/nscd_2.3.2.ds1-22sarge5_mipsel.deb glibc (2.3.2.ds1-22sarge5) stable; urgency=low * Aurelien Jarno <aurel32@debian.org> - Update debian/patches/90_glibc232-timezones.dpatch with tzdata 2006p-1. This includes DST rules for West Australia and support for the "Energy Policy Act 2005". stable/main/binary-mips/libnss-dns-udeb_2.3.2.ds1-22sarge5_mips.udeb stable/main/binary-mips/libc6-udeb_2.3.2.ds1-22sarge5_mips.udeb stable/main/binary-mips/libc6_2.3.2.ds1-22sarge5_mips.deb stable/main/binary-mips/libnss-files-udeb_2.3.2.ds1-22sarge5_mips.udeb stable/main/binary-mips/libc6-prof_2.3.2.ds1-22sarge5_mips.deb stable/main/binary-mips/libc6-pic_2.3.2.ds1-22sarge5_mips.deb stable/main/binary-mips/libc6-dev_2.3.2.ds1-22sarge5_mips.deb stable/main/binary-mips/nscd_2.3.2.ds1-22sarge5_mips.deb stable/main/binary-mips/libc6-dbg_2.3.2.ds1-22sarge5_mips.deb glibc (2.3.2.ds1-22sarge5) stable; urgency=low * Aurelien Jarno <aurel32@debian.org> - Update debian/patches/90_glibc232-timezones.dpatch with tzdata 2006p-1. This includes DST rules for West Australia and support for the "Energy Policy Act 2005". stable/main/binary-m68k/nscd_2.3.2.ds1-22sarge5_m68k.deb stable/main/binary-m68k/libc6-dbg_2.3.2.ds1-22sarge5_m68k.deb stable/main/binary-m68k/libc6_2.3.2.ds1-22sarge5_m68k.deb stable/main/binary-m68k/libc6-prof_2.3.2.ds1-22sarge5_m68k.deb stable/main/binary-m68k/libc6-dev_2.3.2.ds1-22sarge5_m68k.deb stable/main/binary-m68k/libnss-dns-udeb_2.3.2.ds1-22sarge5_m68k.udeb stable/main/binary-m68k/libnss-files-udeb_2.3.2.ds1-22sarge5_m68k.udeb stable/main/binary-m68k/libc6-pic_2.3.2.ds1-22sarge5_m68k.deb stable/main/binary-m68k/libc6-udeb_2.3.2.ds1-22sarge5_m68k.udeb glibc (2.3.2.ds1-22sarge5) stable; urgency=low * Aurelien Jarno <aurel32@debian.org> - Update debian/patches/90_glibc232-timezones.dpatch with tzdata 2006p-1. This includes DST rules for West Australia and support for the "Energy Policy Act 2005". stable/main/binary-ia64/nscd_2.3.2.ds1-22sarge5_ia64.deb stable/main/binary-ia64/libc6.1-dev_2.3.2.ds1-22sarge5_ia64.deb stable/main/binary-ia64/libc6.1-dbg_2.3.2.ds1-22sarge5_ia64.deb stable/main/binary-ia64/libnss-files-udeb_2.3.2.ds1-22sarge5_ia64.udeb stable/main/binary-ia64/libc6.1-prof_2.3.2.ds1-22sarge5_ia64.deb stable/main/binary-ia64/libnss-dns-udeb_2.3.2.ds1-22sarge5_ia64.udeb stable/main/binary-ia64/libc6.1_2.3.2.ds1-22sarge5_ia64.deb stable/main/binary-ia64/libc6.1-udeb_2.3.2.ds1-22sarge5_ia64.udeb stable/main/binary-ia64/libc6.1-pic_2.3.2.ds1-22sarge5_ia64.deb glibc (2.3.2.ds1-22sarge5) stable; urgency=low * Aurelien Jarno <aurel32@debian.org> - Update debian/patches/90_glibc232-timezones.dpatch with tzdata 2006p-1. This includes DST rules for West Australia and support for the "Energy Policy Act 2005". stable/main/binary-hppa/libc6-dbg_2.3.2.ds1-22sarge5_hppa.deb stable/main/binary-hppa/nscd_2.3.2.ds1-22sarge5_hppa.deb stable/main/binary-hppa/libc6-pic_2.3.2.ds1-22sarge5_hppa.deb stable/main/binary-hppa/libc6-dev_2.3.2.ds1-22sarge5_hppa.deb stable/main/binary-hppa/libnss-dns-udeb_2.3.2.ds1-22sarge5_hppa.udeb stable/main/binary-hppa/libnss-files-udeb_2.3.2.ds1-22sarge5_hppa.udeb stable/main/binary-hppa/libc6-prof_2.3.2.ds1-22sarge5_hppa.deb stable/main/binary-hppa/libc6_2.3.2.ds1-22sarge5_hppa.deb stable/main/binary-hppa/libc6-udeb_2.3.2.ds1-22sarge5_hppa.udeb glibc (2.3.2.ds1-22sarge5) stable; urgency=low * Aurelien Jarno <aurel32@debian.org> - Update debian/patches/90_glibc232-timezones.dpatch with tzdata 2006p-1. This includes DST rules for West Australia and support for the "Energy Policy Act 2005". stable/main/binary-arm/libc6-udeb_2.3.2.ds1-22sarge5_arm.udeb stable/main/binary-arm/libc6-dbg_2.3.2.ds1-22sarge5_arm.deb stable/main/binary-arm/libc6-prof_2.3.2.ds1-22sarge5_arm.deb stable/main/binary-arm/libc6_2.3.2.ds1-22sarge5_arm.deb stable/main/binary-arm/libc6-pic_2.3.2.ds1-22sarge5_arm.deb stable/main/binary-arm/libnss-dns-udeb_2.3.2.ds1-22sarge5_arm.udeb stable/main/binary-arm/nscd_2.3.2.ds1-22sarge5_arm.deb stable/main/binary-arm/libnss-files-udeb_2.3.2.ds1-22sarge5_arm.udeb stable/main/binary-arm/libc6-dev_2.3.2.ds1-22sarge5_arm.deb glibc (2.3.2.ds1-22sarge5) stable; urgency=low * Aurelien Jarno <aurel32@debian.org> - Update debian/patches/90_glibc232-timezones.dpatch with tzdata 2006p-1. This includes DST rules for West Australia and support for the "Energy Policy Act 2005". stable/main/binary-alpha/libnss-dns-udeb_2.3.2.ds1-22sarge5_alpha.udeb stable/main/binary-alpha/libc6.1-pic_2.3.2.ds1-22sarge5_alpha.deb stable/main/binary-alpha/libc6.1-udeb_2.3.2.ds1-22sarge5_alpha.udeb stable/main/binary-alpha/libc6.1-dbg_2.3.2.ds1-22sarge5_alpha.deb stable/main/binary-alpha/nscd_2.3.2.ds1-22sarge5_alpha.deb stable/main/binary-alpha/libc6.1-dev_2.3.2.ds1-22sarge5_alpha.deb stable/main/binary-alpha/libc6.1-prof_2.3.2.ds1-22sarge5_alpha.deb stable/main/binary-alpha/libnss-files-udeb_2.3.2.ds1-22sarge5_alpha.udeb stable/main/binary-alpha/libc6.1_2.3.2.ds1-22sarge5_alpha.deb glibc (2.3.2.ds1-22sarge5) stable; urgency=low * Aurelien Jarno <aurel32@debian.org> - Update debian/patches/90_glibc232-timezones.dpatch with tzdata 2006p-1. This includes DST rules for West Australia and support for the "Energy Policy Act 2005". stable/main/binary-i386/libc6-udeb_2.3.2.ds1-22sarge5_i386.udeb stable/main/source/glibc_2.3.2.ds1-22sarge5.dsc stable/main/binary-all/locales_2.3.2.ds1-22sarge5_all.deb stable/main/binary-i386/libnss-files-udeb_2.3.2.ds1-22sarge5_i386.udeb stable/main/binary-i386/libc6-pic_2.3.2.ds1-22sarge5_i386.deb stable/main/binary-all/glibc-doc_2.3.2.ds1-22sarge5_all.deb stable/main/binary-i386/libc6-prof_2.3.2.ds1-22sarge5_i386.deb stable/main/binary-i386/libc6-dev_2.3.2.ds1-22sarge5_i386.deb stable/main/source/glibc_2.3.2.ds1-22sarge5.diff.gz stable/main/binary-i386/libnss-dns-udeb_2.3.2.ds1-22sarge5_i386.udeb stable/main/binary-i386/libc6_2.3.2.ds1-22sarge5_i386.deb stable/main/binary-i386/nscd_2.3.2.ds1-22sarge5_i386.deb stable/main/binary-i386/libc6-dbg_2.3.2.ds1-22sarge5_i386.deb stable/main/binary-i386/libc6-i686_2.3.2.ds1-22sarge5_i386.deb glibc (2.3.2.ds1-22sarge5) stable; urgency=low * Aurelien Jarno <aurel32@debian.org> - Update debian/patches/90_glibc232-timezones.dpatch with tzdata 2006p-1. This includes DST rules for West Australia and support for the "Energy Policy Act 2005". stable/main/binary-all/flexbackup_1.2.1-2sarge1_all.deb stable/main/source/flexbackup_1.2.1-2sarge1.dsc stable/main/source/flexbackup_1.2.1-2sarge1.diff.gz flexbackup (1.2.1-2sarge1) stable-security; urgency=high * Fix RC bug: unsafe use of temp file, CVE-2005-4802. (Closes: #334350) http://bugs.gentoo.org/show_bug.cgi?id=105000 http://bugs.gentoo.org/show_bug.cgi?id=116510 stable/main/binary-sparc/fetchmail_6.2.5-12sarge5_sparc.deb fetchmail (6.2.5-12sarge5) stable-security; urgency=high * SECURITY UPDATE: password can leak in cleartext when SSL configured. * Makefile.in, tls.c, pop2.c, pop3.c, imap.c, smtp.c, fetchmail.h: fixes extracted from Ubuntu who got it backporting from upstream. [CVE-2006-5867] stable/main/binary-s390/fetchmail_6.2.5-12sarge5_s390.deb fetchmail (6.2.5-12sarge5) stable-security; urgency=high * SECURITY UPDATE: password can leak in cleartext when SSL configured. * Makefile.in, tls.c, pop2.c, pop3.c, imap.c, smtp.c, fetchmail.h: fixes extracted from Ubuntu who got it backporting from upstream. [CVE-2006-5867] stable/main/binary-powerpc/fetchmail_6.2.5-12sarge5_powerpc.deb fetchmail (6.2.5-12sarge5) stable-security; urgency=high * SECURITY UPDATE: password can leak in cleartext when SSL configured. * Makefile.in, tls.c, pop2.c, pop3.c, imap.c, smtp.c, fetchmail.h: fixes extracted from Ubuntu who got it backporting from upstream. [CVE-2006-5867] stable/main/binary-mipsel/fetchmail_6.2.5-12sarge5_mipsel.deb fetchmail (6.2.5-12sarge5) stable-security; urgency=high * SECURITY UPDATE: password can leak in cleartext when SSL configured. * Makefile.in, tls.c, pop2.c, pop3.c, imap.c, smtp.c, fetchmail.h: fixes extracted from Ubuntu who got it backporting from upstream. [CVE-2006-5867] stable/main/binary-mips/fetchmail_6.2.5-12sarge5_mips.deb fetchmail (6.2.5-12sarge5) stable-security; urgency=high * SECURITY UPDATE: password can leak in cleartext when SSL configured. * Makefile.in, tls.c, pop2.c, pop3.c, imap.c, smtp.c, fetchmail.h: fixes extracted from Ubuntu who got it backporting from upstream. [CVE-2006-5867] stable/main/binary-m68k/fetchmail_6.2.5-12sarge5_m68k.deb fetchmail (6.2.5-12sarge5) stable-security; urgency=high * SECURITY UPDATE: password can leak in cleartext when SSL configured. * Makefile.in, tls.c, pop2.c, pop3.c, imap.c, smtp.c, fetchmail.h: fixes extracted from Ubuntu who got it backporting from upstream. [CVE-2006-5867] stable/main/binary-ia64/fetchmail_6.2.5-12sarge5_ia64.deb fetchmail (6.2.5-12sarge5) stable-security; urgency=high * SECURITY UPDATE: password can leak in cleartext when SSL configured. * Makefile.in, tls.c, pop2.c, pop3.c, imap.c, smtp.c, fetchmail.h: fixes extracted from Ubuntu who got it backporting from upstream. [CVE-2006-5867] stable/main/binary-hppa/fetchmail_6.2.5-12sarge5_hppa.deb fetchmail (6.2.5-12sarge5) stable-security; urgency=high * SECURITY UPDATE: password can leak in cleartext when SSL configured. * Makefile.in, tls.c, pop2.c, pop3.c, imap.c, smtp.c, fetchmail.h: fixes extracted from Ubuntu who got it backporting from upstream. [CVE-2006-5867] stable/main/binary-arm/fetchmail_6.2.5-12sarge5_arm.deb fetchmail (6.2.5-12sarge5) stable-security; urgency=high * SECURITY UPDATE: password can leak in cleartext when SSL configured. * Makefile.in, tls.c, pop2.c, pop3.c, imap.c, smtp.c, fetchmail.h: fixes extracted from Ubuntu who got it backporting from upstream. [CVE-2006-5867] stable/main/binary-alpha/fetchmail_6.2.5-12sarge5_alpha.deb fetchmail (6.2.5-12sarge5) stable-security; urgency=high * SECURITY UPDATE: password can leak in cleartext when SSL configured. * Makefile.in, tls.c, pop2.c, pop3.c, imap.c, smtp.c, fetchmail.h: fixes extracted from Ubuntu who got it backporting from upstream. [CVE-2006-5867] stable/main/source/fetchmail_6.2.5-12sarge5.dsc stable/main/source/fetchmail_6.2.5-12sarge5.diff.gz stable/main/binary-i386/fetchmail_6.2.5-12sarge5_i386.deb stable/main/binary-all/fetchmail-ssl_6.2.5-12sarge5_all.deb stable/main/binary-all/fetchmailconf_6.2.5-12sarge5_all.deb fetchmail (6.2.5-12sarge5) stable-security; urgency=high * SECURITY UPDATE: password can leak in cleartext when SSL configured. * Makefile.in, tls.c, pop2.c, pop3.c, imap.c, smtp.c, fetchmail.h: fixes extracted from Ubuntu who got it backporting from upstream. [CVE-2006-5867] stable/main/source/fai-kernels_1.9.1sarge5.tar.gz stable/main/binary-i386/fai-kernels_1.9.1sarge5_i386.deb stable/main/source/fai-kernels_1.9.1sarge5.dsc fai-kernels (1.9.1sarge5) stable-security; urgency=low * NMU by the Security Team * Build against kernel-tree-2.4.27-10sarge5: * 233_ia64-sparc-cross-region-mappings.diff [SECURITY] Prevent cross-region mappings on ia64 and sparc which could be used in a local DoS attack (system crash) See CVE-2006-4538 * 234_atm-clip-freed-skb-deref.diff [SECURITY] Avoid dereferencing an already freed skb, preventing a potential remote DoS (system crash) vector See CVE-2006-4997 * 235_ppc-alignment-exception-table-check.diff [SECURITY][ppc] Avoid potential DoS which can be triggered by some futex ops See CVE-2006-5649 * 236_s390-uaccess-memleak.diff [SECURITY][s390] Fix memory leak in copy_from_user by clearing the remaining bytes of the kernel buffer after a fault on the userspace address in copy_from_user() See CVE-2006-5174 * 237_smbfs-honor-mount-opts.diff Honor uid, gid and mode mount options for smbfs even when unix extensions are enabled (closes: #310982) See CVE-2006-5871 * 238_ppc-hid0-dos.diff [SECURITY] [ppc] Fix local DoS by clearing HID0 attention enable on PPC970 at boot time See CVE-2006-4093 * Build against kernel-tree-2.6.8-16sarge6: * perfmon-fd-refcnt.dpatch [SECURITY][ia64] Fix file descriptor leak in perfmonctl system call which could be used as a local denial of service attack by depleting the system of file descriptors See CVE-2006-3741 * ia64-sparc-cross-region-mappings.dpatch [SECURITY] Prevent cross-region mappings on ia64 and sparc which could be used in a local DoS attack (system crash) See CVE-2006-4538 * __block_prepare_write-recovery.dpatch [SECURITY] Fix an information leak in __block_prepare_write() See CVE-2006-4813 * atm-clip-freed-skb-deref.dpatch [SECURITY] Avoid dereferencing an already freed skb, preventing a potential remote DoS (system crash) vector See CVE-2006-4997 * ip6_flowlabel-lockup.dpatch [SECURITY] Fix local DoS attack vector (lockups, oopses) in the sequence handling for /proc/net/ip6_flowlabel See CVE-2006-5619 * ppc-alignment-exception-table-check.dpatch [SECURITY][ppc] Avoid potential DoS which can be triggered by some futex ops See CVE-2006-5649 * s390-uaccess-memleak.dpatch [SECURITY][s390] Fix memory leak in copy_from_user by clearing the remaining bytes of the kernel buffer after a fault on the userspace address in copy_from_user() See CVE-2006-5174 * smbfs-honor-mount-opts.dpatch Honor uid, gid and mode mount options for smbfs even when unix extensions are enabled See CVE-2006-5871 * bridge-get_fdb_entries-overflow.dpatch Protect against possible overflow in get_fdb_entries See CVE-2006-5751 stable/main/binary-sparc/exim_3.36-16sarge1_sparc.deb stable/main/binary-sparc/eximon_3.36-16sarge1_sparc.deb exim (3.36-16sarge1) stable; urgency=low * NMU with maintainer's consent (cleared a long time ago) * acked by the stable release team * change package description to clearly show that exim 3 is deprecated stable/main/binary-s390/eximon_3.36-16sarge1_s390.deb stable/main/binary-s390/exim_3.36-16sarge1_s390.deb exim (3.36-16sarge1) stable; urgency=low * NMU with maintainer's consent (cleared a long time ago) * acked by the stable release team * change package description to clearly show that exim 3 is deprecated stable/main/binary-powerpc/exim_3.36-16sarge1_powerpc.deb stable/main/binary-powerpc/eximon_3.36-16sarge1_powerpc.deb exim (3.36-16sarge1) stable; urgency=low * NMU with maintainer's consent (cleared a long time ago) * acked by the stable release team * change package description to clearly show that exim 3 is deprecated stable/main/binary-mipsel/exim_3.36-16sarge1_mipsel.deb stable/main/binary-mipsel/eximon_3.36-16sarge1_mipsel.deb exim (3.36-16sarge1) stable; urgency=low * NMU with maintainer's consent (cleared a long time ago) * acked by the stable release team * change package description to clearly show that exim 3 is deprecated stable/main/binary-mips/exim_3.36-16sarge1_mips.deb stable/main/binary-mips/eximon_3.36-16sarge1_mips.deb exim (3.36-16sarge1) stable; urgency=low * NMU with maintainer's consent (cleared a long time ago) * acked by the stable release team * change package description to clearly show that exim 3 is deprecated stable/main/binary-m68k/exim_3.36-16sarge1_m68k.deb stable/main/binary-m68k/eximon_3.36-16sarge1_m68k.deb exim (3.36-16sarge1) stable; urgency=low * NMU with maintainer's consent (cleared a long time ago) * acked by the stable release team * change package description to clearly show that exim 3 is deprecated stable/main/binary-ia64/eximon_3.36-16sarge1_ia64.deb stable/main/binary-ia64/exim_3.36-16sarge1_ia64.deb exim (3.36-16sarge1) stable; urgency=low * NMU with maintainer's consent (cleared a long time ago) * acked by the stable release team * change package description to clearly show that exim 3 is deprecated stable/main/binary-hppa/eximon_3.36-16sarge1_hppa.deb stable/main/binary-hppa/exim_3.36-16sarge1_hppa.deb exim (3.36-16sarge1) stable; urgency=low * NMU with maintainer's consent (cleared a long time ago) * acked by the stable release team * change package description to clearly show that exim 3 is deprecated stable/main/binary-arm/eximon_3.36-16sarge1_arm.deb stable/main/binary-arm/exim_3.36-16sarge1_arm.deb exim (3.36-16sarge1) stable; urgency=low * NMU with maintainer's consent (cleared a long time ago) * acked by the stable release team * change package description to clearly show that exim 3 is deprecated stable/main/binary-alpha/eximon_3.36-16sarge1_alpha.deb stable/main/binary-alpha/exim_3.36-16sarge1_alpha.deb exim (3.36-16sarge1) stable; urgency=low * NMU with maintainer's consent (cleared a long time ago) * acked by the stable release team * change package description to clearly show that exim 3 is deprecated stable/main/source/exim_3.36-16sarge1.dsc stable/main/binary-i386/eximon_3.36-16sarge1_i386.deb stable/main/binary-i386/exim_3.36-16sarge1_i386.deb stable/main/source/exim_3.36-16sarge1.diff.gz exim (3.36-16sarge1) stable; urgency=low * NMU with maintainer's consent (cleared a long time ago) * acked by the stable release team * change package description to clearly show that exim 3 is deprecated stable/main/binary-sparc/evince_0.1.5-2sarge1_sparc.deb evince (0.1.5-2sarge1) stable-security; urgency=high * SECURITY: new patch, 10_CVE-2006-5864.patch, fixes a buffer overflow in the PostScript processor; thanks Kees Cook; CVE-2006-5864; closes: #402063. stable/main/binary-s390/evince_0.1.5-2sarge1_s390.deb evince (0.1.5-2sarge1) stable-security; urgency=high * SECURITY: new patch, 10_CVE-2006-5864.patch, fixes a buffer overflow in the PostScript processor; thanks Kees Cook; CVE-2006-5864; closes: #402063. stable/main/binary-powerpc/evince_0.1.5-2sarge1_powerpc.deb evince (0.1.5-2sarge1) stable-security; urgency=high * SECURITY: new patch, 10_CVE-2006-5864.patch, fixes a buffer overflow in the PostScript processor; thanks Kees Cook; CVE-2006-5864; closes: #402063. stable/main/binary-mipsel/evince_0.1.5-2sarge1_mipsel.deb evince (0.1.5-2sarge1) stable-security; urgency=high * SECURITY: new patch, 10_CVE-2006-5864.patch, fixes a buffer overflow in the PostScript processor; thanks Kees Cook; CVE-2006-5864; closes: #402063. stable/main/binary-mips/evince_0.1.5-2sarge1_mips.deb evince (0.1.5-2sarge1) stable-security; urgency=high * SECURITY: new patch, 10_CVE-2006-5864.patch, fixes a buffer overflow in the PostScript processor; thanks Kees Cook; CVE-2006-5864; closes: #402063. stable/main/binary-m68k/evince_0.1.5-2sarge1_m68k.deb evince (0.1.5-2sarge1) stable-security; urgency=high * SECURITY: new patch, 10_CVE-2006-5864.patch, fixes a buffer overflow in the PostScript processor; thanks Kees Cook; CVE-2006-5864; closes: #402063. stable/main/binary-ia64/evince_0.1.5-2sarge1_ia64.deb evince (0.1.5-2sarge1) stable-security; urgency=high * SECURITY: new patch, 10_CVE-2006-5864.patch, fixes a buffer overflow in the PostScript processor; thanks Kees Cook; CVE-2006-5864; closes: #402063. stable/main/binary-hppa/evince_0.1.5-2sarge1_hppa.deb evince (0.1.5-2sarge1) stable-security; urgency=high * SECURITY: new patch, 10_CVE-2006-5864.patch, fixes a buffer overflow in the PostScript processor; thanks Kees Cook; CVE-2006-5864; closes: #402063. stable/main/binary-arm/evince_0.1.5-2sarge1_arm.deb evince (0.1.5-2sarge1) stable-security; urgency=high * SECURITY: new patch, 10_CVE-2006-5864.patch, fixes a buffer overflow in the PostScript processor; thanks Kees Cook; CVE-2006-5864; closes: #402063. stable/main/binary-alpha/evince_0.1.5-2sarge1_alpha.deb evince (0.1.5-2sarge1) stable-security; urgency=high * SECURITY: new patch, 10_CVE-2006-5864.patch, fixes a buffer overflow in the PostScript processor; thanks Kees Cook; CVE-2006-5864; closes: #402063. stable/main/source/evince_0.1.5-2sarge1.dsc stable/main/binary-i386/evince_0.1.5-2sarge1_i386.deb stable/main/source/evince_0.1.5-2sarge1.diff.gz evince (0.1.5-2sarge1) stable-security; urgency=high * SECURITY: new patch, 10_CVE-2006-5864.patch, fixes a buffer overflow in the PostScript processor; thanks Kees Cook; CVE-2006-5864; closes: #402063. stable/main/binary-sparc/ethereal_0.10.10-2sarge9_sparc.deb stable/main/binary-sparc/ethereal-dev_0.10.10-2sarge9_sparc.deb stable/main/binary-sparc/ethereal-common_0.10.10-2sarge9_sparc.deb stable/main/binary-sparc/tethereal_0.10.10-2sarge9_sparc.deb ethereal (0.10.10-2sarge9) stable-security; urgency=high * Non-maintainer upload by the Security Team * Backported fixes for several vulnerabilities: * Memory exhaustion denial of service in the XOT dissector * Off-by-one buffer overflow in MIME Multipart dissector stable/main/binary-s390/ethereal_0.10.10-2sarge9_s390.deb stable/main/binary-s390/ethereal-common_0.10.10-2sarge9_s390.deb stable/main/binary-s390/tethereal_0.10.10-2sarge9_s390.deb stable/main/binary-s390/ethereal-dev_0.10.10-2sarge9_s390.deb ethereal (0.10.10-2sarge9) stable-security; urgency=high * Non-maintainer upload by the Security Team * Backported fixes for several vulnerabilities: * Memory exhaustion denial of service in the XOT dissector * Off-by-one buffer overflow in MIME Multipart dissector stable/main/binary-powerpc/tethereal_0.10.10-2sarge9_powerpc.deb stable/main/binary-powerpc/ethereal-common_0.10.10-2sarge9_powerpc.deb stable/main/binary-powerpc/ethereal_0.10.10-2sarge9_powerpc.deb stable/main/binary-powerpc/ethereal-dev_0.10.10-2sarge9_powerpc.deb ethereal (0.10.10-2sarge9) stable-security; urgency=high * Non-maintainer upload by the Security Team * Backported fixes for several vulnerabilities: * Memory exhaustion denial of service in the XOT dissector * Off-by-one buffer overflow in MIME Multipart dissector stable/main/binary-mipsel/ethereal_0.10.10-2sarge9_mipsel.deb stable/main/binary-mipsel/ethereal-common_0.10.10-2sarge9_mipsel.deb stable/main/binary-mipsel/ethereal-dev_0.10.10-2sarge9_mipsel.deb stable/main/binary-mipsel/tethereal_0.10.10-2sarge9_mipsel.deb ethereal (0.10.10-2sarge9) stable-security; urgency=high * Non-maintainer upload by the Security Team * Backported fixes for several vulnerabilities: * Memory exhaustion denial of service in the XOT dissector * Off-by-one buffer overflow in MIME Multipart dissector stable/main/binary-mips/ethereal-common_0.10.10-2sarge9_mips.deb stable/main/binary-mips/ethereal_0.10.10-2sarge9_mips.deb stable/main/binary-mips/tethereal_0.10.10-2sarge9_mips.deb stable/main/binary-mips/ethereal-dev_0.10.10-2sarge9_mips.deb ethereal (0.10.10-2sarge9) stable-security; urgency=high * Non-maintainer upload by the Security Team * Backported fixes for several vulnerabilities: * Memory exhaustion denial of service in the XOT dissector * Off-by-one buffer overflow in MIME Multipart dissector stable/main/binary-m68k/ethereal-common_0.10.10-2sarge9_m68k.deb stable/main/binary-m68k/ethereal-dev_0.10.10-2sarge9_m68k.deb stable/main/binary-m68k/ethereal_0.10.10-2sarge9_m68k.deb stable/main/binary-m68k/tethereal_0.10.10-2sarge9_m68k.deb ethereal (0.10.10-2sarge9) stable-security; urgency=high * Non-maintainer upload by the Security Team * Backported fixes for several vulnerabilities: * Memory exhaustion denial of service in the XOT dissector * Off-by-one buffer overflow in MIME Multipart dissector stable/main/binary-ia64/ethereal-common_0.10.10-2sarge9_ia64.deb stable/main/binary-ia64/ethereal_0.10.10-2sarge9_ia64.deb stable/main/binary-ia64/ethereal-dev_0.10.10-2sarge9_ia64.deb stable/main/binary-ia64/tethereal_0.10.10-2sarge9_ia64.deb ethereal (0.10.10-2sarge9) stable-security; urgency=high * Non-maintainer upload by the Security Team * Backported fixes for several vulnerabilities: * Memory exhaustion denial of service in the XOT dissector * Off-by-one buffer overflow in MIME Multipart dissector stable/main/binary-hppa/tethereal_0.10.10-2sarge9_hppa.deb stable/main/binary-hppa/ethereal-dev_0.10.10-2sarge9_hppa.deb stable/main/binary-hppa/ethereal_0.10.10-2sarge9_hppa.deb stable/main/binary-hppa/ethereal-common_0.10.10-2sarge9_hppa.deb ethereal (0.10.10-2sarge9) stable-security; urgency=high * Non-maintainer upload by the Security Team * Backported fixes for several vulnerabilities: * Memory exhaustion denial of service in the XOT dissector * Off-by-one buffer overflow in MIME Multipart dissector stable/main/binary-arm/ethereal-dev_0.10.10-2sarge9_arm.deb stable/main/binary-arm/ethereal-common_0.10.10-2sarge9_arm.deb stable/main/binary-arm/ethereal_0.10.10-2sarge9_arm.deb stable/main/binary-arm/tethereal_0.10.10-2sarge9_arm.deb ethereal (0.10.10-2sarge9) stable-security; urgency=high * Non-maintainer upload by the Security Team * Backported fixes for several vulnerabilities: * Memory exhaustion denial of service in the XOT dissector * Off-by-one buffer overflow in MIME Multipart dissector stable/main/binary-alpha/ethereal-common_0.10.10-2sarge9_alpha.deb stable/main/binary-alpha/ethereal-dev_0.10.10-2sarge9_alpha.deb stable/main/binary-alpha/tethereal_0.10.10-2sarge9_alpha.deb stable/main/binary-alpha/ethereal_0.10.10-2sarge9_alpha.deb ethereal (0.10.10-2sarge9) stable-security; urgency=high * Non-maintainer upload by the Security Team * Backported fixes for several vulnerabilities: * Memory exhaustion denial of service in the XOT dissector * Off-by-one buffer overflow in MIME Multipart dissector stable/main/binary-i386/ethereal-dev_0.10.10-2sarge9_i386.deb stable/main/binary-i386/ethereal_0.10.10-2sarge9_i386.deb stable/main/binary-i386/ethereal-common_0.10.10-2sarge9_i386.deb stable/main/source/ethereal_0.10.10-2sarge9.diff.gz stable/main/binary-i386/tethereal_0.10.10-2sarge9_i386.deb stable/main/source/ethereal_0.10.10-2sarge9.dsc ethereal (0.10.10-2sarge9) stable-security; urgency=high * Non-maintainer upload by the Security Team * Backported fixes for several vulnerabilities: * Memory exhaustion denial of service in the XOT dissector * Off-by-one buffer overflow in MIME Multipart dissector stable/main/source/enemies-of-carlotta_1.0.3-1sarge1.dsc stable/main/binary-all/enemies-of-carlotta_1.0.3-1sarge1_all.deb stable/main/source/enemies-of-carlotta_1.0.3-1sarge1.diff.gz enemies-of-carlotta (1.0.3-1sarge1) stable-security; urgency=high * Non-maintainer upload by the Security Team * EoC did not correctly deal with SMTP level e-mail addresses that contain shell meta characters. [CVE-2006-5875]. stable/main/binary-sparc/elog_2.5.7+r1558-4+sarge3_sparc.deb elog (2.5.7+r1558-4+sarge3) stable-security; urgency=high * Security update: + Backport r1748-r1745 from upstream's Subversion repository: "Prevent crash if logbook 'global*' is accessed and a logbook 'global*' is defined in config file" This bug was reported by OS2A team. More details could be found in "#397875: ELOG Web Logbook Remote Denial of Service Vulnerability" + Backport the patch from Debian Security Audit team (r1749 in repository). Thanks to Ulf Harnhammar. Details could be found in #392016. Short excerpt from this bug report is quoted below: "There are some incorrect handling of *printf() calls and format strings. They lead to ELOG crashing completely, with the potential of executing arbitrary machine code programs under some conditions. There are also some cross-site scripting issues." + HTML log entries are open to XSS vulnerabilites as demonstrated in #389361. Though HTML mode had not been enabled by default in this version of Elog, add "HTML default = 2" option to elog.conf for extra safety. Thanks to this option, the checkbox which enables HTML mode is not even shown during log entry. stable/main/binary-s390/elog_2.5.7+r1558-4+sarge3_s390.deb elog (2.5.7+r1558-4+sarge3) stable-security; urgency=high * Security update: + Backport r1748-r1745 from upstream's Subversion repository: "Prevent crash if logbook 'global*' is accessed and a logbook 'global*' is defined in config file" This bug was reported by OS2A team. More details could be found in "#397875: ELOG Web Logbook Remote Denial of Service Vulnerability" + Backport the patch from Debian Security Audit team (r1749 in repository). Thanks to Ulf Harnhammar. Details could be found in #392016. Short excerpt from this bug report is quoted below: "There are some incorrect handling of *printf() calls and format strings. They lead to ELOG crashing completely, with the potential of executing arbitrary machine code programs under some conditions. There are also some cross-site scripting issues." + HTML log entries are open to XSS vulnerabilites as demonstrated in #389361. Though HTML mode had not been enabled by default in this version of Elog, add "HTML default = 2" option to elog.conf for extra safety. Thanks to this option, the checkbox which enables HTML mode is not even shown during log entry. stable/main/binary-powerpc/elog_2.5.7+r1558-4+sarge3_powerpc.deb elog (2.5.7+r1558-4+sarge3) stable-security; urgency=high * Security update: + Backport r1748-r1745 from upstream's Subversion repository: "Prevent crash if logbook 'global*' is accessed and a logbook 'global*' is defined in config file" This bug was reported by OS2A team. More details could be found in "#397875: ELOG Web Logbook Remote Denial of Service Vulnerability" + Backport the patch from Debian Security Audit team (r1749 in repository). Thanks to Ulf Harnhammar. Details could be found in #392016. Short excerpt from this bug report is quoted below: "There are some incorrect handling of *printf() calls and format strings. They lead to ELOG crashing completely, with the potential of executing arbitrary machine code programs under some conditions. There are also some cross-site scripting issues." + HTML log entries are open to XSS vulnerabilites as demonstrated in #389361. Though HTML mode had not been enabled by default in this version of Elog, add "HTML default = 2" option to elog.conf for extra safety. Thanks to this option, the checkbox which enables HTML mode is not even shown during log entry. stable/main/binary-mipsel/elog_2.5.7+r1558-4+sarge3_mipsel.deb elog (2.5.7+r1558-4+sarge3) stable-security; urgency=high * Security update: + Backport r1748-r1745 from upstream's Subversion repository: "Prevent crash if logbook 'global*' is accessed and a logbook 'global*' is defined in config file" This bug was reported by OS2A team. More details could be found in "#397875: ELOG Web Logbook Remote Denial of Service Vulnerability" + Backport the patch from Debian Security Audit team (r1749 in repository). Thanks to Ulf Harnhammar. Details could be found in #392016. Short excerpt from this bug report is quoted below: "There are some incorrect handling of *printf() calls and format strings. They lead to ELOG crashing completely, with the potential of executing arbitrary machine code programs under some conditions. There are also some cross-site scripting issues." + HTML log entries are open to XSS vulnerabilites as demonstrated in #389361. Though HTML mode had not been enabled by default in this version of Elog, add "HTML default = 2" option to elog.conf for extra safety. Thanks to this option, the checkbox which enables HTML mode is not even shown during log entry. stable/main/binary-mips/elog_2.5.7+r1558-4+sarge3_mips.deb elog (2.5.7+r1558-4+sarge3) stable-security; urgency=high * Security update: + Backport r1748-r1745 from upstream's Subversion repository: "Prevent crash if logbook 'global*' is accessed and a logbook 'global*' is defined in config file" This bug was reported by OS2A team. More details could be found in "#397875: ELOG Web Logbook Remote Denial of Service Vulnerability" + Backport the patch from Debian Security Audit team (r1749 in repository). Thanks to Ulf Harnhammar. Details could be found in #392016. Short excerpt from this bug report is quoted below: "There are some incorrect handling of *printf() calls and format strings. They lead to ELOG crashing completely, with the potential of executing arbitrary machine code programs under some conditions. There are also some cross-site scripting issues." + HTML log entries are open to XSS vulnerabilites as demonstrated in #389361. Though HTML mode had not been enabled by default in this version of Elog, add "HTML default = 2" option to elog.conf for extra safety. Thanks to this option, the checkbox which enables HTML mode is not even shown during log entry. stable/main/binary-m68k/elog_2.5.7+r1558-4+sarge3_m68k.deb elog (2.5.7+r1558-4+sarge3) stable-security; urgency=high * Security update: + Backport r1748-r1745 from upstream's Subversion repository: "Prevent crash if logbook 'global*' is accessed and a logbook 'global*' is defined in config file" This bug was reported by OS2A team. More details could be found in "#397875: ELOG Web Logbook Remote Denial of Service Vulnerability" + Backport the patch from Debian Security Audit team (r1749 in repository). Thanks to Ulf Harnhammar. Details could be found in #392016. Short excerpt from this bug report is quoted below: "There are some incorrect handling of *printf() calls and format strings. They lead to ELOG crashing completely, with the potential of executing arbitrary machine code programs under some conditions. There are also some cross-site scripting issues." + HTML log entries are open to XSS vulnerabilites as demonstrated in #389361. Though HTML mode had not been enabled by default in this version of Elog, add "HTML default = 2" option to elog.conf for extra safety. Thanks to this option, the checkbox which enables HTML mode is not even shown during log entry. stable/main/binary-ia64/elog_2.5.7+r1558-4+sarge3_ia64.deb elog (2.5.7+r1558-4+sarge3) stable-security; urgency=high * Security update: + Backport r1748-r1745 from upstream's Subversion repository: "Prevent crash if logbook 'global*' is accessed and a logbook 'global*' is defined in config file" This bug was reported by OS2A team. More details could be found in "#397875: ELOG Web Logbook Remote Denial of Service Vulnerability" + Backport the patch from Debian Security Audit team (r1749 in repository). Thanks to Ulf Harnhammar. Details could be found in #392016. Short excerpt from this bug report is quoted below: "There are some incorrect handling of *printf() calls and format strings. They lead to ELOG crashing completely, with the potential of executing arbitrary machine code programs under some conditions. There are also some cross-site scripting issues." + HTML log entries are open to XSS vulnerabilites as demonstrated in #389361. Though HTML mode had not been enabled by default in this version of Elog, add "HTML default = 2" option to elog.conf for extra safety. Thanks to this option, the checkbox which enables HTML mode is not even shown during log entry. stable/main/binary-hppa/elog_2.5.7+r1558-4+sarge3_hppa.deb elog (2.5.7+r1558-4+sarge3) stable-security; urgency=high * Security update: + Backport r1748-r1745 from upstream's Subversion repository: "Prevent crash if logbook 'global*' is accessed and a logbook 'global*' is defined in config file" This bug was reported by OS2A team. More details could be found in "#397875: ELOG Web Logbook Remote Denial of Service Vulnerability" + Backport the patch from Debian Security Audit team (r1749 in repository). Thanks to Ulf Harnhammar. Details could be found in #392016. Short excerpt from this bug report is quoted below: "There are some incorrect handling of *printf() calls and format strings. They lead to ELOG crashing completely, with the potential of executing arbitrary machine code programs under some conditions. There are also some cross-site scripting issues." + HTML log entries are open to XSS vulnerabilites as demonstrated in #389361. Though HTML mode had not been enabled by default in this version of Elog, add "HTML default = 2" option to elog.conf for extra safety. Thanks to this option, the checkbox which enables HTML mode is not even shown during log entry. stable/main/binary-arm/elog_2.5.7+r1558-4+sarge3_arm.deb elog (2.5.7+r1558-4+sarge3) stable-security; urgency=high * Security update: + Backport r1748-r1745 from upstream's Subversion repository: "Prevent crash if logbook 'global*' is accessed and a logbook 'global*' is defined in config file" This bug was reported by OS2A team. More details could be found in "#397875: ELOG Web Logbook Remote Denial of Service Vulnerability" + Backport the patch from Debian Security Audit team (r1749 in repository). Thanks to Ulf Harnhammar. Details could be found in #392016. Short excerpt from this bug report is quoted below: "There are some incorrect handling of *printf() calls and format strings. They lead to ELOG crashing completely, with the potential of executing arbitrary machine code programs under some conditions. There are also some cross-site scripting issues." + HTML log entries are open to XSS vulnerabilites as demonstrated in #389361. Though HTML mode had not been enabled by default in this version of Elog, add "HTML default = 2" option to elog.conf for extra safety. Thanks to this option, the checkbox which enables HTML mode is not even shown during log entry. stable/main/binary-alpha/elog_2.5.7+r1558-4+sarge3_alpha.deb elog (2.5.7+r1558-4+sarge3) stable-security; urgency=high * Security update: + Backport r1748-r1745 from upstream's Subversion repository: "Prevent crash if logbook 'global*' is accessed and a logbook 'global*' is defined in config file" This bug was reported by OS2A team. More details could be found in "#397875: ELOG Web Logbook Remote Denial of Service Vulnerability" + Backport the patch from Debian Security Audit team (r1749 in repository). Thanks to Ulf Harnhammar. Details could be found in #392016. Short excerpt from this bug report is quoted below: "There are some incorrect handling of *printf() calls and format strings. They lead to ELOG crashing completely, with the potential of executing arbitrary machine code programs under some conditions. There are also some cross-site scripting issues." + HTML log entries are open to XSS vulnerabilites as demonstrated in #389361. Though HTML mode had not been enabled by default in this version of Elog, add "HTML default = 2" option to elog.conf for extra safety. Thanks to this option, the checkbox which enables HTML mode is not even shown during log entry. stable/main/source/elog_2.5.7+r1558-4+sarge3.diff.gz stable/main/source/elog_2.5.7+r1558-4+sarge3.dsc stable/main/binary-i386/elog_2.5.7+r1558-4+sarge3_i386.deb elog (2.5.7+r1558-4+sarge3) stable-security; urgency=high * Security update: + Backport r1748-r1745 from upstream's Subversion repository: "Prevent crash if logbook 'global*' is accessed and a logbook 'global*' is defined in config file" This bug was reported by OS2A team. More details could be found in "#397875: ELOG Web Logbook Remote Denial of Service Vulnerability" + Backport the patch from Debian Security Audit team (r1749 in repository). Thanks to Ulf Harnhammar. Details could be found in #392016. Short excerpt from this bug report is quoted below: "There are some incorrect handling of *printf() calls and format strings. They lead to ELOG crashing completely, with the potential of executing arbitrary machine code programs under some conditions. There are also some cross-site scripting issues." + HTML log entries are open to XSS vulnerabilites as demonstrated in #389361. Though HTML mode had not been enabled by default in this version of Elog, add "HTML default = 2" option to elog.conf for extra safety. Thanks to this option, the checkbox which enables HTML mode is not even shown during log entry. stable/main/binary-sparc/elinks_0.10.4-7.1_sparc.deb stable/main/binary-sparc/elinks-lite_0.10.4-7.1_sparc.deb elinks (0.10.4-7.1) stable-security; urgency=high * Backport patch from links to fix security bug in smb:// URI handling: '"' and ';' characters could be used for remote command execution (CVE-2006-5925). stable/main/binary-s390/elinks_0.10.4-7.1_s390.deb stable/main/binary-s390/elinks-lite_0.10.4-7.1_s390.deb elinks (0.10.4-7.1) stable-security; urgency=high * Backport patch from links to fix security bug in smb:// URI handling: '"' and ';' characters could be used for remote command execution (CVE-2006-5925). stable/main/binary-powerpc/elinks-lite_0.10.4-7.1_powerpc.deb stable/main/binary-powerpc/elinks_0.10.4-7.1_powerpc.deb elinks (0.10.4-7.1) stable-security; urgency=high * Backport patch from links to fix security bug in smb:// URI handling: '"' and ';' characters could be used for remote command execution (CVE-2006-5925). stable/main/binary-mipsel/elinks-lite_0.10.4-7.1_mipsel.deb stable/main/binary-mipsel/elinks_0.10.4-7.1_mipsel.deb elinks (0.10.4-7.1) stable-security; urgency=high * Backport patch from links to fix security bug in smb:// URI handling: '"' and ';' characters could be used for remote command execution (CVE-2006-5925). stable/main/binary-mips/elinks-lite_0.10.4-7.1_mips.deb stable/main/binary-mips/elinks_0.10.4-7.1_mips.deb elinks (0.10.4-7.1) stable-security; urgency=high * Backport patch from links to fix security bug in smb:// URI handling: '"' and ';' characters could be used for remote command execution (CVE-2006-5925). stable/main/binary-m68k/elinks_0.10.4-7.1_m68k.deb stable/main/binary-m68k/elinks-lite_0.10.4-7.1_m68k.deb elinks (0.10.4-7.1) stable-security; urgency=high * Backport patch from links to fix security bug in smb:// URI handling: '"' and ';' characters could be used for remote command execution (CVE-2006-5925). stable/main/binary-ia64/elinks-lite_0.10.4-7.1_ia64.deb stable/main/binary-ia64/elinks_0.10.4-7.1_ia64.deb elinks (0.10.4-7.1) stable-security; urgency=high * Backport patch from links to fix security bug in smb:// URI handling: '"' and ';' characters could be used for remote command execution (CVE-2006-5925). stable/main/binary-hppa/elinks-lite_0.10.4-7.1_hppa.deb stable/main/binary-hppa/elinks_0.10.4-7.1_hppa.deb elinks (0.10.4-7.1) stable-security; urgency=high * Backport patch from links to fix security bug in smb:// URI handling: '"' and ';' characters could be used for remote command execution (CVE-2006-5925). stable/main/binary-arm/elinks_0.10.4-7.1_arm.deb stable/main/binary-arm/elinks-lite_0.10.4-7.1_arm.deb elinks (0.10.4-7.1) stable-security; urgency=high * Backport patch from links to fix security bug in smb:// URI handling: '"' and ';' characters could be used for remote command execution (CVE-2006-5925). stable/main/binary-alpha/elinks-lite_0.10.4-7.1_alpha.deb stable/main/binary-alpha/elinks_0.10.4-7.1_alpha.deb elinks (0.10.4-7.1) stable-security; urgency=high * Backport patch from links to fix security bug in smb:// URI handling: '"' and ';' characters could be used for remote command execution (CVE-2006-5925). stable/main/binary-i386/elinks_0.10.4-7.1_i386.deb stable/main/source/elinks_0.10.4-7.1.diff.gz stable/main/source/elinks_0.10.4-7.1.dsc stable/main/binary-i386/elinks-lite_0.10.4-7.1_i386.deb elinks (0.10.4-7.1) stable-security; urgency=high * Backport patch from links to fix security bug in smb:// URI handling: '"' and ';' characters could be used for remote command execution (CVE-2006-5925). stable/main/binary-sparc/clamav-freshclam_0.84-2.sarge.13_sparc.deb stable/main/binary-sparc/libclamav-dev_0.84-2.sarge.13_sparc.deb stable/main/binary-sparc/libclamav1_0.84-2.sarge.13_sparc.deb stable/main/binary-sparc/clamav-daemon_0.84-2.sarge.13_sparc.deb stable/main/binary-sparc/clamav-milter_0.84-2.sarge.13_sparc.deb stable/main/binary-sparc/clamav_0.84-2.sarge.13_sparc.deb clamav (0.84-2.sarge.13) stable-security; urgency=low * libclamav/message.c: Unusual MIME Encoding Content Filter Bypass [ CVE-2006-6406 ] (closes: #401873) * clamscan/clamscan.c clamscan/manager.c clamscan/options.c clamav-milter/clamav-milter.c shared/cfgparser.c clamd/server-th.c libclamav/scanners.c libclamav/mbox.c libclamav/clamav.h etc/clamd.conf: nested multipart DoS [ CVE-2006-XXXX ] (closes: 401874) stable/main/binary-s390/clamav_0.84-2.sarge.13_s390.deb stable/main/binary-s390/clamav-freshclam_0.84-2.sarge.13_s390.deb stable/main/binary-s390/clamav-milter_0.84-2.sarge.13_s390.deb stable/main/binary-s390/libclamav-dev_0.84-2.sarge.13_s390.deb stable/main/binary-s390/libclamav1_0.84-2.sarge.13_s390.deb stable/main/binary-s390/clamav-daemon_0.84-2.sarge.13_s390.deb clamav (0.84-2.sarge.13) stable-security; urgency=low * libclamav/message.c: Unusual MIME Encoding Content Filter Bypass [ CVE-2006-6406 ] (closes: #401873) * clamscan/clamscan.c clamscan/manager.c clamscan/options.c clamav-milter/clamav-milter.c shared/cfgparser.c clamd/server-th.c libclamav/scanners.c libclamav/mbox.c libclamav/clamav.h etc/clamd.conf: nested multipart DoS [ CVE-2006-XXXX ] (closes: 401874) stable/main/binary-powerpc/clamav-milter_0.84-2.sarge.13_powerpc.deb stable/main/binary-powerpc/clamav-freshclam_0.84-2.sarge.13_powerpc.deb stable/main/binary-powerpc/libclamav1_0.84-2.sarge.13_powerpc.deb stable/main/binary-powerpc/libclamav-dev_0.84-2.sarge.13_powerpc.deb stable/main/binary-powerpc/clamav_0.84-2.sarge.13_powerpc.deb stable/main/binary-powerpc/clamav-daemon_0.84-2.sarge.13_powerpc.deb clamav (0.84-2.sarge.13) stable-security; urgency=low * libclamav/message.c: Unusual MIME Encoding Content Filter Bypass [ CVE-2006-6406 ] (closes: #401873) * clamscan/clamscan.c clamscan/manager.c clamscan/options.c clamav-milter/clamav-milter.c shared/cfgparser.c clamd/server-th.c libclamav/scanners.c libclamav/mbox.c libclamav/clamav.h etc/clamd.conf: nested multipart DoS [ CVE-2006-XXXX ] (closes: 401874) stable/main/binary-mipsel/clamav-daemon_0.84-2.sarge.13_mipsel.deb stable/main/binary-mipsel/clamav_0.84-2.sarge.13_mipsel.deb stable/main/binary-mipsel/libclamav1_0.84-2.sarge.13_mipsel.deb stable/main/binary-mipsel/clamav-freshclam_0.84-2.sarge.13_mipsel.deb stable/main/binary-mipsel/libclamav-dev_0.84-2.sarge.13_mipsel.deb stable/main/binary-mipsel/clamav-milter_0.84-2.sarge.13_mipsel.deb clamav (0.84-2.sarge.13) stable-security; urgency=low * libclamav/message.c: Unusual MIME Encoding Content Filter Bypass [ CVE-2006-6406 ] (closes: #401873) * clamscan/clamscan.c clamscan/manager.c clamscan/options.c clamav-milter/clamav-milter.c shared/cfgparser.c clamd/server-th.c libclamav/scanners.c libclamav/mbox.c libclamav/clamav.h etc/clamd.conf: nested multipart DoS [ CVE-2006-XXXX ] (closes: 401874) stable/main/binary-mips/libclamav1_0.84-2.sarge.13_mips.deb stable/main/binary-mips/libclamav-dev_0.84-2.sarge.13_mips.deb stable/main/binary-mips/clamav-milter_0.84-2.sarge.13_mips.deb stable/main/binary-mips/clamav-freshclam_0.84-2.sarge.13_mips.deb stable/main/binary-mips/clamav-daemon_0.84-2.sarge.13_mips.deb stable/main/binary-mips/clamav_0.84-2.sarge.13_mips.deb clamav (0.84-2.sarge.13) stable-security; urgency=low * libclamav/message.c: Unusual MIME Encoding Content Filter Bypass [ CVE-2006-6406 ] (closes: #401873) * clamscan/clamscan.c clamscan/manager.c clamscan/options.c clamav-milter/clamav-milter.c shared/cfgparser.c clamd/server-th.c libclamav/scanners.c libclamav/mbox.c libclamav/clamav.h etc/clamd.conf: nested multipart DoS [ CVE-2006-XXXX ] (closes: 401874) stable/main/binary-m68k/libclamav-dev_0.84-2.sarge.13_m68k.deb stable/main/binary-m68k/libclamav1_0.84-2.sarge.13_m68k.deb stable/main/binary-m68k/clamav-freshclam_0.84-2.sarge.13_m68k.deb stable/main/binary-m68k/clamav_0.84-2.sarge.13_m68k.deb stable/main/binary-m68k/clamav-milter_0.84-2.sarge.13_m68k.deb stable/main/binary-m68k/clamav-daemon_0.84-2.sarge.13_m68k.deb clamav (0.84-2.sarge.13) stable-security; urgency=low * libclamav/message.c: Unusual MIME Encoding Content Filter Bypass [ CVE-2006-6406 ] (closes: #401873) * clamscan/clamscan.c clamscan/manager.c clamscan/options.c clamav-milter/clamav-milter.c shared/cfgparser.c clamd/server-th.c libclamav/scanners.c libclamav/mbox.c libclamav/clamav.h etc/clamd.conf: nested multipart DoS [ CVE-2006-XXXX ] (closes: 401874) stable/main/binary-ia64/clamav-milter_0.84-2.sarge.13_ia64.deb stable/main/binary-ia64/libclamav-dev_0.84-2.sarge.13_ia64.deb stable/main/binary-ia64/clamav-freshclam_0.84-2.sarge.13_ia64.deb stable/main/binary-ia64/clamav_0.84-2.sarge.13_ia64.deb stable/main/binary-ia64/libclamav1_0.84-2.sarge.13_ia64.deb stable/main/binary-ia64/clamav-daemon_0.84-2.sarge.13_ia64.deb clamav (0.84-2.sarge.13) stable-security; urgency=low * libclamav/message.c: Unusual MIME Encoding Content Filter Bypass [ CVE-2006-6406 ] (closes: #401873) * clamscan/clamscan.c clamscan/manager.c clamscan/options.c clamav-milter/clamav-milter.c shared/cfgparser.c clamd/server-th.c libclamav/scanners.c libclamav/mbox.c libclamav/clamav.h etc/clamd.conf: nested multipart DoS [ CVE-2006-XXXX ] (closes: 401874) stable/main/binary-hppa/libclamav1_0.84-2.sarge.13_hppa.deb stable/main/binary-hppa/clamav_0.84-2.sarge.13_hppa.deb stable/main/binary-hppa/clamav-freshclam_0.84-2.sarge.13_hppa.deb stable/main/binary-hppa/clamav-daemon_0.84-2.sarge.13_hppa.deb stable/main/binary-hppa/libclamav-dev_0.84-2.sarge.13_hppa.deb stable/main/binary-hppa/clamav-milter_0.84-2.sarge.13_hppa.deb clamav (0.84-2.sarge.13) stable-security; urgency=low * libclamav/message.c: Unusual MIME Encoding Content Filter Bypass [ CVE-2006-6406 ] (closes: #401873) * clamscan/clamscan.c clamscan/manager.c clamscan/options.c clamav-milter/clamav-milter.c shared/cfgparser.c clamd/server-th.c libclamav/scanners.c libclamav/mbox.c libclamav/clamav.h etc/clamd.conf: nested multipart DoS [ CVE-2006-XXXX ] (closes: 401874) stable/main/binary-arm/clamav-daemon_0.84-2.sarge.13_arm.deb stable/main/binary-arm/libclamav1_0.84-2.sarge.13_arm.deb stable/main/binary-arm/clamav_0.84-2.sarge.13_arm.deb stable/main/binary-arm/clamav-freshclam_0.84-2.sarge.13_arm.deb stable/main/binary-arm/libclamav-dev_0.84-2.sarge.13_arm.deb stable/main/binary-arm/clamav-milter_0.84-2.sarge.13_arm.deb clamav (0.84-2.sarge.13) stable-security; urgency=low * libclamav/message.c: Unusual MIME Encoding Content Filter Bypass [ CVE-2006-6406 ] (closes: #401873) * clamscan/clamscan.c clamscan/manager.c clamscan/options.c clamav-milter/clamav-milter.c shared/cfgparser.c clamd/server-th.c libclamav/scanners.c libclamav/mbox.c libclamav/clamav.h etc/clamd.conf: nested multipart DoS [ CVE-2006-XXXX ] (closes: 401874) stable/main/binary-alpha/clamav-daemon_0.84-2.sarge.13_alpha.deb stable/main/binary-alpha/clamav_0.84-2.sarge.13_alpha.deb stable/main/binary-alpha/clamav-milter_0.84-2.sarge.13_alpha.deb stable/main/binary-alpha/clamav-freshclam_0.84-2.sarge.13_alpha.deb stable/main/binary-alpha/libclamav-dev_0.84-2.sarge.13_alpha.deb stable/main/binary-alpha/libclamav1_0.84-2.sarge.13_alpha.deb clamav (0.84-2.sarge.13) stable-security; urgency=low * libclamav/message.c: Unusual MIME Encoding Content Filter Bypass [ CVE-2006-6406 ] (closes: #401873) * clamscan/clamscan.c clamscan/manager.c clamscan/options.c clamav-milter/clamav-milter.c shared/cfgparser.c clamd/server-th.c libclamav/scanners.c libclamav/mbox.c libclamav/clamav.h etc/clamd.conf: nested multipart DoS [ CVE-2006-XXXX ] (closes: 401874) stable/main/binary-all/clamav-docs_0.84-2.sarge.13_all.deb stable/main/source/clamav_0.84-2.sarge.13.dsc stable/main/binary-i386/clamav-freshclam_0.84-2.sarge.13_i386.deb stable/main/source/clamav_0.84-2.sarge.13.diff.gz stable/main/binary-i386/libclamav1_0.84-2.sarge.13_i386.deb stable/main/binary-i386/clamav_0.84-2.sarge.13_i386.deb stable/main/binary-i386/clamav-milter_0.84-2.sarge.13_i386.deb stable/main/binary-all/clamav-testfiles_0.84-2.sarge.13_all.deb stable/main/binary-all/clamav-base_0.84-2.sarge.13_all.deb stable/main/binary-i386/clamav-daemon_0.84-2.sarge.13_i386.deb stable/main/binary-i386/libclamav-dev_0.84-2.sarge.13_i386.deb clamav (0.84-2.sarge.13) stable-security; urgency=low * libclamav/message.c: Unusual MIME Encoding Content Filter Bypass [ CVE-2006-6406 ] (closes: #401873) * clamscan/clamscan.c clamscan/manager.c clamscan/options.c clamav-milter/clamav-milter.c shared/cfgparser.c clamd/server-th.c libclamav/scanners.c libclamav/mbox.c libclamav/clamav.h etc/clamd.conf: nested multipart DoS [ CVE-2006-XXXX ] (closes: 401874) stable/main/binary-all/cacti_0.8.6c-7sarge4_all.deb stable/main/source/cacti_0.8.6c-7sarge4.dsc stable/main/source/cacti_0.8.6c-7sarge4.diff.gz cacti (0.8.6c-7sarge4) stable-security; urgency=high * security update prepared for the debian security team by the package maintainer. * fix for multiple vulnerabilities in the cacti poller and default scripts, backported from the patches in 0.8.6i-3. See: #404818 * security references: - SA23528, CVE-2006-6799 * patch: - 08_SECURITY-CVE-2006-6799.dpatch stable/main/binary-all/bugzilla_2.16.7-7sarge2_all.deb stable/main/source/bugzilla_2.16.7-7sarge2.dsc stable/main/source/bugzilla_2.16.7-7sarge2.diff.gz stable/main/binary-all/bugzilla-doc_2.16.7-7sarge2_all.deb bugzilla (2.16.7-7sarge2) stable-security; urgency=high * Non-maintainer uplaod by the security team [Alexis Sukrieh] * ./syncshadowdb - CVE-2005-4534 + Backported patch from 2.16.11 for closing a security issue about temp files handling. + Upstream security advisory: http://www.bugzilla.org/security/2.16.10-nr/ [Neil McGovern] * CVE-2006-5453 fixes Thanks to Ben Hutchings for patches stable/main/binary-sparc/lwresd_9.2.4-1sarge2_sparc.deb stable/main/binary-sparc/libbind-dev_9.2.4-1sarge2_sparc.deb stable/main/binary-sparc/libisccc0_9.2.4-1sarge2_sparc.deb stable/main/binary-sparc/libisc7_9.2.4-1sarge2_sparc.deb stable/main/binary-sparc/libisccfg0_9.2.4-1sarge2_sparc.deb stable/main/binary-sparc/libdns16_9.2.4-1sarge2_sparc.deb stable/main/binary-sparc/dnsutils_9.2.4-1sarge2_sparc.deb stable/main/binary-sparc/bind9-host_9.2.4-1sarge2_sparc.deb stable/main/binary-sparc/liblwres1_9.2.4-1sarge2_sparc.deb stable/main/binary-sparc/bind9_9.2.4-1sarge2_sparc.deb bind9 (1:9.2.4-1sarge2) stable; urgency=low * Backport fix for CVE-2007-0494 (delta between 9.2.7 and 9.2.8) stable/main/binary-s390/bind9-host_9.2.4-1sarge2_s390.deb stable/main/binary-s390/lwresd_9.2.4-1sarge2_s390.deb stable/main/binary-s390/dnsutils_9.2.4-1sarge2_s390.deb stable/main/binary-s390/libbind-dev_9.2.4-1sarge2_s390.deb stable/main/binary-s390/liblwres1_9.2.4-1sarge2_s390.deb stable/main/binary-s390/bind9_9.2.4-1sarge2_s390.deb stable/main/binary-s390/libisccfg0_9.2.4-1sarge2_s390.deb stable/main/binary-s390/libisccc0_9.2.4-1sarge2_s390.deb stable/main/binary-s390/libisc7_9.2.4-1sarge2_s390.deb stable/main/binary-s390/libdns16_9.2.4-1sarge2_s390.deb bind9 (1:9.2.4-1sarge2) stable; urgency=low * Backport fix for CVE-2007-0494 (delta between 9.2.7 and 9.2.8) stable/main/binary-powerpc/libisc7_9.2.4-1sarge2_powerpc.deb stable/main/binary-powerpc/libdns16_9.2.4-1sarge2_powerpc.deb stable/main/binary-powerpc/lwresd_9.2.4-1sarge2_powerpc.deb stable/main/binary-powerpc/dnsutils_9.2.4-1sarge2_powerpc.deb stable/main/binary-powerpc/libisccc0_9.2.4-1sarge2_powerpc.deb stable/main/binary-powerpc/libisccfg0_9.2.4-1sarge2_powerpc.deb stable/main/binary-powerpc/bind9-host_9.2.4-1sarge2_powerpc.deb stable/main/binary-powerpc/liblwres1_9.2.4-1sarge2_powerpc.deb stable/main/binary-powerpc/libbind-dev_9.2.4-1sarge2_powerpc.deb stable/main/binary-powerpc/bind9_9.2.4-1sarge2_powerpc.deb bind9 (1:9.2.4-1sarge2) stable; urgency=low * Backport fix for CVE-2007-0494 (delta between 9.2.7 and 9.2.8) stable/main/binary-mipsel/dnsutils_9.2.4-1sarge2_mipsel.deb stable/main/binary-mipsel/libbind-dev_9.2.4-1sarge2_mipsel.deb stable/main/binary-mipsel/lwresd_9.2.4-1sarge2_mipsel.deb stable/main/binary-mipsel/libdns16_9.2.4-1sarge2_mipsel.deb stable/main/binary-mipsel/libisc7_9.2.4-1sarge2_mipsel.deb stable/main/binary-mipsel/bind9_9.2.4-1sarge2_mipsel.deb stable/main/binary-mipsel/libisccc0_9.2.4-1sarge2_mipsel.deb stable/main/binary-mipsel/liblwres1_9.2.4-1sarge2_mipsel.deb stable/main/binary-mipsel/bind9-host_9.2.4-1sarge2_mipsel.deb stable/main/binary-mipsel/libisccfg0_9.2.4-1sarge2_mipsel.deb bind9 (1:9.2.4-1sarge2) stable; urgency=low * Backport fix for CVE-2007-0494 (delta between 9.2.7 and 9.2.8) stable/main/binary-mips/libisccc0_9.2.4-1sarge2_mips.deb stable/main/binary-mips/bind9_9.2.4-1sarge2_mips.deb stable/main/binary-mips/lwresd_9.2.4-1sarge2_mips.deb stable/main/binary-mips/libisc7_9.2.4-1sarge2_mips.deb stable/main/binary-mips/libdns16_9.2.4-1sarge2_mips.deb stable/main/binary-mips/libbind-dev_9.2.4-1sarge2_mips.deb stable/main/binary-mips/bind9-host_9.2.4-1sarge2_mips.deb stable/main/binary-mips/liblwres1_9.2.4-1sarge2_mips.deb stable/main/binary-mips/libisccfg0_9.2.4-1sarge2_mips.deb stable/main/binary-mips/dnsutils_9.2.4-1sarge2_mips.deb bind9 (1:9.2.4-1sarge2) stable; urgency=low * Backport fix for CVE-2007-0494 (delta between 9.2.7 and 9.2.8) stable/main/binary-m68k/bind9-host_9.2.4-1sarge2_m68k.deb stable/main/binary-m68k/libdns16_9.2.4-1sarge2_m68k.deb stable/main/binary-m68k/libisc7_9.2.4-1sarge2_m68k.deb stable/main/binary-m68k/dnsutils_9.2.4-1sarge2_m68k.deb stable/main/binary-m68k/libbind-dev_9.2.4-1sarge2_m68k.deb stable/main/binary-m68k/libisccc0_9.2.4-1sarge2_m68k.deb stable/main/binary-m68k/libisccfg0_9.2.4-1sarge2_m68k.deb stable/main/binary-m68k/lwresd_9.2.4-1sarge2_m68k.deb stable/main/binary-m68k/bind9_9.2.4-1sarge2_m68k.deb stable/main/binary-m68k/liblwres1_9.2.4-1sarge2_m68k.deb bind9 (1:9.2.4-1sarge2) stable; urgency=low * Backport fix for CVE-2007-0494 (delta between 9.2.7 and 9.2.8) stable/main/binary-ia64/bind9_9.2.4-1sarge2_ia64.deb stable/main/binary-ia64/liblwres1_9.2.4-1sarge2_ia64.deb stable/main/binary-ia64/libbind-dev_9.2.4-1sarge2_ia64.deb stable/main/binary-ia64/bind9-host_9.2.4-1sarge2_ia64.deb stable/main/binary-ia64/libisccfg0_9.2.4-1sarge2_ia64.deb stable/main/binary-ia64/dnsutils_9.2.4-1sarge2_ia64.deb stable/main/binary-ia64/libisccc0_9.2.4-1sarge2_ia64.deb stable/main/binary-ia64/libdns16_9.2.4-1sarge2_ia64.deb stable/main/binary-ia64/libisc7_9.2.4-1sarge2_ia64.deb stable/main/binary-ia64/lwresd_9.2.4-1sarge2_ia64.deb bind9 (1:9.2.4-1sarge2) stable; urgency=low * Backport fix for CVE-2007-0494 (delta between 9.2.7 and 9.2.8) stable/main/binary-hppa/liblwres1_9.2.4-1sarge2_hppa.deb stable/main/binary-hppa/libdns16_9.2.4-1sarge2_hppa.deb stable/main/binary-hppa/lwresd_9.2.4-1sarge2_hppa.deb stable/main/binary-hppa/bind9-host_9.2.4-1sarge2_hppa.deb stable/main/binary-hppa/dnsutils_9.2.4-1sarge2_hppa.deb stable/main/binary-hppa/libbind-dev_9.2.4-1sarge2_hppa.deb stable/main/binary-hppa/libisccfg0_9.2.4-1sarge2_hppa.deb stable/main/binary-hppa/libisccc0_9.2.4-1sarge2_hppa.deb stable/main/binary-hppa/libisc7_9.2.4-1sarge2_hppa.deb stable/main/binary-hppa/bind9_9.2.4-1sarge2_hppa.deb bind9 (1:9.2.4-1sarge2) stable; urgency=low * Backport fix for CVE-2007-0494 (delta between 9.2.7 and 9.2.8) stable/main/binary-arm/bind9-host_9.2.4-1sarge2_arm.deb stable/main/binary-arm/libdns16_9.2.4-1sarge2_arm.deb stable/main/binary-arm/libisc7_9.2.4-1sarge2_arm.deb stable/main/binary-arm/libisccc0_9.2.4-1sarge2_arm.deb stable/main/binary-arm/libbind-dev_9.2.4-1sarge2_arm.deb stable/main/binary-arm/libisccfg0_9.2.4-1sarge2_arm.deb stable/main/binary-arm/liblwres1_9.2.4-1sarge2_arm.deb stable/main/binary-arm/lwresd_9.2.4-1sarge2_arm.deb stable/main/binary-arm/bind9_9.2.4-1sarge2_arm.deb stable/main/binary-arm/dnsutils_9.2.4-1sarge2_arm.deb bind9 (1:9.2.4-1sarge2) stable; urgency=low * Backport fix for CVE-2007-0494 (delta between 9.2.7 and 9.2.8) stable/main/binary-alpha/libisc7_9.2.4-1sarge2_alpha.deb stable/main/binary-alpha/dnsutils_9.2.4-1sarge2_alpha.deb stable/main/binary-alpha/lwresd_9.2.4-1sarge2_alpha.deb stable/main/binary-alpha/bind9-host_9.2.4-1sarge2_alpha.deb stable/main/binary-alpha/bind9_9.2.4-1sarge2_alpha.deb stable/main/binary-alpha/liblwres1_9.2.4-1sarge2_alpha.deb stable/main/binary-alpha/libbind-dev_9.2.4-1sarge2_alpha.deb stable/main/binary-alpha/libisccc0_9.2.4-1sarge2_alpha.deb stable/main/binary-alpha/libisccfg0_9.2.4-1sarge2_alpha.deb stable/main/binary-alpha/libdns16_9.2.4-1sarge2_alpha.deb bind9 (1:9.2.4-1sarge2) stable; urgency=low * Backport fix for CVE-2007-0494 (delta between 9.2.7 and 9.2.8) stable/main/binary-i386/bind9_9.2.4-1sarge2_i386.deb stable/main/binary-i386/bind9-host_9.2.4-1sarge2_i386.deb stable/main/binary-i386/libdns16_9.2.4-1sarge2_i386.deb stable/main/binary-i386/libisc7_9.2.4-1sarge2_i386.deb stable/main/binary-i386/liblwres1_9.2.4-1sarge2_i386.deb stable/main/binary-i386/libisccc0_9.2.4-1sarge2_i386.deb stable/main/binary-i386/libisccfg0_9.2.4-1sarge2_i386.deb stable/main/binary-i386/lwresd_9.2.4-1sarge2_i386.deb stable/main/binary-i386/dnsutils_9.2.4-1sarge2_i386.deb stable/main/binary-i386/libbind-dev_9.2.4-1sarge2_i386.deb stable/main/source/bind9_9.2.4-1sarge2.dsc stable/main/binary-all/bind9-doc_9.2.4-1sarge2_all.deb stable/main/source/bind9_9.2.4-1sarge2.diff.gz bind9 (1:9.2.4-1sarge2) stable; urgency=low * Backport fix for CVE-2007-0494 (delta between 9.2.7 and 9.2.8) stable/main/binary-sparc/asterisk-gtk-console_1.0.7.dfsg.1-2sarge4_sparc.deb stable/main/binary-sparc/asterisk_1.0.7.dfsg.1-2sarge4_sparc.deb stable/main/binary-sparc/asterisk-h323_1.0.7.dfsg.1-2sarge4_sparc.deb asterisk (1:1.0.7.dfsg.1-2sarge4) stable-security; urgency=high * Non-maintainer upload * Backported fix for buffer overflow in chan_skinny driver induced by an undetected integer underflow [debian/patches/99_CVE-2006-5444.dpatch] (Closes: #394025) stable/main/binary-s390/asterisk-h323_1.0.7.dfsg.1-2sarge4_s390.deb stable/main/binary-s390/asterisk-gtk-console_1.0.7.dfsg.1-2sarge4_s390.deb stable/main/binary-s390/asterisk_1.0.7.dfsg.1-2sarge4_s390.deb asterisk (1:1.0.7.dfsg.1-2sarge4) stable-security; urgency=high * Non-maintainer upload * Backported fix for buffer overflow in chan_skinny driver induced by an undetected integer underflow [debian/patches/99_CVE-2006-5444.dpatch] (Closes: #394025) stable/main/binary-mipsel/asterisk-gtk-console_1.0.7.dfsg.1-2sarge4_mipsel.deb stable/main/binary-mipsel/asterisk-h323_1.0.7.dfsg.1-2sarge4_mipsel.deb stable/main/binary-mipsel/asterisk_1.0.7.dfsg.1-2sarge4_mipsel.deb asterisk (1:1.0.7.dfsg.1-2sarge4) stable-security; urgency=high * Non-maintainer upload * Backported fix for buffer overflow in chan_skinny driver induced by an undetected integer underflow [debian/patches/99_CVE-2006-5444.dpatch] (Closes: #394025) stable/main/binary-mips/asterisk-h323_1.0.7.dfsg.1-2sarge4_mips.deb stable/main/binary-mips/asterisk-gtk-console_1.0.7.dfsg.1-2sarge4_mips.deb stable/main/binary-mips/asterisk_1.0.7.dfsg.1-2sarge4_mips.deb asterisk (1:1.0.7.dfsg.1-2sarge4) stable-security; urgency=high * Non-maintainer upload * Backported fix for buffer overflow in chan_skinny driver induced by an undetected integer underflow [debian/patches/99_CVE-2006-5444.dpatch] (Closes: #394025) stable/main/binary-m68k/asterisk_1.0.7.dfsg.1-2sarge4_m68k.deb stable/main/binary-m68k/asterisk-gtk-console_1.0.7.dfsg.1-2sarge4_m68k.deb stable/main/binary-m68k/asterisk-h323_1.0.7.dfsg.1-2sarge4_m68k.deb asterisk (1:1.0.7.dfsg.1-2sarge4) stable-security; urgency=high * Non-maintainer upload * Backported fix for buffer overflow in chan_skinny driver induced by an undetected integer underflow [debian/patches/99_CVE-2006-5444.dpatch] (Closes: #394025) stable/main/binary-ia64/asterisk_1.0.7.dfsg.1-2sarge4_ia64.deb stable/main/binary-ia64/asterisk-gtk-console_1.0.7.dfsg.1-2sarge4_ia64.deb stable/main/binary-ia64/asterisk-h323_1.0.7.dfsg.1-2sarge4_ia64.deb asterisk (1:1.0.7.dfsg.1-2sarge4) stable-security; urgency=high * Non-maintainer upload * Backported fix for buffer overflow in chan_skinny driver induced by an undetected integer underflow [debian/patches/99_CVE-2006-5444.dpatch] (Closes: #394025) stable/main/binary-i386/asterisk_1.0.7.dfsg.1-2sarge4_i386.deb stable/main/binary-i386/asterisk-gtk-console_1.0.7.dfsg.1-2sarge4_i386.deb stable/main/binary-i386/asterisk-h323_1.0.7.dfsg.1-2sarge4_i386.deb asterisk (1:1.0.7.dfsg.1-2sarge4) stable-security; urgency=high * Non-maintainer upload * Backported fix for buffer overflow in chan_skinny driver induced by an undetected integer underflow [debian/patches/99_CVE-2006-5444.dpatch] (Closes: #394025) stable/main/binary-hppa/asterisk-h323_1.0.7.dfsg.1-2sarge4_hppa.deb stable/main/binary-hppa/asterisk-gtk-console_1.0.7.dfsg.1-2sarge4_hppa.deb stable/main/binary-hppa/asterisk_1.0.7.dfsg.1-2sarge4_hppa.deb asterisk (1:1.0.7.dfsg.1-2sarge4) stable-security; urgency=high * Non-maintainer upload * Backported fix for buffer overflow in chan_skinny driver induced by an undetected integer underflow [debian/patches/99_CVE-2006-5444.dpatch] (Closes: #394025) stable/main/binary-arm/asterisk-h323_1.0.7.dfsg.1-2sarge4_arm.deb stable/main/binary-arm/asterisk-gtk-console_1.0.7.dfsg.1-2sarge4_arm.deb stable/main/binary-arm/asterisk_1.0.7.dfsg.1-2sarge4_arm.deb asterisk (1:1.0.7.dfsg.1-2sarge4) stable-security; urgency=high * Non-maintainer upload * Backported fix for buffer overflow in chan_skinny driver induced by an undetected integer underflow [debian/patches/99_CVE-2006-5444.dpatch] (Closes: #394025) stable/main/binary-alpha/asterisk_1.0.7.dfsg.1-2sarge4_alpha.deb stable/main/binary-alpha/asterisk-gtk-console_1.0.7.dfsg.1-2sarge4_alpha.deb stable/main/binary-alpha/asterisk-h323_1.0.7.dfsg.1-2sarge4_alpha.deb asterisk (1:1.0.7.dfsg.1-2sarge4) stable-security; urgency=high * Non-maintainer upload * Backported fix for buffer overflow in chan_skinny driver induced by an undetected integer underflow [debian/patches/99_CVE-2006-5444.dpatch] (Closes: #394025) stable/main/binary-all/asterisk-sounds-main_1.0.7.dfsg.1-2sarge4_all.deb stable/main/binary-all/asterisk-doc_1.0.7.dfsg.1-2sarge4_all.deb stable/main/binary-powerpc/asterisk-gtk-console_1.0.7.dfsg.1-2sarge4_powerpc.deb stable/main/binary-all/asterisk-web-vmail_1.0.7.dfsg.1-2sarge4_all.deb stable/main/source/asterisk_1.0.7.dfsg.1-2sarge4.diff.gz stable/main/binary-all/asterisk-dev_1.0.7.dfsg.1-2sarge4_all.deb stable/main/binary-powerpc/asterisk_1.0.7.dfsg.1-2sarge4_powerpc.deb stable/main/source/asterisk_1.0.7.dfsg.1-2sarge4.dsc stable/main/binary-all/asterisk-config_1.0.7.dfsg.1-2sarge4_all.deb stable/main/binary-powerpc/asterisk-h323_1.0.7.dfsg.1-2sarge4_powerpc.deb asterisk (1:1.0.7.dfsg.1-2sarge4) stable-security; urgency=high * Non-maintainer upload * Backported fix for buffer overflow in chan_skinny driver induced by an undetected integer underflow [debian/patches/99_CVE-2006-5444.dpatch] (Closes: #394025) ========================================= Sat, 28 Oct 2006 - Debian 3.1r4 released ========================================= stable/main/binary-sparc/libssl0.9.6_0.9.6m-1sarge4_sparc.deb openssl096 (0.9.6m-1sarge4) stable-security; urgency=high * Non-maintainer upload by the Security Team * Correct patch for CVE-2006-2940 to avoid the possibility of dereferencing an uninitialized pointer. stable/main/binary-s390/libssl0.9.6_0.9.6m-1sarge4_s390.deb openssl096 (0.9.6m-1sarge4) stable-security; urgency=high * Non-maintainer upload by the Security Team * Correct patch for CVE-2006-2940 to avoid the possibility of dereferencing an uninitialized pointer. stable/main/binary-powerpc/libssl0.9.6_0.9.6m-1sarge4_powerpc.deb openssl096 (0.9.6m-1sarge4) stable-security; urgency=high * Non-maintainer upload by the Security Team * Correct patch for CVE-2006-2940 to avoid the possibility of dereferencing an uninitialized pointer. stable/main/binary-mipsel/libssl0.9.6_0.9.6m-1sarge4_mipsel.deb openssl096 (0.9.6m-1sarge4) stable-security; urgency=high * Non-maintainer upload by the Security Team * Correct patch for CVE-2006-2940 to avoid the possibility of dereferencing an uninitialized pointer. stable/main/binary-mips/libssl0.9.6_0.9.6m-1sarge4_mips.deb openssl096 (0.9.6m-1sarge4) stable-security; urgency=high * Non-maintainer upload by the Security Team * Correct patch for CVE-2006-2940 to avoid the possibility of dereferencing an uninitialized pointer. stable/main/binary-m68k/libssl0.9.6_0.9.6m-1sarge4_m68k.deb openssl096 (0.9.6m-1sarge4) stable-security; urgency=high * Non-maintainer upload by the Security Team * Correct patch for CVE-2006-2940 to avoid the possibility of dereferencing an uninitialized pointer. stable/main/binary-ia64/libssl0.9.6_0.9.6m-1sarge4_ia64.deb openssl096 (0.9.6m-1sarge4) stable-security; urgency=high * Non-maintainer upload by the Security Team * Correct patch for CVE-2006-2940 to avoid the possibility of dereferencing an uninitialized pointer. stable/main/binary-hppa/libssl0.9.6_0.9.6m-1sarge4_hppa.deb openssl096 (0.9.6m-1sarge4) stable-security; urgency=high * Non-maintainer upload by the Security Team * Correct patch for CVE-2006-2940 to avoid the possibility of dereferencing an uninitialized pointer. stable/main/binary-arm/libssl0.9.6_0.9.6m-1sarge4_arm.deb openssl096 (0.9.6m-1sarge4) stable-security; urgency=high * Non-maintainer upload by the Security Team * Correct patch for CVE-2006-2940 to avoid the possibility of dereferencing an uninitialized pointer. stable/main/binary-alpha/libssl0.9.6_0.9.6m-1sarge4_alpha.deb openssl096 (0.9.6m-1sarge4) stable-security; urgency=high * Non-maintainer upload by the Security Team * Correct patch for CVE-2006-2940 to avoid the possibility of dereferencing an uninitialized pointer. stable/main/source/openssl096_0.9.6m-1sarge4.diff.gz stable/main/binary-i386/libssl0.9.6_0.9.6m-1sarge4_i386.deb stable/main/source/openssl096_0.9.6m-1sarge4.dsc openssl096 (0.9.6m-1sarge4) stable-security; urgency=high * Non-maintainer upload by the Security Team * Correct patch for CVE-2006-2940 to avoid the possibility of dereferencing an uninitialized pointer. stable/main/binary-sparc/mozilla-thunderbird-dev_1.0.2-2.sarge1.0.8c.1_sparc.deb stable/main/binary-sparc/mozilla-thunderbird-inspector_1.0.2-2.sarge1.0.8c.1_sparc.deb stable/main/binary-sparc/mozilla-thunderbird_1.0.2-2.sarge1.0.8c.1_sparc.deb stable/main/binary-sparc/mozilla-thunderbird-offline_1.0.2-2.sarge1.0.8c.1_sparc.deb stable/main/binary-sparc/mozilla-thunderbird-typeaheadfind_1.0.2-2.sarge1.0.8c.1_sparc.deb mozilla-thunderbird (1.0.2-2.sarge1.0.8c.1) stable-security; urgency=critical * various security issues addressed (aka 1.5.0.7 backports): 0001-no-mfsa-CVE-2006-2788-321598.txt 0002-MFSA2006-57-Part-1-2-CVE-2006-4565-346090.txt 0003-MFSA2006-57-Part-2-2-CVE-2006-4566-346794.txt 0004-MFSA2006-60-CVE-2006-4340-CVE-2006-4339-Part-1-3-350640.txt 0005-MFSA2006-60-CVE-2006-4340-CVE-2006-4339-Part-2-3-351079.txt 0006-MFSA2006-60-CVE-2006-4340-CVE-2006-4339-Part-3-3-351848.txt 0007-MFSA2006-61-CVE-2006-4568-343168.txt 0008-MFSA-2006-63-CVE-2006-4570-346984-mail-only.txt 0009-MFSA2006-64-CVE-2006-4571-346980-grant-cellmap-patch.txt 0010-MFSA2006-64-CVE-2006-4571-Section-3-5-Part-1-4-345967.txt 0011-MFSA2006-64-CVE-2006-4571-Section-3-5-Part-3-4-348532.txt 0012-MFSA2006-64-CVE-2006-4571-Section-4-5-Part-1-20-268575.txt 0013-MFSA2006-64-CVE-2006-4571-Section-4-5-Part-2-20-306940.txt 0014-MFSA2006-64-CVE-2006-4571-Section-4-5-Part-3-20-307826.txt 0015-MFSA2006-64-CVE-2006-4571-Section-4-5-Part-5-20-337419.txt 0016-MFSA2006-64-CVS-2006-4571-Section-4-5-Part-6-20-337883.txt 0018-MFSA2006-64-CVE-2006-4571-Section-4-5-Part-8a-20-348049.txt 0019-MFSA2006-64-CVE-2006-4571-Section-4-5-Part-8b-20-348049.txt 0020-MFSA2006-64-CVE-2006-4571-Section-4-5-Part-8c-20-348049.txt 0021-MFSA2006-64-CVE-2006-4571-Section-4-5-Part-8d-20-348049.txt 0022-MFSA2006-64-CVE-2006-4571-Section-4-5-Part-9-20-205735.txt 0023-MFSA2006-64-CVE-2006-4571-Section-4-5-Part-12-20-348062.txt 0024-MFSA2006-64-CVE-2006-4571-Section-4-5-Part-17-20-349201.txt 0025-MFSA2006-64-CVE-2006-4571-Section-5-5-344085.txt 0026-GetDepth-without-DEBUG-in-BlockFrame.txt 0028-MFSA2006-64-CVE-2006-4571-Section-4-5-Part-7-20-347355-without-svg-bug.txt stable/main/binary-s390/mozilla-thunderbird-dev_1.0.2-2.sarge1.0.8c.1_s390.deb stable/main/binary-s390/mozilla-thunderbird-typeaheadfind_1.0.2-2.sarge1.0.8c.1_s390.deb stable/main/binary-s390/mozilla-thunderbird_1.0.2-2.sarge1.0.8c.1_s390.deb stable/main/binary-s390/mozilla-thunderbird-offline_1.0.2-2.sarge1.0.8c.1_s390.deb stable/main/binary-s390/mozilla-thunderbird-inspector_1.0.2-2.sarge1.0.8c.1_s390.deb mozilla-thunderbird (1.0.2-2.sarge1.0.8c.1) stable-security; urgency=critical * various security issues addressed (aka 1.5.0.7 backports): 0001-no-mfsa-CVE-2006-2788-321598.txt 0002-MFSA2006-57-Part-1-2-CVE-2006-4565-346090.txt 0003-MFSA2006-57-Part-2-2-CVE-2006-4566-346794.txt 0004-MFSA2006-60-CVE-2006-4340-CVE-2006-4339-Part-1-3-350640.txt 0005-MFSA2006-60-CVE-2006-4340-CVE-2006-4339-Part-2-3-351079.txt 0006-MFSA2006-60-CVE-2006-4340-CVE-2006-4339-Part-3-3-351848.txt 0007-MFSA2006-61-CVE-2006-4568-343168.txt 0008-MFSA-2006-63-CVE-2006-4570-346984-mail-only.txt 0009-MFSA2006-64-CVE-2006-4571-346980-grant-cellmap-patch.txt 0010-MFSA2006-64-CVE-2006-4571-Section-3-5-Part-1-4-345967.txt 0011-MFSA2006-64-CVE-2006-4571-Section-3-5-Part-3-4-348532.txt 0012-MFSA2006-64-CVE-2006-4571-Section-4-5-Part-1-20-268575.txt 0013-MFSA2006-64-CVE-2006-4571-Section-4-5-Part-2-20-306940.txt 0014-MFSA2006-64-CVE-2006-4571-Section-4-5-Part-3-20-307826.txt 0015-MFSA2006-64-CVE-2006-4571-Section-4-5-Part-5-20-337419.txt 0016-MFSA2006-64-CVS-2006-4571-Section-4-5-Part-6-20-337883.txt 0018-MFSA2006-64-CVE-2006-4571-Section-4-5-Part-8a-20-348049.txt 0019-MFSA2006-64-CVE-2006-4571-Section-4-5-Part-8b-20-348049.txt 0020-MFSA2006-64-CVE-2006-4571-Section-4-5-Part-8c-20-348049.txt 0021-MFSA2006-64-CVE-2006-4571-Section-4-5-Part-8d-20-348049.txt 0022-MFSA2006-64-CVE-2006-4571-Section-4-5-Part-9-20-205735.txt 0023-MFSA2006-64-CVE-2006-4571-Section-4-5-Part-12-20-348062.txt 0024-MFSA2006-64-CVE-2006-4571-Section-4-5-Part-17-20-349201.txt 0025-MFSA2006-64-CVE-2006-4571-Section-5-5-344085.txt 0026-GetDepth-without-DEBUG-in-BlockFrame.txt 0028-MFSA2006-64-CVE-2006-4571-Section-4-5-Part-7-20-347355-without-svg-bug.txt stable/main/binary-powerpc/mozilla-thunderbird-dev_1.0.2-2.sarge1.0.8c.1_powerpc.deb stable/main/binary-powerpc/mozilla-thunderbird-offline_1.0.2-2.sarge1.0.8c.1_powerpc.deb stable/main/binary-powerpc/mozilla-thunderbird-typeaheadfind_1.0.2-2.sarge1.0.8c.1_powerpc.deb stable/main/binary-powerpc/mozilla-thunderbird-inspector_1.0.2-2.sarge1.0.8c.1_powerpc.deb stable/main/binary-powerpc/mozilla-thunderbird_1.0.2-2.sarge1.0.8c.1_powerpc.deb mozilla-thunderbird (1.0.2-2.sarge1.0.8c.1) stable-security; urgency=critical * various security issues addressed (aka 1.5.0.7 backports): 0001-no-mfsa-CVE-2006-2788-321598.txt 0002-MFSA2006-57-Part-1-2-CVE-2006-4565-346090.txt 0003-MFSA2006-57-Part-2-2-CVE-2006-4566-346794.txt 0004-MFSA2006-60-CVE-2006-4340-CVE-2006-4339-Part-1-3-350640.txt 0005-MFSA2006-60-CVE-2006-4340-CVE-2006-4339-Part-2-3-351079.txt 0006-MFSA2006-60-CVE-2006-4340-CVE-2006-4339-Part-3-3-351848.txt 0007-MFSA2006-61-CVE-2006-4568-343168.txt 0008-MFSA-2006-63-CVE-2006-4570-346984-mail-only.txt 0009-MFSA2006-64-CVE-2006-4571-346980-grant-cellmap-patch.txt 0010-MFSA2006-64-CVE-2006-4571-Section-3-5-Part-1-4-345967.txt 0011-MFSA2006-64-CVE-2006-4571-Section-3-5-Part-3-4-348532.txt 0012-MFSA2006-64-CVE-2006-4571-Section-4-5-Part-1-20-268575.txt 0013-MFSA2006-64-CVE-2006-4571-Section-4-5-Part-2-20-306940.txt 0014-MFSA2006-64-CVE-2006-4571-Section-4-5-Part-3-20-307826.txt 0015-MFSA2006-64-CVE-2006-4571-Section-4-5-Part-5-20-337419.txt 0016-MFSA2006-64-CVS-2006-4571-Section-4-5-Part-6-20-337883.txt 0018-MFSA2006-64-CVE-2006-4571-Section-4-5-Part-8a-20-348049.txt 0019-MFSA2006-64-CVE-2006-4571-Section-4-5-Part-8b-20-348049.txt 0020-MFSA2006-64-CVE-2006-4571-Section-4-5-Part-8c-20-348049.txt 0021-MFSA2006-64-CVE-2006-4571-Section-4-5-Part-8d-20-348049.txt 0022-MFSA2006-64-CVE-2006-4571-Section-4-5-Part-9-20-205735.txt 0023-MFSA2006-64-CVE-2006-4571-Section-4-5-Part-12-20-348062.txt 0024-MFSA2006-64-CVE-2006-4571-Section-4-5-Part-17-20-349201.txt 0025-MFSA2006-64-CVE-2006-4571-Section-5-5-344085.txt 0026-GetDepth-without-DEBUG-in-BlockFrame.txt 0028-MFSA2006-64-CVE-2006-4571-Section-4-5-Part-7-20-347355-without-svg-bug.txt stable/main/binary-mipsel/mozilla-thunderbird-inspector_1.0.2-2.sarge1.0.8c.1_mipsel.deb stable/main/binary-mipsel/mozilla-thunderbird-dev_1.0.2-2.sarge1.0.8c.1_mipsel.deb stable/main/binary-mipsel/mozilla-thunderbird_1.0.2-2.sarge1.0.8c.1_mipsel.deb stable/main/binary-mipsel/mozilla-thunderbird-typeaheadfind_1.0.2-2.sarge1.0.8c.1_mipsel.deb stable/main/binary-mipsel/mozilla-thunderbird-offline_1.0.2-2.sarge1.0.8c.1_mipsel.deb mozilla-thunderbird (1.0.2-2.sarge1.0.8c.1) stable-security; urgency=critical * various security issues addressed (aka 1.5.0.7 backports): 0001-no-mfsa-CVE-2006-2788-321598.txt 0002-MFSA2006-57-Part-1-2-CVE-2006-4565-346090.txt 0003-MFSA2006-57-Part-2-2-CVE-2006-4566-346794.txt 0004-MFSA2006-60-CVE-2006-4340-CVE-2006-4339-Part-1-3-350640.txt 0005-MFSA2006-60-CVE-2006-4340-CVE-2006-4339-Part-2-3-351079.txt 0006-MFSA2006-60-CVE-2006-4340-CVE-2006-4339-Part-3-3-351848.txt 0007-MFSA2006-61-CVE-2006-4568-343168.txt 0008-MFSA-2006-63-CVE-2006-4570-346984-mail-only.txt 0009-MFSA2006-64-CVE-2006-4571-346980-grant-cellmap-patch.txt 0010-MFSA2006-64-CVE-2006-4571-Section-3-5-Part-1-4-345967.txt 0011-MFSA2006-64-CVE-2006-4571-Section-3-5-Part-3-4-348532.txt 0012-MFSA2006-64-CVE-2006-4571-Section-4-5-Part-1-20-268575.txt 0013-MFSA2006-64-CVE-2006-4571-Section-4-5-Part-2-20-306940.txt 0014-MFSA2006-64-CVE-2006-4571-Section-4-5-Part-3-20-307826.txt 0015-MFSA2006-64-CVE-2006-4571-Section-4-5-Part-5-20-337419.txt 0016-MFSA2006-64-CVS-2006-4571-Section-4-5-Part-6-20-337883.txt 0018-MFSA2006-64-CVE-2006-4571-Section-4-5-Part-8a-20-348049.txt 0019-MFSA2006-64-CVE-2006-4571-Section-4-5-Part-8b-20-348049.txt 0020-MFSA2006-64-CVE-2006-4571-Section-4-5-Part-8c-20-348049.txt 0021-MFSA2006-64-CVE-2006-4571-Section-4-5-Part-8d-20-348049.txt 0022-MFSA2006-64-CVE-2006-4571-Section-4-5-Part-9-20-205735.txt 0023-MFSA2006-64-CVE-2006-4571-Section-4-5-Part-12-20-348062.txt 0024-MFSA2006-64-CVE-2006-4571-Section-4-5-Part-17-20-349201.txt 0025-MFSA2006-64-CVE-2006-4571-Section-5-5-344085.txt 0026-GetDepth-without-DEBUG-in-BlockFrame.txt 0028-MFSA2006-64-CVE-2006-4571-Section-4-5-Part-7-20-347355-without-svg-bug.txt stable/main/binary-mips/mozilla-thunderbird-inspector_1.0.2-2.sarge1.0.8c.1_mips.deb stable/main/binary-mips/mozilla-thunderbird-typeaheadfind_1.0.2-2.sarge1.0.8c.1_mips.deb stable/main/binary-mips/mozilla-thunderbird-dev_1.0.2-2.sarge1.0.8c.1_mips.deb stable/main/binary-mips/mozilla-thunderbird-offline_1.0.2-2.sarge1.0.8c.1_mips.deb stable/main/binary-mips/mozilla-thunderbird_1.0.2-2.sarge1.0.8c.1_mips.deb mozilla-thunderbird (1.0.2-2.sarge1.0.8c.1) stable-security; urgency=critical * various security issues addressed (aka 1.5.0.7 backports): 0001-no-mfsa-CVE-2006-2788-321598.txt 0002-MFSA2006-57-Part-1-2-CVE-2006-4565-346090.txt 0003-MFSA2006-57-Part-2-2-CVE-2006-4566-346794.txt 0004-MFSA2006-60-CVE-2006-4340-CVE-2006-4339-Part-1-3-350640.txt 0005-MFSA2006-60-CVE-2006-4340-CVE-2006-4339-Part-2-3-351079.txt 0006-MFSA2006-60-CVE-2006-4340-CVE-2006-4339-Part-3-3-351848.txt 0007-MFSA2006-61-CVE-2006-4568-343168.txt 0008-MFSA-2006-63-CVE-2006-4570-346984-mail-only.txt 0009-MFSA2006-64-CVE-2006-4571-346980-grant-cellmap-patch.txt 0010-MFSA2006-64-CVE-2006-4571-Section-3-5-Part-1-4-345967.txt 0011-MFSA2006-64-CVE-2006-4571-Section-3-5-Part-3-4-348532.txt 0012-MFSA2006-64-CVE-2006-4571-Section-4-5-Part-1-20-268575.txt 0013-MFSA2006-64-CVE-2006-4571-Section-4-5-Part-2-20-306940.txt 0014-MFSA2006-64-CVE-2006-4571-Section-4-5-Part-3-20-307826.txt 0015-MFSA2006-64-CVE-2006-4571-Section-4-5-Part-5-20-337419.txt 0016-MFSA2006-64-CVS-2006-4571-Section-4-5-Part-6-20-337883.txt 0018-MFSA2006-64-CVE-2006-4571-Section-4-5-Part-8a-20-348049.txt 0019-MFSA2006-64-CVE-2006-4571-Section-4-5-Part-8b-20-348049.txt 0020-MFSA2006-64-CVE-2006-4571-Section-4-5-Part-8c-20-348049.txt 0021-MFSA2006-64-CVE-2006-4571-Section-4-5-Part-8d-20-348049.txt 0022-MFSA2006-64-CVE-2006-4571-Section-4-5-Part-9-20-205735.txt 0023-MFSA2006-64-CVE-2006-4571-Section-4-5-Part-12-20-348062.txt 0024-MFSA2006-64-CVE-2006-4571-Section-4-5-Part-17-20-349201.txt 0025-MFSA2006-64-CVE-2006-4571-Section-5-5-344085.txt 0026-GetDepth-without-DEBUG-in-BlockFrame.txt 0028-MFSA2006-64-CVE-2006-4571-Section-4-5-Part-7-20-347355-without-svg-bug.txt stable/main/binary-m68k/mozilla-thunderbird-typeaheadfind_1.0.2-2.sarge1.0.8c.1_m68k.deb stable/main/binary-m68k/mozilla-thunderbird-inspector_1.0.2-2.sarge1.0.8c.1_m68k.deb stable/main/binary-m68k/mozilla-thunderbird_1.0.2-2.sarge1.0.8c.1_m68k.deb stable/main/binary-m68k/mozilla-thunderbird-dev_1.0.2-2.sarge1.0.8c.1_m68k.deb stable/main/binary-m68k/mozilla-thunderbird-offline_1.0.2-2.sarge1.0.8c.1_m68k.deb mozilla-thunderbird (1.0.2-2.sarge1.0.8c.1) stable-security; urgency=critical * various security issues addressed (aka 1.5.0.7 backports): 0001-no-mfsa-CVE-2006-2788-321598.txt 0002-MFSA2006-57-Part-1-2-CVE-2006-4565-346090.txt 0003-MFSA2006-57-Part-2-2-CVE-2006-4566-346794.txt 0004-MFSA2006-60-CVE-2006-4340-CVE-2006-4339-Part-1-3-350640.txt 0005-MFSA2006-60-CVE-2006-4340-CVE-2006-4339-Part-2-3-351079.txt 0006-MFSA2006-60-CVE-2006-4340-CVE-2006-4339-Part-3-3-351848.txt 0007-MFSA2006-61-CVE-2006-4568-343168.txt 0008-MFSA-2006-63-CVE-2006-4570-346984-mail-only.txt 0009-MFSA2006-64-CVE-2006-4571-346980-grant-cellmap-patch.txt 0010-MFSA2006-64-CVE-2006-4571-Section-3-5-Part-1-4-345967.txt 0011-MFSA2006-64-CVE-2006-4571-Section-3-5-Part-3-4-348532.txt 0012-MFSA2006-64-CVE-2006-4571-Section-4-5-Part-1-20-268575.txt 0013-MFSA2006-64-CVE-2006-4571-Section-4-5-Part-2-20-306940.txt 0014-MFSA2006-64-CVE-2006-4571-Section-4-5-Part-3-20-307826.txt 0015-MFSA2006-64-CVE-2006-4571-Section-4-5-Part-5-20-337419.txt 0016-MFSA2006-64-CVS-2006-4571-Section-4-5-Part-6-20-337883.txt 0018-MFSA2006-64-CVE-2006-4571-Section-4-5-Part-8a-20-348049.txt 0019-MFSA2006-64-CVE-2006-4571-Section-4-5-Part-8b-20-348049.txt 0020-MFSA2006-64-CVE-2006-4571-Section-4-5-Part-8c-20-348049.txt 0021-MFSA2006-64-CVE-2006-4571-Section-4-5-Part-8d-20-348049.txt 0022-MFSA2006-64-CVE-2006-4571-Section-4-5-Part-9-20-205735.txt 0023-MFSA2006-64-CVE-2006-4571-Section-4-5-Part-12-20-348062.txt 0024-MFSA2006-64-CVE-2006-4571-Section-4-5-Part-17-20-349201.txt 0025-MFSA2006-64-CVE-2006-4571-Section-5-5-344085.txt 0026-GetDepth-without-DEBUG-in-BlockFrame.txt 0028-MFSA2006-64-CVE-2006-4571-Section-4-5-Part-7-20-347355-without-svg-bug.txt stable/main/binary-ia64/mozilla-thunderbird-offline_1.0.2-2.sarge1.0.8c.1_ia64.deb stable/main/binary-ia64/mozilla-thunderbird-dev_1.0.2-2.sarge1.0.8c.1_ia64.deb stable/main/binary-ia64/mozilla-thunderbird_1.0.2-2.sarge1.0.8c.1_ia64.deb stable/main/binary-ia64/mozilla-thunderbird-typeaheadfind_1.0.2-2.sarge1.0.8c.1_ia64.deb stable/main/binary-ia64/mozilla-thunderbird-inspector_1.0.2-2.sarge1.0.8c.1_ia64.deb mozilla-thunderbird (1.0.2-2.sarge1.0.8c.1) stable-security; urgency=critical * various security issues addressed (aka 1.5.0.7 backports): 0001-no-mfsa-CVE-2006-2788-321598.txt 0002-MFSA2006-57-Part-1-2-CVE-2006-4565-346090.txt 0003-MFSA2006-57-Part-2-2-CVE-2006-4566-346794.txt 0004-MFSA2006-60-CVE-2006-4340-CVE-2006-4339-Part-1-3-350640.txt 0005-MFSA2006-60-CVE-2006-4340-CVE-2006-4339-Part-2-3-351079.txt 0006-MFSA2006-60-CVE-2006-4340-CVE-2006-4339-Part-3-3-351848.txt 0007-MFSA2006-61-CVE-2006-4568-343168.txt 0008-MFSA-2006-63-CVE-2006-4570-346984-mail-only.txt 0009-MFSA2006-64-CVE-2006-4571-346980-grant-cellmap-patch.txt 0010-MFSA2006-64-CVE-2006-4571-Section-3-5-Part-1-4-345967.txt 0011-MFSA2006-64-CVE-2006-4571-Section-3-5-Part-3-4-348532.txt 0012-MFSA2006-64-CVE-2006-4571-Section-4-5-Part-1-20-268575.txt 0013-MFSA2006-64-CVE-2006-4571-Section-4-5-Part-2-20-306940.txt 0014-MFSA2006-64-CVE-2006-4571-Section-4-5-Part-3-20-307826.txt 0015-MFSA2006-64-CVE-2006-4571-Section-4-5-Part-5-20-337419.txt 0016-MFSA2006-64-CVS-2006-4571-Section-4-5-Part-6-20-337883.txt 0018-MFSA2006-64-CVE-2006-4571-Section-4-5-Part-8a-20-348049.txt 0019-MFSA2006-64-CVE-2006-4571-Section-4-5-Part-8b-20-348049.txt 0020-MFSA2006-64-CVE-2006-4571-Section-4-5-Part-8c-20-348049.txt 0021-MFSA2006-64-CVE-2006-4571-Section-4-5-Part-8d-20-348049.txt 0022-MFSA2006-64-CVE-2006-4571-Section-4-5-Part-9-20-205735.txt 0023-MFSA2006-64-CVE-2006-4571-Section-4-5-Part-12-20-348062.txt 0024-MFSA2006-64-CVE-2006-4571-Section-4-5-Part-17-20-349201.txt 0025-MFSA2006-64-CVE-2006-4571-Section-5-5-344085.txt 0026-GetDepth-without-DEBUG-in-BlockFrame.txt 0028-MFSA2006-64-CVE-2006-4571-Section-4-5-Part-7-20-347355-without-svg-bug.txt stable/main/binary-hppa/mozilla-thunderbird-dev_1.0.2-2.sarge1.0.8c.1_hppa.deb stable/main/binary-hppa/mozilla-thunderbird_1.0.2-2.sarge1.0.8c.1_hppa.deb stable/main/binary-hppa/mozilla-thunderbird-offline_1.0.2-2.sarge1.0.8c.1_hppa.deb stable/main/binary-hppa/mozilla-thunderbird-typeaheadfind_1.0.2-2.sarge1.0.8c.1_hppa.deb stable/main/binary-hppa/mozilla-thunderbird-inspector_1.0.2-2.sarge1.0.8c.1_hppa.deb mozilla-thunderbird (1.0.2-2.sarge1.0.8c.1) stable-security; urgency=critical * various security issues addressed (aka 1.5.0.7 backports): 0001-no-mfsa-CVE-2006-2788-321598.txt 0002-MFSA2006-57-Part-1-2-CVE-2006-4565-346090.txt 0003-MFSA2006-57-Part-2-2-CVE-2006-4566-346794.txt 0004-MFSA2006-60-CVE-2006-4340-CVE-2006-4339-Part-1-3-350640.txt 0005-MFSA2006-60-CVE-2006-4340-CVE-2006-4339-Part-2-3-351079.txt 0006-MFSA2006-60-CVE-2006-4340-CVE-2006-4339-Part-3-3-351848.txt 0007-MFSA2006-61-CVE-2006-4568-343168.txt 0008-MFSA-2006-63-CVE-2006-4570-346984-mail-only.txt 0009-MFSA2006-64-CVE-2006-4571-346980-grant-cellmap-patch.txt 0010-MFSA2006-64-CVE-2006-4571-Section-3-5-Part-1-4-345967.txt 0011-MFSA2006-64-CVE-2006-4571-Section-3-5-Part-3-4-348532.txt 0012-MFSA2006-64-CVE-2006-4571-Section-4-5-Part-1-20-268575.txt 0013-MFSA2006-64-CVE-2006-4571-Section-4-5-Part-2-20-306940.txt 0014-MFSA2006-64-CVE-2006-4571-Section-4-5-Part-3-20-307826.txt 0015-MFSA2006-64-CVE-2006-4571-Section-4-5-Part-5-20-337419.txt 0016-MFSA2006-64-CVS-2006-4571-Section-4-5-Part-6-20-337883.txt 0018-MFSA2006-64-CVE-2006-4571-Section-4-5-Part-8a-20-348049.txt 0019-MFSA2006-64-CVE-2006-4571-Section-4-5-Part-8b-20-348049.txt 0020-MFSA2006-64-CVE-2006-4571-Section-4-5-Part-8c-20-348049.txt 0021-MFSA2006-64-CVE-2006-4571-Section-4-5-Part-8d-20-348049.txt 0022-MFSA2006-64-CVE-2006-4571-Section-4-5-Part-9-20-205735.txt 0023-MFSA2006-64-CVE-2006-4571-Section-4-5-Part-12-20-348062.txt 0024-MFSA2006-64-CVE-2006-4571-Section-4-5-Part-17-20-349201.txt 0025-MFSA2006-64-CVE-2006-4571-Section-5-5-344085.txt 0026-GetDepth-without-DEBUG-in-BlockFrame.txt 0028-MFSA2006-64-CVE-2006-4571-Section-4-5-Part-7-20-347355-without-svg-bug.txt stable/main/binary-arm/mozilla-thunderbird_1.0.2-2.sarge1.0.8c.1_arm.deb stable/main/binary-arm/mozilla-thunderbird-typeaheadfind_1.0.2-2.sarge1.0.8c.1_arm.deb stable/main/binary-arm/mozilla-thunderbird-inspector_1.0.2-2.sarge1.0.8c.1_arm.deb stable/main/binary-arm/mozilla-thunderbird-dev_1.0.2-2.sarge1.0.8c.1_arm.deb stable/main/binary-arm/mozilla-thunderbird-offline_1.0.2-2.sarge1.0.8c.1_arm.deb mozilla-thunderbird (1.0.2-2.sarge1.0.8c.1) stable-security; urgency=critical * various security issues addressed (aka 1.5.0.7 backports): 0001-no-mfsa-CVE-2006-2788-321598.txt 0002-MFSA2006-57-Part-1-2-CVE-2006-4565-346090.txt 0003-MFSA2006-57-Part-2-2-CVE-2006-4566-346794.txt 0004-MFSA2006-60-CVE-2006-4340-CVE-2006-4339-Part-1-3-350640.txt 0005-MFSA2006-60-CVE-2006-4340-CVE-2006-4339-Part-2-3-351079.txt 0006-MFSA2006-60-CVE-2006-4340-CVE-2006-4339-Part-3-3-351848.txt 0007-MFSA2006-61-CVE-2006-4568-343168.txt 0008-MFSA-2006-63-CVE-2006-4570-346984-mail-only.txt 0009-MFSA2006-64-CVE-2006-4571-346980-grant-cellmap-patch.txt 0010-MFSA2006-64-CVE-2006-4571-Section-3-5-Part-1-4-345967.txt 0011-MFSA2006-64-CVE-2006-4571-Section-3-5-Part-3-4-348532.txt 0012-MFSA2006-64-CVE-2006-4571-Section-4-5-Part-1-20-268575.txt 0013-MFSA2006-64-CVE-2006-4571-Section-4-5-Part-2-20-306940.txt 0014-MFSA2006-64-CVE-2006-4571-Section-4-5-Part-3-20-307826.txt 0015-MFSA2006-64-CVE-2006-4571-Section-4-5-Part-5-20-337419.txt 0016-MFSA2006-64-CVS-2006-4571-Section-4-5-Part-6-20-337883.txt 0018-MFSA2006-64-CVE-2006-4571-Section-4-5-Part-8a-20-348049.txt 0019-MFSA2006-64-CVE-2006-4571-Section-4-5-Part-8b-20-348049.txt 0020-MFSA2006-64-CVE-2006-4571-Section-4-5-Part-8c-20-348049.txt 0021-MFSA2006-64-CVE-2006-4571-Section-4-5-Part-8d-20-348049.txt 0022-MFSA2006-64-CVE-2006-4571-Section-4-5-Part-9-20-205735.txt 0023-MFSA2006-64-CVE-2006-4571-Section-4-5-Part-12-20-348062.txt 0024-MFSA2006-64-CVE-2006-4571-Section-4-5-Part-17-20-349201.txt 0025-MFSA2006-64-CVE-2006-4571-Section-5-5-344085.txt 0026-GetDepth-without-DEBUG-in-BlockFrame.txt 0028-MFSA2006-64-CVE-2006-4571-Section-4-5-Part-7-20-347355-without-svg-bug.txt stable/main/binary-alpha/mozilla-thunderbird_1.0.2-2.sarge1.0.8c.1_alpha.deb stable/main/binary-alpha/mozilla-thunderbird-typeaheadfind_1.0.2-2.sarge1.0.8c.1_alpha.deb stable/main/binary-alpha/mozilla-thunderbird-dev_1.0.2-2.sarge1.0.8c.1_alpha.deb stable/main/binary-alpha/mozilla-thunderbird-inspector_1.0.2-2.sarge1.0.8c.1_alpha.deb stable/main/binary-alpha/mozilla-thunderbird-offline_1.0.2-2.sarge1.0.8c.1_alpha.deb mozilla-thunderbird (1.0.2-2.sarge1.0.8c.1) stable-security; urgency=critical * various security issues addressed (aka 1.5.0.7 backports): 0001-no-mfsa-CVE-2006-2788-321598.txt 0002-MFSA2006-57-Part-1-2-CVE-2006-4565-346090.txt 0003-MFSA2006-57-Part-2-2-CVE-2006-4566-346794.txt 0004-MFSA2006-60-CVE-2006-4340-CVE-2006-4339-Part-1-3-350640.txt 0005-MFSA2006-60-CVE-2006-4340-CVE-2006-4339-Part-2-3-351079.txt 0006-MFSA2006-60-CVE-2006-4340-CVE-2006-4339-Part-3-3-351848.txt 0007-MFSA2006-61-CVE-2006-4568-343168.txt 0008-MFSA-2006-63-CVE-2006-4570-346984-mail-only.txt 0009-MFSA2006-64-CVE-2006-4571-346980-grant-cellmap-patch.txt 0010-MFSA2006-64-CVE-2006-4571-Section-3-5-Part-1-4-345967.txt 0011-MFSA2006-64-CVE-2006-4571-Section-3-5-Part-3-4-348532.txt 0012-MFSA2006-64-CVE-2006-4571-Section-4-5-Part-1-20-268575.txt 0013-MFSA2006-64-CVE-2006-4571-Section-4-5-Part-2-20-306940.txt 0014-MFSA2006-64-CVE-2006-4571-Section-4-5-Part-3-20-307826.txt 0015-MFSA2006-64-CVE-2006-4571-Section-4-5-Part-5-20-337419.txt 0016-MFSA2006-64-CVS-2006-4571-Section-4-5-Part-6-20-337883.txt 0018-MFSA2006-64-CVE-2006-4571-Section-4-5-Part-8a-20-348049.txt 0019-MFSA2006-64-CVE-2006-4571-Section-4-5-Part-8b-20-348049.txt 0020-MFSA2006-64-CVE-2006-4571-Section-4-5-Part-8c-20-348049.txt 0021-MFSA2006-64-CVE-2006-4571-Section-4-5-Part-8d-20-348049.txt 0022-MFSA2006-64-CVE-2006-4571-Section-4-5-Part-9-20-205735.txt 0023-MFSA2006-64-CVE-2006-4571-Section-4-5-Part-12-20-348062.txt 0024-MFSA2006-64-CVE-2006-4571-Section-4-5-Part-17-20-349201.txt 0025-MFSA2006-64-CVE-2006-4571-Section-5-5-344085.txt 0026-GetDepth-without-DEBUG-in-BlockFrame.txt 0028-MFSA2006-64-CVE-2006-4571-Section-4-5-Part-7-20-347355-without-svg-bug.txt stable/main/source/mozilla-thunderbird_1.0.2-2.sarge1.0.8c.1.diff.gz stable/main/binary-i386/mozilla-thunderbird-dev_1.0.2-2.sarge1.0.8c.1_i386.deb stable/main/binary-i386/mozilla-thunderbird_1.0.2-2.sarge1.0.8c.1_i386.deb stable/main/source/mozilla-thunderbird_1.0.2-2.sarge1.0.8c.1.dsc stable/main/binary-i386/mozilla-thunderbird-offline_1.0.2-2.sarge1.0.8c.1_i386.deb stable/main/binary-i386/mozilla-thunderbird-typeaheadfind_1.0.2-2.sarge1.0.8c.1_i386.deb stable/main/binary-i386/mozilla-thunderbird-inspector_1.0.2-2.sarge1.0.8c.1_i386.deb mozilla-thunderbird (1.0.2-2.sarge1.0.8c.1) stable-security; urgency=critical * various security issues addressed (aka 1.5.0.7 backports): 0001-no-mfsa-CVE-2006-2788-321598.txt 0002-MFSA2006-57-Part-1-2-CVE-2006-4565-346090.txt 0003-MFSA2006-57-Part-2-2-CVE-2006-4566-346794.txt 0004-MFSA2006-60-CVE-2006-4340-CVE-2006-4339-Part-1-3-350640.txt 0005-MFSA2006-60-CVE-2006-4340-CVE-2006-4339-Part-2-3-351079.txt 0006-MFSA2006-60-CVE-2006-4340-CVE-2006-4339-Part-3-3-351848.txt 0007-MFSA2006-61-CVE-2006-4568-343168.txt 0008-MFSA-2006-63-CVE-2006-4570-346984-mail-only.txt 0009-MFSA2006-64-CVE-2006-4571-346980-grant-cellmap-patch.txt 0010-MFSA2006-64-CVE-2006-4571-Section-3-5-Part-1-4-345967.txt 0011-MFSA2006-64-CVE-2006-4571-Section-3-5-Part-3-4-348532.txt 0012-MFSA2006-64-CVE-2006-4571-Section-4-5-Part-1-20-268575.txt 0013-MFSA2006-64-CVE-2006-4571-Section-4-5-Part-2-20-306940.txt 0014-MFSA2006-64-CVE-2006-4571-Section-4-5-Part-3-20-307826.txt 0015-MFSA2006-64-CVE-2006-4571-Section-4-5-Part-5-20-337419.txt 0016-MFSA2006-64-CVS-2006-4571-Section-4-5-Part-6-20-337883.txt 0018-MFSA2006-64-CVE-2006-4571-Section-4-5-Part-8a-20-348049.txt 0019-MFSA2006-64-CVE-2006-4571-Section-4-5-Part-8b-20-348049.txt 0020-MFSA2006-64-CVE-2006-4571-Section-4-5-Part-8c-20-348049.txt 0021-MFSA2006-64-CVE-2006-4571-Section-4-5-Part-8d-20-348049.txt 0022-MFSA2006-64-CVE-2006-4571-Section-4-5-Part-9-20-205735.txt 0023-MFSA2006-64-CVE-2006-4571-Section-4-5-Part-12-20-348062.txt 0024-MFSA2006-64-CVE-2006-4571-Section-4-5-Part-17-20-349201.txt 0025-MFSA2006-64-CVE-2006-4571-Section-5-5-344085.txt 0026-GetDepth-without-DEBUG-in-BlockFrame.txt 0028-MFSA2006-64-CVE-2006-4571-Section-4-5-Part-7-20-347355-without-svg-bug.txt stable/main/source/mindi-kernel_2.4.27-2sarge3.diff.gz stable/main/source/mindi-kernel_2.4.27-2sarge3.dsc stable/main/binary-i386/mindi-kernel_2.4.27-2sarge3_i386.deb mindi-kernel (2.4.27-2sarge3) stable-security; urgency=high * Build against kernel-tree-2.4.27-10sarge4: * [ERRATA] 213_madvise_remove-restrict.diff [SECURITY] The 2.4.27-10sarge3 changelog associated this patch with CVE-2006-1524. However, this patch fixes an mprotect issue that was split off from the original report into CVE-2006-2071. 2.4.27 is not vulnerable to CVE-2006-1524 the madvise_remove issue. See CVE-2006-2071 * 223_nfs-handle-long-symlinks.diff [SECURITY] Fix buffer overflow in NFS readline handling that allows a remote server to cause a denial of service (crash) via a long symlink See CVE-2005-4798 * 224_cdrom-bad-cgc.buflen-assign.diff [SECURITY] Fix buffer overflow in dvd_read_bca which could potentially be used by a local user to trigger a buffer overflow via a specially crafted DVD, USB stick, or similar automatically mounted device. See CVE-2006-2935 * 225_sg-no-mmap-VM_IO.diff [SECURITY] Fix DoS vulnerability whereby a local user could attempt a dio/mmap and cause the sg driver to oops. See CVE-2006-1528 * 226_snmp-nat-mem-corruption-fix.diff [SECURITY] Fix memory corruption in snmp_trap_decode See CVE-2006-2444 * 227_kfree_skb.diff [SECURITY] Fix race between kfree_skb and __skb_unlink See CVE-2006-2446 * 228_sparc-mb-extraneous-semicolons.diff Fix a syntax error caused by extranous semicolons in smp_mb() macros which resulted in a build failure with 227_kfree_skb.diff * 229_sctp-priv-elevation.diff, 230_sctp-priv-elevation-2.diff [SECURITY] Fix SCTP privelege escalation See CVE-2006-3745 * 231_udf-deadlock.diff [SECURITY] Fix possible UDF deadlock and memory corruption See CVE-2006-4145 * 232_sparc-membar-extraneous-semicolons.diff Fix an additional syntax error caused by extraneous semicolons in membar macros on sparc stable/main/source/kernel-source-2.6.8_2.6.8-16sarge5.diff.gz stable/main/binary-all/kernel-doc-2.6.8_2.6.8-16sarge5_all.deb stable/main/binary-all/kernel-source-2.6.8_2.6.8-16sarge5_all.deb stable/main/source/kernel-source-2.6.8_2.6.8-16sarge5.dsc stable/main/binary-all/kernel-patch-debian-2.6.8_2.6.8-16sarge5_all.deb stable/main/binary-all/kernel-tree-2.6.8_2.6.8-16sarge5_all.deb kernel-source-2.6.8 (2.6.8-16sarge5) stable-security; urgency=high * [ERRATA] madvise_remove-restrict.dpatch [SECURITY] The 2.6.8-16sarge3 changelog associated this patch with CVE-2006-1524. However, this patch fixes an mprotect issue that was split off from the original report into CVE-2006-2071. 2.6.8 is not vulnerable to CVE-2006-1524 the madvise_remove issue. See CVE-2006-2071 * fs-ext3-bad-nfs-handle.dpatch [SECURITY] James McKenzie discovered a Denial of Service vulnerability in the NFS driver. When exporting an ext3 file system over NFS, a remote attacker could exploit this to trigger a file system panic by sending a specially crafted UDP packet. See CVE-2006-3468 * direct-io-write-mem-leak.dpatch [SECURITY] Fix memory leak in O_DIRECT write. See CVE-2004-2660 * nfs-handle-long-symlinks.dpatch [SECURITY] Fix buffer overflow in NFS readline handling that allows a remote server to cause a denial of service (crash) via a long symlink See CVE-2005-4798 * cdrom-bad-cgc.buflen-assign.dpatch [SECURITY] Fix buffer overflow in dvd_read_bca which could potentially be used by a local user to trigger a buffer overflow via a specially crafted DVD, USB stick, or similar automatically mounted device. See CVE-2006-2935 * usb-serial-ftdi_sio-dos.patch [SECURITY] fix userspace DoS in ftdi_sio driver See CVE-2006-2936 * selinux-tracer-SID-fix.dpatch [SECURITY] Fix vulnerability in selinux_ptrace that prevents local users from changing the tracer SID to the SID of another process See CVE-2006-1052 * netfilter-SO_ORIGINAL_DST-leak.dpatch [SECURITY] Fix information leak in SO_ORIGINAL_DST See CVE-2006-1343 * sg-no-mmap-VM_IO.dpatch [SECURITY] Fix DoS vulnerability whereby a local user could attempt a dio/mmap and cause the sg driver to oops. See CVE-2006-1528 * exit-bogus-bugon.dpatch [SECURITY] Remove bogus BUG() in exit.c which could be maliciously triggered by a local user See CVE-2006-1855 * readv-writev-missing-lsm-check.dpatch, readv-writev-missing-lsm-check-compat.dpatch [SECURITY] Add missing file_permission callback in readv/writev syscalls See CVE-2006-1856 * snmp-nat-mem-corruption-fix.dpatch [SECURITY] Fix memory corruption in snmp_trap_decode See CVE-2006-2444 * kfree_skb-race.dpatch [SECURITY] Fix race between kfree_skb and __skb_unlink See CVE-2006-2446 * hppa-mb-extraneous-semicolon.dpatch, sparc32-mb-extraneous-semicolons.dpatch, sparc64-mb-extraneous-semicolons.dpatch: Fix a syntax error caused by extranous semicolons in smp_mb() macros which resulted in a build failure with kfree_skb-race.dpatch * sctp-priv-elevation.dpatch [SECURITY] Fix SCTP privelege escalation See CVE-2006-3745 * sctp-priv-elevation-2.dpatch [SECURITY] Fix local DoS resulting from sctp-priv-elevation.dpatch See CVE-2006-4535 * ppc-hid0-dos.dpatch [SECURITY][ppc] Fix local DoS by clearing HID0 attention enable on PPC970 at boot time See CVE-2006-4093 * udf-deadlock.dpatch [SECURITY] Fix possible UDF deadlock and memory corruption See CVE-2006-4145 stable/main/source/kernel-source-2.4.27_2.4.27-10sarge4.dsc stable/main/source/kernel-source-2.4.27_2.4.27-10sarge4.diff.gz stable/main/binary-all/kernel-doc-2.4.27_2.4.27-10sarge4_all.deb stable/main/binary-all/kernel-patch-debian-2.4.27_2.4.27-10sarge4_all.deb stable/main/binary-all/kernel-source-2.4.27_2.4.27-10sarge4_all.deb stable/main/binary-all/kernel-tree-2.4.27_2.4.27-10sarge4_all.deb kernel-source-2.4.27 (2.4.27-10sarge4) stable-security; urgency=high * [ERRATA] 213_madvise_remove-restrict.diff [SECURITY] The 2.4.27-10sarge3 changelog associated this patch with CVE-2006-1524. However, this patch fixes an mprotect issue that was split off from the original report into CVE-2006-2071. 2.4.27 is not vulnerable to CVE-2006-1524 the madvise_remove issue. See CVE-2006-2071 * 223_nfs-handle-long-symlinks.diff [SECURITY] Fix buffer overflow in NFS readline handling that allows a remote server to cause a denial of service (crash) via a long symlink See CVE-2005-4798 * 224_cdrom-bad-cgc.buflen-assign.diff [SECURITY] Fix buffer overflow in dvd_read_bca which could potentially be used by a local user to trigger a buffer overflow via a specially crafted DVD, USB stick, or similar automatically mounted device. See CVE-2006-2935 * 225_sg-no-mmap-VM_IO.diff [SECURITY] Fix DoS vulnerability whereby a local user could attempt a dio/mmap and cause the sg driver to oops. See CVE-2006-1528 * 226_snmp-nat-mem-corruption-fix.diff [SECURITY] Fix memory corruption in snmp_trap_decode See CVE-2006-2444 * 227_kfree_skb.diff [SECURITY] Fix race between kfree_skb and __skb_unlink See CVE-2006-2446 * 228_sparc-mb-extraneous-semicolons.diff Fix a syntax error caused by extranous semicolons in smp_mb() macros which resulted in a build failure with 227_kfree_skb.diff * 229_sctp-priv-elevation.diff, 230_sctp-priv-elevation-2.diff [SECURITY] Fix SCTP privelege escalation See CVE-2006-3745 * 231_udf-deadlock.diff [SECURITY] Fix possible UDF deadlock and memory corruption See CVE-2006-4145 * 232_sparc-membar-extraneous-semicolons.diff Fix an additional syntax error caused by extraneous semicolons in membar macros on sparc stable/main/binary-powerpc/kernel-build-2.6.8-3-powerpc-smp_2.6.8-12sarge5_powerpc.deb stable/main/binary-powerpc/kernel-image-2.6.8-3-power4_2.6.8-12sarge5_powerpc.deb stable/main/source/kernel-patch-powerpc-2.6.8_2.6.8-12sarge5.tar.gz stable/main/binary-powerpc/kernel-build-2.6.8-3-power4_2.6.8-12sarge5_powerpc.deb stable/main/binary-powerpc/kernel-image-2.6.8-3-power3-smp_2.6.8-12sarge5_powerpc.deb stable/main/binary-powerpc/kernel-image-2.6.8-3-powerpc-smp_2.6.8-12sarge5_powerpc.deb stable/main/binary-powerpc/kernel-image-2.6.8-3-powerpc_2.6.8-12sarge5_powerpc.deb stable/main/binary-powerpc/kernel-image-2.6.8-3-power3_2.6.8-12sarge5_powerpc.deb stable/main/binary-powerpc/kernel-build-2.6.8-3-power3_2.6.8-12sarge5_powerpc.deb stable/main/source/kernel-patch-powerpc-2.6.8_2.6.8-12sarge5.dsc stable/main/binary-powerpc/kernel-build-2.6.8-3-powerpc_2.6.8-12sarge5_powerpc.deb stable/main/binary-powerpc/kernel-headers-2.6.8-3_2.6.8-12sarge5_powerpc.deb stable/main/binary-powerpc/kernel-image-2.6.8-3-power4-smp_2.6.8-12sarge5_powerpc.deb stable/main/binary-powerpc/kernel-build-2.6.8-3-power4-smp_2.6.8-12sarge5_powerpc.deb stable/main/binary-powerpc/kernel-build-2.6.8-3-power3-smp_2.6.8-12sarge5_powerpc.deb kernel-patch-powerpc-2.6.8 (2.6.8-12sarge5) stable-security; urgency=high * Build against kernel-tree-2.6.8-16sarge5: * [ERRATA] madvise_remove-restrict.dpatch [SECURITY] The 2.6.8-16sarge3 changelog associated this patch with CVE-2006-1524. However, this patch fixes an mprotect issue that was split off from the original report into CVE-2006-2071. 2.6.8 is not vulnerable to CVE-2006-1524 the madvise_remove issue. See CVE-2006-2071 * fs-ext3-bad-nfs-handle.dpatch [SECURITY] James McKenzie discovered a Denial of Service vulnerability in the NFS driver. When exporting an ext3 file system over NFS, a remote attacker could exploit this to trigger a file system panic by sending a specially crafted UDP packet. See CVE-2006-3468 * direct-io-write-mem-leak.dpatch [SECURITY] Fix memory leak in O_DIRECT write. See CVE-2004-2660 * nfs-handle-long-symlinks.dpatch [SECURITY] Fix buffer overflow in NFS readline handling that allows a remote server to cause a denial of service (crash) via a long symlink See CVE-2005-4798 * cdrom-bad-cgc.buflen-assign.dpatch [SECURITY] Fix buffer overflow in dvd_read_bca which could potentially be used by a local user to trigger a buffer overflow via a specially crafted DVD, USB stick, or similar automatically mounted device. See CVE-2006-2935 * usb-serial-ftdi_sio-dos.patch [SECURITY] fix userspace DoS in ftdi_sio driver See CVE-2006-2936 * selinux-tracer-SID-fix.dpatch [SECURITY] Fix vulnerability in selinux_ptrace that prevents local users from changing the tracer SID to the SID of another process See CVE-2006-1052 * netfilter-SO_ORIGINAL_DST-leak.dpatch [SECURITY] Fix information leak in SO_ORIGINAL_DST See CVE-2006-1343 * sg-no-mmap-VM_IO.dpatch [SECURITY] Fix DoS vulnerability whereby a local user could attempt a dio/mmap and cause the sg driver to oops. See CVE-2006-1528 * exit-bogus-bugon.dpatch [SECURITY] Remove bogus BUG() in exit.c which could be maliciously triggered by a local user See CVE-2006-1855 * readv-writev-missing-lsm-check.dpatch, readv-writev-missing-lsm-check-compat.dpatch [SECURITY] Add missing file_permission callback in readv/writev syscalls See CVE-2006-1856 * snmp-nat-mem-corruption-fix.dpatch [SECURITY] Fix memory corruption in snmp_trap_decode See CVE-2006-2444 * kfree_skb-race.dpatch [SECURITY] Fix race between kfree_skb and __skb_unlink See CVE-2006-2446 * hppa-mb-extraneous-semicolon.dpatch, sparc32-mb-extraneous-semicolons.dpatch, sparc64-mb-extraneous-semicolons.dpatch: Fix a syntax error caused by extranous semicolons in smp_mb() macros which resulted in a build failure with kfree_skb-race.dpatch * sctp-priv-elevation.dpatch [SECURITY] Fix SCTP privelege escalation See CVE-2006-3745 * sctp-priv-elevation-2.dpatch [SECURITY] Fix local DoS resulting from sctp-priv-elevation.dpatch See CVE-2006-4535 * ppc-hid0-dos.dpatch [SECURITY][ppc] Fix local DoS by clearing HID0 attention enable on PPC970 at boot time See CVE-2006-4093 * udf-deadlock.dpatch [SECURITY] Fix possible UDF deadlock and memory corruption See CVE-2006-4145 stable/main/binary-powerpc/kernel-image-2.4.27-powerpc_2.4.27-10sarge4_powerpc.deb stable/main/binary-powerpc/kernel-image-2.4.27-nubus_2.4.27-10sarge4_powerpc.deb stable/main/binary-powerpc/kernel-build-2.4.27-nubus_2.4.27-10sarge4_powerpc.deb stable/main/binary-powerpc/kernel-headers-2.4.27-powerpc_2.4.27-10sarge4_powerpc.deb stable/main/binary-powerpc/kernel-patch-2.4.27-powerpc_2.4.27-10sarge4_powerpc.deb stable/main/source/kernel-patch-powerpc-2.4.27_2.4.27-10sarge4.tar.gz stable/main/binary-powerpc/kernel-build-2.4.27-powerpc-small_2.4.27-10sarge4_powerpc.deb stable/main/binary-powerpc/kernel-patch-2.4.27-nubus_2.4.27-10sarge4_powerpc.deb stable/main/binary-powerpc/kernel-headers-2.4.27-nubus_2.4.27-10sarge4_powerpc.deb stable/main/binary-powerpc/kernel-build-2.4.27-apus_2.4.27-10sarge4_powerpc.deb stable/main/binary-powerpc/kernel-image-2.4.27-powerpc-smp_2.4.27-10sarge4_powerpc.deb stable/main/binary-powerpc/kernel-headers-2.4.27-apus_2.4.27-10sarge4_powerpc.deb stable/main/binary-powerpc/kernel-build-2.4.27-powerpc-smp_2.4.27-10sarge4_powerpc.deb stable/main/binary-powerpc/kernel-image-2.4.27-powerpc-small_2.4.27-10sarge4_powerpc.deb stable/main/binary-powerpc/kernel-image-2.4.27-apus_2.4.27-10sarge4_powerpc.deb stable/main/source/kernel-patch-powerpc-2.4.27_2.4.27-10sarge4.dsc stable/main/binary-powerpc/kernel-patch-2.4.27-apus_2.4.27-10sarge4_powerpc.deb stable/main/binary-powerpc/kernel-build-2.4.27-powerpc_2.4.27-10sarge4_powerpc.deb kernel-patch-powerpc-2.4.27 (2.4.27-10sarge4) stable-security; urgency=high * Build against kernel-tree-2.4.27-10sarge4: * [ERRATA] 213_madvise_remove-restrict.diff [SECURITY] The 2.4.27-10sarge3 changelog associated this patch with CVE-2006-1524. However, this patch fixes an mprotect issue that was split off from the original report into CVE-2006-2071. 2.4.27 is not vulnerable to CVE-2006-1524 the madvise_remove issue. See CVE-2006-2071 * 223_nfs-handle-long-symlinks.diff [SECURITY] Fix buffer overflow in NFS readline handling that allows a remote server to cause a denial of service (crash) via a long symlink See CVE-2005-4798 * 224_cdrom-bad-cgc.buflen-assign.diff [SECURITY] Fix buffer overflow in dvd_read_bca which could potentially be used by a local user to trigger a buffer overflow via a specially crafted DVD, USB stick, or similar automatically mounted device. See CVE-2006-2935 * 225_sg-no-mmap-VM_IO.diff [SECURITY] Fix DoS vulnerability whereby a local user could attempt a dio/mmap and cause the sg driver to oops. See CVE-2006-1528 * 226_snmp-nat-mem-corruption-fix.diff [SECURITY] Fix memory corruption in snmp_trap_decode See CVE-2006-2444 * 227_kfree_skb.diff [SECURITY] Fix race between kfree_skb and __skb_unlink See CVE-2006-2446 * 228_sparc-mb-extraneous-semicolons.diff Fix a syntax error caused by extranous semicolons in smp_mb() macros which resulted in a build failure with 227_kfree_skb.diff * 229_sctp-priv-elevation.diff, 230_sctp-priv-elevation-2.diff [SECURITY] Fix SCTP privelege escalation See CVE-2006-3745 * 231_udf-deadlock.diff [SECURITY] Fix possible UDF deadlock and memory corruption See CVE-2006-4145 * 232_sparc-membar-extraneous-semicolons.diff Fix an additional syntax error caused by extraneous semicolons in membar macros on sparc stable/main/source/kernel-patch-2.4.27-s390_2.4.27-2sarge1.dsc stable/main/binary-all/kernel-patch-2.4.27-s390_2.4.27-2sarge1_all.deb stable/main/source/kernel-patch-2.4.27-s390_2.4.27-2sarge1.diff.gz kernel-patch-2.4.27-s390 (2.4.27-2sarge1) stable-security; urgency=high * Non-maintainer upload by the Security Team * Use kernel-tree-2.4.27-10sarge2 * Regenerate linux-2.4.27-s390.diff to apply to updated source tree * Build fix for 206_s390-sacf-fix.diff (CAN-2004-0887) from new kernel-tree. stable/main/binary-sparc/mips-tools_2.4.27-10.sarge4.040815-1_sparc.deb kernel-patch-2.4.27-mips (2.4.27-10.sarge4.040815-1) stable-security; urgency=high * Build against kernel-tree-2.4.27-10sarge4: * [ERRATA] 213_madvise_remove-restrict.diff [SECURITY] The 2.4.27-10sarge3 changelog associated this patch with CVE-2006-1524. However, this patch fixes an mprotect issue that was split off from the original report into CVE-2006-2071. 2.4.27 is not vulnerable to CVE-2006-1524 the madvise_remove issue. See CVE-2006-2071 * 223_nfs-handle-long-symlinks.diff [SECURITY] Fix buffer overflow in NFS readline handling that allows a remote server to cause a denial of service (crash) via a long symlink See CVE-2005-4798 * 224_cdrom-bad-cgc.buflen-assign.diff [SECURITY] Fix buffer overflow in dvd_read_bca which could potentially be used by a local user to trigger a buffer overflow via a specially crafted DVD, USB stick, or similar automatically mounted device. See CVE-2006-2935 * 225_sg-no-mmap-VM_IO.diff [SECURITY] Fix DoS vulnerability whereby a local user could attempt a dio/mmap and cause the sg driver to oops. See CVE-2006-1528 * 226_snmp-nat-mem-corruption-fix.diff [SECURITY] Fix memory corruption in snmp_trap_decode See CVE-2006-2444 * 227_kfree_skb.diff [SECURITY] Fix race between kfree_skb and __skb_unlink See CVE-2006-2446 * 228_sparc-mb-extraneous-semicolons.diff Fix a syntax error caused by extranous semicolons in smp_mb() macros which resulted in a build failure with 227_kfree_skb.diff * 229_sctp-priv-elevation.diff, 230_sctp-priv-elevation-2.diff [SECURITY] Fix SCTP privelege escalation See CVE-2006-3745 * 231_udf-deadlock.diff [SECURITY] Fix possible UDF deadlock and memory corruption See CVE-2006-4145 * 232_sparc-membar-extraneous-semicolons.diff Fix an additional syntax error caused by extraneous semicolons in membar macros on sparc stable/main/binary-s390/mips-tools_2.4.27-10.sarge4.040815-1_s390.deb kernel-patch-2.4.27-mips (2.4.27-10.sarge4.040815-1) stable-security; urgency=high * Build against kernel-tree-2.4.27-10sarge4: * [ERRATA] 213_madvise_remove-restrict.diff [SECURITY] The 2.4.27-10sarge3 changelog associated this patch with CVE-2006-1524. However, this patch fixes an mprotect issue that was split off from the original report into CVE-2006-2071. 2.4.27 is not vulnerable to CVE-2006-1524 the madvise_remove issue. See CVE-2006-2071 * 223_nfs-handle-long-symlinks.diff [SECURITY] Fix buffer overflow in NFS readline handling that allows a remote server to cause a denial of service (crash) via a long symlink See CVE-2005-4798 * 224_cdrom-bad-cgc.buflen-assign.diff [SECURITY] Fix buffer overflow in dvd_read_bca which could potentially be used by a local user to trigger a buffer overflow via a specially crafted DVD, USB stick, or similar automatically mounted device. See CVE-2006-2935 * 225_sg-no-mmap-VM_IO.diff [SECURITY] Fix DoS vulnerability whereby a local user could attempt a dio/mmap and cause the sg driver to oops. See CVE-2006-1528 * 226_snmp-nat-mem-corruption-fix.diff [SECURITY] Fix memory corruption in snmp_trap_decode See CVE-2006-2444 * 227_kfree_skb.diff [SECURITY] Fix race between kfree_skb and __skb_unlink See CVE-2006-2446 * 228_sparc-mb-extraneous-semicolons.diff Fix a syntax error caused by extranous semicolons in smp_mb() macros which resulted in a build failure with 227_kfree_skb.diff * 229_sctp-priv-elevation.diff, 230_sctp-priv-elevation-2.diff [SECURITY] Fix SCTP privelege escalation See CVE-2006-3745 * 231_udf-deadlock.diff [SECURITY] Fix possible UDF deadlock and memory corruption See CVE-2006-4145 * 232_sparc-membar-extraneous-semicolons.diff Fix an additional syntax error caused by extraneous semicolons in membar macros on sparc stable/main/binary-powerpc/mips-tools_2.4.27-10.sarge4.040815-1_powerpc.deb kernel-patch-2.4.27-mips (2.4.27-10.sarge4.040815-1) stable-security; urgency=high * Build against kernel-tree-2.4.27-10sarge4: * [ERRATA] 213_madvise_remove-restrict.diff [SECURITY] The 2.4.27-10sarge3 changelog associated this patch with CVE-2006-1524. However, this patch fixes an mprotect issue that was split off from the original report into CVE-2006-2071. 2.4.27 is not vulnerable to CVE-2006-1524 the madvise_remove issue. See CVE-2006-2071 * 223_nfs-handle-long-symlinks.diff [SECURITY] Fix buffer overflow in NFS readline handling that allows a remote server to cause a denial of service (crash) via a long symlink See CVE-2005-4798 * 224_cdrom-bad-cgc.buflen-assign.diff [SECURITY] Fix buffer overflow in dvd_read_bca which could potentially be used by a local user to trigger a buffer overflow via a specially crafted DVD, USB stick, or similar automatically mounted device. See CVE-2006-2935 * 225_sg-no-mmap-VM_IO.diff [SECURITY] Fix DoS vulnerability whereby a local user could attempt a dio/mmap and cause the sg driver to oops. See CVE-2006-1528 * 226_snmp-nat-mem-corruption-fix.diff [SECURITY] Fix memory corruption in snmp_trap_decode See CVE-2006-2444 * 227_kfree_skb.diff [SECURITY] Fix race between kfree_skb and __skb_unlink See CVE-2006-2446 * 228_sparc-mb-extraneous-semicolons.diff Fix a syntax error caused by extranous semicolons in smp_mb() macros which resulted in a build failure with 227_kfree_skb.diff * 229_sctp-priv-elevation.diff, 230_sctp-priv-elevation-2.diff [SECURITY] Fix SCTP privelege escalation See CVE-2006-3745 * 231_udf-deadlock.diff [SECURITY] Fix possible UDF deadlock and memory corruption See CVE-2006-4145 * 232_sparc-membar-extraneous-semicolons.diff Fix an additional syntax error caused by extraneous semicolons in membar macros on sparc stable/main/binary-mipsel/kernel-image-2.4.27-xxs1500_2.4.27-10.sarge4.040815-1_mipsel.deb stable/main/binary-mipsel/kernel-image-2.4.27-r5k-lasat_2.4.27-10.sarge4.040815-1_mipsel.deb stable/main/binary-mipsel/kernel-image-2.4.27-r5k-cobalt_2.4.27-10.sarge4.040815-1_mipsel.deb stable/main/binary-mipsel/kernel-image-2.4.27-r4k-kn04_2.4.27-10.sarge4.040815-1_mipsel.deb stable/main/binary-mipsel/mips-tools_2.4.27-10.sarge4.040815-1_mipsel.deb stable/main/binary-mipsel/kernel-headers-2.4.27_2.4.27-10.sarge4.040815-1_mipsel.deb stable/main/binary-mipsel/kernel-image-2.4.27-r3k-kn02_2.4.27-10.sarge4.040815-1_mipsel.deb stable/main/binary-mipsel/kernel-image-2.4.27-sb1-swarm-bn_2.4.27-10.sarge4.040815-1_mipsel.deb kernel-patch-2.4.27-mips (2.4.27-10.sarge4.040815-1) stable-security; urgency=high * Build against kernel-tree-2.4.27-10sarge4: * [ERRATA] 213_madvise_remove-restrict.diff [SECURITY] The 2.4.27-10sarge3 changelog associated this patch with CVE-2006-1524. However, this patch fixes an mprotect issue that was split off from the original report into CVE-2006-2071. 2.4.27 is not vulnerable to CVE-2006-1524 the madvise_remove issue. See CVE-2006-2071 * 223_nfs-handle-long-symlinks.diff [SECURITY] Fix buffer overflow in NFS readline handling that allows a remote server to cause a denial of service (crash) via a long symlink See CVE-2005-4798 * 224_cdrom-bad-cgc.buflen-assign.diff [SECURITY] Fix buffer overflow in dvd_read_bca which could potentially be used by a local user to trigger a buffer overflow via a specially crafted DVD, USB stick, or similar automatically mounted device. See CVE-2006-2935 * 225_sg-no-mmap-VM_IO.diff [SECURITY] Fix DoS vulnerability whereby a local user could attempt a dio/mmap and cause the sg driver to oops. See CVE-2006-1528 * 226_snmp-nat-mem-corruption-fix.diff [SECURITY] Fix memory corruption in snmp_trap_decode See CVE-2006-2444 * 227_kfree_skb.diff [SECURITY] Fix race between kfree_skb and __skb_unlink See CVE-2006-2446 * 228_sparc-mb-extraneous-semicolons.diff Fix a syntax error caused by extranous semicolons in smp_mb() macros which resulted in a build failure with 227_kfree_skb.diff * 229_sctp-priv-elevation.diff, 230_sctp-priv-elevation-2.diff [SECURITY] Fix SCTP privelege escalation See CVE-2006-3745 * 231_udf-deadlock.diff [SECURITY] Fix possible UDF deadlock and memory corruption See CVE-2006-4145 * 232_sparc-membar-extraneous-semicolons.diff Fix an additional syntax error caused by extraneous semicolons in membar macros on sparc stable/main/binary-mips/mips-tools_2.4.27-10.sarge4.040815-1_mips.deb stable/main/binary-mips/kernel-image-2.4.27-sb1-swarm-bn_2.4.27-10.sarge4.040815-1_mips.deb stable/main/binary-mips/kernel-image-2.4.27-r4k-ip22_2.4.27-10.sarge4.040815-1_mips.deb stable/main/binary-mips/kernel-image-2.4.27-r5k-ip22_2.4.27-10.sarge4.040815-1_mips.deb stable/main/binary-mips/kernel-headers-2.4.27_2.4.27-10.sarge4.040815-1_mips.deb kernel-patch-2.4.27-mips (2.4.27-10.sarge4.040815-1) stable-security; urgency=high * Build against kernel-tree-2.4.27-10sarge4: * [ERRATA] 213_madvise_remove-restrict.diff [SECURITY] The 2.4.27-10sarge3 changelog associated this patch with CVE-2006-1524. However, this patch fixes an mprotect issue that was split off from the original report into CVE-2006-2071. 2.4.27 is not vulnerable to CVE-2006-1524 the madvise_remove issue. See CVE-2006-2071 * 223_nfs-handle-long-symlinks.diff [SECURITY] Fix buffer overflow in NFS readline handling that allows a remote server to cause a denial of service (crash) via a long symlink See CVE-2005-4798 * 224_cdrom-bad-cgc.buflen-assign.diff [SECURITY] Fix buffer overflow in dvd_read_bca which could potentially be used by a local user to trigger a buffer overflow via a specially crafted DVD, USB stick, or similar automatically mounted device. See CVE-2006-2935 * 225_sg-no-mmap-VM_IO.diff [SECURITY] Fix DoS vulnerability whereby a local user could attempt a dio/mmap and cause the sg driver to oops. See CVE-2006-1528 * 226_snmp-nat-mem-corruption-fix.diff [SECURITY] Fix memory corruption in snmp_trap_decode See CVE-2006-2444 * 227_kfree_skb.diff [SECURITY] Fix race between kfree_skb and __skb_unlink See CVE-2006-2446 * 228_sparc-mb-extraneous-semicolons.diff Fix a syntax error caused by extranous semicolons in smp_mb() macros which resulted in a build failure with 227_kfree_skb.diff * 229_sctp-priv-elevation.diff, 230_sctp-priv-elevation-2.diff [SECURITY] Fix SCTP privelege escalation See CVE-2006-3745 * 231_udf-deadlock.diff [SECURITY] Fix possible UDF deadlock and memory corruption See CVE-2006-4145 * 232_sparc-membar-extraneous-semicolons.diff Fix an additional syntax error caused by extraneous semicolons in membar macros on sparc stable/main/binary-sparc/libdevmapper1.01_1.01.00-4sarge1_sparc.deb stable/main/binary-sparc/libdevmapper1.01-udeb_1.01.00-4sarge1_sparc.udeb stable/main/binary-sparc/dmsetup_1.01.00-4sarge1_sparc.deb stable/main/binary-sparc/dmsetup-udeb_1.01.00-4sarge1_sparc.udeb stable/main/binary-sparc/libdevmapper-dev_1.01.00-4sarge1_sparc.deb devmapper (2:1.01.00-4sarge1) stable; urgency=low * Non-maintainer upload. * LVM devices are created with root:disk ownership and 0660 permissions, which are used by all other disk block devices. This allows backups of LVM logical volumes with tools such as amanda, which run as user backup, a member of the disk group. stable/main/binary-s390/dmsetup_1.01.00-4sarge1_s390.deb stable/main/binary-s390/dmsetup-udeb_1.01.00-4sarge1_s390.udeb stable/main/binary-s390/libdevmapper1.01_1.01.00-4sarge1_s390.deb stable/main/binary-s390/libdevmapper-dev_1.01.00-4sarge1_s390.deb stable/main/binary-s390/libdevmapper1.01-udeb_1.01.00-4sarge1_s390.udeb devmapper (2:1.01.00-4sarge1) stable; urgency=low * Non-maintainer upload. * LVM devices are created with root:disk ownership and 0660 permissions, which are used by all other disk block devices. This allows backups of LVM logical volumes with tools such as amanda, which run as user backup, a member of the disk group. stable/main/binary-mipsel/libdevmapper-dev_1.01.00-4sarge1_mipsel.deb stable/main/binary-mipsel/dmsetup_1.01.00-4sarge1_mipsel.deb stable/main/binary-mipsel/libdevmapper1.01-udeb_1.01.00-4sarge1_mipsel.udeb stable/main/binary-mipsel/libdevmapper1.01_1.01.00-4sarge1_mipsel.deb stable/main/binary-mipsel/dmsetup-udeb_1.01.00-4sarge1_mipsel.udeb devmapper (2:1.01.00-4sarge1) stable; urgency=low * Non-maintainer upload. * LVM devices are created with root:disk ownership and 0660 permissions, which are used by all other disk block devices. This allows backups of LVM logical volumes with tools such as amanda, which run as user backup, a member of the disk group. stable/main/binary-mips/libdevmapper-dev_1.01.00-4sarge1_mips.deb stable/main/binary-mips/dmsetup-udeb_1.01.00-4sarge1_mips.udeb stable/main/binary-mips/libdevmapper1.01_1.01.00-4sarge1_mips.deb stable/main/binary-mips/dmsetup_1.01.00-4sarge1_mips.deb stable/main/binary-mips/libdevmapper1.01-udeb_1.01.00-4sarge1_mips.udeb devmapper (2:1.01.00-4sarge1) stable; urgency=low * Non-maintainer upload. * LVM devices are created with root:disk ownership and 0660 permissions, which are used by all other disk block devices. This allows backups of LVM logical volumes with tools such as amanda, which run as user backup, a member of the disk group. stable/main/binary-m68k/libdevmapper1.01_1.01.00-4sarge1_m68k.deb stable/main/binary-m68k/dmsetup-udeb_1.01.00-4sarge1_m68k.udeb stable/main/binary-m68k/libdevmapper-dev_1.01.00-4sarge1_m68k.deb stable/main/binary-m68k/libdevmapper1.01-udeb_1.01.00-4sarge1_m68k.udeb stable/main/binary-m68k/dmsetup_1.01.00-4sarge1_m68k.deb devmapper (2:1.01.00-4sarge1) stable; urgency=low * Non-maintainer upload. * LVM devices are created with root:disk ownership and 0660 permissions, which are used by all other disk block devices. This allows backups of LVM logical volumes with tools such as amanda, which run as user backup, a member of the disk group. stable/main/binary-ia64/dmsetup_1.01.00-4sarge1_ia64.deb stable/main/binary-ia64/dmsetup-udeb_1.01.00-4sarge1_ia64.udeb stable/main/binary-ia64/libdevmapper-dev_1.01.00-4sarge1_ia64.deb stable/main/binary-ia64/libdevmapper1.01-udeb_1.01.00-4sarge1_ia64.udeb stable/main/binary-ia64/libdevmapper1.01_1.01.00-4sarge1_ia64.deb devmapper (2:1.01.00-4sarge1) stable; urgency=low * Non-maintainer upload. * LVM devices are created with root:disk ownership and 0660 permissions, which are used by all other disk block devices. This allows backups of LVM logical volumes with tools such as amanda, which run as user backup, a member of the disk group. stable/main/binary-i386/dmsetup-udeb_1.01.00-4sarge1_i386.udeb stable/main/binary-i386/dmsetup_1.01.00-4sarge1_i386.deb stable/main/binary-i386/libdevmapper1.01-udeb_1.01.00-4sarge1_i386.udeb stable/main/binary-i386/libdevmapper1.01_1.01.00-4sarge1_i386.deb stable/main/binary-i386/libdevmapper-dev_1.01.00-4sarge1_i386.deb devmapper (2:1.01.00-4sarge1) stable; urgency=low * Non-maintainer upload. * LVM devices are created with root:disk ownership and 0660 permissions, which are used by all other disk block devices. This allows backups of LVM logical volumes with tools such as amanda, which run as user backup, a member of the disk group. stable/main/binary-hppa/dmsetup_1.01.00-4sarge1_hppa.deb stable/main/binary-hppa/libdevmapper1.01_1.01.00-4sarge1_hppa.deb stable/main/binary-hppa/libdevmapper-dev_1.01.00-4sarge1_hppa.deb stable/main/binary-hppa/libdevmapper1.01-udeb_1.01.00-4sarge1_hppa.udeb stable/main/binary-hppa/dmsetup-udeb_1.01.00-4sarge1_hppa.udeb devmapper (2:1.01.00-4sarge1) stable; urgency=low * Non-maintainer upload. * LVM devices are created with root:disk ownership and 0660 permissions, which are used by all other disk block devices. This allows backups of LVM logical volumes with tools such as amanda, which run as user backup, a member of the disk group. stable/main/binary-arm/dmsetup-udeb_1.01.00-4sarge1_arm.udeb stable/main/binary-arm/dmsetup_1.01.00-4sarge1_arm.deb stable/main/binary-arm/libdevmapper1.01_1.01.00-4sarge1_arm.deb stable/main/binary-arm/libdevmapper-dev_1.01.00-4sarge1_arm.deb stable/main/binary-arm/libdevmapper1.01-udeb_1.01.00-4sarge1_arm.udeb devmapper (2:1.01.00-4sarge1) stable; urgency=low * Non-maintainer upload. * LVM devices are created with root:disk ownership and 0660 permissions, which are used by all other disk block devices. This allows backups of LVM logical volumes with tools such as amanda, which run as user backup, a member of the disk group. stable/main/binary-alpha/dmsetup_1.01.00-4sarge1_alpha.deb stable/main/binary-alpha/libdevmapper1.01_1.01.00-4sarge1_alpha.deb stable/main/binary-alpha/libdevmapper-dev_1.01.00-4sarge1_alpha.deb stable/main/binary-alpha/libdevmapper1.01-udeb_1.01.00-4sarge1_alpha.udeb stable/main/binary-alpha/dmsetup-udeb_1.01.00-4sarge1_alpha.udeb devmapper (2:1.01.00-4sarge1) stable; urgency=low * Non-maintainer upload. * LVM devices are created with root:disk ownership and 0660 permissions, which are used by all other disk block devices. This allows backups of LVM logical volumes with tools such as amanda, which run as user backup, a member of the disk group. stable/main/source/devmapper_1.01.00-4sarge1.diff.gz stable/main/binary-powerpc/dmsetup_1.01.00-4sarge1_powerpc.deb stable/main/source/devmapper_1.01.00-4sarge1.dsc stable/main/binary-powerpc/libdevmapper1.01-udeb_1.01.00-4sarge1_powerpc.udeb stable/main/binary-powerpc/libdevmapper-dev_1.01.00-4sarge1_powerpc.deb stable/main/binary-powerpc/libdevmapper1.01_1.01.00-4sarge1_powerpc.deb stable/main/binary-powerpc/dmsetup-udeb_1.01.00-4sarge1_powerpc.udeb devmapper (2:1.01.00-4sarge1) stable; urgency=low * Non-maintainer upload. * LVM devices are created with root:disk ownership and 0660 permissions, which are used by all other disk block devices. This allows backups of LVM logical volumes with tools such as amanda, which run as user backup, a member of the disk group. stable/main/binary-ia64/libsqldbc7.5.00-dev_7.5.00.24-4_ia64.deb stable/main/binary-ia64/libsqlod7.5.00_7.5.00.24-4_ia64.deb stable/main/binary-ia64/maxdb-lserver_7.5.00.24-4_ia64.deb stable/main/binary-ia64/maxdb-server-7.5.00_7.5.00.24-4_ia64.deb stable/main/binary-ia64/maxdb-loadercli_7.5.00.24-4_ia64.deb stable/main/binary-ia64/maxdb-sqlcli_7.5.00.24-4_ia64.deb stable/main/binary-ia64/maxdb-webtools_7.5.00.24-4_ia64.deb stable/main/binary-ia64/python2.3-maxdb_7.5.00.24-4_ia64.deb stable/main/binary-ia64/python2.4-maxdb_7.5.00.24-4_ia64.deb stable/main/binary-ia64/python-maxdb_7.5.00.24-4_ia64.deb stable/main/binary-ia64/python2.4-maxdb-loader_7.5.00.24-4_ia64.deb stable/main/binary-ia64/maxdb-dbmcli_7.5.00.24-4_ia64.deb stable/main/binary-ia64/python2.3-maxdb-loader_7.5.00.24-4_ia64.deb stable/main/binary-ia64/libsqldbc7.5.00_7.5.00.24-4_ia64.deb stable/main/binary-ia64/maxdb-server-dbg-7.5.00_7.5.00.24-4_ia64.deb stable/main/binary-ia64/maxdb-server_7.5.00.24-4_ia64.deb stable/main/binary-ia64/libsqlod7.5.00-dev_7.5.00.24-4_ia64.deb stable/main/binary-ia64/maxdb-dbanalyzer_7.5.00.24-4_ia64.deb stable/main/binary-ia64/python-maxdb-loader_7.5.00.24-4_ia64.deb maxdb-7.5.00 (7.5.00.24-4) stable-security; urgency=high * Fix for remotely exploitable buffer overflow. (CVE-2006-4305) stable/main/binary-i386/python-maxdb-loader_7.5.00.24-4_i386.deb stable/main/binary-i386/maxdb-loadercli_7.5.00.24-4_i386.deb stable/main/binary-i386/maxdb-webtools_7.5.00.24-4_i386.deb stable/main/binary-i386/maxdb-lserver_7.5.00.24-4_i386.deb stable/main/binary-i386/libsqlod7.5.00_7.5.00.24-4_i386.deb stable/main/binary-i386/python2.4-maxdb-loader_7.5.00.24-4_i386.deb stable/main/binary-i386/libsqldbc7.5.00-dev_7.5.00.24-4_i386.deb stable/main/source/maxdb-7.5.00_7.5.00.24-4.dsc stable/main/binary-i386/python-maxdb_7.5.00.24-4_i386.deb stable/main/binary-i386/maxdb-server-dbg-7.5.00_7.5.00.24-4_i386.deb stable/main/source/maxdb-7.5.00_7.5.00.24-4.diff.gz stable/main/binary-i386/libsqldbc7.5.00_7.5.00.24-4_i386.deb stable/main/binary-i386/python2.4-maxdb_7.5.00.24-4_i386.deb stable/main/binary-i386/libsqlod7.5.00-dev_7.5.00.24-4_i386.deb stable/main/binary-i386/maxdb-server_7.5.00.24-4_i386.deb stable/main/binary-i386/maxdb-sqlcli_7.5.00.24-4_i386.deb stable/main/binary-i386/python2.3-maxdb-loader_7.5.00.24-4_i386.deb stable/main/binary-i386/python2.3-maxdb_7.5.00.24-4_i386.deb stable/main/binary-i386/maxdb-dbmcli_7.5.00.24-4_i386.deb stable/main/binary-i386/maxdb-dbanalyzer_7.5.00.24-4_i386.deb stable/main/binary-i386/maxdb-server-7.5.00_7.5.00.24-4_i386.deb maxdb-7.5.00 (7.5.00.24-4) stable-security; urgency=high * Fix for remotely exploitable buffer overflow. (CVE-2006-4305) stable/main/binary-all/migrationtools_46-1sarge1_all.deb stable/main/source/migrationtools_46-1sarge1.diff.gz stable/main/source/migrationtools_46-1sarge1.dsc migrationtools (46-1sarge1) stable-security; urgency=high * Non-maintainer upload by the Security Team: Fix multiple insecure temporary files. stable/main/binary-sparc/mozilla-firefox-dom-inspector_1.0.4-2sarge11_sparc.deb stable/main/binary-sparc/mozilla-firefox_1.0.4-2sarge11_sparc.deb stable/main/binary-sparc/mozilla-firefox-gnome-support_1.0.4-2sarge11_sparc.deb mozilla-firefox (1.0.4-2sarge11) stable-security; urgency=critical * content/base/src/nsGenericElement.cpp: Patch from Alexander Sack to fix JavaScript regression that seems to affect Google Maps. (Closes: #385248, #385515) stable/main/binary-s390/mozilla-firefox_1.0.4-2sarge11_s390.deb stable/main/binary-s390/mozilla-firefox-gnome-support_1.0.4-2sarge11_s390.deb stable/main/binary-s390/mozilla-firefox-dom-inspector_1.0.4-2sarge11_s390.deb mozilla-firefox (1.0.4-2sarge11) stable-security; urgency=critical * content/base/src/nsGenericElement.cpp: Patch from Alexander Sack to fix JavaScript regression that seems to affect Google Maps. (Closes: #385248, #385515) stable/main/binary-powerpc/mozilla-firefox-dom-inspector_1.0.4-2sarge11_powerpc.deb stable/main/binary-powerpc/mozilla-firefox-gnome-support_1.0.4-2sarge11_powerpc.deb stable/main/binary-powerpc/mozilla-firefox_1.0.4-2sarge11_powerpc.deb mozilla-firefox (1.0.4-2sarge11) stable-security; urgency=critical * content/base/src/nsGenericElement.cpp: Patch from Alexander Sack to fix JavaScript regression that seems to affect Google Maps. (Closes: #385248, #385515) stable/main/binary-mipsel/mozilla-firefox-gnome-support_1.0.4-2sarge11_mipsel.deb stable/main/binary-mipsel/mozilla-firefox-dom-inspector_1.0.4-2sarge11_mipsel.deb stable/main/binary-mipsel/mozilla-firefox_1.0.4-2sarge11_mipsel.deb mozilla-firefox (1.0.4-2sarge11) stable-security; urgency=critical * content/base/src/nsGenericElement.cpp: Patch from Alexander Sack to fix JavaScript regression that seems to affect Google Maps. (Closes: #385248, #385515) stable/main/binary-mips/mozilla-firefox-gnome-support_1.0.4-2sarge11_mips.deb stable/main/binary-mips/mozilla-firefox-dom-inspector_1.0.4-2sarge11_mips.deb stable/main/binary-mips/mozilla-firefox_1.0.4-2sarge11_mips.deb mozilla-firefox (1.0.4-2sarge11) stable-security; urgency=critical * content/base/src/nsGenericElement.cpp: Patch from Alexander Sack to fix JavaScript regression that seems to affect Google Maps. (Closes: #385248, #385515) stable/main/binary-m68k/mozilla-firefox-gnome-support_1.0.4-2sarge11_m68k.deb stable/main/binary-m68k/mozilla-firefox_1.0.4-2sarge11_m68k.deb stable/main/binary-m68k/mozilla-firefox-dom-inspector_1.0.4-2sarge11_m68k.deb mozilla-firefox (1.0.4-2sarge11) stable-security; urgency=critical * content/base/src/nsGenericElement.cpp: Patch from Alexander Sack to fix JavaScript regression that seems to affect Google Maps. (Closes: #385248, #385515) stable/main/binary-ia64/mozilla-firefox-dom-inspector_1.0.4-2sarge11_ia64.deb stable/main/binary-ia64/mozilla-firefox-gnome-support_1.0.4-2sarge11_ia64.deb stable/main/binary-ia64/mozilla-firefox_1.0.4-2sarge11_ia64.deb mozilla-firefox (1.0.4-2sarge11) stable-security; urgency=critical * content/base/src/nsGenericElement.cpp: Patch from Alexander Sack to fix JavaScript regression that seems to affect Google Maps. (Closes: #385248, #385515) stable/main/binary-hppa/mozilla-firefox-gnome-support_1.0.4-2sarge11_hppa.deb stable/main/binary-hppa/mozilla-firefox-dom-inspector_1.0.4-2sarge11_hppa.deb stable/main/binary-hppa/mozilla-firefox_1.0.4-2sarge11_hppa.deb mozilla-firefox (1.0.4-2sarge11) stable-security; urgency=critical * content/base/src/nsGenericElement.cpp: Patch from Alexander Sack to fix JavaScript regression that seems to affect Google Maps. (Closes: #385248, #385515) stable/main/binary-arm/mozilla-firefox_1.0.4-2sarge11_arm.deb stable/main/binary-arm/mozilla-firefox-gnome-support_1.0.4-2sarge11_arm.deb stable/main/binary-arm/mozilla-firefox-dom-inspector_1.0.4-2sarge11_arm.deb mozilla-firefox (1.0.4-2sarge11) stable-security; urgency=critical * content/base/src/nsGenericElement.cpp: Patch from Alexander Sack to fix JavaScript regression that seems to affect Google Maps. (Closes: #385248, #385515) stable/main/binary-alpha/mozilla-firefox_1.0.4-2sarge11_alpha.deb stable/main/binary-alpha/mozilla-firefox-gnome-support_1.0.4-2sarge11_alpha.deb stable/main/binary-alpha/mozilla-firefox-dom-inspector_1.0.4-2sarge11_alpha.deb mozilla-firefox (1.0.4-2sarge11) stable-security; urgency=critical * content/base/src/nsGenericElement.cpp: Patch from Alexander Sack to fix JavaScript regression that seems to affect Google Maps. (Closes: #385248, #385515) stable/main/binary-i386/mozilla-firefox_1.0.4-2sarge11_i386.deb stable/main/source/mozilla-firefox_1.0.4-2sarge11.diff.gz stable/main/binary-i386/mozilla-firefox-gnome-support_1.0.4-2sarge11_i386.deb stable/main/source/mozilla-firefox_1.0.4-2sarge11.dsc stable/main/binary-i386/mozilla-firefox-dom-inspector_1.0.4-2sarge11_i386.deb mozilla-firefox (1.0.4-2sarge11) stable-security; urgency=critical * content/base/src/nsGenericElement.cpp: Patch from Alexander Sack to fix JavaScript regression that seems to affect Google Maps. (Closes: #385248, #385515) stable/main/binary-sparc/libnss-dev_1.7.8-1sarge7.3.1_sparc.deb stable/main/binary-sparc/mozilla-dev_1.7.8-1sarge7.3.1_sparc.deb stable/main/binary-sparc/mozilla-chatzilla_1.7.8-1sarge7.3.1_sparc.deb stable/main/binary-sparc/mozilla-js-debugger_1.7.8-1sarge7.3.1_sparc.deb stable/main/binary-sparc/mozilla-mailnews_1.7.8-1sarge7.3.1_sparc.deb stable/main/binary-sparc/mozilla_1.7.8-1sarge7.3.1_sparc.deb stable/main/binary-sparc/mozilla-calendar_1.7.8-1sarge7.3.1_sparc.deb stable/main/binary-sparc/mozilla-browser_1.7.8-1sarge7.3.1_sparc.deb stable/main/binary-sparc/libnspr-dev_1.7.8-1sarge7.3.1_sparc.deb stable/main/binary-sparc/mozilla-dom-inspector_1.7.8-1sarge7.3.1_sparc.deb stable/main/binary-sparc/libnspr4_1.7.8-1sarge7.3.1_sparc.deb stable/main/binary-sparc/mozilla-psm_1.7.8-1sarge7.3.1_sparc.deb stable/main/binary-sparc/libnss3_1.7.8-1sarge7.3.1_sparc.deb mozilla (2:1.7.8-1sarge7.3.1) stable-security; urgency=critical * fixes various security issues. Patches are: 3_0001-no-mfsa-CVE-2006-2788-321598.txt 3_0002-MFSA2006-57-Part-1-2-CVE-2006-4565-346090.txt 3_0003-MFSA2006-57-Part-2-2-CVE-2006-4566-346794.txt 3_0004-MFSA2006-60-CVE-2006-4340-CVE-2006-4339-Part-1-3-350640.txt 3_0005-MFSA2006-60-CVE-2006-4340-CVE-2006-4339-Part-2-3-351079.txt 3_0006-MFSA2006-60-CVE-2006-4340-CVE-2006-4339-Part-3-3-351848.txt 3_0007-MFSA2006-61-CVE-2006-4568-343168.txt 3_0008-MFSA-2006-63-CVE-2006-4570-346984-mail-only.txt 3_0009-MFSA2006-64-CVE-2006-4571-346980-grant-cellmap-patch.txt 3_0010-MFSA2006-64-CVE-2006-4571-Section-3-5-Part-1-4-345967.txt 3_0011-MFSA2006-64-CVE-2006-4571-Section-3-5-Part-3-4-348532.txt 3_0012-MFSA2006-64-CVE-2006-4571-Section-4-5-Part-1-20-268575.txt 3_0013-MFSA2006-64-CVE-2006-4571-Section-4-5-Part-2-20-306940.txt 3_0014-MFSA2006-64-CVE-2006-4571-Section-4-5-Part-3-20-307826.txt 3_0015-MFSA2006-64-CVE-2006-4571-Section-4-5-Part-5-20-337419.txt 3_0016-MFSA2006-64-CVS-2006-4571-Section-4-5-Part-6-20-337883.txt 3_0018-MFSA2006-64-CVE-2006-4571-Section-4-5-Part-8a-20-348049.txt 3_0019-MFSA2006-64-CVE-2006-4571-Section-4-5-Part-8b-20-348049.txt 3_0020-MFSA2006-64-CVE-2006-4571-Section-4-5-Part-8c-20-348049.txt 3_0021-MFSA2006-64-CVE-2006-4571-Section-4-5-Part-8d-20-348049.txt 3_0022-MFSA2006-64-CVE-2006-4571-Section-4-5-Part-9-20-205735.txt 3_0023-MFSA2006-64-CVE-2006-4571-Section-4-5-Part-12-20-348062.txt 3_0024-MFSA2006-64-CVE-2006-4571-Section-4-5-Part-17-20-349201.txt 3_0025-MFSA2006-64-CVE-2006-4571-Section-5-5-344085.txt 3_0026-GetDepth-without-DEBUG-in-BlockFrame.txt 3_0028-MFSA2006-64-CVE-2006-4571-Section-4-5-Part-7-20-347355-without-svg-bug.txt stable/main/binary-s390/mozilla-psm_1.7.8-1sarge7.3.1_s390.deb stable/main/binary-s390/mozilla-dev_1.7.8-1sarge7.3.1_s390.deb stable/main/binary-s390/mozilla-mailnews_1.7.8-1sarge7.3.1_s390.deb stable/main/binary-s390/libnss-dev_1.7.8-1sarge7.3.1_s390.deb stable/main/binary-s390/libnss3_1.7.8-1sarge7.3.1_s390.deb stable/main/binary-s390/libnspr4_1.7.8-1sarge7.3.1_s390.deb stable/main/binary-s390/mozilla-calendar_1.7.8-1sarge7.3.1_s390.deb stable/main/binary-s390/mozilla-chatzilla_1.7.8-1sarge7.3.1_s390.deb stable/main/binary-s390/mozilla-dom-inspector_1.7.8-1sarge7.3.1_s390.deb stable/main/binary-s390/libnspr-dev_1.7.8-1sarge7.3.1_s390.deb stable/main/binary-s390/mozilla-browser_1.7.8-1sarge7.3.1_s390.deb stable/main/binary-s390/mozilla_1.7.8-1sarge7.3.1_s390.deb stable/main/binary-s390/mozilla-js-debugger_1.7.8-1sarge7.3.1_s390.deb mozilla (2:1.7.8-1sarge7.3.1) stable-security; urgency=critical * fixes various security issues. Patches are: 3_0001-no-mfsa-CVE-2006-2788-321598.txt 3_0002-MFSA2006-57-Part-1-2-CVE-2006-4565-346090.txt 3_0003-MFSA2006-57-Part-2-2-CVE-2006-4566-346794.txt 3_0004-MFSA2006-60-CVE-2006-4340-CVE-2006-4339-Part-1-3-350640.txt 3_0005-MFSA2006-60-CVE-2006-4340-CVE-2006-4339-Part-2-3-351079.txt 3_0006-MFSA2006-60-CVE-2006-4340-CVE-2006-4339-Part-3-3-351848.txt 3_0007-MFSA2006-61-CVE-2006-4568-343168.txt 3_0008-MFSA-2006-63-CVE-2006-4570-346984-mail-only.txt 3_0009-MFSA2006-64-CVE-2006-4571-346980-grant-cellmap-patch.txt 3_0010-MFSA2006-64-CVE-2006-4571-Section-3-5-Part-1-4-345967.txt 3_0011-MFSA2006-64-CVE-2006-4571-Section-3-5-Part-3-4-348532.txt 3_0012-MFSA2006-64-CVE-2006-4571-Section-4-5-Part-1-20-268575.txt 3_0013-MFSA2006-64-CVE-2006-4571-Section-4-5-Part-2-20-306940.txt 3_0014-MFSA2006-64-CVE-2006-4571-Section-4-5-Part-3-20-307826.txt 3_0015-MFSA2006-64-CVE-2006-4571-Section-4-5-Part-5-20-337419.txt 3_0016-MFSA2006-64-CVS-2006-4571-Section-4-5-Part-6-20-337883.txt 3_0018-MFSA2006-64-CVE-2006-4571-Section-4-5-Part-8a-20-348049.txt 3_0019-MFSA2006-64-CVE-2006-4571-Section-4-5-Part-8b-20-348049.txt 3_0020-MFSA2006-64-CVE-2006-4571-Section-4-5-Part-8c-20-348049.txt 3_0021-MFSA2006-64-CVE-2006-4571-Section-4-5-Part-8d-20-348049.txt 3_0022-MFSA2006-64-CVE-2006-4571-Section-4-5-Part-9-20-205735.txt 3_0023-MFSA2006-64-CVE-2006-4571-Section-4-5-Part-12-20-348062.txt 3_0024-MFSA2006-64-CVE-2006-4571-Section-4-5-Part-17-20-349201.txt 3_0025-MFSA2006-64-CVE-2006-4571-Section-5-5-344085.txt 3_0026-GetDepth-without-DEBUG-in-BlockFrame.txt 3_0028-MFSA2006-64-CVE-2006-4571-Section-4-5-Part-7-20-347355-without-svg-bug.txt stable/main/binary-powerpc/libnss3_1.7.8-1sarge7.3.1_powerpc.deb stable/main/binary-powerpc/mozilla-chatzilla_1.7.8-1sarge7.3.1_powerpc.deb stable/main/binary-powerpc/libnspr4_1.7.8-1sarge7.3.1_powerpc.deb stable/main/binary-powerpc/mozilla-browser_1.7.8-1sarge7.3.1_powerpc.deb stable/main/binary-powerpc/mozilla-js-debugger_1.7.8-1sarge7.3.1_powerpc.deb stable/main/binary-powerpc/mozilla-psm_1.7.8-1sarge7.3.1_powerpc.deb stable/main/binary-powerpc/libnspr-dev_1.7.8-1sarge7.3.1_powerpc.deb stable/main/binary-powerpc/mozilla-calendar_1.7.8-1sarge7.3.1_powerpc.deb stable/main/binary-powerpc/mozilla-mailnews_1.7.8-1sarge7.3.1_powerpc.deb stable/main/binary-powerpc/mozilla_1.7.8-1sarge7.3.1_powerpc.deb stable/main/binary-powerpc/mozilla-dom-inspector_1.7.8-1sarge7.3.1_powerpc.deb stable/main/binary-powerpc/mozilla-dev_1.7.8-1sarge7.3.1_powerpc.deb stable/main/binary-powerpc/libnss-dev_1.7.8-1sarge7.3.1_powerpc.deb mozilla (2:1.7.8-1sarge7.3.1) stable-security; urgency=critical * fixes various security issues. Patches are: 3_0001-no-mfsa-CVE-2006-2788-321598.txt 3_0002-MFSA2006-57-Part-1-2-CVE-2006-4565-346090.txt 3_0003-MFSA2006-57-Part-2-2-CVE-2006-4566-346794.txt 3_0004-MFSA2006-60-CVE-2006-4340-CVE-2006-4339-Part-1-3-350640.txt 3_0005-MFSA2006-60-CVE-2006-4340-CVE-2006-4339-Part-2-3-351079.txt 3_0006-MFSA2006-60-CVE-2006-4340-CVE-2006-4339-Part-3-3-351848.txt 3_0007-MFSA2006-61-CVE-2006-4568-343168.txt 3_0008-MFSA-2006-63-CVE-2006-4570-346984-mail-only.txt 3_0009-MFSA2006-64-CVE-2006-4571-346980-grant-cellmap-patch.txt 3_0010-MFSA2006-64-CVE-2006-4571-Section-3-5-Part-1-4-345967.txt 3_0011-MFSA2006-64-CVE-2006-4571-Section-3-5-Part-3-4-348532.txt 3_0012-MFSA2006-64-CVE-2006-4571-Section-4-5-Part-1-20-268575.txt 3_0013-MFSA2006-64-CVE-2006-4571-Section-4-5-Part-2-20-306940.txt 3_0014-MFSA2006-64-CVE-2006-4571-Section-4-5-Part-3-20-307826.txt 3_0015-MFSA2006-64-CVE-2006-4571-Section-4-5-Part-5-20-337419.txt 3_0016-MFSA2006-64-CVS-2006-4571-Section-4-5-Part-6-20-337883.txt 3_0018-MFSA2006-64-CVE-2006-4571-Section-4-5-Part-8a-20-348049.txt 3_0019-MFSA2006-64-CVE-2006-4571-Section-4-5-Part-8b-20-348049.txt 3_0020-MFSA2006-64-CVE-2006-4571-Section-4-5-Part-8c-20-348049.txt 3_0021-MFSA2006-64-CVE-2006-4571-Section-4-5-Part-8d-20-348049.txt 3_0022-MFSA2006-64-CVE-2006-4571-Section-4-5-Part-9-20-205735.txt 3_0023-MFSA2006-64-CVE-2006-4571-Section-4-5-Part-12-20-348062.txt 3_0024-MFSA2006-64-CVE-2006-4571-Section-4-5-Part-17-20-349201.txt 3_0025-MFSA2006-64-CVE-2006-4571-Section-5-5-344085.txt 3_0026-GetDepth-without-DEBUG-in-BlockFrame.txt 3_0028-MFSA2006-64-CVE-2006-4571-Section-4-5-Part-7-20-347355-without-svg-bug.txt stable/main/binary-mipsel/libnspr-dev_1.7.8-1sarge7.3.1_mipsel.deb stable/main/binary-mipsel/mozilla-mailnews_1.7.8-1sarge7.3.1_mipsel.deb stable/main/binary-mipsel/libnspr4_1.7.8-1sarge7.3.1_mipsel.deb stable/main/binary-mipsel/libnss-dev_1.7.8-1sarge7.3.1_mipsel.deb stable/main/binary-mipsel/mozilla-calendar_1.7.8-1sarge7.3.1_mipsel.deb stable/main/binary-mipsel/mozilla-chatzilla_1.7.8-1sarge7.3.1_mipsel.deb stable/main/binary-mipsel/libnss3_1.7.8-1sarge7.3.1_mipsel.deb stable/main/binary-mipsel/mozilla-js-debugger_1.7.8-1sarge7.3.1_mipsel.deb stable/main/binary-mipsel/mozilla-psm_1.7.8-1sarge7.3.1_mipsel.deb stable/main/binary-mipsel/mozilla-browser_1.7.8-1sarge7.3.1_mipsel.deb stable/main/binary-mipsel/mozilla-dev_1.7.8-1sarge7.3.1_mipsel.deb stable/main/binary-mipsel/mozilla-dom-inspector_1.7.8-1sarge7.3.1_mipsel.deb stable/main/binary-mipsel/mozilla_1.7.8-1sarge7.3.1_mipsel.deb mozilla (2:1.7.8-1sarge7.3.1) stable-security; urgency=critical * fixes various security issues. Patches are: 3_0001-no-mfsa-CVE-2006-2788-321598.txt 3_0002-MFSA2006-57-Part-1-2-CVE-2006-4565-346090.txt 3_0003-MFSA2006-57-Part-2-2-CVE-2006-4566-346794.txt 3_0004-MFSA2006-60-CVE-2006-4340-CVE-2006-4339-Part-1-3-350640.txt 3_0005-MFSA2006-60-CVE-2006-4340-CVE-2006-4339-Part-2-3-351079.txt 3_0006-MFSA2006-60-CVE-2006-4340-CVE-2006-4339-Part-3-3-351848.txt 3_0007-MFSA2006-61-CVE-2006-4568-343168.txt 3_0008-MFSA-2006-63-CVE-2006-4570-346984-mail-only.txt 3_0009-MFSA2006-64-CVE-2006-4571-346980-grant-cellmap-patch.txt 3_0010-MFSA2006-64-CVE-2006-4571-Section-3-5-Part-1-4-345967.txt 3_0011-MFSA2006-64-CVE-2006-4571-Section-3-5-Part-3-4-348532.txt 3_0012-MFSA2006-64-CVE-2006-4571-Section-4-5-Part-1-20-268575.txt 3_0013-MFSA2006-64-CVE-2006-4571-Section-4-5-Part-2-20-306940.txt 3_0014-MFSA2006-64-CVE-2006-4571-Section-4-5-Part-3-20-307826.txt 3_0015-MFSA2006-64-CVE-2006-4571-Section-4-5-Part-5-20-337419.txt 3_0016-MFSA2006-64-CVS-2006-4571-Section-4-5-Part-6-20-337883.txt 3_0018-MFSA2006-64-CVE-2006-4571-Section-4-5-Part-8a-20-348049.txt 3_0019-MFSA2006-64-CVE-2006-4571-Section-4-5-Part-8b-20-348049.txt 3_0020-MFSA2006-64-CVE-2006-4571-Section-4-5-Part-8c-20-348049.txt 3_0021-MFSA2006-64-CVE-2006-4571-Section-4-5-Part-8d-20-348049.txt 3_0022-MFSA2006-64-CVE-2006-4571-Section-4-5-Part-9-20-205735.txt 3_0023-MFSA2006-64-CVE-2006-4571-Section-4-5-Part-12-20-348062.txt 3_0024-MFSA2006-64-CVE-2006-4571-Section-4-5-Part-17-20-349201.txt 3_0025-MFSA2006-64-CVE-2006-4571-Section-5-5-344085.txt 3_0026-GetDepth-without-DEBUG-in-BlockFrame.txt 3_0028-MFSA2006-64-CVE-2006-4571-Section-4-5-Part-7-20-347355-without-svg-bug.txt stable/main/binary-mips/mozilla-js-debugger_1.7.8-1sarge7.3.1_mips.deb stable/main/binary-mips/libnspr4_1.7.8-1sarge7.3.1_mips.deb stable/main/binary-mips/libnss3_1.7.8-1sarge7.3.1_mips.deb stable/main/binary-mips/mozilla_1.7.8-1sarge7.3.1_mips.deb stable/main/binary-mips/mozilla-chatzilla_1.7.8-1sarge7.3.1_mips.deb stable/main/binary-mips/libnspr-dev_1.7.8-1sarge7.3.1_mips.deb stable/main/binary-mips/mozilla-mailnews_1.7.8-1sarge7.3.1_mips.deb stable/main/binary-mips/mozilla-dom-inspector_1.7.8-1sarge7.3.1_mips.deb stable/main/binary-mips/mozilla-browser_1.7.8-1sarge7.3.1_mips.deb stable/main/binary-mips/mozilla-calendar_1.7.8-1sarge7.3.1_mips.deb stable/main/binary-mips/mozilla-dev_1.7.8-1sarge7.3.1_mips.deb stable/main/binary-mips/mozilla-psm_1.7.8-1sarge7.3.1_mips.deb stable/main/binary-mips/libnss-dev_1.7.8-1sarge7.3.1_mips.deb mozilla (2:1.7.8-1sarge7.3.1) stable-security; urgency=critical * fixes various security issues. Patches are: 3_0001-no-mfsa-CVE-2006-2788-321598.txt 3_0002-MFSA2006-57-Part-1-2-CVE-2006-4565-346090.txt 3_0003-MFSA2006-57-Part-2-2-CVE-2006-4566-346794.txt 3_0004-MFSA2006-60-CVE-2006-4340-CVE-2006-4339-Part-1-3-350640.txt 3_0005-MFSA2006-60-CVE-2006-4340-CVE-2006-4339-Part-2-3-351079.txt 3_0006-MFSA2006-60-CVE-2006-4340-CVE-2006-4339-Part-3-3-351848.txt 3_0007-MFSA2006-61-CVE-2006-4568-343168.txt 3_0008-MFSA-2006-63-CVE-2006-4570-346984-mail-only.txt 3_0009-MFSA2006-64-CVE-2006-4571-346980-grant-cellmap-patch.txt 3_0010-MFSA2006-64-CVE-2006-4571-Section-3-5-Part-1-4-345967.txt 3_0011-MFSA2006-64-CVE-2006-4571-Section-3-5-Part-3-4-348532.txt 3_0012-MFSA2006-64-CVE-2006-4571-Section-4-5-Part-1-20-268575.txt 3_0013-MFSA2006-64-CVE-2006-4571-Section-4-5-Part-2-20-306940.txt 3_0014-MFSA2006-64-CVE-2006-4571-Section-4-5-Part-3-20-307826.txt 3_0015-MFSA2006-64-CVE-2006-4571-Section-4-5-Part-5-20-337419.txt 3_0016-MFSA2006-64-CVS-2006-4571-Section-4-5-Part-6-20-337883.txt 3_0018-MFSA2006-64-CVE-2006-4571-Section-4-5-Part-8a-20-348049.txt 3_0019-MFSA2006-64-CVE-2006-4571-Section-4-5-Part-8b-20-348049.txt 3_0020-MFSA2006-64-CVE-2006-4571-Section-4-5-Part-8c-20-348049.txt 3_0021-MFSA2006-64-CVE-2006-4571-Section-4-5-Part-8d-20-348049.txt 3_0022-MFSA2006-64-CVE-2006-4571-Section-4-5-Part-9-20-205735.txt 3_0023-MFSA2006-64-CVE-2006-4571-Section-4-5-Part-12-20-348062.txt 3_0024-MFSA2006-64-CVE-2006-4571-Section-4-5-Part-17-20-349201.txt 3_0025-MFSA2006-64-CVE-2006-4571-Section-5-5-344085.txt 3_0026-GetDepth-without-DEBUG-in-BlockFrame.txt 3_0028-MFSA2006-64-CVE-2006-4571-Section-4-5-Part-7-20-347355-without-svg-bug.txt stable/main/binary-m68k/libnss3_1.7.8-1sarge7.3.1_m68k.deb stable/main/binary-m68k/mozilla-js-debugger_1.7.8-1sarge7.3.1_m68k.deb stable/main/binary-m68k/mozilla-browser_1.7.8-1sarge7.3.1_m68k.deb stable/main/binary-m68k/libnspr-dev_1.7.8-1sarge7.3.1_m68k.deb stable/main/binary-m68k/mozilla-psm_1.7.8-1sarge7.3.1_m68k.deb stable/main/binary-m68k/mozilla-dev_1.7.8-1sarge7.3.1_m68k.deb stable/main/binary-m68k/libnspr4_1.7.8-1sarge7.3.1_m68k.deb stable/main/binary-m68k/mozilla_1.7.8-1sarge7.3.1_m68k.deb stable/main/binary-m68k/mozilla-chatzilla_1.7.8-1sarge7.3.1_m68k.deb stable/main/binary-m68k/libnss-dev_1.7.8-1sarge7.3.1_m68k.deb stable/main/binary-m68k/mozilla-mailnews_1.7.8-1sarge7.3.1_m68k.deb stable/main/binary-m68k/mozilla-calendar_1.7.8-1sarge7.3.1_m68k.deb stable/main/binary-m68k/mozilla-dom-inspector_1.7.8-1sarge7.3.1_m68k.deb mozilla (2:1.7.8-1sarge7.3.1) stable-security; urgency=critical * fixes various security issues. Patches are: 3_0001-no-mfsa-CVE-2006-2788-321598.txt 3_0002-MFSA2006-57-Part-1-2-CVE-2006-4565-346090.txt 3_0003-MFSA2006-57-Part-2-2-CVE-2006-4566-346794.txt 3_0004-MFSA2006-60-CVE-2006-4340-CVE-2006-4339-Part-1-3-350640.txt 3_0005-MFSA2006-60-CVE-2006-4340-CVE-2006-4339-Part-2-3-351079.txt 3_0006-MFSA2006-60-CVE-2006-4340-CVE-2006-4339-Part-3-3-351848.txt 3_0007-MFSA2006-61-CVE-2006-4568-343168.txt 3_0008-MFSA-2006-63-CVE-2006-4570-346984-mail-only.txt 3_0009-MFSA2006-64-CVE-2006-4571-346980-grant-cellmap-patch.txt 3_0010-MFSA2006-64-CVE-2006-4571-Section-3-5-Part-1-4-345967.txt 3_0011-MFSA2006-64-CVE-2006-4571-Section-3-5-Part-3-4-348532.txt 3_0012-MFSA2006-64-CVE-2006-4571-Section-4-5-Part-1-20-268575.txt 3_0013-MFSA2006-64-CVE-2006-4571-Section-4-5-Part-2-20-306940.txt 3_0014-MFSA2006-64-CVE-2006-4571-Section-4-5-Part-3-20-307826.txt 3_0015-MFSA2006-64-CVE-2006-4571-Section-4-5-Part-5-20-337419.txt 3_0016-MFSA2006-64-CVS-2006-4571-Section-4-5-Part-6-20-337883.txt 3_0018-MFSA2006-64-CVE-2006-4571-Section-4-5-Part-8a-20-348049.txt 3_0019-MFSA2006-64-CVE-2006-4571-Section-4-5-Part-8b-20-348049.txt 3_0020-MFSA2006-64-CVE-2006-4571-Section-4-5-Part-8c-20-348049.txt 3_0021-MFSA2006-64-CVE-2006-4571-Section-4-5-Part-8d-20-348049.txt 3_0022-MFSA2006-64-CVE-2006-4571-Section-4-5-Part-9-20-205735.txt 3_0023-MFSA2006-64-CVE-2006-4571-Section-4-5-Part-12-20-348062.txt 3_0024-MFSA2006-64-CVE-2006-4571-Section-4-5-Part-17-20-349201.txt 3_0025-MFSA2006-64-CVE-2006-4571-Section-5-5-344085.txt 3_0026-GetDepth-without-DEBUG-in-BlockFrame.txt 3_0028-MFSA2006-64-CVE-2006-4571-Section-4-5-Part-7-20-347355-without-svg-bug.txt stable/main/binary-ia64/mozilla-js-debugger_1.7.8-1sarge7.3.1_ia64.deb stable/main/binary-ia64/mozilla-dev_1.7.8-1sarge7.3.1_ia64.deb stable/main/binary-ia64/mozilla-dom-inspector_1.7.8-1sarge7.3.1_ia64.deb stable/main/binary-ia64/mozilla_1.7.8-1sarge7.3.1_ia64.deb stable/main/binary-ia64/libnspr4_1.7.8-1sarge7.3.1_ia64.deb stable/main/binary-ia64/mozilla-calendar_1.7.8-1sarge7.3.1_ia64.deb stable/main/binary-ia64/mozilla-chatzilla_1.7.8-1sarge7.3.1_ia64.deb stable/main/binary-ia64/libnss-dev_1.7.8-1sarge7.3.1_ia64.deb stable/main/binary-ia64/mozilla-psm_1.7.8-1sarge7.3.1_ia64.deb stable/main/binary-ia64/libnss3_1.7.8-1sarge7.3.1_ia64.deb stable/main/binary-ia64/mozilla-browser_1.7.8-1sarge7.3.1_ia64.deb stable/main/binary-ia64/mozilla-mailnews_1.7.8-1sarge7.3.1_ia64.deb stable/main/binary-ia64/libnspr-dev_1.7.8-1sarge7.3.1_ia64.deb mozilla (2:1.7.8-1sarge7.3.1) stable-security; urgency=critical * fixes various security issues. Patches are: 3_0001-no-mfsa-CVE-2006-2788-321598.txt 3_0002-MFSA2006-57-Part-1-2-CVE-2006-4565-346090.txt 3_0003-MFSA2006-57-Part-2-2-CVE-2006-4566-346794.txt 3_0004-MFSA2006-60-CVE-2006-4340-CVE-2006-4339-Part-1-3-350640.txt 3_0005-MFSA2006-60-CVE-2006-4340-CVE-2006-4339-Part-2-3-351079.txt 3_0006-MFSA2006-60-CVE-2006-4340-CVE-2006-4339-Part-3-3-351848.txt 3_0007-MFSA2006-61-CVE-2006-4568-343168.txt 3_0008-MFSA-2006-63-CVE-2006-4570-346984-mail-only.txt 3_0009-MFSA2006-64-CVE-2006-4571-346980-grant-cellmap-patch.txt 3_0010-MFSA2006-64-CVE-2006-4571-Section-3-5-Part-1-4-345967.txt 3_0011-MFSA2006-64-CVE-2006-4571-Section-3-5-Part-3-4-348532.txt 3_0012-MFSA2006-64-CVE-2006-4571-Section-4-5-Part-1-20-268575.txt 3_0013-MFSA2006-64-CVE-2006-4571-Section-4-5-Part-2-20-306940.txt 3_0014-MFSA2006-64-CVE-2006-4571-Section-4-5-Part-3-20-307826.txt 3_0015-MFSA2006-64-CVE-2006-4571-Section-4-5-Part-5-20-337419.txt 3_0016-MFSA2006-64-CVS-2006-4571-Section-4-5-Part-6-20-337883.txt 3_0018-MFSA2006-64-CVE-2006-4571-Section-4-5-Part-8a-20-348049.txt 3_0019-MFSA2006-64-CVE-2006-4571-Section-4-5-Part-8b-20-348049.txt 3_0020-MFSA2006-64-CVE-2006-4571-Section-4-5-Part-8c-20-348049.txt 3_0021-MFSA2006-64-CVE-2006-4571-Section-4-5-Part-8d-20-348049.txt 3_0022-MFSA2006-64-CVE-2006-4571-Section-4-5-Part-9-20-205735.txt 3_0023-MFSA2006-64-CVE-2006-4571-Section-4-5-Part-12-20-348062.txt 3_0024-MFSA2006-64-CVE-2006-4571-Section-4-5-Part-17-20-349201.txt 3_0025-MFSA2006-64-CVE-2006-4571-Section-5-5-344085.txt 3_0026-GetDepth-without-DEBUG-in-BlockFrame.txt 3_0028-MFSA2006-64-CVE-2006-4571-Section-4-5-Part-7-20-347355-without-svg-bug.txt stable/main/binary-hppa/mozilla-js-debugger_1.7.8-1sarge7.3.1_hppa.deb stable/main/binary-hppa/mozilla-dom-inspector_1.7.8-1sarge7.3.1_hppa.deb stable/main/binary-hppa/mozilla-mailnews_1.7.8-1sarge7.3.1_hppa.deb stable/main/binary-hppa/mozilla-browser_1.7.8-1sarge7.3.1_hppa.deb stable/main/binary-hppa/libnspr-dev_1.7.8-1sarge7.3.1_hppa.deb stable/main/binary-hppa/mozilla-psm_1.7.8-1sarge7.3.1_hppa.deb stable/main/binary-hppa/libnss3_1.7.8-1sarge7.3.1_hppa.deb stable/main/binary-hppa/libnss-dev_1.7.8-1sarge7.3.1_hppa.deb stable/main/binary-hppa/mozilla_1.7.8-1sarge7.3.1_hppa.deb stable/main/binary-hppa/mozilla-dev_1.7.8-1sarge7.3.1_hppa.deb stable/main/binary-hppa/mozilla-chatzilla_1.7.8-1sarge7.3.1_hppa.deb stable/main/binary-hppa/mozilla-calendar_1.7.8-1sarge7.3.1_hppa.deb stable/main/binary-hppa/libnspr4_1.7.8-1sarge7.3.1_hppa.deb mozilla (2:1.7.8-1sarge7.3.1) stable-security; urgency=critical * fixes various security issues. Patches are: 3_0001-no-mfsa-CVE-2006-2788-321598.txt 3_0002-MFSA2006-57-Part-1-2-CVE-2006-4565-346090.txt 3_0003-MFSA2006-57-Part-2-2-CVE-2006-4566-346794.txt 3_0004-MFSA2006-60-CVE-2006-4340-CVE-2006-4339-Part-1-3-350640.txt 3_0005-MFSA2006-60-CVE-2006-4340-CVE-2006-4339-Part-2-3-351079.txt 3_0006-MFSA2006-60-CVE-2006-4340-CVE-2006-4339-Part-3-3-351848.txt 3_0007-MFSA2006-61-CVE-2006-4568-343168.txt 3_0008-MFSA-2006-63-CVE-2006-4570-346984-mail-only.txt 3_0009-MFSA2006-64-CVE-2006-4571-346980-grant-cellmap-patch.txt 3_0010-MFSA2006-64-CVE-2006-4571-Section-3-5-Part-1-4-345967.txt 3_0011-MFSA2006-64-CVE-2006-4571-Section-3-5-Part-3-4-348532.txt 3_0012-MFSA2006-64-CVE-2006-4571-Section-4-5-Part-1-20-268575.txt 3_0013-MFSA2006-64-CVE-2006-4571-Section-4-5-Part-2-20-306940.txt 3_0014-MFSA2006-64-CVE-2006-4571-Section-4-5-Part-3-20-307826.txt 3_0015-MFSA2006-64-CVE-2006-4571-Section-4-5-Part-5-20-337419.txt 3_0016-MFSA2006-64-CVS-2006-4571-Section-4-5-Part-6-20-337883.txt 3_0018-MFSA2006-64-CVE-2006-4571-Section-4-5-Part-8a-20-348049.txt 3_0019-MFSA2006-64-CVE-2006-4571-Section-4-5-Part-8b-20-348049.txt 3_0020-MFSA2006-64-CVE-2006-4571-Section-4-5-Part-8c-20-348049.txt 3_0021-MFSA2006-64-CVE-2006-4571-Section-4-5-Part-8d-20-348049.txt 3_0022-MFSA2006-64-CVE-2006-4571-Section-4-5-Part-9-20-205735.txt 3_0023-MFSA2006-64-CVE-2006-4571-Section-4-5-Part-12-20-348062.txt 3_0024-MFSA2006-64-CVE-2006-4571-Section-4-5-Part-17-20-349201.txt 3_0025-MFSA2006-64-CVE-2006-4571-Section-5-5-344085.txt 3_0026-GetDepth-without-DEBUG-in-BlockFrame.txt 3_0028-MFSA2006-64-CVE-2006-4571-Section-4-5-Part-7-20-347355-without-svg-bug.txt stable/main/binary-arm/mozilla-psm_1.7.8-1sarge7.3.1_arm.deb stable/main/binary-arm/mozilla-js-debugger_1.7.8-1sarge7.3.1_arm.deb stable/main/binary-arm/libnss3_1.7.8-1sarge7.3.1_arm.deb stable/main/binary-arm/libnspr4_1.7.8-1sarge7.3.1_arm.deb stable/main/binary-arm/mozilla-chatzilla_1.7.8-1sarge7.3.1_arm.deb stable/main/binary-arm/mozilla-browser_1.7.8-1sarge7.3.1_arm.deb stable/main/binary-arm/mozilla-mailnews_1.7.8-1sarge7.3.1_arm.deb stable/main/binary-arm/libnspr-dev_1.7.8-1sarge7.3.1_arm.deb stable/main/binary-arm/libnss-dev_1.7.8-1sarge7.3.1_arm.deb stable/main/binary-arm/mozilla-dom-inspector_1.7.8-1sarge7.3.1_arm.deb stable/main/binary-arm/mozilla-calendar_1.7.8-1sarge7.3.1_arm.deb stable/main/binary-arm/mozilla_1.7.8-1sarge7.3.1_arm.deb stable/main/binary-arm/mozilla-dev_1.7.8-1sarge7.3.1_arm.deb mozilla (2:1.7.8-1sarge7.3.1) stable-security; urgency=critical * fixes various security issues. Patches are: 3_0001-no-mfsa-CVE-2006-2788-321598.txt 3_0002-MFSA2006-57-Part-1-2-CVE-2006-4565-346090.txt 3_0003-MFSA2006-57-Part-2-2-CVE-2006-4566-346794.txt 3_0004-MFSA2006-60-CVE-2006-4340-CVE-2006-4339-Part-1-3-350640.txt 3_0005-MFSA2006-60-CVE-2006-4340-CVE-2006-4339-Part-2-3-351079.txt 3_0006-MFSA2006-60-CVE-2006-4340-CVE-2006-4339-Part-3-3-351848.txt 3_0007-MFSA2006-61-CVE-2006-4568-343168.txt 3_0008-MFSA-2006-63-CVE-2006-4570-346984-mail-only.txt 3_0009-MFSA2006-64-CVE-2006-4571-346980-grant-cellmap-patch.txt 3_0010-MFSA2006-64-CVE-2006-4571-Section-3-5-Part-1-4-345967.txt 3_0011-MFSA2006-64-CVE-2006-4571-Section-3-5-Part-3-4-348532.txt 3_0012-MFSA2006-64-CVE-2006-4571-Section-4-5-Part-1-20-268575.txt 3_0013-MFSA2006-64-CVE-2006-4571-Section-4-5-Part-2-20-306940.txt 3_0014-MFSA2006-64-CVE-2006-4571-Section-4-5-Part-3-20-307826.txt 3_0015-MFSA2006-64-CVE-2006-4571-Section-4-5-Part-5-20-337419.txt 3_0016-MFSA2006-64-CVS-2006-4571-Section-4-5-Part-6-20-337883.txt 3_0018-MFSA2006-64-CVE-2006-4571-Section-4-5-Part-8a-20-348049.txt 3_0019-MFSA2006-64-CVE-2006-4571-Section-4-5-Part-8b-20-348049.txt 3_0020-MFSA2006-64-CVE-2006-4571-Section-4-5-Part-8c-20-348049.txt 3_0021-MFSA2006-64-CVE-2006-4571-Section-4-5-Part-8d-20-348049.txt 3_0022-MFSA2006-64-CVE-2006-4571-Section-4-5-Part-9-20-205735.txt 3_0023-MFSA2006-64-CVE-2006-4571-Section-4-5-Part-12-20-348062.txt 3_0024-MFSA2006-64-CVE-2006-4571-Section-4-5-Part-17-20-349201.txt 3_0025-MFSA2006-64-CVE-2006-4571-Section-5-5-344085.txt 3_0026-GetDepth-without-DEBUG-in-BlockFrame.txt 3_0028-MFSA2006-64-CVE-2006-4571-Section-4-5-Part-7-20-347355-without-svg-bug.txt stable/main/binary-alpha/mozilla-js-debugger_1.7.8-1sarge7.3.1_alpha.deb stable/main/binary-alpha/mozilla-mailnews_1.7.8-1sarge7.3.1_alpha.deb stable/main/binary-alpha/libnspr-dev_1.7.8-1sarge7.3.1_alpha.deb stable/main/binary-alpha/mozilla-dev_1.7.8-1sarge7.3.1_alpha.deb stable/main/binary-alpha/libnss-dev_1.7.8-1sarge7.3.1_alpha.deb stable/main/binary-alpha/mozilla-chatzilla_1.7.8-1sarge7.3.1_alpha.deb stable/main/binary-alpha/libnspr4_1.7.8-1sarge7.3.1_alpha.deb stable/main/binary-alpha/mozilla-psm_1.7.8-1sarge7.3.1_alpha.deb stable/main/binary-alpha/mozilla-dom-inspector_1.7.8-1sarge7.3.1_alpha.deb stable/main/binary-alpha/mozilla-calendar_1.7.8-1sarge7.3.1_alpha.deb stable/main/binary-alpha/mozilla-browser_1.7.8-1sarge7.3.1_alpha.deb stable/main/binary-alpha/mozilla_1.7.8-1sarge7.3.1_alpha.deb stable/main/binary-alpha/libnss3_1.7.8-1sarge7.3.1_alpha.deb mozilla (2:1.7.8-1sarge7.3.1) stable-security; urgency=critical * fixes various security issues. Patches are: 3_0001-no-mfsa-CVE-2006-2788-321598.txt 3_0002-MFSA2006-57-Part-1-2-CVE-2006-4565-346090.txt 3_0003-MFSA2006-57-Part-2-2-CVE-2006-4566-346794.txt 3_0004-MFSA2006-60-CVE-2006-4340-CVE-2006-4339-Part-1-3-350640.txt 3_0005-MFSA2006-60-CVE-2006-4340-CVE-2006-4339-Part-2-3-351079.txt 3_0006-MFSA2006-60-CVE-2006-4340-CVE-2006-4339-Part-3-3-351848.txt 3_0007-MFSA2006-61-CVE-2006-4568-343168.txt 3_0008-MFSA-2006-63-CVE-2006-4570-346984-mail-only.txt 3_0009-MFSA2006-64-CVE-2006-4571-346980-grant-cellmap-patch.txt 3_0010-MFSA2006-64-CVE-2006-4571-Section-3-5-Part-1-4-345967.txt 3_0011-MFSA2006-64-CVE-2006-4571-Section-3-5-Part-3-4-348532.txt 3_0012-MFSA2006-64-CVE-2006-4571-Section-4-5-Part-1-20-268575.txt 3_0013-MFSA2006-64-CVE-2006-4571-Section-4-5-Part-2-20-306940.txt 3_0014-MFSA2006-64-CVE-2006-4571-Section-4-5-Part-3-20-307826.txt 3_0015-MFSA2006-64-CVE-2006-4571-Section-4-5-Part-5-20-337419.txt 3_0016-MFSA2006-64-CVS-2006-4571-Section-4-5-Part-6-20-337883.txt 3_0018-MFSA2006-64-CVE-2006-4571-Section-4-5-Part-8a-20-348049.txt 3_0019-MFSA2006-64-CVE-2006-4571-Section-4-5-Part-8b-20-348049.txt 3_0020-MFSA2006-64-CVE-2006-4571-Section-4-5-Part-8c-20-348049.txt 3_0021-MFSA2006-64-CVE-2006-4571-Section-4-5-Part-8d-20-348049.txt 3_0022-MFSA2006-64-CVE-2006-4571-Section-4-5-Part-9-20-205735.txt 3_0023-MFSA2006-64-CVE-2006-4571-Section-4-5-Part-12-20-348062.txt 3_0024-MFSA2006-64-CVE-2006-4571-Section-4-5-Part-17-20-349201.txt 3_0025-MFSA2006-64-CVE-2006-4571-Section-5-5-344085.txt 3_0026-GetDepth-without-DEBUG-in-BlockFrame.txt 3_0028-MFSA2006-64-CVE-2006-4571-Section-4-5-Part-7-20-347355-without-svg-bug.txt stable/main/binary-i386/libnspr-dev_1.7.8-1sarge7.3.1_i386.deb stable/main/binary-i386/libnss3_1.7.8-1sarge7.3.1_i386.deb stable/main/binary-i386/mozilla-browser_1.7.8-1sarge7.3.1_i386.deb stable/main/binary-i386/mozilla-dom-inspector_1.7.8-1sarge7.3.1_i386.deb stable/main/binary-i386/mozilla-psm_1.7.8-1sarge7.3.1_i386.deb stable/main/binary-i386/mozilla-dev_1.7.8-1sarge7.3.1_i386.deb stable/main/binary-i386/libnspr4_1.7.8-1sarge7.3.1_i386.deb stable/main/binary-i386/mozilla_1.7.8-1sarge7.3.1_i386.deb stable/main/source/mozilla_1.7.8-1sarge7.3.1.dsc stable/main/source/mozilla_1.7.8-1sarge7.3.1.diff.gz stable/main/binary-i386/mozilla-mailnews_1.7.8-1sarge7.3.1_i386.deb stable/main/binary-i386/mozilla-calendar_1.7.8-1sarge7.3.1_i386.deb stable/main/binary-i386/libnss-dev_1.7.8-1sarge7.3.1_i386.deb stable/main/binary-i386/mozilla-chatzilla_1.7.8-1sarge7.3.1_i386.deb stable/main/binary-i386/mozilla-js-debugger_1.7.8-1sarge7.3.1_i386.deb mozilla (2:1.7.8-1sarge7.3.1) stable-security; urgency=critical * fixes various security issues. Patches are: 3_0001-no-mfsa-CVE-2006-2788-321598.txt 3_0002-MFSA2006-57-Part-1-2-CVE-2006-4565-346090.txt 3_0003-MFSA2006-57-Part-2-2-CVE-2006-4566-346794.txt 3_0004-MFSA2006-60-CVE-2006-4340-CVE-2006-4339-Part-1-3-350640.txt 3_0005-MFSA2006-60-CVE-2006-4340-CVE-2006-4339-Part-2-3-351079.txt 3_0006-MFSA2006-60-CVE-2006-4340-CVE-2006-4339-Part-3-3-351848.txt 3_0007-MFSA2006-61-CVE-2006-4568-343168.txt 3_0008-MFSA-2006-63-CVE-2006-4570-346984-mail-only.txt 3_0009-MFSA2006-64-CVE-2006-4571-346980-grant-cellmap-patch.txt 3_0010-MFSA2006-64-CVE-2006-4571-Section-3-5-Part-1-4-345967.txt 3_0011-MFSA2006-64-CVE-2006-4571-Section-3-5-Part-3-4-348532.txt 3_0012-MFSA2006-64-CVE-2006-4571-Section-4-5-Part-1-20-268575.txt 3_0013-MFSA2006-64-CVE-2006-4571-Section-4-5-Part-2-20-306940.txt 3_0014-MFSA2006-64-CVE-2006-4571-Section-4-5-Part-3-20-307826.txt 3_0015-MFSA2006-64-CVE-2006-4571-Section-4-5-Part-5-20-337419.txt 3_0016-MFSA2006-64-CVS-2006-4571-Section-4-5-Part-6-20-337883.txt 3_0018-MFSA2006-64-CVE-2006-4571-Section-4-5-Part-8a-20-348049.txt 3_0019-MFSA2006-64-CVE-2006-4571-Section-4-5-Part-8b-20-348049.txt 3_0020-MFSA2006-64-CVE-2006-4571-Section-4-5-Part-8c-20-348049.txt 3_0021-MFSA2006-64-CVE-2006-4571-Section-4-5-Part-8d-20-348049.txt 3_0022-MFSA2006-64-CVE-2006-4571-Section-4-5-Part-9-20-205735.txt 3_0023-MFSA2006-64-CVE-2006-4571-Section-4-5-Part-12-20-348062.txt 3_0024-MFSA2006-64-CVE-2006-4571-Section-4-5-Part-17-20-349201.txt 3_0025-MFSA2006-64-CVE-2006-4571-Section-5-5-344085.txt 3_0026-GetDepth-without-DEBUG-in-BlockFrame.txt 3_0028-MFSA2006-64-CVE-2006-4571-Section-4-5-Part-7-20-347355-without-svg-bug.txt stable/main/binary-sparc/mysql-server-4.1_4.1.11a-4sarge7_sparc.deb stable/main/binary-sparc/libmysqlclient14_4.1.11a-4sarge7_sparc.deb stable/main/binary-sparc/libmysqlclient14-dev_4.1.11a-4sarge7_sparc.deb stable/main/binary-sparc/mysql-client-4.1_4.1.11a-4sarge7_sparc.deb mysql-dfsg-4.1 (4.1.11a-4sarge7) stable-security; urgency=low * SECURITY: MySQL when run on case-sensitive filesystems, allows remote authenticated users to create or access a database when the database name differs only in case from a database for which they have permissions. (CVE-2006-4226). Closes: #384798 * SECURITY: Certain SQL queries could crash the server and prevent master-slave replication from continue until manual intervention was taken. (CVE-2006-4380). Closes: #383165 stable/main/binary-s390/libmysqlclient14-dev_4.1.11a-4sarge7_s390.deb stable/main/binary-s390/mysql-server-4.1_4.1.11a-4sarge7_s390.deb stable/main/binary-s390/libmysqlclient14_4.1.11a-4sarge7_s390.deb stable/main/binary-s390/mysql-client-4.1_4.1.11a-4sarge7_s390.deb mysql-dfsg-4.1 (4.1.11a-4sarge7) stable-security; urgency=low * SECURITY: MySQL when run on case-sensitive filesystems, allows remote authenticated users to create or access a database when the database name differs only in case from a database for which they have permissions. (CVE-2006-4226). Closes: #384798 * SECURITY: Certain SQL queries could crash the server and prevent master-slave replication from continue until manual intervention was taken. (CVE-2006-4380). Closes: #383165 stable/main/binary-powerpc/mysql-client-4.1_4.1.11a-4sarge7_powerpc.deb stable/main/binary-powerpc/libmysqlclient14_4.1.11a-4sarge7_powerpc.deb stable/main/binary-powerpc/mysql-server-4.1_4.1.11a-4sarge7_powerpc.deb stable/main/binary-powerpc/libmysqlclient14-dev_4.1.11a-4sarge7_powerpc.deb mysql-dfsg-4.1 (4.1.11a-4sarge7) stable-security; urgency=low * SECURITY: MySQL when run on case-sensitive filesystems, allows remote authenticated users to create or access a database when the database name differs only in case from a database for which they have permissions. (CVE-2006-4226). Closes: #384798 * SECURITY: Certain SQL queries could crash the server and prevent master-slave replication from continue until manual intervention was taken. (CVE-2006-4380). Closes: #383165 stable/main/binary-mipsel/mysql-server-4.1_4.1.11a-4sarge7_mipsel.deb stable/main/binary-mipsel/mysql-client-4.1_4.1.11a-4sarge7_mipsel.deb stable/main/binary-mipsel/libmysqlclient14-dev_4.1.11a-4sarge7_mipsel.deb stable/main/binary-mipsel/libmysqlclient14_4.1.11a-4sarge7_mipsel.deb mysql-dfsg-4.1 (4.1.11a-4sarge7) stable-security; urgency=low * SECURITY: MySQL when run on case-sensitive filesystems, allows remote authenticated users to create or access a database when the database name differs only in case from a database for which they have permissions. (CVE-2006-4226). Closes: #384798 * SECURITY: Certain SQL queries could crash the server and prevent master-slave replication from continue until manual intervention was taken. (CVE-2006-4380). Closes: #383165 stable/main/binary-mips/mysql-client-4.1_4.1.11a-4sarge7_mips.deb stable/main/binary-mips/libmysqlclient14_4.1.11a-4sarge7_mips.deb stable/main/binary-mips/libmysqlclient14-dev_4.1.11a-4sarge7_mips.deb stable/main/binary-mips/mysql-server-4.1_4.1.11a-4sarge7_mips.deb mysql-dfsg-4.1 (4.1.11a-4sarge7) stable-security; urgency=low * SECURITY: MySQL when run on case-sensitive filesystems, allows remote authenticated users to create or access a database when the database name differs only in case from a database for which they have permissions. (CVE-2006-4226). Closes: #384798 * SECURITY: Certain SQL queries could crash the server and prevent master-slave replication from continue until manual intervention was taken. (CVE-2006-4380). Closes: #383165 stable/main/binary-m68k/libmysqlclient14_4.1.11a-4sarge7_m68k.deb stable/main/binary-m68k/mysql-client-4.1_4.1.11a-4sarge7_m68k.deb stable/main/binary-m68k/mysql-server-4.1_4.1.11a-4sarge7_m68k.deb stable/main/binary-m68k/libmysqlclient14-dev_4.1.11a-4sarge7_m68k.deb mysql-dfsg-4.1 (4.1.11a-4sarge7) stable-security; urgency=low * SECURITY: MySQL when run on case-sensitive filesystems, allows remote authenticated users to create or access a database when the database name differs only in case from a database for which they have permissions. (CVE-2006-4226). Closes: #384798 * SECURITY: Certain SQL queries could crash the server and prevent master-slave replication from continue until manual intervention was taken. (CVE-2006-4380). Closes: #383165 stable/main/binary-ia64/mysql-client-4.1_4.1.11a-4sarge7_ia64.deb stable/main/binary-ia64/libmysqlclient14-dev_4.1.11a-4sarge7_ia64.deb stable/main/binary-ia64/mysql-server-4.1_4.1.11a-4sarge7_ia64.deb stable/main/binary-ia64/libmysqlclient14_4.1.11a-4sarge7_ia64.deb mysql-dfsg-4.1 (4.1.11a-4sarge7) stable-security; urgency=low * SECURITY: MySQL when run on case-sensitive filesystems, allows remote authenticated users to create or access a database when the database name differs only in case from a database for which they have permissions. (CVE-2006-4226). Closes: #384798 * SECURITY: Certain SQL queries could crash the server and prevent master-slave replication from continue until manual intervention was taken. (CVE-2006-4380). Closes: #383165 stable/main/binary-hppa/libmysqlclient14-dev_4.1.11a-4sarge7_hppa.deb stable/main/binary-hppa/mysql-client-4.1_4.1.11a-4sarge7_hppa.deb stable/main/binary-hppa/libmysqlclient14_4.1.11a-4sarge7_hppa.deb stable/main/binary-hppa/mysql-server-4.1_4.1.11a-4sarge7_hppa.deb mysql-dfsg-4.1 (4.1.11a-4sarge7) stable-security; urgency=low * SECURITY: MySQL when run on case-sensitive filesystems, allows remote authenticated users to create or access a database when the database name differs only in case from a database for which they have permissions. (CVE-2006-4226). Closes: #384798 * SECURITY: Certain SQL queries could crash the server and prevent master-slave replication from continue until manual intervention was taken. (CVE-2006-4380). Closes: #383165 stable/main/binary-arm/libmysqlclient14-dev_4.1.11a-4sarge7_arm.deb stable/main/binary-arm/libmysqlclient14_4.1.11a-4sarge7_arm.deb stable/main/binary-arm/mysql-server-4.1_4.1.11a-4sarge7_arm.deb stable/main/binary-arm/mysql-client-4.1_4.1.11a-4sarge7_arm.deb mysql-dfsg-4.1 (4.1.11a-4sarge7) stable-security; urgency=low * SECURITY: MySQL when run on case-sensitive filesystems, allows remote authenticated users to create or access a database when the database name differs only in case from a database for which they have permissions. (CVE-2006-4226). Closes: #384798 * SECURITY: Certain SQL queries could crash the server and prevent master-slave replication from continue until manual intervention was taken. (CVE-2006-4380). Closes: #383165 stable/main/binary-alpha/libmysqlclient14-dev_4.1.11a-4sarge7_alpha.deb stable/main/binary-alpha/libmysqlclient14_4.1.11a-4sarge7_alpha.deb stable/main/binary-alpha/mysql-client-4.1_4.1.11a-4sarge7_alpha.deb stable/main/binary-alpha/mysql-server-4.1_4.1.11a-4sarge7_alpha.deb mysql-dfsg-4.1 (4.1.11a-4sarge7) stable-security; urgency=low * SECURITY: MySQL when run on case-sensitive filesystems, allows remote authenticated users to create or access a database when the database name differs only in case from a database for which they have permissions. (CVE-2006-4226). Closes: #384798 * SECURITY: Certain SQL queries could crash the server and prevent master-slave replication from continue until manual intervention was taken. (CVE-2006-4380). Closes: #383165 stable/main/source/mysql-dfsg-4.1_4.1.11a-4sarge7.dsc stable/main/binary-all/mysql-common-4.1_4.1.11a-4sarge7_all.deb stable/main/binary-i386/libmysqlclient14-dev_4.1.11a-4sarge7_i386.deb stable/main/source/mysql-dfsg-4.1_4.1.11a-4sarge7.diff.gz stable/main/binary-i386/mysql-server-4.1_4.1.11a-4sarge7_i386.deb stable/main/binary-i386/mysql-client-4.1_4.1.11a-4sarge7_i386.deb stable/main/binary-i386/libmysqlclient14_4.1.11a-4sarge7_i386.deb mysql-dfsg-4.1 (4.1.11a-4sarge7) stable-security; urgency=low * SECURITY: MySQL when run on case-sensitive filesystems, allows remote authenticated users to create or access a database when the database name differs only in case from a database for which they have permissions. (CVE-2006-4226). Closes: #384798 * SECURITY: Certain SQL queries could crash the server and prevent master-slave replication from continue until manual intervention was taken. (CVE-2006-4380). Closes: #383165 stable/main/binary-sparc/zope2.7_2.7.5-2sarge3_sparc.deb zope2.7 (2.7.5-2sarge3) stable-security; urgency=high * SECURITY UPDATE: Arbitrary file inclusion. * Disable 'csv_table' ReST directive in included docutils to prevent reading arbitrary files through ReST documents. stable/main/binary-s390/zope2.7_2.7.5-2sarge3_s390.deb zope2.7 (2.7.5-2sarge3) stable-security; urgency=high * SECURITY UPDATE: Arbitrary file inclusion. * Disable 'csv_table' ReST directive in included docutils to prevent reading arbitrary files through ReST documents. stable/main/binary-powerpc/zope2.7_2.7.5-2sarge3_powerpc.deb zope2.7 (2.7.5-2sarge3) stable-security; urgency=high * SECURITY UPDATE: Arbitrary file inclusion. * Disable 'csv_table' ReST directive in included docutils to prevent reading arbitrary files through ReST documents. stable/main/binary-mipsel/zope2.7_2.7.5-2sarge3_mipsel.deb zope2.7 (2.7.5-2sarge3) stable-security; urgency=high * SECURITY UPDATE: Arbitrary file inclusion. * Disable 'csv_table' ReST directive in included docutils to prevent reading arbitrary files through ReST documents. stable/main/binary-mips/zope2.7_2.7.5-2sarge3_mips.deb zope2.7 (2.7.5-2sarge3) stable-security; urgency=high * SECURITY UPDATE: Arbitrary file inclusion. * Disable 'csv_table' ReST directive in included docutils to prevent reading arbitrary files through ReST documents. stable/main/binary-m68k/zope2.7_2.7.5-2sarge3_m68k.deb zope2.7 (2.7.5-2sarge3) stable-security; urgency=high * SECURITY UPDATE: Arbitrary file inclusion. * Disable 'csv_table' ReST directive in included docutils to prevent reading arbitrary files through ReST documents. stable/main/binary-ia64/zope2.7_2.7.5-2sarge3_ia64.deb zope2.7 (2.7.5-2sarge3) stable-security; urgency=high * SECURITY UPDATE: Arbitrary file inclusion. * Disable 'csv_table' ReST directive in included docutils to prevent reading arbitrary files through ReST documents. stable/main/binary-hppa/zope2.7_2.7.5-2sarge3_hppa.deb zope2.7 (2.7.5-2sarge3) stable-security; urgency=high * SECURITY UPDATE: Arbitrary file inclusion. * Disable 'csv_table' ReST directive in included docutils to prevent reading arbitrary files through ReST documents. stable/main/binary-arm/zope2.7_2.7.5-2sarge3_arm.deb zope2.7 (2.7.5-2sarge3) stable-security; urgency=high * SECURITY UPDATE: Arbitrary file inclusion. * Disable 'csv_table' ReST directive in included docutils to prevent reading arbitrary files through ReST documents. stable/main/binary-alpha/zope2.7_2.7.5-2sarge3_alpha.deb zope2.7 (2.7.5-2sarge3) stable-security; urgency=high * SECURITY UPDATE: Arbitrary file inclusion. * Disable 'csv_table' ReST directive in included docutils to prevent reading arbitrary files through ReST documents. stable/main/binary-i386/zope2.7_2.7.5-2sarge3_i386.deb stable/main/source/zope2.7_2.7.5-2sarge3.dsc stable/main/source/zope2.7_2.7.5-2sarge3.diff.gz zope2.7 (2.7.5-2sarge3) stable-security; urgency=high * SECURITY UPDATE: Arbitrary file inclusion. * Disable 'csv_table' ReST directive in included docutils to prevent reading arbitrary files through ReST documents. stable/main/binary-all/usermin-gnupg_1.110-3.1_all.deb stable/main/binary-all/usermin_1.110-3.1_all.deb stable/main/binary-all/usermin-postgresql_1.110-3.1_all.deb stable/main/binary-all/usermin-usermount_1.110-3.1_all.deb stable/main/binary-all/usermin-htaccess_1.110-3.1_all.deb stable/main/binary-all/usermin-cron_1.110-3.1_all.deb stable/main/binary-all/usermin-procmail_1.110-3.1_all.deb stable/main/binary-all/usermin-htpasswd_1.110-3.1_all.deb stable/main/source/usermin_1.110-3.1.diff.gz stable/main/binary-all/usermin-cshrc_1.110-3.1_all.deb stable/main/binary-all/usermin-man_1.110-3.1_all.deb stable/main/binary-all/usermin-mailbox_1.110-3.1_all.deb stable/main/binary-all/usermin-schedule_1.110-3.1_all.deb stable/main/binary-all/usermin-at_1.110-3.1_all.deb stable/main/binary-all/usermin-spamassassin_1.110-3.1_all.deb stable/main/binary-all/usermin-shell_1.110-3.1_all.deb stable/main/binary-all/usermin-fetchmail_1.110-3.1_all.deb stable/main/binary-all/usermin-quota_1.110-3.1_all.deb stable/main/binary-all/usermin-mysql_1.110-3.1_all.deb stable/main/binary-all/usermin-forward_1.110-3.1_all.deb stable/main/binary-all/usermin-commands_1.110-3.1_all.deb stable/main/source/usermin_1.110-3.1.dsc stable/main/binary-all/usermin-plan_1.110-3.1_all.deb stable/main/binary-all/usermin-proc_1.110-3.1_all.deb stable/main/binary-all/usermin-tunnel_1.110-3.1_all.deb stable/main/binary-all/usermin-changepass_1.110-3.1_all.deb stable/main/binary-all/usermin-ssh_1.110-3.1_all.deb stable/main/binary-all/usermin-updown_1.110-3.1_all.deb stable/main/binary-all/usermin-chfn_1.110-3.1_all.deb usermin (1.110-3.1) stable-security; urgency=high * Non-maintainer upload by the Security Team * Applied patch by Hendrik Weimer to prevent unauthorised setting of the root shell [chfn/save.cgi, CVE-2006-4246, Bug#374609] stable/main/source/trac_0.8.1-3sarge5.diff.gz stable/main/binary-all/trac_0.8.1-3sarge5_all.deb stable/main/source/trac_0.8.1-3sarge5.dsc trac (0.8.1-3sarge5) stable-security; urgency=high * Non-maintainer Upload by the Security Team * Backported upstream patch to fix file disclosure [trac/wikimacros/rst.py, debian/patches/12_CVE-2006-3695.patch] stable/main/source/systemimager_3.2.3-6sarge3.dsc stable/main/binary-all/systemimager-boot-i386-standard_3.2.3-6sarge3_all.deb stable/main/binary-all/systemimager-server-flamethrowerd_3.2.3-6sarge3_all.deb stable/main/source/systemimager_3.2.3-6sarge3.tar.gz stable/main/binary-all/systemimager-common_3.2.3-6sarge3_all.deb stable/main/binary-all/systemimager-server_3.2.3-6sarge3_all.deb stable/main/binary-all/systemimager-client_3.2.3-6sarge3_all.deb stable/main/binary-all/systemimager-doc_3.2.3-6sarge3_all.deb stable/main/binary-all/systemimager-boot-ia64-standard_3.2.3-6sarge3_all.deb systemimager (3.2.3-6sarge3) stable-security; urgency=high * Build against kernel-tree-2.4.27-10sarge4: * [ERRATA] 213_madvise_remove-restrict.diff [SECURITY] The 2.4.27-10sarge3 changelog associated this patch with CVE-2006-1524. However, this patch fixes an mprotect issue that was split off from the original report into CVE-2006-2071. 2.4.27 is not vulnerable to CVE-2006-1524 the madvise_remove issue. See CVE-2006-2071 * 223_nfs-handle-long-symlinks.diff [SECURITY] Fix buffer overflow in NFS readline handling that allows a remote server to cause a denial of service (crash) via a long symlink See CVE-2005-4798 * 224_cdrom-bad-cgc.buflen-assign.diff [SECURITY] Fix buffer overflow in dvd_read_bca which could potentially be used by a local user to trigger a buffer overflow via a specially crafted DVD, USB stick, or similar automatically mounted device. See CVE-2006-2935 * 225_sg-no-mmap-VM_IO.diff [SECURITY] Fix DoS vulnerability whereby a local user could attempt a dio/mmap and cause the sg driver to oops. See CVE-2006-1528 * 226_snmp-nat-mem-corruption-fix.diff [SECURITY] Fix memory corruption in snmp_trap_decode See CVE-2006-2444 * 227_kfree_skb.diff [SECURITY] Fix race between kfree_skb and __skb_unlink See CVE-2006-2446 * 228_sparc-mb-extraneous-semicolons.diff Fix a syntax error caused by extranous semicolons in smp_mb() macros which resulted in a build failure with 227_kfree_skb.diff * 229_sctp-priv-elevation.diff, 230_sctp-priv-elevation-2.diff [SECURITY] Fix SCTP privelege escalation See CVE-2006-3745 * 231_udf-deadlock.diff [SECURITY] Fix possible UDF deadlock and memory corruption See CVE-2006-4145 * 232_sparc-membar-extraneous-semicolons.diff Fix an additional syntax error caused by extraneous semicolons in membar macros on sparc stable/main/binary-sparc/streamripper_1.61.7-1sarge1_sparc.deb streamripper (1.61.7-1sarge1) stable-security; urgency=high * Non-maintainer upload by the Security Team: * Fix bufferoverflows in lib/http.c [CVE-2006-3124] stable/main/binary-s390/streamripper_1.61.7-1sarge1_s390.deb streamripper (1.61.7-1sarge1) stable-security; urgency=high * Non-maintainer upload by the Security Team: * Fix bufferoverflows in lib/http.c [CVE-2006-3124] stable/main/binary-powerpc/streamripper_1.61.7-1sarge1_powerpc.deb streamripper (1.61.7-1sarge1) stable-security; urgency=high * Non-maintainer upload by the Security Team: * Fix bufferoverflows in lib/http.c [CVE-2006-3124] stable/main/binary-mipsel/streamripper_1.61.7-1sarge1_mipsel.deb streamripper (1.61.7-1sarge1) stable-security; urgency=high * Non-maintainer upload by the Security Team: * Fix bufferoverflows in lib/http.c [CVE-2006-3124] stable/main/binary-mips/streamripper_1.61.7-1sarge1_mips.deb streamripper (1.61.7-1sarge1) stable-security; urgency=high * Non-maintainer upload by the Security Team: * Fix bufferoverflows in lib/http.c [CVE-2006-3124] stable/main/binary-m68k/streamripper_1.61.7-1sarge1_m68k.deb streamripper (1.61.7-1sarge1) stable-security; urgency=high * Non-maintainer upload by the Security Team: * Fix bufferoverflows in lib/http.c [CVE-2006-3124] stable/main/binary-ia64/streamripper_1.61.7-1sarge1_ia64.deb streamripper (1.61.7-1sarge1) stable-security; urgency=high * Non-maintainer upload by the Security Team: * Fix bufferoverflows in lib/http.c [CVE-2006-3124] stable/main/binary-hppa/streamripper_1.61.7-1sarge1_hppa.deb streamripper (1.61.7-1sarge1) stable-security; urgency=high * Non-maintainer upload by the Security Team: * Fix bufferoverflows in lib/http.c [CVE-2006-3124] stable/main/binary-arm/streamripper_1.61.7-1sarge1_arm.deb streamripper (1.61.7-1sarge1) stable-security; urgency=high * Non-maintainer upload by the Security Team: * Fix bufferoverflows in lib/http.c [CVE-2006-3124] stable/main/binary-alpha/streamripper_1.61.7-1sarge1_alpha.deb streamripper (1.61.7-1sarge1) stable-security; urgency=high * Non-maintainer upload by the Security Team: * Fix bufferoverflows in lib/http.c [CVE-2006-3124] stable/main/source/streamripper_1.61.7-1sarge1.diff.gz stable/main/source/streamripper_1.61.7-1sarge1.dsc stable/main/binary-i386/streamripper_1.61.7-1sarge1_i386.deb streamripper (1.61.7-1sarge1) stable-security; urgency=high * Non-maintainer upload by the Security Team: * Fix bufferoverflows in lib/http.c [CVE-2006-3124] stable/main/binary-sparc/sensible-mda_8.13.4-3sarge3_sparc.deb stable/main/binary-sparc/sendmail-bin_8.13.4-3sarge3_sparc.deb stable/main/binary-sparc/rmail_8.13.4-3sarge3_sparc.deb stable/main/binary-sparc/libmilter0_8.13.4-3sarge3_sparc.deb stable/main/binary-sparc/libmilter-dev_8.13.4-3sarge3_sparc.deb sendmail (8.13.4-3sarge3) stable-security; urgency=high * Non-maintainer upload by the Security Team * Applied patch to fix denial of service, Bug#385054, CVE-2006-4434, debian/patches/8.13/8.13.4/z_CVE-2006-4434.patch stable/main/binary-s390/sendmail-bin_8.13.4-3sarge3_s390.deb stable/main/binary-s390/libmilter-dev_8.13.4-3sarge3_s390.deb stable/main/binary-s390/libmilter0_8.13.4-3sarge3_s390.deb stable/main/binary-s390/sensible-mda_8.13.4-3sarge3_s390.deb stable/main/binary-s390/rmail_8.13.4-3sarge3_s390.deb sendmail (8.13.4-3sarge3) stable-security; urgency=high * Non-maintainer upload by the Security Team * Applied patch to fix denial of service, Bug#385054, CVE-2006-4434, debian/patches/8.13/8.13.4/z_CVE-2006-4434.patch stable/main/binary-powerpc/rmail_8.13.4-3sarge3_powerpc.deb stable/main/binary-powerpc/sendmail-bin_8.13.4-3sarge3_powerpc.deb stable/main/binary-powerpc/libmilter0_8.13.4-3sarge3_powerpc.deb stable/main/binary-powerpc/libmilter-dev_8.13.4-3sarge3_powerpc.deb stable/main/binary-powerpc/sensible-mda_8.13.4-3sarge3_powerpc.deb sendmail (8.13.4-3sarge3) stable-security; urgency=high * Non-maintainer upload by the Security Team * Applied patch to fix denial of service, Bug#385054, CVE-2006-4434, debian/patches/8.13/8.13.4/z_CVE-2006-4434.patch stable/main/binary-mipsel/sensible-mda_8.13.4-3sarge3_mipsel.deb stable/main/binary-mipsel/sendmail-bin_8.13.4-3sarge3_mipsel.deb stable/main/binary-mipsel/rmail_8.13.4-3sarge3_mipsel.deb stable/main/binary-mipsel/libmilter0_8.13.4-3sarge3_mipsel.deb stable/main/binary-mipsel/libmilter-dev_8.13.4-3sarge3_mipsel.deb sendmail (8.13.4-3sarge3) stable-security; urgency=high * Non-maintainer upload by the Security Team * Applied patch to fix denial of service, Bug#385054, CVE-2006-4434, debian/patches/8.13/8.13.4/z_CVE-2006-4434.patch stable/main/binary-mips/rmail_8.13.4-3sarge3_mips.deb stable/main/binary-mips/libmilter-dev_8.13.4-3sarge3_mips.deb stable/main/binary-mips/libmilter0_8.13.4-3sarge3_mips.deb stable/main/binary-mips/sendmail-bin_8.13.4-3sarge3_mips.deb stable/main/binary-mips/sensible-mda_8.13.4-3sarge3_mips.deb sendmail (8.13.4-3sarge3) stable-security; urgency=high * Non-maintainer upload by the Security Team * Applied patch to fix denial of service, Bug#385054, CVE-2006-4434, debian/patches/8.13/8.13.4/z_CVE-2006-4434.patch stable/main/binary-m68k/libmilter0_8.13.4-3sarge3_m68k.deb stable/main/binary-m68k/libmilter-dev_8.13.4-3sarge3_m68k.deb stable/main/binary-m68k/rmail_8.13.4-3sarge3_m68k.deb stable/main/binary-m68k/sensible-mda_8.13.4-3sarge3_m68k.deb stable/main/binary-m68k/sendmail-bin_8.13.4-3sarge3_m68k.deb sendmail (8.13.4-3sarge3) stable-security; urgency=high * Non-maintainer upload by the Security Team * Applied patch to fix denial of service, Bug#385054, CVE-2006-4434, debian/patches/8.13/8.13.4/z_CVE-2006-4434.patch stable/main/binary-ia64/rmail_8.13.4-3sarge3_ia64.deb stable/main/binary-ia64/sensible-mda_8.13.4-3sarge3_ia64.deb stable/main/binary-ia64/sendmail-bin_8.13.4-3sarge3_ia64.deb stable/main/binary-ia64/libmilter0_8.13.4-3sarge3_ia64.deb stable/main/binary-ia64/libmilter-dev_8.13.4-3sarge3_ia64.deb sendmail (8.13.4-3sarge3) stable-security; urgency=high * Non-maintainer upload by the Security Team * Applied patch to fix denial of service, Bug#385054, CVE-2006-4434, debian/patches/8.13/8.13.4/z_CVE-2006-4434.patch stable/main/binary-hppa/rmail_8.13.4-3sarge3_hppa.deb stable/main/binary-hppa/libmilter-dev_8.13.4-3sarge3_hppa.deb stable/main/binary-hppa/sendmail-bin_8.13.4-3sarge3_hppa.deb stable/main/binary-hppa/sensible-mda_8.13.4-3sarge3_hppa.deb stable/main/binary-hppa/libmilter0_8.13.4-3sarge3_hppa.deb sendmail (8.13.4-3sarge3) stable-security; urgency=high * Non-maintainer upload by the Security Team * Applied patch to fix denial of service, Bug#385054, CVE-2006-4434, debian/patches/8.13/8.13.4/z_CVE-2006-4434.patch stable/main/binary-arm/libmilter-dev_8.13.4-3sarge3_arm.deb stable/main/binary-arm/sensible-mda_8.13.4-3sarge3_arm.deb stable/main/binary-arm/sendmail-bin_8.13.4-3sarge3_arm.deb stable/main/binary-arm/libmilter0_8.13.4-3sarge3_arm.deb stable/main/binary-arm/rmail_8.13.4-3sarge3_arm.deb sendmail (8.13.4-3sarge3) stable-security; urgency=high * Non-maintainer upload by the Security Team * Applied patch to fix denial of service, Bug#385054, CVE-2006-4434, debian/patches/8.13/8.13.4/z_CVE-2006-4434.patch stable/main/binary-alpha/libmilter-dev_8.13.4-3sarge3_alpha.deb stable/main/binary-alpha/rmail_8.13.4-3sarge3_alpha.deb stable/main/binary-alpha/sendmail-bin_8.13.4-3sarge3_alpha.deb stable/main/binary-alpha/libmilter0_8.13.4-3sarge3_alpha.deb stable/main/binary-alpha/sensible-mda_8.13.4-3sarge3_alpha.deb sendmail (8.13.4-3sarge3) stable-security; urgency=high * Non-maintainer upload by the Security Team * Applied patch to fix denial of service, Bug#385054, CVE-2006-4434, debian/patches/8.13/8.13.4/z_CVE-2006-4434.patch stable/main/binary-all/sendmail-doc_8.13.4-3sarge3_all.deb stable/main/binary-all/sendmail_8.13.4-3sarge3_all.deb stable/main/binary-i386/sensible-mda_8.13.4-3sarge3_i386.deb stable/main/source/sendmail_8.13.4-3sarge3.dsc stable/main/binary-i386/libmilter0_8.13.4-3sarge3_i386.deb stable/main/binary-i386/libmilter-dev_8.13.4-3sarge3_i386.deb stable/main/binary-all/sendmail-base_8.13.4-3sarge3_all.deb stable/main/binary-all/sendmail-cf_8.13.4-3sarge3_all.deb stable/main/binary-i386/sendmail-bin_8.13.4-3sarge3_i386.deb stable/main/source/sendmail_8.13.4-3sarge3.diff.gz stable/main/binary-i386/rmail_8.13.4-3sarge3_i386.deb sendmail (8.13.4-3sarge3) stable-security; urgency=high * Non-maintainer upload by the Security Team * Applied patch to fix denial of service, Bug#385054, CVE-2006-4434, debian/patches/8.13/8.13.4/z_CVE-2006-4434.patch stable/main/binary-sparc/libruby1.8-dbg_1.8.2-7sarge4_sparc.deb stable/main/binary-sparc/ruby1.8_1.8.2-7sarge4_sparc.deb stable/main/binary-sparc/libopenssl-ruby1.8_1.8.2-7sarge4_sparc.deb stable/main/binary-sparc/ruby1.8-dev_1.8.2-7sarge4_sparc.deb stable/main/binary-sparc/libgdbm-ruby1.8_1.8.2-7sarge4_sparc.deb stable/main/binary-sparc/libdbm-ruby1.8_1.8.2-7sarge4_sparc.deb stable/main/binary-sparc/libtcltk-ruby1.8_1.8.2-7sarge4_sparc.deb stable/main/binary-sparc/libreadline-ruby1.8_1.8.2-7sarge4_sparc.deb stable/main/binary-sparc/libruby1.8_1.8.2-7sarge4_sparc.deb ruby1.8 (1.8.2-7sarge4) stable-security; urgency=high * akira yamada <akira@debian.org> - added debian/patches/903_JVN-83768862.patch and debian/patches/904_JVN-13947696.patch from Kobayashi Noritada (closes: #378029): - JVN#83768862: Alias features cannot handle safe levels correclty, so it can be safety bypass. - JVN#13947696: Some methods have defects that they can call other methods, which really should be prohibited, in safe level 4. stable/main/binary-s390/ruby1.8-dev_1.8.2-7sarge4_s390.deb stable/main/binary-s390/ruby1.8_1.8.2-7sarge4_s390.deb stable/main/binary-s390/libdbm-ruby1.8_1.8.2-7sarge4_s390.deb stable/main/binary-s390/libtcltk-ruby1.8_1.8.2-7sarge4_s390.deb stable/main/binary-s390/libreadline-ruby1.8_1.8.2-7sarge4_s390.deb stable/main/binary-s390/libruby1.8-dbg_1.8.2-7sarge4_s390.deb stable/main/binary-s390/libruby1.8_1.8.2-7sarge4_s390.deb stable/main/binary-s390/libopenssl-ruby1.8_1.8.2-7sarge4_s390.deb stable/main/binary-s390/libgdbm-ruby1.8_1.8.2-7sarge4_s390.deb ruby1.8 (1.8.2-7sarge4) stable-security; urgency=high * akira yamada <akira@debian.org> - added debian/patches/903_JVN-83768862.patch and debian/patches/904_JVN-13947696.patch from Kobayashi Noritada (closes: #378029): - JVN#83768862: Alias features cannot handle safe levels correclty, so it can be safety bypass. - JVN#13947696: Some methods have defects that they can call other methods, which really should be prohibited, in safe level 4. stable/main/binary-powerpc/libruby1.8_1.8.2-7sarge4_powerpc.deb stable/main/binary-powerpc/libgdbm-ruby1.8_1.8.2-7sarge4_powerpc.deb stable/main/binary-powerpc/libruby1.8-dbg_1.8.2-7sarge4_powerpc.deb stable/main/binary-powerpc/libreadline-ruby1.8_1.8.2-7sarge4_powerpc.deb stable/main/binary-powerpc/libdbm-ruby1.8_1.8.2-7sarge4_powerpc.deb stable/main/binary-powerpc/ruby1.8_1.8.2-7sarge4_powerpc.deb stable/main/binary-powerpc/ruby1.8-dev_1.8.2-7sarge4_powerpc.deb stable/main/binary-powerpc/libtcltk-ruby1.8_1.8.2-7sarge4_powerpc.deb stable/main/binary-powerpc/libopenssl-ruby1.8_1.8.2-7sarge4_powerpc.deb ruby1.8 (1.8.2-7sarge4) stable-security; urgency=high * akira yamada <akira@debian.org> - added debian/patches/903_JVN-83768862.patch and debian/patches/904_JVN-13947696.patch from Kobayashi Noritada (closes: #378029): - JVN#83768862: Alias features cannot handle safe levels correclty, so it can be safety bypass. - JVN#13947696: Some methods have defects that they can call other methods, which really should be prohibited, in safe level 4. stable/main/binary-mipsel/libtcltk-ruby1.8_1.8.2-7sarge4_mipsel.deb stable/main/binary-mipsel/libreadline-ruby1.8_1.8.2-7sarge4_mipsel.deb stable/main/binary-mipsel/libruby1.8_1.8.2-7sarge4_mipsel.deb stable/main/binary-mipsel/libruby1.8-dbg_1.8.2-7sarge4_mipsel.deb stable/main/binary-mipsel/ruby1.8-dev_1.8.2-7sarge4_mipsel.deb stable/main/binary-mipsel/libopenssl-ruby1.8_1.8.2-7sarge4_mipsel.deb stable/main/binary-mipsel/libgdbm-ruby1.8_1.8.2-7sarge4_mipsel.deb stable/main/binary-mipsel/libdbm-ruby1.8_1.8.2-7sarge4_mipsel.deb stable/main/binary-mipsel/ruby1.8_1.8.2-7sarge4_mipsel.deb ruby1.8 (1.8.2-7sarge4) stable-security; urgency=high * akira yamada <akira@debian.org> - added debian/patches/903_JVN-83768862.patch and debian/patches/904_JVN-13947696.patch from Kobayashi Noritada (closes: #378029): - JVN#83768862: Alias features cannot handle safe levels correclty, so it can be safety bypass. - JVN#13947696: Some methods have defects that they can call other methods, which really should be prohibited, in safe level 4. stable/main/binary-mips/libopenssl-ruby1.8_1.8.2-7sarge4_mips.deb stable/main/binary-mips/ruby1.8-dev_1.8.2-7sarge4_mips.deb stable/main/binary-mips/libgdbm-ruby1.8_1.8.2-7sarge4_mips.deb stable/main/binary-mips/libdbm-ruby1.8_1.8.2-7sarge4_mips.deb stable/main/binary-mips/libreadline-ruby1.8_1.8.2-7sarge4_mips.deb stable/main/binary-mips/ruby1.8_1.8.2-7sarge4_mips.deb stable/main/binary-mips/libruby1.8_1.8.2-7sarge4_mips.deb stable/main/binary-mips/libtcltk-ruby1.8_1.8.2-7sarge4_mips.deb stable/main/binary-mips/libruby1.8-dbg_1.8.2-7sarge4_mips.deb ruby1.8 (1.8.2-7sarge4) stable-security; urgency=high * akira yamada <akira@debian.org> - added debian/patches/903_JVN-83768862.patch and debian/patches/904_JVN-13947696.patch from Kobayashi Noritada (closes: #378029): - JVN#83768862: Alias features cannot handle safe levels correclty, so it can be safety bypass. - JVN#13947696: Some methods have defects that they can call other methods, which really should be prohibited, in safe level 4. stable/main/binary-m68k/libdbm-ruby1.8_1.8.2-7sarge4_m68k.deb stable/main/binary-m68k/libgdbm-ruby1.8_1.8.2-7sarge4_m68k.deb stable/main/binary-m68k/libopenssl-ruby1.8_1.8.2-7sarge4_m68k.deb stable/main/binary-m68k/libreadline-ruby1.8_1.8.2-7sarge4_m68k.deb stable/main/binary-m68k/libtcltk-ruby1.8_1.8.2-7sarge4_m68k.deb stable/main/binary-m68k/ruby1.8-dev_1.8.2-7sarge4_m68k.deb stable/main/binary-m68k/libruby1.8_1.8.2-7sarge4_m68k.deb stable/main/binary-m68k/ruby1.8_1.8.2-7sarge4_m68k.deb stable/main/binary-m68k/libruby1.8-dbg_1.8.2-7sarge4_m68k.deb ruby1.8 (1.8.2-7sarge4) stable-security; urgency=high * akira yamada <akira@debian.org> - added debian/patches/903_JVN-83768862.patch and debian/patches/904_JVN-13947696.patch from Kobayashi Noritada (closes: #378029): - JVN#83768862: Alias features cannot handle safe levels correclty, so it can be safety bypass. - JVN#13947696: Some methods have defects that they can call other methods, which really should be prohibited, in safe level 4. stable/main/binary-ia64/ruby1.8-dev_1.8.2-7sarge4_ia64.deb stable/main/binary-ia64/libdbm-ruby1.8_1.8.2-7sarge4_ia64.deb stable/main/binary-ia64/libopenssl-ruby1.8_1.8.2-7sarge4_ia64.deb stable/main/binary-ia64/libgdbm-ruby1.8_1.8.2-7sarge4_ia64.deb stable/main/binary-ia64/libreadline-ruby1.8_1.8.2-7sarge4_ia64.deb stable/main/binary-ia64/libruby1.8_1.8.2-7sarge4_ia64.deb stable/main/binary-ia64/libtcltk-ruby1.8_1.8.2-7sarge4_ia64.deb stable/main/binary-ia64/libruby1.8-dbg_1.8.2-7sarge4_ia64.deb stable/main/binary-ia64/ruby1.8_1.8.2-7sarge4_ia64.deb ruby1.8 (1.8.2-7sarge4) stable-security; urgency=high * akira yamada <akira@debian.org> - added debian/patches/903_JVN-83768862.patch and debian/patches/904_JVN-13947696.patch from Kobayashi Noritada (closes: #378029): - JVN#83768862: Alias features cannot handle safe levels correclty, so it can be safety bypass. - JVN#13947696: Some methods have defects that they can call other methods, which really should be prohibited, in safe level 4. stable/main/binary-hppa/libopenssl-ruby1.8_1.8.2-7sarge4_hppa.deb stable/main/binary-hppa/libdbm-ruby1.8_1.8.2-7sarge4_hppa.deb stable/main/binary-hppa/ruby1.8_1.8.2-7sarge4_hppa.deb stable/main/binary-hppa/libruby1.8-dbg_1.8.2-7sarge4_hppa.deb stable/main/binary-hppa/libreadline-ruby1.8_1.8.2-7sarge4_hppa.deb stable/main/binary-hppa/libruby1.8_1.8.2-7sarge4_hppa.deb stable/main/binary-hppa/ruby1.8-dev_1.8.2-7sarge4_hppa.deb stable/main/binary-hppa/libtcltk-ruby1.8_1.8.2-7sarge4_hppa.deb stable/main/binary-hppa/libgdbm-ruby1.8_1.8.2-7sarge4_hppa.deb ruby1.8 (1.8.2-7sarge4) stable-security; urgency=high * akira yamada <akira@debian.org> - added debian/patches/903_JVN-83768862.patch and debian/patches/904_JVN-13947696.patch from Kobayashi Noritada (closes: #378029): - JVN#83768862: Alias features cannot handle safe levels correclty, so it can be safety bypass. - JVN#13947696: Some methods have defects that they can call other methods, which really should be prohibited, in safe level 4. stable/main/binary-arm/libgdbm-ruby1.8_1.8.2-7sarge4_arm.deb stable/main/binary-arm/libruby1.8-dbg_1.8.2-7sarge4_arm.deb stable/main/binary-arm/libopenssl-ruby1.8_1.8.2-7sarge4_arm.deb stable/main/binary-arm/libdbm-ruby1.8_1.8.2-7sarge4_arm.deb stable/main/binary-arm/libreadline-ruby1.8_1.8.2-7sarge4_arm.deb stable/main/binary-arm/ruby1.8-dev_1.8.2-7sarge4_arm.deb stable/main/binary-arm/libtcltk-ruby1.8_1.8.2-7sarge4_arm.deb stable/main/binary-arm/ruby1.8_1.8.2-7sarge4_arm.deb stable/main/binary-arm/libruby1.8_1.8.2-7sarge4_arm.deb ruby1.8 (1.8.2-7sarge4) stable-security; urgency=high * akira yamada <akira@debian.org> - added debian/patches/903_JVN-83768862.patch and debian/patches/904_JVN-13947696.patch from Kobayashi Noritada (closes: #378029): - JVN#83768862: Alias features cannot handle safe levels correclty, so it can be safety bypass. - JVN#13947696: Some methods have defects that they can call other methods, which really should be prohibited, in safe level 4. stable/main/binary-alpha/ruby1.8-dev_1.8.2-7sarge4_alpha.deb stable/main/binary-alpha/ruby1.8_1.8.2-7sarge4_alpha.deb stable/main/binary-alpha/libtcltk-ruby1.8_1.8.2-7sarge4_alpha.deb stable/main/binary-alpha/libruby1.8_1.8.2-7sarge4_alpha.deb stable/main/binary-alpha/libruby1.8-dbg_1.8.2-7sarge4_alpha.deb stable/main/binary-alpha/libopenssl-ruby1.8_1.8.2-7sarge4_alpha.deb stable/main/binary-alpha/libreadline-ruby1.8_1.8.2-7sarge4_alpha.deb stable/main/binary-alpha/libdbm-ruby1.8_1.8.2-7sarge4_alpha.deb stable/main/binary-alpha/libgdbm-ruby1.8_1.8.2-7sarge4_alpha.deb ruby1.8 (1.8.2-7sarge4) stable-security; urgency=high * akira yamada <akira@debian.org> - added debian/patches/903_JVN-83768862.patch and debian/patches/904_JVN-13947696.patch from Kobayashi Noritada (closes: #378029): - JVN#83768862: Alias features cannot handle safe levels correclty, so it can be safety bypass. - JVN#13947696: Some methods have defects that they can call other methods, which really should be prohibited, in safe level 4. stable/main/binary-all/ruby1.8-examples_1.8.2-7sarge4_all.deb stable/main/binary-i386/libreadline-ruby1.8_1.8.2-7sarge4_i386.deb stable/main/binary-all/irb1.8_1.8.2-7sarge4_all.deb stable/main/binary-all/rdoc1.8_1.8.2-7sarge4_all.deb stable/main/source/ruby1.8_1.8.2-7sarge4.diff.gz stable/main/binary-i386/libdbm-ruby1.8_1.8.2-7sarge4_i386.deb stable/main/binary-all/ruby1.8-elisp_1.8.2-7sarge4_all.deb stable/main/source/ruby1.8_1.8.2-7sarge4.dsc stable/main/binary-i386/libruby1.8_1.8.2-7sarge4_i386.deb stable/main/binary-i386/libopenssl-ruby1.8_1.8.2-7sarge4_i386.deb stable/main/binary-i386/libgdbm-ruby1.8_1.8.2-7sarge4_i386.deb stable/main/binary-i386/ruby1.8_1.8.2-7sarge4_i386.deb stable/main/binary-all/ri1.8_1.8.2-7sarge4_all.deb stable/main/binary-i386/libtcltk-ruby1.8_1.8.2-7sarge4_i386.deb stable/main/binary-i386/libruby1.8-dbg_1.8.2-7sarge4_i386.deb stable/main/binary-i386/ruby1.8-dev_1.8.2-7sarge4_i386.deb ruby1.8 (1.8.2-7sarge4) stable-security; urgency=high * akira yamada <akira@debian.org> - added debian/patches/903_JVN-83768862.patch and debian/patches/904_JVN-13947696.patch from Kobayashi Noritada (closes: #378029): - JVN#83768862: Alias features cannot handle safe levels correclty, so it can be safety bypass. - JVN#13947696: Some methods have defects that they can call other methods, which really should be prohibited, in safe level 4. stable/main/binary-all/python2.1-textwrap_0.3.7-2sarge1_all.deb stable/main/source/python-docutils_0.3.7-2sarge1.diff.gz stable/main/source/python-docutils_0.3.7-2sarge1.dsc stable/main/binary-all/python2.1-difflib_0.3.7-2sarge1_all.deb stable/main/binary-all/python2.2-textwrap_0.3.7-2sarge1_all.deb stable/main/binary-all/python2.2-docutils_0.3.7-2sarge1_all.deb stable/main/binary-all/python-roman_0.3.7-2sarge1_all.deb stable/main/binary-all/python-docutils_0.3.7-2sarge1_all.deb stable/main/binary-all/python2.3-docutils_0.3.7-2sarge1_all.deb stable/main/binary-all/python2.4-docutils_0.3.7-2sarge1_all.deb python-docutils (0.3.7-2sarge1) stable-security; urgency=high * Non-maintainer upload by the Security Team * Backported changes from 0.3.9 to support new settings file_insertion_enabled and raw_enabled, needed to fix CVE-2006-3695 in trac [docutils/parsers/rst/__init__.py, docutils/parsers/rst/directives/misc.py, docutils/parsers/rst/directives/images.py, docutils/parsers/rst/directives/tables.py] stable/main/binary-sparc/libssl0.9.7_0.9.7e-3sarge4_sparc.deb stable/main/binary-sparc/libssl-dev_0.9.7e-3sarge4_sparc.deb stable/main/binary-sparc/openssl_0.9.7e-3sarge4_sparc.deb stable/main/binary-sparc/libcrypto0.9.7-udeb_0.9.7e-3sarge4_sparc.udeb openssl (0.9.7e-3sarge4) stable-security; urgency=high * Non-maintainer upload by the Security Team * Correct patch for CVE-2006-2940 to avoid the possibility of dereferencing an uninitialized pointer. stable/main/binary-s390/libssl0.9.7_0.9.7e-3sarge4_s390.deb stable/main/binary-s390/openssl_0.9.7e-3sarge4_s390.deb stable/main/binary-s390/libssl-dev_0.9.7e-3sarge4_s390.deb stable/main/binary-s390/libcrypto0.9.7-udeb_0.9.7e-3sarge4_s390.udeb openssl (0.9.7e-3sarge4) stable-security; urgency=high * Non-maintainer upload by the Security Team * Correct patch for CVE-2006-2940 to avoid the possibility of dereferencing an uninitialized pointer. stable/main/binary-powerpc/libssl0.9.7_0.9.7e-3sarge4_powerpc.deb stable/main/binary-powerpc/openssl_0.9.7e-3sarge4_powerpc.deb stable/main/binary-powerpc/libcrypto0.9.7-udeb_0.9.7e-3sarge4_powerpc.udeb stable/main/binary-powerpc/libssl-dev_0.9.7e-3sarge4_powerpc.deb openssl (0.9.7e-3sarge4) stable-security; urgency=high * Non-maintainer upload by the Security Team * Correct patch for CVE-2006-2940 to avoid the possibility of dereferencing an uninitialized pointer. stable/main/binary-mipsel/openssl_0.9.7e-3sarge4_mipsel.deb stable/main/binary-mipsel/libssl0.9.7_0.9.7e-3sarge4_mipsel.deb stable/main/binary-mipsel/libcrypto0.9.7-udeb_0.9.7e-3sarge4_mipsel.udeb stable/main/binary-mipsel/libssl-dev_0.9.7e-3sarge4_mipsel.deb openssl (0.9.7e-3sarge4) stable-security; urgency=high * Non-maintainer upload by the Security Team * Correct patch for CVE-2006-2940 to avoid the possibility of dereferencing an uninitialized pointer. stable/main/binary-mips/libssl-dev_0.9.7e-3sarge4_mips.deb stable/main/binary-mips/libssl0.9.7_0.9.7e-3sarge4_mips.deb stable/main/binary-mips/libcrypto0.9.7-udeb_0.9.7e-3sarge4_mips.udeb stable/main/binary-mips/openssl_0.9.7e-3sarge4_mips.deb openssl (0.9.7e-3sarge4) stable-security; urgency=high * Non-maintainer upload by the Security Team * Correct patch for CVE-2006-2940 to avoid the possibility of dereferencing an uninitialized pointer. stable/main/binary-m68k/libcrypto0.9.7-udeb_0.9.7e-3sarge4_m68k.udeb stable/main/binary-m68k/libssl0.9.7_0.9.7e-3sarge4_m68k.deb stable/main/binary-m68k/openssl_0.9.7e-3sarge4_m68k.deb stable/main/binary-m68k/libssl-dev_0.9.7e-3sarge4_m68k.deb openssl (0.9.7e-3sarge4) stable-security; urgency=high * Non-maintainer upload by the Security Team * Correct patch for CVE-2006-2940 to avoid the possibility of dereferencing an uninitialized pointer. stable/main/binary-ia64/libssl0.9.7_0.9.7e-3sarge4_ia64.deb stable/main/binary-ia64/libcrypto0.9.7-udeb_0.9.7e-3sarge4_ia64.udeb stable/main/binary-ia64/openssl_0.9.7e-3sarge4_ia64.deb stable/main/binary-ia64/libssl-dev_0.9.7e-3sarge4_ia64.deb openssl (0.9.7e-3sarge4) stable-security; urgency=high * Non-maintainer upload by the Security Team * Correct patch for CVE-2006-2940 to avoid the possibility of dereferencing an uninitialized pointer. stable/main/binary-hppa/openssl_0.9.7e-3sarge4_hppa.deb stable/main/binary-hppa/libssl0.9.7_0.9.7e-3sarge4_hppa.deb stable/main/binary-hppa/libssl-dev_0.9.7e-3sarge4_hppa.deb stable/main/binary-hppa/libcrypto0.9.7-udeb_0.9.7e-3sarge4_hppa.udeb openssl (0.9.7e-3sarge4) stable-security; urgency=high * Non-maintainer upload by the Security Team * Correct patch for CVE-2006-2940 to avoid the possibility of dereferencing an uninitialized pointer. stable/main/binary-arm/openssl_0.9.7e-3sarge4_arm.deb stable/main/binary-arm/libcrypto0.9.7-udeb_0.9.7e-3sarge4_arm.udeb stable/main/binary-arm/libssl-dev_0.9.7e-3sarge4_arm.deb stable/main/binary-arm/libssl0.9.7_0.9.7e-3sarge4_arm.deb openssl (0.9.7e-3sarge4) stable-security; urgency=high * Non-maintainer upload by the Security Team * Correct patch for CVE-2006-2940 to avoid the possibility of dereferencing an uninitialized pointer. stable/main/binary-alpha/libcrypto0.9.7-udeb_0.9.7e-3sarge4_alpha.udeb stable/main/binary-alpha/libssl-dev_0.9.7e-3sarge4_alpha.deb stable/main/binary-alpha/openssl_0.9.7e-3sarge4_alpha.deb stable/main/binary-alpha/libssl0.9.7_0.9.7e-3sarge4_alpha.deb openssl (0.9.7e-3sarge4) stable-security; urgency=high * Non-maintainer upload by the Security Team * Correct patch for CVE-2006-2940 to avoid the possibility of dereferencing an uninitialized pointer. stable/main/source/openssl_0.9.7e-3sarge4.diff.gz stable/main/binary-i386/libcrypto0.9.7-udeb_0.9.7e-3sarge4_i386.udeb stable/main/binary-i386/openssl_0.9.7e-3sarge4_i386.deb stable/main/binary-i386/libssl-dev_0.9.7e-3sarge4_i386.deb stable/main/source/openssl_0.9.7e-3sarge4.dsc stable/main/binary-i386/libssl0.9.7_0.9.7e-3sarge4_i386.deb openssl (0.9.7e-3sarge4) stable-security; urgency=high * Non-maintainer upload by the Security Team * Correct patch for CVE-2006-2940 to avoid the possibility of dereferencing an uninitialized pointer. stable/main/binary-sparc/ssh-krb5_3.8.1p1-7sarge1_sparc.deb openssh-krb5 (3.8.1p1-7sarge1) stable-security; urgency=high * Non-maintainer upload by the Security Team: * Fix potential code injection through double free() in fatal() signal handler. (CVE-2006-5051) * Fix CPU exhaustion vulnerability in CRC attack detection. (CVE-2006-4924) stable/main/binary-s390/ssh-krb5_3.8.1p1-7sarge1_s390.deb openssh-krb5 (3.8.1p1-7sarge1) stable-security; urgency=high * Non-maintainer upload by the Security Team: * Fix potential code injection through double free() in fatal() signal handler. (CVE-2006-5051) * Fix CPU exhaustion vulnerability in CRC attack detection. (CVE-2006-4924) stable/main/binary-powerpc/ssh-krb5_3.8.1p1-7sarge1_powerpc.deb openssh-krb5 (3.8.1p1-7sarge1) stable-security; urgency=high * Non-maintainer upload by the Security Team: * Fix potential code injection through double free() in fatal() signal handler. (CVE-2006-5051) * Fix CPU exhaustion vulnerability in CRC attack detection. (CVE-2006-4924) stable/main/binary-mipsel/ssh-krb5_3.8.1p1-7sarge1_mipsel.deb openssh-krb5 (3.8.1p1-7sarge1) stable-security; urgency=high * Non-maintainer upload by the Security Team: * Fix potential code injection through double free() in fatal() signal handler. (CVE-2006-5051) * Fix CPU exhaustion vulnerability in CRC attack detection. (CVE-2006-4924) stable/main/binary-mips/ssh-krb5_3.8.1p1-7sarge1_mips.deb openssh-krb5 (3.8.1p1-7sarge1) stable-security; urgency=high * Non-maintainer upload by the Security Team: * Fix potential code injection through double free() in fatal() signal handler. (CVE-2006-5051) * Fix CPU exhaustion vulnerability in CRC attack detection. (CVE-2006-4924) stable/main/binary-m68k/ssh-krb5_3.8.1p1-7sarge1_m68k.deb openssh-krb5 (3.8.1p1-7sarge1) stable-security; urgency=high * Non-maintainer upload by the Security Team: * Fix potential code injection through double free() in fatal() signal handler. (CVE-2006-5051) * Fix CPU exhaustion vulnerability in CRC attack detection. (CVE-2006-4924) stable/main/binary-ia64/ssh-krb5_3.8.1p1-7sarge1_ia64.deb openssh-krb5 (3.8.1p1-7sarge1) stable-security; urgency=high * Non-maintainer upload by the Security Team: * Fix potential code injection through double free() in fatal() signal handler. (CVE-2006-5051) * Fix CPU exhaustion vulnerability in CRC attack detection. (CVE-2006-4924) stable/main/binary-hppa/ssh-krb5_3.8.1p1-7sarge1_hppa.deb openssh-krb5 (3.8.1p1-7sarge1) stable-security; urgency=high * Non-maintainer upload by the Security Team: * Fix potential code injection through double free() in fatal() signal handler. (CVE-2006-5051) * Fix CPU exhaustion vulnerability in CRC attack detection. (CVE-2006-4924) stable/main/binary-arm/ssh-krb5_3.8.1p1-7sarge1_arm.deb openssh-krb5 (3.8.1p1-7sarge1) stable-security; urgency=high * Non-maintainer upload by the Security Team: * Fix potential code injection through double free() in fatal() signal handler. (CVE-2006-5051) * Fix CPU exhaustion vulnerability in CRC attack detection. (CVE-2006-4924) stable/main/binary-alpha/ssh-krb5_3.8.1p1-7sarge1_alpha.deb openssh-krb5 (3.8.1p1-7sarge1) stable-security; urgency=high * Non-maintainer upload by the Security Team: * Fix potential code injection through double free() in fatal() signal handler. (CVE-2006-5051) * Fix CPU exhaustion vulnerability in CRC attack detection. (CVE-2006-4924) stable/main/source/openssh-krb5_3.8.1p1-7sarge1.dsc stable/main/binary-i386/ssh-krb5_3.8.1p1-7sarge1_i386.deb stable/main/source/openssh-krb5_3.8.1p1-7sarge1.diff.gz openssh-krb5 (3.8.1p1-7sarge1) stable-security; urgency=high * Non-maintainer upload by the Security Team: * Fix potential code injection through double free() in fatal() signal handler. (CVE-2006-5051) * Fix CPU exhaustion vulnerability in CRC attack detection. (CVE-2006-4924) stable/main/binary-sparc/mailman_2.1.5-8sarge5_sparc.deb mailman (2.1.5-8sarge5) stable-security; urgency=high * Security update: log injection CVE-2006-4624 stable/main/binary-s390/mailman_2.1.5-8sarge5_s390.deb mailman (2.1.5-8sarge5) stable-security; urgency=high * Security update: log injection CVE-2006-4624 stable/main/binary-mipsel/mailman_2.1.5-8sarge5_mipsel.deb mailman (2.1.5-8sarge5) stable-security; urgency=high * Security update: log injection CVE-2006-4624 stable/main/binary-mips/mailman_2.1.5-8sarge5_mips.deb mailman (2.1.5-8sarge5) stable-security; urgency=high * Security update: log injection CVE-2006-4624 stable/main/binary-m68k/mailman_2.1.5-8sarge5_m68k.deb mailman (2.1.5-8sarge5) stable-security; urgency=high * Security update: log injection CVE-2006-4624 stable/main/binary-ia64/mailman_2.1.5-8sarge5_ia64.deb mailman (2.1.5-8sarge5) stable-security; urgency=high * Security update: log injection CVE-2006-4624 stable/main/binary-i386/mailman_2.1.5-8sarge5_i386.deb mailman (2.1.5-8sarge5) stable-security; urgency=high * Security update: log injection CVE-2006-4624 stable/main/binary-hppa/mailman_2.1.5-8sarge5_hppa.deb mailman (2.1.5-8sarge5) stable-security; urgency=high * Security update: log injection CVE-2006-4624 stable/main/binary-arm/mailman_2.1.5-8sarge5_arm.deb mailman (2.1.5-8sarge5) stable-security; urgency=high * Security update: log injection CVE-2006-4624 stable/main/binary-alpha/mailman_2.1.5-8sarge5_alpha.deb mailman (2.1.5-8sarge5) stable-security; urgency=high * Security update: log injection CVE-2006-4624 stable/main/source/mailman_2.1.5-8sarge5.dsc stable/main/binary-powerpc/mailman_2.1.5-8sarge5_powerpc.deb stable/main/source/mailman_2.1.5-8sarge5.diff.gz mailman (2.1.5-8sarge5) stable-security; urgency=high * Security update: log injection CVE-2006-4624 stable/main/binary-sparc/xfs-modules-2.4.27-3-sparc32-di_0.64sarge2_sparc.udeb stable/main/binary-sparc/reiserfs-modules-2.4.27-3-sparc32-di_0.64sarge2_sparc.udeb stable/main/source/linux-kernel-di-sparc_0.64sarge2.dsc stable/main/binary-sparc/ext3-modules-2.4.27-3-sparc64-di_0.64sarge2_sparc.udeb stable/main/binary-sparc/ext3-modules-2.4.27-3-sparc32-di_0.64sarge2_sparc.udeb stable/main/binary-sparc/kernel-image-2.4.27-3-sparc64-di_0.64sarge2_sparc.udeb stable/main/binary-sparc/nic-modules-2.4.27-3-sparc64-di_0.64sarge2_sparc.udeb stable/main/binary-sparc/firmware-modules-2.4.27-3-sparc64-di_0.64sarge2_sparc.udeb stable/main/binary-sparc/cdrom-core-modules-2.4.27-3-sparc32-di_0.64sarge2_sparc.udeb stable/main/binary-sparc/ipv6-modules-2.4.27-3-sparc64-di_0.64sarge2_sparc.udeb stable/main/binary-sparc/reiserfs-modules-2.4.27-3-sparc64-di_0.64sarge2_sparc.udeb stable/main/binary-sparc/loop-modules-2.4.27-3-sparc64-di_0.64sarge2_sparc.udeb stable/main/binary-sparc/ppp-modules-2.4.27-3-sparc32-di_0.64sarge2_sparc.udeb stable/main/binary-sparc/ppp-modules-2.4.27-3-sparc64-di_0.64sarge2_sparc.udeb stable/main/binary-sparc/md-modules-2.4.27-3-sparc64-di_0.64sarge2_sparc.udeb stable/main/binary-sparc/scsi-core-modules-2.4.27-3-sparc64-di_0.64sarge2_sparc.udeb stable/main/binary-sparc/ipv6-modules-2.4.27-3-sparc32-di_0.64sarge2_sparc.udeb stable/main/binary-sparc/nic-modules-2.4.27-3-sparc32-di_0.64sarge2_sparc.udeb stable/main/binary-sparc/scsi-modules-2.4.27-3-sparc32-di_0.64sarge2_sparc.udeb stable/main/binary-sparc/firewire-core-modules-2.4.27-3-sparc64-di_0.64sarge2_sparc.udeb stable/main/binary-sparc/cdrom-core-modules-2.4.27-3-sparc64-di_0.64sarge2_sparc.udeb stable/main/binary-sparc/scsi-core-modules-2.4.27-3-sparc32-di_0.64sarge2_sparc.udeb stable/main/source/linux-kernel-di-sparc_0.64sarge2.tar.gz stable/main/binary-sparc/xfs-modules-2.4.27-3-sparc64-di_0.64sarge2_sparc.udeb stable/main/binary-sparc/loop-modules-2.4.27-3-sparc32-di_0.64sarge2_sparc.udeb stable/main/binary-sparc/ide-modules-2.4.27-3-sparc64-di_0.64sarge2_sparc.udeb stable/main/binary-sparc/md-modules-2.4.27-3-sparc32-di_0.64sarge2_sparc.udeb stable/main/binary-sparc/scsi-modules-2.4.27-3-sparc64-di_0.64sarge2_sparc.udeb stable/main/binary-sparc/kernel-image-2.4.27-3-sparc32-di_0.64sarge2_sparc.udeb stable/main/binary-sparc/usb-modules-2.4.27-3-sparc64-di_0.64sarge2_sparc.udeb linux-kernel-di-sparc (0.64sarge2) stable; urgency=low * Rebuild because of missing modules in 0.64sarge1 for sparc32. stable/main/binary-sparc/libwmf-bin_0.2.8.3-2sarge1_sparc.deb stable/main/binary-sparc/libwmf0.2-7_0.2.8.3-2sarge1_sparc.deb stable/main/binary-sparc/libwmf-dev_0.2.8.3-2sarge1_sparc.deb libwmf (0.2.8.3-2sarge1) stable-security; urgency=high * NMU by the Security Team: * Fix integer overflow in player.c (CVE-2006-3376) stable/main/binary-s390/libwmf0.2-7_0.2.8.3-2sarge1_s390.deb stable/main/binary-s390/libwmf-bin_0.2.8.3-2sarge1_s390.deb stable/main/binary-s390/libwmf-dev_0.2.8.3-2sarge1_s390.deb libwmf (0.2.8.3-2sarge1) stable-security; urgency=high * NMU by the Security Team: * Fix integer overflow in player.c (CVE-2006-3376) stable/main/binary-powerpc/libwmf-bin_0.2.8.3-2sarge1_powerpc.deb stable/main/binary-powerpc/libwmf0.2-7_0.2.8.3-2sarge1_powerpc.deb stable/main/binary-powerpc/libwmf-dev_0.2.8.3-2sarge1_powerpc.deb libwmf (0.2.8.3-2sarge1) stable-security; urgency=high * NMU by the Security Team: * Fix integer overflow in player.c (CVE-2006-3376) stable/main/binary-mipsel/libwmf0.2-7_0.2.8.3-2sarge1_mipsel.deb stable/main/binary-mipsel/libwmf-bin_0.2.8.3-2sarge1_mipsel.deb stable/main/binary-mipsel/libwmf-dev_0.2.8.3-2sarge1_mipsel.deb libwmf (0.2.8.3-2sarge1) stable-security; urgency=high * NMU by the Security Team: * Fix integer overflow in player.c (CVE-2006-3376) stable/main/binary-mips/libwmf-bin_0.2.8.3-2sarge1_mips.deb stable/main/binary-mips/libwmf0.2-7_0.2.8.3-2sarge1_mips.deb stable/main/binary-mips/libwmf-dev_0.2.8.3-2sarge1_mips.deb libwmf (0.2.8.3-2sarge1) stable-security; urgency=high * NMU by the Security Team: * Fix integer overflow in player.c (CVE-2006-3376) stable/main/binary-m68k/libwmf-bin_0.2.8.3-2sarge1_m68k.deb stable/main/binary-m68k/libwmf-dev_0.2.8.3-2sarge1_m68k.deb stable/main/binary-m68k/libwmf0.2-7_0.2.8.3-2sarge1_m68k.deb libwmf (0.2.8.3-2sarge1) stable-security; urgency=high * NMU by the Security Team: * Fix integer overflow in player.c (CVE-2006-3376) stable/main/binary-ia64/libwmf-bin_0.2.8.3-2sarge1_ia64.deb stable/main/binary-ia64/libwmf0.2-7_0.2.8.3-2sarge1_ia64.deb stable/main/binary-ia64/libwmf-dev_0.2.8.3-2sarge1_ia64.deb libwmf (0.2.8.3-2sarge1) stable-security; urgency=high * NMU by the Security Team: * Fix integer overflow in player.c (CVE-2006-3376) stable/main/binary-hppa/libwmf0.2-7_0.2.8.3-2sarge1_hppa.deb stable/main/binary-hppa/libwmf-bin_0.2.8.3-2sarge1_hppa.deb stable/main/binary-hppa/libwmf-dev_0.2.8.3-2sarge1_hppa.deb libwmf (0.2.8.3-2sarge1) stable-security; urgency=high * NMU by the Security Team: * Fix integer overflow in player.c (CVE-2006-3376) stable/main/binary-arm/libwmf-dev_0.2.8.3-2sarge1_arm.deb stable/main/binary-arm/libwmf0.2-7_0.2.8.3-2sarge1_arm.deb stable/main/binary-arm/libwmf-bin_0.2.8.3-2sarge1_arm.deb libwmf (0.2.8.3-2sarge1) stable-security; urgency=high * NMU by the Security Team: * Fix integer overflow in player.c (CVE-2006-3376) stable/main/binary-alpha/libwmf-dev_0.2.8.3-2sarge1_alpha.deb stable/main/binary-alpha/libwmf0.2-7_0.2.8.3-2sarge1_alpha.deb stable/main/binary-alpha/libwmf-bin_0.2.8.3-2sarge1_alpha.deb libwmf (0.2.8.3-2sarge1) stable-security; urgency=high * NMU by the Security Team: * Fix integer overflow in player.c (CVE-2006-3376) stable/main/binary-i386/libwmf-dev_0.2.8.3-2sarge1_i386.deb stable/main/binary-i386/libwmf0.2-7_0.2.8.3-2sarge1_i386.deb stable/main/binary-all/libwmf-doc_0.2.8.3-2sarge1_all.deb stable/main/source/libwmf_0.2.8.3-2sarge1.dsc stable/main/source/libwmf_0.2.8.3-2sarge1.diff.gz stable/main/binary-i386/libwmf-bin_0.2.8.3-2sarge1_i386.deb libwmf (0.2.8.3-2sarge1) stable-security; urgency=high * NMU by the Security Team: * Fix integer overflow in player.c (CVE-2006-3376) stable/main/binary-sparc/libmusicbrainz4-dev_2.1.1-3sarge1_sparc.deb stable/main/binary-sparc/libmusicbrainz4_2.1.1-3sarge1_sparc.deb libmusicbrainz-2.1 (2.1.1-3sarge1) stable-security; urgency=high * Non-maintainer upload by the Security Team * Added patch by Lukász Lalinsky and me to fix several buffer overflows [lib/http.cpp, lib/rdfparse.c, debian/patches/02-CVE-2006-4197.patch] stable/main/binary-s390/libmusicbrainz4-dev_2.1.1-3sarge1_s390.deb stable/main/binary-s390/libmusicbrainz4_2.1.1-3sarge1_s390.deb libmusicbrainz-2.1 (2.1.1-3sarge1) stable-security; urgency=high * Non-maintainer upload by the Security Team * Added patch by Lukász Lalinsky and me to fix several buffer overflows [lib/http.cpp, lib/rdfparse.c, debian/patches/02-CVE-2006-4197.patch] stable/main/binary-mipsel/libmusicbrainz4-dev_2.1.1-3sarge1_mipsel.deb stable/main/binary-mipsel/libmusicbrainz4_2.1.1-3sarge1_mipsel.deb libmusicbrainz-2.1 (2.1.1-3sarge1) stable-security; urgency=high * Non-maintainer upload by the Security Team * Added patch by Lukász Lalinsky and me to fix several buffer overflows [lib/http.cpp, lib/rdfparse.c, debian/patches/02-CVE-2006-4197.patch] stable/main/binary-mips/libmusicbrainz4-dev_2.1.1-3sarge1_mips.deb stable/main/binary-mips/libmusicbrainz4_2.1.1-3sarge1_mips.deb libmusicbrainz-2.1 (2.1.1-3sarge1) stable-security; urgency=high * Non-maintainer upload by the Security Team * Added patch by Lukász Lalinsky and me to fix several buffer overflows [lib/http.cpp, lib/rdfparse.c, debian/patches/02-CVE-2006-4197.patch] stable/main/binary-m68k/libmusicbrainz4_2.1.1-3sarge1_m68k.deb stable/main/binary-m68k/libmusicbrainz4-dev_2.1.1-3sarge1_m68k.deb libmusicbrainz-2.1 (2.1.1-3sarge1) stable-security; urgency=high * Non-maintainer upload by the Security Team * Added patch by Lukász Lalinsky and me to fix several buffer overflows [lib/http.cpp, lib/rdfparse.c, debian/patches/02-CVE-2006-4197.patch] stable/main/binary-ia64/libmusicbrainz4-dev_2.1.1-3sarge1_ia64.deb stable/main/binary-ia64/libmusicbrainz4_2.1.1-3sarge1_ia64.deb libmusicbrainz-2.1 (2.1.1-3sarge1) stable-security; urgency=high * Non-maintainer upload by the Security Team * Added patch by Lukász Lalinsky and me to fix several buffer overflows [lib/http.cpp, lib/rdfparse.c, debian/patches/02-CVE-2006-4197.patch] stable/main/binary-i386/libmusicbrainz4_2.1.1-3sarge1_i386.deb stable/main/binary-i386/libmusicbrainz4-dev_2.1.1-3sarge1_i386.deb libmusicbrainz-2.1 (2.1.1-3sarge1) stable-security; urgency=high * Non-maintainer upload by the Security Team * Added patch by Lukász Lalinsky and me to fix several buffer overflows [lib/http.cpp, lib/rdfparse.c, debian/patches/02-CVE-2006-4197.patch] stable/main/binary-hppa/libmusicbrainz4-dev_2.1.1-3sarge1_hppa.deb stable/main/binary-hppa/libmusicbrainz4_2.1.1-3sarge1_hppa.deb libmusicbrainz-2.1 (2.1.1-3sarge1) stable-security; urgency=high * Non-maintainer upload by the Security Team * Added patch by Lukász Lalinsky and me to fix several buffer overflows [lib/http.cpp, lib/rdfparse.c, debian/patches/02-CVE-2006-4197.patch] stable/main/binary-arm/libmusicbrainz4-dev_2.1.1-3sarge1_arm.deb stable/main/binary-arm/libmusicbrainz4_2.1.1-3sarge1_arm.deb libmusicbrainz-2.1 (2.1.1-3sarge1) stable-security; urgency=high * Non-maintainer upload by the Security Team * Added patch by Lukász Lalinsky and me to fix several buffer overflows [lib/http.cpp, lib/rdfparse.c, debian/patches/02-CVE-2006-4197.patch] stable/main/binary-alpha/libmusicbrainz4-dev_2.1.1-3sarge1_alpha.deb stable/main/binary-alpha/libmusicbrainz4_2.1.1-3sarge1_alpha.deb libmusicbrainz-2.1 (2.1.1-3sarge1) stable-security; urgency=high * Non-maintainer upload by the Security Team * Added patch by Lukász Lalinsky and me to fix several buffer overflows [lib/http.cpp, lib/rdfparse.c, debian/patches/02-CVE-2006-4197.patch] stable/main/source/libmusicbrainz-2.1_2.1.1-3sarge1.dsc stable/main/binary-powerpc/libmusicbrainz4_2.1.1-3sarge1_powerpc.deb stable/main/binary-powerpc/libmusicbrainz4-dev_2.1.1-3sarge1_powerpc.deb stable/main/source/libmusicbrainz-2.1_2.1.1-3sarge1.diff.gz libmusicbrainz-2.1 (2.1.1-3sarge1) stable-security; urgency=high * Non-maintainer upload by the Security Team * Added patch by Lukász Lalinsky and me to fix several buffer overflows [lib/http.cpp, lib/rdfparse.c, debian/patches/02-CVE-2006-4197.patch] stable/main/binary-sparc/python2.1-musicbrainz_2.0.2-10sarge1_sparc.deb stable/main/binary-sparc/python2.2-musicbrainz_2.0.2-10sarge1_sparc.deb stable/main/binary-sparc/python-musicbrainz_2.0.2-10sarge1_sparc.deb stable/main/binary-sparc/python2.3-musicbrainz_2.0.2-10sarge1_sparc.deb stable/main/binary-sparc/libmusicbrainz2-dev_2.0.2-10sarge1_sparc.deb stable/main/binary-sparc/libmusicbrainz2_2.0.2-10sarge1_sparc.deb libmusicbrainz-2.0 (2.0.2-10sarge1) stable-security; urgency=high * Non-maintainer upload by the Security Team * Added patch by Lukász Lalinsky and me to fix several buffer overflows [lib/http.cpp, lib/rdfparse.c, debian/patches/03-CVE-2006-4197.patch] stable/main/binary-s390/python2.2-musicbrainz_2.0.2-10sarge1_s390.deb stable/main/binary-s390/python-musicbrainz_2.0.2-10sarge1_s390.deb stable/main/binary-s390/python2.1-musicbrainz_2.0.2-10sarge1_s390.deb stable/main/binary-s390/libmusicbrainz2_2.0.2-10sarge1_s390.deb stable/main/binary-s390/python2.3-musicbrainz_2.0.2-10sarge1_s390.deb stable/main/binary-s390/libmusicbrainz2-dev_2.0.2-10sarge1_s390.deb libmusicbrainz-2.0 (2.0.2-10sarge1) stable-security; urgency=high * Non-maintainer upload by the Security Team * Added patch by Lukász Lalinsky and me to fix several buffer overflows [lib/http.cpp, lib/rdfparse.c, debian/patches/03-CVE-2006-4197.patch] stable/main/binary-mipsel/python2.2-musicbrainz_2.0.2-10sarge1_mipsel.deb stable/main/binary-mipsel/python2.1-musicbrainz_2.0.2-10sarge1_mipsel.deb stable/main/binary-mipsel/python-musicbrainz_2.0.2-10sarge1_mipsel.deb stable/main/binary-mipsel/libmusicbrainz2_2.0.2-10sarge1_mipsel.deb stable/main/binary-mipsel/libmusicbrainz2-dev_2.0.2-10sarge1_mipsel.deb stable/main/binary-mipsel/python2.3-musicbrainz_2.0.2-10sarge1_mipsel.deb libmusicbrainz-2.0 (2.0.2-10sarge1) stable-security; urgency=high * Non-maintainer upload by the Security Team * Added patch by Lukász Lalinsky and me to fix several buffer overflows [lib/http.cpp, lib/rdfparse.c, debian/patches/03-CVE-2006-4197.patch] stable/main/binary-mips/libmusicbrainz2-dev_2.0.2-10sarge1_mips.deb stable/main/binary-mips/libmusicbrainz2_2.0.2-10sarge1_mips.deb stable/main/binary-mips/python2.2-musicbrainz_2.0.2-10sarge1_mips.deb stable/main/binary-mips/python2.3-musicbrainz_2.0.2-10sarge1_mips.deb stable/main/binary-mips/python2.1-musicbrainz_2.0.2-10sarge1_mips.deb stable/main/binary-mips/python-musicbrainz_2.0.2-10sarge1_mips.deb libmusicbrainz-2.0 (2.0.2-10sarge1) stable-security; urgency=high * Non-maintainer upload by the Security Team * Added patch by Lukász Lalinsky and me to fix several buffer overflows [lib/http.cpp, lib/rdfparse.c, debian/patches/03-CVE-2006-4197.patch] stable/main/binary-m68k/python2.3-musicbrainz_2.0.2-10sarge1_m68k.deb stable/main/binary-m68k/python-musicbrainz_2.0.2-10sarge1_m68k.deb stable/main/binary-m68k/libmusicbrainz2_2.0.2-10sarge1_m68k.deb stable/main/binary-m68k/python2.1-musicbrainz_2.0.2-10sarge1_m68k.deb stable/main/binary-m68k/libmusicbrainz2-dev_2.0.2-10sarge1_m68k.deb stable/main/binary-m68k/python2.2-musicbrainz_2.0.2-10sarge1_m68k.deb libmusicbrainz-2.0 (2.0.2-10sarge1) stable-security; urgency=high * Non-maintainer upload by the Security Team * Added patch by Lukász Lalinsky and me to fix several buffer overflows [lib/http.cpp, lib/rdfparse.c, debian/patches/03-CVE-2006-4197.patch] stable/main/binary-ia64/libmusicbrainz2-dev_2.0.2-10sarge1_ia64.deb stable/main/binary-ia64/python-musicbrainz_2.0.2-10sarge1_ia64.deb stable/main/binary-ia64/python2.1-musicbrainz_2.0.2-10sarge1_ia64.deb stable/main/binary-ia64/python2.3-musicbrainz_2.0.2-10sarge1_ia64.deb stable/main/binary-ia64/libmusicbrainz2_2.0.2-10sarge1_ia64.deb stable/main/binary-ia64/python2.2-musicbrainz_2.0.2-10sarge1_ia64.deb libmusicbrainz-2.0 (2.0.2-10sarge1) stable-security; urgency=high * Non-maintainer upload by the Security Team * Added patch by Lukász Lalinsky and me to fix several buffer overflows [lib/http.cpp, lib/rdfparse.c, debian/patches/03-CVE-2006-4197.patch] stable/main/binary-i386/python2.3-musicbrainz_2.0.2-10sarge1_i386.deb stable/main/binary-i386/python2.2-musicbrainz_2.0.2-10sarge1_i386.deb stable/main/binary-i386/python-musicbrainz_2.0.2-10sarge1_i386.deb stable/main/binary-i386/libmusicbrainz2_2.0.2-10sarge1_i386.deb stable/main/binary-i386/python2.1-musicbrainz_2.0.2-10sarge1_i386.deb stable/main/binary-i386/libmusicbrainz2-dev_2.0.2-10sarge1_i386.deb libmusicbrainz-2.0 (2.0.2-10sarge1) stable-security; urgency=high * Non-maintainer upload by the Security Team * Added patch by Lukász Lalinsky and me to fix several buffer overflows [lib/http.cpp, lib/rdfparse.c, debian/patches/03-CVE-2006-4197.patch] stable/main/binary-hppa/python-musicbrainz_2.0.2-10sarge1_hppa.deb stable/main/binary-hppa/libmusicbrainz2-dev_2.0.2-10sarge1_hppa.deb stable/main/binary-hppa/python2.2-musicbrainz_2.0.2-10sarge1_hppa.deb stable/main/binary-hppa/libmusicbrainz2_2.0.2-10sarge1_hppa.deb stable/main/binary-hppa/python2.1-musicbrainz_2.0.2-10sarge1_hppa.deb stable/main/binary-hppa/python2.3-musicbrainz_2.0.2-10sarge1_hppa.deb libmusicbrainz-2.0 (2.0.2-10sarge1) stable-security; urgency=high * Non-maintainer upload by the Security Team * Added patch by Lukász Lalinsky and me to fix several buffer overflows [lib/http.cpp, lib/rdfparse.c, debian/patches/03-CVE-2006-4197.patch] stable/main/binary-arm/libmusicbrainz2_2.0.2-10sarge1_arm.deb stable/main/binary-arm/python2.1-musicbrainz_2.0.2-10sarge1_arm.deb stable/main/binary-arm/libmusicbrainz2-dev_2.0.2-10sarge1_arm.deb stable/main/binary-arm/python2.3-musicbrainz_2.0.2-10sarge1_arm.deb stable/main/binary-arm/python-musicbrainz_2.0.2-10sarge1_arm.deb stable/main/binary-arm/python2.2-musicbrainz_2.0.2-10sarge1_arm.deb libmusicbrainz-2.0 (2.0.2-10sarge1) stable-security; urgency=high * Non-maintainer upload by the Security Team * Added patch by Lukász Lalinsky and me to fix several buffer overflows [lib/http.cpp, lib/rdfparse.c, debian/patches/03-CVE-2006-4197.patch] stable/main/binary-alpha/python2.2-musicbrainz_2.0.2-10sarge1_alpha.deb stable/main/binary-alpha/python-musicbrainz_2.0.2-10sarge1_alpha.deb stable/main/binary-alpha/libmusicbrainz2-dev_2.0.2-10sarge1_alpha.deb stable/main/binary-alpha/python2.3-musicbrainz_2.0.2-10sarge1_alpha.deb stable/main/binary-alpha/libmusicbrainz2_2.0.2-10sarge1_alpha.deb stable/main/binary-alpha/python2.1-musicbrainz_2.0.2-10sarge1_alpha.deb libmusicbrainz-2.0 (2.0.2-10sarge1) stable-security; urgency=high * Non-maintainer upload by the Security Team * Added patch by Lukász Lalinsky and me to fix several buffer overflows [lib/http.cpp, lib/rdfparse.c, debian/patches/03-CVE-2006-4197.patch] stable/main/source/libmusicbrainz-2.0_2.0.2-10sarge1.diff.gz stable/main/binary-powerpc/python-musicbrainz_2.0.2-10sarge1_powerpc.deb stable/main/binary-powerpc/libmusicbrainz2-dev_2.0.2-10sarge1_powerpc.deb stable/main/source/libmusicbrainz-2.0_2.0.2-10sarge1.dsc stable/main/binary-powerpc/libmusicbrainz2_2.0.2-10sarge1_powerpc.deb stable/main/binary-powerpc/python2.1-musicbrainz_2.0.2-10sarge1_powerpc.deb stable/main/binary-powerpc/python2.2-musicbrainz_2.0.2-10sarge1_powerpc.deb stable/main/binary-powerpc/python2.3-musicbrainz_2.0.2-10sarge1_powerpc.deb libmusicbrainz-2.0 (2.0.2-10sarge1) stable-security; urgency=high * Non-maintainer upload by the Security Team * Added patch by Lukász Lalinsky and me to fix several buffer overflows [lib/http.cpp, lib/rdfparse.c, debian/patches/03-CVE-2006-4197.patch] stable/main/binary-m68k/mips-tools_2.4.27-10.sarge4.040815-1_m68k.deb kernel-patch-2.4.27-mips (2.4.27-10.sarge4.040815-1) stable-security; urgency=high * Build against kernel-tree-2.4.27-10sarge4: * [ERRATA] 213_madvise_remove-restrict.diff [SECURITY] The 2.4.27-10sarge3 changelog associated this patch with CVE-2006-1524. However, this patch fixes an mprotect issue that was split off from the original report into CVE-2006-2071. 2.4.27 is not vulnerable to CVE-2006-1524 the madvise_remove issue. See CVE-2006-2071 * 223_nfs-handle-long-symlinks.diff [SECURITY] Fix buffer overflow in NFS readline handling that allows a remote server to cause a denial of service (crash) via a long symlink See CVE-2005-4798 * 224_cdrom-bad-cgc.buflen-assign.diff [SECURITY] Fix buffer overflow in dvd_read_bca which could potentially be used by a local user to trigger a buffer overflow via a specially crafted DVD, USB stick, or similar automatically mounted device. See CVE-2006-2935 * 225_sg-no-mmap-VM_IO.diff [SECURITY] Fix DoS vulnerability whereby a local user could attempt a dio/mmap and cause the sg driver to oops. See CVE-2006-1528 * 226_snmp-nat-mem-corruption-fix.diff [SECURITY] Fix memory corruption in snmp_trap_decode See CVE-2006-2444 * 227_kfree_skb.diff [SECURITY] Fix race between kfree_skb and __skb_unlink See CVE-2006-2446 * 228_sparc-mb-extraneous-semicolons.diff Fix a syntax error caused by extranous semicolons in smp_mb() macros which resulted in a build failure with 227_kfree_skb.diff * 229_sctp-priv-elevation.diff, 230_sctp-priv-elevation-2.diff [SECURITY] Fix SCTP privelege escalation See CVE-2006-3745 * 231_udf-deadlock.diff [SECURITY] Fix possible UDF deadlock and memory corruption See CVE-2006-4145 * 232_sparc-membar-extraneous-semicolons.diff Fix an additional syntax error caused by extraneous semicolons in membar macros on sparc stable/main/binary-ia64/mips-tools_2.4.27-10.sarge4.040815-1_ia64.deb kernel-patch-2.4.27-mips (2.4.27-10.sarge4.040815-1) stable-security; urgency=high * Build against kernel-tree-2.4.27-10sarge4: * [ERRATA] 213_madvise_remove-restrict.diff [SECURITY] The 2.4.27-10sarge3 changelog associated this patch with CVE-2006-1524. However, this patch fixes an mprotect issue that was split off from the original report into CVE-2006-2071. 2.4.27 is not vulnerable to CVE-2006-1524 the madvise_remove issue. See CVE-2006-2071 * 223_nfs-handle-long-symlinks.diff [SECURITY] Fix buffer overflow in NFS readline handling that allows a remote server to cause a denial of service (crash) via a long symlink See CVE-2005-4798 * 224_cdrom-bad-cgc.buflen-assign.diff [SECURITY] Fix buffer overflow in dvd_read_bca which could potentially be used by a local user to trigger a buffer overflow via a specially crafted DVD, USB stick, or similar automatically mounted device. See CVE-2006-2935 * 225_sg-no-mmap-VM_IO.diff [SECURITY] Fix DoS vulnerability whereby a local user could attempt a dio/mmap and cause the sg driver to oops. See CVE-2006-1528 * 226_snmp-nat-mem-corruption-fix.diff [SECURITY] Fix memory corruption in snmp_trap_decode See CVE-2006-2444 * 227_kfree_skb.diff [SECURITY] Fix race between kfree_skb and __skb_unlink See CVE-2006-2446 * 228_sparc-mb-extraneous-semicolons.diff Fix a syntax error caused by extranous semicolons in smp_mb() macros which resulted in a build failure with 227_kfree_skb.diff * 229_sctp-priv-elevation.diff, 230_sctp-priv-elevation-2.diff [SECURITY] Fix SCTP privelege escalation See CVE-2006-3745 * 231_udf-deadlock.diff [SECURITY] Fix possible UDF deadlock and memory corruption See CVE-2006-4145 * 232_sparc-membar-extraneous-semicolons.diff Fix an additional syntax error caused by extraneous semicolons in membar macros on sparc stable/main/binary-hppa/mips-tools_2.4.27-10.sarge4.040815-1_hppa.deb kernel-patch-2.4.27-mips (2.4.27-10.sarge4.040815-1) stable-security; urgency=high * Build against kernel-tree-2.4.27-10sarge4: * [ERRATA] 213_madvise_remove-restrict.diff [SECURITY] The 2.4.27-10sarge3 changelog associated this patch with CVE-2006-1524. However, this patch fixes an mprotect issue that was split off from the original report into CVE-2006-2071. 2.4.27 is not vulnerable to CVE-2006-1524 the madvise_remove issue. See CVE-2006-2071 * 223_nfs-handle-long-symlinks.diff [SECURITY] Fix buffer overflow in NFS readline handling that allows a remote server to cause a denial of service (crash) via a long symlink See CVE-2005-4798 * 224_cdrom-bad-cgc.buflen-assign.diff [SECURITY] Fix buffer overflow in dvd_read_bca which could potentially be used by a local user to trigger a buffer overflow via a specially crafted DVD, USB stick, or similar automatically mounted device. See CVE-2006-2935 * 225_sg-no-mmap-VM_IO.diff [SECURITY] Fix DoS vulnerability whereby a local user could attempt a dio/mmap and cause the sg driver to oops. See CVE-2006-1528 * 226_snmp-nat-mem-corruption-fix.diff [SECURITY] Fix memory corruption in snmp_trap_decode See CVE-2006-2444 * 227_kfree_skb.diff [SECURITY] Fix race between kfree_skb and __skb_unlink See CVE-2006-2446 * 228_sparc-mb-extraneous-semicolons.diff Fix a syntax error caused by extranous semicolons in smp_mb() macros which resulted in a build failure with 227_kfree_skb.diff * 229_sctp-priv-elevation.diff, 230_sctp-priv-elevation-2.diff [SECURITY] Fix SCTP privelege escalation See CVE-2006-3745 * 231_udf-deadlock.diff [SECURITY] Fix possible UDF deadlock and memory corruption See CVE-2006-4145 * 232_sparc-membar-extraneous-semicolons.diff Fix an additional syntax error caused by extraneous semicolons in membar macros on sparc stable/main/binary-arm/mips-tools_2.4.27-10.sarge4.040815-1_arm.deb kernel-patch-2.4.27-mips (2.4.27-10.sarge4.040815-1) stable-security; urgency=high * Build against kernel-tree-2.4.27-10sarge4: * [ERRATA] 213_madvise_remove-restrict.diff [SECURITY] The 2.4.27-10sarge3 changelog associated this patch with CVE-2006-1524. However, this patch fixes an mprotect issue that was split off from the original report into CVE-2006-2071. 2.4.27 is not vulnerable to CVE-2006-1524 the madvise_remove issue. See CVE-2006-2071 * 223_nfs-handle-long-symlinks.diff [SECURITY] Fix buffer overflow in NFS readline handling that allows a remote server to cause a denial of service (crash) via a long symlink See CVE-2005-4798 * 224_cdrom-bad-cgc.buflen-assign.diff [SECURITY] Fix buffer overflow in dvd_read_bca which could potentially be used by a local user to trigger a buffer overflow via a specially crafted DVD, USB stick, or similar automatically mounted device. See CVE-2006-2935 * 225_sg-no-mmap-VM_IO.diff [SECURITY] Fix DoS vulnerability whereby a local user could attempt a dio/mmap and cause the sg driver to oops. See CVE-2006-1528 * 226_snmp-nat-mem-corruption-fix.diff [SECURITY] Fix memory corruption in snmp_trap_decode See CVE-2006-2444 * 227_kfree_skb.diff [SECURITY] Fix race between kfree_skb and __skb_unlink See CVE-2006-2446 * 228_sparc-mb-extraneous-semicolons.diff Fix a syntax error caused by extranous semicolons in smp_mb() macros which resulted in a build failure with 227_kfree_skb.diff * 229_sctp-priv-elevation.diff, 230_sctp-priv-elevation-2.diff [SECURITY] Fix SCTP privelege escalation See CVE-2006-3745 * 231_udf-deadlock.diff [SECURITY] Fix possible UDF deadlock and memory corruption See CVE-2006-4145 * 232_sparc-membar-extraneous-semicolons.diff Fix an additional syntax error caused by extraneous semicolons in membar macros on sparc stable/main/binary-alpha/mips-tools_2.4.27-10.sarge4.040815-1_alpha.deb kernel-patch-2.4.27-mips (2.4.27-10.sarge4.040815-1) stable-security; urgency=high * Build against kernel-tree-2.4.27-10sarge4: * [ERRATA] 213_madvise_remove-restrict.diff [SECURITY] The 2.4.27-10sarge3 changelog associated this patch with CVE-2006-1524. However, this patch fixes an mprotect issue that was split off from the original report into CVE-2006-2071. 2.4.27 is not vulnerable to CVE-2006-1524 the madvise_remove issue. See CVE-2006-2071 * 223_nfs-handle-long-symlinks.diff [SECURITY] Fix buffer overflow in NFS readline handling that allows a remote server to cause a denial of service (crash) via a long symlink See CVE-2005-4798 * 224_cdrom-bad-cgc.buflen-assign.diff [SECURITY] Fix buffer overflow in dvd_read_bca which could potentially be used by a local user to trigger a buffer overflow via a specially crafted DVD, USB stick, or similar automatically mounted device. See CVE-2006-2935 * 225_sg-no-mmap-VM_IO.diff [SECURITY] Fix DoS vulnerability whereby a local user could attempt a dio/mmap and cause the sg driver to oops. See CVE-2006-1528 * 226_snmp-nat-mem-corruption-fix.diff [SECURITY] Fix memory corruption in snmp_trap_decode See CVE-2006-2444 * 227_kfree_skb.diff [SECURITY] Fix race between kfree_skb and __skb_unlink See CVE-2006-2446 * 228_sparc-mb-extraneous-semicolons.diff Fix a syntax error caused by extranous semicolons in smp_mb() macros which resulted in a build failure with 227_kfree_skb.diff * 229_sctp-priv-elevation.diff, 230_sctp-priv-elevation-2.diff [SECURITY] Fix SCTP privelege escalation See CVE-2006-3745 * 231_udf-deadlock.diff [SECURITY] Fix possible UDF deadlock and memory corruption See CVE-2006-4145 * 232_sparc-membar-extraneous-semicolons.diff Fix an additional syntax error caused by extraneous semicolons in membar macros on sparc stable/main/source/kernel-patch-2.4.27-mips_2.4.27-10.sarge4.040815-1.tar.gz stable/main/source/kernel-patch-2.4.27-mips_2.4.27-10.sarge4.040815-1.dsc stable/main/binary-i386/mips-tools_2.4.27-10.sarge4.040815-1_i386.deb kernel-patch-2.4.27-mips (2.4.27-10.sarge4.040815-1) stable-security; urgency=high * Build against kernel-tree-2.4.27-10sarge4: * [ERRATA] 213_madvise_remove-restrict.diff [SECURITY] The 2.4.27-10sarge3 changelog associated this patch with CVE-2006-1524. However, this patch fixes an mprotect issue that was split off from the original report into CVE-2006-2071. 2.4.27 is not vulnerable to CVE-2006-1524 the madvise_remove issue. See CVE-2006-2071 * 223_nfs-handle-long-symlinks.diff [SECURITY] Fix buffer overflow in NFS readline handling that allows a remote server to cause a denial of service (crash) via a long symlink See CVE-2005-4798 * 224_cdrom-bad-cgc.buflen-assign.diff [SECURITY] Fix buffer overflow in dvd_read_bca which could potentially be used by a local user to trigger a buffer overflow via a specially crafted DVD, USB stick, or similar automatically mounted device. See CVE-2006-2935 * 225_sg-no-mmap-VM_IO.diff [SECURITY] Fix DoS vulnerability whereby a local user could attempt a dio/mmap and cause the sg driver to oops. See CVE-2006-1528 * 226_snmp-nat-mem-corruption-fix.diff [SECURITY] Fix memory corruption in snmp_trap_decode See CVE-2006-2444 * 227_kfree_skb.diff [SECURITY] Fix race between kfree_skb and __skb_unlink See CVE-2006-2446 * 228_sparc-mb-extraneous-semicolons.diff Fix a syntax error caused by extranous semicolons in smp_mb() macros which resulted in a build failure with 227_kfree_skb.diff * 229_sctp-priv-elevation.diff, 230_sctp-priv-elevation-2.diff [SECURITY] Fix SCTP privelege escalation See CVE-2006-3745 * 231_udf-deadlock.diff [SECURITY] Fix possible UDF deadlock and memory corruption See CVE-2006-4145 * 232_sparc-membar-extraneous-semicolons.diff Fix an additional syntax error caused by extraneous semicolons in membar macros on sparc stable/main/source/kernel-image-speakup-i386_2.4.27-1.1sarge3.tar.gz stable/main/source/kernel-image-speakup-i386_2.4.27-1.1sarge3.dsc stable/main/binary-i386/kernel-headers-2.4.27-speakup_2.4.27-1.1sarge3_i386.deb stable/main/binary-i386/kernel-image-2.4.27-speakup_2.4.27-1.1sarge3_i386.deb stable/main/binary-all/kernel-doc-2.4.27-speakup_2.4.27-1.1sarge3_all.deb kernel-image-speakup-i386 (2.4.27-1.1sarge3) stable-security; urgency=high * Build against kernel-tree-2.4.27-10sarge4: * [ERRATA] 213_madvise_remove-restrict.diff [SECURITY] The 2.4.27-10sarge3 changelog associated this patch with CVE-2006-1524. However, this patch fixes an mprotect issue that was split off from the original report into CVE-2006-2071. 2.4.27 is not vulnerable to CVE-2006-1524 the madvise_remove issue. See CVE-2006-2071 * 223_nfs-handle-long-symlinks.diff [SECURITY] Fix buffer overflow in NFS readline handling that allows a remote server to cause a denial of service (crash) via a long symlink See CVE-2005-4798 * 224_cdrom-bad-cgc.buflen-assign.diff [SECURITY] Fix buffer overflow in dvd_read_bca which could potentially be used by a local user to trigger a buffer overflow via a specially crafted DVD, USB stick, or similar automatically mounted device. See CVE-2006-2935 * 225_sg-no-mmap-VM_IO.diff [SECURITY] Fix DoS vulnerability whereby a local user could attempt a dio/mmap and cause the sg driver to oops. See CVE-2006-1528 * 226_snmp-nat-mem-corruption-fix.diff [SECURITY] Fix memory corruption in snmp_trap_decode See CVE-2006-2444 * 227_kfree_skb.diff [SECURITY] Fix race between kfree_skb and __skb_unlink See CVE-2006-2446 * 228_sparc-mb-extraneous-semicolons.diff Fix a syntax error caused by extranous semicolons in smp_mb() macros which resulted in a build failure with 227_kfree_skb.diff * 229_sctp-priv-elevation.diff, 230_sctp-priv-elevation-2.diff [SECURITY] Fix SCTP privelege escalation See CVE-2006-3745 * 231_udf-deadlock.diff [SECURITY] Fix possible UDF deadlock and memory corruption See CVE-2006-4145 * 232_sparc-membar-extraneous-semicolons.diff Fix an additional syntax error caused by extraneous semicolons in membar macros on sparc stable/main/binary-sparc/kernel-image-2.6.8-3-sparc32_2.6.8-15sarge5_sparc.deb stable/main/source/kernel-image-2.6.8-sparc_2.6.8-15sarge5.tar.gz stable/main/source/kernel-image-2.6.8-sparc_2.6.8-15sarge5.dsc stable/main/binary-sparc/kernel-build-2.6.8-3_2.6.8-15sarge5_sparc.deb stable/main/binary-sparc/kernel-headers-2.6.8-3-sparc64-smp_2.6.8-15sarge5_sparc.deb stable/main/binary-sparc/kernel-headers-2.6.8-3-sparc64_2.6.8-15sarge5_sparc.deb stable/main/binary-sparc/kernel-headers-2.6.8-3_2.6.8-15sarge5_sparc.deb stable/main/binary-sparc/kernel-headers-2.6.8-3-sparc32_2.6.8-15sarge5_sparc.deb stable/main/binary-sparc/kernel-image-2.6.8-3-sparc64-smp_2.6.8-15sarge5_sparc.deb stable/main/binary-sparc/kernel-image-2.6.8-3-sparc64_2.6.8-15sarge5_sparc.deb kernel-image-2.6.8-sparc (2.6.8-15sarge5) stable-security; urgency=high * Build against kernel-tree-2.6.8-16sarge5: * [ERRATA] madvise_remove-restrict.dpatch [SECURITY] The 2.6.8-16sarge3 changelog associated this patch with CVE-2006-1524. However, this patch fixes an mprotect issue that was split off from the original report into CVE-2006-2071. 2.6.8 is not vulnerable to CVE-2006-1524 the madvise_remove issue. See CVE-2006-2071 * fs-ext3-bad-nfs-handle.dpatch [SECURITY] James McKenzie discovered a Denial of Service vulnerability in the NFS driver. When exporting an ext3 file system over NFS, a remote attacker could exploit this to trigger a file system panic by sending a specially crafted UDP packet. See CVE-2006-3468 * direct-io-write-mem-leak.dpatch [SECURITY] Fix memory leak in O_DIRECT write. See CVE-2004-2660 * nfs-handle-long-symlinks.dpatch [SECURITY] Fix buffer overflow in NFS readline handling that allows a remote server to cause a denial of service (crash) via a long symlink See CVE-2005-4798 * cdrom-bad-cgc.buflen-assign.dpatch [SECURITY] Fix buffer overflow in dvd_read_bca which could potentially be used by a local user to trigger a buffer overflow via a specially crafted DVD, USB stick, or similar automatically mounted device. See CVE-2006-2935 * usb-serial-ftdi_sio-dos.patch [SECURITY] fix userspace DoS in ftdi_sio driver See CVE-2006-2936 * selinux-tracer-SID-fix.dpatch [SECURITY] Fix vulnerability in selinux_ptrace that prevents local users from changing the tracer SID to the SID of another process See CVE-2006-1052 * netfilter-SO_ORIGINAL_DST-leak.dpatch [SECURITY] Fix information leak in SO_ORIGINAL_DST See CVE-2006-1343 * sg-no-mmap-VM_IO.dpatch [SECURITY] Fix DoS vulnerability whereby a local user could attempt a dio/mmap and cause the sg driver to oops. See CVE-2006-1528 * exit-bogus-bugon.dpatch [SECURITY] Remove bogus BUG() in exit.c which could be maliciously triggered by a local user See CVE-2006-1855 * readv-writev-missing-lsm-check.dpatch, readv-writev-missing-lsm-check-compat.dpatch [SECURITY] Add missing file_permission callback in readv/writev syscalls See CVE-2006-1856 * snmp-nat-mem-corruption-fix.dpatch [SECURITY] Fix memory corruption in snmp_trap_decode See CVE-2006-2444 * kfree_skb-race.dpatch [SECURITY] Fix race between kfree_skb and __skb_unlink See CVE-2006-2446 * hppa-mb-extraneous-semicolon.dpatch, sparc32-mb-extraneous-semicolons.dpatch, sparc64-mb-extraneous-semicolons.dpatch: Fix a syntax error caused by extranous semicolons in smp_mb() macros which resulted in a build failure with kfree_skb-race.dpatch * sctp-priv-elevation.dpatch [SECURITY] Fix SCTP privelege escalation See CVE-2006-3745 * sctp-priv-elevation-2.dpatch [SECURITY] Fix local DoS resulting from sctp-priv-elevation.dpatch See CVE-2006-4535 * ppc-hid0-dos.dpatch [SECURITY][ppc] Fix local DoS by clearing HID0 attention enable on PPC970 at boot time See CVE-2006-4093 * udf-deadlock.dpatch [SECURITY] Fix possible UDF deadlock and memory corruption See CVE-2006-4145 stable/main/binary-s390/kernel-image-2.6.8-3-s390x_2.6.8-5sarge5_s390.deb stable/main/binary-s390/kernel-image-2.6.8-3-s390_2.6.8-5sarge5_s390.deb stable/main/binary-s390/kernel-headers-2.6.8-3_2.6.8-5sarge5_s390.deb stable/main/binary-s390/kernel-image-2.6.8-3-s390-tape_2.6.8-5sarge5_s390.deb kernel-image-2.6.8-s390 (2.6.8-5sarge5) stable-security; urgency=high * Build against kernel-tree-2.6.8-16sarge5: * [ERRATA] madvise_remove-restrict.dpatch [SECURITY] The 2.6.8-16sarge3 changelog associated this patch with CVE-2006-1524. However, this patch fixes an mprotect issue that was split off from the original report into CVE-2006-2071. 2.6.8 is not vulnerable to CVE-2006-1524 the madvise_remove issue. See CVE-2006-2071 * fs-ext3-bad-nfs-handle.dpatch [SECURITY] James McKenzie discovered a Denial of Service vulnerability in the NFS driver. When exporting an ext3 file system over NFS, a remote attacker could exploit this to trigger a file system panic by sending a specially crafted UDP packet. See CVE-2006-3468 * direct-io-write-mem-leak.dpatch [SECURITY] Fix memory leak in O_DIRECT write. See CVE-2004-2660 * nfs-handle-long-symlinks.dpatch [SECURITY] Fix buffer overflow in NFS readline handling that allows a remote server to cause a denial of service (crash) via a long symlink See CVE-2005-4798 * cdrom-bad-cgc.buflen-assign.dpatch [SECURITY] Fix buffer overflow in dvd_read_bca which could potentially be used by a local user to trigger a buffer overflow via a specially crafted DVD, USB stick, or similar automatically mounted device. See CVE-2006-2935 * usb-serial-ftdi_sio-dos.patch [SECURITY] fix userspace DoS in ftdi_sio driver See CVE-2006-2936 * selinux-tracer-SID-fix.dpatch [SECURITY] Fix vulnerability in selinux_ptrace that prevents local users from changing the tracer SID to the SID of another process See CVE-2006-1052 * netfilter-SO_ORIGINAL_DST-leak.dpatch [SECURITY] Fix information leak in SO_ORIGINAL_DST See CVE-2006-1343 * sg-no-mmap-VM_IO.dpatch [SECURITY] Fix DoS vulnerability whereby a local user could attempt a dio/mmap and cause the sg driver to oops. See CVE-2006-1528 * exit-bogus-bugon.dpatch [SECURITY] Remove bogus BUG() in exit.c which could be maliciously triggered by a local user See CVE-2006-1855 * readv-writev-missing-lsm-check.dpatch, readv-writev-missing-lsm-check-compat.dpatch [SECURITY] Add missing file_permission callback in readv/writev syscalls See CVE-2006-1856 * snmp-nat-mem-corruption-fix.dpatch [SECURITY] Fix memory corruption in snmp_trap_decode See CVE-2006-2444 * kfree_skb-race.dpatch [SECURITY] Fix race between kfree_skb and __skb_unlink See CVE-2006-2446 * hppa-mb-extraneous-semicolon.dpatch, sparc32-mb-extraneous-semicolons.dpatch, sparc64-mb-extraneous-semicolons.dpatch: Fix a syntax error caused by extranous semicolons in smp_mb() macros which resulted in a build failure with kfree_skb-race.dpatch * sctp-priv-elevation.dpatch [SECURITY] Fix SCTP privelege escalation See CVE-2006-3745 * sctp-priv-elevation-2.dpatch [SECURITY] Fix local DoS resulting from sctp-priv-elevation.dpatch See CVE-2006-4535 * ppc-hid0-dos.dpatch [SECURITY][ppc] Fix local DoS by clearing HID0 attention enable on PPC970 at boot time See CVE-2006-4093 * udf-deadlock.dpatch [SECURITY] Fix possible UDF deadlock and memory corruption See CVE-2006-4145 stable/main/source/kernel-image-2.6.8-s390_2.6.8-5sarge5.tar.gz stable/main/source/kernel-image-2.6.8-s390_2.6.8-5sarge5.dsc stable/main/binary-all/kernel-patch-2.6.8-s390_2.6.8-5sarge5_all.deb kernel-image-2.6.8-s390 (2.6.8-5sarge5) stable-security; urgency=high * Build against kernel-tree-2.6.8-16sarge5: * [ERRATA] madvise_remove-restrict.dpatch [SECURITY] The 2.6.8-16sarge3 changelog associated this patch with CVE-2006-1524. However, this patch fixes an mprotect issue that was split off from the original report into CVE-2006-2071. 2.6.8 is not vulnerable to CVE-2006-1524 the madvise_remove issue. See CVE-2006-2071 * fs-ext3-bad-nfs-handle.dpatch [SECURITY] James McKenzie discovered a Denial of Service vulnerability in the NFS driver. When exporting an ext3 file system over NFS, a remote attacker could exploit this to trigger a file system panic by sending a specially crafted UDP packet. See CVE-2006-3468 * direct-io-write-mem-leak.dpatch [SECURITY] Fix memory leak in O_DIRECT write. See CVE-2004-2660 * nfs-handle-long-symlinks.dpatch [SECURITY] Fix buffer overflow in NFS readline handling that allows a remote server to cause a denial of service (crash) via a long symlink See CVE-2005-4798 * cdrom-bad-cgc.buflen-assign.dpatch [SECURITY] Fix buffer overflow in dvd_read_bca which could potentially be used by a local user to trigger a buffer overflow via a specially crafted DVD, USB stick, or similar automatically mounted device. See CVE-2006-2935 * usb-serial-ftdi_sio-dos.patch [SECURITY] fix userspace DoS in ftdi_sio driver See CVE-2006-2936 * selinux-tracer-SID-fix.dpatch [SECURITY] Fix vulnerability in selinux_ptrace that prevents local users from changing the tracer SID to the SID of another process See CVE-2006-1052 * netfilter-SO_ORIGINAL_DST-leak.dpatch [SECURITY] Fix information leak in SO_ORIGINAL_DST See CVE-2006-1343 * sg-no-mmap-VM_IO.dpatch [SECURITY] Fix DoS vulnerability whereby a local user could attempt a dio/mmap and cause the sg driver to oops. See CVE-2006-1528 * exit-bogus-bugon.dpatch [SECURITY] Remove bogus BUG() in exit.c which could be maliciously triggered by a local user See CVE-2006-1855 * readv-writev-missing-lsm-check.dpatch, readv-writev-missing-lsm-check-compat.dpatch [SECURITY] Add missing file_permission callback in readv/writev syscalls See CVE-2006-1856 * snmp-nat-mem-corruption-fix.dpatch [SECURITY] Fix memory corruption in snmp_trap_decode See CVE-2006-2444 * kfree_skb-race.dpatch [SECURITY] Fix race between kfree_skb and __skb_unlink See CVE-2006-2446 * hppa-mb-extraneous-semicolon.dpatch, sparc32-mb-extraneous-semicolons.dpatch, sparc64-mb-extraneous-semicolons.dpatch: Fix a syntax error caused by extranous semicolons in smp_mb() macros which resulted in a build failure with kfree_skb-race.dpatch * sctp-priv-elevation.dpatch [SECURITY] Fix SCTP privelege escalation See CVE-2006-3745 * sctp-priv-elevation-2.dpatch [SECURITY] Fix local DoS resulting from sctp-priv-elevation.dpatch See CVE-2006-4535 * ppc-hid0-dos.dpatch [SECURITY][ppc] Fix local DoS by clearing HID0 attention enable on PPC970 at boot time See CVE-2006-4093 * udf-deadlock.dpatch [SECURITY] Fix possible UDF deadlock and memory corruption See CVE-2006-4145 stable/main/source/kernel-image-2.6.8-m68k_2.6.8-4sarge5.tar.gz stable/main/binary-m68k/kernel-image-2.6.8-bvme6000_2.6.8-4sarge5_m68k.deb stable/main/binary-m68k/kernel-image-2.6.8-hp_2.6.8-4sarge5_m68k.deb stable/main/source/kernel-image-2.6.8-m68k_2.6.8-4sarge5.dsc stable/main/binary-m68k/kernel-image-2.6.8-mvme16x_2.6.8-4sarge5_m68k.deb stable/main/binary-m68k/kernel-image-2.6.8-amiga_2.6.8-4sarge5_m68k.deb stable/main/binary-m68k/kernel-image-2.6.8-q40_2.6.8-4sarge5_m68k.deb stable/main/binary-m68k/kernel-image-2.6.8-mac_2.6.8-4sarge5_m68k.deb stable/main/binary-m68k/kernel-image-2.6.8-sun3_2.6.8-4sarge5_m68k.deb stable/main/binary-m68k/kernel-image-2.6.8-mvme147_2.6.8-4sarge5_m68k.deb stable/main/binary-m68k/kernel-image-2.6.8-atari_2.6.8-4sarge5_m68k.deb kernel-image-2.6.8-m68k (2.6.8-4sarge5) stable-security; urgency=high * Build against kernel-tree-2.6.8-16sarge5: * [ERRATA] madvise_remove-restrict.dpatch [SECURITY] The 2.6.8-16sarge3 changelog associated this patch with CVE-2006-1524. However, this patch fixes an mprotect issue that was split off from the original report into CVE-2006-2071. 2.6.8 is not vulnerable to CVE-2006-1524 the madvise_remove issue. See CVE-2006-2071 * fs-ext3-bad-nfs-handle.dpatch [SECURITY] James McKenzie discovered a Denial of Service vulnerability in the NFS driver. When exporting an ext3 file system over NFS, a remote attacker could exploit this to trigger a file system panic by sending a specially crafted UDP packet. See CVE-2006-3468 * direct-io-write-mem-leak.dpatch [SECURITY] Fix memory leak in O_DIRECT write. See CVE-2004-2660 * nfs-handle-long-symlinks.dpatch [SECURITY] Fix buffer overflow in NFS readline handling that allows a remote server to cause a denial of service (crash) via a long symlink See CVE-2005-4798 * cdrom-bad-cgc.buflen-assign.dpatch [SECURITY] Fix buffer overflow in dvd_read_bca which could potentially be used by a local user to trigger a buffer overflow via a specially crafted DVD, USB stick, or similar automatically mounted device. See CVE-2006-2935 * usb-serial-ftdi_sio-dos.patch [SECURITY] fix userspace DoS in ftdi_sio driver See CVE-2006-2936 * selinux-tracer-SID-fix.dpatch [SECURITY] Fix vulnerability in selinux_ptrace that prevents local users from changing the tracer SID to the SID of another process See CVE-2006-1052 * netfilter-SO_ORIGINAL_DST-leak.dpatch [SECURITY] Fix information leak in SO_ORIGINAL_DST See CVE-2006-1343 * sg-no-mmap-VM_IO.dpatch [SECURITY] Fix DoS vulnerability whereby a local user could attempt a dio/mmap and cause the sg driver to oops. See CVE-2006-1528 * exit-bogus-bugon.dpatch [SECURITY] Remove bogus BUG() in exit.c which could be maliciously triggered by a local user See CVE-2006-1855 * readv-writev-missing-lsm-check.dpatch, readv-writev-missing-lsm-check-compat.dpatch [SECURITY] Add missing file_permission callback in readv/writev syscalls See CVE-2006-1856 * snmp-nat-mem-corruption-fix.dpatch [SECURITY] Fix memory corruption in snmp_trap_decode See CVE-2006-2444 * kfree_skb-race.dpatch [SECURITY] Fix race between kfree_skb and __skb_unlink See CVE-2006-2446 * hppa-mb-extraneous-semicolon.dpatch, sparc32-mb-extraneous-semicolons.dpatch, sparc64-mb-extraneous-semicolons.dpatch: Fix a syntax error caused by extranous semicolons in smp_mb() macros which resulted in a build failure with kfree_skb-race.dpatch * sctp-priv-elevation.dpatch [SECURITY] Fix SCTP privelege escalation See CVE-2006-3745 * sctp-priv-elevation-2.dpatch [SECURITY] Fix local DoS resulting from sctp-priv-elevation.dpatch See CVE-2006-4535 * ppc-hid0-dos.dpatch [SECURITY][ppc] Fix local DoS by clearing HID0 attention enable on PPC970 at boot time See CVE-2006-4093 * udf-deadlock.dpatch [SECURITY] Fix possible UDF deadlock and memory corruption See CVE-2006-4145 stable/main/binary-ia64/kernel-headers-2.6.8-3-itanium-smp_2.6.8-14sarge5_ia64.deb stable/main/binary-ia64/kernel-headers-2.6.8-3_2.6.8-14sarge5_ia64.deb stable/main/source/kernel-image-2.6.8-ia64_2.6.8-14sarge5.dsc stable/main/binary-ia64/kernel-headers-2.6-itanium-smp_2.6.8-14sarge5_ia64.deb stable/main/binary-ia64/kernel-headers-2.6-mckinley_2.6.8-14sarge5_ia64.deb stable/main/binary-ia64/kernel-image-2.6.8-3-itanium_2.6.8-14sarge5_ia64.deb stable/main/binary-ia64/kernel-image-2.6-itanium_2.6.8-14sarge5_ia64.deb stable/main/binary-ia64/kernel-image-2.6.8-3-mckinley-smp_2.6.8-14sarge5_ia64.deb stable/main/binary-ia64/kernel-image-2.6-mckinley-smp_2.6.8-14sarge5_ia64.deb stable/main/binary-ia64/kernel-headers-2.6-mckinley-smp_2.6.8-14sarge5_ia64.deb stable/main/binary-ia64/kernel-headers-2.6.8-3-itanium_2.6.8-14sarge5_ia64.deb stable/main/binary-ia64/kernel-headers-2.6.8-3-mckinley_2.6.8-14sarge5_ia64.deb stable/main/binary-ia64/kernel-headers-2.6.8-3-mckinley-smp_2.6.8-14sarge5_ia64.deb stable/main/source/kernel-image-2.6.8-ia64_2.6.8-14sarge5.tar.gz stable/main/binary-ia64/kernel-image-2.6.8-3-itanium-smp_2.6.8-14sarge5_ia64.deb stable/main/binary-ia64/kernel-headers-2.6-itanium_2.6.8-14sarge5_ia64.deb stable/main/binary-ia64/kernel-image-2.6.8-3-mckinley_2.6.8-14sarge5_ia64.deb stable/main/binary-ia64/kernel-image-2.6-mckinley_2.6.8-14sarge5_ia64.deb stable/main/binary-ia64/kernel-image-2.6-itanium-smp_2.6.8-14sarge5_ia64.deb kernel-image-2.6.8-ia64 (2.6.8-14sarge5) stable-security; urgency=high * Build against kernel-tree-2.6.8-16sarge5: * [ERRATA] madvise_remove-restrict.dpatch [SECURITY] The 2.6.8-16sarge3 changelog associated this patch with CVE-2006-1524. However, this patch fixes an mprotect issue that was split off from the original report into CVE-2006-2071. 2.6.8 is not vulnerable to CVE-2006-1524 the madvise_remove issue. See CVE-2006-2071 * fs-ext3-bad-nfs-handle.dpatch [SECURITY] James McKenzie discovered a Denial of Service vulnerability in the NFS driver. When exporting an ext3 file system over NFS, a remote attacker could exploit this to trigger a file system panic by sending a specially crafted UDP packet. See CVE-2006-3468 * direct-io-write-mem-leak.dpatch [SECURITY] Fix memory leak in O_DIRECT write. See CVE-2004-2660 * nfs-handle-long-symlinks.dpatch [SECURITY] Fix buffer overflow in NFS readline handling that allows a remote server to cause a denial of service (crash) via a long symlink See CVE-2005-4798 * cdrom-bad-cgc.buflen-assign.dpatch [SECURITY] Fix buffer overflow in dvd_read_bca which could potentially be used by a local user to trigger a buffer overflow via a specially crafted DVD, USB stick, or similar automatically mounted device. See CVE-2006-2935 * usb-serial-ftdi_sio-dos.patch [SECURITY] fix userspace DoS in ftdi_sio driver See CVE-2006-2936 * selinux-tracer-SID-fix.dpatch [SECURITY] Fix vulnerability in selinux_ptrace that prevents local users from changing the tracer SID to the SID of another process See CVE-2006-1052 * netfilter-SO_ORIGINAL_DST-leak.dpatch [SECURITY] Fix information leak in SO_ORIGINAL_DST See CVE-2006-1343 * sg-no-mmap-VM_IO.dpatch [SECURITY] Fix DoS vulnerability whereby a local user could attempt a dio/mmap and cause the sg driver to oops. See CVE-2006-1528 * exit-bogus-bugon.dpatch [SECURITY] Remove bogus BUG() in exit.c which could be maliciously triggered by a local user See CVE-2006-1855 * readv-writev-missing-lsm-check.dpatch, readv-writev-missing-lsm-check-compat.dpatch [SECURITY] Add missing file_permission callback in readv/writev syscalls See CVE-2006-1856 * snmp-nat-mem-corruption-fix.dpatch [SECURITY] Fix memory corruption in snmp_trap_decode See CVE-2006-2444 * kfree_skb-race.dpatch [SECURITY] Fix race between kfree_skb and __skb_unlink See CVE-2006-2446 * hppa-mb-extraneous-semicolon.dpatch, sparc32-mb-extraneous-semicolons.dpatch, sparc64-mb-extraneous-semicolons.dpatch: Fix a syntax error caused by extranous semicolons in smp_mb() macros which resulted in a build failure with kfree_skb-race.dpatch * sctp-priv-elevation.dpatch [SECURITY] Fix SCTP privelege escalation See CVE-2006-3745 * sctp-priv-elevation-2.dpatch [SECURITY] Fix local DoS resulting from sctp-priv-elevation.dpatch See CVE-2006-4535 * ppc-hid0-dos.dpatch [SECURITY][ppc] Fix local DoS by clearing HID0 attention enable on PPC970 at boot time See CVE-2006-4093 * udf-deadlock.dpatch [SECURITY] Fix possible UDF deadlock and memory corruption See CVE-2006-4145 stable/main/binary-i386/kernel-image-2.6.8-3-686_2.6.8-16sarge5_i386.deb stable/main/binary-i386/kernel-image-2.6.8-3-k7_2.6.8-16sarge5_i386.deb stable/main/binary-i386/kernel-headers-2.6.8-3-k7_2.6.8-16sarge5_i386.deb stable/main/source/kernel-image-2.6.8-i386_2.6.8-16sarge5.tar.gz stable/main/binary-i386/kernel-image-2.6.8-3-686-smp_2.6.8-16sarge5_i386.deb stable/main/binary-i386/kernel-image-2.6.8-3-386_2.6.8-16sarge5_i386.deb stable/main/binary-i386/kernel-headers-2.6.8-3-686_2.6.8-16sarge5_i386.deb stable/main/source/kernel-image-2.6.8-i386_2.6.8-16sarge5.dsc stable/main/binary-i386/kernel-image-2.6.8-3-k7-smp_2.6.8-16sarge5_i386.deb stable/main/binary-i386/kernel-headers-2.6.8-3-386_2.6.8-16sarge5_i386.deb stable/main/binary-i386/kernel-headers-2.6.8-3-k7-smp_2.6.8-16sarge5_i386.deb stable/main/binary-i386/kernel-headers-2.6.8-3-686-smp_2.6.8-16sarge5_i386.deb stable/main/binary-i386/kernel-headers-2.6.8-3_2.6.8-16sarge5_i386.deb kernel-image-2.6.8-i386 (2.6.8-16sarge5) stable-security; urgency=high * Build against kernel-tree-2.6.8-16sarge5: * [ERRATA] madvise_remove-restrict.dpatch [SECURITY] The 2.6.8-16sarge3 changelog associated this patch with CVE-2006-1524. However, this patch fixes an mprotect issue that was split off from the original report into CVE-2006-2071. 2.6.8 is not vulnerable to CVE-2006-1524 the madvise_remove issue. See CVE-2006-2071 * fs-ext3-bad-nfs-handle.dpatch [SECURITY] James McKenzie discovered a Denial of Service vulnerability in the NFS driver. When exporting an ext3 file system over NFS, a remote attacker could exploit this to trigger a file system panic by sending a specially crafted UDP packet. See CVE-2006-3468 * direct-io-write-mem-leak.dpatch [SECURITY] Fix memory leak in O_DIRECT write. See CVE-2004-2660 * nfs-handle-long-symlinks.dpatch [SECURITY] Fix buffer overflow in NFS readline handling that allows a remote server to cause a denial of service (crash) via a long symlink See CVE-2005-4798 * cdrom-bad-cgc.buflen-assign.dpatch [SECURITY] Fix buffer overflow in dvd_read_bca which could potentially be used by a local user to trigger a buffer overflow via a specially crafted DVD, USB stick, or similar automatically mounted device. See CVE-2006-2935 * usb-serial-ftdi_sio-dos.patch [SECURITY] fix userspace DoS in ftdi_sio driver See CVE-2006-2936 * selinux-tracer-SID-fix.dpatch [SECURITY] Fix vulnerability in selinux_ptrace that prevents local users from changing the tracer SID to the SID of another process See CVE-2006-1052 * netfilter-SO_ORIGINAL_DST-leak.dpatch [SECURITY] Fix information leak in SO_ORIGINAL_DST See CVE-2006-1343 * sg-no-mmap-VM_IO.dpatch [SECURITY] Fix DoS vulnerability whereby a local user could attempt a dio/mmap and cause the sg driver to oops. See CVE-2006-1528 * exit-bogus-bugon.dpatch [SECURITY] Remove bogus BUG() in exit.c which could be maliciously triggered by a local user See CVE-2006-1855 * readv-writev-missing-lsm-check.dpatch, readv-writev-missing-lsm-check-compat.dpatch [SECURITY] Add missing file_permission callback in readv/writev syscalls See CVE-2006-1856 * snmp-nat-mem-corruption-fix.dpatch [SECURITY] Fix memory corruption in snmp_trap_decode See CVE-2006-2444 * kfree_skb-race.dpatch [SECURITY] Fix race between kfree_skb and __skb_unlink See CVE-2006-2446 * hppa-mb-extraneous-semicolon.dpatch, sparc32-mb-extraneous-semicolons.dpatch, sparc64-mb-extraneous-semicolons.dpatch: Fix a syntax error caused by extranous semicolons in smp_mb() macros which resulted in a build failure with kfree_skb-race.dpatch * sctp-priv-elevation.dpatch [SECURITY] Fix SCTP privelege escalation See CVE-2006-3745 * sctp-priv-elevation-2.dpatch [SECURITY] Fix local DoS resulting from sctp-priv-elevation.dpatch See CVE-2006-4535 * ppc-hid0-dos.dpatch [SECURITY][ppc] Fix local DoS by clearing HID0 attention enable on PPC970 at boot time See CVE-2006-4093 * udf-deadlock.dpatch [SECURITY] Fix possible UDF deadlock and memory corruption See CVE-2006-4145 stable/main/binary-hppa/kernel-image-2.6.8-3-64_2.6.8-6sarge5_hppa.deb stable/main/binary-hppa/kernel-headers-2.6.8-3-64-smp_2.6.8-6sarge5_hppa.deb stable/main/binary-hppa/kernel-image-2.6.8-3-32_2.6.8-6sarge5_hppa.deb stable/main/binary-hppa/kernel-headers-2.6.8-3_2.6.8-6sarge5_hppa.deb stable/main/binary-hppa/kernel-image-2.6.8-3-64-smp_2.6.8-6sarge5_hppa.deb stable/main/binary-hppa/kernel-headers-2.6.8-3-64_2.6.8-6sarge5_hppa.deb stable/main/source/kernel-image-2.6.8-hppa_2.6.8-6sarge5.tar.gz stable/main/source/kernel-image-2.6.8-hppa_2.6.8-6sarge5.dsc stable/main/binary-hppa/kernel-headers-2.6.8-3-32_2.6.8-6sarge5_hppa.deb stable/main/binary-hppa/kernel-headers-2.6.8-3-32-smp_2.6.8-6sarge5_hppa.deb stable/main/binary-hppa/kernel-image-2.6.8-3-32-smp_2.6.8-6sarge5_hppa.deb kernel-image-2.6.8-hppa (2.6.8-6sarge5) stable-security; urgency=high * Build against kernel-tree-2.6.8-16sarge5: * [ERRATA] madvise_remove-restrict.dpatch [SECURITY] The 2.6.8-16sarge3 changelog associated this patch with CVE-2006-1524. However, this patch fixes an mprotect issue that was split off from the original report into CVE-2006-2071. 2.6.8 is not vulnerable to CVE-2006-1524 the madvise_remove issue. See CVE-2006-2071 * fs-ext3-bad-nfs-handle.dpatch [SECURITY] James McKenzie discovered a Denial of Service vulnerability in the NFS driver. When exporting an ext3 file system over NFS, a remote attacker could exploit this to trigger a file system panic by sending a specially crafted UDP packet. See CVE-2006-3468 * direct-io-write-mem-leak.dpatch [SECURITY] Fix memory leak in O_DIRECT write. See CVE-2004-2660 * nfs-handle-long-symlinks.dpatch [SECURITY] Fix buffer overflow in NFS readline handling that allows a remote server to cause a denial of service (crash) via a long symlink See CVE-2005-4798 * cdrom-bad-cgc.buflen-assign.dpatch [SECURITY] Fix buffer overflow in dvd_read_bca which could potentially be used by a local user to trigger a buffer overflow via a specially crafted DVD, USB stick, or similar automatically mounted device. See CVE-2006-2935 * usb-serial-ftdi_sio-dos.patch [SECURITY] fix userspace DoS in ftdi_sio driver See CVE-2006-2936 * selinux-tracer-SID-fix.dpatch [SECURITY] Fix vulnerability in selinux_ptrace that prevents local users from changing the tracer SID to the SID of another process See CVE-2006-1052 * netfilter-SO_ORIGINAL_DST-leak.dpatch [SECURITY] Fix information leak in SO_ORIGINAL_DST See CVE-2006-1343 * sg-no-mmap-VM_IO.dpatch [SECURITY] Fix DoS vulnerability whereby a local user could attempt a dio/mmap and cause the sg driver to oops. See CVE-2006-1528 * exit-bogus-bugon.dpatch [SECURITY] Remove bogus BUG() in exit.c which could be maliciously triggered by a local user See CVE-2006-1855 * readv-writev-missing-lsm-check.dpatch, readv-writev-missing-lsm-check-compat.dpatch [SECURITY] Add missing file_permission callback in readv/writev syscalls See CVE-2006-1856 * snmp-nat-mem-corruption-fix.dpatch [SECURITY] Fix memory corruption in snmp_trap_decode See CVE-2006-2444 * kfree_skb-race.dpatch [SECURITY] Fix race between kfree_skb and __skb_unlink See CVE-2006-2446 * hppa-mb-extraneous-semicolon.dpatch, sparc32-mb-extraneous-semicolons.dpatch, sparc64-mb-extraneous-semicolons.dpatch: Fix a syntax error caused by extranous semicolons in smp_mb() macros which resulted in a build failure with kfree_skb-race.dpatch * sctp-priv-elevation.dpatch [SECURITY] Fix SCTP privelege escalation See CVE-2006-3745 * sctp-priv-elevation-2.dpatch [SECURITY] Fix local DoS resulting from sctp-priv-elevation.dpatch See CVE-2006-4535 * ppc-hid0-dos.dpatch [SECURITY][ppc] Fix local DoS by clearing HID0 attention enable on PPC970 at boot time See CVE-2006-4093 * udf-deadlock.dpatch [SECURITY] Fix possible UDF deadlock and memory corruption See CVE-2006-4145 stable/main/source/kernel-image-2.6.8-amd64_2.6.8-16sarge5.tar.gz stable/main/binary-i386/kernel-image-2.6.8-12-amd64-generic_2.6.8-16sarge5_i386.deb stable/main/source/kernel-image-2.6.8-amd64_2.6.8-16sarge5.dsc stable/main/binary-i386/kernel-image-2.6.8-12-em64t-p4_2.6.8-16sarge5_i386.deb stable/main/binary-i386/kernel-headers-2.6.8-12-amd64-k8-smp_2.6.8-16sarge5_i386.deb stable/main/binary-i386/kernel-image-2.6.8-12-amd64-k8-smp_2.6.8-16sarge5_i386.deb stable/main/binary-i386/kernel-headers-2.6.8-12_2.6.8-16sarge5_i386.deb stable/main/binary-i386/kernel-image-2.6.8-12-amd64-k8_2.6.8-16sarge5_i386.deb stable/main/binary-i386/kernel-headers-2.6.8-12-em64t-p4-smp_2.6.8-16sarge5_i386.deb stable/main/binary-i386/kernel-headers-2.6.8-12-amd64-k8_2.6.8-16sarge5_i386.deb stable/main/binary-i386/kernel-headers-2.6.8-12-amd64-generic_2.6.8-16sarge5_i386.deb stable/main/binary-i386/kernel-image-2.6.8-12-em64t-p4-smp_2.6.8-16sarge5_i386.deb stable/main/binary-i386/kernel-headers-2.6.8-12-em64t-p4_2.6.8-16sarge5_i386.deb kernel-image-2.6.8-amd64 (2.6.8-16sarge5) stable-security; urgency=high * Build against kernel-tree-2.6.8-16sarge5: * [ERRATA] madvise_remove-restrict.dpatch [SECURITY] The 2.6.8-16sarge3 changelog associated this patch with CVE-2006-1524. However, this patch fixes an mprotect issue that was split off from the original report into CVE-2006-2071. 2.6.8 is not vulnerable to CVE-2006-1524 the madvise_remove issue. See CVE-2006-2071 * fs-ext3-bad-nfs-handle.dpatch [SECURITY] James McKenzie discovered a Denial of Service vulnerability in the NFS driver. When exporting an ext3 file system over NFS, a remote attacker could exploit this to trigger a file system panic by sending a specially crafted UDP packet. See CVE-2006-3468 * direct-io-write-mem-leak.dpatch [SECURITY] Fix memory leak in O_DIRECT write. See CVE-2004-2660 * nfs-handle-long-symlinks.dpatch [SECURITY] Fix buffer overflow in NFS readline handling that allows a remote server to cause a denial of service (crash) via a long symlink See CVE-2005-4798 * cdrom-bad-cgc.buflen-assign.dpatch [SECURITY] Fix buffer overflow in dvd_read_bca which could potentially be used by a local user to trigger a buffer overflow via a specially crafted DVD, USB stick, or similar automatically mounted device. See CVE-2006-2935 * usb-serial-ftdi_sio-dos.patch [SECURITY] fix userspace DoS in ftdi_sio driver See CVE-2006-2936 * selinux-tracer-SID-fix.dpatch [SECURITY] Fix vulnerability in selinux_ptrace that prevents local users from changing the tracer SID to the SID of another process See CVE-2006-1052 * netfilter-SO_ORIGINAL_DST-leak.dpatch [SECURITY] Fix information leak in SO_ORIGINAL_DST See CVE-2006-1343 * sg-no-mmap-VM_IO.dpatch [SECURITY] Fix DoS vulnerability whereby a local user could attempt a dio/mmap and cause the sg driver to oops. See CVE-2006-1528 * exit-bogus-bugon.dpatch [SECURITY] Remove bogus BUG() in exit.c which could be maliciously triggered by a local user See CVE-2006-1855 * readv-writev-missing-lsm-check.dpatch, readv-writev-missing-lsm-check-compat.dpatch [SECURITY] Add missing file_permission callback in readv/writev syscalls See CVE-2006-1856 * snmp-nat-mem-corruption-fix.dpatch [SECURITY] Fix memory corruption in snmp_trap_decode See CVE-2006-2444 * kfree_skb-race.dpatch [SECURITY] Fix race between kfree_skb and __skb_unlink See CVE-2006-2446 * hppa-mb-extraneous-semicolon.dpatch, sparc32-mb-extraneous-semicolons.dpatch, sparc64-mb-extraneous-semicolons.dpatch: Fix a syntax error caused by extranous semicolons in smp_mb() macros which resulted in a build failure with kfree_skb-race.dpatch * sctp-priv-elevation.dpatch [SECURITY] Fix SCTP privelege escalation See CVE-2006-3745 * sctp-priv-elevation-2.dpatch [SECURITY] Fix local DoS resulting from sctp-priv-elevation.dpatch See CVE-2006-4535 * ppc-hid0-dos.dpatch [SECURITY][ppc] Fix local DoS by clearing HID0 attention enable on PPC970 at boot time See CVE-2006-4093 * udf-deadlock.dpatch [SECURITY] Fix possible UDF deadlock and memory corruption See CVE-2006-4145 stable/main/binary-alpha/kernel-image-2.6.8-3-smp_2.6.8-16sarge5_alpha.deb stable/main/binary-alpha/kernel-image-2.6.8-3-generic_2.6.8-16sarge5_alpha.deb stable/main/binary-alpha/kernel-headers-2.6.8-3-smp_2.6.8-16sarge5_alpha.deb stable/main/source/kernel-image-2.6.8-alpha_2.6.8-16sarge5.tar.gz stable/main/binary-alpha/kernel-headers-2.6.8-3-generic_2.6.8-16sarge5_alpha.deb stable/main/binary-alpha/kernel-headers-2.6.8-3_2.6.8-16sarge5_alpha.deb stable/main/source/kernel-image-2.6.8-alpha_2.6.8-16sarge5.dsc kernel-image-2.6.8-alpha (2.6.8-16sarge5) stable-security; urgency=high * Build against kernel-tree-2.6.8-16sarge5: * [ERRATA] madvise_remove-restrict.dpatch [SECURITY] The 2.6.8-16sarge3 changelog associated this patch with CVE-2006-1524. However, this patch fixes an mprotect issue that was split off from the original report into CVE-2006-2071. 2.6.8 is not vulnerable to CVE-2006-1524 the madvise_remove issue. See CVE-2006-2071 * fs-ext3-bad-nfs-handle.dpatch [SECURITY] James McKenzie discovered a Denial of Service vulnerability in the NFS driver. When exporting an ext3 file system over NFS, a remote attacker could exploit this to trigger a file system panic by sending a specially crafted UDP packet. See CVE-2006-3468 * direct-io-write-mem-leak.dpatch [SECURITY] Fix memory leak in O_DIRECT write. See CVE-2004-2660 * nfs-handle-long-symlinks.dpatch [SECURITY] Fix buffer overflow in NFS readline handling that allows a remote server to cause a denial of service (crash) via a long symlink See CVE-2005-4798 * cdrom-bad-cgc.buflen-assign.dpatch [SECURITY] Fix buffer overflow in dvd_read_bca which could potentially be used by a local user to trigger a buffer overflow via a specially crafted DVD, USB stick, or similar automatically mounted device. See CVE-2006-2935 * usb-serial-ftdi_sio-dos.patch [SECURITY] fix userspace DoS in ftdi_sio driver See CVE-2006-2936 * selinux-tracer-SID-fix.dpatch [SECURITY] Fix vulnerability in selinux_ptrace that prevents local users from changing the tracer SID to the SID of another process See CVE-2006-1052 * netfilter-SO_ORIGINAL_DST-leak.dpatch [SECURITY] Fix information leak in SO_ORIGINAL_DST See CVE-2006-1343 * sg-no-mmap-VM_IO.dpatch [SECURITY] Fix DoS vulnerability whereby a local user could attempt a dio/mmap and cause the sg driver to oops. See CVE-2006-1528 * exit-bogus-bugon.dpatch [SECURITY] Remove bogus BUG() in exit.c which could be maliciously triggered by a local user See CVE-2006-1855 * readv-writev-missing-lsm-check.dpatch, readv-writev-missing-lsm-check-compat.dpatch [SECURITY] Add missing file_permission callback in readv/writev syscalls See CVE-2006-1856 * snmp-nat-mem-corruption-fix.dpatch [SECURITY] Fix memory corruption in snmp_trap_decode See CVE-2006-2444 * kfree_skb-race.dpatch [SECURITY] Fix race between kfree_skb and __skb_unlink See CVE-2006-2446 * hppa-mb-extraneous-semicolon.dpatch, sparc32-mb-extraneous-semicolons.dpatch, sparc64-mb-extraneous-semicolons.dpatch: Fix a syntax error caused by extranous semicolons in smp_mb() macros which resulted in a build failure with kfree_skb-race.dpatch * sctp-priv-elevation.dpatch [SECURITY] Fix SCTP privelege escalation See CVE-2006-3745 * sctp-priv-elevation-2.dpatch [SECURITY] Fix local DoS resulting from sctp-priv-elevation.dpatch See CVE-2006-4535 * ppc-hid0-dos.dpatch [SECURITY][ppc] Fix local DoS by clearing HID0 attention enable on PPC970 at boot time See CVE-2006-4093 * udf-deadlock.dpatch [SECURITY] Fix possible UDF deadlock and memory corruption See CVE-2006-4145 stable/main/binary-sparc/kernel-headers-2.4.27-3_2.4.27-9sarge4_sparc.deb stable/main/binary-sparc/kernel-image-2.4.27-3-sparc64_2.4.27-9sarge4_sparc.deb stable/main/binary-sparc/kernel-build-2.4.27-3_2.4.27-9sarge4_sparc.deb stable/main/source/kernel-image-2.4.27-sparc_2.4.27-9sarge4.dsc stable/main/binary-sparc/kernel-image-2.4.27-3-sparc32-smp_2.4.27-9sarge4_sparc.deb stable/main/binary-sparc/kernel-image-2.4.27-3-sparc64-smp_2.4.27-9sarge4_sparc.deb stable/main/binary-sparc/kernel-headers-2.4.27-3-sparc32-smp_2.4.27-9sarge4_sparc.deb stable/main/binary-sparc/kernel-headers-2.4.27-3-sparc64_2.4.27-9sarge4_sparc.deb stable/main/source/kernel-image-2.4.27-sparc_2.4.27-9sarge4.tar.gz stable/main/binary-sparc/kernel-headers-2.4.27-3-sparc32_2.4.27-9sarge4_sparc.deb stable/main/binary-sparc/kernel-headers-2.4.27-3-sparc64-smp_2.4.27-9sarge4_sparc.deb stable/main/binary-sparc/kernel-image-2.4.27-3-sparc32_2.4.27-9sarge4_sparc.deb kernel-image-2.4.27-sparc (2.4.27-9sarge4) stable-security; urgency=high * Build against kernel-tree-2.4.27-10sarge4: * [ERRATA] 213_madvise_remove-restrict.diff [SECURITY] The 2.4.27-10sarge3 changelog associated this patch with CVE-2006-1524. However, this patch fixes an mprotect issue that was split off from the original report into CVE-2006-2071. 2.4.27 is not vulnerable to CVE-2006-1524 the madvise_remove issue. See CVE-2006-2071 * 223_nfs-handle-long-symlinks.diff [SECURITY] Fix buffer overflow in NFS readline handling that allows a remote server to cause a denial of service (crash) via a long symlink See CVE-2005-4798 * 224_cdrom-bad-cgc.buflen-assign.diff [SECURITY] Fix buffer overflow in dvd_read_bca which could potentially be used by a local user to trigger a buffer overflow via a specially crafted DVD, USB stick, or similar automatically mounted device. See CVE-2006-2935 * 225_sg-no-mmap-VM_IO.diff [SECURITY] Fix DoS vulnerability whereby a local user could attempt a dio/mmap and cause the sg driver to oops. See CVE-2006-1528 * 226_snmp-nat-mem-corruption-fix.diff [SECURITY] Fix memory corruption in snmp_trap_decode See CVE-2006-2444 * 227_kfree_skb.diff [SECURITY] Fix race between kfree_skb and __skb_unlink See CVE-2006-2446 * 228_sparc-mb-extraneous-semicolons.diff Fix a syntax error caused by extranous semicolons in smp_mb() macros which resulted in a build failure with 227_kfree_skb.diff * 229_sctp-priv-elevation.diff, 230_sctp-priv-elevation-2.diff [SECURITY] Fix SCTP privelege escalation See CVE-2006-3745 * 231_udf-deadlock.diff [SECURITY] Fix possible UDF deadlock and memory corruption See CVE-2006-4145 * 232_sparc-membar-extraneous-semicolons.diff Fix an additional syntax error caused by extraneous semicolons in membar macros on sparc stable/main/binary-s390/kernel-image-2.4.27-3-s390_2.4.27-2sarge4_s390.deb stable/main/binary-s390/kernel-image-2.4.27-3-s390x_2.4.27-2sarge4_s390.deb stable/main/binary-s390/kernel-headers-2.4.27-3_2.4.27-2sarge4_s390.deb stable/main/binary-s390/kernel-image-2.4.27-3-s390-tape_2.4.27-2sarge4_s390.deb stable/main/source/kernel-image-2.4.27-s390_2.4.27-2sarge4.tar.gz stable/main/source/kernel-image-2.4.27-s390_2.4.27-2sarge4.dsc kernel-image-2.4.27-s390 (2.4.27-2sarge4) stable-security; urgency=high * Build against kernel-tree-2.4.27-10sarge4: * [ERRATA] 213_madvise_remove-restrict.diff [SECURITY] The 2.4.27-10sarge3 changelog associated this patch with CVE-2006-1524. However, this patch fixes an mprotect issue that was split off from the original report into CVE-2006-2071. 2.4.27 is not vulnerable to CVE-2006-1524 the madvise_remove issue. See CVE-2006-2071 * 223_nfs-handle-long-symlinks.diff [SECURITY] Fix buffer overflow in NFS readline handling that allows a remote server to cause a denial of service (crash) via a long symlink See CVE-2005-4798 * 224_cdrom-bad-cgc.buflen-assign.diff [SECURITY] Fix buffer overflow in dvd_read_bca which could potentially be used by a local user to trigger a buffer overflow via a specially crafted DVD, USB stick, or similar automatically mounted device. See CVE-2006-2935 * 225_sg-no-mmap-VM_IO.diff [SECURITY] Fix DoS vulnerability whereby a local user could attempt a dio/mmap and cause the sg driver to oops. See CVE-2006-1528 * 226_snmp-nat-mem-corruption-fix.diff [SECURITY] Fix memory corruption in snmp_trap_decode See CVE-2006-2444 * 227_kfree_skb.diff [SECURITY] Fix race between kfree_skb and __skb_unlink See CVE-2006-2446 * 228_sparc-mb-extraneous-semicolons.diff Fix a syntax error caused by extranous semicolons in smp_mb() macros which resulted in a build failure with 227_kfree_skb.diff * 229_sctp-priv-elevation.diff, 230_sctp-priv-elevation-2.diff [SECURITY] Fix SCTP privelege escalation See CVE-2006-3745 * 231_udf-deadlock.diff [SECURITY] Fix possible UDF deadlock and memory corruption See CVE-2006-4145 * 232_sparc-membar-extraneous-semicolons.diff Fix an additional syntax error caused by extraneous semicolons in membar macros on sparc stable/main/binary-m68k/kernel-image-2.4.27-amiga_2.4.27-3sarge4_m68k.deb stable/main/binary-m68k/kernel-image-2.4.27-mvme147_2.4.27-3sarge4_m68k.deb stable/main/source/kernel-image-2.4.27-m68k_2.4.27-3sarge4.dsc stable/main/binary-m68k/kernel-image-2.4.27-mac_2.4.27-3sarge4_m68k.deb stable/main/binary-m68k/kernel-image-2.4.27-atari_2.4.27-3sarge4_m68k.deb stable/main/binary-m68k/kernel-image-2.4.27-mvme16x_2.4.27-3sarge4_m68k.deb stable/main/binary-m68k/kernel-image-2.4.27-q40_2.4.27-3sarge4_m68k.deb stable/main/binary-m68k/kernel-image-2.4.27-bvme6000_2.4.27-3sarge4_m68k.deb stable/main/source/kernel-image-2.4.27-m68k_2.4.27-3sarge4.tar.gz kernel-image-2.4.27-m68k (2.4.27-3sarge4) stable-security; urgency=high * Build against kernel-tree-2.4.27-10sarge4: * [ERRATA] 213_madvise_remove-restrict.diff [SECURITY] The 2.4.27-10sarge3 changelog associated this patch with CVE-2006-1524. However, this patch fixes an mprotect issue that was split off from the original report into CVE-2006-2071. 2.4.27 is not vulnerable to CVE-2006-1524 the madvise_remove issue. See CVE-2006-2071 * 223_nfs-handle-long-symlinks.diff [SECURITY] Fix buffer overflow in NFS readline handling that allows a remote server to cause a denial of service (crash) via a long symlink See CVE-2005-4798 * 224_cdrom-bad-cgc.buflen-assign.diff [SECURITY] Fix buffer overflow in dvd_read_bca which could potentially be used by a local user to trigger a buffer overflow via a specially crafted DVD, USB stick, or similar automatically mounted device. See CVE-2006-2935 * 225_sg-no-mmap-VM_IO.diff [SECURITY] Fix DoS vulnerability whereby a local user could attempt a dio/mmap and cause the sg driver to oops. See CVE-2006-1528 * 226_snmp-nat-mem-corruption-fix.diff [SECURITY] Fix memory corruption in snmp_trap_decode See CVE-2006-2444 * 227_kfree_skb.diff [SECURITY] Fix race between kfree_skb and __skb_unlink See CVE-2006-2446 * 228_sparc-mb-extraneous-semicolons.diff Fix a syntax error caused by extranous semicolons in smp_mb() macros which resulted in a build failure with 227_kfree_skb.diff * 229_sctp-priv-elevation.diff, 230_sctp-priv-elevation-2.diff [SECURITY] Fix SCTP privelege escalation See CVE-2006-3745 * 231_udf-deadlock.diff [SECURITY] Fix possible UDF deadlock and memory corruption See CVE-2006-4145 * 232_sparc-membar-extraneous-semicolons.diff Fix an additional syntax error caused by extraneous semicolons in membar macros on sparc stable/main/binary-ia64/kernel-image-2.4-mckinley-smp_2.4.27-10sarge4_ia64.deb stable/main/binary-ia64/kernel-image-2.4-itanium_2.4.27-10sarge4_ia64.deb stable/main/binary-ia64/kernel-headers-2.4.27-3-mckinley_2.4.27-10sarge4_ia64.deb stable/main/binary-ia64/kernel-image-2.4.27-3-mckinley-smp_2.4.27-10sarge4_ia64.deb stable/main/binary-ia64/kernel-image-2.4.27-3-itanium-smp_2.4.27-10sarge4_ia64.deb stable/main/binary-ia64/kernel-image-2.4-itanium-smp_2.4.27-10sarge4_ia64.deb stable/main/binary-ia64/kernel-headers-2.4.27-3-itanium-smp_2.4.27-10sarge4_ia64.deb stable/main/source/kernel-image-2.4.27-ia64_2.4.27-10sarge4.dsc stable/main/binary-ia64/kernel-image-2.4.27-3-itanium_2.4.27-10sarge4_ia64.deb stable/main/binary-ia64/kernel-headers-2.4.27-3-itanium_2.4.27-10sarge4_ia64.deb stable/main/binary-ia64/kernel-image-2.4.27-3-mckinley_2.4.27-10sarge4_ia64.deb stable/main/binary-ia64/kernel-headers-2.4.27-3_2.4.27-10sarge4_ia64.deb stable/main/source/kernel-image-2.4.27-ia64_2.4.27-10sarge4.tar.gz stable/main/binary-ia64/kernel-image-2.4-mckinley_2.4.27-10sarge4_ia64.deb stable/main/binary-ia64/kernel-headers-2.4.27-3-mckinley-smp_2.4.27-10sarge4_ia64.deb stable/main/binary-ia64/kernel-build-2.4.27-3_2.4.27-10sarge4_ia64.deb kernel-image-2.4.27-ia64 (2.4.27-10sarge4) stable-security; urgency=high * Build against kernel-tree-2.4.27-10sarge4: * [ERRATA] 213_madvise_remove-restrict.diff [SECURITY] The 2.4.27-10sarge3 changelog associated this patch with CVE-2006-1524. However, this patch fixes an mprotect issue that was split off from the original report into CVE-2006-2071. 2.4.27 is not vulnerable to CVE-2006-1524 the madvise_remove issue. See CVE-2006-2071 * 223_nfs-handle-long-symlinks.diff [SECURITY] Fix buffer overflow in NFS readline handling that allows a remote server to cause a denial of service (crash) via a long symlink See CVE-2005-4798 * 224_cdrom-bad-cgc.buflen-assign.diff [SECURITY] Fix buffer overflow in dvd_read_bca which could potentially be used by a local user to trigger a buffer overflow via a specially crafted DVD, USB stick, or similar automatically mounted device. See CVE-2006-2935 * 225_sg-no-mmap-VM_IO.diff [SECURITY] Fix DoS vulnerability whereby a local user could attempt a dio/mmap and cause the sg driver to oops. See CVE-2006-1528 * 226_snmp-nat-mem-corruption-fix.diff [SECURITY] Fix memory corruption in snmp_trap_decode See CVE-2006-2444 * 227_kfree_skb.diff [SECURITY] Fix race between kfree_skb and __skb_unlink See CVE-2006-2446 * 228_sparc-mb-extraneous-semicolons.diff Fix a syntax error caused by extranous semicolons in smp_mb() macros which resulted in a build failure with 227_kfree_skb.diff * 229_sctp-priv-elevation.diff, 230_sctp-priv-elevation-2.diff [SECURITY] Fix SCTP privelege escalation See CVE-2006-3745 * 231_udf-deadlock.diff [SECURITY] Fix possible UDF deadlock and memory corruption See CVE-2006-4145 * 232_sparc-membar-extraneous-semicolons.diff Fix an additional syntax error caused by extraneous semicolons in membar macros on sparc stable/main/binary-i386/kernel-image-2.4.27-3-386_2.4.27-10sarge4_i386.deb stable/main/binary-i386/kernel-pcmcia-modules-2.4.27-3-k7_2.4.27-10sarge4_i386.deb stable/main/binary-i386/kernel-image-2.4.27-3-k7_2.4.27-10sarge4_i386.deb stable/main/binary-i386/kernel-headers-2.4.27-3-686_2.4.27-10sarge4_i386.deb stable/main/binary-i386/kernel-image-2.4.27-3-686_2.4.27-10sarge4_i386.deb stable/main/source/kernel-image-2.4.27-i386_2.4.27-10sarge4.tar.gz stable/main/binary-i386/kernel-headers-2.4.27-3-k7_2.4.27-10sarge4_i386.deb stable/main/binary-i386/kernel-headers-2.4.27-3-686-smp_2.4.27-10sarge4_i386.deb stable/main/binary-i386/kernel-image-2.4.27-3-686-smp_2.4.27-10sarge4_i386.deb stable/main/binary-i386/kernel-headers-2.4.27-3-k6_2.4.27-10sarge4_i386.deb stable/main/binary-i386/kernel-pcmcia-modules-2.4.27-3-k7-smp_2.4.27-10sarge4_i386.deb stable/main/binary-i386/kernel-headers-2.4.27-3-k7-smp_2.4.27-10sarge4_i386.deb stable/main/binary-i386/kernel-image-2.4.27-3-k6_2.4.27-10sarge4_i386.deb stable/main/binary-i386/kernel-build-2.4.27-3_2.4.27-10sarge4_i386.deb stable/main/binary-i386/kernel-pcmcia-modules-2.4.27-3-k6_2.4.27-10sarge4_i386.deb stable/main/binary-i386/kernel-pcmcia-modules-2.4.27-3-386_2.4.27-10sarge4_i386.deb stable/main/binary-i386/kernel-image-2.4.27-3-586tsc_2.4.27-10sarge4_i386.deb stable/main/binary-i386/kernel-headers-2.4.27-3-586tsc_2.4.27-10sarge4_i386.deb stable/main/binary-i386/kernel-pcmcia-modules-2.4.27-3-686-smp_2.4.27-10sarge4_i386.deb stable/main/binary-i386/kernel-headers-2.4.27-3-386_2.4.27-10sarge4_i386.deb stable/main/binary-i386/kernel-pcmcia-modules-2.4.27-3-686_2.4.27-10sarge4_i386.deb stable/main/binary-i386/kernel-image-2.4.27-3-k7-smp_2.4.27-10sarge4_i386.deb stable/main/source/kernel-image-2.4.27-i386_2.4.27-10sarge4.dsc stable/main/binary-i386/kernel-pcmcia-modules-2.4.27-3-586tsc_2.4.27-10sarge4_i386.deb stable/main/binary-i386/kernel-headers-2.4.27-3_2.4.27-10sarge4_i386.deb kernel-image-2.4.27-i386 (2.4.27-10sarge4) stable-security; urgency=high * Build against kernel-tree-2.4.27-10sarge4: * [ERRATA] 213_madvise_remove-restrict.diff [SECURITY] The 2.4.27-10sarge3 changelog associated this patch with CVE-2006-1524. However, this patch fixes an mprotect issue that was split off from the original report into CVE-2006-2071. 2.4.27 is not vulnerable to CVE-2006-1524 the madvise_remove issue. See CVE-2006-2071 * 223_nfs-handle-long-symlinks.diff [SECURITY] Fix buffer overflow in NFS readline handling that allows a remote server to cause a denial of service (crash) via a long symlink See CVE-2005-4798 * 224_cdrom-bad-cgc.buflen-assign.diff [SECURITY] Fix buffer overflow in dvd_read_bca which could potentially be used by a local user to trigger a buffer overflow via a specially crafted DVD, USB stick, or similar automatically mounted device. See CVE-2006-2935 * 225_sg-no-mmap-VM_IO.diff [SECURITY] Fix DoS vulnerability whereby a local user could attempt a dio/mmap and cause the sg driver to oops. See CVE-2006-1528 * 226_snmp-nat-mem-corruption-fix.diff [SECURITY] Fix memory corruption in snmp_trap_decode See CVE-2006-2444 * 227_kfree_skb.diff [SECURITY] Fix race between kfree_skb and __skb_unlink See CVE-2006-2446 * 228_sparc-mb-extraneous-semicolons.diff Fix a syntax error caused by extranous semicolons in smp_mb() macros which resulted in a build failure with 227_kfree_skb.diff * 229_sctp-priv-elevation.diff, 230_sctp-priv-elevation-2.diff [SECURITY] Fix SCTP privelege escalation See CVE-2006-3745 * 231_udf-deadlock.diff [SECURITY] Fix possible UDF deadlock and memory corruption See CVE-2006-4145 * 232_sparc-membar-extraneous-semicolons.diff Fix an additional syntax error caused by extraneous semicolons in membar macros on sparc stable/main/binary-arm/kernel-image-2.4.27-riscpc_2.4.27-2sarge4_arm.deb stable/main/binary-arm/kernel-image-2.4.27-riscstation_2.4.27-2sarge4_arm.deb stable/main/binary-arm/kernel-headers-2.4.27_2.4.27-2sarge4_arm.deb stable/main/source/kernel-image-2.4.27-arm_2.4.27-2sarge4.dsc stable/main/binary-arm/kernel-image-2.4.27-netwinder_2.4.27-2sarge4_arm.deb stable/main/binary-arm/kernel-build-2.4.27_2.4.27-2sarge4_arm.deb stable/main/source/kernel-image-2.4.27-arm_2.4.27-2sarge4.tar.gz stable/main/binary-arm/kernel-image-2.4.27-bast_2.4.27-2sarge4_arm.deb stable/main/binary-arm/kernel-image-2.4.27-lart_2.4.27-2sarge4_arm.deb kernel-image-2.4.27-arm (2.4.27-2sarge4) stable-security; urgency=high * Build against kernel-tree-2.4.27-10sarge4: * [ERRATA] 213_madvise_remove-restrict.diff [SECURITY] The 2.4.27-10sarge3 changelog associated this patch with CVE-2006-1524. However, this patch fixes an mprotect issue that was split off from the original report into CVE-2006-2071. 2.4.27 is not vulnerable to CVE-2006-1524 the madvise_remove issue. See CVE-2006-2071 * 223_nfs-handle-long-symlinks.diff [SECURITY] Fix buffer overflow in NFS readline handling that allows a remote server to cause a denial of service (crash) via a long symlink See CVE-2005-4798 * 224_cdrom-bad-cgc.buflen-assign.diff [SECURITY] Fix buffer overflow in dvd_read_bca which could potentially be used by a local user to trigger a buffer overflow via a specially crafted DVD, USB stick, or similar automatically mounted device. See CVE-2006-2935 * 225_sg-no-mmap-VM_IO.diff [SECURITY] Fix DoS vulnerability whereby a local user could attempt a dio/mmap and cause the sg driver to oops. See CVE-2006-1528 * 226_snmp-nat-mem-corruption-fix.diff [SECURITY] Fix memory corruption in snmp_trap_decode See CVE-2006-2444 * 227_kfree_skb.diff [SECURITY] Fix race between kfree_skb and __skb_unlink See CVE-2006-2446 * 228_sparc-mb-extraneous-semicolons.diff Fix a syntax error caused by extranous semicolons in smp_mb() macros which resulted in a build failure with 227_kfree_skb.diff * 229_sctp-priv-elevation.diff, 230_sctp-priv-elevation-2.diff [SECURITY] Fix SCTP privelege escalation See CVE-2006-3745 * 231_udf-deadlock.diff [SECURITY] Fix possible UDF deadlock and memory corruption See CVE-2006-4145 * 232_sparc-membar-extraneous-semicolons.diff Fix an additional syntax error caused by extraneous semicolons in membar macros on sparc stable/main/source/kernel-image-2.4.27-alpha_2.4.27-10sarge4.tar.gz stable/main/binary-alpha/kernel-headers-2.4.27-3_2.4.27-10sarge4_alpha.deb stable/main/binary-alpha/kernel-image-2.4.27-3-smp_2.4.27-10sarge4_alpha.deb stable/main/source/kernel-image-2.4.27-alpha_2.4.27-10sarge4.dsc stable/main/binary-alpha/kernel-headers-2.4.27-3-smp_2.4.27-10sarge4_alpha.deb stable/main/binary-alpha/kernel-build-2.4.27-3_2.4.27-10sarge4_alpha.deb stable/main/binary-alpha/kernel-headers-2.4.27-3-generic_2.4.27-10sarge4_alpha.deb stable/main/binary-alpha/kernel-image-2.4.27-3-generic_2.4.27-10sarge4_alpha.deb kernel-image-2.4.27-alpha (2.4.27-10sarge4) stable-security; urgency=high * Build against kernel-tree-2.4.27-10sarge4: * [ERRATA] 213_madvise_remove-restrict.diff [SECURITY] The 2.4.27-10sarge3 changelog associated this patch with CVE-2006-1524. However, this patch fixes an mprotect issue that was split off from the original report into CVE-2006-2071. 