========================================= Wed, 17 Dec 2008 - Debian 4.0r6 released ========================================= ======================================================================== [Date: Wed, 17 Dec 2008 21:11:19 +0000] [ftpmaster: Joerg Jaspert] Removed the following packages from stable: fp-compiler | 2.0.0-4 | amd64, i386, powerpc, sparc fp-docs | 2.0.0-4 | all fp-ide | 2.0.0-4 | amd64, i386, powerpc, sparc fp-units-base | 2.0.0-4 | amd64, i386, powerpc, sparc fp-units-db | 2.0.0-4 | amd64, i386, powerpc, sparc fp-units-fcl | 2.0.0-4 | amd64, i386, powerpc, sparc fp-units-fv | 2.0.0-4 | amd64, i386, powerpc, sparc fp-units-gfx | 2.0.0-4 | amd64, i386, powerpc, sparc fp-units-gnome1 | 2.0.0-4 | amd64, i386, powerpc, sparc fp-units-gtk | 2.0.0-4 | amd64, i386, powerpc, sparc fp-units-gtk2 | 2.0.0-4 | amd64, i386, powerpc, sparc fp-units-misc | 2.0.0-4 | amd64, i386, powerpc, sparc fp-units-net | 2.0.0-4 | amd64, i386, powerpc, sparc fp-units-rtl | 2.0.0-4 | amd64, i386, powerpc, sparc fp-utils | 2.0.0-4 | amd64, i386, powerpc, sparc fpc | 2.0.0-4 | source gearhead | 1.010-1 | source, amd64, i386, powerpc, sparc gearhead-data | 1.010-1 | all imapcopy | 1.01+20060420-1 | source, amd64, i386, powerpc, sparc Closed bugs: 506977 ------------------- Reason ------------------- RoST; copyright infringement in pre 2.2.2 sources ---------------------------------------------- ========================================================================= [Date: Wed, 17 Dec 2008 21:14:49 +0000] [ftpmaster: Joerg Jaspert] Removed the following packages from stable: astrolog | 5.40-3 | source, alpha, i386 Closed bugs: 507239 ------------------- Reason ------------------- RoST; RoQA; orphaned long time, non-free, contains potentially undistributable code ---------------------------------------------- ========================================================================= ========================================================================= [Date: Wed, 17 Dec 2008 21:15:21 +0000] [ftpmaster: Joerg Jaspert] Removed the following packages from stable: youtube-dl | 2006.11.12-1 | source, all Closed bugs: 439363 ------------------- Reason ------------------- RoST; RoQA; broken ---------------------------------------------- ========================================================================= ======================================================================== stable/main/binary-sparc/libnss3-0d_1.8.0.15~pre080614h-0etch1_sparc.deb stable/main/binary-sparc/libmozjs0d-dbg_1.8.0.15~pre080614h-0etch1_sparc.deb stable/main/binary-sparc/xulrunner-gnome-support_1.8.0.15~pre080614h-0etch1_sparc.deb stable/main/binary-sparc/spidermonkey-bin_1.8.0.15~pre080614h-0etch1_sparc.deb stable/main/binary-sparc/libnss3-tools_1.8.0.15~pre080614h-0etch1_sparc.deb stable/main/binary-sparc/libnspr4-0d-dbg_1.8.0.15~pre080614h-0etch1_sparc.deb stable/main/binary-sparc/libxul0d_1.8.0.15~pre080614h-0etch1_sparc.deb stable/main/binary-sparc/libmozjs0d_1.8.0.15~pre080614h-0etch1_sparc.deb stable/main/binary-sparc/libnss3-0d-dbg_1.8.0.15~pre080614h-0etch1_sparc.deb stable/main/binary-sparc/libnspr4-0d_1.8.0.15~pre080614h-0etch1_sparc.deb stable/main/binary-sparc/python-xpcom_1.8.0.15~pre080614h-0etch1_sparc.deb stable/main/binary-sparc/libxul0d-dbg_1.8.0.15~pre080614h-0etch1_sparc.deb stable/main/binary-sparc/xulrunner_1.8.0.15~pre080614h-0etch1_sparc.deb xulrunner (1.8.0.15~pre080614h-0etch1) stable-security; urgency=low [ Alexander Sack ] * New security/stability upstream release (backports for 2.0.0.17 + 2.0.0.18) * Upstream advisories (v2.0.0.17): MFSA 2008-37 aka CVE-2008-0016 - UTF-8 URL stack buffer overflow MFSA 2008-38 aka CVE-2008-3835 - nsXMLDocument::OnChannelRedirect() same-origin violation MFSA 2008-40 aka CVE-2008-3837 - Forced mouse drag MFSA 2008-41 aka CVE-2008-4058 - XPCnativeWrapper pollution MFSA 2008-41 aka CVE-2008-4059 - XPCnativeWrapper pollution (Firefox 2) MFSA 2008-41 aka CVE-2008-4060 - Documents without script handling objects MFSA 2008-42 aka CVE-2008-4061 - Crashes with evidence of corruption; layout (rv:1.8.1.17) MFSA 2008-42 aka CVE-2008-4062 - Crashes with evidence of corruption; javascript (rv:1.8.1.17) MFSA 2008-43 aka CVE-2008-4065 - Stripped BOM characters MFSA 2008-43 aka CVE-2008-4066 - HTML escaped low surrogates bug MFSA 2008-44 aka CVE-2008-4067 - resource: traversal vulnerabilities (a) MFSA 2008-44 aka CVE-2008-4068 - resource: traversal vulnerabilities (b) MFSA 2008-45 aka CVE-2008-4069 - XBM image uninitialized memory reading * Upstream advisories (v2.0.0.18): MFSA 2008-47 aka CVE-2008-4582 - Information stealing via local shortcut files MFSA 2008-48 aka CVE-2008-5012 - Image stealing via canvas and HTTP redirect MFSA 2008-49 aka CVE-2008-5013 - Arbitrary code execution via Flash Player dynamic module unloading MFSA 2008-50 aka CVE-2008-5014 - Crash and remote code execution via __proto__ tampering MFSA 2008-52 aka CVE-2008-5017 - browser engine crashes with memory corruption (rv:1.8.1.18) MFSA 2008-52 aka CVE-2008-5018 - javascript engine crashes with memory corruption (rv:1.8.1.18) MFSA 2008-54 aka CVE-2008-0017 - Buffer overflow in http-index-format parser MFSA 2008-55 aka CVE-2008-5021 - Crash and remote code execution in nsFrameManager MFSA 2008-56 aka CVE-2008-5022 - nsXMLHttpRequest::NotifyEventListeners() same-origin violation MFSA 2008-57 aka CVE-2008-5023 - -moz-binding property bypasses security checks on codebase principals MFSA 2008-58 aka CVE-2008-5024 - Parsing error in E4X default namespace stable/main/binary-s390/libmozjs0d_1.8.0.15~pre080614h-0etch1_s390.deb stable/main/binary-s390/xulrunner_1.8.0.15~pre080614h-0etch1_s390.deb stable/main/binary-s390/python-xpcom_1.8.0.15~pre080614h-0etch1_s390.deb stable/main/binary-s390/libnss3-tools_1.8.0.15~pre080614h-0etch1_s390.deb stable/main/binary-s390/libxul0d_1.8.0.15~pre080614h-0etch1_s390.deb stable/main/binary-s390/libnss3-0d-dbg_1.8.0.15~pre080614h-0etch1_s390.deb stable/main/binary-s390/spidermonkey-bin_1.8.0.15~pre080614h-0etch1_s390.deb stable/main/binary-s390/libmozjs0d-dbg_1.8.0.15~pre080614h-0etch1_s390.deb stable/main/binary-s390/xulrunner-gnome-support_1.8.0.15~pre080614h-0etch1_s390.deb stable/main/binary-s390/libnspr4-0d-dbg_1.8.0.15~pre080614h-0etch1_s390.deb stable/main/binary-s390/libnss3-0d_1.8.0.15~pre080614h-0etch1_s390.deb stable/main/binary-s390/libnspr4-0d_1.8.0.15~pre080614h-0etch1_s390.deb stable/main/binary-s390/libxul0d-dbg_1.8.0.15~pre080614h-0etch1_s390.deb xulrunner (1.8.0.15~pre080614h-0etch1) stable-security; urgency=low [ Alexander Sack ] * New security/stability upstream release (backports for 2.0.0.17 + 2.0.0.18) * Upstream advisories (v2.0.0.17): MFSA 2008-37 aka CVE-2008-0016 - UTF-8 URL stack buffer overflow MFSA 2008-38 aka CVE-2008-3835 - nsXMLDocument::OnChannelRedirect() same-origin violation MFSA 2008-40 aka CVE-2008-3837 - Forced mouse drag MFSA 2008-41 aka CVE-2008-4058 - XPCnativeWrapper pollution MFSA 2008-41 aka CVE-2008-4059 - XPCnativeWrapper pollution (Firefox 2) MFSA 2008-41 aka CVE-2008-4060 - Documents without script handling objects MFSA 2008-42 aka CVE-2008-4061 - Crashes with evidence of corruption; layout (rv:1.8.1.17) MFSA 2008-42 aka CVE-2008-4062 - Crashes with evidence of corruption; javascript (rv:1.8.1.17) MFSA 2008-43 aka CVE-2008-4065 - Stripped BOM characters MFSA 2008-43 aka CVE-2008-4066 - HTML escaped low surrogates bug MFSA 2008-44 aka CVE-2008-4067 - resource: traversal vulnerabilities (a) MFSA 2008-44 aka CVE-2008-4068 - resource: traversal vulnerabilities (b) MFSA 2008-45 aka CVE-2008-4069 - XBM image uninitialized memory reading * Upstream advisories (v2.0.0.18): MFSA 2008-47 aka CVE-2008-4582 - Information stealing via local shortcut files MFSA 2008-48 aka CVE-2008-5012 - Image stealing via canvas and HTTP redirect MFSA 2008-49 aka CVE-2008-5013 - Arbitrary code execution via Flash Player dynamic module unloading MFSA 2008-50 aka CVE-2008-5014 - Crash and remote code execution via __proto__ tampering MFSA 2008-52 aka CVE-2008-5017 - browser engine crashes with memory corruption (rv:1.8.1.18) MFSA 2008-52 aka CVE-2008-5018 - javascript engine crashes with memory corruption (rv:1.8.1.18) MFSA 2008-54 aka CVE-2008-0017 - Buffer overflow in http-index-format parser MFSA 2008-55 aka CVE-2008-5021 - Crash and remote code execution in nsFrameManager MFSA 2008-56 aka CVE-2008-5022 - nsXMLHttpRequest::NotifyEventListeners() same-origin violation MFSA 2008-57 aka CVE-2008-5023 - -moz-binding property bypasses security checks on codebase principals MFSA 2008-58 aka CVE-2008-5024 - Parsing error in E4X default namespace stable/main/binary-powerpc/python-xpcom_1.8.0.15~pre080614h-0etch1_powerpc.deb stable/main/binary-powerpc/libnss3-0d_1.8.0.15~pre080614h-0etch1_powerpc.deb stable/main/binary-powerpc/libxul0d-dbg_1.8.0.15~pre080614h-0etch1_powerpc.deb stable/main/binary-powerpc/libnss3-0d-dbg_1.8.0.15~pre080614h-0etch1_powerpc.deb stable/main/binary-powerpc/spidermonkey-bin_1.8.0.15~pre080614h-0etch1_powerpc.deb stable/main/binary-powerpc/libnspr4-0d_1.8.0.15~pre080614h-0etch1_powerpc.deb stable/main/binary-powerpc/xulrunner_1.8.0.15~pre080614h-0etch1_powerpc.deb stable/main/binary-powerpc/libmozjs0d_1.8.0.15~pre080614h-0etch1_powerpc.deb stable/main/binary-powerpc/libmozjs0d-dbg_1.8.0.15~pre080614h-0etch1_powerpc.deb stable/main/binary-powerpc/libnss3-tools_1.8.0.15~pre080614h-0etch1_powerpc.deb stable/main/binary-powerpc/xulrunner-gnome-support_1.8.0.15~pre080614h-0etch1_powerpc.deb stable/main/binary-powerpc/libxul0d_1.8.0.15~pre080614h-0etch1_powerpc.deb stable/main/binary-powerpc/libnspr4-0d-dbg_1.8.0.15~pre080614h-0etch1_powerpc.deb xulrunner (1.8.0.15~pre080614h-0etch1) stable-security; urgency=low [ Alexander Sack ] * New security/stability upstream release (backports for 2.0.0.17 + 2.0.0.18) * Upstream advisories (v2.0.0.17): MFSA 2008-37 aka CVE-2008-0016 - UTF-8 URL stack buffer overflow MFSA 2008-38 aka CVE-2008-3835 - nsXMLDocument::OnChannelRedirect() same-origin violation MFSA 2008-40 aka CVE-2008-3837 - Forced mouse drag MFSA 2008-41 aka CVE-2008-4058 - XPCnativeWrapper pollution MFSA 2008-41 aka CVE-2008-4059 - XPCnativeWrapper pollution (Firefox 2) MFSA 2008-41 aka CVE-2008-4060 - Documents without script handling objects MFSA 2008-42 aka CVE-2008-4061 - Crashes with evidence of corruption; layout (rv:1.8.1.17) MFSA 2008-42 aka CVE-2008-4062 - Crashes with evidence of corruption; javascript (rv:1.8.1.17) MFSA 2008-43 aka CVE-2008-4065 - Stripped BOM characters MFSA 2008-43 aka CVE-2008-4066 - HTML escaped low surrogates bug MFSA 2008-44 aka CVE-2008-4067 - resource: traversal vulnerabilities (a) MFSA 2008-44 aka CVE-2008-4068 - resource: traversal vulnerabilities (b) MFSA 2008-45 aka CVE-2008-4069 - XBM image uninitialized memory reading * Upstream advisories (v2.0.0.18): MFSA 2008-47 aka CVE-2008-4582 - Information stealing via local shortcut files MFSA 2008-48 aka CVE-2008-5012 - Image stealing via canvas and HTTP redirect MFSA 2008-49 aka CVE-2008-5013 - Arbitrary code execution via Flash Player dynamic module unloading MFSA 2008-50 aka CVE-2008-5014 - Crash and remote code execution via __proto__ tampering MFSA 2008-52 aka CVE-2008-5017 - browser engine crashes with memory corruption (rv:1.8.1.18) MFSA 2008-52 aka CVE-2008-5018 - javascript engine crashes with memory corruption (rv:1.8.1.18) MFSA 2008-54 aka CVE-2008-0017 - Buffer overflow in http-index-format parser MFSA 2008-55 aka CVE-2008-5021 - Crash and remote code execution in nsFrameManager MFSA 2008-56 aka CVE-2008-5022 - nsXMLHttpRequest::NotifyEventListeners() same-origin violation MFSA 2008-57 aka CVE-2008-5023 - -moz-binding property bypasses security checks on codebase principals MFSA 2008-58 aka CVE-2008-5024 - Parsing error in E4X default namespace stable/main/binary-mipsel/xulrunner_1.8.0.15~pre080614h-0etch1_mipsel.deb stable/main/binary-mipsel/xulrunner-gnome-support_1.8.0.15~pre080614h-0etch1_mipsel.deb stable/main/binary-mipsel/libnss3-0d_1.8.0.15~pre080614h-0etch1_mipsel.deb stable/main/binary-mipsel/libmozjs0d_1.8.0.15~pre080614h-0etch1_mipsel.deb stable/main/binary-mipsel/libnss3-0d-dbg_1.8.0.15~pre080614h-0etch1_mipsel.deb stable/main/binary-mipsel/spidermonkey-bin_1.8.0.15~pre080614h-0etch1_mipsel.deb stable/main/binary-mipsel/python-xpcom_1.8.0.15~pre080614h-0etch1_mipsel.deb stable/main/binary-mipsel/libxul0d_1.8.0.15~pre080614h-0etch1_mipsel.deb stable/main/binary-mipsel/libnss3-tools_1.8.0.15~pre080614h-0etch1_mipsel.deb stable/main/binary-mipsel/libnspr4-0d-dbg_1.8.0.15~pre080614h-0etch1_mipsel.deb stable/main/binary-mipsel/libxul0d-dbg_1.8.0.15~pre080614h-0etch1_mipsel.deb stable/main/binary-mipsel/libmozjs0d-dbg_1.8.0.15~pre080614h-0etch1_mipsel.deb stable/main/binary-mipsel/libnspr4-0d_1.8.0.15~pre080614h-0etch1_mipsel.deb xulrunner (1.8.0.15~pre080614h-0etch1) stable-security; urgency=low [ Alexander Sack ] * New security/stability upstream release (backports for 2.0.0.17 + 2.0.0.18) * Upstream advisories (v2.0.0.17): MFSA 2008-37 aka CVE-2008-0016 - UTF-8 URL stack buffer overflow MFSA 2008-38 aka CVE-2008-3835 - nsXMLDocument::OnChannelRedirect() same-origin violation MFSA 2008-40 aka CVE-2008-3837 - Forced mouse drag MFSA 2008-41 aka CVE-2008-4058 - XPCnativeWrapper pollution MFSA 2008-41 aka CVE-2008-4059 - XPCnativeWrapper pollution (Firefox 2) MFSA 2008-41 aka CVE-2008-4060 - Documents without script handling objects MFSA 2008-42 aka CVE-2008-4061 - Crashes with evidence of corruption; layout (rv:1.8.1.17) MFSA 2008-42 aka CVE-2008-4062 - Crashes with evidence of corruption; javascript (rv:1.8.1.17) MFSA 2008-43 aka CVE-2008-4065 - Stripped BOM characters MFSA 2008-43 aka CVE-2008-4066 - HTML escaped low surrogates bug MFSA 2008-44 aka CVE-2008-4067 - resource: traversal vulnerabilities (a) MFSA 2008-44 aka CVE-2008-4068 - resource: traversal vulnerabilities (b) MFSA 2008-45 aka CVE-2008-4069 - XBM image uninitialized memory reading * Upstream advisories (v2.0.0.18): MFSA 2008-47 aka CVE-2008-4582 - Information stealing via local shortcut files MFSA 2008-48 aka CVE-2008-5012 - Image stealing via canvas and HTTP redirect MFSA 2008-49 aka CVE-2008-5013 - Arbitrary code execution via Flash Player dynamic module unloading MFSA 2008-50 aka CVE-2008-5014 - Crash and remote code execution via __proto__ tampering MFSA 2008-52 aka CVE-2008-5017 - browser engine crashes with memory corruption (rv:1.8.1.18) MFSA 2008-52 aka CVE-2008-5018 - javascript engine crashes with memory corruption (rv:1.8.1.18) MFSA 2008-54 aka CVE-2008-0017 - Buffer overflow in http-index-format parser MFSA 2008-55 aka CVE-2008-5021 - Crash and remote code execution in nsFrameManager MFSA 2008-56 aka CVE-2008-5022 - nsXMLHttpRequest::NotifyEventListeners() same-origin violation MFSA 2008-57 aka CVE-2008-5023 - -moz-binding property bypasses security checks on codebase principals MFSA 2008-58 aka CVE-2008-5024 - Parsing error in E4X default namespace stable/main/binary-mips/libnspr4-0d_1.8.0.15~pre080614h-0etch1_mips.deb stable/main/binary-mips/xulrunner-gnome-support_1.8.0.15~pre080614h-0etch1_mips.deb stable/main/binary-mips/python-xpcom_1.8.0.15~pre080614h-0etch1_mips.deb stable/main/binary-mips/libmozjs0d_1.8.0.15~pre080614h-0etch1_mips.deb stable/main/binary-mips/xulrunner_1.8.0.15~pre080614h-0etch1_mips.deb stable/main/binary-mips/libnspr4-0d-dbg_1.8.0.15~pre080614h-0etch1_mips.deb stable/main/binary-mips/libxul0d_1.8.0.15~pre080614h-0etch1_mips.deb stable/main/binary-mips/libxul0d-dbg_1.8.0.15~pre080614h-0etch1_mips.deb stable/main/binary-mips/libnss3-tools_1.8.0.15~pre080614h-0etch1_mips.deb stable/main/binary-mips/libmozjs0d-dbg_1.8.0.15~pre080614h-0etch1_mips.deb stable/main/binary-mips/libnss3-0d-dbg_1.8.0.15~pre080614h-0etch1_mips.deb stable/main/binary-mips/libnss3-0d_1.8.0.15~pre080614h-0etch1_mips.deb stable/main/binary-mips/spidermonkey-bin_1.8.0.15~pre080614h-0etch1_mips.deb xulrunner (1.8.0.15~pre080614h-0etch1) stable-security; urgency=low [ Alexander Sack ] * New security/stability upstream release (backports for 2.0.0.17 + 2.0.0.18) * Upstream advisories (v2.0.0.17): MFSA 2008-37 aka CVE-2008-0016 - UTF-8 URL stack buffer overflow MFSA 2008-38 aka CVE-2008-3835 - nsXMLDocument::OnChannelRedirect() same-origin violation MFSA 2008-40 aka CVE-2008-3837 - Forced mouse drag MFSA 2008-41 aka CVE-2008-4058 - XPCnativeWrapper pollution MFSA 2008-41 aka CVE-2008-4059 - XPCnativeWrapper pollution (Firefox 2) MFSA 2008-41 aka CVE-2008-4060 - Documents without script handling objects MFSA 2008-42 aka CVE-2008-4061 - Crashes with evidence of corruption; layout (rv:1.8.1.17) MFSA 2008-42 aka CVE-2008-4062 - Crashes with evidence of corruption; javascript (rv:1.8.1.17) MFSA 2008-43 aka CVE-2008-4065 - Stripped BOM characters MFSA 2008-43 aka CVE-2008-4066 - HTML escaped low surrogates bug MFSA 2008-44 aka CVE-2008-4067 - resource: traversal vulnerabilities (a) MFSA 2008-44 aka CVE-2008-4068 - resource: traversal vulnerabilities (b) MFSA 2008-45 aka CVE-2008-4069 - XBM image uninitialized memory reading * Upstream advisories (v2.0.0.18): MFSA 2008-47 aka CVE-2008-4582 - Information stealing via local shortcut files MFSA 2008-48 aka CVE-2008-5012 - Image stealing via canvas and HTTP redirect MFSA 2008-49 aka CVE-2008-5013 - Arbitrary code execution via Flash Player dynamic module unloading MFSA 2008-50 aka CVE-2008-5014 - Crash and remote code execution via __proto__ tampering MFSA 2008-52 aka CVE-2008-5017 - browser engine crashes with memory corruption (rv:1.8.1.18) MFSA 2008-52 aka CVE-2008-5018 - javascript engine crashes with memory corruption (rv:1.8.1.18) MFSA 2008-54 aka CVE-2008-0017 - Buffer overflow in http-index-format parser MFSA 2008-55 aka CVE-2008-5021 - Crash and remote code execution in nsFrameManager MFSA 2008-56 aka CVE-2008-5022 - nsXMLHttpRequest::NotifyEventListeners() same-origin violation MFSA 2008-57 aka CVE-2008-5023 - -moz-binding property bypasses security checks on codebase principals MFSA 2008-58 aka CVE-2008-5024 - Parsing error in E4X default namespace stable/main/binary-ia64/python-xpcom_1.8.0.15~pre080614h-0etch1_ia64.deb stable/main/binary-ia64/libnspr4-0d-dbg_1.8.0.15~pre080614h-0etch1_ia64.deb stable/main/binary-ia64/libmozjs0d_1.8.0.15~pre080614h-0etch1_ia64.deb stable/main/binary-ia64/xulrunner_1.8.0.15~pre080614h-0etch1_ia64.deb stable/main/binary-ia64/libxul0d_1.8.0.15~pre080614h-0etch1_ia64.deb stable/main/binary-ia64/libmozjs0d-dbg_1.8.0.15~pre080614h-0etch1_ia64.deb stable/main/binary-ia64/libxul0d-dbg_1.8.0.15~pre080614h-0etch1_ia64.deb stable/main/binary-ia64/libnss3-0d_1.8.0.15~pre080614h-0etch1_ia64.deb stable/main/binary-ia64/xulrunner-gnome-support_1.8.0.15~pre080614h-0etch1_ia64.deb stable/main/binary-ia64/spidermonkey-bin_1.8.0.15~pre080614h-0etch1_ia64.deb stable/main/binary-ia64/libnss3-0d-dbg_1.8.0.15~pre080614h-0etch1_ia64.deb stable/main/binary-ia64/libnspr4-0d_1.8.0.15~pre080614h-0etch1_ia64.deb stable/main/binary-ia64/libnss3-tools_1.8.0.15~pre080614h-0etch1_ia64.deb xulrunner (1.8.0.15~pre080614h-0etch1) stable-security; urgency=low [ Alexander Sack ] * New security/stability upstream release (backports for 2.0.0.17 + 2.0.0.18) * Upstream advisories (v2.0.0.17): MFSA 2008-37 aka CVE-2008-0016 - UTF-8 URL stack buffer overflow MFSA 2008-38 aka CVE-2008-3835 - nsXMLDocument::OnChannelRedirect() same-origin violation MFSA 2008-40 aka CVE-2008-3837 - Forced mouse drag MFSA 2008-41 aka CVE-2008-4058 - XPCnativeWrapper pollution MFSA 2008-41 aka CVE-2008-4059 - XPCnativeWrapper pollution (Firefox 2) MFSA 2008-41 aka CVE-2008-4060 - Documents without script handling objects MFSA 2008-42 aka CVE-2008-4061 - Crashes with evidence of corruption; layout (rv:1.8.1.17) MFSA 2008-42 aka CVE-2008-4062 - Crashes with evidence of corruption; javascript (rv:1.8.1.17) MFSA 2008-43 aka CVE-2008-4065 - Stripped BOM characters MFSA 2008-43 aka CVE-2008-4066 - HTML escaped low surrogates bug MFSA 2008-44 aka CVE-2008-4067 - resource: traversal vulnerabilities (a) MFSA 2008-44 aka CVE-2008-4068 - resource: traversal vulnerabilities (b) MFSA 2008-45 aka CVE-2008-4069 - XBM image uninitialized memory reading * Upstream advisories (v2.0.0.18): MFSA 2008-47 aka CVE-2008-4582 - Information stealing via local shortcut files MFSA 2008-48 aka CVE-2008-5012 - Image stealing via canvas and HTTP redirect MFSA 2008-49 aka CVE-2008-5013 - Arbitrary code execution via Flash Player dynamic module unloading MFSA 2008-50 aka CVE-2008-5014 - Crash and remote code execution via __proto__ tampering MFSA 2008-52 aka CVE-2008-5017 - browser engine crashes with memory corruption (rv:1.8.1.18) MFSA 2008-52 aka CVE-2008-5018 - javascript engine crashes with memory corruption (rv:1.8.1.18) MFSA 2008-54 aka CVE-2008-0017 - Buffer overflow in http-index-format parser MFSA 2008-55 aka CVE-2008-5021 - Crash and remote code execution in nsFrameManager MFSA 2008-56 aka CVE-2008-5022 - nsXMLHttpRequest::NotifyEventListeners() same-origin violation MFSA 2008-57 aka CVE-2008-5023 - -moz-binding property bypasses security checks on codebase principals MFSA 2008-58 aka CVE-2008-5024 - Parsing error in E4X default namespace stable/main/binary-i386/libnspr4-0d_1.8.0.15~pre080614h-0etch1_i386.deb stable/main/binary-i386/xulrunner-gnome-support_1.8.0.15~pre080614h-0etch1_i386.deb stable/main/binary-i386/libxul0d-dbg_1.8.0.15~pre080614h-0etch1_i386.deb stable/main/binary-i386/libmozjs0d-dbg_1.8.0.15~pre080614h-0etch1_i386.deb stable/main/binary-i386/libnspr4-0d-dbg_1.8.0.15~pre080614h-0etch1_i386.deb stable/main/binary-i386/libxul0d_1.8.0.15~pre080614h-0etch1_i386.deb stable/main/binary-i386/libnss3-0d-dbg_1.8.0.15~pre080614h-0etch1_i386.deb stable/main/binary-i386/libmozjs0d_1.8.0.15~pre080614h-0etch1_i386.deb stable/main/binary-i386/spidermonkey-bin_1.8.0.15~pre080614h-0etch1_i386.deb stable/main/binary-i386/libnss3-0d_1.8.0.15~pre080614h-0etch1_i386.deb stable/main/binary-i386/python-xpcom_1.8.0.15~pre080614h-0etch1_i386.deb stable/main/binary-i386/xulrunner_1.8.0.15~pre080614h-0etch1_i386.deb stable/main/binary-i386/libnss3-tools_1.8.0.15~pre080614h-0etch1_i386.deb xulrunner (1.8.0.15~pre080614h-0etch1) stable-security; urgency=low [ Alexander Sack ] * New security/stability upstream release (backports for 2.0.0.17 + 2.0.0.18) * Upstream advisories (v2.0.0.17): MFSA 2008-37 aka CVE-2008-0016 - UTF-8 URL stack buffer overflow MFSA 2008-38 aka CVE-2008-3835 - nsXMLDocument::OnChannelRedirect() same-origin violation MFSA 2008-40 aka CVE-2008-3837 - Forced mouse drag MFSA 2008-41 aka CVE-2008-4058 - XPCnativeWrapper pollution MFSA 2008-41 aka CVE-2008-4059 - XPCnativeWrapper pollution (Firefox 2) MFSA 2008-41 aka CVE-2008-4060 - Documents without script handling objects MFSA 2008-42 aka CVE-2008-4061 - Crashes with evidence of corruption; layout (rv:1.8.1.17) MFSA 2008-42 aka CVE-2008-4062 - Crashes with evidence of corruption; javascript (rv:1.8.1.17) MFSA 2008-43 aka CVE-2008-4065 - Stripped BOM characters MFSA 2008-43 aka CVE-2008-4066 - HTML escaped low surrogates bug MFSA 2008-44 aka CVE-2008-4067 - resource: traversal vulnerabilities (a) MFSA 2008-44 aka CVE-2008-4068 - resource: traversal vulnerabilities (b) MFSA 2008-45 aka CVE-2008-4069 - XBM image uninitialized memory reading * Upstream advisories (v2.0.0.18): MFSA 2008-47 aka CVE-2008-4582 - Information stealing via local shortcut files MFSA 2008-48 aka CVE-2008-5012 - Image stealing via canvas and HTTP redirect MFSA 2008-49 aka CVE-2008-5013 - Arbitrary code execution via Flash Player dynamic module unloading MFSA 2008-50 aka CVE-2008-5014 - Crash and remote code execution via __proto__ tampering MFSA 2008-52 aka CVE-2008-5017 - browser engine crashes with memory corruption (rv:1.8.1.18) MFSA 2008-52 aka CVE-2008-5018 - javascript engine crashes with memory corruption (rv:1.8.1.18) MFSA 2008-54 aka CVE-2008-0017 - Buffer overflow in http-index-format parser MFSA 2008-55 aka CVE-2008-5021 - Crash and remote code execution in nsFrameManager MFSA 2008-56 aka CVE-2008-5022 - nsXMLHttpRequest::NotifyEventListeners() same-origin violation MFSA 2008-57 aka CVE-2008-5023 - -moz-binding property bypasses security checks on codebase principals MFSA 2008-58 aka CVE-2008-5024 - Parsing error in E4X default namespace stable/main/binary-hppa/libnspr4-0d-dbg_1.8.0.15~pre080614h-0etch1_hppa.deb stable/main/binary-hppa/libnss3-tools_1.8.0.15~pre080614h-0etch1_hppa.deb stable/main/binary-hppa/libxul0d-dbg_1.8.0.15~pre080614h-0etch1_hppa.deb stable/main/binary-hppa/libnspr4-0d_1.8.0.15~pre080614h-0etch1_hppa.deb stable/main/binary-hppa/libmozjs0d_1.8.0.15~pre080614h-0etch1_hppa.deb stable/main/binary-hppa/spidermonkey-bin_1.8.0.15~pre080614h-0etch1_hppa.deb stable/main/binary-hppa/libxul0d_1.8.0.15~pre080614h-0etch1_hppa.deb stable/main/binary-hppa/python-xpcom_1.8.0.15~pre080614h-0etch1_hppa.deb stable/main/binary-hppa/libmozjs0d-dbg_1.8.0.15~pre080614h-0etch1_hppa.deb stable/main/binary-hppa/xulrunner_1.8.0.15~pre080614h-0etch1_hppa.deb stable/main/binary-hppa/libnss3-0d-dbg_1.8.0.15~pre080614h-0etch1_hppa.deb stable/main/binary-hppa/xulrunner-gnome-support_1.8.0.15~pre080614h-0etch1_hppa.deb stable/main/binary-hppa/libnss3-0d_1.8.0.15~pre080614h-0etch1_hppa.deb xulrunner (1.8.0.15~pre080614h-0etch1) stable-security; urgency=low [ Alexander Sack ] * New security/stability upstream release (backports for 2.0.0.17 + 2.0.0.18) * Upstream advisories (v2.0.0.17): MFSA 2008-37 aka CVE-2008-0016 - UTF-8 URL stack buffer overflow MFSA 2008-38 aka CVE-2008-3835 - nsXMLDocument::OnChannelRedirect() same-origin violation MFSA 2008-40 aka CVE-2008-3837 - Forced mouse drag MFSA 2008-41 aka CVE-2008-4058 - XPCnativeWrapper pollution MFSA 2008-41 aka CVE-2008-4059 - XPCnativeWrapper pollution (Firefox 2) MFSA 2008-41 aka CVE-2008-4060 - Documents without script handling objects MFSA 2008-42 aka CVE-2008-4061 - Crashes with evidence of corruption; layout (rv:1.8.1.17) MFSA 2008-42 aka CVE-2008-4062 - Crashes with evidence of corruption; javascript (rv:1.8.1.17) MFSA 2008-43 aka CVE-2008-4065 - Stripped BOM characters MFSA 2008-43 aka CVE-2008-4066 - HTML escaped low surrogates bug MFSA 2008-44 aka CVE-2008-4067 - resource: traversal vulnerabilities (a) MFSA 2008-44 aka CVE-2008-4068 - resource: traversal vulnerabilities (b) MFSA 2008-45 aka CVE-2008-4069 - XBM image uninitialized memory reading * Upstream advisories (v2.0.0.18): MFSA 2008-47 aka CVE-2008-4582 - Information stealing via local shortcut files MFSA 2008-48 aka CVE-2008-5012 - Image stealing via canvas and HTTP redirect MFSA 2008-49 aka CVE-2008-5013 - Arbitrary code execution via Flash Player dynamic module unloading MFSA 2008-50 aka CVE-2008-5014 - Crash and remote code execution via __proto__ tampering MFSA 2008-52 aka CVE-2008-5017 - browser engine crashes with memory corruption (rv:1.8.1.18) MFSA 2008-52 aka CVE-2008-5018 - javascript engine crashes with memory corruption (rv:1.8.1.18) MFSA 2008-54 aka CVE-2008-0017 - Buffer overflow in http-index-format parser MFSA 2008-55 aka CVE-2008-5021 - Crash and remote code execution in nsFrameManager MFSA 2008-56 aka CVE-2008-5022 - nsXMLHttpRequest::NotifyEventListeners() same-origin violation MFSA 2008-57 aka CVE-2008-5023 - -moz-binding property bypasses security checks on codebase principals MFSA 2008-58 aka CVE-2008-5024 - Parsing error in E4X default namespace stable/main/binary-arm/spidermonkey-bin_1.8.0.15~pre080614h-0etch1_arm.deb stable/main/binary-arm/libnss3-0d_1.8.0.15~pre080614h-0etch1_arm.deb stable/main/binary-arm/libxul0d-dbg_1.8.0.15~pre080614h-0etch1_arm.deb stable/main/binary-arm/libxul0d_1.8.0.15~pre080614h-0etch1_arm.deb stable/main/binary-arm/libnspr4-0d-dbg_1.8.0.15~pre080614h-0etch1_arm.deb stable/main/binary-arm/xulrunner-gnome-support_1.8.0.15~pre080614h-0etch1_arm.deb stable/main/binary-arm/libnss3-tools_1.8.0.15~pre080614h-0etch1_arm.deb stable/main/binary-arm/libnss3-0d-dbg_1.8.0.15~pre080614h-0etch1_arm.deb stable/main/binary-arm/python-xpcom_1.8.0.15~pre080614h-0etch1_arm.deb stable/main/binary-arm/libnspr4-0d_1.8.0.15~pre080614h-0etch1_arm.deb stable/main/binary-arm/libmozjs0d_1.8.0.15~pre080614h-0etch1_arm.deb stable/main/binary-arm/xulrunner_1.8.0.15~pre080614h-0etch1_arm.deb stable/main/binary-arm/libmozjs0d-dbg_1.8.0.15~pre080614h-0etch1_arm.deb xulrunner (1.8.0.15~pre080614h-0etch1) stable-security; urgency=low [ Alexander Sack ] * New security/stability upstream release (backports for 2.0.0.17 + 2.0.0.18) * Upstream advisories (v2.0.0.17): MFSA 2008-37 aka CVE-2008-0016 - UTF-8 URL stack buffer overflow MFSA 2008-38 aka CVE-2008-3835 - nsXMLDocument::OnChannelRedirect() same-origin violation MFSA 2008-40 aka CVE-2008-3837 - Forced mouse drag MFSA 2008-41 aka CVE-2008-4058 - XPCnativeWrapper pollution MFSA 2008-41 aka CVE-2008-4059 - XPCnativeWrapper pollution (Firefox 2) MFSA 2008-41 aka CVE-2008-4060 - Documents without script handling objects MFSA 2008-42 aka CVE-2008-4061 - Crashes with evidence of corruption; layout (rv:1.8.1.17) MFSA 2008-42 aka CVE-2008-4062 - Crashes with evidence of corruption; javascript (rv:1.8.1.17) MFSA 2008-43 aka CVE-2008-4065 - Stripped BOM characters MFSA 2008-43 aka CVE-2008-4066 - HTML escaped low surrogates bug MFSA 2008-44 aka CVE-2008-4067 - resource: traversal vulnerabilities (a) MFSA 2008-44 aka CVE-2008-4068 - resource: traversal vulnerabilities (b) MFSA 2008-45 aka CVE-2008-4069 - XBM image uninitialized memory reading * Upstream advisories (v2.0.0.18): MFSA 2008-47 aka CVE-2008-4582 - Information stealing via local shortcut files MFSA 2008-48 aka CVE-2008-5012 - Image stealing via canvas and HTTP redirect MFSA 2008-49 aka CVE-2008-5013 - Arbitrary code execution via Flash Player dynamic module unloading MFSA 2008-50 aka CVE-2008-5014 - Crash and remote code execution via __proto__ tampering MFSA 2008-52 aka CVE-2008-5017 - browser engine crashes with memory corruption (rv:1.8.1.18) MFSA 2008-52 aka CVE-2008-5018 - javascript engine crashes with memory corruption (rv:1.8.1.18) MFSA 2008-54 aka CVE-2008-0017 - Buffer overflow in http-index-format parser MFSA 2008-55 aka CVE-2008-5021 - Crash and remote code execution in nsFrameManager MFSA 2008-56 aka CVE-2008-5022 - nsXMLHttpRequest::NotifyEventListeners() same-origin violation MFSA 2008-57 aka CVE-2008-5023 - -moz-binding property bypasses security checks on codebase principals MFSA 2008-58 aka CVE-2008-5024 - Parsing error in E4X default namespace stable/main/binary-alpha/xulrunner_1.8.0.15~pre080614h-0etch1_alpha.deb stable/main/binary-alpha/libmozjs0d_1.8.0.15~pre080614h-0etch1_alpha.deb stable/main/binary-alpha/libxul0d_1.8.0.15~pre080614h-0etch1_alpha.deb stable/main/binary-alpha/libmozjs0d-dbg_1.8.0.15~pre080614h-0etch1_alpha.deb stable/main/binary-alpha/libnss3-tools_1.8.0.15~pre080614h-0etch1_alpha.deb stable/main/binary-alpha/libnss3-0d-dbg_1.8.0.15~pre080614h-0etch1_alpha.deb stable/main/binary-alpha/spidermonkey-bin_1.8.0.15~pre080614h-0etch1_alpha.deb stable/main/binary-alpha/xulrunner-gnome-support_1.8.0.15~pre080614h-0etch1_alpha.deb stable/main/binary-alpha/libnspr4-0d-dbg_1.8.0.15~pre080614h-0etch1_alpha.deb stable/main/binary-alpha/libnspr4-0d_1.8.0.15~pre080614h-0etch1_alpha.deb stable/main/binary-alpha/python-xpcom_1.8.0.15~pre080614h-0etch1_alpha.deb stable/main/binary-alpha/libnss3-0d_1.8.0.15~pre080614h-0etch1_alpha.deb stable/main/binary-alpha/libxul0d-dbg_1.8.0.15~pre080614h-0etch1_alpha.deb xulrunner (1.8.0.15~pre080614h-0etch1) stable-security; urgency=low [ Alexander Sack ] * New security/stability upstream release (backports for 2.0.0.17 + 2.0.0.18) * Upstream advisories (v2.0.0.17): MFSA 2008-37 aka CVE-2008-0016 - UTF-8 URL stack buffer overflow MFSA 2008-38 aka CVE-2008-3835 - nsXMLDocument::OnChannelRedirect() same-origin violation MFSA 2008-40 aka CVE-2008-3837 - Forced mouse drag MFSA 2008-41 aka CVE-2008-4058 - XPCnativeWrapper pollution MFSA 2008-41 aka CVE-2008-4059 - XPCnativeWrapper pollution (Firefox 2) MFSA 2008-41 aka CVE-2008-4060 - Documents without script handling objects MFSA 2008-42 aka CVE-2008-4061 - Crashes with evidence of corruption; layout (rv:1.8.1.17) MFSA 2008-42 aka CVE-2008-4062 - Crashes with evidence of corruption; javascript (rv:1.8.1.17) MFSA 2008-43 aka CVE-2008-4065 - Stripped BOM characters MFSA 2008-43 aka CVE-2008-4066 - HTML escaped low surrogates bug MFSA 2008-44 aka CVE-2008-4067 - resource: traversal vulnerabilities (a) MFSA 2008-44 aka CVE-2008-4068 - resource: traversal vulnerabilities (b) MFSA 2008-45 aka CVE-2008-4069 - XBM image uninitialized memory reading * Upstream advisories (v2.0.0.18): MFSA 2008-47 aka CVE-2008-4582 - Information stealing via local shortcut files MFSA 2008-48 aka CVE-2008-5012 - Image stealing via canvas and HTTP redirect MFSA 2008-49 aka CVE-2008-5013 - Arbitrary code execution via Flash Player dynamic module unloading MFSA 2008-50 aka CVE-2008-5014 - Crash and remote code execution via __proto__ tampering MFSA 2008-52 aka CVE-2008-5017 - browser engine crashes with memory corruption (rv:1.8.1.18) MFSA 2008-52 aka CVE-2008-5018 - javascript engine crashes with memory corruption (rv:1.8.1.18) MFSA 2008-54 aka CVE-2008-0017 - Buffer overflow in http-index-format parser MFSA 2008-55 aka CVE-2008-5021 - Crash and remote code execution in nsFrameManager MFSA 2008-56 aka CVE-2008-5022 - nsXMLHttpRequest::NotifyEventListeners() same-origin violation MFSA 2008-57 aka CVE-2008-5023 - -moz-binding property bypasses security checks on codebase principals MFSA 2008-58 aka CVE-2008-5024 - Parsing error in E4X default namespace stable/main/binary-amd64/libnss3-0d-dbg_1.8.0.15~pre080614h-0etch1_amd64.deb stable/main/binary-amd64/libnspr4-0d_1.8.0.15~pre080614h-0etch1_amd64.deb stable/main/binary-amd64/libnss3-0d_1.8.0.15~pre080614h-0etch1_amd64.deb stable/main/binary-all/libsmjs-dev_1.8.0.15~pre080614h-0etch1_all.deb stable/main/binary-amd64/xulrunner-gnome-support_1.8.0.15~pre080614h-0etch1_amd64.deb stable/main/binary-amd64/libmozjs0d-dbg_1.8.0.15~pre080614h-0etch1_amd64.deb stable/main/source/xulrunner_1.8.0.15~pre080614h-0etch1.diff.gz stable/main/binary-amd64/xulrunner_1.8.0.15~pre080614h-0etch1_amd64.deb stable/main/source/xulrunner_1.8.0.15~pre080614h.orig.tar.gz stable/main/binary-amd64/libxul0d_1.8.0.15~pre080614h-0etch1_amd64.deb stable/main/binary-amd64/libnss3-tools_1.8.0.15~pre080614h-0etch1_amd64.deb stable/main/binary-amd64/libxul0d-dbg_1.8.0.15~pre080614h-0etch1_amd64.deb stable/main/binary-all/libnspr4-dev_1.8.0.15~pre080614h-0etch1_all.deb stable/main/binary-amd64/libnspr4-0d-dbg_1.8.0.15~pre080614h-0etch1_amd64.deb stable/main/binary-all/libnss3-dev_1.8.0.15~pre080614h-0etch1_all.deb stable/main/binary-all/libxul-common_1.8.0.15~pre080614h-0etch1_all.deb stable/main/binary-all/libsmjs1_1.8.0.15~pre080614h-0etch1_all.deb stable/main/binary-all/libxul-dev_1.8.0.15~pre080614h-0etch1_all.deb stable/main/binary-amd64/spidermonkey-bin_1.8.0.15~pre080614h-0etch1_amd64.deb stable/main/binary-all/libmozjs-dev_1.8.0.15~pre080614h-0etch1_all.deb stable/main/binary-all/libmozillainterfaces-java_1.8.0.15~pre080614h-0etch1_all.deb stable/main/binary-amd64/libmozjs0d_1.8.0.15~pre080614h-0etch1_amd64.deb stable/main/source/xulrunner_1.8.0.15~pre080614h-0etch1.dsc stable/main/binary-amd64/python-xpcom_1.8.0.15~pre080614h-0etch1_amd64.deb xulrunner (1.8.0.15~pre080614h-0etch1) stable-security; urgency=low [ Alexander Sack ] * New security/stability upstream release (backports for 2.0.0.17 + 2.0.0.18) * Upstream advisories (v2.0.0.17): MFSA 2008-37 aka CVE-2008-0016 - UTF-8 URL stack buffer overflow MFSA 2008-38 aka CVE-2008-3835 - nsXMLDocument::OnChannelRedirect() same-origin violation MFSA 2008-40 aka CVE-2008-3837 - Forced mouse drag MFSA 2008-41 aka CVE-2008-4058 - XPCnativeWrapper pollution MFSA 2008-41 aka CVE-2008-4059 - XPCnativeWrapper pollution (Firefox 2) MFSA 2008-41 aka CVE-2008-4060 - Documents without script handling objects MFSA 2008-42 aka CVE-2008-4061 - Crashes with evidence of corruption; layout (rv:1.8.1.17) MFSA 2008-42 aka CVE-2008-4062 - Crashes with evidence of corruption; javascript (rv:1.8.1.17) MFSA 2008-43 aka CVE-2008-4065 - Stripped BOM characters MFSA 2008-43 aka CVE-2008-4066 - HTML escaped low surrogates bug MFSA 2008-44 aka CVE-2008-4067 - resource: traversal vulnerabilities (a) MFSA 2008-44 aka CVE-2008-4068 - resource: traversal vulnerabilities (b) MFSA 2008-45 aka CVE-2008-4069 - XBM image uninitialized memory reading * Upstream advisories (v2.0.0.18): MFSA 2008-47 aka CVE-2008-4582 - Information stealing via local shortcut files MFSA 2008-48 aka CVE-2008-5012 - Image stealing via canvas and HTTP redirect MFSA 2008-49 aka CVE-2008-5013 - Arbitrary code execution via Flash Player dynamic module unloading MFSA 2008-50 aka CVE-2008-5014 - Crash and remote code execution via __proto__ tampering MFSA 2008-52 aka CVE-2008-5017 - browser engine crashes with memory corruption (rv:1.8.1.18) MFSA 2008-52 aka CVE-2008-5018 - javascript engine crashes with memory corruption (rv:1.8.1.18) MFSA 2008-54 aka CVE-2008-0017 - Buffer overflow in http-index-format parser MFSA 2008-55 aka CVE-2008-5021 - Crash and remote code execution in nsFrameManager MFSA 2008-56 aka CVE-2008-5022 - nsXMLHttpRequest::NotifyEventListeners() same-origin violation MFSA 2008-57 aka CVE-2008-5023 - -moz-binding property bypasses security checks on codebase principals MFSA 2008-58 aka CVE-2008-5024 - Parsing error in E4X default namespace stable/main/binary-sparc/tethereal_0.99.4-5.etch.3_sparc.deb stable/main/binary-sparc/ethereal_0.99.4-5.etch.3_sparc.deb stable/main/binary-sparc/tshark_0.99.4-5.etch.3_sparc.deb stable/main/binary-sparc/wireshark_0.99.4-5.etch.3_sparc.deb stable/main/binary-sparc/wireshark-dev_0.99.4-5.etch.3_sparc.deb stable/main/binary-sparc/ethereal-common_0.99.4-5.etch.3_sparc.deb stable/main/binary-sparc/ethereal-dev_0.99.4-5.etch.3_sparc.deb stable/main/binary-sparc/wireshark-common_0.99.4-5.etch.3_sparc.deb wireshark (0.99.4-5.etch.3) stable-security; urgency=high * Backport further security fixes: * CVE-2008-4683, CVE-2008-4684, CVE-2008-4685 and a backport of have_postdissector(), which is needed for the fixes * CVE-2008-3933 * CVE-2008-3145 * CVE-2008-3141 * CVE-2008-3138 * CVE-2008-3137 stable/main/binary-s390/ethereal-common_0.99.4-5.etch.3_s390.deb stable/main/binary-s390/ethereal-dev_0.99.4-5.etch.3_s390.deb stable/main/binary-s390/tshark_0.99.4-5.etch.3_s390.deb stable/main/binary-s390/wireshark-common_0.99.4-5.etch.3_s390.deb stable/main/binary-s390/tethereal_0.99.4-5.etch.3_s390.deb stable/main/binary-s390/ethereal_0.99.4-5.etch.3_s390.deb stable/main/binary-s390/wireshark_0.99.4-5.etch.3_s390.deb stable/main/binary-s390/wireshark-dev_0.99.4-5.etch.3_s390.deb wireshark (0.99.4-5.etch.3) stable-security; urgency=high * Backport further security fixes: * CVE-2008-4683, CVE-2008-4684, CVE-2008-4685 and a backport of have_postdissector(), which is needed for the fixes * CVE-2008-3933 * CVE-2008-3145 * CVE-2008-3141 * CVE-2008-3138 * CVE-2008-3137 stable/main/binary-powerpc/wireshark-dev_0.99.4-5.etch.3_powerpc.deb stable/main/binary-powerpc/tethereal_0.99.4-5.etch.3_powerpc.deb stable/main/binary-powerpc/wireshark_0.99.4-5.etch.3_powerpc.deb stable/main/binary-powerpc/ethereal-dev_0.99.4-5.etch.3_powerpc.deb stable/main/binary-powerpc/tshark_0.99.4-5.etch.3_powerpc.deb stable/main/binary-powerpc/wireshark-common_0.99.4-5.etch.3_powerpc.deb stable/main/binary-powerpc/ethereal-common_0.99.4-5.etch.3_powerpc.deb stable/main/binary-powerpc/ethereal_0.99.4-5.etch.3_powerpc.deb wireshark (0.99.4-5.etch.3) stable-security; urgency=high * Backport further security fixes: * CVE-2008-4683, CVE-2008-4684, CVE-2008-4685 and a backport of have_postdissector(), which is needed for the fixes * CVE-2008-3933 * CVE-2008-3145 * CVE-2008-3141 * CVE-2008-3138 * CVE-2008-3137 stable/main/binary-mipsel/tshark_0.99.4-5.etch.3_mipsel.deb stable/main/binary-mipsel/ethereal_0.99.4-5.etch.3_mipsel.deb stable/main/binary-mipsel/wireshark-common_0.99.4-5.etch.3_mipsel.deb stable/main/binary-mipsel/tethereal_0.99.4-5.etch.3_mipsel.deb stable/main/binary-mipsel/ethereal-dev_0.99.4-5.etch.3_mipsel.deb stable/main/binary-mipsel/wireshark_0.99.4-5.etch.3_mipsel.deb stable/main/binary-mipsel/wireshark-dev_0.99.4-5.etch.3_mipsel.deb stable/main/binary-mipsel/ethereal-common_0.99.4-5.etch.3_mipsel.deb wireshark (0.99.4-5.etch.3) stable-security; urgency=high * Backport further security fixes: * CVE-2008-4683, CVE-2008-4684, CVE-2008-4685 and a backport of have_postdissector(), which is needed for the fixes * CVE-2008-3933 * CVE-2008-3145 * CVE-2008-3141 * CVE-2008-3138 * CVE-2008-3137 stable/main/binary-mips/tshark_0.99.4-5.etch.3_mips.deb stable/main/binary-mips/wireshark-common_0.99.4-5.etch.3_mips.deb stable/main/binary-mips/wireshark_0.99.4-5.etch.3_mips.deb stable/main/binary-mips/ethereal-dev_0.99.4-5.etch.3_mips.deb stable/main/binary-mips/ethereal-common_0.99.4-5.etch.3_mips.deb stable/main/binary-mips/ethereal_0.99.4-5.etch.3_mips.deb stable/main/binary-mips/wireshark-dev_0.99.4-5.etch.3_mips.deb stable/main/binary-mips/tethereal_0.99.4-5.etch.3_mips.deb wireshark (0.99.4-5.etch.3) stable-security; urgency=high * Backport further security fixes: * CVE-2008-4683, CVE-2008-4684, CVE-2008-4685 and a backport of have_postdissector(), which is needed for the fixes * CVE-2008-3933 * CVE-2008-3145 * CVE-2008-3141 * CVE-2008-3138 * CVE-2008-3137 stable/main/binary-ia64/ethereal-common_0.99.4-5.etch.3_ia64.deb stable/main/binary-ia64/tshark_0.99.4-5.etch.3_ia64.deb stable/main/binary-ia64/ethereal-dev_0.99.4-5.etch.3_ia64.deb stable/main/binary-ia64/wireshark-common_0.99.4-5.etch.3_ia64.deb stable/main/binary-ia64/ethereal_0.99.4-5.etch.3_ia64.deb stable/main/binary-ia64/wireshark_0.99.4-5.etch.3_ia64.deb stable/main/binary-ia64/tethereal_0.99.4-5.etch.3_ia64.deb stable/main/binary-ia64/wireshark-dev_0.99.4-5.etch.3_ia64.deb wireshark (0.99.4-5.etch.3) stable-security; urgency=high * Backport further security fixes: * CVE-2008-4683, CVE-2008-4684, CVE-2008-4685 and a backport of have_postdissector(), which is needed for the fixes * CVE-2008-3933 * CVE-2008-3145 * CVE-2008-3141 * CVE-2008-3138 * CVE-2008-3137 stable/main/binary-hppa/ethereal-common_0.99.4-5.etch.3_hppa.deb stable/main/binary-hppa/ethereal-dev_0.99.4-5.etch.3_hppa.deb stable/main/binary-hppa/tethereal_0.99.4-5.etch.3_hppa.deb stable/main/binary-hppa/wireshark-common_0.99.4-5.etch.3_hppa.deb stable/main/binary-hppa/tshark_0.99.4-5.etch.3_hppa.deb stable/main/binary-hppa/ethereal_0.99.4-5.etch.3_hppa.deb stable/main/binary-hppa/wireshark_0.99.4-5.etch.3_hppa.deb stable/main/binary-hppa/wireshark-dev_0.99.4-5.etch.3_hppa.deb wireshark (0.99.4-5.etch.3) stable-security; urgency=high * Backport further security fixes: * CVE-2008-4683, CVE-2008-4684, CVE-2008-4685 and a backport of have_postdissector(), which is needed for the fixes * CVE-2008-3933 * CVE-2008-3145 * CVE-2008-3141 * CVE-2008-3138 * CVE-2008-3137 stable/main/binary-arm/wireshark-common_0.99.4-5.etch.3_arm.deb stable/main/binary-arm/tethereal_0.99.4-5.etch.3_arm.deb stable/main/binary-arm/ethereal-common_0.99.4-5.etch.3_arm.deb stable/main/binary-arm/wireshark_0.99.4-5.etch.3_arm.deb stable/main/binary-arm/ethereal-dev_0.99.4-5.etch.3_arm.deb stable/main/binary-arm/ethereal_0.99.4-5.etch.3_arm.deb stable/main/binary-arm/wireshark-dev_0.99.4-5.etch.3_arm.deb stable/main/binary-arm/tshark_0.99.4-5.etch.3_arm.deb wireshark (0.99.4-5.etch.3) stable-security; urgency=high * Backport further security fixes: * CVE-2008-4683, CVE-2008-4684, CVE-2008-4685 and a backport of have_postdissector(), which is needed for the fixes * CVE-2008-3933 * CVE-2008-3145 * CVE-2008-3141 * CVE-2008-3138 * CVE-2008-3137 stable/main/binary-amd64/wireshark-dev_0.99.4-5.etch.3_amd64.deb stable/main/binary-amd64/wireshark_0.99.4-5.etch.3_amd64.deb stable/main/binary-amd64/ethereal_0.99.4-5.etch.3_amd64.deb stable/main/binary-amd64/wireshark-common_0.99.4-5.etch.3_amd64.deb stable/main/binary-amd64/tshark_0.99.4-5.etch.3_amd64.deb stable/main/binary-amd64/ethereal-dev_0.99.4-5.etch.3_amd64.deb stable/main/binary-amd64/tethereal_0.99.4-5.etch.3_amd64.deb stable/main/binary-amd64/ethereal-common_0.99.4-5.etch.3_amd64.deb wireshark (0.99.4-5.etch.3) stable-security; urgency=high * Backport further security fixes: * CVE-2008-4683, CVE-2008-4684, CVE-2008-4685 and a backport of have_postdissector(), which is needed for the fixes * CVE-2008-3933 * CVE-2008-3145 * CVE-2008-3141 * CVE-2008-3138 * CVE-2008-3137 stable/main/binary-alpha/tethereal_0.99.4-5.etch.3_alpha.deb stable/main/binary-alpha/ethereal-common_0.99.4-5.etch.3_alpha.deb stable/main/binary-alpha/wireshark-common_0.99.4-5.etch.3_alpha.deb stable/main/binary-alpha/tshark_0.99.4-5.etch.3_alpha.deb stable/main/binary-alpha/ethereal_0.99.4-5.etch.3_alpha.deb stable/main/binary-alpha/wireshark-dev_0.99.4-5.etch.3_alpha.deb stable/main/binary-alpha/ethereal-dev_0.99.4-5.etch.3_alpha.deb stable/main/binary-alpha/wireshark_0.99.4-5.etch.3_alpha.deb wireshark (0.99.4-5.etch.3) stable-security; urgency=high * Backport further security fixes: * CVE-2008-4683, CVE-2008-4684, CVE-2008-4685 and a backport of have_postdissector(), which is needed for