2.4.27 is not vulnerable to CVE-2006-1524 the madvise_remove issue. See CVE-2006-2071 * 223_nfs-handle-long-symlinks.diff [SECURITY] Fix buffer overflow in NFS readline handling that allows a remote server to cause a denial of service (crash) via a long symlink See CVE-2005-4798 * 224_cdrom-bad-cgc.buflen-assign.diff [SECURITY] Fix buffer overflow in dvd_read_bca which could potentially be used by a local user to trigger a buffer overflow via a specially crafted DVD, USB stick, or similar automatically mounted device. See CVE-2006-2935 * 225_sg-no-mmap-VM_IO.diff [SECURITY] Fix DoS vulnerability whereby a local user could attempt a dio/mmap and cause the sg driver to oops. See CVE-2006-1528 * 226_snmp-nat-mem-corruption-fix.diff [SECURITY] Fix memory corruption in snmp_trap_decode See CVE-2006-2444 * 227_kfree_skb.diff [SECURITY] Fix race between kfree_skb and __skb_unlink See CVE-2006-2446 * 228_sparc-mb-extraneous-semicolons.diff Fix a syntax error caused by extranous semicolons in smp_mb() macros which resulted in a build failure with 227_kfree_skb.diff * 229_sctp-priv-elevation.diff, 230_sctp-priv-elevation-2.diff [SECURITY] Fix SCTP privelege escalation See CVE-2006-3745 * 231_udf-deadlock.diff [SECURITY] Fix possible UDF deadlock and memory corruption See CVE-2006-4145 * 232_sparc-membar-extraneous-semicolons.diff Fix an additional syntax error caused by extraneous semicolons in membar macros on sparc stable/main/binary-sparc/kdeprint_3.3.2-1sarge3_sparc.deb stable/main/binary-sparc/khelpcenter_3.3.2-1sarge3_sparc.deb stable/main/binary-sparc/ksysguardd_3.3.2-1sarge3_sparc.deb stable/main/binary-sparc/konsole_3.3.2-1sarge3_sparc.deb stable/main/binary-sparc/konqueror_3.3.2-1sarge3_sparc.deb stable/main/binary-sparc/ksmserver_3.3.2-1sarge3_sparc.deb stable/main/binary-sparc/kcontrol_3.3.2-1sarge3_sparc.deb stable/main/binary-sparc/kfind_3.3.2-1sarge3_sparc.deb stable/main/binary-sparc/kdesktop_3.3.2-1sarge3_sparc.deb stable/main/binary-sparc/libkonq4_3.3.2-1sarge3_sparc.deb stable/main/binary-sparc/konqueror-nsplugins_3.3.2-1sarge3_sparc.deb stable/main/binary-sparc/kappfinder_3.3.2-1sarge3_sparc.deb stable/main/binary-sparc/kate_3.3.2-1sarge3_sparc.deb stable/main/binary-sparc/klipper_3.3.2-1sarge3_sparc.deb stable/main/binary-sparc/kwin_3.3.2-1sarge3_sparc.deb stable/main/binary-sparc/kdebase-kio-plugins_3.3.2-1sarge3_sparc.deb stable/main/binary-sparc/ktip_3.3.2-1sarge3_sparc.deb stable/main/binary-sparc/ksplash_3.3.2-1sarge3_sparc.deb stable/main/binary-sparc/kdebase-dev_3.3.2-1sarge3_sparc.deb stable/main/binary-sparc/libkonq4-dev_3.3.2-1sarge3_sparc.deb stable/main/binary-sparc/kdepasswd_3.3.2-1sarge3_sparc.deb stable/main/binary-sparc/kpager_3.3.2-1sarge3_sparc.deb stable/main/binary-sparc/kdm_3.3.2-1sarge3_sparc.deb stable/main/binary-sparc/kdebase-bin_3.3.2-1sarge3_sparc.deb stable/main/binary-sparc/kmenuedit_3.3.2-1sarge3_sparc.deb stable/main/binary-sparc/kpersonalizer_3.3.2-1sarge3_sparc.deb stable/main/binary-sparc/ksysguard_3.3.2-1sarge3_sparc.deb stable/main/binary-sparc/kicker_3.3.2-1sarge3_sparc.deb kdebase (4:3.3.2-1sarge3) stable-security; urgency=high * Non-maintainer upload by the Security Team * Fix information disclosure vulnerability in kdm [debian/patches/17_CVE-2006-2449-information-disclosure.diff] stable/main/binary-s390/kpersonalizer_3.3.2-1sarge3_s390.deb stable/main/binary-s390/konsole_3.3.2-1sarge3_s390.deb stable/main/binary-s390/kfind_3.3.2-1sarge3_s390.deb stable/main/binary-s390/kdm_3.3.2-1sarge3_s390.deb stable/main/binary-s390/konqueror-nsplugins_3.3.2-1sarge3_s390.deb stable/main/binary-s390/kicker_3.3.2-1sarge3_s390.deb stable/main/binary-s390/ktip_3.3.2-1sarge3_s390.deb stable/main/binary-s390/kdesktop_3.3.2-1sarge3_s390.deb stable/main/binary-s390/ksysguard_3.3.2-1sarge3_s390.deb stable/main/binary-s390/konqueror_3.3.2-1sarge3_s390.deb stable/main/binary-s390/ksplash_3.3.2-1sarge3_s390.deb stable/main/binary-s390/klipper_3.3.2-1sarge3_s390.deb stable/main/binary-s390/kdepasswd_3.3.2-1sarge3_s390.deb stable/main/binary-s390/kate_3.3.2-1sarge3_s390.deb stable/main/binary-s390/libkonq4-dev_3.3.2-1sarge3_s390.deb stable/main/binary-s390/khelpcenter_3.3.2-1sarge3_s390.deb stable/main/binary-s390/kmenuedit_3.3.2-1sarge3_s390.deb stable/main/binary-s390/ksysguardd_3.3.2-1sarge3_s390.deb stable/main/binary-s390/kdeprint_3.3.2-1sarge3_s390.deb stable/main/binary-s390/kappfinder_3.3.2-1sarge3_s390.deb stable/main/binary-s390/ksmserver_3.3.2-1sarge3_s390.deb stable/main/binary-s390/kdebase-kio-plugins_3.3.2-1sarge3_s390.deb stable/main/binary-s390/libkonq4_3.3.2-1sarge3_s390.deb stable/main/binary-s390/kcontrol_3.3.2-1sarge3_s390.deb stable/main/binary-s390/kdebase-bin_3.3.2-1sarge3_s390.deb stable/main/binary-s390/kdebase-dev_3.3.2-1sarge3_s390.deb stable/main/binary-s390/kpager_3.3.2-1sarge3_s390.deb stable/main/binary-s390/kwin_3.3.2-1sarge3_s390.deb kdebase (4:3.3.2-1sarge3) stable-security; urgency=high * Non-maintainer upload by the Security Team * Fix information disclosure vulnerability in kdm [debian/patches/17_CVE-2006-2449-information-disclosure.diff] stable/main/binary-powerpc/kdm_3.3.2-1sarge3_powerpc.deb stable/main/binary-powerpc/kpersonalizer_3.3.2-1sarge3_powerpc.deb stable/main/binary-powerpc/ksysguard_3.3.2-1sarge3_powerpc.deb stable/main/binary-powerpc/kdesktop_3.3.2-1sarge3_powerpc.deb stable/main/binary-powerpc/ksplash_3.3.2-1sarge3_powerpc.deb stable/main/binary-powerpc/kicker_3.3.2-1sarge3_powerpc.deb stable/main/binary-powerpc/ktip_3.3.2-1sarge3_powerpc.deb stable/main/binary-powerpc/konsole_3.3.2-1sarge3_powerpc.deb stable/main/binary-powerpc/kdebase-kio-plugins_3.3.2-1sarge3_powerpc.deb stable/main/binary-powerpc/kwin_3.3.2-1sarge3_powerpc.deb stable/main/binary-powerpc/kappfinder_3.3.2-1sarge3_powerpc.deb stable/main/binary-powerpc/kpager_3.3.2-1sarge3_powerpc.deb stable/main/binary-powerpc/klipper_3.3.2-1sarge3_powerpc.deb stable/main/binary-powerpc/konqueror-nsplugins_3.3.2-1sarge3_powerpc.deb stable/main/binary-powerpc/libkonq4-dev_3.3.2-1sarge3_powerpc.deb stable/main/binary-powerpc/konqueror_3.3.2-1sarge3_powerpc.deb stable/main/binary-powerpc/kdebase-dev_3.3.2-1sarge3_powerpc.deb stable/main/binary-powerpc/kate_3.3.2-1sarge3_powerpc.deb stable/main/binary-powerpc/kcontrol_3.3.2-1sarge3_powerpc.deb stable/main/binary-powerpc/kfind_3.3.2-1sarge3_powerpc.deb stable/main/binary-powerpc/kdeprint_3.3.2-1sarge3_powerpc.deb stable/main/binary-powerpc/kdepasswd_3.3.2-1sarge3_powerpc.deb stable/main/binary-powerpc/khelpcenter_3.3.2-1sarge3_powerpc.deb stable/main/binary-powerpc/libkonq4_3.3.2-1sarge3_powerpc.deb stable/main/binary-powerpc/ksysguardd_3.3.2-1sarge3_powerpc.deb stable/main/binary-powerpc/kdebase-bin_3.3.2-1sarge3_powerpc.deb stable/main/binary-powerpc/ksmserver_3.3.2-1sarge3_powerpc.deb stable/main/binary-powerpc/kmenuedit_3.3.2-1sarge3_powerpc.deb kdebase (4:3.3.2-1sarge3) stable-security; urgency=high * Non-maintainer upload by the Security Team * Fix information disclosure vulnerability in kdm [debian/patches/17_CVE-2006-2449-information-disclosure.diff] stable/main/binary-mipsel/konqueror-nsplugins_3.3.2-1sarge3_mipsel.deb stable/main/binary-mipsel/kicker_3.3.2-1sarge3_mipsel.deb stable/main/binary-mipsel/kdebase-dev_3.3.2-1sarge3_mipsel.deb stable/main/binary-mipsel/libkonq4-dev_3.3.2-1sarge3_mipsel.deb stable/main/binary-mipsel/kpersonalizer_3.3.2-1sarge3_mipsel.deb stable/main/binary-mipsel/kdesktop_3.3.2-1sarge3_mipsel.deb stable/main/binary-mipsel/konsole_3.3.2-1sarge3_mipsel.deb stable/main/binary-mipsel/ksmserver_3.3.2-1sarge3_mipsel.deb stable/main/binary-mipsel/libkonq4_3.3.2-1sarge3_mipsel.deb stable/main/binary-mipsel/ktip_3.3.2-1sarge3_mipsel.deb stable/main/binary-mipsel/kdeprint_3.3.2-1sarge3_mipsel.deb stable/main/binary-mipsel/kwin_3.3.2-1sarge3_mipsel.deb stable/main/binary-mipsel/kate_3.3.2-1sarge3_mipsel.deb stable/main/binary-mipsel/ksplash_3.3.2-1sarge3_mipsel.deb stable/main/binary-mipsel/kfind_3.3.2-1sarge3_mipsel.deb stable/main/binary-mipsel/konqueror_3.3.2-1sarge3_mipsel.deb stable/main/binary-mipsel/kdebase-bin_3.3.2-1sarge3_mipsel.deb stable/main/binary-mipsel/kcontrol_3.3.2-1sarge3_mipsel.deb stable/main/binary-mipsel/kdm_3.3.2-1sarge3_mipsel.deb stable/main/binary-mipsel/klipper_3.3.2-1sarge3_mipsel.deb stable/main/binary-mipsel/ksysguardd_3.3.2-1sarge3_mipsel.deb stable/main/binary-mipsel/kpager_3.3.2-1sarge3_mipsel.deb stable/main/binary-mipsel/kmenuedit_3.3.2-1sarge3_mipsel.deb stable/main/binary-mipsel/kappfinder_3.3.2-1sarge3_mipsel.deb stable/main/binary-mipsel/ksysguard_3.3.2-1sarge3_mipsel.deb stable/main/binary-mipsel/kdepasswd_3.3.2-1sarge3_mipsel.deb stable/main/binary-mipsel/khelpcenter_3.3.2-1sarge3_mipsel.deb stable/main/binary-mipsel/kdebase-kio-plugins_3.3.2-1sarge3_mipsel.deb kdebase (4:3.3.2-1sarge3) stable-security; urgency=high * Non-maintainer upload by the Security Team * Fix information disclosure vulnerability in kdm [debian/patches/17_CVE-2006-2449-information-disclosure.diff] stable/main/binary-mips/kcontrol_3.3.2-1sarge3_mips.deb stable/main/binary-mips/konqueror-nsplugins_3.3.2-1sarge3_mips.deb stable/main/binary-mips/kdepasswd_3.3.2-1sarge3_mips.deb stable/main/binary-mips/kdebase-kio-plugins_3.3.2-1sarge3_mips.deb stable/main/binary-mips/kdebase-bin_3.3.2-1sarge3_mips.deb stable/main/binary-mips/konqueror_3.3.2-1sarge3_mips.deb stable/main/binary-mips/kfind_3.3.2-1sarge3_mips.deb stable/main/binary-mips/libkonq4-dev_3.3.2-1sarge3_mips.deb stable/main/binary-mips/kdeprint_3.3.2-1sarge3_mips.deb stable/main/binary-mips/klipper_3.3.2-1sarge3_mips.deb stable/main/binary-mips/ksplash_3.3.2-1sarge3_mips.deb stable/main/binary-mips/kwin_3.3.2-1sarge3_mips.deb stable/main/binary-mips/kappfinder_3.3.2-1sarge3_mips.deb stable/main/binary-mips/khelpcenter_3.3.2-1sarge3_mips.deb stable/main/binary-mips/kpager_3.3.2-1sarge3_mips.deb stable/main/binary-mips/konsole_3.3.2-1sarge3_mips.deb stable/main/binary-mips/ksmserver_3.3.2-1sarge3_mips.deb stable/main/binary-mips/kpersonalizer_3.3.2-1sarge3_mips.deb stable/main/binary-mips/kate_3.3.2-1sarge3_mips.deb stable/main/binary-mips/ksysguard_3.3.2-1sarge3_mips.deb stable/main/binary-mips/kdm_3.3.2-1sarge3_mips.deb stable/main/binary-mips/ktip_3.3.2-1sarge3_mips.deb stable/main/binary-mips/ksysguardd_3.3.2-1sarge3_mips.deb stable/main/binary-mips/libkonq4_3.3.2-1sarge3_mips.deb stable/main/binary-mips/kicker_3.3.2-1sarge3_mips.deb stable/main/binary-mips/kdesktop_3.3.2-1sarge3_mips.deb stable/main/binary-mips/kdebase-dev_3.3.2-1sarge3_mips.deb stable/main/binary-mips/kmenuedit_3.3.2-1sarge3_mips.deb kdebase (4:3.3.2-1sarge3) stable-security; urgency=high * Non-maintainer upload by the Security Team * Fix information disclosure vulnerability in kdm [debian/patches/17_CVE-2006-2449-information-disclosure.diff] stable/main/binary-m68k/ksplash_3.3.2-1sarge3_m68k.deb stable/main/binary-m68k/libkonq4-dev_3.3.2-1sarge3_m68k.deb stable/main/binary-m68k/kdesktop_3.3.2-1sarge3_m68k.deb stable/main/binary-m68k/khelpcenter_3.3.2-1sarge3_m68k.deb stable/main/binary-m68k/kdepasswd_3.3.2-1sarge3_m68k.deb stable/main/binary-m68k/konqueror-nsplugins_3.3.2-1sarge3_m68k.deb stable/main/binary-m68k/kdebase-dev_3.3.2-1sarge3_m68k.deb stable/main/binary-m68k/kappfinder_3.3.2-1sarge3_m68k.deb stable/main/binary-m68k/kwin_3.3.2-1sarge3_m68k.deb stable/main/binary-m68k/libkonq4_3.3.2-1sarge3_m68k.deb stable/main/binary-m68k/kdm_3.3.2-1sarge3_m68k.deb stable/main/binary-m68k/ktip_3.3.2-1sarge3_m68k.deb stable/main/binary-m68k/klipper_3.3.2-1sarge3_m68k.deb stable/main/binary-m68k/kpersonalizer_3.3.2-1sarge3_m68k.deb stable/main/binary-m68k/kicker_3.3.2-1sarge3_m68k.deb stable/main/binary-m68k/kmenuedit_3.3.2-1sarge3_m68k.deb stable/main/binary-m68k/ksysguard_3.3.2-1sarge3_m68k.deb stable/main/binary-m68k/kdebase-kio-plugins_3.3.2-1sarge3_m68k.deb stable/main/binary-m68k/konsole_3.3.2-1sarge3_m68k.deb stable/main/binary-m68k/kcontrol_3.3.2-1sarge3_m68k.deb stable/main/binary-m68k/ksmserver_3.3.2-1sarge3_m68k.deb stable/main/binary-m68k/kfind_3.3.2-1sarge3_m68k.deb stable/main/binary-m68k/ksysguardd_3.3.2-1sarge3_m68k.deb stable/main/binary-m68k/kdebase-bin_3.3.2-1sarge3_m68k.deb stable/main/binary-m68k/kate_3.3.2-1sarge3_m68k.deb stable/main/binary-m68k/kdeprint_3.3.2-1sarge3_m68k.deb stable/main/binary-m68k/kpager_3.3.2-1sarge3_m68k.deb stable/main/binary-m68k/konqueror_3.3.2-1sarge3_m68k.deb kdebase (4:3.3.2-1sarge3) stable-security; urgency=high * Non-maintainer upload by the Security Team * Fix information disclosure vulnerability in kdm [debian/patches/17_CVE-2006-2449-information-disclosure.diff] stable/main/binary-ia64/kdepasswd_3.3.2-1sarge3_ia64.deb stable/main/binary-ia64/kcontrol_3.3.2-1sarge3_ia64.deb stable/main/binary-ia64/ksysguard_3.3.2-1sarge3_ia64.deb stable/main/binary-ia64/konqueror-nsplugins_3.3.2-1sarge3_ia64.deb stable/main/binary-ia64/libkonq4_3.3.2-1sarge3_ia64.deb stable/main/binary-ia64/ktip_3.3.2-1sarge3_ia64.deb stable/main/binary-ia64/ksysguardd_3.3.2-1sarge3_ia64.deb stable/main/binary-ia64/kfind_3.3.2-1sarge3_ia64.deb stable/main/binary-ia64/kdesktop_3.3.2-1sarge3_ia64.deb stable/main/binary-ia64/konqueror_3.3.2-1sarge3_ia64.deb stable/main/binary-ia64/kdm_3.3.2-1sarge3_ia64.deb stable/main/binary-ia64/libkonq4-dev_3.3.2-1sarge3_ia64.deb stable/main/binary-ia64/kpersonalizer_3.3.2-1sarge3_ia64.deb stable/main/binary-ia64/ksplash_3.3.2-1sarge3_ia64.deb stable/main/binary-ia64/ksmserver_3.3.2-1sarge3_ia64.deb stable/main/binary-ia64/kicker_3.3.2-1sarge3_ia64.deb stable/main/binary-ia64/kappfinder_3.3.2-1sarge3_ia64.deb stable/main/binary-ia64/khelpcenter_3.3.2-1sarge3_ia64.deb stable/main/binary-ia64/kpager_3.3.2-1sarge3_ia64.deb stable/main/binary-ia64/kwin_3.3.2-1sarge3_ia64.deb stable/main/binary-ia64/konsole_3.3.2-1sarge3_ia64.deb stable/main/binary-ia64/kate_3.3.2-1sarge3_ia64.deb stable/main/binary-ia64/klipper_3.3.2-1sarge3_ia64.deb stable/main/binary-ia64/kdebase-kio-plugins_3.3.2-1sarge3_ia64.deb stable/main/binary-ia64/kdebase-bin_3.3.2-1sarge3_ia64.deb stable/main/binary-ia64/kmenuedit_3.3.2-1sarge3_ia64.deb stable/main/binary-ia64/kdeprint_3.3.2-1sarge3_ia64.deb stable/main/binary-ia64/kdebase-dev_3.3.2-1sarge3_ia64.deb kdebase (4:3.3.2-1sarge3) stable-security; urgency=high * Non-maintainer upload by the Security Team * Fix information disclosure vulnerability in kdm [debian/patches/17_CVE-2006-2449-information-disclosure.diff] stable/main/binary-hppa/libkonq4-dev_3.3.2-1sarge3_hppa.deb stable/main/binary-hppa/kcontrol_3.3.2-1sarge3_hppa.deb stable/main/binary-hppa/khelpcenter_3.3.2-1sarge3_hppa.deb stable/main/binary-hppa/ksysguardd_3.3.2-1sarge3_hppa.deb stable/main/binary-hppa/ksmserver_3.3.2-1sarge3_hppa.deb stable/main/binary-hppa/kate_3.3.2-1sarge3_hppa.deb stable/main/binary-hppa/kdeprint_3.3.2-1sarge3_hppa.deb stable/main/binary-hppa/kdepasswd_3.3.2-1sarge3_hppa.deb stable/main/binary-hppa/kdebase-dev_3.3.2-1sarge3_hppa.deb stable/main/binary-hppa/kdesktop_3.3.2-1sarge3_hppa.deb stable/main/binary-hppa/kpersonalizer_3.3.2-1sarge3_hppa.deb stable/main/binary-hppa/konqueror_3.3.2-1sarge3_hppa.deb stable/main/binary-hppa/konsole_3.3.2-1sarge3_hppa.deb stable/main/binary-hppa/kpager_3.3.2-1sarge3_hppa.deb stable/main/binary-hppa/kdebase-kio-plugins_3.3.2-1sarge3_hppa.deb stable/main/binary-hppa/ktip_3.3.2-1sarge3_hppa.deb stable/main/binary-hppa/ksplash_3.3.2-1sarge3_hppa.deb stable/main/binary-hppa/ksysguard_3.3.2-1sarge3_hppa.deb stable/main/binary-hppa/kdm_3.3.2-1sarge3_hppa.deb stable/main/binary-hppa/kappfinder_3.3.2-1sarge3_hppa.deb stable/main/binary-hppa/konqueror-nsplugins_3.3.2-1sarge3_hppa.deb stable/main/binary-hppa/kfind_3.3.2-1sarge3_hppa.deb stable/main/binary-hppa/kicker_3.3.2-1sarge3_hppa.deb stable/main/binary-hppa/kdebase-bin_3.3.2-1sarge3_hppa.deb stable/main/binary-hppa/libkonq4_3.3.2-1sarge3_hppa.deb stable/main/binary-hppa/kwin_3.3.2-1sarge3_hppa.deb stable/main/binary-hppa/klipper_3.3.2-1sarge3_hppa.deb stable/main/binary-hppa/kmenuedit_3.3.2-1sarge3_hppa.deb kdebase (4:3.3.2-1sarge3) stable-security; urgency=high * Non-maintainer upload by the Security Team * Fix information disclosure vulnerability in kdm [debian/patches/17_CVE-2006-2449-information-disclosure.diff] stable/main/binary-arm/khelpcenter_3.3.2-1sarge3_arm.deb stable/main/binary-arm/konqueror-nsplugins_3.3.2-1sarge3_arm.deb stable/main/binary-arm/ksplash_3.3.2-1sarge3_arm.deb stable/main/binary-arm/kfind_3.3.2-1sarge3_arm.deb stable/main/binary-arm/kdebase-dev_3.3.2-1sarge3_arm.deb stable/main/binary-arm/konsole_3.3.2-1sarge3_arm.deb stable/main/binary-arm/konqueror_3.3.2-1sarge3_arm.deb stable/main/binary-arm/ktip_3.3.2-1sarge3_arm.deb stable/main/binary-arm/kdepasswd_3.3.2-1sarge3_arm.deb stable/main/binary-arm/kicker_3.3.2-1sarge3_arm.deb stable/main/binary-arm/kate_3.3.2-1sarge3_arm.deb stable/main/binary-arm/kdebase-bin_3.3.2-1sarge3_arm.deb stable/main/binary-arm/libkonq4_3.3.2-1sarge3_arm.deb stable/main/binary-arm/kwin_3.3.2-1sarge3_arm.deb stable/main/binary-arm/libkonq4-dev_3.3.2-1sarge3_arm.deb stable/main/binary-arm/kmenuedit_3.3.2-1sarge3_arm.deb stable/main/binary-arm/klipper_3.3.2-1sarge3_arm.deb stable/main/binary-arm/kdm_3.3.2-1sarge3_arm.deb stable/main/binary-arm/ksmserver_3.3.2-1sarge3_arm.deb stable/main/binary-arm/kappfinder_3.3.2-1sarge3_arm.deb stable/main/binary-arm/kdebase-kio-plugins_3.3.2-1sarge3_arm.deb stable/main/binary-arm/kdesktop_3.3.2-1sarge3_arm.deb stable/main/binary-arm/kpager_3.3.2-1sarge3_arm.deb stable/main/binary-arm/kdeprint_3.3.2-1sarge3_arm.deb stable/main/binary-arm/ksysguard_3.3.2-1sarge3_arm.deb stable/main/binary-arm/ksysguardd_3.3.2-1sarge3_arm.deb stable/main/binary-arm/kpersonalizer_3.3.2-1sarge3_arm.deb stable/main/binary-arm/kcontrol_3.3.2-1sarge3_arm.deb kdebase (4:3.3.2-1sarge3) stable-security; urgency=high * Non-maintainer upload by the Security Team * Fix information disclosure vulnerability in kdm [debian/patches/17_CVE-2006-2449-information-disclosure.diff] stable/main/binary-alpha/libkonq4_3.3.2-1sarge3_alpha.deb stable/main/binary-alpha/ksysguardd_3.3.2-1sarge3_alpha.deb stable/main/binary-alpha/kcontrol_3.3.2-1sarge3_alpha.deb stable/main/binary-alpha/kfind_3.3.2-1sarge3_alpha.deb stable/main/binary-alpha/kdesktop_3.3.2-1sarge3_alpha.deb stable/main/binary-alpha/kdepasswd_3.3.2-1sarge3_alpha.deb stable/main/binary-alpha/konqueror-nsplugins_3.3.2-1sarge3_alpha.deb stable/main/binary-alpha/konqueror_3.3.2-1sarge3_alpha.deb stable/main/binary-alpha/kdebase-bin_3.3.2-1sarge3_alpha.deb stable/main/binary-alpha/ksplash_3.3.2-1sarge3_alpha.deb stable/main/binary-alpha/ktip_3.3.2-1sarge3_alpha.deb stable/main/binary-alpha/kwin_3.3.2-1sarge3_alpha.deb stable/main/binary-alpha/klipper_3.3.2-1sarge3_alpha.deb stable/main/binary-alpha/kmenuedit_3.3.2-1sarge3_alpha.deb stable/main/binary-alpha/kappfinder_3.3.2-1sarge3_alpha.deb stable/main/binary-alpha/kpager_3.3.2-1sarge3_alpha.deb stable/main/binary-alpha/ksmserver_3.3.2-1sarge3_alpha.deb stable/main/binary-alpha/kpersonalizer_3.3.2-1sarge3_alpha.deb stable/main/binary-alpha/khelpcenter_3.3.2-1sarge3_alpha.deb stable/main/binary-alpha/kdm_3.3.2-1sarge3_alpha.deb stable/main/binary-alpha/libkonq4-dev_3.3.2-1sarge3_alpha.deb stable/main/binary-alpha/kdeprint_3.3.2-1sarge3_alpha.deb stable/main/binary-alpha/ksysguard_3.3.2-1sarge3_alpha.deb stable/main/binary-alpha/kicker_3.3.2-1sarge3_alpha.deb stable/main/binary-alpha/kdebase-dev_3.3.2-1sarge3_alpha.deb stable/main/binary-alpha/kdebase-kio-plugins_3.3.2-1sarge3_alpha.deb stable/main/binary-alpha/konsole_3.3.2-1sarge3_alpha.deb stable/main/binary-alpha/kate_3.3.2-1sarge3_alpha.deb kdebase (4:3.3.2-1sarge3) stable-security; urgency=high * Non-maintainer upload by the Security Team * Fix information disclosure vulnerability in kdm [debian/patches/17_CVE-2006-2449-information-disclosure.diff] stable/main/binary-i386/kmenuedit_3.3.2-1sarge3_i386.deb stable/main/binary-i386/khelpcenter_3.3.2-1sarge3_i386.deb stable/main/binary-i386/kdebase-bin_3.3.2-1sarge3_i386.deb stable/main/binary-i386/ksysguard_3.3.2-1sarge3_i386.deb stable/main/binary-i386/konsole_3.3.2-1sarge3_i386.deb stable/main/binary-i386/kdm_3.3.2-1sarge3_i386.deb stable/main/binary-i386/kdepasswd_3.3.2-1sarge3_i386.deb stable/main/binary-i386/kate_3.3.2-1sarge3_i386.deb stable/main/binary-i386/kwin_3.3.2-1sarge3_i386.deb stable/main/binary-all/xfonts-konsole_3.3.2-1sarge3_all.deb stable/main/binary-i386/ksplash_3.3.2-1sarge3_i386.deb stable/main/binary-i386/kpersonalizer_3.3.2-1sarge3_i386.deb stable/main/source/kdebase_3.3.2-1sarge3.dsc stable/main/binary-i386/kpager_3.3.2-1sarge3_i386.deb stable/main/binary-i386/kappfinder_3.3.2-1sarge3_i386.deb stable/main/binary-i386/ksysguardd_3.3.2-1sarge3_i386.deb stable/main/binary-i386/ksmserver_3.3.2-1sarge3_i386.deb stable/main/binary-all/kdebase-data_3.3.2-1sarge3_all.deb stable/main/binary-i386/kcontrol_3.3.2-1sarge3_i386.deb stable/main/binary-i386/kdebase-dev_3.3.2-1sarge3_i386.deb stable/main/binary-i386/konqueror_3.3.2-1sarge3_i386.deb stable/main/source/kdebase_3.3.2-1sarge3.diff.gz stable/main/binary-i386/kfind_3.3.2-1sarge3_i386.deb stable/main/binary-i386/kicker_3.3.2-1sarge3_i386.deb stable/main/binary-i386/klipper_3.3.2-1sarge3_i386.deb stable/main/binary-i386/ktip_3.3.2-1sarge3_i386.deb stable/main/binary-i386/kdebase-kio-plugins_3.3.2-1sarge3_i386.deb stable/main/binary-i386/kdesktop_3.3.2-1sarge3_i386.deb stable/main/binary-i386/libkonq4_3.3.2-1sarge3_i386.deb stable/main/binary-all/kdebase_3.3.2-1sarge3_all.deb stable/main/binary-i386/konqueror-nsplugins_3.3.2-1sarge3_i386.deb stable/main/binary-all/kdebase-doc_3.3.2-1sarge3_all.deb stable/main/binary-i386/kdeprint_3.3.2-1sarge3_i386.deb stable/main/binary-i386/libkonq4-dev_3.3.2-1sarge3_i386.deb kdebase (4:3.3.2-1sarge3) stable-security; urgency=high * Non-maintainer upload by the Security Team * Fix information disclosure vulnerability in kdm [debian/patches/17_CVE-2006-2449-information-disclosure.diff] stable/main/binary-sparc/isakmpd_20041012-1sarge1_sparc.deb isakmpd (20041012-1sarge1) stable-security; urgency=high * Non-maintainer upload by the Security Team * Apply upstream patch to correct CVE-2006-4436 (Debian bug #385894) stable/main/binary-s390/isakmpd_20041012-1sarge1_s390.deb isakmpd (20041012-1sarge1) stable-security; urgency=high * Non-maintainer upload by the Security Team * Apply upstream patch to correct CVE-2006-4436 (Debian bug #385894) stable/main/binary-powerpc/isakmpd_20041012-1sarge1_powerpc.deb isakmpd (20041012-1sarge1) stable-security; urgency=high * Non-maintainer upload by the Security Team * Apply upstream patch to correct CVE-2006-4436 (Debian bug #385894) stable/main/binary-mipsel/isakmpd_20041012-1sarge1_mipsel.deb isakmpd (20041012-1sarge1) stable-security; urgency=high * Non-maintainer upload by the Security Team * Apply upstream patch to correct CVE-2006-4436 (Debian bug #385894) stable/main/binary-mips/isakmpd_20041012-1sarge1_mips.deb isakmpd (20041012-1sarge1) stable-security; urgency=high * Non-maintainer upload by the Security Team * Apply upstream patch to correct CVE-2006-4436 (Debian bug #385894) stable/main/binary-m68k/isakmpd_20041012-1sarge1_m68k.deb isakmpd (20041012-1sarge1) stable-security; urgency=high * Non-maintainer upload by the Security Team * Apply upstream patch to correct CVE-2006-4436 (Debian bug #385894) stable/main/binary-ia64/isakmpd_20041012-1sarge1_ia64.deb isakmpd (20041012-1sarge1) stable-security; urgency=high * Non-maintainer upload by the Security Team * Apply upstream patch to correct CVE-2006-4436 (Debian bug #385894) stable/main/binary-hppa/isakmpd_20041012-1sarge1_hppa.deb isakmpd (20041012-1sarge1) stable-security; urgency=high * Non-maintainer upload by the Security Team * Apply upstream patch to correct CVE-2006-4436 (Debian bug #385894) stable/main/binary-arm/isakmpd_20041012-1sarge1_arm.deb isakmpd (20041012-1sarge1) stable-security; urgency=high * Non-maintainer upload by the Security Team * Apply upstream patch to correct CVE-2006-4436 (Debian bug #385894) stable/main/binary-alpha/isakmpd_20041012-1sarge1_alpha.deb isakmpd (20041012-1sarge1) stable-security; urgency=high * Non-maintainer upload by the Security Team * Apply upstream patch to correct CVE-2006-4436 (Debian bug #385894) stable/main/binary-i386/isakmpd_20041012-1sarge1_i386.deb stable/main/source/isakmpd_20041012-1sarge1.dsc stable/main/source/isakmpd_20041012-1sarge1.diff.gz isakmpd (20041012-1sarge1) stable-security; urgency=high * Non-maintainer upload by the Security Team * Apply upstream patch to correct CVE-2006-4436 (Debian bug #385894) stable/main/binary-sparc/libmagick++6_6.0.6.2-2.7_sparc.deb stable/main/binary-sparc/libmagick6_6.0.6.2-2.7_sparc.deb stable/main/binary-sparc/imagemagick_6.0.6.2-2.7_sparc.deb stable/main/binary-sparc/perlmagick_6.0.6.2-2.7_sparc.deb stable/main/binary-sparc/libmagick6-dev_6.0.6.2-2.7_sparc.deb stable/main/binary-sparc/libmagick++6-dev_6.0.6.2-2.7_sparc.deb imagemagick (6:6.0.6.2-2.7) stable-security; urgency=high * Non-maintainer upload by the Security Team * Fix buffer overflows in SUN bitmap decoder [CVE-2006-3744] * Fix buffer overflows in XCF decoder [CVE-2006-3743] * Fix buffer overflow in display(1) [CVE-2006-2440] stable/main/binary-s390/libmagick6-dev_6.0.6.2-2.7_s390.deb stable/main/binary-s390/perlmagick_6.0.6.2-2.7_s390.deb stable/main/binary-s390/libmagick++6_6.0.6.2-2.7_s390.deb stable/main/binary-s390/imagemagick_6.0.6.2-2.7_s390.deb stable/main/binary-s390/libmagick++6-dev_6.0.6.2-2.7_s390.deb stable/main/binary-s390/libmagick6_6.0.6.2-2.7_s390.deb imagemagick (6:6.0.6.2-2.7) stable-security; urgency=high * Non-maintainer upload by the Security Team * Fix buffer overflows in SUN bitmap decoder [CVE-2006-3744] * Fix buffer overflows in XCF decoder [CVE-2006-3743] * Fix buffer overflow in display(1) [CVE-2006-2440] stable/main/binary-powerpc/libmagick6_6.0.6.2-2.7_powerpc.deb stable/main/binary-powerpc/libmagick++6-dev_6.0.6.2-2.7_powerpc.deb stable/main/binary-powerpc/imagemagick_6.0.6.2-2.7_powerpc.deb stable/main/binary-powerpc/libmagick++6_6.0.6.2-2.7_powerpc.deb stable/main/binary-powerpc/libmagick6-dev_6.0.6.2-2.7_powerpc.deb stable/main/binary-powerpc/perlmagick_6.0.6.2-2.7_powerpc.deb imagemagick (6:6.0.6.2-2.7) stable-security; urgency=high * Non-maintainer upload by the Security Team * Fix buffer overflows in SUN bitmap decoder [CVE-2006-3744] * Fix buffer overflows in XCF decoder [CVE-2006-3743] * Fix buffer overflow in display(1) [CVE-2006-2440] stable/main/binary-mipsel/perlmagick_6.0.6.2-2.7_mipsel.deb stable/main/binary-mipsel/libmagick++6-dev_6.0.6.2-2.7_mipsel.deb stable/main/binary-mipsel/libmagick6-dev_6.0.6.2-2.7_mipsel.deb stable/main/binary-mipsel/libmagick++6_6.0.6.2-2.7_mipsel.deb stable/main/binary-mipsel/imagemagick_6.0.6.2-2.7_mipsel.deb stable/main/binary-mipsel/libmagick6_6.0.6.2-2.7_mipsel.deb imagemagick (6:6.0.6.2-2.7) stable-security; urgency=high * Non-maintainer upload by the Security Team * Fix buffer overflows in SUN bitmap decoder [CVE-2006-3744] * Fix buffer overflows in XCF decoder [CVE-2006-3743] * Fix buffer overflow in display(1) [CVE-2006-2440] stable/main/binary-mips/libmagick++6-dev_6.0.6.2-2.7_mips.deb stable/main/binary-mips/perlmagick_6.0.6.2-2.7_mips.deb stable/main/binary-mips/libmagick6_6.0.6.2-2.7_mips.deb stable/main/binary-mips/libmagick6-dev_6.0.6.2-2.7_mips.deb stable/main/binary-mips/libmagick++6_6.0.6.2-2.7_mips.deb stable/main/binary-mips/imagemagick_6.0.6.2-2.7_mips.deb imagemagick (6:6.0.6.2-2.7) stable-security; urgency=high * Non-maintainer upload by the Security Team * Fix buffer overflows in SUN bitmap decoder [CVE-2006-3744] * Fix buffer overflows in XCF decoder [CVE-2006-3743] * Fix buffer overflow in display(1) [CVE-2006-2440] stable/main/binary-m68k/imagemagick_6.0.6.2-2.7_m68k.deb stable/main/binary-m68k/libmagick++6_6.0.6.2-2.7_m68k.deb stable/main/binary-m68k/libmagick6-dev_6.0.6.2-2.7_m68k.deb stable/main/binary-m68k/perlmagick_6.0.6.2-2.7_m68k.deb stable/main/binary-m68k/libmagick6_6.0.6.2-2.7_m68k.deb stable/main/binary-m68k/libmagick++6-dev_6.0.6.2-2.7_m68k.deb imagemagick (6:6.0.6.2-2.7) stable-security; urgency=high * Non-maintainer upload by the Security Team * Fix buffer overflows in SUN bitmap decoder [CVE-2006-3744] * Fix buffer overflows in XCF decoder [CVE-2006-3743] * Fix buffer overflow in display(1) [CVE-2006-2440] stable/main/binary-ia64/perlmagick_6.0.6.2-2.7_ia64.deb stable/main/binary-ia64/libmagick++6-dev_6.0.6.2-2.7_ia64.deb stable/main/binary-ia64/libmagick6_6.0.6.2-2.7_ia64.deb stable/main/binary-ia64/libmagick6-dev_6.0.6.2-2.7_ia64.deb stable/main/binary-ia64/imagemagick_6.0.6.2-2.7_ia64.deb stable/main/binary-ia64/libmagick++6_6.0.6.2-2.7_ia64.deb imagemagick (6:6.0.6.2-2.7) stable-security; urgency=high * Non-maintainer upload by the Security Team * Fix buffer overflows in SUN bitmap decoder [CVE-2006-3744] * Fix buffer overflows in XCF decoder [CVE-2006-3743] * Fix buffer overflow in display(1) [CVE-2006-2440] stable/main/binary-hppa/perlmagick_6.0.6.2-2.7_hppa.deb stable/main/binary-hppa/libmagick6-dev_6.0.6.2-2.7_hppa.deb stable/main/binary-hppa/libmagick++6_6.0.6.2-2.7_hppa.deb stable/main/binary-hppa/imagemagick_6.0.6.2-2.7_hppa.deb stable/main/binary-hppa/libmagick++6-dev_6.0.6.2-2.7_hppa.deb stable/main/binary-hppa/libmagick6_6.0.6.2-2.7_hppa.deb imagemagick (6:6.0.6.2-2.7) stable-security; urgency=high * Non-maintainer upload by the Security Team * Fix buffer overflows in SUN bitmap decoder [CVE-2006-3744] * Fix buffer overflows in XCF decoder [CVE-2006-3743] * Fix buffer overflow in display(1) [CVE-2006-2440] stable/main/binary-arm/perlmagick_6.0.6.2-2.7_arm.deb stable/main/binary-arm/libmagick6-dev_6.0.6.2-2.7_arm.deb stable/main/binary-arm/libmagick++6_6.0.6.2-2.7_arm.deb stable/main/binary-arm/libmagick++6-dev_6.0.6.2-2.7_arm.deb stable/main/binary-arm/libmagick6_6.0.6.2-2.7_arm.deb stable/main/binary-arm/imagemagick_6.0.6.2-2.7_arm.deb imagemagick (6:6.0.6.2-2.7) stable-security; urgency=high * Non-maintainer upload by the Security Team * Fix buffer overflows in SUN bitmap decoder [CVE-2006-3744] * Fix buffer overflows in XCF decoder [CVE-2006-3743] * Fix buffer overflow in display(1) [CVE-2006-2440] stable/main/binary-alpha/libmagick++6-dev_6.0.6.2-2.7_alpha.deb stable/main/binary-alpha/imagemagick_6.0.6.2-2.7_alpha.deb stable/main/binary-alpha/libmagick6_6.0.6.2-2.7_alpha.deb stable/main/binary-alpha/libmagick6-dev_6.0.6.2-2.7_alpha.deb stable/main/binary-alpha/libmagick++6_6.0.6.2-2.7_alpha.deb stable/main/binary-alpha/perlmagick_6.0.6.2-2.7_alpha.deb imagemagick (6:6.0.6.2-2.7) stable-security; urgency=high * Non-maintainer upload by the Security Team * Fix buffer overflows in SUN bitmap decoder [CVE-2006-3744] * Fix buffer overflows in XCF decoder [CVE-2006-3743] * Fix buffer overflow in display(1) [CVE-2006-2440] stable/main/binary-i386/libmagick++6_6.0.6.2-2.7_i386.deb stable/main/binary-i386/libmagick6-dev_6.0.6.2-2.7_i386.deb stable/main/binary-i386/libmagick6_6.0.6.2-2.7_i386.deb stable/main/binary-i386/libmagick++6-dev_6.0.6.2-2.7_i386.deb stable/main/source/imagemagick_6.0.6.2-2.7.dsc stable/main/binary-i386/perlmagick_6.0.6.2-2.7_i386.deb stable/main/binary-i386/imagemagick_6.0.6.2-2.7_i386.deb stable/main/source/imagemagick_6.0.6.2-2.7.diff.gz imagemagick (6:6.0.6.2-2.7) stable-security; urgency=high * Non-maintainer upload by the Security Team * Fix buffer overflows in SUN bitmap decoder [CVE-2006-3744] * Fix buffer overflows in XCF decoder [CVE-2006-3743] * Fix buffer overflow in display(1) [CVE-2006-2440] stable/main/binary-sparc/gzip_1.3.5-10sarge2_sparc.deb gzip (1.3.5-10sarge2) stable-security; urgency=high * Non-maintainer upload by the Security Team: * Fix several security problems discovered by Tavis Ormandy of Google: - DoS through null pointer deference in the Huffman code (CVE-2006-4334) - Out-of-bands stack write in LZH decompression code (CVE-2006-4335) - Buffer overflow in pack code (CVE-2006-4336) - Buffer overflow in LZH code (CVE-2006-4337) - DoS through an infinite loop in LZH code (CVE-2006-4337) (Patch by Thomas Biege of SuSe) stable/main/binary-s390/gzip_1.3.5-10sarge2_s390.deb gzip (1.3.5-10sarge2) stable-security; urgency=high * Non-maintainer upload by the Security Team: * Fix several security problems discovered by Tavis Ormandy of Google: - DoS through null pointer deference in the Huffman code (CVE-2006-4334) - Out-of-bands stack write in LZH decompression code (CVE-2006-4335) - Buffer overflow in pack code (CVE-2006-4336) - Buffer overflow in LZH code (CVE-2006-4337) - DoS through an infinite loop in LZH code (CVE-2006-4337) (Patch by Thomas Biege of SuSe) stable/main/binary-powerpc/gzip_1.3.5-10sarge2_powerpc.deb gzip (1.3.5-10sarge2) stable-security; urgency=high * Non-maintainer upload by the Security Team: * Fix several security problems discovered by Tavis Ormandy of Google: - DoS through null pointer deference in the Huffman code (CVE-2006-4334) - Out-of-bands stack write in LZH decompression code (CVE-2006-4335) - Buffer overflow in pack code (CVE-2006-4336) - Buffer overflow in LZH code (CVE-2006-4337) - DoS through an infinite loop in LZH code (CVE-2006-4337) (Patch by Thomas Biege of SuSe) stable/main/binary-mipsel/gzip_1.3.5-10sarge2_mipsel.deb gzip (1.3.5-10sarge2) stable-security; urgency=high * Non-maintainer upload by the Security Team: * Fix several security problems discovered by Tavis Ormandy of Google: - DoS through null pointer deference in the Huffman code (CVE-2006-4334) - Out-of-bands stack write in LZH decompression code (CVE-2006-4335) - Buffer overflow in pack code (CVE-2006-4336) - Buffer overflow in LZH code (CVE-2006-4337) - DoS through an infinite loop in LZH code (CVE-2006-4337) (Patch by Thomas Biege of SuSe) stable/main/binary-mips/gzip_1.3.5-10sarge2_mips.deb gzip (1.3.5-10sarge2) stable-security; urgency=high * Non-maintainer upload by the Security Team: * Fix several security problems discovered by Tavis Ormandy of Google: - DoS through null pointer deference in the Huffman code (CVE-2006-4334) - Out-of-bands stack write in LZH decompression code (CVE-2006-4335) - Buffer overflow in pack code (CVE-2006-4336) - Buffer overflow in LZH code (CVE-2006-4337) - DoS through an infinite loop in LZH code (CVE-2006-4337) (Patch by Thomas Biege of SuSe) stable/main/binary-m68k/gzip_1.3.5-10sarge2_m68k.deb gzip (1.3.5-10sarge2) stable-security; urgency=high * Non-maintainer upload by the Security Team: * Fix several security problems discovered by Tavis Ormandy of Google: - DoS through null pointer deference in the Huffman code (CVE-2006-4334) - Out-of-bands stack write in LZH decompression code (CVE-2006-4335) - Buffer overflow in pack code (CVE-2006-4336) - Buffer overflow in LZH code (CVE-2006-4337) - DoS through an infinite loop in LZH code (CVE-2006-4337) (Patch by Thomas Biege of SuSe) stable/main/binary-ia64/gzip_1.3.5-10sarge2_ia64.deb gzip (1.3.5-10sarge2) stable-security; urgency=high * Non-maintainer upload by the Security Team: * Fix several security problems discovered by Tavis Ormandy of Google: - DoS through null pointer deference in the Huffman code (CVE-2006-4334) - Out-of-bands stack write in LZH decompression code (CVE-2006-4335) - Buffer overflow in pack code (CVE-2006-4336) - Buffer overflow in LZH code (CVE-2006-4337) - DoS through an infinite loop in LZH code (CVE-2006-4337) (Patch by Thomas Biege of SuSe) stable/main/binary-hppa/gzip_1.3.5-10sarge2_hppa.deb gzip (1.3.5-10sarge2) stable-security; urgency=high * Non-maintainer upload by the Security Team: * Fix several security problems discovered by Tavis Ormandy of Google: - DoS through null pointer deference in the Huffman code (CVE-2006-4334) - Out-of-bands stack write in LZH decompression code (CVE-2006-4335) - Buffer overflow in pack code (CVE-2006-4336) - Buffer overflow in LZH code (CVE-2006-4337) - DoS through an infinite loop in LZH code (CVE-2006-4337) (Patch by Thomas Biege of SuSe) stable/main/binary-arm/gzip_1.3.5-10sarge2_arm.deb gzip (1.3.5-10sarge2) stable-security; urgency=high * Non-maintainer upload by the Security Team: * Fix several security problems discovered by Tavis Ormandy of Google: - DoS through null pointer deference in the Huffman code (CVE-2006-4334) - Out-of-bands stack write in LZH decompression code (CVE-2006-4335) - Buffer overflow in pack code (CVE-2006-4336) - Buffer overflow in LZH code (CVE-2006-4337) - DoS through an infinite loop in LZH code (CVE-2006-4337) (Patch by Thomas Biege of SuSe) stable/main/binary-alpha/gzip_1.3.5-10sarge2_alpha.deb gzip (1.3.5-10sarge2) stable-security; urgency=high * Non-maintainer upload by the Security Team: * Fix several security problems discovered by Tavis Ormandy of Google: - DoS through null pointer deference in the Huffman code (CVE-2006-4334) - Out-of-bands stack write in LZH decompression code (CVE-2006-4335) - Buffer overflow in pack code (CVE-2006-4336) - Buffer overflow in LZH code (CVE-2006-4337) - DoS through an infinite loop in LZH code (CVE-2006-4337) (Patch by Thomas Biege of SuSe) stable/main/binary-i386/gzip_1.3.5-10sarge2_i386.deb stable/main/source/gzip_1.3.5-10sarge2.dsc stable/main/source/gzip_1.3.5-10sarge2.diff.gz gzip (1.3.5-10sarge2) stable-security; urgency=high * Non-maintainer upload by the Security Team: * Fix several security problems discovered by Tavis Ormandy of Google: - DoS through null pointer deference in the Huffman code (CVE-2006-4334) - Out-of-bands stack write in LZH decompression code (CVE-2006-4335) - Buffer overflow in pack code (CVE-2006-4336) - Buffer overflow in LZH code (CVE-2006-4337) - DoS through an infinite loop in LZH code (CVE-2006-4337) (Patch by Thomas Biege of SuSe) stable/main/binary-sparc/gtetrinet_0.7.8-1sarge2_sparc.deb gtetrinet (0.7.8-1sarge2) stable-security; urgency=high * Non-maintainer upload by the Security Team * Rebuild to bypass alpha buildd problems stable/main/binary-s390/gtetrinet_0.7.8-1sarge2_s390.deb gtetrinet (0.7.8-1sarge2) stable-security; urgency=high * Non-maintainer upload by the Security Team * Rebuild to bypass alpha buildd problems stable/main/binary-mipsel/gtetrinet_0.7.8-1sarge2_mipsel.deb gtetrinet (0.7.8-1sarge2) stable-security; urgency=high * Non-maintainer upload by the Security Team * Rebuild to bypass alpha buildd problems stable/main/binary-mips/gtetrinet_0.7.8-1sarge2_mips.deb gtetrinet (0.7.8-1sarge2) stable-security; urgency=high * Non-maintainer upload by the Security Team * Rebuild to bypass alpha buildd problems stable/main/binary-m68k/gtetrinet_0.7.8-1sarge2_m68k.deb gtetrinet (0.7.8-1sarge2) stable-security; urgency=high * Non-maintainer upload by the Security Team * Rebuild to bypass alpha buildd problems stable/main/binary-ia64/gtetrinet_0.7.8-1sarge2_ia64.deb gtetrinet (0.7.8-1sarge2) stable-security; urgency=high * Non-maintainer upload by the Security Team * Rebuild to bypass alpha buildd problems stable/main/binary-i386/gtetrinet_0.7.8-1sarge2_i386.deb gtetrinet (0.7.8-1sarge2) stable-security; urgency=high * Non-maintainer upload by the Security Team * Rebuild to bypass alpha buildd problems stable/main/binary-hppa/gtetrinet_0.7.8-1sarge2_hppa.deb gtetrinet (0.7.8-1sarge2) stable-security; urgency=high * Non-maintainer upload by the Security Team * Rebuild to bypass alpha buildd problems stable/main/binary-arm/gtetrinet_0.7.8-1sarge2_arm.deb gtetrinet (0.7.8-1sarge2) stable-security; urgency=high * Non-maintainer upload by the Security Team * Rebuild to bypass alpha buildd problems stable/main/binary-alpha/gtetrinet_0.7.8-1sarge2_alpha.deb gtetrinet (0.7.8-1sarge2) stable-security; urgency=high * Non-maintainer upload by the Security Team * Rebuild to bypass alpha buildd problems stable/main/source/gtetrinet_0.7.8-1sarge2.dsc stable/main/binary-powerpc/gtetrinet_0.7.8-1sarge2_powerpc.deb stable/main/source/gtetrinet_0.7.8-1sarge2.diff.gz gtetrinet (0.7.8-1sarge2) stable-security; urgency=high * Non-maintainer upload by the Security Team * Rebuild to bypass alpha buildd problems stable/main/binary-sparc/libgnutls11_1.0.16-13.2sarge2_sparc.deb stable/main/binary-sparc/libgnutls11-dbg_1.0.16-13.2sarge2_sparc.deb stable/main/binary-sparc/gnutls-bin_1.0.16-13.2sarge2_sparc.deb stable/main/binary-sparc/libgnutls11-dev_1.0.16-13.2sarge2_sparc.deb gnutls11 (1.0.16-13.2sarge2) stable-security; urgency=high * Pulled from upstream 1.4.2-->1.4.4: Fix PKCS#1 verification to avoid a variant of Bleichenbacher's Crypto 06 rump session attack. See <http://www.imc.org/ietf-openpgp/mail-archive/msg14307.html> (which is not exactly the same as the problem we fix here). Reported by Yutaka OIWA <y.oiwa@aist.go.jp>. See GNUTLS-SA-2006-4 on http://www.gnutls.org/security.html for more information. CVE-2006-4790 stable/main/binary-s390/libgnutls11_1.0.16-13.2sarge2_s390.deb stable/main/binary-s390/libgnutls11-dbg_1.0.16-13.2sarge2_s390.deb stable/main/binary-s390/gnutls-bin_1.0.16-13.2sarge2_s390.deb stable/main/binary-s390/libgnutls11-dev_1.0.16-13.2sarge2_s390.deb gnutls11 (1.0.16-13.2sarge2) stable-security; urgency=high * Pulled from upstream 1.4.2-->1.4.4: Fix PKCS#1 verification to avoid a variant of Bleichenbacher's Crypto 06 rump session attack. See <http://www.imc.org/ietf-openpgp/mail-archive/msg14307.html> (which is not exactly the same as the problem we fix here). Reported by Yutaka OIWA <y.oiwa@aist.go.jp>. See GNUTLS-SA-2006-4 on http://www.gnutls.org/security.html for more information. CVE-2006-4790 stable/main/binary-powerpc/gnutls-bin_1.0.16-13.2sarge2_powerpc.deb stable/main/binary-powerpc/libgnutls11-dev_1.0.16-13.2sarge2_powerpc.deb stable/main/binary-powerpc/libgnutls11_1.0.16-13.2sarge2_powerpc.deb stable/main/binary-powerpc/libgnutls11-dbg_1.0.16-13.2sarge2_powerpc.deb gnutls11 (1.0.16-13.2sarge2) stable-security; urgency=high * Pulled from upstream 1.4.2-->1.4.4: Fix PKCS#1 verification to avoid a variant of Bleichenbacher's Crypto 06 rump session attack. See <http://www.imc.org/ietf-openpgp/mail-archive/msg14307.html> (which is not exactly the same as the problem we fix here). Reported by Yutaka OIWA <y.oiwa@aist.go.jp>. See GNUTLS-SA-2006-4 on http://www.gnutls.org/security.html for more information. CVE-2006-4790 stable/main/binary-mipsel/libgnutls11_1.0.16-13.2sarge2_mipsel.deb stable/main/binary-mipsel/libgnutls11-dbg_1.0.16-13.2sarge2_mipsel.deb stable/main/binary-mipsel/gnutls-bin_1.0.16-13.2sarge2_mipsel.deb stable/main/binary-mipsel/libgnutls11-dev_1.0.16-13.2sarge2_mipsel.deb gnutls11 (1.0.16-13.2sarge2) stable-security; urgency=high * Pulled from upstream 1.4.2-->1.4.4: Fix PKCS#1 verification to avoid a variant of Bleichenbacher's Crypto 06 rump session attack. See <http://www.imc.org/ietf-openpgp/mail-archive/msg14307.html> (which is not exactly the same as the problem we fix here). Reported by Yutaka OIWA <y.oiwa@aist.go.jp>. See GNUTLS-SA-2006-4 on http://www.gnutls.org/security.html for more information. CVE-2006-4790 stable/main/binary-mips/libgnutls11_1.0.16-13.2sarge2_mips.deb stable/main/binary-mips/libgnutls11-dev_1.0.16-13.2sarge2_mips.deb stable/main/binary-mips/gnutls-bin_1.0.16-13.2sarge2_mips.deb stable/main/binary-mips/libgnutls11-dbg_1.0.16-13.2sarge2_mips.deb gnutls11 (1.0.16-13.2sarge2) stable-security; urgency=high * Pulled from upstream 1.4.2-->1.4.4: Fix PKCS#1 verification to avoid a variant of Bleichenbacher's Crypto 06 rump session attack. See <http://www.imc.org/ietf-openpgp/mail-archive/msg14307.html> (which is not exactly the same as the problem we fix here). Reported by Yutaka OIWA <y.oiwa@aist.go.jp>. See GNUTLS-SA-2006-4 on http://www.gnutls.org/security.html for more information. CVE-2006-4790 stable/main/binary-m68k/libgnutls11-dev_1.0.16-13.2sarge2_m68k.deb stable/main/binary-m68k/gnutls-bin_1.0.16-13.2sarge2_m68k.deb stable/main/binary-m68k/libgnutls11_1.0.16-13.2sarge2_m68k.deb stable/main/binary-m68k/libgnutls11-dbg_1.0.16-13.2sarge2_m68k.deb gnutls11 (1.0.16-13.2sarge2) stable-security; urgency=high * Pulled from upstream 1.4.2-->1.4.4: Fix PKCS#1 verification to avoid a variant of Bleichenbacher's Crypto 06 rump session attack. See <http://www.imc.org/ietf-openpgp/mail-archive/msg14307.html> (which is not exactly the same as the problem we fix here). Reported by Yutaka OIWA <y.oiwa@aist.go.jp>. See GNUTLS-SA-2006-4 on http://www.gnutls.org/security.html for more information. CVE-2006-4790 stable/main/binary-ia64/libgnutls11-dbg_1.0.16-13.2sarge2_ia64.deb stable/main/binary-ia64/libgnutls11_1.0.16-13.2sarge2_ia64.deb stable/main/binary-ia64/gnutls-bin_1.0.16-13.2sarge2_ia64.deb stable/main/binary-ia64/libgnutls11-dev_1.0.16-13.2sarge2_ia64.deb gnutls11 (1.0.16-13.2sarge2) stable-security; urgency=high * Pulled from upstream 1.4.2-->1.4.4: Fix PKCS#1 verification to avoid a variant of Bleichenbacher's Crypto 06 rump session attack. See <http://www.imc.org/ietf-openpgp/mail-archive/msg14307.html> (which is not exactly the same as the problem we fix here). Reported by Yutaka OIWA <y.oiwa@aist.go.jp>. See GNUTLS-SA-2006-4 on http://www.gnutls.org/security.html for more information. CVE-2006-4790 stable/main/binary-hppa/libgnutls11_1.0.16-13.2sarge2_hppa.deb stable/main/binary-hppa/libgnutls11-dbg_1.0.16-13.2sarge2_hppa.deb stable/main/binary-hppa/gnutls-bin_1.0.16-13.2sarge2_hppa.deb stable/main/binary-hppa/libgnutls11-dev_1.0.16-13.2sarge2_hppa.deb gnutls11 (1.0.16-13.2sarge2) stable-security; urgency=high * Pulled from upstream 1.4.2-->1.4.4: Fix PKCS#1 verification to avoid a variant of Bleichenbacher's Crypto 06 rump session attack. See <http://www.imc.org/ietf-openpgp/mail-archive/msg14307.html> (which is not exactly the same as the problem we fix here). Reported by Yutaka OIWA <y.oiwa@aist.go.jp>. See GNUTLS-SA-2006-4 on http://www.gnutls.org/security.html for more information. CVE-2006-4790 stable/main/binary-arm/libgnutls11-dbg_1.0.16-13.2sarge2_arm.deb stable/main/binary-arm/libgnutls11_1.0.16-13.2sarge2_arm.deb stable/main/binary-arm/libgnutls11-dev_1.0.16-13.2sarge2_arm.deb stable/main/binary-arm/gnutls-bin_1.0.16-13.2sarge2_arm.deb gnutls11 (1.0.16-13.2sarge2) stable-security; urgency=high * Pulled from upstream 1.4.2-->1.4.4: Fix PKCS#1 verification to avoid a variant of Bleichenbacher's Crypto 06 rump session attack. See <http://www.imc.org/ietf-openpgp/mail-archive/msg14307.html> (which is not exactly the same as the problem we fix here). Reported by Yutaka OIWA <y.oiwa@aist.go.jp>. See GNUTLS-SA-2006-4 on http://www.gnutls.org/security.html for more information. CVE-2006-4790 stable/main/binary-alpha/libgnutls11-dbg_1.0.16-13.2sarge2_alpha.deb stable/main/binary-alpha/libgnutls11_1.0.16-13.2sarge2_alpha.deb stable/main/binary-alpha/libgnutls11-dev_1.0.16-13.2sarge2_alpha.deb stable/main/binary-alpha/gnutls-bin_1.0.16-13.2sarge2_alpha.deb gnutls11 (1.0.16-13.2sarge2) stable-security; urgency=high * Pulled from upstream 1.4.2-->1.4.4: Fix PKCS#1 verification to avoid a variant of Bleichenbacher's Crypto 06 rump session attack. See <http://www.imc.org/ietf-openpgp/mail-archive/msg14307.html> (which is not exactly the same as the problem we fix here). Reported by Yutaka OIWA <y.oiwa@aist.go.jp>. See GNUTLS-SA-2006-4 on http://www.gnutls.org/security.html for more information. CVE-2006-4790 stable/main/binary-i386/libgnutls11-dbg_1.0.16-13.2sarge2_i386.deb stable/main/binary-i386/gnutls-bin_1.0.16-13.2sarge2_i386.deb stable/main/binary-i386/libgnutls11_1.0.16-13.2sarge2_i386.deb stable/main/source/gnutls11_1.0.16-13.2sarge2.diff.gz stable/main/binary-i386/libgnutls11-dev_1.0.16-13.2sarge2_i386.deb stable/main/source/gnutls11_1.0.16-13.2sarge2.dsc gnutls11 (1.0.16-13.2sarge2) stable-security; urgency=high * Pulled from upstream 1.4.2-->1.4.4: Fix PKCS#1 verification to avoid a variant of Bleichenbacher's Crypto 06 rump session attack. See <http://www.imc.org/ietf-openpgp/mail-archive/msg14307.html> (which is not exactly the same as the problem we fix here). Reported by Yutaka OIWA <y.oiwa@aist.go.jp>. See GNUTLS-SA-2006-4 on http://www.gnutls.org/security.html for more information. CVE-2006-4790 stable/main/binary-sparc/gij-3.4_3.4.3-13sarge1_sparc.deb stable/main/binary-sparc/gcc-3.4_3.4.3-13sarge1_sparc.deb stable/main/binary-sparc/gnat-3.4_3.4.3-13sarge1_sparc.deb stable/main/binary-sparc/libstdc++6_3.4.3-13sarge1_sparc.deb stable/main/binary-sparc/libstdc++6-dev_3.4.3-13sarge1_sparc.deb stable/main/binary-sparc/libffi3-dev_3.4.3-13sarge1_sparc.deb stable/main/binary-sparc/libstdc++6-dbg_3.4.3-13sarge1_sparc.deb stable/main/binary-sparc/g77-3.4_3.4.3-13sarge1_sparc.deb stable/main/binary-sparc/cpp-3.4_3.4.3-13sarge1_sparc.deb stable/main/binary-sparc/gcc-3.4-base_3.4.3-13sarge1_sparc.deb stable/main/binary-sparc/libffi3_3.4.3-13sarge1_sparc.deb stable/main/binary-sparc/gobjc-3.4_3.4.3-13sarge1_sparc.deb stable/main/binary-sparc/fastjar_3.4.3-13sarge1_sparc.deb stable/main/binary-sparc/libstdc++6-pic_3.4.3-13sarge1_sparc.deb stable/main/binary-sparc/g++-3.4_3.4.3-13sarge1_sparc.deb stable/main/binary-sparc/lib64gcc1_3.4.3-13sarge1_sparc.deb stable/main/binary-sparc/libgcc1_3.4.3-13sarge1_sparc.deb stable/main/binary-sparc/gcj-3.4_3.4.3-13sarge1_sparc.deb stable/main/binary-sparc/gpc-2.1-3.4_3.4.3-13sarge1_sparc.deb stable/main/binary-sparc/libgcj5-awt_3.4.3-13sarge1_sparc.deb stable/main/binary-sparc/lib64stdc++6_3.4.3-13sarge1_sparc.deb stable/main/binary-sparc/libgcj5_3.4.3-13sarge1_sparc.deb stable/main/binary-sparc/treelang-3.4_3.4.3-13sarge1_sparc.deb stable/main/binary-sparc/libgcj5-dev_3.4.3-13sarge1_sparc.deb gcc-3.4 (3.4.3-13sarge1) stable-security; urgency=high * Non-maintainer upload by the Security Team * Applied patch by Richard Guenther to prevent directory traversal [fastjar/jartool.c, debian/patches/CVE-2006-3619.dpatch, http://gcc.gnu.org/bugzilla/show_bug.cgi?id=28359] stable/main/binary-s390/gij-3.4_3.4.3-13sarge1_s390.deb stable/main/binary-s390/libstdc++6-dev_3.4.3-13sarge1_s390.deb stable/main/binary-s390/gcc-3.4-base_3.4.3-13sarge1_s390.deb stable/main/binary-s390/gcc-3.4_3.4.3-13sarge1_s390.deb stable/main/binary-s390/lib64gcc1_3.4.3-13sarge1_s390.deb stable/main/binary-s390/fastjar_3.4.3-13sarge1_s390.deb stable/main/binary-s390/libffi3_3.4.3-13sarge1_s390.deb stable/main/binary-s390/libgcc1_3.4.3-13sarge1_s390.deb stable/main/binary-s390/libffi3-dev_3.4.3-13sarge1_s390.deb stable/main/binary-s390/libstdc++6-dbg_3.4.3-13sarge1_s390.deb stable/main/binary-s390/treelang-3.4_3.4.3-13sarge1_s390.deb stable/main/binary-s390/libgcj5-awt_3.4.3-13sarge1_s390.deb stable/main/binary-s390/libstdc++6_3.4.3-13sarge1_s390.deb stable/main/binary-s390/gobjc-3.4_3.4.3-13sarge1_s390.deb stable/main/binary-s390/gnat-3.4_3.4.3-13sarge1_s390.deb stable/main/binary-s390/gpc-2.1-3.4_3.4.3-13sarge1_s390.deb stable/main/binary-s390/lib64stdc++6_3.4.3-13sarge1_s390.deb stable/main/binary-s390/libgcj5_3.4.3-13sarge1_s390.deb stable/main/binary-s390/libstdc++6-pic_3.4.3-13sarge1_s390.deb stable/main/binary-s390/libgcj5-dev_3.4.3-13sarge1_s390.deb stable/main/binary-s390/cpp-3.4_3.4.3-13sarge1_s390.deb stable/main/binary-s390/g++-3.4_3.4.3-13sarge1_s390.deb stable/main/binary-s390/g77-3.4_3.4.3-13sarge1_s390.deb stable/main/binary-s390/gcj-3.4_3.4.3-13sarge1_s390.deb gcc-3.4 (3.4.3-13sarge1) stable-security; urgency=high * Non-maintainer upload by the Security Team * Applied patch by Richard Guenther to prevent directory traversal [fastjar/jartool.c, debian/patches/CVE-2006-3619.dpatch, http://gcc.gnu.org/bugzilla/show_bug.cgi?id=28359] stable/main/binary-powerpc/g++-3.4_3.4.3-13sarge1_powerpc.deb stable/main/binary-powerpc/gcj-3.4_3.4.3-13sarge1_powerpc.deb stable/main/binary-powerpc/gpc-2.1-3.4_3.4.3-13sarge1_powerpc.deb stable/main/binary-powerpc/cpp-3.4_3.4.3-13sarge1_powerpc.deb stable/main/binary-powerpc/libffi3_3.4.3-13sarge1_powerpc.deb stable/main/binary-powerpc/libstdc++6-pic_3.4.3-13sarge1_powerpc.deb stable/main/binary-powerpc/gobjc-3.4_3.4.3-13sarge1_powerpc.deb stable/main/binary-powerpc/libstdc++6-dev_3.4.3-13sarge1_powerpc.deb stable/main/binary-powerpc/g77-3.4_3.4.3-13sarge1_powerpc.deb stable/main/binary-powerpc/gcc-3.4_3.4.3-13sarge1_powerpc.deb stable/main/binary-powerpc/fastjar_3.4.3-13sarge1_powerpc.deb stable/main/binary-powerpc/libstdc++6-dbg_3.4.3-13sarge1_powerpc.deb stable/main/binary-powerpc/gcc-3.4-base_3.4.3-13sarge1_powerpc.deb stable/main/binary-powerpc/libffi3-dev_3.4.3-13sarge1_powerpc.deb stable/main/binary-powerpc/libgcj5_3.4.3-13sarge1_powerpc.deb stable/main/binary-powerpc/libgcj5-awt_3.4.3-13sarge1_powerpc.deb stable/main/binary-powerpc/gij-3.4_3.4.3-13sarge1_powerpc.deb stable/main/binary-powerpc/libgcj5-dev_3.4.3-13sarge1_powerpc.deb stable/main/binary-powerpc/libgcc1_3.4.3-13sarge1_powerpc.deb stable/main/binary-powerpc/libstdc++6_3.4.3-13sarge1_powerpc.deb stable/main/binary-powerpc/gnat-3.4_3.4.3-13sarge1_powerpc.deb gcc-3.4 (3.4.3-13sarge1) stable-security; urgency=high * Non-maintainer upload by the Security Team * Applied patch by Richard Guenther to prevent directory traversal [fastjar/jartool.c, debian/patches/CVE-2006-3619.dpatch, http://gcc.gnu.org/bugzilla/show_bug.cgi?id=28359] stable/main/binary-mipsel/treelang-3.4_3.4.3-13sarge1_mipsel.deb stable/main/binary-mipsel/gcc-3.4-base_3.4.3-13sarge1_mipsel.deb stable/main/binary-mipsel/cpp-3.4_3.4.3-13sarge1_mipsel.deb stable/main/binary-mipsel/g++-3.4_3.4.3-13sarge1_mipsel.deb stable/main/binary-mipsel/libstdc++6_3.4.3-13sarge1_mipsel.deb stable/main/binary-mipsel/libffi3_3.4.3-13sarge1_mipsel.deb stable/main/binary-mipsel/libstdc++6-dev_3.4.3-13sarge1_mipsel.deb stable/main/binary-mipsel/g77-3.4_3.4.3-13sarge1_mipsel.deb stable/main/binary-mipsel/libffi3-dev_3.4.3-13sarge1_mipsel.deb stable/main/binary-mipsel/gpc-2.1-3.4_3.4.3-13sarge1_mipsel.deb stable/main/binary-mipsel/gnat-3.4_3.4.3-13sarge1_mipsel.deb stable/main/binary-mipsel/libstdc++6-dbg_3.4.3-13sarge1_mipsel.deb stable/main/binary-mipsel/libstdc++6-pic_3.4.3-13sarge1_mipsel.deb stable/main/binary-mipsel/gobjc-3.4_3.4.3-13sarge1_mipsel.deb stable/main/binary-mipsel/fastjar_3.4.3-13sarge1_mipsel.deb stable/main/binary-mipsel/libgcc1_3.4.3-13sarge1_mipsel.deb stable/main/binary-mipsel/gcc-3.4_3.4.3-13sarge1_mipsel.deb gcc-3.4 (3.4.3-13sarge1) stable-security; urgency=high * Non-maintainer upload by the Security Team * Applied patch by Richard Guenther to prevent directory traversal [fastjar/jartool.c, debian/patches/CVE-2006-3619.dpatch, http://gcc.gnu.org/bugzilla/show_bug.cgi?id=28359] stable/main/binary-mips/libstdc++6-pic_3.4.3-13sarge1_mips.deb stable/main/binary-mips/treelang-3.4_3.4.3-13sarge1_mips.deb stable/main/binary-mips/gcc-3.4-base_3.4.3-13sarge1_mips.deb stable/main/binary-mips/gcc-3.4_3.4.3-13sarge1_mips.deb stable/main/binary-mips/libstdc++6-dbg_3.4.3-13sarge1_mips.deb stable/main/binary-mips/libffi3-dev_3.4.3-13sarge1_mips.deb stable/main/binary-mips/gobjc-3.4_3.4.3-13sarge1_mips.deb stable/main/binary-mips/gpc-2.1-3.4_3.4.3-13sarge1_mips.deb stable/main/binary-mips/libffi3_3.4.3-13sarge1_mips.deb stable/main/binary-mips/fastjar_3.4.3-13sarge1_mips.deb stable/main/binary-mips/g++-3.4_3.4.3-13sarge1_mips.deb stable/main/binary-mips/libstdc++6-dev_3.4.3-13sarge1_mips.deb stable/main/binary-mips/libstdc++6_3.4.3-13sarge1_mips.deb stable/main/binary-mips/g77-3.4_3.4.3-13sarge1_mips.deb stable/main/binary-mips/libgcc1_3.4.3-13sarge1_mips.deb stable/main/binary-mips/gnat-3.4_3.4.3-13sarge1_mips.deb stable/main/binary-mips/cpp-3.4_3.4.3-13sarge1_mips.deb gcc-3.4 (3.4.3-13sarge1) stable-security; urgency=high * Non-maintainer upload by the Security Team * Applied patch by Richard Guenther to prevent directory traversal [fastjar/jartool.c, debian/patches/CVE-2006-3619.dpatch, http://gcc.gnu.org/bugzilla/show_bug.cgi?id=28359] stable/main/binary-m68k/gcc-3.4-base_3.4.3-13sarge1_m68k.deb stable/main/binary-m68k/libffi3_3.4.3-13sarge1_m68k.deb stable/main/binary-m68k/gcj-3.4_3.4.3-13sarge1_m68k.deb stable/main/binary-m68k/libgcj5-awt_3.4.3-13sarge1_m68k.deb stable/main/binary-m68k/gobjc-3.4_3.4.3-13sarge1_m68k.deb stable/main/binary-m68k/g77-3.4_3.4.3-13sarge1_m68k.deb stable/main/binary-m68k/libgcj5-dev_3.4.3-13sarge1_m68k.deb stable/main/binary-m68k/treelang-3.4_3.4.3-13sarge1_m68k.deb stable/main/binary-m68k/libgcc2_3.4.3-13sarge1_m68k.deb stable/main/binary-m68k/libstdc++6-pic_3.4.3-13sarge1_m68k.deb stable/main/binary-m68k/libstdc++6_3.4.3-13sarge1_m68k.deb stable/main/binary-m68k/libstdc++6-dev_3.4.3-13sarge1_m68k.deb stable/main/binary-m68k/gpc-2.1-3.4_3.4.3-13sarge1_m68k.deb stable/main/binary-m68k/gcc-3.4_3.4.3-13sarge1_m68k.deb stable/main/binary-m68k/libstdc++6-dbg_3.4.3-13sarge1_m68k.deb stable/main/binary-m68k/g++-3.4_3.4.3-13sarge1_m68k.deb stable/main/binary-m68k/gij-3.4_3.4.3-13sarge1_m68k.deb stable/main/binary-m68k/fastjar_3.4.3-13sarge1_m68k.deb stable/main/binary-m68k/libffi3-dev_3.4.3-13sarge1_m68k.deb stable/main/binary-m68k/libgcj5_3.4.3-13sarge1_m68k.deb stable/main/binary-m68k/cpp-3.4_3.4.3-13sarge1_m68k.deb gcc-3.4 (3.4.3-13sarge1) stable-security; urgency=high * Non-maintainer upload by the Security Team * Applied patch by Richard Guenther to prevent directory traversal [fastjar/jartool.c, debian/patches/CVE-2006-3619.dpatch, http://gcc.gnu.org/bugzilla/show_bug.cgi?id=28359] stable/main/binary-ia64/g++-3.4_3.4.3-13sarge1_ia64.deb stable/main/binary-ia64/gcc-3.4-base_3.4.3-13sarge1_ia64.deb stable/main/binary-ia64/libgcj5-awt_3.4.3-13sarge1_ia64.deb stable/main/binary-ia64/gcc-3.4_3.4.3-13sarge1_ia64.deb stable/main/binary-ia64/gij-3.4_3.4.3-13sarge1_ia64.deb stable/main/binary-ia64/gnat-3.4_3.4.3-13sarge1_ia64.deb stable/main/binary-ia64/libstdc++6-pic_3.4.3-13sarge1_ia64.deb stable/main/binary-ia64/gcj-3.4_3.4.3-13sarge1_ia64.deb stable/main/binary-ia64/libffi3-dev_3.4.3-13sarge1_ia64.deb stable/main/binary-ia64/gpc-2.1-3.4_3.4.3-13sarge1_ia64.deb stable/main/binary-ia64/libstdc++6-dbg_3.4.3-13sarge1_ia64.deb stable/main/binary-ia64/fastjar_3.4.3-13sarge1_ia64.deb stable/main/binary-ia64/libstdc++6-dev_3.4.3-13sarge1_ia64.deb stable/main/binary-ia64/libstdc++6_3.4.3-13sarge1_ia64.deb stable/main/binary-ia64/libffi3_3.4.3-13sarge1_ia64.deb stable/main/binary-ia64/cpp-3.4_3.4.3-13sarge1_ia64.deb stable/main/binary-ia64/gobjc-3.4_3.4.3-13sarge1_ia64.deb stable/main/binary-ia64/treelang-3.4_3.4.3-13sarge1_ia64.deb stable/main/binary-ia64/libgnat-3.4_3.4.3-13sarge1_ia64.deb stable/main/binary-ia64/libgcj5_3.4.3-13sarge1_ia64.deb stable/main/binary-ia64/libgcj5-dev_3.4.3-13sarge1_ia64.deb stable/main/binary-ia64/libgcc1_3.4.3-13sarge1_ia64.deb stable/main/binary-ia64/g77-3.4_3.4.3-13sarge1_ia64.deb gcc-3.4 (3.4.3-13sarge1) stable-security; urgency=high * Non-maintainer upload by the Security Team * Applied patch by Richard Guenther to prevent directory traversal [fastjar/jartool.c, debian/patches/CVE-2006-3619.dpatch, http://gcc.gnu.org/bugzilla/show_bug.cgi?id=28359] stable/main/binary-hppa/gnat-3.4_3.4.3-13sarge1_hppa.deb stable/main/binary-hppa/libstdc++6_3.4.3-13sarge1_hppa.deb stable/main/binary-hppa/libstdc++6-pic_3.4.3-13sarge1_hppa.deb stable/main/binary-hppa/gcc-3.4-hppa64_3.4.3-13sarge1_hppa.deb stable/main/binary-hppa/libgcj5-dev_3.4.3-13sarge1_hppa.deb stable/main/binary-hppa/libgcj5-awt_3.4.3-13sarge1_hppa.deb stable/main/binary-hppa/gpc-2.1-3.4_3.4.3-13sarge1_hppa.deb stable/main/binary-hppa/libgcc2_3.4.3-13sarge1_hppa.deb stable/main/binary-hppa/libffi3-dev_3.4.3-13sarge1_hppa.deb stable/main/binary-hppa/g77-3.4_3.4.3-13sarge1_hppa.deb stable/main/binary-hppa/libstdc++6-dbg_3.4.3-13sarge1_hppa.deb stable/main/binary-hppa/libffi3_3.4.3-13sarge1_hppa.deb stable/main/binary-hppa/gcj-3.4_3.4.3-13sarge1_hppa.deb stable/main/binary-hppa/treelang-3.4_3.4.3-13sarge1_hppa.deb stable/main/binary-hppa/gcc-3.4-base_3.4.3-13sarge1_hppa.deb stable/main/binary-hppa/gobjc-3.4_3.4.3-13sarge1_hppa.deb stable/main/binary-hppa/fastjar_3.4.3-13sarge1_hppa.deb stable/main/binary-hppa/gcc-3.4_3.4.3-13sarge1_hppa.deb stable/main/binary-hppa/libstdc++6-dev_3.4.3-13sarge1_hppa.deb stable/main/binary-hppa/g++-3.4_3.4.3-13sarge1_hppa.deb stable/main/binary-hppa/libgcj5_3.4.3-13sarge1_hppa.deb stable/main/binary-hppa/cpp-3.4_3.4.3-13sarge1_hppa.deb stable/main/binary-hppa/libgnat-3.4_3.4.3-13sarge1_hppa.deb stable/main/binary-hppa/gij-3.4_3.4.3-13sarge1_hppa.deb gcc-3.4 (3.4.3-13sarge1) stable-security; urgency=high * Non-maintainer upload by the Security Team * Applied patch by Richard Guenther to prevent directory traversal [fastjar/jartool.c, debian/patches/CVE-2006-3619.dpatch, http://gcc.gnu.org/bugzilla/show_bug.cgi?id=28359] stable/main/binary-arm/gobjc-3.4_3.4.3-13sarge1_arm.deb stable/main/binary-arm/libffi3_3.4.3-13sarge1_arm.deb stable/main/binary-arm/gcj-3.4_3.4.3-13sarge1_arm.deb stable/main/binary-arm/gcc-3.4_3.4.3-13sarge1_arm.deb stable/main/binary-arm/gcc-3.4-base_3.4.3-13sarge1_arm.deb stable/main/binary-arm/libgcj5-dev_3.4.3-13sarge1_arm.deb stable/main/binary-arm/libstdc++6-0-pic_3.4.3-13sarge1_arm.deb stable/main/binary-arm/libgcc1_3.4.3-13sarge1_arm.deb stable/main/binary-arm/libgcj5_3.4.3-13sarge1_arm.deb stable/main/binary-arm/g77-3.4_3.4.3-13sarge1_arm.deb stable/main/binary-arm/fastjar_3.4.3-13sarge1_arm.deb stable/main/binary-arm/libstdc++6-0_3.4.3-13sarge1_arm.deb stable/main/binary-arm/cpp-3.4_3.4.3-13sarge1_arm.deb stable/main/binary-arm/libstdc++6-0-dev_3.4.3-13sarge1_arm.deb stable/main/binary-arm/libgcj5-awt_3.4.3-13sarge1_arm.deb stable/main/binary-arm/libffi3-dev_3.4.3-13sarge1_arm.deb stable/main/binary-arm/gpc-2.1-3.4_3.4.3-13sarge1_arm.deb stable/main/binary-arm/g++-3.4_3.4.3-13sarge1_arm.deb stable/main/binary-arm/treelang-3.4_3.4.3-13sarge1_arm.deb stable/main/binary-arm/libstdc++6-0-dbg_3.4.3-13sarge1_arm.deb stable/main/binary-arm/gij-3.4_3.4.3-13sarge1_arm.deb gcc-3.4 (3.4.3-13sarge1) stable-security; urgency=high * Non-maintainer upload by the Security Team * Applied patch by Richard Guenther to prevent directory traversal [fastjar/jartool.c, debian/patches/CVE-2006-3619.dpatch, http://gcc.gnu.org/bugzilla/show_bug.cgi?id=28359] stable/main/binary-alpha/treelang-3.4_3.4.3-13sarge1_alpha.deb stable/main/binary-alpha/libstdc++6-dev_3.4.3-13sarge1_alpha.deb stable/main/binary-alpha/libstdc++6-pic_3.4.3-13sarge1_alpha.deb stable/main/binary-alpha/gpc-2.1-3.4_3.4.3-13sarge1_alpha.deb stable/main/binary-alpha/libstdc++6_3.4.3-13sarge1_alpha.deb stable/main/binary-alpha/libstdc++6-dbg_3.4.3-13sarge1_alpha.deb stable/main/binary-alpha/libffi3-dev_3.4.3-13sarge1_alpha.deb stable/main/binary-alpha/g++-3.4_3.4.3-13sarge1_alpha.deb stable/main/binary-alpha/g77-3.4_3.4.3-13sarge1_alpha.deb stable/main/binary-alpha/gij-3.4_3.4.3-13sarge1_alpha.deb stable/main/binary-alpha/gobjc-3.4_3.4.3-13sarge1_alpha.deb stable/main/binary-alpha/gnat-3.4_3.4.3-13sarge1_alpha.deb stable/main/binary-alpha/libffi3_3.4.3-13sarge1_alpha.deb stable/main/binary-alpha/cpp-3.4_3.4.3-13sarge1_alpha.deb stable/main/binary-alpha/libgcj5-awt_3.4.3-13sarge1_alpha.deb stable/main/binary-alpha/libgcj5_3.4.3-13sarge1_alpha.deb stable/main/binary-alpha/libgcc1_3.4.3-13sarge1_alpha.deb stable/main/binary-alpha/gcj-3.4_3.4.3-13sarge1_alpha.deb stable/main/binary-alpha/fastjar_3.4.3-13sarge1_alpha.deb stable/main/binary-alpha/gcc-3.4-base_3.4.3-13sarge1_alpha.deb stable/main/binary-alpha/gcc-3.4_3.4.3-13sarge1_alpha.deb stable/main/binary-alpha/libgcj5-dev_3.4.3-13sarge1_alpha.deb gcc-3.4 (3.4.3-13sarge1) stable-security; urgency=high * Non-maintainer upload by the Security Team * Applied patch by Richard Guenther to prevent directory traversal [fastjar/jartool.c, debian/patches/CVE-2006-3619.dpatch, http://gcc.gnu.org/bugzilla/show_bug.cgi?id=28359] stable/main/binary-all/cpp-3.4-doc_3.4.3-13sarge1_all.deb stable/main/binary-i386/fastjar_3.4.3-13sarge1_i386.deb stable/main/binary-i386/g++-3.4_3.4.3-13sarge1_i386.deb stable/main/binary-i386/libgcj5_3.4.3-13sarge1_i386.deb stable/main/binary-i386/gpc-2.1-3.4_3.4.3-13sarge1_i386.deb stable/main/binary-i386/treelang-3.4_3.4.3-13sarge1_i386.deb stable/main/binary-i386/lib64gcc1_3.4.3-13sarge1_i386.deb stable/main/binary-i386/libffi3_3.4.3-13sarge1_i386.deb stable/main/binary-i386/gcj-3.4_3.4.3-13sarge1_i386.deb stable/main/binary-i386/libgcc1_3.4.3-13sarge1_i386.deb stable/main/binary-i386/libgnat-3.4_3.4.3-13sarge1_i386.deb stable/main/binary-i386/gcc-3.4_3.4.3-13sarge1_i386.deb stable/main/binary-i386/libstdc++6_3.4.3-13sarge1_i386.deb stable/main/binary-all/gpc-2.1-3.4-doc_3.4.3-13sarge1_all.deb stable/main/binary-i386/libgcj5-dev_3.4.3-13sarge1_i386.deb stable/main/binary-all/gnat-3.4-doc_3.4.3-13sarge1_all.deb stable/main/binary-i386/libffi3-dev_3.4.3-13sarge1_i386.deb stable/main/binary-i386/lib64stdc++6_3.4.3-13sarge1_i386.deb stable/main/binary-i386/cpp-3.4_3.4.3-13sarge1_i386.deb stable/main/binary-i386/libstdc++6-dbg_3.4.3-13sarge1_i386.deb stable/main/binary-i386/g77-3.4_3.4.3-13sarge1_i386.deb stable/main/binary-all/g77-3.4-doc_3.4.3-13sarge1_all.deb stable/main/source/gcc-3.4_3.4.3-13sarge1.dsc stable/main/binary-all/gcc-3.4-doc_3.4.3-13sarge1_all.deb stable/main/binary-i386/gnat-3.4_3.4.3-13sarge1_i386.deb stable/main/binary-all/libgcj5-common_3.4.3-13sarge1_all.deb stable/main/binary-i386/libstdc++6-pic_3.4.3-13sarge1_i386.deb stable/main/binary-all/libstdc++6-doc_3.4.3-13sarge1_all.deb stable/main/binary-i386/libstdc++6-dev_3.4.3-13sarge1_i386.deb stable/main/binary-i386/gobjc-3.4_3.4.3-13sarge1_i386.deb stable/main/source/gcc-3.4_3.4.3-13sarge1.diff.gz stable/main/binary-i386/gcc-3.4-base_3.4.3-13sarge1_i386.deb stable/main/binary-i386/gij-3.4_3.4.3-13sarge1_i386.deb stable/main/binary-i386/libgcj5-awt_3.4.3-13sarge1_i386.deb gcc-3.4 (3.4.3-13sarge1) stable-security; urgency=high * Non-maintainer upload by the Security Team * Applied patch by Richard Guenther to prevent directory traversal [fastjar/jartool.c, debian/patches/CVE-2006-3619.dpatch, http://gcc.gnu.org/bugzilla/show_bug.cgi?id=28359] stable/main/binary-sparc/libfreetype6_2.1.7-6_sparc.deb stable/main/binary-sparc/libfreetype6-udeb_2.1.7-6_sparc.udeb stable/main/binary-sparc/libfreetype6-dev_2.1.7-6_sparc.deb stable/main/binary-sparc/freetype2-demos_2.1.7-6_sparc.deb freetype (2.1.7-6) stable-security; urgency=high * Add debian/patches-freetype/CVE-2006-3467_pcf-strlen.patch for CVE-2006-3467, a missing string length check in PCF files that leads to a possibly exploitable integer overflow. Thanks to Martin Pitt for the patch. Closes: #379920. stable/main/binary-s390/libfreetype6-udeb_2.1.7-6_s390.udeb stable/main/binary-s390/libfreetype6_2.1.7-6_s390.deb stable/main/binary-s390/libfreetype6-dev_2.1.7-6_s390.deb stable/main/binary-s390/freetype2-demos_2.1.7-6_s390.deb freetype (2.1.7-6) stable-security; urgency=high * Add debian/patches-freetype/CVE-2006-3467_pcf-strlen.patch for CVE-2006-3467, a missing string length check in PCF files that leads to a possibly exploitable integer overflow. Thanks to Martin Pitt for the patch. Closes: #379920. stable/main/binary-powerpc/libfreetype6-dev_2.1.7-6_powerpc.deb stable/main/binary-powerpc/libfreetype6-udeb_2.1.7-6_powerpc.udeb stable/main/binary-powerpc/libfreetype6_2.1.7-6_powerpc.deb stable/main/binary-powerpc/freetype2-demos_2.1.7-6_powerpc.deb freetype (2.1.7-6) stable-security; urgency=high * Add debian/patches-freetype/CVE-2006-3467_pcf-strlen.patch for CVE-2006-3467, a missing string length check in PCF files that leads to a possibly exploitable integer overflow. Thanks to Martin Pitt for the patch. Closes: #379920. stable/main/binary-mipsel/libfreetype6_2.1.7-6_mipsel.deb stable/main/binary-mipsel/libfreetype6-dev_2.1.7-6_mipsel.deb stable/main/binary-mipsel/libfreetype6-udeb_2.1.7-6_mipsel.udeb stable/main/binary-mipsel/freetype2-demos_2.1.7-6_mipsel.deb freetype (2.1.7-6) stable-security; urgency=high * Add debian/patches-freetype/CVE-2006-3467_pcf-strlen.patch for CVE-2006-3467, a missing string length check in PCF files that leads to a possibly exploitable integer overflow. Thanks to Martin Pitt for the patch. Closes: #379920. stable/main/binary-mips/freetype2-demos_2.1.7-6_mips.deb stable/main/binary-mips/libfreetype6-dev_2.1.7-6_mips.deb stable/main/binary-mips/libfreetype6-udeb_2.1.7-6_mips.udeb stable/main/binary-mips/libfreetype6_2.1.7-6_mips.deb freetype (2.1.7-6) stable-security; urgency=high * Add debian/patches-freetype/CVE-2006-3467_pcf-strlen.patch for CVE-2006-3467, a missing string length check in PCF files that leads to a possibly exploitable integer overflow. Thanks to Martin Pitt for the patch. Closes: #379920. stable/main/binary-m68k/libfreetype6-dev_2.1.7-6_m68k.deb stable/main/binary-m68k/freetype2-demos_2.1.7-6_m68k.deb stable/main/binary-m68k/libfreetype6-udeb_2.1.7-6_m68k.udeb stable/main/binary-m68k/libfreetype6_2.1.7-6_m68k.deb freetype (2.1.7-6) stable-security; urgency=high * Add debian/patches-freetype/CVE-2006-3467_pcf-strlen.patch for CVE-2006-3467, a missing string length check in PCF files that leads to a possibly exploitable integer overflow. Thanks to Martin Pitt for the patch. Closes: #379920. stable/main/binary-ia64/freetype2-demos_2.1.7-6_ia64.deb stable/main/binary-ia64/libfreetype6-dev_2.1.7-6_ia64.deb stable/main/binary-ia64/libfreetype6-udeb_2.1.7-6_ia64.udeb stable/main/binary-ia64/libfreetype6_2.1.7-6_ia64.deb freetype (2.1.7-6) stable-security; urgency=high * Add debian/patches-freetype/CVE-2006-3467_pcf-strlen.patch for CVE-2006-3467, a missing string length check in PCF files that leads to a possibly exploitable integer overflow. Thanks to Martin Pitt for the patch. Closes: #379920. stable/main/binary-hppa/freetype2-demos_2.1.7-6_hppa.deb stable/main/binary-hppa/libfreetype6-udeb_2.1.7-6_hppa.udeb stable/main/binary-hppa/libfreetype6_2.1.7-6_hppa.deb stable/main/binary-hppa/libfreetype6-dev_2.1.7-6_hppa.deb freetype (2.1.7-6) stable-security; urgency=high * Add debian/patches-freetype/CVE-2006-3467_pcf-strlen.patch for CVE-2006-3467, a missing string length check in PCF files that leads to a possibly exploitable integer overflow. Thanks to Martin Pitt for the patch. Closes: #379920. stable/main/binary-arm/freetype2-demos_2.1.7-6_arm.deb stable/main/binary-arm/libfreetype6-udeb_2.1.7-6_arm.udeb stable/main/binary-arm/libfreetype6_2.1.7-6_arm.deb stable/main/binary-arm/libfreetype6-dev_2.1.7-6_arm.deb freetype (2.1.7-6) stable-security; urgency=high * Add debian/patches-freetype/CVE-2006-3467_pcf-strlen.patch for CVE-2006-3467, a missing string length check in PCF files that leads to a possibly exploitable integer overflow. Thanks to Martin Pitt for the patch. Closes: #379920. stable/main/binary-alpha/freetype2-demos_2.1.7-6_alpha.deb stable/main/binary-alpha/libfreetype6-dev_2.1.7-6_alpha.deb stable/main/binary-alpha/libfreetype6-udeb_2.1.7-6_alpha.udeb stable/main/binary-alpha/libfreetype6_2.1.7-6_alpha.deb freetype (2.1.7-6) stable-security; urgency=high * Add debian/patches-freetype/CVE-2006-3467_pcf-strlen.patch for CVE-2006-3467, a missing string length check in PCF files that leads to a possibly exploitable integer overflow. Thanks to Martin Pitt for the patch. Closes: #379920. stable/main/binary-i386/libfreetype6_2.1.7-6_i386.deb stable/main/source/freetype_2.1.7-6.diff.gz stable/main/source/freetype_2.1.7-6.dsc stable/main/binary-i386/libfreetype6-dev_2.1.7-6_i386.deb stable/main/binary-i386/libfreetype6-udeb_2.1.7-6_i386.udeb stable/main/binary-i386/freetype2-demos_2.1.7-6_i386.deb freetype (2.1.7-6) stable-security; urgency=high * Add debian/patches-freetype/CVE-2006-3467_pcf-strlen.patch for CVE-2006-3467, a missing string length check in PCF files that leads to a possibly exploitable integer overflow. Thanks to Martin Pitt for the patch. Closes: #379920. stable/main/source/fai-kernels_1.9.1sarge4.dsc stable/main/binary-i386/fai-kernels_1.9.1sarge4_i386.deb stable/main/source/fai-kernels_1.9.1sarge4.tar.gz fai-kernels (1.9.1sarge4) stable-security; urgency=high * NMU by the Security Team * Build against kernel-tree-2.6.8-16sarge5: * [ERRATA] madvise_remove-restrict.dpatch [SECURITY] The 2.6.8-16sarge3 changelog associated this patch with CVE-2006-1524. However, this patch fixes an mprotect issue that was split off from the original report into CVE-2006-2071. 2.6.8 is not vulnerable to CVE-2006-1524 the madvise_remove issue. See CVE-2006-2071 * fs-ext3-bad-nfs-handle.dpatch [SECURITY] James McKenzie discovered a Denial of Service vulnerability in the NFS driver. When exporting an ext3 file system over NFS, a remote attacker could exploit this to trigger a file system panic by sending a specially crafted UDP packet. See CVE-2006-3468 * direct-io-write-mem-leak.dpatch [SECURITY] Fix memory leak in O_DIRECT write. See CVE-2004-2660 * nfs-handle-long-symlinks.dpatch [SECURITY] Fix buffer overflow in NFS readline handling that allows a remote server to cause a denial of service (crash) via a long symlink See CVE-2005-4798 * cdrom-bad-cgc.buflen-assign.dpatch [SECURITY] Fix buffer overflow in dvd_read_bca which could potentially be used by a local user to trigger a buffer overflow via a specially crafted DVD, USB stick, or similar automatically mounted device. See CVE-2006-2935 * usb-serial-ftdi_sio-dos.patch [SECURITY] fix userspace DoS in ftdi_sio driver See CVE-2006-2936 * selinux-tracer-SID-fix.dpatch [SECURITY] Fix vulnerability in selinux_ptrace that prevents local users from changing the tracer SID to the SID of another process See CVE-2006-1052 * netfilter-SO_ORIGINAL_DST-leak.dpatch [SECURITY] Fix information leak in SO_ORIGINAL_DST See CVE-2006-1343 * sg-no-mmap-VM_IO.dpatch [SECURITY] Fix DoS vulnerability whereby a local user could attempt a dio/mmap and cause the sg driver to oops. See CVE-2006-1528 * exit-bogus-bugon.dpatch [SECURITY] Remove bogus BUG() in exit.c which could be maliciously triggered by a local user See CVE-2006-1855 * readv-writev-missing-lsm-check.dpatch, readv-writev-missing-lsm-check-compat.dpatch [SECURITY] Add missing file_permission callback in readv/writev syscalls See CVE-2006-1856 * snmp-nat-mem-corruption-fix.dpatch [SECURITY] Fix memory corruption in snmp_trap_decode See CVE-2006-2444 * kfree_skb-race.dpatch [SECURITY] Fix race between kfree_skb and __skb_unlink See CVE-2006-2446 * hppa-mb-extraneous-semicolon.dpatch, sparc32-mb-extraneous-semicolons.dpatch, sparc64-mb-extraneous-semicolons.dpatch: Fix a syntax error caused by extranous semicolons in smp_mb() macros which resulted in a build failure with kfree_skb-race.dpatch * sctp-priv-elevation.dpatch [SECURITY] Fix SCTP privelege escalation See CVE-2006-3745 * sctp-priv-elevation-2.dpatch [SECURITY] Fix local DoS resulting from sctp-priv-elevation.dpatch See CVE-2006-4535 * ppc-hid0-dos.dpatch [SECURITY][ppc] Fix local DoS by clearing HID0 attention enable on PPC970 at boot time See CVE-2006-4093 * udf-deadlock.dpatch [SECURITY] Fix possible UDF deadlock and memory corruption See CVE-2006-4145 * Build against kernel-tree-2.4.27-10sarge4 * [ERRATA] 213_madvise_remove-restrict.diff [SECURITY] The 2.4.27-10sarge3 changelog associated this patch with CVE-2006-1524. However, this patch fixes an mprotect issue that was split off from the original report into CVE-2006-2071. 2.4.27 is not vulnerable to CVE-2006-1524 the madvise_remove issue. See CVE-2006-2071 * 223_nfs-handle-long-symlinks.diff [SECURITY] Fix buffer overflow in NFS readline handling that allows a remote server to cause a denial of service (crash) via a long symlink See CVE-2005-4798 * 224_cdrom-bad-cgc.buflen-assign.diff [SECURITY] Fix buffer overflow in dvd_read_bca which could potentially be used by a local user to trigger a buffer overflow via a specially crafted DVD, USB stick, or similar automatically mounted device. See CVE-2006-2935 * 225_sg-no-mmap-VM_IO.diff [SECURITY] Fix DoS vulnerability whereby a local user could attempt a dio/mmap and cause the sg driver to oops. See CVE-2006-1528 * 226_snmp-nat-mem-corruption-fix.diff [SECURITY] Fix memory corruption in snmp_trap_decode See CVE-2006-2444 * 227_kfree_skb.diff [SECURITY] Fix race between kfree_skb and __skb_unlink See CVE-2006-2446 * 228_sparc-mb-extraneous-semicolons.diff Fix a syntax error caused by extranous semicolons in smp_mb() macros which resulted in a build failure with 227_kfree_skb.diff * 229_sctp-priv-elevation.diff, 230_sctp-priv-elevation-2.diff [SECURITY] Fix SCTP privelege escalation See CVE-2006-3745 * 231_udf-deadlock.diff [SECURITY] Fix possible UDF deadlock and memory corruption See CVE-2006-4145 * 232_sparc-membar-extraneous-semicolons.diff Fix an additional syntax error caused by extraneous semicolons in membar macros on sparc stable/main/binary-sparc/ethereal-common_0.10.10-2sarge8_sparc.deb stable/main/binary-sparc/tethereal_0.10.10-2sarge8_sparc.deb stable/main/binary-sparc/ethereal_0.10.10-2sarge8_sparc.deb stable/main/binary-sparc/ethereal-dev_0.10.10-2sarge8_sparc.deb ethereal (0.10.10-2sarge8) stable-security; urgency=high * Non-maintainer upload by the Security Team * Memory exhaustion denial of service in Q.2391 dissector (CVE-2006-4333) stable/main/binary-s390/ethereal-common_0.10.10-2sarge8_s390.deb stable/main/binary-s390/ethereal-dev_0.10.10-2sarge8_s390.deb stable/main/binary-s390/ethereal_0.10.10-2sarge8_s390.deb stable/main/binary-s390/tethereal_0.10.10-2sarge8_s390.deb ethereal (0.10.10-2sarge8) stable-security; urgency=high * Non-maintainer upload by the Security Team * Memory exhaustion denial of service in Q.2391 dissector (CVE-2006-4333) stable/main/binary-powerpc/ethereal_0.10.10-2sarge8_powerpc.deb stable/main/binary-powerpc/ethereal-common_0.10.10-2sarge8_powerpc.deb stable/main/binary-powerpc/ethereal-dev_0.10.10-2sarge8_powerpc.deb stable/main/binary-powerpc/tethereal_0.10.10-2sarge8_powerpc.deb ethereal (0.10.10-2sarge8) stable-security; urgency=high * Non-maintainer upload by the Security Team * Memory exhaustion denial of service in Q.2391 dissector (CVE-2006-4333) stable/main/binary-mipsel/tethereal_0.10.10-2sarge8_mipsel.deb stable/main/binary-mipsel/ethereal-dev_0.10.10-2sarge8_mipsel.deb stable/main/binary-mipsel/ethereal_0.10.10-2sarge8_mipsel.deb stable/main/binary-mipsel/ethereal-common_0.10.10-2sarge8_mipsel.deb ethereal (0.10.10-2sarge8) stable-security; urgency=high * Non-maintainer upload by the Security Team * Memory exhaustion denial of service in Q.2391 dissector (CVE-2006-4333) stable/main/binary-mips/ethereal-dev_0.10.10-2sarge8_mips.deb stable/main/binary-mips/tethereal_0.10.10-2sarge8_mips.deb stable/main/binary-mips/ethereal-common_0.10.10-2sarge8_mips.deb stable/main/binary-mips/ethereal_0.10.10-2sarge8_mips.deb ethereal (0.10.10-2sarge8) stable-security; urgency=high * Non-maintainer upload by the Security Team * Memory exhaustion denial of service in Q.2391 dissector (CVE-2006-4333) stable/main/binary-m68k/tethereal_0.10.10-2sarge8_m68k.deb stable/main/binary-m68k/ethereal-dev_0.10.10-2sarge8_m68k.deb stable/main/binary-m68k/ethereal_0.10.10-2sarge8_m68k.deb stable/main/binary-m68k/ethereal-common_0.10.10-2sarge8_m68k.deb ethereal (0.10.10-2sarge8) stable-security; urgency=high * Non-maintainer upload by the Security Team * Memory exhaustion denial of service in Q.2391 dissector (CVE-2006-4333) stable/main/binary-ia64/ethereal-common_0.10.10-2sarge8_ia64.deb stable/main/binary-ia64/ethereal_0.10.10-2sarge8_ia64.deb stable/main/binary-ia64/tethereal_0.10.10-2sarge8_ia64.deb stable/main/binary-ia64/ethereal-dev_0.10.10-2sarge8_ia64.deb ethereal (0.10.10-2sarge8) stable-security; urgency=high * Non-maintainer upload by the Security Team * Memory exhaustion denial of service in Q.2391 dissector (CVE-2006-4333) stable/main/binary-hppa/ethereal-common_0.10.10-2sarge8_hppa.deb stable/main/binary-hppa/ethereal-dev_0.10.10-2sarge8_hppa.deb stable/main/binary-hppa/ethereal_0.10.10-2sarge8_hppa.deb stable/main/binary-hppa/tethereal_0.10.10-2sarge8_hppa.deb ethereal (0.10.10-2sarge8) stable-security; urgency=high * Non-maintainer upload by the Security Team * Memory exhaustion denial of service in Q.2391 dissector (CVE-2006-4333) stable/main/binary-arm/tethereal_0.10.10-2sarge8_arm.deb stable/main/binary-arm/ethereal-dev_0.10.10-2sarge8_arm.deb stable/main/binary-arm/ethereal_0.10.10-2sarge8_arm.deb stable/main/binary-arm/ethereal-common_0.10.10-2sarge8_arm.deb ethereal (0.10.10-2sarge8) stable-security; urgency=high * Non-maintainer upload by the Security Team * Memory exhaustion denial of service in Q.2391 dissector (CVE-2006-4333) stable/main/binary-alpha/ethereal-common_0.10.10-2sarge8_alpha.deb stable/main/binary-alpha/ethereal-dev_0.10.10-2sarge8_alpha.deb stable/main/binary-alpha/tethereal_0.10.10-2sarge8_alpha.deb stable/main/binary-alpha/ethereal_0.10.10-2sarge8_alpha.deb ethereal (0.10.10-2sarge8) stable-security; urgency=high * Non-maintainer upload by the Security Team * Memory exhaustion denial of service in Q.2391 dissector (CVE-2006-4333) stable/main/binary-i386/ethereal_0.10.10-2sarge8_i386.deb stable/main/source/ethereal_0.10.10-2sarge8.diff.gz stable/main/binary-i386/ethereal-common_0.10.10-2sarge8_i386.deb stable/main/source/ethereal_0.10.10-2sarge8.dsc stable/main/binary-i386/tethereal_0.10.10-2sarge8_i386.deb stable/main/binary-i386/ethereal-dev_0.10.10-2sarge8_i386.deb ethereal (0.10.10-2sarge8) stable-security; urgency=high * Non-maintainer upload by the Security Team * Memory exhaustion denial of service in Q.2391 dissector (CVE-2006-4333) stable/main/binary-sparc/debian-installer-manual_20050317sarge1+b1_sparc.deb debian-installer (20050317sarge1+b1) stable; urgency=low * Binary-only non-maintainer upload for sparc; no source changes. * Rebuild with fixed udebs. stable/main/binary-sparc/deal_3.0.8-2sarge1_sparc.deb deal (3.0.8-2sarge1) stable; urgency=low * Fix segfault on amd64, (int)random() sometimes returned negative numbers (Closes: #383625). stable/main/binary-s390/deal_3.0.8-2sarge1_s390.deb deal (3.0.8-2sarge1) stable; urgency=low * Fix segfault on amd64, (int)random() sometimes returned negative numbers (Closes: #383625). stable/main/binary-powerpc/deal_3.0.8-2sarge1_powerpc.deb deal (3.0.8-2sarge1) stable; urgency=low * Fix segfault on amd64, (int)random() sometimes returned negative numbers (Closes: #383625). stable/main/binary-mipsel/deal_3.0.8-2sarge1_mipsel.deb deal (3.0.8-2sarge1) stable; urgency=low * Fix segfault on amd64, (int)random() sometimes returned negative numbers (Closes: #383625). stable/main/binary-mips/deal_3.0.8-2sarge1_mips.deb deal (3.0.8-2sarge1) stable; urgency=low * Fix segfault on amd64, (int)random() sometimes returned negative numbers (Closes: #383625). stable/main/binary-m68k/deal_3.0.8-2sarge1_m68k.deb deal (3.0.8-2sarge1) stable; urgency=low * Fix segfault on amd64, (int)random() sometimes returned negative numbers (Closes: #383625). stable/main/binary-ia64/deal_3.0.8-2sarge1_ia64.deb deal (3.0.8-2sarge1) stable; urgency=low * Fix segfault on amd64, (int)random() sometimes returned negative numbers (Closes: #383625). stable/main/binary-hppa/deal_3.0.8-2sarge1_hppa.deb deal (3.0.8-2sarge1) stable; urgency=low * Fix segfault on amd64, (int)random() sometimes returned negative numbers (Closes: #383625). stable/main/binary-arm/deal_3.0.8-2sarge1_arm.deb deal (3.0.8-2sarge1) stable; urgency=low * Fix segfault on amd64, (int)random() sometimes returned negative numbers (Closes: #383625). stable/main/binary-alpha/deal_3.0.8-2sarge1_alpha.deb deal (3.0.8-2sarge1) stable; urgency=low * Fix segfault on amd64, (int)random() sometimes returned negative numbers (Closes: #383625). stable/main/source/deal_3.0.8-2sarge1.diff.gz stable/main/source/deal_3.0.8-2sarge1.dsc stable/main/binary-i386/deal_3.0.8-2sarge1_i386.deb deal (3.0.8-2sarge1) stable; urgency=low * Fix segfault on amd64, (int)random() sometimes returned negative numbers (Closes: #383625). stable/main/binary-sparc/cscope_15.5-1.1sarge2_sparc.deb cscope (15.5-1.1sarge2) stable-security; urgency=high * Non-maintainer upload by the Security Team: * Fix several buffer overflows. (CVE-2006-4262) stable/main/binary-s390/cscope_15.5-1.1sarge2_s390.deb cscope (15.5-1.1sarge2) stable-security; urgency=high * Non-maintainer upload by the Security Team: * Fix several buffer overflows. (CVE-2006-4262) stable/main/binary-powerpc/cscope_15.5-1.1sarge2_powerpc.deb cscope (15.5-1.1sarge2) stable-security; urgency=high * Non-maintainer upload by the Security Team: * Fix several buffer overflows. (CVE-2006-4262) stable/main/binary-mipsel/cscope_15.5-1.1sarge2_mipsel.deb cscope (15.5-1.1sarge2) stable-security; urgency=high * Non-maintainer upload by the Security Team: * Fix several buffer overflows. (CVE-2006-4262) stable/main/binary-mips/cscope_15.5-1.1sarge2_mips.deb cscope (15.5-1.1sarge2) stable-security; urgency=high * Non-maintainer upload by the Security Team: * Fix several buffer overflows. (CVE-2006-4262) stable/main/binary-m68k/cscope_15.5-1.1sarge2_m68k.deb cscope (15.5-1.1sarge2) stable-security; urgency=high * Non-maintainer upload by the Security Team: * Fix several buffer overflows. (CVE-2006-4262) stable/main/binary-ia64/cscope_15.5-1.1sarge2_ia64.deb cscope (15.5-1.1sarge2) stable-security; urgency=high * Non-maintainer upload by the Security Team: * Fix several buffer overflows. (CVE-2006-4262) stable/main/binary-hppa/cscope_15.5-1.1sarge2_hppa.deb cscope (15.5-1.1sarge2) stable-security; urgency=high * Non-maintainer upload by the Security Team: * Fix several buffer overflows. (CVE-2006-4262) stable/main/binary-arm/cscope_15.5-1.1sarge2_arm.deb cscope (15.5-1.1sarge2) stable-security; urgency=high * Non-maintainer upload by the Security Team: * Fix several buffer overflows. (CVE-2006-4262) stable/main/binary-alpha/cscope_15.5-1.1sarge2_alpha.deb cscope (15.5-1.1sarge2) stable-security; urgency=high * Non-maintainer upload by the Security Team: * Fix several buffer overflows. (CVE-2006-4262) stable/main/binary-i386/cscope_15.5-1.1sarge2_i386.deb stable/main/source/cscope_15.5-1.1sarge2.dsc stable/main/source/cscope_15.5-1.1sarge2.diff.gz cscope (15.5-1.1sarge2) stable-security; urgency=high * Non-maintainer upload by the Security Team: * Fix several buffer overflows. (CVE-2006-4262) stable/main/binary-sparc/cheesetracker_0.9.9-1sarge1_sparc.deb cheesetracker (0.9.9-1sarge1) stable-security; urgency=high * Non-maintainer upload by The Security Team. * Avoid buffer overflow when loading input files. [CVE-2006-3814] stable/main/binary-s390/cheesetracker_0.9.9-1sarge1_s390.deb cheesetracker (0.9.9-1sarge1) stable-security; urgency=high * Non-maintainer upload by The Security Team. * Avoid buffer overflow when loading input files. [CVE-2006-3814] stable/main/binary-powerpc/cheesetracker_0.9.9-1sarge1_powerpc.deb cheesetracker (0.9.9-1sarge1) stable-security; urgency=high * Non-maintainer upload by The Security Team. * Avoid buffer overflow when loading input files. [CVE-2006-3814] stable/main/binary-mipsel/cheesetracker_0.9.9-1sarge1_mipsel.deb cheesetracker (0.9.9-1sarge1) stable-security; urgency=high * Non-maintainer upload by The Security Team. * Avoid buffer overflow when loading input files. [CVE-2006-3814] stable/main/binary-mips/cheesetracker_0.9.9-1sarge1_mips.deb cheesetracker (0.9.9-1sarge1) stable-security; urgency=high * Non-maintainer upload by The Security Team. * Avoid buffer overflow when loading input files. [CVE-2006-3814] stable/main/binary-m68k/cheesetracker_0.9.9-1sarge1_m68k.deb cheesetracker (0.9.9-1sarge1) stable-security; urgency=high * Non-maintainer upload by The Security Team. * Avoid buffer overflow when loading input files. [CVE-2006-3814] stable/main/binary-ia64/cheesetracker_0.9.9-1sarge1_ia64.deb cheesetracker (0.9.9-1sarge1) stable-security; urgency=high * Non-maintainer upload by The Security Team. * Avoid buffer overflow when loading input files. [CVE-2006-3814] stable/main/binary-hppa/cheesetracker_0.9.9-1sarge1_hppa.deb cheesetracker (0.9.9-1sarge1) stable-security; urgency=high * Non-maintainer upload by The Security Team. * Avoid buffer overflow when loading input files. [CVE-2006-3814] stable/main/binary-arm/cheesetracker_0.9.9-1sarge1_arm.deb cheesetracker (0.9.9-1sarge1) stable-security; urgency=high * Non-maintainer upload by The Security Team. * Avoid buffer overflow when loading input files. [CVE-2006-3814] stable/main/binary-alpha/cheesetracker_0.9.9-1sarge1_alpha.deb cheesetracker (0.9.9-1sarge1) stable-security; urgency=high * Non-maintainer upload by The Security Team. * Avoid buffer overflow when loading input files. [CVE-2006-3814] stable/main/binary-i386/cheesetracker_0.9.9-1sarge1_i386.deb stable/main/source/cheesetracker_0.9.9-1sarge1.diff.gz stable/main/source/cheesetracker_0.9.9-1sarge1.dsc cheesetracker (0.9.9-1sarge1) stable-security; urgency=high * Non-maintainer upload by The Security Team. * Avoid buffer overflow when loading input files. [CVE-2006-3814] stable/main/binary-sparc/capi4hylafax_01.02.03-10sarge2_sparc.deb capi4hylafax (1:01.02.03-10sarge2) stable-security; urgency=high * Update of the security update: Add the fix to the mgetty mode. Remote arbitrary command execution through TSI string. [CVE-2006-3126] stable/main/binary-m68k/capi4hylafax_01.02.03-10sarge2_m68k.deb capi4hylafax (1:01.02.03-10sarge2) stable-security; urgency=high * Update of the security update: Add the fix to the mgetty mode. Remote arbitrary command execution through TSI string. [CVE-2006-3126] stable/main/binary-ia64/capi4hylafax_01.02.03-10sarge2_ia64.deb capi4hylafax (1:01.02.03-10sarge2) stable-security; urgency=high * Update of the security update: Add the fix to the mgetty mode. Remote arbitrary command execution through TSI string. [CVE-2006-3126] stable/main/binary-i386/capi4hylafax_01.02.03-10sarge2_i386.deb capi4hylafax (1:01.02.03-10sarge2) stable-security; urgency=high * Update of the security update: Add the fix to the mgetty mode. Remote arbitrary command execution through TSI string. [CVE-2006-3126] stable/main/binary-arm/capi4hylafax_01.02.03-10sarge2_arm.deb capi4hylafax (1:01.02.03-10sarge2) stable-security; urgency=high * Update of the security update: Add the fix to the mgetty mode. Remote arbitrary command execution through TSI string. [CVE-2006-3126] stable/main/binary-alpha/capi4hylafax_01.02.03-10sarge2_alpha.deb capi4hylafax (1:01.02.03-10sarge2) stable-security; urgency=high * Update of the security update: Add the fix to the mgetty mode. Remote arbitrary command execution through TSI string. [CVE-2006-3126] stable/main/source/capi4hylafax_01.02.03-10sarge2.diff.gz stable/main/source/capi4hylafax_01.02.03-10sarge2.dsc stable/main/binary-powerpc/capi4hylafax_01.02.03-10sarge2_powerpc.deb capi4hylafax (1:01.02.03-10sarge2) stable-security; urgency=high * Update of the security update: Add the fix to the mgetty mode. Remote arbitrary command execution through TSI string. [CVE-2006-3126] stable/main/binary-sparc/bomberclone_0.11.5-1sarge2_sparc.deb bomberclone (0.11.5-1sarge2) stable-security; urgency=high * New maintainer. See bug #316569. * Applied patch by Steffen Pohle <stpohle@gmx.net> to fix remote vulnerabilities [ChangeLog, include/network.h, include/packets.h, src/configuration.c, src/network.c, src/packets.c, src/pkgcache.c, CVE-2006-4005, CVE-2006-4006]. See bug #382082. stable/main/binary-s390/bomberclone_0.11.5-1sarge2_s390.deb bomberclone (0.11.5-1sarge2) stable-security; urgency=high * New maintainer. See bug #316569. * Applied patch by Steffen Pohle <stpohle@gmx.net> to fix remote vulnerabilities [ChangeLog, include/network.h, include/packets.h, src/configuration.c, src/network.c, src/packets.c, src/pkgcache.c, CVE-2006-4005, CVE-2006-4006]. See bug #382082. stable/main/binary-mipsel/bomberclone_0.11.5-1sarge2_mipsel.deb bomberclone (0.11.5-1sarge2) stable-security; urgency=high * New maintainer. See bug #316569. * Applied patch by Steffen Pohle <stpohle@gmx.net> to fix remote vulnerabilities [ChangeLog, include/network.h, include/packets.h, src/configuration.c, src/network.c, src/packets.c, src/pkgcache.c, CVE-2006-4005, CVE-2006-4006]. See bug #382082. stable/main/binary-mips/bomberclone_0.11.5-1sarge2_mips.deb bomberclone (0.11.5-1sarge2) stable-security; urgency=high * New maintainer. See bug #316569. * Applied patch by Steffen Pohle <stpohle@gmx.net> to fix remote vulnerabilities [ChangeLog, include/network.h, include/packets.h, src/configuration.c, src/network.c, src/packets.c, src/pkgcache.c, CVE-2006-4005, CVE-2006-4006]. See bug #382082. stable/main/binary-m68k/bomberclone_0.11.5-1sarge2_m68k.deb bomberclone (0.11.5-1sarge2) stable-security; urgency=high * New maintainer. See bug #316569. * Applied patch by Steffen Pohle <stpohle@gmx.net> to fix remote vulnerabilities [ChangeLog, include/network.h, include/packets.h, src/configuration.c, src/network.c, src/packets.c, src/pkgcache.c, CVE-2006-4005, CVE-2006-4006]. See bug #382082. stable/main/binary-ia64/bomberclone_0.11.5-1sarge2_ia64.deb bomberclone (0.11.5-1sarge2) stable-security; urgency=high * New maintainer. See bug #316569. * Applied patch by Steffen Pohle <stpohle@gmx.net> to fix remote vulnerabilities [ChangeLog, include/network.h, include/packets.h, src/configuration.c, src/network.c, src/packets.c, src/pkgcache.c, CVE-2006-4005, CVE-2006-4006]. See bug #382082. stable/main/binary-i386/bomberclone_0.11.5-1sarge2_i386.deb bomberclone (0.11.5-1sarge2) stable-security; urgency=high * New maintainer. See bug #316569. * Applied patch by Steffen Pohle <stpohle@gmx.net> to fix remote vulnerabilities [ChangeLog, include/network.h, include/packets.h, src/configuration.c, src/network.c, src/packets.c, src/pkgcache.c, CVE-2006-4005, CVE-2006-4006]. See bug #382082. stable/main/binary-hppa/bomberclone_0.11.5-1sarge2_hppa.deb bomberclone (0.11.5-1sarge2) stable-security; urgency=high * New maintainer. See bug #316569. * Applied patch by Steffen Pohle <stpohle@gmx.net> to fix remote vulnerabilities [ChangeLog, include/network.h, include/packets.h, src/configuration.c, src/network.c, src/packets.c, src/pkgcache.c, CVE-2006-4005, CVE-2006-4006]. See bug #382082. stable/main/binary-arm/bomberclone_0.11.5-1sarge2_arm.deb bomberclone (0.11.5-1sarge2) stable-security; urgency=high * New maintainer. See bug #316569. * Applied patch by Steffen Pohle <stpohle@gmx.net> to fix remote vulnerabilities [ChangeLog, include/network.h, include/packets.h, src/configuration.c, src/network.c, src/packets.c, src/pkgcache.c, CVE-2006-4005, CVE-2006-4006]. See bug #382082. stable/main/binary-alpha/bomberclone_0.11.5-1sarge2_alpha.deb bomberclone (0.11.5-1sarge2) stable-security; urgency=high * New maintainer. See bug #316569. * Applied patch by Steffen Pohle <stpohle@gmx.net> to fix remote vulnerabilities [ChangeLog, include/network.h, include/packets.h, src/configuration.c, src/network.c, src/packets.c, src/pkgcache.c, CVE-2006-4005, CVE-2006-4006]. See bug #382082. stable/main/source/bomberclone_0.11.5-1sarge2.diff.gz stable/main/binary-all/bomberclone-data_0.11.5-1sarge2_all.deb stable/main/source/bomberclone_0.11.5-1sarge2.dsc stable/main/binary-powerpc/bomberclone_0.11.5-1sarge2_powerpc.deb bomberclone (0.11.5-1sarge2) stable-security; urgency=high * New maintainer. See bug #316569. * Applied patch by Steffen Pohle <stpohle@gmx.net> to fix remote vulnerabilities [ChangeLog, include/network.h, include/packets.h, src/configuration.c, src/network.c, src/packets.c, src/pkgcache.c, CVE-2006-4005, CVE-2006-4006]. See bug #382082. stable/main/binary-sparc/libisc7_9.2.4-1sarge1_sparc.deb stable/main/binary-sparc/libisccc0_9.2.4-1sarge1_sparc.deb stable/main/binary-sparc/libisccfg0_9.2.4-1sarge1_sparc.deb stable/main/binary-sparc/bind9_9.2.4-1sarge1_sparc.deb stable/main/binary-sparc/dnsutils_9.2.4-1sarge1_sparc.deb stable/main/binary-sparc/libbind-dev_9.2.4-1sarge1_sparc.deb stable/main/binary-sparc/libdns16_9.2.4-1sarge1_sparc.deb stable/main/binary-sparc/lwresd_9.2.4-1sarge1_sparc.deb stable/main/binary-sparc/liblwres1_9.2.4-1sarge1_sparc.deb stable/main/binary-sparc/bind9-host_9.2.4-1sarge1_sparc.deb bind9 (1:9.2.4-1sarge1) stable; urgency=low * Backport bugfix for 1941 from 9.2.6-P1. Closes: #386237, #386245 - fixes CVE-2006-4095 and CVE-2006-4096. - ncache_adderesult() should set eresult even if no rdataset is passed to it. [RT #15642] stable/main/binary-s390/libisc7_9.2.4-1sarge1_s390.deb stable/main/binary-s390/libbind-dev_9.2.4-1sarge1_s390.deb stable/main/binary-s390/liblwres1_9.2.4-1sarge1_s390.deb stable/main/binary-s390/libdns16_9.2.4-1sarge1_s390.deb stable/main/binary-s390/dnsutils_9.2.4-1sarge1_s390.deb stable/main/binary-s390/bind9-host_9.2.4-1sarge1_s390.deb stable/main/binary-s390/lwresd_9.2.4-1sarge1_s390.deb stable/main/binary-s390/bind9_9.2.4-1sarge1_s390.deb stable/main/binary-s390/libisccc0_9.2.4-1sarge1_s390.deb stable/main/binary-s390/libisccfg0_9.2.4-1sarge1_s390.deb bind9 (1:9.2.4-1sarge1) stable; urgency=low * Backport bugfix for 1941 from 9.2.6-P1. Closes: #386237, #386245 - fixes CVE-2006-4095 and CVE-2006-4096. - ncache_adderesult() should set eresult even if no rdataset is passed to it. [RT #15642] stable/main/binary-mipsel/libbind-dev_9.2.4-1sarge1_mipsel.deb stable/main/binary-mipsel/libisccfg0_9.2.4-1sarge1_mipsel.deb stable/main/binary-mipsel/libisccc0_9.2.4-1sarge1_mipsel.deb stable/main/binary-mipsel/libisc7_9.2.4-1sarge1_mipsel.deb stable/main/binary-mipsel/libdns16_9.2.4-1sarge1_mipsel.deb stable/main/binary-mipsel/dnsutils_9.2.4-1sarge1_mipsel.deb stable/main/binary-mipsel/bind9_9.2.4-1sarge1_mipsel.deb stable/main/binary-mipsel/liblwres1_9.2.4-1sarge1_mipsel.deb stable/main/binary-mipsel/lwresd_9.2.4-1sarge1_mipsel.deb stable/main/binary-mipsel/bind9-host_9.2.4-1sarge1_mipsel.deb bind9 (1:9.2.4-1sarge1) stable; urgency=low * Backport bugfix for 1941 from 9.2.6-P1. Closes: #386237, #386245 - fixes CVE-2006-4095 and CVE-2006-4096. - ncache_adderesult() should set eresult even if no rdataset is passed to it. [RT #15642] stable/main/binary-mips/dnsutils_9.2.4-1sarge1_mips.deb stable/main/binary-mips/libbind-dev_9.2.4-1sarge1_mips.deb stable/main/binary-mips/libdns16_9.2.4-1sarge1_mips.deb stable/main/binary-mips/libisc7_9.2.4-1sarge1_mips.deb stable/main/binary-mips/lwresd_9.2.4-1sarge1_mips.deb stable/main/binary-mips/libisccc0_9.2.4-1sarge1_mips.deb stable/main/binary-mips/libisccfg0_9.2.4-1sarge1_mips.deb stable/main/binary-mips/bind9-host_9.2.4-1sarge1_mips.deb stable/main/binary-mips/bind9_9.2.4-1sarge1_mips.deb stable/main/binary-mips/liblwres1_9.2.4-1sarge1_mips.deb bind9 (1:9.2.4-1sarge1) stable; urgency=low * Backport bugfix for 1941 from 9.2.6-P1. Closes: #386237, #386245 - fixes CVE-2006-4095 and CVE-2006-4096. - ncache_adderesult() should set eresult even if no rdataset is passed to it. [RT #15642] stable/main/binary-m68k/dnsutils_9.2.4-1sarge1_m68k.deb stable/main/binary-m68k/libisc7_9.2.4-1sarge1_m68k.deb stable/main/binary-m68k/libdns16_9.2.4-1sarge1_m68k.deb stable/main/binary-m68k/libbind-dev_9.2.4-1sarge1_m68k.deb stable/main/binary-m68k/libisccfg0_9.2.4-1sarge1_m68k.deb stable/main/binary-m68k/libisccc0_9.2.4-1sarge1_m68k.deb stable/main/binary-m68k/lwresd_9.2.4-1sarge1_m68k.deb stable/main/binary-m68k/liblwres1_9.2.4-1sarge1_m68k.deb stable/main/binary-m68k/bind9_9.2.4-1sarge1_m68k.deb stable/main/binary-m68k/bind9-host_9.2.4-1sarge1_m68k.deb bind9 (1:9.2.4-1sarge1) stable; urgency=low * Backport bugfix for 1941 from 9.2.6-P1. Closes: #386237, #386245 - fixes CVE-2006-4095 and CVE-2006-4096. - ncache_adderesult() should set eresult even if no rdataset is passed to it. [RT #15642] stable/main/binary-ia64/dnsutils_9.2.4-1sarge1_ia64.deb stable/main/binary-ia64/bind9-host_9.2.4-1sarge1_ia64.deb stable/main/binary-ia64/libisc7_9.2.4-1sarge1_ia64.deb stable/main/binary-ia64/libdns16_9.2.4-1sarge1_ia64.deb stable/main/binary-ia64/libbind-dev_9.2.4-1sarge1_ia64.deb stable/main/binary-ia64/bind9_9.2.4-1sarge1_ia64.deb stable/main/binary-ia64/liblwres1_9.2.4-1sarge1_ia64.deb stable/main/binary-ia64/lwresd_9.2.4-1sarge1_ia64.deb stable/main/binary-ia64/libisccfg0_9.2.4-1sarge1_ia64.deb stable/main/binary-ia64/libisccc0_9.2.4-1sarge1_ia64.deb bind9 (1:9.2.4-1sarge1) stable; urgency=low * Backport bugfix for 1941 from 9.2.6-P1. Closes: #386237, #386245 - fixes CVE-2006-4095 and CVE-2006-4096. - ncache_adderesult() should set eresult even if no rdataset is passed to it. [RT #15642] stable/main/binary-i386/liblwres1_9.2.4-1sarge1_i386.deb stable/main/binary-i386/libisccfg0_9.2.4-1sarge1_i386.deb stable/main/binary-i386/libisccc0_9.2.4-1sarge1_i386.deb stable/main/binary-i386/lwresd_9.2.4-1sarge1_i386.deb stable/main/binary-i386/bind9_9.2.4-1sarge1_i386.deb stable/main/binary-i386/libisc7_9.2.4-1sarge1_i386.deb stable/main/binary-i386/libdns16_9.2.4-1sarge1_i386.deb stable/main/binary-i386/libbind-dev_9.2.4-1sarge1_i386.deb stable/main/binary-i386/dnsutils_9.2.4-1sarge1_i386.deb stable/main/binary-i386/bind9-host_9.2.4-1sarge1_i386.deb bind9 (1:9.2.4-1sarge1) stable; urgency=low * Backport bugfix for 1941 from 9.2.6-P1. Closes: #386237, #386245 - fixes CVE-2006-4095 and CVE-2006-4096. - ncache_adderesult() should set eresult even if no rdataset is passed to it. [RT #15642] stable/main/binary-hppa/lwresd_9.2.4-1sarge1_hppa.deb stable/main/binary-hppa/bind9-host_9.2.4-1sarge1_hppa.deb stable/main/binary-hppa/dnsutils_9.2.4-1sarge1_hppa.deb stable/main/binary-hppa/libbind-dev_9.2.4-1sarge1_hppa.deb stable/main/binary-hppa/libisccc0_9.2.4-1sarge1_hppa.deb stable/main/binary-hppa/libisccfg0_9.2.4-1sarge1_hppa.deb stable/main/binary-hppa/bind9_9.2.4-1sarge1_hppa.deb stable/main/binary-hppa/libisc7_9.2.4-1sarge1_hppa.deb stable/main/binary-hppa/libdns16_9.2.4-1sarge1_hppa.deb stable/main/binary-hppa/liblwres1_9.2.4-1sarge1_hppa.deb bind9 (1:9.2.4-1sarge1) stable; urgency=low * Backport bugfix for 1941 from 9.2.6-P1. Closes: #386237, #386245 - fixes CVE-2006-4095 and CVE-2006-4096. - ncache_adderesult() should set eresult even if no rdataset is passed to it. [RT #15642] stable/main/binary-arm/libisc7_9.2.4-1sarge1_arm.deb stable/main/binary-arm/libdns16_9.2.4-1sarge1_arm.deb stable/main/binary-arm/bind9_9.2.4-1sarge1_arm.deb stable/main/binary-arm/lwresd_9.2.4-1sarge1_arm.deb stable/main/binary-arm/liblwres1_9.2.4-1sarge1_arm.deb stable/main/binary-arm/libisccc0_9.2.4-1sarge1_arm.deb stable/main/binary-arm/dnsutils_9.2.4-1sarge1_arm.deb stable/main/binary-arm/bind9-host_9.2.4-1sarge1_arm.deb stable/main/binary-arm/libbind-dev_9.2.4-1sarge1_arm.deb stable/main/binary-arm/libisccfg0_9.2.4-1sarge1_arm.deb bind9 (1:9.2.4-1sarge1) stable; urgency=low * Backport bugfix for 1941 from 9.2.6-P1. Closes: #386237, #386245 - fixes CVE-2006-4095 and CVE-2006-4096. - ncache_adderesult() should set eresult even if no rdataset is passed to it. [RT #15642] stable/main/binary-alpha/libisc7_9.2.4-1sarge1_alpha.deb stable/main/binary-alpha/libbind-dev_9.2.4-1sarge1_alpha.deb stable/main/binary-alpha/liblwres1_9.2.4-1sarge1_alpha.deb stable/main/binary-alpha/lwresd_9.2.4-1sarge1_alpha.deb stable/main/binary-alpha/bind9-host_9.2.4-1sarge1_alpha.deb stable/main/binary-alpha/bind9_9.2.4-1sarge1_alpha.deb stable/main/binary-alpha/libisccfg0_9.2.4-1sarge1_alpha.deb stable/main/binary-alpha/libisccc0_9.2.4-1sarge1_alpha.deb stable/main/binary-alpha/libdns16_9.2.4-1sarge1_alpha.deb stable/main/binary-alpha/dnsutils_9.2.4-1sarge1_alpha.deb bind9 (1:9.2.4-1sarge1) stable; urgency=low * Backport bugfix for 1941 from 9.2.6-P1. Closes: #386237, #386245 - fixes CVE-2006-4095 and CVE-2006-4096. - ncache_adderesult() should set eresult even if no rdataset is passed to it. [RT #15642] stable/main/binary-powerpc/bind9-host_9.2.4-1sarge1_powerpc.deb stable/main/binary-powerpc/libdns16_9.2.4-1sarge1_powerpc.deb stable/main/binary-powerpc/libisc7_9.2.4-1sarge1_powerpc.deb stable/main/binary-powerpc/dnsutils_9.2.4-1sarge1_powerpc.deb stable/main/binary-all/bind9-doc_9.2.4-1sarge1_all.deb stable/main/source/bind9_9.2.4-1sarge1.diff.gz stable/main/binary-powerpc/liblwres1_9.2.4-1sarge1_powerpc.deb stable/main/binary-powerpc/bind9_9.2.4-1sarge1_powerpc.deb stable/main/binary-powerpc/libbind-dev_9.2.4-1sarge1_powerpc.deb stable/main/binary-powerpc/lwresd_9.2.4-1sarge1_powerpc.deb stable/main/binary-powerpc/libisccfg0_9.2.4-1sarge1_powerpc.deb stable/main/binary-powerpc/libisccc0_9.2.4-1sarge1_powerpc.deb stable/main/source/bind9_9.2.4-1sarge1.dsc bind9 (1:9.2.4-1sarge1) stable; urgency=low * Backport bugfix for 1941 from 9.2.6-P1. Closes: #386237, #386245 - fixes CVE-2006-4095 and CVE-2006-4096. - ncache_adderesult() should set eresult even if no rdataset is passed to it. [RT #15642] stable/main/binary-sparc/apache-common_1.3.33-6sarge3_sparc.deb stable/main/binary-sparc/apache-dbg_1.3.33-6sarge3_sparc.deb stable/main/binary-sparc/apache_1.3.33-6sarge3_sparc.deb stable/main/binary-sparc/apache-ssl_1.3.33-6sarge3_sparc.deb stable/main/binary-sparc/libapache-mod-perl_1.29.0.3-6sarge3_sparc.deb stable/main/binary-sparc/apache-perl_1.3.33-6sarge3_sparc.deb apache (1.3.33-6sarge3) stable-security; urgency=high * Non-maintainer upload by The Security Team. * Added 910_expect_header_xss_CVE-2006-391 to fix a potential XSS issue affecting the use of the Expect header. [CVE-2006-391] * Added 911_mod_imap_xss-CVE-2005-3352 to fix a potential XSS issue when using Referer headers in mod_imap. [CVE02005-3352] stable/main/binary-s390/apache-ssl_1.3.33-6sarge3_s390.deb stable/main/binary-s390/apache-common_1.3.33-6sarge3_s390.deb stable/main/binary-s390/apache_1.3.33-6sarge3_s390.deb stable/main/binary-s390/apache-perl_1.3.33-6sarge3_s390.deb stable/main/binary-s390/libapache-mod-perl_1.29.0.3-6sarge3_s390.deb stable/main/binary-s390/apache-dbg_1.3.33-6sarge3_s390.deb apache (1.3.33-6sarge3) stable-security; urgency=high * Non-maintainer upload by The Security Team. * Added 910_expect_header_xss_CVE-2006-391 to fix a potential XSS issue affecting the use of the Expect header. [CVE-2006-391] * Added 911_mod_imap_xss-CVE-2005-3352 to fix a potential XSS issue when using Referer headers in mod_imap. [CVE02005-3352] stable/main/binary-powerpc/apache-dbg_1.3.33-6sarge3_powerpc.deb stable/main/binary-powerpc/apache-common_1.3.33-6sarge3_powerpc.deb stable/main/binary-powerpc/apache_1.3.33-6sarge3_powerpc.deb stable/main/binary-powerpc/apache-perl_1.3.33-6sarge3_powerpc.deb stable/main/binary-powerpc/apache-ssl_1.3.33-6sarge3_powerpc.deb stable/main/binary-powerpc/libapache-mod-perl_1.29.0.3-6sarge3_powerpc.deb apache (1.3.33-6sarge3) stable-security; urgency=high * Non-maintainer upload by The Security Team. * Added 910_expect_header_xss_CVE-2006-391 to fix a potential XSS issue affecting the use of the Expect header. [CVE-2006-391] * Added 911_mod_imap_xss-CVE-2005-3352 to fix a potential XSS issue when using Referer headers in mod_imap. [CVE02005-3352] stable/main/binary-mipsel/apache-ssl_1.3.33-6sarge3_mipsel.deb stable/main/binary-mipsel/apache-common_1.3.33-6sarge3_mipsel.deb stable/main/binary-mipsel/libapache-mod-perl_1.29.0.3-6sarge3_mipsel.deb stable/main/binary-mipsel/apache_1.3.33-6sarge3_mipsel.deb stable/main/binary-mipsel/apache-perl_1.3.33-6sarge3_mipsel.deb stable/main/binary-mipsel/apache-dbg_1.3.33-6sarge3_mipsel.deb apache (1.3.33-6sarge3) stable-security; urgency=high * Non-maintainer upload by The Security Team. * Added 910_expect_header_xss_CVE-2006-391 to fix a potential XSS issue affecting the use of the Expect header. [CVE-2006-391] * Added 911_mod_imap_xss-CVE-2005-3352 to fix a potential XSS issue when using Referer headers in mod_imap. [CVE02005-3352] stable/main/binary-mips/apache-ssl_1.3.33-6sarge3_mips.deb stable/main/binary-mips/apache-common_1.3.33-6sarge3_mips.deb stable/main/binary-mips/libapache-mod-perl_1.29.0.3-6sarge3_mips.deb stable/main/binary-mips/apache_1.3.33-6sarge3_mips.deb stable/main/binary-mips/apache-dbg_1.3.33-6sarge3_mips.deb stable/main/binary-mips/apache-perl_1.3.33-6sarge3_mips.deb apache (1.3.33-6sarge3) stable-security; urgency=high * Non-maintainer upload by The Security Team. * Added 910_expect_header_xss_CVE-2006-391 to fix a potential XSS issue affecting the use of the Expect header. [CVE-2006-391] * Added 911_mod_imap_xss-CVE-2005-3352 to fix a potential XSS issue when using Referer headers in mod_imap. [CVE02005-3352] stable/main/binary-m68k/apache-dbg_1.3.33-6sarge3_m68k.deb stable/main/binary-m68k/apache_1.3.33-6sarge3_m68k.deb stable/main/binary-m68k/libapache-mod-perl_1.29.0.3-6sarge3_m68k.deb stable/main/binary-m68k/apache-perl_1.3.33-6sarge3_m68k.deb stable/main/binary-m68k/apache-ssl_1.3.33-6sarge3_m68k.deb stable/main/binary-m68k/apache-common_1.3.33-6sarge3_m68k.deb apache (1.3.33-6sarge3) stable-security; urgency=high * Non-maintainer upload by The Security Team. * Added 910_expect_header_xss_CVE-2006-391 to fix a potential XSS issue affecting the use of the Expect header. [CVE-2006-391] * Added 911_mod_imap_xss-CVE-2005-3352 to fix a potential XSS issue when using Referer headers in mod_imap. [CVE02005-3352] stable/main/binary-ia64/apache-dbg_1.3.33-6sarge3_ia64.deb stable/main/binary-ia64/apache-ssl_1.3.33-6sarge3_ia64.deb stable/main/binary-ia64/apache_1.3.33-6sarge3_ia64.deb stable/main/binary-ia64/apache-common_1.3.33-6sarge3_ia64.deb stable/main/binary-ia64/libapache-mod-perl_1.29.0.3-6sarge3_ia64.deb stable/main/binary-ia64/apache-perl_1.3.33-6sarge3_ia64.deb apache (1.3.33-6sarge3) stable-security; urgency=high * Non-maintainer upload by The Security Team. * Added 910_expect_header_xss_CVE-2006-391 to fix a potential XSS issue affecting the use of the Expect header. [CVE-2006-391] * Added 911_mod_imap_xss-CVE-2005-3352 to fix a potential XSS issue when using Referer headers in mod_imap. [CVE02005-3352] stable/main/binary-hppa/apache-common_1.3.33-6sarge3_hppa.deb stable/main/binary-hppa/apache-perl_1.3.33-6sarge3_hppa.deb stable/main/binary-hppa/apache-ssl_1.3.33-6sarge3_hppa.deb stable/main/binary-hppa/apache-dbg_1.3.33-6sarge3_hppa.deb stable/main/binary-hppa/apache_1.3.33-6sarge3_hppa.deb stable/main/binary-hppa/libapache-mod-perl_1.29.0.3-6sarge3_hppa.deb apache (1.3.33-6sarge3) stable-security; urgency=high * Non-maintainer upload by The Security Team. * Added 910_expect_header_xss_CVE-2006-391 to fix a potential XSS issue affecting the use of the Expect header. [CVE-2006-391] * Added 911_mod_imap_xss-CVE-2005-3352 to fix a potential XSS issue when using Referer headers in mod_imap. [CVE02005-3352] stable/main/binary-arm/apache-perl_1.3.33-6sarge3_arm.deb stable/main/binary-arm/apache-common_1.3.33-6sarge3_arm.deb stable/main/binary-arm/libapache-mod-perl_1.29.0.3-6sarge3_arm.deb stable/main/binary-arm/apache_1.3.33-6sarge3_arm.deb stable/main/binary-arm/apache-dbg_1.3.33-6sarge3_arm.deb stable/main/binary-arm/apache-ssl_1.3.33-6sarge3_arm.deb apache (1.3.33-6sarge3) stable-security; urgency=high * Non-maintainer upload by The Security Team. * Added 910_expect_header_xss_CVE-2006-391 to fix a potential XSS issue affecting the use of the Expect header. [CVE-2006-391] * Added 911_mod_imap_xss-CVE-2005-3352 to fix a potential XSS issue when using Referer headers in mod_imap. [CVE02005-3352] stable/main/binary-alpha/apache-perl_1.3.33-6sarge3_alpha.deb stable/main/binary-alpha/apache-ssl_1.3.33-6sarge3_alpha.deb stable/main/binary-alpha/apache-common_1.3.33-6sarge3_alpha.deb stable/main/binary-alpha/apache_1.3.33-6sarge3_alpha.deb stable/main/binary-alpha/apache-dbg_1.3.33-6sarge3_alpha.deb stable/main/binary-alpha/libapache-mod-perl_1.29.0.3-6sarge3_alpha.deb apache (1.3.33-6sarge3) stable-security; urgency=high * Non-maintainer upload by The Security Team. * Added 910_expect_header_xss_CVE-2006-391 to fix a potential XSS issue affecting the use of the Expect header. [CVE-2006-391] * Added 911_mod_imap_xss-CVE-2005-3352 to fix a potential XSS issue when using Referer headers in mod_imap. [CVE02005-3352] stable/main/binary-i386/apache-perl_1.3.33-6sarge3_i386.deb stable/main/binary-i386/apache-common_1.3.33-6sarge3_i386.deb stable/main/binary-all/apache-doc_1.3.33-6sarge3_all.deb stable/main/binary-i386/apache-ssl_1.3.33-6sarge3_i386.deb stable/main/binary-i386/apache-dbg_1.3.33-6sarge3_i386.deb stable/main/binary-all/apache-utils_1.3.33-6sarge3_all.deb stable/main/source/apache_1.3.33-6sarge3.diff.gz stable/main/binary-i386/libapache-mod-perl_1.29.0.3-6sarge3_i386.deb stable/main/binary-i386/apache_1.3.33-6sarge3_i386.deb stable/main/source/apache_1.3.33-6sarge3.dsc stable/main/binary-all/apache-dev_1.3.33-6sarge3_all.deb apache (1.3.33-6sarge3) stable-security; urgency=high * Non-maintainer upload by The Security Team. * Added 910_expect_header_xss_CVE-2006-391 to fix a potential XSS issue affecting the use of the Expect header. [CVE-2006-391] * Added 911_mod_imap_xss-CVE-2005-3352 to fix a potential XSS issue when using Referer headers in mod_imap. [CVE02005-3352] stable/main/binary-sparc/alsaplayer-oss_0.99.76-0.3sarge1_sparc.deb stable/main/binary-sparc/alsaplayer-gtk_0.99.76-0.3sarge1_sparc.deb stable/main/binary-sparc/libalsaplayer-dev_0.99.76-0.3sarge1_sparc.deb stable/main/binary-sparc/libalsaplayer0_0.99.76-0.3sarge1_sparc.deb stable/main/binary-sparc/alsaplayer-common_0.99.76-0.3sarge1_sparc.deb stable/main/binary-sparc/alsaplayer-text_0.99.76-0.3sarge1_sparc.deb stable/main/binary-sparc/alsaplayer-daemon_0.99.76-0.3sarge1_sparc.deb stable/main/binary-sparc/alsaplayer-alsa_0.99.76-0.3sarge1_sparc.deb stable/main/binary-sparc/alsaplayer-nas_0.99.76-0.3sarge1_sparc.deb stable/main/binary-sparc/alsaplayer-xosd_0.99.76-0.3sarge1_sparc.deb stable/main/binary-sparc/alsaplayer-jack_0.99.76-0.3sarge1_sparc.deb stable/main/binary-sparc/alsaplayer-esd_0.99.76-0.3sarge1_sparc.deb stable/main/binary-sparc/alsaplayer_0.99.76-0.3sarge1_sparc.deb alsaplayer (0.99.76-0.3sarge1) stable-security; urgency=high * Fix some buffer overflow bugs. (CVE-2006-4089) stable/main/binary-s390/alsaplayer-nas_0.99.76-0.3sarge1_s390.deb stable/main/binary-s390/alsaplayer-alsa_0.99.76-0.3sarge1_s390.deb stable/main/binary-s390/alsaplayer-jack_0.99.76-0.3sarge1_s390.deb stable/main/binary-s390/alsaplayer-xosd_0.99.76-0.3sarge1_s390.deb stable/main/binary-s390/alsaplayer_0.99.76-0.3sarge1_s390.deb stable/main/binary-s390/alsaplayer-esd_0.99.76-0.3sarge1_s390.deb stable/main/binary-s390/alsaplayer-oss_0.99.76-0.3sarge1_s390.deb stable/main/binary-s390/libalsaplayer-dev_0.99.76-0.3sarge1_s390.deb stable/main/binary-s390/alsaplayer-text_0.99.76-0.3sarge1_s390.deb stable/main/binary-s390/libalsaplayer0_0.99.76-0.3sarge1_s390.deb stable/main/binary-s390/alsaplayer-common_0.99.76-0.3sarge1_s390.deb stable/main/binary-s390/alsaplayer-gtk_0.99.76-0.3sarge1_s390.deb stable/main/binary-s390/alsaplayer-daemon_0.99.76-0.3sarge1_s390.deb alsaplayer (0.99.76-0.3sarge1) stable-security; urgency=high * Fix some buffer overflow bugs. (CVE-2006-4089) stable/main/binary-powerpc/alsaplayer-esd_0.99.76-0.3sarge1_powerpc.deb stable/main/binary-powerpc/alsaplayer-oss_0.99.76-0.3sarge1_powerpc.deb stable/main/binary-powerpc/alsaplayer-common_0.99.76-0.3sarge1_powerpc.deb stable/main/binary-powerpc/alsaplayer-xosd_0.99.76-0.3sarge1_powerpc.deb stable/main/binary-powerpc/alsaplayer-jack_0.99.76-0.3sarge1_powerpc.deb stable/main/binary-powerpc/alsaplayer_0.99.76-0.3sarge1_powerpc.deb stable/main/binary-powerpc/alsaplayer-gtk_0.99.76-0.3sarge1_powerpc.deb stable/main/binary-powerpc/alsaplayer-nas_0.99.76-0.3sarge1_powerpc.deb stable/main/binary-powerpc/libalsaplayer0_0.99.76-0.3sarge1_powerpc.deb stable/main/binary-powerpc/alsaplayer-alsa_0.99.76-0.3sarge1_powerpc.deb stable/main/binary-powerpc/libalsaplayer-dev_0.99.76-0.3sarge1_powerpc.deb stable/main/binary-powerpc/alsaplayer-daemon_0.99.76-0.3sarge1_powerpc.deb stable/main/binary-powerpc/alsaplayer-text_0.99.76-0.3sarge1_powerpc.deb alsaplayer (0.99.76-0.3sarge1) stable-security; urgency=high * Fix some buffer overflow bugs. (CVE-2006-4089) stable/main/binary-mipsel/alsaplayer-jack_0.99.76-0.3sarge1_mipsel.deb stable/main/binary-mipsel/libalsaplayer0_0.99.76-0.3sarge1_mipsel.deb stable/main/binary-mipsel/libalsaplayer-dev_0.99.76-0.3sarge1_mipsel.deb stable/main/binary-mipsel/alsaplayer-oss_0.99.76-0.3sarge1_mipsel.deb stable/main/binary-mipsel/alsaplayer-common_0.99.76-0.3sarge1_mipsel.deb stable/main/binary-mipsel/alsaplayer-daemon_0.99.76-0.3sarge1_mipsel.deb stable/main/binary-mipsel/alsaplayer-text_0.99.76-0.3sarge1_mipsel.deb stable/main/binary-mipsel/alsaplayer_0.99.76-0.3sarge1_mipsel.deb stable/main/binary-mipsel/alsaplayer-alsa_0.99.76-0.3sarge1_mipsel.deb stable/main/binary-mipsel/alsaplayer-xosd_0.99.76-0.3sarge1_mipsel.deb stable/main/binary-mipsel/alsaplayer-esd_0.99.76-0.3sarge1_mipsel.deb stable/main/binary-mipsel/alsaplayer-nas_0.99.76-0.3sarge1_mipsel.deb stable/main/binary-mipsel/alsaplayer-gtk_0.99.76-0.3sarge1_mipsel.deb alsaplayer (0.99.76-0.3sarge1) stable-security; urgency=high * Fix some buffer overflow bugs. (CVE-2006-4089) stable/main/binary-mips/alsaplayer-text_0.99.76-0.3sarge1_mips.deb stable/main/binary-mips/alsaplayer-alsa_0.99.76-0.3sarge1_mips.deb stable/main/binary-mips/libalsaplayer-dev_0.99.76-0.3sarge1_mips.deb stable/main/binary-mips/alsaplayer-nas_0.99.76-0.3sarge1_mips.deb stable/main/binary-mips/libalsaplayer0_0.99.76-0.3sarge1_mips.deb stable/main/binary-mips/alsaplayer-common_0.99.76-0.3sarge1_mips.deb stable/main/binary-mips/alsaplayer-daemon_0.99.76-0.3sarge1_mips.deb stable/main/binary-mips/alsaplayer_0.99.76-0.3sarge1_mips.deb stable/main/binary-mips/alsaplayer-jack_0.99.76-0.3sarge1_mips.deb stable/main/binary-mips/alsaplayer-oss_0.99.76-0.3sarge1_mips.deb stable/main/binary-mips/alsaplayer-esd_0.99.76-0.3sarge1_mips.deb stable/main/binary-mips/alsaplayer-gtk_0.99.76-0.3sarge1_mips.deb stable/main/binary-mips/alsaplayer-xosd_0.99.76-0.3sarge1_mips.deb alsaplayer (0.99.76-0.3sarge1) stable-security; urgency=high * Fix some buffer overflow bugs. (CVE-2006-4089) stable/main/binary-m68k/alsaplayer-gtk_0.99.76-0.3sarge1_m68k.deb stable/main/binary-m68k/alsaplayer-common_0.99.76-0.3sarge1_m68k.deb stable/main/binary-m68k/alsaplayer-oss_0.99.76-0.3sarge1_m68k.deb stable/main/binary-m68k/alsaplayer-nas_0.99.76-0.3sarge1_m68k.deb stable/main/binary-m68k/alsaplayer-xosd_0.99.76-0.3sarge1_m68k.deb stable/main/binary-m68k/alsaplayer-text_0.99.76-0.3sarge1_m68k.deb stable/main/binary-m68k/libalsaplayer-dev_0.99.76-0.3sarge1_m68k.deb stable/main/binary-m68k/alsaplayer-alsa_0.99.76-0.3sarge1_m68k.deb stable/main/binary-m68k/alsaplayer_0.99.76-0.3sarge1_m68k.deb stable/main/binary-m68k/alsaplayer-daemon_0.99.76-0.3sarge1_m68k.deb stable/main/binary-m68k/alsaplayer-jack_0.99.76-0.3sarge1_m68k.deb stable/main/binary-m68k/libalsaplayer0_0.99.76-0.3sarge1_m68k.deb stable/main/binary-m68k/alsaplayer-esd_0.99.76-0.3sarge1_m68k.deb alsaplayer (0.99.76-0.3sarge1) stable-security; urgency=high * Fix some buffer overflow bugs. (CVE-2006-4089) stable/main/binary-ia64/alsaplayer-nas_0.99.76-0.3sarge1_ia64.deb stable/main/binary-ia64/alsaplayer_0.99.76-0.3sarge1_ia64.deb stable/main/binary-ia64/alsaplayer-text_0.99.76-0.3sarge1_ia64.deb stable/main/binary-ia64/alsaplayer-alsa_0.99.76-0.3sarge1_ia64.deb stable/main/binary-ia64/alsaplayer-xosd_0.99.76-0.3sarge1_ia64.deb stable/main/binary-ia64/alsaplayer-gtk_0.99.76-0.3sarge1_ia64.deb stable/main/binary-ia64/alsaplayer-common_0.99.76-0.3sarge1_ia64.deb stable/main/binary-ia64/alsaplayer-esd_0.99.76-0.3sarge1_ia64.deb stable/main/binary-ia64/alsaplayer-oss_0.99.76-0.3sarge1_ia64.deb stable/main/binary-ia64/alsaplayer-jack_0.99.76-0.3sarge1_ia64.deb stable/main/binary-ia64/libalsaplayer0_0.99.76-0.3sarge1_ia64.deb stable/main/binary-ia64/alsaplayer-daemon_0.99.76-0.3sarge1_ia64.deb stable/main/binary-ia64/libalsaplayer-dev_0.99.76-0.3sarge1_ia64.deb alsaplayer (0.99.76-0.3sarge1) stable-security; urgency=high * Fix some buffer overflow bugs. (CVE-2006-4089) stable/main/binary-i386/libalsaplayer0_0.99.76-0.3sarge1_i386.deb stable/main/binary-i386/alsaplayer-jack_0.99.76-0.3sarge1_i386.deb stable/main/binary-i386/libalsaplayer-dev_0.99.76-0.3sarge1_i386.deb stable/main/binary-i386/alsaplayer-daemon_0.99.76-0.3sarge1_i386.deb stable/main/binary-i386/alsaplayer-esd_0.99.76-0.3sarge1_i386.deb stable/main/binary-i386/alsaplayer-oss_0.99.76-0.3sarge1_i386.deb stable/main/binary-i386/alsaplayer-text_0.99.76-0.3sarge1_i386.deb stable/main/binary-i386/alsaplayer_0.99.76-0.3sarge1_i386.deb stable/main/binary-i386/alsaplayer-common_0.99.76-0.3sarge1_i386.deb stable/main/binary-i386/alsaplayer-xosd_0.99.76-0.3sarge1_i386.deb stable/main/binary-i386/alsaplayer-alsa_0.99.76-0.3sarge1_i386.deb stable/main/binary-i386/alsaplayer-nas_0.99.76-0.3sarge1_i386.deb stable/main/binary-i386/alsaplayer-gtk_0.99.76-0.3sarge1_i386.deb alsaplayer (0.99.76-0.3sarge1) stable-security; urgency=high * Fix some buffer overflow bugs. (CVE-2006-4089) stable/main/binary-hppa/alsaplayer-text_0.99.76-0.3sarge1_hppa.deb stable/main/binary-hppa/alsaplayer-nas_0.99.76-0.3sarge1_hppa.deb stable/main/binary-hppa/alsaplayer-gtk_0.99.76-0.3sarge1_hppa.deb stable/main/binary-hppa/alsaplayer_0.99.76-0.3sarge1_hppa.deb stable/main/binary-hppa/alsaplayer-xosd_0.99.76-0.3sarge1_hppa.deb stable/main/binary-hppa/alsaplayer-alsa_0.99.76-0.3sarge1_hppa.deb stable/main/binary-hppa/alsaplayer-oss_0.99.76-0.3sarge1_hppa.deb stable/main/binary-hppa/alsaplayer-jack_0.99.76-0.3sarge1_hppa.deb stable/main/binary-hppa/alsaplayer-esd_0.99.76-0.3sarge1_hppa.deb stable/main/binary-hppa/alsaplayer-common_0.99.76-0.3sarge1_hppa.deb stable/main/binary-hppa/libalsaplayer-dev_0.99.76-0.3sarge1_hppa.deb stable/main/binary-hppa/alsaplayer-daemon_0.99.76-0.3sarge1_hppa.deb stable/main/binary-hppa/libalsaplayer0_0.99.76-0.3sarge1_hppa.deb alsaplayer (0.99.76-0.3sarge1) stable-security; urgency=high * Fix some buffer overflow bugs. (CVE-2006-4089) stable/main/binary-alpha/alsaplayer-jack_0.99.76-0.3sarge1_alpha.deb stable/main/binary-alpha/alsaplayer-xosd_0.99.76-0.3sarge1_alpha.deb stable/main/binary-alpha/alsaplayer-nas_0.99.76-0.3sarge1_alpha.deb stable/main/binary-alpha/libalsaplayer-dev_0.99.76-0.3sarge1_alpha.deb stable/main/binary-alpha/alsaplayer-daemon_0.99.76-0.3sarge1_alpha.deb stable/main/binary-alpha/alsaplayer-alsa_0.99.76-0.3sarge1_alpha.deb stable/main/binary-alpha/alsaplayer_0.99.76-0.3sarge1_alpha.deb stable/main/binary-alpha/alsaplayer-text_0.99.76-0.3sarge1_alpha.deb stable/main/binary-alpha/alsaplayer-esd_0.99.76-0.3sarge1_alpha.deb stable/main/binary-alpha/libalsaplayer0_0.99.76-0.3sarge1_alpha.deb stable/main/binary-alpha/alsaplayer-common_0.99.76-0.3sarge1_alpha.deb stable/main/binary-alpha/alsaplayer-gtk_0.99.76-0.3sarge1_alpha.deb stable/main/binary-alpha/alsaplayer-oss_0.99.76-0.3sarge1_alpha.deb alsaplayer (0.99.76-0.3sarge1) stable-security; urgency=high * Fix some buffer overflow bugs. (CVE-2006-4089) stable/main/source/alsaplayer_0.99.76-0.3sarge1.dsc stable/main/binary-arm/alsaplayer-text_0.99.76-0.3sarge1_arm.deb stable/main/binary-arm/alsaplayer-oss_0.99.76-0.3sarge1_arm.deb stable/main/source/alsaplayer_0.99.76-0.3sarge1.diff.gz stable/main/binary-arm/libalsaplayer0_0.99.76-0.3sarge1_arm.deb stable/main/binary-arm/alsaplayer_0.99.76-0.3sarge1_arm.deb stable/main/binary-arm/alsaplayer-common_0.99.76-0.3sarge1_arm.deb stable/main/binary-arm/alsaplayer-gtk_0.99.76-0.3sarge1_arm.deb stable/main/binary-arm/alsaplayer-daemon_0.99.76-0.3sarge1_arm.deb stable/main/binary-arm/alsaplayer-esd_0.99.76-0.3sarge1_arm.deb stable/main/binary-arm/alsaplayer-jack_0.99.76-0.3sarge1_arm.deb stable/main/binary-arm/alsaplayer-alsa_0.99.76-0.3sarge1_arm.deb stable/main/binary-arm/alsaplayer-xosd_0.99.76-0.3sarge1_arm.deb stable/main/binary-arm/alsaplayer-nas_0.99.76-0.3sarge1_arm.deb stable/main/binary-arm/libalsaplayer-dev_0.99.76-0.3sarge1_arm.deb alsaplayer (0.99.76-0.3sarge1) stable-security; urgency=high * Fix some buffer overflow bugs. (CVE-2006-4089) ========================================= Thu, 31 Aug 2006 - Debian 3.1r3 released ========================================= stable/main/source/libcrypt-cbc-perl_2.12-1sarge1.diff.gz stable/main/binary-all/libcrypt-cbc-perl_2.12-1sarge1_all.deb stable/main/source/libcrypt-cbc-perl_2.12-1sarge1.dsc libcrypt-cbc-perl (2.12-1sarge1) stable-security; urgency=high * SECURITY FIX: solves weakness when using certain block algorithms stable/main/binary-sparc/zope2.7_2.7.5-2sarge2_sparc.deb zope2.7 (2.7.5-2sarge2) stable-security; urgency=high * SECURITY UPDATE: Arbitrary file inclusion. * Disable 'raw' ReST directive in included docutils to prevent reading arbitrary files through ReST documents. (Closes: #377285) - CVE-2006-3458 stable/main/binary-s390/zope2.7_2.7.5-2sarge2_s390.deb zope2.7 (2.7.5-2sarge2) stable-security; urgency=high * SECURITY UPDATE: Arbitrary file inclusion. * Disable 'raw' ReST directive in included docutils to prevent reading arbitrary files through ReST documents. (Closes: #377285) - CVE-2006-3458 stable/main/binary-powerpc/zope2.7_2.7.5-2sarge2_powerpc.deb zope2.7 (2.7.5-2sarge2) stable-security; urgency=high * SECURITY UPDATE: Arbitrary file inclusion. * Disable 'raw' ReST directive in included docutils to prevent reading arbitrary files through ReST documents. (Closes: #377285) - CVE-2006-3458 stable/main/binary-mipsel/zope2.7_2.7.5-2sarge2_mipsel.deb zope2.7 (2.7.5-2sarge2) stable-security; urgency=high * SECURITY UPDATE: Arbitrary file inclusion. * Disable 'raw' ReST directive in included docutils to prevent reading arbitrary files through ReST documents. (Closes: #377285) - CVE-2006-3458 stable/main/binary-mips/zope2.7_2.7.5-2sarge2_mips.deb zope2.7 (2.7.5-2sarge2) stable-security; urgency=high * SECURITY UPDATE: Arbitrary file inclusion. * Disable 'raw' ReST directive in included docutils to prevent reading arbitrary files through ReST documents. (Closes: #377285) - CVE-2006-3458 stable/main/binary-m68k/zope2.7_2.7.5-2sarge2_m68k.deb zope2.7 (2.7.5-2sarge2) stable-security; urgency=high * SECURITY UPDATE: Arbitrary file inclusion. * Disable 'raw' ReST directive in included docutils to prevent reading arbitrary files through ReST documents. (Closes: #377285) - CVE-2006-3458 stable/main/binary-ia64/zope2.7_2.7.5-2sarge2_ia64.deb zope2.7 (2.7.5-2sarge2) stable-security; urgency=high * SECURITY UPDATE: Arbitrary file inclusion. * Disable 'raw' ReST directive in included docutils to prevent reading arbitrary files through ReST documents. (Closes: #377285) - CVE-2006-3458 stable/main/binary-hppa/zope2.7_2.7.5-2sarge2_hppa.deb zope2.7 (2.7.5-2sarge2) stable-security; urgency=high * SECURITY UPDATE: Arbitrary file inclusion. * Disable 'raw' ReST directive in included docutils to prevent reading arbitrary files through ReST documents. (Closes: #377285) - CVE-2006-3458 stable/main/binary-arm/zope2.7_2.7.5-2sarge2_arm.deb zope2.7 (2.7.5-2sarge2) stable-security; urgency=high * SECURITY UPDATE: Arbitrary file inclusion. * Disable 'raw' ReST directive in included docutils to prevent reading arbitrary files through ReST documents. (Closes: #377285) - CVE-2006-3458 stable/main/binary-alpha/zope2.7_2.7.5-2sarge2_alpha.deb zope2.7 (2.7.5-2sarge2) stable-security; urgency=high * SECURITY UPDATE: Arbitrary file inclusion. * Disable 'raw' ReST directive in included docutils to prevent reading arbitrary files through ReST documents. (Closes: #377285) - CVE-2006-3458 stable/main/binary-i386/zope2.7_2.7.5-2sarge2_i386.deb stable/main/source/zope2.7_2.7.5-2sarge2.diff.gz stable/main/source/zope2.7_2.7.5-2sarge2.dsc zope2.7 (2.7.5-2sarge2) stable-security; urgency=high * SECURITY UPDATE: Arbitrary file inclusion. * Disable 'raw' ReST directive in included docutils to prevent reading arbitrary files through ReST documents. (Closes: #377285) - CVE-2006-3458 stable/main/source/zope-cmfplone_2.0.4-3sarge1.dsc stable/main/source/zope-cmfplone_2.0.4-3sarge1.diff.gz stable/main/binary-all/plone_2.0.4-3sarge1_all.deb stable/main/binary-all/zope-cmfplone_2.0.4-3sarge1_all.deb zope-cmfplone (2.0.4-3sarge1) stable-security; urgency=high * Applied PloneHotfix20060410; Adds security declarations to unprotected MembershipTool methods: changeMemberPortrait, deletePersonalPortrait, testCurrentPassword. stable/main/source/zgv_5.7-1.4.diff.gz stable/main/binary-i386/zgv_5.7-1.4_i386.deb stable/main/source/zgv_5.7-1.4.dsc zgv (5.7-1.4) stable-security; urgency=high * Non-maintainer upload by the Security Team * Applied patch by Russell Marks to fix segmentation faults [src/readjpeg.c, CVE-2006-1060] stable/main/binary-sparc/xzgv_0.8-3sarge1_sparc.deb xzgv (0.8-3sarge1) stable-security; urgency=high * Non-maintainer upload by the Security Team * Applied patch by Russell Marks to fix segmentation faults [src/readjpeg.c, CVE-2006-1060] stable/main/binary-s390/xzgv_0.8-3sarge1_s390.deb xzgv (0.8-3sarge1) stable-security; urgency=high * Non-maintainer upload by the Security Team * Applied patch by Russell Marks to fix segmentation faults [src/readjpeg.c, CVE-2006-1060] stable/main/binary-mipsel/xzgv_0.8-3sarge1_mipsel.deb xzgv (0.8-3sarge1) stable-security; urgency=high * Non-maintainer upload by the Security Team * Applied patch by Russell Marks to fix segmentation faults [src/readjpeg.c, CVE-2006-1060] stable/main/binary-mips/xzgv_0.8-3sarge1_mips.deb xzgv (0.8-3sarge1) stable-security; urgency=high * Non-maintainer upload by the Security Team * Applied patch by Russell Marks to fix segmentation faults [src/readjpeg.c, CVE-2006-1060] stable/main/binary-m68k/xzgv_0.8-3sarge1_m68k.deb xzgv (0.8-3sarge1) stable-security; urgency=high * Non-maintainer upload by the Security Team * Applied patch by Russell Marks to fix segmentation faults [src/readjpeg.c, CVE-2006-1060] stable/main/binary-ia64/xzgv_0.8-3sarge1_ia64.deb xzgv (0.8-3sarge1) stable-security; urgency=high * Non-maintainer upload by the Security Team * Applied patch by Russell Marks to fix segmentation faults [src/readjpeg.c, CVE-2006-1060] stable/main/binary-i386/xzgv_0.8-3sarge1_i386.deb xzgv (0.8-3sarge1) stable-security; urgency=high * Non-maintainer upload by the Security Team * Applied patch by Russell Marks to fix segmentation faults [src/readjpeg.c, CVE-2006-1060] stable/main/binary-hppa/xzgv_0.8-3sarge1_hppa.deb xzgv (0.8-3sarge1) stable-security; urgency=high * Non-maintainer upload by the Security Team * Applied patch by Russell Marks to fix segmentation faults [src/readjpeg.c, CVE-2006-1060] stable/main/binary-arm/xzgv_0.8-3sarge1_arm.deb xzgv (0.8-3sarge1) stable-security; urgency=high * Non-maintainer upload by the Security Team * Applied patch by Russell Marks to fix segmentation faults [src/readjpeg.c, CVE-2006-1060] stable/main/binary-alpha/xzgv_0.8-3sarge1_alpha.deb xzgv (0.8-3sarge1) stable-security; urgency=high * Non-maintainer upload by the Security Team * Applied patch by Russell Marks to fix segmentation faults [src/readjpeg.c, CVE-2006-1060] stable/main/source/xzgv_0.8-3sarge1.diff.gz stable/main/binary-powerpc/xzgv_0.8-3sarge1_powerpc.deb stable/main/source/xzgv_0.8-3sarge1.dsc xzgv (0.8-3sarge1) stable-security; urgency=high * Non-maintainer upload by the Security Team * Applied patch by Russell Marks to fix segmentation faults [src/readjpeg.c, CVE-2006-1060] stable/main/binary-sparc/cddb_2.6-17sarge1_sparc.deb stable/main/binary-sparc/xmcd_2.6-17sarge1_sparc.deb xmcd (2.6-17sarge1) stable-security; urgency=high * Non-maintainer upload by the Security Team * Fully implemented non-world-writeable directories [libdi_d/config.sh alias xmcdconfig, CVE-2006-2542] stable/main/binary-s390/cddb_2.6-17sarge1_s390.deb stable/main/binary-s390/xmcd_2.6-17sarge1_s390.deb xmcd (2.6-17sarge1) stable-security; urgency=high * Non-maintainer upload by the Security Team * Fully implemented non-world-writeable directories [libdi_d/config.sh alias xmcdconfig, CVE-2006-2542] stable/main/binary-mipsel/xmcd_2.6-17sarge1_mipsel.deb stable/main/binary-mipsel/cddb_2.6-17sarge1_mipsel.deb xmcd (2.6-17sarge1) stable-security; urgency=high * Non-maintainer upload by the Security Team * Fully implemented non-world-writeable directories [libdi_d/config.sh alias xmcdconfig, CVE-2006-2542] stable/main/binary-mips/xmcd_2.6-17sarge1_mips.deb stable/main/binary-mips/cddb_2.6-17sarge1_mips.deb xmcd (2.6-17sarge1) stable-security; urgency=high * Non-maintainer upload by the Security Team * Fully implemented non-world-writeable directories [libdi_d/config.sh alias xmcdconfig, CVE-2006-2542] stable/main/binary-m68k/xmcd_2.6-17sarge1_m68k.deb stable/main/binary-m68k/cddb_2.6-17sarge1_m68k.deb xmcd (2.6-17sarge1) stable-security; urgency=high * Non-maintainer upload by the Security Team * Fully implemented non-world-writeable directories [libdi_d/config.sh alias xmcdconfig, CVE-2006-2542] stable/main/binary-ia64/cddb_2.6-17sarge1_ia64.deb stable/main/binary-ia64/xmcd_2.6-17sarge1_ia64.deb xmcd (2.6-17sarge1) stable-security; urgency=high * Non-maintainer upload by the Security Team * Fully implemented non-world-writeable directories [libdi_d/config.sh alias xmcdconfig, CVE-2006-2542] stable/main/binary-i386/cddb_2.6-17sarge1_i386.deb stable/main/binary-i386/xmcd_2.6-17sarge1_i386.deb xmcd (2.6-17sarge1) stable-security; urgency=high * Non-maintainer upload by the Security Team * Fully implemented non-world-writeable directories [libdi_d/config.sh alias xmcdconfig, CVE-2006-2542] stable/main/binary-hppa/xmcd_2.6-17sarge1_hppa.deb stable/main/binary-hppa/cddb_2.6-17sarge1_hppa.deb xmcd (2.6-17sarge1) stable-security; urgency=high * Non-maintainer upload by the Security Team * Fully implemented non-world-writeable directories [libdi_d/config.sh alias xmcdconfig, CVE-2006-2542] stable/main/binary-arm/xmcd_2.6-17sarge1_arm.deb stable/main/binary-arm/cddb_2.6-17sarge1_arm.deb xmcd (2.6-17sarge1) stable-security; urgency=high * Non-maintainer upload by the Security Team * Fully implemented non-world-writeable directories [libdi_d/config.sh alias xmcdconfig, CVE-2006-2542] stable/main/binary-alpha/xmcd_2.6-17sarge1_alpha.deb stable/main/binary-alpha/cddb_2.6-17sarge1_alpha.deb xmcd (2.6-17sarge1) stable-security; urgency=high * Non-maintainer upload by the Security Team * Fully implemented non-world-writeable directories [libdi_d/config.sh alias xmcdconfig, CVE-2006-2542] stable/main/binary-powerpc/xmcd_2.6-17sarge1_powerpc.deb stable/main/binary-powerpc/cddb_2.6-17sarge1_powerpc.deb stable/main/source/xmcd_2.6-17sarge1.dsc stable/main/source/xmcd_2.6-17sarge1.diff.gz xmcd (2.6-17sarge1) stable-security; urgency=high * Non-maintainer upload by the Security Team * Fully implemented non-world-writeable directories [libdi_d/config.sh alias xmcdconfig, CVE-2006-2542] stable/main/binary-sparc/xine-ui_0.99.3-1sarge1_sparc.deb xine-ui (0.99.3-1sarge1) stable-security; urgency=high * Non-maintainer upload by the Security Team * Corrected call to report() and printf() to fix format string vulnerabilities [src/xitk/main.c, src/xitk/xine-toolkit/xitk.c, CVE-2006-2230] stable/main/binary-s390/xine-ui_0.99.3-1sarge1_s390.deb xine-ui (0.99.3-1sarge1) stable-security; urgency=high * Non-maintainer upload by the Security Team * Corrected call to report() and printf() to fix format string vulnerabilities [src/xitk/main.c, src/xitk/xine-toolkit/xitk.c, CVE-2006-2230] stable/main/binary-powerpc/xine-ui_0.99.3-1sarge1_powerpc.deb xine-ui (0.99.3-1sarge1) stable-security; urgency=high * Non-maintainer upload by the Security Team * Corrected call to report() and printf() to fix format string vulnerabilities [src/xitk/main.c, src/xitk/xine-toolkit/xitk.c, CVE-2006-2230] stable/main/binary-mipsel/xine-ui_0.99.3-1sarge1_mipsel.deb xine-ui (0.99.3-1sarge1) stable-security; urgency=high * Non-maintainer upload by the Security Team * Corrected call to report() and printf() to fix format string vulnerabilities [src/xitk/main.c, src/xitk/xine-toolkit/xitk.c, CVE-2006-2230] stable/main/binary-mips/xine-ui_0.99.3-1sarge1_mips.deb xine-ui (0.99.3-1sarge1) stable-security; urgency=high * Non-maintainer upload by the Security Team * Corrected call to report() and printf() to fix format string vulnerabilities [src/xitk/main.c, src/xitk/xine-toolkit/xitk.c, CVE-2006-2230] stable/main/binary-m68k/xine-ui_0.99.3-1sarge1_m68k.deb xine-ui (0.99.3-1sarge1) stable-security; urgency=high * Non-maintainer upload by the Security Team * Corrected call to report() and printf() to fix format string vulnerabilities [src/xitk/main.c, src/xitk/xine-toolkit/xitk.c, CVE-2006-2230] stable/main/binary-ia64/xine-ui_0.99.3-1sarge1_ia64.deb xine-ui (0.99.3-1sarge1) stable-security; urgency=high * Non-maintainer upload by the Security Team * Corrected call to report() and printf() to fix format string vulnerabilities [src/xitk/main.c, src/xitk/xine-toolkit/xitk.c, CVE-2006-2230] stable/main/binary-hppa/xine-ui_0.99.3-1sarge1_hppa.deb xine-ui (0.99.3-1sarge1) stable-security; urgency=high * Non-maintainer upload by the Security Team * Corrected call to report() and printf() to fix format string vulnerabilities [src/xitk/main.c, src/xitk/xine-toolkit/xitk.c, CVE-2006-2230] stable/main/binary-arm/xine-ui_0.99.3-1sarge1_arm.deb xine-ui (0.99.3-1sarge1) stable-security; urgency=high * Non-maintainer upload by the Security Team * Corrected call to report() and printf() to fix format string vulnerabilities [src/xitk/main.c, src/xitk/xine-toolkit/xitk.c, CVE-2006-2230] stable/main/binary-alpha/xine-ui_0.99.3-1sarge1_alpha.deb xine-ui (0.99.3-1sarge1) stable-security; urgency=high * Non-maintainer upload by the Security Team * Corrected call to report() and printf() to fix format string vulnerabilities [src/xitk/main.c, src/xitk/xine-toolkit/xitk.c, CVE-2006-2230] stable/main/binary-i386/xine-ui_0.99.3-1sarge1_i386.deb stable/main/source/xine-ui_0.99.3-1sarge1.dsc stable/main/source/xine-ui_0.99.3-1sarge1.diff.gz xine-ui (0.99.3-1sarge1) stable-security; urgency=high * Non-maintainer upload by the Security Team * Corrected call to report() and printf() to fix format string vulnerabilities [src/xitk/main.c, src/xitk/xine-toolkit/xitk.c, CVE-2006-2230] stable/main/binary-sparc/libxine-dev_1.0.1-1sarge3_sparc.deb stable/main/binary-sparc/libxine1_1.0.1-1sarge3_sparc.deb xine-lib (1.0.1-1sarge3) stable-security; urgency=high * Non-maintainer upload by the Security Team. * Applied patch by Diego Petten to fix buffer overflow in the HTTP input plugin [src/input/input_http.c, CVE-2006-2802] stable/main/binary-s390/libxine-dev_1.0.1-1sarge3_s390.deb stable/main/binary-s390/libxine1_1.0.1-1sarge3_s390.deb xine-lib (1.0.1-1sarge3) stable-security; urgency=high * Non-maintainer upload by the Security Team. * Applied patch by Diego Petten to fix buffer overflow in the HTTP input plugin [src/input/input_http.c, CVE-2006-2802] stable/main/binary-mipsel/libxine1_1.0.1-1sarge3_mipsel.deb stable/main/binary-mipsel/libxine-dev_1.0.1-1sarge3_mipsel.deb xine-lib (1.0.1-1sarge3) stable-security; urgency=high * Non-maintainer upload by the Security Team. * Applied patch by Diego Petten to fix buffer overflow in the HTTP input plugin [src/input/input_http.c, CVE-2006-2802] stable/main/binary-mips/libxine1_1.0.1-1sarge3_mips.deb stable/main/binary-mips/libxine-dev_1.0.1-1sarge3_mips.deb xine-lib (1.0.1-1sarge3) stable-security; urgency=high * Non-maintainer upload by the Security Team. * Applied patch by Diego Petten to fix buffer overflow in the HTTP input plugin [src/input/input_http.c, CVE-2006-2802] stable/main/binary-m68k/libxine-dev_1.0.1-1sarge3_m68k.deb stable/main/binary-m68k/libxine1_1.0.1-1sarge3_m68k.deb xine-lib (1.0.1-1sarge3) stable-security; urgency=high * Non-maintainer upload by the Security Team. * Applied patch by Diego Petten to fix buffer overflow in the HTTP input plugin [src/input/input_http.c, CVE-2006-2802] stable/main/binary-ia64/libxine1_1.0.1-1sarge3_ia64.deb stable/main/binary-ia64/libxine-dev_1.0.1-1sarge3_ia64.deb xine-lib (1.0.1-1sarge3) stable-security; urgency=high * Non-maintainer upload by the Security Team. * Applied patch by Diego Petten to fix buffer overflow in the HTTP input plugin [src/input/input_http.c, CVE-2006-2802] stable/main/binary-i386/libxine-dev_1.0.1-1sarge3_i386.deb stable/main/binary-i386/libxine1_1.0.1-1sarge3_i386.deb xine-lib (1.0.1-1sarge3) stable-security; urgency=high * Non-maintainer upload by the Security Team. * Applied patch by Diego Petten to fix buffer overflow in the HTTP input plugin [src/input/input_http.c, CVE-2006-2802] stable/main/binary-hppa/libxine1_1.0.1-1sarge3_hppa.deb stable/main/binary-hppa/libxine-dev_1.0.1-1sarge3_hppa.deb xine-lib (1.0.1-1sarge3) stable-security; urgency=high * Non-maintainer upload by the Security Team. * Applied patch by Diego Petten to fix buffer overflow in the HTTP input plugin [src/input/input_http.c, CVE-2006-2802] stable/main/binary-arm/libxine-dev_1.0.1-1sarge3_arm.deb stable/main/binary-arm/libxine1_1.0.1-1sarge3_arm.deb xine-lib (1.0.1-1sarge3) stable-security; urgency=high * Non-maintainer upload by the Security Team. * Applied patch by Diego Petten to fix buffer overflow in the HTTP input plugin [src/input/input_http.c, CVE-2006-2802] stable/main/binary-alpha/libxine1_1.0.1-1sarge3_alpha.deb stable/main/binary-alpha/libxine-dev_1.0.1-1sarge3_alpha.deb xine-lib (1.0.1-1sarge3) stable-security; urgency=high * Non-maintainer upload by the Security Team. * Applied patch by Diego Petten to fix buffer overflow in the HTTP input plugin [src/input/input_http.c, CVE-2006-2802] stable/main/source/xine-lib_1.0.1-1sarge3.dsc stable/main/binary-powerpc/libxine-dev_1.0.1-1sarge3_powerpc.deb stable/main/binary-powerpc/libxine1_1.0.1-1sarge3_powerpc.deb stable/main/source/xine-lib_1.0.1-1sarge3.diff.gz xine-lib (1.0.1-1sarge3) stable-security; urgency=high * Non-maintainer upload by the Security Team. * Applied patch by Diego Petten to fix buffer overflow in the HTTP input plugin [src/input/input_http.c, CVE-2006-2802] stable/main/binary-sparc/wzdftpd-mod-tcl_0.5.2-1.1sarge2_sparc.deb stable/main/binary-sparc/wzdftpd-dev_0.5.2-1.1sarge2_sparc.deb stable/main/binary-sparc/wzdftpd_0.5.2-1.1sarge2_sparc.deb stable/main/binary-sparc/wzdftpd-mod-perl_0.5.2-1.1sarge2_sparc.deb stable/main/binary-sparc/wzdftpd-back-mysql_0.5.2-1.1sarge2_sparc.deb wzdftpd (0.5.2-1.1sarge2) stable; urgency=high * Fix depends for wzdftpd-mod-perl and wzdftpd-mod-tcl (Closes: #372531, #369829) stable/main/binary-s390/wzdftpd-mod-perl_0.5.2-1.1sarge2_s390.deb stable/main/binary-s390/wzdftpd-dev_0.5.2-1.1sarge2_s390.deb stable/main/binary-s390/wzdftpd_0.5.2-1.1sarge2_s390.deb stable/main/binary-s390/wzdftpd-mod-tcl_0.5.2-1.1sarge2_s390.deb stable/main/binary-s390/wzdftpd-back-mysql_0.5.2-1.1sarge2_s390.deb wzdftpd (0.5.2-1.1sarge2) stable; urgency=high * Fix depends for wzdftpd-mod-perl and wzdftpd-mod-tcl (Closes: #372531, #369829) stable/main/binary-powerpc/wzdftpd-mod-tcl_0.5.2-1.1sarge2_powerpc.deb stable/main/binary-powerpc/wzdftpd-back-mysql_0.5.2-1.1sarge2_powerpc.deb stable/main/binary-powerpc/wzdftpd-dev_0.5.2-1.1sarge2_powerpc.deb stable/main/binary-powerpc/wzdftpd_0.5.2-1.1sarge2_powerpc.deb stable/main/binary-powerpc/wzdftpd-mod-perl_0.5.2-1.1sarge2_powerpc.deb wzdftpd (0.5.2-1.1sarge2) stable; urgency=high * Fix depends for wzdftpd-mod-perl and wzdftpd-mod-tcl (Closes: #372531, #369829) stable/main/binary-mipsel/wzdftpd_0.5.2-1.1sarge2_mipsel.deb stable/main/binary-mipsel/wzdftpd-back-mysql_0.5.2-1.1sarge2_mipsel.deb stable/main/binary-mipsel/wzdftpd-dev_0.5.2-1.1sarge2_mipsel.deb stable/main/binary-mipsel/wzdftpd-mod-perl_0.5.2-1.1sarge2_mipsel.deb stable/main/binary-mipsel/wzdftpd-mod-tcl_0.5.2-1.1sarge2_mipsel.deb wzdftpd (0.5.2-1.1sarge2) stable; urgency=high * Fix depends for wzdftpd-mod-perl and wzdftpd-mod-tcl (Closes: #372531, #369829) stable/main/binary-mips/wzdftpd_0.5.2-1.1sarge2_mips.deb stable/main/binary-mips/wzdftpd-back-mysql_0.5.2-1.1sarge2_mips.deb stable/main/binary-mips/wzdftpd-dev_0.5.2-1.1sarge2_mips.deb stable/main/binary-mips/wzdftpd-mod-tcl_0.5.2-1.1sarge2_mips.deb stable/main/binary-mips/wzdftpd-mod-perl_0.5.2-1.1sarge2_mips.deb wzdftpd (0.5.2-1.1sarge2) stable; urgency=high * Fix depends for wzdftpd-mod-perl and wzdftpd-mod-tcl (Closes: #372531, #369829) stable/main/binary-m68k/wzdftpd-back-mysql_0.5.2-1.1sarge2_m68k.deb stable/main/binary-m68k/wzdftpd-dev_0.5.2-1.1sarge2_m68k.deb stable/main/binary-m68k/wzdftpd_0.5.2-1.1sarge2_m68k.deb stable/main/binary-m68k/wzdftpd-mod-perl_0.5.2-1.1sarge2_m68k.deb stable/main/binary-m68k/wzdftpd-mod-tcl_0.5.2-1.1sarge2_m68k.deb wzdftpd (0.5.2-1.1sarge2) stable; urgency=high * Fix depends for wzdftpd-mod-perl and wzdftpd-mod-tcl (Closes: #372531, #369829) stable/main/binary-ia64/wzdftpd-back-mysql_0.5.2-1.1sarge2_ia64.deb stable/main/binary-ia64/wzdftpd_0.5.2-1.1sarge2_ia64.deb stable/main/binary-ia64/wzdftpd-dev_0.5.2-1.1sarge2_ia64.deb stable/main/binary-ia64/wzdftpd-mod-perl_0.5.2-1.1sarge2_ia64.deb stable/main/binary-ia64/wzdftpd-mod-tcl_0.5.2-1.1sarge2_ia64.deb wzdftpd (0.5.2-1.1sarge2) stable; urgency=high * Fix depends for wzdftpd-mod-perl and wzdftpd-mod-tcl (Closes: #372531, #369829) stable/main/binary-hppa/wzdftpd-mod-perl_0.5.2-1.1sarge2_hppa.deb stable/main/binary-hppa/wzdftpd-mod-tcl_0.5.2-1.1sarge2_hppa.deb stable/main/binary-hppa/wzdftpd-back-mysql_0.5.2-1.1sarge2_hppa.deb stable/main/binary-hppa/wzdftpd-dev_0.5.2-1.1sarge2_hppa.deb stable/main/binary-hppa/wzdftpd_0.5.2-1.1sarge2_hppa.deb wzdftpd (0.5.2-1.1sarge2) stable; urgency=high * Fix depends for wzdftpd-mod-perl and wzdftpd-mod-tcl (Closes: #372531, #369829) stable/main/binary-arm/wzdftpd-mod-perl_0.5.2-1.1sarge2_arm.deb stable/main/binary-arm/wzdftpd_0.5.2-1.1sarge2_arm.deb stable/main/binary-arm/wzdftpd-back-mysql_0.5.2-1.1sarge2_arm.deb stable/main/binary-arm/wzdftpd-mod-tcl_0.5.2-1.1sarge2_arm.deb stable/main/binary-arm/wzdftpd-dev_0.5.2-1.1sarge2_arm.deb wzdftpd (0.5.2-1.1sarge2) stable; urgency=high * Fix depends for wzdftpd-mod-perl and wzdftpd-mod-tcl (Closes: #372531, #369829) stable/main/binary-alpha/wzdftpd-mod-perl_0.5.2-1.1sarge2_alpha.deb stable/main/binary-alpha/wzdftpd-dev_0.5.2-1.1sarge2_alpha.deb stable/main/binary-alpha/wzdftpd-back-mysql_0.5.2-1.1sarge2_alpha.deb stable/main/binary-alpha/wzdftpd-mod-tcl_0.5.2-1.1sarge2_alpha.deb stable/main/binary-alpha/wzdftpd_0.5.2-1.1sarge2_alpha.deb wzdftpd (0.5.2-1.1sarge2) stable; urgency=high * Fix depends for wzdftpd-mod-perl and wzdftpd-mod-tcl (Closes: #372531, #369829) stable/main/binary-i386/wzdftpd-mod-perl_0.5.2-1.1sarge2_i386.deb stable/main/binary-i386/wzdftpd-mod-tcl_0.5.2-1.1sarge2_i386.deb stable/main/source/wzdftpd_0.5.2-1.1sarge2.diff.gz stable/main/binary-i386/wzdftpd-back-mysql_0.5.2-1.1sarge2_i386.deb stable/main/binary-i386/wzdftpd_0.5.2-1.1sarge2_i386.deb stable/main/binary-i386/wzdftpd-dev_0.5.2-1.1sarge2_i386.deb stable/main/source/wzdftpd_0.5.2-1.1sarge2.dsc wzdftpd (0.5.2-1.1sarge2) stable; urgency=high * Fix depends for wzdftpd-mod-perl and wzdftpd-mod-tcl (Closes: #372531, #369829) stable/main/binary-sparc/libwv2-dev_0.2.2-1sarge1_sparc.deb stable/main/binary-sparc/libwv2-1_0.2.2-1sarge1_sparc.deb wv2 (0.2.2-1sarge1) stable-security; urgency=high * Non-maintainer upload by the Security Team * Applied upstream patch to fix boundary check error [src/word_helper.h, CVE-2006-2197] stable/main/binary-s390/libwv2-1_0.2.2-1sarge1_s390.deb stable/main/binary-s390/libwv2-dev_0.2.2-1sarge1_s390.deb wv2 (0.2.2-1sarge1) stable-security; urgency=high * Non-maintainer upload by the Security Team * Applied upstream patch to fix boundary check error [src/word_helper.h, CVE-2006-2197] stable/main/binary-mipsel/libwv2-1_0.2.2-1sarge1_mipsel.deb stable/main/binary-mipsel/libwv2-dev_0.2.2-1sarge1_mipsel.deb wv2 (0.2.2-1sarge1) stable-security; urgency=high * Non-maintainer upload by the Security Team * Applied upstream patch to fix boundary check error [src/word_helper.h, CVE-2006-2197] stable/main/binary-mips/libwv2-1_0.2.2-1sarge1_mips.deb stable/main/binary-mips/libwv2-dev_0.2.2-1sarge1_mips.deb wv2 (0.2.2-1sarge1) stable-security; urgency=high * Non-maintainer upload by the Security Team * Applied upstream patch to fix boundary check error [src/word_helper.h, CVE-2006-2197] stable/main/binary-m68k/libwv2-dev_0.2.2-1sarge1_m68k.deb stable/main/binary-m68k/libwv2-1_0.2.2-1sarge1_m68k.deb wv2 (0.2.2-1sarge1) stable-security; urgency=high * Non-maintainer upload by the Security Team * Applied upstream patch to fix boundary check error [src/word_helper.h, CVE-2006-2197] stable/main/binary-ia64/libwv2-1_0.2.2-1sarge1_ia64.deb stable/main/binary-ia64/libwv2-dev_0.2.2-1sarge1_ia64.deb wv2 (0.2.2-1sarge1) stable-security; urgency=high * Non-maintainer upload by the Security Team * Applied upstream patch to fix boundary check error [src/word_helper.h, CVE-2006-2197] stable/main/binary-i386/libwv2-dev_0.2.2-1sarge1_i386.deb stable/main/binary-i386/libwv2-1_0.2.2-1sarge1_i386.deb wv2 (0.2.2-1sarge1) stable-security; urgency=high * Non-maintainer upload by the Security Team * Applied upstream patch to fix boundary check error [src/word_helper.h, CVE-2006-2197] stable/main/binary-hppa/libwv2-1_0.2.2-1sarge1_hppa.deb stable/main/binary-hppa/libwv2-dev_0.2.2-1sarge1_hppa.deb wv2 (0.2.2-1sarge1) stable-security; urgency=high * Non-maintainer upload by the Security Team * Applied upstream patch to fix boundary check error [src/word_helper.h, CVE-2006-2197] stable/main/binary-arm/libwv2-1_0.2.2-1sarge1_arm.deb stable/main/binary-arm/libwv2-dev_0.2.2-1sarge1_arm.deb wv2 (0.2.2-1sarge1) stable-security; urgency=high * Non-maintainer upload by the Security Team * Applied upstream patch to fix boundary check error [src/word_helper.h, CVE-2006-2197] stable/main/binary-alpha/libwv2-dev_0.2.2-1sarge1_alpha.deb stable/main/binary-alpha/libwv2-1_0.2.2-1sarge1_alpha.deb wv2 (0.2.2-1sarge1) stable-security; urgency=high * Non-maintainer upload by the Security Team * Applied upstream patch to fix boundary check error [src/word_helper.h, CVE-2006-2197] stable/main/source/wv2_0.2.2-1sarge1.diff.gz stable/main/binary-powerpc/libwv2-dev_0.2.2-1sarge1_powerpc.deb stable/main/binary-powerpc/libwv2-1_0.2.2-1sarge1_powerpc.deb stable/main/source/wv2_0.2.2-1sarge1.dsc wv2 (0.2.2-1sarge1) stable-security; urgency=high * Non-maintainer upload by the Security Team * Applied upstream patch to fix boundary check error [src/word_helper.h, CVE-2006-2197] stable/main/binary-all/webcalendar_0.9.45-4sarge5_all.deb stable/main/source/webcalendar_0.9.45-4sarge5.dsc stable/main/source/webcalendar_0.9.45-4sarge5.diff.gz webcalendar (0.9.45-4sarge5) stable-security; urgency=high * Non-maintainer upload by the Security Team * Backported upstream patch to fix file disclosure vulnerability if register_globals is turned on. [includes/config.php, tools/send_reminders.php, tools/convert_passwords.php, CVE-2006-2762] stable/main/binary-sparc/vlan_1.8-1sarge1_sparc.deb vlan (1.8-1sarge1) stable; urgency=medium * Fix /etc/network/if-up.d/ip to not set rp_filter to 1 when rp_filter isn't set in /etc/network/interfaces. (Closes: #330673, #378714) * Add myself to Uploaders. stable/main/binary-s390/vlan_1.8-1sarge1_s390.deb vlan (1.8-1sarge1) stable; urgency=medium * Fix /etc/network/if-up.d/ip to not set rp_filter to 1 when rp_filter isn't set in /etc/network/interfaces. (Closes: #330673, #378714) * Add myself to Uploaders. stable/main/binary-powerpc/vlan_1.8-1sarge1_powerpc.deb vlan (1.8-1sarge1) stable; urgency=medium * Fix /etc/network/if-up.d/ip to not set rp_filter to 1 when rp_filter isn't set in /etc/network/interfaces. (Closes: #330673, #378714) * Add myself to Uploaders. stable/main/binary-mipsel/vlan_1.8-1sarge1_mipsel.deb vlan (1.8-1sarge1) stable; urgency=medium * Fix /etc/network/if-up.d/ip to not set rp_filter to 1 when rp_filter isn't set in /etc/network/interfaces. (Closes: #330673, #378714) * Add myself to Uploaders. stable/main/binary-mips/vlan_1.8-1sarge1_mips.deb vlan (1.8-1sarge1) stable; urgency=medium * Fix /etc/network/if-up.d/ip to not set rp_filter to 1 when rp_filter isn't set in /etc/network/interfaces. (Closes: #330673, #378714) * Add myself to Uploaders. stable/main/binary-m68k/vlan_1.8-1sarge1_m68k.deb vlan (1.8-1sarge1) stable; urgency=medium * Fix /etc/network/if-up.d/ip to not set rp_filter to 1 when rp_filter isn't set in /etc/network/interfaces. (Closes: #330673, #378714) * Add myself to Uploaders. stable/main/binary-ia64/vlan_1.8-1sarge1_ia64.deb vlan (1.8-1sarge1) stable; urgency=medium * Fix /etc/network/if-up.d/ip to not set rp_filter to 1 when rp_filter isn't set in /etc/network/interfaces. (Closes: #330673, #378714) * Add myself to Uploaders. stable/main/binary-hppa/vlan_1.8-1sarge1_hppa.deb vlan (1.8-1sarge1) stable; urgency=medium * Fix /etc/network/if-up.d/ip to not set rp_filter to 1 when rp_filter isn't set in /etc/network/interfaces. (Closes: #330673, #378714) * Add myself to Uploaders. stable/main/binary-arm/vlan_1.8-1sarge1_arm.deb vlan (1.8-1sarge1) stable; urgency=medium * Fix /etc/network/if-up.d/ip to not set rp_filter to 1 when rp_filter isn't set in /etc/network/interfaces. (Closes: #330673, #378714) * Add myself to Uploaders. stable/main/binary-alpha/vlan_1.8-1sarge1_alpha.deb vlan (1.8-1sarge1) stable; urgency=medium * Fix /etc/network/if-up.d/ip to not set rp_filter to 1 when rp_filter isn't set in /etc/network/interfaces. (Closes: #330673, #378714) * Add myself to Uploaders. stable/main/source/vlan_1.8-1sarge1.diff.gz stable/main/source/vlan_1.8-1sarge1.dsc stable/main/binary-i386/vlan_1.8-1sarge1_i386.deb vlan (1.8-1sarge1) stable; urgency=medium * Fix /etc/network/if-up.d/ip to not set rp_filter to 1 when rp_filter isn't set in /etc/network/interfaces. (Closes: #330673, #378714) * Add myself to Uploaders. stable/main/binary-sparc/typespeed_0.4.4-8sarge1_sparc.deb typespeed (0.4.4-8sarge1) stable; urgency=high * Non-maintainer upload by The Security Team. * Fix a buffer overflow when reading data from across the network. [CVE-2006-1515] stable/main/binary-s390/typespeed_0.4.4-8sarge1_s390.deb typespeed (0.4.4-8sarge1) stable; urgency=high * Non-maintainer upload by The Security Team. * Fix a buffer overflow when reading data from across the network. [CVE-2006-1515] stable/main/binary-powerpc/typespeed_0.4.4-8sarge1_powerpc.deb typespeed (0.4.4-8sarge1) stable; urgency=high * Non-maintainer upload by The Security Team. * Fix a buffer overflow when reading data from across the network. [CVE-2006-1515] stable/main/binary-mipsel/typespeed_0.4.4-8sarge1_mipsel.deb typespeed (0.4.4-8sarge1) stable; urgency=high * Non-maintainer upload by The Security Team. * Fix a buffer overflow when reading data from across the network. [CVE-2006-1515] stable/main/binary-mips/typespeed_0.4.4-8sarge1_mips.deb typespeed (0.4.4-8sarge1) stable; urgency=high * Non-maintainer upload by The Security Team. * Fix a buffer overflow when reading data from across the network. [CVE-2006-1515] stable/main/binary-m68k/typespeed_0.4.4-8sarge1_m68k.deb typespeed (0.4.4-8sarge1) stable; urgency=high * Non-maintainer upload by The Security Team. * Fix a buffer overflow when reading data from across the network. [CVE-2006-1515] stable/main/binary-ia64/typespeed_0.4.4-8sarge1_ia64.deb typespeed (0.4.4-8sarge1) stable; urgency=high * Non-maintainer upload by The Security Team. * Fix a buffer overflow when reading data from across the network. [CVE-2006-1515] stable/main/binary-hppa/typespeed_0.4.4-8sarge1_hppa.deb typespeed (0.4.4-8sarge1) stable; urgency=high * Non-maintainer upload by The Security Team. * Fix a buffer overflow when reading data from across the network. [CVE-2006-1515] stable/main/binary-arm/typespeed_0.4.4-8sarge1_arm.deb typespeed (0.4.4-8sarge1) stable; urgency=high * Non-maintainer upload by The Security Team. * Fix a buffer overflow when reading data from across the network. [CVE-2006-1515] stable/main/binary-alpha/typespeed_0.4.4-8sarge1_alpha.deb typespeed (0.4.4-8sarge1) stable; urgency=high * Non-maintainer upload by The Security Team. * Fix a buffer overflow when reading data from across the network. [CVE-2006-1515] stable/main/source/typespeed_0.4.4-8sarge1.dsc stable/main/source/typespeed_0.4.4-8sarge1.diff.gz stable/main/binary-i386/typespeed_0.4.4-8sarge1_i386.deb typespeed (0.4.4-8sarge1) stable; urgency=high * Non-maintainer upload by The Security Team. * Fix a buffer overflow when reading data from across the network. [CVE-2006-1515] stable/main/binary-sparc/libtiff4-dev_3.7.2-7_sparc.deb stable/main/binary-sparc/libtiff4_3.7.2-7_sparc.deb stable/main/binary-sparc/libtiff-opengl_3.7.2-7_sparc.deb stable/main/binary-sparc/libtiffxx0_3.7.2-7_sparc.deb stable/main/binary-sparc/libtiff-tools_3.7.2-7_sparc.deb tiff (3.7.2-7) stable-security; urgency=high * Non-maintainer upload by the Security Team * Backported patch by Tavis Ormandy to fix several vulnerabilities [libtiff/tif_aux.c, libtiff/tif_dir.c, libtiff/tif_dirinfo.c, libtiff/tif_dirread.c, libtiff/tif_fax3.c, libtiff/tif_jpeg.c, libtiff/tif_next.c, libtiff/tif_pixarlog.c, libtiff/tif_read.c, libtiff/tiffiop.h, debian/patches/CVE-2006-3459-3465.patch] stable/main/binary-s390/libtiff-tools_3.7.2-7_s390.deb stable/main/binary-s390/libtiff-opengl_3.7.2-7_s390.deb stable/main/binary-s390/libtiffxx0_3.7.2-7_s390.deb stable/main/binary-s390/libtiff4_3.7.2-7_s390.deb stable/main/binary-s390/libtiff4-dev_3.7.2-7_s390.deb tiff (3.7.2-7) stable-security; urgency=high * Non-maintainer upload by the Security Team * Backported patch by Tavis Ormandy to fix several vulnerabilities [libtiff/tif_aux.c, libtiff/tif_dir.c, libtiff/tif_dirinfo.c, libtiff/tif_dirread.c, libtiff/tif_fax3.c, libtiff/tif_jpeg.c, libtiff/tif_next.c, libtiff/tif_pixarlog.c, libtiff/tif_read.c, libtiff/tiffiop.h, debian/patches/CVE-2006-3459-3465.patch] stable/main/binary-mipsel/libtiff-opengl_3.7.2-7_mipsel.deb stable/main/binary-mipsel/libtiff4_3.7.2-7_mipsel.deb stable/main/binary-mipsel/libtiff4-dev_3.7.2-7_mipsel.deb stable/main/binary-mipsel/libtiffxx0_3.7.2-7_mipsel.deb stable/main/binary-mipsel/libtiff-tools_3.7.2-7_mipsel.deb tiff (3.7.2-7) stable-security; urgency=high * Non-maintainer upload by the Security Team * Backported patch by Tavis Ormandy to fix several vulnerabilities [libtiff/tif_aux.c, libtiff/tif_dir.c, libtiff/tif_dirinfo.c, libtiff/tif_dirread.c, libtiff/tif_fax3.c, libtiff/tif_jpeg.c, libtiff/tif_next.c, libtiff/tif_pixarlog.c, libtiff/tif_read.c, libtiff/tiffiop.h, debian/patches/CVE-2006-3459-3465.patch] stable/main/binary-mips/libtiff-tools_3.7.2-7_mips.deb stable/main/binary-mips/libtiff4_3.7.2-7_mips.deb stable/main/binary-mips/libtiff-opengl_3.7.2-7_mips.deb stable/main/binary-mips/libtiff4-dev_3.7.2-7_mips.deb stable/main/binary-mips/libtiffxx0_3.7.2-7_mips.deb tiff (3.7.2-7) stable-security; urgency=high * Non-maintainer upload by the Security Team * Backported patch by Tavis Ormandy to fix several vulnerabilities [libtiff/tif_aux.c, libtiff/tif_dir.c, libtiff/tif_dirinfo.c, libtiff/tif_dirread.c, libtiff/tif_fax3.c, libtiff/tif_jpeg.c, libtiff/tif_next.c, libtiff/tif_pixarlog.c, libtiff/tif_read.c, libtiff/tiffiop.h, debian/patches/CVE-2006-3459-3465.patch] stable/main/binary-m68k/libtiff-opengl_3.7.2-7_m68k.deb stable/main/binary-m68k/libtiff4-dev_3.7.2-7_m68k.deb stable/main/binary-m68k/libtiff4_3.7.2-7_m68k.deb stable/main/binary-m68k/libtiff-tools_3.7.2-7_m68k.deb stable/main/binary-m68k/libtiffxx0_3.7.2-7_m68k.deb tiff (3.7.2-7) stable-security; urgency=high * Non-maintainer upload by the Security Team * Backported patch by Tavis Ormandy to fix several vulnerabilities [libtiff/tif_aux.c, libtiff/tif_dir.c, libtiff/tif_dirinfo.c, libtiff/tif_dirread.c, libtiff/tif_fax3.c, libtiff/tif_jpeg.c, libtiff/tif_next.c, libtiff/tif_pixarlog.c, libtiff/tif_read.c, libtiff/tiffiop.h, debian/patches/CVE-2006-3459-3465.patch] stable/main/binary-ia64/libtiff4_3.7.2-7_ia64.deb stable/main/binary-ia64/libtiff-tools_3.7.2-7_ia64.deb stable/main/binary-ia64/libtiff-opengl_3.7.2-7_ia64.deb stable/main/binary-ia64/libtiff4-dev_3.7.2-7_ia64.deb stable/main/binary-ia64/libtiffxx0_3.7.2-7_ia64.deb tiff (3.7.2-7) stable-security; urgency=high * Non-maintainer upload by the Security Team * Backported patch by Tavis Ormandy to fix several vulnerabilities [libtiff/tif_aux.c, libtiff/tif_dir.c, libtiff/tif_dirinfo.c, libtiff/tif_dirread.c, libtiff/tif_fax3.c, libtiff/tif_jpeg.c, libtiff/tif_next.c, libtiff/tif_pixarlog.c, libtiff/tif_read.c, libtiff/tiffiop.h, debian/patches/CVE-2006-3459-3465.patch] stable/main/binary-i386/libtiffxx0_3.7.2-7_i386.deb stable/main/binary-i386/libtiff4-dev_3.7.2-7_i386.deb stable/main/binary-i386/libtiff-opengl_3.7.2-7_i386.deb stable/main/binary-i386/libtiff4_3.7.2-7_i386.deb stable/main/binary-i386/libtiff-tools_3.7.2-7_i386.deb tiff (3.7.2-7) stable-security; urgency=high * Non-maintainer upload by the Security Team * Backported patch by Tavis Ormandy to fix several vulnerabilities [libtiff/tif_aux.c, libtiff/tif_dir.c, libtiff/tif_dirinfo.c, libtiff/tif_dirread.c, libtiff/tif_fax3.c, libtiff/tif_jpeg.c, libtiff/tif_next.c, libtiff/tif_pixarlog.c, libtiff/tif_read.c, libtiff/tiffiop.h, debian/patches/CVE-2006-3459-3465.patch] stable/main/binary-hppa/libtiff4_3.7.2-7_hppa.deb stable/main/binary-hppa/libtiff-opengl_3.7.2-7_hppa.deb stable/main/binary-hppa/libtiff4-dev_3.7.2-7_hppa.deb stable/main/binary-hppa/libtiff-tools_3.7.2-7_hppa.deb stable/main/binary-hppa/libtiffxx0_3.7.2-7_hppa.deb tiff (3.7.2-7) stable-security; urgency=high * Non-maintainer upload by the Security Team * Backported patch by Tavis Ormandy to fix several vulnerabilities [libtiff/tif_aux.c, libtiff/tif_dir.c, libtiff/tif_dirinfo.c, libtiff/tif_dirread.c, libtiff/tif_fax3.c, libtiff/tif_jpeg.c, libtiff/tif_next.c, libtiff/tif_pixarlog.c, libtiff/tif_read.c, libtiff/tiffiop.h, debian/patches/CVE-2006-3459-3465.patch] stable/main/binary-arm/libtiffxx0_3.7.2-7_arm.deb stable/main/binary-arm/libtiff4-dev_3.7.2-7_arm.deb stable/main/binary-arm/libtiff-tools_3.7.2-7_arm.deb stable/main/binary-arm/libtiff-opengl_3.7.2-7_arm.deb stable/main/binary-arm/libtiff4_3.7.2-7_arm.deb tiff (3.7.2-7) stable-security; urgency=high * Non-maintainer upload by the Security Team * Backported patch by Tavis Ormandy to fix several vulnerabilities [libtiff/tif_aux.c, libtiff/tif_dir.c, libtiff/tif_dirinfo.c, libtiff/tif_dirread.c, libtiff/tif_fax3.c, libtiff/tif_jpeg.c, libtiff/tif_next.c, libtiff/tif_pixarlog.c, libtiff/tif_read.c, libtiff/tiffiop.h, debian/patches/CVE-2006-3459-3465.patch] stable/main/binary-alpha/libtiff-tools_3.7.2-7_alpha.deb stable/main/binary-alpha/libtiffxx0_3.7.2-7_alpha.deb stable/main/binary-alpha/libtiff4_3.7.2-7_alpha.deb stable/main/binary-alpha/libtiff4-dev_3.7.2-7_alpha.deb stable/main/binary-alpha/libtiff-opengl_3.7.2-7_alpha.deb tiff (3.7.2-7) stable-security; urgency=high * Non-maintainer upload by the Security Team * Backported patch by Tavis Ormandy to fix several vulnerabilities [libtiff/tif_aux.c, libtiff/tif_dir.c, libtiff/tif_dirinfo.c, libtiff/tif_dirread.c, libtiff/tif_fax3.c, libtiff/tif_jpeg.c, libtiff/tif_next.c, libtiff/tif_pixarlog.c, libtiff/tif_read.c, libtiff/tiffiop.h, debian/patches/CVE-2006-3459-3465.patch] stable/main/binary-powerpc/libtiff-opengl_3.7.2-7_powerpc.deb stable/main/binary-powerpc/libtiff4_3.7.2-7_powerpc.deb stable/main/binary-powerpc/libtiff-tools_3.7.2-7_powerpc.deb stable/main/binary-powerpc/libtiffxx0_3.7.2-7_powerpc.deb stable/main/source/tiff_3.7.2-7.dsc stable/main/source/tiff_3.7.2-7.diff.gz stable/main/binary-powerpc/libtiff4-dev_3.7.2-7_powerpc.deb tiff (3.7.2-7) stable-security; urgency=high * Non-maintainer upload by the Security Team * Backported patch by Tavis Ormandy to fix several vulnerabilities [libtiff/tif_aux.c, libtiff/tif_dir.c, libtiff/tif_dirinfo.c, libtiff/tif_dirread.c, libtiff/tif_fax3.c, libtiff/tif_jpeg.c, libtiff/tif_next.c, libtiff/tif_pixarlog.c, libtiff/tif_read.c, libtiff/tiffiop.h, debian/patches/CVE-2006-3459-3465.patch] stable/main/binary-all/systemimager-client_3.2.3-6sarge2_all.deb stable/main/binary-all/systemimager-boot-i386-standard_3.2.3-6sarge2_all.deb stable/main/source/systemimager_3.2.3-6sarge2.tar.gz stable/main/binary-all/systemimager-boot-ia64-standard_3.2.3-6sarge2_all.deb stable/main/binary-all/systemimager-common_3.2.3-6sarge2_all.deb stable/main/source/systemimager_3.2.3-6sarge2.dsc stable/main/binary-all/systemimager-server-flamethrowerd_3.2.3-6sarge2_all.deb stable/main/binary-all/systemimager-doc_3.2.3-6sarge2_all.deb stable/main/binary-all/systemimager-server_3.2.3-6sarge2_all.deb systemimager (3.2.3-6sarge2) stable-security; urgency=high * Rebuild against kernel-source-2.6.8 (2.6.8-16sarge3): * 207_smbfs-chroot-escape.diff [SECURITY] Fix directory traversal vulnerability in smbfs that permits local users to escape chroot restrictions See CVE-2006-1864 * 208_ia64-die_if_kernel-returns.diff [SECURITY][ia64] Fix a potential local DoS on ia64 systems caused by an incorrect 'noreturn' attribute on die_if_kernel() See CVE-2006-0742 * 209_sctp-discard-unexpected-in-closed.diff [SECURITY] Fix remote DoS in SCTP code by discarding unexpected chunks received in CLOSED state instead of calling BUG() See CVE-2006-2271 * 210_ipv4-id-no-increment.diff [SECURITY] Fix vulnerability that allows remote attackers to conduct an Idle Scan attack, bypassing intended protections against such attacks See CVE-2006-1242 * 211_usb-gadget-rndis-bufoverflow.diff [SECURITY] Fix buffer overflow in the USB Gadget RNDIS implementation that allows for a remote DoS attack (kmalloc'd memory corruption) See CVE-2006-1368 * 212_ipv4-sin_zero_clear.diff [SECURITY] Fix local information leak in af_inet code See CVE-2006-1343 * 213_madvise_remove-restrict.diff [SECURITY] Fix vulnerability that allows local users to bypass IPC permissions and replace portions of read-only tmpfs files with zeroes. See CVE-2006-1524 * 214_mcast-ip-route-null-deref.diff [SECURITY] Fix local DoS vulnerability that allows local users to panic a system by requesting a route for a multicast IP See CVE-2006-1525 * 215_sctp-fragment-recurse.diff [SECURITY] Fix remote DoS vulnerability that can lead to infinite recursion when a packet containing two or more DATA fragments is received See CVE-2006-2274 * 216_sctp-fragmented-receive-fix.diff [SECURITY] Fix remote DoS vulnerability that allows IP fragmented COOKIE_ECHO and HEARTBEAT SCTP control chunks to cause a kernel panic See CVE-2006-2272 * 217_amd64-fp-reg-leak.diff [SECURITY][amd64] Fix an information leak that allows a process to see a portion of the floating point state of other processes, possibly exposing sensitive information. See CVE-2006-1056 * 218_do_add_counters-race.diff [SECURITY] Fix race condition in the do_add_counters() function in netfilter that allows local users with CAP_NET_ADMIN capabilities to read kernel memory See CVE-2006-0039 * 219_sctp-hb-ack-overflow.diff [SECURITY] Fix a remote buffer overflow that can result from a badly formatted HB-ACK chunk See CVE-2006-1857 * 220_sctp-param-bound-checks.diff [SECURITY] Fix a bound checking error (remote DoS) in the SCTP parameter checking code See CVE-2006-1858 * 221_netfilter-do_replace-overflow.diff [SECURITY] Fix buffer overflow in netfilter do_replace which can could be triggered by users with CAP_NET_ADMIN rights. See CVE-2006-0038 * 222_binfmt-bad-elf-entry-address.diff [SECURITY][amd64] Fix potential local DoS vulnerability in the binfmt_elf code on em64t processors See CVE-2006-0741 stable/main/source/squirrelmail_1.4.4-9.diff.gz stable/main/binary-all/squirrelmail_1.4.4-9_all.deb stable/main/source/squirrelmail_1.4.4-9.dsc squirrelmail (2:1.4.4-9) stable-security; urgency=high * Fix variable overwriting by logged-in user in compose.php [CVE-2006-4019] stable/main/binary-sparc/spamc_3.0.3-2sarge1_sparc.deb spamassassin (3.0.3-2sarge1) stable-security; urgency=high * Non-maintainer upload by the Security Team * Applied upstream patch to fix remote command execution vulnerability [spamd/spamd.raw, debian/patches/40_CVE-2006-2447.dpatch] stable/main/binary-s390/spamc_3.0.3-2sarge1_s390.deb spamassassin (3.0.3-2sarge1) stable-security; urgency=high * Non-maintainer upload by the Security Team * Applied upstream patch to fix remote command execution vulnerability [spamd/spamd.raw, debian/patches/40_CVE-2006-2447.dpatch] stable/main/binary-mipsel/spamc_3.0.3-2sarge1_mipsel.deb spamassassin (3.0.3-2sarge1) stable-security; urgency=high * Non-maintainer upload by the Security Team * Applied upstream patch to fix remote command execution vulnerability [spamd/spamd.raw, debian/patches/40_CVE-2006-2447.dpatch] stable/main/binary-mips/spamc_3.0.3-2sarge1_mips.deb spamassassin (3.0.3-2sarge1) stable-security; urgency=high * Non-maintainer upload by the Security Team * Applied upstream patch to fix remote command execution vulnerability [spamd/spamd.raw, debian/patches/40_CVE-2006-2447.dpatch] stable/main/binary-m68k/spamc_3.0.3-2sarge1_m68k.deb spamassassin (3.0.3-2sarge1) stable-security; urgency=high * Non-maintainer upload by the Security Team * Applied upstream patch to fix remote command execution vulnerability [spamd/spamd.raw, debian/patches/40_CVE-2006-2447.dpatch] stable/main/binary-ia64/spamc_3.0.3-2sarge1_ia64.deb spamassassin (3.0.3-2sarge1) stable-security; urgency=high * Non-maintainer upload by the Security Team * Applied upstream patch to fix remote command execution vulnerability [spamd/spamd.raw, debian/patches/40_CVE-2006-2447.dpatch] stable/main/binary-i386/spamc_3.0.3-2sarge1_i386.deb spamassassin (3.0.3-2sarge1) stable-security; urgency=high * Non-maintainer upload by the Security Team * Applied upstream patch to fix remote command execution vulnerability [spamd/spamd.raw, debian/patches/40_CVE-2006-2447.dpatch] stable/main/binary-hppa/spamc_3.0.3-2sarge1_hppa.deb spamassassin (3.0.3-2sarge1) stable-security; urgency=high * Non-maintainer upload by the Security Team * Applied upstream patch to fix remote command execution vulnerability [spamd/spamd.raw, debian/patches/40_CVE-2006-2447.dpatch] stable/main/binary-arm/spamc_3.0.3-2sarge1_arm.deb spamassassin (3.0.3-2sarge1) stable-security; urgency=high * Non-maintainer upload by the Security Team * Applied upstream patch to fix remote command execution vulnerability [spamd/spamd.raw, debian/patches/40_CVE-2006-2447.dpatch] stable/main/binary-alpha/spamc_3.0.3-2sarge1_alpha.deb spamassassin (3.0.3-2sarge1) stable-security; urgency=high * Non-maintainer upload by the Security Team * Applied upstream patch to fix remote command execution vulnerability [spamd/spamd.raw, debian/patches/40_CVE-2006-2447.dpatch] stable/main/binary-powerpc/spamc_3.0.3-2sarge1_powerpc.deb stable/main/source/spamassassin_3.0.3-2sarge1.dsc stable/main/source/spamassassin_3.0.3-2sarge1.diff.gz stable/main/binary-all/spamassassin_3.0.3-2sarge1_all.deb spamassassin (3.0.3-2sarge1) stable-security; urgency=high * Non-maintainer upload by the Security Team * Applied upstream patch to fix remote command execution vulnerability [spamd/spamd.raw, debian/patches/40_CVE-2006-2447.dpatch] stable/main/source/sitebar_3.2.6-7.1.dsc stable/main/source/sitebar_3.2.6-7.1.diff.gz stable/main/binary-all/sitebar_3.2.6-7.1_all.deb sitebar (3.2.6-7.1) stable-security; urgency=high * Non-maintainer upload for security bug fix. * Properly encode the 'command' parameter of command.php (CVE-2006-3320, Closes: #377299). stable/main/binary-sparc/passwd_4.0.3-31sarge9_sparc.deb stable/main/binary-sparc/login_4.0.3-31sarge9_sparc.deb shadow (1:4.0.3-31sarge9) stable; urgency=low * passwd.postinst: On upgrades from any prior version, chmod 600 various base-config and d-i log files that might contain sensative information, including in some cases, passwords. Thanks to Joey Hess for the patch. Closes: #356939 stable/main/binary-s390/login_4.0.3-31sarge9_s390.deb stable/main/binary-s390/passwd_4.0.3-31sarge9_s390.deb shadow (1:4.0.3-31sarge9) stable; urgency=low * passwd.postinst: On upgrades from any prior version, chmod 600 various base-config and d-i log files that might contain sensative information, including in some cases, passwords. Thanks to Joey Hess for the patch. Closes: #356939 stable/main/binary-powerpc/passwd_4.0.3-31sarge9_powerpc.deb stable/main/binary-powerpc/login_4.0.3-31sarge9_powerpc.deb shadow (1:4.0.3-31sarge9) stable; urgency=low * passwd.postinst: On upgrades from any prior version, chmod 600 various base-config and d-i log files that might contain sensative information, including in some cases, passwords. Thanks to Joey Hess for the patch. Closes: #356939 stable/main/binary-mipsel/login_4.0.3-31sarge9_mipsel.deb stable/main/binary-mipsel/passwd_4.0.3-31sarge9_mipsel.deb shadow (1:4.0.3-31sarge9) stable; urgency=low * passwd.postinst: On upgrades from any prior version, chmod 600 various base-config and d-i log files that might contain sensative information, including in some cases, passwords. Thanks to Joey Hess for the patch. Closes: #356939 stable/main/binary-mips/login_4.0.3-31sarge9_mips.deb stable/main/binary-mips/passwd_4.0.3-31sarge9_mips.deb shadow (1:4.0.3-31sarge9) stable; urgency=low * passwd.postinst: On upgrades from any prior version, chmod 600 various base-config and d-i log files that might contain sensative information, including in some cases, passwords. Thanks to Joey Hess for the patch. Closes: #356939 stable/main/binary-m68k/login_4.0.3-31sarge9_m68k.deb stable/main/binary-m68k/passwd_4.0.3-31sarge9_m68k.deb shadow (1:4.0.3-31sarge9) stable; urgency=low * passwd.postinst: On upgrades from any prior version, chmod 600 various base-config and d-i log files that might contain sensative information, including in some cases, passwords. Thanks to Joey Hess for the patch. Closes: #356939 stable/main/binary-ia64/passwd_4.0.3-31sarge9_ia64.deb stable/main/binary-ia64/login_4.0.3-31sarge9_ia64.deb shadow (1:4.0.3-31sarge9) stable; urgency=low * passwd.postinst: On upgrades from any prior version, chmod 600 various base-config and d-i log files that might contain sensative information, including in some cases, passwords. Thanks to Joey Hess for the patch. Closes: #356939 stable/main/binary-hppa/passwd_4.0.3-31sarge9_hppa.deb stable/main/binary-hppa/login_4.0.3-31sarge9_hppa.deb shadow (1:4.0.3-31sarge9) stable; urgency=low * passwd.postinst: On upgrades from any prior version, chmod 600 various base-config and d-i log files that might contain sensative information, including in some cases, passwords. Thanks to Joey Hess for the patch. Closes: #356939 stable/main/binary-arm/login_4.0.3-31sarge9_arm.deb stable/main/binary-arm/passwd_4.0.3-31sarge9_arm.deb shadow (1:4.0.3-31sarge9) stable; urgency=low * passwd.postinst: On upgrades from any prior version, chmod 600 various base-config and d-i log files that might contain sensative information, including in some cases, passwords. Thanks to Joey Hess for the patch. Closes: #356939 stable/main/binary-alpha/login_4.0.3-31sarge9_alpha.deb stable/main/binary-alpha/passwd_4.0.3-31sarge9_alpha.deb shadow (1:4.0.3-31sarge9) stable; urgency=low * passwd.postinst: On upgrades from any prior version, chmod 600 various base-config and d-i log files that might contain sensative information, including in some cases, passwords. Thanks to Joey Hess for the patch. Closes: #356939 stable/main/source/shadow_4.0.3-31sarge9.dsc stable/main/binary-i386/passwd_4.0.3-31sarge9_i386.deb stable/main/binary-i386/login_4.0.3-31sarge9_i386.deb stable/main/source/shadow_4.0.3-31sarge9.diff.gz shadow (1:4.0.3-31sarge9) stable; urgency=low * passwd.postinst: On upgrades from any prior version, chmod 600 various base-config and d-i log files that might contain sensative information, including in some cases, passwords. Thanks to Joey Hess for the patch. Closes: #356939 stable/main/binary-sparc/rmail_8.13.4-3sarge2_sparc.deb stable/main/binary-sparc/libmilter0_8.13.4-3sarge2_sparc.deb stable/main/binary-sparc/libmilter-dev_8.13.4-3sarge2_sparc.deb stable/main/binary-sparc/sendmail-bin_8.13.4-3sarge2_sparc.deb stable/main/binary-sparc/sensible-mda_8.13.4-3sarge2_sparc.deb sendmail (8.13.4-3sarge2) stable-security; urgency=high * Non-maintainer upload by the Security Team * Applied upstream patch to fix denial of service [VU#146718, Bug#380258, debian/patches/8.13/8.13.4/z_CVE-2006-1173.patch] stable/main/binary-s390/rmail_8.13.4-3sarge2_s390.deb stable/main/binary-s390/libmilter0_8.13.4-3sarge2_s390.deb stable/main/binary-s390/libmilter-dev_8.13.4-3sarge2_s390.deb stable/main/binary-s390/sensible-mda_8.13.4-3sarge2_s390.deb stable/main/binary-s390/sendmail-bin_8.13.4-3sarge2_s390.deb sendmail (8.13.4-3sarge2) stable-security; urgency=high * Non-maintainer upload by the Security Team * Applied upstream patch to fix denial of service [VU#146718, Bug#380258, debian/patches/8.13/8.13.4/z_CVE-2006-1173.patch] stable/main/binary-mipsel/libmilter0_8.13.4-3sarge2_mipsel.deb stable/main/binary-mipsel/sendmail-bin_8.13.4-3sarge2_mipsel.deb stable/main/binary-mipsel/sensible-mda_8.13.4-3sarge2_mipsel.deb stable/main/binary-mipsel/libmilter-dev_8.13.4-3sarge2_mipsel.deb stable/main/binary-mipsel/rmail_8.13.4-3sarge2_mipsel.deb sendmail (8.13.4-3sarge2) stable-security; urgency=high * Non-maintainer upload by the Security Team * Applied upstream patch to fix denial of service [VU#146718, Bug#380258, debian/patches/8.13/8.13.4/z_CVE-2006-1173.patch] stable/main/binary-mips/libmilter-dev_8.13.4-3sarge2_mips.deb stable/main/binary-mips/rmail_8.13.4-3sarge2_mips.deb stable/main/binary-mips/libmilter0_8.13.4-3sarge2_mips.deb stable/main/binary-mips/sensible-mda_8.13.4-3sarge2_mips.deb stable/main/binary-mips/sendmail-bin_8.13.4-3sarge2_mips.deb sendmail (8.13.4-3sarge2) stable-security; urgency=high * Non-maintainer upload by the Security Team * Applied upstream patch to fix denial of service [VU#146718, Bug#380258, debian/patches/8.13/8.13.4/z_CVE-2006-1173.patch] stable/main/binary-m68k/rmail_8.13.4-3sarge2_m68k.deb stable/main/binary-m68k/libmilter-dev_8.13.4-3sarge2_m68k.deb stable/main/binary-m68k/sendmail-bin_8.13.4-3sarge2_m68k.deb stable/main/binary-m68k/sensible-mda_8.13.4-3sarge2_m68k.deb stable/main/binary-m68k/libmilter0_8.13.4-3sarge2_m68k.deb sendmail (8.13.4-3sarge2) stable-security; urgency=high * Non-maintainer upload by the Security Team * Applied upstream patch to fix denial of service [VU#146718, Bug#380258, debian/patches/8.13/8.13.4/z_CVE-2006-1173.patch] stable/main/binary-ia64/libmilter-dev_8.13.4-3sarge2_ia64.deb stable/main/binary-ia64/sendmail-bin_8.13.4-3sarge2_ia64.deb stable/main/binary-ia64/sensible-mda_8.13.4-3sarge2_ia64.deb stable/main/binary-ia64/libmilter0_8.13.4-3sarge2_ia64.deb stable/main/binary-ia64/rmail_8.13.4-3sarge2_ia64.deb sendmail (8.13.4-3sarge2) stable-security; urgency=high * Non-maintainer upload by the Security Team * Applied upstream patch to fix denial of service [VU#146718, Bug#380258, debian/patches/8.13/8.13.4/z_CVE-2006-1173.patch] stable/main/binary-i386/sendmail-bin_8.13.4-3sarge2_i386.deb stable/main/binary-i386/sensible-mda_8.13.4-3sarge2_i386.deb stable/main/binary-i386/libmilter0_8.13.4-3sarge2_i386.deb stable/main/binary-i386/rmail_8.13.4-3sarge2_i386.deb stable/main/binary-i386/libmilter-dev_8.13.4-3sarge2_i386.deb sendmail (8.13.4-3sarge2) stable-security; urgency=high * Non-maintainer upload by the Security Team * Applied upstream patch to fix denial of service [VU#146718, Bug#380258, debian/patches/8.13/8.13.4/z_CVE-2006-1173.patch] stable/main/binary-hppa/libmilter0_8.13.4-3sarge2_hppa.deb stable/main/binary-hppa/libmilter-dev_8.13.4-3sarge2_hppa.deb stable/main/binary-hppa/rmail_8.13.4-3sarge2_hppa.deb stable/main/binary-hppa/sensible-mda_8.13.4-3sarge2_hppa.deb stable/main/binary-hppa/sendmail-bin_8.13.4-3sarge2_hppa.deb sendmail (8.13.4-3sarge2) stable-security; urgency=high * Non-maintainer upload by the Security Team * Applied upstream patch to fix denial of service [VU#146718, Bug#380258, debian/patches/8.13/8.13.4/z_CVE-2006-1173.patch] stable/main/binary-arm/libmilter0_8.13.4-3sarge2_arm.deb stable/main/binary-arm/sendmail-bin_8.13.4-3sarge2_arm.deb stable/main/binary-arm/rmail_8.13.4-3sarge2_arm.deb stable/main/binary-arm/sensible-mda_8.13.4-3sarge2_arm.deb stable/main/binary-arm/libmilter-dev_8.13.4-3sarge2_arm.deb sendmail (8.13.4-3sarge2) stable-security; urgency=high * Non-maintainer upload by the Security Team * Applied upstream patch to fix denial of service [VU#146718, Bug#380258, debian/patches/8.13/8.13.4/z_CVE-2006-1173.patch] stable/main/binary-alpha/rmail_8.13.4-3sarge2_alpha.deb stable/main/binary-alpha/libmilter-dev_8.13.4-3sarge2_alpha.deb stable/main/binary-alpha/libmilter0_8.13.4-3sarge2_alpha.deb stable/main/binary-alpha/sendmail-bin_8.13.4-3sarge2_alpha.deb stable/main/binary-alpha/sensible-mda_8.13.4-3sarge2_alpha.deb sendmail (8.13.4-3sarge2) stable-security; urgency=high * Non-maintainer upload by the Security Team * Applied upstream patch to fix denial of service [VU#146718, Bug#380258, debian/patches/8.13/8.13.4/z_CVE-2006-1173.patch] stable/main/source/sendmail_8.13.4-3sarge2.diff.gz stable/main/source/sendmail_8.13.4-3sarge2.dsc stable/main/binary-powerpc/libmilter-dev_8.13.4-3sarge2_powerpc.deb stable/main/binary-powerpc/sensible-mda_8.13.4-3sarge2_powerpc.deb stable/main/binary-all/sendmail-doc_8.13.4-3sarge2_all.deb stable/main/binary-all/sendmail_8.13.4-3sarge2_all.deb stable/main/binary-all/sendmail-cf_8.13.4-3sarge2_all.deb stable/main/binary-powerpc/libmilter0_8.13.4-3sarge2_powerpc.deb stable/main/binary-powerpc/sendmail-bin_8.13.4-3sarge2_powerpc.deb stable/main/binary-powerpc/rmail_8.13.4-3sarge2_powerpc.deb stable/main/binary-all/sendmail-base_8.13.4-3sarge2_all.deb sendmail (8.13.4-3sarge2) stable-security; urgency=high * Non-maintainer upload by the Security Team * Applied upstream patch to fix denial of service [VU#146718, Bug#380258, debian/patches/8.13/8.13.4/z_CVE-2006-1173.patch] stable/main/binary-sparc/winbind_3.0.14a-3sarge2_sparc.deb stable/main/binary-sparc/libsmbclient_3.0.14a-3sarge2_sparc.deb stable/main/binary-sparc/smbfs_3.0.14a-3sarge2_sparc.deb stable/main/binary-sparc/swat_3.0.14a-3sarge2_sparc.deb stable/main/binary-sparc/samba_3.0.14a-3sarge2_sparc.deb stable/main/binary-sparc/samba-common_3.0.14a-3sarge2_sparc.deb stable/main/binary-sparc/samba-dbg_3.0.14a-3sarge2_sparc.deb stable/main/binary-sparc/libsmbclient-dev_3.0.14a-3sarge2_sparc.deb stable/main/binary-sparc/libpam-smbpass_3.0.14a-3sarge2_sparc.deb stable/main/binary-sparc/python2.3-samba_3.0.14a-3sarge2_sparc.deb stable/main/binary-sparc/smbclient_3.0.14a-3sarge2_sparc.deb samba (3.0.14a-3sarge2) stable-security; urgency=high * Non-maintainer upload by the Security Team: Fix anonymous memory exhaustion DoS. [CVE-2006-3403] stable/main/binary-s390/samba-dbg_3.0.14a-3sarge2_s390.deb stable/main/binary-s390/smbfs_3.0.14a-3sarge2_s390.deb stable/main/binary-s390/libpam-smbpass_3.0.14a-3sarge2_s390.deb stable/main/binary-s390/libsmbclient_3.0.14a-3sarge2_s390.deb stable/main/binary-s390/python2.3-samba_3.0.14a-3sarge2_s390.deb stable/main/binary-s390/smbclient_3.0.14a-3sarge2_s390.deb stable/main/binary-s390/libsmbclient-dev_3.0.14a-3sarge2_s390.deb stable/main/binary-s390/winbind_3.0.14a-3sarge2_s390.deb stable/main/binary-s390/swat_3.0.14a-3sarge2_s390.deb stable/main/binary-s390/samba-common_3.0.14a-3sarge2_s390.deb stable/main/binary-s390/samba_3.0.14a-3sarge2_s390.deb samba (3.0.14a-3sarge2) stable-security; urgency=high * Non-maintainer upload by the Security Team: Fix anonymous memory exhaustion DoS. [CVE-2006-3403] stable/main/binary-powerpc/swat_3.0.14a-3sarge2_powerpc.deb stable/main/binary-powerpc/smbclient_3.0.14a-3sarge2_powerpc.deb stable/main/binary-powerpc/samba_3.0.14a-3sarge2_powerpc.deb stable/main/binary-powerpc/libpam-smbpass_3.0.14a-3sarge2_powerpc.deb stable/main/binary-powerpc/python2.3-samba_3.0.14a-3sarge2_powerpc.deb stable/main/binary-powerpc/libsmbclient_3.0.14a-3sarge2_powerpc.deb stable/main/binary-powerpc/samba-dbg_3.0.14a-3sarge2_powerpc.deb stable/main/binary-powerpc/libsmbclient-dev_3.0.14a-3sarge2_powerpc.deb stable/main/binary-powerpc/winbind_3.0.14a-3sarge2_powerpc.deb stable/main/binary-powerpc/samba-common_3.0.14a-3sarge2_powerpc.deb stable/main/binary-powerpc/smbfs_3.0.14a-3sarge2_powerpc.deb samba (3.0.14a-3sarge2) stable-security; urgency=high * Non-maintainer upload by the Security Team: Fix anonymous memory exhaustion DoS. [CVE-2006-3403] stable/main/binary-mipsel/samba-dbg_3.0.14a-3sarge2_mipsel.deb stable/main/binary-mipsel/libsmbclient-dev_3.0.14a-3sarge2_mipsel.deb stable/main/binary-mipsel/libsmbclient_3.0.14a-3sarge2_mipsel.deb stable/main/binary-mipsel/samba_3.0.14a-3sarge2_mipsel.deb stable/main/binary-mipsel/swat_3.0.14a-3sarge2_mipsel.deb stable/main/binary-mipsel/smbfs_3.0.14a-3sarge2_mipsel.deb stable/main/binary-mipsel/libpam-smbpass_3.0.14a-3sarge2_mipsel.deb stable/main/binary-mipsel/python2.3-samba_3.0.14a-3sarge2_mipsel.deb stable/main/binary-mipsel/samba-common_3.0.14a-3sarge2_mipsel.deb stable/main/binary-mipsel/smbclient_3.0.14a-3sarge2_mipsel.deb stable/main/binary-mipsel/winbind_3.0.14a-3sarge2_mipsel.deb samba (3.0.14a-3sarge2) stable-security; urgency=high * Non-maintainer upload by the Security Team: Fix anonymous memory exhaustion DoS. [CVE-2006-3403] stable/main/binary-mips/samba-dbg_3.0.14a-3sarge2_mips.deb stable/main/binary-mips/libsmbclient-dev_3.0.14a-3sarge2_mips.deb stable/main/binary-mips/libpam-smbpass_3.0.14a-3sarge2_mips.deb stable/main/binary-mips/smbfs_3.0.14a-3sarge2_mips.deb stable/main/binary-mips/swat_3.0.14a-3sarge2_mips.deb stable/main/binary-mips/samba-common_3.0.14a-3sarge2_mips.deb stable/main/binary-mips/samba_3.0.14a-3sarge2_mips.deb stable/main/binary-mips/winbind_3.0.14a-3sarge2_mips.deb stable/main/binary-mips/python2.3-samba_3.0.14a-3sarge2_mips.deb stable/main/binary-mips/smbclient_3.0.14a-3sarge2_mips.deb stable/main/binary-mips/libsmbclient_3.0.14a-3sarge2_mips.deb samba (3.0.14a-3sarge2) stable-security; urgency=high * Non-maintainer upload by the Security Team: Fix anonymous memory exhaustion DoS. [CVE-2006-3403] stable/main/binary-m68k/smbfs_3.0.14a-3sarge2_m68k.deb stable/main/binary-m68k/libsmbclient_3.0.14a-3sarge2_m68k.deb stable/main/binary-m68k/libpam-smbpass_3.0.14a-3sarge2_m68k.deb stable/main/binary-m68k/swat_3.0.14a-3sarge2_m68k.deb stable/main/binary-m68k/smbclient_3.0.14a-3sarge2_m68k.deb stable/main/binary-m68k/libsmbclient-dev_3.0.14a-3sarge2_m68k.deb stable/main/binary-m68k/python2.3-samba_3.0.14a-3sarge2_m68k.deb stable/main/binary-m68k/samba-common_3.0.14a-3sarge2_m68k.deb stable/main/binary-m68k/samba_3.0.14a-3sarge2_m68k.deb stable/main/binary-m68k/samba-dbg_3.0.14a-3sarge2_m68k.deb stable/main/binary-m68k/winbind_3.0.14a-3sarge2_m68k.deb samba (3.0.14a-3sarge2) stable-security; urgency=high * Non-maintainer upload by the Security Team: Fix anonymous memory exhaustion DoS. [CVE-2006-3403] stable/main/binary-ia64/libsmbclient-dev_3.0.14a-3sarge2_ia64.deb stable/main/binary-ia64/samba-common_3.0.14a-3sarge2_ia64.deb stable/main/binary-ia64/libpam-smbpass_3.0.14a-3sarge2_ia64.deb stable/main/binary-ia64/winbind_3.0.14a-3sarge2_ia64.deb stable/main/binary-ia64/smbclient_3.0.14a-3sarge2_ia64.deb stable/main/binary-ia64/python2.3-samba_3.0.14a-3sarge2_ia64.deb stable/main/binary-ia64/samba-dbg_3.0.14a-3sarge2_ia64.deb stable/main/binary-ia64/swat_3.0.14a-3sarge2_ia64.deb stable/main/binary-ia64/smbfs_3.0.14a-3sarge2_ia64.deb stable/main/binary-ia64/libsmbclient_3.0.14a-3sarge2_ia64.deb stable/main/binary-ia64/samba_3.0.14a-3sarge2_ia64.deb samba (3.0.14a-3sarge2) stable-security; urgency=high * Non-maintainer upload by the Security Team: Fix anonymous memory exhaustion DoS. [CVE-2006-3403] stable/main/binary-hppa/swat_3.0.14a-3sarge2_hppa.deb stable/main/binary-hppa/libsmbclient_3.0.14a-3sarge2_hppa.deb stable/main/binary-hppa/libpam-smbpass_3.0.14a-3sarge2_hppa.deb stable/main/binary-hppa/libsmbclient-dev_3.0.14a-3sarge2_hppa.deb stable/main/binary-hppa/winbind_3.0.14a-3sarge2_hppa.deb stable/main/binary-hppa/smbclient_3.0.14a-3sarge2_hppa.deb stable/main/binary-hppa/samba-common_3.0.14a-3sarge2_hppa.deb stable/main/binary-hppa/python2.3-samba_3.0.14a-3sarge2_hppa.deb stable/main/binary-hppa/samba-dbg_3.0.14a-3sarge2_hppa.deb stable/main/binary-hppa/smbfs_3.0.14a-3sarge2_hppa.deb stable/main/binary-hppa/samba_3.0.14a-3sarge2_hppa.deb samba (3.0.14a-3sarge2) stable-security; urgency=high * Non-maintainer upload by the Security Team: Fix anonymous memory exhaustion DoS. [CVE-2006-3403] stable/main/binary-arm/libsmbclient-dev_3.0.14a-3sarge2_arm.deb stable/main/binary-arm/samba-dbg_3.0.14a-3sarge2_arm.deb stable/main/binary-arm/smbclient_3.0.14a-3sarge2_arm.deb stable/main/binary-arm/libsmbclient_3.0.14a-3sarge2_arm.deb stable/main/binary-arm/swat_3.0.14a-3sarge2_arm.deb stable/main/binary-arm/libpam-smbpass_3.0.14a-3sarge2_arm.deb stable/main/binary-arm/smbfs_3.0.14a-3sarge2_arm.deb stable/main/binary-arm/samba_3.0.14a-3sarge2_arm.deb stable/main/binary-arm/samba-common_3.0.14a-3sarge2_arm.deb stable/main/binary-arm/python2.3-samba_3.0.14a-3sarge2_arm.deb stable/main/binary-arm/winbind_3.0.14a-3sarge2_arm.deb samba (3.0.14a-3sarge2) stable-security; urgency=high * Non-maintainer upload by the Security Team: Fix anonymous memory exhaustion DoS. [CVE-2006-3403] stable/main/binary-alpha/libsmbclient-dev_3.0.14a-3sarge2_alpha.deb stable/main/binary-alpha/swat_3.0.14a-3sarge2_alpha.deb stable/main/binary-alpha/samba-dbg_3.0.14a-3sarge2_alpha.deb stable/main/binary-alpha/samba_3.0.14a-3sarge2_alpha.deb stable/main/binary-alpha/smbfs_3.0.14a-3sarge2_alpha.deb stable/main/binary-alpha/python2.3-samba_3.0.14a-3sarge2_alpha.deb stable/main/binary-alpha/libsmbclient_3.0.14a-3sarge2_alpha.deb stable/main/binary-alpha/smbclient_3.0.14a-3sarge2_alpha.deb stable/main/binary-alpha/libpam-smbpass_3.0.14a-3sarge2_alpha.deb stable/main/binary-alpha/winbind_3.0.14a-3sarge2_alpha.deb stable/main/binary-alpha/samba-common_3.0.14a-3sarge2_alpha.deb samba (3.0.14a-3sarge2) stable-security; urgency=high * Non-maintainer upload by the Security Team: Fix anonymous memory exhaustion DoS. [CVE-2006-3403] stable/main/binary-i386/winbind_3.0.14a-3sarge2_i386.deb stable/main/binary-i386/samba_3.0.14a-3sarge2_i386.deb stable/main/binary-i386/samba-dbg_3.0.14a-3sarge2_i386.deb stable/main/binary-i386/swat_3.0.14a-3sarge2_i386.deb stable/main/binary-i386/python2.3-samba_3.0.14a-3sarge2_i386.deb stable/main/binary-i386/samba-common_3.0.14a-3sarge2_i386.deb stable/main/binary-all/samba-doc_3.0.14a-3sarge2_all.deb stable/main/source/samba_3.0.14a-3sarge2.diff.gz stable/main/binary-i386/smbclient_3.0.14a-3sarge2_i386.deb stable/main/binary-i386/libpam-smbpass_3.0.14a-3sarge2_i386.deb stable/main/binary-i386/libsmbclient-dev_3.0.14a-3sarge2_i386.deb stable/main/binary-i386/smbfs_3.0.14a-3sarge2_i386.deb stable/main/binary-i386/libsmbclient_3.0.14a-3sarge2_i386.deb stable/main/source/samba_3.0.14a-3sarge2.dsc samba (3.0.14a-3sarge2) stable-security; urgency=high * Non-maintainer upload by the Security Team: Fix anonymous memory exhaustion DoS. [CVE-2006-3403] stable/main/binary-sparc/libsyslog-ruby1.6_1.6.8-12sarge2_sparc.deb stable/main/binary-sparc/libruby1.6_1.6.8-12sarge2_sparc.deb stable/main/binary-sparc/libtcltk-ruby1.6_1.6.8-12sarge2_sparc.deb stable/main/binary-sparc/libreadline-ruby1.6_1.6.8-12sarge2_sparc.deb stable/main/binary-sparc/libruby1.6-dbg_1.6.8-12sarge2_sparc.deb stable/main/binary-sparc/libdbm-ruby1.6_1.6.8-12sarge2_sparc.deb stable/main/binary-sparc/libgdbm-ruby1.6_1.6.8-12sarge2_sparc.deb stable/main/binary-sparc/ruby1.6-dev_1.6.8-12sarge2_sparc.deb stable/main/binary-sparc/ruby1.6_1.6.8-12sarge2_sparc.deb stable/main/binary-sparc/libtk-ruby1.6_1.6.8-12sarge2_sparc.deb stable/main/binary-sparc/libsdbm-ruby1.6_1.6.8-12sarge2_sparc.deb stable/main/binary-sparc/libpty-ruby1.6_1.6.8-12sarge2_sparc.deb stable/main/binary-sparc/libcurses-ruby1.6_1.6.8-12sarge2_sparc.deb ruby1.6 (1.6.8-12sarge2) stable-security; urgency=high * akira yamada <akira@debian.org> - added debian/patches/815-83768862.patch and debian/patches/816-13947696.patch from Kobayashi Noritada (see: #378029): - JVN#83768862: Alias features cannot handle safe levels correclty, so it can be safety bypass. - JVN#13947696: Some methods have defects that they can call other methods, which really should be prohibited, in safe level 4. (Both issues are tracked as CVE-2006-3694) stable/main/binary-s390/libdbm-ruby1.6_1.6.8-12sarge2_s390.deb stable/main/binary-s390/ruby1.6_1.6.8-12sarge2_s390.deb stable/main/binary-s390/libsdbm-ruby1.6_1.6.8-12sarge2_s390.deb stable/main/binary-s390/libreadline-ruby1.6_1.6.8-12sarge2_s390.deb stable/main/binary-s390/libpty-ruby1.6_1.6.8-12sarge2_s390.deb stable/main/binary-s390/libtcltk-ruby1.6_1.6.8-12sarge2_s390.deb stable/main/binary-s390/libruby1.6_1.6.8-12sarge2_s390.deb stable/main/binary-s390/libcurses-ruby1.6_1.6.8-12sarge2_s390.deb stable/main/binary-s390/libtk-ruby1.6_1.6.8-12sarge2_s390.deb stable/main/binary-s390/libruby1.6-dbg_1.6.8-12sarge2_s390.deb stable/main/binary-s390/libsyslog-ruby1.6_1.6.8-12sarge2_s390.deb stable/main/binary-s390/ruby1.6-dev_1.6.8-12sarge2_s390.deb stable/main/binary-s390/libgdbm-ruby1.6_1.6.8-12sarge2_s390.deb ruby1.6 (1.6.8-12sarge2) stable-security; urgency=high * akira yamada <akira@debian.org> - added debian/patches/815-83768862.patch and debian/patches/816-13947696.patch from Kobayashi Noritada (see: #378029): - JVN#83768862: Alias features cannot handle safe levels correclty, so it can be safety bypass. - JVN#13947696: Some methods have defects that they can call other methods, which really should be prohibited, in safe level 4. (Both issues are tracked as CVE-2006-3694) stable/main/binary-powerpc/libtcltk-ruby1.6_1.6.8-12sarge2_powerpc.deb stable/main/binary-powerpc/libreadline-ruby1.6_1.6.8-12sarge2_powerpc.deb stable/main/binary-powerpc/libsdbm-ruby1.6_1.6.8-12sarge2_powerpc.deb stable/main/binary-powerpc/libpty-ruby1.6_1.6.8-12sarge2_powerpc.deb stable/main/binary-powerpc/ruby1.6_1.6.8-12sarge2_powerpc.deb stable/main/binary-powerpc/libtk-ruby1.6_1.6.8-12sarge2_powerpc.deb stable/main/binary-powerpc/libcurses-ruby1.6_1.6.8-12sarge2_powerpc.deb stable/main/binary-powerpc/libsyslog-ruby1.6_1.6.8-12sarge2_powerpc.deb stable/main/binary-powerpc/libgdbm-ruby1.6_1.6.8-12sarge2_powerpc.deb stable/main/binary-powerpc/libruby1.6_1.6.8-12sarge2_powerpc.deb stable/main/binary-powerpc/ruby1.6-dev_1.6.8-12sarge2_powerpc.deb stable/main/binary-powerpc/libruby1.6-dbg_1.6.8-12sarge2_powerpc.deb stable/main/binary-powerpc/libdbm-ruby1.6_1.6.8-12sarge2_powerpc.deb ruby1.6 (1.6.8-12sarge2) stable-security; urgency=high * akira yamada <akira@debian.org> - added debian/patches/815-83768862.patch and debian/patches/816-13947696.patch from Kobayashi Noritada (see: #378029): - JVN#83768862: Alias features cannot handle safe levels correclty, so it can be safety bypass. - JVN#13947696: Some methods have defects that they can call other methods, which really should be prohibited, in safe level 4. (Both issues are tracked as CVE-2006-3694) stable/main/binary-mipsel/ruby1.6_1.6.8-12sarge2_mipsel.deb stable/main/binary-mipsel/libruby1.6-dbg_1.6.8-12sarge2_mipsel.deb stable/main/binary-mipsel/libpty-ruby1.6_1.6.8-12sarge2_mipsel.deb stable/main/binary-mipsel/libsdbm-ruby1.6_1.6.8-12sarge2_mipsel.deb stable/main/binary-mipsel/libgdbm-ruby1.6_1.6.8-12sarge2_mipsel.deb stable/main/binary-mipsel/libtcltk-ruby1.6_1.6.8-12sarge2_mipsel.deb stable/main/binary-mipsel/ruby1.6-dev_1.6.8-12sarge2_mipsel.deb stable/main/binary-mipsel/libreadline-ruby1.6_1.6.8-12sarge2_mipsel.deb stable/main/binary-mipsel/libdbm-ruby1.6_1.6.8-12sarge2_mipsel.deb stable/main/binary-mipsel/libtk-ruby1.6_1.6.8-12sarge2_mipsel.deb stable/main/binary-mipsel/libcurses-ruby1.6_1.6.8-12sarge2_mipsel.deb stable/main/binary-mipsel/libruby1.6_1.6.8-12sarge2_mipsel.deb stable/main/binary-mipsel/libsyslog-ruby1.6_1.6.8-12sarge2_mipsel.deb ruby1.6 (1.6.8-12sarge2) stable-security; urgency=high * akira yamada <akira@debian.org> - added debian/patches/815-83768862.patch and debian/patches/816-13947696.patch from Kobayashi Noritada (see: #378029): - JVN#83768862: Alias features cannot handle safe levels correclty, so it can be safety bypass. - JVN#13947696: Some methods have defects that they can call other methods, which really should be prohibited, in safe level 4. (Both issues are tracked as CVE-2006-3694) stable/main/binary-mips/libruby1.6-dbg_1.6.8-12sarge2_mips.deb stable/main/binary-mips/ruby1.6-dev_1.6.8-12sarge2_mips.deb stable/main/binary-mips/libreadline-ruby1.6_1.6.8-12sarge2_mips.deb stable/main/binary-mips/ruby1.6_1.6.8-12sarge2_mips.deb stable/main/binary-mips/libtcltk-ruby1.6_1.6.8-12sarge2_mips.deb stable/main/binary-mips/libgdbm-ruby1.6_1.6.8-12sarge2_mips.deb stable/main/binary-mips/libtk-ruby1.6_1.6.8-12sarge2_mips.deb stable/main/binary-mips/libcurses-ruby1.6_1.6.8-12sarge2_mips.deb stable/main/binary-mips/libsdbm-ruby1.6_1.6.8-12sarge2_mips.deb stable/main/binary-mips/libsyslog-ruby1.6_1.6.8-12sarge2_mips.deb stable/main/binary-mips/libdbm-ruby1.6_1.6.8-12sarge2_mips.deb stable/main/binary-mips/libpty-ruby1.6_1.6.8-12sarge2_mips.deb stable/main/binary-mips/libruby1.6_1.6.8-12sarge2_mips.deb ruby1.6 (1.6.8-12sarge2) stable-security; urgency=high * akira yamada <akira@debian.org> - added debian/patches/815-83768862.patch and debian/patches/816-13947696.patch from Kobayashi Noritada (see: #378029): - JVN#83768862: Alias features cannot handle safe levels correclty, so it can be safety bypass. - JVN#13947696: Some methods have defects that they can call other methods, which really should be prohibited, in safe level 4. (Both issues are tracked as CVE-2006-3694) stable/main/binary-m68k/libsyslog-ruby1.6_1.6.8-12sarge2_m68k.deb stable/main/binary-m68k/libreadline-ruby1.6_1.6.8-12sarge2_m68k.deb stable/main/binary-m68k/libpty-ruby1.6_1.6.8-12sarge2_m68k.deb stable/main/binary-m68k/libtcltk-ruby1.6_1.6.8-12sarge2_m68k.deb stable/main/binary-m68k/libsdbm-ruby1.6_1.6.8-12sarge2_m68k.deb stable/main/binary-m68k/libcurses-ruby1.6_1.6.8-12sarge2_m68k.deb stable/main/binary-m68k/libdbm-ruby1.6_1.6.8-12sarge2_m68k.deb stable/main/binary-m68k/libtk-ruby1.6_1.6.8-12sarge2_m68k.deb stable/main/binary-m68k/ruby1.6_1.6.8-12sarge2_m68k.deb stable/main/binary-m68k/ruby1.6-dev_1.6.8-12sarge2_m68k.deb stable/main/binary-m68k/libruby1.6-dbg_1.6.8-12sarge2_m68k.deb stable/main/binary-m68k/libruby1.6_1.6.8-12sarge2_m68k.deb stable/main/binary-m68k/libgdbm-ruby1.6_1.6.8-12sarge2_m68k.deb ruby1.6 (1.6.8-12sarge2) stable-security; urgency=high * akira yamada <akira@debian.org> - added debian/patches/815-83768862.patch and debian/patches/816-13947696.patch from Kobayashi Noritada (see: #378029): - JVN#83768862: Alias features cannot handle safe levels correclty, so it can be safety bypass. - JVN#13947696: Some methods have defects that they can call other methods, which really should be prohibited, in safe level 4. (Both issues are tracked as CVE-2006-3694) stable/main/binary-ia64/libdbm-ruby1.6_1.6.8-12sarge2_ia64.deb stable/main/binary-ia64/libtk-ruby1.6_1.6.8-12sarge2_ia64.deb stable/main/binary-ia64/ruby1.6_1.6.8-12sarge2_ia64.deb stable/main/binary-ia64/libreadline-ruby1.6_1.6.8-12sarge2_ia64.deb stable/main/binary-ia64/ruby1.6-dev_1.6.8-12sarge2_ia64.deb stable/main/binary-ia64/libsyslog-ruby1.6_1.6.8-12sarge2_ia64.deb stable/main/binary-ia64/libsdbm-ruby1.6_1.6.8-12sarge2_ia64.deb stable/main/binary-ia64/libruby1.6_1.6.8-12sarge2_ia64.deb stable/main/binary-ia64/libruby1.6-dbg_1.6.8-12sarge2_ia64.deb stable/main/binary-ia64/libcurses-ruby1.6_1.6.8-12sarge2_ia64.deb stable/main/binary-ia64/libpty-ruby1.6_1.6.8-12sarge2_ia64.deb stable/main/binary-ia64/libgdbm-ruby1.6_1.6.8-12sarge2_ia64.deb stable/main/binary-ia64/libtcltk-ruby1.6_1.6.8-12sarge2_ia64.deb ruby1.6 (1.6.8-12sarge2) stable-security; urgency=high * akira yamada <akira@debian.org> - added debian/patches/815-83768862.patch and debian/patches/816-13947696.patch from Kobayashi Noritada (see: #378029): - JVN#83768862: Alias features cannot handle safe levels correclty, so it can be safety bypass. - JVN#13947696: Some methods have defects that they can call other methods, which really should be prohibited, in safe level 4. (Both issues are tracked as CVE-2006-3694) stable/main/binary-hppa/libsyslog-ruby1.6_1.6.8-12sarge2_hppa.deb stable/main/binary-hppa/libcurses-ruby1.6_1.6.8-12sarge2_hppa.deb stable/main/binary-hppa/libpty-ruby1.6_1.6.8-12sarge2_hppa.deb stable/main/binary-hppa/libgdbm-ruby1.6_1.6.8-12sarge2_hppa.deb stable/main/binary-hppa/ruby1.6_1.6.8-12sarge2_hppa.deb stable/main/binary-hppa/ruby1.6-dev_1.6.8-12sarge2_hppa.deb stable/main/binary-hppa/libtk-ruby1.6_1.6.8-12sarge2_hppa.deb stable/main/binary-hppa/libruby1.6-dbg_1.6.8-12sarge2_hppa.deb stable/main/binary-hppa/libruby1.6_1.6.8-12sarge2_hppa.deb stable/main/binary-hppa/libreadline-ruby1.6_1.6.8-12sarge2_hppa.deb stable/main/binary-hppa/libtcltk-ruby1.6_1.6.8-12sarge2_hppa.deb stable/main/binary-hppa/libsdbm-ruby1.6_1.6.8-12sarge2_hppa.deb stable/main/binary-hppa/libdbm-ruby1.6_1.6.8-12sarge2_hppa.deb ruby1.6 (1.6.8-12sarge2) stable-security; urgency=high * akira yamada <akira@debian.org> - added debian/patches/815-83768862.patch and debian/patches/816-13947696.patch from Kobayashi Noritada (see: #378029): - JVN#83768862: Alias features cannot handle safe levels correclty, so it can be safety bypass. - JVN#13947696: Some methods have defects that they can call other methods, which really should be prohibited, in safe level 4. (Both issues are tracked as CVE-2006-3694) stable/main/binary-arm/libruby1.6-dbg_1.6.8-12sarge2_arm.deb stable/main/binary-arm/libtcltk-ruby1.6_1.6.8-12sarge2_arm.deb stable/main/binary-arm/libpty-ruby1.6_1.6.8-12sarge2_arm.deb stable/main/binary-arm/libdbm-ruby1.6_1.6.8-12sarge2_arm.deb stable/main/binary-arm/libreadline-ruby1.6_1.6.8-12sarge2_arm.deb stable/main/binary-arm/libsyslog-ruby1.6_1.6.8-12sarge2_arm.deb stable/main/binary-arm/ruby1.6_1.6.8-12sarge2_arm.deb stable/main/binary-arm/ruby1.6-dev_1.6.8-12sarge2_arm.deb stable/main/binary-arm/libsdbm-ruby1.6_1.6.8-12sarge2_arm.deb stable/main/binary-arm/libruby1.6_1.6.8-12sarge2_arm.deb stable/main/binary-arm/libgdbm-ruby1.6_1.6.8-12sarge2_arm.deb stable/main/binary-arm/libcurses-ruby1.6_1.6.8-12sarge2_arm.deb stable/main/binary-arm/libtk-ruby1.6_1.6.8-12sarge2_arm.deb ruby1.6 (1.6.8-12sarge2) stable-security; urgency=high * akira yamada <akira@debian.org> - added debian/patches/815-83768862.patch and debian/patches/816-13947696.patch from Kobayashi Noritada (see: #378029): - JVN#83768862: Alias features cannot handle safe levels correclty, so it can be safety bypass. - JVN#13947696: Some methods have defects that they can call other methods, which really should be prohibited, in safe level 4. (Both issues are tracked as CVE-2006-3694) stable/main/binary-alpha/ruby1.6_1.6.8-12sarge2_alpha.deb stable/main/binary-alpha/libsdbm-ruby1.6_1.6.8-12sarge2_alpha.deb stable/main/binary-alpha/libruby1.6_1.6.8-12sarge2_alpha.deb stable/main/binary-alpha/libreadline-ruby1.6_1.6.8-12sarge2_alpha.deb stable/main/binary-alpha/libcurses-ruby1.6_1.6.8-12sarge2_alpha.deb stable/main/binary-alpha/ruby1.6-dev_1.6.8-12sarge2_alpha.deb stable/main/binary-alpha/libpty-ruby1.6_1.6.8-12sarge2_alpha.deb stable/main/binary-alpha/libgdbm-ruby1.6_1.6.8-12sarge2_alpha.deb stable/main/binary-alpha/libtk-ruby1.6_1.6.8-12sarge2_alpha.deb stable/main/binary-alpha/libdbm-ruby1.6_1.6.8-12sarge2_alpha.deb stable/main/binary-alpha/libsyslog-ruby1.6_1.6.8-12sarge2_alpha.deb stable/main/binary-alpha/libruby1.6-dbg_1.6.8-12sarge2_alpha.deb stable/main/binary-alpha/libtcltk-ruby1.6_1.6.8-12sarge2_alpha.deb ruby1.6 (1.6.8-12sarge2) stable-security; urgency=high * akira yamada <akira@debian.org> - added debian/patches/815-83768862.patch and debian/patches/816-13947696.patch from Kobayashi Noritada (see: #378029): - JVN#83768862: Alias features cannot handle safe levels correclty, so it can be safety bypass. - JVN#13947696: Some methods have defects that they can call other methods, which really should be prohibited, in safe level 4. (Both issues are tracked as CVE-2006-3694) stable/main/binary-i386/libruby1.6_1.6.8-12sarge2_i386.deb stable/main/binary-i386/libtcltk-ruby1.6_1.6.8-12sarge2_i386.deb stable/main/binary-all/ruby1.6-elisp_1.6.8-12sarge2_all.deb stable/main/binary-i386/libreadline-ruby1.6_1.6.8-12sarge2_i386.deb stable/main/binary-i386/libpty-ruby1.6_1.6.8-12sarge2_i386.deb stable/main/source/ruby1.6_1.6.8-12sarge2.diff.gz stable/main/binary-i386/libsyslog-ruby1.6_1.6.8-12sarge2_i386.deb stable/main/binary-all/irb1.6_1.6.8-12sarge2_all.deb stable/main/binary-all/ruby1.6-examples_1.6.8-12sarge2_all.deb stable/main/binary-i386/libgdbm-ruby1.6_1.6.8-12sarge2_i386.deb stable/main/source/ruby1.6_1.6.8-12sarge2.dsc stable/main/binary-i386/libruby1.6-dbg_1.6.8-12sarge2_i386.deb stable/main/binary-i386/libdbm-ruby1.6_1.6.8-12sarge2_i386.deb stable/main/binary-i386/libtk-ruby1.6_1.6.8-12sarge2_i386.deb stable/main/binary-i386/libsdbm-ruby1.6_1.6.8-12sarge2_i386.deb stable/main/binary-i386/libcurses-ruby1.6_1.6.8-12sarge2_i386.deb stable/main/binary-i386/ruby1.6_1.6.8-12sarge2_i386.deb stable/main/binary-i386/ruby1.6-dev_1.6.8-12sarge2_i386.deb ruby1.6 (1.6.8-12sarge2) stable-security; urgency=high * akira yamada <akira@debian.org> - added debian/patches/815-83768862.patch and debian/patches/816-13947696.patch from Kobayashi Noritada (see: #378029): - JVN#83768862: Alias features cannot handle safe levels correclty, so it can be safety bypass. - JVN#13947696: Some methods have defects that they can call other methods, which really should be prohibited, in safe level 4. (Both issues are tracked as CVE-2006-3694) stable/main/binary-sparc/rssh_2.2.3-1.sarge.2_sparc.deb rssh (2.2.3-1.sarge.2) stable-security; urgency=high * Command line parse fix for a problem introduced with the security fix integrated in 2.2.3-1.sarge.1. [CVE-2006-1320] (Closes: #363978) stable/main/binary-s390/rssh_2.2.3-1.sarge.2_s390.deb rssh (2.2.3-1.sarge.2) stable-security; urgency=high * Command line parse fix for a problem introduced with the security fix integrated in 2.2.3-1.sarge.1. [CVE-2006-1320] (Closes: #363978) stable/main/binary-powerpc/rssh_2.2.3-1.sarge.2_powerpc.deb rssh (2.2.3-1.sarge.2) stable-security; urgency=high * Command line parse fix for a problem introduced with the security fix integrated in 2.2.3-1.sarge.1. [CVE-2006-1320] (Closes: #363978) stable/main/binary-mipsel/rssh_2.2.3-1.sarge.2_mipsel.deb rssh (2.2.3-1.sarge.2) stable-security; urgency=high * Command line parse fix for a problem introduced with the security fix integrated in 2.2.3-1.sarge.1. [CVE-2006-1320] (Closes: #363978) stable/main/binary-mips/rssh_2.2.3-1.sarge.2_mips.deb rssh (2.2.3-1.sarge.2) stable-security; urgency=high * Command line parse fix for a problem introduced with the security fix integrated in 2.2.3-1.sarge.1. [CVE-2006-1320] (Closes: #363978) stable/main/binary-m68k/rssh_2.2.3-1.sarge.2_m68k.deb rssh (2.2.3-1.sarge.2) stable-security; urgency=high * Command line parse fix for a problem introduced with the security fix integrated in 2.2.3-1.sarge.1. [CVE-2006-1320] (Closes: #363978) stable/main/binary-ia64/rssh_2.2.3-1.sarge.2_ia64.deb rssh (2.2.3-1.sarge.2) stable-security; urgency=high * Command line parse fix for a problem introduced with the security fix integrated in 2.2.3-1.sarge.1. [CVE-2006-1320] (Closes: #363978) stable/main/binary-hppa/rssh_2.2.3-1.sarge.2_hppa.deb rssh (2.2.3-1.sarge.2) stable-security; urgency=high * Command line parse fix for a problem introduced with the security fix integrated in 2.2.3-1.sarge.1. [CVE-2006-1320] (Closes: #363978) stable/main/binary-arm/rssh_2.2.3-1.sarge.2_arm.deb rssh (2.2.3-1.sarge.2) stable-security; urgency=high * Command line parse fix for a problem introduced with the security fix integrated in 2.2.3-1.sarge.1. [CVE-2006-1320] (Closes: #363978) stable/main/binary-alpha/rssh_2.2.3-1.sarge.2_alpha.deb rssh (2.2.3-1.sarge.2) stable-security; urgency=high * Command line parse fix for a problem introduced with the security fix integrated in 2.2.3-1.sarge.1. [CVE-2006-1320] (Closes: #363978) stable/main/source/rssh_2.2.3-1.sarge.2.diff.gz stable/main/source/rssh_2.2.3-1.sarge.2.dsc stable/main/binary-i386/rssh_2.2.3-1.sarge.2_i386.deb rssh (2.2.3-1.sarge.2) stable-security; urgency=high * Command line parse fix for a problem introduced with the security fix integrated in 2.2.3-1.sarge.1. [CVE-2006-1320] (Closes: #363978) stable/main/binary-sparc/libresmgr-dev_1.0-2sarge2_sparc.deb stable/main/binary-sparc/libresmgr1_1.0-2sarge2_sparc.deb stable/main/binary-sparc/resmgr_1.0-2sarge2_sparc.deb resmgr (1.0-2sarge2) stable-security; urgency=high * Adjusted changelog entry stable/main/binary-s390/libresmgr-dev_1.0-2sarge2_s390.deb stable/main/binary-s390/libresmgr1_1.0-2sarge2_s390.deb stable/main/binary-s390/resmgr_1.0-2sarge2_s390.deb resmgr (1.0-2sarge2) stable-security; urgency=high * Adjusted changelog entry stable/main/binary-mipsel/libresmgr1_1.0-2sarge2_mipsel.deb stable/main/binary-mipsel/libresmgr-dev_1.0-2sarge2_mipsel.deb stable/main/binary-mipsel/resmgr_1.0-2sarge2_mipsel.deb resmgr (1.0-2sarge2) stable-security; urgency=high * Adjusted changelog entry stable/main/binary-mips/resmgr_1.0-2sarge2_mips.deb stable/main/binary-mips/libresmgr1_1.0-2sarge2_mips.deb stable/main/binary-mips/libresmgr-dev_1.0-2sarge2_mips.deb resmgr (1.0-2sarge2) stable-security; urgency=high * Adjusted changelog entry stable/main/binary-m68k/resmgr_1.0-2sarge2_m68k.deb stable/main/binary-m68k/libresmgr-dev_1.0-2sarge2_m68k.deb stable/main/binary-m68k/libresmgr1_1.0-2sarge2_m68k.deb resmgr (1.0-2sarge2) stable-security; urgency=high * Adjusted changelog entry stable/main/binary-ia64/libresmgr-dev_1.0-2sarge2_ia64.deb stable/main/binary-ia64/libresmgr1_1.0-2sarge2_ia64.deb stable/main/binary-ia64/resmgr_1.0-2sarge2_ia64.deb resmgr (1.0-2sarge2) stable-security; urgency=high * Adjusted changelog entry stable/main/binary-i386/libresmgr-dev_1.0-2sarge2_i386.deb stable/main/binary-i386/libresmgr1_1.0-2sarge2_i386.deb stable/main/binary-i386/resmgr_1.0-2sarge2_i386.deb resmgr (1.0-2sarge2) stable-security; urgency=high * Adjusted changelog entry stable/main/binary-hppa/libresmgr1_1.0-2sarge2_hppa.deb stable/main/binary-hppa/libresmgr-dev_1.0-2sarge2_hppa.deb stable/main/binary-hppa/resmgr_1.0-2sarge2_hppa.deb resmgr (1.0-2sarge2) stable-security; urgency=high * Adjusted changelog entry stable/main/binary-arm/libresmgr-dev_1.0-2sarge2_arm.deb stable/main/binary-arm/libresmgr1_1.0-2sarge2_arm.deb stable/main/binary-arm/resmgr_1.0-2sarge2_arm.deb resmgr (1.0-2sarge2) stable-security; urgency=high * Adjusted changelog entry stable/main/binary-alpha/libresmgr-dev_1.0-2sarge2_alpha.deb stable/main/binary-alpha/libresmgr1_1.0-2sarge2_alpha.deb stable/main/binary-alpha/resmgr_1.0-2sarge2_alpha.deb resmgr (1.0-2sarge2) stable-security; urgency=high * Adjusted changelog entry stable/main/binary-powerpc/libresmgr1_1.0-2sarge2_powerpc.deb stable/main/source/resmgr_1.0-2sarge2.dsc stable/main/binary-powerpc/resmgr_1.0-2sarge2_powerpc.deb stable/main/source/resmgr_1.0-2sarge2.diff.gz stable/main/binary-powerpc/libresmgr-dev_1.0-2sarge2_powerpc.deb resmgr (1.0-2sarge2) stable-security; urgency=high * Adjusted changelog entry stable/main/binary-sparc/quagga_0.98.3-7.2_sparc.deb quagga (0.98.3-7.2) stable-security; urgency=high * Non-maintainer upload by the Security Team * Moved patches named after the old rejected CVE name to refer to CVE-2006-2223. * Added a fifth patch to fix CVE-2006-2223 or CVE-2006-2224 resp. * Applied security patch that fixes a bug which allowed local users to cause a denial of service (CPU consumption) via a certain sh ip bgp command entered in the telnet interface [bgpd/bgp_community.c, CVE-2006-2276, closes: #366980] stable/main/binary-s390/quagga_0.98.3-7.2_s390.deb quagga (0.98.3-7.2) stable-security; urgency=high * Non-maintainer upload by the Security Team * Moved patches named after the old rejected CVE name to refer to CVE-2006-2223. * Added a fifth patch to fix CVE-2006-2223 or CVE-2006-2224 resp. * Applied security patch that fixes a bug which allowed local users to cause a denial of service (CPU consumption) via a certain sh ip bgp command entered in the telnet interface [bgpd/bgp_community.c, CVE-2006-2276, closes: #366980] stable/main/binary-mipsel/quagga_0.98.3-7.2_mipsel.deb quagga (0.98.3-7.2) stable-security; urgency=high * Non-maintainer upload by the Security Team * Moved patches named after the old rejected CVE name to refer to CVE-2006-2223. * Added a fifth patch to fix CVE-2006-2223 or CVE-2006-2224 resp. * Applied security patch that fixes a bug which allowed local users to cause a denial of service (CPU consumption) via a certain sh ip bgp command entered in the telnet interface [bgpd/bgp_community.c, CVE-2006-2276, closes: #366980] stable/main/binary-mips/quagga_0.98.3-7.2_mips.deb quagga (0.98.3-7.2) stable-security; urgency=high * Non-maintainer upload by the Security Team * Moved patches named after the old rejected CVE name to refer to CVE-2006-2223. * Added a fifth patch to fix CVE-2006-2223 or CVE-2006-2224 resp. * Applied security patch that fixes a bug which allowed local users to cause a denial of service (CPU consumption) via a certain sh ip bgp command entered in the telnet interface [bgpd/bgp_community.c, CVE-2006-2276, closes: #366980] stable/main/binary-m68k/quagga_0.98.3-7.2_m68k.deb quagga (0.98.3-7.2) stable-security; urgency=high * Non-maintainer upload by the Security Team * Moved patches named after the old rejected CVE name to refer to CVE-2006-2223. * Added a fifth patch to fix CVE-2006-2223 or CVE-2006-2224 resp. * Applied security patch that fixes a bug which allowed local users to cause a denial of service (CPU consumption) via a certain sh ip bgp command entered in the telnet interface [bgpd/bgp_community.c, CVE-2006-2276, closes: #366980] stable/main/binary-ia64/quagga_0.98.3-7.2_ia64.deb quagga (0.98.3-7.2) stable-security; urgency=high * Non-maintainer upload by the Security Team * Moved patches named after the old rejected CVE name to refer to CVE-2006-2223. * Added a fifth patch to fix CVE-2006-2223 or CVE-2006-2224 resp. * Applied security patch that fixes a bug which allowed local users to cause a denial of service (CPU consumption) via a certain sh ip bgp command entered in the telnet interface [bgpd/bgp_community.c, CVE-2006-2276, closes: #366980] stable/main/binary-i386/quagga_0.98.3-7.2_i386.deb quagga (0.98.3-7.2) stable-security; urgency=high * Non-maintainer upload by the Security Team * Moved patches named after the old rejected CVE name to refer to CVE-2006-2223. * Added a fifth patch to fix CVE-2006-2223 or CVE-2006-2224 resp. * Applied security patch that fixes a bug which allowed local users to cause a denial of service (CPU consumption) via a certain sh ip bgp command entered in the telnet interface [bgpd/bgp_community.c, CVE-2006-2276, closes: #366980] stable/main/binary-hppa/quagga_0.98.3-7.2_hppa.deb quagga (0.98.3-7.2) stable-security; urgency=high * Non-maintainer upload by the Security Team * Moved patches named after the old rejected CVE name to refer to CVE-2006-2223. * Added a fifth patch to fix CVE-2006-2223 or CVE-2006-2224 resp. * Applied security patch that fixes a bug which allowed local users to cause a denial of service (CPU consumption) via a certain sh ip bgp command entered in the telnet interface [bgpd/bgp_community.c, CVE-2006-2276, closes: #366980] stable/main/binary-arm/quagga_0.98.3-7.2_arm.deb quagga (0.98.3-7.2) stable-security; urgency=high * Non-maintainer upload by the Security Team * Moved patches named after the old rejected CVE name to refer to CVE-2006-2223. * Added a fifth patch to fix CVE-2006-2223 or CVE-2006-2224 resp. * Applied security patch that fixes a bug which allowed local users to cause a denial of service (CPU consumption) via a certain sh ip bgp command entered in the telnet interface [bgpd/bgp_community.c, CVE-2006-2276, closes: #366980] stable/main/binary-alpha/quagga_0.98.3-7.2_alpha.deb quagga (0.98.3-7.2) stable-security; urgency=high * Non-maintainer upload by the Security Team * Moved patches named after the old rejected CVE name to refer to CVE-2006-2223. * Added a fifth patch to fix CVE-2006-2223 or CVE-2006-2224 resp. * Applied security patch that fixes a bug which allowed local users to cause a denial of service (CPU consumption) via a certain sh ip bgp command entered in the telnet interface [bgpd/bgp_community.c, CVE-2006-2276, closes: #366980] stable/main/source/quagga_0.98.3-7.2.dsc stable/main/source/quagga_0.98.3-7.2.diff.gz stable/main/binary-powerpc/quagga_0.98.3-7.2_powerpc.deb stable/main/binary-all/quagga-doc_0.98.3-7.2_all.deb quagga (0.98.3-7.2) stable-security; urgency=high * Non-maintainer upload by the Security Team * Moved patches named after the old rejected CVE name to refer to CVE-2006-2223. * Added a fifth patch to fix CVE-2006-2223 or CVE-2006-2224 resp. * Applied security patch that fixes a bug which allowed local users to cause a denial of service (CPU consumption) via a certain sh ip bgp command entered in the telnet interface [bgpd/bgp_community.c, CVE-2006-2276, closes: #366980] stable/main/binary-sparc/python2.1-pgsql_2.4.0-5sarge1_sparc.deb stable/main/binary-sparc/python2.2-pgsql_2.4.0-5sarge1_sparc.deb stable/main/binary-sparc/python2.3-pgsql_2.4.0-5sarge1_sparc.deb python-pgsql (2.4.0-5sarge1) stable; urgency=high * In routines PgQuoteString() and PgQuoteBytea(), quotes are now escaped as '', not as \' (closes: #369250). In some multi-byte encodings you can exploit \' escaping to inject SQL code, and so \' no longer works for such client encodings with newer PostgreSQL servers. Thanks to Martin Pitt for the patch. * Reference: CVE-2006-2314. stable/main/binary-s390/python2.3-pgsql_2.4.0-5sarge1_s390.deb stable/main/binary-s390/python2.1-pgsql_2.4.0-5sarge1_s390.deb stable/main/binary-s390/python2.2-pgsql_2.4.0-5sarge1_s390.deb python-pgsql (2.4.0-5sarge1) stable; urgency=high * In routines PgQuoteString() and PgQuoteBytea(), quotes are now escaped as '', not as \' (closes: #369250). In some multi-byte encodings you can exploit \' escaping to inject SQL code, and so \' no longer works for such client encodings with newer PostgreSQL servers. Thanks to Martin Pitt for the patch. * Reference: CVE-2006-2314. stable/main/binary-powerpc/python2.3-pgsql_2.4.0-5sarge1_powerpc.deb stable/main/binary-powerpc/python2.2-pgsql_2.4.0-5sarge1_powerpc.deb stable/main/binary-powerpc/python2.1-pgsql_2.4.0-5sarge1_powerpc.deb python-pgsql (2.4.0-5sarge1) stable; urgency=high * In routines PgQuoteString() and PgQuoteBytea(), quotes are now escaped as '', not as \' (closes: #369250). In some multi-byte encodings you can exploit \' escaping to inject SQL code, and so \' no longer works for such client encodings with newer PostgreSQL servers. Thanks to Martin Pitt for the patch. * Reference: CVE-2006-2314. stable/main/binary-mipsel/python2.3-pgsql_2.4.0-5sarge1_mipsel.deb stable/main/binary-mipsel/python2.2-pgsql_2.4.0-5sarge1_mipsel.deb stable/main/binary-mipsel/python2.1-pgsql_2.4.0-5sarge1_mipsel.deb python-pgsql (2.4.0-5sarge1) stable; urgency=high * In routines PgQuoteString() and PgQuoteBytea(), quotes are now escaped as '', not as \' (closes: #369250). In some multi-byte encodings you can exploit \' escaping to inject SQL code, and so \' no longer works for such client encodings with newer PostgreSQL servers. Thanks to Martin Pitt for the patch. * Reference: CVE-2006-2314. stable/main/binary-mips/python2.3-pgsql_2.4.0-5sarge1_mips.deb stable/main/binary-mips/python2.2-pgsql_2.4.0-5sarge1_mips.deb stable/main/binary-mips/python2.1-pgsql_2.4.0-5sarge1_mips.deb python-pgsql (2.4.0-5sarge1) stable; urgency=high * In routines PgQuoteString() and PgQuoteBytea(), quotes are now escaped as '', not as \' (closes: #369250). In some multi-byte encodings you can exploit \' escaping to inject SQL code, and so \' no longer works for such client encodings with newer PostgreSQL servers. Thanks to Martin Pitt for the patch. * Reference: CVE-2006-2314. stable/main/binary-m68k/python2.2-pgsql_2.4.0-5sarge1_m68k.deb stable/main/binary-m68k/python2.3-pgsql_2.4.0-5sarge1_m68k.deb stable/main/binary-m68k/python2.1-pgsql_2.4.0-5sarge1_m68k.deb python-pgsql (2.4.0-5sarge1) stable; urgency=high * In routines PgQuoteString() and PgQuoteBytea(), quotes are now escaped as '', not as \' (closes: #369250). In some multi-byte encodings you can exploit \' escaping to inject SQL code, and so \' no longer works for such client encodings with newer PostgreSQL servers. Thanks to Martin Pitt for the patch. * Reference: CVE-2006-2314. stable/main/binary-ia64/python2.3-pgsql_2.4.0-5sarge1_ia64.deb stable/main/binary-ia64/python2.2-pgsql_2.4.0-5sarge1_ia64.deb stable/main/binary-ia64/python2.1-pgsql_2.4.0-5sarge1_ia64.deb python-pgsql (2.4.0-5sarge1) stable; urgency=high * In routines PgQuoteString() and PgQuoteBytea(), quotes are now escaped as '', not as \' (closes: #369250). In some multi-byte encodings you can exploit \' escaping to inject SQL code, and so \' no longer works for such client encodings with newer PostgreSQL servers. Thanks to Martin Pitt for the patch. * Reference: CVE-2006-2314. stable/main/binary-hppa/python2.3-pgsql_2.4.0-5sarge1_hppa.deb stable/main/binary-hppa/python2.1-pgsql_2.4.0-5sarge1_hppa.deb stable/main/binary-hppa/python2.2-pgsql_2.4.0-5sarge1_hppa.deb python-pgsql (2.4.0-5sarge1) stable; urgency=high * In routines PgQuoteString() and PgQuoteBytea(), quotes are now escaped as '', not as \' (closes: #369250). In some multi-byte encodings you can exploit \' escaping to inject SQL code, and so \' no longer works for such client encodings with newer PostgreSQL servers. Thanks to Martin Pitt for the patch. * Reference: CVE-2006-2314. stable/main/binary-arm/python2.1-pgsql_2.4.0-5sarge1_arm.deb stable/main/binary-arm/python2.3-pgsql_2.4.0-5sarge1_arm.deb stable/main/binary-arm/python2.2-pgsql_2.4.0-5sarge1_arm.deb python-pgsql (2.4.0-5sarge1) stable; urgency=high * In routines PgQuoteString() and PgQuoteBytea(), quotes are now escaped as '', not as \' (closes: #369250). In some multi-byte encodings you can exploit \' escaping to inject SQL code, and so \' no longer works for such client encodings with newer PostgreSQL servers. Thanks to Martin Pitt for the patch. * Reference: CVE-2006-2314. stable/main/binary-alpha/python2.3-pgsql_2.4.0-5sarge1_alpha.deb stable/main/binary-alpha/python2.2-pgsql_2.4.0-5sarge1_alpha.deb stable/main/binary-alpha/python2.1-pgsql_2.4.0-5sarge1_alpha.deb python-pgsql (2.4.0-5sarge1) stable; urgency=high * In routines PgQuoteString() and PgQuoteBytea(), quotes are now escaped as '', not as \' (closes: #369250). In some multi-byte encodings you can exploit \' escaping to inject SQL code, and so \' no longer works for such client encodings with newer PostgreSQL servers. Thanks to Martin Pitt for the patch. * Reference: CVE-2006-2314. stable/main/binary-i386/python2.1-pgsql_2.4.0-5sarge1_i386.deb stable/main/source/python-pgsql_2.4.0-5sarge1.dsc stable/main/binary-i386/python2.3-pgsql_2.4.0-5sarge1_i386.deb stable/main/source/python-pgsql_2.4.0-5sarge1.diff.gz stable/main/binary-i386/python2.2-pgsql_2.4.0-5sarge1_i386.deb stable/main/binary-all/python-pgsql_2.4.0-5sarge1_all.deb python-pgsql (2.4.0-5sarge1) stable; urgency=high * In routines PgQuoteString() and PgQuoteBytea(), quotes are now escaped as '', not as \' (closes: #369250). In some multi-byte encodings you can exploit \' escaping to inject SQL code, and so \' no longer works for such client encodings with newer PostgreSQL servers. Thanks to Martin Pitt for the patch. * Reference: CVE-2006-2314. stable/main/source/preseed_1.01.2.tar.gz stable/main/binary-all/file-preseed_1.01.2_all.udeb stable/main/binary-all/network-preseed_1.01.2_all.udeb stable/main/source/preseed_1.01.2.dsc preseed (1.01.2) stable; urgency=low * Re-upload as udebs got unaccepted by mistake. * Updated translations: - Arabic (ar.po) by Ossama M. Khayat - Bulgarian (bg.po) by Ognyan Kulev - Bosnian (bs.po) by Safir Secerovic - Welsh (cy.po) by Dafydd Harries - Danish (da.po) by Claus Hindsgaul - German (de.po) by Jens Seidel - Greek, Modern (1453-) (el.po) by quad-nrg.net - Spanish (Castilian) (es.po) by Javier Fernández-Sanguino Peña - Basque (eu.po) by Piarres Beobide - Finnish (fi.po) by Tapio Lehtonen - French (fr.po) by Christian Perrier - Gallegan (gl.po) by Jacobo Tarrio - Hebrew (he.po) by Lior Kaplan - Croatian (hr.po) by Krunoslav Gernhard - Hungarian (hu.po) by SZERVÃC Attila - Italian (it.po) by Giuseppe Sacco - Lithuanian (lt.po) by KÄ™stutis BiliÅ«nas - Latvian (lv.po) by Aigars Mahinovs - Bøkmal, Norwegian (nb.po) by Bjørn Steensrud - Norwegian Nynorsk (nn.po) by HÃ¥vard Korsvoll - Polish (pl.po) by Bartosz Fenski - Portuguese (Brazil) (pt_BR.po) by André LuÃs Lopes - Portuguese (pt.po) by Miguel Figueiredo - Romanian (ro.po) by Eddy PetriÅŸor - Russian (ru.po) by Yuri Kozlov - Slovak (sk.po) by Peter Mann - Slovenian (sl.po) by Jure ÄŒuhalev - Albanian (sq.po) by Elian Myftiu - Swedish (sv.po) by Daniel Nylander - Turkish (tr.po) by Recai OktaÅŸ - Ukrainian (uk.po) by Eugeniy Meshcheryakov - Simplified Chinese (zh_CN.po) by Carlos Z.F. Liu stable/main/binary-s390/ppxp_0.2001080415-10sarge2_s390.deb stable/main/binary-s390/ppxp-tcltk_0.2001080415-10sarge2_s390.deb stable/main/binary-s390/ppxp-dev_0.2001080415-10sarge2_s390.deb stable/main/binary-s390/ppxp-x11_0.2001080415-10sarge2_s390.deb ppxp (0.2001080415-10sarge2) stable-security; urgency=high * Non-maintainer upload by the Security Team * No changes rebuild due to the release stable/main/binary-powerpc/ppxp-dev_0.2001080415-10sarge2_powerpc.deb stable/main/binary-powerpc/ppxp-x11_0.2001080415-10sarge2_powerpc.deb stable/main/binary-powerpc/ppxp-tcltk_0.2001080415-10sarge2_powerpc.deb stable/main/binary-powerpc/ppxp_0.2001080415-10sarge2_powerpc.deb ppxp (0.2001080415-10sarge2) stable-security; urgency=high * Non-maintainer upload by the Security Team * No changes rebuild due to the release stable/main/binary-mipsel/ppxp-tcltk_0.2001080415-10sarge2_mipsel.deb stable/main/binary-mipsel/ppxp_0.2001080415-10sarge2_mipsel.deb stable/main/binary-mipsel/ppxp-x11_0.2001080415-10sarge2_mipsel.deb stable/main/binary-mipsel/ppxp-dev_0.2001080415-10sarge2_mipsel.deb ppxp (0.2001080415-10sarge2) stable-security; urgency=high * Non-maintainer upload by the Security Team * No changes rebuild due to the release stable/main/binary-mips/ppxp_0.2001080415-10sarge2_mips.deb stable/main/binary-mips/ppxp-dev_0.2001080415-10sarge2_mips.deb stable/main/binary-mips/ppxp-x11_0.2001080415-10sarge2_mips.deb stable/main/binary-mips/ppxp-tcltk_0.2001080415-10sarge2_mips.deb ppxp (0.2001080415-10sarge2) stable-security; urgency=high * Non-maintainer upload by the Security Team * No changes rebuild due to the release stable/main/binary-m68k/ppxp-x11_0.2001080415-10sarge2_m68k.deb stable/main/binary-m68k/ppxp-dev_0.2001080415-10sarge2_m68k.deb stable/main/binary-m68k/ppxp_0.2001080415-10sarge2_m68k.deb stable/main/binary-m68k/ppxp-tcltk_0.2001080415-10sarge2_m68k.deb ppxp (0.2001080415-10sarge2) stable-security; urgency=high * Non-maintainer upload by the Security Team * No changes rebuild due to the release stable/main/binary-ia64/ppxp-x11_0.2001080415-10sarge2_ia64.deb stable/main/binary-ia64/ppxp-tcltk_0.2001080415-10sarge2_ia64.deb stable/main/binary-ia64/ppxp_0.2001080415-10sarge2_ia64.deb stable/main/binary-ia64/ppxp-dev_0.2001080415-10sarge2_ia64.deb ppxp (0.2001080415-10sarge2) stable-security; urgency=high * Non-maintainer upload by the Security Team * No changes rebuild due to the release stable/main/binary-i386/ppxp-tcltk_0.2001080415-10sarge2_i386.deb stable/main/binary-i386/ppxp-x11_0.2001080415-10sarge2_i386.deb stable/main/binary-i386/ppxp-dev_0.2001080415-10sarge2_i386.deb stable/main/binary-i386/ppxp_0.2001080415-10sarge2_i386.deb ppxp (0.2001080415-10sarge2) stable-security; urgency=high * Non-maintainer upload by the Security Team * No changes rebuild due to the release stable/main/binary-hppa/ppxp_0.2001080415-10sarge2_hppa.deb stable/main/binary-hppa/ppxp-x11_0.2001080415-10sarge2_hppa.deb stable/main/binary-hppa/ppxp-tcltk_0.2001080415-10sarge2_hppa.deb stable/main/binary-hppa/ppxp-dev_0.2001080415-10sarge2_hppa.deb ppxp (0.2001080415-10sarge2) stable-security; urgency=high * Non-maintainer upload by the Security Team * No changes rebuild due to the release stable/main/binary-arm/ppxp_0.2001080415-10sarge2_arm.deb stable/main/binary-arm/ppxp-tcltk_0.2001080415-10sarge2_arm.deb stable/main/binary-arm/ppxp-x11_0.2001080415-10sarge2_arm.deb stable/main/binary-arm/ppxp-dev_0.2001080415-10sarge2_arm.deb ppxp (0.2001080415-10sarge2) stable-security; urgency=high * Non-maintainer upload by the Security Team * No changes rebuild due to the release stable/main/binary-alpha/ppxp-dev_0.2001080415-10sarge2_alpha.deb stable/main/binary-alpha/ppxp_0.2001080415-10sarge2_alpha.deb stable/main/binary-alpha/ppxp-x11_0.2001080415-10sarge2_alpha.deb stable/main/binary-alpha/ppxp-tcltk_0.2001080415-10sarge2_alpha.deb ppxp (0.2001080415-10sarge2) stable-security; urgency=high * Non-maintainer upload by the Security Team * No changes rebuild due to the release stable/main/binary-sparc/ppxp-tcltk_0.2001080415-10sarge2_sparc.deb stable/main/source/ppxp_0.2001080415-10sarge2.dsc stable/main/source/ppxp_0.2001080415-10sarge2.diff.gz stable/main/binary-sparc/ppxp-dev_0.2001080415-10sarge2_sparc.deb stable/main/binary-sparc/ppxp-x11_0.2001080415-10sarge2_sparc.deb stable/main/binary-sparc/ppxp_0.2001080415-10sarge2_sparc.deb ppxp (0.2001080415-10sarge2) stable-security; urgency=high * Non-maintainer upload by the Security Team * No changes rebuild due to the release stable/main/binary-sparc/ppp-udeb_2.4.3-20050321+2sarge1_sparc.udeb stable/main/binary-sparc/ppp_2.4.3-20050321+2sarge1_sparc.deb ppp (2.4.3-20050321+2sarge1) stable-security; urgency=medium * Non-maintainer upload by the Security Team * Applied patch by Marcus Meissner to honor the return value of a potentially failing setuid() call [pppd/plugins/winbind.c, debian/patches/zzz-CVE-2006-2194] stable/main/binary-s390/ppp_2.4.3-20050321+2sarge1_s390.deb stable/main/binary-s390/ppp-udeb_2.4.3-20050321+2sarge1_s390.udeb ppp (2.4.3-20050321+2sarge1) stable-security; urgency=medium * Non-maintainer upload by the Security Team * Applied patch by Marcus Meissner to honor the return value of a potentially failing setuid() call [pppd/plugins/winbind.c, debian/patches/zzz-CVE-2006-2194] stable/main/binary-mipsel/ppp_2.4.3-20050321+2sarge1_mipsel.deb stable/main/binary-mipsel/ppp-udeb_2.4.3-20050321+2sarge1_mipsel.udeb ppp (2.4.3-20050321+2sarge1) stable-security; urgency=medium * Non-maintainer upload by the Security Team * Applied patch by Marcus Meissner to honor the return value of a potentially failing setuid() call [pppd/plugins/winbind.c, debian/patches/zzz-CVE-2006-2194] stable/main/binary-mips/ppp_2.4.3-20050321+2sarge1_mips.deb stable/main/binary-mips/ppp-udeb_2.4.3-20050321+2sarge1_mips.udeb ppp (2.4.3-20050321+2sarge1) stable-security; urgency=medium * Non-maintainer upload by the Security Team * Applied patch by Marcus Meissner to honor the return value of a potentially failing setuid() call [pppd/plugins/winbind.c, debian/patches/zzz-CVE-2006-2194] stable/main/binary-m68k/ppp-udeb_2.4.3-20050321+2sarge1_m68k.udeb stable/main/binary-m68k/ppp_2.4.3-20050321+2sarge1_m68k.deb ppp (2.4.3-20050321+2sarge1) stable-security; urgency=medium * Non-maintainer upload by the Security Team * Applied patch by Marcus Meissner to honor the return value of a potentially failing setuid() call [pppd/plugins/winbind.c, debian/patches/zzz-CVE-2006-2194] stable/main/binary-ia64/ppp-udeb_2.4.3-20050321+2sarge1_ia64.udeb stable/main/binary-ia64/ppp_2.4.3-20050321+2sarge1_ia64.deb ppp (2.4.3-20050321+2sarge1) stable-security; urgency=medium * Non-maintainer upload by the Security Team * Applied patch by Marcus Meissner to honor the return value of a potentially failing setuid() call [pppd/plugins/winbind.c, debian/patches/zzz-CVE-2006-2194] stable/main/binary-i386/ppp-udeb_2.4.3-20050321+2sarge1_i386.udeb stable/main/binary-i386/ppp_2.4.3-20050321+2sarge1_i386.deb ppp (2.4.3-20050321+2sarge1) stable-security; urgency=medium * Non-maintainer upload by the Security Team * Applied patch by Marcus Meissner to honor the return value of a potentially failing setuid() call [pppd/plugins/winbind.c, debian/patches/zzz-CVE-2006-2194] stable/main/binary-hppa/ppp_2.4.3-20050321+2sarge1_hppa.deb stable/main/binary-hppa/ppp-udeb_2.4.3-20050321+2sarge1_hppa.udeb ppp (2.4.3-20050321+2sarge1) stable-security; urgency=medium * Non-maintainer upload by the Security Team * Applied patch by Marcus Meissner to honor the return value of a potentially failing setuid() call [pppd/plugins/winbind.c, debian/patches/zzz-CVE-2006-2194] stable/main/binary-arm/ppp_2.4.3-20050321+2sarge1_arm.deb stable/main/binary-arm/ppp-udeb_2.4.3-20050321+2sarge1_arm.udeb ppp (2.4.3-20050321+2sarge1) stable-security; urgency=medium * Non-maintainer upload by the Security Team * Applied patch by Marcus Meissner to honor the return value of a potentially failing setuid() call [pppd/plugins/winbind.c, debian/patches/zzz-CVE-2006-2194] stable/main/binary-alpha/ppp-udeb_2.4.3-20050321+2sarge1_alpha.udeb stable/main/binary-alpha/ppp_2.4.3-20050321+2sarge1_alpha.deb ppp (2.4.3-20050321+2sarge1) stable-security; urgency=medium * Non-maintainer upload by the Security Team * Applied patch by Marcus Meissner to honor the return value of a potentially failing setuid() call [pppd/plugins/winbind.c, debian/patches/zzz-CVE-2006-2194] stable/main/source/ppp_2.4.3-20050321+2sarge1.diff.gz stable/main/binary-powerpc/ppp-udeb_2.4.3-20050321+2sarge1_powerpc.udeb stable/main/source/ppp_2.4.3-20050321+2sarge1.dsc stable/main/binary-all/ppp-dev_2.4.3-20050321+2sarge1_all.deb stable/main/binary-powerpc/ppp_2.4.3-20050321+2sarge1_powerpc.deb ppp (2.4.3-20050321+2sarge1) stable-security; urgency=medium * Non-maintainer upload by the Security Team * Applied patch by Marcus Meissner to honor the return value of a potentially failing setuid() call [pppd/plugins/winbind.c, debian/patches/zzz-CVE-2006-2194] stable/main/source/postgrey_1.21-1sarge1.dsc stable/main/source/postgrey_1.21-1sarge1.diff.gz stable/main/binary-all/postgrey_1.21-1sarge1_all.deb postgrey (1.21-1sarge1) stable-security; urgency=high * Security upload: fix format string attack in the logging function. Fix backported from 1.22. [postgrey, CVE-2005-1127] stable/main/binary-sparc/postgresql-contrib_7.4.7-6sarge3_sparc.deb stable/main/binary-sparc/libpgtcl-dev_7.4.7-6sarge3_sparc.deb stable/main/binary-sparc/postgresql-dev_7.4.7-6sarge3_sparc.deb stable/main/binary-sparc/libecpg-dev_7.4.7-6sarge3_sparc.deb stable/main/binary-sparc/libpq3_7.4.7-6sarge3_sparc.deb stable/main/binary-sparc/postgresql-client_7.4.7-6sarge3_sparc.deb stable/main/binary-sparc/libpgtcl_7.4.7-6sarge3_sparc.deb stable/main/binary-sparc/postgresql_7.4.7-6sarge3_sparc.deb stable/main/binary-sparc/libecpg4_7.4.7-6sarge3_sparc.deb postgresql (7.4.7-6sarge3) stable; urgency=low * debian/patches/57quote-escaping.patch: - contrib/dbmirror/DBMirror.pl: Fix parsing of quotes escaped as '' in the PendingData table to make the script work with the updated quoting method introduced in 7.4.7-6sarge2 (using \' escaping is insecure). - Closes: #372115 stable/main/binary-s390/postgresql-dev_7.4.7-6sarge3_s390.deb stable/main/binary-s390/postgresql-client_7.4.7-6sarge3_s390.deb stable/main/binary-s390/libpq3_7.4.7-6sarge3_s390.deb stable/main/binary-s390/postgresql_7.4.7-6sarge3_s390.deb stable/main/binary-s390/postgresql-contrib_7.4.7-6sarge3_s390.deb stable/main/binary-s390/libpgtcl_7.4.7-6sarge3_s390.deb stable/main/binary-s390/libecpg4_7.4.7-6sarge3_s390.deb stable/main/binary-s390/libpgtcl-dev_7.4.7-6sarge3_s390.deb stable/main/binary-s390/libecpg-dev_7.4.7-6sarge3_s390.deb postgresql (7.4.7-6sarge3) stable; urgency=low * debian/patches/57quote-escaping.patch: - contrib/dbmirror/DBMirror.pl: Fix parsing of quotes escaped as '' in the PendingData table to make the script work with the updated quoting method introduced in 7.4.7-6sarge2 (using \' escaping is insecure). - Closes: #372115 stable/main/binary-powerpc/postgresql-contrib_7.4.7-6sarge3_powerpc.deb stable/main/binary-powerpc/libecpg4_7.4.7-6sarge3_powerpc.deb stable/main/binary-powerpc/libpgtcl_7.4.7-6sarge3_powerpc.deb stable/main/binary-powerpc/libpq3_7.4.7-6sarge3_powerpc.deb stable/main/binary-powerpc/postgresql-client_7.4.7-6sarge3_powerpc.deb stable/main/binary-powerpc/libpgtcl-dev_7.4.7-6sarge3_powerpc.deb stable/main/binary-powerpc/libecpg-dev_7.4.7-6sarge3_powerpc.deb stable/main/binary-powerpc/postgresql-dev_7.4.7-6sarge3_powerpc.deb stable/main/binary-powerpc/postgresql_7.4.7-6sarge3_powerpc.deb postgresql (7.4.7-6sarge3) stable; urgency=low * debian/patches/57quote-escaping.patch: - contrib/dbmirror/DBMirror.pl: Fix parsing of quotes escaped as '' in the PendingData table to make the script work with the updated quoting method introduced in 7.4.7-6sarge2 (using \' escaping is insecure). - Closes: #372115 stable/main/binary-mipsel/libpq3_7.4.7-6sarge3_mipsel.deb stable/main/binary-mipsel/postgresql-client_7.4.7-6sarge3_mipsel.deb stable/main/binary-mipsel/libecpg4_7.4.7-6sarge3_mipsel.deb stable/main/binary-mipsel/postgresql-contrib_7.4.7-6sarge3_mipsel.deb stable/main/binary-mipsel/postgresql_7.4.7-6sarge3_mipsel.deb stable/main/binary-mipsel/libpgtcl_7.4.7-6sarge3_mipsel.deb stable/main/binary-mipsel/libpgtcl-dev_7.4.7-6sarge3_mipsel.deb stable/main/binary-mipsel/postgresql-dev_7.4.7-6sarge3_mipsel.deb stable/main/binary-mipsel/libecpg-dev_7.4.7-6sarge3_mipsel.deb postgresql (7.4.7-6sarge3) stable; urgency=low * debian/patches/57quote-escaping.patch: - contrib/dbmirror/DBMirror.pl: Fix parsing of quotes escaped as '' in the PendingData table to make the script work with the updated quoting method introduced in 7.4.7-6sarge2 (using \' escaping is insecure). - Closes: #372115 stable/main/binary-mips/libpgtcl_7.4.7-6sarge3_mips.deb stable/main/binary-mips/libecpg-dev_7.4.7-6sarge3_mips.deb stable/main/binary-mips/postgresql-dev_7.4.7-6sarge3_mips.deb stable/main/binary-mips/postgresql_7.4.7-6sarge3_mips.deb stable/main/binary-mips/postgresql-client_7.4.7-6sarge3_mips.deb stable/main/binary-mips/libpgtcl-dev_7.4.7-6sarge3_mips.deb stable/main/binary-mips/postgresql-contrib_7.4.7-6sarge3_mips.deb stable/main/binary-mips/libpq3_7.4.7-6sarge3_mips.deb stable/main/binary-mips/libecpg4_7.4.7-6sarge3_mips.deb postgresql (7.4.7-6sarge3) stable; urgency=low * debian/patches/57quote-escaping.patch: - contrib/dbmirror/DBMirror.pl: Fix parsing of quotes escaped as '' in the PendingData table to make the script work with the updated quoting method introduced in 7.4.7-6sarge2 (using \' escaping is insecure). - Closes: #372115 stable/main/binary-m68k/postgresql-dev_7.4.7-6sarge3_m68k.deb stable/main/binary-m68k/libpgtcl-dev_7.4.7-6sarge3_m68k.deb stable/main/binary-m68k/libpgtcl_7.4.7-6sarge3_m68k.deb stable/main/binary-m68k/postgresql-contrib_7.4.7-6sarge3_m68k.deb stable/main/binary-m68k/libpq3_7.4.7-6sarge3_m68k.deb stable/main/binary-m68k/libecpg-dev_7.4.7-6sarge3_m68k.deb stable/main/binary-m68k/libecpg4_7.4.7-6sarge3_m68k.deb stable/main/binary-m68k/postgresql-client_7.4.7-6sarge3_m68k.deb stable/main/binary-m68k/postgresql_7.4.7-6sarge3_m68k.deb postgresql (7.4.7-6sarge3) stable; urgency=low * debian/patches/57quote-escaping.patch: - contrib/dbmirror/DBMirror.pl: Fix parsing of quotes escaped as '' in the PendingData table to make the script work with the updated quoting method introduced in 7.4.7-6sarge2 (using \' escaping is insecure). - Closes: #372115 stable/main/binary-ia64/libpgtcl_7.4.7-6sarge3_ia64.deb stable/main/binary-ia64/postgresql-dev_7.4.7-6sarge3_ia64.deb stable/main/binary-ia64/postgresql_7.4.7-6sarge3_ia64.deb stable/main/binary-ia64/libpq3_7.4.7-6sarge3_ia64.deb stable/main/binary-ia64/postgresql-contrib_7.4.7-6sarge3_ia64.deb stable/main/binary-ia64/libecpg4_7.4.7-6sarge3_ia64.deb stable/main/binary-ia64/libecpg-dev_7.4.7-6sarge3_ia64.deb stable/main/binary-ia64/postgresql-client_7.4.7-6sarge3_ia64.deb stable/main/binary-ia64/libpgtcl-dev_7.4.7-6sarge3_ia64.deb postgresql (7.4.7-6sarge3) stable; urgency=low * debian/patches/57quote-escaping.patch: - contrib/dbmirror/DBMirror.pl: Fix parsing of quotes escaped as '' in the PendingData table to make the script work with the updated quoting method introduced in 7.4.7-6sarge2 (using \' escaping is insecure). - Closes: #372115 stable/main/binary-hppa/postgresql-client_7.4.7-6sarge3_hppa.deb stable/main/binary-hppa/libpgtcl_7.4.7-6sarge3_hppa.deb stable/main/binary-hppa/postgresql_7.4.7-6sarge3_hppa.deb stable/main/binary-hppa/libpq3_7.4.7-6sarge3_hppa.deb stable/main/binary-hppa/postgresql-dev_7.4.7-6sarge3_hppa.deb stable/main/binary-hppa/libecpg-dev_7.4.7-6sarge3_hppa.deb stable/main/binary-hppa/libpgtcl-dev_7.4.7-6sarge3_hppa.deb stable/main/binary-hppa/postgresql-contrib_7.4.7-6sarge3_hppa.deb stable/main/binary-hppa/libecpg4_7.4.7-6sarge3_hppa.deb postgresql (7.4.7-6sarge3) stable; urgency=low * debian/patches/57quote-escaping.patch: - contrib/dbmirror/DBMirror.pl: Fix parsing of quotes escaped as '' in the PendingData table to make the script work with the updated quoting method introduced in 7.4.7-6sarge2 (using \' escaping is insecure). - Closes: #372115 stable/main/binary-arm/libpgtcl_7.4.7-6sarge3_arm.deb stable/main/binary-arm/libecpg4_7.4.7-6sarge3_arm.deb stable/main/binary-arm/postgresql-dev_7.4.7-6sarge3_arm.deb stable/main/binary-arm/postgresql-contrib_7.4.7-6sarge3_arm.deb stable/main/binary-arm/libpq3_7.4.7-6sarge3_arm.deb stable/main/binary-arm/postgresql-client_7.4.7-6sarge3_arm.deb stable/main/binary-arm/postgresql_7.4.7-6sarge3_arm.deb stable/main/binary-arm/libpgtcl-dev_7.4.7-6sarge3_arm.deb stable/main/binary-arm/libecpg-dev_7.4.7-6sarge3_arm.deb postgresql (7.4.7-6sarge3) stable; urgency=low * debian/patches/57quote-escaping.patch: - contrib/dbmirror/DBMirror.pl: Fix parsing of quotes escaped as '' in the PendingData table to make the script work with the updated quoting method introduced in 7.4.7-6sarge2 (using \' escaping is insecure). - Closes: #372115 stable/main/binary-alpha/postgresql-client_7.4.7-6sarge3_alpha.deb stable/main/binary-alpha/libecpg4_7.4.7-6sarge3_alpha.deb stable/main/binary-alpha/libpgtcl-dev_7.4.7-6sarge3_alpha.deb stable/main/binary-alpha/libpgtcl_7.4.7-6sarge3_alpha.deb stable/main/binary-alpha/libpq3_7.4.7-6sarge3_alpha.deb stable/main/binary-alpha/postgresql_7.4.7-6sarge3_alpha.deb stable/main/binary-alpha/libecpg-dev_7.4.7-6sarge3_alpha.deb stable/main/binary-alpha/postgresql-dev_7.4.7-6sarge3_alpha.deb stable/main/binary-alpha/postgresql-contrib_7.4.7-6sarge3_alpha.deb postgresql (7.4.7-6sarge3) stable; urgency=low * debian/patches/57quote-escaping.patch: - contrib/dbmirror/DBMirror.pl: Fix parsing of quotes escaped as '' in the PendingData table to make the script work with the updated quoting method introduced in 7.4.7-6sarge2 (using \' escaping is insecure). - Closes: #372115 stable/main/binary-all/postgresql-doc_7.4.7-6sarge3_all.deb stable/main/binary-i386/postgresql-dev_7.4.7-6sarge3_i386.deb stable/main/binary-i386/libecpg-dev_7.4.7-6sarge3_i386.deb stable/main/binary-i386/postgresql-contrib_7.4.7-6sarge3_i386.deb stable/main/source/postgresql_7.4.7-6sarge3.diff.gz stable/main/binary-i386/libpq3_7.4.7-6sarge3_i386.deb stable/main/binary-i386/postgresql_7.4.7-6sarge3_i386.deb stable/main/binary-i386/postgresql-client_7.4.7-6sarge3_i386.deb stable/main/binary-i386/libecpg4_7.4.7-6sarge3_i386.deb stable/main/binary-i386/libpgtcl_7.4.7-6sarge3_i386.deb stable/main/binary-i386/libpgtcl-dev_7.4.7-6sarge3_i386.deb stable/main/source/postgresql_7.4.7-6sarge3.dsc postgresql (7.4.7-6sarge3) stable; urgency=low * debian/patches/57quote-escaping.patch: - contrib/dbmirror/DBMirror.pl: Fix parsing of quotes escaped as '' in the PendingData table to make the script work with the updated quoting method introduced in 7.4.7-6sarge2 (using \' escaping is insecure). - Closes: #372115 stable/main/source/popfile_0.22.2-2sarge1.diff.gz stable/main/source/popfile_0.22.2-2sarge1.dsc stable/main/binary-all/popfile_0.22.2-2sarge1_all.deb popfile (0.22.2-2sarge1) stable-security; urgency=high * Non-maintainer upload by the Security Team: * Fix denial of service vulnerability through malformed character sets in email messages. (CVE-2006-0876) stable/main/binary-sparc/pinball_0.3.1-3sarge1_sparc.deb stable/main/binary-sparc/pinball-dev_0.3.1-3sarge1_sparc.deb pinball (0.3.1-3sarge1) stable-security; urgency=high * Non-maintainer upload by The Security Team. * Avoid loading levels and compiled plugins from user-controllable locations. [CVE-2006-2196] stable/main/binary-s390/pinball_0.3.1-3sarge1_s390.deb stable/main/binary-s390/pinball-dev_0.3.1-3sarge1_s390.deb pinball (0.3.1-3sarge1) stable-security; urgency=high * Non-maintainer upload by The Security Team. * Avoid loading levels and compiled plugins from user-controllable locations. [CVE-2006-2196] stable/main/binary-powerpc/pinball-dev_0.3.1-3sarge1_powerpc.deb stable/main/binary-powerpc/pinball_0.3.1-3sarge1_powerpc.deb pinball (0.3.1-3sarge1) stable-security; urgency=high * Non-maintainer upload by The Security Team. * Avoid loading levels and compiled plugins from user-controllable locations. [CVE-2006-2196] stable/main/binary-mipsel/pinball_0.3.1-3sarge1_mipsel.deb stable/main/binary-mipsel/pinball-dev_0.3.1-3sarge1_mipsel.deb pinball (0.3.1-3sarge1) stable-security; urgency=high * Non-maintainer upload by The Security Team. * Avoid loading levels and compiled plugins from user-controllable locations. [CVE-2006-2196] stable/main/binary-mips/pinball_0.3.1-3sarge1_mips.deb stable/main/binary-mips/pinball-dev_0.3.1-3sarge1_mips.deb pinball (0.3.1-3sarge1) stable-security; urgency=high * Non-maintainer upload by The Security Team. * Avoid loading levels and compiled plugins from user-controllable locations. [CVE-2006-2196] stable/main/binary-m68k/pinball-dev_0.3.1-3sarge1_m68k.deb stable/main/binary-m68k/pinball_0.3.1-3sarge1_m68k.deb pinball (0.3.1-3sarge1) stable-security; urgency=high * Non-maintainer upload by The Security Team. * Avoid loading levels and compiled plugins from user-controllable locations. [CVE-2006-2196] stable/main/binary-ia64/pinball_0.3.1-3sarge1_ia64.deb stable/main/binary-ia64/pinball-dev_0.3.1-3sarge1_ia64.deb pinball (0.3.1-3sarge1) stable-security; urgency=high * Non-maintainer upload by The Security Team. * Avoid loading levels and compiled plugins from user-controllable locations. [CVE-2006-2196] stable/main/binary-hppa/pinball_0.3.1-3sarge1_hppa.deb stable/main/binary-hppa/pinball-dev_0.3.1-3sarge1_hppa.deb pinball (0.3.1-3sarge1) stable-security; urgency=high * Non-maintainer upload by The Security Team. * Avoid loading levels and compiled plugins from user-controllable locations. [CVE-2006-2196] stable/main/binary-arm/pinball_0.3.1-3sarge1_arm.deb stable/main/binary-arm/pinball-dev_0.3.1-3sarge1_arm.deb pinball (0.3.1-3sarge1) stable-security; urgency=high * Non-maintainer upload by The Security Team. * Avoid loading levels and compiled plugins from user-controllable locations. [CVE-2006-2196] stable/main/binary-alpha/pinball_0.3.1-3sarge1_alpha.deb stable/main/binary-alpha/pinball-dev_0.3.1-3sarge1_alpha.deb pinball (0.3.1-3sarge1) stable-security; urgency=high * Non-maintainer upload by The Security Team. * Avoid loading levels and compiled plugins from user-controllable locations. [CVE-2006-2196] stable/main/source/pinball_0.3.1-3sarge1.diff.gz stable/main/binary-i386/pinball-dev_0.3.1-3sarge1_i386.deb stable/main/binary-all/pinball-data_0.3.1-3sarge1_all.deb stable/main/binary-i386/pinball_0.3.1-3sarge1_i386.deb stable/main/source/pinball_0.3.1-3sarge1.dsc pinball (0.3.1-3sarge1) stable-security; urgency=high * Non-maintainer upload by The Security Team. * Avoid loading levels and compiled plugins from user-controllable locations. [CVE-2006-2196] stable/main/source/phpldapadmin_0.9.5-3sarge3.dsc stable/main/source/phpldapadmin_0.9.5-3sarge3.diff.gz stable/main/binary-all/phpldapadmin_0.9.5-3sarge3_all.deb phpldapadmin (0.9.5-3sarge3) stable-security; urgency=high * copy_form.php, rename_form.php, delete_form.php, search.php: Fixes multiple xss vulnerabilities. [CVE-2006-2016, Bug#365313] stable/main/binary-all/phpgroupware-stocks_0.9.16.005-3.sarge5_all.deb stable/main/binary-all/phpgroupware-fudforum_0.9.16.005-3.sarge5_all.deb stable/main/binary-all/phpgroupware-admin_0.9.16.005-3.sarge5_all.deb stable/main/binary-all/phpgroupware-registration_0.9.16.005-3.sarge5_all.deb stable/main/binary-all/phpgroupware-manual_0.9.16.005-3.sarge5_all.deb stable/main/binary-all/phpgroupware-img_0.9.16.005-3.sarge5_all.deb stable/main/binary-all/phpgroupware_0.9.16.005-3.sarge5_all.deb stable/main/binary-all/phpgroupware-developer-tools_0.9.16.005-3.sarge5_all.deb stable/main/binary-all/phpgroupware-chat_0.9.16.005-3.sarge5_all.deb stable/main/binary-all/phpgroupware-phpbrain_0.9.16.005-3.sarge5_all.deb stable/main/binary-all/phpgroupware-headlines_0.9.16.005-3.sarge5_all.deb stable/main/binary-all/phpgroupware-hr_0.9.16.005-3.sarge5_all.deb stable/main/binary-all/phpgroupware-tts_0.9.16.005-3.sarge5_all.deb stable/main/binary-all/phpgroupware-projects_0.9.16.005-3.sarge5_all.deb stable/main/binary-all/phpgroupware-notes_0.9.16.005-3.sarge5_all.deb stable/main/binary-all/phpgroupware-skel_0.9.16.005-3.sarge5_all.deb stable/main/source/phpgroupware_0.9.16.005-3.sarge5.dsc stable/main/binary-all/phpgroupware-filemanager_0.9.16.005-3.sarge5_all.deb stable/main/binary-all/phpgroupware-polls_0.9.16.005-3.sarge5_all.deb stable/main/binary-all/phpgroupware-dj_0.9.16.005-3.sarge5_all.deb stable/main/binary-all/phpgroupware-calendar_0.9.16.005-3.sarge5_all.deb stable/main/binary-all/phpgroupware-comic_0.9.16.005-3.sarge5_all.deb stable/main/binary-all/phpgroupware-ftp_0.9.16.005-3.sarge5_all.deb stable/main/binary-all/phpgroupware-core_0.9.16.005-3.sarge5_all.deb stable/main/binary-all/phpgroupware-xmlrpc_0.9.16.005-3.sarge5_all.deb stable/main/binary-all/phpgroupware-eldaptir_0.9.16.005-3.sarge5_all.deb stable/main/binary-all/phpgroupware-phpsysinfo_0.9.16.005-3.sarge5_all.deb stable/main/binary-all/phpgroupware-phpgwapi_0.9.16.005-3.sarge5_all.deb stable/main/binary-all/phpgroupware-infolog_0.9.16.005-3.sarge5_all.deb stable/main/binary-all/phpgroupware-wiki_0.9.16.005-3.sarge5_all.deb stable/main/binary-all/phpgroupware-bookmarks_0.9.16.005-3.sarge5_all.deb stable/main/binary-all/phpgroupware-email_0.9.16.005-3.sarge5_all.deb stable/main/source/phpgroupware_0.9.16.005-3.sarge5.diff.gz stable/main/binary-all/phpgroupware-nntp_0.9.16.005-3.sarge5_all.deb stable/main/binary-all/phpgroupware-sitemgr_0.9.16.005-3.sarge5_all.deb stable/main/binary-all/phpgroupware-phonelog_0.9.16.005-3.sarge5_all.deb stable/main/binary-all/phpgroupware-news-admin_0.9.16.005-3.sarge5_all.deb stable/main/binary-all/phpgroupware-forum_0.9.16.005-3.sarge5_all.deb stable/main/binary-all/phpgroupware-soap_0.9.16.005-3.sarge5_all.deb stable/main/binary-all/phpgroupware-qmailldap_0.9.16.005-3.sarge5_all.deb stable/main/binary-all/phpgroupware-addressbook_0.9.16.005-3.sarge5_all.deb stable/main/binary-all/phpgroupware-messenger_0.9.16.005-3.sarge5_all.deb stable/main/binary-all/phpgroupware-preferences_0.9.16.005-3.sarge5_all.deb stable/main/binary-all/phpgroupware-etemplate_0.9.16.005-3.sarge5_all.deb stable/main/binary-all/phpgroupware-felamimail_0.9.16.005-3.sarge5_all.deb stable/main/binary-all/phpgroupware-folders_0.9.16.005-3.sarge5_all.deb stable/main/binary-all/phpgroupware-todo_0.9.16.005-3.sarge5_all.deb stable/main/binary-all/phpgroupware-setup_0.9.16.005-3.sarge5_all.deb phpgroupware (0.9.16.005-3.sarge5) stable-security; urgency=high * Non-maintainer upload for the Security Team * Fixed code injection in fudforum. [fudforum/setup/base/src/register.php.t, CVE-2005-2781] stable/main/source/phpbb2_2.0.13+1-6sarge3.dsc stable/main/binary-all/phpbb2_2.0.13-6sarge3_all.deb stable/main/binary-all/phpbb2-conf-mysql_2.0.13-6sarge3_all.deb stable/main/source/phpbb2_2.0.13+1-6sarge3.diff.gz stable/main/binary-all/phpbb2-languages_2.0.13-6sarge3_all.deb phpbb2 (2.0.13+1-6sarge3) stable-security; urgency=high * Non-maintainer upload by the Security Team. * Fix arbitrary web script execution through missing input sanitising in Font Colour 3 variables. (CVE-2006-1896) stable/main/binary-sparc/perl-debug_5.8.4-8sarge5_sparc.deb stable/main/binary-sparc/perl-base_5.8.4-8sarge5_sparc.deb stable/main/binary-sparc/libperl5.8_5.8.4-8sarge5_sparc.deb stable/main/binary-sparc/libperl-dev_5.8.4-8sarge5_sparc.deb stable/main/binary-sparc/perl_5.8.4-8sarge5_sparc.deb stable/main/binary-sparc/perl-suid_5.8.4-8sarge5_sparc.deb perl (5.8.4-8sarge5) stable; urgency=low * Apply upstream changes #23084 and #23085 to correct problems with the utf8/taint fix and Tk 804.27 . stable/main/binary-s390/perl-base_5.8.4-8sarge5_s390.deb stable/main/binary-s390/libperl5.8_5.8.4-8sarge5_s390.deb stable/main/binary-s390/perl-suid_5.8.4-8sarge5_s390.deb stable/main/binary-s390/libperl-dev_5.8.4-8sarge5_s390.deb stable/main/binary-s390/perl_5.8.4-8sarge5_s390.deb stable/main/binary-s390/perl-debug_5.8.4-8sarge5_s390.deb perl (5.8.4-8sarge5) stable; urgency=low * Apply upstream changes #23084 and #23085 to correct problems with the utf8/taint fix and Tk 804.27 . stable/main/binary-powerpc/perl-base_5.8.4-8sarge5_powerpc.deb stable/main/binary-powerpc/perl-suid_5.8.4-8sarge5_powerpc.deb stable/main/binary-powerpc/perl-debug_5.8.4-8sarge5_powerpc.deb stable/main/binary-powerpc/libperl5.8_5.8.4-8sarge5_powerpc.deb stable/main/binary-powerpc/libperl-dev_5.8.4-8sarge5_powerpc.deb stable/main/binary-powerpc/perl_5.8.4-8sarge5_powerpc.deb perl (5.8.4-8sarge5) stable; urgency=low * Apply upstream changes #23084 and #23085 to correct problems with the utf8/taint fix and Tk 804.27 . stable/main/binary-mipsel/libperl5.8_5.8.4-8sarge5_mipsel.deb stable/main/binary-mipsel/perl-suid_5.8.4-8sarge5_mipsel.deb stable/main/binary-mipsel/perl_5.8.4-8sarge5_mipsel.deb stable/main/binary-mipsel/perl-base_5.8.4-8sarge5_mipsel.deb stable/main/binary-mipsel/libperl-dev_5.8.4-8sarge5_mipsel.deb stable/main/binary-mipsel/perl-debug_5.8.4-8sarge5_mipsel.deb perl (5.8.4-8sarge5) stable; urgency=low * Apply upstream changes #23084 and #23085 to correct problems with the utf8/taint fix and Tk 804.27 . stable/main/binary-mips/perl-suid_5.8.4-8sarge5_mips.deb stable/main/binary-mips/libperl5.8_5.8.4-8sarge5_mips.deb stable/main/binary-mips/perl-base_5.8.4-8sarge5_mips.deb stable/main/binary-mips/libperl-dev_5.8.4-8sarge5_mips.deb stable/main/binary-mips/perl-debug_5.8.4-8sarge5_mips.deb stable/main/binary-mips/perl_5.8.4-8sarge5_mips.deb perl (5.8.4-8sarge5) stable; urgency=low * Apply upstream changes #23084 and #23085 to correct problems with the utf8/taint fix and Tk 804.27 . stable/main/binary-m68k/libperl5.8_5.8.4-8sarge5_m68k.deb stable/main/binary-m68k/perl-debug_5.8.4-8sarge5_m68k.deb stable/main/binary-m68k/perl-base_5.8.4-8sarge5_m68k.deb stable/main/binary-m68k/perl_5.8.4-8sarge5_m68k.deb stable/main/binary-m68k/perl-suid_5.8.4-8sarge5_m68k.deb stable/main/binary-m68k/libperl-dev_5.8.4-8sarge5_m68k.deb perl (5.8.4-8sarge5) stable; urgency=low * Apply upstream changes #23084 and #23085 to correct problems with the utf8/taint fix and Tk 804.27 . stable/main/binary-ia64/perl-debug_5.8.4-8sarge5_ia64.deb stable/main/binary-ia64/perl-base_5.8.4-8sarge5_ia64.deb stable/main/binary-ia64/perl-suid_5.8.4-8sarge5_ia64.deb stable/main/binary-ia64/libperl5.8_5.8.4-8sarge5_ia64.deb stable/main/binary-ia64/libperl-dev_5.8.4-8sarge5_ia64.deb stable/main/binary-ia64/perl_5.8.4-8sarge5_ia64.deb perl (5.8.4-8sarge5) stable; urgency=low * Apply upstream changes #23084 and #23085 to correct problems with the utf8/taint fix and Tk 804.27 . stable/main/binary-hppa/perl-suid_5.8.4-8sarge5_hppa.deb stable/main/binary-hppa/perl-debug_5.8.4-8sarge5_hppa.deb stable/main/binary-hppa/libperl5.8_5.8.4-8sarge5_hppa.deb stable/main/binary-hppa/perl_5.8.4-8sarge5_hppa.deb stable/main/binary-hppa/libperl-dev_5.8.4-8sarge5_hppa.deb stable/main/binary-hppa/perl-base_5.8.4-8sarge5_hppa.deb perl (5.8.4-8sarge5) stable; urgency=low * Apply upstream changes #23084 and #23085 to correct problems with the utf8/taint fix and Tk 804.27 . stable/main/binary-arm/perl-suid_5.8.4-8sarge5_arm.deb stable/main/binary-arm/libperl-dev_5.8.4-8sarge5_arm.deb stable/main/binary-arm/perl_5.8.4-8sarge5_arm.deb stable/main/binary-arm/perl-base_5.8.4-8sarge5_arm.deb stable/main/binary-arm/perl-debug_5.8.4-8sarge5_arm.deb stable/main/binary-arm/libperl5.8_5.8.4-8sarge5_arm.deb perl (5.8.4-8sarge5) stable; urgency=low * Apply upstream changes #23084 and #23085 to correct problems with the utf8/taint fix and Tk 804.27 . stable/main/binary-alpha/perl-suid_5.8.4-8sarge5_alpha.deb stable/main/binary-alpha/libperl-dev_5.8.4-8sarge5_alpha.deb stable/main/binary-alpha/perl_5.8.4-8sarge5_alpha.deb stable/main/binary-alpha/libperl5.8_5.8.4-8sarge5_alpha.deb stable/main/binary-alpha/perl-base_5.8.4-8sarge5_alpha.deb stable/main/binary-alpha/perl-debug_5.8.4-8sarge5_alpha.deb perl (5.8.4-8sarge5) stable; urgency=low * Apply upstream changes #23084 and #23085 to correct problems with the utf8/taint fix and Tk 804.27 . stable/main/binary-i386/libperl-dev_5.8.4-8sarge5_i386.deb stable/main/source/perl_5.8.4-8sarge5.diff.gz stable/main/binary-all/libcgi-fast-perl_5.8.4-8sarge5_all.deb stable/main/source/perl_5.8.4-8sarge5.dsc stable/main/binary-i386/perl-debug_5.8.4-8sarge5_i386.deb stable/main/binary-i386/perl_5.8.4-8sarge5_i386.deb stable/main/binary-i386/libperl5.8_5.8.4-8sarge5_i386.deb stable/main/binary-all/perl-modules_5.8.4-8sarge5_all.deb stable/main/binary-i386/perl-suid_5.8.4-8sarge5_i386.deb stable/main/binary-i386/perl-base_5.8.4-8sarge5_i386.deb stable/main/binary-all/perl-doc_5.8.4-8sarge5_all.deb perl (5.8.4-8sarge5) stable; urgency=low * Apply upstream changes #23084 and #23085 to correct problems with the utf8/taint fix and Tk 804.27 . stable/main/binary-i386/pcmcia-modules-2.4.27-3-686-smp_3.2.5+2sarge1_i386.deb stable/main/binary-i386/pcmcia-modules-2.4.27-3-k6_3.2.5+2sarge1_i386.deb stable/main/binary-i386/pcmcia-modules-2.4.27-3-586tsc_3.2.5+2sarge1_i386.deb stable/main/source/pcmcia-modules-2.4.27-i386_3.2.5+2sarge1.tar.gz stable/main/source/pcmcia-modules-2.4.27-i386_3.2.5+2sarge1.dsc stable/main/binary-i386/pcmcia-modules-2.4.27-3-686_3.2.5+2sarge1_i386.deb stable/main/binary-i386/pcmcia-modules-2.4.27-3-k7_3.2.5+2sarge1_i386.deb stable/main/binary-i386/pcmcia-modules-2.4.27-3-386_3.2.5+2sarge1_i386.deb stable/main/binary-i386/pcmcia-modules-2.4.27-3-k7-smp_3.2.5+2sarge1_i386.deb pcmcia-modules-2.4.27-i386 (3.2.5+2sarge1) stable-security; urgency=low * Build against kernel-image-2.4.27-i386 2.4.27-10sarge2. * Export MODULE_LOC for all commands. * Remove unpack-stamp when cleaning. stable/main/binary-sparc/osiris_4.0.6-1sarge1_sparc.deb stable/main/binary-sparc/osirisd_4.0.6-1sarge1_sparc.deb stable/main/binary-sparc/osirismd_4.0.6-1sarge1_sparc.deb osiris (4.0.6-1sarge1) stable-security; urgency=high * Non-maintainer upload by the Security Team * Applied patch by Ulf Harnhammar to fix arbitrary code execution and other problems [osirisd/logging.c, osirismd/logging.c, CVE-2006-3120] stable/main/binary-s390/osirismd_4.0.6-1sarge1_s390.deb stable/main/binary-s390/osirisd_4.0.6-1sarge1_s390.deb stable/main/binary-s390/osiris_4.0.6-1sarge1_s390.deb osiris (4.0.6-1sarge1) stable-security; urgency=high * Non-maintainer upload by the Security Team * Applied patch by Ulf Harnhammar to fix arbitrary code execution and other problems [osirisd/logging.c, osirismd/logging.c, CVE-2006-3120] stable/main/binary-mipsel/osirismd_4.0.6-1sarge1_mipsel.deb stable/main/binary-mipsel/osirisd_4.0.6-1sarge1_mipsel.deb stable/main/binary-mipsel/osiris_4.0.6-1sarge1_mipsel.deb osiris (4.0.6-1sarge1) stable-security; urgency=high * Non-maintainer upload by the Security Team * Applied patch by Ulf Harnhammar to fix arbitrary code execution and other problems [osirisd/logging.c, osirismd/logging.c, CVE-2006-3120] stable/main/binary-mips/osirismd_4.0.6-1sarge1_mips.deb stable/main/binary-mips/osirisd_4.0.6-1sarge1_mips.deb stable/main/binary-mips/osiris_4.0.6-1sarge1_mips.deb osiris (4.0.6-1sarge1) stable-security; urgency=high * Non-maintainer upload by the Security Team * Applied patch by Ulf Harnhammar to fix arbitrary code execution and other problems [osirisd/logging.c, osirismd/logging.c, CVE-2006-3120] stable/main/binary-m68k/osirisd_4.0.6-1sarge1_m68k.deb stable/main/binary-m68k/osirismd_4.0.6-1sarge1_m68k.deb stable/main/binary-m68k/osiris_4.0.6-1sarge1_m68k.deb osiris (4.0.6-1sarge1) stable-security; urgency=high * Non-maintainer upload by the Security Team * Applied patch by Ulf Harnhammar to fix arbitrary code execution and other problems [osirisd/logging.c, osirismd/logging.c, CVE-2006-3120] stable/main/binary-ia64/osirisd_4.0.6-1sarge1_ia64.deb stable/main/binary-ia64/osirismd_4.0.6-1sarge1_ia64.deb stable/main/binary-ia64/osiris_4.0.6-1sarge1_ia64.deb osiris (4.0.6-1sarge1) stable-security; urgency=high * Non-maintainer upload by the Security Team * Applied patch by Ulf Harnhammar to fix arbitrary code execution and other problems [osirisd/logging.c, osirismd/logging.c, CVE-2006-3120] stable/main/binary-i386/osiris_4.0.6-1sarge1_i386.deb stable/main/binary-i386/osirisd_4.0.6-1sarge1_i386.deb stable/main/binary-i386/osirismd_4.0.6-1sarge1_i386.deb osiris (4.0.6-1sarge1) stable-security; urgency=high * Non-maintainer upload by the Security Team * Applied patch by Ulf Harnhammar to fix arbitrary code execution and other problems [osirisd/logging.c, osirismd/logging.c, CVE-2006-3120] stable/main/binary-hppa/osirismd_4.0.6-1sarge1_hppa.deb stable/main/binary-hppa/osirisd_4.0.6-1sarge1_hppa.deb stable/main/binary-hppa/osiris_4.0.6-1sarge1_hppa.deb osiris (4.0.6-1sarge1) stable-security; urgency=high * Non-maintainer upload by the Security Team * Applied patch by Ulf Harnhammar to fix arbitrary code execution and other problems [osirisd/logging.c, osirismd/logging.c, CVE-2006-3120] stable/main/binary-arm/osirismd_4.0.6-1sarge1_arm.deb stable/main/binary-arm/osiris_4.0.6-1sarge1_arm.deb stable/main/binary-arm/osirisd_4.0.6-1sarge1_arm.deb osiris (4.0.6-1sarge1) stable-security; urgency=high * Non-maintainer upload by the Security Team * Applied patch by Ulf Harnhammar to fix arbitrary code execution and other problems [osirisd/logging.c, osirismd/logging.c, CVE-2006-3120] stable/main/binary-alpha/osirisd_4.0.6-1sarge1_alpha.deb stable/main/binary-alpha/osirismd_4.0.6-1sarge1_alpha.deb stable/main/binary-alpha/osiris_4.0.6-1sarge1_alpha.deb osiris (4.0.6-1sarge1) stable-security; urgency=high * Non-maintainer upload by the Security Team * Applied patch by Ulf Harnhammar to fix arbitrary code execution and other problems [osirisd/logging.c, osirismd/logging.c, CVE-2006-3120] stable/main/binary-powerpc/osirisd_4.0.6-1sarge1_powerpc.deb stable/main/source/osiris_4.0.6-1sarge1.diff.gz stable/main/source/osiris_4.0.6-1sarge1.dsc stable/main/binary-powerpc/osirismd_4.0.6-1sarge1_powerpc.deb stable/main/binary-powerpc/osiris_4.0.6-1sarge1_powerpc.deb osiris (4.0.6-1sarge1) stable-security; urgency=high * Non-maintainer upload by the Security Team * Applied patch by Ulf Harnhammar to fix arbitrary code execution and other problems [osirisd/logging.c, osirismd/logging.c, CVE-2006-3120] stable/main/binary-sparc/openvpn_2.0-1sarge3_sparc.deb openvpn (2.0-1sarge3) stable-security; urgency=low * Sarge security release. - Applied upstream patches to disallow "setenv" to be pushed to clients from the server. (CVE-2006-1629) stable/main/binary-s390/openvpn_2.0-1sarge3_s390.deb openvpn (2.0-1sarge3) stable-security; urgency=low * Sarge security release. - Applied upstream patches to disallow "setenv" to be pushed to clients from the server. (CVE-2006-1629) stable/main/binary-powerpc/openvpn_2.0-1sarge3_powerpc.deb openvpn (2.0-1sarge3) stable-security; urgency=low * Sarge security release. - Applied upstream patches to disallow "setenv" to be pushed to clients from the server. (CVE-2006-1629) stable/main/binary-mipsel/openvpn_2.0-1sarge3_mipsel.deb openvpn (2.0-1sarge3) stable-security; urgency=low * Sarge security release. - Applied upstream patches to disallow "setenv" to be pushed to clients from the server. (CVE-2006-1629) stable/main/binary-mips/openvpn_2.0-1sarge3_mips.deb openvpn (2.0-1sarge3) stable-security; urgency=low * Sarge security release. - Applied upstream patches to disallow "setenv" to be pushed to clients from the server. (CVE-2006-1629) stable/main/binary-m68k/openvpn_2.0-1sarge3_m68k.deb openvpn (2.0-1sarge3) stable-security; urgency=low * Sarge security release. - Applied upstream patches to disallow "setenv" to be pushed to clients from the server. (CVE-2006-1629) stable/main/binary-ia64/openvpn_2.0-1sarge3_ia64.deb openvpn (2.0-1sarge3) stable-security; urgency=low * Sarge security release. - Applied upstream patches to disallow "setenv" to be pushed to clients from the server. (CVE-2006-1629) stable/main/binary-hppa/openvpn_2.0-1sarge3_hppa.deb openvpn (2.0-1sarge3) stable-security; urgency=low * Sarge security release. - Applied upstream patches to disallow "setenv" to be pushed to clients from the server. (CVE-2006-1629) stable/main/binary-arm/openvpn_2.0-1sarge3_arm.deb openvpn (2.0-1sarge3) stable-security; urgency=low * Sarge security release. - Applied upstream patches to disallow "setenv" to be pushed to clients from the server. (CVE-2006-1629) stable/main/binary-alpha/openvpn_2.0-1sarge3_alpha.deb openvpn (2.0-1sarge3) stable-security; urgency=low * Sarge security release. - Applied upstream patches to disallow "setenv" to be pushed to clients from the server. (CVE-2006-1629) stable/main/source/openvpn_2.0-1sarge3.dsc stable/main/binary-i386/openvpn_2.0-1sarge3_i386.deb stable/main/source/openvpn_2.0-1sarge3.diff.gz openvpn (2.0-1sarge3) stable-security; urgency=low * Sarge security release. - Applied upstream patches to disallow "setenv" to be pushed to clients from the server. (CVE-2006-1629) stable/main/binary-s390/openoffice.org-gtk-gnome_1.1.3-9sarge3_s390.deb stable/main/binary-s390/openoffice.org-bin_1.1.3-9sarge3_s390.deb stable/main/binary-s390/openoffice.org-kde_1.1.3-9sarge3_s390.deb stable/main/binary-s390/openoffice.org-evolution_1.1.3-9sarge3_s390.deb stable/main/binary-s390/openoffice.org-dev_1.1.3-9sarge3_s390.deb openoffice.org (1.1.3-9sarge3) stable-security; urgency=high * ooo-build/patches/OOO_1_1/sax-xml-2-utf8-converter-extra-1.1.x.diff: add addiitional patch for the file format patch needed for OOo < 1.1.5 stable/main/binary-powerpc/openoffice.org-gtk-gnome_1.1.3-9sarge3_powerpc.deb stable/main/binary-powerpc/openoffice.org-kde_1.1.3-9sarge3_powerpc.deb stable/main/binary-powerpc/openoffice.org-bin_1.1.3-9sarge3_powerpc.deb stable/main/binary-powerpc/openoffice.org-dev_1.1.3-9sarge3_powerpc.deb stable/main/binary-powerpc/openoffice.org-evolution_1.1.3-9sarge3_powerpc.deb openoffice.org (1.1.3-9sarge3) stable-security; urgency=high * ooo-build/patches/OOO_1_1/sax-xml-2-utf8-converter-extra-1.1.x.diff: add addiitional patch for the file format patch needed for OOo < 1.1.5 stable/main/binary-all/openoffice.org-l10n-hu_1.1.3-9sarge3_all.deb stable/main/binary-all/openoffice.org-l10n-ca_1.1.3-9sarge3_all.deb stable/main/binary-i386/openoffice.org-dev_1.1.3-9sarge3_i386.deb stable/main/binary-all/openoffice.org-l10n-he_1.1.3-9sarge3_all.deb stable/main/binary-all/openoffice.org-l10n-zu_1.1.3-9sarge3_all.deb stable/main/binary-all/openoffice.org-l10n-eu_1.1.3-9sarge3_all.deb stable/main/binary-all/openoffice.org-l10n-zh-tw_1.1.3-9sarge3_all.deb stable/main/binary-all/openoffice.org-l10n-fr_1.1.3-9sarge3_all.deb stable/main/binary-all/openoffice.org-l10n-gl_1.1.3-9sarge3_all.deb stable/main/binary-all/openoffice.org-l10n-de_1.1.3-9sarge3_all.deb stable/main/binary-all/openoffice.org-l10n-it_1.1.3-9sarge3_all.deb stable/main/binary-all/openoffice.org-l10n-nb_1.1.3-9sarge3_all.deb stable/main/binary-all/openoffice.org-l10n-el_1.1.3-9sarge3_all.deb stable/main/binary-all/openoffice.org-l10n-en_1.1.3-9sarge3_all.deb stable/main/binary-all/openoffice.org-l10n-kn_1.1.3-9sarge3_all.deb stable/main/binary-all/openoffice.org-thesaurus-en-us_1.1.3-9sarge3_all.deb stable/main/binary-sparc/openoffice.org-dev_1.1.3-9sarge3_sparc.deb stable/main/binary-all/openoffice.org-l10n-nn_1.1.3-9sarge3_all.deb stable/main/binary-all/openoffice.org-l10n-ko_1.1.3-9sarge3_all.deb stable/main/binary-all/openoffice.org-l10n-zh-cn_1.1.3-9sarge3_all.deb stable/main/binary-all/openoffice.org-l10n-da_1.1.3-9sarge3_all.deb stable/main/binary-all/openoffice.org-l10n-sv_1.1.3-9sarge3_all.deb stable/main/binary-all/openoffice.org-l10n-tr_1.1.3-9sarge3_all.deb stable/main/binary-all/openoffice.org-l10n-af_1.1.3-9sarge3_all.deb stable/main/binary-all/openoffice.org-l10n-fi_1.1.3-9sarge3_all.deb stable/main/binary-all/openoffice.org-l10n-nl_1.1.3-9sarge3_all.deb stable/main/binary-all/openoffice.org-l10n-ar_1.1.3-9sarge3_all.deb stable/main/binary-all/openoffice.org-l10n-cy_1.1.3-9sarge3_all.deb stable/main/binary-i386/openoffice.org-bin_1.1.3-9sarge3_i386.deb stable/main/binary-i386/openoffice.org-evolution_1.1.3-9sarge3_i386.deb stable/main/binary-i386/openoffice.org-gtk-gnome_1.1.3-9sarge3_i386.deb stable/main/binary-all/openoffice.org-l10n-pt-br_1.1.3-9sarge3_all.deb stable/main/binary-sparc/openoffice.org-gtk-gnome_1.1.3-9sarge3_sparc.deb stable/main/binary-all/openoffice.org-l10n-pl_1.1.3-9sarge3_all.deb stable/main/binary-all/openoffice.org-l10n-sk_1.1.3-9sarge3_all.deb stable/main/binary-all/ttf-opensymbol_1.1.3-9sarge3_all.deb stable/main/binary-all/openoffice.org-l10n-th_1.1.3-9sarge3_all.deb stable/main/binary-all/openoffice.org-l10n-cs_1.1.3-9sarge3_all.deb stable/main/source/openoffice.org_1.1.3-9sarge3.diff.gz stable/main/binary-all/openoffice.org-l10n-ru_1.1.3-9sarge3_all.deb stable/main/binary-all/openoffice.org-mimelnk_1.1.3-9sarge3_all.deb stable/main/binary-all/openoffice.org-l10n-es_1.1.3-9sarge3_all.deb stable/main/binary-all/openoffice.org-l10n-ja_1.1.3-9sarge3_all.deb stable/main/binary-all/openoffice.org-l10n-lt_1.1.3-9sarge3_all.deb stable/main/binary-all/openoffice.org-l10n-sl_1.1.3-9sarge3_all.deb stable/main/binary-sparc/openoffice.org-evolution_1.1.3-9sarge3_sparc.deb stable/main/binary-sparc/openoffice.org-bin_1.1.3-9sarge3_sparc.deb stable/main/binary-sparc/openoffice.org-kde_1.1.3-9sarge3_sparc.deb stable/main/binary-all/openoffice.org-l10n-ns_1.1.3-9sarge3_all.deb stable/main/binary-all/openoffice.org_1.1.3-9sarge3_all.deb stable/main/binary-i386/openoffice.org-kde_1.1.3-9sarge3_i386.deb stable/main/binary-all/openoffice.org-l10n-hi_1.1.3-9sarge3_all.deb stable/main/binary-all/openoffice.org-l10n-pt_1.1.3-9sarge3_all.deb stable/main/binary-all/openoffice.org-l10n-et_1.1.3-9sarge3_all.deb stable/main/source/openoffice.org_1.1.3-9sarge3.dsc stable/main/binary-all/openoffice.org-l10n-tn_1.1.3-9sarge3_all.deb openoffice.org (1.1.3-9sarge3) stable-security; urgency=high * ooo-build/patches/OOO_1_1/sax-xml-2-utf8-converter-extra-1.1.x.diff: add addiitional patch for the file format patch needed for OOo < 1.1.5 stable/main/binary-sparc/octaviz_0.4.0-10sarge1_sparc.deb octaviz (0.4.0-10sarge1) stable; urgency=low +++ Changes by Thomas Weber * recompile to pick up correct Octave version (Closes: #341676, #304162) * Apply 40-cast-pointer-long.patch. This should bring all released stable architectures back in sync stable/main/binary-s390/octaviz_0.4.0-10sarge1_s390.deb octaviz (0.4.0-10sarge1) stable; urgency=low +++ Changes by Thomas Weber * recompile to pick up correct Octave version (Closes: #341676, #304162) * Apply 40-cast-pointer-long.patch. This should bring all released stable architectures back in sync stable/main/binary-powerpc/octaviz_0.4.0-10sarge1_powerpc.deb octaviz (0.4.0-10sarge1) stable; urgency=low +++ Changes by Thomas Weber * recompile to pick up correct Octave version (Closes: #341676, #304162) * Apply 40-cast-pointer-long.patch. This should bring all released stable architectures back in sync stable/main/binary-mipsel/octaviz_0.4.0-10sarge1_mipsel.deb octaviz (0.4.0-10sarge1) stable; urgency=low +++ Changes by Thomas Weber * recompile to pick up correct Octave version (Closes: #341676, #304162) * Apply 40-cast-pointer-long.patch. This should bring all released stable architectures back in sync stable/main/binary-mips/octaviz_0.4.0-10sarge1_mips.deb octaviz (0.4.0-10sarge1) stable; urgency=low +++ Changes by Thomas Weber * recompile to pick up correct Octave version (Closes: #341676, #304162) * Apply 40-cast-pointer-long.patch. This should bring all released stable architectures back in sync stable/main/binary-m68k/octaviz_0.4.0-10sarge1_m68k.deb octaviz (0.4.0-10sarge1) stable; urgency=low +++ Changes by Thomas Weber * recompile to pick up correct Octave version (Closes: #341676, #304162) * Apply 40-cast-pointer-long.patch. This should bring all released stable architectures back in sync stable/main/binary-hppa/octaviz_0.4.0-10sarge1_hppa.deb octaviz (0.4.0-10sarge1) stable; urgency=low +++ Changes by Thomas Weber * recompile to pick up correct Octave version (Closes: #341676, #304162) * Apply 40-cast-pointer-long.patch. This should bring all released stable architectures back in sync stable/main/binary-arm/octaviz_0.4.0-10sarge1_arm.deb octaviz (0.4.0-10sarge1) stable; urgency=low +++ Changes by Thomas Weber * recompile to pick up correct Octave version (Closes: #341676, #304162) * Apply 40-cast-pointer-long.patch. This should bring all released stable architectures back in sync stable/main/source/octaviz_0.4.0-10sarge1.diff.gz stable/main/source/octaviz_0.4.0-10sarge1.dsc stable/main/binary-i386/octaviz_0.4.0-10sarge1_i386.deb octaviz (0.4.0-10sarge1) stable; urgency=low +++ Changes by Thomas Weber * recompile to pick up correct Octave version (Closes: #341676, #304162) * Apply 40-cast-pointer-long.patch. This should bring all released stable architectures back in sync stable/main/binary-i386/ndiswrapper-modules-2.6.8-3-k7_1.1-2sarge1_i386.deb stable/main/binary-i386/ndiswrapper-modules-2.6.8-3-k7-smp_1.1-2sarge1_i386.deb stable/main/binary-i386/ndiswrapper-modules-2.6.8-3-386_1.1-2sarge1_i386.deb stable/main/binary-i386/ndiswrapper-modules-2.6.8-3-686_1.1-2sarge1_i386.deb stable/main/binary-i386/ndiswrapper-modules-2.6.8-3-686-smp_1.1-2sarge1_i386.deb stable/main/source/ndiswrapper-modules-i386_1.1-2sarge1.tar.gz stable/main/source/ndiswrapper-modules-i386_1.1-2sarge1.dsc ndiswrapper-modules-i386 (1.1-2sarge1) stable-security; urgency=high * Non-maintainer upload by the Security Team * Rebuild for -3 ABI stable/main/binary-sparc/ncompress_4.2.4-15sarge2_sparc.deb ncompress (4.2.4-15sarge2) stable-security; urgency=high * Non-maintainer upload by the Security Team * Correction of the security patch by Ludwig Nussel [compress42.c, CVE-2006-1168] stable/main/binary-s390/ncompress_4.2.4-15sarge2_s390.deb ncompress (4.2.4-15sarge2) stable-security; urgency=high * Non-maintainer upload by the Security Team * Correction of the security patch by Ludwig Nussel [compress42.c, CVE-2006-1168] stable/main/binary-mipsel/ncompress_4.2.4-15sarge2_mipsel.deb ncompress (4.2.4-15sarge2) stable-security; urgency=high * Non-maintainer upload by the Security Team * Correction of the security patch by Ludwig Nussel [compress42.c, CVE-2006-1168] stable/main/binary-mips/ncompress_4.2.4-15sarge2_mips.deb ncompress (4.2.4-15sarge2) stable-security; urgency=high * Non-maintainer upload by the Security Team * Correction of the security patch by Ludwig Nussel [compress42.c, CVE-2006-1168] stable/main/binary-m68k/ncompress_4.2.4-15sarge2_m68k.deb ncompress (4.2.4-15sarge2) stable-security; urgency=high * Non-maintainer upload by the Security Team * Correction of the security patch by Ludwig Nussel [compress42.c, CVE-2006-1168] stable/main/binary-ia64/ncompress_4.2.4-15sarge2_ia64.deb ncompress (4.2.4-15sarge2) stable-security; urgency=high * Non-maintainer upload by the Security Team * Correction of the security patch by Ludwig Nussel [compress42.c, CVE-2006-1168] stable/main/binary-i386/ncompress_4.2.4-15sarge2_i386.deb ncompress (4.2.4-15sarge2) stable-security; urgency=high * Non-maintainer upload by the Security Team * Correction of the security patch by Ludwig Nussel [compress42.c, CVE-2006-1168] stable/main/binary-hppa/ncompress_4.2.4-15sarge2_hppa.deb ncompress (4.2.4-15sarge2) stable-security; urgency=high * Non-maintainer upload by the Security Team * Correction of the security patch by Ludwig Nussel [compress42.c, CVE-2006-1168] stable/main/binary-arm/ncompress_4.2.4-15sarge2_arm.deb ncompress (4.2.4-15sarge2) stable-security; urgency=high * Non-maintainer upload by the Security Team * Correction of the security patch by Ludwig Nussel [compress42.c, CVE-2006-1168] stable/main/binary-alpha/ncompress_4.2.4-15sarge2_alpha.deb ncompress (4.2.4-15sarge2) stable-security; urgency=high * Non-maintainer upload by the Security Team * Correction of the security patch by Ludwig Nussel [compress42.c, CVE-2006-1168] stable/main/source/ncompress_4.2.4-15sarge2.diff.gz stable/main/binary-powerpc/ncompress_4.2.4-15sarge2_powerpc.deb stable/main/source/ncompress_4.2.4-15sarge2.dsc ncompress (4.2.4-15sarge2) stable-security; urgency=high * Non-maintainer upload by the Security Team * Correction of the security patch by Ludwig Nussel [compress42.c, CVE-2006-1168] stable/main/binary-sparc/nagios-text_1.3-cvs.20050402-2.sarge.2_sparc.deb stable/main/binary-sparc/nagios-mysql_1.3-cvs.20050402-2.sarge.2_sparc.deb stable/main/binary-sparc/nagios-pgsql_1.3-cvs.20050402-2.sarge.2_sparc.deb nagios (2:1.3-cvs.20050402-2.sarge.2) stable-security; urgency=high * Non-maintainer upload by the Security Team * Add overflow protection for Content-Length [cgi/getcgi.c, debian/patches/99999_CVE-2006-2162.dpatch] stable/main/binary-s390/nagios-mysql_1.3-cvs.20050402-2.sarge.2_s390.deb stable/main/binary-s390/nagios-pgsql_1.3-cvs.20050402-2.sarge.2_s390.deb stable/main/binary-s390/nagios-text_1.3-cvs.20050402-2.sarge.2_s390.deb nagios (2:1.3-cvs.20050402-2.sarge.2) stable-security; urgency=high * Non-maintainer upload by the Security Team * Add overflow protection for Content-Length [cgi/getcgi.c, debian/patches/99999_CVE-2006-2162.dpatch] stable/main/binary-powerpc/nagios-text_1.3-cvs.20050402-2.sarge.2_powerpc.deb stable/main/binary-powerpc/nagios-pgsql_1.3-cvs.20050402-2.sarge.2_powerpc.deb stable/main/binary-powerpc/nagios-mysql_1.3-cvs.20050402-2.sarge.2_powerpc.deb nagios (2:1.3-cvs.20050402-2.sarge.2) stable-security; urgency=high * Non-maintainer upload by the Security Team * Add overflow protection for Content-Length [cgi/getcgi.c, debian/patches/99999_CVE-2006-2162.dpatch] stable/main/binary-mipsel/nagios-text_1.3-cvs.20050402-2.sarge.2_mipsel.deb stable/main/binary-mipsel/nagios-mysql_1.3-cvs.20050402-2.sarge.2_mipsel.deb stable/main/binary-mipsel/nagios-pgsql_1.3-cvs.20050402-2.sarge.2_mipsel.deb nagios (2:1.3-cvs.20050402-2.sarge.2) stable-security; urgency=high * Non-maintainer upload by the Security Team * Add overflow protection for Content-Length [cgi/getcgi.c, debian/patches/99999_CVE-2006-2162.dpatch] stable/main/binary-mips/nagios-pgsql_1.3-cvs.20050402-2.sarge.2_mips.deb stable/main/binary-mips/nagios-text_1.3-cvs.20050402-2.sarge.2_mips.deb stable/main/binary-mips/nagios-mysql_1.3-cvs.20050402-2.sarge.2_mips.deb nagios (2:1.3-cvs.20050402-2.sarge.2) stable-security; urgency=high * Non-maintainer upload by the Security Team * Add overflow protection for Content-Length [cgi/getcgi.c, debian/patches/99999_CVE-2006-2162.dpatch] stable/main/binary-m68k/nagios-text_1.3-cvs.20050402-2.sarge.2_m68k.deb stable/main/binary-m68k/nagios-pgsql_1.3-cvs.20050402-2.sarge.2_m68k.deb stable/main/binary-m68k/nagios-mysql_1.3-cvs.20050402-2.sarge.2_m68k.deb nagios (2:1.3-cvs.20050402-2.sarge.2) stable-security; urgency=high * Non-maintainer upload by the Security Team * Add overflow protection for Content-Length [cgi/getcgi.c, debian/patches/99999_CVE-2006-2162.dpatch] stable/main/binary-ia64/nagios-pgsql_1.3-cvs.20050402-2.sarge.2_ia64.deb stable/main/binary-ia64/nagios-text_1.3-cvs.20050402-2.sarge.2_ia64.deb stable/main/binary-ia64/nagios-mysql_1.3-cvs.20050402-2.sarge.2_ia64.deb nagios (2:1.3-cvs.20050402-2.sarge.2) stable-security; urgency=high * Non-maintainer upload by the Security Team * Add overflow protection for Content-Length [cgi/getcgi.c, debian/patches/99999_CVE-2006-2162.dpatch] stable/main/binary-hppa/nagios-pgsql_1.3-cvs.20050402-2.sarge.2_hppa.deb stable/main/binary-hppa/nagios-text_1.3-cvs.20050402-2.sarge.2_hppa.deb stable/main/binary-hppa/nagios-mysql_1.3-cvs.20050402-2.sarge.2_hppa.deb nagios (2:1.3-cvs.20050402-2.sarge.2) stable-security; urgency=high * Non-maintainer upload by the Security Team * Add overflow protection for Content-Length [cgi/getcgi.c, debian/patches/99999_CVE-2006-2162.dpatch] stable/main/binary-arm/nagios-pgsql_1.3-cvs.20050402-2.sarge.2_arm.deb stable/main/binary-arm/nagios-mysql_1.3-cvs.20050402-2.sarge.2_arm.deb stable/main/binary-arm/nagios-text_1.3-cvs.20050402-2.sarge.2_arm.deb nagios (2:1.3-cvs.20050402-2.sarge.2) stable-security; urgency=high * Non-maintainer upload by the Security Team * Add overflow protection for Content-Length [cgi/getcgi.c, debian/patches/99999_CVE-2006-2162.dpatch] stable/main/binary-alpha/nagios-pgsql_1.3-cvs.20050402-2.sarge.2_alpha.deb stable/main/binary-alpha/nagios-text_1.3-cvs.20050402-2.sarge.2_alpha.deb stable/main/binary-alpha/nagios-mysql_1.3-cvs.20050402-2.sarge.2_alpha.deb nagios (2:1.3-cvs.20050402-2.sarge.2) stable-security; urgency=high * Non-maintainer upload by the Security Team * Add overflow protection for Content-Length [cgi/getcgi.c, debian/patches/99999_CVE-2006-2162.dpatch] stable/main/binary-i386/nagios-mysql_1.3-cvs.20050402-2.sarge.2_i386.deb stable/main/source/nagios_1.3-cvs.20050402-2.sarge.2.diff.gz stable/main/binary-all/nagios-common_1.3-cvs.20050402-2.sarge.2_all.deb stable/main/binary-i386/nagios-pgsql_1.3-cvs.20050402-2.sarge.2_i386.deb stable/main/source/nagios_1.3-cvs.20050402-2.sarge.2.dsc stable/main/binary-i386/nagios-text_1.3-cvs.20050402-2.sarge.2_i386.deb nagios (2:1.3-cvs.20050402-2.sarge.2) stable-security; urgency=high * Non-maintainer upload by the Security Team * Add overflow protection for Content-Length [cgi/getcgi.c, debian/patches/99999_CVE-2006-2162.dpatch] stable/main/binary-sparc/libmysqlclient14-dev_4.1.11a-4sarge5_sparc.deb stable/main/binary-sparc/mysql-server-4.1_4.1.11a-4sarge5_sparc.deb stable/main/binary-sparc/libmysqlclient14_4.1.11a-4sarge5_sparc.deb stable/main/binary-sparc/mysql-client-4.1_4.1.11a-4sarge5_sparc.deb mysql-dfsg-4.1 (4.1.11a-4sarge5) stable-security; urgency=low * Security upload prepared for the security team by the Debian MySQL package maintainers. * Fixed DoS bug where any user could crash the server with "SELECT str_to_date(1, NULL);" (CVE-2006-3081). The vulnerability was discovered by Kanatoko <anvil@jumperz.net>. Closes: #373913 * Fixed DoS bug where any user could crash the server with "SELECT date_format('%d%s', 1); (CVE-2006-3469). The vulnerability was discovered by Maillefer Jean-David <jean-david@kesako.ch> and filed as MySQL bug #20729. Closes: #375694 stable/main/binary-s390/libmysqlclient14_4.1.11a-4sarge5_s390.deb stable/main/binary-s390/libmysqlclient14-dev_4.1.11a-4sarge5_s390.deb stable/main/binary-s390/mysql-client-4.1_4.1.11a-4sarge5_s390.deb stable/main/binary-s390/mysql-server-4.1_4.1.11a-4sarge5_s390.deb mysql-dfsg-4.1 (4.1.11a-4sarge5) stable-security; urgency=low * Security upload prepared for the security team by the Debian MySQL package maintainers. * Fixed DoS bug where any user could crash the server with "SELECT str_to_date(1, NULL);" (CVE-2006-3081). The vulnerability was discovered by Kanatoko <anvil@jumperz.net>. Closes: #373913 * Fixed DoS bug where any user could crash the server with "SELECT date_format('%d%s', 1); (CVE-2006-3469). The vulnerability was discovered by Maillefer Jean-David <jean-david@kesako.ch> and filed as MySQL bug #20729. Closes: #375694 stable/main/binary-powerpc/mysql-client-4.1_4.1.11a-4sarge5_powerpc.deb stable/main/binary-powerpc/libmysqlclient14-dev_4.1.11a-4sarge5_powerpc.deb stable/main/binary-powerpc/libmysqlclient14_4.1.11a-4sarge5_powerpc.deb stable/main/binary-powerpc/mysql-server-4.1_4.1.11a-4sarge5_powerpc.deb mysql-dfsg-4.1 (4.1.11a-4sarge5) stable-security; urgency=low * Security upload prepared for the security team by the Debian MySQL package maintainers. * Fixed DoS bug where any user could crash the server with "SELECT str_to_date(1, NULL);" (CVE-2006-3081). The vulnerability was discovered by Kanatoko <anvil@jumperz.net>. Closes: #373913 * Fixed DoS bug where any user could crash the server with "SELECT date_format('%d%s', 1); (CVE-2006-3469). The vulnerability was discovered by Maillefer Jean-David <jean-david@kesako.ch> and filed as MySQL bug #20729. Closes: #375694 stable/main/binary-mipsel/mysql-client-4.1_4.1.11a-4sarge5_mipsel.deb stable/main/binary-mipsel/libmysqlclient14_4.1.11a-4sarge5_mipsel.deb stable/main/binary-mipsel/mysql-server-4.1_4.1.11a-4sarge5_mipsel.deb stable/main/binary-mipsel/libmysqlclient14-dev_4.1.11a-4sarge5_mipsel.deb mysql-dfsg-4.1 (4.1.11a-4sarge5) stable-security; urgency=low * Security upload prepared for the security team by the Debian MySQL package maintainers. * Fixed DoS bug where any user could crash the server with "SELECT str_to_date(1, NULL);" (CVE-2006-3081). The vulnerability was discovered by Kanatoko <anvil@jumperz.net>. Closes: #373913 * Fixed DoS bug where any user could crash the server with "SELECT date_format('%d%s', 1); (CVE-2006-3469). The vulnerability was discovered by Maillefer Jean-David <jean-david@kesako.ch> and filed as MySQL bug #20729. Closes: #375694 stable/main/binary-mips/libmysqlclient14-dev_4.1.11a-4sarge5_mips.deb stable/main/binary-mips/mysql-client-4.1_4.1.11a-4sarge5_mips.deb stable/main/binary-mips/libmysqlclient14_4.1.11a-4sarge5_mips.deb stable/main/binary-mips/mysql-server-4.1_4.1.11a-4sarge5_mips.deb mysql-dfsg-4.1 (4.1.11a-4sarge5) stable-security; urgency=low * Security upload prepared for the security team by the Debian MySQL package maintainers. * Fixed DoS bug where any user could crash the server with "SELECT str_to_date(1, NULL);" (CVE-2006-3081). The vulnerability was discovered by Kanatoko <anvil@jumperz.net>. Closes: #373913 * Fixed DoS bug where any user could crash the server with "SELECT date_format('%d%s', 1); (CVE-2006-3469). The vulnerability was discovered by Maillefer Jean-David <jean-david@kesako.ch> and filed as MySQL bug #20729. Closes: #375694 stable/main/binary-m68k/mysql-client-4.1_4.1.11a-4sarge5_m68k.deb stable/main/binary-m68k/libmysqlclient14-dev_4.1.11a-4sarge5_m68k.deb stable/main/binary-m68k/mysql-server-4.1_4.1.11a-4sarge5_m68k.deb stable/main/binary-m68k/libmysqlclient14_4.1.11a-4sarge5_m68k.deb mysql-dfsg-4.1 (4.1.11a-4sarge5) stable-security; urgency=low * Security upload prepared for the security team by the Debian MySQL package maintainers. * Fixed DoS bug where any user could crash the server with "SELECT str_to_date(1, NULL);" (CVE-2006-3081). The vulnerability was discovered by Kanatoko <anvil@jumperz.net>. Closes: #373913 * Fixed DoS bug where any user could crash the server with "SELECT date_format('%d%s', 1); (CVE-2006-3469). The vulnerability was discovered by Maillefer Jean-David <jean-david@kesako.ch> and filed as MySQL bug #20729. Closes: #375694 stable/main/binary-ia64/libmysqlclient14_4.1.11a-4sarge5_ia64.deb stable/main/binary-ia64/mysql-client-4.1_4.1.11a-4sarge5_ia64.deb stable/main/binary-ia64/mysql-server-4.1_4.1.11a-4sarge5_ia64.deb stable/main/binary-ia64/libmysqlclient14-dev_4.1.11a-4sarge5_ia64.deb mysql-dfsg-4.1 (4.1.11a-4sarge5) stable-security; urgency=low * Security upload prepared for the security team by the Debian MySQL package maintainers. * Fixed DoS bug where any user could crash the server with "SELECT str_to_date(1, NULL);" (CVE-2006-3081). The vulnerability was discovered by Kanatoko <anvil@jumperz.net>. Closes: #373913 * Fixed DoS bug where any user could crash the server with "SELECT date_format('%d%s', 1); (CVE-2006-3469). The vulnerability was discovered by Maillefer Jean-David <jean-david@kesako.ch> and filed as MySQL bug #20729. Closes: #375694 stable/main/binary-hppa/libmysqlclient14_4.1.11a-4sarge5_hppa.deb stable/main/binary-hppa/libmysqlclient14-dev_4.1.11a-4sarge5_hppa.deb stable/main/binary-hppa/mysql-server-4.1_4.1.11a-4sarge5_hppa.deb stable/main/binary-hppa/mysql-client-4.1_4.1.11a-4sarge5_hppa.deb mysql-dfsg-4.1 (4.1.11a-4sarge5) stable-security; urgency=low * Security upload prepared for the security team by the Debian MySQL package maintainers. * Fixed DoS bug where any user could crash the server with "SELECT str_to_date(1, NULL);" (CVE-2006-3081). The vulnerability was discovered by Kanatoko <anvil@jumperz.net>. Closes: #373913 * Fixed DoS bug where any user could crash the server with "SELECT date_format('%d%s', 1); (CVE-2006-3469). The vulnerability was discovered by Maillefer Jean-David <jean-david@kesako.ch> and filed as MySQL bug #20729. Closes: #375694 stable/main/binary-arm/libmysqlclient14_4.1.11a-4sarge5_arm.deb stable/main/binary-arm/mysql-server-4.1_4.1.11a-4sarge5_arm.deb stable/main/binary-arm/libmysqlclient14-dev_4.1.11a-4sarge5_arm.deb stable/main/binary-arm/mysql-client-4.1_4.1.11a-4sarge5_arm.deb mysql-dfsg-4.1 (4.1.11a-4sarge5) stable-security; urgency=low * Security upload prepared for the security team by the Debian MySQL package maintainers. * Fixed DoS bug where any user could crash the server with "SELECT str_to_date(1, NULL);" (CVE-2006-3081). The vulnerability was discovered by Kanatoko <anvil@jumperz.net>. Closes: #373913 * Fixed DoS bug where any user could crash the server with "SELECT date_format('%d%s', 1); (CVE-2006-3469). The vulnerability was discovered by Maillefer Jean-David <jean-david@kesako.ch> and filed as MySQL bug #20729. Closes: #375694 stable/main/binary-alpha/libmysqlclient14_4.1.11a-4sarge5_alpha.deb stable/main/binary-alpha/mysql-client-4.1_4.1.11a-4sarge5_alpha.deb stable/main/binary-alpha/libmysqlclient14-dev_4.1.11a-4sarge5_alpha.deb stable/main/binary-alpha/mysql-server-4.1_4.1.11a-4sarge5_alpha.deb mysql-dfsg-4.1 (4.1.11a-4sarge5) stable-security; urgency=low * Security upload prepared for the security team by the Debian MySQL package maintainers. * Fixed DoS bug where any user could crash the server with "SELECT str_to_date(1, NULL);" (CVE-2006-3081). The vulnerability was discovered by Kanatoko <anvil@jumperz.net>. Closes: #373913 * Fixed DoS bug where any user could crash the server with "SELECT date_format('%d%s', 1); (CVE-2006-3469). The vulnerability was discovered by Maillefer Jean-David <jean-david@kesako.ch> and filed as MySQL bug #20729. Closes: #375694 stable/main/binary-all/mysql-common-4.1_4.1.11a-4sarge5_all.deb stable/main/binary-i386/mysql-client-4.1_4.1.11a-4sarge5_i386.deb stable/main/source/mysql-dfsg-4.1_4.1.11a-4sarge5.dsc stable/main/source/mysql-dfsg-4.1_4.1.11a-4sarge5.diff.gz stable/main/binary-i386/mysql-server-4.1_4.1.11a-4sarge5_i386.deb stable/main/binary-i386/libmysqlclient14_4.1.11a-4sarge5_i386.deb stable/main/binary-i386/libmysqlclient14-dev_4.1.11a-4sarge5_i386.deb mysql-dfsg-4.1 (4.1.11a-4sarge5) stable-security; urgency=low * Security upload prepared for the security team by the Debian MySQL package maintainers. * Fixed DoS bug where any user could crash the server with "SELECT str_to_date(1, NULL);" (CVE-2006-3081). The vulnerability was discovered by Kanatoko <anvil@jumperz.net>. Closes: #373913 * Fixed DoS bug where any user could crash the server with "SELECT date_format('%d%s', 1); (CVE-2006-3469). The vulnerability was discovered by Maillefer Jean-David <jean-david@kesako.ch> and filed as MySQL bug #20729. Closes: #375694 stable/main/binary-sparc/mysql-server_4.0.24-10sarge2_sparc.deb stable/main/binary-sparc/libmysqlclient12-dev_4.0.24-10sarge2_sparc.deb stable/main/binary-sparc/mysql-client_4.0.24-10sarge2_sparc.deb stable/main/binary-sparc/libmysqlclient12_4.0.24-10sarge2_sparc.deb mysql-dfsg (4.0.24-10sarge2) stable-security; urgency=low * Security upload prepared for the security team by the debian mysql package maintainers. * Extracted upstream patch to fix from the diff of 4.1.18 and 4.1.19 to fix the following bugs: - When sending a specifically malformed login packet, the server fills the response with uninitialized memory content which could contain sensitive information. (CVE-2006-1516) - An authenticated user could read random memory from MySQL server, by taking advantage of a non checked packet length. (CVE-2006-1517) - An authenticated user could remotely execute arbitrary commands by taking advantage of a stack overflow. (CVE-2006-1518) Closes: #366043, #366048 * Backported upstream patch to fix a bug which allows local users to bypass logging mechanisms via SQL queries that contain the NULL character. (CVE-2006-0903). Closes: #366162 stable/main/binary-s390/mysql-server_4.0.24-10sarge2_s390.deb stable/main/binary-s390/libmysqlclient12-dev_4.0.24-10sarge2_s390.deb stable/main/binary-s390/libmysqlclient12_4.0.24-10sarge2_s390.deb stable/main/binary-s390/mysql-client_4.0.24-10sarge2_s390.deb mysql-dfsg (4.0.24-10sarge2) stable-security; urgency=low * Security upload prepared for the security team by the debian mysql package maintainers. * Extracted upstream patch to fix from the diff of 4.1.18 and 4.1.19 to fix the following bugs: - When sending a specifically malformed login packet, the server fills the response with uninitialized memory content which could contain sensitive information. (CVE-2006-1516) - An authenticated user could read random memory from MySQL server, by taking advantage of a non checked packet length. (CVE-2006-1517) - An authenticated user could remotely execute arbitrary commands by taking advantage of a stack overflow. (CVE-2006-1518) Closes: #366043, #366048 * Backported upstream patch to fix a bug which allows local users to bypass logging mechanisms via SQL queries that contain the NULL character. (CVE-2006-0903). Closes: #366162 stable/main/binary-mipsel/mysql-server_4.0.24-10sarge2_mipsel.deb stable/main/binary-mipsel/libmysqlclient12_4.0.24-10sarge2_mipsel.deb stable/main/binary-mipsel/mysql-client_4.0.24-10sarge2_mipsel.deb stable/main/binary-mipsel/libmysqlclient12-dev_4.0.24-10sarge2_mipsel.deb mysql-dfsg (4.0.24-10sarge2) stable-security; urgency=low * Security upload prepared for the security team by the debian mysql package maintainers. * Extracted upstream patch to fix from the diff of 4.1.18 and 4.1.19 to fix the following bugs: - When sending a specifically malformed login packet, the server fills the response with uninitialized memory content which could contain sensitive information. (CVE-2006-1516) - An authenticated user could read random memory from MySQL server, by taking advantage of a non checked packet length. (CVE-2006-1517) - An authenticated user could remotely execute arbitrary commands by taking advantage of a stack overflow. (CVE-2006-1518) Closes: #366043, #366048 * Backported upstream patch to fix a bug which allows local users to bypass logging mechanisms via SQL queries that contain the NULL character. (CVE-2006-0903). Closes: #366162 stable/main/binary-mips/libmysqlclient12_4.0.24-10sarge2_mips.deb stable/main/binary-mips/mysql-client_4.0.24-10sarge2_mips.deb stable/main/binary-mips/libmysqlclient12-dev_4.0.24-10sarge2_mips.deb stable/main/binary-mips/mysql-server_4.0.24-10sarge2_mips.deb mysql-dfsg (4.0.24-10sarge2) stable-security; urgency=low * Security upload prepared for the security team by the debian mysql package maintainers. * Extracted upstream patch to fix from the diff of 4.1.18 and 4.1.19 to fix the following bugs: - When sending a specifically malformed login packet, the server fills the response with uninitialized memory content which could contain sensitive information. (CVE-2006-1516) - An authenticated user could read random memory from MySQL server, by taking advantage of a non checked packet length. (CVE-2006-1517) - An authenticated user could remotely execute arbitrary commands by taking advantage of a stack overflow. (CVE-2006-1518) Closes: #366043, #366048 * Backported upstream patch to fix a bug which allows local users to bypass logging mechanisms via SQL queries that contain the NULL character. (CVE-2006-0903). Closes: #366162 stable/main/binary-m68k/libmysqlclient12-dev_4.0.24-10sarge2_m68k.deb stable/main/binary-m68k/mysql-client_4.0.24-10sarge2_m68k.deb stable/main/binary-m68k/libmysqlclient12_4.0.24-10sarge2_m68k.deb stable/main/binary-m68k/mysql-server_4.0.24-10sarge2_m68k.deb mysql-dfsg (4.0.24-10sarge2) stable-security; urgency=low * Security upload prepared for the security team by the debian mysql package maintainers. * Extracted upstream patch to fix from the diff of 4.1.18 and 4.1.19 to fix the following bugs: - When sending a specifically malformed login packet, the server fills the response with uninitialized memory content which could contain sensitive information. (CVE-2006-1516) - An authenticated user could read random memory from MySQL server, by taking advantage of a non checked packet length. (CVE-2006-1517) - An authenticated user could remotely execute arbitrary commands by taking advantage of a stack overflow. (CVE-2006-1518) Closes: #366043, #366048 * Backported upstream patch to fix a bug which allows local users to bypass logging mechanisms via SQL queries that contain the NULL character. (CVE-2006-0903). Closes: #366162 stable/main/binary-ia64/mysql-client_4.0.24-10sarge2_ia64.deb stable/main/binary-ia64/mysql-server_4.0.24-10sarge2_ia64.deb stable/main/binary-ia64/libmysqlclient12_4.0.24-10sarge2_ia64.deb stable/main/binary-ia64/libmysqlclient12-dev_4.0.24-10sarge2_ia64.deb mysql-dfsg (4.0.24-10sarge2) stable-security; urgency=low * Security upload prepared for the security team by the debian mysql package maintainers. * Extracted upstream patch to fix from the diff of 4.1.18 and 4.1.19 to fix the following bugs: - When sending a specifically malformed login packet, the server fills the response with uninitialized memory content which could contain sensitive information. (CVE-2006-1516) - An authenticated user could read random memory from MySQL server, by taking advantage of a non checked packet length. (CVE-2006-1517) - An authenticated user could remotely execute arbitrary commands by taking advantage of a stack overflow. (CVE-2006-1518) Closes: #366043, #366048 * Backported upstream patch to fix a bug which allows local users to bypass logging mechanisms via SQL queries that contain the NULL character. (CVE-2006-0903). Closes: #366162 stable/main/binary-i386/mysql-server_4.0.24-10sarge2_i386.deb stable/main/binary-i386/libmysqlclient12-dev_4.0.24-10sarge2_i386.deb stable/main/binary-i386/mysql-client_4.0.24-10sarge2_i386.deb stable/main/binary-i386/libmysqlclient12_4.0.24-10sarge2_i386.deb mysql-dfsg (4.0.24-10sarge2) stable-security; urgency=low * Security upload prepared for the security team by the debian mysql package maintainers. * Extracted upstream patch to fix from the diff of 4.1.18 and 4.1.19 to fix the following bugs: - When sending a specifically malformed login packet, the server fills the response with uninitialized memory content which could contain sensitive information. (CVE-2006-1516) - An authenticated user could read random memory from MySQL server, by taking advantage of a non checked packet length. (CVE-2006-1517) - An authenticated user could remotely execute arbitrary commands by taking advantage of a stack overflow. (CVE-2006-1518) Closes: #366043, #366048 * Backported upstream patch to fix a bug which allows local users to bypass logging mechanisms via SQL queries that contain the NULL character. (CVE-2006-0903). Closes: #366162 stable/main/binary-hppa/mysql-client_4.0.24-10sarge2_hppa.deb stable/main/binary-hppa/libmysqlclient12-dev_4.0.24-10sarge2_hppa.deb stable/main/binary-hppa/libmysqlclient12_4.0.24-10sarge2_hppa.deb stable/main/binary-hppa/mysql-server_4.0.24-10sarge2_hppa.deb mysql-dfsg (4.0.24-10sarge2) stable-security; urgency=low * Security upload prepared for the security team by the debian mysql package maintainers. * Extracted upstream patch to fix from the diff of 4.1.18 and 4.1.19 to fix the following bugs: - When sending a specifically malformed login packet, the server fills the response with uninitialized memory content which could contain sensitive information. (CVE-2006-1516) - An authenticated user could read random memory from MySQL server, by taking advantage of a non checked packet length. (CVE-2006-1517) - An authenticated user could remotely execute arbitrary commands by taking advantage of a stack overflow. (CVE-2006-1518) Closes: #366043, #366048 * Backported upstream patch to fix a bug which allows local users to bypass logging mechanisms via SQL queries that contain the NULL character. (CVE-2006-0903). Closes: #366162 stable/main/binary-arm/libmysqlclient12-dev_4.0.24-10sarge2_arm.deb stable/main/binary-arm/mysql-server_4.0.24-10sarge2_arm.deb stable/main/binary-arm/libmysqlclient12_4.0.24-10sarge2_arm.deb stable/main/binary-arm/mysql-client_4.0.24-10sarge2_arm.deb mysql-dfsg (4.0.24-10sarge2) stable-security; urgency=low * Security upload prepared for the security team by the debian mysql package maintainers. * Extracted upstream patch to fix from the diff of 4.1.18 and 4.1.19 to fix the following bugs: - When sending a specifically malformed login packet, the server fills the response with uninitialized memory content which could contain sensitive information. (CVE-2006-1516) - An authenticated user could read random memory from MySQL server, by taking advantage of a non checked packet length. (CVE-2006-1517) - An authenticated user could remotely execute arbitrary commands by taking advantage of a stack overflow. (CVE-2006-1518) Closes: #366043, #366048 * Backported upstream patch to fix a bug which allows local users to bypass logging mechanisms via SQL queries that contain the NULL character. (CVE-2006-0903). Closes: #366162 stable/main/binary-alpha/libmysqlclient12-dev_4.0.24-10sarge2_alpha.deb stable/main/binary-alpha/mysql-client_4.0.24-10sarge2_alpha.deb stable/main/binary-alpha/libmysqlclient12_4.0.24-10sarge2_alpha.deb stable/main/binary-alpha/mysql-server_4.0.24-10sarge2_alpha.deb mysql-dfsg (4.0.24-10sarge2) stable-security; urgency=low * Security upload prepared for the security team by the debian mysql package maintainers. * Extracted upstream patch to fix from the diff of 4.1.18 and 4.1.19 to fix the following bugs: - When sending a specifically malformed login packet, the server fills the response with uninitialized memory content which could contain sensitive information. (CVE-2006-1516) - An authenticated user could read random memory from MySQL server, by taking advantage of a non checked packet length. (CVE-2006-1517) - An authenticated user could remotely execute arbitrary commands by taking advantage of a stack overflow. (CVE-2006-1518) Closes: #366043, #366048 * Backported upstream patch to fix a bug which allows local users to bypass logging mechanisms via SQL queries that contain the NULL character. (CVE-2006-0903). Closes: #366162 stable/main/source/mysql-dfsg_4.0.24-10sarge2.diff.gz stable/main/binary-powerpc/mysql-client_4.0.24-10sarge2_powerpc.deb stable/main/binary-powerpc/libmysqlclient12_4.0.24-10sarge2_powerpc.deb stable/main/source/mysql-dfsg_4.0.24-10sarge2.dsc stable/main/binary-powerpc/libmysqlclient12-dev_4.0.24-10sarge2_powerpc.deb stable/main/binary-all/mysql-common_4.0.24-10sarge2_all.deb stable/main/binary-powerpc/mysql-server_4.0.24-10sarge2_powerpc.deb mysql-dfsg (4.0.24-10sarge2) stable-security; urgency=low * Security upload prepared for the security team by the debian mysql package maintainers. * Extracted upstream patch to fix from the diff of 4.1.18 and 4.1.19 to fix the following bugs: - When sending a specifically malformed login packet, the server fills the response with uninitialized memory content which could contain sensitive information. (CVE-2006-1516) - An authenticated user could read random memory from MySQL server, by taking advantage of a non checked packet length. (CVE-2006-1517) - An authenticated user could remotely execute arbitrary commands by taking advantage of a stack overflow. (CVE-2006-1518) Closes: #366043, #366048 * Backported upstream patch to fix a bug which allows local users to bypass logging mechanisms via SQL queries that contain the NULL character. (CVE-2006-0903). Closes: #366162 stable/main/binary-sparc/mutt_1.5.9-2sarge2_sparc.deb mutt (1.5.9-2sarge2) stable-security; urgency=high * Fix buffer overflow in IMAP parsing code stable/main/binary-s390/mutt_1.5.9-2sarge2_s390.deb mutt (1.5.9-2sarge2) stable-security; urgency=high * Fix buffer overflow in IMAP parsing code stable/main/binary-powerpc/mutt_1.5.9-2sarge2_powerpc.deb mutt (1.5.9-2sarge2) stable-security; urgency=high * Fix buffer overflow in IMAP parsing code stable/main/binary-mipsel/mutt_1.5.9-2sarge2_mipsel.deb mutt (1.5.9-2sarge2) stable-security; urgency=high * Fix buffer overflow in IMAP parsing code stable/main/binary-mips/mutt_1.5.9-2sarge2_mips.deb mutt (1.5.9-2sarge2) stable-security; urgency=high * Fix buffer overflow in IMAP parsing code stable/main/binary-m68k/mutt_1.5.9-2sarge2_m68k.deb mutt (1.5.9-2sarge2) stable-security; urgency=high * Fix buffer overflow in IMAP parsing code stable/main/binary-ia64/mutt_1.5.9-2sarge2_ia64.deb mutt (1.5.9-2sarge2) stable-security; urgency=high * Fix buffer overflow in IMAP parsing code stable/main/binary-hppa/mutt_1.5.9-2sarge2_hppa.deb mutt (1.5.9-2sarge2) stable-security; urgency=high * Fix buffer overflow in IMAP parsing code stable/main/binary-arm/mutt_1.5.9-2sarge2_arm.deb mutt (1.5.9-2sarge2) stable-security; urgency=high * Fix buffer overflow in IMAP parsing code stable/main/binary-alpha/mutt_1.5.9-2sarge2_alpha.deb mutt (1.5.9-2sarge2) stable-security; urgency=high * Fix buffer overflow in IMAP parsing code stable/main/binary-i386/mutt_1.5.9-2sarge2_i386.deb stable/main/source/mutt_1.5.9-2sarge2.diff.gz stable/main/source/mutt_1.5.9-2sarge2.dsc mutt (1.5.9-2sarge2) stable-security; urgency=high * Fix buffer overflow in IMAP parsing code stable/non-free/binary-i386/mpg123-oss-i486_0.59r-20sarge1_i386.deb stable/non-free/binary-powerpc/mpg123-esd_0.59r-20sarge1_powerpc.deb stable/non-free/source/mpg123_0.59r-20sarge1.dsc stable/non-free/binary-hppa/mpg123_0.59r-20sarge1_hppa.deb stable/non-free/binary-i386/mpg123-nas_0.59r-20sarge1_i386.deb stable/non-free/binary-sparc/mpg123_0.59r-20sarge1_sparc.deb stable/non-free/binary-alpha/mpg123-esd_0.59r-20sarge1_alpha.deb stable/non-free/binary-powerpc/mpg123_0.59r-20sarge1_powerpc.deb stable/non-free/binary-i386/mpg123_0.59r-20sarge1_i386.deb stable/non-free/binary-alpha/mpg123_0.59r-20sarge1_alpha.deb stable/non-free/binary-arm/mpg123_0.59r-20sarge1_arm.deb stable/non-free/source/mpg123_0.59r-20sarge1.diff.gz stable/non-free/binary-m68k/mpg123_0.59r-20sarge1_m68k.deb stable/non-free/binary-i386/mpg123-esd_0.59r-20sarge1_i386.deb stable/non-free/binary-i386/mpg123-oss-3dnow_0.59r-20sarge1_i386.deb mpg123 (0.59r-20sarge1) stable-security; urgency=high * layer3.c: Fix buffer overflow in III_i_stereo() (CVE-2006-1655). Closes: #361863 stable/main/binary-sparc/mozilla-thunderbird-dev_1.0.2-2.sarge1.0.8b.1_sparc.deb stable/main/binary-sparc/mozilla-thunderbird_1.0.2-2.sarge1.0.8b.1_sparc.deb stable/main/binary-sparc/mozilla-thunderbird-typeaheadfind_1.0.2-2.sarge1.0.8b.1_sparc.deb stable/main/binary-sparc/mozilla-thunderbird-offline_1.0.2-2.sarge1.0.8b.1_sparc.deb stable/main/binary-sparc/mozilla-thunderbird-inspector_1.0.2-2.sarge1.0.8b.1_sparc.deb mozilla-thunderbird (1.0.2-2.sarge1.0.8b.1) stable-security; urgency=critical Patches listed below are in debian/patches/tbird-1.0.8a-1.0.8b * regression fixes: + 0003-regression-343713-was-introduced-by-fix-for-mfsa2006-31-336601.txt + 0004-regression-336875-was-introduced-by-fix-for-mfsa2006-31-336601.txt * late security patches left out in 2:1.7.8-1sarge7.1 CVE-2006-2779 (Issue 2/6) aka mfsa2006-32 (Part 2/7) + 0001-mfsa2006-32-325730-329982-Part-2-7.txt + 0002-mfsa2006-32-325730-329982-Part-2-7.txt * new security patches: CVE-2006-3805 (mfsa2006-50 Part 1) comprises 4 issues whose patches are: + 338804 - 0005-CVE-2006-3805-mfsa2006-50-Part-1-2-338804-Part-1-4.txt + 340129 - 0006-CVE-2006-3805-mfsa2006-50-Part-1-2-340129-Part-2-4.txt + 341877 - 0007-CVE-2006-3805-mfsa2006-50-Part-1-2-341877-Part-3-4.txt + 341956 - 0008-CVE-2006-3805-mfsa2006-50-Part-1-2-341956-Part-4-4.txt CVE-2006-3806 (mfsa2006-50 Part 2) comprises 4 issues: + 336409 - 0009-CVE-2006-3806-mfsa2006-50-Part-2-2-336409-Part-1-5.txt + 336410 - 0010-CVE-2006-3806-mfsa2006-50-Part-2-2-336410-Part-2-5.txt + 338001 - 0011-CVE-2006-3806-mfsa2006-50-Part-2-2-338001-Part-3-5.txt + 338121 - 0012-CVE-2006-3806-mfsa2006-50-Part-2-2-338121-Part-4-5.txt + 342960 - 0013-CVE-2006-3806-mfsa2006-50-Part-2-2-342960-Part-5-5.txt CVE-2006-3807 (mfsa2006-51) comprises 1 issue: + 340727 - 0014-CVE-2006-3807-mfsa2006-51-340727.txt CVE-2006-3808 (mfsa2006-52) comprises 1 issue: + 337389 - 0015-CVE-2006-3808-mfsa2006-52-337389.txt CVE-2006-3809 (mfsa2006-53) comprises 1 issue: + 340107 - 0016-CVE-2006-3809-mfsa2006-53-340107.txt CVE-2006-3810 (mfsa2006-55) comprises 6 issue: + 284219 - 0017-CVE-2006-3811-mfsa2006-55-284219-Part-1-6.txt + 329900 - 0018-CVE-2006-3811-mfsa2006-55-329900-Part-2-6.txt + 331679 - 0019-CVE-2006-3811-mfsa2006-55-331679-Part-3-6.txt + 336162 - 0020-CVE-2006-3811-mfsa2006-55-336162-Part-4-6.txt - 0023-CVE-2006-3811-mfsa2006-55-336162-Part-4-6-2nd-bits.txt + 337462 - 0021-CVE-2006-3811-mfsa2006-55-337462-Part-5-6.txt + 338129 - 0022-CVE-2006-3811-mfsa2006-55-338129-Part-6-6.txt stable/main/binary-s390/mozilla-thunderbird-inspector_1.0.2-2.sarge1.0.8b.1_s390.deb stable/main/binary-s390/mozilla-thunderbird_1.0.2-2.sarge1.0.8b.1_s390.deb stable/main/binary-s390/mozilla-thunderbird-typeaheadfind_1.0.2-2.sarge1.0.8b.1_s390.deb stable/main/binary-s390/mozilla-thunderbird-offline_1.0.2-2.sarge1.0.8b.1_s390.deb stable/main/binary-s390/mozilla-thunderbird-dev_1.0.2-2.sarge1.0.8b.1_s390.deb mozilla-thunderbird (1.0.2-2.sarge1.0.8b.1) stable-security; urgency=critical Patches listed below are in debian/patches/tbird-1.0.8a-1.0.8b * regression fixes: + 0003-regression-343713-was-introduced-by-fix-for-mfsa2006-31-336601.txt + 0004-regression-336875-was-introduced-by-fix-for-mfsa2006-31-336601.txt * late security patches left out in 2:1.7.8-1sarge7.1 CVE-2006-2779 (Issue 2/6) aka mfsa2006-32 (Part 2/7) + 0001-mfsa2006-32-325730-329982-Part-2-7.txt + 0002-mfsa2006-32-325730-329982-Part-2-7.txt * new security patches: CVE-2006-3805 (mfsa2006-50 Part 1) comprises 4 issues whose patches are: + 338804 - 0005-CVE-2006-3805-mfsa2006-50-Part-1-2-338804-Part-1-4.txt + 340129 - 0006-CVE-2006-3805-mfsa2006-50-Part-1-2-340129-Part-2-4.txt + 341877 - 0007-CVE-2006-3805-mfsa2006-50-Part-1-2-341877-Part-3-4.txt + 341956 - 0008-CVE-2006-3805-mfsa2006-50-Part-1-2-341956-Part-4-4.txt CVE-2006-3806 (mfsa2006-50 Part 2) comprises 4 issues: + 336409 - 0009-CVE-2006-3806-mfsa2006-50-Part-2-2-336409-Part-1-5.txt + 336410 - 0010-CVE-2006-3806-mfsa2006-50-Part-2-2-336410-Part-2-5.txt + 338001 - 0011-CVE-2006-3806-mfsa2006-50-Part-2-2-338001-Part-3-5.txt + 338121 - 0012-CVE-2006-3806-mfsa2006-50-Part-2-2-338121-Part-4-5.txt + 342960 - 0013-CVE-2006-3806-mfsa2006-50-Part-2-2-342960-Part-5-5.txt CVE-2006-3807 (mfsa2006-51) comprises 1 issue: + 340727 - 0014-CVE-2006-3807-mfsa2006-51-340727.txt CVE-2006-3808 (mfsa2006-52) comprises 1 issue: + 337389 - 0015-CVE-2006-3808-mfsa2006-52-337389.txt CVE-2006-3809 (mfsa2006-53) comprises 1 issue: + 340107 - 0016-CVE-2006-3809-mfsa2006-53-340107.txt CVE-2006-3810 (mfsa2006-55) comprises 6 issue: + 284219 - 0017-CVE-2006-3811-mfsa2006-55-284219-Part-1-6.txt + 329900 - 0018-CVE-2006-3811-mfsa2006-55-329900-Part-2-6.txt + 331679 - 0019-CVE-2006-3811-mfsa2006-55-331679-Part-3-6.txt + 336162 - 0020-CVE-2006-3811-mfsa2006-55-336162-Part-4-6.txt - 0023-CVE-2006-3811-mfsa2006-55-336162-Part-4-6-2nd-bits.txt + 337462 - 0021-CVE-2006-3811-mfsa2006-55-337462-Part-5-6.txt + 338129 - 0022-CVE-2006-3811-mfsa2006-55-338129-Part-6-6.txt stable/main/binary-powerpc/mozilla-thunderbird-offline_1.0.2-2.sarge1.0.8b.1_powerpc.deb stable/main/binary-powerpc/mozilla-thunderbird-dev_1.0.2-2.sarge1.0.8b.1_powerpc.deb stable/main/binary-powerpc/mozilla-thunderbird-inspector_1.0.2-2.sarge1.0.8b.1_powerpc.deb stable/main/binary-powerpc/mozilla-thunderbird-typeaheadfind_1.0.2-2.sarge1.0.8b.1_powerpc.deb stable/main/binary-powerpc/mozilla-thunderbird_1.0.2-2.sarge1.0.8b.1_powerpc.deb mozilla-thunderbird (1.0.2-2.sarge1.0.8b.1) stable-security; urgency=critical Patches listed below are in debian/patches/tbird-1.0.8a-1.0.8b * regression fixes: + 0003-regression-343713-was-introduced-by-fix-for-mfsa2006-31-336601.txt + 0004-regression-336875-was-introduced-by-fix-for-mfsa2006-31-336601.txt * late security patches left out in 2:1.7.8-1sarge7.1 CVE-2006-2779 (Issue 2/6) aka mfsa2006-32 (Part 2/7) + 0001-mfsa2006-32-325730-329982-Part-2-7.txt + 0002-mfsa2006-32-325730-329982-Part-2-7.txt * new security patches: CVE-2006-3805 (mfsa2006-50 Part 1) comprises 4 issues whose patches are: + 338804 - 0005-CVE-2006-3805-mfsa2006-50-Part-1-2-338804-Part-1-4.txt + 340129 - 0006-CVE-2006-3805-mfsa2006-50-Part-1-2-340129-Part-2-4.txt + 341877 - 0007-CVE-2006-3805-mfsa2006-50-Part-1-2-341877-Part-3-4.txt + 341956 - 0008-CVE-2006-3805-mfsa2006-50-Part-1-2-341956-Part-4-4.txt CVE-2006-3806 (mfsa2006-50 Part 2) comprises 4 issues: + 336409 - 0009-CVE-2006-3806-mfsa2006-50-Part-2-2-336409-Part-1-5.txt + 336410 - 0010-CVE-2006-3806-mfsa2006-50-Part-2-2-336410-Part-2-5.txt + 338001 - 0011-CVE-2006-3806-mfsa2006-50-Part-2-2-338001-Part-3-5.txt + 338121 - 0012-CVE-2006-3806-mfsa2006-50-Part-2-2-338121-Part-4-5.txt + 342960 - 0013-CVE-2006-3806-mfsa2006-50-Part-2-2-342960-Part-5-5.txt CVE-2006-3807 (mfsa2006-51) comprises 1 issue: + 340727 - 0014-CVE-2006-3807-mfsa2006-51-340727.txt CVE-2006-3808 (mfsa2006-52) comprises 1 issue: + 337389 - 0015-CVE-2006-3808-mfsa2006-52-337389.txt CVE-2006-3809 (mfsa2006-53) comprises 1 issue: + 340107 - 0016-CVE-2006-3809-mfsa2006-53-340107.txt CVE-2006-3810 (mfsa2006-55) comprises 6 issue: + 284219 - 0017-CVE-2006-3811-mfsa2006-55-284219-Part-1-6.txt + 329900 - 0018-CVE-2006-3811-mfsa2006-55-329900-Part-2-6.txt + 331679 - 0019-CVE-2006-3811-mfsa2006-55-331679-Part-3-6.txt + 336162 - 0020-CVE-2006-3811-mfsa2006-55-336162-Part-4-6.txt - 0023-CVE-2006-3811-mfsa2006-55-336162-Part-4-6-2nd-bits.txt + 337462 - 0021-CVE-2006-3811-mfsa2006-55-337462-Part-5-6.txt + 338129 - 0022-CVE-2006-3811-mfsa2006-55-338129-Part-6-6.txt stable/main/binary-mipsel/mozilla-thunderbird-typeaheadfind_1.0.2-2.sarge1.0.8b.1_mipsel.deb stable/main/binary-mipsel/mozilla-thunderbird_1.0.2-2.sarge1.0.8b.1_mipsel.deb stable/main/binary-mipsel/mozilla-thunderbird-offline_1.0.2-2.sarge1.0.8b.1_mipsel.deb stable/main/binary-mipsel/mozilla-thunderbird-inspector_1.0.2-2.sarge1.0.8b.1_mipsel.deb stable/main/binary-mipsel/mozilla-thunderbird-dev_1.0.2-2.sarge1.0.8b.1_mipsel.deb mozilla-thunderbird (1.0.2-2.sarge1.0.8b.1) stable-security; urgency=critical Patches listed below are in debian/patches/tbird-1.0.8a-1.0.8b * regression fixes: + 0003-regression-343713-was-introduced-by-fix-for-mfsa2006-31-336601.txt + 0004-regression-336875-was-introduced-by-fix-for-mfsa2006-31-336601.txt * late security patches left out in 2:1.7.8-1sarge7.1 CVE-2006-2779 (Issue 2/6) aka mfsa2006-32 (Part 2/7) + 0001-mfsa2006-32-325730-329982-Part-2-7.txt + 0002-mfsa2006-32-325730-329982-Part-2-7.txt * new security patches: CVE-2006-3805 (mfsa2006-50 Part 1) comprises 4 issues whose patches are: + 338804 - 0005-CVE-2006-3805-mfsa2006-50-Part-1-2-338804-Part-1-4.txt + 340129 - 0006-CVE-2006-3805-mfsa2006-50-Part-1-2-340129-Part-2-4.txt + 341877 - 0007-CVE-2006-3805-mfsa2006-50-Part-1-2-341877-Part-3-4.txt + 341956 - 0008-CVE-2006-3805-mfsa2006-50-Part-1-2-341956-Part-4-4.txt CVE-2006-3806 (mfsa2006-50 Part 2) comprises 4 issues: + 336409 - 0009-CVE-2006-3806-mfsa2006-50-Part-2-2-336409-Part-1-5.txt + 336410 - 0010-CVE-2006-3806-mfsa2006-50-Part-2-2-336410-Part-2-5.txt + 338001 - 0011-CVE-2006-3806-mfsa2006-50-Part-2-2-338001-Part-3-5.txt + 338121 - 0012-CVE-2006-3806-mfsa2006-50-Part-2-2-338121-Part-4-5.txt + 342960 - 0013-CVE-2006-3806-mfsa2006-50-Part-2-2-342960-Part-5-5.txt CVE-2006-3807 (mfsa2006-51) comprises 1 issue: + 340727 - 0014-CVE-2006-3807-mfsa2006-51-340727.txt CVE-2006-3808 (mfsa2006-52) comprises 1 issue: + 337389 - 0015-CVE-2006-3808-mfsa2006-52-337389.txt CVE-2006-3809 (mfsa2006-53) comprises 1 issue: + 340107 - 0016-CVE-2006-3809-mfsa2006-53-340107.txt CVE-2006-3810 (mfsa2006-55) comprises 6 issue: + 284219 - 0017-CVE-2006-3811-mfsa2006-55-284219-Part-1-6.txt + 329900 - 0018-CVE-2006-3811-mfsa2006-55-329900-Part-2-6.txt + 331679 - 0019-CVE-2006-3811-mfsa2006-55-331679-Part-3-6.txt + 336162 - 0020-CVE-2006-3811-mfsa2006-55-336162-Part-4-6.txt - 0023-CVE-2006-3811-mfsa2006-55-336162-Part-4-6-2nd-bits.txt + 337462 - 0021-CVE-2006-3811-mfsa2006-55-337462-Part-5-6.txt + 338129 - 0022-CVE-2006-3811-mfsa2006-55-338129-Part-6-6.txt stable/main/binary-mips/mozilla-thunderbird-typeaheadfind_1.0.2-2.sarge1.0.8b.1_mips.deb stable/main/binary-mips/mozilla-thunderbird-offline_1.0.2-2.sarge1.0.8b.1_mips.deb stable/main/binary-mips/mozilla-thunderbird_1.0.2-2.sarge1.0.8b.1_mips.deb stable/main/binary-mips/mozilla-thunderbird-inspector_1.0.2-2.sarge1.0.8b.1_mips.deb stable/main/binary-mips/mozilla-thunderbird-dev_1.0.2-2.sarge1.0.8b.1_mips.deb mozilla-thunderbird (1.0.2-2.sarge1.0.8b.1) stable-security; urgency=critical Patches listed below are in debian/patches/tbird-1.0.8a-1.0.8b * regression fixes: + 0003-regression-343713-was-introduced-by-fix-for-mfsa2006-31-336601.txt + 0004-regression-336875-was-introduced-by-fix-for-mfsa2006-31-336601.txt * late security patches left out in 2:1.7.8-1sarge7.1 CVE-2006-2779 (Issue 2/6) aka mfsa2006-32 (Part 2/7) + 0001-mfsa2006-32-325730-329982-Part-2-7.txt + 0002-mfsa2006-32-325730-329982-Part-2-7.txt * new security patches: CVE-2006-3805 (mfsa2006-50 Part 1) comprises 4 issues whose patches are: + 338804 - 0005-CVE-2006-3805-mfsa2006-50-Part-1-2-338804-Part-1-4.txt + 340129 - 0006-CVE-2006-3805-mfsa2006-50-Part-1-2-340129-Part-2-4.txt + 341877 - 0007-CVE-2006-3805-mfsa2006-50-Part-1-2-341877-Part-3-4.txt + 341956 - 0008-CVE-2006-3805-mfsa2006-50-Part-1-2-341956-Part-4-4.txt CVE-2006-3806 (mfsa2006-50 Part 2) comprises 4 issues: + 336409 - 0009-CVE-2006-3806-mfsa2006-50-Part-2-2-336409-Part-1-5.txt + 336410 - 0010-CVE-2006-3806-mfsa2006-50-Part-2-2-336410-Part-2-5.txt + 338001 - 0011-CVE-2006-3806-mfsa2006-50-Part-2-2-338001-Part-3-5.txt + 338121 - 0012-CVE-2006-3806-mfsa2006-50-Part-2-2-338121-Part-4-5.txt + 342960 - 0013-CVE-2006-3806-mfsa2006-50-Part-2-2-342960-Part-5-5.txt CVE-2006-3807 (mfsa2006-51) comprises 1 issue: + 340727 - 0014-CVE-2006-3807-mfsa2006-51-340727.txt CVE-2006-3808 (mfsa2006-52) comprises 1 issue: + 337389 - 0015-CVE-2006-3808-mfsa2006-52-337389.txt CVE-2006-3809 (mfsa2006-53) comprises 1 issue: + 340107 - 0016-CVE-2006-3809-mfsa2006-53-340107.txt CVE-2006-3810 (mfsa2006-55) comprises 6 issue: + 284219 - 0017-CVE-2006-3811-mfsa2006-55-284219-Part-1-6.txt + 329900 - 0018-CVE-2006-3811-mfsa2006-55-329900-Part-2-6.txt + 331679 - 0019-CVE-2006-3811-mfsa2006-55-331679-Part-3-6.txt + 336162 - 0020-CVE-2006-3811-mfsa2006-55-336162-Part-4-6.txt - 0023-CVE-2006-3811-mfsa2006-55-336162-Part-4-6-2nd-bits.txt + 337462 - 0021-CVE-2006-3811-mfsa2006-55-337462-Part-5-6.txt + 338129 - 0022-CVE-2006-3811-mfsa2006-55-338129-Part-6-6.txt stable/main/binary-m68k/mozilla-thunderbird-inspector_1.0.2-2.sarge1.0.8b.1_m68k.deb stable/main/binary-m68k/mozilla-thunderbird-typeaheadfind_1.0.2-2.sarge1.0.8b.1_m68k.deb stable/main/binary-m68k/mozilla-thunderbird-dev_1.0.2-2.sarge1.0.8b.1_m68k.deb stable/main/binary-m68k/mozilla-thunderbird-offline_1.0.2-2.sarge1.0.8b.1_m68k.deb stable/main/binary-m68k/mozilla-thunderbird_1.0.2-2.sarge1.0.8b.1_m68k.deb mozilla-thunderbird (1.0.2-2.sarge1.0.8b.1) stable-security; urgency=critical Patches listed below are in debian/patches/tbird-1.0.8a-1.0.8b * regression fixes: + 0003-regression-343713-was-introduced-by-fix-for-mfsa2006-31-336601.txt + 0004-regression-336875-was-introduced-by-fix-for-mfsa2006-31-336601.txt * late security patches left out in 2:1.7.8-1sarge7.1 CVE-2006-2779 (Issue 2/6) aka mfsa2006-32 (Part 2/7) + 0001-mfsa2006-32-325730-329982-Part-2-7.txt + 0002-mfsa2006-32-325730-329982-Part-2-7.txt * new security patches: CVE-2006-3805 (mfsa2006-50 Part 1) comprises 4 issues whose patches are: + 338804 - 0005-CVE-2006-3805-mfsa2006-50-Part-1-2-338804-Part-1-4.txt + 340129 - 0006-CVE-2006-3805-mfsa2006-50-Part-1-2-340129-Part-2-4.txt + 341877 - 0007-CVE-2006-3805-mfsa2006-50-Part-1-2-341877-Part-3-4.txt + 341956 - 0008-CVE-2006-3805-mfsa2006-50-Part-1-2-341956-Part-4-4.txt CVE-2006-3806 (mfsa2006-50 Part 2) comprises 4 issues: + 336409 - 0009-CVE-2006-3806-mfsa2006-50-Part-2-2-336409-Part-1-5.txt + 336410 - 0010-CVE-2006-3806-mfsa2006-50-Part-2-2-336410-Part-2-5.txt + 338001 - 0011-CVE-2006-3806-mfsa2006-50-Part-2-2-338001-Part-3-5.txt + 338121 - 0012-CVE-2006-3806-mfsa2006-50-Part-2-2-338121-Part-4-5.txt + 342960 - 0013-CVE-2006-3806-mfsa2006-50-Part-2-2-342960-Part-5-5.txt CVE-2006-3807 (mfsa2006-51) comprises 1 issue: + 340727 - 0014-CVE-2006-3807-mfsa2006-51-340727.txt CVE-2006-3808 (mfsa2006-52) comprises 1 issue: + 337389 - 0015-CVE-2006-3808-mfsa2006-52-337389.txt CVE-2006-3809 (mfsa2006-53) comprises 1 issue: + 340107 - 0016-CVE-2006-3809-mfsa2006-53-340107.txt CVE-2006-3810 (mfsa2006-55) comprises 6 issue: + 284219 - 0017-CVE-2006-3811-mfsa2006-55-284219-Part-1-6.txt + 329900 - 0018-CVE-2006-3811-mfsa2006-55-329900-Part-2-6.txt + 331679 - 0019-CVE-2006-3811-mfsa2006-55-331679-Part-3-6.txt + 336162 - 0020-CVE-2006-3811-mfsa2006-55-336162-Part-4-6.txt - 0023-CVE-2006-3811-mfsa2006-55-336162-Part-4-6-2nd-bits.txt + 337462 - 0021-CVE-2006-3811-mfsa2006-55-337462-Part-5-6.txt + 338129 - 0022-CVE-2006-3811-mfsa2006-55-338129-Part-6-6.txt stable/main/binary-ia64/mozilla-thunderbird-inspector_1.0.2-2.sarge1.0.8b.1_ia64.deb stable/main/binary-ia64/mozilla-thunderbird-typeaheadfind_1.0.2-2.sarge1.0.8b.1_ia64.deb stable/main/binary-ia64/mozilla-thunderbird-offline_1.0.2-2.sarge1.0.8b.1_ia64.deb stable/main/binary-ia64/mozilla-thunderbird-dev_1.0.2-2.sarge1.0.8b.1_ia64.deb stable/main/binary-ia64/mozilla-thunderbird_1.0.2-2.sarge1.0.8b.1_ia64.deb mozilla-thunderbird (1.0.2-2.sarge1.0.8b.1) stable-security; urgency=critical Patches listed below are in debian/patches/tbird-1.0.8a-1.0.8b * regression fixes: + 0003-regression-343713-was-introduced-by-fix-for-mfsa2006-31-336601.txt + 0004-regression-336875-was-introduced-by-fix-for-mfsa2006-31-336601.txt * late security patches left out in 2:1.7.8-1sarge7.1 CVE-2006-2779 (Issue 2/6) aka mfsa2006-32 (Part 2/7) + 0001-mfsa2006-32-325730-329982-Part-2-7.txt + 0002-mfsa2006-32-325730-329982-Part-2-7.txt * new security patches: CVE-2006-3805 (mfsa2006-50 Part 1) comprises 4 issues whose patches are: + 338804 - 0005-CVE-2006-3805-mfsa2006-50-Part-1-2-338804-Part-1-4.txt + 340129 - 0006-CVE-2006-3805-mfsa2006-50-Part-1-2-340129-Part-2-4.txt + 341877 - 0007-CVE-2006-3805-mfsa2006-50-Part-1-2-341877-Part-3-4.txt + 341956 - 0008-CVE-2006-3805-mfsa2006-50-Part-1-2-341956-Part-4-4.txt CVE-2006-3806 (mfsa2006-50 Part 2) comprises 4 issues: + 336409 - 0009-CVE-2006-3806-mfsa2006-50-Part-2-2-336409-Part-1-5.txt + 336410 - 0010-CVE-2006-3806-mfsa2006-50-Part-2-2-336410-Part-2-5.txt + 338001 - 0011-CVE-2006-3806-mfsa2006-50-Part-2-2-338001-Part-3-5.txt + 338121 - 0012-CVE-2006-3806-mfsa2006-50-Part-2-2-338121-Part-4-5.txt + 342960 - 0013-CVE-2006-3806-mfsa2006-50-Part-2-2-342960-Part-5-5.txt CVE-2006-3807 (mfsa2006-51) comprises 1 issue: + 340727 - 0014-CVE-2006-3807-mfsa2006-51-340727.txt CVE-2006-3808 (mfsa2006-52) comprises 1 issue: + 337389 - 0015-CVE-2006-3808-mfsa2006-52-337389.txt CVE-2006-3809 (mfsa2006-53) comprises 1 issue: + 340107 - 0016-CVE-2006-3809-mfsa2006-53-340107.txt CVE-2006-3810 (mfsa2006-55) comprises 6 issue: + 284219 - 0017-CVE-2006-3811-mfsa2006-55-284219-Part-1-6.txt + 329900 - 0018-CVE-2006-3811-mfsa2006-55-329900-Part-2-6.txt + 331679 - 0019-CVE-2006-3811-mfsa2006-55-331679-Part-3-6.txt + 336162 - 0020-CVE-2006-3811-mfsa2006-55-336162-Part-4-6.txt - 0023-CVE-2006-3811-mfsa2006-55-336162-Part-4-6-2nd-bits.txt + 337462 - 0021-CVE-2006-3811-mfsa2006-55-337462-Part-5-6.txt + 338129 - 0022-CVE-2006-3811-mfsa2006-55-338129-Part-6-6.txt stable/main/binary-hppa/mozilla-thunderbird_1.0.2-2.sarge1.0.8b.1_hppa.deb stable/main/binary-hppa/mozilla-thunderbird-offline_1.0.2-2.sarge1.0.8b.1_hppa.deb stable/main/binary-hppa/mozilla-thunderbird-dev_1.0.2-2.sarge1.0.8b.1_hppa.deb stable/main/binary-hppa/mozilla-thunderbird-typeaheadfind_1.0.2-2.sarge1.0.8b.1_hppa.deb stable/main/binary-hppa/mozilla-thunderbird-inspector_1.0.2-2.sarge1.0.8b.1_hppa.deb mozilla-thunderbird (1.0.2-2.sarge1.0.8b.1) stable-security; urgency=critical Patches listed below are in debian/patches/tbird-1.0.8a-1.0.8b * regression fixes: + 0003-regression-343713-was-introduced-by-fix-for-mfsa2006-31-336601.txt + 0004-regression-336875-was-introduced-by-fix-for-mfsa2006-31-336601.txt * late security patches left out in 2:1.7.8-1sarge7.1 CVE-2006-2779 (Issue 2/6) aka mfsa2006-32 (Part 2/7) + 0001-mfsa2006-32-325730-329982-Part-2-7.txt + 0002-mfsa2006-32-325730-329982-Part-2-7.txt * new security patches: CVE-2006-3805 (mfsa2006-50 Part 1) comprises 4 issues whose patches are: + 338804 - 0005-CVE-2006-3805-mfsa2006-50-Part-1-2-338804-Part-1-4.txt + 340129 - 0006-CVE-2006-3805-mfsa2006-50-Part-1-2-340129-Part-2-4.txt + 341877 - 0007-CVE-2006-3805-mfsa2006-50-Part-1-2-341877-Part-3-4.txt + 341956 - 0008-CVE-2006-3805-mfsa2006-50-Part-1-2-341956-Part-4-4.txt CVE-2006-3806 (mfsa2006-50 Part 2) comprises 4 issues: + 336409 - 0009-CVE-2006-3806-mfsa2006-50-Part-2-2-336409-Part-1-5.txt + 336410 - 0010-CVE-2006-3806-mfsa2006-50-Part-2-2-336410-Part-2-5.txt + 338001 - 0011-CVE-2006-3806-mfsa2006-50-Part-2-2-338001-Part-3-5.txt + 338121 - 0012-CVE-2006-3806-mfsa2006-50-Part-2-2-338121-Part-4-5.txt + 342960 - 0013-CVE-2006-3806-mfsa2006-50-Part-2-2-342960-Part-5-5.txt CVE-2006-3807 (mfsa2006-51) comprises 1 issue: + 340727 - 0014-CVE-2006-3807-mfsa2006-51-340727.txt CVE-2006-3808 (mfsa2006-52) comprises 1 issue: + 337389 - 0015-CVE-2006-3808-mfsa2006-52-337389.txt CVE-2006-3809 (mfsa2006-53) comprises 1 issue: + 340107 - 0016-CVE-2006-3809-mfsa2006-53-340107.txt CVE-2006-3810 (mfsa2006-55) comprises 6 issue: + 284219 - 0017-CVE-2006-3811-mfsa2006-55-284219-Part-1-6.txt + 329900 - 0018-CVE-2006-3811-mfsa2006-55-329900-Part-2-6.txt + 331679 - 0019-CVE-2006-3811-mfsa2006-55-331679-Part-3-6.txt + 336162 - 0020-CVE-2006-3811-mfsa2006-55-336162-Part-4-6.txt - 0023-CVE-2006-3811-mfsa2006-55-336162-Part-4-6-2nd-bits.txt + 337462 - 0021-CVE-2006-3811-mfsa2006-55-337462-Part-5-6.txt + 338129 - 0022-CVE-2006-3811-mfsa2006-55-338129-Part-6-6.txt stable/main/binary-arm/mozilla-thunderbird_1.0.2-2.sarge1.0.8b.1_arm.deb stable/main/binary-arm/mozilla-thunderbird-inspector_1.0.2-2.sarge1.0.8b.1_arm.deb stable/main/binary-arm/mozilla-thunderbird-typeaheadfind_1.0.2-2.sarge1.0.8b.1_arm.deb stable/main/binary-arm/mozilla-thunderbird-dev_1.0.2-2.sarge1.0.8b.1_arm.deb stable/main/binary-arm/mozilla-thunderbird-offline_1.0.2-2.sarge1.0.8b.1_arm.deb mozilla-thunderbird (1.0.2-2.sarge1.0.8b.1) stable-security; urgency=critical Patches listed below are in debian/patches/tbird-1.0.8a-1.0.8b * regression fixes: + 0003-regression-343713-was-introduced-by-fix-for-mfsa2006-31-336601.txt + 0004-regression-336875-was-introduced-by-fix-for-mfsa2006-31-336601.txt * late security patches left out in 2:1.7.8-1sarge7.1 CVE-2006-2779 (Issue 2/6) aka mfsa2006-32 (Part 2/7) + 0001-mfsa2006-32-325730-329982-Part-2-7.txt + 0002-mfsa2006-32-325730-329982-Part-2-7.txt * new security patches: CVE-2006-3805 (mfsa2006-50 Part 1) comprises 4 issues whose patches are: + 338804 - 0005-CVE-2006-3805-mfsa2006-50-Part-1-2-338804-Part-1-4.txt + 340129 - 0006-CVE-2006-3805-mfsa2006-50-Part-1-2-340129-Part-2-4.txt + 341877 - 0007-CVE-2006-3805-mfsa2006-50-Part-1-2-341877-Part-3-4.txt + 341956 - 0008-CVE-2006-3805-mfsa2006-50-Part-1-2-341956-Part-4-4.txt CVE-2006-3806 (mfsa2006-50 Part 2) comprises 4 issues: + 336409 - 0009-CVE-2006-3806-mfsa2006-50-Part-2-2-336409-Part-1-5.txt + 336410 - 0010-CVE-2006-3806-mfsa2006-50-Part-2-2-336410-Part-2-5.txt + 338001 - 0011-CVE-2006-3806-mfsa2006-50-Part-2-2-338001-Part-3-5.txt + 338121 - 0012-CVE-2006-3806-mfsa2006-50-Part-2-2-338121-Part-4-5.txt + 342960 - 0013-CVE-2006-3806-mfsa2006-50-Part-2-2-342960-Part-5-5.txt CVE-2006-3807 (mfsa2006-51) comprises 1 issue: + 340727 - 0014-CVE-2006-3807-mfsa2006-51-340727.txt CVE-2006-3808 (mfsa2006-52) comprises 1 issue: + 337389 - 0015-CVE-2006-3808-mfsa2006-52-337389.txt CVE-2006-3809 (mfsa2006-53) comprises 1 issue: + 340107 - 0016-CVE-2006-3809-mfsa2006-53-340107.txt CVE-2006-3810 (mfsa2006-55) comprises 6 issue: + 284219 - 0017-CVE-2006-3811-mfsa2006-55-284219-Part-1-6.txt + 329900 - 0018-CVE-2006-3811-mfsa2006-55-329900-Part-2-6.txt + 331679 - 0019-CVE-2006-3811-mfsa2006-55-331679-Part-3-6.txt + 336162 - 0020-CVE-2006-3811-mfsa2006-55-336162-Part-4-6.txt - 0023-CVE-2006-3811-mfsa2006-55-336162-Part-4-6-2nd-bits.txt + 337462 - 0021-CVE-2006-3811-mfsa2006-55-337462-Part-5-6.txt + 338129 - 0022-CVE-2006-3811-mfsa2006-55-338129-Part-6-6.txt stable/main/binary-alpha/mozilla-thunderbird-offline_1.0.2-2.sarge1.0.8b.1_alpha.deb stable/main/binary-alpha/mozilla-thunderbird_1.0.2-2.sarge1.0.8b.1_alpha.deb stable/main/binary-alpha/mozilla-thunderbird-inspector_1.0.2-2.sarge1.0.8b.1_alpha.deb stable/main/binary-alpha/mozilla-thunderbird-dev_1.0.2-2.sarge1.0.8b.1_alpha.deb stable/main/binary-alpha/mozilla-thunderbird-typeaheadfind_1.0.2-2.sarge1.0.8b.1_alpha.deb mozilla-thunderbird (1.0.2-2.sarge1.0.8b.1) stable-security; urgency=critical Patches listed below are in debian/patches/tbird-1.0.8a-1.0.8b * regression fixes: + 0003-regression-343713-was-introduced-by-fix-for-mfsa2006-31-336601.txt + 0004-regression-336875-was-introduced-by-fix-for-mfsa2006-31-336601.txt * late security patches left out in 2:1.7.8-1sarge7.1 CVE-2006-2779 (Issue 2/6) aka mfsa2006-32 (Part 2/7) + 0001-mfsa2006-32-325730-329982-Part-2-7.txt + 0002-mfsa2006-32-325730-329982-Part-2-7.txt * new security patches: CVE-2006-3805 (mfsa2006-50 Part 1) comprises 4 issues whose patches are: + 338804 - 0005-CVE-2006-3805-mfsa2006-50-Part-1-2-338804-Part-1-4.txt + 340129 - 0006-CVE-2006-3805-mfsa2006-50-Part-1-2-340129-Part-2-4.txt + 341877 - 0007-CVE-2006-3805-mfsa2006-50-Part-1-2-341877-Part-3-4.txt + 341956 - 0008-CVE-2006-3805-mfsa2006-50-Part-1-2-341956-Part-4-4.txt CVE-2006-3806 (mfsa2006-50 Part 2) comprises 4 issues: + 336409 - 0009-CVE-2006-3806-mfsa2006-50-Part-2-2-336409-Part-1-5.txt + 336410 - 0010-CVE-2006-3806-mfsa2006-50-Part-2-2-336410-Part-2-5.txt + 338001 - 0011-CVE-2006-3806-mfsa2006-50-Part-2-2-338001-Part-3-5.txt + 338121 - 0012-CVE-2006-3806-mfsa2006-50-Part-2-2-338121-Part-4-5.txt + 342960 - 0013-CVE-2006-3806-mfsa2006-50-Part-2-2-342960-Part-5-5.txt CVE-2006-3807 (mfsa2006-51) comprises 1 issue: + 340727 - 0014-CVE-2006-3807-mfsa2006-51-340727.txt CVE-2006-3808 (mfsa2006-52) comprises 1 issue: + 337389 - 0015-CVE-2006-3808-mfsa2006-52-337389.txt CVE-2006-3809 (mfsa2006-53) comprises 1 issue: + 340107 - 0016-CVE-2006-3809-mfsa2006-53-340107.txt CVE-2006-3810 (mfsa2006-55) comprises 6 issue: + 284219 - 0017-CVE-2006-3811-mfsa2006-55-284219-Part-1-6.txt + 329900 - 0018-CVE-2006-3811-mfsa2006-55-329900-Part-2-6.txt + 331679 - 0019-CVE-2006-3811-mfsa2006-55-331679-Part-3-6.txt + 336162 - 0020-CVE-2006-3811-mfsa2006-55-336162-Part-4-6.txt - 0023-CVE-2006-3811-mfsa2006-55-336162-Part-4-6-2nd-bits.txt + 337462 - 0021-CVE-2006-3811-mfsa2006-55-337462-Part-5-6.txt + 338129 - 0022-CVE-2006-3811-mfsa2006-55-338129-Part-6-6.txt stable/main/source/mozilla-thunderbird_1.0.2-2.sarge1.0.8b.1.dsc stable/main/binary-i386/mozilla-thunderbird-dev_1.0.2-2.sarge1.0.8b.1_i386.deb stable/main/source/mozilla-thunderbird_1.0.2-2.sarge1.0.8b.1.diff.gz stable/main/binary-i386/mozilla-thunderbird_1.0.2-2.sarge1.0.8b.1_i386.deb stable/main/binary-i386/mozilla-thunderbird-inspector_1.0.2-2.sarge1.0.8b.1_i386.deb stable/main/binary-i386/mozilla-thunderbird-typeaheadfind_1.0.2-2.sarge1.0.8b.1_i386.deb stable/main/binary-i386/mozilla-thunderbird-offline_1.0.2-2.sarge1.0.8b.1_i386.deb mozilla-thunderbird (1.0.2-2.sarge1.0.8b.1) stable-security; urgency=critical Patches listed below are in debian/patches/tbird-1.0.8a-1.0.8b * regression fixes: + 0003-regression-343713-was-introduced-by-fix-for-mfsa2006-31-336601.txt + 0004-regression-336875-was-introduced-by-fix-for-mfsa2006-31-336601.txt * late security patches left out in 2:1.7.8-1sarge7.1 CVE-2006-2779 (Issue 2/6) aka mfsa2006-32 (Part 2/7) + 0001-mfsa2006-32-325730-329982-Part-2-7.txt + 0002-mfsa2006-32-325730-329982-Part-2-7.txt * new security patches: CVE-2006-3805 (mfsa2006-50 Part 1) comprises 4 issues whose patches are: + 338804 - 0005-CVE-2006-3805-mfsa2006-50-Part-1-2-338804-Part-1-4.txt + 340129 - 0006-CVE-2006-3805-mfsa2006-50-Part-1-2-340129-Part-2-4.txt + 341877 - 0007-CVE-2006-3805-mfsa2006-50-Part-1-2-341877-Part-3-4.txt + 341956 - 0008-CVE-2006-3805-mfsa2006-50-Part-1-2-341956-Part-4-4.txt CVE-2006-3806 (mfsa2006-50 Part 2) comprises 4 issues: + 336409 - 0009-CVE-2006-3806-mfsa2006-50-Part-2-2-336409-Part-1-5.txt + 336410 - 0010-CVE-2006-3806-mfsa2006-50-Part-2-2-336410-Part-2-5.txt + 338001 - 0011-CVE-2006-3806-mfsa2006-50-Part-2-2-338001-Part-3-5.txt + 338121 - 0012-CVE-2006-3806-mfsa2006-50-Part-2-2-338121-Part-4-5.txt + 342960 - 0013-CVE-2006-3806-mfsa2006-50-Part-2-2-342960-Part-5-5.txt CVE-2006-3807 (mfsa2006-51) comprises 1 issue: + 340727 - 0014-CVE-2006-3807-mfsa2006-51-340727.txt CVE-2006-3808 (mfsa2006-52) comprises 1 issue: + 337389 - 0015-CVE-2006-3808-mfsa2006-52-337389.txt CVE-2006-3809 (mfsa2006-53) comprises 1 issue: + 340107 - 0016-CVE-2006-3809-mfsa2006-53-340107.txt CVE-2006-3810 (mfsa2006-55) comprises 6 issue: + 284219 - 0017-CVE-2006-3811-mfsa2006-55-284219-Part-1-6.txt + 329900 - 0018-CVE-2006-3811-mfsa2006-55-329900-Part-2-6.txt + 331679 - 0019-CVE-2006-3811-mfsa2006-55-331679-Part-3-6.txt + 336162 - 0020-CVE-2006-3811-mfsa2006-55-336162-Part-4-6.txt - 0023-CVE-2006-3811-mfsa2006-55-336162-Part-4-6-2nd-bits.txt + 337462 - 0021-CVE-2006-3811-mfsa2006-55-337462-Part-5-6.txt + 338129 - 0022-CVE-2006-3811-mfsa2006-55-338129-Part-6-6.txt stable/main/binary-sparc/mozilla-firefox_1.0.4-2sarge9_sparc.deb stable/main/binary-sparc/mozilla-firefox-dom-inspector_1.0.4-2sarge9_sparc.deb stable/main/binary-sparc/mozilla-firefox-gnome-support_1.0.4-2sarge9_sparc.deb mozilla-firefox (1.0.4-2sarge9) stable-security; urgency=critical * content/xul/templates/src/nsXULContentUtils.cpp, content/xul/templates/src/nsXULSortService.cpp: A couple of patches from Alexander Sack to fix regressions caused by the previous security fixes. stable/main/binary-s390/mozilla-firefox-gnome-support_1.0.4-2sarge9_s390.deb stable/main/binary-s390/mozilla-firefox_1.0.4-2sarge9_s390.deb stable/main/binary-s390/mozilla-firefox-dom-inspector_1.0.4-2sarge9_s390.deb mozilla-firefox (1.0.4-2sarge9) stable-security; urgency=critical * content/xul/templates/src/nsXULContentUtils.cpp, content/xul/templates/src/nsXULSortService.cpp: A couple of patches from Alexander Sack to fix regressions caused by the previous security fixes. stable/main/binary-powerpc/mozilla-firefox-dom-inspector_1.0.4-2sarge9_powerpc.deb stable/main/binary-powerpc/mozilla-firefox-gnome-support_1.0.4-2sarge9_powerpc.deb stable/main/binary-powerpc/mozilla-firefox_1.0.4-2sarge9_powerpc.deb mozilla-firefox (1.0.4-2sarge9) stable-security; urgency=critical * content/xul/templates/src/nsXULContentUtils.cpp, content/xul/templates/src/nsXULSortService.cpp: A couple of patches from Alexander Sack to fix regressions caused by the previous security fixes. stable/main/binary-mipsel/mozilla-firefox_1.0.4-2sarge9_mipsel.deb stable/main/binary-mipsel/mozilla-firefox-gnome-support_1.0.4-2sarge9_mipsel.deb stable/main/binary-mipsel/mozilla-firefox-dom-inspector_1.0.4-2sarge9_mipsel.deb mozilla-firefox (1.0.4-2sarge9) stable-security; urgency=critical * content/xul/templates/src/nsXULContentUtils.cpp, content/xul/templates/src/nsXULSortService.cpp: A couple of patches from Alexander Sack to fix regressions caused by the previous security fixes. stable/main/binary-mips/mozilla-firefox_1.0.4-2sarge9_mips.deb stable/main/binary-mips/mozilla-firefox-gnome-support_1.0.4-2sarge9_mips.deb stable/main/binary-mips/mozilla-firefox-dom-inspector_1.0.4-2sarge9_mips.deb mozilla-firefox (1.0.4-2sarge9) stable-security; urgency=critical * content/xul/templates/src/nsXULContentUtils.cpp, content/xul/templates/src/nsXULSortService.cpp: A couple of patches from Alexander Sack to fix regressions caused by the previous security fixes. stable/main/binary-m68k/mozilla-firefox_1.0.4-2sarge9_m68k.deb stable/main/binary-m68k/mozilla-firefox-dom-inspector_1.0.4-2sarge9_m68k.deb stable/main/binary-m68k/mozilla-firefox-gnome-support_1.0.4-2sarge9_m68k.deb mozilla-firefox (1.0.4-2sarge9) stable-security; urgency=critical * content/xul/templates/src/nsXULContentUtils.cpp, content/xul/templates/src/nsXULSortService.cpp: A couple of patches from Alexander Sack to fix regressions caused by the previous security fixes. stable/main/binary-ia64/mozilla-firefox_1.0.4-2sarge9_ia64.deb stable/main/binary-ia64/mozilla-firefox-gnome-support_1.0.4-2sarge9_ia64.deb stable/main/binary-ia64/mozilla-firefox-dom-inspector_1.0.4-2sarge9_ia64.deb mozilla-firefox (1.0.4-2sarge9) stable-security; urgency=critical * content/xul/templates/src/nsXULContentUtils.cpp, content/xul/templates/src/nsXULSortService.cpp: A couple of patches from Alexander Sack to fix regressions caused by the previous security fixes. stable/main/binary-hppa/mozilla-firefox_1.0.4-2sarge9_hppa.deb stable/main/binary-hppa/mozilla-firefox-dom-inspector_1.0.4-2sarge9_hppa.deb stable/main/binary-hppa/mozilla-firefox-gnome-support_1.0.4-2sarge9_hppa.deb mozilla-firefox (1.0.4-2sarge9) stable-security; urgency=critical * content/xul/templates/src/nsXULContentUtils.cpp, content/xul/templates/src/nsXULSortService.cpp: A couple of patches from Alexander Sack to fix regressions caused by the previous security fixes. stable/main/binary-arm/mozilla-firefox_1.0.4-2sarge9_arm.deb stable/main/binary-arm/mozilla-firefox-gnome-support_1.0.4-2sarge9_arm.deb stable/main/binary-arm/mozilla-firefox-dom-inspector_1.0.4-2sarge9_arm.deb mozilla-firefox (1.0.4-2sarge9) stable-security; urgency=critical * content/xul/templates/src/nsXULContentUtils.cpp, content/xul/templates/src/nsXULSortService.cpp: A couple of patches from Alexander Sack to fix regressions caused by the previous security fixes. stable/main/binary-alpha/mozilla-firefox_1.0.4-2sarge9_alpha.deb stable/main/binary-alpha/mozilla-firefox-gnome-support_1.0.4-2sarge9_alpha.deb stable/main/binary-alpha/mozilla-firefox-dom-inspector_1.0.4-2sarge9_alpha.deb mozilla-firefox (1.0.4-2sarge9) stable-security; urgency=critical * content/xul/templates/src/nsXULContentUtils.cpp, content/xul/templates/src/nsXULSortService.cpp: A couple of patches from Alexander Sack to fix regressions caused by the previous security fixes. stable/main/binary-i386/mozilla-firefox-dom-inspector_1.0.4-2sarge9_i386.deb stable/main/binary-i386/mozilla-firefox-gnome-support_1.0.4-2sarge9_i386.deb stable/main/binary-i386/mozilla-firefox_1.0.4-2sarge9_i386.deb stable/main/source/mozilla-firefox_1.0.4-2sarge9.diff.gz stable/main/source/mozilla-firefox_1.0.4-2sarge9.dsc mozilla-firefox (1.0.4-2sarge9) stable-security; urgency=critical * content/xul/templates/src/nsXULContentUtils.cpp, content/xul/templates/src/nsXULSortService.cpp: A couple of patches from Alexander Sack to fix regressions caused by the previous security fixes. stable/main/binary-sparc/mozilla-browser_1.7.8-1sarge7.1_sparc.deb stable/main/binary-sparc/libnspr-dev_1.7.8-1sarge7.1_sparc.deb stable/main/binary-sparc/mozilla-js-debugger_1.7.8-1sarge7.1_sparc.deb stable/main/binary-sparc/mozilla-calendar_1.7.8-1sarge7.1_sparc.deb stable/main/binary-sparc/mozilla-psm_1.7.8-1sarge7.1_sparc.deb stable/main/binary-sparc/mozilla-dom-inspector_1.7.8-1sarge7.1_sparc.deb stable/main/binary-sparc/mozilla_1.7.8-1sarge7.1_sparc.deb stable/main/binary-sparc/mozilla-chatzilla_1.7.8-1sarge7.1_sparc.deb stable/main/binary-sparc/mozilla-dev_1.7.8-1sarge7.1_sparc.deb stable/main/binary-sparc/libnss-dev_1.7.8-1sarge7.1_sparc.deb stable/main/binary-sparc/mozilla-mailnews_1.7.8-1sarge7.1_sparc.deb stable/main/binary-sparc/libnspr4_1.7.8-1sarge7.1_sparc.deb stable/main/binary-sparc/libnss3_1.7.8-1sarge7.1_sparc.deb mozilla (2:1.7.8-1sarge7.1) stable-security; urgency=critical * dropped mozilla 1.7.14 patches in debian/patches that fix various security issues: + CVE-2006-2787 : 1_0001-mfsa2006-31-319263-336601-336313.txt + CVE-2006-2786 1/2 : 1_0002-mfsa2006-33-Part-1-2-329746.txt + CVE-2006-2786 2/2 : 1_0003-mfsa2006-33-Part-2-2-330214.txt + CVE-2006-2785 2/2 : 1_0004-mfsa2006-34-Part2-2-329521-suite.txt + CVE-2006-2775 : 1_0005-mfsa2006-35-329677.txt 1_0023-mfsa2006-35-335142-regression-1-2-for-329677.txt 1_0024-mfsa2006-35-337841-regression-part-2-2-for-329677.txt + CVE-2006-2784 : 1_0006-mfsa2006-36-330037.txt + CVE-2006-2776 : 1_0007-mfsa2006-37-330773-with-belt-and-braces.txt + CVE-2006-2778 : 1_0008-mfsa2006-38-330897.txt + CVE-2006-1942 : 1_0009-mfsa2006-39-CVE-2006-1942-334341-suite.txt + CVE-2006-2781 : 1_0010-mfsa2006-40-334384.txt + CVE-2006-2782 : 1_0011-mfsa2006-41-334977.txt + CVE-2006-2783 : 1_0012-mfsa2006-42-335816.txt + CVE-2006-2777 : 1_0013-mfsa2006-43-336830.txt + CVE-2006-2779 3/6 : 1_0014-mfsa2006-32-Part-3-7-326501.txt + CVE-2006-2779 4/6 : 1_0015-mfsa2006-32-Part-4a-7-326931.txt + CVE-2006-2785 2/2 : 1_0015-mfsa2006-34-Part-1-2-xpfe-329468-suite.txt + CVE-2006-2779 4/6 : 1_0016-mfsa2006-32-Part-4b-7-329219.txt + CVE-2006-2779 4/6 : 1_0017-mfsa2006-32-Part-4c-7-330818-proper-aviary.txt + CVE-2006-2779 6/6 : 1_0018-mfsa2006-32-Part-6-7-332971.txt + CVE-2006-2780 : 1_0019-js-src-jsstr.c-335535-mfsa2006-32-Part-7-7.txt + CVE-2006-2779 5/6 : 1_0021-mfsa2006-32-Part-5-7-327712.txt * Note: CVE-2006-2779 (mfsa2006-32) is only partially fixed. Missing are tricky parts 1/6 and 2/6 from advisory: 1/6: Removing nested <option>s from a select (Jesse Ruderman) https://bugzilla.mozilla.org/show_bug.cgi?id=324918 2/6: 'Crashes during DOMNodeRemoved mutation event' https://bugzilla.mozilla.org/show_bug.cgi?id=325730 https://bugzilla.mozilla.org/show_bug.cgi?id=329982 stable/main/binary-s390/mozilla_1.7.8-1sarge7.1_s390.deb stable/main/binary-s390/mozilla-calendar_1.7.8-1sarge7.1_s390.deb stable/main/binary-s390/mozilla-chatzilla_1.7.8-1sarge7.1_s390.deb stable/main/binary-s390/libnspr-dev_1.7.8-1sarge7.1_s390.deb stable/main/binary-s390/mozilla-dev_1.7.8-1sarge7.1_s390.deb stable/main/binary-s390/libnss-dev_1.7.8-1sarge7.1_s390.deb stable/main/binary-s390/mozilla-browser_1.7.8-1sarge7.1_s390.deb stable/main/binary-s390/mozilla-mailnews_1.7.8-1sarge7.1_s390.deb stable/main/binary-s390/libnspr4_1.7.8-1sarge7.1_s390.deb stable/main/binary-s390/mozilla-js-debugger_1.7.8-1sarge7.1_s390.deb stable/main/binary-s390/mozilla-dom-inspector_1.7.8-1sarge7.1_s390.deb stable/main/binary-s390/mozilla-psm_1.7.8-1sarge7.1_s390.deb stable/main/binary-s390/libnss3_1.7.8-1sarge7.1_s390.deb mozilla (2:1.7.8-1sarge7.1) stable-security; urgency=critical * dropped mozilla 1.7.14 patches in debian/patches that fix various security issues: + CVE-2006-2787 : 1_0001-mfsa2006-31-319263-336601-336313.txt + CVE-2006-2786 1/2 : 1_0002-mfsa2006-33-Part-1-2-329746.txt + CVE-2006-2786 2/2 : 1_0003-mfsa2006-33-Part-2-2-330214.txt + CVE-2006-2785 2/2 : 1_0004-mfsa2006-34-Part2-2-329521-suite.txt + CVE-2006-2775 : 1_0005-mfsa2006-35-329677.txt 1_0023-mfsa2006-35-335142-regression-1-2-for-329677.txt 1_0024-mfsa2006-35-337841-regression-part-2-2-for-329677.txt + CVE-2006-2784 : 1_0006-mfsa2006-36-330037.txt + CVE-2006-2776 : 1_0007-mfsa2006-37-330773-with-belt-and-braces.txt + CVE-2006-2778 : 1_0008-mfsa2006-38-330897.txt + CVE-2006-1942 : 1_0009-mfsa2006-39-CVE-2006-1942-334341-suite.txt + CVE-2006-2781 : 1_0010-mfsa2006-40-334384.txt + CVE-2006-2782 : 1_0011-mfsa2006-41-334977.txt + CVE-2006-2783 : 1_0012-mfsa2006-42-335816.txt + CVE-2006-2777 : 1_0013-mfsa2006-43-336830.txt + CVE-2006-2779 3/6 : 1_0014-mfsa2006-32-Part-3-7-326501.txt + CVE-2006-2779 4/6 : 1_0015-mfsa2006-32-Part-4a-7-326931.txt + CVE-2006-2785 2/2 : 1_0015-mfsa2006-34-Part-1-2-xpfe-329468-suite.txt + CVE-2006-2779 4/6 : 1_0016-mfsa2006-32-Part-4b-7-329219.txt + CVE-2006-2779 4/6 : 1_0017-mfsa2006-32-Part-4c-7-330818-proper-aviary.txt + CVE-2006-2779 6/6 : 1_0018-mfsa2006-32-Part-6-7-332971.txt + CVE-2006-2780 : 1_0019-js-src-jsstr.c-335535-mfsa2006-32-Part-7-7.txt + CVE-2006-2779 5/6 : 1_0021-mfsa2006-32-Part-5-7-327712.txt * Note: CVE-2006-2779 (mfsa2006-32) is only partially fixed. Missing are tricky parts 1/6 and 2/6 from advisory: 1/6: Removing nested <option>s from a select (Jesse Ruderman) https://bugzilla.mozilla.org/show_bug.cgi?id=324918 2/6: 'Crashes during DOMNodeRemoved mutation event' https://bugzilla.mozilla.org/show_bug.cgi?id=325730 https://bugzilla.mozilla.org/show_bug.cgi?id=329982 stable/main/binary-powerpc/mozilla-browser_1.7.8-1sarge7.1_powerpc.deb stable/main/binary-powerpc/mozilla_1.7.8-1sarge7.1_powerpc.deb stable/main/binary-powerpc/libnspr4_1.7.8-1sarge7.1_powerpc.deb stable/main/binary-powerpc/mozilla-dev_1.7.8-1sarge7.1_powerpc.deb stable/main/binary-powerpc/mozilla-chatzilla_1.7.8-1sarge7.1_powerpc.deb stable/main/binary-powerpc/libnspr-dev_1.7.8-1sarge7.1_powerpc.deb stable/main/binary-powerpc/libnss3_1.7.8-1sarge7.1_powerpc.deb stable/main/binary-powerpc/mozilla-psm_1.7.8-1sarge7.1_powerpc.deb stable/main/binary-powerpc/libnss-dev_1.7.8-1sarge7.1_powerpc.deb stable/main/binary-powerpc/mozilla-dom-inspector_1.7.8-1sarge7.1_powerpc.deb stable/main/binary-powerpc/mozilla-js-debugger_1.7.8-1sarge7.1_powerpc.deb stable/main/binary-powerpc/mozilla-mailnews_1.7.8-1sarge7.1_powerpc.deb stable/main/binary-powerpc/mozilla-calendar_1.7.8-1sarge7.1_powerpc.deb mozilla (2:1.7.8-1sarge7.1) stable-security; urgency=critical * dropped mozilla 1.7.14 patches in debian/patches that fix various security issues: + CVE-2006-2787 : 1_0001-mfsa2006-31-319263-336601-336313.txt + CVE-2006-2786 1/2 : 1_0002-mfsa2006-33-Part-1-2-329746.txt + CVE-2006-2786 2/2 : 1_0003-mfsa2006-33-Part-2-2-330214.txt + CVE-2006-2785 2/2 : 1_0004-mfsa2006-34-Part2-2-329521-suite.txt + CVE-2006-2775 : 1_0005-mfsa2006-35-329677.txt 1_0023-mfsa2006-35-335142-regression-1-2-for-329677.txt 1_0024-mfsa2006-35-337841-regression-part-2-2-for-329677.txt + CVE-2006-2784 : 1_0006-mfsa2006-36-330037.txt + CVE-2006-2776 : 1_0007-mfsa2006-37-330773-with-belt-and-braces.txt + CVE-2006-2778 : 1_0008-mfsa2006-38-330897.txt + CVE-2006-1942 : 1_0009-mfsa2006-39-CVE-2006-1942-334341-suite.txt + CVE-2006-2781 : 1_0010-mfsa2006-40-334384.txt + CVE-2006-2782 : 1_0011-mfsa2006-41-334977.txt + CVE-2006-2783 : 1_0012-mfsa2006-42-335816.txt + CVE-2006-2777 : 1_0013-mfsa2006-43-336830.txt + CVE-2006-2779 3/6 : 1_0014-mfsa2006-32-Part-3-7-326501.txt + CVE-2006-2779 4/6 : 1_0015-mfsa2006-32-Part-4a-7-326931.txt + CVE-2006-2785 2/2 : 1_0015-mfsa2006-34-Part-1-2-xpfe-329468-suite.txt + CVE-2006-2779 4/6 : 1_0016-mfsa2006-32-Part-4b-7-329219.txt + CVE-2006-2779 4/6 : 1_0017-mfsa2006-32-Part-4c-7-330818-proper-aviary.txt + CVE-2006-2779 6/6 : 1_0018-mfsa2006-32-Part-6-7-332971.txt + CVE-2006-2780 : 1_0019-js-src-jsstr.c-335535-mfsa2006-32-Part-7-7.txt + CVE-2006-2779 5/6 : 1_0021-mfsa2006-32-Part-5-7-327712.txt * Note: CVE-2006-2779 (mfsa2006-32) is only partially fixed. Missing are tricky parts 1/6 and 2/6 from advisory: 1/6: Removing nested <option>s from a select (Jesse Ruderman) https://bugzilla.mozilla.org/show_bug.cgi?id=324918 2/6: 'Crashes during DOMNodeRemoved mutation event' https://bugzilla.mozilla.org/show_bug.cgi?id=325730 https://bugzilla.mozilla.org/show_bug.cgi?id=329982 stable/main/binary-mipsel/mozilla-psm_1.7.8-1sarge7.1_mipsel.deb stable/main/binary-mipsel/libnspr-dev_1.7.8-1sarge7.1_mipsel.deb stable/main/binary-mipsel/mozilla_1.7.8-1sarge7.1_mipsel.deb stable/main/binary-mipsel/mozilla-dev_1.7.8-1sarge7.1_mipsel.deb stable/main/binary-mipsel/mozilla-browser_1.7.8-1sarge7.1_mipsel.deb stable/main/binary-mipsel/mozilla-mailnews_1.7.8-1sarge7.1_mipsel.deb stable/main/binary-mipsel/libnss3_1.7.8-1sarge7.1_mipsel.deb stable/main/binary-mipsel/mozilla-chatzilla_1.7.8-1sarge7.1_mipsel.deb stable/main/binary-mipsel/mozilla-calendar_1.7.8-1sarge7.1_mipsel.deb stable/main/binary-mipsel/libnss-dev_1.7.8-1sarge7.1_mipsel.deb stable/main/binary-mipsel/mozilla-js-debugger_1.7.8-1sarge7.1_mipsel.deb stable/main/binary-mipsel/libnspr4_1.7.8-1sarge7.1_mipsel.deb stable/main/binary-mipsel/mozilla-dom-inspector_1.7.8-1sarge7.1_mipsel.deb mozilla (2:1.7.8-1sarge7.1) stable-security; urgency=critical * dropped mozilla 1.7.14 patches in debian/patches that fix various security issues: + CVE-2006-2787 : 1_0001-mfsa2006-31-319263-336601-336313.txt + CVE-2006-2786 1/2 : 1_0002-mfsa2006-33-Part-1-2-329746.txt + CVE-2006-2786 2/2 : 1_0003-mfsa2006-33-Part-2-2-330214.txt + CVE-2006-2785 2/2 : 1_0004-mfsa2006-34-Part2-2-329521-suite.txt + CVE-2006-2775 : 1_0005-mfsa2006-35-329677.txt 1_0023-mfsa2006-35-335142-regression-1-2-for-329677.txt 1_0024-mfsa2006-35-337841-regression-part-2-2-for-329677.txt + CVE-2006-2784 : 1_0006-mfsa2006-36-330037.txt + CVE-2006-2776 : 1_0007-mfsa2006-37-330773-with-belt-and-braces.txt + CVE-2006-2778 : 1_0008-mfsa2006-38-330897.txt + CVE-2006-1942 : 1_0009-mfsa2006-39-CVE-2006-1942-334341-suite.txt + CVE-2006-2781 : 1_0010-mfsa2006-40-334384.txt + CVE-2006-2782 : 1_0011-mfsa2006-41-334977.txt + CVE-2006-2783 : 1_0012-mfsa2006-42-335816.txt + CVE-2006-2777 : 1_0013-mfsa2006-43-336830.txt + CVE-2006-2779 3/6 : 1_0014-mfsa2006-32-Part-3-7-326501.txt + CVE-2006-2779 4/6 : 1_0015-mfsa2006-32-Part-4a-7-326931.txt + CVE-2006-2785 2/2 : 1_0015-mfsa2006-34-Part-1-2-xpfe-329468-suite.txt + CVE-2006-2779 4/6 : 1_0016-mfsa2006-32-Part-4b-7-329219.txt + CVE-2006-2779 4/6 : 1_0017-mfsa2006-32-Part-4c-7-330818-proper-aviary.txt + CVE-2006-2779 6/6 : 1_0018-mfsa2006-32-Part-6-7-332971.txt + CVE-2006-2780 : 1_0019-js-src-jsstr.c-335535-mfsa2006-32-Part-7-7.txt + CVE-2006-2779 5/6 : 1_0021-mfsa2006-32-Part-5-7-327712.txt * Note: CVE-2006-2779 (mfsa2006-32) is only partially fixed. Missing are tricky parts 1/6 and 2/6 from advisory: 1/6: Removing nested <option>s from a select (Jesse Ruderman) https://bugzilla.mozilla.org/show_bug.cgi?id=324918 2/6: 'Crashes during DOMNodeRemoved mutation event' https://bugzilla.mozilla.org/show_bug.cgi?id=325730 https://bugzilla.mozilla.org/show_bug.cgi?id=329982 stable/main/binary-mips/mozilla-mailnews_1.7.8-1sarge7.1_mips.deb stable/main/binary-mips/libnss-dev_1.7.8-1sarge7.1_mips.deb stable/main/binary-mips/libnspr-dev_1.7.8-1sarge7.1_mips.deb stable/main/binary-mips/libnss3_1.7.8-1sarge7.1_mips.deb stable/main/binary-mips/mozilla-chatzilla_1.7.8-1sarge7.1_mips.deb stable/main/binary-mips/mozilla-psm_1.7.8-1sarge7.1_mips.deb stable/main/binary-mips/mozilla_1.7.8-1sarge7.1_mips.deb stable/main/binary-mips/mozilla-dom-inspector_1.7.8-1sarge7.1_mips.deb stable/main/binary-mips/mozilla-calendar_1.7.8-1sarge7.1_mips.deb stable/main/binary-mips/mozilla-dev_1.7.8-1sarge7.1_mips.deb stable/main/binary-mips/libnspr4_1.7.8-1sarge7.1_mips.deb stable/main/binary-mips/mozilla-js-debugger_1.7.8-1sarge7.1_mips.deb stable/main/binary-mips/mozilla-browser_1.7.8-1sarge7.1_mips.deb mozilla (2:1.7.8-1sarge7.1) stable-security; urgency=critical * dropped mozilla 1.7.14 patches in debian/patches that fix various security issues: + CVE-2006-2787 : 1_0001-mfsa2006-31-319263-336601-336313.txt + CVE-2006-2786 1/2 : 1_0002-mfsa2006-33-Part-1-2-329746.txt + CVE-2006-2786 2/2 : 1_0003-mfsa2006-33-Part-2-2-330214.txt + CVE-2006-2785 2/2 : 1_0004-mfsa2006-34-Part2-2-329521-suite.txt + CVE-2006-2775 : 1_0005-mfsa2006-35-329677.txt 1_0023-mfsa2006-35-335142-regression-1-2-for-329677.txt 1_0024-mfsa2006-35-337841-regression-part-2-2-for-329677.txt + CVE-2006-2784 : 1_0006-mfsa2006-36-330037.txt + CVE-2006-2776 : 1_0007-mfsa2006-37-330773-with-belt-and-braces.txt + CVE-2006-2778 : 1_0008-mfsa2006-38-330897.txt + CVE-2006-1942 : 1_0009-mfsa2006-39-CVE-2006-1942-334341-suite.txt + CVE-2006-2781 : 1_0010-mfsa2006-40-334384.txt + CVE-2006-2782 : 1_0011-mfsa2006-41-334977.txt + CVE-2006-2783 : 1_0012-mfsa2006-42-335816.txt + CVE-2006-2777 : 1_0013-mfsa2006-43-336830.txt + CVE-2006-2779 3/6 : 1_0014-mfsa2006-32-Part-3-7-326501.txt + CVE-2006-2779 4/6 : 1_0015-mfsa2006-32-Part-4a-7-326931.txt + CVE-2006-2785 2/2 : 1_0015-mfsa2006-34-Part-1-2-xpfe-329468-suite.txt + CVE-2006-2779 4/6 : 1_0016-mfsa2006-32-Part-4b-7-329219.txt + CVE-2006-2779 4/6 : 1_0017-mfsa2006-32-Part-4c-7-330818-proper-aviary.txt + CVE-2006-2779 6/6 : 1_0018-mfsa2006-32-Part-6-7-332971.txt + CVE-2006-2780 : 1_0019-js-src-jsstr.c-335535-mfsa2006-32-Part-7-7.txt + CVE-2006-2779 5/6 : 1_0021-mfsa2006-32-Part-5-7-327712.txt * Note: CVE-2006-2779 (mfsa2006-32) is only partially fixed. Missing are tricky parts 1/6 and 2/6 from advisory: 1/6: Removing nested <option>s from a select (Jesse Ruderman) https://bugzilla.mozilla.org/show_bug.cgi?id=324918 2/6: 'Crashes during DOMNodeRemoved mutation event' https://bugzilla.mozilla.org/show_bug.cgi?id=325730 https://bugzilla.mozilla.org/show_bug.cgi?id=329982 stable/main/binary-m68k/libnss3_1.7.8-1sarge7.1_m68k.deb stable/main/binary-m68k/libnspr-dev_1.7.8-1sarge7.1_m68k.deb stable/main/binary-m68k/libnspr4_1.7.8-1sarge7.1_m68k.deb stable/main/binary-m68k/mozilla-js-debugger_1.7.8-1sarge7.1_m68k.deb stable/main/binary-m68k/mozilla-chatzilla_1.7.8-1sarge7.1_m68k.deb stable/main/binary-m68k/mozilla-dev_1.7.8-1sarge7.1_m68k.deb stable/main/binary-m68k/libnss-dev_1.7.8-1sarge7.1_m68k.deb stable/main/binary-m68k/mozilla-dom-inspector_1.7.8-1sarge7.1_m68k.deb stable/main/binary-m68k/mozilla-browser_1.7.8-1sarge7.1_m68k.deb stable/main/binary-m68k/mozilla_1.7.8-1sarge7.1_m68k.deb stable/main/binary-m68k/mozilla-mailnews_1.7.8-1sarge7.1_m68k.deb stable/main/binary-m68k/mozilla-psm_1.7.8-1sarge7.1_m68k.deb stable/main/binary-m68k/mozilla-calendar_1.7.8-1sarge7.1_m68k.deb mozilla (2:1.7.8-1sarge7.1) stable-security; urgency=critical * dropped mozilla 1.7.14 patches in debian/patches that fix various security issues: + CVE-2006-2787 : 1_0001-mfsa2006-31-319263-336601-336313.txt + CVE-2006-2786 1/2 : 1_0002-mfsa2006-33-Part-1-2-329746.txt + CVE-2006-2786 2/2 : 1_0003-mfsa2006-33-Part-2-2-330214.txt + CVE-2006-2785 2/2 : 1_0004-mfsa2006-34-Part2-2-329521-suite.txt + CVE-2006-2775 : 1_0005-mfsa2006-35-329677.txt 1_0023-mfsa2006-35-335142-regression-1-2-for-329677.txt 1_0024-mfsa2006-35-337841-regression-part-2-2-for-329677.txt + CVE-2006-2784 : 1_0006-mfsa2006-36-330037.txt + CVE-2006-2776 : 1_0007-mfsa2006-37-330773-with-belt-and-braces.txt + CVE-2006-2778 : 1_0008-mfsa2006-38-330897.txt + CVE-2006-1942 : 1_0009-mfsa2006-39-CVE-2006-1942-334341-suite.txt + CVE-2006-2781 : 1_0010-mfsa2006-40-334384.txt + CVE-2006-2782 : 1_0011-mfsa2006-41-334977.txt + CVE-2006-2783 : 1_0012-mfsa2006-42-335816.txt + CVE-2006-2777 : 1_0013-mfsa2006-43-336830.txt + CVE-2006-2779 3/6 : 1_0014-mfsa2006-32-Part-3-7-326501.txt + CVE-2006-2779 4/6 : 1_0015-mfsa2006-32-Part-4a-7-326931.txt + CVE-2006-2785 2/2 : 1_0015-mfsa2006-34-Part-1-2-xpfe-329468-suite.txt + CVE-2006-2779 4/6 : 1_0016-mfsa2006-32-Part-4b-7-329219.txt + CVE-2006-2779 4/6 : 1_0017-mfsa2006-32-Part-4c-7-330818-proper-aviary.txt + CVE-2006-2779 6/6 : 1_0018-mfsa2006-32-Part-6-7-332971.txt + CVE-2006-2780 : 1_0019-js-src-jsstr.c-335535-mfsa2006-32-Part-7-7.txt + CVE-2006-2779 5/6 : 1_0021-mfsa2006-32-Part-5-7-327712.txt * Note: CVE-2006-2779 (mfsa2006-32) is only partially fixed. Missing are tricky parts 1/6 and 2/6 from advisory: 1/6: Removing nested <option>s from a select (Jesse Ruderman) https://bugzilla.mozilla.org/show_bug.cgi?id=324918 2/6: 'Crashes during DOMNodeRemoved mutation event' https://bugzilla.mozilla.org/show_bug.cgi?id=325730 https://bugzilla.mozilla.org/show_bug.cgi?id=329982 stable/main/binary-ia64/mozilla_1.7.8-1sarge7.1_ia64.deb stable/main/binary-ia64/mozilla-mailnews_1.7.8-1sarge7.1_ia64.deb stable/main/binary-ia64/mozilla-chatzilla_1.7.8-1sarge7.1_ia64.deb stable/main/binary-ia64/libnss3_1.7.8-1sarge7.1_ia64.deb stable/main/binary-ia64/libnss-dev_1.7.8-1sarge7.1_ia64.deb stable/main/binary-ia64/mozilla-browser_1.7.8-1sarge7.1_ia64.deb stable/main/binary-ia64/libnspr4_1.7.8-1sarge7.1_ia64.deb stable/main/binary-ia64/mozilla-js-debugger_1.7.8-1sarge7.1_ia64.deb stable/main/binary-ia64/mozilla-calendar_1.7.8-1sarge7.1_ia64.deb stable/main/binary-ia64/mozilla-dom-inspector_1.7.8-1sarge7.1_ia64.deb stable/main/binary-ia64/mozilla-dev_1.7.8-1sarge7.1_ia64.deb stable/main/binary-ia64/mozilla-psm_1.7.8-1sarge7.1_ia64.deb stable/main/binary-ia64/libnspr-dev_1.7.8-1sarge7.1_ia64.deb mozilla (2:1.7.8-1sarge7.1) stable-security; urgency=critical * dropped mozilla 1.7.14 patches in debian/patches that fix various security issues: + CVE-2006-2787 : 1_0001-mfsa2006-31-319263-336601-336313.txt + CVE-2006-2786 1/2 : 1_0002-mfsa2006-33-Part-1-2-329746.txt + CVE-2006-2786 2/2 : 1_0003-mfsa2006-33-Part-2-2-330214.txt + CVE-2006-2785 2/2 : 1_0004-mfsa2006-34-Part2-2-329521-suite.txt + CVE-2006-2775 : 1_0005-mfsa2006-35-329677.txt 1_0023-mfsa2006-35-335142-regression-1-2-for-329677.txt 1_0024-mfsa2006-35-337841-regression-part-2-2-for-329677.txt + CVE-2006-2784 : 1_0006-mfsa2006-36-330037.txt + CVE-2006-2776 : 1_0007-mfsa2006-37-330773-with-belt-and-braces.txt + CVE-2006-2778 : 1_0008-mfsa2006-38-330897.txt + CVE-2006-1942 : 1_0009-mfsa2006-39-CVE-2006-1942-334341-suite.txt + CVE-2006-2781 : 1_0010-mfsa2006-40-334384.txt + CVE-2006-2782 : 1_0011-mfsa2006-41-334977.txt + CVE-2006-2783 : 1_0012-mfsa2006-42-335816.txt + CVE-2006-2777 : 1_0013-mfsa2006-43-336830.txt + CVE-2006-2779 3/6 : 1_0014-mfsa2006-32-Part-3-7-326501.txt + CVE-2006-2779 4/6 : 1_0015-mfsa2006-32-Part-4a-7-326931.txt + CVE-2006-2785 2/2 : 1_0015-mfsa2006-34-Part-1-2-xpfe-329468-suite.txt + CVE-2006-2779 4/6 : 1_0016-mfsa2006-32-Part-4b-7-329219.txt + CVE-2006-2779 4/6 : 1_0017-mfsa2006-32-Part-4c-7-330818-proper-aviary.txt + CVE-2006-2779 6/6 : 1_0018-mfsa2006-32-Part-6-7-332971.txt + CVE-2006-2780 : 1_0019-js-src-jsstr.c-335535-mfsa2006-32-Part-7-7.txt + CVE-2006-2779 5/6 : 1_0021-mfsa2006-32-Part-5-7-327712.txt * Note: CVE-2006-2779 (mfsa2006-32) is only partially fixed. Missing are tricky parts 1/6 and 2/6 from advisory: 1/6: Removing nested <option>s from a select (Jesse Ruderman) https://bugzilla.mozilla.org/show_bug.cgi?id=324918 2/6: 'Crashes during DOMNodeRemoved mutation event' https://bugzilla.mozilla.org/show_bug.cgi?id=325730 https://bugzilla.mozilla.org/show_bug.cgi?id=329982 stable/main/binary-hppa/libnss3_1.7.8-1sarge7.1_hppa.deb stable/main/binary-hppa/mozilla_1.7.8-1sarge7.1_hppa.deb stable/main/binary-hppa/mozilla-dom-inspector_1.7.8-1sarge7.1_hppa.deb stable/main/binary-hppa/mozilla-chatzilla_1.7.8-1sarge7.1_hppa.deb stable/main/binary-hppa/libnspr4_1.7.8-1sarge7.1_hppa.deb stable/main/binary-hppa/libnss-dev_1.7.8-1sarge7.1_hppa.deb stable/main/binary-hppa/mozilla-browser_1.7.8-1sarge7.1_hppa.deb stable/main/binary-hppa/mozilla-calendar_1.7.8-1sarge7.1_hppa.deb stable/main/binary-hppa/mozilla-mailnews_1.7.8-1sarge7.1_hppa.deb stable/main/binary-hppa/libnspr-dev_1.7.8-1sarge7.1_hppa.deb stable/main/binary-hppa/mozilla-psm_1.7.8-1sarge7.1_hppa.deb stable/main/binary-hppa/mozilla-dev_1.7.8-1sarge7.1_hppa.deb stable/main/binary-hppa/mozilla-js-debugger_1.7.8-1sarge7.1_hppa.deb mozilla (2:1.7.8-1sarge7.1) stable-security; urgency=critical * dropped mozilla 1.7.14 patches in debian/patches that fix various security issues: + CVE-2006-2787 : 1_0001-mfsa2006-31-319263-336601-336313.txt + CVE-2006-2786 1/2 : 1_0002-mfsa2006-33-Part-1-2-329746.txt + CVE-2006-2786 2/2 : 1_0003-mfsa2006-33-Part-2-2-330214.txt + CVE-2006-2785 2/2 : 1_0004-mfsa2006-34-Part2-2-329521-suite.txt + CVE-2006-2775 : 1_0005-mfsa2006-35-329677.txt 1_0023-mfsa2006-35-335142-regression-1-2-for-329677.txt 1_0024-mfsa2006-35-337841-regression-part-2-2-for-329677.txt + CVE-2006-2784 : 1_0006-mfsa2006-36-330037.txt + CVE-2006-2776 : 1_0007-mfsa2006-37-330773-with-belt-and-braces.txt + CVE-2006-2778 : 1_0008-mfsa2006-38-330897.txt + CVE-2006-1942 : 1_0009-mfsa2006-39-CVE-2006-1942-334341-suite.txt + CVE-2006-2781 : 1_0010-mfsa2006-40-334384.txt + CVE-2006-2782 : 1_0011-mfsa2006-41-334977.txt + CVE-2006-2783 : 1_0012-mfsa2006-42-335816.txt + CVE-2006-2777 : 1_0013-mfsa2006-43-336830.txt + CVE-2006-2779 3/6 : 1_0014-mfsa2006-32-Part-3-7-326501.txt + CVE-2006-2779 4/6 : 1_0015-mfsa2006-32-Part-4a-7-326931.txt + CVE-2006-2785 2/2 : 1_0015-mfsa2006-34-Part-1-2-xpfe-329468-suite.txt + CVE-2006-2779 4/6 : 1_0016-mfsa2006-32-Part-4b-7-329219.txt + CVE-2006-2779 4/6 : 1_0017-mfsa2006-32-Part-4c-7-330818-proper-aviary.txt + CVE-2006-2779 6/6 : 1_0018-mfsa2006-32-Part-6-7-332971.txt + CVE-2006-2780 : 1_0019-js-src-jsstr.c-335535-mfsa2006-32-Part-7-7.txt + CVE-2006-2779 5/6 : 1_0021-mfsa2006-32-Part-5-7-327712.txt * Note: CVE-2006-2779 (mfsa2006-32) is only partially fixed. Missing are tricky parts 1/6 and 2/6 from advisory: 1/6: Removing nested <option>s from a select (Jesse Ruderman) https://bugzilla.mozilla.org/show_bug.cgi?id=324918 2/6: 'Crashes during DOMNodeRemoved mutation event' https://bugzilla.mozilla.org/show_bug.cgi?id=325730 https://bugzilla.mozilla.org/show_bug.cgi?id=329982 stable/main/binary-arm/libnss-dev_1.7.8-1sarge7.1_arm.deb stable/main/binary-arm/libnspr-dev_1.7.8-1sarge7.1_arm.deb stable/main/binary-arm/libnspr4_1.7.8-1sarge7.1_arm.deb stable/main/binary-arm/libnss3_1.7.8-1sarge7.1_arm.deb stable/main/binary-arm/mozilla-calendar_1.7.8-1sarge7.1_arm.deb stable/main/binary-arm/mozilla-dom-inspector_1.7.8-1sarge7.1_arm.deb stable/main/binary-arm/mozilla-dev_1.7.8-1sarge7.1_arm.deb stable/main/binary-arm/mozilla-psm_1.7.8-1sarge7.1_arm.deb stable/main/binary-arm/mozilla_1.7.8-1sarge7.1_arm.deb stable/main/binary-arm/mozilla-browser_1.7.8-1sarge7.1_arm.deb stable/main/binary-arm/mozilla-js-debugger_1.7.8-1sarge7.1_arm.deb stable/main/binary-arm/mozilla-mailnews_1.7.8-1sarge7.1_arm.deb stable/main/binary-arm/mozilla-chatzilla_1.7.8-1sarge7.1_arm.deb mozilla (2:1.7.8-1sarge7.1) stable-security; urgency=critical * dropped mozilla 1.7.14 patches in debian/patches that fix various security issues: + CVE-2006-2787 : 1_0001-mfsa2006-31-319263-336601-336313.txt + CVE-2006-2786 1/2 : 1_0002-mfsa2006-33-Part-1-2-329746.txt + CVE-2006-2786 2/2 : 1_0003-mfsa2006-33-Part-2-2-330214.txt + CVE-2006-2785 2/2 : 1_0004-mfsa2006-34-Part2-2-329521-suite.txt + CVE-2006-2775 : 1_0005-mfsa2006-35-329677.txt 1_0023-mfsa2006-35-335142-regression-1-2-for-329677.txt 1_0024-mfsa2006-35-337841-regression-part-2-2-for-329677.txt + CVE-2006-2784 : 1_0006-mfsa2006-36-330037.txt + CVE-2006-2776 : 1_0007-mfsa2006-37-330773-with-belt-and-braces.txt + CVE-2006-2778 : 1_0008-mfsa2006-38-330897.txt + CVE-2006-1942 : 1_0009-mfsa2006-39-CVE-2006-1942-334341-suite.txt + CVE-2006-2781 : 1_0010-mfsa2006-40-334384.txt + CVE-2006-2782 : 1_0011-mfsa2006-41-334977.txt + CVE-2006-2783 : 1_0012-mfsa2006-42-335816.txt + CVE-2006-2777 : 1_0013-mfsa2006-43-336830.txt + CVE-2006-2779 3/6 : 1_0014-mfsa2006-32-Part-3-7-326501.txt + CVE-2006-2779 4/6 : 1_0015-mfsa2006-32-Part-4a-7-326931.txt + CVE-2006-2785 2/2 : 1_0015-mfsa2006-34-Part-1-2-xpfe-329468-suite.txt + CVE-2006-2779 4/6 : 1_0016-mfsa2006-32-Part-4b-7-329219.txt + CVE-2006-2779 4/6 : 1_0017-mfsa2006-32-Part-4c-7-330818-proper-aviary.txt + CVE-2006-2779 6/6 : 1_0018-mfsa2006-32-Part-6-7-332971.txt + CVE-2006-2780 : 1_0019-js-src-jsstr.c-335535-mfsa2006-32-Part-7-7.txt + CVE-2006-2779 5/6 : 1_0021-mfsa2006-32-Part-5-7-327712.txt * Note: CVE-2006-2779 (mfsa2006-32) is only partially fixed. Missing are tricky parts 1/6 and 2/6 from advisory: 1/6: Removing nested <option>s from a select (Jesse Ruderman) https://bugzilla.mozilla.org/show_bug.cgi?id=324918 2/6: 'Crashes during DOMNodeRemoved mutation event' https://bugzilla.mozilla.org/show_bug.cgi?id=325730 https://bugzilla.mozilla.org/show_bug.cgi?id=329982 stable/main/binary-alpha/mozilla-calendar_1.7.8-1sarge7.1_alpha.deb stable/main/binary-alpha/mozilla-chatzilla_1.7.8-1sarge7.1_alpha.deb stable/main/binary-alpha/libnspr-dev_1.7.8-1sarge7.1_alpha.deb stable/main/binary-alpha/mozilla-dev_1.7.8-1sarge7.1_alpha.deb stable/main/binary-alpha/mozilla-js-debugger_1.7.8-1sarge7.1_alpha.deb stable/main/binary-alpha/libnspr4_1.7.8-1sarge7.1_alpha.deb stable/main/binary-alpha/mozilla-mailnews_1.7.8-1sarge7.1_alpha.deb stable/main/binary-alpha/mozilla-dom-inspector_1.7.8-1sarge7.1_alpha.deb stable/main/binary-alpha/mozilla-psm_1.7.8-1sarge7.1_alpha.deb stable/main/binary-alpha/libnss-dev_1.7.8-1sarge7.1_alpha.deb stable/main/binary-alpha/mozilla-browser_1.7.8-1sarge7.1_alpha.deb stable/main/binary-alpha/mozilla_1.7.8-1sarge7.1_alpha.deb stable/main/binary-alpha/libnss3_1.7.8-1sarge7.1_alpha.deb mozilla (2:1.7.8-1sarge7.1) stable-security; urgency=critical * dropped mozilla 1.7.14 patches in debian/patches that fix various security issues: + CVE-2006-2787 : 1_0001-mfsa2006-31-319263-336601-336313.txt + CVE-2006-2786 1/2 : 1_0002-mfsa2006-33-Part-1-2-329746.txt + CVE-2006-2786 2/2 : 1_0003-mfsa2006-33-Part-2-2-330214.txt + CVE-2006-2785 2/2 : 1_0004-mfsa2006-34-Part2-2-329521-suite.txt + CVE-2006-2775 : 1_0005-mfsa2006-35-329677.txt 1_0023-mfsa2006-35-335142-regression-1-2-for-329677.txt 1_0024-mfsa2006-35-337841-regression-part-2-2-for-329677.txt + CVE-2006-2784 : 1_0006-mfsa2006-36-330037.txt + CVE-2006-2776 : 1_0007-mfsa2006-37-330773-with-belt-and-braces.txt + CVE-2006-2778 : 1_0008-mfsa2006-38-330897.txt + CVE-2006-1942 : 1_0009-mfsa2006-39-CVE-2006-1942-334341-suite.txt + CVE-2006-2781 : 1_0010-mfsa2006-40-334384.txt + CVE-2006-2782 : 1_0011-mfsa2006-41-334977.txt + CVE-2006-2783 : 1_0012-mfsa2006-42-335816.txt + CVE-2006-2777 : 1_0013-mfsa2006-43-336830.txt + CVE-2006-2779 3/6 : 1_0014-mfsa2006-32-Part-3-7-326501.txt + CVE-2006-2779 4/6 : 1_0015-mfsa2006-32-Part-4a-7-326931.txt + CVE-2006-2785 2/2 : 1_0015-mfsa2006-34-Part-1-2-xpfe-329468-suite.txt + CVE-2006-2779 4/6 : 1_0016-mfsa2006-32-Part-4b-7-329219.txt + CVE-2006-2779 4/6 : 1_0017-mfsa2006-32-Part-4c-7-330818-proper-aviary.txt + CVE-2006-2779 6/6 : 1_0018-mfsa2006-32-Part-6-7-332971.txt + CVE-2006-2780 : 1_0019-js-src-jsstr.c-335535-mfsa2006-32-Part-7-7.txt + CVE-2006-2779 5/6 : 1_0021-mfsa2006-32-Part-5-7-327712.txt * Note: CVE-2006-2779 (mfsa2006-32) is only partially fixed. Missing are tricky parts 1/6 and 2/6 from advisory: 1/6: Removing nested <option>s from a select (Jesse Ruderman) https://bugzilla.mozilla.org/show_bug.cgi?id=324918 2/6: 'Crashes during DOMNodeRemoved mutation event' https://bugzilla.mozilla.org/show_bug.cgi?id=325730 https://bugzilla.mozilla.org/show_bug.cgi?id=329982 stable/main/binary-i386/mozilla-calendar_1.7.8-1sarge7.1_i386.deb stable/main/binary-i386/mozilla-mailnews_1.7.8-1sarge7.1_i386.deb stable/main/binary-i386/mozilla-psm_1.7.8-1sarge7.1_i386.deb stable/main/binary-i386/mozilla-dom-inspector_1.7.8-1sarge7.1_i386.deb stable/main/binary-i386/mozilla-js-debugger_1.7.8-1sarge7.1_i386.deb stable/main/binary-i386/mozilla-browser_1.7.8-1sarge7.1_i386.deb stable/main/binary-i386/libnspr-dev_1.7.8-1sarge7.1_i386.deb stable/main/binary-i386/libnspr4_1.7.8-1sarge7.1_i386.deb stable/main/binary-i386/libnss-dev_1.7.8-1sarge7.1_i386.deb stable/main/source/mozilla_1.7.8-1sarge7.1.dsc stable/main/binary-i386/mozilla-chatzilla_1.7.8-1sarge7.1_i386.deb stable/main/binary-i386/mozilla-dev_1.7.8-1sarge7.1_i386.deb stable/main/binary-i386/mozilla_1.7.8-1sarge7.1_i386.deb stable/main/source/mozilla_1.7.8-1sarge7.1.diff.gz stable/main/binary-i386/libnss3_1.7.8-1sarge7.1_i386.deb mozilla (2:1.7.8-1sarge7.1) stable-security; urgency=critical * dropped mozilla 1.7.14 patches in debian/patches that fix various security issues: + CVE-2006-2787 : 1_0001-mfsa2006-31-319263-336601-336313.txt + CVE-2006-2786 1/2 : 1_0002-mfsa2006-33-Part-1-2-329746.txt + CVE-2006-2786 2/2 : 1_0003-mfsa2006-33-Part-2-2-330214.txt + CVE-2006-2785 2/2 : 1_0004-mfsa2006-34-Part2-2-329521-suite.txt + CVE-2006-2775 : 1_0005-mfsa2006-35-329677.txt 1_0023-mfsa2006-35-335142-regression-1-2-for-329677.txt 1_0024-mfsa2006-35-337841-regression-part-2-2-for-329677.txt + CVE-2006-2784 : 1_0006-mfsa2006-36-330037.txt + CVE-2006-2776 : 1_0007-mfsa2006-37-330773-with-belt-and-braces.txt + CVE-2006-2778 : 1_0008-mfsa2006-38-330897.txt + CVE-2006-1942 : 1_0009-mfsa2006-39-CVE-2006-1942-334341-suite.txt + CVE-2006-2781 : 1_0010-mfsa2006-40-334384.txt + CVE-2006-2782 : 1_0011-mfsa2006-41-334977.txt + CVE-2006-2783 : 1_0012-mfsa2006-42-335816.txt + CVE-2006-2777 : 1_0013-mfsa2006-43-336830.txt + CVE-2006-2779 3/6 : 1_0014-mfsa2006-32-Part-3-7-326501.txt + CVE-2006-2779 4/6 : 1_0015-mfsa2006-32-Part-4a-7-326931.txt + CVE-2006-2785 2/2 : 1_0015-mfsa2006-34-Part-1-2-xpfe-329468-suite.txt + CVE-2006-2779 4/6 : 1_0016-mfsa2006-32-Part-4b-7-329219.txt + CVE-2006-2779 4/6 : 1_0017-mfsa2006-32-Part-4c-7-330818-proper-aviary.txt + CVE-2006-2779 6/6 : 1_0018-mfsa2006-32-Part-6-7-332971.txt + CVE-2006-2780 : 1_0019-js-src-jsstr.c-335535-mfsa2006-32-Part-7-7.txt + CVE-2006-2779 5/6 : 1_0021-mfsa2006-32-Part-5-7-327712.txt * Note: CVE-2006-2779 (mfsa2006-32) is only partially fixed. Missing are tricky parts 1/6 and 2/6 from advisory: 1/6: Removing nested <option>s from a select (Jesse Ruderman) https://bugzilla.mozilla.org/show_bug.cgi?id=324918 2/6: 'Crashes during DOMNodeRemoved mutation event' https://bugzilla.mozilla.org/show_bug.cgi?id=325730 https://bugzilla.mozilla.org/show_bug.cgi?id=329982 stable/main/binary-sparc/motor_3.4.0-2sarge1_sparc.deb stable/main/binary-sparc/motor-fribidi_3.4.0-2sarge1_sparc.deb motor (2:3.4.0-2sarge1) stable-security; urgency=high * Non-maintainer upload by the Security Team * Applied patch by Julien Lemoine to fix buffer overflow [kkstrtext/kkstrtext.h, CVE-2005-3863] stable/main/binary-s390/motor-fribidi_3.4.0-2sarge1_s390.deb stable/main/binary-s390/motor_3.4.0-2sarge1_s390.deb motor (2:3.4.0-2sarge1) stable-security; urgency=high * Non-maintainer upload by the Security Team * Applied patch by Julien Lemoine to fix buffer overflow [kkstrtext/kkstrtext.h, CVE-2005-3863] stable/main/binary-mipsel/motor-fribidi_3.4.0-2sarge1_mipsel.deb stable/main/binary-mipsel/motor_3.4.0-2sarge1_mipsel.deb motor (2:3.4.0-2sarge1) stable-security; urgency=high * Non-maintainer upload by the Security Team * Applied patch by Julien Lemoine to fix buffer overflow [kkstrtext/kkstrtext.h, CVE-2005-3863] stable/main/binary-mips/motor_3.4.0-2sarge1_mips.deb stable/main/binary-mips/motor-fribidi_3.4.0-2sarge1_mips.deb motor (2:3.4.0-2sarge1) stable-security; urgency=high * Non-maintainer upload by the Security Team * Applied patch by Julien Lemoine to fix buffer overflow [kkstrtext/kkstrtext.h, CVE-2005-3863] stable/main/binary-m68k/motor_3.4.0-2sarge1_m68k.deb stable/main/binary-m68k/motor-fribidi_3.4.0-2sarge1_m68k.deb motor (2:3.4.0-2sarge1) stable-security; urgency=high * Non-maintainer upload by the Security Team * Applied patch by Julien Lemoine to fix buffer overflow [kkstrtext/kkstrtext.h, CVE-2005-3863] stable/main/binary-ia64/motor-fribidi_3.4.0-2sarge1_ia64.deb stable/main/binary-ia64/motor_3.4.0-2sarge1_ia64.deb motor (2:3.4.0-2sarge1) stable-security; urgency=high * Non-maintainer upload by the Security Team * Applied patch by Julien Lemoine to fix buffer overflow [kkstrtext/kkstrtext.h, CVE-2005-3863] stable/main/binary-i386/motor-fribidi_3.4.0-2sarge1_i386.deb stable/main/binary-i386/motor_3.4.0-2sarge1_i386.deb motor (2:3.4.0-2sarge1) stable-security; urgency=high * Non-maintainer upload by the Security Team * Applied patch by Julien Lemoine to fix buffer overflow [kkstrtext/kkstrtext.h, CVE-2005-3863] stable/main/binary-hppa/motor_3.4.0-2sarge1_hppa.deb stable/main/binary-hppa/motor-fribidi_3.4.0-2sarge1_hppa.deb motor (2:3.4.0-2sarge1) stable-security; urgency=high * Non-maintainer upload by the Security Team * Applied patch by Julien Lemoine to fix buffer overflow [kkstrtext/kkstrtext.h, CVE-2005-3863] stable/main/binary-arm/motor_3.4.0-2sarge1_arm.deb stable/main/binary-arm/motor-fribidi_3.4.0-2sarge1_arm.deb motor (2:3.4.0-2sarge1) stable-security; urgency=high * Non-maintainer upload by the Security Team * Applied patch by Julien Lemoine to fix buffer overflow [kkstrtext/kkstrtext.h, CVE-2005-3863] stable/main/binary-alpha/motor_3.4.0-2sarge1_alpha.deb stable/main/binary-alpha/motor-fribidi_3.4.0-2sarge1_alpha.deb motor (2:3.4.0-2sarge1) stable-security; urgency=high * Non-maintainer upload by the Security Team * Applied patch by Julien Lemoine to fix buffer overflow [kkstrtext/kkstrtext.h, CVE-2005-3863] stable/main/source/motor_3.4.0-2sarge1.dsc stable/main/binary-all/motor-common_3.4.0-2sarge1_all.deb stable/main/source/motor_3.4.0-2sarge1.diff.gz stable/main/binary-powerpc/motor_3.4.0-2sarge1_powerpc.deb stable/main/binary-powerpc/motor-fribidi_3.4.0-2sarge1_powerpc.deb motor (2:3.4.0-2sarge1) stable-security; urgency=high * Non-maintainer upload by the Security Team * Applied patch by Julien Lemoine to fix buffer overflow [kkstrtext/kkstrtext.h, CVE-2005-3863] stable/main/source/mol-modules-2.6.8_0.9.70+2.6.8+12sarge1.tar.gz stable/main/binary-powerpc/mol-modules-2.6.8-3-powerpc_0.9.70+2.6.8+12sarge1_powerpc.deb stable/main/source/mol-modules-2.6.8_0.9.70+2.6.8+12sarge1.dsc stable/main/binary-powerpc/mol-modules-2.6.8-3-powerpc-smp_0.9.70+2.6.8+12sarge1_powerpc.deb mol-modules-2.6.8 (1:0.9.70+2.6.8+12sarge1) stable-security; urgency=high * NMU by the Seucrity Team * Rebuild against the -3 ABI * Add missing build-dep on m4 stable/main/source/mindi-kernel_2.4.27-2sarge2.dsc stable/main/binary-i386/mindi-kernel_2.4.27-2sarge2_i386.deb stable/main/source/mindi-kernel_2.4.27-2sarge2.diff.gz mindi-kernel (2.4.27-2sarge2) stable-security; urgency=high * NMU by the Security Team * Build against kernel-tree-2.4.27-10sarge3: * 207_smbfs-chroot-escape.diff [SECURITY] Fix directory traversal vulnerability in smbfs that permits local users to escape chroot restrictions See CVE-2006-1864 * 208_ia64-die_if_kernel-returns.diff [SECURITY][ia64] Fix a potential local DoS on ia64 systems caused by an incorrect 'noreturn' attribute on die_if_kernel() See CVE-2006-0742 * 209_sctp-discard-unexpected-in-closed.diff [SECURITY] Fix remote DoS in SCTP code by discarding unexpected chunks received in CLOSED state instead of calling BUG() See CVE-2006-2271 * 210_ipv4-id-no-increment.diff [SECURITY] Fix vulnerability that allows remote attackers to conduct an Idle Scan attack, bypassing intended protections against such attacks See CVE-2006-1242 * 211_usb-gadget-rndis-bufoverflow.diff [SECURITY] Fix buffer overflow in the USB Gadget RNDIS implementation that allows for a remote DoS attack (kmalloc'd memory corruption) See CVE-2006-1368 * 212_ipv4-sin_zero_clear.diff [SECURITY] Fix local information leak in af_inet code See CVE-2006-1343 * 213_madvise_remove-restrict.diff [SECURITY] Fix vulnerability that allows local users to bypass IPC permissions and replace portions of read-only tmpfs files with zeroes. See CVE-2006-1524 * 214_mcast-ip-route-null-deref.diff [SECURITY] Fix local DoS vulnerability that allows local users to panic a system by requesting a route for a multicast IP See CVE-2006-1525 * 215_sctp-fragment-recurse.diff [SECURITY] Fix remote DoS vulnerability that can lead to infinite recursion when a packet containing two or more DATA fragments is received See CVE-2006-2274 * 216_sctp-fragmented-receive-fix.diff [SECURITY] Fix remote DoS vulnerability that allows IP fragmented COOKIE_ECHO and HEARTBEAT SCTP control chunks to cause a kernel panic See CVE-2006-2272 * 217_amd64-fp-reg-leak.diff [SECURITY][amd64] Fix an information leak that allows a process to see a portion of the floating point state of other processes, possibly exposing sensitive information. See CVE-2006-1056 * 218_do_add_counters-race.diff [SECURITY] Fix race condition in the do_add_counters() function in netfilter that allows local users with CAP_NET_ADMIN capabilities to read kernel memory See CVE-2006-0039 * 219_sctp-hb-ack-overflow.diff [SECURITY] Fix a remote buffer overflow that can result from a badly formatted HB-ACK chunk See CVE-2006-1857 * 220_sctp-param-bound-checks.diff [SECURITY] Fix a bound checking error (remote DoS) in the SCTP parameter checking code See CVE-2006-1858 * 221_netfilter-do_replace-overflow.diff [SECURITY] Fix buffer overflow in netfilter do_replace which can could be triggered by users with CAP_NET_ADMIN rights. See CVE-2006-0038 * 222_binfmt-bad-elf-entry-address.diff [SECURITY][amd64] Fix potential local DoS vulnerability in the binfmt_elf code on em64t processors See CVE-2006-0741 stable/main/source/mantis_0.19.2-5sarge4.1.diff.gz stable/main/binary-all/mantis_0.19.2-5sarge4.1_all.deb stable/main/source/mantis_0.19.2-5sarge4.1.dsc mantis (0.19.2-5sarge4.1) stable-security; urgency=high * Non-maintainer upload for security issues. * CVE-2006-0664: Cross site scripting in config_defaults_inc.php. Apply upstream patch. * CVE-2006-0841: Multiple cross-site scripting (XSS) vulnerabilities in view_all_set.php, manage_user_page.php, view_filters_page.php, proj_doc_delete.php. Apply selected upstream patches where relevant to our version. (Closes: #378353) * Revert typo in debconf string as it's not appropriate for stable(security). mantis (0.19.2-5sarge4) stable-security; urgency=high * Security update for CVE-2006-1577 - fix XSS problem (Closes: #361138) * Fix a typo in debconf management (adminpassoword <-> adminpassword) mantis (0.19.2-5sarge3) stable-security; urgency=high * Security update for CVE-2006-0665 - better check _GET - Cross site scripting vulnerability stable/main/binary-s390/mailman_2.1.5-8sarge3_s390.deb mailman (2.1.5-8sarge3) stable; urgency=high * Don't delete other package's ucf-managed configuration files (closes: #358575) stable/main/binary-powerpc/mailman_2.1.5-8sarge3_powerpc.deb mailman (2.1.5-8sarge3) stable; urgency=high * Don't delete other package's ucf-managed configuration files (closes: #358575) stable/main/binary-mipsel/mailman_2.1.5-8sarge3_mipsel.deb mailman (2.1.5-8sarge3) stable; urgency=high * Don't delete other package's ucf-managed configuration files (closes: #358575) stable/main/binary-mips/mailman_2.1.5-8sarge3_mips.deb mailman (2.1.5-8sarge3) stable; urgency=high * Don't delete other package's ucf-managed configuration files (closes: #358575) stable/main/binary-m68k/mailman_2.1.5-8sarge3_m68k.deb mailman (2.1.5-8sarge3) stable; urgency=high * Don't delete other package's ucf-managed configuration files (closes: #358575) stable/main/binary-ia64/mailman_2.1.5-8sarge3_ia64.deb mailman (2.1.5-8sarge3) stable; urgency=high * Don't delete other package's ucf-managed configuration files (closes: #358575) stable/main/binary-i386/mailman_2.1.5-8sarge3_i386.deb mailman (2.1.5-8sarge3) stable-security; urgency=high * Non-maintainer upload by the Security Team * Applied patch by Karl Chen to fix formt string vulnerability [src/common.c, debian/patches/72_CVE-2006-2191.dpatch] stable/main/binary-hppa/mailman_2.1.5-8sarge3_hppa.deb mailman (2.1.5-8sarge3) stable; urgency=high * Don't delete other package's ucf-managed configuration files (closes: #358575) stable/main/binary-arm/mailman_2.1.5-8sarge3_arm.deb mailman (2.1.5-8sarge3) stable; urgency=high * Don't delete other package's ucf-managed configuration files (closes: #358575) stable/main/binary-alpha/mailman_2.1.5-8sarge3_alpha.deb mailman (2.1.5-8sarge3) stable; urgency=high * Don't delete other package's ucf-managed configuration files (closes: #358575) stable/main/source/mailman_2.1.5-8sarge3.dsc stable/main/binary-sparc/mailman_2.1.5-8sarge3_sparc.deb stable/main/source/mailman_2.1.5-8sarge3.diff.gz mailman (2.1.5-8sarge3) stable; urgency=high * Don't delete other package's ucf-managed configuration files (closes: #358575) stable/main/binary-sparc/lynx-cur_2.8.6-9sarge1_sparc.deb lynx-cur (2.8.6-9sarge1) stable-security; urgency=high * Non-maintainer upload by the Security Team * Applied patch by Ulf Härnhammar to fix buffer overflow that can lead to arbitrary code execution [WWW/Library/Implementation/HTMIME.c, CAN-2005-3120, debian/patch-3] stable/main/binary-s390/lynx-cur_2.8.6-9sarge1_s390.deb lynx-cur (2.8.6-9sarge1) stable-security; urgency=high * Non-maintainer upload by the Security Team * Applied patch by Ulf Härnhammar to fix buffer overflow that can lead to arbitrary code execution [WWW/Library/Implementation/HTMIME.c, CAN-2005-3120, debian/patch-3] stable/main/binary-mipsel/lynx-cur_2.8.6-9sarge1_mipsel.deb lynx-cur (2.8.6-9sarge1) stable-security; urgency=high * Non-maintainer upload by the Security Team * Applied patch by Ulf Härnhammar to fix buffer overflow that can lead to arbitrary code execution [WWW/Library/Implementation/HTMIME.c, CAN-2005-3120, debian/patch-3] stable/main/binary-mips/lynx-cur_2.8.6-9sarge1_mips.deb lynx-cur (2.8.6-9sarge1) stable-security; urgency=high * Non-maintainer upload by the Security Team * Applied patch by Ulf Härnhammar to fix buffer overflow that can lead to arbitrary code execution [WWW/Library/Implementation/HTMIME.c, CAN-2005-3120, debian/patch-3] stable/main/binary-m68k/lynx-cur_2.8.6-9sarge1_m68k.deb lynx-cur (2.8.6-9sarge1) stable-security; urgency=high * Non-maintainer upload by the Security Team * Applied patch by Ulf Härnhammar to fix buffer overflow that can lead to arbitrary code execution [WWW/Library/Implementation/HTMIME.c, CAN-2005-3120, debian/patch-3] stable/main/binary-ia64/lynx-cur_2.8.6-9sarge1_ia64.deb lynx-cur (2.8.6-9sarge1) stable-security; urgency=high * Non-maintainer upload by the Security Team * Applied patch by Ulf Härnhammar to fix buffer overflow that can lead to arbitrary code execution [WWW/Library/Implementation/HTMIME.c, CAN-2005-3120, debian/patch-3] stable/main/binary-i386/lynx-cur_2.8.6-9sarge1_i386.deb lynx-cur (2.8.6-9sarge1) stable-security; urgency=high * Non-maintainer upload by the Security Team * Applied patch by Ulf Härnhammar to fix buffer overflow that can lead to arbitrary code execution [WWW/Library/Implementation/HTMIME.c, CAN-2005-3120, debian/patch-3] stable/main/binary-hppa/lynx-cur_2.8.6-9sarge1_hppa.deb lynx-cur (2.8.6-9sarge1) stable-security; urgency=high * Non-maintainer upload by the Security Team * Applied patch by Ulf Härnhammar to fix buffer overflow that can lead to arbitrary code execution [WWW/Library/Implementation/HTMIME.c, CAN-2005-3120, debian/patch-3] stable/main/binary-arm/lynx-cur_2.8.6-9sarge1_arm.deb lynx-cur (2.8.6-9sarge1) stable-security; urgency=high * Non-maintainer upload by the Security Team * Applied patch by Ulf Härnhammar to fix buffer overflow that can lead to arbitrary code execution [WWW/Library/Implementation/HTMIME.c, CAN-2005-3120, debian/patch-3] stable/main/binary-alpha/lynx-cur_2.8.6-9sarge1_alpha.deb lynx-cur (2.8.6-9sarge1) stable-security; urgency=high * Non-maintainer upload by the Security Team * Applied patch by Ulf Härnhammar to fix buffer overflow that can lead to arbitrary code execution [WWW/Library/Implementation/HTMIME.c, CAN-2005-3120, debian/patch-3] stable/main/source/lynx-cur_2.8.6-9sarge1.diff.gz stable/main/source/lynx-cur_2.8.6-9sarge1.dsc stable/main/binary-all/lynx-cur-wrapper_2.8.6-9sarge1_all.deb stable/main/binary-powerpc/lynx-cur_2.8.6-9sarge1_powerpc.deb lynx-cur (2.8.6-9sarge1) stable-security; urgency=high * Non-maintainer upload by the Security Team * Applied patch by Ulf Härnhammar to fix buffer overflow that can lead to arbitrary code execution [WWW/Library/Implementation/HTMIME.c, CAN-2005-3120, debian/patch-3] stable/main/binary-sparc/lynx_2.8.5-2sarge2_sparc.deb lynx (2.8.5-2sarge2) stable-security; urgency=high * Non-maintainer upload by the Security Team * Added OpenBSD patch to fix infinete loop rendering broken HTML [debian/patches/04_CVE-2004-1617.dpatch] stable/main/binary-s390/lynx_2.8.5-2sarge2_s390.deb lynx (2.8.5-2sarge2) stable-security; urgency=high * Non-maintainer upload by the Security Team * Added OpenBSD patch to fix infinete loop rendering broken HTML [debian/patches/04_CVE-2004-1617.dpatch] stable/main/binary-powerpc/lynx_2.8.5-2sarge2_powerpc.deb lynx (2.8.5-2sarge2) stable-security; urgency=high * Non-maintainer upload by the Security Team * Added OpenBSD patch to fix infinete loop rendering broken HTML [debian/patches/04_CVE-2004-1617.dpatch] stable/main/binary-mipsel/lynx_2.8.5-2sarge2_mipsel.deb lynx (2.8.5-2sarge2) stable-security; urgency=high * Non-maintainer upload by the Security Team * Added OpenBSD patch to fix infinete loop rendering broken HTML [debian/patches/04_CVE-2004-1617.dpatch] stable/main/binary-mips/lynx_2.8.5-2sarge2_mips.deb lynx (2.8.5-2sarge2) stable-security; urgency=high * Non-maintainer upload by the Security Team * Added OpenBSD patch to fix infinete loop rendering broken HTML [debian/patches/04_CVE-2004-1617.dpatch] stable/main/binary-m68k/lynx_2.8.5-2sarge2_m68k.deb lynx (2.8.5-2sarge2) stable-security; urgency=high * Non-maintainer upload by the Security Team * Added OpenBSD patch to fix infinete loop rendering broken HTML [debian/patches/04_CVE-2004-1617.dpatch] stable/main/binary-ia64/lynx_2.8.5-2sarge2_ia64.deb lynx (2.8.5-2sarge2) stable-security; urgency=high * Non-maintainer upload by the Security Team * Added OpenBSD patch to fix infinete loop rendering broken HTML [debian/patches/04_CVE-2004-1617.dpatch] stable/main/binary-hppa/lynx_2.8.5-2sarge2_hppa.deb lynx (2.8.5-2sarge2) stable-security; urgency=high * Non-maintainer upload by the Security Team * Added OpenBSD patch to fix infinete loop rendering broken HTML [debian/patches/04_CVE-2004-1617.dpatch] stable/main/binary-arm/lynx_2.8.5-2sarge2_arm.deb lynx (2.8.5-2sarge2) stable-security; urgency=high * Non-maintainer upload by the Security Team * Added OpenBSD patch to fix infinete loop rendering broken HTML [debian/patches/04_CVE-2004-1617.dpatch] stable/main/binary-alpha/lynx_2.8.5-2sarge2_alpha.deb lynx (2.8.5-2sarge2) stable-security; urgency=high * Non-maintainer upload by the Security Team * Added OpenBSD patch to fix infinete loop rendering broken HTML [debian/patches/04_CVE-2004-1617.dpatch] stable/main/binary-i386/lynx_2.8.5-2sarge2_i386.deb stable/main/source/lynx_2.8.5-2sarge2.dsc stable/main/source/lynx_2.8.5-2sarge2.diff.gz lynx (2.8.5-2sarge2) stable-security; urgency=high * Non-maintainer upload by the Security Team * Added OpenBSD patch to fix infinete loop rendering broken HTML [debian/patches/04_CVE-2004-1617.dpatch] stable/main/binary-sparc/sensord_2.9.1-1sarge3_sparc.deb stable/main/binary-sparc/libsensors-dev_2.9.1-1sarge3_sparc.deb stable/main/binary-sparc/lm-sensors_2.9.1-1sarge3_sparc.deb stable/main/binary-sparc/libsensors3_2.9.1-1sarge3_sparc.deb lm-sensors (1:2.9.1-1sarge3) stable-security; urgency=high * Build against kernel-build-2.4.27-3_2.4.27-10sarge2. * Increment ABI to -3. stable/main/binary-s390/libsensors3_2.9.1-1sarge3_s390.deb stable/main/binary-s390/libsensors-dev_2.9.1-1sarge3_s390.deb stable/main/binary-s390/lm-sensors_2.9.1-1sarge3_s390.deb stable/main/binary-s390/sensord_2.9.1-1sarge3_s390.deb lm-sensors (1:2.9.1-1sarge3) stable-security; urgency=high * Build against kernel-build-2.4.27-3_2.4.27-10sarge2. * Increment ABI to -3. stable/main/binary-powerpc/lm-sensors_2.9.1-1sarge3_powerpc.deb stable/main/binary-powerpc/libsensors3_2.9.1-1sarge3_powerpc.deb stable/main/binary-powerpc/libsensors-dev_2.9.1-1sarge3_powerpc.deb stable/main/binary-powerpc/sensord_2.9.1-1sarge3_powerpc.deb lm-sensors (1:2.9.1-1sarge3) stable-security; urgency=high * Build against kernel-build-2.4.27-3_2.4.27-10sarge2. * Increment ABI to -3. stable/main/binary-mipsel/libsensors-dev_2.9.1-1sarge3_mipsel.deb stable/main/binary-mipsel/sensord_2.9.1-1sarge3_mipsel.deb stable/main/binary-mipsel/lm-sensors_2.9.1-1sarge3_mipsel.deb stable/main/binary-mipsel/libsensors3_2.9.1-1sarge3_mipsel.deb lm-sensors (1:2.9.1-1sarge3) stable-security; urgency=high * Build against kernel-build-2.4.27-3_2.4.27-10sarge2. * Increment ABI to -3. stable/main/binary-mips/libsensors3_2.9.1-1sarge3_mips.deb stable/main/binary-mips/lm-sensors_2.9.1-1sarge3_mips.deb stable/main/binary-mips/sensord_2.9.1-1sarge3_mips.deb stable/main/binary-mips/libsensors-dev_2.9.1-1sarge3_mips.deb lm-sensors (1:2.9.1-1sarge3) stable-security; urgency=high * Build against kernel-build-2.4.27-3_2.4.27-10sarge2. * Increment ABI to -3. stable/main/binary-m68k/lm-sensors_2.9.1-1sarge3_m68k.deb stable/main/binary-m68k/libsensors3_2.9.1-1sarge3_m68k.deb stable/main/binary-m68k/libsensors-dev_2.9.1-1sarge3_m68k.deb stable/main/binary-m68k/sensord_2.9.1-1sarge3_m68k.deb lm-sensors (1:2.9.1-1sarge3) stable-security; urgency=high * Build against kernel-build-2.4.27-3_2.4.27-10sarge2. * Increment ABI to -3. stable/main/binary-ia64/lm-sensors_2.9.1-1sarge3_ia64.deb stable/main/binary-ia64/libsensors3_2.9.1-1sarge3_ia64.deb stable/main/binary-ia64/sensord_2.9.1-1sarge3_ia64.deb stable/main/binary-ia64/libsensors-dev_2.9.1-1sarge3_ia64.deb lm-sensors (1:2.9.1-1sarge3) stable-security; urgency=high * Build against kernel-build-2.4.27-3_2.4.27-10sarge2. * Increment ABI to -3. stable/main/binary-hppa/libsensors-dev_2.9.1-1sarge3_hppa.deb stable/main/binary-hppa/lm-sensors_2.9.1-1sarge3_hppa.deb stable/main/binary-hppa/libsensors3_2.9.1-1sarge3_hppa.deb stable/main/binary-hppa/sensord_2.9.1-1sarge3_hppa.deb lm-sensors (1:2.9.1-1sarge3) stable-security; urgency=high * Build against kernel-build-2.4.27-3_2.4.27-10sarge2. * Increment ABI to -3. stable/main/binary-arm/libsensors-dev_2.9.1-1sarge3_arm.deb stable/main/binary-arm/sensord_2.9.1-1sarge3_arm.deb stable/main/binary-arm/libsensors3_2.9.1-1sarge3_arm.deb stable/main/binary-arm/lm-sensors_2.9.1-1sarge3_arm.deb lm-sensors (1:2.9.1-1sarge3) stable-security; urgency=high * Build against kernel-build-2.4.27-3_2.4.27-10sarge2. * Increment ABI to -3. stable/main/binary-alpha/libsensors3_2.9.1-1sarge3_alpha.deb stable/main/binary-alpha/lm-sensors_2.9.1-1sarge3_alpha.deb stable/main/binary-alpha/libsensors-dev_2.9.1-1sarge3_alpha.deb stable/main/binary-alpha/sensord_2.9.1-1sarge3_alpha.deb lm-sensors (1:2.9.1-1sarge3) stable-security; urgency=high * Build against kernel-build-2.4.27-3_2.4.27-10sarge2. * Increment ABI to -3. stable/main/binary-i386/sensord_2.9.1-1sarge3_i386.deb stable/main/source/lm-sensors_2.9.1-1sarge3.dsc stable/main/binary-i386/lm-sensors-2.4.27-3-686_2.9.1-1sarge3_i386.deb stable/main/binary-i386/lm-sensors-2.4.27-3-686-smp_2.9.1-1sarge3_i386.deb stable/main/source/lm-sensors_2.9.1-1sarge3.diff.gz stable/main/binary-i386/lm-sensors-2.4.27-3-k6_2.9.1-1sarge3_i386.deb stable/main/binary-i386/lm-sensors-2.4.27-3-386_2.9.1-1sarge3_i386.deb stable/main/binary-i386/lm-sensors-2.4.27-3-k7_2.9.1-1sarge3_i386.deb stable/main/binary-i386/lm-sensors_2.9.1-1sarge3_i386.deb stable/main/binary-all/lm-sensors-source_2.9.1-1sarge3_all.deb stable/main/binary-i386/lm-sensors-2.4.27-3-586tsc_2.9.1-1sarge3_i386.deb stable/main/binary-i386/libsensors-dev_2.9.1-1sarge3_i386.deb stable/main/binary-i386/lm-sensors-2.4.27-3-k7-smp_2.9.1-1sarge3_i386.deb stable/main/binary-i386/libsensors3_2.9.1-1sarge3_i386.deb stable/main/binary-all/kernel-patch-2.4-lm-sensors_2.9.1-1sarge3_all.deb lm-sensors (1:2.9.1-1sarge3) stable-security; urgency=high * Build against kernel-build-2.4.27-3_2.4.27-10sarge2. * Increment ABI to -3. stable/main/binary-sparc/scsi-common-modules-2.6.8-3-sparc64-di_0.05sarge2_sparc.udeb stable/main/binary-sparc/ext3-modules-2.6.8-3-sparc64-di_0.05sarge2_sparc.udeb stable/main/binary-sparc/plip-modules-2.6.8-3-sparc32-di_0.05sarge2_sparc.udeb stable/main/binary-sparc/nic-modules-2.6.8-3-sparc64-di_0.05sarge2_sparc.udeb stable/main/binary-sparc/scsi-core-modules-2.6.8-3-sparc64-di_0.05sarge2_sparc.udeb stable/main/binary-sparc/fat-modules-2.6.8-3-sparc64-di_0.05sarge2_sparc.udeb stable/main/binary-sparc/ext3-modules-2.6.8-3-sparc32-di_0.05sarge2_sparc.udeb stable/main/binary-sparc/md-modules-2.6.8-3-sparc32-di_0.05sarge2_sparc.udeb stable/main/binary-sparc/ide-modules-2.6.8-3-sparc64-di_0.05sarge2_sparc.udeb stable/main/binary-sparc/xfs-modules-2.6.8-3-sparc64-di_0.05sarge2_sparc.udeb stable/main/binary-sparc/reiserfs-modules-2.6.8-3-sparc64-di_0.05sarge2_sparc.udeb stable/main/source/linux-kernel-di-sparc-2.6_0.05sarge2.dsc stable/main/binary-sparc/ppp-modules-2.6.8-3-sparc64-di_0.05sarge2_sparc.udeb stable/main/binary-sparc/scsi-common-modules-2.6.8-3-sparc32-di_0.05sarge2_sparc.udeb stable/main/binary-sparc/ppp-modules-2.6.8-3-sparc32-di_0.05sarge2_sparc.udeb stable/main/source/linux-kernel-di-sparc-2.6_0.05sarge2.tar.gz stable/main/binary-sparc/nic-modules-2.6.8-3-sparc32-di_0.05sarge2_sparc.udeb stable/main/binary-sparc/reiserfs-modules-2.6.8-3-sparc32-di_0.05sarge2_sparc.udeb stable/main/binary-sparc/xfs-modules-2.6.8-3-sparc32-di_0.05sarge2_sparc.udeb stable/main/binary-sparc/kernel-image-2.6.8-3-sparc64-di_0.05sarge2_sparc.udeb stable/main/binary-sparc/usb-modules-2.6.8-3-sparc64-di_0.05sarge2_sparc.udeb stable/main/binary-sparc/scsi-core-modules-2.6.8-3-sparc32-di_0.05sarge2_sparc.udeb stable/main/binary-sparc/cdrom-core-modules-2.6.8-3-sparc64-di_0.05sarge2_sparc.udeb stable/main/binary-sparc/fat-modules-2.6.8-3-sparc32-di_0.05sarge2_sparc.udeb stable/main/binary-sparc/kernel-image-2.6.8-3-sparc32-di_0.05sarge2_sparc.udeb stable/main/binary-sparc/plip-modules-2.6.8-3-sparc64-di_0.05sarge2_sparc.udeb stable/main/binary-sparc/ipv6-modules-2.6.8-3-sparc64-di_0.05sarge2_sparc.udeb stable/main/binary-sparc/ipv6-modules-2.6.8-3-sparc32-di_0.05sarge2_sparc.udeb stable/main/binary-sparc/cdrom-core-modules-2.6.8-3-sparc32-di_0.05sarge2_sparc.udeb stable/main/binary-sparc/md-modules-2.6.8-3-sparc64-di_0.05sarge2_sparc.udeb linux-kernel-di-sparc-2.6 (0.05sarge2) stable; urgency=low * Build against kernel-image-2.6.8-sparc (2.6.8-16sarge4) stable/main/binary-sparc/firmware-modules-2.4.27-3-sparc64-di_0.64sarge1_sparc.udeb stable/main/binary-sparc/kernel-image-2.4.27-3-sparc64-di_0.64sarge1_sparc.udeb stable/main/source/linux-kernel-di-sparc_0.64sarge1.tar.gz stable/main/binary-sparc/cdrom-core-modules-2.4.27-3-sparc64-di_0.64sarge1_sparc.udeb stable/main/binary-sparc/usb-modules-2.4.27-3-sparc64-di_0.64sarge1_sparc.udeb stable/main/binary-sparc/loop-modules-2.4.27-3-sparc32-di_0.64sarge1_sparc.udeb stable/main/binary-sparc/xfs-modules-2.4.27-3-sparc32-di_0.64sarge1_sparc.udeb stable/main/binary-sparc/kernel-image-2.4.27-3-sparc32-di_0.64sarge1_sparc.udeb stable/main/binary-sparc/scsi-modules-2.4.27-3-sparc64-di_0.64sarge1_sparc.udeb stable/main/binary-sparc/xfs-modules-2.4.27-3-sparc64-di_0.64sarge1_sparc.udeb stable/main/binary-sparc/ext3-modules-2.4.27-3-sparc32-di_0.64sarge1_sparc.udeb stable/main/binary-sparc/ext3-modules-2.4.27-3-sparc64-di_0.64sarge1_sparc.udeb stable/main/binary-sparc/nic-modules-2.4.27-3-sparc64-di_0.64sarge1_sparc.udeb stable/main/binary-sparc/cdrom-core-modules-2.4.27-3-sparc32-di_0.64sarge1_sparc.udeb stable/main/binary-sparc/md-modules-2.4.27-3-sparc32-di_0.64sarge1_sparc.udeb stable/main/binary-sparc/ide-modules-2.4.27-3-sparc64-di_0.64sarge1_sparc.udeb stable/main/binary-sparc/ppp-modules-2.4.27-3-sparc32-di_0.64sarge1_sparc.udeb stable/main/binary-sparc/firewire-core-modules-2.4.27-3-sparc64-di_0.64sarge1_sparc.udeb stable/main/binary-sparc/reiserfs-modules-2.4.27-3-sparc64-di_0.64sarge1_sparc.udeb stable/main/source/linux-kernel-di-sparc_0.64sarge1.dsc stable/main/binary-sparc/scsi-core-modules-2.4.27-3-sparc64-di_0.64sarge1_sparc.udeb stable/main/binary-sparc/scsi-core-modules-2.4.27-3-sparc32-di_0.64sarge1_sparc.udeb stable/main/binary-sparc/scsi-modules-2.4.27-3-sparc32-di_0.64sarge1_sparc.udeb stable/main/binary-sparc/loop-modules-2.4.27-3-sparc64-di_0.64sarge1_sparc.udeb stable/main/binary-sparc/ppp-modules-2.4.27-3-sparc64-di_0.64sarge1_sparc.udeb stable/main/binary-sparc/ipv6-modules-2.4.27-3-sparc64-di_0.64sarge1_sparc.udeb stable/main/binary-sparc/ipv6-modules-2.4.27-3-sparc32-di_0.64sarge1_sparc.udeb stable/main/binary-sparc/reiserfs-modules-2.4.27-3-sparc32-di_0.64sarge1_sparc.udeb stable/main/binary-sparc/md-modules-2.4.27-3-sparc64-di_0.64sarge1_sparc.udeb stable/main/binary-sparc/nic-modules-2.4.27-3-sparc32-di_0.64sarge1_sparc.udeb linux-kernel-di-sparc (0.64sarge1) stable-proposed-updates; urgency=high * Rebuild against kernel-image-2.4.27-sparc (2.4.27-9sarge3) for compatability with new ABI stable/main/binary-s390/scsi-core-modules-2.4.27-3-s390-di_0.61sarge1_s390.udeb stable/main/binary-s390/kernel-image-2.4.27-3-s390-tape-di_0.61sarge1_s390.udeb stable/main/binary-s390/kernel-image-2.4.27-3-s390-di_0.61sarge1_s390.udeb stable/main/binary-s390/nic-modules-2.4.27-3-s390-di_0.61sarge1_s390.udeb stable/main/binary-s390/scsi-modules-2.4.27-3-s390-di_0.61sarge1_s390.udeb stable/main/source/linux-kernel-di-s390_0.61sarge1.dsc stable/main/binary-s390/xfs-modules-2.4.27-3-s390-di_0.61sarge1_s390.udeb stable/main/source/linux-kernel-di-s390_0.61sarge1.tar.gz stable/main/binary-s390/md-modules-2.4.27-3-s390-di_0.61sarge1_s390.udeb linux-kernel-di-s390 (0.61sarge1) stable-proposed-updates; urgency=high * Rebuild against kernel-image-2.4.27-s390 for compatability with ABI 3. stable/main/binary-powerpc/fat-modules-2.6.8-3-power4-di_0.78sarge2_powerpc.udeb stable/main/binary-powerpc/xfs-modules-2.6.8-3-powerpc-di_0.78sarge2_powerpc.udeb stable/main/binary-powerpc/usb-storage-modules-2.6.8-3-power4-di_0.78sarge2_powerpc.udeb stable/main/binary-powerpc/socket-modules-2.6.8-3-power4-di_0.78sarge2_powerpc.udeb stable/main/binary-powerpc/fb-modules-2.6.8-3-powerpc-di_0.78sarge2_powerpc.udeb stable/main/binary-powerpc/affs-modules-2.6.8-3-power3-di_0.78sarge2_powerpc.udeb stable/main/binary-powerpc/socket-modules-2.6.8-3-power3-di_0.78sarge2_powerpc.udeb stable/main/binary-powerpc/ipv6-modules-2.6.8-3-power3-di_0.78sarge2_powerpc.udeb stable/main/binary-powerpc/serial-modules-2.6.8-3-power3-di_0.78sarge2_powerpc.udeb stable/main/binary-powerpc/serial-modules-2.6.8-3-powerpc-di_0.78sarge2_powerpc.udeb stable/main/binary-powerpc/md-modules-2.6.8-3-powerpc-di_0.78sarge2_powerpc.udeb stable/main/source/linux-kernel-di-powerpc-2.6_0.78sarge2.dsc stable/main/binary-powerpc/xfs-modules-2.6.8-3-power3-di_0.78sarge2_powerpc.udeb stable/main/binary-powerpc/nic-modules-2.6.8-3-powerpc-di_0.78sarge2_powerpc.udeb stable/main/binary-powerpc/fb-modules-2.6.8-3-power4-di_0.78sarge2_powerpc.udeb stable/main/binary-powerpc/scsi-extra-modules-2.6.8-3-power3-di_0.78sarge2_powerpc.udeb stable/main/binary-powerpc/irda-modules-2.6.8-3-powerpc-di_0.78sarge2_powerpc.udeb stable/main/binary-powerpc/irda-modules-2.6.8-3-power3-di_0.78sarge2_powerpc.udeb stable/main/binary-powerpc/affs-modules-2.6.8-3-powerpc-di_0.78sarge2_powerpc.udeb stable/main/binary-powerpc/cdrom-core-modules-2.6.8-3-power3-di_0.78sarge2_powerpc.udeb stable/main/binary-powerpc/pcmcia-storage-modules-2.6.8-3-powerpc-di_0.78sarge2_powerpc.udeb stable/main/binary-powerpc/loop-modules-2.6.8-3-powerpc-di_0.78sarge2_powerpc.udeb stable/main/binary-powerpc/ufs-modules-2.6.8-3-power4-di_0.78sarge2_powerpc.udeb stable/main/binary-powerpc/input-modules-2.6.8-3-powerpc-di_0.78sarge2_powerpc.udeb stable/main/binary-powerpc/ext2-modules-2.6.8-3-power4-di_0.78sarge2_powerpc.udeb stable/main/binary-powerpc/reiserfs-modules-2.6.8-3-power3-di_0.78sarge2_powerpc.udeb stable/main/binary-powerpc/nic-shared-modules-2.6.8-3-power3-di_0.78sarge2_powerpc.udeb stable/main/binary-powerpc/ipv6-modules-2.6.8-3-power4-di_0.78sarge2_powerpc.udeb stable/main/binary-powerpc/floppy-modules-2.6.8-3-powerpc-di_0.78sarge2_powerpc.udeb stable/main/binary-powerpc/floppy-modules-2.6.8-3-power3-di_0.78sarge2_powerpc.udeb stable/main/binary-powerpc/fb-modules-2.6.8-3-power3-di_0.78sarge2_powerpc.udeb stable/main/binary-powerpc/jfs-modules-2.6.8-3-power3-di_0.78sarge2_powerpc.udeb stable/main/binary-powerpc/socket-modules-2.6.8-3-powerpc-di_0.78sarge2_powerpc.udeb stable/main/binary-powerpc/kernel-image-2.6.8-3-powerpc-di_0.78sarge2_powerpc.udeb stable/main/binary-powerpc/usb-storage-modules-2.6.8-3-power3-di_0.78sarge2_powerpc.udeb stable/main/binary-powerpc/jfs-modules-2.6.8-3-power4-di_0.78sarge2_powerpc.udeb stable/main/binary-powerpc/fs-common-modules-2.6.8-3-powerpc-di_0.78sarge2_powerpc.udeb stable/main/binary-powerpc/ufs-modules-2.6.8-3-powerpc-di_0.78sarge2_powerpc.udeb stable/main/binary-powerpc/ext3-modules-2.6.8-3-power3-di_0.78sarge2_powerpc.udeb stable/main/binary-powerpc/nic-extra-modules-2.6.8-3-powerpc-di_0.78sarge2_powerpc.udeb stable/main/binary-powerpc/fat-modules-2.6.8-3-power3-di_0.78sarge2_powerpc.udeb stable/main/source/linux-kernel-di-powerpc-2.6_0.78sarge2.tar.gz stable/main/binary-powerpc/scsi-core-modules-2.6.8-3-powerpc-di_0.78sarge2_powerpc.udeb stable/main/binary-powerpc/firewire-core-modules-2.6.8-3-power3-di_0.78sarge2_powerpc.udeb stable/main/binary-powerpc/serial-modules-2.6.8-3-power4-di_0.78sarge2_powerpc.udeb stable/main/binary-powerpc/hfs-modules-2.6.8-3-power4-di_0.78sarge2_powerpc.udeb stable/main/binary-powerpc/cdrom-core-modules-2.6.8-3-power4-di_0.78sarge2_powerpc.udeb stable/main/binary-powerpc/firmware-modules-2.6.8-3-power4-di_0.78sarge2_powerpc.udeb stable/main/binary-powerpc/ext3-modules-2.6.8-3-power4-di_0.78sarge2_powerpc.udeb stable/main/binary-powerpc/nic-extra-modules-2.6.8-3-power4-di_0.78sarge2_powerpc.udeb stable/main/binary-powerpc/kernel-image-2.6.8-3-power3-di_0.78sarge2_powerpc.udeb stable/main/binary-powerpc/scsi-extra-modules-2.6.8-3-power4-di_0.78sarge2_powerpc.udeb stable/main/binary-powerpc/hfs-modules-2.6.8-3-powerpc-di_0.78sarge2_powerpc.udeb stable/main/binary-powerpc/cdrom-core-modules-2.6.8-3-powerpc-di_0.78sarge2_powerpc.udeb stable/main/binary-powerpc/kernel-image-2.6.8-3-power4-di_0.78sarge2_powerpc.udeb stable/main/binary-powerpc/ext3-modules-2.6.8-3-powerpc-di_0.78sarge2_powerpc.udeb stable/main/binary-powerpc/scsi-common-modules-2.6.8-3-power3-di_0.78sarge2_powerpc.udeb stable/main/binary-powerpc/nic-shared-modules-2.6.8-3-powerpc-di_0.78sarge2_powerpc.udeb stable/main/binary-powerpc/scsi-extra-modules-2.6.8-3-powerpc-di_0.78sarge2_powerpc.udeb stable/main/binary-powerpc/input-modules-2.6.8-3-power3-di_0.78sarge2_powerpc.udeb stable/main/binary-powerpc/scsi-common-modules-2.6.8-3-power4-di_0.78sarge2_powerpc.udeb stable/main/binary-powerpc/ppp-modules-2.6.8-3-power3-di_0.78sarge2_powerpc.udeb stable/main/binary-powerpc/md-modules-2.6.8-3-power3-di_0.78sarge2_powerpc.udeb stable/main/binary-powerpc/loop-modules-2.6.8-3-power4-di_0.78sarge2_powerpc.udeb stable/main/binary-powerpc/usb-modules-2.6.8-3-power4-di_0.78sarge2_powerpc.udeb stable/main/binary-powerpc/scsi-core-modules-2.6.8-3-power3-di_0.78sarge2_powerpc.udeb stable/main/binary-powerpc/ufs-modules-2.6.8-3-power3-di_0.78sarge2_powerpc.udeb stable/main/binary-powerpc/sata-modules-2.6.8-3-power3-di_0.78sarge2_powerpc.udeb stable/main/binary-powerpc/nic-pcmcia-modules-2.6.8-3-power3-di_0.78sarge2_powerpc.udeb stable/main/binary-powerpc/xfs-modules-2.6.8-3-power4-di_0.78sarge2_powerpc.udeb stable/main/binary-powerpc/scsi-core-modules-2.6.8-3-power4-di_0.78sarge2_powerpc.udeb stable/main/binary-powerpc/nic-extra-modules-2.6.8-3-power3-di_0.78sarge2_powerpc.udeb stable/main/binary-powerpc/pcmcia-storage-modules-2.6.8-3-power3-di_0.78sarge2_powerpc.udeb stable/main/binary-powerpc/nic-shared-modules-2.6.8-3-power4-di_0.78sarge2_powerpc.udeb stable/main/binary-powerpc/hfs-modules-2.6.8-3-power3-di_0.78sarge2_powerpc.udeb stable/main/binary-powerpc/ipv6-modules-2.6.8-3-powerpc-di_0.78sarge2_powerpc.udeb stable/main/binary-powerpc/floppy-modules-2.6.8-3-power4-di_0.78sarge2_powerpc.udeb stable/main/binary-powerpc/ext2-modules-2.6.8-3-powerpc-di_0.78sarge2_powerpc.udeb stable/main/binary-powerpc/fs-common-modules-2.6.8-3-power4-di_0.78sarge2_powerpc.udeb stable/main/binary-powerpc/ext2-modules-2.6.8-3-power3-di_0.78sarge2_powerpc.udeb stable/main/binary-powerpc/usb-storage-modules-2.6.8-3-powerpc-di_0.78sarge2_powerpc.udeb stable/main/binary-powerpc/scsi-common-modules-2.6.8-3-powerpc-di_0.78sarge2_powerpc.udeb stable/main/binary-powerpc/pcmcia-storage-modules-2.6.8-3-power4-di_0.78sarge2_powerpc.udeb stable/main/binary-powerpc/nic-pcmcia-modules-2.6.8-3-power4-di_0.78sarge2_powerpc.udeb stable/main/binary-powerpc/firewire-core-modules-2.6.8-3-powerpc-di_0.78sarge2_powerpc.udeb stable/main/binary-powerpc/irda-modules-2.6.8-3-power4-di_0.78sarge2_powerpc.udeb stable/main/binary-powerpc/ppp-modules-2.6.8-3-power4-di_0.78sarge2_powerpc.udeb stable/main/binary-powerpc/ide-modules-2.6.8-3-power4-di_0.78sarge2_powerpc.udeb stable/main/binary-powerpc/ide-modules-2.6.8-3-powerpc-di_0.78sarge2_powerpc.udeb stable/main/binary-powerpc/scsi-modules-2.6.8-3-powerpc-di_0.78sarge2_powerpc.udeb stable/main/binary-powerpc/ppp-modules-2.6.8-3-powerpc-di_0.78sarge2_powerpc.udeb stable/main/binary-powerpc/usb-modules-2.6.8-3-powerpc-di_0.78sarge2_powerpc.udeb stable/main/binary-powerpc/firmware-modules-2.6.8-3-power3-di_0.78sarge2_powerpc.udeb stable/main/binary-powerpc/loop-modules-2.6.8-3-power3-di_0.78sarge2_powerpc.udeb stable/main/binary-powerpc/firmware-modules-2.6.8-3-powerpc-di_0.78sarge2_powerpc.udeb stable/main/binary-powerpc/pcmcia-modules-2.6.8-3-powerpc-di_0.78sarge2_powerpc.udeb stable/main/binary-powerpc/scsi-modules-2.6.8-3-power4-di_0.78sarge2_powerpc.udeb stable/main/binary-powerpc/jfs-modules-2.6.8-3-powerpc-di_0.78sarge2_powerpc.udeb stable/main/binary-powerpc/reiserfs-modules-2.6.8-3-powerpc-di_0.78sarge2_powerpc.udeb stable/main/binary-powerpc/nic-modules-2.6.8-3-power4-di_0.78sarge2_powerpc.udeb stable/main/binary-powerpc/pcmcia-modules-2.6.8-3-power4-di_0.78sarge2_powerpc.udeb stable/main/binary-powerpc/nic-modules-2.6.8-3-power3-di_0.78sarge2_powerpc.udeb stable/main/binary-powerpc/nic-pcmcia-modules-2.6.8-3-powerpc-di_0.78sarge2_powerpc.udeb stable/main/binary-powerpc/scsi-modules-2.6.8-3-power3-di_0.78sarge2_powerpc.udeb stable/main/binary-powerpc/affs-modules-2.6.8-3-power4-di_0.78sarge2_powerpc.udeb stable/main/binary-powerpc/pcmcia-modules-2.6.8-3-power3-di_0.78sarge2_powerpc.udeb stable/main/binary-powerpc/reiserfs-modules-2.6.8-3-power4-di_0.78sarge2_powerpc.udeb stable/main/binary-powerpc/md-modules-2.6.8-3-power4-di_0.78sarge2_powerpc.udeb stable/main/binary-powerpc/fat-modules-2.6.8-3-powerpc-di_0.78sarge2_powerpc.udeb stable/main/binary-powerpc/firewire-core-modules-2.6.8-3-power4-di_0.78sarge2_powerpc.udeb stable/main/binary-powerpc/fs-common-modules-2.6.8-3-power3-di_0.78sarge2_powerpc.udeb stable/main/binary-powerpc/sata-modules-2.6.8-3-powerpc-di_0.78sarge2_powerpc.udeb stable/main/binary-powerpc/ide-modules-2.6.8-3-power3-di_0.78sarge2_powerpc.udeb stable/main/binary-powerpc/usb-modules-2.6.8-3-power3-di_0.78sarge2_powerpc.udeb stable/main/binary-powerpc/sata-modules-2.6.8-3-power4-di_0.78sarge2_powerpc.udeb stable/main/binary-powerpc/input-modules-2.6.8-3-power4-di_0.78sarge2_powerpc.udeb linux-kernel-di-powerpc-2.6 (0.78sarge2) stable; urgency=low * Rebuild against kernel-patch-powerpc-2.6.8 (2.6.8-12sarge4) stable/main/binary-powerpc/affs-modules-2.4.27-powerpc-small-di_0.64sarge1_powerpc.udeb stable/main/binary-powerpc/parport-modules-2.4.27-apus-di_0.64sarge1_powerpc.udeb stable/main/source/linux-kernel-di-powerpc_0.64sarge1.dsc stable/main/binary-powerpc/parport-modules-2.4.27-powerpc-small-di_0.64sarge1_powerpc.udeb stable/main/binary-powerpc/md-modules-2.4.27-powerpc-di_0.64sarge1_powerpc.udeb stable/main/binary-powerpc/ufs-modules-2.4.27-powerpc-di_0.64sarge1_powerpc.udeb stable/main/binary-powerpc/firewire-core-modules-2.4.27-powerpc-small-di_0.64sarge1_powerpc.udeb stable/main/binary-powerpc/nic-modules-2.4.27-apus-di_0.64sarge1_powerpc.udeb stable/main/binary-powerpc/isa-pnp-modules-2.4.27-powerpc-di_0.64sarge1_powerpc.udeb stable/main/binary-powerpc/cdrom-core-modules-2.4.27-powerpc-small-di_0.64sarge1_powerpc.udeb stable/main/binary-powerpc/serial-modules-2.4.27-powerpc-di_0.64sarge1_powerpc.udeb stable/main/binary-powerpc/nic-shared-modules-2.4.27-powerpc-small-di_0.64sarge1_powerpc.udeb stable/main/binary-powerpc/ipv6-modules-2.4.27-powerpc-di_0.64sarge1_powerpc.udeb stable/main/binary-powerpc/scsi-modules-2.4.27-apus-di_0.64sarge1_powerpc.udeb stable/main/binary-powerpc/usb-modules-2.4.27-powerpc-di_0.64sarge1_powerpc.udeb stable/main/binary-powerpc/nic-shared-modules-2.4.27-powerpc-di_0.64sarge1_powerpc.udeb stable/main/binary-powerpc/ppp-modules-2.4.27-powerpc-di_0.64sarge1_powerpc.udeb stable/main/binary-powerpc/kernel-image-2.4.27-apus-di_0.64sarge1_powerpc.udeb stable/main/binary-powerpc/loop-modules-2.4.27-powerpc-small-di_0.64sarge1_powerpc.udeb stable/main/binary-powerpc/plip-modules-2.4.27-powerpc-di_0.64sarge1_powerpc.udeb stable/main/binary-powerpc/scsi-modules-2.4.27-powerpc-di_0.64sarge1_powerpc.udeb stable/main/binary-powerpc/pcmcia-modules-2.4.27-powerpc-small-di_0.64sarge1_powerpc.udeb stable/main/binary-powerpc/nic-pcmcia-modules-2.4.27-powerpc-di_0.64sarge1_powerpc.udeb stable/main/binary-powerpc/input-modules-2.4.27-apus-di_0.64sarge1_powerpc.udeb stable/main/binary-powerpc/usb-modules-2.4.27-powerpc-small-di_0.64sarge1_powerpc.udeb stable/main/binary-powerpc/hfs-modules-2.4.27-powerpc-small-di_0.64sarge1_powerpc.udeb stable/main/binary-powerpc/scsi-core-modules-2.4.27-powerpc-small-di_0.64sarge1_powerpc.udeb stable/main/binary-powerpc/md-modules-2.4.27-powerpc-small-di_0.64sarge1_powerpc.udeb stable/main/binary-powerpc/ppp-modules-2.4.27-powerpc-small-di_0.64sarge1_powerpc.udeb stable/main/binary-powerpc/floppy-modules-2.4.27-powerpc-small-di_0.64sarge1_powerpc.udeb stable/main/binary-powerpc/floppy-modules-2.4.27-powerpc-di_0.64sarge1_powerpc.udeb stable/main/binary-powerpc/ide-modules-2.4.27-apus-di_0.64sarge1_powerpc.udeb stable/main/binary-powerpc/input-modules-2.4.27-powerpc-small-di_0.64sarge1_powerpc.udeb stable/main/binary-powerpc/reiserfs-modules-2.4.27-powerpc-small-di_0.64sarge1_powerpc.udeb stable/main/binary-powerpc/kernel-image-2.4.27-powerpc-di_0.64sarge1_powerpc.udeb stable/main/binary-powerpc/md-modules-2.4.27-apus-di_0.64sarge1_powerpc.udeb stable/main/binary-powerpc/nic-extra-modules-2.4.27-powerpc-small-di_0.64sarge1_powerpc.udeb stable/main/binary-powerpc/loop-modules-2.4.27-powerpc-di_0.64sarge1_powerpc.udeb stable/main/binary-powerpc/nic-extra-modules-2.4.27-powerpc-di_0.64sarge1_powerpc.udeb stable/main/binary-powerpc/scsi-common-modules-2.4.27-powerpc-small-di_0.64sarge1_powerpc.udeb stable/main/binary-powerpc/serial-modules-2.4.27-powerpc-small-di_0.64sarge1_powerpc.udeb stable/main/binary-powerpc/irda-modules-2.4.27-powerpc-small-di_0.64sarge1_powerpc.udeb stable/main/binary-powerpc/kernel-image-2.4.27-powerpc-small-di_0.64sarge1_powerpc.udeb stable/main/binary-powerpc/scsi-modules-2.4.27-powerpc-small-di_0.64sarge1_powerpc.udeb stable/main/binary-powerpc/affs-modules-2.4.27-powerpc-di_0.64sarge1_powerpc.udeb stable/main/binary-powerpc/ide-modules-2.4.27-powerpc-small-di_0.64sarge1_powerpc.udeb stable/main/binary-powerpc/irda-modules-2.4.27-powerpc-di_0.64sarge1_powerpc.udeb stable/main/binary-powerpc/socket-modules-2.4.27-powerpc-di_0.64sarge1_powerpc.udeb stable/main/binary-powerpc/fb-modules-2.4.27-powerpc-small-di_0.64sarge1_powerpc.udeb stable/main/binary-powerpc/pcmcia-modules-2.4.27-powerpc-di_0.64sarge1_powerpc.udeb stable/main/binary-powerpc/nic-pcmcia-modules-2.4.27-powerpc-small-di_0.64sarge1_powerpc.udeb stable/main/binary-powerpc/xfs-modules-2.4.27-powerpc-small-di_0.64sarge1_powerpc.udeb stable/main/binary-powerpc/scsi-common-modules-2.4.27-powerpc-di_0.64sarge1_powerpc.udeb stable/main/binary-powerpc/isa-pnp-modules-2.4.27-powerpc-small-di_0.64sarge1_powerpc.udeb stable/main/binary-powerpc/ufs-modules-2.4.27-powerpc-small-di_0.64sarge1_powerpc.udeb stable/main/binary-powerpc/plip-modules-2.4.27-apus-di_0.64sarge1_powerpc.udeb stable/main/binary-powerpc/jfs-modules-2.4.27-powerpc-small-di_0.64sarge1_powerpc.udeb stable/main/binary-powerpc/scsi-extra-modules-2.4.27-powerpc-small-di_0.64sarge1_powerpc.udeb stable/main/binary-powerpc/pcmcia-storage-modules-2.4.27-powerpc-di_0.64sarge1_powerpc.udeb stable/main/binary-powerpc/jfs-modules-2.4.27-apus-di_0.64sarge1_powerpc.udeb stable/main/binary-powerpc/usb-storage-modules-2.4.27-powerpc-small-di_0.64sarge1_powerpc.udeb stable/main/binary-powerpc/ipv6-modules-2.4.27-powerpc-small-di_0.64sarge1_powerpc.udeb stable/main/binary-powerpc/nic-modules-2.4.27-powerpc-di_0.64sarge1_powerpc.udeb stable/main/binary-powerpc/pcmcia-storage-modules-2.4.27-powerpc-small-di_0.64sarge1_powerpc.udeb stable/main/source/linux-kernel-di-powerpc_0.64sarge1.tar.gz stable/main/binary-powerpc/ext3-modules-2.4.27-powerpc-small-di_0.64sarge1_powerpc.udeb stable/main/binary-powerpc/socket-modules-2.4.27-powerpc-small-di_0.64sarge1_powerpc.udeb stable/main/binary-powerpc/brltty-modules-2.4.27-powerpc-di_0.64sarge1_powerpc.udeb stable/main/binary-powerpc/plip-modules-2.4.27-powerpc-small-di_0.64sarge1_powerpc.udeb stable/main/binary-powerpc/hfs-modules-2.4.27-powerpc-di_0.64sarge1_powerpc.udeb stable/main/binary-powerpc/nic-modules-2.4.27-powerpc-small-di_0.64sarge1_powerpc.udeb stable/main/binary-powerpc/brltty-modules-2.4.27-powerpc-small-di_0.64sarge1_powerpc.udeb stable/main/binary-powerpc/fb-modules-2.4.27-powerpc-di_0.64sarge1_powerpc.udeb stable/main/binary-powerpc/ide-modules-2.4.27-powerpc-di_0.64sarge1_powerpc.udeb stable/main/binary-powerpc/usb-storage-modules-2.4.27-powerpc-di_0.64sarge1_powerpc.udeb linux-kernel-di-powerpc (0.64sarge1) stable-proposed-updates; urgency=high * Rebuild against kernel-patch-powerpc-2.4.27 (2.4.27-10sarge3) stable/main/source/linux-kernel-di-mipsel_1.1sarge1.tar.gz stable/main/binary-mipsel/ipv6-modules-2.4.27-r4k-kn04-di_1.1sarge1_mipsel.udeb stable/main/binary-mipsel/xfs-modules-2.4.27-sb1-swarm-bn-di_1.1sarge1_mipsel.udeb stable/main/binary-mipsel/loop-modules-2.4.27-r5k-cobalt-di_1.1sarge1_mipsel.udeb stable/main/binary-mipsel/usb-modules-2.4.27-sb1-swarm-bn-di_1.1sarge1_mipsel.udeb stable/main/binary-mipsel/reiserfs-modules-2.4.27-r5k-cobalt-di_1.1sarge1_mipsel.udeb stable/main/binary-mipsel/md-modules-2.4.27-r3k-kn02-di_1.1sarge1_mipsel.udeb stable/main/binary-mipsel/kernel-image-2.4.27-sb1-swarm-bn-di_1.1sarge1_mipsel.udeb stable/main/binary-mipsel/reiserfs-modules-2.4.27-r3k-kn02-di_1.1sarge1_mipsel.udeb stable/main/binary-mipsel/scsi-common-modules-2.4.27-sb1-swarm-bn-di_1.1sarge1_mipsel.udeb stable/main/binary-mipsel/fat-modules-2.4.27-sb1-swarm-bn-di_1.1sarge1_mipsel.udeb stable/main/binary-mipsel/jfs-modules-2.4.27-r5k-cobalt-di_1.1sarge1_mipsel.udeb stable/main/binary-mipsel/input-modules-2.4.27-sb1-swarm-bn-di_1.1sarge1_mipsel.udeb stable/main/binary-mipsel/fb-modules-2.4.27-sb1-swarm-bn-di_1.1sarge1_mipsel.udeb stable/main/binary-mipsel/md-modules-2.4.27-r4k-kn04-di_1.1sarge1_mipsel.udeb stable/main/binary-mipsel/md-modules-2.4.27-r5k-cobalt-di_1.1sarge1_mipsel.udeb stable/main/binary-mipsel/ipv6-modules-2.4.27-r3k-kn02-di_1.1sarge1_mipsel.udeb stable/main/binary-mipsel/usb-storage-modules-2.4.27-sb1-swarm-bn-di_1.1sarge1_mipsel.udeb stable/main/binary-mipsel/ipv6-modules-2.4.27-sb1-swarm-bn-di_1.1sarge1_mipsel.udeb stable/main/binary-mipsel/loop-modules-2.4.27-sb1-swarm-bn-di_1.1sarge1_mipsel.udeb stable/main/binary-mipsel/md-modules-2.4.27-sb1-swarm-bn-di_1.1sarge1_mipsel.udeb stable/main/binary-mipsel/kernel-image-2.4.27-r4k-kn04-di_1.1sarge1_mipsel.udeb stable/main/binary-mipsel/ppp-modules-2.4.27-r5k-cobalt-di_1.1sarge1_mipsel.udeb stable/main/binary-mipsel/scsi-modules-2.4.27-sb1-swarm-bn-di_1.1sarge1_mipsel.udeb stable/main/binary-mipsel/jfs-modules-2.4.27-sb1-swarm-bn-di_1.1sarge1_mipsel.udeb stable/main/binary-mipsel/fat-modules-2.4.27-r5k-cobalt-di_1.1sarge1_mipsel.udeb stable/main/source/linux-kernel-di-mipsel_1.1sarge1.dsc stable/main/binary-mipsel/sata-modules-2.4.27-sb1-swarm-bn-di_1.1sarge1_mipsel.udeb stable/main/binary-mipsel/ipv6-modules-2.4.27-r5k-cobalt-di_1.1sarge1_mipsel.udeb stable/main/binary-mipsel/kernel-image-2.4.27-r5k-cobalt-di_1.1sarge1_mipsel.udeb stable/main/binary-mipsel/xfs-modules-2.4.27-r5k-cobalt-di_1.1sarge1_mipsel.udeb stable/main/binary-mipsel/pcmcia-storage-modules-2.4.27-sb1-swarm-bn-di_1.1sarge1_mipsel.udeb stable/main/binary-mipsel/scsi-core-modules-2.4.27-sb1-swarm-bn-di_1.1sarge1_mipsel.udeb stable/main/binary-mipsel/cdrom-core-modules-2.4.27-sb1-swarm-bn-di_1.1sarge1_mipsel.udeb stable/main/binary-mipsel/reiserfs-modules-2.4.27-r4k-kn04-di_1.1sarge1_mipsel.udeb stable/main/binary-mipsel/kernel-image-2.4.27-r3k-kn02-di_1.1sarge1_mipsel.udeb stable/main/binary-mipsel/reiserfs-modules-2.4.27-sb1-swarm-bn-di_1.1sarge1_mipsel.udeb stable/main/binary-mipsel/cdrom-core-modules-2.4.27-r5k-cobalt-di_1.1sarge1_mipsel.udeb stable/main/binary-mipsel/ppp-modules-2.4.27-sb1-swarm-bn-di_1.1sarge1_mipsel.udeb linux-kernel-di-mipsel (1.1sarge1) stable-proposed-updates; urgency=high * Rebuild against kernel-patch-2.4.27-mips (2.4.27-10.sarge3.040815-1) for compatability with the new ABI stable/main/binary-mips/md-modules-2.4.27-r5k-ip22-di_1.2sarge1_mips.udeb stable/main/binary-mips/ppp-modules-2.4.27-sb1-swarm-bn-di_1.2sarge1_mips.udeb stable/main/binary-mips/scsi-common-modules-2.4.27-sb1-swarm-bn-di_1.2sarge1_mips.udeb stable/main/source/linux-kernel-di-mips_1.2sarge1.tar.gz stable/main/binary-mips/jfs-modules-2.4.27-r4k-ip22-di_1.2sarge1_mips.udeb stable/main/binary-mips/reiserfs-modules-2.4.27-r4k-ip22-di_1.2sarge1_mips.udeb stable/main/binary-mips/loop-modules-2.4.27-r5k-ip22-di_1.2sarge1_mips.udeb stable/main/binary-mips/jfs-modules-2.4.27-sb1-swarm-bn-di_1.2sarge1_mips.udeb stable/main/binary-mips/sata-modules-2.4.27-sb1-swarm-bn-di_1.2sarge1_mips.udeb stable/main/binary-mips/kernel-image-2.4.27-r4k-ip22-di_1.2sarge1_mips.udeb stable/main/binary-mips/ipv6-modules-2.4.27-sb1-swarm-bn-di_1.2sarge1_mips.udeb stable/main/binary-mips/ipv6-modules-2.4.27-r5k-ip22-di_1.2sarge1_mips.udeb stable/main/binary-mips/usb-storage-modules-2.4.27-sb1-swarm-bn-di_1.2sarge1_mips.udeb stable/main/binary-mips/reiserfs-modules-2.4.27-sb1-swarm-bn-di_1.2sarge1_mips.udeb stable/main/binary-mips/jfs-modules-2.4.27-r5k-ip22-di_1.2sarge1_mips.udeb stable/main/binary-mips/md-modules-2.4.27-sb1-swarm-bn-di_1.2sarge1_mips.udeb stable/main/binary-mips/loop-modules-2.4.27-sb1-swarm-bn-di_1.2sarge1_mips.udeb stable/main/binary-mips/fb-modules-2.4.27-sb1-swarm-bn-di_1.2sarge1_mips.udeb stable/main/binary-mips/xfs-modules-2.4.27-r5k-ip22-di_1.2sarge1_mips.udeb stable/main/binary-mips/cdrom-core-modules-2.4.27-sb1-swarm-bn-di_1.2sarge1_mips.udeb stable/main/binary-mips/ppp-modules-2.4.27-r5k-ip22-di_1.2sarge1_mips.udeb stable/main/binary-mips/scsi-modules-2.4.27-sb1-swarm-bn-di_1.2sarge1_mips.udeb stable/main/binary-mips/reiserfs-modules-2.4.27-r5k-ip22-di_1.2sarge1_mips.udeb stable/main/source/linux-kernel-di-mips_1.2sarge1.dsc stable/main/binary-mips/loop-modules-2.4.27-r4k-ip22-di_1.2sarge1_mips.udeb stable/main/binary-mips/input-modules-2.4.27-sb1-swarm-bn-di_1.2sarge1_mips.udeb stable/main/binary-mips/md-modules-2.4.27-r4k-ip22-di_1.2sarge1_mips.udeb stable/main/binary-mips/scsi-core-modules-2.4.27-sb1-swarm-bn-di_1.2sarge1_mips.udeb stable/main/binary-mips/usb-modules-2.4.27-sb1-swarm-bn-di_1.2sarge1_mips.udeb stable/main/binary-mips/ipv6-modules-2.4.27-r4k-ip22-di_1.2sarge1_mips.udeb stable/main/binary-mips/xfs-modules-2.4.27-r4k-ip22-di_1.2sarge1_mips.udeb stable/main/binary-mips/kernel-image-2.4.27-sb1-swarm-bn-di_1.2sarge1_mips.udeb stable/main/binary-mips/xfs-modules-2.4.27-sb1-swarm-bn-di_1.2sarge1_mips.udeb stable/main/binary-mips/fat-modules-2.4.27-sb1-swarm-bn-di_1.2sarge1_mips.udeb stable/main/binary-mips/kernel-image-2.4.27-r5k-ip22-di_1.2sarge1_mips.udeb stable/main/binary-mips/ppp-modules-2.4.27-r4k-ip22-di_1.2sarge1_mips.udeb stable/main/binary-mips/pcmcia-storage-modules-2.4.27-sb1-swarm-bn-di_1.2sarge1_mips.udeb linux-kernel-di-mips (1.2sarge1) stable-proposed-updates; urgency=high * Rebuild against kernel-patch-2.4.27-mips (2.4.27-10.sarge3.040815-1) for compatability with the new ABI stable/main/binary-m68k/jfs-modules-2.6.8-mac-di_0.66sarge2_m68k.udeb stable/main/source/linux-kernel-di-m68k-2.6_0.66sarge2.dsc stable/main/binary-m68k/fat-modules-2.6.8-hp-di_0.66sarge2_m68k.udeb stable/main/binary-m68k/ppp-modules-2.6.8-amiga-di_0.66sarge2_m68k.udeb stable/main/binary-m68k/nic-shared-modules-2.6.8-atari-di_0.66sarge2_m68k.udeb stable/main/binary-m68k/jfs-modules-2.6.8-mvme16x-di_0.66sarge2_m68k.udeb stable/main/binary-m68k/jfs-modules-2.6.8-hp-di_0.66sarge2_m68k.udeb stable/main/binary-m68k/jfs-modules-2.6.8-mvme147-di_0.66sarge2_m68k.udeb stable/main/binary-m68k/kernel-image-2.6.8-hp-di_0.66sarge2_m68k.udeb stable/main/binary-m68k/jfs-modules-2.6.8-atari-di_0.66sarge2_m68k.udeb stable/main/binary-m68k/scsi-modules-2.6.8-sun3-di_0.66sarge2_m68k.udeb stable/main/binary-m68k/ppp-modules-2.6.8-mvme147-di_0.66sarge2_m68k.udeb stable/main/binary-m68k/nic-shared-modules-2.6.8-mvme147-di_0.66sarge2_m68k.udeb stable/main/binary-m68k/jfs-modules-2.6.8-sun3-di_0.66sarge2_m68k.udeb stable/main/binary-m68k/reiserfs-modules-2.6.8-q40-di_0.66sarge2_m68k.udeb stable/main/binary-m68k/scsi-modules-2.6.8-q40-di_0.66sarge2_m68k.udeb stable/main/binary-m68k/kernel-image-2.6.8-sun3-di_0.66sarge2_m68k.udeb stable/main/binary-m68k/nic-shared-modules-2.6.8-q40-di_0.66sarge2_m68k.udeb stable/main/binary-m68k/jfs-modules-2.6.8-q40-di_0.66sarge2_m68k.udeb stable/main/binary-m68k/ppp-modules-2.6.8-hp-di_0.66sarge2_m68k.udeb stable/main/source/linux-kernel-di-m68k-2.6_0.66sarge2.tar.gz stable/main/binary-m68k/scsi-modules-2.6.8-mvme147-di_0.66sarge2_m68k.udeb stable/main/binary-m68k/fat-modules-2.6.8-mac-di_0.66sarge2_m68k.udeb stable/main/binary-m68k/nic-shared-modules-2.6.8-hp-di_0.66sarge2_m68k.udeb stable/main/binary-m68k/reiserfs-modules-2.6.8-mac-di_0.66sarge2_m68k.udeb stable/main/binary-m68k/nic-shared-modules-2.6.8-bvme6000-di_0.66sarge2_m68k.udeb stable/main/binary-m68k/ppp-modules-2.6.8-atari-di_0.66sarge2_m68k.udeb stable/main/binary-m68k/fat-modules-2.6.8-amiga-di_0.66sarge2_m68k.udeb stable/main/binary-m68k/scsi-modules-2.6.8-mac-di_0.66sarge2_m68k.udeb stable/main/binary-m68k/fat-modules-2.6.8-sun3-di_0.66sarge2_m68k.udeb stable/main/binary-m68k/scsi-modules-2.6.8-mvme16x-di_0.66sarge2_m68k.udeb stable/main/binary-m68k/scsi-modules-2.6.8-bvme6000-di_0.66sarge2_m68k.udeb stable/main/binary-m68k/fat-modules-2.6.8-bvme6000-di_0.66sarge2_m68k.udeb stable/main/binary-m68k/reiserfs-modules-2.6.8-mvme147-di_0.66sarge2_m68k.udeb stable/main/binary-m68k/nic-shared-modules-2.6.8-mvme16x-di_0.66sarge2_m68k.udeb stable/main/binary-m68k/scsi-modules-2.6.8-hp-di_0.66sarge2_m68k.udeb stable/main/binary-m68k/ppp-modules-2.6.8-sun3-di_0.66sarge2_m68k.udeb stable/main/binary-m68k/nic-shared-modules-2.6.8-sun3-di_0.66sarge2_m68k.udeb stable/main/binary-m68k/fat-modules-2.6.8-q40-di_0.66sarge2_m68k.udeb stable/main/binary-m68k/kernel-image-2.6.8-q40-di_0.66sarge2_m68k.udeb stable/main/binary-m68k/kernel-image-2.6.8-atari-di_0.66sarge2_m68k.udeb stable/main/binary-m68k/scsi-modules-2.6.8-atari-di_0.66sarge2_m68k.udeb stable/main/binary-m68k/reiserfs-modules-2.6.8-amiga-di_0.66sarge2_m68k.udeb stable/main/binary-m68k/fat-modules-2.6.8-atari-di_0.66sarge2_m68k.udeb stable/main/binary-m68k/reiserfs-modules-2.6.8-atari-di_0.66sarge2_m68k.udeb stable/main/binary-m68k/fat-modules-2.6.8-mvme16x-di_0.66sarge2_m68k.udeb stable/main/binary-m68k/ppp-modules-2.6.8-q40-di_0.66sarge2_m68k.udeb stable/main/binary-m68k/fat-modules-2.6.8-mvme147-di_0.66sarge2_m68k.udeb stable/main/binary-m68k/nic-shared-modules-2.6.8-amiga-di_0.66sarge2_m68k.udeb stable/main/binary-m68k/kernel-image-2.6.8-bvme6000-di_0.66sarge2_m68k.udeb stable/main/binary-m68k/kernel-image-2.6.8-mvme147-di_0.66sarge2_m68k.udeb stable/main/binary-m68k/ppp-modules-2.6.8-bvme6000-di_0.66sarge2_m68k.udeb stable/main/binary-m68k/kernel-image-2.6.8-mvme16x-di_0.66sarge2_m68k.udeb stable/main/binary-m68k/reiserfs-modules-2.6.8-hp-di_0.66sarge2_m68k.udeb stable/main/binary-m68k/reiserfs-modules-2.6.8-mvme16x-di_0.66sarge2_m68k.udeb stable/main/binary-m68k/ppp-modules-2.6.8-mvme16x-di_0.66sarge2_m68k.udeb stable/main/binary-m68k/ppp-modules-2.6.8-mac-di_0.66sarge2_m68k.udeb stable/main/binary-m68k/kernel-image-2.6.8-mac-di_0.66sarge2_m68k.udeb stable/main/binary-m68k/jfs-modules-2.6.8-amiga-di_0.66sarge2_m68k.udeb stable/main/binary-m68k/scsi-modules-2.6.8-amiga-di_0.66sarge2_m68k.udeb stable/main/binary-m68k/jfs-modules-2.6.8-bvme6000-di_0.66sarge2_m68k.udeb stable/main/binary-m68k/reiserfs-modules-2.6.8-bvme6000-di_0.66sarge2_m68k.udeb stable/main/binary-m68k/kernel-image-2.6.8-amiga-di_0.66sarge2_m68k.udeb stable/main/binary-m68k/nic-shared-modules-2.6.8-mac-di_0.66sarge2_m68k.udeb stable/main/binary-m68k/reiserfs-modules-2.6.8-sun3-di_0.66sarge2_m68k.udeb linux-kernel-di-m68k-2.6 (0.66sarge2) stable; urgency=high * Rebuild against kernel-image-2.6.8-m68k (2.6.8-4sarge4) for compatability with the new ABI. stable/main/binary-m68k/kernel-image-2.2.25-mvme147-di_0.65sarge1_m68k.udeb stable/main/binary-m68k/scsi-modules-2.2.25-atari-di_0.65sarge1_m68k.udeb stable/main/binary-m68k/kernel-image-2.4.27-atari-di_0.65sarge1_m68k.udeb stable/main/binary-m68k/kernel-image-2.2.25-atari-di_0.65sarge1_m68k.udeb stable/main/binary-m68k/scsi-modules-2.2.25-bvme6000-di_0.65sarge1_m68k.udeb stable/main/binary-m68k/reiserfs-modules-2.4.27-bvme6000-di_0.65sarge1_m68k.udeb stable/main/binary-m68k/reiserfs-modules-2.4.27-q40-di_0.65sarge1_m68k.udeb stable/main/binary-m68k/kernel-image-2.4.27-mvme16x-di_0.65sarge1_m68k.udeb stable/main/binary-m68k/kernel-image-2.2.25-bvme6000-di_0.65sarge1_m68k.udeb stable/main/binary-m68k/kernel-image-2.4.27-mvme147-di_0.65sarge1_m68k.udeb stable/main/binary-m68k/fat-modules-2.4.27-mvme16x-di_0.65sarge1_m68k.udeb stable/main/binary-m68k/ppp-modules-2.4.27-mvme147-di_0.65sarge1_m68k.udeb stable/main/binary-m68k/nic-shared-modules-2.4.27-bvme6000-di_0.65sarge1_m68k.udeb stable/main/binary-m68k/ppp-modules-2.4.27-atari-di_0.65sarge1_m68k.udeb stable/main/binary-m68k/jfs-modules-2.4.27-mvme16x-di_0.65sarge1_m68k.udeb stable/main/binary-m68k/ppp-modules-2.2.25-atari-di_0.65sarge1_m68k.udeb stable/main/binary-m68k/scsi-modules-2.2.25-mvme16x-di_0.65sarge1_m68k.udeb stable/main/binary-m68k/kernel-image-2.4.27-q40-di_0.65sarge1_m68k.udeb stable/main/binary-m68k/jfs-modules-2.4.27-bvme6000-di_0.65sarge1_m68k.udeb stable/main/binary-m68k/nic-shared-modules-2.2.25-mac-di_0.65sarge1_m68k.udeb stable/main/binary-m68k/nic-shared-modules-2.4.27-q40-di_0.65sarge1_m68k.udeb stable/main/binary-m68k/scsi-modules-2.4.27-bvme6000-di_0.65sarge1_m68k.udeb stable/main/binary-m68k/reiserfs-modules-2.4.27-amiga-di_0.65sarge1_m68k.udeb stable/main/binary-m68k/jfs-modules-2.4.27-q40-di_0.65sarge1_m68k.udeb stable/main/source/linux-kernel-di-m68k_0.65sarge1.tar.gz stable/main/binary-m68k/ppp-modules-2.4.27-mvme16x-di_0.65sarge1_m68k.udeb stable/main/binary-m68k/kernel-image-2.2.25-mac-di_0.65sarge1_m68k.udeb stable/main/binary-m68k/nic-shared-modules-2.2.25-bvme6000-di_0.65sarge1_m68k.udeb stable/main/binary-m68k/fat-modules-2.2.25-atari-di_0.65sarge1_m68k.udeb stable/main/binary-m68k/ppp-modules-2.2.25-mac-di_0.65sarge1_m68k.udeb stable/main/binary-m68k/nic-shared-modules-2.2.25-atari-di_0.65sarge1_m68k.udeb stable/main/binary-m68k/scsi-modules-2.4.27-mvme16x-di_0.65sarge1_m68k.udeb stable/main/binary-m68k/kernel-image-2.4.27-bvme6000-di_0.65sarge1_m68k.udeb stable/main/binary-m68k/scsi-modules-2.2.25-mac-di_0.65sarge1_m68k.udeb stable/main/binary-m68k/scsi-modules-2.4.27-atari-di_0.65sarge1_m68k.udeb stable/main/binary-m68k/nic-shared-modules-2.2.25-mvme147-di_0.65sarge1_m68k.udeb stable/main/binary-m68k/scsi-modules-2.4.27-amiga-di_0.65sarge1_m68k.udeb stable/main/binary-m68k/nic-shared-modules-2.4.27-mvme147-di_0.65sarge1_m68k.udeb stable/main/binary-m68k/scsi-modules-2.4.27-q40-di_0.65sarge1_m68k.udeb stable/main/binary-m68k/fat-modules-2.2.25-mvme147-di_0.65sarge1_m68k.udeb stable/main/binary-m68k/fat-modules-2.4.27-amiga-di_0.65sarge1_m68k.udeb stable/main/binary-m68k/nic-shared-modules-2.4.27-amiga-di_0.65sarge1_m68k.udeb stable/main/binary-m68k/ppp-modules-2.2.25-mvme147-di_0.65sarge1_m68k.udeb stable/main/binary-m68k/fat-modules-2.4.27-atari-di_0.65sarge1_m68k.udeb stable/main/binary-m68k/jfs-modules-2.4.27-amiga-di_0.65sarge1_m68k.udeb stable/main/binary-m68k/reiserfs-modules-2.4.27-atari-di_0.65sarge1_m68k.udeb stable/main/binary-m68k/fat-modules-2.2.25-bvme6000-di_0.65sarge1_m68k.udeb stable/main/binary-m68k/nic-shared-modules-2.4.27-mvme16x-di_0.65sarge1_m68k.udeb stable/main/binary-m68k/ppp-modules-2.4.27-amiga-di_0.65sarge1_m68k.udeb stable/main/binary-m68k/fat-modules-2.4.27-mvme147-di_0.65sarge1_m68k.udeb stable/main/binary-m68k/fat-modules-2.4.27-q40-di_0.65sarge1_m68k.udeb stable/main/binary-m68k/ppp-modules-2.2.25-bvme6000-di_0.65sarge1_m68k.udeb stable/main/binary-m68k/jfs-modules-2.4.27-atari-di_0.65sarge1_m68k.udeb stable/main/binary-m68k/fat-modules-2.2.25-mac-di_0.65sarge1_m68k.udeb stable/main/binary-m68k/jfs-modules-2.4.27-mvme147-di_0.65sarge1_m68k.udeb stable/main/binary-m68k/scsi-modules-2.4.27-mvme147-di_0.65sarge1_m68k.udeb stable/main/binary-m68k/fat-modules-2.2.25-mvme16x-di_0.65sarge1_m68k.udeb stable/main/source/linux-kernel-di-m68k_0.65sarge1.dsc stable/main/binary-m68k/ppp-modules-2.4.27-q40-di_0.65sarge1_m68k.udeb stable/main/binary-m68k/reiserfs-modules-2.4.27-mvme147-di_0.65sarge1_m68k.udeb stable/main/binary-m68k/nic-shared-modules-2.2.25-mvme16x-di_0.65sarge1_m68k.udeb stable/main/binary-m68k/ppp-modules-2.2.25-mvme16x-di_0.65sarge1_m68k.udeb stable/main/binary-m68k/nic-shared-modules-2.4.27-atari-di_0.65sarge1_m68k.udeb stable/main/binary-m68k/reiserfs-modules-2.4.27-mvme16x-di_0.65sarge1_m68k.udeb stable/main/binary-m68k/fat-modules-2.4.27-bvme6000-di_0.65sarge1_m68k.udeb stable/main/binary-m68k/kernel-image-2.2.25-mvme16x-di_0.65sarge1_m68k.udeb stable/main/binary-m68k/kernel-image-2.4.27-amiga-di_0.65sarge1_m68k.udeb stable/main/binary-m68k/scsi-modules-2.2.25-mvme147-di_0.65sarge1_m68k.udeb stable/main/binary-m68k/ppp-modules-2.4.27-bvme6000-di_0.65sarge1_m68k.udeb linux-kernel-di-m68k (0.65sarge1) stable-proposed-updates; urgency=high * Rebuild against kernel-image-2.4.27-m68k (2.4.27-3sarge3) for compatability with the new ABI stable/main/binary-ia64/ufs-modules-2.6.8-3-itanium-smp-di_1.1sarge2_ia64.udeb stable/main/binary-ia64/plip-modules-2.6.8-3-itanium-smp-di_1.1sarge2_ia64.udeb stable/main/binary-ia64/ppp-modules-2.6.8-3-itanium-smp-di_1.1sarge2_ia64.udeb stable/main/binary-ia64/input-modules-2.6.8-3-itanium-smp-di_1.1sarge2_ia64.udeb stable/main/binary-ia64/ide-core-modules-2.6.8-3-itanium-smp-di_1.1sarge2_ia64.udeb stable/main/binary-ia64/nic-shared-modules-2.6.8-3-itanium-smp-di_1.1sarge2_ia64.udeb stable/main/binary-ia64/firmware-modules-2.6.8-3-itanium-smp-di_1.1sarge2_ia64.udeb stable/main/binary-ia64/usb-modules-2.6.8-3-itanium-smp-di_1.1sarge2_ia64.udeb stable/main/binary-ia64/ipv6-modules-2.6.8-3-itanium-smp-di_1.1sarge2_ia64.udeb stable/main/binary-ia64/sata-modules-2.6.8-3-itanium-smp-di_1.1sarge2_ia64.udeb stable/main/source/linux-kernel-di-ia64-2.6_1.1sarge2.tar.gz stable/main/binary-ia64/nic-usb-modules-2.6.8-3-itanium-smp-di_1.1sarge2_ia64.udeb stable/main/binary-ia64/scsi-core-modules-2.6.8-3-itanium-smp-di_1.1sarge2_ia64.udeb stable/main/binary-ia64/reiserfs-modules-2.6.8-3-itanium-smp-di_1.1sarge2_ia64.udeb stable/main/binary-ia64/serial-modules-2.6.8-3-itanium-smp-di_1.1sarge2_ia64.udeb stable/main/binary-ia64/scsi-modules-2.6.8-3-itanium-smp-di_1.1sarge2_ia64.udeb stable/main/binary-ia64/irda-modules-2.6.8-3-itanium-smp-di_1.1sarge2_ia64.udeb stable/main/binary-ia64/pcmcia-modules-2.6.8-3-itanium-smp-di_1.1sarge2_ia64.udeb stable/main/binary-ia64/ntfs-modules-2.6.8-3-itanium-smp-di_1.1sarge2_ia64.udeb stable/main/binary-ia64/firewire-core-modules-2.6.8-3-itanium-smp-di_1.1sarge2_ia64.udeb stable/main/binary-ia64/fb-modules-2.6.8-3-itanium-smp-di_1.1sarge2_ia64.udeb stable/main/binary-ia64/md-modules-2.6.8-3-itanium-smp-di_1.1sarge2_ia64.udeb stable/main/binary-ia64/loop-modules-2.6.8-3-itanium-smp-di_1.1sarge2_ia64.udeb stable/main/binary-ia64/ide-modules-2.6.8-3-itanium-smp-di_1.1sarge2_ia64.udeb stable/main/source/linux-kernel-di-ia64-2.6_1.1sarge2.dsc stable/main/binary-ia64/usb-storage-modules-2.6.8-3-itanium-smp-di_1.1sarge2_ia64.udeb stable/main/binary-ia64/xfs-modules-2.6.8-3-itanium-smp-di_1.1sarge2_ia64.udeb stable/main/binary-ia64/ext3-modules-2.6.8-3-itanium-smp-di_1.1sarge2_ia64.udeb stable/main/binary-ia64/cdrom-core-modules-2.6.8-3-itanium-smp-di_1.1sarge2_ia64.udeb stable/main/binary-ia64/fat-modules-2.6.8-3-itanium-smp-di_1.1sarge2_ia64.udeb stable/main/binary-ia64/kernel-image-2.6.8-3-itanium-smp-di_1.1sarge2_ia64.udeb stable/main/binary-ia64/nic-modules-2.6.8-3-itanium-smp-di_1.1sarge2_ia64.udeb stable/main/binary-ia64/parport-modules-2.6.8-3-itanium-smp-di_1.1sarge2_ia64.udeb linux-kernel-di-ia64-2.6 (1.1sarge2) stable; urgency=low * Rebuild against kernel-image-2.6.8-3-itanium-smp (2.6.8-14sarge4) stable/main/binary-ia64/brltty-modules-2.4.27-3-itanium-smp-di_1.00sarge1_ia64.udeb stable/main/binary-ia64/usb-storage-modules-2.4.27-3-itanium-smp-di_1.00sarge1_ia64.udeb stable/main/binary-ia64/xfs-modules-2.4.27-3-itanium-smp-di_1.00sarge1_ia64.udeb stable/main/binary-ia64/input-modules-2.4.27-3-itanium-smp-di_1.00sarge1_ia64.udeb stable/main/binary-ia64/plip-modules-2.4.27-3-itanium-smp-di_1.00sarge1_ia64.udeb stable/main/binary-ia64/ide-core-modules-2.4.27-3-itanium-smp-di_1.00sarge1_ia64.udeb stable/main/binary-ia64/fb-modules-2.4.27-3-itanium-smp-di_1.00sarge1_ia64.udeb stable/main/binary-ia64/fat-modules-2.4.27-3-itanium-smp-di_1.00sarge1_ia64.udeb stable/main/source/linux-kernel-di-ia64_1.00sarge1.tar.gz stable/main/binary-ia64/parport-modules-2.4.27-3-itanium-smp-di_1.00sarge1_ia64.udeb stable/main/binary-ia64/loop-modules-2.4.27-3-itanium-smp-di_1.00sarge1_ia64.udeb stable/main/binary-ia64/cdrom-core-modules-2.4.27-3-itanium-smp-di_1.00sarge1_ia64.udeb stable/main/binary-ia64/ppp-modules-2.4.27-3-itanium-smp-di_1.00sarge1_ia64.udeb stable/main/source/linux-kernel-di-ia64_1.00sarge1.dsc stable/main/binary-ia64/ide-modules-2.4.27-3-itanium-smp-di_1.00sarge1_ia64.udeb stable/main/binary-ia64/serial-modules-2.4.27-3-itanium-smp-di_1.00sarge1_ia64.udeb stable/main/binary-ia64/nic-modules-2.4.27-3-itanium-smp-di_1.00sarge1_ia64.udeb stable/main/binary-ia64/firmware-modules-2.4.27-3-itanium-smp-di_1.00sarge1_ia64.udeb stable/main/binary-ia64/scsi-modules-2.4.27-3-itanium-smp-di_1.00sarge1_ia64.udeb stable/main/binary-ia64/md-modules-2.4.27-3-itanium-smp-di_1.00sarge1_ia64.udeb stable/main/binary-ia64/ext3-modules-2.4.27-3-itanium-smp-di_1.00sarge1_ia64.udeb stable/main/binary-ia64/firewire-core-modules-2.4.27-3-itanium-smp-di_1.00sarge1_ia64.udeb stable/main/binary-ia64/kernel-image-2.4.27-3-itanium-smp-di_1.00sarge1_ia64.udeb stable/main/binary-ia64/usb-modules-2.4.27-3-itanium-smp-di_1.00sarge1_ia64.udeb stable/main/binary-ia64/ipv6-modules-2.4.27-3-itanium-smp-di_1.00sarge1_ia64.udeb stable/main/binary-ia64/reiserfs-modules-2.4.27-3-itanium-smp-di_1.00sarge1_ia64.udeb linux-kernel-di-ia64 (1.00sarge1) stable-proposed-updates; urgency=high * Rebuild against kernel-image-2.4.27-3-itanium-smp (2.4.27-10sarge3) stable/main/binary-i386/nic-pcmcia-modules-2.6.8-3-386-di_1.02sarge4_i386.udeb stable/main/binary-i386/ipv6-modules-2.6.8-3-386-di_1.02sarge4_i386.udeb stable/main/binary-i386/jfs-modules-2.6.8-3-386-di_1.02sarge4_i386.udeb stable/main/binary-i386/scsi-extra-modules-2.6.8-3-386-di_1.02sarge4_i386.udeb stable/main/binary-i386/ide-modules-2.6.8-3-386-di_1.02sarge4_i386.udeb stable/main/binary-i386/ide-core-modules-2.6.8-3-386-di_1.02sarge4_i386.udeb stable/main/source/linux-kernel-di-i386-2.6_1.02sarge4.dsc stable/main/binary-i386/input-modules-2.6.8-3-386-di_1.02sarge4_i386.udeb stable/main/binary-i386/nic-extra-modules-2.6.8-3-386-di_1.02sarge4_i386.udeb stable/main/binary-i386/sata-modules-2.6.8-3-386-di_1.02sarge4_i386.udeb stable/main/binary-i386/scsi-modules-2.6.8-3-386-di_1.02sarge4_i386.udeb stable/main/binary-i386/ntfs-modules-2.6.8-3-386-di_1.02sarge4_i386.udeb stable/main/binary-i386/ext3-modules-2.6.8-3-386-di_1.02sarge4_i386.udeb stable/main/binary-i386/reiserfs-modules-2.6.8-3-386-di_1.02sarge4_i386.udeb stable/main/binary-i386/xfs-modules-2.6.8-3-386-di_1.02sarge4_i386.udeb stable/main/binary-i386/scsi-core-modules-2.6.8-3-386-di_1.02sarge4_i386.udeb stable/main/binary-i386/md-modules-2.6.8-3-386-di_1.02sarge4_i386.udeb stable/main/binary-i386/socket-modules-2.6.8-3-386-di_1.02sarge4_i386.udeb stable/main/binary-i386/scsi-common-modules-2.6.8-3-386-di_1.02sarge4_i386.udeb stable/main/binary-i386/irda-modules-2.6.8-3-386-di_1.02sarge4_i386.udeb stable/main/binary-i386/serial-modules-2.6.8-3-386-di_1.02sarge4_i386.udeb stable/main/binary-i386/pcmcia-modules-2.6.8-3-386-di_1.02sarge4_i386.udeb stable/main/binary-i386/fat-modules-2.6.8-3-386-di_1.02sarge4_i386.udeb stable/main/binary-i386/cdrom-core-modules-2.6.8-3-386-di_1.02sarge4_i386.udeb stable/main/binary-i386/fb-modules-2.6.8-3-386-di_1.02sarge4_i386.udeb stable/main/binary-i386/kernel-image-2.6.8-3-386-di_1.02sarge4_i386.udeb stable/main/binary-i386/usb-modules-2.6.8-3-386-di_1.02sarge4_i386.udeb stable/main/source/linux-kernel-di-i386-2.6_1.02sarge4.tar.gz stable/main/binary-i386/loop-modules-2.6.8-3-386-di_1.02sarge4_i386.udeb stable/main/binary-i386/pcmcia-storage-modules-2.6.8-3-386-di_1.02sarge4_i386.udeb stable/main/binary-i386/usb-storage-modules-2.6.8-3-386-di_1.02sarge4_i386.udeb stable/main/binary-i386/acpi-modules-2.6.8-3-386-di_1.02sarge4_i386.udeb stable/main/binary-i386/nic-shared-modules-2.6.8-3-386-di_1.02sarge4_i386.udeb stable/main/binary-i386/plip-modules-2.6.8-3-386-di_1.02sarge4_i386.udeb stable/main/binary-i386/ufs-modules-2.6.8-3-386-di_1.02sarge4_i386.udeb stable/main/binary-i386/floppy-modules-2.6.8-3-386-di_1.02sarge4_i386.udeb stable/main/binary-i386/parport-modules-2.6.8-3-386-di_1.02sarge4_i386.udeb stable/main/binary-i386/firewire-core-modules-2.6.8-3-386-di_1.02sarge4_i386.udeb stable/main/binary-i386/cdrom-modules-2.6.8-3-386-di_1.02sarge4_i386.udeb stable/main/binary-i386/firmware-modules-2.6.8-3-386-di_1.02sarge4_i386.udeb stable/main/binary-i386/nic-usb-modules-2.6.8-3-386-di_1.02sarge4_i386.udeb stable/main/binary-i386/nic-modules-2.6.8-3-386-di_1.02sarge4_i386.udeb stable/main/binary-i386/ppp-modules-2.6.8-3-386-di_1.02sarge4_i386.udeb linux-kernel-di-i386-2.6 (1.02sarge4) stable; urgency=low * Rebuild against kernel-image-2.6.8-i386 (2.6.8-16sarge4). stable/main/binary-i386/ufs-modules-2.4.27-3-386-di_1.04sarge2_i386.udeb stable/main/binary-i386/kernel-image-2.4.27-3-386-di_1.04sarge2_i386.udeb stable/main/binary-i386/brltty-modules-2.4.27-speakup-di_1.04sarge2_i386.udeb stable/main/binary-i386/isa-pnp-modules-2.4.27-3-386-di_1.04sarge2_i386.udeb stable/main/binary-i386/usb-modules-2.4.27-3-386-di_1.04sarge2_i386.udeb stable/main/binary-i386/scsi-common-modules-2.4.27-speakup-di_1.04sarge2_i386.udeb stable/main/binary-i386/jfs-modules-2.4.27-speakup-di_1.04sarge2_i386.udeb stable/main/binary-i386/loop-modules-2.4.27-3-386-di_1.04sarge2_i386.udeb stable/main/binary-i386/brltty-modules-2.4.27-3-386-di_1.04sarge2_i386.udeb stable/main/binary-i386/nic-shared-modules-2.4.27-3-386-di_1.04sarge2_i386.udeb stable/main/binary-i386/sata-modules-2.4.27-3-386-di_1.04sarge2_i386.udeb stable/main/binary-i386/socket-modules-2.4.27-speakup-di_1.04sarge2_i386.udeb stable/main/binary-i386/scsi-core-modules-2.4.27-3-386-di_1.04sarge2_i386.udeb stable/main/binary-i386/parport-modules-2.4.27-3-386-di_1.04sarge2_i386.udeb stable/main/binary-i386/cdrom-core-modules-2.4.27-speakup-di_1.04sarge2_i386.udeb stable/main/binary-i386/ipv6-modules-2.4.27-speakup-di_1.04sarge2_i386.udeb stable/main/binary-i386/ide-core-modules-2.4.27-3-386-di_1.04sarge2_i386.udeb stable/main/binary-i386/scsi-extra-modules-2.4.27-speakup-di_1.04sarge2_i386.udeb stable/main/binary-i386/socket-modules-2.4.27-3-386-di_1.04sarge2_i386.udeb stable/main/binary-i386/usb-storage-modules-2.4.27-speakup-di_1.04sarge2_i386.udeb stable/main/binary-i386/scsi-modules-2.4.27-speakup-di_1.04sarge2_i386.udeb stable/main/binary-i386/nic-modules-2.4.27-speakup-di_1.04sarge2_i386.udeb stable/main/binary-i386/floppy-modules-2.4.27-3-386-di_1.04sarge2_i386.udeb stable/main/binary-i386/nic-pcmcia-modules-2.4.27-speakup-di_1.04sarge2_i386.udeb stable/main/binary-i386/scsi-common-modules-2.4.27-3-386-di_1.04sarge2_i386.udeb stable/main/binary-i386/xfs-modules-2.4.27-3-386-di_1.04sarge2_i386.udeb stable/main/binary-i386/nic-extra-modules-2.4.27-3-386-di_1.04sarge2_i386.udeb stable/main/binary-i386/pcmcia-modules-2.4.27-speakup-di_1.04sarge2_i386.udeb stable/main/binary-i386/ntfs-modules-2.4.27-3-386-di_1.04sarge2_i386.udeb stable/main/binary-i386/firmware-modules-2.4.27-speakup-di_1.04sarge2_i386.udeb stable/main/binary-i386/nic-shared-modules-2.4.27-speakup-di_1.04sarge2_i386.udeb stable/main/binary-i386/fat-modules-2.4.27-3-386-di_1.04sarge2_i386.udeb stable/main/binary-i386/fat-modules-2.4.27-speakup-di_1.04sarge2_i386.udeb stable/main/binary-i386/nic-modules-2.4.27-3-386-di_1.04sarge2_i386.udeb stable/main/binary-i386/input-modules-2.4.27-speakup-di_1.04sarge2_i386.udeb stable/main/binary-i386/nic-usb-modules-2.4.27-speakup-di_1.04sarge2_i386.udeb stable/main/binary-i386/nic-usb-modules-2.4.27-3-386-di_1.04sarge2_i386.udeb stable/main/binary-i386/nic-extra-modules-2.4.27-speakup-di_1.04sarge2_i386.udeb stable/main/binary-i386/pcmcia-storage-modules-2.4.27-3-386-di_1.04sarge2_i386.udeb stable/main/binary-i386/cdrom-core-modules-2.4.27-3-386-di_1.04sarge2_i386.udeb stable/main/binary-i386/isa-pnp-modules-2.4.27-speakup-di_1.04sarge2_i386.udeb stable/main/binary-i386/scsi-core-modules-2.4.27-speakup-di_1.04sarge2_i386.udeb stable/main/binary-i386/fb-modules-2.4.27-3-386-di_1.04sarge2_i386.udeb stable/main/binary-i386/reiserfs-modules-2.4.27-speakup-di_1.04sarge2_i386.udeb stable/main/binary-i386/firewire-core-modules-2.4.27-3-386-di_1.04sarge2_i386.udeb stable/main/binary-i386/floppy-modules-2.4.27-speakup-di_1.04sarge2_i386.udeb stable/main/binary-i386/usb-storage-modules-2.4.27-3-386-di_1.04sarge2_i386.udeb stable/main/binary-i386/serial-modules-2.4.27-speakup-di_1.04sarge2_i386.udeb stable/main/binary-i386/ppp-modules-2.4.27-speakup-di_1.04sarge2_i386.udeb stable/main/binary-i386/irda-modules-2.4.27-speakup-di_1.04sarge2_i386.udeb stable/main/binary-i386/md-modules-2.4.27-speakup-di_1.04sarge2_i386.udeb stable/main/binary-i386/ide-modules-2.4.27-speakup-di_1.04sarge2_i386.udeb stable/main/binary-i386/md-modules-2.4.27-3-386-di_1.04sarge2_i386.udeb stable/main/binary-i386/reiserfs-modules-2.4.27-3-386-di_1.04sarge2_i386.udeb stable/main/binary-i386/input-modules-2.4.27-3-386-di_1.04sarge2_i386.udeb stable/main/binary-i386/nic-pcmcia-modules-2.4.27-3-386-di_1.04sarge2_i386.udeb stable/main/binary-i386/usb-modules-2.4.27-speakup-di_1.04sarge2_i386.udeb stable/main/binary-i386/cdrom-modules-2.4.27-3-386-di_1.04sarge2_i386.udeb stable/main/binary-i386/scsi-modules-2.4.27-3-386-di_1.04sarge2_i386.udeb stable/main/source/linux-kernel-di-i386_1.04sarge2.dsc stable/main/binary-i386/ufs-modules-2.4.27-speakup-di_1.04sarge2_i386.udeb stable/main/binary-i386/scsi-extra-modules-2.4.27-3-386-di_1.04sarge2_i386.udeb stable/main/binary-i386/ipv6-modules-2.4.27-3-386-di_1.04sarge2_i386.udeb stable/main/binary-i386/ppp-modules-2.4.27-3-386-di_1.04sarge2_i386.udeb stable/main/binary-i386/pcmcia-storage-modules-2.4.27-speakup-di_1.04sarge2_i386.udeb stable/main/binary-i386/irda-modules-2.4.27-3-386-di_1.04sarge2_i386.udeb stable/main/binary-i386/serial-modules-2.4.27-3-386-di_1.04sarge2_i386.udeb stable/main/binary-i386/parport-modules-2.4.27-speakup-di_1.04sarge2_i386.udeb stable/main/binary-i386/pcmcia-modules-2.4.27-3-386-di_1.04sarge2_i386.udeb stable/main/binary-i386/fb-modules-2.4.27-speakup-di_1.04sarge2_i386.udeb stable/main/binary-i386/plip-modules-2.4.27-speakup-di_1.04sarge2_i386.udeb stable/main/binary-i386/ext3-modules-2.4.27-3-386-di_1.04sarge2_i386.udeb stable/main/binary-i386/cdrom-modules-2.4.27-speakup-di_1.04sarge2_i386.udeb stable/main/binary-i386/firewire-core-modules-2.4.27-speakup-di_1.04sarge2_i386.udeb stable/main/binary-i386/plip-modules-2.4.27-3-386-di_1.04sarge2_i386.udeb stable/main/binary-i386/jfs-modules-2.4.27-3-386-di_1.04sarge2_i386.udeb stable/main/binary-i386/ide-modules-2.4.27-3-386-di_1.04sarge2_i386.udeb stable/main/binary-i386/ext3-modules-2.4.27-speakup-di_1.04sarge2_i386.udeb stable/main/binary-i386/loop-modules-2.4.27-speakup-di_1.04sarge2_i386.udeb stable/main/source/linux-kernel-di-i386_1.04sarge2.tar.gz stable/main/binary-i386/kernel-image-2.4.27-speakup-di_1.04sarge2_i386.udeb stable/main/binary-i386/ide-core-modules-2.4.27-speakup-di_1.04sarge2_i386.udeb stable/main/binary-i386/firmware-modules-2.4.27-3-386-di_1.04sarge2_i386.udeb linux-kernel-di-i386 (1.04sarge2) stable-proposed-updates; urgency=high * Rebuilt against kernel-image-2.4.27-3-386 (2.4.27-10sarge3). * Rebuilt against kernel-image-2.4.27-speakup (2.4.27-1.1sarge2). stable/main/binary-hppa/ipv6-modules-2.6.8-3-32-di_1.1sarge2_hppa.udeb stable/main/binary-hppa/input-modules-2.6.8-3-32-di_1.1sarge2_hppa.udeb stable/main/binary-hppa/nic-modules-2.6.8-3-32-di_1.1sarge2_hppa.udeb stable/main/binary-hppa/socket-modules-2.6.8-3-64-di_1.1sarge2_hppa.udeb stable/main/binary-hppa/md-modules-2.6.8-3-64-di_1.1sarge2_hppa.udeb stable/main/binary-hppa/sata-modules-2.6.8-3-64-di_1.1sarge2_hppa.udeb stable/main/binary-hppa/firewire-core-modules-2.6.8-3-64-di_1.1sarge2_hppa.udeb stable/main/source/linux-kernel-di-hppa-2.6_1.1sarge2.dsc stable/main/binary-hppa/scsi-modules-2.6.8-3-32-di_1.1sarge2_hppa.udeb stable/main/binary-hppa/kernel-image-2.6.8-3-64-di_1.1sarge2_hppa.udeb stable/main/binary-hppa/loop-modules-2.6.8-3-64-di_1.1sarge2_hppa.udeb stable/main/binary-hppa/ide-modules-2.6.8-3-32-di_1.1sarge2_hppa.udeb stable/main/binary-hppa/firewire-core-modules-2.6.8-3-32-di_1.1sarge2_hppa.udeb stable/main/binary-hppa/cdrom-modules-2.6.8-3-64-di_1.1sarge2_hppa.udeb stable/main/source/linux-kernel-di-hppa-2.6_1.1sarge2.tar.gz stable/main/binary-hppa/usb-storage-modules-2.6.8-3-64-di_1.1sarge2_hppa.udeb stable/main/binary-hppa/scsi-modules-2.6.8-3-64-di_1.1sarge2_hppa.udeb stable/main/binary-hppa/input-modules-2.6.8-3-64-di_1.1sarge2_hppa.udeb stable/main/binary-hppa/cdrom-modules-2.6.8-3-32-di_1.1sarge2_hppa.udeb stable/main/binary-hppa/kernel-image-2.6.8-3-32-di_1.1sarge2_hppa.udeb stable/main/binary-hppa/xfs-modules-2.6.8-3-64-di_1.1sarge2_hppa.udeb stable/main/binary-hppa/loop-modules-2.6.8-3-32-di_1.1sarge2_hppa.udeb stable/main/binary-hppa/ext3-modules-2.6.8-3-64-di_1.1sarge2_hppa.udeb stable/main/binary-hppa/ide-modules-2.6.8-3-64-di_1.1sarge2_hppa.udeb stable/main/binary-hppa/cdrom-core-modules-2.6.8-3-32-di_1.1sarge2_hppa.udeb stable/main/binary-hppa/sata-modules-2.6.8-3-32-di_1.1sarge2_hppa.udeb stable/main/binary-hppa/usb-modules-2.6.8-3-32-di_1.1sarge2_hppa.udeb stable/main/binary-hppa/ppp-modules-2.6.8-3-32-di_1.1sarge2_hppa.udeb stable/main/binary-hppa/usb-storage-modules-2.6.8-3-32-di_1.1sarge2_hppa.udeb stable/main/binary-hppa/ipv6-modules-2.6.8-3-64-di_1.1sarge2_hppa.udeb stable/main/binary-hppa/usb-modules-2.6.8-3-64-di_1.1sarge2_hppa.udeb stable/main/binary-hppa/ext3-modules-2.6.8-3-32-di_1.1sarge2_hppa.udeb stable/main/binary-hppa/socket-modules-2.6.8-3-32-di_1.1sarge2_hppa.udeb stable/main/binary-hppa/xfs-modules-2.6.8-3-32-di_1.1sarge2_hppa.udeb stable/main/binary-hppa/cdrom-core-modules-2.6.8-3-64-di_1.1sarge2_hppa.udeb stable/main/binary-hppa/md-modules-2.6.8-3-32-di_1.1sarge2_hppa.udeb stable/main/binary-hppa/ppp-modules-2.6.8-3-64-di_1.1sarge2_hppa.udeb stable/main/binary-hppa/nic-modules-2.6.8-3-64-di_1.1sarge2_hppa.udeb linux-kernel-di-hppa-2.6 (1.1sarge2) stable; urgency=low * Rebuild against kernel-image-2.6.8-hppa (2.6.8-6sarge4) stable/main/binary-arm/fat-modules-2.4.27-netwinder-di_1.0sarge1_arm.udeb stable/main/binary-arm/loop-modules-2.4.27-netwinder-di_1.0sarge1_arm.udeb stable/main/binary-arm/scsi-common-modules-2.4.27-netwinder-di_1.0sarge1_arm.udeb stable/main/source/linux-kernel-di-arm_1.0sarge1.tar.gz stable/main/binary-arm/kernel-image-2.4.27-riscpc-di_1.0sarge1_arm.udeb stable/main/binary-arm/socket-modules-2.4.27-riscstation-di_1.0sarge1_arm.udeb stable/main/binary-arm/loop-modules-2.4.27-bast-di_1.0sarge1_arm.udeb stable/main/binary-arm/nic-modules-2.4.27-netwinder-di_1.0sarge1_arm.udeb stable/main/binary-arm/kernel-image-2.4.27-netwinder-di_1.0sarge1_arm.udeb stable/main/binary-arm/cdrom-core-modules-2.4.27-bast-di_1.0sarge1_arm.udeb stable/main/binary-arm/usb-modules-2.4.27-netwinder-di_1.0sarge1_arm.udeb stable/main/binary-arm/kernel-image-2.4.27-riscstation-di_1.0sarge1_arm.udeb stable/main/binary-arm/scsi-core-modules-2.4.27-netwinder-di_1.0sarge1_arm.udeb stable/main/binary-arm/scsi-modules-2.4.27-netwinder-di_1.0sarge1_arm.udeb stable/main/binary-arm/socket-modules-2.4.27-riscpc-di_1.0sarge1_arm.udeb stable/main/binary-arm/isa-pnp-modules-2.4.27-netwinder-di_1.0sarge1_arm.udeb stable/main/binary-arm/nic-shared-modules-2.4.27-netwinder-di_1.0sarge1_arm.udeb stable/main/binary-arm/kernel-image-2.4.27-bast-di_1.0sarge1_arm.udeb stable/main/binary-arm/socket-modules-2.4.27-netwinder-di_1.0sarge1_arm.udeb stable/main/binary-arm/socket-modules-2.4.27-bast-di_1.0sarge1_arm.udeb stable/main/source/linux-kernel-di-arm_1.0sarge1.dsc stable/main/binary-arm/kernel-image-2.4.27-lart-di_1.0sarge1_arm.udeb stable/main/binary-arm/nic-extra-modules-2.4.27-netwinder-di_1.0sarge1_arm.udeb stable/main/binary-arm/scsi-extra-modules-2.4.27-netwinder-di_1.0sarge1_arm.udeb stable/main/binary-arm/loop-modules-2.4.27-riscpc-di_1.0sarge1_arm.udeb stable/main/binary-arm/fat-modules-2.4.27-riscpc-di_1.0sarge1_arm.udeb stable/main/binary-arm/cdrom-core-modules-2.4.27-netwinder-di_1.0sarge1_arm.udeb stable/main/binary-arm/socket-modules-2.4.27-lart-di_1.0sarge1_arm.udeb stable/main/binary-arm/fat-modules-2.4.27-riscstation-di_1.0sarge1_arm.udeb stable/main/binary-arm/md-modules-2.4.27-netwinder-di_1.0sarge1_arm.udeb linux-kernel-di-arm (1.0sarge1) stable-proposed-updates; urgency=high * Rebuild against kernel-image-2.4.27-* (2.4.27-2sarge3) to incorporate the new ABI. stable/main/binary-alpha/jfs-modules-2.4.27-3-generic-di_0.65sarge1_alpha.udeb stable/main/source/linux-kernel-di-alpha_0.65sarge1.tar.gz stable/main/binary-alpha/ppp-modules-2.4.27-3-generic-di_0.65sarge1_alpha.udeb stable/main/binary-alpha/usb-modules-2.4.27-3-generic-di_0.65sarge1_alpha.udeb stable/main/binary-alpha/fat-modules-2.4.27-3-generic-di_0.65sarge1_alpha.udeb stable/main/binary-alpha/serial-modules-2.4.27-3-generic-di_0.65sarge1_alpha.udeb stable/main/binary-alpha/scsi-common-modules-2.4.27-3-generic-di_0.65sarge1_alpha.udeb stable/main/binary-alpha/usb-storage-modules-2.4.27-3-generic-di_0.65sarge1_alpha.udeb stable/main/binary-alpha/ide-modules-2.4.27-3-generic-di_0.65sarge1_alpha.udeb stable/main/binary-alpha/cdrom-core-modules-2.4.27-3-generic-di_0.65sarge1_alpha.udeb stable/main/binary-alpha/kernel-image-2.4.27-3-generic-di_0.65sarge1_alpha.udeb stable/main/binary-alpha/ide-core-modules-2.4.27-3-generic-di_0.65sarge1_alpha.udeb stable/main/binary-alpha/socket-modules-2.4.27-3-generic-di_0.65sarge1_alpha.udeb stable/main/binary-alpha/md-modules-2.4.27-3-generic-di_0.65sarge1_alpha.udeb stable/main/binary-alpha/nic-extra-modules-2.4.27-3-generic-di_0.65sarge1_alpha.udeb stable/main/binary-alpha/cdrom-modules-2.4.27-3-generic-di_0.65sarge1_alpha.udeb stable/main/binary-alpha/fb-modules-2.4.27-3-generic-di_0.65sarge1_alpha.udeb stable/main/binary-alpha/srm-modules-2.4.27-3-generic-di_0.65sarge1_alpha.udeb stable/main/binary-alpha/reiserfs-modules-2.4.27-3-generic-di_0.65sarge1_alpha.udeb stable/main/binary-alpha/scsi-modules-2.4.27-3-generic-di_0.65sarge1_alpha.udeb stable/main/binary-alpha/nic-modules-2.4.27-3-generic-di_0.65sarge1_alpha.udeb stable/main/binary-alpha/parport-modules-2.4.27-3-generic-di_0.65sarge1_alpha.udeb stable/main/binary-alpha/scsi-extra-modules-2.4.27-3-generic-di_0.65sarge1_alpha.udeb stable/main/binary-alpha/xfs-modules-2.4.27-3-generic-di_0.65sarge1_alpha.udeb stable/main/binary-alpha/brltty-modules-2.4.27-3-generic-di_0.65sarge1_alpha.udeb stable/main/binary-alpha/nic-shared-modules-2.4.27-3-generic-di_0.65sarge1_alpha.udeb stable/main/binary-alpha/ipv6-modules-2.4.27-3-generic-di_0.65sarge1_alpha.udeb stable/main/binary-alpha/scsi-core-modules-2.4.27-3-generic-di_0.65sarge1_alpha.udeb stable/main/source/linux-kernel-di-alpha_0.65sarge1.dsc stable/main/binary-alpha/plip-modules-2.4.27-3-generic-di_0.65sarge1_alpha.udeb stable/main/binary-alpha/ext3-modules-2.4.27-3-generic-di_0.65sarge1_alpha.udeb stable/main/binary-alpha/isa-pnp-modules-2.4.27-3-generic-di_0.65sarge1_alpha.udeb linux-kernel-di-alpha (0.65sarge1) stable-proposed-updates; urgency=high * Rebuild against kernel-image-2.4.27-3-generic (2.4.27-10sarge3) to incorporate the new ABI. stable/main/binary-sparc/libtunepimp-perl_0.3.0-3sarge2_sparc.deb stable/main/binary-sparc/python2.3-tunepimp_0.3.0-3sarge2_sparc.deb stable/main/binary-sparc/python2.2-tunepimp_0.3.0-3sarge2_sparc.deb stable/main/binary-sparc/libtunepimp-bin_0.3.0-3sarge2_sparc.deb stable/main/binary-sparc/python-tunepimp_0.3.0-3sarge2_sparc.deb stable/main/binary-sparc/libtunepimp2-dev_0.3.0-3sarge2_sparc.deb stable/main/binary-sparc/libtunepimp2_0.3.0-3sarge2_sparc.deb libtunepimp (0.3.0-3sarge2) stable-security; urgency=high * Non-maintainer upload by the Security Team * Applied missing bit of the patch by Kevin Kofler to fix buffer overflows [lib/lookuptools.cpp, CVE-2006-3600] * Applied patch by Robert Jordens stable/main/binary-s390/python2.3-tunepimp_0.3.0-3sarge2_s390.deb stable/main/binary-s390/libtunepimp2-dev_0.3.0-3sarge2_s390.deb stable/main/binary-s390/libtunepimp-bin_0.3.0-3sarge2_s390.deb stable/main/binary-s390/python-tunepimp_0.3.0-3sarge2_s390.deb stable/main/binary-s390/libtunepimp2_0.3.0-3sarge2_s390.deb stable/main/binary-s390/python2.2-tunepimp_0.3.0-3sarge2_s390.deb stable/main/binary-s390/libtunepimp-perl_0.3.0-3sarge2_s390.deb libtunepimp (0.3.0-3sarge2) stable-security; urgency=high * Non-maintainer upload by the Security Team * Applied missing bit of the patch by Kevin Kofler to fix buffer overflows [lib/lookuptools.cpp, CVE-2006-3600] * Applied patch by Robert Jordens stable/main/binary-mipsel/libtunepimp-bin_0.3.0-3sarge2_mipsel.deb stable/main/binary-mipsel/python-tunepimp_0.3.0-3sarge2_mipsel.deb stable/main/binary-mipsel/libtunepimp2-dev_0.3.0-3sarge2_mipsel.deb stable/main/binary-mipsel/libtunepimp-perl_0.3.0-3sarge2_mipsel.deb stable/main/binary-mipsel/libtunepimp2_0.3.0-3sarge2_mipsel.deb stable/main/binary-mipsel/python2.2-tunepimp_0.3.0-3sarge2_mipsel.deb stable/main/binary-mipsel/python2.3-tunepimp_0.3.0-3sarge2_mipsel.deb libtunepimp (0.3.0-3sarge2) stable-security; urgency=high * Non-maintainer upload by the Security Team * Applied missing bit of the patch by Kevin Kofler to fix buffer overflows [lib/lookuptools.cpp, CVE-2006-3600] * Applied patch by Robert Jordens stable/main/binary-mips/libtunepimp-bin_0.3.0-3sarge2_mips.deb stable/main/binary-mips/libtunepimp-perl_0.3.0-3sarge2_mips.deb stable/main/binary-mips/libtunepimp2-dev_0.3.0-3sarge2_mips.deb stable/main/binary-mips/python-tunepimp_0.3.0-3sarge2_mips.deb stable/main/binary-mips/python2.2-tunepimp_0.3.0-3sarge2_mips.deb stable/main/binary-mips/libtunepimp2_0.3.0-3sarge2_mips.deb stable/main/binary-mips/python2.3-tunepimp_0.3.0-3sarge2_mips.deb libtunepimp (0.3.0-3sarge2) stable-security; urgency=high * Non-maintainer upload by the Security Team * Applied missing bit of the patch by Kevin Kofler to fix buffer overflows [lib/lookuptools.cpp, CVE-2006-3600] * Applied patch by Robert Jordens stable/main/binary-m68k/libtunepimp2_0.3.0-3sarge2_m68k.deb stable/main/binary-m68k/libtunepimp-bin_0.3.0-3sarge2_m68k.deb stable/main/binary-m68k/python2.2-tunepimp_0.3.0-3sarge2_m68k.deb stable/main/binary-m68k/python-tunepimp_0.3.0-3sarge2_m68k.deb stable/main/binary-m68k/libtunepimp2-dev_0.3.0-3sarge2_m68k.deb stable/main/binary-m68k/python2.3-tunepimp_0.3.0-3sarge2_m68k.deb stable/main/binary-m68k/libtunepimp-perl_0.3.0-3sarge2_m68k.deb libtunepimp (0.3.0-3sarge2) stable-security; urgency=high * Non-maintainer upload by the Security Team * Applied missing bit of the patch by Kevin Kofler to fix buffer overflows [lib/lookuptools.cpp, CVE-2006-3600] * Applied patch by Robert Jordens stable/main/binary-ia64/python2.2-tunepimp_0.3.0-3sarge2_ia64.deb stable/main/binary-ia64/python2.3-tunepimp_0.3.0-3sarge2_ia64.deb stable/main/binary-ia64/libtunepimp2_0.3.0-3sarge2_ia64.deb stable/main/binary-ia64/libtunepimp-bin_0.3.0-3sarge2_ia64.deb stable/main/binary-ia64/python-tunepimp_0.3.0-3sarge2_ia64.deb stable/main/binary-ia64/libtunepimp-perl_0.3.0-3sarge2_ia64.deb stable/main/binary-ia64/libtunepimp2-dev_0.3.0-3sarge2_ia64.deb libtunepimp (0.3.0-3sarge2) stable-security; urgency=high * Non-maintainer upload by the Security Team * Applied missing bit of the patch by Kevin Kofler to fix buffer overflows [lib/lookuptools.cpp, CVE-2006-3600] * Applied patch by Robert Jordens stable/main/binary-i386/libtunepimp2-dev_0.3.0-3sarge2_i386.deb stable/main/binary-i386/libtunepimp-perl_0.3.0-3sarge2_i386.deb stable/main/binary-i386/python-tunepimp_0.3.0-3sarge2_i386.deb stable/main/binary-i386/python2.3-tunepimp_0.3.0-3sarge2_i386.deb stable/main/binary-i386/libtunepimp2_0.3.0-3sarge2_i386.deb stable/main/binary-i386/libtunepimp-bin_0.3.0-3sarge2_i386.deb stable/main/binary-i386/python2.2-tunepimp_0.3.0-3sarge2_i386.deb libtunepimp (0.3.0-3sarge2) stable-security; urgency=high * Non-maintainer upload by the Security Team * Applied missing bit of the patch by Kevin Kofler to fix buffer overflows [lib/lookuptools.cpp, CVE-2006-3600] * Applied patch by Robert Jordens stable/main/binary-hppa/python2.3-tunepimp_0.3.0-3sarge2_hppa.deb stable/main/binary-hppa/libtunepimp2-dev_0.3.0-3sarge2_hppa.deb stable/main/binary-hppa/libtunepimp-perl_0.3.0-3sarge2_hppa.deb stable/main/binary-hppa/python2.2-tunepimp_0.3.0-3sarge2_hppa.deb stable/main/binary-hppa/libtunepimp-bin_0.3.0-3sarge2_hppa.deb stable/main/binary-hppa/libtunepimp2_0.3.0-3sarge2_hppa.deb stable/main/binary-hppa/python-tunepimp_0.3.0-3sarge2_hppa.deb libtunepimp (0.3.0-3sarge2) stable-security; urgency=high * Non-maintainer upload by the Security Team * Applied missing bit of the patch by Kevin Kofler to fix buffer overflows [lib/lookuptools.cpp, CVE-2006-3600] * Applied patch by Robert Jordens stable/main/binary-arm/python-tunepimp_0.3.0-3sarge2_arm.deb stable/main/binary-arm/libtunepimp2_0.3.0-3sarge2_arm.deb stable/main/binary-arm/python2.2-tunepimp_0.3.0-3sarge2_arm.deb stable/main/binary-arm/python2.3-tunepimp_0.3.0-3sarge2_arm.deb stable/main/binary-arm/libtunepimp2-dev_0.3.0-3sarge2_arm.deb stable/main/binary-arm/libtunepimp-bin_0.3.0-3sarge2_arm.deb stable/main/binary-arm/libtunepimp-perl_0.3.0-3sarge2_arm.deb libtunepimp (0.3.0-3sarge2) stable-security; urgency=high * Non-maintainer upload by the Security Team * Applied missing bit of the patch by Kevin Kofler to fix buffer overflows [lib/lookuptools.cpp, CVE-2006-3600] * Applied patch by Robert Jordens stable/main/binary-alpha/python2.3-tunepimp_0.3.0-3sarge2_alpha.deb stable/main/binary-alpha/libtunepimp2-dev_0.3.0-3sarge2_alpha.deb stable/main/binary-alpha/python-tunepimp_0.3.0-3sarge2_alpha.deb stable/main/binary-alpha/libtunepimp-bin_0.3.0-3sarge2_alpha.deb stable/main/binary-alpha/python2.2-tunepimp_0.3.0-3sarge2_alpha.deb stable/main/binary-alpha/libtunepimp-perl_0.3.0-3sarge2_alpha.deb stable/main/binary-alpha/libtunepimp2_0.3.0-3sarge2_alpha.deb libtunepimp (0.3.0-3sarge2) stable-security; urgency=high * Non-maintainer upload by the Security Team * Applied missing bit of the patch by Kevin Kofler to fix buffer overflows [lib/lookuptools.cpp, CVE-2006-3600] * Applied patch by Robert Jordens stable/main/binary-powerpc/libtunepimp-perl_0.3.0-3sarge2_powerpc.deb stable/main/binary-powerpc/python2.3-tunepimp_0.3.0-3sarge2_powerpc.deb stable/main/binary-powerpc/libtunepimp-bin_0.3.0-3sarge2_powerpc.deb stable/main/binary-powerpc/python2.2-tunepimp_0.3.0-3sarge2_powerpc.deb stable/main/binary-powerpc/python-tunepimp_0.3.0-3sarge2_powerpc.deb stable/main/binary-powerpc/libtunepimp2_0.3.0-3sarge2_powerpc.deb stable/main/source/libtunepimp_0.3.0-3sarge2.dsc stable/main/binary-powerpc/libtunepimp2-dev_0.3.0-3sarge2_powerpc.deb stable/main/source/libtunepimp_0.3.0-3sarge2.diff.gz libtunepimp (0.3.0-3sarge2) stable-security; urgency=high * Non-maintainer upload by the Security Team * Applied missing bit of the patch by Kevin Kofler to fix buffer overflows [lib/lookuptools.cpp, CVE-2006-3600] * Applied patch by Robert Jordens stable/main/binary-all/libnet-server-perl_0.87-3sarge1_all.deb stable/main/source/libnet-server-perl_0.87-3sarge1.dsc stable/main/source/libnet-server-perl_0.87-3sarge1.diff.gz libnet-server-perl (0.87-3sarge1) stable-security; urgency=high * fixed syslog formatstring vulnerability in function log() (CVE-2005-1127) stable/main/binary-sparc/libgd-tools_2.0.33-1.1sarge1_sparc.deb stable/main/binary-sparc/libgd2-noxpm-dev_2.0.33-1.1sarge1_sparc.deb stable/main/binary-sparc/libgd2-xpm-dev_2.0.33-1.1sarge1_sparc.deb stable/main/binary-sparc/libgd2-noxpm_2.0.33-1.1sarge1_sparc.deb stable/main/binary-sparc/libgd2-xpm_2.0.33-1.1sarge1_sparc.deb libgd2 (2.0.33-1.1sarge1) stable-security; urgency=high * Apply patch to fix infinite loop in GIF code. Closes: bug#372912 (thanks to Alec Berryman <alec@thened.net> for reporting, and to Martin Pitt <martin.pitt@ubuntu.com> for providing a patch). Reported as CVE-2006-2906. * Include this and the earlier security fix as isolated patches in the source: + 1001_CAN-2004-0941.patch + 1002_CVE-2006-2906.patch stable/main/binary-s390/libgd2-xpm-dev_2.0.33-1.1sarge1_s390.deb stable/main/binary-s390/libgd-tools_2.0.33-1.1sarge1_s390.deb stable/main/binary-s390/libgd2-noxpm_2.0.33-1.1sarge1_s390.deb stable/main/binary-s390/libgd2-xpm_2.0.33-1.1sarge1_s390.deb stable/main/binary-s390/libgd2-noxpm-dev_2.0.33-1.1sarge1_s390.deb libgd2 (2.0.33-1.1sarge1) stable-security; urgency=high * Apply patch to fix infinite loop in GIF code. Closes: bug#372912 (thanks to Alec Berryman <alec@thened.net> for reporting, and to Martin Pitt <martin.pitt@ubuntu.com> for providing a patch). Reported as CVE-2006-2906. * Include this and the earlier security fix as isolated patches in the source: + 1001_CAN-2004-0941.patch + 1002_CVE-2006-2906.patch stable/main/binary-mipsel/libgd-tools_2.0.33-1.1sarge1_mipsel.deb stable/main/binary-mipsel/libgd2-xpm-dev_2.0.33-1.1sarge1_mipsel.deb stable/main/binary-mipsel/libgd2-noxpm-dev_2.0.33-1.1sarge1_mipsel.deb stable/main/binary-mipsel/libgd2-noxpm_2.0.33-1.1sarge1_mipsel.deb stable/main/binary-mipsel/libgd2-xpm_2.0.33-1.1sarge1_mipsel.deb libgd2 (2.0.33-1.1sarge1) stable-security; urgency=high * Apply patch to fix infinite loop in GIF code. Closes: bug#372912 (thanks to Alec Berryman <alec@thened.net> for reporting, and to Martin Pitt <martin.pitt@ubuntu.com> for providing a patch). Reported as CVE-2006-2906. * Include this and the earlier security fix as isolated patches in the source: + 1001_CAN-2004-0941.patch + 1002_CVE-2006-2906.patch stable/main/binary-mips/libgd2-noxpm-dev_2.0.33-1.1sarge1_mips.deb stable/main/binary-mips/libgd2-noxpm_2.0.33-1.1sarge1_mips.deb stable/main/binary-mips/libgd2-xpm-dev_2.0.33-1.1sarge1_mips.deb stable/main/binary-mips/libgd-tools_2.0.33-1.1sarge1_mips.deb stable/main/binary-mips/libgd2-xpm_2.0.33-1.1sarge1_mips.deb libgd2 (2.0.33-1.1sarge1) stable-security; urgency=high * Apply patch to fix infinite loop in GIF code. Closes: bug#372912 (thanks to Alec Berryman <alec@thened.net> for reporting, and to Martin Pitt <martin.pitt@ubuntu.com> for providing a patch). Reported as CVE-2006-2906. * Include this and the earlier security fix as isolated patches in the source: + 1001_CAN-2004-0941.patch + 1002_CVE-2006-2906.patch stable/main/binary-m68k/libgd2-noxpm_2.0.33-1.1sarge1_m68k.deb stable/main/binary-m68k/libgd2-noxpm-dev_2.0.33-1.1sarge1_m68k.deb stable/main/binary-m68k/libgd2-xpm_2.0.33-1.1sarge1_m68k.deb stable/main/binary-m68k/libgd-tools_2.0.33-1.1sarge1_m68k.deb stable/main/binary-m68k/libgd2-xpm-dev_2.0.33-1.1sarge1_m68k.deb libgd2 (2.0.33-1.1sarge1) stable-security; urgency=high * Apply patch to fix infinite loop in GIF code. Closes: bug#372912 (thanks to Alec Berryman <alec@thened.net> for reporting, and to Martin Pitt <martin.pitt@ubuntu.com> for providing a patch). Reported as CVE-2006-2906. * Include this and the earlier security fix as isolated patches in the source: + 1001_CAN-2004-0941.patch + 1002_CVE-2006-2906.patch stable/main/binary-ia64/libgd2-noxpm-dev_2.0.33-1.1sarge1_ia64.deb stable/main/binary-ia64/libgd-tools_2.0.33-1.1sarge1_ia64.deb stable/main/binary-ia64/libgd2-xpm-dev_2.0.33-1.1sarge1_ia64.deb stable/main/binary-ia64/libgd2-noxpm_2.0.33-1.1sarge1_ia64.deb stable/main/binary-ia64/libgd2-xpm_2.0.33-1.1sarge1_ia64.deb libgd2 (2.0.33-1.1sarge1) stable-security; urgency=high * Apply patch to fix infinite loop in GIF code. Closes: bug#372912 (thanks to Alec Berryman <alec@thened.net> for reporting, and to Martin Pitt <martin.pitt@ubuntu.com> for providing a patch). Reported as CVE-2006-2906. * Include this and the earlier security fix as isolated patches in the source: + 1001_CAN-2004-0941.patch + 1002_CVE-2006-2906.patch stable/main/binary-i386/libgd2-xpm_2.0.33-1.1sarge1_i386.deb stable/main/binary-i386/libgd-tools_2.0.33-1.1sarge1_i386.deb stable/main/binary-i386/libgd2-xpm-dev_2.0.33-1.1sarge1_i386.deb stable/main/binary-i386/libgd2-noxpm_2.0.33-1.1sarge1_i386.deb stable/main/binary-i386/libgd2-noxpm-dev_2.0.33-1.1sarge1_i386.deb libgd2 (2.0.33-1.1sarge1) stable-security; urgency=high * Apply patch to fix infinite loop in GIF code. Closes: bug#372912 (thanks to Alec Berryman <alec@thened.net> for reporting, and to Martin Pitt <martin.pitt@ubuntu.com> for providing a patch). Reported as CVE-2006-2906. * Include this and the earlier security fix as isolated patches in the source: + 1001_CAN-2004-0941.patch + 1002_CVE-2006-2906.patch stable/main/binary-hppa/libgd2-noxpm-dev_2.0.33-1.1sarge1_hppa.deb stable/main/binary-hppa/libgd2-xpm_2.0.33-1.1sarge1_hppa.deb stable/main/binary-hppa/libgd2-xpm-dev_2.0.33-1.1sarge1_hppa.deb stable/main/binary-hppa/libgd-tools_2.0.33-1.1sarge1_hppa.deb stable/main/binary-hppa/libgd2-noxpm_2.0.33-1.1sarge1_hppa.deb libgd2 (2.0.33-1.1sarge1) stable-security; urgency=high * Apply patch to fix infinite loop in GIF code. Closes: bug#372912 (thanks to Alec Berryman <alec@thened.net> for reporting, and to Martin Pitt <martin.pitt@ubuntu.com> for providing a patch). Reported as CVE-2006-2906. * Include this and the earlier security fix as isolated patches in the source: + 1001_CAN-2004-0941.patch + 1002_CVE-2006-2906.patch stable/main/binary-arm/libgd-tools_2.0.33-1.1sarge1_arm.deb stable/main/binary-arm/libgd2-xpm-dev_2.0.33-1.1sarge1_arm.deb stable/main/binary-arm/libgd2-noxpm_2.0.33-1.1sarge1_arm.deb stable/main/binary-arm/libgd2-xpm_2.0.33-1.1sarge1_arm.deb stable/main/binary-arm/libgd2-noxpm-dev_2.0.33-1.1sarge1_arm.deb libgd2 (2.0.33-1.1sarge1) stable-security; urgency=high * Apply patch to fix infinite loop in GIF code. Closes: bug#372912 (thanks to Alec Berryman <alec@thened.net> for reporting, and to Martin Pitt <martin.pitt@ubuntu.com> for providing a patch). Reported as CVE-2006-2906. * Include this and the earlier security fix as isolated patches in the source: + 1001_CAN-2004-0941.patch + 1002_CVE-2006-2906.patch stable/main/binary-alpha/libgd2-noxpm-dev_2.0.33-1.1sarge1_alpha.deb stable/main/binary-alpha/libgd2-xpm-dev_2.0.33-1.1sarge1_alpha.deb stable/main/binary-alpha/libgd2-noxpm_2.0.33-1.1sarge1_alpha.deb stable/main/binary-alpha/libgd2-xpm_2.0.33-1.1sarge1_alpha.deb stable/main/binary-alpha/libgd-tools_2.0.33-1.1sarge1_alpha.deb libgd2 (2.0.33-1.1sarge1) stable-security; urgency=high * Apply patch to fix infinite loop in GIF code. Closes: bug#372912 (thanks to Alec Berryman <alec@thened.net> for reporting, and to Martin Pitt <martin.pitt@ubuntu.com> for providing a patch). Reported as CVE-2006-2906. * Include this and the earlier security fix as isolated patches in the source: + 1001_CAN-2004-0941.patch + 1002_CVE-2006-2906.patch stable/main/source/libgd2_2.0.33-1.1sarge1.diff.gz stable/main/binary-all/libgd2-dev_2.0.33-1.1sarge1_all.deb stable/main/binary-powerpc/libgd2-noxpm_2.0.33-1.1sarge1_powerpc.deb stable/main/binary-all/libgd2_2.0.33-1.1sarge1_all.deb stable/main/binary-powerpc/libgd2-noxpm-dev_2.0.33-1.1sarge1_powerpc.deb stable/main/binary-powerpc/libgd2-xpm-dev_2.0.33-1.1sarge1_powerpc.deb stable/main/binary-powerpc/libgd2-xpm_2.0.33-1.1sarge1_powerpc.deb stable/main/source/libgd2_2.0.33-1.1sarge1.dsc stable/main/binary-powerpc/libgd-tools_2.0.33-1.1sarge1_powerpc.deb libgd2 (2.0.33-1.1sarge1) stable-security; urgency=high * Apply patch to fix infinite loop in GIF code. Closes: bug#372912 (thanks to Alec Berryman <alec@thened.net> for reporting, and to Martin Pitt <martin.pitt@ubuntu.com> for providing a patch). Reported as CVE-2006-2906. * Include this and the earlier security fix as isolated patches in the source: + 1001_CAN-2004-0941.patch + 1002_CVE-2006-2906.patch stable/main/binary-sparc/libextractor1-dev_0.4.2-2sarge5_sparc.deb stable/main/binary-sparc/extract_0.4.2-2sarge5_sparc.deb stable/main/binary-sparc/libextractor1_0.4.2-2sarge5_sparc.deb libextractor (0.4.2-2sarge5) stable-security; urgency=high * Non-maintainer upload by the Security Team * Only applied upstream patch to fix heap overflow [src/plugins/asfextractor.c, CVE-2006-2458] stable/main/binary-s390/libextractor1-dev_0.4.2-2sarge5_s390.deb stable/main/binary-s390/libextractor1_0.4.2-2sarge5_s390.deb stable/main/binary-s390/extract_0.4.2-2sarge5_s390.deb libextractor (0.4.2-2sarge5) stable-security; urgency=high * Non-maintainer upload by the Security Team * Only applied upstream patch to fix heap overflow [src/plugins/asfextractor.c, CVE-2006-2458] stable/main/binary-mipsel/libextractor1-dev_0.4.2-2sarge5_mipsel.deb stable/main/binary-mipsel/libextractor1_0.4.2-2sarge5_mipsel.deb stable/main/binary-mipsel/extract_0.4.2-2sarge5_mipsel.deb libextractor (0.4.2-2sarge5) stable-security; urgency=high * Non-maintainer upload by the Security Team * Only applied upstream patch to fix heap overflow [src/plugins/asfextractor.c, CVE-2006-2458] stable/main/binary-mips/libextractor1_0.4.2-2sarge5_mips.deb stable/main/binary-mips/libextractor1-dev_0.4.2-2sarge5_mips.deb stable/main/binary-mips/extract_0.4.2-2sarge5_mips.deb libextractor (0.4.2-2sarge5) stable-security; urgency=high * Non-maintainer upload by the Security Team * Only applied upstream patch to fix heap overflow [src/plugins/asfextractor.c, CVE-2006-2458] stable/main/binary-m68k/libextractor1_0.4.2-2sarge5_m68k.deb stable/main/binary-m68k/extract_0.4.2-2sarge5_m68k.deb stable/main/binary-m68k/libextractor1-dev_0.4.2-2sarge5_m68k.deb libextractor (0.4.2-2sarge5) stable-security; urgency=high * Non-maintainer upload by the Security Team * Only applied upstream patch to fix heap overflow [src/plugins/asfextractor.c, CVE-2006-2458] stable/main/binary-ia64/extract_0.4.2-2sarge5_ia64.deb stable/main/binary-ia64/libextractor1_0.4.2-2sarge5_ia64.deb stable/main/binary-ia64/libextractor1-dev_0.4.2-2sarge5_ia64.deb libextractor (0.4.2-2sarge5) stable-security; urgency=high * Non-maintainer upload by the Security Team * Only applied upstream patch to fix heap overflow [src/plugins/asfextractor.c, CVE-2006-2458] stable/main/binary-i386/extract_0.4.2-2sarge5_i386.deb stable/main/binary-i386/libextractor1-dev_0.4.2-2sarge5_i386.deb stable/main/binary-i386/libextractor1_0.4.2-2sarge5_i386.deb libextractor (0.4.2-2sarge5) stable-security; urgency=high * Non-maintainer upload by the Security Team * Only applied upstream patch to fix heap overflow [src/plugins/asfextractor.c, CVE-2006-2458] stable/main/binary-hppa/libextractor1-dev_0.4.2-2sarge5_hppa.deb stable/main/binary-hppa/extract_0.4.2-2sarge5_hppa.deb stable/main/binary-hppa/libextractor1_0.4.2-2sarge5_hppa.deb libextractor (0.4.2-2sarge5) stable-security; urgency=high * Non-maintainer upload by the Security Team * Only applied upstream patch to fix heap overflow [src/plugins/asfextractor.c, CVE-2006-2458] stable/main/binary-arm/libextractor1_0.4.2-2sarge5_arm.deb stable/main/binary-arm/libextractor1-dev_0.4.2-2sarge5_arm.deb stable/main/binary-arm/extract_0.4.2-2sarge5_arm.deb libextractor (0.4.2-2sarge5) stable-security; urgency=high * Non-maintainer upload by the Security Team * Only applied upstream patch to fix heap overflow [src/plugins/asfextractor.c, CVE-2006-2458] stable/main/binary-alpha/libextractor1_0.4.2-2sarge5_alpha.deb stable/main/binary-alpha/libextractor1-dev_0.4.2-2sarge5_alpha.deb stable/main/binary-alpha/extract_0.4.2-2sarge5_alpha.deb libextractor (0.4.2-2sarge5) stable-security; urgency=high * Non-maintainer upload by the Security Team * Only applied upstream patch to fix heap overflow [src/plugins/asfextractor.c, CVE-2006-2458] stable/main/source/libextractor_0.4.2-2sarge5.diff.gz stable/main/binary-powerpc/extract_0.4.2-2sarge5_powerpc.deb stable/main/binary-powerpc/libextractor1-dev_0.4.2-2sarge5_powerpc.deb stable/main/source/libextractor_0.4.2-2sarge5.dsc stable/main/binary-powerpc/libextractor1_0.4.2-2sarge5_powerpc.deb libextractor (0.4.2-2sarge5) stable-security; urgency=high * Non-maintainer upload by the Security Team * Only applied upstream patch to fix heap overflow [src/plugins/asfextractor.c, CVE-2006-2458] stable/main/binary-sparc/libaldmb0_0.9.2-6_sparc.deb stable/main/binary-sparc/libdumb0-dev_0.9.2-6_sparc.deb stable/main/binary-sparc/libaldmb0-dev_0.9.2-6_sparc.deb stable/main/binary-sparc/libdumb0_0.9.2-6_sparc.deb libdumb (1:0.9.2-6) stable-security; urgency=high * src/it/itread.c: + Fix for CVE-2006-3668 "Heap-based buffer overflow in the it_read_envelope function in Dynamic Universal Music Bibliotheque (DUMB) 0.9.3 and earlier, and current CVS as of 20060716, allows user-complicit attackers to execute arbitrary code via a ".it" (Impulse Tracker) file with an enveloper with a large number of nodes." (Closes: #379064). stable/main/binary-s390/libaldmb0_0.9.2-6_s390.deb stable/main/binary-s390/libdumb0-dev_0.9.2-6_s390.deb stable/main/binary-s390/libdumb0_0.9.2-6_s390.deb stable/main/binary-s390/libaldmb0-dev_0.9.2-6_s390.deb libdumb (1:0.9.2-6) stable-security; urgency=high * src/it/itread.c: + Fix for CVE-2006-3668 "Heap-based buffer overflow in the it_read_envelope function in Dynamic Universal Music Bibliotheque (DUMB) 0.9.3 and earlier, and current CVS as of 20060716, allows user-complicit attackers to execute arbitrary code via a ".it" (Impulse Tracker) file with an enveloper with a large number of nodes." (Closes: #379064). stable/main/binary-powerpc/libdumb0_0.9.2-6_powerpc.deb stable/main/binary-powerpc/libaldmb0-dev_0.9.2-6_powerpc.deb stable/main/binary-powerpc/libdumb0-dev_0.9.2-6_powerpc.deb stable/main/binary-powerpc/libaldmb0_0.9.2-6_powerpc.deb libdumb (1:0.9.2-6) stable-security; urgency=high * src/it/itread.c: + Fix for CVE-2006-3668 "Heap-based buffer overflow in the it_read_envelope function in Dynamic Universal Music Bibliotheque (DUMB) 0.9.3 and earlier, and current CVS as of 20060716, allows user-complicit attackers to execute arbitrary code via a ".it" (Impulse Tracker) file with an enveloper with a large number of nodes." (Closes: #379064). stable/main/binary-mipsel/libaldmb0_0.9.2-6_mipsel.deb stable/main/binary-mipsel/libdumb0_0.9.2-6_mipsel.deb stable/main/binary-mipsel/libaldmb0-dev_0.9.2-6_mipsel.deb stable/main/binary-mipsel/libdumb0-dev_0.9.2-6_mipsel.deb libdumb (1:0.9.2-6) stable-security; urgency=high * src/it/itread.c: + Fix for CVE-2006-3668 "Heap-based buffer overflow in the it_read_envelope function in Dynamic Universal Music Bibliotheque (DUMB) 0.9.3 and earlier, and current CVS as of 20060716, allows user-complicit attackers to execute arbitrary code via a ".it" (Impulse Tracker) file with an enveloper with a large number of nodes." (Closes: #379064). stable/main/binary-mips/libdumb0_0.9.2-6_mips.deb stable/main/binary-mips/libaldmb0_0.9.2-6_mips.deb stable/main/binary-mips/libdumb0-dev_0.9.2-6_mips.deb stable/main/binary-mips/libaldmb0-dev_0.9.2-6_mips.deb libdumb (1:0.9.2-6) stable-security; urgency=high * src/it/itread.c: + Fix for CVE-2006-3668 "Heap-based buffer overflow in the it_read_envelope function in Dynamic Universal Music Bibliotheque (DUMB) 0.9.3 and earlier, and current CVS as of 20060716, allows user-complicit attackers to execute arbitrary code via a ".it" (Impulse Tracker) file with an enveloper with a large number of nodes." (Closes: #379064). stable/main/binary-m68k/libaldmb0-dev_0.9.2-6_m68k.deb stable/main/binary-m68k/libdumb0-dev_0.9.2-6_m68k.deb stable/main/binary-m68k/libaldmb0_0.9.2-6_m68k.deb stable/main/binary-m68k/libdumb0_0.9.2-6_m68k.deb libdumb (1:0.9.2-6) stable-security; urgency=high * src/it/itread.c: + Fix for CVE-2006-3668 "Heap-based buffer overflow in the it_read_envelope function in Dynamic Universal Music Bibliotheque (DUMB) 0.9.3 and earlier, and current CVS as of 20060716, allows user-complicit attackers to execute arbitrary code via a ".it" (Impulse Tracker) file with an enveloper with a large number of nodes." (Closes: #379064). stable/main/binary-ia64/libaldmb0_0.9.2-6_ia64.deb stable/main/binary-ia64/libdumb0_0.9.2-6_ia64.deb stable/main/binary-ia64/libaldmb0-dev_0.9.2-6_ia64.deb stable/main/binary-ia64/libdumb0-dev_0.9.2-6_ia64.deb libdumb (1:0.9.2-6) stable-security; urgency=high * src/it/itread.c: + Fix for CVE-2006-3668 "Heap-based buffer overflow in the it_read_envelope function in Dynamic Universal Music Bibliotheque (DUMB) 0.9.3 and earlier, and current CVS as of 20060716, allows user-complicit attackers to execute arbitrary code via a ".it" (Impulse Tracker) file with an enveloper with a large number of nodes." (Closes: #379064). stable/main/binary-hppa/libaldmb0_0.9.2-6_hppa.deb stable/main/binary-hppa/libdumb0-dev_0.9.2-6_hppa.deb stable/main/binary-hppa/libdumb0_0.9.2-6_hppa.deb stable/main/binary-hppa/libaldmb0-dev_0.9.2-6_hppa.deb libdumb (1:0.9.2-6) stable-security; urgency=high * src/it/itread.c: + Fix for CVE-2006-3668 "Heap-based buffer overflow in the it_read_envelope function in Dynamic Universal Music Bibliotheque (DUMB) 0.9.3 and earlier, and current CVS as of 20060716, allows user-complicit attackers to execute arbitrary code via a ".it" (Impulse Tracker) file with an enveloper with a large number of nodes." (Closes: #379064). stable/main/binary-arm/libdumb0-dev_0.9.2-6_arm.deb stable/main/binary-arm/libaldmb0_0.9.2-6_arm.deb stable/main/binary-arm/libdumb0_0.9.2-6_arm.deb stable/main/binary-arm/libaldmb0-dev_0.9.2-6_arm.deb libdumb (1:0.9.2-6) stable-security; urgency=high * src/it/itread.c: + Fix for CVE-2006-3668 "Heap-based buffer overflow in the it_read_envelope function in Dynamic Universal Music Bibliotheque (DUMB) 0.9.3 and earlier, and current CVS as of 20060716, allows user-complicit attackers to execute arbitrary code via a ".it" (Impulse Tracker) file with an enveloper with a large number of nodes." (Closes: #379064). stable/main/binary-alpha/libdumb0-dev_0.9.2-6_alpha.deb stable/main/binary-alpha/libaldmb0_0.9.2-6_alpha.deb stable/main/binary-alpha/libdumb0_0.9.2-6_alpha.deb stable/main/binary-alpha/libaldmb0-dev_0.9.2-6_alpha.deb libdumb (1:0.9.2-6) stable-security; urgency=high * src/it/itread.c: + Fix for CVE-2006-3668 "Heap-based buffer overflow in the it_read_envelope function in Dynamic Universal Music Bibliotheque (DUMB) 0.9.3 and earlier, and current CVS as of 20060716, allows user-complicit attackers to execute arbitrary code via a ".it" (Impulse Tracker) file with an enveloper with a large number of nodes." (Closes: #379064). stable/main/source/libdumb_0.9.2-6.diff.gz stable/main/binary-i386/libaldmb0-dev_0.9.2-6_i386.deb stable/main/source/libdumb_0.9.2-6.dsc stable/main/binary-i386/libdumb0_0.9.2-6_i386.deb stable/main/binary-i386/libdumb0-dev_0.9.2-6_i386.deb stable/main/binary-i386/libaldmb0_0.9.2-6_i386.deb libdumb (1:0.9.2-6) stable-security; urgency=high * src/it/itread.c: + Fix for CVE-2006-3668 "Heap-based buffer overflow in the it_read_envelope function in Dynamic Universal Music Bibliotheque (DUMB) 0.9.3 and earlier, and current CVS as of 20060716, allows user-complicit attackers to execute arbitrary code via a ".it" (Impulse Tracker) file with an enveloper with a large number of nodes." (Closes: #379064). stable/main/binary-sparc/libkrb5-dev_1.3.6-2sarge3_sparc.deb stable/main/binary-sparc/krb5-ftpd_1.3.6-2sarge3_sparc.deb stable/main/binary-sparc/krb5-admin-server_1.3.6-2sarge3_sparc.deb stable/main/binary-sparc/krb5-rsh-server_1.3.6-2sarge3_sparc.deb stable/main/binary-sparc/krb5-telnetd_1.3.6-2sarge3_sparc.deb stable/main/binary-sparc/libkrb53_1.3.6-2sarge3_sparc.deb stable/main/binary-sparc/krb5-kdc_1.3.6-2sarge3_sparc.deb stable/main/binary-sparc/krb5-clients_1.3.6-2sarge3_sparc.deb stable/main/binary-sparc/libkadm55_1.3.6-2sarge3_sparc.deb stable/main/binary-sparc/krb5-user_1.3.6-2sarge3_sparc.deb krb5 (1.3.6-2sarge3) stable-security; urgency=high * Add error checking to setuid, setreuid to avoid local privilege escalation ; fixes krb5-sa-2006-1, CVE-2006-3084, CVE-2006-3083 stable/main/binary-s390/libkadm55_1.3.6-2sarge3_s390.deb stable/main/binary-s390/krb5-kdc_1.3.6-2sarge3_s390.deb stable/main/binary-s390/libkrb53_1.3.6-2sarge3_s390.deb stable/main/binary-s390/krb5-ftpd_1.3.6-2sarge3_s390.deb stable/main/binary-s390/krb5-admin-server_1.3.6-2sarge3_s390.deb stable/main/binary-s390/krb5-rsh-server_1.3.6-2sarge3_s390.deb stable/main/binary-s390/krb5-user_1.3.6-2sarge3_s390.deb stable/main/binary-s390/libkrb5-dev_1.3.6-2sarge3_s390.deb stable/main/binary-s390/krb5-clients_1.3.6-2sarge3_s390.deb stable/main/binary-s390/krb5-telnetd_1.3.6-2sarge3_s390.deb krb5 (1.3.6-2sarge3) stable-security; urgency=high * Add error checking to setuid, setreuid to avoid local privilege escalation ; fixes krb5-sa-2006-1, CVE-2006-3084, CVE-2006-3083 stable/main/binary-powerpc/libkadm55_1.3.6-2sarge3_powerpc.deb stable/main/binary-powerpc/krb5-ftpd_1.3.6-2sarge3_powerpc.deb stable/main/binary-powerpc/krb5-user_1.3.6-2sarge3_powerpc.deb stable/main/binary-powerpc/libkrb5-dev_1.3.6-2sarge3_powerpc.deb stable/main/binary-powerpc/krb5-kdc_1.3.6-2sarge3_powerpc.deb stable/main/binary-powerpc/krb5-telnetd_1.3.6-2sarge3_powerpc.deb stable/main/binary-powerpc/krb5-clients_1.3.6-2sarge3_powerpc.deb stable/main/binary-powerpc/libkrb53_1.3.6-2sarge3_powerpc.deb stable/main/binary-powerpc/krb5-rsh-server_1.3.6-2sarge3_powerpc.deb stable/main/binary-powerpc/krb5-admin-server_1.3.6-2sarge3_powerpc.deb krb5 (1.3.6-2sarge3) stable-security; urgency=high * Add error checking to setuid, setreuid to avoid local privilege escalation ; fixes krb5-sa-2006-1, CVE-2006-3084, CVE-2006-3083 stable/main/binary-mipsel/libkrb5-dev_1.3.6-2sarge3_mipsel.deb stable/main/binary-mipsel/libkadm55_1.3.6-2sarge3_mipsel.deb stable/main/binary-mipsel/krb5-telnetd_1.3.6-2sarge3_mipsel.deb stable/main/binary-mipsel/krb5-ftpd_1.3.6-2sarge3_mipsel.deb stable/main/binary-mipsel/krb5-admin-server_1.3.6-2sarge3_mipsel.deb stable/main/binary-mipsel/libkrb53_1.3.6-2sarge3_mipsel.deb stable/main/binary-mipsel/krb5-rsh-server_1.3.6-2sarge3_mipsel.deb stable/main/binary-mipsel/krb5-clients_1.3.6-2sarge3_mipsel.deb stable/main/binary-mipsel/krb5-user_1.3.6-2sarge3_mipsel.deb stable/main/binary-mipsel/krb5-kdc_1.3.6-2sarge3_mipsel.deb krb5 (1.3.6-2sarge3) stable-security; urgency=high * Add error checking to setuid, setreuid to avoid local privilege escalation ; fixes krb5-sa-2006-1, CVE-2006-3084, CVE-2006-3083 stable/main/binary-mips/krb5-telnetd_1.3.6-2sarge3_mips.deb stable/main/binary-mips/krb5-clients_1.3.6-2sarge3_mips.deb stable/main/binary-mips/libkrb53_1.3.6-2sarge3_mips.deb stable/main/binary-mips/krb5-admin-server_1.3.6-2sarge3_mips.deb stable/main/binary-mips/krb5-rsh-server_1.3.6-2sarge3_mips.deb stable/main/binary-mips/libkadm55_1.3.6-2sarge3_mips.deb stable/main/binary-mips/libkrb5-dev_1.3.6-2sarge3_mips.deb stable/main/binary-mips/krb5-user_1.3.6-2sarge3_mips.deb stable/main/binary-mips/krb5-ftpd_1.3.6-2sarge3_mips.deb stable/main/binary-mips/krb5-kdc_1.3.6-2sarge3_mips.deb krb5 (1.3.6-2sarge3) stable-security; urgency=high * Add error checking to setuid, setreuid to avoid local privilege escalation ; fixes krb5-sa-2006-1, CVE-2006-3084, CVE-2006-3083 stable/main/binary-m68k/krb5-ftpd_1.3.6-2sarge3_m68k.deb stable/main/binary-m68k/libkrb53_1.3.6-2sarge3_m68k.deb stable/main/binary-m68k/krb5-rsh-server_1.3.6-2sarge3_m68k.deb stable/main/binary-m68k/krb5-user_1.3.6-2sarge3_m68k.deb stable/main/binary-m68k/krb5-telnetd_1.3.6-2sarge3_m68k.deb stable/main/binary-m68k/libkrb5-dev_1.3.6-2sarge3_m68k.deb stable/main/binary-m68k/krb5-kdc_1.3.6-2sarge3_m68k.deb stable/main/binary-m68k/krb5-clients_1.3.6-2sarge3_m68k.deb stable/main/binary-m68k/libkadm55_1.3.6-2sarge3_m68k.deb stable/main/binary-m68k/krb5-admin-server_1.3.6-2sarge3_m68k.deb krb5 (1.3.6-2sarge3) stable-security; urgency=high * Add error checking to setuid, setreuid to avoid local privilege escalation ; fixes krb5-sa-2006-1, CVE-2006-3084, CVE-2006-3083 stable/main/binary-ia64/libkadm55_1.3.6-2sarge3_ia64.deb stable/main/binary-ia64/krb5-kdc_1.3.6-2sarge3_ia64.deb stable/main/binary-ia64/krb5-rsh-server_1.3.6-2sarge3_ia64.deb stable/main/binary-ia64/krb5-clients_1.3.6-2sarge3_ia64.deb stable/main/binary-ia64/krb5-telnetd_1.3.6-2sarge3_ia64.deb stable/main/binary-ia64/krb5-user_1.3.6-2sarge3_ia64.deb stable/main/binary-ia64/libkrb53_1.3.6-2sarge3_ia64.deb stable/main/binary-ia64/libkrb5-dev_1.3.6-2sarge3_ia64.deb stable/main/binary-ia64/krb5-admin-server_1.3.6-2sarge3_ia64.deb stable/main/binary-ia64/krb5-ftpd_1.3.6-2sarge3_ia64.deb krb5 (1.3.6-2sarge3) stable-security; urgency=high * Add error checking to setuid, setreuid to avoid local privilege escalation ; fixes krb5-sa-2006-1, CVE-2006-3084, CVE-2006-3083 stable/main/binary-hppa/libkrb5-dev_1.3.6-2sarge3_hppa.deb stable/main/binary-hppa/krb5-ftpd_1.3.6-2sarge3_hppa.deb stable/main/binary-hppa/krb5-admin-server_1.3.6-2sarge3_hppa.deb stable/main/binary-hppa/krb5-kdc_1.3.6-2sarge3_hppa.deb stable/main/binary-hppa/krb5-rsh-server_1.3.6-2sarge3_hppa.deb stable/main/binary-hppa/krb5-user_1.3.6-2sarge3_hppa.deb stable/main/binary-hppa/krb5-clients_1.3.6-2sarge3_hppa.deb stable/main/binary-hppa/krb5-telnetd_1.3.6-2sarge3_hppa.deb stable/main/binary-hppa/libkadm55_1.3.6-2sarge3_hppa.deb stable/main/binary-hppa/libkrb53_1.3.6-2sarge3_hppa.deb krb5 (1.3.6-2sarge3) stable-security; urgency=high * Add error checking to setuid, setreuid to avoid local privilege escalation ; fixes krb5-sa-2006-1, CVE-2006-3084, CVE-2006-3083 stable/main/binary-arm/libkrb5-dev_1.3.6-2sarge3_arm.deb stable/main/binary-arm/krb5-telnetd_1.3.6-2sarge3_arm.deb stable/main/binary-arm/krb5-admin-server_1.3.6-2sarge3_arm.deb stable/main/binary-arm/krb5-kdc_1.3.6-2sarge3_arm.deb stable/main/binary-arm/libkadm55_1.3.6-2sarge3_arm.deb stable/main/binary-arm/krb5-clients_1.3.6-2sarge3_arm.deb stable/main/binary-arm/libkrb53_1.3.6-2sarge3_arm.deb stable/main/binary-arm/krb5-rsh-server_1.3.6-2sarge3_arm.deb stable/main/binary-arm/krb5-user_1.3.6-2sarge3_arm.deb stable/main/binary-arm/krb5-ftpd_1.3.6-2sarge3_arm.deb krb5 (1.3.6-2sarge3) stable-security; urgency=high * Add error checking to setuid, setreuid to avoid local privilege escalation ; fixes krb5-sa-2006-1, CVE-2006-3084, CVE-2006-3083 stable/main/binary-alpha/krb5-admin-server_1.3.6-2sarge3_alpha.deb stable/main/binary-alpha/krb5-ftpd_1.3.6-2sarge3_alpha.deb stable/main/binary-alpha/libkrb5-dev_1.3.6-2sarge3_alpha.deb stable/main/binary-alpha/krb5-kdc_1.3.6-2sarge3_alpha.deb stable/main/binary-alpha/krb5-user_1.3.6-2sarge3_alpha.deb stable/main/binary-alpha/libkadm55_1.3.6-2sarge3_alpha.deb stable/main/binary-alpha/libkrb53_1.3.6-2sarge3_alpha.deb stable/main/binary-alpha/krb5-telnetd_1.3.6-2sarge3_alpha.deb stable/main/binary-alpha/krb5-clients_1.3.6-2sarge3_alpha.deb stable/main/binary-alpha/krb5-rsh-server_1.3.6-2sarge3_alpha.deb krb5 (1.3.6-2sarge3) stable-security; urgency=high * Add error checking to setuid, setreuid to avoid local privilege escalation ; fixes krb5-sa-2006-1, CVE-2006-3084, CVE-2006-3083 stable/main/binary-all/krb5-doc_1.3.6-2sarge3_all.deb stable/main/binary-i386/libkadm55_1.3.6-2sarge3_i386.deb stable/main/binary-i386/krb5-rsh-server_1.3.6-2sarge3_i386.deb stable/main/binary-i386/krb5-telnetd_1.3.6-2sarge3_i386.deb stable/main/binary-i386/krb5-user_1.3.6-2sarge3_i386.deb stable/main/binary-i386/krb5-clients_1.3.6-2sarge3_i386.deb stable/main/source/krb5_1.3.6-2sarge3.diff.gz stable/main/binary-i386/libkrb53_1.3.6-2sarge3_i386.deb stable/main/binary-i386/krb5-kdc_1.3.6-2sarge3_i386.deb stable/main/source/krb5_1.3.6-2sarge3.dsc stable/main/binary-i386/krb5-ftpd_1.3.6-2sarge3_i386.deb stable/main/binary-i386/libkrb5-dev_1.3.6-2sarge3_i386.deb stable/main/binary-i386/krb5-admin-server_1.3.6-2sarge3_i386.deb krb5 (1.3.6-2sarge3) stable-security; urgency=high * Add error checking to setuid, setreuid to avoid local privilege escalation ; fixes krb5-sa-2006-1, CVE-2006-3084, CVE-2006-3083 stable/main/binary-sparc/kphone_4.1.0-2sarge1_sparc.deb kphone (1:4.1.0-2sarge1) stable-security; urgency=high * Non-maintainer upload by the Security Team: * Fix config file information leak. (CVE-2006-2192) stable/main/binary-s390/kphone_4.1.0-2sarge1_s390.deb kphone (1:4.1.0-2sarge1) stable-security; urgency=high * Non-maintainer upload by the Security Team: * Fix config file information leak. (CVE-2006-2192) stable/main/binary-powerpc/kphone_4.1.0-2sarge1_powerpc.deb kphone (1:4.1.0-2sarge1) stable-security; urgency=high * Non-maintainer upload by the Security Team: * Fix config file information leak. (CVE-2006-2192) stable/main/binary-mipsel/kphone_4.1.0-2sarge1_mipsel.deb kphone (1:4.1.0-2sarge1) stable-security; urgency=high * Non-maintainer upload by the Security Team: * Fix config file information leak. (CVE-2006-2192) stable/main/binary-mips/kphone_4.1.0-2sarge1_mips.deb kphone (1:4.1.0-2sarge1) stable-security; urgency=high * Non-maintainer upload by the Security Team: * Fix config file information leak. (CVE-2006-2192) stable/main/binary-m68k/kphone_4.1.0-2sarge1_m68k.deb kphone (1:4.1.0-2sarge1) stable-security; urgency=high * Non-maintainer upload by the Security Team: * Fix config file information leak. (CVE-2006-2192) stable/main/binary-ia64/kphone_4.1.0-2sarge1_ia64.deb kphone (1:4.1.0-2sarge1) stable-security; urgency=high * Non-maintainer upload by the Security Team: * Fix config file information leak. (CVE-2006-2192) stable/main/binary-hppa/kphone_4.1.0-2sarge1_hppa.deb kphone (1:4.1.0-2sarge1) stable-security; urgency=high * Non-maintainer upload by the Security Team: * Fix config file information leak. (CVE-2006-2192) stable/main/binary-arm/kphone_4.1.0-2sarge1_arm.deb kphone (1:4.1.0-2sarge1) stable-security; urgency=high * Non-maintainer upload by the Security Team: * Fix config file information leak. (CVE-2006-2192) stable/main/binary-alpha/kphone_4.1.0-2sarge1_alpha.deb kphone (1:4.1.0-2sarge1) stable-security; urgency=high * Non-maintainer upload by the Security Team: * Fix config file information leak. (CVE-2006-2192) stable/main/binary-i386/kphone_4.1.0-2sarge1_i386.deb stable/main/source/kphone_4.1.0-2sarge1.diff.gz stable/main/source/kphone_4.1.0-2sarge1.dsc kphone (1:4.1.0-2sarge1) stable-security; urgency=high * Non-maintainer upload by the Security Team: * Fix config file information leak. (CVE-2006-2192) stable/main/binary-all/kernel-patch-debian-2.6.8_2.6.8-16sarge4_all.deb stable/main/binary-all/kernel-tree-2.6.8_2.6.8-16sarge4_all.deb stable/main/binary-all/kernel-doc-2.6.8_2.6.8-16sarge4_all.deb stable/main/source/kernel-source-2.6.8_2.6.8-16sarge4.dsc stable/main/binary-all/kernel-source-2.6.8_2.6.8-16sarge4_all.deb stable/main/source/kernel-source-2.6.8_2.6.8-16sarge4.diff.gz kernel-source-2.6.8 (2.6.8-16sarge4) stable-security; urgency=high * proc-environ-race-1.dpatch, proc-environ-race-2.dpatch [SECURITY] Fix local root vulnerability caused by a race in proc See CVE-2006-3626 stable/main/source/kernel-source-2.4.27_2.4.27-10sarge3.dsc stable/main/binary-all/kernel-source-2.4.27_2.4.27-10sarge3_all.deb stable/main/binary-all/kernel-tree-2.4.27_2.4.27-10sarge3_all.deb stable/main/binary-all/kernel-doc-2.4.27_2.4.27-10sarge3_all.deb stable/main/binary-all/kernel-patch-debian-2.4.27_2.4.27-10sarge3_all.deb stable/main/source/kernel-source-2.4.27_2.4.27-10sarge3.diff.gz kernel-source-2.4.27 (2.4.27-10sarge3) stable-security; urgency=high * 207_smbfs-chroot-escape.diff [SECURITY] Fix directory traversal vulnerability in smbfs that permits local users to escape chroot restrictions See CVE-2006-1864 * 208_ia64-die_if_kernel-returns.diff [SECURITY][ia64] Fix a potential local DoS on ia64 systems caused by an incorrect 'noreturn' attribute on die_if_kernel() See CVE-2006-0742 * 209_sctp-discard-unexpected-in-closed.diff [SECURITY] Fix remote DoS in SCTP code by discarding unexpected chunks received in CLOSED state instead of calling BUG() See CVE-2006-2271 * 210_ipv4-id-no-increment.diff [SECURITY] Fix vulnerability that allows remote attackers to conduct an Idle Scan attack, bypassing intended protections against such attacks See CVE-2006-1242 * 211_usb-gadget-rndis-bufoverflow.diff [SECURITY] Fix buffer overflow in the USB Gadget RNDIS implementation that allows for a remote DoS attack (kmalloc'd memory corruption) See CVE-2006-1368 * 212_ipv4-sin_zero_clear.diff [SECURITY] Fix local information leak in af_inet code See CVE-2006-1343 * 213_madvise_remove-restrict.diff [SECURITY] Fix vulnerability that allows local users to bypass IPC permissions and replace portions of read-only tmpfs files with zeroes. See CVE-2006-1524 * 214_mcast-ip-route-null-deref.diff [SECURITY] Fix local DoS vulnerability that allows local users to panic a system by requesting a route for a multicast IP See CVE-2006-1525 * 215_sctp-fragment-recurse.diff [SECURITY] Fix remote DoS vulnerability that can lead to infinite recursion when a packet containing two or more DATA fragments is received See CVE-2006-2274 * 216_sctp-fragmented-receive-fix.diff [SECURITY] Fix remote DoS vulnerability that allows IP fragmented COOKIE_ECHO and HEARTBEAT SCTP control chunks to cause a kernel panic See CVE-2006-2272 * 217_amd64-fp-reg-leak.diff [SECURITY][amd64] Fix an information leak that allows a process to see a portion of the floating point state of other processes, possibly exposing sensitive information. See CVE-2006-1056 * 218_do_add_counters-race.diff [SECURITY] Fix race condition in the do_add_counters() function in netfilter that allows local users with CAP_NET_ADMIN capabilities to read kernel memory See CVE-2006-0039 * 219_sctp-hb-ack-overflow.diff [SECURITY] Fix a remote buffer overflow that can result from a badly formatted HB-ACK chunk See CVE-2006-1857 * 220_sctp-param-bound-checks.diff [SECURITY] Fix a bound checking error (remote DoS) in the SCTP parameter checking code See CVE-2006-1858 * 221_netfilter-do_replace-overflow.diff [SECURITY] Fix buffer overflow in netfilter do_replace which can could be triggered by users with CAP_NET_ADMIN rights. See CVE-2006-0038 * 222_binfmt-bad-elf-entry-address.diff [SECURITY][amd64] Fix potential local DoS vulnerability in the binfmt_elf code on em64t processors See CVE-2006-0741 stable/main/source/kernel-patch-vserver_1.9.5.6.tar.gz stable/main/source/kernel-patch-vserver_1.9.5.6.dsc stable/main/binary-all/kernel-patch-vserver_1.9.5.6_all.deb kernel-patch-vserver (1.9.5.6) stable-security; urgency=high * Updated 2.6.8 kernel patch to correct ccaps not being limited to root inside a guest [CVE-2006-2110] stable/main/binary-powerpc/kernel-image-2.6.8-3-power4-smp_2.6.8-12sarge4_powerpc.deb stable/main/binary-powerpc/kernel-build-2.6.8-3-power3-smp_2.6.8-12sarge4_powerpc.deb stable/main/source/kernel-patch-powerpc-2.6.8_2.6.8-12sarge4.tar.gz stable/main/binary-powerpc/kernel-build-2.6.8-3-power4_2.6.8-12sarge4_powerpc.deb stable/main/binary-powerpc/kernel-image-2.6.8-3-powerpc_2.6.8-12sarge4_powerpc.deb stable/main/binary-powerpc/kernel-build-2.6.8-3-powerpc_2.6.8-12sarge4_powerpc.deb stable/main/binary-powerpc/kernel-build-2.6.8-3-power4-smp_2.6.8-12sarge4_powerpc.deb stable/main/binary-powerpc/kernel-image-2.6.8-3-power4_2.6.8-12sarge4_powerpc.deb stable/main/binary-powerpc/kernel-image-2.6.8-3-power3_2.6.8-12sarge4_powerpc.deb stable/main/binary-powerpc/kernel-headers-2.6.8-3_2.6.8-12sarge4_powerpc.deb stable/main/source/kernel-patch-powerpc-2.6.8_2.6.8-12sarge4.dsc stable/main/binary-powerpc/kernel-build-2.6.8-3-power3_2.6.8-12sarge4_powerpc.deb stable/main/binary-powerpc/kernel-image-2.6.8-3-powerpc-smp_2.6.8-12sarge4_powerpc.deb stable/main/binary-powerpc/kernel-image-2.6.8-3-power3-smp_2.6.8-12sarge4_powerpc.deb stable/main/binary-powerpc/kernel-build-2.6.8-3-powerpc-smp_2.6.8-12sarge4_powerpc.deb kernel-patch-powerpc-2.6.8 (2.6.8-12sarge4) stable-security; urgency=high * Build against kernel-tree-2.6.8-16sarge4: * proc-environ-race-1.dpatch, proc-environ-race-2.dpatch [SECURITY] Fix local root vulnerability caused by a race in proc See CVE-2006-3626 stable/main/binary-powerpc/kernel-build-2.4.27-powerpc_2.4.27-10sarge3_powerpc.deb stable/main/source/kernel-patch-powerpc-2.4.27_2.4.27-10sarge3.tar.gz stable/main/binary-powerpc/kernel-image-2.4.27-powerpc_2.4.27-10sarge3_powerpc.deb stable/main/binary-powerpc/kernel-headers-2.4.27-powerpc_2.4.27-10sarge3_powerpc.deb stable/main/binary-powerpc/kernel-patch-2.4.27-apus_2.4.27-10sarge3_powerpc.deb stable/main/binary-powerpc/kernel-headers-2.4.27-apus_2.4.27-10sarge3_powerpc.deb stable/main/binary-powerpc/kernel-image-2.4.27-powerpc-smp_2.4.27-10sarge3_powerpc.deb stable/main/binary-powerpc/kernel-build-2.4.27-powerpc-small_2.4.27-10sarge3_powerpc.deb stable/main/source/kernel-patch-powerpc-2.4.27_2.4.27-10sarge3.dsc stable/main/binary-powerpc/kernel-image-2.4.27-powerpc-small_2.4.27-10sarge3_powerpc.deb stable/main/binary-powerpc/kernel-patch-2.4.27-powerpc_2.4.27-10sarge3_powerpc.deb stable/main/binary-powerpc/kernel-build-2.4.27-nubus_2.4.27-10sarge3_powerpc.deb stable/main/binary-powerpc/kernel-image-2.4.27-nubus_2.4.27-10sarge3_powerpc.deb stable/main/binary-powerpc/kernel-image-2.4.27-apus_2.4.27-10sarge3_powerpc.deb stable/main/binary-powerpc/kernel-build-2.4.27-powerpc-smp_2.4.27-10sarge3_powerpc.deb stable/main/binary-powerpc/kernel-build-2.4.27-apus_2.4.27-10sarge3_powerpc.deb stable/main/binary-powerpc/kernel-headers-2.4.27-nubus_2.4.27-10sarge3_powerpc.deb stable/main/binary-powerpc/kernel-patch-2.4.27-nubus_2.4.27-10sarge3_powerpc.deb kernel-patch-powerpc-2.4.27 (2.4.27-10sarge3) stable-security; urgency=high * Add missing build dependency on modutils * Build against kernel-tree-2.4.27-10sarge3: * 207_smbfs-chroot-escape.diff [SECURITY] Fix directory traversal vulnerability in smbfs that permits local users to escape chroot restrictions See CVE-2006-1864 * 208_ia64-die_if_kernel-returns.diff [SECURITY][ia64] Fix a potential local DoS on ia64 systems caused by an incorrect 'noreturn' attribute on die_if_kernel() See CVE-2006-0742 * 209_sctp-discard-unexpected-in-closed.diff [SECURITY] Fix remote DoS in SCTP code by discarding unexpected chunks received in CLOSED state instead of calling BUG() See CVE-2006-2271 * 210_ipv4-id-no-increment.diff [SECURITY] Fix vulnerability that allows remote attackers to conduct an Idle Scan attack, bypassing intended protections against such attacks See CVE-2006-1242 * 211_usb-gadget-rndis-bufoverflow.diff [SECURITY] Fix buffer overflow in the USB Gadget RNDIS implementation that allows for a remote DoS attack (kmalloc'd memory corruption) See CVE-2006-1368 * 212_ipv4-sin_zero_clear.diff [SECURITY] Fix local information leak in af_inet code See CVE-2006-1343 * 213_madvise_remove-restrict.diff [SECURITY] Fix vulnerability that allows local users to bypass IPC permissions and replace portions of read-only tmpfs files with zeroes. See CVE-2006-1524 * 214_mcast-ip-route-null-deref.diff [SECURITY] Fix local DoS vulnerability that allows local users to panic a system by requesting a route for a multicast IP See CVE-2006-1525 * 215_sctp-fragment-recurse.diff [SECURITY] Fix remote DoS vulnerability that can lead to infinite recursion when a packet containing two or more DATA fragments is received See CVE-2006-2274 * 216_sctp-fragmented-receive-fix.diff [SECURITY] Fix remote DoS vulnerability that allows IP fragmented COOKIE_ECHO and HEARTBEAT SCTP control chunks to cause a kernel panic See CVE-2006-2272 * 217_amd64-fp-reg-leak.diff [SECURITY][amd64] Fix an information leak that allows a process to see a portion of the floating point state of other processes, possibly exposing sensitive information. See CVE-2006-1056 * 218_do_add_counters-race.diff [SECURITY] Fix race condition in the do_add_counters() function in netfilter that allows local users with CAP_NET_ADMIN capabilities to read kernel memory See CVE-2006-0039 * 219_sctp-hb-ack-overflow.diff [SECURITY] Fix a remote buffer overflow that can result from a badly formatted HB-ACK chunk See CVE-2006-1857 * 220_sctp-param-bound-checks.diff [SECURITY] Fix a bound checking error (remote DoS) in the SCTP parameter checking code See CVE-2006-1858 * 221_netfilter-do_replace-overflow.diff [SECURITY] Fix buffer overflow in netfilter do_replace which can could be triggered by users with CAP_NET_ADMIN rights. See CVE-2006-0038 * 222_binfmt-bad-elf-entry-address.diff [SECURITY][amd64] Fix potential local DoS vulnerability in the binfmt_elf code on em64t processors See CVE-2006-0741 stable/main/binary-sparc/mips-tools_2.4.27-10.sarge3.040815-1_sparc.deb kernel-patch-2.4.27-mips (2.4.27-10.sarge3.040815-1) stable-security; urgency=high * Build against kernel-tree-2.4.27-10sarge3: * 207_smbfs-chroot-escape.diff [SECURITY] Fix directory traversal vulnerability in smbfs that permits local users to escape chroot restrictions See CVE-2006-1864 * 208_ia64-die_if_kernel-returns.diff [SECURITY][ia64] Fix a potential local DoS on ia64 systems caused by an incorrect 'noreturn' attribute on die_if_kernel() See CVE-2006-0742 * 209_sctp-discard-unexpected-in-closed.diff [SECURITY] Fix remote DoS in SCTP code by discarding unexpected chunks received in CLOSED state instead of calling BUG() See CVE-2006-2271 * 210_ipv4-id-no-increment.diff [SECURITY] Fix vulnerability that allows remote attackers to conduct an Idle Scan attack, bypassing intended protections against such attacks See CVE-2006-1242 * 211_usb-gadget-rndis-bufoverflow.diff [SECURITY] Fix buffer overflow in the USB Gadget RNDIS implementation that allows for a remote DoS attack (kmalloc'd memory corruption) See CVE-2006-1368 * 212_ipv4-sin_zero_clear.diff [SECURITY] Fix local information leak in af_inet code See CVE-2006-1343 * 213_madvise_remove-restrict.diff [SECURITY] Fix vulnerability that allows local users to bypass IPC permissions and replace portions of read-only tmpfs files with zeroes. See CVE-2006-1524 * 214_mcast-ip-route-null-deref.diff [SECURITY] Fix local DoS vulnerability that allows local users to panic a system by requesting a route for a multicast IP See CVE-2006-1525 * 215_sctp-fragment-recurse.diff [SECURITY] Fix remote DoS vulnerability that can lead to infinite recursion when a packet containing two or more DATA fragments is received See CVE-2006-2274 * 216_sctp-fragmented-receive-fix.diff [SECURITY] Fix remote DoS vulnerability that allows IP fragmented COOKIE_ECHO and HEARTBEAT SCTP control chunks to cause a kernel panic See CVE-2006-2272 * 217_amd64-fp-reg-leak.diff [SECURITY][amd64] Fix an information leak that allows a process to see a portion of the floating point state of other processes, possibly exposing sensitive information. See CVE-2006-1056 * 218_do_add_counters-race.diff [SECURITY] Fix race condition in the do_add_counters() function in netfilter that allows local users with CAP_NET_ADMIN capabilities to read kernel memory See CVE-2006-0039 * 219_sctp-hb-ack-overflow.diff [SECURITY] Fix a remote buffer overflow that can result from a badly formatted HB-ACK chunk See CVE-2006-1857 * 220_sctp-param-bound-checks.diff [SECURITY] Fix a bound checking error (remote DoS) in the SCTP parameter checking code See CVE-2006-1858 * 221_netfilter-do_replace-overflow.diff [SECURITY] Fix buffer overflow in netfilter do_replace which can could be triggered by users with CAP_NET_ADMIN rights. See CVE-2006-0038 * 222_binfmt-bad-elf-entry-address.diff [SECURITY][amd64] Fix potential local DoS vulnerability in the binfmt_elf code on em64t processors See CVE-2006-0741 stable/main/binary-s390/mips-tools_2.4.27-10.sarge3.040815-1_s390.deb kernel-patch-2.4.27-mips (2.4.27-10.sarge3.040815-1) stable-security; urgency=high * Build against kernel-tree-2.4.27-10sarge3: * 207_smbfs-chroot-escape.diff [SECURITY] Fix directory traversal vulnerability in smbfs that permits local users to escape chroot restrictions See CVE-2006-1864 * 208_ia64-die_if_kernel-returns.diff [SECURITY][ia64] Fix a potential local DoS on ia64 systems caused by an incorrect 'noreturn' attribute on die_if_kernel() See CVE-2006-0742 * 209_sctp-discard-unexpected-in-closed.diff [SECURITY] Fix remote DoS in SCTP code by discarding unexpected chunks received in CLOSED state instead of calling BUG() See CVE-2006-2271 * 210_ipv4-id-no-increment.diff [SECURITY] Fix vulnerability that allows remote attackers to conduct an Idle Scan attack, bypassing intended protections against such attacks See CVE-2006-1242 * 211_usb-gadget-rndis-bufoverflow.diff [SECURITY] Fix buffer overflow in the USB Gadget RNDIS implementation that allows for a remote DoS attack (kmalloc'd memory corruption) See CVE-2006-1368 * 212_ipv4-sin_zero_clear.diff [SECURITY] Fix local information leak in af_inet code See CVE-2006-1343 * 213_madvise_remove-restrict.diff [SECURITY] Fix vulnerability that allows local users to bypass IPC permissions and replace portions of read-only tmpfs files with zeroes. See CVE-2006-1524 * 214_mcast-ip-route-null-deref.diff [SECURITY] Fix local DoS vulnerability that allows local users to panic a system by requesting a route for a multicast IP See CVE-2006-1525 * 215_sctp-fragment-recurse.diff [SECURITY] Fix remote DoS vulnerability that can lead to infinite recursion when a packet containing two or more DATA fragments is received See CVE-2006-2274 * 216_sctp-fragmented-receive-fix.diff [SECURITY] Fix remote DoS vulnerability that allows IP fragmented COOKIE_ECHO and HEARTBEAT SCTP control chunks to cause a kernel panic See CVE-2006-2272 * 217_amd64-fp-reg-leak.diff [SECURITY][amd64] Fix an information leak that allows a process to see a portion of the floating point state of other processes, possibly exposing sensitive information. See CVE-2006-1056 * 218_do_add_counters-race.diff [SECURITY] Fix race condition in the do_add_counters() function in netfilter that allows local users with CAP_NET_ADMIN capabilities to read kernel memory See CVE-2006-0039 * 219_sctp-hb-ack-overflow.diff [SECURITY] Fix a remote buffer overflow that can result from a badly formatted HB-ACK chunk See CVE-2006-1857 * 220_sctp-param-bound-checks.diff [SECURITY] Fix a bound checking error (remote DoS) in the SCTP parameter checking code See CVE-2006-1858 * 221_netfilter-do_replace-overflow.diff [SECURITY] Fix buffer overflow in netfilter do_replace which can could be triggered by users with CAP_NET_ADMIN rights. See CVE-2006-0038 * 222_binfmt-bad-elf-entry-address.diff [SECURITY][amd64] Fix potential local DoS vulnerability in the binfmt_elf code on em64t processors See CVE-2006-0741 stable/main/binary-powerpc/mips-tools_2.4.27-10.sarge3.040815-1_powerpc.deb kernel-patch-2.4.27-mips (2.4.27-10.sarge3.040815-1) stable-security; urgency=high * Build against kernel-tree-2.4.27-10sarge3: * 207_smbfs-chroot-escape.diff [SECURITY] Fix directory traversal vulnerability in smbfs that permits local users to escape chroot restrictions See CVE-2006-1864 * 208_ia64-die_if_kernel-returns.diff [SECURITY][ia64] Fix a potential local DoS on ia64 systems caused by an incorrect 'noreturn' attribute on die_if_kernel() See CVE-2006-0742 * 209_sctp-discard-unexpected-in-closed.diff [SECURITY] Fix remote DoS in SCTP code by discarding unexpected chunks received in CLOSED state instead of calling BUG() See CVE-2006-2271 * 210_ipv4-id-no-increment.diff [SECURITY] Fix vulnerability that allows remote attackers to conduct an Idle Scan attack, bypassing intended protections against such attacks See CVE-2006-1242 * 211_usb-gadget-rndis-bufoverflow.diff [SECURITY] Fix buffer overflow in the USB Gadget RNDIS implementation that allows for a remote DoS attack (kmalloc'd memory corruption) See CVE-2006-1368 * 212_ipv4-sin_zero_clear.diff [SECURITY] Fix local information leak in af_inet code See CVE-2006-1343 * 213_madvise_remove-restrict.diff [SECURITY] Fix vulnerability that allows local users to bypass IPC permissions and replace portions of read-only tmpfs files with zeroes. See CVE-2006-1524 * 214_mcast-ip-route-null-deref.diff [SECURITY] Fix local DoS vulnerability that allows local users to panic a system by requesting a route for a multicast IP See CVE-2006-1525 * 215_sctp-fragment-recurse.diff [SECURITY] Fix remote DoS vulnerability that can lead to infinite recursion when a packet containing two or more DATA fragments is received See CVE-2006-2274 * 216_sctp-fragmented-receive-fix.diff [SECURITY] Fix remote DoS vulnerability that allows IP fragmented COOKIE_ECHO and HEARTBEAT SCTP control chunks to cause a kernel panic See CVE-2006-2272 * 217_amd64-fp-reg-leak.diff [SECURITY][amd64] Fix an information leak that allows a process to see a portion of the floating point state of other processes, possibly exposing sensitive information. See CVE-2006-1056 * 218_do_add_counters-race.diff [SECURITY] Fix race condition in the do_add_counters() function in netfilter that allows local users with CAP_NET_ADMIN capabilities to read kernel memory See CVE-2006-0039 * 219_sctp-hb-ack-overflow.diff [SECURITY] Fix a remote buffer overflow that can result from a badly formatted HB-ACK chunk See CVE-2006-1857 * 220_sctp-param-bound-checks.diff [SECURITY] Fix a bound checking error (remote DoS) in the SCTP parameter checking code See CVE-2006-1858 * 221_netfilter-do_replace-overflow.diff [SECURITY] Fix buffer overflow in netfilter do_replace which can could be triggered by users with CAP_NET_ADMIN rights. See CVE-2006-0038 * 222_binfmt-bad-elf-entry-address.diff [SECURITY][amd64] Fix potential local DoS vulnerability in the binfmt_elf code on em64t processors See CVE-2006-0741 stable/main/binary-m68k/mips-tools_2.4.27-10.sarge3.040815-1_m68k.deb kernel-patch-2.4.27-mips (2.4.27-10.sarge3.040815-1) stable-security; urgency=high * Build against kernel-tree-2.4.27-10sarge3: * 207_smbfs-chroot-escape.diff [SECURITY] Fix directory traversal vulnerability in smbfs that permits local users to escape chroot restrictions See CVE-2006-1864 * 208_ia64-die_if_kernel-returns.diff [SECURITY][ia64] Fix a potential local DoS on ia64 systems caused by an incorrect 'noreturn' attribute on die_if_kernel() See CVE-2006-0742 * 209_sctp-discard-unexpected-in-closed.diff [SECURITY] Fix remote DoS in SCTP code by discarding unexpected chunks received in CLOSED state instead of calling BUG() See CVE-2006-2271 * 210_ipv4-id-no-increment.diff [SECURITY] Fix vulnerability that allows remote attackers to conduct an Idle Scan attack, bypassing intended protections against such attacks See CVE-2006-1242 * 211_usb-gadget-rndis-bufoverflow.diff [SECURITY] Fix buffer overflow in the USB Gadget RNDIS implementation that allows for a remote DoS attack (kmalloc'd memory corruption) See CVE-2006-1368 * 212_ipv4-sin_zero_clear.diff [SECURITY] Fix local information leak in af_inet code See CVE-2006-1343 * 213_madvise_remove-restrict.diff [SECURITY] Fix vulnerability that allows local users to bypass IPC permissions and replace portions of read-only tmpfs files with zeroes. See CVE-2006-1524 * 214_mcast-ip-route-null-deref.diff [SECURITY] Fix local DoS vulnerability that allows local users to panic a system by requesting a route for a multicast IP See CVE-2006-1525 * 215_sctp-fragment-recurse.diff [SECURITY] Fix remote DoS vulnerability that can lead to infinite recursion when a packet containing two or more DATA fragments is received See CVE-2006-2274 * 216_sctp-fragmented-receive-fix.diff [SECURITY] Fix remote DoS vulnerability that allows IP fragmented COOKIE_ECHO and HEARTBEAT SCTP control chunks to cause a kernel panic See CVE-2006-2272 * 217_amd64-fp-reg-leak.diff [SECURITY][amd64] Fix an information leak that allows a process to see a portion of the floating point state of other processes, possibly exposing sensitive information. See CVE-2006-1056 * 218_do_add_counters-race.diff [SECURITY] Fix race condition in the do_add_counters() function in netfilter that allows local users with CAP_NET_ADMIN capabilities to read kernel memory See CVE-2006-0039 * 219_sctp-hb-ack-overflow.diff [SECURITY] Fix a remote buffer overflow that can result from a badly formatted HB-ACK chunk See CVE-2006-1857 * 220_sctp-param-bound-checks.diff [SECURITY] Fix a bound checking error (remote DoS) in the SCTP parameter checking code See CVE-2006-1858 * 221_netfilter-do_replace-overflow.diff [SECURITY] Fix buffer overflow in netfilter do_replace which can could be triggered by users with CAP_NET_ADMIN rights. See CVE-2006-0038 * 222_binfmt-bad-elf-entry-address.diff [SECURITY][amd64] Fix potential local DoS vulnerability in the binfmt_elf code on em64t processors See CVE-2006-0741 stable/main/binary-ia64/mips-tools_2.4.27-10.sarge3.040815-1_ia64.deb kernel-patch-2.4.27-mips (2.4.27-10.sarge3.040815-1) stable-security; urgency=high * Build against kernel-tree-2.4.27-10sarge3: * 207_smbfs-chroot-escape.diff [SECURITY] Fix directory traversal vulnerability in smbfs that permits local users to escape chroot restrictions See CVE-2006-1864 * 208_ia64-die_if_kernel-returns.diff [SECURITY][ia64] Fix a potential local DoS on ia64 systems caused by an incorrect 'noreturn' attribute on die_if_kernel() See CVE-2006-0742 * 209_sctp-discard-unexpected-in-closed.diff [SECURITY] Fix remote DoS in SCTP code by discarding unexpected chunks received in CLOSED state instead of calling BUG() See CVE-2006-2271 * 210_ipv4-id-no-increment.diff [SECURITY] Fix vulnerability that allows remote attackers to conduct an Idle Scan attack, bypassing intended protections against such attacks See CVE-2006-1242 * 211_usb-gadget-rndis-bufoverflow.diff [SECURITY] Fix buffer overflow in the USB Gadget RNDIS implementation that allows for a remote DoS attack (kmalloc'd memory corruption) See CVE-2006-1368 * 212_ipv4-sin_zero_clear.diff [SECURITY] Fix local information leak in af_inet code See CVE-2006-1343 * 213_madvise_remove-restrict.diff [SECURITY] Fix vulnerability that allows local users to bypass IPC permissions and replace portions of read-only tmpfs files with zeroes. See CVE-2006-1524 * 214_mcast-ip-route-null-deref.diff [SECURITY] Fix local DoS vulnerability that allows local users to panic a system by requesting a route for a multicast IP See CVE-2006-1525 * 215_sctp-fragment-recurse.diff [SECURITY] Fix remote DoS vulnerability that can lead to infinite recursion when a packet containing two or more DATA fragments is received See CVE-2006-2274 * 216_sctp-fragmented-receive-fix.diff [SECURITY] Fix remote DoS vulnerability that allows IP fragmented COOKIE_ECHO and HEARTBEAT SCTP control chunks to cause a kernel panic See CVE-2006-2272 * 217_amd64-fp-reg-leak.diff [SECURITY][amd64] Fix an information leak that allows a process to see a portion of the floating point state of other processes, possibly exposing sensitive information. See CVE-2006-1056 * 218_do_add_counters-race.diff [SECURITY] Fix race condition in the do_add_counters() function in netfilter that allows local users with CAP_NET_ADMIN capabilities to read kernel memory See CVE-2006-0039 * 219_sctp-hb-ack-overflow.diff [SECURITY] Fix a remote buffer overflow that can result from a badly formatted HB-ACK chunk See CVE-2006-1857 * 220_sctp-param-bound-checks.diff [SECURITY] Fix a bound checking error (remote DoS) in the SCTP parameter checking code See CVE-2006-1858 * 221_netfilter-do_replace-overflow.diff [SECURITY] Fix buffer overflow in netfilter do_replace which can could be triggered by users with CAP_NET_ADMIN rights. See CVE-2006-0038 * 222_binfmt-bad-elf-entry-address.diff [SECURITY][amd64] Fix potential local DoS vulnerability in the binfmt_elf code on em64t processors See CVE-2006-0741 stable/main/binary-i386/mips-tools_2.4.27-10.sarge3.040815-1_i386.deb kernel-patch-2.4.27-mips (2.4.27-10.sarge3.040815-1) stable-security; urgency=high * Build against kernel-tree-2.4.27-10sarge3: * 207_smbfs-chroot-escape.diff [SECURITY] Fix directory traversal vulnerability in smbfs that permits local users to escape chroot restrictions See CVE-2006-1864 * 208_ia64-die_if_kernel-returns.diff [SECURITY][ia64] Fix a potential local DoS on ia64 systems caused by an incorrect 'noreturn' attribute on die_if_kernel() See CVE-2006-0742 * 209_sctp-discard-unexpected-in-closed.diff [SECURITY] Fix remote DoS in SCTP code by discarding unexpected chunks received in CLOSED state instead of calling BUG() See CVE-2006-2271 * 210_ipv4-id-no-increment.diff [SECURITY] Fix vulnerability that allows remote attackers to conduct an Idle Scan attack, bypassing intended protections against such attacks See CVE-2006-1242 * 211_usb-gadget-rndis-bufoverflow.diff [SECURITY] Fix buffer overflow in the USB Gadget RNDIS implementation that allows for a remote DoS attack (kmalloc'd memory corruption) See CVE-2006-1368 * 212_ipv4-sin_zero_clear.diff [SECURITY] Fix local information leak in af_inet code See CVE-2006-1343 * 213_madvise_remove-restrict.diff [SECURITY] Fix vulnerability that allows local users to bypass IPC permissions and replace portions of read-only tmpfs files with zeroes. See CVE-2006-1524 * 214_mcast-ip-route-null-deref.diff [SECURITY] Fix local DoS vulnerability that allows local users to panic a system by requesting a route for a multicast IP See CVE-2006-1525 * 215_sctp-fragment-recurse.diff [SECURITY] Fix remote DoS vulnerability that can lead to infinite recursion when a packet containing two or more DATA fragments is received See CVE-2006-2274 * 216_sctp-fragmented-receive-fix.diff [SECURITY] Fix remote DoS vulnerability that allows IP fragmented COOKIE_ECHO and HEARTBEAT SCTP control chunks to cause a kernel panic See CVE-2006-2272 * 217_amd64-fp-reg-leak.diff [SECURITY][amd64] Fix an information leak that allows a process to see a portion of the floating point state of other processes, possibly exposing sensitive information. See CVE-2006-1056 * 218_do_add_counters-race.diff [SECURITY] Fix race condition in the do_add_counters() function in netfilter that allows local users with CAP_NET_ADMIN capabilities to read kernel memory See CVE-2006-0039 * 219_sctp-hb-ack-overflow.diff [SECURITY] Fix a remote buffer overflow that can result from a badly formatted HB-ACK chunk See CVE-2006-1857 * 220_sctp-param-bound-checks.diff [SECURITY] Fix a bound checking error (remote DoS) in the SCTP parameter checking code See CVE-2006-1858 * 221_netfilter-do_replace-overflow.diff [SECURITY] Fix buffer overflow in netfilter do_replace which can could be triggered by users with CAP_NET_ADMIN rights. See CVE-2006-0038 * 222_binfmt-bad-elf-entry-address.diff [SECURITY][amd64] Fix potential local DoS vulnerability in the binfmt_elf code on em64t processors See CVE-2006-0741 stable/main/binary-hppa/mips-tools_2.4.27-10.sarge3.040815-1_hppa.deb kernel-patch-2.4.27-mips (2.4.27-10.sarge3.040815-1) stable-security; urgency=high * Build against kernel-tree-2.4.27-10sarge3: * 207_smbfs-chroot-escape.diff [SECURITY] Fix directory traversal vulnerability in smbfs that permits local users to escape chroot restrictions See CVE-2006-1864 * 208_ia64-die_if_kernel-returns.diff [SECURITY][ia64] Fix a potential local DoS on ia64 systems caused by an incorrect 'noreturn' attribute on die_if_kernel() See CVE-2006-0742 * 209_sctp-discard-unexpected-in-closed.diff [SECURITY] Fix remote DoS in SCTP code by discarding unexpected chunks received in CLOSED state instead of calling BUG() See CVE-2006-2271 * 210_ipv4-id-no-increment.diff [SECURITY] Fix vulnerability that allows remote attackers to conduct an Idle Scan attack, bypassing intended protections against such attacks See CVE-2006-1242 * 211_usb-gadget-rndis-bufoverflow.diff [SECURITY] Fix buffer overflow in the USB Gadget RNDIS implementation that allows for a remote DoS attack (kmalloc'd memory corruption) See CVE-2006-1368 * 212_ipv4-sin_zero_clear.diff [SECURITY] Fix local information leak in af_inet code See CVE-2006-1343 * 213_madvise_remove-restrict.diff [SECURITY] Fix vulnerability that allows local users to bypass IPC permissions and replace portions of read-only tmpfs files with zeroes. See CVE-2006-1524 * 214_mcast-ip-route-null-deref.diff [SECURITY] Fix local DoS vulnerability that allows local users to panic a system by requesting a route for a multicast IP See CVE-2006-1525 * 215_sctp-fragment-recurse.diff [SECURITY] Fix remote DoS vulnerability that can lead to infinite recursion when a packet containing two or more DATA fragments is received See CVE-2006-2274 * 216_sctp-fragmented-receive-fix.diff [SECURITY] Fix remote DoS vulnerability that allows IP fragmented COOKIE_ECHO and HEARTBEAT SCTP control chunks to cause a kernel panic See CVE-2006-2272 * 217_amd64-fp-reg-leak.diff [SECURITY][amd64] Fix an information leak that allows a process to see a portion of the floating point state of other processes, possibly exposing sensitive information. See CVE-2006-1056 * 218_do_add_counters-race.diff [SECURITY] Fix race condition in the do_add_counters() function in netfilter that allows local users with CAP_NET_ADMIN capabilities to read kernel memory See CVE-2006-0039 * 219_sctp-hb-ack-overflow.diff [SECURITY] Fix a remote buffer overflow that can result from a badly formatted HB-ACK chunk See CVE-2006-1857 * 220_sctp-param-bound-checks.diff [SECURITY] Fix a bound checking error (remote DoS) in the SCTP parameter checking code See CVE-2006-1858 * 221_netfilter-do_replace-overflow.diff [SECURITY] Fix buffer overflow in netfilter do_replace which can could be triggered by users with CAP_NET_ADMIN rights. See CVE-2006-0038 * 222_binfmt-bad-elf-entry-address.diff [SECURITY][amd64] Fix potential local DoS vulnerability in the binfmt_elf code on em64t processors See CVE-2006-0741 stable/main/binary-arm/mips-tools_2.4.27-10.sarge3.040815-1_arm.deb kernel-patch-2.4.27-mips (2.4.27-10.sarge3.040815-1) stable-security; urgency=high * Build against kernel-tree-2.4.27-10sarge3: * 207_smbfs-chroot-escape.diff [SECURITY] Fix directory traversal vulnerability in smbfs that permits local users to escape chroot restrictions See CVE-2006-1864 * 208_ia64-die_if_kernel-returns.diff [SECURITY][ia64] Fix a potential local DoS on ia64 systems caused by an incorrect 'noreturn' attribute on die_if_kernel() See CVE-2006-0742 * 209_sctp-discard-unexpected-in-closed.diff [SECURITY] Fix remote DoS in SCTP code by discarding unexpected chunks received in CLOSED state instead of calling BUG() See CVE-2006-2271 * 210_ipv4-id-no-increment.diff [SECURITY] Fix vulnerability that allows remote attackers to conduct an Idle Scan attack, bypassing intended protections against such attacks See CVE-2006-1242 * 211_usb-gadget-rndis-bufoverflow.diff [SECURITY] Fix buffer overflow in the USB Gadget RNDIS implementation that allows for a remote DoS attack (kmalloc'd memory corruption) See CVE-2006-1368 * 212_ipv4-sin_zero_clear.diff [SECURITY] Fix local information leak in af_inet code See CVE-2006-1343 * 213_madvise_remove-restrict.diff [SECURITY] Fix vulnerability that allows local users to bypass IPC permissions and replace portions of read-only tmpfs files with zeroes. See CVE-2006-1524 * 214_mcast-ip-route-null-deref.diff [SECURITY] Fix local DoS vulnerability that allows local users to panic a system by requesting a route for a multicast IP See CVE-2006-1525 * 215_sctp-fragment-recurse.diff [SECURITY] Fix remote DoS vulnerability that can lead to infinite recursion when a packet containing two or more DATA fragments is received See CVE-2006-2274 * 216_sctp-fragmented-receive-fix.diff [SECURITY] Fix remote DoS vulnerability that allows IP fragmented COOKIE_ECHO and HEARTBEAT SCTP control chunks to cause a kernel panic See CVE-2006-2272 * 217_amd64-fp-reg-leak.diff [SECURITY][amd64] Fix an information leak that allows a process to see a portion of the floating point state of other processes, possibly exposing sensitive information. See CVE-2006-1056 * 218_do_add_counters-race.diff [SECURITY] Fix race condition in the do_add_counters() function in netfilter that allows local users with CAP_NET_ADMIN capabilities to read kernel memory See CVE-2006-0039 * 219_sctp-hb-ack-overflow.diff [SECURITY] Fix a remote buffer overflow that can result from a badly formatted HB-ACK chunk See CVE-2006-1857 * 220_sctp-param-bound-checks.diff [SECURITY] Fix a bound checking error (remote DoS) in the SCTP parameter checking code See CVE-2006-1858 * 221_netfilter-do_replace-overflow.diff [SECURITY] Fix buffer overflow in netfilter do_replace which can could be triggered by users with CAP_NET_ADMIN rights. See CVE-2006-0038 * 222_binfmt-bad-elf-entry-address.diff [SECURITY][amd64] Fix potential local DoS vulnerability in the binfmt_elf code on em64t processors See CVE-2006-0741 stable/main/binary-alpha/mips-tools_2.4.27-10.sarge3.040815-1_alpha.deb kernel-patch-2.4.27-mips (2.4.27-10.sarge3.040815-1) stable-security; urgency=high * Build against kernel-tree-2.4.27-10sarge3: * 207_smbfs-chroot-escape.diff [SECURITY] Fix directory traversal vulnerability in smbfs that permits local users to escape chroot restrictions See CVE-2006-1864 * 208_ia64-die_if_kernel-returns.diff [SECURITY][ia64] Fix a potential local DoS on ia64 systems caused by an incorrect 'noreturn' attribute on die_if_kernel() See CVE-2006-0742 * 209_sctp-discard-unexpected-in-closed.diff [SECURITY] Fix remote DoS in SCTP code by discarding unexpected chunks received in CLOSED state instead of calling BUG() See CVE-2006-2271 * 210_ipv4-id-no-increment.diff [SECURITY] Fix vulnerability that allows remote attackers to conduct an Idle Scan attack, bypassing intended protections against such attacks See CVE-2006-1242 * 211_usb-gadget-rndis-bufoverflow.diff [SECURITY] Fix buffer overflow in the USB Gadget RNDIS implementation that allows for a remote DoS attack (kmalloc'd memory corruption) See CVE-2006-1368 * 212_ipv4-sin_zero_clear.diff [SECURITY] Fix local information leak in af_inet code See CVE-2006-1343 * 213_madvise_remove-restrict.diff [SECURITY] Fix vulnerability that allows local users to bypass IPC permissions and replace portions of read-only tmpfs files with zeroes. See CVE-2006-1524 * 214_mcast-ip-route-null-deref.diff [SECURITY] Fix local DoS vulnerability that allows local users to panic a system by requesting a route for a multicast IP See CVE-2006-1525 * 215_sctp-fragment-recurse.diff [SECURITY] Fix remote DoS vulnerability that can lead to infinite recursion when a packet containing two or more DATA fragments is received See CVE-2006-2274 * 216_sctp-fragmented-receive-fix.diff [SECURITY] Fix remote DoS vulnerability that allows IP fragmented COOKIE_ECHO and HEARTBEAT SCTP control chunks to cause a kernel panic See CVE-2006-2272 * 217_amd64-fp-reg-leak.diff [SECURITY][amd64] Fix an information leak that allows a process to see a portion of the floating point state of other processes, possibly exposing sensitive information. See CVE-2006-1056 * 218_do_add_counters-race.diff [SECURITY] Fix race condition in the do_add_counters() function in netfilter that allows local users with CAP_NET_ADMIN capabilities to read kernel memory See CVE-2006-0039 * 219_sctp-hb-ack-overflow.diff [SECURITY] Fix a remote buffer overflow that can result from a badly formatted HB-ACK chunk See CVE-2006-1857 * 220_sctp-param-bound-checks.diff [SECURITY] Fix a bound checking error (remote DoS) in the SCTP parameter checking code See CVE-2006-1858 * 221_netfilter-do_replace-overflow.diff [SECURITY] Fix buffer overflow in netfilter do_replace which can could be triggered by users with CAP_NET_ADMIN rights. See CVE-2006-0038 * 222_binfmt-bad-elf-entry-address.diff [SECURITY][amd64] Fix potential local DoS vulnerability in the binfmt_elf code on em64t processors See CVE-2006-0741 stable/main/binary-mipsel/kernel-image-2.4.27-sb1-swarm-bn_2.4.27-10.sarge3.040815-1_mipsel.deb stable/main/binary-mips/kernel-image-2.4.27-r4k-ip22_2.4.27-10.sarge3.040815-1_mips.deb stable/main/binary-mipsel/mips-tools_2.4.27-10.sarge3.040815-1_mipsel.deb stable/main/binary-mipsel/kernel-image-2.4.27-r3k-kn02_2.4.27-10.sarge3.040815-1_mipsel.deb stable/main/binary-mips/kernel-image-2.4.27-sb1-swarm-bn_2.4.27-10.sarge3.040815-1_mips.deb stable/main/binary-mipsel/kernel-image-2.4.27-r4k-kn04_2.4.27-10.sarge3.040815-1_mipsel.deb stable/main/source/kernel-patch-2.4.27-mips_2.4.27-10.sarge3.040815-1.tar.gz stable/main/binary-mipsel/kernel-headers-2.4.27_2.4.27-10.sarge3.040815-1_mipsel.deb stable/main/binary-mips/kernel-image-2.4.27-r5k-ip22_2.4.27-10.sarge3.040815-1_mips.deb stable/main/binary-mipsel/kernel-image-2.4.27-r5k-cobalt_2.4.27-10.sarge3.040815-1_mipsel.deb stable/main/binary-mipsel/kernel-image-2.4.27-r5k-lasat_2.4.27-10.sarge3.040815-1_mipsel.deb stable/main/binary-mips/mips-tools_2.4.27-10.sarge3.040815-1_mips.deb stable/main/binary-mips/kernel-headers-2.4.27_2.4.27-10.sarge3.040815-1_mips.deb stable/main/binary-mipsel/kernel-image-2.4.27-xxs1500_2.4.27-10.sarge3.040815-1_mipsel.deb stable/main/source/kernel-patch-2.4.27-mips_2.4.27-10.sarge3.040815-1.dsc kernel-patch-2.4.27-mips (2.4.27-10.sarge3.040815-1) stable-security; urgency=high * Build against kernel-tree-2.4.27-10sarge3: * 207_smbfs-chroot-escape.diff [SECURITY] Fix directory traversal vulnerability in smbfs that permits local users to escape chroot restrictions See CVE-2006-1864 * 208_ia64-die_if_kernel-returns.diff [SECURITY][ia64] Fix a potential local DoS on ia64 systems caused by an incorrect 'noreturn' attribute on die_if_kernel() See CVE-2006-0742 * 209_sctp-discard-unexpected-in-closed.diff [SECURITY] Fix remote DoS in SCTP code by discarding unexpected chunks received in CLOSED state instead of calling BUG() See CVE-2006-2271 * 210_ipv4-id-no-increment.diff [SECURITY] Fix vulnerability that allows remote attackers to conduct an Idle Scan attack, bypassing intended protections against such attacks See CVE-2006-1242 * 211_usb-gadget-rndis-bufoverflow.diff [SECURITY] Fix buffer overflow in the USB Gadget RNDIS implementation that allows for a remote DoS attack (kmalloc'd memory corruption) See CVE-2006-1368 * 212_ipv4-sin_zero_clear.diff [SECURITY] Fix local information leak in af_inet code See CVE-2006-1343 * 213_madvise_remove-restrict.diff [SECURITY] Fix vulnerability that allows local users to bypass IPC permissions and replace portions of read-only tmpfs files with zeroes. See CVE-2006-1524 * 214_mcast-ip-route-null-deref.diff [SECURITY] Fix local DoS vulnerability that allows local users to panic a system by requesting a route for a multicast IP See CVE-2006-1525 * 215_sctp-fragment-recurse.diff [SECURITY] Fix remote DoS vulnerability that can lead to infinite recursion when a packet containing two or more DATA fragments is received See CVE-2006-2274 * 216_sctp-fragmented-receive-fix.diff [SECURITY] Fix remote DoS vulnerability that allows IP fragmented COOKIE_ECHO and HEARTBEAT SCTP control chunks to cause a kernel panic See CVE-2006-2272 * 217_amd64-fp-reg-leak.diff [SECURITY][amd64] Fix an information leak that allows a process to see a portion of the floating point state of other processes, possibly exposing sensitive information. See CVE-2006-1056 * 218_do_add_counters-race.diff [SECURITY] Fix race condition in the do_add_counters() function in netfilter that allows local users with CAP_NET_ADMIN capabilities to read kernel memory See CVE-2006-0039 * 219_sctp-hb-ack-overflow.diff [SECURITY] Fix a remote buffer overflow that can result from a badly formatted HB-ACK chunk See CVE-2006-1857 * 220_sctp-param-bound-checks.diff [SECURITY] Fix a bound checking error (remote DoS) in the SCTP parameter checking code See CVE-2006-1858 * 221_netfilter-do_replace-overflow.diff [SECURITY] Fix buffer overflow in netfilter do_replace which can could be triggered by users with CAP_NET_ADMIN rights. See CVE-2006-0038 * 222_binfmt-bad-elf-entry-address.diff [SECURITY][amd64] Fix potential local DoS vulnerability in the binfmt_elf code on em64t processors See CVE-2006-0741 stable/main/source/kernel-latest-powerpc_102sarge1.dsc stable/main/binary-powerpc/kernel-image-powerpc-smp_102sarge1_powerpc.deb stable/main/binary-powerpc/kernel-image-2.6-powerpc-smp_102sarge1_powerpc.deb stable/main/binary-powerpc/kernel-headers-2.4_102sarge1_powerpc.deb stable/main/source/kernel-latest-powerpc_102sarge1.tar.gz stable/main/binary-powerpc/kernel-image-2.6-power3-smp_102sarge1_powerpc.deb stable/main/binary-powerpc/kernel-image-2.4-powerpc_102sarge1_powerpc.deb stable/main/binary-powerpc/kernel-image-powerpc_102sarge1_powerpc.deb stable/main/binary-powerpc/kernel-image-power4_102sarge1_powerpc.deb stable/main/binary-powerpc/kernel-image-power4-smp_102sarge1_powerpc.deb stable/main/binary-powerpc/kernel-headers_102sarge1_powerpc.deb stable/main/binary-powerpc/kernel-image-2.6-power3_102sarge1_powerpc.deb stable/main/binary-powerpc/kernel-image-2.6-powerpc_102sarge1_powerpc.deb stable/main/binary-powerpc/kernel-image-power3-smp_102sarge1_powerpc.deb stable/main/binary-powerpc/kernel-image-power3_102sarge1_powerpc.deb stable/main/binary-powerpc/kernel-image-2.4-powerpc-smp_102sarge1_powerpc.deb stable/main/binary-powerpc/kernel-headers-2.6_102sarge1_powerpc.deb stable/main/binary-powerpc/kernel-image-2.6-power4-smp_102sarge1_powerpc.deb stable/main/binary-powerpc/kernel-image-2.6-power4_102sarge1_powerpc.deb kernel-latest-powerpc (102sarge1) stable-security; urgency=high * Update 2.6 dependencies for the -3 ABI. stable/main/binary-sparc/kernel-image-2.6-sparc64_101sarge1_sparc.deb stable/main/binary-sparc/kernel-image-2.6-sparc32_101sarge1_sparc.deb stable/main/binary-sparc/kernel-headers-2.6-sparc64-smp_101sarge1_sparc.deb stable/main/binary-sparc/kernel-headers-2.6-sparc32_101sarge1_sparc.deb stable/main/source/kernel-latest-2.6-sparc_101sarge1.tar.gz stable/main/binary-sparc/kernel-headers-2.6-sparc64_101sarge1_sparc.deb stable/main/binary-sparc/kernel-image-2.6-sparc64-smp_101sarge1_sparc.deb stable/main/source/kernel-latest-2.6-sparc_101sarge1.dsc kernel-latest-2.6-sparc (101sarge1) stable-security; urgency=high * Update for the -3 ABI stable/main/source/kernel-latest-2.6-i386_101sarge1.tar.gz stable/main/binary-i386/kernel-headers-2.6-386_101sarge1_i386.deb stable/main/binary-i386/kernel-image-2.6-386_101sarge1_i386.deb stable/main/binary-i386/kernel-image-2.6-686-smp_101sarge1_i386.deb stable/main/source/kernel-latest-2.6-i386_101sarge1.dsc stable/main/binary-i386/kernel-headers-2.6-k7_101sarge1_i386.deb stable/main/binary-i386/kernel-headers-2.6-686-smp_101sarge1_i386.deb stable/main/binary-i386/kernel-image-2.6-k7_101sarge1_i386.deb stable/main/binary-i386/kernel-headers-2.6-k7-smp_101sarge1_i386.deb stable/main/binary-i386/kernel-image-2.6-k7-smp_101sarge1_i386.deb stable/main/binary-i386/kernel-image-2.6-686_101sarge1_i386.deb stable/main/binary-i386/kernel-headers-2.6-686_101sarge1_i386.deb kernel-latest-2.6-i386 (101sarge1) stable-security; urgency=high * Update for the -3 ABI stable/main/source/kernel-latest-2.6-hppa_2.6.8-1sarge1.dsc stable/main/binary-hppa/kernel-image-2.6-64_2.6.8-1sarge1_hppa.deb stable/main/binary-hppa/kernel-headers-2.6-64-smp_2.6.8-1sarge1_hppa.deb stable/main/binary-hppa/kernel-headers-2.6-32-smp_2.6.8-1sarge1_hppa.deb stable/main/source/kernel-latest-2.6-hppa_2.6.8-1sarge1.tar.gz stable/main/binary-hppa/kernel-headers-2.6-64_2.6.8-1sarge1_hppa.deb stable/main/binary-hppa/kernel-headers-2.6_2.6.8-1sarge1_hppa.deb stable/main/binary-hppa/kernel-image-2.6-64-smp_2.6.8-1sarge1_hppa.deb stable/main/binary-hppa/kernel-image-2.6-32-smp_2.6.8-1sarge1_hppa.deb stable/main/binary-hppa/kernel-image-2.6-32_2.6.8-1sarge1_hppa.deb stable/main/binary-hppa/kernel-headers-2.6-32_2.6.8-1sarge1_hppa.deb kernel-latest-2.6-hppa (2.6.8-1sarge1) stable-security; urgency=high * Update for the -3 ABI stable/main/binary-alpha/kernel-headers-2.6-generic_101sarge1_alpha.deb stable/main/binary-alpha/kernel-image-2.6-generic_101sarge1_alpha.deb stable/main/source/kernel-latest-2.6-alpha_101sarge1.tar.gz stable/main/source/kernel-latest-2.6-alpha_101sarge1.dsc stable/main/binary-alpha/kernel-image-2.6-smp_101sarge1_alpha.deb stable/main/binary-alpha/kernel-headers-2.6-smp_101sarge1_alpha.deb kernel-latest-2.6-alpha (101sarge1) stable-security; urgency=high * Update for the -3 ABI stable/main/binary-sparc/kernel-headers-2.4-sparc64-smp_42sarge2_sparc.deb stable/main/binary-sparc/kernel-headers-2.4-sparc64_42sarge2_sparc.deb stable/main/binary-sparc/kernel-headers-2.4-sparc32_42sarge2_sparc.deb stable/main/binary-sparc/kernel-headers-2.4-sparc32-smp_42sarge2_sparc.deb stable/main/binary-sparc/kernel-image-2.4-sparc32-smp_42sarge2_sparc.deb stable/main/binary-sparc/kernel-image-2.4-sparc64-smp_42sarge2_sparc.deb stable/main/source/kernel-latest-2.4-sparc_42sarge2.tar.gz stable/main/source/kernel-latest-2.4-sparc_42sarge2.dsc stable/main/binary-sparc/kernel-image-2.4-sparc64_42sarge2_sparc.deb stable/main/binary-sparc/kernel-image-2.4-sparc32_42sarge2_sparc.deb kernel-latest-2.4-sparc (42sarge2) stable-security; urgency=high * Really update for -3 ABI stable/main/binary-s390/kernel-image-2.4-s390x_2.4.27-1sarge1_s390.deb stable/main/source/kernel-latest-2.4-s390_2.4.27-1sarge1.tar.gz stable/main/binary-s390/kernel-headers-2.4-s390_2.4.27-1sarge1_s390.deb stable/main/binary-s390/kernel-image-2.4-s390_2.4.27-1sarge1_s390.deb stable/main/source/kernel-latest-2.4-s390_2.4.27-1sarge1.dsc kernel-latest-2.4-s390 (2.4.27-1sarge1) stable-security; urgency=high * Update for the -3 ABI stable/main/binary-i386/kernel-pcmcia-modules-2.4-k7-smp_101sarge1_i386.deb stable/main/binary-i386/kernel-pcmcia-modules-2.4-686_101sarge1_i386.deb stable/main/binary-i386/kernel-headers-2.4-686-smp_101sarge1_i386.deb stable/main/binary-i386/kernel-pcmcia-modules-2.4-586tsc_101sarge1_i386.deb stable/main/source/kernel-latest-2.4-i386_101sarge1.dsc stable/main/binary-i386/kernel-image-2.4-k6_101sarge1_i386.deb stable/main/binary-i386/kernel-image-2.4-386_101sarge1_i386.deb stable/main/binary-i386/kernel-image-2.4-686_101sarge1_i386.deb stable/main/binary-i386/kernel-image-2.4-686-smp_101sarge1_i386.deb stable/main/binary-i386/kernel-image-2.4-k7-smp_101sarge1_i386.deb stable/main/binary-i386/kernel-pcmcia-modules-2.4-386_101sarge1_i386.deb stable/main/binary-i386/kernel-pcmcia-modules-2.4-686-smp_101sarge1_i386.deb stable/main/binary-i386/kernel-image-2.4-586tsc_101sarge1_i386.deb stable/main/source/kernel-latest-2.4-i386_101sarge1.tar.gz stable/main/binary-i386/kernel-pcmcia-modules-2.4-k6_101sarge1_i386.deb stable/main/binary-i386/kernel-pcmcia-modules-2.4-k7_101sarge1_i386.deb stable/main/binary-i386/kernel-headers-2.4-386_101sarge1_i386.deb stable/main/binary-i386/kernel-headers-2.4-686_101sarge1_i386.deb stable/main/binary-i386/kernel-headers-2.4-k6_101sarge1_i386.deb stable/main/binary-i386/kernel-headers-2.4-k7-smp_101sarge1_i386.deb stable/main/binary-i386/kernel-image-2.4-k7_101sarge1_i386.deb stable/main/binary-i386/kernel-headers-2.4-k7_101sarge1_i386.deb stable/main/binary-i386/kernel-headers-2.4-586tsc_101sarge1_i386.deb kernel-latest-2.4-i386 (101sarge1) stable-security; urgency=high * Update for the -3 ABI stable/main/binary-alpha/kernel-headers-2.4-smp_101sarge1_alpha.deb stable/main/source/kernel-latest-2.4-alpha_101sarge1.dsc stable/main/binary-alpha/kernel-image-2.4-smp_101sarge1_alpha.deb stable/main/binary-alpha/kernel-headers-2.4-generic_101sarge1_alpha.deb stable/main/binary-alpha/kernel-image-2.4-generic_101sarge1_alpha.deb stable/main/source/kernel-latest-2.4-alpha_101sarge1.tar.gz kernel-latest-2.4-alpha (101sarge1) stable-security; urgency=high * Update for -3 ABI stable/main/source/kernel-image-speakup-i386_2.4.27-1.1sarge2.tar.gz stable/main/binary-i386/kernel-headers-2.4.27-speakup_2.4.27-1.1sarge2_i386.deb stable/main/binary-i386/kernel-image-2.4.27-speakup_2.4.27-1.1sarge2_i386.deb stable/main/binary-all/kernel-doc-2.4.27-speakup_2.4.27-1.1sarge2_all.deb stable/main/source/kernel-image-speakup-i386_2.4.27-1.1sarge2.dsc kernel-image-speakup-i386 (2.4.27-1.1sarge2) stable-security; urgency=high * NMU by the Security Team * Build against kernel-tree-2.4.27-10sarge3: * 207_smbfs-chroot-escape.diff [SECURITY] Fix directory traversal vulnerability in smbfs that permits local users to escape chroot restrictions See CVE-2006-1864 * 208_ia64-die_if_kernel-returns.diff [SECURITY][ia64] Fix a potential local DoS on ia64 systems caused by an incorrect 'noreturn' attribute on die_if_kernel() See CVE-2006-0742 * 209_sctp-discard-unexpected-in-closed.diff [SECURITY] Fix remote DoS in SCTP code by discarding unexpected chunks received in CLOSED state instead of calling BUG() See CVE-2006-2271 * 210_ipv4-id-no-increment.diff [SECURITY] Fix vulnerability that allows remote attackers to conduct an Idle Scan attack, bypassing intended protections against such attacks See CVE-2006-1242 * 211_usb-gadget-rndis-bufoverflow.diff [SECURITY] Fix buffer overflow in the USB Gadget RNDIS implementation that allows for a remote DoS attack (kmalloc'd memory corruption) See CVE-2006-1368 * 212_ipv4-sin_zero_clear.diff [SECURITY] Fix local information leak in af_inet code See CVE-2006-1343 * 213_madvise_remove-restrict.diff [SECURITY] Fix vulnerability that allows local users to bypass IPC permissions and replace portions of read-only tmpfs files with zeroes. See CVE-2006-1524 * 214_mcast-ip-route-null-deref.diff [SECURITY] Fix local DoS vulnerability that allows local users to panic a system by requesting a route for a multicast IP See CVE-2006-1525 * 215_sctp-fragment-recurse.diff [SECURITY] Fix remote DoS vulnerability that can lead to infinite recursion when a packet containing two or more DATA fragments is received See CVE-2006-2274 * 216_sctp-fragmented-receive-fix.diff [SECURITY] Fix remote DoS vulnerability that allows IP fragmented COOKIE_ECHO and HEARTBEAT SCTP control chunks to cause a kernel panic See CVE-2006-2272 * 217_amd64-fp-reg-leak.diff [SECURITY][amd64] Fix an information leak that allows a process to see a portion of the floating point state of other processes, possibly exposing sensitive information. See CVE-2006-1056 * 218_do_add_counters-race.diff [SECURITY] Fix race condition in the do_add_counters() function in netfilter that allows local users with CAP_NET_ADMIN capabilities to read kernel memory See CVE-2006-0039 * 219_sctp-hb-ack-overflow.diff [SECURITY] Fix a remote buffer overflow that can result from a badly formatted HB-ACK chunk See CVE-2006-1857 * 220_sctp-param-bound-checks.diff [SECURITY] Fix a bound checking error (remote DoS) in the SCTP parameter checking code See CVE-2006-1858 * 221_netfilter-do_replace-overflow.diff [SECURITY] Fix buffer overflow in netfilter do_replace which can could be triggered by users with CAP_NET_ADMIN rights. See CVE-2006-0038 * 222_binfmt-bad-elf-entry-address.diff [SECURITY][amd64] Fix potential local DoS vulnerability in the binfmt_elf code on em64t processors See CVE-2006-0741 stable/main/binary-sparc/kernel-image-2.6.8-3-sparc64_2.6.8-15sarge4_sparc.deb stable/main/binary-sparc/kernel-headers-2.6.8-3-sparc64-smp_2.6.8-15sarge4_sparc.deb stable/main/binary-sparc/kernel-headers-2.6.8-3-sparc64_2.6.8-15sarge4_sparc.deb stable/main/binary-sparc/kernel-headers-2.6.8-3_2.6.8-15sarge4_sparc.deb stable/main/binary-sparc/kernel-headers-2.6.8-3-sparc32_2.6.8-15sarge4_sparc.deb stable/main/binary-sparc/kernel-image-2.6.8-3-sparc32_2.6.8-15sarge4_sparc.deb stable/main/source/kernel-image-2.6.8-sparc_2.6.8-15sarge4.tar.gz stable/main/binary-sparc/kernel-image-2.6.8-3-sparc64-smp_2.6.8-15sarge4_sparc.deb stable/main/source/kernel-image-2.6.8-sparc_2.6.8-15sarge4.dsc stable/main/binary-sparc/kernel-build-2.6.8-3_2.6.8-15sarge4_sparc.deb kernel-image-2.6.8-sparc (2.6.8-15sarge4) stable-security; urgency=high * Build against kernel-tree-2.6.8-16sarge4: * proc-environ-race-1.dpatch, proc-environ-race-2.dpatch [SECURITY] Fix local root vulnerability caused by a race in proc See CVE-2006-3626 stable/main/binary-s390/kernel-image-2.6.8-3-s390-tape_2.6.8-5sarge4_s390.deb stable/main/binary-s390/kernel-image-2.6.8-3-s390_2.6.8-5sarge4_s390.deb stable/main/binary-s390/kernel-image-2.6.8-3-s390x_2.6.8-5sarge4_s390.deb stable/main/source/kernel-image-2.6.8-s390_2.6.8-5sarge4.dsc stable/main/binary-s390/kernel-headers-2.6.8-3_2.6.8-5sarge4_s390.deb stable/main/binary-all/kernel-patch-2.6.8-s390_2.6.8-5sarge4_all.deb stable/main/source/kernel-image-2.6.8-s390_2.6.8-5sarge4.tar.gz kernel-image-2.6.8-s390 (2.6.8-5sarge4) stable-security; urgency=high * Build against kernel-tree-2.6.8-16sarge4: * proc-environ-race-1.dpatch, proc-environ-race-2.dpatch [SECURITY] Fix local root vulnerability caused by a race in proc See CVE-2006-3626 stable/main/binary-m68k/kernel-image-2.6.8-mvme147_2.6.8-4sarge4_m68k.deb stable/main/binary-m68k/kernel-image-2.6.8-bvme6000_2.6.8-4sarge4_m68k.deb stable/main/binary-m68k/kernel-image-2.6.8-atari_2.6.8-4sarge4_m68k.deb stable/main/binary-m68k/kernel-image-2.6.8-mvme16x_2.6.8-4sarge4_m68k.deb stable/main/binary-m68k/kernel-image-2.6.8-sun3_2.6.8-4sarge4_m68k.deb stable/main/source/kernel-image-2.6.8-m68k_2.6.8-4sarge4.tar.gz stable/main/binary-m68k/kernel-image-2.6.8-amiga_2.6.8-4sarge4_m68k.deb stable/main/binary-m68k/kernel-image-2.6.8-mac_2.6.8-4sarge4_m68k.deb stable/main/source/kernel-image-2.6.8-m68k_2.6.8-4sarge4.dsc stable/main/binary-m68k/kernel-image-2.6.8-hp_2.6.8-4sarge4_m68k.deb stable/main/binary-m68k/kernel-image-2.6.8-q40_2.6.8-4sarge4_m68k.deb kernel-image-2.6.8-m68k (2.6.8-4sarge4) stable-security; urgency=high * Build against kernel-tree-2.6.8-16sarge4: * proc-environ-race-1.dpatch, proc-environ-race-2.dpatch [SECURITY] Fix local root vulnerability caused by a race in proc See CVE-2006-3626 stable/main/binary-ia64/kernel-image-2.6.8-3-itanium-smp_2.6.8-14sarge4_ia64.deb stable/main/binary-ia64/kernel-headers-2.6.8-3-itanium_2.6.8-14sarge4_ia64.deb stable/main/binary-ia64/kernel-headers-2.6-itanium_2.6.8-14sarge4_ia64.deb stable/main/source/kernel-image-2.6.8-ia64_2.6.8-14sarge4.dsc stable/main/binary-ia64/kernel-headers-2.6-mckinley-smp_2.6.8-14sarge4_ia64.deb stable/main/binary-ia64/kernel-image-2.6-mckinley_2.6.8-14sarge4_ia64.deb stable/main/binary-ia64/kernel-image-2.6-itanium_2.6.8-14sarge4_ia64.deb stable/main/binary-ia64/kernel-image-2.6.8-3-mckinley_2.6.8-14sarge4_ia64.deb stable/main/binary-ia64/kernel-image-2.6-itanium-smp_2.6.8-14sarge4_ia64.deb stable/main/source/kernel-image-2.6.8-ia64_2.6.8-14sarge4.tar.gz stable/main/binary-ia64/kernel-headers-2.6.8-3-mckinley_2.6.8-14sarge4_ia64.deb stable/main/binary-ia64/kernel-headers-2.6.8-3-mckinley-smp_2.6.8-14sarge4_ia64.deb stable/main/binary-ia64/kernel-image-2.6.8-3-itanium_2.6.8-14sarge4_ia64.deb stable/main/binary-ia64/kernel-headers-2.6.8-3_2.6.8-14sarge4_ia64.deb stable/main/binary-ia64/kernel-image-2.6-mckinley-smp_2.6.8-14sarge4_ia64.deb stable/main/binary-ia64/kernel-image-2.6.8-3-mckinley-smp_2.6.8-14sarge4_ia64.deb stable/main/binary-ia64/kernel-headers-2.6.8-3-itanium-smp_2.6.8-14sarge4_ia64.deb stable/main/binary-ia64/kernel-headers-2.6-itanium-smp_2.6.8-14sarge4_ia64.deb stable/main/binary-ia64/kernel-headers-2.6-mckinley_2.6.8-14sarge4_ia64.deb kernel-image-2.6.8-ia64 (2.6.8-14sarge4) stable-security; urgency=high * Build against kernel-tree-2.6.8-16sarge4: * proc-environ-race-1.dpatch, proc-environ-race-2.dpatch [SECURITY] Fix local root vulnerability caused by a race in proc See CVE-2006-3626 stable/main/binary-i386/kernel-headers-2.6.8-3-686_2.6.8-16sarge4_i386.deb stable/main/binary-i386/kernel-image-2.6.8-3-k7-smp_2.6.8-16sarge4_i386.deb stable/main/binary-i386/kernel-image-2.6.8-3-386_2.6.8-16sarge4_i386.deb stable/main/binary-i386/kernel-headers-2.6.8-3_2.6.8-16sarge4_i386.deb stable/main/binary-i386/kernel-headers-2.6.8-3-k7-smp_2.6.8-16sarge4_i386.deb stable/main/binary-i386/kernel-headers-2.6.8-3-k7_2.6.8-16sarge4_i386.deb stable/main/source/kernel-image-2.6.8-i386_2.6.8-16sarge4.tar.gz stable/main/binary-i386/kernel-headers-2.6.8-3-686-smp_2.6.8-16sarge4_i386.deb stable/main/binary-i386/kernel-image-2.6.8-3-k7_2.6.8-16sarge4_i386.deb stable/main/binary-i386/kernel-image-2.6.8-3-686-smp_2.6.8-16sarge4_i386.deb stable/main/binary-i386/kernel-headers-2.6.8-3-386_2.6.8-16sarge4_i386.deb stable/main/source/kernel-image-2.6.8-i386_2.6.8-16sarge4.dsc stable/main/binary-i386/kernel-image-2.6.8-3-686_2.6.8-16sarge4_i386.deb kernel-image-2.6.8-i386 (2.6.8-16sarge4) stable-security; urgency=high * Build against kernel-tree-2.6.8-16sarge4: * proc-environ-race-1.dpatch, proc-environ-race-2.dpatch [SECURITY] Fix local root vulnerability caused by a race in proc See CVE-2006-3626 stable/main/binary-hppa/kernel-headers-2.6.8-3-32-smp_2.6.8-6sarge4_hppa.deb stable/main/source/kernel-image-2.6.8-hppa_2.6.8-6sarge4.tar.gz stable/main/binary-hppa/kernel-image-2.6.8-3-64_2.6.8-6sarge4_hppa.deb stable/main/source/kernel-image-2.6.8-hppa_2.6.8-6sarge4.dsc stable/main/binary-hppa/kernel-headers-2.6.8-3-32_2.6.8-6sarge4_hppa.deb stable/main/binary-hppa/kernel-headers-2.6.8-3-64-smp_2.6.8-6sarge4_hppa.deb stable/main/binary-hppa/kernel-headers-2.6.8-3_2.6.8-6sarge4_hppa.deb stable/main/binary-hppa/kernel-image-2.6.8-3-64-smp_2.6.8-6sarge4_hppa.deb stable/main/binary-hppa/kernel-headers-2.6.8-3-64_2.6.8-6sarge4_hppa.deb stable/main/binary-hppa/kernel-image-2.6.8-3-32-smp_2.6.8-6sarge4_hppa.deb stable/main/binary-hppa/kernel-image-2.6.8-3-32_2.6.8-6sarge4_hppa.deb kernel-image-2.6.8-hppa (2.6.8-6sarge4) stable-security; urgency=high * Build against kernel-tree-2.6.8-16sarge4: * proc-environ-race-1.dpatch, proc-environ-race-2.dpatch [SECURITY] Fix local root vulnerability caused by a race in proc See CVE-2006-3626 stable/main/binary-i386/kernel-image-2.6.8-12-em64t-p4-smp_2.6.8-16sarge4_i386.deb stable/main/binary-i386/kernel-headers-2.6.8-12-amd64-k8_2.6.8-16sarge4_i386.deb stable/main/source/kernel-image-2.6.8-amd64_2.6.8-16sarge4.tar.gz stable/main/source/kernel-image-2.6.8-amd64_2.6.8-16sarge4.dsc stable/main/binary-i386/kernel-headers-2.6.8-12-em64t-p4_2.6.8-16sarge4_i386.deb stable/main/binary-i386/kernel-headers-2.6.8-12_2.6.8-16sarge4_i386.deb stable/main/binary-i386/kernel-headers-2.6.8-12-amd64-generic_2.6.8-16sarge4_i386.deb stable/main/binary-i386/kernel-headers-2.6.8-12-em64t-p4-smp_2.6.8-16sarge4_i386.deb stable/main/binary-i386/kernel-image-2.6.8-12-amd64-generic_2.6.8-16sarge4_i386.deb stable/main/binary-i386/kernel-headers-2.6.8-12-amd64-k8-smp_2.6.8-16sarge4_i386.deb stable/main/binary-i386/kernel-image-2.6.8-12-amd64-k8-smp_2.6.8-16sarge4_i386.deb stable/main/binary-i386/kernel-image-2.6.8-12-amd64-k8_2.6.8-16sarge4_i386.deb stable/main/binary-i386/kernel-image-2.6.8-12-em64t-p4_2.6.8-16sarge4_i386.deb kernel-image-2.6.8-amd64 (2.6.8-16sarge4) stable-security; urgency=high * Build against kernel-tree-2.6.8-16sarge4: * proc-environ-race-1.dpatch, proc-environ-race-2.dpatch [SECURITY] Fix local root vulnerability caused by a race in proc See CVE-2006-3626 stable/main/binary-alpha/kernel-image-2.6.8-3-generic_2.6.8-16sarge4_alpha.deb stable/main/binary-alpha/kernel-image-2.6.8-3-smp_2.6.8-16sarge4_alpha.deb stable/main/binary-alpha/kernel-headers-2.6.8-3-smp_2.6.8-16sarge4_alpha.deb stable/main/binary-alpha/kernel-headers-2.6.8-3_2.6.8-16sarge4_alpha.deb stable/main/source/kernel-image-2.6.8-alpha_2.6.8-16sarge4.tar.gz stable/main/binary-alpha/kernel-headers-2.6.8-3-generic_2.6.8-16sarge4_alpha.deb stable/main/source/kernel-image-2.6.8-alpha_2.6.8-16sarge4.dsc kernel-image-2.6.8-alpha (2.6.8-16sarge4) stable-security; urgency=high * Build against kernel-tree-2.6.8-16sarge4: * proc-environ-race-1.dpatch, proc-environ-race-2.dpatch [SECURITY] Fix local root vulnerability caused by a race in proc See CVE-2006-3626 stable/main/binary-sparc/kernel-headers-2.4.27-3_2.4.27-9sarge3_sparc.deb stable/main/binary-sparc/kernel-image-2.4.27-3-sparc64-smp_2.4.27-9sarge3_sparc.deb stable/main/binary-sparc/kernel-image-2.4.27-3-sparc64_2.4.27-9sarge3_sparc.deb stable/main/binary-sparc/kernel-image-2.4.27-3-sparc32-smp_2.4.27-9sarge3_sparc.deb stable/main/binary-sparc/kernel-headers-2.4.27-3-sparc32-smp_2.4.27-9sarge3_sparc.deb stable/main/source/kernel-image-2.4.27-sparc_2.4.27-9sarge3.dsc stable/main/binary-sparc/kernel-headers-2.4.27-3-sparc64_2.4.27-9sarge3_sparc.deb stable/main/binary-sparc/kernel-headers-2.4.27-3-sparc64-smp_2.4.27-9sarge3_sparc.deb stable/main/binary-sparc/kernel-headers-2.4.27-3-sparc32_2.4.27-9sarge3_sparc.deb stable/main/binary-sparc/kernel-build-2.4.27-3_2.4.27-9sarge3_sparc.deb stable/main/binary-sparc/kernel-image-2.4.27-3-sparc32_2.4.27-9sarge3_sparc.deb stable/main/source/kernel-image-2.4.27-sparc_2.4.27-9sarge3.tar.gz kernel-image-2.4.27-sparc (2.4.27-9sarge3) stable-security; urgency=high * Build against kernel-tree-2.4.27-10sarge3: * 207_smbfs-chroot-escape.diff [SECURITY] Fix directory traversal vulnerability in smbfs that permits local users to escape chroot restrictions See CVE-2006-1864 * 208_ia64-die_if_kernel-returns.diff [SECURITY][ia64] Fix a potential local DoS on ia64 systems caused by an incorrect 'noreturn' attribute on die_if_kernel() See CVE-2006-0742 * 209_sctp-discard-unexpected-in-closed.diff [SECURITY] Fix remote DoS in SCTP code by discarding unexpected chunks received in CLOSED state instead of calling BUG() See CVE-2006-2271 * 210_ipv4-id-no-increment.diff [SECURITY] Fix vulnerability that allows remote attackers to conduct an Idle Scan attack, bypassing intended protections against such attacks See CVE-2006-1242 * 211_usb-gadget-rndis-bufoverflow.diff [SECURITY] Fix buffer overflow in the USB Gadget RNDIS implementation that allows for a remote DoS attack (kmalloc'd memory corruption) See CVE-2006-1368 * 212_ipv4-sin_zero_clear.diff [SECURITY] Fix local information leak in af_inet code See CVE-2006-1343 * 213_madvise_remove-restrict.diff [SECURITY] Fix vulnerability that allows local users to bypass IPC permissions and replace portions of read-only tmpfs files with zeroes. See CVE-2006-1524 * 214_mcast-ip-route-null-deref.diff [SECURITY] Fix local DoS vulnerability that allows local users to panic a system by requesting a route for a multicast IP See CVE-2006-1525 * 215_sctp-fragment-recurse.diff [SECURITY] Fix remote DoS vulnerability that can lead to infinite recursion when a packet containing two or more DATA fragments is received See CVE-2006-2274 * 216_sctp-fragmented-receive-fix.diff [SECURITY] Fix remote DoS vulnerability that allows IP fragmented COOKIE_ECHO and HEARTBEAT SCTP control chunks to cause a kernel panic See CVE-2006-2272 * 217_amd64-fp-reg-leak.diff [SECURITY][amd64] Fix an information leak that allows a process to see a portion of the floating point state of other processes, possibly exposing sensitive information. See CVE-2006-1056 * 218_do_add_counters-race.diff [SECURITY] Fix race condition in the do_add_counters() function in netfilter that allows local users with CAP_NET_ADMIN capabilities to read kernel memory See CVE-2006-0039 * 219_sctp-hb-ack-overflow.diff [SECURITY] Fix a remote buffer overflow that can result from a badly formatted HB-ACK chunk See CVE-2006-1857 * 220_sctp-param-bound-checks.diff [SECURITY] Fix a bound checking error (remote DoS) in the SCTP parameter checking code See CVE-2006-1858 * 221_netfilter-do_replace-overflow.diff [SECURITY] Fix buffer overflow in netfilter do_replace which can could be triggered by users with CAP_NET_ADMIN rights. See CVE-2006-0038 * 222_binfmt-bad-elf-entry-address.diff [SECURITY][amd64] Fix potential local DoS vulnerability in the binfmt_elf code on em64t processors See CVE-2006-0741 stable/main/source/kernel-image-2.4.27-s390_2.4.27-2sarge3.dsc stable/main/binary-s390/kernel-headers-2.4.27-3_2.4.27-2sarge3_s390.deb stable/main/binary-s390/kernel-image-2.4.27-3-s390-tape_2.4.27-2sarge3_s390.deb stable/main/binary-s390/kernel-image-2.4.27-3-s390x_2.4.27-2sarge3_s390.deb stable/main/binary-s390/kernel-image-2.4.27-3-s390_2.4.27-2sarge3_s390.deb stable/main/source/kernel-image-2.4.27-s390_2.4.27-2sarge3.tar.gz kernel-image-2.4.27-s390 (2.4.27-2sarge3) stable-security; urgency=high * Build against kernel-tree-2.4.27-10sarge3: * 207_smbfs-chroot-escape.diff [SECURITY] Fix directory traversal vulnerability in smbfs that permits local users to escape chroot restrictions See CVE-2006-1864 * 208_ia64-die_if_kernel-returns.diff [SECURITY][ia64] Fix a potential local DoS on ia64 systems caused by an incorrect 'noreturn' attribute on die_if_kernel() See CVE-2006-0742 * 209_sctp-discard-unexpected-in-closed.diff [SECURITY] Fix remote DoS in SCTP code by discarding unexpected chunks received in CLOSED state instead of calling BUG() See CVE-2006-2271 * 210_ipv4-id-no-increment.diff [SECURITY] Fix vulnerability that allows remote attackers to conduct an Idle Scan attack, bypassing intended protections against such attacks See CVE-2006-1242 * 211_usb-gadget-rndis-bufoverflow.diff [SECURITY] Fix buffer overflow in the USB Gadget RNDIS implementation that allows for a remote DoS attack (kmalloc'd memory corruption) See CVE-2006-1368 * 212_ipv4-sin_zero_clear.diff [SECURITY] Fix local information leak in af_inet code See CVE-2006-1343 * 213_madvise_remove-restrict.diff [SECURITY] Fix vulnerability that allows local users to bypass IPC permissions and replace portions of read-only tmpfs files with zeroes. See CVE-2006-1524 * 214_mcast-ip-route-null-deref.diff [SECURITY] Fix local DoS vulnerability that allows local users to panic a system by requesting a route for a multicast IP See CVE-2006-1525 * 215_sctp-fragment-recurse.diff [SECURITY] Fix remote DoS vulnerability that can lead to infinite recursion when a packet containing two or more DATA fragments is received See CVE-2006-2274 * 216_sctp-fragmented-receive-fix.diff [SECURITY] Fix remote DoS vulnerability that allows IP fragmented COOKIE_ECHO and HEARTBEAT SCTP control chunks to cause a kernel panic See CVE-2006-2272 * 217_amd64-fp-reg-leak.diff [SECURITY][amd64] Fix an information leak that allows a process to see a portion of the floating point state of other processes, possibly exposing sensitive information. See CVE-2006-1056 * 218_do_add_counters-race.diff [SECURITY] Fix race condition in the do_add_counters() function in netfilter that allows local users with CAP_NET_ADMIN capabilities to read kernel memory See CVE-2006-0039 * 219_sctp-hb-ack-overflow.diff [SECURITY] Fix a remote buffer overflow that can result from a badly formatted HB-ACK chunk See CVE-2006-1857 * 220_sctp-param-bound-checks.diff [SECURITY] Fix a bound checking error (remote DoS) in the SCTP parameter checking code See CVE-2006-1858 * 221_netfilter-do_replace-overflow.diff [SECURITY] Fix buffer overflow in netfilter do_replace which can could be triggered by users with CAP_NET_ADMIN rights. See CVE-2006-0038 * 222_binfmt-bad-elf-entry-address.diff [SECURITY][amd64] Fix potential local DoS vulnerability in the binfmt_elf code on em64t processors See CVE-2006-0741 stable/main/source/kernel-image-2.4.27-m68k_2.4.27-3sarge3.tar.gz stable/main/binary-m68k/kernel-image-2.4.27-mvme16x_2.4.27-3sarge3_m68k.deb stable/main/binary-m68k/kernel-image-2.4.27-mac_2.4.27-3sarge3_m68k.deb stable/main/binary-m68k/kernel-image-2.4.27-amiga_2.4.27-3sarge3_m68k.deb stable/main/binary-m68k/kernel-image-2.4.27-q40_2.4.27-3sarge3_m68k.deb stable/main/source/kernel-image-2.4.27-m68k_2.4.27-3sarge3.dsc stable/main/binary-m68k/kernel-image-2.4.27-mvme147_2.4.27-3sarge3_m68k.deb stable/main/binary-m68k/kernel-image-2.4.27-atari_2.4.27-3sarge3_m68k.deb stable/main/binary-m68k/kernel-image-2.4.27-bvme6000_2.4.27-3sarge3_m68k.deb kernel-image-2.4.27-m68k (2.4.27-3sarge3) stable-security; urgency=high * Build against kernel-tree-2.4.27-10sarge3: * 207_smbfs-chroot-escape.diff [SECURITY] Fix directory traversal vulnerability in smbfs that permits local users to escape chroot restrictions See CVE-2006-1864 * 208_ia64-die_if_kernel-returns.diff [SECURITY][ia64] Fix a potential local DoS on ia64 systems caused by an incorrect 'noreturn' attribute on die_if_kernel() See CVE-2006-0742 * 209_sctp-discard-unexpected-in-closed.diff [SECURITY] Fix remote DoS in SCTP code by discarding unexpected chunks received in CLOSED state instead of calling BUG() See CVE-2006-2271 * 210_ipv4-id-no-increment.diff [SECURITY] Fix vulnerability that allows remote attackers to conduct an Idle Scan attack, bypassing intended protections against such attacks See CVE-2006-1242 * 211_usb-gadget-rndis-bufoverflow.diff [SECURITY] Fix buffer overflow in the USB Gadget RNDIS implementation that allows for a remote DoS attack (kmalloc'd memory corruption) See CVE-2006-1368 * 212_ipv4-sin_zero_clear.diff [SECURITY] Fix local information leak in af_inet code See CVE-2006-1343 * 213_madvise_remove-restrict.diff [SECURITY] Fix vulnerability that allows local users to bypass IPC permissions and replace portions of read-only tmpfs files with zeroes. See CVE-2006-1524 * 214_mcast-ip-route-null-deref.diff [SECURITY] Fix local DoS vulnerability that allows local users to panic a system by requesting a route for a multicast IP See CVE-2006-1525 * 215_sctp-fragment-recurse.diff [SECURITY] Fix remote DoS vulnerability that can lead to infinite recursion when a packet containing two or more DATA fragments is received See CVE-2006-2274 * 216_sctp-fragmented-receive-fix.diff [SECURITY] Fix remote DoS vulnerability that allows IP fragmented COOKIE_ECHO and HEARTBEAT SCTP control chunks to cause a kernel panic See CVE-2006-2272 * 217_amd64-fp-reg-leak.diff [SECURITY][amd64] Fix an information leak that allows a process to see a portion of the floating point state of other processes, possibly exposing sensitive information. See CVE-2006-1056 * 218_do_add_counters-race.diff [SECURITY] Fix race condition in the do_add_counters() function in netfilter that allows local users with CAP_NET_ADMIN capabilities to read kernel memory See CVE-2006-0039 * 219_sctp-hb-ack-overflow.diff [SECURITY] Fix a remote buffer overflow that can result from a badly formatted HB-ACK chunk See CVE-2006-1857 * 220_sctp-param-bound-checks.diff [SECURITY] Fix a bound checking error (remote DoS) in the SCTP parameter checking code See CVE-2006-1858 * 221_netfilter-do_replace-overflow.diff [SECURITY] Fix buffer overflow in netfilter do_replace which can could be triggered by users with CAP_NET_ADMIN rights. See CVE-2006-0038 * 222_binfmt-bad-elf-entry-address.diff [SECURITY][amd64] Fix potential local DoS vulnerability in the binfmt_elf code on em64t processors See CVE-2006-0741 stable/main/binary-ia64/kernel-headers-2.4.27-3-mckinley-smp_2.4.27-10sarge3_ia64.deb stable/main/source/kernel-image-2.4.27-ia64_2.4.27-10sarge3.dsc stable/main/binary-ia64/kernel-image-2.4.27-3-mckinley_2.4.27-10sarge3_ia64.deb stable/main/binary-ia64/kernel-headers-2.4.27-3-itanium-smp_2.4.27-10sarge3_ia64.deb stable/main/binary-ia64/kernel-image-2.4.27-3-mckinley-smp_2.4.27-10sarge3_ia64.deb stable/main/binary-ia64/kernel-image-2.4-itanium-smp_2.4.27-10sarge3_ia64.deb stable/main/binary-ia64/kernel-image-2.4.27-3-itanium_2.4.27-10sarge3_ia64.deb stable/main/source/kernel-image-2.4.27-ia64_2.4.27-10sarge3.tar.gz stable/main/binary-ia64/kernel-build-2.4.27-3_2.4.27-10sarge3_ia64.deb stable/main/binary-ia64/kernel-image-2.4-itanium_2.4.27-10sarge3_ia64.deb stable/main/binary-ia64/kernel-image-2.4-mckinley_2.4.27-10sarge3_ia64.deb stable/main/binary-ia64/kernel-headers-2.4.27-3-mckinley_2.4.27-10sarge3_ia64.deb stable/main/binary-ia64/kernel-image-2.4.27-3-itanium-smp_2.4.27-10sarge3_ia64.deb stable/main/binary-ia64/kernel-image-2.4-mckinley-smp_2.4.27-10sarge3_ia64.deb stable/main/binary-ia64/kernel-headers-2.4.27-3_2.4.27-10sarge3_ia64.deb stable/main/binary-ia64/kernel-headers-2.4.27-3-itanium_2.4.27-10sarge3_ia64.deb kernel-image-2.4.27-ia64 (2.4.27-10sarge3) stable-security; urgency=high * Build against kernel-tree-2.4.27-10sarge3: * 207_smbfs-chroot-escape.diff [SECURITY] Fix directory traversal vulnerability in smbfs that permits local users to escape chroot restrictions See CVE-2006-1864 * 208_ia64-die_if_kernel-returns.diff [SECURITY][ia64] Fix a potential local DoS on ia64 systems caused by an incorrect 'noreturn' attribute on die_if_kernel() See CVE-2006-0742 * 209_sctp-discard-unexpected-in-closed.diff [SECURITY] Fix remote DoS in SCTP code by discarding unexpected chunks received in CLOSED state instead of calling BUG() See CVE-2006-2271 * 210_ipv4-id-no-increment.diff [SECURITY] Fix vulnerability that allows remote attackers to conduct an Idle Scan attack, bypassing intended protections against such attacks See CVE-2006-1242 * 211_usb-gadget-rndis-bufoverflow.diff [SECURITY] Fix buffer overflow in the USB Gadget RNDIS implementation that allows for a remote DoS attack (kmalloc'd memory corruption) See CVE-2006-1368 * 212_ipv4-sin_zero_clear.diff [SECURITY] Fix local information leak in af_inet code See CVE-2006-1343 * 213_madvise_remove-restrict.diff [SECURITY] Fix vulnerability that allows local users to bypass IPC permissions and replace portions of read-only tmpfs files with zeroes. See CVE-2006-1524 * 214_mcast-ip-route-null-deref.diff [SECURITY] Fix local DoS vulnerability that allows local users to panic a system by requesting a route for a multicast IP See CVE-2006-1525 * 215_sctp-fragment-recurse.diff [SECURITY] Fix remote DoS vulnerability that can lead to infinite recursion when a packet containing two or more DATA fragments is received See CVE-2006-2274 * 216_sctp-fragmented-receive-fix.diff [SECURITY] Fix remote DoS vulnerability that allows IP fragmented COOKIE_ECHO and HEARTBEAT SCTP control chunks to cause a kernel panic See CVE-2006-2272 * 217_amd64-fp-reg-leak.diff [SECURITY][amd64] Fix an information leak that allows a process to see a portion of the floating point state of other processes, possibly exposing sensitive information. See CVE-2006-1056 * 218_do_add_counters-race.diff [SECURITY] Fix race condition in the do_add_counters() function in netfilter that allows local users with CAP_NET_ADMIN capabilities to read kernel memory See CVE-2006-0039 * 219_sctp-hb-ack-overflow.diff [SECURITY] Fix a remote buffer overflow that can result from a badly formatted HB-ACK chunk See CVE-2006-1857 * 220_sctp-param-bound-checks.diff [SECURITY] Fix a bound checking error (remote DoS) in the SCTP parameter checking code See CVE-2006-1858 * 221_netfilter-do_replace-overflow.diff [SECURITY] Fix buffer overflow in netfilter do_replace which can could be triggered by users with CAP_NET_ADMIN rights. See CVE-2006-0038 * 222_binfmt-bad-elf-entry-address.diff [SECURITY][amd64] Fix potential local DoS vulnerability in the binfmt_elf code on em64t processors See CVE-2006-0741 stable/main/binary-i386/kernel-image-2.4.27-3-k7_2.4.27-10sarge3_i386.deb stable/main/source/kernel-image-2.4.27-i386_2.4.27-10sarge3.tar.gz stable/main/binary-i386/kernel-pcmcia-modules-2.4.27-3-386_2.4.27-10sarge3_i386.deb stable/main/binary-i386/kernel-image-2.4.27-3-k6_2.4.27-10sarge3_i386.deb stable/main/binary-i386/kernel-pcmcia-modules-2.4.27-3-686-smp_2.4.27-10sarge3_i386.deb stable/main/binary-i386/kernel-headers-2.4.27-3_2.4.27-10sarge3_i386.deb stable/main/source/kernel-image-2.4.27-i386_2.4.27-10sarge3.dsc stable/main/binary-i386/kernel-image-2.4.27-3-586tsc_2.4.27-10sarge3_i386.deb stable/main/binary-i386/kernel-pcmcia-modules-2.4.27-3-586tsc_2.4.27-10sarge3_i386.deb stable/main/binary-i386/kernel-headers-2.4.27-3-k7-smp_2.4.27-10sarge3_i386.deb stable/main/binary-i386/kernel-image-2.4.27-3-686_2.4.27-10sarge3_i386.deb stable/main/binary-i386/kernel-image-2.4.27-3-k7-smp_2.4.27-10sarge3_i386.deb stable/main/binary-i386/kernel-pcmcia-modules-2.4.27-3-k6_2.4.27-10sarge3_i386.deb stable/main/binary-i386/kernel-build-2.4.27-3_2.4.27-10sarge3_i386.deb stable/main/binary-i386/kernel-pcmcia-modules-2.4.27-3-k7_2.4.27-10sarge3_i386.deb stable/main/binary-i386/kernel-headers-2.4.27-3-k7_2.4.27-10sarge3_i386.deb stable/main/binary-i386/kernel-headers-2.4.27-3-686_2.4.27-10sarge3_i386.deb stable/main/binary-i386/kernel-headers-2.4.27-3-686-smp_2.4.27-10sarge3_i386.deb stable/main/binary-i386/kernel-image-2.4.27-3-686-smp_2.4.27-10sarge3_i386.deb stable/main/binary-i386/kernel-headers-2.4.27-3-386_2.4.27-10sarge3_i386.deb stable/main/binary-i386/kernel-headers-2.4.27-3-586tsc_2.4.27-10sarge3_i386.deb stable/main/binary-i386/kernel-headers-2.4.27-3-k6_2.4.27-10sarge3_i386.deb stable/main/binary-i386/kernel-pcmcia-modules-2.4.27-3-k7-smp_2.4.27-10sarge3_i386.deb stable/main/binary-i386/kernel-image-2.4.27-3-386_2.4.27-10sarge3_i386.deb stable/main/binary-i386/kernel-pcmcia-modules-2.4.27-3-686_2.4.27-10sarge3_i386.deb kernel-image-2.4.27-i386 (2.4.27-10sarge3) stable-security; urgency=high * Build against kernel-tree-2.4.27-10sarge3: * 207_smbfs-chroot-escape.diff [SECURITY] Fix directory traversal vulnerability in smbfs that permits local users to escape chroot restrictions See CVE-2006-1864 * 208_ia64-die_if_kernel-returns.diff [SECURITY][ia64] Fix a potential local DoS on ia64 systems caused by an incorrect 'noreturn' attribute on die_if_kernel() See CVE-2006-0742 * 209_sctp-discard-unexpected-in-closed.diff [SECURITY] Fix remote DoS in SCTP code by discarding unexpected chunks received in CLOSED state instead of calling BUG() See CVE-2006-2271 * 210_ipv4-id-no-increment.diff [SECURITY] Fix vulnerability that allows remote attackers to conduct an Idle Scan attack, bypassing intended protections against such attacks See CVE-2006-1242 * 211_usb-gadget-rndis-bufoverflow.diff [SECURITY] Fix buffer overflow in the USB Gadget RNDIS implementation that allows for a remote DoS attack (kmalloc'd memory corruption) See CVE-2006-1368 * 212_ipv4-sin_zero_clear.diff [SECURITY] Fix local information leak in af_inet code See CVE-2006-1343 * 213_madvise_remove-restrict.diff [SECURITY] Fix vulnerability that allows local users to bypass IPC permissions and replace portions of read-only tmpfs files with zeroes. See CVE-2006-1524 * 214_mcast-ip-route-null-deref.diff [SECURITY] Fix local DoS vulnerability that allows local users to panic a system by requesting a route for a multicast IP See CVE-2006-1525 * 215_sctp-fragment-recurse.diff [SECURITY] Fix remote DoS vulnerability that can lead to infinite recursion when a packet containing two or more DATA fragments is received See CVE-2006-2274 * 216_sctp-fragmented-receive-fix.diff [SECURITY] Fix remote DoS vulnerability that allows IP fragmented COOKIE_ECHO and HEARTBEAT SCTP control chunks to cause a kernel panic See CVE-2006-2272 * 217_amd64-fp-reg-leak.diff [SECURITY][amd64] Fix an information leak that allows a process to see a portion of the floating point state of other processes, possibly exposing sensitive information. See CVE-2006-1056 * 218_do_add_counters-race.diff [SECURITY] Fix race condition in the do_add_counters() function in netfilter that allows local users with CAP_NET_ADMIN capabilities to read kernel memory See CVE-2006-0039 * 219_sctp-hb-ack-overflow.diff [SECURITY] Fix a remote buffer overflow that can result from a badly formatted HB-ACK chunk See CVE-2006-1857 * 220_sctp-param-bound-checks.diff [SECURITY] Fix a bound checking error (remote DoS) in the SCTP parameter checking code See CVE-2006-1858 * 221_netfilter-do_replace-overflow.diff [SECURITY] Fix buffer overflow in netfilter do_replace which can could be triggered by users with CAP_NET_ADMIN rights. See CVE-2006-0038 * 222_binfmt-bad-elf-entry-address.diff [SECURITY][amd64] Fix potential local DoS vulnerability in the binfmt_elf code on em64t processors See CVE-2006-0741 stable/main/source/kernel-image-2.4.27-arm_2.4.27-2sarge3.tar.gz stable/main/binary-arm/kernel-image-2.4.27-riscstation_2.4.27-2sarge3_arm.deb stable/main/source/kernel-image-2.4.27-arm_2.4.27-2sarge3.dsc stable/main/binary-arm/kernel-image-2.4.27-netwinder_2.4.27-2sarge3_arm.deb stable/main/binary-arm/kernel-build-2.4.27_2.4.27-2sarge3_arm.deb stable/main/binary-arm/kernel-image-2.4.27-bast_2.4.27-2sarge3_arm.deb stable/main/binary-arm/kernel-image-2.4.27-riscpc_2.4.27-2sarge3_arm.deb stable/main/binary-arm/kernel-headers-2.4.27_2.4.27-2sarge3_arm.deb stable/main/binary-arm/kernel-image-2.4.27-lart_2.4.27-2sarge3_arm.deb kernel-image-2.4.27-arm (2.4.27-2sarge3) stable-security; urgency=high * Build against kernel-tree-2.4.27-10sarge3: * 207_smbfs-chroot-escape.diff [SECURITY] Fix directory traversal vulnerability in smbfs that permits local users to escape chroot restrictions See CVE-2006-1864 * 208_ia64-die_if_kernel-returns.diff [SECURITY][ia64] Fix a potential local DoS on ia64 systems caused by an incorrect 'noreturn' attribute on die_if_kernel() See CVE-2006-0742 * 209_sctp-discard-unexpected-in-closed.diff [SECURITY] Fix remote DoS in SCTP code by discarding unexpected chunks received in CLOSED state instead of calling BUG() See CVE-2006-2271 * 210_ipv4-id-no-increment.diff [SECURITY] Fix vulnerability that allows remote attackers to conduct an Idle Scan attack, bypassing intended protections against such attacks See CVE-2006-1242 * 211_usb-gadget-rndis-bufoverflow.diff [SECURITY] Fix buffer overflow in the USB Gadget RNDIS implementation that allows for a remote DoS attack (kmalloc'd memory corruption) See CVE-2006-1368 * 212_ipv4-sin_zero_clear.diff [SECURITY] Fix local information leak in af_inet code See CVE-2006-1343 * 213_madvise_remove-restrict.diff [SECURITY] Fix vulnerability that allows local users to bypass IPC permissions and replace portions of read-only tmpfs files with zeroes. See CVE-2006-1524 * 214_mcast-ip-route-null-deref.diff [SECURITY] Fix local DoS vulnerability that allows local users to panic a system by requesting a route for a multicast IP See CVE-2006-1525 * 215_sctp-fragment-recurse.diff [SECURITY] Fix remote DoS vulnerability that can lead to infinite recursion when a packet containing two or more DATA fragments is received See CVE-2006-2274 * 216_sctp-fragmented-receive-fix.diff [SECURITY] Fix remote DoS vulnerability that allows IP fragmented COOKIE_ECHO and HEARTBEAT SCTP control chunks to cause a kernel panic See CVE-2006-2272 * 217_amd64-fp-reg-leak.diff [SECURITY][amd64] Fix an information leak that allows a process to see a portion of the floating point state of other processes, possibly exposing sensitive information. See CVE-2006-1056 * 218_do_add_counters-race.diff [SECURITY] Fix race condition in the do_add_counters() function in netfilter that allows local users with CAP_NET_ADMIN capabilities to read kernel memory See CVE-2006-0039 * 219_sctp-hb-ack-overflow.diff [SECURITY] Fix a remote buffer overflow that can result from a badly formatted HB-ACK chunk See CVE-2006-1857 * 220_sctp-param-bound-checks.diff [SECURITY] Fix a bound checking error (remote DoS) in the SCTP parameter checking code See CVE-2006-1858 * 221_netfilter-do_replace-overflow.diff [SECURITY] Fix buffer overflow in netfilter do_replace which can could be triggered by users with CAP_NET_ADMIN rights. See CVE-2006-0038 * 222_binfmt-bad-elf-entry-address.diff [SECURITY][amd64] Fix potential local DoS vulnerability in the binfmt_elf code on em64t processors See CVE-2006-0741 stable/main/binary-alpha/kernel-headers-2.4.27-3-generic_2.4.27-10sarge3_alpha.deb stable/main/binary-alpha/kernel-image-2.4.27-3-generic_2.4.27-10sarge3_alpha.deb stable/main/binary-alpha/kernel-image-2.4.27-3-smp_2.4.27-10sarge3_alpha.deb stable/main/binary-alpha/kernel-headers-2.4.27-3_2.4.27-10sarge3_alpha.deb stable/main/source/kernel-image-2.4.27-alpha_2.4.27-10sarge3.dsc stable/main/binary-alpha/kernel-build-2.4.27-3_2.4.27-10sarge3_alpha.deb stable/main/binary-alpha/kernel-headers-2.4.27-3-smp_2.4.27-10sarge3_alpha.deb stable/main/source/kernel-image-2.4.27-alpha_2.4.27-10sarge3.tar.gz kernel-image-2.4.27-alpha (2.4.27-10sarge3) stable-security; urgency=high * Build against kernel-tree-2.4.27-10sarge3: * 207_smbfs-chroot-escape.diff [SECURITY] Fix directory traversal vulnerability in smbfs that permits local users to escape chroot restrictions See CVE-2006-1864 * 208_ia64-die_if_kernel-returns.diff [SECURITY][ia64] Fix a potential local DoS on ia64 systems caused by an incorrect 'noreturn' attribute on die_if_kernel() See CVE-2006-0742 * 209_sctp-discard-unexpected-in-closed.diff [SECURITY] Fix remote DoS in SCTP code by discarding unexpected chunks received in CLOSED state instead of calling BUG() See CVE-2006-2271 * 210_ipv4-id-no-increment.diff [SECURITY] Fix vulnerability that allows remote attackers to conduct an Idle Scan attack, bypassing intended protections against such attacks See CVE-2006-1242 * 211_usb-gadget-rndis-bufoverflow.diff [SECURITY] Fix buffer overflow in the USB Gadget RNDIS implementation that allows for a remote DoS attack (kmalloc'd memory corruption) See CVE-2006-1368 * 212_ipv4-sin_zero_clear.diff [SECURITY] Fix local information leak in af_inet code See CVE-2006-1343 * 213_madvise_remove-restrict.diff [SECURITY] Fix vulnerability that allows local users to bypass IPC permissions and replace portions of read-only tmpfs files with zeroes. See CVE-2006-1524 * 214_mcast-ip-route-null-deref.diff [SECURITY] Fix local DoS vulnerability that allows local users to panic a system by requesting a route for a multicast IP See CVE-2006-1525 * 215_sctp-fragment-recurse.diff [SECURITY] Fix remote DoS vulnerability that can lead to infinite recursion when a packet containing two or more DATA fragments is received See CVE-2006-2274 * 216_sctp-fragmented-receive-fix.diff [SECURITY] Fix remote DoS vulnerability that allows IP fragmented COOKIE_ECHO and HEARTBEAT SCTP control chunks to cause a kernel panic See CVE-2006-2272 * 217_amd64-fp-reg-leak.diff [SECURITY][amd64] Fix an information leak that allows a process to see a portion of the floating point state of other processes, possibly exposing sensitive information. See CVE-2006-1056 * 218_do_add_counters-race.diff [SECURITY] Fix race condition in the do_add_counters() function in netfilter that allows local users with CAP_NET_ADMIN capabilities to read kernel memory See CVE-2006-0039 * 219_sctp-hb-ack-overflow.diff [SECURITY] Fix a remote buffer overflow that can result from a badly formatted HB-ACK chunk See CVE-2006-1857 * 220_sctp-param-bound-checks.diff [SECURITY] Fix a bound checking error (remote DoS) in the SCTP parameter checking code See CVE-2006-1858 * 221_netfilter-do_replace-overflow.diff [SECURITY] Fix buffer overflow in netfilter do_replace which can could be triggered by users with CAP_NET_ADMIN rights. See CVE-2006-0038 * 222_binfmt-bad-elf-entry-address.diff [SECURITY][amd64] Fix potential local DoS vulnerability in the binfmt_elf code on em64t processors See CVE-2006-0741 stable/main/binary-sparc/kazehakase_0.2.7-2.sarge2_sparc.deb kazehakase (0.2.7-2.sarge2) stable; urgency=high * reverting fix for 325124, 326509 which caused a severe regression after mozilla fixed the *regression* which led to sarge1 upload in the first place (Closes: 345905) stable/main/binary-s390/kazehakase_0.2.7-2.sarge2_s390.deb kazehakase (0.2.7-2.sarge2) stable; urgency=high * reverting fix for 325124, 326509 which caused a severe regression after mozilla fixed the *regression* which led to sarge1 upload in the first place (Closes: 345905) stable/main/binary-powerpc/kazehakase_0.2.7-2.sarge2_powerpc.deb kazehakase (0.2.7-2.sarge2) stable; urgency=high * reverting fix for 325124, 326509 which caused a severe regression after mozilla fixed the *regression* which led to sarge1 upload in the first place (Closes: 345905) stable/main/binary-mipsel/kazehakase_0.2.7-2.sarge2_mipsel.deb kazehakase (0.2.7-2.sarge2) stable; urgency=high * reverting fix for 325124, 326509 which caused a severe regression after mozilla fixed the *regression* which led to sarge1 upload in the first place (Closes: 345905) stable/main/binary-mips/kazehakase_0.2.7-2.sarge2_mips.deb kazehakase (0.2.7-2.sarge2) stable; urgency=high * reverting fix for 325124, 326509 which caused a severe regression after mozilla fixed the *regression* which led to sarge1 upload in the first place (Closes: 345905) stable/main/binary-m68k/kazehakase_0.2.7-2.sarge2_m68k.deb kazehakase (0.2.7-2.sarge2) stable; urgency=high * reverting fix for 325124, 326509 which caused a severe regression after mozilla fixed the *regression* which led to sarge1 upload in the first place (Closes: 345905) stable/main/binary-ia64/kazehakase_0.2.7-2.sarge2_ia64.deb kazehakase (0.2.7-2.sarge2) stable; urgency=high * reverting fix for 325124, 326509 which caused a severe regression after mozilla fixed the *regression* which led to sarge1 upload in the first place (Closes: 345905) stable/main/binary-hppa/kazehakase_0.2.7-2.sarge2_hppa.deb kazehakase (0.2.7-2.sarge2) stable; urgency=high * reverting fix for 325124, 326509 which caused a severe regression after mozilla fixed the *regression* which led to sarge1 upload in the first place (Closes: 345905) stable/main/binary-arm/kazehakase_0.2.7-2.sarge2_arm.deb kazehakase (0.2.7-2.sarge2) stable; urgency=high * reverting fix for 325124, 326509 which caused a severe regression after mozilla fixed the *regression* which led to sarge1 upload in the first place (Closes: 345905) stable/main/binary-alpha/kazehakase_0.2.7-2.sarge2_alpha.deb kazehakase (0.2.7-2.sarge2) stable; urgency=high * reverting fix for 325124, 326509 which caused a severe regression after mozilla fixed the *regression* which led to sarge1 upload in the first place (Closes: 345905) stable/main/source/kazehakase_0.2.7-2.sarge2.dsc stable/main/binary-i386/kazehakase_0.2.7-2.sarge2_i386.deb stable/main/source/kazehakase_0.2.7-2.sarge2.diff.gz kazehakase (0.2.7-2.sarge2) stable; urgency=high * reverting fix for 325124, 326509 which caused a severe regression after mozilla fixed the *regression* which led to sarge1 upload in the first place (Closes: 345905) stable/main/binary-i386/i2c-2.4.27-3-k7-smp_2.9.1-1sarge1_i386.deb stable/main/binary-all/i2c-source_2.9.1-1sarge1_all.deb stable/main/binary-i386/i2c-2.4.27-3-586tsc_2.9.1-1sarge1_i386.deb stable/main/binary-i386/i2c-2.4.27-3-686-smp_2.9.1-1sarge1_i386.deb stable/main/source/i2c_2.9.1-1sarge1.dsc stable/main/binary-i386/i2c-2.4.27-3-686_2.9.1-1sarge1_i386.deb stable/main/binary-i386/i2c-2.4.27-3-386_2.9.1-1sarge1_i386.deb stable/main/binary-all/kernel-patch-2.4-i2c_2.9.1-1sarge1_all.deb stable/main/binary-i386/i2c-2.4.27-3-k7_2.9.1-1sarge1_i386.deb stable/main/source/i2c_2.9.1-1sarge1.diff.gz stable/main/binary-i386/i2c-2.4.27-3-k6_2.9.1-1sarge1_i386.deb i2c (1:2.9.1-1sarge1) stable-security; urgency=high * Build against kernel-build-2.4.27-3_2.4.27-10sarge2. * Increment ABI to -3. stable/main/binary-sparc/hostapd_0.3.7-2sarge1_sparc.deb hostapd (1:0.3.7-2sarge1) stable-security; urgency=high * Non-maintainer upload by the Security Team: * Fix denial of service vulnerability through insufficiently sanitised key length values. (CVE-2006-2216) stable/main/binary-s390/hostapd_0.3.7-2sarge1_s390.deb hostapd (1:0.3.7-2sarge1) stable-security; urgency=high * Non-maintainer upload by the Security Team: * Fix denial of service vulnerability through insufficiently sanitised key length values. (CVE-2006-2216) stable/main/binary-powerpc/hostapd_0.3.7-2sarge1_powerpc.deb hostapd (1:0.3.7-2sarge1) stable-security; urgency=high * Non-maintainer upload by the Security Team: * Fix denial of service vulnerability through insufficiently sanitised key length values. (CVE-2006-2216) stable/main/binary-mipsel/hostapd_0.3.7-2sarge1_mipsel.deb hostapd (1:0.3.7-2sarge1) stable-security; urgency=high * Non-maintainer upload by the Security Team: * Fix denial of service vulnerability through insufficiently sanitised key length values. (CVE-2006-2216) stable/main/binary-mips/hostapd_0.3.7-2sarge1_mips.deb hostapd (1:0.3.7-2sarge1) stable-security; urgency=high * Non-maintainer upload by the Security Team: * Fix denial of service vulnerability through insufficiently sanitised key length values. (CVE-2006-2216) stable/main/binary-m68k/hostapd_0.3.7-2sarge1_m68k.deb hostapd (1:0.3.7-2sarge1) stable-security; urgency=high * Non-maintainer upload by the Security Team: * Fix denial of service vulnerability through insufficiently sanitised key length values. (CVE-2006-2216) stable/main/binary-ia64/hostapd_0.3.7-2sarge1_ia64.deb hostapd (1:0.3.7-2sarge1) stable-security; urgency=high * Non-maintainer upload by the Security Team: * Fix denial of service vulnerability through insufficiently sanitised key length values. (CVE-2006-2216) stable/main/binary-hppa/hostapd_0.3.7-2sarge1_hppa.deb hostapd (1:0.3.7-2sarge1) stable-security; urgency=high * Non-maintainer upload by the Security Team: * Fix denial of service vulnerability through insufficiently sanitised key length values. (CVE-2006-2216) stable/main/binary-arm/hostapd_0.3.7-2sarge1_arm.deb hostapd (1:0.3.7-2sarge1) stable-security; urgency=high * Non-maintainer upload by the Security Team: * Fix denial of service vulnerability through insufficiently sanitised key length values. (CVE-2006-2216) stable/main/binary-alpha/hostapd_0.3.7-2sarge1_alpha.deb hostapd (1:0.3.7-2sarge1) stable-security; urgency=high * Non-maintainer upload by the Security Team: * Fix denial of service vulnerability through insufficiently sanitised key length values. (CVE-2006-2216) stable/main/binary-i386/hostapd_0.3.7-2sarge1_i386.deb stable/main/source/hostapd_0.3.7-2sarge1.dsc stable/main/source/hostapd_0.3.7-2sarge1.diff.gz hostapd (1:0.3.7-2sarge1) stable-security; urgency=high * Non-maintainer upload by the Security Team: * Fix denial of service vulnerability through insufficiently sanitised key length values. (CVE-2006-2216) stable/main/binary-i386/hostap-modules-2.6.8-3-686-smp_0.3.7-1sarge1_i386.deb stable/main/binary-i386/hostap-modules-2.4.27-3-k7-smp_0.3.7-1sarge1_i386.deb stable/main/binary-i386/hostap-modules-2.4.27-3-k6_0.3.7-1sarge1_i386.deb stable/main/binary-i386/hostap-modules-2.4.27-3-686_0.3.7-1sarge1_i386.deb stable/main/binary-i386/hostap-modules-2.4.27-3-k7_0.3.7-1sarge1_i386.deb stable/main/binary-i386/hostap-modules-2.6.8-3-k7-smp_0.3.7-1sarge1_i386.deb stable/main/binary-i386/hostap-modules-2.6.8-3-k7_0.3.7-1sarge1_i386.deb stable/main/source/hostap-modules-i386_0.3.7-1sarge1.dsc stable/main/binary-i386/hostap-modules-2.4.27-3-586tsc_0.3.7-1sarge1_i386.deb stable/main/binary-i386/hostap-modules-2.6.8-3-686_0.3.7-1sarge1_i386.deb stable/main/source/hostap-modules-i386_0.3.7-1sarge1.tar.gz stable/main/binary-i386/hostap-modules-2.4.27-3-686-smp_0.3.7-1sarge1_i386.deb stable/main/binary-i386/hostap-modules-2.4.27-3-386_0.3.7-1sarge1_i386.deb stable/main/binary-i386/hostap-modules-2.6.8-3-386_0.3.7-1sarge1_i386.deb hostap-modules-i386 (1:0.3.7-1sarge1) stable-security; urgency=high * Rebuild for -3 ABI stable/main/binary-all/horde3_3.0.4-4sarge4_all.deb stable/main/source/horde3_3.0.4-4sarge4.dsc stable/main/source/horde3_3.0.4-4sarge4.diff.gz horde3 (3.0.4-4sarge4) stable-security; urgency=high * Non-maintainer upload by the Security Team * Fix several cross-site-scripting vulnerabilities. (CVE-2006-2195) stable/main/binary-all/horde2_2.2.8-1sarge3_all.deb stable/main/source/horde2_2.2.8-1sarge3.dsc stable/main/source/horde2_2.2.8-1sarge3.diff.gz horde2 (2.2.8-1sarge3) stable-security; urgency=high * Non-maintainer upload by the Security Team. * Fix multiple XSS vulnerabilities. (CVE-2006-2195) stable/main/source/hiki_0.6.5-2.diff.gz stable/main/binary-all/hiki_0.6.5-2_all.deb stable/main/source/hiki_0.6.5-2.dsc hiki (0.6.5-2) stable-security; urgency=high * Security fix: CVE-2006-3379 (closes: #378059) stable/main/binary-sparc/libstonith-dev_1.2.3-9sarge6_sparc.deb stable/main/binary-sparc/libpils0_1.2.3-9sarge6_sparc.deb stable/main/binary-sparc/libpils-dev_1.2.3-9sarge6_sparc.deb stable/main/binary-sparc/stonith_1.2.3-9sarge6_sparc.deb stable/main/binary-sparc/heartbeat_1.2.3-9sarge6_sparc.deb stable/main/binary-sparc/libstonith0_1.2.3-9sarge6_sparc.deb stable/main/binary-sparc/heartbeat-dev_1.2.3-9sarge6_sparc.deb heartbeat (1.2.3-9sarge6) stable-security; urgency=high * Non-maintainer upload by the Security Team * Applied patch to fix remote denial of service [lib/clplumbing/cl_netstring.c, debian/patches/16-oob-read.patch, CVE-2006-3121] stable/main/binary-s390/libpils-dev_1.2.3-9sarge6_s390.deb stable/main/binary-s390/heartbeat-dev_1.2.3-9sarge6_s390.deb stable/main/binary-s390/stonith_1.2.3-9sarge6_s390.deb stable/main/binary-s390/libpils0_1.2.3-9sarge6_s390.deb stable/main/binary-s390/libstonith0_1.2.3-9sarge6_s390.deb stable/main/binary-s390/heartbeat_1.2.3-9sarge6_s390.deb stable/main/binary-s390/libstonith-dev_1.2.3-9sarge6_s390.deb heartbeat (1.2.3-9sarge6) stable-security; urgency=high * Non-maintainer upload by the Security Team * Applied patch to fix remote denial of service [lib/clplumbing/cl_netstring.c, debian/patches/16-oob-read.patch, CVE-2006-3121] stable/main/binary-mipsel/libpils-dev_1.2.3-9sarge6_mipsel.deb stable/main/binary-mipsel/heartbeat_1.2.3-9sarge6_mipsel.deb stable/main/binary-mipsel/stonith_1.2.3-9sarge6_mipsel.deb stable/main/binary-mipsel/libstonith0_1.2.3-9sarge6_mipsel.deb stable/main/binary-mipsel/libstonith-dev_1.2.3-9sarge6_mipsel.deb stable/main/binary-mipsel/heartbeat-dev_1.2.3-9sarge6_mipsel.deb stable/main/binary-mipsel/libpils0_1.2.3-9sarge6_mipsel.deb heartbeat (1.2.3-9sarge6) stable-security; urgency=high * Non-maintainer upload by the Security Team * Applied patch to fix remote denial of service [lib/clplumbing/cl_netstring.c, debian/patches/16-oob-read.patch, CVE-2006-3121] stable/main/binary-mips/libpils-dev_1.2.3-9sarge6_mips.deb stable/main/binary-mips/libstonith0_1.2.3-9sarge6_mips.deb stable/main/binary-mips/libpils0_1.2.3-9sarge6_mips.deb stable/main/binary-mips/libstonith-dev_1.2.3-9sarge6_mips.deb stable/main/binary-mips/heartbeat_1.2.3-9sarge6_mips.deb stable/main/binary-mips/heartbeat-dev_1.2.3-9sarge6_mips.deb stable/main/binary-mips/stonith_1.2.3-9sarge6_mips.deb heartbeat (1.2.3-9sarge6) stable-security; urgency=high * Non-maintainer upload by the Security Team * Applied patch to fix remote denial of service [lib/clplumbing/cl_netstring.c, debian/patches/16-oob-read.patch, CVE-2006-3121] stable/main/binary-m68k/libstonith-dev_1.2.3-9sarge6_m68k.deb stable/main/binary-m68k/heartbeat-dev_1.2.3-9sarge6_m68k.deb stable/main/binary-m68k/libstonith0_1.2.3-9sarge6_m68k.deb stable/main/binary-m68k/libpils-dev_1.2.3-9sarge6_m68k.deb stable/main/binary-m68k/heartbeat_1.2.3-9sarge6_m68k.deb stable/main/binary-m68k/stonith_1.2.3-9sarge6_m68k.deb stable/main/binary-m68k/libpils0_1.2.3-9sarge6_m68k.deb heartbeat (1.2.3-9sarge6) stable-security; urgency=high * Non-maintainer upload by the Security Team * Applied patch to fix remote denial of service [lib/clplumbing/cl_netstring.c, debian/patches/16-oob-read.patch, CVE-2006-3121] stable/main/binary-ia64/libpils0_1.2.3-9sarge6_ia64.deb stable/main/binary-ia64/stonith_1.2.3-9sarge6_ia64.deb stable/main/binary-ia64/heartbeat-dev_1.2.3-9sarge6_ia64.deb stable/main/binary-ia64/libpils-dev_1.2.3-9sarge6_ia64.deb stable/main/binary-ia64/libstonith0_1.2.3-9sarge6_ia64.deb stable/main/binary-ia64/heartbeat_1.2.3-9sarge6_ia64.deb stable/main/binary-ia64/libstonith-dev_1.2.3-9sarge6_ia64.deb heartbeat (1.2.3-9sarge6) stable-security; urgency=high * Non-maintainer upload by the Security Team * Applied patch to fix remote denial of service [lib/clplumbing/cl_netstring.c, debian/patches/16-oob-read.patch, CVE-2006-3121] stable/main/binary-i386/libstonith-dev_1.2.3-9sarge6_i386.deb stable/main/binary-i386/stonith_1.2.3-9sarge6_i386.deb stable/main/binary-i386/heartbeat_1.2.3-9sarge6_i386.deb stable/main/binary-i386/libstonith0_1.2.3-9sarge6_i386.deb stable/main/binary-i386/libpils-dev_1.2.3-9sarge6_i386.deb stable/main/binary-i386/libpils0_1.2.3-9sarge6_i386.deb stable/main/binary-i386/heartbeat-dev_1.2.3-9sarge6_i386.deb heartbeat (1.2.3-9sarge6) stable-security; urgency=high * Non-maintainer upload by the Security Team * Applied patch to fix remote denial of service [lib/clplumbing/cl_netstring.c, debian/patches/16-oob-read.patch, CVE-2006-3121] stable/main/binary-hppa/libstonith-dev_1.2.3-9sarge6_hppa.deb stable/main/binary-hppa/libstonith0_1.2.3-9sarge6_hppa.deb stable/main/binary-hppa/stonith_1.2.3-9sarge6_hppa.deb stable/main/binary-hppa/heartbeat_1.2.3-9sarge6_hppa.deb stable/main/binary-hppa/heartbeat-dev_1.2.3-9sarge6_hppa.deb stable/main/binary-hppa/libpils-dev_1.2.3-9sarge6_hppa.deb stable/main/binary-hppa/libpils0_1.2.3-9sarge6_hppa.deb heartbeat (1.2.3-9sarge6) stable-security; urgency=high * Non-maintainer upload by the Security Team * Applied patch to fix remote denial of service [lib/clplumbing/cl_netstring.c, debian/patches/16-oob-read.patch, CVE-2006-3121] stable/main/binary-arm/stonith_1.2.3-9sarge6_arm.deb stable/main/binary-arm/libstonith-dev_1.2.3-9sarge6_arm.deb stable/main/binary-arm/heartbeat_1.2.3-9sarge6_arm.deb stable/main/binary-arm/heartbeat-dev_1.2.3-9sarge6_arm.deb stable/main/binary-arm/libpils-dev_1.2.3-9sarge6_arm.deb stable/main/binary-arm/libpils0_1.2.3-9sarge6_arm.deb stable/main/binary-arm/libstonith0_1.2.3-9sarge6_arm.deb heartbeat (1.2.3-9sarge6) stable-security; urgency=high * Non-maintainer upload by the Security Team * Applied patch to fix remote denial of service [lib/clplumbing/cl_netstring.c, debian/patches/16-oob-read.patch, CVE-2006-3121] stable/main/binary-alpha/heartbeat-dev_1.2.3-9sarge6_alpha.deb stable/main/binary-alpha/libpils-dev_1.2.3-9sarge6_alpha.deb stable/main/binary-alpha/heartbeat_1.2.3-9sarge6_alpha.deb stable/main/binary-alpha/libpils0_1.2.3-9sarge6_alpha.deb stable/main/binary-alpha/stonith_1.2.3-9sarge6_alpha.deb stable/main/binary-alpha/libstonith0_1.2.3-9sarge6_alpha.deb stable/main/binary-alpha/libstonith-dev_1.2.3-9sarge6_alpha.deb heartbeat (1.2.3-9sarge6) stable-security; urgency=high * Non-maintainer upload by the Security Team * Applied patch to fix remote denial of service [lib/clplumbing/cl_netstring.c, debian/patches/16-oob-read.patch, CVE-2006-3121] stable/main/binary-all/ldirectord_1.2.3-9sarge6_all.deb stable/main/binary-powerpc/stonith_1.2.3-9sarge6_powerpc.deb stable/main/binary-powerpc/libstonith0_1.2.3-9sarge6_powerpc.deb stable/main/binary-powerpc/libpils0_1.2.3-9sarge6_powerpc.deb stable/main/source/heartbeat_1.2.3-9sarge6.diff.gz stable/main/binary-powerpc/libstonith-dev_1.2.3-9sarge6_powerpc.deb stable/main/source/heartbeat_1.2.3-9sarge6.dsc stable/main/binary-powerpc/heartbeat_1.2.3-9sarge6_powerpc.deb stable/main/binary-powerpc/heartbeat-dev_1.2.3-9sarge6_powerpc.deb stable/main/binary-powerpc/libpils-dev_1.2.3-9sarge6_powerpc.deb heartbeat (1.2.3-9sarge6) stable-security; urgency=high * Non-maintainer upload by the Security Team * Applied patch to fix remote denial of service [lib/clplumbing/cl_netstring.c, debian/patches/16-oob-read.patch, CVE-2006-3121] stable/main/binary-sparc/hashcash_1.17-1sarge1_sparc.deb hashcash (1.17-1sarge1) stable-security; urgency=high * Apply patch from 1.21 to fix potential heap overflow. (closes: 376444) CVE-2006-3251 stable/main/binary-s390/hashcash_1.17-1sarge1_s390.deb hashcash (1.17-1sarge1) stable-security; urgency=high * Apply patch from 1.21 to fix potential heap overflow. (closes: 376444) CVE-2006-3251 stable/main/binary-mipsel/hashcash_1.17-1sarge1_mipsel.deb hashcash (1.17-1sarge1) stable-security; urgency=high * Apply patch from 1.21 to fix potential heap overflow. (closes: 376444) CVE-2006-3251 stable/main/binary-mips/hashcash_1.17-1sarge1_mips.deb hashcash (1.17-1sarge1) stable-security; urgency=high * Apply patch from 1.21 to fix potential heap overflow. (closes: 376444) CVE-2006-3251 stable/main/binary-m68k/hashcash_1.17-1sarge1_m68k.deb hashcash (1.17-1sarge1) stable-security; urgency=high * Apply patch from 1.21 to fix potential heap overflow. (closes: 376444) CVE-2006-3251 stable/main/binary-ia64/hashcash_1.17-1sarge1_ia64.deb hashcash (1.17-1sarge1) stable-security; urgency=high * Apply patch from 1.21 to fix potential heap overflow. (closes: 376444) CVE-2006-3251 stable/main/binary-i386/hashcash_1.17-1sarge1_i386.deb hashcash (1.17-1sarge1) stable-security; urgency=high * Apply patch from 1.21 to fix potential heap overflow. (closes: 376444) CVE-2006-3251 stable/main/binary-hppa/hashcash_1.17-1sarge1_hppa.deb hashcash (1.17-1sarge1) stable-security; urgency=high * Apply patch from 1.21 to fix potential heap overflow. (closes: 376444) CVE-2006-3251 stable/main/binary-arm/hashcash_1.17-1sarge1_arm.deb hashcash (1.17-1sarge1) stable-security; urgency=high * Apply patch from 1.21 to fix potential heap overflow. (closes: 376444) CVE-2006-3251 stable/main/binary-alpha/hashcash_1.17-1sarge1_alpha.deb hashcash (1.17-1sarge1) stable-security; urgency=high * Apply patch from 1.21 to fix potential heap overflow. (closes: 376444) CVE-2006-3251 stable/main/source/hashcash_1.17-1sarge1.dsc stable/main/binary-powerpc/hashcash_1.17-1sarge1_powerpc.deb stable/main/source/hashcash_1.17-1sarge1.diff.gz hashcash (1.17-1sarge1) stable-security; urgency=high * Apply patch from 1.21 to fix potential heap overflow. (closes: 376444) CVE-2006-3251 stable/main/source/grub_0.95+cvs20040624-17sarge1.dsc stable/main/binary-all/grub-disk_0.95+cvs20040624-17sarge1_all.deb stable/main/binary-i386/grub_0.95+cvs20040624-17sarge1_i386.deb stable/main/source/grub_0.95+cvs20040624-17sarge1.diff.gz stable/main/binary-all/grub-doc_0.95+cvs20040624-17sarge1_all.deb grub (0.95+cvs20040624-17sarge1) stable; urgency=low * update-grub: redirect output to stderr to allow upgrading to Etch kernel images. This fix is based in a patch proposed by Manoj Srivastava <srivasta@debian.org>. stable/main/binary-sparc/gpdf_2.8.2-1.2sarge5_sparc.deb gpdf (2.8.2-1.2sarge5) stable-security; urgency=high * Non-maintainer upload by the Security Team * Applied patch backported by Loïc Minier to fix denial of service [fofi/FoFiTrueType.cc, debian/patches/009_CVE-2005-2097.patch] stable/main/binary-s390/gpdf_2.8.2-1.2sarge5_s390.deb gpdf (2.8.2-1.2sarge5) stable-security; urgency=high * Non-maintainer upload by the Security Team * Applied patch backported by Loïc Minier to fix denial of service [fofi/FoFiTrueType.cc, debian/patches/009_CVE-2005-2097.patch] stable/main/binary-mipsel/gpdf_2.8.2-1.2sarge5_mipsel.deb gpdf (2.8.2-1.2sarge5) stable-security; urgency=high * Non-maintainer upload by the Security Team * Applied patch backported by Loïc Minier to fix denial of service [fofi/FoFiTrueType.cc, debian/patches/009_CVE-2005-2097.patch] stable/main/binary-mips/gpdf_2.8.2-1.2sarge5_mips.deb gpdf (2.8.2-1.2sarge5) stable-security; urgency=high * Non-maintainer upload by the Security Team * Applied patch backported by Loïc Minier to fix denial of service [fofi/FoFiTrueType.cc, debian/patches/009_CVE-2005-2097.patch] stable/main/binary-m68k/gpdf_2.8.2-1.2sarge5_m68k.deb