the fixes * CVE-2008-3933 * CVE-2008-3145 * CVE-2008-3141 * CVE-2008-3138 * CVE-2008-3137 stable/main/source/wireshark_0.99.4-5.etch.3.dsc stable/main/binary-i386/wireshark-dev_0.99.4-5.etch.3_i386.deb stable/main/binary-i386/wireshark_0.99.4-5.etch.3_i386.deb stable/main/binary-i386/ethereal_0.99.4-5.etch.3_i386.deb stable/main/binary-i386/wireshark-common_0.99.4-5.etch.3_i386.deb stable/main/binary-i386/ethereal-common_0.99.4-5.etch.3_i386.deb stable/main/source/wireshark_0.99.4-5.etch.3.diff.gz stable/main/binary-i386/tshark_0.99.4-5.etch.3_i386.deb stable/main/binary-i386/tethereal_0.99.4-5.etch.3_i386.deb stable/main/binary-i386/ethereal-dev_0.99.4-5.etch.3_i386.deb wireshark (0.99.4-5.etch.3) stable-security; urgency=high * Backport further security fixes: * CVE-2008-4683, CVE-2008-4684, CVE-2008-4685 and a backport of have_postdissector(), which is needed for the fixes * CVE-2008-3933 * CVE-2008-3145 * CVE-2008-3141 * CVE-2008-3138 * CVE-2008-3137 stable/main/source/websvn_1.61-21.dsc stable/main/source/websvn_1.61-21.diff.gz stable/main/binary-all/websvn_1.61-21_all.deb websvn (1.61-21) stable; urgency=high * Security: fix potential PHP code execution due to unsafe use of preg_replace (Closes: #503330) stable/main/binary-i386/user-mode-linux_2.6.18-1um-2etch.23etch1_i386.deb stable/main/source/user-mode-linux_2.6.18-1um-2etch.23etch1.diff.gz stable/main/source/user-mode-linux_2.6.18-1um-2etch.23etch1.dsc user-mode-linux (2.6.18-1um-2etch.23etch1) stable-security; urgency=high * Rebuild against linux-source-2.6.18_2.6.18.dfsg.1-23etch1: * Fix missing boundary checks in syscall/syscall32_nopage(): - bugfix/add-install_special_mapping.patch - bugfix/i386-vdso-use_install_special_mapping.patch - bugfix/x86_64-ia32-vDSO-use-install_special_mapping.patch - features/all/xen/vdso-use_install_special_mapping.patch See CVE-2008-3527 * Modify feature patches to apply on top of the fixes for CVE-2008-3527: - features/all/vserver/vs2.0.2.2-rc9.patch - features/all/xen/fedora-2.6.18-36186.patch - features/all/xen/vserver-update.patch * Don't allow splicing to files opened with O_APPEND: - bugfix/dont-allow-splice-to-files-opened-with-O_APPEND.patch See CVE-2008-4554 * Avoid printk floods when reading corrupted ext[2,3] directories - bugfix/ext2-avoid-corrupted-directory-printk-floods.patch - bugfix/ext3-avoid-corrupted-directory-printk-floods.patch See CVE-2008-3528 * Fix oops in SCTP - bugfix/sctp-fix-oops-when-INIT-ACK-indicates-that-peer-doesnt-support-AUTH.patch See CVE-2008-4576 * Fix buffer overflow in hfsplus - bugfix/hfsplus-fix-Buffer-overflow-with-a-corrupted-image.patch See CVE-2008-4933 * Fix BUG() in hfsplus - bugfix/hfsplus-check_read_mapping_page-return-value.patch See CVE-2008-4934 * Fix stack corruption in hfs - bugfix/hfs-fix-namelength-memory-corruption.patch See CVE-2008-5025 * Fix recursive descent in __scm_destroy - bugfix/af_unix-fix-garbage-collector-races.patch - bugfix/af_unix-convert-socks-to-unix_socks.patch - bugfix/net-unix-fix-inflight-counting-bug-in-garbage-collector.patch - bugfix/net-fix-recursive-descent-in-__scm_destroy.patch See CVE-2008-5029 * Make sendmsg() block during UNIX garbage collection: - bugfix/net-unix-gc-fix-soft-lockups-oom-issues.patch See CVE-2008-5300 * Fix DoS when calling svc_listen twice on the same socket while reading /proc/net/atm/*vc: - bugfix/atm-duplicate-listen-on-socket-corrupts-the-vcc-table.patch See CVE-2008-5079 * Fix race conditions between inotify removal and umount - bugfix/inotify-watch-removal-umount-races.patch See CVE-2008-5182 stable/main/binary-all/tdiary-plugin_2.0.2+20060303-6_all.deb stable/main/binary-all/tdiary_2.0.2+20060303-6_all.deb stable/main/source/tdiary_2.0.2+20060303-6.dsc stable/main/source/tdiary_2.0.2+20060303-6.diff.gz stable/main/binary-all/tdiary-contrib_2.0.2+20060303-6_all.deb stable/main/binary-all/tdiary-mode_2.0.2+20060303-6_all.deb stable/main/binary-all/tdiary-theme_2.0.2+20060303-6_all.deb tdiary (2.0.2+20060303-6) stable-security; urgency=low * Added debian/patches/20_xss_category.dpatch: Fixed a Cross Site Scripting (XSS) vulnerability, where any scripts may be embedded in "Category" pages generated by the category.rb plugin. (Closes: #464778) stable/main/binary-sparc/streamripper_1.61.27-1+etch1_sparc.deb streamripper (1.61.27-1+etch1) stable-security; urgency=high * Fix buffer overflows in HTTP header parsing (CVE-2007-4337). * Fix buffer more overflows in HTTP header and playlist parsing (CVE-2008-4829). stable/main/binary-s390/streamripper_1.61.27-1+etch1_s390.deb streamripper (1.61.27-1+etch1) stable-security; urgency=high * Fix buffer overflows in HTTP header parsing (CVE-2007-4337). * Fix buffer more overflows in HTTP header and playlist parsing (CVE-2008-4829). stable/main/binary-powerpc/streamripper_1.61.27-1+etch1_powerpc.deb streamripper (1.61.27-1+etch1) stable-security; urgency=high * Fix buffer overflows in HTTP header parsing (CVE-2007-4337). * Fix buffer more overflows in HTTP header and playlist parsing (CVE-2008-4829). stable/main/binary-mipsel/streamripper_1.61.27-1+etch1_mipsel.deb streamripper (1.61.27-1+etch1) stable-security; urgency=high * Fix buffer overflows in HTTP header parsing (CVE-2007-4337). * Fix buffer more overflows in HTTP header and playlist parsing (CVE-2008-4829). stable/main/binary-mips/streamripper_1.61.27-1+etch1_mips.deb streamripper (1.61.27-1+etch1) stable-security; urgency=high * Fix buffer overflows in HTTP header parsing (CVE-2007-4337). * Fix buffer more overflows in HTTP header and playlist parsing (CVE-2008-4829). stable/main/binary-ia64/streamripper_1.61.27-1+etch1_ia64.deb streamripper (1.61.27-1+etch1) stable-security; urgency=high * Fix buffer overflows in HTTP header parsing (CVE-2007-4337). * Fix buffer more overflows in HTTP header and playlist parsing (CVE-2008-4829). stable/main/binary-i386/streamripper_1.61.27-1+etch1_i386.deb streamripper (1.61.27-1+etch1) stable-security; urgency=high * Fix buffer overflows in HTTP header parsing (CVE-2007-4337). * Fix buffer more overflows in HTTP header and playlist parsing (CVE-2008-4829). stable/main/binary-hppa/streamripper_1.61.27-1+etch1_hppa.deb streamripper (1.61.27-1+etch1) stable-security; urgency=high * Fix buffer overflows in HTTP header parsing (CVE-2007-4337). * Fix buffer more overflows in HTTP header and playlist parsing (CVE-2008-4829). stable/main/binary-arm/streamripper_1.61.27-1+etch1_arm.deb streamripper (1.61.27-1+etch1) stable-security; urgency=high * Fix buffer overflows in HTTP header parsing (CVE-2007-4337). * Fix buffer more overflows in HTTP header and playlist parsing (CVE-2008-4829). stable/main/binary-alpha/streamripper_1.61.27-1+etch1_alpha.deb streamripper (1.61.27-1+etch1) stable-security; urgency=high * Fix buffer overflows in HTTP header parsing (CVE-2007-4337). * Fix buffer more overflows in HTTP header and playlist parsing (CVE-2008-4829). stable/main/source/streamripper_1.61.27-1+etch1.diff.gz stable/main/binary-amd64/streamripper_1.61.27-1+etch1_amd64.deb stable/main/source/streamripper_1.61.27-1+etch1.dsc streamripper (1.61.27-1+etch1) stable-security; urgency=high * Fix buffer overflows in HTTP header parsing (CVE-2007-4337). * Fix buffer more overflows in HTTP header and playlist parsing (CVE-2008-4829). stable/main/source/squirrelmail_1.4.9a-3.diff.gz stable/main/binary-all/squirrelmail_1.4.9a-3_all.deb stable/main/source/squirrelmail_1.4.9a-3.dsc squirrelmail (2:1.4.9a-3) stable-security; urgency=high * Fix cross site scripting in HTML filter [CVE-2008-2379]. stable/main/binary-sparc/spamc_3.1.7-2etch1_sparc.deb spamassassin (3.1.7-2etch1) stable-proposed-updates; urgency=high * Security fix: - CVE-2007-2873: Possible symlink attack with spamd under certain (uncommon) configurations. (See http://spamassassin.apache.org/advisories/cve-2007-2873.txt) * Remove DSBL and SECURITYSAGE blacklists, since they don't exist anymore and bad things happen when they're queried. (Closes: #505162) * - stable/main/binary-s390/spamc_3.1.7-2etch1_s390.deb spamassassin (3.1.7-2etch1) stable-proposed-updates; urgency=high * Security fix: - CVE-2007-2873: Possible symlink attack with spamd under certain (uncommon) configurations. (See http://spamassassin.apache.org/advisories/cve-2007-2873.txt) * Remove DSBL and SECURITYSAGE blacklists, since they don't exist anymore and bad things happen when they're queried. (Closes: #505162) * - stable/main/binary-powerpc/spamc_3.1.7-2etch1_powerpc.deb spamassassin (3.1.7-2etch1) stable-proposed-updates; urgency=high * Security fix: - CVE-2007-2873: Possible symlink attack with spamd under certain (uncommon) configurations. (See http://spamassassin.apache.org/advisories/cve-2007-2873.txt) * Remove DSBL and SECURITYSAGE blacklists, since they don't exist anymore and bad things happen when they're queried. (Closes: #505162) * - stable/main/binary-mipsel/spamc_3.1.7-2etch1_mipsel.deb spamassassin (3.1.7-2etch1) stable-proposed-updates; urgency=high * Security fix: - CVE-2007-2873: Possible symlink attack with spamd under certain (uncommon) configurations. (See http://spamassassin.apache.org/advisories/cve-2007-2873.txt) * Remove DSBL and SECURITYSAGE blacklists, since they don't exist anymore and bad things happen when they're queried. (Closes: #505162) * - stable/main/binary-mips/spamc_3.1.7-2etch1_mips.deb spamassassin (3.1.7-2etch1) stable-proposed-updates; urgency=high * Security fix - CVE-2007-2873: Possible symlink attack with spamd under certain (uncommon) configurations. (See http://spamassassin.apache.org/advisories/cve-2007-2873.txt) * Remove DSBL and SECURITYSAGE blacklists, since they don't exist anymore and bad things happen when they're queried. (Closes: #505162) * - stable/main/binary-ia64/spamc_3.1.7-2etch1_ia64.deb spamassassin (3.1.7-2etch1) stable-proposed-updates; urgency=high * Security fix: - CVE-2007-2873: Possible symlink attack with spamd under certain (uncommon) configurations. (See http://spamassassin.apache.org/advisories/cve-2007-2873.txt) * Remove DSBL and SECURITYSAGE blacklists, since they don't exist anymore and bad things happen when they're queried. (Closes: #505162) * - stable/main/binary-hppa/spamc_3.1.7-2etch1_hppa.deb spamassassin (3.1.7-2etch1) stable-proposed-updates; urgency=high * Security fix: - CVE-2007-2873: Possible symlink attack with spamd under certain (uncommon) configurations. (See http://spamassassin.apache.org/advisories/cve-2007-2873.txt) * Remove DSBL and SECURITYSAGE blacklists, since they don't exist anymore and bad things happen when they're queried. (Closes: #505162) * - stable/main/binary-arm/spamc_3.1.7-2etch1_arm.deb spamassassin (3.1.7-2etch1) stable-proposed-updates; urgency=high * Security fix: - CVE-2007-2873: Possible symlink attack with spamd under certain (uncommon) configurations. (See http://spamassassin.apache.org/advisories/cve-2007-2873.txt) * Remove DSBL and SECURITYSAGE blacklists, since they don't exist anymore and bad things happen when they're queried. (Closes: #505162) * - stable/main/binary-amd64/spamc_3.1.7-2etch1_amd64.deb spamassassin (3.1.7-2etch1) stable-proposed-updates; urgency=high * Security fix: - CVE-2007-2873: Possible symlink attack with spamd under certain (uncommon) configurations. (See http://spamassassin.apache.org/advisories/cve-2007-2873.txt) * Remove DSBL and SECURITYSAGE blacklists, since they don't exist anymore and bad things happen when they're queried. (Closes: #505162) * - stable/main/binary-alpha/spamc_3.1.7-2etch1_alpha.deb spamassassin (3.1.7-2etch1) stable-proposed-updates; urgency=high * Security fix: - CVE-2007-2873: Possible symlink attack with spamd under certain (uncommon) configurations. (See http://spamassassin.apache.org/advisories/cve-2007-2873.txt) * Remove DSBL and SECURITYSAGE blacklists, since they don't exist anymore and bad things happen when they're queried. (Closes: #505162) * - stable/main/binary-all/spamassassin_3.1.7-2etch1_all.deb stable/main/binary-i386/spamc_3.1.7-2etch1_i386.deb stable/main/source/spamassassin_3.1.7-2etch1.dsc stable/main/source/spamassassin_3.1.7-2etch1.diff.gz spamassassin (3.1.7-2etch1) stable-proposed-updates; urgency=high * Security fix: - CVE-2007-2873: Possible symlink attack with spamd under certain (uncommon) configurations. (See http://spamassassin.apache.org/advisories/cve-2007-2873.txt) * Remove DSBL and SECURITYSAGE blacklists, since they don't exist anymore and bad things happen when they're queried. (Closes: #505162) * - stable/main/source/reportbug_3.31+etch1.tar.gz stable/main/source/reportbug_3.31+etch1.dsc stable/main/binary-all/reportbug_3.31+etch1_all.deb reportbug (3.31+etch1) stable; urgency=low * debian/control - added me to uploaders (to avoid NMU) * adapting Don Armstrong's patch to use reportbug.debian.org MX instead of bugs.debian.org stable/main/binary-powerpc/qemu_0.8.2-4etch2_powerpc.deb qemu (0.8.2-4etch2) stable-security; urgency=high * Non-maintainer upload by the security team * Fix insecure symlink handling in debian/qemu-make-debian-root, which could lead to a DoS Fixes: CVE-2008-4553 stable/main/binary-amd64/qemu_0.8.2-4etch2_amd64.deb qemu (0.8.2-4etch2) stable-security; urgency=high * Non-maintainer upload by the security team * Fix insecure symlink handling in debian/qemu-make-debian-root, which could lead to a DoS Fixes: CVE-2008-4553 stable/main/binary-i386/qemu_0.8.2-4etch2_i386.deb stable/main/source/qemu_0.8.2-4etch2.dsc stable/main/source/qemu_0.8.2-4etch2.diff.gz qemu (0.8.2-4etch2) stable-security; urgency=high * Non-maintainer upload by the security team * Fix insecure symlink handling in debian/qemu-make-debian-root, which could lead to a DoS Fixes: CVE-2008-4553 stable/main/binary-sparc/python2.4_2.4.4-3+etch2_sparc.deb stable/main/binary-sparc/python2.4-minimal_2.4.4-3+etch2_sparc.deb stable/main/binary-sparc/python2.4-dev_2.4.4-3+etch2_sparc.deb stable/main/binary-sparc/python2.4-dbg_2.4.4-3+etch2_sparc.deb python2.4 (2.4.4-3+etch2) stable-security; urgency=high * Non-maintainer upload by the Security Team. * CVE-2008-2315_3142_3143_3144.dpatch stable/main/binary-s390/python2.4_2.4.4-3+etch2_s390.deb stable/main/binary-s390/python2.4-minimal_2.4.4-3+etch2_s390.deb stable/main/binary-s390/python2.4-dbg_2.4.4-3+etch2_s390.deb stable/main/binary-s390/python2.4-dev_2.4.4-3+etch2_s390.deb python2.4 (2.4.4-3+etch2) stable-security; urgency=high * Non-maintainer upload by the Security Team. * CVE-2008-2315_3142_3143_3144.dpatch stable/main/binary-powerpc/python2.4-dbg_2.4.4-3+etch2_powerpc.deb stable/main/binary-powerpc/python2.4_2.4.4-3+etch2_powerpc.deb stable/main/binary-powerpc/python2.4-dev_2.4.4-3+etch2_powerpc.deb stable/main/binary-powerpc/python2.4-minimal_2.4.4-3+etch2_powerpc.deb python2.4 (2.4.4-3+etch2) stable-security; urgency=high * Non-maintainer upload by the Security Team. * CVE-2008-2315_3142_3143_3144.dpatch stable/main/binary-mipsel/python2.4_2.4.4-3+etch2_mipsel.deb stable/main/binary-mipsel/python2.4-dev_2.4.4-3+etch2_mipsel.deb stable/main/binary-mipsel/python2.4-dbg_2.4.4-3+etch2_mipsel.deb stable/main/binary-mipsel/python2.4-minimal_2.4.4-3+etch2_mipsel.deb python2.4 (2.4.4-3+etch2) stable-security; urgency=high * Non-maintainer upload by the Security Team. * CVE-2008-2315_3142_3143_3144.dpatch stable/main/binary-mips/python2.4-dbg_2.4.4-3+etch2_mips.deb stable/main/binary-mips/python2.4-minimal_2.4.4-3+etch2_mips.deb stable/main/binary-mips/python2.4-dev_2.4.4-3+etch2_mips.deb stable/main/binary-mips/python2.4_2.4.4-3+etch2_mips.deb python2.4 (2.4.4-3+etch2) stable-security; urgency=high * Non-maintainer upload by the Security Team. * CVE-2008-2315_3142_3143_3144.dpatch stable/main/binary-ia64/python2.4_2.4.4-3+etch2_ia64.deb stable/main/binary-ia64/python2.4-dev_2.4.4-3+etch2_ia64.deb stable/main/binary-ia64/python2.4-dbg_2.4.4-3+etch2_ia64.deb stable/main/binary-ia64/python2.4-minimal_2.4.4-3+etch2_ia64.deb python2.4 (2.4.4-3+etch2) stable-security; urgency=high * Non-maintainer upload by the Security Team. * CVE-2008-2315_3142_3143_3144.dpatch stable/main/binary-hppa/python2.4-minimal_2.4.4-3+etch2_hppa.deb stable/main/binary-hppa/python2.4_2.4.4-3+etch2_hppa.deb stable/main/binary-hppa/python2.4-dev_2.4.4-3+etch2_hppa.deb stable/main/binary-hppa/python2.4-dbg_2.4.4-3+etch2_hppa.deb python2.4 (2.4.4-3+etch2) stable-security; urgency=high * Non-maintainer upload by the Security Team. * CVE-2008-2315_3142_3143_3144.dpatch stable/main/binary-arm/python2.4_2.4.4-3+etch2_arm.deb stable/main/binary-arm/python2.4-minimal_2.4.4-3+etch2_arm.deb stable/main/binary-arm/python2.4-dbg_2.4.4-3+etch2_arm.deb stable/main/binary-arm/python2.4-dev_2.4.4-3+etch2_arm.deb python2.4 (2.4.4-3+etch2) stable-security; urgency=high * Non-maintainer upload by the Security Team. * CVE-2008-2315_3142_3143_3144.dpatch stable/main/binary-amd64/python2.4-minimal_2.4.4-3+etch2_amd64.deb stable/main/binary-amd64/python2.4_2.4.4-3+etch2_amd64.deb stable/main/binary-amd64/python2.4-dbg_2.4.4-3+etch2_amd64.deb stable/main/binary-amd64/python2.4-dev_2.4.4-3+etch2_amd64.deb python2.4 (2.4.4-3+etch2) stable-security; urgency=high * Non-maintainer upload by the Security Team. * CVE-2008-2315_3142_3143_3144.dpatch stable/main/binary-alpha/python2.4-minimal_2.4.4-3+etch2_alpha.deb stable/main/binary-alpha/python2.4_2.4.4-3+etch2_alpha.deb stable/main/binary-alpha/python2.4-dev_2.4.4-3+etch2_alpha.deb stable/main/binary-alpha/python2.4-dbg_2.4.4-3+etch2_alpha.deb python2.4 (2.4.4-3+etch2) stable-security; urgency=high * Non-maintainer upload by the Security Team. * CVE-2008-2315_3142_3143_3144.dpatch stable/main/source/python2.4_2.4.4-3+etch2.diff.gz stable/main/binary-i386/python2.4-dev_2.4.4-3+etch2_i386.deb stable/main/source/python2.4_2.4.4-3+etch2.dsc stable/main/binary-i386/python2.4-minimal_2.4.4-3+etch2_i386.deb stable/main/binary-i386/python2.4_2.4.4-3+etch2_i386.deb stable/main/binary-all/idle-python2.4_2.4.4-3+etch2_all.deb stable/main/binary-all/python2.4-examples_2.4.4-3+etch2_all.deb stable/main/binary-i386/python2.4-dbg_2.4.4-3+etch2_i386.deb python2.4 (2.4.4-3+etch2) stable-security; urgency=high * Non-maintainer upload by the Security Team. * CVE-2008-2315_3142_3143_3144.dpatch stable/main/binary-sparc/postgresql-client-8.1_8.1.15-0etch1_sparc.deb stable/main/binary-sparc/postgresql-pltcl-8.1_8.1.15-0etch1_sparc.deb stable/main/binary-sparc/libpgtypes2_8.1.15-0etch1_sparc.deb stable/main/binary-sparc/libecpg-dev_8.1.15-0etch1_sparc.deb stable/main/binary-sparc/postgresql-server-dev-8.1_8.1.15-0etch1_sparc.deb stable/main/binary-sparc/postgresql-8.1_8.1.15-0etch1_sparc.deb stable/main/binary-sparc/postgresql-plpython-8.1_8.1.15-0etch1_sparc.deb stable/main/binary-sparc/postgresql-contrib-8.1_8.1.15-0etch1_sparc.deb stable/main/binary-sparc/libpq-dev_8.1.15-0etch1_sparc.deb stable/main/binary-sparc/postgresql-plperl-8.1_8.1.15-0etch1_sparc.deb stable/main/binary-sparc/libecpg5_8.1.15-0etch1_sparc.deb stable/main/binary-sparc/libpq4_8.1.15-0etch1_sparc.deb stable/main/binary-sparc/libecpg-compat2_8.1.15-0etch1_sparc.deb postgresql-8.1 (8.1.15-0etch1) stable; urgency=low * New upstream bugfix release 8.1.15: - Fix GiST index corruption due to marking the wrong index entry "dead" after a deletion. This would result in index searches failing to find rows they should have found. - Fix backend crash when the client encoding cannot represent a localized error message. - Fix possible crash when deeply nested functions are invoked from a trigger. - Fix mis-expansion of rule queries when a sub-SELECT appears in a function call in FROM, a multi-row VALUES list, or a RETURNING list. The usual symptom of this problem is an "unrecognized node type" error. - Ensure an error is reported when a newly-defined PL/pgSQL trigger function is invoked as a normal function. - Prevent possible collision of relfilenode numbers when moving a table to another tablespace with "ALTER SET TABLESPACE". The command tried to re-use the existing filename, instead of picking one that is known unused in the destination directory. - Fix incorrect tsearch2 headline generation when single query item matches first word of text. - Fix improper display of fractional seconds in interval values when using a non-ISO datestyle in an "--enable-integer-datetimes" build. - Ensure SPI_getvalue and SPI_getbinval behave correctly when the passed tuple and tuple descriptor have different numbers of columns. This situation is normal when a table has had columns added or removed, but these two functions didn't handle it properly. The only likely consequence is an incorrect error indication. - Fix ecpg's parsing of "CREATE ROLE". - Fix recent breakage of pg_ctl restart. * New upstream bugfix release 8.1.14: - Widen local lock counters from 32 to 64 bits. This responds to reports that the counters could overflow in sufficiently long transactions, leading to unexpected "lock is already held" errors. - Fix possible duplicate output of tuples during a GiST index scan. - Add checks in executor startup to ensure that the tuples produced by an "INSERT" or "UPDATE" will match the target table's current rowtype. "ALTER COLUMN TYPE", followed by re-use of a previously cached plan, could produce this type of situation. The check protects against data corruption and/or crashes that could ensue. - Fix AT TIME ZONE to first try to interpret its timezone argument as a timezone abbreviation, and only try it as a full timezone name if that fails, rather than the other way around as formerly. The timestamp input functions have always resolved ambiguous zone names in this order. Making AT TIME ZONE do so as well improves consistency, and fixes a compatibility bug introduced in 8.1: in ambiguous cases we now behave the same as 8.0 and before did, since in the older versions AT TIME ZONE accepted -only* abbreviations. - Fix datetime input functions to correctly detect integer overflow when running on a 64-bit platform. - Improve performance of writing very long log messages to syslog. - Fix bug in backwards scanning of a cursor on a SELECT DISTINCT ON query. - Fix planner bug with nested sub-select expressions. If the outer sub-select has no direct dependency on the parent query, but the inner one does, the outer value might not get recalculated for new parent query rows. - Fix planner to estimate that GROUP BY expressions yielding boolean results always result in two groups, regardless of the expressions' contents. This is very substantially more accurate than the regular GROUP BY estimate for certain boolean tests like "col" IS NULL. - Fix PL/PgSQL to not fail when a FOR loop's target variable is a record containing composite-type fields. - Improve pg_dump and pg_restore's error reporting after failure to send a SQL command. - Fix pg_ctl to properly preserve postmaster command-line arguments across a restart. stable/main/binary-s390/postgresql-plperl-8.1_8.1.15-0etch1_s390.deb stable/main/binary-s390/postgresql-server-dev-8.1_8.1.15-0etch1_s390.deb stable/main/binary-s390/libpq-dev_8.1.15-0etch1_s390.deb stable/main/binary-s390/libpq4_8.1.15-0etch1_s390.deb stable/main/binary-s390/postgresql-contrib-8.1_8.1.15-0etch1_s390.deb stable/main/binary-s390/postgresql-plpython-8.1_8.1.15-0etch1_s390.deb stable/main/binary-s390/postgresql-pltcl-8.1_8.1.15-0etch1_s390.deb stable/main/binary-s390/postgresql-client-8.1_8.1.15-0etch1_s390.deb stable/main/binary-s390/libecpg-compat2_8.1.15-0etch1_s390.deb stable/main/binary-s390/postgresql-8.1_8.1.15-0etch1_s390.deb stable/main/binary-s390/libecpg5_8.1.15-0etch1_s390.deb stable/main/binary-s390/libpgtypes2_8.1.15-0etch1_s390.deb stable/main/binary-s390/libecpg-dev_8.1.15-0etch1_s390.deb postgresql-8.1 (8.1.15-0etch1) stable; urgency=low * New upstream bugfix release 8.1.15: - Fix GiST index corruption due to marking the wrong index entry "dead" after a deletion. This would result in index searches failing to find rows they should have found. - Fix backend crash when the client encoding cannot represent a localized error message. - Fix possible crash when deeply nested functions are invoked from a trigger. - Fix mis-expansion of rule queries when a sub-SELECT appears in a function call in FROM, a multi-row VALUES list, or a RETURNING list. The usual symptom of this problem is an "unrecognized node type" error. - Ensure an error is reported when a newly-defined PL/pgSQL trigger function is invoked as a normal function. - Prevent possible collision of relfilenode numbers when moving a table to another tablespace with "ALTER SET TABLESPACE". The command tried to re-use the existing filename, instead of picking one that is known unused in the destination directory. - Fix incorrect tsearch2 headline generation when single query item matches first word of text. - Fix improper display of fractional seconds in interval values when using a non-ISO datestyle in an "--enable-integer-datetimes" build. - Ensure SPI_getvalue and SPI_getbinval behave correctly when the passed tuple and tuple descriptor have different numbers of columns. This situation is normal when a table has had columns added or removed, but these two functions didn't handle it properly. The only likely consequence is an incorrect error indication. - Fix ecpg's parsing of "CREATE ROLE". - Fix recent breakage of pg_ctl restart. * New upstream bugfix release 8.1.14: - Widen local lock counters from 32 to 64 bits. This responds to reports that the counters could overflow in sufficiently long transactions, leading to unexpected "lock is already held" errors. - Fix possible duplicate output of tuples during a GiST index scan. - Add checks in executor startup to ensure that the tuples produced by an "INSERT" or "UPDATE" will match the target table's current rowtype. "ALTER COLUMN TYPE", followed by re-use of a previously cached plan, could produce this type of situation. The check protects against data corruption and/or crashes that could ensue. - Fix AT TIME ZONE to first try to interpret its timezone argument as a timezone abbreviation, and only try it as a full timezone name if that fails, rather than the other way around as formerly. The timestamp input functions have always resolved ambiguous zone names in this order. Making AT TIME ZONE do so as well improves consistency, and fixes a compatibility bug introduced in 8.1: in ambiguous cases we now behave the same as 8.0 and before did, since in the older versions AT TIME ZONE accepted -only* abbreviations. - Fix datetime input functions to correctly detect integer overflow when running on a 64-bit platform. - Improve performance of writing very long log messages to syslog. - Fix bug in backwards scanning of a cursor on a SELECT DISTINCT ON query. - Fix planner bug with nested sub-select expressions. If the outer sub-select has no direct dependency on the parent query, but the inner one does, the outer value might not get recalculated for new parent query rows. - Fix planner to estimate that GROUP BY expressions yielding boolean results always result in two groups, regardless of the expressions' contents. This is very substantially more accurate than the regular GROUP BY estimate for certain boolean tests like "col" IS NULL. - Fix PL/PgSQL to not fail when a FOR loop's target variable is a record containing composite-type fields. - Improve pg_dump and pg_restore's error reporting after failure to send a SQL command. - Fix pg_ctl to properly preserve postmaster command-line arguments across a restart. stable/main/binary-powerpc/postgresql-plperl-8.1_8.1.15-0etch1_powerpc.deb stable/main/binary-powerpc/postgresql-plpython-8.1_8.1.15-0etch1_powerpc.deb stable/main/binary-powerpc/postgresql-client-8.1_8.1.15-0etch1_powerpc.deb stable/main/binary-powerpc/postgresql-pltcl-8.1_8.1.15-0etch1_powerpc.deb stable/main/binary-powerpc/libecpg-compat2_8.1.15-0etch1_powerpc.deb stable/main/binary-powerpc/libecpg-dev_8.1.15-0etch1_powerpc.deb stable/main/binary-powerpc/postgresql-8.1_8.1.15-0etch1_powerpc.deb stable/main/binary-powerpc/libpq4_8.1.15-0etch1_powerpc.deb stable/main/binary-powerpc/postgresql-server-dev-8.1_8.1.15-0etch1_powerpc.deb stable/main/binary-powerpc/postgresql-contrib-8.1_8.1.15-0etch1_powerpc.deb stable/main/binary-powerpc/libpq-dev_8.1.15-0etch1_powerpc.deb stable/main/binary-powerpc/libpgtypes2_8.1.15-0etch1_powerpc.deb stable/main/binary-powerpc/libecpg5_8.1.15-0etch1_powerpc.deb postgresql-8.1 (8.1.15-0etch1) stable; urgency=low * New upstream bugfix release 8.1.15: - Fix GiST index corruption due to marking the wrong index entry "dead" after a deletion. This would result in index searches failing to find rows they should have found. - Fix backend crash when the client encoding cannot represent a localized error message. - Fix possible crash when deeply nested functions are invoked from a trigger. - Fix mis-expansion of rule queries when a sub-SELECT appears in a function call in FROM, a multi-row VALUES list, or a RETURNING list. The usual symptom of this problem is an "unrecognized node type" error. - Ensure an error is reported when a newly-defined PL/pgSQL trigger function is invoked as a normal function. - Prevent possible collision of relfilenode numbers when moving a table to another tablespace with "ALTER SET TABLESPACE". The command tried to re-use the existing filename, instead of picking one that is known unused in the destination directory. - Fix incorrect tsearch2 headline generation when single query item matches first word of text. - Fix improper display of fractional seconds in interval values when using a non-ISO datestyle in an "--enable-integer-datetimes" build. - Ensure SPI_getvalue and SPI_getbinval behave correctly when the passed tuple and tuple descriptor have different numbers of columns. This situation is normal when a table has had columns added or removed, but these two functions didn't handle it properly. The only likely consequence is an incorrect error indication. - Fix ecpg's parsing of "CREATE ROLE". - Fix recent breakage of pg_ctl restart. * New upstream bugfix release 8.1.14: - Widen local lock counters from 32 to 64 bits. This responds to reports that the counters could overflow in sufficiently long transactions, leading to unexpected "lock is already held" errors. - Fix possible duplicate output of tuples during a GiST index scan. - Add checks in executor startup to ensure that the tuples produced by an "INSERT" or "UPDATE" will match the target table's current rowtype. "ALTER COLUMN TYPE", followed by re-use of a previously cached plan, could produce this type of situation. The check protects against data corruption and/or crashes that could ensue. - Fix AT TIME ZONE to first try to interpret its timezone argument as a timezone abbreviation, and only try it as a full timezone name if that fails, rather than the other way around as formerly. The timestamp input functions have always resolved ambiguous zone names in this order. Making AT TIME ZONE do so as well improves consistency, and fixes a compatibility bug introduced in 8.1: in ambiguous cases we now behave the same as 8.0 and before did, since in the older versions AT TIME ZONE accepted -only* abbreviations. - Fix datetime input functions to correctly detect integer overflow when running on a 64-bit platform. - Improve performance of writing very long log messages to syslog. - Fix bug in backwards scanning of a cursor on a SELECT DISTINCT ON query. - Fix planner bug with nested sub-select expressions. If the outer sub-select has no direct dependency on the parent query, but the inner one does, the outer value might not get recalculated for new parent query rows. - Fix planner to estimate that GROUP BY expressions yielding boolean results always result in two groups, regardless of the expressions' contents. This is very substantially more accurate than the regular GROUP BY estimate for certain boolean tests like "col" IS NULL. - Fix PL/PgSQL to not fail when a FOR loop's target variable is a record containing composite-type fields. - Improve pg_dump and pg_restore's error reporting after failure to send a SQL command. - Fix pg_ctl to properly preserve postmaster command-line arguments across a restart. stable/main/binary-mipsel/libpq4_8.1.15-0etch1_mipsel.deb stable/main/binary-mipsel/libecpg-dev_8.1.15-0etch1_mipsel.deb stable/main/binary-mipsel/postgresql-contrib-8.1_8.1.15-0etch1_mipsel.deb stable/main/binary-mipsel/libpgtypes2_8.1.15-0etch1_mipsel.deb stable/main/binary-mipsel/postgresql-client-8.1_8.1.15-0etch1_mipsel.deb stable/main/binary-mipsel/postgresql-pltcl-8.1_8.1.15-0etch1_mipsel.deb stable/main/binary-mipsel/postgresql-plperl-8.1_8.1.15-0etch1_mipsel.deb stable/main/binary-mipsel/postgresql-plpython-8.1_8.1.15-0etch1_mipsel.deb stable/main/binary-mipsel/libecpg5_8.1.15-0etch1_mipsel.deb stable/main/binary-mipsel/postgresql-8.1_8.1.15-0etch1_mipsel.deb stable/main/binary-mipsel/libpq-dev_8.1.15-0etch1_mipsel.deb stable/main/binary-mipsel/postgresql-server-dev-8.1_8.1.15-0etch1_mipsel.deb stable/main/binary-mipsel/libecpg-compat2_8.1.15-0etch1_mipsel.deb postgresql-8.1 (8.1.15-0etch1) stable; urgency=low * New upstream bugfix release 8.1.15: - Fix GiST index corruption due to marking the wrong index entry "dead" after a deletion. This would result in index searches failing to find rows they should have found. - Fix backend crash when the client encoding cannot represent a localized error message. - Fix possible crash when deeply nested functions are invoked from a trigger. - Fix mis-expansion of rule queries when a sub-SELECT appears in a function call in FROM, a multi-row VALUES list, or a RETURNING list. The usual symptom of this problem is an "unrecognized node type" error. - Ensure an error is reported when a newly-defined PL/pgSQL trigger function is invoked as a normal function. - Prevent possible collision of relfilenode numbers when moving a table to another tablespace with "ALTER SET TABLESPACE". The command tried to re-use the existing filename, instead of picking one that is known unused in the destination directory. - Fix incorrect tsearch2 headline generation when single query item matches first word of text. - Fix improper display of fractional seconds in interval values when using a non-ISO datestyle in an "--enable-integer-datetimes" build. - Ensure SPI_getvalue and SPI_getbinval behave correctly when the passed tuple and tuple descriptor have different numbers of columns. This situation is normal when a table has had columns added or removed, but these two functions didn't handle it properly. The only likely consequence is an incorrect error indication. - Fix ecpg's parsing of "CREATE ROLE". - Fix recent breakage of pg_ctl restart. * New upstream bugfix release 8.1.14: - Widen local lock counters from 32 to 64 bits. This responds to reports that the counters could overflow in sufficiently long transactions, leading to unexpected "lock is already held" errors. - Fix possible duplicate output of tuples during a GiST index scan. - Add checks in executor startup to ensure that the tuples produced by an "INSERT" or "UPDATE" will match the target table's current rowtype. "ALTER COLUMN TYPE", followed by re-use of a previously cached plan, could produce this type of situation. The check protects against data corruption and/or crashes that could ensue. - Fix AT TIME ZONE to first try to interpret its timezone argument as a timezone abbreviation, and only try it as a full timezone name if that fails, rather than the other way around as formerly. The timestamp input functions have always resolved ambiguous zone names in this order. Making AT TIME ZONE do so as well improves consistency, and fixes a compatibility bug introduced in 8.1: in ambiguous cases we now behave the same as 8.0 and before did, since in the older versions AT TIME ZONE accepted -only* abbreviations. - Fix datetime input functions to correctly detect integer overflow when running on a 64-bit platform. - Improve performance of writing very long log messages to syslog. - Fix bug in backwards scanning of a cursor on a SELECT DISTINCT ON query. - Fix planner bug with nested sub-select expressions. If the outer sub-select has no direct dependency on the parent query, but the inner one does, the outer value might not get recalculated for new parent query rows. - Fix planner to estimate that GROUP BY expressions yielding boolean results always result in two groups, regardless of the expressions' contents. This is very substantially more accurate than the regular GROUP BY estimate for certain boolean tests like "col" IS NULL. - Fix PL/PgSQL to not fail when a FOR loop's target variable is a record containing composite-type fields. - Improve pg_dump and pg_restore's error reporting after failure to send a SQL command. - Fix pg_ctl to properly preserve postmaster command-line arguments across a restart. stable/main/binary-mips/libpq4_8.1.15-0etch1_mips.deb stable/main/binary-mips/postgresql-plpython-8.1_8.1.15-0etch1_mips.deb stable/main/binary-mips/postgresql-8.1_8.1.15-0etch1_mips.deb stable/main/binary-mips/postgresql-server-dev-8.1_8.1.15-0etch1_mips.deb stable/main/binary-mips/postgresql-client-8.1_8.1.15-0etch1_mips.deb stable/main/binary-mips/postgresql-plperl-8.1_8.1.15-0etch1_mips.deb stable/main/binary-mips/postgresql-contrib-8.1_8.1.15-0etch1_mips.deb stable/main/binary-mips/libpgtypes2_8.1.15-0etch1_mips.deb stable/main/binary-mips/libecpg5_8.1.15-0etch1_mips.deb stable/main/binary-mips/libecpg-compat2_8.1.15-0etch1_mips.deb stable/main/binary-mips/libecpg-dev_8.1.15-0etch1_mips.deb stable/main/binary-mips/postgresql-pltcl-8.1_8.1.15-0etch1_mips.deb stable/main/binary-mips/libpq-dev_8.1.15-0etch1_mips.deb postgresql-8.1 (8.1.15-0etch1) stable; urgency=low * New upstream bugfix release 8.1.15 - Fix GiST index corruption due to marking the wrong index entry "dead" after a deletion. This would result in index searches failing to find rows they should have found. - Fix backend crash when the client encoding cannot represent a localized error message. - Fix possible crash when deeply nested functions are invoked from a trigger. - Fix mis-expansion of rule queries when a sub-SELECT appears in a function call in FROM, a multi-row VALUES list, or a RETURNING list. The usual symptom of this problem is an "unrecognized node type" error. - Ensure an error is reported when a newly-defined PL/pgSQL trigger function is invoked as a normal function. - Prevent possible collision of relfilenode numbers when moving a table to another tablespace with "ALTER SET TABLESPACE". The command tried to re-use the existing filename, instead of picking one that is known unused in the destination directory. - Fix incorrect tsearch2 headline generation when single query item matches first word of text. - Fix improper display of fractional seconds in interval values when using a non-ISO datestyle in an "--enable-integer-datetimes" build. - Ensure SPI_getvalue and SPI_getbinval behave correctly when the passed tuple and tuple descriptor have different numbers of columns. This situation is normal when a table has had columns added or removed, but these two functions didn't handle it properly. The only likely consequence is an incorrect error indication. - Fix ecpg's parsing of "CREATE ROLE". - Fix recent breakage of pg_ctl restart. * New upstream bugfix release 8.1.14 - Widen local lock counters from 32 to 64 bits. This responds to reports that the counters could overflow in sufficiently long transactions, leading to unexpected "lock is already held" errors. - Fix possible duplicate output of tuples during a GiST index scan. - Add checks in executor startup to ensure that the tuples produced by an "INSERT" or "UPDATE" will match the target table's current rowtype. "ALTER COLUMN TYPE", followed by re-use of a previously cached plan, could produce this type of situation. The check protects against data corruption and/or crashes that could ensue. - Fix AT TIME ZONE to first try to interpret its timezone argument as a timezone abbreviation, and only try it as a full timezone name if that fails, rather than the other way around as formerly. The timestamp input functions have always resolved ambiguous zone names in this order. Making AT TIME ZONE do so as well improves consistency, and fixes a compatibility bug introduced in 8.1: in ambiguous cases we now behave the same as 8.0 and before did, since in the older versions AT TIME ZONE accepted -only* abbreviations. - Fix datetime input functions to correctly detect integer overflow when running on a 64-bit platform. - Improve performance of writing very long log messages to syslog. - Fix bug in backwards scanning of a cursor on a SELECT DISTINCT ON query. - Fix planner bug with nested sub-select expressions. If the outer sub-select has no direct dependency on the parent query, but the inner one does, the outer value might not get recalculated for new parent query rows. - Fix planner to estimate that GROUP BY expressions yielding boolean results always result in two groups, regardless of the expressions' contents. This is very substantially more accurate than the regular GROUP BY estimate for certain boolean tests like "col" IS NULL. - Fix PL/PgSQL to not fail when a FOR loop's target variable is a record containing composite-type fields. - Improve pg_dump and pg_restore's error reporting after failure to send a SQL command. - Fix pg_ctl to properly preserve postmaster command-line arguments across a restart. stable/main/binary-ia64/postgresql-plperl-8.1_8.1.15-0etch1_ia64.deb stable/main/binary-ia64/libecpg-compat2_8.1.15-0etch1_ia64.deb stable/main/binary-ia64/postgresql-8.1_8.1.15-0etch1_ia64.deb stable/main/binary-ia64/postgresql-server-dev-8.1_8.1.15-0etch1_ia64.deb stable/main/binary-ia64/postgresql-plpython-8.1_8.1.15-0etch1_ia64.deb stable/main/binary-ia64/libpq4_8.1.15-0etch1_ia64.deb stable/main/binary-ia64/libecpg5_8.1.15-0etch1_ia64.deb stable/main/binary-ia64/postgresql-pltcl-8.1_8.1.15-0etch1_ia64.deb stable/main/binary-ia64/libpgtypes2_8.1.15-0etch1_ia64.deb stable/main/binary-ia64/libpq-dev_8.1.15-0etch1_ia64.deb stable/main/binary-ia64/postgresql-contrib-8.1_8.1.15-0etch1_ia64.deb stable/main/binary-ia64/libecpg-dev_8.1.15-0etch1_ia64.deb stable/main/binary-ia64/postgresql-client-8.1_8.1.15-0etch1_ia64.deb postgresql-8.1 (8.1.15-0etch1) stable; urgency=low * New upstream bugfix release 8.1.15: - Fix GiST index corruption due to marking the wrong index entry "dead" after a deletion. This would result in index searches failing to find rows they should have found. - Fix backend crash when the client encoding cannot represent a localized error message. - Fix possible crash when deeply nested functions are invoked from a trigger. - Fix mis-expansion of rule queries when a sub-SELECT appears in a function call in FROM, a multi-row VALUES list, or a RETURNING list. The usual symptom of this problem is an "unrecognized node type" error. - Ensure an error is reported when a newly-defined PL/pgSQL trigger function is invoked as a normal function. - Prevent possible collision of relfilenode numbers when moving a table to another tablespace with "ALTER SET TABLESPACE". The command tried to re-use the existing filename, instead of picking one that is known unused in the destination directory. - Fix incorrect tsearch2 headline generation when single query item matches first word of text. - Fix improper display of fractional seconds in interval values when using a non-ISO datestyle in an "--enable-integer-datetimes" build. - Ensure SPI_getvalue and SPI_getbinval behave correctly when the passed tuple and tuple descriptor have different numbers of columns. This situation is normal when a table has had columns added or removed, but these two functions didn't handle it properly. The only likely consequence is an incorrect error indication. - Fix ecpg's parsing of "CREATE ROLE". - Fix recent breakage of pg_ctl restart. * New upstream bugfix release 8.1.14: - Widen local lock counters from 32 to 64 bits. This responds to reports that the counters could overflow in sufficiently long transactions, leading to unexpected "lock is already held" errors. - Fix possible duplicate output of tuples during a GiST index scan. - Add checks in executor startup to ensure that the tuples produced by an "INSERT" or "UPDATE" will match the target table's current rowtype. "ALTER COLUMN TYPE", followed by re-use of a previously cached plan, could produce this type of situation. The check protects against data corruption and/or crashes that could ensue. - Fix AT TIME ZONE to first try to interpret its timezone argument as a timezone abbreviation, and only try it as a full timezone name if that fails, rather than the other way around as formerly. The timestamp input functions have always resolved ambiguous zone names in this order. Making AT TIME ZONE do so as well improves consistency, and fixes a compatibility bug introduced in 8.1: in ambiguous cases we now behave the same as 8.0 and before did, since in the older versions AT TIME ZONE accepted -only* abbreviations. - Fix datetime input functions to correctly detect integer overflow when running on a 64-bit platform. - Improve performance of writing very long log messages to syslog. - Fix bug in backwards scanning of a cursor on a SELECT DISTINCT ON query. - Fix planner bug with nested sub-select expressions. If the outer sub-select has no direct dependency on the parent query, but the inner one does, the outer value might not get recalculated for new parent query rows. - Fix planner to estimate that GROUP BY expressions yielding boolean results always result in two groups, regardless of the expressions' contents. This is very substantially more accurate than the regular GROUP BY estimate for certain boolean tests like "col" IS NULL. - Fix PL/PgSQL to not fail when a FOR loop's target variable is a record containing composite-type fields. - Improve pg_dump and pg_restore's error reporting after failure to send a SQL command. - Fix pg_ctl to properly preserve postmaster command-line arguments across a restart. stable/main/binary-hppa/postgresql-client-8.1_8.1.15-0etch1_hppa.deb stable/main/binary-hppa/libecpg5_8.1.15-0etch1_hppa.deb stable/main/binary-hppa/libecpg-compat2_8.1.15-0etch1_hppa.deb stable/main/binary-hppa/libpq4_8.1.15-0etch1_hppa.deb stable/main/binary-hppa/postgresql-8.1_8.1.15-0etch1_hppa.deb stable/main/binary-hppa/postgresql-plperl-8.1_8.1.15-0etch1_hppa.deb stable/main/binary-hppa/postgresql-pltcl-8.1_8.1.15-0etch1_hppa.deb stable/main/binary-hppa/libpgtypes2_8.1.15-0etch1_hppa.deb stable/main/binary-hppa/postgresql-server-dev-8.1_8.1.15-0etch1_hppa.deb stable/main/binary-hppa/postgresql-contrib-8.1_8.1.15-0etch1_hppa.deb stable/main/binary-hppa/postgresql-plpython-8.1_8.1.15-0etch1_hppa.deb stable/main/binary-hppa/libecpg-dev_8.1.15-0etch1_hppa.deb stable/main/binary-hppa/libpq-dev_8.1.15-0etch1_hppa.deb postgresql-8.1 (8.1.15-0etch1) stable; urgency=low * New upstream bugfix release 8.1.15: - Fix GiST index corruption due to marking the wrong index entry "dead" after a deletion. This would result in index searches failing to find rows they should have found. - Fix backend crash when the client encoding cannot represent a localized error message. - Fix possible crash when deeply nested functions are invoked from a trigger. - Fix mis-expansion of rule queries when a sub-SELECT appears in a function call in FROM, a multi-row VALUES list, or a RETURNING list. The usual symptom of this problem is an "unrecognized node type" error. - Ensure an error is reported when a newly-defined PL/pgSQL trigger function is invoked as a normal function. - Prevent possible collision of relfilenode numbers when moving a table to another tablespace with "ALTER SET TABLESPACE". The command tried to re-use the existing filename, instead of picking one that is known unused in the destination directory. - Fix incorrect tsearch2 headline generation when single query item matches first word of text. - Fix improper display of fractional seconds in interval values when using a non-ISO datestyle in an "--enable-integer-datetimes" build. - Ensure SPI_getvalue and SPI_getbinval behave correctly when the passed tuple and tuple descriptor have different numbers of columns. This situation is normal when a table has had columns added or removed, but these two functions didn't handle it properly. The only likely consequence is an incorrect error indication. - Fix ecpg's parsing of "CREATE ROLE". - Fix recent breakage of pg_ctl restart. * New upstream bugfix release 8.1.14: - Widen local lock counters from 32 to 64 bits. This responds to reports that the counters could overflow in sufficiently long transactions, leading to unexpected "lock is already held" errors. - Fix possible duplicate output of tuples during a GiST index scan. - Add checks in executor startup to ensure that the tuples produced by an "INSERT" or "UPDATE" will match the target table's current rowtype. "ALTER COLUMN TYPE", followed by re-use of a previously cached plan, could produce this type of situation. The check protects against data corruption and/or crashes that could ensue. - Fix AT TIME ZONE to first try to interpret its timezone argument as a timezone abbreviation, and only try it as a full timezone name if that fails, rather than the other way around as formerly. The timestamp input functions have always resolved ambiguous zone names in this order. Making AT TIME ZONE do so as well improves consistency, and fixes a compatibility bug introduced in 8.1: in ambiguous cases we now behave the same as 8.0 and before did, since in the older versions AT TIME ZONE accepted -only* abbreviations. - Fix datetime input functions to correctly detect integer overflow when running on a 64-bit platform. - Improve performance of writing very long log messages to syslog. - Fix bug in backwards scanning of a cursor on a SELECT DISTINCT ON query. - Fix planner bug with nested sub-select expressions. If the outer sub-select has no direct dependency on the parent query, but the inner one does, the outer value might not get recalculated for new parent query rows. - Fix planner to estimate that GROUP BY expressions yielding boolean results always result in two groups, regardless of the expressions' contents. This is very substantially more accurate than the regular GROUP BY estimate for certain boolean tests like "col" IS NULL. - Fix PL/PgSQL to not fail when a FOR loop's target variable is a record containing composite-type fields. - Improve pg_dump and pg_restore's error reporting after failure to send a SQL command. - Fix pg_ctl to properly preserve postmaster command-line arguments across a restart. stable/main/binary-arm/libpq-dev_8.1.15-0etch1_arm.deb stable/main/binary-arm/libpq4_8.1.15-0etch1_arm.deb stable/main/binary-arm/postgresql-contrib-8.1_8.1.15-0etch1_arm.deb stable/main/binary-arm/postgresql-plpython-8.1_8.1.15-0etch1_arm.deb stable/main/binary-arm/libecpg-compat2_8.1.15-0etch1_arm.deb stable/main/binary-arm/libecpg5_8.1.15-0etch1_arm.deb stable/main/binary-arm/postgresql-client-8.1_8.1.15-0etch1_arm.deb stable/main/binary-arm/libecpg-dev_8.1.15-0etch1_arm.deb stable/main/binary-arm/postgresql-server-dev-8.1_8.1.15-0etch1_arm.deb stable/main/binary-arm/postgresql-pltcl-8.1_8.1.15-0etch1_arm.deb stable/main/binary-arm/postgresql-plperl-8.1_8.1.15-0etch1_arm.deb stable/main/binary-arm/libpgtypes2_8.1.15-0etch1_arm.deb stable/main/binary-arm/postgresql-8.1_8.1.15-0etch1_arm.deb postgresql-8.1 (8.1.15-0etch1) stable; urgency=low * New upstream bugfix release 8.1.15: - Fix GiST index corruption due to marking the wrong index entry "dead" after a deletion. This would result in index searches failing to find rows they should have found. - Fix backend crash when the client encoding cannot represent a localized error message. - Fix possible crash when deeply nested functions are invoked from a trigger. - Fix mis-expansion of rule queries when a sub-SELECT appears in a function call in FROM, a multi-row VALUES list, or a RETURNING list. The usual symptom of this problem is an "unrecognized node type" error. - Ensure an error is reported when a newly-defined PL/pgSQL trigger function is invoked as a normal function. - Prevent possible collision of relfilenode numbers when moving a table to another tablespace with "ALTER SET TABLESPACE". The command tried to re-use the existing filename, instead of picking one that is known unused in the destination directory. - Fix incorrect tsearch2 headline generation when single query item matches first word of text. - Fix improper display of fractional seconds in interval values when using a non-ISO datestyle in an "--enable-integer-datetimes" build. - Ensure SPI_getvalue and SPI_getbinval behave correctly when the passed tuple and tuple descriptor have different numbers of columns. This situation is normal when a table has had columns added or removed, but these two functions didn't handle it properly. The only likely consequence is an incorrect error indication. - Fix ecpg's parsing of "CREATE ROLE". - Fix recent breakage of pg_ctl restart. * New upstream bugfix release 8.1.14: - Widen local lock counters from 32 to 64 bits. This responds to reports that the counters could overflow in sufficiently long transactions, leading to unexpected "lock is already held" errors. - Fix possible duplicate output of tuples during a GiST index scan. - Add checks in executor startup to ensure that the tuples produced by an "INSERT" or "UPDATE" will match the target table's current rowtype. "ALTER COLUMN TYPE", followed by re-use of a previously cached plan, could produce this type of situation. The check protects against data corruption and/or crashes that could ensue. - Fix AT TIME ZONE to first try to interpret its timezone argument as a timezone abbreviation, and only try it as a full timezone name if that fails, rather than the other way around as formerly. The timestamp input functions have always resolved ambiguous zone names in this order. Making AT TIME ZONE do so as well improves consistency, and fixes a compatibility bug introduced in 8.1: in ambiguous cases we now behave the same as 8.0 and before did, since in the older versions AT TIME ZONE accepted -only* abbreviations. - Fix datetime input functions to correctly detect integer overflow when running on a 64-bit platform. - Improve performance of writing very long log messages to syslog. - Fix bug in backwards scanning of a cursor on a SELECT DISTINCT ON query. - Fix planner bug with nested sub-select expressions. If the outer sub-select has no direct dependency on the parent query, but the inner one does, the outer value might not get recalculated for new parent query rows. - Fix planner to estimate that GROUP BY expressions yielding boolean results always result in two groups, regardless of the expressions' contents. This is very substantially more accurate than the regular GROUP BY estimate for certain boolean tests like "col" IS NULL. - Fix PL/PgSQL to not fail when a FOR loop's target variable is a record containing composite-type fields. - Improve pg_dump and pg_restore's error reporting after failure to send a SQL command. - Fix pg_ctl to properly preserve postmaster command-line arguments across a restart. stable/main/binary-amd64/libpgtypes2_8.1.15-0etch1_amd64.deb stable/main/binary-amd64/libecpg-dev_8.1.15-0etch1_amd64.deb stable/main/binary-amd64/postgresql-client-8.1_8.1.15-0etch1_amd64.deb stable/main/binary-amd64/postgresql-pltcl-8.1_8.1.15-0etch1_amd64.deb stable/main/binary-amd64/postgresql-server-dev-8.1_8.1.15-0etch1_amd64.deb stable/main/binary-amd64/postgresql-contrib-8.1_8.1.15-0etch1_amd64.deb stable/main/binary-amd64/postgresql-plperl-8.1_8.1.15-0etch1_amd64.deb stable/main/binary-amd64/libpq4_8.1.15-0etch1_amd64.deb stable/main/binary-amd64/postgresql-8.1_8.1.15-0etch1_amd64.deb stable/main/binary-amd64/postgresql-plpython-8.1_8.1.15-0etch1_amd64.deb stable/main/binary-amd64/libecpg-compat2_8.1.15-0etch1_amd64.deb stable/main/binary-amd64/libpq-dev_8.1.15-0etch1_amd64.deb stable/main/binary-amd64/libecpg5_8.1.15-0etch1_amd64.deb postgresql-8.1 (8.1.15-0etch1) stable; urgency=low * New upstream bugfix release 8.1.15: - Fix GiST index corruption due to marking the wrong index entry "dead" after a deletion. This would result in index searches failing to find rows they should have found. - Fix backend crash when the client encoding cannot represent a localized error message. - Fix possible crash when deeply nested functions are invoked from a trigger. - Fix mis-expansion of rule queries when a sub-SELECT appears in a function call in FROM, a multi-row VALUES list, or a RETURNING list. The usual symptom of this problem is an "unrecognized node type" error. - Ensure an error is reported when a newly-defined PL/pgSQL trigger function is invoked as a normal function. - Prevent possible collision of relfilenode numbers when moving a table to another tablespace with "ALTER SET TABLESPACE". The command tried to re-use the existing filename, instead of picking one that is known unused in the destination directory. - Fix incorrect tsearch2 headline generation when single query item matches first word of text. - Fix improper display of fractional seconds in interval values when using a non-ISO datestyle in an "--enable-integer-datetimes" build. - Ensure SPI_getvalue and SPI_getbinval behave correctly when the passed tuple and tuple descriptor have different numbers of columns. This situation is normal when a table has had columns added or removed, but these two functions didn't handle it properly. The only likely consequence is an incorrect error indication. - Fix ecpg's parsing of "CREATE ROLE". - Fix recent breakage of pg_ctl restart. * New upstream bugfix release 8.1.14: - Widen local lock counters from 32 to 64 bits. This responds to reports that the counters could overflow in sufficiently long transactions, leading to unexpected "lock is already held" errors. - Fix possible duplicate output of tuples during a GiST index scan. - Add checks in executor startup to ensure that the tuples produced by an "INSERT" or "UPDATE" will match the target table's current rowtype. "ALTER COLUMN TYPE", followed by re-use of a previously cached plan, could produce this type of situation. The check protects against data corruption and/or crashes that could ensue. - Fix AT TIME ZONE to first try to interpret its timezone argument as a timezone abbreviation, and only try it as a full timezone name if that fails, rather than the other way around as formerly. The timestamp input functions have always resolved ambiguous zone names in this order. Making AT TIME ZONE do so as well improves consistency, and fixes a compatibility bug introduced in 8.1: in ambiguous cases we now behave the same as 8.0 and before did, since in the older versions AT TIME ZONE accepted -only* abbreviations. - Fix datetime input functions to correctly detect integer overflow when running on a 64-bit platform. - Improve performance of writing very long log messages to syslog. - Fix bug in backwards scanning of a cursor on a SELECT DISTINCT ON query. - Fix planner bug with nested sub-select expressions. If the outer sub-select has no direct dependency on the parent query, but the inner one does, the outer value might not get recalculated for new parent query rows. - Fix planner to estimate that GROUP BY expressions yielding boolean results always result in two groups, regardless of the expressions' contents. This is very substantially more accurate than the regular GROUP BY estimate for certain boolean tests like "col" IS NULL. - Fix PL/PgSQL to not fail when a FOR loop's target variable is a record containing composite-type fields. - Improve pg_dump and pg_restore's error reporting after failure to send a SQL command. - Fix pg_ctl to properly preserve postmaster command-line arguments across a restart. stable/main/binary-alpha/postgresql-plpython-8.1_8.1.15-0etch1_alpha.deb stable/main/binary-alpha/libpq-dev_8.1.15-0etch1_alpha.deb stable/main/binary-alpha/postgresql-client-8.1_8.1.15-0etch1_alpha.deb stable/main/binary-alpha/postgresql-contrib-8.1_8.1.15-0etch1_alpha.deb stable/main/binary-alpha/postgresql-server-dev-8.1_8.1.15-0etch1_alpha.deb stable/main/binary-alpha/libecpg-compat2_8.1.15-0etch1_alpha.deb stable/main/binary-alpha/libecpg-dev_8.1.15-0etch1_alpha.deb stable/main/binary-alpha/libpq4_8.1.15-0etch1_alpha.deb stable/main/binary-alpha/postgresql-8.1_8.1.15-0etch1_alpha.deb stable/main/binary-alpha/libpgtypes2_8.1.15-0etch1_alpha.deb stable/main/binary-alpha/postgresql-plperl-8.1_8.1.15-0etch1_alpha.deb stable/main/binary-alpha/postgresql-pltcl-8.1_8.1.15-0etch1_alpha.deb stable/main/binary-alpha/libecpg5_8.1.15-0etch1_alpha.deb postgresql-8.1 (8.1.15-0etch1) stable; urgency=low * New upstream bugfix release 8.1.15: - Fix GiST index corruption due to marking the wrong index entry "dead" after a deletion. This would result in index searches failing to find rows they should have found. - Fix backend crash when the client encoding cannot represent a localized error message. - Fix possible crash when deeply nested functions are invoked from a trigger. - Fix mis-expansion of rule queries when a sub-SELECT appears in a function call in FROM, a multi-row VALUES list, or a RETURNING list. The usual symptom of this problem is an "unrecognized node type" error. - Ensure an error is reported when a newly-defined PL/pgSQL trigger function is invoked as a normal function. - Prevent possible collision of relfilenode numbers when moving a table to another tablespace with "ALTER SET TABLESPACE". The command tried to re-use the existing filename, instead of picking one that is known unused in the destination directory. - Fix incorrect tsearch2 headline generation when single query item matches first word of text. - Fix improper display of fractional seconds in interval values when using a non-ISO datestyle in an "--enable-integer-datetimes" build. - Ensure SPI_getvalue and SPI_getbinval behave correctly when the passed tuple and tuple descriptor have different numbers of columns. This situation is normal when a table has had columns added or removed, but these two functions didn't handle it properly. The only likely consequence is an incorrect error indication. - Fix ecpg's parsing of "CREATE ROLE". - Fix recent breakage of pg_ctl restart. * New upstream bugfix release 8.1.14: - Widen local lock counters from 32 to 64 bits. This responds to reports that the counters could overflow in sufficiently long transactions, leading to unexpected "lock is already held" errors. - Fix possible duplicate output of tuples during a GiST index scan. - Add checks in executor startup to ensure that the tuples produced by an "INSERT" or "UPDATE" will match the target table's current rowtype. "ALTER COLUMN TYPE", followed by re-use of a previously cached plan, could produce this type of situation. The check protects against data corruption and/or crashes that could ensue. - Fix AT TIME ZONE to first try to interpret its timezone argument as a timezone abbreviation, and only try it as a full timezone name if that fails, rather than the other way around as formerly. The timestamp input functions have always resolved ambiguous zone names in this order. Making AT TIME ZONE do so as well improves consistency, and fixes a compatibility bug introduced in 8.1: in ambiguous cases we now behave the same as 8.0 and before did, since in the older versions AT TIME ZONE accepted -only* abbreviations. - Fix datetime input functions to correctly detect integer overflow when running on a 64-bit platform. - Improve performance of writing very long log messages to syslog. - Fix bug in backwards scanning of a cursor on a SELECT DISTINCT ON query. - Fix planner bug with nested sub-select expressions. If the outer sub-select has no direct dependency on the parent query, but the inner one does, the outer value might not get recalculated for new parent query rows. - Fix planner to estimate that GROUP BY expressions yielding boolean results always result in two groups, regardless of the expressions' contents. This is very substantially more accurate than the regular GROUP BY estimate for certain boolean tests like "col" IS NULL. - Fix PL/PgSQL to not fail when a FOR loop's target variable is a record containing composite-type fields. - Improve pg_dump and pg_restore's error reporting after failure to send a SQL command. - Fix pg_ctl to properly preserve postmaster command-line arguments across a restart. stable/main/binary-i386/libecpg-dev_8.1.15-0etch1_i386.deb stable/main/binary-i386/postgresql-client-8.1_8.1.15-0etch1_i386.deb stable/main/binary-i386/postgresql-contrib-8.1_8.1.15-0etch1_i386.deb stable/main/binary-i386/libecpg5_8.1.15-0etch1_i386.deb stable/main/binary-i386/postgresql-8.1_8.1.15-0etch1_i386.deb stable/main/binary-i386/postgresql-server-dev-8.1_8.1.15-0etch1_i386.deb stable/main/source/postgresql-8.1_8.1.15-0etch1.dsc stable/main/binary-i386/postgresql-plpython-8.1_8.1.15-0etch1_i386.deb stable/main/binary-i386/libpq-dev_8.1.15-0etch1_i386.deb stable/main/binary-i386/postgresql-plperl-8.1_8.1.15-0etch1_i386.deb stable/main/binary-i386/libpgtypes2_8.1.15-0etch1_i386.deb stable/main/binary-i386/postgresql-pltcl-8.1_8.1.15-0etch1_i386.deb stable/main/source/postgresql-8.1_8.1.15-0etch1.diff.gz stable/main/binary-i386/libecpg-compat2_8.1.15-0etch1_i386.deb stable/main/binary-all/postgresql-doc-8.1_8.1.15-0etch1_all.deb stable/main/binary-i386/libpq4_8.1.15-0etch1_i386.deb stable/main/source/postgresql-8.1_8.1.15.orig.tar.gz postgresql-8.1 (8.1.15-0etch1) stable; urgency=low * New upstream bugfix release 8.1.15: - Fix GiST index corruption due to marking the wrong index entry "dead" after a deletion. This would result in index searches failing to find rows they should have found. - Fix backend crash when the client encoding cannot represent a localized error message. - Fix possible crash when deeply nested functions are invoked from a trigger. - Fix mis-expansion of rule queries when a sub-SELECT appears in a function call in FROM, a multi-row VALUES list, or a RETURNING list. The usual symptom of this problem is an "unrecognized node type" error. - Ensure an error is reported when a newly-defined PL/pgSQL trigger function is invoked as a normal function. - Prevent possible collision of relfilenode numbers when moving a table to another tablespace with "ALTER SET TABLESPACE". The command tried to re-use the existing filename, instead of picking one that is known unused in the destination directory. - Fix incorrect tsearch2 headline generation when single query item matches first word of text. - Fix improper display of fractional seconds in interval values when using a non-ISO datestyle in an "--enable-integer-datetimes" build. - Ensure SPI_getvalue and SPI_getbinval behave correctly when the passed tuple and tuple descriptor have different numbers of columns. This situation is normal when a table has had columns added or removed, but these two functions didn't handle it properly. The only likely consequence is an incorrect error indication. - Fix ecpg's parsing of "CREATE ROLE". - Fix recent breakage of pg_ctl restart. * New upstream bugfix release 8.1.14: - Widen local lock counters from 32 to 64 bits. This responds to reports that the counters could overflow in sufficiently long transactions, leading to unexpected "lock is already held" errors. - Fix possible duplicate output of tuples during a GiST index scan. - Add checks in executor startup to ensure that the tuples produced by an "INSERT" or "UPDATE" will match the target table's current rowtype. "ALTER COLUMN TYPE", followed by re-use of a previously cached plan, could produce this type of situation. The check protects against data corruption and/or crashes that could ensue. - Fix AT TIME ZONE to first try to interpret its timezone argument as a timezone abbreviation, and only try it as a full timezone name if that fails, rather than the other way around as formerly. The timestamp input functions have always resolved ambiguous zone names in this order. Making AT TIME ZONE do so as well improves consistency, and fixes a compatibility bug introduced in 8.1: in ambiguous cases we now behave the same as 8.0 and before did, since in the older versions AT TIME ZONE accepted -only* abbreviations. - Fix datetime input functions to correctly detect integer overflow when running on a 64-bit platform. - Improve performance of writing very long log messages to syslog. - Fix bug in backwards scanning of a cursor on a SELECT DISTINCT ON query. - Fix planner bug with nested sub-select expressions. If the outer sub-select has no direct dependency on the parent query, but the inner one does, the outer value might not get recalculated for new parent query rows. - Fix planner to estimate that GROUP BY expressions yielding boolean results always result in two groups, regardless of the expressions' contents. This is very substantially more accurate than the regular GROUP BY estimate for certain boolean tests like "col" IS NULL. - Fix PL/PgSQL to not fail when a FOR loop's target variable is a record containing composite-type fields. - Improve pg_dump and pg_restore's error reporting after failure to send a SQL command. - Fix pg_ctl to properly preserve postmaster command-line arguments across a restart. stable/main/binary-sparc/postgresql-contrib-7.4_7.4.23-0etch1_sparc.deb stable/main/binary-sparc/postgresql-pltcl-7.4_7.4.23-0etch1_sparc.deb stable/main/binary-sparc/postgresql-plpython-7.4_7.4.23-0etch1_sparc.deb stable/main/binary-sparc/postgresql-client-7.4_7.4.23-0etch1_sparc.deb stable/main/binary-sparc/postgresql-7.4_7.4.23-0etch1_sparc.deb stable/main/binary-sparc/postgresql-plperl-7.4_7.4.23-0etch1_sparc.deb postgresql-7.4 (1:7.4.23-0etch1) stable; urgency=low * New upstream bug fix release 7.4.23: - Fix backend crash when the client encoding cannot represent a localized error message. - Fix incorrect tsearch2 headline generation when single query item matches first word of text. - Fix improper display of fractional seconds in interval values when using a non-ISO datestyle in an "--enable-integer-datetimes" build. - Ensure SPI_getvalue and SPI_getbinval behave correctly when the passed tuple and tuple descriptor have different numbers of columns. This situation is normal when a table has had columns added or removed, but these two functions didn't handle it properly. The only likely consequence is an incorrect error indication. - Fix ecpg's parsing of "CREATE USER". * New upstream bug fix release 7.4.22: - Fix datetime input functions to correctly detect integer overflow when running on a 64-bit platform. - Improve performance of writing very long log messages to syslog. - Fix bug in backwards scanning of a cursor on a SELECT DISTINCT ON query. - Fix planner to estimate that GROUP BY expressions yielding boolean results always result in two groups, regardless of the expressions' contents. This is very substantially more accurate than the regular GROUP BY estimate for certain boolean tests like "col" IS NULL. - Improve pg_dump and pg_restore's error reporting after failure to send a SQL command. * New upstream bug fix release 7.4.21: - Make pg_get_ruledef() parenthesize negative constants. Before this fix, a negative constant in a view or rule might be dumped as, say, -42::integer, which is subtly incorrect: it should be (-42)::integer due to operator precedence rules. Usually this would make little difference, but it could interact with another recent patch to cause PostgreSQL to reject what had been a valid "SELECT DISTINCT" view query. Since this could result in pg_dump output failing to reload, it is being treated as a high-priority fix. The only released versions in which dump output is actually incorrect are 8.3.1 and 8.2.7. * New upstream bug fix release 7.4.20: - Fix conversions between ISO-8859-5 and other encodings to handle Cyrillic "Yo" characters (e and E with two dots). - Fix a few datatype input functions that were allowing unused bytes in their results to contain uninitialized, unpredictable values. This could lead to failures in which two apparently identical literal values were not seen as equal, resulting in the parser complaining about unmatched ORDER BY and DISTINCT expressions. - Fix a corner case in regular-expression substring matching (substring(string from pattern)). The problem occurs when there is a match to the pattern overall but the user has specified a parenthesized subexpression and that subexpression hasn't got a match. An example is substring('foo' from 'foo(bar)?'). This should return NULL, since (bar) isn't matched, but it was mistakenly returning the whole-pattern match instead (ie, foo). - Fix incorrect result from ecpg's PGTYPEStimestamp_sub() function. - Fix longstanding "LISTEN"/"NOTIFY" race condition. In rare cases a session that had just executed a "LISTEN" might not get a notification, even though one would be expected because the concurrent transaction executing "NOTIFY" was observed to commit later. A side effect of the fix is that a transaction that has executed a not-yet-committed "LISTEN" command will not see any row in pg_listener for the "LISTEN", should it choose to look; formerly it would have. This behavior was never documented one way or the other, but it is possible that some applications depend on the old behavior. - Fix display of constant expressions in ORDER BY and GROUP BY. An explictly casted constant would be shown incorrectly. This could for example lead to corruption of a view definition during dump and reload. - Fix libpq to handle NOTICE messages correctly during COPY OUT. This failure has only been observed to occur when a user-defined datatype's output routine issues a NOTICE, but there is no guarantee it couldn't happen due to other causes. stable/main/binary-s390/postgresql-7.4_7.4.23-0etch1_s390.deb stable/main/binary-s390/postgresql-plperl-7.4_7.4.23-0etch1_s390.deb stable/main/binary-s390/postgresql-client-7.4_7.4.23-0etch1_s390.deb stable/main/binary-s390/postgresql-plpython-7.4_7.4.23-0etch1_s390.deb stable/main/binary-s390/postgresql-pltcl-7.4_7.4.23-0etch1_s390.deb stable/main/binary-s390/postgresql-contrib-7.4_7.4.23-0etch1_s390.deb postgresql-7.4 (1:7.4.23-0etch1) stable; urgency=low * New upstream bug fix release 7.4.23: - Fix backend crash when the client encoding cannot represent a localized error message. - Fix incorrect tsearch2 headline generation when single query item matches first word of text. - Fix improper display of fractional seconds in interval values when using a non-ISO datestyle in an "--enable-integer-datetimes" build. - Ensure SPI_getvalue and SPI_getbinval behave correctly when the passed tuple and tuple descriptor have different numbers of columns. This situation is normal when a table has had columns added or removed, but these two functions didn't handle it properly. The only likely consequence is an incorrect error indication. - Fix ecpg's parsing of "CREATE USER". * New upstream bug fix release 7.4.22: - Fix datetime input functions to correctly detect integer overflow when running on a 64-bit platform. - Improve performance of writing very long log messages to syslog. - Fix bug in backwards scanning of a cursor on a SELECT DISTINCT ON query. - Fix planner to estimate that GROUP BY expressions yielding boolean results always result in two groups, regardless of the expressions' contents. This is very substantially more accurate than the regular GROUP BY estimate for certain boolean tests like "col" IS NULL. - Improve pg_dump and pg_restore's error reporting after failure to send a SQL command. * New upstream bug fix release 7.4.21: - Make pg_get_ruledef() parenthesize negative constants. Before this fix, a negative constant in a view or rule might be dumped as, say, -42::integer, which is subtly incorrect: it should be (-42)::integer due to operator precedence rules. Usually this would make little difference, but it could interact with another recent patch to cause PostgreSQL to reject what had been a valid "SELECT DISTINCT" view query. Since this could result in pg_dump output failing to reload, it is being treated as a high-priority fix. The only released versions in which dump output is actually incorrect are 8.3.1 and 8.2.7. * New upstream bug fix release 7.4.20: - Fix conversions between ISO-8859-5 and other encodings to handle Cyrillic "Yo" characters (e and E with two dots). - Fix a few datatype input functions that were allowing unused bytes in their results to contain uninitialized, unpredictable values. This could lead to failures in which two apparently identical literal values were not seen as equal, resulting in the parser complaining about unmatched ORDER BY and DISTINCT expressions. - Fix a corner case in regular-expression substring matching (substring(string from pattern)). The problem occurs when there is a match to the pattern overall but the user has specified a parenthesized subexpression and that subexpression hasn't got a match. An example is substring('foo' from 'foo(bar)?'). This should return NULL, since (bar) isn't matched, but it was mistakenly returning the whole-pattern match instead (ie, foo). - Fix incorrect result from ecpg's PGTYPEStimestamp_sub() function. - Fix longstanding "LISTEN"/"NOTIFY" race condition. In rare cases a session that had just executed a "LISTEN" might not get a notification, even though one would be expected because the concurrent transaction executing "NOTIFY" was observed to commit later. A side effect of the fix is that a transaction that has executed a not-yet-committed "LISTEN" command will not see any row in pg_listener for the "LISTEN", should it choose to look; formerly it would have. This behavior was never documented one way or the other, but it is possible that some applications depend on the old behavior. - Fix display of constant expressions in ORDER BY and GROUP BY. An explictly casted constant would be shown incorrectly. This could for example lead to corruption of a view definition during dump and reload. - Fix libpq to handle NOTICE messages correctly during COPY OUT. This failure has only been observed to occur when a user-defined datatype's output routine issues a NOTICE, but there is no guarantee it couldn't happen due to other causes. stable/main/binary-powerpc/postgresql-contrib-7.4_7.4.23-0etch1_powerpc.deb stable/main/binary-powerpc/postgresql-client-7.4_7.4.23-0etch1_powerpc.deb stable/main/binary-powerpc/postgresql-pltcl-7.4_7.4.23-0etch1_powerpc.deb stable/main/binary-powerpc/postgresql-plpython-7.4_7.4.23-0etch1_powerpc.deb stable/main/binary-powerpc/postgresql-plperl-7.4_7.4.23-0etch1_powerpc.deb stable/main/binary-powerpc/postgresql-7.4_7.4.23-0etch1_powerpc.deb postgresql-7.4 (1:7.4.23-0etch1) stable; urgency=low * New upstream bug fix release 7.4.23: - Fix backend crash when the client encoding cannot represent a localized error message. - Fix incorrect tsearch2 headline generation when single query item matches first word of text. - Fix improper display of fractional seconds in interval values when using a non-ISO datestyle in an "--enable-integer-datetimes" build. - Ensure SPI_getvalue and SPI_getbinval behave correctly when the passed tuple and tuple descriptor have different numbers of columns. This situation is normal when a table has had columns added or removed, but these two functions didn't handle it properly. The only likely consequence is an incorrect error indication. - Fix ecpg's parsing of "CREATE USER". * New upstream bug fix release 7.4.22: - Fix datetime input functions to correctly detect integer overflow when running on a 64-bit platform. - Improve performance of writing very long log messages to syslog. - Fix bug in backwards scanning of a cursor on a SELECT DISTINCT ON query. - Fix planner to estimate that GROUP BY expressions yielding boolean results always result in two groups, regardless of the expressions' contents. This is very substantially more accurate than the regular GROUP BY estimate for certain boolean tests like "col" IS NULL. - Improve pg_dump and pg_restore's error reporting after failure to send a SQL command. * New upstream bug fix release 7.4.21: - Make pg_get_ruledef() parenthesize negative constants. Before this fix, a negative constant in a view or rule might be dumped as, say, -42::integer, which is subtly incorrect: it should be (-42)::integer due to operator precedence rules. Usually this would make little difference, but it could interact with another recent patch to cause PostgreSQL to reject what had been a valid "SELECT DISTINCT" view query. Since this could result in pg_dump output failing to reload, it is being treated as a high-priority fix. The only released versions in which dump output is actually incorrect are 8.3.1 and 8.2.7. * New upstream bug fix release 7.4.20: - Fix conversions between ISO-8859-5 and other encodings to handle Cyrillic "Yo" characters (e and E with two dots). - Fix a few datatype input functions that were allowing unused bytes in their results to contain uninitialized, unpredictable values. This could lead to failures in which two apparently identical literal values were not seen as equal, resulting in the parser complaining about unmatched ORDER BY and DISTINCT expressions. - Fix a corner case in regular-expression substring matching (substring(string from pattern)). The problem occurs when there is a match to the pattern overall but the user has specified a parenthesized subexpression and that subexpression hasn't got a match. An example is substring('foo' from 'foo(bar)?'). This should return NULL, since (bar) isn't matched, but it was mistakenly returning the whole-pattern match instead (ie, foo). - Fix incorrect result from ecpg's PGTYPEStimestamp_sub() function. - Fix longstanding "LISTEN"/"NOTIFY" race condition. In rare cases a session that had just executed a "LISTEN" might not get a notification, even though one would be expected because the concurrent transaction executing "NOTIFY" was observed to commit later. A side effect of the fix is that a transaction that has executed a not-yet-committed "LISTEN" command will not see any row in pg_listener for the "LISTEN", should it choose to look; formerly it would have. This behavior was never documented one way or the other, but it is possible that some applications depend on the old behavior. - Fix display of constant expressions in ORDER BY and GROUP BY. An explictly casted constant would be shown incorrectly. This could for example lead to corruption of a view definition during dump and reload. - Fix libpq to handle NOTICE messages correctly during COPY OUT. This failure has only been observed to occur when a user-defined datatype's output routine issues a NOTICE, but there is no guarantee it couldn't happen due to other causes. stable/main/binary-mipsel/postgresql-7.4_7.4.23-0etch1_mipsel.deb stable/main/binary-mipsel/postgresql-plperl-7.4_7.4.23-0etch1_mipsel.deb stable/main/binary-mipsel/postgresql-pltcl-7.4_7.4.23-0etch1_mipsel.deb stable/main/binary-mipsel/postgresql-plpython-7.4_7.4.23-0etch1_mipsel.deb stable/main/binary-mipsel/postgresql-contrib-7.4_7.4.23-0etch1_mipsel.deb stable/main/binary-mipsel/postgresql-client-7.4_7.4.23-0etch1_mipsel.deb postgresql-7.4 (1:7.4.23-0etch1) stable; urgency=low * New upstream bug fix release 7.4.23: - Fix backend crash when the client encoding cannot represent a localized error message. - Fix incorrect tsearch2 headline generation when single query item matches first word of text. - Fix improper display of fractional seconds in interval values when using a non-ISO datestyle in an "--enable-integer-datetimes" build. - Ensure SPI_getvalue and SPI_getbinval behave correctly when the passed tuple and tuple descriptor have different numbers of columns. This situation is normal when a table has had columns added or removed, but these two functions didn't handle it properly. The only likely consequence is an incorrect error indication. - Fix ecpg's parsing of "CREATE USER". * New upstream bug fix release 7.4.22: - Fix datetime input functions to correctly detect integer overflow when running on a 64-bit platform. - Improve performance of writing very long log messages to syslog. - Fix bug in backwards scanning of a cursor on a SELECT DISTINCT ON query. - Fix planner to estimate that GROUP BY expressions yielding boolean results always result in two groups, regardless of the expressions' contents. This is very substantially more accurate than the regular GROUP BY estimate for certain boolean tests like "col" IS NULL. - Improve pg_dump and pg_restore's error reporting after failure to send a SQL command. * New upstream bug fix release 7.4.21: - Make pg_get_ruledef() parenthesize negative constants. Before this fix, a negative constant in a view or rule might be dumped as, say, -42::integer, which is subtly incorrect: it should be (-42)::integer due to operator precedence rules. Usually this would make little difference, but it could interact with another recent patch to cause PostgreSQL to reject what had been a valid "SELECT DISTINCT" view query. Since this could result in pg_dump output failing to reload, it is being treated as a high-priority fix. The only released versions in which dump output is actually incorrect are 8.3.1 and 8.2.7. * New upstream bug fix release 7.4.20: - Fix conversions between ISO-8859-5 and other encodings to handle Cyrillic "Yo" characters (e and E with two dots). - Fix a few datatype input functions that were allowing unused bytes in their results to contain uninitialized, unpredictable values. This could lead to failures in which two apparently identical literal values were not seen as equal, resulting in the parser complaining about unmatched ORDER BY and DISTINCT expressions. - Fix a corner case in regular-expression substring matching (substring(string from pattern)). The problem occurs when there is a match to the pattern overall but the user has specified a parenthesized subexpression and that subexpression hasn't got a match. An example is substring('foo' from 'foo(bar)?'). This should return NULL, since (bar) isn't matched, but it was mistakenly returning the whole-pattern match instead (ie, foo). - Fix incorrect result from ecpg's PGTYPEStimestamp_sub() function. - Fix longstanding "LISTEN"/"NOTIFY" race condition. In rare cases a session that had just executed a "LISTEN" might not get a notification, even though one would be expected because the concurrent transaction executing "NOTIFY" was observed to commit later. A side effect of the fix is that a transaction that has executed a not-yet-committed "LISTEN" command will not see any row in pg_listener for the "LISTEN", should it choose to look; formerly it would have. This behavior was never documented one way or the other, but it is possible that some applications depend on the old behavior. - Fix display of constant expressions in ORDER BY and GROUP BY. An explictly casted constant would be shown incorrectly. This could for example lead to corruption of a view definition during dump and reload. - Fix libpq to handle NOTICE messages correctly during COPY OUT. This failure has only been observed to occur when a user-defined datatype's output routine issues a NOTICE, but there is no guarantee it couldn't happen due to other causes. stable/main/binary-mips/postgresql-client-7.4_7.4.23-0etch1_mips.deb stable/main/binary-mips/postgresql-pltcl-7.4_7.4.23-0etch1_mips.deb stable/main/binary-mips/postgresql-plperl-7.4_7.4.23-0etch1_mips.deb stable/main/binary-mips/postgresql-7.4_7.4.23-0etch1_mips.deb stable/main/binary-mips/postgresql-plpython-7.4_7.4.23-0etch1_mips.deb stable/main/binary-mips/postgresql-contrib-7.4_7.4.23-0etch1_mips.deb postgresql-7.4 (1:7.4.23-0etch1) stable; urgency=low * New upstream bug fix release 7.4.23 - Fix backend crash when the client encoding cannot represent a localized error message. - Fix incorrect tsearch2 headline generation when single query item matches first word of text. - Fix improper display of fractional seconds in interval values when using a non-ISO datestyle in an "--enable-integer-datetimes" build. - Ensure SPI_getvalue and SPI_getbinval behave correctly when the passed tuple and tuple descriptor have different numbers of columns. This situation is normal when a table has had columns added or removed, but these two functions didn't handle it properly. The only likely consequence is an incorrect error indication. - Fix ecpg's parsing of "CREATE USER". * New upstream bug fix release 7.4.22 - Fix datetime input functions to correctly detect integer overflow when running on a 64-bit platform. - Improve performance of writing very long log messages to syslog. - Fix bug in backwards scanning of a cursor on a SELECT DISTINCT ON query. - Fix planner to estimate that GROUP BY expressions yielding boolean results always result in two groups, regardless of the expressions' contents. This is very substantially more accurate than the regular GROUP BY estimate for certain boolean tests like "col" IS NULL. - Improve pg_dump and pg_restore's error reporting after failure to send a SQL command. * New upstream bug fix release 7.4.21 - Make pg_get_ruledef() parenthesize negative constants. Before this fix, a negative constant in a view or rule might be dumped as, say, -42::integer, which is subtly incorrect: it should be (-42)::integer due to operator precedence rules. Usually this would make little difference, but it could interact with another recent patch to cause PostgreSQL to reject what had been a valid "SELECT DISTINCT" view query. Since this could result in pg_dump output failing to reload, it is being treated as a high-priority fix. The only released versions in which dump output is actually incorrect are 8.3.1 and 8.2.7. * New upstream bug fix release 7.4.20 - Fix conversions between ISO-8859-5 and other encodings to handle Cyrillic "Yo" characters (e and E with two dots). - Fix a few datatype input functions that were allowing unused bytes in their results to contain uninitialized, unpredictable values. This could lead to failures in which two apparently identical literal values were not seen as equal, resulting in the parser complaining about unmatched ORDER BY and DISTINCT expressions. - Fix a corner case in regular-expression substring matching (substring(string from