gpdf (2.8.2-1.2sarge5) stable-security; urgency=high * Non-maintainer upload by the Security Team * Applied patch backported by Loïc Minier to fix denial of service [fofi/FoFiTrueType.cc, debian/patches/009_CVE-2005-2097.patch] stable/main/binary-ia64/gpdf_2.8.2-1.2sarge5_ia64.deb gpdf (2.8.2-1.2sarge5) stable-security; urgency=high * Non-maintainer upload by the Security Team * Applied patch backported by Loïc Minier to fix denial of service [fofi/FoFiTrueType.cc, debian/patches/009_CVE-2005-2097.patch] stable/main/binary-i386/gpdf_2.8.2-1.2sarge5_i386.deb gpdf (2.8.2-1.2sarge5) stable-security; urgency=high * Non-maintainer upload by the Security Team * Applied patch backported by Loïc Minier to fix denial of service [fofi/FoFiTrueType.cc, debian/patches/009_CVE-2005-2097.patch] stable/main/binary-hppa/gpdf_2.8.2-1.2sarge5_hppa.deb gpdf (2.8.2-1.2sarge5) stable-security; urgency=high * Non-maintainer upload by the Security Team * Applied patch backported by Loïc Minier to fix denial of service [fofi/FoFiTrueType.cc, debian/patches/009_CVE-2005-2097.patch] stable/main/binary-arm/gpdf_2.8.2-1.2sarge5_arm.deb gpdf (2.8.2-1.2sarge5) stable-security; urgency=high * Non-maintainer upload by the Security Team * Applied patch backported by Loïc Minier to fix denial of service [fofi/FoFiTrueType.cc, debian/patches/009_CVE-2005-2097.patch] stable/main/binary-alpha/gpdf_2.8.2-1.2sarge5_alpha.deb gpdf (2.8.2-1.2sarge5) stable-security; urgency=high * Non-maintainer upload by the Security Team * Applied patch backported by Loïc Minier to fix denial of service [fofi/FoFiTrueType.cc, debian/patches/009_CVE-2005-2097.patch] stable/main/binary-powerpc/gpdf_2.8.2-1.2sarge5_powerpc.deb stable/main/source/gpdf_2.8.2-1.2sarge5.dsc stable/main/source/gpdf_2.8.2-1.2sarge5.diff.gz gpdf (2.8.2-1.2sarge5) stable-security; urgency=high * Non-maintainer upload by the Security Team * Applied patch backported by Loïc Minier to fix denial of service [fofi/FoFiTrueType.cc, debian/patches/009_CVE-2005-2097.patch] stable/main/binary-sparc/libgnutls11-dev_1.0.16-13.2sarge1_sparc.deb stable/main/binary-sparc/gnutls-bin_1.0.16-13.2sarge1_sparc.deb stable/main/binary-sparc/libgnutls11-dbg_1.0.16-13.2sarge1_sparc.deb stable/main/binary-sparc/libgnutls11_1.0.16-13.2sarge1_sparc.deb gnutls11 (1.0.16-13.2sarge1) stable; urgency=low * Fix occasional SSL connection setup error. Closes:#325971 stable/main/binary-s390/libgnutls11_1.0.16-13.2sarge1_s390.deb stable/main/binary-s390/libgnutls11-dev_1.0.16-13.2sarge1_s390.deb stable/main/binary-s390/gnutls-bin_1.0.16-13.2sarge1_s390.deb stable/main/binary-s390/libgnutls11-dbg_1.0.16-13.2sarge1_s390.deb gnutls11 (1.0.16-13.2sarge1) stable; urgency=low * Fix occasional SSL connection setup error. Closes:#325971 stable/main/binary-powerpc/libgnutls11-dbg_1.0.16-13.2sarge1_powerpc.deb stable/main/binary-powerpc/gnutls-bin_1.0.16-13.2sarge1_powerpc.deb stable/main/binary-powerpc/libgnutls11_1.0.16-13.2sarge1_powerpc.deb stable/main/binary-powerpc/libgnutls11-dev_1.0.16-13.2sarge1_powerpc.deb gnutls11 (1.0.16-13.2sarge1) stable; urgency=low * Fix occasional SSL connection setup error. Closes:#325971 stable/main/binary-mipsel/libgnutls11-dbg_1.0.16-13.2sarge1_mipsel.deb stable/main/binary-mipsel/libgnutls11_1.0.16-13.2sarge1_mipsel.deb stable/main/binary-mipsel/gnutls-bin_1.0.16-13.2sarge1_mipsel.deb stable/main/binary-mipsel/libgnutls11-dev_1.0.16-13.2sarge1_mipsel.deb gnutls11 (1.0.16-13.2sarge1) stable; urgency=low * Fix occasional SSL connection setup error. Closes:#325971 stable/main/binary-mips/libgnutls11_1.0.16-13.2sarge1_mips.deb stable/main/binary-mips/libgnutls11-dbg_1.0.16-13.2sarge1_mips.deb stable/main/binary-mips/gnutls-bin_1.0.16-13.2sarge1_mips.deb stable/main/binary-mips/libgnutls11-dev_1.0.16-13.2sarge1_mips.deb gnutls11 (1.0.16-13.2sarge1) stable; urgency=low * Fix occasional SSL connection setup error. Closes:#325971 stable/main/binary-m68k/libgnutls11-dbg_1.0.16-13.2sarge1_m68k.deb stable/main/binary-m68k/libgnutls11_1.0.16-13.2sarge1_m68k.deb stable/main/binary-m68k/libgnutls11-dev_1.0.16-13.2sarge1_m68k.deb stable/main/binary-m68k/gnutls-bin_1.0.16-13.2sarge1_m68k.deb gnutls11 (1.0.16-13.2sarge1) stable; urgency=low * Fix occasional SSL connection setup error. Closes:#325971 stable/main/binary-ia64/libgnutls11_1.0.16-13.2sarge1_ia64.deb stable/main/binary-ia64/libgnutls11-dbg_1.0.16-13.2sarge1_ia64.deb stable/main/binary-ia64/gnutls-bin_1.0.16-13.2sarge1_ia64.deb stable/main/binary-ia64/libgnutls11-dev_1.0.16-13.2sarge1_ia64.deb gnutls11 (1.0.16-13.2sarge1) stable; urgency=low * Fix occasional SSL connection setup error. Closes:#325971 stable/main/binary-hppa/libgnutls11-dbg_1.0.16-13.2sarge1_hppa.deb stable/main/binary-hppa/libgnutls11_1.0.16-13.2sarge1_hppa.deb stable/main/binary-hppa/gnutls-bin_1.0.16-13.2sarge1_hppa.deb stable/main/binary-hppa/libgnutls11-dev_1.0.16-13.2sarge1_hppa.deb gnutls11 (1.0.16-13.2sarge1) stable; urgency=low * Fix occasional SSL connection setup error. Closes:#325971 stable/main/binary-arm/libgnutls11-dev_1.0.16-13.2sarge1_arm.deb stable/main/binary-arm/libgnutls11_1.0.16-13.2sarge1_arm.deb stable/main/binary-arm/gnutls-bin_1.0.16-13.2sarge1_arm.deb stable/main/binary-arm/libgnutls11-dbg_1.0.16-13.2sarge1_arm.deb gnutls11 (1.0.16-13.2sarge1) stable; urgency=low * Fix occasional SSL connection setup error. Closes:#325971 stable/main/binary-alpha/libgnutls11_1.0.16-13.2sarge1_alpha.deb stable/main/binary-alpha/libgnutls11-dbg_1.0.16-13.2sarge1_alpha.deb stable/main/binary-alpha/gnutls-bin_1.0.16-13.2sarge1_alpha.deb stable/main/binary-alpha/libgnutls11-dev_1.0.16-13.2sarge1_alpha.deb gnutls11 (1.0.16-13.2sarge1) stable; urgency=low * Fix occasional SSL connection setup error. Closes:#325971 stable/main/binary-i386/libgnutls11-dev_1.0.16-13.2sarge1_i386.deb stable/main/source/gnutls11_1.0.16-13.2sarge1.diff.gz stable/main/binary-i386/libgnutls11-dbg_1.0.16-13.2sarge1_i386.deb stable/main/source/gnutls11_1.0.16-13.2sarge1.dsc stable/main/binary-i386/gnutls-bin_1.0.16-13.2sarge1_i386.deb stable/main/binary-i386/libgnutls11_1.0.16-13.2sarge1_i386.deb gnutls11 (1.0.16-13.2sarge1) stable; urgency=low * Fix occasional SSL connection setup error. Closes:#325971 stable/main/binary-sparc/gnupg-agent_1.9.15-6sarge2_sparc.deb stable/main/binary-sparc/gpgsm_1.9.15-6sarge2_sparc.deb stable/main/binary-sparc/gnupg2_1.9.15-6sarge2_sparc.deb gnupg2 (1.9.15-6sarge2) stable-security; urgency=high * Non-maintainer upload by the Security Team * Forward ported patch from upstream 1.4.5 to prevent crash when receiving overly long comments [g10/parse-packet.c, CVE-2006-3746] stable/main/binary-s390/gnupg2_1.9.15-6sarge2_s390.deb stable/main/binary-s390/gnupg-agent_1.9.15-6sarge2_s390.deb stable/main/binary-s390/gpgsm_1.9.15-6sarge2_s390.deb gnupg2 (1.9.15-6sarge2) stable-security; urgency=high * Non-maintainer upload by the Security Team * Forward ported patch from upstream 1.4.5 to prevent crash when receiving overly long comments [g10/parse-packet.c, CVE-2006-3746] stable/main/binary-mipsel/gpgsm_1.9.15-6sarge2_mipsel.deb stable/main/binary-mipsel/gnupg-agent_1.9.15-6sarge2_mipsel.deb stable/main/binary-mipsel/gnupg2_1.9.15-6sarge2_mipsel.deb gnupg2 (1.9.15-6sarge2) stable-security; urgency=high * Non-maintainer upload by the Security Team * Forward ported patch from upstream 1.4.5 to prevent crash when receiving overly long comments [g10/parse-packet.c, CVE-2006-3746] stable/main/binary-mips/gnupg2_1.9.15-6sarge2_mips.deb stable/main/binary-mips/gnupg-agent_1.9.15-6sarge2_mips.deb stable/main/binary-mips/gpgsm_1.9.15-6sarge2_mips.deb gnupg2 (1.9.15-6sarge2) stable-security; urgency=high * Non-maintainer upload by the Security Team * Forward ported patch from upstream 1.4.5 to prevent crash when receiving overly long comments [g10/parse-packet.c, CVE-2006-3746] stable/main/binary-m68k/gnupg-agent_1.9.15-6sarge2_m68k.deb stable/main/binary-m68k/gnupg2_1.9.15-6sarge2_m68k.deb stable/main/binary-m68k/gpgsm_1.9.15-6sarge2_m68k.deb gnupg2 (1.9.15-6sarge2) stable-security; urgency=high * Non-maintainer upload by the Security Team * Forward ported patch from upstream 1.4.5 to prevent crash when receiving overly long comments [g10/parse-packet.c, CVE-2006-3746] stable/main/binary-ia64/gnupg-agent_1.9.15-6sarge2_ia64.deb stable/main/binary-ia64/gnupg2_1.9.15-6sarge2_ia64.deb stable/main/binary-ia64/gpgsm_1.9.15-6sarge2_ia64.deb gnupg2 (1.9.15-6sarge2) stable-security; urgency=high * Non-maintainer upload by the Security Team * Forward ported patch from upstream 1.4.5 to prevent crash when receiving overly long comments [g10/parse-packet.c, CVE-2006-3746] stable/main/binary-i386/gpgsm_1.9.15-6sarge2_i386.deb stable/main/binary-i386/gnupg-agent_1.9.15-6sarge2_i386.deb stable/main/binary-i386/gnupg2_1.9.15-6sarge2_i386.deb gnupg2 (1.9.15-6sarge2) stable-security; urgency=high * Non-maintainer upload by the Security Team * Forward ported patch from upstream 1.4.5 to prevent crash when receiving overly long comments [g10/parse-packet.c, CVE-2006-3746] stable/main/binary-hppa/gpgsm_1.9.15-6sarge2_hppa.deb stable/main/binary-hppa/gnupg2_1.9.15-6sarge2_hppa.deb stable/main/binary-hppa/gnupg-agent_1.9.15-6sarge2_hppa.deb gnupg2 (1.9.15-6sarge2) stable-security; urgency=high * Non-maintainer upload by the Security Team * Forward ported patch from upstream 1.4.5 to prevent crash when receiving overly long comments [g10/parse-packet.c, CVE-2006-3746] stable/main/binary-arm/gpgsm_1.9.15-6sarge2_arm.deb stable/main/binary-arm/gnupg2_1.9.15-6sarge2_arm.deb stable/main/binary-arm/gnupg-agent_1.9.15-6sarge2_arm.deb gnupg2 (1.9.15-6sarge2) stable-security; urgency=high * Non-maintainer upload by the Security Team * Forward ported patch from upstream 1.4.5 to prevent crash when receiving overly long comments [g10/parse-packet.c, CVE-2006-3746] stable/main/binary-alpha/gnupg2_1.9.15-6sarge2_alpha.deb stable/main/binary-alpha/gpgsm_1.9.15-6sarge2_alpha.deb stable/main/binary-alpha/gnupg-agent_1.9.15-6sarge2_alpha.deb gnupg2 (1.9.15-6sarge2) stable-security; urgency=high * Non-maintainer upload by the Security Team * Forward ported patch from upstream 1.4.5 to prevent crash when receiving overly long comments [g10/parse-packet.c, CVE-2006-3746] stable/main/source/gnupg2_1.9.15-6sarge2.diff.gz stable/main/binary-powerpc/gnupg2_1.9.15-6sarge2_powerpc.deb stable/main/source/gnupg2_1.9.15-6sarge2.dsc stable/main/binary-powerpc/gpgsm_1.9.15-6sarge2_powerpc.deb stable/main/binary-powerpc/gnupg-agent_1.9.15-6sarge2_powerpc.deb gnupg2 (1.9.15-6sarge2) stable-security; urgency=high * Non-maintainer upload by the Security Team * Forward ported patch from upstream 1.4.5 to prevent crash when receiving overly long comments [g10/parse-packet.c, CVE-2006-3746] stable/main/binary-sparc/gnupg_1.4.1-1.sarge5_sparc.deb stable/main/binary-sparc/gpgv-udeb_1.4.1-1.sarge5_sparc.udeb gnupg (1.4.1-1.sarge5) stable-security; urgency=high * Non-maintainer upload by the Security Team * Backported patch from upstream 1.4.5 to prevent crash when receiving overly long comments [g10/parse-packet.c, 23_CVE-2006-3746.dpatch] stable/main/binary-s390/gpgv-udeb_1.4.1-1.sarge5_s390.udeb stable/main/binary-s390/gnupg_1.4.1-1.sarge5_s390.deb gnupg (1.4.1-1.sarge5) stable-security; urgency=high * Non-maintainer upload by the Security Team * Backported patch from upstream 1.4.5 to prevent crash when receiving overly long comments [g10/parse-packet.c, 23_CVE-2006-3746.dpatch] stable/main/binary-mipsel/gpgv-udeb_1.4.1-1.sarge5_mipsel.udeb stable/main/binary-mipsel/gnupg_1.4.1-1.sarge5_mipsel.deb gnupg (1.4.1-1.sarge5) stable-security; urgency=high * Non-maintainer upload by the Security Team * Backported patch from upstream 1.4.5 to prevent crash when receiving overly long comments [g10/parse-packet.c, 23_CVE-2006-3746.dpatch] stable/main/binary-mips/gpgv-udeb_1.4.1-1.sarge5_mips.udeb stable/main/binary-mips/gnupg_1.4.1-1.sarge5_mips.deb gnupg (1.4.1-1.sarge5) stable-security; urgency=high * Non-maintainer upload by the Security Team * Backported patch from upstream 1.4.5 to prevent crash when receiving overly long comments [g10/parse-packet.c, 23_CVE-2006-3746.dpatch] stable/main/binary-m68k/gpgv-udeb_1.4.1-1.sarge5_m68k.udeb stable/main/binary-m68k/gnupg_1.4.1-1.sarge5_m68k.deb gnupg (1.4.1-1.sarge5) stable-security; urgency=high * Non-maintainer upload by the Security Team * Backported patch from upstream 1.4.5 to prevent crash when receiving overly long comments [g10/parse-packet.c, 23_CVE-2006-3746.dpatch] stable/main/binary-ia64/gpgv-udeb_1.4.1-1.sarge5_ia64.udeb stable/main/binary-ia64/gnupg_1.4.1-1.sarge5_ia64.deb gnupg (1.4.1-1.sarge5) stable-security; urgency=high * Non-maintainer upload by the Security Team * Backported patch from upstream 1.4.5 to prevent crash when receiving overly long comments [g10/parse-packet.c, 23_CVE-2006-3746.dpatch] stable/main/binary-i386/gnupg_1.4.1-1.sarge5_i386.deb stable/main/binary-i386/gpgv-udeb_1.4.1-1.sarge5_i386.udeb gnupg (1.4.1-1.sarge5) stable-security; urgency=high * Non-maintainer upload by the Security Team * Backported patch from upstream 1.4.5 to prevent crash when receiving overly long comments [g10/parse-packet.c, 23_CVE-2006-3746.dpatch] stable/main/binary-hppa/gnupg_1.4.1-1.sarge5_hppa.deb stable/main/binary-hppa/gpgv-udeb_1.4.1-1.sarge5_hppa.udeb gnupg (1.4.1-1.sarge5) stable-security; urgency=high * Non-maintainer upload by the Security Team * Backported patch from upstream 1.4.5 to prevent crash when receiving overly long comments [g10/parse-packet.c, 23_CVE-2006-3746.dpatch] stable/main/binary-arm/gnupg_1.4.1-1.sarge5_arm.deb stable/main/binary-arm/gpgv-udeb_1.4.1-1.sarge5_arm.udeb gnupg (1.4.1-1.sarge5) stable-security; urgency=high * Non-maintainer upload by the Security Team * Backported patch from upstream 1.4.5 to prevent crash when receiving overly long comments [g10/parse-packet.c, 23_CVE-2006-3746.dpatch] stable/main/binary-alpha/gpgv-udeb_1.4.1-1.sarge5_alpha.udeb stable/main/binary-alpha/gnupg_1.4.1-1.sarge5_alpha.deb gnupg (1.4.1-1.sarge5) stable-security; urgency=high * Non-maintainer upload by the Security Team * Backported patch from upstream 1.4.5 to prevent crash when receiving overly long comments [g10/parse-packet.c, 23_CVE-2006-3746.dpatch] stable/main/source/gnupg_1.4.1-1.sarge5.dsc stable/main/binary-powerpc/gpgv-udeb_1.4.1-1.sarge5_powerpc.udeb stable/main/binary-powerpc/gnupg_1.4.1-1.sarge5_powerpc.deb stable/main/source/gnupg_1.4.1-1.sarge5.diff.gz gnupg (1.4.1-1.sarge5) stable-security; urgency=high * Non-maintainer upload by the Security Team * Backported patch from upstream 1.4.5 to prevent crash when receiving overly long comments [g10/parse-packet.c, 23_CVE-2006-3746.dpatch] stable/main/binary-sparc/libc6-dbg_2.3.2.ds1-22sarge4_sparc.deb stable/main/binary-sparc/libc6_2.3.2.ds1-22sarge4_sparc.deb stable/main/binary-sparc/libc6-pic_2.3.2.ds1-22sarge4_sparc.deb stable/main/binary-sparc/libnss-files-udeb_2.3.2.ds1-22sarge4_sparc.udeb stable/main/binary-sparc/libc6-prof_2.3.2.ds1-22sarge4_sparc.deb stable/main/binary-sparc/libc6-sparcv9b_2.3.2.ds1-22sarge4_sparc.deb stable/main/binary-sparc/libc6-dev-sparc64_2.3.2.ds1-22sarge4_sparc.deb stable/main/binary-sparc/libc6-sparc64_2.3.2.ds1-22sarge4_sparc.deb stable/main/binary-sparc/nscd_2.3.2.ds1-22sarge4_sparc.deb stable/main/binary-sparc/libnss-dns-udeb_2.3.2.ds1-22sarge4_sparc.udeb stable/main/binary-sparc/libc6-dev_2.3.2.ds1-22sarge4_sparc.deb stable/main/binary-sparc/libc6-udeb_2.3.2.ds1-22sarge4_sparc.udeb stable/main/binary-sparc/libc6-sparcv9_2.3.2.ds1-22sarge4_sparc.deb glibc (2.3.2.ds1-22sarge4) stable; urgency=low * Aurelien Jarno <aurel32@debian.org> - debian/sysdeps/linux.mk: Don't build with make -j even if we have multiple CPU. stable/main/binary-s390/libc6-dev_2.3.2.ds1-22sarge4_s390.deb stable/main/binary-s390/libnss-files-udeb_2.3.2.ds1-22sarge4_s390.udeb stable/main/binary-s390/libc6-pic_2.3.2.ds1-22sarge4_s390.deb stable/main/binary-s390/nscd_2.3.2.ds1-22sarge4_s390.deb stable/main/binary-s390/libnss-dns-udeb_2.3.2.ds1-22sarge4_s390.udeb stable/main/binary-s390/libc6-dev-s390x_2.3.2.ds1-22sarge4_s390.deb stable/main/binary-s390/libc6-s390x_2.3.2.ds1-22sarge4_s390.deb stable/main/binary-s390/libc6-prof_2.3.2.ds1-22sarge4_s390.deb stable/main/binary-s390/libc6-dbg_2.3.2.ds1-22sarge4_s390.deb stable/main/binary-s390/libc6-udeb_2.3.2.ds1-22sarge4_s390.udeb stable/main/binary-s390/libc6_2.3.2.ds1-22sarge4_s390.deb glibc (2.3.2.ds1-22sarge4) stable; urgency=low * Aurelien Jarno <aurel32@debian.org> - debian/sysdeps/linux.mk: Don't build with make -j even if we have multiple CPU. stable/main/binary-powerpc/libc6-dbg_2.3.2.ds1-22sarge4_powerpc.deb stable/main/binary-powerpc/libc6-dev_2.3.2.ds1-22sarge4_powerpc.deb stable/main/binary-powerpc/libc6-udeb_2.3.2.ds1-22sarge4_powerpc.udeb stable/main/binary-powerpc/nscd_2.3.2.ds1-22sarge4_powerpc.deb stable/main/binary-powerpc/libnss-files-udeb_2.3.2.ds1-22sarge4_powerpc.udeb stable/main/binary-powerpc/libc6-pic_2.3.2.ds1-22sarge4_powerpc.deb stable/main/binary-powerpc/libc6_2.3.2.ds1-22sarge4_powerpc.deb stable/main/binary-powerpc/libc6-prof_2.3.2.ds1-22sarge4_powerpc.deb stable/main/binary-powerpc/libnss-dns-udeb_2.3.2.ds1-22sarge4_powerpc.udeb glibc (2.3.2.ds1-22sarge4) stable; urgency=low * Aurelien Jarno <aurel32@debian.org> - debian/sysdeps/linux.mk: Don't build with make -j even if we have multiple CPU. stable/main/binary-mipsel/libc6-dev_2.3.2.ds1-22sarge4_mipsel.deb stable/main/binary-mipsel/libc6-udeb_2.3.2.ds1-22sarge4_mipsel.udeb stable/main/binary-mipsel/libnss-files-udeb_2.3.2.ds1-22sarge4_mipsel.udeb stable/main/binary-mipsel/libnss-dns-udeb_2.3.2.ds1-22sarge4_mipsel.udeb stable/main/binary-mipsel/libc6-prof_2.3.2.ds1-22sarge4_mipsel.deb stable/main/binary-mipsel/libc6-dbg_2.3.2.ds1-22sarge4_mipsel.deb stable/main/binary-mipsel/nscd_2.3.2.ds1-22sarge4_mipsel.deb stable/main/binary-mipsel/libc6_2.3.2.ds1-22sarge4_mipsel.deb stable/main/binary-mipsel/libc6-pic_2.3.2.ds1-22sarge4_mipsel.deb glibc (2.3.2.ds1-22sarge4) stable; urgency=low * Aurelien Jarno <aurel32@debian.org> - debian/sysdeps/linux.mk: Don't build with make -j even if we have multiple CPU. stable/main/binary-mips/nscd_2.3.2.ds1-22sarge4_mips.deb stable/main/binary-mips/libc6-dev_2.3.2.ds1-22sarge4_mips.deb stable/main/binary-mips/libc6-prof_2.3.2.ds1-22sarge4_mips.deb stable/main/binary-mips/libc6-dbg_2.3.2.ds1-22sarge4_mips.deb stable/main/binary-mips/libc6_2.3.2.ds1-22sarge4_mips.deb stable/main/binary-mips/libc6-pic_2.3.2.ds1-22sarge4_mips.deb stable/main/binary-mips/libnss-dns-udeb_2.3.2.ds1-22sarge4_mips.udeb stable/main/binary-mips/libc6-udeb_2.3.2.ds1-22sarge4_mips.udeb stable/main/binary-mips/libnss-files-udeb_2.3.2.ds1-22sarge4_mips.udeb glibc (2.3.2.ds1-22sarge4) stable; urgency=low * Aurelien Jarno <aurel32@debian.org> - debian/sysdeps/linux.mk: Don't build with make -j even if we have multiple CPU. stable/main/binary-m68k/libc6-prof_2.3.2.ds1-22sarge4_m68k.deb stable/main/binary-m68k/libc6_2.3.2.ds1-22sarge4_m68k.deb stable/main/binary-m68k/libc6-dbg_2.3.2.ds1-22sarge4_m68k.deb stable/main/binary-m68k/nscd_2.3.2.ds1-22sarge4_m68k.deb stable/main/binary-m68k/libc6-pic_2.3.2.ds1-22sarge4_m68k.deb stable/main/binary-m68k/libc6-dev_2.3.2.ds1-22sarge4_m68k.deb stable/main/binary-m68k/libnss-dns-udeb_2.3.2.ds1-22sarge4_m68k.udeb stable/main/binary-m68k/libnss-files-udeb_2.3.2.ds1-22sarge4_m68k.udeb stable/main/binary-m68k/libc6-udeb_2.3.2.ds1-22sarge4_m68k.udeb glibc (2.3.2.ds1-22sarge4) stable; urgency=low * Aurelien Jarno <aurel32@debian.org> - debian/sysdeps/linux.mk: Don't build with make -j even if we have multiple CPU. stable/main/binary-ia64/libnss-dns-udeb_2.3.2.ds1-22sarge4_ia64.udeb stable/main/binary-ia64/libc6.1_2.3.2.ds1-22sarge4_ia64.deb stable/main/binary-ia64/libc6.1-pic_2.3.2.ds1-22sarge4_ia64.deb stable/main/binary-ia64/libc6.1-udeb_2.3.2.ds1-22sarge4_ia64.udeb stable/main/binary-ia64/nscd_2.3.2.ds1-22sarge4_ia64.deb stable/main/binary-ia64/libnss-files-udeb_2.3.2.ds1-22sarge4_ia64.udeb stable/main/binary-ia64/libc6.1-dev_2.3.2.ds1-22sarge4_ia64.deb stable/main/binary-ia64/libc6.1-prof_2.3.2.ds1-22sarge4_ia64.deb stable/main/binary-ia64/libc6.1-dbg_2.3.2.ds1-22sarge4_ia64.deb glibc (2.3.2.ds1-22sarge4) stable; urgency=low * Aurelien Jarno <aurel32@debian.org> - debian/sysdeps/linux.mk: Don't build with make -j even if we have multiple CPU. stable/main/binary-hppa/libc6-dev_2.3.2.ds1-22sarge4_hppa.deb stable/main/binary-hppa/libc6-pic_2.3.2.ds1-22sarge4_hppa.deb stable/main/binary-hppa/libc6-prof_2.3.2.ds1-22sarge4_hppa.deb stable/main/binary-hppa/libc6_2.3.2.ds1-22sarge4_hppa.deb stable/main/binary-hppa/nscd_2.3.2.ds1-22sarge4_hppa.deb stable/main/binary-hppa/libc6-udeb_2.3.2.ds1-22sarge4_hppa.udeb stable/main/binary-hppa/libnss-files-udeb_2.3.2.ds1-22sarge4_hppa.udeb stable/main/binary-hppa/libnss-dns-udeb_2.3.2.ds1-22sarge4_hppa.udeb stable/main/binary-hppa/libc6-dbg_2.3.2.ds1-22sarge4_hppa.deb glibc (2.3.2.ds1-22sarge4) stable; urgency=low * Aurelien Jarno <aurel32@debian.org> - debian/sysdeps/linux.mk: Don't build with make -j even if we have multiple CPU. stable/main/binary-arm/libc6_2.3.2.ds1-22sarge4_arm.deb stable/main/binary-arm/libc6-dbg_2.3.2.ds1-22sarge4_arm.deb stable/main/binary-arm/libc6-prof_2.3.2.ds1-22sarge4_arm.deb stable/main/binary-arm/libc6-pic_2.3.2.ds1-22sarge4_arm.deb stable/main/binary-arm/libc6-udeb_2.3.2.ds1-22sarge4_arm.udeb stable/main/binary-arm/nscd_2.3.2.ds1-22sarge4_arm.deb stable/main/binary-arm/libnss-dns-udeb_2.3.2.ds1-22sarge4_arm.udeb stable/main/binary-arm/libc6-dev_2.3.2.ds1-22sarge4_arm.deb stable/main/binary-arm/libnss-files-udeb_2.3.2.ds1-22sarge4_arm.udeb glibc (2.3.2.ds1-22sarge4) stable; urgency=low * Aurelien Jarno <aurel32@debian.org> - debian/sysdeps/linux.mk: Don't build with make -j even if we have multiple CPU. stable/main/binary-alpha/libc6.1-dev_2.3.2.ds1-22sarge4_alpha.deb stable/main/binary-alpha/libc6.1-udeb_2.3.2.ds1-22sarge4_alpha.udeb stable/main/binary-alpha/nscd_2.3.2.ds1-22sarge4_alpha.deb stable/main/binary-alpha/libc6.1-pic_2.3.2.ds1-22sarge4_alpha.deb stable/main/binary-alpha/libc6.1-dbg_2.3.2.ds1-22sarge4_alpha.deb stable/main/binary-alpha/libnss-files-udeb_2.3.2.ds1-22sarge4_alpha.udeb stable/main/binary-alpha/libc6.1-prof_2.3.2.ds1-22sarge4_alpha.deb stable/main/binary-alpha/libnss-dns-udeb_2.3.2.ds1-22sarge4_alpha.udeb stable/main/binary-alpha/libc6.1_2.3.2.ds1-22sarge4_alpha.deb glibc (2.3.2.ds1-22sarge4) stable; urgency=low * Aurelien Jarno <aurel32@debian.org> - debian/sysdeps/linux.mk: Don't build with make -j even if we have multiple CPU. stable/main/binary-i386/libc6_2.3.2.ds1-22sarge4_i386.deb stable/main/binary-i386/libc6-dev_2.3.2.ds1-22sarge4_i386.deb stable/main/binary-all/locales_2.3.2.ds1-22sarge4_all.deb stable/main/binary-all/glibc-doc_2.3.2.ds1-22sarge4_all.deb stable/main/binary-i386/libc6-prof_2.3.2.ds1-22sarge4_i386.deb stable/main/binary-i386/libc6-i686_2.3.2.ds1-22sarge4_i386.deb stable/main/binary-i386/libc6-dbg_2.3.2.ds1-22sarge4_i386.deb stable/main/binary-i386/nscd_2.3.2.ds1-22sarge4_i386.deb stable/main/source/glibc_2.3.2.ds1-22sarge4.diff.gz stable/main/source/glibc_2.3.2.ds1-22sarge4.dsc stable/main/binary-i386/libnss-files-udeb_2.3.2.ds1-22sarge4_i386.udeb stable/main/binary-i386/libnss-dns-udeb_2.3.2.ds1-22sarge4_i386.udeb stable/main/binary-i386/libc6-pic_2.3.2.ds1-22sarge4_i386.deb stable/main/binary-i386/libc6-udeb_2.3.2.ds1-22sarge4_i386.udeb glibc (2.3.2.ds1-22sarge4) stable; urgency=low * Aurelien Jarno <aurel32@debian.org> - debian/sysdeps/linux.mk: Don't build with make -j even if we have multiple CPU. stable/main/binary-sparc/gimp-python_2.2.6-1sarge1_sparc.deb stable/main/binary-sparc/gimp_2.2.6-1sarge1_sparc.deb stable/main/binary-sparc/gimp-svg_2.2.6-1sarge1_sparc.deb stable/main/binary-sparc/libgimp2.0_2.2.6-1sarge1_sparc.deb stable/main/binary-sparc/libgimp2.0-dev_2.2.6-1sarge1_sparc.deb stable/main/binary-sparc/gimp-helpbrowser_2.2.6-1sarge1_sparc.deb gimp (2.2.6-1sarge1) stable-security; urgency=high * Non-maintainer upload by the Security Team: Fix buffer overflow in XCF parser, discovered by Henning Makholm. [CVE-2006-3404] stable/main/binary-s390/gimp-svg_2.2.6-1sarge1_s390.deb stable/main/binary-s390/gimp-python_2.2.6-1sarge1_s390.deb stable/main/binary-s390/libgimp2.0-dev_2.2.6-1sarge1_s390.deb stable/main/binary-s390/libgimp2.0_2.2.6-1sarge1_s390.deb stable/main/binary-s390/gimp-helpbrowser_2.2.6-1sarge1_s390.deb stable/main/binary-s390/gimp_2.2.6-1sarge1_s390.deb gimp (2.2.6-1sarge1) stable-security; urgency=high * Non-maintainer upload by the Security Team: Fix buffer overflow in XCF parser, discovered by Henning Makholm. [CVE-2006-3404] stable/main/binary-powerpc/gimp-helpbrowser_2.2.6-1sarge1_powerpc.deb stable/main/binary-powerpc/gimp-python_2.2.6-1sarge1_powerpc.deb stable/main/binary-powerpc/gimp-svg_2.2.6-1sarge1_powerpc.deb stable/main/binary-powerpc/libgimp2.0_2.2.6-1sarge1_powerpc.deb stable/main/binary-powerpc/libgimp2.0-dev_2.2.6-1sarge1_powerpc.deb stable/main/binary-powerpc/gimp_2.2.6-1sarge1_powerpc.deb gimp (2.2.6-1sarge1) stable-security; urgency=high * Non-maintainer upload by the Security Team: Fix buffer overflow in XCF parser, discovered by Henning Makholm. [CVE-2006-3404] stable/main/binary-mipsel/libgimp2.0_2.2.6-1sarge1_mipsel.deb stable/main/binary-mipsel/gimp-svg_2.2.6-1sarge1_mipsel.deb stable/main/binary-mipsel/gimp_2.2.6-1sarge1_mipsel.deb stable/main/binary-mipsel/gimp-helpbrowser_2.2.6-1sarge1_mipsel.deb stable/main/binary-mipsel/gimp-python_2.2.6-1sarge1_mipsel.deb stable/main/binary-mipsel/libgimp2.0-dev_2.2.6-1sarge1_mipsel.deb gimp (2.2.6-1sarge1) stable-security; urgency=high * Non-maintainer upload by the Security Team: Fix buffer overflow in XCF parser, discovered by Henning Makholm. [CVE-2006-3404] stable/main/binary-mips/libgimp2.0_2.2.6-1sarge1_mips.deb stable/main/binary-mips/libgimp2.0-dev_2.2.6-1sarge1_mips.deb stable/main/binary-mips/gimp-helpbrowser_2.2.6-1sarge1_mips.deb stable/main/binary-mips/gimp_2.2.6-1sarge1_mips.deb stable/main/binary-mips/gimp-svg_2.2.6-1sarge1_mips.deb stable/main/binary-mips/gimp-python_2.2.6-1sarge1_mips.deb gimp (2.2.6-1sarge1) stable-security; urgency=high * Non-maintainer upload by the Security Team: Fix buffer overflow in XCF parser, discovered by Henning Makholm. [CVE-2006-3404] stable/main/binary-m68k/libgimp2.0-dev_2.2.6-1sarge1_m68k.deb stable/main/binary-m68k/libgimp2.0_2.2.6-1sarge1_m68k.deb stable/main/binary-m68k/gimp-python_2.2.6-1sarge1_m68k.deb stable/main/binary-m68k/gimp_2.2.6-1sarge1_m68k.deb stable/main/binary-m68k/gimp-helpbrowser_2.2.6-1sarge1_m68k.deb stable/main/binary-m68k/gimp-svg_2.2.6-1sarge1_m68k.deb gimp (2.2.6-1sarge1) stable-security; urgency=high * Non-maintainer upload by the Security Team: Fix buffer overflow in XCF parser, discovered by Henning Makholm. [CVE-2006-3404] stable/main/binary-ia64/gimp-python_2.2.6-1sarge1_ia64.deb stable/main/binary-ia64/gimp-svg_2.2.6-1sarge1_ia64.deb stable/main/binary-ia64/libgimp2.0-dev_2.2.6-1sarge1_ia64.deb stable/main/binary-ia64/gimp-helpbrowser_2.2.6-1sarge1_ia64.deb stable/main/binary-ia64/gimp_2.2.6-1sarge1_ia64.deb stable/main/binary-ia64/libgimp2.0_2.2.6-1sarge1_ia64.deb gimp (2.2.6-1sarge1) stable-security; urgency=high * Non-maintainer upload by the Security Team: Fix buffer overflow in XCF parser, discovered by Henning Makholm. [CVE-2006-3404] stable/main/binary-hppa/gimp-helpbrowser_2.2.6-1sarge1_hppa.deb stable/main/binary-hppa/libgimp2.0-dev_2.2.6-1sarge1_hppa.deb stable/main/binary-hppa/gimp-python_2.2.6-1sarge1_hppa.deb stable/main/binary-hppa/gimp_2.2.6-1sarge1_hppa.deb stable/main/binary-hppa/libgimp2.0_2.2.6-1sarge1_hppa.deb stable/main/binary-hppa/gimp-svg_2.2.6-1sarge1_hppa.deb gimp (2.2.6-1sarge1) stable-security; urgency=high * Non-maintainer upload by the Security Team: Fix buffer overflow in XCF parser, discovered by Henning Makholm. [CVE-2006-3404] stable/main/binary-arm/libgimp2.0-dev_2.2.6-1sarge1_arm.deb stable/main/binary-arm/gimp_2.2.6-1sarge1_arm.deb stable/main/binary-arm/libgimp2.0_2.2.6-1sarge1_arm.deb stable/main/binary-arm/gimp-python_2.2.6-1sarge1_arm.deb stable/main/binary-arm/gimp-svg_2.2.6-1sarge1_arm.deb stable/main/binary-arm/gimp-helpbrowser_2.2.6-1sarge1_arm.deb gimp (2.2.6-1sarge1) stable-security; urgency=high * Non-maintainer upload by the Security Team: Fix buffer overflow in XCF parser, discovered by Henning Makholm. [CVE-2006-3404] stable/main/binary-alpha/gimp-helpbrowser_2.2.6-1sarge1_alpha.deb stable/main/binary-alpha/libgimp2.0_2.2.6-1sarge1_alpha.deb stable/main/binary-alpha/gimp-svg_2.2.6-1sarge1_alpha.deb stable/main/binary-alpha/gimp-python_2.2.6-1sarge1_alpha.deb stable/main/binary-alpha/libgimp2.0-dev_2.2.6-1sarge1_alpha.deb stable/main/binary-alpha/gimp_2.2.6-1sarge1_alpha.deb gimp (2.2.6-1sarge1) stable-security; urgency=high * Non-maintainer upload by the Security Team: Fix buffer overflow in XCF parser, discovered by Henning Makholm. [CVE-2006-3404] stable/main/binary-i386/gimp-svg_2.2.6-1sarge1_i386.deb stable/main/binary-i386/gimp_2.2.6-1sarge1_i386.deb stable/main/source/gimp_2.2.6-1sarge1.diff.gz stable/main/source/gimp_2.2.6-1sarge1.dsc stable/main/binary-i386/gimp-helpbrowser_2.2.6-1sarge1_i386.deb stable/main/binary-all/gimp1.2_2.2.6-1sarge1_all.deb stable/main/binary-all/libgimp2.0-doc_2.2.6-1sarge1_all.deb stable/main/binary-i386/gimp-python_2.2.6-1sarge1_i386.deb stable/main/binary-i386/libgimp2.0-dev_2.2.6-1sarge1_i386.deb stable/main/binary-all/gimp-data_2.2.6-1sarge1_all.deb stable/main/binary-i386/libgimp2.0_2.2.6-1sarge1_i386.deb gimp (2.2.6-1sarge1) stable-security; urgency=high * Non-maintainer upload by the Security Team: Fix buffer overflow in XCF parser, discovered by Henning Makholm. [CVE-2006-3404] stable/main/binary-all/gforge-cvs_3.1-31sarge1_all.deb stable/main/binary-all/gforge-shell-ldap_3.1-31sarge1_all.deb stable/main/source/gforge_3.1-31sarge1.diff.gz stable/main/binary-all/gforge-sourceforge-transition_3.1-31sarge1_all.deb stable/main/binary-all/gforge-mta-exim4_3.1-31sarge1_all.deb stable/main/binary-all/gforge-common_3.1-31sarge1_all.deb stable/main/binary-all/gforge-mta-exim_3.1-31sarge1_all.deb stable/main/binary-all/gforge_3.1-31sarge1_all.deb stable/main/binary-all/gforge-dns-bind9_3.1-31sarge1_all.deb stable/main/binary-all/gforge-ldap-openldap_3.1-31sarge1_all.deb stable/main/binary-all/sourceforge_3.1-31sarge1_all.deb stable/main/binary-all/gforge-lists-mailman_3.1-31sarge1_all.deb stable/main/binary-all/gforge-ftp-proftpd_3.1-31sarge1_all.deb stable/main/binary-all/gforge-web-apache_3.1-31sarge1_all.deb stable/main/binary-all/gforge-mta-postfix_3.1-31sarge1_all.deb stable/main/binary-all/gforge-db-postgresql_3.1-31sarge1_all.deb stable/main/source/gforge_3.1-31sarge1.dsc gforge (3.1-31sarge1) stable-security; urgency=high * Backported XSS vulnerabilities (CVE-2005-2430) fix from the upstream 4.5 to 4.5.0.1 diff (Closes: #328224). stable/main/binary-sparc/gdm_2.6.0.8-1sarge2_sparc.deb gdm (2.6.0.8-1sarge2) stable-security; urgency=high * Argh. Fix the previous version to actually include the patch. stable/main/binary-s390/gdm_2.6.0.8-1sarge2_s390.deb gdm (2.6.0.8-1sarge2) stable-security; urgency=high * Argh. Fix the previous version to actually include the patch. stable/main/binary-powerpc/gdm_2.6.0.8-1sarge2_powerpc.deb gdm (2.6.0.8-1sarge2) stable-security; urgency=high * Argh. Fix the previous version to actually include the patch. stable/main/binary-mipsel/gdm_2.6.0.8-1sarge2_mipsel.deb gdm (2.6.0.8-1sarge2) stable-security; urgency=high * Argh. Fix the previous version to actually include the patch. stable/main/binary-mips/gdm_2.6.0.8-1sarge2_mips.deb gdm (2.6.0.8-1sarge2) stable-security; urgency=high * Argh. Fix the previous version to actually include the patch. stable/main/binary-m68k/gdm_2.6.0.8-1sarge2_m68k.deb gdm (2.6.0.8-1sarge2) stable-security; urgency=high * Argh. Fix the previous version to actually include the patch. stable/main/binary-ia64/gdm_2.6.0.8-1sarge2_ia64.deb gdm (2.6.0.8-1sarge2) stable-security; urgency=high * Argh. Fix the previous version to actually include the patch. stable/main/binary-hppa/gdm_2.6.0.8-1sarge2_hppa.deb gdm (2.6.0.8-1sarge2) stable-security; urgency=high * Argh. Fix the previous version to actually include the patch. stable/main/binary-arm/gdm_2.6.0.8-1sarge2_arm.deb gdm (2.6.0.8-1sarge2) stable-security; urgency=high * Argh. Fix the previous version to actually include the patch. stable/main/binary-alpha/gdm_2.6.0.8-1sarge2_alpha.deb gdm (2.6.0.8-1sarge2) stable-security; urgency=high * Argh. Fix the previous version to actually include the patch. stable/main/source/gdm_2.6.0.8-1sarge2.dsc stable/main/binary-i386/gdm_2.6.0.8-1sarge2_i386.deb stable/main/source/gdm_2.6.0.8-1sarge2.diff.gz gdm (2.6.0.8-1sarge2) stable-security; urgency=high * Argh. Fix the previous version to actually include the patch. stable/main/source/gallery_1.5-1sarge2.dsc stable/main/source/gallery_1.5-1sarge2.diff.gz stable/main/binary-all/gallery_1.5-1sarge2_all.deb gallery (1.5-1sarge2) stable-security; urgency=high * Fix Cross-site scripting (XSS) vulnerability in Gallery 1.5.1-RC2 and earlier that allows remote attackers to inject arbitrary web script or HTML via EXIF data, such as the Camera Model Tag [util.php, CVE-2005-2734] * Fix Cross-site scripting (XSS) vulnerability in Gallery before 1.5.2 that allows remote attackers to inject arbitrary web script or HTML via unknown attack vectors, possibly involving the user name (fullname). [register.php, CVE-2006-0330] * Fix two file exposure bugs in stats module [stats.php, CVE-2006-4030] stable/main/binary-sparc/freetype2-demos_2.1.7-5_sparc.deb stable/main/binary-sparc/libfreetype6-dev_2.1.7-5_sparc.deb stable/main/binary-sparc/libfreetype6-udeb_2.1.7-5_sparc.udeb stable/main/binary-sparc/libfreetype6_2.1.7-5_sparc.deb freetype (2.1.7-5) stable; urgency=low * Backport the fix for bug #367579 (use CURDIR instead of PWD) so that the package can be built under sudo. Closes: #367579. stable/main/binary-s390/libfreetype6-udeb_2.1.7-5_s390.udeb stable/main/binary-s390/freetype2-demos_2.1.7-5_s390.deb stable/main/binary-s390/libfreetype6-dev_2.1.7-5_s390.deb stable/main/binary-s390/libfreetype6_2.1.7-5_s390.deb freetype (2.1.7-5) stable; urgency=low * Backport the fix for bug #367579 (use CURDIR instead of PWD) so that the package can be built under sudo. Closes: #367579. stable/main/binary-powerpc/freetype2-demos_2.1.7-5_powerpc.deb stable/main/binary-powerpc/libfreetype6_2.1.7-5_powerpc.deb stable/main/binary-powerpc/libfreetype6-dev_2.1.7-5_powerpc.deb stable/main/binary-powerpc/libfreetype6-udeb_2.1.7-5_powerpc.udeb freetype (2.1.7-5) stable; urgency=low * Backport the fix for bug #367579 (use CURDIR instead of PWD) so that the package can be built under sudo. Closes: #367579. stable/main/binary-mipsel/libfreetype6_2.1.7-5_mipsel.deb stable/main/binary-mipsel/libfreetype6-udeb_2.1.7-5_mipsel.udeb stable/main/binary-mipsel/freetype2-demos_2.1.7-5_mipsel.deb stable/main/binary-mipsel/libfreetype6-dev_2.1.7-5_mipsel.deb freetype (2.1.7-5) stable; urgency=low * Backport the fix for bug #367579 (use CURDIR instead of PWD) so that the package can be built under sudo. Closes: #367579. stable/main/binary-mips/libfreetype6_2.1.7-5_mips.deb stable/main/binary-mips/libfreetype6-udeb_2.1.7-5_mips.udeb stable/main/binary-mips/libfreetype6-dev_2.1.7-5_mips.deb stable/main/binary-mips/freetype2-demos_2.1.7-5_mips.deb freetype (2.1.7-5) stable; urgency=low * Backport the fix for bug #367579 (use CURDIR instead of PWD) so that the package can be built under sudo. Closes: #367579. stable/main/binary-m68k/libfreetype6-dev_2.1.7-5_m68k.deb stable/main/binary-m68k/libfreetype6_2.1.7-5_m68k.deb stable/main/binary-m68k/freetype2-demos_2.1.7-5_m68k.deb stable/main/binary-m68k/libfreetype6-udeb_2.1.7-5_m68k.udeb freetype (2.1.7-5) stable; urgency=low * Backport the fix for bug #367579 (use CURDIR instead of PWD) so that the package can be built under sudo. Closes: #367579. stable/main/binary-ia64/freetype2-demos_2.1.7-5_ia64.deb stable/main/binary-ia64/libfreetype6-udeb_2.1.7-5_ia64.udeb stable/main/binary-ia64/libfreetype6_2.1.7-5_ia64.deb stable/main/binary-ia64/libfreetype6-dev_2.1.7-5_ia64.deb freetype (2.1.7-5) stable; urgency=low * Backport the fix for bug #367579 (use CURDIR instead of PWD) so that the package can be built under sudo. Closes: #367579. stable/main/binary-hppa/freetype2-demos_2.1.7-5_hppa.deb stable/main/binary-hppa/libfreetype6-dev_2.1.7-5_hppa.deb stable/main/binary-hppa/libfreetype6_2.1.7-5_hppa.deb stable/main/binary-hppa/libfreetype6-udeb_2.1.7-5_hppa.udeb freetype (2.1.7-5) stable; urgency=low * Backport the fix for bug #367579 (use CURDIR instead of PWD) so that the package can be built under sudo. Closes: #367579. stable/main/binary-arm/libfreetype6-udeb_2.1.7-5_arm.udeb stable/main/binary-arm/libfreetype6-dev_2.1.7-5_arm.deb stable/main/binary-arm/libfreetype6_2.1.7-5_arm.deb stable/main/binary-arm/freetype2-demos_2.1.7-5_arm.deb freetype (2.1.7-5) stable; urgency=low * Backport the fix for bug #367579 (use CURDIR instead of PWD) so that the package can be built under sudo. Closes: #367579. stable/main/binary-alpha/libfreetype6-udeb_2.1.7-5_alpha.udeb stable/main/binary-alpha/libfreetype6-dev_2.1.7-5_alpha.deb stable/main/binary-alpha/freetype2-demos_2.1.7-5_alpha.deb stable/main/binary-alpha/libfreetype6_2.1.7-5_alpha.deb freetype (2.1.7-5) stable; urgency=low * Backport the fix for bug #367579 (use CURDIR instead of PWD) so that the package can be built under sudo. Closes: #367579. stable/main/source/freetype_2.1.7-5.dsc stable/main/binary-i386/libfreetype6-dev_2.1.7-5_i386.deb stable/main/binary-i386/libfreetype6_2.1.7-5_i386.deb stable/main/source/freetype_2.1.7-5.diff.gz stable/main/binary-i386/freetype2-demos_2.1.7-5_i386.deb stable/main/binary-i386/libfreetype6-udeb_2.1.7-5_i386.udeb freetype (2.1.7-5) stable; urgency=low * Backport the fix for bug #367579 (use CURDIR instead of PWD) so that the package can be built under sudo. Closes: #367579. stable/main/binary-sparc/freeradius-ldap_1.0.2-4sarge3_sparc.deb stable/main/binary-sparc/freeradius_1.0.2-4sarge3_sparc.deb stable/main/binary-sparc/freeradius-mysql_1.0.2-4sarge3_sparc.deb stable/main/binary-sparc/freeradius-iodbc_1.0.2-4sarge3_sparc.deb stable/main/binary-sparc/freeradius-krb5_1.0.2-4sarge3_sparc.deb freeradius (1.0.2-4sarge3) stable-security; urgency=high * Non-maintainer upload by the Security Team * Fixed SQL injection in rlm_sqlcounter module [CVE-2005-4745] * Fixed DoS through buffer overflows in rlm_sqlcounter [CVE-2005-4746] stable/main/binary-s390/freeradius_1.0.2-4sarge3_s390.deb stable/main/binary-s390/freeradius-iodbc_1.0.2-4sarge3_s390.deb stable/main/binary-s390/freeradius-krb5_1.0.2-4sarge3_s390.deb stable/main/binary-s390/freeradius-ldap_1.0.2-4sarge3_s390.deb stable/main/binary-s390/freeradius-mysql_1.0.2-4sarge3_s390.deb freeradius (1.0.2-4sarge3) stable-security; urgency=high * Non-maintainer upload by the Security Team * Fixed SQL injection in rlm_sqlcounter module [CVE-2005-4745] * Fixed DoS through buffer overflows in rlm_sqlcounter [CVE-2005-4746] stable/main/binary-powerpc/freeradius-ldap_1.0.2-4sarge3_powerpc.deb stable/main/binary-powerpc/freeradius-iodbc_1.0.2-4sarge3_powerpc.deb stable/main/binary-powerpc/freeradius-krb5_1.0.2-4sarge3_powerpc.deb stable/main/binary-powerpc/freeradius_1.0.2-4sarge3_powerpc.deb stable/main/binary-powerpc/freeradius-mysql_1.0.2-4sarge3_powerpc.deb freeradius (1.0.2-4sarge3) stable-security; urgency=high * Non-maintainer upload by the Security Team * Fixed SQL injection in rlm_sqlcounter module [CVE-2005-4745] * Fixed DoS through buffer overflows in rlm_sqlcounter [CVE-2005-4746] stable/main/binary-mipsel/freeradius-mysql_1.0.2-4sarge3_mipsel.deb stable/main/binary-mipsel/freeradius-krb5_1.0.2-4sarge3_mipsel.deb stable/main/binary-mipsel/freeradius-ldap_1.0.2-4sarge3_mipsel.deb stable/main/binary-mipsel/freeradius_1.0.2-4sarge3_mipsel.deb stable/main/binary-mipsel/freeradius-iodbc_1.0.2-4sarge3_mipsel.deb freeradius (1.0.2-4sarge3) stable-security; urgency=high * Non-maintainer upload by the Security Team * Fixed SQL injection in rlm_sqlcounter module [CVE-2005-4745] * Fixed DoS through buffer overflows in rlm_sqlcounter [CVE-2005-4746] stable/main/binary-mips/freeradius-krb5_1.0.2-4sarge3_mips.deb stable/main/binary-mips/freeradius_1.0.2-4sarge3_mips.deb stable/main/binary-mips/freeradius-ldap_1.0.2-4sarge3_mips.deb stable/main/binary-mips/freeradius-iodbc_1.0.2-4sarge3_mips.deb stable/main/binary-mips/freeradius-mysql_1.0.2-4sarge3_mips.deb freeradius (1.0.2-4sarge3) stable-security; urgency=high * Non-maintainer upload by the Security Team * Fixed SQL injection in rlm_sqlcounter module [CVE-2005-4745] * Fixed DoS through buffer overflows in rlm_sqlcounter [CVE-2005-4746] stable/main/binary-m68k/freeradius-iodbc_1.0.2-4sarge3_m68k.deb stable/main/binary-m68k/freeradius_1.0.2-4sarge3_m68k.deb stable/main/binary-m68k/freeradius-mysql_1.0.2-4sarge3_m68k.deb stable/main/binary-m68k/freeradius-ldap_1.0.2-4sarge3_m68k.deb stable/main/binary-m68k/freeradius-krb5_1.0.2-4sarge3_m68k.deb freeradius (1.0.2-4sarge3) stable-security; urgency=high * Non-maintainer upload by the Security Team * Fixed SQL injection in rlm_sqlcounter module [CVE-2005-4745] * Fixed DoS through buffer overflows in rlm_sqlcounter [CVE-2005-4746] stable/main/binary-ia64/freeradius-ldap_1.0.2-4sarge3_ia64.deb stable/main/binary-ia64/freeradius_1.0.2-4sarge3_ia64.deb stable/main/binary-ia64/freeradius-mysql_1.0.2-4sarge3_ia64.deb stable/main/binary-ia64/freeradius-krb5_1.0.2-4sarge3_ia64.deb stable/main/binary-ia64/freeradius-iodbc_1.0.2-4sarge3_ia64.deb freeradius (1.0.2-4sarge3) stable-security; urgency=high * Non-maintainer upload by the Security Team * Fixed SQL injection in rlm_sqlcounter module [CVE-2005-4745] * Fixed DoS through buffer overflows in rlm_sqlcounter [CVE-2005-4746] stable/main/binary-hppa/freeradius_1.0.2-4sarge3_hppa.deb stable/main/binary-hppa/freeradius-krb5_1.0.2-4sarge3_hppa.deb stable/main/binary-hppa/freeradius-iodbc_1.0.2-4sarge3_hppa.deb stable/main/binary-hppa/freeradius-ldap_1.0.2-4sarge3_hppa.deb stable/main/binary-hppa/freeradius-mysql_1.0.2-4sarge3_hppa.deb freeradius (1.0.2-4sarge3) stable-security; urgency=high * Non-maintainer upload by the Security Team * Fixed SQL injection in rlm_sqlcounter module [CVE-2005-4745] * Fixed DoS through buffer overflows in rlm_sqlcounter [CVE-2005-4746] stable/main/binary-arm/freeradius_1.0.2-4sarge3_arm.deb stable/main/binary-arm/freeradius-krb5_1.0.2-4sarge3_arm.deb stable/main/binary-arm/freeradius-mysql_1.0.2-4sarge3_arm.deb stable/main/binary-arm/freeradius-iodbc_1.0.2-4sarge3_arm.deb stable/main/binary-arm/freeradius-ldap_1.0.2-4sarge3_arm.deb freeradius (1.0.2-4sarge3) stable-security; urgency=high * Non-maintainer upload by the Security Team * Fixed SQL injection in rlm_sqlcounter module [CVE-2005-4745] * Fixed DoS through buffer overflows in rlm_sqlcounter [CVE-2005-4746] stable/main/binary-alpha/freeradius_1.0.2-4sarge3_alpha.deb stable/main/binary-alpha/freeradius-iodbc_1.0.2-4sarge3_alpha.deb stable/main/binary-alpha/freeradius-mysql_1.0.2-4sarge3_alpha.deb stable/main/binary-alpha/freeradius-krb5_1.0.2-4sarge3_alpha.deb stable/main/binary-alpha/freeradius-ldap_1.0.2-4sarge3_alpha.deb freeradius (1.0.2-4sarge3) stable-security; urgency=high * Non-maintainer upload by the Security Team * Fixed SQL injection in rlm_sqlcounter module [CVE-2005-4745] * Fixed DoS through buffer overflows in rlm_sqlcounter [CVE-2005-4746] stable/main/source/freeradius_1.0.2-4sarge3.dsc stable/main/binary-i386/freeradius-iodbc_1.0.2-4sarge3_i386.deb stable/main/binary-i386/freeradius-mysql_1.0.2-4sarge3_i386.deb stable/main/binary-i386/freeradius-krb5_1.0.2-4sarge3_i386.deb stable/main/binary-i386/freeradius_1.0.2-4sarge3_i386.deb stable/main/source/freeradius_1.0.2-4sarge3.diff.gz stable/main/binary-i386/freeradius-ldap_1.0.2-4sarge3_i386.deb stable/main/binary-all/freeradius-dialupadmin_1.0.2-4sarge3_all.deb freeradius (1.0.2-4sarge3) stable-security; urgency=high * Non-maintainer upload by the Security Team * Fixed SQL injection in rlm_sqlcounter module [CVE-2005-4745] * Fixed DoS through buffer overflows in rlm_sqlcounter [CVE-2005-4746] stable/main/binary-sparc/freeciv-client-gtk_2.0.1-1sarge2_sparc.deb stable/main/binary-sparc/freeciv-client-xaw3d_2.0.1-1sarge2_sparc.deb stable/main/binary-sparc/freeciv-server_2.0.1-1sarge2_sparc.deb freeciv (2.0.1-1sarge2) stable-security; urgency=high * Non-maintainer upload by the Security Team * Added boundary checks to prevent server crashes [common/packets.c, server/unithand.c, 04_CVE-2006-3913.dpatch] stable/main/binary-s390/freeciv-client-xaw3d_2.0.1-1sarge2_s390.deb stable/main/binary-s390/freeciv-server_2.0.1-1sarge2_s390.deb stable/main/binary-s390/freeciv-client-gtk_2.0.1-1sarge2_s390.deb freeciv (2.0.1-1sarge2) stable-security; urgency=high * Non-maintainer upload by the Security Team * Added boundary checks to prevent server crashes [common/packets.c, server/unithand.c, 04_CVE-2006-3913.dpatch] stable/main/binary-mipsel/freeciv-client-gtk_2.0.1-1sarge2_mipsel.deb stable/main/binary-mipsel/freeciv-server_2.0.1-1sarge2_mipsel.deb stable/main/binary-mipsel/freeciv-client-xaw3d_2.0.1-1sarge2_mipsel.deb freeciv (2.0.1-1sarge2) stable-security; urgency=high * Non-maintainer upload by the Security Team * Added boundary checks to prevent server crashes [common/packets.c, server/unithand.c, 04_CVE-2006-3913.dpatch] stable/main/binary-mips/freeciv-server_2.0.1-1sarge2_mips.deb stable/main/binary-mips/freeciv-client-xaw3d_2.0.1-1sarge2_mips.deb stable/main/binary-mips/freeciv-client-gtk_2.0.1-1sarge2_mips.deb freeciv (2.0.1-1sarge2) stable-security; urgency=high * Non-maintainer upload by the Security Team * Added boundary checks to prevent server crashes [common/packets.c, server/unithand.c, 04_CVE-2006-3913.dpatch] stable/main/binary-m68k/freeciv-server_2.0.1-1sarge2_m68k.deb stable/main/binary-m68k/freeciv-client-gtk_2.0.1-1sarge2_m68k.deb stable/main/binary-m68k/freeciv-client-xaw3d_2.0.1-1sarge2_m68k.deb freeciv (2.0.1-1sarge2) stable-security; urgency=high * Non-maintainer upload by the Security Team * Added boundary checks to prevent server crashes [common/packets.c, server/unithand.c, 04_CVE-2006-3913.dpatch] stable/main/binary-ia64/freeciv-client-xaw3d_2.0.1-1sarge2_ia64.deb stable/main/binary-ia64/freeciv-client-gtk_2.0.1-1sarge2_ia64.deb stable/main/binary-ia64/freeciv-server_2.0.1-1sarge2_ia64.deb freeciv (2.0.1-1sarge2) stable-security; urgency=high * Non-maintainer upload by the Security Team * Added boundary checks to prevent server crashes [common/packets.c, server/unithand.c, 04_CVE-2006-3913.dpatch] stable/main/binary-i386/freeciv-client-gtk_2.0.1-1sarge2_i386.deb stable/main/binary-i386/freeciv-client-xaw3d_2.0.1-1sarge2_i386.deb stable/main/binary-i386/freeciv-server_2.0.1-1sarge2_i386.deb freeciv (2.0.1-1sarge2) stable-security; urgency=high * Non-maintainer upload by the Security Team * Added boundary checks to prevent server crashes [common/packets.c, server/unithand.c, 04_CVE-2006-3913.dpatch] stable/main/binary-hppa/freeciv-client-xaw3d_2.0.1-1sarge2_hppa.deb stable/main/binary-hppa/freeciv-server_2.0.1-1sarge2_hppa.deb stable/main/binary-hppa/freeciv-client-gtk_2.0.1-1sarge2_hppa.deb freeciv (2.0.1-1sarge2) stable-security; urgency=high * Non-maintainer upload by the Security Team * Added boundary checks to prevent server crashes [common/packets.c, server/unithand.c, 04_CVE-2006-3913.dpatch] stable/main/binary-arm/freeciv-client-xaw3d_2.0.1-1sarge2_arm.deb stable/main/binary-arm/freeciv-client-gtk_2.0.1-1sarge2_arm.deb stable/main/binary-arm/freeciv-server_2.0.1-1sarge2_arm.deb freeciv (2.0.1-1sarge2) stable-security; urgency=high * Non-maintainer upload by the Security Team * Added boundary checks to prevent server crashes [common/packets.c, server/unithand.c, 04_CVE-2006-3913.dpatch] stable/main/binary-alpha/freeciv-client-xaw3d_2.0.1-1sarge2_alpha.deb stable/main/binary-alpha/freeciv-server_2.0.1-1sarge2_alpha.deb stable/main/binary-alpha/freeciv-client-gtk_2.0.1-1sarge2_alpha.deb freeciv (2.0.1-1sarge2) stable-security; urgency=high * Non-maintainer upload by the Security Team * Added boundary checks to prevent server crashes [common/packets.c, server/unithand.c, 04_CVE-2006-3913.dpatch] stable/main/source/freeciv_2.0.1-1sarge2.diff.gz stable/main/binary-all/freeciv_2.0.1-1sarge2_all.deb stable/main/binary-powerpc/freeciv-client-gtk_2.0.1-1sarge2_powerpc.deb stable/main/binary-all/freeciv-data_2.0.1-1sarge2_all.deb stable/main/binary-all/freeciv-gtk_2.0.1-1sarge2_all.deb stable/main/binary-powerpc/freeciv-server_2.0.1-1sarge2_powerpc.deb stable/main/source/freeciv_2.0.1-1sarge2.dsc stable/main/binary-all/freeciv-xaw3d_2.0.1-1sarge2_all.deb stable/main/binary-powerpc/freeciv-client-xaw3d_2.0.1-1sarge2_powerpc.deb freeciv (2.0.1-1sarge2) stable-security; urgency=high * Non-maintainer upload by the Security Team * Added boundary checks to prevent server crashes [common/packets.c, server/unithand.c, 04_CVE-2006-3913.dpatch] stable/main/source/fcheck_2.7.59-7sarge1.dsc stable/main/binary-all/fcheck_2.7.59-7sarge1_all.deb stable/main/source/fcheck_2.7.59-7sarge1.diff.gz fcheck (2.7.59-7sarge1) stable-security; urgency=high * Non-maintainer upload by The Security Team. * Fix the insecure use of temporary files in the fcheck cron job. [CVE-2006-1753] stable/main/binary-sparc/exiftran_2.01-1.2sarge2_sparc.deb stable/main/binary-sparc/fbi_2.01-1.2sarge2_sparc.deb fbi (2.01-1.2sarge2) stable-security; urgency=high * Non-maintainer upload by the Security Team: * Really disable "deletefile" and "renamefile" operators in fbgs stable/main/binary-s390/exiftran_2.01-1.2sarge2_s390.deb stable/main/binary-s390/fbi_2.01-1.2sarge2_s390.deb fbi (2.01-1.2sarge2) stable-security; urgency=high * Non-maintainer upload by the Security Team: * Really disable "deletefile" and "renamefile" operators in fbgs stable/main/binary-powerpc/exiftran_2.01-1.2sarge2_powerpc.deb stable/main/binary-powerpc/fbi_2.01-1.2sarge2_powerpc.deb fbi (2.01-1.2sarge2) stable-security; urgency=high * Non-maintainer upload by the Security Team: * Really disable "deletefile" and "renamefile" operators in fbgs stable/main/binary-mipsel/exiftran_2.01-1.2sarge2_mipsel.deb stable/main/binary-mipsel/fbi_2.01-1.2sarge2_mipsel.deb fbi (2.01-1.2sarge2) stable-security; urgency=high * Non-maintainer upload by the Security Team: * Really disable "deletefile" and "renamefile" operators in fbgs stable/main/binary-mips/exiftran_2.01-1.2sarge2_mips.deb stable/main/binary-mips/fbi_2.01-1.2sarge2_mips.deb fbi (2.01-1.2sarge2) stable-security; urgency=high * Non-maintainer upload by the Security Team: * Really disable "deletefile" and "renamefile" operators in fbgs stable/main/binary-m68k/fbi_2.01-1.2sarge2_m68k.deb stable/main/binary-m68k/exiftran_2.01-1.2sarge2_m68k.deb fbi (2.01-1.2sarge2) stable-security; urgency=high * Non-maintainer upload by the Security Team: * Really disable "deletefile" and "renamefile" operators in fbgs stable/main/binary-ia64/exiftran_2.01-1.2sarge2_ia64.deb stable/main/binary-ia64/fbi_2.01-1.2sarge2_ia64.deb fbi (2.01-1.2sarge2) stable-security; urgency=high * Non-maintainer upload by the Security Team: * Really disable "deletefile" and "renamefile" operators in fbgs stable/main/binary-hppa/exiftran_2.01-1.2sarge2_hppa.deb stable/main/binary-hppa/fbi_2.01-1.2sarge2_hppa.deb fbi (2.01-1.2sarge2) stable-security; urgency=high * Non-maintainer upload by the Security Team: * Really disable "deletefile" and "renamefile" operators in fbgs stable/main/binary-arm/fbi_2.01-1.2sarge2_arm.deb stable/main/binary-arm/exiftran_2.01-1.2sarge2_arm.deb fbi (2.01-1.2sarge2) stable-security; urgency=high * Non-maintainer upload by the Security Team: * Really disable "deletefile" and "renamefile" operators in fbgs stable/main/binary-alpha/fbi_2.01-1.2sarge2_alpha.deb stable/main/binary-alpha/exiftran_2.01-1.2sarge2_alpha.deb fbi (2.01-1.2sarge2) stable-security; urgency=high * Non-maintainer upload by the Security Team: * Really disable "deletefile" and "renamefile" operators in fbgs stable/main/binary-i386/fbi_2.01-1.2sarge2_i386.deb stable/main/source/fbi_2.01-1.2sarge2.diff.gz stable/main/binary-i386/exiftran_2.01-1.2sarge2_i386.deb stable/main/source/fbi_2.01-1.2sarge2.dsc fbi (2.01-1.2sarge2) stable-security; urgency=high * Non-maintainer upload by the Security Team: * Really disable "deletefile" and "renamefile" operators in fbgs stable/main/binary-i386/fai-kernels_1.9.1sarge3_i386.deb stable/main/source/fai-kernels_1.9.1sarge3.tar.gz stable/main/source/fai-kernels_1.9.1sarge3.dsc fai-kernels (1.9.1sarge3) stable-security; urgency=high * NMU by the Security Team * Build against kernel-tree-2.6.8-16sarge4 * proc-environ-race-1.dpatch, proc-environ-race-2.dpatch [SECURITY] Fix local root vulnerability caused by a race in proc See CVE-2006-3626 stable/main/binary-sparc/evolution-webcal_1.0.6-2_sparc.deb evolution-webcal (1.0.6-2) experimental; urgency=low * Build-Depend on intltool. Thanks to Michael Banck. stable/main/binary-i386/evolution-webcal_1.0.6-2_i386.deb evolution-webcal (1.0.6-2) experimental; urgency=low * Build-Depend on intltool. Thanks to Michael Banck. stable/main/binary-sparc/evms-cli_2.5.2-1.sarge2_sparc.deb stable/main/binary-sparc/libevms-dev_2.5.2-1.sarge2_sparc.deb stable/main/binary-sparc/evms-gui_2.5.2-1.sarge2_sparc.deb stable/main/binary-sparc/evms-ncurses_2.5.2-1.sarge2_sparc.deb stable/main/binary-sparc/evms-ha_2.5.2-1.sarge2_sparc.deb stable/main/binary-sparc/libevms-2.5_2.5.2-1.sarge2_sparc.deb stable/main/binary-sparc/evms-udeb_2.5.2-1.sarge2_sparc.udeb stable/main/binary-sparc/evms_2.5.2-1.sarge2_sparc.deb evms (2.5.2-1.sarge2) stable; urgency=low * Backport patch from http://marc2.theaimsgroup.com/?l=evms-devel&m=114446684216135&q=p3, which fixes segfaults when discovering a degraded RAID-5, possibly rendering the entire system unusable if this happens during boot. (Closes: #364017) stable/main/binary-s390/evms-udeb_2.5.2-1.sarge2_s390.udeb stable/main/binary-s390/evms_2.5.2-1.sarge2_s390.deb stable/main/binary-s390/evms-ncurses_2.5.2-1.sarge2_s390.deb stable/main/binary-s390/evms-cli_2.5.2-1.sarge2_s390.deb stable/main/binary-s390/libevms-2.5_2.5.2-1.sarge2_s390.deb stable/main/binary-s390/evms-gui_2.5.2-1.sarge2_s390.deb stable/main/binary-s390/libevms-dev_2.5.2-1.sarge2_s390.deb stable/main/binary-s390/evms-ha_2.5.2-1.sarge2_s390.deb evms (2.5.2-1.sarge2) stable; urgency=low * Backport patch from http://marc2.theaimsgroup.com/?l=evms-devel&m=114446684216135&q=p3, which fixes segfaults when discovering a degraded RAID-5, possibly rendering the entire system unusable if this happens during boot. (Closes: #364017) stable/main/binary-powerpc/evms-udeb_2.5.2-1.sarge2_powerpc.udeb stable/main/binary-powerpc/libevms-dev_2.5.2-1.sarge2_powerpc.deb stable/main/binary-powerpc/evms_2.5.2-1.sarge2_powerpc.deb stable/main/binary-powerpc/evms-cli_2.5.2-1.sarge2_powerpc.deb stable/main/binary-powerpc/evms-ncurses_2.5.2-1.sarge2_powerpc.deb stable/main/binary-powerpc/evms-ha_2.5.2-1.sarge2_powerpc.deb stable/main/binary-powerpc/libevms-2.5_2.5.2-1.sarge2_powerpc.deb stable/main/binary-powerpc/evms-gui_2.5.2-1.sarge2_powerpc.deb evms (2.5.2-1.sarge2) stable; urgency=low * Backport patch from http://marc2.theaimsgroup.com/?l=evms-devel&m=114446684216135&q=p3, which fixes segfaults when discovering a degraded RAID-5, possibly rendering the entire system unusable if this happens during boot. (Closes: #364017) stable/main/binary-mipsel/evms-gui_2.5.2-1.sarge2_mipsel.deb stable/main/binary-mipsel/evms_2.5.2-1.sarge2_mipsel.deb stable/main/binary-mipsel/evms-ha_2.5.2-1.sarge2_mipsel.deb stable/main/binary-mipsel/libevms-dev_2.5.2-1.sarge2_mipsel.deb stable/main/binary-mipsel/evms-ncurses_2.5.2-1.sarge2_mipsel.deb stable/main/binary-mipsel/evms-udeb_2.5.2-1.sarge2_mipsel.udeb stable/main/binary-mipsel/libevms-2.5_2.5.2-1.sarge2_mipsel.deb stable/main/binary-mipsel/evms-cli_2.5.2-1.sarge2_mipsel.deb evms (2.5.2-1.sarge2) stable; urgency=low * Backport patch from http://marc2.theaimsgroup.com/?l=evms-devel&m=114446684216135&q=p3, which fixes segfaults when discovering a degraded RAID-5, possibly rendering the entire system unusable if this happens during boot. (Closes: #364017) stable/main/binary-mips/libevms-dev_2.5.2-1.sarge2_mips.deb stable/main/binary-mips/libevms-2.5_2.5.2-1.sarge2_mips.deb stable/main/binary-mips/evms-gui_2.5.2-1.sarge2_mips.deb stable/main/binary-mips/evms-ncurses_2.5.2-1.sarge2_mips.deb stable/main/binary-mips/evms-ha_2.5.2-1.sarge2_mips.deb stable/main/binary-mips/evms_2.5.2-1.sarge2_mips.deb stable/main/binary-mips/evms-udeb_2.5.2-1.sarge2_mips.udeb stable/main/binary-mips/evms-cli_2.5.2-1.sarge2_mips.deb evms (2.5.2-1.sarge2) stable; urgency=low * Backport patch from http://marc2.theaimsgroup.com/?l=evms-devel&m=114446684216135&q=p3, which fixes segfaults when discovering a degraded RAID-5, possibly rendering the entire system unusable if this happens during boot. (Closes: #364017) stable/main/binary-m68k/evms-udeb_2.5.2-1.sarge2_m68k.udeb stable/main/binary-m68k/evms-ha_2.5.2-1.sarge2_m68k.deb stable/main/binary-m68k/evms-gui_2.5.2-1.sarge2_m68k.deb stable/main/binary-m68k/libevms-2.5_2.5.2-1.sarge2_m68k.deb stable/main/binary-m68k/evms-cli_2.5.2-1.sarge2_m68k.deb stable/main/binary-m68k/libevms-dev_2.5.2-1.sarge2_m68k.deb stable/main/binary-m68k/evms_2.5.2-1.sarge2_m68k.deb stable/main/binary-m68k/evms-ncurses_2.5.2-1.sarge2_m68k.deb evms (2.5.2-1.sarge2) stable; urgency=low * Backport patch from http://marc2.theaimsgroup.com/?l=evms-devel&m=114446684216135&q=p3, which fixes segfaults when discovering a degraded RAID-5, possibly rendering the entire system unusable if this happens during boot. (Closes: #364017) stable/main/binary-ia64/evms_2.5.2-1.sarge2_ia64.deb stable/main/binary-ia64/libevms-2.5_2.5.2-1.sarge2_ia64.deb stable/main/binary-ia64/evms-cli_2.5.2-1.sarge2_ia64.deb stable/main/binary-ia64/libevms-dev_2.5.2-1.sarge2_ia64.deb stable/main/binary-ia64/evms-udeb_2.5.2-1.sarge2_ia64.udeb stable/main/binary-ia64/evms-gui_2.5.2-1.sarge2_ia64.deb stable/main/binary-ia64/evms-ha_2.5.2-1.sarge2_ia64.deb stable/main/binary-ia64/evms-ncurses_2.5.2-1.sarge2_ia64.deb evms (2.5.2-1.sarge2) stable; urgency=low * Backport patch from http://marc2.theaimsgroup.com/?l=evms-devel&m=114446684216135&q=p3, which fixes segfaults when discovering a degraded RAID-5, possibly rendering the entire system unusable if this happens during boot. (Closes: #364017) stable/main/binary-hppa/evms-ha_2.5.2-1.sarge2_hppa.deb stable/main/binary-hppa/libevms-2.5_2.5.2-1.sarge2_hppa.deb stable/main/binary-hppa/evms_2.5.2-1.sarge2_hppa.deb stable/main/binary-hppa/evms-cli_2.5.2-1.sarge2_hppa.deb stable/main/binary-hppa/evms-ncurses_2.5.2-1.sarge2_hppa.deb stable/main/binary-hppa/evms-gui_2.5.2-1.sarge2_hppa.deb stable/main/binary-hppa/evms-udeb_2.5.2-1.sarge2_hppa.udeb stable/main/binary-hppa/libevms-dev_2.5.2-1.sarge2_hppa.deb evms (2.5.2-1.sarge2) stable; urgency=low * Backport patch from http://marc2.theaimsgroup.com/?l=evms-devel&m=114446684216135&q=p3, which fixes segfaults when discovering a degraded RAID-5, possibly rendering the entire system unusable if this happens during boot. (Closes: #364017) stable/main/binary-arm/libevms-2.5_2.5.2-1.sarge2_arm.deb stable/main/binary-arm/evms-gui_2.5.2-1.sarge2_arm.deb stable/main/binary-arm/libevms-dev_2.5.2-1.sarge2_arm.deb stable/main/binary-arm/evms-cli_2.5.2-1.sarge2_arm.deb stable/main/binary-arm/evms-ha_2.5.2-1.sarge2_arm.deb stable/main/binary-arm/evms-ncurses_2.5.2-1.sarge2_arm.deb stable/main/binary-arm/evms_2.5.2-1.sarge2_arm.deb stable/main/binary-arm/evms-udeb_2.5.2-1.sarge2_arm.udeb evms (2.5.2-1.sarge2) stable; urgency=low * Backport patch from http://marc2.theaimsgroup.com/?l=evms-devel&m=114446684216135&q=p3, which fixes segfaults when discovering a degraded RAID-5, possibly rendering the entire system unusable if this happens during boot. (Closes: #364017) stable/main/binary-alpha/evms-ha_2.5.2-1.sarge2_alpha.deb stable/main/binary-alpha/evms-udeb_2.5.2-1.sarge2_alpha.udeb stable/main/binary-alpha/evms-cli_2.5.2-1.sarge2_alpha.deb stable/main/binary-alpha/evms_2.5.2-1.sarge2_alpha.deb stable/main/binary-alpha/evms-ncurses_2.5.2-1.sarge2_alpha.deb stable/main/binary-alpha/libevms-dev_2.5.2-1.sarge2_alpha.deb stable/main/binary-alpha/evms-gui_2.5.2-1.sarge2_alpha.deb stable/main/binary-alpha/libevms-2.5_2.5.2-1.sarge2_alpha.deb evms (2.5.2-1.sarge2) stable; urgency=low * Backport patch from http://marc2.theaimsgroup.com/?l=evms-devel&m=114446684216135&q=p3, which fixes segfaults when discovering a degraded RAID-5, possibly rendering the entire system unusable if this happens during boot. (Closes: #364017) stable/main/binary-i386/evms-ha_2.5.2-1.sarge2_i386.deb stable/main/binary-i386/evms-gui_2.5.2-1.sarge2_i386.deb stable/main/source/evms_2.5.2-1.sarge2.diff.gz stable/main/binary-i386/evms-cli_2.5.2-1.sarge2_i386.deb stable/main/binary-i386/libevms-dev_2.5.2-1.sarge2_i386.deb stable/main/source/evms_2.5.2-1.sarge2.dsc stable/main/binary-i386/libevms-2.5_2.5.2-1.sarge2_i386.deb stable/main/binary-i386/evms-udeb_2.5.2-1.sarge2_i386.udeb stable/main/binary-i386/evms-ncurses_2.5.2-1.sarge2_i386.deb stable/main/binary-i386/evms_2.5.2-1.sarge2_i386.deb stable/main/binary-all/kernel-patch-evms_2.5.2-1.sarge2_all.deb evms (2.5.2-1.sarge2) stable; urgency=low * Upload to stable to fix issues with EVMS segfaulting on startup when dealing with degraded RAID-5 volumes, possibly renderig the entire system unbootable. * Apply raid5_degrade_fix.patch from upstream (with a fix to avoid intrudocing a new memory leak), fixing a buffer overrun when a degraded array had gotten a spare added and recovery was running. (Closes: #364017) stable/main/binary-sparc/ethereal-dev_0.10.10-2sarge6_sparc.deb stable/main/binary-sparc/ethereal_0.10.10-2sarge6_sparc.deb stable/main/binary-sparc/tethereal_0.10.10-2sarge6_sparc.deb stable/main/binary-sparc/ethereal-common_0.10.10-2sarge6_sparc.deb ethereal (0.10.10-2sarge6) stable-security; urgency=high * Non-maintainer upload by the Security Team * Backported fixes for several vulnerabilities: * Format string vulnerabilities in FW-1 and MQ dissectors (CVE-2006-3628) * Memory exhaustion denial of service in MOUNT dissector (CVE-2006-3629) * Off-by-one overflows in NCP NMAS and NDPS dissectors (CVE-2006-3630) * Buffer overflow in NFS dissector (CVE-2006-3632) * Infinite loop denial of service in SSH dissector (CVE-2006-3631) stable/main/binary-s390/ethereal_0.10.10-2sarge6_s390.deb stable/main/binary-s390/ethereal-dev_0.10.10-2sarge6_s390.deb stable/main/binary-s390/tethereal_0.10.10-2sarge6_s390.deb stable/main/binary-s390/ethereal-common_0.10.10-2sarge6_s390.deb ethereal (0.10.10-2sarge6) stable-security; urgency=high * Non-maintainer upload by the Security Team * Backported fixes for several vulnerabilities: * Format string vulnerabilities in FW-1 and MQ dissectors (CVE-2006-3628) * Memory exhaustion denial of service in MOUNT dissector (CVE-2006-3629) * Off-by-one overflows in NCP NMAS and NDPS dissectors (CVE-2006-3630) * Buffer overflow in NFS dissector (CVE-2006-3632) * Infinite loop denial of service in SSH dissector (CVE-2006-3631) stable/main/binary-powerpc/tethereal_0.10.10-2sarge6_powerpc.deb stable/main/binary-powerpc/ethereal-dev_0.10.10-2sarge6_powerpc.deb stable/main/binary-powerpc/ethereal_0.10.10-2sarge6_powerpc.deb stable/main/binary-powerpc/ethereal-common_0.10.10-2sarge6_powerpc.deb ethereal (0.10.10-2sarge6) stable-security; urgency=high * Non-maintainer upload by the Security Team * Backported fixes for several vulnerabilities: * Format string vulnerabilities in FW-1 and MQ dissectors (CVE-2006-3628) * Memory exhaustion denial of service in MOUNT dissector (CVE-2006-3629) * Off-by-one overflows in NCP NMAS and NDPS dissectors (CVE-2006-3630) * Buffer overflow in NFS dissector (CVE-2006-3632) * Infinite loop denial of service in SSH dissector (CVE-2006-3631) stable/main/binary-mipsel/ethereal-common_0.10.10-2sarge6_mipsel.deb stable/main/binary-mipsel/ethereal_0.10.10-2sarge6_mipsel.deb stable/main/binary-mipsel/tethereal_0.10.10-2sarge6_mipsel.deb stable/main/binary-mipsel/ethereal-dev_0.10.10-2sarge6_mipsel.deb ethereal (0.10.10-2sarge6) stable-security; urgency=high * Non-maintainer upload by the Security Team * Backported fixes for several vulnerabilities: * Format string vulnerabilities in FW-1 and MQ dissectors (CVE-2006-3628) * Memory exhaustion denial of service in MOUNT dissector (CVE-2006-3629) * Off-by-one overflows in NCP NMAS and NDPS dissectors (CVE-2006-3630) * Buffer overflow in NFS dissector (CVE-2006-3632) * Infinite loop denial of service in SSH dissector (CVE-2006-3631) stable/main/binary-mips/ethereal-dev_0.10.10-2sarge6_mips.deb stable/main/binary-mips/tethereal_0.10.10-2sarge6_mips.deb stable/main/binary-mips/ethereal_0.10.10-2sarge6_mips.deb stable/main/binary-mips/ethereal-common_0.10.10-2sarge6_mips.deb ethereal (0.10.10-2sarge6) stable-security; urgency=high * Non-maintainer upload by the Security Team * Backported fixes for several vulnerabilities: * Format string vulnerabilities in FW-1 and MQ dissectors (CVE-2006-3628) * Memory exhaustion denial of service in MOUNT dissector (CVE-2006-3629) * Off-by-one overflows in NCP NMAS and NDPS dissectors (CVE-2006-3630) * Buffer overflow in NFS dissector (CVE-2006-3632) * Infinite loop denial of service in SSH dissector (CVE-2006-3631) stable/main/binary-m68k/tethereal_0.10.10-2sarge6_m68k.deb stable/main/binary-m68k/ethereal-dev_0.10.10-2sarge6_m68k.deb stable/main/binary-m68k/ethereal-common_0.10.10-2sarge6_m68k.deb stable/main/binary-m68k/ethereal_0.10.10-2sarge6_m68k.deb ethereal (0.10.10-2sarge6) stable-security; urgency=high * Non-maintainer upload by the Security Team * Backported fixes for several vulnerabilities: * Format string vulnerabilities in FW-1 and MQ dissectors (CVE-2006-3628) * Memory exhaustion denial of service in MOUNT dissector (CVE-2006-3629) * Off-by-one overflows in NCP NMAS and NDPS dissectors (CVE-2006-3630) * Buffer overflow in NFS dissector (CVE-2006-3632) * Infinite loop denial of service in SSH dissector (CVE-2006-3631) stable/main/binary-ia64/ethereal_0.10.10-2sarge6_ia64.deb stable/main/binary-ia64/ethereal-common_0.10.10-2sarge6_ia64.deb stable/main/binary-ia64/tethereal_0.10.10-2sarge6_ia64.deb stable/main/binary-ia64/ethereal-dev_0.10.10-2sarge6_ia64.deb ethereal (0.10.10-2sarge6) stable-security; urgency=high * Non-maintainer upload by the Security Team * Backported fixes for several vulnerabilities: * Format string vulnerabilities in FW-1 and MQ dissectors (CVE-2006-3628) * Memory exhaustion denial of service in MOUNT dissector (CVE-2006-3629) * Off-by-one overflows in NCP NMAS and NDPS dissectors (CVE-2006-3630) * Buffer overflow in NFS dissector (CVE-2006-3632) * Infinite loop denial of service in SSH dissector (CVE-2006-3631) stable/main/binary-hppa/ethereal_0.10.10-2sarge6_hppa.deb stable/main/binary-hppa/ethereal-dev_0.10.10-2sarge6_hppa.deb stable/main/binary-hppa/tethereal_0.10.10-2sarge6_hppa.deb stable/main/binary-hppa/ethereal-common_0.10.10-2sarge6_hppa.deb ethereal (0.10.10-2sarge6) stable-security; urgency=high * Non-maintainer upload by the Security Team * Backported fixes for several vulnerabilities: * Format string vulnerabilities in FW-1 and MQ dissectors (CVE-2006-3628) * Memory exhaustion denial of service in MOUNT dissector (CVE-2006-3629) * Off-by-one overflows in NCP NMAS and NDPS dissectors (CVE-2006-3630) * Buffer overflow in NFS dissector (CVE-2006-3632) * Infinite loop denial of service in SSH dissector (CVE-2006-3631) stable/main/binary-arm/ethereal_0.10.10-2sarge6_arm.deb stable/main/binary-arm/ethereal-common_0.10.10-2sarge6_arm.deb stable/main/binary-arm/ethereal-dev_0.10.10-2sarge6_arm.deb stable/main/binary-arm/tethereal_0.10.10-2sarge6_arm.deb ethereal (0.10.10-2sarge6) stable-security; urgency=high * Non-maintainer upload by the Security Team * Backported fixes for several vulnerabilities: * Format string vulnerabilities in FW-1 and MQ dissectors (CVE-2006-3628) * Memory exhaustion denial of service in MOUNT dissector (CVE-2006-3629) * Off-by-one overflows in NCP NMAS and NDPS dissectors (CVE-2006-3630) * Buffer overflow in NFS dissector (CVE-2006-3632) * Infinite loop denial of service in SSH dissector (CVE-2006-3631) stable/main/binary-alpha/ethereal_0.10.10-2sarge6_alpha.deb stable/main/binary-alpha/ethereal-dev_0.10.10-2sarge6_alpha.deb stable/main/binary-alpha/ethereal-common_0.10.10-2sarge6_alpha.deb stable/main/binary-alpha/tethereal_0.10.10-2sarge6_alpha.deb ethereal (0.10.10-2sarge6) stable-security; urgency=high * Non-maintainer upload by the Security Team * Backported fixes for several vulnerabilities: * Format string vulnerabilities in FW-1 and MQ dissectors (CVE-2006-3628) * Memory exhaustion denial of service in MOUNT dissector (CVE-2006-3629) * Off-by-one overflows in NCP NMAS and NDPS dissectors (CVE-2006-3630) * Buffer overflow in NFS dissector (CVE-2006-3632) * Infinite loop denial of service in SSH dissector (CVE-2006-3631) stable/main/binary-i386/ethereal-common_0.10.10-2sarge6_i386.deb stable/main/source/ethereal_0.10.10-2sarge6.diff.gz stable/main/binary-i386/ethereal-dev_0.10.10-2sarge6_i386.deb stable/main/source/ethereal_0.10.10-2sarge6.dsc stable/main/binary-i386/ethereal_0.10.10-2sarge6_i386.deb stable/main/binary-i386/tethereal_0.10.10-2sarge6_i386.deb ethereal (0.10.10-2sarge6) stable-security; urgency=high * Non-maintainer upload by the Security Team * Backported fixes for several vulnerabilities: * Format string vulnerabilities in FW-1 and MQ dissectors (CVE-2006-3628) * Memory exhaustion denial of service in MOUNT dissector (CVE-2006-3629) * Off-by-one overflows in NCP NMAS and NDPS dissectors (CVE-2006-3630) * Buffer overflow in NFS dissector (CVE-2006-3632) * Infinite loop denial of service in SSH dissector (CVE-2006-3631) stable/main/source/drupal_4.5.3-6.1sarge3.dsc stable/main/binary-all/drupal_4.5.3-6.1sarge3_all.deb stable/main/source/drupal_4.5.3-6.1sarge3.diff.gz drupal (4.5.3-6.1sarge3) stable-security; urgency=low * Fix XSS in user.module [CVE-2006-4002] stable/main/binary-sparc/dovecot-common_0.99.14-1sarge0_sparc.deb stable/main/binary-sparc/dovecot-pop3d_0.99.14-1sarge0_sparc.deb stable/main/binary-sparc/dovecot-imapd_0.99.14-1sarge0_sparc.deb dovecot (0.99.14-1sarge0) stable-security; urgency=high * Non-maintainer upload by the Security Team. * Fixed directory traversal bug in the IMAP LIST command. [CVE-2006-2414] stable/main/binary-s390/dovecot-pop3d_0.99.14-1sarge0_s390.deb stable/main/binary-s390/dovecot-imapd_0.99.14-1sarge0_s390.deb stable/main/binary-s390/dovecot-common_0.99.14-1sarge0_s390.deb dovecot (0.99.14-1sarge0) stable-security; urgency=high * Non-maintainer upload by the Security Team. * Fixed directory traversal bug in the IMAP LIST command. [CVE-2006-2414] stable/main/binary-powerpc/dovecot-common_0.99.14-1sarge0_powerpc.deb stable/main/binary-powerpc/dovecot-imapd_0.99.14-1sarge0_powerpc.deb stable/main/binary-powerpc/dovecot-pop3d_0.99.14-1sarge0_powerpc.deb dovecot (0.99.14-1sarge0) stable-security; urgency=high * Non-maintainer upload by the Security Team. * Fixed directory traversal bug in the IMAP LIST command. [CVE-2006-2414] stable/main/binary-mipsel/dovecot-pop3d_0.99.14-1sarge0_mipsel.deb stable/main/binary-mipsel/dovecot-imapd_0.99.14-1sarge0_mipsel.deb stable/main/binary-mipsel/dovecot-common_0.99.14-1sarge0_mipsel.deb dovecot (0.99.14-1sarge0) stable-security; urgency=high * Non-maintainer upload by the Security Team. * Fixed directory traversal bug in the IMAP LIST command. [CVE-2006-2414] stable/main/binary-mips/dovecot-common_0.99.14-1sarge0_mips.deb stable/main/binary-mips/dovecot-pop3d_0.99.14-1sarge0_mips.deb stable/main/binary-mips/dovecot-imapd_0.99.14-1sarge0_mips.deb dovecot (0.99.14-1sarge0) stable-security; urgency=high * Non-maintainer upload by the Security Team. * Fixed directory traversal bug in the IMAP LIST command. [CVE-2006-2414] stable/main/binary-m68k/dovecot-common_0.99.14-1sarge0_m68k.deb stable/main/binary-m68k/dovecot-imapd_0.99.14-1sarge0_m68k.deb stable/main/binary-m68k/dovecot-pop3d_0.99.14-1sarge0_m68k.deb dovecot (0.99.14-1sarge0) stable-security; urgency=high * Non-maintainer upload by the Security Team. * Fixed directory traversal bug in the IMAP LIST command. [CVE-2006-2414] stable/main/binary-ia64/dovecot-imapd_0.99.14-1sarge0_ia64.deb stable/main/binary-ia64/dovecot-pop3d_0.99.14-1sarge0_ia64.deb stable/main/binary-ia64/dovecot-common_0.99.14-1sarge0_ia64.deb dovecot (0.99.14-1sarge0) stable-security; urgency=high * Non-maintainer upload by the Security Team. * Fixed directory traversal bug in the IMAP LIST command. [CVE-2006-2414] stable/main/binary-hppa/dovecot-pop3d_0.99.14-1sarge0_hppa.deb stable/main/binary-hppa/dovecot-imapd_0.99.14-1sarge0_hppa.deb stable/main/binary-hppa/dovecot-common_0.99.14-1sarge0_hppa.deb dovecot (0.99.14-1sarge0) stable-security; urgency=high * Non-maintainer upload by the Security Team. * Fixed directory traversal bug in the IMAP LIST command. [CVE-2006-2414] stable/main/binary-arm/dovecot-pop3d_0.99.14-1sarge0_arm.deb stable/main/binary-arm/dovecot-common_0.99.14-1sarge0_arm.deb stable/main/binary-arm/dovecot-imapd_0.99.14-1sarge0_arm.deb dovecot (0.99.14-1sarge0) stable-security; urgency=high * Non-maintainer upload by the Security Team. * Fixed directory traversal bug in the IMAP LIST command. [CVE-2006-2414] stable/main/binary-alpha/dovecot-common_0.99.14-1sarge0_alpha.deb stable/main/binary-alpha/dovecot-pop3d_0.99.14-1sarge0_alpha.deb stable/main/binary-alpha/dovecot-imapd_0.99.14-1sarge0_alpha.deb dovecot (0.99.14-1sarge0) stable-security; urgency=high * Non-maintainer upload by the Security Team. * Fixed directory traversal bug in the IMAP LIST command. [CVE-2006-2414] stable/main/binary-i386/dovecot-pop3d_0.99.14-1sarge0_i386.deb stable/main/binary-i386/dovecot-common_0.99.14-1sarge0_i386.deb stable/main/source/dovecot_0.99.14-1sarge0.dsc stable/main/binary-i386/dovecot-imapd_0.99.14-1sarge0_i386.deb stable/main/source/dovecot_0.99.14-1sarge0.diff.gz stable/main/binary-all/dovecot_0.99.14-1sarge0_all.deb dovecot (0.99.14-1sarge0) stable-security; urgency=high * Non-maintainer upload by the Security Team. * Fixed directory traversal bug in the IMAP LIST command. [CVE-2006-2414] stable/main/binary-sparc/dhcp_2.0pl5-19.1sarge2_sparc.deb stable/main/binary-sparc/dhcp-client-udeb_2.0pl5-19.1sarge2_sparc.udeb stable/main/binary-sparc/dhcp-relay_2.0pl5-19.1sarge2_sparc.deb stable/main/binary-sparc/dhcp-client_2.0pl5-19.1sarge2_sparc.deb dhcp (2.0pl5-19.1sarge2) stable-security; urgency=high * Non-maintainer upload by the Security Team * Applied patch by Andrew Steets to fix denial of service [common/memory.c, debian/patches/z_CVE-2006-3122.patch, Bug#380273] stable/main/binary-s390/dhcp-client-udeb_2.0pl5-19.1sarge2_s390.udeb stable/main/binary-s390/dhcp-client_2.0pl5-19.1sarge2_s390.deb stable/main/binary-s390/dhcp-relay_2.0pl5-19.1sarge2_s390.deb stable/main/binary-s390/dhcp_2.0pl5-19.1sarge2_s390.deb dhcp (2.0pl5-19.1sarge2) stable-security; urgency=high * Non-maintainer upload by the Security Team * Applied patch by Andrew Steets to fix denial of service [common/memory.c, debian/patches/z_CVE-2006-3122.patch, Bug#380273] stable/main/binary-mipsel/dhcp-client_2.0pl5-19.1sarge2_mipsel.deb stable/main/binary-mipsel/dhcp_2.0pl5-19.1sarge2_mipsel.deb stable/main/binary-mipsel/dhcp-relay_2.0pl5-19.1sarge2_mipsel.deb stable/main/binary-mipsel/dhcp-client-udeb_2.0pl5-19.1sarge2_mipsel.udeb dhcp (2.0pl5-19.1sarge2) stable-security; urgency=high * Non-maintainer upload by the Security Team * Applied patch by Andrew Steets to fix denial of service [common/memory.c, debian/patches/z_CVE-2006-3122.patch, Bug#380273] stable/main/binary-mips/dhcp-relay_2.0pl5-19.1sarge2_mips.deb stable/main/binary-mips/dhcp_2.0pl5-19.1sarge2_mips.deb stable/main/binary-mips/dhcp-client_2.0pl5-19.1sarge2_mips.deb stable/main/binary-mips/dhcp-client-udeb_2.0pl5-19.1sarge2_mips.udeb dhcp (2.0pl5-19.1sarge2) stable-security; urgency=high * Non-maintainer upload by the Security Team * Applied patch by Andrew Steets to fix denial of service [common/memory.c, debian/patches/z_CVE-2006-3122.patch, Bug#380273] stable/main/binary-m68k/dhcp_2.0pl5-19.1sarge2_m68k.deb stable/main/binary-m68k/dhcp-relay_2.0pl5-19.1sarge2_m68k.deb stable/main/binary-m68k/dhcp-client-udeb_2.0pl5-19.1sarge2_m68k.udeb stable/main/binary-m68k/dhcp-client_2.0pl5-19.1sarge2_m68k.deb dhcp (2.0pl5-19.1sarge2) stable-security; urgency=high * Non-maintainer upload by the Security Team * Applied patch by Andrew Steets to fix denial of service [common/memory.c, debian/patches/z_CVE-2006-3122.patch, Bug#380273] stable/main/binary-ia64/dhcp-relay_2.0pl5-19.1sarge2_ia64.deb stable/main/binary-ia64/dhcp_2.0pl5-19.1sarge2_ia64.deb stable/main/binary-ia64/dhcp-client_2.0pl5-19.1sarge2_ia64.deb stable/main/binary-ia64/dhcp-client-udeb_2.0pl5-19.1sarge2_ia64.udeb dhcp (2.0pl5-19.1sarge2) stable-security; urgency=high * Non-maintainer upload by the Security Team * Applied patch by Andrew Steets to fix denial of service [common/memory.c, debian/patches/z_CVE-2006-3122.patch, Bug#380273] stable/main/binary-i386/dhcp-client-udeb_2.0pl5-19.1sarge2_i386.udeb stable/main/binary-i386/dhcp_2.0pl5-19.1sarge2_i386.deb stable/main/binary-i386/dhcp-relay_2.0pl5-19.1sarge2_i386.deb stable/main/binary-i386/dhcp-client_2.0pl5-19.1sarge2_i386.deb dhcp (2.0pl5-19.1sarge2) stable-security; urgency=high * Non-maintainer upload by the Security Team * Applied patch by Andrew Steets to fix denial of service [common/memory.c, debian/patches/z_CVE-2006-3122.patch, Bug#380273] stable/main/binary-hppa/dhcp-client_2.0pl5-19.1sarge2_hppa.deb stable/main/binary-hppa/dhcp-relay_2.0pl5-19.1sarge2_hppa.deb stable/main/binary-hppa/dhcp-client-udeb_2.0pl5-19.1sarge2_hppa.udeb stable/main/binary-hppa/dhcp_2.0pl5-19.1sarge2_hppa.deb dhcp (2.0pl5-19.1sarge2) stable-security; urgency=high * Non-maintainer upload by the Security Team * Applied patch by Andrew Steets to fix denial of service [common/memory.c, debian/patches/z_CVE-2006-3122.patch, Bug#380273] stable/main/binary-arm/dhcp-client_2.0pl5-19.1sarge2_arm.deb stable/main/binary-arm/dhcp-client-udeb_2.0pl5-19.1sarge2_arm.udeb stable/main/binary-arm/dhcp_2.0pl5-19.1sarge2_arm.deb stable/main/binary-arm/dhcp-relay_2.0pl5-19.1sarge2_arm.deb dhcp (2.0pl5-19.1sarge2) stable-security; urgency=high * Non-maintainer upload by the Security Team * Applied patch by Andrew Steets to fix denial of service [common/memory.c, debian/patches/z_CVE-2006-3122.patch, Bug#380273] stable/main/binary-alpha/dhcp-client-udeb_2.0pl5-19.1sarge2_alpha.udeb stable/main/binary-alpha/dhcp-relay_2.0pl5-19.1sarge2_alpha.deb stable/main/binary-alpha/dhcp-client_2.0pl5-19.1sarge2_alpha.deb stable/main/binary-alpha/dhcp_2.0pl5-19.1sarge2_alpha.deb dhcp (2.0pl5-19.1sarge2) stable-security; urgency=high * Non-maintainer upload by the Security Team * Applied patch by Andrew Steets to fix denial of service [common/memory.c, debian/patches/z_CVE-2006-3122.patch, Bug#380273] stable/main/binary-powerpc/dhcp-relay_2.0pl5-19.1sarge2_powerpc.deb stable/main/source/dhcp_2.0pl5-19.1sarge2.diff.gz stable/main/binary-powerpc/dhcp-client_2.0pl5-19.1sarge2_powerpc.deb stable/main/binary-powerpc/dhcp-client-udeb_2.0pl5-19.1sarge2_powerpc.udeb stable/main/source/dhcp_2.0pl5-19.1sarge2.dsc stable/main/binary-powerpc/dhcp_2.0pl5-19.1sarge2_powerpc.deb dhcp (2.0pl5-19.1sarge2) stable-security; urgency=high * Non-maintainer upload by the Security Team * Applied patch by Andrew Steets to fix denial of service [common/memory.c, debian/patches/z_CVE-2006-3122.patch, Bug#380273] stable/main/binary-sparc/debian-installer-manual_20050317sarge1_sparc.deb debian-installer (20050317sarge1) stable; urgency=low * Frans Pop - Add build dependencies needed for PDF and TXT builds of the manual. - Make main build script for the manual fail on errors. - Introduce cascading stylesheet for the HTML version of the manual. - Final update of the manual and translations for Sarge version. * Joey Hess - Copyright file updates for 2005. - Switch amd64 back to 2.6.8 kernel; 2.6.10 is not preferred. Closes: #307306 * Kurt Roeckx - Rename libdevmapper1.00-udeb to libdevmapper1.01-udeb for monolithic image. It's only build for amd64. (Closes: #306976) - Change amd64 kernel from 2.6.8-10 to 2.6.8-11. * Colin Watson - Set default SUITE to sarge. * Frans Pop - Update kernel versions for Sarge security updates with ABI change. - Copyright file update for 2006. - Release targeted at Sarge 3.1r3 point release. stable/main/binary-s390/debian-installer-manual_20050317sarge1_s390.deb debian-installer (20050317sarge1) stable; urgency=low * Frans Pop - Add build dependencies needed for PDF and TXT builds of the manual. - Make main build script for the manual fail on errors. - Introduce cascading stylesheet for the HTML version of the manual. - Final update of the manual and translations for Sarge version. * Joey Hess - Copyright file updates for 2005. - Switch amd64 back to 2.6.8 kernel; 2.6.10 is not preferred. Closes: #307306 * Kurt Roeckx - Rename libdevmapper1.00-udeb to libdevmapper1.01-udeb for monolithic image. It's only build for amd64. (Closes: #306976) - Change amd64 kernel from 2.6.8-10 to 2.6.8-11. * Colin Watson - Set default SUITE to sarge. * Frans Pop - Update kernel versions for Sarge security updates with ABI change. - Copyright file update for 2006. - Release targeted at Sarge 3.1r3 point release. stable/main/binary-powerpc/debian-installer-manual_20050317sarge1_powerpc.deb debian-installer (20050317sarge1) stable; urgency=low * Frans Pop - Add build dependencies needed for PDF and TXT builds of the manual. - Make main build script for the manual fail on errors. - Introduce cascading stylesheet for the HTML version of the manual. - Final update of the manual and translations for Sarge version. * Joey Hess - Copyright file updates for 2005. - Switch amd64 back to 2.6.8 kernel; 2.6.10 is not preferred. Closes: #307306 * Kurt Roeckx - Rename libdevmapper1.00-udeb to libdevmapper1.01-udeb for monolithic image. It's only build for amd64. (Closes: #306976) - Change amd64 kernel from 2.6.8-10 to 2.6.8-11. * Colin Watson - Set default SUITE to sarge. * Frans Pop - Update kernel versions for Sarge security updates with ABI change. - Copyright file update for 2006. - Release targeted at Sarge 3.1r3 point release. stable/main/binary-mipsel/debian-installer-manual_20050317sarge1_mipsel.deb debian-installer (20050317sarge1) stable; urgency=low * Frans Pop - Add build dependencies needed for PDF and TXT builds of the manual. - Make main build script for the manual fail on errors. - Introduce cascading stylesheet for the HTML version of the manual. - Final update of the manual and translations for Sarge version. * Joey Hess - Copyright file updates for 2005. - Switch amd64 back to 2.6.8 kernel; 2.6.10 is not preferred. Closes: #307306 * Kurt Roeckx - Rename libdevmapper1.00-udeb to libdevmapper1.01-udeb for monolithic image. It's only build for amd64. (Closes: #306976) - Change amd64 kernel from 2.6.8-10 to 2.6.8-11. * Colin Watson - Set default SUITE to sarge. * Frans Pop - Update kernel versions for Sarge security updates with ABI change. - Copyright file update for 2006. - Release targeted at Sarge 3.1r3 point release. stable/main/binary-mips/debian-installer-manual_20050317sarge1_mips.deb debian-installer (20050317sarge1) stable; urgency=low * Frans Pop - Add build dependencies needed for PDF and TXT builds of the manual. - Make main build script for the manual fail on errors. - Introduce cascading stylesheet for the HTML version of the manual. - Final update of the manual and translations for Sarge version. * Joey Hess - Copyright file updates for 2005. - Switch amd64 back to 2.6.8 kernel; 2.6.10 is not preferred. Closes: #307306 * Kurt Roeckx - Rename libdevmapper1.00-udeb to libdevmapper1.01-udeb for monolithic image. It's only build for amd64. (Closes: #306976) - Change amd64 kernel from 2.6.8-10 to 2.6.8-11. * Colin Watson - Set default SUITE to sarge. * Frans Pop - Update kernel versions for Sarge security updates with ABI change. - Copyright file update for 2006. - Release targeted at Sarge 3.1r3 point release. stable/main/binary-m68k/debian-installer-manual_20050317sarge1_m68k.deb debian-installer (20050317sarge1) stable; urgency=low * Frans Pop - Add build dependencies needed for PDF and TXT builds of the manual. - Make main build script for the manual fail on errors. - Introduce cascading stylesheet for the HTML version of the manual. - Final update of the manual and translations for Sarge version. * Joey Hess - Copyright file updates for 2005. - Switch amd64 back to 2.6.8 kernel; 2.6.10 is not preferred. Closes: #307306 * Kurt Roeckx - Rename libdevmapper1.00-udeb to libdevmapper1.01-udeb for monolithic image. It's only build for amd64. (Closes: #306976) - Change amd64 kernel from 2.6.8-10 to 2.6.8-11. * Colin Watson - Set default SUITE to sarge. * Frans Pop - Update kernel versions for Sarge security updates with ABI change. - Copyright file update for 2006. - Release targeted at Sarge 3.1r3 point release. stable/main/binary-ia64/debian-installer-manual_20050317sarge1_ia64.deb debian-installer (20050317sarge1) stable; urgency=low * Frans Pop - Add build dependencies needed for PDF and TXT builds of the manual. - Make main build script for the manual fail on errors. - Introduce cascading stylesheet for the HTML version of the manual. - Final update of the manual and translations for Sarge version. * Joey Hess - Copyright file updates for 2005. - Switch amd64 back to 2.6.8 kernel; 2.6.10 is not preferred. Closes: #307306 * Kurt Roeckx - Rename libdevmapper1.00-udeb to libdevmapper1.01-udeb for monolithic image. It's only build for amd64. (Closes: #306976) - Change amd64 kernel from 2.6.8-10 to 2.6.8-11. * Colin Watson - Set default SUITE to sarge. * Frans Pop - Update kernel versions for Sarge security updates with ABI change. - Copyright file update for 2006. - Release targeted at Sarge 3.1r3 point release. stable/main/binary-hppa/debian-installer-manual_20050317sarge1_hppa.deb debian-installer (20050317sarge1) stable; urgency=low * Frans Pop - Add build dependencies needed for PDF and TXT builds of the manual. - Make main build script for the manual fail on errors. - Introduce cascading stylesheet for the HTML version of the manual. - Final update of the manual and translations for Sarge version. * Joey Hess - Copyright file updates for 2005. - Switch amd64 back to 2.6.8 kernel; 2.6.10 is not preferred. Closes: #307306 * Kurt Roeckx - Rename libdevmapper1.00-udeb to libdevmapper1.01-udeb for monolithic image. It's only build for amd64. (Closes: #306976) - Change amd64 kernel from 2.6.8-10 to 2.6.8-11. * Colin Watson - Set default SUITE to sarge. * Frans Pop - Update kernel versions for Sarge security updates with ABI change. - Copyright file update for 2006. - Release targeted at Sarge 3.1r3 point release. stable/main/binary-arm/debian-installer-manual_20050317sarge1_arm.deb debian-installer (20050317sarge1) stable; urgency=low * Frans Pop - Add build dependencies needed for PDF and TXT builds of the manual. - Make main build script for the manual fail on errors. - Introduce cascading stylesheet for the HTML version of the manual. - Final update of the manual and translations for Sarge version. * Joey Hess - Copyright file updates for 2005. - Switch amd64 back to 2.6.8 kernel; 2.6.10 is not preferred. Closes: #307306 * Kurt Roeckx - Rename libdevmapper1.00-udeb to libdevmapper1.01-udeb for monolithic image. It's only build for amd64. (Closes: #306976) - Change amd64 kernel from 2.6.8-10 to 2.6.8-11. * Colin Watson - Set default SUITE to sarge. * Frans Pop - Update kernel versions for Sarge security updates with ABI change. - Copyright file update for 2006. - Release targeted at Sarge 3.1r3 point release. stable/main/binary-alpha/debian-installer-manual_20050317sarge1_alpha.deb debian-installer (20050317sarge1) stable; urgency=low * Frans Pop - Add build dependencies needed for PDF and TXT builds of the manual. - Make main build script for the manual fail on errors. - Introduce cascading stylesheet for the HTML version of the manual. - Final update of the manual and translations for Sarge version. * Joey Hess - Copyright file updates for 2005. - Switch amd64 back to 2.6.8 kernel; 2.6.10 is not preferred. Closes: #307306 * Kurt Roeckx - Rename libdevmapper1.00-udeb to libdevmapper1.01-udeb for monolithic image. It's only build for amd64. (Closes: #306976) - Change amd64 kernel from 2.6.8-10 to 2.6.8-11. * Colin Watson - Set default SUITE to sarge. * Frans Pop - Update kernel versions for Sarge security updates with ABI change. - Copyright file update for 2006. - Release targeted at Sarge 3.1r3 point release. stable/main/source/debian-installer_20050317sarge1.tar.gz stable/main/source/debian-installer_20050317sarge1.dsc stable/main/binary-i386/debian-installer-manual_20050317sarge1_i386.deb debian-installer (20050317sarge1) stable; urgency=low * Frans Pop - Add build dependencies needed for PDF and TXT builds of the manual. - Make main build script for the manual fail on errors. - Introduce cascading stylesheet for the HTML version of the manual. - Final update of the manual and translations for Sarge version. * Joey Hess - Copyright file updates for 2005. - Switch amd64 back to 2.6.8 kernel; 2.6.10 is not preferred. Closes: #307306 * Kurt Roeckx - Rename libdevmapper1.00-udeb to libdevmapper1.01-udeb for monolithic image. It's only build for amd64. (Closes: #306976) - Change amd64 kernel from 2.6.8-10 to 2.6.8-11. * Colin Watson - Set default SUITE to sarge. * Frans Pop - Update kernel versions for Sarge security updates with ABI change. - Copyright file update for 2006. - Release targeted at Sarge 3.1r3 point release. stable/main/binary-sparc/libsasl2-modules-gssapi-heimdal_2.1.19.dfsg1-0sarge2_sparc.deb stable/main/binary-sparc/libsasl2-modules-sql_2.1.19.dfsg1-0sarge2_sparc.deb stable/main/binary-sparc/sasl2-bin_2.1.19.dfsg1-0sarge2_sparc.deb stable/main/binary-sparc/libsasl2_2.1.19.dfsg1-0sarge2_sparc.deb stable/main/binary-sparc/libsasl2-modules-kerberos-heimdal_2.1.19.dfsg1-0sarge2_sparc.deb stable/main/binary-sparc/libsasl2-modules_2.1.19.dfsg1-0sarge2_sparc.deb stable/main/binary-sparc/libsasl2-dev_2.1.19.dfsg1-0sarge2_sparc.deb cyrus-sasl2 (2.1.19.dfsg1-0sarge2) stable; urgency=high * Non-maintainer upload by the Security Team The previous version didn't make the 3.1r2 release. This release merges in the patch applied for DSA-1042 * Applied upstream patch to fix remote denial of service [debian/patches/23_CVE-2006-1721.diff] stable/main/binary-s390/libsasl2-modules-sql_2.1.19.dfsg1-0sarge2_s390.deb stable/main/binary-s390/libsasl2_2.1.19.dfsg1-0sarge2_s390.deb stable/main/binary-s390/libsasl2-modules-kerberos-heimdal_2.1.19.dfsg1-0sarge2_s390.deb stable/main/binary-s390/libsasl2-modules-gssapi-heimdal_2.1.19.dfsg1-0sarge2_s390.deb stable/main/binary-s390/libsasl2-dev_2.1.19.dfsg1-0sarge2_s390.deb stable/main/binary-s390/sasl2-bin_2.1.19.dfsg1-0sarge2_s390.deb stable/main/binary-s390/libsasl2-modules_2.1.19.dfsg1-0sarge2_s390.deb cyrus-sasl2 (2.1.19.dfsg1-0sarge2) stable; urgency=high * Non-maintainer upload by the Security Team The previous version didn't make the 3.1r2 release. This release merges in the patch applied for DSA-1042 * Applied upstream patch to fix remote denial of service [debian/patches/23_CVE-2006-1721.diff] stable/main/binary-powerpc/libsasl2_2.1.19.dfsg1-0sarge2_powerpc.deb stable/main/binary-powerpc/sasl2-bin_2.1.19.dfsg1-0sarge2_powerpc.deb stable/main/binary-powerpc/libsasl2-modules-sql_2.1.19.dfsg1-0sarge2_powerpc.deb stable/main/binary-powerpc/libsasl2-modules-gssapi-heimdal_2.1.19.dfsg1-0sarge2_powerpc.deb stable/main/binary-powerpc/libsasl2-modules_2.1.19.dfsg1-0sarge2_powerpc.deb stable/main/binary-powerpc/libsasl2-dev_2.1.19.dfsg1-0sarge2_powerpc.deb stable/main/binary-powerpc/libsasl2-modules-kerberos-heimdal_2.1.19.dfsg1-0sarge2_powerpc.deb cyrus-sasl2 (2.1.19.dfsg1-0sarge2) stable; urgency=high * Non-maintainer upload by the Security Team The previous version didn't make the 3.1r2 release. This release merges in the patch applied for DSA-1042 * Applied upstream patch to fix remote denial of service [debian/patches/23_CVE-2006-1721.diff] stable/main/binary-mipsel/libsasl2-modules-kerberos-heimdal_2.1.19.dfsg1-0sarge2_mipsel.deb stable/main/binary-mipsel/libsasl2-modules-gssapi-heimdal_2.1.19.dfsg1-0sarge2_mipsel.deb stable/main/binary-mipsel/libsasl2-modules_2.1.19.dfsg1-0sarge2_mipsel.deb stable/main/binary-mipsel/sasl2-bin_2.1.19.dfsg1-0sarge2_mipsel.deb stable/main/binary-mipsel/libsasl2_2.1.19.dfsg1-0sarge2_mipsel.deb stable/main/binary-mipsel/libsasl2-dev_2.1.19.dfsg1-0sarge2_mipsel.deb stable/main/binary-mipsel/libsasl2-modules-sql_2.1.19.dfsg1-0sarge2_mipsel.deb cyrus-sasl2 (2.1.19.dfsg1-0sarge2) stable; urgency=high * Non-maintainer upload by the Security Team The previous version didn't make the 3.1r2 release. This release merges in the patch applied for DSA-1042 * Applied upstream patch to fix remote denial of service [debian/patches/23_CVE-2006-1721.diff] stable/main/binary-mips/libsasl2-dev_2.1.19.dfsg1-0sarge2_mips.deb stable/main/binary-mips/libsasl2-modules-kerberos-heimdal_2.1.19.dfsg1-0sarge2_mips.deb stable/main/binary-mips/libsasl2_2.1.19.dfsg1-0sarge2_mips.deb stable/main/binary-mips/libsasl2-modules-sql_2.1.19.dfsg1-0sarge2_mips.deb stable/main/binary-mips/sasl2-bin_2.1.19.dfsg1-0sarge2_mips.deb stable/main/binary-mips/libsasl2-modules-gssapi-heimdal_2.1.19.dfsg1-0sarge2_mips.deb stable/main/binary-mips/libsasl2-modules_2.1.19.dfsg1-0sarge2_mips.deb cyrus-sasl2 (2.1.19.dfsg1-0sarge2) stable; urgency=high * Non-maintainer upload by the Security Team The previous version didn't make the 3.1r2 release. This release merges in the patch applied for DSA-1042 * Applied upstream patch to fix remote denial of service [debian/patches/23_CVE-2006-1721.diff] stable/main/binary-m68k/libsasl2-modules-kerberos-heimdal_2.1.19.dfsg1-0sarge2_m68k.deb stable/main/binary-m68k/sasl2-bin_2.1.19.dfsg1-0sarge2_m68k.deb stable/main/binary-m68k/libsasl2-modules-sql_2.1.19.dfsg1-0sarge2_m68k.deb stable/main/binary-m68k/libsasl2-modules-gssapi-heimdal_2.1.19.dfsg1-0sarge2_m68k.deb stable/main/binary-m68k/libsasl2-dev_2.1.19.dfsg1-0sarge2_m68k.deb stable/main/binary-m68k/libsasl2_2.1.19.dfsg1-0sarge2_m68k.deb stable/main/binary-m68k/libsasl2-modules_2.1.19.dfsg1-0sarge2_m68k.deb cyrus-sasl2 (2.1.19.dfsg1-0sarge2) stable; urgency=high * Non-maintainer upload by the Security Team The previous version didn't make the 3.1r2 release. This release merges in the patch applied for DSA-1042 * Applied upstream patch to fix remote denial of service [debian/patches/23_CVE-2006-1721.diff] stable/main/binary-i386/libsasl2_2.1.19.dfsg1-0sarge2_i386.deb stable/main/binary-i386/sasl2-bin_2.1.19.dfsg1-0sarge2_i386.deb stable/main/binary-i386/libsasl2-dev_2.1.19.dfsg1-0sarge2_i386.deb stable/main/binary-i386/libsasl2-modules-sql_2.1.19.dfsg1-0sarge2_i386.deb stable/main/binary-i386/libsasl2-modules-gssapi-heimdal_2.1.19.dfsg1-0sarge2_i386.deb stable/main/binary-i386/libsasl2-modules-kerberos-heimdal_2.1.19.dfsg1-0sarge2_i386.deb stable/main/binary-i386/libsasl2-modules_2.1.19.dfsg1-0sarge2_i386.deb cyrus-sasl2 (2.1.19.dfsg1-0sarge2) stable; urgency=high * Non-maintainer upload by the Security Team The previous version didn't make the 3.1r2 release. This release merges in the patch applied for DSA-1042 * Applied upstream patch to fix remote denial of service [debian/patches/23_CVE-2006-1721.diff] stable/main/binary-hppa/sasl2-bin_2.1.19.dfsg1-0sarge2_hppa.deb stable/main/binary-hppa/libsasl2-dev_2.1.19.dfsg1-0sarge2_hppa.deb stable/main/binary-hppa/libsasl2-modules-kerberos-heimdal_2.1.19.dfsg1-0sarge2_hppa.deb stable/main/binary-hppa/libsasl2_2.1.19.dfsg1-0sarge2_hppa.deb stable/main/binary-hppa/libsasl2-modules-gssapi-heimdal_2.1.19.dfsg1-0sarge2_hppa.deb stable/main/binary-hppa/libsasl2-modules-sql_2.1.19.dfsg1-0sarge2_hppa.deb stable/main/binary-hppa/libsasl2-modules_2.1.19.dfsg1-0sarge2_hppa.deb cyrus-sasl2 (2.1.19.dfsg1-0sarge2) stable; urgency=high * Non-maintainer upload by the Security Team The previous version didn't make the 3.1r2 release. This release merges in the patch applied for DSA-1042 * Applied upstream patch to fix remote denial of service [debian/patches/23_CVE-2006-1721.diff] stable/main/binary-arm/libsasl2-modules-gssapi-heimdal_2.1.19.dfsg1-0sarge2_arm.deb stable/main/binary-arm/sasl2-bin_2.1.19.dfsg1-0sarge2_arm.deb stable/main/binary-arm/libsasl2-dev_2.1.19.dfsg1-0sarge2_arm.deb stable/main/binary-arm/libsasl2-modules-sql_2.1.19.dfsg1-0sarge2_arm.deb stable/main/binary-arm/libsasl2_2.1.19.dfsg1-0sarge2_arm.deb stable/main/binary-arm/libsasl2-modules-kerberos-heimdal_2.1.19.dfsg1-0sarge2_arm.deb stable/main/binary-arm/libsasl2-modules_2.1.19.dfsg1-0sarge2_arm.deb cyrus-sasl2 (2.1.19.dfsg1-0sarge2) stable; urgency=high * Non-maintainer upload by the Security Team The previous version didn't make the 3.1r2 release. This release merges in the patch applied for DSA-1042 * Applied upstream patch to fix remote denial of service [debian/patches/23_CVE-2006-1721.diff] stable/main/binary-alpha/libsasl2-modules-kerberos-heimdal_2.1.19.dfsg1-0sarge2_alpha.deb stable/main/binary-alpha/libsasl2_2.1.19.dfsg1-0sarge2_alpha.deb stable/main/binary-alpha/sasl2-bin_2.1.19.dfsg1-0sarge2_alpha.deb stable/main/binary-alpha/libsasl2-modules_2.1.19.dfsg1-0sarge2_alpha.deb stable/main/binary-alpha/libsasl2-dev_2.1.19.dfsg1-0sarge2_alpha.deb stable/main/binary-alpha/libsasl2-modules-sql_2.1.19.dfsg1-0sarge2_alpha.deb stable/main/binary-alpha/libsasl2-modules-gssapi-heimdal_2.1.19.dfsg1-0sarge2_alpha.deb cyrus-sasl2 (2.1.19.dfsg1-0sarge2) stable; urgency=high * Non-maintainer upload by the Security Team The previous version didn't make the 3.1r2 release. This release merges in the patch applied for DSA-1042 * Applied upstream patch to fix remote denial of service [debian/patches/23_CVE-2006-1721.diff] stable/main/binary-ia64/libsasl2_2.1.19.dfsg1-0sarge2_ia64.deb stable/main/binary-ia64/libsasl2-modules-gssapi-heimdal_2.1.19.dfsg1-0sarge2_ia64.deb stable/main/source/cyrus-sasl2_2.1.19.dfsg1-0sarge2.dsc stable/main/source/cyrus-sasl2_2.1.19.dfsg1-0sarge2.diff.gz stable/main/binary-ia64/libsasl2-modules_2.1.19.dfsg1-0sarge2_ia64.deb stable/main/binary-ia64/libsasl2-modules-kerberos-heimdal_2.1.19.dfsg1-0sarge2_ia64.deb stable/main/binary-ia64/libsasl2-dev_2.1.19.dfsg1-0sarge2_ia64.deb stable/main/binary-ia64/libsasl2-modules-sql_2.1.19.dfsg1-0sarge2_ia64.deb stable/main/binary-ia64/sasl2-bin_2.1.19.dfsg1-0sarge2_ia64.deb cyrus-sasl2 (2.1.19.dfsg1-0sarge2) stable; urgency=high * Non-maintainer upload by the Security Team The previous version didn't make the 3.1r2 release. This release merges in the patch applied for DSA-1042 * Applied upstream patch to fix remote denial of service [debian/patches/23_CVE-2006-1721.diff] stable/main/binary-sparc/cscope_15.5-1.1sarge1_sparc.deb cscope (15.5-1.1sarge1) stable-security; urgency=high * Non-maintainer upload by the Security Team: * Fix several buffer overflows. (CVE-2004-2541) stable/main/binary-s390/cscope_15.5-1.1sarge1_s390.deb cscope (15.5-1.1sarge1) stable-security; urgency=high * Non-maintainer upload by the Security Team: * Fix several buffer overflows. (CVE-2004-2541) stable/main/binary-powerpc/cscope_15.5-1.1sarge1_powerpc.deb cscope (15.5-1.1sarge1) stable-security; urgency=high * Non-maintainer upload by the Security Team: * Fix several buffer overflows. (CVE-2004-2541) stable/main/binary-mipsel/cscope_15.5-1.1sarge1_mipsel.deb cscope (15.5-1.1sarge1) stable-security; urgency=high * Non-maintainer upload by the Security Team: * Fix several buffer overflows. (CVE-2004-2541) stable/main/binary-mips/cscope_15.5-1.1sarge1_mips.deb cscope (15.5-1.1sarge1) stable-security; urgency=high * Non-maintainer upload by the Security Team: * Fix several buffer overflows. (CVE-2004-2541) stable/main/binary-m68k/cscope_15.5-1.1sarge1_m68k.deb cscope (15.5-1.1sarge1) stable-security; urgency=high * Non-maintainer upload by the Security Team: * Fix several buffer overflows. (CVE-2004-2541) stable/main/binary-ia64/cscope_15.5-1.1sarge1_ia64.deb cscope (15.5-1.1sarge1) stable-security; urgency=high * Non-maintainer upload by the Security Team: * Fix several buffer overflows. (CVE-2004-2541) stable/main/binary-hppa/cscope_15.5-1.1sarge1_hppa.deb cscope (15.5-1.1sarge1) stable-security; urgency=high * Non-maintainer upload by the Security Team: * Fix several buffer overflows. (CVE-2004-2541) stable/main/binary-arm/cscope_15.5-1.1sarge1_arm.deb cscope (15.5-1.1sarge1) stable-security; urgency=high * Non-maintainer upload by the Security Team: * Fix several buffer overflows. (CVE-2004-2541) stable/main/binary-alpha/cscope_15.5-1.1sarge1_alpha.deb cscope (15.5-1.1sarge1) stable-security; urgency=high * Non-maintainer upload by the Security Team: * Fix several buffer overflows. (CVE-2004-2541) stable/main/binary-i386/cscope_15.5-1.1sarge1_i386.deb stable/main/source/cscope_15.5-1.1sarge1.diff.gz stable/main/source/cscope_15.5-1.1sarge1.dsc cscope (15.5-1.1sarge1) stable-security; urgency=high * Non-maintainer upload by the Security Team: * Fix several buffer overflows. (CVE-2004-2541) stable/main/binary-sparc/courier-pcp_0.47-4sarge5_sparc.deb stable/main/binary-sparc/courier-faxmail_0.47-4sarge5_sparc.deb stable/main/binary-sparc/sqwebmail_0.47-4sarge5_sparc.deb stable/main/binary-sparc/courier-maildrop_0.47-4sarge5_sparc.deb stable/main/binary-sparc/courier-mlm_0.47-4sarge5_sparc.deb stable/main/binary-sparc/courier-authmysql_0.47-4sarge5_sparc.deb stable/main/binary-sparc/courier-base_0.47-4sarge5_sparc.deb stable/main/binary-sparc/courier-pop_0.47-4sarge5_sparc.deb stable/main/binary-sparc/courier-mta_0.47-4sarge5_sparc.deb stable/main/binary-sparc/courier-authdaemon_0.47-4sarge5_sparc.deb stable/main/binary-sparc/courier-authpostgresql_0.47-4sarge5_sparc.deb stable/main/binary-sparc/courier-pop-ssl_0.47-4sarge5_sparc.deb stable/main/binary-sparc/courier-mta-ssl_0.47-4sarge5_sparc.deb stable/main/binary-sparc/courier-imap-ssl_3.0.8-4sarge5_sparc.deb stable/main/binary-sparc/courier-webadmin_0.47-4sarge5_sparc.deb stable/main/binary-sparc/courier-imap_3.0.8-4sarge5_sparc.deb stable/main/binary-sparc/courier-ldap_0.47-4sarge5_sparc.deb stable/main/binary-sparc/courier-ssl_0.47-4sarge5_sparc.deb courier (0.47-4sarge5) stable-security; urgency=high * Non-maintainer upload by the Security Team * Backported upstream patch to fix an encoding bug in connection with the '=' sign in addresses [courier/libs/comverp.c, CVE-2006-2659] stable/main/binary-s390/courier-mlm_0.47-4sarge5_s390.deb stable/main/binary-s390/courier-webadmin_0.47-4sarge5_s390.deb stable/main/binary-s390/courier-mta-ssl_0.47-4sarge5_s390.deb stable/main/binary-s390/courier-pop_0.47-4sarge5_s390.deb stable/main/binary-s390/courier-imap_3.0.8-4sarge5_s390.deb stable/main/binary-s390/courier-pcp_0.47-4sarge5_s390.deb stable/main/binary-s390/courier-authmysql_0.47-4sarge5_s390.deb stable/main/binary-s390/courier-mta_0.47-4sarge5_s390.deb stable/main/binary-s390/courier-imap-ssl_3.0.8-4sarge5_s390.deb stable/main/binary-s390/courier-authdaemon_0.47-4sarge5_s390.deb stable/main/binary-s390/courier-maildrop_0.47-4sarge5_s390.deb stable/main/binary-s390/courier-ssl_0.47-4sarge5_s390.deb stable/main/binary-s390/sqwebmail_0.47-4sarge5_s390.deb stable/main/binary-s390/courier-base_0.47-4sarge5_s390.deb stable/main/binary-s390/courier-ldap_0.47-4sarge5_s390.deb stable/main/binary-s390/courier-authpostgresql_0.47-4sarge5_s390.deb stable/main/binary-s390/courier-faxmail_0.47-4sarge5_s390.deb stable/main/binary-s390/courier-pop-ssl_0.47-4sarge5_s390.deb courier (0.47-4sarge5) stable-security; urgency=high * Non-maintainer upload by the Security Team * Backported upstream patch to fix an encoding bug in connection with the '=' sign in addresses [courier/libs/comverp.c, CVE-2006-2659] stable/main/binary-mipsel/courier-ssl_0.47-4sarge5_mipsel.deb stable/main/binary-mipsel/courier-authpostgresql_0.47-4sarge5_mipsel.deb stable/main/binary-mipsel/courier-mlm_0.47-4sarge5_mipsel.deb stable/main/binary-mipsel/courier-pcp_0.47-4sarge5_mipsel.deb stable/main/binary-mipsel/courier-base_0.47-4sarge5_mipsel.deb stable/main/binary-mipsel/courier-imap-ssl_3.0.8-4sarge5_mipsel.deb stable/main/binary-mipsel/courier-maildrop_0.47-4sarge5_mipsel.deb stable/main/binary-mipsel/courier-pop-ssl_0.47-4sarge5_mipsel.deb stable/main/binary-mipsel/sqwebmail_0.47-4sarge5_mipsel.deb stable/main/binary-mipsel/courier-authmysql_0.47-4sarge5_mipsel.deb stable/main/binary-mipsel/courier-pop_0.47-4sarge5_mipsel.deb stable/main/binary-mipsel/courier-ldap_0.47-4sarge5_mipsel.deb stable/main/binary-mipsel/courier-webadmin_0.47-4sarge5_mipsel.deb stable/main/binary-mipsel/courier-mta-ssl_0.47-4sarge5_mipsel.deb stable/main/binary-mipsel/courier-imap_3.0.8-4sarge5_mipsel.deb stable/main/binary-mipsel/courier-faxmail_0.47-4sarge5_mipsel.deb stable/main/binary-mipsel/courier-mta_0.47-4sarge5_mipsel.deb stable/main/binary-mipsel/courier-authdaemon_0.47-4sarge5_mipsel.deb courier (0.47-4sarge5) stable-security; urgency=high * Non-maintainer upload by the Security Team * Backported upstream patch to fix an encoding bug in connection with the '=' sign in addresses [courier/libs/comverp.c, CVE-2006-2659] stable/main/binary-mips/courier-base_0.47-4sarge5_mips.deb stable/main/binary-mips/courier-pop_0.47-4sarge5_mips.deb stable/main/binary-mips/courier-mlm_0.47-4sarge5_mips.deb stable/main/binary-mips/courier-pop-ssl_0.47-4sarge5_mips.deb stable/main/binary-mips/courier-maildrop_0.47-4sarge5_mips.deb stable/main/binary-mips/courier-imap-ssl_3.0.8-4sarge5_mips.deb stable/main/binary-mips/courier-authdaemon_0.47-4sarge5_mips.deb stable/main/binary-mips/courier-ldap_0.47-4sarge5_mips.deb stable/main/binary-mips/courier-webadmin_0.47-4sarge5_mips.deb stable/main/binary-mips/courier-imap_3.0.8-4sarge5_mips.deb stable/main/binary-mips/courier-ssl_0.47-4sarge5_mips.deb stable/main/binary-mips/sqwebmail_0.47-4sarge5_mips.deb stable/main/binary-mips/courier-pcp_0.47-4sarge5_mips.deb stable/main/binary-mips/courier-faxmail_0.47-4sarge5_mips.deb stable/main/binary-mips/courier-mta-ssl_0.47-4sarge5_mips.deb stable/main/binary-mips/courier-mta_0.47-4sarge5_mips.deb stable/main/binary-mips/courier-authpostgresql_0.47-4sarge5_mips.deb stable/main/binary-mips/courier-authmysql_0.47-4sarge5_mips.deb courier (0.47-4sarge5) stable-security; urgency=high * Non-maintainer upload by the Security Team * Backported upstream patch to fix an encoding bug in connection with the '=' sign in addresses [courier/libs/comverp.c, CVE-2006-2659] stable/main/binary-m68k/courier-authdaemon_0.47-4sarge5_m68k.deb stable/main/binary-m68k/courier-imap_3.0.8-4sarge5_m68k.deb stable/main/binary-m68k/courier-pcp_0.47-4sarge5_m68k.deb stable/main/binary-m68k/courier-faxmail_0.47-4sarge5_m68k.deb stable/main/binary-m68k/courier-webadmin_0.47-4sarge5_m68k.deb stable/main/binary-m68k/sqwebmail_0.47-4sarge5_m68k.deb stable/main/binary-m68k/courier-imap-ssl_3.0.8-4sarge5_m68k.deb stable/main/binary-m68k/courier-authpostgresql_0.47-4sarge5_m68k.deb stable/main/binary-m68k/courier-pop-ssl_0.47-4sarge5_m68k.deb stable/main/binary-m68k/courier-ssl_0.47-4sarge5_m68k.deb stable/main/binary-m68k/courier-base_0.47-4sarge5_m68k.deb stable/main/binary-m68k/courier-pop_0.47-4sarge5_m68k.deb stable/main/binary-m68k/courier-mlm_0.47-4sarge5_m68k.deb stable/main/binary-m68k/courier-ldap_0.47-4sarge5_m68k.deb stable/main/binary-m68k/courier-maildrop_0.47-4sarge5_m68k.deb stable/main/binary-m68k/courier-mta_0.47-4sarge5_m68k.deb stable/main/binary-m68k/courier-authmysql_0.47-4sarge5_m68k.deb stable/main/binary-m68k/courier-mta-ssl_0.47-4sarge5_m68k.deb courier (0.47-4sarge5) stable-security; urgency=high * Non-maintainer upload by the Security Team * Backported upstream patch to fix an encoding bug in connection with the '=' sign in addresses [courier/libs/comverp.c, CVE-2006-2659] stable/main/binary-ia64/courier-mlm_0.47-4sarge5_ia64.deb stable/main/binary-ia64/courier-pop_0.47-4sarge5_ia64.deb stable/main/binary-ia64/courier-imap-ssl_3.0.8-4sarge5_ia64.deb stable/main/binary-ia64/courier-authdaemon_0.47-4sarge5_ia64.deb stable/main/binary-ia64/courier-imap_3.0.8-4sarge5_ia64.deb stable/main/binary-ia64/courier-pop-ssl_0.47-4sarge5_ia64.deb stable/main/binary-ia64/courier-ssl_0.47-4sarge5_ia64.deb stable/main/binary-ia64/courier-maildrop_0.47-4sarge5_ia64.deb stable/main/binary-ia64/courier-authpostgresql_0.47-4sarge5_ia64.deb stable/main/binary-ia64/sqwebmail_0.47-4sarge5_ia64.deb stable/main/binary-ia64/courier-base_0.47-4sarge5_ia64.deb stable/main/binary-ia64/courier-mta-ssl_0.47-4sarge5_ia64.deb stable/main/binary-ia64/courier-ldap_0.47-4sarge5_ia64.deb stable/main/binary-ia64/courier-webadmin_0.47-4sarge5_ia64.deb stable/main/binary-ia64/courier-authmysql_0.47-4sarge5_ia64.deb stable/main/binary-ia64/courier-pcp_0.47-4sarge5_ia64.deb stable/main/binary-ia64/courier-mta_0.47-4sarge5_ia64.deb stable/main/binary-ia64/courier-faxmail_0.47-4sarge5_ia64.deb courier (0.47-4sarge5) stable-security; urgency=high * Non-maintainer upload by the Security Team * Backported upstream patch to fix an encoding bug in connection with the '=' sign in addresses [courier/libs/comverp.c, CVE-2006-2659] stable/main/binary-i386/courier-ssl_0.47-4sarge5_i386.deb stable/main/binary-i386/courier-pcp_0.47-4sarge5_i386.deb stable/main/binary-i386/courier-mta-ssl_0.47-4sarge5_i386.deb stable/main/binary-i386/courier-ldap_0.47-4sarge5_i386.deb stable/main/binary-i386/courier-base_0.47-4sarge5_i386.deb stable/main/binary-i386/courier-faxmail_0.47-4sarge5_i386.deb stable/main/binary-i386/courier-authdaemon_0.47-4sarge5_i386.deb stable/main/binary-i386/courier-webadmin_0.47-4sarge5_i386.deb stable/main/binary-i386/courier-authmysql_0.47-4sarge5_i386.deb stable/main/binary-i386/courier-pop_0.47-4sarge5_i386.deb stable/main/binary-i386/courier-maildrop_0.47-4sarge5_i386.deb stable/main/binary-i386/courier-mta_0.47-4sarge5_i386.deb stable/main/binary-i386/sqwebmail_0.47-4sarge5_i386.deb stable/main/binary-i386/courier-imap-ssl_3.0.8-4sarge5_i386.deb stable/main/binary-i386/courier-authpostgresql_0.47-4sarge5_i386.deb stable/main/binary-i386/courier-pop-ssl_0.47-4sarge5_i386.deb stable/main/binary-i386/courier-imap_3.0.8-4sarge5_i386.deb stable/main/binary-i386/courier-mlm_0.47-4sarge5_i386.deb courier (0.47-4sarge5) stable-security; urgency=high * Non-maintainer upload by the Security Team * Backported upstream patch to fix an encoding bug in connection with the '=' sign in addresses [courier/libs/comverp.c, CVE-2006-2659] stable/main/binary-hppa/courier-pop_0.47-4sarge5_hppa.deb stable/main/binary-hppa/courier-authmysql_0.47-4sarge5_hppa.deb stable/main/binary-hppa/courier-mta_0.47-4sarge5_hppa.deb stable/main/binary-hppa/courier-imap_3.0.8-4sarge5_hppa.deb stable/main/binary-hppa/courier-faxmail_0.47-4sarge5_hppa.deb stable/main/binary-hppa/sqwebmail_0.47-4sarge5_hppa.deb stable/main/binary-hppa/courier-webadmin_0.47-4sarge5_hppa.deb stable/main/binary-hppa/courier-mta-ssl_0.47-4sarge5_hppa.deb stable/main/binary-hppa/courier-maildrop_0.47-4sarge5_hppa.deb stable/main/binary-hppa/courier-mlm_0.47-4sarge5_hppa.deb stable/main/binary-hppa/courier-authdaemon_0.47-4sarge5_hppa.deb stable/main/binary-hppa/courier-base_0.47-4sarge5_hppa.deb stable/main/binary-hppa/courier-pcp_0.47-4sarge5_hppa.deb stable/main/binary-hppa/courier-pop-ssl_0.47-4sarge5_hppa.deb stable/main/binary-hppa/courier-authpostgresql_0.47-4sarge5_hppa.deb stable/main/binary-hppa/courier-imap-ssl_3.0.8-4sarge5_hppa.deb stable/main/binary-hppa/courier-ldap_0.47-4sarge5_hppa.deb stable/main/binary-hppa/courier-ssl_0.47-4sarge5_hppa.deb courier (0.47-4sarge5) stable-security; urgency=high * Non-maintainer upload by the Security Team * Backported upstream patch to fix an encoding bug in connection with the '=' sign in addresses [courier/libs/comverp.c, CVE-2006-2659] stable/main/binary-arm/courier-mlm_0.47-4sarge5_arm.deb stable/main/binary-arm/courier-ssl_0.47-4sarge5_arm.deb stable/main/binary-arm/courier-pcp_0.47-4sarge5_arm.deb stable/main/binary-arm/courier-base_0.47-4sarge5_arm.deb stable/main/binary-arm/sqwebmail_0.47-4sarge5_arm.deb stable/main/binary-arm/courier-faxmail_0.47-4sarge5_arm.deb stable/main/binary-arm/courier-authmysql_0.47-4sarge5_arm.deb stable/main/binary-arm/courier-authpostgresql_0.47-4sarge5_arm.deb stable/main/binary-arm/courier-pop-ssl_0.47-4sarge5_arm.deb stable/main/binary-arm/courier-imap-ssl_3.0.8-4sarge5_arm.deb stable/main/binary-arm/courier-pop_0.47-4sarge5_arm.deb stable/main/binary-arm/courier-mta_0.47-4sarge5_arm.deb stable/main/binary-arm/courier-mta-ssl_0.47-4sarge5_arm.deb stable/main/binary-arm/courier-imap_3.0.8-4sarge5_arm.deb stable/main/binary-arm/courier-ldap_0.47-4sarge5_arm.deb stable/main/binary-arm/courier-maildrop_0.47-4sarge5_arm.deb stable/main/binary-arm/courier-webadmin_0.47-4sarge5_arm.deb stable/main/binary-arm/courier-authdaemon_0.47-4sarge5_arm.deb courier (0.47-4sarge5) stable-security; urgency=high * Non-maintainer upload by the Security Team * Backported upstream patch to fix an encoding bug in connection with the '=' sign in addresses [courier/libs/comverp.c, CVE-2006-2659] stable/main/binary-alpha/courier-faxmail_0.47-4sarge5_alpha.deb stable/main/binary-alpha/courier-ssl_0.47-4sarge5_alpha.deb stable/main/binary-alpha/courier-base_0.47-4sarge5_alpha.deb stable/main/binary-alpha/courier-ldap_0.47-4sarge5_alpha.deb stable/main/binary-alpha/courier-maildrop_0.47-4sarge5_alpha.deb stable/main/binary-alpha/sqwebmail_0.47-4sarge5_alpha.deb stable/main/binary-alpha/courier-authmysql_0.47-4sarge5_alpha.deb stable/main/binary-alpha/courier-mlm_0.47-4sarge5_alpha.deb stable/main/binary-alpha/courier-pcp_0.47-4sarge5_alpha.deb stable/main/binary-alpha/courier-mta_0.47-4sarge5_alpha.deb stable/main/binary-alpha/courier-webadmin_0.47-4sarge5_alpha.deb stable/main/binary-alpha/courier-imap-ssl_3.0.8-4sarge5_alpha.deb stable/main/binary-alpha/courier-pop_0.47-4sarge5_alpha.deb stable/main/binary-alpha/courier-pop-ssl_0.47-4sarge5_alpha.deb stable/main/binary-alpha/courier-imap_3.0.8-4sarge5_alpha.deb stable/main/binary-alpha/courier-mta-ssl_0.47-4sarge5_alpha.deb stable/main/binary-alpha/courier-authdaemon_0.47-4sarge5_alpha.deb stable/main/binary-alpha/courier-authpostgresql_0.47-4sarge5_alpha.deb courier (0.47-4sarge5) stable-security; urgency=high * Non-maintainer upload by the Security Team * Backported upstream patch to fix an encoding bug in connection with the '=' sign in addresses [courier/libs/comverp.c, CVE-2006-2659] stable/main/binary-powerpc/courier-mta_0.47-4sarge5_powerpc.deb stable/main/binary-powerpc/courier-authpostgresql_0.47-4sarge5_powerpc.deb stable/main/binary-powerpc/courier-ldap_0.47-4sarge5_powerpc.deb stable/main/binary-powerpc/courier-authmysql_0.47-4sarge5_powerpc.deb stable/main/binary-powerpc/courier-base_0.47-4sarge5_powerpc.deb stable/main/binary-powerpc/sqwebmail_0.47-4sarge5_powerpc.deb stable/main/binary-powerpc/courier-ssl_0.47-4sarge5_powerpc.deb stable/main/binary-powerpc/courier-webadmin_0.47-4sarge5_powerpc.deb stable/main/binary-powerpc/courier-pcp_0.47-4sarge5_powerpc.deb stable/main/binary-powerpc/courier-authdaemon_0.47-4sarge5_powerpc.deb stable/main/source/courier_0.47-4sarge5.dsc stable/main/binary-powerpc/courier-imap-ssl_3.0.8-4sarge5_powerpc.deb stable/main/binary-powerpc/courier-pop-ssl_0.47-4sarge5_powerpc.deb stable/main/binary-powerpc/courier-mta-ssl_0.47-4sarge5_powerpc.deb stable/main/binary-powerpc/courier-maildrop_0.47-4sarge5_powerpc.deb stable/main/binary-powerpc/courier-pop_0.47-4sarge5_powerpc.deb stable/main/binary-powerpc/courier-mlm_0.47-4sarge5_powerpc.deb stable/main/binary-powerpc/courier-imap_3.0.8-4sarge5_powerpc.deb stable/main/binary-all/courier-doc_0.47-4sarge5_all.deb stable/main/binary-powerpc/courier-faxmail_0.47-4sarge5_powerpc.deb stable/main/source/courier_0.47-4sarge5.diff.gz courier (0.47-4sarge5) stable-security; urgency=high * Non-maintainer upload by the Security Team * Backported upstream patch to fix an encoding bug in connection with the '=' sign in addresses [courier/libs/comverp.c, CVE-2006-2659] stable/main/binary-sparc/libclamav1_0.84-2.sarge.10_sparc.deb stable/main/binary-sparc/clamav-freshclam_0.84-2.sarge.10_sparc.deb stable/main/binary-sparc/clamav_0.84-2.sarge.10_sparc.deb stable/main/binary-sparc/clamav-milter_0.84-2.sarge.10_sparc.deb stable/main/binary-sparc/clamav-daemon_0.84-2.sarge.10_sparc.deb stable/main/binary-sparc/libclamav-dev_0.84-2.sarge.10_sparc.deb clamav (0.84-2.sarge.10) stable-security; urgency=high * libclamav/upx.c: buffer overflow [CVE-2006-4018] stable/main/binary-s390/clamav-freshclam_0.84-2.sarge.10_s390.deb stable/main/binary-s390/libclamav-dev_0.84-2.sarge.10_s390.deb stable/main/binary-s390/clamav-milter_0.84-2.sarge.10_s390.deb stable/main/binary-s390/clamav-daemon_0.84-2.sarge.10_s390.deb stable/main/binary-s390/clamav_0.84-2.sarge.10_s390.deb stable/main/binary-s390/libclamav1_0.84-2.sarge.10_s390.deb clamav (0.84-2.sarge.10) stable-security; urgency=high * libclamav/upx.c: buffer overflow [CVE-2006-4018] stable/main/binary-powerpc/clamav-daemon_0.84-2.sarge.10_powerpc.deb stable/main/binary-powerpc/clamav-freshclam_0.84-2.sarge.10_powerpc.deb stable/main/binary-powerpc/libclamav1_0.84-2.sarge.10_powerpc.deb stable/main/binary-powerpc/clamav_0.84-2.sarge.10_powerpc.deb stable/main/binary-powerpc/clamav-milter_0.84-2.sarge.10_powerpc.deb stable/main/binary-powerpc/libclamav-dev_0.84-2.sarge.10_powerpc.deb clamav (0.84-2.sarge.10) stable-security; urgency=high * libclamav/upx.c: buffer overflow [CVE-2006-4018] stable/main/binary-mipsel/clamav-milter_0.84-2.sarge.10_mipsel.deb stable/main/binary-mipsel/clamav_0.84-2.sarge.10_mipsel.deb stable/main/binary-mipsel/libclamav1_0.84-2.sarge.10_mipsel.deb stable/main/binary-mipsel/clamav-freshclam_0.84-2.sarge.10_mipsel.deb stable/main/binary-mipsel/clamav-daemon_0.84-2.sarge.10_mipsel.deb stable/main/binary-mipsel/libclamav-dev_0.84-2.sarge.10_mipsel.deb clamav (0.84-2.sarge.10) stable-security; urgency=high * libclamav/upx.c: buffer overflow [CVE-2006-4018] stable/main/binary-mips/libclamav1_0.84-2.sarge.10_mips.deb stable/main/binary-mips/clamav_0.84-2.sarge.10_mips.deb stable/main/binary-mips/clamav-daemon_0.84-2.sarge.10_mips.deb stable/main/binary-mips/libclamav-dev_0.84-2.sarge.10_mips.deb stable/main/binary-mips/clamav-milter_0.84-2.sarge.10_mips.deb stable/main/binary-mips/clamav-freshclam_0.84-2.sarge.10_mips.deb clamav (0.84-2.sarge.10) stable-security; urgency=high * libclamav/upx.c: buffer overflow [CVE-2006-4018] stable/main/binary-m68k/clamav_0.84-2.sarge.10_m68k.deb stable/main/binary-m68k/libclamav1_0.84-2.sarge.10_m68k.deb stable/main/binary-m68k/clamav-freshclam_0.84-2.sarge.10_m68k.deb stable/main/binary-m68k/libclamav-dev_0.84-2.sarge.10_m68k.deb stable/main/binary-m68k/clamav-daemon_0.84-2.sarge.10_m68k.deb stable/main/binary-m68k/clamav-milter_0.84-2.sarge.10_m68k.deb clamav (0.84-2.sarge.10) stable-security; urgency=high * libclamav/upx.c: buffer overflow [CVE-2006-4018] stable/main/binary-ia64/clamav-daemon_0.84-2.sarge.10_ia64.deb stable/main/binary-ia64/clamav_0.84-2.sarge.10_ia64.deb stable/main/binary-ia64/clamav-freshclam_0.84-2.sarge.10_ia64.deb stable/main/binary-ia64/clamav-milter_0.84-2.sarge.10_ia64.deb stable/main/binary-ia64/libclamav1_0.84-2.sarge.10_ia64.deb stable/main/binary-ia64/libclamav-dev_0.84-2.sarge.10_ia64.deb clamav (0.84-2.sarge.10) stable-security; urgency=high * libclamav/upx.c: buffer overflow [CVE-2006-4018] stable/main/binary-hppa/libclamav-dev_0.84-2.sarge.10_hppa.deb stable/main/binary-hppa/libclamav1_0.84-2.sarge.10_hppa.deb stable/main/binary-hppa/clamav-milter_0.84-2.sarge.10_hppa.deb stable/main/binary-hppa/clamav_0.84-2.sarge.10_hppa.deb stable/main/binary-hppa/clamav-daemon_0.84-2.sarge.10_hppa.deb stable/main/binary-hppa/clamav-freshclam_0.84-2.sarge.10_hppa.deb clamav (0.84-2.sarge.10) stable-security; urgency=high * libclamav/upx.c: buffer overflow [CVE-2006-4018] stable/main/binary-arm/clamav-milter_0.84-2.sarge.10_arm.deb stable/main/binary-arm/libclamav1_0.84-2.sarge.10_arm.deb stable/main/binary-arm/libclamav-dev_0.84-2.sarge.10_arm.deb stable/main/binary-arm/clamav-freshclam_0.84-2.sarge.10_arm.deb stable/main/binary-arm/clamav_0.84-2.sarge.10_arm.deb stable/main/binary-arm/clamav-daemon_0.84-2.sarge.10_arm.deb clamav (0.84-2.sarge.10) stable-security; urgency=high * libclamav/upx.c: buffer overflow [CVE-2006-4018] stable/main/binary-alpha/clamav-milter_0.84-2.sarge.10_alpha.deb stable/main/binary-alpha/clamav_0.84-2.sarge.10_alpha.deb stable/main/binary-alpha/clamav-daemon_0.84-2.sarge.10_alpha.deb stable/main/binary-alpha/libclamav-dev_0.84-2.sarge.10_alpha.deb stable/main/binary-alpha/libclamav1_0.84-2.sarge.10_alpha.deb stable/main/binary-alpha/clamav-freshclam_0.84-2.sarge.10_alpha.deb clamav (0.84-2.sarge.10) stable-security; urgency=high * libclamav/upx.c: buffer overflow [CVE-2006-4018] stable/main/binary-i386/libclamav-dev_0.84-2.sarge.10_i386.deb stable/main/binary-i386/clamav-daemon_0.84-2.sarge.10_i386.deb stable/main/source/clamav_0.84-2.sarge.10.diff.gz stable/main/binary-i386/libclamav1_0.84-2.sarge.10_i386.deb stable/main/source/clamav_0.84-2.sarge.10.dsc stable/main/binary-i386/clamav-freshclam_0.84-2.sarge.10_i386.deb stable/main/binary-i386/clamav-milter_0.84-2.sarge.10_i386.deb stable/main/binary-all/clamav-testfiles_0.84-2.sarge.10_all.deb stable/main/binary-all/clamav-docs_0.84-2.sarge.10_all.deb stable/main/binary-i386/clamav_0.84-2.sarge.10_i386.deb stable/main/binary-all/clamav-base_0.84-2.sarge.10_all.deb clamav (0.84-2.sarge.10) stable-security; urgency=high * libclamav/upx.c: buffer overflow [CVE-2006-4018] stable/main/binary-sparc/chmlib-bin_0.35-6sarge3_sparc.deb stable/main/binary-sparc/chmlib-dev_0.35-6sarge3_sparc.deb stable/main/binary-sparc/chmlib_0.35-6sarge3_sparc.deb chmlib (0.35-6sarge3) stable-security; urgency=high * Non-maintainer upload by the Security Team * Fixed directory traversal vulnerability in shipped extract_chmLib example file, based on patch by Julien Lemoine. stable/main/binary-s390/chmlib-dev_0.35-6sarge3_s390.deb stable/main/binary-s390/chmlib_0.35-6sarge3_s390.deb stable/main/binary-s390/chmlib-bin_0.35-6sarge3_s390.deb chmlib (0.35-6sarge3) stable-security; urgency=high * Non-maintainer upload by the Security Team * Fixed directory traversal vulnerability in shipped extract_chmLib example file, based on patch by Julien Lemoine. stable/main/binary-powerpc/chmlib-dev_0.35-6sarge3_powerpc.deb stable/main/binary-powerpc/chmlib_0.35-6sarge3_powerpc.deb stable/main/binary-powerpc/chmlib-bin_0.35-6sarge3_powerpc.deb chmlib (0.35-6sarge3) stable-security; urgency=high * Non-maintainer upload by the Security Team * Fixed directory traversal vulnerability in shipped extract_chmLib example file, based on patch by Julien Lemoine. stable/main/binary-mipsel/chmlib_0.35-6sarge3_mipsel.deb stable/main/binary-mipsel/chmlib-bin_0.35-6sarge3_mipsel.deb stable/main/binary-mipsel/chmlib-dev_0.35-6sarge3_mipsel.deb chmlib (0.35-6sarge3) stable-security; urgency=high * Non-maintainer upload by the Security Team * Fixed directory traversal vulnerability in shipped extract_chmLib example file, based on patch by Julien Lemoine. stable/main/binary-mips/chmlib_0.35-6sarge3_mips.deb stable/main/binary-mips/chmlib-dev_0.35-6sarge3_mips.deb stable/main/binary-mips/chmlib-bin_0.35-6sarge3_mips.deb chmlib (0.35-6sarge3) stable-security; urgency=high * Non-maintainer upload by the Security Team * Fixed directory traversal vulnerability in shipped extract_chmLib example file, based on patch by Julien Lemoine. stable/main/binary-m68k/chmlib-dev_0.35-6sarge3_m68k.deb stable/main/binary-m68k/chmlib_0.35-6sarge3_m68k.deb stable/main/binary-m68k/chmlib-bin_0.35-6sarge3_m68k.deb chmlib (0.35-6sarge3) stable-security; urgency=high * Non-maintainer upload by the Security Team * Fixed directory traversal vulnerability in shipped extract_chmLib example file, based on patch by Julien Lemoine. stable/main/binary-ia64/chmlib-bin_0.35-6sarge3_ia64.deb stable/main/binary-ia64/chmlib_0.35-6sarge3_ia64.deb stable/main/binary-ia64/chmlib-dev_0.35-6sarge3_ia64.deb chmlib (0.35-6sarge3) stable-security; urgency=high * Non-maintainer upload by the Security Team * Fixed directory traversal vulnerability in shipped extract_chmLib example file, based on patch by Julien Lemoine. stable/main/binary-hppa/chmlib-dev_0.35-6sarge3_hppa.deb stable/main/binary-hppa/chmlib_0.35-6sarge3_hppa.deb stable/main/binary-hppa/chmlib-bin_0.35-6sarge3_hppa.deb chmlib (0.35-6sarge3) stable-security; urgency=high * Non-maintainer upload by the Security Team * Fixed directory traversal vulnerability in shipped extract_chmLib example file, based on patch by Julien Lemoine. stable/main/binary-arm/chmlib_0.35-6sarge3_arm.deb stable/main/binary-arm/chmlib-bin_0.35-6sarge3_arm.deb stable/main/binary-arm/chmlib-dev_0.35-6sarge3_arm.deb chmlib (0.35-6sarge3) stable-security; urgency=high * Non-maintainer upload by the Security Team * Fixed directory traversal vulnerability in shipped extract_chmLib example file, based on patch by Julien Lemoine. stable/main/binary-alpha/chmlib-dev_0.35-6sarge3_alpha.deb stable/main/binary-alpha/chmlib-bin_0.35-6sarge3_alpha.deb stable/main/binary-alpha/chmlib_0.35-6sarge3_alpha.deb chmlib (0.35-6sarge3) stable-security; urgency=high * Non-maintainer upload by the Security Team * Fixed directory traversal vulnerability in shipped extract_chmLib example file, based on patch by Julien Lemoine. stable/main/source/chmlib_0.35-6sarge3.diff.gz stable/main/binary-i386/chmlib-dev_0.35-6sarge3_i386.deb stable/main/binary-i386/chmlib-bin_0.35-6sarge3_i386.deb stable/main/binary-i386/chmlib_0.35-6sarge3_i386.deb stable/main/source/chmlib_0.35-6sarge3.dsc chmlib (0.35-6sarge3) stable-security; urgency=high * Non-maintainer upload by the Security Team * Fixed directory traversal vulnerability in shipped extract_chmLib example file, based on patch by Julien Lemoine. stable/main/binary-sparc/cgiirc_0.5.4-6sarge1_sparc.deb cgiirc (0.5.4-6sarge1) stable-security; urgency=high * Non-maintainer upload by the Security Team * Added patch by Elrond backported from upstream to fix buffer overflows [debian/patches/50_client-c_bufferoverflow_fix.dpatch, Bug#365680, CVE-2006-2148] stable/main/binary-s390/cgiirc_0.5.4-6sarge1_s390.deb cgiirc (0.5.4-6sarge1) stable-security; urgency=high * Non-maintainer upload by the Security Team * Added patch by Elrond backported from upstream to fix buffer overflows [debian/patches/50_client-c_bufferoverflow_fix.dpatch, Bug#365680, CVE-2006-2148] stable/main/binary-mipsel/cgiirc_0.5.4-6sarge1_mipsel.deb cgiirc (0.5.4-6sarge1) stable-security; urgency=high * Non-maintainer upload by the Security Team * Added patch by Elrond backported from upstream to fix buffer overflows [debian/patches/50_client-c_bufferoverflow_fix.dpatch, Bug#365680, CVE-2006-2148] stable/main/binary-mips/cgiirc_0.5.4-6sarge1_mips.deb cgiirc (0.5.4-6sarge1) stable-security; urgency=high * Non-maintainer upload by the Security Team * Added patch by Elrond backported from upstream to fix buffer overflows [debian/patches/50_client-c_bufferoverflow_fix.dpatch, Bug#365680, CVE-2006-2148] stable/main/binary-m68k/cgiirc_0.5.4-6sarge1_m68k.deb cgiirc (0.5.4-6sarge1) stable-security; urgency=high * Non-maintainer upload by the Security Team * Added patch by Elrond backported from upstream to fix buffer overflows [debian/patches/50_client-c_bufferoverflow_fix.dpatch, Bug#365680, CVE-2006-2148] stable/main/binary-ia64/cgiirc_0.5.4-6sarge1_ia64.deb cgiirc (0.5.4-6sarge1) stable-security; urgency=high * Non-maintainer upload by the Security Team * Added patch by Elrond backported from upstream to fix buffer overflows [debian/patches/50_client-c_bufferoverflow_fix.dpatch, Bug#365680, CVE-2006-2148] stable/main/binary-i386/cgiirc_0.5.4-6sarge1_i386.deb cgiirc (0.5.4-6sarge1) stable-security; urgency=high * Non-maintainer upload by the Security Team * Added patch by Elrond backported from upstream to fix buffer overflows [debian/patches/50_client-c_bufferoverflow_fix.dpatch, Bug#365680, CVE-2006-2148] stable/main/binary-hppa/cgiirc_0.5.4-6sarge1_hppa.deb cgiirc (0.5.4-6sarge1) stable-security; urgency=high * Non-maintainer upload by the Security Team * Added patch by Elrond backported from upstream to fix buffer overflows [debian/patches/50_client-c_bufferoverflow_fix.dpatch, Bug#365680, CVE-2006-2148] stable/main/binary-arm/cgiirc_0.5.4-6sarge1_arm.deb cgiirc (0.5.4-6sarge1) stable-security; urgency=high * Non-maintainer upload by the Security Team * Added patch by Elrond backported from upstream to fix buffer overflows [debian/patches/50_client-c_bufferoverflow_fix.dpatch, Bug#365680, CVE-2006-2148] stable/main/binary-alpha/cgiirc_0.5.4-6sarge1_alpha.deb cgiirc (0.5.4-6sarge1) stable-security; urgency=high * Non-maintainer upload by the Security Team * Added patch by Elrond backported from upstream to fix buffer overflows [debian/patches/50_client-c_bufferoverflow_fix.dpatch, Bug#365680, CVE-2006-2148] stable/main/binary-powerpc/cgiirc_0.5.4-6sarge1_powerpc.deb stable/main/source/cgiirc_0.5.4-6sarge1.dsc stable/main/source/cgiirc_0.5.4-6sarge1.diff.gz cgiirc (0.5.4-6sarge1) stable-security; urgency=high * Non-maintainer upload by the Security Team * Added patch by Elrond backported from upstream to fix buffer overflows [debian/patches/50_client-c_bufferoverflow_fix.dpatch, Bug#365680, CVE-2006-2148] stable/main/binary-sparc/cfs_1.4.1-15sarge1_sparc.deb cfs (1.4.1-15sarge1) stable-security; urgency=high * cfs_fh.c: doencrypt(), dodecrypt(): make salt unsigned long, not int, as so the fuctions are called in read/writeblock(), de/encryptname() (fixes SIGSEGV due to integer overflow, thx Carlo Contavalli, closes: #371076). stable/main/binary-s390/cfs_1.4.1-15sarge1_s390.deb cfs (1.4.1-15sarge1) stable-security; urgency=high * cfs_fh.c: doencrypt(), dodecrypt(): make salt unsigned long, not int, as so the fuctions are called in read/writeblock(), de/encryptname() (fixes SIGSEGV due to integer overflow, thx Carlo Contavalli, closes: #371076). stable/main/binary-powerpc/cfs_1.4.1-15sarge1_powerpc.deb cfs (1.4.1-15sarge1) stable-security; urgency=high * cfs_fh.c: doencrypt(), dodecrypt(): make salt unsigned long, not int, as so the fuctions are called in read/writeblock(), de/encryptname() (fixes SIGSEGV due to integer overflow, thx Carlo Contavalli, closes: #371076). stable/main/binary-mipsel/cfs_1.4.1-15sarge1_mipsel.deb cfs (1.4.1-15sarge1) stable-security; urgency=high * cfs_fh.c: doencrypt(), dodecrypt(): make salt unsigned long, not int, as so the fuctions are called in read/writeblock(), de/encryptname() (fixes SIGSEGV due to integer overflow, thx Carlo Contavalli, closes: #371076). stable/main/binary-mips/cfs_1.4.1-15sarge1_mips.deb cfs (1.4.1-15sarge1) stable-security; urgency=high * cfs_fh.c: doencrypt(), dodecrypt(): make salt unsigned long, not int, as so the fuctions are called in read/writeblock(), de/encryptname() (fixes SIGSEGV due to integer overflow, thx Carlo Contavalli, closes: #371076). stable/main/binary-m68k/cfs_1.4.1-15sarge1_m68k.deb cfs (1.4.1-15sarge1) stable-security; urgency=high * cfs_fh.c: doencrypt(), dodecrypt(): make salt unsigned long, not int, as so the fuctions are called in read/writeblock(), de/encryptname() (fixes SIGSEGV due to integer overflow, thx Carlo Contavalli, closes: #371076). stable/main/binary-ia64/cfs_1.4.1-15sarge1_ia64.deb cfs (1.4.1-15sarge1) stable-security; urgency=high * cfs_fh.c: doencrypt(), dodecrypt(): make salt unsigned long, not int, as so the fuctions are called in read/writeblock(), de/encryptname() (fixes SIGSEGV due to integer overflow, thx Carlo Contavalli, closes: #371076). stable/main/binary-hppa/cfs_1.4.1-15sarge1_hppa.deb cfs (1.4.1-15sarge1) stable-security; urgency=high * cfs_fh.c: doencrypt(), dodecrypt(): make salt unsigned long, not int, as so the fuctions are called in read/writeblock(), de/encryptname() (fixes SIGSEGV due to integer overflow, thx Carlo Contavalli, closes: #371076). stable/main/binary-arm/cfs_1.4.1-15sarge1_arm.deb cfs (1.4.1-15sarge1) stable-security; urgency=high * cfs_fh.c: doencrypt(), dodecrypt(): make salt unsigned long, not int, as so the fuctions are called in read/writeblock(), de/encryptname() (fixes SIGSEGV due to integer overflow, thx Carlo Contavalli, closes: #371076). stable/main/binary-alpha/cfs_1.4.1-15sarge1_alpha.deb cfs (1.4.1-15sarge1) stable-security; urgency=high * cfs_fh.c: doencrypt(), dodecrypt(): make salt unsigned long, not int, as so the fuctions are called in read/writeblock(), de/encryptname() (fixes SIGSEGV due to integer overflow, thx Carlo Contavalli, closes: #371076). stable/main/binary-i386/cfs_1.4.1-15sarge1_i386.deb stable/main/source/cfs_1.4.1-15sarge1.diff.gz stable/main/source/cfs_1.4.1-15sarge1.dsc cfs (1.4.1-15sarge1) stable-security; urgency=high * cfs_fh.c: doencrypt(), dodecrypt(): make salt unsigned long, not int, as so the fuctions are called in read/writeblock(), de/encryptname() (fixes SIGSEGV due to integer overflow, thx Carlo Contavalli, closes: #371076). stable/main/binary-sparc/centericq-utf8_4.20.0-1sarge4_sparc.deb stable/main/binary-sparc/centericq-fribidi_4.20.0-1sarge4_sparc.deb stable/main/binary-sparc/centericq_4.20.0-1sarge4_sparc.deb stable/main/binary-sparc/centericq-common_4.20.0-1sarge4_sparc.deb centericq (4.20.0-1sarge4) stable-security; urgency=high * Non-maintainer upload by the Security Team * Applied patch by Julien Lemoine to fix buffer overflow [kkstrtext-0.1/kkstrtext.h, debian/patches/security_CVE-2005-3863.dpatch] stable/main/binary-s390/centericq-utf8_4.20.0-1sarge4_s390.deb stable/main/binary-s390/centericq_4.20.0-1sarge4_s390.deb stable/main/binary-s390/centericq-common_4.20.0-1sarge4_s390.deb stable/main/binary-s390/centericq-fribidi_4.20.0-1sarge4_s390.deb centericq (4.20.0-1sarge4) stable-security; urgency=high * Non-maintainer upload by the Security Team * Applied patch by Julien Lemoine to fix buffer overflow [kkstrtext-0.1/kkstrtext.h, debian/patches/security_CVE-2005-3863.dpatch] stable/main/binary-mipsel/centericq-utf8_4.20.0-1sarge4_mipsel.deb stable/main/binary-mipsel/centericq_4.20.0-1sarge4_mipsel.deb stable/main/binary-mipsel/centericq-fribidi_4.20.0-1sarge4_mipsel.deb stable/main/binary-mipsel/centericq-common_4.20.0-1sarge4_mipsel.deb centericq (4.20.0-1sarge4) stable-security; urgency=high * Non-maintainer upload by the Security Team * Applied patch by Julien Lemoine to fix buffer overflow [kkstrtext-0.1/kkstrtext.h, debian/patches/security_CVE-2005-3863.dpatch] stable/main/binary-mips/centericq-common_4.20.0-1sarge4_mips.deb stable/main/binary-mips/centericq-fribidi_4.20.0-1sarge4_mips.deb stable/main/binary-mips/centericq-utf8_4.20.0-1sarge4_mips.deb stable/main/binary-mips/centericq_4.20.0-1sarge4_mips.deb centericq (4.20.0-1sarge4) stable-security; urgency=high * Non-maintainer upload by the Security Team * Applied patch by Julien Lemoine to fix buffer overflow [kkstrtext-0.1/kkstrtext.h, debian/patches/security_CVE-2005-3863.dpatch] stable/main/binary-m68k/centericq_4.20.0-1sarge4_m68k.deb stable/main/binary-m68k/centericq-fribidi_4.20.0-1sarge4_m68k.deb stable/main/binary-m68k/centericq-common_4.20.0-1sarge4_m68k.deb stable/main/binary-m68k/centericq-utf8_4.20.0-1sarge4_m68k.deb centericq (4.20.0-1sarge4) stable-security; urgency=high * Non-maintainer upload by the Security Team * Applied patch by Julien Lemoine to fix buffer overflow [kkstrtext-0.1/kkstrtext.h, debian/patches/security_CVE-2005-3863.dpatch] stable/main/binary-ia64/centericq-common_4.20.0-1sarge4_ia64.deb stable/main/binary-ia64/centericq-fribidi_4.20.0-1sarge4_ia64.deb stable/main/binary-ia64/centericq_4.20.0-1sarge4_ia64.deb stable/main/binary-ia64/centericq-utf8_4.20.0-1sarge4_ia64.deb centericq (4.20.0-1sarge4) stable-security; urgency=high * Non-maintainer upload by the Security Team * Applied patch by Julien Lemoine to fix buffer overflow [kkstrtext-0.1/kkstrtext.h, debian/patches/security_CVE-2005-3863.dpatch] stable/main/binary-i386/centericq-fribidi_4.20.0-1sarge4_i386.deb stable/main/binary-i386/centericq-utf8_4.20.0-1sarge4_i386.deb stable/main/binary-i386/centericq_4.20.0-1sarge4_i386.deb stable/main/binary-i386/centericq-common_4.20.0-1sarge4_i386.deb centericq (4.20.0-1sarge4) stable-security; urgency=high * Non-maintainer upload by the Security Team * Applied patch by Julien Lemoine to fix buffer overflow [kkstrtext-0.1/kkstrtext.h, debian/patches/security_CVE-2005-3863.dpatch] stable/main/binary-hppa/centericq-common_4.20.0-1sarge4_hppa.deb stable/main/binary-hppa/centericq-utf8_4.20.0-1sarge4_hppa.deb stable/main/binary-hppa/centericq-fribidi_4.20.0-1sarge4_hppa.deb stable/main/binary-hppa/centericq_4.20.0-1sarge4_hppa.deb centericq (4.20.0-1sarge4) stable-security; urgency=high * Non-maintainer upload by the Security Team * Applied patch by Julien Lemoine to fix buffer overflow [kkstrtext-0.1/kkstrtext.h, debian/patches/security_CVE-2005-3863.dpatch] stable/main/binary-arm/centericq-common_4.20.0-1sarge4_arm.deb stable/main/binary-arm/centericq-utf8_4.20.0-1sarge4_arm.deb stable/main/binary-arm/centericq_4.20.0-1sarge4_arm.deb stable/main/binary-arm/centericq-fribidi_4.20.0-1sarge4_arm.deb centericq (4.20.0-1sarge4) stable-security; urgency=high * Non-maintainer upload by the Security Team * Applied patch by Julien Lemoine to fix buffer overflow [kkstrtext-0.1/kkstrtext.h, debian/patches/security_CVE-2005-3863.dpatch] stable/main/binary-alpha/centericq-common_4.20.0-1sarge4_alpha.deb stable/main/binary-alpha/centericq_4.20.0-1sarge4_alpha.deb stable/main/binary-alpha/centericq-utf8_4.20.0-1sarge4_alpha.deb stable/main/binary-alpha/centericq-fribidi_4.20.0-1sarge4_alpha.deb centericq (4.20.0-1sarge4) stable-security; urgency=high * Non-maintainer upload by the Security Team * Applied patch by Julien Lemoine to fix buffer overflow [kkstrtext-0.1/kkstrtext.h, debian/patches/security_CVE-2005-3863.dpatch] stable/main/binary-powerpc/centericq_4.20.0-1sarge4_powerpc.deb stable/main/binary-powerpc/centericq-utf8_4.20.0-1sarge4_powerpc.deb stable/main/binary-powerpc/centericq-fribidi_4.20.0-1sarge4_powerpc.deb stable/main/source/centericq_4.20.0-1sarge4.diff.gz stable/main/binary-powerpc/centericq-common_4.20.0-1sarge4_powerpc.deb stable/main/source/centericq_4.20.0-1sarge4.dsc centericq (4.20.0-1sarge4) stable-security; urgency=high * Non-maintainer upload by the Security Team * Applied patch by Julien Lemoine to fix buffer overflow [kkstrtext-0.1/kkstrtext.h, debian/patches/security_CVE-2005-3863.dpatch] stable/main/binary-sparc/bsdgames_2.17-1sarge1_sparc.deb bsdgames (2.17-1sarge1) stable-security; urgency=high * Non-maintainer upload by The Security Team. * Avoid buffer overflow when reading input in the sail game. [CVE-2006-1744] stable/main/binary-s390/bsdgames_2.17-1sarge1_s390.deb bsdgames (2.17-1sarge1) stable-security; urgency=high * Non-maintainer upload by The Security Team. * Avoid buffer overflow when reading input in the sail game. [CVE-2006-1744] stable/main/binary-powerpc/bsdgames_2.17-1sarge1_powerpc.deb bsdgames (2.17-1sarge1) stable-security; urgency=high * Non-maintainer upload by The Security Team. * Avoid buffer overflow when reading input in the sail game. [CVE-2006-1744] stable/main/binary-mipsel/bsdgames_2.17-1sarge1_mipsel.deb bsdgames (2.17-1sarge1) stable-security; urgency=high * Non-maintainer upload by The Security Team. * Avoid buffer overflow when reading input in the sail game. [CVE-2006-1744] stable/main/binary-mips/bsdgames_2.17-1sarge1_mips.deb bsdgames (2.17-1sarge1) stable-security; urgency=high * Non-maintainer upload by The Security Team. * Avoid buffer overflow when reading input in the sail game. [CVE-2006-1744] stable/main/binary-m68k/bsdgames_2.17-1sarge1_m68k.deb bsdgames (2.17-1sarge1) stable-security; urgency=high * Non-maintainer upload by The Security Team. * Avoid buffer overflow when reading input in the sail game. [CVE-2006-1744] stable/main/binary-ia64/bsdgames_2.17-1sarge1_ia64.deb bsdgames (2.17-1sarge1) stable-security; urgency=high * Non-maintainer upload by The Security Team. * Avoid buffer overflow when reading input in the sail game. [CVE-2006-1744] stable/main/binary-hppa/bsdgames_2.17-1sarge1_hppa.deb bsdgames (2.17-1sarge1) stable-security; urgency=high * Non-maintainer upload by The Security Team. * Avoid buffer overflow when reading input in the sail game. [CVE-2006-1744] stable/main/binary-arm/bsdgames_2.17-1sarge1_arm.deb bsdgames (2.17-1sarge1) stable-security; urgency=high * Non-maintainer upload by The Security Team. * Avoid buffer overflow when reading input in the sail game. [CVE-2006-1744] stable/main/binary-alpha/bsdgames_2.17-1sarge1_alpha.deb bsdgames (2.17-1sarge1) stable-security; urgency=high * Non-maintainer upload by The Security Team. * Avoid buffer overflow when reading input in the sail game. [CVE-2006-1744] stable/main/source/bsdgames_2.17-1sarge1.diff.gz stable/main/binary-i386/bsdgames_2.17-1sarge1_i386.deb stable/main/source/bsdgames_2.17-1sarge1.dsc bsdgames (2.17-1sarge1) stable-security; urgency=high * Non-maintainer upload by The Security Team. * Avoid buffer overflow when reading input in the sail game. [CVE-2006-1744] stable/main/binary-sparc/blender_2.36-1sarge1_sparc.deb blender (2.36-1sarge1) stable-security; urgency=high * Non-maintainer upload by The Security Team. * patch release/scripts/bvh_import.py to use float instead of eval by adding 03_fix_arbitrary_code_execution_in_bvh_import.py.dpatch, thus preventing arbitrary code execution when importing a .bvh file; this fix differs from the changes in <http://projects.blender.org/viewcvs/viewcvs.cgi/blender/release/scripts/bvh_import.py.diff?r1=1.4&r2=1.5&cvsroot=bf-blender> in that it doesn't provide the new checks introduced therein; for reference, this is CVE-2005-3302 - closes: #330895 * patch source/blender/blenloader/intern/readfile.c to fix BlenLoader Integer Overflow by adding 04_fix_integer_overflow_in_readfile.c.dpatch, thus preventing potential code execution via a heap overflow; for reference, this is CVE-2005-4470 - closes: #344398 stable/main/binary-s390/blender_2.36-1sarge1_s390.deb blender (2.36-1sarge1) stable-security; urgency=high * Non-maintainer upload by The Security Team. * patch release/scripts/bvh_import.py to use float instead of eval by adding 03_fix_arbitrary_code_execution_in_bvh_import.py.dpatch, thus preventing arbitrary code execution when importing a .bvh file; this fix differs from the changes in <http://projects.blender.org/viewcvs/viewcvs.cgi/blender/release/scripts/bvh_import.py.diff?r1=1.4&r2=1.5&cvsroot=bf-blender> in that it doesn't provide the new checks introduced therein; for reference, this is CVE-2005-3302 - closes: #330895 * patch source/blender/blenloader/intern/readfile.c to fix BlenLoader Integer Overflow by adding 04_fix_integer_overflow_in_readfile.c.dpatch, thus preventing potential code execution via a heap overflow; for reference, this is CVE-2005-4470 - closes: #344398 stable/main/binary-powerpc/blender_2.36-1sarge1_powerpc.deb blender (2.36-1sarge1) stable-security; urgency=high * Non-maintainer upload by The Security Team. * patch release/scripts/bvh_import.py to use float instead of eval by adding 03_fix_arbitrary_code_execution_in_bvh_import.py.dpatch, thus preventing arbitrary code execution when importing a .bvh file; this fix differs from the changes in <http://projects.blender.org/viewcvs/viewcvs.cgi/blender/release/scripts/bvh_import.py.diff?r1=1.4&r2=1.5&cvsroot=bf-blender> in that it doesn't provide the new checks introduced therein; for reference, this is CVE-2005-3302 - closes: #330895 * patch source/blender/blenloader/intern/readfile.c to fix BlenLoader Integer Overflow by adding 04_fix_integer_overflow_in_readfile.c.dpatch, thus preventing potential code execution via a heap overflow; for reference, this is CVE-2005-4470 - closes: #344398 stable/main/binary-mipsel/blender_2.36-1sarge1_mipsel.deb blender (2.36-1sarge1) stable-security; urgency=high * Non-maintainer upload by The Security Team. * patch release/scripts/bvh_import.py to use float instead of eval by adding 03_fix_arbitrary_code_execution_in_bvh_import.py.dpatch, thus preventing arbitrary code execution when importing a .bvh file; this fix differs from the changes in <http://projects.blender.org/viewcvs/viewcvs.cgi/blender/release/scripts/bvh_import.py.diff?r1=1.4&r2=1.5&cvsroot=bf-blender> in that it doesn't provide the new checks introduced therein; for reference, this is CVE-2005-3302 - closes: #330895 * patch source/blender/blenloader/intern/readfile.c to fix BlenLoader Integer Overflow by adding 04_fix_integer_overflow_in_readfile.c.dpatch, thus preventing potential code execution via a heap overflow; for reference, this is CVE-2005-4470 - closes: #344398 stable/main/binary-mips/blender_2.36-1sarge1_mips.deb blender (2.36-1sarge1) stable-security; urgency=high * Non-maintainer upload by The Security Team. * patch release/scripts/bvh_import.py to use float instead of eval by adding 03_fix_arbitrary_code_execution_in_bvh_import.py.dpatch, thus preventing arbitrary code execution when importing a .bvh file; this fix differs from the changes in <http://projects.blender.org/viewcvs/viewcvs.cgi/blender/release/scripts/bvh_import.py.diff?r1=1.4&r2=1.5&cvsroot=bf-blender> in that it doesn't provide the new checks introduced therein; for reference, this is CVE-2005-3302 - closes: #330895 * patch source/blender/blenloader/intern/readfile.c to fix BlenLoader Integer Overflow by adding 04_fix_integer_overflow_in_readfile.c.dpatch, thus preventing potential code execution via a heap overflow; for reference, this is CVE-2005-4470 - closes: #344398 stable/main/binary-m68k/blender_2.36-1sarge1_m68k.deb blender (2.36-1sarge1) stable-security; urgency=high * Non-maintainer upload by The Security Team. * patch release/scripts/bvh_import.py to use float instead of eval by adding 03_fix_arbitrary_code_execution_in_bvh_import.py.dpatch, thus preventing arbitrary code execution when importing a .bvh file; this fix differs from the changes in <http://projects.blender.org/viewcvs/viewcvs.cgi/blender/release/scripts/bvh_import.py.diff?r1=1.4&r2=1.5&cvsroot=bf-blender> in that it doesn't provide the new checks introduced therein; for reference, this is CVE-2005-3302 - closes: #330895 * patch source/blender/blenloader/intern/readfile.c to fix BlenLoader Integer Overflow by adding 04_fix_integer_overflow_in_readfile.c.dpatch, thus preventing potential code execution via a heap overflow; for reference, this is CVE-2005-4470 - closes: #344398 stable/main/binary-ia64/blender_2.36-1sarge1_ia64.deb blender (2.36-1sarge1) stable-security; urgency=high * Non-maintainer upload by The Security Team. * patch release/scripts/bvh_import.py to use float instead of eval by adding 03_fix_arbitrary_code_execution_in_bvh_import.py.dpatch, thus preventing arbitrary code execution when importing a .bvh file; this fix differs from the changes in <http://projects.blender.org/viewcvs/viewcvs.cgi/blender/release/scripts/bvh_import.py.diff?r1=1.4&r2=1.5&cvsroot=bf-blender> in that it doesn't provide the new checks introduced therein; for reference, this is CVE-2005-3302 - closes: #330895 * patch source/blender/blenloader/intern/readfile.c to fix BlenLoader Integer Overflow by adding 04_fix_integer_overflow_in_readfile.c.dpatch, thus preventing potential code execution via a heap overflow; for reference, this is CVE-2005-4470 - closes: #344398 stable/main/binary-hppa/blender_2.36-1sarge1_hppa.deb blender (2.36-1sarge1) stable-security; urgency=high * Non-maintainer upload by The Security Team. * patch release/scripts/bvh_import.py to use float instead of eval by adding 03_fix_arbitrary_code_execution_in_bvh_import.py.dpatch, thus preventing arbitrary code execution when importing a .bvh file; this fix differs from the changes in <http://projects.blender.org/viewcvs/viewcvs.cgi/blender/release/scripts/bvh_import.py.diff?r1=1.4&r2=1.5&cvsroot=bf-blender> in that it doesn't provide the new checks introduced therein; for reference, this is CVE-2005-3302 - closes: #330895 * patch source/blender/blenloader/intern/readfile.c to fix BlenLoader Integer Overflow by adding 04_fix_integer_overflow_in_readfile.c.dpatch, thus preventing potential code execution via a heap overflow; for reference, this is CVE-2005-4470 - closes: #344398 stable/main/binary-arm/blender_2.36-1sarge1_arm.deb blender (2.36-1sarge1) stable-security; urgency=high * Non-maintainer upload by The Security Team. * patch release/scripts/bvh_import.py to use float instead of eval by adding 03_fix_arbitrary_code_execution_in_bvh_import.py.dpatch, thus preventing arbitrary code execution when importing a .bvh file; this fix differs from the changes in <http://projects.blender.org/viewcvs/viewcvs.cgi/blender/release/scripts/bvh_import.py.diff?r1=1.4&r2=1.5&cvsroot=bf-blender> in that it doesn't provide the new checks introduced therein; for reference, this is CVE-2005-3302 - closes: #330895 * patch source/blender/blenloader/intern/readfile.c to fix BlenLoader Integer Overflow by adding 04_fix_integer_overflow_in_readfile.c.dpatch, thus preventing potential code execution via a heap overflow; for reference, this is CVE-2005-4470 - closes: #344398 stable/main/binary-alpha/blender_2.36-1sarge1_alpha.deb blender (2.36-1sarge1) stable-security; urgency=high * Non-maintainer upload by The Security Team. * patch release/scripts/bvh_import.py to use float instead of eval by adding 03_fix_arbitrary_code_execution_in_bvh_import.py.dpatch, thus preventing arbitrary code execution when importing a .bvh file; this fix differs from the changes in <http://projects.blender.org/viewcvs/viewcvs.cgi/blender/release/scripts/bvh_import.py.diff?r1=1.4&r2=1.5&cvsroot=bf-blender> in that it doesn't provide the new checks introduced therein; for reference, this is CVE-2005-3302 - closes: #330895 * patch source/blender/blenloader/intern/readfile.c to fix BlenLoader Integer Overflow by adding 04_fix_integer_overflow_in_readfile.c.dpatch, thus preventing potential code execution via a heap overflow; for reference, this is CVE-2005-4470 - closes: #344398 stable/main/binary-i386/blender_2.36-1sarge1_i386.deb stable/main/source/blender_2.36-1sarge1.dsc stable/main/source/blender_2.36-1sarge1.diff.gz blender (2.36-1sarge1) stable-security; urgency=high * Non-maintainer upload by The Security Team. * patch release/scripts/bvh_import.py to use float instead of eval by adding 03_fix_arbitrary_code_execution_in_bvh_import.py.dpatch, thus preventing arbitrary code execution when importing a .bvh file; this fix differs from the changes in <http://projects.blender.org/viewcvs/viewcvs.cgi/blender/release/scripts/bvh_import.py.diff?r1=1.4&r2=1.5&cvsroot=bf-blender> in that it doesn't provide the new checks introduced therein; for reference, this is CVE-2005-3302 - closes: #330895 * patch source/blender/blenloader/intern/readfile.c to fix BlenLoader Integer Overflow by adding 04_fix_integer_overflow_in_readfile.c.dpatch, thus preventing potential code execution via a heap overflow; for reference, this is CVE-2005-4470 - closes: #344398 stable/main/binary-sparc/base-installer_1.13.4sarge1_sparc.udeb base-installer (1.13.4sarge1) stable; urgency=low * Changes needed for ABI change in kernel image packages for Sarge 3.1r3. - Update ABI in kernel selection for alpha. - Use 2.6 kernel meta packages for powerpc because of added ABI in kernel image packages. * Updated translations: - Arabic (ar.po) by Ossama M. Khayat - Bosnian (bs.po) by Safir Secerovic - Catalan (ca.po) by Jordi Mallach - Czech (cs.po) by Miroslav Kure - Danish (da.po) by Claus Hindsgaul - German (de.po) by Jens Seidel - Greek, Modern (1453-) (el.po) by quad-nrg.net - Spanish (Castilian) (es.po) by Javier Fernández-Sanguino Peña - Basque (eu.po) by Piarres Beobide - Persian (fa.po) by Arash Bijanzadehn - Finnish (fi.po) by Tapio Lehtonen - French (fr.po) by Christian Perrier - Gallegan (gl.po) by Jacobo Tarrio - Hebrew (he.po) by Lior Kaplan - Croatian (hr.po) by Krunoslav Gernhard - Hungarian (hu.po) by SZERVÃC Attila - Indonesian (id.po) by Parlin Imanuel Toh - Italian (it.po) by Giuseppe Sacco - Japanese (ja.po) by Kenshi Muto - Korean (ko.po) by Sunjae park - Lithuanian (lt.po) by KÄ™stutis BiliÅ«nas - Latvian (lv.po) by Aigars Mahinovs - Bøkmal, Norwegian (nb.po) by Bjørn Steensrud - Dutch (nl.po) by Bart Cornelis - Norwegian Nynorsk (nn.po) by HÃ¥vard Korsvoll - Polish (pl.po) by Bartosz Fenski - Portuguese (Brazil) (pt_BR.po) by André LuÃs Lopes - Portuguese (pt.po) by Miguel Figueiredo - Romanian (ro.po) by Eddy PetriÅŸor - Russian (ru.po) by Yuri Kozlov - Slovak (sk.po) by Peter Mann - Slovenian (sl.po) by Jure ÄŒuhalev - Swedish (sv.po) by Daniel Nylander - Ukrainian (uk.po) by Eugeniy Meshcheryakov - Simplified Chinese (zh_CN.po) by Carlos Z.F. Liu - Traditional Chinese (zh_TW.po) by Tetralet stable/main/binary-s390/base-installer_1.13.4sarge1_s390.udeb base-installer (1.13.4sarge1) stable; urgency=low * Changes needed for ABI change in kernel image packages for Sarge 3.1r3. - Update ABI in kernel selection for alpha. - Use 2.6 kernel meta packages for powerpc because of added ABI in kernel image packages. * Updated translations: - Arabic (ar.po) by Ossama M. Khayat - Bosnian (bs.po) by Safir Secerovic - Catalan (ca.po) by Jordi Mallach - Czech (cs.po) by Miroslav Kure - Danish (da.po) by Claus Hindsgaul - German (de.po) by Jens Seidel - Greek, Modern (1453-) (el.po) by quad-nrg.net - Spanish (Castilian) (es.po) by Javier Fernández-Sanguino Peña - Basque (eu.po) by Piarres Beobide - Persian (fa.po) by Arash Bijanzadehn - Finnish (fi.po) by Tapio Lehtonen - French (fr.po) by Christian Perrier - Gallegan (gl.po) by Jacobo Tarrio - Hebrew (he.po) by Lior Kaplan - Croatian (hr.po) by Krunoslav Gernhard - Hungarian (hu.po) by SZERVÃC Attila - Indonesian (id.po) by Parlin Imanuel Toh - Italian (it.po) by Giuseppe Sacco - Japanese (ja.po) by Kenshi Muto - Korean (ko.po) by Sunjae park - Lithuanian (lt.po) by KÄ™stutis BiliÅ«nas - Latvian (lv.po) by Aigars Mahinovs - Bøkmal, Norwegian (nb.po) by Bjørn Steensrud - Dutch (nl.po) by Bart Cornelis - Norwegian Nynorsk (nn.po) by HÃ¥vard Korsvoll - Polish (pl.po) by Bartosz Fenski - Portuguese (Brazil) (pt_BR.po) by André LuÃs Lopes - Portuguese (pt.po) by Miguel Figueiredo - Romanian (ro.po) by Eddy PetriÅŸor - Russian (ru.po) by Yuri Kozlov - Slovak (sk.po) by Peter Mann - Slovenian (sl.po) by Jure ÄŒuhalev - Swedish (sv.po) by Daniel Nylander - Ukrainian (uk.po) by Eugeniy Meshcheryakov - Simplified Chinese (zh_CN.po) by Carlos Z.F. Liu - Traditional Chinese (zh_TW.po) by Tetralet stable/main/binary-powerpc/base-installer_1.13.4sarge1_powerpc.udeb base-installer (1.13.4sarge1) stable; urgency=low * Changes needed for ABI change in kernel image packages for Sarge 3.1r3. - Update ABI in kernel selection for alpha. - Use 2.6 kernel meta packages for powerpc because of added ABI in kernel image packages. * Updated translations: - Arabic (ar.po) by Ossama M. Khayat - Bosnian (bs.po) by Safir Secerovic - Catalan (ca.po) by Jordi Mallach - Czech (cs.po) by Miroslav Kure - Danish (da.po) by Claus Hindsgaul - German (de.po) by Jens Seidel - Greek, Modern (1453-) (el.po) by quad-nrg.net - Spanish (Castilian) (es.po) by Javier FernC!ndez-Sanguino PeC1a - Basque (eu.po) by Piarres Beobide - Persian (fa.po) by Arash Bijanzadehn - Finnish (fi.po) by Tapio Lehtonen - French (fr.po) by Christian Perrier - Gallegan (gl.po) by Jacobo Tarrio - Hebrew (he.po) by Lior Kaplan - Croatian (hr.po) by Krunoslav Gernhard - Hungarian (hu.po) by SZERVC!C Attila - Indonesian (id.po) by Parlin Imanuel Toh - Italian (it.po) by Giuseppe Sacco - Japanese (ja.po) by Kenshi Muto - Korean (ko.po) by Sunjae park - Lithuanian (lt.po) by KD9stutis BiliE+nas - Latvian (lv.po) by Aigars Mahinovs - BC8kmal, Norwegian (nb.po) by BjC8rn Steensrud - Dutch (nl.po) by Bart Cornelis - Norwegian Nynorsk (nn.po) by HC%vard Korsvoll - Polish (pl.po) by Bartosz Fenski - Portuguese (Brazil) (pt_BR.po) by AndrC) LuC-s Lopes - Portuguese (pt.po) by Miguel Figueiredo - Romanian (ro.po) by Eddy PetriE?or - Russian (ru.po) by Yuri Kozlov - Slovak (sk.po) by Peter Mann - Slovenian (sl.po) by Jure D,uhalev - Swedish (sv.po) by Daniel Nylander - Ukrainian (uk.po) by Eugeniy Meshcheryakov - Simplified Chinese (zh_CN.po) by Carlos Z.F. Liu - Traditional Chinese (zh_TW.po) by Tetralet stable/main/binary-mipsel/base-installer_1.13.4sarge1_mipsel.udeb base-installer (1.13.4sarge1) stable; urgency=low * Changes needed for ABI change in kernel image packages for Sarge 3.1r3. - Update ABI in kernel selection for alpha. - Use 2.6 kernel meta packages for powerpc because of added ABI in kernel image packages. * Updated translations: - Arabic (ar.po) by Ossama M. Khayat - Bosnian (bs.po) by Safir Secerovic - Catalan (ca.po) by Jordi Mallach - Czech (cs.po) by Miroslav Kure - Danish (da.po) by Claus Hindsgaul - German (de.po) by Jens Seidel - Greek, Modern (1453-) (el.po) by quad-nrg.net - Spanish (Castilian) (es.po) by Javier FernC!ndez-Sanguino PeC1a - Basque (eu.po) by Piarres Beobide - Persian (fa.po) by Arash Bijanzadehn - Finnish (fi.po) by Tapio Lehtonen - French (fr.po) by Christian Perrier - Gallegan (gl.po) by Jacobo Tarrio - Hebrew (he.po) by Lior Kaplan - Croatian (hr.po) by Krunoslav Gernhard - Hungarian (hu.po) by SZERVC!C Attila - Indonesian (id.po) by Parlin Imanuel Toh - Italian (it.po) by Giuseppe Sacco - Japanese (ja.po) by Kenshi Muto - Korean (ko.po) by Sunjae park - Lithuanian (lt.po) by KD9stutis BiliE+nas - Latvian (lv.po) by Aigars Mahinovs - BC8kmal, Norwegian (nb.po) by BjC8rn Steensrud - Dutch (nl.po) by Bart Cornelis - Norwegian Nynorsk (nn.po) by HC%vard Korsvoll - Polish (pl.po) by Bartosz Fenski - Portuguese (Brazil) (pt_BR.po) by AndrC) LuC-s Lopes - Portuguese (pt.po) by Miguel Figueiredo - Romanian (ro.po) by Eddy PetriE?or - Russian (ru.po) by Yuri Kozlov - Slovak (sk.po) by Peter Mann - Slovenian (sl.po) by Jure D,uhalev - Swedish (sv.po) by Daniel Nylander - Ukrainian (uk.po) by Eugeniy Meshcheryakov - Simplified Chinese (zh_CN.po) by Carlos Z.F. Liu - Traditional Chinese (zh_TW.po) by Tetralet stable/main/binary-mips/base-installer_1.13.4sarge1_mips.udeb base-installer (1.13.4sarge1) stable; urgency=low * Changes needed for ABI change in kernel image packages for Sarge 3.1r3. - Update ABI in kernel selection for alpha. - Use 2.6 kernel meta packages for powerpc because of added ABI in kernel image packages. * Updated translations: - Arabic (ar.po) by Ossama M. Khayat - Bosnian (bs.po) by Safir Secerovic - Catalan (ca.po) by Jordi Mallach - Czech (cs.po) by Miroslav Kure - Danish (da.po) by Claus Hindsgaul - German (de.po) by Jens Seidel - Greek, Modern (1453-) (el.po) by quad-nrg.net - Spanish (Castilian) (es.po) by Javier FernC!ndez-Sanguino PeC1a - Basque (eu.po) by Piarres Beobide - Persian (fa.po) by Arash Bijanzadehn - Finnish (fi.po) by Tapio Lehtonen - French (fr.po) by Christian Perrier - Gallegan (gl.po) by Jacobo Tarrio - Hebrew (he.po) by Lior Kaplan - Croatian (hr.po) by Krunoslav Gernhard - Hungarian (hu.po) by SZERVC!C Attila - Indonesian (id.po) by Parlin Imanuel Toh - Italian (it.po) by Giuseppe Sacco - Japanese (ja.po) by Kenshi Muto - Korean (ko.po) by Sunjae park - Lithuanian (lt.po) by KD9stutis BiliE+nas - Latvian (lv.po) by Aigars Mahinovs - BC8kmal, Norwegian (nb.po) by BjC8rn Steensrud - Dutch (nl.po) by Bart Cornelis - Norwegian Nynorsk (nn.po) by HC%vard Korsvoll - Polish (pl.po) by Bartosz Fenski - Portuguese (Brazil) (pt_BR.po) by AndrC) LuC-s Lopes - Portuguese (pt.po) by Miguel Figueiredo - Romanian (ro.po) by Eddy PetriE?or - Russian (ru.po) by Yuri Kozlov - Slovak (sk.po) by Peter Mann - Slovenian (sl.po) by Jure D,uhalev - Swedish (sv.po) by Daniel Nylander - Ukrainian (uk.po) by Eugeniy Meshcheryakov - Simplified Chinese (zh_CN.po) by Carlos Z.F. Liu - Traditional Chinese (zh_TW.po) by Tetralet stable/main/binary-m68k/base-installer_1.13.4sarge1_m68k.udeb base-installer (1.13.4sarge1) stable; urgency=low * Changes needed for ABI change in kernel image packages for Sarge 3.1r3. - Update ABI in kernel selection for alpha. - Use 2.6 kernel meta packages for powerpc because of added ABI in kernel image packages. * Updated translations: - Arabic (ar.po) by Ossama M. Khayat - Bosnian (bs.po) by Safir Secerovic - Catalan (ca.po) by Jordi Mallach - Czech (cs.po) by Miroslav Kure - Danish (da.po) by Claus Hindsgaul - German (de.po) by Jens Seidel - Greek, Modern (1453-) (el.po) by quad-nrg.net - Spanish (Castilian) (es.po) by Javier Fernández-Sanguino Peña - Basque (eu.po) by Piarres Beobide - Persian (fa.po) by Arash Bijanzadehn - Finnish (fi.po) by Tapio Lehtonen - French (fr.po) by Christian Perrier - Gallegan (gl.po) by Jacobo Tarrio - Hebrew (he.po) by Lior Kaplan - Croatian (hr.po) by Krunoslav Gernhard - Hungarian (hu.po) by SZERVÃC Attila - Indonesian (id.po) by Parlin Imanuel Toh - Italian (it.po) by Giuseppe Sacco - Japanese (ja.po) by Kenshi Muto - Korean (ko.po) by Sunjae park - Lithuanian (lt.po) by KÄ™stutis BiliÅ«nas - Latvian (lv.po) by Aigars Mahinovs - Bøkmal, Norwegian (nb.po) by Bjørn Steensrud - Dutch (nl.po) by Bart Cornelis - Norwegian Nynorsk (nn.po) by HÃ¥vard Korsvoll - Polish (pl.po) by Bartosz Fenski - Portuguese (Brazil) (pt_BR.po) by André LuÃs Lopes - Portuguese (pt.po) by Miguel Figueiredo - Romanian (ro.po) by Eddy PetriÅŸor - Russian (ru.po) by Yuri Kozlov - Slovak (sk.po) by Peter Mann - Slovenian (sl.po) by Jure ÄŒuhalev - Swedish (sv.po) by Daniel Nylander - Ukrainian (uk.po) by Eugeniy Meshcheryakov - Simplified Chinese (zh_CN.po) by Carlos Z.F. Liu - Traditional Chinese (zh_TW.po) by Tetralet stable/main/binary-ia64/base-installer_1.13.4sarge1_ia64.udeb base-installer (1.13.4sarge1) stable; urgency=low * Changes needed for ABI change in kernel image packages for Sarge 3.1r3. - Update ABI in kernel selection for alpha. - Use 2.6 kernel meta packages for powerpc because of added ABI in kernel image packages. * Updated translations: - Arabic (ar.po) by Ossama M. Khayat - Bosnian (bs.po) by Safir Secerovic - Catalan (ca.po) by Jordi Mallach - Czech (cs.po) by Miroslav Kure - Danish (da.po) by Claus Hindsgaul - German (de.po) by Jens Seidel - Greek, Modern (1453-) (el.po) by quad-nrg.net - Spanish (Castilian) (es.po) by Javier FernC!ndez-Sanguino PeC1a - Basque (eu.po) by Piarres Beobide - Persian (fa.po) by Arash Bijanzadehn - Finnish (fi.po) by Tapio Lehtonen - French (fr.po) by Christian Perrier - Gallegan (gl.po) by Jacobo Tarrio - Hebrew (he.po) by Lior Kaplan - Croatian (hr.po) by Krunoslav Gernhard - Hungarian (hu.po) by SZERVC!C Attila - Indonesian (id.po) by Parlin Imanuel Toh - Italian (it.po) by Giuseppe Sacco - Japanese (ja.po) by Kenshi Muto - Korean (ko.po) by Sunjae park - Lithuanian (lt.po) by KD9stutis BiliE+nas - Latvian (lv.po) by Aigars Mahinovs - BC8kmal, Norwegian (nb.po) by BjC8rn Steensrud - Dutch (nl.po) by Bart Cornelis - Norwegian Nynorsk (nn.po) by HC%vard Korsvoll - Polish (pl.po) by Bartosz Fenski - Portuguese (Brazil) (pt_BR.po) by AndrC) LuC-s Lopes - Portuguese (pt.po) by Miguel Figueiredo - Romanian (ro.po) by Eddy PetriE?or - Russian (ru.po) by Yuri Kozlov - Slovak (sk.po) by Peter Mann - Slovenian (sl.po) by Jure D,uhalev - Swedish (sv.po) by Daniel Nylander - Ukrainian (uk.po) by Eugeniy Meshcheryakov - Simplified Chinese (zh_CN.po) by Carlos Z.F. Liu - Traditional Chinese (zh_TW.po) by Tetralet stable/main/binary-hppa/base-installer_1.13.4sarge1_hppa.udeb base-installer (1.13.4sarge1) stable; urgency=low * Changes needed for ABI change in kernel image packages for Sarge 3.1r3. - Update ABI in kernel selection for alpha. - Use 2.6 kernel meta packages for powerpc because of added ABI in kernel image packages. * Updated translations: - Arabic (ar.po) by Ossama M. Khayat - Bosnian (bs.po) by Safir Secerovic - Catalan (ca.po) by Jordi Mallach - Czech (cs.po) by Miroslav Kure - Danish (da.po) by Claus Hindsgaul - German (de.po) by Jens Seidel - Greek, Modern (1453-) (el.po) by quad-nrg.net - Spanish (Castilian) (es.po) by Javier FernC!ndez-Sanguino PeC1a - Basque (eu.po) by Piarres Beobide - Persian (fa.po) by Arash Bijanzadehn - Finnish (fi.po) by Tapio Lehtonen - French (fr.po) by Christian Perrier - Gallegan (gl.po) by Jacobo Tarrio - Hebrew (he.po) by Lior Kaplan - Croatian (hr.po) by Krunoslav Gernhard - Hungarian (hu.po) by SZERVC!C Attila - Indonesian (id.po) by Parlin Imanuel Toh - Italian (it.po) by Giuseppe Sacco - Japanese (ja.po) by Kenshi Muto - Korean (ko.po) by Sunjae park - Lithuanian (lt.po) by KD9stutis BiliE+nas - Latvian (lv.po) by Aigars Mahinovs - BC8kmal, Norwegian (nb.po) by BjC8rn Steensrud - Dutch (nl.po) by Bart Cornelis - Norwegian Nynorsk (nn.po) by HC%vard Korsvoll - Polish (pl.po) by Bartosz Fenski - Portuguese (Brazil) (pt_BR.po) by AndrC) LuC-s Lopes - Portuguese (pt.po) by Miguel Figueiredo - Romanian (ro.po) by Eddy PetriE?or - Russian (ru.po) by Yuri Kozlov - Slovak (sk.po) by Peter Mann - Slovenian (sl.po) by Jure D,uhalev - Swedish (sv.po) by Daniel Nylander - Ukrainian (uk.po) by Eugeniy Meshcheryakov - Simplified Chinese (zh_CN.po) by Carlos Z.F. Liu - Traditional Chinese (zh_TW.po) by Tetralet stable/main/binary-arm/base-installer_1.13.4sarge1_arm.udeb base-installer (1.13.4sarge1) stable; urgency=low * Changes needed for ABI change in kernel image packages for Sarge 3.1r3. - Update ABI in kernel selection for alpha. - Use 2.6 kernel meta packages for powerpc because of added ABI in kernel image packages. * Updated translations: - Arabic (ar.po) by Ossama M. Khayat - Bosnian (bs.po) by Safir Secerovic - Catalan (ca.po) by Jordi Mallach - Czech (cs.po) by Miroslav Kure - Danish (da.po) by Claus Hindsgaul - German (de.po) by Jens Seidel - Greek, Modern (1453-) (el.po) by quad-nrg.net - Spanish (Castilian) (es.po) by Javier Fernández-Sanguino Peña - Basque (eu.po) by Piarres Beobide - Persian (fa.po) by Arash Bijanzadehn - Finnish (fi.po) by Tapio Lehtonen - French (fr.po) by Christian Perrier - Gallegan (gl.po) by Jacobo Tarrio - Hebrew (he.po) by Lior Kaplan - Croatian (hr.po) by Krunoslav Gernhard - Hungarian (hu.po) by SZERVÃC Attila - Indonesian (id.po) by Parlin Imanuel Toh - Italian (it.po) by Giuseppe Sacco - Japanese (ja.po) by Kenshi Muto - Korean (ko.po) by Sunjae park - Lithuanian (lt.po) by KÄ™stutis BiliÅ«nas - Latvian (lv.po) by Aigars Mahinovs - Bøkmal, Norwegian (nb.po) by Bjørn Steensrud - Dutch (nl.po) by Bart Cornelis - Norwegian Nynorsk (nn.po) by HÃ¥vard Korsvoll - Polish (pl.po) by Bartosz Fenski - Portuguese (Brazil) (pt_BR.po) by André LuÃs Lopes - Portuguese (pt.po) by Miguel Figueiredo - Romanian (ro.po) by Eddy PetriÅŸor - Russian (ru.po) by Yuri Kozlov - Slovak (sk.po) by Peter Mann - Slovenian (sl.po) by Jure ÄŒuhalev - Swedish (sv.po) by Daniel Nylander - Ukrainian (uk.po) by Eugeniy Meshcheryakov - Simplified Chinese (zh_CN.po) by Carlos Z.F. Liu - Traditional Chinese (zh_TW.po) by Tetralet stable/main/binary-alpha/base-installer_1.13.4sarge1_alpha.udeb base-installer (1.13.4sarge1) stable; urgency=low * Changes needed for ABI change in kernel image packages for Sarge 3.1r3. - Update ABI in kernel selection for alpha. - Use 2.6 kernel meta packages for powerpc because of added ABI in kernel image packages. * Updated translations: - Arabic (ar.po) by Ossama M. Khayat - Bosnian (bs.po) by Safir Secerovic - Catalan (ca.po) by Jordi Mallach - Czech (cs.po) by Miroslav Kure - Danish (da.po) by Claus Hindsgaul - German (de.po) by Jens Seidel - Greek, Modern (1453-) (el.po) by quad-nrg.net - Spanish (Castilian) (es.po) by Javier FernC!ndez-Sanguino PeC1a - Basque (eu.po) by Piarres Beobide - Persian (fa.po) by Arash Bijanzadehn - Finnish (fi.po) by Tapio Lehtonen - French (fr.po) by Christian Perrier - Gallegan (gl.po) by Jacobo Tarrio - Hebrew (he.po) by Lior Kaplan - Croatian (hr.po) by Krunoslav Gernhard - Hungarian (hu.po) by SZERVC!C Attila - Indonesian (id.po) by Parlin Imanuel Toh - Italian (it.po) by Giuseppe Sacco - Japanese (ja.po) by Kenshi Muto - Korean (ko.po) by Sunjae park - Lithuanian (lt.po) by KD9stutis BiliE+nas - Latvian (lv.po) by Aigars Mahinovs - BC8kmal, Norwegian (nb.po) by BjC8rn Steensrud - Dutch (nl.po) by Bart Cornelis - Norwegian Nynorsk (nn.po) by HC%vard Korsvoll - Polish (pl.po) by Bartosz Fenski - Portuguese (Brazil) (pt_BR.po) by AndrC) LuC-s Lopes - Portuguese (pt.po) by Miguel Figueiredo - Romanian (ro.po) by Eddy PetriE?or - Russian (ru.po) by Yuri Kozlov - Slovak (sk.po) by Peter Mann - Slovenian (sl.po) by Jure D,uhalev - Swedish (sv.po) by Daniel Nylander - Ukrainian (uk.po) by Eugeniy Meshcheryakov - Simplified Chinese (zh_CN.po) by Carlos Z.F. Liu - Traditional Chinese (zh_TW.po) by Tetralet stable/main/binary-i386/base-installer_1.13.4sarge1_i386.udeb stable/main/source/base-installer_1.13.4sarge1.tar.gz stable/main/source/base-installer_1.13.4sarge1.dsc base-installer (1.13.4sarge1) stable; urgency=low * Changes needed for ABI change in kernel image packages for Sarge 3.1r3. - Update ABI in kernel selection for alpha. - Use 2.6 kernel meta packages for powerpc because of added ABI in kernel image packages. * Updated translations: - Arabic (ar.po) by Ossama M. Khayat - Bosnian (bs.po) by Safir Secerovic - Catalan (ca.po) by Jordi Mallach - Czech (cs.po) by Miroslav Kure - Danish (da.po) by Claus Hindsgaul - German (de.po) by Jens Seidel - Greek, Modern (1453-) (el.po) by quad-nrg.net - Spanish (Castilian) (es.po) by Javier Fernández-Sanguino Peña - Basque (eu.po) by Piarres Beobide - Persian (fa.po) by Arash Bijanzadehn - Finnish (fi.po) by Tapio Lehtonen - French (fr.po) by Christian Perrier - Gallegan (gl.po) by Jacobo Tarrio - Hebrew (he.po) by Lior Kaplan - Croatian (hr.po) by Krunoslav Gernhard - Hungarian (hu.po) by SZERVÃC Attila - Indonesian (id.po) by Parlin Imanuel Toh - Italian (it.po) by Giuseppe Sacco - Japanese (ja.po) by Kenshi Muto - Korean (ko.po) by Sunjae park - Lithuanian (lt.po) by KÄ™stutis BiliÅ«nas - Latvian (lv.po) by Aigars Mahinovs - Bøkmal, Norwegian (nb.po) by Bjørn Steensrud - Dutch (nl.po) by Bart Cornelis - Norwegian Nynorsk (nn.po) by HÃ¥vard Korsvoll - Polish (pl.po) by Bartosz Fenski - Portuguese (Brazil) (pt_BR.po) by André LuÃs Lopes - Portuguese (pt.po) by Miguel Figueiredo - Romanian (ro.po) by Eddy PetriÅŸor - Russian (ru.po) by Yuri Kozlov - Slovak (sk.po) by Peter Mann - Slovenian (sl.po) by Jure ÄŒuhalev - Swedish (sv.po) by Daniel Nylander - Ukrainian (uk.po) by Eugeniy Meshcheryakov - Simplified Chinese (zh_CN.po) by Carlos Z.F. Liu - Traditional Chinese (zh_TW.po) by Tetralet stable/main/binary-all/base-config_2.53.10.2_all.deb stable/main/source/base-config_2.53.10.2.dsc stable/main/source/base-config_2.53.10.2.tar.gz base-config (2.53.10.2) stable; urgency=low * Rebuilt in a sarge chroot since it generates incorrect debconf templates if built in sid. Closes: #372734 stable/main/source/awstats_6.4-1sarge3.dsc stable/main/source/awstats_6.4-1sarge3.diff.gz stable/main/binary-all/awstats_6.4-1sarge3_all.deb awstats (6.4-1sarge3) stable-security; urgency=high * Non-maintainer upload by the Security Team * Backported patch by Charles Fry to fix arbitrary command execution via arbitrary config file [wwwroot/cgi-bin/awstats.pl, debian/patches/05_CVE-2006-XXXX.patch, Bug#365910] * Require AWSTATS_ENABLE_CONFIG_DIR environmental variable in order to enable configdir. stable/main/binary-sparc/asterisk-gtk-console_1.0.7.dfsg.1-2sarge3_sparc.deb stable/main/binary-sparc/asterisk-h323_1.0.7.dfsg.1-2sarge3_sparc.deb stable/main/binary-sparc/asterisk_1.0.7.dfsg.1-2sarge3_sparc.deb asterisk (1:1.0.7.dfsg.1-2sarge3) stable-security; urgency=high * Non-maintainer upload by the Security Team * Applied upstream patch to fix denial of service [channels/chan_iax2.c, debian/patches/99_CVE-2006-2898.dpatch] stable/main/binary-s390/asterisk-gtk-console_1.0.7.dfsg.1-2sarge3_s390.deb stable/main/binary-s390/asterisk-h323_1.0.7.dfsg.1-2sarge3_s390.deb stable/main/binary-s390/asterisk_1.0.7.dfsg.1-2sarge3_s390.deb asterisk (1:1.0.7.dfsg.1-2sarge3) stable-security; urgency=high * Non-maintainer upload by the Security Team * Applied upstream patch to fix denial of service [channels/chan_iax2.c, debian/patches/99_CVE-2006-2898.dpatch] stable/main/binary-mipsel/asterisk-h323_1.0.7.dfsg.1-2sarge3_mipsel.deb stable/main/binary-mipsel/asterisk-gtk-console_1.0.7.dfsg.1-2sarge3_mipsel.deb stable/main/binary-mipsel/asterisk_1.0.7.dfsg.1-2sarge3_mipsel.deb asterisk (1:1.0.7.dfsg.1-2sarge3) stable-security; urgency=high * Non-maintainer upload by the Security Team * Applied upstream patch to fix denial of service [channels/chan_iax2.c, debian/patches/99_CVE-2006-2898.dpatch] stable/main/binary-mips/asterisk_1.0.7.dfsg.1-2sarge3_mips.deb stable/main/binary-mips/asterisk-gtk-console_1.0.7.dfsg.1-2sarge3_mips.deb stable/main/binary-mips/asterisk-h323_1.0.7.dfsg.1-2sarge3_mips.deb asterisk (1:1.0.7.dfsg.1-2sarge3) stable-security; urgency=high * Non-maintainer upload by the Security Team * Applied upstream patch to fix denial of service [channels/chan_iax2.c, debian/patches/99_CVE-2006-2898.dpatch] stable/main/binary-m68k/asterisk_1.0.7.dfsg.1-2sarge3_m68k.deb stable/main/binary-m68k/asterisk-h323_1.0.7.dfsg.1-2sarge3_m68k.deb stable/main/binary-m68k/asterisk-gtk-console_1.0.7.dfsg.1-2sarge3_m68k.deb asterisk (1:1.0.7.dfsg.1-2sarge3) stable-security; urgency=high * Non-maintainer upload by the Security Team * Applied upstream patch to fix denial of service [channels/chan_iax2.c, debian/patches/99_CVE-2006-2898.dpatch] stable/main/binary-ia64/asterisk-h323_1.0.7.dfsg.1-2sarge3_ia64.deb stable/main/binary-ia64/asterisk-gtk-console_1.0.7.dfsg.1-2sarge3_ia64.deb stable/main/binary-ia64/asterisk_1.0.7.dfsg.1-2sarge3_ia64.deb asterisk (1:1.0.7.dfsg.1-2sarge3) stable-security; urgency=high * Non-maintainer upload by the Security Team * Applied upstream patch to fix denial of service [channels/chan_iax2.c, debian/patches/99_CVE-2006-2898.dpatch] stable/main/binary-i386/asterisk-h323_1.0.7.dfsg.1-2sarge3_i386.deb stable/main/binary-i386/asterisk-gtk-console_1.0.7.dfsg.1-2sarge3_i386.deb stable/main/binary-i386/asterisk_1.0.7.dfsg.1-2sarge3_i386.deb asterisk (1:1.0.7.dfsg.1-2sarge3) stable-security; urgency=high * Non-maintainer upload by the Security Team * Applied upstream patch to fix denial of service [channels/chan_iax2.c, debian/patches/99_CVE-2006-2898.dpatch] stable/main/binary-hppa/asterisk-gtk-console_1.0.7.dfsg.1-2sarge3_hppa.deb stable/main/binary-hppa/asterisk-h323_1.0.7.dfsg.1-2sarge3_hppa.deb stable/main/binary-hppa/asterisk_1.0.7.dfsg.1-2sarge3_hppa.deb asterisk (1:1.0.7.dfsg.1-2sarge3) stable-security; urgency=high * Non-maintainer upload by the Security Team * Applied upstream patch to fix denial of service [channels/chan_iax2.c, debian/patches/99_CVE-2006-2898.dpatch] stable/main/binary-arm/asterisk-gtk-console_1.0.7.dfsg.1-2sarge3_arm.deb stable/main/binary-arm/asterisk-h323_1.0.7.dfsg.1-2sarge3_arm.deb stable/main/binary-arm/asterisk_1.0.7.dfsg.1-2sarge3_arm.deb asterisk (1:1.0.7.dfsg.1-2sarge3) stable-security; urgency=high * Non-maintainer upload by the Security Team * Applied upstream patch to fix denial of service [channels/chan_iax2.c, debian/patches/99_CVE-2006-2898.dpatch] stable/main/binary-alpha/asterisk-h323_1.0.7.dfsg.1-2sarge3_alpha.deb stable/main/binary-alpha/asterisk-gtk-console_1.0.7.dfsg.1-2sarge3_alpha.deb stable/main/binary-alpha/asterisk_1.0.7.dfsg.1-2sarge3_alpha.deb asterisk (1:1.0.7.dfsg.1-2sarge3) stable-security; urgency=high * Non-maintainer upload by the Security Team * Applied upstream patch to fix denial of service [channels/chan_iax2.c, debian/patches/99_CVE-2006-2898.dpatch] stable/main/binary-all/asterisk-config_1.0.7.dfsg.1-2sarge3_all.deb stable/main/source/asterisk_1.0.7.dfsg.1-2sarge3.diff.gz stable/main/binary-all/asterisk-dev_1.0.7.dfsg.1-2sarge3_all.deb stable/main/binary-all/asterisk-web-vmail_1.0.7.dfsg.1-2sarge3_all.deb stable/main/binary-powerpc/asterisk-h323_1.0.7.dfsg.1-2sarge3_powerpc.deb stable/main/binary-powerpc/asterisk-gtk-console_1.0.7.dfsg.1-2sarge3_powerpc.deb stable/main/binary-all/asterisk-doc_1.0.7.dfsg.1-2sarge3_all.deb stable/main/binary-all/asterisk-sounds-main_1.0.7.dfsg.1-2sarge3_all.deb stable/main/binary-powerpc/asterisk_1.0.7.dfsg.1-2sarge3_powerpc.deb stable/main/source/asterisk_1.0.7.dfsg.1-2sarge3.dsc asterisk (1:1.0.7.dfsg.1-2sarge3) stable-security; urgency=high * Non-maintainer upload by the Security Team * Applied upstream patch to fix denial of service [channels/chan_iax2.c, debian/patches/99_CVE-2006-2898.dpatch] stable/main/binary-sparc/apache2-prefork-dev_2.0.54-5sarge1_sparc.deb stable/main/binary-sparc/libapr0-dev_2.0.54-5sarge1_sparc.deb stable/main/binary-sparc/libapr0_2.0.54-5sarge1_sparc.deb stable/main/binary-sparc/apache2-utils_2.0.54-5sarge1_sparc.deb stable/main/binary-sparc/apache2-threaded-dev_2.0.54-5sarge1_sparc.deb stable/main/binary-sparc/apache2-mpm-perchild_2.0.54-5sarge1_sparc.deb stable/main/binary-sparc/apache2_2.0.54-5sarge1_sparc.deb stable/main/binary-sparc/apache2-common_2.0.54-5sarge1_sparc.deb stable/main/binary-sparc/apache2-mpm-worker_2.0.54-5sarge1_sparc.deb stable/main/binary-sparc/apache2-mpm-prefork_2.0.54-5sarge1_sparc.deb apache2 (2.0.54-5sarge1) stable-security; urgency=high * Non-maintainer upload by The Security Team. * Added 047_rewrite_off_by_one_CVE-2006-3747, fixing an off-by-one error in mod_rewrite. [CVE-2006-3747] stable/main/binary-s390/apache2_2.0.54-5sarge1_s390.deb stable/main/binary-s390/apache2-mpm-perchild_2.0.54-5sarge1_s390.deb stable/main/binary-s390/apache2-common_2.0.54-5sarge1_s390.deb stable/main/binary-s390/apache2-prefork-dev_2.0.54-5sarge1_s390.deb stable/main/binary-s390/libapr0_2.0.54-5sarge1_s390.deb stable/main/binary-s390/apache2-mpm-prefork_2.0.54-5sarge1_s390.deb stable/main/binary-s390/apache2-threaded-dev_2.0.54-5sarge1_s390.deb stable/main/binary-s390/libapr0-dev_2.0.54-5sarge1_s390.deb stable/main/binary-s390/apache2-utils_2.0.54-5sarge1_s390.deb stable/main/binary-s390/apache2-mpm-worker_2.0.54-5sarge1_s390.deb apache2 (2.0.54-5sarge1) stable-security; urgency=high * Non-maintainer upload by The Security Team. * Added 047_rewrite_off_by_one_CVE-2006-3747, fixing an off-by-one error in mod_rewrite. [CVE-2006-3747] stable/main/binary-powerpc/apache2-utils_2.0.54-5sarge1_powerpc.deb stable/main/binary-powerpc/libapr0-dev_2.0.54-5sarge1_powerpc.deb stable/main/binary-powerpc/apache2-common_2.0.54-5sarge1_powerpc.deb stable/main/binary-powerpc/apache2_2.0.54-5sarge1_powerpc.deb stable/main/binary-powerpc/libapr0_2.0.54-5sarge1_powerpc.deb stable/main/binary-powerpc/apache2-mpm-perchild_2.0.54-5sarge1_powerpc.deb stable/main/binary-powerpc/apache2-mpm-worker_2.0.54-5sarge1_powerpc.deb stable/main/binary-powerpc/apache2-prefork-dev_2.0.54-5sarge1_powerpc.deb stable/main/binary-powerpc/apache2-threaded-dev_2.0.54-5sarge1_powerpc.deb stable/main/binary-powerpc/apache2-mpm-prefork_2.0.54-5sarge1_powerpc.deb apache2 (2.0.54-5sarge1) stable-security; urgency=high * Non-maintainer upload by The Security Team. * Added 047_rewrite_off_by_one_CVE-2006-3747, fixing an off-by-one error in mod_rewrite. [CVE-2006-3747] stable/main/binary-mipsel/apache2-prefork-dev_2.0.54-5sarge1_mipsel.deb stable/main/binary-mipsel/apache2-common_2.0.54-5sarge1_mipsel.deb stable/main/binary-mipsel/apache2-threaded-dev_2.0.54-5sarge1_mipsel.deb stable/main/binary-mipsel/apache2-mpm-prefork_2.0.54-5sarge1_mipsel.deb stable/main/binary-mipsel/libapr0-dev_2.0.54-5sarge1_mipsel.deb stable/main/binary-mipsel/apache2-mpm-perchild_2.0.54-5sarge1_mipsel.deb stable/main/binary-mipsel/apache2-mpm-worker_2.0.54-5sarge1_mipsel.deb stable/main/binary-mipsel/libapr0_2.0.54-5sarge1_mipsel.deb stable/main/binary-mipsel/apache2-utils_2.0.54-5sarge1_mipsel.deb stable/main/binary-mipsel/apache2_2.0.54-5sarge1_mipsel.deb apache2 (2.0.54-5sarge1) stable-security; urgency=high * Non-maintainer upload by The Security Team. * Added 047_rewrite_off_by_one_CVE-2006-3747, fixing an off-by-one error in mod_rewrite. [CVE-2006-3747] stable/main/binary-mips/apache2-mpm-prefork_2.0.54-5sarge1_mips.deb stable/main/binary-mips/apache2-prefork-dev_2.0.54-5sarge1_mips.deb stable/main/binary-mips/libapr0-dev_2.0.54-5sarge1_mips.deb stable/main/binary-mips/apache2-mpm-perchild_2.0.54-5sarge1_mips.deb stable/main/binary-mips/apache2-threaded-dev_2.0.54-5sarge1_mips.deb stable/main/binary-mips/apache2-utils_2.0.54-5sarge1_mips.deb stable/main/binary-mips/apache2_2.0.54-5sarge1_mips.deb stable/main/binary-mips/apache2-common_2.0.54-5sarge1_mips.deb stable/main/binary-mips/libapr0_2.0.54-5sarge1_mips.deb stable/main/binary-mips/apache2-mpm-worker_2.0.54-5sarge1_mips.deb apache2 (2.0.54-5sarge1) stable-security; urgency=high * Non-maintainer upload by The Security Team. * Added 047_rewrite_off_by_one_CVE-2006-3747, fixing an off-by-one error in mod_rewrite. [CVE-2006-3747] stable/main/binary-m68k/apache2-mpm-perchild_2.0.54-5sarge1_m68k.deb stable/main/binary-m68k/apache2-utils_2.0.54-5sarge1_m68k.deb stable/main/binary-m68k/apache2-threaded-dev_2.0.54-5sarge1_m68k.deb stable/main/binary-m68k/libapr0-dev_2.0.54-5sarge1_m68k.deb stable/main/binary-m68k/apache2-prefork-dev_2.0.54-5sarge1_m68k.deb stable/main/binary-m68k/apache2-common_2.0.54-5sarge1_m68k.deb stable/main/binary-m68k/apache2-mpm-worker_2.0.54-5sarge1_m68k.deb stable/main/binary-m68k/libapr0_2.0.54-5sarge1_m68k.deb stable/main/binary-m68k/apache2-mpm-prefork_2.0.54-5sarge1_m68k.deb stable/main/binary-m68k/apache2_2.0.54-5sarge1_m68k.deb apache2 (2.0.54-5sarge1) stable-security; urgency=high * Non-maintainer upload by The Security Team. * Added 047_rewrite_off_by_one_CVE-2006-3747, fixing an off-by-one error in mod_rewrite. [CVE-2006-3747] stable/main/binary-ia64/apache2-mpm-perchild_2.0.54-5sarge1_ia64.deb stable/main/binary-ia64/apache2-mpm-prefork_2.0.54-5sarge1_ia64.deb stable/main/binary-ia64/apache2-prefork-dev_2.0.54-5sarge1_ia64.deb stable/main/binary-ia64/libapr0_2.0.54-5sarge1_ia64.deb stable/main/binary-ia64/apache2-mpm-worker_2.0.54-5sarge1_ia64.deb stable/main/binary-ia64/libapr0-dev_2.0.54-5sarge1_ia64.deb stable/main/binary-ia64/apache2-common_2.0.54-5sarge1_ia64.deb stable/main/binary-ia64/apache2-utils_2.0.54-5sarge1_ia64.deb stable/main/binary-ia64/apache2_2.0.54-5sarge1_ia64.deb stable/main/binary-ia64/apache2-threaded-dev_2.0.54-5sarge1_ia64.deb apache2 (2.0.54-5sarge1) stable-security; urgency=high * Non-maintainer upload by The Security Team. * Added 047_rewrite_off_by_one_CVE-2006-3747, fixing an off-by-one error in mod_rewrite. [CVE-2006-3747] stable/main/binary-hppa/apache2-mpm-perchild_2.0.54-5sarge1_hppa.deb stable/main/binary-hppa/apache2_2.0.54-5sarge1_hppa.deb stable/main/binary-hppa/apache2-mpm-worker_2.0.54-5sarge1_hppa.deb stable/main/binary-hppa/apache2-threaded-dev_2.0.54-5sarge1_hppa.deb stable/main/binary-hppa/libapr0_2.0.54-5sarge1_hppa.deb stable/main/binary-hppa/apache2-prefork-dev_2.0.54-5sarge1_hppa.deb stable/main/binary-hppa/apache2-mpm-prefork_2.0.54-5sarge1_hppa.deb stable/main/binary-hppa/apache2-common_2.0.54-5sarge1_hppa.deb stable/main/binary-hppa/apache2-utils_2.0.54-5sarge1_hppa.deb stable/main/binary-hppa/libapr0-dev_2.0.54-5sarge1_hppa.deb apache2 (2.0.54-5sarge1) stable-security; urgency=high * Non-maintainer upload by The Security Team. * Added 047_rewrite_off_by_one_CVE-2006-3747, fixing an off-by-one error in mod_rewrite. [CVE-2006-3747] stable/main/binary-arm/apache2-mpm-worker_2.0.54-5sarge1_arm.deb stable/main/binary-arm/apache2-utils_2.0.54-5sarge1_arm.deb stable/main/binary-arm/apache2-mpm-perchild_2.0.54-5sarge1_arm.deb stable/main/binary-arm/libapr0-dev_2.0.54-5sarge1_arm.deb stable/main/binary-arm/apache2-common_2.0.54-5sarge1_arm.deb stable/main/binary-arm/libapr0_2.0.54-5sarge1_arm.deb stable/main/binary-arm/apache2_2.0.54-5sarge1_arm.deb stable/main/binary-arm/apache2-mpm-prefork_2.0.54-5sarge1_arm.deb stable/main/binary-arm/apache2-threaded-dev_2.0.54-5sarge1_arm.deb stable/main/binary-arm/apache2-prefork-dev_2.0.54-5sarge1_arm.deb apache2 (2.0.54-5sarge1) stable-security; urgency=high * Non-maintainer upload by The Security Team. * Added 047_rewrite_off_by_one_CVE-2006-3747, fixing an off-by-one error in mod_rewrite. [CVE-2006-3747] stable/main/binary-alpha/apache2-prefork-dev_2.0.54-5sarge1_alpha.deb stable/main/binary-alpha/apache2-common_2.0.54-5sarge1_alpha.deb stable/main/binary-alpha/apache2-threaded-dev_2.0.54-5sarge1_alpha.deb stable/main/binary-alpha/libapr0_2.0.54-5sarge1_alpha.deb stable/main/binary-alpha/apache2-mpm-perchild_2.0.54-5sarge1_alpha.deb stable/main/binary-alpha/apache2-mpm-prefork_2.0.54-5sarge1_alpha.deb stable/main/binary-alpha/apache2_2.0.54-5sarge1_alpha.deb stable/main/binary-alpha/libapr0-dev_2.0.54-5sarge1_alpha.deb stable/main/binary-alpha/apache2-mpm-worker_2.0.54-5sarge1_alpha.deb stable/main/binary-alpha/apache2-utils_2.0.54-5sarge1_alpha.deb apache2 (2.0.54-5sarge1) stable-security; urgency=high * Non-maintainer upload by The Security Team. * Added 047_rewrite_off_by_one_CVE-2006-3747, fixing an off-by-one error in mod_rewrite. [CVE-2006-3747] stable/main/binary-i386/apache2-mpm-worker_2.0.54-5sarge1_i386.deb stable/main/source/apache2_2.0.54-5sarge1.dsc stable/main/binary-i386/apache2-mpm-prefork_2.0.54-5sarge1_i386.deb stable/main/binary-all/apache2-doc_2.0.54-5sarge1_all.deb stable/main/binary-i386/apache2-utils_2.0.54-5sarge1_i386.deb stable/main/binary-i386/apache2-threaded-dev_2.0.54-5sarge1_i386.deb stable/main/binary-i386/apache2_2.0.54-5sarge1_i386.deb stable/main/binary-i386/libapr0_2.0.54-5sarge1_i386.deb stable/main/binary-i386/libapr0-dev_2.0.54-5sarge1_i386.deb stable/main/binary-i386/apache2-common_2.0.54-5sarge1_i386.deb stable/main/source/apache2_2.0.54-5sarge1.diff.gz stable/main/binary-i386/apache2-prefork-dev_2.0.54-5sarge1_i386.deb stable/main/binary-i386/apache2-mpm-perchild_2.0.54-5sarge1_i386.deb stable/main/binary-all/apache2-mpm-threadpool_2.0.54-5sarge1_all.deb apache2 (2.0.54-5sarge1) stable-security; urgency=high * Non-maintainer upload by The Security Team. * Added 047_rewrite_off_by_one_CVE-2006-3747, fixing an off-by-one error in mod_rewrite. [CVE-2006-3747] stable/main/binary-sparc/apache-dbg_1.3.33-6sarge2_sparc.deb stable/main/binary-sparc/apache-perl_1.3.33-6sarge2_sparc.deb stable/main/binary-sparc/libapache-mod-perl_1.29.0.3-6sarge2_sparc.deb stable/main/binary-sparc/apache_1.3.33-6sarge2_sparc.deb stable/main/binary-sparc/apache-ssl_1.3.33-6sarge2_sparc.deb stable/main/binary-sparc/apache-common_1.3.33-6sarge2_sparc.deb apache (1.3.33-6sarge2) stable-security; urgency=high * Non-maintainer upload by The Security Team. * Added patch 907_rewrite_off_by_one_CVE-2006-3747 to fix an off-by-one bug in the mod_rewrite module. [CVE-2006-3747] stable/main/binary-s390/apache_1.3.33-6sarge2_s390.deb stable/main/binary-s390/apache-perl_1.3.33-6sarge2_s390.deb stable/main/binary-s390/apache-ssl_1.3.33-6sarge2_s390.deb stable/main/binary-s390/libapache-mod-perl_1.29.0.3-6sarge2_s390.deb stable/main/binary-s390/apache-common_1.3.33-6sarge2_s390.deb stable/main/binary-s390/apache-dbg_1.3.33-6sarge2_s390.deb apache (1.3.33-6sarge2) stable-security; urgency=high * Non-maintainer upload by The Security Team. * Added patch 907_rewrite_off_by_one_CVE-2006-3747 to fix an off-by-one bug in the mod_rewrite module. [CVE-2006-3747] stable/main/binary-powerpc/apache-common_1.3.33-6sarge2_powerpc.deb stable/main/binary-powerpc/apache-ssl_1.3.33-6sarge2_powerpc.deb stable/main/binary-powerpc/apache-dbg_1.3.33-6sarge2_powerpc.deb stable/main/binary-powerpc/libapache-mod-perl_1.29.0.3-6sarge2_powerpc.deb stable/main/binary-powerpc/apache-perl_1.3.33-6sarge2_powerpc.deb stable/main/binary-powerpc/apache_1.3.33-6sarge2_powerpc.deb apache (1.3.33-6sarge2) stable-security; urgency=high * Non-maintainer upload by The Security Team. * Added patch 907_rewrite_off_by_one_CVE-2006-3747 to fix an off-by-one bug in the mod_rewrite module. [CVE-2006-3747] stable/main/binary-mipsel/apache_1.3.33-6sarge2_mipsel.deb stable/main/binary-mipsel/apache-ssl_1.3.33-6sarge2_mipsel.deb stable/main/binary-mipsel/apache-perl_1.3.33-6sarge2_mipsel.deb stable/main/binary-mipsel/apache-dbg_1.3.33-6sarge2_mipsel.deb stable/main/binary-mipsel/apache-common_1.3.33-6sarge2_mipsel.deb stable/main/binary-mipsel/libapache-mod-perl_1.29.0.3-6sarge2_mipsel.deb apache (1.3.33-6sarge2) stable-security; urgency=high * Non-maintainer upload by The Security Team. * Added patch 907_rewrite_off_by_one_CVE-2006-3747 to fix an off-by-one bug in the mod_rewrite module. [CVE-2006-3747] stable/main/binary-mips/apache-ssl_1.3.33-6sarge2_mips.deb stable/main/binary-mips/apache-common_1.3.33-6sarge2_mips.deb stable/main/binary-mips/apache-dbg_1.3.33-6sarge2_mips.deb stable/main/binary-mips/apache-perl_1.3.33-6sarge2_mips.deb stable/main/binary-mips/libapache-mod-perl_1.29.0.3-6sarge2_mips.deb stable/main/binary-mips/apache_1.3.33-6sarge2_mips.deb apache (1.3.33-6sarge2) stable-security; urgency=high * Non-maintainer upload by The Security Team. * Added patch 907_rewrite_off_by_one_CVE-2006-3747 to fix an off-by-one bug in the mod_rewrite module. [CVE-2006-3747] stable/main/binary-m68k/apache-dbg_1.3.33-6sarge2_m68k.deb stable/main/binary-m68k/libapache-mod-perl_1.29.0.3-6sarge2_m68k.deb stable/main/binary-m68k/apache-ssl_1.3.33-6sarge2_m68k.deb stable/main/binary-m68k/apache_1.3.33-6sarge2_m68k.deb stable/main/binary-m68k/apache-common_1.3.33-6sarge2_m68k.deb stable/main/binary-m68k/apache-perl_1.3.33-6sarge2_m68k.deb apache (1.3.33-6sarge2) stable-security; urgency=high * Non-maintainer upload by The Security Team. * Added patch 907_rewrite_off_by_one_CVE-2006-3747 to fix an off-by-one bug in the mod_rewrite module. [CVE-2006-3747] stable/main/binary-ia64/apache_1.3.33-6sarge2_ia64.deb stable/main/binary-ia64/apache-common_1.3.33-6sarge2_ia64.deb stable/main/binary-ia64/libapache-mod-perl_1.29.0.3-6sarge2_ia64.deb stable/main/binary-ia64/apache-perl_1.3.33-6sarge2_ia64.deb stable/main/binary-ia64/apache-ssl_1.3.33-6sarge2_ia64.deb stable/main/binary-ia64/apache-dbg_1.3.33-6sarge2_ia64.deb apache (1.3.33-6sarge2) stable-security; urgency=high * Non-maintainer upload by The Security Team. * Added patch 907_rewrite_off_by_one_CVE-2006-3747 to fix an off-by-one bug in the mod_rewrite module. [CVE-2006-3747] stable/main/binary-hppa/apache-dbg_1.3.33-6sarge2_hppa.deb stable/main/binary-hppa/apache-ssl_1.3.33-6sarge2_hppa.deb stable/main/binary-hppa/apache_1.3.33-6sarge2_hppa.deb stable/main/binary-hppa/libapache-mod-perl_1.29.0.3-6sarge2_hppa.deb stable/main/binary-hppa/apache-perl_1.3.33-6sarge2_hppa.deb stable/main/binary-hppa/apache-common_1.3.33-6sarge2_hppa.deb apache (1.3.33-6sarge2) stable-security; urgency=high * Non-maintainer upload by The Security Team. * Added patch 907_rewrite_off_by_one_CVE-2006-3747 to fix an off-by-one bug in the mod_rewrite module. [CVE-2006-3747] stable/main/binary-arm/apache-dbg_1.3.33-6sarge2_arm.deb stable/main/binary-arm/apache-common_1.3.33-6sarge2_arm.deb stable/main/binary-arm/libapache-mod-perl_1.29.0.3-6sarge2_arm.deb stable/main/binary-arm/apache_1.3.33-6sarge2_arm.deb stable/main/binary-arm/apache-perl_1.3.33-6sarge2_arm.deb stable/main/binary-arm/apache-ssl_1.3.33-6sarge2_arm.deb apache (1.3.33-6sarge2) stable-security; urgency=high * Non-maintainer upload by The Security Team. * Added patch 907_rewrite_off_by_one_CVE-2006-3747 to fix an off-by-one bug in the mod_rewrite module. [CVE-2006-3747] stable/main/binary-alpha/apache-perl_1.3.33-6sarge2_alpha.deb stable/main/binary-alpha/apache-ssl_1.3.33-6sarge2_alpha.deb stable/main/binary-alpha/apache-common_1.3.33-6sarge2_alpha.deb stable/main/binary-alpha/libapache-mod-perl_1.29.0.3-6sarge2_alpha.deb stable/main/binary-alpha/apache_1.3.33-6sarge2_alpha.deb stable/main/binary-alpha/apache-dbg_1.3.33-6sarge2_alpha.deb apache (1.3.33-6sarge2) stable-security; urgency=high * Non-maintainer upload by The Security Team. * Added patch 907_rewrite_off_by_one_CVE-2006-3747 to fix an off-by-one bug in the mod_rewrite module. [CVE-2006-3747] stable/main/binary-i386/apache_1.3.33-6sarge2_i386.deb stable/main/binary-i386/apache-common_1.3.33-6sarge2_i386.deb stable/main/binary-i386/libapache-mod-perl_1.29.0.3-6sarge2_i386.deb stable/main/binary-all/apache-doc_1.3.33-6sarge2_all.deb stable/main/source/apache_1.3.33-6sarge2.dsc stable/main/binary-i386/apache-perl_1.3.33-6sarge2_i386.deb stable/main/binary-all/apache-utils_1.3.33-6sarge2_all.deb stable/main/binary-i386/apache-ssl_1.3.33-6sarge2_i386.deb stable/main/source/apache_1.3.33-6sarge2.diff.gz stable/main/binary-all/apache-dev_1.3.33-6sarge2_all.deb stable/main/binary-i386/apache-dbg_1.3.33-6sarge2_i386.deb apache (1.3.33-6sarge2) stable-security; urgency=high * Non-maintainer upload by The Security Team. * Added patch 907_rewrite_off_by_one_CVE-2006-3747 to fix an off-by-one bug in the mod_rewrite module. [CVE-2006-3747] stable/main/binary-i386/alsa-modules-2.4-k6_1.0.8+2sarge1_i386.deb stable/main/binary-i386/alsa-modules-2.4.27-3-586tsc_1.0.8+2sarge1_i386.deb stable/main/binary-i386/alsa-modules-2.4.27-3-k6_1.0.8+2sarge1_i386.deb stable/main/source/alsa-modules-i386_1.0.8+2sarge1.tar.gz stable/main/binary-i386/alsa-modules-2.4-686_1.0.8+2sarge1_i386.deb stable/main/binary-i386/alsa-modules-2.4.27-3-k7_1.0.8+2sarge1_i386.deb stable/main/binary-i386/alsa-modules-2.4.27-3-686-smp_1.0.8+2sarge1_i386.deb stable/main/source/alsa-modules-i386_1.0.8+2sarge1.dsc stable/main/binary-i386/alsa-modules-2.4-k7-smp_1.0.8+2sarge1_i386.deb stable/main/binary-i386/alsa-modules-2.4.27-3-386_1.0.8+2sarge1_i386.deb stable/main/binary-i386/alsa-modules-2.4.27-3-k7-smp_1.0.8+2sarge1_i386.deb stable/main/binary-i386/alsa-modules-2.4-386_1.0.8+2sarge1_i386.deb stable/main/binary-i386/alsa-modules-2.4-686-smp_1.0.8+2sarge1_i386.deb stable/main/binary-i386/alsa-modules-2.4-k7_1.0.8+2sarge1_i386.deb stable/main/binary-i386/alsa-modules-2.4.27-3-686_1.0.8+2sarge1_i386.deb stable/main/binary-i386/alsa-modules-2.4-586tsc_1.0.8+2sarge1_i386.deb alsa-modules-i386 (1.0.8+2sarge1) stable-security; urgency=high * Rebuild against kernel-build-2.4.27-3 stable/main/binary-sparc/abcmidi_20050101-1sarge1_sparc.deb stable/main/binary-sparc/abcmidi-yaps_20050101-1sarge1_sparc.deb abcmidi (20050101-1sarge1) stable-security; urgency=high * Non-maintainer upload by the Security Team * Added size limits to sscanf() calls [drawtune.c, yapstree.c, CVE-2006-1514] stable/main/binary-s390/abcmidi_20050101-1sarge1_s390.deb stable/main/binary-s390/abcmidi-yaps_20050101-1sarge1_s390.deb abcmidi (20050101-1sarge1) stable-security; urgency=high * Non-maintainer upload by the Security Team * Added size limits to sscanf() calls [drawtune.c, yapstree.c, CVE-2006-1514] stable/main/binary-mipsel/abcmidi-yaps_20050101-1sarge1_mipsel.deb stable/main/binary-mipsel/abcmidi_20050101-1sarge1_mipsel.deb abcmidi (20050101-1sarge1) stable-security; urgency=high * Non-maintainer upload by the Security Team * Added size limits to sscanf() calls [drawtune.c, yapstree.c, CVE-2006-1514] stable/main/binary-mips/abcmidi_20050101-1sarge1_mips.deb stable/main/binary-mips/abcmidi-yaps_20050101-1sarge1_mips.deb abcmidi (20050101-1sarge1) stable-security; urgency=high * Non-maintainer upload by the Security Team * Added size limits to sscanf() calls [drawtune.c, yapstree.c, CVE-2006-1514] stable/main/binary-m68k/abcmidi-yaps_20050101-1sarge1_m68k.deb stable/main/binary-m68k/abcmidi_20050101-1sarge1_m68k.deb abcmidi (20050101-1sarge1) stable-security; urgency=high * Non-maintainer upload by the Security Team * Added size limits to sscanf() calls [drawtune.c, yapstree.c, CVE-2006-1514] stable/main/binary-ia64/abcmidi-yaps_20050101-1sarge1_ia64.deb stable/main/binary-ia64/abcmidi_20050101-1sarge1_ia64.deb abcmidi (20050101-1sarge1) stable-security; urgency=high * Non-maintainer upload by the Security Team * Added size limits to sscanf() calls [drawtune.c, yapstree.c, CVE-2006-1514] stable/main/binary-i386/abcmidi-yaps_20050101-1sarge1_i386.deb stable/main/binary-i386/abcmidi_20050101-1sarge1_i386.deb abcmidi (20050101-1sarge1) stable-security; urgency=high * Non-maintainer upload by the Security Team * Added size limits to sscanf() calls [drawtune.c, yapstree.c, CVE-2006-1514] stable/main/binary-hppa/abcmidi_20050101-1sarge1_hppa.deb stable/main/binary-hppa/abcmidi-yaps_20050101-1sarge1_hppa.deb abcmidi (20050101-1sarge1) stable-security; urgency=high * Non-maintainer upload by the Security Team * Added size limits to sscanf() calls [drawtune.c, yapstree.c, CVE-2006-1514] stable/main/binary-arm/abcmidi_20050101-1sarge1_arm.deb stable/main/binary-arm/abcmidi-yaps_20050101-1sarge1_arm.deb abcmidi (20050101-1sarge1) stable-security; urgency=high * Non-maintainer upload by the Security Team * Added size limits to sscanf() calls [drawtune.c, yapstree.c, CVE-2006-1514] stable/main/binary-alpha/abcmidi_20050101-1sarge1_alpha.deb stable/main/binary-alpha/abcmidi-yaps_20050101-1sarge1_alpha.deb abcmidi (20050101-1sarge1) stable-security; urgency=high * Non-maintainer upload by the Security Team * Added size limits to sscanf() calls [drawtune.c, yapstree.c, CVE-2006-1514] stable/main/source/abcmidi_20050101-1sarge1.dsc stable/main/source/abcmidi_20050101-1sarge1.diff.gz stable/main/binary-powerpc/abcmidi_20050101-1sarge1_powerpc.deb stable/main/binary-powerpc/abcmidi-yaps_20050101-1sarge1_powerpc.deb abcmidi (20050101-1sarge1) stable-security; urgency=high * Non-maintainer upload by the Security Team * Added size limits to sscanf() calls [drawtune.c, yapstree.c, CVE-2006-1514] stable/main/binary-sparc/abc2ps_1.3.3-3sarge1_sparc.deb abc2ps (1.3.3-3sarge1) stable-security; urgency=high * Non-maintainer upload by the Security Team * Added size limits to sscanf() calls [music.h, format.h, abc2ps.c, util.h, CVE-2006-1513] stable/main/binary-s390/abc2ps_1.3.3-3sarge1_s390.deb abc2ps (1.3.3-3sarge1) stable-security; urgency=high * Non-maintainer upload by the Security Team * Added size limits to sscanf() calls [music.h, format.h, abc2ps.c, util.h, CVE-2006-1513] stable/main/binary-mipsel/abc2ps_1.3.3-3sarge1_mipsel.deb abc2ps (1.3.3-3sarge1) stable-security; urgency=high * Non-maintainer upload by the Security Team * Added size limits to sscanf() calls [music.h, format.h, abc2ps.c, util.h, CVE-2006-1513] stable/main/binary-mips/abc2ps_1.3.3-3sarge1_mips.deb abc2ps (1.3.3-3sarge1) stable-security; urgency=high * Non-maintainer upload by the Security Team * Added size limits to sscanf() calls [music.h, format.h, abc2ps.c, util.h, CVE-2006-1513] stable/main/binary-m68k/abc2ps_1.3.3-3sarge1_m68k.deb abc2ps (1.3.3-3sarge1) stable-security; urgency=high * Non-maintainer upload by the Security Team * Added size limits to sscanf() calls [music.h, format.h, abc2ps.c, util.h, CVE-2006-1513] stable/main/binary-ia64/abc2ps_1.3.3-3sarge1_ia64.deb abc2ps (1.3.3-3sarge1) stable-security; urgency=high * Non-maintainer upload by the Security Team * Added size limits to sscanf() calls [music.h, format.h, abc2ps.c, util.h, CVE-2006-1513] stable/main/binary-i386/abc2ps_1.3.3-3sarge1_i386.deb abc2ps (1.3.3-3sarge1) stable-security; urgency=high * Non-maintainer upload by the Security Team * Added size limits to sscanf() calls [music.h, format.h, abc2ps.c, util.h, CVE-2006-1513] stable/main/binary-hppa/abc2ps_1.3.3-3sarge1_hppa.deb abc2ps (1.3.3-3sarge1) stable-security; urgency=high * Non-maintainer upload by the Security Team * Added size limits to sscanf() calls [music.h, format.h, abc2ps.c, util.h, CVE-2006-1513] stable/main/binary-arm/abc2ps_1.3.3-3sarge1_arm.deb abc2ps (1.3.3-3sarge1) stable-security; urgency=high * Non-maintainer upload by the Security Team * Added size limits to sscanf() calls [music.h, format.h, abc2ps.c, util.h, CVE-2006-1513] stable/main/binary-alpha/abc2ps_1.3.3-3sarge1_alpha.deb abc2ps (1.3.3-3sarge1) stable-security; urgency=high * Non-maintainer upload by the Security Team * Added size limits to sscanf() calls [music.h, format.h, abc2ps.c, util.h, CVE-2006-1513] stable/main/source/abc2ps_1.3.3-3sarge1.diff.gz stable/main/binary-powerpc/abc2ps_1.3.3-3sarge1_powerpc.deb stable/main/source/abc2ps_1.3.3-3sarge1.dsc abc2ps (1.3.3-3sarge1) stable-security; urgency=high * Non-maintainer upload by the Security Team * Added size limits to sscanf() calls [music.h, format.h, abc2ps.c, util.h, CVE-2006-1513] ========================================= Mon, 17 Apr 2006 - Debian 3.1r2 released ========================================= stable/main/binary-sparc/libchipcard20-dev_0.9.1-7sarge0_sparc.deb stable/main/binary-sparc/libchipcard20_0.9.1-7sarge0_sparc.deb stable/main/binary-sparc/chipcard-tools_0.9.1-7sarge0_sparc.deb libchipcard (0.9.1-7sarge0) stable; urgency=low * Don't remove user upon purge. Needed for fixing #346527. stable/main/binary-sparc/exim4-daemon-light_4.50-8sarge2_sparc.deb stable/main/binary-sparc/exim4-daemon-heavy_4.50-8sarge2_sparc.deb stable/main/binary-sparc/eximon4_4.50-8sarge2_sparc.deb stable/main/binary-sparc/exim4-base_4.50-8sarge2_sparc.deb exim4 (4.50-8sarge2) stable; urgency=low * Fix 37_upstream_patch_342619 to set the default yield to failure. Thanks to Magnus Holmgren for spotting this. Closes: #361919 stable/main/binary-s390/exim4-daemon-heavy_4.50-8sarge2_s390.deb stable/main/binary-s390/exim4-daemon-light_4.50-8sarge2_s390.deb stable/main/binary-s390/eximon4_4.50-8sarge2_s390.deb stable/main/binary-s390/exim4-base_4.50-8sarge2_s390.deb exim4 (4.50-8sarge2) stable; urgency=low * Fix 37_upstream_patch_342619 to set the default yield to failure. Thanks to Magnus Holmgren for spotting this. Closes: #361919 stable/main/binary-powerpc/eximon4_4.50-8sarge2_powerpc.deb stable/main/binary-powerpc/exim4-daemon-heavy_4.50-8sarge2_powerpc.deb stable/main/binary-powerpc/exim4-base_4.50-8sarge2_powerpc.deb stable/main/binary-powerpc/exim4-daemon-light_4.50-8sarge2_powerpc.deb exim4 (4.50-8sarge2) stable; urgency=low * Fix 37_upstream_patch_342619 to set the default yield to failure. Thanks to Magnus Holmgren for spotting this. Closes: #361919 stable/main/binary-mipsel/exim4-base_4.50-8sarge2_mipsel.deb stable/main/binary-mipsel/exim4-daemon-light_4.50-8sarge2_mipsel.deb stable/main/binary-mipsel/eximon4_4.50-8sarge2_mipsel.deb stable/main/binary-mipsel/exim4-daemon-heavy_4.50-8sarge2_mipsel.deb exim4 (4.50-8sarge2) stable; urgency=low * Fix 37_upstream_patch_342619 to set the default yield to failure. Thanks to Magnus Holmgren for spotting this. Closes: #361919 stable/main/binary-mips/exim4-base_4.50-8sarge2_mips.deb stable/main/binary-mips/exim4-daemon-heavy_4.50-8sarge2_mips.deb stable/main/binary-mips/eximon4_4.50-8sarge2_mips.deb stable/main/binary-mips/exim4-daemon-light_4.50-8sarge2_mips.deb exim4 (4.50-8sarge2) stable; urgency=low * Fix 37_upstream_patch_342619 to set the default yield to failure. Thanks to Magnus Holmgren for spotting this. Closes: #361919 stable/main/binary-m68k/exim4-base_4.50-8sarge2_m68k.deb stable/main/binary-m68k/exim4-daemon-light_4.50-8sarge2_m68k.deb stable/main/binary-m68k/eximon4_4.50-8sarge2_m68k.deb stable/main/binary-m68k/exim4-daemon-heavy_4.50-8sarge2_m68k.deb exim4 (4.50-8sarge2) stable; urgency=low * Fix 37_upstream_patch_342619 to set the default yield to failure. Thanks to Magnus Holmgren for spotting this. Closes: #361919 stable/main/binary-ia64/eximon4_4.50-8sarge2_ia64.deb stable/main/binary-ia64/exim4-daemon-light_4.50-8sarge2_ia64.deb stable/main/binary-ia64/exim4-base_4.50-8sarge2_ia64.deb stable/main/binary-ia64/exim4-daemon-heavy_4.50-8sarge2_ia64.deb exim4 (4.50-8sarge2) stable; urgency=low * Fix 37_upstream_patch_342619 to set the default yield to failure. Thanks to Magnus Holmgren for spotting this. Closes: #361919 stable/main/binary-hppa/eximon4_4.50-8sarge2_hppa.deb stable/main/binary-hppa/exim4-daemon-heavy_4.50-8sarge2_hppa.deb stable/main/binary-hppa/exim4-base_4.50-8sarge2_hppa.deb stable/main/binary-hppa/exim4-daemon-light_4.50-8sarge2_hppa.deb exim4 (4.50-8sarge2) stable; urgency=low * Fix 37_upstream_patch_342619 to set the default yield to failure. Thanks to Magnus Holmgren for spotting this. Closes: #361919 stable/main/binary-arm/exim4-daemon-light_4.50-8sarge2_arm.deb stable/main/binary-arm/exim4-daemon-heavy_4.50-8sarge2_arm.deb stable/main/binary-arm/exim4-base_4.50-8sarge2_arm.deb stable/main/binary-arm/eximon4_4.50-8sarge2_arm.deb exim4 (4.50-8sarge2) stable; urgency=low * Fix 37_upstream_patch_342619 to set the default yield to failure. Thanks to Magnus Holmgren for spotting this. Closes: #361919 stable/main/binary-alpha/eximon4_4.50-8sarge2_alpha.deb stable/main/binary-alpha/exim4-daemon-heavy_4.50-8sarge2_alpha.deb stable/main/binary-alpha/exim4-daemon-light_4.50-8sarge2_alpha.deb stable/main/binary-alpha/exim4-base_4.50-8sarge2_alpha.deb exim4 (4.50-8sarge2) stable; urgency=low * Fix 37_upstream_patch_342619 to set the default yield to failure. Thanks to Magnus Holmgren for spotting this. Closes: #361919 stable/main/binary-all/exim4-config_4.50-8sarge2_all.deb stable/main/source/exim4_4.50-8sarge2.dsc stable/main/binary-i386/eximon4_4.50-8sarge2_i386.deb stable/main/binary-all/exim4_4.50-8sarge2_all.deb stable/main/binary-i386/exim4-daemon-heavy_4.50-8sarge2_i386.deb stable/main/binary-i386/exim4-base_4.50-8sarge2_i386.deb stable/main/source/exim4_4.50-8sarge2.diff.gz stable/main/binary-i386/exim4-daemon-light_4.50-8sarge2_i386.deb exim4 (4.50-8sarge2) stable; urgency=low * Fix 37_upstream_patch_342619 to set the default yield to failure. Thanks to Magnus Holmgren for spotting this. Closes: #361919 stable/main/binary-all/drupal_4.5.3-6_all.deb stable/main/source/drupal_4.5.3-6.diff.gz stable/main/source/drupal_4.5.3-6.dsc drupal (4.5.3-6) stable-security; urgency=HIGH * Maintainer upload for the Security Team * DRUPAL-SA-2006-001/CVE-2006-1227: fixes access control issue * DRUPAL-SA-2006-002/CVE-2006-1226: fixes XSS issue * DRUPAL-SA-2006-003/CVE-2006-1228: fixes session fixation issue * DRUPAL-SA-2006-004/CVE-2006-1225: fixes mail header injection issue stable/main/binary-hppa/cyrus21-clients_2.1.18-1+sarge2_hppa.deb stable/main/binary-hppa/cyrus21-imapd_2.1.18-1+sarge2_hppa.deb stable/main/binary-hppa/cyrus21-common_2.1.18-1+sarge2_hppa.deb stable/main/binary-hppa/libcyrus-imap-perl21_2.1.18-1+sarge2_hppa.deb stable/main/binary-hppa/cyrus21-murder_2.1.18-1+sarge2_hppa.deb stable/main/binary-hppa/cyrus21-dev_2.1.18-1+sarge2_hppa.deb stable/main/binary-hppa/cyrus21-pop3d_2.1.18-1+sarge2_hppa.deb cyrus21-imapd (2.1.18-1+sarge2) stable; urgency=high * Rebuild cleanly for minimal diff stable/main/source/zoph_0.3.3-12sarge1.diff.gz stable/main/binary-all/zoph_0.3.3-12sarge1_all.deb stable/main/source/zoph_0.3.3-12sarge1.dsc zoph (0.3.3-12sarge1) stable-security; urgency=high * Non maintainer upload by the Security Team: * Fix SQL injection vulnerabilities (CVE-2005-0402) stable/main/binary-sparc/zoo_2.10-11sarge0_sparc.deb zoo (2.10-11sarge0) stable-security; urgency=high * Non-maintainer upload by The Security Team. * Fix a buffer overflow in the handling of directory entry names. [CVE-2006-0855] stable/main/binary-s390/zoo_2.10-11sarge0_s390.deb zoo (2.10-11sarge0) stable-security; urgency=high * Non-maintainer upload by The Security Team. * Fix a buffer overflow in the handling of directory entry names. [CVE-2006-0855] stable/main/binary-powerpc/zoo_2.10-11sarge0_powerpc.deb zoo (2.10-11sarge0) stable-security; urgency=high * Non-maintainer upload by The Security Team. * Fix a buffer overflow in the handling of directory entry names. [CVE-2006-0855] stable/main/binary-mipsel/zoo_2.10-11sarge0_mipsel.deb zoo (2.10-11sarge0) stable-security; urgency=high * Non-maintainer upload by The Security Team. * Fix a buffer overflow in the handling of directory entry names. [CVE-2006-0855] stable/main/binary-mips/zoo_2.10-11sarge0_mips.deb zoo (2.10-11sarge0) stable-security; urgency=high * Non-maintainer upload by The Security Team. * Fix a buffer overflow in the handling of directory entry names. [CVE-2006-0855] stable/main/binary-m68k/zoo_2.10-11sarge0_m68k.deb zoo (2.10-11sarge0) stable-security; urgency=high * Non-maintainer upload by The Security Team. * Fix a buffer overflow in the handling of directory entry names. [CVE-2006-0855] stable/main/binary-ia64/zoo_2.10-11sarge0_ia64.deb zoo (2.10-11sarge0) stable-security; urgency=high * Non-maintainer upload by The Security Team. * Fix a buffer overflow in the handling of directory entry names. [CVE-2006-0855] stable/main/binary-hppa/zoo_2.10-11sarge0_hppa.deb zoo (2.10-11sarge0) stable-security; urgency=high * Non-maintainer upload by The Security Team. * Fix a buffer overflow in the handling of directory entry names. [CVE-2006-0855] stable/main/binary-arm/zoo_2.10-11sarge0_arm.deb zoo (2.10-11sarge0) stable-security; urgency=high * Non-maintainer upload by The Security Team. * Fix a buffer overflow in the handling of directory entry names. [CVE-2006-0855] stable/main/binary-alpha/zoo_2.10-11sarge0_alpha.deb zoo (2.10-11sarge0) stable-security; urgency=high * Non-maintainer upload by The Security Team. * Fix a buffer overflow in the handling of directory entry names. [CVE-2006-0855] stable/main/source/zoo_2.10-11sarge0.diff.gz stable/main/source/zoo_2.10-11sarge0.dsc stable/main/binary-i386/zoo_2.10-11sarge0_i386.deb zoo (2.10-11sarge0) stable-security; urgency=high * Non-maintainer upload by The Security Team. * Fix a buffer overflow in the handling of directory entry names. [CVE-2006-0855] stable/main/binary-sparc/xpvm_1.2.5-7.3sarge1_sparc.deb xpvm (1.2.5-7.3sarge1) stable-security; urgency=high * Non-maintainer Upload by the Security Team * Applied patch by Matej Vela to use ~/.xpvm_trace instead of /tmp/xpvm.trace.$USER to prevent symlink attacks. (Trace files are meant to be semi-persistent, so this is more in line with user expectations than creating unique temporary files.) [src/xpvm.tcl, src/help/traces.help, debian/xpvm.1, CAN-2005-2240, Bug#318285] stable/main/binary-s390/xpvm_1.2.5-7.3sarge1_s390.deb xpvm (1.2.5-7.3sarge1) stable-security; urgency=high * Non-maintainer Upload by the Security Team * Applied patch by Matej Vela to use ~/.xpvm_trace instead of /tmp/xpvm.trace.$USER to prevent symlink attacks. (Trace files are meant to be semi-persistent, so this is more in line with user expectations than creating unique temporary files.) [src/xpvm.tcl, src/help/traces.help, debian/xpvm.1, CAN-2005-2240, Bug#318285] stable/main/binary-mipsel/xpvm_1.2.5-7.3sarge1_mipsel.deb xpvm (1.2.5-7.3sarge1) stable-security; urgency=high * Non-maintainer Upload by the Security Team * Applied patch by Matej Vela to use ~/.xpvm_trace instead of /tmp/xpvm.trace.$USER to prevent symlink attacks. (Trace files are meant to be semi-persistent, so this is more in line with user expectations than creating unique temporary files.) [src/xpvm.tcl, src/help/traces.help, debian/xpvm.1, CAN-2005-2240, Bug#318285] stable/main/binary-mips/xpvm_1.2.5-7.3sarge1_mips.deb xpvm (1.2.5-7.3sarge1) stable-security; urgency=high * Non-maintainer Upload by the Security Team * Applied patch by Matej Vela to use ~/.xpvm_trace instead of /tmp/xpvm.trace.$USER to prevent symlink attacks. (Trace files are meant to be semi-persistent, so this is more in line with user expectations than creating unique temporary files.) [src/xpvm.tcl, src/help/traces.help, debian/xpvm.1, CAN-2005-2240, Bug#318285] stable/main/binary-m68k/xpvm_1.2.5-7.3sarge1_m68k.deb xpvm (1.2.5-7.3sarge1) stable-security; urgency=high * Non-maintainer Upload by the Security Team * Applied patch by Matej Vela to use ~/.xpvm_trace instead of /tmp/xpvm.trace.$USER to prevent symlink attacks. (Trace files are meant to be semi-persistent, so this is more in line with user expectations than creating unique temporary files.) [src/xpvm.tcl, src/help/traces.help, debian/xpvm.1, CAN-2005-2240, Bug#318285] stable/main/binary-ia64/xpvm_1.2.5-7.3sarge1_ia64.deb xpvm (1.2.5-7.3sarge1) stable-security; urgency=high * Non-maintainer Upload by the Security Team * Applied patch by Matej Vela to use ~/.xpvm_trace instead of /tmp/xpvm.trace.$USER to prevent symlink attacks. (Trace files are meant to be semi-persistent, so this is more in line with user expectations than creating unique temporary files.) [src/xpvm.tcl, src/help/traces.help, debian/xpvm.1, CAN-2005-2240, Bug#318285] stable/main/binary-i386/xpvm_1.2.5-7.3sarge1_i386.deb xpvm (1.2.5-7.3sarge1) stable-security; urgency=high * Non-maintainer Upload by the Security Team * Applied patch by Matej Vela to use ~/.xpvm_trace instead of /tmp/xpvm.trace.$USER to prevent symlink attacks. (Trace files are meant to be semi-persistent, so this is more in line with user expectations than creating unique temporary files.) [src/xpvm.tcl, src/help/traces.help, debian/xpvm.1, CAN-2005-2240, Bug#318285] stable/main/binary-hppa/xpvm_1.2.5-7.3sarge1_hppa.deb xpvm (1.2.5-7.3sarge1) stable-security; urgency=high * Non-maintainer Upload by the Security Team * Applied patch by Matej Vela to use ~/.xpvm_trace instead of /tmp/xpvm.trace.$USER to prevent symlink attacks. (Trace files are meant to be semi-persistent, so this is more in line with user expectations than creating unique temporary files.) [src/xpvm.tcl, src/help/traces.help, debian/xpvm.1, CAN-2005-2240, Bug#318285] stable/main/binary-arm/xpvm_1.2.5-7.3sarge1_arm.deb xpvm (1.2.5-7.3sarge1) stable-security; urgency=high * Non-maintainer Upload by the Security Team * Applied patch by Matej Vela to use ~/.xpvm_trace instead of /tmp/xpvm.trace.$USER to prevent symlink attacks. (Trace files are meant to be semi-persistent, so this is more in line with user expectations than creating unique temporary files.) [src/xpvm.tcl, src/help/traces.help, debian/xpvm.1, CAN-2005-2240, Bug#318285] stable/main/binary-alpha/xpvm_1.2.5-7.3sarge1_alpha.deb xpvm (1.2.5-7.3sarge1) stable-security; urgency=high * Non-maintainer Upload by the Security Team * Applied patch by Matej Vela to use ~/.xpvm_trace instead of /tmp/xpvm.trace.$USER to prevent symlink attacks. (Trace files are meant to be semi-persistent, so this is more in line with user expectations than creating unique temporary files.) [src/xpvm.tcl, src/help/traces.help, debian/xpvm.1, CAN-2005-2240, Bug#318285] stable/main/source/xpvm_1.2.5-7.3sarge1.diff.gz stable/main/binary-powerpc/xpvm_1.2.5-7.3sarge1_powerpc.deb stable/main/source/xpvm_1.2.5-7.3sarge1.dsc xpvm (1.2.5-7.3sarge1) stable-security; urgency=high * Non-maintainer Upload by the Security Team * Applied patch by Matej Vela to use ~/.xpvm_trace instead of /tmp/xpvm.trace.$USER to prevent symlink attacks. (Trace files are meant to be semi-persistent, so this is more in line with user expectations than creating unique temporary files.) [src/xpvm.tcl, src/help/traces.help, debian/xpvm.1, CAN-2005-2240, Bug#318285] stable/main/binary-sparc/xpdf-utils_3.00-13.6_sparc.deb stable/main/binary-sparc/xpdf-reader_3.00-13.6_sparc.deb xpdf (3.00-13.6) stable-security; urgency=high * Non-maintainer upload by the Security Team * Backported upstream patch by Derek Noonburg to fix several vulnerabilities [splash/SplashXPathScanner.cc, xpdf/JBIG2Stream.cc, xpdf/Stream.h, goo/gmem.c] stable/main/binary-s390/xpdf-utils_3.00-13.6_s390.deb stable/main/binary-s390/xpdf-reader_3.00-13.6_s390.deb xpdf (3.00-13.6) stable-security; urgency=high * Non-maintainer upload by the Security Team * Backported upstream patch by Derek Noonburg to fix several vulnerabilities [splash/SplashXPathScanner.cc, xpdf/JBIG2Stream.cc, xpdf/Stream.h, goo/gmem.c] stable/main/binary-mipsel/xpdf-reader_3.00-13.6_mipsel.deb stable/main/binary-mipsel/xpdf-utils_3.00-13.6_mipsel.deb xpdf (3.00-13.6) stable-security; urgency=high * Non-maintainer upload by the Security Team * Backported upstream patch by Derek Noonburg to fix several vulnerabilities [splash/SplashXPathScanner.cc, xpdf/JBIG2Stream.cc, xpdf/Stream.h, goo/gmem.c] stable/main/binary-mips/xpdf-utils_3.00-13.6_mips.deb stable/main/binary-mips/xpdf-reader_3.00-13.6_mips.deb xpdf (3.00-13.6) stable-security; urgency=high * Non-maintainer upload by the Security Team * Backported upstream patch by Derek Noonburg to fix several vulnerabilities [splash/SplashXPathScanner.cc, xpdf/JBIG2Stream.cc, xpdf/Stream.h, goo/gmem.c] stable/main/binary-m68k/xpdf-reader_3.00-13.6_m68k.deb stable/main/binary-m68k/xpdf-utils_3.00-13.6_m68k.deb xpdf (3.00-13.6) stable-security; urgency=high * Non-maintainer upload by the Security Team * Backported upstream patch by Derek Noonburg to fix several vulnerabilities [splash/SplashXPathScanner.cc, xpdf/JBIG2Stream.cc, xpdf/Stream.h, goo/gmem.c] stable/main/binary-ia64/xpdf-utils_3.00-13.6_ia64.deb stable/main/binary-ia64/xpdf-reader_3.00-13.6_ia64.deb xpdf (3.00-13.6) stable-security; urgency=high * Non-maintainer upload by the Security Team * Backported upstream patch by Derek Noonburg to fix several vulnerabilities [splash/SplashXPathScanner.cc, xpdf/JBIG2Stream.cc, xpdf/Stream.h, goo/gmem.c] stable/main/binary-i386/xpdf-reader_3.00-13.6_i386.deb stable/main/binary-i386/xpdf-utils_3.00-13.6_i386.deb xpdf (3.00-13.6) stable-security; urgency=high * Non-maintainer upload by the Security Team * Backported upstream patch by Derek Noonburg to fix several vulnerabilities [splash/SplashXPathScanner.cc, xpdf/JBIG2Stream.cc, xpdf/Stream.h, goo/gmem.c] stable/main/binary-hppa/xpdf-utils_3.00-13.6_hppa.deb stable/main/binary-hppa/xpdf-reader_3.00-13.6_hppa.deb xpdf (3.00-13.6) stable-security; urgency=high * Non-maintainer upload by the Security Team * Backported upstream patch by Derek Noonburg to fix several vulnerabilities [splash/SplashXPathScanner.cc, xpdf/JBIG2Stream.cc, xpdf/Stream.h, goo/gmem.c] stable/main/binary-arm/xpdf-reader_3.00-13.6_arm.deb stable/main/binary-arm/xpdf-utils_3.00-13.6_arm.deb xpdf (3.00-13.6) stable-security; urgency=high * Non-maintainer upload by the Security Team * Backported upstream patch by Derek Noonburg to fix several vulnerabilities [splash/SplashXPathScanner.cc, xpdf/JBIG2Stream.cc, xpdf/Stream.h, goo/gmem.c] stable/main/binary-alpha/xpdf-reader_3.00-13.6_alpha.deb stable/main/binary-alpha/xpdf-utils_3.00-13.6_alpha.deb xpdf (3.00-13.6) stable-security; urgency=high * Non-maintainer upload by the Security Team * Backported upstream patch by Derek Noonburg to fix several vulnerabilities [splash/SplashXPathScanner.cc, xpdf/JBIG2Stream.cc, xpdf/Stream.h, goo/gmem.c] stable/main/binary-powerpc/xpdf-reader_3.00-13.6_powerpc.deb stable/main/binary-powerpc/xpdf-utils_3.00-13.6_powerpc.deb stable/main/binary-all/xpdf_3.00-13.6_all.deb stable/main/binary-all/xpdf-common_3.00-13.6_all.deb stable/main/source/xpdf_3.00-13.6.dsc stable/main/source/xpdf_3.00-13.6.diff.gz xpdf (3.00-13.6) stable-security; urgency=high * Non-maintainer upload by the Security Team * Backported upstream patch by Derek Noonburg to fix several vulnerabilities [splash/SplashXPathScanner.cc, xpdf/JBIG2Stream.cc, xpdf/Stream.h, goo/gmem.c] stable/main/binary-sparc/libxine-dev_1.0.1-1sarge2_sparc.deb stable/main/binary-sparc/libxine1_1.0.1-1sarge2_sparc.deb xine-lib (1.0.1-1sarge2) stable-security; urgency=high * Non-maintainer upload by the Security Team. * Fix heap overflow in avcodec_default_get_buffer() from local libavcodec copy (CVE-2005-4048) stable/main/binary-s390/libxine1_1.0.1-1sarge2_s390.deb stable/main/binary-s390/libxine-dev_1.0.1-1sarge2_s390.deb xine-lib (1.0.1-1sarge2) stable-security; urgency=high * Non-maintainer upload by the Security Team. * Fix heap overflow in avcodec_default_get_buffer() from local libavcodec copy (CVE-2005-4048) stable/main/binary-powerpc/libxine-dev_1.0.1-1sarge2_powerpc.deb stable/main/binary-powerpc/libxine1_1.0.1-1sarge2_powerpc.deb xine-lib (1.0.1-1sarge2) stable-security; urgency=high * Non-maintainer upload by the Security Team. * Fix heap overflow in avcodec_default_get_buffer() from local libavcodec copy (CVE-2005-4048) stable/main/binary-mipsel/libxine-dev_1.0.1-1sarge2_mipsel.deb stable/main/binary-mipsel/libxine1_1.0.1-1sarge2_mipsel.deb xine-lib (1.0.1-1sarge2) stable-security; urgency=high * Non-maintainer upload by the Security Team. * Fix heap overflow in avcodec_default_get_buffer() from local libavcodec copy (CVE-2005-4048) stable/main/binary-mips/libxine-dev_1.0.1-1sarge2_mips.deb stable/main/binary-mips/libxine1_1.0.1-1sarge2_mips.deb xine-lib (1.0.1-1sarge2) stable-security; urgency=high * Non-maintainer upload by the Security Team. * Fix heap overflow in avcodec_default_get_buffer() from local libavcodec copy (CVE-2005-4048) stable/main/binary-m68k/libxine1_1.0.1-1sarge2_m68k.deb stable/main/binary-m68k/libxine-dev_1.0.1-1sarge2_m68k.deb xine-lib (1.0.1-1sarge2) stable-security; urgency=high * Non-maintainer upload by the Security Team. * Fix heap overflow in avcodec_default_get_buffer() from local libavcodec copy (CVE-2005-4048) stable/main/binary-ia64/libxine-dev_1.0.1-1sarge2_ia64.deb stable/main/binary-ia64/libxine1_1.0.1-1sarge2_ia64.deb xine-lib (1.0.1-1sarge2) stable-security; urgency=high * Non-maintainer upload by the Security Team. * Fix heap overflow in avcodec_default_get_buffer() from local libavcodec copy (CVE-2005-4048) stable/main/binary-hppa/libxine-dev_1.0.1-1sarge2_hppa.deb stable/main/binary-hppa/libxine1_1.0.1-1sarge2_hppa.deb xine-lib (1.0.1-1sarge2) stable-security; urgency=high * Non-maintainer upload by the Security Team. * Fix heap overflow in avcodec_default_get_buffer() from local libavcodec copy (CVE-2005-4048) stable/main/binary-arm/libxine1_1.0.1-1sarge2_arm.deb stable/main/binary-arm/libxine-dev_1.0.1-1sarge2_arm.deb xine-lib (1.0.1-1sarge2) stable-security; urgency=high * Non-maintainer upload by the Security Team. * Fix heap overflow in avcodec_default_get_buffer() from local libavcodec copy (CVE-2005-4048) stable/main/binary-alpha/libxine1_1.0.1-1sarge2_alpha.deb stable/main/binary-alpha/libxine-dev_1.0.1-1sarge2_alpha.deb xine-lib (1.0.1-1sarge2) stable-security; urgency=high * Non-maintainer upload by the Security Team. * Fix heap overflow in avcodec_default_get_buffer() from local libavcodec copy (CVE-2005-4048) stable/main/binary-i386/libxine1_1.0.1-1sarge2_i386.deb stable/main/source/xine-lib_1.0.1-1sarge2.diff.gz stable/main/binary-i386/libxine-dev_1.0.1-1sarge2_i386.deb stable/main/source/xine-lib_1.0.1-1sarge2.dsc xine-lib (1.0.1-1sarge2) stable-security; urgency=high * Non-maintainer upload by the Security Team. * Fix heap overflow in avcodec_default_get_buffer() from local libavcodec copy (CVE-2005-4048) stable/main/binary-sparc/wzdftpd-mod-perl_0.5.2-1.1sarge1_sparc.deb stable/main/binary-sparc/wzdftpd_0.5.2-1.1sarge1_sparc.deb stable/main/binary-sparc/wzdftpd-dev_0.5.2-1.1sarge1_sparc.deb stable/main/binary-sparc/wzdftpd-mod-tcl_0.5.2-1.1sarge1_sparc.deb stable/main/binary-sparc/wzdftpd-back-mysql_0.5.2-1.1sarge1_sparc.deb wzdftpd (0.5.2-1.1sarge1) stable-security; urgency=high * Non-maintainer upload for the Security Team. * Fix of arbitrary commands via shell metacharacters in the SITE command [CVE-2005-3081] stable/main/binary-s390/wzdftpd_0.5.2-1.1sarge1_s390.deb stable/main/binary-s390/wzdftpd-back-mysql_0.5.2-1.1sarge1_s390.deb stable/main/binary-s390/wzdftpd-dev_0.5.2-1.1sarge1_s390.deb stable/main/binary-s390/wzdftpd-mod-perl_0.5.2-1.1sarge1_s390.deb stable/main/binary-s390/wzdftpd-mod-tcl_0.5.2-1.1sarge1_s390.deb wzdftpd (0.5.2-1.1sarge1) stable-security; urgency=high * Non-maintainer upload for the Security Team. * Fix of arbitrary commands via shell metacharacters in the SITE command [CVE-2005-3081] stable/main/binary-powerpc/wzdftpd-mod-perl_0.5.2-1.1sarge1_powerpc.deb stable/main/binary-powerpc/wzdftpd-dev_0.5.2-1.1sarge1_powerpc.deb stable/main/binary-powerpc/wzdftpd_0.5.2-1.1sarge1_powerpc.deb stable/main/binary-powerpc/wzdftpd-back-mysql_0.5.2-1.1sarge1_powerpc.deb stable/main/binary-powerpc/wzdftpd-mod-tcl_0.5.2-1.1sarge1_powerpc.deb wzdftpd (0.5.2-1.1sarge1) stable-security; urgency=high * Non-maintainer upload for the Security Team. * Fix of arbitrary commands via shell metacharacters in the SITE command [CVE-2005-3081] stable/main/binary-mipsel/wzdftpd_0.5.2-1.1sarge1_mipsel.deb stable/main/binary-mipsel/wzdftpd-mod-tcl_0.5.2-1.1sarge1_mipsel.deb stable/main/binary-mipsel/wzdftpd-mod-perl_0.5.2-1.1sarge1_mipsel.deb stable/main/binary-mipsel/wzdftpd-dev_0.5.2-1.1sarge1_mipsel.deb stable/main/binary-mipsel/wzdftpd-back-mysql_0.5.2-1.1sarge1_mipsel.deb wzdftpd (0.5.2-1.1sarge1) stable-security; urgency=high * Non-maintainer upload for the Security Team. * Fix of arbitrary commands via shell metacharacters in the SITE command [CVE-2005-3081] stable/main/binary-mips/wzdftpd-dev_0.5.2-1.1sarge1_mips.deb stable/main/binary-mips/wzdftpd_0.5.2-1.1sarge1_mips.deb stable/main/binary-mips/wzdftpd-mod-perl_0.5.2-1.1sarge1_mips.deb stable/main/binary-mips/wzdftpd-back-mysql_0.5.2-1.1sarge1_mips.deb stable/main/binary-mips/wzdftpd-mod-tcl_0.5.2-1.1sarge1_mips.deb wzdftpd (0.5.2-1.1sarge1) stable-security; urgency=high * Non-maintainer upload for the Security Team. * Fix of arbitrary commands via shell metacharacters in the SITE command [CVE-2005-3081] stable/main/binary-m68k/wzdftpd-dev_0.5.2-1.1sarge1_m68k.deb stable/main/binary-m68k/wzdftpd-mod-tcl_0.5.2-1.1sarge1_m68k.deb stable/main/binary-m68k/wzdftpd-mod-perl_0.5.2-1.1sarge1_m68k.deb stable/main/binary-m68k/wzdftpd-back-mysql_0.5.2-1.1sarge1_m68k.deb stable/main/binary-m68k/wzdftpd_0.5.2-1.1sarge1_m68k.deb wzdftpd (0.5.2-1.1sarge1) stable-security; urgency=high * Non-maintainer upload for the Security Team. * Fix of arbitrary commands via shell metacharacters in the SITE command [CVE-2005-3081] stable/main/binary-ia64/wzdftpd-mod-tcl_0.5.2-1.1sarge1_ia64.deb stable/main/binary-ia64/wzdftpd-dev_0.5.2-1.1sarge1_ia64.deb stable/main/binary-ia64/wzdftpd-back-mysql_0.5.2-1.1sarge1_ia64.deb stable/main/binary-ia64/wzdftpd-mod-perl_0.5.2-1.1sarge1_ia64.deb stable/main/binary-ia64/wzdftpd_0.5.2-1.1sarge1_ia64.deb wzdftpd (0.5.2-1.1sarge1) stable-security; urgency=high * Non-maintainer upload for the Security Team. * Fix of arbitrary commands via shell metacharacters in the SITE command [CVE-2005-3081] stable/main/binary-hppa/wzdftpd-back-mysql_0.5.2-1.1sarge1_hppa.deb stable/main/binary-hppa/wzdftpd_0.5.2-1.1sarge1_hppa.deb stable/main/binary-hppa/wzdftpd-dev_0.5.2-1.1sarge1_hppa.deb stable/main/binary-hppa/wzdftpd-mod-perl_0.5.2-1.1sarge1_hppa.deb stable/main/binary-hppa/wzdftpd-mod-tcl_0.5.2-1.1sarge1_hppa.deb wzdftpd (0.5.2-1.1sarge1) stable-security; urgency=high * Non-maintainer upload for the Security Team. * Fix of arbitrary commands via shell metacharacters in the SITE command [CVE-2005-3081] stable/main/binary-arm/wzdftpd-mod-tcl_0.5.2-1.1sarge1_arm.deb stable/main/binary-arm/wzdftpd-back-mysql_0.5.2-1.1sarge1_arm.deb stable/main/binary-arm/wzdftpd_0.5.2-1.1sarge1_arm.deb stable/main/binary-arm/wzdftpd-dev_0.5.2-1.1sarge1_arm.deb stable/main/binary-arm/wzdftpd-mod-perl_0.5.2-1.1sarge1_arm.deb wzdftpd (0.5.2-1.1sarge1) stable-security; urgency=high * Non-maintainer upload for the Security Team. * Fix of arbitrary commands via shell metacharacters in the SITE command [CVE-2005-3081] stable/main/binary-alpha/wzdftpd-mod-perl_0.5.2-1.1sarge1_alpha.deb stable/main/binary-alpha/wzdftpd-dev_0.5.2-1.1sarge1_alpha.deb stable/main/binary-alpha/wzdftpd_0.5.2-1.1sarge1_alpha.deb stable/main/binary-alpha/wzdftpd-mod-tcl_0.5.2-1.1sarge1_alpha.deb stable/main/binary-alpha/wzdftpd-back-mysql_0.5.2-1.1sarge1_alpha.deb wzdftpd (0.5.2-1.1sarge1) stable-security; urgency=high * Non-maintainer upload for the Security Team. * Fix of arbitrary commands via shell metacharacters in the SITE command [CVE-2005-3081] stable/main/source/wzdftpd_0.5.2-1.1sarge1.dsc stable/main/binary-i386/wzdftpd-back-mysql_0.5.2-1.1sarge1_i386.deb stable/main/binary-i386/wzdftpd-mod-tcl_0.5.2-1.1sarge1_i386.deb stable/main/binary-i386/wzdftpd-mod-perl_0.5.2-1.1sarge1_i386.deb stable/main/binary-i386/wzdftpd_0.5.2-1.1sarge1_i386.deb stable/main/source/wzdftpd_0.5.2-1.1sarge1.diff.gz stable/main/binary-i386/wzdftpd-dev_0.5.2-1.1sarge1_i386.deb wzdftpd (0.5.2-1.1sarge1) stable-security; urgency=high * Non-maintainer upload for the Security Team. * Fix of arbitrary commands via shell metacharacters in the SITE command [CVE-2005-3081] stable/main/binary-i386/libwine-dev_0.0.20050310-1.2_i386.deb stable/main/binary-i386/libwine-twain_0.0.20050310-1.2_i386.deb stable/main/binary-i386/libwine-capi_0.0.20050310-1.2_i386.deb stable/main/binary-all/wine-doc_0.0.20050310-1.2_all.deb stable/main/binary-i386/libwine-print_0.0.20050310-1.2_i386.deb stable/main/source/wine_0.0.20050310-1.2.diff.gz stable/main/binary-i386/wine-utils_0.0.20050310-1.2_i386.deb stable/main/source/wine_0.0.20050310-1.2.dsc stable/main/binary-i386/libwine-alsa_0.0.20050310-1.2_i386.deb stable/main/binary-i386/libwine-jack_0.0.20050310-1.2_i386.deb stable/main/binary-i386/wine_0.0.20050310-1.2_i386.deb stable/main/binary-i386/libwine-arts_0.0.20050310-1.2_i386.deb stable/main/binary-i386/libwine-nas_0.0.20050310-1.2_i386.deb stable/main/binary-i386/libwine_0.0.20050310-1.2_i386.deb wine (0.0.20050310-1.2) stable-security; urgency=high * Non-maintainer upload by the Security Team * Prevent code execution through GDI escape function call in WMF files (CVE-2006-0106) stable/main/source/webcalendar_0.9.45-4sarge3.dsc stable/main/source/webcalendar_0.9.45-4sarge3.diff.gz stable/main/binary-all/webcalendar_0.9.45-4sarge3_all.deb webcalendar (0.9.45-4sarge3) stable-security; urgency=high * Fixed multiple security vulnerabilities (http://www.ush.it/2005/11/28/webcalendar-multiple-vulnerabilities/) * Fixed multiple SQL Injection vulnerabilities (CVE-2005-3949) files: activity_log.php startid parameter, edit_template.php template parameter, and export_handler.php multiple parameters. admin_handler.php is not vulnerable in this version * Fixed CRLF injection XSS/response splitting vulnerability (CVE-2005-3982) files: layers_toggle.php ret parameter (required change to url param) * Fixed local file overwrite vulnerability (CVE-2005-3961) files: export_handler.php id parameter stable/main/binary-sparc/vlc-ggi_0.8.1.svn20050314-1sarge1_sparc.deb stable/main/binary-sparc/mozilla-plugin-vlc_0.8.1.svn20050314-1sarge1_sparc.deb stable/main/binary-sparc/wxvlc_0.8.1.svn20050314-1sarge1_sparc.deb stable/main/binary-sparc/qvlc_0.8.1.svn20050314-1sarge1_sparc.deb stable/main/binary-sparc/vlc-sdl_0.8.1.svn20050314-1sarge1_sparc.deb stable/main/binary-sparc/vlc-esd_0.8.1.svn20050314-1sarge1_sparc.deb stable/main/binary-sparc/vlc_0.8.1.svn20050314-1sarge1_sparc.deb stable/main/binary-sparc/vlc-plugin-arts_0.8.1.svn20050314-1sarge1_sparc.deb stable/main/binary-sparc/vlc-plugin-sdl_0.8.1.svn20050314-1sarge1_sparc.deb stable/main/binary-sparc/kvlc_0.8.1.svn20050314-1sarge1_sparc.deb stable/main/binary-sparc/vlc-plugin-ggi_0.8.1.svn20050314-1sarge1_sparc.deb stable/main/binary-sparc/libvlc0-dev_0.8.1.svn20050314-1sarge1_sparc.deb stable/main/binary-sparc/vlc-gnome_0.8.1.svn20050314-1sarge1_sparc.deb stable/main/binary-sparc/vlc-qt_0.8.1.svn20050314-1sarge1_sparc.deb stable/main/binary-sparc/gvlc_0.8.1.svn20050314-1sarge1_sparc.deb stable/main/binary-sparc/vlc-plugin-esd_0.8.1.svn20050314-1sarge1_sparc.deb stable/main/binary-sparc/vlc-alsa_0.8.1.svn20050314-1sarge1_sparc.deb stable/main/binary-sparc/gnome-vlc_0.8.1.svn20050314-1sarge1_sparc.deb stable/main/binary-sparc/vlc-plugin-alsa_0.8.1.svn20050314-1sarge1_sparc.deb stable/main/binary-sparc/vlc-gtk_0.8.1.svn20050314-1sarge1_sparc.deb vlc (0.8.1.svn20050314-1sarge1) stable-security; urgency=high * Non-maintainer upload by the Security Team. * Recompile against fixed libavcodec. (CVE-2005-4048) stable/main/binary-s390/vlc-gtk_0.8.1.svn20050314-1sarge1_s390.deb stable/main/binary-s390/vlc-qt_0.8.1.svn20050314-1sarge1_s390.deb stable/main/binary-s390/kvlc_0.8.1.svn20050314-1sarge1_s390.deb stable/main/binary-s390/vlc-alsa_0.8.1.svn20050314-1sarge1_s390.deb stable/main/binary-s390/gnome-vlc_0.8.1.svn20050314-1sarge1_s390.deb stable/main/binary-s390/vlc-plugin-sdl_0.8.1.svn20050314-1sarge1_s390.deb stable/main/binary-s390/vlc-plugin-ggi_0.8.1.svn20050314-1sarge1_s390.deb stable/main/binary-s390/mozilla-plugin-vlc_0.8.1.svn20050314-1sarge1_s390.deb stable/main/binary-s390/qvlc_0.8.1.svn20050314-1sarge1_s390.deb stable/main/binary-s390/vlc-gnome_0.8.1.svn20050314-1sarge1_s390.deb stable/main/binary-s390/gvlc_0.8.1.svn20050314-1sarge1_s390.deb stable/main/binary-s390/vlc-plugin-esd_0.8.1.svn20050314-1sarge1_s390.deb stable/main/binary-s390/vlc_0.8.1.svn20050314-1sarge1_s390.deb stable/main/binary-s390/vlc-sdl_0.8.1.svn20050314-1sarge1_s390.deb stable/main/binary-s390/vlc-plugin-arts_0.8.1.svn20050314-1sarge1_s390.deb stable/main/binary-s390/wxvlc_0.8.1.svn20050314-1sarge1_s390.deb stable/main/binary-s390/vlc-plugin-alsa_0.8.1.svn20050314-1sarge1_s390.deb stable/main/binary-s390/vlc-ggi_0.8.1.svn20050314-1sarge1_s390.deb stable/main/binary-s390/vlc-esd_0.8.1.svn20050314-1sarge1_s390.deb stable/main/binary-s390/libvlc0-dev_0.8.1.svn20050314-1sarge1_s390.deb vlc (0.8.1.svn20050314-1sarge1) stable-security; urgency=high * Non-maintainer upload by the Security Team. * Recompile against fixed libavcodec. (CVE-2005-4048) stable/main/binary-powerpc/libvlc0-dev_0.8.1.svn20050314-1sarge1_powerpc.deb stable/main/binary-powerpc/vlc-plugin-sdl_0.8.1.svn20050314-1sarge1_powerpc.deb stable/main/binary-powerpc/vlc-qt_0.8.1.svn20050314-1sarge1_powerpc.deb stable/main/binary-powerpc/vlc-gnome_0.8.1.svn20050314-1sarge1_powerpc.deb stable/main/binary-powerpc/gnome-vlc_0.8.1.svn20050314-1sarge1_powerpc.deb stable/main/binary-powerpc/vlc-alsa_0.8.1.svn20050314-1sarge1_powerpc.deb stable/main/binary-powerpc/gvlc_0.8.1.svn20050314-1sarge1_powerpc.deb stable/main/binary-powerpc/qvlc_0.8.1.svn20050314-1sarge1_powerpc.deb stable/main/binary-powerpc/vlc-esd_0.8.1.svn20050314-1sarge1_powerpc.deb stable/main/binary-powerpc/kvlc_0.8.1.svn20050314-1sarge1_powerpc.deb stable/main/binary-powerpc/vlc-sdl_0.8.1.svn20050314-1sarge1_powerpc.deb stable/main/binary-powerpc/vlc-gtk_0.8.1.svn20050314-1sarge1_powerpc.deb stable/main/binary-powerpc/vlc-plugin-alsa_0.8.1.svn20050314-1sarge1_powerpc.deb stable/main/binary-powerpc/vlc-plugin-ggi_0.8.1.svn20050314-1sarge1_powerpc.deb stable/main/binary-powerpc/vlc-ggi_0.8.1.svn20050314-1sarge1_powerpc.deb stable/main/binary-powerpc/wxvlc_0.8.1.svn20050314-1sarge1_powerpc.deb stable/main/binary-powerpc/vlc_0.8.1.svn20050314-1sarge1_powerpc.deb stable/main/binary-powerpc/mozilla-plugin-vlc_0.8.1.svn20050314-1sarge1_powerpc.deb stable/main/binary-powerpc/vlc-plugin-esd_0.8.1.svn20050314-1sarge1_powerpc.deb stable/main/binary-powerpc/vlc-plugin-arts_0.8.1.svn20050314-1sarge1_powerpc.deb vlc (0.8.1.svn20050314-1sarge1) stable-security; urgency=high * Non-maintainer upload by the Security Team. * Recompile against fixed libavcodec. (CVE-2005-4048) stable/main/binary-mipsel/vlc-plugin-ggi_0.8.1.svn20050314-1sarge1_mipsel.deb stable/main/binary-mipsel/qvlc_0.8.1.svn20050314-1sarge1_mipsel.deb stable/main/binary-mipsel/vlc-plugin-sdl_0.8.1.svn20050314-1sarge1_mipsel.deb stable/main/binary-mipsel/gvlc_0.8.1.svn20050314-1sarge1_mipsel.deb stable/main/binary-mipsel/vlc-sdl_0.8.1.svn20050314-1sarge1_mipsel.deb stable/main/binary-mipsel/vlc-plugin-arts_0.8.1.svn20050314-1sarge1_mipsel.deb stable/main/binary-mipsel/gnome-vlc_0.8.1.svn20050314-1sarge1_mipsel.deb stable/main/binary-mipsel/vlc-ggi_0.8.1.svn20050314-1sarge1_mipsel.deb stable/main/binary-mipsel/vlc-esd_0.8.1.svn20050314-1sarge1_mipsel.deb stable/main/binary-mipsel/mozilla-plugin-vlc_0.8.1.svn20050314-1sarge1_mipsel.deb stable/main/binary-mipsel/vlc-plugin-esd_0.8.1.svn20050314-1sarge1_mipsel.deb stable/main/binary-mipsel/vlc-gnome_0.8.1.svn20050314-1sarge1_mipsel.deb stable/main/binary-mipsel/libvlc0-dev_0.8.1.svn20050314-1sarge1_mipsel.deb stable/main/binary-mipsel/vlc-plugin-alsa_0.8.1.svn20050314-1sarge1_mipsel.deb stable/main/binary-mipsel/vlc-gtk_0.8.1.svn20050314-1sarge1_mipsel.deb stable/main/binary-mipsel/kvlc_0.8.1.svn20050314-1sarge1_mipsel.deb stable/main/binary-mipsel/vlc-qt_0.8.1.svn20050314-1sarge1_mipsel.deb stable/main/binary-mipsel/vlc_0.8.1.svn20050314-1sarge1_mipsel.deb stable/main/binary-mipsel/wxvlc_0.8.1.svn20050314-1sarge1_mipsel.deb stable/main/binary-mipsel/vlc-alsa_0.8.1.svn20050314-1sarge1_mipsel.deb vlc (0.8.1.svn20050314-1sarge1) stable-security; urgency=high * Non-maintainer upload by the Security Team. * Recompile against fixed libavcodec. (CVE-2005-4048) stable/main/binary-mips/kvlc_0.8.1.svn20050314-1sarge1_mips.deb stable/main/binary-mips/gvlc_0.8.1.svn20050314-1sarge1_mips.deb stable/main/binary-mips/libvlc0-dev_0.8.1.svn20050314-1sarge1_mips.deb stable/main/binary-mips/vlc-plugin-ggi_0.8.1.svn20050314-1sarge1_mips.deb stable/main/binary-mips/vlc_0.8.1.svn20050314-1sarge1_mips.deb stable/main/binary-mips/gnome-vlc_0.8.1.svn20050314-1sarge1_mips.deb stable/main/binary-mips/vlc-plugin-arts_0.8.1.svn20050314-1sarge1_mips.deb stable/main/binary-mips/vlc-plugin-alsa_0.8.1.svn20050314-1sarge1_mips.deb stable/main/binary-mips/vlc-esd_0.8.1.svn20050314-1sarge1_mips.deb stable/main/binary-mips/vlc-qt_0.8.1.svn20050314-1sarge1_mips.deb stable/main/binary-mips/vlc-sdl_0.8.1.svn20050314-1sarge1_mips.deb stable/main/binary-mips/wxvlc_0.8.1.svn20050314-1sarge1_mips.deb stable/main/binary-mips/vlc-gtk_0.8.1.svn20050314-1sarge1_mips.deb stable/main/binary-mips/vlc-gnome_0.8.1.svn20050314-1sarge1_mips.deb stable/main/binary-mips/mozilla-plugin-vlc_0.8.1.svn20050314-1sarge1_mips.deb stable/main/binary-mips/vlc-plugin-esd_0.8.1.svn20050314-1sarge1_mips.deb stable/main/binary-mips/vlc-alsa_0.8.1.svn20050314-1sarge1_mips.deb stable/main/binary-mips/qvlc_0.8.1.svn20050314-1sarge1_mips.deb stable/main/binary-mips/vlc-plugin-sdl_0.8.1.svn20050314-1sarge1_mips.deb stable/main/binary-mips/vlc-ggi_0.8.1.svn20050314-1sarge1_mips.deb vlc (0.8.1.svn20050314-1sarge1) stable-security; urgency=high * Non-maintainer upload by the Security Team. * Recompile against fixed libavcodec. (CVE-2005-4048) stable/main/binary-m68k/mozilla-plugin-vlc_0.8.1.svn20050314-1sarge1_m68k.deb stable/main/binary-m68k/vlc-gtk_0.8.1.svn20050314-1sarge1_m68k.deb stable/main/binary-m68k/gvlc_0.8.1.svn20050314-1sarge1_m68k.deb stable/main/binary-m68k/wxvlc_0.8.1.svn20050314-1sarge1_m68k.deb stable/main/binary-m68k/qvlc_0.8.1.svn20050314-1sarge1_m68k.deb stable/main/binary-m68k/vlc-alsa_0.8.1.svn20050314-1sarge1_m68k.deb stable/main/binary-m68k/vlc-plugin-alsa_0.8.1.svn20050314-1sarge1_m68k.deb stable/main/binary-m68k/vlc-gnome_0.8.1.svn20050314-1sarge1_m68k.deb stable/main/binary-m68k/vlc-sdl_0.8.1.svn20050314-1sarge1_m68k.deb stable/main/binary-m68k/vlc-plugin-esd_0.8.1.svn20050314-1sarge1_m68k.deb stable/main/binary-m68k/kvlc_0.8.1.svn20050314-1sarge1_m68k.deb stable/main/binary-m68k/vlc-ggi_0.8.1.svn20050314-1sarge1_m68k.deb stable/main/binary-m68k/libvlc0-dev_0.8.1.svn20050314-1sarge1_m68k.deb stable/main/binary-m68k/vlc-qt_0.8.1.svn20050314-1sarge1_m68k.deb stable/main/binary-m68k/vlc-plugin-arts_0.8.1.svn20050314-1sarge1_m68k.deb stable/main/binary-m68k/vlc_0.8.1.svn20050314-1sarge1_m68k.deb stable/main/binary-m68k/vlc-esd_0.8.1.svn20050314-1sarge1_m68k.deb stable/main/binary-m68k/gnome-vlc_0.8.1.svn20050314-1sarge1_m68k.deb stable/main/binary-m68k/vlc-plugin-sdl_0.8.1.svn20050314-1sarge1_m68k.deb stable/main/binary-m68k/vlc-plugin-ggi_0.8.1.svn20050314-1sarge1_m68k.deb vlc (0.8.1.svn20050314-1sarge1) stable-security; urgency=high * Non-maintainer upload by the Security Team. * Recompile against fixed libavcodec. (CVE-2005-4048) stable/main/binary-ia64/vlc-gtk_0.8.1.svn20050314-1sarge1_ia64.deb stable/main/binary-ia64/vlc-plugin-arts_0.8.1.svn20050314-1sarge1_ia64.deb stable/main/binary-ia64/vlc_0.8.1.svn20050314-1sarge1_ia64.deb stable/main/binary-ia64/vlc-ggi_0.8.1.svn20050314-1sarge1_ia64.deb stable/main/binary-ia64/vlc-qt_0.8.1.svn20050314-1sarge1_ia64.deb stable/main/binary-ia64/kvlc_0.8.1.svn20050314-1sarge1_ia64.deb stable/main/binary-ia64/gnome-vlc_0.8.1.svn20050314-1sarge1_ia64.deb stable/main/binary-ia64/vlc-plugin-alsa_0.8.1.svn20050314-1sarge1_ia64.deb stable/main/binary-ia64/vlc-plugin-ggi_0.8.1.svn20050314-1sarge1_ia64.deb stable/main/binary-ia64/libvlc0-dev_0.8.1.svn20050314-1sarge1_ia64.deb stable/main/binary-ia64/qvlc_0.8.1.svn20050314-1sarge1_ia64.deb stable/main/binary-ia64/vlc-sdl_0.8.1.svn20050314-1sarge1_ia64.deb stable/main/binary-ia64/wxvlc_0.8.1.svn20050314-1sarge1_ia64.deb stable/main/binary-ia64/mozilla-plugin-vlc_0.8.1.svn20050314-1sarge1_ia64.deb stable/main/binary-ia64/vlc-plugin-esd_0.8.1.svn20050314-1sarge1_ia64.deb stable/main/binary-ia64/vlc-esd_0.8.1.svn20050314-1sarge1_ia64.deb stable/main/binary-ia64/gvlc_0.8.1.svn20050314-1sarge1_ia64.deb stable/main/binary-ia64/vlc-alsa_0.8.1.svn20050314-1sarge1_ia64.deb stable/main/binary-ia64/vlc-gnome_0.8.1.svn20050314-1sarge1_ia64.deb stable/main/binary-ia64/vlc-plugin-sdl_0.8.1.svn20050314-1sarge1_ia64.deb vlc (0.8.1.svn20050314-1sarge1) stable-security; urgency=high * Non-maintainer upload by the Security Team. * Recompile against fixed libavcodec. (CVE-2005-4048) stable/main/binary-hppa/vlc-ggi_0.8.1.svn20050314-1sarge1_hppa.deb stable/main/binary-hppa/libvlc0-dev_0.8.1.svn20050314-1sarge1_hppa.deb stable/main/binary-hppa/vlc-plugin-esd_0.8.1.svn20050314-1sarge1_hppa.deb stable/main/binary-hppa/vlc-plugin-alsa_0.8.1.svn20050314-1sarge1_hppa.deb stable/main/binary-hppa/vlc-esd_0.8.1.svn20050314-1sarge1_hppa.deb stable/main/binary-hppa/kvlc_0.8.1.svn20050314-1sarge1_hppa.deb stable/main/binary-hppa/vlc-gtk_0.8.1.svn20050314-1sarge1_hppa.deb stable/main/binary-hppa/wxvlc_0.8.1.svn20050314-1sarge1_hppa.deb stable/main/binary-hppa/mozilla-plugin-vlc_0.8.1.svn20050314-1sarge1_hppa.deb stable/main/binary-hppa/qvlc_0.8.1.svn20050314-1sarge1_hppa.deb stable/main/binary-hppa/gnome-vlc_0.8.1.svn20050314-1sarge1_hppa.deb stable/main/binary-hppa/vlc-plugin-ggi_0.8.1.svn20050314-1sarge1_hppa.deb stable/main/binary-hppa/vlc-sdl_0.8.1.svn20050314-1sarge1_hppa.deb stable/main/binary-hppa/vlc-plugin-arts_0.8.1.svn20050314-1sarge1_hppa.deb stable/main/binary-hppa/vlc-plugin-sdl_0.8.1.svn20050314-1sarge1_hppa.deb stable/main/binary-hppa/gvlc_0.8.1.svn20050314-1sarge1_hppa.deb stable/main/binary-hppa/vlc-qt_0.8.1.svn20050314-1sarge1_hppa.deb stable/main/binary-hppa/vlc-alsa_0.8.1.svn20050314-1sarge1_hppa.deb stable/main/binary-hppa/vlc_0.8.1.svn20050314-1sarge1_hppa.deb stable/main/binary-hppa/vlc-gnome_0.8.1.svn20050314-1sarge1_hppa.deb vlc (0.8.1.svn20050314-1sarge1) stable-security; urgency=high * Non-maintainer upload by the Security Team. * Recompile against fixed libavcodec. (CVE-2005-4048) stable/main/binary-arm/mozilla-plugin-vlc_0.8.1.svn20050314-1sarge1_arm.deb stable/main/binary-arm/wxvlc_0.8.1.svn20050314-1sarge1_arm.deb stable/main/binary-arm/vlc-plugin-arts_0.8.1.svn20050314-1sarge1_arm.deb stable/main/binary-arm/vlc-ggi_0.8.1.svn20050314-1sarge1_arm.deb stable/main/binary-arm/vlc-alsa_0.8.1.svn20050314-1sarge1_arm.deb stable/main/binary-arm/vlc_0.8.1.svn20050314-1sarge1_arm.deb stable/main/binary-arm/vlc-plugin-sdl_0.8.1.svn20050314-1sarge1_arm.deb stable/main/binary-arm/gnome-vlc_0.8.1.svn20050314-1sarge1_arm.deb stable/main/binary-arm/vlc-esd_0.8.1.svn20050314-1sarge1_arm.deb stable/main/binary-arm/vlc-sdl_0.8.1.svn20050314-1sarge1_arm.deb stable/main/binary-arm/vlc-gtk_0.8.1.svn20050314-1sarge1_arm.deb stable/main/binary-arm/libvlc0-dev_0.8.1.svn20050314-1sarge1_arm.deb stable/main/binary-arm/kvlc_0.8.1.svn20050314-1sarge1_arm.deb stable/main/binary-arm/vlc-plugin-ggi_0.8.1.svn20050314-1sarge1_arm.deb stable/main/binary-arm/vlc-plugin-esd_0.8.1.svn20050314-1sarge1_arm.deb stable/main/binary-arm/gvlc_0.8.1.svn20050314-1sarge1_arm.deb stable/main/binary-arm/vlc-gnome_0.8.1.svn20050314-1sarge1_arm.deb stable/main/binary-arm/qvlc_0.8.1.svn20050314-1sarge1_arm.deb stable/main/binary-arm/vlc-plugin-alsa_0.8.1.svn20050314-1sarge1_arm.deb stable/main/binary-arm/vlc-qt_0.8.1.svn20050314-1sarge1_arm.deb vlc (0.8.1.svn20050314-1sarge1) stable-security; urgency=high * Non-maintainer upload by the Security Team. * Recompile against fixed libavcodec. (CVE-2005-4048) stable/main/binary-alpha/libvlc0-dev_0.8.1.svn20050314-1sarge1_alpha.deb stable/main/binary-alpha/kvlc_0.8.1.svn20050314-1sarge1_alpha.deb stable/main/binary-alpha/vlc-qt_0.8.1.svn20050314-1sarge1_alpha.deb stable/main/binary-alpha/vlc-alsa_0.8.1.svn20050314-1sarge1_alpha.deb stable/main/binary-alpha/gvlc_0.8.1.svn20050314-1sarge1_alpha.deb stable/main/binary-alpha/vlc-gnome_0.8.1.svn20050314-1sarge1_alpha.deb stable/main/binary-alpha/vlc-plugin-ggi_0.8.1.svn20050314-1sarge1_alpha.deb stable/main/binary-alpha/vlc-plugin-arts_0.8.1.svn20050314-1sarge1_alpha.deb stable/main/binary-alpha/qvlc_0.8.1.svn20050314-1sarge1_alpha.deb stable/main/binary-alpha/wxvlc_0.8.1.svn20050314-1sarge1_alpha.deb stable/main/binary-alpha/gnome-vlc_0.8.1.svn20050314-1sarge1_alpha.deb stable/main/binary-alpha/vlc-ggi_0.8.1.svn20050314-1sarge1_alpha.deb stable/main/binary-alpha/vlc-plugin-sdl_0.8.1.svn20050314-1sarge1_alpha.deb stable/main/binary-alpha/vlc_0.8.1.svn20050314-1sarge1_alpha.deb stable/main/binary-alpha/vlc-gtk_0.8.1.svn20050314-1sarge1_alpha.deb stable/main/binary-alpha/vlc-plugin-esd_0.8.1.svn20050314-1sarge1_alpha.deb stable/main/binary-alpha/vlc-esd_0.8.1.svn20050314-1sarge1_alpha.deb stable/main/binary-alpha/vlc-sdl_0.8.1.svn20050314-1sarge1_alpha.deb stable/main/binary-alpha/mozilla-plugin-vlc_0.8.1.svn20050314-1sarge1_alpha.deb stable/main/binary-alpha/vlc-plugin-alsa_0.8.1.svn20050314-1sarge1_alpha.deb vlc (0.8.1.svn20050314-1sarge1) stable-security; urgency=high * Non-maintainer upload by the Security Team. * Recompile against fixed libavcodec. (CVE-2005-4048) stable/main/binary-i386/gvlc_0.8.1.svn20050314-1sarge1_i386.deb stable/main/binary-i386/vlc-glide_0.8.1.svn20050314-1sarge1_i386.deb stable/main/binary-i386/vlc-plugin-ggi_0.8.1.svn20050314-1sarge1_i386.deb stable/main/binary-i386/vlc-plugin-alsa_0.8.1.svn20050314-1sarge1_i386.deb stable/main/binary-i386/wxvlc_0.8.1.svn20050314-1sarge1_i386.deb stable/main/binary-i386/vlc_0.8.1.svn20050314-1sarge1_i386.deb stable/main/binary-i386/vlc-alsa_0.8.1.svn20050314-1sarge1_i386.deb stable/main/binary-i386/vlc-plugin-glide_0.8.1.svn20050314-1sarge1_i386.deb stable/main/binary-i386/vlc-qt_0.8.1.svn20050314-1sarge1_i386.deb stable/main/binary-i386/vlc-plugin-esd_0.8.1.svn20050314-1sarge1_i386.deb stable/main/source/vlc_0.8.1.svn20050314-1sarge1.dsc stable/main/binary-i386/gnome-vlc_0.8.1.svn20050314-1sarge1_i386.deb stable/main/binary-i386/qvlc_0.8.1.svn20050314-1sarge1_i386.deb stable/main/binary-i386/vlc-esd_0.8.1.svn20050314-1sarge1_i386.deb stable/main/binary-i386/mozilla-plugin-vlc_0.8.1.svn20050314-1sarge1_i386.deb stable/main/binary-i386/libvlc0-dev_0.8.1.svn20050314-1sarge1_i386.deb stable/main/binary-i386/vlc-sdl_0.8.1.svn20050314-1sarge1_i386.deb stable/main/binary-i386/vlc-plugin-sdl_0.8.1.svn20050314-1sarge1_i386.deb stable/main/binary-i386/vlc-plugin-arts_0.8.1.svn20050314-1sarge1_i386.deb stable/main/binary-i386/kvlc_0.8.1.svn20050314-1sarge1_i386.deb stable/main/binary-i386/vlc-gnome_0.8.1.svn20050314-1sarge1_i386.deb stable/main/binary-i386/vlc-plugin-svgalib_0.8.1.svn20050314-1sarge1_i386.deb stable/main/source/vlc_0.8.1.svn20050314-1sarge1.diff.gz stable/main/binary-i386/vlc-ggi_0.8.1.svn20050314-1sarge1_i386.deb stable/main/binary-i386/vlc-gtk_0.8.1.svn20050314-1sarge1_i386.deb vlc (0.8.1.svn20050314-1sarge1) stable-security; urgency=high * Non-maintainer upload by the Security Team. * Recompile against fixed libavcodec. (CVE-2005-4048) stable/main/binary-sparc/util-vserver_0.30.204-5sarge3_sparc.deb util-vserver (0.30.204-5sarge3) stable-security; urgency=high * [CVE-2005-4347]: Barrier code fixed to prohibits chroot escapes when using a 2.4 kernel patched with debian package kernel-patch-vserver 1.9.5.4. If you are using a patched kernel prior to this version, you must update the kernel in addition to these tools. (Closes: #329090) * [CVE-2005-4418]: Default policy fixed to assume all unknown capabilities are insecure, rather than trust unknown capabilities by default. stable/main/binary-s390/util-vserver_0.30.204-5sarge3_s390.deb util-vserver (0.30.204-5sarge3) stable-security; urgency=high * [CVE-2005-4347]: Barrier code fixed to prohibits chroot escapes when using a 2.4 kernel patched with debian package kernel-patch-vserver 1.9.5.4. If you are using a patched kernel prior to this version, you must update the kernel in addition to these tools. (Closes: #329090) * [CVE-2005-4418]: Default policy fixed to assume all unknown capabilities are insecure, rather than trust unknown capabilities by default. stable/main/binary-powerpc/util-vserver_0.30.204-5sarge3_powerpc.deb util-vserver (0.30.204-5sarge3) stable-security; urgency=high * [CVE-2005-4347]: Barrier code fixed to prohibits chroot escapes when using a 2.4 kernel patched with debian package kernel-patch-vserver 1.9.5.4. If you are using a patched kernel prior to this version, you must update the kernel in addition to these tools. (Closes: #329090) * [CVE-2005-4418]: Default policy fixed to assume all unknown capabilities are insecure, rather than trust unknown capabilities by default. stable/main/binary-mipsel/util-vserver_0.30.204-5sarge3_mipsel.deb util-vserver (0.30.204-5sarge3) stable-security; urgency=high * [CVE-2005-4347]: Barrier code fixed to prohibits chroot escapes when using a 2.4 kernel patched with debian package kernel-patch-vserver 1.9.5.4. If you are using a patched kernel prior to this version, you must update the kernel in addition to these tools. (Closes: #329090) * [CVE-2005-4418]: Default policy fixed to assume all unknown capabilities are insecure, rather than trust unknown capabilities by default. stable/main/binary-mips/util-vserver_0.30.204-5sarge3_mips.deb util-vserver (0.30.204-5sarge3) stable-security; urgency=high * [CVE-2005-4347]: Barrier code fixed to prohibits chroot escapes when using a 2.4 kernel patched with debian package kernel-patch-vserver 1.9.5.4. If you are using a patched kernel prior to this version, you must update the kernel in addition to these tools. (Closes: #329090) * [CVE-2005-4418]: Default policy fixed to assume all unknown capabilities are insecure, rather than trust unknown capabilities by default. stable/main/binary-ia64/util-vserver_0.30.204-5sarge3_ia64.deb util-vserver (0.30.204-5sarge3) stable-security; urgency=high * [CVE-2005-4347]: Barrier code fixed to prohibits chroot escapes when using a 2.4 kernel patched with debian package kernel-patch-vserver 1.9.5.4. If you are using a patched kernel prior to this version, you must update the kernel in addition to these tools. (Closes: #329090) * [CVE-2005-4418]: Default policy fixed to assume all unknown capabilities are insecure, rather than trust unknown capabilities by default. stable/main/binary-alpha/util-vserver_0.30.204-5sarge3_alpha.deb util-vserver (0.30.204-5sarge3) stable-security; urgency=high * [CVE-2005-4347]: Barrier code fixed to prohibits chroot escapes when using a 2.4 kernel patched with debian package kernel-patch-vserver 1.9.5.4. If you are using a patched kernel prior to this version, you must update the kernel in addition to these tools. (Closes: #329090) * [CVE-2005-4418]: Default policy fixed to assume all unknown capabilities are insecure, rather than trust unknown capabilities by default. stable/main/source/util-vserver_0.30.204-5sarge3.dsc stable/main/binary-i386/util-vserver_0.30.204-5sarge3_i386.deb stable/main/source/util-vserver_0.30.204-5sarge3.diff.gz util-vserver (0.30.204-5sarge3) stable-security; urgency=high * [CVE-2005-4347]: Barrier code fixed to prohibits chroot escapes when using a 2.4 kernel patched with debian package kernel-patch-vserver 1.9.5.4. If you are using a patched kernel prior to this version, you must update the kernel in addition to these tools. (Closes: #329090) * [CVE-2005-4418]: Default policy fixed to assume all unknown capabilities are insecure, rather than trust unknown capabilities by default. stable/main/binary-sparc/unzip_5.52-1sarge4_sparc.deb unzip (5.52-1sarge4) stable-security; urgency=medium * Fixed CVE-2005-4667 (buffer overflow on insanely long filenames). Backported from unzip-5.52-7. stable/main/binary-s390/unzip_5.52-1sarge4_s390.deb unzip (5.52-1sarge4) stable-security; urgency=medium * Fixed CVE-2005-4667 (buffer overflow on insanely long filenames). Backported from unzip-5.52-7. stable/main/binary-mipsel/unzip_5.52-1sarge4_mipsel.deb unzip (5.52-1sarge4) stable-security; urgency=medium * Fixed CVE-2005-4667 (buffer overflow on insanely long filenames). Backported from unzip-5.52-7. stable/main/binary-mips/unzip_5.52-1sarge4_mips.deb unzip (5.52-1sarge4) stable-security; urgency=medium * Fixed CVE-2005-4667 (buffer overflow on insanely long filenames). Backported from unzip-5.52-7. stable/main/binary-m68k/unzip_5.52-1sarge4_m68k.deb unzip (5.52-1sarge4) stable-security; urgency=medium * Fixed CVE-2005-4667 (buffer overflow on insanely long filenames). Backported from unzip-5.52-7. stable/main/binary-ia64/unzip_5.52-1sarge4_ia64.deb unzip (5.52-1sarge4) stable-security; urgency=medium * Fixed CVE-2005-4667 (buffer overflow on insanely long filenames). Backported from unzip-5.52-7. stable/main/binary-i386/unzip_5.52-1sarge4_i386.deb unzip (5.52-1sarge4) stable-security; urgency=medium * Fixed CVE-2005-4667 (buffer overflow on insanely long filenames). Backported from unzip-5.52-7. stable/main/binary-hppa/unzip_5.52-1sarge4_hppa.deb unzip (5.52-1sarge4) stable-security; urgency=medium * Fixed CVE-2005-4667 (buffer overflow on insanely long filenames). Backported from unzip-5.52-7. stable/main/binary-arm/unzip_5.52-1sarge4_arm.deb unzip (5.52-1sarge4) stable-security; urgency=medium * Fixed CVE-2005-4667 (buffer overflow on insanely long filenames). Backported from unzip-5.52-7. stable/main/binary-alpha/unzip_5.52-1sarge4_alpha.deb unzip (5.52-1sarge4) stable-security; urgency=medium * Fixed CVE-2005-4667 (buffer overflow on insanely long filenames). Backported from unzip-5.52-7. stable/main/source/unzip_5.52-1sarge4.diff.gz stable/main/binary-powerpc/unzip_5.52-1sarge4_powerpc.deb stable/main/source/unzip_5.52-1sarge4.dsc unzip (5.52-1sarge4) stable-security; urgency=medium * Fixed CVE-2005-4667 (buffer overflow on insanely long filenames). Backported from unzip-5.52-7. stable/main/binary-sparc/unalz_0.30.1_sparc.deb unalz (0.30.1) stable-security; urgency=high * Non-maintainer upload by the Security Team * Fix buffer overflow in file name handling, discovered by Ulf Härnhammar (CVE-2005-3862) stable/main/binary-s390/unalz_0.30.1_s390.deb unalz (0.30.1) stable-security; urgency=high * Non-maintainer upload by the Security Team * Fix buffer overflow in file name handling, discovered by Ulf Härnhammar (CVE-2005-3862) stable/main/binary-powerpc/unalz_0.30.1_powerpc.deb unalz (0.30.1) stable-security; urgency=high * Non-maintainer upload by the Security Team * Fix buffer overflow in file name handling, discovered by Ulf Härnhammar (CVE-2005-3862) stable/main/binary-mipsel/unalz_0.30.1_mipsel.deb unalz (0.30.1) stable-security; urgency=high * Non-maintainer upload by the Security Team * Fix buffer overflow in file name handling, discovered by Ulf Härnhammar (CVE-2005-3862) stable/main/binary-mips/unalz_0.30.1_mips.deb unalz (0.30.1) stable-security; urgency=high * Non-maintainer upload by the Security Team * Fix buffer overflow in file name handling, discovered by Ulf Härnhammar (CVE-2005-3862) stable/main/binary-m68k/unalz_0.30.1_m68k.deb unalz (0.30.1) stable-security; urgency=high * Non-maintainer upload by the Security Team * Fix buffer overflow in file name handling, discovered by Ulf Härnhammar (CVE-2005-3862) stable/main/binary-ia64/unalz_0.30.1_ia64.deb unalz (0.30.1) stable-security; urgency=high * Non-maintainer upload by the Security Team * Fix buffer overflow in file name handling, discovered by Ulf Härnhammar (CVE-2005-3862) stable/main/binary-hppa/unalz_0.30.1_hppa.deb unalz (0.30.1) stable-security; urgency=high * Non-maintainer upload by the Security Team * Fix buffer overflow in file name handling, discovered by Ulf Härnhammar (CVE-2005-3862) stable/main/binary-arm/unalz_0.30.1_arm.deb unalz (0.30.1) stable-security; urgency=high * Non-maintainer upload by the Security Team * Fix buffer overflow in file name handling, discovered by Ulf Härnhammar (CVE-2005-3862) stable/main/binary-alpha/unalz_0.30.1_alpha.deb unalz (0.30.1) stable-security; urgency=high * Non-maintainer upload by the Security Team * Fix buffer overflow in file name handling, discovered by Ulf Härnhammar (CVE-2005-3862) stable/main/binary-i386/unalz_0.30.1_i386.deb stable/main/source/unalz_0.30.1.tar.gz stable/main/source/unalz_0.30.1.dsc unalz (0.30.1) stable-security; urgency=high * Non-maintainer upload by the Security Team * Fix buffer overflow in file name handling, discovered by Ulf Härnhammar (CVE-2005-3862) stable/main/binary-sparc/tuxpaint_0.9.14-2sarge0_sparc.deb tuxpaint (1:0.9.14-2sarge0) stable-security; urgency=high * Non-maintainer upload by The Security Team. * Fixed the insecure use of temporary files in the tuxpaint-import script. [CVE-2005-3340] stable/main/binary-s390/tuxpaint_0.9.14-2sarge0_s390.deb tuxpaint (1:0.9.14-2sarge0) stable-security; urgency=high * Non-maintainer upload by The Security Team. * Fixed the insecure use of temporary files in the tuxpaint-import script. [CVE-2005-3340] stable/main/binary-powerpc/tuxpaint_0.9.14-2sarge0_powerpc.deb tuxpaint (1:0.9.14-2sarge0) stable-security; urgency=high * Non-maintainer upload by The Security Team. * Fixed the insecure use of temporary files in the tuxpaint-import script. [CVE-2005-3340] stable/main/binary-mipsel/tuxpaint_0.9.14-2sarge0_mipsel.deb tuxpaint (1:0.9.14-2sarge0) stable-security; urgency=high * Non-maintainer upload by The Security Team. * Fixed the insecure use of temporary files in the tuxpaint-import script. [CVE-2005-3340] stable/main/binary-mips/tuxpaint_0.9.14-2sarge0_mips.deb tuxpaint (1:0.9.14-2sarge0) stable-security; urgency=high * Non-maintainer upload by The Security Team. * Fixed the insecure use of temporary files in the tuxpaint-import script. [CVE-2005-3340] stable/main/binary-m68k/tuxpaint_0.9.14-2sarge0_m68k.deb tuxpaint (1:0.9.14-2sarge0) stable-security; urgency=high * Non-maintainer upload by The Security Team. * Fixed the insecure use of temporary files in the tuxpaint-import script. [CVE-2005-3340] stable/main/binary-ia64/tuxpaint_0.9.14-2sarge0_ia64.deb tuxpaint (1:0.9.14-2sarge0) stable-security; urgency=high * Non-maintainer upload by The Security Team. * Fixed the insecure use of temporary files in the tuxpaint-import script. [CVE-2005-3340] stable/main/binary-hppa/tuxpaint_0.9.14-2sarge0_hppa.deb tuxpaint (1:0.9.14-2sarge0) stable-security; urgency=high * Non-maintainer upload by The Security Team. * Fixed the insecure use of temporary files in the tuxpaint-import script. [CVE-2005-3340] stable/main/binary-arm/tuxpaint_0.9.14-2sarge0_arm.deb tuxpaint (1:0.9.14-2sarge0) stable-security; urgency=high * Non-maintainer upload by The Security Team. * Fixed the insecure use of temporary files in the tuxpaint-import script. [CVE-2005-3340] stable/main/binary-alpha/tuxpaint_0.9.14-2sarge0_alpha.deb tuxpaint (1:0.9.14-2sarge0) stable-security; urgency=high * Non-maintainer upload by The Security Team. * Fixed the insecure use of temporary files in the tuxpaint-import script. [CVE-2005-3340] stable/main/source/tuxpaint_0.9.14-2sarge0.diff.gz stable/main/source/tuxpaint_0.9.14-2sarge0.dsc stable/main/binary-all/tuxpaint-data_0.9.14-2sarge0_all.deb stable/main/binary-i386/tuxpaint_0.9.14-2sarge0_i386.deb tuxpaint (1:0.9.14-2sarge0) stable-security; urgency=high * Non-maintainer upload by The Security Team. * Fixed the insecure use of temporary files in the tuxpaint-import script. [CVE-2005-3340] stable/main/source/tutos_1.1.20031017-2+1sarge1.dsc stable/main/binary-all/tutos_1.1.20031017-2+1sarge1_all.deb stable/main/source/tutos_1.1.20031017-2+1sarge1.tar.gz tutos (1.1.20031017-2+1sarge1) stable-security; urgency=high * Non-maintainer upload by the Security Team * Applied patches to solve CVE-2004-2161 and CVE-2004-2162 (Closes: #318633) stable/main/source/trac_0.8.1-3sarge4.dsc stable/main/source/trac_0.8.1-3sarge4.diff.gz stable/main/binary-all/trac_0.8.1-3sarge4_all.deb trac (0.8.1-3sarge4) stable-security; urgency=high * debian/patches/11_fixsearch.diff: Fix regression of search feature included in last security upload. stable/main/source/tkdiff_4.0.2-1sarge1.dsc stable/main/source/tkdiff_4.0.2-1sarge1.diff.gz stable/main/binary-all/tkdiff_4.0.2-1sarge1_all.deb tkdiff (1:4.0.2-1sarge1) stable-security; urgency=high * working fix from tkdiff-4.0.2-4 rather than my earlier broken one that Steve used (closes: #345010) * Fix insecure temporary file usage. [CVE-2005-3343]. stable/main/binary-sparc/libkpathsea-dev_2.0.2-30sarge4_sparc.deb stable/main/binary-sparc/libkpathsea3_2.0.2-30sarge4_sparc.deb stable/main/binary-sparc/tetex-bin_2.0.2-30sarge4_sparc.deb tetex-bin (2.0.2-30sarge4) stable-security; urgency=high * Non-maintainer upload by the Security Team * Added more precautionary checks by Dirk Müller [xpdf/Stream.cc, xpdf/JBIG2Stream.cc, debian/patches/patch-CVE-2005-3191] stable/main/binary-s390/tetex-bin_2.0.2-30sarge4_s390.deb stable/main/binary-s390/libkpathsea-dev_2.0.2-30sarge4_s390.deb stable/main/binary-s390/libkpathsea3_2.0.2-30sarge4_s390.deb tetex-bin (2.0.2-30sarge4) stable-security; urgency=high * Non-maintainer upload by the Security Team * Added more precautionary checks by Dirk Müller [xpdf/Stream.cc, xpdf/JBIG2Stream.cc, debian/patches/patch-CVE-2005-3191] stable/main/binary-mipsel/libkpathsea-dev_2.0.2-30sarge4_mipsel.deb stable/main/binary-mipsel/tetex-bin_2.0.2-30sarge4_mipsel.deb stable/main/binary-mipsel/libkpathsea3_2.0.2-30sarge4_mipsel.deb tetex-bin (2.0.2-30sarge4) stable-security; urgency=high * Non-maintainer upload by the Security Team * Added more precautionary checks by Dirk Müller [xpdf/Stream.cc, xpdf/JBIG2Stream.cc, debian/patches/patch-CVE-2005-3191] stable/main/binary-mips/tetex-bin_2.0.2-30sarge4_mips.deb stable/main/binary-mips/libkpathsea-dev_2.0.2-30sarge4_mips.deb stable/main/binary-mips/libkpathsea3_2.0.2-30sarge4_mips.deb tetex-bin (2.0.2-30sarge4) stable-security; urgency=high * Non-maintainer upload by the Security Team * Added more precautionary checks by Dirk Müller [xpdf/Stream.cc, xpdf/JBIG2Stream.cc, debian/patches/patch-CVE-2005-3191] stable/main/binary-m68k/tetex-bin_2.0.2-30sarge4_m68k.deb stable/main/binary-m68k/libkpathsea3_2.0.2-30sarge4_m68k.deb stable/main/binary-m68k/libkpathsea-dev_2.0.2-30sarge4_m68k.deb tetex-bin (2.0.2-30sarge4) stable-security; urgency=high * Non-maintainer upload by the Security Team * Added more precautionary checks by Dirk Müller [xpdf/Stream.cc, xpdf/JBIG2Stream.cc, debian/patches/patch-CVE-2005-3191] stable/main/binary-ia64/tetex-bin_2.0.2-30sarge4_ia64.deb stable/main/binary-ia64/libkpathsea-dev_2.0.2-30sarge4_ia64.deb stable/main/binary-ia64/libkpathsea3_2.0.2-30sarge4_ia64.deb tetex-bin (2.0.2-30sarge4) stable-security; urgency=high * Non-maintainer upload by the Security Team * Added more precautionary checks by Dirk Müller [xpdf/Stream.cc, xpdf/JBIG2Stream.cc, debian/patches/patch-CVE-2005-3191] stable/main/binary-i386/libkpathsea3_2.0.2-30sarge4_i386.deb stable/main/binary-i386/libkpathsea-dev_2.0.2-30sarge4_i386.deb stable/main/binary-i386/tetex-bin_2.0.2-30sarge4_i386.deb tetex-bin (2.0.2-30sarge4) stable-security; urgency=high * Non-maintainer upload by the Security Team * Added more precautionary checks by Dirk Müller [xpdf/Stream.cc, xpdf/JBIG2Stream.cc, debian/patches/patch-CVE-2005-3191] stable/main/binary-hppa/libkpathsea-dev_2.0.2-30sarge4_hppa.deb stable/main/binary-hppa/libkpathsea3_2.0.2-30sarge4_hppa.deb stable/main/binary-hppa/tetex-bin_2.0.2-30sarge4_hppa.deb tetex-bin (2.0.2-30sarge4) stable-security; urgency=high * Non-maintainer upload by the Security Team * Added more precautionary checks by Dirk Müller [xpdf/Stream.cc, xpdf/JBIG2Stream.cc, debian/patches/patch-CVE-2005-3191] stable/main/binary-arm/libkpathsea3_2.0.2-30sarge4_arm.deb stable/main/binary-arm/libkpathsea-dev_2.0.2-30sarge4_arm.deb stable/main/binary-arm/tetex-bin_2.0.2-30sarge4_arm.deb tetex-bin (2.0.2-30sarge4) stable-security; urgency=high * Non-maintainer upload by the Security Team * Added more precautionary checks by Dirk Müller [xpdf/Stream.cc, xpdf/JBIG2Stream.cc, debian/patches/patch-CVE-2005-3191] stable/main/binary-alpha/tetex-bin_2.0.2-30sarge4_alpha.deb stable/main/binary-alpha/libkpathsea-dev_2.0.2-30sarge4_alpha.deb stable/main/binary-alpha/libkpathsea3_2.0.2-30sarge4_alpha.deb tetex-bin (2.0.2-30sarge4) stable-security; urgency=high * Non-maintainer upload by the Security Team * Added more precautionary checks by Dirk Müller [xpdf/Stream.cc, xpdf/JBIG2Stream.cc, debian/patches/patch-CVE-2005-3191] stable/main/binary-powerpc/libkpathsea3_2.0.2-30sarge4_powerpc.deb stable/main/binary-powerpc/tetex-bin_2.0.2-30sarge4_powerpc.deb stable/main/binary-powerpc/libkpathsea-dev_2.0.2-30sarge4_powerpc.deb stable/main/source/tetex-bin_2.0.2-30sarge4.diff.gz stable/main/source/tetex-bin_2.0.2-30sarge4.dsc tetex-bin (2.0.2-30sarge4) stable-security; urgency=high * Non-maintainer upload by the Security Team * Added more precautionary checks by Dirk Müller [xpdf/Stream.cc, xpdf/JBIG2Stream.cc, debian/patches/patch-CVE-2005-3191] stable/main/binary-sparc/tar_1.14-2.2_sparc.deb tar (1.14-2.2) stable; urgency=low * Non-maintainer upload by the Stable Release Team * Set enviroment variable RSH="/usr/bin/rsh" to get rmt working again. stable/main/binary-s390/tar_1.14-2.2_s390.deb tar (1.14-2.2) stable; urgency=low * Non-maintainer upload by the Stable Release Team * Set enviroment variable RSH="/usr/bin/rsh" to get rmt working again. stable/main/binary-powerpc/tar_1.14-2.2_powerpc.deb tar (1.14-2.2) stable; urgency=low * Non-maintainer upload by the Stable Release Team * Set enviroment variable RSH="/usr/bin/rsh" to get rmt working again. stable/main/binary-mipsel/tar_1.14-2.2_mipsel.deb tar (1.14-2.2) stable; urgency=low * Non-maintainer upload by the Stable Release Team * Set enviroment variable RSH="/usr/bin/rsh" to get rmt working again. stable/main/binary-mips/tar_1.14-2.2_mips.deb tar (1.14-2.2) stable; urgency=low * Non-maintainer upload by the Stable Release Team * Set enviroment variable RSH="/usr/bin/rsh" to get rmt working again. stable/main/binary-m68k/tar_1.14-2.2_m68k.deb tar (1.14-2.2) stable; urgency=low * Non-maintainer upload by the Stable Release Team * Set enviroment variable RSH="/usr/bin/rsh" to get rmt working again. stable/main/binary-ia64/tar_1.14-2.2_ia64.deb tar (1.14-2.2) stable; urgency=low * Non-maintainer upload by the Stable Release Team * Set enviroment variable RSH="/usr/bin/rsh" to get rmt working again. stable/main/binary-hppa/tar_1.14-2.2_hppa.deb tar (1.14-2.2) stable; urgency=low * Non-maintainer upload by the Stable Release Team * Set enviroment variable RSH="/usr/bin/rsh" to get rmt working again. stable/main/binary-arm/tar_1.14-2.2_arm.deb tar (1.14-2.2) stable; urgency=low * Non-maintainer upload by the Stable Release Team * Set enviroment variable RSH="/usr/bin/rsh" to get rmt working again. stable/main/binary-alpha/tar_1.14-2.2_alpha.deb tar (1.14-2.2) stable; urgency=low * Non-maintainer upload by the Stable Release Team * Set enviroment variable RSH="/usr/bin/rsh" to get rmt working again. stable/main/source/tar_1.14-2.2.dsc stable/main/binary-i386/tar_1.14-2.2_i386.deb stable/main/source/tar_1.14-2.2.diff.gz tar (1.14-2.2) stable; urgency=low * Non-maintainer upload by the Stable Release Team * Set enviroment variable RSH="/usr/bin/rsh" to get rmt working again. stable/main/binary-sparc/sudo_1.6.8p7-1.4_sparc.deb sudo (1.6.8p7-1.4) stable-security; urgency=medium * Non-maintainer upload by the Security Team * Reworked the former patch to limit environment variables from being passed through, set env_reset as default instead [sudo.c, env.c, sudoers.pod, Bug#342948, CVE-2005-4158] * env_reset is now set by default * env_reset will preserve only HOME, LOGNAME, PATH, SHELL, TERM, DISPLAY, XAUTHORITY, XAUTHORIZATION, LANG, LANGUAGE, LC_*, and USER (in addition to the SUDO_* variables) * Rebuild sudoers.man.in from the POD file * Added README.Debian stable/main/binary-s390/sudo_1.6.8p7-1.4_s390.deb sudo (1.6.8p7-1.4) stable-security; urgency=medium * Non-maintainer upload by the Security Team * Reworked the former patch to limit environment variables from being passed through, set env_reset as default instead [sudo.c, env.c, sudoers.pod, Bug#342948, CVE-2005-4158] * env_reset is now set by default * env_reset will preserve only HOME, LOGNAME, PATH, SHELL, TERM, DISPLAY, XAUTHORITY, XAUTHORIZATION, LANG, LANGUAGE, LC_*, and USER (in addition to the SUDO_* variables) * Rebuild sudoers.man.in from the POD file * Added README.Debian stable/main/binary-powerpc/sudo_1.6.8p7-1.4_powerpc.deb sudo (1.6.8p7-1.4) stable-security; urgency=medium * Non-maintainer upload by the Security Team * Reworked the former patch to limit environment variables from being passed through, set env_reset as default instead [sudo.c, env.c, sudoers.pod, Bug#342948, CVE-2005-4158] * env_reset is now set by default * env_reset will preserve only HOME, LOGNAME, PATH, SHELL, TERM, DISPLAY, XAUTHORITY, XAUTHORIZATION, LANG, LANGUAGE, LC_*, and USER (in addition to the SUDO_* variables) * Rebuild sudoers.man.in from the POD file * Added README.Debian stable/main/binary-mipsel/sudo_1.6.8p7-1.4_mipsel.deb sudo (1.6.8p7-1.4) stable-security; urgency=medium * Non-maintainer upload by the Security Team * Reworked the former patch to limit environment variables from being passed through, set env_reset as default instead [sudo.c, env.c, sudoers.pod, Bug#342948, CVE-2005-4158] * env_reset is now set by default * env_reset will preserve only HOME, LOGNAME, PATH, SHELL, TERM, DISPLAY, XAUTHORITY, XAUTHORIZATION, LANG, LANGUAGE, LC_*, and USER (in addition to the SUDO_* variables) * Rebuild sudoers.man.in from the POD file * Added README.Debian stable/main/binary-mips/sudo_1.6.8p7-1.4_mips.deb sudo (1.6.8p7-1.4) stable-security; urgency=medium * Non-maintainer upload by the Security Team * Reworked the former patch to limit environment variables from being passed through, set env_reset as default instead [sudo.c, env.c, sudoers.pod, Bug#342948, CVE-2005-4158] * env_reset is now set by default * env_reset will preserve only HOME, LOGNAME, PATH, SHELL, TERM, DISPLAY, XAUTHORITY, XAUTHORIZATION, LANG, LANGUAGE, LC_*, and USER (in addition to the SUDO_* variables) * Rebuild sudoers.man.in from the POD file * Added README.Debian stable/main/binary-m68k/sudo_1.6.8p7-1.4_m68k.deb sudo (1.6.8p7-1.4) stable-security; urgency=medium * Non-maintainer upload by the Security Team * Reworked the former patch to limit environment variables from being passed through, set env_reset as default instead [sudo.c, env.c, sudoers.pod, Bug#342948, CVE-2005-4158] * env_reset is now set by default * env_reset will preserve only HOME, LOGNAME, PATH, SHELL, TERM, DISPLAY, XAUTHORITY, XAUTHORIZATION, LANG, LANGUAGE, LC_*, and USER (in addition to the SUDO_* variables) * Rebuild sudoers.man.in from the POD file * Added README.Debian stable/main/binary-ia64/sudo_1.6.8p7-1.4_ia64.deb sudo (1.6.8p7-1.4) stable-security; urgency=medium * Non-maintainer upload by the Security Team * Reworked the former patch to limit environment variables from being passed through, set env_reset as default instead [sudo.c, env.c, sudoers.pod, Bug#342948, CVE-2005-4158] * env_reset is now set by default * env_reset will preserve only HOME, LOGNAME, PATH, SHELL, TERM, DISPLAY, XAUTHORITY, XAUTHORIZATION, LANG, LANGUAGE, LC_*, and USER (in addition to the SUDO_* variables) * Rebuild sudoers.man.in from the POD file * Added README.Debian stable/main/binary-hppa/sudo_1.6.8p7-1.4_hppa.deb sudo (1.6.8p7-1.4) stable-security; urgency=medium * Non-maintainer upload by the Security Team * Reworked the former patch to limit environment variables from being passed through, set env_reset as default instead [sudo.c, env.c, sudoers.pod, Bug#342948, CVE-2005-4158] * env_reset is now set by default * env_reset will preserve only HOME, LOGNAME, PATH, SHELL, TERM, DISPLAY, XAUTHORITY, XAUTHORIZATION, LANG, LANGUAGE, LC_*, and USER (in addition to the SUDO_* variables) * Rebuild sudoers.man.in from the POD file * Added README.Debian stable/main/binary-arm/sudo_1.6.8p7-1.4_arm.deb sudo (1.6.8p7-1.4) stable-security; urgency=medium * Non-maintainer upload by the Security Team * Reworked the former patch to limit environment variables from being passed through, set env_reset as default instead [sudo.c, env.c, sudoers.pod, Bug#342948, CVE-2005-4158] * env_reset is now set by default * env_reset will preserve only HOME, LOGNAME, PATH, SHELL, TERM, DISPLAY, XAUTHORITY, XAUTHORIZATION, LANG, LANGUAGE, LC_*, and USER (in addition to the SUDO_* variables) * Rebuild sudoers.man.in from the POD file * Added README.Debian stable/main/binary-alpha/sudo_1.6.8p7-1.4_alpha.deb sudo (1.6.8p7-1.4) stable-security; urgency=medium * Non-maintainer upload by the Security Team * Reworked the former patch to limit environment variables from being passed through, set env_reset as default instead [sudo.c, env.c, sudoers.pod, Bug#342948, CVE-2005-4158] * env_reset is now set by default * env_reset will preserve only HOME, LOGNAME, PATH, SHELL, TERM, DISPLAY, XAUTHORITY, XAUTHORIZATION, LANG, LANGUAGE, LC_*, and USER (in addition to the SUDO_* variables) * Rebuild sudoers.man.in from the POD file * Added README.Debian stable/main/binary-i386/sudo_1.6.8p7-1.4_i386.deb stable/main/source/sudo_1.6.8p7-1.4.dsc stable/main/source/sudo_1.6.8p7-1.4.diff.gz sudo (1.6.8p7-1.4) stable-security; urgency=medium * Non-maintainer upload by the Security Team * Reworked the former patch to limit environment variables from being passed through, set env_reset as default instead [sudo.c, env.c, sudoers.pod, Bug#342948, CVE-2005-4158] * env_reset is now set by default * env_reset will preserve only HOME, LOGNAME, PATH, SHELL, TERM, DISPLAY, XAUTHORITY, XAUTHORIZATION, LANG, LANGUAGE, LC_*, and USER (in addition to the SUDO_* variables) * Rebuild sudoers.man.in from the POD file * Added README.Debian stable/main/source/storebackup_1.18.4-2sarge1.diff.gz stable/main/source/storebackup_1.18.4-2sarge1.dsc stable/main/binary-all/storebackup_1.18.4-2sarge1_all.deb storebackup (1.18.4-2sarge1) stable-security; urgency=high * Non-maintainer upload by the Security Team: - Fixed insecure temp file handling in storeBackup.pl (CVE-2005-3146) - Do not create backup root directory world-readable. (CVE-2005-3147) - Fixed incorrect passing of symlinks' gid/uid to chown(1) (CVE-2005-3148) stable/main/source/squirrelmail_1.4.4-8.dsc stable/main/binary-all/squirrelmail_1.4.4-8_all.deb stable/main/source/squirrelmail_1.4.4-8.diff.gz squirrelmail (2:1.4.4-8) stable-security; urgency=high * Fix IMAP command injection in sqimap_mailbox_select with upstream patch. [CVE-2006-0377] (Closes: #354063) * Fix possible XSS in MagicHTML, concerning the parsing of u\rl and comments in styles. Internet Explorer specific. [CVE-2006-0195] (Closes: #354062) * Fix possible cross site scripting through the right_main parameter of webmail.php. This now uses a whitelist of acceptable values. [CVE-2006-0188] (Closes: #354064, #355424) stable/main/binary-sparc/sodipodi_0.34-0.1sarge1_sparc.deb sodipodi (0.34-0.1sarge1) stable; urgency=low * Added patch to stop segfaulting on 64-bit platforms (See #287925). stable/main/binary-s390/sodipodi_0.34-0.1sarge1_s390.deb sodipodi (0.34-0.1sarge1) stable; urgency=low * Added patch to stop segfaulting on 64-bit platforms (See #287925). stable/main/binary-mipsel/sodipodi_0.34-0.1sarge1_mipsel.deb sodipodi (0.34-0.1sarge1) stable; urgency=low * Added patch to stop segfaulting on 64-bit platforms (See #287925). stable/main/binary-mips/sodipodi_0.34-0.1sarge1_mips.deb sodipodi (0.34-0.1sarge1) stable; urgency=low * Added patch to stop segfaulting on 64-bit platforms (See #287925). stable/main/binary-m68k/sodipodi_0.34-0.1sarge1_m68k.deb sodipodi (0.34-0.1sarge1) stable; urgency=low * Added patch to stop segfaulting on 64-bit platforms (See #287925). stable/main/binary-ia64/sodipodi_0.34-0.1sarge1_ia64.deb sodipodi (0.34-0.1sarge1) stable; urgency=low * Added patch to stop segfaulting on 64-bit platforms (See #287925). stable/main/binary-i386/sodipodi_0.34-0.1sarge1_i386.deb sodipodi (0.34-0.1sarge1) stable; urgency=low * Added patch to stop segfaulting on 64-bit platforms (See #287925). stable/main/binary-hppa/sodipodi_0.34-0.1sarge1_hppa.deb sodipodi (0.34-0.1sarge1) stable; urgency=low * Added patch to stop segfaulting on 64-bit platforms (See #287925). stable/main/binary-arm/sodipodi_0.34-0.1sarge1_arm.deb sodipodi (0.34-0.1sarge1) stable; urgency=low * Added patch to stop segfaulting on 64-bit platforms (See #287925). stable/main/binary-alpha/sodipodi_0.34-0.1sarge1_alpha.deb sodipodi (0.34-0.1sarge1) stable; urgency=low * Added patch to stop segfaulting on 64-bit platforms (See #287925). stable/main/binary-powerpc/sodipodi_0.34-0.1sarge1_powerpc.deb stable/main/source/sodipodi_0.34-0.1sarge1.diff.gz stable/main/source/sodipodi_0.34-0.1sarge1.dsc sodipodi (0.34-0.1sarge1) stable; urgency=low * Added patch to stop segfaulting on 64-bit platforms (See #287925). stable/main/binary-sparc/snmptrapfmt_1.08sarge1_sparc.deb snmptrapfmt (1.08sarge1) stable-security; urgency=high * Non-maintainer upload by the Security Team * Fixed insecure temporary log file [log.c, CVE-2006-0050] stable/main/binary-s390/snmptrapfmt_1.08sarge1_s390.deb snmptrapfmt (1.08sarge1) stable-security; urgency=high * Non-maintainer upload by the Security Team * Fixed insecure temporary log file [log.c, CVE-2006-0050] stable/main/binary-mipsel/snmptrapfmt_1.08sarge1_mipsel.deb snmptrapfmt (1.08sarge1) stable-security; urgency=high * Non-maintainer upload by the Security Team * Fixed insecure temporary log file [log.c, CVE-2006-0050] stable/main/binary-mips/snmptrapfmt_1.08sarge1_mips.deb snmptrapfmt (1.08sarge1) stable-security; urgency=high * Non-maintainer upload by the Security Team * Fixed insecure temporary log file [log.c, CVE-2006-0050] stable/main/binary-m68k/snmptrapfmt_1.08sarge1_m68k.deb snmptrapfmt (1.08sarge1) stable-security; urgency=high * Non-maintainer upload by the Security Team * Fixed insecure temporary log file [log.c, CVE-2006-0050] stable/main/binary-ia64/snmptrapfmt_1.08sarge1_ia64.deb snmptrapfmt (1.08sarge1) stable-security; urgency=high * Non-maintainer upload by the Security Team * Fixed insecure temporary log file [log.c, CVE-2006-0050] stable/main/binary-i386/snmptrapfmt_1.08sarge1_i386.deb snmptrapfmt (1.08sarge1) stable-security; urgency=high * Non-maintainer upload by the Security Team * Fixed insecure temporary log file [log.c, CVE-2006-0050] stable/main/binary-hppa/snmptrapfmt_1.08sarge1_hppa.deb snmptrapfmt (1.08sarge1) stable-security; urgency=high * Non-maintainer upload by the Security Team * Fixed insecure temporary log file [log.c, CVE-2006-0050] stable/main/binary-arm/snmptrapfmt_1.08sarge1_arm.deb snmptrapfmt (1.08sarge1) stable-security; urgency=high * Non-maintainer upload by the Security Team * Fixed insecure temporary log file [log.c, CVE-2006-0050] stable/main/binary-alpha/snmptrapfmt_1.08sarge1_alpha.deb snmptrapfmt (1.08sarge1) stable-security; urgency=high * Non-maintainer upload by the Security Team * Fixed insecure temporary log file [log.c, CVE-2006-0050] stable/main/source/snmptrapfmt_1.08sarge1.dsc stable/main/binary-powerpc/snmptrapfmt_1.08sarge1_powerpc.deb stable/main/source/snmptrapfmt_1.08sarge1.tar.gz snmptrapfmt (1.08sarge1) stable-security; urgency=high * Non-maintainer upload by the Security Team * Fixed insecure temporary log file [log.c, CVE-2006-0050] stable/main/binary-sparc/smstools_1.14.8-1sarge0_sparc.deb smstools (1.14.8-1sarge0) stable; urgency=high * Non-maintainer upload by The Security Team. * Fix format string vulnerability in the logging functions. [CVE-2006-0083] stable/main/binary-s390/smstools_1.14.8-1sarge0_s390.deb smstools (1.14.8-1sarge0) stable; urgency=high * Non-maintainer upload by The Security Team. * Fix format string vulnerability in the logging functions. [CVE-2006-0083] stable/main/binary-powerpc/smstools_1.14.8-1sarge0_powerpc.deb smstools (1.14.8-1sarge0) stable; urgency=high * Non-maintainer upload by The Security Team. * Fix format string vulnerability in the logging functions. [CVE-2006-0083] stable/main/binary-mipsel/smstools_1.14.8-1sarge0_mipsel.deb smstools (1.14.8-1sarge0) stable; urgency=high * Non-maintainer upload by The Security Team. * Fix format string vulnerability in the logging functions. [CVE-2006-0083] stable/main/binary-mips/smstools_1.14.8-1sarge0_mips.deb smstools (1.14.8-1sarge0) stable; urgency=high * Non-maintainer upload by The Security Team. * Fix format string vulnerability in the logging functions. [CVE-2006-0083] stable/main/binary-m68k/smstools_1.14.8-1sarge0_m68k.deb smstools (1.14.8-1sarge0) stable; urgency=high * Non-maintainer upload by The Security Team. * Fix format string vulnerability in the logging functions. [CVE-2006-0083] stable/main/binary-ia64/smstools_1.14.8-1sarge0_ia64.deb smstools (1.14.8-1sarge0) stable; urgency=high * Non-maintainer upload by The Security Team. * Fix format string vulnerability in the logging functions. [CVE-2006-0083] stable/main/binary-hppa/smstools_1.14.8-1sarge0_hppa.deb smstools (1.14.8-1sarge0) stable; urgency=high * Non-maintainer upload by The Security Team. * Fix format string vulnerability in the logging functions. [CVE-2006-0083] stable/main/binary-arm/smstools_1.14.8-1sarge0_arm.deb smstools (1.14.8-1sarge0) stable; urgency=high * Non-maintainer upload by The Security Team. * Fix format string vulnerability in the logging functions. [CVE-2006-0083] stable/main/binary-alpha/smstools_1.14.8-1sarge0_alpha.deb smstools (1.14.8-1sarge0) stable; urgency=high * Non-maintainer upload by The Security Team. * Fix format string vulnerability in the logging functions. [CVE-2006-0083] stable/main/source/smstools_1.14.8-1sarge0.diff.gz stable/main/source/smstools_1.14.8-1sarge0.dsc stable/main/binary-i386/smstools_1.14.8-1sarge0_i386.deb smstools (1.14.8-1sarge0) stable; urgency=high * Non-maintainer upload by The Security Team. * Fix format string vulnerability in the logging functions. [CVE-2006-0083] stable/main/source/slune_1.0.7-1sarge1.dsc stable/main/source/slune_1.0.7-1sarge1.diff.gz stable/main/binary-all/slune_1.0.7-1sarge1_all.deb slune (1.0.7-1sarge1) stable-security; urgency=high * Security fix (related to #326976)(py2play fix had to be propagated to avoid breaking slune entirely). stable/main/binary-sparc/sendmail-bin_8.13.4-3sarge1_sparc.deb stable/main/binary-sparc/libmilter-dev_8.13.4-3sarge1_sparc.deb stable/main/binary-sparc/libmilter0_8.13.4-3sarge1_sparc.deb stable/main/binary-sparc/sensible-mda_8.13.4-3sarge1_sparc.deb stable/main/binary-sparc/rmail_8.13.4-3sarge1_sparc.deb sendmail (8.13.4-3sarge1) stable-security; urgency=high * Non-maintainer upload by the Security Team * Applied upstream patch to fix remote command execution [debian/patches/8.13/8.13.4/z_CVE-2006-0058.patch, VU#834865] stable/main/binary-s390/libmilter-dev_8.13.4-3sarge1_s390.deb stable/main/binary-s390/rmail_8.13.4-3sarge1_s390.deb stable/main/binary-s390/libmilter0_8.13.4-3sarge1_s390.deb stable/main/binary-s390/sendmail-bin_8.13.4-3sarge1_s390.deb stable/main/binary-s390/sensible-mda_8.13.4-3sarge1_s390.deb sendmail (8.13.4-3sarge1) stable-security; urgency=high * Non-maintainer upload by the Security Team * Applied upstream patch to fix remote command execution [debian/patches/8.13/8.13.4/z_CVE-2006-0058.patch, VU#834865] stable/main/binary-powerpc/sendmail-bin_8.13.4-3sarge1_powerpc.deb stable/main/binary-powerpc/libmilter0_8.13.4-3sarge1_powerpc.deb stable/main/binary-powerpc/rmail_8.13.4-3sarge1_powerpc.deb stable/main/binary-powerpc/libmilter-dev_8.13.4-3sarge1_powerpc.deb stable/main/binary-powerpc/sensible-mda_8.13.4-3sarge1_powerpc.deb sendmail (8.13.4-3sarge1) stable-security; urgency=high * Non-maintainer upload by the Security Team * Applied upstream patch to fix remote command execution [debian/patches/8.13/8.13.4/z_CVE-2006-0058.patch, VU#834865] stable/main/binary-mipsel/rmail_8.13.4-3sarge1_mipsel.deb stable/main/binary-mipsel/libmilter0_8.13.4-3sarge1_mipsel.deb stable/main/binary-mipsel/sensible-mda_8.13.4-3sarge1_mipsel.deb stable/main/binary-mipsel/libmilter-dev_8.13.4-3sarge1_mipsel.deb stable/main/binary-mipsel/sendmail-bin_8.13.4-3sarge1_mipsel.deb sendmail (8.13.4-3sarge1) stable-security; urgency=high * Non-maintainer upload by the Security Team * Applied upstream patch to fix remote command execution [debian/patches/8.13/8.13.4/z_CVE-2006-0058.patch, VU#834865] stable/main/binary-mips/rmail_8.13.4-3sarge1_mips.deb stable/main/binary-mips/libmilter-dev_8.13.4-3sarge1_mips.deb stable/main/binary-mips/libmilter0_8.13.4-3sarge1_mips.deb stable/main/binary-mips/sendmail-bin_8.13.4-3sarge1_mips.deb stable/main/binary-mips/sensible-mda_8.13.4-3sarge1_mips.deb sendmail (8.13.4-3sarge1) stable-security; urgency=high * Non-maintainer upload by the Security Team * Applied upstream patch to fix remote command execution [debian/patches/8.13/8.13.4/z_CVE-2006-0058.patch, VU#834865] stable/main/binary-m68k/rmail_8.13.4-3sarge1_m68k.deb stable/main/binary-m68k/sensible-mda_8.13.4-3sarge1_m68k.deb stable/main/binary-m68k/sendmail-bin_8.13.4-3sarge1_m68k.deb stable/main/binary-m68k/libmilter0_8.13.4-3sarge1_m68k.deb stable/main/binary-m68k/libmilter-dev_8.13.4-3sarge1_m68k.deb sendmail (8.13.4-3sarge1) stable-security; urgency=high * Non-maintainer upload by the Security Team * Applied upstream patch to fix remote command execution [debian/patches/8.13/8.13.4/z_CVE-2006-0058.patch, VU#834865] stable/main/binary-ia64/libmilter0_8.13.4-3sarge1_ia64.deb stable/main/binary-ia64/libmilter-dev_8.13.4-3sarge1_ia64.deb stable/main/binary-ia64/rmail_8.13.4-3sarge1_ia64.deb stable/main/binary-ia64/sensible-mda_8.13.4-3sarge1_ia64.deb stable/main/binary-ia64/sendmail-bin_8.13.4-3sarge1_ia64.deb sendmail (8.13.4-3sarge1) stable-security; urgency=high * Non-maintainer upload by the Security Team * Applied upstream patch to fix remote command execution [debian/patches/8.13/8.13.4/z_CVE-2006-0058.patch, VU#834865] stable/main/binary-hppa/libmilter-dev_8.13.4-3sarge1_hppa.deb stable/main/binary-hppa/sendmail-bin_8.13.4-3sarge1_hppa.deb stable/main/binary-hppa/sensible-mda_8.13.4-3sarge1_hppa.deb stable/main/binary-hppa/libmilter0_8.13.4-3sarge1_hppa.deb stable/main/binary-hppa/rmail_8.13.4-3sarge1_hppa.deb sendmail (8.13.4-3sarge1) stable-security; urgency=high * Non-maintainer upload by the Security Team * Applied upstream patch to fix remote command execution [debian/patches/8.13/8.13.4/z_CVE-2006-0058.patch, VU#834865] stable/main/binary-arm/libmilter-dev_8.13.4-3sarge1_arm.deb stable/main/binary-arm/sensible-mda_8.13.4-3sarge1_arm.deb stable/main/binary-arm/rmail_8.13.4-3sarge1_arm.deb stable/main/binary-arm/sendmail-bin_8.13.4-3sarge1_arm.deb stable/main/binary-arm/libmilter0_8.13.4-3sarge1_arm.deb sendmail (8.13.4-3sarge1) stable-security; urgency=high * Non-maintainer upload by the Security Team * Applied upstream patch to fix remote command execution [debian/patches/8.13/8.13.4/z_CVE-2006-0058.patch, VU#834865] stable/main/binary-alpha/libmilter-dev_8.13.4-3sarge1_alpha.deb stable/main/binary-alpha/rmail_8.13.4-3sarge1_alpha.deb stable/main/binary-alpha/sensible-mda_8.13.4-3sarge1_alpha.deb stable/main/binary-alpha/sendmail-bin_8.13.4-3sarge1_alpha.deb stable/main/binary-alpha/libmilter0_8.13.4-3sarge1_alpha.deb sendmail (8.13.4-3sarge1) stable-security; urgency=high * Non-maintainer upload by the Security Team * Applied upstream patch to fix remote command execution [debian/patches/8.13/8.13.4/z_CVE-2006-0058.patch, VU#834865] stable/main/binary-i386/sendmail-bin_8.13.4-3sarge1_i386.deb stable/main/binary-i386/rmail_8.13.4-3sarge1_i386.deb stable/main/binary-all/sendmail-base_8.13.4-3sarge1_all.deb stable/main/binary-all/sendmail-doc_8.13.4-3sarge1_all.deb stable/main/binary-i386/libmilter-dev_8.13.4-3sarge1_i386.deb stable/main/source/sendmail_8.13.4-3sarge1.dsc stable/main/binary-i386/sensible-mda_8.13.4-3sarge1_i386.deb stable/main/binary-all/sendmail-cf_8.13.4-3sarge1_all.deb stable/main/binary-i386/libmilter0_8.13.4-3sarge1_i386.deb stable/main/source/sendmail_8.13.4-3sarge1.diff.gz stable/main/binary-all/sendmail_8.13.4-3sarge1_all.deb sendmail (8.13.4-3sarge1) stable-security; urgency=high * Non-maintainer upload by the Security Team * Applied upstream patch to fix remote command execution [debian/patches/8.13/8.13.4/z_CVE-2006-0058.patch, VU#834865] stable/main/binary-sparc/scponly_4.0-1sarge1_sparc.deb scponly (4.0-1sarge1) stable-security; urgency=high * Non-maintainer upload by the Security Team * Applied patch by Max Vozeller to fix root vulnerability [scponly.c, Bug#344418, CVE-2005-4532] stable/main/binary-s390/scponly_4.0-1sarge1_s390.deb scponly (4.0-1sarge1) stable-security; urgency=high * Non-maintainer upload by the Security Team * Applied patch by Max Vozeller to fix root vulnerability [scponly.c, Bug#344418, CVE-2005-4532] stable/main/binary-mipsel/scponly_4.0-1sarge1_mipsel.deb scponly (4.0-1sarge1) stable-security; urgency=high * Non-maintainer upload by the Security Team * Applied patch by Max Vozeller to fix root vulnerability [scponly.c, Bug#344418, CVE-2005-4532] stable/main/binary-mips/scponly_4.0-1sarge1_mips.deb scponly (4.0-1sarge1) stable-security; urgency=high * Non-maintainer upload by the Security Team * Applied patch by Max Vozeller to fix root vulnerability [scponly.c, Bug#344418, CVE-2005-4532] stable/main/binary-m68k/scponly_4.0-1sarge1_m68k.deb scponly (4.0-1sarge1) stable-security; urgency=high * Non-maintainer upload by the Security Team * Applied patch by Max Vozeller to fix root vulnerability [scponly.c, Bug#344418, CVE-2005-4532] stable/main/binary-ia64/scponly_4.0-1sarge1_ia64.deb scponly (4.0-1sarge1) stable-security; urgency=high * Non-maintainer upload by the Security Team * Applied patch by Max Vozeller to fix root vulnerability [scponly.c, Bug#344418, CVE-2005-4532] stable/main/binary-i386/scponly_4.0-1sarge1_i386.deb scponly (4.0-1sarge1) stable-security; urgency=high * Non-maintainer upload by the Security Team * Applied patch by Max Vozeller to fix root vulnerability [scponly.c, Bug#344418, CVE-2005-4532] stable/main/binary-hppa/scponly_4.0-1sarge1_hppa.deb scponly (4.0-1sarge1) stable-security; urgency=high * Non-maintainer upload by the Security Team * Applied patch by Max Vozeller to fix root vulnerability [scponly.c, Bug#344418, CVE-2005-4532] stable/main/binary-arm/scponly_4.0-1sarge1_arm.deb scponly (4.0-1sarge1) stable-security; urgency=high * Non-maintainer upload by the Security Team * Applied patch by Max Vozeller to fix root vulnerability [scponly.c, Bug#344418, CVE-2005-4532] stable/main/binary-alpha/scponly_4.0-1sarge1_alpha.deb scponly (4.0-1sarge1) stable-security; urgency=high * Non-maintainer upload by the Security Team * Applied patch by Max Vozeller to fix root vulnerability [scponly.c, Bug#344418, CVE-2005-4532] stable/main/source/scponly_4.0-1sarge1.diff.gz stable/main/source/scponly_4.0-1sarge1.dsc stable/main/binary-powerpc/scponly_4.0-1sarge1_powerpc.deb scponly (4.0-1sarge1) stable-security; urgency=high * Non-maintainer upload by the Security Team * Applied patch by Max Vozeller to fix root vulnerability [scponly.c, Bug#344418, CVE-2005-4532] stable/main/binary-sparc/sash_3.7-5sarge1_sparc.deb sash (3.7-5sarge1) stable-security; urgency=high * Non-maintainer upload by the Security Team. * Force recompile against zlib with security fixes (CVE-2005-1849, CVE-2005-2096) stable/main/binary-s390/sash_3.7-5sarge1_s390.deb sash (3.7-5sarge1) stable-security; urgency=high * Non-maintainer upload by the Security Team. * Force recompile against zlib with security fixes (CVE-2005-1849, CVE-2005-2096) stable/main/binary-powerpc/sash_3.7-5sarge1_powerpc.deb sash (3.7-5sarge1) stable-security; urgency=high * Non-maintainer upload by the Security Team. * Force recompile against zlib with security fixes (CVE-2005-1849, CVE-2005-2096) stable/main/binary-mipsel/sash_3.7-5sarge1_mipsel.deb sash (3.7-5sarge1) stable-security; urgency=high * Non-maintainer upload by the Security Team. * Force recompile against zlib with security fixes (CVE-2005-1849, CVE-2005-2096) stable/main/binary-mips/sash_3.7-5sarge1_mips.deb sash (3.7-5sarge1) stable-security; urgency=high * Non-maintainer upload by the Security Team. * Force recompile against zlib with security fixes (CVE-2005-1849, CVE-2005-2096) stable/main/binary-m68k/sash_3.7-5sarge1_m68k.deb sash (3.7-5sarge1) stable-security; urgency=high * Non-maintainer upload by the Security Team. * Force recompile against zlib with security fixes (CVE-2005-1849, CVE-2005-2096) stable/main/binary-ia64/sash_3.7-5sarge1_ia64.deb sash (3.7-5sarge1) stable-security; urgency=high * Non-maintainer upload by the Security Team. * Force recompile against zlib with security fixes (CVE-2005-1849, CVE-2005-2096) stable/main/binary-hppa/sash_3.7-5sarge1_hppa.deb sash (3.7-5sarge1) stable-security; urgency=high * Non-maintainer upload by the Security Team. * Force recompile against zlib with security fixes (CVE-2005-1849, CVE-2005-2096) stable/main/binary-arm/sash_3.7-5sarge1_arm.deb sash (3.7-5sarge1) stable-security; urgency=high * Non-maintainer upload by the Security Team. * Force recompile against zlib with security fixes (CVE-2005-1849, CVE-2005-2096) stable/main/binary-alpha/sash_3.7-5sarge1_alpha.deb sash (3.7-5sarge1) stable-security; urgency=high * Non-maintainer upload by the Security Team. * Force recompile against zlib with security fixes (CVE-2005-1849, CVE-2005-2096) stable/main/binary-i386/sash_3.7-5sarge1_i386.deb stable/main/source/sash_3.7-5sarge1.diff.gz stable/main/source/sash_3.7-5sarge1.dsc sash (3.7-5sarge1) stable-security; urgency=high * Non-maintainer upload by the Security Team. * Force recompile against zlib with security fixes (CVE-2005-1849, CVE-2005-2096) stable/main/binary-sparc/rssh_2.2.3-1.sarge.1_sparc.deb rssh (2.2.3-1.sarge.1) stable-security; urgency=high * Security fix: CVE-2005-3345. stable/main/binary-s390/rssh_2.2.3-1.sarge.1_s390.deb rssh (2.2.3-1.sarge.1) stable-security; urgency=high * Security fix: CVE-2005-3345. stable/main/binary-powerpc/rssh_2.2.3-1.sarge.1_powerpc.deb rssh (2.2.3-1.sarge.1) stable-security; urgency=high * Security fix: CVE-2005-3345. stable/main/binary-mipsel/rssh_2.2.3-1.sarge.1_mipsel.deb rssh (2.2.3-1.sarge.1) stable-security; urgency=high * Security fix: CVE-2005-3345. stable/main/binary-mips/rssh_2.2.3-1.sarge.1_mips.deb rssh (2.2.3-1.sarge.1) stable-security; urgency=high * Security fix: CVE-2005-3345. stable/main/binary-m68k/rssh_2.2.3-1.sarge.1_m68k.deb rssh (2.2.3-1.sarge.1) stable-security; urgency=high * Security fix: CVE-2005-3345. stable/main/binary-ia64/rssh_2.2.3-1.sarge.1_ia64.deb rssh (2.2.3-1.sarge.1) stable-security; urgency=high * Security fix: CVE-2005-3345. stable/main/binary-hppa/rssh_2.2.3-1.sarge.1_hppa.deb rssh (2.2.3-1.sarge.1) stable-security; urgency=high * Security fix: CVE-2005-3345. stable/main/binary-arm/rssh_2.2.3-1.sarge.1_arm.deb rssh (2.2.3-1.sarge.1) stable-security; urgency=high * Security fix: CVE-2005-3345. stable/main/binary-alpha/rssh_2.2.3-1.sarge.1_alpha.deb rssh (2.2.3-1.sarge.1) stable-security; urgency=high * Security fix: CVE-2005-3345. stable/main/binary-i386/rssh_2.2.3-1.sarge.1_i386.deb stable/main/source/rssh_2.2.3-1.sarge.1.diff.gz stable/main/source/rssh_2.2.3-1.sarge.1.dsc rssh (2.2.3-1.sarge.1) stable-security; urgency=high * Security fix: CVE-2005-3345. stable/main/source/py2play_0.1.7-1sarge1.dsc stable/main/source/py2play_0.1.7-1sarge1.diff.gz stable/main/binary-all/python-2play_0.1.7-1sarge1_all.deb py2play (0.1.7-1sarge1) stable-security; urgency=high * Non-maintainer upload by the Security Team * Ported upstream patch to 0.1.8 and removed all networking code [__init__.py, action.py, player.py, CAN-2005-2875] stable/main/binary-sparc/pound_1.8.2-1sarge1_sparc.deb pound (1.8.2-1sarge1) stable-security; urgency=high * Non maintainer upload by the Security Team: * Fix buffer overflow, which could be triggered through overly long Host: headers. (CVE-2005-1391) * Fix HTTP request smuggling vulnerability. (CVE-2005-3751) stable/main/binary-s390/pound_1.8.2-1sarge1_s390.deb pound (1.8.2-1sarge1) stable-security; urgency=high * Non maintainer upload by the Security Team: * Fix buffer overflow, which could be triggered through overly long Host: headers. (CVE-2005-1391) * Fix HTTP request smuggling vulnerability. (CVE-2005-3751) stable/main/binary-powerpc/pound_1.8.2-1sarge1_powerpc.deb pound (1.8.2-1sarge1) stable-security; urgency=high * Non maintainer upload by the Security Team: * Fix buffer overflow, which could be triggered through overly long Host: headers. (CVE-2005-1391) * Fix HTTP request smuggling vulnerability. (CVE-2005-3751) stable/main/binary-mipsel/pound_1.8.2-1sarge1_mipsel.deb pound (1.8.2-1sarge1) stable-security; urgency=high * Non maintainer upload by the Security Team: * Fix buffer overflow, which could be triggered through overly long Host: headers. (CVE-2005-1391) * Fix HTTP request smuggling vulnerability. (CVE-2005-3751) stable/main/binary-mips/pound_1.8.2-1sarge1_mips.deb pound (1.8.2-1sarge1) stable-security; urgency=high * Non maintainer upload by the Security Team: * Fix buffer overflow, which could be triggered through overly long Host: headers. (CVE-2005-1391) * Fix HTTP request smuggling vulnerability. (CVE-2005-3751) stable/main/binary-m68k/pound_1.8.2-1sarge1_m68k.deb pound (1.8.2-1sarge1) stable-security; urgency=high * Non maintainer upload by the Security Team: * Fix buffer overflow, which could be triggered through overly long Host: headers. (CVE-2005-1391) * Fix HTTP request smuggling vulnerability. (CVE-2005-3751) stable/main/binary-ia64/pound_1.8.2-1sarge1_ia64.deb pound (1.8.2-1sarge1) stable-security; urgency=high * Non maintainer upload by the Security Team: * Fix buffer overflow, which could be triggered through overly long Host: headers. (CVE-2005-1391) * Fix HTTP request smuggling vulnerability. (CVE-2005-3751) stable/main/binary-hppa/pound_1.8.2-1sarge1_hppa.deb pound (1.8.2-1sarge1) stable-security; urgency=high * Non maintainer upload by the Security Team: * Fix buffer overflow, which could be triggered through overly long Host: headers. (CVE-2005-1391) * Fix HTTP request smuggling vulnerability. (CVE-2005-3751) stable/main/binary-arm/pound_1.8.2-1sarge1_arm.deb pound (1.8.2-1sarge1) stable-security; urgency=high * Non maintainer upload by the Security Team: * Fix buffer overflow, which could be triggered through overly long Host: headers. (CVE-2005-1391) * Fix HTTP request smuggling vulnerability. (CVE-2005-3751) stable/main/binary-alpha/pound_1.8.2-1sarge1_alpha.deb pound (1.8.2-1sarge1) stable-security; urgency=high * Non maintainer upload by the Security Team: * Fix buffer overflow, which could be triggered through overly long Host: headers. (CVE-2005-1391) * Fix HTTP request smuggling vulnerability. (CVE-2005-3751) stable/main/source/pound_1.8.2-1sarge1.dsc stable/main/source/pound_1.8.2-1sarge1.diff.gz stable/main/binary-i386/pound_1.8.2-1sarge1_i386.deb pound (1.8.2-1sarge1) stable-security; urgency=high * Non maintainer upload by the Security Team: * Fix buffer overflow, which could be triggered through overly long Host: headers. (CVE-2005-1391) * Fix HTTP request smuggling vulnerability. (CVE-2005-3751) stable/main/binary-all/phpbb2_2.0.13-6sarge2_all.deb stable/main/source/phpbb2_2.0.13+1-6sarge2.diff.gz stable/main/binary-all/phpbb2-conf-mysql_2.0.13-6sarge2_all.deb stable/main/source/phpbb2_2.0.13+1-6sarge2.dsc stable/main/binary-all/phpbb2-languages_2.0.13-6sarge2_all.deb phpbb2 (2.0.13+1-6sarge2) stable-security; urgency=high * Security update by phpBB maintainers * Backport fixes for the following issues announced by upstream and independent researchers (Closes: #336582, #336587, #335662): - fixed validation of topic type when posting. - fixed potential to select images outside the specified path as avatars or smilies. - fixed ability to edit PM's you did not send. - CVE-2005-3419, CVE-2005-3420: fixed inadquate signature field input sanitising, which allowed for arbitrary code execution - CVE-2005-3310: compare imagetype on avatar uploading to match the file extension from uploaded file. Additionally, the following three issues are fixed, though they are only a threat when running with the heavily discouraged register_globals = off setting: - CVE-2005-3415: bypass protection mechanisms that deregister global variables by setting both a GPC variable and a GLOBALS[] variable. - CVE-2005-3416: bypass security checks by setting the $_SESSION and $HTTP_SESSION_VARS variables to strings instead of arrays. - CVE-2005-3418: Multiple cross-site scripting (XSS) vulnerabilities. stable/main/binary-sparc/petris_1.0.1-4sarge0_sparc.deb petris (1.0.1-4sarge0) stable-security; urgency=high * Non-maintainer upload by The Security Team. * Fix a buffer overflow of environmental variable when processing highscores. [CVE-2005-3540] stable/main/binary-s390/petris_1.0.1-4sarge0_s390.deb petris (1.0.1-4sarge0) stable-security; urgency=high * Non-maintainer upload by The Security Team. * Fix a buffer overflow of environmental variable when processing highscores. [CVE-2005-3540] stable/main/binary-powerpc/petris_1.0.1-4sarge0_powerpc.deb petris (1.0.1-4sarge0) stable-security; urgency=high * Non-maintainer upload by The Security Team. * Fix a buffer overflow of environmental variable when processing highscores. [CVE-2005-3540] stable/main/binary-mipsel/petris_1.0.1-4sarge0_mipsel.deb petris (1.0.1-4sarge0) stable-security; urgency=high * Non-maintainer upload by The Security Team. * Fix a buffer overflow of environmental variable when processing highscores. [CVE-2005-3540] stable/main/binary-mips/petris_1.0.1-4sarge0_mips.deb petris (1.0.1-4sarge0) stable-security; urgency=high * Non-maintainer upload by The Security Team. * Fix a buffer overflow of environmental variable when processing highscores. [CVE-2005-3540] stable/main/binary-m68k/petris_1.0.1-4sarge0_m68k.deb petris (1.0.1-4sarge0) stable-security; urgency=high * Non-maintainer upload by The Security Team. * Fix a buffer overflow of environmental variable when processing highscores. [CVE-2005-3540] stable/main/binary-ia64/petris_1.0.1-4sarge0_ia64.deb petris (1.0.1-4sarge0) stable-security; urgency=high * Non-maintainer upload by The Security Team. * Fix a buffer overflow of environmental variable when processing highscores. [CVE-2005-3540] stable/main/binary-hppa/petris_1.0.1-4sarge0_hppa.deb petris (1.0.1-4sarge0) stable-security; urgency=high * Non-maintainer upload by The Security Team. * Fix a buffer overflow of environmental variable when processing highscores. [CVE-2005-3540] stable/main/binary-arm/petris_1.0.1-4sarge0_arm.deb petris (1.0.1-4sarge0) stable-security; urgency=high * Non-maintainer upload by The Security Team. * Fix a buffer overflow of environmental variable when processing highscores. [CVE-2005-3540] stable/main/binary-alpha/petris_1.0.1-4sarge0_alpha.deb petris (1.0.1-4sarge0) stable-security; urgency=high * Non-maintainer upload by The Security Team. * Fix a buffer overflow of environmental variable when processing highscores. [CVE-2005-3540] stable/main/binary-i386/petris_1.0.1-4sarge0_i386.deb stable/main/source/petris_1.0.1-4sarge0.diff.gz stable/main/source/petris_1.0.1-4sarge0.dsc petris (1.0.1-4sarge0) stable-security; urgency=high * Non-maintainer upload by The Security Team. * Fix a buffer overflow of environmental variable when processing highscores. [CVE-2005-3540] stable/main/binary-s390/libperl-dev_5.8.4-8sarge4_s390.deb stable/main/binary-s390/libperl5.8_5.8.4-8sarge4_s390.deb stable/main/binary-s390/perl-suid_5.8.4-8sarge4_s390.deb stable/main/binary-s390/perl-debug_5.8.4-8sarge4_s390.deb stable/main/binary-s390/perl_5.8.4-8sarge4_s390.deb stable/main/binary-s390/perl-base_5.8.4-8sarge4_s390.deb perl (5.8.4-8sarge4) stable; urgency=low * Don't generate broken md5sums for libperl5.8 (closes: #354466). * Preserve timestamps in /usr/share/doc. * Fix problem with utf8/taint interaction (thanks to Steinar Gunderson for analysis/patch). * Fix test of reenterant function return values which was causing perl to malloc itself to death if ERANGE was encountered before ENOENT (such as a long line in /etc/group; see: #227621). stable/main/binary-powerpc/perl-debug_5.8.4-8sarge4_powerpc.deb stable/main/binary-powerpc/libperl5.8_5.8.4-8sarge4_powerpc.deb stable/main/binary-powerpc/perl-base_5.8.4-8sarge4_powerpc.deb stable/main/binary-powerpc/perl_5.8.4-8sarge4_powerpc.deb stable/main/binary-powerpc/perl-suid_5.8.4-8sarge4_powerpc.deb stable/main/binary-powerpc/libperl-dev_5.8.4-8sarge4_powerpc.deb perl (5.8.4-8sarge4) stable; urgency=low * Don't generate broken md5sums for libperl5.8 (closes: #354466). * Preserve timestamps in /usr/share/doc. * Fix problem with utf8/taint interaction (thanks to Steinar Gunderson for analysis/patch). * Fix test of reenterant function return values which was causing perl to malloc itself to death if ERANGE was encountered before ENOENT (such as a long line in /etc/group; see: #227621). stable/main/binary-mipsel/perl_5.8.4-8sarge4_mipsel.deb stable/main/binary-mipsel/perl-suid_5.8.4-8sarge4_mipsel.deb stable/main/binary-mipsel/perl-debug_5.8.4-8sarge4_mipsel.deb stable/main/binary-mipsel/perl-base_5.8.4-8sarge4_mipsel.deb stable/main/binary-mipsel/libperl-dev_5.8.4-8sarge4_mipsel.deb stable/main/binary-mipsel/libperl5.8_5.8.4-8sarge4_mipsel.deb perl (5.8.4-8sarge4) stable; urgency=low * Don't generate broken md5sums for libperl5.8 (closes: #354466). * Preserve timestamps in /usr/share/doc. * Fix problem with utf8/taint interaction (thanks to Steinar Gunderson for analysis/patch). * Fix test of reenterant function return values which was causing perl to malloc itself to death if ERANGE was encountered before ENOENT (such as a long line in /etc/group; see: #227621). stable/main/binary-mips/perl-debug_5.8.4-8sarge4_mips.deb stable/main/binary-mips/perl-suid_5.8.4-8sarge4_mips.deb stable/main/binary-mips/perl-base_5.8.4-8sarge4_mips.deb stable/main/binary-mips/libperl-dev_5.8.4-8sarge4_mips.deb stable/main/binary-mips/libperl5.8_5.8.4-8sarge4_mips.deb stable/main/binary-mips/perl_5.8.4-8sarge4_mips.deb perl (5.8.4-8sarge4) stable; urgency=low * Don't generate broken md5sums for libperl5.8 (closes: #354466). * Preserve timestamps in /usr/share/doc. * Fix problem with utf8/taint interaction (thanks to Steinar Gunderson for analysis/patch). * Fix test of reenterant function return values which was causing perl to malloc itself to death if ERANGE was encountered before ENOENT (such as a long line in /etc/group; see: #227621). stable/main/binary-m68k/libperl-dev_5.8.4-8sarge4_m68k.deb stable/main/binary-m68k/perl-base_5.8.4-8sarge4_m68k.deb stable/main/binary-m68k/libperl5.8_5.8.4-8sarge4_m68k.deb stable/main/binary-m68k/perl-suid_5.8.4-8sarge4_m68k.deb stable/main/binary-m68k/perl-debug_5.8.4-8sarge4_m68k.deb stable/main/binary-m68k/perl_5.8.4-8sarge4_m68k.deb perl (5.8.4-8sarge4) stable; urgency=low * Don't generate broken md5sums for libperl5.8 (closes: #354466). * Preserve timestamps in /usr/share/doc. * Fix problem with utf8/taint interaction (thanks to Steinar Gunderson for analysis/patch). * Fix test of reenterant function return values which was causing perl to malloc itself to death if ERANGE was encountered before ENOENT (such as a long line in /etc/group; see: #227621). stable/main/binary-ia64/libperl-dev_5.8.4-8sarge4_ia64.deb stable/main/binary-ia64/perl-base_5.8.4-8sarge4_ia64.deb stable/main/binary-ia64/perl-debug_5.8.4-8sarge4_ia64.deb stable/main/binary-ia64/perl-suid_5.8.4-8sarge4_ia64.deb stable/main/binary-ia64/libperl5.8_5.8.4-8sarge4_ia64.deb stable/main/binary-ia64/perl_5.8.4-8sarge4_ia64.deb perl (5.8.4-8sarge4) stable; urgency=low * Don't generate broken md5sums for libperl5.8 (closes: #354466). * Preserve timestamps in /usr/share/doc. * Fix problem with utf8/taint interaction (thanks to Steinar Gunderson for analysis/patch). * Fix test of reenterant function return values which was causing perl to malloc itself to death if ERANGE was encountered before ENOENT (such as a long line in /etc/group; see: #227621). stable/main/binary-i386/perl_5.8.4-8sarge4_i386.deb stable/main/binary-i386/perl-suid_5.8.4-8sarge4_i386.deb stable/main/binary-i386/perl-debug_5.8.4-8sarge4_i386.deb stable/main/binary-i386/perl-base_5.8.4-8sarge4_i386.deb stable/main/binary-i386/libperl5.8_5.8.4-8sarge4_i386.deb stable/main/binary-i386/libperl-dev_5.8.4-8sarge4_i386.deb perl (5.8.4-8sarge4) stable; urgency=low * Don't generate broken md5sums for libperl5.8 (closes: #354466). * Preserve timestamps in /usr/share/doc. * Fix problem with utf8/taint interaction (thanks to Steinar Gunderson for analysis/patch). * Fix test of reenterant function return values which was causing perl to malloc itself to death if ERANGE was encountered before ENOENT (such as a long line in /etc/group; see: #227621). stable/main/binary-hppa/libperl5.8_5.8.4-8sarge4_hppa.deb stable/main/binary-hppa/perl-debug_5.8.4-8sarge4_hppa.deb stable/main/binary-hppa/perl-base_5.8.4-8sarge4_hppa.deb stable/main/binary-hppa/perl_5.8.4-8sarge4_hppa.deb stable/main/binary-hppa/perl-suid_5.8.4-8sarge4_hppa.deb stable/main/binary-hppa/libperl-dev_5.8.4-8sarge4_hppa.deb perl (5.8.4-8sarge4) stable; urgency=low * Don't generate broken md5sums for libperl5.8 (closes: #354466). * Preserve timestamps in /usr/share/doc. * Fix problem with utf8/taint interaction (thanks to Steinar Gunderson for analysis/patch). * Fix test of reenterant function return values which was causing perl to malloc itself to death if ERANGE was encountered before ENOENT (such as a long line in /etc/group; see: #227621). stable/main/binary-arm/perl-debug_5.8.4-8sarge4_arm.deb stable/main/binary-arm/libperl-dev_5.8.4-8sarge4_arm.deb stable/main/binary-arm/perl-suid_5.8.4-8sarge4_arm.deb stable/main/binary-arm/libperl5.8_5.8.4-8sarge4_arm.deb stable/main/binary-arm/perl-base_5.8.4-8sarge4_arm.deb stable/main/binary-arm/perl_5.8.4-8sarge4_arm.deb perl (5.8.4-8sarge4) stable; urgency=low * Don't generate broken md5sums for libperl5.8 (closes: #354466). * Preserve timestamps in /usr/share/doc. * Fix problem with utf8/taint interaction (thanks to Steinar Gunderson for analysis/patch). * Fix test of reenterant function return values which was causing perl to malloc itself to death if ERANGE was encountered before ENOENT (such as a long line in /etc/group; see: #227621). stable/main/binary-alpha/libperl-dev_5.8.4-8sarge4_alpha.deb stable/main/binary-alpha/perl-suid_5.8.4-8sarge4_alpha.deb stable/main/binary-alpha/libperl5.8_5.8.4-8sarge4_alpha.deb stable/main/binary-alpha/perl_5.8.4-8sarge4_alpha.deb stable/main/binary-alpha/perl-debug_5.8.4-8sarge4_alpha.deb stable/main/binary-alpha/perl-base_5.8.4-8sarge4_alpha.deb perl (5.8.4-8sarge4) stable; urgency=low * Don't generate broken md5sums for libperl5.8 (closes: #354466). * Preserve timestamps in /usr/share/doc. * Fix problem with utf8/taint interaction (thanks to Steinar Gunderson for analysis/patch). * Fix test of reenterant function return values which was causing perl to malloc itself to death if ERANGE was encountered before ENOENT (such as a long line in /etc/group; see: #227621). stable/main/binary-sparc/libperl5.8_5.8.4-8sarge4_sparc.deb stable/main/binary-sparc/perl-base_5.8.4-8sarge4_sparc.deb stable/main/binary-all/perl-modules_5.8.4-8sarge4_all.deb stable/main/binary-all/libcgi-fast-perl_5.8.4-8sarge4_all.deb stable/main/binary-sparc/perl_5.8.4-8sarge4_sparc.deb stable/main/source/perl_5.8.4-8sarge4.diff.gz stable/main/binary-all/perl-doc_5.8.4-8sarge4_all.deb stable/main/source/perl_5.8.4-8sarge4.dsc stable/main/binary-sparc/perl-suid_5.8.4-8sarge4_sparc.deb stable/main/binary-sparc/libperl-dev_5.8.4-8sarge4_sparc.deb stable/main/binary-sparc/perl-debug_5.8.4-8sarge4_sparc.deb perl (5.8.4-8sarge4) stable; urgency=low * Don't generate broken md5sums for libperl5.8 (closes: #354466). * Preserve timestamps in /usr/share/doc. * Fix problem with utf8/taint interaction (thanks to Steinar Gunderson for analysis/patch). * Fix test of reenterant function return values which was causing perl to malloc itself to death if ERANGE was encountered before ENOENT (such as a long line in /etc/group; see: #227621). stable/main/binary-sparc/pdftohtml_0.36-11sarge2_sparc.deb pdftohtml (0.36-11sarge2) stable-security; urgency=high * Non-maintainer upload by the Security Team * Backported upstream patch by Derek Noonburg to fix several vulnerabilities [xpdf/Stream.h, goo/gmem.c, debian/patches/11_security_upstream.dpatch] stable/main/binary-s390/pdftohtml_0.36-11sarge2_s390.deb pdftohtml (0.36-11sarge2) stable-security; urgency=high * Non-maintainer upload by the Security Team * Backported upstream patch by Derek Noonburg to fix several vulnerabilities [xpdf/Stream.h, goo/gmem.c, debian/patches/11_security_upstream.dpatch] stable/main/binary-mipsel/pdftohtml_0.36-11sarge2_mipsel.deb pdftohtml (0.36-11sarge2) stable-security; urgency=high * Non-maintainer upload by the Security Team * Backported upstream patch by Derek Noonburg to fix several vulnerabilities [xpdf/Stream.h, goo/gmem.c, debian/patches/11_security_upstream.dpatch] stable/main/binary-mips/pdftohtml_0.36-11sarge2_mips.deb pdftohtml (0.36-11sarge2) stable-security; urgency=high * Non-maintainer upload by the Security Team * Backported upstream patch by Derek Noonburg to fix several vulnerabilities [xpdf/Stream.h, goo/gmem.c, debian/patches/11_security_upstream.dpatch] stable/main/binary-m68k/pdftohtml_0.36-11sarge2_m68k.deb pdftohtml (0.36-11sarge2) stable-security; urgency=high * Non-maintainer upload by the Security Team * Backported upstream patch by Derek Noonburg to fix several vulnerabilities [xpdf/Stream.h, goo/gmem.c, debian/patches/11_security_upstream.dpatch] stable/main/binary-ia64/pdftohtml_0.36-11sarge2_ia64.deb pdftohtml (0.36-11sarge2) stable-security; urgency=high * Non-maintainer upload by the Security Team * Backported upstream patch by Derek Noonburg to fix several vulnerabilities [xpdf/Stream.h, goo/gmem.c, debian/patches/11_security_upstream.dpatch] stable/main/binary-i386/pdftohtml_0.36-11sarge2_i386.deb pdftohtml (0.36-11sarge2) stable-security; urgency=high * Non-maintainer upload by the Security Team * Backported upstream patch by Derek Noonburg to fix several vulnerabilities [xpdf/Stream.h, goo/gmem.c, debian/patches/11_security_upstream.dpatch] stable/main/binary-hppa/pdftohtml_0.36-11sarge2_hppa.deb pdftohtml (0.36-11sarge2) stable-security; urgency=high * Non-maintainer upload by the Security Team * Backported upstream patch by Derek Noonburg to fix several vulnerabilities [xpdf/Stream.h, goo/gmem.c, debian/patches/11_security_upstream.dpatch] stable/main/binary-arm/pdftohtml_0.36-11sarge2_arm.deb pdftohtml (0.36-11sarge2) stable-security; urgency=high * Non-maintainer upload by the Security Team * Backported upstream patch by Derek Noonburg to fix several vulnerabilities [xpdf/Stream.h, goo/gmem.c, debian/patches/11_security_upstream.dpatch] stable/main/binary-alpha/pdftohtml_0.36-11sarge2_alpha.deb pdftohtml (0.36-11sarge2) stable-security; urgency=high * Non-maintainer upload by the Security Team * Backported upstream patch by Derek Noonburg to fix several vulnerabilities [xpdf/Stream.h, goo/gmem.c, debian/patches/11_security_upstream.dpatch] stable/main/source/pdftohtml_0.36-11sarge2.diff.gz stable/main/source/pdftohtml_0.36-11sarge2.dsc stable/main/binary-powerpc/pdftohtml_0.36-11sarge2_powerpc.deb pdftohtml (0.36-11sarge2) stable-security; urgency=high * Non-maintainer upload by the Security Team * Backported upstream patch by Derek Noonburg to fix several vulnerabilities [xpdf/Stream.h, goo/gmem.c, debian/patches/11_security_upstream.dpatch] stable/main/binary-sparc/pdfkit.framework_0.8-2sarge3_sparc.deb pdfkit.framework (0.8-2sarge3) stable-security; urgency=high * Non-maintainer upload by the Security Team * Backported upstream patch by Derek Noonburg to fix several vulnerabilities [xpdf/xpdf-3.00/splash/SplashXPathScanner.cc, xpdf/xpdf-3.00/xpdf/JBIG2Stream.cc, xpdf/xpdf-3.00/xpdf/Stream.h, xpdf/xpdf-3.00/goo/gmem.c] stable/main/binary-s390/pdfkit.framework_0.8-2sarge3_s390.deb pdfkit.framework (0.8-2sarge3) stable-security; urgency=high * Non-maintainer upload by the Security Team * Backported upstream patch by Derek Noonburg to fix several vulnerabilities [xpdf/xpdf-3.00/splash/SplashXPathScanner.cc, xpdf/xpdf-3.00/xpdf/JBIG2Stream.cc, xpdf/xpdf-3.00/xpdf/Stream.h, xpdf/xpdf-3.00/goo/gmem.c] stable/main/binary-mipsel/pdfkit.framework_0.8-2sarge3_mipsel.deb pdfkit.framework (0.8-2sarge3) stable-security; urgency=high * Non-maintainer upload by the Security Team * Backported upstream patch by Derek Noonburg to fix several vulnerabilities [xpdf/xpdf-3.00/splash/SplashXPathScanner.cc, xpdf/xpdf-3.00/xpdf/JBIG2Stream.cc, xpdf/xpdf-3.00/xpdf/Stream.h, xpdf/xpdf-3.00/goo/gmem.c] stable/main/binary-mips/pdfkit.framework_0.8-2sarge3_mips.deb pdfkit.framework (0.8-2sarge3) stable-security; urgency=high * Non-maintainer upload by the Security Team * Backported upstream patch by Derek Noonburg to fix several vulnerabilities [xpdf/xpdf-3.00/splash/SplashXPathScanner.cc, xpdf/xpdf-3.00/xpdf/JBIG2Stream.cc, xpdf/xpdf-3.00/xpdf/Stream.h, xpdf/xpdf-3.00/goo/gmem.c] stable/main/binary-m68k/pdfkit.framework_0.8-2sarge3_m68k.deb pdfkit.framework (0.8-2sarge3) stable-security; urgency=high * Non-maintainer upload by the Security Team * Backported upstream patch by Derek Noonburg to fix several vulnerabilities [xpdf/xpdf-3.00/splash/SplashXPathScanner.cc, xpdf/xpdf-3.00/xpdf/JBIG2Stream.cc, xpdf/xpdf-3.00/xpdf/Stream.h, xpdf/xpdf-3.00/goo/gmem.c] stable/main/binary-ia64/pdfkit.framework_0.8-2sarge3_ia64.deb pdfkit.framework (0.8-2sarge3) stable-security; urgency=high * Non-maintainer upload by the Security Team * Backported upstream patch by Derek Noonburg to fix several vulnerabilities [xpdf/xpdf-3.00/splash/SplashXPathScanner.cc, xpdf/xpdf-3.00/xpdf/JBIG2Stream.cc, xpdf/xpdf-3.00/xpdf/Stream.h, xpdf/xpdf-3.00/goo/gmem.c] stable/main/binary-i386/pdfkit.framework_0.8-2sarge3_i386.deb pdfkit.framework (0.8-2sarge3) stable-security; urgency=high * Non-maintainer upload by the Security Team * Backported upstream patch by Derek Noonburg to fix several vulnerabilities [xpdf/xpdf-3.00/splash/SplashXPathScanner.cc, xpdf/xpdf-3.00/xpdf/JBIG2Stream.cc, xpdf/xpdf-3.00/xpdf/Stream.h, xpdf/xpdf-3.00/goo/gmem.c] stable/main/binary-hppa/pdfkit.framework_0.8-2sarge3_hppa.deb pdfkit.framework (0.8-2sarge3) stable-security; urgency=high * Non-maintainer upload by the Security Team * Backported upstream patch by Derek Noonburg to fix several vulnerabilities [xpdf/xpdf-3.00/splash/SplashXPathScanner.cc, xpdf/xpdf-3.00/xpdf/JBIG2Stream.cc, xpdf/xpdf-3.00/xpdf/Stream.h, xpdf/xpdf-3.00/goo/gmem.c] stable/main/binary-arm/pdfkit.framework_0.8-2sarge3_arm.deb pdfkit.framework (0.8-2sarge3) stable-security; urgency=high * Non-maintainer upload by the Security Team * Backported upstream patch by Derek Noonburg to fix several vulnerabilities [xpdf/xpdf-3.00/splash/SplashXPathScanner.cc, xpdf/xpdf-3.00/xpdf/JBIG2Stream.cc, xpdf/xpdf-3.00/xpdf/Stream.h, xpdf/xpdf-3.00/goo/gmem.c] stable/main/binary-alpha/pdfkit.framework_0.8-2sarge3_alpha.deb pdfkit.framework (0.8-2sarge3) stable-security; urgency=high * Non-maintainer upload by the Security Team * Backported upstream patch by Derek Noonburg to fix several vulnerabilities [xpdf/xpdf-3.00/splash/SplashXPathScanner.cc, xpdf/xpdf-3.00/xpdf/JBIG2Stream.cc, xpdf/xpdf-3.00/xpdf/Stream.h, xpdf/xpdf-3.00/goo/gmem.c] stable/main/binary-powerpc/pdfkit.framework_0.8-2sarge3_powerpc.deb stable/main/source/pdfkit.framework_0.8-2sarge3.dsc stable/main/source/pdfkit.framework_0.8-2sarge3.diff.gz pdfkit.framework (0.8-2sarge3) stable-security; urgency=high * Non-maintainer upload by the Security Team * Backported upstream patch by Derek Noonburg to fix several vulnerabilities [xpdf/xpdf-3.00/splash/SplashXPathScanner.cc, xpdf/xpdf-3.00/xpdf/JBIG2Stream.cc, xpdf/xpdf-3.00/xpdf/Stream.h, xpdf/xpdf-3.00/goo/gmem.c] stable/main/source/otrs_1.3.2p01-6.diff.gz stable/main/binary-all/otrs_1.3.2p01-6_all.deb stable/main/binary-all/otrs-doc-de_1.3.2p01-6_all.deb stable/main/source/otrs_1.3.2p01-6.dsc stable/main/binary-all/otrs-doc-en_1.3.2p01-6_all.deb otrs (1.3.2p01-6) stable-security; urgency=low * fixes a security problem described at http://otrs.org/advisory/OSA-2005-01-en/ and in CVE-2005-3893 (also BID15537), CVE-2005-3895 (also BID15537), CVE-2005-3894 (also BID15537), it closes: #340352 stable/main/binary-sparc/nowebm_2.10c-3.2_sparc.deb noweb (2.10c-3.2) stable-security; urgency=high * Non-maintainer upload by the Security Team * Applied patch by Javier Fernández-Sanguino Peña to fix insecure temporary files [debian/patches/005_security_CVE-2005-3342] stable/main/binary-s390/nowebm_2.10c-3.2_s390.deb noweb (2.10c-3.2) stable-security; urgency=high * Non-maintainer upload by the Security Team * Applied patch by Javier Fernández-Sanguino Peña to fix insecure temporary files [debian/patches/005_security_CVE-2005-3342] stable/main/binary-mipsel/nowebm_2.10c-3.2_mipsel.deb noweb (2.10c-3.2) stable-security; urgency=high * Non-maintainer upload by the Security Team * Applied patch by Javier Fernández-Sanguino Peña to fix insecure temporary files [debian/patches/005_security_CVE-2005-3342] stable/main/binary-mips/nowebm_2.10c-3.2_mips.deb noweb (2.10c-3.2) stable-security; urgency=high * Non-maintainer upload by the Security Team * Applied patch by Javier Fernández-Sanguino Peña to fix insecure temporary files [debian/patches/005_security_CVE-2005-3342] stable/main/binary-m68k/nowebm_2.10c-3.2_m68k.deb noweb (2.10c-3.2) stable-security; urgency=high * Non-maintainer upload by the Security Team * Applied patch by Javier Fernández-Sanguino Peña to fix insecure temporary files [debian/patches/005_security_CVE-2005-3342] stable/main/binary-ia64/nowebm_2.10c-3.2_ia64.deb noweb (2.10c-3.2) stable-security; urgency=high * Non-maintainer upload by the Security Team * Applied patch by Javier Fernández-Sanguino Peña to fix insecure temporary files [debian/patches/005_security_CVE-2005-3342] stable/main/binary-i386/nowebm_2.10c-3.2_i386.deb noweb (2.10c-3.2) stable-security; urgency=high * Non-maintainer upload by the Security Team * Applied patch by Javier Fernández-Sanguino Peña to fix insecure temporary files [debian/patches/005_security_CVE-2005-3342] stable/main/binary-hppa/nowebm_2.10c-3.2_hppa.deb noweb (2.10c-3.2) stable-security; urgency=high * Non-maintainer upload by the Security Team * Applied patch by Javier Fernández-Sanguino Peña to fix insecure temporary files [debian/patches/005_security_CVE-2005-3342] stable/main/binary-arm/nowebm_2.10c-3.2_arm.deb noweb (2.10c-3.2) stable-security; urgency=high * Non-maintainer upload by the Security Team * Applied patch by Javier Fernández-Sanguino Peña to fix insecure temporary files [debian/patches/005_security_CVE-2005-3342] stable/main/binary-alpha/nowebm_2.10c-3.2_alpha.deb noweb (2.10c-3.2) stable-security; urgency=high * Non-maintainer upload by the Security Team * Applied patch by Javier Fernández-Sanguino Peña to fix insecure temporary files [debian/patches/005_security_CVE-2005-3342] stable/main/source/noweb_2.10c-3.2.diff.gz stable/main/source/noweb_2.10c-3.2.dsc stable/main/binary-powerpc/nowebm_2.10c-3.2_powerpc.deb noweb (2.10c-3.2) stable-security; urgency=high * Non-maintainer upload by the Security Team * Applied patch by Javier Fernández-Sanguino Peña to fix insecure temporary files [debian/patches/005_security_CVE-2005-3342] stable/main/binary-sparc/nfs-user-server_2.2beta47-20sarge2_sparc.deb stable/main/binary-sparc/ugidd_2.2beta47-20sarge2_sparc.deb nfs-user-server (2.2beta47-20sarge2) stable-security; urgency=high * mountd.c: added patch from suse to fix realpath()-related buffer overflow in rpc.mountd [CVE-2006-0043]. stable/main/binary-s390/ugidd_2.2beta47-20sarge2_s390.deb stable/main/binary-s390/nfs-user-server_2.2beta47-20sarge2_s390.deb nfs-user-server (2.2beta47-20sarge2) stable-security; urgency=high * mountd.c: added patch from suse to fix realpath()-related buffer overflow in rpc.mountd [CVE-2006-0043]. stable/main/binary-powerpc/nfs-user-server_2.2beta47-20sarge2_powerpc.deb stable/main/binary-powerpc/ugidd_2.2beta47-20sarge2_powerpc.deb nfs-user-server (2.2beta47-20sarge2) stable-security; urgency=high * mountd.c: added patch from suse to fix realpath()-related buffer overflow in rpc.mountd [CVE-2006-0043]. stable/main/binary-mipsel/ugidd_2.2beta47-20sarge2_mipsel.deb stable/main/binary-mipsel/nfs-user-server_2.2beta47-20sarge2_mipsel.deb nfs-user-server (2.2beta47-20sarge2) stable-security; urgency=high * mountd.c: added patch from suse to fix realpath()-related buffer overflow in rpc.mountd [CVE-2006-0043]. stable/main/binary-mips/nfs-user-server_2.2beta47-20sarge2_mips.deb stable/main/binary-mips/ugidd_2.2beta47-20sarge2_mips.deb nfs-user-server (2.2beta47-20sarge2) stable-security; urgency=high * mountd.c: added patch from suse to fix realpath()-related buffer overflow in rpc.mountd [CVE-2006-0043]. stable/main/binary-m68k/nfs-user-server_2.2beta47-20sarge2_m68k.deb stable/main/binary-m68k/ugidd_2.2beta47-20sarge2_m68k.deb nfs-user-server (2.2beta47-20sarge2) stable-security; urgency=high * mountd.c: added patch from suse to fix realpath()-related buffer overflow in rpc.mountd [CVE-2006-0043]. stable/main/binary-ia64/ugidd_2.2beta47-20sarge2_ia64.deb stable/main/binary-ia64/nfs-user-server_2.2beta47-20sarge2_ia64.deb nfs-user-server (2.2beta47-20sarge2) stable-security; urgency=high * mountd.c: added patch from suse to fix realpath()-related buffer overflow in rpc.mountd [CVE-2006-0043]. stable/main/binary-hppa/ugidd_2.2beta47-20sarge2_hppa.deb stable/main/binary-hppa/nfs-user-server_2.2beta47-20sarge2_hppa.deb nfs-user-server (2.2beta47-20sarge2) stable-security; urgency=high * mountd.c: added patch from suse to fix realpath()-related buffer overflow in rpc.mountd [CVE-2006-0043]. stable/main/binary-arm/ugidd_2.2beta47-20sarge2_arm.deb stable/main/binary-arm/nfs-user-server_2.2beta47-20sarge2_arm.deb nfs-user-server (2.2beta47-20sarge2) stable-security; urgency=high * mountd.c: added patch from suse to fix realpath()-related buffer overflow in rpc.mountd [CVE-2006-0043]. stable/main/binary-alpha/nfs-user-server_2.2beta47-20sarge2_alpha.deb stable/main/binary-alpha/ugidd_2.2beta47-20sarge2_alpha.deb nfs-user-server (2.2beta47-20sarge2) stable-security; urgency=high * mountd.c: added patch from suse to fix realpath()-related buffer overflow in rpc.mountd [CVE-2006-0043]. stable/main/binary-i386/ugidd_2.2beta47-20sarge2_i386.deb stable/main/source/nfs-user-server_2.2beta47-20sarge2.diff.gz stable/main/source/nfs-user-server_2.2beta47-20sarge2.dsc stable/main/binary-i386/nfs-user-server_2.2beta47-20sarge2_i386.deb nfs-user-server (2.2beta47-20sarge2) stable-security; urgency=high * mountd.c: added patch from suse to fix realpath()-related buffer overflow in rpc.mountd [CVE-2006-0043]. stable/main/binary-sparc/netpbm_10.0-8sarge3_sparc.deb stable/main/binary-sparc/libnetpbm10_10.0-8sarge3_sparc.deb stable/main/binary-sparc/libnetpbm10-dev_10.0-8sarge3_sparc.deb stable/main/binary-sparc/libnetpbm9-dev_10.0-8sarge3_sparc.deb stable/main/binary-sparc/libnetpbm9_10.0-8sarge3_sparc.deb netpbm-free (2:10.0-8sarge3) stable-security; urgency=high * Non-maintainer upload by the Security Team * Call Ghostscript in a safe manner when converting Postscript files (CVE-2005-2471) stable/main/binary-s390/libnetpbm10-dev_10.0-8sarge3_s390.deb stable/main/binary-s390/netpbm_10.0-8sarge3_s390.deb stable/main/binary-s390/libnetpbm10_10.0-8sarge3_s390.deb stable/main/binary-s390/libnetpbm9-dev_10.0-8sarge3_s390.deb stable/main/binary-s390/libnetpbm9_10.0-8sarge3_s390.deb netpbm-free (2:10.0-8sarge3) stable-security; urgency=high * Non-maintainer upload by the Security Team * Call Ghostscript in a safe manner when converting Postscript files (CVE-2005-2471) stable/main/binary-powerpc/netpbm_10.0-8sarge3_powerpc.deb stable/main/binary-powerpc/libnetpbm10_10.0-8sarge3_powerpc.deb stable/main/binary-powerpc/libnetpbm9-dev_10.0-8sarge3_powerpc.deb stable/main/binary-powerpc/libnetpbm10-dev_10.0-8sarge3_powerpc.deb stable/main/binary-powerpc/libnetpbm9_10.0-8sarge3_powerpc.deb netpbm-free (2:10.0-8sarge3) stable-security; urgency=high * Non-maintainer upload by the Security Team * Call Ghostscript in a safe manner when converting Postscript files (CVE-2005-2471) stable/main/binary-mipsel/libnetpbm9-dev_10.0-8sarge3_mipsel.deb stable/main/binary-mipsel/libnetpbm9_10.0-8sarge3_mipsel.deb stable/main/binary-mipsel/netpbm_10.0-8sarge3_mipsel.deb stable/main/binary-mipsel/libnetpbm10-dev_10.0-8sarge3_mipsel.deb stable/main/binary-mipsel/libnetpbm10_10.0-8sarge3_mipsel.deb netpbm-free (2:10.0-8sarge3) stable-security; urgency=high * Non-maintainer upload by the Security Team * Call Ghostscript in a safe manner when converting Postscript files (CVE-2005-2471) stable/main/binary-mips/libnetpbm9-dev_10.0-8sarge3_mips.deb stable/main/binary-mips/libnetpbm10_10.0-8sarge3_mips.deb stable/main/binary-mips/libnetpbm10-dev_10.0-8sarge3_mips.deb stable/main/binary-mips/netpbm_10.0-8sarge3_mips.deb stable/main/binary-mips/libnetpbm9_10.0-8sarge3_mips.deb netpbm-free (2:10.0-8sarge3) stable-security; urgency=high * Non-maintainer upload by the Security Team * Call Ghostscript in a safe manner when converting Postscript files (CVE-2005-2471) stable/main/binary-m68k/libnetpbm10_10.0-8sarge3_m68k.deb stable/main/binary-m68k/libnetpbm9-dev_10.0-8sarge3_m68k.deb stable/main/binary-m68k/libnetpbm9_10.0-8sarge3_m68k.deb stable/main/binary-m68k/netpbm_10.0-8sarge3_m68k.deb stable/main/binary-m68k/libnetpbm10-dev_10.0-8sarge3_m68k.deb netpbm-free (2:10.0-8sarge3) stable-security; urgency=high * Non-maintainer upload by the Security Team * Call Ghostscript in a safe manner when converting Postscript files (CVE-2005-2471) stable/main/binary-ia64/netpbm_10.0-8sarge3_ia64.deb stable/main/binary-ia64/libnetpbm10-dev_10.0-8sarge3_ia64.deb stable/main/binary-ia64/libnetpbm9_10.0-8sarge3_ia64.deb stable/main/binary-ia64/libnetpbm9-dev_10.0-8sarge3_ia64.deb stable/main/binary-ia64/libnetpbm10_10.0-8sarge3_ia64.deb netpbm-free (2:10.0-8sarge3) stable-security; urgency=high * Non-maintainer upload by the Security Team * Call Ghostscript in a safe manner when converting Postscript files (CVE-2005-2471) stable/main/binary-hppa/libnetpbm10-dev_10.0-8sarge3_hppa.deb stable/main/binary-hppa/netpbm_10.0-8sarge3_hppa.deb stable/main/binary-hppa/libnetpbm10_10.0-8sarge3_hppa.deb stable/main/binary-hppa/libnetpbm9-dev_10.0-8sarge3_hppa.deb stable/main/binary-hppa/libnetpbm9_10.0-8sarge3_hppa.deb netpbm-free (2:10.0-8sarge3) stable-security; urgency=high * Non-maintainer upload by the Security Team * Call Ghostscript in a safe manner when converting Postscript files (CVE-2005-2471) stable/main/binary-arm/libnetpbm10-dev_10.0-8sarge3_arm.deb stable/main/binary-arm/libnetpbm9_10.0-8sarge3_arm.deb stable/main/binary-arm/libnetpbm10_10.0-8sarge3_arm.deb stable/main/binary-arm/libnetpbm9-dev_10.0-8sarge3_arm.deb stable/main/binary-arm/netpbm_10.0-8sarge3_arm.deb netpbm-free (2:10.0-8sarge3) stable-security; urgency=high * Non-maintainer upload by the Security Team * Call Ghostscript in a safe manner when converting Postscript files (CVE-2005-2471) stable/main/binary-alpha/libnetpbm10-dev_10.0-8sarge3_alpha.deb stable/main/binary-alpha/libnetpbm10_10.0-8sarge3_alpha.deb stable/main/binary-alpha/netpbm_10.0-8sarge3_alpha.deb stable/main/binary-alpha/libnetpbm9_10.0-8sarge3_alpha.deb stable/main/binary-alpha/libnetpbm9-dev_10.0-8sarge3_alpha.deb netpbm-free (2:10.0-8sarge3) stable-security; urgency=high * Non-maintainer upload by the Security Team * Call Ghostscript in a safe manner when converting Postscript files (CVE-2005-2471) stable/main/source/netpbm-free_10.0-8sarge3.dsc stable/main/binary-i386/netpbm_10.0-8sarge3_i386.deb stable/main/binary-i386/libnetpbm10-dev_10.0-8sarge3_i386.deb stable/main/binary-i386/libnetpbm10_10.0-8sarge3_i386.deb stable/main/binary-i386/libnetpbm9_10.0-8sarge3_i386.deb stable/main/source/netpbm-free_10.0-8sarge3.diff.gz stable/main/binary-i386/libnetpbm9-dev_10.0-8sarge3_i386.deb netpbm-free (2:10.0-8sarge3) stable-security; urgency=high * Non-maintainer upload by the Security Team * Call Ghostscript in a safe manner when converting Postscript files (CVE-2005-2471) stable/main/binary-sparc/nbd-client_2.7.3-3sarge1_sparc.deb stable/main/binary-sparc/nbd-server_2.7.3-3sarge1_sparc.deb nbd (1:2.7.3-3sarge1) stable-security; urgency=high * Non-Maintainer upload by the Security Team * Applied upstream patch to fix buffer overflow [nbd-server.c, CVE-2005-3534] stable/main/binary-s390/nbd-client_2.7.3-3sarge1_s390.deb stable/main/binary-s390/nbd-server_2.7.3-3sarge1_s390.deb nbd (1:2.7.3-3sarge1) stable-security; urgency=high * Non-Maintainer upload by the Security Team * Applied upstream patch to fix buffer overflow [nbd-server.c, CVE-2005-3534] stable/main/binary-mipsel/nbd-server_2.7.3-3sarge1_mipsel.deb stable/main/binary-mipsel/nbd-client_2.7.3-3sarge1_mipsel.deb nbd (1:2.7.3-3sarge1) stable-security; urgency=high * Non-Maintainer upload by the Security Team * Applied upstream patch to fix buffer overflow [nbd-server.c, CVE-2005-3534] stable/main/binary-mips/nbd-server_2.7.3-3sarge1_mips.deb stable/main/binary-mips/nbd-client_2.7.3-3sarge1_mips.deb nbd (1:2.7.3-3sarge1) stable-security; urgency=high * Non-Maintainer upload by the Security Team * Applied upstream patch to fix buffer overflow [nbd-server.c, CVE-2005-3534] stable/main/binary-m68k/nbd-server_2.7.3-3sarge1_m68k.deb stable/main/binary-m68k/nbd-client_2.7.3-3sarge1_m68k.deb nbd (1:2.7.3-3sarge1) stable-security; urgency=high * Non-Maintainer upload by the Security Team * Applied upstream patch to fix buffer overflow [nbd-server.c, CVE-2005-3534] stable/main/binary-ia64/nbd-client_2.7.3-3sarge1_ia64.deb stable/main/binary-ia64/nbd-server_2.7.3-3sarge1_ia64.deb nbd (1:2.7.3-3sarge1) stable-security; urgency=high * Non-Maintainer upload by the Security Team * Applied upstream patch to fix buffer overflow [nbd-server.c, CVE-2005-3534] stable/main/binary-i386/nbd-client_2.7.3-3sarge1_i386.deb stable/main/binary-i386/nbd-server_2.7.3-3sarge1_i386.deb nbd (1:2.7.3-3sarge1) stable-security; urgency=high * Non-Maintainer upload by the Security Team * Applied upstream patch to fix buffer overflow [nbd-server.c, CVE-2005-3534] stable/main/binary-hppa/nbd-client_2.7.3-3sarge1_hppa.deb stable/main/binary-hppa/nbd-server_2.7.3-3sarge1_hppa.deb nbd (1:2.7.3-3sarge1) stable-security; urgency=high * Non-Maintainer upload by the Security Team * Applied upstream patch to fix buffer overflow [nbd-server.c, CVE-2005-3534] stable/main/binary-arm/nbd-client_2.7.3-3sarge1_arm.deb stable/main/binary-arm/nbd-server_2.7.3-3sarge1_arm.deb nbd (1:2.7.3-3sarge1) stable-security; urgency=high * Non-Maintainer upload by the Security Team * Applied upstream patch to fix buffer overflow [nbd-server.c, CVE-2005-3534] stable/main/binary-alpha/nbd-client_2.7.3-3sarge1_alpha.deb stable/main/binary-alpha/nbd-server_2.7.3-3sarge1_alpha.deb nbd (1:2.7.3-3sarge1) stable-security; urgency=high * Non-Maintainer upload by the Security Team * Applied upstream patch to fix buffer overflow [nbd-server.c, CVE-2005-3534] stable/main/source/nbd_2.7.3-3sarge1.dsc stable/main/binary-powerpc/nbd-server_2.7.3-3sarge1_powerpc.deb stable/main/binary-powerpc/nbd-client_2.7.3-3sarge1_powerpc.deb stable/main/source/nbd_2.7.3-3sarge1.diff.gz nbd (1:2.7.3-3sarge1) stable-security; urgency=high * Non-Maintainer upload by the Security Team * Applied upstream patch to fix buffer overflow [nbd-server.c, CVE-2005-3534] stable/main/binary-sparc/mydns-mysql_1.0.0-4sarge1_sparc.deb stable/main/binary-sparc/mydns-pgsql_1.0.0-4sarge1_sparc.deb mydns (1.0.0-4sarge1) stable-security; urgency=high * Fix a critical remote DDoS, caused by a missing pointer check. stable/main/binary-s390/mydns-pgsql_1.0.0-4sarge1_s390.deb stable/main/binary-s390/mydns-mysql_1.0.0-4sarge1_s390.deb mydns (1.0.0-4sarge1) stable-security; urgency=high * Fix a critical remote DDoS, caused by a missing pointer check. stable/main/binary-mipsel/mydns-mysql_1.0.0-4sarge1_mipsel.deb stable/main/binary-mipsel/mydns-pgsql_1.0.0-4sarge1_mipsel.deb mydns (1.0.0-4sarge1) stable-security; urgency=high * Fix a critical remote DDoS, caused by a missing pointer check. stable/main/binary-mips/mydns-pgsql_1.0.0-4sarge1_mips.deb stable/main/binary-mips/mydns-mysql_1.0.0-4sarge1_mips.deb mydns (1.0.0-4sarge1) stable-security; urgency=high * Fix a critical remote DDoS, caused by a missing pointer check. stable/main/binary-m68k/mydns-mysql_1.0.0-4sarge1_m68k.deb stable/main/binary-m68k/mydns-pgsql_1.0.0-4sarge1_m68k.deb mydns (1.0.0-4sarge1) stable-security; urgency=high * Fix a critical remote DDoS, caused by a missing pointer check. stable/main/binary-ia64/mydns-pgsql_1.0.0-4sarge1_ia64.deb stable/main/binary-ia64/mydns-mysql_1.0.0-4sarge1_ia64.deb mydns (1.0.0-4sarge1) stable-security; urgency=high * Fix a critical remote DDoS, caused by a missing pointer check. stable/main/binary-i386/mydns-mysql_1.0.0-4sarge1_i386.deb stable/main/binary-i386/mydns-pgsql_1.0.0-4sarge1_i386.deb mydns (1.0.0-4sarge1) stable-security; urgency=high * Fix a critical remote DDoS, caused by a missing pointer check. stable/main/binary-hppa/mydns-mysql_1.0.0-4sarge1_hppa.deb stable/main/binary-hppa/mydns-pgsql_1.0.0-4sarge1_hppa.deb mydns (1.0.0-4sarge1) stable-security; urgency=high * Fix a critical remote DDoS, caused by a missing pointer check. stable/main/binary-arm/mydns-mysql_1.0.0-4sarge1_arm.deb stable/main/binary-arm/mydns-pgsql_1.0.0-4sarge1_arm.deb mydns (1.0.0-4sarge1) stable-security; urgency=high * Fix a critical remote DDoS, caused by a missing pointer check. stable/main/binary-alpha/mydns-pgsql_1.0.0-4sarge1_alpha.deb stable/main/binary-alpha/mydns-mysql_1.0.0-4sarge1_alpha.deb mydns (1.0.0-4sarge1) stable-security; urgency=high * Fix a critical remote DDoS, caused by a missing pointer check. stable/main/source/mydns_1.0.0-4sarge1.dsc stable/main/binary-all/mydns-common_1.0.0-4sarge1_all.deb stable/main/source/mydns_1.0.0-4sarge1.diff.gz stable/main/binary-powerpc/mydns-pgsql_1.0.0-4sarge1_powerpc.deb stable/main/binary-powerpc/mydns-mysql_1.0.0-4sarge1_powerpc.deb mydns (1.0.0-4sarge1) stable-security; urgency=high * Fix a critical remote DDoS, caused by a missing pointer check. stable/main/binary-sparc/mutt_1.5.9-2sarge1_sparc.deb mutt (1.5.9-2sarge1) stable; urgency=low * For attachments marked for deletion after the message is sent, don't remove them if the message is finally cancelled, or if the attachments are dropped from the message prior to sending. (Closes: #332972) stable/main/binary-s390/mutt_1.5.9-2sarge1_s390.deb mutt (1.5.9-2sarge1) stable; urgency=low * For attachments marked for deletion after the message is sent, don't remove them if the message is finally cancelled, or if the attachments are dropped from the message prior to sending. (Closes: #332972) stable/main/binary-powerpc/mutt_1.5.9-2sarge1_powerpc.deb mutt (1.5.9-2sarge1) stable; urgency=low * For attachments marked for deletion after the message is sent, don't remove them if the message is finally cancelled, or if the attachments are dropped from the message prior to sending. (Closes: #332972) stable/main/binary-mipsel/mutt_1.5.9-2sarge1_mipsel.deb mutt (1.5.9-2sarge1) stable; urgency=low * For attachments marked for deletion after the message is sent, don't remove them if the message is finally cancelled, or if the attachments are dropped from the message prior to sending. (Closes: #332972) stable/main/binary-mips/mutt_1.5.9-2sarge1_mips.deb mutt (1.5.9-2sarge1) stable; urgency=low * For attachments marked for deletion after the message is sent, don't remove them if the message is finally cancelled, or if the attachments are dropped from the message prior to sending. (Closes: #332972) stable/main/binary-m68k/mutt_1.5.9-2sarge1_m68k.deb mutt (1.5.9-2sarge1) stable; urgency=low * For attachments marked for deletion after the message is sent, don't remove them if the message is finally cancelled, or if the attachments are dropped from the message prior to sending. (Closes: #332972) stable/main/binary-ia64/mutt_1.5.9-2sarge1_ia64.deb mutt (1.5.9-2sarge1) stable; urgency=low * For attachments marked for deletion after the message is sent, don't remove them if the message is finally cancelled, or if the attachments are dropped from the message prior to sending. (Closes: #332972) stable/main/binary-hppa/mutt_1.5.9-2sarge1_hppa.deb mutt (1.5.9-2sarge1) stable; urgency=low * For attachments marked for deletion after the message is sent, don't remove them if the message is finally cancelled, or if the attachments are dropped from the message prior to sending. (Closes: #332972) stable/main/binary-arm/mutt_1.5.9-2sarge1_arm.deb mutt (1.5.9-2sarge1) stable; urgency=low * For attachments marked for deletion after the message is sent, don't remove them if the message is finally cancelled, or if the attachments are dropped from the message prior to sending. (Closes: #332972) stable/main/binary-alpha/mutt_1.5.9-2sarge1_alpha.deb mutt (1.5.9-2sarge1) stable; urgency=low * For attachments marked for deletion after the message is sent, don't remove them if the message is finally cancelled, or if the attachments are dropped from the message prior to sending. (Closes: #332972) stable/main/source/mutt_1.5.9-2sarge1.diff.gz stable/main/source/mutt_1.5.9-2sarge1.dsc stable/main/binary-i386/mutt_1.5.9-2sarge1_i386.deb mutt (1.5.9-2sarge1) stable; urgency=low * For attachments marked for deletion after the message is sent, don't remove them if the message is finally cancelled, or if the attachments are dropped from the message prior to sending. (Closes: #332972) stable/main/source/moodle_1.4.4.dfsg.1-3sarge1.diff.gz stable/main/source/moodle_1.4.4.dfsg.1-3sarge1.dsc stable/main/binary-all/moodle_1.4.4.dfsg.1-3sarge1_all.deb moodle (1.4.4.dfsg.1-3sarge1) stable-security; urgency=high * Fix input sanitization allowing for SQL injection [lib/adodb/server.php, CVE-2006-0146] * Fix arbitrary php code vulnerability [lib/adodb/tests/tmssql.php, CVE-2006-0147] * Fix SQL injection vulnerability when using PostgreSQL [lib/adodb/drivers/adodb-postgres64.inc.php, CVE-2006-0410] * Fix multiple cross-site scripting (XSS) vulnerabilities [lib/adodb/adodb-pager.inc.php, CVE-2006-0806] stable/main/binary-sparc/metamail_2.7-47sarge1_sparc.deb metamail (2.7-47sarge1) stable-security; urgency=high * Non-maintainer upload by The Security Team. * Correctly patch both locations required to fix the boundary overflow. [CVE-2006-0709] stable/main/binary-s390/metamail_2.7-47sarge1_s390.deb metamail (2.7-47sarge1) stable-security; urgency=high * Non-maintainer upload by The Security Team. * Correctly patch both locations required to fix the boundary overflow. [CVE-2006-0709] stable/main/binary-powerpc/metamail_2.7-47sarge1_powerpc.deb metamail (2.7-47sarge1) stable-security; urgency=high * Non-maintainer upload by The Security Team. * Correctly patch both locations required to fix the boundary overflow. [CVE-2006-0709] stable/main/binary-mipsel/metamail_2.7-47sarge1_mipsel.deb metamail (2.7-47sarge1) stable-security; urgency=high * Non-maintainer upload by The Security Team. * Correctly patch both locations required to fix the boundary overflow. [CVE-2006-0709] stable/main/binary-mips/metamail_2.7-47sarge1_mips.deb metamail (2.7-47sarge1) stable-security; urgency=high * Non-maintainer upload by The Security Team. * Correctly patch both locations required to fix the boundary overflow. [CVE-2006-0709] stable/main/binary-m68k/metamail_2.7-47sarge1_m68k.deb metamail (2.7-47sarge1) stable-security; urgency=high * Non-maintainer upload by The Security Team. * Correctly patch both locations required to fix the boundary overflow. [CVE-2006-0709] stable/main/binary-ia64/metamail_2.7-47sarge1_ia64.deb metamail (2.7-47sarge1) stable-security; urgency=high * Non-maintainer upload by The Security Team. * Correctly patch both locations required to fix the boundary overflow. [CVE-2006-0709] stable/main/binary-hppa/metamail_2.7-47sarge1_hppa.deb metamail (2.7-47sarge1) stable-security; urgency=high * Non-maintainer upload by The Security Team. * Correctly patch both locations required to fix the boundary overflow. [CVE-2006-0709] stable/main/binary-arm/metamail_2.7-47sarge1_arm.deb metamail (2.7-47sarge1) stable-security; urgency=high * Non-maintainer upload by The Security Team. * Correctly patch both locations required to fix the boundary overflow. [CVE-2006-0709] stable/main/binary-alpha/metamail_2.7-47sarge1_alpha.deb metamail (2.7-47sarge1) stable-security; urgency=high * Non-maintainer upload by The Security Team. * Correctly patch both locations required to fix the boundary overflow. [CVE-2006-0709] stable/main/source/metamail_2.7-47sarge1.dsc stable/main/source/metamail_2.7-47sarge1.diff.gz stable/main/binary-i386/metamail_2.7-47sarge1_i386.deb metamail (2.7-47sarge1) stable-security; urgency=high * Non-maintainer upload by The Security Team. * Correctly patch both locations required to fix the boundary overflow. [CVE-2006-0709] stable/main/source/mantis_0.19.2-5sarge2.diff.gz stable/main/source/mantis_0.19.2-5sarge2.dsc stable/main/binary-all/mantis_0.19.2-5sarge2_all.deb mantis (0.19.2-5sarge2) stable; urgency=low * Fix a typo (Thanks to Harald Staub <staub@switch.ch>) (Closes: #348863) * Fix typos in the postinst file stable/main/binary-sparc/mailman_2.1.5-8sarge2_sparc.deb mailman (2.1.5-8sarge2) stable-security; urgency=high * Non-maintainer upload by The Security Team. * Avoid potential DoS attack with malformed multi-part messages (closes: #358892) [CVE-2006-0052] stable/main/binary-s390/mailman_2.1.5-8sarge2_s390.deb mailman (2.1.5-8sarge2) stable-security; urgency=high * Non-maintainer upload by The Security Team. * Avoid potential DoS attack with malformed multi-part messages (closes: #358892) [CVE-2006-0052] stable/main/binary-powerpc/mailman_2.1.5-8sarge2_powerpc.deb mailman (2.1.5-8sarge2) stable-security; urgency=high * Non-maintainer upload by The Security Team. * Avoid potential DoS attack with malformed multi-part messages (closes: #358892) [CVE-2006-0052] stable/main/binary-mipsel/mailman_2.1.5-8sarge2_mipsel.deb mailman (2.1.5-8sarge2) stable-security; urgency=high * Non-maintainer upload by The Security Team. * Avoid potential DoS attack with malformed multi-part messages (closes: #358892) [CVE-2006-0052] stable/main/binary-mips/mailman_2.1.5-8sarge2_mips.deb mailman (2.1.5-8sarge2) stable-security; urgency=high * Non-maintainer upload by The Security Team. * Avoid potential DoS attack with malformed multi-part messages (closes: #358892) [CVE-2006-0052] stable/main/binary-m68k/mailman_2.1.5-8sarge2_m68k.deb mailman (2.1.5-8sarge2) stable-security; urgency=high * Non-maintainer upload by The Security Team. * Avoid potential DoS attack with malformed multi-part messages (closes: #358892) [CVE-2006-0052] stable/main/binary-ia64/mailman_2.1.5-8sarge2_ia64.deb mailman (2.1.5-8sarge2) stable-security; urgency=high * Non-maintainer upload by The Security Team. * Avoid potential DoS attack with malformed multi-part messages (closes: #358892) [CVE-2006-0052] stable/main/binary-hppa/mailman_2.1.5-8sarge2_hppa.deb mailman (2.1.5-8sarge2) stable-security; urgency=high * Non-maintainer upload by The Security Team. * Avoid potential DoS attack with malformed multi-part messages (closes: #358892) [CVE-2006-0052] stable/main/binary-arm/mailman_2.1.5-8sarge2_arm.deb mailman (2.1.5-8sarge2) stable-security; urgency=high * Non-maintainer upload by The Security Team. * Avoid potential DoS attack with malformed multi-part messages (closes: #358892) [CVE-2006-0052] stable/main/binary-alpha/mailman_2.1.5-8sarge2_alpha.deb mailman (2.1.5-8sarge2) stable-security; urgency=high * Non-maintainer upload by The Security Team. * Avoid potential DoS attack with malformed multi-part messages (closes: #358892) [CVE-2006-0052] stable/main/binary-i386/mailman_2.1.5-8sarge2_i386.deb stable/main/source/mailman_2.1.5-8sarge2.diff.gz stable/main/source/mailman_2.1.5-8sarge2.dsc mailman (2.1.5-8sarge2) stable-security; urgency=high * Non-maintainer upload by The Security Team. * Avoid potential DoS attack with malformed multi-part messages (closes: #358892) [CVE-2006-0052] stable/main/binary-sparc/lurker_1.2-5sarge1_sparc.deb lurker (1.2-5sarge1) stable-security; urgency=high * merge patch from Wesley Terpstra to fix several major security bugs: - Lurker's mechanism for specifying configuration files was vulnerable to being overridden. As lurker includes sections of unparsed config files in its output, an attacker could manipulate lurker into reading any file readable by the www-data user. (CVE-2006-1062) - It were possible for a remote attacker to create or overwrite files in any writable directory that is named "mbox". (CVE-2006-1063) - Missing input sanitising allowed an attacker to inject arbitrary web script or HTML. (CVE-2006-1064) * ship the INSTALL file and a NEWS.Debian file for documenting the necessary changes. * restart apache{2,-perl,-ssl} if it includes /etc/lurker/apache.conf at /etc/apache*/conf.d/lurker stable/main/binary-s390/lurker_1.2-5sarge1_s390.deb lurker (1.2-5sarge1) stable-security; urgency=high * merge patch from Wesley Terpstra to fix several major security bugs: - Lurker's mechanism for specifying configuration files was vulnerable to being overridden. As lurker includes sections of unparsed config files in its output, an attacker could manipulate lurker into reading any file readable by the www-data user. (CVE-2006-1062) - It were possible for a remote attacker to create or overwrite files in any writable directory that is named "mbox". (CVE-2006-1063) - Missing input sanitising allowed an attacker to inject arbitrary web script or HTML. (CVE-2006-1064) * ship the INSTALL file and a NEWS.Debian file for documenting the necessary changes. * restart apache{2,-perl,-ssl} if it includes /etc/lurker/apache.conf at /etc/apache*/conf.d/lurker stable/main/binary-powerpc/lurker_1.2-5sarge1_powerpc.deb lurker (1.2-5sarge1) stable-security; urgency=high * merge patch from Wesley Terpstra to fix several major security bugs: - Lurker's mechanism for specifying configuration files was vulnerable to being overridden. As lurker includes sections of unparsed config files in its output, an attacker could manipulate lurker into reading any file readable by the www-data user. (CVE-2006-1062) - It were possible for a remote attacker to create or overwrite files in any writable directory that is named "mbox". (CVE-2006-1063) - Missing input sanitising allowed an attacker to inject arbitrary web script or HTML. (CVE-2006-1064) * ship the INSTALL file and a NEWS.Debian file for documenting the necessary changes. * restart apache{2,-perl,-ssl} if it includes /etc/lurker/apache.conf at /etc/apache*/conf.d/lurker stable/main/binary-mipsel/lurker_1.2-5sarge1_mipsel.deb lurker (1.2-5sarge1) stable-security; urgency=high * merge patch from Wesley Terpstra to fix several major security bugs: - Lurker's mechanism for specifying configuration files was vulnerable to being overridden. As lurker includes sections of unparsed config files in its output, an attacker could manipulate lurker into reading any file readable by the www-data user. (CVE-2006-1062) - It were possible for a remote attacker to create or overwrite files in any writable directory that is named "mbox". (CVE-2006-1063) - Missing input sanitising allowed an attacker to inject arbitrary web script or HTML. (CVE-2006-1064) * ship the INSTALL file and a NEWS.Debian file for documenting the necessary changes. * restart apache{2,-perl,-ssl} if it includes /etc/lurker/apache.conf at /etc/apache*/conf.d/lurker stable/main/binary-mips/lurker_1.2-5sarge1_mips.deb lurker (1.2-5sarge1) stable-security; urgency=high * merge patch from Wesley Terpstra to fix several major security bugs: - Lurker's mechanism for specifying configuration files was vulnerable to being overridden. As lurker includes sections of unparsed config files in its output, an attacker could manipulate lurker into reading any file readable by the www-data user. (CVE-2006-1062) - It were possible for a remote attacker to create or overwrite files in any writable directory that is named "mbox". (CVE-2006-1063) - Missing input sanitising allowed an attacker to inject arbitrary web script or HTML. (CVE-2006-1064) * ship the INSTALL file and a NEWS.Debian file for documenting the necessary changes. * restart apache{2,-perl,-ssl} if it includes /etc/lurker/apache.conf at /etc/apache*/conf.d/lurker stable/main/binary-m68k/lurker_1.2-5sarge1_m68k.deb lurker (1.2-5sarge1) stable-security; urgency=high * merge patch from Wesley Terpstra to fix several major security bugs: - Lurker's mechanism for specifying configuration files was vulnerable to being overridden. As lurker includes sections of unparsed config files in its output, an attacker could manipulate lurker into reading any file readable by the www-data user. (CVE-2006-1062) - It were possible for a remote attacker to create or overwrite files in any writable directory that is named "mbox". (CVE-2006-1063) - Missing input sanitising allowed an attacker to inject arbitrary web script or HTML. (CVE-2006-1064) * ship the INSTALL file and a NEWS.Debian file for documenting the necessary changes. * restart apache{2,-perl,-ssl} if it includes /etc/lurker/apache.conf at /etc/apache*/conf.d/lurker stable/main/binary-ia64/lurker_1.2-5sarge1_ia64.deb lurker (1.2-5sarge1) stable-security; urgency=high * merge patch from Wesley Terpstra to fix several major security bugs: - Lurker's mechanism for specifying configuration files was vulnerable to being overridden. As lurker includes sections of unparsed config files in its output, an attacker could manipulate lurker into reading any file readable by the www-data user. (CVE-2006-1062) - It were possible for a remote attacker to create or overwrite files in any writable directory that is named "mbox". (CVE-2006-1063) - Missing input sanitising allowed an attacker to inject arbitrary web script or HTML. (CVE-2006-1064) * ship the INSTALL file and a NEWS.Debian file for documenting the necessary changes. * restart apache{2,-perl,-ssl} if it includes /etc/lurker/apache.conf at /etc/apache*/conf.d/lurker stable/main/binary-hppa/lurker_1.2-5sarge1_hppa.deb lurker (1.2-5sarge1) stable-security; urgency=high * merge patch from Wesley Terpstra to fix several major security bugs: - Lurker's mechanism for specifying configuration files was vulnerable to being overridden. As lurker includes sections of unparsed config files in its output, an attacker could manipulate lurker into reading any file readable by the www-data user. (CVE-2006-1062) - It were possible for a remote attacker to create or overwrite files in any writable directory that is named "mbox". (CVE-2006-1063) - Missing input sanitising allowed an attacker to inject arbitrary web script or HTML. (CVE-2006-1064) * ship the INSTALL file and a NEWS.Debian file for documenting the necessary changes. * restart apache{2,-perl,-ssl} if it includes /etc/lurker/apache.conf at /etc/apache*/conf.d/lurker stable/main/binary-arm/lurker_1.2-5sarge1_arm.deb lurker (1.2-5sarge1) stable-security; urgency=high * merge patch from Wesley Terpstra to fix several major security bugs: - Lurker's mechanism for specifying configuration files was vulnerable to being overridden. As lurker includes sections of unparsed config files in its output, an attacker could manipulate lurker into reading any file readable by the www-data user. (CVE-2006-1062) - It were possible for a remote attacker to create or overwrite files in any writable directory that is named "mbox". (CVE-2006-1063) - Missing input sanitising allowed an attacker to inject arbitrary web script or HTML. (CVE-2006-1064) * ship the INSTALL file and a NEWS.Debian file for documenting the necessary changes. * restart apache{2,-perl,-ssl} if it includes /etc/lurker/apache.conf at /etc/apache*/conf.d/lurker stable/main/binary-alpha/lurker_1.2-5sarge1_alpha.deb lurker (1.2-5sarge1) stable-security; urgency=high * merge patch from Wesley Terpstra to fix several major security bugs: - Lurker's mechanism for specifying configuration files was vulnerable to being overridden. As lurker includes sections of unparsed config files in its output, an attacker could manipulate lurker into reading any file readable by the www-data user. (CVE-2006-1062) - It were possible for a remote attacker to create or overwrite files in any writable directory that is named "mbox". (CVE-2006-1063) - Missing input sanitising allowed an attacker to inject arbitrary web script or HTML. (CVE-2006-1064) * ship the INSTALL file and a NEWS.Debian file for documenting the necessary changes. * restart apache{2,-perl,-ssl} if it includes /etc/lurker/apache.conf at /etc/apache*/conf.d/lurker stable/main/source/lurker_1.2-5sarge1.diff.gz stable/main/source/lurker_1.2-5sarge1.dsc stable/main/binary-i386/lurker_1.2-5sarge1_i386.deb lurker (1.2-5sarge1) stable-security; urgency=high * merge patch from Wesley Terpstra to fix several major security bugs: - Lurker's mechanism for specifying configuration files was vulnerable to being overridden. As lurker includes sections of unparsed config files in its output, an attacker could manipulate lurker into reading any file readable by the www-data user. (CVE-2006-1062) - It were possible for a remote attacker to create or overwrite files in any writable directory that is named "mbox". (CVE-2006-1063) - Missing input sanitising allowed an attacker to inject arbitrary web script or HTML. (CVE-2006-1064) * ship the INSTALL file and a NEWS.Debian file for documenting the necessary changes. * restart apache{2,-perl,-ssl} if it includes /etc/lurker/apache.conf at /etc/apache*/conf.d/lurker stable/main/binary-sparc/lsh-client_2.0.1-3.sarge2_sparc.deb stable/main/binary-sparc/lsh-utils_2.0.1-3.sarge2_sparc.deb stable/main/binary-sparc/lsh-server_2.0.1-3.sarge2_sparc.deb lsh-utils (2.0.1-3.sarge2) stable-security; urgency=high * Non-maintainer upload by the Security Team * Bumped the version number due to binNMU for i386 stable/main/binary-s390/lsh-server_2.0.1-3.sarge2_s390.deb stable/main/binary-s390/lsh-client_2.0.1-3.sarge2_s390.deb stable/main/binary-s390/lsh-utils_2.0.1-3.sarge2_s390.deb lsh-utils (2.0.1-3.sarge2) stable-security; urgency=high * Non-maintainer upload by the Security Team * Bumped the version number due to binNMU for i386 stable/main/binary-mipsel/lsh-client_2.0.1-3.sarge2_mipsel.deb stable/main/binary-mipsel/lsh-utils_2.0.1-3.sarge2_mipsel.deb stable/main/binary-mipsel/lsh-server_2.0.1-3.sarge2_mipsel.deb lsh-utils (2.0.1-3.sarge2) stable-security; urgency=high * Non-maintainer upload by the Security Team * Bumped the version number due to binNMU for i386 stable/main/binary-mips/lsh-server_2.0.1-3.sarge2_mips.deb stable/main/binary-mips/lsh-utils_2.0.1-3.sarge2_mips.deb stable/main/binary-mips/lsh-client_2.0.1-3.sarge2_mips.deb lsh-utils (2.0.1-3.sarge2) stable-security; urgency=high * Non-maintainer upload by the Security Team * Bumped the version number due to binNMU for i386 stable/main/binary-m68k/lsh-utils_2.0.1-3.sarge2_m68k.deb stable/main/binary-m68k/lsh-server_2.0.1-3.sarge2_m68k.deb stable/main/binary-m68k/lsh-client_2.0.1-3.sarge2_m68k.deb lsh-utils (2.0.1-3.sarge2) stable-security; urgency=high * Non-maintainer upload by the Security Team * Bumped the version number due to binNMU for i386 stable/main/binary-ia64/lsh-utils_2.0.1-3.sarge2_ia64.deb stable/main/binary-ia64/lsh-server_2.0.1-3.sarge2_ia64.deb stable/main/binary-ia64/lsh-client_2.0.1-3.sarge2_ia64.deb lsh-utils (2.0.1-3.sarge2) stable-security; urgency=high * Non-maintainer upload by the Security Team * Bumped the version number due to binNMU for i386 stable/main/binary-i386/lsh-client_2.0.1-3.sarge2_i386.deb stable/main/binary-i386/lsh-utils_2.0.1-3.sarge2_i386.deb stable/main/binary-i386/lsh-server_2.0.1-3.sarge2_i386.deb lsh-utils (2.0.1-3.sarge2) stable-security; urgency=high * Non-maintainer upload by the Security Team * Bumped the version number due to binNMU for i386 stable/main/binary-hppa/lsh-client_2.0.1-3.sarge2_hppa.deb stable/main/binary-hppa/lsh-utils_2.0.1-3.sarge2_hppa.deb stable/main/binary-hppa/lsh-server_2.0.1-3.sarge2_hppa.deb lsh-utils (2.0.1-3.sarge2) stable-security; urgency=high * Non-maintainer upload by the Security Team * Bumped the version number due to binNMU for i386 stable/main/binary-arm/lsh-client_2.0.1-3.sarge2_arm.deb stable/main/binary-arm/lsh-server_2.0.1-3.sarge2_arm.deb stable/main/binary-arm/lsh-utils_2.0.1-3.sarge2_arm.deb lsh-utils (2.0.1-3.sarge2) stable-security; urgency=high * Non-maintainer upload by the Security Team * Bumped the version number due to binNMU for i386 stable/main/binary-alpha/lsh-server_2.0.1-3.sarge2_alpha.deb stable/main/binary-alpha/lsh-utils_2.0.1-3.sarge2_alpha.deb stable/main/binary-alpha/lsh-client_2.0.1-3.sarge2_alpha.deb lsh-utils (2.0.1-3.sarge2) stable-security; urgency=high * Non-maintainer upload by the Security Team * Bumped the version number due to binNMU for i386 stable/main/binary-powerpc/lsh-utils_2.0.1-3.sarge2_powerpc.deb stable/main/binary-powerpc/lsh-client_2.0.1-3.sarge2_powerpc.deb stable/main/binary-all/lsh-utils-doc_2.0.1-3.sarge2_all.deb stable/main/binary-powerpc/lsh-server_2.0.1-3.sarge2_powerpc.deb stable/main/source/lsh-utils_2.0.1-3.sarge2.dsc stable/main/source/lsh-utils_2.0.1-3.sarge2.diff.gz lsh-utils (2.0.1-3.sarge2) stable-security; urgency=high * Non-maintainer upload by the Security Team * Bumped the version number due to binNMU for i386 stable/main/binary-sparc/libtasn1-2_0.2.10-3sarge1_sparc.deb stable/main/binary-sparc/libtasn1-2-dev_0.2.10-3sarge1_sparc.deb libtasn1-2 (0.2.10-3sarge1) stable-security; urgency=high * Non-maintainer upload by the Security Team * Backported upstream patch to fix buffer overflows [lib/coding.c, lib/decoding.c, lib/der.h, lib/element.c, lib/libtasn1.h, lib/parser_aux.c, lib/structure.c, lib/int.h, CVE-2006-0645] stable/main/binary-s390/libtasn1-2_0.2.10-3sarge1_s390.deb stable/main/binary-s390/libtasn1-2-dev_0.2.10-3sarge1_s390.deb libtasn1-2 (0.2.10-3sarge1) stable-security; urgency=high * Non-maintainer upload by the Security Team * Backported upstream patch to fix buffer overflows [lib/coding.c, lib/decoding.c, lib/der.h, lib/element.c, lib/libtasn1.h, lib/parser_aux.c, lib/structure.c, lib/int.h, CVE-2006-0645] stable/main/binary-mipsel/libtasn1-2_0.2.10-3sarge1_mipsel.deb stable/main/binary-mipsel/libtasn1-2-dev_0.2.10-3sarge1_mipsel.deb libtasn1-2 (0.2.10-3sarge1) stable-security; urgency=high * Non-maintainer upload by the Security Team * Backported upstream patch to fix buffer overflows [lib/coding.c, lib/decoding.c, lib/der.h, lib/element.c, lib/libtasn1.h, lib/parser_aux.c, lib/structure.c, lib/int.h, CVE-2006-0645] stable/main/binary-mips/libtasn1-2_0.2.10-3sarge1_mips.deb stable/main/binary-mips/libtasn1-2-dev_0.2.10-3sarge1_mips.deb libtasn1-2 (0.2.10-3sarge1) stable-security; urgency=high * Non-maintainer upload by the Security Team * Backported upstream patch to fix buffer overflows [lib/coding.c, lib/decoding.c, lib/der.h, lib/element.c, lib/libtasn1.h, lib/parser_aux.c, lib/structure.c, lib/int.h, CVE-2006-0645] stable/main/binary-m68k/libtasn1-2-dev_0.2.10-3sarge1_m68k.deb stable/main/binary-m68k/libtasn1-2_0.2.10-3sarge1_m68k.deb libtasn1-2 (0.2.10-3sarge1) stable-security; urgency=high * Non-maintainer upload by the Security Team * Backported upstream patch to fix buffer overflows [lib/coding.c, lib/decoding.c, lib/der.h, lib/element.c, lib/libtasn1.h, lib/parser_aux.c, lib/structure.c, lib/int.h, CVE-2006-0645] stable/main/binary-ia64/libtasn1-2_0.2.10-3sarge1_ia64.deb stable/main/binary-ia64/libtasn1-2-dev_0.2.10-3sarge1_ia64.deb libtasn1-2 (0.2.10-3sarge1) stable-security; urgency=high * Non-maintainer upload by the Security Team * Backported upstream patch to fix buffer overflows [lib/coding.c, lib/decoding.c, lib/der.h, lib/element.c, lib/libtasn1.h, lib/parser_aux.c, lib/structure.c, lib/int.h, CVE-2006-0645] stable/main/binary-i386/libtasn1-2-dev_0.2.10-3sarge1_i386.deb stable/main/binary-i386/libtasn1-2_0.2.10-3sarge1_i386.deb libtasn1-2 (0.2.10-3sarge1) stable-security; urgency=high * Non-maintainer upload by the Security Team * Backported upstream patch to fix buffer overflows [lib/coding.c, lib/decoding.c, lib/der.h, lib/element.c, lib/libtasn1.h, lib/parser_aux.c, lib/structure.c, lib/int.h, CVE-2006-0645] stable/main/binary-hppa/libtasn1-2_0.2.10-3sarge1_hppa.deb stable/main/binary-hppa/libtasn1-2-dev_0.2.10-3sarge1_hppa.deb libtasn1-2 (0.2.10-3sarge1) stable-security; urgency=high * Non-maintainer upload by the Security Team * Backported upstream patch to fix buffer overflows [lib/coding.c, lib/decoding.c, lib/der.h, lib/element.c, lib/libtasn1.h, lib/parser_aux.c, lib/structure.c, lib/int.h, CVE-2006-0645] stable/main/binary-arm/libtasn1-2_0.2.10-3sarge1_arm.deb stable/main/binary-arm/libtasn1-2-dev_0.2.10-3sarge1_arm.deb libtasn1-2 (0.2.10-3sarge1) stable-security; urgency=high * Non-maintainer upload by the Security Team * Backported upstream patch to fix buffer overflows [lib/coding.c, lib/decoding.c, lib/der.h, lib/element.c, lib/libtasn1.h, lib/parser_aux.c, lib/structure.c, lib/int.h, CVE-2006-0645] stable/main/binary-alpha/libtasn1-2_0.2.10-3sarge1_alpha.deb stable/main/binary-alpha/libtasn1-2-dev_0.2.10-3sarge1_alpha.deb libtasn1-2 (0.2.10-3sarge1) stable-security; urgency=high * Non-maintainer upload by the Security Team * Backported upstream patch to fix buffer overflows [lib/coding.c, lib/decoding.c, lib/der.h, lib/element.c, lib/libtasn1.h, lib/parser_aux.c, lib/structure.c, lib/int.h, CVE-2006-0645] stable/main/binary-powerpc/libtasn1-2-dev_0.2.10-3sarge1_powerpc.deb stable/main/source/libtasn1-2_0.2.10-3sarge1.diff.gz stable/main/binary-powerpc/libtasn1-2_0.2.10-3sarge1_powerpc.deb stable/main/source/libtasn1-2_0.2.10-3sarge1.dsc libtasn1-2 (0.2.10-3sarge1) stable-security; urgency=high * Non-maintainer upload by the Security Team * Backported upstream patch to fix buffer overflows [lib/coding.c, lib/decoding.c, lib/der.h, lib/element.c, lib/libtasn1.h, lib/parser_aux.c, lib/structure.c, lib/int.h, CVE-2006-0645] stable/main/source/libphp-adodb_4.52-1sarge1.diff.gz stable/main/source/libphp-adodb_4.52-1sarge1.dsc stable/main/binary-all/libphp-adodb_4.52-1sarge1_all.deb libphp-adodb (4.52-1sarge1) stable-security; urgency=high * Non-maintainer upload to fix security problems * Fixed SQL injection [adodb/server.php, Bug#349985, debian/patches/01_CVE-2006-0146_server.php.patch] * Fixed arbitrary PHP execution [adodb/tests/tmssql.php, Bug#349985, debian/patches/02_CVE-2006-0147_tmssql.php.patch] * Fixed SQL injection [adodb/drivers/adodb-postgres64.inc.php, Bug#349985, debian/patches/03_CVE-2006-0410_adodb-postgres64.inc.php.patch] * Fixed multiple cross-site scripting vulnerabilities [adodb/adodb-pager.inc.php, Bug#358872, debian/patches/04_CVE-2006-0806_adodb-pager.inc.php.patch] stable/main/source/libmail-audit-perl_2.1-5sarge4.dsc stable/main/source/libmail-audit-perl_2.1-5sarge4.diff.gz stable/main/binary-all/mail-audit-tools_2.1-5sarge4_all.deb stable/main/binary-all/libmail-audit-perl_2.1-5sarge4_all.deb libmail-audit-perl (2.1-5sarge4) stable-security; urgency=high * Non-maintainer upload by the Security Team * Applied patch by Robert Mathews <rob@tigertech.com> to correct former patch [Audit.pm, CVE-2005-4536] stable/main/binary-sparc/libimager-perl_0.44-1sarge1_sparc.deb libimager-perl (0.44-1sarge1) stable-security; urgency=high * Non-maintainer upload by the Security Team * Applied patch by Tony Cook to fix denial of service [jpeg.c, tga.c, CVE-2006-0053] stable/main/binary-s390/libimager-perl_0.44-1sarge1_s390.deb libimager-perl (0.44-1sarge1) stable-security; urgency=high * Non-maintainer upload by the Security Team * Applied patch by Tony Cook to fix denial of service [jpeg.c, tga.c, CVE-2006-0053] stable/main/binary-mipsel/libimager-perl_0.44-1sarge1_mipsel.deb libimager-perl (0.44-1sarge1) stable-security; urgency=high * Non-maintainer upload by the Security Team * Applied patch by Tony Cook to fix denial of service [jpeg.c, tga.c, CVE-2006-0053] stable/main/binary-mips/libimager-perl_0.44-1sarge1_mips.deb libimager-perl (0.44-1sarge1) stable-security; urgency=high * Non-maintainer upload by the Security Team * Applied patch by Tony Cook to fix denial of service [jpeg.c, tga.c, CVE-2006-0053] stable/main/binary-m68k/libimager-perl_0.44-1sarge1_m68k.deb libimager-perl (0.44-1sarge1) stable-security; urgency=high * Non-maintainer upload by the Security Team * Applied patch by Tony Cook to fix denial of service [jpeg.c, tga.c, CVE-2006-0053] stable/main/binary-ia64/libimager-perl_0.44-1sarge1_ia64.deb libimager-perl (0.44-1sarge1) stable-security; urgency=high * Non-maintainer upload by the Security Team * Applied patch by Tony Cook to fix denial of service [jpeg.c, tga.c, CVE-2006-0053] stable/main/binary-i386/libimager-perl_0.44-1sarge1_i386.deb libimager-perl (0.44-1sarge1) stable-security; urgency=high * Non-maintainer upload by the Security Team * Applied patch by Tony Cook to fix denial of service [jpeg.c, tga.c, CVE-2006-0053] stable/main/binary-hppa/libimager-perl_0.44-1sarge1_hppa.deb libimager-perl (0.44-1sarge1) stable-security; urgency=high * Non-maintainer upload by the Security Team * Applied patch by Tony Cook to fix denial of service [jpeg.c, tga.c, CVE-2006-0053] stable/main/binary-arm/libimager-perl_0.44-1sarge1_arm.deb libimager-perl (0.44-1sarge1) stable-security; urgency=high * Non-maintainer upload by the Security Team * Applied patch by Tony Cook to fix denial of service [jpeg.c, tga.c, CVE-2006-0053] stable/main/binary-alpha/libimager-perl_0.44-1sarge1_alpha.deb libimager-perl (0.44-1sarge1) stable-security; urgency=high * Non-maintainer upload by the Security Team * Applied patch by Tony Cook to fix denial of service [jpeg.c, tga.c, CVE-2006-0053] stable/main/binary-powerpc/libimager-perl_0.44-1sarge1_powerpc.deb stable/main/source/libimager-perl_0.44-1sarge1.dsc stable/main/source/libimager-perl_0.44-1sarge1.diff.gz libimager-perl (0.44-1sarge1) stable-security; urgency=high * Non-maintainer upload by the Security Team * Applied patch by Tony Cook to fix denial of service [jpeg.c, tga.c, CVE-2006-0053] stable/main/binary-sparc/extract_0.4.2-2sarge3_sparc.deb stable/main/binary-sparc/libextractor1_0.4.2-2sarge3_sparc.deb stable/main/binary-sparc/libextractor1-dev_0.4.2-2sarge3_sparc.deb libextractor (0.4.2-2sarge3) stable-security; urgency=high * Applied patch to fix security-problem with imported code from xpdf: CVE-2006-0301. stable/main/binary-s390/libextractor1_0.4.2-2sarge3_s390.deb stable/main/binary-s390/libextractor1-dev_0.4.2-2sarge3_s390.deb stable/main/binary-s390/extract_0.4.2-2sarge3_s390.deb libextractor (0.4.2-2sarge3) stable-security; urgency=high * Applied patch to fix security-problem with imported code from xpdf: CVE-2006-0301. stable/main/binary-powerpc/libextractor1_0.4.2-2sarge3_powerpc.deb stable/main/binary-powerpc/libextractor1-dev_0.4.2-2sarge3_powerpc.deb stable/main/binary-powerpc/extract_0.4.2-2sarge3_powerpc.deb libextractor (0.4.2-2sarge3) stable-security; urgency=high * Applied patch to fix security-problem with imported code from xpdf: CVE-2006-0301. stable/main/binary-mipsel/libextractor1_0.4.2-2sarge3_mipsel.deb stable/main/binary-mipsel/extract_0.4.2-2sarge3_mipsel.deb stable/main/binary-mipsel/libextractor1-dev_0.4.2-2sarge3_mipsel.deb libextractor (0.4.2-2sarge3) stable-security; urgency=high * Applied patch to fix security-problem with imported code from xpdf: CVE-2006-0301. stable/main/binary-mips/libextractor1-dev_0.4.2-2sarge3_mips.deb stable/main/binary-mips/libextractor1_0.4.2-2sarge3_mips.deb stable/main/binary-mips/extract_0.4.2-2sarge3_mips.deb libextractor (0.4.2-2sarge3) stable-security; urgency=high * Applied patch to fix security-problem with imported code from xpdf: CVE-2006-0301. stable/main/binary-m68k/libextractor1-dev_0.4.2-2sarge3_m68k.deb stable/main/binary-m68k/extract_0.4.2-2sarge3_m68k.deb stable/main/binary-m68k/libextractor1_0.4.2-2sarge3_m68k.deb libextractor (0.4.2-2sarge3) stable-security; urgency=high * Applied patch to fix security-problem with imported code from xpdf: CVE-2006-0301. stable/main/binary-ia64/extract_0.4.2-2sarge3_ia64.deb stable/main/binary-ia64/libextractor1-dev_0.4.2-2sarge3_ia64.deb stable/main/binary-ia64/libextractor1_0.4.2-2sarge3_ia64.deb libextractor (0.4.2-2sarge3) stable-security; urgency=high * Applied patch to fix security-problem with imported code from xpdf: CVE-2006-0301. stable/main/binary-hppa/extract_0.4.2-2sarge3_hppa.deb stable/main/binary-hppa/libextractor1_0.4.2-2sarge3_hppa.deb stable/main/binary-hppa/libextractor1-dev_0.4.2-2sarge3_hppa.deb libextractor (0.4.2-2sarge3) stable-security; urgency=high * Applied patch to fix security-problem with imported code from xpdf: CVE-2006-0301. stable/main/binary-arm/extract_0.4.2-2sarge3_arm.deb stable/main/binary-arm/libextractor1-dev_0.4.2-2sarge3_arm.deb stable/main/binary-arm/libextractor1_0.4.2-2sarge3_arm.deb libextractor (0.4.2-2sarge3) stable-security; urgency=high * Applied patch to fix security-problem with imported code from xpdf: CVE-2006-0301. stable/main/binary-alpha/extract_0.4.2-2sarge3_alpha.deb stable/main/binary-alpha/libextractor1-dev_0.4.2-2sarge3_alpha.deb stable/main/binary-alpha/libextractor1_0.4.2-2sarge3_alpha.deb libextractor (0.4.2-2sarge3) stable-security; urgency=high * Applied patch to fix security-problem with imported code from xpdf: CVE-2006-0301. stable/main/binary-i386/extract_0.4.2-2sarge3_i386.deb stable/main/binary-i386/libextractor1_0.4.2-2sarge3_i386.deb stable/main/source/libextractor_0.4.2-2sarge3.diff.gz stable/main/source/libextractor_0.4.2-2sarge3.dsc stable/main/binary-i386/libextractor1-dev_0.4.2-2sarge3_i386.deb libextractor (0.4.2-2sarge3) stable-security; urgency=high * Applied patch to fix security-problem with imported code from xpdf: CVE-2006-0301. stable/main/binary-s390/libchipcard20-dev_0.9.1-7sarge0_s390.deb stable/main/binary-s390/libchipcard20_0.9.1-7sarge0_s390.deb stable/main/binary-s390/chipcard-tools_0.9.1-7sarge0_s390.deb libchipcard (0.9.1-7sarge0) stable; urgency=low * Don't remove user upon purge. Needed for fixing #346527. stable/main/binary-powerpc/libchipcard20-dev_0.9.1-7sarge0_powerpc.deb stable/main/binary-powerpc/libchipcard20_0.9.1-7sarge0_powerpc.deb stable/main/binary-powerpc/chipcard-tools_0.9.1-7sarge0_powerpc.deb libchipcard (0.9.1-7sarge0) stable; urgency=low * Don't remove user upon purge. Needed for fixing #346527. stable/main/binary-mipsel/libchipcard20_0.9.1-7sarge0_mipsel.deb stable/main/binary-mipsel/chipcard-tools_0.9.1-7sarge0_mipsel.deb stable/main/binary-mipsel/libchipcard20-dev_0.9.1-7sarge0_mipsel.deb libchipcard (0.9.1-7sarge0) stable; urgency=low * Don't remove user upon purge. Needed for fixing #346527. stable/main/binary-mips/libchipcard20_0.9.1-7sarge0_mips.deb stable/main/binary-mips/libchipcard20-dev_0.9.1-7sarge0_mips.deb stable/main/binary-mips/chipcard-tools_0.9.1-7sarge0_mips.deb libchipcard (0.9.1-7sarge0) stable; urgency=low * Don't remove user upon purge. Needed for fixing #346527. stable/main/binary-m68k/libchipcard20-dev_0.9.1-7sarge0_m68k.deb stable/main/binary-m68k/libchipcard20_0.9.1-7sarge0_m68k.deb stable/main/binary-m68k/chipcard-tools_0.9.1-7sarge0_m68k.deb libchipcard (0.9.1-7sarge0) stable; urgency=low * Don't remove user upon purge. Needed for fixing #346527. stable/main/binary-ia64/libchipcard20_0.9.1-7sarge0_ia64.deb stable/main/binary-ia64/chipcard-tools_0.9.1-7sarge0_ia64.deb stable/main/binary-ia64/libchipcard20-dev_0.9.1-7sarge0_ia64.deb libchipcard (0.9.1-7sarge0) stable; urgency=low * Don't remove user upon purge. Needed for fixing #346527. stable/main/binary-hppa/libchipcard20-dev_0.9.1-7sarge0_hppa.deb stable/main/binary-hppa/libchipcard20_0.9.1-7sarge0_hppa.deb stable/main/binary-hppa/chipcard-tools_0.9.1-7sarge0_hppa.deb libchipcard (0.9.1-7sarge0) stable; urgency=low * Don't remove user upon purge. Needed for fixing #346527. stable/main/binary-arm/chipcard-tools_0.9.1-7sarge0_arm.deb stable/main/binary-arm/libchipcard20_0.9.1-7sarge0_arm.deb stable/main/binary-arm/libchipcard20-dev_0.9.1-7sarge0_arm.deb libchipcard (0.9.1-7sarge0) stable; urgency=low * Don't remove user upon purge. Needed for fixing #346527. stable/main/binary-alpha/libchipcard20-dev_0.9.1-7sarge0_alpha.deb stable/main/binary-alpha/chipcard-tools_0.9.1-7sarge0_alpha.deb stable/main/binary-alpha/libchipcard20_0.9.1-7sarge0_alpha.deb libchipcard (0.9.1-7sarge0) stable; urgency=low * Don't remove user upon purge. Needed for fixing #346527. stable/main/binary-i386/chipcard-tools_0.9.1-7sarge0_i386.deb stable/main/binary-all/libchipcard-doc_0.9.1-7sarge0_all.deb stable/main/source/libchipcard_0.9.1-7sarge0.diff.gz stable/main/binary-i386/libchipcard20-dev_0.9.1-7sarge0_i386.deb stable/main/binary-all/libchipcard-common_0.9.1-7sarge0_all.deb stable/main/binary-i386/libchipcard20_0.9.1-7sarge0_i386.deb stable/main/source/libchipcard_0.9.1-7sarge0.dsc libchipcard (0.9.1-7sarge0) stable; urgency=low * Don't remove user upon purge. Needed for fixing #346527. stable/main/binary-sparc/libast2_0.6-0pre2003010606sarge1_sparc.deb stable/main/binary-sparc/libast2-dev_0.6-0pre2003010606sarge1_sparc.deb libast (0.6-0pre2003010606sarge1) stable-security; urgency=high * Non-maintainer upload by the security team * Backported upstream patch to fix buffer overflow [conf.c, CVE-2006-0224] stable/main/binary-s390/libast2_0.6-0pre2003010606sarge1_s390.deb stable/main/binary-s390/libast2-dev_0.6-0pre2003010606sarge1_s390.deb libast (0.6-0pre2003010606sarge1) stable-security; urgency=high * Non-maintainer upload by the security team * Backported upstream patch to fix buffer overflow [conf.c, CVE-2006-0224] stable/main/binary-mipsel/libast2_0.6-0pre2003010606sarge1_mipsel.deb stable/main/binary-mipsel/libast2-dev_0.6-0pre2003010606sarge1_mipsel.deb libast (0.6-0pre2003010606sarge1) stable-security; urgency=high * Non-maintainer upload by the security team * Backported upstream patch to fix buffer overflow [conf.c, CVE-2006-0224] stable/main/binary-mips/libast2-dev_0.6-0pre2003010606sarge1_mips.deb stable/main/binary-mips/libast2_0.6-0pre2003010606sarge1_mips.deb libast (0.6-0pre2003010606sarge1) stable-security; urgency=high * Non-maintainer upload by the security team * Backported upstream patch to fix buffer overflow [conf.c, CVE-2006-0224] stable/main/binary-m68k/libast2-dev_0.6-0pre2003010606sarge1_m68k.deb stable/main/binary-m68k/libast2_0.6-0pre2003010606sarge1_m68k.deb libast (0.6-0pre2003010606sarge1) stable-security; urgency=high * Non-maintainer upload by the security team * Backported upstream patch to fix buffer overflow [conf.c, CVE-2006-0224] stable/main/binary-ia64/libast2-dev_0.6-0pre2003010606sarge1_ia64.deb stable/main/binary-ia64/libast2_0.6-0pre2003010606sarge1_ia64.deb libast (0.6-0pre2003010606sarge1) stable-security; urgency=high * Non-maintainer upload by the security team * Backported upstream patch to fix buffer overflow [conf.c, CVE-2006-0224] stable/main/binary-i386/libast2_0.6-0pre2003010606sarge1_i386.deb stable/main/binary-i386/libast2-dev_0.6-0pre2003010606sarge1_i386.deb libast (0.6-0pre2003010606sarge1) stable-security; urgency=high * Non-maintainer upload by the security team * Backported upstream patch to fix buffer overflow [conf.c, CVE-2006-0224] stable/main/binary-hppa/libast2_0.6-0pre2003010606sarge1_hppa.deb stable/main/binary-hppa/libast2-dev_0.6-0pre2003010606sarge1_hppa.deb libast (0.6-0pre2003010606sarge1) stable-security; urgency=high * Non-maintainer upload by the security team * Backported upstream patch to fix buffer overflow [conf.c, CVE-2006-0224] stable/main/binary-arm/libast2_0.6-0pre2003010606sarge1_arm.deb stable/main/binary-arm/libast2-dev_0.6-0pre2003010606sarge1_arm.deb libast (0.6-0pre2003010606sarge1) stable-security; urgency=high * Non-maintainer upload by the security team * Backported upstream patch to fix buffer overflow [conf.c, CVE-2006-0224] stable/main/binary-alpha/libast2-dev_0.6-0pre2003010606sarge1_alpha.deb stable/main/binary-alpha/libast2_0.6-0pre2003010606sarge1_alpha.deb libast (0.6-0pre2003010606sarge1) stable-security; urgency=high * Non-maintainer upload by the security team * Backported upstream patch to fix buffer overflow [conf.c, CVE-2006-0224] stable/main/source/libast_0.6-0pre2003010606sarge1.dsc stable/main/binary-powerpc/libast2-dev_0.6-0pre2003010606sarge1_powerpc.deb stable/main/binary-powerpc/libast2_0.6-0pre2003010606sarge1_powerpc.deb stable/main/source/libast_0.6-0pre2003010606sarge1.tar.gz libast (0.6-0pre2003010606sarge1) stable-security; urgency=high * Non-maintainer upload by the security team * Backported upstream patch to fix buffer overflow [conf.c, CVE-2006-0224] stable/main/binary-sparc/libapache2-request-perl_2.04-dev-1sarge2_sparc.deb libapreq2-perl (2.04-dev-1sarge2) stable-security; urgency=medium * Fix incomplete backport from -1sarge1, breaking file uploads. (Closes: #358689) stable/main/binary-s390/libapache2-request-perl_2.04-dev-1sarge2_s390.deb libapreq2-perl (2.04-dev-1sarge2) stable-security; urgency=medium * Fix incomplete backport from -1sarge1, breaking file uploads. (Closes: #358689) stable/main/binary-mipsel/libapache2-request-perl_2.04-dev-1sarge2_mipsel.deb libapreq2-perl (2.04-dev-1sarge2) stable-security; urgency=medium * Fix incomplete backport from -1sarge1, breaking file uploads. (Closes: #358689) stable/main/binary-mips/libapache2-request-perl_2.04-dev-1sarge2_mips.deb libapreq2-perl (2.04-dev-1sarge2) stable-security; urgency=medium * Fix incomplete backport from -1sarge1, breaking file uploads. (Closes: #358689) stable/main/binary-m68k/libapache2-request-perl_2.04-dev-1sarge2_m68k.deb libapreq2-perl (2.04-dev-1sarge2) stable-security; urgency=medium * Fix incomplete backport from -1sarge1, breaking file uploads. (Closes: #358689) stable/main/binary-ia64/libapache2-request-perl_2.04-dev-1sarge2_ia64.deb libapreq2-perl (2.04-dev-1sarge2) stable-security; urgency=medium * Fix incomplete backport from -1sarge1, breaking file uploads. (Closes: #358689) stable/main/binary-i386/libapache2-request-perl_2.04-dev-1sarge2_i386.deb libapreq2-perl (2.04-dev-1sarge2) stable-security; urgency=medium * Fix incomplete backport from -1sarge1, breaking file uploads. (Closes: #358689) stable/main/binary-hppa/libapache2-request-perl_2.04-dev-1sarge2_hppa.deb libapreq2-perl (2.04-dev-1sarge2) stable-security; urgency=medium * Fix incomplete backport from -1sarge1, breaking file uploads. (Closes: #358689) stable/main/binary-arm/libapache2-request-perl_2.04-dev-1sarge2_arm.deb libapreq2-perl (2.04-dev-1sarge2) stable-security; urgency=medium * Fix incomplete backport from -1sarge1, breaking file uploads. (Closes: #358689) stable/main/binary-alpha/libapache2-request-perl_2.04-dev-1sarge2_alpha.deb libapreq2-perl (2.04-dev-1sarge2) stable-security; urgency=medium * Fix incomplete backport from -1sarge1, breaking file uploads. (Closes: #358689) stable/main/binary-powerpc/libapache2-request-perl_2.04-dev-1sarge2_powerpc.deb stable/main/source/libapreq2-perl_2.04-dev-1sarge2.diff.gz stable/main/source/libapreq2-perl_2.04-dev-1sarge2.dsc libapreq2-perl (2.04-dev-1sarge2) stable-security; urgency=medium * Fix incomplete backport from -1sarge1, breaking file uploads. (Closes: #358689) stable/main/binary-sparc/libapache2-mod-auth-pgsql_2.0.2b1-5sarge0_sparc.deb libapache2-mod-auth-pgsql (2.0.2b1-5sarge0) stable-security; urgency=high * Non-maintainer upload by The Security Team. * Fix potentially exploitable format string attacks. [CVE-2005-3656] stable/main/binary-s390/libapache2-mod-auth-pgsql_2.0.2b1-5sarge0_s390.deb libapache2-mod-auth-pgsql (2.0.2b1-5sarge0) stable-security; urgency=high * Non-maintainer upload by The Security Team. * Fix potentially exploitable format string attacks. [CVE-2005-3656] stable/main/binary-powerpc/libapache2-mod-auth-pgsql_2.0.2b1-5sarge0_powerpc.deb libapache2-mod-auth-pgsql (2.0.2b1-5sarge0) stable-security; urgency=high * Non-maintainer upload by The Security Team. * Fix potentially exploitable format string attacks. [CVE-2005-3656] stable/main/binary-mipsel/libapache2-mod-auth-pgsql_2.0.2b1-5sarge0_mipsel.deb libapache2-mod-auth-pgsql (2.0.2b1-5sarge0) stable-security; urgency=high * Non-maintainer upload by The Security Team. * Fix potentially exploitable format string attacks. [CVE-2005-3656] stable/main/binary-mips/libapache2-mod-auth-pgsql_2.0.2b1-5sarge0_mips.deb libapache2-mod-auth-pgsql (2.0.2b1-5sarge0) stable-security; urgency=high * Non-maintainer upload by The Security Team. * Fix potentially exploitable format string attacks. [CVE-2005-3656] stable/main/binary-m68k/libapache2-mod-auth-pgsql_2.0.2b1-5sarge0_m68k.deb libapache2-mod-auth-pgsql (2.0.2b1-5sarge0) stable-security; urgency=high * Non-maintainer upload by The Security Team. * Fix potentially exploitable format string attacks. [CVE-2005-3656] stable/main/binary-ia64/libapache2-mod-auth-pgsql_2.0.2b1-5sarge0_ia64.deb libapache2-mod-auth-pgsql (2.0.2b1-5sarge0) stable-security; urgency=high * Non-maintainer upload by The Security Team. * Fix potentially exploitable format string attacks. [CVE-2005-3656] stable/main/binary-hppa/libapache2-mod-auth-pgsql_2.0.2b1-5sarge0_hppa.deb libapache2-mod-auth-pgsql (2.0.2b1-5sarge0) stable-security; urgency=high * Non-maintainer upload by The Security Team. * Fix potentially exploitable format string attacks. [CVE-2005-3656] stable/main/binary-arm/libapache2-mod-auth-pgsql_2.0.2b1-5sarge0_arm.deb libapache2-mod-auth-pgsql (2.0.2b1-5sarge0) stable-security; urgency=high * Non-maintainer upload by The Security Team. * Fix potentially exploitable format string attacks. [CVE-2005-3656] stable/main/binary-alpha/libapache2-mod-auth-pgsql_2.0.2b1-5sarge0_alpha.deb libapache2-mod-auth-pgsql (2.0.2b1-5sarge0) stable-security; urgency=high * Non-maintainer upload by The Security Team. * Fix potentially exploitable format string attacks. [CVE-2005-3656] stable/main/binary-i386/libapache2-mod-auth-pgsql_2.0.2b1-5sarge0_i386.deb stable/main/source/libapache2-mod-auth-pgsql_2.0.2b1-5sarge0.diff.gz stable/main/source/libapache2-mod-auth-pgsql_2.0.2b1-5sarge0.dsc libapache2-mod-auth-pgsql (2.0.2b1-5sarge0) stable-security; urgency=high * Non-maintainer upload by The Security Team. * Fix potentially exploitable format string attacks. [CVE-2005-3656] stable/main/binary-sparc/libapache-auth-ldap_1.6.0-8.1_sparc.deb libapache-auth-ldap (1.6.0-8.1) stable-security; urgency=high * Non-maintainer upload by the Security Team * Fix remotely exploitable format string vulnerabilities. (CVE-2006-0150) stable/main/binary-s390/libapache-auth-ldap_1.6.0-8.1_s390.deb libapache-auth-ldap (1.6.0-8.1) stable-security; urgency=high * Non-maintainer upload by the Security Team * Fix remotely exploitable format string vulnerabilities. (CVE-2006-0150) stable/main/binary-powerpc/libapache-auth-ldap_1.6.0-8.1_powerpc.deb libapache-auth-ldap (1.6.0-8.1) stable-security; urgency=high * Non-maintainer upload by the Security Team * Fix remotely exploitable format string vulnerabilities. (CVE-2006-0150) stable/main/binary-mipsel/libapache-auth-ldap_1.6.0-8.1_mipsel.deb libapache-auth-ldap (1.6.0-8.1) stable-security; urgency=high * Non-maintainer upload by the Security Team * Fix remotely exploitable format string vulnerabilities. (CVE-2006-0150) stable/main/binary-mips/libapache-auth-ldap_1.6.0-8.1_mips.deb libapache-auth-ldap (1.6.0-8.1) stable-security; urgency=high * Non-maintainer upload by the Security Team * Fix remotely exploitable format string vulnerabilities. (CVE-2006-0150) stable/main/binary-m68k/libapache-auth-ldap_1.6.0-8.1_m68k.deb libapache-auth-ldap (1.6.0-8.1) stable-security; urgency=high * Non-maintainer upload by the Security Team * Fix remotely exploitable format string vulnerabilities. (CVE-2006-0150) stable/main/binary-ia64/libapache-auth-ldap_1.6.0-8.1_ia64.deb libapache-auth-ldap (1.6.0-8.1) stable-security; urgency=high * Non-maintainer upload by the Security Team * Fix remotely exploitable format string vulnerabilities. (CVE-2006-0150) stable/main/binary-hppa/libapache-auth-ldap_1.6.0-8.1_hppa.deb libapache-auth-ldap (1.6.0-8.1) stable-security; urgency=high * Non-maintainer upload by the Security Team * Fix remotely exploitable format string vulnerabilities. (CVE-2006-0150) stable/main/binary-arm/libapache-auth-ldap_1.6.0-8.1_arm.deb libapache-auth-ldap (1.6.0-8.1) stable-security; urgency=high * Non-maintainer upload by the Security Team * Fix remotely exploitable format string vulnerabilities. (CVE-2006-0150) stable/main/binary-alpha/libapache-auth-ldap_1.6.0-8.1_alpha.deb libapache-auth-ldap (1.6.0-8.1) stable-security; urgency=high * Non-maintainer upload by the Security Team * Fix remotely exploitable format string vulnerabilities. (CVE-2006-0150) stable/main/source/libapache-auth-ldap_1.6.0-8.1.diff.gz stable/main/binary-i386/libapache-auth-ldap_1.6.0-8.1_i386.deb stable/main/source/libapache-auth-ldap_1.6.0-8.1.dsc libapache-auth-ldap (1.6.0-8.1) stable-security; urgency=high * Non-maintainer upload by the Security Team * Fix remotely exploitable format string vulnerabilities. (CVE-2006-0150) stable/main/binary-sparc/leafnode_1.11.2.rel-1.0sarge0_sparc.deb leafnode (1.11.2.rel-1.0sarge0) stable; urgency=low * Backport fix for CVE 2005-1911 fixing a denial of service problem in fetchnews (closes: #338886). stable/main/binary-s390/leafnode_1.11.2.rel-1.0sarge0_s390.deb leafnode (1.11.2.rel-1.0sarge0) stable; urgency=low * Backport fix for CVE 2005-1911 fixing a denial of service problem in fetchnews (closes: #338886). stable/main/binary-mipsel/leafnode_1.11.2.rel-1.0sarge0_mipsel.deb leafnode (1.11.2.rel-1.0sarge0) stable; urgency=low * Backport fix for CVE 2005-1911 fixing a denial of service problem in fetchnews (closes: #338886). stable/main/binary-mips/leafnode_1.11.2.rel-1.0sarge0_mips.deb leafnode (1.11.2.rel-1.0sarge0) stable; urgency=low * Backport fix for CVE 2005-1911 fixing a denial of service problem in fetchnews (closes: #338886). stable/main/binary-m68k/leafnode_1.11.2.rel-1.0sarge0_m68k.deb leafnode (1.11.2.rel-1.0sarge0) stable; urgency=low * Backport fix for CVE 2005-1911 fixing a denial of service problem in fetchnews (closes: #338886). stable/main/binary-ia64/leafnode_1.11.2.rel-1.0sarge0_ia64.deb leafnode (1.11.2.rel-1.0sarge0) stable; urgency=low * Backport fix for CVE 2005-1911 fixing a denial of service problem in fetchnews (closes: #338886). stable/main/binary-i386/leafnode_1.11.2.rel-1.0sarge0_i386.deb leafnode (1.11.2.rel-1.0sarge0) stable; urgency=low * Backport fix for CVE 2005-1911 fixing a denial of service problem in fetchnews (closes: #338886). stable/main/binary-hppa/leafnode_1.11.2.rel-1.0sarge0_hppa.deb leafnode (1.11.2.rel-1.0sarge0) stable; urgency=low * Backport fix for CVE 2005-1911 fixing a denial of service problem in fetchnews (closes: #338886). stable/main/binary-arm/leafnode_1.11.2.rel-1.0sarge0_arm.deb leafnode (1.11.2.rel-1.0sarge0) stable; urgency=low * Backport fix for CVE 2005-1911 fixing a denial of service problem in fetchnews (closes: #338886). stable/main/binary-alpha/leafnode_1.11.2.rel-1.0sarge0_alpha.deb leafnode (1.11.2.rel-1.0sarge0) stable; urgency=low * Backport fix for CVE 2005-1911 fixing a denial of service problem in fetchnews (closes: #338886). stable/main/source/leafnode_1.11.2.rel-1.0sarge0.diff.gz stable/main/binary-powerpc/leafnode_1.11.2.rel-1.0sarge0_powerpc.deb stable/main/source/leafnode_1.11.2.rel-1.0sarge0.dsc leafnode (1.11.2.rel-1.0sarge0) stable; urgency=low * Backport fix for CVE 2005-1911 fixing a denial of service problem in fetchnews (closes: #338886). stable/main/binary-all/kronolith_1.1.4-2sarge1_all.deb stable/main/source/kronolith_1.1.4-2sarge1.dsc stable/main/source/kronolith_1.1.4-2sarge1.diff.gz kronolith (1.1.4-2sarge1) stable-security; urgency=high * Non-maintainer upload by the Security Team * Backported upstream security patch for kronolith2 to fix several cross-site-scripting vulnerabilities [templates/edit/edit.inc, templates/view/view.inc, templates/delete/one.inc, templates/delete/delete.inc, CVE-2005-4189, Bug#342943, Bug#349261] stable/main/binary-sparc/koshell_1.3.5-4.sarge.3_sparc.deb stable/main/binary-sparc/kpresenter_1.3.5-4.sarge.3_sparc.deb stable/main/binary-sparc/kformula_1.3.5-4.sarge.3_sparc.deb stable/main/binary-sparc/karbon_1.3.5-4.sarge.3_sparc.deb stable/main/binary-sparc/koffice-libs_1.3.5-4.sarge.3_sparc.deb stable/main/binary-sparc/koffice-dev_1.3.5-4.sarge.3_sparc.deb stable/main/binary-sparc/kspread_1.3.5-4.sarge.3_sparc.deb stable/main/binary-sparc/kivio_1.3.5-4.sarge.3_sparc.deb stable/main/binary-sparc/kugar_1.3.5-4.sarge.3_sparc.deb stable/main/binary-sparc/kchart_1.3.5-4.sarge.3_sparc.deb stable/main/binary-sparc/kword_1.3.5-4.sarge.3_sparc.deb koffice (1:1.3.5-4.sarge.3) stable-security; urgency=high * Non-maintainer upload by the Security Team * Backported upstream patch by Derek Noonburg to fix several vulnerabilities [filters/kword/pdf/xpdf/goo/gmem.c, filters/kword/pdf/xpdf/xpdf/JBIG2Stream.cc, filters/kword/pdf/xpdf/xpdf/Stream.h, debian/patches/z_10_security_upstream.diff] stable/main/binary-s390/kugar_1.3.5-4.sarge.3_s390.deb stable/main/binary-s390/karbon_1.3.5-4.sarge.3_s390.deb stable/main/binary-s390/kivio_1.3.5-4.sarge.3_s390.deb stable/main/binary-s390/kword_1.3.5-4.sarge.3_s390.deb stable/main/binary-s390/koshell_1.3.5-4.sarge.3_s390.deb stable/main/binary-s390/kchart_1.3.5-4.sarge.3_s390.deb stable/main/binary-s390/kpresenter_1.3.5-4.sarge.3_s390.deb stable/main/binary-s390/kformula_1.3.5-4.sarge.3_s390.deb stable/main/binary-s390/kspread_1.3.5-4.sarge.3_s390.deb stable/main/binary-s390/koffice-libs_1.3.5-4.sarge.3_s390.deb stable/main/binary-s390/koffice-dev_1.3.5-4.sarge.3_s390.deb koffice (1:1.3.5-4.sarge.3) stable-security; urgency=high * Non-maintainer upload by the Security Team * Backported upstream patch by Derek Noonburg to fix several vulnerabilities [filters/kword/pdf/xpdf/goo/gmem.c, filters/kword/pdf/xpdf/xpdf/JBIG2Stream.cc, filters/kword/pdf/xpdf/xpdf/Stream.h, debian/patches/z_10_security_upstream.diff] stable/main/binary-mipsel/kformula_1.3.5-4.sarge.3_mipsel.deb stable/main/binary-mipsel/kugar_1.3.5-4.sarge.3_mipsel.deb stable/main/binary-mipsel/kpresenter_1.3.5-4.sarge.3_mipsel.deb stable/main/binary-mipsel/koffice-libs_1.3.5-4.sarge.3_mipsel.deb stable/main/binary-mipsel/kchart_1.3.5-4.sarge.3_mipsel.deb stable/main/binary-mipsel/kivio_1.3.5-4.sarge.3_mipsel.deb stable/main/binary-mipsel/karbon_1.3.5-4.sarge.3_mipsel.deb stable/main/binary-mipsel/koffice-dev_1.3.5-4.sarge.3_mipsel.deb stable/main/binary-mipsel/kword_1.3.5-4.sarge.3_mipsel.deb stable/main/binary-mipsel/koshell_1.3.5-4.sarge.3_mipsel.deb stable/main/binary-mipsel/kspread_1.3.5-4.sarge.3_mipsel.deb koffice (1:1.3.5-4.sarge.3) stable-security; urgency=high * Non-maintainer upload by the Security Team * Backported upstream patch by Derek Noonburg to fix several vulnerabilities [filters/kword/pdf/xpdf/goo/gmem.c, filters/kword/pdf/xpdf/xpdf/JBIG2Stream.cc, filters/kword/pdf/xpdf/xpdf/Stream.h, debian/patches/z_10_security_upstream.diff] stable/main/binary-mips/koffice-dev_1.3.5-4.sarge.3_mips.deb stable/main/binary-mips/kpresenter_1.3.5-4.sarge.3_mips.deb stable/main/binary-mips/kformula_1.3.5-4.sarge.3_mips.deb stable/main/binary-mips/kspread_1.3.5-4.sarge.3_mips.deb stable/main/binary-mips/kivio_1.3.5-4.sarge.3_mips.deb stable/main/binary-mips/koshell_1.3.5-4.sarge.3_mips.deb stable/main/binary-mips/koffice-libs_1.3.5-4.sarge.3_mips.deb stable/main/binary-mips/kugar_1.3.5-4.sarge.3_mips.deb stable/main/binary-mips/kword_1.3.5-4.sarge.3_mips.deb stable/main/binary-mips/karbon_1.3.5-4.sarge.3_mips.deb stable/main/binary-mips/kchart_1.3.5-4.sarge.3_mips.deb koffice (1:1.3.5-4.sarge.3) stable-security; urgency=high * Non-maintainer upload by the Security Team * Backported upstream patch by Derek Noonburg to fix several vulnerabilities [filters/kword/pdf/xpdf/goo/gmem.c, filters/kword/pdf/xpdf/xpdf/JBIG2Stream.cc, filters/kword/pdf/xpdf/xpdf/Stream.h, debian/patches/z_10_security_upstream.diff] stable/main/binary-m68k/karbon_1.3.5-4.sarge.3_m68k.deb stable/main/binary-m68k/kivio_1.3.5-4.sarge.3_m68k.deb stable/main/binary-m68k/kpresenter_1.3.5-4.sarge.3_m68k.deb stable/main/binary-m68k/kformula_1.3.5-4.sarge.3_m68k.deb stable/main/binary-m68k/kspread_1.3.5-4.sarge.3_m68k.deb stable/main/binary-m68k/kugar_1.3.5-4.sarge.3_m68k.deb stable/main/binary-m68k/koshell_1.3.5-4.sarge.3_m68k.deb stable/main/binary-m68k/kword_1.3.5-4.sarge.3_m68k.deb stable/main/binary-m68k/koffice-libs_1.3.5-4.sarge.3_m68k.deb stable/main/binary-m68k/kchart_1.3.5-4.sarge.3_m68k.deb stable/main/binary-m68k/koffice-dev_1.3.5-4.sarge.3_m68k.deb koffice (1:1.3.5-4.sarge.3) stable-security; urgency=high * Non-maintainer upload by the Security Team * Backported upstream patch by Derek Noonburg to fix several vulnerabilities [filters/kword/pdf/xpdf/goo/gmem.c, filters/kword/pdf/xpdf/xpdf/JBIG2Stream.cc, filters/kword/pdf/xpdf/xpdf/Stream.h, debian/patches/z_10_security_upstream.diff] stable/main/binary-ia64/karbon_1.3.5-4.sarge.3_ia64.deb stable/main/binary-ia64/kword_1.3.5-4.sarge.3_ia64.deb stable/main/binary-ia64/kspread_1.3.5-4.sarge.3_ia64.deb stable/main/binary-ia64/koffice-dev_1.3.5-4.sarge.3_ia64.deb stable/main/binary-ia64/koshell_1.3.5-4.sarge.3_ia64.deb stable/main/binary-ia64/kpresenter_1.3.5-4.sarge.3_ia64.deb stable/main/binary-ia64/kchart_1.3.5-4.sarge.3_ia64.deb stable/main/binary-ia64/kivio_1.3.5-4.sarge.3_ia64.deb stable/main/binary-ia64/kugar_1.3.5-4.sarge.3_ia64.deb stable/main/binary-ia64/kformula_1.3.5-4.sarge.3_ia64.deb stable/main/binary-ia64/koffice-libs_1.3.5-4.sarge.3_ia64.deb koffice (1:1.3.5-4.sarge.3) stable-security; urgency=high * Non-maintainer upload by the Security Team * Backported upstream patch by Derek Noonburg to fix several vulnerabilities [filters/kword/pdf/xpdf/goo/gmem.c, filters/kword/pdf/xpdf/xpdf/JBIG2Stream.cc, filters/kword/pdf/xpdf/xpdf/Stream.h, debian/patches/z_10_security_upstream.diff] stable/main/binary-i386/kformula_1.3.5-4.sarge.3_i386.deb stable/main/binary-i386/kpresenter_1.3.5-4.sarge.3_i386.deb stable/main/binary-i386/koffice-libs_1.3.5-4.sarge.3_i386.deb stable/main/binary-i386/karbon_1.3.5-4.sarge.3_i386.deb stable/main/binary-i386/koshell_1.3.5-4.sarge.3_i386.deb stable/main/binary-i386/kspread_1.3.5-4.sarge.3_i386.deb stable/main/binary-i386/kugar_1.3.5-4.sarge.3_i386.deb stable/main/binary-i386/koffice-dev_1.3.5-4.sarge.3_i386.deb stable/main/binary-i386/kword_1.3.5-4.sarge.3_i386.deb stable/main/binary-i386/kchart_1.3.5-4.sarge.3_i386.deb stable/main/binary-i386/kivio_1.3.5-4.sarge.3_i386.deb koffice (1:1.3.5-4.sarge.3) stable-security; urgency=high * Non-maintainer upload by the Security Team * Backported upstream patch by Derek Noonburg to fix several vulnerabilities [filters/kword/pdf/xpdf/goo/gmem.c, filters/kword/pdf/xpdf/xpdf/JBIG2Stream.cc, filters/kword/pdf/xpdf/xpdf/Stream.h, debian/patches/z_10_security_upstream.diff] stable/main/binary-hppa/koffice-dev_1.3.5-4.sarge.3_hppa.deb stable/main/binary-hppa/kugar_1.3.5-4.sarge.3_hppa.deb stable/main/binary-hppa/karbon_1.3.5-4.sarge.3_hppa.deb stable/main/binary-hppa/koshell_1.3.5-4.sarge.3_hppa.deb stable/main/binary-hppa/kword_1.3.5-4.sarge.3_hppa.deb stable/main/binary-hppa/kspread_1.3.5-4.sarge.3_hppa.deb stable/main/binary-hppa/kpresenter_1.3.5-4.sarge.3_hppa.deb stable/main/binary-hppa/kivio_1.3.5-4.sarge.3_hppa.deb stable/main/binary-hppa/kchart_1.3.5-4.sarge.3_hppa.deb stable/main/binary-hppa/koffice-libs_1.3.5-4.sarge.3_hppa.deb stable/main/binary-hppa/kformula_1.3.5-4.sarge.3_hppa.deb koffice (1:1.3.5-4.sarge.3) stable-security; urgency=high * Non-maintainer upload by the Security Team * Backported upstream patch by Derek Noonburg to fix several vulnerabilities [filters/kword/pdf/xpdf/goo/gmem.c, filters/kword/pdf/xpdf/xpdf/JBIG2Stream.cc, filters/kword/pdf/xpdf/xpdf/Stream.h, debian/patches/z_10_security_upstream.diff] stable/main/binary-arm/kformula_1.3.5-4.sarge.3_arm.deb stable/main/binary-arm/koshell_1.3.5-4.sarge.3_arm.deb stable/main/binary-arm/kivio_1.3.5-4.sarge.3_arm.deb stable/main/binary-arm/kspread_1.3.5-4.sarge.3_arm.deb stable/main/binary-arm/koffice-dev_1.3.5-4.sarge.3_arm.deb stable/main/binary-arm/karbon_1.3.5-4.sarge.3_arm.deb stable/main/binary-arm/kchart_1.3.5-4.sarge.3_arm.deb stable/main/binary-arm/koffice-libs_1.3.5-4.sarge.3_arm.deb stable/main/binary-arm/kugar_1.3.5-4.sarge.3_arm.deb stable/main/binary-arm/kword_1.3.5-4.sarge.3_arm.deb stable/main/binary-arm/kpresenter_1.3.5-4.sarge.3_arm.deb koffice (1:1.3.5-4.sarge.3) stable-security; urgency=high * Non-maintainer upload by the Security Team * Backported upstream patch by Derek Noonburg to fix several vulnerabilities [filters/kword/pdf/xpdf/goo/gmem.c, filters/kword/pdf/xpdf/xpdf/JBIG2Stream.cc, filters/kword/pdf/xpdf/xpdf/Stream.h, debian/patches/z_10_security_upstream.diff] stable/main/binary-alpha/kchart_1.3.5-4.sarge.3_alpha.deb stable/main/binary-alpha/koshell_1.3.5-4.sarge.3_alpha.deb stable/main/binary-alpha/koffice-dev_1.3.5-4.sarge.3_alpha.deb stable/main/binary-alpha/kivio_1.3.5-4.sarge.3_alpha.deb stable/main/binary-alpha/kugar_1.3.5-4.sarge.3_alpha.deb stable/main/binary-alpha/karbon_1.3.5-4.sarge.3_alpha.deb stable/main/binary-alpha/kword_1.3.5-4.sarge.3_alpha.deb stable/main/binary-alpha/koffice-libs_1.3.5-4.sarge.3_alpha.deb stable/main/binary-alpha/kformula_1.3.5-4.sarge.3_alpha.deb stable/main/binary-alpha/kspread_1.3.5-4.sarge.3_alpha.deb stable/main/binary-alpha/kpresenter_1.3.5-4.sarge.3_alpha.deb koffice (1:1.3.5-4.sarge.3) stable-security; urgency=high * Non-maintainer upload by the Security Team * Backported upstream patch by Derek Noonburg to fix several vulnerabilities [filters/kword/pdf/xpdf/goo/gmem.c, filters/kword/pdf/xpdf/xpdf/JBIG2Stream.cc, filters/kword/pdf/xpdf/xpdf/Stream.h, debian/patches/z_10_security_upstream.diff] stable/main/binary-powerpc/koffice-libs_1.3.5-4.sarge.3_powerpc.deb stable/main/binary-powerpc/koffice-dev_1.3.5-4.sarge.3_powerpc.deb stable/main/binary-powerpc/kformula_1.3.5-4.sarge.3_powerpc.deb stable/main/binary-all/koffice-doc-html_1.3.5-4.sarge.3_all.deb stable/main/binary-powerpc/kword_1.3.5-4.sarge.3_powerpc.deb stable/main/binary-all/koffice_1.3.5-4.sarge.3_all.deb stable/main/binary-powerpc/karbon_1.3.5-4.sarge.3_powerpc.deb stable/main/binary-powerpc/kivio_1.3.5-4.sarge.3_powerpc.deb stable/main/binary-all/kivio-data_1.3.5-4.sarge.3_all.deb stable/main/source/koffice_1.3.5-4.sarge.3.diff.gz stable/main/binary-powerpc/kchart_1.3.5-4.sarge.3_powerpc.deb stable/main/binary-powerpc/koshell_1.3.5-4.sarge.3_powerpc.deb stable/main/binary-powerpc/kspread_1.3.5-4.sarge.3_powerpc.deb stable/main/source/koffice_1.3.5-4.sarge.3.dsc stable/main/binary-powerpc/kpresenter_1.3.5-4.sarge.3_powerpc.deb stable/main/binary-powerpc/kugar_1.3.5-4.sarge.3_powerpc.deb stable/main/binary-all/koffice-data_1.3.5-4.sarge.3_all.deb koffice (1:1.3.5-4.sarge.3) stable-security; urgency=high * Non-maintainer upload by the Security Team * Backported upstream patch by Derek Noonburg to fix several vulnerabilities [filters/kword/pdf/xpdf/goo/gmem.c, filters/kword/pdf/xpdf/xpdf/JBIG2Stream.cc, filters/kword/pdf/xpdf/xpdf/Stream.h, debian/patches/z_10_security_upstream.diff] stable/main/binary-sparc/ketm_0.0.6-17sarge1_sparc.deb ketm (0.0.6-17sarge1) stable-security; urgency=high * Non-maintainer upload by The Security Team. * Fix a buffer overflow in the handling of command line arguments. [CVE-2005-3535] stable/main/binary-s390/ketm_0.0.6-17sarge1_s390.deb ketm (0.0.6-17sarge1) stable-security; urgency=high * Non-maintainer upload by The Security Team. * Fix a buffer overflow in the handling of command line arguments. [CVE-2005-3535] stable/main/binary-powerpc/ketm_0.0.6-17sarge1_powerpc.deb ketm (0.0.6-17sarge1) stable-security; urgency=high * Non-maintainer upload by The Security Team. * Fix a buffer overflow in the handling of command line arguments. [CVE-2005-3535] stable/main/binary-mipsel/ketm_0.0.6-17sarge1_mipsel.deb ketm (0.0.6-17sarge1) stable-security; urgency=high * Non-maintainer upload by The Security Team. * Fix a buffer overflow in the handling of command line arguments. [CVE-2005-3535] stable/main/binary-mips/ketm_0.0.6-17sarge1_mips.deb ketm (0.0.6-17sarge1) stable-security; urgency=high * Non-maintainer upload by The Security Team. * Fix a buffer overflow in the handling of command line arguments. [CVE-2005-3535] stable/main/binary-m68k/ketm_0.0.6-17sarge1_m68k.deb ketm (0.0.6-17sarge1) stable-security; urgency=high * Non-maintainer upload by The Security Team. * Fix a buffer overflow in the handling of command line arguments. [CVE-2005-3535] stable/main/binary-ia64/ketm_0.0.6-17sarge1_ia64.deb ketm (0.0.6-17sarge1) stable-security; urgency=high * Non-maintainer upload by The Security Team. * Fix a buffer overflow in the handling of command line arguments. [CVE-2005-3535] stable/main/binary-hppa/ketm_0.0.6-17sarge1_hppa.deb ketm (0.0.6-17sarge1) stable-security; urgency=high * Non-maintainer upload by The Security Team. * Fix a buffer overflow in the handling of command line arguments. [CVE-2005-3535] stable/main/binary-arm/ketm_0.0.6-17sarge1_arm.deb ketm (0.0.6-17sarge1) stable-security; urgency=high * Non-maintainer upload by The Security Team. * Fix a buffer overflow in the handling of command line arguments. [CVE-2005-3535] stable/main/binary-alpha/ketm_0.0.6-17sarge1_alpha.deb ketm (0.0.6-17sarge1) stable-security; urgency=high * Non-maintainer upload by The Security Team. * Fix a buffer overflow in the handling of command line arguments. [CVE-2005-3535] stable/main/binary-all/ketm-data_0.0.6-17sarge1_all.deb stable/main/source/ketm_0.0.6-17sarge1.diff.gz stable/main/binary-i386/ketm_0.0.6-17sarge1_i386.deb stable/main/source/ketm_0.0.6-17sarge1.dsc ketm (0.0.6-17sarge1) stable-security; urgency=high * Non-maintainer upload by The Security Team. * Fix a buffer overflow in the handling of command line arguments. [CVE-2005-3535] stable/main/source/kernel-patch-vserver_1.9.5.5.tar.gz stable/main/source/kernel-patch-vserver_1.9.5.5.dsc stable/main/binary-all/kernel-patch-vserver_1.9.5.5_all.deb kernel-patch-vserver (1.9.5.5) stable-security; urgency=high * Updated 2.4.27 kernel patch correct the patch to fix chroot escape [CVE-2005-4347, CVE-2005-4418, Bug#329087] stable/main/binary-sparc/kdelibs4_3.3.2-6.4_sparc.deb stable/main/binary-sparc/kdelibs-bin_3.3.2-6.4_sparc.deb stable/main/binary-sparc/kdelibs4-dev_3.3.2-6.4_sparc.deb kdelibs (4:3.3.2-6.4) stable-security; urgency=high * Non-maintainer upload by the Security Team * Fix heap overflow in kjs's UTF8 URI parsing [debian/patches/25_post-3.2.3-kdelibs-kjs.diff, CVE-2006-0019] stable/main/binary-s390/kdelibs4-dev_3.3.2-6.4_s390.deb stable/main/binary-s390/kdelibs4_3.3.2-6.4_s390.deb stable/main/binary-s390/kdelibs-bin_3.3.2-6.4_s390.deb kdelibs (4:3.3.2-6.4) stable-security; urgency=high * Non-maintainer upload by the Security Team * Fix heap overflow in kjs's UTF8 URI parsing [debian/patches/25_post-3.2.3-kdelibs-kjs.diff, CVE-2006-0019] stable/main/binary-powerpc/kdelibs-bin_3.3.2-6.4_powerpc.deb stable/main/binary-powerpc/kdelibs4_3.3.2-6.4_powerpc.deb stable/main/binary-powerpc/kdelibs4-dev_3.3.2-6.4_powerpc.deb kdelibs (4:3.3.2-6.4) stable-security; urgency=high * Non-maintainer upload by the Security Team * Fix heap overflow in kjs's UTF8 URI parsing [debian/patches/25_post-3.2.3-kdelibs-kjs.diff, CVE-2006-0019] stable/main/binary-mipsel/kdelibs4-dev_3.3.2-6.4_mipsel.deb stable/main/binary-mipsel/kdelibs-bin_3.3.2-6.4_mipsel.deb stable/main/binary-mipsel/kdelibs4_3.3.2-6.4_mipsel.deb kdelibs (4:3.3.2-6.4) stable-security; urgency=high * Non-maintainer upload by the Security Team * Fix heap overflow in kjs's UTF8 URI parsing [debian/patches/25_post-3.2.3-kdelibs-kjs.diff, CVE-2006-0019] stable/main/binary-mips/kdelibs4_3.3.2-6.4_mips.deb stable/main/binary-mips/kdelibs-bin_3.3.2-6.4_mips.deb stable/main/binary-mips/kdelibs4-dev_3.3.2-6.4_mips.deb kdelibs (4:3.3.2-6.4) stable-security; urgency=high * Non-maintainer upload by the Security Team * Fix heap overflow in kjs's UTF8 URI parsing [debian/patches/25_post-3.2.3-kdelibs-kjs.diff, CVE-2006-0019] stable/main/binary-m68k/kdelibs4-dev_3.3.2-6.4_m68k.deb stable/main/binary-m68k/kdelibs-bin_3.3.2-6.4_m68k.deb stable/main/binary-m68k/kdelibs4_3.3.2-6.4_m68k.deb kdelibs (4:3.3.2-6.4) stable-security; urgency=high * Non-maintainer upload by the Security Team * Fix heap overflow in kjs's UTF8 URI parsing [debian/patches/25_post-3.2.3-kdelibs-kjs.diff, CVE-2006-0019] stable/main/binary-ia64/kdelibs-bin_3.3.2-6.4_ia64.deb stable/main/binary-ia64/kdelibs4_3.3.2-6.4_ia64.deb stable/main/binary-ia64/kdelibs4-dev_3.3.2-6.4_ia64.deb kdelibs (4:3.3.2-6.4) stable-security; urgency=high * Non-maintainer upload by the Security Team * Fix heap overflow in kjs's UTF8 URI parsing [debian/patches/25_post-3.2.3-kdelibs-kjs.diff, CVE-2006-0019] stable/main/binary-hppa/kdelibs4-dev_3.3.2-6.4_hppa.deb stable/main/binary-hppa/kdelibs4_3.3.2-6.4_hppa.deb stable/main/binary-hppa/kdelibs-bin_3.3.2-6.4_hppa.deb kdelibs (4:3.3.2-6.4) stable-security; urgency=high * Non-maintainer upload by the Security Team * Fix heap overflow in kjs's UTF8 URI parsing [debian/patches/25_post-3.2.3-kdelibs-kjs.diff, CVE-2006-0019] stable/main/binary-arm/kdelibs4-dev_3.3.2-6.4_arm.deb stable/main/binary-arm/kdelibs4_3.3.2-6.4_arm.deb stable/main/binary-arm/kdelibs-bin_3.3.2-6.4_arm.deb kdelibs (4:3.3.2-6.4) stable-security; urgency=high * Non-maintainer upload by the Security Team * Fix heap overflow in kjs's UTF8 URI parsing [debian/patches/25_post-3.2.3-kdelibs-kjs.diff, CVE-2006-0019] stable/main/binary-alpha/kdelibs4_3.3.2-6.4_alpha.deb stable/main/binary-alpha/kdelibs4-dev_3.3.2-6.4_alpha.deb stable/main/binary-alpha/kdelibs-bin_3.3.2-6.4_alpha.deb kdelibs (4:3.3.2-6.4) stable-security; urgency=high * Non-maintainer upload by the Security Team * Fix heap overflow in kjs's UTF8 URI parsing [debian/patches/25_post-3.2.3-kdelibs-kjs.diff, CVE-2006-0019] stable/main/binary-all/kdelibs_3.3.2-6.4_all.deb stable/main/source/kdelibs_3.3.2-6.4.dsc stable/main/binary-i386/kdelibs4-dev_3.3.2-6.4_i386.deb stable/main/binary-i386/kdelibs-bin_3.3.2-6.4_i386.deb stable/main/binary-i386/kdelibs4_3.3.2-6.4_i386.deb stable/main/binary-all/kdelibs-data_3.3.2-6.4_all.deb stable/main/binary-all/kdelibs4-doc_3.3.2-6.4_all.deb stable/main/source/kdelibs_3.3.2-6.4.diff.gz kdelibs (4:3.3.2-6.4) stable-security; urgency=high * Non-maintainer upload by the Security Team * Fix heap overflow in kjs's UTF8 URI parsing [debian/patches/25_post-3.2.3-kdelibs-kjs.diff, CVE-2006-0019] stable/main/binary-sparc/kgamma_3.3.2-2sarge4_sparc.deb stable/main/binary-sparc/kdegraphics-kfile-plugins_3.3.2-2sarge4_sparc.deb stable/main/binary-sparc/kooka_3.3.2-2sarge4_sparc.deb stable/main/binary-sparc/kuickshow_3.3.2-2sarge4_sparc.deb stable/main/binary-sparc/kiconedit_3.3.2-2sarge4_sparc.deb stable/main/binary-sparc/kfax_3.3.2-2sarge4_sparc.deb stable/main/binary-sparc/kmrml_3.3.2-2sarge4_sparc.deb stable/main/binary-sparc/kolourpaint_3.3.2-2sarge4_sparc.deb stable/main/binary-sparc/ksnapshot_3.3.2-2sarge4_sparc.deb stable/main/binary-sparc/libkscan1_3.3.2-2sarge4_sparc.deb stable/main/binary-sparc/kview_3.3.2-2sarge4_sparc.deb stable/main/binary-sparc/kpdf_3.3.2-2sarge4_sparc.deb stable/main/binary-sparc/libkscan-dev_3.3.2-2sarge4_sparc.deb stable/main/binary-sparc/kruler_3.3.2-2sarge4_sparc.deb stable/main/binary-sparc/kghostview_3.3.2-2sarge4_sparc.deb stable/main/binary-sparc/kdegraphics-dev_3.3.2-2sarge4_sparc.deb stable/main/binary-sparc/kdvi_3.3.2-2sarge4_sparc.deb stable/main/binary-sparc/kpovmodeler_3.3.2-2sarge4_sparc.deb stable/main/binary-sparc/kamera_3.3.2-2sarge4_sparc.deb stable/main/binary-sparc/ksvg_3.3.2-2sarge4_sparc.deb stable/main/binary-sparc/kviewshell_3.3.2-2sarge4_sparc.deb stable/main/binary-sparc/kcoloredit_3.3.2-2sarge4_sparc.deb kdegraphics (4:3.3.2-2sarge4) stable-security; urgency=high * Non-maintainer upload by the Security Team * Applied upstream patch to fix heap based buffer overflow [kpdf/xpdf/Stream.cc, debian/patches/13_CVE-2006-0746.diff] stable/main/binary-s390/kghostview_3.3.2-2sarge4_s390.deb stable/main/binary-s390/kfax_3.3.2-2sarge4_s390.deb stable/main/binary-s390/ksnapshot_3.3.2-2sarge4_s390.deb stable/main/binary-s390/libkscan-dev_3.3.2-2sarge4_s390.deb stable/main/binary-s390/kmrml_3.3.2-2sarge4_s390.deb stable/main/binary-s390/kuickshow_3.3.2-2sarge4_s390.deb stable/main/binary-s390/kolourpaint_3.3.2-2sarge4_s390.deb stable/main/binary-s390/kiconedit_3.3.2-2sarge4_s390.deb stable/main/binary-s390/kview_3.3.2-2sarge4_s390.deb stable/main/binary-s390/kviewshell_3.3.2-2sarge4_s390.deb stable/main/binary-s390/kpovmodeler_3.3.2-2sarge4_s390.deb stable/main/binary-s390/kdegraphics-dev_3.3.2-2sarge4_s390.deb stable/main/binary-s390/ksvg_3.3.2-2sarge4_s390.deb stable/main/binary-s390/kdegraphics-kfile-plugins_3.3.2-2sarge4_s390.deb stable/main/binary-s390/kamera_3.3.2-2sarge4_s390.deb stable/main/binary-s390/kdvi_3.3.2-2sarge4_s390.deb stable/main/binary-s390/kooka_3.3.2-2sarge4_s390.deb stable/main/binary-s390/kpdf_3.3.2-2sarge4_s390.deb stable/main/binary-s390/kgamma_3.3.2-2sarge4_s390.deb stable/main/binary-s390/libkscan1_3.3.2-2sarge4_s390.deb stable/main/binary-s390/kruler_3.3.2-2sarge4_s390.deb stable/main/binary-s390/kcoloredit_3.3.2-2sarge4_s390.deb kdegraphics (4:3.3.2-2sarge4) stable-security; urgency=high * Non-maintainer upload by the Security Team * Applied upstream patch to fix heap based buffer overflow [kpdf/xpdf/Stream.cc, debian/patches/13_CVE-2006-0746.diff] stable/main/binary-mipsel/kiconedit_3.3.2-2sarge4_mipsel.deb stable/main/binary-mipsel/kpdf_3.3.2-2sarge4_mipsel.deb stable/main/binary-mipsel/kviewshell_3.3.2-2sarge4_mipsel.deb stable/main/binary-mipsel/kgamma_3.3.2-2sarge4_mipsel.deb stable/main/binary-mipsel/kview_3.3.2-2sarge4_mipsel.deb stable/main/binary-mipsel/kcoloredit_3.3.2-2sarge4_mipsel.deb stable/main/binary-mipsel/kooka_3.3.2-2sarge4_mipsel.deb stable/main/binary-mipsel/libkscan1_3.3.2-2sarge4_mipsel.deb stable/main/binary-mipsel/kdegraphics-kfile-plugins_3.3.2-2sarge4_mipsel.deb stable/main/binary-mipsel/kpovmodeler_3.3.2-2sarge4_mipsel.deb stable/main/binary-mipsel/ksvg_3.3.2-2sarge4_mipsel.deb stable/main/binary-mipsel/kdegraphics-dev_3.3.2-2sarge4_mipsel.deb stable/main/binary-mipsel/kuickshow_3.3.2-2sarge4_mipsel.deb stable/main/binary-mipsel/kmrml_3.3.2-2sarge4_mipsel.deb stable/main/binary-mipsel/libkscan-dev_3.3.2-2sarge4_mipsel.deb stable/main/binary-mipsel/ksnapshot_3.3.2-2sarge4_mipsel.deb stable/main/binary-mipsel/kolourpaint_3.3.2-2sarge4_mipsel.deb stable/main/binary-mipsel/kghostview_3.3.2-2sarge4_mipsel.deb stable/main/binary-mipsel/kruler_3.3.2-2sarge4_mipsel.deb stable/main/binary-mipsel/kdvi_3.3.2-2sarge4_mipsel.deb stable/main/binary-mipsel/kamera_3.3.2-2sarge4_mipsel.deb stable/main/binary-mipsel/kfax_3.3.2-2sarge4_mipsel.deb kdegraphics (4:3.3.2-2sarge4) stable-security; urgency=high * Non-maintainer upload by the Security Team * Applied upstream patch to fix heap based buffer overflow [kpdf/xpdf/Stream.cc, debian/patches/13_CVE-2006-0746.diff] stable/main/binary-mips/kiconedit_3.3.2-2sarge4_mips.deb stable/main/binary-mips/kruler_3.3.2-2sarge4_mips.deb stable/main/binary-mips/kooka_3.3.2-2sarge4_mips.deb stable/main/binary-mips/kuickshow_3.3.2-2sarge4_mips.deb stable/main/binary-mips/kviewshell_3.3.2-2sarge4_mips.deb stable/main/binary-mips/ksvg_3.3.2-2sarge4_mips.deb stable/main/binary-mips/kdegraphics-kfile-plugins_3.3.2-2sarge4_mips.deb stable/main/binary-mips/kfax_3.3.2-2sarge4_mips.deb stable/main/binary-mips/kcoloredit_3.3.2-2sarge4_mips.deb stable/main/binary-mips/kview_3.3.2-2sarge4_mips.deb stable/main/binary-mips/kdvi_3.3.2-2sarge4_mips.deb stable/main/binary-mips/ksnapshot_3.3.2-2sarge4_mips.deb stable/main/binary-mips/kolourpaint_3.3.2-2sarge4_mips.deb stable/main/binary-mips/libkscan-dev_3.3.2-2sarge4_mips.deb stable/main/binary-mips/libkscan1_3.3.2-2sarge4_mips.deb stable/main/binary-mips/kgamma_3.3.2-2sarge4_mips.deb stable/main/binary-mips/kdegraphics-dev_3.3.2-2sarge4_mips.deb stable/main/binary-mips/kpdf_3.3.2-2sarge4_mips.deb stable/main/binary-mips/kpovmodeler_3.3.2-2sarge4_mips.deb stable/main/binary-mips/kamera_3.3.2-2sarge4_mips.deb stable/main/binary-mips/kmrml_3.3.2-2sarge4_mips.deb stable/main/binary-mips/kghostview_3.3.2-2sarge4_mips.deb kdegraphics (4:3.3.2-2sarge4) stable-security; urgency=high * Non-maintainer upload by the Security Team * Applied upstream patch to fix heap based buffer overflow [kpdf/xpdf/Stream.cc, debian/patches/13_CVE-2006-0746.diff] stable/main/binary-m68k/kdegraphics-kfile-plugins_3.3.2-2sarge4_m68k.deb stable/main/binary-m68k/libkscan1_3.3.2-2sarge4_m68k.deb stable/main/binary-m68k/kmrml_3.3.2-2sarge4_m68k.deb stable/main/binary-m68k/libkscan-dev_3.3.2-2sarge4_m68k.deb stable/main/binary-m68k/kdvi_3.3.2-2sarge4_m68k.deb stable/main/binary-m68k/kamera_3.3.2-2sarge4_m68k.deb stable/main/binary-m68k/kolourpaint_3.3.2-2sarge4_m68k.deb stable/main/binary-m68k/kiconedit_3.3.2-2sarge4_m68k.deb stable/main/binary-m68k/kgamma_3.3.2-2sarge4_m68k.deb stable/main/binary-m68k/kcoloredit_3.3.2-2sarge4_m68k.deb stable/main/binary-m68k/kfax_3.3.2-2sarge4_m68k.deb stable/main/binary-m68k/kooka_3.3.2-2sarge4_m68k.deb stable/main/binary-m68k/kdegraphics-dev_3.3.2-2sarge4_m68k.deb stable/main/binary-m68k/kruler_3.3.2-2sarge4_m68k.deb stable/main/binary-m68k/ksnapshot_3.3.2-2sarge4_m68k.deb stable/main/binary-m68k/ksvg_3.3.2-2sarge4_m68k.deb stable/main/binary-m68k/kviewshell_3.3.2-2sarge4_m68k.deb stable/main/binary-m68k/kview_3.3.2-2sarge4_m68k.deb stable/main/binary-m68k/kuickshow_3.3.2-2sarge4_m68k.deb stable/main/binary-m68k/kghostview_3.3.2-2sarge4_m68k.deb stable/main/binary-m68k/kpdf_3.3.2-2sarge4_m68k.deb stable/main/binary-m68k/kpovmodeler_3.3.2-2sarge4_m68k.deb kdegraphics (4:3.3.2-2sarge4) stable-security; urgency=high * Non-maintainer upload by the Security Team * Applied upstream patch to fix heap based buffer overflow [kpdf/xpdf/Stream.cc, debian/patches/13_CVE-2006-0746.diff] stable/main/binary-ia64/kuickshow_3.3.2-2sarge4_ia64.deb stable/main/binary-ia64/libkscan1_3.3.2-2sarge4_ia64.deb stable/main/binary-ia64/kruler_3.3.2-2sarge4_ia64.deb stable/main/binary-ia64/kfax_3.3.2-2sarge4_ia64.deb stable/main/binary-ia64/kolourpaint_3.3.2-2sarge4_ia64.deb stable/main/binary-ia64/kmrml_3.3.2-2sarge4_ia64.deb stable/main/binary-ia64/ksnapshot_3.3.2-2sarge4_ia64.deb stable/main/binary-ia64/kviewshell_3.3.2-2sarge4_ia64.deb stable/main/binary-ia64/kiconedit_3.3.2-2sarge4_ia64.deb stable/main/binary-ia64/kview_3.3.2-2sarge4_ia64.deb stable/main/binary-ia64/kcoloredit_3.3.2-2sarge4_ia64.deb stable/main/binary-ia64/kpdf_3.3.2-2sarge4_ia64.deb stable/main/binary-ia64/kdegraphics-kfile-plugins_3.3.2-2sarge4_ia64.deb stable/main/binary-ia64/kghostview_3.3.2-2sarge4_ia64.deb stable/main/binary-ia64/kdvi_3.3.2-2sarge4_ia64.deb stable/main/binary-ia64/kamera_3.3.2-2sarge4_ia64.deb stable/main/binary-ia64/kdegraphics-dev_3.3.2-2sarge4_ia64.deb stable/main/binary-ia64/libkscan-dev_3.3.2-2sarge4_ia64.deb stable/main/binary-ia64/kpovmodeler_3.3.2-2sarge4_ia64.deb stable/main/binary-ia64/kooka_3.3.2-2sarge4_ia64.deb stable/main/binary-ia64/ksvg_3.3.2-2sarge4_ia64.deb stable/main/binary-ia64/kgamma_3.3.2-2sarge4_ia64.deb kdegraphics (4:3.3.2-2sarge4) stable-security; urgency=high * Non-maintainer upload by the Security Team * Applied upstream patch to fix heap based buffer overflow [kpdf/xpdf/Stream.cc, debian/patches/13_CVE-2006-0746.diff] stable/main/binary-i386/ksvg_3.3.2-2sarge4_i386.deb stable/main/binary-i386/kamera_3.3.2-2sarge4_i386.deb stable/main/binary-i386/kcoloredit_3.3.2-2sarge4_i386.deb stable/main/binary-i386/kruler_3.3.2-2sarge4_i386.deb stable/main/binary-i386/kview_3.3.2-2sarge4_i386.deb stable/main/binary-i386/kiconedit_3.3.2-2sarge4_i386.deb stable/main/binary-i386/kfax_3.3.2-2sarge4_i386.deb stable/main/binary-i386/libkscan-dev_3.3.2-2sarge4_i386.deb stable/main/binary-i386/kghostview_3.3.2-2sarge4_i386.deb stable/main/binary-i386/kdegraphics-kfile-plugins_3.3.2-2sarge4_i386.deb stable/main/binary-i386/kolourpaint_3.3.2-2sarge4_i386.deb stable/main/binary-i386/kgamma_3.3.2-2sarge4_i386.deb stable/main/binary-i386/kpovmodeler_3.3.2-2sarge4_i386.deb stable/main/binary-i386/ksnapshot_3.3.2-2sarge4_i386.deb stable/main/binary-i386/kdegraphics-dev_3.3.2-2sarge4_i386.deb stable/main/binary-i386/kviewshell_3.3.2-2sarge4_i386.deb stable/main/binary-i386/kdvi_3.3.2-2sarge4_i386.deb stable/main/binary-i386/kpdf_3.3.2-2sarge4_i386.deb stable/main/binary-i386/kooka_3.3.2-2sarge4_i386.deb stable/main/binary-i386/kmrml_3.3.2-2sarge4_i386.deb stable/main/binary-i386/libkscan1_3.3.2-2sarge4_i386.deb stable/main/binary-i386/kuickshow_3.3.2-2sarge4_i386.deb kdegraphics (4:3.3.2-2sarge4) stable-security; urgency=high * Non-maintainer upload by the Security Team * Applied upstream patch to fix heap based buffer overflow [kpdf/xpdf/Stream.cc, debian/patches/13_CVE-2006-0746.diff] stable/main/binary-hppa/ksnapshot_3.3.2-2sarge4_hppa.deb stable/main/binary-hppa/kfax_3.3.2-2sarge4_hppa.deb stable/main/binary-hppa/ksvg_3.3.2-2sarge4_hppa.deb stable/main/binary-hppa/kmrml_3.3.2-2sarge4_hppa.deb stable/main/binary-hppa/kdvi_3.3.2-2sarge4_hppa.deb stable/main/binary-hppa/kdegraphics-kfile-plugins_3.3.2-2sarge4_hppa.deb stable/main/binary-hppa/kviewshell_3.3.2-2sarge4_hppa.deb stable/main/binary-hppa/kamera_3.3.2-2sarge4_hppa.deb stable/main/binary-hppa/libkscan-dev_3.3.2-2sarge4_hppa.deb stable/main/binary-hppa/libkscan1_3.3.2-2sarge4_hppa.deb stable/main/binary-hppa/kview_3.3.2-2sarge4_hppa.deb stable/main/binary-hppa/kgamma_3.3.2-2sarge4_hppa.deb stable/main/binary-hppa/kiconedit_3.3.2-2sarge4_hppa.deb stable/main/binary-hppa/kooka_3.3.2-2sarge4_hppa.deb stable/main/binary-hppa/kuickshow_3.3.2-2sarge4_hppa.deb stable/main/binary-hppa/kpdf_3.3.2-2sarge4_hppa.deb stable/main/binary-hppa/kcoloredit_3.3.2-2sarge4_hppa.deb stable/main/binary-hppa/kpovmodeler_3.3.2-2sarge4_hppa.deb stable/main/binary-hppa/kruler_3.3.2-2sarge4_hppa.deb stable/main/binary-hppa/kolourpaint_3.3.2-2sarge4_hppa.deb stable/main/binary-hppa/kghostview_3.3.2-2sarge4_hppa.deb stable/main/binary-hppa/kdegraphics-dev_3.3.2-2sarge4_hppa.deb kdegraphics (4:3.3.2-2sarge4) stable-security; urgency=high * Non-maintainer upload by the Security Team * Applied upstream patch to fix heap based buffer overflow [kpdf/xpdf/Stream.cc, debian/patches/13_CVE-2006-0746.diff] stable/main/binary-arm/kgamma_3.3.2-2sarge4_arm.deb stable/main/binary-arm/libkscan1_3.3.2-2sarge4_arm.deb stable/main/binary-arm/kghostview_3.3.2-2sarge4_arm.deb stable/main/binary-arm/kiconedit_3.3.2-2sarge4_arm.deb stable/main/binary-arm/kpovmodeler_3.3.2-2sarge4_arm.deb stable/main/binary-arm/ksnapshot_3.3.2-2sarge4_arm.deb stable/main/binary-arm/ksvg_3.3.2-2sarge4_arm.deb stable/main/binary-arm/kdegraphics-dev_3.3.2-2sarge4_arm.deb stable/main/binary-arm/libkscan-dev_3.3.2-2sarge4_arm.deb stable/main/binary-arm/kamera_3.3.2-2sarge4_arm.deb stable/main/binary-arm/kmrml_3.3.2-2sarge4_arm.deb stable/main/binary-arm/kcoloredit_3.3.2-2sarge4_arm.deb stable/main/binary-arm/kfax_3.3.2-2sarge4_arm.deb stable/main/binary-arm/kdegraphics-kfile-plugins_3.3.2-2sarge4_arm.deb stable/main/binary-arm/kruler_3.3.2-2sarge4_arm.deb stable/main/binary-arm/kviewshell_3.3.2-2sarge4_arm.deb stable/main/binary-arm/kolourpaint_3.3.2-2sarge4_arm.deb stable/main/binary-arm/kooka_3.3.2-2sarge4_arm.deb stable/main/binary-arm/kuickshow_3.3.2-2sarge4_arm.deb stable/main/binary-arm/kview_3.3.2-2sarge4_arm.deb stable/main/binary-arm/kdvi_3.3.2-2sarge4_arm.deb stable/main/binary-arm/kpdf_3.3.2-2sarge4_arm.deb kdegraphics (4:3.3.2-2sarge4) stable-security; urgency=high * Non-maintainer upload by the Security Team * Applied upstream patch to fix heap based buffer overflow [kpdf/xpdf/Stream.cc, debian/patches/13_CVE-2006-0746.diff] stable/main/binary-alpha/ksvg_3.3.2-2sarge4_alpha.deb stable/main/binary-alpha/kpdf_3.3.2-2sarge4_alpha.deb stable/main/binary-alpha/kdegraphics-kfile-plugins_3.3.2-2sarge4_alpha.deb stable/main/binary-alpha/kooka_3.3.2-2sarge4_alpha.deb stable/main/binary-alpha/kfax_3.3.2-2sarge4_alpha.deb stable/main/binary-alpha/kruler_3.3.2-2sarge4_alpha.deb stable/main/binary-alpha/kviewshell_3.3.2-2sarge4_alpha.deb stable/main/binary-alpha/kiconedit_3.3.2-2sarge4_alpha.deb stable/main/binary-alpha/libkscan1_3.3.2-2sarge4_alpha.deb stable/main/binary-alpha/kolourpaint_3.3.2-2sarge4_alpha.deb stable/main/binary-alpha/kdegraphics-dev_3.3.2-2sarge4_alpha.deb stable/main/binary-alpha/kview_3.3.2-2sarge4_alpha.deb stable/main/binary-alpha/kdvi_3.3.2-2sarge4_alpha.deb stable/main/binary-alpha/kuickshow_3.3.2-2sarge4_alpha.deb stable/main/binary-alpha/libkscan-dev_3.3.2-2sarge4_alpha.deb stable/main/binary-alpha/kmrml_3.3.2-2sarge4_alpha.deb stable/main/binary-alpha/kpovmodeler_3.3.2-2sarge4_alpha.deb stable/main/binary-alpha/kgamma_3.3.2-2sarge4_alpha.deb stable/main/binary-alpha/kamera_3.3.2-2sarge4_alpha.deb stable/main/binary-alpha/kghostview_3.3.2-2sarge4_alpha.deb stable/main/binary-alpha/kcoloredit_3.3.2-2sarge4_alpha.deb stable/main/binary-alpha/ksnapshot_3.3.2-2sarge4_alpha.deb kdegraphics (4:3.3.2-2sarge4) stable-security; urgency=high * Non-maintainer upload by the Security Team * Applied upstream patch to fix heap based buffer overflow [kpdf/xpdf/Stream.cc, debian/patches/13_CVE-2006-0746.diff] stable/main/binary-powerpc/kmrml_3.3.2-2sarge4_powerpc.deb stable/main/binary-powerpc/kolourpaint_3.3.2-2sarge4_powerpc.deb stable/main/binary-powerpc/kgamma_3.3.2-2sarge4_powerpc.deb stable/main/binary-powerpc/kghostview_3.3.2-2sarge4_powerpc.deb stable/main/binary-powerpc/kuickshow_3.3.2-2sarge4_powerpc.deb stable/main/binary-powerpc/kdvi_3.3.2-2sarge4_powerpc.deb stable/main/binary-powerpc/libkscan-dev_3.3.2-2sarge4_powerpc.deb stable/main/binary-powerpc/kpovmodeler_3.3.2-2sarge4_powerpc.deb stable/main/binary-powerpc/kviewshell_3.3.2-2sarge4_powerpc.deb stable/main/binary-powerpc/kdegraphics-dev_3.3.2-2sarge4_powerpc.deb stable/main/binary-powerpc/kooka_3.3.2-2sarge4_powerpc.deb stable/main/binary-powerpc/ksvg_3.3.2-2sarge4_powerpc.deb stable/main/binary-powerpc/libkscan1_3.3.2-2sarge4_powerpc.deb stable/main/binary-powerpc/kcoloredit_3.3.2-2sarge4_powerpc.deb stable/main/binary-powerpc/kruler_3.3.2-2sarge4_powerpc.deb stable/main/binary-powerpc/kview_3.3.2-2sarge4_powerpc.deb stable/main/binary-powerpc/ksnapshot_3.3.2-2sarge4_powerpc.deb stable/main/binary-all/kdegraphics_3.3.2-2sarge4_all.deb stable/main/source/kdegraphics_3.3.2-2sarge4.diff.gz stable/main/binary-powerpc/kamera_3.3.2-2sarge4_powerpc.deb stable/main/binary-powerpc/kiconedit_3.3.2-2sarge4_powerpc.deb stable/main/binary-powerpc/kpdf_3.3.2-2sarge4_powerpc.deb stable/main/binary-powerpc/kfax_3.3.2-2sarge4_powerpc.deb stable/main/source/kdegraphics_3.3.2-2sarge4.dsc stable/main/binary-powerpc/kdegraphics-kfile-plugins_3.3.2-2sarge4_powerpc.deb kdegraphics (4:3.3.2-2sarge4) stable-security; urgency=high * Non-maintainer upload by the Security Team * Applied upstream patch to fix heap based buffer overflow [kpdf/xpdf/Stream.cc, debian/patches/13_CVE-2006-0746.diff] stable/main/binary-sparc/kaffeine_0.6-1sarge1_sparc.deb kaffeine (0.6-1sarge1) stable-security; urgency=high * Non-maintainer upload by the Security Team * Applied upstream patch to fix arbitrary code execution [kaffeine/player-parts/http.c, debian/patches/15_CVE-2006-0051.diff] stable/main/binary-s390/kaffeine_0.6-1sarge1_s390.deb kaffeine (0.6-1sarge1) stable-security; urgency=high * Non-maintainer upload by the Security Team * Applied upstream patch to fix arbitrary code execution [kaffeine/player-parts/http.c, debian/patches/15_CVE-2006-0051.diff] stable/main/binary-mipsel/kaffeine_0.6-1sarge1_mipsel.deb kaffeine (0.6-1sarge1) stable-security; urgency=high * Non-maintainer upload by the Security Team * Applied upstream patch to fix arbitrary code execution [kaffeine/player-parts/http.c, debian/patches/15_CVE-2006-0051.diff] stable/main/binary-mips/kaffeine_0.6-1sarge1_mips.deb kaffeine (0.6-1sarge1) stable-security; urgency=high * Non-maintainer upload by the Security Team * Applied upstream patch to fix arbitrary code execution [kaffeine/player-parts/http.c, debian/patches/15_CVE-2006-0051.diff] stable/main/binary-m68k/kaffeine_0.6-1sarge1_m68k.deb kaffeine (0.6-1sarge1) stable-security; urgency=high * Non-maintainer upload by the Security Team * Applied upstream patch to fix arbitrary code execution [kaffeine/player-parts/http.c, debian/patches/15_CVE-2006-0051.diff] stable/main/binary-ia64/kaffeine_0.6-1sarge1_ia64.deb kaffeine (0.6-1sarge1) stable-security; urgency=high * Non-maintainer upload by the Security Team * Applied upstream patch to fix arbitrary code execution [kaffeine/player-parts/http.c, debian/patches/15_CVE-2006-0051.diff] stable/main/binary-i386/kaffeine_0.6-1sarge1_i386.deb kaffeine (0.6-1sarge1) stable-security; urgency=high * Non-maintainer upload by the Security Team * Applied upstream patch to fix arbitrary code execution [kaffeine/player-parts/http.c, debian/patches/15_CVE-2006-0051.diff] stable/main/binary-hppa/kaffeine_0.6-1sarge1_hppa.deb kaffeine (0.6-1sarge1) stable-security; urgency=high * Non-maintainer upload by the Security Team * Applied upstream patch to fix arbitrary code execution [kaffeine/player-parts/http.c, debian/patches/15_CVE-2006-0051.diff] stable/main/binary-arm/kaffeine_0.6-1sarge1_arm.deb kaffeine (0.6-1sarge1) stable-security; urgency=high * Non-maintainer upload by the Security Team * Applied upstream patch to fix arbitrary code execution [kaffeine/player-parts/http.c, debian/patches/15_CVE-2006-0051.diff] stable/main/binary-alpha/kaffeine_0.6-1sarge1_alpha.deb kaffeine (0.6-1sarge1) stable-security; urgency=high * Non-maintainer upload by the Security Team * Applied upstream patch to fix arbitrary code execution [kaffeine/player-parts/http.c, debian/patches/15_CVE-2006-0051.diff] stable/main/binary-powerpc/kaffeine_0.6-1sarge1_powerpc.deb stable/main/source/kaffeine_0.6-1sarge1.dsc stable/main/source/kaffeine_0.6-1sarge1.diff.gz kaffeine (0.6-1sarge1) stable-security; urgency=high * Non-maintainer upload by the Security Team * Applied upstream patch to fix arbitrary code execution [kaffeine/player-parts/http.c, debian/patches/15_CVE-2006-0051.diff] stable/main/binary-sparc/ipsec-tools_0.5.2-1sarge1_sparc.deb stable/main/binary-sparc/racoon_0.5.2-1sarge1_sparc.deb ipsec-tools (1:0.5.2-1sarge1) stable-security; urgency=high * Non-maintainer upload by the Security Team * Applied upstream patch to fix denial of service [src/racoon/isakmp_agg.c, CVE-2005-3732] stable/main/binary-s390/racoon_0.5.2-1sarge1_s390.deb stable/main/binary-s390/ipsec-tools_0.5.2-1sarge1_s390.deb ipsec-tools (1:0.5.2-1sarge1) stable-security; urgency=high * Non-maintainer upload by the Security Team * Applied upstream patch to fix denial of service [src/racoon/isakmp_agg.c, CVE-2005-3732] stable/main/binary-mipsel/racoon_0.5.2-1sarge1_mipsel.deb stable/main/binary-mipsel/ipsec-tools_0.5.2-1sarge1_mipsel.deb ipsec-tools (1:0.5.2-1sarge1) stable-security; urgency=high * Non-maintainer upload by the Security Team * Applied upstream patch to fix denial of service [src/racoon/isakmp_agg.c, CVE-2005-3732] stable/main/binary-mips/ipsec-tools_0.5.2-1sarge1_mips.deb stable/main/binary-mips/racoon_0.5.2-1sarge1_mips.deb ipsec-tools (1:0.5.2-1sarge1) stable-security; urgency=high * Non-maintainer upload by the Security Team * Applied upstream patch to fix denial of service [src/racoon/isakmp_agg.c, CVE-2005-3732] stable/main/binary-m68k/racoon_0.5.2-1sarge1_m68k.deb stable/main/binary-m68k/ipsec-tools_0.5.2-1sarge1_m68k.deb ipsec-tools (1:0.5.2-1sarge1) stable-security; urgency=high * Non-maintainer upload by the Security Team * Applied upstream patch to fix denial of service [src/racoon/isakmp_agg.c, CVE-2005-3732] stable/main/binary-ia64/racoon_0.5.2-1sarge1_ia64.deb stable/main/binary-ia64/ipsec-tools_0.5.2-1sarge1_ia64.deb ipsec-tools (1:0.5.2-1sarge1) stable-security; urgency=high * Non-maintainer upload by the Security Team * Applied upstream patch to fix denial of service [src/racoon/isakmp_agg.c, CVE-2005-3732] stable/main/binary-i386/racoon_0.5.2-1sarge1_i386.deb stable/main/binary-i386/ipsec-tools_0.5.2-1sarge1_i386.deb ipsec-tools (1:0.5.2-1sarge1) stable-security; urgency=high * Non-maintainer upload by the Security Team * Applied upstream patch to fix denial of service [src/racoon/isakmp_agg.c, CVE-2005-3732] stable/main/binary-hppa/ipsec-tools_0.5.2-1sarge1_hppa.deb stable/main/binary-hppa/racoon_0.5.2-1sarge1_hppa.deb ipsec-tools (1:0.5.2-1sarge1) stable-security; urgency=high * Non-maintainer upload by the Security Team * Applied upstream patch to fix denial of service [src/racoon/isakmp_agg.c, CVE-2005-3732] stable/main/binary-arm/racoon_0.5.2-1sarge1_arm.deb stable/main/binary-arm/ipsec-tools_0.5.2-1sarge1_arm.deb ipsec-tools (1:0.5.2-1sarge1) stable-security; urgency=high * Non-maintainer upload by the Security Team * Applied upstream patch to fix denial of service [src/racoon/isakmp_agg.c, CVE-2005-3732] stable/main/binary-alpha/racoon_0.5.2-1sarge1_alpha.deb stable/main/binary-alpha/ipsec-tools_0.5.2-1sarge1_alpha.deb ipsec-tools (1:0.5.2-1sarge1) stable-security; urgency=high * Non-maintainer upload by the Security Team * Applied upstream patch to fix denial of service [src/racoon/isakmp_agg.c, CVE-2005-3732] stable/main/binary-powerpc/ipsec-tools_0.5.2-1sarge1_powerpc.deb stable/main/source/ipsec-tools_0.5.2-1sarge1.dsc stable/main/binary-powerpc/racoon_0.5.2-1sarge1_powerpc.deb stable/main/source/ipsec-tools_0.5.2-1sarge1.diff.gz ipsec-tools (1:0.5.2-1sarge1) stable-security; urgency=high * Non-maintainer upload by the Security Team * Applied upstream patch to fix denial of service [src/racoon/isakmp_agg.c, CVE-2005-3732] stable/main/binary-sparc/libmagick6-dev_6.0.6.2-2.6_sparc.deb stable/main/binary-sparc/libmagick++6_6.0.6.2-2.6_sparc.deb stable/main/binary-sparc/imagemagick_6.0.6.2-2.6_sparc.deb stable/main/binary-sparc/libmagick6_6.0.6.2-2.6_sparc.deb stable/main/binary-sparc/libmagick++6-dev_6.0.6.2-2.6_sparc.deb stable/main/binary-sparc/perlmagick_6.0.6.2-2.6_sparc.deb imagemagick (6:6.0.6.2-2.6) stable-security; urgency=high * Non-maintainer upload by the Security Team * Added '$' to the list of forbidden characters in filenames for delegate [magick/delegate.c, CVE-2005-4601] stable/main/binary-s390/libmagick6_6.0.6.2-2.6_s390.deb stable/main/binary-s390/perlmagick_6.0.6.2-2.6_s390.deb stable/main/binary-s390/libmagick++6-dev_6.0.6.2-2.6_s390.deb stable/main/binary-s390/imagemagick_6.0.6.2-2.6_s390.deb stable/main/binary-s390/libmagick++6_6.0.6.2-2.6_s390.deb stable/main/binary-s390/libmagick6-dev_6.0.6.2-2.6_s390.deb imagemagick (6:6.0.6.2-2.6) stable-security; urgency=high * Non-maintainer upload by the Security Team * Added '$' to the list of forbidden characters in filenames for delegate [magick/delegate.c, CVE-2005-4601] stable/main/binary-mipsel/libmagick6_6.0.6.2-2.6_mipsel.deb stable/main/binary-mipsel/perlmagick_6.0.6.2-2.6_mipsel.deb stable/main/binary-mipsel/libmagick6-dev_6.0.6.2-2.6_mipsel.deb stable/main/binary-mipsel/libmagick++6_6.0.6.2-2.6_mipsel.deb stable/main/binary-mipsel/imagemagick_6.0.6.2-2.6_mipsel.deb stable/main/binary-mipsel/libmagick++6-dev_6.0.6.2-2.6_mipsel.deb imagemagick (6:6.0.6.2-2.6) stable-security; urgency=high * Non-maintainer upload by the Security Team * Added '$' to the list of forbidden characters in filenames for delegate [magick/delegate.c, CVE-2005-4601] stable/main/binary-mips/perlmagick_6.0.6.2-2.6_mips.deb stable/main/binary-mips/imagemagick_6.0.6.2-2.6_mips.deb stable/main/binary-mips/libmagick++6_6.0.6.2-2.6_mips.deb stable/main/binary-mips/libmagick6-dev_6.0.6.2-2.6_mips.deb stable/main/binary-mips/libmagick6_6.0.6.2-2.6_mips.deb stable/main/binary-mips/libmagick++6-dev_6.0.6.2-2.6_mips.deb imagemagick (6:6.0.6.2-2.6) stable-security; urgency=high * Non-maintainer upload by the Security Team * Added '$' to the list of forbidden characters in filenames for delegate [magick/delegate.c, CVE-2005-4601] stable/main/binary-m68k/perlmagick_6.0.6.2-2.6_m68k.deb stable/main/binary-m68k/libmagick6-dev_6.0.6.2-2.6_m68k.deb stable/main/binary-m68k/libmagick++6_6.0.6.2-2.6_m68k.deb stable/main/binary-m68k/imagemagick_6.0.6.2-2.6_m68k.deb stable/main/binary-m68k/libmagick++6-dev_6.0.6.2-2.6_m68k.deb stable/main/binary-m68k/libmagick6_6.0.6.2-2.6_m68k.deb imagemagick (6:6.0.6.2-2.6) stable-security; urgency=high * Non-maintainer upload by the Security Team * Added '$' to the list of forbidden characters in filenames for delegate [magick/delegate.c, CVE-2005-4601] stable/main/binary-ia64/libmagick++6_6.0.6.2-2.6_ia64.deb stable/main/binary-ia64/imagemagick_6.0.6.2-2.6_ia64.deb stable/main/binary-ia64/perlmagick_6.0.6.2-2.6_ia64.deb stable/main/binary-ia64/libmagick6_6.0.6.2-2.6_ia64.deb stable/main/binary-ia64/libmagick++6-dev_6.0.6.2-2.6_ia64.deb stable/main/binary-ia64/libmagick6-dev_6.0.6.2-2.6_ia64.deb imagemagick (6:6.0.6.2-2.6) stable-security; urgency=high * Non-maintainer upload by the Security Team * Added '$' to the list of forbidden characters in filenames for delegate [magick/delegate.c, CVE-2005-4601] stable/main/binary-i386/libmagick++6-dev_6.0.6.2-2.6_i386.deb stable/main/binary-i386/libmagick6-dev_6.0.6.2-2.6_i386.deb stable/main/binary-i386/libmagick6_6.0.6.2-2.6_i386.deb stable/main/binary-i386/perlmagick_6.0.6.2-2.6_i386.deb stable/main/binary-i386/libmagick++6_6.0.6.2-2.6_i386.deb stable/main/binary-i386/imagemagick_6.0.6.2-2.6_i386.deb imagemagick (6:6.0.6.2-2.6) stable-security; urgency=high * Non-maintainer upload by the Security Team * Added '$' to the list of forbidden characters in filenames for delegate [magick/delegate.c, CVE-2005-4601] stable/main/binary-hppa/libmagick++6-dev_6.0.6.2-2.6_hppa.deb stable/main/binary-hppa/perlmagick_6.0.6.2-2.6_hppa.deb stable/main/binary-hppa/libmagick6_6.0.6.2-2.6_hppa.deb stable/main/binary-hppa/imagemagick_6.0.6.2-2.6_hppa.deb stable/main/binary-hppa/libmagick++6_6.0.6.2-2.6_hppa.deb stable/main/binary-hppa/libmagick6-dev_6.0.6.2-2.6_hppa.deb imagemagick (6:6.0.6.2-2.6) stable-security; urgency=high * Non-maintainer upload by the Security Team * Added '$' to the list of forbidden characters in filenames for delegate [magick/delegate.c, CVE-2005-4601] stable/main/binary-arm/libmagick++6-dev_6.0.6.2-2.6_arm.deb stable/main/binary-arm/libmagick6_6.0.6.2-2.6_arm.deb stable/main/binary-arm/libmagick6-dev_6.0.6.2-2.6_arm.deb stable/main/binary-arm/libmagick++6_6.0.6.2-2.6_arm.deb stable/main/binary-arm/imagemagick_6.0.6.2-2.6_arm.deb stable/main/binary-arm/perlmagick_6.0.6.2-2.6_arm.deb imagemagick (6:6.0.6.2-2.6) stable-security; urgency=high * Non-maintainer upload by the Security Team * Added '$' to the list of forbidden characters in filenames for delegate [magick/delegate.c, CVE-2005-4601] stable/main/binary-alpha/libmagick++6_6.0.6.2-2.6_alpha.deb stable/main/binary-alpha/libmagick++6-dev_6.0.6.2-2.6_alpha.deb stable/main/binary-alpha/imagemagick_6.0.6.2-2.6_alpha.deb stable/main/binary-alpha/libmagick6_6.0.6.2-2.6_alpha.deb stable/main/binary-alpha/libmagick6-dev_6.0.6.2-2.6_alpha.deb stable/main/binary-alpha/perlmagick_6.0.6.2-2.6_alpha.deb imagemagick (6:6.0.6.2-2.6) stable-security; urgency=high * Non-maintainer upload by the Security Team * Added '$' to the list of forbidden characters in filenames for delegate [magick/delegate.c, CVE-2005-4601] stable/main/source/imagemagick_6.0.6.2-2.6.dsc stable/main/binary-powerpc/perlmagick_6.0.6.2-2.6_powerpc.deb stable/main/binary-powerpc/libmagick6_6.0.6.2-2.6_powerpc.deb stable/main/binary-powerpc/imagemagick_6.0.6.2-2.6_powerpc.deb stable/main/source/imagemagick_6.0.6.2-2.6.diff.gz stable/main/binary-powerpc/libmagick++6_6.0.6.2-2.6_powerpc.deb stable/main/binary-powerpc/libmagick6-dev_6.0.6.2-2.6_powerpc.deb stable/main/binary-powerpc/libmagick++6-dev_6.0.6.2-2.6_powerpc.deb imagemagick (6:6.0.6.2-2.6) stable-security; urgency=high * Non-maintainer upload by the Security Team * Added '$' to the list of forbidden characters in filenames for delegate [magick/delegate.c, CVE-2005-4601] stable/main/binary-all/ilohamail_0.8.14-0rc3sarge1_all.deb stable/main/source/ilohamail_0.8.14-0rc3sarge1.diff.gz stable/main/source/ilohamail_0.8.14-0rc3sarge1.dsc ilohamail (0.8.14-0rc3sarge1) stable-security; urgency=high * Non-maintainer upload by the Security Team * Applied patch by Ulf Harnhammar to fix cross-site scripting problems [IlohaMail/source/read_message.php, IlohaMail/source/view.php IlohaMail/include/read_message_print.inc, 04-CVE-2005-1120.dpatch, Bug#304525] stable/main/binary-sparc/hylafax-server_4.2.1-5sarge3_sparc.deb stable/main/binary-sparc/hylafax-client_4.2.1-5sarge3_sparc.deb hylafax (1:4.2.1-5sarge3) stable-security; urgency=high * Corrected patch 701_CVE-2005-3539 stable/main/binary-s390/hylafax-server_4.2.1-5sarge3_s390.deb stable/main/binary-s390/hylafax-client_4.2.1-5sarge3_s390.deb hylafax (1:4.2.1-5sarge3) stable-security; urgency=high * Corrected patch 701_CVE-2005-3539 stable/main/binary-mipsel/hylafax-client_4.2.1-5sarge3_mipsel.deb stable/main/binary-mipsel/hylafax-server_4.2.1-5sarge3_mipsel.deb hylafax (1:4.2.1-5sarge3) stable-security; urgency=high * Corrected patch 701_CVE-2005-3539 stable/main/binary-mips/hylafax-server_4.2.1-5sarge3_mips.deb stable/main/binary-mips/hylafax-client_4.2.1-5sarge3_mips.deb hylafax (1:4.2.1-5sarge3) stable-security; urgency=high * Corrected patch 701_CVE-2005-3539 stable/main/binary-m68k/hylafax-server_4.2.1-5sarge3_m68k.deb stable/main/binary-m68k/hylafax-client_4.2.1-5sarge3_m68k.deb hylafax (1:4.2.1-5sarge3) stable-security; urgency=high * Corrected patch 701_CVE-2005-3539 stable/main/binary-ia64/hylafax-client_4.2.1-5sarge3_ia64.deb stable/main/binary-ia64/hylafax-server_4.2.1-5sarge3_ia64.deb hylafax (1:4.2.1-5sarge3) stable-security; urgency=high * Corrected patch 701_CVE-2005-3539 stable/main/binary-i386/hylafax-client_4.2.1-5sarge3_i386.deb stable/main/binary-i386/hylafax-server_4.2.1-5sarge3_i386.deb hylafax (1:4.2.1-5sarge3) stable-security; urgency=high * Corrected patch 701_CVE-2005-3539 stable/main/binary-hppa/hylafax-server_4.2.1-5sarge3_hppa.deb stable/main/binary-hppa/hylafax-client_4.2.1-5sarge3_hppa.deb hylafax (1:4.2.1-5sarge3) stable-security; urgency=high * Corrected patch 701_CVE-2005-3539 stable/main/binary-arm/hylafax-server_4.2.1-5sarge3_arm.deb stable/main/binary-arm/hylafax-client_4.2.1-5sarge3_arm.deb hylafax (1:4.2.1-5sarge3) stable-security; urgency=high * Corrected patch 701_CVE-2005-3539 stable/main/binary-alpha/hylafax-server_4.2.1-5sarge3_alpha.deb stable/main/binary-alpha/hylafax-client_4.2.1-5sarge3_alpha.deb hylafax (1:4.2.1-5sarge3) stable-security; urgency=high * Corrected patch 701_CVE-2005-3539 stable/main/binary-powerpc/hylafax-client_4.2.1-5sarge3_powerpc.deb stable/main/binary-all/hylafax-doc_4.2.1-5sarge3_all.deb stable/main/binary-powerpc/hylafax-server_4.2.1-5sarge3_powerpc.deb stable/main/source/hylafax_4.2.1-5sarge3.dsc stable/main/source/hylafax_4.2.1-5sarge3.diff.gz hylafax (1:4.2.1-5sarge3) stable-security; urgency=high * Corrected patch 701_CVE-2005-3539 stable/main/binary-sparc/libkadm5clnt4-heimdal_0.6.3-10sarge2_sparc.deb stable/main/binary-sparc/heimdal-dev_0.6.3-10sarge2_sparc.deb stable/main/binary-sparc/heimdal-servers-x_0.6.3-10sarge2_sparc.deb stable/main/binary-sparc/libkadm5srv7-heimdal_0.6.3-10sarge2_sparc.deb stable/main/binary-sparc/libkrb5-17-heimdal_0.6.3-10sarge2_sparc.deb stable/main/binary-sparc/heimdal-clients_0.6.3-10sarge2_sparc.deb stable/main/binary-sparc/libhdb7-heimdal_0.6.3-10sarge2_sparc.deb stable/main/binary-sparc/heimdal-clients-x_0.6.3-10sarge2_sparc.deb stable/main/binary-sparc/libgssapi1-heimdal_0.6.3-10sarge2_sparc.deb stable/main/binary-sparc/libasn1-6-heimdal_0.6.3-10sarge2_sparc.deb stable/main/binary-sparc/heimdal-kdc_0.6.3-10sarge2_sparc.deb stable/main/binary-sparc/heimdal-servers_0.6.3-10sarge2_sparc.deb stable/main/binary-sparc/libkafs0-heimdal_0.6.3-10sarge2_sparc.deb heimdal (0.6.3-10sarge2) stable-security; urgency=high * Non-maintainer upload by the Security Team * Applied upstream patch to fix file overwrite problem [appl/rsh/rshd.c, debian/patches/034_CVE-2006-0582] * Applied upstream patch to fix denial of service [appl/telnet/telnetd/telnetd.c, debian/patches/035_CVE-2006-0677] stable/main/binary-s390/heimdal-clients-x_0.6.3-10sarge2_s390.deb stable/main/binary-s390/libkafs0-heimdal_0.6.3-10sarge2_s390.deb stable/main/binary-s390/libkrb5-17-heimdal_0.6.3-10sarge2_s390.deb stable/main/binary-s390/heimdal-clients_0.6.3-10sarge2_s390.deb stable/main/binary-s390/libhdb7-heimdal_0.6.3-10sarge2_s390.deb stable/main/binary-s390/heimdal-servers-x_0.6.3-10sarge2_s390.deb stable/main/binary-s390/heimdal-servers_0.6.3-10sarge2_s390.deb stable/main/binary-s390/heimdal-kdc_0.6.3-10sarge2_s390.deb stable/main/binary-s390/heimdal-dev_0.6.3-10sarge2_s390.deb stable/main/binary-s390/libkadm5clnt4-heimdal_0.6.3-10sarge2_s390.deb stable/main/binary-s390/libasn1-6-heimdal_0.6.3-10sarge2_s390.deb stable/main/binary-s390/libkadm5srv7-heimdal_0.6.3-10sarge2_s390.deb stable/main/binary-s390/libgssapi1-heimdal_0.6.3-10sarge2_s390.deb heimdal (0.6.3-10sarge2) stable-security; urgency=high * Non-maintainer upload by the Security Team * Applied upstream patch to fix file overwrite problem [appl/rsh/rshd.c, debian/patches/034_CVE-2006-0582] * Applied upstream patch to fix denial of service [appl/telnet/telnetd/telnetd.c, debian/patches/035_CVE-2006-0677] stable/main/binary-mipsel/libasn1-6-heimdal_0.6.3-10sarge2_mipsel.deb stable/main/binary-mipsel/libkrb5-17-heimdal_0.6.3-10sarge2_mipsel.deb stable/main/binary-mipsel/libhdb7-heimdal_0.6.3-10sarge2_mipsel.deb stable/main/binary-mipsel/heimdal-dev_0.6.3-10sarge2_mipsel.deb stable/main/binary-mipsel/libgssapi1-heimdal_0.6.3-10sarge2_mipsel.deb stable/main/binary-mipsel/heimdal-kdc_0.6.3-10sarge2_mipsel.deb stable/main/binary-mipsel/libkadm5srv7-heimdal_0.6.3-10sarge2_mipsel.deb stable/main/binary-mipsel/heimdal-servers-x_0.6.3-10sarge2_mipsel.deb stable/main/binary-mipsel/libkadm5clnt4-heimdal_0.6.3-10sarge2_mipsel.deb stable/main/binary-mipsel/heimdal-servers_0.6.3-10sarge2_mipsel.deb stable/main/binary-mipsel/libkafs0-heimdal_0.6.3-10sarge2_mipsel.deb stable/main/binary-mipsel/heimdal-clients_0.6.3-10sarge2_mipsel.deb stable/main/binary-mipsel/heimdal-clients-x_0.6.3-10sarge2_mipsel.deb heimdal (0.6.3-10sarge2) stable-security; urgency=high * Non-maintainer upload by the Security Team * Applied upstream patch to fix file overwrite problem [appl/rsh/rshd.c, debian/patches/034_CVE-2006-0582] * Applied upstream patch to fix denial of service [appl/telnet/telnetd/telnetd.c, debian/patches/035_CVE-2006-0677] stable/main/binary-mips/heimdal-servers-x_0.6.3-10sarge2_mips.deb stable/main/binary-mips/heimdal-servers_0.6.3-10sarge2_mips.deb stable/main/binary-mips/libkadm5srv7-heimdal_0.6.3-10sarge2_mips.deb stable/main/binary-mips/heimdal-clients-x_0.6.3-10sarge2_mips.deb stable/main/binary-mips/libkafs0-heimdal_0.6.3-10sarge2_mips.deb stable/main/binary-mips/heimdal-dev_0.6.3-10sarge2_mips.deb stable/main/binary-mips/libasn1-6-heimdal_0.6.3-10sarge2_mips.deb stable/main/binary-mips/heimdal-clients_0.6.3-10sarge2_mips.deb stable/main/binary-mips/libkrb5-17-heimdal_0.6.3-10sarge2_mips.deb stable/main/binary-mips/libgssapi1-heimdal_0.6.3-10sarge2_mips.deb stable/main/binary-mips/libhdb7-heimdal_0.6.3-10sarge2_mips.deb stable/main/binary-mips/heimdal-kdc_0.6.3-10sarge2_mips.deb stable/main/binary-mips/libkadm5clnt4-heimdal_0.6.3-10sarge2_mips.deb heimdal (0.6.3-10sarge2) stable-security; urgency=high * Non-maintainer upload by the Security Team * Applied upstream patch to fix file overwrite problem [appl/rsh/rshd.c, debian/patches/034_CVE-2006-0582] * Applied upstream patch to fix denial of service [appl/telnet/telnetd/telnetd.c, debian/patches/035_CVE-2006-0677] stable/main/binary-m68k/heimdal-servers-x_0.6.3-10sarge2_m68k.deb stable/main/binary-m68k/heimdal-servers_0.6.3-10sarge2_m68k.deb stable/main/binary-m68k/heimdal-clients-x_0.6.3-10sarge2_m68k.deb stable/main/binary-m68k/libkafs0-heimdal_0.6.3-10sarge2_m68k.deb stable/main/binary-m68k/heimdal-kdc_0.6.3-10sarge2_m68k.deb stable/main/binary-m68k/heimdal-dev_0.6.3-10sarge2_m68k.deb stable/main/binary-m68k/libgssapi1-heimdal_0.6.3-10sarge2_m68k.deb stable/main/binary-m68k/libhdb7-heimdal_0.6.3-10sarge2_m68k.deb stable/main/binary-m68k/libasn1-6-heimdal_0.6.3-10sarge2_m68k.deb stable/main/binary-m68k/libkadm5clnt4-heimdal_0.6.3-10sarge2_m68k.deb stable/main/binary-m68k/libkrb5-17-heimdal_0.6.3-10sarge2_m68k.deb stable/main/binary-m68k/heimdal-clients_0.6.3-10sarge2_m68k.deb stable/main/binary-m68k/libkadm5srv7-heimdal_0.6.3-10sarge2_m68k.deb heimdal (0.6.3-10sarge2) stable-security; urgency=high * Non-maintainer upload by the Security Team * Applied upstream patch to fix file overwrite problem [appl/rsh/rshd.c, debian/patches/034_CVE-2006-0582] * Applied upstream patch to fix denial of service [appl/telnet/telnetd/telnetd.c, debian/patches/035_CVE-2006-0677] stable/main/binary-ia64/heimdal-clients_0.6.3-10sarge2_ia64.deb stable/main/binary-ia64/heimdal-clients-x_0.6.3-10sarge2_ia64.deb stable/main/binary-ia64/libkafs0-heimdal_0.6.3-10sarge2_ia64.deb stable/main/binary-ia64/heimdal-dev_0.6.3-10sarge2_ia64.deb stable/main/binary-ia64/heimdal-servers_0.6.3-10sarge2_ia64.deb stable/main/binary-ia64/heimdal-servers-x_0.6.3-10sarge2_ia64.deb stable/main/binary-ia64/heimdal-kdc_0.6.3-10sarge2_ia64.deb stable/main/binary-ia64/libkadm5clnt4-heimdal_0.6.3-10sarge2_ia64.deb stable/main/binary-ia64/libhdb7-heimdal_0.6.3-10sarge2_ia64.deb stable/main/binary-ia64/libkrb5-17-heimdal_0.6.3-10sarge2_ia64.deb stable/main/binary-ia64/libkadm5srv7-heimdal_0.6.3-10sarge2_ia64.deb stable/main/binary-ia64/libasn1-6-heimdal_0.6.3-10sarge2_ia64.deb stable/main/binary-ia64/libgssapi1-heimdal_0.6.3-10sarge2_ia64.deb heimdal (0.6.3-10sarge2) stable-security; urgency=high * Non-maintainer upload by the Security Team * Applied upstream patch to fix file overwrite problem [appl/rsh/rshd.c, debian/patches/034_CVE-2006-0582] * Applied upstream patch to fix denial of service [appl/telnet/telnetd/telnetd.c, debian/patches/035_CVE-2006-0677] stable/main/binary-i386/libkadm5srv7-heimdal_0.6.3-10sarge2_i386.deb stable/main/binary-i386/libgssapi1-heimdal_0.6.3-10sarge2_i386.deb stable/main/binary-i386/heimdal-clients_0.6.3-10sarge2_i386.deb stable/main/binary-i386/libasn1-6-heimdal_0.6.3-10sarge2_i386.deb stable/main/binary-i386/heimdal-servers_0.6.3-10sarge2_i386.deb stable/main/binary-i386/heimdal-dev_0.6.3-10sarge2_i386.deb stable/main/binary-i386/libkrb5-17-heimdal_0.6.3-10sarge2_i386.deb stable/main/binary-i386/libhdb7-heimdal_0.6.3-10sarge2_i386.deb stable/main/binary-i386/heimdal-kdc_0.6.3-10sarge2_i386.deb stable/main/binary-i386/libkadm5clnt4-heimdal_0.6.3-10sarge2_i386.deb stable/main/binary-i386/heimdal-clients-x_0.6.3-10sarge2_i386.deb stable/main/binary-i386/libkafs0-heimdal_0.6.3-10sarge2_i386.deb stable/main/binary-i386/heimdal-servers-x_0.6.3-10sarge2_i386.deb heimdal (0.6.3-10sarge2) stable-security; urgency=high * Non-maintainer upload by the Security Team * Applied upstream patch to fix file overwrite problem [appl/rsh/rshd.c, debian/patches/034_CVE-2006-0582] * Applied upstream patch to fix denial of service [appl/telnet/telnetd/telnetd.c, debian/patches/035_CVE-2006-0677] stable/main/binary-hppa/heimdal-clients-x_0.6.3-10sarge2_hppa.deb stable/main/binary-hppa/heimdal-servers_0.6.3-10sarge2_hppa.deb stable/main/binary-hppa/libkrb5-17-heimdal_0.6.3-10sarge2_hppa.deb stable/main/binary-hppa/heimdal-clients_0.6.3-10sarge2_hppa.deb stable/main/binary-hppa/libkadm5srv7-heimdal_0.6.3-10sarge2_hppa.deb stable/main/binary-hppa/libasn1-6-heimdal_0.6.3-10sarge2_hppa.deb stable/main/binary-hppa/heimdal-dev_0.6.3-10sarge2_hppa.deb stable/main/binary-hppa/heimdal-kdc_0.6.3-10sarge2_hppa.deb stable/main/binary-hppa/libkafs0-heimdal_0.6.3-10sarge2_hppa.deb stable/main/binary-hppa/libkadm5clnt4-heimdal_0.6.3-10sarge2_hppa.deb stable/main/binary-hppa/libgssapi1-heimdal_0.6.3-10sarge2_hppa.deb stable/main/binary-hppa/heimdal-servers-x_0.6.3-10sarge2_hppa.deb stable/main/binary-hppa/libhdb7-heimdal_0.6.3-10sarge2_hppa.deb heimdal (0.6.3-10sarge2) stable-security; urgency=high * Non-maintainer upload by the Security Team * Applied upstream patch to fix file overwrite problem [appl/rsh/rshd.c, debian/patches/034_CVE-2006-0582] * Applied upstream patch to fix denial of service [appl/telnet/telnetd/telnetd.c, debian/patches/035_CVE-2006-0677] stable/main/binary-arm/libkadm5clnt4-heimdal_0.6.3-10sarge2_arm.deb stable/main/binary-arm/heimdal-servers-x_0.6.3-10sarge2_arm.deb stable/main/binary-arm/heimdal-kdc_0.6.3-10sarge2_arm.deb stable/main/binary-arm/heimdal-clients-x_0.6.3-10sarge2_arm.deb stable/main/binary-arm/libkafs0-heimdal_0.6.3-10sarge2_arm.deb stable/main/binary-arm/heimdal-servers_0.6.3-10sarge2_arm.deb stable/main/binary-arm/heimdal-dev_0.6.3-10sarge2_arm.deb stable/main/binary-arm/heimdal-clients_0.6.3-10sarge2_arm.deb stable/main/binary-arm/libkadm5srv7-heimdal_0.6.3-10sarge2_arm.deb stable/main/binary-arm/libasn1-6-heimdal_0.6.3-10sarge2_arm.deb stable/main/binary-arm/libgssapi1-heimdal_0.6.3-10sarge2_arm.deb stable/main/binary-arm/libhdb7-heimdal_0.6.3-10sarge2_arm.deb stable/main/binary-arm/libkrb5-17-heimdal_0.6.3-10sarge2_arm.deb heimdal (0.6.3-10sarge2) stable-security; urgency=high * Non-maintainer upload by the Security Team * Applied upstream patch to fix file overwrite problem [appl/rsh/rshd.c, debian/patches/034_CVE-2006-0582] * Applied upstream patch to fix denial of service [appl/telnet/telnetd/telnetd.c, debian/patches/035_CVE-2006-0677] stable/main/binary-alpha/libkrb5-17-heimdal_0.6.3-10sarge2_alpha.deb stable/main/binary-alpha/heimdal-servers_0.6.3-10sarge2_alpha.deb stable/main/binary-alpha/heimdal-servers-x_0.6.3-10sarge2_alpha.deb stable/main/binary-alpha/libhdb7-heimdal_0.6.3-10sarge2_alpha.deb stable/main/binary-alpha/heimdal-clients-x_0.6.3-10sarge2_alpha.deb stable/main/binary-alpha/libkadm5srv7-heimdal_0.6.3-10sarge2_alpha.deb stable/main/binary-alpha/libkafs0-heimdal_0.6.3-10sarge2_alpha.deb stable/main/binary-alpha/heimdal-dev_0.6.3-10sarge2_alpha.deb stable/main/binary-alpha/libasn1-6-heimdal_0.6.3-10sarge2_alpha.deb stable/main/binary-alpha/libgssapi1-heimdal_0.6.3-10sarge2_alpha.deb stable/main/binary-alpha/heimdal-kdc_0.6.3-10sarge2_alpha.deb stable/main/binary-alpha/libkadm5clnt4-heimdal_0.6.3-10sarge2_alpha.deb stable/main/binary-alpha/heimdal-clients_0.6.3-10sarge2_alpha.deb heimdal (0.6.3-10sarge2) stable-security; urgency=high * Non-maintainer upload by the Security Team * Applied upstream patch to fix file overwrite problem [appl/rsh/rshd.c, debian/patches/034_CVE-2006-0582] * Applied upstream patch to fix denial of service [appl/telnet/telnetd/telnetd.c, debian/patches/035_CVE-2006-0677] stable/main/binary-powerpc/heimdal-kdc_0.6.3-10sarge2_powerpc.deb stable/main/binary-powerpc/heimdal-servers_0.6.3-10sarge2_powerpc.deb stable/main/binary-powerpc/libhdb7-heimdal_0.6.3-10sarge2_powerpc.deb stable/main/binary-powerpc/libasn1-6-heimdal_0.6.3-10sarge2_powerpc.deb stable/main/binary-powerpc/libkrb5-17-heimdal_0.6.3-10sarge2_powerpc.deb stable/main/binary-powerpc/heimdal-clients_0.6.3-10sarge2_powerpc.deb stable/main/binary-powerpc/heimdal-servers-x_0.6.3-10sarge2_powerpc.deb stable/main/binary-all/heimdal-docs_0.6.3-10sarge2_all.deb stable/main/source/heimdal_0.6.3-10sarge2.dsc stable/main/binary-powerpc/libkafs0-heimdal_0.6.3-10sarge2_powerpc.deb stable/main/binary-powerpc/libkadm5clnt4-heimdal_0.6.3-10sarge2_powerpc.deb stable/main/binary-powerpc/libgssapi1-heimdal_0.6.3-10sarge2_powerpc.deb stable/main/source/heimdal_0.6.3-10sarge2.diff.gz stable/main/binary-powerpc/heimdal-clients-x_0.6.3-10sarge2_powerpc.deb stable/main/binary-powerpc/heimdal-dev_0.6.3-10sarge2_powerpc.deb stable/main/binary-powerpc/libkadm5srv7-heimdal_0.6.3-10sarge2_powerpc.deb heimdal (0.6.3-10sarge2) stable-security; urgency=high * Non-maintainer upload by the Security Team * Applied upstream patch to fix file overwrite problem [appl/rsh/rshd.c, debian/patches/034_CVE-2006-0582] * Applied upstream patch to fix denial of service [appl/telnet/telnetd/telnetd.c, debian/patches/035_CVE-2006-0677] stable/main/binary-sparc/gpdf_2.8.2-1.2sarge4_sparc.deb gpdf (2.8.2-1.2sarge4) stable-security; urgency=high * Non-maintainer upload by the Security Team * Backported upstream patch by Derek Noonburg to fix several vulnerabilities [goo/gmem.c, splash/SplashXPathScanner.cc, xpdf/JBIG2Stream.cc, xpdf/Stream.h, 008_security_upstream.patch] stable/main/binary-s390/gpdf_2.8.2-1.2sarge4_s390.deb gpdf (2.8.2-1.2sarge4) stable-security; urgency=high * Non-maintainer upload by the Security Team * Backported upstream patch by Derek Noonburg to fix several vulnerabilities [goo/gmem.c, splash/SplashXPathScanner.cc, xpdf/JBIG2Stream.cc, xpdf/Stream.h, 008_security_upstream.patch] stable/main/binary-mipsel/gpdf_2.8.2-1.2sarge4_mipsel.deb gpdf (2.8.2-1.2sarge4) stable-security; urgency=high * Non-maintainer upload by the Security Team * Backported upstream patch by Derek Noonburg to fix several vulnerabilities [goo/gmem.c, splash/SplashXPathScanner.cc, xpdf/JBIG2Stream.cc, xpdf/Stream.h, 008_security_upstream.patch] stable/main/binary-mips/gpdf_2.8.2-1.2sarge4_mips.deb gpdf (2.8.2-1.2sarge4) stable-security; urgency=high * Non-maintainer upload by the Security Team * Backported upstream patch by Derek Noonburg to fix several vulnerabilities [goo/gmem.c, splash/SplashXPathScanner.cc, xpdf/JBIG2Stream.cc, xpdf/Stream.h, 008_security_upstream.patch] stable/main/binary-m68k/gpdf_2.8.2-1.2sarge4_m68k.deb gpdf (2.8.2-1.2sarge4) stable-security; urgency=high * Non-maintainer upload by the Security Team * Backported upstream patch by Derek Noonburg to fix several vulnerabilities [goo/gmem.c, splash/SplashXPathScanner.cc, xpdf/JBIG2Stream.cc, xpdf/Stream.h, 008_security_upstream.patch] stable/main/binary-ia64/gpdf_2.8.2-1.2sarge4_ia64.deb gpdf (2.8.2-1.2sarge4) stable-security; urgency=high * Non-maintainer upload by the Security Team * Backported upstream patch by Derek Noonburg to fix several vulnerabilities [goo/gmem.c, splash/SplashXPathScanner.cc, xpdf/JBIG2Stream.cc, xpdf/Stream.h, 008_security_upstream.patch] stable/main/binary-i386/gpdf_2.8.2-1.2sarge4_i386.deb gpdf (2.8.2-1.2sarge4) stable-security; urgency=high * Non-maintainer upload by the Security Team * Backported upstream patch by Derek Noonburg to fix several vulnerabilities [goo/gmem.c, splash/SplashXPathScanner.cc, xpdf/JBIG2Stream.cc, xpdf/Stream.h, 008_security_upstream.patch] stable/main/binary-hppa/gpdf_2.8.2-1.2sarge4_hppa.deb gpdf (2.8.2-1.2sarge4) stable-security; urgency=high * Non-maintainer upload by the Security Team * Backported upstream patch by Derek Noonburg to fix several vulnerabilities [goo/gmem.c, splash/SplashXPathScanner.cc, xpdf/JBIG2Stream.cc, xpdf/Stream.h, 008_security_upstream.patch] stable/main/binary-arm/gpdf_2.8.2-1.2sarge4_arm.deb gpdf (2.8.2-1.2sarge4) stable-security; urgency=high * Non-maintainer upload by the Security Team * Backported upstream patch by Derek Noonburg to fix several vulnerabilities [goo/gmem.c, splash/SplashXPathScanner.cc, xpdf/JBIG2Stream.cc, xpdf/Stream.h, 008_security_upstream.patch] stable/main/binary-alpha/gpdf_2.8.2-1.2sarge4_alpha.deb gpdf (2.8.2-1.2sarge4) stable-security; urgency=high * Non-maintainer upload by the Security Team * Backported upstream patch by Derek Noonburg to fix several vulnerabilities [goo/gmem.c, splash/SplashXPathScanner.cc, xpdf/JBIG2Stream.cc, xpdf/Stream.h, 008_security_upstream.patch] stable/main/source/gpdf_2.8.2-1.2sarge4.diff.gz stable/main/binary-powerpc/gpdf_2.8.2-1.2sarge4_powerpc.deb stable/main/source/gpdf_2.8.2-1.2sarge4.dsc gpdf (2.8.2-1.2sarge4) stable-security; urgency=high * Non-maintainer upload by the Security Team * Backported upstream patch by Derek Noonburg to fix several vulnerabilities [goo/gmem.c, splash/SplashXPathScanner.cc, xpdf/JBIG2Stream.cc, xpdf/Stream.h, 008_security_upstream.patch] stable/main/binary-sparc/libgnutls11-dev_1.0.16-13.2_sparc.deb stable/main/binary-sparc/gnutls-bin_1.0.16-13.2_sparc.deb stable/main/binary-sparc/libgnutls11-dbg_1.0.16-13.2_sparc.deb stable/main/binary-sparc/libgnutls11_1.0.16-13.2_sparc.deb gnutls11 (1.0.16-13.2) stable-security; urgency=high * Non-maintainer upload by the Security Team * Backported upstream patch to fix out-of-bounds access [lib/minitasn1/coding.c, lib/minitasn1/decoding.c, lib/minitasn1/element.c, lib/minitasn1/libtasn1.h, lib/minitasn1/parser_aux.c, lib/minitasn1/structure.c, CVE-2006-0645] * Tightened the build-dependency to libtasn1 0.2.10-3sarge1 which fixes the same vulnerabilities. stable/main/binary-s390/gnutls-bin_1.0.16-13.2_s390.deb stable/main/binary-s390/libgnutls11-dev_1.0.16-13.2_s390.deb stable/main/binary-s390/libgnutls11-dbg_1.0.16-13.2_s390.deb stable/main/binary-s390/libgnutls11_1.0.16-13.2_s390.deb gnutls11 (1.0.16-13.2) stable-security; urgency=high * Non-maintainer upload by the Security Team * Backported upstream patch to fix out-of-bounds access [lib/minitasn1/coding.c, lib/minitasn1/decoding.c, lib/minitasn1/element.c, lib/minitasn1/libtasn1.h, lib/minitasn1/parser_aux.c, lib/minitasn1/structure.c, CVE-2006-0645] * Tightened the build-dependency to libtasn1 0.2.10-3sarge1 which fixes the same vulnerabilities. stable/main/binary-mipsel/libgnutls11-dbg_1.0.16-13.2_mipsel.deb stable/main/binary-mipsel/gnutls-bin_1.0.16-13.2_mipsel.deb stable/main/binary-mipsel/libgnutls11_1.0.16-13.2_mipsel.deb stable/main/binary-mipsel/libgnutls11-dev_1.0.16-13.2_mipsel.deb gnutls11 (1.0.16-13.2) stable-security; urgency=high * Non-maintainer upload by the Security Team * Backported upstream patch to fix out-of-bounds access [lib/minitasn1/coding.c, lib/minitasn1/decoding.c, lib/minitasn1/element.c, lib/minitasn1/libtasn1.h, lib/minitasn1/parser_aux.c, lib/minitasn1/structure.c, CVE-2006-0645] * Tightened the build-dependency to libtasn1 0.2.10-3sarge1 which fixes the same vulnerabilities. stable/main/binary-mips/libgnutls11-dbg_1.0.16-13.2_mips.deb stable/main/binary-mips/gnutls-bin_1.0.16-13.2_mips.deb stable/main/binary-mips/libgnutls11-dev_1.0.16-13.2_mips.deb stable/main/binary-mips/libgnutls11_1.0.16-13.2_mips.deb gnutls11 (1.0.16-13.2) stable-security; urgency=high * Non-maintainer upload by the Security Team * Backported upstream patch to fix out-of-bounds access [lib/minitasn1/coding.c, lib/minitasn1/decoding.c, lib/minitasn1/element.c, lib/minitasn1/libtasn1.h, lib/minitasn1/parser_aux.c, lib/minitasn1/structure.c, CVE-2006-0645] * Tightened the build-dependency to libtasn1 0.2.10-3sarge1 which fixes the same vulnerabilities. stable/main/binary-m68k/libgnutls11-dbg_1.0.16-13.2_m68k.deb stable/main/binary-m68k/libgnutls11_1.0.16-13.2_m68k.deb stable/main/binary-m68k/gnutls-bin_1.0.16-13.2_m68k.deb stable/main/binary-m68k/libgnutls11-dev_1.0.16-13.2_m68k.deb gnutls11 (1.0.16-13.2) stable-security; urgency=high * Non-maintainer upload by the Security Team * Backported upstream patch to fix out-of-bounds access [lib/minitasn1/coding.c, lib/minitasn1/decoding.c, lib/minitasn1/element.c, lib/minitasn1/libtasn1.h, lib/minitasn1/parser_aux.c, lib/minitasn1/structure.c, CVE-2006-0645] * Tightened the build-dependency to libtasn1 0.2.10-3sarge1 which fixes the same vulnerabilities. stable/main/binary-ia64/libgnutls11-dev_1.0.16-13.2_ia64.deb stable/main/binary-ia64/gnutls-bin_1.0.16-13.2_ia64.deb stable/main/binary-ia64/libgnutls11_1.0.16-13.2_ia64.deb stable/main/binary-ia64/libgnutls11-dbg_1.0.16-13.2_ia64.deb gnutls11 (1.0.16-13.2) stable-security; urgency=high * Non-maintainer upload by the Security Team * Backported upstream patch to fix out-of-bounds access [lib/minitasn1/coding.c, lib/minitasn1/decoding.c, lib/minitasn1/element.c, lib/minitasn1/libtasn1.h, lib/minitasn1/parser_aux.c, lib/minitasn1/structure.c, CVE-2006-0645] * Tightened the build-dependency to libtasn1 0.2.10-3sarge1 which fixes the same vulnerabilities. stable/main/binary-i386/libgnutls11_1.0.16-13.2_i386.deb stable/main/binary-i386/libgnutls11-dev_1.0.16-13.2_i386.deb stable/main/binary-i386/gnutls-bin_1.0.16-13.2_i386.deb stable/main/binary-i386/libgnutls11-dbg_1.0.16-13.2_i386.deb gnutls11 (1.0.16-13.2) stable-security; urgency=high * Non-maintainer upload by the Security Team * Backported upstream patch to fix out-of-bounds access [lib/minitasn1/coding.c, lib/minitasn1/decoding.c, lib/minitasn1/element.c, lib/minitasn1/libtasn1.h, lib/minitasn1/parser_aux.c, lib/minitasn1/structure.c, CVE-2006-0645] * Tightened the build-dependency to libtasn1 0.2.10-3sarge1 which fixes the same vulnerabilities. stable/main/binary-hppa/libgnutls11-dev_1.0.16-13.2_hppa.deb stable/main/binary-hppa/gnutls-bin_1.0.16-13.2_hppa.deb stable/main/binary-hppa/libgnutls11-dbg_1.0.16-13.2_hppa.deb stable/main/binary-hppa/libgnutls11_1.0.16-13.2_hppa.deb gnutls11 (1.0.16-13.2) stable-security; urgency=high * Non-maintainer upload by the Security Team * Backported upstream patch to fix out-of-bounds access [lib/minitasn1/coding.c, lib/minitasn1/decoding.c, lib/minitasn1/element.c, lib/minitasn1/libtasn1.h, lib/minitasn1/parser_aux.c, lib/minitasn1/structure.c, CVE-2006-0645] * Tightened the build-dependency to libtasn1 0.2.10-3sarge1 which fixes the same vulnerabilities. stable/main/binary-arm/libgnutls11_1.0.16-13.2_arm.deb stable/main/binary-arm/libgnutls11-dbg_1.0.16-13.2_arm.deb stable/main/binary-arm/gnutls-bin_1.0.16-13.2_arm.deb stable/main/binary-arm/libgnutls11-dev_1.0.16-13.2_arm.deb gnutls11 (1.0.16-13.2) stable-security; urgency=high * Non-maintainer upload by the Security Team * Backported upstream patch to fix out-of-bounds access [lib/minitasn1/coding.c, lib/minitasn1/decoding.c, lib/minitasn1/element.c, lib/minitasn1/libtasn1.h, lib/minitasn1/parser_aux.c, lib/minitasn1/structure.c, CVE-2006-0645] * Tightened the build-dependency to libtasn1 0.2.10-3sarge1 which fixes the same vulnerabilities. stable/main/binary-alpha/gnutls-bin_1.0.16-13.2_alpha.deb stable/main/binary-alpha/libgnutls11_1.0.16-13.2_alpha.deb stable/main/binary-alpha/libgnutls11-dev_1.0.16-13.2_alpha.deb stable/main/binary-alpha/libgnutls11-dbg_1.0.16-13.2_alpha.deb gnutls11 (1.0.16-13.2) stable-security; urgency=high * Non-maintainer upload by the Security Team * Backported upstream patch to fix out-of-bounds access [lib/minitasn1/coding.c, lib/minitasn1/decoding.c, lib/minitasn1/element.c, lib/minitasn1/libtasn1.h, lib/minitasn1/parser_aux.c, lib/minitasn1/structure.c, CVE-2006-0645] * Tightened the build-dependency to libtasn1 0.2.10-3sarge1 which fixes the same vulnerabilities. stable/main/source/gnutls11_1.0.16-13.2.dsc stable/main/binary-powerpc/gnutls-bin_1.0.16-13.2_powerpc.deb stable/main/binary-powerpc/libgnutls11_1.0.16-13.2_powerpc.deb stable/main/binary-powerpc/libgnutls11-dev_1.0.16-13.2_powerpc.deb stable/main/source/gnutls11_1.0.16-13.2.diff.gz stable/main/binary-powerpc/libgnutls11-dbg_1.0.16-13.2_powerpc.deb gnutls11 (1.0.16-13.2) stable-security; urgency=high * Non-maintainer upload by the Security Team * Backported upstream patch to fix out-of-bounds access [lib/minitasn1/coding.c, lib/minitasn1/decoding.c, lib/minitasn1/element.c, lib/minitasn1/libtasn1.h, lib/minitasn1/parser_aux.c, lib/minitasn1/structure.c, CVE-2006-0645] * Tightened the build-dependency to libtasn1 0.2.10-3sarge1 which fixes the same vulnerabilities. stable/main/binary-sparc/gnupg_1.4.1-1.sarge3_sparc.deb stable/main/binary-sparc/gpgv-udeb_1.4.1-1.sarge3_sparc.udeb gnupg (1.4.1-1.sarge3) stable-security; urgency=high * Non-maintainer upload by the Security Team * Return any_sig_seen to caller [g10/mainproc.c, debian/patches/21_CVE-2006-0049.dpatch] stable/main/binary-s390/gnupg_1.4.1-1.sarge3_s390.deb stable/main/binary-s390/gpgv-udeb_1.4.1-1.sarge3_s390.udeb gnupg (1.4.1-1.sarge3) stable-security; urgency=high * Non-maintainer upload by the Security Team * Return any_sig_seen to caller [g10/mainproc.c, debian/patches/21_CVE-2006-0049.dpatch] stable/main/binary-powerpc/gnupg_1.4.1-1.sarge3_powerpc.deb stable/main/binary-powerpc/gpgv-udeb_1.4.1-1.sarge3_powerpc.udeb gnupg (1.4.1-1.sarge3) stable-security; urgency=high * Non-maintainer upload by the Security Team * Return any_sig_seen to caller [g10/mainproc.c, debian/patches/21_CVE-2006-0049.dpatch] stable/main/binary-mipsel/gpgv-udeb_1.4.1-1.sarge3_mipsel.udeb stable/main/binary-mipsel/gnupg_1.4.1-1.sarge3_mipsel.deb gnupg (1.4.1-1.sarge3) stable-security; urgency=high * Non-maintainer upload by the Security Team * Return any_sig_seen to caller [g10/mainproc.c, debian/patches/21_CVE-2006-0049.dpatch] stable/main/binary-mips/gnupg_1.4.1-1.sarge3_mips.deb stable/main/binary-mips/gpgv-udeb_1.4.1-1.sarge3_mips.udeb gnupg (1.4.1-1.sarge3) stable-security; urgency=high * Non-maintainer upload by the Security Team * Return any_sig_seen to caller [g10/mainproc.c, debian/patches/21_CVE-2006-0049.dpatch] stable/main/binary-m68k/gnupg_1.4.1-1.sarge3_m68k.deb stable/main/binary-m68k/gpgv-udeb_1.4.1-1.sarge3_m68k.udeb gnupg (1.4.1-1.sarge3) stable-security; urgency=high * Non-maintainer upload by the Security Team * Return any_sig_seen to caller [g10/mainproc.c, debian/patches/21_CVE-2006-0049.dpatch] stable/main/binary-ia64/gnupg_1.4.1-1.sarge3_ia64.deb stable/main/binary-ia64/gpgv-udeb_1.4.1-1.sarge3_ia64.udeb gnupg (1.4.1-1.sarge3) stable-security; urgency=high * Non-maintainer upload by the Security Team * Return any_sig_seen to caller [g10/mainproc.c, debian/patches/21_CVE-2006-0049.dpatch] stable/main/binary-hppa/gnupg_1.4.1-1.sarge3_hppa.deb stable/main/binary-hppa/gpgv-udeb_1.4.1-1.sarge3_hppa.udeb gnupg (1.4.1-1.sarge3) stable-security; urgency=high * Non-maintainer upload by the Security Team * Return any_sig_seen to caller [g10/mainproc.c, debian/patches/21_CVE-2006-0049.dpatch] stable/main/binary-arm/gpgv-udeb_1.4.1-1.sarge3_arm.udeb stable/main/binary-arm/gnupg_1.4.1-1.sarge3_arm.deb gnupg (1.4.1-1.sarge3) stable-security; urgency=high * Non-maintainer upload by the Security Team * Return any_sig_seen to caller [g10/mainproc.c, debian/patches/21_CVE-2006-0049.dpatch] stable/main/binary-alpha/gnupg_1.4.1-1.sarge3_alpha.deb stable/main/binary-alpha/gpgv-udeb_1.4.1-1.sarge3_alpha.udeb gnupg (1.4.1-1.sarge3) stable-security; urgency=high * Non-maintainer upload by the Security Team * Return any_sig_seen to caller [g10/mainproc.c, debian/patches/21_CVE-2006-0049.dpatch] stable/main/binary-i386/gpgv-udeb_1.4.1-1.sarge3_i386.udeb stable/main/source/gnupg_1.4.1-1.sarge3.dsc stable/main/binary-i386/gnupg_1.4.1-1.sarge3_i386.deb stable/main/source/gnupg_1.4.1-1.sarge3.diff.gz gnupg (1.4.1-1.sarge3) stable-security; urgency=high * Non-maintainer upload by the Security Team * Return any_sig_seen to caller [g10/mainproc.c, debian/patches/21_CVE-2006-0049.dpatch] stable/main/binary-sparc/gnocatan-meta-server_0.8.1.59-1sarge1_sparc.deb stable/main/binary-sparc/gnocatan-client_0.8.1.59-1sarge1_sparc.deb stable/main/binary-sparc/gnocatan-server-gtk_0.8.1.59-1sarge1_sparc.deb stable/main/binary-sparc/gnocatan-server-console_0.8.1.59-1sarge1_sparc.deb stable/main/binary-sparc/gnocatan-ai_0.8.1.59-1sarge1_sparc.deb gnocatan (0.8.1.59-1sarge1) stable-security; urgency=high * Non-maintainer upload by the Security Team * Backported upstream patch to fix remote server and client crash conditions [client/common/chat.c, client/gtk/chat.c, common/game.h, server/player.c, CVE-2006-0467] stable/main/binary-s390/gnocatan-meta-server_0.8.1.59-1sarge1_s390.deb stable/main/binary-s390/gnocatan-client_0.8.1.59-1sarge1_s390.deb stable/main/binary-s390/gnocatan-server-gtk_0.8.1.59-1sarge1_s390.deb stable/main/binary-s390/gnocatan-server-console_0.8.1.59-1sarge1_s390.deb stable/main/binary-s390/gnocatan-ai_0.8.1.59-1sarge1_s390.deb gnocatan (0.8.1.59-1sarge1) stable-security; urgency=high * Non-maintainer upload by the Security Team * Backported upstream patch to fix remote server and client crash conditions [client/common/chat.c, client/gtk/chat.c, common/game.h, server/player.c, CVE-2006-0467] stable/main/binary-mipsel/gnocatan-meta-server_0.8.1.59-1sarge1_mipsel.deb stable/main/binary-mipsel/gnocatan-ai_0.8.1.59-1sarge1_mipsel.deb stable/main/binary-mipsel/gnocatan-server-console_0.8.1.59-1sarge1_mipsel.deb stable/main/binary-mipsel/gnocatan-server-gtk_0.8.1.59-1sarge1_mipsel.deb stable/main/binary-mipsel/gnocatan-client_0.8.1.59-1sarge1_mipsel.deb gnocatan (0.8.1.59-1sarge1) stable-security; urgency=high * Non-maintainer upload by the Security Team * Backported upstream patch to fix remote server and client crash conditions [client/common/chat.c, client/gtk/chat.c, common/game.h, server/player.c, CVE-2006-0467] stable/main/binary-mips/gnocatan-ai_0.8.1.59-1sarge1_mips.deb stable/main/binary-mips/gnocatan-client_0.8.1.59-1sarge1_mips.deb stable/main/binary-mips/gnocatan-server-gtk_0.8.1.59-1sarge1_mips.deb stable/main/binary-mips/gnocatan-server-console_0.8.1.59-1sarge1_mips.deb stable/main/binary-mips/gnocatan-meta-server_0.8.1.59-1sarge1_mips.deb gnocatan (0.8.1.59-1sarge1) stable-security; urgency=high * Non-maintainer upload by the Security Team * Backported upstream patch to fix remote server and client crash conditions [client/common/chat.c, client/gtk/chat.c, common/game.h, server/player.c, CVE-2006-0467] stable/main/binary-m68k/gnocatan-client_0.8.1.59-1sarge1_m68k.deb stable/main/binary-m68k/gnocatan-server-gtk_0.8.1.59-1sarge1_m68k.deb stable/main/binary-m68k/gnocatan-meta-server_0.8.1.59-1sarge1_m68k.deb stable/main/binary-m68k/gnocatan-server-console_0.8.1.59-1sarge1_m68k.deb stable/main/binary-m68k/gnocatan-ai_0.8.1.59-1sarge1_m68k.deb gnocatan (0.8.1.59-1sarge1) stable-security; urgency=high * Non-maintainer upload by the Security Team * Backported upstream patch to fix remote server and client crash conditions [client/common/chat.c, client/gtk/chat.c, common/game.h, server/player.c, CVE-2006-0467] stable/main/binary-ia64/gnocatan-server-gtk_0.8.1.59-1sarge1_ia64.deb stable/main/binary-ia64/gnocatan-ai_0.8.1.59-1sarge1_ia64.deb stable/main/binary-ia64/gnocatan-server-console_0.8.1.59-1sarge1_ia64.deb stable/main/binary-ia64/gnocatan-meta-server_0.8.1.59-1sarge1_ia64.deb stable/main/binary-ia64/gnocatan-client_0.8.1.59-1sarge1_ia64.deb gnocatan (0.8.1.59-1sarge1) stable-security; urgency=high * Non-maintainer upload by the Security Team * Backported upstream patch to fix remote server and client crash conditions [client/common/chat.c, client/gtk/chat.c, common/game.h, server/player.c, CVE-2006-0467] stable/main/binary-i386/gnocatan-server-console_0.8.1.59-1sarge1_i386.deb stable/main/binary-i386/gnocatan-ai_0.8.1.59-1sarge1_i386.deb stable/main/binary-i386/gnocatan-client_0.8.1.59-1sarge1_i386.deb stable/main/binary-i386/gnocatan-meta-server_0.8.1.59-1sarge1_i386.deb stable/main/binary-i386/gnocatan-server-gtk_0.8.1.59-1sarge1_i386.deb gnocatan (0.8.1.59-1sarge1) stable-security; urgency=high * Non-maintainer upload by the Security Team * Backported upstream patch to fix remote server and client crash conditions [client/common/chat.c, client/gtk/chat.c, common/game.h, server/player.c, CVE-2006-0467] stable/main/binary-hppa/gnocatan-server-gtk_0.8.1.59-1sarge1_hppa.deb stable/main/binary-hppa/gnocatan-client_0.8.1.59-1sarge1_hppa.deb stable/main/binary-hppa/gnocatan-ai_0.8.1.59-1sarge1_hppa.deb stable/main/binary-hppa/gnocatan-server-console_0.8.1.59-1sarge1_hppa.deb stable/main/binary-hppa/gnocatan-meta-server_0.8.1.59-1sarge1_hppa.deb gnocatan (0.8.1.59-1sarge1) stable-security; urgency=high * Non-maintainer upload by the Security Team * Backported upstream patch to fix remote server and client crash conditions [client/common/chat.c, client/gtk/chat.c, common/game.h, server/player.c, CVE-2006-0467] stable/main/binary-arm/gnocatan-ai_0.8.1.59-1sarge1_arm.deb stable/main/binary-arm/gnocatan-client_0.8.1.59-1sarge1_arm.deb stable/main/binary-arm/gnocatan-meta-server_0.8.1.59-1sarge1_arm.deb stable/main/binary-arm/gnocatan-server-console_0.8.1.59-1sarge1_arm.deb stable/main/binary-arm/gnocatan-server-gtk_0.8.1.59-1sarge1_arm.deb gnocatan (0.8.1.59-1sarge1) stable-security; urgency=high * Non-maintainer upload by the Security Team * Backported upstream patch to fix remote server and client crash conditions [client/common/chat.c, client/gtk/chat.c, common/game.h, server/player.c, CVE-2006-0467] stable/main/binary-alpha/gnocatan-client_0.8.1.59-1sarge1_alpha.deb stable/main/binary-alpha/gnocatan-server-gtk_0.8.1.59-1sarge1_alpha.deb stable/main/binary-alpha/gnocatan-ai_0.8.1.59-1sarge1_alpha.deb stable/main/binary-alpha/gnocatan-server-console_0.8.1.59-1sarge1_alpha.deb stable/main/binary-alpha/gnocatan-meta-server_0.8.1.59-1sarge1_alpha.deb gnocatan (0.8.1.59-1sarge1) stable-security; urgency=high * Non-maintainer upload by the Security Team * Backported upstream patch to fix remote server and client crash conditions [client/common/chat.c, client/gtk/chat.c, common/game.h, server/player.c, CVE-2006-0467] stable/main/binary-all/gnocatan-server-data_0.8.1.59-1sarge1_all.deb stable/main/binary-powerpc/gnocatan-ai_0.8.1.59-1sarge1_powerpc.deb stable/main/binary-powerpc/gnocatan-server-console_0.8.1.59-1sarge1_powerpc.deb stable/main/binary-powerpc/gnocatan-server-gtk_0.8.1.59-1sarge1_powerpc.deb stable/main/source/gnocatan_0.8.1.59-1sarge1.diff.gz stable/main/binary-all/gnocatan-help_0.8.1.59-1sarge1_all.deb stable/main/binary-powerpc/gnocatan-meta-server_0.8.1.59-1sarge1_powerpc.deb stable/main/binary-powerpc/gnocatan-client_0.8.1.59-1sarge1_powerpc.deb stable/main/source/gnocatan_0.8.1.59-1sarge1.dsc gnocatan (0.8.1.59-1sarge1) stable-security; urgency=high * Non-maintainer upload by the Security Team * Backported upstream patch to fix remote server and client crash conditions [client/common/chat.c, client/gtk/chat.c, common/game.h, server/player.c, CVE-2006-0467] stable/main/binary-sparc/nscd_2.3.2.ds1-22sarge3_sparc.deb stable/main/binary-sparc/libc6_2.3.2.ds1-22sarge3_sparc.deb stable/main/binary-sparc/libc6-prof_2.3.2.ds1-22sarge3_sparc.deb stable/main/binary-sparc/libc6-pic_2.3.2.ds1-22sarge3_sparc.deb stable/main/binary-sparc/libc6-sparcv9b_2.3.2.ds1-22sarge3_sparc.deb stable/main/binary-sparc/libc6-dbg_2.3.2.ds1-22sarge3_sparc.deb stable/main/binary-sparc/libc6-dev-sparc64_2.3.2.ds1-22sarge3_sparc.deb stable/main/binary-sparc/libnss-files-udeb_2.3.2.ds1-22sarge3_sparc.udeb stable/main/binary-sparc/libc6-dev_2.3.2.ds1-22sarge3_sparc.deb stable/main/binary-sparc/libc6-udeb_2.3.2.ds1-22sarge3_sparc.udeb stable/main/binary-sparc/libnss-dns-udeb_2.3.2.ds1-22sarge3_sparc.udeb stable/main/binary-sparc/libc6-sparcv9_2.3.2.ds1-22sarge3_sparc.deb stable/main/binary-sparc/libc6-sparc64_2.3.2.ds1-22sarge3_sparc.deb glibc (2.3.2.ds1-22sarge3) stable; urgency=low * Aurelien Jarno <aurel32@debian.org> - debian/patches/90_glibc232-timezones.dpatch: still provide SystemV links. stable/main/binary-s390/libc6-dbg_2.3.2.ds1-22sarge3_s390.deb stable/main/binary-s390/libc6-udeb_2.3.2.ds1-22sarge3_s390.udeb stable/main/binary-s390/libnss-files-udeb_2.3.2.ds1-22sarge3_s390.udeb stable/main/binary-s390/nscd_2.3.2.ds1-22sarge3_s390.deb stable/main/binary-s390/libc6-dev_2.3.2.ds1-22sarge3_s390.deb stable/main/binary-s390/libc6_2.3.2.ds1-22sarge3_s390.deb stable/main/binary-s390/libc6-prof_2.3.2.ds1-22sarge3_s390.deb stable/main/binary-s390/libnss-dns-udeb_2.3.2.ds1-22sarge3_s390.udeb stable/main/binary-s390/libc6-s390x_2.3.2.ds1-22sarge3_s390.deb stable/main/binary-s390/libc6-pic_2.3.2.ds1-22sarge3_s390.deb stable/main/binary-s390/libc6-dev-s390x_2.3.2.ds1-22sarge3_s390.deb glibc (2.3.2.ds1-22sarge3) stable; urgency=low * Aurelien Jarno <aurel32@debian.org> - debian/patches/90_glibc232-timezones.dpatch: still provide SystemV links. stable/main/binary-powerpc/libc6_2.3.2.ds1-22sarge3_powerpc.deb stable/main/binary-powerpc/libc6-dev_2.3.2.ds1-22sarge3_powerpc.deb stable/main/binary-powerpc/libc6-prof_2.3.2.ds1-22sarge3_powerpc.deb stable/main/binary-powerpc/nscd_2.3.2.ds1-22sarge3_powerpc.deb stable/main/binary-powerpc/libc6-udeb_2.3.2.ds1-22sarge3_powerpc.udeb stable/main/binary-powerpc/libnss-files-udeb_2.3.2.ds1-22sarge3_powerpc.udeb stable/main/binary-powerpc/libnss-dns-udeb_2.3.2.ds1-22sarge3_powerpc.udeb stable/main/binary-powerpc/libc6-pic_2.3.2.ds1-22sarge3_powerpc.deb stable/main/binary-powerpc/libc6-dbg_2.3.2.ds1-22sarge3_powerpc.deb glibc (2.3.2.ds1-22sarge3) stable; urgency=low * Aurelien Jarno <aurel32@debian.org> - debian/patches/90_glibc232-timezones.dpatch: still provide SystemV links. stable/main/binary-mipsel/libc6-udeb_2.3.2.ds1-22sarge3_mipsel.udeb stable/main/binary-mipsel/libc6-prof_2.3.2.ds1-22sarge3_mipsel.deb stable/main/binary-mipsel/libc6-dev_2.3.2.ds1-22sarge3_mipsel.deb stable/main/binary-mipsel/libc6_2.3.2.ds1-22sarge3_mipsel.deb stable/main/binary-mipsel/libc6-pic_2.3.2.ds1-22sarge3_mipsel.deb stable/main/binary-mipsel/libnss-dns-udeb_2.3.2.ds1-22sarge3_mipsel.udeb stable/main/binary-mipsel/libnss-files-udeb_2.3.2.ds1-22sarge3_mipsel.udeb stable/main/binary-mipsel/nscd_2.3.2.ds1-22sarge3_mipsel.deb stable/main/binary-mipsel/libc6-dbg_2.3.2.ds1-22sarge3_mipsel.deb glibc (2.3.2.ds1-22sarge3) stable; urgency=low * Aurelien Jarno <aurel32@debian.org> - debian/patches/90_glibc232-timezones.dpatch: still provide SystemV links. stable/main/binary-mips/libnss-files-udeb_2.3.2.ds1-22sarge3_mips.udeb stable/main/binary-mips/libnss-dns-udeb_2.3.2.ds1-22sarge3_mips.udeb stable/main/binary-mips/libc6-dev_2.3.2.ds1-22sarge3_mips.deb stable/main/binary-mips/libc6-udeb_2.3.2.ds1-22sarge3_mips.udeb stable/main/binary-mips/libc6-dbg_2.3.2.ds1-22sarge3_mips.deb stable/main/binary-mips/libc6-prof_2.3.2.ds1-22sarge3_mips.deb stable/main/binary-mips/libc6-pic_2.3.2.ds1-22sarge3_mips.deb stable/main/binary-mips/libc6_2.3.2.ds1-22sarge3_mips.deb stable/main/binary-mips/nscd_2.3.2.ds1-22sarge3_mips.deb glibc (2.3.2.ds1-22sarge3) stable; urgency=low * Aurelien Jarno <aurel32@debian.org> - debian/patches/90_glibc232-timezones.dpatch: still provide SystemV links. stable/main/binary-m68k/libc6_2.3.2.ds1-22sarge3_m68k.deb stable/main/binary-m68k/libnss-dns-udeb_2.3.2.ds1-22sarge3_m68k.udeb stable/main/binary-m68k/libc6-prof_2.3.2.ds1-22sarge3_m68k.deb stable/main/binary-m68k/libnss-files-udeb_2.3.2.ds1-22sarge3_m68k.udeb stable/main/binary-m68k/libc6-udeb_2.3.2.ds1-22sarge3_m68k.udeb stable/main/binary-m68k/libc6-dbg_2.3.2.ds1-22sarge3_m68k.deb stable/main/binary-m68k/nscd_2.3.2.ds1-22sarge3_m68k.deb stable/main/binary-m68k/libc6-dev_2.3.2.ds1-22sarge3_m68k.deb stable/main/binary-m68k/libc6-pic_2.3.2.ds1-22sarge3_m68k.deb glibc (2.3.2.ds1-22sarge3) stable; urgency=low * Aurelien Jarno <aurel32@debian.org> - debian/patches/90_glibc232-timezones.dpatch: still provide SystemV links. stable/main/binary-ia64/libc6.1-dbg_2.3.2.ds1-22sarge3_ia64.deb stable/main/binary-ia64/libnss-files-udeb_2.3.2.ds1-22sarge3_ia64.udeb stable/main/binary-ia64/libc6.1_2.3.2.ds1-22sarge3_ia64.deb stable/main/binary-ia64/libc6.1-dev_2.3.2.ds1-22sarge3_ia64.deb stable/main/binary-ia64/nscd_2.3.2.ds1-22sarge3_ia64.deb stable/main/binary-ia64/libc6.1-prof_2.3.2.ds1-22sarge3_ia64.deb stable/main/binary-ia64/libnss-dns-udeb_2.3.2.ds1-22sarge3_ia64.udeb stable/main/binary-ia64/libc6.1-udeb_2.3.2.ds1-22sarge3_ia64.udeb stable/main/binary-ia64/libc6.1-pic_2.3.2.ds1-22sarge3_ia64.deb glibc (2.3.2.ds1-22sarge3) stable; urgency=low * Aurelien Jarno <aurel32@debian.org> - debian/patches/90_glibc232-timezones.dpatch: still provide SystemV links. stable/main/binary-hppa/libc6_2.3.2.ds1-22sarge3_hppa.deb stable/main/binary-hppa/libc6-prof_2.3.2.ds1-22sarge3_hppa.deb stable/main/binary-hppa/libc6-dbg_2.3.2.ds1-22sarge3_hppa.deb stable/main/binary-hppa/nscd_2.3.2.ds1-22sarge3_hppa.deb stable/main/binary-hppa/libnss-files-udeb_2.3.2.ds1-22sarge3_hppa.udeb stable/main/binary-hppa/libc6-pic_2.3.2.ds1-22sarge3_hppa.deb stable/main/binary-hppa/libc6-udeb_2.3.2.ds1-22sarge3_hppa.udeb stable/main/binary-hppa/libc6-dev_2.3.2.ds1-22sarge3_hppa.deb stable/main/binary-hppa/libnss-dns-udeb_2.3.2.ds1-22sarge3_hppa.udeb glibc (2.3.2.ds1-22sarge3) stable; urgency=low * Aurelien Jarno <aurel32@debian.org> - debian/patches/90_glibc232-timezones.dpatch: still provide SystemV links. stable/main/binary-arm/libc6-dev_2.3.2.ds1-22sarge3_arm.deb stable/main/binary-arm/libc6_2.3.2.ds1-22sarge3_arm.deb stable/main/binary-arm/libc6-udeb_2.3.2.ds1-22sarge3_arm.udeb stable/main/binary-arm/nscd_2.3.2.ds1-22sarge3_arm.deb stable/main/binary-arm/libc6-dbg_2.3.2.ds1-22sarge3_arm.deb stable/main/binary-arm/libc6-pic_2.3.2.ds1-22sarge3_arm.deb stable/main/binary-arm/libnss-dns-udeb_2.3.2.ds1-22sarge3_arm.udeb stable/main/binary-arm/libnss-files-udeb_2.3.2.ds1-22sarge3_arm.udeb stable/main/binary-arm/libc6-prof_2.3.2.ds1-22sarge3_arm.deb glibc (2.3.2.ds1-22sarge3) stable; urgency=low * Aurelien Jarno <aurel32@debian.org> - debian/patches/90_glibc232-timezones.dpatch: still provide SystemV links. stable/main/binary-alpha/libc6.1-dbg_2.3.2.ds1-22sarge3_alpha.deb stable/main/binary-alpha/libnss-dns-udeb_2.3.2.ds1-22sarge3_alpha.udeb stable/main/binary-alpha/libc6.1-udeb_2.3.2.ds1-22sarge3_alpha.udeb stable/main/binary-alpha/nscd_2.3.2.ds1-22sarge3_alpha.deb stable/main/binary-alpha/libc6.1-pic_2.3.2.ds1-22sarge3_alpha.deb stable/main/binary-alpha/libc6.1-prof_2.3.2.ds1-22sarge3_alpha.deb stable/main/binary-alpha/libc6.1-dev_2.3.2.ds1-22sarge3_alpha.deb stable/main/binary-alpha/libc6.1_2.3.2.ds1-22sarge3_alpha.deb stable/main/binary-alpha/libnss-files-udeb_2.3.2.ds1-22sarge3_alpha.udeb glibc (2.3.2.ds1-22sarge3) stable; urgency=low * Aurelien Jarno <aurel32@debian.org> - debian/patches/90_glibc232-timezones.dpatch: still provide SystemV links. stable/main/binary-i386/libnss-dns-udeb_2.3.2.ds1-22sarge3_i386.udeb stable/main/binary-i386/libnss-files-udeb_2.3.2.ds1-22sarge3_i386.udeb stable/main/binary-i386/libc6-prof_2.3.2.ds1-22sarge3_i386.deb stable/main/binary-all/glibc-doc_2.3.2.ds1-22sarge3_all.deb stable/main/binary-i386/nscd_2.3.2.ds1-22sarge3_i386.deb stable/main/binary-i386/libc6-dev_2.3.2.ds1-22sarge3_i386.deb stable/main/binary-i386/libc6-i686_2.3.2.ds1-22sarge3_i386.deb stable/main/binary-i386/libc6-pic_2.3.2.ds1-22sarge3_i386.deb stable/main/binary-i386/libc6-dbg_2.3.2.ds1-22sarge3_i386.deb stable/main/source/glibc_2.3.2.ds1-22sarge3.dsc stable/main/binary-all/locales_2.3.2.ds1-22sarge3_all.deb stable/main/binary-i386/libc6-udeb_2.3.2.ds1-22sarge3_i386.udeb stable/main/binary-i386/libc6_2.3.2.ds1-22sarge3_i386.deb stable/main/source/glibc_2.3.2.ds1-22sarge3.diff.gz glibc (2.3.2.ds1-22sarge3) stable; urgency=low * Aurelien Jarno <aurel32@debian.org> - debian/patches/90_glibc232-timezones.dpatch: still provide SystemV links. stable/main/binary-sparc/freeciv-server_2.0.1-1sarge1_sparc.deb stable/main/binary-sparc/freeciv-client-xaw3d_2.0.1-1sarge1_sparc.deb stable/main/binary-sparc/freeciv-client-gtk_2.0.1-1sarge1_sparc.deb freeciv (2.0.1-1sarge1) stable-security; urgency=high * [SECURITY: CVE-2006-0047] debian/patches/03_civserver_dos.dpatch: Patch from Jason Dorje to prevent a server crash on certain incoming packets. stable/main/binary-s390/freeciv-server_2.0.1-1sarge1_s390.deb stable/main/binary-s390/freeciv-client-gtk_2.0.1-1sarge1_s390.deb stable/main/binary-s390/freeciv-client-xaw3d_2.0.1-1sarge1_s390.deb freeciv (2.0.1-1sarge1) stable-security; urgency=high * [SECURITY: CVE-2006-0047] debian/patches/03_civserver_dos.dpatch: Patch from Jason Dorje to prevent a server crash on certain incoming packets. stable/main/binary-mipsel/freeciv-server_2.0.1-1sarge1_mipsel.deb stable/main/binary-mipsel/freeciv-client-xaw3d_2.0.1-1sarge1_mipsel.deb stable/main/binary-mipsel/freeciv-client-gtk_2.0.1-1sarge1_mipsel.deb freeciv (2.0.1-1sarge1) stable-security; urgency=high * [SECURITY: CVE-2006-0047] debian/patches/03_civserver_dos.dpatch: Patch from Jason Dorje to prevent a server crash on certain incoming packets. stable/main/binary-mips/freeciv-client-gtk_2.0.1-1sarge1_mips.deb stable/main/binary-mips/freeciv-server_2.0.1-1sarge1_mips.deb stable/main/binary-mips/freeciv-client-xaw3d_2.0.1-1sarge1_mips.deb freeciv (2.0.1-1sarge1) stable-security; urgency=high * [SECURITY: CVE-2006-0047] debian/patches/03_civserver_dos.dpatch: Patch from Jason Dorje to prevent a server crash on certain incoming packets. stable/main/binary-m68k/freeciv-client-gtk_2.0.1-1sarge1_m68k.deb stable/main/binary-m68k/freeciv-client-xaw3d_2.0.1-1sarge1_m68k.deb stable/main/binary-m68k/freeciv-server_2.0.1-1sarge1_m68k.deb freeciv (2.0.1-1sarge1) stable-security; urgency=high * [SECURITY: CVE-2006-0047] debian/patches/03_civserver_dos.dpatch: Patch from Jason Dorje to prevent a server crash on certain incoming packets. stable/main/binary-ia64/freeciv-client-xaw3d_2.0.1-1sarge1_ia64.deb stable/main/binary-ia64/freeciv-server_2.0.1-1sarge1_ia64.deb stable/main/binary-ia64/freeciv-client-gtk_2.0.1-1sarge1_ia64.deb freeciv (2.0.1-1sarge1) stable-security; urgency=high * [SECURITY: CVE-2006-0047] debian/patches/03_civserver_dos.dpatch: Patch from Jason Dorje to prevent a server crash on certain incoming packets. stable/main/binary-i386/freeciv-server_2.0.1-1sarge1_i386.deb stable/main/binary-i386/freeciv-client-xaw3d_2.0.1-1sarge1_i386.deb stable/main/binary-i386/freeciv-client-gtk_2.0.1-1sarge1_i386.deb freeciv (2.0.1-1sarge1) stable-security; urgency=high * [SECURITY: CVE-2006-0047] debian/patches/03_civserver_dos.dpatch: Patch from Jason Dorje to prevent a server crash on certain incoming packets. stable/main/binary-hppa/freeciv-client-xaw3d_2.0.1-1sarge1_hppa.deb stable/main/binary-hppa/freeciv-client-gtk_2.0.1-1sarge1_hppa.deb stable/main/binary-hppa/freeciv-server_2.0.1-1sarge1_hppa.deb freeciv (2.0.1-1sarge1) stable-security; urgency=high * [SECURITY: CVE-2006-0047] debian/patches/03_civserver_dos.dpatch: Patch from Jason Dorje to prevent a server crash on certain incoming packets. stable/main/binary-arm/freeciv-client-xaw3d_2.0.1-1sarge1_arm.deb stable/main/binary-arm/freeciv-client-gtk_2.0.1-1sarge1_arm.deb stable/main/binary-arm/freeciv-server_2.0.1-1sarge1_arm.deb freeciv (2.0.1-1sarge1) stable-security; urgency=high * [SECURITY: CVE-2006-0047] debian/patches/03_civserver_dos.dpatch: Patch from Jason Dorje to prevent a server crash on certain incoming packets. stable/main/binary-alpha/freeciv-client-xaw3d_2.0.1-1sarge1_alpha.deb stable/main/binary-alpha/freeciv-client-gtk_2.0.1-1sarge1_alpha.deb stable/main/binary-alpha/freeciv-server_2.0.1-1sarge1_alpha.deb freeciv (2.0.1-1sarge1) stable-security; urgency=high * [SECURITY: CVE-2006-0047] debian/patches/03_civserver_dos.dpatch: Patch from Jason Dorje to prevent a server crash on certain incoming packets. stable/main/binary-all/freeciv-xaw3d_2.0.1-1sarge1_all.deb stable/main/source/freeciv_2.0.1-1sarge1.dsc stable/main/binary-all/freeciv-data_2.0.1-1sarge1_all.deb stable/main/binary-powerpc/freeciv-client-xaw3d_2.0.1-1sarge1_powerpc.deb stable/main/source/freeciv_2.0.1-1sarge1.diff.gz stable/main/binary-all/freeciv_2.0.1-1sarge1_all.deb stable/main/binary-powerpc/freeciv-client-gtk_2.0.1-1sarge1_powerpc.deb stable/main/binary-powerpc/freeciv-server_2.0.1-1sarge1_powerpc.deb stable/main/binary-all/freeciv-gtk_2.0.1-1sarge1_all.deb freeciv (2.0.1-1sarge1) stable-security; urgency=high * [SECURITY: CVE-2006-0047] debian/patches/03_civserver_dos.dpatch: Patch from Jason Dorje to prevent a server crash on certain incoming packets. stable/main/source/flyspray_0.9.7-2.1.diff.gz stable/main/binary-all/flyspray_0.9.7-2.1_all.deb stable/main/source/flyspray_0.9.7-2.1.dsc flyspray (0.9.7-2.1) stable-security; urgency=high * NMU for security issue. * Fix multiple XSS vulnerabilities found by "Lostmon". The application does not validate multiple variables upon submission to the index.php script. Patch from upstream 0.9.8update1. (Closes: #335997, CVE-2005-3334) stable/main/binary-sparc/flex_2.5.31-31sarge1_sparc.deb flex (2.5.31-31sarge1) stable-security; urgency=high * Non-maintainer upload by the Security Team: * Prevent buffer overflows in parsers generated with REJECT rules and/or trailing contexts. (CVE-2006-0459) stable/main/binary-s390/flex_2.5.31-31sarge1_s390.deb flex (2.5.31-31sarge1) stable-security; urgency=high * Non-maintainer upload by the Security Team: * Prevent buffer overflows in parsers generated with REJECT rules and/or trailing contexts. (CVE-2006-0459) stable/main/binary-powerpc/flex_2.5.31-31sarge1_powerpc.deb flex (2.5.31-31sarge1) stable-security; urgency=high * Non-maintainer upload by the Security Team: * Prevent buffer overflows in parsers generated with REJECT rules and/or trailing contexts. (CVE-2006-0459) stable/main/binary-mipsel/flex_2.5.31-31sarge1_mipsel.deb flex (2.5.31-31sarge1) stable-security; urgency=high * Non-maintainer upload by the Security Team: * Prevent buffer overflows in parsers generated with REJECT rules and/or trailing contexts. (CVE-2006-0459) stable/main/binary-mips/flex_2.5.31-31sarge1_mips.deb flex (2.5.31-31sarge1) stable-security; urgency=high * Non-maintainer upload by the Security Team: * Prevent buffer overflows in parsers generated with REJECT rules and/or trailing contexts. (CVE-2006-0459) stable/main/binary-m68k/flex_2.5.31-31sarge1_m68k.deb flex (2.5.31-31sarge1) stable-security; urgency=high * Non-maintainer upload by the Security Team: * Prevent buffer overflows in parsers generated with REJECT rules and/or trailing contexts. (CVE-2006-0459) stable/main/binary-ia64/flex_2.5.31-31sarge1_ia64.deb flex (2.5.31-31sarge1) stable-security; urgency=high * Non-maintainer upload by the Security Team: * Prevent buffer overflows in parsers generated with REJECT rules and/or trailing contexts. (CVE-2006-0459) stable/main/binary-hppa/flex_2.5.31-31sarge1_hppa.deb flex (2.5.31-31sarge1) stable-security; urgency=high * Non-maintainer upload by the Security Team: * Prevent buffer overflows in parsers generated with REJECT rules and/or trailing contexts. (CVE-2006-0459) stable/main/binary-arm/flex_2.5.31-31sarge1_arm.deb flex (2.5.31-31sarge1) stable-security; urgency=high * Non-maintainer upload by the Security Team: * Prevent buffer overflows in parsers generated with REJECT rules and/or trailing contexts. (CVE-2006-0459) stable/main/binary-alpha/flex_2.5.31-31sarge1_alpha.deb flex (2.5.31-31sarge1) stable-security; urgency=high * Non-maintainer upload by the Security Team: * Prevent buffer overflows in parsers generated with REJECT rules and/or trailing contexts. (CVE-2006-0459) stable/main/binary-all/flex-doc_2.5.31-31sarge1_all.deb stable/main/binary-i386/flex_2.5.31-31sarge1_i386.deb stable/main/source/flex_2.5.31-31sarge1.dsc stable/main/source/flex_2.5.31-31sarge1.diff.gz flex (2.5.31-31sarge1) stable-security; urgency=high * Non-maintainer upload by the Security Team: * Prevent buffer overflows in parsers generated with REJECT rules and/or trailing contexts. (CVE-2006-0459) stable/main/source/firebird2_1.5.1-4sarge1.dsc stable/main/binary-i386/libfirebird2-super_1.5.1-4sarge1_i386.deb stable/main/binary-i386/firebird2-super-server_1.5.1-4sarge1_i386.deb stable/main/binary-i386/libfirebird2-classic_1.5.1-4sarge1_i386.deb stable/main/binary-i386/firebird2-utils-super_1.5.1-4sarge1_i386.deb stable/main/binary-i386/firebird2-utils-classic_1.5.1-4sarge1_i386.deb stable/main/binary-i386/firebird2-server-common_1.5.1-4sarge1_i386.deb stable/main/binary-i386/firebird2-dev_1.5.1-4sarge1_i386.deb stable/main/source/firebird2_1.5.1-4sarge1.diff.gz stable/main/binary-i386/firebird2-examples_1.5.1-4sarge1_i386.deb stable/main/binary-i386/firebird2-classic-server_1.5.1-4sarge1_i386.deb firebird2 (1.5.1-4sarge1) stable-security; urgency=high * Non-maintainer upload by the Security Team * Applied patch by Damyan Ivanov to fix off-by-one buffer overflow [src/jrd/unix.cpp, CVE-2004-2043, Bug#357580] stable/main/binary-sparc/libpostproc-dev_0.cvs20050313-2sarge1_sparc.deb stable/main/binary-sparc/ffmpeg_0.cvs20050313-2sarge1_sparc.deb stable/main/binary-sparc/libavcodec-dev_0.cvs20050313-2sarge1_sparc.deb stable/main/binary-sparc/libavformat-dev_0.cvs20050313-2sarge1_sparc.deb ffmpeg (0.cvs20050313-2sarge1) stable-security; urgency=high * Fix heap overflow in avcodec_default_get_buffer() (CVE-2005-4048) stable/main/binary-s390/ffmpeg_0.cvs20050313-2sarge1_s390.deb stable/main/binary-s390/libpostproc-dev_0.cvs20050313-2sarge1_s390.deb stable/main/binary-s390/libavcodec-dev_0.cvs20050313-2sarge1_s390.deb stable/main/binary-s390/libavformat-dev_0.cvs20050313-2sarge1_s390.deb ffmpeg (0.cvs20050313-2sarge1) stable-security; urgency=high * Fix heap overflow in avcodec_default_get_buffer() (CVE-2005-4048) stable/main/binary-powerpc/libavcodec-dev_0.cvs20050313-2sarge1_powerpc.deb stable/main/binary-powerpc/libavformat-dev_0.cvs20050313-2sarge1_powerpc.deb stable/main/binary-powerpc/libpostproc-dev_0.cvs20050313-2sarge1_powerpc.deb stable/main/binary-powerpc/ffmpeg_0.cvs20050313-2sarge1_powerpc.deb ffmpeg (0.cvs20050313-2sarge1) stable-security; urgency=high * Fix heap overflow in avcodec_default_get_buffer() (CVE-2005-4048) stable/main/binary-mipsel/libpostproc-dev_0.cvs20050313-2sarge1_mipsel.deb stable/main/binary-mipsel/libavcodec-dev_0.cvs20050313-2sarge1_mipsel.deb stable/main/binary-mipsel/ffmpeg_0.cvs20050313-2sarge1_mipsel.deb stable/main/binary-mipsel/libavformat-dev_0.cvs20050313-2sarge1_mipsel.deb ffmpeg (0.cvs20050313-2sarge1) stable-security; urgency=high * Fix heap overflow in avcodec_default_get_buffer() (CVE-2005-4048) stable/main/binary-mips/libavcodec-dev_0.cvs20050313-2sarge1_mips.deb stable/main/binary-mips/libavformat-dev_0.cvs20050313-2sarge1_mips.deb stable/main/binary-mips/ffmpeg_0.cvs20050313-2sarge1_mips.deb stable/main/binary-mips/libpostproc-dev_0.cvs20050313-2sarge1_mips.deb ffmpeg (0.cvs20050313-2sarge1) stable-security; urgency=high * Fix heap overflow in avcodec_default_get_buffer() (CVE-2005-4048) stable/main/binary-m68k/libavformat-dev_0.cvs20050313-2sarge1_m68k.deb stable/main/binary-m68k/libavcodec-dev_0.cvs20050313-2sarge1_m68k.deb stable/main/binary-m68k/libpostproc-dev_0.cvs20050313-2sarge1_m68k.deb stable/main/binary-m68k/ffmpeg_0.cvs20050313-2sarge1_m68k.deb ffmpeg (0.cvs20050313-2sarge1) stable-security; urgency=high * Fix heap overflow in avcodec_default_get_buffer() (CVE-2005-4048) stable/main/binary-ia64/libavcodec-dev_0.cvs20050313-2sarge1_ia64.deb stable/main/binary-ia64/ffmpeg_0.cvs20050313-2sarge1_ia64.deb stable/main/binary-ia64/libpostproc-dev_0.cvs20050313-2sarge1_ia64.deb stable/main/binary-ia64/libavformat-dev_0.cvs20050313-2sarge1_ia64.deb ffmpeg (0.cvs20050313-2sarge1) stable-security; urgency=high * Fix heap overflow in avcodec_default_get_buffer() (CVE-2005-4048) stable/main/binary-hppa/ffmpeg_0.cvs20050313-2sarge1_hppa.deb stable/main/binary-hppa/libavcodec-dev_0.cvs20050313-2sarge1_hppa.deb stable/main/binary-hppa/libavformat-dev_0.cvs20050313-2sarge1_hppa.deb stable/main/binary-hppa/libpostproc-dev_0.cvs20050313-2sarge1_hppa.deb ffmpeg (0.cvs20050313-2sarge1) stable-security; urgency=high * Fix heap overflow in avcodec_default_get_buffer() (CVE-2005-4048) stable/main/binary-arm/ffmpeg_0.cvs20050313-2sarge1_arm.deb stable/main/binary-arm/libpostproc-dev_0.cvs20050313-2sarge1_arm.deb stable/main/binary-arm/libavformat-dev_0.cvs20050313-2sarge1_arm.deb stable/main/binary-arm/libavcodec-dev_0.cvs20050313-2sarge1_arm.deb ffmpeg (0.cvs20050313-2sarge1) stable-security; urgency=high * Fix heap overflow in avcodec_default_get_buffer() (CVE-2005-4048) stable/main/binary-alpha/ffmpeg_0.cvs20050313-2sarge1_alpha.deb stable/main/binary-alpha/libpostproc-dev_0.cvs20050313-2sarge1_alpha.deb stable/main/binary-alpha/libavformat-dev_0.cvs20050313-2sarge1_alpha.deb stable/main/binary-alpha/libavcodec-dev_0.cvs20050313-2sarge1_alpha.deb ffmpeg (0.cvs20050313-2sarge1) stable-security; urgency=high * Fix heap overflow in avcodec_default_get_buffer() (CVE-2005-4048) stable/main/source/ffmpeg_0.cvs20050313-2sarge1.diff.gz stable/main/binary-i386/libavformat-dev_0.cvs20050313-2sarge1_i386.deb stable/main/binary-i386/libpostproc-dev_0.cvs20050313-2sarge1_i386.deb stable/main/source/ffmpeg_0.cvs20050313-2sarge1.dsc stable/main/binary-i386/ffmpeg_0.cvs20050313-2sarge1_i386.deb stable/main/binary-i386/libavcodec-dev_0.cvs20050313-2sarge1_i386.deb ffmpeg (0.cvs20050313-2sarge1) stable-security; urgency=high * Fix heap overflow in avcodec_default_get_buffer() (CVE-2005-4048) stable/main/binary-sparc/fetchmail_6.2.5-12sarge4_sparc.deb fetchmail (6.2.5-12sarge4) stable-security; urgency=high * Non-maintainer upload by the Security Team * Backported upstream patch by Matthias Andree to fix denial of service in multidrop mode [transact.c, CVE-2005-4348] stable/main/binary-s390/fetchmail_6.2.5-12sarge4_s390.deb fetchmail (6.2.5-12sarge4) stable-security; urgency=high * Non-maintainer upload by the Security Team * Backported upstream patch by Matthias Andree to fix denial of service in multidrop mode [transact.c, CVE-2005-4348] stable/main/binary-mipsel/fetchmail_6.2.5-12sarge4_mipsel.deb fetchmail (6.2.5-12sarge4) stable-security; urgency=high * Non-maintainer upload by the Security Team * Backported upstream patch by Matthias Andree to fix denial of service in multidrop mode [transact.c, CVE-2005-4348] stable/main/binary-mips/fetchmail_6.2.5-12sarge4_mips.deb fetchmail (6.2.5-12sarge4) stable-security; urgency=high * Non-maintainer upload by the Security Team * Backported upstream patch by Matthias Andree to fix denial of service in multidrop mode [transact.c, CVE-2005-4348] stable/main/binary-m68k/fetchmail_6.2.5-12sarge4_m68k.deb fetchmail (6.2.5-12sarge4) stable-security; urgency=high * Non-maintainer upload by the Security Team * Backported upstream patch by Matthias Andree to fix denial of service in multidrop mode [transact.c, CVE-2005-4348] stable/main/binary-ia64/fetchmail_6.2.5-12sarge4_ia64.deb fetchmail (6.2.5-12sarge4) stable-security; urgency=high * Non-maintainer upload by the Security Team * Backported upstream patch by Matthias Andree to fix denial of service in multidrop mode [transact.c, CVE-2005-4348] stable/main/binary-i386/fetchmail_6.2.5-12sarge4_i386.deb fetchmail (6.2.5-12sarge4) stable-security; urgency=high * Non-maintainer upload by the Security Team * Backported upstream patch by Matthias Andree to fix denial of service in multidrop mode [transact.c, CVE-2005-4348] stable/main/binary-hppa/fetchmail_6.2.5-12sarge4_hppa.deb fetchmail (6.2.5-12sarge4) stable-security; urgency=high * Non-maintainer upload by the Security Team * Backported upstream patch by Matthias Andree to fix denial of service in multidrop mode [transact.c, CVE-2005-4348] stable/main/binary-arm/fetchmail_6.2.5-12sarge4_arm.deb fetchmail (6.2.5-12sarge4) stable-security; urgency=high * Non-maintainer upload by the Security Team * Backported upstream patch by Matthias Andree to fix denial of service in multidrop mode [transact.c, CVE-2005-4348] stable/main/binary-alpha/fetchmail_6.2.5-12sarge4_alpha.deb fetchmail (6.2.5-12sarge4) stable-security; urgency=high * Non-maintainer upload by the Security Team * Backported upstream patch by Matthias Andree to fix denial of service in multidrop mode [transact.c, CVE-2005-4348] stable/main/binary-all/fetchmail-ssl_6.2.5-12sarge4_all.deb stable/main/binary-powerpc/fetchmail_6.2.5-12sarge4_powerpc.deb stable/main/binary-all/fetchmailconf_6.2.5-12sarge4_all.deb stable/main/source/fetchmail_6.2.5-12sarge4.dsc stable/main/source/fetchmail_6.2.5-12sarge4.diff.gz fetchmail (6.2.5-12sarge4) stable-security; urgency=high * Non-maintainer upload by the Security Team * Backported upstream patch by Matthias Andree to fix denial of service in multidrop mode [transact.c, CVE-2005-4348] stable/main/source/fai_2.8.4sarge1.tar.gz stable/main/source/fai_2.8.4sarge1.dsc stable/main/binary-all/fai_2.8.4sarge1_all.deb fai (2.8.4sarge1) stable; urgency=medium * closes three important bugs * /debian/rules: ignore .svn directories * fai-cd: fixed hardcoded sources.list for the install client to be generated, code by Michael Tautschnig (closes: #320024) and at least partially #329547 * install_packages: ignore packages ending with - when using -d (closes: 334333) * lib/create_ramdisk: make /etc/network/run/ifstate writable (closes: #312128) stable/contrib/source/f-prot-installer_0.5.14.sarge.3.dsc stable/contrib/binary-i386/f-prot-installer_0.5.14.sarge.3_i386.deb stable/contrib/source/f-prot-installer_0.5.14.sarge.3.tar.gz f-prot-installer (0.5.14.sarge.3) stable; urgency=medium * Installer script again broken by vendor-side changes. Hopefully we have a more durable fix now through using a config file /etc/f-prot.conf containing the location of the virus definition files. The file is read by the check-updates script which consequently no longer needs to be patchend. (closes: #347198) stable/main/binary-sparc/evolution-dev_2.0.4-2sarge1_sparc.deb stable/main/binary-sparc/evolution_2.0.4-2sarge1_sparc.deb evolution (2.0.4-2sarge1) stable-security; urgency=high * Non-maintainer upload by the Security Team * Applied patch by Ulf Härnhammar fix denial of service and arbitrary code execution [addressbook/gui/widgets/eab-contact-display.c, calendar/gui/e-cal-component-preview.c, calendar/gui/e-calendar-table.c, calendar/gui/e-calendar-view.c, CVE-2005-2549, CVE-2005-2550, debian/patches/x_CVE-2005-2549.patch] stable/main/binary-s390/evolution-dev_2.0.4-2sarge1_s390.deb stable/main/binary-s390/evolution_2.0.4-2sarge1_s390.deb evolution (2.0.4-2sarge1) stable-security; urgency=high * Non-maintainer upload by the Security Team * Applied patch by Ulf Härnhammar fix denial of service and arbitrary code execution [addressbook/gui/widgets/eab-contact-display.c, calendar/gui/e-cal-component-preview.c, calendar/gui/e-calendar-table.c, calendar/gui/e-calendar-view.c, CVE-2005-2549, CVE-2005-2550, debian/patches/x_CVE-2005-2549.patch] stable/main/binary-powerpc/evolution-dev_2.0.4-2sarge1_powerpc.deb stable/main/binary-powerpc/evolution_2.0.4-2sarge1_powerpc.deb evolution (2.0.4-2sarge1) stable-security; urgency=high * Non-maintainer upload by the Security Team * Applied patch by Ulf Härnhammar fix denial of service and arbitrary code execution [addressbook/gui/widgets/eab-contact-display.c, calendar/gui/e-cal-component-preview.c, calendar/gui/e-calendar-table.c, calendar/gui/e-calendar-view.c, CVE-2005-2549, CVE-2005-2550, debian/patches/x_CVE-2005-2549.patch] stable/main/binary-mipsel/evolution_2.0.4-2sarge1_mipsel.deb stable/main/binary-mipsel/evolution-dev_2.0.4-2sarge1_mipsel.deb evolution (2.0.4-2sarge1) stable-security; urgency=high * Non-maintainer upload by the Security Team * Applied patch by Ulf Härnhammar fix denial of service and arbitrary code execution [addressbook/gui/widgets/eab-contact-display.c, calendar/gui/e-cal-component-preview.c, calendar/gui/e-calendar-table.c, calendar/gui/e-calendar-view.c, CVE-2005-2549, CVE-2005-2550, debian/patches/x_CVE-2005-2549.patch] stable/main/binary-mips/evolution-dev_2.0.4-2sarge1_mips.deb stable/main/binary-mips/evolution_2.0.4-2sarge1_mips.deb evolution (2.0.4-2sarge1) stable-security; urgency=high * Non-maintainer upload by the Security Team * Applied patch by Ulf Härnhammar fix denial of service and arbitrary code execution [addressbook/gui/widgets/eab-contact-display.c, calendar/gui/e-cal-component-preview.c, calendar/gui/e-calendar-table.c, calendar/gui/e-calendar-view.c, CVE-2005-2549, CVE-2005-2550, debian/patches/x_CVE-2005-2549.patch] stable/main/binary-m68k/evolution_2.0.4-2sarge1_m68k.deb stable/main/binary-m68k/evolution-dev_2.0.4-2sarge1_m68k.deb evolution (2.0.4-2sarge1) stable-security; urgency=high * Non-maintainer upload by the Security Team * Applied patch by Ulf Härnhammar fix denial of service and arbitrary code execution [addressbook/gui/widgets/eab-contact-display.c, calendar/gui/e-cal-component-preview.c, calendar/gui/e-calendar-table.c, calendar/gui/e-calendar-view.c, CVE-2005-2549, CVE-2005-2550, debian/patches/x_CVE-2005-2549.patch] stable/main/binary-ia64/evolution-dev_2.0.4-2sarge1_ia64.deb stable/main/binary-ia64/evolution_2.0.4-2sarge1_ia64.deb evolution (2.0.4-2sarge1) stable-security; urgency=high * Non-maintainer upload by the Security Team * Applied patch by Ulf Härnhammar fix denial of service and arbitrary code execution [addressbook/gui/widgets/eab-contact-display.c, calendar/gui/e-cal-component-preview.c, calendar/gui/e-calendar-table.c, calendar/gui/e-calendar-view.c, CVE-2005-2549, CVE-2005-2550, debian/patches/x_CVE-2005-2549.patch] stable/main/binary-hppa/evolution-dev_2.0.4-2sarge1_hppa.deb stable/main/binary-hppa/evolution_2.0.4-2sarge1_hppa.deb evolution (2.0.4-2sarge1) stable-security; urgency=high * Non-maintainer upload by the Security Team * Applied patch by Ulf Härnhammar fix denial of service and arbitrary code execution [addressbook/gui/widgets/eab-contact-display.c, calendar/gui/e-cal-component-preview.c, calendar/gui/e-calendar-table.c, calendar/gui/e-calendar-view.c, CVE-2005-2549, CVE-2005-2550, debian/patches/x_CVE-2005-2549.patch] stable/main/binary-arm/evolution_2.0.4-2sarge1_arm.deb stable/main/binary-arm/evolution-dev_2.0.4-2sarge1_arm.deb evolution (2.0.4-2sarge1) stable-security; urgency=high * Non-maintainer upload by the Security Team * Applied patch by Ulf Härnhammar fix denial of service and arbitrary code execution [addressbook/gui/widgets/eab-contact-display.c, calendar/gui/e-cal-component-preview.c, calendar/gui/e-calendar-table.c, calendar/gui/e-calendar-view.c, CVE-2005-2549, CVE-2005-2550, debian/patches/x_CVE-2005-2549.patch] stable/main/binary-alpha/evolution-dev_2.0.4-2sarge1_alpha.deb stable/main/binary-alpha/evolution_2.0.4-2sarge1_alpha.deb evolution (2.0.4-2sarge1) stable-security; urgency=high * Non-maintainer upload by the Security Team * Applied patch by Ulf Härnhammar fix denial of service and arbitrary code execution [addressbook/gui/widgets/eab-contact-display.c, calendar/gui/e-cal-component-preview.c, calendar/gui/e-calendar-table.c, calendar/gui/e-calendar-view.c, CVE-2005-2549, CVE-2005-2550, debian/patches/x_CVE-2005-2549.patch] stable/main/binary-i386/evolution_2.0.4-2sarge1_i386.deb stable/main/source/evolution_2.0.4-2sarge1.diff.gz stable/main/binary-i386/evolution-dev_2.0.4-2sarge1_i386.deb stable/main/source/evolution_2.0.4-2sarge1.dsc evolution (2.0.4-2sarge1) stable-security; urgency=high * Non-maintainer upload by the Security Team * Applied patch by Ulf Härnhammar fix denial of service and arbitrary code execution [addressbook/gui/widgets/eab-contact-display.c, calendar/gui/e-cal-component-preview.c, calendar/gui/e-calendar-table.c, calendar/gui/e-calendar-view.c, CVE-2005-2549, CVE-2005-2550, debian/patches/x_CVE-2005-2549.patch] stable/main/binary-sparc/libevms-2.5_2.5.2-1.sarge1_sparc.deb stable/main/binary-sparc/evms-udeb_2.5.2-1.sarge1_sparc.udeb stable/main/binary-sparc/evms_2.5.2-1.sarge1_sparc.deb stable/main/binary-sparc/evms-gui_2.5.2-1.sarge1_sparc.deb stable/main/binary-sparc/libevms-dev_2.5.2-1.sarge1_sparc.deb stable/main/binary-sparc/evms-cli_2.5.2-1.sarge1_sparc.deb stable/main/binary-sparc/evms-ha_2.5.2-1.sarge1_sparc.deb stable/main/binary-sparc/evms-ncurses_2.5.2-1.sarge1_sparc.deb evms (2.5.2-1.sarge1) stable; urgency=low * Upload to stable to fix critical RAID-5 corruption issues. * Backport fixes from EVMS 2.5.3 to address stack corruption and memory overruns in the MD plugin, causing problems activating degraded RAID-5 volumes and sometimes serious data loss. (Closes: #339891) stable/main/binary-s390/evms-udeb_2.5.2-1.sarge1_s390.udeb stable/main/binary-s390/evms-cli_2.5.2-1.sarge1_s390.deb stable/main/binary-s390/evms-ncurses_2.5.2-1.sarge1_s390.deb stable/main/binary-s390/libevms-dev_2.5.2-1.sarge1_s390.deb stable/main/binary-s390/libevms-2.5_2.5.2-1.sarge1_s390.deb stable/main/binary-s390/evms_2.5.2-1.sarge1_s390.deb stable/main/binary-s390/evms-gui_2.5.2-1.sarge1_s390.deb stable/main/binary-s390/evms-ha_2.5.2-1.sarge1_s390.deb evms (2.5.2-1.sarge1) stable; urgency=low * Upload to stable to fix critical RAID-5 corruption issues. * Backport fixes from EVMS 2.5.3 to address stack corruption and memory overruns in the MD plugin, causing problems activating degraded RAID-5 volumes and sometimes serious data loss. (Closes: #339891) stable/main/binary-powerpc/libevms-dev_2.5.2-1.sarge1_powerpc.deb stable/main/binary-powerpc/evms_2.5.2-1.sarge1_powerpc.deb stable/main/binary-powerpc/evms-ha_2.5.2-1.sarge1_powerpc.deb stable/main/binary-powerpc/evms-udeb_2.5.2-1.sarge1_powerpc.udeb stable/main/binary-powerpc/evms-cli_2.5.2-1.sarge1_powerpc.deb stable/main/binary-powerpc/evms-gui_2.5.2-1.sarge1_powerpc.deb stable/main/binary-powerpc/libevms-2.5_2.5.2-1.sarge1_powerpc.deb stable/main/binary-powerpc/evms-ncurses_2.5.2-1.sarge1_powerpc.deb evms (2.5.2-1.sarge1) stable; urgency=low * Upload to stable to fix critical RAID-5 corruption issues. * Backport fixes from EVMS 2.5.3 to address stack corruption and memory overruns in the MD plugin, causing problems activating degraded RAID-5 volumes and sometimes serious data loss. (Closes: #339891) stable/main/binary-mipsel/libevms-2.5_2.5.2-1.sarge1_mipsel.deb stable/main/binary-mipsel/evms-ha_2.5.2-1.sarge1_mipsel.deb stable/main/binary-mipsel/libevms-dev_2.5.2-1.sarge1_mipsel.deb stable/main/binary-mipsel/evms-ncurses_2.5.2-1.sarge1_mipsel.deb stable/main/binary-mipsel/evms-udeb_2.5.2-1.sarge1_mipsel.udeb stable/main/binary-mipsel/evms_2.5.2-1.sarge1_mipsel.deb stable/main/binary-mipsel/evms-cli_2.5.2-1.sarge1_mipsel.deb stable/main/binary-mipsel/evms-gui_2.5.2-1.sarge1_mipsel.deb evms (2.5.2-1.sarge1) stable; urgency=low * Upload to stable to fix critical RAID-5 corruption issues. * Backport fixes from EVMS 2.5.3 to address stack corruption and memory overruns in the MD plugin, causing problems activating degraded RAID-5 volumes and sometimes serious data loss. (Closes: #339891) stable/main/binary-mips/evms-ncurses_2.5.2-1.sarge1_mips.deb stable/main/binary-mips/evms-udeb_2.5.2-1.sarge1_mips.udeb stable/main/binary-mips/evms-cli_2.5.2-1.sarge1_mips.deb stable/main/binary-mips/evms-gui_2.5.2-1.sarge1_mips.deb stable/main/binary-mips/libevms-2.5_2.5.2-1.sarge1_mips.deb stable/main/binary-mips/evms_2.5.2-1.sarge1_mips.deb stable/main/binary-mips/evms-ha_2.5.2-1.sarge1_mips.deb stable/main/binary-mips/libevms-dev_2.5.2-1.sarge1_mips.deb evms (2.5.2-1.sarge1) stable; urgency=low * Upload to stable to fix critical RAID-5 corruption issues. * Backport fixes from EVMS 2.5.3 to address stack corruption and memory overruns in the MD plugin, causing problems activating degraded RAID-5 volumes and sometimes serious data loss. (Closes: #339891) stable/main/binary-m68k/evms-cli_2.5.2-1.sarge1_m68k.deb stable/main/binary-m68k/libevms-dev_2.5.2-1.sarge1_m68k.deb stable/main/binary-m68k/evms-ha_2.5.2-1.sarge1_m68k.deb stable/main/binary-m68k/evms-ncurses_2.5.2-1.sarge1_m68k.deb stable/main/binary-m68k/evms-gui_2.5.2-1.sarge1_m68k.deb stable/main/binary-m68k/libevms-2.5_2.5.2-1.sarge1_m68k.deb stable/main/binary-m68k/evms_2.5.2-1.sarge1_m68k.deb stable/main/binary-m68k/evms-udeb_2.5.2-1.sarge1_m68k.udeb evms (2.5.2-1.sarge1) stable; urgency=low * Upload to stable to fix critical RAID-5 corruption issues. * Backport fixes from EVMS 2.5.3 to address stack corruption and memory overruns in the MD plugin, causing problems activating degraded RAID-5 volumes and sometimes serious data loss. (Closes: #339891) stable/main/binary-ia64/evms-cli_2.5.2-1.sarge1_ia64.deb stable/main/binary-ia64/evms-ha_2.5.2-1.sarge1_ia64.deb stable/main/binary-ia64/evms-ncurses_2.5.2-1.sarge1_ia64.deb stable/main/binary-ia64/evms-gui_2.5.2-1.sarge1_ia64.deb stable/main/binary-ia64/evms-udeb_2.5.2-1.sarge1_ia64.udeb stable/main/binary-ia64/libevms-2.5_2.5.2-1.sarge1_ia64.deb stable/main/binary-ia64/evms_2.5.2-1.sarge1_ia64.deb stable/main/binary-ia64/libevms-dev_2.5.2-1.sarge1_ia64.deb evms (2.5.2-1.sarge1) stable; urgency=low * Upload to stable to fix critical RAID-5 corruption issues. * Backport fixes from EVMS 2.5.3 to address stack corruption and memory overruns in the MD plugin, causing problems activating degraded RAID-5 volumes and sometimes serious data loss. (Closes: #339891) stable/main/binary-hppa/evms-ha_2.5.2-1.sarge1_hppa.deb stable/main/binary-hppa/evms_2.5.2-1.sarge1_hppa.deb stable/main/binary-hppa/evms-ncurses_2.5.2-1.sarge1_hppa.deb stable/main/binary-hppa/evms-udeb_2.5.2-1.sarge1_hppa.udeb stable/main/binary-hppa/evms-gui_2.5.2-1.sarge1_hppa.deb stable/main/binary-hppa/libevms-2.5_2.5.2-1.sarge1_hppa.deb stable/main/binary-hppa/evms-cli_2.5.2-1.sarge1_hppa.deb stable/main/binary-hppa/libevms-dev_2.5.2-1.sarge1_hppa.deb evms (2.5.2-1.sarge1) stable; urgency=low * Upload to stable to fix critical RAID-5 corruption issues. * Backport fixes from EVMS 2.5.3 to address stack corruption and memory overruns in the MD plugin, causing problems activating degraded RAID-5 volumes and sometimes serious data loss. (Closes: #339891) stable/main/binary-arm/evms-ncurses_2.5.2-1.sarge1_arm.deb stable/main/binary-arm/evms-gui_2.5.2-1.sarge1_arm.deb stable/main/binary-arm/libevms-dev_2.5.2-1.sarge1_arm.deb stable/main/binary-arm/evms-ha_2.5.2-1.sarge1_arm.deb stable/main/binary-arm/evms_2.5.2-1.sarge1_arm.deb stable/main/binary-arm/evms-cli_2.5.2-1.sarge1_arm.deb stable/main/binary-arm/evms-udeb_2.5.2-1.sarge1_arm.udeb stable/main/binary-arm/libevms-2.5_2.5.2-1.sarge1_arm.deb evms (2.5.2-1.sarge1) stable; urgency=low * Upload to stable to fix critical RAID-5 corruption issues. * Backport fixes from EVMS 2.5.3 to address stack corruption and memory overruns in the MD plugin, causing problems activating degraded RAID-5 volumes and sometimes serious data loss. (Closes: #339891) stable/main/binary-alpha/evms-ha_2.5.2-1.sarge1_alpha.deb stable/main/binary-alpha/evms-ncurses_2.5.2-1.sarge1_alpha.deb stable/main/binary-alpha/libevms-dev_2.5.2-1.sarge1_alpha.deb stable/main/binary-alpha/evms_2.5.2-1.sarge1_alpha.deb stable/main/binary-alpha/evms-udeb_2.5.2-1.sarge1_alpha.udeb stable/main/binary-alpha/evms-cli_2.5.2-1.sarge1_alpha.deb stable/main/binary-alpha/evms-gui_2.5.2-1.sarge1_alpha.deb stable/main/binary-alpha/libevms-2.5_2.5.2-1.sarge1_alpha.deb evms (2.5.2-1.sarge1) stable; urgency=low * Upload to stable to fix critical RAID-5 corruption issues. * Backport fixes from EVMS 2.5.3 to address stack corruption and memory overruns in the MD plugin, causing problems activating degraded RAID-5 volumes and sometimes serious data loss. (Closes: #339891) stable/main/binary-all/kernel-patch-evms_2.5.2-1.sarge1_all.deb stable/main/binary-i386/libevms-2.5_2.5.2-1.sarge1_i386.deb stable/main/binary-i386/evms_2.5.2-1.sarge1_i386.deb stable/main/source/evms_2.5.2-1.sarge1.dsc stable/main/binary-i386/evms-gui_2.5.2-1.sarge1_i386.deb stable/main/binary-i386/evms-cli_2.5.2-1.sarge1_i386.deb stable/main/binary-i386/libevms-dev_2.5.2-1.sarge1_i386.deb stable/main/binary-i386/evms-ncurses_2.5.2-1.sarge1_i386.deb stable/main/source/evms_2.5.2-1.sarge1.diff.gz stable/main/binary-i386/evms-ha_2.5.2-1.sarge1_i386.deb stable/main/binary-i386/evms-udeb_2.5.2-1.sarge1_i386.udeb evms (2.5.2-1.sarge1) stable; urgency=low * Upload to stable to fix critical RAID-5 corruption issues. * Backport fixes from EVMS 2.5.3 to address stack corruption and memory overruns in the MD plugin, causing problems activating degraded RAID-5 volumes and sometimes serious data loss. (Closes: #339891) stable/main/binary-sparc/elog_2.5.7+r1558-4+sarge2_sparc.deb elog (2.5.7+r1558-4+sarge2) stable-security; urgency=critical * Bump version number to prevent potential version clash with misdirected previous security upload stable/main/binary-s390/elog_2.5.7+r1558-4+sarge2_s390.deb elog (2.5.7+r1558-4+sarge2) stable-security; urgency=critical * Bump version number to prevent potential version clash with misdirected previous security upload stable/main/binary-powerpc/elog_2.5.7+r1558-4+sarge2_powerpc.deb elog (2.5.7+r1558-4+sarge2) stable-security; urgency=critical * Bump version number to prevent potential version clash with misdirected previous security upload stable/main/binary-mipsel/elog_2.5.7+r1558-4+sarge2_mipsel.deb elog (2.5.7+r1558-4+sarge2) stable-security; urgency=critical * Bump version number to prevent potential version clash with misdirected previous security upload stable/main/binary-mips/elog_2.5.7+r1558-4+sarge2_mips.deb elog (2.5.7+r1558-4+sarge2) stable-security; urgency=critical * Bump version number to prevent potential version clash with misdirected previous security upload stable/main/binary-m68k/elog_2.5.7+r1558-4+sarge2_m68k.deb elog (2.5.7+r1558-4+sarge2) stable-security; urgency=critical * Bump version number to prevent potential version clash with misdirected previous security upload stable/main/binary-ia64/elog_2.5.7+r1558-4+sarge2_ia64.deb elog (2.5.7+r1558-4+sarge2) stable-security; urgency=critical * Bump version number to prevent potential version clash with misdirected previous security upload stable/main/binary-hppa/elog_2.5.7+r1558-4+sarge2_hppa.deb elog (2.5.7+r1558-4+sarge2) stable-security; urgency=critical * Bump version number to prevent potential version clash with misdirected previous security upload stable/main/binary-arm/elog_2.5.7+r1558-4+sarge2_arm.deb elog (2.5.7+r1558-4+sarge2) stable-security; urgency=critical * Bump version number to prevent potential version clash with misdirected previous security upload stable/main/binary-alpha/elog_2.5.7+r1558-4+sarge2_alpha.deb elog (2.5.7+r1558-4+sarge2) stable-security; urgency=critical * Bump version number to prevent potential version clash with misdirected previous security upload stable/main/binary-i386/elog_2.5.7+r1558-4+sarge2_i386.deb stable/main/source/elog_2.5.7+r1558-4+sarge2.dsc stable/main/source/elog_2.5.7+r1558-4+sarge2.diff.gz elog (2.5.7+r1558-4+sarge2) stable-security; urgency=critical * Bump version number to prevent potential version clash with misdirected previous security upload stable/main/binary-sparc/dropbear_0.45-2sarge0_sparc.deb dropbear (0.45-2sarge0) stable-security; urgency=high * debian/diff/buffer-sizing-error.diff: new: patch from upstream fixing a buffer sizing error that may allow authenticated users to run code as the server user (usually root). [debian/diff/buffer-sizing-error.diff] stable/main/binary-s390/dropbear_0.45-2sarge0_s390.deb dropbear (0.45-2sarge0) stable-security; urgency=high * debian/diff/buffer-sizing-error.diff: new: patch from upstream fixing a buffer sizing error that may allow authenticated users to run code as the server user (usually root). [debian/diff/buffer-sizing-error.diff] stable/main/binary-mipsel/dropbear_0.45-2sarge0_mipsel.deb dropbear (0.45-2sarge0) stable-security; urgency=high * debian/diff/buffer-sizing-error.diff: new: patch from upstream fixing a buffer sizing error that may allow authenticated users to run code as the server user (usually root). [debian/diff/buffer-sizing-error.diff] stable/main/binary-mips/dropbear_0.45-2sarge0_mips.deb dropbear (0.45-2sarge0) stable-security; urgency=high * debian/diff/buffer-sizing-error.diff: new: patch from upstream fixing a buffer sizing error that may allow authenticated users to run code as the server user (usually root). [debian/diff/buffer-sizing-error.diff] stable/main/binary-m68k/dropbear_0.45-2sarge0_m68k.deb dropbear (0.45-2sarge0) stable-security; urgency=high * debian/diff/buffer-sizing-error.diff: new: patch from upstream fixing a buffer sizing error that may allow authenticated users to run code as the server user (usually root). [debian/diff/buffer-sizing-error.diff] stable/main/binary-ia64/dropbear_0.45-2sarge0_ia64.deb dropbear (0.45-2sarge0) stable-security; urgency=high * debian/diff/buffer-sizing-error.diff: new: patch from upstream fixing a buffer sizing error that may allow authenticated users to run code as the server user (usually root). [debian/diff/buffer-sizing-error.diff] stable/main/binary-i386/dropbear_0.45-2sarge0_i386.deb dropbear (0.45-2sarge0) stable-security; urgency=high * debian/diff/buffer-sizing-error.diff: new: patch from upstream fixing a buffer sizing error that may allow authenticated users to run code as the server user (usually root). [debian/diff/buffer-sizing-error.diff] stable/main/binary-hppa/dropbear_0.45-2sarge0_hppa.deb dropbear (0.45-2sarge0) stable-security; urgency=high * debian/diff/buffer-sizing-error.diff: new: patch from upstream fixing a buffer sizing error that may allow authenticated users to run code as the server user (usually root). [debian/diff/buffer-sizing-error.diff] stable/main/binary-arm/dropbear_0.45-2sarge0_arm.deb dropbear (0.45-2sarge0) stable-security; urgency=high * debian/diff/buffer-sizing-error.diff: new: patch from upstream fixing a buffer sizing error that may allow authenticated users to run code as the server user (usually root). [debian/diff/buffer-sizing-error.diff] stable/main/binary-alpha/dropbear_0.45-2sarge0_alpha.deb dropbear (0.45-2sarge0) stable-security; urgency=high * debian/diff/buffer-sizing-error.diff: new: patch from upstream fixing a buffer sizing error that may allow authenticated users to run code as the server user (usually root). [debian/diff/buffer-sizing-error.diff] stable/main/binary-powerpc/dropbear_0.45-2sarge0_powerpc.deb stable/main/source/dropbear_0.45-2sarge0.diff.gz stable/main/source/dropbear_0.45-2sarge0.dsc dropbear (0.45-2sarge0) stable-security; urgency=high * debian/diff/buffer-sizing-error.diff: new: patch from upstream fixing a buffer sizing error that may allow authenticated users to run code as the server user (usually root). [debian/diff/buffer-sizing-error.diff] stable/main/binary-sparc/dia-libs_0.94.0-7sarge3_sparc.deb stable/main/binary-sparc/dia-gnome_0.94.0-7sarge3_sparc.deb stable/main/binary-sparc/dia_0.94.0-7sarge3_sparc.deb dia (0.94.0-7sarge3) stable-security; urgency=medium * Non-maintainer upload by the Security Team * Adjusted the CVE name: CVE-2006-1550 stable/main/binary-s390/dia_0.94.0-7sarge3_s390.deb stable/main/binary-s390/dia-libs_0.94.0-7sarge3_s390.deb stable/main/binary-s390/dia-gnome_0.94.0-7sarge3_s390.deb dia (0.94.0-7sarge3) stable-security; urgency=medium * Non-maintainer upload by the Security Team * Adjusted the CVE name: CVE-2006-1550 stable/main/binary-powerpc/dia-gnome_0.94.0-7sarge3_powerpc.deb stable/main/binary-powerpc/dia-libs_0.94.0-7sarge3_powerpc.deb stable/main/binary-powerpc/dia_0.94.0-7sarge3_powerpc.deb dia (0.94.0-7sarge3) stable-security; urgency=medium * Non-maintainer upload by the Security Team * Adjusted the CVE name: CVE-2006-1550 stable/main/binary-mips/dia-libs_0.94.0-7sarge3_mips.deb stable/main/binary-mips/dia-gnome_0.94.0-7sarge3_mips.deb stable/main/binary-mips/dia_0.94.0-7sarge3_mips.deb dia (0.94.0-7sarge3) stable-security; urgency=medium * Non-maintainer upload by the Security Team * Adjusted the CVE name: CVE-2006-1550 stable/main/binary-m68k/dia-libs_0.94.0-7sarge3_m68k.deb stable/main/binary-m68k/dia_0.94.0-7sarge3_m68k.deb stable/main/binary-m68k/dia-gnome_0.94.0-7sarge3_m68k.deb dia (0.94.0-7sarge3) stable-security; urgency=medium * Non-maintainer upload by the Security Team * Adjusted the CVE name: CVE-2006-1550 stable/main/binary-ia64/dia-gnome_0.94.0-7sarge3_ia64.deb stable/main/binary-ia64/dia-libs_0.94.0-7sarge3_ia64.deb stable/main/binary-ia64/dia_0.94.0-7sarge3_ia64.deb dia (0.94.0-7sarge3) stable-security; urgency=medium * Non-maintainer upload by the Security Team * Adjusted the CVE name: CVE-2006-1550 stable/main/binary-i386/dia_0.94.0-7sarge3_i386.deb stable/main/binary-i386/dia-gnome_0.94.0-7sarge3_i386.deb stable/main/binary-i386/dia-libs_0.94.0-7sarge3_i386.deb dia (0.94.0-7sarge3) stable-security; urgency=medium * Non-maintainer upload by the Security Team * Adjusted the CVE name: CVE-2006-1550 stable/main/binary-hppa/dia-libs_0.94.0-7sarge3_hppa.deb stable/main/binary-hppa/dia-gnome_0.94.0-7sarge3_hppa.deb stable/main/binary-hppa/dia_0.94.0-7sarge3_hppa.deb dia (0.94.0-7sarge3) stable-security; urgency=medium * Non-maintainer upload by the Security Team * Adjusted the CVE name: CVE-2006-1550 stable/main/binary-arm/dia_0.94.0-7sarge3_arm.deb stable/main/binary-arm/dia-libs_0.94.0-7sarge3_arm.deb stable/main/binary-arm/dia-gnome_0.94.0-7sarge3_arm.deb dia (0.94.0-7sarge3) stable-security; urgency=medium * Non-maintainer upload by the Security Team * Adjusted the CVE name: CVE-2006-1550 stable/main/binary-alpha/dia_0.94.0-7sarge3_alpha.deb stable/main/binary-alpha/dia-gnome_0.94.0-7sarge3_alpha.deb stable/main/binary-alpha/dia-libs_0.94.0-7sarge3_alpha.deb dia (0.94.0-7sarge3) stable-security; urgency=medium * Non-maintainer upload by the Security Team * Adjusted the CVE name: CVE-2006-1550 stable/main/source/dia_0.94.0-7sarge3.diff.gz stable/main/source/dia_0.94.0-7sarge3.dsc stable/main/binary-all/dia-common_0.94.0-7sarge3_all.deb stable/main/binary-mipsel/dia-libs_0.94.0-7sarge3_mipsel.deb stable/main/binary-mipsel/dia-gnome_0.94.0-7sarge3_mipsel.deb stable/main/binary-mipsel/dia_0.94.0-7sarge3_mipsel.deb dia (0.94.0-7sarge3) stable-security; urgency=medium * Non-maintainer upload by the Security Team * Adjusted the CVE name: CVE-2006-1550 stable/main/binary-sparc/dhis-tools-dns_5.0-3sarge1_sparc.deb stable/main/binary-sparc/dhis-tools-genkeys_5.0-3sarge1_sparc.deb dhis-tools-dns (5.0-3sarge1) stable-security; urgency=high * Non-maintainer upload by The Security Team. * Fix insecure use of temporary files and ensure the configuration file is read correctly. [CVE-2005-3341] stable/main/binary-s390/dhis-tools-dns_5.0-3sarge1_s390.deb stable/main/binary-s390/dhis-tools-genkeys_5.0-3sarge1_s390.deb dhis-tools-dns (5.0-3sarge1) stable-security; urgency=high * Non-maintainer upload by The Security Team. * Fix insecure use of temporary files and ensure the configuration file is read correctly. [CVE-2005-3341] stable/main/binary-powerpc/dhis-tools-dns_5.0-3sarge1_powerpc.deb stable/main/binary-powerpc/dhis-tools-genkeys_5.0-3sarge1_powerpc.deb dhis-tools-dns (5.0-3sarge1) stable-security; urgency=high * Non-maintainer upload by The Security Team. * Fix insecure use of temporary files and ensure the configuration file is read correctly. [CVE-2005-3341] stable/main/binary-mipsel/dhis-tools-dns_5.0-3sarge1_mipsel.deb stable/main/binary-mipsel/dhis-tools-genkeys_5.0-3sarge1_mipsel.deb dhis-tools-dns (5.0-3sarge1) stable-security; urgency=high * Non-maintainer upload by The Security Team. * Fix insecure use of temporary files and ensure the configuration file is read correctly. [CVE-2005-3341] stable/main/binary-mips/dhis-tools-dns_5.0-3sarge1_mips.deb stable/main/binary-mips/dhis-tools-genkeys_5.0-3sarge1_mips.deb dhis-tools-dns (5.0-3sarge1) stable-security; urgency=high * Non-maintainer upload by The Security Team. * Fix insecure use of temporary files and ensure the configuration file is read correctly. [CVE-2005-3341] stable/main/binary-m68k/dhis-tools-dns_5.0-3sarge1_m68k.deb stable/main/binary-m68k/dhis-tools-genkeys_5.0-3sarge1_m68k.deb dhis-tools-dns (5.0-3sarge1) stable-security; urgency=high * Non-maintainer upload by The Security Team. * Fix insecure use of temporary files and ensure the configuration file is read correctly. [CVE-2005-3341] stable/main/binary-ia64/dhis-tools-dns_5.0-3sarge1_ia64.deb stable/main/binary-ia64/dhis-tools-genkeys_5.0-3sarge1_ia64.deb dhis-tools-dns (5.0-3sarge1) stable-security; urgency=high * Non-maintainer upload by The Security Team. * Fix insecure use of temporary files and ensure the configuration file is read correctly. [CVE-2005-3341] stable/main/binary-hppa/dhis-tools-genkeys_5.0-3sarge1_hppa.deb stable/main/binary-hppa/dhis-tools-dns_5.0-3sarge1_hppa.deb dhis-tools-dns (5.0-3sarge1) stable-security; urgency=high * Non-maintainer upload by The Security Team. * Fix insecure use of temporary files and ensure the configuration file is read correctly. [CVE-2005-3341] stable/main/binary-arm/dhis-tools-genkeys_5.0-3sarge1_arm.deb stable/main/binary-arm/dhis-tools-dns_5.0-3sarge1_arm.deb dhis-tools-dns (5.0-3sarge1) stable-security; urgency=high * Non-maintainer upload by The Security Team. * Fix insecure use of temporary files and ensure the configuration file is read correctly. [CVE-2005-3341] stable/main/binary-alpha/dhis-tools-genkeys_5.0-3sarge1_alpha.deb stable/main/binary-alpha/dhis-tools-dns_5.0-3sarge1_alpha.deb dhis-tools-dns (5.0-3sarge1) stable-security; urgency=high * Non-maintainer upload by The Security Team. * Fix insecure use of temporary files and ensure the configuration file is read correctly. [CVE-2005-3341] stable/main/source/dhis-tools-dns_5.0-3sarge1.diff.gz stable/main/binary-i386/dhis-tools-genkeys_5.0-3sarge1_i386.deb stable/main/binary-i386/dhis-tools-dns_5.0-3sarge1_i386.deb stable/main/source/dhis-tools-dns_5.0-3sarge1.dsc dhis-tools-dns (5.0-3sarge1) stable-security; urgency=high * Non-maintainer upload by The Security Team. * Fix insecure use of temporary files and ensure the configuration file is read correctly. [CVE-2005-3341] stable/main/binary-sparc/cyrus21-clients_2.1.18-1+sarge2_sparc.deb stable/main/binary-sparc/cyrus21-common_2.1.18-1+sarge2_sparc.deb stable/main/binary-sparc/cyrus21-dev_2.1.18-1+sarge2_sparc.deb stable/main/binary-sparc/cyrus21-murder_2.1.18-1+sarge2_sparc.deb stable/main/binary-sparc/cyrus21-imapd_2.1.18-1+sarge2_sparc.deb stable/main/binary-sparc/cyrus21-pop3d_2.1.18-1+sarge2_sparc.deb stable/main/binary-sparc/libcyrus-imap-perl21_2.1.18-1+sarge2_sparc.deb cyrus21-imapd (2.1.18-1+sarge2) stable; urgency=high * Rebuild cleanly for minimal diff stable/main/binary-s390/cyrus21-clients_2.1.18-1+sarge2_s390.deb stable/main/binary-s390/libcyrus-imap-perl21_2.1.18-1+sarge2_s390.deb stable/main/binary-s390/cyrus21-murder_2.1.18-1+sarge2_s390.deb stable/main/binary-s390/cyrus21-dev_2.1.18-1+sarge2_s390.deb stable/main/binary-s390/cyrus21-common_2.1.18-1+sarge2_s390.deb stable/main/binary-s390/cyrus21-imapd_2.1.18-1+sarge2_s390.deb stable/main/binary-s390/cyrus21-pop3d_2.1.18-1+sarge2_s390.deb cyrus21-imapd (2.1.18-1+sarge2) stable; urgency=high * Rebuild cleanly for minimal diff stable/main/binary-powerpc/cyrus21-imapd_2.1.18-1+sarge2_powerpc.deb stable/main/binary-powerpc/cyrus21-clients_2.1.18-1+sarge2_powerpc.deb stable/main/binary-powerpc/cyrus21-common_2.1.18-1+sarge2_powerpc.deb stable/main/binary-powerpc/cyrus21-dev_2.1.18-1+sarge2_powerpc.deb stable/main/binary-powerpc/cyrus21-pop3d_2.1.18-1+sarge2_powerpc.deb stable/main/binary-powerpc/libcyrus-imap-perl21_2.1.18-1+sarge2_powerpc.deb stable/main/binary-powerpc/cyrus21-murder_2.1.18-1+sarge2_powerpc.deb cyrus21-imapd (2.1.18-1+sarge2) stable; urgency=high * Rebuild cleanly for minimal diff stable/main/binary-mipsel/cyrus21-dev_2.1.18-1+sarge2_mipsel.deb stable/main/binary-mipsel/cyrus21-murder_2.1.18-1+sarge2_mipsel.deb stable/main/binary-mipsel/libcyrus-imap-perl21_2.1.18-1+sarge2_mipsel.deb stable/main/binary-mipsel/cyrus21-common_2.1.18-1+sarge2_mipsel.deb stable/main/binary-mipsel/cyrus21-imapd_2.1.18-1+sarge2_mipsel.deb stable/main/binary-mipsel/cyrus21-clients_2.1.18-1+sarge2_mipsel.deb stable/main/binary-mipsel/cyrus21-pop3d_2.1.18-1+sarge2_mipsel.deb cyrus21-imapd (2.1.18-1+sarge2) stable; urgency=high * Rebuild cleanly for minimal diff stable/main/binary-mips/cyrus21-pop3d_2.1.18-1+sarge2_mips.deb stable/main/binary-mips/cyrus21-murder_2.1.18-1+sarge2_mips.deb stable/main/binary-mips/cyrus21-imapd_2.1.18-1+sarge2_mips.deb stable/main/binary-mips/cyrus21-common_2.1.18-1+sarge2_mips.deb stable/main/binary-mips/cyrus21-dev_2.1.18-1+sarge2_mips.deb stable/main/binary-mips/cyrus21-clients_2.1.18-1+sarge2_mips.deb stable/main/binary-mips/libcyrus-imap-perl21_2.1.18-1+sarge2_mips.deb cyrus21-imapd (2.1.18-1+sarge2) stable; urgency=high * Rebuild cleanly for minimal diff stable/main/binary-m68k/cyrus21-dev_2.1.18-1+sarge2_m68k.deb stable/main/binary-m68k/cyrus21-murder_2.1.18-1+sarge2_m68k.deb stable/main/binary-m68k/libcyrus-imap-perl21_2.1.18-1+sarge2_m68k.deb stable/main/binary-m68k/cyrus21-clients_2.1.18-1+sarge2_m68k.deb stable/main/binary-m68k/cyrus21-common_2.1.18-1+sarge2_m68k.deb stable/main/binary-m68k/cyrus21-pop3d_2.1.18-1+sarge2_m68k.deb stable/main/binary-m68k/cyrus21-imapd_2.1.18-1+sarge2_m68k.deb cyrus21-imapd (2.1.18-1+sarge2) stable; urgency=high * Rebuild cleanly for minimal diff stable/main/binary-ia64/cyrus21-clients_2.1.18-1+sarge2_ia64.deb stable/main/binary-ia64/cyrus21-dev_2.1.18-1+sarge2_ia64.deb stable/main/binary-ia64/libcyrus-imap-perl21_2.1.18-1+sarge2_ia64.deb stable/main/binary-ia64/cyrus21-murder_2.1.18-1+sarge2_ia64.deb stable/main/binary-ia64/cyrus21-common_2.1.18-1+sarge2_ia64.deb stable/main/binary-ia64/cyrus21-imapd_2.1.18-1+sarge2_ia64.deb stable/main/binary-ia64/cyrus21-pop3d_2.1.18-1+sarge2_ia64.deb cyrus21-imapd (2.1.18-1+sarge2) stable; urgency=high * Rebuild cleanly for minimal diff stable/main/binary-arm/cyrus21-dev_2.1.18-1+sarge2_arm.deb stable/main/binary-arm/cyrus21-pop3d_2.1.18-1+sarge2_arm.deb stable/main/binary-arm/libcyrus-imap-perl21_2.1.18-1+sarge2_arm.deb stable/main/binary-arm/cyrus21-murder_2.1.18-1+sarge2_arm.deb stable/main/binary-arm/cyrus21-imapd_2.1.18-1+sarge2_arm.deb stable/main/binary-arm/cyrus21-clients_2.1.18-1+sarge2_arm.deb stable/main/binary-arm/cyrus21-common_2.1.18-1+sarge2_arm.deb cyrus21-imapd (2.1.18-1+sarge2) stable; urgency=high * Rebuild cleanly for minimal diff stable/main/binary-alpha/cyrus21-imapd_2.1.18-1+sarge2_alpha.deb stable/main/binary-alpha/cyrus21-pop3d_2.1.18-1+sarge2_alpha.deb stable/main/binary-alpha/cyrus21-murder_2.1.18-1+sarge2_alpha.deb stable/main/binary-alpha/cyrus21-dev_2.1.18-1+sarge2_alpha.deb stable/main/binary-alpha/cyrus21-clients_2.1.18-1+sarge2_alpha.deb stable/main/binary-alpha/cyrus21-common_2.1.18-1+sarge2_alpha.deb stable/main/binary-alpha/libcyrus-imap-perl21_2.1.18-1+sarge2_alpha.deb cyrus21-imapd (2.1.18-1+sarge2) stable; urgency=high * Rebuild cleanly for minimal diff stable/main/source/cyrus21-imapd_2.1.18-1+sarge2.dsc stable/main/binary-i386/cyrus21-dev_2.1.18-1+sarge2_i386.deb stable/main/binary-i386/cyrus21-murder_2.1.18-1+sarge2_i386.deb stable/main/binary-all/cyrus21-admin_2.1.18-1+sarge2_all.deb stable/main/binary-i386/cyrus21-clients_2.1.18-1+sarge2_i386.deb stable/main/binary-all/cyrus21-doc_2.1.18-1+sarge2_all.deb stable/main/source/cyrus21-imapd_2.1.18-1+sarge2.diff.gz stable/main/binary-i386/cyrus21-common_2.1.18-1+sarge2_i386.deb stable/main/binary-i386/cyrus21-imapd_2.1.18-1+sarge2_i386.deb stable/main/binary-i386/libcyrus-imap-perl21_2.1.18-1+sarge2_i386.deb stable/main/binary-i386/cyrus21-pop3d_2.1.18-1+sarge2_i386.deb cyrus21-imapd (2.1.18-1+sarge2) stable; urgency=high * Rebuild cleanly for minimal diff cyrus21-imapd (2.1.18-1+sarge1) stable; urgency=high * UPGRADE.Debian: warn of dangerous problem in cyrus-imapd 1.5.19-20, shipped in Debian Sarge 3.1r1 and r0, which would cause data loss when UPGRADE.Debian instructions were followed (closes: #348186) * Release Manager: this upload closes a grave bug, dealing with severe data loss. The cyrus21-imapd packages in Sarge assumed the behaviour of cyrus-imapd in Woody, and instruct the user to purge the cyrus-imapd package on the upgrade documentation. In order to fix this problem, the upgrade documentation in all cyrus 2.1 and 2.2 packages has been fixed with large warnings, and a two-pronged approach consisting of this upload to stable of cyrus21-imapd with the documentation fixes plus an upload to stable of cyrus-imapd with postrm fixes was deemed the safest way by the Cyrus IMAPD packaging team. stable/main/binary-sparc/cyrus-imapd_1.5.19-20+sarge1_sparc.deb stable/main/binary-sparc/cyrus-admin_1.5.19-20+sarge1_sparc.deb stable/main/binary-sparc/cyrus-pop3d_1.5.19-20+sarge1_sparc.deb stable/main/binary-sparc/cyrus-news-spool_1.5.19-20+sarge1_sparc.deb stable/main/binary-sparc/cyrus-dev_1.5.19-20+sarge1_sparc.deb stable/main/binary-sparc/cyrus-common_1.5.19-20+sarge1_sparc.deb cyrus-imapd (1.5.19-20+sarge1) stable; urgency=high * NMU by the cyrus-imapd packaging team, for Debian Stable * cyrus-common postrm would, without any questions or warnings, remove the /var/lib/cyrus and /var/spool/cyrus subtrees upon package purge. This upload reverts to the behaviour of the packages in Debian Woody, where the user is asked if the files should be deleted or not. If the files are not deleted, their owner and group are changed to root:root, since the cyrus user will be deleted by the package purge (closes: 339073) Release Manager: this upload closes a grave bug, dealing with severe data loss. The cyrus21-imapd packages in Sarge assumed the behaviour of cyrus-imapd in Woody, and instruct the user to purge the cyrus-imapd package on the upgrade documentation. In order to fix this problem, the upgrade documentation in all cyrus 2.1 and 2.2 packages has been fixed with large warnings, and a two-pronged approach consisting of an upload to stable of cyrus21-imapd with the documentation fixes plus this upload to stable of cyrus-imapd with postrm fixes was deemed the safest way by the Cyrus IMAPD packaging team. In order to make the changes to the stable packages minimal, prompting is done directly, as the cyrus-imapd packages do not use debconf. stable/main/binary-s390/cyrus-pop3d_1.5.19-20+sarge1_s390.deb stable/main/binary-s390/cyrus-imapd_1.5.19-20+sarge1_s390.deb stable/main/binary-s390/cyrus-admin_1.5.19-20+sarge1_s390.deb stable/main/binary-s390/cyrus-dev_1.5.19-20+sarge1_s390.deb stable/main/binary-s390/cyrus-news-spool_1.5.19-20+sarge1_s390.deb stable/main/binary-s390/cyrus-common_1.5.19-20+sarge1_s390.deb cyrus-imapd (1.5.19-20+sarge1) stable; urgency=high * NMU by the cyrus-imapd packaging team, for Debian Stable * cyrus-common postrm would, without any questions or warnings, remove the /var/lib/cyrus and /var/spool/cyrus subtrees upon package purge. This upload reverts to the behaviour of the packages in Debian Woody, where the user is asked if the files should be deleted or not. If the files are not deleted, their owner and group are changed to root:root, since the cyrus user will be deleted by the package purge (closes: 339073) Release Manager: this upload closes a grave bug, dealing with severe data loss. The cyrus21-imapd packages in Sarge assumed the behaviour of cyrus-imapd in Woody, and instruct the user to purge the cyrus-imapd package on the upgrade documentation. In order to fix this problem, the upgrade documentation in all cyrus 2.1 and 2.2 packages has been fixed with large warnings, and a two-pronged approach consisting of an upload to stable of cyrus21-imapd with the documentation fixes plus this upload to stable of cyrus-imapd with postrm fixes was deemed the safest way by the Cyrus IMAPD packaging team. In order to make the changes to the stable packages minimal, prompting is done directly, as the cyrus-imapd packages do not use debconf. stable/main/binary-powerpc/cyrus-common_1.5.19-20+sarge1_powerpc.deb stable/main/binary-powerpc/cyrus-imapd_1.5.19-20+sarge1_powerpc.deb stable/main/binary-powerpc/cyrus-admin_1.5.19-20+sarge1_powerpc.deb stable/main/binary-powerpc/cyrus-dev_1.5.19-20+sarge1_powerpc.deb stable/main/binary-powerpc/cyrus-pop3d_1.5.19-20+sarge1_powerpc.deb stable/main/binary-powerpc/cyrus-news-spool_1.5.19-20+sarge1_powerpc.deb cyrus-imapd (1.5.19-20+sarge1) stable; urgency=high * NMU by the cyrus-imapd packaging team, for Debian Stable * cyrus-common postrm would, without any questions or warnings, remove the /var/lib/cyrus and /var/spool/cyrus subtrees upon package purge. This upload reverts to the behaviour of the packages in Debian Woody, where the user is asked if the files should be deleted or not. If the files are not deleted, their owner and group are changed to root:root, since the cyrus user will be deleted by the package purge (closes: 339073) Release Manager: this upload closes a grave bug, dealing with severe data loss. The cyrus21-imapd packages in Sarge assumed the behaviour of cyrus-imapd in Woody, and instruct the user to purge the cyrus-imapd package on the upgrade documentation. In order to fix this problem, the upgrade documentation in all cyrus 2.1 and 2.2 packages has been fixed with large warnings, and a two-pronged approach consisting of an upload to stable of cyrus21-imapd with the documentation fixes plus this upload to stable of cyrus-imapd with postrm fixes was deemed the safest way by the Cyrus IMAPD packaging team. In order to make the changes to the stable packages minimal, prompting is done directly, as the cyrus-imapd packages do not use debconf. stable/main/binary-mipsel/cyrus-pop3d_1.5.19-20+sarge1_mipsel.deb stable/main/binary-mipsel/cyrus-news-spool_1.5.19-20+sarge1_mipsel.deb stable/main/binary-mipsel/cyrus-dev_1.5.19-20+sarge1_mipsel.deb stable/main/binary-mipsel/cyrus-imapd_1.5.19-20+sarge1_mipsel.deb stable/main/binary-mipsel/cyrus-admin_1.5.19-20+sarge1_mipsel.deb stable/main/binary-mipsel/cyrus-common_1.5.19-20+sarge1_mipsel.deb cyrus-imapd (1.5.19-20+sarge1) stable; urgency=high * NMU by the cyrus-imapd packaging team, for Debian Stable * cyrus-common postrm would, without any questions or warnings, remove the /var/lib/cyrus and /var/spool/cyrus subtrees upon package purge. This upload reverts to the behaviour of the packages in Debian Woody, where the user is asked if the files should be deleted or not. If the files are not deleted, their owner and group are changed to root:root, since the cyrus user will be deleted by the package purge (closes: 339073) Release Manager: this upload closes a grave bug, dealing with severe data loss. The cyrus21-imapd packages in Sarge assumed the behaviour of cyrus-imapd in Woody, and instruct the user to purge the cyrus-imapd package on the upgrade documentation. In order to fix this problem, the upgrade documentation in all cyrus 2.1 and 2.2 packages has been fixed with large warnings, and a two-pronged approach consisting of an upload to stable of cyrus21-imapd with the documentation fixes plus this upload to stable of cyrus-imapd with postrm fixes was deemed the safest way by the Cyrus IMAPD packaging team. In order to make the changes to the stable packages minimal, prompting is done directly, as the cyrus-imapd packages do not use debconf. stable/main/binary-mips/cyrus-common_1.5.19-20+sarge1_mips.deb stable/main/binary-mips/cyrus-pop3d_1.5.19-20+sarge1_mips.deb stable/main/binary-mips/cyrus-dev_1.5.19-20+sarge1_mips.deb stable/main/binary-mips/cyrus-news-spool_1.5.19-20+sarge1_mips.deb stable/main/binary-mips/cyrus-admin_1.5.19-20+sarge1_mips.deb stable/main/binary-mips/cyrus-imapd_1.5.19-20+sarge1_mips.deb cyrus-imapd (1.5.19-20+sarge1) stable; urgency=high * NMU by the cyrus-imapd packaging team, for Debian Stable * cyrus-common postrm would, without any questions or warnings, remove the /var/lib/cyrus and /var/spool/cyrus subtrees upon package purge. This upload reverts to the behaviour of the packages in Debian Woody, where the user is asked if the files should be deleted or not. If the files are not deleted, their owner and group are changed to root:root, since the cyrus user will be deleted by the package purge (closes: 339073) Release Manager: this upload closes a grave bug, dealing with severe data loss. The cyrus21-imapd packages in Sarge assumed the behaviour of cyrus-imapd in Woody, and instruct the user to purge the cyrus-imapd package on the upgrade documentation. In order to fix this problem, the upgrade documentation in all cyrus 2.1 and 2.2 packages has been fixed with large warnings, and a two-pronged approach consisting of an upload to stable of cyrus21-imapd with the documentation fixes plus this upload to stable of cyrus-imapd with postrm fixes was deemed the safest way by the Cyrus IMAPD packaging team. In order to make the changes to the stable packages minimal, prompting is done directly, as the cyrus-imapd packages do not use debconf. stable/main/binary-m68k/cyrus-admin_1.5.19-20+sarge1_m68k.deb stable/main/binary-m68k/cyrus-common_1.5.19-20+sarge1_m68k.deb stable/main/binary-m68k/cyrus-imapd_1.5.19-20+sarge1_m68k.deb stable/main/binary-m68k/cyrus-news-spool_1.5.19-20+sarge1_m68k.deb stable/main/binary-m68k/cyrus-dev_1.5.19-20+sarge1_m68k.deb stable/main/binary-m68k/cyrus-pop3d_1.5.19-20+sarge1_m68k.deb cyrus-imapd (1.5.19-20+sarge1) stable; urgency=high * NMU by the cyrus-imapd packaging team, for Debian Stable * cyrus-common postrm would, without any questions or warnings, remove the /var/lib/cyrus and /var/spool/cyrus subtrees upon package purge. This upload reverts to the behaviour of the packages in Debian Woody, where the user is asked if the files should be deleted or not. If the files are not deleted, their owner and group are changed to root:root, since the cyrus user will be deleted by the package purge (closes: 339073) Release Manager: this upload closes a grave bug, dealing with severe data loss. The cyrus21-imapd packages in Sarge assumed the behaviour of cyrus-imapd in Woody, and instruct the user to purge the cyrus-imapd package on the upgrade documentation. In order to fix this problem, the upgrade documentation in all cyrus 2.1 and 2.2 packages has been fixed with large warnings, and a two-pronged approach consisting of an upload to stable of cyrus21-imapd with the documentation fixes plus this upload to stable of cyrus-imapd with postrm fixes was deemed the safest way by the Cyrus IMAPD packaging team. In order to make the changes to the stable packages minimal, prompting is done directly, as the cyrus-imapd packages do not use debconf. stable/main/binary-ia64/cyrus-admin_1.5.19-20+sarge1_ia64.deb stable/main/binary-ia64/cyrus-news-spool_1.5.19-20+sarge1_ia64.deb stable/main/binary-ia64/cyrus-dev_1.5.19-20+sarge1_ia64.deb stable/main/binary-ia64/cyrus-pop3d_1.5.19-20+sarge1_ia64.deb stable/main/binary-ia64/cyrus-common_1.5.19-20+sarge1_ia64.deb stable/main/binary-ia64/cyrus-imapd_1.5.19-20+sarge1_ia64.deb cyrus-imapd (1.5.19-20+sarge1) stable; urgency=high * NMU by the cyrus-imapd packaging team, for Debian Stable * cyrus-common postrm would, without any questions or warnings, remove the /var/lib/cyrus and /var/spool/cyrus subtrees upon package purge. This upload reverts to the behaviour of the packages in Debian Woody, where the user is asked if the files should be deleted or not. If the files are not deleted, their owner and group are changed to root:root, since the cyrus user will be deleted by the package purge (closes: 339073) Release Manager: this upload closes a grave bug, dealing with severe data loss. The cyrus21-imapd packages in Sarge assumed the behaviour of cyrus-imapd in Woody, and instruct the user to purge the cyrus-imapd package on the upgrade documentation. In order to fix this problem, the upgrade documentation in all cyrus 2.1 and 2.2 packages has been fixed with large warnings, and a two-pronged approach consisting of an upload to stable of cyrus21-imapd with the documentation fixes plus this upload to stable of cyrus-imapd with postrm fixes was deemed the safest way by the Cyrus IMAPD packaging team. In order to make the changes to the stable packages minimal, prompting is done directly, as the cyrus-imapd packages do not use debconf. stable/main/binary-hppa/cyrus-admin_1.5.19-20+sarge1_hppa.deb stable/main/binary-hppa/cyrus-pop3d_1.5.19-20+sarge1_hppa.deb stable/main/binary-hppa/cyrus-dev_1.5.19-20+sarge1_hppa.deb stable/main/binary-hppa/cyrus-news-spool_1.5.19-20+sarge1_hppa.deb stable/main/binary-hppa/cyrus-imapd_1.5.19-20+sarge1_hppa.deb stable/main/binary-hppa/cyrus-common_1.5.19-20+sarge1_hppa.deb cyrus-imapd (1.5.19-20+sarge1) stable; urgency=high * NMU by the cyrus-imapd packaging team, for Debian Stable * cyrus-common postrm would, without any questions or warnings, remove the /var/lib/cyrus and /var/spool/cyrus subtrees upon package purge. This upload reverts to the behaviour of the packages in Debian Woody, where the user is asked if the files should be deleted or not. If the files are not deleted, their owner and group are changed to root:root, since the cyrus user will be deleted by the package purge (closes: 339073) Release Manager: this upload closes a grave bug, dealing with severe data loss. The cyrus21-imapd packages in Sarge assumed the behaviour of cyrus-imapd in Woody, and instruct the user to purge the cyrus-imapd package on the upgrade documentation. In order to fix this problem, the upgrade documentation in all cyrus 2.1 and 2.2 packages has been fixed with large warnings, and a two-pronged approach consisting of an upload to stable of cyrus21-imapd with the documentation fixes plus this upload to stable of cyrus-imapd with postrm fixes was deemed the safest way by the Cyrus IMAPD packaging team. In order to make the changes to the stable packages minimal, prompting is done directly, as the cyrus-imapd packages do not use debconf. stable/main/binary-arm/cyrus-news-spool_1.5.19-20+sarge1_arm.deb stable/main/binary-arm/cyrus-dev_1.5.19-20+sarge1_arm.deb stable/main/binary-arm/cyrus-common_1.5.19-20+sarge1_arm.deb stable/main/binary-arm/cyrus-imapd_1.5.19-20+sarge1_arm.deb stable/main/binary-arm/cyrus-pop3d_1.5.19-20+sarge1_arm.deb stable/main/binary-arm/cyrus-admin_1.5.19-20+sarge1_arm.deb cyrus-imapd (1.5.19-20+sarge1) stable; urgency=high * NMU by the cyrus-imapd packaging team, for Debian Stable * cyrus-common postrm would, without any questions or warnings, remove the /var/lib/cyrus and /var/spool/cyrus subtrees upon package purge. This upload reverts to the behaviour of the packages in Debian Woody, where the user is asked if the files should be deleted or not. If the files are not deleted, their owner and group are changed to root:root, since the cyrus user will be deleted by the package purge (closes: 339073) Release Manager: this upload closes a grave bug, dealing with severe data loss. The cyrus21-imapd packages in Sarge assumed the behaviour of cyrus-imapd in Woody, and instruct the user to purge the cyrus-imapd package on the upgrade documentation. In order to fix this problem, the upgrade documentation in all cyrus 2.1 and 2.2 packages has been fixed with large warnings, and a two-pronged approach consisting of an upload to stable of cyrus21-imapd with the documentation fixes plus this upload to stable of cyrus-imapd with postrm fixes was deemed the safest way by the Cyrus IMAPD packaging team. In order to make the changes to the stable packages minimal, prompting is done directly, as the cyrus-imapd packages do not use debconf. stable/main/binary-alpha/cyrus-news-spool_1.5.19-20+sarge1_alpha.deb stable/main/binary-alpha/cyrus-imapd_1.5.19-20+sarge1_alpha.deb stable/main/binary-alpha/cyrus-common_1.5.19-20+sarge1_alpha.deb stable/main/binary-alpha/cyrus-dev_1.5.19-20+sarge1_alpha.deb stable/main/binary-alpha/cyrus-pop3d_1.5.19-20+sarge1_alpha.deb stable/main/binary-alpha/cyrus-admin_1.5.19-20+sarge1_alpha.deb cyrus-imapd (1.5.19-20+sarge1) stable; urgency=high * NMU by the cyrus-imapd packaging team, for Debian Stable * cyrus-common postrm would, without any questions or warnings, remove the /var/lib/cyrus and /var/spool/cyrus subtrees upon package purge. This upload reverts to the behaviour of the packages in Debian Woody, where the user is asked if the files should be deleted or not. If the files are not deleted, their owner and group are changed to root:root, since the cyrus user will be deleted by the package purge (closes: 339073) Release Manager: this upload closes a grave bug, dealing with severe data loss. The cyrus21-imapd packages in Sarge assumed the behaviour of cyrus-imapd in Woody, and instruct the user to purge the cyrus-imapd package on the upgrade documentation. In order to fix this problem, the upgrade documentation in all cyrus 2.1 and 2.2 packages has been fixed with large warnings, and a two-pronged approach consisting of an upload to stable of cyrus21-imapd with the documentation fixes plus this upload to stable of cyrus-imapd with postrm fixes was deemed the safest way by the Cyrus IMAPD packaging team. In order to make the changes to the stable packages minimal, prompting is done directly, as the cyrus-imapd packages do not use debconf. stable/main/binary-i386/cyrus-news-spool_1.5.19-20+sarge1_i386.deb stable/main/source/cyrus-imapd_1.5.19-20+sarge1.diff.gz stable/main/binary-i386/cyrus-imapd_1.5.19-20+sarge1_i386.deb stable/main/binary-i386/cyrus-pop3d_1.5.19-20+sarge1_i386.deb stable/main/binary-i386/cyrus-admin_1.5.19-20+sarge1_i386.deb stable/main/binary-i386/cyrus-dev_1.5.19-20+sarge1_i386.deb stable/main/binary-i386/cyrus-common_1.5.19-20+sarge1_i386.deb stable/main/source/cyrus-imapd_1.5.19-20+sarge1.dsc cyrus-imapd (1.5.19-20+sarge1) stable; urgency=high * NMU by the cyrus-imapd packaging team, for Debian Stable * cyrus-common postrm would, without any questions or warnings, remove the /var/lib/cyrus and /var/spool/cyrus subtrees upon package purge. This upload reverts to the behaviour of the packages in Debian Woody, where the user is asked if the files should be deleted or not. If the files are not deleted, their owner and group are changed to root:root, since the cyrus user will be deleted by the package purge (closes: 339073) Release Manager: this upload closes a grave bug, dealing with severe data loss. The cyrus21-imapd packages in Sarge assumed the behaviour of cyrus-imapd in Woody, and instruct the user to purge the cyrus-imapd package on the upgrade documentation. In order to fix this problem, the upgrade documentation in all cyrus 2.1 and 2.2 packages has been fixed with large warnings, and a two-pronged approach consisting of an upload to stable of cyrus21-imapd with the documentation fixes plus this upload to stable of cyrus-imapd with postrm fixes was deemed the safest way by the Cyrus IMAPD packaging team. In order to make the changes to the stable packages minimal, prompting is done directly, as the cyrus-imapd packages do not use debconf. stable/main/binary-sparc/libcurl3_7.13.2-2sarge5_sparc.deb stable/main/binary-sparc/libcurl3-gssapi_7.13.2-2sarge5_sparc.deb stable/main/binary-sparc/curl_7.13.2-2sarge5_sparc.deb stable/main/binary-sparc/libcurl3-dev_7.13.2-2sarge5_sparc.deb stable/main/binary-sparc/libcurl3-dbg_7.13.2-2sarge5_sparc.deb curl (7.13.2-2sarge5) stable-security; urgency=high * Fixed previously applied patch to fix off-by-one error [lib/url.c, CVE-2005-4077] stable/main/binary-s390/libcurl3_7.13.2-2sarge5_s390.deb stable/main/binary-s390/libcurl3-dev_7.13.2-2sarge5_s390.deb stable/main/binary-s390/libcurl3-gssapi_7.13.2-2sarge5_s390.deb stable/main/binary-s390/curl_7.13.2-2sarge5_s390.deb stable/main/binary-s390/libcurl3-dbg_7.13.2-2sarge5_s390.deb curl (7.13.2-2sarge5) stable-security; urgency=high * Fixed previously applied patch to fix off-by-one error [lib/url.c, CVE-2005-4077] stable/main/binary-powerpc/libcurl3_7.13.2-2sarge5_powerpc.deb stable/main/binary-powerpc/libcurl3-gssapi_7.13.2-2sarge5_powerpc.deb stable/main/binary-powerpc/libcurl3-dev_7.13.2-2sarge5_powerpc.deb stable/main/binary-powerpc/curl_7.13.2-2sarge5_powerpc.deb stable/main/binary-powerpc/libcurl3-dbg_7.13.2-2sarge5_powerpc.deb curl (7.13.2-2sarge5) stable-security; urgency=high * Fixed previously applied patch to fix off-by-one error [lib/url.c, CVE-2005-4077] stable/main/binary-mipsel/curl_7.13.2-2sarge5_mipsel.deb stable/main/binary-mipsel/libcurl3-dbg_7.13.2-2sarge5_mipsel.deb stable/main/binary-mipsel/libcurl3_7.13.2-2sarge5_mipsel.deb stable/main/binary-mipsel/libcurl3-gssapi_7.13.2-2sarge5_mipsel.deb stable/main/binary-mipsel/libcurl3-dev_7.13.2-2sarge5_mipsel.deb curl (7.13.2-2sarge5) stable-security; urgency=high * Fixed previously applied patch to fix off-by-one error [lib/url.c, CVE-2005-4077] stable/main/binary-mips/curl_7.13.2-2sarge5_mips.deb stable/main/binary-mips/libcurl3-dev_7.13.2-2sarge5_mips.deb stable/main/binary-mips/libcurl3-gssapi_7.13.2-2sarge5_mips.deb stable/main/binary-mips/libcurl3_7.13.2-2sarge5_mips.deb stable/main/binary-mips/libcurl3-dbg_7.13.2-2sarge5_mips.deb curl (7.13.2-2sarge5) stable-security; urgency=high * Fixed previously applied patch to fix off-by-one error [lib/url.c, CVE-2005-4077] stable/main/binary-m68k/libcurl3-dev_7.13.2-2sarge5_m68k.deb stable/main/binary-m68k/curl_7.13.2-2sarge5_m68k.deb stable/main/binary-m68k/libcurl3-dbg_7.13.2-2sarge5_m68k.deb stable/main/binary-m68k/libcurl3_7.13.2-2sarge5_m68k.deb stable/main/binary-m68k/libcurl3-gssapi_7.13.2-2sarge5_m68k.deb curl (7.13.2-2sarge5) stable-security; urgency=high * Fixed previously applied patch to fix off-by-one error [lib/url.c, CVE-2005-4077] stable/main/binary-ia64/libcurl3_7.13.2-2sarge5_ia64.deb stable/main/binary-ia64/libcurl3-gssapi_7.13.2-2sarge5_ia64.deb stable/main/binary-ia64/libcurl3-dbg_7.13.2-2sarge5_ia64.deb stable/main/binary-ia64/curl_7.13.2-2sarge5_ia64.deb stable/main/binary-ia64/libcurl3-dev_7.13.2-2sarge5_ia64.deb curl (7.13.2-2sarge5) stable-security; urgency=high * Fixed previously applied patch to fix off-by-one error [lib/url.c, CVE-2005-4077] stable/main/binary-hppa/libcurl3_7.13.2-2sarge5_hppa.deb stable/main/binary-hppa/libcurl3-dev_7.13.2-2sarge5_hppa.deb stable/main/binary-hppa/libcurl3-gssapi_7.13.2-2sarge5_hppa.deb stable/main/binary-hppa/curl_7.13.2-2sarge5_hppa.deb stable/main/binary-hppa/libcurl3-dbg_7.13.2-2sarge5_hppa.deb curl (7.13.2-2sarge5) stable-security; urgency=high * Fixed previously applied patch to fix off-by-one error [lib/url.c, CVE-2005-4077] stable/main/binary-arm/libcurl3-dbg_7.13.2-2sarge5_arm.deb stable/main/binary-arm/curl_7.13.2-2sarge5_arm.deb stable/main/binary-arm/libcurl3-gssapi_7.13.2-2sarge5_arm.deb stable/main/binary-arm/libcurl3-dev_7.13.2-2sarge5_arm.deb stable/main/binary-arm/libcurl3_7.13.2-2sarge5_arm.deb curl (7.13.2-2sarge5) stable-security; urgency=high * Fixed previously applied patch to fix off-by-one error [lib/url.c, CVE-2005-4077] stable/main/binary-alpha/libcurl3-gssapi_7.13.2-2sarge5_alpha.deb stable/main/binary-alpha/libcurl3_7.13.2-2sarge5_alpha.deb stable/main/binary-alpha/libcurl3-dev_7.13.2-2sarge5_alpha.deb stable/main/binary-alpha/libcurl3-dbg_7.13.2-2sarge5_alpha.deb stable/main/binary-alpha/curl_7.13.2-2sarge5_alpha.deb curl (7.13.2-2sarge5) stable-security; urgency=high * Fixed previously applied patch to fix off-by-one error [lib/url.c, CVE-2005-4077] stable/main/binary-i386/libcurl3-dev_7.13.2-2sarge5_i386.deb stable/main/binary-i386/libcurl3_7.13.2-2sarge5_i386.deb stable/main/source/curl_7.13.2-2sarge5.diff.gz stable/main/source/curl_7.13.2-2sarge5.dsc stable/main/binary-i386/libcurl3-dbg_7.13.2-2sarge5_i386.deb stable/main/binary-i386/libcurl3-gssapi_7.13.2-2sarge5_i386.deb stable/main/binary-i386/curl_7.13.2-2sarge5_i386.deb curl (7.13.2-2sarge5) stable-security; urgency=high * Fixed previously applied patch to fix off-by-one error [lib/url.c, CVE-2005-4077] stable/main/binary-sparc/cupsys_1.1.23-10sarge1_sparc.deb stable/main/binary-sparc/libcupsys2-dev_1.1.23-10sarge1_sparc.deb stable/main/binary-sparc/libcupsimage2-dev_1.1.23-10sarge1_sparc.deb stable/main/binary-sparc/cupsys-client_1.1.23-10sarge1_sparc.deb stable/main/binary-sparc/cupsys-bsd_1.1.23-10sarge1_sparc.deb stable/main/binary-sparc/libcupsimage2_1.1.23-10sarge1_sparc.deb stable/main/binary-sparc/libcupsys2-gnutls10_1.1.23-10sarge1_sparc.deb cupsys (1.1.23-10sarge1) stable-security; urgency=high * Non-maintainer upload by the Security Team * Applied xpdf patch to fix buffer overflows [pdftops/Stream.cxx, pdftops/Stream.h, CAN-2005-3191, CAN-2005-3192, 46_security_CAN-2005-3191.dpatch] stable/main/binary-s390/libcupsimage2_1.1.23-10sarge1_s390.deb stable/main/binary-s390/cupsys-bsd_1.1.23-10sarge1_s390.deb stable/main/binary-s390/libcupsys2-gnutls10_1.1.23-10sarge1_s390.deb stable/main/binary-s390/cupsys-client_1.1.23-10sarge1_s390.deb stable/main/binary-s390/libcupsys2-dev_1.1.23-10sarge1_s390.deb stable/main/binary-s390/cupsys_1.1.23-10sarge1_s390.deb stable/main/binary-s390/libcupsimage2-dev_1.1.23-10sarge1_s390.deb cupsys (1.1.23-10sarge1) stable-security; urgency=high * Non-maintainer upload by the Security Team * Applied xpdf patch to fix buffer overflows [pdftops/Stream.cxx, pdftops/Stream.h, CAN-2005-3191, CAN-2005-3192, 46_security_CAN-2005-3191.dpatch] stable/main/binary-mipsel/cupsys-client_1.1.23-10sarge1_mipsel.deb stable/main/binary-mipsel/libcupsys2-dev_1.1.23-10sarge1_mipsel.deb stable/main/binary-mipsel/libcupsys2-gnutls10_1.1.23-10sarge1_mipsel.deb stable/main/binary-mipsel/libcupsimage2-dev_1.1.23-10sarge1_mipsel.deb stable/main/binary-mipsel/cupsys-bsd_1.1.23-10sarge1_mipsel.deb stable/main/binary-mipsel/libcupsimage2_1.1.23-10sarge1_mipsel.deb stable/main/binary-mipsel/cupsys_1.1.23-10sarge1_mipsel.deb cupsys (1.1.23-10sarge1) stable-security; urgency=high * Non-maintainer upload by the Security Team * Applied xpdf patch to fix buffer overflows [pdftops/Stream.cxx, pdftops/Stream.h, CAN-2005-3191, CAN-2005-3192, 46_security_CAN-2005-3191.dpatch] stable/main/binary-mips/cupsys-client_1.1.23-10sarge1_mips.deb stable/main/binary-mips/cupsys_1.1.23-10sarge1_mips.deb stable/main/binary-mips/libcupsimage2-dev_1.1.23-10sarge1_mips.deb stable/main/binary-mips/libcupsimage2_1.1.23-10sarge1_mips.deb stable/main/binary-mips/libcupsys2-gnutls10_1.1.23-10sarge1_mips.deb stable/main/binary-mips/cupsys-bsd_1.1.23-10sarge1_mips.deb stable/main/binary-mips/libcupsys2-dev_1.1.23-10sarge1_mips.deb cupsys (1.1.23-10sarge1) stable-security; urgency=high * Non-maintainer upload by the Security Team * Applied xpdf patch to fix buffer overflows [pdftops/Stream.cxx, pdftops/Stream.h, CAN-2005-3191, CAN-2005-3192, 46_security_CAN-2005-3191.dpatch] stable/main/binary-m68k/libcupsimage2-dev_1.1.23-10sarge1_m68k.deb stable/main/binary-m68k/cupsys-client_1.1.23-10sarge1_m68k.deb stable/main/binary-m68k/libcupsys2-dev_1.1.23-10sarge1_m68k.deb stable/main/binary-m68k/cupsys_1.1.23-10sarge1_m68k.deb stable/main/binary-m68k/cupsys-bsd_1.1.23-10sarge1_m68k.deb stable/main/binary-m68k/libcupsys2-gnutls10_1.1.23-10sarge1_m68k.deb stable/main/binary-m68k/libcupsimage2_1.1.23-10sarge1_m68k.deb cupsys (1.1.23-10sarge1) stable-security; urgency=high * Non-maintainer upload by the Security Team * Applied xpdf patch to fix buffer overflows [pdftops/Stream.cxx, pdftops/Stream.h, CAN-2005-3191, CAN-2005-3192, 46_security_CAN-2005-3191.dpatch] stable/main/binary-ia64/libcupsimage2_1.1.23-10sarge1_ia64.deb stable/main/binary-ia64/libcupsys2-gnutls10_1.1.23-10sarge1_ia64.deb stable/main/binary-ia64/libcupsys2-dev_1.1.23-10sarge1_ia64.deb stable/main/binary-ia64/cupsys-bsd_1.1.23-10sarge1_ia64.deb stable/main/binary-ia64/cupsys-client_1.1.23-10sarge1_ia64.deb stable/main/binary-ia64/libcupsimage2-dev_1.1.23-10sarge1_ia64.deb stable/main/binary-ia64/cupsys_1.1.23-10sarge1_ia64.deb cupsys (1.1.23-10sarge1) stable-security; urgency=high * Non-maintainer upload by the Security Team * Applied xpdf patch to fix buffer overflows [pdftops/Stream.cxx, pdftops/Stream.h, CAN-2005-3191, CAN-2005-3192, 46_security_CAN-2005-3191.dpatch] stable/main/binary-i386/libcupsys2-gnutls10_1.1.23-10sarge1_i386.deb stable/main/binary-i386/libcupsimage2_1.1.23-10sarge1_i386.deb stable/main/binary-i386/cupsys_1.1.23-10sarge1_i386.deb stable/main/binary-i386/libcupsys2-dev_1.1.23-10sarge1_i386.deb stable/main/binary-i386/libcupsimage2-dev_1.1.23-10sarge1_i386.deb stable/main/binary-i386/cupsys-client_1.1.23-10sarge1_i386.deb stable/main/binary-i386/cupsys-bsd_1.1.23-10sarge1_i386.deb cupsys (1.1.23-10sarge1) stable-security; urgency=high * Non-maintainer upload by the Security Team * Applied xpdf patch to fix buffer overflows [pdftops/Stream.cxx, pdftops/Stream.h, CAN-2005-3191, CAN-2005-3192, 46_security_CAN-2005-3191.dpatch] stable/main/binary-hppa/cupsys-client_1.1.23-10sarge1_hppa.deb stable/main/binary-hppa/cupsys-bsd_1.1.23-10sarge1_hppa.deb stable/main/binary-hppa/libcupsys2-dev_1.1.23-10sarge1_hppa.deb stable/main/binary-hppa/libcupsys2-gnutls10_1.1.23-10sarge1_hppa.deb stable/main/binary-hppa/libcupsimage2_1.1.23-10sarge1_hppa.deb stable/main/binary-hppa/cupsys_1.1.23-10sarge1_hppa.deb stable/main/binary-hppa/libcupsimage2-dev_1.1.23-10sarge1_hppa.deb cupsys (1.1.23-10sarge1) stable-security; urgency=high * Non-maintainer upload by the Security Team * Applied xpdf patch to fix buffer overflows [pdftops/Stream.cxx, pdftops/Stream.h, CAN-2005-3191, CAN-2005-3192, 46_security_CAN-2005-3191.dpatch] stable/main/binary-arm/libcupsys2-dev_1.1.23-10sarge1_arm.deb stable/main/binary-arm/cupsys-client_1.1.23-10sarge1_arm.deb stable/main/binary-arm/libcupsimage2-dev_1.1.23-10sarge1_arm.deb stable/main/binary-arm/cupsys_1.1.23-10sarge1_arm.deb stable/main/binary-arm/libcupsys2-gnutls10_1.1.23-10sarge1_arm.deb stable/main/binary-arm/cupsys-bsd_1.1.23-10sarge1_arm.deb stable/main/binary-arm/libcupsimage2_1.1.23-10sarge1_arm.deb cupsys (1.1.23-10sarge1) stable-security; urgency=high * Non-maintainer upload by the Security Team * Applied xpdf patch to fix buffer overflows [pdftops/Stream.cxx, pdftops/Stream.h, CAN-2005-3191, CAN-2005-3192, 46_security_CAN-2005-3191.dpatch] stable/main/binary-alpha/cupsys-client_1.1.23-10sarge1_alpha.deb stable/main/binary-alpha/libcupsys2-gnutls10_1.1.23-10sarge1_alpha.deb stable/main/binary-alpha/libcupsimage2_1.1.23-10sarge1_alpha.deb stable/main/binary-alpha/cupsys-bsd_1.1.23-10sarge1_alpha.deb stable/main/binary-alpha/libcupsys2-dev_1.1.23-10sarge1_alpha.deb stable/main/binary-alpha/cupsys_1.1.23-10sarge1_alpha.deb stable/main/binary-alpha/libcupsimage2-dev_1.1.23-10sarge1_alpha.deb cupsys (1.1.23-10sarge1) stable-security; urgency=high * Non-maintainer upload by the Security Team * Applied xpdf patch to fix buffer overflows [pdftops/Stream.cxx, pdftops/Stream.h, CAN-2005-3191, CAN-2005-3192, 46_security_CAN-2005-3191.dpatch] stable/main/binary-powerpc/cupsys_1.1.23-10sarge1_powerpc.deb stable/main/binary-powerpc/libcupsimage2_1.1.23-10sarge1_powerpc.deb stable/main/binary-powerpc/libcupsimage2-dev_1.1.23-10sarge1_powerpc.deb stable/main/source/cupsys_1.1.23-10sarge1.diff.gz stable/main/binary-powerpc/libcupsys2-dev_1.1.23-10sarge1_powerpc.deb stable/main/binary-powerpc/cupsys-bsd_1.1.23-10sarge1_powerpc.deb stable/main/binary-all/libcupsys2_1.1.23-10sarge1_all.deb stable/main/binary-powerpc/cupsys-client_1.1.23-10sarge1_powerpc.deb stable/main/source/cupsys_1.1.23-10sarge1.dsc stable/main/binary-powerpc/libcupsys2-gnutls10_1.1.23-10sarge1_powerpc.deb cupsys (1.1.23-10sarge1) stable-security; urgency=high * Non-maintainer upload by the Security Team * Applied xpdf patch to fix buffer overflows [pdftops/Stream.cxx, pdftops/Stream.h, CAN-2005-3191, CAN-2005-3192, 46_security_CAN-2005-3191.dpatch] stable/main/binary-sparc/crossfire-server_1.6.0.dfsg.1-4sarge2_sparc.deb stable/main/binary-sparc/crossfire-edit_1.6.0.dfsg.1-4sarge2_sparc.deb crossfire (1.6.0.dfsg.1-4sarge2) stable-security; urgency=high * Non-maintainer upload by the Security Team: * Backported upstream patch to fix arbitrary code execution via a buffer overflow [socket/request.c, CVE-2006-1236] stable/main/binary-s390/crossfire-server_1.6.0.dfsg.1-4sarge2_s390.deb stable/main/binary-s390/crossfire-edit_1.6.0.dfsg.1-4sarge2_s390.deb crossfire (1.6.0.dfsg.1-4sarge2) stable-security; urgency=high * Non-maintainer upload by the Security Team: * Backported upstream patch to fix arbitrary code execution via a buffer overflow [socket/request.c, CVE-2006-1236] stable/main/binary-mipsel/crossfire-server_1.6.0.dfsg.1-4sarge2_mipsel.deb stable/main/binary-mipsel/crossfire-edit_1.6.0.dfsg.1-4sarge2_mipsel.deb crossfire (1.6.0.dfsg.1-4sarge2) stable-security; urgency=high * Non-maintainer upload by the Security Team: * Backported upstream patch to fix arbitrary code execution via a buffer overflow [socket/request.c, CVE-2006-1236] stable/main/binary-mips/crossfire-edit_1.6.0.dfsg.1-4sarge2_mips.deb stable/main/binary-mips/crossfire-server_1.6.0.dfsg.1-4sarge2_mips.deb crossfire (1.6.0.dfsg.1-4sarge2) stable-security; urgency=high * Non-maintainer upload by the Security Team: * Backported upstream patch to fix arbitrary code execution via a buffer overflow [socket/request.c, CVE-2006-1236] stable/main/binary-m68k/crossfire-edit_1.6.0.dfsg.1-4sarge2_m68k.deb stable/main/binary-m68k/crossfire-server_1.6.0.dfsg.1-4sarge2_m68k.deb crossfire (1.6.0.dfsg.1-4sarge2) stable-security; urgency=high * Non-maintainer upload by the Security Team: * Backported upstream patch to fix arbitrary code execution via a buffer overflow [socket/request.c, CVE-2006-1236] stable/main/binary-ia64/crossfire-edit_1.6.0.dfsg.1-4sarge2_ia64.deb stable/main/binary-ia64/crossfire-server_1.6.0.dfsg.1-4sarge2_ia64.deb crossfire (1.6.0.dfsg.1-4sarge2) stable-security; urgency=high * Non-maintainer upload by the Security Team: * Backported upstream patch to fix arbitrary code execution via a buffer overflow [socket/request.c, CVE-2006-1236] stable/main/binary-i386/crossfire-server_1.6.0.dfsg.1-4sarge2_i386.deb stable/main/binary-i386/crossfire-edit_1.6.0.dfsg.1-4sarge2_i386.deb crossfire (1.6.0.dfsg.1-4sarge2) stable-security; urgency=high * Non-maintainer upload by the Security Team: * Backported upstream patch to fix arbitrary code execution via a buffer overflow [socket/request.c, CVE-2006-1236] stable/main/binary-hppa/crossfire-edit_1.6.0.dfsg.1-4sarge2_hppa.deb stable/main/binary-hppa/crossfire-server_1.6.0.dfsg.1-4sarge2_hppa.deb crossfire (1.6.0.dfsg.1-4sarge2) stable-security; urgency=high * Non-maintainer upload by the Security Team: * Backported upstream patch to fix arbitrary code execution via a buffer overflow [socket/request.c, CVE-2006-1236] stable/main/binary-arm/crossfire-edit_1.6.0.dfsg.1-4sarge2_arm.deb stable/main/binary-arm/crossfire-server_1.6.0.dfsg.1-4sarge2_arm.deb crossfire (1.6.0.dfsg.1-4sarge2) stable-security; urgency=high * Non-maintainer upload by the Security Team: * Backported upstream patch to fix arbitrary code execution via a buffer overflow [socket/request.c, CVE-2006-1236] stable/main/binary-alpha/crossfire-edit_1.6.0.dfsg.1-4sarge2_alpha.deb stable/main/binary-alpha/crossfire-server_1.6.0.dfsg.1-4sarge2_alpha.deb crossfire (1.6.0.dfsg.1-4sarge2) stable-security; urgency=high * Non-maintainer upload by the Security Team: * Backported upstream patch to fix arbitrary code execution via a buffer overflow [socket/request.c, CVE-2006-1236] stable/main/binary-all/crossfire-doc_1.6.0.dfsg.1-4sarge2_all.deb stable/main/binary-powerpc/crossfire-edit_1.6.0.dfsg.1-4sarge2_powerpc.deb stable/main/source/crossfire_1.6.0.dfsg.1-4sarge2.diff.gz stable/main/source/crossfire_1.6.0.dfsg.1-4sarge2.dsc stable/main/binary-powerpc/crossfire-server_1.6.0.dfsg.1-4sarge2_powerpc.deb crossfire (1.6.0.dfsg.1-4sarge2) stable-security; urgency=high * Non-maintainer upload by the Security Team: * Backported upstream patch to fix arbitrary code execution via a buffer overflow [socket/request.c, CVE-2006-1236] stable/main/binary-sparc/crawl_4.0.0beta26-4sarge0_sparc.deb crawl (1:4.0.0beta26-4sarge0) stable-security; urgency=high * Non-maintainer upload by The Security Team. * Fix the insecure execution of external commands. [CVE-2006-0044] stable/main/binary-s390/crawl_4.0.0beta26-4sarge0_s390.deb crawl (1:4.0.0beta26-4sarge0) stable-security; urgency=high * Non-maintainer upload by The Security Team. * Fix the insecure execution of external commands. [CVE-2006-0044] stable/main/binary-powerpc/crawl_4.0.0beta26-4sarge0_powerpc.deb crawl (1:4.0.0beta26-4sarge0) stable-security; urgency=high * Non-maintainer upload by The Security Team. * Fix the insecure execution of external commands. [CVE-2006-0044] stable/main/binary-mipsel/crawl_4.0.0beta26-4sarge0_mipsel.deb crawl (1:4.0.0beta26-4sarge0) stable-security; urgency=high * Non-maintainer upload by The Security Team. * Fix the insecure execution of external commands. [CVE-2006-0044] stable/main/binary-mips/crawl_4.0.0beta26-4sarge0_mips.deb crawl (1:4.0.0beta26-4sarge0) stable-security; urgency=high * Non-maintainer upload by The Security Team. * Fix the insecure execution of external commands. [CVE-2006-0044] stable/main/binary-m68k/crawl_4.0.0beta26-4sarge0_m68k.deb crawl (1:4.0.0beta26-4sarge0) stable-security; urgency=high * Non-maintainer upload by The Security Team. * Fix the insecure execution of external commands. [CVE-2006-0044] stable/main/binary-ia64/crawl_4.0.0beta26-4sarge0_ia64.deb crawl (1:4.0.0beta26-4sarge0) stable-security; urgency=high * Non-maintainer upload by The Security Team. * Fix the insecure execution of external commands. [CVE-2006-0044] stable/main/binary-hppa/crawl_4.0.0beta26-4sarge0_hppa.deb crawl (1:4.0.0beta26-4sarge0) stable-security; urgency=high * Non-maintainer upload by The Security Team. * Fix the insecure execution of external commands. [CVE-2006-0044] stable/main/binary-arm/crawl_4.0.0beta26-4sarge0_arm.deb crawl (1:4.0.0beta26-4sarge0) stable-security; urgency=high * Non-maintainer upload by The Security Team. * Fix the insecure execution of external commands. [CVE-2006-0044] stable/main/binary-alpha/crawl_4.0.0beta26-4sarge0_alpha.deb crawl (1:4.0.0beta26-4sarge0) stable-security; urgency=high * Non-maintainer upload by The Security Team. * Fix the insecure execution of external commands. [CVE-2006-0044] stable/main/binary-i386/crawl_4.0.0beta26-4sarge0_i386.deb stable/main/source/crawl_4.0.0beta26-4sarge0.diff.gz stable/main/source/crawl_4.0.0beta26-4sarge0.dsc crawl (1:4.0.0beta26-4sarge0) stable-security; urgency=high * Non-maintainer upload by The Security Team. * Fix the insecure execution of external commands. [CVE-2006-0044] stable/main/binary-sparc/clamav_0.84-2.sarge.8_sparc.deb stable/main/binary-sparc/clamav-freshclam_0.84-2.sarge.8_sparc.deb stable/main/binary-sparc/clamav-milter_0.84-2.sarge.8_sparc.deb stable/main/binary-sparc/libclamav1_0.84-2.sarge.8_sparc.deb stable/main/binary-sparc/clamav-daemon_0.84-2.sarge.8_sparc.deb stable/main/binary-sparc/libclamav-dev_0.84-2.sarge.8_sparc.deb clamav (0.84-2.sarge.8) stable-security; urgency=high * shared/output.c: format string vulnerabilities [CVE-2006-1615] * libclamav/others.c: crash (DoS) in cli_bitset_test * libclamav/pe.c, libclamav/others.h: fix possible integer overflow [CVE-2006-1614] stable/main/binary-s390/libclamav1_0.84-2.sarge.8_s390.deb stable/main/binary-s390/libclamav-dev_0.84-2.sarge.8_s390.deb stable/main/binary-s390/clamav-daemon_0.84-2.sarge.8_s390.deb stable/main/binary-s390/clamav_0.84-2.sarge.8_s390.deb stable/main/binary-s390/clamav-freshclam_0.84-2.sarge.8_s390.deb stable/main/binary-s390/clamav-milter_0.84-2.sarge.8_s390.deb clamav (0.84-2.sarge.8) stable-security; urgency=high * shared/output.c: format string vulnerabilities [CVE-2006-1615] * libclamav/others.c: crash (DoS) in cli_bitset_test * libclamav/pe.c, libclamav/others.h: fix possible integer overflow [CVE-2006-1614] stable/main/binary-powerpc/libclamav-dev_0.84-2.sarge.8_powerpc.deb stable/main/binary-powerpc/clamav_0.84-2.sarge.8_powerpc.deb stable/main/binary-powerpc/clamav-milter_0.84-2.sarge.8_powerpc.deb stable/main/binary-powerpc/clamav-daemon_0.84-2.sarge.8_powerpc.deb stable/main/binary-powerpc/libclamav1_0.84-2.sarge.8_powerpc.deb stable/main/binary-powerpc/clamav-freshclam_0.84-2.sarge.8_powerpc.deb clamav (0.84-2.sarge.8) stable-security; urgency=high * shared/output.c: format string vulnerabilities [CVE-2006-1615] * libclamav/others.c: crash (DoS) in cli_bitset_test * libclamav/pe.c, libclamav/others.h: fix possible integer overflow [CVE-2006-1614] stable/main/binary-mipsel/libclamav1_0.84-2.sarge.8_mipsel.deb stable/main/binary-mipsel/clamav-freshclam_0.84-2.sarge.8_mipsel.deb stable/main/binary-mipsel/libclamav-dev_0.84-2.sarge.8_mipsel.deb stable/main/binary-mipsel/clamav_0.84-2.sarge.8_mipsel.deb stable/main/binary-mipsel/clamav-milter_0.84-2.sarge.8_mipsel.deb stable/main/binary-mipsel/clamav-daemon_0.84-2.sarge.8_mipsel.deb clamav (0.84-2.sarge.8) stable-security; urgency=high * shared/output.c: format string vulnerabilities [CVE-2006-1615] * libclamav/others.c: crash (DoS) in cli_bitset_test * libclamav/pe.c, libclamav/others.h: fix possible integer overflow [CVE-2006-1614] stable/main/binary-mips/libclamav1_0.84-2.sarge.8_mips.deb stable/main/binary-mips/libclamav-dev_0.84-2.sarge.8_mips.deb stable/main/binary-mips/clamav-freshclam_0.84-2.sarge.8_mips.deb stable/main/binary-mips/clamav_0.84-2.sarge.8_mips.deb stable/main/binary-mips/clamav-daemon_0.84-2.sarge.8_mips.deb stable/main/binary-mips/clamav-milter_0.84-2.sarge.8_mips.deb clamav (0.84-2.sarge.8) stable-security; urgency=high * shared/output.c: format string vulnerabilities [CVE-2006-1615] * libclamav/others.c: crash (DoS) in cli_bitset_test * libclamav/pe.c, libclamav/others.h: fix possible integer overflow [CVE-2006-1614] stable/main/binary-m68k/clamav-freshclam_0.84-2.sarge.8_m68k.deb stable/main/binary-m68k/clamav_0.84-2.sarge.8_m68k.deb stable/main/binary-m68k/clamav-milter_0.84-2.sarge.8_m68k.deb stable/main/binary-m68k/libclamav-dev_0.84-2.sarge.8_m68k.deb stable/main/binary-m68k/libclamav1_0.84-2.sarge.8_m68k.deb stable/main/binary-m68k/clamav-daemon_0.84-2.sarge.8_m68k.deb clamav (0.84-2.sarge.8) stable-security; urgency=high * shared/output.c: format string vulnerabilities [CVE-2006-1615] * libclamav/others.c: crash (DoS) in cli_bitset_test * libclamav/pe.c, libclamav/others.h: fix possible integer overflow [CVE-2006-1614] stable/main/binary-ia64/clamav-daemon_0.84-2.sarge.8_ia64.deb stable/main/binary-ia64/libclamav-dev_0.84-2.sarge.8_ia64.deb stable/main/binary-ia64/libclamav1_0.84-2.sarge.8_ia64.deb stable/main/binary-ia64/clamav_0.84-2.sarge.8_ia64.deb stable/main/binary-ia64/clamav-milter_0.84-2.sarge.8_ia64.deb stable/main/binary-ia64/clamav-freshclam_0.84-2.sarge.8_ia64.deb clamav (0.84-2.sarge.8) stable-security; urgency=high * shared/output.c: format string vulnerabilities [CVE-2006-1615] * libclamav/others.c: crash (DoS) in cli_bitset_test * libclamav/pe.c, libclamav/others.h: fix possible integer overflow [CVE-2006-1614] stable/main/binary-hppa/clamav-milter_0.84-2.sarge.8_hppa.deb stable/main/binary-hppa/libclamav-dev_0.84-2.sarge.8_hppa.deb stable/main/binary-hppa/clamav-daemon_0.84-2.sarge.8_hppa.deb stable/main/binary-hppa/libclamav1_0.84-2.sarge.8_hppa.deb stable/main/binary-hppa/clamav_0.84-2.sarge.8_hppa.deb stable/main/binary-hppa/clamav-freshclam_0.84-2.sarge.8_hppa.deb clamav (0.84-2.sarge.8) stable-security; urgency=high * shared/output.c: format string vulnerabilities [CVE-2006-1615] * libclamav/others.c: crash (DoS) in cli_bitset_test * libclamav/pe.c, libclamav/others.h: fix possible integer overflow [CVE-2006-1614] stable/main/binary-arm/clamav_0.84-2.sarge.8_arm.deb stable/main/binary-arm/clamav-freshclam_0.84-2.sarge.8_arm.deb stable/main/binary-arm/clamav-milter_0.84-2.sarge.8_arm.deb stable/main/binary-arm/libclamav1_0.84-2.sarge.8_arm.deb stable/main/binary-arm/libclamav-dev_0.84-2.sarge.8_arm.deb stable/main/binary-arm/clamav-daemon_0.84-2.sarge.8_arm.deb clamav (0.84-2.sarge.8) stable-security; urgency=high * shared/output.c: format string vulnerabilities [CVE-2006-1615] * libclamav/others.c: crash (DoS) in cli_bitset_test * libclamav/pe.c, libclamav/others.h: fix possible integer overflow [CVE-2006-1614] stable/main/binary-alpha/libclamav-dev_0.84-2.sarge.8_alpha.deb stable/main/binary-alpha/libclamav1_0.84-2.sarge.8_alpha.deb stable/main/binary-alpha/clamav-milter_0.84-2.sarge.8_alpha.deb stable/main/binary-alpha/clamav-freshclam_0.84-2.sarge.8_alpha.deb stable/main/binary-alpha/clamav-daemon_0.84-2.sarge.8_alpha.deb stable/main/binary-alpha/clamav_0.84-2.sarge.8_alpha.deb clamav (0.84-2.sarge.8) stable-security; urgency=high * shared/output.c: format string vulnerabilities [CVE-2006-1615] * libclamav/others.c: crash (DoS) in cli_bitset_test * libclamav/pe.c, libclamav/others.h: fix possible integer overflow [CVE-2006-1614] stable/main/binary-all/clamav-testfiles_0.84-2.sarge.8_all.deb stable/main/binary-i386/libclamav1_0.84-2.sarge.8_i386.deb stable/main/binary-i386/clamav_0.84-2.sarge.8_i386.deb stable/main/binary-i386/clamav-milter_0.84-2.sarge.8_i386.deb stable/main/source/clamav_0.84-2.sarge.8.diff.gz stable/main/binary-i386/clamav-freshclam_0.84-2.sarge.8_i386.deb stable/main/binary-all/clamav-docs_0.84-2.sarge.8_all.deb stable/main/source/clamav_0.84-2.sarge.8.dsc stable/main/binary-i386/libclamav-dev_0.84-2.sarge.8_i386.deb stable/main/binary-i386/clamav-daemon_0.84-2.sarge.8_i386.deb stable/main/binary-all/clamav-base_0.84-2.sarge.8_all.deb clamav (0.84-2.sarge.8) stable-security; urgency=high * shared/output.c: format string vulnerabilities [CVE-2006-1615] * libclamav/others.c: crash (DoS) in cli_bitset_test * libclamav/pe.c, libclamav/others.h: fix possible integer overflow [CVE-2006-1614] stable/main/binary-sparc/libgeant1_2004.11.04.dfsg-0sarge1_sparc.deb stable/main/binary-sparc/paw-static_2004.11.04.dfsg-0sarge1_sparc.deb stable/main/binary-sparc/pawserv_2004.11.04.dfsg-0sarge1_sparc.deb stable/main/binary-sparc/dzedit_2004.11.04.dfsg-0sarge1_sparc.deb stable/main/binary-sparc/libherwig59-dev_2004.11.04.dfsg-0sarge1_sparc.deb stable/main/binary-sparc/kuipc_2004.11.04.dfsg-0sarge1_sparc.deb stable/main/binary-sparc/libgrafx11-1_2004.11.04.dfsg-0sarge1_sparc.deb stable/main/binary-sparc/libpaw1_2004.11.04.dfsg-0sarge1_sparc.deb stable/main/binary-sparc/libeurodec1_2004.11.04.dfsg-0sarge1_sparc.deb stable/main/binary-sparc/libgraflib1-dev_2004.11.04.dfsg-0sarge1_sparc.deb stable/main/binary-sparc/libphtools1_2004.11.04.dfsg-0sarge1_sparc.deb stable/main/binary-sparc/libphotos202-dev_2004.11.04.dfsg-0sarge1_sparc.deb stable/main/binary-sparc/libgrafx11-1-dev_2004.11.04.dfsg-0sarge1_sparc.deb stable/main/binary-sparc/libcojets1_2004.11.04.dfsg-0sarge1_sparc.deb stable/main/binary-sparc/libpacklib1-dev_2004.11.04.dfsg-0sarge1_sparc.deb stable/main/binary-sparc/libpaw1-dev_2004.11.04.dfsg-0sarge1_sparc.deb stable/main/binary-sparc/libmathlib1_2004.11.04.dfsg-0sarge1_sparc.deb stable/main/binary-sparc/libisajet758_2004.11.04.dfsg-0sarge1_sparc.deb stable/main/binary-sparc/libpdflib804_2004.11.04.dfsg-0sarge1_sparc.deb stable/main/binary-sparc/libphotos202_2004.11.04.dfsg-0sarge1_sparc.deb stable/main/binary-sparc/paw++-static_2004.11.04.dfsg-0sarge1_sparc.deb stable/main/binary-sparc/zftp_2004.11.04.dfsg-0sarge1_sparc.deb stable/main/binary-sparc/libisajet758-dev_2004.11.04.dfsg-0sarge1_sparc.deb stable/main/binary-sparc/libpacklib1_2004.11.04.dfsg-0sarge1_sparc.deb stable/main/binary-sparc/libkernlib1_2004.11.04.dfsg-0sarge1_sparc.deb stable/main/binary-sparc/libherwig59_2004.11.04.dfsg-0sarge1_sparc.deb stable/main/binary-sparc/libphtools1-dev_2004.11.04.dfsg-0sarge1_sparc.deb stable/main/binary-sparc/libkernlib1-dev_2004.11.04.dfsg-0sarge1_sparc.deb stable/main/binary-sparc/libmathlib1-dev_2004.11.04.dfsg-0sarge1_sparc.deb stable/main/binary-sparc/libgraflib1_2004.11.04.dfsg-0sarge1_sparc.deb stable/main/binary-sparc/libcojets1-dev_2004.11.04.dfsg-0sarge1_sparc.deb stable/main/binary-sparc/kxterm_2004.11.04.dfsg-0sarge1_sparc.deb stable/main/binary-sparc/libeurodec1-dev_2004.11.04.dfsg-0sarge1_sparc.deb stable/main/binary-sparc/paw++_2004.11.04.dfsg-0sarge1_sparc.deb stable/main/binary-sparc/libkuipx11-1-dev_2004.11.04.dfsg-0sarge1_sparc.deb stable/main/binary-sparc/libgeant1-dev_2004.11.04.dfsg-0sarge1_sparc.deb stable/main/binary-sparc/paw_2004.11.04.dfsg-0sarge1_sparc.deb stable/main/binary-sparc/libkuipx11-1_2004.11.04.dfsg-0sarge1_sparc.deb stable/main/binary-sparc/libpdflib804-dev_2004.11.04.dfsg-0sarge1_sparc.deb cernlib (2004.11.04.dfsg-0sarge1) stable; urgency=low * Upload repacked orig.tar.gz targeted to Sarge for licensing reasons. Mirrors the parallel upload of 2005.05.09.dfsg-1 to unstable. * Removed the directories src/geant321/peanut and src/geant321/block, as well as a number of include files in src/geant321/geant321 (see debian/deadpool.txt for details). These are all part of GEANT-FLUKA (they were previously overlooked in the first purge of FLUKA code) and therefore cannot be included in Debian. In addition, removed the directory src/geant321/fiface and the files src/geant321/miface/{gfmdis.F,gfmfin.F} as they are useless without FLUKA. (closes: #340433) - Necessitates repacking the orig.tar.gz ("new" upstream version). - Files added to debian/local/deadpool.txt and debian/copyright. - Patch 007: revised to skip these directories as well as src/geant321/fluka. - debian/generic/patches/additions/geant321+gkine+dummy.c: to keep ABI compatibility of the library, we have to add in dummy functions and COMMON blocks to replace the removed code. - debian/rules: Bump the shlib version required by code built against libgeant1, as the dummy COMMON blocks may in some cases be slightly larger than the real ones. (Does not break the ABI, as FORTRAN COMMON blocks are always global and never nested or passed between functions.) - Additional removals noted in the README.Debian files for the affected binary packages: geant321, libgeant1, libgeant1-dev. - debian/NEWS: Comment on the new round of code removal. * debian/control: Update maintainer email. stable/main/binary-s390/libeurodec1_2004.11.04.dfsg-0sarge1_s390.deb stable/main/binary-s390/libisajet758_2004.11.04.dfsg-0sarge1_s390.deb stable/main/binary-s390/libpdflib804-dev_2004.11.04.dfsg-0sarge1_s390.deb stable/main/binary-s390/libkuipx11-1_2004.11.04.dfsg-0sarge1_s390.deb stable/main/binary-s390/libphotos202-dev_2004.11.04.dfsg-0sarge1_s390.deb stable/main/binary-s390/paw++-static_2004.11.04.dfsg-0sarge1_s390.deb stable/main/binary-s390/libherwig59-dev_2004.11.04.dfsg-0sarge1_s390.deb stable/main/binary-s390/libkuipx11-1-dev_2004.11.04.dfsg-0sarge1_s390.deb stable/main/binary-s390/libeurodec1-dev_2004.11.04.dfsg-0sarge1_s390.deb stable/main/binary-s390/libphtools1-dev_2004.11.04.dfsg-0sarge1_s390.deb stable/main/binary-s390/libgrafx11-1-dev_2004.11.04.dfsg-0sarge1_s390.deb stable/main/binary-s390/libcojets1_2004.11.04.dfsg-0sarge1_s390.deb stable/main/binary-s390/libgeant1-dev_2004.11.04.dfsg-0sarge1_s390.deb stable/main/binary-s390/dzedit_2004.11.04.dfsg-0sarge1_s390.deb stable/main/binary-s390/libpdflib804_2004.11.04.dfsg-0sarge1_s390.deb stable/main/binary-s390/kuipc_2004.11.04.dfsg-0sarge1_s390.deb stable/main/binary-s390/libphotos202_2004.11.04.dfsg-0sarge1_s390.deb stable/main/binary-s390/libgraflib1_2004.11.04.dfsg-0sarge1_s390.deb stable/main/binary-s390/libmathlib1-dev_2004.11.04.dfsg-0sarge1_s390.deb stable/main/binary-s390/libherwig59_2004.11.04.dfsg-0sarge1_s390.deb stable/main/binary-s390/libisajet758-dev_2004.11.04.dfsg-0sarge1_s390.deb stable/main/binary-s390/libpaw1-dev_2004.11.04.dfsg-0sarge1_s390.deb stable/main/binary-s390/pawserv_2004.11.04.dfsg-0sarge1_s390.deb stable/main/binary-s390/kxterm_2004.11.04.dfsg-0sarge1_s390.deb stable/main/binary-s390/libpaw1_2004.11.04.dfsg-0sarge1_s390.deb stable/main/binary-s390/zftp_2004.11.04.dfsg-0sarge1_s390.deb stable/main/binary-s390/libphtools1_2004.11.04.dfsg-0sarge1_s390.deb stable/main/binary-s390/libgeant1_2004.11.04.dfsg-0sarge1_s390.deb stable/main/binary-s390/libpacklib1-dev_2004.11.04.dfsg-0sarge1_s390.deb stable/main/binary-s390/libkernlib1-dev_2004.11.04.dfsg-0sarge1_s390.deb stable/main/binary-s390/libgraflib1-dev_2004.11.04.dfsg-0sarge1_s390.deb stable/main/binary-s390/libgrafx11-1_2004.11.04.dfsg-0sarge1_s390.deb stable/main/binary-s390/libcojets1-dev_2004.11.04.dfsg-0sarge1_s390.deb stable/main/binary-s390/paw++_2004.11.04.dfsg-0sarge1_s390.deb stable/main/binary-s390/paw-static_2004.11.04.dfsg-0sarge1_s390.deb stable/main/binary-s390/libpacklib1_2004.11.04.dfsg-0sarge1_s390.deb stable/main/binary-s390/libmathlib1_2004.11.04.dfsg-0sarge1_s390.deb stable/main/binary-s390/paw_2004.11.04.dfsg-0sarge1_s390.deb stable/main/binary-s390/libkernlib1_2004.11.04.dfsg-0sarge1_s390.deb cernlib (2004.11.04.dfsg-0sarge1) stable; urgency=low * Upload repacked orig.tar.gz targeted to Sarge for licensing reasons. Mirrors the parallel upload of 2005.05.09.dfsg-1 to unstable. * Removed the directories src/geant321/peanut and src/geant321/block, as well as a number of include files in src/geant321/geant321 (see debian/deadpool.txt for details). These are all part of GEANT-FLUKA (they were previously overlooked in the first purge of FLUKA code) and therefore cannot be included in Debian. In addition, removed the directory src/geant321/fiface and the files src/geant321/miface/{gfmdis.F,gfmfin.F} as they are useless without FLUKA. (closes: #340433) - Necessitates repacking the orig.tar.gz ("new" upstream version). - Files added to debian/local/deadpool.txt and debian/copyright. - Patch 007: revised to skip these directories as well as src/geant321/fluka. - debian/generic/patches/additions/geant321+gkine+dummy.c: to keep ABI compatibility of the library, we have to add in dummy functions and COMMON blocks to replace the removed code. - debian/rules: Bump the shlib version required by code built against libgeant1, as the dummy COMMON blocks may in some cases be slightly larger than the real ones. (Does not break the ABI, as FORTRAN COMMON blocks are always global and never nested or passed between functions.) - Additional removals noted in the README.Debian files for the affected binary packages: geant321, libgeant1, libgeant1-dev. - debian/NEWS: Comment on the new round of code removal. * debian/control: Update maintainer email. stable/main/binary-powerpc/libgrafx11-1-dev_2004.11.04.dfsg-0sarge1_powerpc.deb stable/main/binary-powerpc/libgraflib1_2004.11.04.dfsg-0sarge1_powerpc.deb stable/main/binary-powerpc/libphtools1_2004.11.04.dfsg-0sarge1_powerpc.deb stable/main/binary-powerpc/paw++_2004.11.04.dfsg-0sarge1_powerpc.deb stable/main/binary-powerpc/libkernlib1-dev_2004.11.04.dfsg-0sarge1_powerpc.deb