pattern)). The problem occurs when there is a match to the pattern overall but the user has specified a parenthesized subexpression and that subexpression hasn't got a match. An example is substring('foo' from 'foo(bar)?'). This should return NULL, since (bar) isn't matched, but it was mistakenly returning the whole-pattern match instead (ie, foo). - Fix incorrect result from ecpg's PGTYPEStimestamp_sub() function. - Fix longstanding "LISTEN"/"NOTIFY" race condition. In rare cases a session that had just executed a "LISTEN" might not get a notification, even though one would be expected because the concurrent transaction executing "NOTIFY" was observed to commit later. A side effect of the fix is that a transaction that has executed a not-yet-committed "LISTEN" command will not see any row in pg_listener for the "LISTEN", should it choose to look; formerly it would have. This behavior was never documented one way or the other, but it is possible that some applications depend on the old behavior. - Fix display of constant expressions in ORDER BY and GROUP BY. An explictly casted constant would be shown incorrectly. This could for example lead to corruption of a view definition during dump and reload. - Fix libpq to handle NOTICE messages correctly during COPY OUT. This failure has only been observed to occur when a user-defined datatype's output routine issues a NOTICE, but there is no guarantee it couldn't happen due to other causes. stable/main/binary-ia64/postgresql-client-7.4_7.4.23-0etch1_ia64.deb stable/main/binary-ia64/postgresql-plperl-7.4_7.4.23-0etch1_ia64.deb stable/main/binary-ia64/postgresql-contrib-7.4_7.4.23-0etch1_ia64.deb stable/main/binary-ia64/postgresql-plpython-7.4_7.4.23-0etch1_ia64.deb stable/main/binary-ia64/postgresql-pltcl-7.4_7.4.23-0etch1_ia64.deb stable/main/binary-ia64/postgresql-7.4_7.4.23-0etch1_ia64.deb postgresql-7.4 (1:7.4.23-0etch1) stable; urgency=low * New upstream bug fix release 7.4.23: - Fix backend crash when the client encoding cannot represent a localized error message. - Fix incorrect tsearch2 headline generation when single query item matches first word of text. - Fix improper display of fractional seconds in interval values when using a non-ISO datestyle in an "--enable-integer-datetimes" build. - Ensure SPI_getvalue and SPI_getbinval behave correctly when the passed tuple and tuple descriptor have different numbers of columns. This situation is normal when a table has had columns added or removed, but these two functions didn't handle it properly. The only likely consequence is an incorrect error indication. - Fix ecpg's parsing of "CREATE USER". * New upstream bug fix release 7.4.22: - Fix datetime input functions to correctly detect integer overflow when running on a 64-bit platform. - Improve performance of writing very long log messages to syslog. - Fix bug in backwards scanning of a cursor on a SELECT DISTINCT ON query. - Fix planner to estimate that GROUP BY expressions yielding boolean results always result in two groups, regardless of the expressions' contents. This is very substantially more accurate than the regular GROUP BY estimate for certain boolean tests like "col" IS NULL. - Improve pg_dump and pg_restore's error reporting after failure to send a SQL command. * New upstream bug fix release 7.4.21: - Make pg_get_ruledef() parenthesize negative constants. Before this fix, a negative constant in a view or rule might be dumped as, say, -42::integer, which is subtly incorrect: it should be (-42)::integer due to operator precedence rules. Usually this would make little difference, but it could interact with another recent patch to cause PostgreSQL to reject what had been a valid "SELECT DISTINCT" view query. Since this could result in pg_dump output failing to reload, it is being treated as a high-priority fix. The only released versions in which dump output is actually incorrect are 8.3.1 and 8.2.7. * New upstream bug fix release 7.4.20: - Fix conversions between ISO-8859-5 and other encodings to handle Cyrillic "Yo" characters (e and E with two dots). - Fix a few datatype input functions that were allowing unused bytes in their results to contain uninitialized, unpredictable values. This could lead to failures in which two apparently identical literal values were not seen as equal, resulting in the parser complaining about unmatched ORDER BY and DISTINCT expressions. - Fix a corner case in regular-expression substring matching (substring(string from pattern)). The problem occurs when there is a match to the pattern overall but the user has specified a parenthesized subexpression and that subexpression hasn't got a match. An example is substring('foo' from 'foo(bar)?'). This should return NULL, since (bar) isn't matched, but it was mistakenly returning the whole-pattern match instead (ie, foo). - Fix incorrect result from ecpg's PGTYPEStimestamp_sub() function. - Fix longstanding "LISTEN"/"NOTIFY" race condition. In rare cases a session that had just executed a "LISTEN" might not get a notification, even though one would be expected because the concurrent transaction executing "NOTIFY" was observed to commit later. A side effect of the fix is that a transaction that has executed a not-yet-committed "LISTEN" command will not see any row in pg_listener for the "LISTEN", should it choose to look; formerly it would have. This behavior was never documented one way or the other, but it is possible that some applications depend on the old behavior. - Fix display of constant expressions in ORDER BY and GROUP BY. An explictly casted constant would be shown incorrectly. This could for example lead to corruption of a view definition during dump and reload. - Fix libpq to handle NOTICE messages correctly during COPY OUT. This failure has only been observed to occur when a user-defined datatype's output routine issues a NOTICE, but there is no guarantee it couldn't happen due to other causes. stable/main/binary-hppa/postgresql-7.4_7.4.23-0etch1_hppa.deb stable/main/binary-hppa/postgresql-plperl-7.4_7.4.23-0etch1_hppa.deb stable/main/binary-hppa/postgresql-plpython-7.4_7.4.23-0etch1_hppa.deb stable/main/binary-hppa/postgresql-client-7.4_7.4.23-0etch1_hppa.deb stable/main/binary-hppa/postgresql-contrib-7.4_7.4.23-0etch1_hppa.deb stable/main/binary-hppa/postgresql-pltcl-7.4_7.4.23-0etch1_hppa.deb postgresql-7.4 (1:7.4.23-0etch1) stable; urgency=low * New upstream bug fix release 7.4.23: - Fix backend crash when the client encoding cannot represent a localized error message. - Fix incorrect tsearch2 headline generation when single query item matches first word of text. - Fix improper display of fractional seconds in interval values when using a non-ISO datestyle in an "--enable-integer-datetimes" build. - Ensure SPI_getvalue and SPI_getbinval behave correctly when the passed tuple and tuple descriptor have different numbers of columns. This situation is normal when a table has had columns added or removed, but these two functions didn't handle it properly. The only likely consequence is an incorrect error indication. - Fix ecpg's parsing of "CREATE USER". * New upstream bug fix release 7.4.22: - Fix datetime input functions to correctly detect integer overflow when running on a 64-bit platform. - Improve performance of writing very long log messages to syslog. - Fix bug in backwards scanning of a cursor on a SELECT DISTINCT ON query. - Fix planner to estimate that GROUP BY expressions yielding boolean results always result in two groups, regardless of the expressions' contents. This is very substantially more accurate than the regular GROUP BY estimate for certain boolean tests like "col" IS NULL. - Improve pg_dump and pg_restore's error reporting after failure to send a SQL command. * New upstream bug fix release 7.4.21: - Make pg_get_ruledef() parenthesize negative constants. Before this fix, a negative constant in a view or rule might be dumped as, say, -42::integer, which is subtly incorrect: it should be (-42)::integer due to operator precedence rules. Usually this would make little difference, but it could interact with another recent patch to cause PostgreSQL to reject what had been a valid "SELECT DISTINCT" view query. Since this could result in pg_dump output failing to reload, it is being treated as a high-priority fix. The only released versions in which dump output is actually incorrect are 8.3.1 and 8.2.7. * New upstream bug fix release 7.4.20: - Fix conversions between ISO-8859-5 and other encodings to handle Cyrillic "Yo" characters (e and E with two dots). - Fix a few datatype input functions that were allowing unused bytes in their results to contain uninitialized, unpredictable values. This could lead to failures in which two apparently identical literal values were not seen as equal, resulting in the parser complaining about unmatched ORDER BY and DISTINCT expressions. - Fix a corner case in regular-expression substring matching (substring(string from pattern)). The problem occurs when there is a match to the pattern overall but the user has specified a parenthesized subexpression and that subexpression hasn't got a match. An example is substring('foo' from 'foo(bar)?'). This should return NULL, since (bar) isn't matched, but it was mistakenly returning the whole-pattern match instead (ie, foo). - Fix incorrect result from ecpg's PGTYPEStimestamp_sub() function. - Fix longstanding "LISTEN"/"NOTIFY" race condition. In rare cases a session that had just executed a "LISTEN" might not get a notification, even though one would be expected because the concurrent transaction executing "NOTIFY" was observed to commit later. A side effect of the fix is that a transaction that has executed a not-yet-committed "LISTEN" command will not see any row in pg_listener for the "LISTEN", should it choose to look; formerly it would have. This behavior was never documented one way or the other, but it is possible that some applications depend on the old behavior. - Fix display of constant expressions in ORDER BY and GROUP BY. An explictly casted constant would be shown incorrectly. This could for example lead to corruption of a view definition during dump and reload. - Fix libpq to handle NOTICE messages correctly during COPY OUT. This failure has only been observed to occur when a user-defined datatype's output routine issues a NOTICE, but there is no guarantee it couldn't happen due to other causes. stable/main/binary-arm/postgresql-contrib-7.4_7.4.23-0etch1_arm.deb stable/main/binary-arm/postgresql-client-7.4_7.4.23-0etch1_arm.deb stable/main/binary-arm/postgresql-plperl-7.4_7.4.23-0etch1_arm.deb stable/main/binary-arm/postgresql-7.4_7.4.23-0etch1_arm.deb stable/main/binary-arm/postgresql-plpython-7.4_7.4.23-0etch1_arm.deb stable/main/binary-arm/postgresql-pltcl-7.4_7.4.23-0etch1_arm.deb postgresql-7.4 (1:7.4.23-0etch1) stable; urgency=low * New upstream bug fix release 7.4.23: - Fix backend crash when the client encoding cannot represent a localized error message. - Fix incorrect tsearch2 headline generation when single query item matches first word of text. - Fix improper display of fractional seconds in interval values when using a non-ISO datestyle in an "--enable-integer-datetimes" build. - Ensure SPI_getvalue and SPI_getbinval behave correctly when the passed tuple and tuple descriptor have different numbers of columns. This situation is normal when a table has had columns added or removed, but these two functions didn't handle it properly. The only likely consequence is an incorrect error indication. - Fix ecpg's parsing of "CREATE USER". * New upstream bug fix release 7.4.22: - Fix datetime input functions to correctly detect integer overflow when running on a 64-bit platform. - Improve performance of writing very long log messages to syslog. - Fix bug in backwards scanning of a cursor on a SELECT DISTINCT ON query. - Fix planner to estimate that GROUP BY expressions yielding boolean results always result in two groups, regardless of the expressions' contents. This is very substantially more accurate than the regular GROUP BY estimate for certain boolean tests like "col" IS NULL. - Improve pg_dump and pg_restore's error reporting after failure to send a SQL command. * New upstream bug fix release 7.4.21: - Make pg_get_ruledef() parenthesize negative constants. Before this fix, a negative constant in a view or rule might be dumped as, say, -42::integer, which is subtly incorrect: it should be (-42)::integer due to operator precedence rules. Usually this would make little difference, but it could interact with another recent patch to cause PostgreSQL to reject what had been a valid "SELECT DISTINCT" view query. Since this could result in pg_dump output failing to reload, it is being treated as a high-priority fix. The only released versions in which dump output is actually incorrect are 8.3.1 and 8.2.7. * New upstream bug fix release 7.4.20: - Fix conversions between ISO-8859-5 and other encodings to handle Cyrillic "Yo" characters (e and E with two dots). - Fix a few datatype input functions that were allowing unused bytes in their results to contain uninitialized, unpredictable values. This could lead to failures in which two apparently identical literal values were not seen as equal, resulting in the parser complaining about unmatched ORDER BY and DISTINCT expressions. - Fix a corner case in regular-expression substring matching (substring(string from pattern)). The problem occurs when there is a match to the pattern overall but the user has specified a parenthesized subexpression and that subexpression hasn't got a match. An example is substring('foo' from 'foo(bar)?'). This should return NULL, since (bar) isn't matched, but it was mistakenly returning the whole-pattern match instead (ie, foo). - Fix incorrect result from ecpg's PGTYPEStimestamp_sub() function. - Fix longstanding "LISTEN"/"NOTIFY" race condition. In rare cases a session that had just executed a "LISTEN" might not get a notification, even though one would be expected because the concurrent transaction executing "NOTIFY" was observed to commit later. A side effect of the fix is that a transaction that has executed a not-yet-committed "LISTEN" command will not see any row in pg_listener for the "LISTEN", should it choose to look; formerly it would have. This behavior was never documented one way or the other, but it is possible that some applications depend on the old behavior. - Fix display of constant expressions in ORDER BY and GROUP BY. An explictly casted constant would be shown incorrectly. This could for example lead to corruption of a view definition during dump and reload. - Fix libpq to handle NOTICE messages correctly during COPY OUT. This failure has only been observed to occur when a user-defined datatype's output routine issues a NOTICE, but there is no guarantee it couldn't happen due to other causes. stable/main/binary-amd64/postgresql-pltcl-7.4_7.4.23-0etch1_amd64.deb stable/main/binary-amd64/postgresql-contrib-7.4_7.4.23-0etch1_amd64.deb stable/main/binary-amd64/postgresql-client-7.4_7.4.23-0etch1_amd64.deb stable/main/binary-amd64/postgresql-plpython-7.4_7.4.23-0etch1_amd64.deb stable/main/binary-amd64/postgresql-plperl-7.4_7.4.23-0etch1_amd64.deb stable/main/binary-amd64/postgresql-7.4_7.4.23-0etch1_amd64.deb postgresql-7.4 (1:7.4.23-0etch1) stable; urgency=low * New upstream bug fix release 7.4.23: - Fix backend crash when the client encoding cannot represent a localized error message. - Fix incorrect tsearch2 headline generation when single query item matches first word of text. - Fix improper display of fractional seconds in interval values when using a non-ISO datestyle in an "--enable-integer-datetimes" build. - Ensure SPI_getvalue and SPI_getbinval behave correctly when the passed tuple and tuple descriptor have different numbers of columns. This situation is normal when a table has had columns added or removed, but these two functions didn't handle it properly. The only likely consequence is an incorrect error indication. - Fix ecpg's parsing of "CREATE USER". * New upstream bug fix release 7.4.22: - Fix datetime input functions to correctly detect integer overflow when running on a 64-bit platform. - Improve performance of writing very long log messages to syslog. - Fix bug in backwards scanning of a cursor on a SELECT DISTINCT ON query. - Fix planner to estimate that GROUP BY expressions yielding boolean results always result in two groups, regardless of the expressions' contents. This is very substantially more accurate than the regular GROUP BY estimate for certain boolean tests like "col" IS NULL. - Improve pg_dump and pg_restore's error reporting after failure to send a SQL command. * New upstream bug fix release 7.4.21: - Make pg_get_ruledef() parenthesize negative constants. Before this fix, a negative constant in a view or rule might be dumped as, say, -42::integer, which is subtly incorrect: it should be (-42)::integer due to operator precedence rules. Usually this would make little difference, but it could interact with another recent patch to cause PostgreSQL to reject what had been a valid "SELECT DISTINCT" view query. Since this could result in pg_dump output failing to reload, it is being treated as a high-priority fix. The only released versions in which dump output is actually incorrect are 8.3.1 and 8.2.7. * New upstream bug fix release 7.4.20: - Fix conversions between ISO-8859-5 and other encodings to handle Cyrillic "Yo" characters (e and E with two dots). - Fix a few datatype input functions that were allowing unused bytes in their results to contain uninitialized, unpredictable values. This could lead to failures in which two apparently identical literal values were not seen as equal, resulting in the parser complaining about unmatched ORDER BY and DISTINCT expressions. - Fix a corner case in regular-expression substring matching (substring(string from pattern)). The problem occurs when there is a match to the pattern overall but the user has specified a parenthesized subexpression and that subexpression hasn't got a match. An example is substring('foo' from 'foo(bar)?'). This should return NULL, since (bar) isn't matched, but it was mistakenly returning the whole-pattern match instead (ie, foo). - Fix incorrect result from ecpg's PGTYPEStimestamp_sub() function. - Fix longstanding "LISTEN"/"NOTIFY" race condition. In rare cases a session that had just executed a "LISTEN" might not get a notification, even though one would be expected because the concurrent transaction executing "NOTIFY" was observed to commit later. A side effect of the fix is that a transaction that has executed a not-yet-committed "LISTEN" command will not see any row in pg_listener for the "LISTEN", should it choose to look; formerly it would have. This behavior was never documented one way or the other, but it is possible that some applications depend on the old behavior. - Fix display of constant expressions in ORDER BY and GROUP BY. An explictly casted constant would be shown incorrectly. This could for example lead to corruption of a view definition during dump and reload. - Fix libpq to handle NOTICE messages correctly during COPY OUT. This failure has only been observed to occur when a user-defined datatype's output routine issues a NOTICE, but there is no guarantee it couldn't happen due to other causes. stable/main/binary-alpha/postgresql-plperl-7.4_7.4.23-0etch1_alpha.deb stable/main/binary-alpha/postgresql-7.4_7.4.23-0etch1_alpha.deb stable/main/binary-alpha/postgresql-client-7.4_7.4.23-0etch1_alpha.deb stable/main/binary-alpha/postgresql-contrib-7.4_7.4.23-0etch1_alpha.deb stable/main/binary-alpha/postgresql-plpython-7.4_7.4.23-0etch1_alpha.deb stable/main/binary-alpha/postgresql-pltcl-7.4_7.4.23-0etch1_alpha.deb postgresql-7.4 (1:7.4.23-0etch1) stable; urgency=low * New upstream bug fix release 7.4.23: - Fix backend crash when the client encoding cannot represent a localized error message. - Fix incorrect tsearch2 headline generation when single query item matches first word of text. - Fix improper display of fractional seconds in interval values when using a non-ISO datestyle in an "--enable-integer-datetimes" build. - Ensure SPI_getvalue and SPI_getbinval behave correctly when the passed tuple and tuple descriptor have different numbers of columns. This situation is normal when a table has had columns added or removed, but these two functions didn't handle it properly. The only likely consequence is an incorrect error indication. - Fix ecpg's parsing of "CREATE USER". * New upstream bug fix release 7.4.22: - Fix datetime input functions to correctly detect integer overflow when running on a 64-bit platform. - Improve performance of writing very long log messages to syslog. - Fix bug in backwards scanning of a cursor on a SELECT DISTINCT ON query. - Fix planner to estimate that GROUP BY expressions yielding boolean results always result in two groups, regardless of the expressions' contents. This is very substantially more accurate than the regular GROUP BY estimate for certain boolean tests like "col" IS NULL. - Improve pg_dump and pg_restore's error reporting after failure to send a SQL command. * New upstream bug fix release 7.4.21: - Make pg_get_ruledef() parenthesize negative constants. Before this fix, a negative constant in a view or rule might be dumped as, say, -42::integer, which is subtly incorrect: it should be (-42)::integer due to operator precedence rules. Usually this would make little difference, but it could interact with another recent patch to cause PostgreSQL to reject what had been a valid "SELECT DISTINCT" view query. Since this could result in pg_dump output failing to reload, it is being treated as a high-priority fix. The only released versions in which dump output is actually incorrect are 8.3.1 and 8.2.7. * New upstream bug fix release 7.4.20: - Fix conversions between ISO-8859-5 and other encodings to handle Cyrillic "Yo" characters (e and E with two dots). - Fix a few datatype input functions that were allowing unused bytes in their results to contain uninitialized, unpredictable values. This could lead to failures in which two apparently identical literal values were not seen as equal, resulting in the parser complaining about unmatched ORDER BY and DISTINCT expressions. - Fix a corner case in regular-expression substring matching (substring(string from pattern)). The problem occurs when there is a match to the pattern overall but the user has specified a parenthesized subexpression and that subexpression hasn't got a match. An example is substring('foo' from 'foo(bar)?'). This should return NULL, since (bar) isn't matched, but it was mistakenly returning the whole-pattern match instead (ie, foo). - Fix incorrect result from ecpg's PGTYPEStimestamp_sub() function. - Fix longstanding "LISTEN"/"NOTIFY" race condition. In rare cases a session that had just executed a "LISTEN" might not get a notification, even though one would be expected because the concurrent transaction executing "NOTIFY" was observed to commit later. A side effect of the fix is that a transaction that has executed a not-yet-committed "LISTEN" command will not see any row in pg_listener for the "LISTEN", should it choose to look; formerly it would have. This behavior was never documented one way or the other, but it is possible that some applications depend on the old behavior. - Fix display of constant expressions in ORDER BY and GROUP BY. An explictly casted constant would be shown incorrectly. This could for example lead to corruption of a view definition during dump and reload. - Fix libpq to handle NOTICE messages correctly during COPY OUT. This failure has only been observed to occur when a user-defined datatype's output routine issues a NOTICE, but there is no guarantee it couldn't happen due to other causes. stable/main/binary-i386/postgresql-7.4_7.4.23-0etch1_i386.deb stable/main/source/postgresql-7.4_7.4.23-0etch1.diff.gz stable/main/binary-i386/postgresql-plpython-7.4_7.4.23-0etch1_i386.deb stable/main/binary-i386/postgresql-plperl-7.4_7.4.23-0etch1_i386.deb stable/main/binary-all/postgresql-doc-7.4_7.4.23-0etch1_all.deb stable/main/binary-i386/postgresql-pltcl-7.4_7.4.23-0etch1_i386.deb stable/main/source/postgresql-7.4_7.4.23-0etch1.dsc stable/main/binary-i386/postgresql-contrib-7.4_7.4.23-0etch1_i386.deb stable/main/binary-all/postgresql-server-dev-7.4_7.4.23-0etch1_all.deb stable/main/source/postgresql-7.4_7.4.23.orig.tar.gz stable/main/binary-i386/postgresql-client-7.4_7.4.23-0etch1_i386.deb postgresql-7.4 (1:7.4.23-0etch1) stable; urgency=low * New upstream bug fix release 7.4.23: - Fix backend crash when the client encoding cannot represent a localized error message. - Fix incorrect tsearch2 headline generation when single query item matches first word of text. - Fix improper display of fractional seconds in interval values when using a non-ISO datestyle in an "--enable-integer-datetimes" build. - Ensure SPI_getvalue and SPI_getbinval behave correctly when the passed tuple and tuple descriptor have different numbers of columns. This situation is normal when a table has had columns added or removed, but these two functions didn't handle it properly. The only likely consequence is an incorrect error indication. - Fix ecpg's parsing of "CREATE USER". * New upstream bug fix release 7.4.22: - Fix datetime input functions to correctly detect integer overflow when running on a 64-bit platform. - Improve performance of writing very long log messages to syslog. - Fix bug in backwards scanning of a cursor on a SELECT DISTINCT ON query. - Fix planner to estimate that GROUP BY expressions yielding boolean results always result in two groups, regardless of the expressions' contents. This is very substantially more accurate than the regular GROUP BY estimate for certain boolean tests like "col" IS NULL. - Improve pg_dump and pg_restore's error reporting after failure to send a SQL command. * New upstream bug fix release 7.4.21: - Make pg_get_ruledef() parenthesize negative constants. Before this fix, a negative constant in a view or rule might be dumped as, say, -42::integer, which is subtly incorrect: it should be (-42)::integer due to operator precedence rules. Usually this would make little difference, but it could interact with another recent patch to cause PostgreSQL to reject what had been a valid "SELECT DISTINCT" view query. Since this could result in pg_dump output failing to reload, it is being treated as a high-priority fix. The only released versions in which dump output is actually incorrect are 8.3.1 and 8.2.7. * New upstream bug fix release 7.4.20: - Fix conversions between ISO-8859-5 and other encodings to handle Cyrillic "Yo" characters (e and E with two dots). - Fix a few datatype input functions that were allowing unused bytes in their results to contain uninitialized, unpredictable values. This could lead to failures in which two apparently identical literal values were not seen as equal, resulting in the parser complaining about unmatched ORDER BY and DISTINCT expressions. - Fix a corner case in regular-expression substring matching (substring(string from pattern)). The problem occurs when there is a match to the pattern overall but the user has specified a parenthesized subexpression and that subexpression hasn't got a match. An example is substring('foo' from 'foo(bar)?'). This should return NULL, since (bar) isn't matched, but it was mistakenly returning the whole-pattern match instead (ie, foo). - Fix incorrect result from ecpg's PGTYPEStimestamp_sub() function. - Fix longstanding "LISTEN"/"NOTIFY" race condition. In rare cases a session that had just executed a "LISTEN" might not get a notification, even though one would be expected because the concurrent transaction executing "NOTIFY" was observed to commit later. A side effect of the fix is that a transaction that has executed a not-yet-committed "LISTEN" command will not see any row in pg_listener for the "LISTEN", should it choose to look; formerly it would have. This behavior was never documented one way or the other, but it is possible that some applications depend on the old behavior. - Fix display of constant expressions in ORDER BY and GROUP BY. An explictly casted constant would be shown incorrectly. This could for example lead to corruption of a view definition during dump and reload. - Fix libpq to handle NOTICE messages correctly during COPY OUT. This failure has only been observed to occur when a user-defined datatype's output routine issues a NOTICE, but there is no guarantee it couldn't happen due to other causes. stable/main/source/phpmyadmin_2.9.1.1-9.dsc stable/main/binary-all/phpmyadmin_2.9.1.1-9_all.deb stable/main/source/phpmyadmin_2.9.1.1-9.diff.gz phpmyadmin (4:2.9.1.1-9) stable-security; urgency=high * The PMA_escapeJsString function in libraries/js_escape.lib.php in phpMyAdmin before 2.11.9.2, when Internet Explorer is used, allows remote attackers to bypass cross-site scripting (XSS) protection mechanisms and conduct XSS attacks via a NUL byte inside a "= 2.6.22, including the Etch-And-A-Half one. (Closes: #502435) stable/main/binary-s390/perl-suid_5.8.8-7etch4_s390.deb stable/main/binary-s390/perl-debug_5.8.8-7etch4_s390.deb stable/main/binary-s390/perl_5.8.8-7etch4_s390.deb stable/main/binary-s390/libperl5.8_5.8.8-7etch4_s390.deb stable/main/binary-s390/libperl-dev_5.8.8-7etch4_s390.deb stable/main/binary-s390/perl-base_5.8.8-7etch4_s390.deb perl (5.8.8-7etch4) stable; urgency=low * Suppress Configure test for ualarm() so that setitimer() emulation is used. This fixes Time::HiRes breakage with kernels >= 2.6.22, including the Etch-And-A-Half one. (Closes: #502435) stable/main/binary-powerpc/perl-base_5.8.8-7etch4_powerpc.deb stable/main/binary-powerpc/libperl-dev_5.8.8-7etch4_powerpc.deb stable/main/binary-powerpc/perl-debug_5.8.8-7etch4_powerpc.deb stable/main/binary-powerpc/libperl5.8_5.8.8-7etch4_powerpc.deb stable/main/binary-powerpc/perl_5.8.8-7etch4_powerpc.deb stable/main/binary-powerpc/perl-suid_5.8.8-7etch4_powerpc.deb perl (5.8.8-7etch4) stable; urgency=low * Suppress Configure test for ualarm() so that setitimer() emulation is used. This fixes Time::HiRes breakage with kernels >= 2.6.22, including the Etch-And-A-Half one. (Closes: #502435) stable/main/binary-mipsel/libperl5.8_5.8.8-7etch4_mipsel.deb stable/main/binary-mipsel/perl_5.8.8-7etch4_mipsel.deb stable/main/binary-mipsel/perl-base_5.8.8-7etch4_mipsel.deb stable/main/binary-mipsel/perl-debug_5.8.8-7etch4_mipsel.deb stable/main/binary-mipsel/perl-suid_5.8.8-7etch4_mipsel.deb stable/main/binary-mipsel/libperl-dev_5.8.8-7etch4_mipsel.deb perl (5.8.8-7etch4) stable; urgency=low * Suppress Configure test for ualarm() so that setitimer() emulation is used. This fixes Time::HiRes breakage with kernels >= 2.6.22, including the Etch-And-A-Half one. (Closes: #502435) stable/main/binary-mips/libperl5.8_5.8.8-7etch4_mips.deb stable/main/binary-mips/perl-debug_5.8.8-7etch4_mips.deb stable/main/binary-mips/perl-suid_5.8.8-7etch4_mips.deb stable/main/binary-mips/libperl-dev_5.8.8-7etch4_mips.deb stable/main/binary-mips/perl-base_5.8.8-7etch4_mips.deb stable/main/binary-mips/perl_5.8.8-7etch4_mips.deb perl (5.8.8-7etch4) stable; urgency=low * Suppress Configure test for ualarm() so that setitimer() emulation is used. This fixes Time::HiRes breakage with kernels >= 2.6.22, including the Etch-And-A-Half one. (Closes: #502435) stable/main/binary-ia64/libperl-dev_5.8.8-7etch4_ia64.deb stable/main/binary-ia64/perl-debug_5.8.8-7etch4_ia64.deb stable/main/binary-ia64/perl-base_5.8.8-7etch4_ia64.deb stable/main/binary-ia64/libperl5.8_5.8.8-7etch4_ia64.deb stable/main/binary-ia64/perl-suid_5.8.8-7etch4_ia64.deb stable/main/binary-ia64/perl_5.8.8-7etch4_ia64.deb perl (5.8.8-7etch4) stable; urgency=low * Suppress Configure test for ualarm() so that setitimer() emulation is used. This fixes Time::HiRes breakage with kernels >= 2.6.22, including the Etch-And-A-Half one. (Closes: #502435) stable/main/binary-hppa/libperl-dev_5.8.8-7etch4_hppa.deb stable/main/binary-hppa/perl-base_5.8.8-7etch4_hppa.deb stable/main/binary-hppa/perl_5.8.8-7etch4_hppa.deb stable/main/binary-hppa/libperl5.8_5.8.8-7etch4_hppa.deb stable/main/binary-hppa/perl-suid_5.8.8-7etch4_hppa.deb stable/main/binary-hppa/perl-debug_5.8.8-7etch4_hppa.deb perl (5.8.8-7etch4) stable; urgency=low * Suppress Configure test for ualarm() so that setitimer() emulation is used. This fixes Time::HiRes breakage with kernels >= 2.6.22, including the Etch-And-A-Half one. (Closes: #502435) stable/main/binary-arm/libperl-dev_5.8.8-7etch4_arm.deb stable/main/binary-arm/perl-base_5.8.8-7etch4_arm.deb stable/main/binary-arm/perl-debug_5.8.8-7etch4_arm.deb stable/main/binary-arm/perl-suid_5.8.8-7etch4_arm.deb stable/main/binary-arm/perl_5.8.8-7etch4_arm.deb stable/main/binary-arm/libperl5.8_5.8.8-7etch4_arm.deb perl (5.8.8-7etch4) stable; urgency=low * Suppress Configure test for ualarm() so that setitimer() emulation is used. This fixes Time::HiRes breakage with kernels >= 2.6.22, including the Etch-And-A-Half one. (Closes: #502435) stable/main/binary-amd64/perl-suid_5.8.8-7etch4_amd64.deb stable/main/binary-amd64/libperl5.8_5.8.8-7etch4_amd64.deb stable/main/binary-amd64/perl_5.8.8-7etch4_amd64.deb stable/main/binary-amd64/perl-debug_5.8.8-7etch4_amd64.deb stable/main/binary-amd64/libperl-dev_5.8.8-7etch4_amd64.deb stable/main/binary-amd64/perl-base_5.8.8-7etch4_amd64.deb perl (5.8.8-7etch4) stable; urgency=low * Suppress Configure test for ualarm() so that setitimer() emulation is used. This fixes Time::HiRes breakage with kernels >= 2.6.22, including the Etch-And-A-Half one. (Closes: #502435) stable/main/binary-alpha/perl_5.8.8-7etch4_alpha.deb stable/main/binary-alpha/perl-debug_5.8.8-7etch4_alpha.deb stable/main/binary-alpha/perl-suid_5.8.8-7etch4_alpha.deb stable/main/binary-alpha/libperl-dev_5.8.8-7etch4_alpha.deb stable/main/binary-alpha/libperl5.8_5.8.8-7etch4_alpha.deb stable/main/binary-alpha/perl-base_5.8.8-7etch4_alpha.deb perl (5.8.8-7etch4) stable; urgency=low * Suppress Configure test for ualarm() so that setitimer() emulation is used. This fixes Time::HiRes breakage with kernels >= 2.6.22, including the Etch-And-A-Half one. (Closes: #502435) stable/main/binary-i386/perl-suid_5.8.8-7etch4_i386.deb stable/main/binary-all/libcgi-fast-perl_5.8.8-7etch4_all.deb stable/main/binary-all/perl-doc_5.8.8-7etch4_all.deb stable/main/binary-i386/perl-base_5.8.8-7etch4_i386.deb stable/main/source/perl_5.8.8-7etch4.diff.gz stable/main/binary-all/perl-modules_5.8.8-7etch4_all.deb stable/main/source/perl_5.8.8-7etch4.dsc stable/main/binary-i386/perl_5.8.8-7etch4_i386.deb stable/main/binary-i386/libperl5.8_5.8.8-7etch4_i386.deb stable/main/binary-i386/perl-debug_5.8.8-7etch4_i386.deb stable/main/binary-i386/libperl-dev_5.8.8-7etch4_i386.deb perl (5.8.8-7etch4) stable; urgency=low * Suppress Configure test for ualarm() so that setitimer() emulation is used. This fixes Time::HiRes breakage with kernels >= 2.6.22, including the Etch-And-A-Half one. (Closes: #502435) stable/main/binary-sparc/openoffice.org-impress_2.0.4.dfsg.2-7etch6_sparc.deb stable/main/binary-sparc/openoffice.org-gnome_2.0.4.dfsg.2-7etch6_sparc.deb stable/main/binary-sparc/openoffice.org-gtk-gnome_2.0.4.dfsg.2-7etch6_sparc.deb stable/main/binary-sparc/openoffice.org-calc_2.0.4.dfsg.2-7etch6_sparc.deb stable/main/binary-sparc/openoffice.org-qa-tools_2.0.4.dfsg.2-7etch6_sparc.deb stable/main/binary-sparc/openoffice.org-gtk_2.0.4.dfsg.2-7etch6_sparc.deb stable/main/binary-sparc/openoffice.org-core_2.0.4.dfsg.2-7etch6_sparc.deb stable/main/binary-sparc/libmythes-dev_2.0.4.dfsg.2-7etch6_sparc.deb stable/main/binary-sparc/openoffice.org-base_2.0.4.dfsg.2-7etch6_sparc.deb stable/main/binary-sparc/openoffice.org-dev_2.0.4.dfsg.2-7etch6_sparc.deb stable/main/binary-sparc/openoffice.org-evolution_2.0.4.dfsg.2-7etch6_sparc.deb stable/main/binary-sparc/openoffice.org-draw_2.0.4.dfsg.2-7etch6_sparc.deb stable/main/binary-sparc/openoffice.org-writer_2.0.4.dfsg.2-7etch6_sparc.deb stable/main/binary-sparc/openoffice.org-gcj_2.0.4.dfsg.2-7etch6_sparc.deb stable/main/binary-sparc/openoffice.org-kde_2.0.4.dfsg.2-7etch6_sparc.deb stable/main/binary-sparc/openoffice.org_2.0.4.dfsg.2-7etch6_sparc.deb stable/main/binary-sparc/openoffice.org-math_2.0.4.dfsg.2-7etch6_sparc.deb stable/main/binary-sparc/openoffice.org-officebean_2.0.4.dfsg.2-7etch6_sparc.deb stable/main/binary-sparc/openoffice.org-dbg_2.0.4.dfsg.2-7etch6_sparc.deb stable/main/binary-sparc/python-uno_2.0.4.dfsg.2-7etch6_sparc.deb stable/main/binary-sparc/openoffice.org-filter-so52_2.0.4.dfsg.2-7etch6_sparc.deb openoffice.org (2.0.4.dfsg.2-7etch6) stable-security; urgency=high * patches/src680/workspace.sjfixes07.diff: fix CVE-2008-2237 (WMF META_ESCAPE Integer Overflow Vulnerability) * patches/src680/workspace.sjfixes09.diff: fix CVE-2008-2238 (multiple EMF parser flaws) stable/main/binary-s390/libmythes-dev_2.0.4.dfsg.2-7etch6_s390.deb openoffice.org (2.0.4.dfsg.2-7etch6) stable-security; urgency=high * patches/src680/workspace.sjfixes07.diff: fix CVE-2008-2237 (WMF META_ESCAPE Integer Overflow Vulnerability) * patches/src680/workspace.sjfixes09.diff: fix CVE-2008-2238 (multiple EMF parser flaws) stable/main/binary-powerpc/openoffice.org-kde_2.0.4.dfsg.2-7etch6_powerpc.deb stable/main/binary-powerpc/openoffice.org-dev_2.0.4.dfsg.2-7etch6_powerpc.deb stable/main/binary-powerpc/openoffice.org-qa-tools_2.0.4.dfsg.2-7etch6_powerpc.deb stable/main/binary-powerpc/openoffice.org-base_2.0.4.dfsg.2-7etch6_powerpc.deb stable/main/binary-powerpc/openoffice.org-writer_2.0.4.dfsg.2-7etch6_powerpc.deb stable/main/binary-powerpc/openoffice.org-gnome_2.0.4.dfsg.2-7etch6_powerpc.deb stable/main/binary-powerpc/openoffice.org-impress_2.0.4.dfsg.2-7etch6_powerpc.deb stable/main/binary-powerpc/openoffice.org-evolution_2.0.4.dfsg.2-7etch6_powerpc.deb stable/main/binary-powerpc/openoffice.org-calc_2.0.4.dfsg.2-7etch6_powerpc.deb stable/main/binary-powerpc/openoffice.org-dbg_2.0.4.dfsg.2-7etch6_powerpc.deb stable/main/binary-powerpc/openoffice.org-filter-so52_2.0.4.dfsg.2-7etch6_powerpc.deb stable/main/binary-powerpc/openoffice.org-draw_2.0.4.dfsg.2-7etch6_powerpc.deb stable/main/binary-powerpc/openoffice.org-math_2.0.4.dfsg.2-7etch6_powerpc.deb stable/main/binary-powerpc/libmythes-dev_2.0.4.dfsg.2-7etch6_powerpc.deb stable/main/binary-powerpc/openoffice.org-core_2.0.4.dfsg.2-7etch6_powerpc.deb stable/main/binary-powerpc/openoffice.org_2.0.4.dfsg.2-7etch6_powerpc.deb stable/main/binary-powerpc/python-uno_2.0.4.dfsg.2-7etch6_powerpc.deb stable/main/binary-powerpc/openoffice.org-officebean_2.0.4.dfsg.2-7etch6_powerpc.deb stable/main/binary-powerpc/openoffice.org-gtk_2.0.4.dfsg.2-7etch6_powerpc.deb stable/main/binary-powerpc/openoffice.org-gtk-gnome_2.0.4.dfsg.2-7etch6_powerpc.deb stable/main/binary-powerpc/openoffice.org-gcj_2.0.4.dfsg.2-7etch6_powerpc.deb openoffice.org (2.0.4.dfsg.2-7etch6) stable-security; urgency=high * patches/src680/workspace.sjfixes07.diff: fix CVE-2008-2237 (WMF META_ESCAPE Integer Overflow Vulnerability) * patches/src680/workspace.sjfixes09.diff: fix CVE-2008-2238 (multiple EMF parser flaws) stable/main/binary-mipsel/libmythes-dev_2.0.4.dfsg.2-7etch6_mipsel.deb openoffice.org (2.0.4.dfsg.2-7etch6) stable-security; urgency=high * patches/src680/workspace.sjfixes07.diff: fix CVE-2008-2237 (WMF META_ESCAPE Integer Overflow Vulnerability) * patches/src680/workspace.sjfixes09.diff: fix CVE-2008-2238 (multiple EMF parser flaws) stable/main/binary-mips/libmythes-dev_2.0.4.dfsg.2-7etch6_mips.deb openoffice.org (2.0.4.dfsg.2-7etch6) stable-security; urgency=high * patches/src680/workspace.sjfixes07.diff: fix CVE-2008-2237 (WMF META_ESCAPE Integer Overflow Vulnerability) * patches/src680/workspace.sjfixes09.diff: fix CVE-2008-2238 (multiple EMF parser flaws) stable/main/binary-ia64/libmythes-dev_2.0.4.dfsg.2-7etch6_ia64.deb openoffice.org (2.0.4.dfsg.2-7etch6) stable-security; urgency=high * patches/src680/workspace.sjfixes07.diff: fix CVE-2008-2237 (WMF META_ESCAPE Integer Overflow Vulnerability) * patches/src680/workspace.sjfixes09.diff: fix CVE-2008-2238 (multiple EMF parser flaws) stable/main/binary-i386/openoffice.org-math_2.0.4.dfsg.2-7etch6_i386.deb stable/main/binary-i386/openoffice.org_2.0.4.dfsg.2-7etch6_i386.deb stable/main/binary-i386/openoffice.org-writer_2.0.4.dfsg.2-7etch6_i386.deb stable/main/binary-i386/openoffice.org-impress_2.0.4.dfsg.2-7etch6_i386.deb stable/main/binary-i386/openoffice.org-filter-so52_2.0.4.dfsg.2-7etch6_i386.deb stable/main/binary-i386/openoffice.org-evolution_2.0.4.dfsg.2-7etch6_i386.deb stable/main/binary-i386/openoffice.org-base_2.0.4.dfsg.2-7etch6_i386.deb stable/main/binary-i386/openoffice.org-dbg_2.0.4.dfsg.2-7etch6_i386.deb stable/main/binary-i386/openoffice.org-gcj_2.0.4.dfsg.2-7etch6_i386.deb stable/main/binary-i386/libmythes-dev_2.0.4.dfsg.2-7etch6_i386.deb stable/main/binary-i386/openoffice.org-gtk-gnome_2.0.4.dfsg.2-7etch6_i386.deb stable/main/binary-i386/openoffice.org-core_2.0.4.dfsg.2-7etch6_i386.deb stable/main/binary-i386/openoffice.org-calc_2.0.4.dfsg.2-7etch6_i386.deb stable/main/binary-i386/openoffice.org-draw_2.0.4.dfsg.2-7etch6_i386.deb stable/main/binary-i386/python-uno_2.0.4.dfsg.2-7etch6_i386.deb stable/main/binary-i386/openoffice.org-officebean_2.0.4.dfsg.2-7etch6_i386.deb stable/main/binary-i386/openoffice.org-gtk_2.0.4.dfsg.2-7etch6_i386.deb stable/main/binary-i386/openoffice.org-dev_2.0.4.dfsg.2-7etch6_i386.deb stable/main/binary-i386/openoffice.org-gnome_2.0.4.dfsg.2-7etch6_i386.deb stable/main/binary-i386/openoffice.org-qa-tools_2.0.4.dfsg.2-7etch6_i386.deb stable/main/binary-i386/openoffice.org-kde_2.0.4.dfsg.2-7etch6_i386.deb openoffice.org (2.0.4.dfsg.2-7etch6) stable-security; urgency=high * patches/src680/workspace.sjfixes07.diff: fix CVE-2008-2237 (WMF META_ESCAPE Integer Overflow Vulnerability) * patches/src680/workspace.sjfixes09.diff: fix CVE-2008-2238 (multiple EMF parser flaws) stable/main/binary-hppa/libmythes-dev_2.0.4.dfsg.2-7etch6_hppa.deb openoffice.org (2.0.4.dfsg.2-7etch6) stable-security; urgency=high * patches/src680/workspace.sjfixes07.diff: fix CVE-2008-2237 (WMF META_ESCAPE Integer Overflow Vulnerability) * patches/src680/workspace.sjfixes09.diff: fix CVE-2008-2238 (multiple EMF parser flaws) stable/main/binary-arm/libmythes-dev_2.0.4.dfsg.2-7etch6_arm.deb openoffice.org (2.0.4.dfsg.2-7etch6) stable-security; urgency=high * patches/src680/workspace.sjfixes07.diff: fix CVE-2008-2237 (WMF META_ESCAPE Integer Overflow Vulnerability) * patches/src680/workspace.sjfixes09.diff: fix CVE-2008-2238 (multiple EMF parser flaws) stable/main/binary-alpha/libmythes-dev_2.0.4.dfsg.2-7etch6_alpha.deb openoffice.org (2.0.4.dfsg.2-7etch6) stable-security; urgency=high * patches/src680/workspace.sjfixes07.diff: fix CVE-2008-2237 (WMF META_ESCAPE Integer Overflow Vulnerability) * patches/src680/workspace.sjfixes09.diff: fix CVE-2008-2238 (multiple EMF parser flaws) stable/main/binary-all/openoffice.org-l10n-bs_2.0.4.dfsg.2-7etch6_all.deb stable/main/binary-all/openoffice.org-l10n-lt_2.0.4.dfsg.2-7etch6_all.deb stable/main/binary-all/openoffice.org-help-km_2.0.4.dfsg.2-7etch6_all.deb stable/main/binary-all/openoffice.org-help-en-gb_2.0.4.dfsg.2-7etch6_all.deb stable/main/binary-all/openoffice.org-l10n-fi_2.0.4.dfsg.2-7etch6_all.deb stable/main/binary-all/openoffice.org-l10n-hi-in_2.0.4.dfsg.2-7etch6_all.deb stable/main/binary-all/openoffice.org-l10n-dz_2.0.4.dfsg.2-7etch6_all.deb stable/main/binary-amd64/libmythes-dev_2.0.4.dfsg.2-7etch6_amd64.deb stable/main/binary-all/openoffice.org-help-en-us_2.0.4.dfsg.2-7etch6_all.deb stable/main/binary-amd64/openoffice.org-base_2.0.4.dfsg.2-7etch6_amd64.deb stable/main/binary-all/broffice.org_2.0.4.dfsg.2-7etch6_all.deb stable/main/binary-all/openoffice.org-help-dz_2.0.4.dfsg.2-7etch6_all.deb stable/main/binary-all/openoffice.org-l10n-ru_2.0.4.dfsg.2-7etch6_all.deb stable/main/binary-amd64/python-uno_2.0.4.dfsg.2-7etch6_amd64.deb stable/main/binary-all/openoffice.org-l10n-ve_2.0.4.dfsg.2-7etch6_all.deb stable/main/binary-all/openoffice.org-l10n-ss_2.0.4.dfsg.2-7etch6_all.deb stable/main/binary-all/openoffice.org-l10n-st_2.0.4.dfsg.2-7etch6_all.deb stable/main/binary-all/openoffice.org-help-cs_2.0.4.dfsg.2-7etch6_all.deb stable/main/binary-all/openoffice.org-l10n-eo_2.0.4.dfsg.2-7etch6_all.deb stable/main/binary-all/openoffice.org-dtd-officedocument1.0_2.0.4.dfsg.2-7etch6_all.deb stable/main/binary-all/openoffice.org-help-ru_2.0.4.dfsg.2-7etch6_all.deb stable/main/binary-all/openoffice.org-help-pt-br_2.0.4.dfsg.2-7etch6_all.deb stable/main/binary-amd64/openoffice.org-officebean_2.0.4.dfsg.2-7etch6_amd64.deb stable/main/binary-all/openoffice.org-l10n-pa-in_2.0.4.dfsg.2-7etch6_all.deb stable/main/source/openoffice.org_2.0.4.dfsg.2-7etch6.diff.gz stable/main/binary-all/openoffice.org-filter-mobiledev_2.0.4.dfsg.2-7etch6_all.deb stable/main/binary-all/openoffice.org-l10n-zu_2.0.4.dfsg.2-7etch6_all.deb stable/main/binary-all/openoffice.org-l10n-ja_2.0.4.dfsg.2-7etch6_all.deb stable/main/binary-all/openoffice.org-l10n-ko_2.0.4.dfsg.2-7etch6_all.deb stable/main/binary-all/openoffice.org-l10n-th_2.0.4.dfsg.2-7etch6_all.deb stable/main/binary-all/openoffice.org-help-ko_2.0.4.dfsg.2-7etch6_all.deb stable/main/binary-all/openoffice.org-l10n-hi_2.0.4.dfsg.2-7etch6_all.deb stable/main/binary-amd64/openoffice.org-core_2.0.4.dfsg.2-7etch6_amd64.deb stable/main/binary-all/openoffice.org-l10n-km_2.0.4.dfsg.2-7etch6_all.deb stable/main/binary-all/openoffice.org-help-fr_2.0.4.dfsg.2-7etch6_all.deb stable/main/binary-all/openoffice.org-l10n-fr_2.0.4.dfsg.2-7etch6_all.deb stable/main/binary-all/openoffice.org-help-zh-tw_2.0.4.dfsg.2-7etch6_all.deb stable/main/binary-all/openoffice.org-help-pl_2.0.4.dfsg.2-7etch6_all.deb stable/main/binary-all/openoffice.org-l10n-ca_2.0.4.dfsg.2-7etch6_all.deb stable/main/binary-amd64/openoffice.org-writer_2.0.4.dfsg.2-7etch6_amd64.deb stable/main/binary-all/openoffice.org-l10n-cy_2.0.4.dfsg.2-7etch6_all.deb stable/main/binary-all/openoffice.org-l10n-et_2.0.4.dfsg.2-7etch6_all.deb stable/main/binary-all/openoffice.org-l10n-ku_2.0.4.dfsg.2-7etch6_all.deb stable/main/binary-all/openoffice.org-help-da_2.0.4.dfsg.2-7etch6_all.deb stable/main/binary-all/openoffice.org-l10n-or-in_2.0.4.dfsg.2-7etch6_all.deb stable/main/binary-all/openoffice.org-help-zh-cn_2.0.4.dfsg.2-7etch6_all.deb stable/main/binary-all/openoffice.org-l10n-tn_2.0.4.dfsg.2-7etch6_all.deb stable/main/binary-amd64/openoffice.org-gcj_2.0.4.dfsg.2-7etch6_amd64.deb stable/main/binary-amd64/openoffice.org-gtk_2.0.4.dfsg.2-7etch6_amd64.deb stable/main/binary-amd64/openoffice.org-dbg_2.0.4.dfsg.2-7etch6_amd64.deb stable/main/binary-all/openoffice.org-l10n-en-za_2.0.4.dfsg.2-7etch6_all.deb stable/main/binary-all/openoffice.org-l10n-cs_2.0.4.dfsg.2-7etch6_all.deb stable/main/binary-all/openoffice.org-help-hi-in_2.0.4.dfsg.2-7etch6_all.deb stable/main/binary-all/openoffice.org-common_2.0.4.dfsg.2-7etch6_all.deb stable/main/binary-all/openoffice.org-l10n-af_2.0.4.dfsg.2-7etch6_all.deb stable/main/binary-all/openoffice.org-l10n-te-in_2.0.4.dfsg.2-7etch6_all.deb stable/main/binary-all/openoffice.org-l10n-da_2.0.4.dfsg.2-7etch6_all.deb stable/main/binary-amd64/openoffice.org-filter-so52_2.0.4.dfsg.2-7etch6_amd64.deb stable/main/binary-all/openoffice.org-l10n-hu_2.0.4.dfsg.2-7etch6_all.deb stable/main/binary-all/openoffice.org-l10n-lv_2.0.4.dfsg.2-7etch6_all.deb stable/main/binary-amd64/openoffice.org-dev_2.0.4.dfsg.2-7etch6_amd64.deb stable/main/binary-all/openoffice.org-l10n-de_2.0.4.dfsg.2-7etch6_all.deb stable/main/binary-all/openoffice.org-l10n-pt-br_2.0.4.dfsg.2-7etch6_all.deb stable/main/binary-all/openoffice.org-l10n-gu-in_2.0.4.dfsg.2-7etch6_all.deb stable/main/binary-all/openoffice.org-help-it_2.0.4.dfsg.2-7etch6_all.deb stable/main/binary-amd64/openoffice.org-gtk-gnome_2.0.4.dfsg.2-7etch6_amd64.deb stable/main/binary-all/openoffice.org-l10n-sv_2.0.4.dfsg.2-7etch6_all.deb stable/main/binary-all/openoffice.org-dev-doc_2.0.4.dfsg.2-7etch6_all.deb stable/main/binary-all/openoffice.org-l10n-sr-cs_2.0.4.dfsg.2-7etch6_all.deb stable/main/binary-all/openoffice.org-l10n-tg_2.0.4.dfsg.2-7etch6_all.deb stable/main/binary-all/ttf-opensymbol_2.0.4.dfsg.2-7etch6_all.deb stable/main/binary-all/openoffice.org-l10n-fa_2.0.4.dfsg.2-7etch6_all.deb stable/main/binary-all/openoffice.org-l10n-nr_2.0.4.dfsg.2-7etch6_all.deb stable/main/binary-all/openoffice.org-l10n-tr_2.0.4.dfsg.2-7etch6_all.deb stable/main/binary-all/openoffice.org-l10n-rw_2.0.4.dfsg.2-7etch6_all.deb stable/main/binary-all/openoffice.org-l10n-ka_2.0.4.dfsg.2-7etch6_all.deb stable/main/binary-all/openoffice.org-l10n-in_2.0.4.dfsg.2-7etch6_all.deb stable/main/binary-all/openoffice.org-l10n-nb_2.0.4.dfsg.2-7etch6_all.deb stable/main/binary-all/openoffice.org-l10n-el_2.0.4.dfsg.2-7etch6_all.deb stable/main/binary-all/openoffice.org-help-sl_2.0.4.dfsg.2-7etch6_all.deb stable/main/binary-all/openoffice.org-help-ja_2.0.4.dfsg.2-7etch6_all.deb stable/main/binary-all/openoffice.org-l10n-it_2.0.4.dfsg.2-7etch6_all.deb stable/main/binary-all/openoffice.org-l10n-sk_2.0.4.dfsg.2-7etch6_all.deb stable/main/source/openoffice.org_2.0.4.dfsg.2-7etch6.dsc stable/main/binary-all/openoffice.org-l10n-ns_2.0.4.dfsg.2-7etch6_all.deb stable/main/binary-amd64/openoffice.org-qa-tools_2.0.4.dfsg.2-7etch6_amd64.deb stable/main/binary-amd64/openoffice.org-calc_2.0.4.dfsg.2-7etch6_amd64.deb stable/main/binary-all/openoffice.org-l10n-lo_2.0.4.dfsg.2-7etch6_all.deb stable/main/binary-all/openoffice.org-l10n-nn_2.0.4.dfsg.2-7etch6_all.deb stable/main/binary-all/openoffice.org-help-de_2.0.4.dfsg.2-7etch6_all.deb stable/main/binary-all/openoffice.org-qa-api-tests_2.0.4.dfsg.2-7etch6_all.deb stable/main/binary-all/openoffice.org-l10n-pl_2.0.4.dfsg.2-7etch6_all.deb stable/main/binary-all/openoffice.org-l10n-ts_2.0.4.dfsg.2-7etch6_all.deb stable/main/binary-all/openoffice.org-help-es_2.0.4.dfsg.2-7etch6_all.deb stable/main/binary-all/openoffice.org-l10n-nl_2.0.4.dfsg.2-7etch6_all.deb stable/main/binary-all/openoffice.org-l10n-pt_2.0.4.dfsg.2-7etch6_all.deb stable/main/binary-all/openoffice.org-help-en_2.0.4.dfsg.2-7etch6_all.deb stable/main/binary-all/openoffice.org-java-common_2.0.4.dfsg.2-7etch6_all.deb stable/main/binary-amd64/openoffice.org-kde_2.0.4.dfsg.2-7etch6_amd64.deb stable/main/binary-all/openoffice.org-l10n-bg_2.0.4.dfsg.2-7etch6_all.deb stable/main/binary-all/openoffice.org-l10n-ga_2.0.4.dfsg.2-7etch6_all.deb stable/main/binary-all/openoffice.org-l10n-es_2.0.4.dfsg.2-7etch6_all.deb stable/main/binary-all/openoffice.org-l10n-ml-in_2.0.4.dfsg.2-7etch6_all.deb stable/main/binary-all/openoffice.org-help-sv_2.0.4.dfsg.2-7etch6_all.deb stable/main/binary-all/openoffice.org-l10n-as-in_2.0.4.dfsg.2-7etch6_all.deb stable/main/binary-all/openoffice.org-l10n-zh-cn_2.0.4.dfsg.2-7etch6_all.deb stable/main/binary-all/openoffice.org-help-hu_2.0.4.dfsg.2-7etch6_all.deb stable/main/binary-amd64/openoffice.org-math_2.0.4.dfsg.2-7etch6_amd64.deb stable/main/binary-amd64/openoffice.org-draw_2.0.4.dfsg.2-7etch6_amd64.deb stable/main/binary-amd64/openoffice.org-impress_2.0.4.dfsg.2-7etch6_amd64.deb stable/main/binary-all/openoffice.org-l10n-xh_2.0.4.dfsg.2-7etch6_all.deb stable/main/binary-all/openoffice.org-l10n-sl_2.0.4.dfsg.2-7etch6_all.deb stable/main/binary-all/openoffice.org-l10n-hr_2.0.4.dfsg.2-7etch6_all.deb stable/main/binary-all/openoffice.org-l10n-uk_2.0.4.dfsg.2-7etch6_all.deb stable/main/binary-all/openoffice.org-l10n-en-gb_2.0.4.dfsg.2-7etch6_all.deb stable/main/binary-all/openoffice.org-l10n-ta-in_2.0.4.dfsg.2-7etch6_all.deb stable/main/binary-all/openoffice.org-help-et_2.0.4.dfsg.2-7etch6_all.deb stable/main/binary-amd64/openoffice.org-gnome_2.0.4.dfsg.2-7etch6_amd64.deb stable/main/binary-amd64/openoffice.org-evolution_2.0.4.dfsg.2-7etch6_amd64.deb stable/main/binary-all/openoffice.org-l10n-bn_2.0.4.dfsg.2-7etch6_all.deb stable/main/binary-all/openoffice.org-l10n-ne_2.0.4.dfsg.2-7etch6_all.deb stable/main/binary-all/openoffice.org-l10n-be-by_2.0.4.dfsg.2-7etch6_all.deb stable/main/binary-all/openoffice.org-l10n-he_2.0.4.dfsg.2-7etch6_all.deb stable/main/binary-all/openoffice.org-l10n-br_2.0.4.dfsg.2-7etch6_all.deb stable/main/binary-all/openoffice.org-l10n-vi_2.0.4.dfsg.2-7etch6_all.deb stable/main/binary-all/openoffice.org-l10n-zh-tw_2.0.4.dfsg.2-7etch6_all.deb stable/main/binary-all/openoffice.org-l10n-mk_2.0.4.dfsg.2-7etch6_all.deb stable/main/binary-amd64/openoffice.org_2.0.4.dfsg.2-7etch6_amd64.deb stable/main/binary-all/openoffice.org-help-nl_2.0.4.dfsg.2-7etch6_all.deb stable/main/binary-all/openoffice.org-l10n-za_2.0.4.dfsg.2-7etch6_all.deb openoffice.org (2.0.4.dfsg.2-7etch6) stable-security; urgency=high * patches/src680/workspace.sjfixes07.diff: fix CVE-2008-2237 (WMF META_ESCAPE Integer Overflow Vulnerability) * patches/src680/workspace.sjfixes09.diff: fix CVE-2008-2238 (multiple EMF parser flaws) stable/main/binary-sparc/snmpd_5.2.3-7etch4_sparc.deb stable/main/binary-sparc/snmp_5.2.3-7etch4_sparc.deb stable/main/binary-sparc/libsnmp-perl_5.2.3-7etch4_sparc.deb stable/main/binary-sparc/libsnmp9_5.2.3-7etch4_sparc.deb stable/main/binary-sparc/libsnmp9-dev_5.2.3-7etch4_sparc.deb net-snmp (5.2.3-7etch4) stable-security; urgency=high * Non-maintainer upload by the security team * Fix DoS in getbulk code via vectors related to the number of responses or repeats (Closes: #504150) Fixes: CVE-2008-4309 stable/main/binary-s390/snmpd_5.2.3-7etch4_s390.deb stable/main/binary-s390/snmp_5.2.3-7etch4_s390.deb stable/main/binary-s390/libsnmp9-dev_5.2.3-7etch4_s390.deb stable/main/binary-s390/libsnmp-perl_5.2.3-7etch4_s390.deb stable/main/binary-s390/libsnmp9_5.2.3-7etch4_s390.deb net-snmp (5.2.3-7etch4) stable-security; urgency=high * Non-maintainer upload by the security team * Fix DoS in getbulk code via vectors related to the number of responses or repeats (Closes: #504150) Fixes: CVE-2008-4309 stable/main/binary-powerpc/libsnmp9_5.2.3-7etch4_powerpc.deb stable/main/binary-powerpc/snmpd_5.2.3-7etch4_powerpc.deb stable/main/binary-powerpc/snmp_5.2.3-7etch4_powerpc.deb stable/main/binary-powerpc/libsnmp9-dev_5.2.3-7etch4_powerpc.deb stable/main/binary-powerpc/libsnmp-perl_5.2.3-7etch4_powerpc.deb net-snmp (5.2.3-7etch4) stable-security; urgency=high * Non-maintainer upload by the security team * Fix DoS in getbulk code via vectors related to the number of responses or repeats (Closes: #504150) Fixes: CVE-2008-4309 stable/main/binary-mipsel/snmpd_5.2.3-7etch4_mipsel.deb stable/main/binary-mipsel/snmp_5.2.3-7etch4_mipsel.deb stable/main/binary-mipsel/libsnmp9_5.2.3-7etch4_mipsel.deb stable/main/binary-mipsel/libsnmp-perl_5.2.3-7etch4_mipsel.deb stable/main/binary-mipsel/libsnmp9-dev_5.2.3-7etch4_mipsel.deb net-snmp (5.2.3-7etch4) stable-security; urgency=high * Non-maintainer upload by the security team * Fix DoS in getbulk code via vectors related to the number of responses or repeats (Closes: #504150) Fixes: CVE-2008-4309 stable/main/binary-mips/snmpd_5.2.3-7etch4_mips.deb stable/main/binary-mips/libsnmp9_5.2.3-7etch4_mips.deb stable/main/binary-mips/snmp_5.2.3-7etch4_mips.deb stable/main/binary-mips/libsnmp9-dev_5.2.3-7etch4_mips.deb stable/main/binary-mips/libsnmp-perl_5.2.3-7etch4_mips.deb net-snmp (5.2.3-7etch4) stable-security; urgency=high * Non-maintainer upload by the security team * Fix DoS in getbulk code via vectors related to the number of responses or repeats (Closes: #504150) Fixes: CVE-2008-4309 stable/main/binary-ia64/snmpd_5.2.3-7etch4_ia64.deb stable/main/binary-ia64/libsnmp-perl_5.2.3-7etch4_ia64.deb stable/main/binary-ia64/libsnmp9_5.2.3-7etch4_ia64.deb stable/main/binary-ia64/snmp_5.2.3-7etch4_ia64.deb stable/main/binary-ia64/libsnmp9-dev_5.2.3-7etch4_ia64.deb net-snmp (5.2.3-7etch4) stable-security; urgency=high * Non-maintainer upload by the security team * Fix DoS in getbulk code via vectors related to the number of responses or repeats (Closes: #504150) Fixes: CVE-2008-4309 stable/main/binary-hppa/snmp_5.2.3-7etch4_hppa.deb stable/main/binary-hppa/libsnmp9-dev_5.2.3-7etch4_hppa.deb stable/main/binary-hppa/libsnmp9_5.2.3-7etch4_hppa.deb stable/main/binary-hppa/snmpd_5.2.3-7etch4_hppa.deb stable/main/binary-hppa/libsnmp-perl_5.2.3-7etch4_hppa.deb net-snmp (5.2.3-7etch4) stable-security; urgency=high * Non-maintainer upload by the security team * Fix DoS in getbulk code via vectors related to the number of responses or repeats (Closes: #504150) Fixes: CVE-2008-4309 stable/main/binary-arm/snmp_5.2.3-7etch4_arm.deb stable/main/binary-arm/libsnmp9-dev_5.2.3-7etch4_arm.deb stable/main/binary-arm/snmpd_5.2.3-7etch4_arm.deb stable/main/binary-arm/libsnmp9_5.2.3-7etch4_arm.deb stable/main/binary-arm/libsnmp-perl_5.2.3-7etch4_arm.deb net-snmp (5.2.3-7etch4) stable-security; urgency=high * Non-maintainer upload by the security team * Fix DoS in getbulk code via vectors related to the number of responses or repeats (Closes: #504150) Fixes: CVE-2008-4309 stable/main/binary-amd64/snmp_5.2.3-7etch4_amd64.deb stable/main/binary-amd64/libsnmp9-dev_5.2.3-7etch4_amd64.deb stable/main/binary-amd64/libsnmp9_5.2.3-7etch4_amd64.deb stable/main/binary-amd64/snmpd_5.2.3-7etch4_amd64.deb stable/main/binary-amd64/libsnmp-perl_5.2.3-7etch4_amd64.deb net-snmp (5.2.3-7etch4) stable-security; urgency=high * Non-maintainer upload by the security team * Fix DoS in getbulk code via vectors related to the number of responses or repeats (Closes: #504150) Fixes: CVE-2008-4309 stable/main/binary-alpha/snmp_5.2.3-7etch4_alpha.deb stable/main/binary-alpha/libsnmp9_5.2.3-7etch4_alpha.deb stable/main/binary-alpha/snmpd_5.2.3-7etch4_alpha.deb stable/main/binary-alpha/libsnmp9-dev_5.2.3-7etch4_alpha.deb stable/main/binary-alpha/libsnmp-perl_5.2.3-7etch4_alpha.deb net-snmp (5.2.3-7etch4) stable-security; urgency=high * Non-maintainer upload by the security team * Fix DoS in getbulk code via vectors related to the number of responses or repeats (Closes: #504150) Fixes: CVE-2008-4309 stable/main/binary-i386/snmpd_5.2.3-7etch4_i386.deb stable/main/binary-i386/libsnmp-perl_5.2.3-7etch4_i386.deb stable/main/source/net-snmp_5.2.3-7etch4.dsc stable/main/binary-all/tkmib_5.2.3-7etch4_all.deb stable/main/source/net-snmp_5.2.3-7etch4.diff.gz stable/main/binary-i386/snmp_5.2.3-7etch4_i386.deb stable/main/binary-i386/libsnmp9_5.2.3-7etch4_i386.deb stable/main/binary-all/libsnmp-base_5.2.3-7etch4_all.deb stable/main/binary-i386/libsnmp9-dev_5.2.3-7etch4_i386.deb net-snmp (5.2.3-7etch4) stable-security; urgency=high * Non-maintainer upload by the security team * Fix DoS in getbulk code via vectors related to the number of responses or repeats (Closes: #504150) Fixes: CVE-2008-4309 stable/main/binary-sparc/mysql-client-5.0_5.0.32-7etch8_sparc.deb stable/main/binary-sparc/libmysqlclient15off_5.0.32-7etch8_sparc.deb stable/main/binary-sparc/libmysqlclient15-dev_5.0.32-7etch8_sparc.deb stable/main/binary-sparc/mysql-server-5.0_5.0.32-7etch8_sparc.deb stable/main/binary-sparc/mysql-server-4.1_5.0.32-7etch8_sparc.deb mysql-dfsg-5.0 (5.0.32-7etch8) stable-security; urgency=high * Non-maintainer upload by the security team. * Backport upstream's fix for CVE-2008-4098, which represents an expansion of the vulnerability discussed in (and partially addressed in fixes to) CVE-2008-2079. As described in CVE-2008-4098, an attacker may interpose a symlink to another database's data directory anytime between table creation and first access, thus bypassing the CREATE-time check and so enabling writes to tables in other databases. The upstream fix is to apply the check when creating data files as well. stable/main/binary-s390/mysql-server-4.1_5.0.32-7etch8_s390.deb stable/main/binary-s390/libmysqlclient15-dev_5.0.32-7etch8_s390.deb stable/main/binary-s390/libmysqlclient15off_5.0.32-7etch8_s390.deb stable/main/binary-s390/mysql-server-5.0_5.0.32-7etch8_s390.deb stable/main/binary-s390/mysql-client-5.0_5.0.32-7etch8_s390.deb mysql-dfsg-5.0 (5.0.32-7etch8) stable-security; urgency=high * Non-maintainer upload by the security team. * Backport upstream's fix for CVE-2008-4098, which represents an expansion of the vulnerability discussed in (and partially addressed in fixes to) CVE-2008-2079. As described in CVE-2008-4098, an attacker may interpose a symlink to another database's data directory anytime between table creation and first access, thus bypassing the CREATE-time check and so enabling writes to tables in other databases. The upstream fix is to apply the check when creating data files as well. stable/main/binary-powerpc/mysql-client-5.0_5.0.32-7etch8_powerpc.deb stable/main/binary-powerpc/libmysqlclient15off_5.0.32-7etch8_powerpc.deb stable/main/binary-powerpc/libmysqlclient15-dev_5.0.32-7etch8_powerpc.deb stable/main/binary-powerpc/mysql-server-5.0_5.0.32-7etch8_powerpc.deb stable/main/binary-powerpc/mysql-server-4.1_5.0.32-7etch8_powerpc.deb mysql-dfsg-5.0 (5.0.32-7etch8) stable-security; urgency=high * Non-maintainer upload by the security team. * Backport upstream's fix for CVE-2008-4098, which represents an expansion of the vulnerability discussed in (and partially addressed in fixes to) CVE-2008-2079. As described in CVE-2008-4098, an attacker may interpose a symlink to another database's data directory anytime between table creation and first access, thus bypassing the CREATE-time check and so enabling writes to tables in other databases. The upstream fix is to apply the check when creating data files as well. stable/main/binary-mipsel/mysql-server-5.0_5.0.32-7etch8_mipsel.deb stable/main/binary-mipsel/mysql-server-4.1_5.0.32-7etch8_mipsel.deb stable/main/binary-mipsel/libmysqlclient15-dev_5.0.32-7etch8_mipsel.deb stable/main/binary-mipsel/mysql-client-5.0_5.0.32-7etch8_mipsel.deb stable/main/binary-mipsel/libmysqlclient15off_5.0.32-7etch8_mipsel.deb mysql-dfsg-5.0 (5.0.32-7etch8) stable-security; urgency=high * Non-maintainer upload by the security team. * Backport upstream's fix for CVE-2008-4098, which represents an expansion of the vulnerability discussed in (and partially addressed in fixes to) CVE-2008-2079. As described in CVE-2008-4098, an attacker may interpose a symlink to another database's data directory anytime between table creation and first access, thus bypassing the CREATE-time check and so enabling writes to tables in other databases. The upstream fix is to apply the check when creating data files as well. stable/main/binary-mips/libmysqlclient15off_5.0.32-7etch8_mips.deb stable/main/binary-mips/mysql-client-5.0_5.0.32-7etch8_mips.deb stable/main/binary-mips/libmysqlclient15-dev_5.0.32-7etch8_mips.deb stable/main/binary-mips/mysql-server-5.0_5.0.32-7etch8_mips.deb stable/main/binary-mips/mysql-server-4.1_5.0.32-7etch8_mips.deb mysql-dfsg-5.0 (5.0.32-7etch8) stable-security; urgency=high * Non-maintainer upload by the security team. * Backport upstream's fix for CVE-2008-4098, which represents an expansion of the vulnerability discussed in (and partially addressed in fixes to) CVE-2008-2079. As described in CVE-2008-4098, an attacker may interpose a symlink to another database's data directory anytime between table creation and first access, thus bypassing the CREATE-time check and so enabling writes to tables in other databases. The upstream fix is to apply the check when creating data files as well. stable/main/binary-ia64/libmysqlclient15off_5.0.32-7etch8_ia64.deb stable/main/binary-ia64/mysql-client-5.0_5.0.32-7etch8_ia64.deb stable/main/binary-ia64/libmysqlclient15-dev_5.0.32-7etch8_ia64.deb stable/main/binary-ia64/mysql-server-5.0_5.0.32-7etch8_ia64.deb stable/main/binary-ia64/mysql-server-4.1_5.0.32-7etch8_ia64.deb mysql-dfsg-5.0 (5.0.32-7etch8) stable-security; urgency=high * Non-maintainer upload by the security team. * Backport upstream's fix for CVE-2008-4098, which represents an expansion of the vulnerability discussed in (and partially addressed in fixes to) CVE-2008-2079. As described in CVE-2008-4098, an attacker may interpose a symlink to another database's data directory anytime between table creation and first access, thus bypassing the CREATE-time check and so enabling writes to tables in other databases. The upstream fix is to apply the check when creating data files as well. stable/main/binary-i386/libmysqlclient15off_5.0.32-7etch8_i386.deb stable/main/binary-i386/libmysqlclient15-dev_5.0.32-7etch8_i386.deb stable/main/binary-i386/mysql-server-5.0_5.0.32-7etch8_i386.deb stable/main/binary-i386/mysql-client-5.0_5.0.32-7etch8_i386.deb stable/main/binary-i386/mysql-server-4.1_5.0.32-7etch8_i386.deb mysql-dfsg-5.0 (5.0.32-7etch8) stable-security; urgency=high * Non-maintainer upload by the security team. * Backport upstream's fix for CVE-2008-4098, which represents an expansion of the vulnerability discussed in (and partially addressed in fixes to) CVE-2008-2079. As described in CVE-2008-4098, an attacker may interpose a symlink to another database's data directory anytime between table creation and first access, thus bypassing the CREATE-time check and so enabling writes to tables in other databases. The upstream fix is to apply the check when creating data files as well. stable/main/binary-hppa/mysql-server-4.1_5.0.32-7etch8_hppa.deb stable/main/binary-hppa/mysql-server-5.0_5.0.32-7etch8_hppa.deb stable/main/binary-hppa/libmysqlclient15-dev_5.0.32-7etch8_hppa.deb stable/main/binary-hppa/mysql-client-5.0_5.0.32-7etch8_hppa.deb stable/main/binary-hppa/libmysqlclient15off_5.0.32-7etch8_hppa.deb mysql-dfsg-5.0 (5.0.32-7etch8) stable-security; urgency=high * Non-maintainer upload by the security team. * Backport upstream's fix for CVE-2008-4098, which represents an expansion of the vulnerability discussed in (and partially addressed in fixes to) CVE-2008-2079. As described in CVE-2008-4098, an attacker may interpose a symlink to another database's data directory anytime between table creation and first access, thus bypassing the CREATE-time check and so enabling writes to tables in other databases. The upstream fix is to apply the check when creating data files as well. stable/main/binary-arm/libmysqlclient15off_5.0.32-7etch8_arm.deb stable/main/binary-arm/mysql-client-5.0_5.0.32-7etch8_arm.deb stable/main/binary-arm/mysql-server-5.0_5.0.32-7etch8_arm.deb stable/main/binary-arm/libmysqlclient15-dev_5.0.32-7etch8_arm.deb stable/main/binary-arm/mysql-server-4.1_5.0.32-7etch8_arm.deb mysql-dfsg-5.0 (5.0.32-7etch8) stable-security; urgency=high * Non-maintainer upload by the security team. * Backport upstream's fix for CVE-2008-4098, which represents an expansion of the vulnerability discussed in (and partially addressed in fixes to) CVE-2008-2079. As described in CVE-2008-4098, an attacker may interpose a symlink to another database's data directory anytime between table creation and first access, thus bypassing the CREATE-time check and so enabling writes to tables in other databases. The upstream fix is to apply the check when creating data files as well. stable/main/binary-alpha/libmysqlclient15off_5.0.32-7etch8_alpha.deb stable/main/binary-alpha/mysql-server-5.0_5.0.32-7etch8_alpha.deb stable/main/binary-alpha/libmysqlclient15-dev_5.0.32-7etch8_alpha.deb stable/main/binary-alpha/mysql-server-4.1_5.0.32-7etch8_alpha.deb stable/main/binary-alpha/mysql-client-5.0_5.0.32-7etch8_alpha.deb mysql-dfsg-5.0 (5.0.32-7etch8) stable-security; urgency=high * Non-maintainer upload by the security team. * Backport upstream's fix for CVE-2008-4098, which represents an expansion of the vulnerability discussed in (and partially addressed in fixes to) CVE-2008-2079. As described in CVE-2008-4098, an attacker may interpose a symlink to another database's data directory anytime between table creation and first access, thus bypassing the CREATE-time check and so enabling writes to tables in other databases. The upstream fix is to apply the check when creating data files as well. stable/main/binary-amd64/libmysqlclient15-dev_5.0.32-7etch8_amd64.deb stable/main/binary-all/mysql-server_5.0.32-7etch8_all.deb stable/main/source/mysql-dfsg-5.0_5.0.32-7etch8.diff.gz stable/main/binary-all/mysql-common_5.0.32-7etch8_all.deb stable/main/source/mysql-dfsg-5.0_5.0.32-7etch8.dsc stable/main/binary-amd64/mysql-server-5.0_5.0.32-7etch8_amd64.deb stable/main/binary-amd64/mysql-client-5.0_5.0.32-7etch8_amd64.deb stable/main/binary-all/mysql-client_5.0.32-7etch8_all.deb stable/main/binary-amd64/mysql-server-4.1_5.0.32-7etch8_amd64.deb stable/main/binary-amd64/libmysqlclient15off_5.0.32-7etch8_amd64.deb mysql-dfsg-5.0 (5.0.32-7etch8) stable-security; urgency=high * Non-maintainer upload by the security team. * Backport upstream's fix for CVE-2008-4098, which represents an expansion of the vulnerability discussed in (and partially addressed in fixes to) CVE-2008-2079. As described in CVE-2008-4098, an attacker may interpose a symlink to another database's data directory anytime between table creation and first access, thus bypassing the CREATE-time check and so enabling writes to tables in other databases. The upstream fix is to apply the check when creating data files as well. stable/main/binary-sparc/linux-headers-2.6.24-etchnhalf.1-common_2.6.24-6~etchnhalf.7_sparc.deb stable/main/binary-sparc/linux-headers-2.6.24-etchnhalf.1-all-sparc_2.6.24-6~etchnhalf.7_sparc.deb stable/main/binary-sparc/linux-headers-2.6.24-etchnhalf.1-sparc64-smp_2.6.24-6~etchnhalf.7_sparc.deb stable/main/binary-sparc/linux-headers-2.6.24-etchnhalf.1-sparc64_2.6.24-6~etchnhalf.7_sparc.deb stable/main/binary-sparc/linux-image-2.6.24-etchnhalf.1-sparc64_2.6.24-6~etchnhalf.7_sparc.deb stable/main/binary-sparc/linux-image-2.6.24-etchnhalf.1-sparc64-smp_2.6.24-6~etchnhalf.7_sparc.deb stable/main/binary-sparc/linux-headers-2.6.24-etchnhalf.1-all_2.6.24-6~etchnhalf.7_sparc.deb linux-2.6.24 (2.6.24-6~etchnhalf.7) stable-security; urgency=high [ Alexander Prinsier ] * unix domain sockets: fix recursive descent in __scm_destroy() and garbage collector counting bug (CVE-2008-5029) [ dann frazier ] * Don't allow splicing to files opened with O_APPEND (CVE-2008-4554) * Avoid printk floods when reading corrupted ext[2,3] directories (CVE-2008-3528) * Fix oops in SCTP (CVE-2008-4576) * sctp: Fix possible kernel panic in sctp_sf_abort_violation (CVE-2008-4618) * Fix buffer overflow in hfsplus (CVE-2008-4933) * Fix BUG() in hfsplus (CVE-2008-4934) * Fix stack corruption in hfs (CVE-2008-5025) * Make sendmsg() block during UNIX garbage collection (CVE-2008-5300) * Fix buffer overflow in libertas (CVE-2008-5134) * Fix race conditions between inotify removal and umount (CVE-2008-5182) stable/main/binary-s390/linux-headers-2.6.24-etchnhalf.1-all_2.6.24-6~etchnhalf.7_s390.deb stable/main/binary-s390/linux-headers-2.6.24-etchnhalf.1-s390x_2.6.24-6~etchnhalf.7_s390.deb stable/main/binary-s390/linux-headers-2.6.24-etchnhalf.1-common_2.6.24-6~etchnhalf.7_s390.deb stable/main/binary-s390/linux-headers-2.6.24-etchnhalf.1-s390_2.6.24-6~etchnhalf.7_s390.deb stable/main/binary-s390/linux-image-2.6.24-etchnhalf.1-s390-tape_2.6.24-6~etchnhalf.7_s390.deb stable/main/binary-s390/linux-image-2.6.24-etchnhalf.1-s390x_2.6.24-6~etchnhalf.7_s390.deb stable/main/binary-s390/linux-headers-2.6.24-etchnhalf.1-all-s390_2.6.24-6~etchnhalf.7_s390.deb stable/main/binary-s390/linux-image-2.6.24-etchnhalf.1-s390_2.6.24-6~etchnhalf.7_s390.deb linux-2.6.24 (2.6.24-6~etchnhalf.7) stable-security; urgency=high [ Alexander Prinsier ] * unix domain sockets: fix recursive descent in __scm_destroy() and garbage collector counting bug (CVE-2008-5029) [ dann frazier ] * Don't allow splicing to files opened with O_APPEND (CVE-2008-4554) * Avoid printk floods when reading corrupted ext[2,3] directories (CVE-2008-3528) * Fix oops in SCTP (CVE-2008-4576) * sctp: Fix possible kernel panic in sctp_sf_abort_violation (CVE-2008-4618) * Fix buffer overflow in hfsplus (CVE-2008-4933) * Fix BUG() in hfsplus (CVE-2008-4934) * Fix stack corruption in hfs (CVE-2008-5025) * Make sendmsg() block during UNIX garbage collection (CVE-2008-5300) * Fix buffer overflow in libertas (CVE-2008-5134) * Fix race conditions between inotify removal and umount (CVE-2008-5182) stable/main/binary-powerpc/linux-headers-2.6.24-etchnhalf.1-all-powerpc_2.6.24-6~etchnhalf.7_powerpc.deb stable/main/binary-powerpc/linux-headers-2.6.24-etchnhalf.1-powerpc-miboot_2.6.24-6~etchnhalf.7_powerpc.deb stable/main/binary-powerpc/linux-image-2.6.24-etchnhalf.1-powerpc-smp_2.6.24-6~etchnhalf.7_powerpc.deb stable/main/binary-powerpc/linux-headers-2.6.24-etchnhalf.1-powerpc-smp_2.6.24-6~etchnhalf.7_powerpc.deb stable/main/binary-powerpc/linux-image-2.6.24-etchnhalf.1-powerpc_2.6.24-6~etchnhalf.7_powerpc.deb stable/main/binary-powerpc/linux-headers-2.6.24-etchnhalf.1-powerpc_2.6.24-6~etchnhalf.7_powerpc.deb stable/main/binary-powerpc/linux-image-2.6.24-etchnhalf.1-powerpc64_2.6.24-6~etchnhalf.7_powerpc.deb stable/main/binary-powerpc/linux-image-2.6.24-etchnhalf.1-powerpc-miboot_2.6.24-6~etchnhalf.7_powerpc.deb stable/main/binary-powerpc/linux-headers-2.6.24-etchnhalf.1-powerpc64_2.6.24-6~etchnhalf.7_powerpc.deb stable/main/binary-powerpc/linux-headers-2.6.24-etchnhalf.1-common_2.6.24-6~etchnhalf.7_powerpc.deb stable/main/binary-powerpc/linux-headers-2.6.24-etchnhalf.1-all_2.6.24-6~etchnhalf.7_powerpc.deb linux-2.6.24 (2.6.24-6~etchnhalf.7) stable-security; urgency=high [ Alexander Prinsier ] * unix domain sockets: fix recursive descent in __scm_destroy() and garbage collector counting bug (CVE-2008-5029) [ dann frazier ] * Don't allow splicing to files opened with O_APPEND (CVE-2008-4554) * Avoid printk floods when reading corrupted ext[2,3] directories (CVE-2008-3528) * Fix oops in SCTP (CVE-2008-4576) * sctp: Fix possible kernel panic in sctp_sf_abort_violation (CVE-2008-4618) * Fix buffer overflow in hfsplus (CVE-2008-4933) * Fix BUG() in hfsplus (CVE-2008-4934) * Fix stack corruption in hfs (CVE-2008-5025) * Make sendmsg() block during UNIX garbage collection (CVE-2008-5300) * Fix buffer overflow in libertas (CVE-2008-5134) * Fix race conditions between inotify removal and umount (CVE-2008-5182) stable/main/binary-mipsel/linux-image-2.6.24-etchnhalf.1-r5k-cobalt_2.6.24-6~etchnhalf.7_mipsel.deb stable/main/binary-mipsel/linux-image-2.6.24-etchnhalf.1-sb1a-bcm91480b_2.6.24-6~etchnhalf.7_mipsel.deb stable/main/binary-mipsel/linux-headers-2.6.24-etchnhalf.1-4kc-malta_2.6.24-6~etchnhalf.7_mipsel.deb stable/main/binary-mipsel/linux-image-2.6.24-etchnhalf.1-4kc-malta_2.6.24-6~etchnhalf.7_mipsel.deb stable/main/binary-mipsel/linux-image-2.6.24-etchnhalf.1-sb1-bcm91250a_2.6.24-6~etchnhalf.7_mipsel.deb stable/main/binary-mipsel/linux-headers-2.6.24-etchnhalf.1-all-mipsel_2.6.24-6~etchnhalf.7_mipsel.deb stable/main/binary-mipsel/linux-headers-2.6.24-etchnhalf.1-common_2.6.24-6~etchnhalf.7_mipsel.deb stable/main/binary-mipsel/linux-headers-2.6.24-etchnhalf.1-5kc-malta_2.6.24-6~etchnhalf.7_mipsel.deb stable/main/binary-mipsel/linux-headers-2.6.24-etchnhalf.1-all_2.6.24-6~etchnhalf.7_mipsel.deb stable/main/binary-mipsel/linux-headers-2.6.24-etchnhalf.1-sb1-bcm91250a_2.6.24-6~etchnhalf.7_mipsel.deb stable/main/binary-mipsel/linux-headers-2.6.24-etchnhalf.1-r5k-cobalt_2.6.24-6~etchnhalf.7_mipsel.deb stable/main/binary-mipsel/linux-image-2.6.24-etchnhalf.1-5kc-malta_2.6.24-6~etchnhalf.7_mipsel.deb stable/main/binary-mipsel/linux-headers-2.6.24-etchnhalf.1-sb1a-bcm91480b_2.6.24-6~etchnhalf.7_mipsel.deb linux-2.6.24 (2.6.24-6~etchnhalf.7) stable-security; urgency=high [ Alexander Prinsier ] * unix domain sockets: fix recursive descent in __scm_destroy() and garbage collector counting bug (CVE-2008-5029) [ dann frazier ] * Don't allow splicing to files opened with O_APPEND (CVE-2008-4554) * Avoid printk floods when reading corrupted ext[2,3] directories (CVE-2008-3528) * Fix oops in SCTP (CVE-2008-4576) * sctp: Fix possible kernel panic in sctp_sf_abort_violation (CVE-2008-4618) * Fix buffer overflow in hfsplus (CVE-2008-4933) * Fix BUG() in hfsplus (CVE-2008-4934) * Fix stack corruption in hfs (CVE-2008-5025) * Make sendmsg() block during UNIX garbage collection (CVE-2008-5300) * Fix buffer overflow in libertas (CVE-2008-5134) * Fix race conditions between inotify removal and umount (CVE-2008-5182) stable/main/binary-mips/linux-image-2.6.24-etchnhalf.1-sb1a-bcm91480b_2.6.24-6~etchnhalf.7_mips.deb stable/main/binary-mips/linux-headers-2.6.24-etchnhalf.1-sb1-bcm91250a_2.6.24-6~etchnhalf.7_mips.deb stable/main/binary-mips/linux-headers-2.6.24-etchnhalf.1-r5k-ip32_2.6.24-6~etchnhalf.7_mips.deb stable/main/binary-mips/linux-headers-2.6.24-etchnhalf.1-sb1a-bcm91480b_2.6.24-6~etchnhalf.7_mips.deb stable/main/binary-mips/linux-headers-2.6.24-etchnhalf.1-common_2.6.24-6~etchnhalf.7_mips.deb stable/main/binary-mips/linux-headers-2.6.24-etchnhalf.1-5kc-malta_2.6.24-6~etchnhalf.7_mips.deb stable/main/binary-mips/linux-headers-2.6.24-etchnhalf.1-4kc-malta_2.6.24-6~etchnhalf.7_mips.deb stable/main/binary-mips/linux-image-2.6.24-etchnhalf.1-r4k-ip22_2.6.24-6~etchnhalf.7_mips.deb stable/main/binary-mips/linux-headers-2.6.24-etchnhalf.1-all_2.6.24-6~etchnhalf.7_mips.deb stable/main/binary-mips/linux-headers-2.6.24-etchnhalf.1-all-mips_2.6.24-6~etchnhalf.7_mips.deb stable/main/binary-mips/linux-image-2.6.24-etchnhalf.1-4kc-malta_2.6.24-6~etchnhalf.7_mips.deb stable/main/binary-mips/linux-image-2.6.24-etchnhalf.1-5kc-malta_2.6.24-6~etchnhalf.7_mips.deb stable/main/binary-mips/linux-image-2.6.24-etchnhalf.1-r5k-ip32_2.6.24-6~etchnhalf.7_mips.deb stable/main/binary-mips/linux-headers-2.6.24-etchnhalf.1-r4k-ip22_2.6.24-6~etchnhalf.7_mips.deb stable/main/binary-mips/linux-image-2.6.24-etchnhalf.1-sb1-bcm91250a_2.6.24-6~etchnhalf.7_mips.deb linux-2.6.24 (2.6.24-6~etchnhalf.7) stable-security; urgency=high [ Alexander Prinsier ] * unix domain sockets: fix recursive descent in __scm_destroy() and garbage collector counting bug (CVE-2008-5029) [ dann frazier ] * Don't allow splicing to files opened with O_APPEND (CVE-2008-4554) * Avoid printk floods when reading corrupted ext[2,3] directories (CVE-2008-3528) * Fix oops in SCTP (CVE-2008-4576) * sctp: Fix possible kernel panic in sctp_sf_abort_violation (CVE-2008-4618) * Fix buffer overflow in hfsplus (CVE-2008-4933) * Fix BUG() in hfsplus (CVE-2008-4934) * Fix stack corruption in hfs (CVE-2008-5025) * Make sendmsg() block during UNIX garbage collection (CVE-2008-5300) * Fix buffer overflow in libertas (CVE-2008-5134) * Fix race conditions between inotify removal and umount (CVE-2008-5182) stable/main/binary-ia64/linux-headers-2.6.24-etchnhalf.1-common_2.6.24-6~etchnhalf.7_ia64.deb stable/main/binary-ia64/linux-headers-2.6.24-etchnhalf.1-all_2.6.24-6~etchnhalf.7_ia64.deb stable/main/binary-ia64/linux-headers-2.6.24-etchnhalf.1-itanium_2.6.24-6~etchnhalf.7_ia64.deb stable/main/binary-ia64/linux-image-2.6.24-etchnhalf.1-mckinley_2.6.24-6~etchnhalf.7_ia64.deb stable/main/binary-ia64/linux-headers-2.6.24-etchnhalf.1-mckinley_2.6.24-6~etchnhalf.7_ia64.deb stable/main/binary-ia64/linux-image-2.6.24-etchnhalf.1-itanium_2.6.24-6~etchnhalf.7_ia64.deb stable/main/binary-ia64/linux-headers-2.6.24-etchnhalf.1-all-ia64_2.6.24-6~etchnhalf.7_ia64.deb linux-2.6.24 (2.6.24-6~etchnhalf.7) stable-security; urgency=high [ Alexander Prinsier ] * unix domain sockets: fix recursive descent in __scm_destroy() and garbage collector counting bug (CVE-2008-5029) [ dann frazier ] * Don't allow splicing to files opened with O_APPEND (CVE-2008-4554) * Avoid printk floods when reading corrupted ext[2,3] directories (CVE-2008-3528) * Fix oops in SCTP (CVE-2008-4576) * sctp: Fix possible kernel panic in sctp_sf_abort_violation (CVE-2008-4618) * Fix buffer overflow in hfsplus (CVE-2008-4933) * Fix BUG() in hfsplus (CVE-2008-4934) * Fix stack corruption in hfs (CVE-2008-5025) * Make sendmsg() block during UNIX garbage collection (CVE-2008-5300) * Fix buffer overflow in libertas (CVE-2008-5134) * Fix race conditions between inotify removal and umount (CVE-2008-5182) stable/main/binary-hppa/linux-image-2.6.24-etchnhalf.1-parisc_2.6.24-6~etchnhalf.7_hppa.deb stable/main/binary-hppa/linux-image-2.6.24-etchnhalf.1-parisc64_2.6.24-6~etchnhalf.7_hppa.deb stable/main/binary-hppa/linux-image-2.6.24-etchnhalf.1-parisc64-smp_2.6.24-6~etchnhalf.7_hppa.deb stable/main/binary-hppa/linux-headers-2.6.24-etchnhalf.1-parisc64-smp_2.6.24-6~etchnhalf.7_hppa.deb stable/main/binary-hppa/linux-image-2.6.24-etchnhalf.1-parisc-smp_2.6.24-6~etchnhalf.7_hppa.deb stable/main/binary-hppa/linux-headers-2.6.24-etchnhalf.1-parisc64_2.6.24-6~etchnhalf.7_hppa.deb stable/main/binary-hppa/linux-headers-2.6.24-etchnhalf.1-parisc-smp_2.6.24-6~etchnhalf.7_hppa.deb stable/main/binary-hppa/linux-headers-2.6.24-etchnhalf.1-common_2.6.24-6~etchnhalf.7_hppa.deb stable/main/binary-hppa/linux-headers-2.6.24-etchnhalf.1-parisc_2.6.24-6~etchnhalf.7_hppa.deb stable/main/binary-hppa/linux-headers-2.6.24-etchnhalf.1-all-hppa_2.6.24-6~etchnhalf.7_hppa.deb stable/main/binary-hppa/linux-headers-2.6.24-etchnhalf.1-all_2.6.24-6~etchnhalf.7_hppa.deb linux-2.6.24 (2.6.24-6~etchnhalf.7) stable-security; urgency=high [ Alexander Prinsier ] * unix domain sockets: fix recursive descent in __scm_destroy() and garbage collector counting bug (CVE-2008-5029) [ dann frazier ] * Don't allow splicing to files opened with O_APPEND (CVE-2008-4554) * Avoid printk floods when reading corrupted ext[2,3] directories (CVE-2008-3528) * Fix oops in SCTP (CVE-2008-4576) * sctp: Fix possible kernel panic in sctp_sf_abort_violation (CVE-2008-4618) * Fix buffer overflow in hfsplus (CVE-2008-4933) * Fix BUG() in hfsplus (CVE-2008-4934) * Fix stack corruption in hfs (CVE-2008-5025) * Make sendmsg() block during UNIX garbage collection (CVE-2008-5300) * Fix buffer overflow in libertas (CVE-2008-5134) * Fix race conditions between inotify removal and umount (CVE-2008-5182) stable/main/binary-arm/linux-headers-2.6.24-etchnhalf.1-ixp4xx_2.6.24-6~etchnhalf.7_arm.deb stable/main/binary-arm/linux-headers-2.6.24-etchnhalf.1-all-arm_2.6.24-6~etchnhalf.7_arm.deb stable/main/binary-arm/linux-headers-2.6.24-etchnhalf.1-footbridge_2.6.24-6~etchnhalf.7_arm.deb stable/main/binary-arm/linux-image-2.6.24-etchnhalf.1-ixp4xx_2.6.24-6~etchnhalf.7_arm.deb stable/main/binary-arm/linux-headers-2.6.24-etchnhalf.1-all_2.6.24-6~etchnhalf.7_arm.deb stable/main/binary-arm/linux-headers-2.6.24-etchnhalf.1-iop32x_2.6.24-6~etchnhalf.7_arm.deb stable/main/binary-arm/linux-image-2.6.24-etchnhalf.1-footbridge_2.6.24-6~etchnhalf.7_arm.deb stable/main/binary-arm/linux-image-2.6.24-etchnhalf.1-iop32x_2.6.24-6~etchnhalf.7_arm.deb stable/main/binary-arm/linux-headers-2.6.24-etchnhalf.1-common_2.6.24-6~etchnhalf.7_arm.deb linux-2.6.24 (2.6.24-6~etchnhalf.7) stable-security; urgency=high [ Alexander Prinsier ] * unix domain sockets: fix recursive descent in __scm_destroy() and garbage collector counting bug (CVE-2008-5029) [ dann frazier ] * Don't allow splicing to files opened with O_APPEND (CVE-2008-4554) * Avoid printk floods when reading corrupted ext[2,3] directories (CVE-2008-3528) * Fix oops in SCTP (CVE-2008-4576) * sctp: Fix possible kernel panic in sctp_sf_abort_violation (CVE-2008-4618) * Fix buffer overflow in hfsplus (CVE-2008-4933) * Fix BUG() in hfsplus (CVE-2008-4934) * Fix stack corruption in hfs (CVE-2008-5025) * Make sendmsg() block during UNIX garbage collection (CVE-2008-5300) * Fix buffer overflow in libertas (CVE-2008-5134) * Fix race conditions between inotify removal and umount (CVE-2008-5182) stable/main/binary-amd64/linux-headers-2.6.24-etchnhalf.1-amd64_2.6.24-6~etchnhalf.7_amd64.deb stable/main/binary-amd64/linux-headers-2.6.24-etchnhalf.1-common_2.6.24-6~etchnhalf.7_amd64.deb stable/main/binary-amd64/linux-headers-2.6.24-etchnhalf.1-all_2.6.24-6~etchnhalf.7_amd64.deb stable/main/binary-amd64/linux-image-2.6.24-etchnhalf.1-amd64_2.6.24-6~etchnhalf.7_amd64.deb stable/main/binary-amd64/linux-headers-2.6.24-etchnhalf.1-all-amd64_2.6.24-6~etchnhalf.7_amd64.deb linux-2.6.24 (2.6.24-6~etchnhalf.7) stable-security; urgency=high [ Alexander Prinsier ] * unix domain sockets: fix recursive descent in __scm_destroy() and garbage collector counting bug (CVE-2008-5029) [ dann frazier ] * Don't allow splicing to files opened with O_APPEND (CVE-2008-4554) * Avoid printk floods when reading corrupted ext[2,3] directories (CVE-2008-3528) * Fix oops in SCTP (CVE-2008-4576) * sctp: Fix possible kernel panic in sctp_sf_abort_violation (CVE-2008-4618) * Fix buffer overflow in hfsplus (CVE-2008-4933) * Fix BUG() in hfsplus (CVE-2008-4934) * Fix stack corruption in hfs (CVE-2008-5025) * Make sendmsg() block during UNIX garbage collection (CVE-2008-5300) * Fix buffer overflow in libertas (CVE-2008-5134) * Fix race conditions between inotify removal and umount (CVE-2008-5182) stable/main/binary-alpha/linux-headers-2.6.24-etchnhalf.1-alpha-smp_2.6.24-6~etchnhalf.7_alpha.deb stable/main/binary-alpha/linux-headers-2.6.24-etchnhalf.1-alpha-generic_2.6.24-6~etchnhalf.7_alpha.deb stable/main/binary-alpha/linux-headers-2.6.24-etchnhalf.1-all_2.6.24-6~etchnhalf.7_alpha.deb stable/main/binary-alpha/linux-image-2.6.24-etchnhalf.1-alpha-generic_2.6.24-6~etchnhalf.7_alpha.deb stable/main/binary-alpha/linux-headers-2.6.24-etchnhalf.1-all-alpha_2.6.24-6~etchnhalf.7_alpha.deb stable/main/binary-alpha/linux-headers-2.6.24-etchnhalf.1-alpha-legacy_2.6.24-6~etchnhalf.7_alpha.deb stable/main/binary-alpha/linux-image-2.6.24-etchnhalf.1-alpha-smp_2.6.24-6~etchnhalf.7_alpha.deb stable/main/binary-alpha/linux-headers-2.6.24-etchnhalf.1-common_2.6.24-6~etchnhalf.7_alpha.deb stable/main/binary-alpha/linux-image-2.6.24-etchnhalf.1-alpha-legacy_2.6.24-6~etchnhalf.7_alpha.deb linux-2.6.24 (2.6.24-6~etchnhalf.7) stable-security; urgency=high [ Alexander Prinsier ] * unix domain sockets: fix recursive descent in __scm_destroy() and garbage collector counting bug (CVE-2008-5029) [ dann frazier ] * Don't allow splicing to files opened with O_APPEND (CVE-2008-4554) * Avoid printk floods when reading corrupted ext[2,3] directories (CVE-2008-3528) * Fix oops in SCTP (CVE-2008-4576) * sctp: Fix possible kernel panic in sctp_sf_abort_violation (CVE-2008-4618) * Fix buffer overflow in hfsplus (CVE-2008-4933) * Fix BUG() in hfsplus (CVE-2008-4934) * Fix stack corruption in hfs (CVE-2008-5025) * Make sendmsg() block during UNIX garbage collection (CVE-2008-5300) * Fix buffer overflow in libertas (CVE-2008-5134) * Fix race conditions between inotify removal and umount (CVE-2008-5182) stable/main/binary-all/linux-doc-2.6.24_2.6.24-6~etchnhalf.7_all.deb stable/main/binary-all/linux-manual-2.6.24_2.6.24-6~etchnhalf.7_all.deb stable/main/binary-all/linux-source-2.6.24_2.6.24-6~etchnhalf.7_all.deb stable/main/binary-all/linux-support-2.6.24-etchnhalf.1_2.6.24-6~etchnhalf.7_all.deb stable/main/binary-i386/linux-image-2.6.24-etchnhalf.1-686_2.6.24-6~etchnhalf.7_i386.deb stable/main/binary-i386/linux-image-2.6.24-etchnhalf.1-686-bigmem_2.6.24-6~etchnhalf.7_i386.deb stable/main/binary-i386/linux-headers-2.6.24-etchnhalf.1-686-bigmem_2.6.24-6~etchnhalf.7_i386.deb stable/main/binary-i386/linux-headers-2.6.24-etchnhalf.1-486_2.6.24-6~etchnhalf.7_i386.deb stable/main/binary-i386/linux-image-2.6.24-etchnhalf.1-amd64_2.6.24-6~etchnhalf.7_i386.deb stable/main/binary-i386/linux-headers-2.6.24-etchnhalf.1-all-i386_2.6.24-6~etchnhalf.7_i386.deb stable/main/binary-i386/linux-image-2.6.24-etchnhalf.1-486_2.6.24-6~etchnhalf.7_i386.deb stable/main/binary-i386/linux-headers-2.6.24-etchnhalf.1-common_2.6.24-6~etchnhalf.7_i386.deb stable/main/binary-i386/linux-headers-2.6.24-etchnhalf.1-all_2.6.24-6~etchnhalf.7_i386.deb stable/main/binary-all/linux-tree-2.6.24_2.6.24-6~etchnhalf.7_all.deb stable/main/binary-all/linux-patch-debian-2.6.24_2.6.24-6~etchnhalf.7_all.deb stable/main/binary-i386/linux-headers-2.6.24-etchnhalf.1-amd64_2.6.24-6~etchnhalf.7_i386.deb stable/main/source/linux-2.6.24_2.6.24-6~etchnhalf.7.dsc stable/main/binary-i386/linux-headers-2.6.24-etchnhalf.1-686_2.6.24-6~etchnhalf.7_i386.deb stable/main/source/linux-2.6.24_2.6.24-6~etchnhalf.7.diff.gz linux-2.6.24 (2.6.24-6~etchnhalf.7) stable-security; urgency=high [ Alexander Prinsier ] * unix domain sockets: fix recursive descent in __scm_destroy() and garbage collector counting bug (CVE-2008-5029) [ dann frazier ] * Don't allow splicing to files opened with O_APPEND (CVE-2008-4554) * Avoid printk floods when reading corrupted ext[2,3] directories (CVE-2008-3528) * Fix oops in SCTP (CVE-2008-4576) * sctp: Fix possible kernel panic in sctp_sf_abort_violation (CVE-2008-4618) * Fix buffer overflow in hfsplus (CVE-2008-4933) * Fix BUG() in hfsplus (CVE-2008-4934) * Fix stack corruption in hfs (CVE-2008-5025) * Make sendmsg() block during UNIX garbage collection (CVE-2008-5300) * Fix buffer overflow in libertas (CVE-2008-5134) * Fix race conditions between inotify removal and umount (CVE-2008-5182) stable/main/binary-sparc/linux-image-2.6.18-6-vserver-sparc64_2.6.18.dfsg.1-23etch1_sparc.deb stable/main/binary-sparc/linux-headers-2.6.18-6-sparc64_2.6.18.dfsg.1-23etch1_sparc.deb stable/main/binary-sparc/linux-headers-2.6.18-6-vserver-sparc64_2.6.18.dfsg.1-23etch1_sparc.deb stable/main/binary-sparc/linux-headers-2.6.18-6-all-sparc_2.6.18.dfsg.1-23etch1_sparc.deb stable/main/binary-sparc/linux-image-2.6.18-6-sparc32_2.6.18.dfsg.1-23etch1_sparc.deb stable/main/binary-sparc/linux-image-2.6.18-6-sparc64_2.6.18.dfsg.1-23etch1_sparc.deb stable/main/binary-sparc/linux-headers-2.6.18-6-all_2.6.18.dfsg.1-23etch1_sparc.deb stable/main/binary-sparc/linux-headers-2.6.18-6-sparc64-smp_2.6.18.dfsg.1-23etch1_sparc.deb stable/main/binary-sparc/linux-headers-2.6.18-6-vserver_2.6.18.dfsg.1-23etch1_sparc.deb stable/main/binary-sparc/linux-headers-2.6.18-6-sparc32_2.6.18.dfsg.1-23etch1_sparc.deb stable/main/binary-sparc/linux-image-2.6.18-6-sparc64-smp_2.6.18.dfsg.1-23etch1_sparc.deb stable/main/binary-sparc/linux-headers-2.6.18-6_2.6.18.dfsg.1-23etch1_sparc.deb linux-2.6 (2.6.18.dfsg.1-23etch1) stable-security; urgency=high * Fix missing boundary checks in syscall/syscall32_nopage(): - bugfix/add-install_special_mapping.patch - bugfix/i386-vdso-use_install_special_mapping.patch - bugfix/x86_64-ia32-vDSO-use-install_special_mapping.patch - features/all/xen/vdso-use_install_special_mapping.patch See CVE-2008-3527 * Modify feature patches to apply on top of the fixes for CVE-2008-3527: - features/all/vserver/vs2.0.2.2-rc9.patch - features/all/xen/fedora-2.6.18-36186.patch - features/all/xen/vserver-update.patch * Don't allow splicing to files opened with O_APPEND: - bugfix/dont-allow-splice-to-files-opened-with-O_APPEND.patch See CVE-2008-4554 * Avoid printk floods when reading corrupted ext[2,3] directories - bugfix/ext2-avoid-corrupted-directory-printk-floods.patch - bugfix/ext3-avoid-corrupted-directory-printk-floods.patch See CVE-2008-3528 * Fix oops in SCTP - bugfix/sctp-fix-oops-when-INIT-ACK-indicates-that-peer-doesnt-support-AUTH.patch See CVE-2008-4576 * Fix buffer overflow in hfsplus - bugfix/hfsplus-fix-Buffer-overflow-with-a-corrupted-image.patch See CVE-2008-4933 * Fix BUG() in hfsplus - bugfix/hfsplus-check_read_mapping_page-return-value.patch See CVE-2008-4934 * Fix stack corruption in hfs - bugfix/hfs-fix-namelength-memory-corruption.patch See CVE-2008-5025 * Fix recursive descent in __scm_destroy - bugfix/af_unix-fix-garbage-collector-races.patch - bugfix/af_unix-convert-socks-to-unix_socks.patch - bugfix/net-unix-fix-inflight-counting-bug-in-garbage-collector.patch - bugfix/net-fix-recursive-descent-in-__scm_destroy.patch See CVE-2008-5029 * Make sendmsg() block during UNIX garbage collection: - bugfix/net-unix-gc-fix-soft-lockups-oom-issues.patch See CVE-2008-5300 * Fix DoS when calling svc_listen twice on the same socket while reading /proc/net/atm/*vc: - bugfix/atm-duplicate-listen-on-socket-corrupts-the-vcc-table.patch See CVE-2008-5079 * Fix race conditions between inotify removal and umount - bugfix/inotify-watch-removal-umount-races.patch See CVE-2008-5182 stable/main/binary-s390/linux-headers-2.6.18-6-vserver_2.6.18.dfsg.1-23etch1_s390.deb stable/main/binary-s390/linux-image-2.6.18-6-s390-tape_2.6.18.dfsg.1-23etch1_s390.deb stable/main/binary-s390/linux-headers-2.6.18-6-s390_2.6.18.dfsg.1-23etch1_s390.deb stable/main/binary-s390/linux-image-2.6.18-6-s390_2.6.18.dfsg.1-23etch1_s390.deb stable/main/binary-s390/linux-headers-2.6.18-6-s390x_2.6.18.dfsg.1-23etch1_s390.deb stable/main/binary-s390/linux-image-2.6.18-6-s390x_2.6.18.dfsg.1-23etch1_s390.deb stable/main/binary-s390/linux-headers-2.6.18-6-all-s390_2.6.18.dfsg.1-23etch1_s390.deb stable/main/binary-s390/linux-headers-2.6.18-6-all_2.6.18.dfsg.1-23etch1_s390.deb stable/main/binary-s390/linux-image-2.6.18-6-vserver-s390x_2.6.18.dfsg.1-23etch1_s390.deb stable/main/binary-s390/linux-headers-2.6.18-6_2.6.18.dfsg.1-23etch1_s390.deb stable/main/binary-s390/linux-headers-2.6.18-6-vserver-s390x_2.6.18.dfsg.1-23etch1_s390.deb linux-2.6 (2.6.18.dfsg.1-23etch1) stable-security; urgency=high * Fix missing boundary checks in syscall/syscall32_nopage(): - bugfix/add-install_special_mapping.patch - bugfix/i386-vdso-use_install_special_mapping.patch - bugfix/x86_64-ia32-vDSO-use-install_special_mapping.patch - features/all/xen/vdso-use_install_special_mapping.patch See CVE-2008-3527 * Modify feature patches to apply on top of the fixes for CVE-2008-3527: - features/all/vserver/vs2.0.2.2-rc9.patch - features/all/xen/fedora-2.6.18-36186.patch - features/all/xen/vserver-update.patch * Don't allow splicing to files opened with O_APPEND: - bugfix/dont-allow-splice-to-files-opened-with-O_APPEND.patch See CVE-2008-4554 * Avoid printk floods when reading corrupted ext[2,3] directories - bugfix/ext2-avoid-corrupted-directory-printk-floods.patch - bugfix/ext3-avoid-corrupted-directory-printk-floods.patch See CVE-2008-3528 * Fix oops in SCTP - bugfix/sctp-fix-oops-when-INIT-ACK-indicates-that-peer-doesnt-support-AUTH.patch See CVE-2008-4576 * Fix buffer overflow in hfsplus - bugfix/hfsplus-fix-Buffer-overflow-with-a-corrupted-image.patch See CVE-2008-4933 * Fix BUG() in hfsplus - bugfix/hfsplus-check_read_mapping_page-return-value.patch See CVE-2008-4934 * Fix stack corruption in hfs - bugfix/hfs-fix-namelength-memory-corruption.patch See CVE-2008-5025 * Fix recursive descent in __scm_destroy - bugfix/af_unix-fix-garbage-collector-races.patch - bugfix/af_unix-convert-socks-to-unix_socks.patch - bugfix/net-unix-fix-inflight-counting-bug-in-garbage-collector.patch - bugfix/net-fix-recursive-descent-in-__scm_destroy.patch See CVE-2008-5029 * Make sendmsg() block during UNIX garbage collection: - bugfix/net-unix-gc-fix-soft-lockups-oom-issues.patch See CVE-2008-5300 * Fix DoS when calling svc_listen twice on the same socket while reading /proc/net/atm/*vc: - bugfix/atm-duplicate-listen-on-socket-corrupts-the-vcc-table.patch See CVE-2008-5079 * Fix race conditions between inotify removal and umount - bugfix/inotify-watch-removal-umount-races.patch See CVE-2008-5182 stable/main/binary-powerpc/linux-headers-2.6.18-6-powerpc_2.6.18.dfsg.1-23etch1_powerpc.deb stable/main/binary-powerpc/linux-headers-2.6.18-6_2.6.18.dfsg.1-23etch1_powerpc.deb stable/main/binary-powerpc/linux-image-2.6.18-6-powerpc64_2.6.18.dfsg.1-23etch1_powerpc.deb stable/main/binary-powerpc/linux-image-2.6.18-6-vserver-powerpc64_2.6.18.dfsg.1-23etch1_powerpc.deb stable/main/binary-powerpc/linux-headers-2.6.18-6-powerpc64_2.6.18.dfsg.1-23etch1_powerpc.deb stable/main/binary-powerpc/linux-headers-2.6.18-6-all-powerpc_2.6.18.dfsg.1-23etch1_powerpc.deb stable/main/binary-powerpc/linux-image-2.6.18-6-powerpc_2.6.18.dfsg.1-23etch1_powerpc.deb stable/main/binary-powerpc/linux-image-2.6.18-6-powerpc-miboot_2.6.18.dfsg.1-23etch1_powerpc.deb stable/main/binary-powerpc/linux-headers-2.6.18-6-all_2.6.18.dfsg.1-23etch1_powerpc.deb stable/main/binary-powerpc/linux-headers-2.6.18-6-vserver_2.6.18.dfsg.1-23etch1_powerpc.deb stable/main/binary-powerpc/linux-image-2.6.18-6-powerpc-smp_2.6.18.dfsg.1-23etch1_powerpc.deb stable/main/binary-powerpc/linux-headers-2.6.18-6-powerpc-miboot_2.6.18.dfsg.1-23etch1_powerpc.deb stable/main/binary-powerpc/linux-image-2.6.18-6-vserver-powerpc_2.6.18.dfsg.1-23etch1_powerpc.deb stable/main/binary-powerpc/linux-image-2.6.18-6-prep_2.6.18.dfsg.1-23etch1_powerpc.deb stable/main/binary-powerpc/linux-headers-2.6.18-6-powerpc-smp_2.6.18.dfsg.1-23etch1_powerpc.deb stable/main/binary-powerpc/linux-headers-2.6.18-6-vserver-powerpc64_2.6.18.dfsg.1-23etch1_powerpc.deb stable/main/binary-powerpc/linux-headers-2.6.18-6-vserver-powerpc_2.6.18.dfsg.1-23etch1_powerpc.deb stable/main/binary-powerpc/linux-headers-2.6.18-6-prep_2.6.18.dfsg.1-23etch1_powerpc.deb linux-2.6 (2.6.18.dfsg.1-23etch1) stable-security; urgency=high * Fix missing boundary checks in syscall/syscall32_nopage(): - bugfix/add-install_special_mapping.patch - bugfix/i386-vdso-use_install_special_mapping.patch - bugfix/x86_64-ia32-vDSO-use-install_special_mapping.patch - features/all/xen/vdso-use_install_special_mapping.patch See CVE-2008-3527 * Modify feature patches to apply on top of the fixes for CVE-2008-3527: - features/all/vserver/vs2.0.2.2-rc9.patch - features/all/xen/fedora-2.6.18-36186.patch - features/all/xen/vserver-update.patch * Don't allow splicing to files opened with O_APPEND: - bugfix/dont-allow-splice-to-files-opened-with-O_APPEND.patch See CVE-2008-4554 * Avoid printk floods when reading corrupted ext[2,3] directories - bugfix/ext2-avoid-corrupted-directory-printk-floods.patch - bugfix/ext3-avoid-corrupted-directory-printk-floods.patch See CVE-2008-3528 * Fix oops in SCTP - bugfix/sctp-fix-oops-when-INIT-ACK-indicates-that-peer-doesnt-support-AUTH.patch See CVE-2008-4576 * Fix buffer overflow in hfsplus - bugfix/hfsplus-fix-Buffer-overflow-with-a-corrupted-image.patch See CVE-2008-4933 * Fix BUG() in hfsplus - bugfix/hfsplus-check_read_mapping_page-return-value.patch See CVE-2008-4934 * Fix stack corruption in hfs - bugfix/hfs-fix-namelength-memory-corruption.patch See CVE-2008-5025 * Fix recursive descent in __scm_destroy - bugfix/af_unix-fix-garbage-collector-races.patch - bugfix/af_unix-convert-socks-to-unix_socks.patch - bugfix/net-unix-fix-inflight-counting-bug-in-garbage-collector.patch - bugfix/net-fix-recursive-descent-in-__scm_destroy.patch See CVE-2008-5029 * Make sendmsg() block during UNIX garbage collection: - bugfix/net-unix-gc-fix-soft-lockups-oom-issues.patch See CVE-2008-5300 * Fix DoS when calling svc_listen twice on the same socket while reading /proc/net/atm/*vc: - bugfix/atm-duplicate-listen-on-socket-corrupts-the-vcc-table.patch See CVE-2008-5079 * Fix race conditions between inotify removal and umount - bugfix/inotify-watch-removal-umount-races.patch See CVE-2008-5182 stable/main/binary-mipsel/linux-image-2.6.18-6-r5k-cobalt_2.6.18.dfsg.1-23etch1_mipsel.deb stable/main/binary-mipsel/linux-headers-2.6.18-6_2.6.18.dfsg.1-23etch1_mipsel.deb stable/main/binary-mipsel/linux-headers-2.6.18-6-sb1-bcm91250a_2.6.18.dfsg.1-23etch1_mipsel.deb stable/main/binary-mipsel/linux-headers-2.6.18-6-all_2.6.18.dfsg.1-23etch1_mipsel.deb stable/main/binary-mipsel/linux-headers-2.6.18-6-r4k-kn04_2.6.18.dfsg.1-23etch1_mipsel.deb stable/main/binary-mipsel/linux-image-2.6.18-6-qemu_2.6.18.dfsg.1-23etch1_mipsel.deb stable/main/binary-mipsel/linux-headers-2.6.18-6-r5k-cobalt_2.6.18.dfsg.1-23etch1_mipsel.deb stable/main/binary-mipsel/linux-headers-2.6.18-6-sb1a-bcm91480b_2.6.18.dfsg.1-23etch1_mipsel.deb stable/main/binary-mipsel/linux-image-2.6.18-6-r3k-kn02_2.6.18.dfsg.1-23etch1_mipsel.deb stable/main/binary-mipsel/linux-headers-2.6.18-6-r3k-kn02_2.6.18.dfsg.1-23etch1_mipsel.deb stable/main/binary-mipsel/linux-image-2.6.18-6-sb1a-bcm91480b_2.6.18.dfsg.1-23etch1_mipsel.deb stable/main/binary-mipsel/linux-headers-2.6.18-6-all-mipsel_2.6.18.dfsg.1-23etch1_mipsel.deb stable/main/binary-mipsel/linux-headers-2.6.18-6-qemu_2.6.18.dfsg.1-23etch1_mipsel.deb stable/main/binary-mipsel/linux-image-2.6.18-6-sb1-bcm91250a_2.6.18.dfsg.1-23etch1_mipsel.deb stable/main/binary-mipsel/linux-image-2.6.18-6-r4k-kn04_2.6.18.dfsg.1-23etch1_mipsel.deb linux-2.6 (2.6.18.dfsg.1-23etch1) stable-security; urgency=high * Fix missing boundary checks in syscall/syscall32_nopage(): - bugfix/add-install_special_mapping.patch - bugfix/i386-vdso-use_install_special_mapping.patch - bugfix/x86_64-ia32-vDSO-use-install_special_mapping.patch - features/all/xen/vdso-use_install_special_mapping.patch See CVE-2008-3527 * Modify feature patches to apply on top of the fixes for CVE-2008-3527: - features/all/vserver/vs2.0.2.2-rc9.patch - features/all/xen/fedora-2.6.18-36186.patch - features/all/xen/vserver-update.patch * Don't allow splicing to files opened with O_APPEND: - bugfix/dont-allow-splice-to-files-opened-with-O_APPEND.patch See CVE-2008-4554 * Avoid printk floods when reading corrupted ext[2,3] directories - bugfix/ext2-avoid-corrupted-directory-printk-floods.patch - bugfix/ext3-avoid-corrupted-directory-printk-floods.patch See CVE-2008-3528 * Fix oops in SCTP - bugfix/sctp-fix-oops-when-INIT-ACK-indicates-that-peer-doesnt-support-AUTH.patch See CVE-2008-4576 * Fix buffer overflow in hfsplus - bugfix/hfsplus-fix-Buffer-overflow-with-a-corrupted-image.patch See CVE-2008-4933 * Fix BUG() in hfsplus - bugfix/hfsplus-check_read_mapping_page-return-value.patch See CVE-2008-4934 * Fix stack corruption in hfs - bugfix/hfs-fix-namelength-memory-corruption.patch See CVE-2008-5025 * Fix recursive descent in __scm_destroy - bugfix/af_unix-fix-garbage-collector-races.patch - bugfix/af_unix-convert-socks-to-unix_socks.patch - bugfix/net-unix-fix-inflight-counting-bug-in-garbage-collector.patch - bugfix/net-fix-recursive-descent-in-__scm_destroy.patch See CVE-2008-5029 * Make sendmsg() block during UNIX garbage collection: - bugfix/net-unix-gc-fix-soft-lockups-oom-issues.patch See CVE-2008-5300 * Fix DoS when calling svc_listen twice on the same socket while reading /proc/net/atm/*vc: - bugfix/atm-duplicate-listen-on-socket-corrupts-the-vcc-table.patch See CVE-2008-5079 * Fix race conditions between inotify removal and umount - bugfix/inotify-watch-removal-umount-races.patch See CVE-2008-5182 stable/main/binary-mips/linux-image-2.6.18-6-qemu_2.6.18.dfsg.1-23etch1_mips.deb stable/main/binary-mips/linux-headers-2.6.18-6-all_2.6.18.dfsg.1-23etch1_mips.deb stable/main/binary-mips/linux-headers-2.6.18-6-sb1a-bcm91480b_2.6.18.dfsg.1-23etch1_mips.deb stable/main/binary-mips/linux-headers-2.6.18-6-all-mips_2.6.18.dfsg.1-23etch1_mips.deb stable/main/binary-mips/linux-headers-2.6.18-6-qemu_2.6.18.dfsg.1-23etch1_mips.deb stable/main/binary-mips/linux-headers-2.6.18-6-r4k-ip22_2.6.18.dfsg.1-23etch1_mips.deb stable/main/binary-mips/linux-image-2.6.18-6-sb1-bcm91250a_2.6.18.dfsg.1-23etch1_mips.deb stable/main/binary-mips/linux-headers-2.6.18-6_2.6.18.dfsg.1-23etch1_mips.deb stable/main/binary-mips/linux-headers-2.6.18-6-r5k-ip32_2.6.18.dfsg.1-23etch1_mips.deb stable/main/binary-mips/linux-image-2.6.18-6-r5k-ip32_2.6.18.dfsg.1-23etch1_mips.deb stable/main/binary-mips/linux-image-2.6.18-6-r4k-ip22_2.6.18.dfsg.1-23etch1_mips.deb stable/main/binary-mips/linux-headers-2.6.18-6-sb1-bcm91250a_2.6.18.dfsg.1-23etch1_mips.deb stable/main/binary-mips/linux-image-2.6.18-6-sb1a-bcm91480b_2.6.18.dfsg.1-23etch1_mips.deb linux-2.6 (2.6.18.dfsg.1-23etch1) stable-security; urgency=high * Fix missing boundary checks in syscall/syscall32_nopage(): - bugfix/add-install_special_mapping.patch - bugfix/i386-vdso-use_install_special_mapping.patch - bugfix/x86_64-ia32-vDSO-use-install_special_mapping.patch - features/all/xen/vdso-use_install_special_mapping.patch See CVE-2008-3527 * Modify feature patches to apply on top of the fixes for CVE-2008-3527: - features/all/vserver/vs2.0.2.2-rc9.patch - features/all/xen/fedora-2.6.18-36186.patch - features/all/xen/vserver-update.patch * Don't allow splicing to files opened with O_APPEND: - bugfix/dont-allow-splice-to-files-opened-with-O_APPEND.patch See CVE-2008-4554 * Avoid printk floods when reading corrupted ext[2,3] directories - bugfix/ext2-avoid-corrupted-directory-printk-floods.patch - bugfix/ext3-avoid-corrupted-directory-printk-floods.patch See CVE-2008-3528 * Fix oops in SCTP - bugfix/sctp-fix-oops-when-INIT-ACK-indicates-that-peer-doesnt-support-AUTH.patch See CVE-2008-4576 * Fix buffer overflow in hfsplus - bugfix/hfsplus-fix-Buffer-overflow-with-a-corrupted-image.patch See CVE-2008-4933 * Fix BUG() in hfsplus - bugfix/hfsplus-check_read_mapping_page-return-value.patch See CVE-2008-4934 * Fix stack corruption in hfs - bugfix/hfs-fix-namelength-memory-corruption.patch See CVE-2008-5025 * Fix recursive descent in __scm_destroy - bugfix/af_unix-fix-garbage-collector-races.patch - bugfix/af_unix-convert-socks-to-unix_socks.patch - bugfix/net-unix-fix-inflight-counting-bug-in-garbage-collector.patch - bugfix/net-fix-recursive-descent-in-__scm_destroy.patch See CVE-2008-5029 * Make sendmsg() block during UNIX garbage collection: - bugfix/net-unix-gc-fix-soft-lockups-oom-issues.patch See CVE-2008-5300 * Fix DoS when calling svc_listen twice on the same socket while reading /proc/net/atm/*vc: - bugfix/atm-duplicate-listen-on-socket-corrupts-the-vcc-table.patch See CVE-2008-5079 * Fix race conditions between inotify removal and umount - bugfix/inotify-watch-removal-umount-races.patch See CVE-2008-5182 stable/main/binary-ia64/linux-image-2.6.18-6-itanium_2.6.18.dfsg.1-23etch1_ia64.deb stable/main/binary-ia64/linux-headers-2.6.18-6-itanium_2.6.18.dfsg.1-23etch1_ia64.deb stable/main/binary-ia64/linux-headers-2.6.18-6-all-ia64_2.6.18.dfsg.1-23etch1_ia64.deb stable/main/binary-ia64/linux-headers-2.6.18-6-all_2.6.18.dfsg.1-23etch1_ia64.deb stable/main/binary-ia64/linux-image-2.6.18-6-mckinley_2.6.18.dfsg.1-23etch1_ia64.deb stable/main/binary-ia64/linux-headers-2.6.18-6-mckinley_2.6.18.dfsg.1-23etch1_ia64.deb stable/main/binary-ia64/linux-headers-2.6.18-6_2.6.18.dfsg.1-23etch1_ia64.deb linux-2.6 (2.6.18.dfsg.1-23etch1) stable-security; urgency=high * Fix missing boundary checks in syscall/syscall32_nopage(): - bugfix/add-install_special_mapping.patch - bugfix/i386-vdso-use_install_special_mapping.patch - bugfix/x86_64-ia32-vDSO-use-install_special_mapping.patch - features/all/xen/vdso-use_install_special_mapping.patch See CVE-2008-3527 * Modify feature patches to apply on top of the fixes for CVE-2008-3527: - features/all/vserver/vs2.0.2.2-rc9.patch - features/all/xen/fedora-2.6.18-36186.patch - features/all/xen/vserver-update.patch * Don't allow splicing to files opened with O_APPEND: - bugfix/dont-allow-splice-to-files-opened-with-O_APPEND.patch See CVE-2008-4554 * Avoid printk floods when reading corrupted ext[2,3] directories - bugfix/ext2-avoid-corrupted-directory-printk-floods.patch - bugfix/ext3-avoid-corrupted-directory-printk-floods.patch See CVE-2008-3528 * Fix oops in SCTP - bugfix/sctp-fix-oops-when-INIT-ACK-indicates-that-peer-doesnt-support-AUTH.patch See CVE-2008-4576 * Fix buffer overflow in hfsplus - bugfix/hfsplus-fix-Buffer-overflow-with-a-corrupted-image.patch See CVE-2008-4933 * Fix BUG() in hfsplus - bugfix/hfsplus-check_read_mapping_page-return-value.patch See CVE-2008-4934 * Fix stack corruption in hfs - bugfix/hfs-fix-namelength-memory-corruption.patch See CVE-2008-5025 * Fix recursive descent in __scm_destroy - bugfix/af_unix-fix-garbage-collector-races.patch - bugfix/af_unix-convert-socks-to-unix_socks.patch - bugfix/net-unix-fix-inflight-counting-bug-in-garbage-collector.patch - bugfix/net-fix-recursive-descent-in-__scm_destroy.patch See CVE-2008-5029 * Make sendmsg() block during UNIX garbage collection: - bugfix/net-unix-gc-fix-soft-lockups-oom-issues.patch See CVE-2008-5300 * Fix DoS when calling svc_listen twice on the same socket while reading /proc/net/atm/*vc: - bugfix/atm-duplicate-listen-on-socket-corrupts-the-vcc-table.patch See CVE-2008-5079 * Fix race conditions between inotify removal and umount - bugfix/inotify-watch-removal-umount-races.patch See CVE-2008-5182 stable/main/binary-i386/linux-headers-2.6.18-6-xen-686_2.6.18.dfsg.1-23etch1_i386.deb stable/main/binary-i386/linux-headers-2.6.18-6-xen_2.6.18.dfsg.1-23etch1_i386.deb stable/main/binary-i386/linux-headers-2.6.18-6-vserver-686_2.6.18.dfsg.1-23etch1_i386.deb stable/main/binary-i386/linux-headers-2.6.18-6-vserver_2.6.18.dfsg.1-23etch1_i386.deb stable/main/binary-i386/linux-headers-2.6.18-6-all_2.6.18.dfsg.1-23etch1_i386.deb stable/main/binary-i386/linux-headers-2.6.18-6-vserver-k7_2.6.18.dfsg.1-23etch1_i386.deb stable/main/binary-i386/linux-headers-2.6.18-6-xen-vserver_2.6.18.dfsg.1-23etch1_i386.deb stable/main/binary-i386/linux-headers-2.6.18-6-486_2.6.18.dfsg.1-23etch1_i386.deb stable/main/binary-i386/linux-image-2.6.18-6-amd64_2.6.18.dfsg.1-23etch1_i386.deb stable/main/binary-i386/linux-modules-2.6.18-6-xen-686_2.6.18.dfsg.1-23etch1_i386.deb stable/main/binary-i386/linux-headers-2.6.18-6-686_2.6.18.dfsg.1-23etch1_i386.deb stable/main/binary-i386/linux-image-2.6.18-6-686_2.6.18.dfsg.1-23etch1_i386.deb stable/main/binary-i386/linux-headers-2.6.18-6-all-i386_2.6.18.dfsg.1-23etch1_i386.deb stable/main/binary-i386/linux-image-2.6.18-6-686-bigmem_2.6.18.dfsg.1-23etch1_i386.deb stable/main/binary-i386/linux-headers-2.6.18-6-686-bigmem_2.6.18.dfsg.1-23etch1_i386.deb stable/main/binary-i386/linux-headers-2.6.18-6-xen-vserver-686_2.6.18.dfsg.1-23etch1_i386.deb stable/main/binary-i386/linux-headers-2.6.18-6-amd64_2.6.18.dfsg.1-23etch1_i386.deb stable/main/binary-i386/linux-headers-2.6.18-6_2.6.18.dfsg.1-23etch1_i386.deb stable/main/binary-i386/linux-modules-2.6.18-6-xen-vserver-686_2.6.18.dfsg.1-23etch1_i386.deb stable/main/binary-i386/linux-image-2.6.18-6-vserver-686_2.6.18.dfsg.1-23etch1_i386.deb stable/main/binary-i386/linux-image-2.6.18-6-vserver-k7_2.6.18.dfsg.1-23etch1_i386.deb stable/main/binary-i386/linux-image-2.6.18-6-xen-686_2.6.18.dfsg.1-23etch1_i386.deb stable/main/binary-i386/xen-linux-system-2.6.18-6-xen-vserver-686_2.6.18.dfsg.1-23etch1_i386.deb stable/main/binary-i386/linux-image-2.6.18-6-k7_2.6.18.dfsg.1-23etch1_i386.deb stable/main/binary-i386/linux-image-2.6.18-6-xen-vserver-686_2.6.18.dfsg.1-23etch1_i386.deb stable/main/binary-i386/linux-image-2.6.18-6-486_2.6.18.dfsg.1-23etch1_i386.deb stable/main/binary-i386/xen-linux-system-2.6.18-6-xen-686_2.6.18.dfsg.1-23etch1_i386.deb stable/main/binary-i386/linux-headers-2.6.18-6-k7_2.6.18.dfsg.1-23etch1_i386.deb linux-2.6 (2.6.18.dfsg.1-23etch1) stable-security; urgency=high * Fix missing boundary checks in syscall/syscall32_nopage(): - bugfix/add-install_special_mapping.patch - bugfix/i386-vdso-use_install_special_mapping.patch - bugfix/x86_64-ia32-vDSO-use-install_special_mapping.patch - features/all/xen/vdso-use_install_special_mapping.patch See CVE-2008-3527 * Modify feature patches to apply on top of the fixes for CVE-2008-3527: - features/all/vserver/vs2.0.2.2-rc9.patch - features/all/xen/fedora-2.6.18-36186.patch - features/all/xen/vserver-update.patch * Don't allow splicing to files opened with O_APPEND: - bugfix/dont-allow-splice-to-files-opened-with-O_APPEND.patch See CVE-2008-4554 * Avoid printk floods when reading corrupted ext[2,3] directories - bugfix/ext2-avoid-corrupted-directory-printk-floods.patch - bugfix/ext3-avoid-corrupted-directory-printk-floods.patch See CVE-2008-3528 * Fix oops in SCTP - bugfix/sctp-fix-oops-when-INIT-ACK-indicates-that-peer-doesnt-support-AUTH.patch See CVE-2008-4576 * Fix buffer overflow in hfsplus - bugfix/hfsplus-fix-Buffer-overflow-with-a-corrupted-image.patch See CVE-2008-4933 * Fix BUG() in hfsplus - bugfix/hfsplus-check_read_mapping_page-return-value.patch See CVE-2008-4934 * Fix stack corruption in hfs - bugfix/hfs-fix-namelength-memory-corruption.patch See CVE-2008-5025 * Fix recursive descent in __scm_destroy - bugfix/af_unix-fix-garbage-collector-races.patch - bugfix/af_unix-convert-socks-to-unix_socks.patch - bugfix/net-unix-fix-inflight-counting-bug-in-garbage-collector.patch - bugfix/net-fix-recursive-descent-in-__scm_destroy.patch See CVE-2008-5029 * Make sendmsg() block during UNIX garbage collection: - bugfix/net-unix-gc-fix-soft-lockups-oom-issues.patch See CVE-2008-5300 * Fix DoS when calling svc_listen twice on the same socket while reading /proc/net/atm/*vc: - bugfix/atm-duplicate-listen-on-socket-corrupts-the-vcc-table.patch See CVE-2008-5079 * Fix race conditions between inotify removal and umount - bugfix/inotify-watch-removal-umount-races.patch See CVE-2008-5182 stable/main/binary-hppa/linux-image-2.6.18-6-parisc64-smp_2.6.18.dfsg.1-23etch1_hppa.deb stable/main/binary-hppa/linux-headers-2.6.18-6-parisc-smp_2.6.18.dfsg.1-23etch1_hppa.deb stable/main/binary-hppa/linux-headers-2.6.18-6-all-hppa_2.6.18.dfsg.1-23etch1_hppa.deb stable/main/binary-hppa/linux-image-2.6.18-6-parisc-smp_2.6.18.dfsg.1-23etch1_hppa.deb stable/main/binary-hppa/linux-headers-2.6.18-6-parisc_2.6.18.dfsg.1-23etch1_hppa.deb stable/main/binary-hppa/linux-image-2.6.18-6-parisc64_2.6.18.dfsg.1-23etch1_hppa.deb stable/main/binary-hppa/linux-headers-2.6.18-6-all_2.6.18.dfsg.1-23etch1_hppa.deb stable/main/binary-hppa/linux-image-2.6.18-6-parisc_2.6.18.dfsg.1-23etch1_hppa.deb stable/main/binary-hppa/linux-headers-2.6.18-6_2.6.18.dfsg.1-23etch1_hppa.deb stable/main/binary-hppa/linux-headers-2.6.18-6-parisc64_2.6.18.dfsg.1-23etch1_hppa.deb stable/main/binary-hppa/linux-headers-2.6.18-6-parisc64-smp_2.6.18.dfsg.1-23etch1_hppa.deb linux-2.6 (2.6.18.dfsg.1-23etch1) stable-security; urgency=high * Fix missing boundary checks in syscall/syscall32_nopage(): - bugfix/add-install_special_mapping.patch - bugfix/i386-vdso-use_install_special_mapping.patch - bugfix/x86_64-ia32-vDSO-use-install_special_mapping.patch - features/all/xen/vdso-use_install_special_mapping.patch See CVE-2008-3527 * Modify feature patches to apply on top of the fixes for CVE-2008-3527: - features/all/vserver/vs2.0.2.2-rc9.patch - features/all/xen/fedora-2.6.18-36186.patch - features/all/xen/vserver-update.patch * Don't allow splicing to files opened with O_APPEND: - bugfix/dont-allow-splice-to-files-opened-with-O_APPEND.patch See CVE-2008-4554 * Avoid printk floods when reading corrupted ext[2,3] directories - bugfix/ext2-avoid-corrupted-directory-printk-floods.patch - bugfix/ext3-avoid-corrupted-directory-printk-floods.patch See CVE-2008-3528 * Fix oops in SCTP - bugfix/sctp-fix-oops-when-INIT-ACK-indicates-that-peer-doesnt-support-AUTH.patch See CVE-2008-4576 * Fix buffer overflow in hfsplus - bugfix/hfsplus-fix-Buffer-overflow-with-a-corrupted-image.patch See CVE-2008-4933 * Fix BUG() in hfsplus - bugfix/hfsplus-check_read_mapping_page-return-value.patch See CVE-2008-4934 * Fix stack corruption in hfs - bugfix/hfs-fix-namelength-memory-corruption.patch See CVE-2008-5025 * Fix recursive descent in __scm_destroy - bugfix/af_unix-fix-garbage-collector-races.patch - bugfix/af_unix-convert-socks-to-unix_socks.patch - bugfix/net-unix-fix-inflight-counting-bug-in-garbage-collector.patch - bugfix/net-fix-recursive-descent-in-__scm_destroy.patch See CVE-2008-5029 * Make sendmsg() block during UNIX garbage collection: - bugfix/net-unix-gc-fix-soft-lockups-oom-issues.patch See CVE-2008-5300 * Fix DoS when calling svc_listen twice on the same socket while reading /proc/net/atm/*vc: - bugfix/atm-duplicate-listen-on-socket-corrupts-the-vcc-table.patch See CVE-2008-5079 * Fix race conditions between inotify removal and umount - bugfix/inotify-watch-removal-umount-races.patch See CVE-2008-5182 stable/main/binary-arm/linux-image-2.6.18-6-ixp4xx_2.6.18.dfsg.1-23etch1_arm.deb stable/main/binary-arm/linux-image-2.6.18-6-rpc_2.6.18.dfsg.1-23etch1_arm.deb stable/main/binary-arm/linux-headers-2.6.18-6-footbridge_2.6.18.dfsg.1-23etch1_arm.deb stable/main/binary-arm/linux-headers-2.6.18-6-rpc_2.6.18.dfsg.1-23etch1_arm.deb stable/main/binary-arm/linux-headers-2.6.18-6-iop32x_2.6.18.dfsg.1-23etch1_arm.deb stable/main/binary-arm/linux-image-2.6.18-6-s3c2410_2.6.18.dfsg.1-23etch1_arm.deb stable/main/binary-arm/linux-headers-2.6.18-6-ixp4xx_2.6.18.dfsg.1-23etch1_arm.deb stable/main/binary-arm/linux-image-2.6.18-6-iop32x_2.6.18.dfsg.1-23etch1_arm.deb stable/main/binary-arm/linux-headers-2.6.18-6_2.6.18.dfsg.1-23etch1_arm.deb stable/main/binary-arm/linux-headers-2.6.18-6-all_2.6.18.dfsg.1-23etch1_arm.deb stable/main/binary-arm/linux-headers-2.6.18-6-s3c2410_2.6.18.dfsg.1-23etch1_arm.deb stable/main/binary-arm/linux-image-2.6.18-6-footbridge_2.6.18.dfsg.1-23etch1_arm.deb stable/main/binary-arm/linux-headers-2.6.18-6-all-arm_2.6.18.dfsg.1-23etch1_arm.deb linux-2.6 (2.6.18.dfsg.1-23etch1) stable-security; urgency=high * Fix missing boundary checks in syscall/syscall32_nopage(): - bugfix/add-install_special_mapping.patch - bugfix/i386-vdso-use_install_special_mapping.patch - bugfix/x86_64-ia32-vDSO-use-install_special_mapping.patch - features/all/xen/vdso-use_install_special_mapping.patch See CVE-2008-3527 * Modify feature patches to apply on top of the fixes for CVE-2008-3527: - features/all/vserver/vs2.0.2.2-rc9.patch - features/all/xen/fedora-2.6.18-36186.patch - features/all/xen/vserver-update.patch * Don't allow splicing to files opened with O_APPEND: - bugfix/dont-allow-splice-to-files-opened-with-O_APPEND.patch See CVE-2008-4554 * Avoid printk floods when reading corrupted ext[2,3] directories - bugfix/ext2-avoid-corrupted-directory-printk-floods.patch - bugfix/ext3-avoid-corrupted-directory-printk-floods.patch See CVE-2008-3528 * Fix oops in SCTP - bugfix/sctp-fix-oops-when-INIT-ACK-indicates-that-peer-doesnt-support-AUTH.patch See CVE-2008-4576 * Fix buffer overflow in hfsplus - bugfix/hfsplus-fix-Buffer-overflow-with-a-corrupted-image.patch See CVE-2008-4933 * Fix BUG() in hfsplus - bugfix/hfsplus-check_read_mapping_page-return-value.patch See CVE-2008-4934 * Fix stack corruption in hfs - bugfix/hfs-fix-namelength-memory-corruption.patch See CVE-2008-5025 * Fix recursive descent in __scm_destroy - bugfix/af_unix-fix-garbage-collector-races.patch - bugfix/af_unix-convert-socks-to-unix_socks.patch - bugfix/net-unix-fix-inflight-counting-bug-in-garbage-collector.patch - bugfix/net-fix-recursive-descent-in-__scm_destroy.patch See CVE-2008-5029 * Make sendmsg() block during UNIX garbage collection: - bugfix/net-unix-gc-fix-soft-lockups-oom-issues.patch See CVE-2008-5300 * Fix DoS when calling svc_listen twice on the same socket while reading /proc/net/atm/*vc: - bugfix/atm-duplicate-listen-on-socket-corrupts-the-vcc-table.patch See CVE-2008-5079 * Fix race conditions between inotify removal and umount - bugfix/inotify-watch-removal-umount-races.patch See CVE-2008-5182 stable/main/binary-alpha/linux-headers-2.6.18-6-alpha-generic_2.6.18.dfsg.1-23etch1_alpha.deb stable/main/binary-alpha/linux-image-2.6.18-6-alpha-legacy_2.6.18.dfsg.1-23etch1_alpha.deb stable/main/binary-alpha/linux-image-2.6.18-6-alpha-generic_2.6.18.dfsg.1-23etch1_alpha.deb stable/main/binary-alpha/linux-headers-2.6.18-6-vserver-alpha_2.6.18.dfsg.1-23etch1_alpha.deb stable/main/binary-alpha/linux-image-2.6.18-6-vserver-alpha_2.6.18.dfsg.1-23etch1_alpha.deb stable/main/binary-alpha/linux-headers-2.6.18-6-all_2.6.18.dfsg.1-23etch1_alpha.deb stable/main/binary-alpha/linux-headers-2.6.18-6-all-alpha_2.6.18.dfsg.1-23etch1_alpha.deb stable/main/binary-alpha/linux-headers-2.6.18-6_2.6.18.dfsg.1-23etch1_alpha.deb stable/main/binary-alpha/linux-headers-2.6.18-6-alpha-smp_2.6.18.dfsg.1-23etch1_alpha.deb stable/main/binary-alpha/linux-headers-2.6.18-6-vserver_2.6.18.dfsg.1-23etch1_alpha.deb stable/main/binary-alpha/linux-image-2.6.18-6-alpha-smp_2.6.18.dfsg.1-23etch1_alpha.deb stable/main/binary-alpha/linux-headers-2.6.18-6-alpha-legacy_2.6.18.dfsg.1-23etch1_alpha.deb linux-2.6 (2.6.18.dfsg.1-23etch1) stable-security; urgency=high * Fix missing boundary checks in syscall/syscall32_nopage(): - bugfix/add-install_special_mapping.patch - bugfix/i386-vdso-use_install_special_mapping.patch - bugfix/x86_64-ia32-vDSO-use-install_special_mapping.patch - features/all/xen/vdso-use_install_special_mapping.patch See CVE-2008-3527 * Modify feature patches to apply on top of the fixes for CVE-2008-3527: - features/all/vserver/vs2.0.2.2-rc9.patch - features/all/xen/fedora-2.6.18-36186.patch - features/all/xen/vserver-update.patch * Don't allow splicing to files opened with O_APPEND: - bugfix/dont-allow-splice-to-files-opened-with-O_APPEND.patch See CVE-2008-4554 * Avoid printk floods when reading corrupted ext[2,3] directories - bugfix/ext2-avoid-corrupted-directory-printk-floods.patch - bugfix/ext3-avoid-corrupted-directory-printk-floods.patch See CVE-2008-3528 * Fix oops in SCTP - bugfix/sctp-fix-oops-when-INIT-ACK-indicates-that-peer-doesnt-support-AUTH.patch See CVE-2008-4576 * Fix buffer overflow in hfsplus - bugfix/hfsplus-fix-Buffer-overflow-with-a-corrupted-image.patch See CVE-2008-4933 * Fix BUG() in hfsplus - bugfix/hfsplus-check_read_mapping_page-return-value.patch See CVE-2008-4934 * Fix stack corruption in hfs - bugfix/hfs-fix-namelength-memory-corruption.patch See CVE-2008-5025 * Fix recursive descent in __scm_destroy - bugfix/af_unix-fix-garbage-collector-races.patch - bugfix/af_unix-convert-socks-to-unix_socks.patch - bugfix/net-unix-fix-inflight-counting-bug-in-garbage-collector.patch - bugfix/net-fix-recursive-descent-in-__scm_destroy.patch See CVE-2008-5029 * Make sendmsg() block during UNIX garbage collection: - bugfix/net-unix-gc-fix-soft-lockups-oom-issues.patch See CVE-2008-5300 * Fix DoS when calling svc_listen twice on the same socket while reading /proc/net/atm/*vc: - bugfix/atm-duplicate-listen-on-socket-corrupts-the-vcc-table.patch See CVE-2008-5079 * Fix race conditions between inotify removal and umount - bugfix/inotify-watch-removal-umount-races.patch See CVE-2008-5182 stable/main/binary-amd64/linux-headers-2.6.18-6_2.6.18.dfsg.1-23etch1_amd64.deb stable/main/binary-amd64/linux-modules-2.6.18-6-xen-amd64_2.6.18.dfsg.1-23etch1_amd64.deb stable/main/binary-amd64/linux-image-2.6.18-6-vserver-amd64_2.6.18.dfsg.1-23etch1_amd64.deb stable/main/binary-all/linux-patch-debian-2.6.18_2.6.18.dfsg.1-23etch1_all.deb stable/main/binary-amd64/linux-headers-2.6.18-6-all-amd64_2.6.18.dfsg.1-23etch1_amd64.deb stable/main/binary-amd64/linux-headers-2.6.18-6-vserver-amd64_2.6.18.dfsg.1-23etch1_amd64.deb stable/main/binary-amd64/linux-headers-2.6.18-6-vserver_2.6.18.dfsg.1-23etch1_amd64.deb stable/main/binary-all/linux-tree-2.6.18_2.6.18.dfsg.1-23etch1_all.deb stable/main/binary-amd64/linux-image-2.6.18-6-amd64_2.6.18.dfsg.1-23etch1_amd64.deb stable/main/binary-amd64/linux-headers-2.6.18-6-xen_2.6.18.dfsg.1-23etch1_amd64.deb stable/main/source/linux-2.6_2.6.18.dfsg.1-23etch1.dsc stable/main/binary-all/linux-doc-2.6.18_2.6.18.dfsg.1-23etch1_all.deb stable/main/binary-amd64/linux-headers-2.6.18-6-xen-amd64_2.6.18.dfsg.1-23etch1_amd64.deb stable/main/binary-amd64/linux-headers-2.6.18-6-all_2.6.18.dfsg.1-23etch1_amd64.deb stable/main/binary-amd64/linux-headers-2.6.18-6-xen-vserver-amd64_2.6.18.dfsg.1-23etch1_amd64.deb stable/main/binary-amd64/linux-headers-2.6.18-6-amd64_2.6.18.dfsg.1-23etch1_amd64.deb stable/main/binary-amd64/linux-headers-2.6.18-6-xen-vserver_2.6.18.dfsg.1-23etch1_amd64.deb stable/main/binary-amd64/linux-image-2.6.18-6-xen-amd64_2.6.18.dfsg.1-23etch1_amd64.deb stable/main/binary-amd64/linux-modules-2.6.18-6-xen-vserver-amd64_2.6.18.dfsg.1-23etch1_amd64.deb stable/main/binary-all/linux-source-2.6.18_2.6.18.dfsg.1-23etch1_all.deb stable/main/binary-amd64/linux-image-2.6.18-6-xen-vserver-amd64_2.6.18.dfsg.1-23etch1_amd64.deb stable/main/binary-all/linux-manual-2.6.18_2.6.18.dfsg.1-23etch1_all.deb stable/main/binary-amd64/xen-linux-system-2.6.18-6-xen-amd64_2.6.18.dfsg.1-23etch1_amd64.deb stable/main/source/linux-2.6_2.6.18.dfsg.1-23etch1.diff.gz stable/main/binary-all/linux-support-2.6.18-6_2.6.18.dfsg.1-23etch1_all.deb stable/main/binary-amd64/xen-linux-system-2.6.18-6-xen-vserver-amd64_2.6.18.dfsg.1-23etch1_amd64.deb linux-2.6 (2.6.18.dfsg.1-23etch1) stable-security; urgency=high * Fix missing boundary checks in syscall/syscall32_nopage(): - bugfix/add-install_special_mapping.patch - bugfix/i386-vdso-use_install_special_mapping.patch - bugfix/x86_64-ia32-vDSO-use-install_special_mapping.patch - features/all/xen/vdso-use_install_special_mapping.patch See CVE-2008-3527 * Modify feature patches to apply on top of the fixes for CVE-2008-3527: - features/all/vserver/vs2.0.2.2-rc9.patch - features/all/xen/fedora-2.6.18-36186.patch - features/all/xen/vserver-update.patch * Don't allow splicing to files opened with O_APPEND: - bugfix/dont-allow-splice-to-files-opened-with-O_APPEND.patch See CVE-2008-4554 * Avoid printk floods when reading corrupted ext[2,3] directories - bugfix/ext2-avoid-corrupted-directory-printk-floods.patch - bugfix/ext3-avoid-corrupted-directory-printk-floods.patch See CVE-2008-3528 * Fix oops in SCTP - bugfix/sctp-fix-oops-when-INIT-ACK-indicates-that-peer-doesnt-support-AUTH.patch See CVE-2008-4576 * Fix buffer overflow in hfsplus - bugfix/hfsplus-fix-Buffer-overflow-with-a-corrupted-image.patch See CVE-2008-4933 * Fix BUG() in hfsplus - bugfix/hfsplus-check_read_mapping_page-return-value.patch See CVE-2008-4934 * Fix stack corruption in hfs - bugfix/hfs-fix-namelength-memory-corruption.patch See CVE-2008-5025 * Fix recursive descent in __scm_destroy - bugfix/af_unix-fix-garbage-collector-races.patch - bugfix/af_unix-convert-socks-to-unix_socks.patch - bugfix/net-unix-fix-inflight-counting-bug-in-garbage-collector.patch - bugfix/net-fix-recursive-descent-in-__scm_destroy.patch See CVE-2008-5029 * Make sendmsg() block during UNIX garbage collection: - bugfix/net-unix-gc-fix-soft-lockups-oom-issues.patch See CVE-2008-5300 * Fix DoS when calling svc_listen twice on the same socket while reading /proc/net/atm/*vc: - bugfix/atm-duplicate-listen-on-socket-corrupts-the-vcc-table.patch See CVE-2008-5079 * Fix race conditions between inotify removal and umount - bugfix/inotify-watch-removal-umount-races.patch See CVE-2008-5182 stable/main/binary-sparc/libxml2-dbg_2.6.27.dfsg-6_sparc.deb stable/main/binary-sparc/libxml2-dev_2.6.27.dfsg-6_sparc.deb stable/main/binary-sparc/libxml2_2.6.27.dfsg-6_sparc.deb stable/main/binary-sparc/python-libxml2_2.6.27.dfsg-6_sparc.deb stable/main/binary-sparc/libxml2-utils_2.6.27.dfsg-6_sparc.deb libxml2 (2.6.27.dfsg-6) stable-security; urgency=high * parserInternals.c: apply patch from upstream revision 3741 to avoid double-free in some situations. This fixes a crash while running the W3C/OASIS XML conformance test. * tree.c: Fix infinite loop. Fixes: CVE-2008-4225. * SAX2.c: Fix integer overflow. Fixes: CVE-2008-4226. stable/main/binary-s390/libxml2-utils_2.6.27.dfsg-6_s390.deb stable/main/binary-s390/libxml2-dev_2.6.27.dfsg-6_s390.deb stable/main/binary-s390/libxml2-dbg_2.6.27.dfsg-6_s390.deb stable/main/binary-s390/libxml2_2.6.27.dfsg-6_s390.deb stable/main/binary-s390/python-libxml2_2.6.27.dfsg-6_s390.deb libxml2 (2.6.27.dfsg-6) stable-security; urgency=high * parserInternals.c: apply patch from upstream revision 3741 to avoid double-free in some situations. This fixes a crash while running the W3C/OASIS XML conformance test. * tree.c: Fix infinite loop. Fixes: CVE-2008-4225. * SAX2.c: Fix integer overflow. Fixes: CVE-2008-4226. stable/main/binary-powerpc/libxml2_2.6.27.dfsg-6_powerpc.deb stable/main/binary-powerpc/python-libxml2_2.6.27.dfsg-6_powerpc.deb stable/main/binary-powerpc/libxml2-utils_2.6.27.dfsg-6_powerpc.deb stable/main/binary-powerpc/libxml2-dev_2.6.27.dfsg-6_powerpc.deb stable/main/binary-powerpc/libxml2-dbg_2.6.27.dfsg-6_powerpc.deb libxml2 (2.6.27.dfsg-6) stable-security; urgency=high * parserInternals.c: apply patch from upstream revision 3741 to avoid double-free in some situations. This fixes a crash while running the W3C/OASIS XML conformance test. * tree.c: Fix infinite loop. Fixes: CVE-2008-4225. * SAX2.c: Fix integer overflow. Fixes: CVE-2008-4226. stable/main/binary-mipsel/libxml2-utils_2.6.27.dfsg-6_mipsel.deb stable/main/binary-mipsel/libxml2_2.6.27.dfsg-6_mipsel.deb stable/main/binary-mipsel/libxml2-dev_2.6.27.dfsg-6_mipsel.deb stable/main/binary-mipsel/python-libxml2_2.6.27.dfsg-6_mipsel.deb stable/main/binary-mipsel/libxml2-dbg_2.6.27.dfsg-6_mipsel.deb libxml2 (2.6.27.dfsg-6) stable-security; urgency=high * parserInternals.c: apply patch from upstream revision 3741 to avoid double-free in some situations. This fixes a crash while running the W3C/OASIS XML conformance test. * tree.c: Fix infinite loop. Fixes: CVE-2008-4225. * SAX2.c: Fix integer overflow. Fixes: CVE-2008-4226. stable/main/binary-mips/libxml2-utils_2.6.27.dfsg-6_mips.deb stable/main/binary-mips/libxml2_2.6.27.dfsg-6_mips.deb stable/main/binary-mips/libxml2-dev_2.6.27.dfsg-6_mips.deb stable/main/binary-mips/python-libxml2_2.6.27.dfsg-6_mips.deb stable/main/binary-mips/libxml2-dbg_2.6.27.dfsg-6_mips.deb libxml2 (2.6.27.dfsg-6) stable-security; urgency=high * parserInternals.c: apply patch from upstream revision 3741 to avoid double-free in some situations. This fixes a crash while running the W3C/OASIS XML conformance test. * tree.c: Fix infinite loop. Fixes: CVE-2008-4225. * SAX2.c: Fix integer overflow. Fixes: CVE-2008-4226. stable/main/binary-ia64/python-libxml2_2.6.27.dfsg-6_ia64.deb stable/main/binary-ia64/libxml2-dev_2.6.27.dfsg-6_ia64.deb stable/main/binary-ia64/libxml2-dbg_2.6.27.dfsg-6_ia64.deb stable/main/binary-ia64/libxml2_2.6.27.dfsg-6_ia64.deb stable/main/binary-ia64/libxml2-utils_2.6.27.dfsg-6_ia64.deb libxml2 (2.6.27.dfsg-6) stable-security; urgency=high * parserInternals.c: apply patch from upstream revision 3741 to avoid double-free in some situations. This fixes a crash while running the W3C/OASIS XML conformance test. * tree.c: Fix infinite loop. Fixes: CVE-2008-4225. * SAX2.c: Fix integer overflow. Fixes: CVE-2008-4226. stable/main/binary-i386/python-libxml2_2.6.27.dfsg-6_i386.deb stable/main/binary-i386/libxml2-dev_2.6.27.dfsg-6_i386.deb stable/main/binary-i386/libxml2-dbg_2.6.27.dfsg-6_i386.deb stable/main/binary-i386/libxml2_2.6.27.dfsg-6_i386.deb stable/main/binary-i386/libxml2-utils_2.6.27.dfsg-6_i386.deb libxml2 (2.6.27.dfsg-6) stable-security; urgency=high * parserInternals.c: apply patch from upstream revision 3741 to avoid double-free in some situations. This fixes a crash while running the W3C/OASIS XML conformance test. * tree.c: Fix infinite loop. Fixes: CVE-2008-4225. * SAX2.c: Fix integer overflow. Fixes: CVE-2008-4226. stable/main/binary-hppa/libxml2-dev_2.6.27.dfsg-6_hppa.deb stable/main/binary-hppa/libxml2-dbg_2.6.27.dfsg-6_hppa.deb stable/main/binary-hppa/libxml2_2.6.27.dfsg-6_hppa.deb stable/main/binary-hppa/libxml2-utils_2.6.27.dfsg-6_hppa.deb stable/main/binary-hppa/python-libxml2_2.6.27.dfsg-6_hppa.deb libxml2 (2.6.27.dfsg-6) stable-security; urgency=high * parserInternals.c: apply patch from upstream revision 3741 to avoid double-free in some situations. This fixes a crash while running the W3C/OASIS XML conformance test. * tree.c: Fix infinite loop. Fixes: CVE-2008-4225. * SAX2.c: Fix integer overflow. Fixes: CVE-2008-4226. stable/main/binary-arm/libxml2-dev_2.6.27.dfsg-6_arm.deb stable/main/binary-arm/libxml2-dbg_2.6.27.dfsg-6_arm.deb stable/main/binary-arm/libxml2-utils_2.6.27.dfsg-6_arm.deb stable/main/binary-arm/libxml2_2.6.27.dfsg-6_arm.deb stable/main/binary-arm/python-libxml2_2.6.27.dfsg-6_arm.deb libxml2 (2.6.27.dfsg-6) stable-security; urgency=high * parserInternals.c: apply patch from upstream revision 3741 to avoid double-free in some situations. This fixes a crash while running the W3C/OASIS XML conformance test. * tree.c: Fix infinite loop. Fixes: CVE-2008-4225. * SAX2.c: Fix integer overflow. Fixes: CVE-2008-4226. stable/main/binary-alpha/libxml2-utils_2.6.27.dfsg-6_alpha.deb stable/main/binary-alpha/libxml2_2.6.27.dfsg-6_alpha.deb stable/main/binary-alpha/libxml2-dbg_2.6.27.dfsg-6_alpha.deb stable/main/binary-alpha/python-libxml2_2.6.27.dfsg-6_alpha.deb stable/main/binary-alpha/libxml2-dev_2.6.27.dfsg-6_alpha.deb libxml2 (2.6.27.dfsg-6) stable-security; urgency=high * parserInternals.c: apply patch from upstream revision 3741 to avoid double-free in some situations. This fixes a crash while running the W3C/OASIS XML conformance test. * tree.c: Fix infinite loop. Fixes: CVE-2008-4225. * SAX2.c: Fix integer overflow. Fixes: CVE-2008-4226. stable/main/source/libxml2_2.6.27.dfsg-6.dsc stable/main/binary-amd64/libxml2-utils_2.6.27.dfsg-6_amd64.deb stable/main/binary-all/libxml2-doc_2.6.27.dfsg-6_all.deb stable/main/binary-amd64/libxml2_2.6.27.dfsg-6_amd64.deb stable/main/source/libxml2_2.6.27.dfsg-6.diff.gz stable/main/binary-amd64/libxml2-dev_2.6.27.dfsg-6_amd64.deb stable/main/binary-amd64/libxml2-dbg_2.6.27.dfsg-6_amd64.deb stable/main/binary-amd64/python-libxml2_2.6.27.dfsg-6_amd64.deb libxml2 (2.6.27.dfsg-6) stable-security; urgency=high * parserInternals.c: apply patch from upstream revision 3741 to avoid double-free in some situations. This fixes a crash while running the W3C/OASIS XML conformance test. * tree.c: Fix infinite loop. Fixes: CVE-2008-4225. * SAX2.c: Fix integer overflow. Fixes: CVE-2008-4226. stable/main/binary-sparc/spfquery_1.2.5-4+etch1_sparc.deb stable/main/binary-sparc/libspf2-dev_1.2.5-4+etch1_sparc.deb stable/main/binary-sparc/libspf2-2_1.2.5-4+etch1_sparc.deb libspf2 (1.2.5-4+etch1) stable-security; urgency=high * [CVE-2008-2469] 50_dns_resolv_bufoverflow.dpatch: Fix buffer overflows in DNS response parsing. stable/main/binary-s390/libspf2-2_1.2.5-4+etch1_s390.deb stable/main/binary-s390/spfquery_1.2.5-4+etch1_s390.deb stable/main/binary-s390/libspf2-dev_1.2.5-4+etch1_s390.deb libspf2 (1.2.5-4+etch1) stable-security; urgency=high * [CVE-2008-2469] 50_dns_resolv_bufoverflow.dpatch: Fix buffer overflows in DNS response parsing. stable/main/binary-powerpc/libspf2-dev_1.2.5-4+etch1_powerpc.deb stable/main/binary-powerpc/spfquery_1.2.5-4+etch1_powerpc.deb stable/main/binary-powerpc/libspf2-2_1.2.5-4+etch1_powerpc.deb libspf2 (1.2.5-4+etch1) stable-security; urgency=high * [CVE-2008-2469] 50_dns_resolv_bufoverflow.dpatch: Fix buffer overflows in DNS response parsing. stable/main/binary-mipsel/spfquery_1.2.5-4+etch1_mipsel.deb stable/main/binary-mipsel/libspf2-2_1.2.5-4+etch1_mipsel.deb stable/main/binary-mipsel/libspf2-dev_1.2.5-4+etch1_mipsel.deb libspf2 (1.2.5-4+etch1) stable-security; urgency=high * [CVE-2008-2469] 50_dns_resolv_bufoverflow.dpatch: Fix buffer overflows in DNS response parsing. stable/main/binary-mips/libspf2-2_1.2.5-4+etch1_mips.deb stable/main/binary-mips/libspf2-dev_1.2.5-4+etch1_mips.deb stable/main/binary-mips/spfquery_1.2.5-4+etch1_mips.deb libspf2 (1.2.5-4+etch1) stable-security; urgency=high * [CVE-2008-2469] 50_dns_resolv_bufoverflow.dpatch: Fix buffer overflows in DNS response parsing. stable/main/binary-ia64/libspf2-2_1.2.5-4+etch1_ia64.deb stable/main/binary-ia64/spfquery_1.2.5-4+etch1_ia64.deb stable/main/binary-ia64/libspf2-dev_1.2.5-4+etch1_ia64.deb libspf2 (1.2.5-4+etch1) stable-security; urgency=high * [CVE-2008-2469] 50_dns_resolv_bufoverflow.dpatch: Fix buffer overflows in DNS response parsing. stable/main/binary-i386/spfquery_1.2.5-4+etch1_i386.deb stable/main/binary-i386/libspf2-dev_1.2.5-4+etch1_i386.deb stable/main/binary-i386/libspf2-2_1.2.5-4+etch1_i386.deb libspf2 (1.2.5-4+etch1) stable-security; urgency=high * [CVE-2008-2469] 50_dns_resolv_bufoverflow.dpatch: Fix buffer overflows in DNS response parsing. stable/main/binary-hppa/libspf2-2_1.2.5-4+etch1_hppa.deb stable/main/binary-hppa/spfquery_1.2.5-4+etch1_hppa.deb stable/main/binary-hppa/libspf2-dev_1.2.5-4+etch1_hppa.deb libspf2 (1.2.5-4+etch1) stable-security; urgency=high * [CVE-2008-2469] 50_dns_resolv_bufoverflow.dpatch: Fix buffer overflows in DNS