stable/main/binary-powerpc/libisajet758_2004.11.04.dfsg-0sarge1_powerpc.deb stable/main/binary-powerpc/pawserv_2004.11.04.dfsg-0sarge1_powerpc.deb stable/main/binary-powerpc/libgeant1-dev_2004.11.04.dfsg-0sarge1_powerpc.deb stable/main/binary-powerpc/libeurodec1_2004.11.04.dfsg-0sarge1_powerpc.deb stable/main/binary-powerpc/kuipc_2004.11.04.dfsg-0sarge1_powerpc.deb stable/main/binary-powerpc/libcojets1-dev_2004.11.04.dfsg-0sarge1_powerpc.deb stable/main/binary-powerpc/paw_2004.11.04.dfsg-0sarge1_powerpc.deb stable/main/binary-powerpc/paw-static_2004.11.04.dfsg-0sarge1_powerpc.deb stable/main/binary-powerpc/libmathlib1_2004.11.04.dfsg-0sarge1_powerpc.deb stable/main/binary-powerpc/libgeant1_2004.11.04.dfsg-0sarge1_powerpc.deb stable/main/binary-powerpc/libpacklib1_2004.11.04.dfsg-0sarge1_powerpc.deb stable/main/binary-powerpc/libpacklib1-dev_2004.11.04.dfsg-0sarge1_powerpc.deb stable/main/binary-powerpc/libpdflib804-dev_2004.11.04.dfsg-0sarge1_powerpc.deb stable/main/binary-powerpc/libcojets1_2004.11.04.dfsg-0sarge1_powerpc.deb stable/main/binary-powerpc/libisajet758-dev_2004.11.04.dfsg-0sarge1_powerpc.deb stable/main/binary-powerpc/zftp_2004.11.04.dfsg-0sarge1_powerpc.deb stable/main/binary-powerpc/dzedit_2004.11.04.dfsg-0sarge1_powerpc.deb stable/main/binary-powerpc/libpdflib804_2004.11.04.dfsg-0sarge1_powerpc.deb stable/main/binary-powerpc/libkuipx11-1-dev_2004.11.04.dfsg-0sarge1_powerpc.deb stable/main/binary-powerpc/libphotos202-dev_2004.11.04.dfsg-0sarge1_powerpc.deb stable/main/binary-powerpc/kxterm_2004.11.04.dfsg-0sarge1_powerpc.deb stable/main/binary-powerpc/libkernlib1_2004.11.04.dfsg-0sarge1_powerpc.deb stable/main/binary-powerpc/libeurodec1-dev_2004.11.04.dfsg-0sarge1_powerpc.deb stable/main/binary-powerpc/libphotos202_2004.11.04.dfsg-0sarge1_powerpc.deb stable/main/binary-powerpc/libmathlib1-dev_2004.11.04.dfsg-0sarge1_powerpc.deb stable/main/binary-powerpc/libpaw1_2004.11.04.dfsg-0sarge1_powerpc.deb stable/main/binary-powerpc/libpaw1-dev_2004.11.04.dfsg-0sarge1_powerpc.deb stable/main/binary-powerpc/libherwig59_2004.11.04.dfsg-0sarge1_powerpc.deb stable/main/binary-powerpc/libgrafx11-1_2004.11.04.dfsg-0sarge1_powerpc.deb stable/main/binary-powerpc/libherwig59-dev_2004.11.04.dfsg-0sarge1_powerpc.deb stable/main/binary-powerpc/libphtools1-dev_2004.11.04.dfsg-0sarge1_powerpc.deb stable/main/binary-powerpc/paw++-static_2004.11.04.dfsg-0sarge1_powerpc.deb stable/main/binary-powerpc/libgraflib1-dev_2004.11.04.dfsg-0sarge1_powerpc.deb stable/main/binary-powerpc/libkuipx11-1_2004.11.04.dfsg-0sarge1_powerpc.deb cernlib (2004.11.04.dfsg-0sarge1) stable; urgency=low * Upload repacked orig.tar.gz targeted to Sarge for licensing reasons. Mirrors the parallel upload of 2005.05.09.dfsg-1 to unstable. * Removed the directories src/geant321/peanut and src/geant321/block, as well as a number of include files in src/geant321/geant321 (see debian/deadpool.txt for details). These are all part of GEANT-FLUKA (they were previously overlooked in the first purge of FLUKA code) and therefore cannot be included in Debian. In addition, removed the directory src/geant321/fiface and the files src/geant321/miface/{gfmdis.F,gfmfin.F} as they are useless without FLUKA. (closes: #340433) - Necessitates repacking the orig.tar.gz ("new" upstream version). - Files added to debian/local/deadpool.txt and debian/copyright. - Patch 007: revised to skip these directories as well as src/geant321/fluka. - debian/generic/patches/additions/geant321+gkine+dummy.c: to keep ABI compatibility of the library, we have to add in dummy functions and COMMON blocks to replace the removed code. - debian/rules: Bump the shlib version required by code built against libgeant1, as the dummy COMMON blocks may in some cases be slightly larger than the real ones. (Does not break the ABI, as FORTRAN COMMON blocks are always global and never nested or passed between functions.) - Additional removals noted in the README.Debian files for the affected binary packages: geant321, libgeant1, libgeant1-dev. - debian/NEWS: Comment on the new round of code removal. * debian/control: Update maintainer email. stable/main/binary-mipsel/paw_2004.11.04.dfsg-0sarge1_mipsel.deb stable/main/binary-mipsel/dzedit_2004.11.04.dfsg-0sarge1_mipsel.deb stable/main/binary-mipsel/libherwig59-dev_2004.11.04.dfsg-0sarge1_mipsel.deb stable/main/binary-mipsel/kxterm_2004.11.04.dfsg-0sarge1_mipsel.deb stable/main/binary-mipsel/kuipc_2004.11.04.dfsg-0sarge1_mipsel.deb stable/main/binary-mipsel/pawserv_2004.11.04.dfsg-0sarge1_mipsel.deb stable/main/binary-mipsel/libgraflib1-dev_2004.11.04.dfsg-0sarge1_mipsel.deb stable/main/binary-mipsel/libeurodec1_2004.11.04.dfsg-0sarge1_mipsel.deb stable/main/binary-mipsel/libgrafx11-1_2004.11.04.dfsg-0sarge1_mipsel.deb stable/main/binary-mipsel/libcojets1-dev_2004.11.04.dfsg-0sarge1_mipsel.deb stable/main/binary-mipsel/libpacklib1_2004.11.04.dfsg-0sarge1_mipsel.deb stable/main/binary-mipsel/libeurodec1-dev_2004.11.04.dfsg-0sarge1_mipsel.deb stable/main/binary-mipsel/libgraflib1_2004.11.04.dfsg-0sarge1_mipsel.deb stable/main/binary-mipsel/libpdflib804-dev_2004.11.04.dfsg-0sarge1_mipsel.deb stable/main/binary-mipsel/libkernlib1_2004.11.04.dfsg-0sarge1_mipsel.deb stable/main/binary-mipsel/libpaw1-dev_2004.11.04.dfsg-0sarge1_mipsel.deb stable/main/binary-mipsel/libphotos202-dev_2004.11.04.dfsg-0sarge1_mipsel.deb stable/main/binary-mipsel/libisajet758_2004.11.04.dfsg-0sarge1_mipsel.deb stable/main/binary-mipsel/libphotos202_2004.11.04.dfsg-0sarge1_mipsel.deb stable/main/binary-mipsel/libkuipx11-1_2004.11.04.dfsg-0sarge1_mipsel.deb stable/main/binary-mipsel/paw-static_2004.11.04.dfsg-0sarge1_mipsel.deb stable/main/binary-mipsel/libphtools1_2004.11.04.dfsg-0sarge1_mipsel.deb stable/main/binary-mipsel/libgeant1_2004.11.04.dfsg-0sarge1_mipsel.deb stable/main/binary-mipsel/libphtools1-dev_2004.11.04.dfsg-0sarge1_mipsel.deb stable/main/binary-mipsel/libgrafx11-1-dev_2004.11.04.dfsg-0sarge1_mipsel.deb stable/main/binary-mipsel/libkuipx11-1-dev_2004.11.04.dfsg-0sarge1_mipsel.deb stable/main/binary-mipsel/libcojets1_2004.11.04.dfsg-0sarge1_mipsel.deb stable/main/binary-mipsel/zftp_2004.11.04.dfsg-0sarge1_mipsel.deb stable/main/binary-mipsel/paw++_2004.11.04.dfsg-0sarge1_mipsel.deb stable/main/binary-mipsel/libmathlib1-dev_2004.11.04.dfsg-0sarge1_mipsel.deb stable/main/binary-mipsel/libpacklib1-dev_2004.11.04.dfsg-0sarge1_mipsel.deb stable/main/binary-mipsel/libisajet758-dev_2004.11.04.dfsg-0sarge1_mipsel.deb stable/main/binary-mipsel/libpaw1_2004.11.04.dfsg-0sarge1_mipsel.deb stable/main/binary-mipsel/libmathlib1_2004.11.04.dfsg-0sarge1_mipsel.deb stable/main/binary-mipsel/libkernlib1-dev_2004.11.04.dfsg-0sarge1_mipsel.deb stable/main/binary-mipsel/libpdflib804_2004.11.04.dfsg-0sarge1_mipsel.deb stable/main/binary-mipsel/libgeant1-dev_2004.11.04.dfsg-0sarge1_mipsel.deb stable/main/binary-mipsel/libherwig59_2004.11.04.dfsg-0sarge1_mipsel.deb stable/main/binary-mipsel/paw++-static_2004.11.04.dfsg-0sarge1_mipsel.deb cernlib (2004.11.04.dfsg-0sarge1) stable; urgency=low * Upload repacked orig.tar.gz targeted to Sarge for licensing reasons. Mirrors the parallel upload of 2005.05.09.dfsg-1 to unstable. * Removed the directories src/geant321/peanut and src/geant321/block, as well as a number of include files in src/geant321/geant321 (see debian/deadpool.txt for details). These are all part of GEANT-FLUKA (they were previously overlooked in the first purge of FLUKA code) and therefore cannot be included in Debian. In addition, removed the directory src/geant321/fiface and the files src/geant321/miface/{gfmdis.F,gfmfin.F} as they are useless without FLUKA. (closes: #340433) - Necessitates repacking the orig.tar.gz ("new" upstream version). - Files added to debian/local/deadpool.txt and debian/copyright. - Patch 007: revised to skip these directories as well as src/geant321/fluka. - debian/generic/patches/additions/geant321+gkine+dummy.c: to keep ABI compatibility of the library, we have to add in dummy functions and COMMON blocks to replace the removed code. - debian/rules: Bump the shlib version required by code built against libgeant1, as the dummy COMMON blocks may in some cases be slightly larger than the real ones. (Does not break the ABI, as FORTRAN COMMON blocks are always global and never nested or passed between functions.) - Additional removals noted in the README.Debian files for the affected binary packages: geant321, libgeant1, libgeant1-dev. - debian/NEWS: Comment on the new round of code removal. * debian/control: Update maintainer email. stable/main/binary-mips/kuipc_2004.11.04.dfsg-0sarge1_mips.deb stable/main/binary-mips/libphtools1_2004.11.04.dfsg-0sarge1_mips.deb stable/main/binary-mips/libcojets1-dev_2004.11.04.dfsg-0sarge1_mips.deb stable/main/binary-mips/zftp_2004.11.04.dfsg-0sarge1_mips.deb stable/main/binary-mips/libeurodec1_2004.11.04.dfsg-0sarge1_mips.deb stable/main/binary-mips/libmathlib1_2004.11.04.dfsg-0sarge1_mips.deb stable/main/binary-mips/libphtools1-dev_2004.11.04.dfsg-0sarge1_mips.deb stable/main/binary-mips/libisajet758-dev_2004.11.04.dfsg-0sarge1_mips.deb stable/main/binary-mips/libkernlib1_2004.11.04.dfsg-0sarge1_mips.deb stable/main/binary-mips/libpacklib1_2004.11.04.dfsg-0sarge1_mips.deb stable/main/binary-mips/libmathlib1-dev_2004.11.04.dfsg-0sarge1_mips.deb stable/main/binary-mips/libherwig59-dev_2004.11.04.dfsg-0sarge1_mips.deb stable/main/binary-mips/libpaw1_2004.11.04.dfsg-0sarge1_mips.deb stable/main/binary-mips/libkernlib1-dev_2004.11.04.dfsg-0sarge1_mips.deb stable/main/binary-mips/libgeant1_2004.11.04.dfsg-0sarge1_mips.deb stable/main/binary-mips/paw++-static_2004.11.04.dfsg-0sarge1_mips.deb stable/main/binary-mips/dzedit_2004.11.04.dfsg-0sarge1_mips.deb stable/main/binary-mips/libgeant1-dev_2004.11.04.dfsg-0sarge1_mips.deb stable/main/binary-mips/paw_2004.11.04.dfsg-0sarge1_mips.deb stable/main/binary-mips/libgrafx11-1_2004.11.04.dfsg-0sarge1_mips.deb stable/main/binary-mips/libphotos202_2004.11.04.dfsg-0sarge1_mips.deb stable/main/binary-mips/libherwig59_2004.11.04.dfsg-0sarge1_mips.deb stable/main/binary-mips/kxterm_2004.11.04.dfsg-0sarge1_mips.deb stable/main/binary-mips/libpdflib804-dev_2004.11.04.dfsg-0sarge1_mips.deb stable/main/binary-mips/libpdflib804_2004.11.04.dfsg-0sarge1_mips.deb stable/main/binary-mips/libphotos202-dev_2004.11.04.dfsg-0sarge1_mips.deb stable/main/binary-mips/paw++_2004.11.04.dfsg-0sarge1_mips.deb stable/main/binary-mips/libgraflib1-dev_2004.11.04.dfsg-0sarge1_mips.deb stable/main/binary-mips/libgraflib1_2004.11.04.dfsg-0sarge1_mips.deb stable/main/binary-mips/libisajet758_2004.11.04.dfsg-0sarge1_mips.deb stable/main/binary-mips/libpaw1-dev_2004.11.04.dfsg-0sarge1_mips.deb stable/main/binary-mips/libcojets1_2004.11.04.dfsg-0sarge1_mips.deb stable/main/binary-mips/libeurodec1-dev_2004.11.04.dfsg-0sarge1_mips.deb stable/main/binary-mips/libkuipx11-1_2004.11.04.dfsg-0sarge1_mips.deb stable/main/binary-mips/pawserv_2004.11.04.dfsg-0sarge1_mips.deb stable/main/binary-mips/libpacklib1-dev_2004.11.04.dfsg-0sarge1_mips.deb stable/main/binary-mips/libgrafx11-1-dev_2004.11.04.dfsg-0sarge1_mips.deb stable/main/binary-mips/libkuipx11-1-dev_2004.11.04.dfsg-0sarge1_mips.deb stable/main/binary-mips/paw-static_2004.11.04.dfsg-0sarge1_mips.deb cernlib (2004.11.04.dfsg-0sarge1) stable; urgency=low * Upload repacked orig.tar.gz targeted to Sarge for licensing reasons. Mirrors the parallel upload of 2005.05.09.dfsg-1 to unstable. * Removed the directories src/geant321/peanut and src/geant321/block, as well as a number of include files in src/geant321/geant321 (see debian/deadpool.txt for details). These are all part of GEANT-FLUKA (they were previously overlooked in the first purge of FLUKA code) and therefore cannot be included in Debian. In addition, removed the directory src/geant321/fiface and the files src/geant321/miface/{gfmdis.F,gfmfin.F} as they are useless without FLUKA. (closes: #340433) - Necessitates repacking the orig.tar.gz ("new" upstream version). - Files added to debian/local/deadpool.txt and debian/copyright. - Patch 007: revised to skip these directories as well as src/geant321/fluka. - debian/generic/patches/additions/geant321+gkine+dummy.c: to keep ABI compatibility of the library, we have to add in dummy functions and COMMON blocks to replace the removed code. - debian/rules: Bump the shlib version required by code built against libgeant1, as the dummy COMMON blocks may in some cases be slightly larger than the real ones. (Does not break the ABI, as FORTRAN COMMON blocks are always global and never nested or passed between functions.) - Additional removals noted in the README.Debian files for the affected binary packages: geant321, libgeant1, libgeant1-dev. - debian/NEWS: Comment on the new round of code removal. * debian/control: Update maintainer email. stable/main/binary-m68k/libmathlib1_2004.11.04.dfsg-0sarge1_m68k.deb stable/main/binary-m68k/libgrafx11-1_2004.11.04.dfsg-0sarge1_m68k.deb stable/main/binary-m68k/libphotos202_2004.11.04.dfsg-0sarge1_m68k.deb stable/main/binary-m68k/libpacklib1-dev_2004.11.04.dfsg-0sarge1_m68k.deb stable/main/binary-m68k/libherwig59-dev_2004.11.04.dfsg-0sarge1_m68k.deb stable/main/binary-m68k/dzedit_2004.11.04.dfsg-0sarge1_m68k.deb stable/main/binary-m68k/libeurodec1_2004.11.04.dfsg-0sarge1_m68k.deb stable/main/binary-m68k/libpdflib804_2004.11.04.dfsg-0sarge1_m68k.deb stable/main/binary-m68k/libcojets1_2004.11.04.dfsg-0sarge1_m68k.deb stable/main/binary-m68k/libgraflib1_2004.11.04.dfsg-0sarge1_m68k.deb stable/main/binary-m68k/libkuipx11-1-dev_2004.11.04.dfsg-0sarge1_m68k.deb stable/main/binary-m68k/libgeant1-dev_2004.11.04.dfsg-0sarge1_m68k.deb stable/main/binary-m68k/libcojets1-dev_2004.11.04.dfsg-0sarge1_m68k.deb stable/main/binary-m68k/paw-static_2004.11.04.dfsg-0sarge1_m68k.deb stable/main/binary-m68k/libgrafx11-1-dev_2004.11.04.dfsg-0sarge1_m68k.deb stable/main/binary-m68k/libpaw1-dev_2004.11.04.dfsg-0sarge1_m68k.deb stable/main/binary-m68k/libgeant1_2004.11.04.dfsg-0sarge1_m68k.deb stable/main/binary-m68k/libgraflib1-dev_2004.11.04.dfsg-0sarge1_m68k.deb stable/main/binary-m68k/libphtools1_2004.11.04.dfsg-0sarge1_m68k.deb stable/main/binary-m68k/paw_2004.11.04.dfsg-0sarge1_m68k.deb stable/main/binary-m68k/libkuipx11-1_2004.11.04.dfsg-0sarge1_m68k.deb stable/main/binary-m68k/libherwig59_2004.11.04.dfsg-0sarge1_m68k.deb stable/main/binary-m68k/libmathlib1-dev_2004.11.04.dfsg-0sarge1_m68k.deb stable/main/binary-m68k/pawserv_2004.11.04.dfsg-0sarge1_m68k.deb stable/main/binary-m68k/kxterm_2004.11.04.dfsg-0sarge1_m68k.deb stable/main/binary-m68k/libpacklib1_2004.11.04.dfsg-0sarge1_m68k.deb stable/main/binary-m68k/zftp_2004.11.04.dfsg-0sarge1_m68k.deb stable/main/binary-m68k/libpaw1_2004.11.04.dfsg-0sarge1_m68k.deb stable/main/binary-m68k/libeurodec1-dev_2004.11.04.dfsg-0sarge1_m68k.deb stable/main/binary-m68k/paw++-static_2004.11.04.dfsg-0sarge1_m68k.deb stable/main/binary-m68k/libpdflib804-dev_2004.11.04.dfsg-0sarge1_m68k.deb stable/main/binary-m68k/kuipc_2004.11.04.dfsg-0sarge1_m68k.deb stable/main/binary-m68k/libkernlib1-dev_2004.11.04.dfsg-0sarge1_m68k.deb stable/main/binary-m68k/libphtools1-dev_2004.11.04.dfsg-0sarge1_m68k.deb stable/main/binary-m68k/libkernlib1_2004.11.04.dfsg-0sarge1_m68k.deb stable/main/binary-m68k/paw++_2004.11.04.dfsg-0sarge1_m68k.deb stable/main/binary-m68k/libphotos202-dev_2004.11.04.dfsg-0sarge1_m68k.deb cernlib (2004.11.04.dfsg-0sarge1) stable; urgency=low * Upload repacked orig.tar.gz targeted to Sarge for licensing reasons. Mirrors the parallel upload of 2005.05.09.dfsg-1 to unstable. * Removed the directories src/geant321/peanut and src/geant321/block, as well as a number of include files in src/geant321/geant321 (see debian/deadpool.txt for details). These are all part of GEANT-FLUKA (they were previously overlooked in the first purge of FLUKA code) and therefore cannot be included in Debian. In addition, removed the directory src/geant321/fiface and the files src/geant321/miface/{gfmdis.F,gfmfin.F} as they are useless without FLUKA. (closes: #340433) - Necessitates repacking the orig.tar.gz ("new" upstream version). - Files added to debian/local/deadpool.txt and debian/copyright. - Patch 007: revised to skip these directories as well as src/geant321/fluka. - debian/generic/patches/additions/geant321+gkine+dummy.c: to keep ABI compatibility of the library, we have to add in dummy functions and COMMON blocks to replace the removed code. - debian/rules: Bump the shlib version required by code built against libgeant1, as the dummy COMMON blocks may in some cases be slightly larger than the real ones. (Does not break the ABI, as FORTRAN COMMON blocks are always global and never nested or passed between functions.) - Additional removals noted in the README.Debian files for the affected binary packages: geant321, libgeant1, libgeant1-dev. - debian/NEWS: Comment on the new round of code removal. * debian/control: Update maintainer email. stable/main/binary-ia64/libkuipx11-1_2004.11.04.dfsg-0sarge1_ia64.deb stable/main/binary-ia64/pawserv_2004.11.04.dfsg-0sarge1_ia64.deb stable/main/binary-ia64/libphotos202_2004.11.04.dfsg-0sarge1_ia64.deb stable/main/binary-ia64/kxterm_2004.11.04.dfsg-0sarge1_ia64.deb stable/main/binary-ia64/libphtools1_2004.11.04.dfsg-0sarge1_ia64.deb stable/main/binary-ia64/libkernlib1_2004.11.04.dfsg-0sarge1_ia64.deb stable/main/binary-ia64/libgeant1_2004.11.04.dfsg-0sarge1_ia64.deb stable/main/binary-ia64/libgraflib1-dev_2004.11.04.dfsg-0sarge1_ia64.deb stable/main/binary-ia64/libpdflib804_2004.11.04.dfsg-0sarge1_ia64.deb stable/main/binary-ia64/paw++_2004.11.04.dfsg-0sarge1_ia64.deb stable/main/binary-ia64/libmathlib1_2004.11.04.dfsg-0sarge1_ia64.deb stable/main/binary-ia64/libcojets1-dev_2004.11.04.dfsg-0sarge1_ia64.deb stable/main/binary-ia64/libkernlib1-dev_2004.11.04.dfsg-0sarge1_ia64.deb stable/main/binary-ia64/libgrafx11-1_2004.11.04.dfsg-0sarge1_ia64.deb stable/main/binary-ia64/zftp_2004.11.04.dfsg-0sarge1_ia64.deb stable/main/binary-ia64/libherwig59-dev_2004.11.04.dfsg-0sarge1_ia64.deb stable/main/binary-ia64/libgrafx11-1-dev_2004.11.04.dfsg-0sarge1_ia64.deb stable/main/binary-ia64/paw++-static_2004.11.04.dfsg-0sarge1_ia64.deb stable/main/binary-ia64/paw_2004.11.04.dfsg-0sarge1_ia64.deb stable/main/binary-ia64/libpacklib1_2004.11.04.dfsg-0sarge1_ia64.deb stable/main/binary-ia64/libeurodec1_2004.11.04.dfsg-0sarge1_ia64.deb stable/main/binary-ia64/libpaw1_2004.11.04.dfsg-0sarge1_ia64.deb stable/main/binary-ia64/libeurodec1-dev_2004.11.04.dfsg-0sarge1_ia64.deb stable/main/binary-ia64/libpdflib804-dev_2004.11.04.dfsg-0sarge1_ia64.deb stable/main/binary-ia64/libcojets1_2004.11.04.dfsg-0sarge1_ia64.deb stable/main/binary-ia64/paw-static_2004.11.04.dfsg-0sarge1_ia64.deb stable/main/binary-ia64/libphotos202-dev_2004.11.04.dfsg-0sarge1_ia64.deb stable/main/binary-ia64/libisajet758_2004.11.04.dfsg-0sarge1_ia64.deb stable/main/binary-ia64/libkuipx11-1-dev_2004.11.04.dfsg-0sarge1_ia64.deb stable/main/binary-ia64/kuipc_2004.11.04.dfsg-0sarge1_ia64.deb stable/main/binary-ia64/libisajet758-dev_2004.11.04.dfsg-0sarge1_ia64.deb stable/main/binary-ia64/libgraflib1_2004.11.04.dfsg-0sarge1_ia64.deb stable/main/binary-ia64/libpacklib1-dev_2004.11.04.dfsg-0sarge1_ia64.deb stable/main/binary-ia64/dzedit_2004.11.04.dfsg-0sarge1_ia64.deb stable/main/binary-ia64/libphtools1-dev_2004.11.04.dfsg-0sarge1_ia64.deb stable/main/binary-ia64/libmathlib1-dev_2004.11.04.dfsg-0sarge1_ia64.deb stable/main/binary-ia64/libherwig59_2004.11.04.dfsg-0sarge1_ia64.deb stable/main/binary-ia64/libpaw1-dev_2004.11.04.dfsg-0sarge1_ia64.deb stable/main/binary-ia64/libgeant1-dev_2004.11.04.dfsg-0sarge1_ia64.deb cernlib (2004.11.04.dfsg-0sarge1) stable; urgency=low * Upload repacked orig.tar.gz targeted to Sarge for licensing reasons. Mirrors the parallel upload of 2005.05.09.dfsg-1 to unstable. * Removed the directories src/geant321/peanut and src/geant321/block, as well as a number of include files in src/geant321/geant321 (see debian/deadpool.txt for details). These are all part of GEANT-FLUKA (they were previously overlooked in the first purge of FLUKA code) and therefore cannot be included in Debian. In addition, removed the directory src/geant321/fiface and the files src/geant321/miface/{gfmdis.F,gfmfin.F} as they are useless without FLUKA. (closes: #340433) - Necessitates repacking the orig.tar.gz ("new" upstream version). - Files added to debian/local/deadpool.txt and debian/copyright. - Patch 007: revised to skip these directories as well as src/geant321/fluka. - debian/generic/patches/additions/geant321+gkine+dummy.c: to keep ABI compatibility of the library, we have to add in dummy functions and COMMON blocks to replace the removed code. - debian/rules: Bump the shlib version required by code built against libgeant1, as the dummy COMMON blocks may in some cases be slightly larger than the real ones. (Does not break the ABI, as FORTRAN COMMON blocks are always global and never nested or passed between functions.) - Additional removals noted in the README.Debian files for the affected binary packages: geant321, libgeant1, libgeant1-dev. - debian/NEWS: Comment on the new round of code removal. * debian/control: Update maintainer email. stable/main/binary-hppa/libpdflib804-dev_2004.11.04.dfsg-0sarge1_hppa.deb stable/main/binary-hppa/libisajet758-dev_2004.11.04.dfsg-0sarge1_hppa.deb stable/main/binary-hppa/paw-static_2004.11.04.dfsg-0sarge1_hppa.deb stable/main/binary-hppa/libpaw1_2004.11.04.dfsg-0sarge1_hppa.deb stable/main/binary-hppa/libkuipx11-1_2004.11.04.dfsg-0sarge1_hppa.deb stable/main/binary-hppa/libeurodec1_2004.11.04.dfsg-0sarge1_hppa.deb stable/main/binary-hppa/libkernlib1_2004.11.04.dfsg-0sarge1_hppa.deb stable/main/binary-hppa/libpdflib804_2004.11.04.dfsg-0sarge1_hppa.deb stable/main/binary-hppa/libeurodec1-dev_2004.11.04.dfsg-0sarge1_hppa.deb stable/main/binary-hppa/libphtools1_2004.11.04.dfsg-0sarge1_hppa.deb stable/main/binary-hppa/libphotos202_2004.11.04.dfsg-0sarge1_hppa.deb stable/main/binary-hppa/pawserv_2004.11.04.dfsg-0sarge1_hppa.deb stable/main/binary-hppa/paw++-static_2004.11.04.dfsg-0sarge1_hppa.deb stable/main/binary-hppa/libcojets1_2004.11.04.dfsg-0sarge1_hppa.deb stable/main/binary-hppa/libherwig59_2004.11.04.dfsg-0sarge1_hppa.deb stable/main/binary-hppa/libgeant1-dev_2004.11.04.dfsg-0sarge1_hppa.deb stable/main/binary-hppa/paw++_2004.11.04.dfsg-0sarge1_hppa.deb stable/main/binary-hppa/libgrafx11-1_2004.11.04.dfsg-0sarge1_hppa.deb stable/main/binary-hppa/libphtools1-dev_2004.11.04.dfsg-0sarge1_hppa.deb stable/main/binary-hppa/libgraflib1-dev_2004.11.04.dfsg-0sarge1_hppa.deb stable/main/binary-hppa/paw_2004.11.04.dfsg-0sarge1_hppa.deb stable/main/binary-hppa/dzedit_2004.11.04.dfsg-0sarge1_hppa.deb stable/main/binary-hppa/libgraflib1_2004.11.04.dfsg-0sarge1_hppa.deb stable/main/binary-hppa/libpacklib1-dev_2004.11.04.dfsg-0sarge1_hppa.deb stable/main/binary-hppa/libherwig59-dev_2004.11.04.dfsg-0sarge1_hppa.deb stable/main/binary-hppa/kxterm_2004.11.04.dfsg-0sarge1_hppa.deb stable/main/binary-hppa/libmathlib1-dev_2004.11.04.dfsg-0sarge1_hppa.deb stable/main/binary-hppa/zftp_2004.11.04.dfsg-0sarge1_hppa.deb stable/main/binary-hppa/libmathlib1_2004.11.04.dfsg-0sarge1_hppa.deb stable/main/binary-hppa/libgrafx11-1-dev_2004.11.04.dfsg-0sarge1_hppa.deb stable/main/binary-hppa/libphotos202-dev_2004.11.04.dfsg-0sarge1_hppa.deb stable/main/binary-hppa/libkuipx11-1-dev_2004.11.04.dfsg-0sarge1_hppa.deb stable/main/binary-hppa/libisajet758_2004.11.04.dfsg-0sarge1_hppa.deb stable/main/binary-hppa/libcojets1-dev_2004.11.04.dfsg-0sarge1_hppa.deb stable/main/binary-hppa/libkernlib1-dev_2004.11.04.dfsg-0sarge1_hppa.deb stable/main/binary-hppa/kuipc_2004.11.04.dfsg-0sarge1_hppa.deb stable/main/binary-hppa/libpaw1-dev_2004.11.04.dfsg-0sarge1_hppa.deb stable/main/binary-hppa/libpacklib1_2004.11.04.dfsg-0sarge1_hppa.deb stable/main/binary-hppa/libgeant1_2004.11.04.dfsg-0sarge1_hppa.deb cernlib (2004.11.04.dfsg-0sarge1) stable; urgency=low * Upload repacked orig.tar.gz targeted to Sarge for licensing reasons. Mirrors the parallel upload of 2005.05.09.dfsg-1 to unstable. * Removed the directories src/geant321/peanut and src/geant321/block, as well as a number of include files in src/geant321/geant321 (see debian/deadpool.txt for details). These are all part of GEANT-FLUKA (they were previously overlooked in the first purge of FLUKA code) and therefore cannot be included in Debian. In addition, removed the directory src/geant321/fiface and the files src/geant321/miface/{gfmdis.F,gfmfin.F} as they are useless without FLUKA. (closes: #340433) - Necessitates repacking the orig.tar.gz ("new" upstream version). - Files added to debian/local/deadpool.txt and debian/copyright. - Patch 007: revised to skip these directories as well as src/geant321/fluka. - debian/generic/patches/additions/geant321+gkine+dummy.c: to keep ABI compatibility of the library, we have to add in dummy functions and COMMON blocks to replace the removed code. - debian/rules: Bump the shlib version required by code built against libgeant1, as the dummy COMMON blocks may in some cases be slightly larger than the real ones. (Does not break the ABI, as FORTRAN COMMON blocks are always global and never nested or passed between functions.) - Additional removals noted in the README.Debian files for the affected binary packages: geant321, libgeant1, libgeant1-dev. - debian/NEWS: Comment on the new round of code removal. * debian/control: Update maintainer email. stable/main/binary-arm/libphtools1_2004.11.04.dfsg-0sarge1_arm.deb stable/main/binary-arm/libgeant1_2004.11.04.dfsg-0sarge1_arm.deb stable/main/binary-arm/pawserv_2004.11.04.dfsg-0sarge1_arm.deb stable/main/binary-arm/paw++-static_2004.11.04.dfsg-0sarge1_arm.deb stable/main/binary-arm/libpaw1_2004.11.04.dfsg-0sarge1_arm.deb stable/main/binary-arm/libherwig59-dev_2004.11.04.dfsg-0sarge1_arm.deb stable/main/binary-arm/libgrafx11-1_2004.11.04.dfsg-0sarge1_arm.deb stable/main/binary-arm/libmathlib1-dev_2004.11.04.dfsg-0sarge1_arm.deb stable/main/binary-arm/libphotos202_2004.11.04.dfsg-0sarge1_arm.deb stable/main/binary-arm/paw_2004.11.04.dfsg-0sarge1_arm.deb stable/main/binary-arm/kxterm_2004.11.04.dfsg-0sarge1_arm.deb stable/main/binary-arm/libcojets1-dev_2004.11.04.dfsg-0sarge1_arm.deb stable/main/binary-arm/libphtools1-dev_2004.11.04.dfsg-0sarge1_arm.deb stable/main/binary-arm/kuipc_2004.11.04.dfsg-0sarge1_arm.deb stable/main/binary-arm/libgraflib1-dev_2004.11.04.dfsg-0sarge1_arm.deb stable/main/binary-arm/libgraflib1_2004.11.04.dfsg-0sarge1_arm.deb stable/main/binary-arm/libpdflib804_2004.11.04.dfsg-0sarge1_arm.deb stable/main/binary-arm/libisajet758_2004.11.04.dfsg-0sarge1_arm.deb stable/main/binary-arm/dzedit_2004.11.04.dfsg-0sarge1_arm.deb stable/main/binary-arm/libpacklib1_2004.11.04.dfsg-0sarge1_arm.deb stable/main/binary-arm/libmathlib1_2004.11.04.dfsg-0sarge1_arm.deb stable/main/binary-arm/libeurodec1-dev_2004.11.04.dfsg-0sarge1_arm.deb stable/main/binary-arm/zftp_2004.11.04.dfsg-0sarge1_arm.deb stable/main/binary-arm/libkernlib1-dev_2004.11.04.dfsg-0sarge1_arm.deb stable/main/binary-arm/libgeant1-dev_2004.11.04.dfsg-0sarge1_arm.deb stable/main/binary-arm/libphotos202-dev_2004.11.04.dfsg-0sarge1_arm.deb stable/main/binary-arm/libpaw1-dev_2004.11.04.dfsg-0sarge1_arm.deb stable/main/binary-arm/libpacklib1-dev_2004.11.04.dfsg-0sarge1_arm.deb stable/main/binary-arm/libgrafx11-1-dev_2004.11.04.dfsg-0sarge1_arm.deb stable/main/binary-arm/paw-static_2004.11.04.dfsg-0sarge1_arm.deb stable/main/binary-arm/libkuipx11-1_2004.11.04.dfsg-0sarge1_arm.deb stable/main/binary-arm/libkernlib1_2004.11.04.dfsg-0sarge1_arm.deb stable/main/binary-arm/paw++_2004.11.04.dfsg-0sarge1_arm.deb stable/main/binary-arm/libcojets1_2004.11.04.dfsg-0sarge1_arm.deb stable/main/binary-arm/libeurodec1_2004.11.04.dfsg-0sarge1_arm.deb stable/main/binary-arm/libherwig59_2004.11.04.dfsg-0sarge1_arm.deb stable/main/binary-arm/libkuipx11-1-dev_2004.11.04.dfsg-0sarge1_arm.deb stable/main/binary-arm/libisajet758-dev_2004.11.04.dfsg-0sarge1_arm.deb stable/main/binary-arm/libpdflib804-dev_2004.11.04.dfsg-0sarge1_arm.deb cernlib (2004.11.04.dfsg-0sarge1) stable; urgency=low * Upload repacked orig.tar.gz targeted to Sarge for licensing reasons. Mirrors the parallel upload of 2005.05.09.dfsg-1 to unstable. * Removed the directories src/geant321/peanut and src/geant321/block, as well as a number of include files in src/geant321/geant321 (see debian/deadpool.txt for details). These are all part of GEANT-FLUKA (they were previously overlooked in the first purge of FLUKA code) and therefore cannot be included in Debian. In addition, removed the directory src/geant321/fiface and the files src/geant321/miface/{gfmdis.F,gfmfin.F} as they are useless without FLUKA. (closes: #340433) - Necessitates repacking the orig.tar.gz ("new" upstream version). - Files added to debian/local/deadpool.txt and debian/copyright. - Patch 007: revised to skip these directories as well as src/geant321/fluka. - debian/generic/patches/additions/geant321+gkine+dummy.c: to keep ABI compatibility of the library, we have to add in dummy functions and COMMON blocks to replace the removed code. - debian/rules: Bump the shlib version required by code built against libgeant1, as the dummy COMMON blocks may in some cases be slightly larger than the real ones. (Does not break the ABI, as FORTRAN COMMON blocks are always global and never nested or passed between functions.) - Additional removals noted in the README.Debian files for the affected binary packages: geant321, libgeant1, libgeant1-dev. - debian/NEWS: Comment on the new round of code removal. * debian/control: Update maintainer email. stable/main/binary-alpha/zftp_2004.11.04.dfsg-0sarge1_alpha.deb stable/main/binary-alpha/libphotos202-dev_2004.11.04.dfsg-0sarge1_alpha.deb stable/main/binary-alpha/paw-static_2004.11.04.dfsg-0sarge1_alpha.deb stable/main/binary-alpha/libphtools1_2004.11.04.dfsg-0sarge1_alpha.deb stable/main/binary-alpha/libgeant1_2004.11.04.dfsg-0sarge1_alpha.deb stable/main/binary-alpha/libkernlib1-dev_2004.11.04.dfsg-0sarge1_alpha.deb stable/main/binary-alpha/libeurodec1_2004.11.04.dfsg-0sarge1_alpha.deb stable/main/binary-alpha/libpacklib1_2004.11.04.dfsg-0sarge1_alpha.deb stable/main/binary-alpha/libpdflib804_2004.11.04.dfsg-0sarge1_alpha.deb stable/main/binary-alpha/libkernlib1_2004.11.04.dfsg-0sarge1_alpha.deb stable/main/binary-alpha/libgrafx11-1_2004.11.04.dfsg-0sarge1_alpha.deb stable/main/binary-alpha/libpdflib804-dev_2004.11.04.dfsg-0sarge1_alpha.deb stable/main/binary-alpha/libphtools1-dev_2004.11.04.dfsg-0sarge1_alpha.deb stable/main/binary-alpha/dzedit_2004.11.04.dfsg-0sarge1_alpha.deb stable/main/binary-alpha/libphotos202_2004.11.04.dfsg-0sarge1_alpha.deb stable/main/binary-alpha/libpacklib1-dev_2004.11.04.dfsg-0sarge1_alpha.deb stable/main/binary-alpha/libherwig59-dev_2004.11.04.dfsg-0sarge1_alpha.deb stable/main/binary-alpha/kuipc_2004.11.04.dfsg-0sarge1_alpha.deb stable/main/binary-alpha/libisajet758_2004.11.04.dfsg-0sarge1_alpha.deb stable/main/binary-alpha/libkuipx11-1-dev_2004.11.04.dfsg-0sarge1_alpha.deb stable/main/binary-alpha/libgraflib1-dev_2004.11.04.dfsg-0sarge1_alpha.deb stable/main/binary-alpha/paw++-static_2004.11.04.dfsg-0sarge1_alpha.deb stable/main/binary-alpha/libherwig59_2004.11.04.dfsg-0sarge1_alpha.deb stable/main/binary-alpha/libeurodec1-dev_2004.11.04.dfsg-0sarge1_alpha.deb stable/main/binary-alpha/paw++_2004.11.04.dfsg-0sarge1_alpha.deb stable/main/binary-alpha/libgeant1-dev_2004.11.04.dfsg-0sarge1_alpha.deb stable/main/binary-alpha/libcojets1_2004.11.04.dfsg-0sarge1_alpha.deb stable/main/binary-alpha/libpaw1-dev_2004.11.04.dfsg-0sarge1_alpha.deb stable/main/binary-alpha/libmathlib1-dev_2004.11.04.dfsg-0sarge1_alpha.deb stable/main/binary-alpha/libgrafx11-1-dev_2004.11.04.dfsg-0sarge1_alpha.deb stable/main/binary-alpha/kxterm_2004.11.04.dfsg-0sarge1_alpha.deb stable/main/binary-alpha/libkuipx11-1_2004.11.04.dfsg-0sarge1_alpha.deb stable/main/binary-alpha/libpaw1_2004.11.04.dfsg-0sarge1_alpha.deb stable/main/binary-alpha/libgraflib1_2004.11.04.dfsg-0sarge1_alpha.deb stable/main/binary-alpha/paw_2004.11.04.dfsg-0sarge1_alpha.deb stable/main/binary-alpha/pawserv_2004.11.04.dfsg-0sarge1_alpha.deb stable/main/binary-alpha/libcojets1-dev_2004.11.04.dfsg-0sarge1_alpha.deb stable/main/binary-alpha/libmathlib1_2004.11.04.dfsg-0sarge1_alpha.deb stable/main/binary-alpha/libisajet758-dev_2004.11.04.dfsg-0sarge1_alpha.deb cernlib (2004.11.04.dfsg-0sarge1) stable; urgency=low * Upload repacked orig.tar.gz targeted to Sarge for licensing reasons. Mirrors the parallel upload of 2005.05.09.dfsg-1 to unstable. * Removed the directories src/geant321/peanut and src/geant321/block, as well as a number of include files in src/geant321/geant321 (see debian/deadpool.txt for details). These are all part of GEANT-FLUKA (they were previously overlooked in the first purge of FLUKA code) and therefore cannot be included in Debian. In addition, removed the directory src/geant321/fiface and the files src/geant321/miface/{gfmdis.F,gfmfin.F} as they are useless without FLUKA. (closes: #340433) - Necessitates repacking the orig.tar.gz ("new" upstream version). - Files added to debian/local/deadpool.txt and debian/copyright. - Patch 007: revised to skip these directories as well as src/geant321/fluka. - debian/generic/patches/additions/geant321+gkine+dummy.c: to keep ABI compatibility of the library, we have to add in dummy functions and COMMON blocks to replace the removed code. - debian/rules: Bump the shlib version required by code built against libgeant1, as the dummy COMMON blocks may in some cases be slightly larger than the real ones. (Does not break the ABI, as FORTRAN COMMON blocks are always global and never nested or passed between functions.) - Additional removals noted in the README.Debian files for the affected binary packages: geant321, libgeant1, libgeant1-dev. - debian/NEWS: Comment on the new round of code removal. * debian/control: Update maintainer email. stable/main/binary-all/paw-common_2004.11.04.dfsg-0sarge1_all.deb stable/main/binary-i386/libgeant1_2004.11.04.dfsg-0sarge1_i386.deb stable/main/binary-i386/libphotos202_2004.11.04.dfsg-0sarge1_i386.deb stable/main/binary-i386/libpdflib804-dev_2004.11.04.dfsg-0sarge1_i386.deb stable/main/binary-i386/libisajet758-dev_2004.11.04.dfsg-0sarge1_i386.deb stable/main/binary-i386/kxterm_2004.11.04.dfsg-0sarge1_i386.deb stable/main/binary-all/cernlib-montecarlo_2004.11.04.dfsg-0sarge1_all.deb stable/main/binary-all/geant321_2004.11.04.dfsg-0sarge1_all.deb stable/main/binary-i386/libisajet758_2004.11.04.dfsg-0sarge1_i386.deb stable/main/binary-i386/pawserv_2004.11.04.dfsg-0sarge1_i386.deb stable/main/binary-i386/libmathlib1_2004.11.04.dfsg-0sarge1_i386.deb stable/main/binary-i386/libgraflib1-dev_2004.11.04.dfsg-0sarge1_i386.deb stable/main/binary-all/cernlib-base_2004.11.04.dfsg-0sarge1_all.deb stable/main/binary-i386/paw-static_2004.11.04.dfsg-0sarge1_i386.deb stable/main/binary-all/paw-demos_2004.11.04.dfsg-0sarge1_all.deb stable/main/binary-i386/paw_2004.11.04.dfsg-0sarge1_i386.deb stable/main/binary-i386/paw++_2004.11.04.dfsg-0sarge1_i386.deb stable/main/binary-i386/libphotos202-dev_2004.11.04.dfsg-0sarge1_i386.deb stable/main/binary-i386/libphtools1-dev_2004.11.04.dfsg-0sarge1_i386.deb stable/main/binary-all/montecarlo-base_2004.11.04.dfsg-0sarge1_all.deb stable/main/binary-i386/libpaw1-dev_2004.11.04.dfsg-0sarge1_i386.deb stable/main/binary-i386/libkuipx11-1_2004.11.04.dfsg-0sarge1_i386.deb stable/main/binary-all/cernlib-extras_2004.11.04.dfsg-0sarge1_all.deb stable/main/binary-i386/libeurodec1_2004.11.04.dfsg-0sarge1_i386.deb stable/main/binary-i386/zftp_2004.11.04.dfsg-0sarge1_i386.deb stable/main/binary-all/cernlib_2004.11.04.dfsg-0sarge1_all.deb stable/main/binary-all/geant321-doc_2004.11.04.dfsg-0sarge1_all.deb stable/main/binary-all/geant321-data_2004.11.04.dfsg-0sarge1_all.deb stable/main/binary-i386/libkernlib1-dev_2004.11.04.dfsg-0sarge1_i386.deb stable/main/source/cernlib_2004.11.04.dfsg-0sarge1.dsc stable/main/binary-i386/libkernlib1_2004.11.04.dfsg-0sarge1_i386.deb stable/main/binary-i386/paw++-static_2004.11.04.dfsg-0sarge1_i386.deb stable/main/binary-i386/libcojets1-dev_2004.11.04.dfsg-0sarge1_i386.deb stable/main/binary-i386/libmathlib1-dev_2004.11.04.dfsg-0sarge1_i386.deb stable/main/binary-i386/libeurodec1-dev_2004.11.04.dfsg-0sarge1_i386.deb stable/main/source/cernlib_2004.11.04.dfsg.orig.tar.gz stable/main/binary-i386/libpdflib804_2004.11.04.dfsg-0sarge1_i386.deb stable/main/binary-i386/dzedit_2004.11.04.dfsg-0sarge1_i386.deb stable/main/binary-i386/libcojets1_2004.11.04.dfsg-0sarge1_i386.deb stable/main/binary-i386/libpacklib1-dev_2004.11.04.dfsg-0sarge1_i386.deb stable/main/binary-i386/libgrafx11-1-dev_2004.11.04.dfsg-0sarge1_i386.deb stable/main/binary-i386/libgeant1-dev_2004.11.04.dfsg-0sarge1_i386.deb stable/main/source/cernlib_2004.11.04.dfsg-0sarge1.diff.gz stable/main/binary-all/cernlib-core_2004.11.04.dfsg-0sarge1_all.deb stable/main/binary-i386/libgraflib1_2004.11.04.dfsg-0sarge1_i386.deb stable/main/binary-i386/libherwig59_2004.11.04.dfsg-0sarge1_i386.deb stable/main/binary-i386/libpaw1_2004.11.04.dfsg-0sarge1_i386.deb stable/main/binary-i386/libherwig59-dev_2004.11.04.dfsg-0sarge1_i386.deb stable/main/binary-i386/libgrafx11-1_2004.11.04.dfsg-0sarge1_i386.deb stable/main/binary-i386/libphtools1_2004.11.04.dfsg-0sarge1_i386.deb stable/main/binary-i386/libpacklib1_2004.11.04.dfsg-0sarge1_i386.deb stable/main/binary-all/cernlib-core-dev_2004.11.04.dfsg-0sarge1_all.deb stable/main/binary-i386/libkuipx11-1-dev_2004.11.04.dfsg-0sarge1_i386.deb stable/main/binary-i386/kuipc_2004.11.04.dfsg-0sarge1_i386.deb cernlib (2004.11.04.dfsg-0sarge1) stable; urgency=low * Upload repacked orig.tar.gz targeted to Sarge for licensing reasons. Mirrors the parallel upload of 2005.05.09.dfsg-1 to unstable. * Removed the directories src/geant321/peanut and src/geant321/block, as well as a number of include files in src/geant321/geant321 (see debian/deadpool.txt for details). These are all part of GEANT-FLUKA (they were previously overlooked in the first purge of FLUKA code) and therefore cannot be included in Debian. In addition, removed the directory src/geant321/fiface and the files src/geant321/miface/{gfmdis.F,gfmfin.F} as they are useless without FLUKA. (closes: #340433) - Necessitates repacking the orig.tar.gz ("new" upstream version). - Files added to debian/local/deadpool.txt and debian/copyright. - Patch 007: revised to skip these directories as well as src/geant321/fluka. - debian/generic/patches/additions/geant321+gkine+dummy.c: to keep ABI compatibility of the library, we have to add in dummy functions and COMMON blocks to replace the removed code. - debian/rules: Bump the shlib version required by code built against libgeant1, as the dummy COMMON blocks may in some cases be slightly larger than the real ones. (Does not break the ABI, as FORTRAN COMMON blocks are always global and never nested or passed between functions.) - Additional removals noted in the README.Debian files for the affected binary packages: geant321, libgeant1, libgeant1-dev. - debian/NEWS: Comment on the new round of code removal. * debian/control: Update maintainer email. stable/main/source/cacti_0.8.6c-7sarge3.dsc stable/main/binary-all/cacti_0.8.6c-7sarge3_all.deb stable/main/source/cacti_0.8.6c-7sarge3.diff.gz cacti (0.8.6c-7sarge3) stable-security; urgency=high * security update prepared for the debian security team by the package maintainer. * cacti includes adodb code and thus is affected by 3 out of the 4 CVE's referenced in DSA 1029-1: - CVE-2006-0146: improper input sanitization leads to SQL injection - CVE-2006-0410: insufficient input sanitizing leads to SQL injection - CVE-2006-0806: cross site scripting vulnerabilities this update contains patches merged into cacti's version of adodb. stable/main/binary-sparc/bomberclone_0.11.5-1sarge1_sparc.deb bomberclone (0.11.5-1sarge1) stable-security; urgency=high * Non-maintainer upload by the Security Team * Applied patch by Tim Yamin to fix potential remote arbitrary code execution [src/menu.c, src/menulabels.c, CVE-2006-0460] stable/main/binary-s390/bomberclone_0.11.5-1sarge1_s390.deb bomberclone (0.11.5-1sarge1) stable-security; urgency=high * Non-maintainer upload by the Security Team * Applied patch by Tim Yamin to fix potential remote arbitrary code execution [src/menu.c, src/menulabels.c, CVE-2006-0460] stable/main/binary-mipsel/bomberclone_0.11.5-1sarge1_mipsel.deb bomberclone (0.11.5-1sarge1) stable-security; urgency=high * Non-maintainer upload by the Security Team * Applied patch by Tim Yamin to fix potential remote arbitrary code execution [src/menu.c, src/menulabels.c, CVE-2006-0460] stable/main/binary-mips/bomberclone_0.11.5-1sarge1_mips.deb bomberclone (0.11.5-1sarge1) stable-security; urgency=high * Non-maintainer upload by the Security Team * Applied patch by Tim Yamin to fix potential remote arbitrary code execution [src/menu.c, src/menulabels.c, CVE-2006-0460] stable/main/binary-m68k/bomberclone_0.11.5-1sarge1_m68k.deb bomberclone (0.11.5-1sarge1) stable-security; urgency=high * Non-maintainer upload by the Security Team * Applied patch by Tim Yamin to fix potential remote arbitrary code execution [src/menu.c, src/menulabels.c, CVE-2006-0460] stable/main/binary-ia64/bomberclone_0.11.5-1sarge1_ia64.deb bomberclone (0.11.5-1sarge1) stable-security; urgency=high * Non-maintainer upload by the Security Team * Applied patch by Tim Yamin to fix potential remote arbitrary code execution [src/menu.c, src/menulabels.c, CVE-2006-0460] stable/main/binary-i386/bomberclone_0.11.5-1sarge1_i386.deb bomberclone (0.11.5-1sarge1) stable-security; urgency=high * Non-maintainer upload by the Security Team * Applied patch by Tim Yamin to fix potential remote arbitrary code execution [src/menu.c, src/menulabels.c, CVE-2006-0460] stable/main/binary-hppa/bomberclone_0.11.5-1sarge1_hppa.deb bomberclone (0.11.5-1sarge1) stable-security; urgency=high * Non-maintainer upload by the Security Team * Applied patch by Tim Yamin to fix potential remote arbitrary code execution [src/menu.c, src/menulabels.c, CVE-2006-0460] stable/main/binary-arm/bomberclone_0.11.5-1sarge1_arm.deb bomberclone (0.11.5-1sarge1) stable-security; urgency=high * Non-maintainer upload by the Security Team * Applied patch by Tim Yamin to fix potential remote arbitrary code execution [src/menu.c, src/menulabels.c, CVE-2006-0460] stable/main/binary-alpha/bomberclone_0.11.5-1sarge1_alpha.deb bomberclone (0.11.5-1sarge1) stable-security; urgency=high * Non-maintainer upload by the Security Team * Applied patch by Tim Yamin to fix potential remote arbitrary code execution [src/menu.c, src/menulabels.c, CVE-2006-0460] stable/main/binary-powerpc/bomberclone_0.11.5-1sarge1_powerpc.deb stable/main/binary-all/bomberclone-data_0.11.5-1sarge1_all.deb stable/main/source/bomberclone_0.11.5-1sarge1.diff.gz stable/main/source/bomberclone_0.11.5-1sarge1.dsc bomberclone (0.11.5-1sarge1) stable-security; urgency=high * Non-maintainer upload by the Security Team * Applied patch by Tim Yamin to fix potential remote arbitrary code execution [src/menu.c, src/menulabels.c, CVE-2006-0460] stable/main/binary-i386/bmv_1.2-17sarge1_i386.deb stable/main/source/bmv_1.2-17sarge1.diff.gz stable/main/source/bmv_1.2-17sarge1.dsc bmv (1.2-17sarge1) stable-security; urgency=high * Non-maintainer upload by the Security Team * Fix integer overflow in openpsfile() [CVE-2005-3278] stable/main/binary-sparc/bluez-hcidump_1.17-1sarge1_sparc.deb bluez-hcidump (1.17-1sarge1) stable-security; urgency=high * Non-maintainer upload by the Security Team * Backported patch provided by Filippo Giunchedi to fix denial of service [parser/l2cap.c, CVE-2006-0670, Bug#351881] stable/main/binary-s390/bluez-hcidump_1.17-1sarge1_s390.deb bluez-hcidump (1.17-1sarge1) stable-security; urgency=high * Non-maintainer upload by the Security Team * Backported patch provided by Filippo Giunchedi to fix denial of service [parser/l2cap.c, CVE-2006-0670, Bug#351881] stable/main/binary-mipsel/bluez-hcidump_1.17-1sarge1_mipsel.deb bluez-hcidump (1.17-1sarge1) stable-security; urgency=high * Non-maintainer upload by the Security Team * Backported patch provided by Filippo Giunchedi to fix denial of service [parser/l2cap.c, CVE-2006-0670, Bug#351881] stable/main/binary-mips/bluez-hcidump_1.17-1sarge1_mips.deb bluez-hcidump (1.17-1sarge1) stable-security; urgency=high * Non-maintainer upload by the Security Team * Backported patch provided by Filippo Giunchedi to fix denial of service [parser/l2cap.c, CVE-2006-0670, Bug#351881] stable/main/binary-m68k/bluez-hcidump_1.17-1sarge1_m68k.deb bluez-hcidump (1.17-1sarge1) stable-security; urgency=high * Non-maintainer upload by the Security Team * Backported patch provided by Filippo Giunchedi to fix denial of service [parser/l2cap.c, CVE-2006-0670, Bug#351881] stable/main/binary-ia64/bluez-hcidump_1.17-1sarge1_ia64.deb bluez-hcidump (1.17-1sarge1) stable-security; urgency=high * Non-maintainer upload by the Security Team * Backported patch provided by Filippo Giunchedi to fix denial of service [parser/l2cap.c, CVE-2006-0670, Bug#351881] stable/main/binary-i386/bluez-hcidump_1.17-1sarge1_i386.deb bluez-hcidump (1.17-1sarge1) stable-security; urgency=high * Non-maintainer upload by the Security Team * Backported patch provided by Filippo Giunchedi to fix denial of service [parser/l2cap.c, CVE-2006-0670, Bug#351881] stable/main/binary-hppa/bluez-hcidump_1.17-1sarge1_hppa.deb bluez-hcidump (1.17-1sarge1) stable-security; urgency=high * Non-maintainer upload by the Security Team * Backported patch provided by Filippo Giunchedi to fix denial of service [parser/l2cap.c, CVE-2006-0670, Bug#351881] stable/main/binary-arm/bluez-hcidump_1.17-1sarge1_arm.deb bluez-hcidump (1.17-1sarge1) stable-security; urgency=high * Non-maintainer upload by the Security Team * Backported patch provided by Filippo Giunchedi to fix denial of service [parser/l2cap.c, CVE-2006-0670, Bug#351881] stable/main/binary-alpha/bluez-hcidump_1.17-1sarge1_alpha.deb bluez-hcidump (1.17-1sarge1) stable-security; urgency=high * Non-maintainer upload by the Security Team * Backported patch provided by Filippo Giunchedi to fix denial of service [parser/l2cap.c, CVE-2006-0670, Bug#351881] stable/main/source/bluez-hcidump_1.17-1sarge1.diff.gz stable/main/source/bluez-hcidump_1.17-1sarge1.dsc stable/main/binary-powerpc/bluez-hcidump_1.17-1sarge1_powerpc.deb bluez-hcidump (1.17-1sarge1) stable-security; urgency=high * Non-maintainer upload by the Security Team * Backported patch provided by Filippo Giunchedi to fix denial of service [parser/l2cap.c, CVE-2006-0670, Bug#351881] stable/main/source/backuppc_2.1.1-2sarge2.dsc stable/main/source/backuppc_2.1.1-2sarge2.diff.gz stable/main/binary-all/backuppc_2.1.1-2sarge2_all.deb backuppc (2.1.1-2sarge2) stable; urgency=high * Fixed an important bug: bad options passed to 'ping' make the backups not being launched at all if 'iptuils-ping' is not installed. Bug introduced by the last sarge upload because backuppc was built on a system with 'iptuils-ping' installed :-( Closes: #344990. stable/main/binary-sparc/antiword_0.35-2sarge1_sparc.deb antiword (0.35-2sarge1) stable-security; urgency=high * Non-maintainer upload by the Security Team. * Fix insecure use of temporary files by kantiword and gantiword scripts. [CVE-2005-3126] stable/main/binary-s390/antiword_0.35-2sarge1_s390.deb antiword (0.35-2sarge1) stable-security; urgency=high * Non-maintainer upload by the Security Team. * Fix insecure use of temporary files by kantiword and gantiword scripts. [CVE-2005-3126] stable/main/binary-powerpc/antiword_0.35-2sarge1_powerpc.deb antiword (0.35-2sarge1) stable-security; urgency=high * Non-maintainer upload by the Security Team. * Fix insecure use of temporary files by kantiword and gantiword scripts. [CVE-2005-3126] stable/main/binary-mipsel/antiword_0.35-2sarge1_mipsel.deb antiword (0.35-2sarge1) stable-security; urgency=high * Non-maintainer upload by the Security Team. * Fix insecure use of temporary files by kantiword and gantiword scripts. [CVE-2005-3126] stable/main/binary-mips/antiword_0.35-2sarge1_mips.deb antiword (0.35-2sarge1) stable-security; urgency=high * Non-maintainer upload by the Security Team. * Fix insecure use of temporary files by kantiword and gantiword scripts. [CVE-2005-3126] stable/main/binary-m68k/antiword_0.35-2sarge1_m68k.deb antiword (0.35-2sarge1) stable-security; urgency=high * Non-maintainer upload by the Security Team. * Fix insecure use of temporary files by kantiword and gantiword scripts. [CVE-2005-3126] stable/main/binary-ia64/antiword_0.35-2sarge1_ia64.deb antiword (0.35-2sarge1) stable-security; urgency=high * Non-maintainer upload by the Security Team. * Fix insecure use of temporary files by kantiword and gantiword scripts. [CVE-2005-3126] stable/main/binary-hppa/antiword_0.35-2sarge1_hppa.deb antiword (0.35-2sarge1) stable-security; urgency=high * Non-maintainer upload by the Security Team. * Fix insecure use of temporary files by kantiword and gantiword scripts. [CVE-2005-3126] stable/main/binary-arm/antiword_0.35-2sarge1_arm.deb antiword (0.35-2sarge1) stable-security; urgency=high * Non-maintainer upload by the Security Team. * Fix insecure use of temporary files by kantiword and gantiword scripts. [CVE-2005-3126] stable/main/binary-alpha/antiword_0.35-2sarge1_alpha.deb antiword (0.35-2sarge1) stable-security; urgency=high * Non-maintainer upload by the Security Team. * Fix insecure use of temporary files by kantiword and gantiword scripts. [CVE-2005-3126] stable/main/binary-i386/antiword_0.35-2sarge1_i386.deb stable/main/source/antiword_0.35-2sarge1.diff.gz stable/main/source/antiword_0.35-2sarge1.dsc antiword (0.35-2sarge1) stable-security; urgency=high * Non-maintainer upload by the Security Team. * Fix insecure use of temporary files by kantiword and gantiword scripts. [CVE-2005-3126] stable/main/source/albatross_1.20-2.dsc stable/main/binary-all/python-albatross-common_1.20-2_all.deb stable/main/source/albatross_1.20-2.diff.gz stable/main/binary-all/python2.3-albatross_1.20-2_all.deb stable/main/binary-all/python-albatross-doc_1.20-2_all.deb stable/main/binary-all/python2.2-albatross_1.20-2_all.deb stable/main/binary-all/python-albatross_1.20-2_all.deb albatross (1.20-2) stable-security; urgency=high * albatross/context.py: backport security fix from upstream version 1.33. stable/main/binary-sparc/aide_0.10-6.1sarge2_sparc.deb aide (0.10-6.1sarge2) stable; urgency=low * now, really new maintainer * compile against zlib 1:1.2.2-4.sarge.2 to fix CAN-2005-1849 (DSA-763-1) and CAN-2006-2096 (DSA-740-1). Thanks to Moritz Muehlenhoff for the reminder. Since aide doesn't accept zipped data from untrusted sources, being statically linked against a vulnerable zlib does not warrant a DSA. * changelog entry for 0.10-6.1sarge1 wrongly references DSA-761-1, which is a typo. stable/main/binary-s390/aide_0.10-6.1sarge2_s390.deb aide (0.10-6.1sarge2) stable; urgency=low * now, really new maintainer * compile against zlib 1:1.2.2-4.sarge.2 to fix CAN-2005-1849 (DSA-763-1) and CAN-2006-2096 (DSA-740-1). Thanks to Moritz Muehlenhoff for the reminder. Since aide doesn't accept zipped data from untrusted sources, being statically linked against a vulnerable zlib does not warrant a DSA. * changelog entry for 0.10-6.1sarge1 wrongly references DSA-761-1, which is a typo. stable/main/binary-powerpc/aide_0.10-6.1sarge2_powerpc.deb aide (0.10-6.1sarge2) stable; urgency=low * now, really new maintainer * compile against zlib 1:1.2.2-4.sarge.2 to fix CAN-2005-1849 (DSA-763-1) and CAN-2006-2096 (DSA-740-1). Thanks to Moritz Muehlenhoff for the reminder. Since aide doesn't accept zipped data from untrusted sources, being statically linked against a vulnerable zlib does not warrant a DSA. * changelog entry for 0.10-6.1sarge1 wrongly references DSA-761-1, which is a typo. stable/main/binary-mipsel/aide_0.10-6.1sarge2_mipsel.deb aide (0.10-6.1sarge2) stable; urgency=low * now, really new maintainer * compile against zlib 1:1.2.2-4.sarge.2 to fix CAN-2005-1849 (DSA-763-1) and CAN-2006-2096 (DSA-740-1). Thanks to Moritz Muehlenhoff for the reminder. Since aide doesn't accept zipped data from untrusted sources, being statically linked against a vulnerable zlib does not warrant a DSA. * changelog entry for 0.10-6.1sarge1 wrongly references DSA-761-1, which is a typo. stable/main/binary-mips/aide_0.10-6.1sarge2_mips.deb aide (0.10-6.1sarge2) stable; urgency=low * now, really new maintainer * compile against zlib 1:1.2.2-4.sarge.2 to fix CAN-2005-1849 (DSA-763-1) and CAN-2006-2096 (DSA-740-1). Thanks to Moritz Muehlenhoff for the reminder. Since aide doesn't accept zipped data from untrusted sources, being statically linked against a vulnerable zlib does not warrant a DSA. * changelog entry for 0.10-6.1sarge1 wrongly references DSA-761-1, which is a typo. stable/main/binary-m68k/aide_0.10-6.1sarge2_m68k.deb aide (0.10-6.1sarge2) stable; urgency=low * now, really new maintainer * compile against zlib 1:1.2.2-4.sarge.2 to fix CAN-2005-1849 (DSA-763-1) and CAN-2006-2096 (DSA-740-1). Thanks to Moritz Muehlenhoff for the reminder. Since aide doesn't accept zipped data from untrusted sources, being statically linked against a vulnerable zlib does not warrant a DSA. * changelog entry for 0.10-6.1sarge1 wrongly references DSA-761-1, which is a typo. stable/main/binary-ia64/aide_0.10-6.1sarge2_ia64.deb aide (0.10-6.1sarge2) stable; urgency=low * now, really new maintainer * compile against zlib 1:1.2.2-4.sarge.2 to fix CAN-2005-1849 (DSA-763-1) and CAN-2006-2096 (DSA-740-1). Thanks to Moritz Muehlenhoff for the reminder. Since aide doesn't accept zipped data from untrusted sources, being statically linked against a vulnerable zlib does not warrant a DSA. * changelog entry for 0.10-6.1sarge1 wrongly references DSA-761-1, which is a typo. stable/main/binary-hppa/aide_0.10-6.1sarge2_hppa.deb aide (0.10-6.1sarge2) stable; urgency=low * now, really new maintainer * compile against zlib 1:1.2.2-4.sarge.2 to fix CAN-2005-1849 (DSA-763-1) and CAN-2006-2096 (DSA-740-1). Thanks to Moritz Muehlenhoff for the reminder. Since aide doesn't accept zipped data from untrusted sources, being statically linked against a vulnerable zlib does not warrant a DSA. * changelog entry for 0.10-6.1sarge1 wrongly references DSA-761-1, which is a typo. stable/main/binary-arm/aide_0.10-6.1sarge2_arm.deb aide (0.10-6.1sarge2) stable; urgency=low * now, really new maintainer * compile against zlib 1:1.2.2-4.sarge.2 to fix CAN-2005-1849 (DSA-763-1) and CAN-2006-2096 (DSA-740-1). Thanks to Moritz Muehlenhoff for the reminder. Since aide doesn't accept zipped data from untrusted sources, being statically linked against a vulnerable zlib does not warrant a DSA. * changelog entry for 0.10-6.1sarge1 wrongly references DSA-761-1, which is a typo. stable/main/binary-alpha/aide_0.10-6.1sarge2_alpha.deb aide (0.10-6.1sarge2) stable; urgency=low * now, really new maintainer * compile against zlib 1:1.2.2-4.sarge.2 to fix CAN-2005-1849 (DSA-763-1) and CAN-2006-2096 (DSA-740-1). Thanks to Moritz Muehlenhoff for the reminder. Since aide doesn't accept zipped data from untrusted sources, being statically linked against a vulnerable zlib does not warrant a DSA. * changelog entry for 0.10-6.1sarge1 wrongly references DSA-761-1, which is a typo. stable/main/source/aide_0.10-6.1sarge2.dsc stable/main/source/aide_0.10-6.1sarge2.diff.gz stable/main/binary-i386/aide_0.10-6.1sarge2_i386.deb aide (0.10-6.1sarge2) stable; urgency=low * now, really new maintainer * compile against zlib 1:1.2.2-4.sarge.2 to fix CAN-2005-1849 (DSA-763-1) and CAN-2006-2096 (DSA-740-1). Thanks to Moritz Muehlenhoff for the reminder. Since aide doesn't accept zipped data from untrusted sources, being statically linked against a vulnerable zlib does not warrant a DSA. * changelog entry for 0.10-6.1sarge1 wrongly references DSA-761-1, which is a typo. stable/main/binary-all/affix-source_2.1.1-2_all.deb stable/main/source/affix-kernel_2.1.1-2.dsc stable/main/binary-all/affix-common_2.1.1-2_all.deb stable/main/source/affix-kernel_2.1.1-2.diff.gz stable/main/binary-all/affix-headers_2.1.1-2_all.deb affix-kernel (2.1.1-2) stable; urgency=low * Added defines of SK_WMEM_MAX and SK_RMEM_MAX to af_rfcomm.c. (closes: Bug#349396) stable/main/binary-all/adzapper_20050316-1sarge1_all.deb stable/main/source/adzapper_20050316-1sarge1.dsc stable/main/source/adzapper_20050316-1sarge1.diff.gz adzapper (20050316-1sarge1) stable-security; urgency=high * Non-maintainer upload by the Security Team * Applied patch by Thomas Reifferscheid and Cameron Simpson (upstream) to fix denial of service [scripts/squid_redirect, Bug#350308, CVE-2006-0046] ========================================= Sat, 17 Dec 2005 - Debian 3.1r1 released ========================================= stable/main/binary-i386/proftpd-pgsql_1.2.10-15sarge1.0.1_i386.deb stable/main/binary-i386/proftpd-mysql_1.2.10-15sarge1.0.1_i386.deb stable/main/binary-i386/proftpd_1.2.10-15sarge1.0.1_i386.deb stable/main/binary-i386/proftpd-common_1.2.10-15sarge1.0.1_i386.deb stable/main/binary-i386/proftpd-ldap_1.2.10-15sarge1.0.1_i386.deb proftpd (1.2.10-15sarge1.0.1) stable-security; urgency=high * binary NMU for incorrect sarge target dist on i386 stable/main/binary-i386/zsync_0.3.3-1.sarge.1.2_i386.deb zsync (0.3.3-1.sarge.1.2) stable-security; urgency=high * Fix build environment problem for i386 (binnmu) stable/main/binary-sparc/zlib-bin_1.2.2-4.sarge.2_sparc.deb stable/main/binary-sparc/lib64z1_1.2.2-4.sarge.2_sparc.deb stable/main/binary-sparc/zlib1g_1.2.2-4.sarge.2_sparc.deb stable/main/binary-sparc/zlib1g-udeb_1.2.2-4.sarge.2_sparc.udeb stable/main/binary-sparc/lib64z1-dev_1.2.2-4.sarge.2_sparc.deb stable/main/binary-sparc/zlib1g-dev_1.2.2-4.sarge.2_sparc.deb zlib (1:1.2.2-4.sarge.2) stable-security; urgency=high * [SECURITY] enough is not enough (CAN-2005-1849) stable/main/binary-s390/lib64z1_1.2.2-4.sarge.2_s390.deb stable/main/binary-s390/zlib1g-dev_1.2.2-4.sarge.2_s390.deb stable/main/binary-s390/lib64z1-dev_1.2.2-4.sarge.2_s390.deb stable/main/binary-s390/zlib1g_1.2.2-4.sarge.2_s390.deb stable/main/binary-s390/zlib-bin_1.2.2-4.sarge.2_s390.deb stable/main/binary-s390/zlib1g-udeb_1.2.2-4.sarge.2_s390.udeb zlib (1:1.2.2-4.sarge.2) stable-security; urgency=high * [SECURITY] enough is not enough (CAN-2005-1849) stable/main/binary-powerpc/zlib1g-udeb_1.2.2-4.sarge.2_powerpc.udeb stable/main/binary-powerpc/zlib1g_1.2.2-4.sarge.2_powerpc.deb stable/main/binary-powerpc/zlib1g-dev_1.2.2-4.sarge.2_powerpc.deb stable/main/binary-powerpc/zlib-bin_1.2.2-4.sarge.2_powerpc.deb zlib (1:1.2.2-4.sarge.2) stable-security; urgency=high * [SECURITY] enough is not enough (CAN-2005-1849) stable/main/binary-mipsel/zlib1g-udeb_1.2.2-4.sarge.2_mipsel.udeb stable/main/binary-mipsel/zlib-bin_1.2.2-4.sarge.2_mipsel.deb stable/main/binary-mipsel/zlib1g-dev_1.2.2-4.sarge.2_mipsel.deb stable/main/binary-mipsel/zlib1g_1.2.2-4.sarge.2_mipsel.deb zlib (1:1.2.2-4.sarge.2) stable-security; urgency=high * [SECURITY] enough is not enough (CAN-2005-1849) stable/main/binary-mips/zlib1g-dev_1.2.2-4.sarge.2_mips.deb stable/main/binary-mips/zlib1g_1.2.2-4.sarge.2_mips.deb stable/main/binary-mips/zlib-bin_1.2.2-4.sarge.2_mips.deb stable/main/binary-mips/zlib1g-udeb_1.2.2-4.sarge.2_mips.udeb zlib (1:1.2.2-4.sarge.2) stable-security; urgency=high * [SECURITY] enough is not enough (CAN-2005-1849) stable/main/binary-m68k/zlib1g_1.2.2-4.sarge.2_m68k.deb stable/main/binary-m68k/zlib1g-dev_1.2.2-4.sarge.2_m68k.deb stable/main/binary-m68k/zlib1g-udeb_1.2.2-4.sarge.2_m68k.udeb stable/main/binary-m68k/zlib-bin_1.2.2-4.sarge.2_m68k.deb zlib (1:1.2.2-4.sarge.2) stable-security; urgency=high * [SECURITY] enough is not enough (CAN-2005-1849) stable/main/binary-ia64/zlib-bin_1.2.2-4.sarge.2_ia64.deb stable/main/binary-ia64/zlib1g-udeb_1.2.2-4.sarge.2_ia64.udeb stable/main/binary-ia64/zlib1g-dev_1.2.2-4.sarge.2_ia64.deb stable/main/binary-ia64/zlib1g_1.2.2-4.sarge.2_ia64.deb zlib (1:1.2.2-4.sarge.2) stable-security; urgency=high * [SECURITY] enough is not enough (CAN-2005-1849) stable/main/binary-hppa/zlib-bin_1.2.2-4.sarge.2_hppa.deb stable/main/binary-hppa/zlib1g-dev_1.2.2-4.sarge.2_hppa.deb stable/main/binary-hppa/zlib1g-udeb_1.2.2-4.sarge.2_hppa.udeb stable/main/binary-hppa/zlib1g_1.2.2-4.sarge.2_hppa.deb zlib (1:1.2.2-4.sarge.2) stable-security; urgency=high * [SECURITY] enough is not enough (CAN-2005-1849) stable/main/binary-arm/zlib-bin_1.2.2-4.sarge.2_arm.deb stable/main/binary-arm/zlib1g-dev_1.2.2-4.sarge.2_arm.deb stable/main/binary-arm/zlib1g_1.2.2-4.sarge.2_arm.deb stable/main/binary-arm/zlib1g-udeb_1.2.2-4.sarge.2_arm.udeb zlib (1:1.2.2-4.sarge.2) stable-security; urgency=high * [SECURITY] enough is not enough (CAN-2005-1849) stable/main/binary-alpha/zlib-bin_1.2.2-4.sarge.2_alpha.deb stable/main/binary-alpha/zlib1g-udeb_1.2.2-4.sarge.2_alpha.udeb stable/main/binary-alpha/zlib1g-dev_1.2.2-4.sarge.2_alpha.deb stable/main/binary-alpha/zlib1g_1.2.2-4.sarge.2_alpha.deb zlib (1:1.2.2-4.sarge.2) stable-security; urgency=high * [SECURITY] enough is not enough (CAN-2005-1849) stable/main/source/zlib_1.2.2-4.sarge.2.diff.gz stable/main/binary-i386/zlib-bin_1.2.2-4.sarge.2_i386.deb stable/main/binary-i386/zlib1g-dev_1.2.2-4.sarge.2_i386.deb stable/main/source/zlib_1.2.2-4.sarge.2.dsc stable/main/binary-i386/zlib1g_1.2.2-4.sarge.2_i386.deb stable/main/binary-i386/zlib1g-udeb_1.2.2-4.sarge.2_i386.udeb zlib (1:1.2.2-4.sarge.2) stable-security; urgency=high * [SECURITY] enough is not enough (CAN-2005-1849) stable/main/binary-sparc/xturqstat_2.2.2sarge1_sparc.deb stable/main/binary-sparc/turqstat_2.2.2sarge1_sparc.deb turqstat (2.2.2sarge1) stable-security; urgency=high * Applied upstream patch to fix buffer overflow in date parser [utility.cpp, CAN-2005-2658] stable/main/binary-s390/turqstat_2.2.2sarge1_s390.deb stable/main/binary-s390/xturqstat_2.2.2sarge1_s390.deb turqstat (2.2.2sarge1) stable-security; urgency=high * Applied upstream patch to fix buffer overflow in date parser [utility.cpp, CAN-2005-2658] stable/main/binary-mipsel/xturqstat_2.2.2sarge1_mipsel.deb stable/main/binary-mipsel/turqstat_2.2.2sarge1_mipsel.deb turqstat (2.2.2sarge1) stable-security; urgency=high * Applied upstream patch to fix buffer overflow in date parser [utility.cpp, CAN-2005-2658] stable/main/binary-mips/turqstat_2.2.2sarge1_mips.deb stable/main/binary-mips/xturqstat_2.2.2sarge1_mips.deb turqstat (2.2.2sarge1) stable-security; urgency=high * Applied upstream patch to fix buffer overflow in date parser [utility.cpp, CAN-2005-2658] stable/main/binary-m68k/xturqstat_2.2.2sarge1_m68k.deb stable/main/binary-m68k/turqstat_2.2.2sarge1_m68k.deb turqstat (2.2.2sarge1) stable-security; urgency=high * Applied upstream patch to fix buffer overflow in date parser [utility.cpp, CAN-2005-2658] stable/main/binary-ia64/turqstat_2.2.2sarge1_ia64.deb stable/main/binary-ia64/xturqstat_2.2.2sarge1_ia64.deb turqstat (2.2.2sarge1) stable-security; urgency=high * Applied upstream patch to fix buffer overflow in date parser [utility.cpp, CAN-2005-2658] stable/main/binary-i386/xturqstat_2.2.2sarge1_i386.deb stable/main/binary-i386/turqstat_2.2.2sarge1_i386.deb turqstat (2.2.2sarge1) stable-security; urgency=high * Applied upstream patch to fix buffer overflow in date parser [utility.cpp, CAN-2005-2658] stable/main/binary-hppa/turqstat_2.2.2sarge1_hppa.deb stable/main/binary-hppa/xturqstat_2.2.2sarge1_hppa.deb turqstat (2.2.2sarge1) stable-security; urgency=high * Applied upstream patch to fix buffer overflow in date parser [utility.cpp, CAN-2005-2658] stable/main/binary-arm/turqstat_2.2.2sarge1_arm.deb stable/main/binary-arm/xturqstat_2.2.2sarge1_arm.deb turqstat (2.2.2sarge1) stable-security; urgency=high * Applied upstream patch to fix buffer overflow in date parser [utility.cpp, CAN-2005-2658] stable/main/binary-alpha/turqstat_2.2.2sarge1_alpha.deb stable/main/binary-alpha/xturqstat_2.2.2sarge1_alpha.deb turqstat (2.2.2sarge1) stable-security; urgency=high * Applied upstream patch to fix buffer overflow in date parser [utility.cpp, CAN-2005-2658] stable/main/binary-sparc/simpleproxy_3.2-3sarge1_sparc.deb simpleproxy (3.2-3sarge1) stable-security; urgency=high * Non maintainer upload by The Security Team. * Fix potentially exploitable format string attack in simpleproxy.c (CAN-2005-1857) stable/main/binary-s390/simpleproxy_3.2-3sarge1_s390.deb simpleproxy (3.2-3sarge1) stable-security; urgency=high * Non maintainer upload by The Security Team. * Fix potentially exploitable format string attack in simpleproxy.c (CAN-2005-1857) stable/main/binary-powerpc/simpleproxy_3.2-3sarge1_powerpc.deb simpleproxy (3.2-3sarge1) stable-security; urgency=high * Non maintainer upload by The Security Team. * Fix potentially exploitable format string attack in simpleproxy.c (CAN-2005-1857) stable/main/binary-mipsel/simpleproxy_3.2-3sarge1_mipsel.deb simpleproxy (3.2-3sarge1) stable-security; urgency=high * Non maintainer upload by The Security Team. * Fix potentially exploitable format string attack in simpleproxy.c (CAN-2005-1857) stable/main/binary-mips/simpleproxy_3.2-3sarge1_mips.deb simpleproxy (3.2-3sarge1) stable-security; urgency=high * Non maintainer upload by The Security Team. * Fix potentially exploitable format string attack in simpleproxy.c (CAN-2005-1857) stable/main/binary-m68k/simpleproxy_3.2-3sarge1_m68k.deb simpleproxy (3.2-3sarge1) stable-security; urgency=high * Non maintainer upload by The Security Team. * Fix potentially exploitable format string attack in simpleproxy.c (CAN-2005-1857) stable/main/binary-ia64/simpleproxy_3.2-3sarge1_ia64.deb simpleproxy (3.2-3sarge1) stable-security; urgency=high * Non maintainer upload by The Security Team. * Fix potentially exploitable format string attack in simpleproxy.c (CAN-2005-1857) stable/main/binary-hppa/simpleproxy_3.2-3sarge1_hppa.deb simpleproxy (3.2-3sarge1) stable-security; urgency=high * Non maintainer upload by The Security Team. * Fix potentially exploitable format string attack in simpleproxy.c (CAN-2005-1857) stable/main/binary-arm/simpleproxy_3.2-3sarge1_arm.deb simpleproxy (3.2-3sarge1) stable-security; urgency=high * Non maintainer upload by The Security Team. * Fix potentially exploitable format string attack in simpleproxy.c (CAN-2005-1857) stable/main/binary-alpha/simpleproxy_3.2-3sarge1_alpha.deb simpleproxy (3.2-3sarge1) stable-security; urgency=high * Non maintainer upload by The Security Team. * Fix potentially exploitable format string attack in simpleproxy.c (CAN-2005-1857) stable/main/binary-sparc/razor_2.670-1sarge2_sparc.deb razor (2.670-1sarge2) stable-security; urgency=high * Replace (probably unnecessary) build-depend to minimize changes in stable upload * upload mainly to increment version number for silly backend reasons stable/main/binary-s390/razor_2.670-1sarge2_s390.deb razor (2.670-1sarge2) stable-security; urgency=high * Replace (probably unnecessary) build-depend to minimize changes in stable upload * upload mainly to increment version number for silly backend reasons stable/main/binary-powerpc/razor_2.670-1sarge2_powerpc.deb razor (2.670-1sarge2) stable-security; urgency=high * Replace (probably unnecessary) build-depend to minimize changes in stable upload * upload mainly to increment version number for silly backend reasons stable/main/binary-mipsel/razor_2.670-1sarge2_mipsel.deb razor (2.670-1sarge2) stable-security; urgency=high * Replace (probably unnecessary) build-depend to minimize changes in stable upload * upload mainly to increment version number for silly backend reasons stable/main/binary-mips/razor_2.670-1sarge2_mips.deb razor (2.670-1sarge2) stable-security; urgency=high * Replace (probably unnecessary) build-depend to minimize changes in stable upload * upload mainly to increment version number for silly backend reasons stable/main/binary-m68k/razor_2.670-1sarge2_m68k.deb razor (2.670-1sarge2) stable-security; urgency=high * Replace (probably unnecessary) build-depend to minimize changes in stable upload * upload mainly to increment version number for silly backend reasons stable/main/binary-ia64/razor_2.670-1sarge2_ia64.deb razor (2.670-1sarge2) stable-security; urgency=high * Replace (probably unnecessary) build-depend to minimize changes in stable upload * upload mainly to increment version number for silly backend reasons stable/main/binary-hppa/razor_2.670-1sarge2_hppa.deb razor (2.670-1sarge2) stable-security; urgency=high * Replace (probably unnecessary) build-depend to minimize changes in stable upload * upload mainly to increment version number for silly backend reasons stable/main/binary-arm/razor_2.670-1sarge2_arm.deb razor (2.670-1sarge2) stable-security; urgency=high * Replace (probably unnecessary) build-depend to minimize changes in stable upload * upload mainly to increment version number for silly backend reasons stable/main/binary-alpha/razor_2.670-1sarge2_alpha.deb razor (2.670-1sarge2) stable-security; urgency=high * Replace (probably unnecessary) build-depend to minimize changes in stable upload * upload mainly to increment version number for silly backend reasons stable/main/binary-sparc/python2.2_2.2.3dfsg-2sarge1_sparc.deb stable/main/binary-sparc/python2.2-dev_2.2.3dfsg-2sarge1_sparc.deb stable/main/binary-sparc/python2.2-tk_2.2.3dfsg-2sarge1_sparc.deb stable/main/binary-sparc/python2.2-gdbm_2.2.3dfsg-2sarge1_sparc.deb stable/main/binary-sparc/python2.2-xmlbase_2.2.3dfsg-2sarge1_sparc.deb stable/main/binary-sparc/python2.2-mpz_2.2.3dfsg-2sarge1_sparc.deb python2.2 (2.2.3dfsg-2sarge1) stable-security; urgency=low * SECURITY UPDATE (prepared by Martin Pitt <martin.pitt@ubuntu.com>). * Add debian/patches/pcre-security_CAN-2005-2491.dpatch: - Fix recent PCRE buffer overflow in local copy. - CAN-2005-2491 * Fix bug in the original fix for CAN-2005-0089 (closes: #307689). stable/main/binary-s390/python2.2-xmlbase_2.2.3dfsg-2sarge1_s390.deb stable/main/binary-s390/python2.2-mpz_2.2.3dfsg-2sarge1_s390.deb stable/main/binary-s390/python2.2_2.2.3dfsg-2sarge1_s390.deb stable/main/binary-s390/python2.2-tk_2.2.3dfsg-2sarge1_s390.deb stable/main/binary-s390/python2.2-dev_2.2.3dfsg-2sarge1_s390.deb stable/main/binary-s390/python2.2-gdbm_2.2.3dfsg-2sarge1_s390.deb python2.2 (2.2.3dfsg-2sarge1) stable-security; urgency=low * SECURITY UPDATE (prepared by Martin Pitt <martin.pitt@ubuntu.com>). * Add debian/patches/pcre-security_CAN-2005-2491.dpatch: - Fix recent PCRE buffer overflow in local copy. - CAN-2005-2491 * Fix bug in the original fix for CAN-2005-0089 (closes: #307689). stable/main/binary-powerpc/python2.2-tk_2.2.3dfsg-2sarge1_powerpc.deb stable/main/binary-powerpc/python2.2-dev_2.2.3dfsg-2sarge1_powerpc.deb stable/main/binary-powerpc/python2.2-mpz_2.2.3dfsg-2sarge1_powerpc.deb stable/main/binary-powerpc/python2.2-xmlbase_2.2.3dfsg-2sarge1_powerpc.deb stable/main/binary-powerpc/python2.2_2.2.3dfsg-2sarge1_powerpc.deb stable/main/binary-powerpc/python2.2-gdbm_2.2.3dfsg-2sarge1_powerpc.deb python2.2 (2.2.3dfsg-2sarge1) stable-security; urgency=low * SECURITY UPDATE (prepared by Martin Pitt <martin.pitt@ubuntu.com>). * Add debian/patches/pcre-security_CAN-2005-2491.dpatch: - Fix recent PCRE buffer overflow in local copy. - CAN-2005-2491 * Fix bug in the original fix for CAN-2005-0089 (closes: #307689). stable/main/binary-mipsel/python2.2_2.2.3dfsg-2sarge1_mipsel.deb stable/main/binary-mipsel/python2.2-mpz_2.2.3dfsg-2sarge1_mipsel.deb stable/main/binary-mipsel/python2.2-gdbm_2.2.3dfsg-2sarge1_mipsel.deb stable/main/binary-mipsel/python2.2-tk_2.2.3dfsg-2sarge1_mipsel.deb stable/main/binary-mipsel/python2.2-dev_2.2.3dfsg-2sarge1_mipsel.deb stable/main/binary-mipsel/python2.2-xmlbase_2.2.3dfsg-2sarge1_mipsel.deb python2.2 (2.2.3dfsg-2sarge1) stable-security; urgency=low * SECURITY UPDATE (prepared by Martin Pitt <martin.pitt@ubuntu.com>). * Add debian/patches/pcre-security_CAN-2005-2491.dpatch: - Fix recent PCRE buffer overflow in local copy. - CAN-2005-2491 * Fix bug in the original fix for CAN-2005-0089 (closes: #307689). stable/main/binary-mips/python2.2-xmlbase_2.2.3dfsg-2sarge1_mips.deb stable/main/binary-mips/python2.2-tk_2.2.3dfsg-2sarge1_mips.deb stable/main/binary-mips/python2.2_2.2.3dfsg-2sarge1_mips.deb stable/main/binary-mips/python2.2-mpz_2.2.3dfsg-2sarge1_mips.deb stable/main/binary-mips/python2.2-gdbm_2.2.3dfsg-2sarge1_mips.deb stable/main/binary-mips/python2.2-dev_2.2.3dfsg-2sarge1_mips.deb python2.2 (2.2.3dfsg-2sarge1) stable-security; urgency=low * SECURITY UPDATE (prepared by Martin Pitt <martin.pitt@ubuntu.com>). * Add debian/patches/pcre-security_CAN-2005-2491.dpatch: - Fix recent PCRE buffer overflow in local copy. - CAN-2005-2491 * Fix bug in the original fix for CAN-2005-0089 (closes: #307689). stable/main/binary-ia64/python2.2-gdbm_2.2.3dfsg-2sarge1_ia64.deb stable/main/binary-ia64/python2.2-xmlbase_2.2.3dfsg-2sarge1_ia64.deb stable/main/binary-ia64/python2.2-mpz_2.2.3dfsg-2sarge1_ia64.deb stable/main/binary-ia64/python2.2-tk_2.2.3dfsg-2sarge1_ia64.deb stable/main/binary-ia64/python2.2_2.2.3dfsg-2sarge1_ia64.deb stable/main/binary-ia64/python2.2-dev_2.2.3dfsg-2sarge1_ia64.deb python2.2 (2.2.3dfsg-2sarge1) stable-security; urgency=low * SECURITY UPDATE (prepared by Martin Pitt <martin.pitt@ubuntu.com>). * Add debian/patches/pcre-security_CAN-2005-2491.dpatch: - Fix recent PCRE buffer overflow in local copy. - CAN-2005-2491 * Fix bug in the original fix for CAN-2005-0089 (closes: #307689). stable/main/binary-arm/python2.2-mpz_2.2.3dfsg-2sarge1_arm.deb stable/main/binary-arm/python2.2_2.2.3dfsg-2sarge1_arm.deb stable/main/binary-arm/python2.2-xmlbase_2.2.3dfsg-2sarge1_arm.deb stable/main/binary-arm/python2.2-gdbm_2.2.3dfsg-2sarge1_arm.deb stable/main/binary-arm/python2.2-tk_2.2.3dfsg-2sarge1_arm.deb stable/main/binary-arm/python2.2-dev_2.2.3dfsg-2sarge1_arm.deb python2.2 (2.2.3dfsg-2sarge1) stable-security; urgency=low * SECURITY UPDATE (prepared by Martin Pitt <martin.pitt@ubuntu.com>). * Add debian/patches/pcre-security_CAN-2005-2491.dpatch: - Fix recent PCRE buffer overflow in local copy. - CAN-2005-2491 * Fix bug in the original fix for CAN-2005-0089 (closes: #307689). stable/main/binary-alpha/python2.2-xmlbase_2.2.3dfsg-2sarge1_alpha.deb stable/main/binary-alpha/python2.2_2.2.3dfsg-2sarge1_alpha.deb stable/main/binary-alpha/python2.2-tk_2.2.3dfsg-2sarge1_alpha.deb stable/main/binary-alpha/python2.2-dev_2.2.3dfsg-2sarge1_alpha.deb stable/main/binary-alpha/python2.2-gdbm_2.2.3dfsg-2sarge1_alpha.deb stable/main/binary-alpha/python2.2-mpz_2.2.3dfsg-2sarge1_alpha.deb python2.2 (2.2.3dfsg-2sarge1) stable-security; urgency=low * SECURITY UPDATE (prepared by Martin Pitt <martin.pitt@ubuntu.com>). * Add debian/patches/pcre-security_CAN-2005-2491.dpatch: - Fix recent PCRE buffer overflow in local copy. - CAN-2005-2491 * Fix bug in the original fix for CAN-2005-0089 (closes: #307689). stable/main/binary-sparc/python2.1-gdbm_2.1.3dfsg-1sarge1_sparc.deb stable/main/binary-sparc/python2.1_2.1.3dfsg-1sarge1_sparc.deb stable/main/binary-sparc/python2.1-xmlbase_2.1.3dfsg-1sarge1_sparc.deb stable/main/binary-sparc/python2.1-tk_2.1.3dfsg-1sarge1_sparc.deb stable/main/binary-sparc/python2.1-mpz_2.1.3dfsg-1sarge1_sparc.deb stable/main/binary-sparc/python2.1-dev_2.1.3dfsg-1sarge1_sparc.deb python2.1 (2.1.3dfsg-1sarge1) stable-security; urgency=low * SECURITY UPDATE (prepared by Martin Pitt <martin.pitt@ubuntu.com>). * Add debian/patches/pcre-security_CAN-2005-2491.dpatch: - Fix recent PCRE buffer overflow in local copy. - CAN-2005-2491 stable/main/binary-s390/python2.1-xmlbase_2.1.3dfsg-1sarge1_s390.deb stable/main/binary-s390/python2.1-dev_2.1.3dfsg-1sarge1_s390.deb stable/main/binary-s390/python2.1_2.1.3dfsg-1sarge1_s390.deb stable/main/binary-s390/python2.1-tk_2.1.3dfsg-1sarge1_s390.deb stable/main/binary-s390/python2.1-mpz_2.1.3dfsg-1sarge1_s390.deb stable/main/binary-s390/python2.1-gdbm_2.1.3dfsg-1sarge1_s390.deb python2.1 (2.1.3dfsg-1sarge1) stable-security; urgency=low * SECURITY UPDATE (prepared by Martin Pitt <martin.pitt@ubuntu.com>). * Add debian/patches/pcre-security_CAN-2005-2491.dpatch: - Fix recent PCRE buffer overflow in local copy. - CAN-2005-2491 stable/main/binary-powerpc/python2.1-xmlbase_2.1.3dfsg-1sarge1_powerpc.deb stable/main/binary-powerpc/python2.1-dev_2.1.3dfsg-1sarge1_powerpc.deb stable/main/binary-powerpc/python2.1_2.1.3dfsg-1sarge1_powerpc.deb stable/main/binary-powerpc/python2.1-gdbm_2.1.3dfsg-1sarge1_powerpc.deb stable/main/binary-powerpc/python2.1-mpz_2.1.3dfsg-1sarge1_powerpc.deb stable/main/binary-powerpc/python2.1-tk_2.1.3dfsg-1sarge1_powerpc.deb python2.1 (2.1.3dfsg-1sarge1) stable-security; urgency=low * SECURITY UPDATE (prepared by Martin Pitt <martin.pitt@ubuntu.com>). * Add debian/patches/pcre-security_CAN-2005-2491.dpatch: - Fix recent PCRE buffer overflow in local copy. - CAN-2005-2491 stable/main/binary-mipsel/python2.1-mpz_2.1.3dfsg-1sarge1_mipsel.deb stable/main/binary-mipsel/python2.1-tk_2.1.3dfsg-1sarge1_mipsel.deb stable/main/binary-mipsel/python2.1-dev_2.1.3dfsg-1sarge1_mipsel.deb stable/main/binary-mipsel/python2.1-xmlbase_2.1.3dfsg-1sarge1_mipsel.deb stable/main/binary-mipsel/python2.1_2.1.3dfsg-1sarge1_mipsel.deb stable/main/binary-mipsel/python2.1-gdbm_2.1.3dfsg-1sarge1_mipsel.deb python2.1 (2.1.3dfsg-1sarge1) stable-security; urgency=low * SECURITY UPDATE (prepared by Martin Pitt <martin.pitt@ubuntu.com>). * Add debian/patches/pcre-security_CAN-2005-2491.dpatch: - Fix recent PCRE buffer overflow in local copy. - CAN-2005-2491 stable/main/binary-mips/python2.1_2.1.3dfsg-1sarge1_mips.deb stable/main/binary-mips/python2.1-tk_2.1.3dfsg-1sarge1_mips.deb stable/main/binary-mips/python2.1-dev_2.1.3dfsg-1sarge1_mips.deb stable/main/binary-mips/python2.1-mpz_2.1.3dfsg-1sarge1_mips.deb stable/main/binary-mips/python2.1-gdbm_2.1.3dfsg-1sarge1_mips.deb stable/main/binary-mips/python2.1-xmlbase_2.1.3dfsg-1sarge1_mips.deb python2.1 (2.1.3dfsg-1sarge1) stable-security; urgency=low * SECURITY UPDATE (prepared by Martin Pitt <martin.pitt@ubuntu.com>). * Add debian/patches/pcre-security_CAN-2005-2491.dpatch: - Fix recent PCRE buffer overflow in local copy. - CAN-2005-2491 stable/main/binary-m68k/python2.1-tk_2.1.3dfsg-1sarge1_m68k.deb stable/main/binary-m68k/python2.1-gdbm_2.1.3dfsg-1sarge1_m68k.deb stable/main/binary-m68k/python2.1_2.1.3dfsg-1sarge1_m68k.deb stable/main/binary-m68k/python2.1-dev_2.1.3dfsg-1sarge1_m68k.deb stable/main/binary-m68k/python2.1-xmlbase_2.1.3dfsg-1sarge1_m68k.deb stable/main/binary-m68k/python2.1-mpz_2.1.3dfsg-1sarge1_m68k.deb python2.1 (2.1.3dfsg-1sarge1) stable-security; urgency=low * SECURITY UPDATE (prepared by Martin Pitt <martin.pitt@ubuntu.com>). * Add debian/patches/pcre-security_CAN-2005-2491.dpatch: - Fix recent PCRE buffer overflow in local copy. - CAN-2005-2491 stable/main/binary-ia64/python2.1-xmlbase_2.1.3dfsg-1sarge1_ia64.deb stable/main/binary-ia64/python2.1_2.1.3dfsg-1sarge1_ia64.deb stable/main/binary-ia64/python2.1-tk_2.1.3dfsg-1sarge1_ia64.deb stable/main/binary-ia64/python2.1-dev_2.1.3dfsg-1sarge1_ia64.deb stable/main/binary-ia64/python2.1-mpz_2.1.3dfsg-1sarge1_ia64.deb stable/main/binary-ia64/python2.1-gdbm_2.1.3dfsg-1sarge1_ia64.deb python2.1 (2.1.3dfsg-1sarge1) stable-security; urgency=low * SECURITY UPDATE (prepared by Martin Pitt <martin.pitt@ubuntu.com>). * Add debian/patches/pcre-security_CAN-2005-2491.dpatch: - Fix recent PCRE buffer overflow in local copy. - CAN-2005-2491 stable/main/binary-hppa/python2.1-xmlbase_2.1.3dfsg-1sarge1_hppa.deb stable/main/binary-hppa/python2.1-gdbm_2.1.3dfsg-1sarge1_hppa.deb stable/main/binary-hppa/python2.1-mpz_2.1.3dfsg-1sarge1_hppa.deb stable/main/binary-hppa/python2.1_2.1.3dfsg-1sarge1_hppa.deb stable/main/binary-hppa/python2.1-tk_2.1.3dfsg-1sarge1_hppa.deb stable/main/binary-hppa/python2.1-dev_2.1.3dfsg-1sarge1_hppa.deb python2.1 (2.1.3dfsg-1sarge1) stable-security; urgency=low * SECURITY UPDATE (prepared by Martin Pitt <martin.pitt@ubuntu.com>). * Add debian/patches/pcre-security_CAN-2005-2491.dpatch: - Fix recent PCRE buffer overflow in local copy. - CAN-2005-2491 stable/main/binary-arm/python2.1-gdbm_2.1.3dfsg-1sarge1_arm.deb stable/main/binary-arm/python2.1_2.1.3dfsg-1sarge1_arm.deb stable/main/binary-arm/python2.1-dev_2.1.3dfsg-1sarge1_arm.deb stable/main/binary-arm/python2.1-mpz_2.1.3dfsg-1sarge1_arm.deb stable/main/binary-arm/python2.1-tk_2.1.3dfsg-1sarge1_arm.deb stable/main/binary-arm/python2.1-xmlbase_2.1.3dfsg-1sarge1_arm.deb python2.1 (2.1.3dfsg-1sarge1) stable-security; urgency=low * SECURITY UPDATE (prepared by Martin Pitt <martin.pitt@ubuntu.com>). * Add debian/patches/pcre-security_CAN-2005-2491.dpatch: - Fix recent PCRE buffer overflow in local copy. - CAN-2005-2491 stable/main/binary-alpha/python2.1-dev_2.1.3dfsg-1sarge1_alpha.deb stable/main/binary-alpha/python2.1-mpz_2.1.3dfsg-1sarge1_alpha.deb stable/main/binary-alpha/python2.1-tk_2.1.3dfsg-1sarge1_alpha.deb stable/main/binary-alpha/python2.1_2.1.3dfsg-1sarge1_alpha.deb stable/main/binary-alpha/python2.1-gdbm_2.1.3dfsg-1sarge1_alpha.deb stable/main/binary-alpha/python2.1-xmlbase_2.1.3dfsg-1sarge1_alpha.deb python2.1 (2.1.3dfsg-1sarge1) stable-security; urgency=low * SECURITY UPDATE (prepared by Martin Pitt <martin.pitt@ubuntu.com>). * Add debian/patches/pcre-security_CAN-2005-2491.dpatch: - Fix recent PCRE buffer overflow in local copy. - CAN-2005-2491 stable/main/binary-sparc/pstotext_1.9-1sarge1_sparc.deb pstotext (1.9-1sarge1) stable-security; urgency=high * Non-maintainer upload by the Security Team * Added -dSAFER to the execution of ghostscript to prevent the execution of arbitary commands [main.c, CAN-2005-2536] stable/main/binary-s390/pstotext_1.9-1sarge1_s390.deb pstotext (1.9-1sarge1) stable-security; urgency=high * Non-maintainer upload by the Security Team * Added -dSAFER to the execution of ghostscript to prevent the execution of arbitary commands [main.c, CAN-2005-2536] stable/main/binary-powerpc/pstotext_1.9-1sarge1_powerpc.deb pstotext (1.9-1sarge1) stable-security; urgency=high * Non-maintainer upload by the Security Team * Added -dSAFER to the execution of ghostscript to prevent the execution of arbitary commands [main.c, CAN-2005-2536] stable/main/binary-mipsel/pstotext_1.9-1sarge1_mipsel.deb pstotext (1.9-1sarge1) stable-security; urgency=high * Non-maintainer upload by the Security Team * Added -dSAFER to the execution of ghostscript to prevent the execution of arbitary commands [main.c, CAN-2005-2536] stable/main/binary-mips/pstotext_1.9-1sarge1_mips.deb pstotext (1.9-1sarge1) stable-security; urgency=high * Non-maintainer upload by the Security Team * Added -dSAFER to the execution of ghostscript to prevent the execution of arbitary commands [main.c, CAN-2005-2536] stable/main/binary-m68k/pstotext_1.9-1sarge1_m68k.deb pstotext (1.9-1sarge1) stable-security; urgency=high * Non-maintainer upload by the Security Team * Added -dSAFER to the execution of ghostscript to prevent the execution of arbitary commands [main.c, CAN-2005-2536] stable/main/binary-ia64/pstotext_1.9-1sarge1_ia64.deb pstotext (1.9-1sarge1) stable-security; urgency=high * Non-maintainer upload by the Security Team * Added -dSAFER to the execution of ghostscript to prevent the execution of arbitary commands [main.c, CAN-2005-2536] stable/main/binary-hppa/pstotext_1.9-1sarge1_hppa.deb pstotext (1.9-1sarge1) stable-security; urgency=high * Non-maintainer upload by the Security Team * Added -dSAFER to the execution of ghostscript to prevent the execution of arbitary commands [main.c, CAN-2005-2536] stable/main/binary-alpha/pstotext_1.9-1sarge1_alpha.deb pstotext (1.9-1sarge1) stable-security; urgency=high * Non-maintainer upload by the Security Team * Added -dSAFER to the execution of ghostscript to prevent the execution of arbitary commands [main.c, CAN-2005-2536] stable/main/binary-sparc/php4-curl_4.3.10-16_sparc.deb stable/main/binary-sparc/php4-mysql_4.3.10-16_sparc.deb stable/main/binary-sparc/php4-mhash_4.3.10-16_sparc.deb stable/main/binary-sparc/php4-dev_4.3.10-16_sparc.deb stable/main/binary-sparc/php4-snmp_4.3.10-16_sparc.deb stable/main/binary-sparc/php4-imap_4.3.10-16_sparc.deb stable/main/binary-sparc/libapache-mod-php4_4.3.10-16_sparc.deb stable/main/binary-sparc/php4-common_4.3.10-16_sparc.deb stable/main/binary-sparc/php4-mcal_4.3.10-16_sparc.deb stable/main/binary-sparc/php4-recode_4.3.10-16_sparc.deb stable/main/binary-sparc/php4-odbc_4.3.10-16_sparc.deb stable/main/binary-sparc/php4-domxml_4.3.10-16_sparc.deb stable/main/binary-sparc/php4-cli_4.3.10-16_sparc.deb stable/main/binary-sparc/libapache2-mod-php4_4.3.10-16_sparc.deb stable/main/binary-sparc/php4-sybase_4.3.10-16_sparc.deb stable/main/binary-sparc/php4-ldap_4.3.10-16_sparc.deb stable/main/binary-sparc/php4-xslt_4.3.10-16_sparc.deb stable/main/binary-sparc/php4-gd_4.3.10-16_sparc.deb stable/main/binary-sparc/php4-cgi_4.3.10-16_sparc.deb php4 (4:4.3.10-16) stable-security; urgency=high Adam Conrad <adconrad@0c3.net>: * Patch php4-dev's bundled shtool to use a temporary directory to resolve insecure temp file handling, reported in CAN-2005-1751 and CAN-2005-1759. * Patch PEAR after it has been installed in debian/php4-pear to resolve the XML-RPC vulnerability reported in CAN-2005-1921 (closes: #316447) * Backport changes by sesser@php.net and danielc@php.net to resolve another remote XML_RPC exploit, as reported in CAN-2005-2498 (closes: #323366) stable/main/binary-s390/php4-domxml_4.3.10-16_s390.deb stable/main/binary-s390/php4-cli_4.3.10-16_s390.deb stable/main/binary-s390/php4-recode_4.3.10-16_s390.deb stable/main/binary-s390/php4-snmp_4.3.10-16_s390.deb stable/main/binary-s390/libapache2-mod-php4_4.3.10-16_s390.deb stable/main/binary-s390/php4-cgi_4.3.10-16_s390.deb stable/main/binary-s390/php4-common_4.3.10-16_s390.deb stable/main/binary-s390/php4-xslt_4.3.10-16_s390.deb stable/main/binary-s390/php4-mysql_4.3.10-16_s390.deb stable/main/binary-s390/php4-mcal_4.3.10-16_s390.deb stable/main/binary-s390/php4-ldap_4.3.10-16_s390.deb stable/main/binary-s390/php4-gd_4.3.10-16_s390.deb stable/main/binary-s390/php4-mhash_4.3.10-16_s390.deb stable/main/binary-s390/php4-sybase_4.3.10-16_s390.deb stable/main/binary-s390/php4-dev_4.3.10-16_s390.deb stable/main/binary-s390/php4-odbc_4.3.10-16_s390.deb stable/main/binary-s390/libapache-mod-php4_4.3.10-16_s390.deb stable/main/binary-s390/php4-imap_4.3.10-16_s390.deb stable/main/binary-s390/php4-curl_4.3.10-16_s390.deb php4 (4:4.3.10-16) stable-security; urgency=high Adam Conrad <adconrad@0c3.net>: * Patch php4-dev's bundled shtool to use a temporary directory to resolve insecure temp file handling, reported in CAN-2005-1751 and CAN-2005-1759. * Patch PEAR after it has been installed in debian/php4-pear to resolve the XML-RPC vulnerability reported in CAN-2005-1921 (closes: #316447) * Backport changes by sesser@php.net and danielc@php.net to resolve another remote XML_RPC exploit, as reported in CAN-2005-2498 (closes: #323366) stable/main/binary-powerpc/php4-cli_4.3.10-16_powerpc.deb stable/main/binary-powerpc/php4-cgi_4.3.10-16_powerpc.deb stable/main/binary-powerpc/php4-curl_4.3.10-16_powerpc.deb stable/main/binary-powerpc/php4-ldap_4.3.10-16_powerpc.deb stable/main/binary-powerpc/php4-gd_4.3.10-16_powerpc.deb stable/main/binary-powerpc/php4-dev_4.3.10-16_powerpc.deb stable/main/binary-powerpc/php4-xslt_4.3.10-16_powerpc.deb stable/main/binary-powerpc/php4-odbc_4.3.10-16_powerpc.deb stable/main/binary-powerpc/php4-sybase_4.3.10-16_powerpc.deb stable/main/binary-powerpc/php4-snmp_4.3.10-16_powerpc.deb stable/main/binary-powerpc/php4-recode_4.3.10-16_powerpc.deb stable/main/binary-powerpc/libapache2-mod-php4_4.3.10-16_powerpc.deb stable/main/binary-powerpc/php4-mcal_4.3.10-16_powerpc.deb stable/main/binary-powerpc/php4-mysql_4.3.10-16_powerpc.deb stable/main/binary-powerpc/php4-common_4.3.10-16_powerpc.deb stable/main/binary-powerpc/php4-domxml_4.3.10-16_powerpc.deb stable/main/binary-powerpc/libapache-mod-php4_4.3.10-16_powerpc.deb stable/main/binary-powerpc/php4-mhash_4.3.10-16_powerpc.deb stable/main/binary-powerpc/php4-imap_4.3.10-16_powerpc.deb php4 (4:4.3.10-16) stable-security; urgency=high Adam Conrad <adconrad@0c3.net>: * Patch php4-dev's bundled shtool to use a temporary directory to resolve insecure temp file handling, reported in CAN-2005-1751 and CAN-2005-1759. * Patch PEAR after it has been installed in debian/php4-pear to resolve the XML-RPC vulnerability reported in CAN-2005-1921 (closes: #316447) * Backport changes by sesser@php.net and danielc@php.net to resolve another remote XML_RPC exploit, as reported in CAN-2005-2498 (closes: #323366) stable/main/binary-mipsel/libapache-mod-php4_4.3.10-16_mipsel.deb stable/main/binary-mipsel/php4-domxml_4.3.10-16_mipsel.deb stable/main/binary-mipsel/php4-mhash_4.3.10-16_mipsel.deb stable/main/binary-mipsel/php4-dev_4.3.10-16_mipsel.deb stable/main/binary-mipsel/php4-sybase_4.3.10-16_mipsel.deb stable/main/binary-mipsel/php4-cgi_4.3.10-16_mipsel.deb stable/main/binary-mipsel/php4-recode_4.3.10-16_mipsel.deb stable/main/binary-mipsel/php4-cli_4.3.10-16_mipsel.deb stable/main/binary-mipsel/php4-common_4.3.10-16_mipsel.deb stable/main/binary-mipsel/php4-mcal_4.3.10-16_mipsel.deb stable/main/binary-mipsel/php4-odbc_4.3.10-16_mipsel.deb stable/main/binary-mipsel/php4-snmp_4.3.10-16_mipsel.deb stable/main/binary-mipsel/php4-gd_4.3.10-16_mipsel.deb stable/main/binary-mipsel/php4-curl_4.3.10-16_mipsel.deb stable/main/binary-mipsel/php4-xslt_4.3.10-16_mipsel.deb stable/main/binary-mipsel/php4-imap_4.3.10-16_mipsel.deb stable/main/binary-mipsel/php4-ldap_4.3.10-16_mipsel.deb stable/main/binary-mipsel/php4-mysql_4.3.10-16_mipsel.deb stable/main/binary-mipsel/libapache2-mod-php4_4.3.10-16_mipsel.deb php4 (4:4.3.10-16) stable-security; urgency=high Adam Conrad <adconrad@0c3.net>: * Patch php4-dev's bundled shtool to use a temporary directory to resolve insecure temp file handling, reported in CAN-2005-1751 and CAN-2005-1759. * Patch PEAR after it has been installed in debian/php4-pear to resolve the XML-RPC vulnerability reported in CAN-2005-1921 (closes: #316447) * Backport changes by sesser@php.net and danielc@php.net to resolve another remote XML_RPC exploit, as reported in CAN-2005-2498 (closes: #323366) stable/main/binary-mips/php4-sybase_4.3.10-16_mips.deb stable/main/binary-mips/php4-cgi_4.3.10-16_mips.deb stable/main/binary-mips/php4-common_4.3.10-16_mips.deb stable/main/binary-mips/php4-snmp_4.3.10-16_mips.deb stable/main/binary-mips/libapache-mod-php4_4.3.10-16_mips.deb stable/main/binary-mips/php4-cli_4.3.10-16_mips.deb stable/main/binary-mips/libapache2-mod-php4_4.3.10-16_mips.deb stable/main/binary-mips/php4-dev_4.3.10-16_mips.deb stable/main/binary-mips/php4-odbc_4.3.10-16_mips.deb stable/main/binary-mips/php4-mysql_4.3.10-16_mips.deb stable/main/binary-mips/php4-imap_4.3.10-16_mips.deb stable/main/binary-mips/php4-domxml_4.3.10-16_mips.deb stable/main/binary-mips/php4-mcal_4.3.10-16_mips.deb stable/main/binary-mips/php4-gd_4.3.10-16_mips.deb stable/main/binary-mips/php4-ldap_4.3.10-16_mips.deb stable/main/binary-mips/php4-recode_4.3.10-16_mips.deb stable/main/binary-mips/php4-curl_4.3.10-16_mips.deb stable/main/binary-mips/php4-xslt_4.3.10-16_mips.deb stable/main/binary-mips/php4-mhash_4.3.10-16_mips.deb php4 (4:4.3.10-16) stable-security; urgency=high Adam Conrad <adconrad@0c3.net>: * Patch php4-dev's bundled shtool to use a temporary directory to resolve insecure temp file handling, reported in CAN-2005-1751 and CAN-2005-1759. * Patch PEAR after it has been installed in debian/php4-pear to resolve the XML-RPC vulnerability reported in CAN-2005-1921 (closes: #316447) * Backport changes by sesser@php.net and danielc@php.net to resolve another remote XML_RPC exploit, as reported in CAN-2005-2498 (closes: #323366) stable/main/binary-ia64/libapache2-mod-php4_4.3.10-16_ia64.deb stable/main/binary-ia64/php4-sybase_4.3.10-16_ia64.deb stable/main/binary-ia64/php4-xslt_4.3.10-16_ia64.deb stable/main/binary-ia64/php4-domxml_4.3.10-16_ia64.deb stable/main/binary-ia64/libapache-mod-php4_4.3.10-16_ia64.deb stable/main/binary-ia64/php4-gd_4.3.10-16_ia64.deb stable/main/binary-ia64/php4-cli_4.3.10-16_ia64.deb stable/main/binary-ia64/php4-imap_4.3.10-16_ia64.deb stable/main/binary-ia64/php4-recode_4.3.10-16_ia64.deb stable/main/binary-ia64/php4-snmp_4.3.10-16_ia64.deb stable/main/binary-ia64/php4-common_4.3.10-16_ia64.deb stable/main/binary-ia64/php4-cgi_4.3.10-16_ia64.deb stable/main/binary-ia64/php4-mysql_4.3.10-16_ia64.deb stable/main/binary-ia64/php4-dev_4.3.10-16_ia64.deb stable/main/binary-ia64/php4-mcal_4.3.10-16_ia64.deb stable/main/binary-ia64/php4-curl_4.3.10-16_ia64.deb stable/main/binary-ia64/php4-odbc_4.3.10-16_ia64.deb stable/main/binary-ia64/php4-mhash_4.3.10-16_ia64.deb stable/main/binary-ia64/php4-ldap_4.3.10-16_ia64.deb php4 (4:4.3.10-16) stable-security; urgency=high Adam Conrad <adconrad@0c3.net>: * Patch php4-dev's bundled shtool to use a temporary directory to resolve insecure temp file handling, reported in CAN-2005-1751 and CAN-2005-1759. * Patch PEAR after it has been installed in debian/php4-pear to resolve the XML-RPC vulnerability reported in CAN-2005-1921 (closes: #316447) * Backport changes by sesser@php.net and danielc@php.net to resolve another remote XML_RPC exploit, as reported in CAN-2005-2498 (closes: #323366) stable/main/binary-hppa/php4-ldap_4.3.10-16_hppa.deb stable/main/binary-hppa/php4-gd_4.3.10-16_hppa.deb stable/main/binary-hppa/php4-mysql_4.3.10-16_hppa.deb stable/main/binary-hppa/php4-common_4.3.10-16_hppa.deb stable/main/binary-hppa/php4-xslt_4.3.10-16_hppa.deb stable/main/binary-hppa/php4-cli_4.3.10-16_hppa.deb stable/main/binary-hppa/php4-mcal_4.3.10-16_hppa.deb stable/main/binary-hppa/php4-mhash_4.3.10-16_hppa.deb stable/main/binary-hppa/php4-imap_4.3.10-16_hppa.deb stable/main/binary-hppa/php4-odbc_4.3.10-16_hppa.deb stable/main/binary-hppa/php4-sybase_4.3.10-16_hppa.deb stable/main/binary-hppa/libapache2-mod-php4_4.3.10-16_hppa.deb stable/main/binary-hppa/php4-domxml_4.3.10-16_hppa.deb stable/main/binary-hppa/php4-cgi_4.3.10-16_hppa.deb stable/main/binary-hppa/php4-curl_4.3.10-16_hppa.deb stable/main/binary-hppa/libapache-mod-php4_4.3.10-16_hppa.deb stable/main/binary-hppa/php4-recode_4.3.10-16_hppa.deb stable/main/binary-hppa/php4-snmp_4.3.10-16_hppa.deb stable/main/binary-hppa/php4-dev_4.3.10-16_hppa.deb php4 (4:4.3.10-16) stable-security; urgency=high Adam Conrad <adconrad@0c3.net>: * Patch php4-dev's bundled shtool to use a temporary directory to resolve insecure temp file handling, reported in CAN-2005-1751 and CAN-2005-1759. * Patch PEAR after it has been installed in debian/php4-pear to resolve the XML-RPC vulnerability reported in CAN-2005-1921 (closes: #316447) * Backport changes by sesser@php.net and danielc@php.net to resolve another remote XML_RPC exploit, as reported in CAN-2005-2498 (closes: #323366) stable/main/binary-arm/php4-imap_4.3.10-16_arm.deb stable/main/binary-arm/php4-domxml_4.3.10-16_arm.deb stable/main/binary-arm/php4-cgi_4.3.10-16_arm.deb stable/main/binary-arm/php4-odbc_4.3.10-16_arm.deb stable/main/binary-arm/libapache-mod-php4_4.3.10-16_arm.deb stable/main/binary-arm/php4-dev_4.3.10-16_arm.deb stable/main/binary-arm/php4-mcal_4.3.10-16_arm.deb stable/main/binary-arm/php4-curl_4.3.10-16_arm.deb stable/main/binary-arm/php4-common_4.3.10-16_arm.deb stable/main/binary-arm/php4-xslt_4.3.10-16_arm.deb stable/main/binary-arm/php4-recode_4.3.10-16_arm.deb stable/main/binary-arm/php4-sybase_4.3.10-16_arm.deb stable/main/binary-arm/php4-snmp_4.3.10-16_arm.deb stable/main/binary-arm/php4-ldap_4.3.10-16_arm.deb stable/main/binary-arm/php4-gd_4.3.10-16_arm.deb stable/main/binary-arm/php4-cli_4.3.10-16_arm.deb stable/main/binary-arm/php4-mhash_4.3.10-16_arm.deb stable/main/binary-arm/php4-mysql_4.3.10-16_arm.deb stable/main/binary-arm/libapache2-mod-php4_4.3.10-16_arm.deb php4 (4:4.3.10-16) stable-security; urgency=high Adam Conrad <adconrad@0c3.net>: * Patch php4-dev's bundled shtool to use a temporary directory to resolve insecure temp file handling, reported in CAN-2005-1751 and CAN-2005-1759. * Patch PEAR after it has been installed in debian/php4-pear to resolve the XML-RPC vulnerability reported in CAN-2005-1921 (closes: #316447) * Backport changes by sesser@php.net and danielc@php.net to resolve another remote XML_RPC exploit, as reported in CAN-2005-2498 (closes: #323366) stable/main/binary-alpha/php4-mcal_4.3.10-16_alpha.deb stable/main/binary-alpha/php4-cli_4.3.10-16_alpha.deb stable/main/binary-alpha/php4-mhash_4.3.10-16_alpha.deb stable/main/binary-alpha/php4-sybase_4.3.10-16_alpha.deb stable/main/binary-alpha/php4-snmp_4.3.10-16_alpha.deb stable/main/binary-alpha/php4-recode_4.3.10-16_alpha.deb stable/main/binary-alpha/php4-cgi_4.3.10-16_alpha.deb stable/main/binary-alpha/php4-gd_4.3.10-16_alpha.deb stable/main/binary-alpha/php4-dev_4.3.10-16_alpha.deb stable/main/binary-alpha/php4-common_4.3.10-16_alpha.deb stable/main/binary-alpha/php4-ldap_4.3.10-16_alpha.deb stable/main/binary-alpha/php4-imap_4.3.10-16_alpha.deb stable/main/binary-alpha/php4-domxml_4.3.10-16_alpha.deb stable/main/binary-alpha/php4-odbc_4.3.10-16_alpha.deb stable/main/binary-alpha/libapache-mod-php4_4.3.10-16_alpha.deb stable/main/binary-alpha/libapache2-mod-php4_4.3.10-16_alpha.deb stable/main/binary-alpha/php4-xslt_4.3.10-16_alpha.deb stable/main/binary-alpha/php4-mysql_4.3.10-16_alpha.deb stable/main/binary-alpha/php4-curl_4.3.10-16_alpha.deb php4 (4:4.3.10-16) stable-security; urgency=high Adam Conrad <adconrad@0c3.net>: * Patch php4-dev's bundled shtool to use a temporary directory to resolve insecure temp file handling, reported in CAN-2005-1751 and CAN-2005-1759. * Patch PEAR after it has been installed in debian/php4-pear to resolve the XML-RPC vulnerability reported in CAN-2005-1921 (closes: #316447) * Backport changes by sesser@php.net and danielc@php.net to resolve another remote XML_RPC exploit, as reported in CAN-2005-2498 (closes: #323366) stable/main/binary-sparc/libapache-mod-ssl_2.8.22-1sarge1_sparc.deb libapache-mod-ssl (2.8.22-1sarge1) stable-security; urgency=high * Backported patch for security fix (CAN-2005-2700). stable/main/binary-s390/libapache-mod-ssl_2.8.22-1sarge1_s390.deb libapache-mod-ssl (2.8.22-1sarge1) stable-security; urgency=high * Backported patch for security fix (CAN-2005-2700). stable/main/binary-powerpc/libapache-mod-ssl_2.8.22-1sarge1_powerpc.deb libapache-mod-ssl (2.8.22-1sarge1) stable-security; urgency=high * Backported patch for security fix (CAN-2005-2700). stable/main/binary-mipsel/libapache-mod-ssl_2.8.22-1sarge1_mipsel.deb libapache-mod-ssl (2.8.22-1sarge1) stable-security; urgency=high * Backported patch for security fix (CAN-2005-2700). stable/main/binary-mips/libapache-mod-ssl_2.8.22-1sarge1_mips.deb libapache-mod-ssl (2.8.22-1sarge1) stable-security; urgency=high * Backported patch for security fix (CAN-2005-2700). stable/main/binary-m68k/libapache-mod-ssl_2.8.22-1sarge1_m68k.deb libapache-mod-ssl (2.8.22-1sarge1) stable-security; urgency=high * Backported patch for security fix (CAN-2005-2700). stable/main/binary-ia64/libapache-mod-ssl_2.8.22-1sarge1_ia64.deb libapache-mod-ssl (2.8.22-1sarge1) stable-security; urgency=high * Backported patch for security fix (CAN-2005-2700). stable/main/binary-hppa/libapache-mod-ssl_2.8.22-1sarge1_hppa.deb libapache-mod-ssl (2.8.22-1sarge1) stable-security; urgency=high * Backported patch for security fix (CAN-2005-2700). stable/main/binary-arm/libapache-mod-ssl_2.8.22-1sarge1_arm.deb libapache-mod-ssl (2.8.22-1sarge1) stable-security; urgency=high * Backported patch for security fix (CAN-2005-2700). stable/main/binary-alpha/libapache-mod-ssl_2.8.22-1sarge1_alpha.deb libapache-mod-ssl (2.8.22-1sarge1) stable-security; urgency=high * Backported patch for security fix (CAN-2005-2700). stable/main/binary-sparc/kmrml_3.3.2-2sarge1_sparc.deb stable/main/binary-sparc/kpdf_3.3.2-2sarge1_sparc.deb stable/main/binary-sparc/kview_3.3.2-2sarge1_sparc.deb stable/main/binary-sparc/kpovmodeler_3.3.2-2sarge1_sparc.deb stable/main/binary-sparc/libkscan-dev_3.3.2-2sarge1_sparc.deb stable/main/binary-sparc/kruler_3.3.2-2sarge1_sparc.deb stable/main/binary-sparc/kghostview_3.3.2-2sarge1_sparc.deb stable/main/binary-sparc/kamera_3.3.2-2sarge1_sparc.deb stable/main/binary-sparc/kdegraphics-dev_3.3.2-2sarge1_sparc.deb stable/main/binary-sparc/kdvi_3.3.2-2sarge1_sparc.deb stable/main/binary-sparc/ksvg_3.3.2-2sarge1_sparc.deb stable/main/binary-sparc/kooka_3.3.2-2sarge1_sparc.deb stable/main/binary-sparc/ksnapshot_3.3.2-2sarge1_sparc.deb stable/main/binary-sparc/kcoloredit_3.3.2-2sarge1_sparc.deb stable/main/binary-sparc/kuickshow_3.3.2-2sarge1_sparc.deb stable/main/binary-sparc/kgamma_3.3.2-2sarge1_sparc.deb stable/main/binary-sparc/kolourpaint_3.3.2-2sarge1_sparc.deb stable/main/binary-sparc/kdegraphics-kfile-plugins_3.3.2-2sarge1_sparc.deb stable/main/binary-sparc/libkscan1_3.3.2-2sarge1_sparc.deb stable/main/binary-sparc/kfax_3.3.2-2sarge1_sparc.deb stable/main/binary-sparc/kviewshell_3.3.2-2sarge1_sparc.deb stable/main/binary-sparc/kiconedit_3.3.2-2sarge1_sparc.deb kdegraphics (4:3.3.2-2sarge1) stable-security; urgency=high * Non-maintainer upload by the Security Team * Applied xpdf upstream patch by Derek Noonburg to fix broken handling of broken fonts [fofi/FoFiTrueType.cc, xpdf/SplashOutputDev.cc, CAN-2005-2097] stable/main/binary-s390/ksvg_3.3.2-2sarge1_s390.deb stable/main/binary-s390/kgamma_3.3.2-2sarge1_s390.deb stable/main/binary-s390/kdegraphics-kfile-plugins_3.3.2-2sarge1_s390.deb stable/main/binary-s390/kamera_3.3.2-2sarge1_s390.deb stable/main/binary-s390/kmrml_3.3.2-2sarge1_s390.deb stable/main/binary-s390/kdvi_3.3.2-2sarge1_s390.deb stable/main/binary-s390/kpovmodeler_3.3.2-2sarge1_s390.deb stable/main/binary-s390/kiconedit_3.3.2-2sarge1_s390.deb stable/main/binary-s390/kooka_3.3.2-2sarge1_s390.deb stable/main/binary-s390/kolourpaint_3.3.2-2sarge1_s390.deb stable/main/binary-s390/libkscan-dev_3.3.2-2sarge1_s390.deb stable/main/binary-s390/kruler_3.3.2-2sarge1_s390.deb stable/main/binary-s390/kghostview_3.3.2-2sarge1_s390.deb stable/main/binary-s390/kviewshell_3.3.2-2sarge1_s390.deb stable/main/binary-s390/kdegraphics-dev_3.3.2-2sarge1_s390.deb stable/main/binary-s390/kview_3.3.2-2sarge1_s390.deb stable/main/binary-s390/kuickshow_3.3.2-2sarge1_s390.deb stable/main/binary-s390/kfax_3.3.2-2sarge1_s390.deb stable/main/binary-s390/kpdf_3.3.2-2sarge1_s390.deb stable/main/binary-s390/ksnapshot_3.3.2-2sarge1_s390.deb stable/main/binary-s390/kcoloredit_3.3.2-2sarge1_s390.deb stable/main/binary-s390/libkscan1_3.3.2-2sarge1_s390.deb kdegraphics (4:3.3.2-2sarge1) stable-security; urgency=high * Non-maintainer upload by the Security Team * Applied xpdf upstream patch by Derek Noonburg to fix broken handling of broken fonts [fofi/FoFiTrueType.cc, xpdf/SplashOutputDev.cc, CAN-2005-2097] stable/main/binary-powerpc/kuickshow_3.3.2-2sarge1_powerpc.deb stable/main/binary-powerpc/libkscan1_3.3.2-2sarge1_powerpc.deb stable/main/binary-powerpc/kruler_3.3.2-2sarge1_powerpc.deb stable/main/binary-powerpc/kiconedit_3.3.2-2sarge1_powerpc.deb stable/main/binary-powerpc/kviewshell_3.3.2-2sarge1_powerpc.deb stable/main/binary-powerpc/kamera_3.3.2-2sarge1_powerpc.deb stable/main/binary-powerpc/kgamma_3.3.2-2sarge1_powerpc.deb stable/main/binary-powerpc/kdegraphics-kfile-plugins_3.3.2-2sarge1_powerpc.deb stable/main/binary-powerpc/kfax_3.3.2-2sarge1_powerpc.deb stable/main/binary-powerpc/kmrml_3.3.2-2sarge1_powerpc.deb stable/main/binary-powerpc/kview_3.3.2-2sarge1_powerpc.deb stable/main/binary-powerpc/kpovmodeler_3.3.2-2sarge1_powerpc.deb stable/main/binary-powerpc/kolourpaint_3.3.2-2sarge1_powerpc.deb stable/main/binary-powerpc/kdvi_3.3.2-2sarge1_powerpc.deb stable/main/binary-powerpc/kooka_3.3.2-2sarge1_powerpc.deb stable/main/binary-powerpc/libkscan-dev_3.3.2-2sarge1_powerpc.deb stable/main/binary-powerpc/kdegraphics-dev_3.3.2-2sarge1_powerpc.deb stable/main/binary-powerpc/ksvg_3.3.2-2sarge1_powerpc.deb stable/main/binary-powerpc/kghostview_3.3.2-2sarge1_powerpc.deb stable/main/binary-powerpc/kpdf_3.3.2-2sarge1_powerpc.deb stable/main/binary-powerpc/kcoloredit_3.3.2-2sarge1_powerpc.deb stable/main/binary-powerpc/ksnapshot_3.3.2-2sarge1_powerpc.deb kdegraphics (4:3.3.2-2sarge1) stable-security; urgency=high * Non-maintainer upload by the Security Team * Applied xpdf upstream patch by Derek Noonburg to fix broken handling of broken fonts [fofi/FoFiTrueType.cc, xpdf/SplashOutputDev.cc, CAN-2005-2097] stable/main/binary-mipsel/kgamma_3.3.2-2sarge1_mipsel.deb stable/main/binary-mipsel/kviewshell_3.3.2-2sarge1_mipsel.deb stable/main/binary-mipsel/kpdf_3.3.2-2sarge1_mipsel.deb stable/main/binary-mipsel/kooka_3.3.2-2sarge1_mipsel.deb stable/main/binary-mipsel/kview_3.3.2-2sarge1_mipsel.deb stable/main/binary-mipsel/kcoloredit_3.3.2-2sarge1_mipsel.deb stable/main/binary-mipsel/kdegraphics-dev_3.3.2-2sarge1_mipsel.deb stable/main/binary-mipsel/kruler_3.3.2-2sarge1_mipsel.deb stable/main/binary-mipsel/libkscan1_3.3.2-2sarge1_mipsel.deb stable/main/binary-mipsel/kolourpaint_3.3.2-2sarge1_mipsel.deb stable/main/binary-mipsel/ksvg_3.3.2-2sarge1_mipsel.deb stable/main/binary-mipsel/ksnapshot_3.3.2-2sarge1_mipsel.deb stable/main/binary-mipsel/libkscan-dev_3.3.2-2sarge1_mipsel.deb stable/main/binary-mipsel/kdegraphics-kfile-plugins_3.3.2-2sarge1_mipsel.deb stable/main/binary-mipsel/kdvi_3.3.2-2sarge1_mipsel.deb stable/main/binary-mipsel/kuickshow_3.3.2-2sarge1_mipsel.deb stable/main/binary-mipsel/kpovmodeler_3.3.2-2sarge1_mipsel.deb stable/main/binary-mipsel/kmrml_3.3.2-2sarge1_mipsel.deb stable/main/binary-mipsel/kfax_3.3.2-2sarge1_mipsel.deb stable/main/binary-mipsel/kamera_3.3.2-2sarge1_mipsel.deb stable/main/binary-mipsel/kiconedit_3.3.2-2sarge1_mipsel.deb stable/main/binary-mipsel/kghostview_3.3.2-2sarge1_mipsel.deb kdegraphics (4:3.3.2-2sarge1) stable-security; urgency=high * Non-maintainer upload by the Security Team * Applied xpdf upstream patch by Derek Noonburg to fix broken handling of broken fonts [fofi/FoFiTrueType.cc, xpdf/SplashOutputDev.cc, CAN-2005-2097] stable/main/binary-mips/libkscan1_3.3.2-2sarge1_mips.deb stable/main/binary-mips/kviewshell_3.3.2-2sarge1_mips.deb stable/main/binary-mips/kamera_3.3.2-2sarge1_mips.deb stable/main/binary-mips/kghostview_3.3.2-2sarge1_mips.deb stable/main/binary-mips/ksvg_3.3.2-2sarge1_mips.deb stable/main/binary-mips/kcoloredit_3.3.2-2sarge1_mips.deb stable/main/binary-mips/libkscan-dev_3.3.2-2sarge1_mips.deb stable/main/binary-mips/kview_3.3.2-2sarge1_mips.deb stable/main/binary-mips/kooka_3.3.2-2sarge1_mips.deb stable/main/binary-mips/kuickshow_3.3.2-2sarge1_mips.deb stable/main/binary-mips/kruler_3.3.2-2sarge1_mips.deb stable/main/binary-mips/kdvi_3.3.2-2sarge1_mips.deb stable/main/binary-mips/kmrml_3.3.2-2sarge1_mips.deb stable/main/binary-mips/kolourpaint_3.3.2-2sarge1_mips.deb stable/main/binary-mips/kdegraphics-kfile-plugins_3.3.2-2sarge1_mips.deb stable/main/binary-mips/kpdf_3.3.2-2sarge1_mips.deb stable/main/binary-mips/ksnapshot_3.3.2-2sarge1_mips.deb stable/main/binary-mips/kpovmodeler_3.3.2-2sarge1_mips.deb stable/main/binary-mips/kdegraphics-dev_3.3.2-2sarge1_mips.deb stable/main/binary-mips/kgamma_3.3.2-2sarge1_mips.deb stable/main/binary-mips/kiconedit_3.3.2-2sarge1_mips.deb stable/main/binary-mips/kfax_3.3.2-2sarge1_mips.deb kdegraphics (4:3.3.2-2sarge1) stable-security; urgency=high * Non-maintainer upload by the Security Team * Applied xpdf upstream patch by Derek Noonburg to fix broken handling of broken fonts [fofi/FoFiTrueType.cc, xpdf/SplashOutputDev.cc, CAN-2005-2097] stable/main/binary-m68k/kdegraphics-dev_3.3.2-2sarge1_m68k.deb stable/main/binary-m68k/kviewshell_3.3.2-2sarge1_m68k.deb stable/main/binary-m68k/ksnapshot_3.3.2-2sarge1_m68k.deb stable/main/binary-m68k/kolourpaint_3.3.2-2sarge1_m68k.deb stable/main/binary-m68k/kfax_3.3.2-2sarge1_m68k.deb stable/main/binary-m68k/kruler_3.3.2-2sarge1_m68k.deb stable/main/binary-m68k/kpdf_3.3.2-2sarge1_m68k.deb stable/main/binary-m68k/kview_3.3.2-2sarge1_m68k.deb stable/main/binary-m68k/kamera_3.3.2-2sarge1_m68k.deb stable/main/binary-m68k/kmrml_3.3.2-2sarge1_m68k.deb stable/main/binary-m68k/kdvi_3.3.2-2sarge1_m68k.deb stable/main/binary-m68k/kiconedit_3.3.2-2sarge1_m68k.deb stable/main/binary-m68k/ksvg_3.3.2-2sarge1_m68k.deb stable/main/binary-m68k/kcoloredit_3.3.2-2sarge1_m68k.deb stable/main/binary-m68k/kghostview_3.3.2-2sarge1_m68k.deb stable/main/binary-m68k/kooka_3.3.2-2sarge1_m68k.deb stable/main/binary-m68k/kpovmodeler_3.3.2-2sarge1_m68k.deb stable/main/binary-m68k/kuickshow_3.3.2-2sarge1_m68k.deb stable/main/binary-m68k/kdegraphics-kfile-plugins_3.3.2-2sarge1_m68k.deb stable/main/binary-m68k/libkscan-dev_3.3.2-2sarge1_m68k.deb stable/main/binary-m68k/kgamma_3.3.2-2sarge1_m68k.deb stable/main/binary-m68k/libkscan1_3.3.2-2sarge1_m68k.deb kdegraphics (4:3.3.2-2sarge1) stable-security; urgency=high * Non-maintainer upload by the Security Team * Applied xpdf upstream patch by Derek Noonburg to fix broken handling of broken fonts [fofi/FoFiTrueType.cc, xpdf/SplashOutputDev.cc, CAN-2005-2097] stable/main/binary-ia64/kdegraphics-kfile-plugins_3.3.2-2sarge1_ia64.deb stable/main/binary-ia64/kamera_3.3.2-2sarge1_ia64.deb stable/main/binary-ia64/kdvi_3.3.2-2sarge1_ia64.deb stable/main/binary-ia64/kghostview_3.3.2-2sarge1_ia64.deb stable/main/binary-ia64/kiconedit_3.3.2-2sarge1_ia64.deb stable/main/binary-ia64/kooka_3.3.2-2sarge1_ia64.deb stable/main/binary-ia64/ksvg_3.3.2-2sarge1_ia64.deb stable/main/binary-ia64/kpovmodeler_3.3.2-2sarge1_ia64.deb stable/main/binary-ia64/kolourpaint_3.3.2-2sarge1_ia64.deb stable/main/binary-ia64/libkscan-dev_3.3.2-2sarge1_ia64.deb stable/main/binary-ia64/kgamma_3.3.2-2sarge1_ia64.deb stable/main/binary-ia64/kruler_3.3.2-2sarge1_ia64.deb stable/main/binary-ia64/libkscan1_3.3.2-2sarge1_ia64.deb stable/main/binary-ia64/kview_3.3.2-2sarge1_ia64.deb stable/main/binary-ia64/kdegraphics-dev_3.3.2-2sarge1_ia64.deb stable/main/binary-ia64/kviewshell_3.3.2-2sarge1_ia64.deb stable/main/binary-ia64/ksnapshot_3.3.2-2sarge1_ia64.deb stable/main/binary-ia64/kfax_3.3.2-2sarge1_ia64.deb stable/main/binary-ia64/kmrml_3.3.2-2sarge1_ia64.deb stable/main/binary-ia64/kpdf_3.3.2-2sarge1_ia64.deb stable/main/binary-ia64/kcoloredit_3.3.2-2sarge1_ia64.deb stable/main/binary-ia64/kuickshow_3.3.2-2sarge1_ia64.deb kdegraphics (4:3.3.2-2sarge1) stable-security; urgency=high * Non-maintainer upload by the Security Team * Applied xpdf upstream patch by Derek Noonburg to fix broken handling of broken fonts [fofi/FoFiTrueType.cc, xpdf/SplashOutputDev.cc, CAN-2005-2097] stable/main/binary-hppa/kdegraphics-dev_3.3.2-2sarge1_hppa.deb stable/main/binary-hppa/kamera_3.3.2-2sarge1_hppa.deb stable/main/binary-hppa/kfax_3.3.2-2sarge1_hppa.deb stable/main/binary-hppa/kdvi_3.3.2-2sarge1_hppa.deb stable/main/binary-hppa/kpovmodeler_3.3.2-2sarge1_hppa.deb stable/main/binary-hppa/kooka_3.3.2-2sarge1_hppa.deb stable/main/binary-hppa/kmrml_3.3.2-2sarge1_hppa.deb stable/main/binary-hppa/libkscan-dev_3.3.2-2sarge1_hppa.deb stable/main/binary-hppa/kpdf_3.3.2-2sarge1_hppa.deb stable/main/binary-hppa/libkscan1_3.3.2-2sarge1_hppa.deb stable/main/binary-hppa/kview_3.3.2-2sarge1_hppa.deb stable/main/binary-hppa/kviewshell_3.3.2-2sarge1_hppa.deb stable/main/binary-hppa/kgamma_3.3.2-2sarge1_hppa.deb stable/main/binary-hppa/ksvg_3.3.2-2sarge1_hppa.deb stable/main/binary-hppa/kiconedit_3.3.2-2sarge1_hppa.deb stable/main/binary-hppa/ksnapshot_3.3.2-2sarge1_hppa.deb stable/main/binary-hppa/kghostview_3.3.2-2sarge1_hppa.deb stable/main/binary-hppa/kcoloredit_3.3.2-2sarge1_hppa.deb stable/main/binary-hppa/kolourpaint_3.3.2-2sarge1_hppa.deb stable/main/binary-hppa/kuickshow_3.3.2-2sarge1_hppa.deb stable/main/binary-hppa/kruler_3.3.2-2sarge1_hppa.deb stable/main/binary-hppa/kdegraphics-kfile-plugins_3.3.2-2sarge1_hppa.deb kdegraphics (4:3.3.2-2sarge1) stable-security; urgency=high * Non-maintainer upload by the Security Team * Applied xpdf upstream patch by Derek Noonburg to fix broken handling of broken fonts [fofi/FoFiTrueType.cc, xpdf/SplashOutputDev.cc, CAN-2005-2097] stable/main/binary-arm/kooka_3.3.2-2sarge1_arm.deb stable/main/binary-arm/kmrml_3.3.2-2sarge1_arm.deb stable/main/binary-arm/ksvg_3.3.2-2sarge1_arm.deb stable/main/binary-arm/kdegraphics-kfile-plugins_3.3.2-2sarge1_arm.deb stable/main/binary-arm/kpdf_3.3.2-2sarge1_arm.deb stable/main/binary-arm/kuickshow_3.3.2-2sarge1_arm.deb stable/main/binary-arm/kghostview_3.3.2-2sarge1_arm.deb stable/main/binary-arm/kdegraphics-dev_3.3.2-2sarge1_arm.deb stable/main/binary-arm/kruler_3.3.2-2sarge1_arm.deb stable/main/binary-arm/libkscan1_3.3.2-2sarge1_arm.deb stable/main/binary-arm/libkscan-dev_3.3.2-2sarge1_arm.deb stable/main/binary-arm/kcoloredit_3.3.2-2sarge1_arm.deb stable/main/binary-arm/kfax_3.3.2-2sarge1_arm.deb stable/main/binary-arm/kpovmodeler_3.3.2-2sarge1_arm.deb stable/main/binary-arm/kamera_3.3.2-2sarge1_arm.deb stable/main/binary-arm/kdvi_3.3.2-2sarge1_arm.deb stable/main/binary-arm/ksnapshot_3.3.2-2sarge1_arm.deb stable/main/binary-arm/kview_3.3.2-2sarge1_arm.deb stable/main/binary-arm/kiconedit_3.3.2-2sarge1_arm.deb stable/main/binary-arm/kgamma_3.3.2-2sarge1_arm.deb stable/main/binary-arm/kolourpaint_3.3.2-2sarge1_arm.deb stable/main/binary-arm/kviewshell_3.3.2-2sarge1_arm.deb kdegraphics (4:3.3.2-2sarge1) stable-security; urgency=high * Non-maintainer upload by the Security Team * Applied xpdf upstream patch by Derek Noonburg to fix broken handling of broken fonts [fofi/FoFiTrueType.cc, xpdf/SplashOutputDev.cc, CAN-2005-2097] stable/main/binary-alpha/kdegraphics-kfile-plugins_3.3.2-2sarge1_alpha.deb stable/main/binary-alpha/kmrml_3.3.2-2sarge1_alpha.deb stable/main/binary-alpha/ksvg_3.3.2-2sarge1_alpha.deb stable/main/binary-alpha/kgamma_3.3.2-2sarge1_alpha.deb stable/main/binary-alpha/kview_3.3.2-2sarge1_alpha.deb stable/main/binary-alpha/kamera_3.3.2-2sarge1_alpha.deb stable/main/binary-alpha/libkscan1_3.3.2-2sarge1_alpha.deb stable/main/binary-alpha/kpovmodeler_3.3.2-2sarge1_alpha.deb stable/main/binary-alpha/kiconedit_3.3.2-2sarge1_alpha.deb stable/main/binary-alpha/kviewshell_3.3.2-2sarge1_alpha.deb stable/main/binary-alpha/kuickshow_3.3.2-2sarge1_alpha.deb stable/main/binary-alpha/libkscan-dev_3.3.2-2sarge1_alpha.deb stable/main/binary-alpha/kcoloredit_3.3.2-2sarge1_alpha.deb stable/main/binary-alpha/kghostview_3.3.2-2sarge1_alpha.deb stable/main/binary-alpha/kooka_3.3.2-2sarge1_alpha.deb stable/main/binary-alpha/kruler_3.3.2-2sarge1_alpha.deb stable/main/binary-alpha/kdegraphics-dev_3.3.2-2sarge1_alpha.deb stable/main/binary-alpha/kpdf_3.3.2-2sarge1_alpha.deb stable/main/binary-alpha/ksnapshot_3.3.2-2sarge1_alpha.deb stable/main/binary-alpha/kolourpaint_3.3.2-2sarge1_alpha.deb stable/main/binary-alpha/kfax_3.3.2-2sarge1_alpha.deb stable/main/binary-alpha/kdvi_3.3.2-2sarge1_alpha.deb kdegraphics (4:3.3.2-2sarge1) stable-security; urgency=high * Non-maintainer upload by the Security Team * Applied xpdf upstream patch by Derek Noonburg to fix broken handling of broken fonts [fofi/FoFiTrueType.cc, xpdf/SplashOutputDev.cc, CAN-2005-2097] stable/main/binary-sparc/libkdeedu-dev_3.3.2-3.sarge.1_sparc.deb stable/main/binary-sparc/kbruch_3.3.2-3.sarge.1_sparc.deb stable/main/binary-sparc/kverbos_3.3.2-3.sarge.1_sparc.deb stable/main/binary-sparc/kalzium_3.3.2-3.sarge.1_sparc.deb stable/main/binary-sparc/kig_3.3.2-3.sarge.1_sparc.deb stable/main/binary-sparc/klettres_3.3.2-3.sarge.1_sparc.deb stable/main/binary-sparc/ktouch_3.3.2-3.sarge.1_sparc.deb stable/main/binary-sparc/kturtle_3.3.2-3.sarge.1_sparc.deb stable/main/binary-sparc/kstars_3.3.2-3.sarge.1_sparc.deb stable/main/binary-sparc/kmessedwords_3.3.2-3.sarge.1_sparc.deb stable/main/binary-sparc/kpercentage_3.3.2-3.sarge.1_sparc.deb stable/main/binary-sparc/kmplot_3.3.2-3.sarge.1_sparc.deb stable/main/binary-sparc/kwordquiz_3.3.2-3.sarge.1_sparc.deb stable/main/binary-sparc/kiten_3.3.2-3.sarge.1_sparc.deb stable/main/binary-sparc/keduca_3.3.2-3.sarge.1_sparc.deb stable/main/binary-sparc/klatin_3.3.2-3.sarge.1_sparc.deb stable/main/binary-sparc/kvoctrain_3.3.2-3.sarge.1_sparc.deb stable/main/binary-sparc/khangman_3.3.2-3.sarge.1_sparc.deb stable/main/binary-sparc/libkdeedu1_3.3.2-3.sarge.1_sparc.deb kdeedu (4:3.3.2-3.sarge.1) stable-security; urgency=high * Security upload. * Fixed tempfile handling in langen2kvtml, which is shipped in the kvoctrain package. See the following URL for further information: - http://www.kde.org/info/security/advisory-20050815-1.txt References: CAN-2005-2101 stable/main/binary-s390/klettres_3.3.2-3.sarge.1_s390.deb stable/main/binary-s390/libkdeedu1_3.3.2-3.sarge.1_s390.deb stable/main/binary-s390/kvoctrain_3.3.2-3.sarge.1_s390.deb stable/main/binary-s390/kmessedwords_3.3.2-3.sarge.1_s390.deb stable/main/binary-s390/kpercentage_3.3.2-3.sarge.1_s390.deb stable/main/binary-s390/keduca_3.3.2-3.sarge.1_s390.deb stable/main/binary-s390/khangman_3.3.2-3.sarge.1_s390.deb stable/main/binary-s390/kstars_3.3.2-3.sarge.1_s390.deb stable/main/binary-s390/kbruch_3.3.2-3.sarge.1_s390.deb stable/main/binary-s390/libkdeedu-dev_3.3.2-3.sarge.1_s390.deb stable/main/binary-s390/kalzium_3.3.2-3.sarge.1_s390.deb stable/main/binary-s390/kwordquiz_3.3.2-3.sarge.1_s390.deb stable/main/binary-s390/kturtle_3.3.2-3.sarge.1_s390.deb stable/main/binary-s390/kiten_3.3.2-3.sarge.1_s390.deb stable/main/binary-s390/ktouch_3.3.2-3.sarge.1_s390.deb stable/main/binary-s390/kverbos_3.3.2-3.sarge.1_s390.deb stable/main/binary-s390/kig_3.3.2-3.sarge.1_s390.deb stable/main/binary-s390/kmplot_3.3.2-3.sarge.1_s390.deb stable/main/binary-s390/klatin_3.3.2-3.sarge.1_s390.deb kdeedu (4:3.3.2-3.sarge.1) stable-security; urgency=high * Security upload. * Fixed tempfile handling in langen2kvtml, which is shipped in the kvoctrain package. See the following URL for further information: - http://www.kde.org/info/security/advisory-20050815-1.txt References: CAN-2005-2101 stable/main/binary-powerpc/keduca_3.3.2-3.sarge.1_powerpc.deb stable/main/binary-powerpc/klatin_3.3.2-3.sarge.1_powerpc.deb stable/main/binary-powerpc/khangman_3.3.2-3.sarge.1_powerpc.deb stable/main/binary-powerpc/kwordquiz_3.3.2-3.sarge.1_powerpc.deb stable/main/binary-powerpc/kturtle_3.3.2-3.sarge.1_powerpc.deb stable/main/binary-powerpc/kstars_3.3.2-3.sarge.1_powerpc.deb stable/main/binary-powerpc/kpercentage_3.3.2-3.sarge.1_powerpc.deb stable/main/binary-powerpc/kmessedwords_3.3.2-3.sarge.1_powerpc.deb stable/main/binary-powerpc/libkdeedu-dev_3.3.2-3.sarge.1_powerpc.deb stable/main/binary-powerpc/kvoctrain_3.3.2-3.sarge.1_powerpc.deb stable/main/binary-powerpc/kiten_3.3.2-3.sarge.1_powerpc.deb stable/main/binary-powerpc/libkdeedu1_3.3.2-3.sarge.1_powerpc.deb stable/main/binary-powerpc/klettres_3.3.2-3.sarge.1_powerpc.deb stable/main/binary-powerpc/kbruch_3.3.2-3.sarge.1_powerpc.deb stable/main/binary-powerpc/ktouch_3.3.2-3.sarge.1_powerpc.deb stable/main/binary-powerpc/kalzium_3.3.2-3.sarge.1_powerpc.deb stable/main/binary-powerpc/kverbos_3.3.2-3.sarge.1_powerpc.deb stable/main/binary-powerpc/kig_3.3.2-3.sarge.1_powerpc.deb stable/main/binary-powerpc/kmplot_3.3.2-3.sarge.1_powerpc.deb kdeedu (4:3.3.2-3.sarge.1) stable-security; urgency=high * Security upload. * Fixed tempfile handling in langen2kvtml, which is shipped in the kvoctrain package. See the following URL for further information: - http://www.kde.org/info/security/advisory-20050815-1.txt References: CAN-2005-2101 stable/main/binary-mipsel/ktouch_3.3.2-3.sarge.1_mipsel.deb stable/main/binary-mipsel/kbruch_3.3.2-3.sarge.1_mipsel.deb stable/main/binary-mipsel/kmessedwords_3.3.2-3.sarge.1_mipsel.deb stable/main/binary-mipsel/libkdeedu-dev_3.3.2-3.sarge.1_mipsel.deb stable/main/binary-mipsel/klatin_3.3.2-3.sarge.1_mipsel.deb stable/main/binary-mipsel/kalzium_3.3.2-3.sarge.1_mipsel.deb stable/main/binary-mipsel/kiten_3.3.2-3.sarge.1_mipsel.deb stable/main/binary-mipsel/klettres_3.3.2-3.sarge.1_mipsel.deb stable/main/binary-mipsel/kstars_3.3.2-3.sarge.1_mipsel.deb stable/main/binary-mipsel/kturtle_3.3.2-3.sarge.1_mipsel.deb stable/main/binary-mipsel/kverbos_3.3.2-3.sarge.1_mipsel.deb stable/main/binary-mipsel/kvoctrain_3.3.2-3.sarge.1_mipsel.deb stable/main/binary-mipsel/kmplot_3.3.2-3.sarge.1_mipsel.deb stable/main/binary-mipsel/kwordquiz_3.3.2-3.sarge.1_mipsel.deb stable/main/binary-mipsel/keduca_3.3.2-3.sarge.1_mipsel.deb stable/main/binary-mipsel/libkdeedu1_3.3.2-3.sarge.1_mipsel.deb stable/main/binary-mipsel/kpercentage_3.3.2-3.sarge.1_mipsel.deb stable/main/binary-mipsel/kig_3.3.2-3.sarge.1_mipsel.deb stable/main/binary-mipsel/khangman_3.3.2-3.sarge.1_mipsel.deb kdeedu (4:3.3.2-3.sarge.1) stable-security; urgency=high * Security upload. * Fixed tempfile handling in langen2kvtml, which is shipped in the kvoctrain package. See the following URL for further information: - http://www.kde.org/info/security/advisory-20050815-1.txt References: CAN-2005-2101 stable/main/binary-mips/kiten_3.3.2-3.sarge.1_mips.deb stable/main/binary-mips/kturtle_3.3.2-3.sarge.1_mips.deb stable/main/binary-mips/kalzium_3.3.2-3.sarge.1_mips.deb stable/main/binary-mips/klettres_3.3.2-3.sarge.1_mips.deb stable/main/binary-mips/libkdeedu1_3.3.2-3.sarge.1_mips.deb stable/main/binary-mips/kmplot_3.3.2-3.sarge.1_mips.deb stable/main/binary-mips/kbruch_3.3.2-3.sarge.1_mips.deb stable/main/binary-mips/kmessedwords_3.3.2-3.sarge.1_mips.deb stable/main/binary-mips/kstars_3.3.2-3.sarge.1_mips.deb stable/main/binary-mips/keduca_3.3.2-3.sarge.1_mips.deb stable/main/binary-mips/kvoctrain_3.3.2-3.sarge.1_mips.deb stable/main/binary-mips/kig_3.3.2-3.sarge.1_mips.deb stable/main/binary-mips/klatin_3.3.2-3.sarge.1_mips.deb stable/main/binary-mips/kwordquiz_3.3.2-3.sarge.1_mips.deb stable/main/binary-mips/kverbos_3.3.2-3.sarge.1_mips.deb stable/main/binary-mips/kpercentage_3.3.2-3.sarge.1_mips.deb stable/main/binary-mips/khangman_3.3.2-3.sarge.1_mips.deb stable/main/binary-mips/libkdeedu-dev_3.3.2-3.sarge.1_mips.deb stable/main/binary-mips/ktouch_3.3.2-3.sarge.1_mips.deb kdeedu (4:3.3.2-3.sarge.1) stable-security; urgency=high * Security upload. * Fixed tempfile handling in langen2kvtml, which is shipped in the kvoctrain package. See the following URL for further information: - http://www.kde.org/info/security/advisory-20050815-1.txt References: CAN-2005-2101 stable/main/binary-ia64/kiten_3.3.2-3.sarge.1_ia64.deb stable/main/binary-ia64/libkdeedu1_3.3.2-3.sarge.1_ia64.deb stable/main/binary-ia64/khangman_3.3.2-3.sarge.1_ia64.deb stable/main/binary-ia64/klettres_3.3.2-3.sarge.1_ia64.deb stable/main/binary-ia64/kig_3.3.2-3.sarge.1_ia64.deb stable/main/binary-ia64/klatin_3.3.2-3.sarge.1_ia64.deb stable/main/binary-ia64/libkdeedu-dev_3.3.2-3.sarge.1_ia64.deb stable/main/binary-ia64/keduca_3.3.2-3.sarge.1_ia64.deb stable/main/binary-ia64/kwordquiz_3.3.2-3.sarge.1_ia64.deb stable/main/binary-ia64/kalzium_3.3.2-3.sarge.1_ia64.deb stable/main/binary-ia64/kstars_3.3.2-3.sarge.1_ia64.deb stable/main/binary-ia64/kverbos_3.3.2-3.sarge.1_ia64.deb stable/main/binary-ia64/kbruch_3.3.2-3.sarge.1_ia64.deb stable/main/binary-ia64/kturtle_3.3.2-3.sarge.1_ia64.deb stable/main/binary-ia64/kpercentage_3.3.2-3.sarge.1_ia64.deb stable/main/binary-ia64/ktouch_3.3.2-3.sarge.1_ia64.deb stable/main/binary-ia64/kmessedwords_3.3.2-3.sarge.1_ia64.deb stable/main/binary-ia64/kvoctrain_3.3.2-3.sarge.1_ia64.deb stable/main/binary-ia64/kmplot_3.3.2-3.sarge.1_ia64.deb kdeedu (4:3.3.2-3.sarge.1) stable-security; urgency=high * Security upload. * Fixed tempfile handling in langen2kvtml, which is shipped in the kvoctrain package. See the following URL for further information: - http://www.kde.org/info/security/advisory-20050815-1.txt References: CAN-2005-2101 stable/main/binary-alpha/kmplot_3.3.2-3.sarge.1_alpha.deb stable/main/binary-alpha/kbruch_3.3.2-3.sarge.1_alpha.deb stable/main/binary-alpha/kturtle_3.3.2-3.sarge.1_alpha.deb stable/main/binary-alpha/keduca_3.3.2-3.sarge.1_alpha.deb stable/main/binary-alpha/kiten_3.3.2-3.sarge.1_alpha.deb stable/main/binary-alpha/kverbos_3.3.2-3.sarge.1_alpha.deb stable/main/binary-alpha/ktouch_3.3.2-3.sarge.1_alpha.deb stable/main/binary-alpha/klettres_3.3.2-3.sarge.1_alpha.deb stable/main/binary-alpha/kvoctrain_3.3.2-3.sarge.1_alpha.deb stable/main/binary-alpha/kmessedwords_3.3.2-3.sarge.1_alpha.deb stable/main/binary-alpha/klatin_3.3.2-3.sarge.1_alpha.deb stable/main/binary-alpha/libkdeedu1_3.3.2-3.sarge.1_alpha.deb stable/main/binary-alpha/kig_3.3.2-3.sarge.1_alpha.deb stable/main/binary-alpha/kalzium_3.3.2-3.sarge.1_alpha.deb stable/main/binary-alpha/kstars_3.3.2-3.sarge.1_alpha.deb stable/main/binary-alpha/kpercentage_3.3.2-3.sarge.1_alpha.deb stable/main/binary-alpha/khangman_3.3.2-3.sarge.1_alpha.deb stable/main/binary-alpha/kwordquiz_3.3.2-3.sarge.1_alpha.deb stable/main/binary-alpha/libkdeedu-dev_3.3.2-3.sarge.1_alpha.deb kdeedu (4:3.3.2-3.sarge.1) stable-security; urgency=high * Security upload. * Fixed tempfile handling in langen2kvtml, which is shipped in the kvoctrain package. See the following URL for further information: - http://www.kde.org/info/security/advisory-20050815-1.txt References: CAN-2005-2101 stable/main/binary-sparc/kwin_3.3.2-1sarge1_sparc.deb stable/main/binary-sparc/klipper_3.3.2-1sarge1_sparc.deb stable/main/binary-sparc/ktip_3.3.2-1sarge1_sparc.deb stable/main/binary-sparc/ksysguardd_3.3.2-1sarge1_sparc.deb stable/main/binary-sparc/kdebase-dev_3.3.2-1sarge1_sparc.deb stable/main/binary-sparc/kpager_3.3.2-1sarge1_sparc.deb stable/main/binary-sparc/kdm_3.3.2-1sarge1_sparc.deb stable/main/binary-sparc/kpersonalizer_3.3.2-1sarge1_sparc.deb stable/main/binary-sparc/kdesktop_3.3.2-1sarge1_sparc.deb stable/main/binary-sparc/ksysguard_3.3.2-1sarge1_sparc.deb stable/main/binary-sparc/kdebase-kio-plugins_3.3.2-1sarge1_sparc.deb stable/main/binary-sparc/libkonq4-dev_3.3.2-1sarge1_sparc.deb stable/main/binary-sparc/kdeprint_3.3.2-1sarge1_sparc.deb stable/main/binary-sparc/khelpcenter_3.3.2-1sarge1_sparc.deb stable/main/binary-sparc/libkonq4_3.3.2-1sarge1_sparc.deb stable/main/binary-sparc/kmenuedit_3.3.2-1sarge1_sparc.deb stable/main/binary-sparc/kdebase-bin_3.3.2-1sarge1_sparc.deb stable/main/binary-sparc/konsole_3.3.2-1sarge1_sparc.deb stable/main/binary-sparc/ksmserver_3.3.2-1sarge1_sparc.deb stable/main/binary-sparc/konqueror_3.3.2-1sarge1_sparc.deb stable/main/binary-sparc/kcontrol_3.3.2-1sarge1_sparc.deb stable/main/binary-sparc/kfind_3.3.2-1sarge1_sparc.deb stable/main/binary-sparc/kdepasswd_3.3.2-1sarge1_sparc.deb stable/main/binary-sparc/kate_3.3.2-1sarge1_sparc.deb stable/main/binary-sparc/konqueror-nsplugins_3.3.2-1sarge1_sparc.deb stable/main/binary-sparc/kappfinder_3.3.2-1sarge1_sparc.deb stable/main/binary-sparc/ksplash_3.3.2-1sarge1_sparc.deb stable/main/binary-sparc/kicker_3.3.2-1sarge1_sparc.deb kdebase (4:3.3.2-1sarge1) stable-security; urgency=high * Non-maintainer upload by the Security Team * Applied upstream patch to fix local root hole [debian/patches/16_CAN-2005-2494_kcheckpass.diff] stable/main/binary-s390/kdesktop_3.3.2-1sarge1_s390.deb stable/main/binary-s390/khelpcenter_3.3.2-1sarge1_s390.deb stable/main/binary-s390/kpager_3.3.2-1sarge1_s390.deb stable/main/binary-s390/konsole_3.3.2-1sarge1_s390.deb stable/main/binary-s390/kpersonalizer_3.3.2-1sarge1_s390.deb stable/main/binary-s390/kappfinder_3.3.2-1sarge1_s390.deb stable/main/binary-s390/kdebase-bin_3.3.2-1sarge1_s390.deb stable/main/binary-s390/kdepasswd_3.3.2-1sarge1_s390.deb stable/main/binary-s390/kdm_3.3.2-1sarge1_s390.deb stable/main/binary-s390/ksysguardd_3.3.2-1sarge1_s390.deb stable/main/binary-s390/kmenuedit_3.3.2-1sarge1_s390.deb stable/main/binary-s390/ksplash_3.3.2-1sarge1_s390.deb stable/main/binary-s390/kdebase-kio-plugins_3.3.2-1sarge1_s390.deb stable/main/binary-s390/kdeprint_3.3.2-1sarge1_s390.deb stable/main/binary-s390/kcontrol_3.3.2-1sarge1_s390.deb stable/main/binary-s390/kdebase-dev_3.3.2-1sarge1_s390.deb stable/main/binary-s390/ksysguard_3.3.2-1sarge1_s390.deb stable/main/binary-s390/kwin_3.3.2-1sarge1_s390.deb stable/main/binary-s390/kate_3.3.2-1sarge1_s390.deb stable/main/binary-s390/klipper_3.3.2-1sarge1_s390.deb stable/main/binary-s390/libkonq4-dev_3.3.2-1sarge1_s390.deb stable/main/binary-s390/konqueror-nsplugins_3.3.2-1sarge1_s390.deb stable/main/binary-s390/ktip_3.3.2-1sarge1_s390.deb stable/main/binary-s390/konqueror_3.3.2-1sarge1_s390.deb stable/main/binary-s390/ksmserver_3.3.2-1sarge1_s390.deb stable/main/binary-s390/libkonq4_3.3.2-1sarge1_s390.deb stable/main/binary-s390/kfind_3.3.2-1sarge1_s390.deb stable/main/binary-s390/kicker_3.3.2-1sarge1_s390.deb kdebase (4:3.3.2-1sarge1) stable-security; urgency=high * Non-maintainer upload by the Security Team * Applied upstream patch to fix local root hole [debian/patches/16_CAN-2005-2494_kcheckpass.diff] stable/main/binary-powerpc/kdesktop_3.3.2-1sarge1_powerpc.deb stable/main/binary-powerpc/ktip_3.3.2-1sarge1_powerpc.deb stable/main/binary-powerpc/klipper_3.3.2-1sarge1_powerpc.deb stable/main/binary-powerpc/kdepasswd_3.3.2-1sarge1_powerpc.deb stable/main/binary-powerpc/ksmserver_3.3.2-1sarge1_powerpc.deb stable/main/binary-powerpc/kdebase-kio-plugins_3.3.2-1sarge1_powerpc.deb stable/main/binary-powerpc/kappfinder_3.3.2-1sarge1_powerpc.deb stable/main/binary-powerpc/kate_3.3.2-1sarge1_powerpc.deb stable/main/binary-powerpc/kpager_3.3.2-1sarge1_powerpc.deb stable/main/binary-powerpc/kdeprint_3.3.2-1sarge1_powerpc.deb stable/main/binary-powerpc/khelpcenter_3.3.2-1sarge1_powerpc.deb stable/main/binary-powerpc/kdebase-bin_3.3.2-1sarge1_powerpc.deb stable/main/binary-powerpc/konsole_3.3.2-1sarge1_powerpc.deb stable/main/binary-powerpc/konqueror_3.3.2-1sarge1_powerpc.deb stable/main/binary-powerpc/kcontrol_3.3.2-1sarge1_powerpc.deb stable/main/binary-powerpc/kmenuedit_3.3.2-1sarge1_powerpc.deb stable/main/binary-powerpc/ksysguardd_3.3.2-1sarge1_powerpc.deb stable/main/binary-powerpc/kpersonalizer_3.3.2-1sarge1_powerpc.deb stable/main/binary-powerpc/libkonq4_3.3.2-1sarge1_powerpc.deb stable/main/binary-powerpc/konqueror-nsplugins_3.3.2-1sarge1_powerpc.deb stable/main/binary-powerpc/kdebase-dev_3.3.2-1sarge1_powerpc.deb stable/main/binary-powerpc/kfind_3.3.2-1sarge1_powerpc.deb stable/main/binary-powerpc/kicker_3.3.2-1sarge1_powerpc.deb stable/main/binary-powerpc/libkonq4-dev_3.3.2-1sarge1_powerpc.deb stable/main/binary-powerpc/kdm_3.3.2-1sarge1_powerpc.deb stable/main/binary-powerpc/kwin_3.3.2-1sarge1_powerpc.deb stable/main/binary-powerpc/ksysguard_3.3.2-1sarge1_powerpc.deb stable/main/binary-powerpc/ksplash_3.3.2-1sarge1_powerpc.deb kdebase (4:3.3.2-1sarge1) stable-security; urgency=high * Non-maintainer upload by the Security Team * Applied upstream patch to fix local root hole [debian/patches/16_CAN-2005-2494_kcheckpass.diff] stable/main/binary-mipsel/kdebase-dev_3.3.2-1sarge1_mipsel.deb stable/main/binary-mipsel/ksysguardd_3.3.2-1sarge1_mipsel.deb stable/main/binary-mipsel/kdebase-bin_3.3.2-1sarge1_mipsel.deb stable/main/binary-mipsel/kwin_3.3.2-1sarge1_mipsel.deb stable/main/binary-mipsel/kappfinder_3.3.2-1sarge1_mipsel.deb stable/main/binary-mipsel/kpersonalizer_3.3.2-1sarge1_mipsel.deb stable/main/binary-mipsel/kicker_3.3.2-1sarge1_mipsel.deb stable/main/binary-mipsel/kmenuedit_3.3.2-1sarge1_mipsel.deb stable/main/binary-mipsel/kcontrol_3.3.2-1sarge1_mipsel.deb stable/main/binary-mipsel/konsole_3.3.2-1sarge1_mipsel.deb stable/main/binary-mipsel/ksmserver_3.3.2-1sarge1_mipsel.deb stable/main/binary-mipsel/kdeprint_3.3.2-1sarge1_mipsel.deb stable/main/binary-mipsel/kdepasswd_3.3.2-1sarge1_mipsel.deb stable/main/binary-mipsel/konqueror-nsplugins_3.3.2-1sarge1_mipsel.deb stable/main/binary-mipsel/kpager_3.3.2-1sarge1_mipsel.deb stable/main/binary-mipsel/libkonq4_3.3.2-1sarge1_mipsel.deb stable/main/binary-mipsel/kdebase-kio-plugins_3.3.2-1sarge1_mipsel.deb stable/main/binary-mipsel/ktip_3.3.2-1sarge1_mipsel.deb stable/main/binary-mipsel/kfind_3.3.2-1sarge1_mipsel.deb stable/main/binary-mipsel/ksysguard_3.3.2-1sarge1_mipsel.deb stable/main/binary-mipsel/ksplash_3.3.2-1sarge1_mipsel.deb stable/main/binary-mipsel/kate_3.3.2-1sarge1_mipsel.deb stable/main/binary-mipsel/konqueror_3.3.2-1sarge1_mipsel.deb stable/main/binary-mipsel/klipper_3.3.2-1sarge1_mipsel.deb stable/main/binary-mipsel/kdm_3.3.2-1sarge1_mipsel.deb stable/main/binary-mipsel/libkonq4-dev_3.3.2-1sarge1_mipsel.deb stable/main/binary-mipsel/kdesktop_3.3.2-1sarge1_mipsel.deb stable/main/binary-mipsel/khelpcenter_3.3.2-1sarge1_mipsel.deb kdebase (4:3.3.2-1sarge1) stable-security; urgency=high * Non-maintainer upload by the Security Team * Applied upstream patch to fix local root hole [debian/patches/16_CAN-2005-2494_kcheckpass.diff] stable/main/binary-mips/kwin_3.3.2-1sarge1_mips.deb stable/main/binary-mips/kdebase-dev_3.3.2-1sarge1_mips.deb stable/main/binary-mips/khelpcenter_3.3.2-1sarge1_mips.deb stable/main/binary-mips/kdm_3.3.2-1sarge1_mips.deb stable/main/binary-mips/kmenuedit_3.3.2-1sarge1_mips.deb stable/main/binary-mips/konqueror_3.3.2-1sarge1_mips.deb stable/main/binary-mips/kcontrol_3.3.2-1sarge1_mips.deb stable/main/binary-mips/kpager_3.3.2-1sarge1_mips.deb stable/main/binary-mips/kdepasswd_3.3.2-1sarge1_mips.deb stable/main/binary-mips/klipper_3.3.2-1sarge1_mips.deb stable/main/binary-mips/kdebase-bin_3.3.2-1sarge1_mips.deb stable/main/binary-mips/ksplash_3.3.2-1sarge1_mips.deb stable/main/binary-mips/kdebase-kio-plugins_3.3.2-1sarge1_mips.deb stable/main/binary-mips/kate_3.3.2-1sarge1_mips.deb stable/main/binary-mips/konqueror-nsplugins_3.3.2-1sarge1_mips.deb stable/main/binary-mips/kappfinder_3.3.2-1sarge1_mips.deb stable/main/binary-mips/kfind_3.3.2-1sarge1_mips.deb stable/main/binary-mips/konsole_3.3.2-1sarge1_mips.deb stable/main/binary-mips/ksysguard_3.3.2-1sarge1_mips.deb stable/main/binary-mips/kicker_3.3.2-1sarge1_mips.deb stable/main/binary-mips/kdeprint_3.3.2-1sarge1_mips.deb stable/main/binary-mips/ksysguardd_3.3.2-1sarge1_mips.deb stable/main/binary-mips/ksmserver_3.3.2-1sarge1_mips.deb stable/main/binary-mips/kdesktop_3.3.2-1sarge1_mips.deb stable/main/binary-mips/kpersonalizer_3.3.2-1sarge1_mips.deb stable/main/binary-mips/libkonq4-dev_3.3.2-1sarge1_mips.deb stable/main/binary-mips/libkonq4_3.3.2-1sarge1_mips.deb stable/main/binary-mips/ktip_3.3.2-1sarge1_mips.deb kdebase (4:3.3.2-1sarge1) stable-security; urgency=high * Non-maintainer upload by the Security Team * Applied upstream patch to fix local root hole [debian/patches/16_CAN-2005-2494_kcheckpass.diff] stable/main/binary-m68k/konsole_3.3.2-1sarge1_m68k.deb stable/main/binary-m68k/libkonq4_3.3.2-1sarge1_m68k.deb stable/main/binary-m68k/konqueror_3.3.2-1sarge1_m68k.deb stable/main/binary-m68k/kdepasswd_3.3.2-1sarge1_m68k.deb stable/main/binary-m68k/ksysguardd_3.3.2-1sarge1_m68k.deb stable/main/binary-m68k/kdebase-bin_3.3.2-1sarge1_m68k.deb stable/main/binary-m68k/kwin_3.3.2-1sarge1_m68k.deb stable/main/binary-m68k/ktip_3.3.2-1sarge1_m68k.deb stable/main/binary-m68k/klipper_3.3.2-1sarge1_m68k.deb stable/main/binary-m68k/kappfinder_3.3.2-1sarge1_m68k.deb stable/main/binary-m68k/konqueror-nsplugins_3.3.2-1sarge1_m68k.deb stable/main/binary-m68k/kdebase-dev_3.3.2-1sarge1_m68k.deb stable/main/binary-m68k/kdeprint_3.3.2-1sarge1_m68k.deb stable/main/binary-m68k/ksmserver_3.3.2-1sarge1_m68k.deb stable/main/binary-m68k/kmenuedit_3.3.2-1sarge1_m68k.deb stable/main/binary-m68k/kdm_3.3.2-1sarge1_m68k.deb stable/main/binary-m68k/khelpcenter_3.3.2-1sarge1_m68k.deb stable/main/binary-m68k/kpersonalizer_3.3.2-1sarge1_m68k.deb stable/main/binary-m68k/kate_3.3.2-1sarge1_m68k.deb stable/main/binary-m68k/kpager_3.3.2-1sarge1_m68k.deb stable/main/binary-m68k/kcontrol_3.3.2-1sarge1_m68k.deb stable/main/binary-m68k/kdebase-kio-plugins_3.3.2-1sarge1_m68k.deb stable/main/binary-m68k/kdesktop_3.3.2-1sarge1_m68k.deb stable/main/binary-m68k/libkonq4-dev_3.3.2-1sarge1_m68k.deb stable/main/binary-m68k/kicker_3.3.2-1sarge1_m68k.deb stable/main/binary-m68k/kfind_3.3.2-1sarge1_m68k.deb stable/main/binary-m68k/ksplash_3.3.2-1sarge1_m68k.deb stable/main/binary-m68k/ksysguard_3.3.2-1sarge1_m68k.deb kdebase (4:3.3.2-1sarge1) stable-security; urgency=high * Non-maintainer upload by the Security Team * Applied upstream patch to fix local root hole [debian/patches/16_CAN-2005-2494_kcheckpass.diff] stable/main/binary-i386/kcontrol_3.3.2-1sarge1_i386.deb stable/main/binary-i386/kappfinder_3.3.2-1sarge1_i386.deb stable/main/binary-i386/kfind_3.3.2-1sarge1_i386.deb stable/main/binary-i386/libkonq4-dev_3.3.2-1sarge1_i386.deb stable/main/binary-i386/kdepasswd_3.3.2-1sarge1_i386.deb stable/main/binary-i386/kpager_3.3.2-1sarge1_i386.deb stable/main/binary-i386/klipper_3.3.2-1sarge1_i386.deb stable/main/binary-i386/konqueror_3.3.2-1sarge1_i386.deb stable/main/binary-i386/kwin_3.3.2-1sarge1_i386.deb stable/main/binary-i386/konsole_3.3.2-1sarge1_i386.deb stable/main/binary-i386/kdm_3.3.2-1sarge1_i386.deb stable/main/binary-i386/libkonq4_3.3.2-1sarge1_i386.deb stable/main/binary-i386/kdeprint_3.3.2-1sarge1_i386.deb stable/main/binary-i386/ksplash_3.3.2-1sarge1_i386.deb stable/main/binary-i386/kate_3.3.2-1sarge1_i386.deb stable/main/binary-i386/ksmserver_3.3.2-1sarge1_i386.deb stable/main/binary-i386/ksysguardd_3.3.2-1sarge1_i386.deb stable/main/binary-i386/konqueror-nsplugins_3.3.2-1sarge1_i386.deb stable/main/binary-i386/ktip_3.3.2-1sarge1_i386.deb stable/main/binary-i386/kdebase-kio-plugins_3.3.2-1sarge1_i386.deb stable/main/binary-i386/kdesktop_3.3.2-1sarge1_i386.deb stable/main/binary-i386/ksysguard_3.3.2-1sarge1_i386.deb stable/main/binary-i386/kpersonalizer_3.3.2-1sarge1_i386.deb stable/main/binary-i386/khelpcenter_3.3.2-1sarge1_i386.deb stable/main/binary-i386/kdebase-dev_3.3.2-1sarge1_i386.deb stable/main/binary-i386/kicker_3.3.2-1sarge1_i386.deb stable/main/binary-i386/kdebase-bin_3.3.2-1sarge1_i386.deb stable/main/binary-i386/kmenuedit_3.3.2-1sarge1_i386.deb kdebase (4:3.3.2-1sarge1) stable-security; urgency=high * Non-maintainer upload by the Security Team * Applied upstream patch to fix local root hole [debian/patches/16_CAN-2005-2494_kcheckpass.diff] stable/main/binary-hppa/kdm_3.3.2-1sarge1_hppa.deb stable/main/binary-hppa/ksysguard_3.3.2-1sarge1_hppa.deb stable/main/binary-hppa/ksysguardd_3.3.2-1sarge1_hppa.deb stable/main/binary-hppa/khelpcenter_3.3.2-1sarge1_hppa.deb stable/main/binary-hppa/kdebase-kio-plugins_3.3.2-1sarge1_hppa.deb stable/main/binary-hppa/klipper_3.3.2-1sarge1_hppa.deb stable/main/binary-hppa/libkonq4-dev_3.3.2-1sarge1_hppa.deb stable/main/binary-hppa/kdeprint_3.3.2-1sarge1_hppa.deb stable/main/binary-hppa/kate_3.3.2-1sarge1_hppa.deb stable/main/binary-hppa/konqueror-nsplugins_3.3.2-1sarge1_hppa.deb stable/main/binary-hppa/kfind_3.3.2-1sarge1_hppa.deb stable/main/binary-hppa/kpersonalizer_3.3.2-1sarge1_hppa.deb stable/main/binary-hppa/konqueror_3.3.2-1sarge1_hppa.deb stable/main/binary-hppa/libkonq4_3.3.2-1sarge1_hppa.deb stable/main/binary-hppa/kdesktop_3.3.2-1sarge1_hppa.deb stable/main/binary-hppa/kdebase-bin_3.3.2-1sarge1_hppa.deb stable/main/binary-hppa/kdepasswd_3.3.2-1sarge1_hppa.deb stable/main/binary-hppa/kmenuedit_3.3.2-1sarge1_hppa.deb stable/main/binary-hppa/kpager_3.3.2-1sarge1_hppa.deb stable/main/binary-hppa/kdebase-dev_3.3.2-1sarge1_hppa.deb stable/main/binary-hppa/ktip_3.3.2-1sarge1_hppa.deb stable/main/binary-hppa/ksplash_3.3.2-1sarge1_hppa.deb stable/main/binary-hppa/kicker_3.3.2-1sarge1_hppa.deb stable/main/binary-hppa/kcontrol_3.3.2-1sarge1_hppa.deb stable/main/binary-hppa/ksmserver_3.3.2-1sarge1_hppa.deb stable/main/binary-hppa/kappfinder_3.3.2-1sarge1_hppa.deb stable/main/binary-hppa/konsole_3.3.2-1sarge1_hppa.deb stable/main/binary-hppa/kwin_3.3.2-1sarge1_hppa.deb kdebase (4:3.3.2-1sarge1) stable-security; urgency=high * Non-maintainer upload by the Security Team * Applied upstream patch to fix local root hole [debian/patches/16_CAN-2005-2494_kcheckpass.diff] stable/main/binary-arm/konqueror_3.3.2-1sarge1_arm.deb stable/main/binary-arm/kicker_3.3.2-1sarge1_arm.deb stable/main/binary-arm/kdepasswd_3.3.2-1sarge1_arm.deb stable/main/binary-arm/kcontrol_3.3.2-1sarge1_arm.deb stable/main/binary-arm/kmenuedit_3.3.2-1sarge1_arm.deb stable/main/binary-arm/kpager_3.3.2-1sarge1_arm.deb stable/main/binary-arm/kpersonalizer_3.3.2-1sarge1_arm.deb stable/main/binary-arm/konsole_3.3.2-1sarge1_arm.deb stable/main/binary-arm/kdebase-kio-plugins_3.3.2-1sarge1_arm.deb stable/main/binary-arm/kdebase-bin_3.3.2-1sarge1_arm.deb stable/main/binary-arm/kdebase-dev_3.3.2-1sarge1_arm.deb stable/main/binary-arm/ktip_3.3.2-1sarge1_arm.deb stable/main/binary-arm/libkonq4_3.3.2-1sarge1_arm.deb stable/main/binary-arm/kdeprint_3.3.2-1sarge1_arm.deb stable/main/binary-arm/konqueror-nsplugins_3.3.2-1sarge1_arm.deb stable/main/binary-arm/kdm_3.3.2-1sarge1_arm.deb stable/main/binary-arm/khelpcenter_3.3.2-1sarge1_arm.deb stable/main/binary-arm/ksysguard_3.3.2-1sarge1_arm.deb stable/main/binary-arm/ksmserver_3.3.2-1sarge1_arm.deb stable/main/binary-arm/kate_3.3.2-1sarge1_arm.deb stable/main/binary-arm/kappfinder_3.3.2-1sarge1_arm.deb stable/main/binary-arm/ksplash_3.3.2-1sarge1_arm.deb stable/main/binary-arm/klipper_3.3.2-1sarge1_arm.deb stable/main/binary-arm/kdesktop_3.3.2-1sarge1_arm.deb stable/main/binary-arm/libkonq4-dev_3.3.2-1sarge1_arm.deb stable/main/binary-arm/kfind_3.3.2-1sarge1_arm.deb stable/main/binary-arm/ksysguardd_3.3.2-1sarge1_arm.deb stable/main/binary-arm/kwin_3.3.2-1sarge1_arm.deb kdebase (4:3.3.2-1sarge1) stable-security; urgency=high * Non-maintainer upload by the Security Team * Applied upstream patch to fix local root hole [debian/patches/16_CAN-2005-2494_kcheckpass.diff] stable/main/binary-alpha/kappfinder_3.3.2-1sarge1_alpha.deb stable/main/binary-alpha/kdebase-dev_3.3.2-1sarge1_alpha.deb stable/main/binary-alpha/kpager_3.3.2-1sarge1_alpha.deb stable/main/binary-alpha/kdm_3.3.2-1sarge1_alpha.deb stable/main/binary-alpha/kdebase-bin_3.3.2-1sarge1_alpha.deb stable/main/binary-alpha/kdepasswd_3.3.2-1sarge1_alpha.deb stable/main/binary-alpha/khelpcenter_3.3.2-1sarge1_alpha.deb stable/main/binary-alpha/kate_3.3.2-1sarge1_alpha.deb stable/main/binary-alpha/libkonq4-dev_3.3.2-1sarge1_alpha.deb stable/main/binary-alpha/kdebase-kio-plugins_3.3.2-1sarge1_alpha.deb stable/main/binary-alpha/ksysguardd_3.3.2-1sarge1_alpha.deb stable/main/binary-alpha/kdesktop_3.3.2-1sarge1_alpha.deb stable/main/binary-alpha/libkonq4_3.3.2-1sarge1_alpha.deb stable/main/binary-alpha/kicker_3.3.2-1sarge1_alpha.deb stable/main/binary-alpha/ksysguard_3.3.2-1sarge1_alpha.deb stable/main/binary-alpha/kcontrol_3.3.2-1sarge1_alpha.deb stable/main/binary-alpha/kfind_3.3.2-1sarge1_alpha.deb stable/main/binary-alpha/konsole_3.3.2-1sarge1_alpha.deb stable/main/binary-alpha/kpersonalizer_3.3.2-1sarge1_alpha.deb stable/main/binary-alpha/kmenuedit_3.3.2-1sarge1_alpha.deb stable/main/binary-alpha/klipper_3.3.2-1sarge1_alpha.deb stable/main/binary-alpha/kwin_3.3.2-1sarge1_alpha.deb stable/main/binary-alpha/konqueror_3.3.2-1sarge1_alpha.deb stable/main/binary-alpha/ksmserver_3.3.2-1sarge1_alpha.deb stable/main/binary-alpha/ktip_3.3.2-1sarge1_alpha.deb stable/main/binary-alpha/ksplash_3.3.2-1sarge1_alpha.deb stable/main/binary-alpha/konqueror-nsplugins_3.3.2-1sarge1_alpha.deb stable/main/binary-alpha/kdeprint_3.3.2-1sarge1_alpha.deb kdebase (4:3.3.2-1sarge1) stable-security; urgency=high * Non-maintainer upload by the Security Team * Applied upstream patch to fix local root hole [debian/patches/16_CAN-2005-2494_kcheckpass.diff] stable/main/binary-sparc/heimdal-clients-x_0.6.3-10sarge1_sparc.deb stable/main/binary-sparc/libhdb7-heimdal_0.6.3-10sarge1_sparc.deb stable/main/binary-sparc/heimdal-servers-x_0.6.3-10sarge1_sparc.deb stable/main/binary-sparc/libkafs0-heimdal_0.6.3-10sarge1_sparc.deb stable/main/binary-sparc/heimdal-servers_0.6.3-10sarge1_sparc.deb stable/main/binary-sparc/heimdal-dev_0.6.3-10sarge1_sparc.deb stable/main/binary-sparc/heimdal-kdc_0.6.3-10sarge1_sparc.deb stable/main/binary-sparc/libkadm5clnt4-heimdal_0.6.3-10sarge1_sparc.deb stable/main/binary-sparc/libasn1-6-heimdal_0.6.3-10sarge1_sparc.deb stable/main/binary-sparc/libgssapi1-heimdal_0.6.3-10sarge1_sparc.deb stable/main/binary-sparc/libkrb5-17-heimdal_0.6.3-10sarge1_sparc.deb stable/main/binary-sparc/libkadm5srv7-heimdal_0.6.3-10sarge1_sparc.deb stable/main/binary-sparc/heimdal-clients_0.6.3-10sarge1_sparc.deb heimdal (0.6.3-10sarge1) stable-security; urgency=high * Non-maintainer upload by the Security Team * Applied upstream patch to fix buffer overflow in telnetd implementation [appl/telnet/telnetd/ext.h, appl/telnet/telnetd/global.c, appl/telnet/telnetd/state.c, appl/telnet/telnetd/telnetd.c, debian/patches/033_CAN-2005-2040] stable/main/binary-s390/heimdal-clients_0.6.3-10sarge1_s390.deb stable/main/binary-s390/libkadm5srv7-heimdal_0.6.3-10sarge1_s390.deb stable/main/binary-s390/libkafs0-heimdal_0.6.3-10sarge1_s390.deb stable/main/binary-s390/libkadm5clnt4-heimdal_0.6.3-10sarge1_s390.deb stable/main/binary-s390/heimdal-dev_0.6.3-10sarge1_s390.deb stable/main/binary-s390/libasn1-6-heimdal_0.6.3-10sarge1_s390.deb stable/main/binary-s390/libgssapi1-heimdal_0.6.3-10sarge1_s390.deb stable/main/binary-s390/libkrb5-17-heimdal_0.6.3-10sarge1_s390.deb stable/main/binary-s390/heimdal-servers_0.6.3-10sarge1_s390.deb stable/main/binary-s390/heimdal-kdc_0.6.3-10sarge1_s390.deb stable/main/binary-s390/libhdb7-heimdal_0.6.3-10sarge1_s390.deb stable/main/binary-s390/heimdal-servers-x_0.6.3-10sarge1_s390.deb stable/main/binary-s390/heimdal-clients-x_0.6.3-10sarge1_s390.deb heimdal (0.6.3-10sarge1) stable-security; urgency=high * Non-maintainer upload by the Security Team * Applied upstream patch to fix buffer overflow in telnetd implementation [appl/telnet/telnetd/ext.h, appl/telnet/telnetd/global.c, appl/telnet/telnetd/state.c, appl/telnet/telnetd/telnetd.c, debian/patches/033_CAN-2005-2040] stable/main/binary-powerpc/libkadm5srv7-heimdal_0.6.3-10sarge1_powerpc.deb stable/main/binary-powerpc/heimdal-clients_0.6.3-10sarge1_powerpc.deb stable/main/binary-powerpc/libkadm5clnt4-heimdal_0.6.3-10sarge1_powerpc.deb stable/main/binary-powerpc/libkafs0-heimdal_0.6.3-10sarge1_powerpc.deb stable/main/binary-powerpc/libgssapi1-heimdal_0.6.3-10sarge1_powerpc.deb stable/main/binary-powerpc/heimdal-dev_0.6.3-10sarge1_powerpc.deb stable/main/binary-powerpc/libasn1-6-heimdal_0.6.3-10sarge1_powerpc.deb stable/main/binary-powerpc/libhdb7-heimdal_0.6.3-10sarge1_powerpc.deb stable/main/binary-powerpc/heimdal-clients-x_0.6.3-10sarge1_powerpc.deb stable/main/binary-powerpc/libkrb5-17-heimdal_0.6.3-10sarge1_powerpc.deb stable/main/binary-powerpc/heimdal-servers-x_0.6.3-10sarge1_powerpc.deb stable/main/binary-powerpc/heimdal-kdc_0.6.3-10sarge1_powerpc.deb stable/main/binary-powerpc/heimdal-servers_0.6.3-10sarge1_powerpc.deb heimdal (0.6.3-10sarge1) stable-security; urgency=high * Non-maintainer upload by the Security Team * Applied upstream patch to fix buffer overflow in telnetd implementation [appl/telnet/telnetd/ext.h, appl/telnet/telnetd/global.c, appl/telnet/telnetd/state.c, appl/telnet/telnetd/telnetd.c, debian/patches/033_CAN-2005-2040] stable/main/binary-mipsel/libasn1-6-heimdal_0.6.3-10sarge1_mipsel.deb stable/main/binary-mipsel/libhdb7-heimdal_0.6.3-10sarge1_mipsel.deb stable/main/binary-mipsel/libkrb5-17-heimdal_0.6.3-10sarge1_mipsel.deb stable/main/binary-mipsel/heimdal-servers_0.6.3-10sarge1_mipsel.deb stable/main/binary-mipsel/libkafs0-heimdal_0.6.3-10sarge1_mipsel.deb stable/main/binary-mipsel/libgssapi1-heimdal_0.6.3-10sarge1_mipsel.deb stable/main/binary-mipsel/heimdal-dev_0.6.3-10sarge1_mipsel.deb stable/main/binary-mipsel/libkadm5srv7-heimdal_0.6.3-10sarge1_mipsel.deb stable/main/binary-mipsel/heimdal-servers-x_0.6.3-10sarge1_mipsel.deb stable/main/binary-mipsel/heimdal-kdc_0.6.3-10sarge1_mipsel.deb stable/main/binary-mipsel/heimdal-clients_0.6.3-10sarge1_mipsel.deb stable/main/binary-mipsel/libkadm5clnt4-heimdal_0.6.3-10sarge1_mipsel.deb stable/main/binary-mipsel/heimdal-clients-x_0.6.3-10sarge1_mipsel.deb heimdal (0.6.3-10sarge1) stable-security; urgency=high * Non-maintainer upload by the Security Team * Applied upstream patch to fix buffer overflow in telnetd implementation [appl/telnet/telnetd/ext.h, appl/telnet/telnetd/global.c, appl/telnet/telnetd/state.c, appl/telnet/telnetd/telnetd.c, debian/patches/033_CAN-2005-2040] stable/main/binary-mips/libhdb7-heimdal_0.6.3-10sarge1_mips.deb stable/main/binary-mips/libkadm5srv7-heimdal_0.6.3-10sarge1_mips.deb stable/main/binary-mips/heimdal-dev_0.6.3-10sarge1_mips.deb stable/main/binary-mips/libkrb5-17-heimdal_0.6.3-10sarge1_mips.deb stable/main/binary-mips/libkadm5clnt4-heimdal_0.6.3-10sarge1_mips.deb stable/main/binary-mips/heimdal-servers-x_0.6.3-10sarge1_mips.deb stable/main/binary-mips/heimdal-kdc_0.6.3-10sarge1_mips.deb stable/main/binary-mips/libkafs0-heimdal_0.6.3-10sarge1_mips.deb stable/main/binary-mips/heimdal-clients_0.6.3-10sarge1_mips.deb stable/main/binary-mips/heimdal-clients-x_0.6.3-10sarge1_mips.deb stable/main/binary-mips/heimdal-servers_0.6.3-10sarge1_mips.deb stable/main/binary-mips/libasn1-6-heimdal_0.6.3-10sarge1_mips.deb stable/main/binary-mips/libgssapi1-heimdal_0.6.3-10sarge1_mips.deb heimdal (0.6.3-10sarge1) stable-security; urgency=high * Non-maintainer upload by the Security Team * Applied upstream patch to fix buffer overflow in telnetd implementation [appl/telnet/telnetd/ext.h, appl/telnet/telnetd/global.c, appl/telnet/telnetd/state.c, appl/telnet/telnetd/telnetd.c, debian/patches/033_CAN-2005-2040] stable/main/binary-m68k/libkadm5clnt4-heimdal_0.6.3-10sarge1_m68k.deb stable/main/binary-m68k/heimdal-servers_0.6.3-10sarge1_m68k.deb stable/main/binary-m68k/libkafs0-heimdal_0.6.3-10sarge1_m68k.deb stable/main/binary-m68k/heimdal-kdc_0.6.3-10sarge1_m68k.deb stable/main/binary-m68k/libkrb5-17-heimdal_0.6.3-10sarge1_m68k.deb stable/main/binary-m68k/heimdal-servers-x_0.6.3-10sarge1_m68k.deb stable/main/binary-m68k/libkadm5srv7-heimdal_0.6.3-10sarge1_m68k.deb stable/main/binary-m68k/heimdal-clients-x_0.6.3-10sarge1_m68k.deb stable/main/binary-m68k/libhdb7-heimdal_0.6.3-10sarge1_m68k.deb stable/main/binary-m68k/heimdal-dev_0.6.3-10sarge1_m68k.deb stable/main/binary-m68k/heimdal-clients_0.6.3-10sarge1_m68k.deb stable/main/binary-m68k/libgssapi1-heimdal_0.6.3-10sarge1_m68k.deb stable/main/binary-m68k/libasn1-6-heimdal_0.6.3-10sarge1_m68k.deb heimdal (0.6.3-10sarge1) stable-security; urgency=high * Non-maintainer upload by the Security Team * Applied upstream patch to fix buffer overflow in telnetd implementation [appl/telnet/telnetd/ext.h, appl/telnet/telnetd/global.c, appl/telnet/telnetd/state.c, appl/telnet/telnetd/telnetd.c, debian/patches/033_CAN-2005-2040] stable/main/binary-ia64/libkadm5clnt4-heimdal_0.6.3-10sarge1_ia64.deb stable/main/binary-ia64/libkrb5-17-heimdal_0.6.3-10sarge1_ia64.deb stable/main/binary-ia64/libasn1-6-heimdal_0.6.3-10sarge1_ia64.deb stable/main/binary-ia64/libkadm5srv7-heimdal_0.6.3-10sarge1_ia64.deb stable/main/binary-ia64/libgssapi1-heimdal_0.6.3-10sarge1_ia64.deb stable/main/binary-ia64/heimdal-clients-x_0.6.3-10sarge1_ia64.deb stable/main/binary-ia64/heimdal-dev_0.6.3-10sarge1_ia64.deb stable/main/binary-ia64/libhdb7-heimdal_0.6.3-10sarge1_ia64.deb stable/main/binary-ia64/libkafs0-heimdal_0.6.3-10sarge1_ia64.deb stable/main/binary-ia64/heimdal-servers_0.6.3-10sarge1_ia64.deb stable/main/binary-ia64/heimdal-servers-x_0.6.3-10sarge1_ia64.deb stable/main/binary-ia64/heimdal-clients_0.6.3-10sarge1_ia64.deb stable/main/binary-ia64/heimdal-kdc_0.6.3-10sarge1_ia64.deb heimdal (0.6.3-10sarge1) stable-security; urgency=high * Non-maintainer upload by the Security Team * Applied upstream patch to fix buffer overflow in telnetd implementation [appl/telnet/telnetd/ext.h, appl/telnet/telnetd/global.c, appl/telnet/telnetd/state.c, appl/telnet/telnetd/telnetd.c, debian/patches/033_CAN-2005-2040] stable/main/binary-hppa/libkrb5-17-heimdal_0.6.3-10sarge1_hppa.deb stable/main/binary-hppa/heimdal-servers_0.6.3-10sarge1_hppa.deb stable/main/binary-hppa/heimdal-servers-x_0.6.3-10sarge1_hppa.deb stable/main/binary-hppa/heimdal-kdc_0.6.3-10sarge1_hppa.deb stable/main/binary-hppa/libkafs0-heimdal_0.6.3-10sarge1_hppa.deb stable/main/binary-hppa/libkadm5clnt4-heimdal_0.6.3-10sarge1_hppa.deb stable/main/binary-hppa/libhdb7-heimdal_0.6.3-10sarge1_hppa.deb stable/main/binary-hppa/heimdal-dev_0.6.3-10sarge1_hppa.deb stable/main/binary-hppa/libkadm5srv7-heimdal_0.6.3-10sarge1_hppa.deb stable/main/binary-hppa/libasn1-6-heimdal_0.6.3-10sarge1_hppa.deb stable/main/binary-hppa/libgssapi1-heimdal_0.6.3-10sarge1_hppa.deb stable/main/binary-hppa/heimdal-clients_0.6.3-10sarge1_hppa.deb stable/main/binary-hppa/heimdal-clients-x_0.6.3-10sarge1_hppa.deb heimdal (0.6.3-10sarge1) stable-security; urgency=high * Non-maintainer upload by the Security Team * Applied upstream patch to fix buffer overflow in telnetd implementation [appl/telnet/telnetd/ext.h, appl/telnet/telnetd/global.c, appl/telnet/telnetd/state.c, appl/telnet/telnetd/telnetd.c, debian/patches/033_CAN-2005-2040] stable/main/binary-arm/libhdb7-heimdal_0.6.3-10sarge1_arm.deb stable/main/binary-arm/libkrb5-17-heimdal_0.6.3-10sarge1_arm.deb stable/main/binary-arm/heimdal-servers-x_0.6.3-10sarge1_arm.deb stable/main/binary-arm/heimdal-servers_0.6.3-10sarge1_arm.deb stable/main/binary-arm/libkafs0-heimdal_0.6.3-10sarge1_arm.deb stable/main/binary-arm/heimdal-clients-x_0.6.3-10sarge1_arm.deb stable/main/binary-arm/libkadm5srv7-heimdal_0.6.3-10sarge1_arm.deb stable/main/binary-arm/libkadm5clnt4-heimdal_0.6.3-10sarge1_arm.deb stable/main/binary-arm/heimdal-kdc_0.6.3-10sarge1_arm.deb stable/main/binary-arm/libgssapi1-heimdal_0.6.3-10sarge1_arm.deb stable/main/binary-arm/libasn1-6-heimdal_0.6.3-10sarge1_arm.deb stable/main/binary-arm/heimdal-clients_0.6.3-10sarge1_arm.deb stable/main/binary-arm/heimdal-dev_0.6.3-10sarge1_arm.deb heimdal (0.6.3-10sarge1) stable-security; urgency=high * Non-maintainer upload by the Security Team * Applied upstream patch to fix buffer overflow in telnetd implementation [appl/telnet/telnetd/ext.h, appl/telnet/telnetd/global.c, appl/telnet/telnetd/state.c, appl/telnet/telnetd/telnetd.c, debian/patches/033_CAN-2005-2040] stable/main/binary-alpha/heimdal-servers_0.6.3-10sarge1_alpha.deb stable/main/binary-alpha/libkafs0-heimdal_0.6.3-10sarge1_alpha.deb stable/main/binary-alpha/heimdal-dev_0.6.3-10sarge1_alpha.deb stable/main/binary-alpha/heimdal-servers-x_0.6.3-10sarge1_alpha.deb stable/main/binary-alpha/libkadm5clnt4-heimdal_0.6.3-10sarge1_alpha.deb stable/main/binary-alpha/heimdal-clients_0.6.3-10sarge1_alpha.deb stable/main/binary-alpha/heimdal-kdc_0.6.3-10sarge1_alpha.deb stable/main/binary-alpha/libkrb5-17-heimdal_0.6.3-10sarge1_alpha.deb stable/main/binary-alpha/libhdb7-heimdal_0.6.3-10sarge1_alpha.deb stable/main/binary-alpha/libgssapi1-heimdal_0.6.3-10sarge1_alpha.deb stable/main/binary-alpha/libasn1-6-heimdal_0.6.3-10sarge1_alpha.deb stable/main/binary-alpha/libkadm5srv7-heimdal_0.6.3-10sarge1_alpha.deb stable/main/binary-alpha/heimdal-clients-x_0.6.3-10sarge1_alpha.deb heimdal (0.6.3-10sarge1) stable-security; urgency=high * Non-maintainer upload by the Security Team * Applied upstream patch to fix buffer overflow in telnetd implementation [appl/telnet/telnetd/ext.h, appl/telnet/telnetd/global.c, appl/telnet/telnetd/state.c, appl/telnet/telnetd/telnetd.c, debian/patches/033_CAN-2005-2040] stable/main/binary-sparc/gedit_2.8.3-4sarge1_sparc.deb gedit (2.8.3-4sarge1) stable-security; urgency=high * Non-maintainer upload by The Security Team. * Fix format string vulnerabilities in calls to gtk_message_dialog_new(), which is possibly remotely exploitable via specially crafted file names or URLs. References: - CVE: CAN-2005-1686, <http://www.cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2005-1686> - GNOME bug report: <http://bugzilla.gnome.org/show_bug.cgi?id=306800> stable/main/binary-s390/gedit_2.8.3-4sarge1_s390.deb gedit (2.8.3-4sarge1) stable-security; urgency=high * Non-maintainer upload by The Security Team. * Fix format string vulnerabilities in calls to gtk_message_dialog_new(), which is possibly remotely exploitable via specially crafted file names or URLs. References: - CVE: CAN-2005-1686, <http://www.cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2005-1686> - GNOME bug report: <http://bugzilla.gnome.org/show_bug.cgi?id=306800> stable/main/binary-powerpc/gedit_2.8.3-4sarge1_powerpc.deb gedit (2.8.3-4sarge1) stable-security; urgency=high * Non-maintainer upload by The Security Team. * Fix format string vulnerabilities in calls to gtk_message_dialog_new(), which is possibly remotely exploitable via specially crafted file names or URLs. References: - CVE: CAN-2005-1686, <http://www.cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2005-1686> - GNOME bug report: <http://bugzilla.gnome.org/show_bug.cgi?id=306800> stable/main/binary-mipsel/gedit_2.8.3-4sarge1_mipsel.deb gedit (2.8.3-4sarge1) stable-security; urgency=high * Non-maintainer upload by The Security Team. * Fix format string vulnerabilities in calls to gtk_message_dialog_new(), which is possibly remotely exploitable via specially crafted file names or URLs. References: - CVE: CAN-2005-1686, <http://www.cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2005-1686> - GNOME bug report: <http://bugzilla.gnome.org/show_bug.cgi?id=306800> stable/main/binary-mips/gedit_2.8.3-4sarge1_mips.deb gedit (2.8.3-4sarge1) stable-security; urgency=high * Non-maintainer upload by The Security Team. * Fix format string vulnerabilities in calls to gtk_message_dialog_new(), which is possibly remotely exploitable via specially crafted file names or URLs. References: - CVE: CAN-2005-1686, <http://www.cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2005-1686> - GNOME bug report: <http://bugzilla.gnome.org/show_bug.cgi?id=306800> stable/main/binary-m68k/gedit_2.8.3-4sarge1_m68k.deb gedit (2.8.3-4sarge1) stable-security; urgency=high * Non-maintainer upload by The Security Team. * Fix format string vulnerabilities in calls to gtk_message_dialog_new(), which is possibly remotely exploitable via specially crafted file names or URLs. References: - CVE: CAN-2005-1686, <http://www.cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2005-1686> - GNOME bug report: <http://bugzilla.gnome.org/show_bug.cgi?id=306800> stable/main/binary-ia64/gedit_2.8.3-4sarge1_ia64.deb gedit (2.8.3-4sarge1) stable-security; urgency=high * Non-maintainer upload by The Security Team. * Fix format string vulnerabilities in calls to gtk_message_dialog_new(), which is possibly remotely exploitable via specially crafted file names or URLs. References: - CVE: CAN-2005-1686, <http://www.cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2005-1686> - GNOME bug report: <http://bugzilla.gnome.org/show_bug.cgi?id=306800> stable/main/binary-hppa/gedit_2.8.3-4sarge1_hppa.deb gedit (2.8.3-4sarge1) stable-security; urgency=high * Non-maintainer upload by The Security Team. * Fix format string vulnerabilities in calls to gtk_message_dialog_new(), which is possibly remotely exploitable via specially crafted file names or URLs. References: - CVE: CAN-2005-1686, <http://www.cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2005-1686> - GNOME bug report: <http://bugzilla.gnome.org/show_bug.cgi?id=306800> stable/main/binary-arm/gedit_2.8.3-4sarge1_arm.deb gedit (2.8.3-4sarge1) stable-security; urgency=high * Non-maintainer upload by The Security Team. * Fix format string vulnerabilities in calls to gtk_message_dialog_new(), which is possibly remotely exploitable via specially crafted file names or URLs. References: - CVE: CAN-2005-1686, <http://www.cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2005-1686> - GNOME bug report: <http://bugzilla.gnome.org/show_bug.cgi?id=306800> stable/main/binary-alpha/gedit_2.8.3-4sarge1_alpha.deb gedit (2.8.3-4sarge1) stable-security; urgency=high * Non-maintainer upload by The Security Team. * Fix format string vulnerabilities in calls to gtk_message_dialog_new(), which is possibly remotely exploitable via specially crafted file names or URLs. References: - CVE: CAN-2005-1686, <http://www.cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2005-1686> - GNOME bug report: <http://bugzilla.gnome.org/show_bug.cgi?id=306800> stable/main/binary-sparc/crip_3.5-1sarge2_sparc.deb crip (3.5-1sarge2) stable-security; urgency=high * Non-maintainer upload by the Security Team * No changes upload due to the release stable/main/binary-s390/crip_3.5-1sarge2_s390.deb crip (3.5-1sarge2) stable-security; urgency=high * Non-maintainer upload by the Security Team * No changes upload due to the release stable/main/binary-powerpc/crip_3.5-1sarge2_powerpc.deb crip (3.5-1sarge2) stable-security; urgency=high * Non-maintainer upload by the Security Team * No changes upload due to the release stable/main/binary-mipsel/crip_3.5-1sarge2_mipsel.deb crip (3.5-1sarge2) stable-security; urgency=high * Non-maintainer upload by the Security Team * No changes upload due to the release stable/main/binary-mips/crip_3.5-1sarge2_mips.deb crip (3.5-1sarge2) stable-security; urgency=high * Non-maintainer upload by the Security Team * No changes upload due to the release stable/main/binary-m68k/crip_3.5-1sarge2_m68k.deb crip (3.5-1sarge2) stable-security; urgency=high * Non-maintainer upload by the Security Team * No changes upload due to the release stable/main/binary-ia64/crip_3.5-1sarge2_ia64.deb crip (3.5-1sarge2) stable-security; urgency=high * Non-maintainer upload by the Security Team * No changes upload due to the release stable/main/binary-i386/crip_3.5-1sarge2_i386.deb crip (3.5-1sarge2) stable-security; urgency=high * Non-maintainer upload by the Security Team * No changes upload due to the release stable/main/binary-hppa/crip_3.5-1sarge2_hppa.deb crip (3.5-1sarge2) stable-security; urgency=high * Non-maintainer upload by the Security Team * No changes upload due to the release stable/main/binary-alpha/crip_3.5-1sarge2_alpha.deb crip (3.5-1sarge2) stable-security; urgency=high * Non-maintainer upload by the Security Team * No changes upload due to the release stable/main/binary-sparc/libapr0-dev_2.0.54-5_sparc.deb stable/main/binary-sparc/apache2-utils_2.0.54-5_sparc.deb stable/main/binary-sparc/apache2-mpm-prefork_2.0.54-5_sparc.deb stable/main/binary-sparc/apache2-common_2.0.54-5_sparc.deb stable/main/binary-sparc/apache2_2.0.54-5_sparc.deb stable/main/binary-sparc/apache2-prefork-dev_2.0.54-5_sparc.deb stable/main/binary-sparc/apache2-threaded-dev_2.0.54-5_sparc.deb stable/main/binary-sparc/apache2-mpm-perchild_2.0.54-5_sparc.deb stable/main/binary-sparc/apache2-mpm-worker_2.0.54-5_sparc.deb stable/main/binary-sparc/libapr0_2.0.54-5_sparc.deb apache2 (2.0.54-5) stable-security; urgency=high * Add 043_ssl_off_by_one_CAN-2005-1268, fixing an off-by-one error in SSL certificate validation; see CAN-2005-1268 (closes: #320048, #320063) * Add 044_content_length_CAN-2005-2088, resolving an issue in mod_proxy where, when a response contains both Transfer-Encoding and Content-Length headers, the connection can be used for HTTP request smuggling and HTTP request spoofing attacks; see CAN-2005-2088 (closes: #316173) * Add 045_byterange_CAN-2005-2728, to resolve a denial of service in apache when large byte ranges are requested; see CAN-2005-2728 (closes: #326435) * Add 046_verify_client_CAN-2005-2700, resolving an issue where the context of the SSLVerifyClient directive is not honoured within a <Location> nested in a <VirtualHost>, and is left unenforced; see CAN-2005-2700 stable/main/binary-s390/apache2_2.0.54-5_s390.deb stable/main/binary-s390/apache2-mpm-perchild_2.0.54-5_s390.deb stable/main/binary-s390/libapr0_2.0.54-5_s390.deb stable/main/binary-s390/apache2-utils_2.0.54-5_s390.deb stable/main/binary-s390/apache2-mpm-prefork_2.0.54-5_s390.deb stable/main/binary-s390/apache2-mpm-worker_2.0.54-5_s390.deb stable/main/binary-s390/apache2-common_2.0.54-5_s390.deb stable/main/binary-s390/apache2-prefork-dev_2.0.54-5_s390.deb stable/main/binary-s390/apache2-threaded-dev_2.0.54-5_s390.deb stable/main/binary-s390/libapr0-dev_2.0.54-5_s390.deb apache2 (2.0.54-5) stable-security; urgency=high * Add 043_ssl_off_by_one_CAN-2005-1268, fixing an off-by-one error in SSL certificate validation; see CAN-2005-1268 (closes: #320048, #320063) * Add 044_content_length_CAN-2005-2088, resolving an issue in mod_proxy where, when a response contains both Transfer-Encoding and Content-Length headers, the connection can be used for HTTP request smuggling and HTTP request spoofing attacks; see CAN-2005-2088 (closes: #316173) * Add 045_byterange_CAN-2005-2728, to resolve a denial of service in apache when large byte ranges are requested; see CAN-2005-2728 (closes: #326435) * Add 046_verify_client_CAN-2005-2700, resolving an issue where the context of the SSLVerifyClient directive is not honoured within a <Location> nested in a <VirtualHost>, and is left unenforced; see CAN-2005-2700 stable/main/binary-powerpc/libapr0_2.0.54-5_powerpc.deb stable/main/binary-powerpc/apache2-mpm-worker_2.0.54-5_powerpc.deb stable/main/binary-powerpc/apache2-utils_2.0.54-5_powerpc.deb stable/main/binary-powerpc/apache2-threaded-dev_2.0.54-5_powerpc.deb stable/main/binary-powerpc/apache2-mpm-perchild_2.0.54-5_powerpc.deb stable/main/binary-powerpc/apache2-common_2.0.54-5_powerpc.deb stable/main/binary-powerpc/libapr0-dev_2.0.54-5_powerpc.deb stable/main/binary-powerpc/apache2_2.0.54-5_powerpc.deb stable/main/binary-powerpc/apache2-prefork-dev_2.0.54-5_powerpc.deb stable/main/binary-powerpc/apache2-mpm-prefork_2.0.54-5_powerpc.deb apache2 (2.0.54-5) stable-security; urgency=high * Add 043_ssl_off_by_one_CAN-2005-1268, fixing an off-by-one error in SSL certificate validation; see CAN-2005-1268 (closes: #320048, #320063) * Add 044_content_length_CAN-2005-2088, resolving an issue in mod_proxy where, when a response contains both Transfer-Encoding and Content-Length headers, the connection can be used for HTTP request smuggling and HTTP request spoofing attacks; see CAN-2005-2088 (closes: #316173) * Add 045_byterange_CAN-2005-2728, to resolve a denial of service in apache when large byte ranges are requested; see CAN-2005-2728 (closes: #326435) * Add 046_verify_client_CAN-2005-2700, resolving an issue where the context of the SSLVerifyClient directive is not honoured within a <Location> nested in a <VirtualHost>, and is left unenforced; see CAN-2005-2700 stable/main/binary-mipsel/apache2-prefork-dev_2.0.54-5_mipsel.deb stable/main/binary-mipsel/apache2-threaded-dev_2.0.54-5_mipsel.deb stable/main/binary-mipsel/apache2-utils_2.0.54-5_mipsel.deb stable/main/binary-mipsel/libapr0_2.0.54-5_mipsel.deb stable/main/binary-mipsel/apache2-mpm-prefork_2.0.54-5_mipsel.deb stable/main/binary-mipsel/apache2-mpm-perchild_2.0.54-5_mipsel.deb stable/main/binary-mipsel/apache2-common_2.0.54-5_mipsel.deb stable/main/binary-mipsel/libapr0-dev_2.0.54-5_mipsel.deb stable/main/binary-mipsel/apache2_2.0.54-5_mipsel.deb stable/main/binary-mipsel/apache2-mpm-worker_2.0.54-5_mipsel.deb apache2 (2.0.54-5) stable-security; urgency=high * Add 043_ssl_off_by_one_CAN-2005-1268, fixing an off-by-one error in SSL certificate validation; see CAN-2005-1268 (closes: #320048, #320063) * Add 044_content_length_CAN-2005-2088, resolving an issue in mod_proxy where, when a response contains both Transfer-Encoding and Content-Length headers, the connection can be used for HTTP request smuggling and HTTP request spoofing attacks; see CAN-2005-2088 (closes: #316173) * Add 045_byterange_CAN-2005-2728, to resolve a denial of service in apache when large byte ranges are requested; see CAN-2005-2728 (closes: #326435) * Add 046_verify_client_CAN-2005-2700, resolving an issue where the context of the SSLVerifyClient directive is not honoured within a <Location> nested in a <VirtualHost>, and is left unenforced; see CAN-2005-2700 stable/main/binary-mips/apache2-mpm-perchild_2.0.54-5_mips.deb stable/main/binary-mips/libapr0_2.0.54-5_mips.deb stable/main/binary-mips/apache2-utils_2.0.54-5_mips.deb stable/main/binary-mips/apache2-threaded-dev_2.0.54-5_mips.deb stable/main/binary-mips/apache2_2.0.54-5_mips.deb stable/main/binary-mips/apache2-prefork-dev_2.0.54-5_mips.deb stable/main/binary-mips/apache2-mpm-prefork_2.0.54-5_mips.deb stable/main/binary-mips/apache2-mpm-worker_2.0.54-5_mips.deb stable/main/binary-mips/libapr0-dev_2.0.54-5_mips.deb stable/main/binary-mips/apache2-common_2.0.54-5_mips.deb apache2 (2.0.54-5) stable-security; urgency=high * Add 043_ssl_off_by_one_CAN-2005-1268, fixing an off-by-one error in SSL certificate validation; see CAN-2005-1268 (closes: #320048, #320063) * Add 044_content_length_CAN-2005-2088, resolving an issue in mod_proxy where, when a response contains both Transfer-Encoding and Content-Length headers, the connection can be used for HTTP request smuggling and HTTP request spoofing attacks; see CAN-2005-2088 (closes: #316173) * Add 045_byterange_CAN-2005-2728, to resolve a denial of service in apache when large byte ranges are requested; see CAN-2005-2728 (closes: #326435) * Add 046_verify_client_CAN-2005-2700, resolving an issue where the context of the SSLVerifyClient directive is not honoured within a <Location> nested in a <VirtualHost>, and is left unenforced; see CAN-2005-2700 stable/main/binary-m68k/apache2-mpm-worker_2.0.54-5_m68k.deb stable/main/binary-m68k/apache2-utils_2.0.54-5_m68k.deb stable/main/binary-m68k/libapr0-dev_2.0.54-5_m68k.deb stable/main/binary-m68k/apache2_2.0.54-5_m68k.deb stable/main/binary-m68k/apache2-mpm-prefork_2.0.54-5_m68k.deb stable/main/binary-m68k/apache2-mpm-perchild_2.0.54-5_m68k.deb stable/main/binary-m68k/apache2-threaded-dev_2.0.54-5_m68k.deb stable/main/binary-m68k/apache2-prefork-dev_2.0.54-5_m68k.deb stable/main/binary-m68k/libapr0_2.0.54-5_m68k.deb stable/main/binary-m68k/apache2-common_2.0.54-5_m68k.deb apache2 (2.0.54-5) stable-security; urgency=high * Add 043_ssl_off_by_one_CAN-2005-1268, fixing an off-by-one error in SSL certificate validation; see CAN-2005-1268 (closes: #320048, #320063) * Add 044_content_length_CAN-2005-2088, resolving an issue in mod_proxy where, when a response contains both Transfer-Encoding and Content-Length headers, the connection can be used for HTTP request smuggling and HTTP request spoofing attacks; see CAN-2005-2088 (closes: #316173) * Add 045_byterange_CAN-2005-2728, to resolve a denial of service in apache when large byte ranges are requested; see CAN-2005-2728 (closes: #326435) * Add 046_verify_client_CAN-2005-2700, resolving an issue where the context of the SSLVerifyClient directive is not honoured within a <Location> nested in a <VirtualHost>, and is left unenforced; see CAN-2005-2700 stable/main/binary-ia64/apache2_2.0.54-5_ia64.deb stable/main/binary-ia64/libapr0-dev_2.0.54-5_ia64.deb stable/main/binary-ia64/apache2-mpm-prefork_2.0.54-5_ia64.deb stable/main/binary-ia64/apache2-mpm-worker_2.0.54-5_ia64.deb stable/main/binary-ia64/apache2-utils_2.0.54-5_ia64.deb stable/main/binary-ia64/apache2-prefork-dev_2.0.54-5_ia64.deb stable/main/binary-ia64/apache2-mpm-perchild_2.0.54-5_ia64.deb stable/main/binary-ia64/apache2-threaded-dev_2.0.54-5_ia64.deb stable/main/binary-ia64/apache2-common_2.0.54-5_ia64.deb stable/main/binary-ia64/libapr0_2.0.54-5_ia64.deb apache2 (2.0.54-5) stable-security; urgency=high * Add 043_ssl_off_by_one_CAN-2005-1268, fixing an off-by-one error in SSL certificate validation; see CAN-2005-1268 (closes: #320048, #320063) * Add 044_content_length_CAN-2005-2088, resolving an issue in mod_proxy where, when a response contains both Transfer-Encoding and Content-Length headers, the connection can be used for HTTP request smuggling and HTTP request spoofing attacks; see CAN-2005-2088 (closes: #316173) * Add 045_byterange_CAN-2005-2728, to resolve a denial of service in apache when large byte ranges are requested; see CAN-2005-2728 (closes: #326435) * Add 046_verify_client_CAN-2005-2700, resolving an issue where the context of the SSLVerifyClient directive is not honoured within a <Location> nested in a <VirtualHost>, and is left unenforced; see CAN-2005-2700 stable/main/binary-hppa/apache2_2.0.54-5_hppa.deb stable/main/binary-hppa/apache2-mpm-worker_2.0.54-5_hppa.deb stable/main/binary-hppa/apache2-mpm-perchild_2.0.54-5_hppa.deb stable/main/binary-hppa/apache2-utils_2.0.54-5_hppa.deb stable/main/binary-hppa/apache2-threaded-dev_2.0.54-5_hppa.deb stable/main/binary-hppa/libapr0_2.0.54-5_hppa.deb stable/main/binary-hppa/apache2-prefork-dev_2.0.54-5_hppa.deb stable/main/binary-hppa/apache2-mpm-prefork_2.0.54-5_hppa.deb stable/main/binary-hppa/libapr0-dev_2.0.54-5_hppa.deb stable/main/binary-hppa/apache2-common_2.0.54-5_hppa.deb apache2 (2.0.54-5) stable-security; urgency=high * Add 043_ssl_off_by_one_CAN-2005-1268, fixing an off-by-one error in SSL certificate validation; see CAN-2005-1268 (closes: #320048, #320063) * Add 044_content_length_CAN-2005-2088, resolving an issue in mod_proxy where, when a response contains both Transfer-Encoding and Content-Length headers, the connection can be used for HTTP request smuggling and HTTP request spoofing attacks; see CAN-2005-2088 (closes: #316173) * Add 045_byterange_CAN-2005-2728, to resolve a denial of service in apache when large byte ranges are requested; see CAN-2005-2728 (closes: #326435) * Add 046_verify_client_CAN-2005-2700, resolving an issue where the context of the SSLVerifyClient directive is not honoured within a <Location> nested in a <VirtualHost>, and is left unenforced; see CAN-2005-2700 stable/main/binary-arm/apache2-common_2.0.54-5_arm.deb stable/main/binary-arm/apache2-prefork-dev_2.0.54-5_arm.deb stable/main/binary-arm/apache2_2.0.54-5_arm.deb stable/main/binary-arm/libapr0_2.0.54-5_arm.deb stable/main/binary-arm/apache2-threaded-dev_2.0.54-5_arm.deb stable/main/binary-arm/apache2-utils_2.0.54-5_arm.deb stable/main/binary-arm/apache2-mpm-prefork_2.0.54-5_arm.deb stable/main/binary-arm/apache2-mpm-worker_2.0.54-5_arm.deb stable/main/binary-arm/libapr0-dev_2.0.54-5_arm.deb stable/main/binary-arm/apache2-mpm-perchild_2.0.54-5_arm.deb apache2 (2.0.54-5) stable-security; urgency=high * Add 043_ssl_off_by_one_CAN-2005-1268, fixing an off-by-one error in SSL certificate validation; see CAN-2005-1268 (closes: #320048, #320063) * Add 044_content_length_CAN-2005-2088, resolving an issue in mod_proxy where, when a response contains both Transfer-Encoding and Content-Length headers, the connection can be used for HTTP request smuggling and HTTP request spoofing attacks; see CAN-2005-2088 (closes: #316173) * Add 045_byterange_CAN-2005-2728, to resolve a denial of service in apache when large byte ranges are requested; see CAN-2005-2728 (closes: #326435) * Add 046_verify_client_CAN-2005-2700, resolving an issue where the context of the SSLVerifyClient directive is not honoured within a <Location> nested in a <VirtualHost>, and is left unenforced; see CAN-2005-2700 stable/main/binary-alpha/apache2-common_2.0.54-5_alpha.deb stable/main/binary-alpha/apache2-mpm-perchild_2.0.54-5_alpha.deb stable/main/binary-alpha/apache2_2.0.54-5_alpha.deb stable/main/binary-alpha/apache2-mpm-worker_2.0.54-5_alpha.deb stable/main/binary-alpha/apache2-utils_2.0.54-5_alpha.deb stable/main/binary-alpha/apache2-prefork-dev_2.0.54-5_alpha.deb stable/main/binary-alpha/libapr0_2.0.54-5_alpha.deb stable/main/binary-alpha/apache2-threaded-dev_2.0.54-5_alpha.deb stable/main/binary-alpha/libapr0-dev_2.0.54-5_alpha.deb stable/main/binary-alpha/apache2-mpm-prefork_2.0.54-5_alpha.deb apache2 (2.0.54-5) stable-security; urgency=high * Add 043_ssl_off_by_one_CAN-2005-1268, fixing an off-by-one error in SSL certificate validation; see CAN-2005-1268 (closes: #320048, #320063) * Add 044_content_length_CAN-2005-2088, resolving an issue in mod_proxy where, when a response contains both Transfer-Encoding and Content-Length headers, the connection can be used for HTTP request smuggling and HTTP request spoofing attacks; see CAN-2005-2088 (closes: #316173) * Add 045_byterange_CAN-2005-2728, to resolve a denial of service in apache when large byte ranges are requested; see CAN-2005-2728 (closes: #326435) * Add 046_verify_client_CAN-2005-2700, resolving an issue where the context of the SSLVerifyClient directive is not honoured within a <Location> nested in a <VirtualHost>, and is left unenforced; see CAN-2005-2700 stable/main/binary-i386/apache2-common_2.0.54-5_i386.deb stable/main/binary-i386/apache2-mpm-perchild_2.0.54-5_i386.deb stable/main/binary-i386/libapr0_2.0.54-5_i386.deb stable/main/binary-i386/apache2-prefork-dev_2.0.54-5_i386.deb stable/main/binary-all/apache2-doc_2.0.54-5_all.deb stable/main/source/apache2_2.0.54-5.diff.gz stable/main/source/apache2_2.0.54-5.dsc stable/main/binary-all/apache2-mpm-threadpool_2.0.54-5_all.deb stable/main/binary-i386/apache2-mpm-prefork_2.0.54-5_i386.deb stable/main/binary-i386/libapr0-dev_2.0.54-5_i386.deb stable/main/binary-i386/apache2_2.0.54-5_i386.deb stable/main/binary-i386/apache2-threaded-dev_2.0.54-5_i386.deb stable/main/binary-i386/apache2-utils_2.0.54-5_i386.deb stable/main/binary-i386/apache2-mpm-worker_2.0.54-5_i386.deb apache2 (2.0.54-5) stable-security; urgency=high * Add 043_ssl_off_by_one_CAN-2005-1268, fixing an off-by-one error in SSL certificate validation; see CAN-2005-1268 (closes: #320048, #320063) * Add 044_content_length_CAN-2005-2088, resolving an issue in mod_proxy where, when a response contains both Transfer-Encoding and Content-Length headers, the connection can be used for HTTP request smuggling and HTTP request spoofing attacks; see CAN-2005-2088 (closes: #316173) * Add 045_byterange_CAN-2005-2728, to resolve a denial of service in apache when large byte ranges are requested; see CAN-2005-2728 (closes: #326435) * Add 046_verify_client_CAN-2005-2700, resolving an issue where the context of the SSLVerifyClient directive is not honoured within a <Location> nested in a <VirtualHost>, and is left unenforced; see CAN-2005-2700 stable/main/binary-sparc/zsync_0.3.3-1.sarge.1_sparc.deb zsync (0.3.3-1.sarge.1) stable-security; urgency=high * [SECURITY] fix for CAN-2005-2096 and CAN-2005-1849 stable/main/binary-s390/zsync_0.3.3-1.sarge.1_s390.deb zsync (0.3.3-1.sarge.1) stable-security; urgency=high * [SECURITY] fix for CAN-2005-2096 and CAN-2005-1849 stable/main/binary-powerpc/zsync_0.3.3-1.sarge.1_powerpc.deb zsync (0.3.3-1.sarge.1) stable-security; urgency=high * [SECURITY] fix for CAN-2005-2096 and CAN-2005-1849 stable/main/binary-mipsel/zsync_0.3.3-1.sarge.1_mipsel.deb zsync (0.3.3-1.sarge.1) stable-security; urgency=high * [SECURITY] fix for CAN-2005-2096 and CAN-2005-1849 stable/main/binary-mips/zsync_0.3.3-1.sarge.1_mips.deb zsync (0.3.3-1.sarge.1) stable-security; urgency=high * [SECURITY] fix for CAN-2005-2096 and CAN-2005-1849 stable/main/binary-m68k/zsync_0.3.3-1.sarge.1_m68k.deb zsync (0.3.3-1.sarge.1) stable-security; urgency=high * [SECURITY] fix for CAN-2005-2096 and CAN-2005-1849 stable/main/binary-ia64/zsync_0.3.3-1.sarge.1_ia64.deb zsync (0.3.3-1.sarge.1) stable-security; urgency=high * [SECURITY] fix for CAN-2005-2096 and CAN-2005-1849 stable/main/binary-hppa/zsync_0.3.3-1.sarge.1_hppa.deb zsync (0.3.3-1.sarge.1) stable-security; urgency=high * [SECURITY] fix for CAN-2005-2096 and CAN-2005-1849 stable/main/binary-arm/zsync_0.3.3-1.sarge.1_arm.deb zsync (0.3.3-1.sarge.1) stable-security; urgency=high * [SECURITY] fix for CAN-2005-2096 and CAN-2005-1849 stable/main/binary-alpha/zsync_0.3.3-1.sarge.1_alpha.deb zsync (0.3.3-1.sarge.1) stable-security; urgency=high * [SECURITY] fix for CAN-2005-2096 and CAN-2005-1849 stable/main/source/zsync_0.3.3-1.sarge.1.diff.gz stable/main/source/zsync_0.3.3-1.sarge.1.dsc zsync (0.3.3-1.sarge.1) stable-security; urgency=high * [SECURITY] fix for CAN-2005-2096 and CAN-2005-1849 stable/main/binary-sparc/zope2.7_2.7.5-2sarge1_sparc.deb zope2.7 (2.7.5-2sarge1) stable-security; urgency=high * apply security fix with docutils wrt RestructuredText functionalities (Zope Hotfix 2005-10-09) [CVE-2005-3323, Bug#334055, lib/python/Products/ZReST/ZReST.py, lib/python/docutils/parsers/rst/directives/misc.py, lib/python/reStructuredText/__init__.py] Thanks Jens Nachtigall stable/main/binary-s390/zope2.7_2.7.5-2sarge1_s390.deb zope2.7 (2.7.5-2sarge1) stable-security; urgency=high * apply security fix with docutils wrt RestructuredText functionalities (Zope Hotfix 2005-10-09) [CVE-2005-3323, Bug#334055, lib/python/Products/ZReST/ZReST.py, lib/python/docutils/parsers/rst/directives/misc.py, lib/python/reStructuredText/__init__.py] Thanks Jens Nachtigall stable/main/binary-mipsel/zope2.7_2.7.5-2sarge1_mipsel.deb zope2.7 (2.7.5-2sarge1) stable-security; urgency=high * apply security fix with docutils wrt RestructuredText functionalities (Zope Hotfix 2005-10-09) [CVE-2005-3323, Bug#334055, lib/python/Products/ZReST/ZReST.py, lib/python/docutils/parsers/rst/directives/misc.py, lib/python/reStructuredText/__init__.py] Thanks Jens Nachtigall stable/main/binary-mips/zope2.7_2.7.5-2sarge1_mips.deb zope2.7 (2.7.5-2sarge1) stable-security; urgency=high * apply security fix with docutils wrt RestructuredText functionalities (Zope Hotfix 2005-10-09) [CVE-2005-3323, Bug#334055, lib/python/Products/ZReST/ZReST.py, lib/python/docutils/parsers/rst/directives/misc.py, lib/python/reStructuredText/__init__.py] Thanks Jens Nachtigall stable/main/binary-m68k/zope2.7_2.7.5-2sarge1_m68k.deb zope2.7 (2.7.5-2sarge1) stable-security; urgency=high * apply security fix with docutils wrt RestructuredText functionalities (Zope Hotfix 2005-10-09) [CVE-2005-3323, Bug#334055, lib/python/Products/ZReST/ZReST.py, lib/python/docutils/parsers/rst/directives/misc.py, lib/python/reStructuredText/__init__.py] Thanks Jens Nachtigall stable/main/binary-ia64/zope2.7_2.7.5-2sarge1_ia64.deb zope2.7 (2.7.5-2sarge1) stable-security; urgency=high * apply security fix with docutils wrt RestructuredText functionalities (Zope Hotfix 2005-10-09) [CVE-2005-3323, Bug#334055, lib/python/Products/ZReST/ZReST.py, lib/python/docutils/parsers/rst/directives/misc.py, lib/python/reStructuredText/__init__.py] Thanks Jens Nachtigall stable/main/binary-i386/zope2.7_2.7.5-2sarge1_i386.deb zope2.7 (2.7.5-2sarge1) stable-security; urgency=high * apply security fix with docutils wrt RestructuredText functionalities (Zope Hotfix 2005-10-09) [CVE-2005-3323, Bug#334055, lib/python/Products/ZReST/ZReST.py, lib/python/docutils/parsers/rst/directives/misc.py, lib/python/reStructuredText/__init__.py] Thanks Jens Nachtigall stable/main/binary-hppa/zope2.7_2.7.5-2sarge1_hppa.deb zope2.7 (2.7.5-2sarge1) stable-security; urgency=high * apply security fix with docutils wrt RestructuredText functionalities (Zope Hotfix 2005-10-09) [CVE-2005-3323, Bug#334055, lib/python/Products/ZReST/ZReST.py, lib/python/docutils/parsers/rst/directives/misc.py, lib/python/reStructuredText/__init__.py] Thanks Jens Nachtigall stable/main/binary-arm/zope2.7_2.7.5-2sarge1_arm.deb zope2.7 (2.7.5-2sarge1) stable-security; urgency=high * apply security fix with docutils wrt RestructuredText functionalities (Zope Hotfix 2005-10-09) [CVE-2005-3323, Bug#334055, lib/python/Products/ZReST/ZReST.py, lib/python/docutils/parsers/rst/directives/misc.py, lib/python/reStructuredText/__init__.py] Thanks Jens Nachtigall stable/main/binary-alpha/zope2.7_2.7.5-2sarge1_alpha.deb zope2.7 (2.7.5-2sarge1) stable-security; urgency=high * apply security fix with docutils wrt RestructuredText functionalities (Zope Hotfix 2005-10-09) [CVE-2005-3323, Bug#334055, lib/python/Products/ZReST/ZReST.py, lib/python/docutils/parsers/rst/directives/misc.py, lib/python/reStructuredText/__init__.py] Thanks Jens Nachtigall stable/main/binary-powerpc/zope2.7_2.7.5-2sarge1_powerpc.deb stable/main/source/zope2.7_2.7.5-2sarge1.dsc stable/main/source/zope2.7_2.7.5-2sarge1.diff.gz zope2.7 (2.7.5-2sarge1) stable-security; urgency=high * apply security fix with docutils wrt RestructuredText functionalities (Zope Hotfix 2005-10-09) [CVE-2005-3323, Bug#334055, lib/python/Products/ZReST/ZReST.py, lib/python/docutils/parsers/rst/directives/misc.py, lib/python/reStructuredText/__init__.py] Thanks Jens Nachtigall stable/main/binary-sparc/xmail_1.21-3sarge1_sparc.deb xmail (1.21-3sarge1) stable-security; urgency=high * Non-maintainer upload by the Security Team * Backported patch extracted by Radu Spineanu to fix privilege escalation [SendMail.cpp, 03_CAN-2005-2943] stable/main/binary-s390/xmail_1.21-3sarge1_s390.deb xmail (1.21-3sarge1) stable-security; urgency=high * Non-maintainer upload by the Security Team * Backported patch extracted by Radu Spineanu to fix privilege escalation [SendMail.cpp, 03_CAN-2005-2943] stable/main/binary-mipsel/xmail_1.21-3sarge1_mipsel.deb xmail (1.21-3sarge1) stable-security; urgency=high * Non-maintainer upload by the Security Team * Backported patch extracted by Radu Spineanu to fix privilege escalation [SendMail.cpp, 03_CAN-2005-2943] stable/main/binary-mips/xmail_1.21-3sarge1_mips.deb xmail (1.21-3sarge1) stable-security; urgency=high * Non-maintainer upload by the Security Team * Backported patch extracted by Radu Spineanu to fix privilege escalation [SendMail.cpp, 03_CAN-2005-2943] stable/main/binary-m68k/xmail_1.21-3sarge1_m68k.deb xmail (1.21-3sarge1) stable-security; urgency=high * Non-maintainer upload by the Security Team * Backported patch extracted by Radu Spineanu to fix privilege escalation [SendMail.cpp, 03_CAN-2005-2943] stable/main/binary-ia64/xmail_1.21-3sarge1_ia64.deb xmail (1.21-3sarge1) stable-security; urgency=high * Non-maintainer upload by the Security Team * Backported patch extracted by Radu Spineanu to fix privilege escalation [SendMail.cpp, 03_CAN-2005-2943] stable/main/binary-i386/xmail_1.21-3sarge1_i386.deb xmail (1.21-3sarge1) stable-security; urgency=high * Non-maintainer upload by the Security Team * Backported patch extracted by Radu Spineanu to fix privilege escalation [SendMail.cpp, 03_CAN-2005-2943] stable/main/binary-hppa/xmail_1.21-3sarge1_hppa.deb xmail (1.21-3sarge1) stable-security; urgency=high * Non-maintainer upload by the Security Team * Backported patch extracted by Radu Spineanu to fix privilege escalation [SendMail.cpp, 03_CAN-2005-2943] stable/main/binary-arm/xmail_1.21-3sarge1_arm.deb xmail (1.21-3sarge1) stable-security; urgency=high * Non-maintainer upload by the Security Team * Backported patch extracted by Radu Spineanu to fix privilege escalation [SendMail.cpp, 03_CAN-2005-2943] stable/main/binary-alpha/xmail_1.21-3sarge1_alpha.deb xmail (1.21-3sarge1) stable-security; urgency=high * Non-maintainer upload by the Security Team * Backported patch extracted by Radu Spineanu to fix privilege escalation [SendMail.cpp, 03_CAN-2005-2943] stable/main/binary-powerpc/xmail_1.21-3sarge1_powerpc.deb stable/main/binary-all/xmail-doc_1.21-3sarge1_all.deb stable/main/source/xmail_1.21-3sarge1.diff.gz stable/main/source/xmail_1.21-3sarge1.dsc xmail (1.21-3sarge1) stable-security; urgency=high * Non-maintainer upload by the Security Team * Backported patch extracted by Radu Spineanu to fix privilege escalation [SendMail.cpp, 03_CAN-2005-2943] stable/main/binary-sparc/xloadimage_4.1-14.3_sparc.deb xloadimage (4.1-14.3) stable-security; urgency=high * Non-maintainer upload by the Security Team * Corrected code to fix buffer overflows [zoom.c, rotate.c, reduce.c, CAN-2005-3178, debian/patches/15_CAN-2005-3178.dpatch] stable/main/binary-s390/xloadimage_4.1-14.3_s390.deb xloadimage (4.1-14.3) stable-security; urgency=high * Non-maintainer upload by the Security Team * Corrected code to fix buffer overflows [zoom.c, rotate.c, reduce.c, CAN-2005-3178, debian/patches/15_CAN-2005-3178.dpatch] stable/main/binary-mipsel/xloadimage_4.1-14.3_mipsel.deb xloadimage (4.1-14.3) stable-security; urgency=high * Non-maintainer upload by the Security Team * Corrected code to fix buffer overflows [zoom.c, rotate.c, reduce.c, CAN-2005-3178, debian/patches/15_CAN-2005-3178.dpatch] stable/main/binary-mips/xloadimage_4.1-14.3_mips.deb xloadimage (4.1-14.3) stable-security; urgency=high * Non-maintainer upload by the Security Team * Corrected code to fix buffer overflows [zoom.c, rotate.c, reduce.c, CAN-2005-3178, debian/patches/15_CAN-2005-3178.dpatch] stable/main/binary-m68k/xloadimage_4.1-14.3_m68k.deb xloadimage (4.1-14.3) stable-security; urgency=high * Non-maintainer upload by the Security Team * Corrected code to fix buffer overflows [zoom.c, rotate.c, reduce.c, CAN-2005-3178, debian/patches/15_CAN-2005-3178.dpatch] stable/main/binary-ia64/xloadimage_4.1-14.3_ia64.deb xloadimage (4.1-14.3) stable-security; urgency=high * Non-maintainer upload by the Security Team * Corrected code to fix buffer overflows [zoom.c, rotate.c, reduce.c, CAN-2005-3178, debian/patches/15_CAN-2005-3178.dpatch] stable/main/binary-i386/xloadimage_4.1-14.3_i386.deb xloadimage (4.1-14.3) stable-security; urgency=high * Non-maintainer upload by the Security Team * Corrected code to fix buffer overflows [zoom.c, rotate.c, reduce.c, CAN-2005-3178, debian/patches/15_CAN-2005-3178.dpatch] stable/main/binary-hppa/xloadimage_4.1-14.3_hppa.deb xloadimage (4.1-14.3) stable-security; urgency=high * Non-maintainer upload by the Security Team * Corrected code to fix buffer overflows [zoom.c, rotate.c, reduce.c, CAN-2005-3178, debian/patches/15_CAN-2005-3178.dpatch] stable/main/binary-arm/xloadimage_4.1-14.3_arm.deb xloadimage (4.1-14.3) stable-security; urgency=high * Non-maintainer upload by the Security Team * Corrected code to fix buffer overflows [zoom.c, rotate.c, reduce.c, CAN-2005-3178, debian/patches/15_CAN-2005-3178.dpatch] stable/main/binary-alpha/xloadimage_4.1-14.3_alpha.deb xloadimage (4.1-14.3) stable-security; urgency=high * Non-maintainer upload by the Security Team * Corrected code to fix buffer overflows [zoom.c, rotate.c, reduce.c, CAN-2005-3178, debian/patches/15_CAN-2005-3178.dpatch] stable/main/source/xloadimage_4.1-14.3.dsc stable/main/binary-powerpc/xloadimage_4.1-14.3_powerpc.deb stable/main/source/xloadimage_4.1-14.3.diff.gz xloadimage (4.1-14.3) stable-security; urgency=high * Non-maintainer upload by the Security Team * Corrected code to fix buffer overflows [zoom.c, rotate.c, reduce.c, CAN-2005-3178, debian/patches/15_CAN-2005-3178.dpatch] stable/main/binary-sparc/xli_1.17.0-18sarge1_sparc.deb xli (1.17.0-18sarge1) stable-security; urgency=high * Non-maintainer upload by the Security Team * Corrected code to fix buffer overflows [zoom.c, reduce.c, CAN-2005-3178] stable/main/binary-s390/xli_1.17.0-18sarge1_s390.deb xli (1.17.0-18sarge1) stable-security; urgency=high * Non-maintainer upload by the Security Team * Corrected code to fix buffer overflows [zoom.c, reduce.c, CAN-2005-3178] stable/main/binary-mipsel/xli_1.17.0-18sarge1_mipsel.deb xli (1.17.0-18sarge1) stable-security; urgency=high * Non-maintainer upload by the Security Team * Corrected code to fix buffer overflows [zoom.c, reduce.c, CAN-2005-3178] stable/main/binary-mips/xli_1.17.0-18sarge1_mips.deb xli (1.17.0-18sarge1) stable-security; urgency=high * Non-maintainer upload by the Security Team * Corrected code to fix buffer overflows [zoom.c, reduce.c, CAN-2005-3178] stable/main/binary-m68k/xli_1.17.0-18sarge1_m68k.deb xli (1.17.0-18sarge1) stable-security; urgency=high * Non-maintainer upload by the Security Team * Corrected code to fix buffer overflows [zoom.c, reduce.c, CAN-2005-3178] stable/main/binary-ia64/xli_1.17.0-18sarge1_ia64.deb xli (1.17.0-18sarge1) stable-security; urgency=high * Non-maintainer upload by the Security Team * Corrected code to fix buffer overflows [zoom.c, reduce.c, CAN-2005-3178] stable/main/binary-i386/xli_1.17.0-18sarge1_i386.deb xli (1.17.0-18sarge1) stable-security; urgency=high * Non-maintainer upload by the Security Team * Corrected code to fix buffer overflows [zoom.c, reduce.c, CAN-2005-3178] stable/main/binary-hppa/xli_1.17.0-18sarge1_hppa.deb xli (1.17.0-18sarge1) stable-security; urgency=high * Non-maintainer upload by the Security Team * Corrected code to fix buffer overflows [zoom.c, reduce.c, CAN-2005-3178] stable/main/binary-arm/xli_1.17.0-18sarge1_arm.deb xli (1.17.0-18sarge1) stable-security; urgency=high * Non-maintainer upload by the Security Team * Corrected code to fix buffer overflows [zoom.c, reduce.c, CAN-2005-3178] stable/main/binary-alpha/xli_1.17.0-18sarge1_alpha.deb xli (1.17.0-18sarge1) stable-security; urgency=high * Non-maintainer upload by the Security Team * Corrected code to fix buffer overflows [zoom.c, reduce.c, CAN-2005-3178] stable/main/source/xli_1.17.0-18sarge1.dsc stable/main/binary-powerpc/xli_1.17.0-18sarge1_powerpc.deb stable/main/source/xli_1.17.0-18sarge1.diff.gz xli (1.17.0-18sarge1) stable-security; urgency=high * Non-maintainer upload by the Security Team * Corrected code to fix buffer overflows [zoom.c, reduce.c, CAN-2005-3178] stable/main/binary-sparc/libxine1_1.0.1-1sarge1_sparc.deb stable/main/binary-sparc/libxine-dev_1.0.1-1sarge1_sparc.deb xine-lib (1.0.1-1sarge1) stable-security; urgency=high * Non-maintainer upload by the Security Team * Applied patch by Ulf Härnhammar to fix a format string vulnerability [src/input/input_cdda.c, CAN-2005-2967] stable/main/binary-s390/libxine-dev_1.0.1-1sarge1_s390.deb stable/main/binary-s390/libxine1_1.0.1-1sarge1_s390.deb xine-lib (1.0.1-1sarge1) stable-security; urgency=high * Non-maintainer upload by the Security Team * Applied patch by Ulf Härnhammar to fix a format string vulnerability [src/input/input_cdda.c, CAN-2005-2967] stable/main/binary-mipsel/libxine-dev_1.0.1-1sarge1_mipsel.deb stable/main/binary-mipsel/libxine1_1.0.1-1sarge1_mipsel.deb xine-lib (1.0.1-1sarge1) stable-security; urgency=high * Non-maintainer upload by the Security Team * Applied patch by Ulf Härnhammar to fix a format string vulnerability [src/input/input_cdda.c, CAN-2005-2967] stable/main/binary-mips/libxine1_1.0.1-1sarge1_mips.deb stable/main/binary-mips/libxine-dev_1.0.1-1sarge1_mips.deb xine-lib (1.0.1-1sarge1) stable-security; urgency=high * Non-maintainer upload by the Security Team * Applied patch by Ulf Härnhammar to fix a format string vulnerability [src/input/input_cdda.c, CAN-2005-2967] stable/main/binary-m68k/libxine1_1.0.1-1sarge1_m68k.deb stable/main/binary-m68k/libxine-dev_1.0.1-1sarge1_m68k.deb xine-lib (1.0.1-1sarge1) stable-security; urgency=high * Non-maintainer upload by the Security Team * Applied patch by Ulf Härnhammar to fix a format string vulnerability [src/input/input_cdda.c, CAN-2005-2967] stable/main/binary-ia64/libxine-dev_1.0.1-1sarge1_ia64.deb stable/main/binary-ia64/libxine1_1.0.1-1sarge1_ia64.deb xine-lib (1.0.1-1sarge1) stable-security; urgency=high * Non-maintainer upload by the Security Team * Applied patch by Ulf Härnhammar to fix a format string vulnerability [src/input/input_cdda.c, CAN-2005-2967] stable/main/binary-i386/libxine-dev_1.0.1-1sarge1_i386.deb stable/main/binary-i386/libxine1_1.0.1-1sarge1_i386.deb xine-lib (1.0.1-1sarge1) stable-security; urgency=high * Non-maintainer upload by the Security Team * Applied patch by Ulf Härnhammar to fix a format string vulnerability [src/input/input_cdda.c, CAN-2005-2967] stable/main/binary-hppa/libxine-dev_1.0.1-1sarge1_hppa.deb stable/main/binary-hppa/libxine1_1.0.1-1sarge1_hppa.deb xine-lib (1.0.1-1sarge1) stable-security; urgency=high * Non-maintainer upload by the Security Team * Applied patch by Ulf Härnhammar to fix a format string vulnerability [src/input/input_cdda.c, CAN-2005-2967] stable/main/binary-arm/libxine-dev_1.0.1-1sarge1_arm.deb stable/main/binary-arm/libxine1_1.0.1-1sarge1_arm.deb xine-lib (1.0.1-1sarge1) stable-security; urgency=high * Non-maintainer upload by the Security Team * Applied patch by Ulf Härnhammar to fix a format string vulnerability [src/input/input_cdda.c, CAN-2005-2967] stable/main/binary-alpha/libxine1_1.0.1-1sarge1_alpha.deb stable/main/binary-alpha/libxine-dev_1.0.1-1sarge1_alpha.deb xine-lib (1.0.1-1sarge1) stable-security; urgency=high * Non-maintainer upload by the Security Team * Applied patch by Ulf Härnhammar to fix a format string vulnerability [src/input/input_cdda.c, CAN-2005-2967] stable/main/binary-powerpc/libxine1_1.0.1-1sarge1_powerpc.deb stable/main/binary-powerpc/libxine-dev_1.0.1-1sarge1_powerpc.deb stable/main/source/xine-lib_1.0.1-1sarge1.diff.gz stable/main/source/xine-lib_1.0.1-1sarge1.dsc xine-lib (1.0.1-1sarge1) stable-security; urgency=high * Non-maintainer upload by the Security Team * Applied patch by Ulf Härnhammar to fix a format string vulnerability [src/input/input_cdda.c, CAN-2005-2967] stable/main/binary-sparc/libxft1_4.3.0.dfsg.1-14sarge1_sparc.deb stable/main/binary-sparc/libdps-dev_4.3.0.dfsg.1-14sarge1_sparc.deb stable/main/binary-sparc/xlibosmesa4_4.3.0.dfsg.1-14sarge1_sparc.deb stable/main/binary-sparc/xlibmesa-gl-dbg_4.3.0.dfsg.1-14sarge1_sparc.deb stable/main/binary-sparc/xlibmesa-glu-dev_4.3.0.dfsg.1-14sarge1_sparc.deb stable/main/binary-sparc/libx11-dev_4.3.0.dfsg.1-14sarge1_sparc.deb stable/main/binary-sparc/libx11-6-dbg_4.3.0.dfsg.1-14sarge1_sparc.deb stable/main/binary-sparc/xlibs-static-pic_4.3.0.dfsg.1-14sarge1_sparc.deb stable/main/binary-sparc/libxpm-dev_4.3.0.dfsg.1-14sarge1_sparc.deb stable/main/binary-sparc/libxtst-dev_4.3.0.dfsg.1-14sarge1_sparc.deb stable/main/binary-sparc/libxft1-dbg_4.3.0.dfsg.1-14sarge1_sparc.deb stable/main/binary-sparc/libxv1_4.3.0.dfsg.1-14sarge1_sparc.deb stable/main/binary-sparc/xmh_4.3.0.dfsg.1-14sarge1_sparc.deb stable/main/binary-sparc/xserver-xfree86-dbg_4.3.0.dfsg.1-14sarge1_sparc.deb stable/main/binary-sparc/libxaw6-dev_4.3.0.dfsg.1-14sarge1_sparc.deb stable/main/binary-sparc/libxp6-dbg_4.3.0.dfsg.1-14sarge1_sparc.deb stable/main/binary-sparc/libdps1_4.3.0.dfsg.1-14sarge1_sparc.deb stable/main/binary-sparc/libsm6-dbg_4.3.0.dfsg.1-14sarge1_sparc.deb stable/main/binary-sparc/libxt-dev_4.3.0.dfsg.1-14sarge1_sparc.deb stable/main/binary-sparc/libxaw7_4.3.0.dfsg.1-14sarge1_sparc.deb stable/main/binary-sparc/x-window-system-core_4.3.0.dfsg.1-14sarge1_sparc.deb stable/main/binary-sparc/libxtrap6-dbg_4.3.0.dfsg.1-14sarge1_sparc.deb stable/main/binary-sparc/x-window-system-dev_4.3.0.dfsg.1-14sarge1_sparc.deb stable/main/binary-sparc/libxi6_4.3.0.dfsg.1-14sarge1_sparc.deb stable/main/binary-sparc/libxt6_4.3.0.dfsg.1-14sarge1_sparc.deb stable/main/binary-sparc/libdps1-dbg_4.3.0.dfsg.1-14sarge1_sparc.deb stable/main/binary-sparc/xlibosmesa-dev_4.3.0.dfsg.1-14sarge1_sparc.deb stable/main/binary-sparc/libxp-dev_4.3.0.dfsg.1-14sarge1_sparc.deb stable/main/binary-sparc/libxv-dev_4.3.0.dfsg.1-14sarge1_sparc.deb stable/main/binary-sparc/xvfb_4.3.0.dfsg.1-14sarge1_sparc.deb stable/main/binary-sparc/xterm_4.3.0.dfsg.1-14sarge1_sparc.deb stable/main/binary-sparc/libxaw6-dbg_4.3.0.dfsg.1-14sarge1_sparc.deb stable/main/binary-sparc/xlibmesa-glu-dbg_4.3.0.dfsg.1-14sarge1_sparc.deb stable/main/binary-sparc/xbase-clients_4.3.0.dfsg.1-14sarge1_sparc.deb stable/main/binary-sparc/xnest_4.3.0.dfsg.1-14sarge1_sparc.deb stable/main/binary-sparc/libxext6_4.3.0.dfsg.1-14sarge1_sparc.deb stable/main/binary-sparc/lbxproxy_4.3.0.dfsg.1-14sarge1_sparc.deb stable/main/binary-sparc/libxrandr-dev_4.3.0.dfsg.1-14sarge1_sparc.deb stable/main/binary-sparc/libxpm4_4.3.0.dfsg.1-14sarge1_sparc.deb stable/main/binary-sparc/twm_4.3.0.dfsg.1-14sarge1_sparc.deb stable/main/binary-sparc/xfs_4.3.0.dfsg.1-14sarge1_sparc.deb stable/main/binary-sparc/libice6-dbg_4.3.0.dfsg.1-14sarge1_sparc.deb stable/main/binary-sparc/libxi6-dbg_4.3.0.dfsg.1-14sarge1_sparc.deb stable/main/binary-sparc/libxrandr2_4.3.0.dfsg.1-14sarge1_sparc.deb stable/main/binary-sparc/libxrandr2-dbg_4.3.0.dfsg.1-14sarge1_sparc.deb stable/main/binary-sparc/libxmuu1-dbg_4.3.0.dfsg.1-14sarge1_sparc.deb stable/main/binary-sparc/libxmuu1_4.3.0.dfsg.1-14sarge1_sparc.deb stable/main/binary-sparc/xlibmesa-gl_4.3.0.dfsg.1-14sarge1_sparc.deb stable/main/binary-sparc/libxpm4-dbg_4.3.0.dfsg.1-14sarge1_sparc.deb stable/main/binary-sparc/xserver-xfree86_4.3.0.dfsg.1-14sarge1_sparc.deb stable/main/binary-sparc/libxi-dev_4.3.0.dfsg.1-14sarge1_sparc.deb stable/main/binary-sparc/libxmu-dev_4.3.0.dfsg.1-14sarge1_sparc.deb stable/main/binary-sparc/xlibmesa-glu_4.3.0.dfsg.1-14sarge1_sparc.deb stable/main/binary-sparc/libsm-dev_4.3.0.dfsg.1-14sarge1_sparc.deb stable/main/binary-sparc/xutils_4.3.0.dfsg.1-14sarge1_sparc.deb stable/main/binary-sparc/libxp6_4.3.0.dfsg.1-14sarge1_sparc.deb stable/main/binary-sparc/libxaw6_4.3.0.dfsg.1-14sarge1_sparc.deb stable/main/binary-sparc/xfwp_4.3.0.dfsg.1-14sarge1_sparc.deb stable/main/binary-sparc/xlibs-static-dev_4.3.0.dfsg.1-14sarge1_sparc.deb stable/main/binary-sparc/libxext6-dbg_4.3.0.dfsg.1-14sarge1_sparc.deb stable/main/binary-sparc/xlibmesa-dri_4.3.0.dfsg.1-14sarge1_sparc.deb stable/main/binary-sparc/libxtst6-dbg_4.3.0.dfsg.1-14sarge1_sparc.deb stable/main/binary-sparc/libice6_4.3.0.dfsg.1-14sarge1_sparc.deb stable/main/binary-sparc/libxtst6_4.3.0.dfsg.1-14sarge1_sparc.deb stable/main/binary-sparc/libxaw7-dev_4.3.0.dfsg.1-14sarge1_sparc.deb stable/main/binary-sparc/libx11-6_4.3.0.dfsg.1-14sarge1_sparc.deb stable/main/binary-sparc/libxtrap6_4.3.0.dfsg.1-14sarge1_sparc.deb stable/main/binary-sparc/libsm6_4.3.0.dfsg.1-14sarge1_sparc.deb stable/main/binary-sparc/xlibosmesa4-dbg_4.3.0.dfsg.1-14sarge1_sparc.deb stable/main/binary-sparc/libxtrap-dev_4.3.0.dfsg.1-14sarge1_sparc.deb stable/main/binary-sparc/libxmu6_4.3.0.dfsg.1-14sarge1_sparc.deb stable/main/binary-sparc/libice-dev_4.3.0.dfsg.1-14sarge1_sparc.deb stable/main/binary-sparc/libxmu6-dbg_4.3.0.dfsg.1-14sarge1_sparc.deb stable/main/binary-sparc/xdm_4.3.0.dfsg.1-14sarge1_sparc.deb stable/main/binary-sparc/libxt6-dbg_4.3.0.dfsg.1-14sarge1_sparc.deb stable/main/binary-sparc/proxymngr_4.3.0.dfsg.1-14sarge1_sparc.deb stable/main/binary-sparc/libxmuu-dev_4.3.0.dfsg.1-14sarge1_sparc.deb stable/main/binary-sparc/libxext-dev_4.3.0.dfsg.1-14sarge1_sparc.deb stable/main/binary-sparc/libxaw7-dbg_4.3.0.dfsg.1-14sarge1_sparc.deb stable/main/binary-sparc/xlibmesa-gl-dev_4.3.0.dfsg.1-14sarge1_sparc.deb stable/main/binary-sparc/xlibmesa3_4.3.0.dfsg.1-14sarge1_sparc.deb stable/main/binary-sparc/xlibmesa-dri-dbg_4.3.0.dfsg.1-14sarge1_sparc.deb stable/main/binary-sparc/libxv1-dbg_4.3.0.dfsg.1-14sarge1_sparc.deb stable/main/binary-sparc/xserver-common_4.3.0.dfsg.1-14sarge1_sparc.deb xfree86 (4.3.0.dfsg.1-14sarge1) stable-security; urgency=high * Security update release. Resolves the following issue: + CAN-2005-2495: overflows when allocating size for large pixmaps may allow attackers to execute arbitrary code; with the patches for this issue, pixmap size has been limited to 32767x32767. stable/main/binary-s390/libxmu-dev_4.3.0.dfsg.1-14sarge1_s390.deb stable/main/binary-s390/xserver-common_4.3.0.dfsg.1-14sarge1_s390.deb stable/main/binary-s390/libxpm-dev_4.3.0.dfsg.1-14sarge1_s390.deb stable/main/binary-s390/libxi6-dbg_4.3.0.dfsg.1-14sarge1_s390.deb stable/main/binary-s390/libxaw7_4.3.0.dfsg.1-14sarge1_s390.deb stable/main/binary-s390/libxaw6-dev_4.3.0.dfsg.1-14sarge1_s390.deb stable/main/binary-s390/libxi6_4.3.0.dfsg.1-14sarge1_s390.deb stable/main/binary-s390/proxymngr_4.3.0.dfsg.1-14sarge1_s390.deb stable/main/binary-s390/libice-dev_4.3.0.dfsg.1-14sarge1_s390.deb stable/main/binary-s390/libxtrap-dev_4.3.0.dfsg.1-14sarge1_s390.deb stable/main/binary-s390/libx11-dev_4.3.0.dfsg.1-14sarge1_s390.deb stable/main/binary-s390/libxpm4_4.3.0.dfsg.1-14sarge1_s390.deb stable/main/binary-s390/libxp-dev_4.3.0.dfsg.1-14sarge1_s390.deb stable/main/binary-s390/xutils_4.3.0.dfsg.1-14sarge1_s390.deb stable/main/binary-s390/libxft1-dbg_4.3.0.dfsg.1-14sarge1_s390.deb stable/main/binary-s390/libxext-dev_4.3.0.dfsg.1-14sarge1_s390.deb stable/main/binary-s390/xfwp_4.3.0.dfsg.1-14sarge1_s390.deb stable/main/binary-s390/libxaw6_4.3.0.dfsg.1-14sarge1_s390.deb stable/main/binary-s390/xlibs-static-dev_4.3.0.dfsg.1-14sarge1_s390.deb stable/main/binary-s390/libxp6-dbg_4.3.0.dfsg.1-14sarge1_s390.deb stable/main/binary-s390/xlibmesa-gl-dev_4.3.0.dfsg.1-14sarge1_s390.deb stable/main/binary-s390/xnest_4.3.0.dfsg.1-14sarge1_s390.deb stable/main/binary-s390/libxv1-dbg_4.3.0.dfsg.1-14sarge1_s390.deb stable/main/binary-s390/libxrandr-dev_4.3.0.dfsg.1-14sarge1_s390.deb stable/main/binary-s390/xfs_4.3.0.dfsg.1-14sarge1_s390.deb stable/main/binary-s390/libxft1_4.3.0.dfsg.1-14sarge1_s390.deb stable/main/binary-s390/libice6-dbg_4.3.0.dfsg.1-14sarge1_s390.deb stable/main/binary-s390/xlibmesa-glu-dbg_4.3.0.dfsg.1-14sarge1_s390.deb stable/main/binary-s390/xlibmesa-gl-dbg_4.3.0.dfsg.1-14sarge1_s390.deb stable/main/binary-s390/libxmuu1_4.3.0.dfsg.1-14sarge1_s390.deb stable/main/binary-s390/xlibmesa-gl_4.3.0.dfsg.1-14sarge1_s390.deb stable/main/binary-s390/libxv-dev_4.3.0.dfsg.1-14sarge1_s390.deb stable/main/binary-s390/libsm6_4.3.0.dfsg.1-14sarge1_s390.deb stable/main/binary-s390/libx11-6-dbg_4.3.0.dfsg.1-14sarge1_s390.deb stable/main/binary-s390/libxtst6_4.3.0.dfsg.1-14sarge1_s390.deb stable/main/binary-s390/libsm6-dbg_4.3.0.dfsg.1-14sarge1_s390.deb stable/main/binary-s390/x-window-system-core_4.3.0.dfsg.1-14sarge1_s390.deb stable/main/binary-s390/xlibs-static-pic_4.3.0.dfsg.1-14sarge1_s390.deb stable/main/binary-s390/libxv1_4.3.0.dfsg.1-14sarge1_s390.deb stable/main/binary-s390/xlibmesa-glu-dev_4.3.0.dfsg.1-14sarge1_s390.deb stable/main/binary-s390/xlibmesa3_4.3.0.dfsg.1-14sarge1_s390.deb stable/main/binary-s390/libxmu6_4.3.0.dfsg.1-14sarge1_s390.deb stable/main/binary-s390/libdps1-dbg_4.3.0.dfsg.1-14sarge1_s390.deb stable/main/binary-s390/libxt6_4.3.0.dfsg.1-14sarge1_s390.deb stable/main/binary-s390/libxt6-dbg_4.3.0.dfsg.1-14sarge1_s390.deb stable/main/binary-s390/libxaw7-dbg_4.3.0.dfsg.1-14sarge1_s390.deb stable/main/binary-s390/libxpm4-dbg_4.3.0.dfsg.1-14sarge1_s390.deb stable/main/binary-s390/libxmu6-dbg_4.3.0.dfsg.1-14sarge1_s390.deb stable/main/binary-s390/libxmuu-dev_4.3.0.dfsg.1-14sarge1_s390.deb stable/main/binary-s390/libxtrap6_4.3.0.dfsg.1-14sarge1_s390.deb stable/main/binary-s390/libx11-6_4.3.0.dfsg.1-14sarge1_s390.deb stable/main/binary-s390/twm_4.3.0.dfsg.1-14sarge1_s390.deb stable/main/binary-s390/xbase-clients_4.3.0.dfsg.1-14sarge1_s390.deb stable/main/binary-s390/xmh_4.3.0.dfsg.1-14sarge1_s390.deb stable/main/binary-s390/xterm_4.3.0.dfsg.1-14sarge1_s390.deb stable/main/binary-s390/libxtrap6-dbg_4.3.0.dfsg.1-14sarge1_s390.deb stable/main/binary-s390/libxext6-dbg_4.3.0.dfsg.1-14sarge1_s390.deb stable/main/binary-s390/libxext6_4.3.0.dfsg.1-14sarge1_s390.deb stable/main/binary-s390/libxp6_4.3.0.dfsg.1-14sarge1_s390.deb stable/main/binary-s390/lbxproxy_4.3.0.dfsg.1-14sarge1_s390.deb stable/main/binary-s390/libdps1_4.3.0.dfsg.1-14sarge1_s390.deb stable/main/binary-s390/libxaw7-dev_4.3.0.dfsg.1-14sarge1_s390.deb stable/main/binary-s390/libxt-dev_4.3.0.dfsg.1-14sarge1_s390.deb stable/main/binary-s390/libxrandr2_4.3.0.dfsg.1-14sarge1_s390.deb stable/main/binary-s390/libsm-dev_4.3.0.dfsg.1-14sarge1_s390.deb stable/main/binary-s390/x-window-system-dev_4.3.0.dfsg.1-14sarge1_s390.deb stable/main/binary-s390/xdm_4.3.0.dfsg.1-14sarge1_s390.deb stable/main/binary-s390/xvfb_4.3.0.dfsg.1-14sarge1_s390.deb stable/main/binary-s390/libice6_4.3.0.dfsg.1-14sarge1_s390.deb stable/main/binary-s390/libxi-dev_4.3.0.dfsg.1-14sarge1_s390.deb stable/main/binary-s390/xlibmesa-glu_4.3.0.dfsg.1-14sarge1_s390.deb stable/main/binary-s390/libxtst-dev_4.3.0.dfsg.1-14sarge1_s390.deb stable/main/binary-s390/libxrandr2-dbg_4.3.0.dfsg.1-14sarge1_s390.deb stable/main/binary-s390/libxmuu1-dbg_4.3.0.dfsg.1-14sarge1_s390.deb stable/main/binary-s390/libxaw6-dbg_4.3.0.dfsg.1-14sarge1_s390.deb stable/main/binary-s390/libdps-dev_4.3.0.dfsg.1-14sarge1_s390.deb stable/main/binary-s390/libxtst6-dbg_4.3.0.dfsg.1-14sarge1_s390.deb xfree86 (4.3.0.dfsg.1-14sarge1) stable-security; urgency=high * Security update release. Resolves the following issue: + CAN-2005-2495: overflows when allocating size for large pixmaps may allow attackers to execute arbitrary code; with the patches for this issue, pixmap size has been limited to 32767x32767. stable/main/binary-powerpc/libxpm4_4.3.0.dfsg.1-14sarge1_powerpc.deb stable/main/binary-powerpc/xfs_4.3.0.dfsg.1-14sarge1_powerpc.deb stable/main/binary-powerpc/libxmuu1_4.3.0.dfsg.1-14sarge1_powerpc.deb stable/main/binary-powerpc/libxt-dev_4.3.0.dfsg.1-14sarge1_powerpc.deb stable/main/binary-powerpc/libxtrap-dev_4.3.0.dfsg.1-14sarge1_powerpc.deb stable/main/binary-powerpc/libice-dev_4.3.0.dfsg.1-14sarge1_powerpc.deb stable/main/binary-powerpc/libxi6_4.3.0.dfsg.1-14sarge1_powerpc.deb stable/main/binary-powerpc/xterm_4.3.0.dfsg.1-14sarge1_powerpc.deb stable/main/binary-powerpc/libxft1_4.3.0.dfsg.1-14sarge1_powerpc.deb stable/main/binary-powerpc/libxv1_4.3.0.dfsg.1-14sarge1_powerpc.deb stable/main/binary-powerpc/xlibmesa-glu-dev_4.3.0.dfsg.1-14sarge1_powerpc.deb stable/main/binary-powerpc/libsm-dev_4.3.0.dfsg.1-14sarge1_powerpc.deb stable/main/binary-powerpc/libxi6-dbg_4.3.0.dfsg.1-14sarge1_powerpc.deb stable/main/binary-powerpc/xlibs-static-pic_4.3.0.dfsg.1-14sarge1_powerpc.deb stable/main/binary-powerpc/xutils_4.3.0.dfsg.1-14sarge1_powerpc.deb stable/main/binary-powerpc/xdm_4.3.0.dfsg.1-14sarge1_powerpc.deb stable/main/binary-powerpc/libx11-dev_4.3.0.dfsg.1-14sarge1_powerpc.deb stable/main/binary-powerpc/libxtrap6-dbg_4.3.0.dfsg.1-14sarge1_powerpc.deb stable/main/binary-powerpc/xserver-xfree86_4.3.0.dfsg.1-14sarge1_powerpc.deb stable/main/binary-powerpc/x-window-system-core_4.3.0.dfsg.1-14sarge1_powerpc.deb stable/main/binary-powerpc/xlibosmesa-dev_4.3.0.dfsg.1-14sarge1_powerpc.deb stable/main/binary-powerpc/libice6-dbg_4.3.0.dfsg.1-14sarge1_powerpc.deb stable/main/binary-powerpc/libxv-dev_4.3.0.dfsg.1-14sarge1_powerpc.deb stable/main/binary-powerpc/libxv1-dbg_4.3.0.dfsg.1-14sarge1_powerpc.deb stable/main/binary-powerpc/xlibmesa-gl-dev_4.3.0.dfsg.1-14sarge1_powerpc.deb stable/main/binary-powerpc/libx11-6_4.3.0.dfsg.1-14sarge1_powerpc.deb stable/main/binary-powerpc/libxaw7_4.3.0.dfsg.1-14sarge1_powerpc.deb stable/main/binary-powerpc/libxpm4-dbg_4.3.0.dfsg.1-14sarge1_powerpc.deb stable/main/binary-powerpc/libxaw7-dev_4.3.0.dfsg.1-14sarge1_powerpc.deb stable/main/binary-powerpc/libxaw6_4.3.0.dfsg.1-14sarge1_powerpc.deb stable/main/binary-powerpc/libxt6_4.3.0.dfsg.1-14sarge1_powerpc.deb stable/main/binary-powerpc/x-window-system-dev_4.3.0.dfsg.1-14sarge1_powerpc.deb stable/main/binary-powerpc/xlibs-static-dev_4.3.0.dfsg.1-14sarge1_powerpc.deb stable/main/binary-powerpc/xserver-xfree86-dbg_4.3.0.dfsg.1-14sarge1_powerpc.deb stable/main/binary-powerpc/xlibmesa3_4.3.0.dfsg.1-14sarge1_powerpc.deb stable/main/binary-powerpc/libxaw7-dbg_4.3.0.dfsg.1-14sarge1_powerpc.deb stable/main/binary-powerpc/libx11-6-dbg_4.3.0.dfsg.1-14sarge1_powerpc.deb stable/main/binary-powerpc/xserver-common_4.3.0.dfsg.1-14sarge1_powerpc.deb stable/main/binary-powerpc/xlibmesa-dri_4.3.0.dfsg.1-14sarge1_powerpc.deb stable/main/binary-powerpc/proxymngr_4.3.0.dfsg.1-14sarge1_powerpc.deb stable/main/binary-powerpc/libsm6-dbg_4.3.0.dfsg.1-14sarge1_powerpc.deb stable/main/binary-powerpc/libxtst6-dbg_4.3.0.dfsg.1-14sarge1_powerpc.deb stable/main/binary-powerpc/libxmuu-dev_4.3.0.dfsg.1-14sarge1_powerpc.deb stable/main/binary-powerpc/libxext-dev_4.3.0.dfsg.1-14sarge1_powerpc.deb stable/main/binary-powerpc/libxi-dev_4.3.0.dfsg.1-14sarge1_powerpc.deb stable/main/binary-powerpc/libxmu-dev_4.3.0.dfsg.1-14sarge1_powerpc.deb stable/main/binary-powerpc/libxaw6-dev_4.3.0.dfsg.1-14sarge1_powerpc.deb stable/main/binary-powerpc/libxp6_4.3.0.dfsg.1-14sarge1_powerpc.deb stable/main/binary-powerpc/xlibmesa-gl-dbg_4.3.0.dfsg.1-14sarge1_powerpc.deb stable/main/binary-powerpc/libxt6-dbg_4.3.0.dfsg.1-14sarge1_powerpc.deb stable/main/binary-powerpc/libxext6_4.3.0.dfsg.1-14sarge1_powerpc.deb stable/main/binary-powerpc/libxrandr-dev_4.3.0.dfsg.1-14sarge1_powerpc.deb stable/main/binary-powerpc/libdps1_4.3.0.dfsg.1-14sarge1_powerpc.deb stable/main/binary-powerpc/xbase-clients_4.3.0.dfsg.1-14sarge1_powerpc.deb stable/main/binary-powerpc/libxtst6_4.3.0.dfsg.1-14sarge1_powerpc.deb stable/main/binary-powerpc/xnest_4.3.0.dfsg.1-14sarge1_powerpc.deb stable/main/binary-powerpc/xlibmesa-dri-dbg_4.3.0.dfsg.1-14sarge1_powerpc.deb stable/main/binary-powerpc/libxrandr2-dbg_4.3.0.dfsg.1-14sarge1_powerpc.deb stable/main/binary-powerpc/libxmu6-dbg_4.3.0.dfsg.1-14sarge1_powerpc.deb stable/main/binary-powerpc/xlibmesa-glu-dbg_4.3.0.dfsg.1-14sarge1_powerpc.deb stable/main/binary-powerpc/libxrandr2_4.3.0.dfsg.1-14sarge1_powerpc.deb stable/main/binary-powerpc/libdps-dev_4.3.0.dfsg.1-14sarge1_powerpc.deb stable/main/binary-powerpc/libxft1-dbg_4.3.0.dfsg.1-14sarge1_powerpc.deb stable/main/binary-powerpc/libxtst-dev_4.3.0.dfsg.1-14sarge1_powerpc.deb stable/main/binary-powerpc/xlibmesa-glu_4.3.0.dfsg.1-14sarge1_powerpc.deb stable/main/binary-powerpc/xlibosmesa4_4.3.0.dfsg.1-14sarge1_powerpc.deb stable/main/binary-powerpc/libxmu6_4.3.0.dfsg.1-14sarge1_powerpc.deb stable/main/binary-powerpc/xvfb_4.3.0.dfsg.1-14sarge1_powerpc.deb stable/main/binary-powerpc/libdps1-dbg_4.3.0.dfsg.1-14sarge1_powerpc.deb stable/main/binary-powerpc/xlibosmesa4-dbg_4.3.0.dfsg.1-14sarge1_powerpc.deb stable/main/binary-powerpc/lbxproxy_4.3.0.dfsg.1-14sarge1_powerpc.deb stable/main/binary-powerpc/xlibmesa-gl_4.3.0.dfsg.1-14sarge1_powerpc.deb stable/main/binary-powerpc/twm_4.3.0.dfsg.1-14sarge1_powerpc.deb stable/main/binary-powerpc/libxp6-dbg_4.3.0.dfsg.1-14sarge1_powerpc.deb stable/main/binary-powerpc/libxaw6-dbg_4.3.0.dfsg.1-14sarge1_powerpc.deb stable/main/binary-powerpc/libsm6_4.3.0.dfsg.1-14sarge1_powerpc.deb stable/main/binary-powerpc/libxp-dev_4.3.0.dfsg.1-14sarge1_powerpc.deb stable/main/binary-powerpc/xmh_4.3.0.dfsg.1-14sarge1_powerpc.deb stable/main/binary-powerpc/libxpm-dev_4.3.0.dfsg.1-14sarge1_powerpc.deb stable/main/binary-powerpc/libxmuu1-dbg_4.3.0.dfsg.1-14sarge1_powerpc.deb stable/main/binary-powerpc/libxext6-dbg_4.3.0.dfsg.1-14sarge1_powerpc.deb stable/main/binary-powerpc/libxtrap6_4.3.0.dfsg.1-14sarge1_powerpc.deb stable/main/binary-powerpc/libice6_4.3.0.dfsg.1-14sarge1_powerpc.deb stable/main/binary-powerpc/xfwp_4.3.0.dfsg.1-14sarge1_powerpc.deb xfree86 (4.3.0.dfsg.1-14sarge1) stable-security; urgency=high * Security update release. Resolves the following issue: + CAN-2005-2495: overflows when allocating size for large pixmaps may allow attackers to execute arbitrary code; with the patches for this issue, pixmap size has been limited to 32767x32767. stable/main/binary-mipsel/xbase-clients_4.3.0.dfsg.1-14sarge1_mipsel.deb stable/main/binary-mipsel/libxaw7_4.3.0.dfsg.1-14sarge1_mipsel.deb stable/main/binary-mipsel/libxt6_4.3.0.dfsg.1-14sarge1_mipsel.deb stable/main/binary-mipsel/xlibmesa-gl-dbg_4.3.0.dfsg.1-14sarge1_mipsel.deb stable/main/binary-mipsel/libsm6-dbg_4.3.0.dfsg.1-14sarge1_mipsel.deb stable/main/binary-mipsel/xdm_4.3.0.dfsg.1-14sarge1_mipsel.deb stable/main/binary-mipsel/twm_4.3.0.dfsg.1-14sarge1_mipsel.deb stable/main/binary-mipsel/libxaw6-dev_4.3.0.dfsg.1-14sarge1_mipsel.deb stable/main/binary-mipsel/libxi-dev_4.3.0.dfsg.1-14sarge1_mipsel.deb stable/main/binary-mipsel/libxaw7-dev_4.3.0.dfsg.1-14sarge1_mipsel.deb stable/main/binary-mipsel/libxmu-dev_4.3.0.dfsg.1-14sarge1_mipsel.deb stable/main/binary-mipsel/libxtrap6-dbg_4.3.0.dfsg.1-14sarge1_mipsel.deb stable/main/binary-mipsel/libxext6-dbg_4.3.0.dfsg.1-14sarge1_mipsel.deb stable/main/binary-mipsel/xlibs-static-pic_4.3.0.dfsg.1-14sarge1_mipsel.deb stable/main/binary-mipsel/libxext-dev_4.3.0.dfsg.1-14sarge1_mipsel.deb stable/main/binary-mipsel/xlibs-static-dev_4.3.0.dfsg.1-14sarge1_mipsel.deb stable/main/binary-mipsel/libxt6-dbg_4.3.0.dfsg.1-14sarge1_mipsel.deb stable/main/binary-mipsel/xnest_4.3.0.dfsg.1-14sarge1_mipsel.deb stable/main/binary-mipsel/xserver-xfree86_4.3.0.dfsg.1-14sarge1_mipsel.deb stable/main/binary-mipsel/xfs_4.3.0.dfsg.1-14sarge1_mipsel.deb stable/main/binary-mipsel/libxrandr-dev_4.3.0.dfsg.1-14sarge1_mipsel.deb stable/main/binary-mipsel/libsm6_4.3.0.dfsg.1-14sarge1_mipsel.deb stable/main/binary-mipsel/libxrandr2_4.3.0.dfsg.1-14sarge1_mipsel.deb stable/main/binary-mipsel/libxtst6_4.3.0.dfsg.1-14sarge1_mipsel.deb stable/main/binary-mipsel/xmh_4.3.0.dfsg.1-14sarge1_mipsel.deb stable/main/binary-mipsel/libxaw6-dbg_4.3.0.dfsg.1-14sarge1_mipsel.deb stable/main/binary-mipsel/xvfb_4.3.0.dfsg.1-14sarge1_mipsel.deb stable/main/binary-mipsel/libxv1_4.3.0.dfsg.1-14sarge1_mipsel.deb stable/main/binary-mipsel/xlibmesa-glu-dev_4.3.0.dfsg.1-14sarge1_mipsel.deb stable/main/binary-mipsel/libxtst-dev_4.3.0.dfsg.1-14sarge1_mipsel.deb stable/main/binary-mipsel/xlibmesa-glu_4.3.0.dfsg.1-14sarge1_mipsel.deb stable/main/binary-mipsel/xlibmesa-gl-dev_4.3.0.dfsg.1-14sarge1_mipsel.deb stable/main/binary-mipsel/libxp-dev_4.3.0.dfsg.1-14sarge1_mipsel.deb stable/main/binary-mipsel/libxmuu1_4.3.0.dfsg.1-14sarge1_mipsel.deb stable/main/binary-mipsel/libxmu6-dbg_4.3.0.dfsg.1-14sarge1_mipsel.deb stable/main/binary-mipsel/libxmuu1-dbg_4.3.0.dfsg.1-14sarge1_mipsel.deb stable/main/binary-mipsel/libxv1-dbg_4.3.0.dfsg.1-14sarge1_mipsel.deb stable/main/binary-mipsel/libxtrap-dev_4.3.0.dfsg.1-14sarge1_mipsel.deb stable/main/binary-mipsel/libsm-dev_4.3.0.dfsg.1-14sarge1_mipsel.deb stable/main/binary-mipsel/libx11-6-dbg_4.3.0.dfsg.1-14sarge1_mipsel.deb stable/main/binary-mipsel/xserver-xfree86-dbg_4.3.0.dfsg.1-14sarge1_mipsel.deb stable/main/binary-mipsel/libxpm4_4.3.0.dfsg.1-14sarge1_mipsel.deb stable/main/binary-mipsel/xlibmesa-gl_4.3.0.dfsg.1-14sarge1_mipsel.deb stable/main/binary-mipsel/libice6-dbg_4.3.0.dfsg.1-14sarge1_mipsel.deb stable/main/binary-mipsel/libxt-dev_4.3.0.dfsg.1-14sarge1_mipsel.deb stable/main/binary-mipsel/libxmu6_4.3.0.dfsg.1-14sarge1_mipsel.deb stable/main/binary-mipsel/proxymngr_4.3.0.dfsg.1-14sarge1_mipsel.deb stable/main/binary-mipsel/xlibmesa-glu-dbg_4.3.0.dfsg.1-14sarge1_mipsel.deb stable/main/binary-mipsel/libxv-dev_4.3.0.dfsg.1-14sarge1_mipsel.deb stable/main/binary-mipsel/xlibmesa3_4.3.0.dfsg.1-14sarge1_mipsel.deb stable/main/binary-mipsel/libdps1-dbg_4.3.0.dfsg.1-14sarge1_mipsel.deb stable/main/binary-mipsel/libxext6_4.3.0.dfsg.1-14sarge1_mipsel.deb stable/main/binary-mipsel/xterm_4.3.0.dfsg.1-14sarge1_mipsel.deb stable/main/binary-mipsel/xutils_4.3.0.dfsg.1-14sarge1_mipsel.deb stable/main/binary-mipsel/libxaw7-dbg_4.3.0.dfsg.1-14sarge1_mipsel.deb stable/main/binary-mipsel/libx11-dev_4.3.0.dfsg.1-14sarge1_mipsel.deb stable/main/binary-mipsel/libxrandr2-dbg_4.3.0.dfsg.1-14sarge1_mipsel.deb stable/main/binary-mipsel/xserver-common_4.3.0.dfsg.1-14sarge1_mipsel.deb stable/main/binary-mipsel/libxpm-dev_4.3.0.dfsg.1-14sarge1_mipsel.deb stable/main/binary-mipsel/xfwp_4.3.0.dfsg.1-14sarge1_mipsel.deb stable/main/binary-mipsel/libxft1_4.3.0.dfsg.1-14sarge1_mipsel.deb stable/main/binary-mipsel/libxaw6_4.3.0.dfsg.1-14sarge1_mipsel.deb stable/main/binary-mipsel/libxp6-dbg_4.3.0.dfsg.1-14sarge1_mipsel.deb stable/main/binary-mipsel/libxpm4-dbg_4.3.0.dfsg.1-14sarge1_mipsel.deb stable/main/binary-mipsel/libdps-dev_4.3.0.dfsg.1-14sarge1_mipsel.deb stable/main/binary-mipsel/libice-dev_4.3.0.dfsg.1-14sarge1_mipsel.deb stable/main/binary-mipsel/libxmuu-dev_4.3.0.dfsg.1-14sarge1_mipsel.deb stable/main/binary-mipsel/libxtst6-dbg_4.3.0.dfsg.1-14sarge1_mipsel.deb stable/main/binary-mipsel/x-window-system-dev_4.3.0.dfsg.1-14sarge1_mipsel.deb stable/main/binary-mipsel/libxi6-dbg_4.3.0.dfsg.1-14sarge1_mipsel.deb stable/main/binary-mipsel/libxp6_4.3.0.dfsg.1-14sarge1_mipsel.deb stable/main/binary-mipsel/lbxproxy_4.3.0.dfsg.1-14sarge1_mipsel.deb stable/main/binary-mipsel/libxi6_4.3.0.dfsg.1-14sarge1_mipsel.deb stable/main/binary-mipsel/libxft1-dbg_4.3.0.dfsg.1-14sarge1_mipsel.deb stable/main/binary-mipsel/libx11-6_4.3.0.dfsg.1-14sarge1_mipsel.deb stable/main/binary-mipsel/libxtrap6_4.3.0.dfsg.1-14sarge1_mipsel.deb stable/main/binary-mipsel/libdps1_4.3.0.dfsg.1-14sarge1_mipsel.deb stable/main/binary-mipsel/libice6_4.3.0.dfsg.1-14sarge1_mipsel.deb stable/main/binary-mipsel/x-window-system-core_4.3.0.dfsg.1-14sarge1_mipsel.deb xfree86 (4.3.0.dfsg.1-14sarge1) stable-security; urgency=high * Security update release. Resolves the following issue: + CAN-2005-2495: overflows when allocating size for large pixmaps may allow attackers to execute arbitrary code; with the patches for this issue, pixmap size has been limited to 32767x32767. stable/main/binary-mips/libxft1-dbg_4.3.0.dfsg.1-14sarge1_mips.deb stable/main/binary-mips/libxpm-dev_4.3.0.dfsg.1-14sarge1_mips.deb stable/main/binary-mips/xdm_4.3.0.dfsg.1-14sarge1_mips.deb stable/main/binary-mips/libxaw7_4.3.0.dfsg.1-14sarge1_mips.deb stable/main/binary-mips/lbxproxy_4.3.0.dfsg.1-14sarge1_mips.deb stable/main/binary-mips/xterm_4.3.0.dfsg.1-14sarge1_mips.deb stable/main/binary-mips/xlibmesa-glu_4.3.0.dfsg.1-14sarge1_mips.deb stable/main/binary-mips/libxtst-dev_4.3.0.dfsg.1-14sarge1_mips.deb stable/main/binary-mips/xlibmesa-glu-dev_4.3.0.dfsg.1-14sarge1_mips.deb stable/main/binary-mips/xserver-xfree86-dbg_4.3.0.dfsg.1-14sarge1_mips.deb stable/main/binary-mips/libxaw6-dev_4.3.0.dfsg.1-14sarge1_mips.deb stable/main/binary-mips/xvfb_4.3.0.dfsg.1-14sarge1_mips.deb stable/main/binary-mips/libdps1-dbg_4.3.0.dfsg.1-14sarge1_mips.deb stable/main/binary-mips/libxp6-dbg_4.3.0.dfsg.1-14sarge1_mips.deb stable/main/binary-mips/libdps1_4.3.0.dfsg.1-14sarge1_mips.deb stable/main/binary-mips/libxpm4_4.3.0.dfsg.1-14sarge1_mips.deb stable/main/binary-mips/libxtst6-dbg_4.3.0.dfsg.1-14sarge1_mips.deb stable/main/binary-mips/libxmuu-dev_4.3.0.dfsg.1-14sarge1_mips.deb stable/main/binary-mips/libxtst6_4.3.0.dfsg.1-14sarge1_mips.deb stable/main/binary-mips/xlibmesa-gl-dbg_4.3.0.dfsg.1-14sarge1_mips.deb stable/main/binary-mips/libxrandr2_4.3.0.dfsg.1-14sarge1_mips.deb stable/main/binary-mips/xfs_4.3.0.dfsg.1-14sarge1_mips.deb stable/main/binary-mips/libice6-dbg_4.3.0.dfsg.1-14sarge1_mips.deb stable/main/binary-mips/libx11-6_4.3.0.dfsg.1-14sarge1_mips.deb stable/main/binary-mips/libx11-6-dbg_4.3.0.dfsg.1-14sarge1_mips.deb stable/main/binary-mips/x-window-system-dev_4.3.0.dfsg.1-14sarge1_mips.deb stable/main/binary-mips/libxtrap6-dbg_4.3.0.dfsg.1-14sarge1_mips.deb stable/main/binary-mips/libxext6_4.3.0.dfsg.1-14sarge1_mips.deb stable/main/binary-mips/libsm6-dbg_4.3.0.dfsg.1-14sarge1_mips.deb stable/main/binary-mips/libxv-dev_4.3.0.dfsg.1-14sarge1_mips.deb stable/main/binary-mips/xlibmesa-gl_4.3.0.dfsg.1-14sarge1_mips.deb stable/main/binary-mips/xlibmesa-gl-dev_4.3.0.dfsg.1-14sarge1_mips.deb stable/main/binary-mips/x-window-system-core_4.3.0.dfsg.1-14sarge1_mips.deb stable/main/binary-mips/libxi6-dbg_4.3.0.dfsg.1-14sarge1_mips.deb stable/main/binary-mips/libxmuu1-dbg_4.3.0.dfsg.1-14sarge1_mips.deb stable/main/binary-mips/libxp-dev_4.3.0.dfsg.1-14sarge1_mips.deb stable/main/binary-mips/libsm-dev_4.3.0.dfsg.1-14sarge1_mips.deb stable/main/binary-mips/libxp6_4.3.0.dfsg.1-14sarge1_mips.deb stable/main/binary-mips/libxrandr2-dbg_4.3.0.dfsg.1-14sarge1_mips.deb stable/main/binary-mips/xmh_4.3.0.dfsg.1-14sarge1_mips.deb stable/main/binary-mips/libxi6_4.3.0.dfsg.1-14sarge1_mips.deb stable/main/binary-mips/xserver-common_4.3.0.dfsg.1-14sarge1_mips.deb stable/main/binary-mips/libxext-dev_4.3.0.dfsg.1-14sarge1_mips.deb stable/main/binary-mips/libxext6-dbg_4.3.0.dfsg.1-14sarge1_mips.deb stable/main/binary-mips/libsm6_4.3.0.dfsg.1-14sarge1_mips.deb stable/main/binary-mips/libxv1_4.3.0.dfsg.1-14sarge1_mips.deb stable/main/binary-mips/libxaw6-dbg_4.3.0.dfsg.1-14sarge1_mips.deb stable/main/binary-mips/libxmuu1_4.3.0.dfsg.1-14sarge1_mips.deb stable/main/binary-mips/libxv1-dbg_4.3.0.dfsg.1-14sarge1_mips.deb stable/main/binary-mips/libxt-dev_4.3.0.dfsg.1-14sarge1_mips.deb stable/main/binary-mips/libxaw7-dev_4.3.0.dfsg.1-14sarge1_mips.deb stable/main/binary-mips/xlibmesa3_4.3.0.dfsg.1-14sarge1_mips.deb stable/main/binary-mips/libice-dev_4.3.0.dfsg.1-14sarge1_mips.deb stable/main/binary-mips/libxtrap-dev_4.3.0.dfsg.1-14sarge1_mips.deb stable/main/binary-mips/libice6_4.3.0.dfsg.1-14sarge1_mips.deb stable/main/binary-mips/libxtrap6_4.3.0.dfsg.1-14sarge1_mips.deb stable/main/binary-mips/libxmu6-dbg_4.3.0.dfsg.1-14sarge1_mips.deb stable/main/binary-mips/libxi-dev_4.3.0.dfsg.1-14sarge1_mips.deb stable/main/binary-mips/libxt6-dbg_4.3.0.dfsg.1-14sarge1_mips.deb stable/main/binary-mips/libxaw7-dbg_4.3.0.dfsg.1-14sarge1_mips.deb stable/main/binary-mips/libxmu6_4.3.0.dfsg.1-14sarge1_mips.deb stable/main/binary-mips/libxmu-dev_4.3.0.dfsg.1-14sarge1_mips.deb stable/main/binary-mips/libxft1_4.3.0.dfsg.1-14sarge1_mips.deb stable/main/binary-mips/xserver-xfree86_4.3.0.dfsg.1-14sarge1_mips.deb stable/main/binary-mips/libdps-dev_4.3.0.dfsg.1-14sarge1_mips.deb stable/main/binary-mips/xbase-clients_4.3.0.dfsg.1-14sarge1_mips.deb stable/main/binary-mips/xlibmesa-glu-dbg_4.3.0.dfsg.1-14sarge1_mips.deb stable/main/binary-mips/proxymngr_4.3.0.dfsg.1-14sarge1_mips.deb stable/main/binary-mips/twm_4.3.0.dfsg.1-14sarge1_mips.deb stable/main/binary-mips/xlibs-static-dev_4.3.0.dfsg.1-14sarge1_mips.deb stable/main/binary-mips/libxt6_4.3.0.dfsg.1-14sarge1_mips.deb stable/main/binary-mips/libx11-dev_4.3.0.dfsg.1-14sarge1_mips.deb stable/main/binary-mips/xutils_4.3.0.dfsg.1-14sarge1_mips.deb stable/main/binary-mips/libxpm4-dbg_4.3.0.dfsg.1-14sarge1_mips.deb stable/main/binary-mips/libxrandr-dev_4.3.0.dfsg.1-14sarge1_mips.deb stable/main/binary-mips/libxaw6_4.3.0.dfsg.1-14sarge1_mips.deb stable/main/binary-mips/xnest_4.3.0.dfsg.1-14sarge1_mips.deb stable/main/binary-mips/xlibs-static-pic_4.3.0.dfsg.1-14sarge1_mips.deb stable/main/binary-mips/xfwp_4.3.0.dfsg.1-14sarge1_mips.deb xfree86 (4.3.0.dfsg.1-14sarge1) stable-security; urgency=high * Security update release. Resolves the following issue: + CAN-2005-2495: overflows when allocating size for large pixmaps may allow attackers to execute arbitrary code; with the patches for this issue, pixmap size has been limited to 32767x32767. stable/main/binary-m68k/libxaw7-dbg_4.3.0.dfsg.1-14sarge1_m68k.deb stable/main/binary-m68k/libsm6-dbg_4.3.0.dfsg.1-14sarge1_m68k.deb stable/main/binary-m68k/xbase-clients_4.3.0.dfsg.1-14sarge1_m68k.deb stable/main/binary-m68k/libxtst6_4.3.0.dfsg.1-14sarge1_m68k.deb stable/main/binary-m68k/libxaw6_4.3.0.dfsg.1-14sarge1_m68k.deb stable/main/binary-m68k/libxt6-dbg_4.3.0.dfsg.1-14sarge1_m68k.deb stable/main/binary-m68k/xfwp_4.3.0.dfsg.1-14sarge1_m68k.deb stable/main/binary-m68k/libxi6_4.3.0.dfsg.1-14sarge1_m68k.deb stable/main/binary-m68k/libx11-6-dbg_4.3.0.dfsg.1-14sarge1_m68k.deb stable/main/binary-m68k/libxt6_4.3.0.dfsg.1-14sarge1_m68k.deb stable/main/binary-m68k/xnest_4.3.0.dfsg.1-14sarge1_m68k.deb stable/main/binary-m68k/xlibmesa-glu-dev_4.3.0.dfsg.1-14sarge1_m68k.deb stable/main/binary-m68k/libxmu-dev_4.3.0.dfsg.1-14sarge1_m68k.deb stable/main/binary-m68k/libxp6_4.3.0.dfsg.1-14sarge1_m68k.deb stable/main/binary-m68k/xlibmesa-gl-dev_4.3.0.dfsg.1-14sarge1_m68k.deb stable/main/binary-m68k/libice6-dbg_4.3.0.dfsg.1-14sarge1_m68k.deb stable/main/binary-m68k/libxtrap6-dbg_4.3.0.dfsg.1-14sarge1_m68k.deb stable/main/binary-m68k/libxv-dev_4.3.0.dfsg.1-14sarge1_m68k.deb stable/main/binary-m68k/libxaw7_4.3.0.dfsg.1-14sarge1_m68k.deb stable/main/binary-m68k/libxaw6-dbg_4.3.0.dfsg.1-14sarge1_m68k.deb stable/main/binary-m68k/libxtrap-dev_4.3.0.dfsg.1-14sarge1_m68k.deb stable/main/binary-m68k/libice-dev_4.3.0.dfsg.1-14sarge1_m68k.deb stable/main/binary-m68k/libx11-dev_4.3.0.dfsg.1-14sarge1_m68k.deb stable/main/binary-m68k/libxi6-dbg_4.3.0.dfsg.1-14sarge1_m68k.deb stable/main/binary-m68k/xutils_4.3.0.dfsg.1-14sarge1_m68k.deb stable/main/binary-m68k/libdps1-dbg_4.3.0.dfsg.1-14sarge1_m68k.deb stable/main/binary-m68k/libxft1-dbg_4.3.0.dfsg.1-14sarge1_m68k.deb stable/main/binary-m68k/libxpm4-dbg_4.3.0.dfsg.1-14sarge1_m68k.deb stable/main/binary-m68k/xlibmesa-gl-dbg_4.3.0.dfsg.1-14sarge1_m68k.deb stable/main/binary-m68k/xserver-common_4.3.0.dfsg.1-14sarge1_m68k.deb stable/main/binary-m68k/libxmuu1-dbg_4.3.0.dfsg.1-14sarge1_m68k.deb stable/main/binary-m68k/xlibs-static-pic_4.3.0.dfsg.1-14sarge1_m68k.deb stable/main/binary-m68k/libxv1_4.3.0.dfsg.1-14sarge1_m68k.deb stable/main/binary-m68k/libxrandr2-dbg_4.3.0.dfsg.1-14sarge1_m68k.deb stable/main/binary-m68k/libxmu6-dbg_4.3.0.dfsg.1-14sarge1_m68k.deb stable/main/binary-m68k/libxaw7-dev_4.3.0.dfsg.1-14sarge1_m68k.deb stable/main/binary-m68k/xterm_4.3.0.dfsg.1-14sarge1_m68k.deb stable/main/binary-m68k/libxt-dev_4.3.0.dfsg.1-14sarge1_m68k.deb stable/main/binary-m68k/libxmuu-dev_4.3.0.dfsg.1-14sarge1_m68k.deb stable/main/binary-m68k/libxv1-dbg_4.3.0.dfsg.1-14sarge1_m68k.deb stable/main/binary-m68k/libxrandr2_4.3.0.dfsg.1-14sarge1_m68k.deb stable/main/binary-m68k/xserver-xfree86-dbg_4.3.0.dfsg.1-14sarge1_m68k.deb stable/main/binary-m68k/libxext6_4.3.0.dfsg.1-14sarge1_m68k.deb stable/main/binary-m68k/libdps1_4.3.0.dfsg.1-14sarge1_m68k.deb stable/main/binary-m68k/libxi-dev_4.3.0.dfsg.1-14sarge1_m68k.deb stable/main/binary-m68k/xmh_4.3.0.dfsg.1-14sarge1_m68k.deb stable/main/binary-m68k/x-window-system-dev_4.3.0.dfsg.1-14sarge1_m68k.deb stable/main/binary-m68k/x-window-system-core_4.3.0.dfsg.1-14sarge1_m68k.deb stable/main/binary-m68k/libxtst6-dbg_4.3.0.dfsg.1-14sarge1_m68k.deb stable/main/binary-m68k/xlibmesa3_4.3.0.dfsg.1-14sarge1_m68k.deb stable/main/binary-m68k/xlibmesa-gl_4.3.0.dfsg.1-14sarge1_m68k.deb stable/main/binary-m68k/libxext-dev_4.3.0.dfsg.1-14sarge1_m68k.deb stable/main/binary-m68k/libxmu6_4.3.0.dfsg.1-14sarge1_m68k.deb stable/main/binary-m68k/libsm6_4.3.0.dfsg.1-14sarge1_m68k.deb stable/main/binary-m68k/libsm-dev_4.3.0.dfsg.1-14sarge1_m68k.deb stable/main/binary-m68k/proxymngr_4.3.0.dfsg.1-14sarge1_m68k.deb stable/main/binary-m68k/xdm_4.3.0.dfsg.1-14sarge1_m68k.deb stable/main/binary-m68k/xlibs-static-dev_4.3.0.dfsg.1-14sarge1_m68k.deb stable/main/binary-m68k/libice6_4.3.0.dfsg.1-14sarge1_m68k.deb stable/main/binary-m68k/xserver-xfree86_4.3.0.dfsg.1-14sarge1_m68k.deb stable/main/binary-m68k/libxtrap6_4.3.0.dfsg.1-14sarge1_m68k.deb stable/main/binary-m68k/libxpm-dev_4.3.0.dfsg.1-14sarge1_m68k.deb stable/main/binary-m68k/libxrandr-dev_4.3.0.dfsg.1-14sarge1_m68k.deb stable/main/binary-m68k/xlibmesa-glu-dbg_4.3.0.dfsg.1-14sarge1_m68k.deb stable/main/binary-m68k/libxp6-dbg_4.3.0.dfsg.1-14sarge1_m68k.deb stable/main/binary-m68k/twm_4.3.0.dfsg.1-14sarge1_m68k.deb stable/main/binary-m68k/libxpm4_4.3.0.dfsg.1-14sarge1_m68k.deb stable/main/binary-m68k/libxp-dev_4.3.0.dfsg.1-14sarge1_m68k.deb stable/main/binary-m68k/libdps-dev_4.3.0.dfsg.1-14sarge1_m68k.deb stable/main/binary-m68k/lbxproxy_4.3.0.dfsg.1-14sarge1_m68k.deb stable/main/binary-m68k/libxext6-dbg_4.3.0.dfsg.1-14sarge1_m68k.deb stable/main/binary-m68k/libxft1_4.3.0.dfsg.1-14sarge1_m68k.deb stable/main/binary-m68k/xfs_4.3.0.dfsg.1-14sarge1_m68k.deb stable/main/binary-m68k/libxaw6-dev_4.3.0.dfsg.1-14sarge1_m68k.deb stable/main/binary-m68k/libx11-6_4.3.0.dfsg.1-14sarge1_m68k.deb stable/main/binary-m68k/libxmuu1_4.3.0.dfsg.1-14sarge1_m68k.deb stable/main/binary-m68k/libxtst-dev_4.3.0.dfsg.1-14sarge1_m68k.deb stable/main/binary-m68k/xlibmesa-glu_4.3.0.dfsg.1-14sarge1_m68k.deb stable/main/binary-m68k/xvfb_4.3.0.dfsg.1-14sarge1_m68k.deb xfree86 (4.3.0.dfsg.1-14sarge1) stable-security; urgency=high * Security update release. Resolves the following issue: + CAN-2005-2495: overflows when allocating size for large pixmaps may allow attackers to execute arbitrary code; with the patches for this issue, pixmap size has been limited to 32767x32767. stable/main/binary-ia64/libxmu-dev_4.3.0.dfsg.1-14sarge1_ia64.deb stable/main/binary-ia64/lbxproxy_4.3.0.dfsg.1-14sarge1_ia64.deb stable/main/binary-ia64/libxpm-dev_4.3.0.dfsg.1-14sarge1_ia64.deb stable/main/binary-ia64/xlibmesa-dri_4.3.0.dfsg.1-14sarge1_ia64.deb stable/main/binary-ia64/libxaw7-dbg_4.3.0.dfsg.1-14sarge1_ia64.deb stable/main/binary-ia64/libxmu6-dbg_4.3.0.dfsg.1-14sarge1_ia64.deb stable/main/binary-ia64/libxpm4_4.3.0.dfsg.1-14sarge1_ia64.deb stable/main/binary-ia64/libsm-dev_4.3.0.dfsg.1-14sarge1_ia64.deb stable/main/binary-ia64/twm_4.3.0.dfsg.1-14sarge1_ia64.deb stable/main/binary-ia64/xbase-clients_4.3.0.dfsg.1-14sarge1_ia64.deb stable/main/binary-ia64/libxmuu1_4.3.0.dfsg.1-14sarge1_ia64.deb stable/main/binary-ia64/libxrandr2_4.3.0.dfsg.1-14sarge1_ia64.deb stable/main/binary-ia64/libxp6_4.3.0.dfsg.1-14sarge1_ia64.deb stable/main/binary-ia64/libxt6-dbg_4.3.0.dfsg.1-14sarge1_ia64.deb stable/main/binary-ia64/libxi-dev_4.3.0.dfsg.1-14sarge1_ia64.deb stable/main/binary-ia64/libdps-dev_4.3.0.dfsg.1-14sarge1_ia64.deb stable/main/binary-ia64/libxrandr2-dbg_4.3.0.dfsg.1-14sarge1_ia64.deb stable/main/binary-ia64/xserver-xfree86_4.3.0.dfsg.1-14sarge1_ia64.deb stable/main/binary-ia64/libxt6_4.3.0.dfsg.1-14sarge1_ia64.deb stable/main/binary-ia64/libxaw6-dev_4.3.0.dfsg.1-14sarge1_ia64.deb stable/main/binary-ia64/xlibmesa3_4.3.0.dfsg.1-14sarge1_ia64.deb stable/main/binary-ia64/libxft1-dbg_4.3.0.dfsg.1-14sarge1_ia64.deb stable/main/binary-ia64/xfs_4.3.0.dfsg.1-14sarge1_ia64.deb stable/main/binary-ia64/proxymngr_4.3.0.dfsg.1-14sarge1_ia64.deb stable/main/binary-ia64/libxv1_4.3.0.dfsg.1-14sarge1_ia64.deb stable/main/binary-ia64/xlibmesa-glu-dev_4.3.0.dfsg.1-14sarge1_ia64.deb stable/main/binary-ia64/libsm6-dbg_4.3.0.dfsg.1-14sarge1_ia64.deb stable/main/binary-ia64/libxv-dev_4.3.0.dfsg.1-14sarge1_ia64.deb stable/main/binary-ia64/libxtrap6-dbg_4.3.0.dfsg.1-14sarge1_ia64.deb stable/main/binary-ia64/libice6-dbg_4.3.0.dfsg.1-14sarge1_ia64.deb stable/main/binary-ia64/libdps1-dbg_4.3.0.dfsg.1-14sarge1_ia64.deb stable/main/binary-ia64/xlibs-static-dev_4.3.0.dfsg.1-14sarge1_ia64.deb stable/main/binary-ia64/libxrandr-dev_4.3.0.dfsg.1-14sarge1_ia64.deb stable/main/binary-ia64/libxext-dev_4.3.0.dfsg.1-14sarge1_ia64.deb stable/main/binary-ia64/libice6_4.3.0.dfsg.1-14sarge1_ia64.deb stable/main/binary-ia64/libxaw6_4.3.0.dfsg.1-14sarge1_ia64.deb stable/main/binary-ia64/libice-dev_4.3.0.dfsg.1-14sarge1_ia64.deb stable/main/binary-ia64/xnest_4.3.0.dfsg.1-14sarge1_ia64.deb stable/main/binary-ia64/libxtrap-dev_4.3.0.dfsg.1-14sarge1_ia64.deb stable/main/binary-ia64/libxext6-dbg_4.3.0.dfsg.1-14sarge1_ia64.deb stable/main/binary-ia64/libxaw6-dbg_4.3.0.dfsg.1-14sarge1_ia64.deb stable/main/binary-ia64/xserver-common_4.3.0.dfsg.1-14sarge1_ia64.deb stable/main/binary-ia64/libxt-dev_4.3.0.dfsg.1-14sarge1_ia64.deb stable/main/binary-ia64/libxv1-dbg_4.3.0.dfsg.1-14sarge1_ia64.deb stable/main/binary-ia64/libxft1_4.3.0.dfsg.1-14sarge1_ia64.deb stable/main/binary-ia64/libxp-dev_4.3.0.dfsg.1-14sarge1_ia64.deb stable/main/binary-ia64/libxtst-dev_4.3.0.dfsg.1-14sarge1_ia64.deb stable/main/binary-ia64/xlibmesa-glu_4.3.0.dfsg.1-14sarge1_ia64.deb stable/main/binary-ia64/libsm6_4.3.0.dfsg.1-14sarge1_ia64.deb stable/main/binary-ia64/xvfb_4.3.0.dfsg.1-14sarge1_ia64.deb stable/main/binary-ia64/xmh_4.3.0.dfsg.1-14sarge1_ia64.deb stable/main/binary-ia64/xserver-xfree86-dbg_4.3.0.dfsg.1-14sarge1_ia64.deb stable/main/binary-ia64/xdm_4.3.0.dfsg.1-14sarge1_ia64.deb stable/main/binary-ia64/xlibmesa-glu-dbg_4.3.0.dfsg.1-14sarge1_ia64.deb stable/main/binary-ia64/libx11-dev_4.3.0.dfsg.1-14sarge1_ia64.deb stable/main/binary-ia64/xutils_4.3.0.dfsg.1-14sarge1_ia64.deb stable/main/binary-ia64/libx11-6-dbg_4.3.0.dfsg.1-14sarge1_ia64.deb stable/main/binary-ia64/libxmuu-dev_4.3.0.dfsg.1-14sarge1_ia64.deb stable/main/binary-ia64/libxtst6-dbg_4.3.0.dfsg.1-14sarge1_ia64.deb stable/main/binary-ia64/xlibosmesa-dev_4.3.0.dfsg.1-14sarge1_ia64.deb stable/main/binary-ia64/libxext6_4.3.0.dfsg.1-14sarge1_ia64.deb stable/main/binary-ia64/x-window-system-core_4.3.0.dfsg.1-14sarge1_ia64.deb stable/main/binary-ia64/xlibs-static-pic_4.3.0.dfsg.1-14sarge1_ia64.deb stable/main/binary-ia64/xlibmesa-dri-dbg_4.3.0.dfsg.1-14sarge1_ia64.deb stable/main/binary-ia64/libxtrap6_4.3.0.dfsg.1-14sarge1_ia64.deb stable/main/binary-ia64/libxi6_4.3.0.dfsg.1-14sarge1_ia64.deb stable/main/binary-ia64/libxp6-dbg_4.3.0.dfsg.1-14sarge1_ia64.deb stable/main/binary-ia64/libxaw7_4.3.0.dfsg.1-14sarge1_ia64.deb stable/main/binary-ia64/libdps1_4.3.0.dfsg.1-14sarge1_ia64.deb stable/main/binary-ia64/libxi6-dbg_4.3.0.dfsg.1-14sarge1_ia64.deb stable/main/binary-ia64/xlibosmesa4_4.3.0.dfsg.1-14sarge1_ia64.deb stable/main/binary-ia64/libxtst6_4.3.0.dfsg.1-14sarge1_ia64.deb stable/main/binary-ia64/xlibmesa-gl-dev_4.3.0.dfsg.1-14sarge1_ia64.deb stable/main/binary-ia64/xlibosmesa4-dbg_4.3.0.dfsg.1-14sarge1_ia64.deb stable/main/binary-ia64/libxpm4-dbg_4.3.0.dfsg.1-14sarge1_ia64.deb stable/main/binary-ia64/xlibmesa-gl_4.3.0.dfsg.1-14sarge1_ia64.deb stable/main/binary-ia64/libxmuu1-dbg_4.3.0.dfsg.1-14sarge1_ia64.deb stable/main/binary-ia64/libxmu6_4.3.0.dfsg.1-14sarge1_ia64.deb stable/main/binary-ia64/libxaw7-dev_4.3.0.dfsg.1-14sarge1_ia64.deb stable/main/binary-ia64/xfwp_4.3.0.dfsg.1-14sarge1_ia64.deb stable/main/binary-ia64/xterm_4.3.0.dfsg.1-14sarge1_ia64.deb stable/main/binary-ia64/libx11-6_4.3.0.dfsg.1-14sarge1_ia64.deb stable/main/binary-ia64/xlibmesa-gl-dbg_4.3.0.dfsg.1-14sarge1_ia64.deb stable/main/binary-ia64/x-window-system-dev_4.3.0.dfsg.1-14sarge1_ia64.deb xfree86 (4.3.0.dfsg.1-14sarge1) stable-security; urgency=high * Security update release. Resolves the following issue: + CAN-2005-2495: overflows when allocating size for large pixmaps may allow attackers to execute arbitrary code; with the patches for this issue, pixmap size has been limited to 32767x32767. stable/main/binary-hppa/libice6-dbg_4.3.0.dfsg.1-14sarge1_hppa.deb stable/main/binary-hppa/xlibs-static-pic_4.3.0.dfsg.1-14sarge1_hppa.deb stable/main/binary-hppa/libxmuu1-dbg_4.3.0.dfsg.1-14sarge1_hppa.deb stable/main/binary-hppa/xmh_4.3.0.dfsg.1-14sarge1_hppa.deb stable/main/binary-hppa/xserver-xfree86-dbg_4.3.0.dfsg.1-14sarge1_hppa.deb stable/main/binary-hppa/libxext6_4.3.0.dfsg.1-14sarge1_hppa.deb stable/main/binary-hppa/xlibmesa3_4.3.0.dfsg.1-14sarge1_hppa.deb stable/main/binary-hppa/libsm6-dbg_4.3.0.dfsg.1-14sarge1_hppa.deb stable/main/binary-hppa/xlibmesa-glu-dev_4.3.0.dfsg.1-14sarge1_hppa.deb stable/main/binary-hppa/libxtrap6-dbg_4.3.0.dfsg.1-14sarge1_hppa.deb stable/main/binary-hppa/xfs_4.3.0.dfsg.1-14sarge1_hppa.deb stable/main/binary-hppa/libxmu-dev_4.3.0.dfsg.1-14sarge1_hppa.deb stable/main/binary-hppa/libxv1-dbg_4.3.0.dfsg.1-14sarge1_hppa.deb stable/main/binary-hppa/libxp-dev_4.3.0.dfsg.1-14sarge1_hppa.deb stable/main/binary-hppa/libsm6_4.3.0.dfsg.1-14sarge1_hppa.deb stable/main/binary-hppa/libxaw7-dev_4.3.0.dfsg.1-14sarge1_hppa.deb stable/main/binary-hppa/xutils_4.3.0.dfsg.1-14sarge1_hppa.deb stable/main/binary-hppa/libxft1_4.3.0.dfsg.1-14sarge1_hppa.deb stable/main/binary-hppa/x-window-system-core_4.3.0.dfsg.1-14sarge1_hppa.deb stable/main/binary-hppa/libx11-dev_4.3.0.dfsg.1-14sarge1_hppa.deb stable/main/binary-hppa/libxi-dev_4.3.0.dfsg.1-14sarge1_hppa.deb stable/main/binary-hppa/xterm_4.3.0.dfsg.1-14sarge1_hppa.deb stable/main/binary-hppa/proxymngr_4.3.0.dfsg.1-14sarge1_hppa.deb stable/main/binary-hppa/xlibmesa-gl_4.3.0.dfsg.1-14sarge1_hppa.deb stable/main/binary-hppa/libxmu6_4.3.0.dfsg.1-14sarge1_hppa.deb stable/main/binary-hppa/libxaw7-dbg_4.3.0.dfsg.1-14sarge1_hppa.deb stable/main/binary-hppa/libxv-dev_4.3.0.dfsg.1-14sarge1_hppa.deb stable/main/binary-hppa/libxrandr-dev_4.3.0.dfsg.1-14sarge1_hppa.deb stable/main/binary-hppa/xnest_4.3.0.dfsg.1-14sarge1_hppa.deb stable/main/binary-hppa/libxrandr2_4.3.0.dfsg.1-14sarge1_hppa.deb stable/main/binary-hppa/libxtst-dev_4.3.0.dfsg.1-14sarge1_hppa.deb stable/main/binary-hppa/libxrandr2-dbg_4.3.0.dfsg.1-14sarge1_hppa.deb stable/main/binary-hppa/libxext6-dbg_4.3.0.dfsg.1-14sarge1_hppa.deb stable/main/binary-hppa/libxtst6_4.3.0.dfsg.1-14sarge1_hppa.deb stable/main/binary-hppa/libdps1-dbg_4.3.0.dfsg.1-14sarge1_hppa.deb stable/main/binary-hppa/libxaw7_4.3.0.dfsg.1-14sarge1_hppa.deb stable/main/binary-hppa/xserver-common_4.3.0.dfsg.1-14sarge1_hppa.deb stable/main/binary-hppa/libxaw6_4.3.0.dfsg.1-14sarge1_hppa.deb stable/main/binary-hppa/xlibmesa-glu_4.3.0.dfsg.1-14sarge1_hppa.deb stable/main/binary-hppa/xserver-xfree86_4.3.0.dfsg.1-14sarge1_hppa.deb stable/main/binary-hppa/x-window-system-dev_4.3.0.dfsg.1-14sarge1_hppa.deb stable/main/binary-hppa/xfwp_4.3.0.dfsg.1-14sarge1_hppa.deb stable/main/binary-hppa/xvfb_4.3.0.dfsg.1-14sarge1_hppa.deb stable/main/binary-hppa/libxft1-dbg_4.3.0.dfsg.1-14sarge1_hppa.deb stable/main/binary-hppa/libxaw6-dev_4.3.0.dfsg.1-14sarge1_hppa.deb stable/main/binary-hppa/libxpm-dev_4.3.0.dfsg.1-14sarge1_hppa.deb stable/main/binary-hppa/libxt-dev_4.3.0.dfsg.1-14sarge1_hppa.deb stable/main/binary-hppa/libxmuu1_4.3.0.dfsg.1-14sarge1_hppa.deb stable/main/binary-hppa/libxv1_4.3.0.dfsg.1-14sarge1_hppa.deb stable/main/binary-hppa/libxmu6-dbg_4.3.0.dfsg.1-14sarge1_hppa.deb stable/main/binary-hppa/libxt6_4.3.0.dfsg.1-14sarge1_hppa.deb stable/main/binary-hppa/libdps1_4.3.0.dfsg.1-14sarge1_hppa.deb stable/main/binary-hppa/lbxproxy_4.3.0.dfsg.1-14sarge1_hppa.deb stable/main/binary-hppa/libdps-dev_4.3.0.dfsg.1-14sarge1_hppa.deb stable/main/binary-hppa/libxmuu-dev_4.3.0.dfsg.1-14sarge1_hppa.deb stable/main/binary-hppa/libxtrap6_4.3.0.dfsg.1-14sarge1_hppa.deb stable/main/binary-hppa/libice-dev_4.3.0.dfsg.1-14sarge1_hppa.deb stable/main/binary-hppa/libxtst6-dbg_4.3.0.dfsg.1-14sarge1_hppa.deb stable/main/binary-hppa/libice6_4.3.0.dfsg.1-14sarge1_hppa.deb stable/main/binary-hppa/libx11-6-dbg_4.3.0.dfsg.1-14sarge1_hppa.deb stable/main/binary-hppa/libxtrap-dev_4.3.0.dfsg.1-14sarge1_hppa.deb stable/main/binary-hppa/libxi6-dbg_4.3.0.dfsg.1-14sarge1_hppa.deb stable/main/binary-hppa/libxt6-dbg_4.3.0.dfsg.1-14sarge1_hppa.deb stable/main/binary-hppa/libx11-6_4.3.0.dfsg.1-14sarge1_hppa.deb stable/main/binary-hppa/libsm-dev_4.3.0.dfsg.1-14sarge1_hppa.deb stable/main/binary-hppa/libxp6_4.3.0.dfsg.1-14sarge1_hppa.deb stable/main/binary-hppa/libxext-dev_4.3.0.dfsg.1-14sarge1_hppa.deb stable/main/binary-hppa/libxaw6-dbg_4.3.0.dfsg.1-14sarge1_hppa.deb stable/main/binary-hppa/xlibmesa-gl-dbg_4.3.0.dfsg.1-14sarge1_hppa.deb stable/main/binary-hppa/libxpm4-dbg_4.3.0.dfsg.1-14sarge1_hppa.deb stable/main/binary-hppa/xlibmesa-gl-dev_4.3.0.dfsg.1-14sarge1_hppa.deb stable/main/binary-hppa/twm_4.3.0.dfsg.1-14sarge1_hppa.deb stable/main/binary-hppa/xbase-clients_4.3.0.dfsg.1-14sarge1_hppa.deb stable/main/binary-hppa/xlibmesa-glu-dbg_4.3.0.dfsg.1-14sarge1_hppa.deb stable/main/binary-hppa/libxp6-dbg_4.3.0.dfsg.1-14sarge1_hppa.deb stable/main/binary-hppa/libxi6_4.3.0.dfsg.1-14sarge1_hppa.deb stable/main/binary-hppa/xlibs-static-dev_4.3.0.dfsg.1-14sarge1_hppa.deb stable/main/binary-hppa/xdm_4.3.0.dfsg.1-14sarge1_hppa.deb stable/main/binary-hppa/libxpm4_4.3.0.dfsg.1-14sarge1_hppa.deb xfree86 (4.3.0.dfsg.1-14sarge1) stable-security; urgency=high * Security update release. Resolves the following issue: + CAN-2005-2495: overflows when allocating size for large pixmaps may allow attackers to execute arbitrary code; with the patches for this issue, pixmap size has been limited to 32767x32767. stable/main/binary-arm/libxpm-dev_4.3.0.dfsg.1-14sarge1_arm.deb stable/main/binary-arm/xfs_4.3.0.dfsg.1-14sarge1_arm.deb stable/main/binary-arm/libxmuu1_4.3.0.dfsg.1-14sarge1_arm.deb stable/main/binary-arm/xlibmesa3_4.3.0.dfsg.1-14sarge1_arm.deb stable/main/binary-arm/libxrandr2_4.3.0.dfsg.1-14sarge1_arm.deb stable/main/binary-arm/libxi-dev_4.3.0.dfsg.1-14sarge1_arm.deb stable/main/binary-arm/libxt6_4.3.0.dfsg.1-14sarge1_arm.deb stable/main/binary-arm/xutils_4.3.0.dfsg.1-14sarge1_arm.deb stable/main/binary-arm/libx11-dev_4.3.0.dfsg.1-14sarge1_arm.deb stable/main/binary-arm/libxp-dev_4.3.0.dfsg.1-14sarge1_arm.deb stable/main/binary-arm/libsm6_4.3.0.dfsg.1-14sarge1_arm.deb stable/main/binary-arm/libdps1_4.3.0.dfsg.1-14sarge1_arm.deb stable/main/binary-arm/libxext6-dbg_4.3.0.dfsg.1-14sarge1_arm.deb stable/main/binary-arm/xlibmesa-glu-dev_4.3.0.dfsg.1-14sarge1_arm.deb stable/main/binary-arm/xlibmesa-gl_4.3.0.dfsg.1-14sarge1_arm.deb stable/main/binary-arm/libsm6-dbg_4.3.0.dfsg.1-14sarge1_arm.deb stable/main/binary-arm/x-window-system-dev_4.3.0.dfsg.1-14sarge1_arm.deb stable/main/binary-arm/xserver-common_4.3.0.dfsg.1-14sarge1_arm.deb stable/main/binary-arm/libxmu6_4.3.0.dfsg.1-14sarge1_arm.deb stable/main/binary-arm/libdps-dev_4.3.0.dfsg.1-14sarge1_arm.deb stable/main/binary-arm/libxrandr-dev_4.3.0.dfsg.1-14sarge1_arm.deb stable/main/binary-arm/libxrandr2-dbg_4.3.0.dfsg.1-14sarge1_arm.deb stable/main/binary-arm/xlibmesa-gl-dev_4.3.0.dfsg.1-14sarge1_arm.deb stable/main/binary-arm/xnest_4.3.0.dfsg.1-14sarge1_arm.deb stable/main/binary-arm/xmh_4.3.0.dfsg.1-14sarge1_arm.deb stable/main/binary-arm/xterm_4.3.0.dfsg.1-14sarge1_arm.deb stable/main/binary-arm/libice6_4.3.0.dfsg.1-14sarge1_arm.deb stable/main/binary-arm/libxaw6-dev_4.3.0.dfsg.1-14sarge1_arm.deb stable/main/binary-arm/xserver-xfree86_4.3.0.dfsg.1-14sarge1_arm.deb stable/main/binary-arm/libxtst-dev_4.3.0.dfsg.1-14sarge1_arm.deb stable/main/binary-arm/lbxproxy_4.3.0.dfsg.1-14sarge1_arm.deb stable/main/binary-arm/libice6-dbg_4.3.0.dfsg.1-14sarge1_arm.deb stable/main/binary-arm/libxi6_4.3.0.dfsg.1-14sarge1_arm.deb stable/main/binary-arm/libxaw7-dev_4.3.0.dfsg.1-14sarge1_arm.deb stable/main/binary-arm/libxpm4-dbg_4.3.0.dfsg.1-14sarge1_arm.deb stable/main/binary-arm/libxtrap6-dbg_4.3.0.dfsg.1-14sarge1_arm.deb stable/main/binary-arm/libxmu6-dbg_4.3.0.dfsg.1-14sarge1_arm.deb stable/main/binary-arm/libxtrap6_4.3.0.dfsg.1-14sarge1_arm.deb stable/main/binary-arm/xdm_4.3.0.dfsg.1-14sarge1_arm.deb stable/main/binary-arm/libx11-6-dbg_4.3.0.dfsg.1-14sarge1_arm.deb stable/main/binary-arm/libxt-dev_4.3.0.dfsg.1-14sarge1_arm.deb stable/main/binary-arm/libxmuu-dev_4.3.0.dfsg.1-14sarge1_arm.deb stable/main/binary-arm/libxtst6-dbg_4.3.0.dfsg.1-14sarge1_arm.deb stable/main/binary-arm/libxaw7-dbg_4.3.0.dfsg.1-14sarge1_arm.deb stable/main/binary-arm/libxp6_4.3.0.dfsg.1-14sarge1_arm.deb stable/main/binary-arm/libsm-dev_4.3.0.dfsg.1-14sarge1_arm.deb stable/main/binary-arm/libxv1_4.3.0.dfsg.1-14sarge1_arm.deb stable/main/binary-arm/libxft1_4.3.0.dfsg.1-14sarge1_arm.deb stable/main/binary-arm/xlibmesa-glu-dbg_4.3.0.dfsg.1-14sarge1_arm.deb stable/main/binary-arm/xserver-xfree86-dbg_4.3.0.dfsg.1-14sarge1_arm.deb stable/main/binary-arm/proxymngr_4.3.0.dfsg.1-14sarge1_arm.deb stable/main/binary-arm/libxp6-dbg_4.3.0.dfsg.1-14sarge1_arm.deb stable/main/binary-arm/libx11-6_4.3.0.dfsg.1-14sarge1_arm.deb stable/main/binary-arm/xlibmesa-gl-dbg_4.3.0.dfsg.1-14sarge1_arm.deb stable/main/binary-arm/libxv-dev_4.3.0.dfsg.1-14sarge1_arm.deb stable/main/binary-arm/libxmuu1-dbg_4.3.0.dfsg.1-14sarge1_arm.deb stable/main/binary-arm/libxpm4_4.3.0.dfsg.1-14sarge1_arm.deb stable/main/binary-arm/xlibs-static-dev_4.3.0.dfsg.1-14sarge1_arm.deb stable/main/binary-arm/libice-dev_4.3.0.dfsg.1-14sarge1_arm.deb stable/main/binary-arm/libxtrap-dev_4.3.0.dfsg.1-14sarge1_arm.deb stable/main/binary-arm/xlibs-static-pic_4.3.0.dfsg.1-14sarge1_arm.deb stable/main/binary-arm/libxt6-dbg_4.3.0.dfsg.1-14sarge1_arm.deb stable/main/binary-arm/xfwp_4.3.0.dfsg.1-14sarge1_arm.deb stable/main/binary-arm/libxtst6_4.3.0.dfsg.1-14sarge1_arm.deb stable/main/binary-arm/libxft1-dbg_4.3.0.dfsg.1-14sarge1_arm.deb stable/main/binary-arm/libxaw6_4.3.0.dfsg.1-14sarge1_arm.deb stable/main/binary-arm/libxaw7_4.3.0.dfsg.1-14sarge1_arm.deb stable/main/binary-arm/libxext6_4.3.0.dfsg.1-14sarge1_arm.deb stable/main/binary-arm/libxext-dev_4.3.0.dfsg.1-14sarge1_arm.deb stable/main/binary-arm/libxaw6-dbg_4.3.0.dfsg.1-14sarge1_arm.deb stable/main/binary-arm/libdps1-dbg_4.3.0.dfsg.1-14sarge1_arm.deb stable/main/binary-arm/xlibmesa-glu_4.3.0.dfsg.1-14sarge1_arm.deb stable/main/binary-arm/xbase-clients_4.3.0.dfsg.1-14sarge1_arm.deb stable/main/binary-arm/libxi6-dbg_4.3.0.dfsg.1-14sarge1_arm.deb stable/main/binary-arm/libxmu-dev_4.3.0.dfsg.1-14sarge1_arm.deb stable/main/binary-arm/xvfb_4.3.0.dfsg.1-14sarge1_arm.deb stable/main/binary-arm/twm_4.3.0.dfsg.1-14sarge1_arm.deb stable/main/binary-arm/libxv1-dbg_4.3.0.dfsg.1-14sarge1_arm.deb stable/main/binary-arm/x-window-system-core_4.3.0.dfsg.1-14sarge1_arm.deb xfree86 (4.3.0.dfsg.1-14sarge1) stable-security; urgency=high * Security update release. Resolves the following issue: + CAN-2005-2495: overflows when allocating size for large pixmaps may allow attackers to execute arbitrary code; with the patches for this issue, pixmap size has been limited to 32767x32767. stable/main/binary-alpha/libxv1-dbg_4.3.0.dfsg.1-14sarge1_alpha.deb stable/main/binary-alpha/libsm6_4.3.0.dfsg.1-14sarge1_alpha.deb stable/main/binary-alpha/libxrandr2-dbg_4.3.0.dfsg.1-14sarge1_alpha.deb stable/main/binary-alpha/libdps1_4.3.0.dfsg.1-14sarge1_alpha.deb stable/main/binary-alpha/xlibmesa-dri-dbg_4.3.0.dfsg.1-14sarge1_alpha.deb stable/main/binary-alpha/xlibosmesa4-dbg_4.3.0.dfsg.1-14sarge1_alpha.deb stable/main/binary-alpha/libxaw7_4.3.0.dfsg.1-14sarge1_alpha.deb stable/main/binary-alpha/xlibmesa-dri_4.3.0.dfsg.1-14sarge1_alpha.deb stable/main/binary-alpha/libxrandr2_4.3.0.dfsg.1-14sarge1_alpha.deb stable/main/binary-alpha/libxi-dev_4.3.0.dfsg.1-14sarge1_alpha.deb stable/main/binary-alpha/libxpm4-dbg_4.3.0.dfsg.1-14sarge1_alpha.deb stable/main/binary-alpha/x-window-system-core_4.3.0.dfsg.1-14sarge1_alpha.deb stable/main/binary-alpha/libxtrap6-dbg_4.3.0.dfsg.1-14sarge1_alpha.deb stable/main/binary-alpha/xfwp_4.3.0.dfsg.1-14sarge1_alpha.deb stable/main/binary-alpha/libxaw6_4.3.0.dfsg.1-14sarge1_alpha.deb stable/main/binary-alpha/libxaw6-dbg_4.3.0.dfsg.1-14sarge1_alpha.deb stable/main/binary-alpha/libxi6_4.3.0.dfsg.1-14sarge1_alpha.deb stable/main/binary-alpha/xlibosmesa-dev_4.3.0.dfsg.1-14sarge1_alpha.deb stable/main/binary-alpha/libxp-dev_4.3.0.dfsg.1-14sarge1_alpha.deb stable/main/binary-alpha/libice6_4.3.0.dfsg.1-14sarge1_alpha.deb stable/main/binary-alpha/xmh_4.3.0.dfsg.1-14sarge1_alpha.deb stable/main/binary-alpha/xlibmesa-gl-dev_4.3.0.dfsg.1-14sarge1_alpha.deb stable/main/binary-alpha/libxmu6_4.3.0.dfsg.1-14sarge1_alpha.deb stable/main/binary-alpha/libxtrap6_4.3.0.dfsg.1-14sarge1_alpha.deb stable/main/binary-alpha/xserver-xfree86-dbg_4.3.0.dfsg.1-14sarge1_alpha.deb stable/main/binary-alpha/libxi6-dbg_4.3.0.dfsg.1-14sarge1_alpha.deb stable/main/binary-alpha/xserver-common_4.3.0.dfsg.1-14sarge1_alpha.deb stable/main/binary-alpha/libxext6_4.3.0.dfsg.1-14sarge1_alpha.deb stable/main/binary-alpha/libx11-6-dbg_4.3.0.dfsg.1-14sarge1_alpha.deb stable/main/binary-alpha/proxymngr_4.3.0.dfsg.1-14sarge1_alpha.deb stable/main/binary-alpha/xlibmesa-glu-dbg_4.3.0.dfsg.1-14sarge1_alpha.deb stable/main/binary-alpha/libxmuu-dev_4.3.0.dfsg.1-14sarge1_alpha.deb stable/main/binary-alpha/xbase-clients_4.3.0.dfsg.1-14sarge1_alpha.deb stable/main/binary-alpha/libxtst6-dbg_4.3.0.dfsg.1-14sarge1_alpha.deb stable/main/binary-alpha/libsm-dev_4.3.0.dfsg.1-14sarge1_alpha.deb stable/main/binary-alpha/xterm_4.3.0.dfsg.1-14sarge1_alpha.deb stable/main/binary-alpha/twm_4.3.0.dfsg.1-14sarge1_alpha.deb stable/main/binary-alpha/xnest_4.3.0.dfsg.1-14sarge1_alpha.deb stable/main/binary-alpha/lbxproxy_4.3.0.dfsg.1-14sarge1_alpha.deb stable/main/binary-alpha/libxaw7-dev_4.3.0.dfsg.1-14sarge1_alpha.deb stable/main/binary-alpha/libxrandr-dev_4.3.0.dfsg.1-14sarge1_alpha.deb stable/main/binary-alpha/libsm6-dbg_4.3.0.dfsg.1-14sarge1_alpha.deb stable/main/binary-alpha/libxv-dev_4.3.0.dfsg.1-14sarge1_alpha.deb stable/main/binary-alpha/libxp6-dbg_4.3.0.dfsg.1-14sarge1_alpha.deb stable/main/binary-alpha/libxt-dev_4.3.0.dfsg.1-14sarge1_alpha.deb stable/main/binary-alpha/libdps1-dbg_4.3.0.dfsg.1-14sarge1_alpha.deb stable/main/binary-alpha/libdps-dev_4.3.0.dfsg.1-14sarge1_alpha.deb stable/main/binary-alpha/xserver-xfree86_4.3.0.dfsg.1-14sarge1_alpha.deb stable/main/binary-alpha/xlibosmesa4_4.3.0.dfsg.1-14sarge1_alpha.deb stable/main/binary-alpha/xvfb_4.3.0.dfsg.1-14sarge1_alpha.deb stable/main/binary-alpha/libxaw7-dbg_4.3.0.dfsg.1-14sarge1_alpha.deb stable/main/binary-alpha/xlibmesa-glu_4.3.0.dfsg.1-14sarge1_alpha.deb stable/main/binary-alpha/libxv1_4.3.0.dfsg.1-14sarge1_alpha.deb stable/main/binary-alpha/xlibmesa-glu-dev_4.3.0.dfsg.1-14sarge1_alpha.deb stable/main/binary-alpha/libxtst-dev_4.3.0.dfsg.1-14sarge1_alpha.deb stable/main/binary-alpha/xlibmesa-gl_4.3.0.dfsg.1-14sarge1_alpha.deb stable/main/binary-alpha/libxt6-dbg_4.3.0.dfsg.1-14sarge1_alpha.deb stable/main/binary-alpha/libxmu6-dbg_4.3.0.dfsg.1-14sarge1_alpha.deb stable/main/binary-alpha/xlibmesa3_4.3.0.dfsg.1-14sarge1_alpha.deb stable/main/binary-alpha/libxtst6_4.3.0.dfsg.1-14sarge1_alpha.deb stable/main/binary-alpha/libx11-6_4.3.0.dfsg.1-14sarge1_alpha.deb stable/main/binary-alpha/libxp6_4.3.0.dfsg.1-14sarge1_alpha.deb stable/main/binary-alpha/libxt6_4.3.0.dfsg.1-14sarge1_alpha.deb stable/main/binary-alpha/libxpm4_4.3.0.dfsg.1-14sarge1_alpha.deb stable/main/binary-alpha/xlibs-static-dev_4.3.0.dfsg.1-14sarge1_alpha.deb stable/main/binary-alpha/xlibs-static-pic_4.3.0.dfsg.1-14sarge1_alpha.deb stable/main/binary-alpha/libxmu-dev_4.3.0.dfsg.1-14sarge1_alpha.deb stable/main/binary-alpha/xfs_4.3.0.dfsg.1-14sarge1_alpha.deb stable/main/binary-alpha/libxtrap-dev_4.3.0.dfsg.1-14sarge1_alpha.deb stable/main/binary-alpha/libxft1_4.3.0.dfsg.1-14sarge1_alpha.deb stable/main/binary-alpha/libice-dev_4.3.0.dfsg.1-14sarge1_alpha.deb stable/main/binary-alpha/libxext6-dbg_4.3.0.dfsg.1-14sarge1_alpha.deb stable/main/binary-alpha/libice6-dbg_4.3.0.dfsg.1-14sarge1_alpha.deb stable/main/binary-alpha/libxmuu1_4.3.0.dfsg.1-14sarge1_alpha.deb stable/main/binary-alpha/xdm_4.3.0.dfsg.1-14sarge1_alpha.deb stable/main/binary-alpha/libxpm-dev_4.3.0.dfsg.1-14sarge1_alpha.deb stable/main/binary-alpha/xlibmesa-gl-dbg_4.3.0.dfsg.1-14sarge1_alpha.deb stable/main/binary-alpha/xutils_4.3.0.dfsg.1-14sarge1_alpha.deb stable/main/binary-alpha/libxft1-dbg_4.3.0.dfsg.1-14sarge1_alpha.deb stable/main/binary-alpha/x-window-system-dev_4.3.0.dfsg.1-14sarge1_alpha.deb stable/main/binary-alpha/libx11-dev_4.3.0.dfsg.1-14sarge1_alpha.deb stable/main/binary-alpha/libxmuu1-dbg_4.3.0.dfsg.1-14sarge1_alpha.deb stable/main/binary-alpha/libxaw6-dev_4.3.0.dfsg.1-14sarge1_alpha.deb stable/main/binary-alpha/libxext-dev_4.3.0.dfsg.1-14sarge1_alpha.deb xfree86 (4.3.0.dfsg.1-14sarge1) stable-security; urgency=high * Security update release. Resolves the following issue: + CAN-2005-2495: overflows when allocating size for large pixmaps may allow attackers to execute arbitrary code; with the patches for this issue, pixmap size has been limited to 32767x32767. stable/main/binary-all/xlibmesa-dev_4.3.0.dfsg.1-14sarge1_all.deb stable/main/binary-i386/xserver-xfree86-dbg_4.3.0.dfsg.1-14sarge1_i386.deb stable/main/binary-i386/libxp-dev_4.3.0.dfsg.1-14sarge1_i386.deb stable/main/binary-i386/twm_4.3.0.dfsg.1-14sarge1_i386.deb stable/main/binary-i386/libxrandr2_4.3.0.dfsg.1-14sarge1_i386.deb stable/main/binary-all/xlibs_4.3.0.dfsg.1-14sarge1_all.deb stable/main/binary-i386/xlibmesa-glu-dbg_4.3.0.dfsg.1-14sarge1_i386.deb stable/main/binary-i386/xlibs-static-dev_4.3.0.dfsg.1-14sarge1_i386.deb stable/main/binary-i386/libxi6-dbg_4.3.0.dfsg.1-14sarge1_i386.deb stable/main/binary-i386/libx11-6_4.3.0.dfsg.1-14sarge1_i386.deb stable/main/binary-all/x-window-system_4.3.0.dfsg.1-14sarge1_all.deb stable/main/binary-i386/libxmuu-dev_4.3.0.dfsg.1-14sarge1_i386.deb stable/main/binary-i386/xlibs-static-pic_4.3.0.dfsg.1-14sarge1_i386.deb stable/main/binary-i386/libxmu6_4.3.0.dfsg.1-14sarge1_i386.deb stable/main/binary-i386/xlibmesa-dri_4.3.0.dfsg.1-14sarge1_i386.deb stable/main/binary-all/xfonts-scalable_4.3.0.dfsg.1-14sarge1_all.deb stable/main/binary-i386/libxaw6-dev_4.3.0.dfsg.1-14sarge1_i386.deb stable/main/binary-all/xfonts-base-transcoded_4.3.0.dfsg.1-14sarge1_all.deb stable/main/binary-i386/libdps1_4.3.0.dfsg.1-14sarge1_i386.deb stable/main/binary-i386/libxaw7_4.3.0.dfsg.1-14sarge1_i386.deb stable/main/binary-i386/xserver-common_4.3.0.dfsg.1-14sarge1_i386.deb stable/main/source/xfree86_4.3.0.dfsg.1-14sarge1.diff.gz stable/main/binary-i386/xdm_4.3.0.dfsg.1-14sarge1_i386.deb stable/main/binary-i386/libxaw7-dev_4.3.0.dfsg.1-14sarge1_i386.deb stable/main/binary-all/xfree86-common_4.3.0.dfsg.1-14sarge1_all.deb stable/main/binary-all/xlibs-dev_4.3.0.dfsg.1-14sarge1_all.deb stable/main/binary-i386/xfwp_4.3.0.dfsg.1-14sarge1_i386.deb stable/main/binary-i386/xlibosmesa-dev_4.3.0.dfsg.1-14sarge1_i386.deb stable/main/binary-i386/libxaw6_4.3.0.dfsg.1-14sarge1_i386.deb stable/main/binary-all/xspecs_4.3.0.dfsg.1-14sarge1_all.deb stable/main/binary-i386/xlibosmesa4-dbg_4.3.0.dfsg.1-14sarge1_i386.deb stable/main/binary-i386/libxv1-dbg_4.3.0.dfsg.1-14sarge1_i386.deb stable/main/binary-i386/libxtrap6_4.3.0.dfsg.1-14sarge1_i386.deb stable/main/binary-i386/libice6_4.3.0.dfsg.1-14sarge1_i386.deb stable/main/binary-i386/x-window-system-core_4.3.0.dfsg.1-14sarge1_i386.deb stable/main/source/xfree86_4.3.0.dfsg.1-14sarge1.dsc stable/main/binary-i386/libxext-dev_4.3.0.dfsg.1-14sarge1_i386.deb stable/main/binary-i386/libxext6_4.3.0.dfsg.1-14sarge1_i386.deb stable/main/binary-i386/libxmuu1_4.3.0.dfsg.1-14sarge1_i386.deb stable/main/binary-i386/libxtst6-dbg_4.3.0.dfsg.1-14sarge1_i386.deb stable/main/binary-i386/libsm6_4.3.0.dfsg.1-14sarge1_i386.deb stable/main/binary-i386/libdps-dev_4.3.0.dfsg.1-14sarge1_i386.deb stable/main/binary-i386/libxmu6-dbg_4.3.0.dfsg.1-14sarge1_i386.deb stable/main/binary-i386/libx11-6-dbg_4.3.0.dfsg.1-14sarge1_i386.deb stable/main/binary-i386/libxft1_4.3.0.dfsg.1-14sarge1_i386.deb stable/main/binary-all/xlibmesa3-dbg_4.3.0.dfsg.1-14sarge1_all.deb stable/main/binary-all/xlibs-dbg_4.3.0.dfsg.1-14sarge1_all.deb stable/main/binary-i386/libxtst6_4.3.0.dfsg.1-14sarge1_i386.deb stable/main/binary-i386/libice6-dbg_4.3.0.dfsg.1-14sarge1_i386.deb stable/main/binary-i386/x-window-system-dev_4.3.0.dfsg.1-14sarge1_i386.deb stable/main/binary-i386/xnest_4.3.0.dfsg.1-14sarge1_i386.deb stable/main/binary-i386/libxmuu1-dbg_4.3.0.dfsg.1-14sarge1_i386.deb stable/main/binary-i386/libxrandr-dev_4.3.0.dfsg.1-14sarge1_i386.deb stable/main/binary-i386/libsm6-dbg_4.3.0.dfsg.1-14sarge1_i386.deb stable/main/binary-i386/libxrandr2-dbg_4.3.0.dfsg.1-14sarge1_i386.deb stable/main/binary-i386/libxext6-dbg_4.3.0.dfsg.1-14sarge1_i386.deb stable/main/binary-i386/xbase-clients_4.3.0.dfsg.1-14sarge1_i386.deb stable/main/binary-i386/libxv1_4.3.0.dfsg.1-14sarge1_i386.deb stable/main/binary-i386/libxft1-dbg_4.3.0.dfsg.1-14sarge1_i386.deb stable/main/binary-i386/libxv-dev_4.3.0.dfsg.1-14sarge1_i386.deb stable/main/binary-all/xlibs-data_4.3.0.dfsg.1-14sarge1_all.deb stable/main/binary-i386/libxtrap6-dbg_4.3.0.dfsg.1-14sarge1_i386.deb stable/main/binary-i386/xvfb_4.3.0.dfsg.1-14sarge1_i386.deb stable/main/binary-all/xfonts-base_4.3.0.dfsg.1-14sarge1_all.deb stable/main/binary-i386/libxt-dev_4.3.0.dfsg.1-14sarge1_i386.deb stable/main/binary-i386/xlibosmesa4_4.3.0.dfsg.1-14sarge1_i386.deb stable/main/binary-i386/libxtst-dev_4.3.0.dfsg.1-14sarge1_i386.deb stable/main/binary-i386/xlibmesa-glu_4.3.0.dfsg.1-14sarge1_i386.deb stable/main/binary-i386/xfs_4.3.0.dfsg.1-14sarge1_i386.deb stable/main/binary-i386/xlibmesa-gl-dev_4.3.0.dfsg.1-14sarge1_i386.deb stable/main/binary-all/xlibs-pic_4.3.0.dfsg.1-14sarge1_all.deb stable/main/binary-i386/libxp6_4.3.0.dfsg.1-14sarge1_i386.deb stable/main/binary-all/xfonts-100dpi-transcoded_4.3.0.dfsg.1-14sarge1_all.deb stable/main/binary-i386/libxmu-dev_4.3.0.dfsg.1-14sarge1_i386.deb stable/main/binary-all/xfonts-100dpi_4.3.0.dfsg.1-14sarge1_all.deb stable/main/binary-i386/xmh_4.3.0.dfsg.1-14sarge1_i386.deb stable/main/binary-i386/libxpm4_4.3.0.dfsg.1-14sarge1_i386.deb stable/main/binary-i386/xlibmesa-gl-dbg_4.3.0.dfsg.1-14sarge1_i386.deb stable/main/binary-i386/libxt6-dbg_4.3.0.dfsg.1-14sarge1_i386.deb stable/main/binary-i386/xlibmesa-glu-dev_4.3.0.dfsg.1-14sarge1_i386.deb stable/main/binary-i386/xlibmesa-dri-dbg_4.3.0.dfsg.1-14sarge1_i386.deb stable/main/binary-i386/libdps1-dbg_4.3.0.dfsg.1-14sarge1_i386.deb stable/main/binary-all/pm-dev_4.3.0.dfsg.1-14sarge1_all.deb stable/main/binary-i386/xutils_4.3.0.dfsg.1-14sarge1_i386.deb stable/main/binary-i386/xlibmesa3_4.3.0.dfsg.1-14sarge1_i386.deb stable/main/binary-i386/libx11-dev_4.3.0.dfsg.1-14sarge1_i386.deb stable/main/binary-i386/libxaw7-dbg_4.3.0.dfsg.1-14sarge1_i386.deb stable/main/binary-all/xfonts-cyrillic_4.3.0.dfsg.1-14sarge1_all.deb stable/main/binary-i386/libsm-dev_4.3.0.dfsg.1-14sarge1_i386.deb stable/main/binary-i386/lbxproxy_4.3.0.dfsg.1-14sarge1_i386.deb stable/main/binary-all/xfonts-75dpi-transcoded_4.3.0.dfsg.1-14sarge1_all.deb stable/main/binary-all/x-dev_4.3.0.dfsg.1-14sarge1_all.deb stable/main/binary-i386/libxi6_4.3.0.dfsg.1-14sarge1_i386.deb stable/main/binary-i386/proxymngr_4.3.0.dfsg.1-14sarge1_i386.deb stable/main/binary-i386/xserver-xfree86_4.3.0.dfsg.1-14sarge1_i386.deb stable/main/binary-i386/libxaw6-dbg_4.3.0.dfsg.1-14sarge1_i386.deb stable/main/binary-i386/xterm_4.3.0.dfsg.1-14sarge1_i386.deb stable/main/binary-i386/libxtrap-dev_4.3.0.dfsg.1-14sarge1_i386.deb stable/main/binary-i386/xlibmesa-gl_4.3.0.dfsg.1-14sarge1_i386.deb stable/main/binary-i386/libxi-dev_4.3.0.dfsg.1-14sarge1_i386.deb stable/main/binary-all/xfonts-75dpi_4.3.0.dfsg.1-14sarge1_all.deb stable/main/binary-i386/libxpm-dev_4.3.0.dfsg.1-14sarge1_i386.deb stable/main/binary-i386/libxt6_4.3.0.dfsg.1-14sarge1_i386.deb stable/main/binary-i386/libice-dev_4.3.0.dfsg.1-14sarge1_i386.deb stable/main/binary-i386/libxpm4-dbg_4.3.0.dfsg.1-14sarge1_i386.deb stable/main/binary-i386/libxp6-dbg_4.3.0.dfsg.1-14sarge1_i386.deb xfree86 (4.3.0.dfsg.1-14sarge1) stable-security; urgency=high * Security update release. Resolves the following issue: + CAN-2005-2495: overflows when allocating size for large pixmaps may allow attackers to execute arbitrary code; with the patches for this issue, pixmap size has been limited to 32767x32767. stable/main/binary-sparc/weex_2.6.1-6sarge1_sparc.deb weex (2.6.1-6sarge1) stable-security; urgency=high * Non-maintainer upload by the Security Team * Applied patch by Ulf Härnhammar to fix format string vulnerability [src/log.c, CAN-2005-3117] stable/main/binary-s390/weex_2.6.1-6sarge1_s390.deb weex (2.6.1-6sarge1) stable-security; urgency=high * Non-maintainer upload by the Security Team * Applied patch by Ulf Härnhammar to fix format string vulnerability [src/log.c, CAN-2005-3117] stable/main/binary-mipsel/weex_2.6.1-6sarge1_mipsel.deb weex (2.6.1-6sarge1) stable-security; urgency=high * Non-maintainer upload by the Security Team * Applied patch by Ulf Härnhammar to fix format string vulnerability [src/log.c, CAN-2005-3117] stable/main/binary-mips/weex_2.6.1-6sarge1_mips.deb weex (2.6.1-6sarge1) stable-security; urgency=high * Non-maintainer upload by the Security Team * Applied patch by Ulf Härnhammar to fix format string vulnerability [src/log.c, CAN-2005-3117] stable/main/binary-m68k/weex_2.6.1-6sarge1_m68k.deb weex (2.6.1-6sarge1) stable-security; urgency=high * Non-maintainer upload by the Security Team * Applied patch by Ulf Härnhammar to fix format string vulnerability [src/log.c, CAN-2005-3117] stable/main/binary-ia64/weex_2.6.1-6sarge1_ia64.deb weex (2.6.1-6sarge1) stable-security; urgency=high * Non-maintainer upload by the Security Team * Applied patch by Ulf Härnhammar to fix format string vulnerability [src/log.c, CAN-2005-3117] stable/main/binary-i386/weex_2.6.1-6sarge1_i386.deb weex (2.6.1-6sarge1) stable-security; urgency=high * Non-maintainer upload by the Security Team * Applied patch by Ulf Härnhammar to fix format string vulnerability [src/log.c, CAN-2005-3117] stable/main/binary-hppa/weex_2.6.1-6sarge1_hppa.deb weex (2.6.1-6sarge1) stable-security; urgency=high * Non-maintainer upload by the Security Team * Applied patch by Ulf Härnhammar to fix format string vulnerability [src/log.c, CAN-2005-3117] stable/main/binary-arm/weex_2.6.1-6sarge1_arm.deb weex (2.6.1-6sarge1) stable-security; urgency=high * Non-maintainer upload by the Security Team * Applied patch by Ulf Härnhammar to fix format string vulnerability [src/log.c, CAN-2005-3117] stable/main/binary-alpha/weex_2.6.1-6sarge1_alpha.deb weex (2.6.1-6sarge1) stable-security; urgency=high * Non-maintainer upload by the Security Team * Applied patch by Ulf Härnhammar to fix format string vulnerability [src/log.c, CAN-2005-3117] stable/main/source/weex_2.6.1-6sarge1.diff.gz stable/main/source/weex_2.6.1-6sarge1.dsc stable/main/binary-powerpc/weex_2.6.1-6sarge1_powerpc.deb weex (2.6.1-6sarge1) stable-security; urgency=high * Non-maintainer upload by the Security Team * Applied patch by Ulf Härnhammar to fix format string vulnerability [src/log.c, CAN-2005-3117] stable/main/source/webcalendar_0.9.45-4sarge2.diff.gz stable/main/source/webcalendar_0.9.45-4sarge2.dsc stable/main/binary-all/webcalendar_0.9.45-4sarge2_all.deb webcalendar (0.9.45-4sarge2) stable-security; urgency=high * Non-maintainer upload by the Security Team * Fix to correct arbitrary code execution CAN-2005-2717 stable/main/binary-sparc/vim-ruby_6.3-071+1sarge1_sparc.deb stable/main/binary-sparc/vim-tcl_6.3-071+1sarge1_sparc.deb stable/main/binary-sparc/vim-lesstif_6.3-071+1sarge1_sparc.deb stable/main/binary-sparc/vim-gnome_6.3-071+1sarge1_sparc.deb stable/main/binary-sparc/vim-gtk_6.3-071+1sarge1_sparc.deb stable/main/binary-sparc/vim-full_6.3-071+1sarge1_sparc.deb stable/main/binary-sparc/vim_6.3-071+1sarge1_sparc.deb stable/main/binary-sparc/vim-python_6.3-071+1sarge1_sparc.deb stable/main/binary-sparc/vim-perl_6.3-071+1sarge1_sparc.deb vim (1:6.3-071+1sarge1) stable; urgency=high * New upstream patches (081 and 082), see README.gz for details. + 6.3.081, 6.3.082: Fix arbitrary shell commands execution by wrapping them in glob() or expand() function calls in modelines. (CAN-2005-2368) (closes: #320017) stable/main/binary-s390/vim-perl_6.3-071+1sarge1_s390.deb stable/main/binary-s390/vim-gtk_6.3-071+1sarge1_s390.deb stable/main/binary-s390/vim_6.3-071+1sarge1_s390.deb stable/main/binary-s390/vim-python_6.3-071+1sarge1_s390.deb stable/main/binary-s390/vim-ruby_6.3-071+1sarge1_s390.deb stable/main/binary-s390/vim-tcl_6.3-071+1sarge1_s390.deb stable/main/binary-s390/vim-gnome_6.3-071+1sarge1_s390.deb stable/main/binary-s390/vim-lesstif_6.3-071+1sarge1_s390.deb stable/main/binary-s390/vim-full_6.3-071+1sarge1_s390.deb vim (1:6.3-071+1sarge1) stable; urgency=high * New upstream patches (081 and 082), see README.gz for details. + 6.3.081, 6.3.082: Fix arbitrary shell commands execution by wrapping them in glob() or expand() function calls in modelines. (CAN-2005-2368) (closes: #320017) stable/main/binary-powerpc/vim-perl_6.3-071+1sarge1_powerpc.deb stable/main/binary-powerpc/vim-gtk_6.3-071+1sarge1_powerpc.deb stable/main/binary-powerpc/vim-python_6.3-071+1sarge1_powerpc.deb stable/main/binary-powerpc/vim_6.3-071+1sarge1_powerpc.deb stable/main/binary-powerpc/vim-tcl_6.3-071+1sarge1_powerpc.deb stable/main/binary-powerpc/vim-lesstif_6.3-071+1sarge1_powerpc.deb stable/main/binary-powerpc/vim-ruby_6.3-071+1sarge1_powerpc.deb stable/main/binary-powerpc/vim-gnome_6.3-071+1sarge1_powerpc.deb stable/main/binary-powerpc/vim-full_6.3-071+1sarge1_powerpc.deb vim (1:6.3-071+1sarge1) stable; urgency=high * New upstream patches (081 and 082), see README.gz for details. + 6.3.081, 6.3.082: Fix arbitrary shell commands execution by wrapping them in glob() or expand() function calls in modelines. (CAN-2005-2368) (closes: #320017) stable/main/binary-mipsel/vim_6.3-071+1sarge1_mipsel.deb stable/main/binary-mipsel/vim-gnome_6.3-071+1sarge1_mipsel.deb stable/main/binary-mipsel/vim-gtk_6.3-071+1sarge1_mipsel.deb stable/main/binary-mipsel/vim-perl_6.3-071+1sarge1_mipsel.deb stable/main/binary-mipsel/vim-full_6.3-071+1sarge1_mipsel.deb stable/main/binary-mipsel/vim-python_6.3-071+1sarge1_mipsel.deb stable/main/binary-mipsel/vim-ruby_6.3-071+1sarge1_mipsel.deb stable/main/binary-mipsel/vim-lesstif_6.3-071+1sarge1_mipsel.deb stable/main/binary-mipsel/vim-tcl_6.3-071+1sarge1_mipsel.deb vim (1:6.3-071+1sarge1) stable; urgency=high * New upstream patches (081 and 082), see README.gz for details. + 6.3.081, 6.3.082: Fix arbitrary shell commands execution by wrapping them in glob() or expand() function calls in modelines. (CAN-2005-2368) (closes: #320017) stable/main/binary-mips/vim-python_6.3-071+1sarge1_mips.deb stable/main/binary-mips/vim-ruby_6.3-071+1sarge1_mips.deb stable/main/binary-mips/vim-gtk_6.3-071+1sarge1_mips.deb stable/main/binary-mips/vim-lesstif_6.3-071+1sarge1_mips.deb stable/main/binary-mips/vim-perl_6.3-071+1sarge1_mips.deb stable/main/binary-mips/vim-gnome_6.3-071+1sarge1_mips.deb stable/main/binary-mips/vim-full_6.3-071+1sarge1_mips.deb stable/main/binary-mips/vim_6.3-071+1sarge1_mips.deb stable/main/binary-mips/vim-tcl_6.3-071+1sarge1_mips.deb vim (1:6.3-071+1sarge1) stable; urgency=high * New upstream patches (081 and 082), see README.gz for details. + 6.3.081, 6.3.082: Fix arbitrary shell commands execution by wrapping them in glob() or expand() function calls in modelines. (CAN-2005-2368) (closes: #320017) stable/main/binary-m68k/vim-lesstif_6.3-071+1sarge1_m68k.deb stable/main/binary-m68k/vim-python_6.3-071+1sarge1_m68k.deb stable/main/binary-m68k/vim-full_6.3-071+1sarge1_m68k.deb stable/main/binary-m68k/vim-ruby_6.3-071+1sarge1_m68k.deb stable/main/binary-m68k/vim-perl_6.3-071+1sarge1_m68k.deb stable/main/binary-m68k/vim_6.3-071+1sarge1_m68k.deb stable/main/binary-m68k/vim-gtk_6.3-071+1sarge1_m68k.deb stable/main/binary-m68k/vim-gnome_6.3-071+1sarge1_m68k.deb stable/main/binary-m68k/vim-tcl_6.3-071+1sarge1_m68k.deb vim (1:6.3-071+1sarge1) stable; urgency=high * New upstream patches (081 and 082), see README.gz for details. + 6.3.081, 6.3.082: Fix arbitrary shell commands execution by wrapping them in glob() or expand() function calls in modelines. (CAN-2005-2368) (closes: #320017) stable/main/binary-ia64/vim-perl_6.3-071+1sarge1_ia64.deb stable/main/binary-ia64/vim-python_6.3-071+1sarge1_ia64.deb stable/main/binary-ia64/vim-lesstif_6.3-071+1sarge1_ia64.deb stable/main/binary-ia64/vim-tcl_6.3-071+1sarge1_ia64.deb stable/main/binary-ia64/vim_6.3-071+1sarge1_ia64.deb stable/main/binary-ia64/vim-ruby_6.3-071+1sarge1_ia64.deb stable/main/binary-ia64/vim-gtk_6.3-071+1sarge1_ia64.deb stable/main/binary-ia64/vim-gnome_6.3-071+1sarge1_ia64.deb stable/main/binary-ia64/vim-full_6.3-071+1sarge1_ia64.deb vim (1:6.3-071+1sarge1) stable; urgency=high * New upstream patches (081 and 082), see README.gz for details. + 6.3.081, 6.3.082: Fix arbitrary shell commands execution by wrapping them in glob() or expand() function calls in modelines. (CAN-2005-2368) (closes: #320017) stable/main/binary-hppa/vim-perl_6.3-071+1sarge1_hppa.deb stable/main/binary-hppa/vim-python_6.3-071+1sarge1_hppa.deb stable/main/binary-hppa/vim-full_6.3-071+1sarge1_hppa.deb stable/main/binary-hppa/vim-ruby_6.3-071+1sarge1_hppa.deb stable/main/binary-hppa/vim-lesstif_6.3-071+1sarge1_hppa.deb stable/main/binary-hppa/vim_6.3-071+1sarge1_hppa.deb stable/main/binary-hppa/vim-tcl_6.3-071+1sarge1_hppa.deb stable/main/binary-hppa/vim-gtk_6.3-071+1sarge1_hppa.deb stable/main/binary-hppa/vim-gnome_6.3-071+1sarge1_hppa.deb vim (1:6.3-071+1sarge1) stable; urgency=high * New upstream patches (081 and 082), see README.gz for details. + 6.3.081, 6.3.082: Fix arbitrary shell commands execution by wrapping them in glob() or expand() function calls in modelines. (CAN-2005-2368) (closes: #320017) stable/main/binary-arm/vim-lesstif_6.3-071+1sarge1_arm.deb stable/main/binary-arm/vim-gtk_6.3-071+1sarge1_arm.deb stable/main/binary-arm/vim-tcl_6.3-071+1sarge1_arm.deb stable/main/binary-arm/vim-perl_6.3-071+1sarge1_arm.deb stable/main/binary-arm/vim_6.3-071+1sarge1_arm.deb stable/main/binary-arm/vim-ruby_6.3-071+1sarge1_arm.deb stable/main/binary-arm/vim-python_6.3-071+1sarge1_arm.deb stable/main/binary-arm/vim-full_6.3-071+1sarge1_arm.deb stable/main/binary-arm/vim-gnome_6.3-071+1sarge1_arm.deb vim (1:6.3-071+1sarge1) stable; urgency=high * New upstream patches (081 and 082), see README.gz for details. + 6.3.081, 6.3.082: Fix arbitrary shell commands execution by wrapping them in glob() or expand() function calls in modelines. (CAN-2005-2368) (closes: #320017) stable/main/binary-alpha/vim-full_6.3-071+1sarge1_alpha.deb stable/main/binary-alpha/vim_6.3-071+1sarge1_alpha.deb stable/main/binary-alpha/vim-gtk_6.3-071+1sarge1_alpha.deb stable/main/binary-alpha/vim-tcl_6.3-071+1sarge1_alpha.deb stable/main/binary-alpha/vim-ruby_6.3-071+1sarge1_alpha.deb stable/main/binary-alpha/vim-gnome_6.3-071+1sarge1_alpha.deb stable/main/binary-alpha/vim-perl_6.3-071+1sarge1_alpha.deb stable/main/binary-alpha/vim-lesstif_6.3-071+1sarge1_alpha.deb stable/main/binary-alpha/vim-python_6.3-071+1sarge1_alpha.deb vim (1:6.3-071+1sarge1) stable; urgency=high * New upstream patches (081 and 082), see README.gz for details. + 6.3.081, 6.3.082: Fix arbitrary shell commands execution by wrapping them in glob() or expand() function calls in modelines. (CAN-2005-2368) (closes: #320017) stable/main/source/vim_6.3-071+1sarge1.dsc stable/main/binary-i386/vim-gnome_6.3-071+1sarge1_i386.deb stable/main/source/vim_6.3-071+1sarge1.diff.gz stable/main/binary-i386/vim-ruby_6.3-071+1sarge1_i386.deb stable/main/binary-all/vim-doc_6.3-071+1sarge1_all.deb stable/main/binary-i386/vim_6.3-071+1sarge1_i386.deb stable/main/binary-i386/vim-tcl_6.3-071+1sarge1_i386.deb stable/main/binary-i386/vim-python_6.3-071+1sarge1_i386.deb stable/main/binary-i386/vim-full_6.3-071+1sarge1_i386.deb stable/main/binary-i386/vim-gtk_6.3-071+1sarge1_i386.deb stable/main/binary-i386/vim-perl_6.3-071+1sarge1_i386.deb stable/main/binary-all/vim-common_6.3-071+1sarge1_all.deb stable/main/binary-i386/vim-lesstif_6.3-071+1sarge1_i386.deb vim (1:6.3-071+1sarge1) stable; urgency=high * New upstream patches (081 and 082), see README.gz for details. + 6.3.081, 6.3.082: Fix arbitrary shell commands execution by wrapping them in glob() or expand() function calls in modelines. (CAN-2005-2368) (closes: #320017) stable/main/binary-sparc/mlock_2002edebian1-11sarge1_sparc.deb stable/main/binary-sparc/ipopd_2002edebian1-11sarge1_sparc.deb stable/main/binary-sparc/uw-imapd_2002edebian1-11sarge1_sparc.deb stable/main/binary-sparc/libc-client-dev_2002edebian1-11sarge1_sparc.deb stable/main/binary-sparc/libc-client2002edebian_2002edebian1-11sarge1_sparc.deb stable/main/binary-sparc/uw-mailutils_2002edebian1-11sarge1_sparc.deb uw-imap (7:2002edebian1-11sarge1) stable-security; urgency=high * Non-maintainer upload by the Security Team * Applied upstream patch to fix buffer overflow [src/c-client/mail.c, debian/patches/15_CAN-2005-2933.diff] stable/main/binary-s390/uw-imapd_2002edebian1-11sarge1_s390.deb stable/main/binary-s390/ipopd_2002edebian1-11sarge1_s390.deb stable/main/binary-s390/libc-client-dev_2002edebian1-11sarge1_s390.deb stable/main/binary-s390/libc-client2002edebian_2002edebian1-11sarge1_s390.deb stable/main/binary-s390/mlock_2002edebian1-11sarge1_s390.deb stable/main/binary-s390/uw-mailutils_2002edebian1-11sarge1_s390.deb uw-imap (7:2002edebian1-11sarge1) stable-security; urgency=high * Non-maintainer upload by the Security Team * Applied upstream patch to fix buffer overflow [src/c-client/mail.c, debian/patches/15_CAN-2005-2933.diff] stable/main/binary-mipsel/libc-client2002edebian_2002edebian1-11sarge1_mipsel.deb stable/main/binary-mipsel/mlock_2002edebian1-11sarge1_mipsel.deb stable/main/binary-mipsel/ipopd_2002edebian1-11sarge1_mipsel.deb stable/main/binary-mipsel/uw-mailutils_2002edebian1-11sarge1_mipsel.deb stable/main/binary-mipsel/uw-imapd_2002edebian1-11sarge1_mipsel.deb stable/main/binary-mipsel/libc-client-dev_2002edebian1-11sarge1_mipsel.deb uw-imap (7:2002edebian1-11sarge1) stable-security; urgency=high * Non-maintainer upload by the Security Team * Applied upstream patch to fix buffer overflow [src/c-client/mail.c, debian/patches/15_CAN-2005-2933.diff] stable/main/binary-mips/libc-client-dev_2002edebian1-11sarge1_mips.deb stable/main/binary-mips/libc-client2002edebian_2002edebian1-11sarge1_mips.deb stable/main/binary-mips/ipopd_2002edebian1-11sarge1_mips.deb stable/main/binary-mips/uw-mailutils_2002edebian1-11sarge1_mips.deb stable/main/binary-mips/uw-imapd_2002edebian1-11sarge1_mips.deb stable/main/binary-mips/mlock_2002edebian1-11sarge1_mips.deb uw-imap (7:2002edebian1-11sarge1) stable-security; urgency=high * Non-maintainer upload by the Security Team * Applied upstream patch to fix buffer overflow [src/c-client/mail.c, debian/patches/15_CAN-2005-2933.diff] stable/main/binary-m68k/mlock_2002edebian1-11sarge1_m68k.deb stable/main/binary-m68k/ipopd_2002edebian1-11sarge1_m68k.deb stable/main/binary-m68k/uw-mailutils_2002edebian1-11sarge1_m68k.deb stable/main/binary-m68k/uw-imapd_2002edebian1-11sarge1_m68k.deb stable/main/binary-m68k/libc-client-dev_2002edebian1-11sarge1_m68k.deb stable/main/binary-m68k/libc-client2002edebian_2002edebian1-11sarge1_m68k.deb uw-imap (7:2002edebian1-11sarge1) stable-security; urgency=high * Non-maintainer upload by the Security Team * Applied upstream patch to fix buffer overflow [src/c-client/mail.c, debian/patches/15_CAN-2005-2933.diff] stable/main/binary-ia64/libc-client-dev_2002edebian1-11sarge1_ia64.deb stable/main/binary-ia64/uw-imapd_2002edebian1-11sarge1_ia64.deb stable/main/binary-ia64/ipopd_2002edebian1-11sarge1_ia64.deb stable/main/binary-ia64/mlock_2002edebian1-11sarge1_ia64.deb stable/main/binary-ia64/libc-client2002edebian_2002edebian1-11sarge1_ia64.deb stable/main/binary-ia64/uw-mailutils_2002edebian1-11sarge1_ia64.deb uw-imap (7:2002edebian1-11sarge1) stable-security; urgency=high * Non-maintainer upload by the Security Team * Applied upstream patch to fix buffer overflow [src/c-client/mail.c, debian/patches/15_CAN-2005-2933.diff] stable/main/binary-i386/uw-mailutils_2002edebian1-11sarge1_i386.deb stable/main/binary-i386/libc-client2002edebian_2002edebian1-11sarge1_i386.deb stable/main/binary-i386/libc-client-dev_2002edebian1-11sarge1_i386.deb stable/main/binary-i386/ipopd_2002edebian1-11sarge1_i386.deb stable/main/binary-i386/uw-imapd_2002edebian1-11sarge1_i386.deb stable/main/binary-i386/mlock_2002edebian1-11sarge1_i386.deb uw-imap (7:2002edebian1-11sarge1) stable-security; urgency=high * Non-maintainer upload by the Security Team * Applied upstream patch to fix buffer overflow [src/c-client/mail.c, debian/patches/15_CAN-2005-2933.diff] stable/main/binary-hppa/uw-imapd_2002edebian1-11sarge1_hppa.deb stable/main/binary-hppa/uw-mailutils_2002edebian1-11sarge1_hppa.deb stable/main/binary-hppa/mlock_2002edebian1-11sarge1_hppa.deb stable/main/binary-hppa/ipopd_2002edebian1-11sarge1_hppa.deb stable/main/binary-hppa/libc-client-dev_2002edebian1-11sarge1_hppa.deb stable/main/binary-hppa/libc-client2002edebian_2002edebian1-11sarge1_hppa.deb uw-imap (7:2002edebian1-11sarge1) stable-security; urgency=high * Non-maintainer upload by the Security Team * Applied upstream patch to fix buffer overflow [src/c-client/mail.c, debian/patches/15_CAN-2005-2933.diff] stable/main/binary-arm/uw-mailutils_2002edebian1-11sarge1_arm.deb stable/main/binary-arm/mlock_2002edebian1-11sarge1_arm.deb stable/main/binary-arm/uw-imapd_2002edebian1-11sarge1_arm.deb stable/main/binary-arm/ipopd_2002edebian1-11sarge1_arm.deb stable/main/binary-arm/libc-client2002edebian_2002edebian1-11sarge1_arm.deb stable/main/binary-arm/libc-client-dev_2002edebian1-11sarge1_arm.deb uw-imap (7:2002edebian1-11sarge1) stable-security; urgency=high * Non-maintainer upload by the Security Team * Applied upstream patch to fix buffer overflow [src/c-client/mail.c, debian/patches/15_CAN-2005-2933.diff] stable/main/binary-alpha/uw-mailutils_2002edebian1-11sarge1_alpha.deb stable/main/binary-alpha/mlock_2002edebian1-11sarge1_alpha.deb stable/main/binary-alpha/uw-imapd_2002edebian1-11sarge1_alpha.deb stable/main/binary-alpha/libc-client2002edebian_2002edebian1-11sarge1_alpha.deb stable/main/binary-alpha/ipopd_2002edebian1-11sarge1_alpha.deb stable/main/binary-alpha/libc-client-dev_2002edebian1-11sarge1_alpha.deb uw-imap (7:2002edebian1-11sarge1) stable-security; urgency=high * Non-maintainer upload by the Security Team * Applied upstream patch to fix buffer overflow [src/c-client/mail.c, debian/patches/15_CAN-2005-2933.diff] stable/main/binary-powerpc/libc-client2002edebian_2002edebian1-11sarge1_powerpc.deb stable/main/binary-powerpc/libc-client-dev_2002edebian1-11sarge1_powerpc.deb stable/main/binary-powerpc/ipopd_2002edebian1-11sarge1_powerpc.deb stable/main/binary-all/uw-imapd-ssl_2002edebian1-11sarge1_all.deb stable/main/source/uw-imap_2002edebian1-11sarge1.diff.gz stable/main/source/uw-imap_2002edebian1-11sarge1.dsc stable/main/binary-powerpc/uw-mailutils_2002edebian1-11sarge1_powerpc.deb stable/main/binary-powerpc/mlock_2002edebian1-11sarge1_powerpc.deb stable/main/binary-all/ipopd-ssl_2002edebian1-11sarge1_all.deb stable/main/binary-powerpc/uw-imapd_2002edebian1-11sarge1_powerpc.deb uw-imap (7:2002edebian1-11sarge1) stable-security; urgency=high * Non-maintainer upload by the Security Team * Applied upstream patch to fix buffer overflow [src/c-client/mail.c, debian/patches/15_CAN-2005-2933.diff] stable/main/binary-sparc/bsdutils_2.12p-4sarge1_sparc.deb stable/main/binary-sparc/util-linux_2.12p-4sarge1_sparc.deb stable/main/binary-sparc/mount_2.12p-4sarge1_sparc.deb stable/main/binary-sparc/fdisk-udeb_2.12p-4sarge1_sparc.udeb util-linux (2.12p-4sarge1) stable-security; urgency=high * Non-maintainer upload by the Security Team * Applited patch by Max Vozeler to fix a local privilege escalation vulnerability in umount -r [debian/patches/51security_CAN-2005-2876.dpatch] stable/main/binary-s390/mount_2.12p-4sarge1_s390.deb stable/main/binary-s390/util-linux_2.12p-4sarge1_s390.deb stable/main/binary-s390/fdisk-udeb_2.12p-4sarge1_s390.udeb stable/main/binary-s390/bsdutils_2.12p-4sarge1_s390.deb util-linux (2.12p-4sarge1) stable-security; urgency=high * Non-maintainer upload by the Security Team * Applited patch by Max Vozeler to fix a local privilege escalation vulnerability in umount -r [debian/patches/51security_CAN-2005-2876.dpatch] stable/main/binary-mipsel/fdisk-udeb_2.12p-4sarge1_mipsel.udeb stable/main/binary-mipsel/mount_2.12p-4sarge1_mipsel.deb stable/main/binary-mipsel/util-linux_2.12p-4sarge1_mipsel.deb stable/main/binary-mipsel/bsdutils_2.12p-4sarge1_mipsel.deb util-linux (2.12p-4sarge1) stable-security; urgency=high * Non-maintainer upload by the Security Team * Applited patch by Max Vozeler to fix a local privilege escalation vulnerability in umount -r [debian/patches/51security_CAN-2005-2876.dpatch] stable/main/binary-mips/util-linux_2.12p-4sarge1_mips.deb stable/main/binary-mips/mount_2.12p-4sarge1_mips.deb stable/main/binary-mips/bsdutils_2.12p-4sarge1_mips.deb stable/main/binary-mips/fdisk-udeb_2.12p-4sarge1_mips.udeb util-linux (2.12p-4sarge1) stable-security; urgency=high * Non-maintainer upload by the Security Team * Applited patch by Max Vozeler to fix a local privilege escalation vulnerability in umount -r [debian/patches/51security_CAN-2005-2876.dpatch] stable/main/binary-m68k/mount_2.12p-4sarge1_m68k.deb stable/main/binary-m68k/util-linux_2.12p-4sarge1_m68k.deb stable/main/binary-m68k/bsdutils_2.12p-4sarge1_m68k.deb util-linux (2.12p-4sarge1) stable-security; urgency=high * Non-maintainer upload by the Security Team * Applited patch by Max Vozeler to fix a local privilege escalation vulnerability in umount -r [debian/patches/51security_CAN-2005-2876.dpatch] stable/main/binary-ia64/util-linux_2.12p-4sarge1_ia64.deb stable/main/binary-ia64/fdisk-udeb_2.12p-4sarge1_ia64.udeb stable/main/binary-ia64/mount_2.12p-4sarge1_ia64.deb stable/main/binary-ia64/bsdutils_2.12p-4sarge1_ia64.deb util-linux (2.12p-4sarge1) stable-security; urgency=high * Non-maintainer upload by the Security Team * Applited patch by Max Vozeler to fix a local privilege escalation vulnerability in umount -r [debian/patches/51security_CAN-2005-2876.dpatch] stable/main/binary-i386/bsdutils_2.12p-4sarge1_i386.deb stable/main/binary-i386/mount_2.12p-4sarge1_i386.deb stable/main/binary-i386/util-linux_2.12p-4sarge1_i386.deb stable/main/binary-i386/fdisk-udeb_2.12p-4sarge1_i386.udeb util-linux (2.12p-4sarge1) stable-security; urgency=high * Non-maintainer upload by the Security Team * Applited patch by Max Vozeler to fix a local privilege escalation vulnerability in umount -r [debian/patches/51security_CAN-2005-2876.dpatch] stable/main/binary-hppa/bsdutils_2.12p-4sarge1_hppa.deb stable/main/binary-hppa/util-linux_2.12p-4sarge1_hppa.deb stable/main/binary-hppa/mount_2.12p-4sarge1_hppa.deb stable/main/binary-hppa/fdisk-udeb_2.12p-4sarge1_hppa.udeb util-linux (2.12p-4sarge1) stable-security; urgency=high * Non-maintainer upload by the Security Team * Applited patch by Max Vozeler to fix a local privilege escalation vulnerability in umount -r [debian/patches/51security_CAN-2005-2876.dpatch] stable/main/binary-arm/mount_2.12p-4sarge1_arm.deb stable/main/binary-arm/bsdutils_2.12p-4sarge1_arm.deb stable/main/binary-arm/fdisk-udeb_2.12p-4sarge1_arm.udeb stable/main/binary-arm/util-linux_2.12p-4sarge1_arm.deb util-linux (2.12p-4sarge1) stable-security; urgency=high * Non-maintainer upload by the Security Team * Applited patch by Max Vozeler to fix a local privilege escalation vulnerability in umount -r [debian/patches/51security_CAN-2005-2876.dpatch] stable/main/binary-alpha/bsdutils_2.12p-4sarge1_alpha.deb stable/main/binary-alpha/util-linux_2.12p-4sarge1_alpha.deb stable/main/binary-alpha/fdisk-udeb_2.12p-4sarge1_alpha.udeb stable/main/binary-alpha/mount_2.12p-4sarge1_alpha.deb util-linux (2.12p-4sarge1) stable-security; urgency=high * Non-maintainer upload by the Security Team * Applited patch by Max Vozeler to fix a local privilege escalation vulnerability in umount -r [debian/patches/51security_CAN-2005-2876.dpatch] stable/main/binary-powerpc/util-linux_2.12p-4sarge1_powerpc.deb stable/main/binary-all/util-linux-locales_2.12p-4sarge1_all.deb stable/main/binary-powerpc/fdisk-udeb_2.12p-4sarge1_powerpc.udeb stable/main/binary-powerpc/bsdutils_2.12p-4sarge1_powerpc.deb stable/main/source/util-linux_2.12p-4sarge1.dsc stable/main/binary-powerpc/mount_2.12p-4sarge1_powerpc.deb stable/main/source/util-linux_2.12p-4sarge1.diff.gz util-linux (2.12p-4sarge1) stable-security; urgency=high * Non-maintainer upload by the Security Team * Applited patch by Max Vozeler to fix a local privilege escalation vulnerability in umount -r [debian/patches/51security_CAN-2005-2876.dpatch] stable/main/binary-sparc/imapproxy_1.2.3-1sarge1_sparc.deb up-imapproxy (1.2.3-1sarge1) stable-security; urgency=high * Non-maintainer upload by The Security Team. * Fixed format string vulnerability in connection parser (CAN-2005-2661). stable/main/binary-s390/imapproxy_1.2.3-1sarge1_s390.deb up-imapproxy (1.2.3-1sarge1) stable-security; urgency=high * Non-maintainer upload by The Security Team. * Fixed format string vulnerability in connection parser (CAN-2005-2661). stable/main/binary-powerpc/imapproxy_1.2.3-1sarge1_powerpc.deb up-imapproxy (1.2.3-1sarge1) stable-security; urgency=high * Non-maintainer upload by The Security Team. * Fixed format string vulnerability in connection parser (CAN-2005-2661). stable/main/binary-mipsel/imapproxy_1.2.3-1sarge1_mipsel.deb up-imapproxy (1.2.3-1sarge1) stable-security; urgency=high * Non-maintainer upload by The Security Team. * Fixed format string vulnerability in connection parser (CAN-2005-2661). stable/main/binary-mips/imapproxy_1.2.3-1sarge1_mips.deb up-imapproxy (1.2.3-1sarge1) stable-security; urgency=high * Non-maintainer upload by The Security Team. * Fixed format string vulnerability in connection parser (CAN-2005-2661). stable/main/binary-m68k/imapproxy_1.2.3-1sarge1_m68k.deb up-imapproxy (1.2.3-1sarge1) stable-security; urgency=high * Non-maintainer upload by The Security Team. * Fixed format string vulnerability in connection parser (CAN-2005-2661). stable/main/binary-ia64/imapproxy_1.2.3-1sarge1_ia64.deb up-imapproxy (1.2.3-1sarge1) stable-security; urgency=high * Non-maintainer upload by The Security Team. * Fixed format string vulnerability in connection parser (CAN-2005-2661). stable/main/binary-hppa/imapproxy_1.2.3-1sarge1_hppa.deb up-imapproxy (1.2.3-1sarge1) stable-security; urgency=high * Non-maintainer upload by The Security Team. * Fixed format string vulnerability in connection parser (CAN-2005-2661). stable/main/binary-arm/imapproxy_1.2.3-1sarge1_arm.deb up-imapproxy (1.2.3-1sarge1) stable-security; urgency=high * Non-maintainer upload by The Security Team. * Fixed format string vulnerability in connection parser (CAN-2005-2661). stable/main/binary-alpha/imapproxy_1.2.3-1sarge1_alpha.deb up-imapproxy (1.2.3-1sarge1) stable-security; urgency=high * Non-maintainer upload by The Security Team. * Fixed format string vulnerability in connection parser (CAN-2005-2661). stable/main/source/up-imapproxy_1.2.3-1sarge1.dsc stable/main/source/up-imapproxy_1.2.3-1sarge1.diff.gz stable/main/binary-i386/imapproxy_1.2.3-1sarge1_i386.deb up-imapproxy (1.2.3-1sarge1) stable-security; urgency=high * Non-maintainer upload by The Security Team. * Fixed format string vulnerability in connection parser (CAN-2005-2661). stable/main/binary-sparc/unzip_5.52-1sarge2_sparc.deb unzip (5.52-1sarge2) stable-security; urgency=low * Fixed CAN-2005-2475 as it will be fixed in unzip 5.53. * Changed unzip banner line. This is a modified release. stable/main/binary-s390/unzip_5.52-1sarge2_s390.deb unzip (5.52-1sarge2) stable-security; urgency=low * Fixed CAN-2005-2475 as it will be fixed in unzip 5.53. * Changed unzip banner line. This is a modified release. stable/main/binary-mipsel/unzip_5.52-1sarge2_mipsel.deb unzip (5.52-1sarge2) stable-security; urgency=low * Fixed CAN-2005-2475 as it will be fixed in unzip 5.53. * Changed unzip banner line. This is a modified release. stable/main/binary-mips/unzip_5.52-1sarge2_mips.deb unzip (5.52-1sarge2) stable-security; urgency=low * Fixed CAN-2005-2475 as it will be fixed in unzip 5.53. * Changed unzip banner line. This is a modified release. stable/main/binary-m68k/unzip_5.52-1sarge2_m68k.deb unzip (5.52-1sarge2) stable-security; urgency=low * Fixed CAN-2005-2475 as it will be fixed in unzip 5.53. * Changed unzip banner line. This is a modified release. stable/main/binary-ia64/unzip_5.52-1sarge2_ia64.deb unzip (5.52-1sarge2) stable-security; urgency=low * Fixed CAN-2005-2475 as it will be fixed in unzip 5.53. * Changed unzip banner line. This is a modified release. stable/main/binary-i386/unzip_5.52-1sarge2_i386.deb unzip (5.52-1sarge2) stable-security; urgency=low * Fixed CAN-2005-2475 as it will be fixed in unzip 5.53. * Changed unzip banner line. This is a modified release. stable/main/binary-hppa/unzip_5.52-1sarge2_hppa.deb unzip (5.52-1sarge2) stable-security; urgency=low * Fixed CAN-2005-2475 as it will be fixed in unzip 5.53. * Changed unzip banner line. This is a modified release. stable/main/binary-arm/unzip_5.52-1sarge2_arm.deb unzip (5.52-1sarge2) stable-security; urgency=low * Fixed CAN-2005-2475 as it will be fixed in unzip 5.53. * Changed unzip banner line. This is a modified release. stable/main/binary-alpha/unzip_5.52-1sarge2_alpha.deb unzip (5.52-1sarge2) stable-security; urgency=low * Fixed CAN-2005-2475 as it will be fixed in unzip 5.53. * Changed unzip banner line. This is a modified release. stable/main/source/unzip_5.52-1sarge2.dsc stable/main/binary-powerpc/unzip_5.52-1sarge2_powerpc.deb stable/main/source/unzip_5.52-1sarge2.diff.gz unzip (5.52-1sarge2) stable-security; urgency=low * Fixed CAN-2005-2475 as it will be fixed in unzip 5.53. * Changed unzip banner line. This is a modified release. stable/main/binary-sparc/uim-m17nlib_0.4.6final1-3sarge1_sparc.deb stable/main/binary-sparc/uim-skk_0.4.6final1-3sarge1_sparc.deb stable/main/binary-sparc/uim-anthy_0.4.6final1-3sarge1_sparc.deb stable/main/binary-sparc/uim-fep_0.4.6final1-3sarge1_sparc.deb stable/main/binary-sparc/libuim0-nox-dbg_0.4.6final1-3sarge1_sparc.deb stable/main/binary-sparc/libuim-dev_0.4.6final1-3sarge1_sparc.deb stable/main/binary-sparc/libuim0_0.4.6final1-3sarge1_sparc.deb stable/main/binary-sparc/uim-prime_0.4.6final1-3sarge1_sparc.deb stable/main/binary-sparc/uim-xim_0.4.6final1-3sarge1_sparc.deb stable/main/binary-sparc/libuim0-nox_0.4.6final1-3sarge1_sparc.deb stable/main/binary-sparc/uim-utils_0.4.6final1-3sarge1_sparc.deb stable/main/binary-sparc/uim-applet-gnome_0.4.6final1-3sarge1_sparc.deb stable/main/binary-sparc/libuim0-dbg_0.4.6final1-3sarge1_sparc.deb stable/main/binary-sparc/libuim-nox-dev_0.4.6final1-3sarge1_sparc.deb stable/main/binary-sparc/uim-gtk2.0_0.4.6final1-3sarge1_sparc.deb stable/main/binary-sparc/uim-canna_0.4.6final1-3sarge1_sparc.deb uim (1:0.4.6final1-3sarge1) stable-security; urgency=high * Non-maintainer upload by the Security Team * Backported upstream patch to fix privilege escalation [scm/custom-rt.scm, uim/uim-custom.c, uim/uim-helper.c, uim/uim-helper.h, CVE-2005-3149, Bug#331620) stable/main/binary-s390/libuim0-dbg_0.4.6final1-3sarge1_s390.deb stable/main/binary-s390/libuim-nox-dev_0.4.6final1-3sarge1_s390.deb stable/main/binary-s390/uim-gtk2.0_0.4.6final1-3sarge1_s390.deb stable/main/binary-s390/libuim0-nox_0.4.6final1-3sarge1_s390.deb stable/main/binary-s390/uim-canna_0.4.6final1-3sarge1_s390.deb stable/main/binary-s390/uim-m17nlib_0.4.6final1-3sarge1_s390.deb stable/main/binary-s390/libuim-dev_0.4.6final1-3sarge1_s390.deb stable/main/binary-s390/uim-utils_0.4.6final1-3sarge1_s390.deb stable/main/binary-s390/uim-fep_0.4.6final1-3sarge1_s390.deb stable/main/binary-s390/uim-applet-gnome_0.4.6final1-3sarge1_s390.deb stable/main/binary-s390/uim-xim_0.4.6final1-3sarge1_s390.deb stable/main/binary-s390/uim-prime_0.4.6final1-3sarge1_s390.deb stable/main/binary-s390/uim-anthy_0.4.6final1-3sarge1_s390.deb stable/main/binary-s390/uim-skk_0.4.6final1-3sarge1_s390.deb stable/main/binary-s390/libuim0_0.4.6final1-3sarge1_s390.deb stable/main/binary-s390/libuim0-nox-dbg_0.4.6final1-3sarge1_s390.deb uim (1:0.4.6final1-3sarge1) stable-security; urgency=high * Non-maintainer upload by the Security Team * Backported upstream patch to fix privilege escalation [scm/custom-rt.scm, uim/uim-custom.c, uim/uim-helper.c, uim/uim-helper.h, CVE-2005-3149, Bug#331620) stable/main/binary-mipsel/uim-applet-gnome_0.4.6final1-3sarge1_mipsel.deb stable/main/binary-mipsel/uim-skk_0.4.6final1-3sarge1_mipsel.deb stable/main/binary-mipsel/libuim0-nox-dbg_0.4.6final1-3sarge1_mipsel.deb stable/main/binary-mipsel/libuim0-dbg_0.4.6final1-3sarge1_mipsel.deb stable/main/binary-mipsel/uim-canna_0.4.6final1-3sarge1_mipsel.deb stable/main/binary-mipsel/uim-anthy_0.4.6final1-3sarge1_mipsel.deb stable/main/binary-mipsel/uim-fep_0.4.6final1-3sarge1_mipsel.deb stable/main/binary-mipsel/uim-m17nlib_0.4.6final1-3sarge1_mipsel.deb stable/main/binary-mipsel/libuim-dev_0.4.6final1-3sarge1_mipsel.deb stable/main/binary-mipsel/libuim0-nox_0.4.6final1-3sarge1_mipsel.deb stable/main/binary-mipsel/libuim-nox-dev_0.4.6final1-3sarge1_mipsel.deb stable/main/binary-mipsel/uim-gtk2.0_0.4.6final1-3sarge1_mipsel.deb stable/main/binary-mipsel/libuim0_0.4.6final1-3sarge1_mipsel.deb stable/main/binary-mipsel/uim-utils_0.4.6final1-3sarge1_mipsel.deb stable/main/binary-mipsel/uim-prime_0.4.6final1-3sarge1_mipsel.deb stable/main/binary-mipsel/uim-xim_0.4.6final1-3sarge1_mipsel.deb uim (1:0.4.6final1-3sarge1) stable-security; urgency=high * Non-maintainer upload by the Security Team * Backported upstream patch to fix privilege escalation [scm/custom-rt.scm, uim/uim-custom.c, uim/uim-helper.c, uim/uim-helper.h, CVE-2005-3149, Bug#331620) stable/main/binary-mips/uim-canna_0.4.6final1-3sarge1_mips.deb stable/main/binary-mips/libuim0-dbg_0.4.6final1-3sarge1_mips.deb stable/main/binary-mips/uim-anthy_0.4.6final1-3sarge1_mips.deb stable/main/binary-mips/libuim-nox-dev_0.4.6final1-3sarge1_mips.deb stable/main/binary-mips/uim-fep_0.4.6final1-3sarge1_mips.deb stable/main/binary-mips/uim-m17nlib_0.4.6final1-3sarge1_mips.deb stable/main/binary-mips/uim-utils_0.4.6final1-3sarge1_mips.deb stable/main/binary-mips/uim-applet-gnome_0.4.6final1-3sarge1_mips.deb stable/main/binary-mips/libuim0-nox-dbg_0.4.6final1-3sarge1_mips.deb stable/main/binary-mips/libuim0_0.4.6final1-3sarge1_mips.deb stable/main/binary-mips/uim-prime_0.4.6final1-3sarge1_mips.deb stable/main/binary-mips/uim-gtk2.0_0.4.6final1-3sarge1_mips.deb stable/main/binary-mips/libuim-dev_0.4.6final1-3sarge1_mips.deb stable/main/binary-mips/uim-xim_0.4.6final1-3sarge1_mips.deb stable/main/binary-mips/libuim0-nox_0.4.6final1-3sarge1_mips.deb stable/main/binary-mips/uim-skk_0.4.6final1-3sarge1_mips.deb uim (1:0.4.6final1-3sarge1) stable-security; urgency=high * Non-maintainer upload by the Security Team * Backported upstream patch to fix privilege escalation [scm/custom-rt.scm, uim/uim-custom.c, uim/uim-helper.c, uim/uim-helper.h, CVE-2005-3149, Bug#331620) stable/main/binary-m68k/libuim0-nox_0.4.6final1-3sarge1_m68k.deb stable/main/binary-m68k/uim-gtk2.0_0.4.6final1-3sarge1_m68k.deb stable/main/binary-m68k/uim-prime_0.4.6final1-3sarge1_m68k.deb stable/main/binary-m68k/libuim0-nox-dbg_0.4.6final1-3sarge1_m68k.deb stable/main/binary-m68k/libuim0_0.4.6final1-3sarge1_m68k.deb stable/main/binary-m68k/uim-utils_0.4.6final1-3sarge1_m68k.deb stable/main/binary-m68k/uim-applet-gnome_0.4.6final1-3sarge1_m68k.deb stable/main/binary-m68k/libuim-nox-dev_0.4.6final1-3sarge1_m68k.deb stable/main/binary-m68k/libuim0-dbg_0.4.6final1-3sarge1_m68k.deb stable/main/binary-m68k/uim-anthy_0.4.6final1-3sarge1_m68k.deb stable/main/binary-m68k/uim-m17nlib_0.4.6final1-3sarge1_m68k.deb stable/main/binary-m68k/uim-canna_0.4.6final1-3sarge1_m68k.deb stable/main/binary-m68k/libuim-dev_0.4.6final1-3sarge1_m68k.deb stable/main/binary-m68k/uim-skk_0.4.6final1-3sarge1_m68k.deb stable/main/binary-m68k/uim-fep_0.4.6final1-3sarge1_m68k.deb stable/main/binary-m68k/uim-xim_0.4.6final1-3sarge1_m68k.deb uim (1:0.4.6final1-3sarge1) stable-security; urgency=high * Non-maintainer upload by the Security Team * Backported upstream patch to fix privilege escalation [scm/custom-rt.scm, uim/uim-custom.c, uim/uim-helper.c, uim/uim-helper.h, CVE-2005-3149, Bug#331620) stable/main/binary-ia64/uim-utils_0.4.6final1-3sarge1_ia64.deb stable/main/binary-ia64/libuim0-dbg_0.4.6final1-3sarge1_ia64.deb stable/main/binary-ia64/libuim-nox-dev_0.4.6final1-3sarge1_ia64.deb stable/main/binary-ia64/uim-gtk2.0_0.4.6final1-3sarge1_ia64.deb stable/main/binary-ia64/uim-canna_0.4.6final1-3sarge1_ia64.deb stable/main/binary-ia64/uim-applet-gnome_0.4.6final1-3sarge1_ia64.deb stable/main/binary-ia64/libuim-dev_0.4.6final1-3sarge1_ia64.deb