response parsing. stable/main/binary-arm/libspf2-2_1.2.5-4+etch1_arm.deb stable/main/binary-arm/spfquery_1.2.5-4+etch1_arm.deb stable/main/binary-arm/libspf2-dev_1.2.5-4+etch1_arm.deb libspf2 (1.2.5-4+etch1) stable-security; urgency=high * [CVE-2008-2469] 50_dns_resolv_bufoverflow.dpatch: Fix buffer overflows in DNS response parsing. stable/main/binary-alpha/libspf2-2_1.2.5-4+etch1_alpha.deb stable/main/binary-alpha/spfquery_1.2.5-4+etch1_alpha.deb stable/main/binary-alpha/libspf2-dev_1.2.5-4+etch1_alpha.deb libspf2 (1.2.5-4+etch1) stable-security; urgency=high * [CVE-2008-2469] 50_dns_resolv_bufoverflow.dpatch: Fix buffer overflows in DNS response parsing. stable/main/binary-amd64/libspf2-2_1.2.5-4+etch1_amd64.deb stable/main/binary-amd64/libspf2-dev_1.2.5-4+etch1_amd64.deb stable/main/source/libspf2_1.2.5-4+etch1.dsc stable/main/source/libspf2_1.2.5-4+etch1.diff.gz stable/main/binary-amd64/spfquery_1.2.5-4+etch1_amd64.deb libspf2 (1.2.5-4+etch1) stable-security; urgency=high * [CVE-2008-2469] 50_dns_resolv_bufoverflow.dpatch: Fix buffer overflows in DNS response parsing. stable/main/binary-sparc/libhdate1_1.4.8-2_sparc.deb stable/main/binary-sparc/libhdate-dev_1.4.8-2_sparc.deb stable/main/binary-sparc/libhdate-perl_1.4.8-2_sparc.deb stable/main/binary-sparc/libhdate-python_1.4.8-2_sparc.deb libhdate (1.4.8-2) stable-proposed-updates; urgency=low * Remove the libhdate-pascal due to licensing issues stable/main/binary-s390/libhdate-dev_1.4.8-2_s390.deb stable/main/binary-s390/libhdate1_1.4.8-2_s390.deb stable/main/binary-s390/libhdate-python_1.4.8-2_s390.deb stable/main/binary-s390/libhdate-perl_1.4.8-2_s390.deb libhdate (1.4.8-2) stable-proposed-updates; urgency=low * Remove the libhdate-pascal due to licensing issues stable/main/binary-powerpc/libhdate-perl_1.4.8-2_powerpc.deb stable/main/binary-powerpc/libhdate1_1.4.8-2_powerpc.deb stable/main/binary-powerpc/libhdate-python_1.4.8-2_powerpc.deb stable/main/binary-powerpc/libhdate-dev_1.4.8-2_powerpc.deb libhdate (1.4.8-2) stable-proposed-updates; urgency=low * Remove the libhdate-pascal due to licensing issues stable/main/binary-mipsel/libhdate1_1.4.8-2_mipsel.deb stable/main/binary-mipsel/libhdate-perl_1.4.8-2_mipsel.deb stable/main/binary-mipsel/libhdate-dev_1.4.8-2_mipsel.deb stable/main/binary-mipsel/libhdate-python_1.4.8-2_mipsel.deb libhdate (1.4.8-2) stable-proposed-updates; urgency=low * Remove the libhdate-pascal due to licensing issues stable/main/binary-mips/libhdate-python_1.4.8-2_mips.deb stable/main/binary-mips/libhdate1_1.4.8-2_mips.deb stable/main/binary-mips/libhdate-dev_1.4.8-2_mips.deb stable/main/binary-mips/libhdate-perl_1.4.8-2_mips.deb libhdate (1.4.8-2) stable-proposed-updates; urgency=low * Remove the libhdate-pascal due to licensing issues stable/main/binary-ia64/libhdate-perl_1.4.8-2_ia64.deb stable/main/binary-ia64/libhdate-dev_1.4.8-2_ia64.deb stable/main/binary-ia64/libhdate1_1.4.8-2_ia64.deb stable/main/binary-ia64/libhdate-python_1.4.8-2_ia64.deb libhdate (1.4.8-2) stable-proposed-updates; urgency=low * Remove the libhdate-pascal due to licensing issues stable/main/binary-hppa/libhdate-dev_1.4.8-2_hppa.deb stable/main/binary-hppa/libhdate-python_1.4.8-2_hppa.deb stable/main/binary-hppa/libhdate1_1.4.8-2_hppa.deb stable/main/binary-hppa/libhdate-perl_1.4.8-2_hppa.deb libhdate (1.4.8-2) stable-proposed-updates; urgency=low * Remove the libhdate-pascal due to licensing issues stable/main/binary-arm/libhdate-dev_1.4.8-2_arm.deb stable/main/binary-arm/libhdate-python_1.4.8-2_arm.deb stable/main/binary-arm/libhdate1_1.4.8-2_arm.deb stable/main/binary-arm/libhdate-perl_1.4.8-2_arm.deb libhdate (1.4.8-2) stable-proposed-updates; urgency=low * Remove the libhdate-pascal due to licensing issues stable/main/binary-amd64/libhdate-python_1.4.8-2_amd64.deb stable/main/binary-amd64/libhdate1_1.4.8-2_amd64.deb stable/main/binary-amd64/libhdate-dev_1.4.8-2_amd64.deb stable/main/binary-amd64/libhdate-perl_1.4.8-2_amd64.deb libhdate (1.4.8-2) stable-proposed-updates; urgency=low * Remove the libhdate-pascal due to licensing issues stable/main/binary-alpha/libhdate-dev_1.4.8-2_alpha.deb stable/main/binary-alpha/libhdate-python_1.4.8-2_alpha.deb stable/main/binary-alpha/libhdate1_1.4.8-2_alpha.deb stable/main/binary-alpha/libhdate-perl_1.4.8-2_alpha.deb libhdate (1.4.8-2) stable-proposed-updates; urgency=low * Remove the libhdate-pascal due to licensing issues stable/main/source/libhdate_1.4.8-2.dsc stable/main/binary-i386/libhdate-dev_1.4.8-2_i386.deb stable/main/binary-i386/libhdate1_1.4.8-2_i386.deb stable/main/binary-i386/libhdate-perl_1.4.8-2_i386.deb stable/main/source/libhdate_1.4.8-2.diff.gz stable/main/binary-i386/libhdate-python_1.4.8-2_i386.deb libhdate (1.4.8-2) stable-proposed-updates; urgency=low * Remove the libhdate-pascal due to licensing issues stable/main/binary-sparc/libcdaudio-dev_0.99.12p2-2+etch1_sparc.deb stable/main/binary-sparc/libcdaudio1_0.99.12p2-2+etch1_sparc.deb libcdaudio (0.99.12p2-2+etch1) stable-security; urgency=high * Fix buffer overflow in CDDB interface (CVE-2008-5030) stable/main/binary-s390/libcdaudio-dev_0.99.12p2-2+etch1_s390.deb stable/main/binary-s390/libcdaudio1_0.99.12p2-2+etch1_s390.deb libcdaudio (0.99.12p2-2+etch1) stable-security; urgency=high * Fix buffer overflow in CDDB interface (CVE-2008-5030) stable/main/binary-powerpc/libcdaudio-dev_0.99.12p2-2+etch1_powerpc.deb stable/main/binary-powerpc/libcdaudio1_0.99.12p2-2+etch1_powerpc.deb libcdaudio (0.99.12p2-2+etch1) stable-security; urgency=high * Fix buffer overflow in CDDB interface (CVE-2008-5030) stable/main/binary-mipsel/libcdaudio-dev_0.99.12p2-2+etch1_mipsel.deb stable/main/binary-mipsel/libcdaudio1_0.99.12p2-2+etch1_mipsel.deb libcdaudio (0.99.12p2-2+etch1) stable-security; urgency=high * Fix buffer overflow in CDDB interface (CVE-2008-5030) stable/main/binary-mips/libcdaudio-dev_0.99.12p2-2+etch1_mips.deb stable/main/binary-mips/libcdaudio1_0.99.12p2-2+etch1_mips.deb libcdaudio (0.99.12p2-2+etch1) stable-security; urgency=high * Fix buffer overflow in CDDB interface (CVE-2008-5030) stable/main/binary-ia64/libcdaudio1_0.99.12p2-2+etch1_ia64.deb stable/main/binary-ia64/libcdaudio-dev_0.99.12p2-2+etch1_ia64.deb libcdaudio (0.99.12p2-2+etch1) stable-security; urgency=high * Fix buffer overflow in CDDB interface (CVE-2008-5030) stable/main/binary-hppa/libcdaudio1_0.99.12p2-2+etch1_hppa.deb stable/main/binary-hppa/libcdaudio-dev_0.99.12p2-2+etch1_hppa.deb libcdaudio (0.99.12p2-2+etch1) stable-security; urgency=high * Fix buffer overflow in CDDB interface (CVE-2008-5030) stable/main/binary-arm/libcdaudio1_0.99.12p2-2+etch1_arm.deb stable/main/binary-arm/libcdaudio-dev_0.99.12p2-2+etch1_arm.deb libcdaudio (0.99.12p2-2+etch1) stable-security; urgency=high * Fix buffer overflow in CDDB interface (CVE-2008-5030) stable/main/binary-amd64/libcdaudio1_0.99.12p2-2+etch1_amd64.deb stable/main/binary-amd64/libcdaudio-dev_0.99.12p2-2+etch1_amd64.deb libcdaudio (0.99.12p2-2+etch1) stable-security; urgency=high * Fix buffer overflow in CDDB interface (CVE-2008-5030) stable/main/binary-alpha/libcdaudio1_0.99.12p2-2+etch1_alpha.deb stable/main/binary-alpha/libcdaudio-dev_0.99.12p2-2+etch1_alpha.deb libcdaudio (0.99.12p2-2+etch1) stable-security; urgency=high * Fix buffer overflow in CDDB interface (CVE-2008-5030) stable/main/binary-i386/libcdaudio1_0.99.12p2-2+etch1_i386.deb stable/main/source/libcdaudio_0.99.12p2-2+etch1.dsc stable/main/binary-i386/libcdaudio-dev_0.99.12p2-2+etch1_i386.deb stable/main/source/libcdaudio_0.99.12p2-2+etch1.diff.gz libcdaudio (0.99.12p2-2+etch1) stable-security; urgency=high * Fix buffer overflow in CDDB interface (CVE-2008-5030) stable/main/source/jailer_0.4-9+etch1.diff.gz stable/main/source/jailer_0.4-9+etch1.dsc stable/main/binary-all/jailer_0.4-9+etch1_all.deb jailer (0.4-9+etch1) stable-security; urgency=high * CVE-2008-5139 stable/main/binary-sparc/libimlib2_1.3.0.0debian1-4+etch2_sparc.deb stable/main/binary-sparc/libimlib2-dev_1.3.0.0debian1-4+etch2_sparc.deb imlib2 (1.3.0.0debian1-4+etch2) stable-security; urgency=high * CVE-2008-5187 stable/main/binary-s390/libimlib2_1.3.0.0debian1-4+etch2_s390.deb stable/main/binary-s390/libimlib2-dev_1.3.0.0debian1-4+etch2_s390.deb imlib2 (1.3.0.0debian1-4+etch2) stable-security; urgency=high * CVE-2008-5187 stable/main/binary-powerpc/libimlib2_1.3.0.0debian1-4+etch2_powerpc.deb stable/main/binary-powerpc/libimlib2-dev_1.3.0.0debian1-4+etch2_powerpc.deb imlib2 (1.3.0.0debian1-4+etch2) stable-security; urgency=high * CVE-2008-5187 stable/main/binary-mipsel/libimlib2_1.3.0.0debian1-4+etch2_mipsel.deb stable/main/binary-mipsel/libimlib2-dev_1.3.0.0debian1-4+etch2_mipsel.deb imlib2 (1.3.0.0debian1-4+etch2) stable-security; urgency=high * CVE-2008-5187 stable/main/binary-mips/libimlib2_1.3.0.0debian1-4+etch2_mips.deb stable/main/binary-mips/libimlib2-dev_1.3.0.0debian1-4+etch2_mips.deb imlib2 (1.3.0.0debian1-4+etch2) stable-security; urgency=high * CVE-2008-5187 stable/main/binary-ia64/libimlib2_1.3.0.0debian1-4+etch2_ia64.deb stable/main/binary-ia64/libimlib2-dev_1.3.0.0debian1-4+etch2_ia64.deb imlib2 (1.3.0.0debian1-4+etch2) stable-security; urgency=high * CVE-2008-5187 stable/main/binary-hppa/libimlib2-dev_1.3.0.0debian1-4+etch2_hppa.deb stable/main/binary-hppa/libimlib2_1.3.0.0debian1-4+etch2_hppa.deb imlib2 (1.3.0.0debian1-4+etch2) stable-security; urgency=high * CVE-2008-5187 stable/main/binary-arm/libimlib2-dev_1.3.0.0debian1-4+etch2_arm.deb stable/main/binary-arm/libimlib2_1.3.0.0debian1-4+etch2_arm.deb imlib2 (1.3.0.0debian1-4+etch2) stable-security; urgency=high * CVE-2008-5187 stable/main/binary-amd64/libimlib2-dev_1.3.0.0debian1-4+etch2_amd64.deb stable/main/binary-amd64/libimlib2_1.3.0.0debian1-4+etch2_amd64.deb imlib2 (1.3.0.0debian1-4+etch2) stable-security; urgency=high * CVE-2008-5187 stable/main/binary-alpha/libimlib2-dev_1.3.0.0debian1-4+etch2_alpha.deb stable/main/binary-alpha/libimlib2_1.3.0.0debian1-4+etch2_alpha.deb imlib2 (1.3.0.0debian1-4+etch2) stable-security; urgency=high * CVE-2008-5187 stable/main/binary-i386/libimlib2-dev_1.3.0.0debian1-4+etch2_i386.deb stable/main/binary-i386/libimlib2_1.3.0.0debian1-4+etch2_i386.deb stable/main/source/imlib2_1.3.0.0debian1-4+etch2.dsc stable/main/source/imlib2_1.3.0.0debian1-4+etch2.diff.gz imlib2 (1.3.0.0debian1-4+etch2) stable-security; urgency=high * CVE-2008-5187 stable/main/binary-sparc/iceweasel-dbg_2.0.0.18-0etch1_sparc.deb stable/main/binary-sparc/iceweasel-gnome-support_2.0.0.18-0etch1_sparc.deb stable/main/binary-sparc/iceweasel_2.0.0.18-0etch1_sparc.deb iceweasel (2.0.0.18-0etch1) stable-security; urgency=critical * New upstream security release. * Fixes mfsa 2008-47 aka CVE-2008-4582; mfsa 2008-48 aka CVE-2008-5012; mfsa 2008-49 aka CVE-2008-5013; mfsa 2008-50 aka CVE-2008-5014; mfsa 2008-52 aka CVE-2008-5017 and CVE-2008-5018; mfsa 2008-53 aka CVE-2008-5019; mfsa 2008-54 aka CVE-2008-0017; mfsa 2008-55 aka CVE-2008-5021; mfsa 2008-56 aka CVE-2008-5022; mfsa 2008-57 aka CVE-2008-5023; mfsa 2008-58 aka CVE-2008-5024. (Closes: #505558) stable/main/binary-s390/iceweasel-dbg_2.0.0.18-0etch1_s390.deb stable/main/binary-s390/iceweasel_2.0.0.18-0etch1_s390.deb stable/main/binary-s390/iceweasel-gnome-support_2.0.0.18-0etch1_s390.deb iceweasel (2.0.0.18-0etch1) stable-security; urgency=critical * New upstream security release. * Fixes mfsa 2008-47 aka CVE-2008-4582; mfsa 2008-48 aka CVE-2008-5012; mfsa 2008-49 aka CVE-2008-5013; mfsa 2008-50 aka CVE-2008-5014; mfsa 2008-52 aka CVE-2008-5017 and CVE-2008-5018; mfsa 2008-53 aka CVE-2008-5019; mfsa 2008-54 aka CVE-2008-0017; mfsa 2008-55 aka CVE-2008-5021; mfsa 2008-56 aka CVE-2008-5022; mfsa 2008-57 aka CVE-2008-5023; mfsa 2008-58 aka CVE-2008-5024. (Closes: #505558) stable/main/binary-powerpc/iceweasel-gnome-support_2.0.0.18-0etch1_powerpc.deb stable/main/binary-powerpc/iceweasel-dbg_2.0.0.18-0etch1_powerpc.deb stable/main/binary-powerpc/iceweasel_2.0.0.18-0etch1_powerpc.deb iceweasel (2.0.0.18-0etch1) stable-security; urgency=critical * New upstream security release. * Fixes mfsa 2008-47 aka CVE-2008-4582; mfsa 2008-48 aka CVE-2008-5012; mfsa 2008-49 aka CVE-2008-5013; mfsa 2008-50 aka CVE-2008-5014; mfsa 2008-52 aka CVE-2008-5017 and CVE-2008-5018; mfsa 2008-53 aka CVE-2008-5019; mfsa 2008-54 aka CVE-2008-0017; mfsa 2008-55 aka CVE-2008-5021; mfsa 2008-56 aka CVE-2008-5022; mfsa 2008-57 aka CVE-2008-5023; mfsa 2008-58 aka CVE-2008-5024. (Closes: #505558) stable/main/binary-mipsel/iceweasel-dbg_2.0.0.18-0etch1_mipsel.deb stable/main/binary-mipsel/iceweasel_2.0.0.18-0etch1_mipsel.deb stable/main/binary-mipsel/iceweasel-gnome-support_2.0.0.18-0etch1_mipsel.deb iceweasel (2.0.0.18-0etch1) stable-security; urgency=critical * New upstream security release. * Fixes mfsa 2008-47 aka CVE-2008-4582; mfsa 2008-48 aka CVE-2008-5012; mfsa 2008-49 aka CVE-2008-5013; mfsa 2008-50 aka CVE-2008-5014; mfsa 2008-52 aka CVE-2008-5017 and CVE-2008-5018; mfsa 2008-53 aka CVE-2008-5019; mfsa 2008-54 aka CVE-2008-0017; mfsa 2008-55 aka CVE-2008-5021; mfsa 2008-56 aka CVE-2008-5022; mfsa 2008-57 aka CVE-2008-5023; mfsa 2008-58 aka CVE-2008-5024. (Closes: #505558) stable/main/binary-mips/iceweasel-dbg_2.0.0.18-0etch1_mips.deb stable/main/binary-mips/iceweasel-gnome-support_2.0.0.18-0etch1_mips.deb stable/main/binary-mips/iceweasel_2.0.0.18-0etch1_mips.deb iceweasel (2.0.0.18-0etch1) stable-security; urgency=critical * New upstream security release. * Fixes mfsa 2008-47 aka CVE-2008-4582; mfsa 2008-48 aka CVE-2008-5012; mfsa 2008-49 aka CVE-2008-5013; mfsa 2008-50 aka CVE-2008-5014; mfsa 2008-52 aka CVE-2008-5017 and CVE-2008-5018; mfsa 2008-53 aka CVE-2008-5019; mfsa 2008-54 aka CVE-2008-0017; mfsa 2008-55 aka CVE-2008-5021; mfsa 2008-56 aka CVE-2008-5022; mfsa 2008-57 aka CVE-2008-5023; mfsa 2008-58 aka CVE-2008-5024. (Closes: #505558) stable/main/binary-ia64/iceweasel_2.0.0.18-0etch1_ia64.deb stable/main/binary-ia64/iceweasel-dbg_2.0.0.18-0etch1_ia64.deb stable/main/binary-ia64/iceweasel-gnome-support_2.0.0.18-0etch1_ia64.deb iceweasel (2.0.0.18-0etch1) stable-security; urgency=critical * New upstream security release. * Fixes mfsa 2008-47 aka CVE-2008-4582; mfsa 2008-48 aka CVE-2008-5012; mfsa 2008-49 aka CVE-2008-5013; mfsa 2008-50 aka CVE-2008-5014; mfsa 2008-52 aka CVE-2008-5017 and CVE-2008-5018; mfsa 2008-53 aka CVE-2008-5019; mfsa 2008-54 aka CVE-2008-0017; mfsa 2008-55 aka CVE-2008-5021; mfsa 2008-56 aka CVE-2008-5022; mfsa 2008-57 aka CVE-2008-5023; mfsa 2008-58 aka CVE-2008-5024. (Closes: #505558) stable/main/binary-i386/iceweasel_2.0.0.18-0etch1_i386.deb stable/main/binary-i386/iceweasel-gnome-support_2.0.0.18-0etch1_i386.deb stable/main/binary-i386/iceweasel-dbg_2.0.0.18-0etch1_i386.deb iceweasel (2.0.0.18-0etch1) stable-security; urgency=critical * New upstream security release. * Fixes mfsa 2008-47 aka CVE-2008-4582; mfsa 2008-48 aka CVE-2008-5012; mfsa 2008-49 aka CVE-2008-5013; mfsa 2008-50 aka CVE-2008-5014; mfsa 2008-52 aka CVE-2008-5017 and CVE-2008-5018; mfsa 2008-53 aka CVE-2008-5019; mfsa 2008-54 aka CVE-2008-0017; mfsa 2008-55 aka CVE-2008-5021; mfsa 2008-56 aka CVE-2008-5022; mfsa 2008-57 aka CVE-2008-5023; mfsa 2008-58 aka CVE-2008-5024. (Closes: #505558) stable/main/binary-hppa/iceweasel-dbg_2.0.0.18-0etch1_hppa.deb stable/main/binary-hppa/iceweasel-gnome-support_2.0.0.18-0etch1_hppa.deb stable/main/binary-hppa/iceweasel_2.0.0.18-0etch1_hppa.deb iceweasel (2.0.0.18-0etch1) stable-security; urgency=critical * New upstream security release. * Fixes mfsa 2008-47 aka CVE-2008-4582; mfsa 2008-48 aka CVE-2008-5012; mfsa 2008-49 aka CVE-2008-5013; mfsa 2008-50 aka CVE-2008-5014; mfsa 2008-52 aka CVE-2008-5017 and CVE-2008-5018; mfsa 2008-53 aka CVE-2008-5019; mfsa 2008-54 aka CVE-2008-0017; mfsa 2008-55 aka CVE-2008-5021; mfsa 2008-56 aka CVE-2008-5022; mfsa 2008-57 aka CVE-2008-5023; mfsa 2008-58 aka CVE-2008-5024. (Closes: #505558) stable/main/binary-arm/iceweasel_2.0.0.18-0etch1_arm.deb stable/main/binary-arm/iceweasel-dbg_2.0.0.18-0etch1_arm.deb stable/main/binary-arm/iceweasel-gnome-support_2.0.0.18-0etch1_arm.deb iceweasel (2.0.0.18-0etch1) stable-security; urgency=critical * New upstream security release. * Fixes mfsa 2008-47 aka CVE-2008-4582; mfsa 2008-48 aka CVE-2008-5012; mfsa 2008-49 aka CVE-2008-5013; mfsa 2008-50 aka CVE-2008-5014; mfsa 2008-52 aka CVE-2008-5017 and CVE-2008-5018; mfsa 2008-53 aka CVE-2008-5019; mfsa 2008-54 aka CVE-2008-0017; mfsa 2008-55 aka CVE-2008-5021; mfsa 2008-56 aka CVE-2008-5022; mfsa 2008-57 aka CVE-2008-5023; mfsa 2008-58 aka CVE-2008-5024. (Closes: #505558) stable/main/binary-alpha/iceweasel_2.0.0.18-0etch1_alpha.deb stable/main/binary-alpha/iceweasel-dbg_2.0.0.18-0etch1_alpha.deb stable/main/binary-alpha/iceweasel-gnome-support_2.0.0.18-0etch1_alpha.deb iceweasel (2.0.0.18-0etch1) stable-security; urgency=critical * New upstream security release. * Fixes mfsa 2008-47 aka CVE-2008-4582; mfsa 2008-48 aka CVE-2008-5012; mfsa 2008-49 aka CVE-2008-5013; mfsa 2008-50 aka CVE-2008-5014; mfsa 2008-52 aka CVE-2008-5017 and CVE-2008-5018; mfsa 2008-53 aka CVE-2008-5019; mfsa 2008-54 aka CVE-2008-0017; mfsa 2008-55 aka CVE-2008-5021; mfsa 2008-56 aka CVE-2008-5022; mfsa 2008-57 aka CVE-2008-5023; mfsa 2008-58 aka CVE-2008-5024. (Closes: #505558) stable/main/source/iceweasel_2.0.0.18-0etch1.diff.gz stable/main/source/iceweasel_2.0.0.18.orig.tar.gz stable/main/binary-all/firefox_2.0.0.18-0etch1_all.deb stable/main/binary-all/firefox-dom-inspector_2.0.0.18-0etch1_all.deb stable/main/binary-amd64/iceweasel-dbg_2.0.0.18-0etch1_amd64.deb stable/main/binary-all/mozilla-firefox_2.0.0.18-0etch1_all.deb stable/main/binary-all/mozilla-firefox-gnome-support_2.0.0.18-0etch1_all.deb stable/main/binary-amd64/iceweasel-gnome-support_2.0.0.18-0etch1_amd64.deb stable/main/binary-all/firefox-gnome-support_2.0.0.18-0etch1_all.deb stable/main/source/iceweasel_2.0.0.18-0etch1.dsc stable/main/binary-all/mozilla-firefox-dom-inspector_2.0.0.18-0etch1_all.deb stable/main/binary-amd64/iceweasel_2.0.0.18-0etch1_amd64.deb stable/main/binary-all/iceweasel-dom-inspector_2.0.0.18-0etch1_all.deb iceweasel (2.0.0.18-0etch1) stable-security; urgency=critical * New upstream security release. * Fixes mfsa 2008-47 aka CVE-2008-4582; mfsa 2008-48 aka CVE-2008-5012; mfsa 2008-49 aka CVE-2008-5013; mfsa 2008-50 aka CVE-2008-5014; mfsa 2008-52 aka CVE-2008-5017 and CVE-2008-5018; mfsa 2008-53 aka CVE-2008-5019; mfsa 2008-54 aka CVE-2008-0017; mfsa 2008-55 aka CVE-2008-5021; mfsa 2008-56 aka CVE-2008-5022; mfsa 2008-57 aka CVE-2008-5023; mfsa 2008-58 aka CVE-2008-5024. (Closes: #505558) stable/main/binary-sparc/hf_0.7.3-4etch1_sparc.deb hf (0.7.3-4etch1) stable-security; urgency=high * Non-maintainer upload by The Security Team. * Avoid the unsafe killing of previous instances. [CVE-2008-2378] stable/main/binary-s390/hf_0.7.3-4etch1_s390.deb hf (0.7.3-4etch1) stable-security; urgency=high * Non-maintainer upload by The Security Team. * Avoid the unsafe killing of previous instances. [CVE-2008-2378] stable/main/binary-powerpc/hf_0.7.3-4etch1_powerpc.deb hf (0.7.3-4etch1) stable-security; urgency=high * Non-maintainer upload by The Security Team. * Avoid the unsafe killing of previous instances. [CVE-2008-2378] stable/main/binary-mipsel/hf_0.7.3-4etch1_mipsel.deb hf (0.7.3-4etch1) stable-security; urgency=high * Non-maintainer upload by The Security Team. * Avoid the unsafe killing of previous instances. [CVE-2008-2378] stable/main/binary-mips/hf_0.7.3-4etch1_mips.deb hf (0.7.3-4etch1) stable-security; urgency=high * Non-maintainer upload by The Security Team. * Avoid the unsafe killing of previous instances. [CVE-2008-2378] stable/main/binary-ia64/hf_0.7.3-4etch1_ia64.deb hf (0.7.3-4etch1) stable-security; urgency=high * Non-maintainer upload by The Security Team. * Avoid the unsafe killing of previous instances. [CVE-2008-2378] stable/main/binary-i386/hf_0.7.3-4etch1_i386.deb hf (0.7.3-4etch1) stable-security; urgency=high * Non-maintainer upload by The Security Team. * Avoid the unsafe killing of previous instances. [CVE-2008-2378] stable/main/binary-hppa/hf_0.7.3-4etch1_hppa.deb hf (0.7.3-4etch1) stable-security; urgency=high * Non-maintainer upload by The Security Team. * Avoid the unsafe killing of previous instances. [CVE-2008-2378] stable/main/binary-arm/hf_0.7.3-4etch1_arm.deb hf (0.7.3-4etch1) stable-security; urgency=high * Non-maintainer upload by The Security Team. * Avoid the unsafe killing of previous instances. [CVE-2008-2378] stable/main/binary-alpha/hf_0.7.3-4etch1_alpha.deb hf (0.7.3-4etch1) stable-security; urgency=high * Non-maintainer upload by The Security Team. * Avoid the unsafe killing of previous instances. [CVE-2008-2378] stable/main/source/hf_0.7.3-4etch1.diff.gz stable/main/binary-amd64/hf_0.7.3-4etch1_amd64.deb stable/main/source/hf_0.7.3-4etch1.dsc hf (0.7.3-4etch1) stable-security; urgency=high * Non-maintainer upload by The Security Team. * Avoid the unsafe killing of previous instances. [CVE-2008-2378] stable/main/binary-sparc/graphviz-dev_2.8-3+etch1_sparc.deb stable/main/binary-sparc/graphviz_2.8-3+etch1_sparc.deb graphviz (2.8-3+etch1) stable; urgency=low * Backport patch to fix a stack overflow in the graph parser, reported by IBM and fixed in 2.20.3. Thanks to upstream for both notices and minimal patches! Patched files are the following: - lib/graph/parser.c - lib/graph/parser.y This is CVE-2008-4555. * Update Maintainer field, package got adopted. stable/main/binary-s390/graphviz_2.8-3+etch1_s390.deb stable/main/binary-s390/graphviz-dev_2.8-3+etch1_s390.deb graphviz (2.8-3+etch1) stable; urgency=low * Backport patch to fix a stack overflow in the graph parser, reported by IBM and fixed in 2.20.3. Thanks to upstream for both notices and minimal patches! Patched files are the following: - lib/graph/parser.c - lib/graph/parser.y This is CVE-2008-4555. * Update Maintainer field, package got adopted. stable/main/binary-powerpc/graphviz-dev_2.8-3+etch1_powerpc.deb stable/main/binary-powerpc/graphviz_2.8-3+etch1_powerpc.deb graphviz (2.8-3+etch1) stable; urgency=low * Backport patch to fix a stack overflow in the graph parser, reported by IBM and fixed in 2.20.3. Thanks to upstream for both notices and minimal patches! Patched files are the following: - lib/graph/parser.c - lib/graph/parser.y This is CVE-2008-4555. * Update Maintainer field, package got adopted. stable/main/binary-mipsel/graphviz_2.8-3+etch1_mipsel.deb stable/main/binary-mipsel/graphviz-dev_2.8-3+etch1_mipsel.deb graphviz (2.8-3+etch1) stable; urgency=low * Backport patch to fix a stack overflow in the graph parser, reported by IBM and fixed in 2.20.3. Thanks to upstream for both notices and minimal patches! Patched files are the following: - lib/graph/parser.c - lib/graph/parser.y This is CVE-2008-4555. * Update Maintainer field, package got adopted. stable/main/binary-mips/graphviz-dev_2.8-3+etch1_mips.deb stable/main/binary-mips/graphviz_2.8-3+etch1_mips.deb graphviz (2.8-3+etch1) stable; urgency=low * Backport patch to fix a stack overflow in the graph parser, reported by IBM and fixed in 2.20.3. Thanks to upstream for both notices and minimal patches! Patched files are the following - lib/graph/parser.c - lib/graph/parser.y This is CVE-2008-4555. * Update Maintainer field, package got adopted. stable/main/binary-ia64/graphviz_2.8-3+etch1_ia64.deb stable/main/binary-ia64/graphviz-dev_2.8-3+etch1_ia64.deb graphviz (2.8-3+etch1) stable; urgency=low * Backport patch to fix a stack overflow in the graph parser, reported by IBM and fixed in 2.20.3. Thanks to upstream for both notices and minimal patches! Patched files are the following: - lib/graph/parser.c - lib/graph/parser.y This is CVE-2008-4555. * Update Maintainer field, package got adopted. stable/main/binary-i386/graphviz_2.8-3+etch1_i386.deb stable/main/binary-i386/graphviz-dev_2.8-3+etch1_i386.deb graphviz (2.8-3+etch1) stable; urgency=low * Backport patch to fix a stack overflow in the graph parser, reported by IBM and fixed in 2.20.3. Thanks to upstream for both notices and minimal patches! Patched files are the following: - lib/graph/parser.c - lib/graph/parser.y This is CVE-2008-4555. * Update Maintainer field, package got adopted. stable/main/binary-hppa/graphviz_2.8-3+etch1_hppa.deb stable/main/binary-hppa/graphviz-dev_2.8-3+etch1_hppa.deb graphviz (2.8-3+etch1) stable; urgency=low * Backport patch to fix a stack overflow in the graph parser, reported by IBM and fixed in 2.20.3. Thanks to upstream for both notices and minimal patches! Patched files are the following: - lib/graph/parser.c - lib/graph/parser.y This is CVE-2008-4555. * Update Maintainer field, package got adopted. stable/main/binary-arm/graphviz_2.8-3+etch1_arm.deb stable/main/binary-arm/graphviz-dev_2.8-3+etch1_arm.deb graphviz (2.8-3+etch1) stable; urgency=low * Backport patch to fix a stack overflow in the graph parser, reported by IBM and fixed in 2.20.3. Thanks to upstream for both notices and minimal patches! Patched files are the following: - lib/graph/parser.c - lib/graph/parser.y This is CVE-2008-4555. * Update Maintainer field, package got adopted. stable/main/binary-alpha/graphviz_2.8-3+etch1_alpha.deb stable/main/binary-alpha/graphviz-dev_2.8-3+etch1_alpha.deb graphviz (2.8-3+etch1) stable; urgency=low * Backport patch to fix a stack overflow in the graph parser, reported by IBM and fixed in 2.20.3. Thanks to upstream for both notices and minimal patches! Patched files are the following: - lib/graph/parser.c - lib/graph/parser.y This is CVE-2008-4555. * Update Maintainer field, package got adopted. stable/main/source/graphviz_2.8-3+etch1.dsc stable/main/source/graphviz_2.8-3+etch1.diff.gz stable/main/binary-amd64/graphviz-dev_2.8-3+etch1_amd64.deb stable/main/binary-amd64/graphviz_2.8-3+etch1_amd64.deb stable/main/binary-all/graphviz-doc_2.8-3+etch1_all.deb graphviz (2.8-3+etch1) stable; urgency=low * Backport patch to fix a stack overflow in the graph parser, reported by IBM and fixed in 2.20.3. Thanks to upstream for both notices and minimal patches! Patched files are the following: - lib/graph/parser.c - lib/graph/parser.y This is CVE-2008-4555. * Update Maintainer field, package got adopted. stable/main/binary-sparc/libc6-udeb_2.3.6.ds1-13etch8_sparc.udeb stable/main/binary-sparc/libnss-dns-udeb_2.3.6.ds1-13etch8_sparc.udeb stable/main/binary-sparc/libc6-sparcv9b_2.3.6.ds1-13etch8_sparc.deb stable/main/binary-sparc/libc6-pic_2.3.6.ds1-13etch8_sparc.deb stable/main/binary-sparc/libc6-sparc64_2.3.6.ds1-13etch8_sparc.deb stable/main/binary-sparc/libnss-files-udeb_2.3.6.ds1-13etch8_sparc.udeb stable/main/binary-sparc/libc6_2.3.6.ds1-13etch8_sparc.deb stable/main/binary-sparc/libc6-prof_2.3.6.ds1-13etch8_sparc.deb stable/main/binary-sparc/libc6-dev_2.3.6.ds1-13etch8_sparc.deb stable/main/binary-sparc/locales-all_2.3.6.ds1-13etch8_sparc.deb stable/main/binary-sparc/libc6-sparcv9_2.3.6.ds1-13etch8_sparc.deb stable/main/binary-sparc/nscd_2.3.6.ds1-13etch8_sparc.deb stable/main/binary-sparc/libc6-dbg_2.3.6.ds1-13etch8_sparc.deb stable/main/binary-sparc/libc6-dev-sparc64_2.3.6.ds1-13etch8_sparc.deb glibc (2.3.6.ds1-13etch8) stable; urgency=low * Backport from unstable: keep ld.so in optimized libraries. Closes: #501433. stable/main/binary-s390/libc6_2.3.6.ds1-13etch8_s390.deb stable/main/binary-s390/libc6-dev-s390x_2.3.6.ds1-13etch8_s390.deb stable/main/binary-s390/libc6-prof_2.3.6.ds1-13etch8_s390.deb stable/main/binary-s390/libnss-files-udeb_2.3.6.ds1-13etch8_s390.udeb stable/main/binary-s390/locales-all_2.3.6.ds1-13etch8_s390.deb stable/main/binary-s390/libc6-dev_2.3.6.ds1-13etch8_s390.deb stable/main/binary-s390/nscd_2.3.6.ds1-13etch8_s390.deb stable/main/binary-s390/libc6-pic_2.3.6.ds1-13etch8_s390.deb stable/main/binary-s390/libc6-udeb_2.3.6.ds1-13etch8_s390.udeb stable/main/binary-s390/libc6-dbg_2.3.6.ds1-13etch8_s390.deb stable/main/binary-s390/libnss-dns-udeb_2.3.6.ds1-13etch8_s390.udeb stable/main/binary-s390/libc6-s390x_2.3.6.ds1-13etch8_s390.deb glibc (2.3.6.ds1-13etch8) stable; urgency=low * Backport from unstable: keep ld.so in optimized libraries. Closes: #501433. stable/main/binary-powerpc/libc6_2.3.6.ds1-13etch8_powerpc.deb stable/main/binary-powerpc/libc6-dev_2.3.6.ds1-13etch8_powerpc.deb stable/main/binary-powerpc/nscd_2.3.6.ds1-13etch8_powerpc.deb stable/main/binary-powerpc/libc6-prof_2.3.6.ds1-13etch8_powerpc.deb stable/main/binary-powerpc/libc6-pic_2.3.6.ds1-13etch8_powerpc.deb stable/main/binary-powerpc/libc6-ppc64_2.3.6.ds1-13etch8_powerpc.deb stable/main/binary-powerpc/locales-all_2.3.6.ds1-13etch8_powerpc.deb stable/main/binary-powerpc/libnss-dns-udeb_2.3.6.ds1-13etch8_powerpc.udeb stable/main/binary-powerpc/libnss-files-udeb_2.3.6.ds1-13etch8_powerpc.udeb stable/main/binary-powerpc/libc6-dev-ppc64_2.3.6.ds1-13etch8_powerpc.deb stable/main/binary-powerpc/libc6-dbg_2.3.6.ds1-13etch8_powerpc.deb stable/main/binary-powerpc/libc6-udeb_2.3.6.ds1-13etch8_powerpc.udeb glibc (2.3.6.ds1-13etch8) stable; urgency=low * Backport from unstable: keep ld.so in optimized libraries. Closes: #501433. stable/main/binary-mipsel/libc6-pic_2.3.6.ds1-13etch8_mipsel.deb stable/main/binary-mipsel/libc6_2.3.6.ds1-13etch8_mipsel.deb stable/main/binary-mipsel/libc6-dev_2.3.6.ds1-13etch8_mipsel.deb stable/main/binary-mipsel/libc6-prof_2.3.6.ds1-13etch8_mipsel.deb stable/main/binary-mipsel/libnss-dns-udeb_2.3.6.ds1-13etch8_mipsel.udeb stable/main/binary-mipsel/locales-all_2.3.6.ds1-13etch8_mipsel.deb stable/main/binary-mipsel/libc6-dbg_2.3.6.ds1-13etch8_mipsel.deb stable/main/binary-mipsel/libnss-files-udeb_2.3.6.ds1-13etch8_mipsel.udeb stable/main/binary-mipsel/nscd_2.3.6.ds1-13etch8_mipsel.deb stable/main/binary-mipsel/libc6-udeb_2.3.6.ds1-13etch8_mipsel.udeb glibc (2.3.6.ds1-13etch8) stable; urgency=low * Backport from unstable: keep ld.so in optimized libraries. Closes: #501433. stable/main/binary-mips/libc6-udeb_2.3.6.ds1-13etch8_mips.udeb stable/main/binary-mips/nscd_2.3.6.ds1-13etch8_mips.deb stable/main/binary-mips/libnss-files-udeb_2.3.6.ds1-13etch8_mips.udeb stable/main/binary-mips/locales-all_2.3.6.ds1-13etch8_mips.deb stable/main/binary-mips/libnss-dns-udeb_2.3.6.ds1-13etch8_mips.udeb stable/main/binary-mips/libc6-pic_2.3.6.ds1-13etch8_mips.deb stable/main/binary-mips/libc6-dbg_2.3.6.ds1-13etch8_mips.deb stable/main/binary-mips/libc6_2.3.6.ds1-13etch8_mips.deb stable/main/binary-mips/libc6-prof_2.3.6.ds1-13etch8_mips.deb stable/main/binary-mips/libc6-dev_2.3.6.ds1-13etch8_mips.deb glibc (2.3.6.ds1-13etch8) stable; urgency=low * Backport from unstable: keep ld.so in optimized libraries. Closes: #501433. stable/main/binary-ia64/locales-all_2.3.6.ds1-13etch8_ia64.deb stable/main/binary-ia64/libc6.1-pic_2.3.6.ds1-13etch8_ia64.deb stable/main/binary-ia64/libc6.1-udeb_2.3.6.ds1-13etch8_ia64.udeb stable/main/binary-ia64/nscd_2.3.6.ds1-13etch8_ia64.deb stable/main/binary-ia64/libc6.1-dbg_2.3.6.ds1-13etch8_ia64.deb stable/main/binary-ia64/libnss-dns-udeb_2.3.6.ds1-13etch8_ia64.udeb stable/main/binary-ia64/libc6.1-dev_2.3.6.ds1-13etch8_ia64.deb stable/main/binary-ia64/libc6.1_2.3.6.ds1-13etch8_ia64.deb stable/main/binary-ia64/libc6.1-prof_2.3.6.ds1-13etch8_ia64.deb stable/main/binary-ia64/libnss-files-udeb_2.3.6.ds1-13etch8_ia64.udeb glibc (2.3.6.ds1-13etch8) stable; urgency=low * Backport from unstable: keep ld.so in optimized libraries. Closes: #501433. stable/main/binary-i386/libc6-amd64_2.3.6.ds1-13etch8_i386.deb stable/main/binary-i386/libc6-xen_2.3.6.ds1-13etch8_i386.deb stable/main/binary-i386/libnss-files-udeb_2.3.6.ds1-13etch8_i386.udeb stable/main/binary-i386/libc6-pic_2.3.6.ds1-13etch8_i386.deb stable/main/binary-i386/libc6-prof_2.3.6.ds1-13etch8_i386.deb stable/main/binary-i386/libc6-dev-amd64_2.3.6.ds1-13etch8_i386.deb stable/main/binary-i386/libc6-i686_2.3.6.ds1-13etch8_i386.deb stable/main/binary-i386/libc6-dbg_2.3.6.ds1-13etch8_i386.deb stable/main/binary-i386/libnss-dns-udeb_2.3.6.ds1-13etch8_i386.udeb stable/main/binary-i386/nscd_2.3.6.ds1-13etch8_i386.deb stable/main/binary-i386/libc6-dev_2.3.6.ds1-13etch8_i386.deb stable/main/binary-i386/libc6-udeb_2.3.6.ds1-13etch8_i386.udeb stable/main/binary-i386/libc6_2.3.6.ds1-13etch8_i386.deb stable/main/binary-i386/locales-all_2.3.6.ds1-13etch8_i386.deb glibc (2.3.6.ds1-13etch8) stable; urgency=low * Backport from unstable: keep ld.so in optimized libraries. Closes: #501433. stable/main/binary-hppa/locales-all_2.3.6.ds1-13etch8_hppa.deb stable/main/binary-hppa/libc6-dbg_2.3.6.ds1-13etch8_hppa.deb stable/main/binary-hppa/libc6-udeb_2.3.6.ds1-13etch8_hppa.udeb stable/main/binary-hppa/nscd_2.3.6.ds1-13etch8_hppa.deb stable/main/binary-hppa/libnss-dns-udeb_2.3.6.ds1-13etch8_hppa.udeb stable/main/binary-hppa/libc6-prof_2.3.6.ds1-13etch8_hppa.deb stable/main/binary-hppa/libnss-files-udeb_2.3.6.ds1-13etch8_hppa.udeb stable/main/binary-hppa/libc6_2.3.6.ds1-13etch8_hppa.deb stable/main/binary-hppa/libc6-pic_2.3.6.ds1-13etch8_hppa.deb stable/main/binary-hppa/libc6-dev_2.3.6.ds1-13etch8_hppa.deb glibc (2.3.6.ds1-13etch8) stable; urgency=low * Backport from unstable: keep ld.so in optimized libraries. Closes: #501433. stable/main/binary-arm/libnss-files-udeb_2.3.6.ds1-13etch8_arm.udeb stable/main/binary-arm/libc6_2.3.6.ds1-13etch8_arm.deb stable/main/binary-arm/libc6-dbg_2.3.6.ds1-13etch8_arm.deb stable/main/binary-arm/libnss-dns-udeb_2.3.6.ds1-13etch8_arm.udeb stable/main/binary-arm/libc6-pic_2.3.6.ds1-13etch8_arm.deb stable/main/binary-arm/libc6-dev_2.3.6.ds1-13etch8_arm.deb stable/main/binary-arm/locales-all_2.3.6.ds1-13etch8_arm.deb stable/main/binary-arm/libc6-udeb_2.3.6.ds1-13etch8_arm.udeb stable/main/binary-arm/nscd_2.3.6.ds1-13etch8_arm.deb stable/main/binary-arm/libc6-prof_2.3.6.ds1-13etch8_arm.deb glibc (2.3.6.ds1-13etch8) stable; urgency=low * Backport from unstable: keep ld.so in optimized libraries. Closes: #501433. stable/main/binary-alpha/libc6.1-prof_2.3.6.ds1-13etch8_alpha.deb stable/main/binary-alpha/libnss-dns-udeb_2.3.6.ds1-13etch8_alpha.udeb stable/main/binary-alpha/libc6.1-dbg_2.3.6.ds1-13etch8_alpha.deb stable/main/binary-alpha/locales-all_2.3.6.ds1-13etch8_alpha.deb stable/main/binary-alpha/libnss-files-udeb_2.3.6.ds1-13etch8_alpha.udeb stable/main/binary-alpha/nscd_2.3.6.ds1-13etch8_alpha.deb stable/main/binary-alpha/libc6.1-udeb_2.3.6.ds1-13etch8_alpha.udeb stable/main/binary-alpha/libc6.1-dev_2.3.6.ds1-13etch8_alpha.deb stable/main/binary-alpha/libc6.1_2.3.6.ds1-13etch8_alpha.deb stable/main/binary-alpha/libc6.1-pic_2.3.6.ds1-13etch8_alpha.deb glibc (2.3.6.ds1-13etch8) stable; urgency=low * Backport from unstable: keep ld.so in optimized libraries. Closes: #501433. stable/main/binary-amd64/libc6-dev_2.3.6.ds1-13etch8_amd64.deb stable/main/binary-amd64/libc6_2.3.6.ds1-13etch8_amd64.deb stable/main/source/glibc_2.3.6.ds1-13etch8.diff.gz stable/main/binary-amd64/nscd_2.3.6.ds1-13etch8_amd64.deb stable/main/binary-amd64/libc6-i386_2.3.6.ds1-13etch8_amd64.deb stable/main/binary-amd64/libc6-pic_2.3.6.ds1-13etch8_amd64.deb stable/main/binary-all/locales_2.3.6.ds1-13etch8_all.deb stable/main/binary-all/glibc-doc_2.3.6.ds1-13etch8_all.deb stable/main/binary-amd64/libc6-udeb_2.3.6.ds1-13etch8_amd64.udeb stable/main/source/glibc_2.3.6.ds1-13etch8.dsc stable/main/binary-amd64/libc6-dev-i386_2.3.6.ds1-13etch8_amd64.deb stable/main/binary-amd64/libc6-prof_2.3.6.ds1-13etch8_amd64.deb stable/main/binary-amd64/libnss-dns-udeb_2.3.6.ds1-13etch8_amd64.udeb stable/main/binary-amd64/locales-all_2.3.6.ds1-13etch8_amd64.deb stable/main/binary-amd64/libnss-files-udeb_2.3.6.ds1-13etch8_amd64.udeb stable/main/binary-amd64/libc6-dbg_2.3.6.ds1-13etch8_amd64.deb glibc (2.3.6.ds1-13etch8) stable; urgency=low * Backport from unstable: keep ld.so in optimized libraries. Closes: #501433. stable/main/binary-sparc/libfreetype6_2.2.1-5+etch3_sparc.deb stable/main/binary-sparc/libfreetype6-udeb_2.2.1-5+etch3_sparc.udeb stable/main/binary-sparc/libfreetype6-dev_2.2.1-5+etch3_sparc.deb stable/main/binary-sparc/freetype2-demos_2.2.1-5+etch3_sparc.deb freetype (2.2.1-5+etch3) stable-security; urgency=high * Non-maintainer upload by the security team * Fix off-by-one programming error in PFB and TTF font parsing which could result in a off-by-one heap overflow when parsing table like data structures (PFB) or SHC instructions (TTF) Fixes: CVE-2008-1808 * Fix memory corruption when parsing PFB format files Fixes: CVE-2008-1807 * Fix integer overflow resulting in a heap overflow due to integer conversion errors Fixes: CVE-2008-1806 stable/main/binary-s390/freetype2-demos_2.2.1-5+etch3_s390.deb stable/main/binary-s390/libfreetype6-dev_2.2.1-5+etch3_s390.deb stable/main/binary-s390/libfreetype6_2.2.1-5+etch3_s390.deb stable/main/binary-s390/libfreetype6-udeb_2.2.1-5+etch3_s390.udeb freetype (2.2.1-5+etch3) stable-security; urgency=high * Non-maintainer upload by the security team * Fix off-by-one programming error in PFB and TTF font parsing which could result in a off-by-one heap overflow when parsing table like data structures (PFB) or SHC instructions (TTF) Fixes: CVE-2008-1808 * Fix memory corruption when parsing PFB format files Fixes: CVE-2008-1807 * Fix integer overflow resulting in a heap overflow due to integer conversion errors Fixes: CVE-2008-1806 stable/main/binary-powerpc/freetype2-demos_2.2.1-5+etch3_powerpc.deb stable/main/binary-powerpc/libfreetype6-udeb_2.2.1-5+etch3_powerpc.udeb stable/main/binary-powerpc/libfreetype6_2.2.1-5+etch3_powerpc.deb stable/main/binary-powerpc/libfreetype6-dev_2.2.1-5+etch3_powerpc.deb freetype (2.2.1-5+etch3) stable-security; urgency=high * Non-maintainer upload by the security team * Fix off-by-one programming error in PFB and TTF font parsing which could result in a off-by-one heap overflow when parsing table like data structures (PFB) or SHC instructions (TTF) Fixes: CVE-2008-1808 * Fix memory corruption when parsing PFB format files Fixes: CVE-2008-1807 * Fix integer overflow resulting in a heap overflow due to integer conversion errors Fixes: CVE-2008-1806 stable/main/binary-mipsel/libfreetype6_2.2.1-5+etch3_mipsel.deb stable/main/binary-mipsel/libfreetype6-udeb_2.2.1-5+etch3_mipsel.udeb stable/main/binary-mipsel/freetype2-demos_2.2.1-5+etch3_mipsel.deb stable/main/binary-mipsel/libfreetype6-dev_2.2.1-5+etch3_mipsel.deb freetype (2.2.1-5+etch3) stable-security; urgency=high * Non-maintainer upload by the security team * Fix off-by-one programming error in PFB and TTF font parsing which could result in a off-by-one heap overflow when parsing table like data structures (PFB) or SHC instructions (TTF) Fixes: CVE-2008-1808 * Fix memory corruption when parsing PFB format files Fixes: CVE-2008-1807 * Fix integer overflow resulting in a heap overflow due to integer conversion errors Fixes: CVE-2008-1806 stable/main/binary-mips/freetype2-demos_2.2.1-5+etch3_mips.deb stable/main/binary-mips/libfreetype6-udeb_2.2.1-5+etch3_mips.udeb stable/main/binary-mips/libfreetype6_2.2.1-5+etch3_mips.deb stable/main/binary-mips/libfreetype6-dev_2.2.1-5+etch3_mips.deb freetype (2.2.1-5+etch3) stable-security; urgency=high * Non-maintainer upload by the security team * Fix off-by-one programming error in PFB and TTF font parsing which could result in a off-by-one heap overflow when parsing table like data structures (PFB) or SHC instructions (TTF) Fixes: CVE-2008-1808 * Fix memory corruption when parsing PFB format files Fixes: CVE-2008-1807 * Fix integer overflow resulting in a heap overflow due to integer conversion errors Fixes: CVE-2008-1806 stable/main/binary-ia64/libfreetype6-udeb_2.2.1-5+etch3_ia64.udeb stable/main/binary-ia64/freetype2-demos_2.2.1-5+etch3_ia64.deb stable/main/binary-ia64/libfreetype6_2.2.1-5+etch3_ia64.deb stable/main/binary-ia64/libfreetype6-dev_2.2.1-5+etch3_ia64.deb freetype (2.2.1-5+etch3) stable-security; urgency=high * Non-maintainer upload by the security team * Fix off-by-one programming error in PFB and TTF font parsing which could result in a off-by-one heap overflow when parsing table like data structures (PFB) or SHC instructions (TTF) Fixes: CVE-2008-1808 * Fix memory corruption when parsing PFB format files Fixes: CVE-2008-1807 * Fix integer overflow resulting in a heap overflow due to integer conversion errors Fixes: CVE-2008-1806 stable/main/binary-hppa/libfreetype6_2.2.1-5+etch3_hppa.deb stable/main/binary-hppa/libfreetype6-dev_2.2.1-5+etch3_hppa.deb stable/main/binary-hppa/freetype2-demos_2.2.1-5+etch3_hppa.deb stable/main/binary-hppa/libfreetype6-udeb_2.2.1-5+etch3_hppa.udeb freetype (2.2.1-5+etch3) stable-security; urgency=high * Non-maintainer upload by the security team * Fix off-by-one programming error in PFB and TTF font parsing which could result in a off-by-one heap overflow when parsing table like data structures (PFB) or SHC instructions (TTF) Fixes: CVE-2008-1808 * Fix memory corruption when parsing PFB format files Fixes: CVE-2008-1807 * Fix integer overflow resulting in a heap overflow due to integer conversion errors Fixes: CVE-2008-1806 stable/main/binary-arm/libfreetype6-dev_2.2.1-5+etch3_arm.deb stable/main/binary-arm/libfreetype6_2.2.1-5+etch3_arm.deb stable/main/binary-arm/freetype2-demos_2.2.1-5+etch3_arm.deb stable/main/binary-arm/libfreetype6-udeb_2.2.1-5+etch3_arm.udeb freetype (2.2.1-5+etch3) stable-security; urgency=high * Non-maintainer upload by the security team * Fix off-by-one programming error in PFB and TTF font parsing which could result in a off-by-one heap overflow when parsing table like data structures (PFB) or SHC instructions (TTF) Fixes: CVE-2008-1808 * Fix memory corruption when parsing PFB format files Fixes: CVE-2008-1807 * Fix integer overflow resulting in a heap overflow due to integer conversion errors Fixes: CVE-2008-1806 stable/main/binary-amd64/libfreetype6-dev_2.2.1-5+etch3_amd64.deb stable/main/binary-amd64/libfreetype6_2.2.1-5+etch3_amd64.deb stable/main/binary-amd64/freetype2-demos_2.2.1-5+etch3_amd64.deb stable/main/binary-amd64/libfreetype6-udeb_2.2.1-5+etch3_amd64.udeb freetype (2.2.1-5+etch3) stable-security; urgency=high * Non-maintainer upload by the security team * Fix off-by-one programming error in PFB and TTF font parsing which could result in a off-by-one heap overflow when parsing table like data structures (PFB) or SHC instructions (TTF) Fixes: CVE-2008-1808 * Fix memory corruption when parsing PFB format files Fixes: CVE-2008-1807 * Fix integer overflow resulting in a heap overflow due to integer conversion errors Fixes: CVE-2008-1806 stable/main/binary-alpha/freetype2-demos_2.2.1-5+etch3_alpha.deb stable/main/binary-alpha/libfreetype6-dev_2.2.1-5+etch3_alpha.deb stable/main/binary-alpha/libfreetype6_2.2.1-5+etch3_alpha.deb stable/main/binary-alpha/libfreetype6-udeb_2.2.1-5+etch3_alpha.udeb freetype (2.2.1-5+etch3) stable-security; urgency=high * Non-maintainer upload by the security team * Fix off-by-one programming error in PFB and TTF font parsing which could result in a off-by-one heap overflow when parsing table like data structures (PFB) or SHC instructions (TTF) Fixes: CVE-2008-1808 * Fix memory corruption when parsing PFB format files Fixes: CVE-2008-1807 * Fix integer overflow resulting in a heap overflow due to integer conversion errors Fixes: CVE-2008-1806 stable/main/binary-i386/libfreetype6_2.2.1-5+etch3_i386.deb stable/main/source/freetype_2.2.1-5+etch3.dsc stable/main/binary-i386/libfreetype6-udeb_2.2.1-5+etch3_i386.udeb stable/main/binary-i386/freetype2-demos_2.2.1-5+etch3_i386.deb stable/main/binary-i386/libfreetype6-dev_2.2.1-5+etch3_i386.deb stable/main/source/freetype_2.2.1-5+etch3.diff.gz freetype (2.2.1-5+etch3) stable-security; urgency=high * Non-maintainer upload by the security team * Fix off-by-one programming error in PFB and TTF font parsing which could result in a off-by-one heap overflow when parsing table like data structures (PFB) or SHC instructions (TTF) Fixes: CVE-2008-1808 * Fix memory corruption when parsing PFB format files Fixes: CVE-2008-1807 * Fix integer overflow resulting in a heap overflow due to integer conversion errors Fixes: CVE-2008-1806 stable/main/source/flamethrower_0.1.8-1+etch1.diff.gz stable/main/source/flamethrower_0.1.8-1+etch1.dsc stable/main/binary-all/flamethrower_0.1.8-1+etch1_all.deb flamethrower (0.1.8-1+etch1) stable-security; urgency=high * Fix /tmp symlink attack vector. Closes: #506350 (CVE-2008-5141) * Rebuilding with current toolchain would cause executables to be installed in /usr/local/bin. Fix this by supplying an appropriate SITEPREFIX. stable/main/binary-i386/fai-kernels_1.17+etch.23etch1_i386.deb fai-kernels (1.17+etch.23etch1) stable-security; urgency=high * Rebuild against linux-source-2.6.18_2.6.18.dfsg.1-23etch1: * Fix missing boundary checks in syscall/syscall32_nopage(): - bugfix/add-install_special_mapping.patch - bugfix/i386-vdso-use_install_special_mapping.patch - bugfix/x86_64-ia32-vDSO-use-install_special_mapping.patch - features/all/xen/vdso-use_install_special_mapping.patch See CVE-2008-3527 * Modify feature patches to apply on top of the fixes for CVE-2008-3527: - features/all/vserver/vs2.0.2.2-rc9.patch - features/all/xen/fedora-2.6.18-36186.patch - features/all/xen/vserver-update.patch * Don't allow splicing to files opened with O_APPEND: - bugfix/dont-allow-splice-to-files-opened-with-O_APPEND.patch See CVE-2008-4554 * Avoid printk floods