stable/main/binary-ia64/uim-fep_0.4.6final1-3sarge1_ia64.deb stable/main/binary-ia64/uim-xim_0.4.6final1-3sarge1_ia64.deb stable/main/binary-ia64/uim-prime_0.4.6final1-3sarge1_ia64.deb stable/main/binary-ia64/uim-m17nlib_0.4.6final1-3sarge1_ia64.deb stable/main/binary-ia64/uim-skk_0.4.6final1-3sarge1_ia64.deb stable/main/binary-ia64/libuim0-nox-dbg_0.4.6final1-3sarge1_ia64.deb stable/main/binary-ia64/libuim0_0.4.6final1-3sarge1_ia64.deb stable/main/binary-ia64/uim-anthy_0.4.6final1-3sarge1_ia64.deb stable/main/binary-ia64/libuim0-nox_0.4.6final1-3sarge1_ia64.deb uim (1:0.4.6final1-3sarge1) stable-security; urgency=high * Non-maintainer upload by the Security Team * Backported upstream patch to fix privilege escalation [scm/custom-rt.scm, uim/uim-custom.c, uim/uim-helper.c, uim/uim-helper.h, CVE-2005-3149, Bug#331620) stable/main/binary-i386/uim-fep_0.4.6final1-3sarge1_i386.deb stable/main/binary-i386/libuim0_0.4.6final1-3sarge1_i386.deb stable/main/binary-i386/uim-skk_0.4.6final1-3sarge1_i386.deb stable/main/binary-i386/libuim0-nox_0.4.6final1-3sarge1_i386.deb stable/main/binary-i386/uim-utils_0.4.6final1-3sarge1_i386.deb stable/main/binary-i386/uim-canna_0.4.6final1-3sarge1_i386.deb stable/main/binary-i386/uim-xim_0.4.6final1-3sarge1_i386.deb stable/main/binary-i386/libuim-dev_0.4.6final1-3sarge1_i386.deb stable/main/binary-i386/libuim0-dbg_0.4.6final1-3sarge1_i386.deb stable/main/binary-i386/uim-applet-gnome_0.4.6final1-3sarge1_i386.deb stable/main/binary-i386/uim-m17nlib_0.4.6final1-3sarge1_i386.deb stable/main/binary-i386/uim-anthy_0.4.6final1-3sarge1_i386.deb stable/main/binary-i386/uim-gtk2.0_0.4.6final1-3sarge1_i386.deb stable/main/binary-i386/uim-prime_0.4.6final1-3sarge1_i386.deb stable/main/binary-i386/libuim-nox-dev_0.4.6final1-3sarge1_i386.deb stable/main/binary-i386/libuim0-nox-dbg_0.4.6final1-3sarge1_i386.deb uim (1:0.4.6final1-3sarge1) stable-security; urgency=high * Non-maintainer upload by the Security Team * Backported upstream patch to fix privilege escalation [scm/custom-rt.scm, uim/uim-custom.c, uim/uim-helper.c, uim/uim-helper.h, CVE-2005-3149, Bug#331620) stable/main/binary-hppa/uim-xim_0.4.6final1-3sarge1_hppa.deb stable/main/binary-hppa/uim-gtk2.0_0.4.6final1-3sarge1_hppa.deb stable/main/binary-hppa/libuim-dev_0.4.6final1-3sarge1_hppa.deb stable/main/binary-hppa/libuim0_0.4.6final1-3sarge1_hppa.deb stable/main/binary-hppa/uim-applet-gnome_0.4.6final1-3sarge1_hppa.deb stable/main/binary-hppa/uim-canna_0.4.6final1-3sarge1_hppa.deb stable/main/binary-hppa/uim-skk_0.4.6final1-3sarge1_hppa.deb stable/main/binary-hppa/libuim0-nox_0.4.6final1-3sarge1_hppa.deb stable/main/binary-hppa/uim-prime_0.4.6final1-3sarge1_hppa.deb stable/main/binary-hppa/uim-fep_0.4.6final1-3sarge1_hppa.deb stable/main/binary-hppa/libuim0-nox-dbg_0.4.6final1-3sarge1_hppa.deb stable/main/binary-hppa/libuim0-dbg_0.4.6final1-3sarge1_hppa.deb stable/main/binary-hppa/uim-utils_0.4.6final1-3sarge1_hppa.deb stable/main/binary-hppa/libuim-nox-dev_0.4.6final1-3sarge1_hppa.deb stable/main/binary-hppa/uim-anthy_0.4.6final1-3sarge1_hppa.deb stable/main/binary-hppa/uim-m17nlib_0.4.6final1-3sarge1_hppa.deb uim (1:0.4.6final1-3sarge1) stable-security; urgency=high * Non-maintainer upload by the Security Team * Backported upstream patch to fix privilege escalation [scm/custom-rt.scm, uim/uim-custom.c, uim/uim-helper.c, uim/uim-helper.h, CVE-2005-3149, Bug#331620) stable/main/binary-arm/libuim0-nox-dbg_0.4.6final1-3sarge1_arm.deb stable/main/binary-arm/uim-prime_0.4.6final1-3sarge1_arm.deb stable/main/binary-arm/uim-anthy_0.4.6final1-3sarge1_arm.deb stable/main/binary-arm/uim-xim_0.4.6final1-3sarge1_arm.deb stable/main/binary-arm/libuim-dev_0.4.6final1-3sarge1_arm.deb stable/main/binary-arm/uim-canna_0.4.6final1-3sarge1_arm.deb stable/main/binary-arm/libuim0_0.4.6final1-3sarge1_arm.deb stable/main/binary-arm/uim-gtk2.0_0.4.6final1-3sarge1_arm.deb stable/main/binary-arm/uim-applet-gnome_0.4.6final1-3sarge1_arm.deb stable/main/binary-arm/uim-fep_0.4.6final1-3sarge1_arm.deb stable/main/binary-arm/libuim0-dbg_0.4.6final1-3sarge1_arm.deb stable/main/binary-arm/libuim-nox-dev_0.4.6final1-3sarge1_arm.deb stable/main/binary-arm/uim-skk_0.4.6final1-3sarge1_arm.deb stable/main/binary-arm/uim-m17nlib_0.4.6final1-3sarge1_arm.deb stable/main/binary-arm/libuim0-nox_0.4.6final1-3sarge1_arm.deb stable/main/binary-arm/uim-utils_0.4.6final1-3sarge1_arm.deb uim (1:0.4.6final1-3sarge1) stable-security; urgency=high * Non-maintainer upload by the Security Team * Backported upstream patch to fix privilege escalation [scm/custom-rt.scm, uim/uim-custom.c, uim/uim-helper.c, uim/uim-helper.h, CVE-2005-3149, Bug#331620) stable/main/binary-alpha/uim-canna_0.4.6final1-3sarge1_alpha.deb stable/main/binary-alpha/libuim-nox-dev_0.4.6final1-3sarge1_alpha.deb stable/main/binary-alpha/libuim0-dbg_0.4.6final1-3sarge1_alpha.deb stable/main/binary-alpha/uim-skk_0.4.6final1-3sarge1_alpha.deb stable/main/binary-alpha/uim-anthy_0.4.6final1-3sarge1_alpha.deb stable/main/binary-alpha/uim-fep_0.4.6final1-3sarge1_alpha.deb stable/main/binary-alpha/uim-m17nlib_0.4.6final1-3sarge1_alpha.deb stable/main/binary-alpha/uim-xim_0.4.6final1-3sarge1_alpha.deb stable/main/binary-alpha/uim-gtk2.0_0.4.6final1-3sarge1_alpha.deb stable/main/binary-alpha/uim-prime_0.4.6final1-3sarge1_alpha.deb stable/main/binary-alpha/uim-applet-gnome_0.4.6final1-3sarge1_alpha.deb stable/main/binary-alpha/libuim-dev_0.4.6final1-3sarge1_alpha.deb stable/main/binary-alpha/libuim0-nox_0.4.6final1-3sarge1_alpha.deb stable/main/binary-alpha/libuim0_0.4.6final1-3sarge1_alpha.deb stable/main/binary-alpha/uim-utils_0.4.6final1-3sarge1_alpha.deb stable/main/binary-alpha/libuim0-nox-dbg_0.4.6final1-3sarge1_alpha.deb uim (1:0.4.6final1-3sarge1) stable-security; urgency=high * Non-maintainer upload by the Security Team * Backported upstream patch to fix privilege escalation [scm/custom-rt.scm, uim/uim-custom.c, uim/uim-helper.c, uim/uim-helper.h, CVE-2005-3149, Bug#331620) stable/main/binary-powerpc/libuim0-nox_0.4.6final1-3sarge1_powerpc.deb stable/main/binary-powerpc/uim-m17nlib_0.4.6final1-3sarge1_powerpc.deb stable/main/binary-all/uim-common_0.4.6final1-3sarge1_all.deb stable/main/binary-powerpc/uim-utils_0.4.6final1-3sarge1_powerpc.deb stable/main/binary-powerpc/libuim0-dbg_0.4.6final1-3sarge1_powerpc.deb stable/main/binary-powerpc/uim-prime_0.4.6final1-3sarge1_powerpc.deb stable/main/source/uim_0.4.6final1-3sarge1.diff.gz stable/main/binary-powerpc/libuim-nox-dev_0.4.6final1-3sarge1_powerpc.deb stable/main/binary-powerpc/libuim0_0.4.6final1-3sarge1_powerpc.deb stable/main/source/uim_0.4.6final1-3sarge1.dsc stable/main/binary-all/uim_0.4.6final1-3sarge1_all.deb stable/main/binary-powerpc/uim-gtk2.0_0.4.6final1-3sarge1_powerpc.deb stable/main/binary-powerpc/uim-fep_0.4.6final1-3sarge1_powerpc.deb stable/main/binary-powerpc/libuim-dev_0.4.6final1-3sarge1_powerpc.deb stable/main/binary-powerpc/uim-applet-gnome_0.4.6final1-3sarge1_powerpc.deb stable/main/binary-powerpc/uim-canna_0.4.6final1-3sarge1_powerpc.deb stable/main/binary-powerpc/uim-skk_0.4.6final1-3sarge1_powerpc.deb stable/main/binary-powerpc/libuim0-nox-dbg_0.4.6final1-3sarge1_powerpc.deb stable/main/binary-powerpc/uim-anthy_0.4.6final1-3sarge1_powerpc.deb stable/main/binary-powerpc/uim-xim_0.4.6final1-3sarge1_powerpc.deb uim (1:0.4.6final1-3sarge1) stable-security; urgency=high * Non-maintainer upload by the Security Team * Backported upstream patch to fix privilege escalation [scm/custom-rt.scm, uim/uim-custom.c, uim/uim-helper.c, uim/uim-helper.h, CVE-2005-3149, Bug#331620) stable/main/source/turqstat_2.2.2sarge1.dsc stable/main/binary-powerpc/xturqstat_2.2.2sarge1_powerpc.deb stable/main/binary-powerpc/turqstat_2.2.2sarge1_powerpc.deb stable/main/source/turqstat_2.2.2sarge1.tar.gz turqstat (2.2.2sarge1) stable-security; urgency=high * Applied upstream patch to fix buffer overflow in date parser [utility.cpp, CAN-2005-2658] stable/main/source/trac_0.8.1-3sarge2.dsc stable/main/binary-all/trac_0.8.1-3sarge2_all.deb stable/main/source/trac_0.8.1-3sarge2.diff.gz trac (0.8.1-3sarge2) stable-security; urgency=high * Non-maintainer upload by the Security Team * Acknowledged patch from proposed-updates stable/main/binary-sparc/thttpd_2.23beta1-3sarge1_sparc.deb stable/main/binary-sparc/thttpd-util_2.23beta1-3sarge1_sparc.deb thttpd (2.23beta1-3sarge1) stable-security; urgency=high * Non-maintainer upload by the Security Team * Applied patch by Javier Fernández-Sanguino Peña to fix insecure temporary file [extras/syslogtocern, CVE-2005-3124] stable/main/binary-s390/thttpd_2.23beta1-3sarge1_s390.deb stable/main/binary-s390/thttpd-util_2.23beta1-3sarge1_s390.deb thttpd (2.23beta1-3sarge1) stable-security; urgency=high * Non-maintainer upload by the Security Team * Applied patch by Javier Fernández-Sanguino Peña to fix insecure temporary file [extras/syslogtocern, CVE-2005-3124] stable/main/binary-mipsel/thttpd-util_2.23beta1-3sarge1_mipsel.deb stable/main/binary-mipsel/thttpd_2.23beta1-3sarge1_mipsel.deb thttpd (2.23beta1-3sarge1) stable-security; urgency=high * Non-maintainer upload by the Security Team * Applied patch by Javier Fernández-Sanguino Peña to fix insecure temporary file [extras/syslogtocern, CVE-2005-3124] stable/main/binary-mips/thttpd_2.23beta1-3sarge1_mips.deb stable/main/binary-mips/thttpd-util_2.23beta1-3sarge1_mips.deb thttpd (2.23beta1-3sarge1) stable-security; urgency=high * Non-maintainer upload by the Security Team * Applied patch by Javier Fernández-Sanguino Peña to fix insecure temporary file [extras/syslogtocern, CVE-2005-3124] stable/main/binary-m68k/thttpd_2.23beta1-3sarge1_m68k.deb stable/main/binary-m68k/thttpd-util_2.23beta1-3sarge1_m68k.deb thttpd (2.23beta1-3sarge1) stable-security; urgency=high * Non-maintainer upload by the Security Team * Applied patch by Javier Fernández-Sanguino Peña to fix insecure temporary file [extras/syslogtocern, CVE-2005-3124] stable/main/binary-ia64/thttpd-util_2.23beta1-3sarge1_ia64.deb stable/main/binary-ia64/thttpd_2.23beta1-3sarge1_ia64.deb thttpd (2.23beta1-3sarge1) stable-security; urgency=high * Non-maintainer upload by the Security Team * Applied patch by Javier Fernández-Sanguino Peña to fix insecure temporary file [extras/syslogtocern, CVE-2005-3124] stable/main/binary-i386/thttpd-util_2.23beta1-3sarge1_i386.deb stable/main/binary-i386/thttpd_2.23beta1-3sarge1_i386.deb thttpd (2.23beta1-3sarge1) stable-security; urgency=high * Non-maintainer upload by the Security Team * Applied patch by Javier Fernández-Sanguino Peña to fix insecure temporary file [extras/syslogtocern, CVE-2005-3124] stable/main/binary-hppa/thttpd_2.23beta1-3sarge1_hppa.deb stable/main/binary-hppa/thttpd-util_2.23beta1-3sarge1_hppa.deb thttpd (2.23beta1-3sarge1) stable-security; urgency=high * Non-maintainer upload by the Security Team * Applied patch by Javier Fernández-Sanguino Peña to fix insecure temporary file [extras/syslogtocern, CVE-2005-3124] stable/main/binary-arm/thttpd_2.23beta1-3sarge1_arm.deb stable/main/binary-arm/thttpd-util_2.23beta1-3sarge1_arm.deb thttpd (2.23beta1-3sarge1) stable-security; urgency=high * Non-maintainer upload by the Security Team * Applied patch by Javier Fernández-Sanguino Peña to fix insecure temporary file [extras/syslogtocern, CVE-2005-3124] stable/main/binary-alpha/thttpd_2.23beta1-3sarge1_alpha.deb stable/main/binary-alpha/thttpd-util_2.23beta1-3sarge1_alpha.deb thttpd (2.23beta1-3sarge1) stable-security; urgency=high * Non-maintainer upload by the Security Team * Applied patch by Javier Fernández-Sanguino Peña to fix insecure temporary file [extras/syslogtocern, CVE-2005-3124] stable/main/binary-powerpc/thttpd-util_2.23beta1-3sarge1_powerpc.deb stable/main/source/thttpd_2.23beta1-3sarge1.diff.gz stable/main/binary-powerpc/thttpd_2.23beta1-3sarge1_powerpc.deb stable/main/source/thttpd_2.23beta1-3sarge1.dsc thttpd (2.23beta1-3sarge1) stable-security; urgency=high * Non-maintainer upload by the Security Team * Applied patch by Javier Fernández-Sanguino Peña to fix insecure temporary file [extras/syslogtocern, CVE-2005-3124] stable/main/binary-all/tdiary_2.0.1-1sarge1_all.deb stable/main/source/tdiary_2.0.1-1sarge1.dsc stable/main/source/tdiary_2.0.1-1sarge1.diff.gz stable/main/binary-all/tdiary-plugin_2.0.1-1sarge1_all.deb stable/main/binary-all/tdiary-contrib_2.0.1-1sarge1_all.deb stable/main/binary-all/tdiary-mode_2.0.1-1sarge1_all.deb stable/main/binary-all/tdiary-theme_2.0.1-1sarge1_all.deb tdiary (2.0.1-1sarge1) stable-security; urgency=high * Non-maintainer upload by the Security Team * Applied upstream patch to fix Cross Site Request-Forgery [misc/i18n/tdiary.conf.sample-en, misc/plugin/image.rb, skel/preview.rhtml, skel/preview.rhtml.en, skel/preview.rhtml.zh, skel/i.update.rhtml, skel/i.update.rhtml.en, skel/i.update.rhtml.zh, skel/update.rhtml, skel/conf.rhtml, skel/update.rhtml.en, skel/update.rhtml.zh, plugin/en/00default.rb, plugin/ja/00default.rb, plugin/zh/00default.rb, plugin/00default.rb, tdiary.conf.sample, tdiary.rb, misc/plugin/en/category.rb, misc/plugin/ja/category.rb, misc/plugin/zh/category.rb, misc/plugin/category.rb, CAN-2005-2411] stable/main/binary-sparc/tcpdump_3.8.3-5sarge1_sparc.deb tcpdump (3.8.3-5sarge1) stable-security; urgency=high * Non-maintainer upload by the Security Team * Applied Gentoo patch to fix infinite loop in BGP dissector [debian/patches/55_CAN-2005-1267.dpatch, print-bgp.c] stable/main/binary-s390/tcpdump_3.8.3-5sarge1_s390.deb tcpdump (3.8.3-5sarge1) stable-security; urgency=high * Non-maintainer upload by the Security Team * Applied Gentoo patch to fix infinite loop in BGP dissector [debian/patches/55_CAN-2005-1267.dpatch, print-bgp.c] stable/main/binary-mipsel/tcpdump_3.8.3-5sarge1_mipsel.deb tcpdump (3.8.3-5sarge1) stable-security; urgency=high * Non-maintainer upload by the Security Team * Applied Gentoo patch to fix infinite loop in BGP dissector [debian/patches/55_CAN-2005-1267.dpatch, print-bgp.c] stable/main/binary-mips/tcpdump_3.8.3-5sarge1_mips.deb tcpdump (3.8.3-5sarge1) stable-security; urgency=high * Non-maintainer upload by the Security Team * Applied Gentoo patch to fix infinite loop in BGP dissector [debian/patches/55_CAN-2005-1267.dpatch, print-bgp.c] stable/main/binary-m68k/tcpdump_3.8.3-5sarge1_m68k.deb tcpdump (3.8.3-5sarge1) stable-security; urgency=high * Non-maintainer upload by the Security Team * Applied Gentoo patch to fix infinite loop in BGP dissector [debian/patches/55_CAN-2005-1267.dpatch, print-bgp.c] stable/main/binary-ia64/tcpdump_3.8.3-5sarge1_ia64.deb tcpdump (3.8.3-5sarge1) stable-security; urgency=high * Non-maintainer upload by the Security Team * Applied Gentoo patch to fix infinite loop in BGP dissector [debian/patches/55_CAN-2005-1267.dpatch, print-bgp.c] stable/main/binary-i386/tcpdump_3.8.3-5sarge1_i386.deb tcpdump (3.8.3-5sarge1) stable-security; urgency=high * Non-maintainer upload by the Security Team * Applied Gentoo patch to fix infinite loop in BGP dissector [debian/patches/55_CAN-2005-1267.dpatch, print-bgp.c] stable/main/binary-hppa/tcpdump_3.8.3-5sarge1_hppa.deb tcpdump (3.8.3-5sarge1) stable-security; urgency=high * Non-maintainer upload by the Security Team * Applied Gentoo patch to fix infinite loop in BGP dissector [debian/patches/55_CAN-2005-1267.dpatch, print-bgp.c] stable/main/binary-arm/tcpdump_3.8.3-5sarge1_arm.deb tcpdump (3.8.3-5sarge1) stable-security; urgency=high * Non-maintainer upload by the Security Team * Applied Gentoo patch to fix infinite loop in BGP dissector [debian/patches/55_CAN-2005-1267.dpatch, print-bgp.c] stable/main/binary-alpha/tcpdump_3.8.3-5sarge1_alpha.deb tcpdump (3.8.3-5sarge1) stable-security; urgency=high * Non-maintainer upload by the Security Team * Applied Gentoo patch to fix infinite loop in BGP dissector [debian/patches/55_CAN-2005-1267.dpatch, print-bgp.c] stable/main/source/tcpdump_3.8.3-5sarge1.diff.gz stable/main/binary-powerpc/tcpdump_3.8.3-5sarge1_powerpc.deb stable/main/source/tcpdump_3.8.3-5sarge1.dsc tcpdump (3.8.3-5sarge1) stable-security; urgency=high * Non-maintainer upload by the Security Team * Applied Gentoo patch to fix infinite loop in BGP dissector [debian/patches/55_CAN-2005-1267.dpatch, print-bgp.c] stable/main/binary-sparc/sylpheed-claws-clamav_1.0.4-1sarge1_sparc.deb stable/main/binary-sparc/sylpheed-claws-dillo-viewer_1.0.4-1sarge1_sparc.deb stable/main/binary-sparc/sylpheed-claws-image-viewer_1.0.4-1sarge1_sparc.deb stable/main/binary-sparc/sylpheed-claws_1.0.4-1sarge1_sparc.deb stable/main/binary-sparc/sylpheed-claws-pgpmime_1.0.4-1sarge1_sparc.deb stable/main/binary-sparc/sylpheed-claws-trayicon_1.0.4-1sarge1_sparc.deb stable/main/binary-sparc/sylpheed-claws-spamassassin_1.0.4-1sarge1_sparc.deb stable/main/binary-sparc/libsylpheed-claws-dev_1.0.4-1sarge1_sparc.deb sylpheed-claws (1.0.4-1sarge1) stable-security; urgency=high * Non-maintainer upload by the security team * Applied upstream patch to fix arbitrary code execution in various importer routines [src/ldif.c, src/pine.c, src/mutt.c, CVE-2005-3354, debian/patches/11security_CVE-2005-3354.patch] stable/main/binary-s390/sylpheed-claws_1.0.4-1sarge1_s390.deb stable/main/binary-s390/sylpheed-claws-pgpmime_1.0.4-1sarge1_s390.deb stable/main/binary-s390/sylpheed-claws-image-viewer_1.0.4-1sarge1_s390.deb stable/main/binary-s390/sylpheed-claws-spamassassin_1.0.4-1sarge1_s390.deb stable/main/binary-s390/libsylpheed-claws-dev_1.0.4-1sarge1_s390.deb stable/main/binary-s390/sylpheed-claws-clamav_1.0.4-1sarge1_s390.deb stable/main/binary-s390/sylpheed-claws-dillo-viewer_1.0.4-1sarge1_s390.deb stable/main/binary-s390/sylpheed-claws-trayicon_1.0.4-1sarge1_s390.deb sylpheed-claws (1.0.4-1sarge1) stable-security; urgency=high * Non-maintainer upload by the security team * Applied upstream patch to fix arbitrary code execution in various importer routines [src/ldif.c, src/pine.c, src/mutt.c, CVE-2005-3354, debian/patches/11security_CVE-2005-3354.patch] stable/main/binary-mipsel/sylpheed-claws-image-viewer_1.0.4-1sarge1_mipsel.deb stable/main/binary-mipsel/libsylpheed-claws-dev_1.0.4-1sarge1_mipsel.deb stable/main/binary-mipsel/sylpheed-claws-clamav_1.0.4-1sarge1_mipsel.deb stable/main/binary-mipsel/sylpheed-claws-pgpmime_1.0.4-1sarge1_mipsel.deb stable/main/binary-mipsel/sylpheed-claws-spamassassin_1.0.4-1sarge1_mipsel.deb stable/main/binary-mipsel/sylpheed-claws-trayicon_1.0.4-1sarge1_mipsel.deb stable/main/binary-mipsel/sylpheed-claws_1.0.4-1sarge1_mipsel.deb stable/main/binary-mipsel/sylpheed-claws-dillo-viewer_1.0.4-1sarge1_mipsel.deb sylpheed-claws (1.0.4-1sarge1) stable-security; urgency=high * Non-maintainer upload by the security team * Applied upstream patch to fix arbitrary code execution in various importer routines [src/ldif.c, src/pine.c, src/mutt.c, CVE-2005-3354, debian/patches/11security_CVE-2005-3354.patch] stable/main/binary-mips/sylpheed-claws-image-viewer_1.0.4-1sarge1_mips.deb stable/main/binary-mips/sylpheed-claws-clamav_1.0.4-1sarge1_mips.deb stable/main/binary-mips/sylpheed-claws_1.0.4-1sarge1_mips.deb stable/main/binary-mips/sylpheed-claws-spamassassin_1.0.4-1sarge1_mips.deb stable/main/binary-mips/sylpheed-claws-trayicon_1.0.4-1sarge1_mips.deb stable/main/binary-mips/libsylpheed-claws-dev_1.0.4-1sarge1_mips.deb stable/main/binary-mips/sylpheed-claws-pgpmime_1.0.4-1sarge1_mips.deb stable/main/binary-mips/sylpheed-claws-dillo-viewer_1.0.4-1sarge1_mips.deb sylpheed-claws (1.0.4-1sarge1) stable-security; urgency=high * Non-maintainer upload by the security team * Applied upstream patch to fix arbitrary code execution in various importer routines [src/ldif.c, src/pine.c, src/mutt.c, CVE-2005-3354, debian/patches/11security_CVE-2005-3354.patch] stable/main/binary-m68k/sylpheed-claws-pgpmime_1.0.4-1sarge1_m68k.deb stable/main/binary-m68k/sylpheed-claws-image-viewer_1.0.4-1sarge1_m68k.deb stable/main/binary-m68k/sylpheed-claws-dillo-viewer_1.0.4-1sarge1_m68k.deb stable/main/binary-m68k/sylpheed-claws-clamav_1.0.4-1sarge1_m68k.deb stable/main/binary-m68k/sylpheed-claws-trayicon_1.0.4-1sarge1_m68k.deb stable/main/binary-m68k/libsylpheed-claws-dev_1.0.4-1sarge1_m68k.deb stable/main/binary-m68k/sylpheed-claws-spamassassin_1.0.4-1sarge1_m68k.deb stable/main/binary-m68k/sylpheed-claws_1.0.4-1sarge1_m68k.deb sylpheed-claws (1.0.4-1sarge1) stable-security; urgency=high * Non-maintainer upload by the security team * Applied upstream patch to fix arbitrary code execution in various importer routines [src/ldif.c, src/pine.c, src/mutt.c, CVE-2005-3354, debian/patches/11security_CVE-2005-3354.patch] stable/main/binary-ia64/sylpheed-claws_1.0.4-1sarge1_ia64.deb stable/main/binary-ia64/libsylpheed-claws-dev_1.0.4-1sarge1_ia64.deb stable/main/binary-ia64/sylpheed-claws-clamav_1.0.4-1sarge1_ia64.deb stable/main/binary-ia64/sylpheed-claws-dillo-viewer_1.0.4-1sarge1_ia64.deb stable/main/binary-ia64/sylpheed-claws-image-viewer_1.0.4-1sarge1_ia64.deb stable/main/binary-ia64/sylpheed-claws-trayicon_1.0.4-1sarge1_ia64.deb stable/main/binary-ia64/sylpheed-claws-spamassassin_1.0.4-1sarge1_ia64.deb stable/main/binary-ia64/sylpheed-claws-pgpmime_1.0.4-1sarge1_ia64.deb sylpheed-claws (1.0.4-1sarge1) stable-security; urgency=high * Non-maintainer upload by the security team * Applied upstream patch to fix arbitrary code execution in various importer routines [src/ldif.c, src/pine.c, src/mutt.c, CVE-2005-3354, debian/patches/11security_CVE-2005-3354.patch] stable/main/binary-i386/sylpheed-claws-spamassassin_1.0.4-1sarge1_i386.deb stable/main/binary-i386/sylpheed-claws-dillo-viewer_1.0.4-1sarge1_i386.deb stable/main/binary-i386/sylpheed-claws-clamav_1.0.4-1sarge1_i386.deb stable/main/binary-i386/sylpheed-claws_1.0.4-1sarge1_i386.deb stable/main/binary-i386/sylpheed-claws-pgpmime_1.0.4-1sarge1_i386.deb stable/main/binary-i386/libsylpheed-claws-dev_1.0.4-1sarge1_i386.deb stable/main/binary-i386/sylpheed-claws-trayicon_1.0.4-1sarge1_i386.deb stable/main/binary-i386/sylpheed-claws-image-viewer_1.0.4-1sarge1_i386.deb sylpheed-claws (1.0.4-1sarge1) stable-security; urgency=high * Non-maintainer upload by the security team * Applied upstream patch to fix arbitrary code execution in various importer routines [src/ldif.c, src/pine.c, src/mutt.c, CVE-2005-3354, debian/patches/11security_CVE-2005-3354.patch] stable/main/binary-hppa/libsylpheed-claws-dev_1.0.4-1sarge1_hppa.deb stable/main/binary-hppa/sylpheed-claws-spamassassin_1.0.4-1sarge1_hppa.deb stable/main/binary-hppa/sylpheed-claws-pgpmime_1.0.4-1sarge1_hppa.deb stable/main/binary-hppa/sylpheed-claws-trayicon_1.0.4-1sarge1_hppa.deb stable/main/binary-hppa/sylpheed-claws-image-viewer_1.0.4-1sarge1_hppa.deb stable/main/binary-hppa/sylpheed-claws-clamav_1.0.4-1sarge1_hppa.deb stable/main/binary-hppa/sylpheed-claws-dillo-viewer_1.0.4-1sarge1_hppa.deb stable/main/binary-hppa/sylpheed-claws_1.0.4-1sarge1_hppa.deb sylpheed-claws (1.0.4-1sarge1) stable-security; urgency=high * Non-maintainer upload by the security team * Applied upstream patch to fix arbitrary code execution in various importer routines [src/ldif.c, src/pine.c, src/mutt.c, CVE-2005-3354, debian/patches/11security_CVE-2005-3354.patch] stable/main/binary-arm/sylpheed-claws_1.0.4-1sarge1_arm.deb stable/main/binary-arm/libsylpheed-claws-dev_1.0.4-1sarge1_arm.deb stable/main/binary-arm/sylpheed-claws-trayicon_1.0.4-1sarge1_arm.deb stable/main/binary-arm/sylpheed-claws-spamassassin_1.0.4-1sarge1_arm.deb stable/main/binary-arm/sylpheed-claws-image-viewer_1.0.4-1sarge1_arm.deb stable/main/binary-arm/sylpheed-claws-dillo-viewer_1.0.4-1sarge1_arm.deb stable/main/binary-arm/sylpheed-claws-pgpmime_1.0.4-1sarge1_arm.deb stable/main/binary-arm/sylpheed-claws-clamav_1.0.4-1sarge1_arm.deb sylpheed-claws (1.0.4-1sarge1) stable-security; urgency=high * Non-maintainer upload by the security team * Applied upstream patch to fix arbitrary code execution in various importer routines [src/ldif.c, src/pine.c, src/mutt.c, CVE-2005-3354, debian/patches/11security_CVE-2005-3354.patch] stable/main/binary-alpha/sylpheed-claws-pgpmime_1.0.4-1sarge1_alpha.deb stable/main/binary-alpha/sylpheed-claws-image-viewer_1.0.4-1sarge1_alpha.deb stable/main/binary-alpha/sylpheed-claws-spamassassin_1.0.4-1sarge1_alpha.deb stable/main/binary-alpha/sylpheed-claws_1.0.4-1sarge1_alpha.deb stable/main/binary-alpha/sylpheed-claws-dillo-viewer_1.0.4-1sarge1_alpha.deb stable/main/binary-alpha/sylpheed-claws-clamav_1.0.4-1sarge1_alpha.deb stable/main/binary-alpha/libsylpheed-claws-dev_1.0.4-1sarge1_alpha.deb stable/main/binary-alpha/sylpheed-claws-trayicon_1.0.4-1sarge1_alpha.deb sylpheed-claws (1.0.4-1sarge1) stable-security; urgency=high * Non-maintainer upload by the security team * Applied upstream patch to fix arbitrary code execution in various importer routines [src/ldif.c, src/pine.c, src/mutt.c, CVE-2005-3354, debian/patches/11security_CVE-2005-3354.patch] stable/main/source/sylpheed-claws_1.0.4-1sarge1.dsc stable/main/binary-all/sylpheed-claws-scripts_1.0.4-1sarge1_all.deb stable/main/source/sylpheed-claws_1.0.4-1sarge1.diff.gz stable/main/binary-all/sylpheed-claws-i18n_1.0.4-1sarge1_all.deb stable/main/binary-powerpc/sylpheed-claws-trayicon_1.0.4-1sarge1_powerpc.deb stable/main/binary-powerpc/sylpheed-claws-image-viewer_1.0.4-1sarge1_powerpc.deb stable/main/binary-all/sylpheed-claws-plugins_1.0.4-1sarge1_all.deb stable/main/binary-powerpc/libsylpheed-claws-dev_1.0.4-1sarge1_powerpc.deb stable/main/binary-powerpc/sylpheed-claws-dillo-viewer_1.0.4-1sarge1_powerpc.deb stable/main/binary-powerpc/sylpheed-claws-clamav_1.0.4-1sarge1_powerpc.deb stable/main/binary-powerpc/sylpheed-claws-pgpmime_1.0.4-1sarge1_powerpc.deb stable/main/binary-powerpc/sylpheed-claws-spamassassin_1.0.4-1sarge1_powerpc.deb stable/main/binary-powerpc/sylpheed-claws_1.0.4-1sarge1_powerpc.deb sylpheed-claws (1.0.4-1sarge1) stable-security; urgency=high * Non-maintainer upload by the security team * Applied upstream patch to fix arbitrary code execution in various importer routines [src/ldif.c, src/pine.c, src/mutt.c, CVE-2005-3354, debian/patches/11security_CVE-2005-3354.patch] stable/main/binary-sparc/sylpheed_1.0.4-1sarge1_sparc.deb sylpheed (1.0.4-1sarge1) stable-security; urgency=high * Non-maintainer upload by the security team * Applied upstream patch to fix arbitrary code execution in various importer routines [src/ldif.c, debian/patches/05security_CVE-2005-3354.diff] stable/main/binary-s390/sylpheed_1.0.4-1sarge1_s390.deb sylpheed (1.0.4-1sarge1) stable-security; urgency=high * Non-maintainer upload by the security team * Applied upstream patch to fix arbitrary code execution in various importer routines [src/ldif.c, debian/patches/05security_CVE-2005-3354.diff] stable/main/binary-mipsel/sylpheed_1.0.4-1sarge1_mipsel.deb sylpheed (1.0.4-1sarge1) stable-security; urgency=high * Non-maintainer upload by the security team * Applied upstream patch to fix arbitrary code execution in various importer routines [src/ldif.c, debian/patches/05security_CVE-2005-3354.diff] stable/main/binary-mips/sylpheed_1.0.4-1sarge1_mips.deb sylpheed (1.0.4-1sarge1) stable-security; urgency=high * Non-maintainer upload by the security team * Applied upstream patch to fix arbitrary code execution in various importer routines [src/ldif.c, debian/patches/05security_CVE-2005-3354.diff] stable/main/binary-m68k/sylpheed_1.0.4-1sarge1_m68k.deb sylpheed (1.0.4-1sarge1) stable-security; urgency=high * Non-maintainer upload by the security team * Applied upstream patch to fix arbitrary code execution in various importer routines [src/ldif.c, debian/patches/05security_CVE-2005-3354.diff] stable/main/binary-ia64/sylpheed_1.0.4-1sarge1_ia64.deb sylpheed (1.0.4-1sarge1) stable-security; urgency=high * Non-maintainer upload by the security team * Applied upstream patch to fix arbitrary code execution in various importer routines [src/ldif.c, debian/patches/05security_CVE-2005-3354.diff] stable/main/binary-i386/sylpheed_1.0.4-1sarge1_i386.deb sylpheed (1.0.4-1sarge1) stable-security; urgency=high * Non-maintainer upload by the security team * Applied upstream patch to fix arbitrary code execution in various importer routines [src/ldif.c, debian/patches/05security_CVE-2005-3354.diff] stable/main/binary-hppa/sylpheed_1.0.4-1sarge1_hppa.deb sylpheed (1.0.4-1sarge1) stable-security; urgency=high * Non-maintainer upload by the security team * Applied upstream patch to fix arbitrary code execution in various importer routines [src/ldif.c, debian/patches/05security_CVE-2005-3354.diff] stable/main/binary-arm/sylpheed_1.0.4-1sarge1_arm.deb sylpheed (1.0.4-1sarge1) stable-security; urgency=high * Non-maintainer upload by the security team * Applied upstream patch to fix arbitrary code execution in various importer routines [src/ldif.c, debian/patches/05security_CVE-2005-3354.diff] stable/main/binary-alpha/sylpheed_1.0.4-1sarge1_alpha.deb sylpheed (1.0.4-1sarge1) stable-security; urgency=high * Non-maintainer upload by the security team * Applied upstream patch to fix arbitrary code execution in various importer routines [src/ldif.c, debian/patches/05security_CVE-2005-3354.diff] stable/main/source/sylpheed_1.0.4-1sarge1.dsc stable/main/binary-all/sylpheed-i18n_1.0.4-1sarge1_all.deb stable/main/binary-powerpc/sylpheed_1.0.4-1sarge1_powerpc.deb stable/main/source/sylpheed_1.0.4-1sarge1.diff.gz sylpheed (1.0.4-1sarge1) stable-security; urgency=high * Non-maintainer upload by the security team * Applied upstream patch to fix arbitrary code execution in various importer routines [src/ldif.c, debian/patches/05security_CVE-2005-3354.diff] stable/main/binary-sparc/sudo_1.6.8p7-1.2_sparc.deb sudo (1.6.8p7-1.2) stable-security; urgency=high * Non-maintainer upload by the Security Team * Clean SHELLOPTS and PS4 from the environment before executing programs with sudo permissions [env.c, CAN-2005-2959] stable/main/binary-s390/sudo_1.6.8p7-1.2_s390.deb sudo (1.6.8p7-1.2) stable-security; urgency=high * Non-maintainer upload by the Security Team * Clean SHELLOPTS and PS4 from the environment before executing programs with sudo permissions [env.c, CAN-2005-2959] stable/main/binary-mipsel/sudo_1.6.8p7-1.2_mipsel.deb sudo (1.6.8p7-1.2) stable-security; urgency=high * Non-maintainer upload by the Security Team * Clean SHELLOPTS and PS4 from the environment before executing programs with sudo permissions [env.c, CAN-2005-2959] stable/main/binary-mips/sudo_1.6.8p7-1.2_mips.deb sudo (1.6.8p7-1.2) stable-security; urgency=high * Non-maintainer upload by the Security Team * Clean SHELLOPTS and PS4 from the environment before executing programs with sudo permissions [env.c, CAN-2005-2959] stable/main/binary-m68k/sudo_1.6.8p7-1.2_m68k.deb sudo (1.6.8p7-1.2) stable-security; urgency=high * Non-maintainer upload by the Security Team * Clean SHELLOPTS and PS4 from the environment before executing programs with sudo permissions [env.c, CAN-2005-2959] stable/main/binary-ia64/sudo_1.6.8p7-1.2_ia64.deb sudo (1.6.8p7-1.2) stable-security; urgency=high * Non-maintainer upload by the Security Team * Clean SHELLOPTS and PS4 from the environment before executing programs with sudo permissions [env.c, CAN-2005-2959] stable/main/binary-i386/sudo_1.6.8p7-1.2_i386.deb sudo (1.6.8p7-1.2) stable-security; urgency=high * Non-maintainer upload by the Security Team * Clean SHELLOPTS and PS4 from the environment before executing programs with sudo permissions [env.c, CAN-2005-2959] stable/main/binary-hppa/sudo_1.6.8p7-1.2_hppa.deb sudo (1.6.8p7-1.2) stable-security; urgency=high * Non-maintainer upload by the Security Team * Clean SHELLOPTS and PS4 from the environment before executing programs with sudo permissions [env.c, CAN-2005-2959] stable/main/binary-arm/sudo_1.6.8p7-1.2_arm.deb sudo (1.6.8p7-1.2) stable-security; urgency=high * Non-maintainer upload by the Security Team * Clean SHELLOPTS and PS4 from the environment before executing programs with sudo permissions [env.c, CAN-2005-2959] stable/main/binary-alpha/sudo_1.6.8p7-1.2_alpha.deb sudo (1.6.8p7-1.2) stable-security; urgency=high * Non-maintainer upload by the Security Team * Clean SHELLOPTS and PS4 from the environment before executing programs with sudo permissions [env.c, CAN-2005-2959] stable/main/source/sudo_1.6.8p7-1.2.dsc stable/main/source/sudo_1.6.8p7-1.2.diff.gz stable/main/binary-powerpc/sudo_1.6.8p7-1.2_powerpc.deb sudo (1.6.8p7-1.2) stable-security; urgency=high * Non-maintainer upload by the Security Team * Clean SHELLOPTS and PS4 from the environment before executing programs with sudo permissions [env.c, CAN-2005-2959] stable/main/source/squirrelmail_1.4.4-7.diff.gz stable/main/binary-all/squirrelmail_1.4.4-7_all.deb stable/main/source/squirrelmail_1.4.4-7.dsc squirrelmail (2:1.4.4-7) stable; urgency=low * Work around changed behaviour in PHP's chunk_split() function, which may cause multiple attachments in outgoing mail to end up being sent corrupted, without any feedback or error message to the sender. (Closes: #325215) stable/main/binary-sparc/squid_2.5.9-10sarge2_sparc.deb stable/main/binary-sparc/squidclient_2.5.9-10sarge2_sparc.deb stable/main/binary-sparc/squid-cgi_2.5.9-10sarge2_sparc.deb squid (2.5.9-10sarge2) stable-security; urgency=high * Upload to stable-security because of security issues * debian/patches/46-ntlm-scheme-assert - Added upstream patch to fix potential DoS in NTLM authentication (Ref: CAN-2005-2917) stable/main/binary-s390/squid-cgi_2.5.9-10sarge2_s390.deb stable/main/binary-s390/squidclient_2.5.9-10sarge2_s390.deb stable/main/binary-s390/squid_2.5.9-10sarge2_s390.deb squid (2.5.9-10sarge2) stable-security; urgency=high * Upload to stable-security because of security issues * debian/patches/46-ntlm-scheme-assert - Added upstream patch to fix potential DoS in NTLM authentication (Ref: CAN-2005-2917) stable/main/binary-mipsel/squid-cgi_2.5.9-10sarge2_mipsel.deb stable/main/binary-mipsel/squidclient_2.5.9-10sarge2_mipsel.deb stable/main/binary-mipsel/squid_2.5.9-10sarge2_mipsel.deb squid (2.5.9-10sarge2) stable-security; urgency=high * Upload to stable-security because of security issues * debian/patches/46-ntlm-scheme-assert - Added upstream patch to fix potential DoS in NTLM authentication (Ref: CAN-2005-2917) stable/main/binary-mips/squid-cgi_2.5.9-10sarge2_mips.deb stable/main/binary-mips/squidclient_2.5.9-10sarge2_mips.deb stable/main/binary-mips/squid_2.5.9-10sarge2_mips.deb squid (2.5.9-10sarge2) stable-security; urgency=high * Upload to stable-security because of security issues * debian/patches/46-ntlm-scheme-assert - Added upstream patch to fix potential DoS in NTLM authentication (Ref: CAN-2005-2917) stable/main/binary-m68k/squid-cgi_2.5.9-10sarge2_m68k.deb stable/main/binary-m68k/squid_2.5.9-10sarge2_m68k.deb stable/main/binary-m68k/squidclient_2.5.9-10sarge2_m68k.deb squid (2.5.9-10sarge2) stable-security; urgency=high * Upload to stable-security because of security issues * debian/patches/46-ntlm-scheme-assert - Added upstream patch to fix potential DoS in NTLM authentication (Ref: CAN-2005-2917) stable/main/binary-ia64/squidclient_2.5.9-10sarge2_ia64.deb stable/main/binary-ia64/squid-cgi_2.5.9-10sarge2_ia64.deb stable/main/binary-ia64/squid_2.5.9-10sarge2_ia64.deb squid (2.5.9-10sarge2) stable-security; urgency=high * Upload to stable-security because of security issues * debian/patches/46-ntlm-scheme-assert - Added upstream patch to fix potential DoS in NTLM authentication (Ref: CAN-2005-2917) stable/main/binary-i386/squid_2.5.9-10sarge2_i386.deb stable/main/binary-i386/squidclient_2.5.9-10sarge2_i386.deb stable/main/binary-i386/squid-cgi_2.5.9-10sarge2_i386.deb squid (2.5.9-10sarge2) stable-security; urgency=high * Upload to stable-security because of security issues * debian/patches/46-ntlm-scheme-assert - Added upstream patch to fix potential DoS in NTLM authentication (Ref: CAN-2005-2917) stable/main/binary-hppa/squid_2.5.9-10sarge2_hppa.deb stable/main/binary-hppa/squidclient_2.5.9-10sarge2_hppa.deb stable/main/binary-hppa/squid-cgi_2.5.9-10sarge2_hppa.deb squid (2.5.9-10sarge2) stable-security; urgency=high * Upload to stable-security because of security issues * debian/patches/46-ntlm-scheme-assert - Added upstream patch to fix potential DoS in NTLM authentication (Ref: CAN-2005-2917) stable/main/binary-arm/squid_2.5.9-10sarge2_arm.deb stable/main/binary-arm/squidclient_2.5.9-10sarge2_arm.deb stable/main/binary-arm/squid-cgi_2.5.9-10sarge2_arm.deb squid (2.5.9-10sarge2) stable-security; urgency=high * Upload to stable-security because of security issues * debian/patches/46-ntlm-scheme-assert - Added upstream patch to fix potential DoS in NTLM authentication (Ref: CAN-2005-2917) stable/main/binary-alpha/squidclient_2.5.9-10sarge2_alpha.deb stable/main/binary-alpha/squid-cgi_2.5.9-10sarge2_alpha.deb stable/main/binary-alpha/squid_2.5.9-10sarge2_alpha.deb squid (2.5.9-10sarge2) stable-security; urgency=high * Upload to stable-security because of security issues * debian/patches/46-ntlm-scheme-assert - Added upstream patch to fix potential DoS in NTLM authentication (Ref: CAN-2005-2917) stable/main/source/squid_2.5.9-10sarge2.dsc stable/main/binary-powerpc/squidclient_2.5.9-10sarge2_powerpc.deb stable/main/binary-powerpc/squid-cgi_2.5.9-10sarge2_powerpc.deb stable/main/binary-all/squid-common_2.5.9-10sarge2_all.deb stable/main/source/squid_2.5.9-10sarge2.diff.gz stable/main/binary-powerpc/squid_2.5.9-10sarge2_powerpc.deb squid (2.5.9-10sarge2) stable-security; urgency=high * Upload to stable-security because of security issues * debian/patches/46-ntlm-scheme-assert - Added upstream patch to fix potential DoS in NTLM authentication (Ref: CAN-2005-2917) stable/main/binary-sparc/spamc_3.0.3-2_sparc.deb spamassassin (3.0.3-2) stable-security; urgency=high * Security release to fix potential DoS caused by large headers (CAN-2005-1266) stable/main/binary-s390/spamc_3.0.3-2_s390.deb spamassassin (3.0.3-2) stable-security; urgency=high * Security release to fix potential DoS caused by large headers (CAN-2005-1266) stable/main/binary-powerpc/spamc_3.0.3-2_powerpc.deb spamassassin (3.0.3-2) stable-security; urgency=high * Security release to fix potential DoS caused by large headers (CAN-2005-1266) stable/main/binary-mipsel/spamc_3.0.3-2_mipsel.deb spamassassin (3.0.3-2) stable-security; urgency=high * Security release to fix potential DoS caused by large headers (CAN-2005-1266) stable/main/binary-mips/spamc_3.0.3-2_mips.deb spamassassin (3.0.3-2) stable-security; urgency=high * Security release to fix potential DoS caused by large headers (CAN-2005-1266) stable/main/binary-m68k/spamc_3.0.3-2_m68k.deb spamassassin (3.0.3-2) stable-security; urgency=high * Security release to fix potential DoS caused by large headers (CAN-2005-1266) stable/main/binary-ia64/spamc_3.0.3-2_ia64.deb spamassassin (3.0.3-2) stable-security; urgency=high * Security release to fix potential DoS caused by large headers (CAN-2005-1266) stable/main/binary-hppa/spamc_3.0.3-2_hppa.deb spamassassin (3.0.3-2) stable-security; urgency=high * Security release to fix potential DoS caused by large headers (CAN-2005-1266) stable/main/binary-arm/spamc_3.0.3-2_arm.deb spamassassin (3.0.3-2) stable-security; urgency=high * Security release to fix potential DoS caused by large headers (CAN-2005-1266) stable/main/binary-alpha/spamc_3.0.3-2_alpha.deb spamassassin (3.0.3-2) stable-security; urgency=high * Security release to fix potential DoS caused by large headers (CAN-2005-1266) stable/main/source/spamassassin_3.0.3-2.diff.gz stable/main/binary-i386/spamc_3.0.3-2_i386.deb stable/main/binary-all/spamassassin_3.0.3-2_all.deb stable/main/source/spamassassin_3.0.3-2.dsc spamassassin (3.0.3-2) stable-security; urgency=high * Security release to fix potential DoS caused by large headers (CAN-2005-1266) stable/main/source/simpleproxy_3.2-3sarge1.diff.gz stable/main/source/simpleproxy_3.2-3sarge1.dsc stable/main/binary-i386/simpleproxy_3.2-3sarge1_i386.deb simpleproxy (3.2-3sarge1) stable-security; urgency=high * Non maintainer upload by The Security Team. * Fix potentially exploitable format string attack in simpleproxy.c (CAN-2005-1857) stable/main/source/shorewall_2.2.3-2.dsc stable/main/binary-all/shorewall_2.2.3-2_all.deb stable/main/source/shorewall_2.2.3-2.diff.gz shorewall (2.2.3-2) stable-security; urgency=high * Backported upstream patch from shorewall 2.2.5 to fix the MACLIST security problem CAN-2005-2317 (Closes: 318946). stable/main/binary-sparc/scsitools_0.8-1sarge1_sparc.deb scsitools (0.8-1sarge1) stable; urgency=high * Don't unmount /proc if it is already mounted at the time scsitools-pre.sh is run, otherwise it lets a LVM system unbootable. Thanks to Jörg Sommer <joerg@alea.gnuu.de> and Andrea Borgia <andrea@borgia.bo.it> who pointed out this problem. Closes: #285831. stable/main/binary-s390/scsitools_0.8-1sarge1_s390.deb scsitools (0.8-1sarge1) stable; urgency=high * Don't unmount /proc if it is already mounted at the time scsitools-pre.sh is run, otherwise it lets a LVM system unbootable. Thanks to Jörg Sommer <joerg@alea.gnuu.de> and Andrea Borgia <andrea@borgia.bo.it> who pointed out this problem. Closes: #285831. stable/main/binary-powerpc/scsitools_0.8-1sarge1_powerpc.deb scsitools (0.8-1sarge1) stable; urgency=high * Don't unmount /proc if it is already mounted at the time scsitools-pre.sh is run, otherwise it lets a LVM system unbootable. Thanks to JC6rg Sommer <joerg@alea.gnuu.de> and Andrea Borgia <andrea@borgia.bo.it> who pointed out this problem. Closes: #285831. stable/main/binary-mipsel/scsitools_0.8-1sarge1_mipsel.deb scsitools (0.8-1sarge1) stable; urgency=high * Don't unmount /proc if it is already mounted at the time scsitools-pre.sh is run, otherwise it lets a LVM system unbootable. Thanks to JC6rg Sommer <joerg@alea.gnuu.de> and Andrea Borgia <andrea@borgia.bo.it> who pointed out this problem. Closes: #285831. stable/main/binary-mips/scsitools_0.8-1sarge1_mips.deb scsitools (0.8-1sarge1) stable; urgency=high * Don't unmount /proc if it is already mounted at the time scsitools-pre.sh is run, otherwise it lets a LVM system unbootable. Thanks to JC6rg Sommer <joerg@alea.gnuu.de> and Andrea Borgia <andrea@borgia.bo.it> who pointed out this problem. Closes: #285831. stable/main/binary-m68k/scsitools_0.8-1sarge1_m68k.deb scsitools (0.8-1sarge1) stable; urgency=high * Don't unmount /proc if it is already mounted at the time scsitools-pre.sh is run, otherwise it lets a LVM system unbootable. Thanks to J?rg Sommer <joerg@alea.gnuu.de> and Andrea Borgia <andrea@borgia.bo.it> who pointed out this problem. Closes: #285831. stable/main/binary-ia64/scsitools_0.8-1sarge1_ia64.deb scsitools (0.8-1sarge1) stable; urgency=high * Don't unmount /proc if it is already mounted at the time scsitools-pre.sh is run, otherwise it lets a LVM system unbootable. Thanks to JC6rg Sommer <joerg@alea.gnuu.de> and Andrea Borgia <andrea@borgia.bo.it> who pointed out this problem. Closes: #285831. stable/main/binary-hppa/scsitools_0.8-1sarge1_hppa.deb scsitools (0.8-1sarge1) stable; urgency=high * Don't unmount /proc if it is already mounted at the time scsitools-pre.sh is run, otherwise it lets a LVM system unbootable. Thanks to JC6rg Sommer <joerg@alea.gnuu.de> and Andrea Borgia <andrea@borgia.bo.it> who pointed out this problem. Closes: #285831. stable/main/binary-arm/scsitools_0.8-1sarge1_arm.deb scsitools (0.8-1sarge1) stable; urgency=high * Don't unmount /proc if it is already mounted at the time scsitools-pre.sh is run, otherwise it lets a LVM system unbootable. Thanks to Jörg Sommer <joerg@alea.gnuu.de> and Andrea Borgia <andrea@borgia.bo.it> who pointed out this problem. Closes: #285831. stable/main/binary-alpha/scsitools_0.8-1sarge1_alpha.deb scsitools (0.8-1sarge1) stable; urgency=high * Don't unmount /proc if it is already mounted at the time scsitools-pre.sh is run, otherwise it lets a LVM system unbootable. Thanks to JC6rg Sommer <joerg@alea.gnuu.de> and Andrea Borgia <andrea@borgia.bo.it> who pointed out this problem. Closes: #285831. stable/main/source/scsitools_0.8-1sarge1.diff.gz stable/main/source/scsitools_0.8-1sarge1.dsc stable/main/binary-i386/scsitools_0.8-1sarge1_i386.deb scsitools (0.8-1sarge1) stable; urgency=high * Don't unmount /proc if it is already mounted at the time scsitools-pre.sh is run, otherwise it lets a LVM system unbootable. Thanks to Jörg Sommer <joerg@alea.gnuu.de> and Andrea Borgia <andrea@borgia.bo.it> who pointed out this problem. Closes: #285831. stable/main/binary-sparc/samba-common_3.0.14a-3sarge1_sparc.deb stable/main/binary-sparc/swat_3.0.14a-3sarge1_sparc.deb stable/main/binary-sparc/smbfs_3.0.14a-3sarge1_sparc.deb stable/main/binary-sparc/libpam-smbpass_3.0.14a-3sarge1_sparc.deb stable/main/binary-sparc/libsmbclient-dev_3.0.14a-3sarge1_sparc.deb stable/main/binary-sparc/samba-dbg_3.0.14a-3sarge1_sparc.deb stable/main/binary-sparc/python2.3-samba_3.0.14a-3sarge1_sparc.deb stable/main/binary-sparc/libsmbclient_3.0.14a-3sarge1_sparc.deb stable/main/binary-sparc/samba_3.0.14a-3sarge1_sparc.deb stable/main/binary-sparc/smbclient_3.0.14a-3sarge1_sparc.deb stable/main/binary-sparc/winbind_3.0.14a-3sarge1_sparc.deb samba (3.0.14a-3sarge1) stable; urgency=low * Incorporate debian/patches/schannel-64bit-align.patch from upstream, so that we're compatible with WinXP 64. stable/main/binary-s390/samba-dbg_3.0.14a-3sarge1_s390.deb stable/main/binary-s390/libsmbclient-dev_3.0.14a-3sarge1_s390.deb stable/main/binary-s390/swat_3.0.14a-3sarge1_s390.deb stable/main/binary-s390/libpam-smbpass_3.0.14a-3sarge1_s390.deb stable/main/binary-s390/libsmbclient_3.0.14a-3sarge1_s390.deb stable/main/binary-s390/smbclient_3.0.14a-3sarge1_s390.deb stable/main/binary-s390/samba_3.0.14a-3sarge1_s390.deb stable/main/binary-s390/smbfs_3.0.14a-3sarge1_s390.deb stable/main/binary-s390/winbind_3.0.14a-3sarge1_s390.deb stable/main/binary-s390/python2.3-samba_3.0.14a-3sarge1_s390.deb stable/main/binary-s390/samba-common_3.0.14a-3sarge1_s390.deb samba (3.0.14a-3sarge1) stable; urgency=low * Incorporate debian/patches/schannel-64bit-align.patch from upstream, so that we're compatible with WinXP 64. stable/main/binary-powerpc/swat_3.0.14a-3sarge1_powerpc.deb stable/main/binary-powerpc/libsmbclient_3.0.14a-3sarge1_powerpc.deb stable/main/binary-powerpc/libpam-smbpass_3.0.14a-3sarge1_powerpc.deb stable/main/binary-powerpc/winbind_3.0.14a-3sarge1_powerpc.deb stable/main/binary-powerpc/smbfs_3.0.14a-3sarge1_powerpc.deb stable/main/binary-powerpc/python2.3-samba_3.0.14a-3sarge1_powerpc.deb stable/main/binary-powerpc/libsmbclient-dev_3.0.14a-3sarge1_powerpc.deb stable/main/binary-powerpc/samba-dbg_3.0.14a-3sarge1_powerpc.deb stable/main/binary-powerpc/samba-common_3.0.14a-3sarge1_powerpc.deb stable/main/binary-powerpc/samba_3.0.14a-3sarge1_powerpc.deb stable/main/binary-powerpc/smbclient_3.0.14a-3sarge1_powerpc.deb samba (3.0.14a-3sarge1) stable; urgency=low * Incorporate debian/patches/schannel-64bit-align.patch from upstream, so that we're compatible with WinXP 64. stable/main/binary-mipsel/smbfs_3.0.14a-3sarge1_mipsel.deb stable/main/binary-mipsel/libsmbclient-dev_3.0.14a-3sarge1_mipsel.deb stable/main/binary-mipsel/libpam-smbpass_3.0.14a-3sarge1_mipsel.deb stable/main/binary-mipsel/samba-common_3.0.14a-3sarge1_mipsel.deb stable/main/binary-mipsel/samba-dbg_3.0.14a-3sarge1_mipsel.deb stable/main/binary-mipsel/samba_3.0.14a-3sarge1_mipsel.deb stable/main/binary-mipsel/smbclient_3.0.14a-3sarge1_mipsel.deb stable/main/binary-mipsel/swat_3.0.14a-3sarge1_mipsel.deb stable/main/binary-mipsel/libsmbclient_3.0.14a-3sarge1_mipsel.deb stable/main/binary-mipsel/winbind_3.0.14a-3sarge1_mipsel.deb stable/main/binary-mipsel/python2.3-samba_3.0.14a-3sarge1_mipsel.deb samba (3.0.14a-3sarge1) stable; urgency=low * Incorporate debian/patches/schannel-64bit-align.patch from upstream, so that we're compatible with WinXP 64. stable/main/binary-mips/smbfs_3.0.14a-3sarge1_mips.deb stable/main/binary-mips/swat_3.0.14a-3sarge1_mips.deb stable/main/binary-mips/samba_3.0.14a-3sarge1_mips.deb stable/main/binary-mips/libsmbclient_3.0.14a-3sarge1_mips.deb stable/main/binary-mips/samba-dbg_3.0.14a-3sarge1_mips.deb stable/main/binary-mips/winbind_3.0.14a-3sarge1_mips.deb stable/main/binary-mips/libsmbclient-dev_3.0.14a-3sarge1_mips.deb stable/main/binary-mips/samba-common_3.0.14a-3sarge1_mips.deb stable/main/binary-mips/smbclient_3.0.14a-3sarge1_mips.deb stable/main/binary-mips/libpam-smbpass_3.0.14a-3sarge1_mips.deb stable/main/binary-mips/python2.3-samba_3.0.14a-3sarge1_mips.deb samba (3.0.14a-3sarge1) stable; urgency=low * Incorporate debian/patches/schannel-64bit-align.patch from upstream, so that we're compatible with WinXP 64. stable/main/binary-m68k/smbfs_3.0.14a-3sarge1_m68k.deb stable/main/binary-m68k/libsmbclient_3.0.14a-3sarge1_m68k.deb stable/main/binary-m68k/libpam-smbpass_3.0.14a-3sarge1_m68k.deb stable/main/binary-m68k/smbclient_3.0.14a-3sarge1_m68k.deb stable/main/binary-m68k/swat_3.0.14a-3sarge1_m68k.deb stable/main/binary-m68k/samba_3.0.14a-3sarge1_m68k.deb stable/main/binary-m68k/samba-common_3.0.14a-3sarge1_m68k.deb stable/main/binary-m68k/python2.3-samba_3.0.14a-3sarge1_m68k.deb stable/main/binary-m68k/winbind_3.0.14a-3sarge1_m68k.deb stable/main/binary-m68k/libsmbclient-dev_3.0.14a-3sarge1_m68k.deb stable/main/binary-m68k/samba-dbg_3.0.14a-3sarge1_m68k.deb samba (3.0.14a-3sarge1) stable; urgency=low * Incorporate debian/patches/schannel-64bit-align.patch from upstream, so that we're compatible with WinXP 64. stable/main/binary-ia64/samba-dbg_3.0.14a-3sarge1_ia64.deb stable/main/binary-ia64/winbind_3.0.14a-3sarge1_ia64.deb stable/main/binary-ia64/smbfs_3.0.14a-3sarge1_ia64.deb stable/main/binary-ia64/swat_3.0.14a-3sarge1_ia64.deb stable/main/binary-ia64/libsmbclient_3.0.14a-3sarge1_ia64.deb stable/main/binary-ia64/samba_3.0.14a-3sarge1_ia64.deb stable/main/binary-ia64/libpam-smbpass_3.0.14a-3sarge1_ia64.deb stable/main/binary-ia64/libsmbclient-dev_3.0.14a-3sarge1_ia64.deb stable/main/binary-ia64/smbclient_3.0.14a-3sarge1_ia64.deb stable/main/binary-ia64/python2.3-samba_3.0.14a-3sarge1_ia64.deb stable/main/binary-ia64/samba-common_3.0.14a-3sarge1_ia64.deb samba (3.0.14a-3sarge1) stable; urgency=low * Incorporate debian/patches/schannel-64bit-align.patch from upstream, so that we're compatible with WinXP 64. stable/main/binary-hppa/smbfs_3.0.14a-3sarge1_hppa.deb stable/main/binary-hppa/libsmbclient_3.0.14a-3sarge1_hppa.deb stable/main/binary-hppa/libpam-smbpass_3.0.14a-3sarge1_hppa.deb stable/main/binary-hppa/libsmbclient-dev_3.0.14a-3sarge1_hppa.deb stable/main/binary-hppa/smbclient_3.0.14a-3sarge1_hppa.deb stable/main/binary-hppa/python2.3-samba_3.0.14a-3sarge1_hppa.deb stable/main/binary-hppa/winbind_3.0.14a-3sarge1_hppa.deb stable/main/binary-hppa/samba-common_3.0.14a-3sarge1_hppa.deb stable/main/binary-hppa/samba_3.0.14a-3sarge1_hppa.deb stable/main/binary-hppa/swat_3.0.14a-3sarge1_hppa.deb stable/main/binary-hppa/samba-dbg_3.0.14a-3sarge1_hppa.deb samba (3.0.14a-3sarge1) stable; urgency=low * Incorporate debian/patches/schannel-64bit-align.patch from upstream, so that we're compatible with WinXP 64. stable/main/binary-arm/swat_3.0.14a-3sarge1_arm.deb stable/main/binary-arm/smbfs_3.0.14a-3sarge1_arm.deb stable/main/binary-arm/libpam-smbpass_3.0.14a-3sarge1_arm.deb stable/main/binary-arm/libsmbclient_3.0.14a-3sarge1_arm.deb stable/main/binary-arm/samba_3.0.14a-3sarge1_arm.deb stable/main/binary-arm/python2.3-samba_3.0.14a-3sarge1_arm.deb stable/main/binary-arm/samba-dbg_3.0.14a-3sarge1_arm.deb stable/main/binary-arm/winbind_3.0.14a-3sarge1_arm.deb stable/main/binary-arm/samba-common_3.0.14a-3sarge1_arm.deb stable/main/binary-arm/smbclient_3.0.14a-3sarge1_arm.deb stable/main/binary-arm/libsmbclient-dev_3.0.14a-3sarge1_arm.deb samba (3.0.14a-3sarge1) stable; urgency=low * Incorporate debian/patches/schannel-64bit-align.patch from upstream, so that we're compatible with WinXP 64. stable/main/binary-alpha/swat_3.0.14a-3sarge1_alpha.deb stable/main/binary-alpha/libpam-smbpass_3.0.14a-3sarge1_alpha.deb stable/main/binary-alpha/libsmbclient-dev_3.0.14a-3sarge1_alpha.deb stable/main/binary-alpha/libsmbclient_3.0.14a-3sarge1_alpha.deb stable/main/binary-alpha/winbind_3.0.14a-3sarge1_alpha.deb stable/main/binary-alpha/smbclient_3.0.14a-3sarge1_alpha.deb stable/main/binary-alpha/samba_3.0.14a-3sarge1_alpha.deb stable/main/binary-alpha/samba-dbg_3.0.14a-3sarge1_alpha.deb stable/main/binary-alpha/smbfs_3.0.14a-3sarge1_alpha.deb stable/main/binary-alpha/samba-common_3.0.14a-3sarge1_alpha.deb stable/main/binary-alpha/python2.3-samba_3.0.14a-3sarge1_alpha.deb samba (3.0.14a-3sarge1) stable; urgency=low * Incorporate debian/patches/schannel-64bit-align.patch from upstream, so that we're compatible with WinXP 64. stable/main/binary-all/samba-doc_3.0.14a-3sarge1_all.deb stable/main/binary-i386/samba_3.0.14a-3sarge1_i386.deb stable/main/binary-i386/libpam-smbpass_3.0.14a-3sarge1_i386.deb stable/main/binary-i386/libsmbclient-dev_3.0.14a-3sarge1_i386.deb stable/main/binary-i386/python2.3-samba_3.0.14a-3sarge1_i386.deb stable/main/source/samba_3.0.14a-3sarge1.diff.gz stable/main/binary-i386/samba-common_3.0.14a-3sarge1_i386.deb stable/main/binary-i386/libsmbclient_3.0.14a-3sarge1_i386.deb stable/main/binary-i386/smbclient_3.0.14a-3sarge1_i386.deb stable/main/source/samba_3.0.14a-3sarge1.dsc stable/main/binary-i386/winbind_3.0.14a-3sarge1_i386.deb stable/main/binary-i386/swat_3.0.14a-3sarge1_i386.deb stable/main/binary-i386/smbfs_3.0.14a-3sarge1_i386.deb stable/main/binary-i386/samba-dbg_3.0.14a-3sarge1_i386.deb samba (3.0.14a-3sarge1) stable; urgency=low * Incorporate debian/patches/schannel-64bit-align.patch from upstream, so that we're compatible with WinXP 64. stable/main/binary-sparc/libgdbm-ruby1.8_1.8.2-7sarge2_sparc.deb stable/main/binary-sparc/libdbm-ruby1.8_1.8.2-7sarge2_sparc.deb stable/main/binary-sparc/libruby1.8-dbg_1.8.2-7sarge2_sparc.deb stable/main/binary-sparc/libtcltk-ruby1.8_1.8.2-7sarge2_sparc.deb stable/main/binary-sparc/libreadline-ruby1.8_1.8.2-7sarge2_sparc.deb stable/main/binary-sparc/libruby1.8_1.8.2-7sarge2_sparc.deb stable/main/binary-sparc/ruby1.8-dev_1.8.2-7sarge2_sparc.deb stable/main/binary-sparc/libopenssl-ruby1.8_1.8.2-7sarge2_sparc.deb stable/main/binary-sparc/ruby1.8_1.8.2-7sarge2_sparc.deb ruby1.8 (1.8.2-7sarge2) stable-security; urgency=high * patch from akira yamada <akira@debian.org> - added debian/patches/803_preserve_safe_level.patch and debian/patches/804_prohibit_calling_tainted_method.patch: - CAN-2005-2337 - [security] preserve safe level in the environment where a method is defined. - [security] prohibit calling tainted method (>2) when $SAFE == 0. stable/main/binary-s390/ruby1.8_1.8.2-7sarge2_s390.deb stable/main/binary-s390/libruby1.8-dbg_1.8.2-7sarge2_s390.deb stable/main/binary-s390/ruby1.8-dev_1.8.2-7sarge2_s390.deb stable/main/binary-s390/libtcltk-ruby1.8_1.8.2-7sarge2_s390.deb stable/main/binary-s390/libreadline-ruby1.8_1.8.2-7sarge2_s390.deb stable/main/binary-s390/libopenssl-ruby1.8_1.8.2-7sarge2_s390.deb stable/main/binary-s390/libgdbm-ruby1.8_1.8.2-7sarge2_s390.deb stable/main/binary-s390/libruby1.8_1.8.2-7sarge2_s390.deb stable/main/binary-s390/libdbm-ruby1.8_1.8.2-7sarge2_s390.deb ruby1.8 (1.8.2-7sarge2) stable-security; urgency=high * patch from akira yamada <akira@debian.org> - added debian/patches/803_preserve_safe_level.patch and debian/patches/804_prohibit_calling_tainted_method.patch: - CAN-2005-2337 - [security] preserve safe level in the environment where a method is defined. - [security] prohibit calling tainted method (>2) when $SAFE == 0. stable/main/binary-powerpc/libopenssl-ruby1.8_1.8.2-7sarge2_powerpc.deb stable/main/binary-powerpc/libdbm-ruby1.8_1.8.2-7sarge2_powerpc.deb stable/main/binary-powerpc/libreadline-ruby1.8_1.8.2-7sarge2_powerpc.deb stable/main/binary-powerpc/ruby1.8_1.8.2-7sarge2_powerpc.deb stable/main/binary-powerpc/libruby1.8_1.8.2-7sarge2_powerpc.deb stable/main/binary-powerpc/libtcltk-ruby1.8_1.8.2-7sarge2_powerpc.deb stable/main/binary-powerpc/libgdbm-ruby1.8_1.8.2-7sarge2_powerpc.deb stable/main/binary-powerpc/ruby1.8-dev_1.8.2-7sarge2_powerpc.deb stable/main/binary-powerpc/libruby1.8-dbg_1.8.2-7sarge2_powerpc.deb ruby1.8 (1.8.2-7sarge2) stable-security; urgency=high * patch from akira yamada <akira@debian.org> - added debian/patches/803_preserve_safe_level.patch and debian/patches/804_prohibit_calling_tainted_method.patch: - CAN-2005-2337 - [security] preserve safe level in the environment where a method is defined. - [security] prohibit calling tainted method (>2) when $SAFE == 0. stable/main/binary-mipsel/libtcltk-ruby1.8_1.8.2-7sarge2_mipsel.deb stable/main/binary-mipsel/libreadline-ruby1.8_1.8.2-7sarge2_mipsel.deb stable/main/binary-mipsel/libruby1.8-dbg_1.8.2-7sarge2_mipsel.deb stable/main/binary-mipsel/libdbm-ruby1.8_1.8.2-7sarge2_mipsel.deb stable/main/binary-mipsel/libopenssl-ruby1.8_1.8.2-7sarge2_mipsel.deb stable/main/binary-mipsel/libgdbm-ruby1.8_1.8.2-7sarge2_mipsel.deb stable/main/binary-mipsel/ruby1.8-dev_1.8.2-7sarge2_mipsel.deb stable/main/binary-mipsel/ruby1.8_1.8.2-7sarge2_mipsel.deb stable/main/binary-mipsel/libruby1.8_1.8.2-7sarge2_mipsel.deb ruby1.8 (1.8.2-7sarge2) stable-security; urgency=high * patch from akira yamada <akira@debian.org> - added debian/patches/803_preserve_safe_level.patch and debian/patches/804_prohibit_calling_tainted_method.patch: - CAN-2005-2337 - [security] preserve safe level in the environment where a method is defined. - [security] prohibit calling tainted method (>2) when $SAFE == 0. stable/main/binary-mips/libopenssl-ruby1.8_1.8.2-7sarge2_mips.deb stable/main/binary-mips/libdbm-ruby1.8_1.8.2-7sarge2_mips.deb stable/main/binary-mips/libgdbm-ruby1.8_1.8.2-7sarge2_mips.deb stable/main/binary-mips/libruby1.8_1.8.2-7sarge2_mips.deb stable/main/binary-mips/libruby1.8-dbg_1.8.2-7sarge2_mips.deb stable/main/binary-mips/ruby1.8-dev_1.8.2-7sarge2_mips.deb stable/main/binary-mips/ruby1.8_1.8.2-7sarge2_mips.deb stable/main/binary-mips/libreadline-ruby1.8_1.8.2-7sarge2_mips.deb stable/main/binary-mips/libtcltk-ruby1.8_1.8.2-7sarge2_mips.deb ruby1.8 (1.8.2-7sarge2) stable-security; urgency=high * patch from akira yamada <akira@debian.org> - added debian/patches/803_preserve_safe_level.patch and debian/patches/804_prohibit_calling_tainted_method.patch: - CAN-2005-2337 - [security] preserve safe level in the environment where a method is defined. - [security] prohibit calling tainted method (>2) when $SAFE == 0. stable/main/binary-m68k/libgdbm-ruby1.8_1.8.2-7sarge2_m68k.deb stable/main/binary-m68k/libruby1.8_1.8.2-7sarge2_m68k.deb stable/main/binary-m68k/libopenssl-ruby1.8_1.8.2-7sarge2_m68k.deb stable/main/binary-m68k/libreadline-ruby1.8_1.8.2-7sarge2_m68k.deb stable/main/binary-m68k/libruby1.8-dbg_1.8.2-7sarge2_m68k.deb stable/main/binary-m68k/libdbm-ruby1.8_1.8.2-7sarge2_m68k.deb stable/main/binary-m68k/libtcltk-ruby1.8_1.8.2-7sarge2_m68k.deb stable/main/binary-m68k/ruby1.8_1.8.2-7sarge2_m68k.deb stable/main/binary-m68k/ruby1.8-dev_1.8.2-7sarge2_m68k.deb ruby1.8 (1.8.2-7sarge2) stable-security; urgency=high * patch from akira yamada <akira@debian.org> - added debian/patches/803_preserve_safe_level.patch and debian/patches/804_prohibit_calling_tainted_method.patch: - CAN-2005-2337 - [security] preserve safe level in the environment where a method is defined. - [security] prohibit calling tainted method (>2) when $SAFE == 0. stable/main/binary-ia64/libruby1.8-dbg_1.8.2-7sarge2_ia64.deb stable/main/binary-ia64/libreadline-ruby1.8_1.8.2-7sarge2_ia64.deb stable/main/binary-ia64/libopenssl-ruby1.8_1.8.2-7sarge2_ia64.deb stable/main/binary-ia64/libgdbm-ruby1.8_1.8.2-7sarge2_ia64.deb stable/main/binary-ia64/ruby1.8-dev_1.8.2-7sarge2_ia64.deb stable/main/binary-ia64/ruby1.8_1.8.2-7sarge2_ia64.deb stable/main/binary-ia64/libtcltk-ruby1.8_1.8.2-7sarge2_ia64.deb stable/main/binary-ia64/libdbm-ruby1.8_1.8.2-7sarge2_ia64.deb stable/main/binary-ia64/libruby1.8_1.8.2-7sarge2_ia64.deb ruby1.8 (1.8.2-7sarge2) stable-security; urgency=high * patch from akira yamada <akira@debian.org> - added debian/patches/803_preserve_safe_level.patch and debian/patches/804_prohibit_calling_tainted_method.patch: - CAN-2005-2337 - [security] preserve safe level in the environment where a method is defined. - [security] prohibit calling tainted method (>2) when $SAFE == 0. stable/main/binary-hppa/ruby1.8-dev_1.8.2-7sarge2_hppa.deb stable/main/binary-hppa/libgdbm-ruby1.8_1.8.2-7sarge2_hppa.deb stable/main/binary-hppa/libdbm-ruby1.8_1.8.2-7sarge2_hppa.deb stable/main/binary-hppa/libtcltk-ruby1.8_1.8.2-7sarge2_hppa.deb stable/main/binary-hppa/libruby1.8-dbg_1.8.2-7sarge2_hppa.deb stable/main/binary-hppa/libopenssl-ruby1.8_1.8.2-7sarge2_hppa.deb stable/main/binary-hppa/libruby1.8_1.8.2-7sarge2_hppa.deb stable/main/binary-hppa/ruby1.8_1.8.2-7sarge2_hppa.deb stable/main/binary-hppa/libreadline-ruby1.8_1.8.2-7sarge2_hppa.deb ruby1.8 (1.8.2-7sarge2) stable-security; urgency=high * patch from akira yamada <akira@debian.org> - added debian/patches/803_preserve_safe_level.patch and debian/patches/804_prohibit_calling_tainted_method.patch: - CAN-2005-2337 - [security] preserve safe level in the environment where a method is defined. - [security] prohibit calling tainted method (>2) when $SAFE == 0. stable/main/binary-arm/libdbm-ruby1.8_1.8.2-7sarge2_arm.deb stable/main/binary-arm/libgdbm-ruby1.8_1.8.2-7sarge2_arm.deb stable/main/binary-arm/libruby1.8-dbg_1.8.2-7sarge2_arm.deb stable/main/binary-arm/ruby1.8-dev_1.8.2-7sarge2_arm.deb stable/main/binary-arm/libopenssl-ruby1.8_1.8.2-7sarge2_arm.deb stable/main/binary-arm/libtcltk-ruby1.8_1.8.2-7sarge2_arm.deb stable/main/binary-arm/libruby1.8_1.8.2-7sarge2_arm.deb stable/main/binary-arm/libreadline-ruby1.8_1.8.2-7sarge2_arm.deb stable/main/binary-arm/ruby1.8_1.8.2-7sarge2_arm.deb ruby1.8 (1.8.2-7sarge2) stable-security; urgency=high * patch from akira yamada <akira@debian.org> - added debian/patches/803_preserve_safe_level.patch and debian/patches/804_prohibit_calling_tainted_method.patch: - CAN-2005-2337 - [security] preserve safe level in the environment where a method is defined. - [security] prohibit calling tainted method (>2) when $SAFE == 0. stable/main/binary-alpha/ruby1.8_1.8.2-7sarge2_alpha.deb stable/main/binary-alpha/libtcltk-ruby1.8_1.8.2-7sarge2_alpha.deb stable/main/binary-alpha/ruby1.8-dev_1.8.2-7sarge2_alpha.deb stable/main/binary-alpha/libruby1.8-dbg_1.8.2-7sarge2_alpha.deb stable/main/binary-alpha/libreadline-ruby1.8_1.8.2-7sarge2_alpha.deb stable/main/binary-alpha/libopenssl-ruby1.8_1.8.2-7sarge2_alpha.deb stable/main/binary-alpha/libgdbm-ruby1.8_1.8.2-7sarge2_alpha.deb stable/main/binary-alpha/libruby1.8_1.8.2-7sarge2_alpha.deb stable/main/binary-alpha/libdbm-ruby1.8_1.8.2-7sarge2_alpha.deb ruby1.8 (1.8.2-7sarge2) stable-security; urgency=high * patch from akira yamada <akira@debian.org> - added debian/patches/803_preserve_safe_level.patch and debian/patches/804_prohibit_calling_tainted_method.patch: - CAN-2005-2337 - [security] preserve safe level in the environment where a method is defined. - [security] prohibit calling tainted method (>2) when $SAFE == 0. stable/main/binary-i386/libdbm-ruby1.8_1.8.2-7sarge2_i386.deb stable/main/binary-i386/ruby1.8-dev_1.8.2-7sarge2_i386.deb stable/main/binary-all/ruby1.8-examples_1.8.2-7sarge2_all.deb stable/main/binary-all/ruby1.8-elisp_1.8.2-7sarge2_all.deb stable/main/binary-all/irb1.8_1.8.2-7sarge2_all.deb stable/main/binary-all/ri1.8_1.8.2-7sarge2_all.deb stable/main/binary-i386/libopenssl-ruby1.8_1.8.2-7sarge2_i386.deb stable/main/binary-all/rdoc1.8_1.8.2-7sarge2_all.deb stable/main/binary-i386/libgdbm-ruby1.8_1.8.2-7sarge2_i386.deb stable/main/source/ruby1.8_1.8.2-7sarge2.diff.gz stable/main/binary-i386/libruby1.8_1.8.2-7sarge2_i386.deb stable/main/binary-i386/libreadline-ruby1.8_1.8.2-7sarge2_i386.deb stable/main/binary-i386/libruby1.8-dbg_1.8.2-7sarge2_i386.deb stable/main/binary-i386/libtcltk-ruby1.8_1.8.2-7sarge2_i386.deb stable/main/source/ruby1.8_1.8.2-7sarge2.dsc stable/main/binary-i386/ruby1.8_1.8.2-7sarge2_i386.deb ruby1.8 (1.8.2-7sarge2) stable-security; urgency=high * patch from akira yamada <akira@debian.org> - added debian/patches/803_preserve_safe_level.patch and debian/patches/804_prohibit_calling_tainted_method.patch: - CAN-2005-2337 - [security] preserve safe level in the environment where a method is defined. - [security] prohibit calling tainted method (>2) when $SAFE == 0. stable/main/binary-sparc/libdbm-ruby1.6_1.6.8-12sarge1_sparc.deb stable/main/binary-sparc/libsdbm-ruby1.6_1.6.8-12sarge1_sparc.deb stable/main/binary-sparc/libreadline-ruby1.6_1.6.8-12sarge1_sparc.deb stable/main/binary-sparc/libcurses-ruby1.6_1.6.8-12sarge1_sparc.deb stable/main/binary-sparc/ruby1.6_1.6.8-12sarge1_sparc.deb stable/main/binary-sparc/libruby1.6_1.6.8-12sarge1_sparc.deb stable/main/binary-sparc/libsyslog-ruby1.6_1.6.8-12sarge1_sparc.deb stable/main/binary-sparc/libruby1.6-dbg_1.6.8-12sarge1_sparc.deb stable/main/binary-sparc/libpty-ruby1.6_1.6.8-12sarge1_sparc.deb stable/main/binary-sparc/libgdbm-ruby1.6_1.6.8-12sarge1_sparc.deb stable/main/binary-sparc/libtcltk-ruby1.6_1.6.8-12sarge1_sparc.deb stable/main/binary-sparc/libtk-ruby1.6_1.6.8-12sarge1_sparc.deb stable/main/binary-sparc/ruby1.6-dev_1.6.8-12sarge1_sparc.deb ruby1.6 (1.6.8-12sarge1) stable-security; urgency=high * Patch from akira yamada <akira@debian.org> for CAN-2005-2337 - [security] preserve safe level in the environment where a method is defined. - [security] prohibit calling tainted method (>2) when $SAFE == 0. stable/main/binary-s390/libcurses-ruby1.6_1.6.8-12sarge1_s390.deb stable/main/binary-s390/ruby1.6-dev_1.6.8-12sarge1_s390.deb stable/main/binary-s390/ruby1.6_1.6.8-12sarge1_s390.deb stable/main/binary-s390/libtcltk-ruby1.6_1.6.8-12sarge1_s390.deb stable/main/binary-s390/libruby1.6-dbg_1.6.8-12sarge1_s390.deb stable/main/binary-s390/libreadline-ruby1.6_1.6.8-12sarge1_s390.deb stable/main/binary-s390/libpty-ruby1.6_1.6.8-12sarge1_s390.deb stable/main/binary-s390/libdbm-ruby1.6_1.6.8-12sarge1_s390.deb stable/main/binary-s390/libtk-ruby1.6_1.6.8-12sarge1_s390.deb stable/main/binary-s390/libsdbm-ruby1.6_1.6.8-12sarge1_s390.deb stable/main/binary-s390/libsyslog-ruby1.6_1.6.8-12sarge1_s390.deb stable/main/binary-s390/libgdbm-ruby1.6_1.6.8-12sarge1_s390.deb stable/main/binary-s390/libruby1.6_1.6.8-12sarge1_s390.deb ruby1.6 (1.6.8-12sarge1) stable-security; urgency=high * Patch from akira yamada <akira@debian.org> for CAN-2005-2337 - [security] preserve safe level in the environment where a method is defined. - [security] prohibit calling tainted method (>2) when $SAFE == 0. stable/main/binary-powerpc/ruby1.6-dev_1.6.8-12sarge1_powerpc.deb stable/main/binary-powerpc/libtcltk-ruby1.6_1.6.8-12sarge1_powerpc.deb stable/main/binary-powerpc/libpty-ruby1.6_1.6.8-12sarge1_powerpc.deb stable/main/binary-powerpc/libruby1.6_1.6.8-12sarge1_powerpc.deb stable/main/binary-powerpc/libruby1.6-dbg_1.6.8-12sarge1_powerpc.deb stable/main/binary-powerpc/libsyslog-ruby1.6_1.6.8-12sarge1_powerpc.deb stable/main/binary-powerpc/libreadline-ruby1.6_1.6.8-12sarge1_powerpc.deb stable/main/binary-powerpc/libtk-ruby1.6_1.6.8-12sarge1_powerpc.deb stable/main/binary-powerpc/ruby1.6_1.6.8-12sarge1_powerpc.deb stable/main/binary-powerpc/libcurses-ruby1.6_1.6.8-12sarge1_powerpc.deb stable/main/binary-powerpc/libdbm-ruby1.6_1.6.8-12sarge1_powerpc.deb stable/main/binary-powerpc/libgdbm-ruby1.6_1.6.8-12sarge1_powerpc.deb stable/main/binary-powerpc/libsdbm-ruby1.6_1.6.8-12sarge1_powerpc.deb ruby1.6 (1.6.8-12sarge1) stable-security; urgency=high * Patch from akira yamada <akira@debian.org> for CAN-2005-2337 - [security] preserve safe level in the environment where a method is defined. - [security] prohibit calling tainted method (>2) when $SAFE == 0. stable/main/binary-mipsel/libsdbm-ruby1.6_1.6.8-12sarge1_mipsel.deb stable/main/binary-mipsel/libruby1.6-dbg_1.6.8-12sarge1_mipsel.deb stable/main/binary-mipsel/libtcltk-ruby1.6_1.6.8-12sarge1_mipsel.deb stable/main/binary-mipsel/ruby1.6-dev_1.6.8-12sarge1_mipsel.deb stable/main/binary-mipsel/libreadline-ruby1.6_1.6.8-12sarge1_mipsel.deb stable/main/binary-mipsel/libsyslog-ruby1.6_1.6.8-12sarge1_mipsel.deb stable/main/binary-mipsel/libdbm-ruby1.6_1.6.8-12sarge1_mipsel.deb stable/main/binary-mipsel/libgdbm-ruby1.6_1.6.8-12sarge1_mipsel.deb stable/main/binary-mipsel/libcurses-ruby1.6_1.6.8-12sarge1_mipsel.deb stable/main/binary-mipsel/libpty-ruby1.6_1.6.8-12sarge1_mipsel.deb stable/main/binary-mipsel/libruby1.6_1.6.8-12sarge1_mipsel.deb stable/main/binary-mipsel/ruby1.6_1.6.8-12sarge1_mipsel.deb stable/main/binary-mipsel/libtk-ruby1.6_1.6.8-12sarge1_mipsel.deb ruby1.6 (1.6.8-12sarge1) stable-security; urgency=high * Patch from akira yamada <akira@debian.org> for CAN-2005-2337 - [security] preserve safe level in the environment where a method is defined. - [security] prohibit calling tainted method (>2) when $SAFE == 0. stable/main/binary-mips/libsdbm-ruby1.6_1.6.8-12sarge1_mips.deb stable/main/binary-mips/libdbm-ruby1.6_1.6.8-12sarge1_mips.deb stable/main/binary-mips/libpty-ruby1.6_1.6.8-12sarge1_mips.deb stable/main/binary-mips/libcurses-ruby1.6_1.6.8-12sarge1_mips.deb stable/main/binary-mips/libtcltk-ruby1.6_1.6.8-12sarge1_mips.deb stable/main/binary-mips/libruby1.6_1.6.8-12sarge1_mips.deb stable/main/binary-mips/libgdbm-ruby1.6_1.6.8-12sarge1_mips.deb stable/main/binary-mips/ruby1.6-dev_1.6.8-12sarge1_mips.deb stable/main/binary-mips/libsyslog-ruby1.6_1.6.8-12sarge1_mips.deb stable/main/binary-mips/ruby1.6_1.6.8-12sarge1_mips.deb stable/main/binary-mips/libruby1.6-dbg_1.6.8-12sarge1_mips.deb stable/main/binary-mips/libreadline-ruby1.6_1.6.8-12sarge1_mips.deb stable/main/binary-mips/libtk-ruby1.6_1.6.8-12sarge1_mips.deb ruby1.6 (1.6.8-12sarge1) stable-security; urgency=high * Patch from akira yamada <akira@debian.org> for CAN-2005-2337 - [security] preserve safe level in the environment where a method is defined. - [security] prohibit calling tainted method (>2) when $SAFE == 0. stable/main/binary-m68k/libsyslog-ruby1.6_1.6.8-12sarge1_m68k.deb stable/main/binary-m68k/libruby1.6_1.6.8-12sarge1_m68k.deb stable/main/binary-m68k/ruby1.6-dev_1.6.8-12sarge1_m68k.deb stable/main/binary-m68k/libreadline-ruby1.6_1.6.8-12sarge1_m68k.deb stable/main/binary-m68k/libpty-ruby1.6_1.6.8-12sarge1_m68k.deb stable/main/binary-m68k/libtk-ruby1.6_1.6.8-12sarge1_m68k.deb stable/main/binary-m68k/ruby1.6_1.6.8-12sarge1_m68k.deb stable/main/binary-m68k/libdbm-ruby1.6_1.6.8-12sarge1_m68k.deb stable/main/binary-m68k/libruby1.6-dbg_1.6.8-12sarge1_m68k.deb stable/main/binary-m68k/libcurses-ruby1.6_1.6.8-12sarge1_m68k.deb stable/main/binary-m68k/libgdbm-ruby1.6_1.6.8-12sarge1_m68k.deb stable/main/binary-m68k/libtcltk-ruby1.6_1.6.8-12sarge1_m68k.deb stable/main/binary-m68k/libsdbm-ruby1.6_1.6.8-12sarge1_m68k.deb ruby1.6 (1.6.8-12sarge1) stable-security; urgency=high * Patch from akira yamada <akira@debian.org> for CAN-2005-2337 - [security] preserve safe level in the environment where a method is defined. - [security] prohibit calling tainted method (>2) when $SAFE == 0. stable/main/binary-ia64/libreadline-ruby1.6_1.6.8-12sarge1_ia64.deb stable/main/binary-ia64/libruby1.6_1.6.8-12sarge1_ia64.deb stable/main/binary-ia64/libcurses-ruby1.6_1.6.8-12sarge1_ia64.deb stable/main/binary-ia64/ruby1.6-dev_1.6.8-12sarge1_ia64.deb stable/main/binary-ia64/libgdbm-ruby1.6_1.6.8-12sarge1_ia64.deb stable/main/binary-ia64/libpty-ruby1.6_1.6.8-12sarge1_ia64.deb stable/main/binary-ia64/ruby1.6_1.6.8-12sarge1_ia64.deb stable/main/binary-ia64/libtcltk-ruby1.6_1.6.8-12sarge1_ia64.deb stable/main/binary-ia64/libdbm-ruby1.6_1.6.8-12sarge1_ia64.deb stable/main/binary-ia64/libsdbm-ruby1.6_1.6.8-12sarge1_ia64.deb stable/main/binary-ia64/libtk-ruby1.6_1.6.8-12sarge1_ia64.deb stable/main/binary-ia64/libruby1.6-dbg_1.6.8-12sarge1_ia64.deb stable/main/binary-ia64/libsyslog-ruby1.6_1.6.8-12sarge1_ia64.deb ruby1.6 (1.6.8-12sarge1) stable-security; urgency=high * Patch from akira yamada <akira@debian.org> for CAN-2005-2337 - [security] preserve safe level in the environment where a method is defined. - [security] prohibit calling tainted method (>2) when $SAFE == 0. stable/main/binary-hppa/libpty-ruby1.6_1.6.8-12sarge1_hppa.deb stable/main/binary-hppa/ruby1.6-dev_1.6.8-12sarge1_hppa.deb stable/main/binary-hppa/libreadline-ruby1.6_1.6.8-12sarge1_hppa.deb stable/main/binary-hppa/libsyslog-ruby1.6_1.6.8-12sarge1_hppa.deb stable/main/binary-hppa/libdbm-ruby1.6_1.6.8-12sarge1_hppa.deb stable/main/binary-hppa/libtk-ruby1.6_1.6.8-12sarge1_hppa.deb stable/main/binary-hppa/ruby1.6_1.6.8-12sarge1_hppa.deb stable/main/binary-hppa/libcurses-ruby1.6_1.6.8-12sarge1_hppa.deb stable/main/binary-hppa/libsdbm-ruby1.6_1.6.8-12sarge1_hppa.deb stable/main/binary-hppa/libgdbm-ruby1.6_1.6.8-12sarge1_hppa.deb stable/main/binary-hppa/libtcltk-ruby1.6_1.6.8-12sarge1_hppa.deb stable/main/binary-hppa/libruby1.6_1.6.8-12sarge1_hppa.deb stable/main/binary-hppa/libruby1.6-dbg_1.6.8-12sarge1_hppa.deb ruby1.6 (1.6.8-12sarge1) stable-security; urgency=high * Patch from akira yamada <akira@debian.org> for CAN-2005-2337 - [security] preserve safe level in the environment where a method is defined. - [security] prohibit calling tainted method (>2) when $SAFE == 0. stable/main/binary-arm/libsdbm-ruby1.6_1.6.8-12sarge1_arm.deb stable/main/binary-arm/libtk-ruby1.6_1.6.8-12sarge1_arm.deb stable/main/binary-arm/libtcltk-ruby1.6_1.6.8-12sarge1_arm.deb stable/main/binary-arm/libreadline-ruby1.6_1.6.8-12sarge1_arm.deb stable/main/binary-arm/libruby1.6_1.6.8-12sarge1_arm.deb stable/main/binary-arm/libpty-ruby1.6_1.6.8-12sarge1_arm.deb stable/main/binary-arm/ruby1.6-dev_1.6.8-12sarge1_arm.deb stable/main/binary-arm/ruby1.6_1.6.8-12sarge1_arm.deb stable/main/binary-arm/libsyslog-ruby1.6_1.6.8-12sarge1_arm.deb stable/main/binary-arm/libdbm-ruby1.6_1.6.8-12sarge1_arm.deb stable/main/binary-arm/libruby1.6-dbg_1.6.8-12sarge1_arm.deb stable/main/binary-arm/libgdbm-ruby1.6_1.6.8-12sarge1_arm.deb stable/main/binary-arm/libcurses-ruby1.6_1.6.8-12sarge1_arm.deb ruby1.6 (1.6.8-12sarge1) stable-security; urgency=high * Patch from akira yamada <akira@debian.org> for CAN-2005-2337 - [security] preserve safe level in the environment where a method is defined. - [security] prohibit calling tainted method (>2) when $SAFE == 0. stable/main/binary-alpha/libruby1.6-dbg_1.6.8-12sarge1_alpha.deb stable/main/binary-alpha/libdbm-ruby1.6_1.6.8-12sarge1_alpha.deb stable/main/binary-alpha/libpty-ruby1.6_1.6.8-12sarge1_alpha.deb stable/main/binary-alpha/libcurses-ruby1.6_1.6.8-12sarge1_alpha.deb stable/main/binary-alpha/libgdbm-ruby1.6_1.6.8-12sarge1_alpha.deb stable/main/binary-alpha/libreadline-ruby1.6_1.6.8-12sarge1_alpha.deb stable/main/binary-alpha/libsdbm-ruby1.6_1.6.8-12sarge1_alpha.deb stable/main/binary-alpha/libtk-ruby1.6_1.6.8-12sarge1_alpha.deb stable/main/binary-alpha/ruby1.6_1.6.8-12sarge1_alpha.deb stable/main/binary-alpha/libsyslog-ruby1.6_1.6.8-12sarge1_alpha.deb stable/main/binary-alpha/libruby1.6_1.6.8-12sarge1_alpha.deb stable/main/binary-alpha/ruby1.6-dev_1.6.8-12sarge1_alpha.deb stable/main/binary-alpha/libtcltk-ruby1.6_1.6.8-12sarge1_alpha.deb ruby1.6 (1.6.8-12sarge1) stable-security; urgency=high * Patch from akira yamada <akira@debian.org> for CAN-2005-2337 - [security] preserve safe level in the environment where a method is defined. - [security] prohibit calling tainted method (>2) when $SAFE == 0. stable/main/binary-i386/libsyslog-ruby1.6_1.6.8-12sarge1_i386.deb stable/main/binary-i386/libtcltk-ruby1.6_1.6.8-12sarge1_i386.deb stable/main/binary-all/ruby1.6-elisp_1.6.8-12sarge1_all.deb stable/main/source/ruby1.6_1.6.8-12sarge1.diff.gz stable/main/binary-i386/libdbm-ruby1.6_1.6.8-12sarge1_i386.deb stable/main/binary-i386/libsdbm-ruby1.6_1.6.8-12sarge1_i386.deb stable/main/binary-i386/libpty-ruby1.6_1.6.8-12sarge1_i386.deb stable/main/binary-i386/libruby1.6-dbg_1.6.8-12sarge1_i386.deb stable/main/binary-i386/ruby1.6-dev_1.6.8-12sarge1_i386.deb stable/main/binary-all/ruby1.6-examples_1.6.8-12sarge1_all.deb stable/main/binary-all/irb1.6_1.6.8-12sarge1_all.deb stable/main/source/ruby1.6_1.6.8-12sarge1.dsc stable/main/binary-i386/libgdbm-ruby1.6_1.6.8-12sarge1_i386.deb stable/main/binary-i386/libruby1.6_1.6.8-12sarge1_i386.deb stable/main/binary-i386/libtk-ruby1.6_1.6.8-12sarge1_i386.deb stable/main/binary-i386/ruby1.6_1.6.8-12sarge1_i386.deb stable/main/binary-i386/libcurses-ruby1.6_1.6.8-12sarge1_i386.deb stable/main/binary-i386/libreadline-ruby1.6_1.6.8-12sarge1_i386.deb ruby1.6 (1.6.8-12sarge1) stable-security; urgency=high * Patch from akira yamada <akira@debian.org> for CAN-2005-2337 - [security] preserve safe level in the environment where a method is defined. - [security] prohibit calling tainted method (>2) when $SAFE == 0. stable/main/binary-i386/razor_2.670-1sarge2_i386.deb stable/main/source/razor_2.670-1sarge2.dsc stable/main/source/razor_2.670-1sarge2.diff.gz razor (2.670-1sarge2) stable-security; urgency=high * Replace (probably unnecessary) build-depend to minimize changes in stable upload * upload mainly to increment version number for silly backend reasons razor (2.670-1sarge1) stable-security; urgency=high * Patch to prevent segfaults (Closes: #314433) This corresponds to CAN-2005-2024 It prevents a crash on malicious emails. Without it, spammers can potentially DOS sites and generally wreck havoc with poorly configured spam filters. This is uploaded to stable because of the potential of a razor segfault to lose mail in some filtering setups. stable/main/binary-sparc/python2.3-gdbm_2.3.5-3sarge1_sparc.deb stable/main/binary-sparc/python2.3_2.3.5-3sarge1_sparc.deb stable/main/binary-sparc/python2.3-mpz_2.3.5-3sarge1_sparc.deb stable/main/binary-sparc/python2.3-tk_2.3.5-3sarge1_sparc.deb stable/main/binary-sparc/python2.3-dev_2.3.5-3sarge1_sparc.deb python2.3 (2.3.5-3sarge1) stable-security; urgency=low * SECURITY UPDATE (prepared by Martin Pitt <martin.pitt@ubuntu.com>). * Add debian/patches/pcre-security_CAN-2005-2491.dpatch: - Fix recent PCRE buffer overflow in local copy. - CAN-2005-2491 stable/main/binary-s390/python2.3_2.3.5-3sarge1_s390.deb stable/main/binary-s390/python2.3-mpz_2.3.5-3sarge1_s390.deb stable/main/binary-s390/python2.3-gdbm_2.3.5-3sarge1_s390.deb stable/main/binary-s390/python2.3-tk_2.3.5-3sarge1_s390.deb stable/main/binary-s390/python2.3-dev_2.3.5-3sarge1_s390.deb python2.3 (2.3.5-3sarge1) stable-security; urgency=low * SECURITY UPDATE (prepared by Martin Pitt <martin.pitt@ubuntu.com>). * Add debian/patches/pcre-security_CAN-2005-2491.dpatch: - Fix recent PCRE buffer overflow in local copy. - CAN-2005-2491 stable/main/binary-powerpc/python2.3-dev_2.3.5-3sarge1_powerpc.deb stable/main/binary-powerpc/python2.3_2.3.5-3sarge1_powerpc.deb stable/main/binary-powerpc/python2.3-gdbm_2.3.5-3sarge1_powerpc.deb stable/main/binary-powerpc/python2.3-mpz_2.3.5-3sarge1_powerpc.deb stable/main/binary-powerpc/python2.3-tk_2.3.5-3sarge1_powerpc.deb python2.3 (2.3.5-3sarge1) stable-security; urgency=low * SECURITY UPDATE (prepared by Martin Pitt <martin.pitt@ubuntu.com>). * Add debian/patches/pcre-security_CAN-2005-2491.dpatch: - Fix recent PCRE buffer overflow in local copy. - CAN-2005-2491 stable/main/binary-mipsel/python2.3_2.3.5-3sarge1_mipsel.deb stable/main/binary-mipsel/python2.3-dev_2.3.5-3sarge1_mipsel.deb stable/main/binary-mipsel/python2.3-mpz_2.3.5-3sarge1_mipsel.deb stable/main/binary-mipsel/python2.3-tk_2.3.5-3sarge1_mipsel.deb stable/main/binary-mipsel/python2.3-gdbm_2.3.5-3sarge1_mipsel.deb python2.3 (2.3.5-3sarge1) stable-security; urgency=low * SECURITY UPDATE (prepared by Martin Pitt <martin.pitt@ubuntu.com>). * Add debian/patches/pcre-security_CAN-2005-2491.dpatch: - Fix recent PCRE buffer overflow in local copy. - CAN-2005-2491 stable/main/binary-mips/python2.3-mpz_2.3.5-3sarge1_mips.deb stable/main/binary-mips/python2.3-gdbm_2.3.5-3sarge1_mips.deb stable/main/binary-mips/python2.3_2.3.5-3sarge1_mips.deb stable/main/binary-mips/python2.3-dev_2.3.5-3sarge1_mips.deb stable/main/binary-mips/python2.3-tk_2.3.5-3sarge1_mips.deb python2.3 (2.3.5-3sarge1) stable-security; urgency=low * SECURITY UPDATE (prepared by Martin Pitt <martin.pitt@ubuntu.com>). * Add debian/patches/pcre-security_CAN-2005-2491.dpatch: - Fix recent PCRE buffer overflow in local copy. - CAN-2005-2491 stable/main/binary-m68k/python2.3-dev_2.3.5-3sarge1_m68k.deb stable/main/binary-m68k/python2.3-mpz_2.3.5-3sarge1_m68k.deb stable/main/binary-m68k/python2.3-tk_2.3.5-3sarge1_m68k.deb stable/main/binary-m68k/python2.3-gdbm_2.3.5-3sarge1_m68k.deb stable/main/binary-m68k/python2.3_2.3.5-3sarge1_m68k.deb python2.3 (2.3.5-3sarge1) stable-security; urgency=low * SECURITY UPDATE (prepared by Martin Pitt <martin.pitt@ubuntu.com>). * Add debian/patches/pcre-security_CAN-2005-2491.dpatch: - Fix recent PCRE buffer overflow in local copy. - CAN-2005-2491 stable/main/binary-ia64/python2.3-mpz_2.3.5-3sarge1_ia64.deb stable/main/binary-ia64/python2.3-dev_2.3.5-3sarge1_ia64.deb stable/main/binary-ia64/python2.3_2.3.5-3sarge1_ia64.deb stable/main/binary-ia64/python2.3-tk_2.3.5-3sarge1_ia64.deb stable/main/binary-ia64/python2.3-gdbm_2.3.5-3sarge1_ia64.deb python2.3 (2.3.5-3sarge1) stable-security; urgency=low * SECURITY UPDATE (prepared by Martin Pitt <martin.pitt@ubuntu.com>). * Add debian/patches/pcre-security_CAN-2005-2491.dpatch: - Fix recent PCRE buffer overflow in local copy. - CAN-2005-2491 stable/main/binary-hppa/python2.3-mpz_2.3.5-3sarge1_hppa.deb stable/main/binary-hppa/python2.3-gdbm_2.3.5-3sarge1_hppa.deb stable/main/binary-hppa/python2.3_2.3.5-3sarge1_hppa.deb stable/main/binary-hppa/python2.3-dev_2.3.5-3sarge1_hppa.deb stable/main/binary-hppa/python2.3-tk_2.3.5-3sarge1_hppa.deb python2.3 (2.3.5-3sarge1) stable-security; urgency=low * SECURITY UPDATE (prepared by Martin Pitt <martin.pitt@ubuntu.com>). * Add debian/patches/pcre-security_CAN-2005-2491.dpatch: - Fix recent PCRE buffer overflow in local copy. - CAN-2005-2491 stable/main/binary-arm/python2.3-tk_2.3.5-3sarge1_arm.deb stable/main/binary-arm/python2.3-gdbm_2.3.5-3sarge1_arm.deb stable/main/binary-arm/python2.3_2.3.5-3sarge1_arm.deb stable/main/binary-arm/python2.3-mpz_2.3.5-3sarge1_arm.deb stable/main/binary-arm/python2.3-dev_2.3.5-3sarge1_arm.deb python2.3 (2.3.5-3sarge1) stable-security; urgency=low * SECURITY UPDATE (prepared by Martin Pitt <martin.pitt@ubuntu.com>). * Add debian/patches/pcre-security_CAN-2005-2491.dpatch: - Fix recent PCRE buffer overflow in local copy. - CAN-2005-2491 stable/main/binary-alpha/python2.3-tk_2.3.5-3sarge1_alpha.deb stable/main/binary-alpha/python2.3-gdbm_2.3.5-3sarge1_alpha.deb stable/main/binary-alpha/python2.3_2.3.5-3sarge1_alpha.deb stable/main/binary-alpha/python2.3-dev_2.3.5-3sarge1_alpha.deb stable/main/binary-alpha/python2.3-mpz_2.3.5-3sarge1_alpha.deb python2.3 (2.3.5-3sarge1) stable-security; urgency=low * SECURITY UPDATE (prepared by Martin Pitt <martin.pitt@ubuntu.com>). * Add debian/patches/pcre-security_CAN-2005-2491.dpatch: - Fix recent PCRE buffer overflow in local copy. - CAN-2005-2491 stable/main/binary-i386/python2.3-gdbm_2.3.5-3sarge1_i386.deb stable/main/binary-i386/python2.3-tk_2.3.5-3sarge1_i386.deb stable/main/source/python2.3_2.3.5-3sarge1.dsc stable/main/binary-i386/python2.3-mpz_2.3.5-3sarge1_i386.deb stable/main/binary-i386/python2.3-dev_2.3.5-3sarge1_i386.deb stable/main/binary-all/python2.3-examples_2.3.5-3sarge1_all.deb stable/main/binary-all/idle-python2.3_2.3.5-3sarge1_all.deb stable/main/binary-all/python2.3-doc_2.3.5-3sarge1_all.deb stable/main/binary-i386/python2.3_2.3.5-3sarge1_i386.deb stable/main/source/python2.3_2.3.5-3sarge1.diff.gz python2.3 (2.3.5-3sarge1) stable-security; urgency=low * SECURITY UPDATE (prepared by Martin Pitt <martin.pitt@ubuntu.com>). * Add debian/patches/pcre-security_CAN-2005-2491.dpatch: - Fix recent PCRE buffer overflow in local copy. - CAN-2005-2491 stable/main/binary-m68k/python2.2-dev_2.2.3dfsg-2sarge1_m68k.deb stable/main/binary-m68k/python2.2-gdbm_2.2.3dfsg-2sarge1_m68k.deb stable/main/binary-m68k/python2.2-xmlbase_2.2.3dfsg-2sarge1_m68k.deb stable/main/binary-m68k/python2.2_2.2.3dfsg-2sarge1_m68k.deb stable/main/binary-m68k/python2.2-mpz_2.2.3dfsg-2sarge1_m68k.deb stable/main/binary-m68k/python2.2-tk_2.2.3dfsg-2sarge1_m68k.deb python2.2 (2.2.3dfsg-2sarge1) stable-security; urgency=low * SECURITY UPDATE (prepared by Martin Pitt <martin.pitt@ubuntu.com>). * Add debian/patches/pcre-security_CAN-2005-2491.dpatch: - Fix recent PCRE buffer overflow in local copy. - CAN-2005-2491 * Fix bug in the original fix for CAN-2005-0089 (closes: #307689). stable/main/binary-hppa/python2.2-dev_2.2.3dfsg-2sarge1_hppa.deb stable/main/binary-hppa/python2.2-mpz_2.2.3dfsg-2sarge1_hppa.deb stable/main/binary-hppa/python2.2_2.2.3dfsg-2sarge1_hppa.deb stable/main/binary-hppa/python2.2-xmlbase_2.2.3dfsg-2sarge1_hppa.deb stable/main/binary-hppa/python2.2-gdbm_2.2.3dfsg-2sarge1_hppa.deb stable/main/binary-hppa/python2.2-tk_2.2.3dfsg-2sarge1_hppa.deb python2.2 (2.2.3dfsg-2sarge1) stable-security; urgency=low * SECURITY UPDATE (prepared by Martin Pitt <martin.pitt@ubuntu.com>). * Add debian/patches/pcre-security_CAN-2005-2491.dpatch: - Fix recent PCRE buffer overflow in local copy. - CAN-2005-2491 * Fix bug in the original fix for CAN-2005-0089 (closes: #307689). stable/main/binary-all/python2.2-doc_2.2.3dfsg-2sarge1_all.deb stable/main/binary-i386/python2.2-tk_2.2.3dfsg-2sarge1_i386.deb stable/main/binary-i386/python2.2-mpz_2.2.3dfsg-2sarge1_i386.deb stable/main/binary-all/idle-python2.2_2.2.3dfsg-2sarge1_all.deb stable/main/source/python2.2_2.2.3dfsg-2sarge1.diff.gz stable/main/binary-i386/python2.2-dev_2.2.3dfsg-2sarge1_i386.deb stable/main/binary-i386/python2.2-gdbm_2.2.3dfsg-2sarge1_i386.deb stable/main/binary-all/python2.2-examples_2.2.3dfsg-2sarge1_all.deb stable/main/source/python2.2_2.2.3dfsg-2sarge1.dsc stable/main/binary-i386/python2.2_2.2.3dfsg-2sarge1_i386.deb stable/main/binary-i386/python2.2-xmlbase_2.2.3dfsg-2sarge1_i386.deb python2.2 (2.2.3dfsg-2sarge1) stable-security; urgency=low * SECURITY UPDATE (prepared by Martin Pitt <martin.pitt@ubuntu.com>). * Add debian/patches/pcre-security_CAN-2005-2491.dpatch: - Fix recent PCRE buffer overflow in local copy. - CAN-2005-2491 * Fix bug in the original fix for CAN-2005-0089 (closes: #307689). stable/main/binary-i386/python2.1-dev_2.1.3dfsg-1sarge1_i386.deb stable/main/binary-i386/python2.1-mpz_2.1.3dfsg-1sarge1_i386.deb stable/main/source/python2.1_2.1.3dfsg-1sarge1.dsc stable/main/binary-all/idle-python2.1_2.1.3dfsg-1sarge1_all.deb stable/main/binary-all/python2.1-doc_2.1.3dfsg-1sarge1_all.deb stable/main/binary-i386/python2.1-tk_2.1.3dfsg-1sarge1_i386.deb stable/main/binary-i386/python2.1-xmlbase_2.1.3dfsg-1sarge1_i386.deb stable/main/binary-i386/python2.1_2.1.3dfsg-1sarge1_i386.deb stable/main/source/python2.1_2.1.3dfsg-1sarge1.diff.gz stable/main/binary-all/python2.1-examples_2.1.3dfsg-1sarge1_all.deb stable/main/binary-i386/python2.1-gdbm_2.1.3dfsg-1sarge1_i386.deb python2.1 (2.1.3dfsg-1sarge1) stable-security; urgency=low * SECURITY UPDATE (prepared by Martin Pitt <martin.pitt@ubuntu.com>). * Add debian/patches/pcre-security_CAN-2005-2491.dpatch: - Fix recent PCRE buffer overflow in local copy. - CAN-2005-2491 stable/main/binary-arm/pstotext_1.9-1sarge1_arm.deb pstotext (1.9-1sarge1) stable-security; urgency=high * Non-maintainer upload by the Security Team * Added -dSAFER to the execution of ghostscript to prevent the execution of arbitary commands [main.c, CAN-2005-2536] stable/main/binary-i386/pstotext_1.9-1sarge1_i386.deb stable/main/source/pstotext_1.9-1sarge1.diff.gz stable/main/source/pstotext_1.9-1sarge1.dsc pstotext (1.9-1sarge1) stable-security; urgency=high * Non-maintainer upload by the Security Team * Added -dSAFER to the execution of ghostscript to prevent the execution of arbitary commands [main.c, CAN-2005-2536] stable/main/binary-sparc/proftpd-pgsql_1.2.10-15sarge1_sparc.deb stable/main/binary-sparc/proftpd-common_1.2.10-15sarge1_sparc.deb stable/main/binary-sparc/proftpd-ldap_1.2.10-15sarge1_sparc.deb stable/main/binary-sparc/proftpd_1.2.10-15sarge1_sparc.deb stable/main/binary-sparc/proftpd-mysql_1.2.10-15sarge1_sparc.deb proftpd (1.2.10-15sarge1) stable-security; urgency=high Security patches backported from sid to manage CAN-2005-2390. * SECURITY: Managing ftpshut format string vulnerability. See http://bugs.proftpd.org/show_bug.cgi?id=2646 for information. Related patch is 30.response.c.diff. * SECURITY: Managing SQLShowInfo format string vulnerability. See http://bugs.proftpd.org/show_bug.cgi?id=2645 for information. Related patch is 31.mod_sql.c.diff. stable/main/binary-s390/proftpd-mysql_1.2.10-15sarge1_s390.deb stable/main/binary-s390/proftpd-pgsql_1.2.10-15sarge1_s390.deb stable/main/binary-s390/proftpd-ldap_1.2.10-15sarge1_s390.deb stable/main/binary-s390/proftpd_1.2.10-15sarge1_s390.deb stable/main/binary-s390/proftpd-common_1.2.10-15sarge1_s390.deb proftpd (1.2.10-15sarge1) stable-security; urgency=high Security patches backported from sid to manage CAN-2005-2390. * SECURITY: Managing ftpshut format string vulnerability. See http://bugs.proftpd.org/show_bug.cgi?id=2646 for information. Related patch is 30.response.c.diff. * SECURITY: Managing SQLShowInfo format string vulnerability. See http://bugs.proftpd.org/show_bug.cgi?id=2645 for information. Related patch is 31.mod_sql.c.diff. stable/main/binary-powerpc/proftpd-common_1.2.10-15sarge1_powerpc.deb stable/main/binary-powerpc/proftpd-mysql_1.2.10-15sarge1_powerpc.deb stable/main/binary-powerpc/proftpd_1.2.10-15sarge1_powerpc.deb stable/main/binary-powerpc/proftpd-ldap_1.2.10-15sarge1_powerpc.deb stable/main/binary-powerpc/proftpd-pgsql_1.2.10-15sarge1_powerpc.deb proftpd (1.2.10-15sarge1) stable-security; urgency=high Security patches backported from sid to manage CAN-2005-2390. * SECURITY: Managing ftpshut format string vulnerability. See http://bugs.proftpd.org/show_bug.cgi?id=2646 for information. Related patch is 30.response.c.diff. * SECURITY: Managing SQLShowInfo format string vulnerability. See http://bugs.proftpd.org/show_bug.cgi?id=2645 for information. Related patch is 31.mod_sql.c.diff. stable/main/binary-mipsel/proftpd_1.2.10-15sarge1_mipsel.deb stable/main/binary-mipsel/proftpd-pgsql_1.2.10-15sarge1_mipsel.deb stable/main/binary-mipsel/proftpd-ldap_1.2.10-15sarge1_mipsel.deb stable/main/binary-mipsel/proftpd-mysql_1.2.10-15sarge1_mipsel.deb stable/main/binary-mipsel/proftpd-common_1.2.10-15sarge1_mipsel.deb proftpd (1.2.10-15sarge1) stable-security; urgency=high Security patches backported from sid to manage CAN-2005-2390. * SECURITY: Managing ftpshut format string vulnerability. See http://bugs.proftpd.org/show_bug.cgi?id=2646 for information. Related patch is 30.response.c.diff. * SECURITY: Managing SQLShowInfo format string vulnerability. See http://bugs.proftpd.org/show_bug.cgi?id=2645 for information. Related patch is 31.mod_sql.c.diff. stable/main/binary-mips/proftpd-mysql_1.2.10-15sarge1_mips.deb stable/main/binary-mips/proftpd_1.2.10-15sarge1_mips.deb stable/main/binary-mips/proftpd-common_1.2.10-15sarge1_mips.deb stable/main/binary-mips/proftpd-ldap_1.2.10-15sarge1_mips.deb stable/main/binary-mips/proftpd-pgsql_1.2.10-15sarge1_mips.deb proftpd (1.2.10-15sarge1) stable-security; urgency=high Security patches backported from sid to manage CAN-2005-2390. * SECURITY: Managing ftpshut format string vulnerability. See http://bugs.proftpd.org/show_bug.cgi?id=2646 for information. Related patch is 30.response.c.diff. * SECURITY: Managing SQLShowInfo format string vulnerability. See http://bugs.proftpd.org/show_bug.cgi?id=2645 for information. Related patch is 31.mod_sql.c.diff. stable/main/binary-m68k/proftpd-common_1.2.10-15sarge1_m68k.deb stable/main/binary-m68k/proftpd_1.2.10-15sarge1_m68k.deb stable/main/binary-m68k/proftpd-mysql_1.2.10-15sarge1_m68k.deb stable/main/binary-m68k/proftpd-ldap_1.2.10-15sarge1_m68k.deb stable/main/binary-m68k/proftpd-pgsql_1.2.10-15sarge1_m68k.deb proftpd (1.2.10-15sarge1) stable-security; urgency=high Security patches backported from sid to manage CAN-2005-2390. * SECURITY: Managing ftpshut format string vulnerability. See http://bugs.proftpd.org/show_bug.cgi?id=2646 for information. Related patch is 30.response.c.diff. * SECURITY: Managing SQLShowInfo format string vulnerability. See http://bugs.proftpd.org/show_bug.cgi?id=2645 for information. Related patch is 31.mod_sql.c.diff. stable/main/binary-ia64/proftpd-mysql_1.2.10-15sarge1_ia64.deb stable/main/binary-ia64/proftpd-common_1.2.10-15sarge1_ia64.deb stable/main/binary-ia64/proftpd_1.2.10-15sarge1_ia64.deb stable/main/binary-ia64/proftpd-pgsql_1.2.10-15sarge1_ia64.deb stable/main/binary-ia64/proftpd-ldap_1.2.10-15sarge1_ia64.deb proftpd (1.2.10-15sarge1) stable-security; urgency=high Security patches backported from sid to manage CAN-2005-2390. * SECURITY: Managing ftpshut format string vulnerability. See http://bugs.proftpd.org/show_bug.cgi?id=2646 for information. Related patch is 30.response.c.diff. * SECURITY: Managing SQLShowInfo format string vulnerability. See http://bugs.proftpd.org/show_bug.cgi?id=2645 for information. Related patch is 31.mod_sql.c.diff. stable/main/binary-hppa/proftpd-pgsql_1.2.10-15sarge1_hppa.deb stable/main/binary-hppa/proftpd-ldap_1.2.10-15sarge1_hppa.deb stable/main/binary-hppa/proftpd-mysql_1.2.10-15sarge1_hppa.deb stable/main/binary-hppa/proftpd_1.2.10-15sarge1_hppa.deb stable/main/binary-hppa/proftpd-common_1.2.10-15sarge1_hppa.deb proftpd (1.2.10-15sarge1) stable-security; urgency=high Security patches backported from sid to manage CAN-2005-2390. * SECURITY: Managing ftpshut format string vulnerability. See http://bugs.proftpd.org/show_bug.cgi?id=2646 for information. Related patch is 30.response.c.diff. * SECURITY: Managing SQLShowInfo format string vulnerability. See http://bugs.proftpd.org/show_bug.cgi?id=2645 for information. Related patch is 31.mod_sql.c.diff. stable/main/binary-arm/proftpd-ldap_1.2.10-15sarge1_arm.deb stable/main/binary-arm/proftpd-pgsql_1.2.10-15sarge1_arm.deb stable/main/binary-arm/proftpd-mysql_1.2.10-15sarge1_arm.deb stable/main/binary-arm/proftpd-common_1.2.10-15sarge1_arm.deb stable/main/binary-arm/proftpd_1.2.10-15sarge1_arm.deb proftpd (1.2.10-15sarge1) stable-security; urgency=high Security patches backported from sid to manage CAN-2005-2390. * SECURITY: Managing ftpshut format string vulnerability. See http://bugs.proftpd.org/show_bug.cgi?id=2646 for information. Related patch is 30.response.c.diff. * SECURITY: Managing SQLShowInfo format string vulnerability. See http://bugs.proftpd.org/show_bug.cgi?id=2645 for information. Related patch is 31.mod_sql.c.diff. stable/main/binary-alpha/proftpd-mysql_1.2.10-15sarge1_alpha.deb stable/main/binary-alpha/proftpd-common_1.2.10-15sarge1_alpha.deb stable/main/binary-alpha/proftpd-pgsql_1.2.10-15sarge1_alpha.deb stable/main/binary-alpha/proftpd-ldap_1.2.10-15sarge1_alpha.deb stable/main/binary-alpha/proftpd_1.2.10-15sarge1_alpha.deb proftpd (1.2.10-15sarge1) stable-security; urgency=high Security patches backported from sid to manage CAN-2005-2390. * SECURITY: Managing ftpshut format string vulnerability. See http://bugs.proftpd.org/show_bug.cgi?id=2646 for information. Related patch is 30.response.c.diff. * SECURITY: Managing SQLShowInfo format string vulnerability. See http://bugs.proftpd.org/show_bug.cgi?id=2645 for information. Related patch is 31.mod_sql.c.diff. stable/main/source/proftpd_1.2.10-15sarge1.diff.gz stable/main/binary-all/proftpd-doc_1.2.10-15sarge1_all.deb stable/main/source/proftpd_1.2.10-15sarge1.dsc proftpd (1.2.10-15sarge1) stable-security; urgency=high Security patches backported from sid to manage CAN-2005-2390. * SECURITY: Managing ftpshut format string vulnerability. See http://bugs.proftpd.org/show_bug.cgi?id=2646 for information. Related patch is 30.response.c.diff. * SECURITY: Managing SQLShowInfo format string vulnerability. See http://bugs.proftpd.org/show_bug.cgi?id=2645 for information. Related patch is 31.mod_sql.c.diff. stable/main/binary-arm/kig_3.3.2-3.sarge.1_arm.deb stable/main/binary-arm/kstars_3.3.2-3.sarge.1_arm.deb stable/main/binary-arm/klatin_3.3.2-3.sarge.1_arm.deb stable/main/binary-arm/klettres_3.3.2-3.sarge.1_arm.deb stable/main/binary-arm/khangman_3.3.2-3.sarge.1_arm.deb stable/main/binary-arm/libkdeedu1_3.3.2-3.sarge.1_arm.deb stable/main/binary-arm/kmplot_3.3.2-3.sarge.1_arm.deb stable/main/binary-arm/keduca_3.3.2-3.sarge.1_arm.deb stable/main/binary-arm/libkdeedu-dev_3.3.2-3.sarge.1_arm.deb stable/main/binary-arm/kmessedwords_3.3.2-3.sarge.1_arm.deb stable/main/binary-arm/ktouch_3.3.2-3.sarge.1_arm.deb stable/main/binary-arm/kverbos_3.3.2-3.sarge.1_arm.deb stable/main/binary-arm/kbruch_3.3.2-3.sarge.1_arm.deb stable/main/binary-arm/kwordquiz_3.3.2-3.sarge.1_arm.deb stable/main/binary-arm/kalzium_3.3.2-3.sarge.1_arm.deb stable/main/binary-arm/kiten_3.3.2-3.sarge.1_arm.deb stable/main/binary-arm/kturtle_3.3.2-3.sarge.1_arm.deb stable/main/binary-arm/kvoctrain_3.3.2-3.sarge.1_arm.deb stable/main/binary-arm/kpercentage_3.3.2-3.sarge.1_arm.deb kdeedu (4:3.3.2-3.sarge.1) stable-security; urgency=high * Security upload. * Fixed tempfile handling in langen2kvtml, which is shipped in the kvoctrain package. See the following URL for further information: - http://www.kde.org/info/security/advisory-20050815-1.txt References: CAN-2005-2101 stable/main/binary-all/polygen-data_1.0.6-7sarge1_all.deb stable/main/binary-all/polygen_1.0.6-7sarge1_all.deb stable/main/source/polygen_1.0.6-7sarge1.dsc stable/main/source/polygen_1.0.6-7sarge1.diff.gz polygen (1.0.6-7sarge1) stable-security; urgency=high * Create grammar objects with the correct permissions [patches/04-create-mode.diff, polygen-data.postinst, CAN-2005-2656] Closes: bug#325468 in sarge. stable/main/binary-all/phpsysinfo_2.3-4sarge1_all.deb stable/main/source/phpsysinfo_2.3-4sarge1.dsc stable/main/source/phpsysinfo_2.3-4sarge1.diff.gz phpsysinfo (2.3-4sarge1) stable-security; urgency=high * Non-maintainer upload by the Security Team * Restrict sensor_program to single filenames [index.php, debian/patches/xxx_CVE-2005-0870.diff] * Backported parts of upstream changes and parts of changes by Christopher Kunz [index.php, debian/patches/xxx_CVE-2005-3347.diff] * Initialise charset variable [index.php, debian/patches/xxx_CVE-2005-3348.diff] stable/main/source/phppgadmin_3.5.2-5.dsc stable/main/source/phppgadmin_3.5.2-5.diff.gz stable/main/binary-all/phppgadmin_3.5.2-5_all.deb phppgadmin (3.5.2-5) stable-security; urgency=high * Fix security bug CAN-2005-2256, closes: #318284 stable/main/binary-all/phpmyadmin_2.6.2-3sarge1_all.deb stable/main/source/phpmyadmin_2.6.2-3sarge1.diff.gz stable/main/source/phpmyadmin_2.6.2-3sarge1.dsc phpmyadmin (4:2.6.2-3sarge1) stable-security; urgency=high * NMU by security team to fix several vulnerabilities. Patch provided by Piotr Roszatycki <dexter@debian.org> * Security fix: Several Cross-Site Scripting vulnerabilities. See http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-2869 Closes: #328501. * Security fix: (1) Local file inclusion vulnerability and (2) Cross-Site Scripting vulnerability. See http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-3300 See http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-3301 Closes: #335306, #335513. * Modified 001-config.patch: - Append the Debian package revision to the upstream version. Marks that this phpMyAdmin package has additional Debian modifications so the bugreports won't confuse phpMyAdmin's coders. * New 100-bug1223319.patch: - Use eval for config file including to catch parse errors. The patch is required by further patch which fixes XSS. * New 101-patch1258978.patch: - Move common code for error pages out of common.lib.php. The patch is required by further patch which fixes XSS. * New 102-bug1240880.patch: - XSS on the cookie-based login panel. * New 102-bug1249239.patch: - XSS vulnerability on Create page. * New 102-bug1252124.patch: - XSS on table creation page. * New 102-bug1265740.patch: - Protect against possible XSS, move input sanitizing to special file. * New 102-bug1283552.patch: - XSS on username. * New 102-bug_XSS_on_header.inc.php.patch: - XSS on header.inc.php. * New 103-bug_CVE-2005-3300.patch: - Cross-Site Scripting vulnerability. * New 103-bug_CVE-2005-3301.patch: - Local file inclusion vulnerability. stable/main/source/phpldapadmin_0.9.5-3sarge2.diff.gz stable/main/binary-all/phpldapadmin_0.9.5-3sarge2_all.deb stable/main/source/phpldapadmin_0.9.5-3sarge2.dsc phpldapadmin (0.9.5-3sarge2) stable-security; urgency=high * "Sorry, mea culpa" release (upload to the security queue). * login.php: really block anonymous login when disabled by config files. (CAN-2005-2654, bug #322423). stable/main/binary-all/phpgroupware-manual_0.9.16.005-3.sarge4_all.deb stable/main/binary-all/phpgroupware-ftp_0.9.16.005-3.sarge4_all.deb stable/main/binary-all/phpgroupware-felamimail_0.9.16.005-3.sarge4_all.deb stable/main/binary-all/phpgroupware-etemplate_0.9.16.005-3.sarge4_all.deb stable/main/binary-all/phpgroupware-wiki_0.9.16.005-3.sarge4_all.deb stable/main/binary-all/phpgroupware-xmlrpc_0.9.16.005-3.sarge4_all.deb stable/main/binary-all/phpgroupware-hr_0.9.16.005-3.sarge4_all.deb stable/main/binary-all/phpgroupware-img_0.9.16.005-3.sarge4_all.deb stable/main/binary-all/phpgroupware-phpbrain_0.9.16.005-3.sarge4_all.deb stable/main/binary-all/phpgroupware-tts_0.9.16.005-3.sarge4_all.deb stable/main/binary-all/phpgroupware-sitemgr_0.9.16.005-3.sarge4_all.deb stable/main/binary-all/phpgroupware-soap_0.9.16.005-3.sarge4_all.deb stable/main/source/phpgroupware_0.9.16.005-3.sarge4.diff.gz stable/main/binary-all/phpgroupware-headlines_0.9.16.005-3.sarge4_all.deb stable/main/binary-all/phpgroupware-dj_0.9.16.005-3.sarge4_all.deb stable/main/binary-all/phpgroupware-stocks_0.9.16.005-3.sarge4_all.deb stable/main/binary-all/phpgroupware-projects_0.9.16.005-3.sarge4_all.deb stable/main/binary-all/phpgroupware-email_0.9.16.005-3.sarge4_all.deb stable/main/binary-all/phpgroupware-core_0.9.16.005-3.sarge4_all.deb stable/main/binary-all/phpgroupware-polls_0.9.16.005-3.sarge4_all.deb stable/main/binary-all/phpgroupware-phpsysinfo_0.9.16.005-3.sarge4_all.deb stable/main/binary-all/phpgroupware_0.9.16.005-3.sarge4_all.deb stable/main/binary-all/phpgroupware-eldaptir_0.9.16.005-3.sarge4_all.deb stable/main/binary-all/phpgroupware-registration_0.9.16.005-3.sarge4_all.deb stable/main/binary-all/phpgroupware-infolog_0.9.16.005-3.sarge4_all.deb stable/main/binary-all/phpgroupware-filemanager_0.9.16.005-3.sarge4_all.deb stable/main/binary-all/phpgroupware-news-admin_0.9.16.005-3.sarge4_all.deb stable/main/source/phpgroupware_0.9.16.005-3.sarge4.dsc stable/main/binary-all/phpgroupware-phpgwapi_0.9.16.005-3.sarge4_all.deb stable/main/binary-all/phpgroupware-skel_0.9.16.005-3.sarge4_all.deb stable/main/binary-all/phpgroupware-todo_0.9.16.005-3.sarge4_all.deb stable/main/binary-all/phpgroupware-chat_0.9.16.005-3.sarge4_all.deb stable/main/binary-all/phpgroupware-admin_0.9.16.005-3.sarge4_all.deb stable/main/binary-all/phpgroupware-calendar_0.9.16.005-3.sarge4_all.deb stable/main/binary-all/phpgroupware-notes_0.9.16.005-3.sarge4_all.deb stable/main/binary-all/phpgroupware-preferences_0.9.16.005-3.sarge4_all.deb stable/main/binary-all/phpgroupware-folders_0.9.16.005-3.sarge4_all.deb stable/main/binary-all/phpgroupware-nntp_0.9.16.005-3.sarge4_all.deb stable/main/binary-all/phpgroupware-developer-tools_0.9.16.005-3.sarge4_all.deb stable/main/binary-all/phpgroupware-bookmarks_0.9.16.005-3.sarge4_all.deb stable/main/binary-all/phpgroupware-phonelog_0.9.16.005-3.sarge4_all.deb stable/main/binary-all/phpgroupware-messenger_0.9.16.005-3.sarge4_all.deb stable/main/binary-all/phpgroupware-comic_0.9.16.005-3.sarge4_all.deb stable/main/binary-all/phpgroupware-setup_0.9.16.005-3.sarge4_all.deb stable/main/binary-all/phpgroupware-addressbook_0.9.16.005-3.sarge4_all.deb stable/main/binary-all/phpgroupware-fudforum_0.9.16.005-3.sarge4_all.deb stable/main/binary-all/phpgroupware-forum_0.9.16.005-3.sarge4_all.deb stable/main/binary-all/phpgroupware-qmailldap_0.9.16.005-3.sarge4_all.deb phpgroupware (0.9.16.005-3.sarge4) stable-security; urgency=high * Non-maintainer upload by the Security Team * Applied corrective patch by Thomas Viehmann to prevent the use of non-existing variables. stable/main/binary-all/phpbb2-conf-mysql_2.0.13-6sarge1_all.deb stable/main/binary-all/phpbb2_2.0.13-6sarge1_all.deb stable/main/binary-all/phpbb2-languages_2.0.13-6sarge1_all.deb stable/main/source/phpbb2_2.0.13+1-6sarge1.dsc stable/main/source/phpbb2_2.0.13+1-6sarge1.diff.gz phpbb2 (2.0.13+1-6sarge1) stable-security; urgency=high * Security update by phpBB maintainers * Update existing BBCode XSS patch to incorporate fix for a newly discovered XSS vulnerability [CAN-2005-2161]. (Closes: #317739) stable/main/binary-m68k/php4-ldap_4.3.10-16_m68k.deb stable/main/binary-m68k/php4-cgi_4.3.10-16_m68k.deb stable/main/binary-m68k/php4-imap_4.3.10-16_m68k.deb stable/main/binary-m68k/libapache2-mod-php4_4.3.10-16_m68k.deb stable/main/binary-m68k/php4-domxml_4.3.10-16_m68k.deb stable/main/binary-m68k/php4-xslt_4.3.10-16_m68k.deb stable/main/binary-m68k/php4-curl_4.3.10-16_m68k.deb stable/main/binary-m68k/php4-mcal_4.3.10-16_m68k.deb stable/main/binary-m68k/php4-common_4.3.10-16_m68k.deb stable/main/binary-m68k/php4-dev_4.3.10-16_m68k.deb stable/main/binary-m68k/php4-mhash_4.3.10-16_m68k.deb stable/main/binary-m68k/php4-snmp_4.3.10-16_m68k.deb stable/main/binary-m68k/php4-mysql_4.3.10-16_m68k.deb stable/main/binary-m68k/php4-sybase_4.3.10-16_m68k.deb stable/main/binary-m68k/libapache-mod-php4_4.3.10-16_m68k.deb stable/main/binary-m68k/php4-cli_4.3.10-16_m68k.deb stable/main/binary-m68k/php4-odbc_4.3.10-16_m68k.deb stable/main/binary-m68k/php4-recode_4.3.10-16_m68k.deb stable/main/binary-m68k/php4-gd_4.3.10-16_m68k.deb php4 (4:4.3.10-16) stable-security; urgency=high Adam Conrad <adconrad@0c3.net>: * Patch php4-dev's bundled shtool to use a temporary directory to resolve insecure temp file handling, reported in CAN-2005-1751 and CAN-2005-1759. * Patch PEAR after it has been installed in debian/php4-pear to resolve the XML-RPC vulnerability reported in CAN-2005-1921 (closes: #316447) * Backport changes by sesser@php.net and danielc@php.net to resolve another remote XML_RPC exploit, as reported in CAN-2005-2498 (closes: #323366) stable/main/binary-all/php4-pear_4.3.10-16_all.deb stable/main/binary-i386/php4-odbc_4.3.10-16_i386.deb stable/main/binary-i386/php4-xslt_4.3.10-16_i386.deb stable/main/binary-i386/php4-recode_4.3.10-16_i386.deb stable/main/binary-i386/libapache-mod-php4_4.3.10-16_i386.deb stable/main/binary-i386/php4-dev_4.3.10-16_i386.deb stable/main/binary-i386/php4-sybase_4.3.10-16_i386.deb stable/main/binary-i386/libapache2-mod-php4_4.3.10-16_i386.deb stable/main/binary-i386/php4-snmp_4.3.10-16_i386.deb stable/main/binary-i386/php4-mcal_4.3.10-16_i386.deb stable/main/binary-i386/php4-ldap_4.3.10-16_i386.deb stable/main/binary-all/php4_4.3.10-16_all.deb stable/main/binary-i386/php4-domxml_4.3.10-16_i386.deb stable/main/binary-i386/php4-cgi_4.3.10-16_i386.deb stable/main/binary-i386/php4-imap_4.3.10-16_i386.deb stable/main/source/php4_4.3.10-16.diff.gz stable/main/binary-i386/php4-cli_4.3.10-16_i386.deb stable/main/binary-i386/php4-curl_4.3.10-16_i386.deb stable/main/binary-i386/php4-gd_4.3.10-16_i386.deb stable/main/binary-i386/php4-mhash_4.3.10-16_i386.deb stable/main/source/php4_4.3.10-16.dsc stable/main/binary-i386/php4-mysql_4.3.10-16_i386.deb stable/main/binary-i386/php4-common_4.3.10-16_i386.deb php4 (4:4.3.10-16) stable-security; urgency=high Adam Conrad <adconrad@0c3.net>: * Patch php4-dev's bundled shtool to use a temporary directory to resolve insecure temp file handling, reported in CAN-2005-1751 and CAN-2005-1759. * Patch PEAR after it has been installed in debian/php4-pear to resolve the XML-RPC vulnerability reported in CAN-2005-1921 (closes: #316447) * Backport changes by sesser@php.net and danielc@php.net to resolve another remote XML_RPC exploit, as reported in CAN-2005-2498 (closes: #323366) stable/main/binary-sparc/pdns-backend-ldap_2.9.17-13sarge2_sparc.deb stable/main/binary-sparc/pdns-backend-mysql_2.9.17-13sarge2_sparc.deb stable/main/binary-sparc/pdns-backend-pgsql_2.9.17-13sarge2_sparc.deb stable/main/binary-sparc/pdns-backend-pipe_2.9.17-13sarge2_sparc.deb stable/main/binary-sparc/pdns-server_2.9.17-13sarge2_sparc.deb stable/main/binary-sparc/pdns-recursor_2.9.17-13sarge2_sparc.deb stable/main/binary-sparc/pdns-backend-sqlite_2.9.17-13sarge2_sparc.deb stable/main/binary-sparc/pdns_2.9.17-13sarge2_sparc.deb stable/main/binary-sparc/pdns-backend-geo_2.9.17-13sarge2_sparc.deb pdns (2.9.17-13sarge2) stable; urgency=low * Removed code that mess up the pdns.conf. (Closes: #321974, #326260) * Move clean up code to build-stamp. (Closes: #322352) stable/main/binary-s390/pdns-backend-sqlite_2.9.17-13sarge2_s390.deb stable/main/binary-s390/pdns-backend-geo_2.9.17-13sarge2_s390.deb stable/main/binary-s390/pdns-server_2.9.17-13sarge2_s390.deb stable/main/binary-s390/pdns-backend-mysql_2.9.17-13sarge2_s390.deb stable/main/binary-s390/pdns-recursor_2.9.17-13sarge2_s390.deb stable/main/binary-s390/pdns-backend-ldap_2.9.17-13sarge2_s390.deb stable/main/binary-s390/pdns-backend-pipe_2.9.17-13sarge2_s390.deb stable/main/binary-s390/pdns_2.9.17-13sarge2_s390.deb stable/main/binary-s390/pdns-backend-pgsql_2.9.17-13sarge2_s390.deb pdns (2.9.17-13sarge2) stable; urgency=low * Removed code that mess up the pdns.conf. (Closes: #321974, #326260) * Move clean up code to build-stamp. (Closes: #322352) stable/main/binary-powerpc/pdns_2.9.17-13sarge2_powerpc.deb stable/main/binary-powerpc/pdns-backend-sqlite_2.9.17-13sarge2_powerpc.deb stable/main/binary-powerpc/pdns-backend-geo_2.9.17-13sarge2_powerpc.deb stable/main/binary-powerpc/pdns-backend-ldap_2.9.17-13sarge2_powerpc.deb stable/main/binary-powerpc/pdns-server_2.9.17-13sarge2_powerpc.deb stable/main/binary-powerpc/pdns-recursor_2.9.17-13sarge2_powerpc.deb stable/main/binary-powerpc/pdns-backend-pipe_2.9.17-13sarge2_powerpc.deb stable/main/binary-powerpc/pdns-backend-mysql_2.9.17-13sarge2_powerpc.deb stable/main/binary-powerpc/pdns-backend-pgsql_2.9.17-13sarge2_powerpc.deb pdns (2.9.17-13sarge2) stable; urgency=low * Removed code that mess up the pdns.conf. (Closes: #321974, #326260) * Move clean up code to build-stamp. (Closes: #322352) stable/main/binary-mipsel/pdns-server_2.9.17-13sarge2_mipsel.deb stable/main/binary-mipsel/pdns-backend-sqlite_2.9.17-13sarge2_mipsel.deb stable/main/binary-mipsel/pdns-backend-ldap_2.9.17-13sarge2_mipsel.deb stable/main/binary-mipsel/pdns_2.9.17-13sarge2_mipsel.deb stable/main/binary-mipsel/pdns-backend-pgsql_2.9.17-13sarge2_mipsel.deb stable/main/binary-mipsel/pdns-backend-mysql_2.9.17-13sarge2_mipsel.deb stable/main/binary-mipsel/pdns-backend-pipe_2.9.17-13sarge2_mipsel.deb stable/main/binary-mipsel/pdns-backend-geo_2.9.17-13sarge2_mipsel.deb stable/main/binary-mipsel/pdns-recursor_2.9.17-13sarge2_mipsel.deb pdns (2.9.17-13sarge2) stable; urgency=low * Removed code that mess up the pdns.conf. (Closes: #321974, #326260) * Move clean up code to build-stamp. (Closes: #322352) stable/main/binary-mips/pdns-backend-mysql_2.9.17-13sarge2_mips.deb stable/main/binary-mips/pdns-recursor_2.9.17-13sarge2_mips.deb stable/main/binary-mips/pdns_2.9.17-13sarge2_mips.deb stable/main/binary-mips/pdns-server_2.9.17-13sarge2_mips.deb stable/main/binary-mips/pdns-backend-geo_2.9.17-13sarge2_mips.deb stable/main/binary-mips/pdns-backend-sqlite_2.9.17-13sarge2_mips.deb stable/main/binary-mips/pdns-backend-pipe_2.9.17-13sarge2_mips.deb stable/main/binary-mips/pdns-backend-ldap_2.9.17-13sarge2_mips.deb stable/main/binary-mips/pdns-backend-pgsql_2.9.17-13sarge2_mips.deb pdns (2.9.17-13sarge2) stable; urgency=low * Removed code that mess up the pdns.conf. (Closes: #321974, #326260) * Move clean up code to build-stamp. (Closes: #322352) stable/main/binary-m68k/pdns-backend-mysql_2.9.17-13sarge2_m68k.deb stable/main/binary-m68k/pdns-server_2.9.17-13sarge2_m68k.deb stable/main/binary-m68k/pdns-backend-pipe_2.9.17-13sarge2_m68k.deb stable/main/binary-m68k/pdns-backend-ldap_2.9.17-13sarge2_m68k.deb stable/main/binary-m68k/pdns-recursor_2.9.17-13sarge2_m68k.deb stable/main/binary-m68k/pdns-backend-pgsql_2.9.17-13sarge2_m68k.deb stable/main/binary-m68k/pdns-backend-geo_2.9.17-13sarge2_m68k.deb stable/main/binary-m68k/pdns_2.9.17-13sarge2_m68k.deb stable/main/binary-m68k/pdns-backend-sqlite_2.9.17-13sarge2_m68k.deb pdns (2.9.17-13sarge2) stable; urgency=low * Removed code that mess up the pdns.conf. (Closes: #321974, #326260) * Move clean up code to build-stamp. (Closes: #322352) stable/main/binary-ia64/pdns-backend-sqlite_2.9.17-13sarge2_ia64.deb stable/main/binary-ia64/pdns-backend-pipe_2.9.17-13sarge2_ia64.deb stable/main/binary-ia64/pdns_2.9.17-13sarge2_ia64.deb stable/main/binary-ia64/pdns-server_2.9.17-13sarge2_ia64.deb stable/main/binary-ia64/pdns-backend-geo_2.9.17-13sarge2_ia64.deb stable/main/binary-ia64/pdns-recursor_2.9.17-13sarge2_ia64.deb stable/main/binary-ia64/pdns-backend-mysql_2.9.17-13sarge2_ia64.deb stable/main/binary-ia64/pdns-backend-ldap_2.9.17-13sarge2_ia64.deb stable/main/binary-ia64/pdns-backend-pgsql_2.9.17-13sarge2_ia64.deb pdns (2.9.17-13sarge2) stable; urgency=low * Removed code that mess up the pdns.conf. (Closes: #321974, #326260) * Move clean up code to build-stamp. (Closes: #322352) stable/main/binary-hppa/pdns-backend-pipe_2.9.17-13sarge2_hppa.deb stable/main/binary-hppa/pdns-server_2.9.17-13sarge2_hppa.deb stable/main/binary-hppa/pdns-backend-pgsql_2.9.17-13sarge2_hppa.deb stable/main/binary-hppa/pdns-backend-geo_2.9.17-13sarge2_hppa.deb stable/main/binary-hppa/pdns-backend-sqlite_2.9.17-13sarge2_hppa.deb stable/main/binary-hppa/pdns_2.9.17-13sarge2_hppa.deb stable/main/binary-hppa/pdns-recursor_2.9.17-13sarge2_hppa.deb stable/main/binary-hppa/pdns-backend-mysql_2.9.17-13sarge2_hppa.deb stable/main/binary-hppa/pdns-backend-ldap_2.9.17-13sarge2_hppa.deb pdns (2.9.17-13sarge2) stable; urgency=low * Removed code that mess up the pdns.conf. (Closes: #321974, #326260) * Move clean up code to build-stamp. (Closes: #322352) stable/main/binary-arm/pdns-backend-pgsql_2.9.17-13sarge2_arm.deb stable/main/binary-arm/pdns-recursor_2.9.17-13sarge2_arm.deb stable/main/binary-arm/pdns-backend-mysql_2.9.17-13sarge2_arm.deb stable/main/binary-arm/pdns-backend-pipe_2.9.17-13sarge2_arm.deb stable/main/binary-arm/pdns-backend-ldap_2.9.17-13sarge2_arm.deb stable/main/binary-arm/pdns-server_2.9.17-13sarge2_arm.deb stable/main/binary-arm/pdns-backend-sqlite_2.9.17-13sarge2_arm.deb stable/main/binary-arm/pdns_2.9.17-13sarge2_arm.deb stable/main/binary-arm/pdns-backend-geo_2.9.17-13sarge2_arm.deb pdns (2.9.17-13sarge2) stable; urgency=low * Removed code that mess up the pdns.conf. (Closes: #321974, #326260) * Move clean up code to build-stamp. (Closes: #322352) stable/main/binary-alpha/pdns-backend-geo_2.9.17-13sarge2_alpha.deb stable/main/binary-alpha/pdns-backend-mysql_2.9.17-13sarge2_alpha.deb stable/main/binary-alpha/pdns-recursor_2.9.17-13sarge2_alpha.deb stable/main/binary-alpha/pdns-backend-pgsql_2.9.17-13sarge2_alpha.deb stable/main/binary-alpha/pdns-backend-pipe_2.9.17-13sarge2_alpha.deb stable/main/binary-alpha/pdns_2.9.17-13sarge2_alpha.deb stable/main/binary-alpha/pdns-backend-sqlite_2.9.17-13sarge2_alpha.deb stable/main/binary-alpha/pdns-backend-ldap_2.9.17-13sarge2_alpha.deb stable/main/binary-alpha/pdns-server_2.9.17-13sarge2_alpha.deb pdns (2.9.17-13sarge2) stable; urgency=low * Removed code that mess up the pdns.conf. (Closes: #321974, #326260) * Move clean up code to build-stamp. (Closes: #322352) stable/main/binary-i386/pdns-backend-pgsql_2.9.17-13sarge2_i386.deb stable/main/binary-i386/pdns_2.9.17-13sarge2_i386.deb stable/main/binary-i386/pdns-backend-sqlite_2.9.17-13sarge2_i386.deb stable/main/binary-i386/pdns-backend-ldap_2.9.17-13sarge2_i386.deb stable/main/binary-all/pdns-doc_2.9.17-13sarge2_all.deb stable/main/binary-i386/pdns-recursor_2.9.17-13sarge2_i386.deb stable/main/source/pdns_2.9.17-13sarge2.diff.gz stable/main/binary-i386/pdns-backend-pipe_2.9.17-13sarge2_i386.deb stable/main/source/pdns_2.9.17-13sarge2.dsc stable/main/binary-i386/pdns-backend-geo_2.9.17-13sarge2_i386.deb stable/main/binary-i386/pdns-backend-mysql_2.9.17-13sarge2_i386.deb stable/main/binary-i386/pdns-server_2.9.17-13sarge2_i386.deb pdns (2.9.17-13sarge2) stable; urgency=low * Removed code that mess up the pdns.conf. (Closes: #321974, #326260) * Move clean up code to build-stamp. (Closes: #322352) stable/main/binary-sparc/libpcre3-dev_4.5-1.2sarge1_sparc.deb stable/main/binary-sparc/pcregrep_4.5-1.2sarge1_sparc.deb stable/main/binary-sparc/libpcre3_4.5-1.2sarge1_sparc.deb pcre3 (4.5-1.2sarge1) stable-security; urgency=high * Non-maintainer upload by the Security Team * Applied patch extracted from upstream 6.2 by SuSE to fix an Integer overflow [pcre.c, testdata/testoutput2, testdata/testinput2, CAN-2005-2491] stable/main/binary-s390/libpcre3-dev_4.5-1.2sarge1_s390.deb stable/main/binary-s390/libpcre3_4.5-1.2sarge1_s390.deb stable/main/binary-s390/pcregrep_4.5-1.2sarge1_s390.deb pcre3 (4.5-1.2sarge1) stable-security; urgency=high * Non-maintainer upload by the Security Team * Applied patch extracted from upstream 6.2 by SuSE to fix an Integer overflow [pcre.c, testdata/testoutput2, testdata/testinput2, CAN-2005-2491] stable/main/binary-powerpc/libpcre3-dev_4.5-1.2sarge1_powerpc.deb stable/main/binary-powerpc/pcregrep_4.5-1.2sarge1_powerpc.deb stable/main/binary-powerpc/libpcre3_4.5-1.2sarge1_powerpc.deb pcre3 (4.5-1.2sarge1) stable-security; urgency=high * Non-maintainer upload by the Security Team * Applied patch extracted from upstream 6.2 by SuSE to fix an Integer overflow [pcre.c, testdata/testoutput2, testdata/testinput2, CAN-2005-2491] stable/main/binary-mipsel/libpcre3-dev_4.5-1.2sarge1_mipsel.deb stable/main/binary-mipsel/pcregrep_4.5-1.2sarge1_mipsel.deb stable/main/binary-mipsel/libpcre3_4.5-1.2sarge1_mipsel.deb pcre3 (4.5-1.2sarge1) stable-security; urgency=high * Non-maintainer upload by the Security Team * Applied patch extracted from upstream 6.2 by SuSE to fix an Integer overflow [pcre.c, testdata/testoutput2, testdata/testinput2, CAN-2005-2491] stable/main/binary-mips/libpcre3-dev_4.5-1.2sarge1_mips.deb stable/main/binary-mips/pcregrep_4.5-1.2sarge1_mips.deb stable/main/binary-mips/libpcre3_4.5-1.2sarge1_mips.deb pcre3 (4.5-1.2sarge1) stable-security; urgency=high * Non-maintainer upload by the Security Team * Applied patch extracted from upstream 6.2 by SuSE to fix an Integer overflow [pcre.c, testdata/testoutput2, testdata/testinput2, CAN-2005-2491] stable/main/binary-m68k/pcregrep_4.5-1.2sarge1_m68k.deb stable/main/binary-m68k/libpcre3-dev_4.5-1.2sarge1_m68k.deb stable/main/binary-m68k/libpcre3_4.5-1.2sarge1_m68k.deb pcre3 (4.5-1.2sarge1) stable-security; urgency=high * Non-maintainer upload by the Security Team * Applied patch extracted from upstream 6.2 by SuSE to fix an Integer overflow [pcre.c, testdata/testoutput2, testdata/testinput2, CAN-2005-2491] stable/main/binary-ia64/libpcre3-dev_4.5-1.2sarge1_ia64.deb stable/main/binary-ia64/pcregrep_4.5-1.2sarge1_ia64.deb stable/main/binary-ia64/libpcre3_4.5-1.2sarge1_ia64.deb pcre3 (4.5-1.2sarge1) stable-security; urgency=high * Non-maintainer upload by the Security Team * Applied patch extracted from upstream 6.2 by SuSE to fix an Integer overflow [pcre.c, testdata/testoutput2, testdata/testinput2, CAN-2005-2491] stable/main/binary-i386/libpcre3_4.5-1.2sarge1_i386.deb stable/main/binary-i386/pcregrep_4.5-1.2sarge1_i386.deb stable/main/binary-i386/libpcre3-dev_4.5-1.2sarge1_i386.deb pcre3 (4.5-1.2sarge1) stable-security; urgency=high * Non-maintainer upload by the Security Team * Applied patch extracted from upstream 6.2 by SuSE to fix an Integer overflow [pcre.c, testdata/testoutput2, testdata/testinput2, CAN-2005-2491] stable/main/binary-arm/libpcre3_4.5-1.2sarge1_arm.deb stable/main/binary-arm/pcregrep_4.5-1.2sarge1_arm.deb stable/main/binary-arm/libpcre3-dev_4.5-1.2sarge1_arm.deb pcre3 (4.5-1.2sarge1) stable-security; urgency=high * Non-maintainer upload by the Security Team * Applied patch extracted from upstream 6.2 by SuSE to fix an Integer overflow [pcre.c, testdata/testoutput2, testdata/testinput2, CAN-2005-2491] stable/main/binary-alpha/libpcre3_4.5-1.2sarge1_alpha.deb stable/main/binary-alpha/pcregrep_4.5-1.2sarge1_alpha.deb stable/main/binary-alpha/libpcre3-dev_4.5-1.2sarge1_alpha.deb pcre3 (4.5-1.2sarge1) stable-security; urgency=high * Non-maintainer upload by the Security Team * Applied patch extracted from upstream 6.2 by SuSE to fix an Integer overflow [pcre.c, testdata/testoutput2, testdata/testinput2, CAN-2005-2491] stable/main/binary-hppa/pcregrep_4.5-1.2sarge1_hppa.deb stable/main/binary-all/pgrep_4.5-1.2sarge1_all.deb stable/main/binary-hppa/libpcre3-dev_4.5-1.2sarge1_hppa.deb stable/main/source/pcre3_4.5-1.2sarge1.diff.gz stable/main/binary-hppa/libpcre3_4.5-1.2sarge1_hppa.deb stable/main/source/pcre3_4.5-1.2sarge1.dsc pcre3 (4.5-1.2sarge1) stable-security; urgency=high * Non-maintainer upload by the Security Team * Applied patch extracted from upstream 6.2 by SuSE to fix an Integer overflow [pcre.c, testdata/testoutput2, testdata/testinput2, CAN-2005-2491] stable/main/binary-sparc/osh_1.7-13sarge1_sparc.deb osh (1.7-13sarge1) stable-security; urgency=high * Non-maintainer upload by The Security Team. * Fix buffer overflow relating to environmental variable handling [CVE-2005-3346]. * Fix buffer overflow relating to directory and filename handling [CVE-2005-3533.]. stable/main/binary-s390/osh_1.7-13sarge1_s390.deb osh (1.7-13sarge1) stable-security; urgency=high * Non-maintainer upload by The Security Team. * Fix buffer overflow relating to environmental variable handling [CVE-2005-3346]. * Fix buffer overflow relating to directory and filename handling [CVE-2005-3533.]. stable/main/binary-powerpc/osh_1.7-13sarge1_powerpc.deb osh (1.7-13sarge1) stable-security; urgency=high * Non-maintainer upload by The Security Team. * Fix buffer overflow relating to environmental variable handling [CVE-2005-3346]. * Fix buffer overflow relating to directory and filename handling [CVE-2005-3533.]. stable/main/binary-mipsel/osh_1.7-13sarge1_mipsel.deb osh (1.7-13sarge1) stable-security; urgency=high * Non-maintainer upload by The Security Team. * Fix buffer overflow relating to environmental variable handling [CVE-2005-3346]. * Fix buffer overflow relating to directory and filename handling [CVE-2005-3533.]. stable/main/binary-mips/osh_1.7-13sarge1_mips.deb osh (1.7-13sarge1) stable-security; urgency=high * Non-maintainer upload by The Security Team. * Fix buffer overflow relating to environmental variable handling [CVE-2005-3346]. * Fix buffer overflow relating to directory and filename handling [CVE-2005-3533.]. stable/main/binary-m68k/osh_1.7-13sarge1_m68k.deb osh (1.7-13sarge1) stable-security; urgency=high * Non-maintainer upload by The Security Team. * Fix buffer overflow relating to environmental variable handling [CVE-2005-3346]. * Fix buffer overflow relating to directory and filename handling [CVE-2005-3533.]. stable/main/binary-ia64/osh_1.7-13sarge1_ia64.deb osh (1.7-13sarge1) stable-security; urgency=high * Non-maintainer upload by The Security Team. * Fix buffer overflow relating to environmental variable handling [CVE-2005-3346]. * Fix buffer overflow relating to directory and filename handling [CVE-2005-3533.]. stable/main/binary-hppa/osh_1.7-13sarge1_hppa.deb osh (1.7-13sarge1) stable-security; urgency=high * Non-maintainer upload by The Security Team. * Fix buffer overflow relating to environmental variable handling [CVE-2005-3346]. * Fix buffer overflow relating to directory and filename handling [CVE-2005-3533.]. stable/main/binary-arm/osh_1.7-13sarge1_arm.deb osh (1.7-13sarge1) stable-security; urgency=high * Non-maintainer upload by The Security Team. * Fix buffer overflow relating to environmental variable handling [CVE-2005-3346]. * Fix buffer overflow relating to directory and filename handling [CVE-2005-3533.]. stable/main/binary-alpha/osh_1.7-13sarge1_alpha.deb osh (1.7-13sarge1) stable-security; urgency=high * Non-maintainer upload by The Security Team. * Fix buffer overflow relating to environmental variable handling [CVE-2005-3346]. * Fix buffer overflow relating to directory and filename handling [CVE-2005-3533.]. stable/main/binary-i386/osh_1.7-13sarge1_i386.deb stable/main/source/osh_1.7-13sarge1.diff.gz stable/main/source/osh_1.7-13sarge1.dsc osh (1.7-13sarge1) stable-security; urgency=high * Non-maintainer upload by The Security Team. * Fix buffer overflow relating to environmental variable handling [CVE-2005-3346]. * Fix buffer overflow relating to directory and filename handling [CVE-2005-3533.]. stable/main/binary-sparc/openvpn_2.0-1sarge2_sparc.deb openvpn (2.0-1sarge2) stable-security; urgency=high * Sarge security release. * Applied upstream patches to fix the following security bugs: - DoS vulnerability on the server in TCP mode. (CVE-2005-3409) - Format string vulnerability in the foreign_option function in options.c could potentially allow a malicious or compromised server to execute arbitrary code on the client. (CVE-2005-3393) stable/main/binary-s390/openvpn_2.0-1sarge2_s390.deb openvpn (2.0-1sarge2) stable-security; urgency=high * Sarge security release. * Applied upstream patches to fix the following security bugs: - DoS vulnerability on the server in TCP mode. (CVE-2005-3409) - Format string vulnerability in the foreign_option function in options.c could potentially allow a malicious or compromised server to execute arbitrary code on the client. (CVE-2005-3393) stable/main/binary-mipsel/openvpn_2.0-1sarge2_mipsel.deb openvpn (2.0-1sarge2) stable-security; urgency=high * Sarge security release. * Applied upstream patches to fix the following security bugs: - DoS vulnerability on the server in TCP mode. (CVE-2005-3409) - Format string vulnerability in the foreign_option function in options.c could potentially allow a malicious or compromised server to execute arbitrary code on the client. (CVE-2005-3393) stable/main/binary-mips/openvpn_2.0-1sarge2_mips.deb openvpn (2.0-1sarge2) stable-security; urgency=high * Sarge security release. * Applied upstream patches to fix the following security bugs: - DoS vulnerability on the server in TCP mode. (CVE-2005-3409) - Format string vulnerability in the foreign_option function in options.c could potentially allow a malicious or compromised server to execute arbitrary code on the client. (CVE-2005-3393) stable/main/binary-m68k/openvpn_2.0-1sarge2_m68k.deb openvpn (2.0-1sarge2) stable-security; urgency=high * Sarge security release. * Applied upstream patches to fix the following security bugs: - DoS vulnerability on the server in TCP mode. (CVE-2005-3409) - Format string vulnerability in the foreign_option function in options.c could potentially allow a malicious or compromised server to execute arbitrary code on the client. (CVE-2005-3393) stable/main/binary-ia64/openvpn_2.0-1sarge2_ia64.deb openvpn (2.0-1sarge2) stable-security; urgency=high * Sarge security release. * Applied upstream patches to fix the following security bugs: - DoS vulnerability on the server in TCP mode. (CVE-2005-3409) - Format string vulnerability in the foreign_option function in options.c could potentially allow a malicious or compromised server to execute arbitrary code on the client. (CVE-2005-3393) stable/main/binary-i386/openvpn_2.0-1sarge2_i386.deb openvpn (2.0-1sarge2) stable-security; urgency=high * Sarge security release. * Applied upstream patches to fix the following security bugs: - DoS vulnerability on the server in TCP mode. (CVE-2005-3409) - Format string vulnerability in the foreign_option function in options.c could potentially allow a malicious or compromised server to execute arbitrary code on the client. (CVE-2005-3393) stable/main/binary-hppa/openvpn_2.0-1sarge2_hppa.deb openvpn (2.0-1sarge2) stable-security; urgency=high * Sarge security release. * Applied upstream patches to fix the following security bugs: - DoS vulnerability on the server in TCP mode. (CVE-2005-3409) - Format string vulnerability in the foreign_option function in options.c could potentially allow a malicious or compromised server to execute arbitrary code on the client. (CVE-2005-3393) stable/main/binary-arm/openvpn_2.0-1sarge2_arm.deb openvpn (2.0-1sarge2) stable-security; urgency=high * Sarge security release. * Applied upstream patches to fix the following security bugs: - DoS vulnerability on the server in TCP mode. (CVE-2005-3409) - Format string vulnerability in the foreign_option function in options.c could potentially allow a malicious or compromised server to execute arbitrary code on the client. (CVE-2005-3393) stable/main/binary-alpha/openvpn_2.0-1sarge2_alpha.deb openvpn (2.0-1sarge2) stable-security; urgency=high * Sarge security release. * Applied upstream patches to fix the following security bugs: - DoS vulnerability on the server in TCP mode. (CVE-2005-3409) - Format string vulnerability in the foreign_option function in options.c could potentially allow a malicious or compromised server to execute arbitrary code on the client. (CVE-2005-3393) stable/main/source/openvpn_2.0-1sarge2.diff.gz stable/main/source/openvpn_2.0-1sarge2.dsc stable/main/binary-powerpc/openvpn_2.0-1sarge2_powerpc.deb openvpn (2.0-1sarge2) stable-security; urgency=high * Sarge security release. * Applied upstream patches to fix the following security bugs: - DoS vulnerability on the server in TCP mode. (CVE-2005-3409) - Format string vulnerability in the foreign_option function in options.c could potentially allow a malicious or compromised server to execute arbitrary code on the client. (CVE-2005-3393) stable/main/binary-sparc/libssl0.9.6_0.9.6m-1sarge1_sparc.deb openssl096 (0.9.6m-1sarge1) stable-security; urgency=high * Non-maintainer upload by the Security Team * Applied upstream patch to remove SSLv2 fallback in order to fix a possibility to use a weaker protocol version [ssl/s23_srvr.c, CVE-2005-2969] stable/main/binary-s390/libssl0.9.6_0.9.6m-1sarge1_s390.deb openssl096 (0.9.6m-1sarge1) stable-security; urgency=high * Non-maintainer upload by the Security Team * Applied upstream patch to remove SSLv2 fallback in order to fix a possibility to use a weaker protocol version [ssl/s23_srvr.c, CVE-2005-2969] stable/main/binary-mipsel/libssl0.9.6_0.9.6m-1sarge1_mipsel.deb openssl096 (0.9.6m-1sarge1) stable-security; urgency=high * Non-maintainer upload by the Security Team * Applied upstream patch to remove SSLv2 fallback in order to fix a possibility to use a weaker protocol version [ssl/s23_srvr.c, CVE-2005-2969] stable/main/binary-mips/libssl0.9.6_0.9.6m-1sarge1_mips.deb openssl096 (0.9.6m-1sarge1) stable-security; urgency=high * Non-maintainer upload by the Security Team * Applied upstream patch to remove SSLv2 fallback in order to fix a possibility to use a weaker protocol version [ssl/s23_srvr.c, CVE-2005-2969] stable/main/binary-m68k/libssl0.9.6_0.9.6m-1sarge1_m68k.deb openssl096 (0.9.6m-1sarge1) stable-security; urgency=high * Non-maintainer upload by the Security Team * Applied upstream patch to remove SSLv2 fallback in order to fix a possibility to use a weaker protocol version [ssl/s23_srvr.c, CVE-2005-2969] stable/main/binary-ia64/libssl0.9.6_0.9.6m-1sarge1_ia64.deb openssl096 (0.9.6m-1sarge1) stable-security; urgency=high * Non-maintainer upload by the Security Team * Applied upstream patch to remove SSLv2 fallback in order to fix a possibility to use a weaker protocol version [ssl/s23_srvr.c, CVE-2005-2969] stable/main/binary-i386/libssl0.9.6_0.9.6m-1sarge1_i386.deb openssl096 (0.9.6m-1sarge1) stable-security; urgency=high * Non-maintainer upload by the Security Team * Applied upstream patch to remove SSLv2 fallback in order to fix a possibility to use a weaker protocol version [ssl/s23_srvr.c, CVE-2005-2969] stable/main/binary-hppa/libssl0.9.6_0.9.6m-1sarge1_hppa.deb openssl096 (0.9.6m-1sarge1) stable-security; urgency=high * Non-maintainer upload by the Security Team * Applied upstream patch to remove SSLv2 fallback in order to fix a possibility to use a weaker protocol version [ssl/s23_srvr.c, CVE-2005-2969] stable/main/binary-arm/libssl0.9.6_0.9.6m-1sarge1_arm.deb openssl096 (0.9.6m-1sarge1) stable-security; urgency=high * Non-maintainer upload by the Security Team * Applied upstream patch to remove SSLv2 fallback in order to fix a possibility to use a weaker protocol version [ssl/s23_srvr.c, CVE-2005-2969] stable/main/binary-alpha/libssl0.9.6_0.9.6m-1sarge1_alpha.deb openssl096 (0.9.6m-1sarge1) stable-security; urgency=high * Non-maintainer upload by the Security Team * Applied upstream patch to remove SSLv2 fallback in order to fix a possibility to use a weaker protocol version [ssl/s23_srvr.c, CVE-2005-2969] stable/main/source/openssl096_0.9.6m-1sarge1.diff.gz stable/main/binary-powerpc/libssl0.9.6_0.9.6m-1sarge1_powerpc.deb stable/main/source/openssl096_0.9.6m-1sarge1.dsc openssl096 (0.9.6m-1sarge1) stable-security; urgency=high * Non-maintainer upload by the Security Team * Applied upstream patch to remove SSLv2 fallback in order to fix a possibility to use a weaker protocol version [ssl/s23_srvr.c, CVE-2005-2969] stable/main/binary-sparc/libssl-dev_0.9.7e-3sarge1_sparc.deb stable/main/binary-sparc/libssl0.9.7_0.9.7e-3sarge1_sparc.deb stable/main/binary-sparc/openssl_0.9.7e-3sarge1_sparc.deb stable/main/binary-sparc/libcrypto0.9.7-udeb_0.9.7e-3sarge1_sparc.udeb openssl (0.9.7e-3sarge1) stable-security; urgency=high * Non-maintainer upload by the Security Team * Applied upstream patch to remove SSLv2 fallback in order to fix a possibility to use a weaker protocol version [ssl/s23_srvr.c, CVE-2005-2969] stable/main/binary-s390/libssl-dev_0.9.7e-3sarge1_s390.deb stable/main/binary-s390/libcrypto0.9.7-udeb_0.9.7e-3sarge1_s390.udeb stable/main/binary-s390/openssl_0.9.7e-3sarge1_s390.deb stable/main/binary-s390/libssl0.9.7_0.9.7e-3sarge1_s390.deb openssl (0.9.7e-3sarge1) stable-security; urgency=high * Non-maintainer upload by the Security Team * Applied upstream patch to remove SSLv2 fallback in order to fix a possibility to use a weaker protocol version [ssl/s23_srvr.c, CVE-2005-2969] stable/main/binary-mipsel/openssl_0.9.7e-3sarge1_mipsel.deb stable/main/binary-mipsel/libssl-dev_0.9.7e-3sarge1_mipsel.deb stable/main/binary-mipsel/libcrypto0.9.7-udeb_0.9.7e-3sarge1_mipsel.udeb stable/main/binary-mipsel/libssl0.9.7_0.9.7e-3sarge1_mipsel.deb openssl (0.9.7e-3sarge1) stable-security; urgency=high * Non-maintainer upload by the Security Team * Applied upstream patch to remove SSLv2 fallback in order to fix a possibility to use a weaker protocol version [ssl/s23_srvr.c, CVE-2005-2969] stable/main/binary-mips/libssl-dev_0.9.7e-3sarge1_mips.deb stable/main/binary-mips/libssl0.9.7_0.9.7e-3sarge1_mips.deb stable/main/binary-mips/libcrypto0.9.7-udeb_0.9.7e-3sarge1_mips.udeb stable/main/binary-mips/openssl_0.9.7e-3sarge1_mips.deb openssl (0.9.7e-3sarge1) stable-security; urgency=high * Non-maintainer upload by the Security Team * Applied upstream patch to remove SSLv2 fallback in order to fix a possibility to use a weaker protocol version [ssl/s23_srvr.c, CVE-2005-2969] stable/main/binary-m68k/libssl0.9.7_0.9.7e-3sarge1_m68k.deb stable/main/binary-m68k/libssl-dev_0.9.7e-3sarge1_m68k.deb stable/main/binary-m68k/openssl_0.9.7e-3sarge1_m68k.deb stable/main/binary-m68k/libcrypto0.9.7-udeb_0.9.7e-3sarge1_m68k.udeb openssl (0.9.7e-3sarge1) stable-security; urgency=high * Non-maintainer upload by the Security Team * Applied upstream patch to remove SSLv2 fallback in order to fix a possibility to use a weaker protocol version [ssl/s23_srvr.c, CVE-2005-2969] stable/main/binary-ia64/libssl-dev_0.9.7e-3sarge1_ia64.deb stable/main/binary-ia64/libcrypto0.9.7-udeb_0.9.7e-3sarge1_ia64.udeb stable/main/binary-ia64/openssl_0.9.7e-3sarge1_ia64.deb stable/main/binary-ia64/libssl0.9.7_0.9.7e-3sarge1_ia64.deb openssl (0.9.7e-3sarge1) stable-security; urgency=high * Non-maintainer upload by the Security Team * Applied upstream patch to remove SSLv2 fallback in order to fix a possibility to use a weaker protocol version [ssl/s23_srvr.c, CVE-2005-2969] stable/main/binary-i386/openssl_0.9.7e-3sarge1_i386.deb stable/main/binary-i386/libssl0.9.7_0.9.7e-3sarge1_i386.deb stable/main/binary-i386/libssl-dev_0.9.7e-3sarge1_i386.deb stable/main/binary-i386/libcrypto0.9.7-udeb_0.9.7e-3sarge1_i386.udeb openssl (0.9.7e-3sarge1) stable-security; urgency=high * Non-maintainer upload by the Security Team * Applied upstream patch to remove SSLv2 fallback in order to fix a possibility to use a weaker protocol version [ssl/s23_srvr.c, CVE-2005-2969] stable/main/binary-hppa/openssl_0.9.7e-3sarge1_hppa.deb stable/main/binary-hppa/libcrypto0.9.7-udeb_0.9.7e-3sarge1_hppa.udeb stable/main/binary-hppa/libssl0.9.7_0.9.7e-3sarge1_hppa.deb stable/main/binary-hppa/libssl-dev_0.9.7e-3sarge1_hppa.deb openssl (0.9.7e-3sarge1) stable-security; urgency=high * Non-maintainer upload by the Security Team * Applied upstream patch to remove SSLv2 fallback in order to fix a possibility to use a weaker protocol version [ssl/s23_srvr.c, CVE-2005-2969] stable/main/binary-arm/libcrypto0.9.7-udeb_0.9.7e-3sarge1_arm.udeb stable/main/binary-arm/openssl_0.9.7e-3sarge1_arm.deb stable/main/binary-arm/libssl0.9.7_0.9.7e-3sarge1_arm.deb stable/main/binary-arm/libssl-dev_0.9.7e-3sarge1_arm.deb openssl (0.9.7e-3sarge1) stable-security; urgency=high * Non-maintainer upload by the Security Team * Applied upstream patch to remove SSLv2 fallback in order to fix a possibility to use a weaker protocol version [ssl/s23_srvr.c, CVE-2005-2969] stable/main/binary-alpha/libcrypto0.9.7-udeb_0.9.7e-3sarge1_alpha.udeb stable/main/binary-alpha/libssl0.9.7_0.9.7e-3sarge1_alpha.deb stable/main/binary-alpha/openssl_0.9.7e-3sarge1_alpha.deb stable/main/binary-alpha/libssl-dev_0.9.7e-3sarge1_alpha.deb openssl (0.9.7e-3sarge1) stable-security; urgency=high * Non-maintainer upload by the Security Team * Applied upstream patch to remove SSLv2 fallback in order to fix a possibility to use a weaker protocol version [ssl/s23_srvr.c, CVE-2005-2969] stable/main/binary-powerpc/libcrypto0.9.7-udeb_0.9.7e-3sarge1_powerpc.udeb stable/main/source/openssl_0.9.7e-3sarge1.dsc stable/main/binary-powerpc/libssl-dev_0.9.7e-3sarge1_powerpc.deb stable/main/binary-powerpc/libssl0.9.7_0.9.7e-3sarge1_powerpc.deb stable/main/source/openssl_0.9.7e-3sarge1.diff.gz stable/main/binary-powerpc/openssl_0.9.7e-3sarge1_powerpc.deb openssl (0.9.7e-3sarge1) stable-security; urgency=high * Non-maintainer upload by the Security Team * Applied upstream patch to remove SSLv2 fallback in order to fix a possibility to use a weaker protocol version [ssl/s23_srvr.c, CVE-2005-2969] stable/main/binary-sparc/nut_2.0.1-4_sparc.deb stable/main/binary-sparc/nut-dev_2.0.1-4_sparc.deb stable/main/binary-sparc/nut-snmp_2.0.1-4_sparc.deb stable/main/binary-sparc/nut-cgi_2.0.1-4_sparc.deb stable/main/binary-sparc/nut-usb_2.0.1-4_sparc.deb nut (2.0.1-4) stable; urgency=medium * debian/nut-cgi.config: fix some typo error and remove exit calls (closes: #312106) * debian/nut.config: remove exit calls stable/main/binary-s390/nut-cgi_2.0.1-4_s390.deb stable/main/binary-s390/nut-dev_2.0.1-4_s390.deb stable/main/binary-s390/nut_2.0.1-4_s390.deb stable/main/binary-s390/nut-usb_2.0.1-4_s390.deb stable/main/binary-s390/nut-snmp_2.0.1-4_s390.deb nut (2.0.1-4) stable; urgency=medium * debian/nut-cgi.config: fix some typo error and remove exit calls (closes: #312106) * debian/nut.config: remove exit calls stable/main/binary-powerpc/nut-usb_2.0.1-4_powerpc.deb stable/main/binary-powerpc/nut-snmp_2.0.1-4_powerpc.deb stable/main/binary-powerpc/nut-dev_2.0.1-4_powerpc.deb stable/main/binary-powerpc/nut_2.0.1-4_powerpc.deb stable/main/binary-powerpc/nut-cgi_2.0.1-4_powerpc.deb nut (2.0.1-4) stable; urgency=medium * debian/nut-cgi.config: fix some typo error and remove exit calls (closes: #312106) * debian/nut.config: remove exit calls stable/main/binary-mipsel/nut_2.0.1-4_mipsel.deb stable/main/binary-mipsel/nut-cgi_2.0.1-4_mipsel.deb stable/main/binary-mipsel/nut-snmp_2.0.1-4_mipsel.deb stable/main/binary-mipsel/nut-dev_2.0.1-4_mipsel.deb stable/main/binary-mipsel/nut-usb_2.0.1-4_mipsel.deb nut (2.0.1-4) stable; urgency=medium * debian/nut-cgi.config: fix some typo error and remove exit calls (closes: #312106) * debian/nut.config: remove exit calls stable/main/binary-mips/nut-cgi_2.0.1-4_mips.deb stable/main/binary-mips/nut-snmp_2.0.1-4_mips.deb stable/main/binary-mips/nut-dev_2.0.1-4_mips.deb stable/main/binary-mips/nut-usb_2.0.1-4_mips.deb stable/main/binary-mips/nut_2.0.1-4_mips.deb nut (2.0.1-4) stable; urgency=medium * debian/nut-cgi.config: fix some typo error and remove exit calls (closes: #312106) * debian/nut.config: remove exit calls stable/main/binary-m68k/nut-dev_2.0.1-4_m68k.deb stable/main/binary-m68k/nut_2.0.1-4_m68k.deb stable/main/binary-m68k/nut-cgi_2.0.1-4_m68k.deb stable/main/binary-m68k/nut-usb_2.0.1-4_m68k.deb stable/main/binary-m68k/nut-snmp_2.0.1-4_m68k.deb nut (2.0.1-4) stable; urgency=medium * debian/nut-cgi.config: fix some typo error and remove exit calls (closes: #312106) * debian/nut.config: remove exit calls stable/main/binary-ia64/nut-snmp_2.0.1-4_ia64.deb stable/main/binary-ia64/nut-cgi_2.0.1-4_ia64.deb stable/main/binary-ia64/nut_2.0.1-4_ia64.deb stable/main/binary-ia64/nut-dev_2.0.1-4_ia64.deb stable/main/binary-ia64/nut-usb_2.0.1-4_ia64.deb nut (2.0.1-4) stable; urgency=medium * debian/nut-cgi.config: fix some typo error and remove exit calls (closes: #312106) * debian/nut.config: remove exit calls stable/main/binary-hppa/nut-snmp_2.0.1-4_hppa.deb stable/main/binary-hppa/nut-usb_2.0.1-4_hppa.deb stable/main/binary-hppa/nut-dev_2.0.1-4_hppa.deb stable/main/binary-hppa/nut_2.0.1-4_hppa.deb stable/main/binary-hppa/nut-cgi_2.0.1-4_hppa.deb nut (2.0.1-4) stable; urgency=medium * debian/nut-cgi.config: fix some typo error and remove exit calls (closes: #312106) * debian/nut.config: remove exit calls stable/main/binary-arm/nut-cgi_2.0.1-4_arm.deb stable/main/binary-arm/nut_2.0.1-4_arm.deb stable/main/binary-arm/nut-dev_2.0.1-4_arm.deb stable/main/binary-arm/nut-usb_2.0.1-4_arm.deb stable/main/binary-arm/nut-snmp_2.0.1-4_arm.deb nut (2.0.1-4) stable; urgency=medium * debian/nut-cgi.config: fix some typo error and remove exit calls (closes: #312106) * debian/nut.config: remove exit calls stable/main/binary-alpha/nut-dev_2.0.1-4_alpha.deb stable/main/binary-alpha/nut-cgi_2.0.1-4_alpha.deb stable/main/binary-alpha/nut-snmp_2.0.1-4_alpha.deb stable/main/binary-alpha/nut-usb_2.0.1-4_alpha.deb stable/main/binary-alpha/nut_2.0.1-4_alpha.deb nut (2.0.1-4) stable; urgency=medium * debian/nut-cgi.config: fix some typo error and remove exit calls (closes: #312106) * debian/nut.config: remove exit calls stable/main/binary-i386/nut-usb_2.0.1-4_i386.deb stable/main/source/nut_2.0.1-4.dsc stable/main/binary-i386/nut-dev_2.0.1-4_i386.deb stable/main/binary-i386/nut_2.0.1-4_i386.deb stable/main/binary-i386/nut-snmp_2.0.1-4_i386.deb stable/main/source/nut_2.0.1-4.diff.gz stable/main/binary-i386/nut-cgi_2.0.1-4_i386.deb nut (2.0.1-4) stable; urgency=medium * debian/nut-cgi.config: fix some typo error and remove exit calls (closes: #312106) * debian/nut.config: remove exit calls stable/main/binary-sparc/ntpdate_4.2.0a+stable-2sarge1_sparc.deb stable/main/binary-sparc/ntp-simple_4.2.0a+stable-2sarge1_sparc.deb stable/main/binary-sparc/ntp_4.2.0a+stable-2sarge1_sparc.deb stable/main/binary-sparc/ntp-server_4.2.0a+stable-2sarge1_sparc.deb stable/main/binary-sparc/ntp-refclock_4.2.0a+stable-2sarge1_sparc.deb ntp (1:4.2.0a+stable-2sarge1) stable-security; urgency=medium * Non-maintainer upload by the Security Team * Applied patch by Thomas Biege to fix gid/uid confusion [ntpd/ntpd.c, CAN-2005-2496] stable/main/binary-s390/ntp-refclock_4.2.0a+stable-2sarge1_s390.deb stable/main/binary-s390/ntpdate_4.2.0a+stable-2sarge1_s390.deb stable/main/binary-s390/ntp_4.2.0a+stable-2sarge1_s390.deb stable/main/binary-s390/ntp-server_4.2.0a+stable-2sarge1_s390.deb stable/main/binary-s390/ntp-simple_4.2.0a+stable-2sarge1_s390.deb ntp (1:4.2.0a+stable-2sarge1) stable-security; urgency=medium * Non-maintainer upload by the Security Team * Applied patch by Thomas Biege to fix gid/uid confusion [ntpd/ntpd.c, CAN-2005-2496] stable/main/binary-powerpc/ntp-server_4.2.0a+stable-2sarge1_powerpc.deb stable/main/binary-powerpc/ntp_4.2.0a+stable-2sarge1_powerpc.deb stable/main/binary-powerpc/ntpdate_4.2.0a+stable-2sarge1_powerpc.deb stable/main/binary-powerpc/ntp-refclock_4.2.0a+stable-2sarge1_powerpc.deb stable/main/binary-powerpc/ntp-simple_4.2.0a+stable-2sarge1_powerpc.deb ntp (1:4.2.0a+stable-2sarge1) stable-security; urgency=medium * Non-maintainer upload by the Security Team * Applied patch by Thomas Biege to fix gid/uid confusion [ntpd/ntpd.c, CAN-2005-2496] stable/main/binary-mipsel/ntp-refclock_4.2.0a+stable-2sarge1_mipsel.deb stable/main/binary-mipsel/ntpdate_4.2.0a+stable-2sarge1_mipsel.deb stable/main/binary-mipsel/ntp-server_4.2.0a+stable-2sarge1_mipsel.deb stable/main/binary-mipsel/ntp_4.2.0a+stable-2sarge1_mipsel.deb stable/main/binary-mipsel/ntp-simple_4.2.0a+stable-2sarge1_mipsel.deb ntp (1:4.2.0a+stable-2sarge1) stable-security; urgency=medium * Non-maintainer upload by the Security Team * Applied patch by Thomas Biege to fix gid/uid confusion [ntpd/ntpd.c, CAN-2005-2496] stable/main/binary-mips/ntp-refclock_4.2.0a+stable-2sarge1_mips.deb stable/main/binary-mips/ntpdate_4.2.0a+stable-2sarge1_mips.deb stable/main/binary-mips/ntp_4.2.0a+stable-2sarge1_mips.deb stable/main/binary-mips/ntp-server_4.2.0a+stable-2sarge1_mips.deb stable/main/binary-mips/ntp-simple_4.2.0a+stable-2sarge1_mips.deb ntp (1:4.2.0a+stable-2sarge1) stable-security; urgency=medium * Non-maintainer upload by the Security Team * Applied patch by Thomas Biege to fix gid/uid confusion [ntpd/ntpd.c, CAN-2005-2496] stable/main/binary-m68k/ntpdate_4.2.0a+stable-2sarge1_m68k.deb stable/main/binary-m68k/ntp-simple_4.2.0a+stable-2sarge1_m68k.deb stable/main/binary-m68k/ntp-server_4.2.0a+stable-2sarge1_m68k.deb stable/main/binary-m68k/ntp_4.2.0a+stable-2sarge1_m68k.deb stable/main/binary-m68k/ntp-refclock_4.2.0a+stable-2sarge1_m68k.deb ntp (1:4.2.0a+stable-2sarge1) stable-security; urgency=medium * Non-maintainer upload by the Security Team * Applied patch by Thomas Biege to fix gid/uid confusion [ntpd/ntpd.c, CAN-2005-2496] stable/main/binary-ia64/ntp_4.2.0a+stable-2sarge1_ia64.deb stable/main/binary-ia64/ntpdate_4.2.0a+stable-2sarge1_ia64.deb stable/main/binary-ia64/ntp-server_4.2.0a+stable-2sarge1_ia64.deb stable/main/binary-ia64/ntp-refclock_4.2.0a+stable-2sarge1_ia64.deb stable/main/binary-ia64/ntp-simple_4.2.0a+stable-2sarge1_ia64.deb ntp (1:4.2.0a+stable-2sarge1) stable-security; urgency=medium * Non-maintainer upload by the Security Team * Applied patch by Thomas Biege to fix gid/uid confusion [ntpd/ntpd.c, CAN-2005-2496] stable/main/binary-hppa/ntp-refclock_4.2.0a+stable-2sarge1_hppa.deb stable/main/binary-hppa/ntp-simple_4.2.0a+stable-2sarge1_hppa.deb stable/main/binary-hppa/ntp_4.2.0a+stable-2sarge1_hppa.deb stable/main/binary-hppa/ntp-server_4.2.0a+stable-2sarge1_hppa.deb stable/main/binary-hppa/ntpdate_4.2.0a+stable-2sarge1_hppa.deb ntp (1:4.2.0a+stable-2sarge1) stable-security; urgency=medium * Non-maintainer upload by the Security Team * Applied patch by Thomas Biege to fix gid/uid confusion [ntpd/ntpd.c, CAN-2005-2496] stable/main/binary-arm/ntp-simple_4.2.0a+stable-2sarge1_arm.deb stable/main/binary-arm/ntp-refclock_4.2.0a+stable-2sarge1_arm.deb stable/main/binary-arm/ntpdate_4.2.0a+stable-2sarge1_arm.deb stable/main/binary-arm/ntp-server_4.2.0a+stable-2sarge1_arm.deb stable/main/binary-arm/ntp_4.2.0a+stable-2sarge1_arm.deb ntp (1:4.2.0a+stable-2sarge1) stable-security; urgency=medium * Non-maintainer upload by the Security Team * Applied patch by Thomas Biege to fix gid/uid confusion [ntpd/ntpd.c, CAN-2005-2496] stable/main/binary-alpha/ntp-refclock_4.2.0a+stable-2sarge1_alpha.deb stable/main/binary-alpha/ntpdate_4.2.0a+stable-2sarge1_alpha.deb stable/main/binary-alpha/ntp-simple_4.2.0a+stable-2sarge1_alpha.deb stable/main/binary-alpha/ntp-server_4.2.0a+stable-2sarge1_alpha.deb stable/main/binary-alpha/ntp_4.2.0a+stable-2sarge1_alpha.deb ntp (1:4.2.0a+stable-2sarge1) stable-security; urgency=medium * Non-maintainer upload by the Security Team * Applied patch by Thomas Biege to fix gid/uid confusion [ntpd/ntpd.c, CAN-2005-2496] stable/main/binary-all/ntp-doc_4.2.0a+stable-2sarge1_all.deb stable/main/binary-i386/ntp_4.2.0a+stable-2sarge1_i386.deb stable/main/source/ntp_4.2.0a+stable-2sarge1.diff.gz stable/main/source/ntp_4.2.0a+stable-2sarge1.dsc stable/main/binary-i386/ntpdate_4.2.0a+stable-2sarge1_i386.deb stable/main/binary-i386/ntp-simple_4.2.0a+stable-2sarge1_i386.deb stable/main/binary-i386/ntp-refclock_4.2.0a+stable-2sarge1_i386.deb stable/main/binary-i386/ntp-server_4.2.0a+stable-2sarge1_i386.deb ntp (1:4.2.0a+stable-2sarge1) stable-security; urgency=medium * Non-maintainer upload by the Security Team * Applied patch by Thomas Biege to fix gid/uid confusion [ntpd/ntpd.c, CAN-2005-2496] stable/main/source/ntlmaps_0.9.9-2sarge1.dsc stable/main/binary-all/ntlmaps_0.9.9-2sarge1_all.deb stable/main/source/ntlmaps_0.9.9-2sarge1.diff.gz ntlmaps (0.9.9-2sarge1) stable-security; urgency=high * Backport from 0.9.9-4: ensures config file is properly handled by debian/postinst when updating the password. Ensures config file permissions are correctly maintained (non-world-readable). stable/main/binary-sparc/libnetpbm9-dev_10.0-8sarge2_sparc.deb stable/main/binary-sparc/libnetpbm9_10.0-8sarge2_sparc.deb stable/main/binary-sparc/libnetpbm10_10.0-8sarge2_sparc.deb stable/main/binary-sparc/netpbm_10.0-8sarge2_sparc.deb stable/main/binary-sparc/libnetpbm10-dev_10.0-8sarge2_sparc.deb netpbm-free (2:10.0-8sarge2) stable-security; urgency=high * Non-maintainer upload by the Security Team * Applied and backported patches by Greg Roelofs to fix buffer overflows [pnm/pnmtopng.c, CVE-2005-3632] stable/main/binary-s390/libnetpbm9_10.0-8sarge2_s390.deb stable/main/binary-s390/netpbm_10.0-8sarge2_s390.deb stable/main/binary-s390/libnetpbm10-dev_10.0-8sarge2_s390.deb stable/main/binary-s390/libnetpbm10_10.0-8sarge2_s390.deb stable/main/binary-s390/libnetpbm9-dev_10.0-8sarge2_s390.deb netpbm-free (2:10.0-8sarge2) stable-security; urgency=high * Non-maintainer upload by the Security Team * Applied and backported patches by Greg Roelofs to fix buffer overflows [pnm/pnmtopng.c, CVE-2005-3632] stable/main/binary-mipsel/libnetpbm9_10.0-8sarge2_mipsel.deb stable/main/binary-mipsel/libnetpbm10-dev_10.0-8sarge2_mipsel.deb stable/main/binary-mipsel/netpbm_10.0-8sarge2_mipsel.deb stable/main/binary-mipsel/libnetpbm10_10.0-8sarge2_mipsel.deb stable/main/binary-mipsel/libnetpbm9-dev_10.0-8sarge2_mipsel.deb netpbm-free (2:10.0-8sarge2) stable-security; urgency=high * Non-maintainer upload by the Security Team * Applied and backported patches by Greg Roelofs to fix buffer overflows [pnm/pnmtopng.c, CVE-2005-3632] stable/main/binary-mips/libnetpbm10_10.0-8sarge2_mips.deb stable/main/binary-mips/netpbm_10.0-8sarge2_mips.deb stable/main/binary-mips/libnetpbm10-dev_10.0-8sarge2_mips.deb stable/main/binary-mips/libnetpbm9_10.0-8sarge2_mips.deb stable/main/binary-mips/libnetpbm9-dev_10.0-8sarge2_mips.deb netpbm-free (2:10.0-8sarge2) stable-security; urgency=high * Non-maintainer upload by the Security Team * Applied and backported patches by Greg Roelofs to fix buffer overflows [pnm/pnmtopng.c, CVE-2005-3632] stable/main/binary-m68k/libnetpbm10-dev_10.0-8sarge2_m68k.deb stable/main/binary-m68k/netpbm_10.0-8sarge2_m68k.deb stable/main/binary-m68k/libnetpbm10_10.0-8sarge2_m68k.deb stable/main/binary-m68k/libnetpbm9-dev_10.0-8sarge2_m68k.deb stable/main/binary-m68k/libnetpbm9_10.0-8sarge2_m68k.deb netpbm-free (2:10.0-8sarge2) stable-security; urgency=high * Non-maintainer upload by the Security Team * Applied and backported patches by Greg Roelofs to fix buffer overflows [pnm/pnmtopng.c, CVE-2005-3632] stable/main/binary-ia64/libnetpbm10_10.0-8sarge2_ia64.deb stable/main/binary-ia64/libnetpbm10-dev_10.0-8sarge2_ia64.deb stable/main/binary-ia64/netpbm_10.0-8sarge2_ia64.deb stable/main/binary-ia64/libnetpbm9_10.0-8sarge2_ia64.deb stable/main/binary-ia64/libnetpbm9-dev_10.0-8sarge2_ia64.deb netpbm-free (2:10.0-8sarge2) stable-security; urgency=high * Non-maintainer upload by the Security Team * Applied and backported patches by Greg Roelofs to fix buffer overflows [pnm/pnmtopng.c, CVE-2005-3632] stable/main/binary-i386/libnetpbm9-dev_10.0-8sarge2_i386.deb stable/main/binary-i386/libnetpbm9_10.0-8sarge2_i386.deb stable/main/binary-i386/libnetpbm10-dev_10.0-8sarge2_i386.deb stable/main/binary-i386/netpbm_10.0-8sarge2_i386.deb stable/main/binary-i386/libnetpbm10_10.0-8sarge2_i386.deb netpbm-free (2:10.0-8sarge2) stable-security; urgency=high * Non-maintainer upload by the Security Team * Applied and backported patches by Greg Roelofs to fix buffer overflows [pnm/pnmtopng.c, CVE-2005-3632] stable/main/binary-hppa/libnetpbm10_10.0-8sarge2_hppa.deb stable/main/binary-hppa/libnetpbm9-dev_10.0-8sarge2_hppa.deb stable/main/binary-hppa/libnetpbm9_10.0-8sarge2_hppa.deb stable/main/binary-hppa/netpbm_10.0-8sarge2_hppa.deb stable/main/binary-hppa/libnetpbm10-dev_10.0-8sarge2_hppa.deb netpbm-free (2:10.0-8sarge2) stable-security; urgency=high * Non-maintainer upload by the Security Team * Applied and backported patches by Greg Roelofs to fix buffer overflows [pnm/pnmtopng.c, CVE-2005-3632] stable/main/binary-arm/netpbm_10.0-8sarge2_arm.deb stable/main/binary-arm/libnetpbm9_10.0-8sarge2_arm.deb stable/main/binary-arm/libnetpbm10-dev_10.0-8sarge2_arm.deb stable/main/binary-arm/libnetpbm9-dev_10.0-8sarge2_arm.deb stable/main/binary-arm/libnetpbm10_10.0-8sarge2_arm.deb netpbm-free (2:10.0-8sarge2) stable-security; urgency=high * Non-maintainer upload by the Security Team * Applied and backported patches by Greg Roelofs to fix buffer overflows [pnm/pnmtopng.c, CVE-2005-3632] stable/main/binary-alpha/libnetpbm10-dev_10.0-8sarge2_alpha.deb stable/main/binary-alpha/netpbm_10.0-8sarge2_alpha.deb stable/main/binary-alpha/libnetpbm10_10.0-8sarge2_alpha.deb stable/main/binary-alpha/libnetpbm9_10.0-8sarge2_alpha.deb stable/main/binary-alpha/libnetpbm9-dev_10.0-8sarge2_alpha.deb netpbm-free (2:10.0-8sarge2) stable-security; urgency=high * Non-maintainer upload by the Security Team * Applied and backported patches by Greg Roelofs to fix buffer overflows [pnm/pnmtopng.c, CVE-2005-3632] stable/main/binary-powerpc/libnetpbm10_10.0-8sarge2_powerpc.deb stable/main/binary-powerpc/libnetpbm9_10.0-8sarge2_powerpc.deb stable/main/binary-powerpc/netpbm_10.0-8sarge2_powerpc.deb stable/main/source/netpbm-free_10.0-8sarge2.diff.gz stable/main/binary-powerpc/libnetpbm9-dev_10.0-8sarge2_powerpc.deb stable/main/source/netpbm-free_10.0-8sarge2.dsc stable/main/binary-powerpc/libnetpbm10-dev_10.0-8sarge2_powerpc.deb netpbm-free (2:10.0-8sarge2) stable-security; urgency=high * Non-maintainer upload by the Security Team * Applied and backported patches by Greg Roelofs to fix buffer overflows [pnm/pnmtopng.c, CVE-2005-3632] stable/main/binary-sparc/libsnmp5_5.1.2-6.2_sparc.deb stable/main/binary-sparc/libsnmp-perl_5.1.2-6.2_sparc.deb stable/main/binary-sparc/snmp_5.1.2-6.2_sparc.deb stable/main/binary-sparc/snmpd_5.1.2-6.2_sparc.deb stable/main/binary-sparc/libsnmp5-dev_5.1.2-6.2_sparc.deb net-snmp (5.1.2-6.2) stable-security; urgency=high * Non-maintainer upload by the Security Team * Applied upstream patch to fix denial of service [snmplib/snmp_api.c, CAN-2005-2177] stable/main/binary-s390/libsnmp5-dev_5.1.2-6.2_s390.deb stable/main/binary-s390/libsnmp-perl_5.1.2-6.2_s390.deb stable/main/binary-s390/snmp_5.1.2-6.2_s390.deb stable/main/binary-s390/libsnmp5_5.1.2-6.2_s390.deb stable/main/binary-s390/snmpd_5.1.2-6.2_s390.deb net-snmp (5.1.2-6.2) stable-security; urgency=high * Non-maintainer upload by the Security Team * Applied upstream patch to fix denial of service [snmplib/snmp_api.c, CAN-2005-2177] stable/main/binary-mipsel/libsnmp5-dev_5.1.2-6.2_mipsel.deb stable/main/binary-mipsel/snmpd_5.1.2-6.2_mipsel.deb stable/main/binary-mipsel/snmp_5.1.2-6.2_mipsel.deb stable/main/binary-mipsel/libsnmp-perl_5.1.2-6.2_mipsel.deb stable/main/binary-mipsel/libsnmp5_5.1.2-6.2_mipsel.deb net-snmp (5.1.2-6.2) stable-security; urgency=high * Non-maintainer upload by the Security Team * Applied upstream patch to fix denial of service [snmplib/snmp_api.c, CAN-2005-2177] stable/main/binary-mips/libsnmp5-dev_5.1.2-6.2_mips.deb stable/main/binary-mips/libsnmp5_5.1.2-6.2_mips.deb stable/main/binary-mips/libsnmp-perl_5.1.2-6.2_mips.deb stable/main/binary-mips/snmp_5.1.2-6.2_mips.deb stable/main/binary-mips/snmpd_5.1.2-6.2_mips.deb net-snmp (5.1.2-6.2) stable-security; urgency=high * Non-maintainer upload by the Security Team * Applied upstream patch to fix denial of service [snmplib/snmp_api.c, CAN-2005-2177] stable/main/binary-m68k/libsnmp-perl_5.1.2-6.2_m68k.deb stable/main/binary-m68k/libsnmp5_5.1.2-6.2_m68k.deb stable/main/binary-m68k/libsnmp5-dev_5.1.2-6.2_m68k.deb stable/main/binary-m68k/snmpd_5.1.2-6.2_m68k.deb stable/main/binary-m68k/snmp_5.1.2-6.2_m68k.deb net-snmp (5.1.2-6.2) stable-security; urgency=high * Non-maintainer upload by the Security Team * Applied upstream patch to fix denial of service [snmplib/snmp_api.c, CAN-2005-2177] stable/main/binary-ia64/snmp_5.1.2-6.2_ia64.deb stable/main/binary-ia64/snmpd_5.1.2-6.2_ia64.deb stable/main/binary-ia64/libsnmp-perl_5.1.2-6.2_ia64.deb stable/main/binary-ia64/libsnmp5-dev_5.1.2-6.2_ia64.deb stable/main/binary-ia64/libsnmp5_5.1.2-6.2_ia64.deb net-snmp (5.1.2-6.2) stable-security; urgency=high * Non-maintainer upload by the Security Team * Applied upstream patch to fix denial of service [snmplib/snmp_api.c, CAN-2005-2177] stable/main/binary-i386/snmpd_5.1.2-6.2_i386.deb stable/main/binary-i386/snmp_5.1.2-6.2_i386.deb stable/main/binary-i386/libsnmp-perl_5.1.2-6.2_i386.deb stable/main/binary-i386/libsnmp5_5.1.2-6.2_i386.deb stable/main/binary-i386/libsnmp5-dev_5.1.2-6.2_i386.deb net-snmp (5.1.2-6.2) stable-security; urgency=high * Non-maintainer upload by the Security Team * Applied upstream patch to fix denial of service [snmplib/snmp_api.c, CAN-2005-2177] stable/main/binary-hppa/libsnmp5-dev_5.1.2-6.2_hppa.deb stable/main/binary-hppa/libsnmp-perl_5.1.2-6.2_hppa.deb stable/main/binary-hppa/snmp_5.1.2-6.2_hppa.deb stable/main/binary-hppa/libsnmp5_5.1.2-6.2_hppa.deb stable/main/binary-hppa/snmpd_5.1.2-6.2_hppa.deb net-snmp (5.1.2-6.2) stable-security; urgency=high * Non-maintainer upload by the Security Team * Applied upstream patch to fix denial of service [snmplib/snmp_api.c, CAN-2005-2177] stable/main/binary-arm/libsnmp5-dev_5.1.2-6.2_arm.deb stable/main/binary-arm/snmpd_5.1.2-6.2_arm.deb stable/main/binary-arm/snmp_5.1.2-6.2_arm.deb stable/main/binary-arm/libsnmp-perl_5.1.2-6.2_arm.deb stable/main/binary-arm/libsnmp5_5.1.2-6.2_arm.deb net-snmp (5.1.2-6.2) stable-security; urgency=high * Non-maintainer upload by the Security Team * Applied upstream patch to fix denial of service [snmplib/snmp_api.c, CAN-2005-2177] stable/main/binary-alpha/snmp_5.1.2-6.2_alpha.deb stable/main/binary-alpha/libsnmp5_5.1.2-6.2_alpha.deb stable/main/binary-alpha/libsnmp5-dev_5.1.2-6.2_alpha.deb stable/main/binary-alpha/snmpd_5.1.2-6.2_alpha.deb stable/main/binary-alpha/libsnmp-perl_5.1.2-6.2_alpha.deb net-snmp (5.1.2-6.2) stable-security; urgency=high * Non-maintainer upload by the Security Team * Applied upstream patch to fix denial of service [snmplib/snmp_api.c, CAN-2005-2177] stable/main/binary-powerpc/snmp_5.1.2-6.2_powerpc.deb stable/main/source/net-snmp_5.1.2-6.2.dsc stable/main/source/net-snmp_5.1.2-6.2.diff.gz stable/main/binary-powerpc/snmpd_5.1.2-6.2_powerpc.deb stable/main/binary-powerpc/libsnmp5_5.1.2-6.2_powerpc.deb stable/main/binary-powerpc/libsnmp-perl_5.1.2-6.2_powerpc.deb stable/main/binary-powerpc/libsnmp5-dev_5.1.2-6.2_powerpc.deb stable/main/binary-all/libsnmp-base_5.1.2-6.2_all.deb stable/main/binary-all/tkmib_5.1.2-6.2_all.deb net-snmp (5.1.2-6.2) stable-security; urgency=high * Non-maintainer upload by the Security Team * Applied upstream patch to fix denial of service [snmplib/snmp_api.c, CAN-2005-2177] stable/main/binary-sparc/libmysqlclient14_4.1.11a-4sarge2_sparc.deb stable/main/binary-sparc/mysql-server-4.1_4.1.11a-4sarge2_sparc.deb stable/main/binary-sparc/libmysqlclient14-dev_4.1.11a-4sarge2_sparc.deb stable/main/binary-sparc/mysql-client-4.1_4.1.11a-4sarge2_sparc.deb mysql-dfsg-4.1 (4.1.11a-4sarge2) stable-security; urgency=high * Non-maintainer upload by the Security Team * Backported upstream patch to fix buffer overflow in CREATE FUNCTION [debian/patches/61_SECURITY_CAN-2005-2558.dpatch] stable/main/binary-s390/libmysqlclient14_4.1.11a-4sarge2_s390.deb stable/main/binary-s390/mysql-server-4.1_4.1.11a-4sarge2_s390.deb stable/main/binary-s390/mysql-client-4.1_4.1.11a-4sarge2_s390.deb stable/main/binary-s390/libmysqlclient14-dev_4.1.11a-4sarge2_s390.deb mysql-dfsg-4.1 (4.1.11a-4sarge2) stable-security; urgency=high * Non-maintainer upload by the Security Team * Backported upstream patch to fix buffer overflow in CREATE FUNCTION [debian/patches/61_SECURITY_CAN-2005-2558.dpatch] stable/main/binary-mipsel/libmysqlclient14_4.1.11a-4sarge2_mipsel.deb stable/main/binary-mipsel/mysql-client-4.1_4.1.11a-4sarge2_mipsel.deb stable/main/binary-mipsel/libmysqlclient14-dev_4.1.11a-4sarge2_mipsel.deb stable/main/binary-mipsel/mysql-server-4.1_4.1.11a-4sarge2_mipsel.deb mysql-dfsg-4.1 (4.1.11a-4sarge2) stable-security; urgency=high * Non-maintainer upload by the Security Team * Backported upstream patch to fix buffer overflow in CREATE FUNCTION [debian/patches/61_SECURITY_CAN-2005-2558.dpatch] stable/main/binary-mips/mysql-server-4.1_4.1.11a-4sarge2_mips.deb stable/main/binary-mips/libmysqlclient14_4.1.11a-4sarge2_mips.deb stable/main/binary-mips/mysql-client-4.1_4.1.11a-4sarge2_mips.deb stable/main/binary-mips/libmysqlclient14-dev_4.1.11a-4sarge2_mips.deb mysql-dfsg-4.1 (4.1.11a-4sarge2) stable-security; urgency=high * Non-maintainer upload by the Security Team * Backported upstream patch to fix buffer overflow in CREATE FUNCTION [debian/patches/61_SECURITY_CAN-2005-2558.dpatch] stable/main/binary-m68k/mysql-server-4.1_4.1.11a-4sarge2_m68k.deb stable/main/binary-m68k/libmysqlclient14-dev_4.1.11a-4sarge2_m68k.deb stable/main/binary-m68k/mysql-client-4.1_4.1.11a-4sarge2_m68k.deb stable/main/binary-m68k/libmysqlclient14_4.1.11a-4sarge2_m68k.deb mysql-dfsg-4.1 (4.1.11a-4sarge2) stable-security; urgency=high * Non-maintainer upload by the Security Team * Backported upstream patch to fix buffer overflow in CREATE FUNCTION [debian/patches/61_SECURITY_CAN-2005-2558.dpatch] stable/main/binary-ia64/mysql-client-4.1_4.1.11a-4sarge2_ia64.deb stable/main/binary-ia64/libmysqlclient14_4.1.11a-4sarge2_ia64.deb stable/main/binary-ia64/libmysqlclient14-dev_4.1.11a-4sarge2_ia64.deb stable/main/binary-ia64/mysql-server-4.1_4.1.11a-4sarge2_ia64.deb mysql-dfsg-4.1 (4.1.11a-4sarge2) stable-security; urgency=high * Non-maintainer upload by the Security Team * Backported upstream patch to fix buffer overflow in CREATE FUNCTION [debian/patches/61_SECURITY_CAN-2005-2558.dpatch] stable/main/binary-i386/libmysqlclient14-dev_4.1.11a-4sarge2_i386.deb stable/main/binary-i386/mysql-client-4.1_4.1.11a-4sarge2_i386.deb stable/main/binary-i386/libmysqlclient14_4.1.11a-4sarge2_i386.deb stable/main/binary-i386/mysql-server-4.1_4.1.11a-4sarge2_i386.deb mysql-dfsg-4.1 (4.1.11a-4sarge2) stable-security; urgency=high * Non-maintainer upload by the Security Team * Backported upstream patch to fix buffer overflow in CREATE FUNCTION [debian/patches/61_SECURITY_CAN-2005-2558.dpatch] stable/main/binary-hppa/mysql-server-4.1_4.1.11a-4sarge2_hppa.deb stable/main/binary-hppa/libmysqlclient14-dev_4.1.11a-4sarge2_hppa.deb stable/main/binary-hppa/libmysqlclient14_4.1.11a-4sarge2_hppa.deb stable/main/binary-hppa/mysql-client-4.1_4.1.11a-4sarge2_hppa.deb mysql-dfsg-4.1 (4.1.11a-4sarge2) stable-security; urgency=high * Non-maintainer upload by the Security Team * Backported upstream patch to fix buffer overflow in CREATE FUNCTION [debian/patches/61_SECURITY_CAN-2005-2558.dpatch] stable/main/binary-arm/libmysqlclient14-dev_4.1.11a-4sarge2_arm.deb stable/main/binary-arm/mysql-server-4.1_4.1.11a-4sarge2_arm.deb stable/main/binary-arm/libmysqlclient14_4.1.11a-4sarge2_arm.deb stable/main/binary-arm/mysql-client-4.1_4.1.11a-4sarge2_arm.deb mysql-dfsg-4.1 (4.1.11a-4sarge2) stable-security; urgency=high * Non-maintainer upload by the Security Team * Backported upstream patch to fix buffer overflow in CREATE FUNCTION [debian/patches/61_SECURITY_CAN-2005-2558.dpatch] stable/main/binary-alpha/mysql-server-4.1_4.1.11a-4sarge2_alpha.deb stable/main/binary-alpha/libmysqlclient14-dev_4.1.11a-4sarge2_alpha.deb stable/main/binary-alpha/mysql-client-4.1_4.1.11a-4sarge2_alpha.deb stable/main/binary-alpha/libmysqlclient14_4.1.11a-4sarge2_alpha.deb mysql-dfsg-4.1 (4.1.11a-4sarge2) stable-security; urgency=high * Non-maintainer upload by the Security Team * Backported upstream patch to fix buffer overflow in CREATE FUNCTION [debian/patches/61_SECURITY_CAN-2005-2558.dpatch] stable/main/binary-powerpc/mysql-client-4.1_4.1.11a-4sarge2_powerpc.deb stable/main/binary-powerpc/libmysqlclient14_4.1.11a-4sarge2_powerpc.deb stable/main/binary-powerpc/libmysqlclient14-dev_4.1.11a-4sarge2_powerpc.deb stable/main/source/mysql-dfsg-4.1_4.1.11a-4sarge2.dsc stable/main/binary-all/mysql-common-4.1_4.1.11a-4sarge2_all.deb stable/main/binary-powerpc/mysql-server-4.1_4.1.11a-4sarge2_powerpc.deb stable/main/source/mysql-dfsg-4.1_4.1.11a-4sarge2.diff.gz mysql-dfsg-4.1 (4.1.11a-4sarge2) stable-security; urgency=high * Non-maintainer upload by the Security Team * Backported upstream patch to fix buffer overflow in CREATE FUNCTION [debian/patches/61_SECURITY_CAN-2005-2558.dpatch] stable/main/binary-sparc/libmysqlclient12_4.0.24-10sarge1_sparc.deb stable/main/binary-sparc/mysql-client_4.0.24-10sarge1_sparc.deb stable/main/binary-sparc/libmysqlclient12-dev_4.0.24-10sarge1_sparc.deb stable/main/binary-sparc/mysql-server_4.0.24-10sarge1_sparc.deb mysql-dfsg (4.0.24-10sarge1) stable-security; urgency=high * Non-maintainer upload by the Security Team * Backported upstream patch to fix buffer overflow in CREATE FUNCTION [debian/patches/52_CAN-2005-2558_create_function.dpatch] stable/main/binary-s390/mysql-client_4.0.24-10sarge1_s390.deb stable/main/binary-s390/libmysqlclient12_4.0.24-10sarge1_s390.deb stable/main/binary-s390/libmysqlclient12-dev_4.0.24-10sarge1_s390.deb stable/main/binary-s390/mysql-server_4.0.24-10sarge1_s390.deb mysql-dfsg (4.0.24-10sarge1) stable-security; urgency=high * Non-maintainer upload by the Security Team * Backported upstream patch to fix buffer overflow in CREATE FUNCTION [debian/patches/52_CAN-2005-2558_create_function.dpatch] stable/main/binary-powerpc/mysql-server_4.0.24-10sarge1_powerpc.deb stable/main/binary-powerpc/libmysqlclient12-dev_4.0.24-10sarge1_powerpc.deb stable/main/binary-powerpc/libmysqlclient12_4.0.24-10sarge1_powerpc.deb stable/main/binary-powerpc/mysql-client_4.0.24-10sarge1_powerpc.deb mysql-dfsg (4.0.24-10sarge1) stable-security; urgency=high * Non-maintainer upload by the Security Team * Backported upstream patch to fix buffer overflow in CREATE FUNCTION [debian/patches/52_CAN-2005-2558_create_function.dpatch] stable/main/binary-mipsel/libmysqlclient12_4.0.24-10sarge1_mipsel.deb stable/main/binary-mipsel/mysql-server_4.0.24-10sarge1_mipsel.deb stable/main/binary-mipsel/libmysqlclient12-dev_4.0.24-10sarge1_mipsel.deb stable/main/binary-mipsel/mysql-client_4.0.24-10sarge1_mipsel.deb mysql-dfsg (4.0.24-10sarge1) stable-security; urgency=high * Non-maintainer upload by the Security Team * Backported upstream patch to fix buffer overflow in CREATE FUNCTION [debian/patches/52_CAN-2005-2558_create_function.dpatch] stable/main/binary-mips/mysql-server_4.0.24-10sarge1_mips.deb stable/main/binary-mips/libmysqlclient12-dev_4.0.24-10sarge1_mips.deb stable/main/binary-mips/mysql-client_4.0.24-10sarge1_mips.deb stable/main/binary-mips/libmysqlclient12_4.0.24-10sarge1_mips.deb mysql-dfsg (4.0.24-10sarge1) stable-security; urgency=high * Non-maintainer upload by the Security Team * Backported upstream patch to fix buffer overflow in CREATE FUNCTION [debian/patches/52_CAN-2005-2558_create_function.dpatch] stable/main/binary-m68k/libmysqlclient12-dev_4.0.24-10sarge1_m68k.deb stable/main/binary-m68k/mysql-server_4.0.24-10sarge1_m68k.deb stable/main/binary-m68k/libmysqlclient12_4.0.24-10sarge1_m68k.deb stable/main/binary-m68k/mysql-client_4.0.24-10sarge1_m68k.deb mysql-dfsg (4.0.24-10sarge1) stable-security; urgency=high * Non-maintainer upload by the Security Team * Backported upstream patch to fix buffer overflow in CREATE FUNCTION [debian/patches/52_CAN-2005-2558_create_function.dpatch] stable/main/binary-ia64/mysql-client_4.0.24-10sarge1_ia64.deb stable/main/binary-ia64/libmysqlclient12-dev_4.0.24-10sarge1_ia64.deb stable/main/binary-ia64/libmysqlclient12_4.0.24-10sarge1_ia64.deb stable/main/binary-ia64/mysql-server_4.0.24-10sarge1_ia64.deb mysql-dfsg (4.0.24-10sarge1) stable-security; urgency=high * Non-maintainer upload by the Security Team * Backported upstream patch to fix buffer overflow in CREATE FUNCTION [debian/patches/52_CAN-2005-2558_create_function.dpatch] stable/main/binary-i386/libmysqlclient12_4.0.24-10sarge1_i386.deb stable/main/binary-i386/mysql-client_4.0.24-10sarge1_i386.deb stable/main/binary-i386/libmysqlclient12-dev_4.0.24-10sarge1_i386.deb stable/main/binary-i386/mysql-server_4.0.24-10sarge1_i386.deb mysql-dfsg (4.0.24-10sarge1) stable-security; urgency=high * Non-maintainer upload by the Security Team * Backported upstream patch to fix buffer overflow in CREATE FUNCTION [debian/patches/52_CAN-2005-2558_create_function.dpatch] stable/main/binary-arm/mysql-client_4.0.24-10sarge1_arm.deb stable/main/binary-arm/libmysqlclient12_4.0.24-10sarge1_arm.deb stable/main/binary-arm/mysql-server_4.0.24-10sarge1_arm.deb stable/main/binary-arm/libmysqlclient12-dev_4.0.24-10sarge1_arm.deb mysql-dfsg (4.0.24-10sarge1) stable-security; urgency=high * Non-maintainer upload by the Security Team * Backported upstream patch to fix buffer overflow in CREATE FUNCTION [debian/patches/52_CAN-2005-2558_create_function.dpatch] stable/main/binary-alpha/mysql-client_4.0.24-10sarge1_alpha.deb stable/main/binary-alpha/libmysqlclient12-dev_4.0.24-10sarge1_alpha.deb stable/main/binary-alpha/mysql-server_4.0.24-10sarge1_alpha.deb stable/main/binary-alpha/libmysqlclient12_4.0.24-10sarge1_alpha.deb mysql-dfsg (4.0.24-10sarge1) stable-security; urgency=high * Non-maintainer upload by the Security Team * Backported upstream patch to fix buffer overflow in CREATE FUNCTION [debian/patches/52_CAN-2005-2558_create_function.dpatch] stable/main/source/mysql-dfsg_4.0.24-10sarge1.diff.gz stable/main/binary-hppa/mysql-client_4.0.24-10sarge1_hppa.deb stable/main/binary-all/mysql-common_4.0.24-10sarge1_all.deb stable/main/source/mysql-dfsg_4.0.24-10sarge1.dsc stable/main/binary-hppa/mysql-server_4.0.24-10sarge1_hppa.deb stable/main/binary-hppa/libmysqlclient12_4.0.24-10sarge1_hppa.deb stable/main/binary-hppa/libmysqlclient12-dev_4.0.24-10sarge1_hppa.deb mysql-dfsg (4.0.24-10sarge1) stable-security; urgency=high * Non-maintainer upload by the Security Team * Backported upstream patch to fix buffer overflow in CREATE FUNCTION [debian/patches/52_CAN-2005-2558_create_function.dpatch] stable/main/binary-sparc/mozilla-thunderbird-dev_1.0.2-2.sarge1.0.7_sparc.deb stable/main/binary-sparc/mozilla-thunderbird-inspector_1.0.2-2.sarge1.0.7_sparc.deb stable/main/binary-sparc/mozilla-thunderbird-typeaheadfind_1.0.2-2.sarge1.0.7_sparc.deb stable/main/binary-sparc/mozilla-thunderbird-offline_1.0.2-2.sarge1.0.7_sparc.deb stable/main/binary-sparc/mozilla-thunderbird_1.0.2-2.sarge1.0.7_sparc.deb mozilla-thunderbird (1.0.2-2.sarge1.0.7) stable-security; urgency=critical * following issues are addressed with patches in debian/patches/tbird.1.0.6-1.0.7-1/. MFSA_2005-59 has a debian specific patch: debian/mfsa_2005-59.debian.patch. * MFSA-2005-57: IDN heap overrun Summary: Tom Ferris reported a Firefox crash when processing a domain name consisting solely of soft-hyphen characters. Closes: - CVE-Ids: CAN-2005-2871 Bugzilla: 307259 Issues addressed: + CAN-2005-2871 - IDN heap overrun * MFSA-2005-58: Accumulated vendor advisory for multiple vulnerabilities Summary: Fixes for multiple vulnerabilities with an overall severity of "critical" have been released in Mozilla Firefox/Thunderbird 1.0.7 and the Mozilla Suite 1.7.12 Closes: - CVE-Ids: CAN-2005-2701 CAN-2005-2702 CAN-2005-2703 CAN-2005-2704 CAN-2005-2705 CAN-2005-2706 CAN-2005-2707 Bugzilla: 300936 296134 297078 302263 299518 303213 304754 306261 306804 291178 300853 301180 302100 Issues addressed: + CAN-2005-2701 - Heap overrun in XBM image processing, tbird is not affected applied anyway to keep source in sync. + CAN-2005-2702 - Crash on "zero-width non-joiner" sequence + CAN-2005-2703 - XMLHttpRequest header spoofing + CAN-2005-2704 - Object spoofing using XBL <implements> + CAN-2005-2705 - JavaScript integer overflow + CAN-2005-2706 - Privilege escalation using about: scheme + CAN-2005-2707 - Chrome window spoofing + Regression fixes * MFSA-2005-59: Command-line handling on Linux allows shell execution Summary: URLs passed to Linux versions of Firefox on the command-line are not correctly protected against interpretation by the shell. As a result a malicious URL can result in the execution of shell commands with the privileges of the user. If Firefox is set as the default handler for web URLs then opening a URL in another program (for example, links in a mail or chat client) can result in shell command execution. Closes: 329664,329664 CVE-Ids: CAN-2005-2968 Bugzilla: 307185 Issues addressed: + CAN-2005-2968 - Command-line handling on Linux allows shell execution stable/main/binary-s390/mozilla-thunderbird-typeaheadfind_1.0.2-2.sarge1.0.7_s390.deb stable/main/binary-s390/mozilla-thunderbird-dev_1.0.2-2.sarge1.0.7_s390.deb stable/main/binary-s390/mozilla-thunderbird_1.0.2-2.sarge1.0.7_s390.deb stable/main/binary-s390/mozilla-thunderbird-offline_1.0.2-2.sarge1.0.7_s390.deb stable/main/binary-s390/mozilla-thunderbird-inspector_1.0.2-2.sarge1.0.7_s390.deb mozilla-thunderbird (1.0.2-2.sarge1.0.7) stable-security; urgency=critical * following issues are addressed with patches in debian/patches/tbird.1.0.6-1.0.7-1/. MFSA_2005-59 has a debian specific patch: debian/mfsa_2005-59.debian.patch. * MFSA-2005-57: IDN heap overrun Summary: Tom Ferris reported a Firefox crash when processing a domain name consisting solely of soft-hyphen characters. Closes: - CVE-Ids: CAN-2005-2871 Bugzilla: 307259 Issues addressed: + CAN-2005-2871 - IDN heap overrun * MFSA-2005-58: Accumulated vendor advisory for multiple vulnerabilities Summary: Fixes for multiple vulnerabilities with an overall severity of "critical" have been released in Mozilla Firefox/Thunderbird 1.0.7 and the Mozilla Suite 1.7.12 Closes: - CVE-Ids: CAN-2005-2701 CAN-2005-2702 CAN-2005-2703 CAN-2005-2704 CAN-2005-2705 CAN-2005-2706 CAN-2005-2707 Bugzilla: 300936 296134 297078 302263 299518 303213 304754 306261 306804 291178 300853 301180 302100 Issues addressed: + CAN-2005-2701 - Heap overrun in XBM image processing, tbird is not affected applied anyway to keep source in sync. + CAN-2005-2702 - Crash on "zero-width non-joiner" sequence + CAN-2005-2703 - XMLHttpRequest header spoofing + CAN-2005-2704 - Object spoofing using XBL <implements> + CAN-2005-2705 - JavaScript integer overflow + CAN-2005-2706 - Privilege escalation using about: scheme + CAN-2005-2707 - Chrome window spoofing + Regression fixes * MFSA-2005-59: Command-line handling on Linux allows shell execution Summary: URLs passed to Linux versions of Firefox on the command-line are not correctly protected against interpretation by the shell. As a result a malicious URL can result in the execution of shell commands with the privileges of the user. If Firefox is set as the default handler for web URLs then opening a URL in another program (for example, links in a mail or chat client) can result in shell command execution. Closes: 329664,329664 CVE-Ids: CAN-2005-2968 Bugzilla: 307185 Issues addressed: + CAN-2005-2968 - Command-line handling on Linux allows shell execution stable/main/binary-powerpc/mozilla-thunderbird-inspector_1.0.2-2.sarge1.0.7_powerpc.deb stable/main/binary-powerpc/mozilla-thunderbird-dev_1.0.2-2.sarge1.0.7_powerpc.deb stable/main/binary-powerpc/mozilla-thunderbird-offline_1.0.2-2.sarge1.0.7_powerpc.deb stable/main/binary-powerpc/mozilla-thunderbird-typeaheadfind_1.0.2-2.sarge1.0.7_powerpc.deb stable/main/binary-powerpc/mozilla-thunderbird_1.0.2-2.sarge1.0.7_powerpc.deb mozilla-thunderbird (1.0.2-2.sarge1.0.7) stable-security; urgency=critical * following issues are addressed with patches in debian/patches/tbird.1.0.6-1.0.7-1/. MFSA_2005-59 has a debian specific patch: debian/mfsa_2005-59.debian.patch. * MFSA-2005-57: IDN heap overrun Summary: Tom Ferris reported a Firefox crash when processing a domain name consisting solely of soft-hyphen characters. Closes: - CVE-Ids: CAN-2005-2871 Bugzilla: 307259 Issues addressed: + CAN-2005-2871 - IDN heap overrun * MFSA-2005-58: Accumulated vendor advisory for multiple vulnerabilities Summary: Fixes for multiple vulnerabilities with an overall severity of "critical" have been released in Mozilla Firefox/Thunderbird 1.0.7 and the Mozilla Suite 1.7.12 Closes: - CVE-Ids: CAN-2005-2701 CAN-2005-2702 CAN-2005-2703 CAN-2005-2704 CAN-2005-2705 CAN-2005-2706 CAN-2005-2707 Bugzilla: 300936 296134 297078 302263 299518 303213 304754 306261 306804 291178 300853 301180 302100 Issues addressed: + CAN-2005-2701 - Heap overrun in XBM image processing, tbird is not affected applied anyway to keep source in sync. + CAN-2005-2702 - Crash on "zero-width non-joiner" sequence + CAN-2005-2703 - XMLHttpRequest header spoofing + CAN-2005-2704 - Object spoofing using XBL <implements> + CAN-2005-2705 - JavaScript integer overflow + CAN-2005-2706 - Privilege escalation using about: scheme + CAN-2005-2707 - Chrome window spoofing + Regression fixes * MFSA-2005-59: Command-line handling on Linux allows shell execution Summary: URLs passed to Linux versions of Firefox on the command-line are not correctly protected against interpretation by the shell. As a result a malicious URL can result in the execution of shell commands with the privileges of the user. If Firefox is set as the default handler for web URLs then opening a URL in another program (for example, links in a mail or chat client) can result in shell command execution. Closes: 329664,329664 CVE-Ids: CAN-2005-2968 Bugzilla: 307185 Issues addressed: + CAN-2005-2968 - Command-line handling on Linux allows shell execution stable/main/binary-mipsel/mozilla-thunderbird-offline_1.0.2-2.sarge1.0.7_mipsel.deb stable/main/binary-mipsel/mozilla-thunderbird-dev_1.0.2-2.sarge1.0.7_mipsel.deb stable/main/binary-mipsel/mozilla-thunderbird-inspector_1.0.2-2.sarge1.0.7_mipsel.deb stable/main/binary-mipsel/mozilla-thunderbird-typeaheadfind_1.0.2-2.sarge1.0.7_mipsel.deb stable/main/binary-mipsel/mozilla-thunderbird_1.0.2-2.sarge1.0.7_mipsel.deb mozilla-thunderbird (1.0.2-2.sarge1.0.7) stable-security; urgency=critical * following issues are addressed with patches in debian/patches/tbird.1.0.6-1.0.7-1/. MFSA_2005-59 has a debian specific patch: debian/mfsa_2005-59.debian.patch. * MFSA-2005-57: IDN heap overrun Summary: Tom Ferris reported a Firefox crash when processing a domain name consisting solely of soft-hyphen characters. Closes: - CVE-Ids: CAN-2005-2871 Bugzilla: 307259 Issues addressed: + CAN-2005-2871 - IDN heap overrun * MFSA-2005-58: Accumulated vendor advisory for multiple vulnerabilities Summary: Fixes for multiple vulnerabilities with an overall severity of "critical" have been released in Mozilla Firefox/Thunderbird 1.0.7 and the Mozilla Suite 1.7.12 Closes: - CVE-Ids: CAN-2005-2701 CAN-2005-2702 CAN-2005-2703 CAN-2005-2704 CAN-2005-2705 CAN-2005-2706 CAN-2005-2707 Bugzilla: 300936 296134 297078 302263 299518 303213 304754 306261 306804 291178 300853 301180 302100 Issues addressed: + CAN-2005-2701 - Heap overrun in XBM image processing, tbird is not affected applied anyway to keep source in sync. + CAN-2005-2702 - Crash on "zero-width non-joiner" sequence + CAN-2005-2703 - XMLHttpRequest header spoofing + CAN-2005-2704 - Object spoofing using XBL <implements> + CAN-2005-2705 - JavaScript integer overflow + CAN-2005-2706 - Privilege escalation using about: scheme + CAN-2005-2707 - Chrome window spoofing + Regression fixes * MFSA-2005-59: Command-line handling on Linux allows shell execution Summary: URLs passed to Linux versions of Firefox on the command-line are not correctly protected against interpretation by the shell. As a result a malicious URL can result in the execution of shell commands with the privileges of the user. If Firefox is set as the default handler for web URLs then opening a URL in another program (for example, links in a mail or chat client) can result in shell command execution. Closes: 329664,329664 CVE-Ids: CAN-2005-2968 Bugzilla: 307185 Issues addressed: + CAN-2005-2968 - Command-line handling on Linux allows shell execution stable/main/binary-mips/mozilla-thunderbird-inspector_1.0.2-2.sarge1.0.7_mips.deb stable/main/binary-mips/mozilla-thunderbird-typeaheadfind_1.0.2-2.sarge1.0.7_mips.deb stable/main/binary-mips/mozilla-thunderbird-offline_1.0.2-2.sarge1.0.7_mips.deb stable/main/binary-mips/mozilla-thunderbird-dev_1.0.2-2.sarge1.0.7_mips.deb stable/main/binary-mips/mozilla-thunderbird_1.0.2-2.sarge1.0.7_mips.deb mozilla-thunderbird (1.0.2-2.sarge1.0.7) stable-security; urgency=critical * following issues are addressed with patches in debian/patches/tbird.1.0.6-1.0.7-1/. MFSA_2005-59 has a debian specific patch: debian/mfsa_2005-59.debian.patch. * MFSA-2005-57: IDN heap overrun Summary: Tom Ferris reported a Firefox crash when processing a domain name consisting solely of soft-hyphen characters. Closes: - CVE-Ids: CAN-2005-2871 Bugzilla: 307259 Issues addressed: + CAN-2005-2871 - IDN heap overrun * MFSA-2005-58: Accumulated vendor advisory for multiple vulnerabilities Summary: Fixes for multiple vulnerabilities with an overall severity of "critical" have been released in Mozilla Firefox/Thunderbird 1.0.7 and the Mozilla Suite 1.7.12 Closes: - CVE-Ids: CAN-2005-2701 CAN-2005-2702 CAN-2005-2703 CAN-2005-2704 CAN-2005-2705 CAN-2005-2706 CAN-2005-2707 Bugzilla: 300936 296134 297078 302263 299518 303213 304754 306261 306804 291178 300853 301180 302100 Issues addressed: + CAN-2005-2701 - Heap overrun in XBM image processing, tbird is not affected applied anyway to keep source in sync. + CAN-2005-2702 - Crash on "zero-width non-joiner" sequence + CAN-2005-2703 - XMLHttpRequest header spoofing + CAN-2005-2704 - Object spoofing using XBL <implements> + CAN-2005-2705 - JavaScript integer overflow + CAN-2005-2706 - Privilege escalation using about: scheme + CAN-2005-2707 - Chrome window spoofing + Regression fixes * MFSA-2005-59: Command-line handling on Linux allows shell execution Summary: URLs passed to Linux versions of Firefox on the command-line are not correctly protected against interpretation by the shell. As a result a malicious URL can result in the execution of shell commands with the privileges of the user. If Firefox is set as the default handler for web URLs then opening a URL in another program (for example, links in a mail or chat client) can result in shell command execution. Closes: 329664,329664 CVE-Ids: CAN-2005-2968 Bugzilla: 307185 Issues addressed: + CAN-2005-2968 - Command-line handling on Linux allows shell execution stable/main/binary-m68k/mozilla-thunderbird-inspector_1.0.2-2.sarge1.0.7_m68k.deb stable/main/binary-m68k/mozilla-thunderbird_1.0.2-2.sarge1.0.7_m68k.deb stable/main/binary-m68k/mozilla-thunderbird-dev_1.0.2-2.sarge1.0.7_m68k.deb stable/main/binary-m68k/mozilla-thunderbird-offline_1.0.2-2.sarge1.0.7_m68k.deb stable/main/binary-m68k/mozilla-thunderbird-typeaheadfind_1.0.2-2.sarge1.0.7_m68k.deb mozilla-thunderbird (1.0.2-2.sarge1.0.7) stable-security; urgency=critical * following issues are addressed with patches in debian/patches/tbird.1.0.6-1.0.7-1/. MFSA_2005-59 has a debian specific patch: debian/mfsa_2005-59.debian.patch. * MFSA-2005-57: IDN heap overrun Summary: Tom Ferris reported a Firefox crash when processing a domain name consisting solely of soft-hyphen characters. Closes: - CVE-Ids: CAN-2005-2871 Bugzilla: 307259 Issues addressed: + CAN-2005-2871 - IDN heap overrun * MFSA-2005-58: Accumulated vendor advisory for multiple vulnerabilities Summary: Fixes for multiple vulnerabilities with an overall severity of "critical" have been released in Mozilla Firefox/Thunderbird 1.0.7 and the Mozilla Suite 1.7.12 Closes: - CVE-Ids: CAN-2005-2701 CAN-2005-2702 CAN-2005-2703 CAN-2005-2704 CAN-2005-2705 CAN-2005-2706 CAN-2005-2707 Bugzilla: 300936 296134 297078 302263 299518 303213 304754 306261 306804 291178 300853 301180 302100 Issues addressed: + CAN-2005-2701 - Heap overrun in XBM image processing, tbird is not affected applied anyway to keep source in sync. + CAN-2005-2702 - Crash on "zero-width non-joiner" sequence + CAN-2005-2703 - XMLHttpRequest header spoofing + CAN-2005-2704 - Object spoofing using XBL <implements> + CAN-2005-2705 - JavaScript integer overflow + CAN-2005-2706 - Privilege escalation using about: scheme + CAN-2005-2707 - Chrome window spoofing + Regression fixes * MFSA-2005-59: Command-line handling on Linux allows shell execution Summary: URLs passed to Linux versions of Firefox on the command-line are not correctly protected against interpretation by the shell. As a result a malicious URL can result in the execution of shell commands with the privileges of the user. If Firefox is set as the default handler for web URLs then opening a URL in another program (for example, links in a mail or chat client) can result in shell command execution. Closes: 329664,329664 CVE-Ids: CAN-2005-2968 Bugzilla: 307185 Issues addressed: + CAN-2005-2968 - Command-line handling on Linux allows shell execution stable/main/binary-ia64/mozilla-thunderbird-inspector_1.0.2-2.sarge1.0.7_ia64.deb stable/main/binary-ia64/mozilla-thunderbird-typeaheadfind_1.0.2-2.sarge1.0.7_ia64.deb stable/main/binary-ia64/mozilla-thunderbird-offline_1.0.2-2.sarge1.0.7_ia64.deb stable/main/binary-ia64/mozilla-thunderbird-dev_1.0.2-2.sarge1.0.7_ia64.deb stable/main/binary-ia64/mozilla-thunderbird_1.0.2-2.sarge1.0.7_ia64.deb mozilla-thunderbird (1.0.2-2.sarge1.0.7) stable-security; urgency=critical * following issues are addressed with patches in debian/patches/tbird.1.0.6-1.0.7-1/. MFSA_2005-59 has a debian specific patch: debian/mfsa_2005-59.debian.patch. * MFSA-2005-57: IDN heap overrun Summary: Tom Ferris reported a Firefox crash when processing a domain name consisting solely of soft-hyphen characters. Closes: - CVE-Ids: CAN-2005-2871 Bugzilla: 307259 Issues addressed: + CAN-2005-2871 - IDN heap overrun * MFSA-2005-58: Accumulated vendor advisory for multiple vulnerabilities Summary: Fixes for multiple vulnerabilities with an overall severity of "critical" have been released in Mozilla Firefox/Thunderbird 1.0.7 and the Mozilla Suite 1.7.12 Closes: - CVE-Ids: CAN-2005-2701 CAN-2005-2702 CAN-2005-2703 CAN-2005-2704 CAN-2005-2705 CAN-2005-2706 CAN-2005-2707 Bugzilla: 300936 296134 297078 302263 299518 303213 304754 306261 306804 291178 300853 301180 302100 Issues addressed: + CAN-2005-2701 - Heap overrun in XBM image processing, tbird is not affected applied anyway to keep source in sync. + CAN-2005-2702 - Crash on "zero-width non-joiner" sequence + CAN-2005-2703 - XMLHttpRequest header spoofing + CAN-2005-2704 - Object spoofing using XBL <implements> + CAN-2005-2705 - JavaScript integer overflow + CAN-2005-2706 - Privilege escalation using about: scheme + CAN-2005-2707 - Chrome window spoofing + Regression fixes * MFSA-2005-59: Command-line handling on Linux allows shell execution Summary: URLs passed to Linux versions of Firefox on the command-line are not correctly protected against interpretation by the shell. As a result a malicious URL can result in the execution of shell commands with the privileges of the user. If Firefox is set as the default handler for web URLs then opening a URL in another program (for example, links in a mail or chat client) can result in shell command execution. Closes: 329664,329664 CVE-Ids: CAN-2005-2968 Bugzilla: 307185 Issues addressed: + CAN-2005-2968 - Command-line handling on Linux allows shell execution stable/main/binary-hppa/mozilla-thunderbird-typeaheadfind_1.0.2-2.sarge1.0.7_hppa.deb stable/main/binary-hppa/mozilla-thunderbird-offline_1.0.2-2.sarge1.0.7_hppa.deb stable/main/binary-hppa/mozilla-thunderbird-inspector_1.0.2-2.sarge1.0.7_hppa.deb stable/main/binary-hppa/mozilla-thunderbird-dev_1.0.2-2.sarge1.0.7_hppa.deb stable/main/binary-hppa/mozilla-thunderbird_1.0.2-2.sarge1.0.7_hppa.deb mozilla-thunderbird (1.0.2-2.sarge1.0.7) stable-security; urgency=critical * following issues are addressed with patches in debian/patches/tbird.1.0.6-1.0.7-1/. MFSA_2005-59 has a debian specific patch: debian/mfsa_2005-59.debian.patch. * MFSA-2005-57: IDN heap overrun Summary: Tom Ferris reported a Firefox crash when processing a domain name consisting solely of soft-hyphen characters. Closes: - CVE-Ids: CAN-2005-2871 Bugzilla: 307259 Issues addressed: + CAN-2005-2871 - IDN heap overrun * MFSA-2005-58: Accumulated vendor advisory for multiple vulnerabilities Summary: Fixes for multiple vulnerabilities with an overall severity of "critical" have been released in Mozilla Firefox/Thunderbird 1.0.7 and the Mozilla Suite 1.7.12 Closes: - CVE-Ids: CAN-2005-2701 CAN-2005-2702 CAN-2005-2703 CAN-2005-2704 CAN-2005-2705 CAN-2005-2706 CAN-2005-2707 Bugzilla: 300936 296134 297078 302263 299518 303213 304754 306261 306804 291178 300853 301180 302100 Issues addressed: + CAN-2005-2701 - Heap overrun in XBM image processing, tbird is not affected applied anyway to keep source in sync. + CAN-2005-2702 - Crash on "zero-width non-joiner" sequence + CAN-2005-2703 - XMLHttpRequest header spoofing + CAN-2005-2704 - Object spoofing using XBL <implements> + CAN-2005-2705 - JavaScript integer overflow + CAN-2005-2706 - Privilege escalation using about: scheme + CAN-2005-2707 - Chrome window spoofing + Regression fixes * MFSA-2005-59: Command-line handling on Linux allows shell execution Summary: URLs passed to Linux versions of Firefox on the command-line are not correctly protected against interpretation by the shell. As a result a malicious URL can result in the execution of shell commands with the privileges of the user. If Firefox is set as the default handler for web URLs then opening a URL in another program (for example, links in a mail or chat client) can result in shell command execution. Closes: 329664,329664 CVE-Ids: CAN-2005-2968 Bugzilla: 307185 Issues addressed: + CAN-2005-2968 - Command-line handling on Linux allows shell execution stable/main/binary-arm/mozilla-thunderbird-typeaheadfind_1.0.2-2.sarge1.0.7_arm.deb stable/main/binary-arm/mozilla-thunderbird_1.0.2-2.sarge1.0.7_arm.deb stable/main/binary-arm/mozilla-thunderbird-dev_1.0.2-2.sarge1.0.7_arm.deb stable/main/binary-arm/mozilla-thunderbird-offline_1.0.2-2.sarge1.0.7_arm.deb stable/main/binary-arm/mozilla-thunderbird-inspector_1.0.2-2.sarge1.0.7_arm.deb mozilla-thunderbird (1.0.2-2.sarge1.0.7) stable-security; urgency=critical * following issues are addressed with patches in debian/patches/tbird.1.0.6-1.0.7-1/. MFSA_2005-59 has a debian specific patch: debian/mfsa_2005-59.debian.patch. * MFSA-2005-57: IDN heap overrun Summary: Tom Ferris reported a Firefox crash when processing a domain name consisting solely of soft-hyphen characters. Closes: - CVE-Ids: CAN-2005-2871 Bugzilla: 307259 Issues addressed: + CAN-2005-2871 - IDN heap overrun * MFSA-2005-58: Accumulated vendor advisory for multiple vulnerabilities Summary: Fixes for multiple vulnerabilities with an overall severity of "critical" have been released in Mozilla Firefox/Thunderbird 1.0.7 and the Mozilla Suite 1.7.12 Closes: - CVE-Ids: CAN-2005-2701 CAN-2005-2702 CAN-2005-2703 CAN-2005-2704 CAN-2005-2705 CAN-2005-2706 CAN-2005-2707 Bugzilla: 300936 296134 297078 302263 299518 303213 304754 306261 306804 291178 300853 301180 302100 Issues addressed: + CAN-2005-2701 - Heap overrun in XBM image processing, tbird is not affected applied anyway to keep source in sync. + CAN-2005-2702 - Crash on "zero-width non-joiner" sequence + CAN-2005-2703 - XMLHttpRequest header spoofing + CAN-2005-2704 - Object spoofing using XBL <implements> + CAN-2005-2705 - JavaScript integer overflow + CAN-2005-2706 - Privilege escalation using about: scheme + CAN-2005-2707 - Chrome window spoofing + Regression fixes * MFSA-2005-59: Command-line handling on Linux allows shell execution Summary: URLs passed to Linux versions of Firefox on the command-line are not correctly protected against interpretation by the shell. As a result a malicious URL can result in the execution of shell commands with the privileges of the user. If Firefox is set as the default handler for web URLs then opening a URL in another program (for example, links in a mail or chat client) can result in shell command execution. Closes: 329664,329664 CVE-Ids: CAN-2005-2968 Bugzilla: 307185 Issues addressed: + CAN-2005-2968 - Command-line handling on Linux allows shell execution stable/main/binary-alpha/mozilla-thunderbird-inspector_1.0.2-2.sarge1.0.7_alpha.deb stable/main/binary-alpha/mozilla-thunderbird_1.0.2-2.sarge1.0.7_alpha.deb stable/main/binary-alpha/mozilla-thunderbird-offline_1.0.2-2.sarge1.0.7_alpha.deb stable/main/binary-alpha/mozilla-thunderbird-typeaheadfind_1.0.2-2.sarge1.0.7_alpha.deb stable/main/binary-alpha/mozilla-thunderbird-dev_1.0.2-2.sarge1.0.7_alpha.deb mozilla-thunderbird (1.0.2-2.sarge1.0.7) stable-security; urgency=critical * following issues are addressed with patches in debian/patches/tbird.1.0.6-1.0.7-1/. MFSA_2005-59 has a debian specific patch: debian/mfsa_2005-59.debian.patch. * MFSA-2005-57: IDN heap overrun Summary: Tom Ferris reported a Firefox crash when processing a domain name consisting solely of soft-hyphen characters. Closes: - CVE-Ids: CAN-2005-2871 Bugzilla: 307259 Issues addressed: + CAN-2005-2871 - IDN heap overrun * MFSA-2005-58: Accumulated vendor advisory for multiple vulnerabilities Summary: Fixes for multiple vulnerabilities with an overall severity of "critical" have been released in Mozilla Firefox/Thunderbird 1.0.7 and the Mozilla Suite 1.7.12 Closes: - CVE-Ids: CAN-2005-2701 CAN-2005-2702 CAN-2005-2703 CAN-2005-2704 CAN-2005-2705 CAN-2005-2706 CAN-2005-2707 Bugzilla: 300936 296134 297078 302263 299518 303213 304754 306261 306804 291178 300853 301180 302100 Issues addressed: + CAN-2005-2701 - Heap overrun in XBM image processing, tbird is not affected applied anyway to keep source in sync. + CAN-2005-2702 - Crash on "zero-width non-joiner" sequence + CAN-2005-2703 - XMLHttpRequest header spoofing + CAN-2005-2704 - Object spoofing using XBL <implements> + CAN-2005-2705 - JavaScript integer overflow + CAN-2005-2706 - Privilege escalation using about: scheme + CAN-2005-2707 - Chrome window spoofing + Regression fixes * MFSA-2005-59: Command-line handling on Linux allows shell execution Summary: URLs passed to Linux versions of Firefox on the command-line are not correctly protected against interpretation by the shell. As a result a malicious URL can result in the execution of shell commands with the privileges of the user. If Firefox is set as the default handler for web URLs then opening a URL in another program (for example, links in a mail or chat client) can result in shell command execution. Closes: 329664,329664 CVE-Ids: CAN-2005-2968 Bugzilla: 307185 Issues addressed: + CAN-2005-2968 - Command-line handling on Linux allows shell execution stable/main/source/mozilla-thunderbird_1.0.2-2.sarge1.0.7.diff.gz stable/main/binary-i386/mozilla-thunderbird-offline_1.0.2-2.sarge1.0.7_i386.deb stable/main/binary-i386/mozilla-thunderbird-dev_1.0.2-2.sarge1.0.7_i386.deb stable/main/binary-i386/mozilla-thunderbird-inspector_1.0.2-2.sarge1.0.7_i386.deb stable/main/binary-i386/mozilla-thunderbird_1.0.2-2.sarge1.0.7_i386.deb stable/main/binary-i386/mozilla-thunderbird-typeaheadfind_1.0.2-2.sarge1.0.7_i386.deb stable/main/source/mozilla-thunderbird_1.0.2-2.sarge1.0.7.dsc mozilla-thunderbird (1.0.2-2.sarge1.0.7) stable-security; urgency=critical * following issues are addressed with patches in debian/patches/tbird.1.0.6-1.0.7-1/. MFSA_2005-59 has a debian specific patch: debian/mfsa_2005-59.debian.patch. * MFSA-2005-57: IDN heap overrun Summary: Tom Ferris reported a Firefox crash when processing a domain name consisting solely of soft-hyphen characters. Closes: - CVE-Ids: CAN-2005-2871 Bugzilla: 307259 Issues addressed: + CAN-2005-2871 - IDN heap overrun * MFSA-2005-58: Accumulated vendor advisory for multiple vulnerabilities Summary: Fixes for multiple vulnerabilities with an overall severity of "critical" have been released in Mozilla Firefox/Thunderbird 1.0.7 and the Mozilla Suite 1.7.12 Closes: - CVE-Ids: CAN-2005-2701 CAN-2005-2702 CAN-2005-2703 CAN-2005-2704 CAN-2005-2705 CAN-2005-2706 CAN-2005-2707 Bugzilla: 300936 296134 297078 302263 299518 303213 304754 306261 306804 291178 300853 301180 302100 Issues addressed: + CAN-2005-2701 - Heap overrun in XBM image processing, tbird is not affected applied anyway to keep source in sync. + CAN-2005-2702 - Crash on "zero-width non-joiner" sequence + CAN-2005-2703 - XMLHttpRequest header spoofing + CAN-2005-2704 - Object spoofing using XBL <implements> + CAN-2005-2705 - JavaScript integer overflow + CAN-2005-2706 - Privilege escalation using about: scheme + CAN-2005-2707 - Chrome window spoofing + Regression fixes * MFSA-2005-59: Command-line handling on Linux allows shell execution Summary: URLs passed to Linux versions of Firefox on the command-line are not correctly protected against interpretation by the shell. As a result a malicious URL can result in the execution of shell commands with the privileges of the user. If Firefox is set as the default handler for web URLs then opening a URL in another program (for example, links in a mail or chat client) can result in shell command execution. Closes: 329664,329664 CVE-Ids: CAN-2005-2968 Bugzilla: 307185 Issues addressed: + CAN-2005-2968 - Command-line handling on Linux allows shell execution stable/main/binary-sparc/mozilla-firefox-dom-inspector_1.0.4-2sarge4_sparc.deb stable/main/binary-sparc/mozilla-firefox_1.0.4-2sarge4_sparc.deb stable/main/binary-sparc/mozilla-firefox-gnome-support_1.0.4-2sarge4_sparc.deb mozilla-firefox (1.0.4-2sarge4) stable-security; urgency=critical * netwerk/base/src/nsStandardURL.cpp: Patch from bz#307259 to fix CAN-2005-2871, a buffer overflow vulnerability in IDN processing. (Closes: #327452) stable/main/binary-s390/mozilla-firefox-dom-inspector_1.0.4-2sarge4_s390.deb stable/main/binary-s390/mozilla-firefox_1.0.4-2sarge4_s390.deb stable/main/binary-s390/mozilla-firefox-gnome-support_1.0.4-2sarge4_s390.deb mozilla-firefox (1.0.4-2sarge4) stable-security; urgency=critical * netwerk/base/src/nsStandardURL.cpp: Patch from bz#307259 to fix CAN-2005-2871, a buffer overflow vulnerability in IDN processing. (Closes: #327452) stable/main/binary-powerpc/mozilla-firefox-dom-inspector_1.0.4-2sarge4_powerpc.deb stable/main/binary-powerpc/mozilla-firefox-gnome-support_1.0.4-2sarge4_powerpc.deb stable/main/binary-powerpc/mozilla-firefox_1.0.4-2sarge4_powerpc.deb mozilla-firefox (1.0.4-2sarge4) stable-security; urgency=critical * netwerk/base/src/nsStandardURL.cpp: Patch from bz#307259 to fix CAN-2005-2871, a buffer overflow vulnerability in IDN processing. (Closes: #327452) stable/main/binary-mipsel/mozilla-firefox-dom-inspector_1.0.4-2sarge4_mipsel.deb stable/main/binary-mipsel/mozilla-firefox-gnome-support_1.0.4-2sarge4_mipsel.deb stable/main/binary-mipsel/mozilla-firefox_1.0.4-2sarge4_mipsel.deb mozilla-firefox (1.0.4-2sarge4) stable-security; urgency=critical * netwerk/base/src/nsStandardURL.cpp: Patch from bz#307259 to fix CAN-2005-2871, a buffer overflow vulnerability in IDN processing. (Closes: #327452) stable/main/binary-mips/mozilla-firefox-gnome-support_1.0.4-2sarge4_mips.deb stable/main/binary-mips/mozilla-firefox-dom-inspector_1.0.4-2sarge4_mips.deb stable/main/binary-mips/mozilla-firefox_1.0.4-2sarge4_mips.deb mozilla-firefox (1.0.4-2sarge4) stable-security; urgency=critical * netwerk/base/src/nsStandardURL.cpp: Patch from bz#307259 to fix CAN-2005-2871, a buffer overflow vulnerability in IDN processing. (Closes: #327452) stable/main/binary-m68k/mozilla-firefox-gnome-support_1.0.4-2sarge4_m68k.deb stable/main/binary-m68k/mozilla-firefox_1.0.4-2sarge4_m68k.deb stable/main/binary-m68k/mozilla-firefox-dom-inspector_1.0.4-2sarge4_m68k.deb mozilla-firefox (1.0.4-2sarge4) stable-security; urgency=critical * netwerk/base/src/nsStandardURL.cpp: Patch from bz#307259 to fix CAN-2005-2871, a buffer overflow vulnerability in IDN processing. (Closes: #327452) stable/main/binary-ia64/mozilla-firefox-dom-inspector_1.0.4-2sarge4_ia64.deb stable/main/binary-ia64/mozilla-firefox-gnome-support_1.0.4-2sarge4_ia64.deb stable/main/binary-ia64/mozilla-firefox_1.0.4-2sarge4_ia64.deb mozilla-firefox (1.0.4-2sarge4) stable-security; urgency=critical * netwerk/base/src/nsStandardURL.cpp: Patch from bz#307259 to fix CAN-2005-2871, a buffer overflow vulnerability in IDN processing. (Closes: #327452) stable/main/binary-hppa/mozilla-firefox-dom-inspector_1.0.4-2sarge4_hppa.deb stable/main/binary-hppa/mozilla-firefox-gnome-support_1.0.4-2sarge4_hppa.deb stable/main/binary-hppa/mozilla-firefox_1.0.4-2sarge4_hppa.deb mozilla-firefox (1.0.4-2sarge4) stable-security; urgency=critical * netwerk/base/src/nsStandardURL.cpp: Patch from bz#307259 to fix CAN-2005-2871, a buffer overflow vulnerability in IDN processing. (Closes: #327452) stable/main/binary-arm/mozilla-firefox_1.0.4-2sarge4_arm.deb stable/main/binary-arm/mozilla-firefox-gnome-support_1.0.4-2sarge4_arm.deb stable/main/binary-arm/mozilla-firefox-dom-inspector_1.0.4-2sarge4_arm.deb mozilla-firefox (1.0.4-2sarge4) stable-security; urgency=critical * netwerk/base/src/nsStandardURL.cpp: Patch from bz#307259 to fix CAN-2005-2871, a buffer overflow vulnerability in IDN processing. (Closes: #327452) stable/main/binary-alpha/mozilla-firefox-gnome-support_1.0.4-2sarge4_alpha.deb stable/main/binary-alpha/mozilla-firefox-dom-inspector_1.0.4-2sarge4_alpha.deb stable/main/binary-alpha/mozilla-firefox_1.0.4-2sarge4_alpha.deb mozilla-firefox (1.0.4-2sarge4) stable-security; urgency=critical * netwerk/base/src/nsStandardURL.cpp: Patch from bz#307259 to fix CAN-2005-2871, a buffer overflow vulnerability in IDN processing. (Closes: #327452) stable/main/binary-i386/mozilla-firefox_1.0.4-2sarge4_i386.deb stable/main/source/mozilla-firefox_1.0.4-2sarge4.diff.gz stable/main/binary-i386/mozilla-firefox-gnome-support_1.0.4-2sarge4_i386.deb stable/main/binary-i386/mozilla-firefox-dom-inspector_1.0.4-2sarge4_i386.deb stable/main/source/mozilla-firefox_1.0.4-2sarge4.dsc mozilla-firefox (1.0.4-2sarge4) stable-security; urgency=critical * netwerk/base/src/nsStandardURL.cpp: Patch from bz#307259 to fix CAN-2005-2871, a buffer overflow vulnerability in IDN processing. (Closes: #327452) stable/main/binary-sparc/libnss-dev_1.7.8-1sarge3_sparc.deb stable/main/binary-sparc/mozilla_1.7.8-1sarge3_sparc.deb stable/main/binary-sparc/libnspr4_1.7.8-1sarge3_sparc.deb stable/main/binary-sparc/mozilla-dev_1.7.8-1sarge3_sparc.deb stable/main/binary-sparc/mozilla-chatzilla_1.7.8-1sarge3_sparc.deb stable/main/binary-sparc/mozilla-mailnews_1.7.8-1sarge3_sparc.deb stable/main/binary-sparc/mozilla-calendar_1.7.8-1sarge3_sparc.deb stable/main/binary-sparc/mozilla-dom-inspector_1.7.8-1sarge3_sparc.deb stable/main/binary-sparc/libnss3_1.7.8-1sarge3_sparc.deb stable/main/binary-sparc/libnspr-dev_1.7.8-1sarge3_sparc.deb stable/main/binary-sparc/mozilla-browser_1.7.8-1sarge3_sparc.deb stable/main/binary-sparc/mozilla-psm_1.7.8-1sarge3_sparc.deb stable/main/binary-sparc/mozilla-js-debugger_1.7.8-1sarge3_sparc.deb mozilla (2:1.7.8-1sarge3) stable-security; urgency=critical * MFSA-2005-56a.debian: Regressions introduced by mozilla 1.7.9. Summary: Regressions introduced by mozilla 1.7.9 bugfix. There was no advisory for it (debian/patches/001_mfsa_2005-56a.patch) Closes: 321427 Bugzilla: 294307 301917 300749 Issues addressed: + Regressions introduced by mozilla 1.7.9 bugfix. * MFSA-2005-57: IDN heap overrun Summary: Tom Ferris reported a Firefox crash when processing a domain name consisting solely of soft-hyphen characters. (debian/patches/001_mfsa-2005-57.patch) Closes: 327366 CVE-Ids: CAN-2005-2871 Bugzilla: 307259 308281 Issues addressed: + CAN-2005-2871 - IDN heap overrun * MFSA-2005-58: Accumulated vendor advisory for multiple vulnerabilities Summary: Fixes for multiple vulnerabilities with an overall severity of "critical" have been released in Mozilla Firefox 1.0.7 and the Mozilla Suite 1.7.12 (debian/patches/001_mfsa-2005-58.patch) Closes: 329778 CVE-Ids: CAN-2005-2701 CAN-2005-2702 CAN-2005-2703 CAN-2005-2704 CAN-2005-2705 CAN-2005-2706 CAN-2005-2707 Bugzilla: 300936 296134 297078 302263 299518 303213 304754 306261 306804 291178 300853 301180 302100 Issues addressed: + CAN-2005-2701 - Heap overrun in XBM image processing + CAN-2005-2702 - Crash on "zero-width non-joiner" sequence + CAN-2005-2703 - XMLHttpRequest header spoofing + CAN-2005-2704 - Object spoofing using XBL <implements> + CAN-2005-2705 - JavaScript integer overflow + CAN-2005-2706 - Privilege escalation using about: scheme + CAN-2005-2707 - Chrome window spoofing + Regression fixes * MFSA-2005-59: Command-line handling on Linux allows shell execution Summary: URLs passed to Linux versions of Firefox on the command-line are not correctly protected against interpretation by the shell. As a result a malicious URL can result in the execution of shell commands with the privileges of the user. If Firefox is set as the default handler for web URLs then opening a URL in another program (for example, links in a mail or chat client) can result in shell command execution. (debian/patches/001_mfsa-2005-59.patch) Closes: - CVE-Ids: CAN-2005-2968 Bugzilla: 307185 Issues addressed: + CAN-2005-2968 - Command-line handling on Linux allows shell execution stable/main/binary-s390/libnss3_1.7.8-1sarge3_s390.deb stable/main/binary-s390/mozilla-browser_1.7.8-1sarge3_s390.deb stable/main/binary-s390/mozilla-psm_1.7.8-1sarge3_s390.deb stable/main/binary-s390/mozilla-js-debugger_1.7.8-1sarge3_s390.deb stable/main/binary-s390/libnspr4_1.7.8-1sarge3_s390.deb stable/main/binary-s390/mozilla-calendar_1.7.8-1sarge3_s390.deb stable/main/binary-s390/libnspr-dev_1.7.8-1sarge3_s390.deb stable/main/binary-s390/mozilla-dev_1.7.8-1sarge3_s390.deb stable/main/binary-s390/mozilla-chatzilla_1.7.8-1sarge3_s390.deb stable/main/binary-s390/mozilla_1.7.8-1sarge3_s390.deb stable/main/binary-s390/libnss-dev_1.7.8-1sarge3_s390.deb stable/main/binary-s390/mozilla-dom-inspector_1.7.8-1sarge3_s390.deb stable/main/binary-s390/mozilla-mailnews_1.7.8-1sarge3_s390.deb mozilla (2:1.7.8-1sarge3) stable-security; urgency=critical * MFSA-2005-56a.debian: Regressions introduced by mozilla 1.7.9. Summary: Regressions introduced by mozilla 1.7.9 bugfix. There was no advisory for it (debian/patches/001_mfsa_2005-56a.patch) Closes: 321427 Bugzilla: 294307 301917 300749 Issues addressed: + Regressions introduced by mozilla 1.7.9 bugfix. * MFSA-2005-57: IDN heap overrun Summary: Tom Ferris reported a Firefox crash when processing a domain name consisting solely of soft-hyphen characters. (debian/patches/001_mfsa-2005-57.patch) Closes: 327366 CVE-Ids: CAN-2005-2871 Bugzilla: 307259 308281 Issues addressed: + CAN-2005-2871 - IDN heap overrun * MFSA-2005-58: Accumulated vendor advisory for multiple vulnerabilities Summary: Fixes for multiple vulnerabilities with an overall severity of "critical" have been released in Mozilla Firefox 1.0.7 and the Mozilla Suite 1.7.12 (debian/patches/001_mfsa-2005-58.patch) Closes: 329778 CVE-Ids: CAN-2005-2701 CAN-2005-2702 CAN-2005-2703 CAN-2005-2704 CAN-2005-2705 CAN-2005-2706 CAN-2005-2707 Bugzilla: 300936 296134 297078 302263 299518 303213 304754 306261 306804 291178 300853 301180 302100 Issues addressed: + CAN-2005-2701 - Heap overrun in XBM image processing + CAN-2005-2702 - Crash on "zero-width non-joiner" sequence + CAN-2005-2703 - XMLHttpRequest header spoofing + CAN-2005-2704 - Object spoofing using XBL <implements> + CAN-2005-2705 - JavaScript integer overflow + CAN-2005-2706 - Privilege escalation using about: scheme + CAN-2005-2707 - Chrome window spoofing + Regression fixes * MFSA-2005-59: Command-line handling on Linux allows shell execution Summary: URLs passed to Linux versions of Firefox on the command-line are not correctly protected against interpretation by the shell. As a result a malicious URL can result in the execution of shell commands with the privileges of the user. If Firefox is set as the default handler for web URLs then opening a URL in another program (for example, links in a mail or chat client) can result in shell command execution. (debian/patches/001_mfsa-2005-59.patch) Closes: - CVE-Ids: CAN-2005-2968 Bugzilla: 307185 Issues addressed: + CAN-2005-2968 - Command-line handling on Linux allows shell execution stable/main/binary-powerpc/mozilla-psm_1.7.8-1sarge3_powerpc.deb stable/main/binary-powerpc/mozilla-js-debugger_1.7.8-1sarge3_powerpc.deb stable/main/binary-powerpc/mozilla-browser_1.7.8-1sarge3_powerpc.deb stable/main/binary-powerpc/libnspr4_1.7.8-1sarge3_powerpc.deb stable/main/binary-powerpc/libnspr-dev_1.7.8-1sarge3_powerpc.deb stable/main/binary-powerpc/libnss3_1.7.8-1sarge3_powerpc.deb stable/main/binary-powerpc/mozilla-calendar_1.7.8-1sarge3_powerpc.deb stable/main/binary-powerpc/mozilla-chatzilla_1.7.8-1sarge3_powerpc.deb stable/main/binary-powerpc/mozilla-mailnews_1.7.8-1sarge3_powerpc.deb stable/main/binary-powerpc/libnss-dev_1.7.8-1sarge3_powerpc.deb stable/main/binary-powerpc/mozilla-dev_1.7.8-1sarge3_powerpc.deb stable/main/binary-powerpc/mozilla-dom-inspector_1.7.8-1sarge3_powerpc.deb stable/main/binary-powerpc/mozilla_1.7.8-1sarge3_powerpc.deb mozilla (2:1.7.8-1sarge3) stable-security; urgency=critical * MFSA-2005-56a.debian: Regressions introduced by mozilla 1.7.9. Summary: Regressions introduced by mozilla 1.7.9 bugfix. There was no advisory for it (debian/patches/001_mfsa_2005-56a.patch) Closes: 321427 Bugzilla: 294307 301917 300749 Issues addressed: + Regressions introduced by mozilla 1.7.9 bugfix. * MFSA-2005-57: IDN heap overrun Summary: Tom Ferris reported a Firefox crash when processing a domain name consisting solely of soft-hyphen characters. (debian/patches/001_mfsa-2005-57.patch) Closes: 327366 CVE-Ids: CAN-2005-2871 Bugzilla: 307259 308281 Issues addressed: + CAN-2005-2871 - IDN heap overrun * MFSA-2005-58: Accumulated vendor advisory for multiple vulnerabilities Summary: Fixes for multiple vulnerabilities with an overall severity of "critical" have been released in Mozilla Firefox 1.0.7 and the Mozilla Suite 1.7.12 (debian/patches/001_mfsa-2005-58.patch) Closes: 329778 CVE-Ids: CAN-2005-2701 CAN-2005-2702 CAN-2005-2703 CAN-2005-2704 CAN-2005-2705 CAN-2005-2706 CAN-2005-2707 Bugzilla: 300936 296134 297078 302263 299518 303213 304754 306261 306804 291178 300853 301180 302100 Issues addressed: + CAN-2005-2701 - Heap overrun in XBM image processing + CAN-2005-2702 - Crash on "zero-width non-joiner" sequence + CAN-2005-2703 - XMLHttpRequest header spoofing + CAN-2005-2704 - Object spoofing using XBL <implements> + CAN-2005-2705 - JavaScript integer overflow + CAN-2005-2706 - Privilege escalation using about: scheme + CAN-2005-2707 - Chrome window spoofing + Regression fixes * MFSA-2005-59: Command-line handling on Linux allows shell execution Summary: URLs passed to Linux versions of Firefox on the command-line are not correctly protected against interpretation by the shell. As a result a malicious URL can result in the execution of shell commands with the privileges of the user. If Firefox is set as the default handler for web URLs then opening a URL in another program (for example, links in a mail or chat client) can result in shell command execution. (debian/patches/001_mfsa-2005-59.patch) Closes: - CVE-Ids: CAN-2005-2968 Bugzilla: 307185 Issues addressed: + CAN-2005-2968 - Command-line handling on Linux allows shell execution stable/main/binary-mipsel/libnspr4_1.7.8-1sarge3_mipsel.deb stable/main/binary-mipsel/libnss-dev_1.7.8-1sarge3_mipsel.deb stable/main/binary-mipsel/mozilla-psm_1.7.8-1sarge3_mipsel.deb stable/main/binary-mipsel/mozilla-calendar_1.7.8-1sarge3_mipsel.deb stable/main/binary-mipsel/mozilla-mailnews_1.7.8-1sarge3_mipsel.deb stable/main/binary-mipsel/mozilla-js-debugger_1.7.8-1sarge3_mipsel.deb stable/main/binary-mipsel/mozilla-browser_1.7.8-1sarge3_mipsel.deb stable/main/binary-mipsel/mozilla-dev_1.7.8-1sarge3_mipsel.deb stable/main/binary-mipsel/libnss3_1.7.8-1sarge3_mipsel.deb stable/main/binary-mipsel/mozilla-dom-inspector_1.7.8-1sarge3_mipsel.deb stable/main/binary-mipsel/mozilla_1.7.8-1sarge3_mipsel.deb stable/main/binary-mipsel/mozilla-chatzilla_1.7.8-1sarge3_mipsel.deb stable/main/binary-mipsel/libnspr-dev_1.7.8-1sarge3_mipsel.deb mozilla (2:1.7.8-1sarge3) stable-security; urgency=critical * MFSA-2005-56a.debian: Regressions introduced by mozilla 1.7.9. Summary: Regressions introduced by mozilla 1.7.9 bugfix. There was no advisory for it (debian/patches/001_mfsa_2005-56a.patch) Closes: 321427 Bugzilla: 294307 301917 300749 Issues addressed: + Regressions introduced by mozilla 1.7.9 bugfix. * MFSA-2005-57: IDN heap overrun Summary: Tom Ferris reported a Firefox crash when processing a domain name consisting solely of soft-hyphen characters. (debian/patches/001_mfsa-2005-57.patch) Closes: 327366 CVE-Ids: CAN-2005-2871 Bugzilla: 307259 308281 Issues addressed: + CAN-2005-2871 - IDN heap overrun * MFSA-2005-58: Accumulated vendor advisory for multiple vulnerabilities Summary: Fixes for multiple vulnerabilities with an overall severity of "critical" have been released in Mozilla Firefox 1.0.7 and the Mozilla Suite 1.7.12 (debian/patches/001_mfsa-2005-58.patch) Closes: 329778 CVE-Ids: CAN-2005-2701 CAN-2005-2702 CAN-2005-2703 CAN-2005-2704 CAN-2005-2705 CAN-2005-2706 CAN-2005-2707 Bugzilla: 300936 296134 297078 302263 299518 303213 304754 306261 306804 291178 300853 301180 302100 Issues addressed: + CAN-2005-2701 - Heap overrun in XBM image processing + CAN-2005-2702 - Crash on "zero-width non-joiner" sequence + CAN-2005-2703 - XMLHttpRequest header spoofing + CAN-2005-2704 - Object spoofing using XBL <implements> + CAN-2005-2705 - JavaScript integer overflow + CAN-2005-2706 - Privilege escalation using about: scheme + CAN-2005-2707 - Chrome window spoofing + Regression fixes * MFSA-2005-59: Command-line handling on Linux allows shell execution Summary: URLs passed to Linux versions of Firefox on the command-line are not correctly protected against interpretation by the shell. As a result a malicious URL can result in the execution of shell commands with the privileges of the user. If Firefox is set as the default handler for web URLs then opening a URL in another program (for example, links in a mail or chat client) can result in shell command execution. (debian/patches/001_mfsa-2005-59.patch) Closes: - CVE-Ids: CAN-2005-2968 Bugzilla: 307185 Issues addressed: + CAN-2005-2968 - Command-line handling on Linux allows shell execution stable/main/binary-mips/mozilla-psm_1.7.8-1sarge3_mips.deb stable/main/binary-mips/libnspr-dev_1.7.8-1sarge3_mips.deb stable/main/binary-mips/mozilla-browser_1.7.8-1sarge3_mips.deb stable/main/binary-mips/mozilla-chatzilla_1.7.8-1sarge3_mips.deb stable/main/binary-mips/mozilla-dom-inspector_1.7.8-1sarge3_mips.deb stable/main/binary-mips/mozilla-js-debugger_1.7.8-1sarge3_mips.deb stable/main/binary-mips/libnspr4_1.7.8-1sarge3_mips.deb stable/main/binary-mips/mozilla-dev_1.7.8-1sarge3_mips.deb stable/main/binary-mips/libnss-dev_1.7.8-1sarge3_mips.deb stable/main/binary-mips/mozilla-mailnews_1.7.8-1sarge3_mips.deb stable/main/binary-mips/libnss3_1.7.8-1sarge3_mips.deb stable/main/binary-mips/mozilla_1.7.8-1sarge3_mips.deb stable/main/binary-mips/mozilla-calendar_1.7.8-1sarge3_mips.deb mozilla (2:1.7.8-1sarge3) stable-security; urgency=critical * MFSA-2005-56a.debian: Regressions introduced by mozilla 1.7.9. Summary: Regressions introduced by mozilla 1.7.9 bugfix. There was no advisory for it (debian/patches/001_mfsa_2005-56a.patch) Closes: 321427 Bugzilla: 294307 301917 300749 Issues addressed: + Regressions introduced by mozilla 1.7.9 bugfix. * MFSA-2005-57: IDN heap overrun Summary: Tom Ferris reported a Firefox crash when processing a domain name consisting solely of soft-hyphen characters. (debian/patches/001_mfsa-2005-57.patch) Closes: 327366 CVE-Ids: CAN-2005-2871 Bugzilla: 307259 308281 Issues addressed: + CAN-2005-2871 - IDN heap overrun * MFSA-2005-58: Accumulated vendor advisory for multiple vulnerabilities Summary: Fixes for multiple vulnerabilities with an overall severity of "critical" have been released in Mozilla Firefox 1.0.7 and the Mozilla Suite 1.7.12 (debian/patches/001_mfsa-2005-58.patch) Closes: 329778 CVE-Ids: CAN-2005-2701 CAN-2005-2702 CAN-2005-2703 CAN-2005-2704 CAN-2005-2705 CAN-2005-2706 CAN-2005-2707 Bugzilla: 300936 296134 297078 302263 299518 303213 304754 306261 306804 291178 300853 301180 302100 Issues addressed: + CAN-2005-2701 - Heap overrun in XBM image processing + CAN-2005-2702 - Crash on "zero-width non-joiner" sequence + CAN-2005-2703 - XMLHttpRequest header spoofing + CAN-2005-2704 - Object spoofing using XBL <implements> + CAN-2005-2705 - JavaScript integer overflow + CAN-2005-2706 - Privilege escalation using about: scheme + CAN-2005-2707 - Chrome window spoofing + Regression fixes * MFSA-2005-59: Command-line handling on Linux allows shell execution Summary: URLs passed to Linux versions of Firefox on the command-line are not correctly protected against interpretation by the shell. As a result a malicious URL can result in the execution of shell commands with the privileges of the user. If Firefox is set as the default handler for web URLs then opening a URL in another program (for example, links in a mail or chat client) can result in shell command execution. (debian/patches/001_mfsa-2005-59.patch) Closes: - CVE-Ids: CAN-2005-2968 Bugzilla: 307185 Issues addressed: + CAN-2005-2968 - Command-line handling on Linux allows shell execution stable/main/binary-m68k/libnss-dev_1.7.8-1sarge3_m68k.deb stable/main/binary-m68k/libnspr-dev_1.7.8-1sarge3_m68k.deb stable/main/binary-m68k/mozilla-psm_1.7.8-1sarge3_m68k.deb stable/main/binary-m68k/mozilla-dev_1.7.8-1sarge3_m68k.deb stable/main/binary-m68k/mozilla-dom-inspector_1.7.8-1sarge3_m68k.deb stable/main/binary-m68k/mozilla-browser_1.7.8-1sarge3_m68k.deb stable/main/binary-m68k/mozilla-chatzilla_1.7.8-1sarge3_m68k.deb stable/main/binary-m68k/mozilla_1.7.8-1sarge3_m68k.deb stable/main/binary-m68k/libnspr4_1.7.8-1sarge3_m68k.deb stable/main/binary-m68k/mozilla-calendar_1.7.8-1sarge3_m68k.deb stable/main/binary-m68k/mozilla-mailnews_1.7.8-1sarge3_m68k.deb stable/main/binary-m68k/mozilla-js-debugger_1.7.8-1sarge3_m68k.deb stable/main/binary-m68k/libnss3_1.7.8-1sarge3_m68k.deb mozilla (2:1.7.8-1sarge3) stable-security; urgency=critical * MFSA-2005-56a.debian: Regressions introduced by mozilla 1.7.9. Summary: Regressions introduced by mozilla 1.7.9 bugfix. There was no advisory for it (debian/patches/001_mfsa_2005-56a.patch) Closes: 321427 Bugzilla: 294307 301917 300749 Issues addressed: + Regressions introduced by mozilla 1.7.9 bugfix. * MFSA-2005-57: IDN heap overrun Summary: Tom Ferris reported a Firefox crash when processing a domain name consisting solely of soft-hyphen characters. (debian/patches/001_mfsa-2005-57.patch) Closes: 327366 CVE-Ids: CAN-2005-2871 Bugzilla: 307259 308281 Issues addressed: + CAN-2005-2871 - IDN heap overrun * MFSA-2005-58: Accumulated vendor advisory for multiple vulnerabilities Summary: Fixes for multiple vulnerabilities with an overall severity of "critical" have been released in Mozilla Firefox 1.0.7 and the Mozilla Suite 1.7.12 (debian/patches/001_mfsa-2005-58.patch) Closes: 329778 CVE-Ids: CAN-2005-2701 CAN-2005-2702 CAN-2005-2703 CAN-2005-2704 CAN-2005-2705 CAN-2005-2706 CAN-2005-2707 Bugzilla: 300936 296134 297078 302263 299518 303213 304754 306261 306804 291178 300853 301180 302100 Issues addressed: + CAN-2005-2701 - Heap overrun in XBM image processing + CAN-2005-2702 - Crash on "zero-width non-joiner" sequence + CAN-2005-2703 - XMLHttpRequest header spoofing + CAN-2005-2704 - Object spoofing using XBL <implements> + CAN-2005-2705 - JavaScript integer overflow + CAN-2005-2706 - Privilege escalation using about: scheme + CAN-2005-2707 - Chrome window spoofing + Regression fixes * MFSA-2005-59: Command-line handling on Linux allows shell execution Summary: URLs passed to Linux versions of Firefox on the command-line are not correctly protected against interpretation by the shell. As a result a malicious URL can result in the execution of shell commands with the privileges of the user. If Firefox is set as the default handler for web URLs then opening a URL in another program (for example, links in a mail or chat client) can result in shell command execution. (debian/patches/001_mfsa-2005-59.patch) Closes: - CVE-Ids: CAN-2005-2968 Bugzilla: 307185 Issues addressed: + CAN-2005-2968 - Command-line handling on Linux allows shell execution stable/main/binary-ia64/mozilla-dev_1.7.8-1sarge3_ia64.deb stable/main/binary-ia64/mozilla-js-debugger_1.7.8-1sarge3_ia64.deb stable/main/binary-ia64/libnspr-dev_1.7.8-1sarge3_ia64.deb stable/main/binary-ia64/mozilla-chatzilla_1.7.8-1sarge3_ia64.deb stable/main/binary-ia64/mozilla-psm_1.7.8-1sarge3_ia64.deb stable/main/binary-ia64/libnss3_1.7.8-1sarge3_ia64.deb stable/main/binary-ia64/mozilla-browser_1.7.8-1sarge3_ia64.deb stable/main/binary-ia64/libnspr4_1.7.8-1sarge3_ia64.deb stable/main/binary-ia64/mozilla-calendar_1.7.8-1sarge3_ia64.deb stable/main/binary-ia64/mozilla-dom-inspector_1.7.8-1sarge3_ia64.deb stable/main/binary-ia64/libnss-dev_1.7.8-1sarge3_ia64.deb stable/main/binary-ia64/mozilla_1.7.8-1sarge3_ia64.deb stable/main/binary-ia64/mozilla-mailnews_1.7.8-1sarge3_ia64.deb mozilla (2:1.7.8-1sarge3) stable-security; urgency=critical * MFSA-2005-56a.debian: Regressions introduced by mozilla 1.7.9. Summary: Regressions introduced by mozilla 1.7.9 bugfix. There was no advisory for it (debian/patches/001_mfsa_2005-56a.patch) Closes: 321427 Bugzilla: 294307 301917 300749 Issues addressed: + Regressions introduced by mozilla 1.7.9 bugfix. * MFSA-2005-57: IDN heap overrun Summary: Tom Ferris reported a Firefox crash when processing a domain name consisting solely of soft-hyphen characters. (debian/patches/001_mfsa-2005-57.patch) Closes: 327366 CVE-Ids: CAN-2005-2871 Bugzilla: 307259 308281 Issues addressed: + CAN-2005-2871 - IDN heap overrun * MFSA-2005-58: Accumulated vendor advisory for multiple vulnerabilities Summary: Fixes for multiple vulnerabilities with an overall severity of "critical" have been released in Mozilla Firefox 1.0.7 and the Mozilla Suite 1.7.12 (debian/patches/001_mfsa-2005-58.patch) Closes: 329778 CVE-Ids: CAN-2005-2701 CAN-2005-2702 CAN-2005-2703 CAN-2005-2704 CAN-2005-2705 CAN-2005-2706 CAN-2005-2707 Bugzilla: 300936 296134 297078 302263 299518 303213 304754 306261 306804 291178 300853 301180 302100 Issues addressed: + CAN-2005-2701 - Heap overrun in XBM image processing + CAN-2005-2702 - Crash on "zero-width non-joiner" sequence + CAN-2005-2703 - XMLHttpRequest header spoofing + CAN-2005-2704 - Object spoofing using XBL <implements> + CAN-2005-2705 - JavaScript integer overflow + CAN-2005-2706 - Privilege escalation using about: scheme + CAN-2005-2707 - Chrome window spoofing + Regression fixes * MFSA-2005-59: Command-line handling on Linux allows shell execution Summary: URLs passed to Linux versions of Firefox on the command-line are not correctly protected against interpretation by the shell. As a result a malicious URL can result in the execution of shell commands with the privileges of the user. If Firefox is set as the default handler for web URLs then opening a URL in another program (for example, links in a mail or chat client) can result in shell command execution. (debian/patches/001_mfsa-2005-59.patch) Closes: - CVE-Ids: CAN-2005-2968 Bugzilla: 307185 Issues addressed: + CAN-2005-2968 - Command-line handling on Linux allows shell execution stable/main/binary-hppa/mozilla-dom-inspector_1.7.8-1sarge3_hppa.deb stable/main/binary-hppa/mozilla-chatzilla_1.7.8-1sarge3_hppa.deb stable/main/binary-hppa/mozilla-browser_1.7.8-1sarge3_hppa.deb stable/main/binary-hppa/libnss3_1.7.8-1sarge3_hppa.deb stable/main/binary-hppa/libnspr-dev_1.7.8-1sarge3_hppa.deb stable/main/binary-hppa/mozilla-psm_1.7.8-1sarge3_hppa.deb stable/main/binary-hppa/mozilla-calendar_1.7.8-1sarge3_hppa.deb stable/main/binary-hppa/libnspr4_1.7.8-1sarge3_hppa.deb stable/main/binary-hppa/mozilla-mailnews_1.7.8-1sarge3_hppa.deb stable/main/binary-hppa/mozilla-dev_1.7.8-1sarge3_hppa.deb stable/main/binary-hppa/mozilla-js-debugger_1.7.8-1sarge3_hppa.deb stable/main/binary-hppa/libnss-dev_1.7.8-1sarge3_hppa.deb stable/main/binary-hppa/mozilla_1.7.8-1sarge3_hppa.deb mozilla (2:1.7.8-1sarge3) stable-security; urgency=critical * MFSA-2005-56a.debian: Regressions introduced by mozilla 1.7.9. Summary: Regressions introduced by mozilla 1.7.9 bugfix. There was no advisory for it (debian/patches/001_mfsa_2005-56a.patch) Closes: 321427 Bugzilla: 294307 301917 300749 Issues addressed: + Regressions introduced by mozilla 1.7.9 bugfix. * MFSA-2005-57: IDN heap overrun Summary: Tom Ferris reported a Firefox crash when processing a domain name consisting solely of soft-hyphen characters. (debian/patches/001_mfsa-2005-57.patch) Closes: 327366 CVE-Ids: CAN-2005-2871 Bugzilla: 307259 308281 Issues addressed: + CAN-2005-2871 - IDN heap overrun * MFSA-2005-58: Accumulated vendor advisory for multiple vulnerabilities Summary: Fixes for multiple vulnerabilities with an overall severity of "critical" have been released in Mozilla Firefox 1.0.7 and the Mozilla Suite 1.7.12 (debian/patches/001_mfsa-2005-58.patch) Closes: 329778 CVE-Ids: CAN-2005-2701 CAN-2005-2702 CAN-2005-2703 CAN-2005-2704 CAN-2005-2705 CAN-2005-2706 CAN-2005-2707 Bugzilla: 300936 296134 297078 302263 299518 303213 304754 306261 306804 291178 300853 301180 302100 Issues addressed: + CAN-2005-2701 - Heap overrun in XBM image processing + CAN-2005-2702 - Crash on "zero-width non-joiner" sequence + CAN-2005-2703 - XMLHttpRequest header spoofing + CAN-2005-2704 - Object spoofing using XBL <implements> + CAN-2005-2705 - JavaScript integer overflow + CAN-2005-2706 - Privilege escalation using about: scheme + CAN-2005-2707 - Chrome window spoofing + Regression fixes * MFSA-2005-59: Command-line handling on Linux allows shell execution Summary: URLs passed to Linux versions of Firefox on the command-line are not correctly protected against interpretation by the shell. As a result a malicious URL can result in the execution of shell commands with the privileges of the user. If Firefox is set as the default handler for web URLs then opening a URL in another program (for example, links in a mail or chat client) can result in shell command execution. (debian/patches/001_mfsa-2005-59.patch) Closes: - CVE-Ids: CAN-2005-2968 Bugzilla: 307185 Issues addressed: + CAN-2005-2968 - Command-line handling on Linux allows shell execution stable/main/binary-arm/mozilla-dom-inspector_1.7.8-1sarge3_arm.deb stable/main/binary-arm/libnss3_1.7.8-1sarge3_arm.deb stable/main/binary-arm/mozilla-chatzilla_1.7.8-1sarge3_arm.deb stable/main/binary-arm/libnspr-dev_1.7.8-1sarge3_arm.deb stable/main/binary-arm/mozilla-js-debugger_1.7.8-1sarge3_arm.deb stable/main/binary-arm/libnspr4_1.7.8-1sarge3_arm.deb stable/main/binary-arm/mozilla-calendar_1.7.8-1sarge3_arm.deb stable/main/binary-arm/libnss-dev_1.7.8-1sarge3_arm.deb stable/main/binary-arm/mozilla-dev_1.7.8-1sarge3_arm.deb stable/main/binary-arm/mozilla-browser_1.7.8-1sarge3_arm.deb stable/main/binary-arm/mozilla-mailnews_1.7.8-1sarge3_arm.deb stable/main/binary-arm/mozilla_1.7.8-1sarge3_arm.deb stable/main/binary-arm/mozilla-psm_1.7.8-1sarge3_arm.deb mozilla (2:1.7.8-1sarge3) stable-security; urgency=critical * MFSA-2005-56a.debian: Regressions introduced by mozilla 1.7.9. Summary: Regressions introduced by mozilla 1.7.9 bugfix. There was no advisory for it (debian/patches/001_mfsa_2005-56a.patch) Closes: 321427 Bugzilla: 294307 301917 300749 Issues addressed: + Regressions introduced by mozilla 1.7.9 bugfix. * MFSA-2005-57: IDN heap overrun Summary: Tom Ferris reported a Firefox crash when processing a domain name consisting solely of soft-hyphen characters. (debian/patches/001_mfsa-2005-57.patch) Closes: 327366 CVE-Ids: CAN-2005-2871 Bugzilla: 307259 308281 Issues addressed: + CAN-2005-2871 - IDN heap overrun * MFSA-2005-58: Accumulated vendor advisory for multiple vulnerabilities Summary: Fixes for multiple vulnerabilities with an overall severity of "critical" have been released in Mozilla Firefox 1.0.7 and the Mozilla Suite 1.7.12 (debian/patches/001_mfsa-2005-58.patch) Closes: 329778 CVE-Ids: CAN-2005-2701 CAN-2005-2702 CAN-2005-2703 CAN-2005-2704 CAN-2005-2705 CAN-2005-2706 CAN-2005-2707 Bugzilla: 300936 296134 297078 302263 299518 303213 304754 306261 306804 291178 300853 301180 302100 Issues addressed: + CAN-2005-2701 - Heap overrun in XBM image processing + CAN-2005-2702 - Crash on "zero-width non-joiner" sequence + CAN-2005-2703 - XMLHttpRequest header spoofing + CAN-2005-2704 - Object spoofing using XBL <implements> + CAN-2005-2705 - JavaScript integer overflow + CAN-2005-2706 - Privilege escalation using about: scheme + CAN-2005-2707 - Chrome window spoofing + Regression fixes * MFSA-2005-59: Command-line handling on Linux allows shell execution Summary: URLs passed to Linux versions of Firefox on the command-line are not correctly protected against interpretation by the shell. As a result a malicious URL can result in the execution of shell commands with the privileges of the user. If Firefox is set as the default handler for web URLs then opening a URL in another program (for example, links in a mail or chat client) can result in shell command execution. (debian/patches/001_mfsa-2005-59.patch) Closes: - CVE-Ids: CAN-2005-2968 Bugzilla: 307185 Issues addressed: + CAN-2005-2968 - Command-line handling on Linux allows shell execution stable/main/binary-alpha/mozilla-dom-inspector_1.7.8-1sarge3_alpha.deb stable/main/binary-alpha/mozilla-calendar_1.7.8-1sarge3_alpha.deb stable/main/binary-alpha/mozilla-psm_1.7.8-1sarge3_alpha.deb stable/main/binary-alpha/libnss3_1.7.8-1sarge3_alpha.deb stable/main/binary-alpha/mozilla-browser_1.7.8-1sarge3_alpha.deb stable/main/binary-alpha/libnspr-dev_1.7.8-1sarge3_alpha.deb stable/main/binary-alpha/mozilla-js-debugger_1.7.8-1sarge3_alpha.deb stable/main/binary-alpha/mozilla-dev_1.7.8-1sarge3_alpha.deb stable/main/binary-alpha/libnspr4_1.7.8-1sarge3_alpha.deb stable/main/binary-alpha/mozilla-chatzilla_1.7.8-1sarge3_alpha.deb stable/main/binary-alpha/libnss-dev_1.7.8-1sarge3_alpha.deb stable/main/binary-alpha/mozilla-mailnews_1.7.8-1sarge3_alpha.deb stable/main/binary-alpha/mozilla_1.7.8-1sarge3_alpha.deb mozilla (2:1.7.8-1sarge3) stable-security; urgency=critical * MFSA-2005-56a.debian: Regressions introduced by mozilla 1.7.9. Summary: Regressions introduced by mozilla 1.7.9 bugfix. There was no advisory for it (debian/patches/001_mfsa_2005-56a.patch) Closes: 321427 Bugzilla: 294307 301917 300749 Issues addressed: + Regressions introduced by mozilla 1.7.9 bugfix. * MFSA-2005-57: IDN heap overrun Summary: Tom Ferris reported a Firefox crash when processing a domain name consisting solely of soft-hyphen characters. (debian/patches/001_mfsa-2005-57.patch) Closes: 327366 CVE-Ids: CAN-2005-2871 Bugzilla: 307259 308281 Issues addressed: + CAN-2005-2871 - IDN heap overrun * MFSA-2005-58: Accumulated vendor advisory for multiple vulnerabilities Summary: Fixes for multiple vulnerabilities with an overall severity of "critical" have been released in Mozilla Firefox 1.0.7 and the Mozilla Suite 1.7.12 (debian/patches/001_mfsa-2005-58.patch) Closes: 329778 CVE-Ids: CAN-2005-2701 CAN-2005-2702 CAN-2005-2703 CAN-2005-2704 CAN-2005-2705 CAN-2005-2706 CAN-2005-2707 Bugzilla: 300936 296134 297078 302263 299518 303213 304754 306261 306804 291178 300853 301180 302100 Issues addressed: + CAN-2005-2701 - Heap overrun in XBM image processing + CAN-2005-2702 - Crash on "zero-width non-joiner" sequence + CAN-2005-2703 - XMLHttpRequest header spoofing + CAN-2005-2704 - Object spoofing using XBL <implements> + CAN-2005-2705 - JavaScript integer overflow + CAN-2005-2706 - Privilege escalation using about: scheme + CAN-2005-2707 - Chrome window spoofing + Regression fixes * MFSA-2005-59: Command-line handling on Linux allows shell execution Summary: URLs passed to Linux versions of Firefox on the command-line are not correctly protected against interpretation by the shell. As a result a malicious URL can result in the execution of shell commands with the privileges of the user. If Firefox is set as the default handler for web URLs then opening a URL in another program (for example, links in a mail or chat client) can result in shell command execution. (debian/patches/001_mfsa-2005-59.patch) Closes: - CVE-Ids: CAN-2005-2968 Bugzilla: 307185 Issues addressed: + CAN-2005-2968 - Command-line handling on Linux allows shell execution stable/main/binary-i386/mozilla-browser_1.7.8-1sarge3_i386.deb stable/main/binary-i386/mozilla-mailnews_1.7.8-1sarge3_i386.deb stable/main/binary-i386/mozilla-js-debugger_1.7.8-1sarge3_i386.deb stable/main/source/mozilla_1.7.8-1sarge3.dsc stable/main/binary-i386/mozilla-dom-inspector_1.7.8-1sarge3_i386.deb stable/main/binary-i386/mozilla-chatzilla_1.7.8-1sarge3_i386.deb stable/main/binary-i386/mozilla-psm_1.7.8-1sarge3_i386.deb stable/main/binary-i386/mozilla_1.7.8-1sarge3_i386.deb stable/main/binary-i386/libnspr4_1.7.8-1sarge3_i386.deb stable/main/binary-i386/libnspr-dev_1.7.8-1sarge3_i386.deb stable/main/binary-i386/mozilla-dev_1.7.8-1sarge3_i386.deb stable/main/binary-i386/mozilla-calendar_1.7.8-1sarge3_i386.deb stable/main/binary-i386/libnss3_1.7.8-1sarge3_i386.deb stable/main/binary-i386/libnss-dev_1.7.8-1sarge3_i386.deb stable/main/source/mozilla_1.7.8-1sarge3.diff.gz mozilla (2:1.7.8-1sarge3) stable-security; urgency=critical * MFSA-2005-56a.debian: Regressions introduced by mozilla 1.7.9. Summary: Regressions introduced by mozilla 1.7.9 bugfix. There was no advisory for it (debian/patches/001_mfsa_2005-56a.patch) Closes: 321427 Bugzilla: 294307 301917 300749 Issues addressed: + Regressions introduced by mozilla 1.7.9 bugfix. * MFSA-2005-57: IDN heap overrun Summary: Tom Ferris reported a Firefox crash when processing a domain name consisting solely of soft-hyphen characters. (debian/patches/001_mfsa-2005-57.patch) Closes: 327366 CVE-Ids: CAN-2005-2871 Bugzilla: 307259 308281 Issues addressed: + CAN-2005-2871 - IDN heap overrun * MFSA-2005-58: Accumulated vendor advisory for multiple vulnerabilities Summary: Fixes for multiple vulnerabilities with an overall severity of "critical" have been released in Mozilla Firefox 1.0.7 and the Mozilla Suite 1.7.12 (debian/patches/001_mfsa-2005-58.patch) Closes: 329778 CVE-Ids: CAN-2005-2701 CAN-2005-2702 CAN-2005-2703 CAN-2005-2704 CAN-2005-2705 CAN-2005-2706 CAN-2005-2707 Bugzilla: 300936 296134 297078 302263 299518 303213 304754 306261 306804 291178 300853 301180 302100 Issues addressed: + CAN-2005-2701 - Heap overrun in XBM image processing + CAN-2005-2702 - Crash on "zero-width non-joiner" sequence + CAN-2005-2703 - XMLHttpRequest header spoofing + CAN-2005-2704 - Object spoofing using XBL <implements> + CAN-2005-2705 - JavaScript integer overflow + CAN-2005-2706 - Privilege escalation using about: scheme + CAN-2005-2707 - Chrome window spoofing + Regression fixes * MFSA-2005-59: Command-line handling on Linux allows shell execution Summary: URLs passed to Linux versions of Firefox on the command-line are not correctly protected against interpretation by the shell. As a result a malicious URL can result in the execution of shell commands with the privileges of the user. If Firefox is set as the default handler for web URLs then opening a URL in another program (for example, links in a mail or chat client) can result in shell command execution. (debian/patches/001_mfsa-2005-59.patch) Closes: - CVE-Ids: CAN-2005-2968 Bugzilla: 307185 Issues addressed: + CAN-2005-2968 - Command-line handling on Linux allows shell execution stable/main/source/module-assistant_0.9sarge1.tar.gz stable/main/source/module-assistant_0.9sarge1.dsc stable/main/binary-all/module-assistant_0.9sarge1_all.deb module-assistant (0.9sarge1) stable-security; urgency=high * security bugfix release proposal * Fixes a possible symlink attack caused by debug message storage [modass/include/generic.mk, CAN-2005-3121] stable/main/binary-sparc/libapache-mod-auth-shadow_1.4-1sarge1_sparc.deb mod-auth-shadow (1.4-1sarge1) stable-security; urgency=high * Added checking of auth_shadow_flag in authshadow_valid_user() this fixes the problem where auth_shadow always turned itself on when require group was specified. stable/main/binary-s390/libapache-mod-auth-shadow_1.4-1sarge1_s390.deb mod-auth-shadow (1.4-1sarge1) stable-security; urgency=high * Added checking of auth_shadow_flag in authshadow_valid_user() this fixes the problem where auth_shadow always turned itself on when require group was specified. stable/main/binary-mipsel/libapache-mod-auth-shadow_1.4-1sarge1_mipsel.deb mod-auth-shadow (1.4-1sarge1) stable-security; urgency=high * Added checking of auth_shadow_flag in authshadow_valid_user() this fixes the problem where auth_shadow always turned itself on when require group was specified. stable/main/binary-mips/libapache-mod-auth-shadow_1.4-1sarge1_mips.deb mod-auth-shadow (1.4-1sarge1) stable-security; urgency=high * Added checking of auth_shadow_flag in authshadow_valid_user() this fixes the problem where auth_shadow always turned itself on when require group was specified. stable/main/binary-m68k/libapache-mod-auth-shadow_1.4-1sarge1_m68k.deb mod-auth-shadow (1.4-1sarge1) stable-security; urgency=high * Added checking of auth_shadow_flag in authshadow_valid_user() this fixes the problem where auth_shadow always turned itself on when require group was specified. stable/main/binary-ia64/libapache-mod-auth-shadow_1.4-1sarge1_ia64.deb mod-auth-shadow (1.4-1sarge1) stable-security; urgency=high * Added checking of auth_shadow_flag in authshadow_valid_user() this fixes the problem where auth_shadow always turned itself on when require group was specified. stable/main/binary-i386/libapache-mod-auth-shadow_1.4-1sarge1_i386.deb mod-auth-shadow (1.4-1sarge1) stable-security; urgency=high * Added checking of auth_shadow_flag in authshadow_valid_user() this fixes the problem where auth_shadow always turned itself on when require group was specified. stable/main/binary-hppa/libapache-mod-auth-shadow_1.4-1sarge1_hppa.deb mod-auth-shadow (1.4-1sarge1) stable-security; urgency=high * Added checking of auth_shadow_flag in authshadow_valid_user() this fixes the problem where auth_shadow always turned itself on when require group was specified. stable/main/binary-arm/libapache-mod-auth-shadow_1.4-1sarge1_arm.deb mod-auth-shadow (1.4-1sarge1) stable-security; urgency=high * Added checking of auth_shadow_flag in authshadow_valid_user() this fixes the problem where auth_shadow always turned itself on when require group was specified. stable/main/binary-alpha/libapache-mod-auth-shadow_1.4-1sarge1_alpha.deb mod-auth-shadow (1.4-1sarge1) stable-security; urgency=high * Added checking of auth_shadow_flag in authshadow_valid_user() this fixes the problem where auth_shadow always turned itself on when require group was specified. stable/main/source/mod-auth-shadow_1.4-1sarge1.dsc stable/main/binary-powerpc/libapache-mod-auth-shadow_1.4-1sarge1_powerpc.deb stable/main/source/mod-auth-shadow_1.4-1sarge1.diff.gz mod-auth-shadow (1.4-1sarge1) stable-security; urgency=high * Added checking of auth_shadow_flag in authshadow_valid_user() this fixes the problem where auth_shadow always turned itself on when require group was specified. stable/main/binary-sparc/mdadm_1.9.0-4sarge1_sparc.deb stable/main/binary-sparc/mdadm-udeb_1.9.0-4sarge1_sparc.udeb mdadm (1.9.0-4sarge1) stable; urgency=low * Non-maintainer upload. * Make sure error output from MAKEDEV is sent to stderr, to avoid interfering with debconf; this avoids installation problems on udev-using systems. Thanks to Jonas Smedegaard for the patch. Based on the sid upload by Steve Langasek. Closes: #299623. stable/main/binary-s390/mdadm_1.9.0-4sarge1_s390.deb stable/main/binary-s390/mdadm-udeb_1.9.0-4sarge1_s390.udeb mdadm (1.9.0-4sarge1) stable; urgency=low * Non-maintainer upload. * Make sure error output from MAKEDEV is sent to stderr, to avoid interfering with debconf; this avoids installation problems on udev-using systems. Thanks to Jonas Smedegaard for the patch. Based on the sid upload by Steve Langasek. Closes: #299623. stable/main/binary-powerpc/mdadm_1.9.0-4sarge1_powerpc.deb stable/main/binary-powerpc/mdadm-udeb_1.9.0-4sarge1_powerpc.udeb mdadm (1.9.0-4sarge1) stable; urgency=low * Non-maintainer upload. * Make sure error output from MAKEDEV is sent to stderr, to avoid interfering with debconf; this avoids installation problems on udev-using systems. Thanks to Jonas Smedegaard for the patch. Based on the sid upload by Steve Langasek. Closes: #299623. stable/main/binary-mipsel/mdadm-udeb_1.9.0-4sarge1_mipsel.udeb stable/main/binary-mipsel/mdadm_1.9.0-4sarge1_mipsel.deb mdadm (1.9.0-4sarge1) stable; urgency=low * Non-maintainer upload. * Make sure error output from MAKEDEV is sent to stderr, to avoid interfering with debconf; this avoids installation problems on udev-using systems. Thanks to Jonas Smedegaard for the patch. Based on the sid upload by Steve Langasek. Closes: #299623. stable/main/binary-mips/mdadm-udeb_1.9.0-4sarge1_mips.udeb stable/main/binary-mips/mdadm_1.9.0-4sarge1_mips.deb mdadm (1.9.0-4sarge1) stable; urgency=low * Non-maintainer upload. * Make sure error output from MAKEDEV is sent to stderr, to avoid interfering with debconf; this avoids installation problems on udev-using systems. Thanks to Jonas Smedegaard for the patch. Based on the sid upload by Steve Langasek. Closes: #299623. stable/main/binary-m68k/mdadm-udeb_1.9.0-4sarge1_m68k.udeb stable/main/binary-m68k/mdadm_1.9.0-4sarge1_m68k.deb mdadm (1.9.0-4sarge1) stable; urgency=low * Non-maintainer upload. * Make sure error output from MAKEDEV is sent to stderr, to avoid interfering with debconf; this avoids installation problems on udev-using systems. Thanks to Jonas Smedegaard for the patch. Based on the sid upload by Steve Langasek. Closes: #299623. stable/main/binary-ia64/mdadm_1.9.0-4sarge1_ia64.deb stable/main/binary-ia64/mdadm-udeb_1.9.0-4sarge1_ia64.udeb mdadm (1.9.0-4sarge1) stable; urgency=low * Non-maintainer upload. * Make sure error output from MAKEDEV is sent to stderr, to avoid interfering with debconf; this avoids installation problems on udev-using systems. Thanks to Jonas Smedegaard for the patch. Based on the sid upload by Steve Langasek. Closes: #299623. stable/main/binary-hppa/mdadm_1.9.0-4sarge1_hppa.deb stable/main/binary-hppa/mdadm-udeb_1.9.0-4sarge1_hppa.udeb mdadm (1.9.0-4sarge1) stable; urgency=low * Non-maintainer upload. * Make sure error output from MAKEDEV is sent to stderr, to avoid interfering with debconf; this avoids installation problems on udev-using systems. Thanks to Jonas Smedegaard for the patch. Based on the sid upload by Steve Langasek. Closes: #299623. stable/main/binary-arm/mdadm-udeb_1.9.0-4sarge1_arm.udeb stable/main/binary-arm/mdadm_1.9.0-4sarge1_arm.deb mdadm (1.9.0-4sarge1) stable; urgency=low * Non-maintainer upload. * Make sure error output from MAKEDEV is sent to stderr, to avoid interfering with debconf; this avoids installation problems on udev-using systems. Thanks to Jonas Smedegaard for the patch. Based on the sid upload by Steve Langasek. Closes: #299623. stable/main/binary-alpha/mdadm_1.9.0-4sarge1_alpha.deb stable/main/binary-alpha/mdadm-udeb_1.9.0-4sarge1_alpha.udeb mdadm (1.9.0-4sarge1) stable; urgency=low * Non-maintainer upload. * Make sure error output from MAKEDEV is sent to stderr, to avoid interfering with debconf; this avoids installation problems on udev-using systems. Thanks to Jonas Smedegaard for the patch. Based on the sid upload by Steve Langasek. Closes: #299623. stable/main/binary-i386/mdadm-udeb_1.9.0-4sarge1_i386.udeb stable/main/binary-i386/mdadm_1.9.0-4sarge1_i386.deb stable/main/source/mdadm_1.9.0-4sarge1.dsc stable/main/source/mdadm_1.9.0-4sarge1.diff.gz mdadm (1.9.0-4sarge1) stable; urgency=low * Non-maintainer upload. * Make sure error output from MAKEDEV is sent to stderr, to avoid interfering with debconf; this avoids installation problems on udev-using systems. Thanks to Jonas Smedegaard for the patch. Based on the sid upload by Steve Langasek. Closes: #299623. stable/main/binary-sparc/mc_4.6.0-4.6.1-pre3-3sarge1_sparc.deb mc (1:4.6.0-4.6.1-pre3-3sarge1) stable; urgency=high * Fix for a mc segfault when playing with the subshell. Closes: #320533. stable/main/binary-s390/mc_4.6.0-4.6.1-pre3-3sarge1_s390.deb mc (1:4.6.0-4.6.1-pre3-3sarge1) stable; urgency=high * Fix for a mc segfault when playing with the subshell. Closes: #320533. stable/main/binary-powerpc/mc_4.6.0-4.6.1-pre3-3sarge1_powerpc.deb mc (1:4.6.0-4.6.1-pre3-3sarge1) stable; urgency=high * Fix for a mc segfault when playing with the subshell. Closes: #320533. stable/main/binary-mipsel/mc_4.6.0-4.6.1-pre3-3sarge1_mipsel.deb mc (1:4.6.0-4.6.1-pre3-3sarge1) stable; urgency=high * Fix for a mc segfault when playing with the subshell. Closes: #320533. stable/main/binary-mips/mc_4.6.0-4.6.1-pre3-3sarge1_mips.deb mc (1:4.6.0-4.6.1-pre3-3sarge1) stable; urgency=high * Fix for a mc segfault when playing with the subshell. Closes: #320533. stable/main/binary-m68k/mc_4.6.0-4.6.1-pre3-3sarge1_m68k.deb mc (1:4.6.0-4.6.1-pre3-3sarge1) stable; urgency=high * Fix for a mc segfault when playing with the subshell. Closes: #320533. stable/main/binary-ia64/mc_4.6.0-4.6.1-pre3-3sarge1_ia64.deb mc (1:4.6.0-4.6.1-pre3-3sarge1) stable; urgency=high * Fix for a mc segfault when playing with the subshell. Closes: #320533. stable/main/binary-hppa/mc_4.6.0-4.6.1-pre3-3sarge1_hppa.deb mc (1:4.6.0-4.6.1-pre3-3sarge1) stable; urgency=high * Fix for a mc segfault when playing with the subshell. Closes: #320533. stable/main/binary-arm/mc_4.6.0-4.6.1-pre3-3sarge1_arm.deb mc (1:4.6.0-4.6.1-pre3-3sarge1) stable; urgency=high * Fix for a mc segfault when playing with the subshell. Closes: #320533. stable/main/binary-alpha/mc_4.6.0-4.6.1-pre3-3sarge1_alpha.deb mc (1:4.6.0-4.6.1-pre3-3sarge1) stable; urgency=high * Fix for a mc segfault when playing with the subshell. Closes: #320533. stable/main/source/mc_4.6.0-4.6.1-pre3-3sarge1.dsc stable/main/source/mc_4.6.0-4.6.1-pre3-3sarge1.diff.gz stable/main/binary-i386/mc_4.6.0-4.6.1-pre3-3sarge1_i386.deb mc (1:4.6.0-4.6.1-pre3-3sarge1) stable; urgency=high * Fix for a mc segfault when playing with the subshell. Closes: #320533. stable/main/binary-sparc/masqmail_0.2.20-1sarge1_sparc.deb masqmail (0.2.20-1sarge1) stable-security; urgency=high * Non-maintainer upload by the Security Team * Applied maintainer patch to fix insecure execution for fail messages [src/fail_msg.c, src/parse.c, src/peopen.c, CAN-2005-2662] * Applied maintainer patch to fix insecure opening of the log file [debian/preinst, src/log.c, CAN-2005-2663] stable/main/binary-s390/masqmail_0.2.20-1sarge1_s390.deb masqmail (0.2.20-1sarge1) stable-security; urgency=high * Non-maintainer upload by the Security Team * Applied maintainer patch to fix insecure execution for fail messages [src/fail_msg.c, src/parse.c, src/peopen.c, CAN-2005-2662] * Applied maintainer patch to fix insecure opening of the log file [debian/preinst, src/log.c, CAN-2005-2663] stable/main/binary-mipsel/masqmail_0.2.20-1sarge1_mipsel.deb masqmail (0.2.20-1sarge1) stable-security; urgency=high * Non-maintainer upload by the Security Team * Applied maintainer patch to fix insecure execution for fail messages [src/fail_msg.c, src/parse.c, src/peopen.c, CAN-2005-2662] * Applied maintainer patch to fix insecure opening of the log file [debian/preinst, src/log.c, CAN-2005-2663] stable/main/binary-mips/masqmail_0.2.20-1sarge1_mips.deb masqmail (0.2.20-1sarge1) stable-security; urgency=high * Non-maintainer upload by the Security Team * Applied maintainer patch to fix insecure execution for fail messages [src/fail_msg.c, src/parse.c, src/peopen.c, CAN-2005-2662] * Applied maintainer patch to fix insecure opening of the log file [debian/preinst, src/log.c, CAN-2005-2663] stable/main/binary-m68k/masqmail_0.2.20-1sarge1_m68k.deb masqmail (0.2.20-1sarge1) stable-security; urgency=high * Non-maintainer upload by the Security Team * Applied maintainer patch to fix insecure execution for fail messages [src/fail_msg.c, src/parse.c, src/peopen.c, CAN-2005-2662] * Applied maintainer patch to fix insecure opening of the log file [debian/preinst, src/log.c, CAN-2005-2663] stable/main/binary-ia64/masqmail_0.2.20-1sarge1_ia64.deb masqmail (0.2.20-1sarge1) stable-security; urgency=high * Non-maintainer upload by the Security Team * Applied maintainer patch to fix insecure execution for fail messages [src/fail_msg.c, src/parse.c, src/peopen.c, CAN-2005-2662] * Applied maintainer patch to fix insecure opening of the log file [debian/preinst, src/log.c, CAN-2005-2663] stable/main/binary-i386/masqmail_0.2.20-1sarge1_i386.deb masqmail (0.2.20-1sarge1) stable-security; urgency=high * Non-maintainer upload by the Security Team * Applied maintainer patch to fix insecure execution for fail messages [src/fail_msg.c, src/parse.c, src/peopen.c, CAN-2005-2662] * Applied maintainer patch to fix insecure opening of the log file [debian/preinst, src/log.c, CAN-2005-2663] stable/main/binary-hppa/masqmail_0.2.20-1sarge1_hppa.deb masqmail (0.2.20-1sarge1) stable-security; urgency=high * Non-maintainer upload by the Security Team * Applied maintainer patch to fix insecure execution for fail messages [src/fail_msg.c, src/parse.c, src/peopen.c, CAN-2005-2662] * Applied maintainer patch to fix insecure opening of the log file [debian/preinst, src/log.c, CAN-2005-2663] stable/main/binary-arm/masqmail_0.2.20-1sarge1_arm.deb masqmail (0.2.20-1sarge1) stable-security; urgency=high * Non-maintainer upload by the Security Team * Applied maintainer patch to fix insecure execution for fail messages [src/fail_msg.c, src/parse.c, src/peopen.c, CAN-2005-2662] * Applied maintainer patch to fix insecure opening of the log file [debian/preinst, src/log.c, CAN-2005-2663] stable/main/binary-alpha/masqmail_0.2.20-1sarge1_alpha.deb masqmail (0.2.20-1sarge1) stable-security; urgency=high * Non-maintainer upload by the Security Team * Applied maintainer patch to fix insecure execution for fail messages [src/fail_msg.c, src/parse.c, src/peopen.c, CAN-2005-2662] * Applied maintainer patch to fix insecure opening of the log file [debian/preinst, src/log.c, CAN-2005-2663] stable/main/source/masqmail_0.2.20-1sarge1.dsc stable/main/binary-powerpc/masqmail_0.2.20-1sarge1_powerpc.deb stable/main/source/masqmail_0.2.20-1sarge1.tar.gz masqmail (0.2.20-1sarge1) stable-security; urgency=high * Non-maintainer upload by the Security Team * Applied maintainer patch to fix insecure execution for fail messages [src/fail_msg.c, src/parse.c, src/peopen.c, CAN-2005-2662] * Applied maintainer patch to fix insecure opening of the log file [debian/preinst, src/log.c, CAN-2005-2663] stable/main/source/mason_1.0.0-2.2.diff.gz stable/main/binary-all/mason_1.0.0-2.2_all.deb stable/main/source/mason_1.0.0-2.2.dsc mason (1.0.0-2.2) stable-security; urgency=high * Non-maintainer upload by the Security Team * Applied upstream patch to fix broken postinst in order to install the init script that will enable firewall rules [debian/postinst, CAN-2005-3118] stable/main/binary-all/mantis_0.19.2-4.1_all.deb stable/main/source/mantis_0.19.2-4.1.diff.gz stable/main/source/mantis_0.19.2-4.1.dsc mantis (0.19.2-4.1) stable-security; urgency=high * NMU for security bugs: - Mantis #0005247: Real email addresses are visible when using reminders [CVE-2005-3338] - Mantis #0005751: Javascript XSS vulnerability [CVE-2005-3091] - Mantis #0006097: user ID is cached indefinately [CVE-2005-3339] - Mantis #0006273: File Inclusion Vulnerability [CVE-2005-3335] - Mantis #0006275: SQL injection [CVE-2005-3336] Patches from upstream developers (Closes: #330682, #335938) stable/main/binary-sparc/libmailutils0_0.6.1-4sarge2_sparc.deb stable/main/binary-sparc/mailutils-pop3d_0.6.1-4sarge2_sparc.deb stable/main/binary-sparc/mailutils-imap4d_0.6.1-4sarge2_sparc.deb stable/main/binary-sparc/mailutils-comsatd_0.6.1-4sarge2_sparc.deb stable/main/binary-sparc/libmailutils0-dev_0.6.1-4sarge2_sparc.deb stable/main/binary-sparc/mailutils_0.6.1-4sarge2_sparc.deb stable/main/binary-sparc/mailutils-mh_0.6.1-4sarge2_sparc.deb mailutils (1:0.6.1-4sarge2) stable; urgency=high * debian/patches/05_imap4d_bad_uid.patch: modified patch from Bas Wijnen to fix the behaviour of imap4d when fetching non-existing UIDs, introduced in -3 (closes: #317842, #312245). * Move security patch of -4sarge1 to debian/patches/06_CAN-2005-2878. stable/main/binary-s390/mailutils_0.6.1-4sarge2_s390.deb stable/main/binary-s390/libmailutils0-dev_0.6.1-4sarge2_s390.deb stable/main/binary-s390/libmailutils0_0.6.1-4sarge2_s390.deb stable/main/binary-s390/mailutils-comsatd_0.6.1-4sarge2_s390.deb stable/main/binary-s390/mailutils-imap4d_0.6.1-4sarge2_s390.deb stable/main/binary-s390/mailutils-mh_0.6.1-4sarge2_s390.deb stable/main/binary-s390/mailutils-pop3d_0.6.1-4sarge2_s390.deb mailutils (1:0.6.1-4sarge2) stable; urgency=high * debian/patches/05_imap4d_bad_uid.patch: modified patch from Bas Wijnen to fix the behaviour of imap4d when fetching non-existing UIDs, introduced in -3 (closes: #317842, #312245). * Move security patch of -4sarge1 to debian/patches/06_CAN-2005-2878. stable/main/binary-powerpc/mailutils_0.6.1-4sarge2_powerpc.deb stable/main/binary-powerpc/libmailutils0_0.6.1-4sarge2_powerpc.deb stable/main/binary-powerpc/mailutils-pop3d_0.6.1-4sarge2_powerpc.deb stable/main/binary-powerpc/mailutils-comsatd_0.6.1-4sarge2_powerpc.deb stable/main/binary-powerpc/mailutils-imap4d_0.6.1-4sarge2_powerpc.deb stable/main/binary-powerpc/libmailutils0-dev_0.6.1-4sarge2_powerpc.deb stable/main/binary-powerpc/mailutils-mh_0.6.1-4sarge2_powerpc.deb mailutils (1:0.6.1-4sarge2) stable; urgency=high * debian/patches/05_imap4d_bad_uid.patch: modified patch from Bas Wijnen to fix the behaviour of imap4d when fetching non-existing UIDs, introduced in -3 (closes: #317842, #312245). * Move security patch of -4sarge1 to debian/patches/06_CAN-2005-2878. stable/main/binary-mipsel/mailutils-imap4d_0.6.1-4sarge2_mipsel.deb stable/main/binary-mipsel/mailutils-mh_0.6.1-4sarge2_mipsel.deb stable/main/binary-mipsel/libmailutils0-dev_0.6.1-4sarge2_mipsel.deb stable/main/binary-mipsel/mailutils-comsatd_0.6.1-4sarge2_mipsel.deb stable/main/binary-mipsel/libmailutils0_0.6.1-4sarge2_mipsel.deb stable/main/binary-mipsel/mailutils-pop3d_0.6.1-4sarge2_mipsel.deb stable/main/binary-mipsel/mailutils_0.6.1-4sarge2_mipsel.deb mailutils (1:0.6.1-4sarge2) stable; urgency=high * debian/patches/05_imap4d_bad_uid.patch: modified patch from Bas Wijnen to fix the behaviour of imap4d when fetching non-existing UIDs, introduced in -3 (closes: #317842, #312245). * Move security patch of -4sarge1 to debian/patches/06_CAN-2005-2878. stable/main/binary-mips/libmailutils0-dev_0.6.1-4sarge2_mips.deb stable/main/binary-mips/mailutils-comsatd_0.6.1-4sarge2_mips.deb stable/main/binary-mips/mailutils-imap4d_0.6.1-4sarge2_mips.deb stable/main/binary-mips/libmailutils0_0.6.1-4sarge2_mips.deb stable/main/binary-mips/mailutils_0.6.1-4sarge2_mips.deb stable/main/binary-mips/mailutils-pop3d_0.6.1-4sarge2_mips.deb stable/main/binary-mips/mailutils-mh_0.6.1-4sarge2_mips.deb mailutils (1:0.6.1-4sarge2) stable; urgency=high * debian/patches/05_imap4d_bad_uid.patch: modified patch from Bas Wijnen to fix the behaviour of imap4d when fetching non-existing UIDs, introduced in -3 (closes: #317842, #312245). * Move security patch of -4sarge1 to debian/patches/06_CAN-2005-2878. stable/main/binary-m68k/libmailutils0-dev_0.6.1-4sarge2_m68k.deb stable/main/binary-m68k/mailutils-imap4d_0.6.1-4sarge2_m68k.deb stable/main/binary-m68k/mailutils-pop3d_0.6.1-4sarge2_m68k.deb stable/main/binary-m68k/libmailutils0_0.6.1-4sarge2_m68k.deb stable/main/binary-m68k/mailutils_0.6.1-4sarge2_m68k.deb stable/main/binary-m68k/mailutils-mh_0.6.1-4sarge2_m68k.deb stable/main/binary-m68k/mailutils-comsatd_0.6.1-4sarge2_m68k.deb mailutils (1:0.6.1-4sarge2) stable; urgency=high * debian/patches/05_imap4d_bad_uid.patch: modified patch from Bas Wijnen to fix the behaviour of imap4d when fetching non-existing UIDs, introduced in -3 (closes: #317842, #312245). * Move security patch of -4sarge1 to debian/patches/06_CAN-2005-2878. stable/main/binary-ia64/mailutils-imap4d_0.6.1-4sarge2_ia64.deb stable/main/binary-ia64/mailutils_0.6.1-4sarge2_ia64.deb stable/main/binary-ia64/libmailutils0_0.6.1-4sarge2_ia64.deb stable/main/binary-ia64/libmailutils0-dev_0.6.1-4sarge2_ia64.deb stable/main/binary-ia64/mailutils-comsatd_0.6.1-4sarge2_ia64.deb stable/main/binary-ia64/mailutils-pop3d_0.6.1-4sarge2_ia64.deb stable/main/binary-ia64/mailutils-mh_0.6.1-4sarge2_ia64.deb mailutils (1:0.6.1-4sarge2) stable; urgency=high * debian/patches/05_imap4d_bad_uid.patch: modified patch from Bas Wijnen to fix the behaviour of imap4d when fetching non-existing UIDs, introduced in -3 (closes: #317842, #312245). * Move security patch of -4sarge1 to debian/patches/06_CAN-2005-2878. stable/main/binary-hppa/mailutils-comsatd_0.6.1-4sarge2_hppa.deb stable/main/binary-hppa/mailutils-pop3d_0.6.1-4sarge2_hppa.deb stable/main/binary-hppa/mailutils-mh_0.6.1-4sarge2_hppa.deb stable/main/binary-hppa/libmailutils0-dev_0.6.1-4sarge2_hppa.deb stable/main/binary-hppa/mailutils-imap4d_0.6.1-4sarge2_hppa.deb stable/main/binary-hppa/mailutils_0.6.1-4sarge2_hppa.deb stable/main/binary-hppa/libmailutils0_0.6.1-4sarge2_hppa.deb mailutils (1:0.6.1-4sarge2) stable; urgency=high * debian/patches/05_imap4d_bad_uid.patch: modified patch from Bas Wijnen to fix the behaviour of imap4d when fetching non-existing UIDs, introduced in -3 (closes: #317842, #312245). * Move security patch of -4sarge1 to debian/patches/06_CAN-2005-2878. stable/main/binary-arm/mailutils-mh_0.6.1-4sarge2_arm.deb stable/main/binary-arm/libmailutils0_0.6.1-4sarge2_arm.deb stable/main/binary-arm/libmailutils0-dev_0.6.1-4sarge2_arm.deb stable/main/binary-arm/mailutils-comsatd_0.6.1-4sarge2_arm.deb stable/main/binary-arm/mailutils-pop3d_0.6.1-4sarge2_arm.deb stable/main/binary-arm/mailutils_0.6.1-4sarge2_arm.deb stable/main/binary-arm/mailutils-imap4d_0.6.1-4sarge2_arm.deb mailutils (1:0.6.1-4sarge2) stable; urgency=high * debian/patches/05_imap4d_bad_uid.patch: modified patch from Bas Wijnen to fix the behaviour of imap4d when fetching non-existing UIDs, introduced in -3 (closes: #317842, #312245). * Move security patch of -4sarge1 to debian/patches/06_CAN-2005-2878. stable/main/binary-alpha/mailutils-mh_0.6.1-4sarge2_alpha.deb stable/main/binary-alpha/mailutils_0.6.1-4sarge2_alpha.deb stable/main/binary-alpha/mailutils-comsatd_0.6.1-4sarge2_alpha.deb stable/main/binary-alpha/mailutils-imap4d_0.6.1-4sarge2_alpha.deb stable/main/binary-alpha/mailutils-pop3d_0.6.1-4sarge2_alpha.deb stable/main/binary-alpha/libmailutils0-dev_0.6.1-4sarge2_alpha.deb stable/main/binary-alpha/libmailutils0_0.6.1-4sarge2_alpha.deb mailutils (1:0.6.1-4sarge2) stable; urgency=high * debian/patches/05_imap4d_bad_uid.patch: modified patch from Bas Wijnen to fix the behaviour of imap4d when fetching non-existing UIDs, introduced in -3 (closes: #317842, #312245). * Move security patch of -4sarge1 to debian/patches/06_CAN-2005-2878. stable/main/binary-i386/mailutils-mh_0.6.1-4sarge2_i386.deb stable/main/binary-i386/libmailutils0-dev_0.6.1-4sarge2_i386.deb stable/main/binary-i386/mailutils-comsatd_0.6.1-4sarge2_i386.deb stable/main/source/mailutils_0.6.1-4sarge2.dsc stable/main/binary-i386/libmailutils0_0.6.1-4sarge2_i386.deb stable/main/binary-all/mailutils-doc_0.6.1-4sarge2_all.deb stable/main/source/mailutils_0.6.1-4sarge2.diff.gz stable/main/binary-i386/mailutils-pop3d_0.6.1-4sarge2_i386.deb stable/main/binary-i386/mailutils-imap4d_0.6.1-4sarge2_i386.deb stable/main/binary-i386/mailutils_0.6.1-4sarge2_i386.deb mailutils (1:0.6.1-4sarge2) stable; urgency=high * debian/patches/05_imap4d_bad_uid.patch: modified patch from Bas Wijnen to fix the behaviour of imap4d when fetching non-existing UIDs, introduced in -3 (closes: #317842, #312245). * Move security patch of -4sarge1 to debian/patches/06_CAN-2005-2878. stable/main/binary-sparc/maildrop_1.5.3-1.1sarge1_sparc.deb maildrop (1.5.3-1.1sarge1) stable-security; urgency=high * Non-maintainer upload by the Security Team * Applied patch by Max Vozeler to fix arbitrary group mail command execution [liblock/lockmail.c, CAN-2005-2655, Bug#325135] stable/main/binary-s390/maildrop_1.5.3-1.1sarge1_s390.deb maildrop (1.5.3-1.1sarge1) stable-security; urgency=high * Non-maintainer upload by the Security Team * Applied patch by Max Vozeler to fix arbitrary group mail command execution [liblock/lockmail.c, CAN-2005-2655, Bug#325135] stable/main/binary-powerpc/maildrop_1.5.3-1.1sarge1_powerpc.deb maildrop (1.5.3-1.1sarge1) stable-security; urgency=high * Non-maintainer upload by the Security Team * Applied patch by Max Vozeler to fix arbitrary group mail command execution [liblock/lockmail.c, CAN-2005-2655, Bug#325135] stable/main/binary-mipsel/maildrop_1.5.3-1.1sarge1_mipsel.deb maildrop (1.5.3-1.1sarge1) stable-security; urgency=high * Non-maintainer upload by the Security Team * Applied patch by Max Vozeler to fix arbitrary group mail command execution [liblock/lockmail.c, CAN-2005-2655, Bug#325135] stable/main/binary-mips/maildrop_1.5.3-1.1sarge1_mips.deb maildrop (1.5.3-1.1sarge1) stable-security; urgency=high * Non-maintainer upload by the Security Team * Applied patch by Max Vozeler to fix arbitrary group mail command execution [liblock/lockmail.c, CAN-2005-2655, Bug#325135] stable/main/binary-m68k/maildrop_1.5.3-1.1sarge1_m68k.deb maildrop (1.5.3-1.1sarge1) stable-security; urgency=high * Non-maintainer upload by the Security Team * Applied patch by Max Vozeler to fix arbitrary group mail command execution [liblock/lockmail.c, CAN-2005-2655, Bug#325135] stable/main/binary-ia64/maildrop_1.5.3-1.1sarge1_ia64.deb maildrop (1.5.3-1.1sarge1) stable-security; urgency=high * Non-maintainer upload by the Security Team * Applied patch by Max Vozeler to fix arbitrary group mail command execution [liblock/lockmail.c, CAN-2005-2655, Bug#325135] stable/main/binary-i386/maildrop_1.5.3-1.1sarge1_i386.deb maildrop (1.5.3-1.1sarge1) stable-security; urgency=high * Non-maintainer upload by the Security Team * Applied patch by Max Vozeler to fix arbitrary group mail command execution [liblock/lockmail.c, CAN-2005-2655, Bug#325135] stable/main/binary-arm/maildrop_1.5.3-1.1sarge1_arm.deb maildrop (1.5.3-1.1sarge1) stable-security; urgency=high * Non-maintainer upload by the Security Team * Applied patch by Max Vozeler to fix arbitrary group mail command execution [liblock/lockmail.c, CAN-2005-2655, Bug#325135] stable/main/binary-alpha/maildrop_1.5.3-1.1sarge1_alpha.deb maildrop (1.5.3-1.1sarge1) stable-security; urgency=high * Non-maintainer upload by the Security Team * Applied patch by Max Vozeler to fix arbitrary group mail command execution [liblock/lockmail.c, CAN-2005-2655, Bug#325135] stable/main/source/maildrop_1.5.3-1.1sarge1.diff.gz stable/main/binary-hppa/maildrop_1.5.3-1.1sarge1_hppa.deb stable/main/source/maildrop_1.5.3-1.1sarge1.dsc maildrop (1.5.3-1.1sarge1) stable-security; urgency=high * Non-maintainer upload by the Security Team * Applied patch by Max Vozeler to fix arbitrary group mail command execution [liblock/lockmail.c, CAN-2005-2655, Bug#325135] stable/main/binary-sparc/lynx_2.8.5-2sarge1_sparc.deb lynx (2.8.5-2sarge1) stable-security; urgency=high * Non-maintainer upload by the Security Team * Applied patch by Ulf Härnhammar to fix buffer overflow that can lead to arbitrary code execution [WWW/Library/Implementation/HTMIME.c, CAN-2005-3120] stable/main/binary-s390/lynx_2.8.5-2sarge1_s390.deb lynx (2.8.5-2sarge1) stable-security; urgency=high * Non-maintainer upload by the Security Team * Applied patch by Ulf Härnhammar to fix buffer overflow that can lead to arbitrary code execution [WWW/Library/Implementation/HTMIME.c, CAN-2005-3120] stable/main/binary-mipsel/lynx_2.8.5-2sarge1_mipsel.deb lynx (2.8.5-2sarge1) stable-security; urgency=high * Non-maintainer upload by the Security Team * Applied patch by Ulf Härnhammar to fix buffer overflow that can lead to arbitrary code execution [WWW/Library/Implementation/HTMIME.c, CAN-2005-3120] stable/main/binary-mips/lynx_2.8.5-2sarge1_mips.deb lynx (2.8.5-2sarge1) stable-security; urgency=high * Non-maintainer upload by the Security Team * Applied patch by Ulf Härnhammar to fix buffer overflow that can lead to arbitrary code execution [WWW/Library/Implementation/HTMIME.c, CAN-2005-3120] stable/main/binary-m68k/lynx_2.8.5-2sarge1_m68k.deb lynx (2.8.5-2sarge1) stable-security; urgency=high * Non-maintainer upload by the Security Team * Applied patch by Ulf Härnhammar to fix buffer overflow that can lead to arbitrary code execution [WWW/Library/Implementation/HTMIME.c, CAN-2005-3120] stable/main/binary-ia64/lynx_2.8.5-2sarge1_ia64.deb lynx (2.8.5-2sarge1) stable-security; urgency=high * Non-maintainer upload by the Security Team * Applied patch by Ulf Härnhammar to fix buffer overflow that can lead to arbitrary code execution [WWW/Library/Implementation/HTMIME.c, CAN-2005-3120] stable/main/binary-i386/lynx_2.8.5-2sarge1_i386.deb lynx (2.8.5-2sarge1) stable-security; urgency=high * Non-maintainer upload by the Security Team * Applied patch by Ulf Härnhammar to fix buffer overflow that can lead to arbitrary code execution [WWW/Library/Implementation/HTMIME.c, CAN-2005-3120] stable/main/binary-hppa/lynx_2.8.5-2sarge1_hppa.deb lynx (2.8.5-2sarge1) stable-security; urgency=high * Non-maintainer upload by the Security Team * Applied patch by Ulf Härnhammar to fix buffer overflow that can lead to arbitrary code execution [WWW/Library/Implementation/HTMIME.c, CAN-2005-3120] stable/main/binary-arm/lynx_2.8.5-2sarge1_arm.deb lynx (2.8.5-2sarge1) stable-security; urgency=high * Non-maintainer upload by the Security Team * Applied patch by Ulf Härnhammar to fix buffer overflow that can lead to arbitrary code execution [WWW/Library/Implementation/HTMIME.c, CAN-2005-3120] stable/main/binary-alpha/lynx_2.8.5-2sarge1_alpha.deb lynx (2.8.5-2sarge1) stable-security; urgency=high * Non-maintainer upload by the Security Team * Applied patch by Ulf Härnhammar to fix buffer overflow that can lead to arbitrary code execution [WWW/Library/Implementation/HTMIME.c, CAN-2005-3120] stable/main/source/lynx_2.8.5-2sarge1.dsc stable/main/binary-powerpc/lynx_2.8.5-2sarge1_powerpc.deb stable/main/source/lynx_2.8.5-2sarge1.diff.gz lynx (2.8.5-2sarge1) stable-security; urgency=high * Non-maintainer upload by the Security Team * Applied patch by Ulf Härnhammar to fix buffer overflow that can lead to arbitrary code execution [WWW/Library/Implementation/HTMIME.c, CAN-2005-3120] stable/main/binary-sparc/loop-aes-utils_2.12p-4sarge1_sparc.deb loop-aes-utils (2.12p-4sarge1) stable-security; urgency=high * [SECURITY] CAN-2005-2876. Applied patch from 2.12r-pre1 to fix a local privilege escalation vulnerability in umount -r. stable/main/binary-s390/loop-aes-utils_2.12p-4sarge1_s390.deb loop-aes-utils (2.12p-4sarge1) stable-security; urgency=high * [SECURITY] CAN-2005-2876. Applied patch from 2.12r-pre1 to fix a local privilege escalation vulnerability in umount -r. stable/main/binary-powerpc/loop-aes-utils_2.12p-4sarge1_powerpc.deb loop-aes-utils (2.12p-4sarge1) stable-security; urgency=high * [SECURITY] CAN-2005-2876. Applied patch from 2.12r-pre1 to fix a local privilege escalation vulnerability in umount -r. stable/main/binary-mipsel/loop-aes-utils_2.12p-4sarge1_mipsel.deb loop-aes-utils (2.12p-4sarge1) stable-security; urgency=high * [SECURITY] CAN-2005-2876. Applied patch from 2.12r-pre1 to fix a local privilege escalation vulnerability in umount -r. stable/main/binary-mips/loop-aes-utils_2.12p-4sarge1_mips.deb loop-aes-utils (2.12p-4sarge1) stable-security; urgency=high * [SECURITY] CAN-2005-2876. Applied patch from 2.12r-pre1 to fix a local privilege escalation vulnerability in umount -r. stable/main/binary-m68k/loop-aes-utils_2.12p-4sarge1_m68k.deb loop-aes-utils (2.12p-4sarge1) stable-security; urgency=high * [SECURITY] CAN-2005-2876. Applied patch from 2.12r-pre1 to fix a local privilege escalation vulnerability in umount -r. stable/main/binary-ia64/loop-aes-utils_2.12p-4sarge1_ia64.deb loop-aes-utils (2.12p-4sarge1) stable-security; urgency=high * [SECURITY] CAN-2005-2876. Applied patch from 2.12r-pre1 to fix a local privilege escalation vulnerability in umount -r. stable/main/binary-hppa/loop-aes-utils_2.12p-4sarge1_hppa.deb loop-aes-utils (2.12p-4sarge1) stable-security; urgency=high * [SECURITY] CAN-2005-2876. Applied patch from 2.12r-pre1 to fix a local privilege escalation vulnerability in umount -r. stable/main/binary-arm/loop-aes-utils_2.12p-4sarge1_arm.deb loop-aes-utils (2.12p-4sarge1) stable-security; urgency=high * [SECURITY] CAN-2005-2876. Applied patch from 2.12r-pre1 to fix a local privilege escalation vulnerability in umount -r. stable/main/binary-alpha/loop-aes-utils_2.12p-4sarge1_alpha.deb loop-aes-utils (2.12p-4sarge1) stable-security; urgency=high * [SECURITY] CAN-2005-2876. Applied patch from 2.12r-pre1 to fix a local privilege escalation vulnerability in umount -r. stable/main/binary-i386/loop-aes-utils_2.12p-4sarge1_i386.deb stable/main/source/loop-aes-utils_2.12p-4sarge1.dsc stable/main/source/loop-aes-utils_2.12p-4sarge1.diff.gz loop-aes-utils (2.12p-4sarge1) stable-security; urgency=high * [SECURITY] CAN-2005-2876. Applied patch from 2.12r-pre1 to fix a local privilege escalation vulnerability in umount -r. stable/main/binary-sparc/lm-sensors_2.9.1-1sarge2_sparc.deb stable/main/binary-sparc/libsensors3_2.9.1-1sarge2_sparc.deb stable/main/binary-sparc/libsensors-dev_2.9.1-1sarge2_sparc.deb stable/main/binary-sparc/sensord_2.9.1-1sarge2_sparc.deb lm-sensors (1:2.9.1-1sarge2) stable-security; urgency=high * Non-maintainer upload by the Security Team * Applied maintainer patch to fix insecure temporary file creation [prog/pwm/pwmconfig, CAN-2005-2672], Closes: Bug#324193 stable/main/binary-s390/lm-sensors_2.9.1-1sarge2_s390.deb stable/main/binary-s390/libsensors3_2.9.1-1sarge2_s390.deb stable/main/binary-s390/sensord_2.9.1-1sarge2_s390.deb stable/main/binary-s390/libsensors-dev_2.9.1-1sarge2_s390.deb lm-sensors (1:2.9.1-1sarge2) stable-security; urgency=high * Non-maintainer upload by the Security Team * Applied maintainer patch to fix insecure temporary file creation [prog/pwm/pwmconfig, CAN-2005-2672], Closes: Bug#324193 stable/main/binary-mipsel/libsensors3_2.9.1-1sarge2_mipsel.deb stable/main/binary-mipsel/sensord_2.9.1-1sarge2_mipsel.deb stable/main/binary-mipsel/libsensors-dev_2.9.1-1sarge2_mipsel.deb stable/main/binary-mipsel/lm-sensors_2.9.1-1sarge2_mipsel.deb lm-sensors (1:2.9.1-1sarge2) stable-security; urgency=high * Non-maintainer upload by the Security Team * Applied maintainer patch to fix insecure temporary file creation [prog/pwm/pwmconfig, CAN-2005-2672], Closes: Bug#324193 stable/main/binary-mips/lm-sensors_2.9.1-1sarge2_mips.deb stable/main/binary-mips/libsensors-dev_2.9.1-1sarge2_mips.deb stable/main/binary-mips/sensord_2.9.1-1sarge2_mips.deb stable/main/binary-mips/libsensors3_2.9.1-1sarge2_mips.deb lm-sensors (1:2.9.1-1sarge2) stable-security; urgency=high * Non-maintainer upload by the Security Team * Applied maintainer patch to fix insecure temporary file creation [prog/pwm/pwmconfig, CAN-2005-2672], Closes: Bug#324193 stable/main/binary-m68k/lm-sensors_2.9.1-1sarge2_m68k.deb stable/main/binary-m68k/libsensors-dev_2.9.1-1sarge2_m68k.deb stable/main/binary-m68k/libsensors3_2.9.1-1sarge2_m68k.deb stable/main/binary-m68k/sensord_2.9.1-1sarge2_m68k.deb lm-sensors (1:2.9.1-1sarge2) stable-security; urgency=high * Non-maintainer upload by the Security Team * Applied maintainer patch to fix insecure temporary file creation [prog/pwm/pwmconfig, CAN-2005-2672], Closes: Bug#324193 stable/main/binary-ia64/libsensors3_2.9.1-1sarge2_ia64.deb stable/main/binary-ia64/sensord_2.9.1-1sarge2_ia64.deb stable/main/binary-ia64/libsensors-dev_2.9.1-1sarge2_ia64.deb stable/main/binary-ia64/lm-sensors_2.9.1-1sarge2_ia64.deb lm-sensors (1:2.9.1-1sarge2) stable-security; urgency=high * Non-maintainer upload by the Security Team * Applied maintainer patch to fix insecure temporary file creation [prog/pwm/pwmconfig, CAN-2005-2672], Closes: Bug#324193 stable/main/binary-i386/lm-sensors-2.4.27-2-686-smp_2.9.1-1sarge2_i386.deb stable/main/binary-i386/lm-sensors-2.4.27-2-586tsc_2.9.1-1sarge2_i386.deb stable/main/binary-i386/lm-sensors-2.4.27-2-386_2.9.1-1sarge2_i386.deb stable/main/binary-i386/lm-sensors-2.4.27-2-k7_2.9.1-1sarge2_i386.deb stable/main/binary-i386/libsensors3_2.9.1-1sarge2_i386.deb stable/main/binary-i386/sensord_2.9.1-1sarge2_i386.deb stable/main/binary-i386/libsensors-dev_2.9.1-1sarge2_i386.deb stable/main/binary-i386/lm-sensors-2.4.27-2-686_2.9.1-1sarge2_i386.deb stable/main/binary-i386/lm-sensors-2.4.27-2-k7-smp_2.9.1-1sarge2_i386.deb stable/main/binary-i386/lm-sensors_2.9.1-1sarge2_i386.deb stable/main/binary-i386/lm-sensors-2.4.27-2-k6_2.9.1-1sarge2_i386.deb lm-sensors (1:2.9.1-1sarge2) stable-security; urgency=high * Non-maintainer upload by the Security Team * Applied maintainer patch to fix insecure temporary file creation [prog/pwm/pwmconfig, CAN-2005-2672], Closes: Bug#324193 stable/main/binary-hppa/lm-sensors_2.9.1-1sarge2_hppa.deb stable/main/binary-hppa/libsensors3_2.9.1-1sarge2_hppa.deb stable/main/binary-hppa/sensord_2.9.1-1sarge2_hppa.deb stable/main/binary-hppa/libsensors-dev_2.9.1-1sarge2_hppa.deb lm-sensors (1:2.9.1-1sarge2) stable-security; urgency=high * Non-maintainer upload by the Security Team * Applied maintainer patch to fix insecure temporary file creation [prog/pwm/pwmconfig, CAN-2005-2672], Closes: Bug#324193 stable/main/binary-arm/libsensors3_2.9.1-1sarge2_arm.deb stable/main/binary-arm/lm-sensors_2.9.1-1sarge2_arm.deb stable/main/binary-arm/sensord_2.9.1-1sarge2_arm.deb stable/main/binary-arm/libsensors-dev_2.9.1-1sarge2_arm.deb lm-sensors (1:2.9.1-1sarge2) stable-security; urgency=high * Non-maintainer upload by the Security Team * Applied maintainer patch to fix insecure temporary file creation [prog/pwm/pwmconfig, CAN-2005-2672], Closes: Bug#324193 stable/main/binary-alpha/libsensors3_2.9.1-1sarge2_alpha.deb stable/main/binary-alpha/lm-sensors_2.9.1-1sarge2_alpha.deb stable/main/binary-alpha/libsensors-dev_2.9.1-1sarge2_alpha.deb stable/main/binary-alpha/sensord_2.9.1-1sarge2_alpha.deb lm-sensors (1:2.9.1-1sarge2) stable-security; urgency=high * Non-maintainer upload by the Security Team * Applied maintainer patch to fix insecure temporary file creation [prog/pwm/pwmconfig, CAN-2005-2672], Closes: Bug#324193 stable/main/source/lm-sensors_2.9.1-1sarge2.diff.gz stable/main/binary-powerpc/lm-sensors_2.9.1-1sarge2_powerpc.deb stable/main/binary-powerpc/sensord_2.9.1-1sarge2_powerpc.deb stable/main/binary-all/kernel-patch-2.4-lm-sensors_2.9.1-1sarge2_all.deb stable/main/binary-all/lm-sensors-source_2.9.1-1sarge2_all.deb stable/main/binary-powerpc/libsensors3_2.9.1-1sarge2_powerpc.deb stable/main/source/lm-sensors_2.9.1-1sarge2.dsc stable/main/binary-powerpc/libsensors-dev_2.9.1-1sarge2_powerpc.deb lm-sensors (1:2.9.1-1sarge2) stable-security; urgency=high * Non-maintainer upload by the Security Team * Applied maintainer patch to fix insecure temporary file creation [prog/pwm/pwmconfig, CAN-2005-2672], Closes: Bug#324193 stable/main/binary-sparc/ftpd-ssl_0.17.18+0.3-3sarge1_sparc.deb linux-ftpd-ssl (0.17.18+0.3-3sarge1) stable-security; urgency=high * Non-maintainer upload by the Security Team * Applied patch by X to fix buffer overflow [ftpd/ftpd.c, CVE-2005-3524] stable/main/binary-s390/ftpd-ssl_0.17.18+0.3-3sarge1_s390.deb linux-ftpd-ssl (0.17.18+0.3-3sarge1) stable-security; urgency=high * Non-maintainer upload by the Security Team * Applied patch by X to fix buffer overflow [ftpd/ftpd.c, CVE-2005-3524] stable/main/binary-mipsel/ftpd-ssl_0.17.18+0.3-3sarge1_mipsel.deb linux-ftpd-ssl (0.17.18+0.3-3sarge1) stable-security; urgency=high * Non-maintainer upload by the Security Team * Applied patch by X to fix buffer overflow [ftpd/ftpd.c, CVE-2005-3524] stable/main/binary-mips/ftpd-ssl_0.17.18+0.3-3sarge1_mips.deb linux-ftpd-ssl (0.17.18+0.3-3sarge1) stable-security; urgency=high * Non-maintainer upload by the Security Team * Applied patch by X to fix buffer overflow [ftpd/ftpd.c, CVE-2005-3524] stable/main/binary-m68k/ftpd-ssl_0.17.18+0.3-3sarge1_m68k.deb linux-ftpd-ssl (0.17.18+0.3-3sarge1) stable-security; urgency=high * Non-maintainer upload by the Security Team * Applied patch by X to fix buffer overflow [ftpd/ftpd.c, CVE-2005-3524] stable/main/binary-ia64/ftpd-ssl_0.17.18+0.3-3sarge1_ia64.deb linux-ftpd-ssl (0.17.18+0.3-3sarge1) stable-security; urgency=high * Non-maintainer upload by the Security Team * Applied patch by X to fix buffer overflow [ftpd/ftpd.c, CVE-2005-3524] stable/main/binary-i386/ftpd-ssl_0.17.18+0.3-3sarge1_i386.deb linux-ftpd-ssl (0.17.18+0.3-3sarge1) stable-security; urgency=high * Non-maintainer upload by the Security Team * Applied patch by X to fix buffer overflow [ftpd/ftpd.c, CVE-2005-3524] stable/main/binary-hppa/ftpd-ssl_0.17.18+0.3-3sarge1_hppa.deb linux-ftpd-ssl (0.17.18+0.3-3sarge1) stable-security; urgency=high * Non-maintainer upload by the Security Team * Applied patch by X to fix buffer overflow [ftpd/ftpd.c, CVE-2005-3524] stable/main/binary-arm/ftpd-ssl_0.17.18+0.3-3sarge1_arm.deb linux-ftpd-ssl (0.17.18+0.3-3sarge1) stable-security; urgency=high * Non-maintainer upload by the Security Team * Applied patch by X to fix buffer overflow [ftpd/ftpd.c, CVE-2005-3524] stable/main/binary-alpha/ftpd-ssl_0.17.18+0.3-3sarge1_alpha.deb linux-ftpd-ssl (0.17.18+0.3-3sarge1) stable-security; urgency=high * Non-maintainer upload by the Security Team * Applied patch by X to fix buffer overflow [ftpd/ftpd.c, CVE-2005-3524] stable/main/binary-powerpc/ftpd-ssl_0.17.18+0.3-3sarge1_powerpc.deb stable/main/source/linux-ftpd-ssl_0.17.18+0.3-3sarge1.diff.gz stable/main/source/linux-ftpd-ssl_0.17.18+0.3-3sarge1.dsc linux-ftpd-ssl (0.17.18+0.3-3sarge1) stable-security; urgency=high * Non-maintainer upload by the Security Team * Applied patch by X to fix buffer overflow [ftpd/ftpd.c, CVE-2005-3524] stable/main/binary-sparc/libungif-bin_4.1.3-2sarge1_sparc.deb stable/main/binary-sparc/libungif4g_4.1.3-2sarge1_sparc.deb stable/main/binary-sparc/libungif4-dev_4.1.3-2sarge1_sparc.deb libungif4 (4.1.3-2sarge1) stable-security; urgency=high * Non-maintainer upload by the Security Team * Applied patch extracted from upstream changes to fix NULL pointer dereference [lib/dgif_lib.c, CVE-2005-2974] * Applied patch extracted from upstream changes to fix out of bounds memory access [lib/gifalloc.c, lib/dgif_lib.c, lib/egif_lib.c, CVE-2005-3350] stable/main/binary-s390/libungif4g_4.1.3-2sarge1_s390.deb stable/main/binary-s390/libungif4-dev_4.1.3-2sarge1_s390.deb stable/main/binary-s390/libungif-bin_4.1.3-2sarge1_s390.deb libungif4 (4.1.3-2sarge1) stable-security; urgency=high * Non-maintainer upload by the Security Team * Applied patch extracted from upstream changes to fix NULL pointer dereference [lib/dgif_lib.c, CVE-2005-2974] * Applied patch extracted from upstream changes to fix out of bounds memory access [lib/gifalloc.c, lib/dgif_lib.c, lib/egif_lib.c, CVE-2005-3350] stable/main/binary-mipsel/libungif-bin_4.1.3-2sarge1_mipsel.deb stable/main/binary-mipsel/libungif4-dev_4.1.3-2sarge1_mipsel.deb stable/main/binary-mipsel/libungif4g_4.1.3-2sarge1_mipsel.deb libungif4 (4.1.3-2sarge1) stable-security; urgency=high * Non-maintainer upload by the Security Team * Applied patch extracted from upstream changes to fix NULL pointer dereference [lib/dgif_lib.c, CVE-2005-2974] * Applied patch extracted from upstream changes to fix out of bounds memory access [lib/gifalloc.c, lib/dgif_lib.c, lib/egif_lib.c, CVE-2005-3350] stable/main/binary-mips/libungif4-dev_4.1.3-2sarge1_mips.deb stable/main/binary-mips/libungif-bin_4.1.3-2sarge1_mips.deb stable/main/binary-mips/libungif4g_4.1.3-2sarge1_mips.deb libungif4 (4.1.3-2sarge1) stable-security; urgency=high * Non-maintainer upload by the Security Team * Applied patch extracted from upstream changes to fix NULL pointer dereference [lib/dgif_lib.c, CVE-2005-2974] * Applied patch extracted from upstream changes to fix out of bounds memory access [lib/gifalloc.c, lib/dgif_lib.c, lib/egif_lib.c, CVE-2005-3350] stable/main/binary-m68k/libungif-bin_4.1.3-2sarge1_m68k.deb stable/main/binary-m68k/libungif4-dev_4.1.3-2sarge1_m68k.deb stable/main/binary-m68k/libungif4g_4.1.3-2sarge1_m68k.deb libungif4 (4.1.3-2sarge1) stable-security; urgency=high * Non-maintainer upload by the Security Team * Applied patch extracted from upstream changes to fix NULL pointer dereference [lib/dgif_lib.c, CVE-2005-2974] * Applied patch extracted from upstream changes to fix out of bounds memory access [lib/gifalloc.c, lib/dgif_lib.c, lib/egif_lib.c, CVE-2005-3350] stable/main/binary-ia64/libungif4g_4.1.3-2sarge1_ia64.deb stable/main/binary-ia64/libungif-bin_4.1.3-2sarge1_ia64.deb stable/main/binary-ia64/libungif4-dev_4.1.3-2sarge1_ia64.deb libungif4 (4.1.3-2sarge1) stable-security; urgency=high * Non-maintainer upload by the Security Team * Applied patch extracted from upstream changes to fix NULL pointer dereference [lib/dgif_lib.c, CVE-2005-2974] * Applied patch extracted from upstream changes to fix out of bounds memory access [lib/gifalloc.c, lib/dgif_lib.c, lib/egif_lib.c, CVE-2005-3350] stable/main/binary-i386/libungif4g_4.1.3-2sarge1_i386.deb stable/main/binary-i386/libungif-bin_4.1.3-2sarge1_i386.deb stable/main/binary-i386/libungif4-dev_4.1.3-2sarge1_i386.deb libungif4 (4.1.3-2sarge1) stable-security; urgency=high * Non-maintainer upload by the Security Team * Applied patch extracted from upstream changes to fix NULL pointer dereference [lib/dgif_lib.c, CVE-2005-2974] * Applied patch extracted from upstream changes to fix out of bounds memory access [lib/gifalloc.c, lib/dgif_lib.c, lib/egif_lib.c, CVE-2005-3350] stable/main/binary-hppa/libungif4g_4.1.3-2sarge1_hppa.deb stable/main/binary-hppa/libungif-bin_4.1.3-2sarge1_hppa.deb stable/main/binary-hppa/libungif4-dev_4.1.3-2sarge1_hppa.deb libungif4 (4.1.3-2sarge1) stable-security; urgency=high * Non-maintainer upload by the Security Team * Applied patch extracted from upstream changes to fix NULL pointer dereference [lib/dgif_lib.c, CVE-2005-2974] * Applied patch extracted from upstream changes to fix out of bounds memory access [lib/gifalloc.c, lib/dgif_lib.c, lib/egif_lib.c, CVE-2005-3350] stable/main/binary-arm/libungif4g_4.1.3-2sarge1_arm.deb stable/main/binary-arm/libungif4-dev_4.1.3-2sarge1_arm.deb stable/main/binary-arm/libungif-bin_4.1.3-2sarge1_arm.deb libungif4 (4.1.3-2sarge1) stable-security; urgency=high * Non-maintainer upload by the Security Team * Applied patch extracted from upstream changes to fix NULL pointer dereference [lib/dgif_lib.c, CVE-2005-2974] * Applied patch extracted from upstream changes to fix out of bounds memory access [lib/gifalloc.c, lib/dgif_lib.c, lib/egif_lib.c, CVE-2005-3350] stable/main/binary-alpha/libungif4g_4.1.3-2sarge1_alpha.deb stable/main/binary-alpha/libungif4-dev_4.1.3-2sarge1_alpha.deb stable/main/binary-alpha/libungif-bin_4.1.3-2sarge1_alpha.deb libungif4 (4.1.3-2sarge1) stable-security; urgency=high * Non-maintainer upload by the Security Team * Applied patch extracted from upstream changes to fix NULL pointer dereference [lib/dgif_lib.c, CVE-2005-2974] * Applied patch extracted from upstream changes to fix out of bounds memory access [lib/gifalloc.c, lib/dgif_lib.c, lib/egif_lib.c, CVE-2005-3350] stable/main/source/libungif4_4.1.3-2sarge1.dsc stable/main/binary-powerpc/libungif4-dev_4.1.3-2sarge1_powerpc.deb stable/main/binary-powerpc/libungif-bin_4.1.3-2sarge1_powerpc.deb stable/main/source/libungif4_4.1.3-2sarge1.diff.gz stable/main/binary-powerpc/libungif4g_4.1.3-2sarge1_powerpc.deb libungif4 (4.1.3-2sarge1) stable-security; urgency=high * Non-maintainer upload by the Security Team * Applied patch extracted from upstream changes to fix NULL pointer dereference [lib/dgif_lib.c, CVE-2005-2974] * Applied patch extracted from upstream changes to fix out of bounds memory access [lib/gifalloc.c, lib/dgif_lib.c, lib/egif_lib.c, CVE-2005-3350] stable/main/binary-sparc/libpam-ldap_178-1sarge1_sparc.deb libpam-ldap (178-1sarge1) stable-security; urgency=high * Non-maintainer upload by the Security Team * Applied upstream patch to fix authentication bypass [pam_ldap.c, VU#778916, CAN-2005-2641] stable/main/binary-s390/libpam-ldap_178-1sarge1_s390.deb libpam-ldap (178-1sarge1) stable-security; urgency=high * Non-maintainer upload by the Security Team * Applied upstream patch to fix authentication bypass [pam_ldap.c, VU#778916, CAN-2005-2641] stable/main/binary-powerpc/libpam-ldap_178-1sarge1_powerpc.deb libpam-ldap (178-1sarge1) stable-security; urgency=high * Non-maintainer upload by the Security Team * Applied upstream patch to fix authentication bypass [pam_ldap.c, VU#778916, CAN-2005-2641] stable/main/binary-mipsel/libpam-ldap_178-1sarge1_mipsel.deb libpam-ldap (178-1sarge1) stable-security; urgency=high * Non-maintainer upload by the Security Team * Applied upstream patch to fix authentication bypass [pam_ldap.c, VU#778916, CAN-2005-2641] stable/main/binary-mips/libpam-ldap_178-1sarge1_mips.deb libpam-ldap (178-1sarge1) stable-security; urgency=high * Non-maintainer upload by the Security Team * Applied upstream patch to fix authentication bypass [pam_ldap.c, VU#778916, CAN-2005-2641] stable/main/binary-m68k/libpam-ldap_178-1sarge1_m68k.deb libpam-ldap (178-1sarge1) stable-security; urgency=high * Non-maintainer upload by the Security Team * Applied upstream patch to fix authentication bypass [pam_ldap.c, VU#778916, CAN-2005-2641] stable/main/binary-ia64/libpam-ldap_178-1sarge1_ia64.deb libpam-ldap (178-1sarge1) stable-security; urgency=high * Non-maintainer upload by the Security Team * Applied upstream patch to fix authentication bypass [pam_ldap.c, VU#778916, CAN-2005-2641] stable/main/binary-i386/libpam-ldap_178-1sarge1_i386.deb libpam-ldap (178-1sarge1) stable-security; urgency=high * Non-maintainer upload by the Security Team * Applied upstream patch to fix authentication bypass [pam_ldap.c, VU#778916, CAN-2005-2641] stable/main/binary-arm/libpam-ldap_178-1sarge1_arm.deb libpam-ldap (178-1sarge1) stable-security; urgency=high * Non-maintainer upload by the Security Team * Applied upstream patch to fix authentication bypass [pam_ldap.c, VU#778916, CAN-2005-2641] stable/main/binary-alpha/libpam-ldap_178-1sarge1_alpha.deb libpam-ldap (178-1sarge1) stable-security; urgency=high * Non-maintainer upload by the Security Team * Applied upstream patch to fix authentication bypass [pam_ldap.c, VU#778916, CAN-2005-2641] stable/main/source/libpam-ldap_178-1sarge1.dsc stable/main/source/libpam-ldap_178-1sarge1.diff.gz stable/main/binary-hppa/libpam-ldap_178-1sarge1_hppa.deb libpam-ldap (178-1sarge1) stable-security; urgency=high * Non-maintainer upload by the Security Team * Applied upstream patch to fix authentication bypass [pam_ldap.c, VU#778916, CAN-2005-2641] stable/main/binary-sparc/libgnomeprint2.2-0_2.8.2-1.2_sparc.deb stable/main/binary-sparc/libgnomeprint2.2-dev_2.8.2-1.2_sparc.deb libgnomeprint (2.8.2-1.2) stable; urgency=low * Non-maintainer upload tagetted at stable-proposed-updates. * Fix calling of custom print commands. popen() was called with an invalid "b" flag. (Closes: #334450) [debian/patches/64_popen_without_b_flag.patch] stable/main/binary-s390/libgnomeprint2.2-dev_2.8.2-1.2_s390.deb stable/main/binary-s390/libgnomeprint2.2-0_2.8.2-1.2_s390.deb libgnomeprint (2.8.2-1.2) stable; urgency=low * Non-maintainer upload tagetted at stable-proposed-updates. * Fix calling of custom print commands. popen() was called with an invalid "b" flag. (Closes: #334450) [debian/patches/64_popen_without_b_flag.patch] stable/main/binary-powerpc/libgnomeprint2.2-0_2.8.2-1.2_powerpc.deb stable/main/binary-powerpc/libgnomeprint2.2-dev_2.8.2-1.2_powerpc.deb libgnomeprint (2.8.2-1.2) stable; urgency=low * Non-maintainer upload tagetted at stable-proposed-updates. * Fix calling of custom print commands. popen() was called with an invalid "b" flag. (Closes: #334450) [debian/patches/64_popen_without_b_flag.patch] stable/main/binary-mipsel/libgnomeprint2.2-0_2.8.2-1.2_mipsel.deb stable/main/binary-mipsel/libgnomeprint2.2-dev_2.8.2-1.2_mipsel.deb libgnomeprint (2.8.2-1.2) stable; urgency=low * Non-maintainer upload tagetted at stable-proposed-updates. * Fix calling of custom print commands. popen() was called with an invalid "b" flag. (Closes: #334450) [debian/patches/64_popen_without_b_flag.patch] stable/main/binary-mips/libgnomeprint2.2-0_2.8.2-1.2_mips.deb stable/main/binary-mips/libgnomeprint2.2-dev_2.8.2-1.2_mips.deb libgnomeprint (2.8.2-1.2) stable; urgency=low * Non-maintainer upload tagetted at stable-proposed-updates. * Fix calling of custom print commands. popen() was called with an invalid "b" flag. (Closes: #334450) [debian/patches/64_popen_without_b_flag.patch] stable/main/binary-m68k/libgnomeprint2.2-dev_2.8.2-1.2_m68k.deb stable/main/binary-m68k/libgnomeprint2.2-0_2.8.2-1.2_m68k.deb libgnomeprint (2.8.2-1.2) stable; urgency=low * Non-maintainer upload tagetted at stable-proposed-updates. * Fix calling of custom print commands. popen() was called with an invalid "b" flag. (Closes: #334450) [debian/patches/64_popen_without_b_flag.patch] stable/main/binary-ia64/libgnomeprint2.2-0_2.8.2-1.2_ia64.deb stable/main/binary-ia64/libgnomeprint2.2-dev_2.8.2-1.2_ia64.deb libgnomeprint (2.8.2-1.2) stable; urgency=low * Non-maintainer upload tagetted at stable-proposed-updates. * Fix calling of custom print commands. popen() was called with an invalid "b" flag. (Closes: #334450) [debian/patches/64_popen_without_b_flag.patch] stable/main/binary-hppa/libgnomeprint2.2-0_2.8.2-1.2_hppa.deb stable/main/binary-hppa/libgnomeprint2.2-dev_2.8.2-1.2_hppa.deb libgnomeprint (2.8.2-1.2) stable; urgency=low * Non-maintainer upload tagetted at stable-proposed-updates. * Fix calling of custom print commands. popen() was called with an invalid "b" flag. (Closes: #334450) [debian/patches/64_popen_without_b_flag.patch] stable/main/binary-arm/libgnomeprint2.2-dev_2.8.2-1.2_arm.deb stable/main/binary-arm/libgnomeprint2.2-0_2.8.2-1.2_arm.deb libgnomeprint (2.8.2-1.2) stable; urgency=low * Non-maintainer upload tagetted at stable-proposed-updates. * Fix calling of custom print commands. popen() was called with an invalid "b" flag. (Closes: #334450) [debian/patches/64_popen_without_b_flag.patch] stable/main/binary-alpha/libgnomeprint2.2-dev_2.8.2-1.2_alpha.deb stable/main/binary-alpha/libgnomeprint2.2-0_2.8.2-1.2_alpha.deb libgnomeprint (2.8.2-1.2) stable; urgency=low * Non-maintainer upload tagetted at stable-proposed-updates. * Fix calling of custom print commands. popen() was called with an invalid "b" flag. (Closes: #334450) [debian/patches/64_popen_without_b_flag.patch] stable/main/binary-all/libgnomeprint2.2-data_2.8.2-1.2_all.deb stable/main/source/libgnomeprint_2.8.2-1.2.diff.gz stable/main/source/libgnomeprint_2.8.2-1.2.dsc stable/main/binary-all/libgnomeprint2.2-doc_2.8.2-1.2_all.deb stable/main/binary-i386/libgnomeprint2.2-dev_2.8.2-1.2_i386.deb stable/main/binary-i386/libgnomeprint2.2-0_2.8.2-1.2_i386.deb libgnomeprint (2.8.2-1.2) stable; urgency=low * Non-maintainer upload tagetted at stable-proposed-updates. * Fix calling of custom print commands. popen() was called with an invalid "b" flag. (Closes: #334450) [debian/patches/64_popen_without_b_flag.patch] stable/main/binary-sparc/gda2-odbc_1.2.1-2sarge1_sparc.deb stable/main/binary-sparc/libgda2-3_1.2.1-2sarge1_sparc.deb stable/main/binary-sparc/gda2-postgres_1.2.1-2sarge1_sparc.deb stable/main/binary-sparc/gda2-sqlite_1.2.1-2sarge1_sparc.deb stable/main/binary-sparc/gda2-mysql_1.2.1-2sarge1_sparc.deb stable/main/binary-sparc/libgda2-dev_1.2.1-2sarge1_sparc.deb stable/main/binary-sparc/libgda2-3-dbg_1.2.1-2sarge1_sparc.deb stable/main/binary-sparc/libgda2-common_1.2.1-2sarge1_sparc.deb stable/main/binary-sparc/gda2-freetds_1.2.1-2sarge1_sparc.deb libgda2 (1.2.1-2sarge1) stable-security; urgency=high * Non-maintainer upload by The Security Team. * Fix potentially exploitable format string attack in logging code. [CAN-2005-2958]. stable/main/binary-s390/gda2-mysql_1.2.1-2sarge1_s390.deb stable/main/binary-s390/gda2-postgres_1.2.1-2sarge1_s390.deb stable/main/binary-s390/libgda2-3_1.2.1-2sarge1_s390.deb stable/main/binary-s390/libgda2-dev_1.2.1-2sarge1_s390.deb stable/main/binary-s390/gda2-sqlite_1.2.1-2sarge1_s390.deb stable/main/binary-s390/libgda2-common_1.2.1-2sarge1_s390.deb stable/main/binary-s390/gda2-freetds_1.2.1-2sarge1_s390.deb stable/main/binary-s390/gda2-odbc_1.2.1-2sarge1_s390.deb stable/main/binary-s390/libgda2-3-dbg_1.2.1-2sarge1_s390.deb libgda2 (1.2.1-2sarge1) stable-security; urgency=high * Non-maintainer upload by The Security Team. * Fix potentially exploitable format string attack in logging code. [CAN-2005-2958]. stable/main/binary-powerpc/libgda2-common_1.2.1-2sarge1_powerpc.deb stable/main/binary-powerpc/gda2-mysql_1.2.1-2sarge1_powerpc.deb stable/main/binary-powerpc/libgda2-dev_1.2.1-2sarge1_powerpc.deb stable/main/binary-powerpc/gda2-postgres_1.2.1-2sarge1_powerpc.deb stable/main/binary-powerpc/gda2-sqlite_1.2.1-2sarge1_powerpc.deb stable/main/binary-powerpc/libgda2-3_1.2.1-2sarge1_powerpc.deb stable/main/binary-powerpc/libgda2-3-dbg_1.2.1-2sarge1_powerpc.deb stable/main/binary-powerpc/gda2-odbc_1.2.1-2sarge1_powerpc.deb stable/main/binary-powerpc/gda2-freetds_1.2.1-2sarge1_powerpc.deb libgda2 (1.2.1-2sarge1) stable-security; urgency=high * Non-maintainer upload by The Security Team. * Fix potentially exploitable format string attack in logging code. [CAN-2005-2958]. stable/main/binary-mipsel/gda2-postgres_1.2.1-2sarge1_mipsel.deb stable/main/binary-mipsel/libgda2-common_1.2.1-2sarge1_mipsel.deb stable/main/binary-mipsel/gda2-mysql_1.2.1-2sarge1_mipsel.deb stable/main/binary-mipsel/gda2-odbc_1.2.1-2sarge1_mipsel.deb stable/main/binary-mipsel/libgda2-dev_1.2.1-2sarge1_mipsel.deb stable/main/binary-mipsel/gda2-freetds_1.2.1-2sarge1_mipsel.deb stable/main/binary-mipsel/libgda2-3_1.2.1-2sarge1_mipsel.deb stable/main/binary-mipsel/libgda2-3-dbg_1.2.1-2sarge1_mipsel.deb stable/main/binary-mipsel/gda2-sqlite_1.2.1-2sarge1_mipsel.deb libgda2 (1.2.1-2sarge1) stable-security; urgency=high * Non-maintainer upload by The Security Team. * Fix potentially exploitable format string attack in logging code. [CAN-2005-2958]. stable/main/binary-mips/gda2-postgres_1.2.1-2sarge1_mips.deb stable/main/binary-mips/libgda2-common_1.2.1-2sarge1_mips.deb stable/main/binary-mips/libgda2-3_1.2.1-2sarge1_mips.deb stable/main/binary-mips/gda2-sqlite_1.2.1-2sarge1_mips.deb stable/main/binary-mips/gda2-mysql_1.2.1-2sarge1_mips.deb stable/main/binary-mips/libgda2-3-dbg_1.2.1-2sarge1_mips.deb stable/main/binary-mips/gda2-odbc_1.2.1-2sarge1_mips.deb stable/main/binary-mips/gda2-freetds_1.2.1-2sarge1_mips.deb stable/main/binary-mips/libgda2-dev_1.2.1-2sarge1_mips.deb libgda2 (1.2.1-2sarge1) stable-security; urgency=high * Non-maintainer upload by The Security Team. * Fix potentially exploitable format string attack in logging code. [CAN-2005-2958]. stable/main/binary-m68k/gda2-odbc_1.2.1-2sarge1_m68k.deb stable/main/binary-m68k/gda2-mysql_1.2.1-2sarge1_m68k.deb stable/main/binary-m68k/gda2-sqlite_1.2.1-2sarge1_m68k.deb stable/main/binary-m68k/gda2-postgres_1.2.1-2sarge1_m68k.deb stable/main/binary-m68k/libgda2-3_1.2.1-2sarge1_m68k.deb stable/main/binary-m68k/libgda2-3-dbg_1.2.1-2sarge1_m68k.deb stable/main/binary-m68k/libgda2-common_1.2.1-2sarge1_m68k.deb stable/main/binary-m68k/gda2-freetds_1.2.1-2sarge1_m68k.deb stable/main/binary-m68k/libgda2-dev_1.2.1-2sarge1_m68k.deb libgda2 (1.2.1-2sarge1) stable-security; urgency=high * Non-maintainer upload by The Security Team. * Fix potentially exploitable format string attack in logging code. [CAN-2005-2958]. stable/main/binary-ia64/gda2-mysql_1.2.1-2sarge1_ia64.deb stable/main/binary-ia64/libgda2-3_1.2.1-2sarge1_ia64.deb stable/main/binary-ia64/gda2-sqlite_1.2.1-2sarge1_ia64.deb stable/main/binary-ia64/libgda2-common_1.2.1-2sarge1_ia64.deb stable/main/binary-ia64/libgda2-3-dbg_1.2.1-2sarge1_ia64.deb stable/main/binary-ia64/gda2-freetds_1.2.1-2sarge1_ia64.deb stable/main/binary-ia64/gda2-postgres_1.2.1-2sarge1_ia64.deb stable/main/binary-ia64/libgda2-dev_1.2.1-2sarge1_ia64.deb stable/main/binary-ia64/gda2-odbc_1.2.1-2sarge1_ia64.deb libgda2 (1.2.1-2sarge1) stable-security; urgency=high * Non-maintainer upload by The Security Team. * Fix potentially exploitable format string attack in logging code. [CAN-2005-2958]. stable/main/binary-hppa/gda2-mysql_1.2.1-2sarge1_hppa.deb stable/main/binary-hppa/gda2-freetds_1.2.1-2sarge1_hppa.deb stable/main/binary-hppa/gda2-sqlite_1.2.1-2sarge1_hppa.deb stable/main/binary-hppa/gda2-odbc_1.2.1-2sarge1_hppa.deb stable/main/binary-hppa/libgda2-3_1.2.1-2sarge1_hppa.deb stable/main/binary-hppa/gda2-postgres_1.2.1-2sarge1_hppa.deb stable/main/binary-hppa/libgda2-3-dbg_1.2.1-2sarge1_hppa.deb stable/main/binary-hppa/libgda2-common_1.2.1-2sarge1_hppa.deb stable/main/binary-hppa/libgda2-dev_1.2.1-2sarge1_hppa.deb libgda2 (1.2.1-2sarge1) stable-security; urgency=high * Non-maintainer upload by The Security Team. * Fix potentially exploitable format string attack in logging code. [CAN-2005-2958]. stable/main/binary-arm/libgda2-common_1.2.1-2sarge1_arm.deb stable/main/binary-arm/gda2-freetds_1.2.1-2sarge1_arm.deb stable/main/binary-arm/gda2-mysql_1.2.1-2sarge1_arm.deb stable/main/binary-arm/gda2-odbc_1.2.1-2sarge1_arm.deb stable/main/binary-arm/gda2-sqlite_1.2.1-2sarge1_arm.deb stable/main/binary-arm/libgda2-3-dbg_1.2.1-2sarge1_arm.deb stable/main/binary-arm/libgda2-3_1.2.1-2sarge1_arm.deb stable/main/binary-arm/gda2-postgres_1.2.1-2sarge1_arm.deb stable/main/binary-arm/libgda2-dev_1.2.1-2sarge1_arm.deb libgda2 (1.2.1-2sarge1) stable-security; urgency=high * Non-maintainer upload by The Security Team. * Fix potentially exploitable format string attack in logging code. [CAN-2005-2958]. stable/main/binary-alpha/gda2-freetds_1.2.1-2sarge1_alpha.deb stable/main/binary-alpha/gda2-postgres_1.2.1-2sarge1_alpha.deb stable/main/binary-alpha/libgda2-dev_1.2.1-2sarge1_alpha.deb stable/main/binary-alpha/gda2-odbc_1.2.1-2sarge1_alpha.deb stable/main/binary-alpha/gda2-sqlite_1.2.1-2sarge1_alpha.deb stable/main/binary-alpha/libgda2-3_1.2.1-2sarge1_alpha.deb stable/main/binary-alpha/libgda2-common_1.2.1-2sarge1_alpha.deb stable/main/binary-alpha/gda2-mysql_1.2.1-2sarge1_alpha.deb stable/main/binary-alpha/libgda2-3-dbg_1.2.1-2sarge1_alpha.deb libgda2 (1.2.1-2sarge1) stable-security; urgency=high * Non-maintainer upload by The Security Team. * Fix potentially exploitable format string attack in logging code. [CAN-2005-2958]. stable/main/binary-i386/libgda2-dev_1.2.1-2sarge1_i386.deb stable/main/binary-i386/libgda2-common_1.2.1-2sarge1_i386.deb stable/main/binary-i386/libgda2-3-dbg_1.2.1-2sarge1_i386.deb stable/main/binary-all/libgda2-doc_1.2.1-2sarge1_all.deb stable/main/binary-i386/gda2-freetds_1.2.1-2sarge1_i386.deb stable/main/source/libgda2_1.2.1-2sarge1.diff.gz stable/main/binary-i386/gda2-sqlite_1.2.1-2sarge1_i386.deb stable/main/binary-i386/libgda2-3_1.2.1-2sarge1_i386.deb stable/main/source/libgda2_1.2.1-2sarge1.dsc stable/main/binary-i386/gda2-mysql_1.2.1-2sarge1_i386.deb stable/main/binary-i386/gda2-postgres_1.2.1-2sarge1_i386.deb stable/main/binary-i386/gda2-odbc_1.2.1-2sarge1_i386.deb libgda2 (1.2.1-2sarge1) stable-security; urgency=high * Non-maintainer upload by The Security Team. * Fix potentially exploitable format string attack in logging code. [CAN-2005-2958]. stable/main/source/libapache-mod-ssl_2.8.22-1sarge1.dsc stable/main/binary-all/libapache-mod-ssl-doc_2.8.22-1sarge1_all.deb stable/main/binary-i386/libapache-mod-ssl_2.8.22-1sarge1_i386.deb stable/main/source/libapache-mod-ssl_2.8.22-1sarge1.diff.gz libapache-mod-ssl (2.8.22-1sarge1) stable-security; urgency=high * Backported patch for security fix (CAN-2005-2700). stable/main/binary-sparc/krb5-clients_1.3.6-2sarge2_sparc.deb stable/main/binary-sparc/libkrb53_1.3.6-2sarge2_sparc.deb stable/main/binary-sparc/krb5-kdc_1.3.6-2sarge2_sparc.deb stable/main/binary-sparc/krb5-user_1.3.6-2sarge2_sparc.deb stable/main/binary-sparc/krb5-rsh-server_1.3.6-2sarge2_sparc.deb stable/main/binary-sparc/libkadm55_1.3.6-2sarge2_sparc.deb stable/main/binary-sparc/libkrb5-dev_1.3.6-2sarge2_sparc.deb stable/main/binary-sparc/krb5-telnetd_1.3.6-2sarge2_sparc.deb stable/main/binary-sparc/krb5-ftpd_1.3.6-2sarge2_sparc.deb stable/main/binary-sparc/krb5-admin-server_1.3.6-2sarge2_sparc.deb krb5 (1.3.6-2sarge2) stable-security; urgency=high * Fix double free in krb5_recvauth; critical because it is in the code path for kpropd and may allow arbitrary code execution. (can-2005-1689) * krb5_unparse_name overflows allocated storage by one byte on 0 element principal name (CAN-2005-1175, VU#885830) * Do not free unallocated storage in the KDC's TCP request handling path (CAN-2005-1174, VU#259798) stable/main/binary-s390/libkrb53_1.3.6-2sarge2_s390.deb stable/main/binary-s390/krb5-rsh-server_1.3.6-2sarge2_s390.deb stable/main/binary-s390/krb5-admin-server_1.3.6-2sarge2_s390.deb stable/main/binary-s390/krb5-clients_1.3.6-2sarge2_s390.deb stable/main/binary-s390/krb5-telnetd_1.3.6-2sarge2_s390.deb stable/main/binary-s390/krb5-kdc_1.3.6-2sarge2_s390.deb stable/main/binary-s390/krb5-user_1.3.6-2sarge2_s390.deb stable/main/binary-s390/krb5-ftpd_1.3.6-2sarge2_s390.deb stable/main/binary-s390/libkrb5-dev_1.3.6-2sarge2_s390.deb stable/main/binary-s390/libkadm55_1.3.6-2sarge2_s390.deb krb5 (1.3.6-2sarge2) stable-security; urgency=high * Fix double free in krb5_recvauth; critical because it is in the code path for kpropd and may allow arbitrary code execution. (can-2005-1689) * krb5_unparse_name overflows allocated storage by one byte on 0 element principal name (CAN-2005-1175, VU#885830) * Do not free unallocated storage in the KDC's TCP request handling path (CAN-2005-1174, VU#259798) stable/main/binary-mipsel/krb5-user_1.3.6-2sarge2_mipsel.deb stable/main/binary-mipsel/krb5-clients_1.3.6-2sarge2_mipsel.deb stable/main/binary-mipsel/krb5-rsh-server_1.3.6-2sarge2_mipsel.deb stable/main/binary-mipsel/krb5-telnetd_1.3.6-2sarge2_mipsel.deb stable/main/binary-mipsel/krb5-ftpd_1.3.6-2sarge2_mipsel.deb stable/main/binary-mipsel/krb5-admin-server_1.3.6-2sarge2_mipsel.deb stable/main/binary-mipsel/libkrb53_1.3.6-2sarge2_mipsel.deb stable/main/binary-mipsel/krb5-kdc_1.3.6-2sarge2_mipsel.deb stable/main/binary-mipsel/libkrb5-dev_1.3.6-2sarge2_mipsel.deb stable/main/binary-mipsel/libkadm55_1.3.6-2sarge2_mipsel.deb krb5 (1.3.6-2sarge2) stable-security; urgency=high * Fix double free in krb5_recvauth; critical because it is in the code path for kpropd and may allow arbitrary code execution. (can-2005-1689) * krb5_unparse_name overflows allocated storage by one byte on 0 element principal name (CAN-2005-1175, VU#885830) * Do not free unallocated storage in the KDC's TCP request handling path (CAN-2005-1174, VU#259798) stable/main/binary-mips/libkadm55_1.3.6-2sarge2_mips.deb stable/main/binary-mips/krb5-ftpd_1.3.6-2sarge2_mips.deb stable/main/binary-mips/libkrb5-dev_1.3.6-2sarge2_mips.deb stable/main/binary-mips/krb5-kdc_1.3.6-2sarge2_mips.deb stable/main/binary-mips/libkrb53_1.3.6-2sarge2_mips.deb stable/main/binary-mips/krb5-rsh-server_1.3.6-2sarge2_mips.deb stable/main/binary-mips/krb5-user_1.3.6-2sarge2_mips.deb stable/main/binary-mips/krb5-telnetd_1.3.6-2sarge2_mips.deb stable/main/binary-mips/krb5-clients_1.3.6-2sarge2_mips.deb stable/main/binary-mips/krb5-admin-server_1.3.6-2sarge2_mips.deb krb5 (1.3.6-2sarge2) stable-security; urgency=high * Fix double free in krb5_recvauth; critical because it is in the code path for kpropd and may allow arbitrary code execution. (can-2005-1689) * krb5_unparse_name overflows allocated storage by one byte on 0 element principal name (CAN-2005-1175, VU#885830) * Do not free unallocated storage in the KDC's TCP request handling path (CAN-2005-1174, VU#259798) stable/main/binary-m68k/libkrb5-dev_1.3.6-2sarge2_m68k.deb stable/main/binary-m68k/krb5-ftpd_1.3.6-2sarge2_m68k.deb stable/main/binary-m68k/krb5-admin-server_1.3.6-2sarge2_m68k.deb stable/main/binary-m68k/krb5-kdc_1.3.6-2sarge2_m68k.deb stable/main/binary-m68k/krb5-rsh-server_1.3.6-2sarge2_m68k.deb stable/main/binary-m68k/krb5-clients_1.3.6-2sarge2_m68k.deb stable/main/binary-m68k/libkadm55_1.3.6-2sarge2_m68k.deb stable/main/binary-m68k/krb5-telnetd_1.3.6-2sarge2_m68k.deb stable/main/binary-m68k/libkrb53_1.3.6-2sarge2_m68k.deb stable/main/binary-m68k/krb5-user_1.3.6-2sarge2_m68k.deb krb5 (1.3.6-2sarge2) stable-security; urgency=high * Fix double free in krb5_recvauth; critical because it is in the code path for kpropd and may allow arbitrary code execution. (can-2005-1689) * krb5_unparse_name overflows allocated storage by one byte on 0 element principal name (CAN-2005-1175, VU#885830) * Do not free unallocated storage in the KDC's TCP request handling path (CAN-2005-1174, VU#259798) stable/main/binary-ia64/krb5-ftpd_1.3.6-2sarge2_ia64.deb stable/main/binary-ia64/krb5-rsh-server_1.3.6-2sarge2_ia64.deb stable/main/binary-ia64/libkrb53_1.3.6-2sarge2_ia64.deb stable/main/binary-ia64/krb5-telnetd_1.3.6-2sarge2_ia64.deb stable/main/binary-ia64/krb5-admin-server_1.3.6-2sarge2_ia64.deb stable/main/binary-ia64/krb5-clients_1.3.6-2sarge2_ia64.deb stable/main/binary-ia64/krb5-kdc_1.3.6-2sarge2_ia64.deb stable/main/binary-ia64/libkadm55_1.3.6-2sarge2_ia64.deb stable/main/binary-ia64/libkrb5-dev_1.3.6-2sarge2_ia64.deb stable/main/binary-ia64/krb5-user_1.3.6-2sarge2_ia64.deb krb5 (1.3.6-2sarge2) stable-security; urgency=high * Fix double free in krb5_recvauth; critical because it is in the code path for kpropd and may allow arbitrary code execution. (can-2005-1689) * krb5_unparse_name overflows allocated storage by one byte on 0 element principal name (CAN-2005-1175, VU#885830) * Do not free unallocated storage in the KDC's TCP request handling path (CAN-2005-1174, VU#259798) stable/main/binary-i386/krb5-kdc_1.3.6-2sarge2_i386.deb stable/main/binary-i386/libkrb53_1.3.6-2sarge2_i386.deb stable/main/binary-i386/krb5-user_1.3.6-2sarge2_i386.deb stable/main/binary-i386/libkadm55_1.3.6-2sarge2_i386.deb stable/main/binary-i386/libkrb5-dev_1.3.6-2sarge2_i386.deb stable/main/binary-i386/krb5-ftpd_1.3.6-2sarge2_i386.deb stable/main/binary-i386/krb5-rsh-server_1.3.6-2sarge2_i386.deb stable/main/binary-i386/krb5-admin-server_1.3.6-2sarge2_i386.deb stable/main/binary-i386/krb5-telnetd_1.3.6-2sarge2_i386.deb stable/main/binary-i386/krb5-clients_1.3.6-2sarge2_i386.deb krb5 (1.3.6-2sarge2) stable-security; urgency=high * Fix double free in krb5_recvauth; critical because it is in the code path for kpropd and may allow arbitrary code execution. (can-2005-1689) * krb5_unparse_name overflows allocated storage by one byte on 0 element principal name (CAN-2005-1175, VU#885830) * Do not free unallocated storage in the KDC's TCP request handling path (CAN-2005-1174, VU#259798) stable/main/binary-hppa/krb5-clients_1.3.6-2sarge2_hppa.deb stable/main/binary-hppa/krb5-admin-server_1.3.6-2sarge2_hppa.deb stable/main/binary-hppa/libkrb53_1.3.6-2sarge2_hppa.deb stable/main/binary-hppa/krb5-rsh-server_1.3.6-2sarge2_hppa.deb stable/main/binary-hppa/krb5-kdc_1.3.6-2sarge2_hppa.deb stable/main/binary-hppa/krb5-ftpd_1.3.6-2sarge2_hppa.deb stable/main/binary-hppa/krb5-user_1.3.6-2sarge2_hppa.deb stable/main/binary-hppa/libkadm55_1.3.6-2sarge2_hppa.deb stable/main/binary-hppa/libkrb5-dev_1.3.6-2sarge2_hppa.deb stable/main/binary-hppa/krb5-telnetd_1.3.6-2sarge2_hppa.deb krb5 (1.3.6-2sarge2) stable-security; urgency=high * Fix double free in krb5_recvauth; critical because it is in the code path for kpropd and may allow arbitrary code execution. (can-2005-1689) * krb5_unparse_name overflows allocated storage by one byte on 0 element principal name (CAN-2005-1175, VU#885830) * Do not free unallocated storage in the KDC's TCP request handling path (CAN-2005-1174, VU#259798) stable/main/binary-arm/libkrb5-dev_1.3.6-2sarge2_arm.deb stable/main/binary-arm/krb5-rsh-server_1.3.6-2sarge2_arm.deb stable/main/binary-arm/libkrb53_1.3.6-2sarge2_arm.deb stable/main/binary-arm/krb5-user_1.3.6-2sarge2_arm.deb stable/main/binary-arm/krb5-admin-server_1.3.6-2sarge2_arm.deb stable/main/binary-arm/krb5-clients_1.3.6-2sarge2_arm.deb stable/main/binary-arm/krb5-telnetd_1.3.6-2sarge2_arm.deb stable/main/binary-arm/krb5-ftpd_1.3.6-2sarge2_arm.deb stable/main/binary-arm/libkadm55_1.3.6-2sarge2_arm.deb stable/main/binary-arm/krb5-kdc_1.3.6-2sarge2_arm.deb krb5 (1.3.6-2sarge2) stable-security; urgency=high * Fix double free in krb5_recvauth; critical because it is in the code path for kpropd and may allow arbitrary code execution. (can-2005-1689) * krb5_unparse_name overflows allocated storage by one byte on 0 element principal name (CAN-2005-1175, VU#885830) * Do not free unallocated storage in the KDC's TCP request handling path (CAN-2005-1174, VU#259798) stable/main/binary-alpha/krb5-admin-server_1.3.6-2sarge2_alpha.deb stable/main/binary-alpha/libkrb53_1.3.6-2sarge2_alpha.deb stable/main/binary-alpha/krb5-rsh-server_1.3.6-2sarge2_alpha.deb stable/main/binary-alpha/krb5-clients_1.3.6-2sarge2_alpha.deb stable/main/binary-alpha/krb5-user_1.3.6-2sarge2_alpha.deb stable/main/binary-alpha/krb5-kdc_1.3.6-2sarge2_alpha.deb stable/main/binary-alpha/krb5-ftpd_1.3.6-2sarge2_alpha.deb stable/main/binary-alpha/krb5-telnetd_1.3.6-2sarge2_alpha.deb stable/main/binary-alpha/libkrb5-dev_1.3.6-2sarge2_alpha.deb stable/main/binary-alpha/libkadm55_1.3.6-2sarge2_alpha.deb krb5 (1.3.6-2sarge2) stable-security; urgency=high * Fix double free in krb5_recvauth; critical because it is in the code path for kpropd and may allow arbitrary code execution. (can-2005-1689) * krb5_unparse_name overflows allocated storage by one byte on 0 element principal name (CAN-2005-1175, VU#885830) * Do not free unallocated storage in the KDC's TCP request handling path (CAN-2005-1174, VU#259798) stable/main/binary-powerpc/krb5-telnetd_1.3.6-2sarge2_powerpc.deb stable/main/binary-powerpc/libkrb5-dev_1.3.6-2sarge2_powerpc.deb stable/main/binary-powerpc/krb5-user_1.3.6-2sarge2_powerpc.deb stable/main/binary-powerpc/krb5-kdc_1.3.6-2sarge2_powerpc.deb stable/main/binary-powerpc/krb5-ftpd_1.3.6-2sarge2_powerpc.deb stable/main/binary-powerpc/krb5-admin-server_1.3.6-2sarge2_powerpc.deb stable/main/source/krb5_1.3.6-2sarge2.dsc stable/main/binary-powerpc/libkadm55_1.3.6-2sarge2_powerpc.deb stable/main/binary-all/krb5-doc_1.3.6-2sarge2_all.deb stable/main/binary-powerpc/krb5-clients_1.3.6-2sarge2_powerpc.deb stable/main/binary-powerpc/libkrb53_1.3.6-2sarge2_powerpc.deb stable/main/source/krb5_1.3.6-2sarge2.diff.gz stable/main/binary-powerpc/krb5-rsh-server_1.3.6-2sarge2_powerpc.deb krb5 (1.3.6-2sarge2) stable-security; urgency=high * Fix double free in krb5_recvauth; critical because it is in the code path for kpropd and may allow arbitrary code execution. (can-2005-1689) * krb5_unparse_name overflows allocated storage by one byte on 0 element principal name (CAN-2005-1175, VU#885830) * Do not free unallocated storage in the KDC's TCP request handling path (CAN-2005-1174, VU#259798) stable/main/binary-sparc/kpresenter_1.3.5-4.sarge.1_sparc.deb stable/main/binary-sparc/kchart_1.3.5-4.sarge.1_sparc.deb stable/main/binary-sparc/kformula_1.3.5-4.sarge.1_sparc.deb stable/main/binary-sparc/karbon_1.3.5-4.sarge.1_sparc.deb stable/main/binary-sparc/koshell_1.3.5-4.sarge.1_sparc.deb stable/main/binary-sparc/koffice-libs_1.3.5-4.sarge.1_sparc.deb stable/main/binary-sparc/kspread_1.3.5-4.sarge.1_sparc.deb stable/main/binary-sparc/koffice-dev_1.3.5-4.sarge.1_sparc.deb stable/main/binary-sparc/kivio_1.3.5-4.sarge.1_sparc.deb stable/main/binary-sparc/kugar_1.3.5-4.sarge.1_sparc.deb stable/main/binary-sparc/kword_1.3.5-4.sarge.1_sparc.deb koffice (1:1.3.5-4.sarge.1) stable-security; urgency=high * Security upload. * Fixes RTF import buffer overflow (CAN-2005-2971, CESA-2005-005). See http://www.kde.org/info/security/advisory-20051011-1.txt for details. filters/kword/rtf/import/rtfimport_tokenizer.{cpp,h} stable/main/binary-s390/kword_1.3.5-4.sarge.1_s390.deb stable/main/binary-s390/kspread_1.3.5-4.sarge.1_s390.deb stable/main/binary-s390/kchart_1.3.5-4.sarge.1_s390.deb stable/main/binary-s390/kivio_1.3.5-4.sarge.1_s390.deb stable/main/binary-s390/kformula_1.3.5-4.sarge.1_s390.deb stable/main/binary-s390/kpresenter_1.3.5-4.sarge.1_s390.deb stable/main/binary-s390/kugar_1.3.5-4.sarge.1_s390.deb stable/main/binary-s390/koffice-libs_1.3.5-4.sarge.1_s390.deb stable/main/binary-s390/koshell_1.3.5-4.sarge.1_s390.deb stable/main/binary-s390/koffice-dev_1.3.5-4.sarge.1_s390.deb stable/main/binary-s390/karbon_1.3.5-4.sarge.1_s390.deb koffice (1:1.3.5-4.sarge.1) stable-security; urgency=high * Security upload. * Fixes RTF import buffer overflow (CAN-2005-2971, CESA-2005-005). See http://www.kde.org/info/security/advisory-20051011-1.txt for details. filters/kword/rtf/import/rtfimport_tokenizer.{cpp,h} stable/main/binary-powerpc/kspread_1.3.5-4.sarge.1_powerpc.deb stable/main/binary-powerpc/koshell_1.3.5-4.sarge.1_powerpc.deb stable/main/binary-powerpc/koffice-dev_1.3.5-4.sarge.1_powerpc.deb stable/main/binary-powerpc/kivio_1.3.5-4.sarge.1_powerpc.deb stable/main/binary-powerpc/kugar_1.3.5-4.sarge.1_powerpc.deb stable/main/binary-powerpc/kchart_1.3.5-4.sarge.1_powerpc.deb stable/main/binary-powerpc/koffice-libs_1.3.5-4.sarge.1_powerpc.deb stable/main/binary-powerpc/kword_1.3.5-4.sarge.1_powerpc.deb stable/main/binary-powerpc/karbon_1.3.5-4.sarge.1_powerpc.deb stable/main/binary-powerpc/kformula_1.3.5-4.sarge.1_powerpc.deb stable/main/binary-powerpc/kpresenter_1.3.5-4.sarge.1_powerpc.deb koffice (1:1.3.5-4.sarge.1) stable-security; urgency=high * Security upload. * Fixes RTF import buffer overflow (CAN-2005-2971, CESA-2005-005). See http://www.kde.org/info/security/advisory-20051011-1.txt for details. filters/kword/rtf/import/rtfimport_tokenizer.{cpp,h} stable/main/binary-mipsel/kugar_1.3.5-4.sarge.1_mipsel.deb stable/main/binary-mipsel/kformula_1.3.5-4.sarge.1_mipsel.deb stable/main/binary-mipsel/kivio_1.3.5-4.sarge.1_mipsel.deb stable/main/binary-mipsel/karbon_1.3.5-4.sarge.1_mipsel.deb stable/main/binary-mipsel/kpresenter_1.3.5-4.sarge.1_mipsel.deb stable/main/binary-mipsel/kspread_1.3.5-4.sarge.1_mipsel.deb stable/main/binary-mipsel/koshell_1.3.5-4.sarge.1_mipsel.deb stable/main/binary-mipsel/koffice-libs_1.3.5-4.sarge.1_mipsel.deb stable/main/binary-mipsel/koffice-dev_1.3.5-4.sarge.1_mipsel.deb stable/main/binary-mipsel/kword_1.3.5-4.sarge.1_mipsel.deb stable/main/binary-mipsel/kchart_1.3.5-4.sarge.1_mipsel.deb koffice (1:1.3.5-4.sarge.1) stable-security; urgency=high * Security upload. * Fixes RTF import buffer overflow (CAN-2005-2971, CESA-2005-005). See http://www.kde.org/info/security/advisory-20051011-1.txt for details. filters/kword/rtf/import/rtfimport_tokenizer.{cpp,h} stable/main/binary-mips/koshell_1.3.5-4.sarge.1_mips.deb stable/main/binary-mips/kformula_1.3.5-4.sarge.1_mips.deb stable/main/binary-mips/kivio_1.3.5-4.sarge.1_mips.deb stable/main/binary-mips/koffice-dev_1.3.5-4.sarge.1_mips.deb stable/main/binary-mips/kspread_1.3.5-4.sarge.1_mips.deb stable/main/binary-mips/kword_1.3.5-4.sarge.1_mips.deb stable/main/binary-mips/karbon_1.3.5-4.sarge.1_mips.deb stable/main/binary-mips/koffice-libs_1.3.5-4.sarge.1_mips.deb stable/main/binary-mips/kchart_1.3.5-4.sarge.1_mips.deb stable/main/binary-mips/kpresenter_1.3.5-4.sarge.1_mips.deb stable/main/binary-mips/kugar_1.3.5-4.sarge.1_mips.deb koffice (1:1.3.5-4.sarge.1) stable-security; urgency=high * Security upload. * Fixes RTF import buffer overflow (CAN-2005-2971, CESA-2005-005). See http://www.kde.org/info/security/advisory-20051011-1.txt for details. filters/kword/rtf/import/rtfimport_tokenizer.{cpp,h} stable/main/binary-m68k/kivio_1.3.5-4.sarge.1_m68k.deb stable/main/binary-m68k/koshell_1.3.5-4.sarge.1_m68k.deb stable/main/binary-m68k/kspread_1.3.5-4.sarge.1_m68k.deb stable/main/binary-m68k/karbon_1.3.5-4.sarge.1_m68k.deb stable/main/binary-m68k/koffice-dev_1.3.5-4.sarge.1_m68k.deb stable/main/binary-m68k/kugar_1.3.5-4.sarge.1_m68k.deb stable/main/binary-m68k/kformula_1.3.5-4.sarge.1_m68k.deb stable/main/binary-m68k/koffice-libs_1.3.5-4.sarge.1_m68k.deb stable/main/binary-m68k/kpresenter_1.3.5-4.sarge.1_m68k.deb stable/main/binary-m68k/kword_1.3.5-4.sarge.1_m68k.deb stable/main/binary-m68k/kchart_1.3.5-4.sarge.1_m68k.deb koffice (1:1.3.5-4.sarge.1) stable-security; urgency=high * Security upload. * Fixes RTF import buffer overflow (CAN-2005-2971, CESA-2005-005). See http://www.kde.org/info/security/advisory-20051011-1.txt for details. filters/kword/rtf/import/rtfimport_tokenizer.{cpp,h} stable/main/binary-ia64/kspread_1.3.5-4.sarge.1_ia64.deb stable/main/binary-ia64/koffice-libs_1.3.5-4.sarge.1_ia64.deb stable/main/binary-ia64/koffice-dev_1.3.5-4.sarge.1_ia64.deb stable/main/binary-ia64/kivio_1.3.5-4.sarge.1_ia64.deb stable/main/binary-ia64/kugar_1.3.5-4.sarge.1_ia64.deb stable/main/binary-ia64/kword_1.3.5-4.sarge.1_ia64.deb stable/main/binary-ia64/kpresenter_1.3.5-4.sarge.1_ia64.deb stable/main/binary-ia64/kchart_1.3.5-4.sarge.1_ia64.deb stable/main/binary-ia64/kformula_1.3.5-4.sarge.1_ia64.deb stable/main/binary-ia64/karbon_1.3.5-4.sarge.1_ia64.deb stable/main/binary-ia64/koshell_1.3.5-4.sarge.1_ia64.deb koffice (1:1.3.5-4.sarge.1) stable-security; urgency=high * Security upload. * Fixes RTF import buffer overflow (CAN-2005-2971, CESA-2005-005). See http://www.kde.org/info/security/advisory-20051011-1.txt for details. filters/kword/rtf/import/rtfimport_tokenizer.{cpp,h} stable/main/binary-hppa/karbon_1.3.5-4.sarge.1_hppa.deb stable/main/binary-hppa/koshell_1.3.5-4.sarge.1_hppa.deb stable/main/binary-hppa/kspread_1.3.5-4.sarge.1_hppa.deb stable/main/binary-hppa/kivio_1.3.5-4.sarge.1_hppa.deb stable/main/binary-hppa/kpresenter_1.3.5-4.sarge.1_hppa.deb stable/main/binary-hppa/koffice-libs_1.3.5-4.sarge.1_hppa.deb stable/main/binary-hppa/kformula_1.3.5-4.sarge.1_hppa.deb stable/main/binary-hppa/kword_1.3.5-4.sarge.1_hppa.deb stable/main/binary-hppa/kugar_1.3.5-4.sarge.1_hppa.deb stable/main/binary-hppa/koffice-dev_1.3.5-4.sarge.1_hppa.deb stable/main/binary-hppa/kchart_1.3.5-4.sarge.1_hppa.deb koffice (1:1.3.5-4.sarge.1) stable-security; urgency=high * Security upload. * Fixes RTF import buffer overflow (CAN-2005-2971, CESA-2005-005). See http://www.kde.org/info/security/advisory-20051011-1.txt for details. filters/kword/rtf/import/rtfimport_tokenizer.{cpp,h} stable/main/binary-arm/koffice-dev_1.3.5-4.sarge.1_arm.deb stable/main/binary-arm/karbon_1.3.5-4.sarge.1_arm.deb stable/main/binary-arm/kivio_1.3.5-4.sarge.1_arm.deb stable/main/binary-arm/kugar_1.3.5-4.sarge.1_arm.deb stable/main/binary-arm/kpresenter_1.3.5-4.sarge.1_arm.deb stable/main/binary-arm/kspread_1.3.5-4.sarge.1_arm.deb stable/main/binary-arm/kformula_1.3.5-4.sarge.1_arm.deb stable/main/binary-arm/kchart_1.3.5-4.sarge.1_arm.deb stable/main/binary-arm/kword_1.3.5-4.sarge.1_arm.deb stable/main/binary-arm/koshell_1.3.5-4.sarge.1_arm.deb stable/main/binary-arm/koffice-libs_1.3.5-4.sarge.1_arm.deb koffice (1:1.3.5-4.sarge.1) stable-security; urgency=high * Security upload. * Fixes RTF import buffer overflow (CAN-2005-2971, CESA-2005-005). See http://www.kde.org/info/security/advisory-20051011-1.txt for details. filters/kword/rtf/import/rtfimport_tokenizer.{cpp,h} stable/main/binary-alpha/kword_1.3.5-4.sarge.1_alpha.deb stable/main/binary-alpha/karbon_1.3.5-4.sarge.1_alpha.deb stable/main/binary-alpha/kformula_1.3.5-4.sarge.1_alpha.deb stable/main/binary-alpha/koshell_1.3.5-4.sarge.1_alpha.deb stable/main/binary-alpha/kpresenter_1.3.5-4.sarge.1_alpha.deb stable/main/binary-alpha/kivio_1.3.5-4.sarge.1_alpha.deb stable/main/binary-alpha/koffice-libs_1.3.5-4.sarge.1_alpha.deb stable/main/binary-alpha/kugar_1.3.5-4.sarge.1_alpha.deb stable/main/binary-alpha/kchart_1.3.5-4.sarge.1_alpha.deb stable/main/binary-alpha/kspread_1.3.5-4.sarge.1_alpha.deb stable/main/binary-alpha/koffice-dev_1.3.5-4.sarge.1_alpha.deb koffice (1:1.3.5-4.sarge.1) stable-security; urgency=high * Security upload. * Fixes RTF import buffer overflow (CAN-2005-2971, CESA-2005-005). See http://www.kde.org/info/security/advisory-20051011-1.txt for details. filters/kword/rtf/import/rtfimport_tokenizer.{cpp,h} stable/main/binary-i386/koffice-dev_1.3.5-4.sarge.1_i386.deb stable/main/source/koffice_1.3.5-4.sarge.1.dsc stable/main/binary-all/koffice-doc-html_1.3.5-4.sarge.1_all.deb stable/main/binary-i386/kchart_1.3.5-4.sarge.1_i386.deb stable/main/binary-all/koffice_1.3.5-4.sarge.1_all.deb stable/main/binary-i386/kformula_1.3.5-4.sarge.1_i386.deb stable/main/source/koffice_1.3.5-4.sarge.1.diff.gz stable/main/binary-i386/kpresenter_1.3.5-4.sarge.1_i386.deb stable/main/binary-i386/kspread_1.3.5-4.sarge.1_i386.deb stable/main/binary-i386/karbon_1.3.5-4.sarge.1_i386.deb stable/main/binary-all/kivio-data_1.3.5-4.sarge.1_all.deb stable/main/binary-all/koffice-data_1.3.5-4.sarge.1_all.deb stable/main/binary-i386/kugar_1.3.5-4.sarge.1_i386.deb stable/main/binary-i386/koffice-libs_1.3.5-4.sarge.1_i386.deb stable/main/binary-i386/koshell_1.3.5-4.sarge.1_i386.deb stable/main/binary-i386/kivio_1.3.5-4.sarge.1_i386.deb stable/main/binary-i386/kword_1.3.5-4.sarge.1_i386.deb koffice (1:1.3.5-4.sarge.1) stable-security; urgency=high * Security upload. * Fixes RTF import buffer overflow (CAN-2005-2971, CESA-2005-005). See http://www.kde.org/info/security/advisory-20051011-1.txt for details. filters/kword/rtf/import/rtfimport_tokenizer.{cpp,h} stable/main/binary-sparc/kismet_2005.04.R1-1sarge1_sparc.deb kismet (2005.04.R1-1sarge1) stable-security; urgency=high * Non-maintainer upload by the Security Team * Backported upstream patch to fix the handling of unprintable characters [packet.h, packet.cc, CAN-2005-2626] * Backported upstream patch to fix buffer underflows that could lead to heap corruption [pcapsource.cc, packet.cc, CAN-2005-2627] stable/main/binary-s390/kismet_2005.04.R1-1sarge1_s390.deb kismet (2005.04.R1-1sarge1) stable-security; urgency=high * Non-maintainer upload by the Security Team * Backported upstream patch to fix the handling of unprintable characters [packet.h, packet.cc, CAN-2005-2626] * Backported upstream patch to fix buffer underflows that could lead to heap corruption [pcapsource.cc, packet.cc, CAN-2005-2627] stable/main/binary-powerpc/kismet_2005.04.R1-1sarge1_powerpc.deb kismet (2005.04.R1-1sarge1) stable-security; urgency=high * Non-maintainer upload by the Security Team * Backported upstream patch to fix the handling of unprintable characters [packet.h, packet.cc, CAN-2005-2626] * Backported upstream patch to fix buffer underflows that could lead to heap corruption [pcapsource.cc, packet.cc, CAN-2005-2627] stable/main/binary-mipsel/kismet_2005.04.R1-1sarge1_mipsel.deb kismet (2005.04.R1-1sarge1) stable-security; urgency=high * Non-maintainer upload by the Security Team * Backported upstream patch to fix the handling of unprintable characters [packet.h, packet.cc, CAN-2005-2626] * Backported upstream patch to fix buffer underflows that could lead to heap corruption [pcapsource.cc, packet.cc, CAN-2005-2627] stable/main/binary-mips/kismet_2005.04.R1-1sarge1_mips.deb kismet (2005.04.R1-1sarge1) stable-security; urgency=high * Non-maintainer upload by the Security Team * Backported upstream patch to fix the handling of unprintable characters [packet.h, packet.cc, CAN-2005-2626] * Backported upstream patch to fix buffer underflows that could lead to heap corruption [pcapsource.cc, packet.cc, CAN-2005-2627] stable/main/binary-m68k/kismet_2005.04.R1-1sarge1_m68k.deb kismet (2005.04.R1-1sarge1) stable-security; urgency=high * Non-maintainer upload by the Security Team * Backported upstream patch to fix the handling of unprintable characters [packet.h, packet.cc, CAN-2005-2626] * Backported upstream patch to fix buffer underflows that could lead to heap corruption [pcapsource.cc, packet.cc, CAN-2005-2627] stable/main/binary-ia64/kismet_2005.04.R1-1sarge1_ia64.deb kismet (2005.04.R1-1sarge1) stable-security; urgency=high * Non-maintainer upload by the Security Team * Backported upstream patch to fix the handling of unprintable characters [packet.h, packet.cc, CAN-2005-2626] * Backported upstream patch to fix buffer underflows that could lead to heap corruption [pcapsource.cc, packet.cc, CAN-2005-2627] stable/main/binary-i386/kismet_2005.04.R1-1sarge1_i386.deb kismet (2005.04.R1-1sarge1) stable-security; urgency=high * Non-maintainer upload by the Security Team * Backported upstream patch to fix the handling of unprintable characters [packet.h, packet.cc, CAN-2005-2626] * Backported upstream patch to fix buffer underflows that could lead to heap corruption [pcapsource.cc, packet.cc, CAN-2005-2627] stable/main/binary-arm/kismet_2005.04.R1-1sarge1_arm.deb kismet (2005.04.R1-1sarge1) stable-security; urgency=high * Non-maintainer upload by the Security Team * Backported upstream patch to fix the handling of unprintable characters [packet.h, packet.cc, CAN-2005-2626] * Backported upstream patch to fix buffer underflows that could lead to heap corruption [pcapsource.cc, packet.cc, CAN-2005-2627] stable/main/binary-alpha/kismet_2005.04.R1-1sarge1_alpha.deb kismet (2005.04.R1-1sarge1) stable-security; urgency=high * Non-maintainer upload by the Security Team * Backported upstream patch to fix the handling of unprintable characters [packet.h, packet.cc, CAN-2005-2626] * Backported upstream patch to fix buffer underflows that could lead to heap corruption [pcapsource.cc, packet.cc, CAN-2005-2627] stable/main/source/kismet_2005.04.R1-1sarge1.dsc stable/main/binary-hppa/kismet_2005.04.R1-1sarge1_hppa.deb stable/main/source/kismet_2005.04.R1-1sarge1.diff.gz kismet (2005.04.R1-1sarge1) stable-security; urgency=high * Non-maintainer upload by the Security Team * Backported upstream patch to fix the handling of unprintable characters [packet.h, packet.cc, CAN-2005-2626] * Backported upstream patch to fix buffer underflows that could lead to heap corruption [pcapsource.cc, packet.cc, CAN-2005-2627] stable/main/binary-all/kernel-source-2.6.8_2.6.8-16sarge1_all.deb stable/main/source/kernel-source-2.6.8_2.6.8-16sarge1.dsc stable/main/binary-all/kernel-patch-debian-2.6.8_2.6.8-16sarge1_all.deb stable/main/binary-all/kernel-doc-2.6.8_2.6.8-16sarge1_all.deb stable/main/binary-all/kernel-tree-2.6.8_2.6.8-16sarge1_all.deb stable/main/source/kernel-source-2.6.8_2.6.8-16sarge1.diff.gz kernel-source-2.6.8 (2.6.8-16sarge1) stable-security; urgency=high [ Dann Frazier ] * mckinley_icache.dpatch: [Security] Fix a cache coherency bug unearthed by a new ia64 processor, codenamed Montecito. This bug causes data corruption that has manifested itself in kernel hangs and userspace crashes, and causes d-i to fail. Reference: http://www.intel.com/cd/ids/developer/asmo-na/eng/215766.htm N.B: I have marked this as security as it seems that it would be trivial to construct a user-space DoS - Simon Horman. [ Simon Horman ] # Excluded from security-only release # * drivers-net-via-rhine-wol-oops.dpatch (removed): # This patch breaks the via-rhine driver and 2.6.8 and is # completely bogus for this version of the kernel # (closes: #311357) * arch-x86_64-kernel-ptrace-boundary-check.dpatch [Security, x86_64] Don't allow accesses below register frame in ptrace See CAN-2005-1763. * arch-x86_64-kernel-ptrace-canonical-rip-1.dpatch [Security, x86_64] This works around an AMD Erratum by checking if the ptrace RIP is canonical. See CAN-2005-1762 * arch-x86_64-kernel-ptrace-canonical-rip-2.dpatch [Security, x86_64] Fix canonical checking for segment registers in ptrace See CAN-2005-0756 * arch-x86_64-kernel-smp-boot-race.dpatch [Security, x86_64] Keep interrupts disabled during smp bootup This avoids a race that breaks SMP bootup on some machines. * arch-x86_64-mm-ioremap-page-lookup.dpatch [Security, x86_64] Don't look up struct page pointer of physical address in iounmap as it may be in a memory hole not mapped in mem_map and that causes the hash lookup to go off to nirvana. # Excluded from security-only release # * drivers-media-vidio-bttv-vc100xp-detect.dpatch # Allow Leadtek WinFast VC100 XP cards to work. * fs-exec-ptrace-core-exec-race.dpatch [Security] Fix race between core dumping and exec with shared mm * fs-exec-ptrace-deadlock.dpatch [Security] Fix coredump_wait deadlock with ptracer & tracee on shared mm * fs-exec-posix-timers-leak-1.dpatch, [Security] fs-exec-posix-timers-leak-2.dpatch Make exec clean up posix timers. * fs-hfs-oops-and-leak.dpatch [Security] Fix a leak in HFS and HFS+ Fix an oops that occurs when an attempt is made to mount a non-hfs filesystem as HFS+. N.B: Marked as security as users may have mount privelages. # Excluded from security-only release # * fs-jbd-checkpoint-assertion.dpatch # Fix possible false assertion failure in log_do_checkpoint(). We might fail # to detect that we actually made a progress when cleaning up the checkpoint # lists if we don't retry after writing something to disk. * mm-mmap-range-test.dpatch [Security] Make sure get_unmapped_area sanity tests are done regardless of wheater MAP_FIXED is set or not. See CAN-2005-1265 # Excluded from security-only release # * mm-rmap-out-of-bounds-pte.dpatch # Stop try_to_unmap_cluster() passing out-of-bounds pte to pte_unmap() * net-bridge-netfilter-etables-smp-race.dpatch [Security] The patch below fixes an smp race that happens on such systems under heavy load. Excluded from security-only release * net-bridge-mangle-oops-1.dpatch, net-bridge-mangle-oops-2.dpatch Fix oops when mangling and brouting and tcpdumping packets Needed for net-bridge-forwarding-poison-1.dpatch * net-bridge-forwarding-poison-2.dpatch, net-bridge-forwarding-poison-2.dpatch: [Security] Avoid poisoning of the bridge forwarding table by frames that have been dropped by filtering. This prevents spoofed source addresses on hostile side of bridge from causing packet leakage, a small but possible security risk. # Excluded from security-only release # * net-ipv4-netfilter-ip_queue-deadlock.dpatch # Fix deadlock with ip_queue and tcp local input path. * [Security] net-rose-ndigis-verify.dpatch Verify ndigis argument of a new route. * sound-usb-usbaudio-unplug-oops.dpatch [Security] Prevent oops & dead keyboard on usb unplugging while the device is being used. * net-ipv4-ipvs-conn_tab-race.dpatch [Security] Fix race condition on ip_vs_conn_tab list modification # Excluded from security-only release # * asm-i386-mem-clobber.dpatch: # Make sure gcc doesn't reorder memory accesses in strncmp and friends on # i386. # Excluded from security-only release # * drivers-acpi-pci_irq-elcr.dpatch: # Make sure we call acpi_register_gsi() even for default PCI interrupt # assignment. That's the part that keeps track of the ELCR register, and we # want to make sure that the PCI interrupts are properly marked level/low. * asm-i386-mem-clobber.dpatch: Make sure netlink_autobind() propagates the error return from netlink_insert(). Otherwise, callers will not see the error as they should and thus try to operate on a socket with a zero pid, which is very bad. * fs-ext3-64bit-offset.dpatch [Security] Incorrect offset checks for ext3 xattr on 64 bit architectures an lead to a local DoS. See CAN-2005-0757. (see: #311164). * arch-x86_64-mm-mmap.dpatch [Security, x86_64] Compat mode program can hang kernel See CAN-2005-1765. * arch-ia64-ptrace-getregs-putregs.dpatch [Security, ia64] Fix unchecked user-memory accesses in ptrage_getregs() and ptrace_setregs. * arch-ia64-ptrace-restore_sigcontext.dpatch [Security, ia64] Fix to prevent users from using ptrace to set the pl field of the ar.rsc reginster to any value, leading to the ability to overwrite kernel memory. Note, this patch requires the arch-ia64-ptrace-getregs-putregs.dpatch patch to apply cleanly. See CAN-2005-1761. # Excluded from security-only release # * Makefile-gcc-3.3.dpatch, control # Build with gcc-3.3, as gcc-4.0, now the dedault in unstable, # fails to build this source. As this tree is primarily # intended for use with sarge, there seems little point # in putting in gcc-4.0 fixes, but at the same time, # there is some value in being able to use it with unstable. # (Closes: #323059) [ dann frazier ] * Merge in applicable fixes from 2.6.12.3 - [Security] ppc32-time_offset-misuse.dpatch # Excluded from security-only release - v4l-cx88-hue-offset-fix.dpatch # Excluded from security-only release - tty_ldisc_ref-return-null-check.dpatch * Merge in applicable fixes from 2.6.12.4 - [Security] netfilter-NAT-memory-corruption.dpatch # Excluded from security-only release - netfilter-deadlock-ip6_queue.dpatch - [Security] ipsec-array-overflow.dpatch See CAN-2005-2456 (See: #321401) (Closes: #321401) - [Security] netfilter-ip_conntrack_untracked-refcount.dpatch - [Security] sys_get_thread_area-leak.dpatch # Excluded from security-only release - rocket_c-fix-ldisc-ref-count.dpatch # Excluded from security-only release - early-vlan-fix.dpatch [ Simon Horman ] * fs_ext2_ext3_xattr-sharing.dpatch [Security] Xattr sharing bug See http://lists.debian.org/debian-kernel/2005/08/msg00238.html * vlan-mii-ioctl.dpatch [Security] MII ioctl pass through was passing the wrong device. See http://lists.osdl.org/pipermail/bridge/2004-September/000638.html See CAN-2005-2548 (Closes: #309308) * fs-sysfs-read-write-race.dpatch [Security] Fix race in sysfs_read_file() and sysfs_write_file() that can lead to a user-space DoS. See CAN-2004-2302 (Closes: #322339) * net-ipv4-netfilter-ip_recent-last_pkts.dpatch [Security] Fixes remote DoS when using ipt_recent on a 64 bit machine. (Closes: #322237) # Excluded from security-only release # * drivers-sata-promise-sataii_tx2_tx4.dpatch # Add SATAII TX2 and TX2/TX4 support to sata promise driver # (Closes: #317286) [ Frederik Schüler ] * arch-x86_64-mm-ioremap-page-lookup-fix.dpatch Add build fix for arch-x86_64-mm-ioremap-page-lookup.dpatch [ Simon Horman ] * arch-x86_64-kernel-stack-faults.dpatch arch-x86_64-nmi.dpatch arch-x86_64-private-tss.dpatch [Security, x86_64] Disable exception stack for stack faults See CAN-2005-1767 * linux-zlib-fixes.dpatch [Security] Fix security bugs in the Linux zlib implementations. See CAN-2005-2458, CAN-2005-2459 From 2.6.12.5 http://sources.redhat.com/ml/bug-gnu-utils/1999-06/msg00183.html http://bugs.gentoo.org/show_bug.cgi?id=94584 # Excluded from security-only release # * zisofs.dpatch # Check input buffer size in zisofs # From 2.6.12.5 # Excluded from security-only release # * module-per-cpu-alignment-fix.dpatch # Module per-cpu alignment cannot always be met # From 2.6.12.5 stable/main/binary-all/kernel-source-2.4.27_2.4.27-10sarge1_all.deb stable/main/source/kernel-source-2.4.27_2.4.27-10sarge1.dsc stable/main/source/kernel-source-2.4.27_2.4.27-10sarge1.diff.gz stable/main/binary-all/kernel-tree-2.4.27_2.4.27-10sarge1_all.deb stable/main/binary-all/kernel-doc-2.4.27_2.4.27-10sarge1_all.deb stable/main/binary-all/kernel-patch-debian-2.4.27_2.4.27-10sarge1_all.deb kernel-source-2.4.27 (2.4.27-10sarge1) stable-security; urgency=high [ Simon Horman ] * 184_arch-x86_64-ia32-ptrace32-oops.diff [Security, x86_64] 32 bit ltrace oops when tracing 64 bit executable http://lkml.org/lkml/2005/1/5/245 http://linux.bkbits.net:8080/linux-2.4/cset@41dd3455GwQPufrGvBJjcUOXQa3WXA == Patches from 2.4.27-11 == [ Simon Horman ] * 167_arch-ia64-x86_64_execve.diff: Race condition in the ia32 compatibility code for the execve system call See CAN-2005-1768. (closes: #319629). * 168_fs_ext3_64bit_offset.diff: Incorrect offset checks for ext3 xattr on 64 bit architectures can lead to a local DoS. See CAN-2005-0757. (closes: #311164). * 169_arch-x86_64-kernel-ptrace-canonical-rip-1.dpatch [Security, x86_64] This works around an AMD Erratum by checking if the ptrace RIP is canonical. See CAN-2005-1762 * 169_arch-x86_64-kernel-ptrace-canonical-rip-2.dpatch [Security, x86_64] Fix canonical checking for segment registers in ptrace See CAN-2005-0756 # Excluded from Security Update # * Makefile-gcc-3.3.dpatch, control # Build with gcc-3.3, as gcc-4.0, now the dedault in unstable, # fails to build this source. Upstream has stated that they # have no intention making the 2.4 kernel compile with gcc-4 # (closes: #320256, #323318) * 171_arch-ia64-x86_64-execve-overflow.diff [Security, ia64, x86_64] Fix overflow in 32bit execve See CAN-2005-1768 * 172_ppc32-time_offset-misuse.diff [ppc32] stop misusing ntps time_offset value # Excluded from Security Update # * 173_tty_ldisc_ref-return-null-check.diff # tty_ldisc_ref return null check * 174_net-ipv4-netfilter-nat-mem.diff [Security] Fix potential memory corruption in NAT code (aka memory NAT) # Excluded from Security Update # * 175-net-ipv6-netfilter-deadlock.diff # Fix deadlock in ip6_queue * 176_ipsec-array-overflow.diff [Security] Fix possible overflow of sock->sk_policy See CAN-2005-2456 (See: #321401) # Excluded from Security Update # * 177_rocket_c-fix-ldisc-ref-count.diff # Fix ldisc ref count handling in rocketport driver * 178_fs_ext2_ext3_xattr-sharing.diff [Security] Xattr sharing bug See http://lists.debian.org/debian-kernel/2005/08/msg00238.html * 179_net-ipv4-netfilter-ip_recent-last_pkts.diff [Security] Fixes remote DoS when using ipt_recent on a 64 bit machine. (See: #322237) * 181_arch-x86_64-kernel-stack-faults.diff [Security, x86_64] Disable exception stack for stack faults See CAN-2005-1767 * 182_linux-zlib-fixes.diff [Security] Fix security bugs in the Linux zlib implementations. See CAN-2005-2458, CAN-2005-2459 From 2.6.12.5 http://sources.redhat.com/ml/bug-gnu-utils/1999-06/msg00183.html http://bugs.gentoo.org/show_bug.cgi?id=94584 # Excluded from Security Update # * zisofs.dpatch # Check input buffer size in zisofs # From 2.6.12.5 stable/main/binary-powerpc/kernel-image-2.6.8-power4_2.6.8-12sarge1_powerpc.deb stable/main/binary-powerpc/kernel-build-2.6.8-power4-smp_2.6.8-12sarge1_powerpc.deb stable/main/binary-powerpc/kernel-build-2.6.8-powerpc_2.6.8-12sarge1_powerpc.deb stable/main/source/kernel-patch-powerpc-2.6.8_2.6.8-12sarge1.dsc stable/main/binary-powerpc/kernel-build-2.6.8-power3_2.6.8-12sarge1_powerpc.deb stable/main/binary-powerpc/kernel-image-2.6.8-power3_2.6.8-12sarge1_powerpc.deb stable/main/binary-powerpc/kernel-build-2.6.8-power4_2.6.8-12sarge1_powerpc.deb stable/main/binary-powerpc/kernel-image-2.6.8-powerpc-smp_2.6.8-12sarge1_powerpc.deb stable/main/binary-powerpc/kernel-image-2.6.8-powerpc_2.6.8-12sarge1_powerpc.deb stable/main/binary-powerpc/kernel-headers-2.6.8_2.6.8-12sarge1_powerpc.deb stable/main/binary-powerpc/kernel-image-2.6.8-power3-smp_2.6.8-12sarge1_powerpc.deb stable/main/binary-powerpc/kernel-image-2.6.8-power4-smp_2.6.8-12sarge1_powerpc.deb stable/main/binary-powerpc/kernel-build-2.6.8-powerpc-smp_2.6.8-12sarge1_powerpc.deb stable/main/source/kernel-patch-powerpc-2.6.8_2.6.8-12sarge1.tar.gz stable/main/binary-powerpc/kernel-build-2.6.8-power3-smp_2.6.8-12sarge1_powerpc.deb kernel-patch-powerpc-2.6.8 (2.6.8-12sarge1) stable-security; urgency=low * Build against kernel-tree-2.6.8-16sarge1 stable/main/binary-powerpc/kernel-image-2.4.27-apus_2.4.27-10sarge1_powerpc.deb stable/main/binary-powerpc/kernel-image-2.4.27-powerpc-small_2.4.27-10sarge1_powerpc.deb stable/main/binary-powerpc/kernel-patch-2.4.27-apus_2.4.27-10sarge1_powerpc.deb stable/main/binary-powerpc/kernel-image-2.4.27-powerpc-smp_2.4.27-10sarge1_powerpc.deb stable/main/binary-powerpc/kernel-build-2.4.27-nubus_2.4.27-10sarge1_powerpc.deb stable/main/binary-powerpc/kernel-build-2.4.27-powerpc_2.4.27-10sarge1_powerpc.deb stable/main/source/kernel-patch-powerpc-2.4.27_2.4.27-10sarge1.tar.gz stable/main/binary-powerpc/kernel-headers-2.4.27-nubus_2.4.27-10sarge1_powerpc.deb stable/main/binary-powerpc/kernel-build-2.4.27-powerpc-smp_2.4.27-10sarge1_powerpc.deb stable/main/binary-powerpc/kernel-build-2.4.27-apus_2.4.27-10sarge1_powerpc.deb stable/main/binary-powerpc/kernel-image-2.4.27-nubus_2.4.27-10sarge1_powerpc.deb stable/main/binary-powerpc/kernel-image-2.4.27-powerpc_2.4.27-10sarge1_powerpc.deb stable/main/binary-powerpc/kernel-build-2.4.27-powerpc-small_2.4.27-10sarge1_powerpc.deb stable/main/binary-powerpc/kernel-headers-2.4.27-apus_2.4.27-10sarge1_powerpc.deb stable/main/binary-powerpc/kernel-headers-2.4.27-powerpc_2.4.27-10sarge1_powerpc.deb stable/main/source/kernel-patch-powerpc-2.4.27_2.4.27-10sarge1.dsc stable/main/binary-powerpc/kernel-patch-2.4.27-nubus_2.4.27-10sarge1_powerpc.deb stable/main/binary-powerpc/kernel-patch-2.4.27-powerpc_2.4.27-10sarge1_powerpc.deb kernel-patch-powerpc-2.4.27 (2.4.27-10sarge1) stable-security; urgency=high ************************************************************ *** Please note, 2.6 kernels are recommended for powerpc *** ************************************************************ * Build against kernel-source 2.4.27-10sarge1 (Simon Horman) stable/main/binary-sparc/mips-tools_2.4.27-10.sarge1.040815-1_sparc.deb kernel-patch-2.4.27-mips (2.4.27-10.sarge1.040815-1) stable-security; urgency=high * Update to debian kernel source 2.4.27-10sarge1 for security fixes. See kernel source changelog for details. * Fix the fix for Cobalt PCI initialization. stable/main/binary-s390/mips-tools_2.4.27-10.sarge1.040815-1_s390.deb kernel-patch-2.4.27-mips (2.4.27-10.sarge1.040815-1) stable-security; urgency=high * Update to debian kernel source 2.4.27-10sarge1 for security fixes. See kernel source changelog for details. * Fix the fix for Cobalt PCI initialization. stable/main/binary-powerpc/mips-tools_2.4.27-10.sarge1.040815-1_powerpc.deb kernel-patch-2.4.27-mips (2.4.27-10.sarge1.040815-1) stable-security; urgency=high * Update to debian kernel source 2.4.27-10sarge1 for security fixes. See kernel source changelog for details. * Fix the fix for Cobalt PCI initialization. stable/main/binary-mipsel/mips-tools_2.4.27-10.sarge1.040815-1_mipsel.deb stable/main/binary-mipsel/kernel-image-2.4.27-r3k-kn02_2.4.27-10.sarge1.040815-1_mipsel.deb stable/main/binary-mipsel/kernel-headers-2.4.27_2.4.27-10.sarge1.040815-1_mipsel.deb stable/main/binary-mipsel/kernel-image-2.4.27-sb1-swarm-bn_2.4.27-10.sarge1.040815-1_mipsel.deb stable/main/binary-mipsel/kernel-image-2.4.27-xxs1500_2.4.27-10.sarge1.040815-1_mipsel.deb stable/main/binary-mipsel/kernel-image-2.4.27-r5k-cobalt_2.4.27-10.sarge1.040815-1_mipsel.deb stable/main/binary-mipsel/kernel-image-2.4.27-r5k-lasat_2.4.27-10.sarge1.040815-1_mipsel.deb stable/main/binary-mipsel/kernel-image-2.4.27-r4k-kn04_2.4.27-10.sarge1.040815-1_mipsel.deb kernel-patch-2.4.27-mips (2.4.27-10.sarge1.040815-1) stable-security; urgency=high * Update to debian kernel source 2.4.27-10sarge1 for security fixes. See kernel source changelog for details. * Fix the fix for Cobalt PCI initialization. stable/main/binary-m68k/mips-tools_2.4.27-10.sarge1.040815-1_m68k.deb kernel-patch-2.4.27-mips (2.4.27-10.sarge1.040815-1) stable-security; urgency=high * Update to debian kernel source 2.4.27-10sarge1 for security fixes. See kernel source changelog for details. * Fix the fix for Cobalt PCI initialization. stable/main/binary-ia64/mips-tools_2.4.27-10.sarge1.040815-1_ia64.deb kernel-patch-2.4.27-mips (2.4.27-10.sarge1.040815-1) stable-security; urgency=high * Update to debian kernel source 2.4.27-10sarge1 for security fixes. See kernel source changelog for details. * Fix the fix for Cobalt PCI initialization. stable/main/binary-i386/mips-tools_2.4.27-10.sarge1.040815-1_i386.deb kernel-patch-2.4.27-mips (2.4.27-10.sarge1.040815-1) stable-security; urgency=high * Update to debian kernel source 2.4.27-10sarge1 for security fixes. See kernel source changelog for details. * Fix the fix for Cobalt PCI initialization. stable/main/binary-hppa/mips-tools_2.4.27-10.sarge1.040815-1_hppa.deb kernel-patch-2.4.27-mips (2.4.27-10.sarge1.040815-1) stable-security; urgency=high * Update to debian kernel source 2.4.27-10sarge1 for security fixes. See kernel source changelog for details. * Fix the fix for Cobalt PCI initialization. stable/main/binary-arm/mips-tools_2.4.27-10.sarge1.040815-1_arm.deb kernel-patch-2.4.27-mips (2.4.27-10.sarge1.040815-1) stable-security; urgency=high * Update to debian kernel source 2.4.27-10sarge1 for security fixes. See kernel source changelog for details. * Fix the fix for Cobalt PCI initialization. stable/main/binary-alpha/mips-tools_2.4.27-10.sarge1.040815-1_alpha.deb kernel-patch-2.4.27-mips (2.4.27-10.sarge1.040815-1) stable-security; urgency=high * Update to debian kernel source 2.4.27-10sarge1 for security fixes. See kernel source changelog for details. * Fix the fix for Cobalt PCI initialization. stable/main/binary-mips/kernel-image-2.4.27-r4k-ip22_2.4.27-10.sarge1.040815-1_mips.deb stable/main/source/kernel-patch-2.4.27-mips_2.4.27-10.sarge1.040815-1.dsc stable/main/binary-mips/kernel-image-2.4.27-r5k-ip22_2.4.27-10.sarge1.040815-1_mips.deb stable/main/binary-mips/mips-tools_2.4.27-10.sarge1.040815-1_mips.deb stable/main/binary-mips/kernel-image-2.4.27-sb1-swarm-bn_2.4.27-10.sarge1.040815-1_mips.deb stable/main/binary-mips/kernel-headers-2.4.27_2.4.27-10.sarge1.040815-1_mips.deb stable/main/source/kernel-patch-2.4.27-mips_2.4.27-10.sarge1.040815-1.tar.gz kernel-patch-2.4.27-mips (2.4.27-10.sarge1.040815-1) stable-security; urgency=high * Update to debian kernel source 2.4.27-10sarge1 for security fixes. See kernel source changelog for details. * Fix the fix for Cobalt PCI initialization. stable/main/source/kernel-patch-2.4.27-arm_2.4.27-1sarge1.dsc stable/main/binary-all/kernel-patch-2.4.27-arm_2.4.27-1sarge1_all.deb stable/main/source/kernel-patch-2.4.27-arm_2.4.27-1sarge1.tar.gz kernel-patch-2.4.27-arm (2.4.27-1sarge1) stable-security; urgency=high * Explicitly set CC to gcc-2.95. This was the compiler used to build 2.4.27-1. kernel-image-2.4.27-arm FTBFS with the default gcc in sarge. stable/main/binary-sparc/kernel-headers-2.6.8-2-sparc64_2.6.8-15sarge1_sparc.deb stable/main/binary-sparc/kernel-headers-2.6.8-2-sparc32_2.6.8-15sarge1_sparc.deb stable/main/binary-sparc/kernel-headers-2.6.8-2-sparc64-smp_2.6.8-15sarge1_sparc.deb stable/main/source/kernel-image-2.6.8-sparc_2.6.8-15sarge1.tar.gz stable/main/source/kernel-image-2.6.8-sparc_2.6.8-15sarge1.dsc stable/main/binary-sparc/kernel-image-2.6.8-2-sparc64_2.6.8-15sarge1_sparc.deb stable/main/binary-sparc/kernel-image-2.6.8-2-sparc32_2.6.8-15sarge1_sparc.deb stable/main/binary-sparc/kernel-headers-2.6.8-2_2.6.8-15sarge1_sparc.deb stable/main/binary-sparc/kernel-image-2.6.8-2-sparc64-smp_2.6.8-15sarge1_sparc.deb stable/main/binary-sparc/kernel-build-2.6.8-2_2.6.8-15sarge1_sparc.deb kernel-image-2.6.8-sparc (2.6.8-15sarge1) stable-security; urgency=high * Rebuild against kernel-tree-2.6.8-16sarge1 (dann frazier). stable/main/binary-s390/kernel-image-2.6.8-2-s390-tape_2.6.8-5sarge1_s390.deb stable/main/binary-s390/kernel-image-2.6.8-2-s390_2.6.8-5sarge1_s390.deb stable/main/source/kernel-image-2.6.8-s390_2.6.8-5sarge1.tar.gz stable/main/source/kernel-image-2.6.8-s390_2.6.8-5sarge1.dsc stable/main/binary-s390/kernel-image-2.6.8-2-s390x_2.6.8-5sarge1_s390.deb stable/main/binary-s390/kernel-headers-2.6.8-2_2.6.8-5sarge1_s390.deb stable/main/binary-all/kernel-patch-2.6.8-s390_2.6.8-5sarge1_all.deb kernel-image-2.6.8-s390 (2.6.8-5sarge1) stable-security; urgency=high * Use kernel-tree-2.6.8-16sarge1. stable/main/source/kernel-image-2.6.8-m68k_2.6.8-4sarge1.tar.gz stable/main/binary-m68k/kernel-image-2.6.8-q40_2.6.8-4sarge1_m68k.deb stable/main/source/kernel-image-2.6.8-m68k_2.6.8-4sarge1.dsc stable/main/binary-m68k/kernel-image-2.6.8-bvme6000_2.6.8-4sarge1_m68k.deb stable/main/binary-m68k/kernel-image-2.6.8-hp_2.6.8-4sarge1_m68k.deb stable/main/binary-m68k/kernel-image-2.6.8-mvme147_2.6.8-4sarge1_m68k.deb stable/main/binary-m68k/kernel-image-2.6.8-atari_2.6.8-4sarge1_m68k.deb stable/main/binary-m68k/kernel-image-2.6.8-sun3_2.6.8-4sarge1_m68k.deb stable/main/binary-m68k/kernel-image-2.6.8-amiga_2.6.8-4sarge1_m68k.deb stable/main/binary-m68k/kernel-image-2.6.8-mac_2.6.8-4sarge1_m68k.deb stable/main/binary-m68k/kernel-image-2.6.8-mvme16x_2.6.8-4sarge1_m68k.deb kernel-image-2.6.8-m68k (2.6.8-4sarge1) stable-security; urgency=high * rebuild with kernel-tree-2.6.8 (2.6.8-16sarge1) stable/main/binary-ia64/kernel-image-2.6.8-2-itanium_2.6.8-14sarge1_ia64.deb stable/main/binary-ia64/kernel-headers-2.6.8-2-mckinley-smp_2.6.8-14sarge1_ia64.deb stable/main/binary-ia64/kernel-headers-2.6.8-2-mckinley_2.6.8-14sarge1_ia64.deb stable/main/binary-ia64/kernel-headers-2.6-mckinley_2.6.8-14sarge1_ia64.deb stable/main/binary-ia64/kernel-image-2.6.8-2-itanium-smp_2.6.8-14sarge1_ia64.deb stable/main/binary-ia64/kernel-image-2.6-itanium-smp_2.6.8-14sarge1_ia64.deb stable/main/binary-ia64/kernel-headers-2.6-itanium-smp_2.6.8-14sarge1_ia64.deb stable/main/binary-ia64/kernel-image-2.6-itanium_2.6.8-14sarge1_ia64.deb stable/main/binary-ia64/kernel-image-2.6-mckinley-smp_2.6.8-14sarge1_ia64.deb stable/main/binary-ia64/kernel-image-2.6.8-2-mckinley-smp_2.6.8-14sarge1_ia64.deb stable/main/binary-ia64/kernel-image-2.6-mckinley_2.6.8-14sarge1_ia64.deb stable/main/source/kernel-image-2.6.8-ia64_2.6.8-14sarge1.tar.gz stable/main/binary-ia64/kernel-headers-2.6-itanium_2.6.8-14sarge1_ia64.deb stable/main/binary-ia64/kernel-headers-2.6.8-2_2.6.8-14sarge1_ia64.deb stable/main/binary-ia64/kernel-headers-2.6.8-2-itanium_2.6.8-14sarge1_ia64.deb stable/main/binary-ia64/kernel-headers-2.6.8-2-itanium-smp_2.6.8-14sarge1_ia64.deb stable/main/source/kernel-image-2.6.8-ia64_2.6.8-14sarge1.dsc stable/main/binary-ia64/kernel-headers-2.6-mckinley-smp_2.6.8-14sarge1_ia64.deb stable/main/binary-ia64/kernel-image-2.6.8-2-mckinley_2.6.8-14sarge1_ia64.deb kernel-image-2.6.8-ia64 (2.6.8-14sarge1) stable-security; urgency=low * Build against kernel-tree-2.6.8-16sarge1. (dann frazier) stable/main/binary-i386/kernel-image-2.6.8-2-686-smp_2.6.8-16sarge1_i386.deb stable/main/binary-i386/kernel-image-2.6.8-2-k7-smp_2.6.8-16sarge1_i386.deb stable/main/binary-i386/kernel-headers-2.6.8-2-686-smp_2.6.8-16sarge1_i386.deb stable/main/binary-i386/kernel-image-2.6.8-2-686_2.6.8-16sarge1_i386.deb stable/main/source/kernel-image-2.6.8-i386_2.6.8-16sarge1.tar.gz stable/main/binary-i386/kernel-headers-2.6.8-2-386_2.6.8-16sarge1_i386.deb stable/main/binary-i386/kernel-headers-2.6.8-2-686_2.6.8-16sarge1_i386.deb stable/main/binary-i386/kernel-headers-2.6.8-2-k7_2.6.8-16sarge1_i386.deb stable/main/binary-i386/kernel-headers-2.6.8-2-k7-smp_2.6.8-16sarge1_i386.deb stable/main/binary-i386/kernel-image-2.6.8-2-k7_2.6.8-16sarge1_i386.deb stable/main/binary-i386/kernel-headers-2.6.8-2_2.6.8-16sarge1_i386.deb stable/main/binary-i386/kernel-image-2.6.8-2-386_2.6.8-16sarge1_i386.deb stable/main/source/kernel-image-2.6.8-i386_2.6.8-16sarge1.dsc kernel-image-2.6.8-i386 (2.6.8-16sarge1) stable-security; urgency=high * Build against kernel-tree-2.6.8-16sarge1. (Simon Horman) stable/main/binary-hppa/kernel-headers-2.6.8-2-32-smp_2.6.8-6sarge1_hppa.deb stable/main/binary-hppa/kernel-headers-2.6.8-2-64_2.6.8-6sarge1_hppa.deb stable/main/binary-hppa/kernel-headers-2.6.8-2-32_2.6.8-6sarge1_hppa.deb stable/main/binary-hppa/kernel-image-2.6.8-2-64_2.6.8-6sarge1_hppa.deb stable/main/binary-hppa/kernel-image-2.6.8-2-32_2.6.8-6sarge1_hppa.deb stable/main/binary-hppa/kernel-headers-2.6.8-2-64-smp_2.6.8-6sarge1_hppa.deb stable/main/source/kernel-image-2.6.8-hppa_2.6.8-6sarge1.tar.gz stable/main/binary-hppa/kernel-image-2.6.8-2-64-smp_2.6.8-6sarge1_hppa.deb stable/main/binary-hppa/kernel-image-2.6.8-2-32-smp_2.6.8-6sarge1_hppa.deb stable/main/binary-hppa/kernel-headers-2.6.8-2_2.6.8-6sarge1_hppa.deb stable/main/source/kernel-image-2.6.8-hppa_2.6.8-6sarge1.dsc kernel-image-2.6.8-hppa (2.6.8-6sarge1) stable-security; urgency=high * Rebuild against kernel-tree-2.6.8-16sarge1. * Change build-dep from modutils to module-init-tools, preventing a FTBFS. stable/main/binary-i386/kernel-headers-2.6.8-11-em64t-p4-smp_2.6.8-16sarge1_i386.deb stable/main/source/kernel-image-2.6.8-amd64_2.6.8-16sarge1.tar.gz stable/main/binary-i386/kernel-image-2.6.8-11-em64t-p4-smp_2.6.8-16sarge1_i386.deb stable/main/binary-i386/kernel-image-2.6.8-11-em64t-p4_2.6.8-16sarge1_i386.deb stable/main/binary-i386/kernel-headers-2.6.8-11-amd64-k8-smp_2.6.8-16sarge1_i386.deb stable/main/binary-i386/kernel-image-2.6.8-11-amd64-k8_2.6.8-16sarge1_i386.deb stable/main/binary-i386/kernel-image-2.6.8-11-amd64-generic_2.6.8-16sarge1_i386.deb stable/main/binary-i386/kernel-headers-2.6.8-11-amd64-k8_2.6.8-16sarge1_i386.deb stable/main/binary-i386/kernel-headers-2.6.8-11_2.6.8-16sarge1_i386.deb stable/main/source/kernel-image-2.6.8-amd64_2.6.8-16sarge1.dsc stable/main/binary-i386/kernel-headers-2.6.8-11-amd64-generic_2.6.8-16sarge1_i386.deb stable/main/binary-i386/kernel-headers-2.6.8-11-em64t-p4_2.6.8-16sarge1_i386.deb stable/main/binary-i386/kernel-image-2.6.8-11-amd64-k8-smp_2.6.8-16sarge1_i386.deb kernel-image-2.6.8-amd64 (2.6.8-16sarge1) stable-security; urgency=high * Rebuild against kernel-source-2.6.8 version 2.6.8-16sarge1. stable/main/source/kernel-image-2.6.8-alpha_2.6.8-16sarge1.dsc stable/main/binary-alpha/kernel-image-2.6.8-2-generic_2.6.8-16sarge1_alpha.deb stable/main/binary-alpha/kernel-image-2.6.8-2-smp_2.6.8-16sarge1_alpha.deb stable/main/source/kernel-image-2.6.8-alpha_2.6.8-16sarge1.tar.gz stable/main/binary-alpha/kernel-headers-2.6.8-2_2.6.8-16sarge1_alpha.deb stable/main/binary-alpha/kernel-headers-2.6.8-2-smp_2.6.8-16sarge1_alpha.deb stable/main/binary-alpha/kernel-headers-2.6.8-2-generic_2.6.8-16sarge1_alpha.deb kernel-image-2.6.8-alpha (2.6.8-16sarge1) stable-security; urgency=high * Built against kernel-tree 2.6.8-16sarge1. stable/main/binary-sparc/kernel-build-2.4.27-2_2.4.27-9sarge1_sparc.deb stable/main/binary-sparc/kernel-headers-2.4.27-2-sparc64_2.4.27-9sarge1_sparc.deb stable/main/binary-sparc/kernel-headers-2.4.27-2_2.4.27-9sarge1_sparc.deb stable/main/binary-sparc/kernel-headers-2.4.27-2-sparc64-smp_2.4.27-9sarge1_sparc.deb stable/main/binary-sparc/kernel-image-2.4.27-2-sparc32_2.4.27-9sarge1_sparc.deb stable/main/binary-sparc/kernel-image-2.4.27-2-sparc32-smp_2.4.27-9sarge1_sparc.deb stable/main/binary-sparc/kernel-image-2.4.27-2-sparc64-smp_2.4.27-9sarge1_sparc.deb stable/main/binary-sparc/kernel-headers-2.4.27-2-sparc32_2.4.27-9sarge1_sparc.deb stable/main/source/kernel-image-2.4.27-sparc_2.4.27-9sarge1.dsc stable/main/source/kernel-image-2.4.27-sparc_2.4.27-9sarge1.tar.gz stable/main/binary-sparc/kernel-image-2.4.27-2-sparc64_2.4.27-9sarge1_sparc.deb stable/main/binary-sparc/kernel-headers-2.4.27-2-sparc32-smp_2.4.27-9sarge1_sparc.deb kernel-image-2.4.27-sparc (2.4.27-9sarge1) stable-security; urgency=high * Build against 2.4.27-10sarge1. stable/main/binary-s390/kernel-headers-2.4.27-2_2.4.27-2sarge1_s390.deb stable/main/source/kernel-image-2.4.27-s390_2.4.27-2sarge1.dsc stable/main/binary-s390/kernel-image-2.4.27-2-s390-tape_2.4.27-2sarge1_s390.deb stable/main/source/kernel-image-2.4.27-s390_2.4.27-2sarge1.tar.gz stable/main/binary-s390/kernel-image-2.4.27-2-s390_2.4.27-2sarge1_s390.deb stable/main/binary-s390/kernel-image-2.4.27-2-s390x_2.4.27-2sarge1_s390.deb kernel-image-2.4.27-s390 (2.4.27-2sarge1) stable-security; urgency=high * Use kernel-tree-2.4.27-10sarge1. stable/main/source/kernel-image-2.4.27-m68k_2.4.27-3sarge1.dsc stable/main/binary-m68k/kernel-image-2.4.27-mvme147_2.4.27-3sarge1_m68k.deb stable/main/binary-m68k/kernel-image-2.4.27-amiga_2.4.27-3sarge1_m68k.deb stable/main/binary-m68k/kernel-image-2.4.27-mvme16x_2.4.27-3sarge1_m68k.deb stable/main/binary-m68k/kernel-image-2.4.27-q40_2.4.27-3sarge1_m68k.deb stable/main/binary-m68k/kernel-image-2.4.27-mac_2.4.27-3sarge1_m68k.deb stable/main/binary-m68k/kernel-image-2.4.27-atari_2.4.27-3sarge1_m68k.deb stable/main/source/kernel-image-2.4.27-m68k_2.4.27-3sarge1.tar.gz stable/main/binary-m68k/kernel-image-2.4.27-bvme6000_2.4.27-3sarge1_m68k.deb kernel-image-2.4.27-m68k (2.4.27-3sarge1) stable-security; urgency=high * build against kernel-source-2.4.27 (2.4.27-10sarge1) stable/main/binary-ia64/kernel-build-2.4.27-2_2.4.27-10sarge1_ia64.deb stable/main/binary-ia64/kernel-image-2.4.27-2-mckinley_2.4.27-10sarge1_ia64.deb stable/main/binary-ia64/kernel-headers-2.4.27-2-mckinley-smp_2.4.27-10sarge1_ia64.deb stable/main/binary-ia64/kernel-image-2.4.27-2-itanium-smp_2.4.27-10sarge1_ia64.deb stable/main/source/kernel-image-2.4.27-ia64_2.4.27-10sarge1.dsc stable/main/binary-ia64/kernel-headers-2.4.27-2-itanium_2.4.27-10sarge1_ia64.deb stable/main/binary-ia64/kernel-headers-2.4.27-2-mckinley_2.4.27-10sarge1_ia64.deb stable/main/binary-ia64/kernel-image-2.4-mckinley-smp_2.4.27-10sarge1_ia64.deb stable/main/binary-ia64/kernel-image-2.4-itanium-smp_2.4.27-10sarge1_ia64.deb stable/main/source/kernel-image-2.4.27-ia64_2.4.27-10sarge1.tar.gz stable/main/binary-ia64/kernel-image-2.4-mckinley_2.4.27-10sarge1_ia64.deb stable/main/binary-ia64/kernel-image-2.4.27-2-mckinley-smp_2.4.27-10sarge1_ia64.deb stable/main/binary-ia64/kernel-image-2.4-itanium_2.4.27-10sarge1_ia64.deb stable/main/binary-ia64/kernel-headers-2.4.27-2-itanium-smp_2.4.27-10sarge1_ia64.deb stable/main/binary-ia64/kernel-headers-2.4.27-2_2.4.27-10sarge1_ia64.deb stable/main/binary-ia64/kernel-image-2.4.27-2-itanium_2.4.27-10sarge1_ia64.deb kernel-image-2.4.27-ia64 (2.4.27-10sarge1) stable-security; urgency=high * Build against kernel-tree-2.4.27-10sarge1 stable/main/binary-i386/kernel-pcmcia-modules-2.4.27-2-386_2.4.27-10sarge1_i386.deb stable/main/source/kernel-image-2.4.27-i386_2.4.27-10sarge1.dsc stable/main/binary-i386/kernel-image-2.4.27-2-586tsc_2.4.27-10sarge1_i386.deb stable/main/binary-i386/kernel-pcmcia-modules-2.4.27-2-586tsc_2.4.27-10sarge1_i386.deb stable/main/binary-i386/kernel-pcmcia-modules-2.4.27-2-k7_2.4.27-10sarge1_i386.deb stable/main/binary-i386/kernel-headers-2.4.27-2-586tsc_2.4.27-10sarge1_i386.deb stable/main/binary-i386/kernel-pcmcia-modules-2.4.27-2-k7-smp_2.4.27-10sarge1_i386.deb stable/main/binary-i386/kernel-image-2.4.27-2-686_2.4.27-10sarge1_i386.deb stable/main/binary-i386/kernel-headers-2.4.27-2-386_2.4.27-10sarge1_i386.deb stable/main/binary-i386/kernel-image-2.4.27-2-386_2.4.27-10sarge1_i386.deb stable/main/binary-i386/kernel-headers-2.4.27-2-k6_2.4.27-10sarge1_i386.deb stable/main/binary-i386/kernel-image-2.4.27-2-k7-smp_2.4.27-10sarge1_i386.deb stable/main/binary-i386/kernel-image-2.4.27-2-k7_2.4.27-10sarge1_i386.deb stable/main/binary-i386/kernel-pcmcia-modules-2.4.27-2-k6_2.4.27-10sarge1_i386.deb stable/main/binary-i386/kernel-headers-2.4.27-2-686-smp_2.4.27-10sarge1_i386.deb stable/main/binary-i386/kernel-headers-2.4.27-2-686_2.4.27-10sarge1_i386.deb stable/main/binary-i386/kernel-pcmcia-modules-2.4.27-2-686-smp_2.4.27-10sarge1_i386.deb stable/main/source/kernel-image-2.4.27-i386_2.4.27-10sarge1.tar.gz stable/main/binary-i386/kernel-image-2.4.27-2-k6_2.4.27-10sarge1_i386.deb stable/main/binary-i386/kernel-headers-2.4.27-2-k7_2.4.27-10sarge1_i386.deb stable/main/binary-i386/kernel-build-2.4.27-2_2.4.27-10sarge1_i386.deb stable/main/binary-i386/kernel-image-2.4.27-2-686-smp_2.4.27-10sarge1_i386.deb stable/main/binary-i386/kernel-headers-2.4.27-2-k7-smp_2.4.27-10sarge1_i386.deb stable/main/binary-i386/kernel-headers-2.4.27-2_2.4.27-10sarge1_i386.deb stable/main/binary-i386/kernel-pcmcia-modules-2.4.27-2-686_2.4.27-10sarge1_i386.deb kernel-image-2.4.27-i386 (2.4.27-10sarge1) stable-security; urgency=high * Build against kernel-tree-2.4.27-10sarge1. (Simon Horman) stable/main/binary-arm/kernel-image-2.4.27-netwinder_2.4.27-2sarge1_arm.deb stable/main/binary-arm/kernel-image-2.4.27-riscstation_2.4.27-2sarge1_arm.deb stable/main/binary-arm/kernel-headers-2.4.27_2.4.27-2sarge1_arm.deb stable/main/source/kernel-image-2.4.27-arm_2.4.27-2sarge1.tar.gz stable/main/source/kernel-image-2.4.27-arm_2.4.27-2sarge1.dsc stable/main/binary-arm/kernel-image-2.4.27-lart_2.4.27-2sarge1_arm.deb stable/main/binary-arm/kernel-image-2.4.27-riscpc_2.4.27-2sarge1_arm.deb stable/main/binary-arm/kernel-build-2.4.27_2.4.27-2sarge1_arm.deb stable/main/binary-arm/kernel-image-2.4.27-bast_2.4.27-2sarge1_arm.deb kernel-image-2.4.27-arm (2.4.27-2sarge1) stable-security; urgency=high * Build against kernel-source-2.4.27 (2.4.27-10sarge1) * Build against kernel-patch-2.4.27-arm (2.4.27-1sarge1) * Add build dependency on gcc-2.95. This packages FTBFS with the default compiler in sarge. gcc-2.95 was used to build the sarge version of this package. stable/main/binary-alpha/kernel-headers-2.4.27-2-smp_2.4.27-10sarge1_alpha.deb stable/main/binary-alpha/kernel-image-2.4.27-2-smp_2.4.27-10sarge1_alpha.deb stable/main/source/kernel-image-2.4.27-alpha_2.4.27-10sarge1.tar.gz stable/main/source/kernel-image-2.4.27-alpha_2.4.27-10sarge1.dsc stable/main/binary-alpha/kernel-headers-2.4.27-2_2.4.27-10sarge1_alpha.deb stable/main/binary-alpha/kernel-image-2.4.27-2-generic_2.4.27-10sarge1_alpha.deb stable/main/binary-alpha/kernel-build-2.4.27-2_2.4.27-10sarge1_alpha.deb stable/main/binary-alpha/kernel-headers-2.4.27-2-generic_2.4.27-10sarge1_alpha.deb kernel-image-2.4.27-alpha (2.4.27-10sarge1) stable-security; urgency=high * Built against kernel-tree 2.4.27-10sarge1. stable/main/binary-sparc/kdelibs-bin_3.3.2-6.2_sparc.deb stable/main/binary-sparc/kdelibs4-dev_3.3.2-6.2_sparc.deb stable/main/binary-sparc/kdelibs4_3.3.2-6.2_sparc.deb kdelibs (4:3.3.2-6.2) stable-security; urgency=high * Non-maintainer upload by the Security Team * Applied upstream patch to fix backup file permission leak [debian/patches/24_post-3.3.2-kdelibs-kate.diff, CAN-2005-1920] stable/main/binary-s390/kdelibs4_3.3.2-6.2_s390.deb stable/main/binary-s390/kdelibs-bin_3.3.2-6.2_s390.deb stable/main/binary-s390/kdelibs4-dev_3.3.2-6.2_s390.deb kdelibs (4:3.3.2-6.2) stable-security; urgency=high * Non-maintainer upload by the Security Team * Applied upstream patch to fix backup file permission leak [debian/patches/24_post-3.3.2-kdelibs-kate.diff, CAN-2005-1920] stable/main/binary-powerpc/kdelibs4-dev_3.3.2-6.2_powerpc.deb stable/main/binary-powerpc/kdelibs4_3.3.2-6.2_powerpc.deb stable/main/binary-powerpc/kdelibs-bin_3.3.2-6.2_powerpc.deb kdelibs (4:3.3.2-6.2) stable-security; urgency=high * Non-maintainer upload by the Security Team * Applied upstream patch to fix backup file permission leak [debian/patches/24_post-3.3.2-kdelibs-kate.diff, CAN-2005-1920] stable/main/binary-mipsel/kdelibs-bin_3.3.2-6.2_mipsel.deb stable/main/binary-mipsel/kdelibs4_3.3.2-6.2_mipsel.deb stable/main/binary-mipsel/kdelibs4-dev_3.3.2-6.2_mipsel.deb kdelibs (4:3.3.2-6.2) stable-security; urgency=high * Non-maintainer upload by the Security Team * Applied upstream patch to fix backup file permission leak [debian/patches/24_post-3.3.2-kdelibs-kate.diff, CAN-2005-1920] stable/main/binary-mips/kdelibs4-dev_3.3.2-6.2_mips.deb stable/main/binary-mips/kdelibs4_3.3.2-6.2_mips.deb stable/main/binary-mips/kdelibs-bin_3.3.2-6.2_mips.deb kdelibs (4:3.3.2-6.2) stable-security; urgency=high * Non-maintainer upload by the Security Team * Applied upstream patch to fix backup file permission leak [debian/patches/24_post-3.3.2-kdelibs-kate.diff, CAN-2005-1920] stable/main/binary-m68k/kdelibs-bin_3.3.2-6.2_m68k.deb stable/main/binary-m68k/kdelibs4_3.3.2-6.2_m68k.deb stable/main/binary-m68k/kdelibs4-dev_3.3.2-6.2_m68k.deb kdelibs (4:3.3.2-6.2) stable-security; urgency=high * Non-maintainer upload by the Security Team * Applied upstream patch to fix backup file permission leak [debian/patches/24_post-3.3.2-kdelibs-kate.diff, CAN-2005-1920] stable/main/binary-ia64/kdelibs4-dev_3.3.2-6.2_ia64.deb stable/main/binary-ia64/kdelibs-bin_3.3.2-6.2_ia64.deb stable/main/binary-ia64/kdelibs4_3.3.2-6.2_ia64.deb kdelibs (4:3.3.2-6.2) stable-security; urgency=high * Non-maintainer upload by the Security Team * Applied upstream patch to fix backup file permission leak [debian/patches/24_post-3.3.2-kdelibs-kate.diff, CAN-2005-1920] stable/main/binary-hppa/kdelibs4_3.3.2-6.2_hppa.deb stable/main/binary-hppa/kdelibs-bin_3.3.2-6.2_hppa.deb stable/main/binary-hppa/kdelibs4-dev_3.3.2-6.2_hppa.deb kdelibs (4:3.3.2-6.2) stable-security; urgency=high * Non-maintainer upload by the Security Team * Applied upstream patch to fix backup file permission leak [debian/patches/24_post-3.3.2-kdelibs-kate.diff, CAN-2005-1920] stable/main/binary-arm/kdelibs-bin_3.3.2-6.2_arm.deb stable/main/binary-arm/kdelibs4_3.3.2-6.2_arm.deb stable/main/binary-arm/kdelibs4-dev_3.3.2-6.2_arm.deb kdelibs (4:3.3.2-6.2) stable-security; urgency=high * Non-maintainer upload by the Security Team * Applied upstream patch to fix backup file permission leak [debian/patches/24_post-3.3.2-kdelibs-kate.diff, CAN-2005-1920] stable/main/binary-alpha/kdelibs4-dev_3.3.2-6.2_alpha.deb stable/main/binary-alpha/kdelibs-bin_3.3.2-6.2_alpha.deb stable/main/binary-alpha/kdelibs4_3.3.2-6.2_alpha.deb kdelibs (4:3.3.2-6.2) stable-security; urgency=high * Non-maintainer upload by the Security Team * Applied upstream patch to fix backup file permission leak [debian/patches/24_post-3.3.2-kdelibs-kate.diff, CAN-2005-1920] stable/main/source/kdelibs_3.3.2-6.2.diff.gz stable/main/binary-i386/kdelibs4-dev_3.3.2-6.2_i386.deb stable/main/source/kdelibs_3.3.2-6.2.dsc stable/main/binary-i386/kdelibs-bin_3.3.2-6.2_i386.deb stable/main/binary-all/kdelibs4-doc_3.3.2-6.2_all.deb stable/main/binary-all/kdelibs_3.3.2-6.2_all.deb stable/main/binary-all/kdelibs-data_3.3.2-6.2_all.deb stable/main/binary-i386/kdelibs4_3.3.2-6.2_i386.deb kdelibs (4:3.3.2-6.2) stable-security; urgency=high * Non-maintainer upload by the Security Team * Applied upstream patch to fix backup file permission leak [debian/patches/24_post-3.3.2-kdelibs-kate.diff, CAN-2005-1920] stable/main/binary-i386/libkscan-dev_3.3.2-2sarge1_i386.deb stable/main/binary-i386/kfax_3.3.2-2sarge1_i386.deb stable/main/binary-i386/kdvi_3.3.2-2sarge1_i386.deb stable/main/source/kdegraphics_3.3.2-2sarge1.dsc stable/main/binary-i386/kviewshell_3.3.2-2sarge1_i386.deb stable/main/binary-i386/kghostview_3.3.2-2sarge1_i386.deb stable/main/binary-i386/kooka_3.3.2-2sarge1_i386.deb stable/main/binary-i386/ksnapshot_3.3.2-2sarge1_i386.deb stable/main/binary-i386/kuickshow_3.3.2-2sarge1_i386.deb stable/main/source/kdegraphics_3.3.2-2sarge1.diff.gz stable/main/binary-i386/ksvg_3.3.2-2sarge1_i386.deb stable/main/binary-i386/kcoloredit_3.3.2-2sarge1_i386.deb stable/main/binary-i386/libkscan1_3.3.2-2sarge1_i386.deb stable/main/binary-all/kdegraphics_3.3.2-2sarge1_all.deb stable/main/binary-i386/kamera_3.3.2-2sarge1_i386.deb stable/main/binary-i386/kpdf_3.3.2-2sarge1_i386.deb stable/main/binary-i386/kolourpaint_3.3.2-2sarge1_i386.deb stable/main/binary-i386/kpovmodeler_3.3.2-2sarge1_i386.deb stable/main/binary-i386/kiconedit_3.3.2-2sarge1_i386.deb stable/main/binary-i386/kgamma_3.3.2-2sarge1_i386.deb stable/main/binary-i386/kview_3.3.2-2sarge1_i386.deb stable/main/binary-i386/kruler_3.3.2-2sarge1_i386.deb stable/main/binary-i386/kmrml_3.3.2-2sarge1_i386.deb stable/main/binary-i386/kdegraphics-kfile-plugins_3.3.2-2sarge1_i386.deb stable/main/binary-i386/kdegraphics-dev_3.3.2-2sarge1_i386.deb kdegraphics (4:3.3.2-2sarge1) stable-security; urgency=high * Non-maintainer upload by the Security Team * Applied xpdf upstream patch by Derek Noonburg to fix broken handling of broken fonts [fofi/FoFiTrueType.cc, xpdf/SplashOutputDev.cc, CAN-2005-2097] stable/main/binary-m68k/kstars_3.3.2-3.sarge.1_m68k.deb stable/main/binary-m68k/libkdeedu1_3.3.2-3.sarge.1_m68k.deb stable/main/binary-m68k/klettres_3.3.2-3.sarge.1_m68k.deb stable/main/binary-m68k/klatin_3.3.2-3.sarge.1_m68k.deb stable/main/binary-m68k/keduca_3.3.2-3.sarge.1_m68k.deb stable/main/binary-m68k/kig_3.3.2-3.sarge.1_m68k.deb stable/main/binary-m68k/kvoctrain_3.3.2-3.sarge.1_m68k.deb stable/main/binary-m68k/kbruch_3.3.2-3.sarge.1_m68k.deb stable/main/binary-m68k/kmessedwords_3.3.2-3.sarge.1_m68k.deb stable/main/binary-m68k/libkdeedu-dev_3.3.2-3.sarge.1_m68k.deb stable/main/binary-m68k/khangman_3.3.2-3.sarge.1_m68k.deb stable/main/binary-m68k/kturtle_3.3.2-3.sarge.1_m68k.deb stable/main/binary-m68k/kwordquiz_3.3.2-3.sarge.1_m68k.deb stable/main/binary-m68k/kmplot_3.3.2-3.sarge.1_m68k.deb stable/main/binary-m68k/kverbos_3.3.2-3.sarge.1_m68k.deb stable/main/binary-m68k/kiten_3.3.2-3.sarge.1_m68k.deb stable/main/binary-m68k/ktouch_3.3.2-3.sarge.1_m68k.deb stable/main/binary-m68k/kalzium_3.3.2-3.sarge.1_m68k.deb stable/main/binary-m68k/kpercentage_3.3.2-3.sarge.1_m68k.deb kdeedu (4:3.3.2-3.sarge.1) stable-security; urgency=high * Security upload. * Fixed tempfile handling in langen2kvtml, which is shipped in the kvoctrain package. See the following URL for further information: - http://www.kde.org/info/security/advisory-20050815-1.txt References: CAN-2005-2101 stable/main/binary-hppa/kstars_3.3.2-3.sarge.1_hppa.deb stable/main/binary-hppa/kwordquiz_3.3.2-3.sarge.1_hppa.deb stable/main/binary-hppa/keduca_3.3.2-3.sarge.1_hppa.deb stable/main/binary-hppa/kverbos_3.3.2-3.sarge.1_hppa.deb stable/main/binary-hppa/kbruch_3.3.2-3.sarge.1_hppa.deb stable/main/binary-hppa/kvoctrain_3.3.2-3.sarge.1_hppa.deb stable/main/binary-hppa/khangman_3.3.2-3.sarge.1_hppa.deb stable/main/binary-hppa/kpercentage_3.3.2-3.sarge.1_hppa.deb stable/main/binary-hppa/klettres_3.3.2-3.sarge.1_hppa.deb stable/main/binary-hppa/kmplot_3.3.2-3.sarge.1_hppa.deb stable/main/binary-hppa/ktouch_3.3.2-3.sarge.1_hppa.deb stable/main/binary-hppa/klatin_3.3.2-3.sarge.1_hppa.deb stable/main/binary-hppa/kiten_3.3.2-3.sarge.1_hppa.deb stable/main/binary-hppa/kturtle_3.3.2-3.sarge.1_hppa.deb stable/main/binary-hppa/kmessedwords_3.3.2-3.sarge.1_hppa.deb stable/main/binary-hppa/libkdeedu1_3.3.2-3.sarge.1_hppa.deb stable/main/binary-hppa/libkdeedu-dev_3.3.2-3.sarge.1_hppa.deb stable/main/binary-hppa/kig_3.3.2-3.sarge.1_hppa.deb stable/main/binary-hppa/kalzium_3.3.2-3.sarge.1_hppa.deb kdeedu (4:3.3.2-3.sarge.1) stable-security; urgency=high * Security upload. * Fixed tempfile handling in langen2kvtml, which is shipped in the kvoctrain package. See the following URL for further information: - http://www.kde.org/info/security/advisory-20050815-1.txt References: CAN-2005-2101 stable/main/binary-i386/kmplot_3.3.2-3.sarge.1_i386.deb stable/main/binary-i386/kbruch_3.3.2-3.sarge.1_i386.deb stable/main/binary-i386/khangman_3.3.2-3.sarge.1_i386.deb stable/main/binary-all/klettres-data_3.3.2-3.sarge.1_all.deb stable/main/binary-i386/kpercentage_3.3.2-3.sarge.1_i386.deb stable/main/source/kdeedu_3.3.2-3.sarge.1.diff.gz stable/main/binary-i386/kturtle_3.3.2-3.sarge.1_i386.deb stable/main/binary-i386/kwordquiz_3.3.2-3.sarge.1_i386.deb stable/main/binary-i386/kiten_3.3.2-3.sarge.1_i386.deb stable/main/binary-i386/kalzium_3.3.2-3.sarge.1_i386.deb stable/main/binary-all/kdeedu-data_3.3.2-3.sarge.1_all.deb stable/main/source/kdeedu_3.3.2-3.sarge.1.dsc stable/main/binary-all/kstars-data_3.3.2-3.sarge.1_all.deb stable/main/binary-all/kdeedu_3.3.2-3.sarge.1_all.deb stable/main/binary-i386/klatin_3.3.2-3.sarge.1_i386.deb stable/main/binary-i386/kig_3.3.2-3.sarge.1_i386.deb stable/main/binary-i386/keduca_3.3.2-3.sarge.1_i386.deb stable/main/binary-i386/kvoctrain_3.3.2-3.sarge.1_i386.deb stable/main/binary-i386/ktouch_3.3.2-3.sarge.1_i386.deb stable/main/binary-all/kdeedu-doc-html_3.3.2-3.sarge.1_all.deb stable/main/binary-i386/kverbos_3.3.2-3.sarge.1_i386.deb stable/main/binary-i386/libkdeedu-dev_3.3.2-3.sarge.1_i386.deb stable/main/binary-i386/libkdeedu1_3.3.2-3.sarge.1_i386.deb stable/main/binary-i386/kmessedwords_3.3.2-3.sarge.1_i386.deb stable/main/binary-i386/kstars_3.3.2-3.sarge.1_i386.deb stable/main/binary-i386/klettres_3.3.2-3.sarge.1_i386.deb kdeedu (4:3.3.2-3.sarge.1) stable-security; urgency=high * Security upload. * Fixed tempfile handling in langen2kvtml, which is shipped in the kvoctrain package. See the following URL for further information: - http://www.kde.org/info/security/advisory-20050815-1.txt References: CAN-2005-2101 stable/main/binary-ia64/kdepasswd_3.3.2-1sarge1_ia64.deb stable/main/binary-ia64/ksplash_3.3.2-1sarge1_ia64.deb stable/main/binary-ia64/kate_3.3.2-1sarge1_ia64.deb stable/main/binary-ia64/kicker_3.3.2-1sarge1_ia64.deb stable/main/binary-ia64/khelpcenter_3.3.2-1sarge1_ia64.deb stable/main/binary-ia64/kmenuedit_3.3.2-1sarge1_ia64.deb stable/main/binary-ia64/kcontrol_3.3.2-1sarge1_ia64.deb stable/main/binary-ia64/konqueror-nsplugins_3.3.2-1sarge1_ia64.deb stable/main/source/kdebase_3.3.2-1sarge1.diff.gz stable/main/binary-ia64/kwin_3.3.2-1sarge1_ia64.deb stable/main/source/kdebase_3.3.2-1sarge1.dsc stable/main/binary-ia64/ksysguard_3.3.2-1sarge1_ia64.deb stable/main/binary-all/xfonts-konsole_3.3.2-1sarge1_all.deb stable/main/binary-ia64/kdeprint_3.3.2-1sarge1_ia64.deb stable/main/binary-ia64/ktip_3.3.2-1sarge1_ia64.deb stable/main/binary-ia64/ksmserver_3.3.2-1sarge1_ia64.deb stable/main/binary-all/kdebase-data_3.3.2-1sarge1_all.deb stable/main/binary-ia64/kpersonalizer_3.3.2-1sarge1_ia64.deb stable/main/binary-ia64/kdm_3.3.2-1sarge1_ia64.deb stable/main/binary-ia64/konqueror_3.3.2-1sarge1_ia64.deb stable/main/binary-ia64/libkonq4_3.3.2-1sarge1_ia64.deb stable/main/binary-all/kdebase_3.3.2-1sarge1_all.deb stable/main/binary-ia64/kpager_3.3.2-1sarge1_ia64.deb stable/main/binary-ia64/kdebase-dev_3.3.2-1sarge1_ia64.deb stable/main/binary-ia64/kappfinder_3.3.2-1sarge1_ia64.deb stable/main/binary-ia64/konsole_3.3.2-1sarge1_ia64.deb stable/main/binary-ia64/ksysguardd_3.3.2-1sarge1_ia64.deb stable/main/binary-ia64/kdesktop_3.3.2-1sarge1_ia64.deb stable/main/binary-all/kdebase-doc_3.3.2-1sarge1_all.deb stable/main/binary-ia64/klipper_3.3.2-1sarge1_ia64.deb stable/main/binary-ia64/libkonq4-dev_3.3.2-1sarge1_ia64.deb stable/main/binary-ia64/kfind_3.3.2-1sarge1_ia64.deb stable/main/binary-ia64/kdebase-kio-plugins_3.3.2-1sarge1_ia64.deb stable/main/binary-ia64/kdebase-bin_3.3.2-1sarge1_ia64.deb kdebase (4:3.3.2-1sarge1) stable-security; urgency=high * Non-maintainer upload by the Security Team * Applied upstream patch to fix local root hole [debian/patches/16_CAN-2005-2494_kcheckpass.diff] stable/main/binary-sparc/kazehakase_0.2.7-2.sarge1_sparc.deb kazehakase (0.2.7-2.sarge1) stable; urgency=high * fix crash for mozilla 2:1.7.8-1sarge2 (Closes: 325124, 326509) * for proposed-updates, since otherwise kazehakase becomes unusable in sarge as soon as mentioned mozilla fix goes in. stable/main/binary-s390/kazehakase_0.2.7-2.sarge1_s390.deb kazehakase (0.2.7-2.sarge1) stable; urgency=high * fix crash for mozilla 2:1.7.8-1sarge2 (Closes: 325124, 326509) * for proposed-updates, since otherwise kazehakase becomes unusable in sarge as soon as mentioned mozilla fix goes in. stable/main/binary-powerpc/kazehakase_0.2.7-2.sarge1_powerpc.deb kazehakase (0.2.7-2.sarge1) stable; urgency=high * fix crash for mozilla 2:1.7.8-1sarge2 (Closes: 325124, 326509) * for proposed-updates, since otherwise kazehakase becomes unusable in sarge as soon as mentioned mozilla fix goes in. stable/main/binary-mipsel/kazehakase_0.2.7-2.sarge1_mipsel.deb kazehakase (0.2.7-2.sarge1) stable; urgency=high * fix crash for mozilla 2:1.7.8-1sarge2 (Closes: 325124, 326509) * for proposed-updates, since otherwise kazehakase becomes unusable in sarge as soon as mentioned mozilla fix goes in. stable/main/binary-mips/kazehakase_0.2.7-2.sarge1_mips.deb kazehakase (0.2.7-2.sarge1) stable; urgency=high * fix crash for mozilla 2:1.7.8-1sarge2 (Closes: 325124, 326509) * for proposed-updates, since otherwise kazehakase becomes unusable in sarge as soon as mentioned mozilla fix goes in. stable/main/binary-m68k/kazehakase_0.2.7-2.sarge1_m68k.deb kazehakase (0.2.7-2.sarge1) stable; urgency=high * fix crash for mozilla 2:1.7.8-1sarge2 (Closes: 325124, 326509) * for proposed-updates, since otherwise kazehakase becomes unusable in sarge as soon as mentioned mozilla fix goes in. stable/main/binary-ia64/kazehakase_0.2.7-2.sarge1_ia64.deb kazehakase (0.2.7-2.sarge1) stable; urgency=high * fix crash for mozilla 2:1.7.8-1sarge2 (Closes: 325124, 326509) * for proposed-updates, since otherwise kazehakase becomes unusable in sarge as soon as mentioned mozilla fix goes in. stable/main/binary-hppa/kazehakase_0.2.7-2.sarge1_hppa.deb kazehakase (0.2.7-2.sarge1) stable; urgency=high * fix crash for mozilla 2:1.7.8-1sarge2 (Closes: 325124, 326509) * for proposed-updates, since otherwise kazehakase becomes unusable in sarge as soon as mentioned mozilla fix goes in. stable/main/binary-arm/kazehakase_0.2.7-2.sarge1_arm.deb kazehakase (0.2.7-2.sarge1) stable; urgency=high * fix crash for mozilla 2:1.7.8-1sarge2 (Closes: 325124, 326509) * for proposed-updates, since otherwise kazehakase becomes unusable in sarge as soon as mentioned mozilla fix goes in. stable/main/binary-alpha/kazehakase_0.2.7-2.sarge1_alpha.deb kazehakase (0.2.7-2.sarge1) stable; urgency=high * fix crash for mozilla 2:1.7.8-1sarge2 (Closes: 325124, 326509) * for proposed-updates, since otherwise kazehakase becomes unusable in sarge as soon as mentioned mozilla fix goes in. stable/main/binary-i386/kazehakase_0.2.7-2.sarge1_i386.deb stable/main/source/kazehakase_0.2.7-2.sarge1.dsc stable/main/source/kazehakase_0.2.7-2.sarge1.diff.gz kazehakase (0.2.7-2.sarge1) stable; urgency=high * fix crash for mozilla 2:1.7.8-1sarge2 (Closes: 325124, 326509) * for proposed-updates, since otherwise kazehakase becomes unusable in sarge as soon as mentioned mozilla fix goes in. stable/main/binary-sparc/inkscape_0.41-4.99.sarge2_sparc.deb inkscape (0.41-4.99.sarge2) stable-security; urgency=high * Non-maintainer Upload by the Security Team * Applied patch by Javier Fernández-Sanguino Peña to fix an insecure temporary file [share/extensions/ps2epsi.sh, Bug#321501, CVE-2005-3885, debian/patches/CVE-2005-3885.diff] stable/main/binary-s390/inkscape_0.41-4.99.sarge2_s390.deb inkscape (0.41-4.99.sarge2) stable-security; urgency=high * Non-maintainer Upload by the Security Team * Applied patch by Javier Fernández-Sanguino Peña to fix an insecure temporary file [share/extensions/ps2epsi.sh, Bug#321501, CVE-2005-3885, debian/patches/CVE-2005-3885.diff] stable/main/binary-mipsel/inkscape_0.41-4.99.sarge2_mipsel.deb inkscape (0.41-4.99.sarge2) stable-security; urgency=high * Non-maintainer Upload by the Security Team * Applied patch by Javier Fernández-Sanguino Peña to fix an insecure temporary file [share/extensions/ps2epsi.sh, Bug#321501, CVE-2005-3885, debian/patches/CVE-2005-3885.diff] stable/main/binary-mips/inkscape_0.41-4.99.sarge2_mips.deb inkscape (0.41-4.99.sarge2) stable-security; urgency=high * Non-maintainer Upload by the Security Team * Applied patch by Javier Fernández-Sanguino Peña to fix an insecure temporary file [share/extensions/ps2epsi.sh, Bug#321501, CVE-2005-3885, debian/patches/CVE-2005-3885.diff] stable/main/binary-m68k/inkscape_0.41-4.99.sarge2_m68k.deb inkscape (0.41-4.99.sarge2) stable-security; urgency=high * Non-maintainer Upload by the Security Team * Applied patch by Javier Fernández-Sanguino Peña to fix an insecure temporary file [share/extensions/ps2epsi.sh, Bug#321501, CVE-2005-3885, debian/patches/CVE-2005-3885.diff] stable/main/binary-ia64/inkscape_0.41-4.99.sarge2_ia64.deb inkscape (0.41-4.99.sarge2) stable-security; urgency=high * Non-maintainer Upload by the Security Team * Applied patch by Javier Fernández-Sanguino Peña to fix an insecure temporary file [share/extensions/ps2epsi.sh, Bug#321501, CVE-2005-3885, debian/patches/CVE-2005-3885.diff] stable/main/binary-i386/inkscape_0.41-4.99.sarge2_i386.deb inkscape (0.41-4.99.sarge2) stable-security; urgency=high * Non-maintainer Upload by the Security Team * Applied patch by Javier Fernández-Sanguino Peña to fix an insecure temporary file [share/extensions/ps2epsi.sh, Bug#321501, CVE-2005-3885, debian/patches/CVE-2005-3885.diff] stable/main/binary-hppa/inkscape_0.41-4.99.sarge2_hppa.deb inkscape (0.41-4.99.sarge2) stable-security; urgency=high * Non-maintainer Upload by the Security Team * Applied patch by Javier Fernández-Sanguino Peña to fix an insecure temporary file [share/extensions/ps2epsi.sh, Bug#321501, CVE-2005-3885, debian/patches/CVE-2005-3885.diff] stable/main/binary-arm/inkscape_0.41-4.99.sarge2_arm.deb inkscape (0.41-4.99.sarge2) stable-security; urgency=high * Non-maintainer Upload by the Security Team * Applied patch by Javier Fernández-Sanguino Peña to fix an insecure temporary file [share/extensions/ps2epsi.sh, Bug#321501, CVE-2005-3885, debian/patches/CVE-2005-3885.diff] stable/main/binary-alpha/inkscape_0.41-4.99.sarge2_alpha.deb inkscape (0.41-4.99.sarge2) stable-security; urgency=high * Non-maintainer Upload by the Security Team * Applied patch by Javier Fernández-Sanguino Peña to fix an insecure temporary file [share/extensions/ps2epsi.sh, Bug#321501, CVE-2005-3885, debian/patches/CVE-2005-3885.diff] stable/main/binary-powerpc/inkscape_0.41-4.99.sarge2_powerpc.deb stable/main/source/inkscape_0.41-4.99.sarge2.dsc stable/main/source/inkscape_0.41-4.99.sarge2.diff.gz inkscape (0.41-4.99.sarge2) stable-security; urgency=high * Non-maintainer Upload by the Security Team * Applied patch by Javier Fernández-Sanguino Peña to fix an insecure temporary file [share/extensions/ps2epsi.sh, Bug#321501, CVE-2005-3885, debian/patches/CVE-2005-3885.diff] stable/main/binary-sparc/hylafax-server_4.2.1-5sarge1_sparc.deb stable/main/binary-sparc/hylafax-client_4.2.1-5sarge1_sparc.deb hylafax (1:4.2.1-5sarge1) stable-security; urgency=high * Non-maintainer upload by the Security Team * Corrected handling of temporary files in several scripts [util/faxcron.sh.in, util/recvstats.sh.in, util/xferfaxstats.sh.in, etc/faxaddmodem.sh.in, etc/probemodem.sh.in, port/mkdepend.in, debian/patches/700_CAN-2005-3069, CAN-2005-3069] stable/main/binary-s390/hylafax-server_4.2.1-5sarge1_s390.deb stable/main/binary-s390/hylafax-client_4.2.1-5sarge1_s390.deb hylafax (1:4.2.1-5sarge1) stable-security; urgency=high * Non-maintainer upload by the Security Team * Corrected handling of temporary files in several scripts [util/faxcron.sh.in, util/recvstats.sh.in, util/xferfaxstats.sh.in, etc/faxaddmodem.sh.in, etc/probemodem.sh.in, port/mkdepend.in, debian/patches/700_CAN-2005-3069, CAN-2005-3069] stable/main/binary-mipsel/hylafax-client_4.2.1-5sarge1_mipsel.deb stable/main/binary-mipsel/hylafax-server_4.2.1-5sarge1_mipsel.deb hylafax (1:4.2.1-5sarge1) stable-security; urgency=high * Non-maintainer upload by the Security Team * Corrected handling of temporary files in several scripts [util/faxcron.sh.in, util/recvstats.sh.in, util/xferfaxstats.sh.in, etc/faxaddmodem.sh.in, etc/probemodem.sh.in, port/mkdepend.in, debian/patches/700_CAN-2005-3069, CAN-2005-3069] stable/main/binary-mips/hylafax-client_4.2.1-5sarge1_mips.deb stable/main/binary-mips/hylafax-server_4.2.1-5sarge1_mips.deb hylafax (1:4.2.1-5sarge1) stable-security; urgency=high * Non-maintainer upload by the Security Team * Corrected handling of temporary files in several scripts [util/faxcron.sh.in, util/recvstats.sh.in, util/xferfaxstats.sh.in, etc/faxaddmodem.sh.in, etc/probemodem.sh.in, port/mkdepend.in, debian/patches/700_CAN-2005-3069, CAN-2005-3069] stable/main/binary-m68k/hylafax-client_4.2.1-5sarge1_m68k.deb stable/main/binary-m68k/hylafax-server_4.2.1-5sarge1_m68k.deb hylafax (1:4.2.1-5sarge1) stable-security; urgency=high * Non-maintainer upload by the Security Team * Corrected handling of temporary files in several scripts [util/faxcron.sh.in, util/recvstats.sh.in, util/xferfaxstats.sh.in, etc/faxaddmodem.sh.in, etc/probemodem.sh.in, port/mkdepend.in, debian/patches/700_CAN-2005-3069, CAN-2005-3069] stable/main/binary-ia64/hylafax-server_4.2.1-5sarge1_ia64.deb stable/main/binary-ia64/hylafax-client_4.2.1-5sarge1_ia64.deb hylafax (1:4.2.1-5sarge1) stable-security; urgency=high * Non-maintainer upload by the Security Team * Corrected handling of temporary files in several scripts [util/faxcron.sh.in, util/recvstats.sh.in, util/xferfaxstats.sh.in, etc/faxaddmodem.sh.in, etc/probemodem.sh.in, port/mkdepend.in, debian/patches/700_CAN-2005-3069, CAN-2005-3069] stable/main/binary-i386/hylafax-server_4.2.1-5sarge1_i386.deb stable/main/binary-i386/hylafax-client_4.2.1-5sarge1_i386.deb hylafax (1:4.2.1-5sarge1) stable-security; urgency=high * Non-maintainer upload by the Security Team * Corrected handling of temporary files in several scripts [util/faxcron.sh.in, util/recvstats.sh.in, util/xferfaxstats.sh.in, etc/faxaddmodem.sh.in, etc/probemodem.sh.in, port/mkdepend.in, debian/patches/700_CAN-2005-3069, CAN-2005-3069] stable/main/binary-hppa/hylafax-server_4.2.1-5sarge1_hppa.deb stable/main/binary-hppa/hylafax-client_4.2.1-5sarge1_hppa.deb hylafax (1:4.2.1-5sarge1) stable-security; urgency=high * Non-maintainer upload by the Security Team * Corrected handling of temporary files in several scripts [util/faxcron.sh.in, util/recvstats.sh.in, util/xferfaxstats.sh.in, etc/faxaddmodem.sh.in, etc/probemodem.sh.in, port/mkdepend.in, debian/patches/700_CAN-2005-3069, CAN-2005-3069] stable/main/binary-arm/hylafax-server_4.2.1-5sarge1_arm.deb stable/main/binary-arm/hylafax-client_4.2.1-5sarge1_arm.deb hylafax (1:4.2.1-5sarge1) stable-security; urgency=high * Non-maintainer upload by the Security Team * Corrected handling of temporary files in several scripts [util/faxcron.sh.in, util/recvstats.sh.in, util/xferfaxstats.sh.in, etc/faxaddmodem.sh.in, etc/probemodem.sh.in, port/mkdepend.in, debian/patches/700_CAN-2005-3069, CAN-2005-3069] stable/main/binary-alpha/hylafax-server_4.2.1-5sarge1_alpha.deb stable/main/binary-alpha/hylafax-client_4.2.1-5sarge1_alpha.deb hylafax (1:4.2.1-5sarge1) stable-security; urgency=high * Non-maintainer upload by the Security Team * Corrected handling of temporary files in several scripts [util/faxcron.sh.in, util/recvstats.sh.in, util/xferfaxstats.sh.in, etc/faxaddmodem.sh.in, etc/probemodem.sh.in, port/mkdepend.in, debian/patches/700_CAN-2005-3069, CAN-2005-3069] stable/main/binary-powerpc/hylafax-client_4.2.1-5sarge1_powerpc.deb stable/main/source/hylafax_4.2.1-5sarge1.dsc stable/main/binary-all/hylafax-doc_4.2.1-5sarge1_all.deb stable/main/binary-powerpc/hylafax-server_4.2.1-5sarge1_powerpc.deb stable/main/source/hylafax_4.2.1-5sarge1.diff.gz hylafax (1:4.2.1-5sarge1) stable-security; urgency=high * Non-maintainer upload by the Security Team * Corrected handling of temporary files in several scripts [util/faxcron.sh.in, util/recvstats.sh.in, util/xferfaxstats.sh.in, etc/faxaddmodem.sh.in, etc/probemodem.sh.in, port/mkdepend.in, debian/patches/700_CAN-2005-3069, CAN-2005-3069] stable/main/binary-s390/ht_0.8.0-2sarge4_s390.deb ht (0.8.0-2sarge4) stable-security; urgency=high * Non-maintainer upload by the Security Team * No changes rebuild due to the release stable/main/binary-powerpc/ht_0.8.0-2sarge4_powerpc.deb ht (0.8.0-2sarge4) stable-security; urgency=high * Non-maintainer upload by the Security Team * No changes rebuild due to the release stable/main/binary-mipsel/ht_0.8.0-2sarge4_mipsel.deb ht (0.8.0-2sarge4) stable-security; urgency=high * Non-maintainer upload by the Security Team * No changes rebuild due to the release stable/main/binary-mips/ht_0.8.0-2sarge4_mips.deb ht (0.8.0-2sarge4) stable-security; urgency=high * Non-maintainer upload by the Security Team * No changes rebuild due to the release stable/main/binary-m68k/ht_0.8.0-2sarge4_m68k.deb ht (0.8.0-2sarge4) stable-security; urgency=high * Non-maintainer upload by the Security Team * No changes rebuild due to the release stable/main/binary-ia64/ht_0.8.0-2sarge4_ia64.deb ht (0.8.0-2sarge4) stable-security; urgency=high * Non-maintainer upload by the Security Team * No changes rebuild due to the release stable/main/binary-i386/ht_0.8.0-2sarge4_i386.deb ht (0.8.0-2sarge4) stable-security; urgency=high * Non-maintainer upload by the Security Team * No changes rebuild due to the release stable/main/binary-hppa/ht_0.8.0-2sarge4_hppa.deb ht (0.8.0-2sarge4) stable-security; urgency=high * Non-maintainer upload by the Security Team * No changes rebuild due to the release stable/main/binary-arm/ht_0.8.0-2sarge4_arm.deb ht (0.8.0-2sarge4) stable-security; urgency=high * Non-maintainer upload by the Security Team * No changes rebuild due to the release stable/main/binary-alpha/ht_0.8.0-2sarge4_alpha.deb ht (0.8.0-2sarge4) stable-security; urgency=high * Non-maintainer upload by the Security Team * No changes rebuild due to the release stable/main/binary-sparc/ht_0.8.0-2sarge4_sparc.deb stable/main/source/ht_0.8.0-2sarge4.diff.gz stable/main/source/ht_0.8.0-2sarge4.dsc ht (0.8.0-2sarge4) stable-security; urgency=high * Non-maintainer upload by the Security Team * No changes rebuild due to the release stable/main/source/horde3_3.0.4-4sarge2.dsc stable/main/source/horde3_3.0.4-4sarge2.diff.gz stable/main/binary-all/horde3_3.0.4-4sarge2_all.deb horde3 (3.0.4-4sarge2) stable-security; urgency=high * Applied fix for cross site scripting vulnerabilities from 3.0.7 version of horde3 (CVE-2005-3759), closes: #340323. stable/main/source/horde2_2.2.8-1sarge1.diff.gz stable/main/binary-all/horde2_2.2.8-1sarge1_all.deb stable/main/source/horde2_2.2.8-1sarge1.dsc horde2 (2.2.8-1sarge1) stable-security; urgency=high * Non-maintainer upload by the Security Team * Applied upstream patch to fix cross-site scripting [CVE-2005-3570, lib/Horde.php] stable/main/binary-powerpc/helix-player_1.0.4-1sarge2_powerpc.deb helix-player (1.0.4-1sarge2) stable-security; urgency=high * NMU by the security team * Apply patch to fix integer overflow in httpfsys.cpp (CVE-2005-2629) * Apply patch to fix memory allocation bug in protocol/common/util/hxbitset.cpp This bug may have security implications, but does not currently have a CVE number and there is no known vulnerability at this time. stable/main/binary-i386/helix-player_1.0.4-1sarge2_i386.deb stable/main/source/helix-player_1.0.4-1sarge2.dsc stable/main/source/helix-player_1.0.4-1sarge2.diff.gz helix-player (1.0.4-1sarge2) stable-security; urgency=high * NMU by the security team * Apply patch to fix integer overflow in httpfsys.cpp (CVE-2005-2629) * Apply patch to fix memory allocation bug in protocol/common/util/hxbitset.cpp This bug may have security implications, but does not currently have a CVE number and there is no known vulnerability at this time. stable/main/binary-i386/heimdal-servers-x_0.6.3-10sarge1_i386.deb stable/main/binary-all/heimdal-docs_0.6.3-10sarge1_all.deb stable/main/source/heimdal_0.6.3-10sarge1.diff.gz stable/main/binary-i386/libkrb5-17-heimdal_0.6.3-10sarge1_i386.deb stable/main/binary-i386/libgssapi1-heimdal_0.6.3-10sarge1_i386.deb stable/main/source/heimdal_0.6.3-10sarge1.dsc stable/main/binary-i386/heimdal-servers_0.6.3-10sarge1_i386.deb stable/main/binary-i386/heimdal-clients-x_0.6.3-10sarge1_i386.deb stable/main/binary-i386/libkadm5srv7-heimdal_0.6.3-10sarge1_i386.deb stable/main/binary-i386/heimdal-clients_0.6.3-10sarge1_i386.deb stable/main/binary-i386/libhdb7-heimdal_0.6.3-10sarge1_i386.deb stable/main/binary-i386/libasn1-6-heimdal_0.6.3-10sarge1_i386.deb stable/main/binary-i386/libkafs0-heimdal_0.6.3-10sarge1_i386.deb stable/main/binary-i386/heimdal-kdc_0.6.3-10sarge1_i386.deb stable/main/binary-i386/heimdal-dev_0.6.3-10sarge1_i386.deb stable/main/binary-i386/libkadm5clnt4-heimdal_0.6.3-10sarge1_i386.deb heimdal (0.6.3-10sarge1) stable-security; urgency=high * Non-maintainer upload by the Security Team * Applied upstream patch to fix buffer overflow in telnetd implementation [appl/telnet/telnetd/ext.h, appl/telnet/telnetd/global.c, appl/telnet/telnetd/state.c, appl/telnet/telnetd/telnetd.c, debian/patches/033_CAN-2005-2040] stable/main/binary-sparc/libstonith-dev_1.2.3-9sarge4_sparc.deb stable/main/binary-sparc/libpils0_1.2.3-9sarge4_sparc.deb stable/main/binary-sparc/stonith_1.2.3-9sarge4_sparc.deb stable/main/binary-sparc/heartbeat_1.2.3-9sarge4_sparc.deb stable/main/binary-sparc/libpils-dev_1.2.3-9sarge4_sparc.deb stable/main/binary-sparc/heartbeat-dev_1.2.3-9sarge4_sparc.deb stable/main/binary-sparc/libstonith0_1.2.3-9sarge4_sparc.deb heartbeat (1.2.3-9sarge4) stable; urgency=low * Sarge-Proposed-Updates upload by maintainer * Fix various bugs that render the stonith subsystem unusable (closes: #328458) Patches taken verbatim from upstream: 12-fd-leak.patch,13-oflimits-move.patch Patches backported from upstream: 14-close_loop.patch stable/main/binary-s390/libstonith0_1.2.3-9sarge4_s390.deb stable/main/binary-s390/heartbeat_1.2.3-9sarge4_s390.deb stable/main/binary-s390/stonith_1.2.3-9sarge4_s390.deb stable/main/binary-s390/libstonith-dev_1.2.3-9sarge4_s390.deb stable/main/binary-s390/libpils-dev_1.2.3-9sarge4_s390.deb stable/main/binary-s390/heartbeat-dev_1.2.3-9sarge4_s390.deb stable/main/binary-s390/libpils0_1.2.3-9sarge4_s390.deb heartbeat (1.2.3-9sarge4) stable; urgency=low * Sarge-Proposed-Updates upload by maintainer * Fix various bugs that render the stonith subsystem unusable (closes: #328458) Patches taken verbatim from upstream: 12-fd-leak.patch,13-oflimits-move.patch Patches backported from upstream: 14-close_loop.patch stable/main/binary-powerpc/libpils0_1.2.3-9sarge4_powerpc.deb stable/main/binary-powerpc/libstonith0_1.2.3-9sarge4_powerpc.deb stable/main/binary-powerpc/libstonith-dev_1.2.3-9sarge4_powerpc.deb stable/main/binary-powerpc/heartbeat_1.2.3-9sarge4_powerpc.deb stable/main/binary-powerpc/stonith_1.2.3-9sarge4_powerpc.deb stable/main/binary-powerpc/heartbeat-dev_1.2.3-9sarge4_powerpc.deb stable/main/binary-powerpc/libpils-dev_1.2.3-9sarge4_powerpc.deb heartbeat (1.2.3-9sarge4) stable; urgency=low * Sarge-Proposed-Updates upload by maintainer * Fix various bugs that render the stonith subsystem unusable (closes: #328458) Patches taken verbatim from upstream: 12-fd-leak.patch,13-oflimits-move.patch Patches backported from upstream: 14-close_loop.patch stable/main/binary-mipsel/stonith_1.2.3-9sarge4_mipsel.deb stable/main/binary-mipsel/libpils-dev_1.2.3-9sarge4_mipsel.deb stable/main/binary-mipsel/heartbeat-dev_1.2.3-9sarge4_mipsel.deb stable/main/binary-mipsel/heartbeat_1.2.3-9sarge4_mipsel.deb stable/main/binary-mipsel/libstonith-dev_1.2.3-9sarge4_mipsel.deb stable/main/binary-mipsel/libstonith0_1.2.3-9sarge4_mipsel.deb stable/main/binary-mipsel/libpils0_1.2.3-9sarge4_mipsel.deb heartbeat (1.2.3-9sarge4) stable; urgency=low * Sarge-Proposed-Updates upload by maintainer * Fix various bugs that render the stonith subsystem unusable (closes: #328458) Patches taken verbatim from upstream: 12-fd-leak.patch,13-oflimits-move.patch Patches backported from upstream: 14-close_loop.patch stable/main/binary-mips/stonith_1.2.3-9sarge4_mips.deb stable/main/binary-mips/libpils0_1.2.3-9sarge4_mips.deb stable/main/binary-mips/heartbeat_1.2.3-9sarge4_mips.deb stable/main/binary-mips/libpils-dev_1.2.3-9sarge4_mips.deb stable/main/binary-mips/heartbeat-dev_1.2.3-9sarge4_mips.deb stable/main/binary-mips/libstonith0_1.2.3-9sarge4_mips.deb stable/main/binary-mips/libstonith-dev_1.2.3-9sarge4_mips.deb heartbeat (1.2.3-9sarge4) stable; urgency=low * Sarge-Proposed-Updates upload by maintainer * Fix various bugs that render the stonith subsystem unusable (closes: #328458) Patches taken verbatim from upstream: 12-fd-leak.patch,13-oflimits-move.patch Patches backported from upstream: 14-close_loop.patch stable/main/binary-m68k/stonith_1.2.3-9sarge4_m68k.deb stable/main/binary-m68k/heartbeat-dev_1.2.3-9sarge4_m68k.deb stable/main/binary-m68k/libstonith-dev_1.2.3-9sarge4_m68k.deb stable/main/binary-m68k/libpils0_1.2.3-9sarge4_m68k.deb stable/main/binary-m68k/libstonith0_1.2.3-9sarge4_m68k.deb stable/main/binary-m68k/libpils-dev_1.2.3-9sarge4_m68k.deb stable/main/binary-m68k/heartbeat_1.2.3-9sarge4_m68k.deb heartbeat (1.2.3-9sarge4) stable; urgency=low * Sarge-Proposed-Updates upload by maintainer * Fix various bugs that render the stonith subsystem unusable (closes: #328458) Patches taken verbatim from upstream: 12-fd-leak.patch,13-oflimits-move.patch Patches backported from upstream: 14-close_loop.patch stable/main/binary-ia64/libstonith0_1.2.3-9sarge4_ia64.deb stable/main/binary-ia64/stonith_1.2.3-9sarge4_ia64.deb stable/main/binary-ia64/libstonith-dev_1.2.3-9sarge4_ia64.deb stable/main/binary-ia64/heartbeat_1.2.3-9sarge4_ia64.deb stable/main/binary-ia64/heartbeat-dev_1.2.3-9sarge4_ia64.deb stable/main/binary-ia64/libpils-dev_1.2.3-9sarge4_ia64.deb stable/main/binary-ia64/libpils0_1.2.3-9sarge4_ia64.deb heartbeat (1.2.3-9sarge4) stable; urgency=low * Sarge-Proposed-Updates upload by maintainer * Fix various bugs that render the stonith subsystem unusable (closes: #328458) Patches taken verbatim from upstream: 12-fd-leak.patch,13-oflimits-move.patch Patches backported from upstream: 14-close_loop.patch stable/main/binary-hppa/heartbeat-dev_1.2.3-9sarge4_hppa.deb stable/main/binary-hppa/stonith_1.2.3-9sarge4_hppa.deb stable/main/binary-hppa/heartbeat_1.2.3-9sarge4_hppa.deb stable/main/binary-hppa/libpils-dev_1.2.3-9sarge4_hppa.deb stable/main/binary-hppa/libstonith0_1.2.3-9sarge4_hppa.deb stable/main/binary-hppa/libstonith-dev_1.2.3-9sarge4_hppa.deb stable/main/binary-hppa/libpils0_1.2.3-9sarge4_hppa.deb heartbeat (1.2.3-9sarge4) stable; urgency=low * Sarge-Proposed-Updates upload by maintainer * Fix various bugs that render the stonith subsystem unusable (closes: #328458) Patches taken verbatim from upstream: 12-fd-leak.patch,13-oflimits-move.patch Patches backported from upstream: 14-close_loop.patch stable/main/binary-arm/heartbeat-dev_1.2.3-9sarge4_arm.deb stable/main/binary-arm/libpils-dev_1.2.3-9sarge4_arm.deb stable/main/binary-arm/libstonith-dev_1.2.3-9sarge4_arm.deb stable/main/binary-arm/libstonith0_1.2.3-9sarge4_arm.deb stable/main/binary-arm/libpils0_1.2.3-9sarge4_arm.deb stable/main/binary-arm/heartbeat_1.2.3-9sarge4_arm.deb stable/main/binary-arm/stonith_1.2.3-9sarge4_arm.deb heartbeat (1.2.3-9sarge4) stable; urgency=low * Sarge-Proposed-Updates upload by maintainer * Fix various bugs that render the stonith subsystem unusable (closes: #328458) Patches taken verbatim from upstream: 12-fd-leak.patch,13-oflimits-move.patch Patches backported from upstream: 14-close_loop.patch stable/main/binary-alpha/libstonith0_1.2.3-9sarge4_alpha.deb stable/main/binary-alpha/heartbeat-dev_1.2.3-9sarge4_alpha.deb stable/main/binary-alpha/heartbeat_1.2.3-9sarge4_alpha.deb stable/main/binary-alpha/libpils-dev_1.2.3-9sarge4_alpha.deb stable/main/binary-alpha/libpils0_1.2.3-9sarge4_alpha.deb stable/main/binary-alpha/stonith_1.2.3-9sarge4_alpha.deb stable/main/binary-alpha/libstonith-dev_1.2.3-9sarge4_alpha.deb heartbeat (1.2.3-9sarge4) stable; urgency=low * Sarge-Proposed-Updates upload by maintainer * Fix various bugs that render the stonith subsystem unusable (closes: #328458) Patches taken verbatim from upstream: 12-fd-leak.patch,13-oflimits-move.patch Patches backported from upstream: 14-close_loop.patch stable/main/binary-i386/libpils-dev_1.2.3-9sarge4_i386.deb stable/main/binary-i386/libpils0_1.2.3-9sarge4_i386.deb stable/main/binary-i386/heartbeat_1.2.3-9sarge4_i386.deb stable/main/binary-all/ldirectord_1.2.3-9sarge4_all.deb stable/main/binary-i386/stonith_1.2.3-9sarge4_i386.deb stable/main/source/heartbeat_1.2.3-9sarge4.dsc stable/main/source/heartbeat_1.2.3-9sarge4.diff.gz stable/main/binary-i386/heartbeat-dev_1.2.3-9sarge4_i386.deb stable/main/binary-i386/libstonith-dev_1.2.3-9sarge4_i386.deb stable/main/binary-i386/libstonith0_1.2.3-9sarge4_i386.deb heartbeat (1.2.3-9sarge4) stable; urgency=low * Sarge-Proposed-Updates upload by maintainer * Fix various bugs that render the stonith subsystem unusable (closes: #328458) Patches taken verbatim from upstream: 12-fd-leak.patch,13-oflimits-move.patch Patches backported from upstream: 14-close_loop.patch stable/main/binary-sparc/gzip_1.3.5-10sarge1_sparc.deb gzip (1.3.5-10sarge1) stable; urgency=low * merge patch from Matt Zimmerman for futex hang due to improper signal handling, closes: #310053, #315612 * backport to stable since this problem affects several debian.org servers stable/main/binary-s390/gzip_1.3.5-10sarge1_s390.deb gzip (1.3.5-10sarge1) stable; urgency=low * merge patch from Matt Zimmerman for futex hang due to improper signal handling, closes: #310053, #315612 * backport to stable since this problem affects several debian.org servers stable/main/binary-powerpc/gzip_1.3.5-10sarge1_powerpc.deb gzip (1.3.5-10sarge1) stable; urgency=low * merge patch from Matt Zimmerman for futex hang due to improper signal handling, closes: #310053, #315612 * backport to stable since this problem affects several debian.org servers stable/main/binary-mipsel/gzip_1.3.5-10sarge1_mipsel.deb gzip (1.3.5-10sarge1) stable; urgency=low * merge patch from Matt Zimmerman for futex hang due to improper signal handling, closes: #310053, #315612 * backport to stable since this problem affects several debian.org servers stable/main/binary-mips/gzip_1.3.5-10sarge1_mips.deb gzip (1.3.5-10sarge1) stable; urgency=low * merge patch from Matt Zimmerman for futex hang due to improper signal handling, closes: #310053, #315612 * backport to stable since this problem affects several debian.org servers stable/main/binary-m68k/gzip_1.3.5-10sarge1_m68k.deb gzip (1.3.5-10sarge1) stable; urgency=low * merge patch from Matt Zimmerman for futex hang due to improper signal handling, closes: #310053, #315612 * backport to stable since this problem affects several debian.org servers stable/main/binary-ia64/gzip_1.3.5-10sarge1_ia64.deb gzip (1.3.5-10sarge1) stable; urgency=low * merge patch from Matt Zimmerman for futex hang due to improper signal handling, closes: #310053, #315612 * backport to stable since this problem affects several debian.org servers stable/main/binary-hppa/gzip_1.3.5-10sarge1_hppa.deb gzip (1.3.5-10sarge1) stable; urgency=low * merge patch from Matt Zimmerman for futex hang due to improper signal handling, closes: #310053, #315612 * backport to stable since this problem affects several debian.org servers stable/main/binary-arm/gzip_1.3.5-10sarge1_arm.deb gzip (1.3.5-10sarge1) stable; urgency=low * merge patch from Matt Zimmerman for futex hang due to improper signal handling, closes: #310053, #315612 * backport to stable since this problem affects several debian.org servers stable/main/binary-alpha/gzip_1.3.5-10sarge1_alpha.deb gzip (1.3.5-10sarge1) stable; urgency=low * merge patch from Matt Zimmerman for futex hang due to improper signal handling, closes: #310053, #315612 * backport to stable since this problem affects several debian.org servers stable/main/source/gzip_1.3.5-10sarge1.diff.gz stable/main/source/gzip_1.3.5-10sarge1.dsc stable/main/binary-i386/gzip_1.3.5-10sarge1_i386.deb gzip (1.3.5-10sarge1) stable; urgency=low * merge patch from Matt Zimmerman for futex hang due to improper signal handling, closes: #310053, #315612 * backport to stable since this problem affects several debian.org servers stable/main/binary-sparc/gtkdiskfree_1.9.3-4sarge1_sparc.deb gtkdiskfree (1.9.3-4sarge1) stable-security; urgency=high * Non-maintainer upload by the Security Team * Backported Gentoo patch to fix insecure temporary file creation [src/mount.c, CAN-2005-2918] stable/main/binary-s390/gtkdiskfree_1.9.3-4sarge1_s390.deb gtkdiskfree (1.9.3-4sarge1) stable-security; urgency=high * Non-maintainer upload by the Security Team * Backported Gentoo patch to fix insecure temporary file creation [src/mount.c, CAN-2005-2918] stable/main/binary-mipsel/gtkdiskfree_1.9.3-4sarge1_mipsel.deb gtkdiskfree (1.9.3-4sarge1) stable-security; urgency=high * Non-maintainer upload by the Security Team * Backported Gentoo patch to fix insecure temporary file creation [src/mount.c, CAN-2005-2918] stable/main/binary-mips/gtkdiskfree_1.9.3-4sarge1_mips.deb gtkdiskfree (1.9.3-4sarge1) stable-security; urgency=high * Non-maintainer upload by the Security Team * Backported Gentoo patch to fix insecure temporary file creation [src/mount.c, CAN-2005-2918] stable/main/binary-m68k/gtkdiskfree_1.9.3-4sarge1_m68k.deb gtkdiskfree (1.9.3-4sarge1) stable-security; urgency=high * Non-maintainer upload by the Security Team * Backported Gentoo patch to fix insecure temporary file creation [src/mount.c, CAN-2005-2918] stable/main/binary-ia64/gtkdiskfree_1.9.3-4sarge1_ia64.deb gtkdiskfree (1.9.3-4sarge1) stable-security; urgency=high * Non-maintainer upload by the Security Team * Backported Gentoo patch to fix insecure temporary file creation [src/mount.c, CAN-2005-2918] stable/main/binary-i386/gtkdiskfree_1.9.3-4sarge1_i386.deb gtkdiskfree (1.9.3-4sarge1) stable-security; urgency=high * Non-maintainer upload by the Security Team * Backported Gentoo patch to fix insecure temporary file creation [src/mount.c, CAN-2005-2918] stable/main/binary-hppa/gtkdiskfree_1.9.3-4sarge1_hppa.deb gtkdiskfree (1.9.3-4sarge1) stable-security; urgency=high * Non-maintainer upload by the Security Team * Backported Gentoo patch to fix insecure temporary file creation [src/mount.c, CAN-2005-2918] stable/main/binary-arm/gtkdiskfree_1.9.3-4sarge1_arm.deb gtkdiskfree (1.9.3-4sarge1) stable-security; urgency=high * Non-maintainer upload by the Security Team * Backported Gentoo patch to fix insecure temporary file creation [src/mount.c, CAN-2005-2918] stable/main/binary-alpha/gtkdiskfree_1.9.3-4sarge1_alpha.deb gtkdiskfree (1.9.3-4sarge1) stable-security; urgency=high * Non-maintainer upload by the Security Team * Backported Gentoo patch to fix insecure temporary file creation [src/mount.c, CAN-2005-2918] stable/main/source/gtkdiskfree_1.9.3-4sarge1.diff.gz stable/main/binary-powerpc/gtkdiskfree_1.9.3-4sarge1_powerpc.deb stable/main/source/gtkdiskfree_1.9.3-4sarge1.dsc gtkdiskfree (1.9.3-4sarge1) stable-security; urgency=high * Non-maintainer upload by the Security Team * Backported Gentoo patch to fix insecure temporary file creation [src/mount.c, CAN-2005-2918] stable/main/binary-sparc/gtk2.0-examples_2.6.4-3.1_sparc.deb stable/main/binary-sparc/gtk2-engines-pixbuf_2.6.4-3.1_sparc.deb stable/main/binary-sparc/libgtk2.0-bin_2.6.4-3.1_sparc.deb stable/main/binary-sparc/libgtk2.0-dev_2.6.4-3.1_sparc.deb stable/main/binary-sparc/libgtk2.0-0_2.6.4-3.1_sparc.deb stable/main/binary-sparc/libgtk2.0-0-dbg_2.6.4-3.1_sparc.deb gtk+2.0 (2.6.4-3.1) stable-security; urgency=high * Non-maintainer upload targetted at stable-security. * SECURITY UPDATE: Arbitrary code execution and DoS. - Add debian/patches/010_xpm-colors-overflow_CVE-2005-3186.patch. . Addresses CVE-2005-3186: Integer overflow in the GTK+ gdk-pixbuf XPM image rendering library in GTK+ 2.4.0 allows attackers to execute arbitrary code via an XPM file with a number of colors that causes insufficient memory to be allocated, which leads to a heap-based buffer overflow. . io-xpm.c: Add check to XPM reader to prevent integer overflow for specially crafted number of colors. . Closes: #339431 - Add debian/patches/011_xpm-colors-loop_CVE-2005-2975.patch. . Addresses CVE-2005-2975: The GTK+ gdk-pixbuf XPM image rendering library allows attackers to cause a denial of service (infinite loop) via a crafted XPM image. . io-xpm.c: Fix endless loop with specially crafted number of colors. stable/main/binary-s390/libgtk2.0-0_2.6.4-3.1_s390.deb stable/main/binary-s390/libgtk2.0-dev_2.6.4-3.1_s390.deb stable/main/binary-s390/libgtk2.0-bin_2.6.4-3.1_s390.deb stable/main/binary-s390/gtk2.0-examples_2.6.4-3.1_s390.deb stable/main/binary-s390/gtk2-engines-pixbuf_2.6.4-3.1_s390.deb stable/main/binary-s390/libgtk2.0-0-dbg_2.6.4-3.1_s390.deb gtk+2.0 (2.6.4-3.1) stable-security; urgency=high * Non-maintainer upload targetted at stable-security. * SECURITY UPDATE: Arbitrary code execution and DoS. - Add debian/patches/010_xpm-colors-overflow_CVE-2005-3186.patch. . Addresses CVE-2005-3186: Integer overflow in the GTK+ gdk-pixbuf XPM image rendering library in GTK+ 2.4.0 allows attackers to execute arbitrary code via an XPM file with a number of colors that causes insufficient memory to be allocated, which leads to a heap-based buffer overflow. . io-xpm.c: Add check to XPM reader to prevent integer overflow for specially crafted number of colors. . Closes: #339431 - Add debian/patches/011_xpm-colors-loop_CVE-2005-2975.patch. . Addresses CVE-2005-2975: The GTK+ gdk-pixbuf XPM image rendering library allows attackers to cause a denial of service (infinite loop) via a crafted XPM image. . io-xpm.c: Fix endless loop with specially crafted number of colors. stable/main/binary-powerpc/libgtk2.0-0-dbg_2.6.4-3.1_powerpc.deb stable/main/binary-powerpc/gtk2.0-examples_2.6.4-3.1_powerpc.deb stable/main/binary-powerpc/gtk2-engines-pixbuf_2.6.4-3.1_powerpc.deb stable/main/binary-powerpc/libgtk2.0-dev_2.6.4-3.1_powerpc.deb stable/main/binary-powerpc/libgtk2.0-bin_2.6.4-3.1_powerpc.deb stable/main/binary-powerpc/libgtk2.0-0_2.6.4-3.1_powerpc.deb gtk+2.0 (2.6.4-3.1) stable-security; urgency=high * Non-maintainer upload targetted at stable-security. * SECURITY UPDATE: Arbitrary code execution and DoS. - Add debian/patches/010_xpm-colors-overflow_CVE-2005-3186.patch. . Addresses CVE-2005-3186: Integer overflow in the GTK+ gdk-pixbuf XPM image rendering library in GTK+ 2.4.0 allows attackers to execute arbitrary code via an XPM file with a number of colors that causes insufficient memory to be allocated, which leads to a heap-based buffer overflow. . io-xpm.c: Add check to XPM reader to prevent integer overflow for specially crafted number of colors. . Closes: #339431 - Add debian/patches/011_xpm-colors-loop_CVE-2005-2975.patch. . Addresses CVE-2005-2975: The GTK+ gdk-pixbuf XPM image rendering library allows attackers to cause a denial of service (infinite loop) via a crafted XPM image. . io-xpm.c: Fix endless loop with specially crafted number of colors. stable/main/binary-mipsel/libgtk2.0-0_2.6.4-3.1_mipsel.deb stable/main/binary-mipsel/libgtk2.0-dev_2.6.4-3.1_mipsel.deb stable/main/binary-mipsel/gtk2.0-examples_2.6.4-3.1_mipsel.deb stable/main/binary-mipsel/gtk2-engines-pixbuf_2.6.4-3.1_mipsel.deb stable/main/binary-mipsel/libgtk2.0-0-dbg_2.6.4-3.1_mipsel.deb stable/main/binary-mipsel/libgtk2.0-bin_2.6.4-3.1_mipsel.deb gtk+2.0 (2.6.4-3.1) stable-security; urgency=high * Non-maintainer upload targetted at stable-security. * SECURITY UPDATE: Arbitrary code execution and DoS. - Add debian/patches/010_xpm-colors-overflow_CVE-2005-3186.patch. . Addresses CVE-2005-3186: Integer overflow in the GTK+ gdk-pixbuf XPM image rendering library in GTK+ 2.4.0 allows attackers to execute arbitrary code via an XPM file with a number of colors that causes insufficient memory to be allocated, which leads to a heap-based buffer overflow. . io-xpm.c: Add check to XPM reader to prevent integer overflow for specially crafted number of colors. . Closes: #339431 - Add debian/patches/011_xpm-colors-loop_CVE-2005-2975.patch. . Addresses CVE-2005-2975: The GTK+ gdk-pixbuf XPM image rendering library allows attackers to cause a denial of service (infinite loop) via a crafted XPM image. . io-xpm.c: Fix endless loop with specially crafted number of colors. stable/main/binary-mips/gtk2-engines-pixbuf_2.6.4-3.1_mips.deb stable/main/binary-mips/libgtk2.0-0-dbg_2.6.4-3.1_mips.deb stable/main/binary-mips/libgtk2.0-dev_2.6.4-3.1_mips.deb stable/main/binary-mips/libgtk2.0-bin_2.6.4-3.1_mips.deb stable/main/binary-mips/gtk2.0-examples_2.6.4-3.1_mips.deb stable/main/binary-mips/libgtk2.0-0_2.6.4-3.1_mips.deb gtk+2.0 (2.6.4-3.1) stable-security; urgency=high * Non-maintainer upload targetted at stable-security. * SECURITY UPDATE: Arbitrary code execution and DoS. - Add debian/patches/010_xpm-colors-overflow_CVE-2005-3186.patch. . Addresses CVE-2005-3186: Integer overflow in the GTK+ gdk-pixbuf XPM image rendering library in GTK+ 2.4.0 allows attackers to execute arbitrary code via an XPM file with a number of colors that causes insufficient memory to be allocated, which leads to a heap-based buffer overflow. . io-xpm.c: Add check to XPM reader to prevent integer overflow for specially crafted number of colors. . Closes: #339431 - Add debian/patches/011_xpm-colors-loop_CVE-2005-2975.patch. . Addresses CVE-2005-2975: The GTK+ gdk-pixbuf XPM image rendering library allows attackers to cause a denial of service (infinite loop) via a crafted XPM image. . io-xpm.c: Fix endless loop with specially crafted number of colors. stable/main/binary-m68k/gtk2.0-examples_2.6.4-3.1_m68k.deb stable/main/binary-m68k/libgtk2.0-bin_2.6.4-3.1_m68k.deb stable/main/binary-m68k/libgtk2.0-0-dbg_2.6.4-3.1_m68k.deb stable/main/binary-m68k/gtk2-engines-pixbuf_2.6.4-3.1_m68k.deb stable/main/binary-m68k/libgtk2.0-0_2.6.4-3.1_m68k.deb stable/main/binary-m68k/libgtk2.0-dev_2.6.4-3.1_m68k.deb gtk+2.0 (2.6.4-3.1) stable-security; urgency=high * Non-maintainer upload targetted at stable-security. * SECURITY UPDATE: Arbitrary code execution and DoS. - Add debian/patches/010_xpm-colors-overflow_CVE-2005-3186.patch. . Addresses CVE-2005-3186: Integer overflow in the GTK+ gdk-pixbuf XPM image rendering library in GTK+ 2.4.0 allows attackers to execute arbitrary code via an XPM file with a number of colors that causes insufficient memory to be allocated, which leads to a heap-based buffer overflow. . io-xpm.c: Add check to XPM reader to prevent integer overflow for specially crafted number of colors. . Closes: #339431 - Add debian/patches/011_xpm-colors-loop_CVE-2005-2975.patch. . Addresses CVE-2005-2975: The GTK+ gdk-pixbuf XPM image rendering library allows attackers to cause a denial of service (infinite loop) via a crafted XPM image. . io-xpm.c: Fix endless loop with specially crafted number of colors. stable/main/binary-ia64/libgtk2.0-0-dbg_2.6.4-3.1_ia64.deb stable/main/binary-ia64/libgtk2.0-bin_2.6.4-3.1_ia64.deb stable/main/binary-ia64/libgtk2.0-0_2.6.4-3.1_ia64.deb stable/main/binary-ia64/libgtk2.0-dev_2.6.4-3.1_ia64.deb stable/main/binary-ia64/gtk2.0-examples_2.6.4-3.1_ia64.deb stable/main/binary-ia64/gtk2-engines-pixbuf_2.6.4-3.1_ia64.deb gtk+2.0 (2.6.4-3.1) stable-security; urgency=high * Non-maintainer upload targetted at stable-security. * SECURITY UPDATE: Arbitrary code execution and DoS. - Add debian/patches/010_xpm-colors-overflow_CVE-2005-3186.patch. . Addresses CVE-2005-3186: Integer overflow in the GTK+ gdk-pixbuf XPM image rendering library in GTK+ 2.4.0 allows attackers to execute arbitrary code via an XPM file with a number of colors that causes insufficient memory to be allocated, which leads to a heap-based buffer overflow. . io-xpm.c: Add check to XPM reader to prevent integer overflow for specially crafted number of colors. . Closes: #339431 - Add debian/patches/011_xpm-colors-loop_CVE-2005-2975.patch. . Addresses CVE-2005-2975: The GTK+ gdk-pixbuf XPM image rendering library allows attackers to cause a denial of service (infinite loop) via a crafted XPM image. . io-xpm.c: Fix endless loop with specially crafted number of colors. stable/main/binary-hppa/gtk2-engines-pixbuf_2.6.4-3.1_hppa.deb stable/main/binary-hppa/gtk2.0-examples_2.6.4-3.1_hppa.deb stable/main/binary-hppa/libgtk2.0-dev_2.6.4-3.1_hppa.deb stable/main/binary-hppa/libgtk2.0-0_2.6.4-3.1_hppa.deb stable/main/binary-hppa/libgtk2.0-0-dbg_2.6.4-3.1_hppa.deb stable/main/binary-hppa/libgtk2.0-bin_2.6.4-3.1_hppa.deb gtk+2.0 (2.6.4-3.1) stable-security; urgency=high * Non-maintainer upload targetted at stable-security. * SECURITY UPDATE: Arbitrary code execution and DoS. - Add debian/patches/010_xpm-colors-overflow_CVE-2005-3186.patch. . Addresses CVE-2005-3186: Integer overflow in the GTK+ gdk-pixbuf XPM image rendering library in GTK+ 2.4.0 allows attackers to execute arbitrary code via an XPM file with a number of colors that causes insufficient memory to be allocated, which leads to a heap-based buffer overflow. . io-xpm.c: Add check to XPM reader to prevent integer overflow for specially crafted number of colors. . Closes: #339431 - Add debian/patches/011_xpm-colors-loop_CVE-2005-2975.patch. . Addresses CVE-2005-2975: The GTK+ gdk-pixbuf XPM image rendering library allows attackers to cause a denial of service (infinite loop) via a crafted XPM image. . io-xpm.c: Fix endless loop with specially crafted number of colors. stable/main/binary-arm/libgtk2.0-bin_2.6.4-3.1_arm.deb stable/main/binary-arm/gtk2.0-examples_2.6.4-3.1_arm.deb stable/main/binary-arm/libgtk2.0-dev_2.6.4-3.1_arm.deb stable/main/binary-arm/libgtk2.0-0-dbg_2.6.4-3.1_arm.deb stable/main/binary-arm/gtk2-engines-pixbuf_2.6.4-3.1_arm.deb stable/main/binary-arm/libgtk2.0-0_2.6.4-3.1_arm.deb gtk+2.0 (2.6.4-3.1) stable-security; urgency=high * Non-maintainer upload targetted at stable-security. * SECURITY UPDATE: Arbitrary code execution and DoS. - Add debian/patches/010_xpm-colors-overflow_CVE-2005-3186.patch. . Addresses CVE-2005-3186: Integer overflow in the GTK+ gdk-pixbuf XPM image rendering library in GTK+ 2.4.0 allows attackers to execute arbitrary code via an XPM file with a number of colors that causes insufficient memory to be allocated, which leads to a heap-based buffer overflow. . io-xpm.c: Add check to XPM reader to prevent integer overflow for specially crafted number of colors. . Closes: #339431 - Add debian/patches/011_xpm-colors-loop_CVE-2005-2975.patch. . Addresses CVE-2005-2975: The GTK+ gdk-pixbuf XPM image rendering library allows attackers to cause a denial of service (infinite loop) via a crafted XPM image. . io-xpm.c: Fix endless loop with specially crafted number of colors. stable/main/binary-alpha/libgtk2.0-dev_2.6.4-3.1_alpha.deb stable/main/binary-alpha/libgtk2.0-bin_2.6.4-3.1_alpha.deb stable/main/binary-alpha/libgtk2.0-0_2.6.4-3.1_alpha.deb stable/main/binary-alpha/gtk2.0-examples_2.6.4-3.1_alpha.deb stable/main/binary-alpha/gtk2-engines-pixbuf_2.6.4-3.1_alpha.deb stable/main/binary-alpha/libgtk2.0-0-dbg_2.6.4-3.1_alpha.deb gtk+2.0 (2.6.4-3.1) stable-security; urgency=high * Non-maintainer upload targetted at stable-security. * SECURITY UPDATE: Arbitrary code execution and DoS. - Add debian/patches/010_xpm-colors-overflow_CVE-2005-3186.patch. . Addresses CVE-2005-3186: Integer overflow in the GTK+ gdk-pixbuf XPM image rendering library in GTK+ 2.4.0 allows attackers to execute arbitrary code via an XPM file with a number of colors that causes insufficient memory to be allocated, which leads to a heap-based buffer overflow. . io-xpm.c: Add check to XPM reader to prevent integer overflow for specially crafted number of colors. . Closes: #339431 - Add debian/patches/011_xpm-colors-loop_CVE-2005-2975.patch. . Addresses CVE-2005-2975: The GTK+ gdk-pixbuf XPM image rendering library allows attackers to cause a denial of service (infinite loop) via a crafted XPM image. . io-xpm.c: Fix endless loop with specially crafted number of colors. stable/main/binary-all/libgtk2.0-doc_2.6.4-3.1_all.deb stable/main/source/gtk+2.0_2.6.4-3.1.diff.gz stable/main/binary-all/libgtk2.0-common_2.6.4-3.1_all.deb stable/main/binary-i386/libgtk2.0-bin_2.6.4-3.1_i386.deb stable/main/binary-i386/libgtk2.0-0_2.6.4-3.1_i386.deb stable/main/source/gtk+2.0_2.6.4-3.1.dsc stable/main/binary-i386/gtk2-engines-pixbuf_2.6.4-3.1_i386.deb stable/main/binary-i386/libgtk2.0-dev_2.6.4-3.1_i386.deb stable/main/binary-i386/libgtk2.0-0-dbg_2.6.4-3.1_i386.deb stable/main/binary-i386/gtk2.0-examples_2.6.4-3.1_i386.deb gtk+2.0 (2.6.4-3.1) stable-security; urgency=high * Non-maintainer upload targetted at stable-security. * SECURITY UPDATE: Arbitrary code execution and DoS. - Add debian/patches/010_xpm-colors-overflow_CVE-2005-3186.patch. . Addresses CVE-2005-3186: Integer overflow in the GTK+ gdk-pixbuf XPM image rendering library in GTK+ 2.4.0 allows attackers to execute arbitrary code via an XPM file with a number of colors that causes insufficient memory to be allocated, which leads to a heap-based buffer overflow. . io-xpm.c: Add check to XPM reader to prevent integer overflow for specially crafted number of colors. . Closes: #339431 - Add debian/patches/011_xpm-colors-loop_CVE-2005-2975.patch. . Addresses CVE-2005-2975: The GTK+ gdk-pixbuf XPM image rendering library allows attackers to cause a denial of service (infinite loop) via a crafted XPM image. . io-xpm.c: Fix endless loop with specially crafted number of colors. stable/main/binary-sparc/graphviz-dev_2.2.1-1sarge1_sparc.deb stable/main/binary-sparc/graphviz-doc_2.2.1-1sarge1_sparc.deb stable/main/binary-sparc/graphviz_2.2.1-1sarge1_sparc.deb graphviz (2.2.1-1sarge1) stable-security; urgency=high * Non-maintainer upload by the Security Team * Applied upstream patch to fix insecure temporary file creation [dotty/dotty.lefty, CAN-2005-2965] stable/main/binary-s390/graphviz_2.2.1-1sarge1_s390.deb stable/main/binary-s390/graphviz-doc_2.2.1-1sarge1_s390.deb stable/main/binary-s390/graphviz-dev_2.2.1-1sarge1_s390.deb graphviz (2.2.1-1sarge1) stable-security; urgency=high * Non-maintainer upload by the Security Team * Applied upstream patch to fix insecure temporary file creation [dotty/dotty.lefty, CAN-2005-2965] stable/main/binary-mipsel/graphviz_2.2.1-1sarge1_mipsel.deb stable/main/binary-mipsel/graphviz-doc_2.2.1-1sarge1_mipsel.deb stable/main/binary-mipsel/graphviz-dev_2.2.1-1sarge1_mipsel.deb graphviz (2.2.1-1sarge1) stable-security; urgency=high * Non-maintainer upload by the Security Team * Applied upstream patch to fix insecure temporary file creation [dotty/dotty.lefty, CAN-2005-2965] stable/main/binary-mips/graphviz_2.2.1-1sarge1_mips.deb stable/main/binary-mips/graphviz-dev_2.2.1-1sarge1_mips.deb stable/main/binary-mips/graphviz-doc_2.2.1-1sarge1_mips.deb graphviz (2.2.1-1sarge1) stable-security; urgency=high * Non-maintainer upload by the Security Team * Applied upstream patch to fix insecure temporary file creation [dotty/dotty.lefty, CAN-2005-2965] stable/main/binary-m68k/graphviz-dev_2.2.1-1sarge1_m68k.deb stable/main/binary-m68k/graphviz_2.2.1-1sarge1_m68k.deb stable/main/binary-m68k/graphviz-doc_2.2.1-1sarge1_m68k.deb graphviz (2.2.1-1sarge1) stable-security; urgency=high * Non-maintainer upload by the Security Team * Applied upstream patch to fix insecure temporary file creation [dotty/dotty.lefty, CAN-2005-2965] stable/main/binary-ia64/graphviz_2.2.1-1sarge1_ia64.deb stable/main/binary-ia64/graphviz-doc_2.2.1-1sarge1_ia64.deb stable/main/binary-ia64/graphviz-dev_2.2.1-1sarge1_ia64.deb graphviz (2.2.1-1sarge1) stable-security; urgency=high * Non-maintainer upload by the Security Team * Applied upstream patch to fix insecure temporary file creation [dotty/dotty.lefty, CAN-2005-2965] stable/main/binary-i386/graphviz-doc_2.2.1-1sarge1_i386.deb stable/main/binary-i386/graphviz-dev_2.2.1-1sarge1_i386.deb stable/main/binary-i386/graphviz_2.2.1-1sarge1_i386.deb graphviz (2.2.1-1sarge1) stable-security; urgency=high * Non-maintainer upload by the Security Team * Applied upstream patch to fix insecure temporary file creation [dotty/dotty.lefty, CAN-2005-2965] stable/main/binary-hppa/graphviz_2.2.1-1sarge1_hppa.deb stable/main/binary-hppa/graphviz-dev_2.2.1-1sarge1_hppa.deb stable/main/binary-hppa/graphviz-doc_2.2.1-1sarge1_hppa.deb graphviz (2.2.1-1sarge1) stable-security; urgency=high * Non-maintainer upload by the Security Team * Applied upstream patch to fix insecure temporary file creation [dotty/dotty.lefty, CAN-2005-2965] stable/main/binary-arm/graphviz_2.2.1-1sarge1_arm.deb stable/main/binary-arm/graphviz-doc_2.2.1-1sarge1_arm.deb stable/main/binary-arm/graphviz-dev_2.2.1-1sarge1_arm.deb graphviz (2.2.1-1sarge1) stable-security; urgency=high * Non-maintainer upload by the Security Team * Applied upstream patch to fix insecure temporary file creation [dotty/dotty.lefty, CAN-2005-2965] stable/main/binary-alpha/graphviz-doc_2.2.1-1sarge1_alpha.deb stable/main/binary-alpha/graphviz-dev_2.2.1-1sarge1_alpha.deb stable/main/binary-alpha/graphviz_2.2.1-1sarge1_alpha.deb graphviz (2.2.1-1sarge1) stable-security; urgency=high * Non-maintainer upload by the Security Team * Applied upstream patch to fix insecure temporary file creation [dotty/dotty.lefty, CAN-2005-2965] stable/main/source/graphviz_2.2.1-1sarge1.diff.gz stable/main/binary-powerpc/graphviz-dev_2.2.1-1sarge1_powerpc.deb stable/main/source/graphviz_2.2.1-1sarge1.dsc stable/main/binary-powerpc/graphviz_2.2.1-1sarge1_powerpc.deb stable/main/binary-powerpc/graphviz-doc_2.2.1-1sarge1_powerpc.deb graphviz (2.2.1-1sarge1) stable-security; urgency=high * Non-maintainer upload by the Security Team * Applied upstream patch to fix insecure temporary file creation [dotty/dotty.lefty, CAN-2005-2965] stable/main/binary-sparc/gpsdrive_2.09-2sarge1_sparc.deb gpsdrive (2.09-2sarge1) stable-security; urgency=high * Non-maintainer upload by the Security Team * Corrected format string to fix arbitrary code execution [src/friendsd.c, CVE-2005-3523] stable/main/binary-s390/gpsdrive_2.09-2sarge1_s390.deb gpsdrive (2.09-2sarge1) stable-security; urgency=high * Non-maintainer upload by the Security Team * Corrected format string to fix arbitrary code execution [src/friendsd.c, CVE-2005-3523] stable/main/binary-mipsel/gpsdrive_2.09-2sarge1_mipsel.deb gpsdrive (2.09-2sarge1) stable-security; urgency=high * Non-maintainer upload by the Security Team * Corrected format string to fix arbitrary code execution [src/friendsd.c, CVE-2005-3523] stable/main/binary-mips/gpsdrive_2.09-2sarge1_mips.deb gpsdrive (2.09-2sarge1) stable-security; urgency=high * Non-maintainer upload by the Security Team * Corrected format string to fix arbitrary code execution [src/friendsd.c, CVE-2005-3523] stable/main/binary-m68k/gpsdrive_2.09-2sarge1_m68k.deb gpsdrive (2.09-2sarge1) stable-security; urgency=high * Non-maintainer upload by the Security Team * Corrected format string to fix arbitrary code execution [src/friendsd.c, CVE-2005-3523] stable/main/binary-ia64/gpsdrive_2.09-2sarge1_ia64.deb gpsdrive (2.09-2sarge1) stable-security; urgency=high * Non-maintainer upload by the Security Team * Corrected format string to fix arbitrary code execution [src/friendsd.c, CVE-2005-3523] stable/main/binary-i386/gpsdrive_2.09-2sarge1_i386.deb gpsdrive (2.09-2sarge1) stable-security; urgency=high * Non-maintainer upload by the Security Team * Corrected format string to fix arbitrary code execution [src/friendsd.c, CVE-2005-3523] stable/main/binary-hppa/gpsdrive_2.09-2sarge1_hppa.deb gpsdrive (2.09-2sarge1) stable-security; urgency=high * Non-maintainer upload by the Security Team * Corrected format string to fix arbitrary code execution [src/friendsd.c, CVE-2005-3523] stable/main/binary-arm/gpsdrive_2.09-2sarge1_arm.deb gpsdrive (2.09-2sarge1) stable-security; urgency=high * Non-maintainer upload by the Security Team * Corrected format string to fix arbitrary code execution [src/friendsd.c, CVE-2005-3523] stable/main/binary-alpha/gpsdrive_2.09-2sarge1_alpha.deb gpsdrive (2.09-2sarge1) stable-security; urgency=high * Non-maintainer upload by the Security Team * Corrected format string to fix arbitrary code execution [src/friendsd.c, CVE-2005-3523] stable/main/binary-powerpc/gpsdrive_2.09-2sarge1_powerpc.deb stable/main/source/gpsdrive_2.09-2sarge1.dsc stable/main/source/gpsdrive_2.09-2sarge1.diff.gz gpsdrive (2.09-2sarge1) stable-security; urgency=high * Non-maintainer upload by the Security Team * Corrected format string to fix arbitrary code execution [src/friendsd.c, CVE-2005-3523] stable/main/binary-sparc/gpr_0.9deb-4sarge_sparc.deb gpr (0.9deb-4sarge) stable; urgency=low * the diversion of lpr with gpr did not work (it would loop endlessly) (curiosly the people who noted did not file a bug report) in that case gpr would become completly useless; I uploaded 0.9deb-5 into sarge before the freeze but it did not make it in :-( :-( and I did not that :-( :-( so this upload is for sarge. I also disabled the automatic update of config.{sub,guess} for paranoia stable/main/binary-s390/gpr_0.9deb-4sarge_s390.deb gpr (0.9deb-4sarge) stable; urgency=low * the diversion of lpr with gpr did not work (it would loop endlessly) (curiosly the people who noted did not file a bug report) in that case gpr would become completly useless; I uploaded 0.9deb-5 into sarge before the freeze but it did not make it in :-( :-( and I did not that :-( :-( so this upload is for sarge. I also disabled the automatic update of config.{sub,guess} for paranoia stable/main/binary-powerpc/gpr_0.9deb-4sarge_powerpc.deb gpr (0.9deb-4sarge) stable; urgency=low * the diversion of lpr with gpr did not work (it would loop endlessly) (curiosly the people who noted did not file a bug report) in that case gpr would become completly useless; I uploaded 0.9deb-5 into sarge before the freeze but it did not make it in :-( :-( and I did not that :-( :-( so this upload is for sarge. I also disabled the automatic update of config.{sub,guess} for paranoia stable/main/binary-mipsel/gpr_0.9deb-4sarge_mipsel.deb gpr (0.9deb-4sarge) stable; urgency=low * the diversion of lpr with gpr did not work (it would loop endlessly) (curiosly the people who noted did not file a bug report) in that case gpr would become completly useless; I uploaded 0.9deb-5 into sarge before the freeze but it did not make it in :-( :-( and I did not that :-( :-( so this upload is for sarge. I also disabled the automatic update of config.{sub,guess} for paranoia stable/main/binary-mips/gpr_0.9deb-4sarge_mips.deb gpr (0.9deb-4sarge) stable; urgency=low * the diversion of lpr with gpr did not work (it would loop endlessly) (curiosly the people who noted did not file a bug report) in that case gpr would become completly useless; I uploaded 0.9deb-5 into sarge before the freeze but it did not make it in :-( :-( and I did not that :-( :-( so this upload is for sarge. I also disabled the automatic update of config.{sub,guess} for paranoia stable/main/binary-m68k/gpr_0.9deb-4sarge_m68k.deb gpr (0.9deb-4sarge) stable; urgency=low * the diversion of lpr with gpr did not work (it would loop endlessly) (curiosly the people who noted did not file a bug report) in that case gpr would become completly useless; I uploaded 0.9deb-5 into sarge before the freeze but it did not make it in :-( :-( and I did not that :-( :-( so this upload is for sarge. I also disabled the automatic update of config.{sub,guess} for paranoia stable/main/binary-ia64/gpr_0.9deb-4sarge_ia64.deb gpr (0.9deb-4sarge) stable; urgency=low * the diversion of lpr with gpr did not work (it would loop endlessly) (curiosly the people who noted did not file a bug report) in that case gpr would become completly useless; I uploaded 0.9deb-5 into sarge before the freeze but it did not make it in :-( :-( and I did not that :-( :-( so this upload is for sarge. I also disabled the automatic update of config.{sub,guess} for paranoia stable/main/binary-hppa/gpr_0.9deb-4sarge_hppa.deb gpr (0.9deb-4sarge) stable; urgency=low * the diversion of lpr with gpr did not work (it would loop endlessly) (curiosly the people who noted did not file a bug report) in that case gpr would become completly useless; I uploaded 0.9deb-5 into sarge before the freeze but it did not make it in :-( :-( and I did not that :-( :-( so this upload is for sarge. I also disabled the automatic update of config.{sub,guess} for paranoia stable/main/binary-arm/gpr_0.9deb-4sarge_arm.deb gpr (0.9deb-4sarge) stable; urgency=low * the diversion of lpr with gpr did not work (it would loop endlessly) (curiosly the people who noted did not file a bug report) in that case gpr would become completly useless; I uploaded 0.9deb-5 into sarge before the freeze but it did not make it in :-( :-( and I did not that :-( :-( so this upload is for sarge. I also disabled the automatic update of config.{sub,guess} for paranoia stable/main/binary-alpha/gpr_0.9deb-4sarge_alpha.deb gpr (0.9deb-4sarge) stable; urgency=low * the diversion of lpr with gpr did not work (it would loop endlessly) (curiosly the people who noted did not file a bug report) in that case gpr would become completly useless; I uploaded 0.9deb-5 into sarge before the freeze but it did not make it in :-( :-( and I did not that :-( :-( so this upload is for sarge. I also disabled the automatic update of config.{sub,guess} for paranoia stable/main/source/gpr_0.9deb-4sarge.dsc stable/main/source/gpr_0.9deb-4sarge.tar.gz stable/main/binary-i386/gpr_0.9deb-4sarge_i386.deb gpr (0.9deb-4sarge) stable; urgency=low * the diversion of lpr with gpr did not work (it would loop endlessly) (curiosly the people who noted did not file a bug report) in that case gpr would become completly useless; I uploaded 0.9deb-5 into sarge before the freeze but it did not make it in :-( :-( and I did not that :-( :-( so this upload is for sarge. I also disabled the automatic update of config.{sub,guess} for paranoia stable/main/binary-sparc/gopher_3.0.7sarge2_sparc.deb gopher (3.0.7sarge2) stable-security; urgency=high * Non-maintainer upload by the Security Team * Fix buffer overflow when dealing with malicious servers. [CAN-2005-2772] stable/main/binary-s390/gopher_3.0.7sarge2_s390.deb gopher (3.0.7sarge2) stable-security; urgency=high * Non-maintainer upload by the Security Team * Fix buffer overflow when dealing with malicious servers. [CAN-2005-2772] stable/main/binary-powerpc/gopher_3.0.7sarge2_powerpc.deb gopher (3.0.7sarge2) stable-security; urgency=high * Non-maintainer upload by the Security Team * Fix buffer overflow when dealing with malicious servers. [CAN-2005-2772] stable/main/binary-mipsel/gopher_3.0.7sarge2_mipsel.deb gopher (3.0.7sarge2) stable-security; urgency=high * Non-maintainer upload by the Security Team * Fix buffer overflow when dealing with malicious servers. [CAN-2005-2772] stable/main/binary-mips/gopher_3.0.7sarge2_mips.deb gopher (3.0.7sarge2) stable-security; urgency=high * Non-maintainer upload by the Security Team * Fix buffer overflow when dealing with malicious servers. [CAN-2005-2772] stable/main/binary-m68k/gopher_3.0.7sarge2_m68k.deb gopher (3.0.7sarge2) stable-security; urgency=high * Non-maintainer upload by the Security Team * Fix buffer overflow when dealing with malicious servers. [CAN-2005-2772] stable/main/binary-ia64/gopher_3.0.7sarge2_ia64.deb gopher (3.0.7sarge2) stable-security; urgency=high * Non-maintainer upload by the Security Team * Fix buffer overflow when dealing with malicious servers. [CAN-2005-2772] stable/main/binary-hppa/gopher_3.0.7sarge2_hppa.deb gopher (3.0.7sarge2) stable-security; urgency=high * Non-maintainer upload by the Security Team * Fix buffer overflow when dealing with malicious servers. [CAN-2005-2772] stable/main/binary-arm/gopher_3.0.7sarge2_arm.deb gopher (3.0.7sarge2) stable-security; urgency=high * Non-maintainer upload by the Security Team * Fix buffer overflow when dealing with malicious servers. [CAN-2005-2772] stable/main/binary-alpha/gopher_3.0.7sarge2_alpha.deb gopher (3.0.7sarge2) stable-security; urgency=high * Non-maintainer upload by the Security Team * Fix buffer overflow when dealing with malicious servers. [CAN-2005-2772] stable/main/source/gopher_3.0.7sarge2.tar.gz stable/main/source/gopher_3.0.7sarge2.dsc stable/main/binary-i386/gopher_3.0.7sarge2_i386.deb gopher (3.0.7sarge2) stable-security; urgency=high * Non-maintainer upload by the Security Team * Fix buffer overflow when dealing with malicious servers. [CAN-2005-2772] stable/main/source/gnump3d_2.9.3-1sarge3.dsc stable/main/binary-all/gnump3d_2.9.3-1sarge3_all.deb stable/main/source/gnump3d_2.9.3-1sarge3.diff.gz gnump3d (2.9.3-1sarge3) stable-security; urgency=high * Non-maintainer upload by the Security Team. * Avoid path traversal exploitation via theme parameters. [CVE-2005-3355] * Avoid insecure usages of files in /tmp [CVE-2005-3349] stable/main/binary-sparc/gnome-system-monitor_2.8.1-4_sparc.deb gnome-system-monitor (2.8.1-4) stable; urgency=medium * Stable upload targetted at Sarge. * Add a trivial patch from upstream fixing crashes when special filesystem types are used on a system. [debian/patches/50_special-fs-segfault.patch] (Closes: #289384, #311714) stable/main/binary-s390/gnome-system-monitor_2.8.1-4_s390.deb gnome-system-monitor (2.8.1-4) stable; urgency=medium * Stable upload targetted at Sarge. * Add a trivial patch from upstream fixing crashes when special filesystem types are used on a system. [debian/patches/50_special-fs-segfault.patch] (Closes: #289384, #311714) stable/main/binary-powerpc/gnome-system-monitor_2.8.1-4_powerpc.deb gnome-system-monitor (2.8.1-4) stable; urgency=medium * Stable upload targetted at Sarge. * Add a trivial patch from upstream fixing crashes when special filesystem types are used on a system. [debian/patches/50_special-fs-segfault.patch] (Closes: #289384, #311714) stable/main/binary-mipsel/gnome-system-monitor_2.8.1-4_mipsel.deb gnome-system-monitor (2.8.1-4) stable; urgency=medium * Stable upload targetted at Sarge. * Add a trivial patch from upstream fixing crashes when special filesystem types are used on a system. [debian/patches/50_special-fs-segfault.patch] (Closes: #289384, #311714) stable/main/binary-mips/gnome-system-monitor_2.8.1-4_mips.deb gnome-system-monitor (2.8.1-4) stable; urgency=medium * Stable upload targetted at Sarge. * Add a trivial patch from upstream fixing crashes when special filesystem types are used on a system. [debian/patches/50_special-fs-segfault.patch] (Closes: #289384, #311714) stable/main/binary-m68k/gnome-system-monitor_2.8.1-4_m68k.deb gnome-system-monitor (2.8.1-4) stable; urgency=medium * Stable upload targetted at Sarge. * Add a trivial patch from upstream fixing crashes when special filesystem types are used on a system. [debian/patches/50_special-fs-segfault.patch] (Closes: #289384, #311714) stable/main/binary-ia64/gnome-system-monitor_2.8.1-4_ia64.deb gnome-system-monitor (2.8.1-4) stable; urgency=medium * Stable upload targetted at Sarge. * Add a trivial patch from upstream fixing crashes when special filesystem types are used on a system. [debian/patches/50_special-fs-segfault.patch] (Closes: #289384, #311714) stable/main/binary-hppa/gnome-system-monitor_2.8.1-4_hppa.deb gnome-system-monitor (2.8.1-4) stable; urgency=medium * Stable upload targetted at Sarge. * Add a trivial patch from upstream fixing crashes when special filesystem types are used on a system. [debian/patches/50_special-fs-segfault.patch] (Closes: #289384, #311714) stable/main/binary-arm/gnome-system-monitor_2.8.1-4_arm.deb gnome-system-monitor (2.8.1-4) stable; urgency=medium * Stable upload targetted at Sarge. * Add a trivial patch from upstream fixing crashes when special filesystem types are used on a system. [debian/patches/50_special-fs-segfault.patch] (Closes: #289384, #311714) stable/main/binary-alpha/gnome-system-monitor_2.8.1-4_alpha.deb gnome-system-monitor (2.8.1-4) stable; urgency=medium * Stable upload targetted at Sarge. * Add a trivial patch from upstream fixing crashes when special filesystem types are used on a system. [debian/patches/50_special-fs-segfault.patch] (Closes: #289384, #311714) stable/main/source/gnome-system-monitor_2.8.1-4.diff.gz stable/main/binary-i386/gnome-system-monitor_2.8.1-4_i386.deb stable/main/source/gnome-system-monitor_2.8.1-4.dsc gnome-system-monitor (2.8.1-4) stable; urgency=medium * Stable upload targetted at Sarge. * Add a trivial patch from upstream fixing crashes when special filesystem types are used on a system. [debian/patches/50_special-fs-segfault.patch] (Closes: #289384, #311714) stable/main/source/gedit_2.8.3-4sarge1.diff.gz stable/main/source/gedit_2.8.3-4sarge1.dsc stable/main/binary-all/gedit-dev_2.8.3-4sarge1_all.deb stable/main/binary-all/gedit-common_2.8.3-4sarge1_all.deb stable/main/binary-i386/gedit_2.8.3-4sarge1_i386.deb gedit (2.8.3-4sarge1) stable-security; urgency=high * Non-maintainer upload by The Security Team. * Fix format string vulnerabilities in calls to gtk_message_dialog_new(), which is possibly remotely exploitable via specially crafted file names or URLs. References: - CVE: CAN-2005-1686, <http://www.cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2005-1686> - GNOME bug report: <http://bugzilla.gnome.org/show_bug.cgi?id=306800> stable/main/binary-sparc/libgdk-pixbuf-gnome2_0.22.0-8.1_sparc.deb stable/main/binary-sparc/libgdk-pixbuf-gnome-dev_0.22.0-8.1_sparc.deb stable/main/binary-sparc/libgdk-pixbuf-dev_0.22.0-8.1_sparc.deb stable/main/binary-sparc/libgdk-pixbuf2_0.22.0-8.1_sparc.deb gdk-pixbuf (0.22.0-8.1) stable-security; urgency=high * Non-maintainer upload targetted at stable-security. * SECURITY UPDATE: Arbitrary code execution and DoS. (Closes: #339458) - Add check to XPM reader to prevent integer overflow for specially crafted number of colors. [gdk-pixbuf/io-xpm.c] [CVE-2005-3186] - Fix endless loop with specially crafted number of colors. [gdk-pixbuf/io-xpm.c] [CVE-2005-2975] - Fixes integer overflow by allocating GdkPixbuf via gdk_pixbuf_new() instead of using malloc() and gdk_pixbuf_new_from_data(). [gdk-pixbuf/io-xpm.c] [CVE-2005-2976] stable/main/binary-s390/libgdk-pixbuf-gnome2_0.22.0-8.1_s390.deb stable/main/binary-s390/libgdk-pixbuf-gnome-dev_0.22.0-8.1_s390.deb stable/main/binary-s390/libgdk-pixbuf-dev_0.22.0-8.1_s390.deb stable/main/binary-s390/libgdk-pixbuf2_0.22.0-8.1_s390.deb gdk-pixbuf (0.22.0-8.1) stable-security; urgency=high * Non-maintainer upload targetted at stable-security. * SECURITY UPDATE: Arbitrary code execution and DoS. (Closes: #339458) - Add check to XPM reader to prevent integer overflow for specially crafted number of colors. [gdk-pixbuf/io-xpm.c] [CVE-2005-3186] - Fix endless loop with specially crafted number of colors. [gdk-pixbuf/io-xpm.c] [CVE-2005-2975] - Fixes integer overflow by allocating GdkPixbuf via gdk_pixbuf_new() instead of using malloc() and gdk_pixbuf_new_from_data(). [gdk-pixbuf/io-xpm.c] [CVE-2005-2976] stable/main/binary-powerpc/libgdk-pixbuf2_0.22.0-8.1_powerpc.deb stable/main/binary-powerpc/libgdk-pixbuf-gnome2_0.22.0-8.1_powerpc.deb stable/main/binary-powerpc/libgdk-pixbuf-gnome-dev_0.22.0-8.1_powerpc.deb stable/main/binary-powerpc/libgdk-pixbuf-dev_0.22.0-8.1_powerpc.deb gdk-pixbuf (0.22.0-8.1) stable-security; urgency=high * Non-maintainer upload targetted at stable-security. * SECURITY UPDATE: Arbitrary code execution and DoS. (Closes: #339458) - Add check to XPM reader to prevent integer overflow for specially crafted number of colors. [gdk-pixbuf/io-xpm.c] [CVE-2005-3186] - Fix endless loop with specially crafted number of colors. [gdk-pixbuf/io-xpm.c] [CVE-2005-2975] - Fixes integer overflow by allocating GdkPixbuf via gdk_pixbuf_new() instead of using malloc() and gdk_pixbuf_new_from_data(). [gdk-pixbuf/io-xpm.c] [CVE-2005-2976] stable/main/binary-mipsel/libgdk-pixbuf-dev_0.22.0-8.1_mipsel.deb stable/main/binary-mipsel/libgdk-pixbuf2_0.22.0-8.1_mipsel.deb stable/main/binary-mipsel/libgdk-pixbuf-gnome2_0.22.0-8.1_mipsel.deb stable/main/binary-mipsel/libgdk-pixbuf-gnome-dev_0.22.0-8.1_mipsel.deb gdk-pixbuf (0.22.0-8.1) stable-security; urgency=high * Non-maintainer upload targetted at stable-security. * SECURITY UPDATE: Arbitrary code execution and DoS. (Closes: #339458) - Add check to XPM reader to prevent integer overflow for specially crafted number of colors. [gdk-pixbuf/io-xpm.c] [CVE-2005-3186] - Fix endless loop with specially crafted number of colors. [gdk-pixbuf/io-xpm.c] [CVE-2005-2975] - Fixes integer overflow by allocating GdkPixbuf via gdk_pixbuf_new() instead of using malloc() and gdk_pixbuf_new_from_data(). [gdk-pixbuf/io-xpm.c] [CVE-2005-2976] stable/main/binary-mips/libgdk-pixbuf-dev_0.22.0-8.1_mips.deb stable/main/binary-mips/libgdk-pixbuf2_0.22.0-8.1_mips.deb stable/main/binary-mips/libgdk-pixbuf-gnome-dev_0.22.0-8.1_mips.deb stable/main/binary-mips/libgdk-pixbuf-gnome2_0.22.0-8.1_mips.deb gdk-pixbuf (0.22.0-8.1) stable-security; urgency=high * Non-maintainer upload targetted at stable-security. * SECURITY UPDATE: Arbitrary code execution and DoS. (Closes: #339458) - Add check to XPM reader to prevent integer overflow for specially crafted number of colors. [gdk-pixbuf/io-xpm.c] [CVE-2005-3186] - Fix endless loop with specially crafted number of colors. [gdk-pixbuf/io-xpm.c] [CVE-2005-2975] - Fixes integer overflow by allocating GdkPixbuf via gdk_pixbuf_new() instead of using malloc() and gdk_pixbuf_new_from_data(). [gdk-pixbuf/io-xpm.c] [CVE-2005-2976] stable/main/binary-m68k/libgdk-pixbuf2_0.22.0-8.1_m68k.deb stable/main/binary-m68k/libgdk-pixbuf-dev_0.22.0-8.1_m68k.deb stable/main/binary-m68k/libgdk-pixbuf-gnome2_0.22.0-8.1_m68k.deb stable/main/binary-m68k/libgdk-pixbuf-gnome-dev_0.22.0-8.1_m68k.deb gdk-pixbuf (0.22.0-8.1) stable-security; urgency=high * Non-maintainer upload targetted at stable-security. * SECURITY UPDATE: Arbitrary code execution and DoS. (Closes: #339458) - Add check to XPM reader to prevent integer overflow for specially crafted number of colors. [gdk-pixbuf/io-xpm.c] [CVE-2005-3186] - Fix endless loop with specially crafted number of colors. [gdk-pixbuf/io-xpm.c] [CVE-2005-2975] - Fixes integer overflow by allocating GdkPixbuf via gdk_pixbuf_new() instead of using malloc() and gdk_pixbuf_new_from_data(). [gdk-pixbuf/io-xpm.c] [CVE-2005-2976] stable/main/binary-ia64/libgdk-pixbuf-gnome2_0.22.0-8.1_ia64.deb stable/main/binary-ia64/libgdk-pixbuf-dev_0.22.0-8.1_ia64.deb stable/main/binary-ia64/libgdk-pixbuf2_0.22.0-8.1_ia64.deb stable/main/binary-ia64/libgdk-pixbuf-gnome-dev_0.22.0-8.1_ia64.deb gdk-pixbuf (0.22.0-8.1) stable-security; urgency=high * Non-maintainer upload targetted at stable-security. * SECURITY UPDATE: Arbitrary code execution and DoS. (Closes: #339458) - Add check to XPM reader to prevent integer overflow for specially crafted number of colors. [gdk-pixbuf/io-xpm.c] [CVE-2005-3186] - Fix endless loop with specially crafted number of colors. [gdk-pixbuf/io-xpm.c] [CVE-2005-2975] - Fixes integer overflow by allocating GdkPixbuf via gdk_pixbuf_new() instead of using malloc() and gdk_pixbuf_new_from_data(). [gdk-pixbuf/io-xpm.c] [CVE-2005-2976] stable/main/binary-hppa/libgdk-pixbuf-gnome2_0.22.0-8.1_hppa.deb stable/main/binary-hppa/libgdk-pixbuf2_0.22.0-8.1_hppa.deb stable/main/binary-hppa/libgdk-pixbuf-gnome-dev_0.22.0-8.1_hppa.deb stable/main/binary-hppa/libgdk-pixbuf-dev_0.22.0-8.1_hppa.deb gdk-pixbuf (0.22.0-8.1) stable-security; urgency=high * Non-maintainer upload targetted at stable-security. * SECURITY UPDATE: Arbitrary code execution and DoS. (Closes: #339458) - Add check to XPM reader to prevent integer overflow for specially crafted number of colors. [gdk-pixbuf/io-xpm.c] [CVE-2005-3186] - Fix endless loop with specially crafted number of colors. [gdk-pixbuf/io-xpm.c] [CVE-2005-2975] - Fixes integer overflow by allocating GdkPixbuf via gdk_pixbuf_new() instead of using malloc() and gdk_pixbuf_new_from_data(). [gdk-pixbuf/io-xpm.c] [CVE-2005-2976] stable/main/binary-arm/libgdk-pixbuf-dev_0.22.0-8.1_arm.deb stable/main/binary-arm/libgdk-pixbuf-gnome-dev_0.22.0-8.1_arm.deb stable/main/binary-arm/libgdk-pixbuf2_0.22.0-8.1_arm.deb stable/main/binary-arm/libgdk-pixbuf-gnome2_0.22.0-8.1_arm.deb gdk-pixbuf (0.22.0-8.1) stable-security; urgency=high * Non-maintainer upload targetted at stable-security. * SECURITY UPDATE: Arbitrary code execution and DoS. (Closes: #339458) - Add check to XPM reader to prevent integer overflow for specially crafted number of colors. [gdk-pixbuf/io-xpm.c] [CVE-2005-3186] - Fix endless loop with specially crafted number of colors. [gdk-pixbuf/io-xpm.c] [CVE-2005-2975] - Fixes integer overflow by allocating GdkPixbuf via gdk_pixbuf_new() instead of using malloc() and gdk_pixbuf_new_from_data(). [gdk-pixbuf/io-xpm.c] [CVE-2005-2976] stable/main/binary-alpha/libgdk-pixbuf-gnome-dev_0.22.0-8.1_alpha.deb stable/main/binary-alpha/libgdk-pixbuf2_0.22.0-8.1_alpha.deb stable/main/binary-alpha/libgdk-pixbuf-dev_0.22.0-8.1_alpha.deb stable/main/binary-alpha/libgdk-pixbuf-gnome2_0.22.0-8.1_alpha.deb gdk-pixbuf (0.22.0-8.1) stable-security; urgency=high * Non-maintainer upload targetted at stable-security. * SECURITY UPDATE: Arbitrary code execution and DoS. (Closes: #339458) - Add check to XPM reader to prevent integer overflow for specially crafted number of colors. [gdk-pixbuf/io-xpm.c] [CVE-2005-3186] - Fix endless loop with specially crafted number of colors. [gdk-pixbuf/io-xpm.c] [CVE-2005-2975] - Fixes integer overflow by allocating GdkPixbuf via gdk_pixbuf_new() instead of using malloc() and gdk_pixbuf_new_from_data(). [gdk-pixbuf/io-xpm.c] [CVE-2005-2976] stable/main/binary-i386/libgdk-pixbuf-gnome2_0.22.0-8.1_i386.deb stable/main/binary-i386/libgdk-pixbuf-gnome-dev_0.22.0-8.1_i386.deb stable/main/binary-i386/libgdk-pixbuf-dev_0.22.0-8.1_i386.deb stable/main/source/gdk-pixbuf_0.22.0-8.1.diff.gz stable/main/binary-i386/libgdk-pixbuf2_0.22.0-8.1_i386.deb stable/main/source/gdk-pixbuf_0.22.0-8.1.dsc gdk-pixbuf (0.22.0-8.1) stable-security; urgency=high * Non-maintainer upload targetted at stable-security. * SECURITY UPDATE: Arbitrary code execution and DoS. (Closes: #339458) - Add check to XPM reader to prevent integer overflow for specially crafted number of colors. [gdk-pixbuf/io-xpm.c] [CVE-2005-3186] - Fix endless loop with specially crafted number of colors. [gdk-pixbuf/io-xpm.c] [CVE-2005-2975] - Fixes integer overflow by allocating GdkPixbuf via gdk_pixbuf_new() instead of using malloc() and gdk_pixbuf_new_from_data(). [gdk-pixbuf/io-xpm.c] [CVE-2005-2976] stable/main/binary-sparc/gcvs_1.0final-5sarge1_sparc.deb gcvs (1.0final-5sarge1) stable-security; urgency=high * Non-maintainer upload by the Security Team * Switched to using tempfile to prevent symlink attacks [cvsunix/src/cvsbug.sh, CAN-2005-2693] * Applied patch by Marcus Meissner to prevent symlink attacks via removed files [cvsunix/src/cvsbug.sh, CAN-2005-2693] stable/main/binary-s390/gcvs_1.0final-5sarge1_s390.deb gcvs (1.0final-5sarge1) stable-security; urgency=high * Non-maintainer upload by the Security Team * Switched to using tempfile to prevent symlink attacks [cvsunix/src/cvsbug.sh, CAN-2005-2693] * Applied patch by Marcus Meissner to prevent symlink attacks via removed files [cvsunix/src/cvsbug.sh, CAN-2005-2693] stable/main/binary-powerpc/gcvs_1.0final-5sarge1_powerpc.deb gcvs (1.0final-5sarge1) stable-security; urgency=high * Non-maintainer upload by the Security Team * Switched to using tempfile to prevent symlink attacks [cvsunix/src/cvsbug.sh, CAN-2005-2693] * Applied patch by Marcus Meissner to prevent symlink attacks via removed files [cvsunix/src/cvsbug.sh, CAN-2005-2693] stable/main/binary-mipsel/gcvs_1.0final-5sarge1_mipsel.deb gcvs (1.0final-5sarge1) stable-security; urgency=high * Non-maintainer upload by the Security Team * Switched to using tempfile to prevent symlink attacks [cvsunix/src/cvsbug.sh, CAN-2005-2693] * Applied patch by Marcus Meissner to prevent symlink attacks via removed files [cvsunix/src/cvsbug.sh, CAN-2005-2693] stable/main/binary-mips/gcvs_1.0final-5sarge1_mips.deb gcvs (1.0final-5sarge1) stable-security; urgency=high * Non-maintainer upload by the Security Team * Switched to using tempfile to prevent symlink attacks [cvsunix/src/cvsbug.sh, CAN-2005-2693] * Applied patch by Marcus Meissner to prevent symlink attacks via removed files [cvsunix/src/cvsbug.sh, CAN-2005-2693] stable/main/binary-m68k/gcvs_1.0final-5sarge1_m68k.deb gcvs (1.0final-5sarge1) stable-security; urgency=high * Non-maintainer upload by the Security Team * Switched to using tempfile to prevent symlink attacks [cvsunix/src/cvsbug.sh, CAN-2005-2693] * Applied patch by Marcus Meissner to prevent symlink attacks via removed files [cvsunix/src/cvsbug.sh, CAN-2005-2693] stable/main/binary-ia64/gcvs_1.0final-5sarge1_ia64.deb gcvs (1.0final-5sarge1) stable-security; urgency=high * Non-maintainer upload by the Security Team * Switched to using tempfile to prevent symlink attacks [cvsunix/src/cvsbug.sh, CAN-2005-2693] * Applied patch by Marcus Meissner to prevent symlink attacks via removed files [cvsunix/src/cvsbug.sh, CAN-2005-2693] stable/main/binary-hppa/gcvs_1.0final-5sarge1_hppa.deb gcvs (1.0final-5sarge1) stable-security; urgency=high * Non-maintainer upload by the Security Team * Switched to using tempfile to prevent symlink attacks [cvsunix/src/cvsbug.sh, CAN-2005-2693] * Applied patch by Marcus Meissner to prevent symlink attacks via removed files [cvsunix/src/cvsbug.sh, CAN-2005-2693] stable/main/binary-arm/gcvs_1.0final-5sarge1_arm.deb gcvs (1.0final-5sarge1) stable-security; urgency=high * Non-maintainer upload by the Security Team * Switched to using tempfile to prevent symlink attacks [cvsunix/src/cvsbug.sh, CAN-2005-2693] * Applied patch by Marcus Meissner to prevent symlink attacks via removed files [cvsunix/src/cvsbug.sh, CAN-2005-2693] stable/main/binary-alpha/gcvs_1.0final-5sarge1_alpha.deb gcvs (1.0final-5sarge1) stable-security; urgency=high * Non-maintainer upload by the Security Team * Switched to using tempfile to prevent symlink attacks [cvsunix/src/cvsbug.sh, CAN-2005-2693] * Applied patch by Marcus Meissner to prevent symlink attacks via removed files [cvsunix/src/cvsbug.sh, CAN-2005-2693] stable/main/source/gcvs_1.0final-5sarge1.diff.gz stable/main/binary-i386/gcvs_1.0final-5sarge1_i386.deb stable/main/source/gcvs_1.0final-5sarge1.dsc gcvs (1.0final-5sarge1) stable-security; urgency=high * Non-maintainer upload by the Security Team * Switched to using tempfile to prevent symlink attacks [cvsunix/src/cvsbug.sh, CAN-2005-2693] * Applied patch by Marcus Meissner to prevent symlink attacks via removed files [cvsunix/src/cvsbug.sh, CAN-2005-2693] stable/main/source/gallery_1.5-1sarge1.dsc stable/main/binary-all/gallery_1.5-1sarge1_all.deb stable/main/source/gallery_1.5-1sarge1.diff.gz gallery (1.5-1sarge1) stable-security; urgency=high * Non-Maintainer upload by the Security Team * Backported patch by Michael Schultheiss to fix privilege escalation [classes/postnuke0.7.1/User.php, CAN-2005-2596] stable/main/binary-sparc/gaim_1.2.1-1.4_sparc.deb stable/main/binary-sparc/gaim-dev_1.2.1-1.4_sparc.deb gaim (1:1.2.1-1.4) stable-security; urgency=high * Non-mainatiner upload by the Security Team * Applied upstream patch to fix memory alignment problem [src/protocols/gg/libgg.c, CAN-2005-2370] stable/main/binary-s390/gaim_1.2.1-1.4_s390.deb stable/main/binary-s390/gaim-dev_1.2.1-1.4_s390.deb gaim (1:1.2.1-1.4) stable-security; urgency=high * Non-mainatiner upload by the Security Team * Applied upstream patch to fix memory alignment problem [src/protocols/gg/libgg.c, CAN-2005-2370] stable/main/binary-powerpc/gaim_1.2.1-1.4_powerpc.deb stable/main/binary-powerpc/gaim-dev_1.2.1-1.4_powerpc.deb gaim (1:1.2.1-1.4) stable-security; urgency=high * Non-mainatiner upload by the Security Team * Applied upstream patch to fix memory alignment problem [src/protocols/gg/libgg.c, CAN-2005-2370] stable/main/binary-mipsel/gaim_1.2.1-1.4_mipsel.deb stable/main/binary-mipsel/gaim-dev_1.2.1-1.4_mipsel.deb gaim (1:1.2.1-1.4) stable-security; urgency=high * Non-mainatiner upload by the Security Team * Applied upstream patch to fix memory alignment problem [src/protocols/gg/libgg.c, CAN-2005-2370] stable/main/binary-mips/gaim_1.2.1-1.4_mips.deb stable/main/binary-mips/gaim-dev_1.2.1-1.4_mips.deb gaim (1:1.2.1-1.4) stable-security; urgency=high * Non-mainatiner upload by the Security Team * Applied upstream patch to fix memory alignment problem [src/protocols/gg/libgg.c, CAN-2005-2370] stable/main/binary-m68k/gaim_1.2.1-1.4_m68k.deb stable/main/binary-m68k/gaim-dev_1.2.1-1.4_m68k.deb gaim (1:1.2.1-1.4) stable-security; urgency=high * Non-mainatiner upload by the Security Team * Applied upstream patch to fix memory alignment problem [src/protocols/gg/libgg.c, CAN-2005-2370] stable/main/binary-ia64/gaim_1.2.1-1.4_ia64.deb stable/main/binary-ia64/gaim-dev_1.2.1-1.4_ia64.deb gaim (1:1.2.1-1.4) stable-security; urgency=high * Non-mainatiner upload by the Security Team * Applied upstream patch to fix memory alignment problem [src/protocols/gg/libgg.c, CAN-2005-2370] stable/main/binary-hppa/gaim_1.2.1-1.4_hppa.deb stable/main/binary-hppa/gaim-dev_1.2.1-1.4_hppa.deb gaim (1:1.2.1-1.4) stable-security; urgency=high * Non-mainatiner upload by the Security Team * Applied upstream patch to fix memory alignment problem [src/protocols/gg/libgg.c, CAN-2005-2370] stable/main/binary-arm/gaim-dev_1.2.1-1.4_arm.deb stable/main/binary-arm/gaim_1.2.1-1.4_arm.deb gaim (1:1.2.1-1.4) stable-security; urgency=high * Non-mainatiner upload by the Security Team * Applied upstream patch to fix memory alignment problem [src/protocols/gg/libgg.c, CAN-2005-2370] stable/main/binary-alpha/gaim-dev_1.2.1-1.4_alpha.deb stable/main/binary-alpha/gaim_1.2.1-1.4_alpha.deb gaim (1:1.2.1-1.4) stable-security; urgency=high * Non-mainatiner upload by the Security Team * Applied upstream patch to fix memory alignment problem [src/protocols/gg/libgg.c, CAN-2005-2370] stable/main/binary-all/gaim-data_1.2.1-1.4_all.deb stable/main/binary-i386/gaim-dev_1.2.1-1.4_i386.deb stable/main/source/gaim_1.2.1-1.4.diff.gz stable/main/binary-i386/gaim_1.2.1-1.4_i386.deb stable/main/source/gaim_1.2.1-1.4.dsc gaim (1:1.2.1-1.4) stable-security; urgency=high * Non-mainatiner upload by the Security Team * Applied upstream patch to fix memory alignment problem [src/protocols/gg/libgg.c, CAN-2005-2370] stable/main/binary-s390/fuse-utils_2.2.1-4sarge2_s390.deb stable/main/binary-s390/libfuse-dev_2.2.1-4sarge2_s390.deb stable/main/binary-s390/libfuse2_2.2.1-4sarge2_s390.deb fuse (2.2.1-4sarge2) stable-security; urgency=high * Non-maintainer upload by the Security Team * No changes rebuild due to the release stable/main/binary-powerpc/libfuse-dev_2.2.1-4sarge2_powerpc.deb stable/main/binary-powerpc/fuse-utils_2.2.1-4sarge2_powerpc.deb stable/main/binary-powerpc/libfuse2_2.2.1-4sarge2_powerpc.deb fuse (2.2.1-4sarge2) stable-security; urgency=high * Non-maintainer upload by the Security Team * No changes rebuild due to the release stable/main/binary-mipsel/fuse-utils_2.2.1-4sarge2_mipsel.deb stable/main/binary-mipsel/libfuse2_2.2.1-4sarge2_mipsel.deb stable/main/binary-mipsel/libfuse-dev_2.2.1-4sarge2_mipsel.deb fuse (2.2.1-4sarge2) stable-security; urgency=high * Non-maintainer upload by the Security Team * No changes rebuild due to the release stable/main/binary-mips/fuse-utils_2.2.1-4sarge2_mips.deb stable/main/binary-mips/libfuse-dev_2.2.1-4sarge2_mips.deb stable/main/binary-mips/libfuse2_2.2.1-4sarge2_mips.deb fuse (2.2.1-4sarge2) stable-security; urgency=high * Non-maintainer upload by the Security Team * No changes rebuild due to the release stable/main/binary-m68k/libfuse2_2.2.1-4sarge2_m68k.deb stable/main/binary-m68k/libfuse-dev_2.2.1-4sarge2_m68k.deb stable/main/binary-m68k/fuse-utils_2.2.1-4sarge2_m68k.deb fuse (2.2.1-4sarge2) stable-security; urgency=high * Non-maintainer upload by the Security Team * No changes rebuild due to the release stable/main/binary-ia64/fuse-utils_2.2.1-4sarge2_ia64.deb stable/main/binary-ia64/libfuse2_2.2.1-4sarge2_ia64.deb stable/main/binary-ia64/libfuse-dev_2.2.1-4sarge2_ia64.deb fuse (2.2.1-4sarge2) stable-security; urgency=high * Non-maintainer upload by the Security Team * No changes rebuild due to the release stable/main/binary-i386/libfuse2_2.2.1-4sarge2_i386.deb stable/main/binary-i386/libfuse-dev_2.2.1-4sarge2_i386.deb stable/main/binary-i386/fuse-utils_2.2.1-4sarge2_i386.deb fuse (2.2.1-4sarge2) stable-security; urgency=high * Non-maintainer upload by the Security Team * No changes rebuild due to the release stable/main/binary-hppa/fuse-utils_2.2.1-4sarge2_hppa.deb stable/main/binary-hppa/libfuse-dev_2.2.1-4sarge2_hppa.deb stable/main/binary-hppa/libfuse2_2.2.1-4sarge2_hppa.deb fuse (2.2.1-4sarge2) stable-security; urgency=high * Non-maintainer upload by the Security Team * No changes rebuild due to the release stable/main/binary-arm/fuse-utils_2.2.1-4sarge2_arm.deb stable/main/binary-arm/libfuse2_2.2.1-4sarge2_arm.deb stable/main/binary-arm/libfuse-dev_2.2.1-4sarge2_arm.deb fuse (2.2.1-4sarge2) stable-security; urgency=high * Non-maintainer upload by the Security Team * No changes rebuild due to the release stable/main/binary-alpha/fuse-utils_2.2.1-4sarge2_alpha.deb stable/main/binary-alpha/libfuse2_2.2.1-4sarge2_alpha.deb stable/main/binary-alpha/libfuse-dev_2.2.1-4sarge2_alpha.deb fuse (2.2.1-4sarge2) stable-security; urgency=high * Non-maintainer upload by the Security Team * No changes rebuild due to the release stable/main/binary-sparc/libfuse-dev_2.2.1-4sarge2_sparc.deb stable/main/source/fuse_2.2.1-4sarge2.dsc stable/main/binary-sparc/fuse-utils_2.2.1-4sarge2_sparc.deb stable/main/binary-all/fuse-source_2.2.1-4sarge2_all.deb stable/main/source/fuse_2.2.1-4sarge2.diff.gz stable/main/binary-sparc/libfuse2_2.2.1-4sarge2_sparc.deb fuse (2.2.1-4sarge2) stable-security; urgency=high * Non-maintainer upload by the Security Team * No changes rebuild due to the release stable/main/binary-all/firehol_1.231-2sarge1_all.deb stable/main/source/firehol_1.231-2sarge1.diff.gz stable/main/source/firehol_1.231-2sarge1.dsc firehol (1.231-2sarge1) stable; urgency=low * Fixed lockfile deletion (Closes: #315399,#309651) Backported fix from unstable for sarge r1 stable/main/binary-sparc/fetchmail_6.2.5-12sarge3_sparc.deb fetchmail (6.2.5-12sarge3) stable-security; urgency=high * Non-maintainer upload by the Security Team * Completely reworked the security update(s), which removes a regression and other pieces that accidentally creeped in with the last update * Applied patch by Ludwig Nussel to fix arbitrary code execution [pop3.c, CAN-2005-2335] * Adjusted the umask when opening the config file to prevent information disclosure [fetchmailconf, CVE-2005-3088] stable/main/binary-s390/fetchmail_6.2.5-12sarge3_s390.deb fetchmail (6.2.5-12sarge3) stable-security; urgency=high * Non-maintainer upload by the Security Team * Completely reworked the security update(s), which removes a regression and other pieces that accidentally creeped in with the last update * Applied patch by Ludwig Nussel to fix arbitrary code execution [pop3.c, CAN-2005-2335] * Adjusted the umask when opening the config file to prevent information disclosure [fetchmailconf, CVE-2005-3088] stable/main/binary-mipsel/fetchmail_6.2.5-12sarge3_mipsel.deb fetchmail (6.2.5-12sarge3) stable-security; urgency=high * Non-maintainer upload by the Security Team * Completely reworked the security update(s), which removes a regression and other pieces that accidentally creeped in with the last update * Applied patch by Ludwig Nussel to fix arbitrary code execution [pop3.c, CAN-2005-2335] * Adjusted the umask when opening the config file to prevent information disclosure [fetchmailconf, CVE-2005-3088] stable/main/binary-mips/fetchmail_6.2.5-12sarge3_mips.deb fetchmail (6.2.5-12sarge3) stable-security; urgency=high * Non-maintainer upload by the Security Team * Completely reworked the security update(s), which removes a regression and other pieces that accidentally creeped in with the last update * Applied patch by Ludwig Nussel to fix arbitrary code execution [pop3.c, CAN-2005-2335] * Adjusted the umask when opening the config file to prevent information disclosure [fetchmailconf, CVE-2005-3088] stable/main/binary-m68k/fetchmail_6.2.5-12sarge3_m68k.deb fetchmail (6.2.5-12sarge3) stable-security; urgency=high * Non-maintainer upload by the Security Team * Completely reworked the security update(s), which removes a regression and other pieces that accidentally creeped in with the last update * Applied patch by Ludwig Nussel to fix arbitrary code execution [pop3.c, CAN-2005-2335] * Adjusted the umask when opening the config file to prevent information disclosure [fetchmailconf, CVE-2005-3088] stable/main/binary-ia64/fetchmail_6.2.5-12sarge3_ia64.deb fetchmail (6.2.5-12sarge3) stable-security; urgency=high * Non-maintainer upload by the Security Team * Completely reworked the security update(s), which removes a regression and other pieces that accidentally creeped in with the last update * Applied patch by Ludwig Nussel to fix arbitrary code execution [pop3.c, CAN-2005-2335] * Adjusted the umask when opening the config file to prevent information disclosure [fetchmailconf, CVE-2005-3088] stable/main/binary-i386/fetchmail_6.2.5-12sarge3_i386.deb fetchmail (6.2.5-12sarge3) stable-security; urgency=high * Non-maintainer upload by the Security Team * Completely reworked the security update(s), which removes a regression and other pieces that accidentally creeped in with the last update * Applied patch by Ludwig Nussel to fix arbitrary code execution [pop3.c, CAN-2005-2335] * Adjusted the umask when opening the config file to prevent information disclosure [fetchmailconf, CVE-2005-3088] stable/main/binary-hppa/fetchmail_6.2.5-12sarge3_hppa.deb fetchmail (6.2.5-12sarge3) stable-security; urgency=high * Non-maintainer upload by the Security Team * Completely reworked the security update(s), which removes a regression and other pieces that accidentally creeped in with the last update * Applied patch by Ludwig Nussel to fix arbitrary code execution [pop3.c, CAN-2005-2335] * Adjusted the umask when opening the config file to prevent information disclosure [fetchmailconf, CVE-2005-3088] stable/main/binary-arm/fetchmail_6.2.5-12sarge3_arm.deb fetchmail (6.2.5-12sarge3) stable-security; urgency=high * Non-maintainer upload by the Security Team * Completely reworked the security update(s), which removes a regression and other pieces that accidentally creeped in with the last update * Applied patch by Ludwig Nussel to fix arbitrary code execution [pop3.c, CAN-2005-2335] * Adjusted the umask when opening the config file to prevent information disclosure [fetchmailconf, CVE-2005-3088] stable/main/binary-alpha/fetchmail_6.2.5-12sarge3_alpha.deb fetchmail (6.2.5-12sarge3) stable-security; urgency=high * Non-maintainer upload by the Security Team * Completely reworked the security update(s), which removes a regression and other pieces that accidentally creeped in with the last update * Applied patch by Ludwig Nussel to fix arbitrary code execution [pop3.c, CAN-2005-2335] * Adjusted the umask when opening the config file to prevent information disclosure [fetchmailconf, CVE-2005-3088] stable/main/binary-powerpc/fetchmail_6.2.5-12sarge3_powerpc.deb stable/main/source/fetchmail_6.2.5-12sarge3.dsc stable/main/binary-all/fetchmailconf_6.2.5-12sarge3_all.deb stable/main/binary-all/fetchmail-ssl_6.2.5-12sarge3_all.deb stable/main/source/fetchmail_6.2.5-12sarge3.diff.gz fetchmail (6.2.5-12sarge3) stable-security; urgency=high * Non-maintainer upload by the Security Team * Completely reworked the security update(s), which removes a regression and other pieces that accidentally creeped in with the last update * Applied patch by Ludwig Nussel to fix arbitrary code execution [pop3.c, CAN-2005-2335] * Adjusted the umask when opening the config file to prevent information disclosure [fetchmailconf, CVE-2005-3088] stable/main/binary-sparc/libfam-dev_2.7.0-6sarge1_sparc.deb stable/main/binary-sparc/libfam0c102_2.7.0-6sarge1_sparc.deb stable/main/binary-sparc/fam_2.7.0-6sarge1_sparc.deb fam (2.7.0-6sarge1) stable; urgency=high * New maintainer. * Incorporate updated dnotify patch. Closes: #316579, #296609, #272577 stable/main/binary-s390/libfam-dev_2.7.0-6sarge1_s390.deb stable/main/binary-s390/libfam0c102_2.7.0-6sarge1_s390.deb stable/main/binary-s390/fam_2.7.0-6sarge1_s390.deb fam (2.7.0-6sarge1) stable; urgency=high * New maintainer. * Incorporate updated dnotify patch. Closes: #316579, #296609, #272577 stable/main/binary-powerpc/fam_2.7.0-6sarge1_powerpc.deb stable/main/binary-powerpc/libfam-dev_2.7.0-6sarge1_powerpc.deb stable/main/binary-powerpc/libfam0c102_2.7.0-6sarge1_powerpc.deb fam (2.7.0-6sarge1) stable; urgency=high * New maintainer. * Incorporate updated dnotify patch. Closes: #316579, #296609, #272577 stable/main/binary-mipsel/libfam-dev_2.7.0-6sarge1_mipsel.deb stable/main/binary-mipsel/libfam0c102_2.7.0-6sarge1_mipsel.deb stable/main/binary-mipsel/fam_2.7.0-6sarge1_mipsel.deb fam (2.7.0-6sarge1) stable; urgency=high * New maintainer. * Incorporate updated dnotify patch. Closes: #316579, #296609, #272577 stable/main/binary-mips/libfam0c102_2.7.0-6sarge1_mips.deb stable/main/binary-mips/fam_2.7.0-6sarge1_mips.deb stable/main/binary-mips/libfam-dev_2.7.0-6sarge1_mips.deb fam (2.7.0-6sarge1) stable; urgency=high * New maintainer. * Incorporate updated dnotify patch. Closes: #316579, #296609, #272577 stable/main/binary-m68k/libfam-dev_2.7.0-6sarge1_m68k.deb stable/main/binary-m68k/fam_2.7.0-6sarge1_m68k.deb stable/main/binary-m68k/libfam0c102_2.7.0-6sarge1_m68k.deb fam (2.7.0-6sarge1) stable; urgency=high * New maintainer. * Incorporate updated dnotify patch. Closes: #316579, #296609, #272577 stable/main/binary-ia64/fam_2.7.0-6sarge1_ia64.deb stable/main/binary-ia64/libfam-dev_2.7.0-6sarge1_ia64.deb stable/main/binary-ia64/libfam0c102_2.7.0-6sarge1_ia64.deb fam (2.7.0-6sarge1) stable; urgency=high * New maintainer. * Incorporate updated dnotify patch. Closes: #316579, #296609, #272577 stable/main/binary-hppa/libfam0c102_2.7.0-6sarge1_hppa.deb stable/main/binary-hppa/fam_2.7.0-6sarge1_hppa.deb stable/main/binary-hppa/libfam-dev_2.7.0-6sarge1_hppa.deb fam (2.7.0-6sarge1) stable; urgency=high * New maintainer. * Incorporate updated dnotify patch. Closes: #316579, #296609, #272577 stable/main/binary-arm/libfam0c102_2.7.0-6sarge1_arm.deb stable/main/binary-arm/libfam-dev_2.7.0-6sarge1_arm.deb stable/main/binary-arm/fam_2.7.0-6sarge1_arm.deb fam (2.7.0-6sarge1) stable; urgency=high * New maintainer. * Incorporate updated dnotify patch. Closes: #316579, #296609, #272577 stable/main/binary-alpha/libfam-dev_2.7.0-6sarge1_alpha.deb stable/main/binary-alpha/libfam0c102_2.7.0-6sarge1_alpha.deb stable/main/binary-alpha/fam_2.7.0-6sarge1_alpha.deb fam (2.7.0-6sarge1) stable; urgency=high * New maintainer. * Incorporate updated dnotify patch. Closes: #316579, #296609, #272577 stable/main/binary-i386/libfam0c102_2.7.0-6sarge1_i386.deb stable/main/binary-i386/fam_2.7.0-6sarge1_i386.deb stable/main/source/fam_2.7.0-6sarge1.dsc stable/main/binary-i386/libfam-dev_2.7.0-6sarge1_i386.deb stable/main/source/fam_2.7.0-6sarge1.diff.gz fam (2.7.0-6sarge1) stable; urgency=high * New maintainer. * Incorporate updated dnotify patch. Closes: #316579, #296609, #272577 stable/contrib/source/f-prot-installer_0.5.14.sarge.1.tar.gz stable/contrib/source/f-prot-installer_0.5.14.sarge.1.dsc stable/contrib/binary-i386/f-prot-installer_0.5.14.sarge.1_i386.deb f-prot-installer (0.5.14.sarge.1) stable; urgency=medium * Package was rendered unusable by external changes. Fix: Instead of patching, install f-prot.sh into /usr/lib/f-prot and create symlink /usr/bin/f-prot. (closes: #323930) * Update my email. Old one will stop working soon. stable/main/binary-sparc/ettercap-gtk_0.7.1-1sarge1_sparc.deb stable/main/binary-sparc/ettercap_0.7.1-1sarge1_sparc.deb stable/main/binary-sparc/ettercap-common_0.7.1-1sarge1_sparc.deb ettercap (1:0.7.1-1sarge1) stable-security; urgency=high * Non-maintainer upload. * Fix format string vulnerability in curses_msg() in src/interfaces/curses/ec_curses.c, backported from version 0.7.3 (CAN-2005-1796; Closes: #311615). Thanks to Martin Pitt for reporting this vulnerability. stable/main/binary-s390/ettercap-gtk_0.7.1-1sarge1_s390.deb stable/main/binary-s390/ettercap_0.7.1-1sarge1_s390.deb stable/main/binary-s390/ettercap-common_0.7.1-1sarge1_s390.deb ettercap (1:0.7.1-1sarge1) stable-security; urgency=high * Non-maintainer upload. * Fix format string vulnerability in curses_msg() in src/interfaces/curses/ec_curses.c, backported from version 0.7.3 (CAN-2005-1796; Closes: #311615). Thanks to Martin Pitt for reporting this vulnerability. stable/main/binary-mipsel/ettercap-gtk_0.7.1-1sarge1_mipsel.deb stable/main/binary-mipsel/ettercap_0.7.1-1sarge1_mipsel.deb stable/main/binary-mipsel/ettercap-common_0.7.1-1sarge1_mipsel.deb ettercap (1:0.7.1-1sarge1) stable-security; urgency=high * Non-maintainer upload. * Fix format string vulnerability in curses_msg() in src/interfaces/curses/ec_curses.c, backported from version 0.7.3 (CAN-2005-1796; Closes: #311615). Thanks to Martin Pitt for reporting this vulnerability. stable/main/binary-mips/ettercap-gtk_0.7.1-1sarge1_mips.deb stable/main/binary-mips/ettercap-common_0.7.1-1sarge1_mips.deb stable/main/binary-mips/ettercap_0.7.1-1sarge1_mips.deb ettercap (1:0.7.1-1sarge1) stable-security; urgency=high * Non-maintainer upload. * Fix format string vulnerability in curses_msg() in src/interfaces/curses/ec_curses.c, backported from version 0.7.3 (CAN-2005-1796; Closes: #311615). Thanks to Martin Pitt for reporting this vulnerability. stable/main/binary-m68k/ettercap-common_0.7.1-1sarge1_m68k.deb stable/main/binary-m68k/ettercap-gtk_0.7.1-1sarge1_m68k.deb stable/main/binary-m68k/ettercap_0.7.1-1sarge1_m68k.deb ettercap (1:0.7.1-1sarge1) stable-security; urgency=high * Non-maintainer upload. * Fix format string vulnerability in curses_msg() in src/interfaces/curses/ec_curses.c, backported from version 0.7.3 (CAN-2005-1796; Closes: #311615). Thanks to Martin Pitt for reporting this vulnerability. stable/main/binary-ia64/ettercap-gtk_0.7.1-1sarge1_ia64.deb stable/main/binary-ia64/ettercap_0.7.1-1sarge1_ia64.deb stable/main/binary-ia64/ettercap-common_0.7.1-1sarge1_ia64.deb ettercap (1:0.7.1-1sarge1) stable-security; urgency=high * Non-maintainer upload. * Fix format string vulnerability in curses_msg() in src/interfaces/curses/ec_curses.c, backported from version 0.7.3 (CAN-2005-1796; Closes: #311615). Thanks to Martin Pitt for reporting this vulnerability. stable/main/binary-i386/ettercap_0.7.1-1sarge1_i386.deb stable/main/binary-i386/ettercap-common_0.7.1-1sarge1_i386.deb stable/main/binary-i386/ettercap-gtk_0.7.1-1sarge1_i386.deb ettercap (1:0.7.1-1sarge1) stable-security; urgency=high * Non-maintainer upload. * Fix format string vulnerability in curses_msg() in src/interfaces/curses/ec_curses.c, backported from version 0.7.3 (CAN-2005-1796; Closes: #311615). Thanks to Martin Pitt for reporting this vulnerability. stable/main/binary-hppa/ettercap_0.7.1-1sarge1_hppa.deb stable/main/binary-hppa/ettercap-gtk_0.7.1-1sarge1_hppa.deb stable/main/binary-hppa/ettercap-common_0.7.1-1sarge1_hppa.deb ettercap (1:0.7.1-1sarge1) stable-security; urgency=high * Non-maintainer upload. * Fix format string vulnerability in curses_msg() in src/interfaces/curses/ec_curses.c, backported from version 0.7.3 (CAN-2005-1796; Closes: #311615). Thanks to Martin Pitt for reporting this vulnerability. stable/main/binary-arm/ettercap_0.7.1-1sarge1_arm.deb stable/main/binary-arm/ettercap-common_0.7.1-1sarge1_arm.deb stable/main/binary-arm/ettercap-gtk_0.7.1-1sarge1_arm.deb ettercap (1:0.7.1-1sarge1) stable-security; urgency=high * Non-maintainer upload. * Fix format string vulnerability in curses_msg() in src/interfaces/curses/ec_curses.c, backported from version 0.7.3 (CAN-2005-1796; Closes: #311615). Thanks to Martin Pitt for reporting this vulnerability. stable/main/binary-alpha/ettercap_0.7.1-1sarge1_alpha.deb stable/main/binary-alpha/ettercap-common_0.7.1-1sarge1_alpha.deb stable/main/binary-alpha/ettercap-gtk_0.7.1-1sarge1_alpha.deb ettercap (1:0.7.1-1sarge1) stable-security; urgency=high * Non-maintainer upload. * Fix format string vulnerability in curses_msg() in src/interfaces/curses/ec_curses.c, backported from version 0.7.3 (CAN-2005-1796; Closes: #311615). Thanks to Martin Pitt for reporting this vulnerability. stable/main/source/ettercap_0.7.1-1sarge1.dsc stable/main/binary-powerpc/ettercap-gtk_0.7.1-1sarge1_powerpc.deb stable/main/binary-powerpc/ettercap_0.7.1-1sarge1_powerpc.deb stable/main/binary-powerpc/ettercap-common_0.7.1-1sarge1_powerpc.deb stable/main/source/ettercap_0.7.1-1sarge1.diff.gz ettercap (1:0.7.1-1sarge1) stable-security; urgency=high * Non-maintainer upload. * Fix format string vulnerability in curses_msg() in src/interfaces/curses/ec_curses.c, backported from version 0.7.3 (CAN-2005-1796; Closes: #311615). Thanks to Martin Pitt for reporting this vulnerability. stable/main/binary-sparc/ethereal_0.10.10-2sarge4_sparc.deb stable/main/binary-sparc/ethereal-dev_0.10.10-2sarge4_sparc.deb stable/main/binary-sparc/ethereal-common_0.10.10-2sarge4_sparc.deb stable/main/binary-sparc/tethereal_0.10.10-2sarge4_sparc.deb ethereal (0.10.10-2sarge4) stable-security; urgency=high * Non-maintainer upload by the Security Team * Backported new upstream version of dissect_ospf_v3_address_prefix() to fix buffer overflow and potential arbitrary code execution [epan/dissectors/packet-ospf.c, CVE-2005-3651] stable/main/binary-s390/ethereal-dev_0.10.10-2sarge4_s390.deb stable/main/binary-s390/ethereal_0.10.10-2sarge4_s390.deb stable/main/binary-s390/ethereal-common_0.10.10-2sarge4_s390.deb stable/main/binary-s390/tethereal_0.10.10-2sarge4_s390.deb ethereal (0.10.10-2sarge4) stable-security; urgency=high * Non-maintainer upload by the Security Team * Backported new upstream version of dissect_ospf_v3_address_prefix() to fix buffer overflow and potential arbitrary code execution [epan/dissectors/packet-ospf.c, CVE-2005-3651] stable/main/binary-mipsel/ethereal-common_0.10.10-2sarge4_mipsel.deb stable/main/binary-mipsel/tethereal_0.10.10-2sarge4_mipsel.deb stable/main/binary-mipsel/ethereal-dev_0.10.10-2sarge4_mipsel.deb stable/main/binary-mipsel/ethereal_0.10.10-2sarge4_mipsel.deb ethereal (0.10.10-2sarge4) stable-security; urgency=high * Non-maintainer upload by the Security Team * Backported new upstream version of dissect_ospf_v3_address_prefix() to fix buffer overflow and potential arbitrary code execution [epan/dissectors/packet-ospf.c, CVE-2005-3651] stable/main/binary-mips/ethereal-common_0.10.10-2sarge4_mips.deb stable/main/binary-mips/ethereal_0.10.10-2sarge4_mips.deb stable/main/binary-mips/ethereal-dev_0.10.10-2sarge4_mips.deb stable/main/binary-mips/tethereal_0.10.10-2sarge4_mips.deb ethereal (0.10.10-2sarge4) stable-security; urgency=high * Non-maintainer upload by the Security Team * Backported new upstream version of dissect_ospf_v3_address_prefix() to fix buffer overflow and potential arbitrary code execution [epan/dissectors/packet-ospf.c, CVE-2005-3651] stable/main/binary-m68k/ethereal_0.10.10-2sarge4_m68k.deb stable/main/binary-m68k/ethereal-common_0.10.10-2sarge4_m68k.deb stable/main/binary-m68k/tethereal_0.10.10-2sarge4_m68k.deb stable/main/binary-m68k/ethereal-dev_0.10.10-2sarge4_m68k.deb ethereal (0.10.10-2sarge4) stable-security; urgency=high * Non-maintainer upload by the Security Team * Backported new upstream version of dissect_ospf_v3_address_prefix() to fix buffer overflow and potential arbitrary code execution [epan/dissectors/packet-ospf.c, CVE-2005-3651] stable/main/binary-ia64/tethereal_0.10.10-2sarge4_ia64.deb stable/main/binary-ia64/ethereal-dev_0.10.10-2sarge4_ia64.deb stable/main/binary-ia64/ethereal-common_0.10.10-2sarge4_ia64.deb stable/main/binary-ia64/ethereal_0.10.10-2sarge4_ia64.deb ethereal (0.10.10-2sarge4) stable-security; urgency=high * Non-maintainer upload by the Security Team * Backported new upstream version of dissect_ospf_v3_address_prefix() to fix buffer overflow and potential arbitrary code execution [epan/dissectors/packet-ospf.c, CVE-2005-3651] stable/main/binary-i386/tethereal_0.10.10-2sarge4_i386.deb stable/main/binary-i386/ethereal-dev_0.10.10-2sarge4_i386.deb stable/main/binary-i386/ethereal_0.10.10-2sarge4_i386.deb stable/main/binary-i386/ethereal-common_0.10.10-2sarge4_i386.deb ethereal (0.10.10-2sarge4) stable-security; urgency=high * Non-maintainer upload by the Security Team * Backported new upstream version of dissect_ospf_v3_address_prefix() to fix buffer overflow and potential arbitrary code execution [epan/dissectors/packet-ospf.c, CVE-2005-3651] stable/main/binary-hppa/ethereal-dev_0.10.10-2sarge4_hppa.deb stable/main/binary-hppa/ethereal_0.10.10-2sarge4_hppa.deb stable/main/binary-hppa/ethereal-common_0.10.10-2sarge4_hppa.deb stable/main/binary-hppa/tethereal_0.10.10-2sarge4_hppa.deb ethereal (0.10.10-2sarge4) stable-security; urgency=high * Non-maintainer upload by the Security Team * Backported new upstream version of dissect_ospf_v3_address_prefix() to fix buffer overflow and potential arbitrary code execution [epan/dissectors/packet-ospf.c, CVE-2005-3651] stable/main/binary-arm/ethereal-dev_0.10.10-2sarge4_arm.deb stable/main/binary-arm/ethereal_0.10.10-2sarge4_arm.deb stable/main/binary-arm/ethereal-common_0.10.10-2sarge4_arm.deb stable/main/binary-arm/tethereal_0.10.10-2sarge4_arm.deb ethereal (0.10.10-2sarge4) stable-security; urgency=high * Non-maintainer upload by the Security Team * Backported new upstream version of dissect_ospf_v3_address_prefix() to fix buffer overflow and potential arbitrary code execution [epan/dissectors/packet-ospf.c, CVE-2005-3651] stable/main/binary-alpha/ethereal-dev_0.10.10-2sarge4_alpha.deb stable/main/binary-alpha/ethereal_0.10.10-2sarge4_alpha.deb stable/main/binary-alpha/tethereal_0.10.10-2sarge4_alpha.deb stable/main/binary-alpha/ethereal-common_0.10.10-2sarge4_alpha.deb ethereal (0.10.10-2sarge4) stable-security; urgency=high * Non-maintainer upload by the Security Team * Backported new upstream version of dissect_ospf_v3_address_prefix() to fix buffer overflow and potential arbitrary code execution [epan/dissectors/packet-ospf.c, CVE-2005-3651] stable/main/source/ethereal_0.10.10-2sarge4.diff.gz stable/main/binary-powerpc/ethereal_0.10.10-2sarge4_powerpc.deb stable/main/binary-powerpc/ethereal-dev_0.10.10-2sarge4_powerpc.deb stable/main/binary-powerpc/tethereal_0.10.10-2sarge4_powerpc.deb stable/main/binary-powerpc/ethereal-common_0.10.10-2sarge4_powerpc.deb stable/main/source/ethereal_0.10.10-2sarge4.dsc ethereal (0.10.10-2sarge4) stable-security; urgency=high * Non-maintainer upload by the Security Team * Backported new upstream version of dissect_ospf_v3_address_prefix() to fix buffer overflow and potential arbitrary code execution [epan/dissectors/packet-ospf.c, CVE-2005-3651] stable/main/binary-all/eric_3.6.2-2_all.deb stable/main/source/eric_3.6.2-2.dsc stable/main/source/eric_3.6.2-2.diff.gz eric (3.6.2-2) stable-security; urgency=high * Backport fix for arbitrary code execution through malicious Python code in project file from 3.7.2 [debian/patches/10_CAN-2005-3068.dpatch, eric/Project/Project.py, CAN-2005-3068] (Closes: #330893) stable/main/binary-sparc/mozilla-thunderbird-enigmail_0.91-4sarge2_sparc.deb stable/main/binary-sparc/mozilla-enigmail_0.91-4sarge2_sparc.deb enigmail (2:0.91-4sarge2) stable-security; urgency=high * Non-Maintainer upload by the Security Team * Added 75_enigmail-CVE-2005-3256.dpatch to mozilla packages as well, thanks to Alexander for the notification stable/main/binary-s390/mozilla-enigmail_0.91-4sarge2_s390.deb stable/main/binary-s390/mozilla-thunderbird-enigmail_0.91-4sarge2_s390.deb enigmail (2:0.91-4sarge2) stable-security; urgency=high * Non-Maintainer upload by the Security Team * Added 75_enigmail-CVE-2005-3256.dpatch to mozilla packages as well, thanks to Alexander for the notification stable/main/binary-powerpc/mozilla-thunderbird-enigmail_0.91-4sarge2_powerpc.deb stable/main/binary-powerpc/mozilla-enigmail_0.91-4sarge2_powerpc.deb enigmail (2:0.91-4sarge2) stable-security; urgency=high * Non-Maintainer upload by the Security Team * Added 75_enigmail-CVE-2005-3256.dpatch to mozilla packages as well, thanks to Alexander for the notification stable/main/binary-mipsel/mozilla-enigmail_0.91-4sarge2_mipsel.deb stable/main/binary-mipsel/mozilla-thunderbird-enigmail_0.91-4sarge2_mipsel.deb enigmail (2:0.91-4sarge2) stable-security; urgency=high * Non-Maintainer upload by the Security Team * Added 75_enigmail-CVE-2005-3256.dpatch to mozilla packages as well, thanks to Alexander for the notification stable/main/binary-mips/mozilla-thunderbird-enigmail_0.91-4sarge2_mips.deb stable/main/binary-mips/mozilla-enigmail_0.91-4sarge2_mips.deb enigmail (2:0.91-4sarge2) stable-security; urgency=high * Non-Maintainer upload by the Security Team * Added 75_enigmail-CVE-2005-3256.dpatch to mozilla packages as well, thanks to Alexander for the notification stable/main/binary-m68k/mozilla-thunderbird-enigmail_0.91-4sarge2_m68k.deb stable/main/binary-m68k/mozilla-enigmail_0.91-4sarge2_m68k.deb enigmail (2:0.91-4sarge2) stable-security; urgency=high * Non-Maintainer upload by the Security Team * Added 75_enigmail-CVE-2005-3256.dpatch to mozilla packages as well, thanks to Alexander for the notification stable/main/binary-ia64/mozilla-enigmail_0.91-4sarge2_ia64.deb stable/main/binary-ia64/mozilla-thunderbird-enigmail_0.91-4sarge2_ia64.deb enigmail (2:0.91-4sarge2) stable-security; urgency=high * Non-Maintainer upload by the Security Team * Added 75_enigmail-CVE-2005-3256.dpatch to mozilla packages as well, thanks to Alexander for the notification stable/main/binary-i386/mozilla-thunderbird-enigmail_0.91-4sarge2_i386.deb stable/main/binary-i386/mozilla-enigmail_0.91-4sarge2_i386.deb enigmail (2:0.91-4sarge2) stable-security; urgency=high * Non-Maintainer upload by the Security Team * Added 75_enigmail-CVE-2005-3256.dpatch to mozilla packages as well, thanks to Alexander for the notification stable/main/binary-arm/mozilla-enigmail_0.91-4sarge2_arm.deb stable/main/binary-arm/mozilla-thunderbird-enigmail_0.91-4sarge2_arm.deb enigmail (2:0.91-4sarge2) stable-security; urgency=high * Non-Maintainer upload by the Security Team * Added 75_enigmail-CVE-2005-3256.dpatch to mozilla packages as well, thanks to Alexander for the notification stable/main/binary-alpha/mozilla-thunderbird-enigmail_0.91-4sarge2_alpha.deb stable/main/binary-alpha/mozilla-enigmail_0.91-4sarge2_alpha.deb enigmail (2:0.91-4sarge2) stable-security; urgency=high * Non-Maintainer upload by the Security Team * Added 75_enigmail-CVE-2005-3256.dpatch to mozilla packages as well, thanks to Alexander for the notification stable/main/source/enigmail_0.91-4sarge2.dsc stable/main/binary-hppa/mozilla-thunderbird-enigmail_0.91-4sarge2_hppa.deb stable/main/binary-hppa/mozilla-enigmail_0.91-4sarge2_hppa.deb stable/main/source/enigmail_0.91-4sarge2.diff.gz enigmail (2:0.91-4sarge2) stable-security; urgency=high * Non-Maintainer upload by the Security Team * Added 75_enigmail-CVE-2005-3256.dpatch to mozilla packages as well, thanks to Alexander for the notification stable/main/binary-s390/libgadu3_1.5+20050411-5_s390.deb stable/main/binary-s390/ekg_1.5+20050411-5_s390.deb stable/main/binary-s390/libgadu-dev_1.5+20050411-5_s390.deb ekg (1:1.5+20050411-5) stable-security; urgency=high * Security upload * Fixes integer overflow [lib/libgadu.h, lib/events.c, CAN-2005-1852, Bug#318970] stable/main/binary-powerpc/libgadu3_1.5+20050411-5_powerpc.deb stable/main/binary-powerpc/libgadu-dev_1.5+20050411-5_powerpc.deb stable/main/binary-powerpc/ekg_1.5+20050411-5_powerpc.deb ekg (1:1.5+20050411-5) stable-security; urgency=high * Security upload * Fixes integer overflow [lib/libgadu.h, lib/events.c, CAN-2005-1852, Bug#318970] stable/main/binary-mipsel/libgadu-dev_1.5+20050411-5_mipsel.deb stable/main/binary-mipsel/ekg_1.5+20050411-5_mipsel.deb stable/main/binary-mipsel/libgadu3_1.5+20050411-5_mipsel.deb ekg (1:1.5+20050411-5) stable-security; urgency=high * Security upload * Fixes integer overflow [lib/libgadu.h, lib/events.c, CAN-2005-1852, Bug#318970] stable/main/binary-mips/libgadu-dev_1.5+20050411-5_mips.deb stable/main/binary-mips/libgadu3_1.5+20050411-5_mips.deb stable/main/binary-mips/ekg_1.5+20050411-5_mips.deb ekg (1:1.5+20050411-5) stable-security; urgency=high * Security upload * Fixes integer overflow [lib/libgadu.h, lib/events.c, CAN-2005-1852, Bug#318970] stable/main/binary-m68k/libgadu-dev_1.5+20050411-5_m68k.deb stable/main/binary-m68k/ekg_1.5+20050411-5_m68k.deb stable/main/binary-m68k/libgadu3_1.5+20050411-5_m68k.deb ekg (1:1.5+20050411-5) stable-security; urgency=high * Security upload * Fixes integer overflow [lib/libgadu.h, lib/events.c, CAN-2005-1852, Bug#318970] stable/main/binary-ia64/libgadu3_1.5+20050411-5_ia64.deb stable/main/binary-ia64/libgadu-dev_1.5+20050411-5_ia64.deb stable/main/binary-ia64/ekg_1.5+20050411-5_ia64.deb ekg (1:1.5+20050411-5) stable-security; urgency=high * Security upload * Fixes integer overflow [lib/libgadu.h, lib/events.c, CAN-2005-1852, Bug#318970] stable/main/binary-i386/ekg_1.5+20050411-5_i386.deb stable/main/binary-i386/libgadu3_1.5+20050411-5_i386.deb stable/main/binary-i386/libgadu-dev_1.5+20050411-5_i386.deb ekg (1:1.5+20050411-5) stable-security; urgency=high * Security upload * Fixes integer overflow [lib/libgadu.h, lib/events.c, CAN-2005-1852, Bug#318970] stable/main/binary-hppa/libgadu3_1.5+20050411-5_hppa.deb stable/main/binary-hppa/ekg_1.5+20050411-5_hppa.deb stable/main/binary-hppa/libgadu-dev_1.5+20050411-5_hppa.deb ekg (1:1.5+20050411-5) stable-security; urgency=high * Security upload * Fixes integer overflow [lib/libgadu.h, lib/events.c, CAN-2005-1852, Bug#318970] stable/main/binary-arm/ekg_1.5+20050411-5_arm.deb stable/main/binary-arm/libgadu-dev_1.5+20050411-5_arm.deb stable/main/binary-arm/libgadu3_1.5+20050411-5_arm.deb ekg (1:1.5+20050411-5) stable-security; urgency=high * Security upload * Fixes integer overflow [lib/libgadu.h, lib/events.c, CAN-2005-1852, Bug#318970] stable/main/binary-alpha/libgadu3_1.5+20050411-5_alpha.deb stable/main/binary-alpha/libgadu-dev_1.5+20050411-5_alpha.deb stable/main/binary-alpha/ekg_1.5+20050411-5_alpha.deb ekg (1:1.5+20050411-5) stable-security; urgency=high * Security upload * Fixes integer overflow [lib/libgadu.h, lib/events.c, CAN-2005-1852, Bug#318970] stable/main/binary-sparc/libgadu3_1.5+20050411-5_sparc.deb stable/main/source/ekg_1.5+20050411-5.dsc stable/main/source/ekg_1.5+20050411-5.diff.gz stable/main/binary-sparc/libgadu-dev_1.5+20050411-5_sparc.deb stable/main/binary-sparc/ekg_1.5+20050411-5_sparc.deb ekg (1:1.5+20050411-5) stable-security; urgency=high * Security upload * Fixes integer overflow [lib/libgadu.h, lib/events.c, CAN-2005-1852, Bug#318970] stable/main/binary-all/egroupware-infolog_1.0.0.007-2.dfsg-2sarge4_all.deb stable/main/binary-all/egroupware-sitemgr_1.0.0.007-2.dfsg-2sarge4_all.deb stable/main/binary-all/egroupware-addressbook_1.0.0.007-2.dfsg-2sarge4_all.deb stable/main/binary-all/egroupware-developer-tools_1.0.0.007-2.dfsg-2sarge4_all.deb stable/main/binary-all/egroupware-headlines_1.0.0.007-2.dfsg-2sarge4_all.deb stable/main/binary-all/egroupware-ldap_1.0.0.007-2.dfsg-2sarge4_all.deb stable/main/binary-all/egroupware-polls_1.0.0.007-2.dfsg-2sarge4_all.deb stable/main/binary-all/egroupware-projects_1.0.0.007-2.dfsg-2sarge4_all.deb stable/main/binary-all/egroupware-emailadmin_1.0.0.007-2.dfsg-2sarge4_all.deb stable/main/binary-all/egroupware-phpbrain_1.0.0.007-2.dfsg-2sarge4_all.deb stable/main/binary-all/egroupware-messenger_1.0.0.007-2.dfsg-2sarge4_all.deb stable/main/binary-all/egroupware-core_1.0.0.007-2.dfsg-2sarge4_all.deb stable/main/source/egroupware_1.0.0.007-2.dfsg-2sarge4.dsc stable/main/binary-all/egroupware-news-admin_1.0.0.007-2.dfsg-2sarge4_all.deb stable/main/binary-all/egroupware-jinn_1.0.0.007-2.dfsg-2sarge4_all.deb stable/main/binary-all/egroupware-comic_1.0.0.007-2.dfsg-2sarge4_all.deb stable/main/binary-all/egroupware-stocks_1.0.0.007-2.dfsg-2sarge4_all.deb stable/main/binary-all/egroupware-bookmarks_1.0.0.007-2.dfsg-2sarge4_all.deb stable/main/binary-all/egroupware-phpsysinfo_1.0.0.007-2.dfsg-2sarge4_all.deb stable/main/binary-all/egroupware-filemanager_1.0.0.007-2.dfsg-2sarge4_all.deb stable/main/binary-all/egroupware-ftp_1.0.0.007-2.dfsg-2sarge4_all.deb stable/main/binary-all/egroupware-manual_1.0.0.007-2.dfsg-2sarge4_all.deb stable/main/binary-all/egroupware-etemplate_1.0.0.007-2.dfsg-2sarge4_all.deb stable/main/binary-all/egroupware-forum_1.0.0.007-2.dfsg-2sarge4_all.deb stable/main/binary-all/egroupware-email_1.0.0.007-2.dfsg-2sarge4_all.deb stable/main/binary-all/egroupware-phpldapadmin_1.0.0.007-2.dfsg-2sarge4_all.deb stable/main/source/egroupware_1.0.0.007-2.dfsg-2sarge4.diff.gz stable/main/binary-all/egroupware-tts_1.0.0.007-2.dfsg-2sarge4_all.deb stable/main/binary-all/egroupware-felamimail_1.0.0.007-2.dfsg-2sarge4_all.deb stable/main/binary-all/egroupware_1.0.0.007-2.dfsg-2sarge4_all.deb stable/main/binary-all/egroupware-fudforum_1.0.0.007-2.dfsg-2sarge4_all.deb stable/main/binary-all/egroupware-wiki_1.0.0.007-2.dfsg-2sarge4_all.deb stable/main/binary-all/egroupware-calendar_1.0.0.007-2.dfsg-2sarge4_all.deb stable/main/binary-all/egroupware-registration_1.0.0.007-2.dfsg-2sarge4_all.deb egroupware (1.0.0.007-2.dfsg-2sarge4) stable-security; urgency=high * Non-maintainer upload by the Security Team * Only calculate the $template conditionally if it is set to prevent errors [debian/patches/23-egw-CVE-2005-3347-file.dpatch] stable/main/source/drupal_4.5.3-4.dsc stable/main/binary-all/drupal_4.5.3-4_all.deb stable/main/source/drupal_4.5.3-4.diff.gz drupal (4.5.3-4) stable-security; urgency=HIGH * Maintainer upload for the Security Team * Fixes the following XMLRPC vulnerability: CAN-2005-2498 / DRUPAL-SA-2005-004: Through the bundled xmlrpc module, an attacker could execute arbitrary PHP code on the target site (see http://drupal.org/files/sa-2005-004/advisory.txt). * includes/xmlrpc.inc and includes/xmlrpcs.inc have been replaced by new upstream versions from http://phpxmlrpc.sourceforge.net/ * Added copyright statement to documentation. stable/main/binary-sparc/drbd0.7-utils_0.7.10-4_sparc.deb drbd (0.7.10-4) stable; urgency=low * Added dep to dpatch (closes: #319537, #308295). stable/main/binary-s390/drbd0.7-utils_0.7.10-4_s390.deb drbd (0.7.10-4) stable; urgency=low * Added dep to dpatch (closes: #319537, #308295). stable/main/binary-powerpc/drbd0.7-utils_0.7.10-4_powerpc.deb drbd (0.7.10-4) stable; urgency=low * Added dep to dpatch (closes: #319537, #308295). stable/main/binary-mipsel/drbd0.7-utils_0.7.10-4_mipsel.deb drbd (0.7.10-4) stable; urgency=low * Added dep to dpatch (closes: #319537, #308295). stable/main/binary-mips/drbd0.7-utils_0.7.10-4_mips.deb drbd (0.7.10-4) stable; urgency=low * Added dep to dpatch (closes: #319537, #308295). stable/main/binary-m68k/drbd0.7-utils_0.7.10-4_m68k.deb drbd (0.7.10-4) stable; urgency=low * Added dep to dpatch (closes: #319537, #308295). stable/main/binary-ia64/drbd0.7-utils_0.7.10-4_ia64.deb drbd (0.7.10-4) stable; urgency=low * Added dep to dpatch (closes: #319537, #308295). stable/main/binary-hppa/drbd0.7-utils_0.7.10-4_hppa.deb drbd (0.7.10-4) stable; urgency=low * Added dep to dpatch (closes: #319537, #308295). stable/main/binary-arm/drbd0.7-utils_0.7.10-4_arm.deb drbd (0.7.10-4) stable; urgency=low * Added dep to dpatch (closes: #319537, #308295). stable/main/binary-alpha/drbd0.7-utils_0.7.10-4_alpha.deb drbd (0.7.10-4) stable; urgency=low * Added dep to dpatch (closes: #319537, #308295). stable/main/binary-all/drbd0.7-module-source_0.7.10-4_all.deb stable/main/source/drbd_0.7.10-4.dsc stable/main/binary-i386/drbd0.7-utils_0.7.10-4_i386.deb stable/main/source/drbd_0.7.10-4.diff.gz drbd (0.7.10-4) stable; urgency=low * Added dep to dpatch (closes: #319537, #308295). stable/main/binary-sparc/dia_0.94.0-7sarge1_sparc.deb stable/main/binary-sparc/dia-libs_0.94.0-7sarge1_sparc.deb stable/main/binary-sparc/dia-gnome_0.94.0-7sarge1_sparc.deb dia (0.94.0-7sarge1) stable-security; urgency=high * Non-maintainer upload by The Security Team. * Sanitize the Python SVG file handling to avoid arbitary code execution. [CAN-2005-2966] stable/main/binary-s390/dia-gnome_0.94.0-7sarge1_s390.deb stable/main/binary-s390/dia_0.94.0-7sarge1_s390.deb stable/main/binary-s390/dia-libs_0.94.0-7sarge1_s390.deb dia (0.94.0-7sarge1) stable-security; urgency=high * Non-maintainer upload by The Security Team. * Sanitize the Python SVG file handling to avoid arbitary code execution. [CAN-2005-2966] stable/main/binary-powerpc/dia-gnome_0.94.0-7sarge1_powerpc.deb stable/main/binary-powerpc/dia_0.94.0-7sarge1_powerpc.deb stable/main/binary-powerpc/dia-libs_0.94.0-7sarge1_powerpc.deb dia (0.94.0-7sarge1) stable-security; urgency=high * Non-maintainer upload by The Security Team. * Sanitize the Python SVG file handling to avoid arbitary code execution. [CAN-2005-2966] stable/main/binary-mipsel/dia_0.94.0-7sarge1_mipsel.deb stable/main/binary-mipsel/dia-gnome_0.94.0-7sarge1_mipsel.deb stable/main/binary-mipsel/dia-libs_0.94.0-7sarge1_mipsel.deb dia (0.94.0-7sarge1) stable-security; urgency=high * Non-maintainer upload by The Security Team. * Sanitize the Python SVG file handling to avoid arbitary code execution. [CAN-2005-2966] stable/main/binary-mips/dia-gnome_0.94.0-7sarge1_mips.deb stable/main/binary-mips/dia_0.94.0-7sarge1_mips.deb stable/main/binary-mips/dia-libs_0.94.0-7sarge1_mips.deb dia (0.94.0-7sarge1) stable-security; urgency=high * Non-maintainer upload by The Security Team. * Sanitize the Python SVG file handling to avoid arbitary code execution. [CAN-2005-2966] stable/main/binary-m68k/dia-gnome_0.94.0-7sarge1_m68k.deb stable/main/binary-m68k/dia-libs_0.94.0-7sarge1_m68k.deb stable/main/binary-m68k/dia_0.94.0-7sarge1_m68k.deb dia (0.94.0-7sarge1) stable-security; urgency=high * Non-maintainer upload by The Security Team. * Sanitize the Python SVG file handling to avoid arbitary code execution. [CAN-2005-2966] stable/main/binary-ia64/dia-libs_0.94.0-7sarge1_ia64.deb stable/main/binary-ia64/dia_0.94.0-7sarge1_ia64.deb stable/main/binary-ia64/dia-gnome_0.94.0-7sarge1_ia64.deb dia (0.94.0-7sarge1) stable-security; urgency=high * Non-maintainer upload by The Security Team. * Sanitize the Python SVG file handling to avoid arbitary code execution. [CAN-2005-2966] stable/main/binary-hppa/dia_0.94.0-7sarge1_hppa.deb stable/main/binary-hppa/dia-gnome_0.94.0-7sarge1_hppa.deb stable/main/binary-hppa/dia-libs_0.94.0-7sarge1_hppa.deb dia (0.94.0-7sarge1) stable-security; urgency=high * Non-maintainer upload by The Security Team. * Sanitize the Python SVG file handling to avoid arbitary code execution. [CAN-2005-2966] stable/main/binary-arm/dia-libs_0.94.0-7sarge1_arm.deb stable/main/binary-arm/dia_0.94.0-7sarge1_arm.deb stable/main/binary-arm/dia-gnome_0.94.0-7sarge1_arm.deb dia (0.94.0-7sarge1) stable-security; urgency=high * Non-maintainer upload by The Security Team. * Sanitize the Python SVG file handling to avoid arbitary code execution. [CAN-2005-2966] stable/main/binary-alpha/dia_0.94.0-7sarge1_alpha.deb stable/main/binary-alpha/dia-gnome_0.94.0-7sarge1_alpha.deb stable/main/binary-alpha/dia-libs_0.94.0-7sarge1_alpha.deb dia (0.94.0-7sarge1) stable-security; urgency=high * Non-maintainer upload by The Security Team. * Sanitize the Python SVG file handling to avoid arbitary code execution. [CAN-2005-2966] stable/main/binary-i386/dia_0.94.0-7sarge1_i386.deb stable/main/source/dia_0.94.0-7sarge1.diff.gz stable/main/binary-all/dia-common_0.94.0-7sarge1_all.deb stable/main/binary-i386/dia-gnome_0.94.0-7sarge1_i386.deb stable/main/binary-i386/dia-libs_0.94.0-7sarge1_i386.deb stable/main/source/dia_0.94.0-7sarge1.dsc dia (0.94.0-7sarge1) stable-security; urgency=high * Non-maintainer upload by The Security Team. * Sanitize the Python SVG file handling to avoid arbitary code execution. [CAN-2005-2966] stable/main/binary-sparc/dhcpcd_1.3.22pl4-21sarge1_sparc.deb dhcpcd (1:1.3.22pl4-21sarge1) stable-security; urgency=high * Non-maintainer upload by the Security Team * Added boundary check by Simon Kelley to prevent out-of-bound memory access [client.c, CAN-2005-1848] stable/main/binary-s390/dhcpcd_1.3.22pl4-21sarge1_s390.deb dhcpcd (1:1.3.22pl4-21sarge1) stable-security; urgency=high * Non-maintainer upload by the Security Team * Added boundary check by Simon Kelley to prevent out-of-bound memory access [client.c, CAN-2005-1848] stable/main/binary-powerpc/dhcpcd_1.3.22pl4-21sarge1_powerpc.deb dhcpcd (1:1.3.22pl4-21sarge1) stable-security; urgency=high * Non-maintainer upload by the Security Team * Added boundary check by Simon Kelley to prevent out-of-bound memory access [client.c, CAN-2005-1848] stable/main/binary-mipsel/dhcpcd_1.3.22pl4-21sarge1_mipsel.deb dhcpcd (1:1.3.22pl4-21sarge1) stable-security; urgency=high * Non-maintainer upload by the Security Team * Added boundary check by Simon Kelley to prevent out-of-bound memory access [client.c, CAN-2005-1848] stable/main/binary-mips/dhcpcd_1.3.22pl4-21sarge1_mips.deb dhcpcd (1:1.3.22pl4-21sarge1) stable-security; urgency=high * Non-maintainer upload by the Security Team * Added boundary check by Simon Kelley to prevent out-of-bound memory access [client.c, CAN-2005-1848] stable/main/binary-m68k/dhcpcd_1.3.22pl4-21sarge1_m68k.deb dhcpcd (1:1.3.22pl4-21sarge1) stable-security; urgency=high * Non-maintainer upload by the Security Team * Added boundary check by Simon Kelley to prevent out-of-bound memory access [client.c, CAN-2005-1848] stable/main/binary-ia64/dhcpcd_1.3.22pl4-21sarge1_ia64.deb dhcpcd (1:1.3.22pl4-21sarge1) stable-security; urgency=high * Non-maintainer upload by the Security Team * Added boundary check by Simon Kelley to prevent out-of-bound memory access [client.c, CAN-2005-1848] stable/main/binary-hppa/dhcpcd_1.3.22pl4-21sarge1_hppa.deb dhcpcd (1:1.3.22pl4-21sarge1) stable-security; urgency=high * Non-maintainer upload by the Security Team * Added boundary check by Simon Kelley to prevent out-of-bound memory access [client.c, CAN-2005-1848] stable/main/binary-arm/dhcpcd_1.3.22pl4-21sarge1_arm.deb dhcpcd (1:1.3.22pl4-21sarge1) stable-security; urgency=high * Non-maintainer upload by the Security Team * Added boundary check by Simon Kelley to prevent out-of-bound memory access [client.c, CAN-2005-1848] stable/main/binary-alpha/dhcpcd_1.3.22pl4-21sarge1_alpha.deb dhcpcd (1:1.3.22pl4-21sarge1) stable-security; urgency=high * Non-maintainer upload by the Security Team * Added boundary check by Simon Kelley to prevent out-of-bound memory access [client.c, CAN-2005-1848] stable/main/binary-i386/dhcpcd_1.3.22pl4-21sarge1_i386.deb stable/main/source/dhcpcd_1.3.22pl4-21sarge1.dsc stable/main/source/dhcpcd_1.3.22pl4-21sarge1.diff.gz dhcpcd (1:1.3.22pl4-21sarge1) stable-security; urgency=high * Non-maintainer upload by the Security Team * Added boundary check by Simon Kelley to prevent out-of-bound memory access [client.c, CAN-2005-1848] stable/main/binary-sparc/curl_7.13.2-2sarge4_sparc.deb stable/main/binary-sparc/libcurl3-dbg_7.13.2-2sarge4_sparc.deb stable/main/binary-sparc/libcurl3_7.13.2-2sarge4_sparc.deb stable/main/binary-sparc/libcurl3-gssapi_7.13.2-2sarge4_sparc.deb stable/main/binary-sparc/libcurl3-dev_7.13.2-2sarge4_sparc.deb curl (7.13.2-2sarge4) stable-security; urgency=high * Non-maintainer upload by the Security Team * Applied upstream patch to fix buffer overflow [lib/http_ntlm.c, CVE-2005-3185] stable/main/binary-s390/libcurl3-dbg_7.13.2-2sarge4_s390.deb stable/main/binary-s390/libcurl3-dev_7.13.2-2sarge4_s390.deb stable/main/binary-s390/libcurl3_7.13.2-2sarge4_s390.deb stable/main/binary-s390/libcurl3-gssapi_7.13.2-2sarge4_s390.deb stable/main/binary-s390/curl_7.13.2-2sarge4_s390.deb curl (7.13.2-2sarge4) stable-security; urgency=high * Non-maintainer upload by the Security Team * Applied upstream patch to fix buffer overflow [lib/http_ntlm.c, CVE-2005-3185] stable/main/binary-mipsel/libcurl3-dev_7.13.2-2sarge4_mipsel.deb stable/main/binary-mipsel/libcurl3-dbg_7.13.2-2sarge4_mipsel.deb stable/main/binary-mipsel/libcurl3_7.13.2-2sarge4_mipsel.deb stable/main/binary-mipsel/libcurl3-gssapi_7.13.2-2sarge4_mipsel.deb stable/main/binary-mipsel/curl_7.13.2-2sarge4_mipsel.deb curl (7.13.2-2sarge4) stable-security; urgency=high * Non-maintainer upload by the Security Team * Applied upstream patch to fix buffer overflow [lib/http_ntlm.c, CVE-2005-3185] stable/main/binary-mips/libcurl3-dev_7.13.2-2sarge4_mips.deb stable/main/binary-mips/libcurl3_7.13.2-2sarge4_mips.deb stable/main/binary-mips/libcurl3-dbg_7.13.2-2sarge4_mips.deb stable/main/binary-mips/curl_7.13.2-2sarge4_mips.deb stable/main/binary-mips/libcurl3-gssapi_7.13.2-2sarge4_mips.deb curl (7.13.2-2sarge4) stable-security; urgency=high * Non-maintainer upload by the Security Team * Applied upstream patch to fix buffer overflow [lib/http_ntlm.c, CVE-2005-3185] stable/main/binary-m68k/libcurl3_7.13.2-2sarge4_m68k.deb stable/main/binary-m68k/libcurl3-dev_7.13.2-2sarge4_m68k.deb stable/main/binary-m68k/libcurl3-gssapi_7.13.2-2sarge4_m68k.deb stable/main/binary-m68k/curl_7.13.2-2sarge4_m68k.deb stable/main/binary-m68k/libcurl3-dbg_7.13.2-2sarge4_m68k.deb curl (7.13.2-2sarge4) stable-security; urgency=high * Non-maintainer upload by the Security Team * Applied upstream patch to fix buffer overflow [lib/http_ntlm.c, CVE-2005-3185] stable/main/binary-ia64/libcurl3_7.13.2-2sarge4_ia64.deb stable/main/binary-ia64/libcurl3-dev_7.13.2-2sarge4_ia64.deb stable/main/binary-ia64/libcurl3-dbg_7.13.2-2sarge4_ia64.deb stable/main/binary-ia64/libcurl3-gssapi_7.13.2-2sarge4_ia64.deb stable/main/binary-ia64/curl_7.13.2-2sarge4_ia64.deb curl (7.13.2-2sarge4) stable-security; urgency=high * Non-maintainer upload by the Security Team * Applied upstream patch to fix buffer overflow [lib/http_ntlm.c, CVE-2005-3185] stable/main/binary-i386/libcurl3-gssapi_7.13.2-2sarge4_i386.deb stable/main/binary-i386/curl_7.13.2-2sarge4_i386.deb stable/main/binary-i386/libcurl3-dbg_7.13.2-2sarge4_i386.deb stable/main/binary-i386/libcurl3_7.13.2-2sarge4_i386.deb stable/main/binary-i386/libcurl3-dev_7.13.2-2sarge4_i386.deb curl (7.13.2-2sarge4) stable-security; urgency=high * Non-maintainer upload by the Security Team * Applied upstream patch to fix buffer overflow [lib/http_ntlm.c, CVE-2005-3185] stable/main/binary-hppa/libcurl3-dev_7.13.2-2sarge4_hppa.deb stable/main/binary-hppa/curl_7.13.2-2sarge4_hppa.deb stable/main/binary-hppa/libcurl3-dbg_7.13.2-2sarge4_hppa.deb stable/main/binary-hppa/libcurl3_7.13.2-2sarge4_hppa.deb stable/main/binary-hppa/libcurl3-gssapi_7.13.2-2sarge4_hppa.deb curl (7.13.2-2sarge4) stable-security; urgency=high * Non-maintainer upload by the Security Team * Applied upstream patch to fix buffer overflow [lib/http_ntlm.c, CVE-2005-3185] stable/main/binary-arm/libcurl3-gssapi_7.13.2-2sarge4_arm.deb stable/main/binary-arm/libcurl3_7.13.2-2sarge4_arm.deb stable/main/binary-arm/libcurl3-dbg_7.13.2-2sarge4_arm.deb stable/main/binary-arm/curl_7.13.2-2sarge4_arm.deb stable/main/binary-arm/libcurl3-dev_7.13.2-2sarge4_arm.deb curl (7.13.2-2sarge4) stable-security; urgency=high * Non-maintainer upload by the Security Team * Applied upstream patch to fix buffer overflow [lib/http_ntlm.c, CVE-2005-3185] stable/main/binary-alpha/libcurl3-dev_7.13.2-2sarge4_alpha.deb stable/main/binary-alpha/libcurl3-gssapi_7.13.2-2sarge4_alpha.deb stable/main/binary-alpha/libcurl3_7.13.2-2sarge4_alpha.deb stable/main/binary-alpha/libcurl3-dbg_7.13.2-2sarge4_alpha.deb stable/main/binary-alpha/curl_7.13.2-2sarge4_alpha.deb curl (7.13.2-2sarge4) stable-security; urgency=high * Non-maintainer upload by the Security Team * Applied upstream patch to fix buffer overflow [lib/http_ntlm.c, CVE-2005-3185] stable/main/binary-powerpc/libcurl3_7.13.2-2sarge4_powerpc.deb stable/main/source/curl_7.13.2-2sarge4.dsc stable/main/source/curl_7.13.2-2sarge4.diff.gz stable/main/binary-powerpc/libcurl3-gssapi_7.13.2-2sarge4_powerpc.deb stable/main/binary-powerpc/curl_7.13.2-2sarge4_powerpc.deb stable/main/binary-powerpc/libcurl3-dbg_7.13.2-2sarge4_powerpc.deb stable/main/binary-powerpc/libcurl3-dev_7.13.2-2sarge4_powerpc.deb curl (7.13.2-2sarge4) stable-security; urgency=high * Non-maintainer upload by the Security Team * Applied upstream patch to fix buffer overflow [lib/http_ntlm.c, CVE-2005-3185] stable/main/source/crip_3.5-1sarge2.diff.gz stable/main/binary-arm/crip_3.5-1sarge2_arm.deb stable/main/source/crip_3.5-1sarge2.dsc crip (3.5-1sarge2) stable-security; urgency=high * Non-maintainer upload by the Security Team * No changes upload due to the release stable/main/binary-sparc/cpio_2.5-1.3_sparc.deb cpio (2.5-1.3) stable-security; urgency=high * Non-maintainer upload by the Security Team * Applied patch provided by Martin Pitt to fix file permissions race condition [copyin.c, copypass.c, CAN-2005-1111] * Applied patch provided by Martin Pitt to fix file a path traversal vulnerability [copyin.c, CAN-2005-1229] stable/main/binary-s390/cpio_2.5-1.3_s390.deb cpio (2.5-1.3) stable-security; urgency=high * Non-maintainer upload by the Security Team * Applied patch provided by Martin Pitt to fix file permissions race condition [copyin.c, copypass.c, CAN-2005-1111] * Applied patch provided by Martin Pitt to fix file a path traversal vulnerability [copyin.c, CAN-2005-1229] stable/main/binary-mipsel/cpio_2.5-1.3_mipsel.deb cpio (2.5-1.3) stable-security; urgency=high * Non-maintainer upload by the Security Team * Applied patch provided by Martin Pitt to fix file permissions race condition [copyin.c, copypass.c, CAN-2005-1111] * Applied patch provided by Martin Pitt to fix file a path traversal vulnerability [copyin.c, CAN-2005-1229] stable/main/binary-mips/cpio_2.5-1.3_mips.deb cpio (2.5-1.3) stable-security; urgency=high * Non-maintainer upload by the Security Team * Applied patch provided by Martin Pitt to fix file permissions race condition [copyin.c, copypass.c, CAN-2005-1111] * Applied patch provided by Martin Pitt to fix file a path traversal vulnerability [copyin.c, CAN-2005-1229] stable/main/binary-m68k/cpio_2.5-1.3_m68k.deb cpio (2.5-1.3) stable-security; urgency=high * Non-maintainer upload by the Security Team * Applied patch provided by Martin Pitt to fix file permissions race condition [copyin.c, copypass.c, CAN-2005-1111] * Applied patch provided by Martin Pitt to fix file a path traversal vulnerability [copyin.c, CAN-2005-1229] stable/main/binary-ia64/cpio_2.5-1.3_ia64.deb cpio (2.5-1.3) stable-security; urgency=high * Non-maintainer upload by the Security Team * Applied patch provided by Martin Pitt to fix file permissions race condition [copyin.c, copypass.c, CAN-2005-1111] * Applied patch provided by Martin Pitt to fix file a path traversal vulnerability [copyin.c, CAN-2005-1229] stable/main/binary-i386/cpio_2.5-1.3_i386.deb cpio (2.5-1.3) stable-security; urgency=high * Non-maintainer upload by the Security Team * Applied patch provided by Martin Pitt to fix file permissions race condition [copyin.c, copypass.c, CAN-2005-1111] * Applied patch provided by Martin Pitt to fix file a path traversal vulnerability [copyin.c, CAN-2005-1229] stable/main/binary-hppa/cpio_2.5-1.3_hppa.deb cpio (2.5-1.3) stable-security; urgency=high * Non-maintainer upload by the Security Team * Applied patch provided by Martin Pitt to fix file permissions race condition [copyin.c, copypass.c, CAN-2005-1111] * Applied patch provided by Martin Pitt to fix file a path traversal vulnerability [copyin.c, CAN-2005-1229] stable/main/binary-arm/cpio_2.5-1.3_arm.deb cpio (2.5-1.3) stable-security; urgency=high * Non-maintainer upload by the Security Team * Applied patch provided by Martin Pitt to fix file permissions race condition [copyin.c, copypass.c, CAN-2005-1111] * Applied patch provided by Martin Pitt to fix file a path traversal vulnerability [copyin.c, CAN-2005-1229] stable/main/binary-alpha/cpio_2.5-1.3_alpha.deb cpio (2.5-1.3) stable-security; urgency=high * Non-maintainer upload by the Security Team * Applied patch provided by Martin Pitt to fix file permissions race condition [copyin.c, copypass.c, CAN-2005-1111] * Applied patch provided by Martin Pitt to fix file a path traversal vulnerability [copyin.c, CAN-2005-1229] stable/main/binary-powerpc/cpio_2.5-1.3_powerpc.deb stable/main/source/cpio_2.5-1.3.dsc stable/main/source/cpio_2.5-1.3.diff.gz cpio (2.5-1.3) stable-security; urgency=high * Non-maintainer upload by the Security Team * Applied patch provided by Martin Pitt to fix file permissions race condition [copyin.c, copypass.c, CAN-2005-1111] * Applied patch provided by Martin Pitt to fix file a path traversal vulnerability [copyin.c, CAN-2005-1229] stable/main/binary-sparc/courier-imap_3.0.8-4sarge4_sparc.deb stable/main/binary-sparc/courier-mlm_0.47-4sarge4_sparc.deb stable/main/binary-sparc/sqwebmail_0.47-4sarge4_sparc.deb stable/main/binary-sparc/courier-pop_0.47-4sarge4_sparc.deb stable/main/binary-sparc/courier-ssl_0.47-4sarge4_sparc.deb stable/main/binary-sparc/courier-pop-ssl_0.47-4sarge4_sparc.deb stable/main/binary-sparc/courier-imap-ssl_3.0.8-4sarge4_sparc.deb stable/main/binary-sparc/courier-mta-ssl_0.47-4sarge4_sparc.deb stable/main/binary-sparc/courier-ldap_0.47-4sarge4_sparc.deb stable/main/binary-sparc/courier-base_0.47-4sarge4_sparc.deb stable/main/binary-sparc/courier-pcp_0.47-4sarge4_sparc.deb stable/main/binary-sparc/courier-mta_0.47-4sarge4_sparc.deb stable/main/binary-sparc/courier-maildrop_0.47-4sarge4_sparc.deb stable/main/binary-sparc/courier-authpostgresql_0.47-4sarge4_sparc.deb stable/main/binary-sparc/courier-webadmin_0.47-4sarge4_sparc.deb stable/main/binary-sparc/courier-authdaemon_0.47-4sarge4_sparc.deb stable/main/binary-sparc/courier-authmysql_0.47-4sarge4_sparc.deb stable/main/binary-sparc/courier-faxmail_0.47-4sarge4_sparc.deb courier (0.47-4sarge4) stable-security; urgency=high * Non-maintainer upload by the Security Team * Applied patch by David Härdeman to fix unauthorised access [authlib/authpam.c, CVE-2005-3532, Bug#211920] stable/main/binary-s390/courier-mta-ssl_0.47-4sarge4_s390.deb stable/main/binary-s390/courier-pop-ssl_0.47-4sarge4_s390.deb stable/main/binary-s390/courier-base_0.47-4sarge4_s390.deb stable/main/binary-s390/courier-maildrop_0.47-4sarge4_s390.deb stable/main/binary-s390/courier-ldap_0.47-4sarge4_s390.deb stable/main/binary-s390/courier-mlm_0.47-4sarge4_s390.deb stable/main/binary-s390/courier-authpostgresql_0.47-4sarge4_s390.deb stable/main/binary-s390/courier-imap_3.0.8-4sarge4_s390.deb stable/main/binary-s390/sqwebmail_0.47-4sarge4_s390.deb stable/main/binary-s390/courier-authmysql_0.47-4sarge4_s390.deb stable/main/binary-s390/courier-webadmin_0.47-4sarge4_s390.deb stable/main/binary-s390/courier-authdaemon_0.47-4sarge4_s390.deb stable/main/binary-s390/courier-imap-ssl_3.0.8-4sarge4_s390.deb stable/main/binary-s390/courier-pcp_0.47-4sarge4_s390.deb stable/main/binary-s390/courier-mta_0.47-4sarge4_s390.deb stable/main/binary-s390/courier-pop_0.47-4sarge4_s390.deb stable/main/binary-s390/courier-faxmail_0.47-4sarge4_s390.deb stable/main/binary-s390/courier-ssl_0.47-4sarge4_s390.deb courier (0.47-4sarge4) stable-security; urgency=high * Non-maintainer upload by the Security Team * Applied patch by David Härdeman to fix unauthorised access [authlib/authpam.c, CVE-2005-3532, Bug#211920] stable/main/binary-mipsel/sqwebmail_0.47-4sarge4_mipsel.deb stable/main/binary-mipsel/courier-mlm_0.47-4sarge4_mipsel.deb stable/main/binary-mipsel/courier-authdaemon_0.47-4sarge4_mipsel.deb stable/main/binary-mipsel/courier-ssl_0.47-4sarge4_mipsel.deb stable/main/binary-mipsel/courier-mta_0.47-4sarge4_mipsel.deb stable/main/binary-mipsel/courier-pop-ssl_0.47-4sarge4_mipsel.deb stable/main/binary-mipsel/courier-pop_0.47-4sarge4_mipsel.deb stable/main/binary-mipsel/courier-imap-ssl_3.0.8-4sarge4_mipsel.deb stable/main/binary-mipsel/courier-base_0.47-4sarge4_mipsel.deb stable/main/binary-mipsel/courier-pcp_0.47-4sarge4_mipsel.deb stable/main/binary-mipsel/courier-mta-ssl_0.47-4sarge4_mipsel.deb stable/main/binary-mipsel/courier-authmysql_0.47-4sarge4_mipsel.deb stable/main/binary-mipsel/courier-webadmin_0.47-4sarge4_mipsel.deb stable/main/binary-mipsel/courier-ldap_0.47-4sarge4_mipsel.deb stable/main/binary-mipsel/courier-faxmail_0.47-4sarge4_mipsel.deb stable/main/binary-mipsel/courier-authpostgresql_0.47-4sarge4_mipsel.deb stable/main/binary-mipsel/courier-imap_3.0.8-4sarge4_mipsel.deb stable/main/binary-mipsel/courier-maildrop_0.47-4sarge4_mipsel.deb courier (0.47-4sarge4) stable-security; urgency=high * Non-maintainer upload by the Security Team * Applied patch by David Härdeman to fix unauthorised access [authlib/authpam.c, CVE-2005-3532, Bug#211920] stable/main/binary-mips/courier-imap-ssl_3.0.8-4sarge4_mips.deb stable/main/binary-mips/courier-mta-ssl_0.47-4sarge4_mips.deb stable/main/binary-mips/courier-pop-ssl_0.47-4sarge4_mips.deb stable/main/binary-mips/courier-authdaemon_0.47-4sarge4_mips.deb stable/main/binary-mips/courier-ssl_0.47-4sarge4_mips.deb stable/main/binary-mips/courier-pcp_0.47-4sarge4_mips.deb stable/main/binary-mips/courier-authmysql_0.47-4sarge4_mips.deb stable/main/binary-mips/courier-base_0.47-4sarge4_mips.deb stable/main/binary-mips/courier-webadmin_0.47-4sarge4_mips.deb stable/main/binary-mips/courier-maildrop_0.47-4sarge4_mips.deb stable/main/binary-mips/sqwebmail_0.47-4sarge4_mips.deb stable/main/binary-mips/courier-mta_0.47-4sarge4_mips.deb stable/main/binary-mips/courier-pop_0.47-4sarge4_mips.deb stable/main/binary-mips/courier-faxmail_0.47-4sarge4_mips.deb stable/main/binary-mips/courier-mlm_0.47-4sarge4_mips.deb stable/main/binary-mips/courier-authpostgresql_0.47-4sarge4_mips.deb stable/main/binary-mips/courier-ldap_0.47-4sarge4_mips.deb stable/main/binary-mips/courier-imap_3.0.8-4sarge4_mips.deb courier (0.47-4sarge4) stable-security; urgency=high * Non-maintainer upload by the Security Team * Applied patch by David Härdeman to fix unauthorised access [authlib/authpam.c, CVE-2005-3532, Bug#211920] stable/main/binary-m68k/courier-authdaemon_0.47-4sarge4_m68k.deb stable/main/binary-m68k/courier-pcp_0.47-4sarge4_m68k.deb stable/main/binary-m68k/courier-mlm_0.47-4sarge4_m68k.deb stable/main/binary-m68k/sqwebmail_0.47-4sarge4_m68k.deb stable/main/binary-m68k/courier-base_0.47-4sarge4_m68k.deb stable/main/binary-m68k/courier-maildrop_0.47-4sarge4_m68k.deb stable/main/binary-m68k/courier-faxmail_0.47-4sarge4_m68k.deb stable/main/binary-m68k/courier-ssl_0.47-4sarge4_m68k.deb stable/main/binary-m68k/courier-pop-ssl_0.47-4sarge4_m68k.deb stable/main/binary-m68k/courier-authpostgresql_0.47-4sarge4_m68k.deb stable/main/binary-m68k/courier-imap-ssl_3.0.8-4sarge4_m68k.deb stable/main/binary-m68k/courier-pop_0.47-4sarge4_m68k.deb stable/main/binary-m68k/courier-authmysql_0.47-4sarge4_m68k.deb stable/main/binary-m68k/courier-mta_0.47-4sarge4_m68k.deb stable/main/binary-m68k/courier-imap_3.0.8-4sarge4_m68k.deb stable/main/binary-m68k/courier-ldap_0.47-4sarge4_m68k.deb stable/main/binary-m68k/courier-webadmin_0.47-4sarge4_m68k.deb stable/main/binary-m68k/courier-mta-ssl_0.47-4sarge4_m68k.deb courier (0.47-4sarge4) stable-security; urgency=high * Non-maintainer upload by the Security Team * Applied patch by David Härdeman to fix unauthorised access [authlib/authpam.c, CVE-2005-3532, Bug#211920] stable/main/binary-ia64/courier-faxmail_0.47-4sarge4_ia64.deb stable/main/binary-ia64/courier-base_0.47-4sarge4_ia64.deb stable/main/binary-ia64/courier-authmysql_0.47-4sarge4_ia64.deb stable/main/binary-ia64/courier-mlm_0.47-4sarge4_ia64.deb stable/main/binary-ia64/courier-mta_0.47-4sarge4_ia64.deb stable/main/binary-ia64/courier-authpostgresql_0.47-4sarge4_ia64.deb stable/main/binary-ia64/courier-authdaemon_0.47-4sarge4_ia64.deb stable/main/binary-ia64/courier-pcp_0.47-4sarge4_ia64.deb stable/main/binary-ia64/courier-pop_0.47-4sarge4_ia64.deb stable/main/binary-ia64/courier-webadmin_0.47-4sarge4_ia64.deb stable/main/binary-ia64/courier-maildrop_0.47-4sarge4_ia64.deb stable/main/binary-ia64/courier-imap-ssl_3.0.8-4sarge4_ia64.deb stable/main/binary-ia64/courier-pop-ssl_0.47-4sarge4_ia64.deb stable/main/binary-ia64/courier-mta-ssl_0.47-4sarge4_ia64.deb stable/main/binary-ia64/courier-imap_3.0.8-4sarge4_ia64.deb stable/main/binary-ia64/courier-ldap_0.47-4sarge4_ia64.deb stable/main/binary-ia64/courier-ssl_0.47-4sarge4_ia64.deb stable/main/binary-ia64/sqwebmail_0.47-4sarge4_ia64.deb courier (0.47-4sarge4) stable-security; urgency=high * Non-maintainer upload by the Security Team * Applied patch by David Härdeman to fix unauthorised access [authlib/authpam.c, CVE-2005-3532, Bug#211920] stable/main/binary-i386/courier-mta-ssl_0.47-4sarge4_i386.deb stable/main/binary-i386/courier-imap_3.0.8-4sarge4_i386.deb stable/main/binary-i386/courier-faxmail_0.47-4sarge4_i386.deb stable/main/binary-i386/sqwebmail_0.47-4sarge4_i386.deb stable/main/binary-i386/courier-mta_0.47-4sarge4_i386.deb stable/main/binary-i386/courier-imap-ssl_3.0.8-4sarge4_i386.deb stable/main/binary-i386/courier-maildrop_0.47-4sarge4_i386.deb stable/main/binary-i386/courier-authmysql_0.47-4sarge4_i386.deb stable/main/binary-i386/courier-pop-ssl_0.47-4sarge4_i386.deb stable/main/binary-i386/courier-ldap_0.47-4sarge4_i386.deb stable/main/binary-i386/courier-authdaemon_0.47-4sarge4_i386.deb stable/main/binary-i386/courier-authpostgresql_0.47-4sarge4_i386.deb stable/main/binary-i386/courier-mlm_0.47-4sarge4_i386.deb stable/main/binary-i386/courier-base_0.47-4sarge4_i386.deb stable/main/binary-i386/courier-webadmin_0.47-4sarge4_i386.deb stable/main/binary-i386/courier-pop_0.47-4sarge4_i386.deb stable/main/binary-i386/courier-ssl_0.47-4sarge4_i386.deb stable/main/binary-i386/courier-pcp_0.47-4sarge4_i386.deb courier (0.47-4sarge4) stable-security; urgency=high * Non-maintainer upload by the Security Team * Applied patch by David Härdeman to fix unauthorised access [authlib/authpam.c, CVE-2005-3532, Bug#211920] stable/main/binary-hppa/courier-maildrop_0.47-4sarge4_hppa.deb stable/main/binary-hppa/courier-pcp_0.47-4sarge4_hppa.deb stable/main/binary-hppa/courier-ldap_0.47-4sarge4_hppa.deb stable/main/binary-hppa/courier-pop_0.47-4sarge4_hppa.deb stable/main/binary-hppa/courier-imap_3.0.8-4sarge4_hppa.deb stable/main/binary-hppa/courier-mlm_0.47-4sarge4_hppa.deb stable/main/binary-hppa/courier-mta-ssl_0.47-4sarge4_hppa.deb stable/main/binary-hppa/courier-mta_0.47-4sarge4_hppa.deb stable/main/binary-hppa/courier-imap-ssl_3.0.8-4sarge4_hppa.deb stable/main/binary-hppa/courier-authpostgresql_0.47-4sarge4_hppa.deb stable/main/binary-hppa/courier-pop-ssl_0.47-4sarge4_hppa.deb stable/main/binary-hppa/courier-faxmail_0.47-4sarge4_hppa.deb stable/main/binary-hppa/courier-authdaemon_0.47-4sarge4_hppa.deb stable/main/binary-hppa/sqwebmail_0.47-4sarge4_hppa.deb stable/main/binary-hppa/courier-ssl_0.47-4sarge4_hppa.deb stable/main/binary-hppa/courier-base_0.47-4sarge4_hppa.deb stable/main/binary-hppa/courier-webadmin_0.47-4sarge4_hppa.deb stable/main/binary-hppa/courier-authmysql_0.47-4sarge4_hppa.deb courier (0.47-4sarge4) stable-security; urgency=high * Non-maintainer upload by the Security Team * Applied patch by David Härdeman to fix unauthorised access [authlib/authpam.c, CVE-2005-3532, Bug#211920] stable/main/binary-arm/courier-webadmin_0.47-4sarge4_arm.deb stable/main/binary-arm/courier-pcp_0.47-4sarge4_arm.deb stable/main/binary-arm/courier-pop-ssl_0.47-4sarge4_arm.deb stable/main/binary-arm/courier-imap-ssl_3.0.8-4sarge4_arm.deb stable/main/binary-arm/courier-faxmail_0.47-4sarge4_arm.deb stable/main/binary-arm/courier-authpostgresql_0.47-4sarge4_arm.deb stable/main/binary-arm/courier-ssl_0.47-4sarge4_arm.deb stable/main/binary-arm/sqwebmail_0.47-4sarge4_arm.deb stable/main/binary-arm/courier-maildrop_0.47-4sarge4_arm.deb stable/main/binary-arm/courier-base_0.47-4sarge4_arm.deb stable/main/binary-arm/courier-pop_0.47-4sarge4_arm.deb stable/main/binary-arm/courier-ldap_0.47-4sarge4_arm.deb stable/main/binary-arm/courier-mta-ssl_0.47-4sarge4_arm.deb stable/main/binary-arm/courier-mta_0.47-4sarge4_arm.deb stable/main/binary-arm/courier-authmysql_0.47-4sarge4_arm.deb stable/main/binary-arm/courier-authdaemon_0.47-4sarge4_arm.deb stable/main/binary-arm/courier-imap_3.0.8-4sarge4_arm.deb stable/main/binary-arm/courier-mlm_0.47-4sarge4_arm.deb courier (0.47-4sarge4) stable-security; urgency=high * Non-maintainer upload by the Security Team * Applied patch by David Härdeman to fix unauthorised access [authlib/authpam.c, CVE-2005-3532, Bug#211920] stable/main/binary-alpha/courier-imap-ssl_3.0.8-4sarge4_alpha.deb stable/main/binary-alpha/courier-authmysql_0.47-4sarge4_alpha.deb stable/main/binary-alpha/courier-authdaemon_0.47-4sarge4_alpha.deb stable/main/binary-alpha/courier-pop-ssl_0.47-4sarge4_alpha.deb stable/main/binary-alpha/courier-imap_3.0.8-4sarge4_alpha.deb stable/main/binary-alpha/courier-mta_0.47-4sarge4_alpha.deb stable/main/binary-alpha/courier-pop_0.47-4sarge4_alpha.deb stable/main/binary-alpha/courier-ssl_0.47-4sarge4_alpha.deb stable/main/binary-alpha/sqwebmail_0.47-4sarge4_alpha.deb stable/main/binary-alpha/courier-ldap_0.47-4sarge4_alpha.deb stable/main/binary-alpha/courier-authpostgresql_0.47-4sarge4_alpha.deb stable/main/binary-alpha/courier-maildrop_0.47-4sarge4_alpha.deb stable/main/binary-alpha/courier-mta-ssl_0.47-4sarge4_alpha.deb stable/main/binary-alpha/courier-faxmail_0.47-4sarge4_alpha.deb stable/main/binary-alpha/courier-base_0.47-4sarge4_alpha.deb stable/main/binary-alpha/courier-pcp_0.47-4sarge4_alpha.deb stable/main/binary-alpha/courier-webadmin_0.47-4sarge4_alpha.deb stable/main/binary-alpha/courier-mlm_0.47-4sarge4_alpha.deb courier (0.47-4sarge4) stable-security; urgency=high * Non-maintainer upload by the Security Team * Applied patch by David Härdeman to fix unauthorised access [authlib/authpam.c, CVE-2005-3532, Bug#211920] stable/main/binary-powerpc/courier-pcp_0.47-4sarge4_powerpc.deb stable/main/binary-powerpc/courier-ldap_0.47-4sarge4_powerpc.deb stable/main/binary-powerpc/courier-imap-ssl_3.0.8-4sarge4_powerpc.deb stable/main/binary-powerpc/courier-mta_0.47-4sarge4_powerpc.deb stable/main/binary-powerpc/courier-authpostgresql_0.47-4sarge4_powerpc.deb stable/main/binary-powerpc/courier-authmysql_0.47-4sarge4_powerpc.deb stable/main/binary-powerpc/courier-authdaemon_0.47-4sarge4_powerpc.deb stable/main/binary-powerpc/courier-pop-ssl_0.47-4sarge4_powerpc.deb stable/main/binary-powerpc/courier-base_0.47-4sarge4_powerpc.deb stable/main/source/courier_0.47-4sarge4.diff.gz stable/main/binary-powerpc/courier-mlm_0.47-4sarge4_powerpc.deb stable/main/binary-powerpc/sqwebmail_0.47-4sarge4_powerpc.deb stable/main/binary-powerpc/courier-mta-ssl_0.47-4sarge4_powerpc.deb stable/main/source/courier_0.47-4sarge4.dsc stable/main/binary-powerpc/courier-pop_0.47-4sarge4_powerpc.deb stable/main/binary-powerpc/courier-webadmin_0.47-4sarge4_powerpc.deb stable/main/binary-powerpc/courier-maildrop_0.47-4sarge4_powerpc.deb stable/main/binary-powerpc/courier-ssl_0.47-4sarge4_powerpc.deb stable/main/binary-powerpc/courier-faxmail_0.47-4sarge4_powerpc.deb stable/main/binary-powerpc/courier-imap_3.0.8-4sarge4_powerpc.deb stable/main/binary-all/courier-doc_0.47-4sarge4_all.deb courier (0.47-4sarge4) stable-security; urgency=high * Non-maintainer upload by the Security Team * Applied patch by David Härdeman to fix unauthorised access [authlib/authpam.c, CVE-2005-3532, Bug#211920] stable/main/source/common-lisp-controller_4.15sarge3.tar.gz stable/main/source/common-lisp-controller_4.15sarge3.dsc stable/main/binary-all/common-lisp-controller_4.15sarge3_all.deb common-lisp-controller (4.15sarge3) stable-security; urgency=low * in clisp/stable the umask function is not in posix, but in the linux package. (Closes: #338296) stable/main/binary-sparc/libclamav1_0.84-2.sarge.5_sparc.deb stable/main/binary-sparc/clamav_0.84-2.sarge.5_sparc.deb stable/main/binary-sparc/clamav-freshclam_0.84-2.sarge.5_sparc.deb stable/main/binary-sparc/libclamav-dev_0.84-2.sarge.5_sparc.deb stable/main/binary-sparc/clamav-milter_0.84-2.sarge.5_sparc.deb stable/main/binary-sparc/clamav-daemon_0.84-2.sarge.5_sparc.deb clamav (0.84-2.sarge.5) stable-security; urgency=low * Upstream fix for possible infinite loop [libclamav/tnef.c: IDEF1169] * Upstream fix for possible infinite loop [libclamav/mspack/cabd.c: IDEF1180] * Upstream fix for buffer size calculation [libclamav/fsg.c: ZDI-CAN-004] * Upstream fix for possible infinite loop [libclamav/others.c,h, libclamav/ole2_extract.c: CAN-2005-3239] * Upstream fix for boundary checks [libclamav/petite.c] * Upstream fix to scan attachments that have no file names [libclamav/mbox.c] stable/main/binary-s390/libclamav1_0.84-2.sarge.5_s390.deb stable/main/binary-s390/libclamav-dev_0.84-2.sarge.5_s390.deb stable/main/binary-s390/clamav-daemon_0.84-2.sarge.5_s390.deb stable/main/binary-s390/clamav-freshclam_0.84-2.sarge.5_s390.deb stable/main/binary-s390/clamav_0.84-2.sarge.5_s390.deb stable/main/binary-s390/clamav-milter_0.84-2.sarge.5_s390.deb clamav (0.84-2.sarge.5) stable-security; urgency=low * Upstream fix for possible infinite loop [libclamav/tnef.c: IDEF1169] * Upstream fix for possible infinite loop [libclamav/mspack/cabd.c: IDEF1180] * Upstream fix for buffer size calculation [libclamav/fsg.c: ZDI-CAN-004] * Upstream fix for possible infinite loop [libclamav/others.c,h, libclamav/ole2_extract.c: CAN-2005-3239] * Upstream fix for boundary checks [libclamav/petite.c] * Upstream fix to scan attachments that have no file names [libclamav/mbox.c] stable/main/binary-powerpc/clamav-daemon_0.84-2.sarge.5_powerpc.deb stable/main/binary-powerpc/clamav-milter_0.84-2.sarge.5_powerpc.deb stable/main/binary-powerpc/libclamav1_0.84-2.sarge.5_powerpc.deb stable/main/binary-powerpc/clamav_0.84-2.sarge.5_powerpc.deb stable/main/binary-powerpc/libclamav-dev_0.84-2.sarge.5_powerpc.deb stable/main/binary-powerpc/clamav-freshclam_0.84-2.sarge.5_powerpc.deb clamav (0.84-2.sarge.5) stable-security; urgency=low * Upstream fix for possible infinite loop [libclamav/tnef.c: IDEF1169] * Upstream fix for possible infinite loop [libclamav/mspack/cabd.c: IDEF1180] * Upstream fix for buffer size calculation [libclamav/fsg.c: ZDI-CAN-004] * Upstream fix for possible infinite loop [libclamav/others.c,h, libclamav/ole2_extract.c: CAN-2005-3239] * Upstream fix for boundary checks [libclamav/petite.c] * Upstream fix to scan attachments that have no file names [libclamav/mbox.c] stable/main/binary-mipsel/clamav-freshclam_0.84-2.sarge.5_mipsel.deb stable/main/binary-mipsel/clamav-milter_0.84-2.sarge.5_mipsel.deb stable/main/binary-mipsel/libclamav-dev_0.84-2.sarge.5_mipsel.deb stable/main/binary-mipsel/clamav_0.84-2.sarge.5_mipsel.deb stable/main/binary-mipsel/clamav-daemon_0.84-2.sarge.5_mipsel.deb stable/main/binary-mipsel/libclamav1_0.84-2.sarge.5_mipsel.deb clamav (0.84-2.sarge.5) stable-security; urgency=low * Upstream fix for possible infinite loop [libclamav/tnef.c: IDEF1169] * Upstream fix for possible infinite loop [libclamav/mspack/cabd.c: IDEF1180] * Upstream fix for buffer size calculation [libclamav/fsg.c: ZDI-CAN-004] * Upstream fix for possible infinite loop [libclamav/others.c,h, libclamav/ole2_extract.c: CAN-2005-3239] * Upstream fix for boundary checks [libclamav/petite.c] * Upstream fix to scan attachments that have no file names [libclamav/mbox.c] stable/main/binary-mips/clamav-freshclam_0.84-2.sarge.5_mips.deb stable/main/binary-mips/clamav_0.84-2.sarge.5_mips.deb stable/main/binary-mips/clamav-daemon_0.84-2.sarge.5_mips.deb stable/main/binary-mips/libclamav1_0.84-2.sarge.5_mips.deb stable/main/binary-mips/libclamav-dev_0.84-2.sarge.5_mips.deb stable/main/binary-mips/clamav-milter_0.84-2.sarge.5_mips.deb clamav (0.84-2.sarge.5) stable-security; urgency=low * Upstream fix for possible infinite loop [libclamav/tnef.c: IDEF1169] * Upstream fix for possible infinite loop [libclamav/mspack/cabd.c: IDEF1180] * Upstream fix for buffer size calculation [libclamav/fsg.c: ZDI-CAN-004] * Upstream fix for possible infinite loop [libclamav/others.c,h, libclamav/ole2_extract.c: CAN-2005-3239] * Upstream fix for boundary checks [libclamav/petite.c] * Upstream fix to scan attachments that have no file names [libclamav/mbox.c] stable/main/binary-m68k/clamav-freshclam_0.84-2.sarge.5_m68k.deb stable/main/binary-m68k/libclamav-dev_0.84-2.sarge.5_m68k.deb stable/main/binary-m68k/libclamav1_0.84-2.sarge.5_m68k.deb stable/main/binary-m68k/clamav_0.84-2.sarge.5_m68k.deb stable/main/binary-m68k/clamav-milter_0.84-2.sarge.5_m68k.deb stable/main/binary-m68k/clamav-daemon_0.84-2.sarge.5_m68k.deb clamav (0.84-2.sarge.5) stable-security; urgency=low * Upstream fix for possible infinite loop [libclamav/tnef.c: IDEF1169] * Upstream fix for possible infinite loop [libclamav/mspack/cabd.c: IDEF1180] * Upstream fix for buffer size calculation [libclamav/fsg.c: ZDI-CAN-004] * Upstream fix for possible infinite loop [libclamav/others.c,h, libclamav/ole2_extract.c: CAN-2005-3239] * Upstream fix for boundary checks [libclamav/petite.c] * Upstream fix to scan attachments that have no file names [libclamav/mbox.c] stable/main/binary-ia64/clamav-daemon_0.84-2.sarge.5_ia64.deb stable/main/binary-ia64/libclamav-dev_0.84-2.sarge.5_ia64.deb stable/main/binary-ia64/libclamav1_0.84-2.sarge.5_ia64.deb stable/main/binary-ia64/clamav-milter_0.84-2.sarge.5_ia64.deb stable/main/binary-ia64/clamav-freshclam_0.84-2.sarge.5_ia64.deb stable/main/binary-ia64/clamav_0.84-2.sarge.5_ia64.deb clamav (0.84-2.sarge.5) stable-security; urgency=low * Upstream fix for possible infinite loop [libclamav/tnef.c: IDEF1169] * Upstream fix for possible infinite loop [libclamav/mspack/cabd.c: IDEF1180] * Upstream fix for buffer size calculation [libclamav/fsg.c: ZDI-CAN-004] * Upstream fix for possible infinite loop [libclamav/others.c,h, libclamav/ole2_extract.c: CAN-2005-3239] * Upstream fix for boundary checks [libclamav/petite.c] * Upstream fix to scan attachments that have no file names [libclamav/mbox.c] stable/main/binary-hppa/clamav_0.84-2.sarge.5_hppa.deb stable/main/binary-hppa/clamav-milter_0.84-2.sarge.5_hppa.deb stable/main/binary-hppa/libclamav-dev_0.84-2.sarge.5_hppa.deb stable/main/binary-hppa/clamav-daemon_0.84-2.sarge.5_hppa.deb stable/main/binary-hppa/clamav-freshclam_0.84-2.sarge.5_hppa.deb stable/main/binary-hppa/libclamav1_0.84-2.sarge.5_hppa.deb clamav (0.84-2.sarge.5) stable-security; urgency=low * Upstream fix for possible infinite loop [libclamav/tnef.c: IDEF1169] * Upstream fix for possible infinite loop [libclamav/mspack/cabd.c: IDEF1180] * Upstream fix for buffer size calculation [libclamav/fsg.c: ZDI-CAN-004] * Upstream fix for possible infinite loop [libclamav/others.c,h, libclamav/ole2_extract.c: CAN-2005-3239] * Upstream fix for boundary checks [libclamav/petite.c] * Upstream fix to scan attachments that have no file names [libclamav/mbox.c] stable/main/binary-arm/clamav-freshclam_0.84-2.sarge.5_arm.deb stable/main/binary-arm/clamav-milter_0.84-2.sarge.5_arm.deb stable/main/binary-arm/clamav_0.84-2.sarge.5_arm.deb stable/main/binary-arm/libclamav1_0.84-2.sarge.5_arm.deb stable/main/binary-arm/libclamav-dev_0.84-2.sarge.5_arm.deb stable/main/binary-arm/clamav-daemon_0.84-2.sarge.5_arm.deb clamav (0.84-2.sarge.5) stable-security; urgency=low * Upstream fix for possible infinite loop [libclamav/tnef.c: IDEF1169] * Upstream fix for possible infinite loop [libclamav/mspack/cabd.c: IDEF1180] * Upstream fix for buffer size calculation [libclamav/fsg.c: ZDI-CAN-004] * Upstream fix for possible infinite loop [libclamav/others.c,h, libclamav/ole2_extract.c: CAN-2005-3239] * Upstream fix for boundary checks [libclamav/petite.c] * Upstream fix to scan attachments that have no file names [libclamav/mbox.c] stable/main/binary-alpha/clamav-milter_0.84-2.sarge.5_alpha.deb stable/main/binary-alpha/clamav-daemon_0.84-2.sarge.5_alpha.deb stable/main/binary-alpha/clamav_0.84-2.sarge.5_alpha.deb stable/main/binary-alpha/clamav-freshclam_0.84-2.sarge.5_alpha.deb stable/main/binary-alpha/libclamav-dev_0.84-2.sarge.5_alpha.deb stable/main/binary-alpha/libclamav1_0.84-2.sarge.5_alpha.deb clamav (0.84-2.sarge.5) stable-security; urgency=low * Upstream fix for possible infinite loop [libclamav/tnef.c: IDEF1169] * Upstream fix for possible infinite loop [libclamav/mspack/cabd.c: IDEF1180] * Upstream fix for buffer size calculation [libclamav/fsg.c: ZDI-CAN-004] * Upstream fix for possible infinite loop [libclamav/others.c,h, libclamav/ole2_extract.c: CAN-2005-3239] * Upstream fix for boundary checks [libclamav/petite.c] * Upstream fix to scan attachments that have no file names [libclamav/mbox.c] stable/main/binary-i386/clamav_0.84-2.sarge.5_i386.deb stable/main/binary-i386/clamav-milter_0.84-2.sarge.5_i386.deb stable/main/source/clamav_0.84-2.sarge.5.dsc stable/main/binary-i386/libclamav1_0.84-2.sarge.5_i386.deb stable/main/binary-all/clamav-docs_0.84-2.sarge.5_all.deb stable/main/source/clamav_0.84-2.sarge.5.diff.gz stable/main/binary-i386/clamav-daemon_0.84-2.sarge.5_i386.deb stable/main/binary-i386/clamav-freshclam_0.84-2.sarge.5_i386.deb stable/main/binary-all/clamav-testfiles_0.84-2.sarge.5_all.deb stable/main/binary-all/clamav-base_0.84-2.sarge.5_all.deb stable/main/binary-i386/libclamav-dev_0.84-2.sarge.5_i386.deb clamav (0.84-2.sarge.5) stable-security; urgency=low * Upstream fix for possible infinite loop [libclamav/tnef.c: IDEF1169] * Upstream fix for possible infinite loop [libclamav/mspack/cabd.c: IDEF1180] * Upstream fix for buffer size calculation [libclamav/fsg.c: ZDI-CAN-004] * Upstream fix for possible infinite loop [libclamav/others.c,h, libclamav/ole2_extract.c: CAN-2005-3239] * Upstream fix for boundary checks [libclamav/petite.c] * Upstream fix to scan attachments that have no file names [libclamav/mbox.c] stable/main/binary-sparc/chmlib-dev_0.35-6sarge1_sparc.deb stable/main/binary-sparc/chmlib-bin_0.35-6sarge1_sparc.deb stable/main/binary-sparc/chmlib_0.35-6sarge1_sparc.deb chmlib (0.35-6sarge1) stable-security; urgency=high * Applied backported patch from the maintainer to fix vulnerabilities [src/chm_lib.c, src/chm_lib.h, src/lzx.c]: . CVE-2005-2659 - LZX decompression buffer in chmlib . CVE-2005-2448 - Endianess errors . CVE-2005-2369 - Multiple integer signedness errors * Applied backported patch from the maintainer to fix memory alignment errors [src/chm_lib.c, CVE-2005-2370] * Added precautionary code from the maintainer to fix potential buffer overflow [src/chm_lib.c, CVE-2005-2930] * Applied upstream patch to prevent buffer overflow [src/chm_lib.c, CVE-2005-3318] stable/main/binary-s390/chmlib-dev_0.35-6sarge1_s390.deb stable/main/binary-s390/chmlib-bin_0.35-6sarge1_s390.deb stable/main/binary-s390/chmlib_0.35-6sarge1_s390.deb chmlib (0.35-6sarge1) stable-security; urgency=high * Applied backported patch from the maintainer to fix vulnerabilities [src/chm_lib.c, src/chm_lib.h, src/lzx.c]: . CVE-2005-2659 - LZX decompression buffer in chmlib . CVE-2005-2448 - Endianess errors . CVE-2005-2369 - Multiple integer signedness errors * Applied backported patch from the maintainer to fix memory alignment errors [src/chm_lib.c, CVE-2005-2370] * Added precautionary code from the maintainer to fix potential buffer overflow [src/chm_lib.c, CVE-2005-2930] * Applied upstream patch to prevent buffer overflow [src/chm_lib.c, CVE-2005-3318] stable/main/binary-mipsel/chmlib_0.35-6sarge1_mipsel.deb stable/main/binary-mipsel/chmlib-dev_0.35-6sarge1_mipsel.deb stable/main/binary-mipsel/chmlib-bin_0.35-6sarge1_mipsel.deb chmlib (0.35-6sarge1) stable-security; urgency=high * Applied backported patch from the maintainer to fix vulnerabilities [src/chm_lib.c, src/chm_lib.h, src/lzx.c]: . CVE-2005-2659 - LZX decompression buffer in chmlib . CVE-2005-2448 - Endianess errors . CVE-2005-2369 - Multiple integer signedness errors * Applied backported patch from the maintainer to fix memory alignment errors [src/chm_lib.c, CVE-2005-2370] * Added precautionary code from the maintainer to fix potential buffer overflow [src/chm_lib.c, CVE-2005-2930] * Applied upstream patch to prevent buffer overflow [src/chm_lib.c, CVE-2005-3318] stable/main/binary-mips/chmlib-bin_0.35-6sarge1_mips.deb stable/main/binary-mips/chmlib-dev_0.35-6sarge1_mips.deb stable/main/binary-mips/chmlib_0.35-6sarge1_mips.deb chmlib (0.35-6sarge1) stable-security; urgency=high * Applied backported patch from the maintainer to fix vulnerabilities [src/chm_lib.c, src/chm_lib.h, src/lzx.c]: . CVE-2005-2659 - LZX decompression buffer in chmlib . CVE-2005-2448 - Endianess errors . CVE-2005-2369 - Multiple integer signedness errors * Applied backported patch from the maintainer to fix memory alignment errors [src/chm_lib.c, CVE-2005-2370] * Added precautionary code from the maintainer to fix potential buffer overflow [src/chm_lib.c, CVE-2005-2930] * Applied upstream patch to prevent buffer overflow [src/chm_lib.c, CVE-2005-3318] stable/main/binary-m68k/chmlib-bin_0.35-6sarge1_m68k.deb stable/main/binary-m68k/chmlib_0.35-6sarge1_m68k.deb stable/main/binary-m68k/chmlib-dev_0.35-6sarge1_m68k.deb chmlib (0.35-6sarge1) stable-security; urgency=high * Applied backported patch from the maintainer to fix vulnerabilities [src/chm_lib.c, src/chm_lib.h, src/lzx.c]: . CVE-2005-2659 - LZX decompression buffer in chmlib . CVE-2005-2448 - Endianess errors . CVE-2005-2369 - Multiple integer signedness errors * Applied backported patch from the maintainer to fix memory alignment errors [src/chm_lib.c, CVE-2005-2370] * Added precautionary code from the maintainer to fix potential buffer overflow [src/chm_lib.c, CVE-2005-2930] * Applied upstream patch to prevent buffer overflow [src/chm_lib.c, CVE-2005-3318] stable/main/binary-ia64/chmlib-dev_0.35-6sarge1_ia64.deb stable/main/binary-ia64/chmlib_0.35-6sarge1_ia64.deb stable/main/binary-ia64/chmlib-bin_0.35-6sarge1_ia64.deb chmlib (0.35-6sarge1) stable-security; urgency=high * Applied backported patch from the maintainer to fix vulnerabilities [src/chm_lib.c, src/chm_lib.h, src/lzx.c]: . CVE-2005-2659 - LZX decompression buffer in chmlib . CVE-2005-2448 - Endianess errors . CVE-2005-2369 - Multiple integer signedness errors * Applied backported patch from the maintainer to fix memory alignment errors [src/chm_lib.c, CVE-2005-2370] * Added precautionary code from the maintainer to fix potential buffer overflow [src/chm_lib.c, CVE-2005-2930] * Applied upstream patch to prevent buffer overflow [src/chm_lib.c, CVE-2005-3318] stable/main/binary-i386/chmlib_0.35-6sarge1_i386.deb stable/main/binary-i386/chmlib-bin_0.35-6sarge1_i386.deb stable/main/binary-i386/chmlib-dev_0.35-6sarge1_i386.deb chmlib (0.35-6sarge1) stable-security; urgency=high * Applied backported patch from the maintainer to fix vulnerabilities [src/chm_lib.c, src/chm_lib.h, src/lzx.c]: . CVE-2005-2659 - LZX decompression buffer in chmlib . CVE-2005-2448 - Endianess errors . CVE-2005-2369 - Multiple integer signedness errors * Applied backported patch from the maintainer to fix memory alignment errors [src/chm_lib.c, CVE-2005-2370] * Added precautionary code from the maintainer to fix potential buffer overflow [src/chm_lib.c, CVE-2005-2930] * Applied upstream patch to prevent buffer overflow [src/chm_lib.c, CVE-2005-3318] stable/main/binary-hppa/chmlib-dev_0.35-6sarge1_hppa.deb stable/main/binary-hppa/chmlib-bin_0.35-6sarge1_hppa.deb stable/main/binary-hppa/chmlib_0.35-6sarge1_hppa.deb chmlib (0.35-6sarge1) stable-security; urgency=high * Applied backported patch from the maintainer to fix vulnerabilities [src/chm_lib.c, src/chm_lib.h, src/lzx.c]: . CVE-2005-2659 - LZX decompression buffer in chmlib . CVE-2005-2448 - Endianess errors . CVE-2005-2369 - Multiple integer signedness errors * Applied backported patch from the maintainer to fix memory alignment errors [src/chm_lib.c, CVE-2005-2370] * Added precautionary code from the maintainer to fix potential buffer overflow [src/chm_lib.c, CVE-2005-2930] * Applied upstream patch to prevent buffer overflow [src/chm_lib.c, CVE-2005-3318] stable/main/binary-arm/chmlib_0.35-6sarge1_arm.deb stable/main/binary-arm/chmlib-dev_0.35-6sarge1_arm.deb stable/main/binary-arm/chmlib-bin_0.35-6sarge1_arm.deb chmlib (0.35-6sarge1) stable-security; urgency=high * Applied backported patch from the maintainer to fix vulnerabilities [src/chm_lib.c, src/chm_lib.h, src/lzx.c]: . CVE-2005-2659 - LZX decompression buffer in chmlib . CVE-2005-2448 - Endianess errors . CVE-2005-2369 - Multiple integer signedness errors * Applied backported patch from the maintainer to fix memory alignment errors [src/chm_lib.c, CVE-2005-2370] * Added precautionary code from the maintainer to fix potential buffer overflow [src/chm_lib.c, CVE-2005-2930] * Applied upstream patch to prevent buffer overflow [src/chm_lib.c, CVE-2005-3318] stable/main/binary-alpha/chmlib-dev_0.35-6sarge1_alpha.deb stable/main/binary-alpha/chmlib_0.35-6sarge1_alpha.deb stable/main/binary-alpha/chmlib-bin_0.35-6sarge1_alpha.deb chmlib (0.35-6sarge1) stable-security; urgency=high * Applied backported patch from the maintainer to fix vulnerabilities [src/chm_lib.c, src/chm_lib.h, src/lzx.c]: . CVE-2005-2659 - LZX decompression buffer in chmlib . CVE-2005-2448 - Endianess errors . CVE-2005-2369 - Multiple integer signedness errors * Applied backported patch from the maintainer to fix memory alignment errors [src/chm_lib.c, CVE-2005-2370] * Added precautionary code from the maintainer to fix potential buffer overflow [src/chm_lib.c, CVE-2005-2930] * Applied upstream patch to prevent buffer overflow [src/chm_lib.c, CVE-2005-3318] stable/main/source/chmlib_0.35-6sarge1.diff.gz stable/main/binary-powerpc/chmlib-bin_0.35-6sarge1_powerpc.deb stable/main/source/chmlib_0.35-6sarge1.dsc stable/main/binary-powerpc/chmlib_0.35-6sarge1_powerpc.deb stable/main/binary-powerpc/chmlib-dev_0.35-6sarge1_powerpc.deb chmlib (0.35-6sarge1) stable-security; urgency=high * Applied backported patch from the maintainer to fix vulnerabilities [src/chm_lib.c, src/chm_lib.h, src/lzx.c]: . CVE-2005-2659 - LZX decompression buffer in chmlib . CVE-2005-2448 - Endianess errors . CVE-2005-2369 - Multiple integer signedness errors * Applied backported patch from the maintainer to fix memory alignment errors [src/chm_lib.c, CVE-2005-2370] * Added precautionary code from the maintainer to fix potential buffer overflow [src/chm_lib.c, CVE-2005-2930] * Applied upstream patch to prevent buffer overflow [src/chm_lib.c, CVE-2005-3318] stable/main/binary-sparc/cgiemail_1.6-26sarge1_sparc.deb cgiemail (1.6-26sarge1) stable; urgency=high * QA upload. * Explicitly set sendmail path to `/usr/sbin/sendmail'. Since it's not essential, configure wasn't able to find it on most auto-builders and defaulted to just `sendmail', which made the package unusable with the default PATH. Closes: #320752. stable/main/binary-s390/cgiemail_1.6-26sarge1_s390.deb cgiemail (1.6-26sarge1) stable; urgency=high * QA upload. * Explicitly set sendmail path to `/usr/sbin/sendmail'. Since it's not essential, configure wasn't able to find it on most auto-builders and defaulted to just `sendmail', which made the package unusable with the default PATH. Closes: #320752. stable/main/binary-powerpc/cgiemail_1.6-26sarge1_powerpc.deb cgiemail (1.6-26sarge1) stable; urgency=high * QA upload. * Explicitly set sendmail path to `/usr/sbin/sendmail'. Since it's not essential, configure wasn't able to find it on most auto-builders and defaulted to just `sendmail', which made the package unusable with the default PATH. Closes: #320752. stable/main/binary-mipsel/cgiemail_1.6-26sarge1_mipsel.deb cgiemail (1.6-26sarge1) stable; urgency=high * QA upload. * Explicitly set sendmail path to `/usr/sbin/sendmail'. Since it's not essential, configure wasn't able to find it on most auto-builders and defaulted to just `sendmail', which made the package unusable with the default PATH. Closes: #320752. stable/main/binary-mips/cgiemail_1.6-26sarge1_mips.deb cgiemail (1.6-26sarge1) stable; urgency=high * QA upload. * Explicitly set sendmail path to `/usr/sbin/sendmail'. Since it's not essential, configure wasn't able to find it on most auto-builders and defaulted to just `sendmail', which made the package unusable with the default PATH. Closes: #320752. stable/main/binary-m68k/cgiemail_1.6-26sarge1_m68k.deb cgiemail (1.6-26sarge1) stable; urgency=high * QA upload. * Explicitly set sendmail path to `/usr/sbin/sendmail'. Since it's not essential, configure wasn't able to find it on most auto-builders and defaulted to just `sendmail', which made the package unusable with the default PATH. Closes: #320752. stable/main/binary-ia64/cgiemail_1.6-26sarge1_ia64.deb cgiemail (1.6-26sarge1) stable; urgency=high * QA upload. * Explicitly set sendmail path to `/usr/sbin/sendmail'. Since it's not essential, configure wasn't able to find it on most auto-builders and defaulted to just `sendmail', which made the package unusable with the default PATH. Closes: #320752. stable/main/binary-hppa/cgiemail_1.6-26sarge1_hppa.deb cgiemail (1.6-26sarge1) stable; urgency=high * QA upload. * Explicitly set sendmail path to `/usr/sbin/sendmail'. Since it's not essential, configure wasn't able to find it on most auto-builders and defaulted to just `sendmail', which made the package unusable with the default PATH. Closes: #320752. stable/main/binary-arm/cgiemail_1.6-26sarge1_arm.deb cgiemail (1.6-26sarge1) stable; urgency=high * QA upload. * Explicitly set sendmail path to `/usr/sbin/sendmail'. Since it's not essential, configure wasn't able to find it on most auto-builders and defaulted to just `sendmail', which made the package unusable with the default PATH. Closes: #320752. stable/main/binary-alpha/cgiemail_1.6-26sarge1_alpha.deb cgiemail (1.6-26sarge1) stable; urgency=high * QA upload. * Explicitly set sendmail path to `/usr/sbin/sendmail'. Since it's not essential, configure wasn't able to find it on most auto-builders and defaulted to just `sendmail', which made the package unusable with the default PATH. Closes: #320752. stable/main/source/cgiemail_1.6-26sarge1.diff.gz stable/main/source/cgiemail_1.6-26sarge1.dsc stable/main/binary-i386/cgiemail_1.6-26sarge1_i386.deb cgiemail (1.6-26sarge1) stable; urgency=high * QA upload. * Explicitly set sendmail path to `/usr/sbin/sendmail'. Since it's not essential, configure wasn't able to find it on most auto-builders and defaulted to just `sendmail', which made the package unusable with the default PATH. Closes: #320752. stable/main/binary-sparc/cfengine2_2.1.14-1sarge1_sparc.deb cfengine2 (2.1.14-1sarge1) stable-security; urgency=high * New maintainer upload by the Security Team * Applied patch by Javier Fernández-Sanguino Peña to fix insecure temporary file creation [debian/patches/010_CAN-2005-2960_tmpfile] stable/main/binary-s390/cfengine2_2.1.14-1sarge1_s390.deb cfengine2 (2.1.14-1sarge1) stable-security; urgency=high * New maintainer upload by the Security Team * Applied patch by Javier Fernández-Sanguino Peña to fix insecure temporary file creation [debian/patches/010_CAN-2005-2960_tmpfile] stable/main/binary-mipsel/cfengine2_2.1.14-1sarge1_mipsel.deb cfengine2 (2.1.14-1sarge1) stable-security; urgency=high * New maintainer upload by the Security Team * Applied patch by Javier Fernández-Sanguino Peña to fix insecure temporary file creation [debian/patches/010_CAN-2005-2960_tmpfile] stable/main/binary-mips/cfengine2_2.1.14-1sarge1_mips.deb cfengine2 (2.1.14-1sarge1) stable-security; urgency=high * New maintainer upload by the Security Team * Applied patch by Javier Fernández-Sanguino Peña to fix insecure temporary file creation [debian/patches/010_CAN-2005-2960_tmpfile] stable/main/binary-m68k/cfengine2_2.1.14-1sarge1_m68k.deb cfengine2 (2.1.14-1sarge1) stable-security; urgency=high * New maintainer upload by the Security Team * Applied patch by Javier Fernández-Sanguino Peña to fix insecure temporary file creation [debian/patches/010_CAN-2005-2960_tmpfile] stable/main/binary-ia64/cfengine2_2.1.14-1sarge1_ia64.deb cfengine2 (2.1.14-1sarge1) stable-security; urgency=high * New maintainer upload by the Security Team * Applied patch by Javier Fernández-Sanguino Peña to fix insecure temporary file creation [debian/patches/010_CAN-2005-2960_tmpfile] stable/main/binary-i386/cfengine2_2.1.14-1sarge1_i386.deb cfengine2 (2.1.14-1sarge1) stable-security; urgency=high * New maintainer upload by the Security Team * Applied patch by Javier Fernández-Sanguino Peña to fix insecure temporary file creation [debian/patches/010_CAN-2005-2960_tmpfile] stable/main/binary-hppa/cfengine2_2.1.14-1sarge1_hppa.deb cfengine2 (2.1.14-1sarge1) stable-security; urgency=high * New maintainer upload by the Security Team * Applied patch by Javier Fernández-Sanguino Peña to fix insecure temporary file creation [debian/patches/010_CAN-2005-2960_tmpfile] stable/main/binary-arm/cfengine2_2.1.14-1sarge1_arm.deb cfengine2 (2.1.14-1sarge1) stable-security; urgency=high * New maintainer upload by the Security Team * Applied patch by Javier Fernández-Sanguino Peña to fix insecure temporary file creation [debian/patches/010_CAN-2005-2960_tmpfile] stable/main/binary-alpha/cfengine2_2.1.14-1sarge1_alpha.deb cfengine2 (2.1.14-1sarge1) stable-security; urgency=high * New maintainer upload by the Security Team * Applied patch by Javier Fernández-Sanguino Peña to fix insecure temporary file creation [debian/patches/010_CAN-2005-2960_tmpfile] stable/main/binary-all/cfengine2-doc_2.1.14-1sarge1_all.deb stable/main/source/cfengine2_2.1.14-1sarge1.diff.gz stable/main/binary-powerpc/cfengine2_2.1.14-1sarge1_powerpc.deb stable/main/source/cfengine2_2.1.14-1sarge1.dsc cfengine2 (2.1.14-1sarge1) stable-security; urgency=high * New maintainer upload by the Security Team * Applied patch by Javier Fernández-Sanguino Peña to fix insecure temporary file creation [debian/patches/010_CAN-2005-2960_tmpfile] stable/main/binary-sparc/cfengine_1.6.5-1sarge1_sparc.deb cfengine (1.6.5-1sarge1) stable-security; urgency=high * New maintainer upload by the Security Team * Applied patch by Javier Fernández-Sanguino Peña to fix insecure temporary file creation [debian/patches/020_CAN-2005-2960_tmpfile] stable/main/binary-s390/cfengine_1.6.5-1sarge1_s390.deb cfengine (1.6.5-1sarge1) stable-security; urgency=high * New maintainer upload by the Security Team * Applied patch by Javier Fernández-Sanguino Peña to fix insecure temporary file creation [debian/patches/020_CAN-2005-2960_tmpfile] stable/main/binary-mipsel/cfengine_1.6.5-1sarge1_mipsel.deb cfengine (1.6.5-1sarge1) stable-security; urgency=high * New maintainer upload by the Security Team * Applied patch by Javier Fernández-Sanguino Peña to fix insecure temporary file creation [debian/patches/020_CAN-2005-2960_tmpfile] stable/main/binary-mips/cfengine_1.6.5-1sarge1_mips.deb cfengine (1.6.5-1sarge1) stable-security; urgency=high * New maintainer upload by the Security Team * Applied patch by Javier Fernández-Sanguino Peña to fix insecure temporary file creation [debian/patches/020_CAN-2005-2960_tmpfile] stable/main/binary-m68k/cfengine_1.6.5-1sarge1_m68k.deb cfengine (1.6.5-1sarge1) stable-security; urgency=high * New maintainer upload by the Security Team * Applied patch by Javier Fernández-Sanguino Peña to fix insecure temporary file creation [debian/patches/020_CAN-2005-2960_tmpfile] stable/main/binary-ia64/cfengine_1.6.5-1sarge1_ia64.deb cfengine (1.6.5-1sarge1) stable-security; urgency=high * New maintainer upload by the Security Team * Applied patch by Javier Fernández-Sanguino Peña to fix insecure temporary file creation [debian/patches/020_CAN-2005-2960_tmpfile] stable/main/binary-i386/cfengine_1.6.5-1sarge1_i386.deb cfengine (1.6.5-1sarge1) stable-security; urgency=high * New maintainer upload by the Security Team * Applied patch by Javier Fernández-Sanguino Peña to fix insecure temporary file creation [debian/patches/020_CAN-2005-2960_tmpfile] stable/main/binary-hppa/cfengine_1.6.5-1sarge1_hppa.deb cfengine (1.6.5-1sarge1) stable-security; urgency=high * New maintainer upload by the Security Team * Applied patch by Javier Fernández-Sanguino Peña to fix insecure temporary file creation [debian/patches/020_CAN-2005-2960_tmpfile] stable/main/binary-arm/cfengine_1.6.5-1sarge1_arm.deb cfengine (1.6.5-1sarge1) stable-security; urgency=high * New maintainer upload by the Security Team * Applied patch by Javier Fernández-Sanguino Peña to fix insecure temporary file creation [debian/patches/020_CAN-2005-2960_tmpfile] stable/main/binary-alpha/cfengine_1.6.5-1sarge1_alpha.deb cfengine (1.6.5-1sarge1) stable-security; urgency=high * New maintainer upload by the Security Team * Applied patch by Javier Fernández-Sanguino Peña to fix insecure temporary file creation [debian/patches/020_CAN-2005-2960_tmpfile] stable/main/source/cfengine_1.6.5-1sarge1.diff.gz stable/main/binary-powerpc/cfengine_1.6.5-1sarge1_powerpc.deb stable/main/source/cfengine_1.6.5-1sarge1.dsc stable/main/binary-all/cfengine-doc_1.6.5-1sarge1_all.deb cfengine (1.6.5-1sarge1) stable-security; urgency=high * New maintainer upload by the Security Team * Applied patch by Javier Fernández-Sanguino Peña to fix insecure temporary file creation [debian/patches/020_CAN-2005-2960_tmpfile] stable/main/binary-sparc/centericq-utf8_4.20.0-1sarge3_sparc.deb stable/main/binary-sparc/centericq-common_4.20.0-1sarge3_sparc.deb stable/main/binary-sparc/centericq_4.20.0-1sarge3_sparc.deb stable/main/binary-sparc/centericq-fribidi_4.20.0-1sarge3_sparc.deb centericq (4.20.0-1sarge3) stable-security; urgency=high * Non-maintainer upload by the Security Team * Applied patch by Steve Langasek to fix remote crash [libicq2000-0.1/src/DirectClient.cpp, CVE-2005-3694] stable/main/binary-s390/centericq-utf8_4.20.0-1sarge3_s390.deb stable/main/binary-s390/centericq-common_4.20.0-1sarge3_s390.deb stable/main/binary-s390/centericq-fribidi_4.20.0-1sarge3_s390.deb stable/main/binary-s390/centericq_4.20.0-1sarge3_s390.deb centericq (4.20.0-1sarge3) stable-security; urgency=high * Non-maintainer upload by the Security Team * Applied patch by Steve Langasek to fix remote crash [libicq2000-0.1/src/DirectClient.cpp, CVE-2005-3694] stable/main/binary-powerpc/centericq_4.20.0-1sarge3_powerpc.deb stable/main/binary-powerpc/centericq-fribidi_4.20.0-1sarge3_powerpc.deb stable/main/binary-powerpc/centericq-common_4.20.0-1sarge3_powerpc.deb stable/main/binary-powerpc/centericq-utf8_4.20.0-1sarge3_powerpc.deb centericq (4.20.0-1sarge3) stable-security; urgency=high * Non-maintainer upload by the Security Team * Applied patch by Steve Langasek to fix remote crash [libicq2000-0.1/src/DirectClient.cpp, CVE-2005-3694] stable/main/binary-mipsel/centericq-common_4.20.0-1sarge3_mipsel.deb stable/main/binary-mipsel/centericq-utf8_4.20.0-1sarge3_mipsel.deb stable/main/binary-mipsel/centericq_4.20.0-1sarge3_mipsel.deb stable/main/binary-mipsel/centericq-fribidi_4.20.0-1sarge3_mipsel.deb centericq (4.20.0-1sarge3) stable-security; urgency=high * Non-maintainer upload by the Security Team * Applied patch by Steve Langasek to fix remote crash [libicq2000-0.1/src/DirectClient.cpp, CVE-2005-3694] stable/main/binary-mips/centericq-common_4.20.0-1sarge3_mips.deb stable/main/binary-mips/centericq-fribidi_4.20.0-1sarge3_mips.deb stable/main/binary-mips/centericq_4.20.0-1sarge3_mips.deb stable/main/binary-mips/centericq-utf8_4.20.0-1sarge3_mips.deb centericq (4.20.0-1sarge3) stable-security; urgency=high * Non-maintainer upload by the Security Team * Applied patch by Steve Langasek to fix remote crash [libicq2000-0.1/src/DirectClient.cpp, CVE-2005-3694] stable/main/binary-m68k/centericq-common_4.20.0-1sarge3_m68k.deb stable/main/binary-m68k/centericq-fribidi_4.20.0-1sarge3_m68k.deb stable/main/binary-m68k/centericq_4.20.0-1sarge3_m68k.deb stable/main/binary-m68k/centericq-utf8_4.20.0-1sarge3_m68k.deb centericq (4.20.0-1sarge3) stable-security; urgency=high * Non-maintainer upload by the Security Team * Applied patch by Steve Langasek to fix remote crash [libicq2000-0.1/src/DirectClient.cpp, CVE-2005-3694] stable/main/binary-ia64/centericq-utf8_4.20.0-1sarge3_ia64.deb stable/main/binary-ia64/centericq_4.20.0-1sarge3_ia64.deb stable/main/binary-ia64/centericq-common_4.20.0-1sarge3_ia64.deb stable/main/binary-ia64/centericq-fribidi_4.20.0-1sarge3_ia64.deb centericq (4.20.0-1sarge3) stable-security; urgency=high * Non-maintainer upload by the Security Team * Applied patch by Steve Langasek to fix remote crash [libicq2000-0.1/src/DirectClient.cpp, CVE-2005-3694] stable/main/binary-hppa/centericq-utf8_4.20.0-1sarge3_hppa.deb stable/main/binary-hppa/centericq-fribidi_4.20.0-1sarge3_hppa.deb stable/main/binary-hppa/centericq-common_4.20.0-1sarge3_hppa.deb stable/main/binary-hppa/centericq_4.20.0-1sarge3_hppa.deb centericq (4.20.0-1sarge3) stable-security; urgency=high * Non-maintainer upload by the Security Team * Applied patch by Steve Langasek to fix remote crash [libicq2000-0.1/src/DirectClient.cpp, CVE-2005-3694] stable/main/binary-arm/centericq-fribidi_4.20.0-1sarge3_arm.deb stable/main/binary-arm/centericq-common_4.20.0-1sarge3_arm.deb stable/main/binary-arm/centericq-utf8_4.20.0-1sarge3_arm.deb stable/main/binary-arm/centericq_4.20.0-1sarge3_arm.deb centericq (4.20.0-1sarge3) stable-security; urgency=high * Non-maintainer upload by the Security Team * Applied patch by Steve Langasek to fix remote crash [libicq2000-0.1/src/DirectClient.cpp, CVE-2005-3694] stable/main/binary-alpha/centericq-utf8_4.20.0-1sarge3_alpha.deb stable/main/binary-alpha/centericq-fribidi_4.20.0-1sarge3_alpha.deb stable/main/binary-alpha/centericq_4.20.0-1sarge3_alpha.deb stable/main/binary-alpha/centericq-common_4.20.0-1sarge3_alpha.deb centericq (4.20.0-1sarge3) stable-security; urgency=high * Non-maintainer upload by the Security Team * Applied patch by Steve Langasek to fix remote crash [libicq2000-0.1/src/DirectClient.cpp, CVE-2005-3694] stable/main/binary-i386/centericq_4.20.0-1sarge3_i386.deb stable/main/source/centericq_4.20.0-1sarge3.diff.gz stable/main/binary-i386/centericq-common_4.20.0-1sarge3_i386.deb stable/main/binary-i386/centericq-fribidi_4.20.0-1sarge3_i386.deb stable/main/source/centericq_4.20.0-1sarge3.dsc stable/main/binary-i386/centericq-utf8_4.20.0-1sarge3_i386.deb centericq (4.20.0-1sarge3) stable-security; urgency=high * Non-maintainer upload by the Security Team * Applied patch by Steve Langasek to fix remote crash [libicq2000-0.1/src/DirectClient.cpp, CVE-2005-3694] stable/main/source/cacti_0.8.6c-7sarge2.diff.gz stable/main/source/cacti_0.8.6c-7sarge2.dsc stable/main/binary-all/cacti_0.8.6c-7sarge2_all.deb cacti (0.8.6c-7sarge2) stable-security; urgency=high * security update prepared for the debian security team by the package maintainer. * Removed double patched code that accidently crept in when converting the source to svn [graphs_new.php, host.php, lib/database.php] * fix for the following security issues reported by the php-hardened project: - 032005: Cacti Multiple SQL Injection Vulnerabilities - 042005: Cacti Remote Command Execution Vulnerability - 052005: Cacti Authentication/Addslashes Bypass Vulnerability stable/contrib/binary-sparc/bluez-bcm203x_2.15-1.1_sparc.deb stable/main/binary-sparc/bluez-cups_2.15-1.1_sparc.deb stable/main/binary-sparc/bluez-utils_2.15-1.1_sparc.deb stable/main/binary-sparc/bluez-pcmcia-support_2.15-1.1_sparc.deb bluez-utils (2.15-1.1) stable-security; urgency=high * Fix command injection insecurity in hcid. See CAN-2005-2547. Add 900_hcid_injection_fix.patch. stable/contrib/binary-s390/bluez-bcm203x_2.15-1.1_s390.deb stable/main/binary-s390/bluez-cups_2.15-1.1_s390.deb stable/main/binary-s390/bluez-utils_2.15-1.1_s390.deb bluez-utils (2.15-1.1) stable-security; urgency=high * Fix command injection insecurity in hcid. See CAN-2005-2547. Add 900_hcid_injection_fix.patch. stable/main/binary-powerpc/bluez-utils_2.15-1.1_powerpc.deb stable/contrib/binary-powerpc/bluez-bcm203x_2.15-1.1_powerpc.deb stable/main/binary-powerpc/bluez-pcmcia-support_2.15-1.1_powerpc.deb stable/main/binary-powerpc/bluez-cups_2.15-1.1_powerpc.deb bluez-utils (2.15-1.1) stable-security; urgency=high * Fix command injection insecurity in hcid. See CAN-2005-2547. Add 900_hcid_injection_fix.patch. stable/main/binary-mipsel/bluez-cups_2.15-1.1_mipsel.deb stable/main/binary-mipsel/bluez-utils_2.15-1.1_mipsel.deb stable/main/binary-mipsel/bluez-pcmcia-support_2.15-1.1_mipsel.deb stable/contrib/binary-mipsel/bluez-bcm203x_2.15-1.1_mipsel.deb bluez-utils (2.15-1.1) stable-security; urgency=high * Fix command injection insecurity in hcid. See CAN-2005-2547. Add 900_hcid_injection_fix.patch. stable/main/binary-mips/bluez-cups_2.15-1.1_mips.deb stable/contrib/binary-mips/bluez-bcm203x_2.15-1.1_mips.deb stable/main/binary-mips/bluez-pcmcia-support_2.15-1.1_mips.deb stable/main/binary-mips/bluez-utils_2.15-1.1_mips.deb bluez-utils (2.15-1.1) stable-security; urgency=high * Fix command injection insecurity in hcid. See CAN-2005-2547. Add 900_hcid_injection_fix.patch. stable/main/binary-m68k/bluez-pcmcia-support_2.15-1.1_m68k.deb stable/contrib/binary-m68k/bluez-bcm203x_2.15-1.1_m68k.deb stable/main/binary-m68k/bluez-cups_2.15-1.1_m68k.deb stable/main/binary-m68k/bluez-utils_2.15-1.1_m68k.deb bluez-utils (2.15-1.1) stable-security; urgency=high * Fix command injection insecurity in hcid. See CAN-2005-2547. Add 900_hcid_injection_fix.patch. stable/main/binary-ia64/bluez-utils_2.15-1.1_ia64.deb stable/main/binary-ia64/bluez-cups_2.15-1.1_ia64.deb stable/main/binary-ia64/bluez-pcmcia-support_2.15-1.1_ia64.deb stable/contrib/binary-ia64/bluez-bcm203x_2.15-1.1_ia64.deb bluez-utils (2.15-1.1) stable-security; urgency=high * Fix command injection insecurity in hcid. See CAN-2005-2547. Add 900_hcid_injection_fix.patch. stable/main/binary-i386/bluez-utils_2.15-1.1_i386.deb stable/main/binary-i386/bluez-pcmcia-support_2.15-1.1_i386.deb stable/contrib/binary-i386/bluez-bcm203x_2.15-1.1_i386.deb stable/main/binary-i386/bluez-cups_2.15-1.1_i386.deb bluez-utils (2.15-1.1) stable-security; urgency=high * Fix command injection insecurity in hcid. See CAN-2005-2547. Add 900_hcid_injection_fix.patch. stable/main/binary-arm/bluez-cups_2.15-1.1_arm.deb stable/main/binary-arm/bluez-pcmcia-support_2.15-1.1_arm.deb stable/main/binary-arm/bluez-utils_2.15-1.1_arm.deb stable/contrib/binary-arm/bluez-bcm203x_2.15-1.1_arm.deb bluez-utils (2.15-1.1) stable-security; urgency=high * Fix command injection insecurity in hcid. See CAN-2005-2547. Add 900_hcid_injection_fix.patch. stable/contrib/binary-alpha/bluez-bcm203x_2.15-1.1_alpha.deb stable/main/binary-alpha/bluez-pcmcia-support_2.15-1.1_alpha.deb stable/main/binary-alpha/bluez-utils_2.15-1.1_alpha.deb stable/main/binary-alpha/bluez-cups_2.15-1.1_alpha.deb bluez-utils (2.15-1.1) stable-security; urgency=high * Fix command injection insecurity in hcid. See CAN-2005-2547. Add 900_hcid_injection_fix.patch. stable/main/source/bluez-utils_2.15-1.1.dsc stable/main/source/bluez-utils_2.15-1.1.diff.gz stable/main/binary-hppa/bluez-utils_2.15-1.1_hppa.deb stable/main/binary-hppa/bluez-pcmcia-support_2.15-1.1_hppa.deb stable/contrib/binary-hppa/bluez-bcm203x_2.15-1.1_hppa.deb stable/main/binary-hppa/bluez-cups_2.15-1.1_hppa.deb bluez-utils (2.15-1.1) stable-security; urgency=high * Fix command injection insecurity in hcid. See CAN-2005-2547. Add 900_hcid_injection_fix.patch. stable/main/source/backuppc_2.1.1-2sarge1.dsc stable/main/source/backuppc_2.1.1-2sarge1.diff.gz stable/main/binary-all/backuppc_2.1.1-2sarge1_all.deb backuppc (2.1.1-2sarge1) stable; urgency=medium * Fixed an important bug in BackupPC_tarCreate which can cause archives to be corrupted. * Backported a fix from bpc 2.1.2. A dataloss could occur by changing some attributes in the configuration file. stable/main/source/backupninja_0.5-3sarge1.dsc stable/main/source/backupninja_0.5-3sarge1.diff.gz stable/main/binary-all/backupninja_0.5-3sarge1_all.deb backupninja (0.5-3sarge1) stable-security; urgency=high * Fix for insecure temporary file creation stable/main/binary-all/backup-manager_0.5.7-1sarge1_all.deb stable/main/source/backup-manager_0.5.7-1sarge1.dsc stable/main/source/backup-manager_0.5.7-1sarge1.diff.gz backup-manager (0.5.7-1sarge1) stable-security; urgency=high * dpatch code for handling patches in debian/rules, added a build-dependency on dpatch. * Closed security advisory `CAN-2005-1855': New patch for backporting the security fix from 0.5.8 about the repository permissions. debian/patches/01_security_308897.dpatch (closes: #308897) * Closed security advisory `CAN-2005-1856': New patch for using mktemp for some temporary files when burning a CDR. debian/patches/02_security_315582.dpatch (closes: #315582) stable/main/source/awstats_6.4-1sarge1.diff.gz stable/main/source/awstats_6.4-1sarge1.dsc stable/main/binary-all/awstats_6.4-1sarge1_all.deb awstats (6.4-1sarge1) stable-security; urgency=high [ Charles Fry ] * SECURITY UPDATE: Fix arbitrary command injection. (Closes: #322591) Thanks to Martin Pitt for reporting the issue and providing the patch. * Add debian/patches/03_remove_eval.patch: - Replace all eval() calls for dynamically constructed function names with soft references. This fixes arbitrary command injection with specially crafted referer URLs which contain Perl code. - Patch taken from upstream CVS, and contained in 6.5 release. * References: CAN-2005-1527 http://www.idefense.com/application/poi/display?id=290&type=vulnerabilities [ Jonas Smedegaard ] * Adjust distribution. stable/main/binary-sparc/arc_5.21l-1sarge1_sparc.deb arc (5.21l-1sarge1) stable-security; urgency=high * Non-maintainer upload by the Security Team * Fixed insecure permissions of a temporary file [arcsvc.c, CAN-2005-2945] * Fixed insecure temporary file creation [arcsvc.c, CAN-2005-2992] stable/main/binary-s390/arc_5.21l-1sarge1_s390.deb arc (5.21l-1sarge1) stable-security; urgency=high * Non-maintainer upload by the Security Team * Fixed insecure permissions of a temporary file [arcsvc.c, CAN-2005-2945] * Fixed insecure temporary file creation [arcsvc.c, CAN-2005-2992] stable/main/binary-mipsel/arc_5.21l-1sarge1_mipsel.deb arc (5.21l-1sarge1) stable-security; urgency=high * Non-maintainer upload by the Security Team * Fixed insecure permissions of a temporary file [arcsvc.c, CAN-2005-2945] * Fixed insecure temporary file creation [arcsvc.c, CAN-2005-2992] stable/main/binary-mips/arc_5.21l-1sarge1_mips.deb arc (5.21l-1sarge1) stable-security; urgency=high * Non-maintainer upload by the Security Team * Fixed insecure permissions of a temporary file [arcsvc.c, CAN-2005-2945] * Fixed insecure temporary file creation [arcsvc.c, CAN-2005-2992] stable/main/binary-m68k/arc_5.21l-1sarge1_m68k.deb arc (5.21l-1sarge1) stable-security; urgency=high * Non-maintainer upload by the Security Team * Fixed insecure permissions of a temporary file [arcsvc.c, CAN-2005-2945] * Fixed insecure temporary file creation [arcsvc.c, CAN-2005-2992] stable/main/binary-ia64/arc_5.21l-1sarge1_ia64.deb arc (5.21l-1sarge1) stable-security; urgency=high * Non-maintainer upload by the Security Team * Fixed insecure permissions of a temporary file [arcsvc.c, CAN-2005-2945] * Fixed insecure temporary file creation [arcsvc.c, CAN-2005-2992] stable/main/binary-i386/arc_5.21l-1sarge1_i386.deb arc (5.21l-1sarge1) stable-security; urgency=high * Non-maintainer upload by the Security Team * Fixed insecure permissions of a temporary file [arcsvc.c, CAN-2005-2945] * Fixed insecure temporary file creation [arcsvc.c, CAN-2005-2992] stable/main/binary-hppa/arc_5.21l-1sarge1_hppa.deb arc (5.21l-1sarge1) stable-security; urgency=high * Non-maintainer upload by the Security Team * Fixed insecure permissions of a temporary file [arcsvc.c, CAN-2005-2945] * Fixed insecure temporary file creation [arcsvc.c, CAN-2005-2992] stable/main/binary-arm/arc_5.21l-1sarge1_arm.deb arc (5.21l-1sarge1) stable-security; urgency=high * Non-maintainer upload by the Security Team * Fixed insecure permissions of a temporary file [arcsvc.c, CAN-2005-2945] * Fixed insecure temporary file creation [arcsvc.c, CAN-2005-2992] stable/main/binary-alpha/arc_5.21l-1sarge1_alpha.deb arc (5.21l-1sarge1) stable-security; urgency=high * Non-maintainer upload by the Security Team * Fixed insecure permissions of a temporary file [arcsvc.c, CAN-2005-2945] * Fixed insecure temporary file creation [arcsvc.c, CAN-2005-2992] stable/main/binary-powerpc/arc_5.21l-1sarge1_powerpc.deb stable/main/source/arc_5.21l-1sarge1.dsc stable/main/source/arc_5.21l-1sarge1.diff.gz arc (5.21l-1sarge1) stable-security; urgency=high * Non-maintainer upload by the Security Team * Fixed insecure permissions of a temporary file [arcsvc.c, CAN-2005-2945] * Fixed insecure temporary file creation [arcsvc.c, CAN-2005-2992] stable/main/binary-all/apt-cacher_0.9.4sarge1_all.deb stable/main/source/apt-cacher_0.9.4sarge1.dsc stable/main/source/apt-cacher_0.9.4sarge1.tar.gz apt-cacher (0.9.4sarge1) stable-security; urgency=high * Non-maintainer upload by The Security Team. * Fixes arbitary command execution as httpd user. (CAN-2005-1854) stable/main/binary-sparc/apachetop_0.12.5-1sarge1_sparc.deb apachetop (0.12.5-1sarge1) stable-security; urgency=high * Non-maintainer upload by The Security Team. * Fix insecure temporary file usage in debug output. [CAN-2005-2660]. stable/main/binary-s390/apachetop_0.12.5-1sarge1_s390.deb apachetop (0.12.5-1sarge1) stable-security; urgency=high * Non-maintainer upload by The Security Team. * Fix insecure temporary file usage in debug output. [CAN-2005-2660]. stable/main/binary-powerpc/apachetop_0.12.5-1sarge1_powerpc.deb apachetop (0.12.5-1sarge1) stable-security; urgency=high * Non-maintainer upload by The Security Team. * Fix insecure temporary file usage in debug output. [CAN-2005-2660]. stable/main/binary-mipsel/apachetop_0.12.5-1sarge1_mipsel.deb apachetop (0.12.5-1sarge1) stable-security; urgency=high * Non-maintainer upload by The Security Team. * Fix insecure temporary file usage in debug output. [CAN-2005-2660]. stable/main/binary-mips/apachetop_0.12.5-1sarge1_mips.deb apachetop (0.12.5-1sarge1) stable-security; urgency=high * Non-maintainer upload by The Security Team. * Fix insecure temporary file usage in debug output. [CAN-2005-2660]. stable/main/binary-m68k/apachetop_0.12.5-1sarge1_m68k.deb apachetop (0.12.5-1sarge1) stable-security; urgency=high * Non-maintainer upload by The Security Team. * Fix insecure temporary file usage in debug output. [CAN-2005-2660]. stable/main/binary-ia64/apachetop_0.12.5-1sarge1_ia64.deb apachetop (0.12.5-1sarge1) stable-security; urgency=high * Non-maintainer upload by The Security Team. * Fix insecure temporary file usage in debug output. [CAN-2005-2660]. stable/main/binary-hppa/apachetop_0.12.5-1sarge1_hppa.deb apachetop (0.12.5-1sarge1) stable-security; urgency=high * Non-maintainer upload by The Security Team. * Fix insecure temporary file usage in debug output. [CAN-2005-2660]. stable/main/binary-arm/apachetop_0.12.5-1sarge1_arm.deb apachetop (0.12.5-1sarge1) stable-security; urgency=high * Non-maintainer upload by The Security Team. * Fix insecure temporary file usage in debug output. [CAN-2005-2660]. stable/main/binary-alpha/apachetop_0.12.5-1sarge1_alpha.deb apachetop (0.12.5-1sarge1) stable-security; urgency=high * Non-maintainer upload by The Security Team. * Fix insecure temporary file usage in debug output. [CAN-2005-2660]. stable/main/source/apachetop_0.12.5-1sarge1.dsc stable/main/binary-i386/apachetop_0.12.5-1sarge1_i386.deb stable/main/source/apachetop_0.12.5-1sarge1.diff.gz apachetop (0.12.5-1sarge1) stable-security; urgency=high * Non-maintainer upload by The Security Team. * Fix insecure temporary file usage in debug output. [CAN-2005-2660]. stable/main/binary-sparc/apache_1.3.33-6sarge1_sparc.deb stable/main/binary-sparc/apache-dbg_1.3.33-6sarge1_sparc.deb stable/main/binary-sparc/apache-ssl_1.3.33-6sarge1_sparc.deb stable/main/binary-sparc/apache-perl_1.3.33-6sarge1_sparc.deb stable/main/binary-sparc/apache-common_1.3.33-6sarge1_sparc.deb stable/main/binary-sparc/libapache-mod-perl_1.29.0.3-6sarge1_sparc.deb apache (1.3.33-6sarge1) stable-security; urgency=high * Add 906_content_length_CAN-2005-2088, resolving an issue in mod_proxy where, when a response contains both Transfer-Encoding and Content-Length headers, the connection can be used for HTTP request smuggling and HTTP request spoofing attacks; see CAN-2005-2088 (closes: #322607) stable/main/binary-s390/apache-perl_1.3.33-6sarge1_s390.deb stable/main/binary-s390/apache_1.3.33-6sarge1_s390.deb stable/main/binary-s390/apache-common_1.3.33-6sarge1_s390.deb stable/main/binary-s390/apache-dbg_1.3.33-6sarge1_s390.deb stable/main/binary-s390/apache-ssl_1.3.33-6sarge1_s390.deb stable/main/binary-s390/libapache-mod-perl_1.29.0.3-6sarge1_s390.deb apache (1.3.33-6sarge1) stable-security; urgency=high * Add 906_content_length_CAN-2005-2088, resolving an issue in mod_proxy where, when a response contains both Transfer-Encoding and Content-Length headers, the connection can be used for HTTP request smuggling and HTTP request spoofing attacks; see CAN-2005-2088 (closes: #322607) stable/main/binary-powerpc/apache-ssl_1.3.33-6sarge1_powerpc.deb stable/main/binary-powerpc/apache_1.3.33-6sarge1_powerpc.deb stable/main/binary-powerpc/apache-dbg_1.3.33-6sarge1_powerpc.deb stable/main/binary-powerpc/libapache-mod-perl_1.29.0.3-6sarge1_powerpc.deb stable/main/binary-powerpc/apache-perl_1.3.33-6sarge1_powerpc.deb stable/main/binary-powerpc/apache-common_1.3.33-6sarge1_powerpc.deb apache (1.3.33-6sarge1) stable-security; urgency=high * Add 906_content_length_CAN-2005-2088, resolving an issue in mod_proxy where, when a response contains both Transfer-Encoding and Content-Length headers, the connection can be used for HTTP request smuggling and HTTP request spoofing attacks; see CAN-2005-2088 (closes: #322607) stable/main/binary-mipsel/apache-perl_1.3.33-6sarge1_mipsel.deb stable/main/binary-mipsel/apache-ssl_1.3.33-6sarge1_mipsel.deb stable/main/binary-mipsel/apache_1.3.33-6sarge1_mipsel.deb stable/main/binary-mipsel/apache-dbg_1.3.33-6sarge1_mipsel.deb stable/main/binary-mipsel/libapache-mod-perl_1.29.0.3-6sarge1_mipsel.deb stable/main/binary-mipsel/apache-common_1.3.33-6sarge1_mipsel.deb apache (1.3.33-6sarge1) stable-security; urgency=high * Add 906_content_length_CAN-2005-2088, resolving an issue in mod_proxy where, when a response contains both Transfer-Encoding and Content-Length headers, the connection can be used for HTTP request smuggling and HTTP request spoofing attacks; see CAN-2005-2088 (closes: #322607) stable/main/binary-mips/apache-dbg_1.3.33-6sarge1_mips.deb stable/main/binary-mips/apache_1.3.33-6sarge1_mips.deb stable/main/binary-mips/apache-perl_1.3.33-6sarge1_mips.deb stable/main/binary-mips/libapache-mod-perl_1.29.0.3-6sarge1_mips.deb stable/main/binary-mips/apache-ssl_1.3.33-6sarge1_mips.deb stable/main/binary-mips/apache-common_1.3.33-6sarge1_mips.deb apache (1.3.33-6sarge1) stable-security; urgency=high * Add 906_content_length_CAN-2005-2088, resolving an issue in mod_proxy where, when a response contains both Transfer-Encoding and Content-Length headers, the connection can be used for HTTP request smuggling and HTTP request spoofing attacks; see CAN-2005-2088 (closes: #322607) stable/main/binary-m68k/apache_1.3.33-6sarge1_m68k.deb stable/main/binary-m68k/apache-dbg_1.3.33-6sarge1_m68k.deb stable/main/binary-m68k/libapache-mod-perl_1.29.0.3-6sarge1_m68k.deb stable/main/binary-m68k/apache-ssl_1.3.33-6sarge1_m68k.deb stable/main/binary-m68k/apache-common_1.3.33-6sarge1_m68k.deb stable/main/binary-m68k/apache-perl_1.3.33-6sarge1_m68k.deb apache (1.3.33-6sarge1) stable-security; urgency=high * Add 906_content_length_CAN-2005-2088, resolving an issue in mod_proxy where, when a response contains both Transfer-Encoding and Content-Length headers, the connection can be used for HTTP request smuggling and HTTP request spoofing attacks; see CAN-2005-2088 (closes: #322607) stable/main/binary-ia64/libapache-mod-perl_1.29.0.3-6sarge1_ia64.deb stable/main/binary-ia64/apache_1.3.33-6sarge1_ia64.deb stable/main/binary-ia64/apache-perl_1.3.33-6sarge1_ia64.deb stable/main/binary-ia64/apache-common_1.3.33-6sarge1_ia64.deb stable/main/binary-ia64/apache-dbg_1.3.33-6sarge1_ia64.deb stable/main/binary-ia64/apache-ssl_1.3.33-6sarge1_ia64.deb apache (1.3.33-6sarge1) stable-security; urgency=high * Add 906_content_length_CAN-2005-2088, resolving an issue in mod_proxy where, when a response contains both Transfer-Encoding and Content-Length headers, the connection can be used for HTTP request smuggling and HTTP request spoofing attacks; see CAN-2005-2088 (closes: #322607) stable/main/binary-hppa/apache-perl_1.3.33-6sarge1_hppa.deb stable/main/binary-hppa/apache-common_1.3.33-6sarge1_hppa.deb stable/main/binary-hppa/apache-dbg_1.3.33-6sarge1_hppa.deb stable/main/binary-hppa/apache_1.3.33-6sarge1_hppa.deb stable/main/binary-hppa/apache-ssl_1.3.33-6sarge1_hppa.deb stable/main/binary-hppa/libapache-mod-perl_1.29.0.3-6sarge1_hppa.deb apache (1.3.33-6sarge1) stable-security; urgency=high * Add 906_content_length_CAN-2005-2088, resolving an issue in mod_proxy where, when a response contains both Transfer-Encoding and Content-Length headers, the connection can be used for HTTP request smuggling and HTTP request spoofing attacks; see CAN-2005-2088 (closes: #322607) stable/main/binary-arm/apache-ssl_1.3.33-6sarge1_arm.deb stable/main/binary-arm/apache-common_1.3.33-6sarge1_arm.deb stable/main/binary-arm/libapache-mod-perl_1.29.0.3-6sarge1_arm.deb stable/main/binary-arm/apache-perl_1.3.33-6sarge1_arm.deb stable/main/binary-arm/apache-dbg_1.3.33-6sarge1_arm.deb stable/main/binary-arm/apache_1.3.33-6sarge1_arm.deb apache (1.3.33-6sarge1) stable-security; urgency=high * Add 906_content_length_CAN-2005-2088, resolving an issue in mod_proxy where, when a response contains both Transfer-Encoding and Content-Length headers, the connection can be used for HTTP request smuggling and HTTP request spoofing attacks; see CAN-2005-2088 (closes: #322607) stable/main/binary-alpha/apache-ssl_1.3.33-6sarge1_alpha.deb stable/main/binary-alpha/apache-perl_1.3.33-6sarge1_alpha.deb stable/main/binary-alpha/apache-common_1.3.33-6sarge1_alpha.deb stable/main/binary-alpha/apache-dbg_1.3.33-6sarge1_alpha.deb stable/main/binary-alpha/apache_1.3.33-6sarge1_alpha.deb stable/main/binary-alpha/libapache-mod-perl_1.29.0.3-6sarge1_alpha.deb apache (1.3.33-6sarge1) stable-security; urgency=high * Add 906_content_length_CAN-2005-2088, resolving an issue in mod_proxy where, when a response contains both Transfer-Encoding and Content-Length headers, the connection can be used for HTTP request smuggling and HTTP request spoofing attacks; see CAN-2005-2088 (closes: #322607) stable/main/binary-i386/libapache-mod-perl_1.29.0.3-6sarge1_i386.deb stable/main/binary-all/apache-doc_1.3.33-6sarge1_all.deb stable/main/binary-i386/apache-common_1.3.33-6sarge1_i386.deb stable/main/binary-i386/apache_1.3.33-6sarge1_i386.deb stable/main/binary-i386/apache-ssl_1.3.33-6sarge1_i386.deb stable/main/source/apache_1.3.33-6sarge1.diff.gz stable/main/binary-i386/apache-dbg_1.3.33-6sarge1_i386.deb stable/main/source/apache_1.3.33-6sarge1.dsc stable/main/binary-all/apache-dev_1.3.33-6sarge1_all.deb stable/main/binary-i386/apache-perl_1.3.33-6sarge1_i386.deb stable/main/binary-all/apache-utils_1.3.33-6sarge1_all.deb apache (1.3.33-6sarge1) stable-security; urgency=high * Add 906_content_length_CAN-2005-2088, resolving an issue in mod_proxy where, when a response contains both Transfer-Encoding and Content-Length headers, the connection can be used for HTTP request smuggling and HTTP request spoofing attacks; see CAN-2005-2088 (closes: #322607) stable/main/binary-sparc/libaffix2_2.1.1-3_sparc.deb stable/main/binary-sparc/libaffix-dev_2.1.1-3_sparc.deb stable/main/binary-sparc/affix_2.1.1-3_sparc.deb affix (2.1.1-3) stable-security; urgency=high * Security fix. * Applied patch provided by upstream to fix poor use of popen() in btsrv. [CAN-2005-2716] (closes: Bug#325444) stable/main/binary-s390/affix_2.1.1-3_s390.deb stable/main/binary-s390/libaffix2_2.1.1-3_s390.deb stable/main/binary-s390/libaffix-dev_2.1.1-3_s390.deb affix (2.1.1-3) stable-security; urgency=high * Security fix. * Applied patch provided by upstream to fix poor use of popen() in btsrv. [CAN-2005-2716] (closes: Bug#325444) stable/main/binary-powerpc/libaffix-dev_2.1.1-3_powerpc.deb stable/main/binary-powerpc/affix_2.1.1-3_powerpc.deb stable/main/binary-powerpc/libaffix2_2.1.1-3_powerpc.deb affix (2.1.1-3) stable-security; urgency=high * Security fix. * Applied patch provided by upstream to fix poor use of popen() in btsrv. [CAN-2005-2716] (closes: Bug#325444) stable/main/binary-mipsel/libaffix2_2.1.1-3_mipsel.deb stable/main/binary-mipsel/libaffix-dev_2.1.1-3_mipsel.deb stable/main/binary-mipsel/affix_2.1.1-3_mipsel.deb affix (2.1.1-3) stable-security; urgency=high * Security fix. * Applied patch provided by upstream to fix poor use of popen() in btsrv. [CAN-2005-2716] (closes: Bug#325444) stable/main/binary-mips/affix_2.1.1-3_mips.deb stable/main/binary-mips/libaffix2_2.1.1-3_mips.deb stable/main/binary-mips/libaffix-dev_2.1.1-3_mips.deb affix (2.1.1-3) stable-security; urgency=high * Security fix. * Applied patch provided by upstream to fix poor use of popen() in btsrv. [CAN-2005-2716] (closes: Bug#325444) stable/main/binary-m68k/libaffix2_2.1.1-3_m68k.deb stable/main/binary-m68k/affix_2.1.1-3_m68k.deb stable/main/binary-m68k/libaffix-dev_2.1.1-3_m68k.deb affix (2.1.1-3) stable-security; urgency=high * Security fix. * Applied patch provided by upstream to fix poor use of popen() in btsrv. [CAN-2005-2716] (closes: Bug#325444) stable/main/binary-ia64/affix_2.1.1-3_ia64.deb stable/main/binary-ia64/libaffix2_2.1.1-3_ia64.deb stable/main/binary-ia64/libaffix-dev_2.1.1-3_ia64.deb affix (2.1.1-3) stable-security; urgency=high * Security fix. * Applied patch provided by upstream to fix poor use of popen() in btsrv. [CAN-2005-2716] (closes: Bug#325444) stable/main/binary-hppa/libaffix-dev_2.1.1-3_hppa.deb stable/main/binary-hppa/libaffix2_2.1.1-3_hppa.deb stable/main/binary-hppa/affix_2.1.1-3_hppa.deb affix (2.1.1-3) stable-security; urgency=high * Security fix. * Applied patch provided by upstream to fix poor use of popen() in btsrv. [CAN-2005-2716] (closes: Bug#325444) stable/main/binary-arm/libaffix-dev_2.1.1-3_arm.deb stable/main/binary-arm/libaffix2_2.1.1-3_arm.deb stable/main/binary-arm/affix_2.1.1-3_arm.deb affix (2.1.1-3) stable-security; urgency=high * Security fix. * Applied patch provided by upstream to fix poor use of popen() in btsrv. [CAN-2005-2716] (closes: Bug#325444) stable/main/binary-alpha/affix_2.1.1-3_alpha.deb stable/main/binary-alpha/libaffix2_2.1.1-3_alpha.deb stable/main/binary-alpha/libaffix-dev_2.1.1-3_alpha.deb affix (2.1.1-3) stable-security; urgency=high * Security fix. * Applied patch provided by upstream to fix poor use of popen() in btsrv. [CAN-2005-2716] (closes: Bug#325444) stable/main/source/affix_2.1.1-3.diff.gz stable/main/binary-i386/libaffix-dev_2.1.1-3_i386.deb stable/main/source/affix_2.1.1-3.dsc stable/main/binary-i386/libaffix2_2.1.1-3_i386.deb stable/main/binary-i386/affix_2.1.1-3_i386.deb affix (2.1.1-3) stable-security; urgency=high * Security fix. * Applied patch provided by upstream to fix poor use of popen() in btsrv. [CAN-2005-2716] (closes: Bug#325444) stable/main/binary-all/acidlab-mysql_0.9.6b20-10.1_all.deb stable/main/source/acidlab_0.9.6b20-10.1.diff.gz stable/main/source/acidlab_0.9.6b20-10.1.dsc stable/main/binary-all/acidlab-doc_0.9.6b20-10.1_all.deb stable/main/binary-all/acidlab_0.9.6b20-10.1_all.deb stable/main/binary-all/acidlab-pgsql_0.9.6b20-10.1_all.deb acidlab (0.9.6b20-10.1) stable-security; urgency=high * Patch [013] SECURITY fix: - Add proper filtering in all ImportHTTP variables using either the new functions to check for numeric/alphanumeric chars or the filterSql() function to prevent SQL injection attacks. This patch fixes CVE-2005-3325 but also other attack vectors not mentioned in the initial advisory (http://www.frsirt.com/english/advisories/2005/2188) stable/main/binary-sparc/abiword-plugins_2.2.7-3sarge2_sparc.deb stable/main/binary-sparc/abiword-plugins-gnome_2.2.7-3sarge2_sparc.deb stable/main/binary-sparc/abiword_2.2.7-3sarge2_sparc.deb stable/main/binary-sparc/abiword-gnome_2.2.7-3sarge2_sparc.deb abiword (2.2.7-3sarge2) stable-security; urgency=high * Non-maintainer upload by the Security Team * Applied security fixes for RTF buffer overflow exploits [abi/src/wp/impexp/xp/ie_imp_RTF.cpp, CAN-2005-2972, Bug#333740, debian/patches/16_SECURITY_rtf_buffer_overflow_2.dpatch] * This also corrects a bug in the patch to cure CAN-2005-2964 stable/main/binary-s390/abiword-plugins_2.2.7-3sarge2_s390.deb stable/main/binary-s390/abiword-gnome_2.2.7-3sarge2_s390.deb stable/main/binary-s390/abiword-plugins-gnome_2.2.7-3sarge2_s390.deb stable/main/binary-s390/abiword_2.2.7-3sarge2_s390.deb abiword (2.2.7-3sarge2) stable-security; urgency=high * Non-maintainer upload by the Security Team * Applied security fixes for RTF buffer overflow exploits [abi/src/wp/impexp/xp/ie_imp_RTF.cpp, CAN-2005-2972, Bug#333740, debian/patches/16_SECURITY_rtf_buffer_overflow_2.dpatch] * This also corrects a bug in the patch to cure CAN-2005-2964 stable/main/binary-mipsel/abiword-plugins-gnome_2.2.7-3sarge2_mipsel.deb stable/main/binary-mipsel/abiword-gnome_2.2.7-3sarge2_mipsel.deb stable/main/binary-mipsel/abiword_2.2.7-3sarge2_mipsel.deb stable/main/binary-mipsel/abiword-plugins_2.2.7-3sarge2_mipsel.deb abiword (2.2.7-3sarge2) stable-security; urgency=high * Non-maintainer upload by the Security Team * Applied security fixes for RTF buffer overflow exploits [abi/src/wp/impexp/xp/ie_imp_RTF.cpp, CAN-2005-2972, Bug#333740, debian/patches/16_SECURITY_rtf_buffer_overflow_2.dpatch] * This also corrects a bug in the patch to cure CAN-2005-2964 stable/main/binary-mips/abiword-gnome_2.2.7-3sarge2_mips.deb stable/main/binary-mips/abiword-plugins-gnome_2.2.7-3sarge2_mips.deb stable/main/binary-mips/abiword_2.2.7-3sarge2_mips.deb stable/main/binary-mips/abiword-plugins_2.2.7-3sarge2_mips.deb abiword (2.2.7-3sarge2) stable-security; urgency=high * Non-maintainer upload by the Security Team * Applied security fixes for RTF buffer overflow exploits [abi/src/wp/impexp/xp/ie_imp_RTF.cpp, CAN-2005-2972, Bug#333740, debian/patches/16_SECURITY_rtf_buffer_overflow_2.dpatch] * This also corrects a bug in the patch to cure CAN-2005-2964 stable/main/binary-m68k/abiword_2.2.7-3sarge2_m68k.deb stable/main/binary-m68k/abiword-plugins-gnome_2.2.7-3sarge2_m68k.deb stable/main/binary-m68k/abiword-gnome_2.2.7-3sarge2_m68k.deb stable/main/binary-m68k/abiword-plugins_2.2.7-3sarge2_m68k.deb abiword (2.2.7-3sarge2) stable-security; urgency=high * Non-maintainer upload by the Security Team * Applied security fixes for RTF buffer overflow exploits [abi/src/wp/impexp/xp/ie_imp_RTF.cpp, CAN-2005-2972, Bug#333740, debian/patches/16_SECURITY_rtf_buffer_overflow_2.dpatch] * This also corrects a bug in the patch to cure CAN-2005-2964 stable/main/binary-ia64/abiword-gnome_2.2.7-3sarge2_ia64.deb stable/main/binary-ia64/abiword-plugins-gnome_2.2.7-3sarge2_ia64.deb stable/main/binary-ia64/abiword_2.2.7-3sarge2_ia64.deb stable/main/binary-ia64/abiword-plugins_2.2.7-3sarge2_ia64.deb abiword (2.2.7-3sarge2) stable-security; urgency=high * Non-maintainer upload by the Security Team * Applied security fixes for RTF buffer overflow exploits [abi/src/wp/impexp/xp/ie_imp_RTF.cpp, CAN-2005-2972, Bug#333740, debian/patches/16_SECURITY_rtf_buffer_overflow_2.dpatch] * This also corrects a bug in the patch to cure CAN-2005-2964 stable/main/binary-i386/abiword-plugins_2.2.7-3sarge2_i386.deb stable/main/binary-i386/abiword_2.2.7-3sarge2_i386.deb stable/main/binary-i386/abiword-plugins-gnome_2.2.7-3sarge2_i386.deb stable/main/binary-i386/abiword-gnome_2.2.7-3sarge2_i386.deb abiword (2.2.7-3sarge2) stable-security; urgency=high * Non-maintainer upload by the Security Team * Applied security fixes for RTF buffer overflow exploits [abi/src/wp/impexp/xp/ie_imp_RTF.cpp, CAN-2005-2972, Bug#333740, debian/patches/16_SECURITY_rtf_buffer_overflow_2.dpatch] * This also corrects a bug in the patch to cure CAN-2005-2964 stable/main/binary-hppa/abiword-gnome_2.2.7-3sarge2_hppa.deb stable/main/binary-hppa/abiword-plugins-gnome_2.2.7-3sarge2_hppa.deb stable/main/binary-hppa/abiword-plugins_2.2.7-3sarge2_hppa.deb stable/main/binary-hppa/abiword_2.2.7-3sarge2_hppa.deb abiword (2.2.7-3sarge2) stable-security; urgency=high * Non-maintainer upload by the Security Team * Applied security fixes for RTF buffer overflow exploits [abi/src/wp/impexp/xp/ie_imp_RTF.cpp, CAN-2005-2972, Bug#333740, debian/patches/16_SECURITY_rtf_buffer_overflow_2.dpatch] * This also corrects a bug in the patch to cure CAN-2005-2964 stable/main/binary-arm/abiword-gnome_2.2.7-3sarge2_arm.deb stable/main/binary-arm/abiword-plugins_2.2.7-3sarge2_arm.deb stable/main/binary-arm/abiword-plugins-gnome_2.2.7-3sarge2_arm.deb stable/main/binary-arm/abiword_2.2.7-3sarge2_arm.deb abiword (2.2.7-3sarge2) stable-security; urgency=high * Non-maintainer upload by the Security Team * Applied security fixes for RTF buffer overflow exploits [abi/src/wp/impexp/xp/ie_imp_RTF.cpp, CAN-2005-2972, Bug#333740, debian/patches/16_SECURITY_rtf_buffer_overflow_2.dpatch] * This also corrects a bug in the patch to cure CAN-2005-2964 stable/main/binary-alpha/abiword-gnome_2.2.7-3sarge2_alpha.deb stable/main/binary-alpha/abiword_2.2.7-3sarge2_alpha.deb stable/main/binary-alpha/abiword-plugins_2.2.7-3sarge2_alpha.deb stable/main/binary-alpha/abiword-plugins-gnome_2.2.7-3sarge2_alpha.deb abiword (2.2.7-3sarge2) stable-security; urgency=high * Non-maintainer upload by the Security Team * Applied security fixes for RTF buffer overflow exploits [abi/src/wp/impexp/xp/ie_imp_RTF.cpp, CAN-2005-2972, Bug#333740, debian/patches/16_SECURITY_rtf_buffer_overflow_2.dpatch] * This also corrects a bug in the patch to cure CAN-2005-2964 stable/main/source/abiword_2.2.7-3sarge2.dsc stable/main/binary-powerpc/abiword-plugins-gnome_2.2.7-3sarge2_powerpc.deb stable/main/binary-all/xfonts-abi_2.2.7-3sarge2_all.deb stable/main/binary-all/abiword-doc_2.2.7-3sarge2_all.deb stable/main/binary-powerpc/abiword-plugins_2.2.7-3sarge2_powerpc.deb stable/main/binary-powerpc/abiword-gnome_2.2.7-3sarge2_powerpc.deb stable/main/binary-all/abiword-common_2.2.7-3sarge2_all.deb stable/main/binary-powerpc/abiword_2.2.7-3sarge2_powerpc.deb stable/main/binary-all/abiword-help_2.2.7-3sarge2_all.deb stable/main/source/abiword_2.2.7-3sarge2.diff.gz abiword (2.2.7-3sarge2) stable-security; urgency=high * Non-maintainer upload by the Security Team * Applied security fixes for RTF buffer overflow exploits [abi/src/wp/impexp/xp/ie_imp_RTF.cpp, CAN-2005-2972, Bug#333740, debian/patches/16_SECURITY_rtf_buffer_overflow_2.dpatch] * This also corrects a bug in the patch to cure CAN-2005-2964