when reading corrupted ext[2,3] directories - bugfix/ext2-avoid-corrupted-directory-printk-floods.patch - bugfix/ext3-avoid-corrupted-directory-printk-floods.patch See CVE-2008-3528 * Fix oops in SCTP - bugfix/sctp-fix-oops-when-INIT-ACK-indicates-that-peer-doesnt-support-AUTH.patch See CVE-2008-4576 * Fix buffer overflow in hfsplus - bugfix/hfsplus-fix-Buffer-overflow-with-a-corrupted-image.patch See CVE-2008-4933 * Fix BUG() in hfsplus - bugfix/hfsplus-check_read_mapping_page-return-value.patch See CVE-2008-4934 * Fix stack corruption in hfs - bugfix/hfs-fix-namelength-memory-corruption.patch See CVE-2008-5025 * Fix recursive descent in __scm_destroy - bugfix/af_unix-fix-garbage-collector-races.patch - bugfix/af_unix-convert-socks-to-unix_socks.patch - bugfix/net-unix-fix-inflight-counting-bug-in-garbage-collector.patch - bugfix/net-fix-recursive-descent-in-__scm_destroy.patch See CVE-2008-5029 * Make sendmsg() block during UNIX garbage collection: - bugfix/net-unix-gc-fix-soft-lockups-oom-issues.patch See CVE-2008-5300 * Fix DoS when calling svc_listen twice on the same socket while reading /proc/net/atm/*vc: - bugfix/atm-duplicate-listen-on-socket-corrupts-the-vcc-table.patch See CVE-2008-5079 * Fix race conditions between inotify removal and umount - bugfix/inotify-watch-removal-umount-races.patch See CVE-2008-5182 stable/main/binary-amd64/fai-kernels_1.17+etch.23etch1_amd64.deb fai-kernels (1.17+etch.23etch1) stable-security; urgency=high * Rebuild against linux-source-2.6.18_2.6.18.dfsg.1-23etch1: * Fix missing boundary checks in syscall/syscall32_nopage(): - bugfix/add-install_special_mapping.patch - bugfix/i386-vdso-use_install_special_mapping.patch - bugfix/x86_64-ia32-vDSO-use-install_special_mapping.patch - features/all/xen/vdso-use_install_special_mapping.patch See CVE-2008-3527 * Modify feature patches to apply on top of the fixes for CVE-2008-3527: - features/all/vserver/vs2.0.2.2-rc9.patch - features/all/xen/fedora-2.6.18-36186.patch - features/all/xen/vserver-update.patch * Don't allow splicing to files opened with O_APPEND: - bugfix/dont-allow-splice-to-files-opened-with-O_APPEND.patch See CVE-2008-4554 * Avoid printk floods when reading corrupted ext[2,3] directories - bugfix/ext2-avoid-corrupted-directory-printk-floods.patch - bugfix/ext3-avoid-corrupted-directory-printk-floods.patch See CVE-2008-3528 * Fix oops in SCTP - bugfix/sctp-fix-oops-when-INIT-ACK-indicates-that-peer-doesnt-support-AUTH.patch See CVE-2008-4576 * Fix buffer overflow in hfsplus - bugfix/hfsplus-fix-Buffer-overflow-with-a-corrupted-image.patch See CVE-2008-4933 * Fix BUG() in hfsplus - bugfix/hfsplus-check_read_mapping_page-return-value.patch See CVE-2008-4934 * Fix stack corruption in hfs - bugfix/hfs-fix-namelength-memory-corruption.patch See CVE-2008-5025 * Fix recursive descent in __scm_destroy - bugfix/af_unix-fix-garbage-collector-races.patch - bugfix/af_unix-convert-socks-to-unix_socks.patch - bugfix/net-unix-fix-inflight-counting-bug-in-garbage-collector.patch - bugfix/net-fix-recursive-descent-in-__scm_destroy.patch See CVE-2008-5029 * Make sendmsg() block during UNIX garbage collection: - bugfix/net-unix-gc-fix-soft-lockups-oom-issues.patch See CVE-2008-5300 * Fix DoS when calling svc_listen twice on the same socket while reading /proc/net/atm/*vc: - bugfix/atm-duplicate-listen-on-socket-corrupts-the-vcc-table.patch See CVE-2008-5079 * Fix race conditions between inotify removal and umount - bugfix/inotify-watch-removal-umount-races.patch See CVE-2008-5182 stable/main/binary-powerpc/fai-kernels_1.17+etch.23etch1_powerpc.deb stable/main/source/fai-kernels_1.17+etch.23etch1.tar.gz stable/main/source/fai-kernels_1.17+etch.23etch1.dsc fai-kernels (1.17+etch.23etch1) stable-security; urgency=high * Rebuild against linux-source-2.6.18_2.6.18.dfsg.1-23etch1: * Fix missing boundary checks in syscall/syscall32_nopage(): - bugfix/add-install_special_mapping.patch - bugfix/i386-vdso-use_install_special_mapping.patch - bugfix/x86_64-ia32-vDSO-use-install_special_mapping.patch - features/all/xen/vdso-use_install_special_mapping.patch See CVE-2008-3527 * Modify feature patches to apply on top of the fixes for CVE-2008-3527: - features/all/vserver/vs2.0.2.2-rc9.patch - features/all/xen/fedora-2.6.18-36186.patch - features/all/xen/vserver-update.patch * Don't allow splicing to files opened with O_APPEND: - bugfix/dont-allow-splice-to-files-opened-with-O_APPEND.patch See CVE-2008-4554 * Avoid printk floods when reading corrupted ext[2,3] directories - bugfix/ext2-avoid-corrupted-directory-printk-floods.patch - bugfix/ext3-avoid-corrupted-directory-printk-floods.patch See CVE-2008-3528 * Fix oops in SCTP - bugfix/sctp-fix-oops-when-INIT-ACK-indicates-that-peer-doesnt-support-AUTH.patch See CVE-2008-4576 * Fix buffer overflow in hfsplus - bugfix/hfsplus-fix-Buffer-overflow-with-a-corrupted-image.patch See CVE-2008-4933 * Fix BUG() in hfsplus - bugfix/hfsplus-check_read_mapping_page-return-value.patch See CVE-2008-4934 * Fix stack corruption in hfs - bugfix/hfs-fix-namelength-memory-corruption.patch See CVE-2008-5025 * Fix recursive descent in __scm_destroy - bugfix/af_unix-fix-garbage-collector-races.patch - bugfix/af_unix-convert-socks-to-unix_socks.patch - bugfix/net-unix-fix-inflight-counting-bug-in-garbage-collector.patch - bugfix/net-fix-recursive-descent-in-__scm_destroy.patch See CVE-2008-5029 * Make sendmsg() block during UNIX garbage collection: - bugfix/net-unix-gc-fix-soft-lockups-oom-issues.patch See CVE-2008-5300 * Fix DoS when calling svc_listen twice on the same socket while reading /proc/net/atm/*vc: - bugfix/atm-duplicate-listen-on-socket-corrupts-the-vcc-table.patch See CVE-2008-5079 * Fix race conditions between inotify removal and umount - bugfix/inotify-watch-removal-umount-races.patch See CVE-2008-5182 stable/main/binary-sparc/epiphany-browser_2.14.3-8_sparc.deb epiphany-browser (2.14.3-8) stable; urgency=low * Backport changes from unstable. * debian/certManager.js: this is a custom version of certManager.js that doesnb 9t use deletecert.xul, which doesnb 9t work because of broken argument passing. * 21_chrome_certmanager.patch: override certManager.js with the custom version. * epiphany-browser.install: install it. * Closes: #393837. Thanks to Romain Beauxis and Mike Hommey. stable/main/binary-s390/epiphany-browser_2.14.3-8_s390.deb epiphany-browser (2.14.3-8) stable; urgency=low * Backport changes from unstable. * debian/certManager.js: this is a custom version of certManager.js that doesn’t use deletecert.xul, which doesn’t work because of broken argument passing. * 21_chrome_certmanager.patch: override certManager.js with the custom version. * epiphany-browser.install: install it. * Closes: #393837. Thanks to Romain Beauxis and Mike Hommey. stable/main/binary-powerpc/epiphany-browser_2.14.3-8_powerpc.deb epiphany-browser (2.14.3-8) stable; urgency=low * Backport changes from unstable. * debian/certManager.js: this is a custom version of certManager.js that doesn’t use deletecert.xul, which doesn’t work because of broken argument passing. * 21_chrome_certmanager.patch: override certManager.js with the custom version. * epiphany-browser.install: install it. * Closes: #393837. Thanks to Romain Beauxis and Mike Hommey. stable/main/binary-mipsel/epiphany-browser_2.14.3-8_mipsel.deb epiphany-browser (2.14.3-8) stable; urgency=low * Backport changes from unstable. * debian/certManager.js: this is a custom version of certManager.js that doesnb 9t use deletecert.xul, which doesnb 9t work because of broken argument passing. * 21_chrome_certmanager.patch: override certManager.js with the custom version. * epiphany-browser.install: install it. * Closes: #393837. Thanks to Romain Beauxis and Mike Hommey. stable/main/binary-mips/epiphany-browser_2.14.3-8_mips.deb epiphany-browser (2.14.3-8) stable; urgency=low * Backport changes from unstable. * debian/certManager.js: this is a custom version of certManager.js that doesnb 9t use deletecert.xul, which doesnb 9t work because of broken argument passing. * 21_chrome_certmanager.patch: override certManager.js with the custom version. * epiphany-browser.install: install it. * Closes: #393837. Thanks to Romain Beauxis and Mike Hommey. stable/main/binary-ia64/epiphany-browser_2.14.3-8_ia64.deb epiphany-browser (2.14.3-8) stable; urgency=low * Backport changes from unstable. * debian/certManager.js: this is a custom version of certManager.js that doesnb 9t use deletecert.xul, which doesnb 9t work because of broken argument passing. * 21_chrome_certmanager.patch: override certManager.js with the custom version. * epiphany-browser.install: install it. * Closes: #393837. Thanks to Romain Beauxis and Mike Hommey. stable/main/binary-i386/epiphany-browser_2.14.3-8_i386.deb epiphany-browser (2.14.3-8) stable; urgency=low * Backport changes from unstable. * debian/certManager.js: this is a custom version of certManager.js that doesnb 9t use deletecert.xul, which doesnb 9t work because of broken argument passing. * 21_chrome_certmanager.patch: override certManager.js with the custom version. * epiphany-browser.install: install it. * Closes: #393837. Thanks to Romain Beauxis and Mike Hommey. stable/main/binary-hppa/epiphany-browser_2.14.3-8_hppa.deb epiphany-browser (2.14.3-8) stable; urgency=low * Backport changes from unstable. * debian/certManager.js: this is a custom version of certManager.js that doesnb 9t use deletecert.xul, which doesnb 9t work because of broken argument passing. * 21_chrome_certmanager.patch: override certManager.js with the custom version. * epiphany-browser.install: install it. * Closes: #393837. Thanks to Romain Beauxis and Mike Hommey. stable/main/binary-arm/epiphany-browser_2.14.3-8_arm.deb epiphany-browser (2.14.3-8) stable; urgency=low * Backport changes from unstable. * debian/certManager.js: this is a custom version of certManager.js that doesn’t use deletecert.xul, which doesn’t work because of broken argument passing. * 21_chrome_certmanager.patch: override certManager.js with the custom version. * epiphany-browser.install: install it. * Closes: #393837. Thanks to Romain Beauxis and Mike Hommey. stable/main/binary-alpha/epiphany-browser_2.14.3-8_alpha.deb epiphany-browser (2.14.3-8) stable; urgency=low * Backport changes from unstable. * debian/certManager.js: this is a custom version of certManager.js that doesnb 9t use deletecert.xul, which doesnb 9t work because of broken argument passing. * 21_chrome_certmanager.patch: override certManager.js with the custom version. * epiphany-browser.install: install it. * Closes: #393837. Thanks to Romain Beauxis and Mike Hommey. stable/main/source/epiphany-browser_2.14.3-8.diff.gz stable/main/binary-amd64/epiphany-browser_2.14.3-8_amd64.deb stable/main/source/epiphany-browser_2.14.3-8.dsc stable/main/binary-all/epiphany-browser-dev_2.14.3-8_all.deb epiphany-browser (2.14.3-8) stable; urgency=low * Backport changes from unstable. * debian/certManager.js: this is a custom version of certManager.js that doesn’t use deletecert.xul, which doesn’t work because of broken argument passing. * 21_chrome_certmanager.patch: override certManager.js with the custom version. * epiphany-browser.install: install it. * Closes: #393837. Thanks to Romain Beauxis and Mike Hommey. stable/main/binary-sparc/enscript_1.6.4-11.1_sparc.deb enscript (1.6.4-11.1) stable-security; urgency=high * debian/patches/506261-buffer-overflows: New patch by Werner Fink to fix buffer overflows: CVE-2008-3863, CVE-2008-4306. (Closes: #506261) * Urgency set to "high" for RC security bugfix. stable/main/binary-s390/enscript_1.6.4-11.1_s390.deb enscript (1.6.4-11.1) stable-security; urgency=high * debian/patches/506261-buffer-overflows: New patch by Werner Fink to fix buffer overflows: CVE-2008-3863, CVE-2008-4306. (Closes: #506261) * Urgency set to "high" for RC security bugfix. stable/main/binary-powerpc/enscript_1.6.4-11.1_powerpc.deb enscript (1.6.4-11.1) stable-security; urgency=high * debian/patches/506261-buffer-overflows: New patch by Werner Fink to fix buffer overflows: CVE-2008-3863, CVE-2008-4306. (Closes: #506261) * Urgency set to "high" for RC security bugfix. stable/main/binary-mipsel/enscript_1.6.4-11.1_mipsel.deb enscript (1.6.4-11.1) stable-security; urgency=high * debian/patches/506261-buffer-overflows: New patch by Werner Fink to fix buffer overflows: CVE-2008-3863, CVE-2008-4306. (Closes: #506261) * Urgency set to "high" for RC security bugfix. stable/main/binary-mips/enscript_1.6.4-11.1_mips.deb enscript (1.6.4-11.1) stable-security; urgency=high * debian/patches/506261-buffer-overflows: New patch by Werner Fink to fix buffer overflows: CVE-2008-3863, CVE-2008-4306. (Closes: #506261) * Urgency set to "high" for RC security bugfix. stable/main/binary-ia64/enscript_1.6.4-11.1_ia64.deb enscript (1.6.4-11.1) stable-security; urgency=high * debian/patches/506261-buffer-overflows: New patch by Werner Fink to fix buffer overflows: CVE-2008-3863, CVE-2008-4306. (Closes: #506261) * Urgency set to "high" for RC security bugfix. stable/main/binary-hppa/enscript_1.6.4-11.1_hppa.deb enscript (1.6.4-11.1) stable-security; urgency=high * debian/patches/506261-buffer-overflows: New patch by Werner Fink to fix buffer overflows: CVE-2008-3863, CVE-2008-4306. (Closes: #506261) * Urgency set to "high" for RC security bugfix. stable/main/binary-arm/enscript_1.6.4-11.1_arm.deb enscript (1.6.4-11.1) stable-security; urgency=high * debian/patches/506261-buffer-overflows: New patch by Werner Fink to fix buffer overflows: CVE-2008-3863, CVE-2008-4306. (Closes: #506261) * Urgency set to "high" for RC security bugfix. stable/main/binary-amd64/enscript_1.6.4-11.1_amd64.deb enscript (1.6.4-11.1) stable-security; urgency=high * debian/patches/506261-buffer-overflows: New patch by Werner Fink to fix buffer overflows: CVE-2008-3863, CVE-2008-4306. (Closes: #506261) * Urgency set to "high" for RC security bugfix. stable/main/binary-alpha/enscript_1.6.4-11.1_alpha.deb enscript (1.6.4-11.1) stable-security; urgency=high * debian/patches/506261-buffer-overflows: New patch by Werner Fink to fix buffer overflows: CVE-2008-3863, CVE-2008-4306. (Closes: #506261) * Urgency set to "high" for RC security bugfix. stable/main/binary-i386/enscript_1.6.4-11.1_i386.deb stable/main/source/enscript_1.6.4-11.1.diff.gz stable/main/source/enscript_1.6.4-11.1.dsc enscript (1.6.4-11.1) stable-security; urgency=high * debian/patches/506261-buffer-overflows: New patch by Werner Fink to fix buffer overflows: CVE-2008-3863, CVE-2008-4306. (Closes: #506261) * Urgency set to "high" for RC security bugfix. stable/main/binary-sparc/ekg_1.7~rc2-1etch2_sparc.deb stable/main/binary-sparc/libgadu3_1.7~rc2-1etch2_sparc.deb stable/main/binary-sparc/libgadu-dev_1.7~rc2-1etch2_sparc.deb ekg (1:1.7~rc2-1etch2) stable-security; urgency=high * Security upload for etch-security * Patched a medium severity security issue in lib/events.c: - CVE-2008-4776 A size check error in status packet parsing routine which could lead to accessing uninitialized memory resulting in a crash. stable/main/binary-s390/libgadu-dev_1.7~rc2-1etch2_s390.deb stable/main/binary-s390/ekg_1.7~rc2-1etch2_s390.deb stable/main/binary-s390/libgadu3_1.7~rc2-1etch2_s390.deb ekg (1:1.7~rc2-1etch2) stable-security; urgency=high * Security upload for etch-security * Patched a medium severity security issue in lib/events.c: - CVE-2008-4776 A size check error in status packet parsing routine which could lead to accessing uninitialized memory resulting in a crash. stable/main/binary-powerpc/ekg_1.7~rc2-1etch2_powerpc.deb stable/main/binary-powerpc/libgadu3_1.7~rc2-1etch2_powerpc.deb stable/main/binary-powerpc/libgadu-dev_1.7~rc2-1etch2_powerpc.deb ekg (1:1.7~rc2-1etch2) stable-security; urgency=high * Security upload for etch-security * Patched a medium severity security issue in lib/events.c: - CVE-2008-4776 A size check error in status packet parsing routine which could lead to accessing uninitialized memory resulting in a crash. stable/main/binary-mipsel/libgadu-dev_1.7~rc2-1etch2_mipsel.deb stable/main/binary-mipsel/libgadu3_1.7~rc2-1etch2_mipsel.deb stable/main/binary-mipsel/ekg_1.7~rc2-1etch2_mipsel.deb ekg (1:1.7~rc2-1etch2) stable-security; urgency=high * Security upload for etch-security * Patched a medium severity security issue in lib/events.c: - CVE-2008-4776 A size check error in status packet parsing routine which could lead to accessing uninitialized memory resulting in a crash. stable/main/binary-mips/libgadu-dev_1.7~rc2-1etch2_mips.deb stable/main/binary-mips/ekg_1.7~rc2-1etch2_mips.deb stable/main/binary-mips/libgadu3_1.7~rc2-1etch2_mips.deb ekg (1:1.7~rc2-1etch2) stable-security; urgency=high * Security upload for etch-security * Patched a medium severity security issue in lib/events.c: - CVE-2008-4776 A size check error in status packet parsing routine which could lead to accessing uninitialized memory resulting in a crash. stable/main/binary-ia64/ekg_1.7~rc2-1etch2_ia64.deb stable/main/binary-ia64/libgadu3_1.7~rc2-1etch2_ia64.deb stable/main/binary-ia64/libgadu-dev_1.7~rc2-1etch2_ia64.deb ekg (1:1.7~rc2-1etch2) stable-security; urgency=high * Security upload for etch-security * Patched a medium severity security issue in lib/events.c: - CVE-2008-4776 A size check error in status packet parsing routine which could lead to accessing uninitialized memory resulting in a crash. stable/main/binary-hppa/libgadu-dev_1.7~rc2-1etch2_hppa.deb stable/main/binary-hppa/ekg_1.7~rc2-1etch2_hppa.deb stable/main/binary-hppa/libgadu3_1.7~rc2-1etch2_hppa.deb ekg (1:1.7~rc2-1etch2) stable-security; urgency=high * Security upload for etch-security * Patched a medium severity security issue in lib/events.c: - CVE-2008-4776 A size check error in status packet parsing routine which could lead to accessing uninitialized memory resulting in a crash. stable/main/binary-arm/libgadu-dev_1.7~rc2-1etch2_arm.deb stable/main/binary-arm/libgadu3_1.7~rc2-1etch2_arm.deb stable/main/binary-arm/ekg_1.7~rc2-1etch2_arm.deb ekg (1:1.7~rc2-1etch2) stable-security; urgency=high * Security upload for etch-security * Patched a medium severity security issue in lib/events.c: - CVE-2008-4776 A size check error in status packet parsing routine which could lead to accessing uninitialized memory resulting in a crash. stable/main/binary-amd64/ekg_1.7~rc2-1etch2_amd64.deb stable/main/binary-amd64/libgadu-dev_1.7~rc2-1etch2_amd64.deb stable/main/binary-amd64/libgadu3_1.7~rc2-1etch2_amd64.deb ekg (1:1.7~rc2-1etch2) stable-security; urgency=high * Security upload for etch-security * Patched a medium severity security issue in lib/events.c: - CVE-2008-4776 A size check error in status packet parsing routine which could lead to accessing uninitialized memory resulting in a crash. stable/main/binary-alpha/libgadu3_1.7~rc2-1etch2_alpha.deb stable/main/binary-alpha/libgadu-dev_1.7~rc2-1etch2_alpha.deb stable/main/binary-alpha/ekg_1.7~rc2-1etch2_alpha.deb ekg (1:1.7~rc2-1etch2) stable-security; urgency=high * Security upload for etch-security * Patched a medium severity security issue in lib/events.c: - CVE-2008-4776 A size check error in status packet parsing routine which could lead to accessing uninitialized memory resulting in a crash. stable/main/source/ekg_1.7~rc2-1etch2.dsc stable/main/binary-i386/libgadu-dev_1.7~rc2-1etch2_i386.deb stable/main/binary-i386/libgadu3_1.7~rc2-1etch2_i386.deb stable/main/binary-i386/ekg_1.7~rc2-1etch2_i386.deb stable/main/source/ekg_1.7~rc2-1etch2.diff.gz ekg (1:1.7~rc2-1etch2) stable-security; urgency=high * Security upload for etch-security * Patched a medium severity security issue in lib/events.c: - CVE-2008-4776 A size check error in status packet parsing routine which could lead to accessing uninitialized memory resulting in a crash. stable/main/binary-sparc/dselect_1.13.26_sparc.deb stable/main/binary-sparc/dpkg_1.13.26_sparc.deb dpkg (1.13.26) stable; urgency=low [ Guillem Jover ] * Do not consider it a file conflict if the package contains a symlink to a directory where the existing symlink on-disk points to the same place. Closes: #377682 Thanks to Ian Jackson. * Reintroduce 'no-debsig' back in dpkg.cfg to avoid failing to install any package when debsig-verify is installed. Closes: #311843 [ Updated dpkg translations ] * Romanian (Eddy Petrișor). stable/main/binary-s390/dselect_1.13.26_s390.deb stable/main/binary-s390/dpkg_1.13.26_s390.deb dpkg (1.13.26) stable; urgency=low [ Guillem Jover ] * Do not consider it a file conflict if the package contains a symlink to a directory where the existing symlink on-disk points to the same place. Closes: #377682 Thanks to Ian Jackson. * Reintroduce 'no-debsig' back in dpkg.cfg to avoid failing to install any package when debsig-verify is installed. Closes: #311843 [ Updated dpkg translations ] * Romanian (Eddy Petrișor). stable/main/binary-powerpc/dpkg_1.13.26_powerpc.deb stable/main/binary-powerpc/dselect_1.13.26_powerpc.deb dpkg (1.13.26) stable; urgency=low [ Guillem Jover ] * Do not consider it a file conflict if the package contains a symlink to a directory where the existing symlink on-disk points to the same place. Closes: #377682 Thanks to Ian Jackson. * Reintroduce 'no-debsig' back in dpkg.cfg to avoid failing to install any package when debsig-verify is installed. Closes: #311843 [ Updated dpkg translations ] * Romanian (Eddy Petrișor). stable/main/binary-mipsel/dselect_1.13.26_mipsel.deb stable/main/binary-mipsel/dpkg_1.13.26_mipsel.deb dpkg (1.13.26) stable; urgency=low [ Guillem Jover ] * Do not consider it a file conflict if the package contains a symlink to a directory where the existing symlink on-disk points to the same place. Closes: #377682 Thanks to Ian Jackson. * Reintroduce 'no-debsig' back in dpkg.cfg to avoid failing to install any package when debsig-verify is installed. Closes: #311843 [ Updated dpkg translations ] * Romanian (Eddy PetriH9or). stable/main/binary-mips/dselect_1.13.26_mips.deb stable/main/binary-mips/dpkg_1.13.26_mips.deb dpkg (1.13.26) stable; urgency=low [ Guillem Jover ] * Do not consider it a file conflict if the package contains a symlink to a directory where the existing symlink on-disk points to the same place. Closes: #377682 Thanks to Ian Jackson. * Reintroduce 'no-debsig' back in dpkg.cfg to avoid failing to install any package when debsig-verify is installed. Closes: #311843 [ Updated dpkg translations ] * Romanian (Eddy Petrișor). stable/main/binary-ia64/dpkg_1.13.26_ia64.deb stable/main/binary-ia64/dselect_1.13.26_ia64.deb dpkg (1.13.26) stable; urgency=low [ Guillem Jover ] * Do not consider it a file conflict if the package contains a symlink to a directory where the existing symlink on-disk points to the same place. Closes: #377682 Thanks to Ian Jackson. * Reintroduce 'no-debsig' back in dpkg.cfg to avoid failing to install any package when debsig-verify is installed. Closes: #311843 [ Updated dpkg translations ] * Romanian (Eddy PetriH9or). stable/main/binary-hppa/dselect_1.13.26_hppa.deb stable/main/binary-hppa/dpkg_1.13.26_hppa.deb dpkg (1.13.26) stable; urgency=low [ Guillem Jover ] * Do not consider it a file conflict if the package contains a symlink to a directory where the existing symlink on-disk points to the same place. Closes: #377682 Thanks to Ian Jackson. * Reintroduce 'no-debsig' back in dpkg.cfg to avoid failing to install any package when debsig-verify is installed. Closes: #311843 [ Updated dpkg translations ] * Romanian (Eddy PetriH9or). stable/main/binary-arm/dselect_1.13.26_arm.deb stable/main/binary-arm/dpkg_1.13.26_arm.deb dpkg (1.13.26) stable; urgency=low [ Guillem Jover ] * Do not consider it a file conflict if the package contains a symlink to a directory where the existing symlink on-disk points to the same place. Closes: #377682 Thanks to Ian Jackson. * Reintroduce 'no-debsig' back in dpkg.cfg to avoid failing to install any package when debsig-verify is installed. Closes: #311843 [ Updated dpkg translations ] * Romanian (Eddy Petrișor). stable/main/binary-amd64/dselect_1.13.26_amd64.deb stable/main/binary-amd64/dpkg_1.13.26_amd64.deb dpkg (1.13.26) stable; urgency=low [ Guillem Jover ] * Do not consider it a file conflict if the package contains a symlink to a directory where the existing symlink on-disk points to the same place. Closes: #377682 Thanks to Ian Jackson. * Reintroduce 'no-debsig' back in dpkg.cfg to avoid failing to install any package when debsig-verify is installed. Closes: #311843 [ Updated dpkg translations ] * Romanian (Eddy PetriH9or). stable/main/binary-alpha/dpkg_1.13.26_alpha.deb stable/main/binary-alpha/dselect_1.13.26_alpha.deb dpkg (1.13.26) stable; urgency=low [ Guillem Jover ] * Do not consider it a file conflict if the package contains a symlink to a directory where the existing symlink on-disk points to the same place. Closes: #377682 Thanks to Ian Jackson. * Reintroduce 'no-debsig' back in dpkg.cfg to avoid failing to install any package when debsig-verify is installed. Closes: #311843 [ Updated dpkg translations ] * Romanian (Eddy PetriH9or). stable/main/source/dpkg_1.13.26.tar.gz stable/main/source/dpkg_1.13.26.dsc stable/main/binary-i386/dpkg_1.13.26_i386.deb stable/main/binary-i386/dselect_1.13.26_i386.deb stable/main/binary-all/dpkg-dev_1.13.26_all.deb dpkg (1.13.26) stable; urgency=low [ Guillem Jover ] * Do not consider it a file conflict if the package contains a symlink to a directory where the existing symlink on-disk points to the same place. Closes: #377682 Thanks to Ian Jackson. * Reintroduce 'no-debsig' back in dpkg.cfg to avoid failing to install any package when debsig-verify is installed. Closes: #311843 [ Updated dpkg translations ] * Romanian (Eddy Petrișor). stable/main/binary-sparc/devscripts_2.9.26etch1_sparc.deb devscripts (2.9.26etch1) stable; urgency=low * debsign: + Add support for the new Checksums-Sha* .changes file fields introduced by dpkg 1.14.17 (Closes: #474949) + Abort if any unknown Checksums-* fields are found in the .changes file + Abort if the Format field of the .changes file is unsupported (greater than 1.8, less than 1.7 or non-numeric) + Use a case-insensitive search for field names stable/main/binary-s390/devscripts_2.9.26etch1_s390.deb devscripts (2.9.26etch1) stable; urgency=low * debsign: + Add support for the new Checksums-Sha* .changes file fields introduced by dpkg 1.14.17 (Closes: #474949) + Abort if any unknown Checksums-* fields are found in the .changes file + Abort if the Format field of the .changes file is unsupported (greater than 1.8, less than 1.7 or non-numeric) + Use a case-insensitive search for field names stable/main/binary-powerpc/devscripts_2.9.26etch1_powerpc.deb devscripts (2.9.26etch1) stable; urgency=low * debsign: + Add support for the new Checksums-Sha* .changes file fields introduced by dpkg 1.14.17 (Closes: #474949) + Abort if any unknown Checksums-* fields are found in the .changes file + Abort if the Format field of the .changes file is unsupported (greater than 1.8, less than 1.7 or non-numeric) + Use a case-insensitive search for field names stable/main/binary-mipsel/devscripts_2.9.26etch1_mipsel.deb devscripts (2.9.26etch1) stable; urgency=low * debsign: + Add support for the new Checksums-Sha* .changes file fields introduced by dpkg 1.14.17 (Closes: #474949) + Abort if any unknown Checksums-* fields are found in the .changes file + Abort if the Format field of the .changes file is unsupported (greater than 1.8, less than 1.7 or non-numeric) + Use a case-insensitive search for field names stable/main/binary-mips/devscripts_2.9.26etch1_mips.deb devscripts (2.9.26etch1) stable; urgency=low * debsign + Add support for the new Checksums-Sha* .changes file fields introduced by dpkg 1.14.17 (Closes: #474949) + Abort if any unknown Checksums-* fields are found in the .changes file + Abort if the Format field of the .changes file is unsupported (greater than 1.8, less than 1.7 or non-numeric) + Use a case-insensitive search for field names stable/main/binary-ia64/devscripts_2.9.26etch1_ia64.deb devscripts (2.9.26etch1) stable; urgency=low * debsign: + Add support for the new Checksums-Sha* .changes file fields introduced by dpkg 1.14.17 (Closes: #474949) + Abort if any unknown Checksums-* fields are found in the .changes file + Abort if the Format field of the .changes file is unsupported (greater than 1.8, less than 1.7 or non-numeric) + Use a case-insensitive search for field names stable/main/binary-i386/devscripts_2.9.26etch1_i386.deb devscripts (2.9.26etch1) stable; urgency=low * debsign: + Add support for the new Checksums-Sha* .changes file fields introduced by dpkg 1.14.17 (Closes: #474949) + Abort if any unknown Checksums-* fields are found in the .changes file + Abort if the Format field of the .changes file is unsupported (greater than 1.8, less than 1.7 or non-numeric) + Use a case-insensitive search for field names stable/main/binary-hppa/devscripts_2.9.26etch1_hppa.deb devscripts (2.9.26etch1) stable; urgency=low * debsign: + Add support for the new Checksums-Sha* .changes file fields introduced by dpkg 1.14.17 (Closes: #474949) + Abort if any unknown Checksums-* fields are found in the .changes file + Abort if the Format field of the .changes file is unsupported (greater than 1.8, less than 1.7 or non-numeric) + Use a case-insensitive search for field names stable/main/binary-arm/devscripts_2.9.26etch1_arm.deb devscripts (2.9.26etch1) stable; urgency=low * debsign: + Add support for the new Checksums-Sha* .changes file fields introduced by dpkg 1.14.17 (Closes: #474949) + Abort if any unknown Checksums-* fields are found in the .changes file + Abort if the Format field of the .changes file is unsupported (greater than 1.8, less than 1.7 or non-numeric) + Use a case-insensitive search for field names stable/main/binary-alpha/devscripts_2.9.26etch1_alpha.deb devscripts (2.9.26etch1) stable; urgency=low * debsign: + Add support for the new Checksums-Sha* .changes file fields introduced by dpkg 1.14.17 (Closes: #474949) + Abort if any unknown Checksums-* fields are found in the .changes file + Abort if the Format field of the .changes file is unsupported (greater than 1.8, less than 1.7 or non-numeric) + Use a case-insensitive search for field names stable/main/source/devscripts_2.9.26etch1.dsc stable/main/source/devscripts_2.9.26etch1.tar.gz stable/main/binary-amd64/devscripts_2.9.26etch1_amd64.deb devscripts (2.9.26etch1) stable; urgency=low * debsign: + Add support for the new Checksums-Sha* .changes file fields introduced by dpkg 1.14.17 (Closes: #474949) + Abort if any unknown Checksums-* fields are found in the .changes file + Abort if the Format field of the .changes file is unsupported (greater than 1.8, less than 1.7 or non-numeric) + Use a case-insensitive search for field names stable/main/binary-sparc/dbus_1.0.2-1+etch2_sparc.deb stable/main/binary-sparc/dbus-1-utils_1.0.2-1+etch2_sparc.deb stable/main/binary-sparc/libdbus-1-3_1.0.2-1+etch2_sparc.deb stable/main/binary-sparc/libdbus-1-dev_1.0.2-1+etch2_sparc.deb dbus (1.0.2-1+etch2) stable-security; urgency=high * Non-maintainer upload by the security team * The dbus_signature_validate function does not validate properly, which could be used to perform a DoS (Closes: #501443) Fixes: CVE-2008-3834 stable/main/binary-s390/dbus_1.0.2-1+etch2_s390.deb stable/main/binary-s390/libdbus-1-3_1.0.2-1+etch2_s390.deb stable/main/binary-s390/dbus-1-utils_1.0.2-1+etch2_s390.deb stable/main/binary-s390/libdbus-1-dev_1.0.2-1+etch2_s390.deb dbus (1.0.2-1+etch2) stable-security; urgency=high * Non-maintainer upload by the security team * The dbus_signature_validate function does not validate properly, which could be used to perform a DoS (Closes: #501443) Fixes: CVE-2008-3834 stable/main/binary-powerpc/libdbus-1-dev_1.0.2-1+etch2_powerpc.deb stable/main/binary-powerpc/libdbus-1-3_1.0.2-1+etch2_powerpc.deb stable/main/binary-powerpc/dbus-1-utils_1.0.2-1+etch2_powerpc.deb stable/main/binary-powerpc/dbus_1.0.2-1+etch2_powerpc.deb dbus (1.0.2-1+etch2) stable-security; urgency=high * Non-maintainer upload by the security team * The dbus_signature_validate function does not validate properly, which could be used to perform a DoS (Closes: #501443) Fixes: CVE-2008-3834 stable/main/binary-mipsel/dbus-1-utils_1.0.2-1+etch2_mipsel.deb stable/main/binary-mipsel/dbus_1.0.2-1+etch2_mipsel.deb stable/main/binary-mipsel/libdbus-1-dev_1.0.2-1+etch2_mipsel.deb stable/main/binary-mipsel/libdbus-1-3_1.0.2-1+etch2_mipsel.deb dbus (1.0.2-1+etch2) stable-security; urgency=high * Non-maintainer upload by the security team * The dbus_signature_validate function does not validate properly, which could be used to perform a DoS (Closes: #501443) Fixes: CVE-2008-3834 stable/main/binary-mips/dbus_1.0.2-1+etch2_mips.deb stable/main/binary-mips/dbus-1-utils_1.0.2-1+etch2_mips.deb stable/main/binary-mips/libdbus-1-3_1.0.2-1+etch2_mips.deb stable/main/binary-mips/libdbus-1-dev_1.0.2-1+etch2_mips.deb dbus (1.0.2-1+etch2) stable-security; urgency=high * Non-maintainer upload by the security team * The dbus_signature_validate function does not validate properly, which could be used to perform a DoS (Closes: #501443) Fixes: CVE-2008-3834 stable/main/binary-ia64/dbus_1.0.2-1+etch2_ia64.deb stable/main/binary-ia64/dbus-1-utils_1.0.2-1+etch2_ia64.deb stable/main/binary-ia64/libdbus-1-dev_1.0.2-1+etch2_ia64.deb stable/main/binary-ia64/libdbus-1-3_1.0.2-1+etch2_ia64.deb dbus (1.0.2-1+etch2) stable-security; urgency=high * Non-maintainer upload by the security team * The dbus_signature_validate function does not validate properly, which could be used to perform a DoS (Closes: #501443) Fixes: CVE-2008-3834 stable/main/binary-hppa/dbus-1-utils_1.0.2-1+etch2_hppa.deb stable/main/binary-hppa/dbus_1.0.2-1+etch2_hppa.deb stable/main/binary-hppa/libdbus-1-3_1.0.2-1+etch2_hppa.deb stable/main/binary-hppa/libdbus-1-dev_1.0.2-1+etch2_hppa.deb dbus (1.0.2-1+etch2) stable-security; urgency=high * Non-maintainer upload by the security team * The dbus_signature_validate function does not validate properly, which could be used to perform a DoS (Closes: #501443) Fixes: CVE-2008-3834 stable/main/binary-arm/libdbus-1-dev_1.0.2-1+etch2_arm.deb stable/main/binary-arm/dbus-1-utils_1.0.2-1+etch2_arm.deb stable/main/binary-arm/dbus_1.0.2-1+etch2_arm.deb stable/main/binary-arm/libdbus-1-3_1.0.2-1+etch2_arm.deb dbus (1.0.2-1+etch2) stable-security; urgency=high * Non-maintainer upload by the security team * The dbus_signature_validate function does not validate properly, which could be used to perform a DoS (Closes: #501443) Fixes: CVE-2008-3834 stable/main/binary-amd64/libdbus-1-3_1.0.2-1+etch2_amd64.deb stable/main/binary-amd64/dbus-1-utils_1.0.2-1+etch2_amd64.deb stable/main/binary-amd64/dbus_1.0.2-1+etch2_amd64.deb stable/main/binary-amd64/libdbus-1-dev_1.0.2-1+etch2_amd64.deb dbus (1.0.2-1+etch2) stable-security; urgency=high * Non-maintainer upload by the security team * The dbus_signature_validate function does not validate properly, which could be used to perform a DoS (Closes: #501443) Fixes: CVE-2008-3834 stable/main/binary-alpha/dbus-1-utils_1.0.2-1+etch2_alpha.deb stable/main/binary-alpha/dbus_1.0.2-1+etch2_alpha.deb stable/main/binary-alpha/libdbus-1-3_1.0.2-1+etch2_alpha.deb stable/main/binary-alpha/libdbus-1-dev_1.0.2-1+etch2_alpha.deb dbus (1.0.2-1+etch2) stable-security; urgency=high * Non-maintainer upload by the security team * The dbus_signature_validate function does not validate properly, which could be used to perform a DoS (Closes: #501443) Fixes: CVE-2008-3834 stable/main/binary-i386/libdbus-1-dev_1.0.2-1+etch2_i386.deb stable/main/binary-i386/libdbus-1-3_1.0.2-1+etch2_i386.deb stable/main/source/dbus_1.0.2-1+etch2.dsc stable/main/binary-i386/dbus-1-utils_1.0.2-1+etch2_i386.deb stable/main/binary-i386/dbus_1.0.2-1+etch2_i386.deb stable/main/source/dbus_1.0.2-1+etch2.diff.gz stable/main/binary-all/dbus-1-doc_1.0.2-1+etch2_all.deb dbus (1.0.2-1+etch2) stable-security; urgency=high * Non-maintainer upload by the security team * The dbus_signature_validate function does not validate properly, which could be used to perform a DoS (Closes: #501443) Fixes: CVE-2008-3834 stable/main/binary-sparc/cupsys-client_1.2.7-4etch6_sparc.deb stable/main/binary-sparc/cupsys-bsd_1.2.7-4etch6_sparc.deb stable/main/binary-sparc/libcupsys2-dev_1.2.7-4etch6_sparc.deb stable/main/binary-sparc/libcupsys2_1.2.7-4etch6_sparc.deb stable/main/binary-sparc/libcupsimage2-dev_1.2.7-4etch6_sparc.deb stable/main/binary-sparc/libcupsimage2_1.2.7-4etch6_sparc.deb stable/main/binary-sparc/cupsys-dbg_1.2.7-4etch6_sparc.deb stable/main/binary-sparc/cupsys_1.2.7-4etch6_sparc.deb cupsys (1.2.7-4etch6) stable-security; urgency=high * Non-maintainer upload by the security team * Fix potential integer overflow in image validation code (STR #2974, Closes: #507183) stable/main/binary-s390/libcupsimage2-dev_1.2.7-4etch6_s390.deb stable/main/binary-s390/libcupsys2-dev_1.2.7-4etch6_s390.deb stable/main/binary-s390/cupsys_1.2.7-4etch6_s390.deb stable/main/binary-s390/libcupsimage2_1.2.7-4etch6_s390.deb stable/main/binary-s390/cupsys-bsd_1.2.7-4etch6_s390.deb stable/main/binary-s390/cupsys-dbg_1.2.7-4etch6_s390.deb stable/main/binary-s390/libcupsys2_1.2.7-4etch6_s390.deb stable/main/binary-s390/cupsys-client_1.2.7-4etch6_s390.deb cupsys (1.2.7-4etch6) stable-security; urgency=high * Non-maintainer upload by the security team * Fix potential integer overflow in image validation code (STR #2974, Closes: #507183) stable/main/binary-powerpc/libcupsimage2_1.2.7-4etch6_powerpc.deb stable/main/binary-powerpc/libcupsys2-dev_1.2.7-4etch6_powerpc.deb stable/main/binary-powerpc/cupsys_1.2.7-4etch6_powerpc.deb stable/main/binary-powerpc/libcupsimage2-dev_1.2.7-4etch6_powerpc.deb stable/main/binary-powerpc/libcupsys2_1.2.7-4etch6_powerpc.deb stable/main/binary-powerpc/cupsys-client_1.2.7-4etch6_powerpc.deb stable/main/binary-powerpc/cupsys-bsd_1.2.7-4etch6_powerpc.deb stable/main/binary-powerpc/cupsys-dbg_1.2.7-4etch6_powerpc.deb cupsys (1.2.7-4etch6) stable-security; urgency=high * Non-maintainer upload by the security team * Fix potential integer overflow in image validation code (STR #2974, Closes: #507183) stable/main/binary-mipsel/libcupsys2-dev_1.2.7-4etch6_mipsel.deb stable/main/binary-mipsel/cupsys_1.2.7-4etch6_mipsel.deb stable/main/binary-mipsel/libcupsimage2-dev_1.2.7-4etch6_mipsel.deb stable/main/binary-mipsel/cupsys-bsd_1.2.7-4etch6_mipsel.deb stable/main/binary-mipsel/cupsys-dbg_1.2.7-4etch6_mipsel.deb stable/main/binary-mipsel/cupsys-client_1.2.7-4etch6_mipsel.deb stable/main/binary-mipsel/libcupsimage2_1.2.7-4etch6_mipsel.deb stable/main/binary-mipsel/libcupsys2_1.2.7-4etch6_mipsel.deb cupsys (1.2.7-4etch6) stable-security; urgency=high * Non-maintainer upload by the security team * Fix potential integer overflow in image validation code (STR #2974, Closes: #507183) stable/main/binary-mips/libcupsys2-dev_1.2.7-4etch6_mips.deb stable/main/binary-mips/libcupsimage2-dev_1.2.7-4etch6_mips.deb stable/main/binary-mips/libcupsys2_1.2.7-4etch6_mips.deb stable/main/binary-mips/cupsys-client_1.2.7-4etch6_mips.deb stable/main/binary-mips/cupsys-bsd_1.2.7-4etch6_mips.deb stable/main/binary-mips/cupsys-dbg_1.2.7-4etch6_mips.deb stable/main/binary-mips/cupsys_1.2.7-4etch6_mips.deb stable/main/binary-mips/libcupsimage2_1.2.7-4etch6_mips.deb cupsys (1.2.7-4etch6) stable-security; urgency=high * Non-maintainer upload by the security team * Fix potential integer overflow in image validation code (STR #2974, Closes: #507183) stable/main/binary-ia64/cupsys-dbg_1.2.7-4etch6_ia64.deb stable/main/binary-ia64/libcupsys2-dev_1.2.7-4etch6_ia64.deb stable/main/binary-ia64/cupsys_1.2.7-4etch6_ia64.deb stable/main/binary-ia64/cupsys-client_1.2.7-4etch6_ia64.deb stable/main/binary-ia64/libcupsimage2-dev_1.2.7-4etch6_ia64.deb stable/main/binary-ia64/libcupsimage2_1.2.7-4etch6_ia64.deb stable/main/binary-ia64/libcupsys2_1.2.7-4etch6_ia64.deb stable/main/binary-ia64/cupsys-bsd_1.2.7-4etch6_ia64.deb cupsys (1.2.7-4etch6) stable-security; urgency=high * Non-maintainer upload by the security team * Fix potential integer overflow in image validation code (STR #2974, Closes: #507183) stable/main/binary-hppa/cupsys_1.2.7-4etch6_hppa.deb stable/main/binary-hppa/cupsys-dbg_1.2.7-4etch6_hppa.deb stable/main/binary-hppa/libcupsimage2-dev_1.2.7-4etch6_hppa.deb stable/main/binary-hppa/cupsys-client_1.2.7-4etch6_hppa.deb stable/main/binary-hppa/libcupsimage2_1.2.7-4etch6_hppa.deb stable/main/binary-hppa/cupsys-bsd_1.2.7-4etch6_hppa.deb stable/main/binary-hppa/libcupsys2_1.2.7-4etch6_hppa.deb stable/main/binary-hppa/libcupsys2-dev_1.2.7-4etch6_hppa.deb cupsys (1.2.7-4etch6) stable-security; urgency=high * Non-maintainer upload by the security team * Fix potential integer overflow in image validation code (STR #2974, Closes: #507183) stable/main/binary-arm/cupsys_1.2.7-4etch6_arm.deb stable/main/binary-arm/cupsys-client_1.2.7-4etch6_arm.deb stable/main/binary-arm/libcupsys2-dev_1.2.7-4etch6_arm.deb stable/main/binary-arm/libcupsimage2_1.2.7-4etch6_arm.deb stable/main/binary-arm/libcupsys2_1.2.7-4etch6_arm.deb stable/main/binary-arm/cupsys-bsd_1.2.7-4etch6_arm.deb stable/main/binary-arm/cupsys-dbg_1.2.7-4etch6_arm.deb stable/main/binary-arm/libcupsimage2-dev_1.2.7-4etch6_arm.deb cupsys (1.2.7-4etch6) stable-security; urgency=high * Non-maintainer upload by the security team * Fix potential integer overflow in image validation code (STR #2974, Closes: #507183) stable/main/binary-amd64/cupsys_1.2.7-4etch6_amd64.deb stable/main/binary-amd64/libcupsys2-dev_1.2.7-4etch6_amd64.deb stable/main/binary-amd64/cupsys-bsd_1.2.7-4etch6_amd64.deb stable/main/binary-amd64/libcupsys2_1.2.7-4etch6_amd64.deb stable/main/binary-amd64/libcupsimage2_1.2.7-4etch6_amd64.deb stable/main/binary-amd64/libcupsimage2-dev_1.2.7-4etch6_amd64.deb stable/main/binary-amd64/cupsys-client_1.2.7-4etch6_amd64.deb stable/main/binary-amd64/cupsys-dbg_1.2.7-4etch6_amd64.deb cupsys (1.2.7-4etch6) stable-security; urgency=high * Non-maintainer upload by the security team * Fix potential integer overflow in image validation code (STR #2974, Closes: #507183) stable/main/binary-alpha/cupsys_1.2.7-4etch6_alpha.deb stable/main/binary-alpha/libcupsimage2-dev_1.2.7-4etch6_alpha.deb stable/main/binary-alpha/cupsys-bsd_1.2.7-4etch6_alpha.deb stable/main/binary-alpha/libcupsys2-dev_1.2.7-4etch6_alpha.deb stable/main/binary-alpha/cupsys-dbg_1.2.7-4etch6_alpha.deb stable/main/binary-alpha/libcupsimage2_1.2.7-4etch6_alpha.deb stable/main/binary-alpha/libcupsys2_1.2.7-4etch6_alpha.deb stable/main/binary-alpha/cupsys-client_1.2.7-4etch6_alpha.deb cupsys (1.2.7-4etch6) stable-security; urgency=high * Non-maintainer upload by the security team * Fix potential integer overflow in image validation code (STR #2974, Closes: #507183) stable/main/binary-i386/libcupsimage2-dev_1.2.7-4etch6_i386.deb stable/main/binary-i386/cupsys-client_1.2.7-4etch6_i386.deb stable/main/source/cupsys_1.2.7-4etch6.diff.gz stable/main/binary-i386/libcupsys2_1.2.7-4etch6_i386.deb stable/main/binary-i386/libcupsys2-dev_1.2.7-4etch6_i386.deb stable/main/binary-i386/cupsys_1.2.7-4etch6_i386.deb stable/main/source/cupsys_1.2.7-4etch6.dsc stable/main/binary-i386/cupsys-dbg_1.2.7-4etch6_i386.deb stable/main/binary-i386/libcupsimage2_1.2.7-4etch6_i386.deb stable/main/binary-all/cupsys-common_1.2.7-4etch6_all.deb stable/main/binary-all/libcupsys2-gnutls10_1.2.7-4etch6_all.deb stable/main/binary-i386/cupsys-bsd_1.2.7-4etch6_i386.deb cupsys (1.2.7-4etch6) stable-security; urgency=high * Non-maintainer upload by the security team * Fix potential integer overflow in image validation code (STR #2974, Closes: #507183) stable/main/binary-sparc/libclamav2_0.90.1dfsg-4etch16_sparc.deb stable/main/binary-sparc/clamav-freshclam_0.90.1dfsg-4etch16_sparc.deb stable/main/binary-sparc/libclamav-dev_0.90.1dfsg-4etch16_sparc.deb stable/main/binary-sparc/clamav-milter_0.90.1dfsg-4etch16_sparc.deb stable/main/binary-sparc/clamav-dbg_0.90.1dfsg-4etch16_sparc.deb stable/main/binary-sparc/clamav-daemon_0.90.1dfsg-4etch16_sparc.deb stable/main/binary-sparc/clamav_0.90.1dfsg-4etch16_sparc.deb clamav (0.90.1dfsg-4etch16) stable-security; urgency=high * [CVE-2008-5050]: libclamav/vba_extract.c: possible buffer overflow (Closes: #505134) * [CVE-2008-5314]: libclamav/special.c: respect recursion limits in cli_check_jpeg_exploit() (Closes: #507624) stable/main/binary-s390/clamav-freshclam_0.90.1dfsg-4etch16_s390.deb stable/main/binary-s390/clamav-dbg_0.90.1dfsg-4etch16_s390.deb stable/main/binary-s390/libclamav2_0.90.1dfsg-4etch16_s390.deb stable/main/binary-s390/libclamav-dev_0.90.1dfsg-4etch16_s390.deb stable/main/binary-s390/clamav-daemon_0.90.1dfsg-4etch16_s390.deb stable/main/binary-s390/clamav-milter_0.90.1dfsg-4etch16_s390.deb stable/main/binary-s390/clamav_0.90.1dfsg-4etch16_s390.deb clamav (0.90.1dfsg-4etch16) stable-security; urgency=high * [CVE-2008-5050]: libclamav/vba_extract.c: possible buffer overflow (Closes: #505134) * [CVE-2008-5314]: libclamav/special.c: respect recursion limits in cli_check_jpeg_exploit() (Closes: #507624) stable/main/binary-powerpc/libclamav-dev_0.90.1dfsg-4etch16_powerpc.deb stable/main/binary-powerpc/clamav-freshclam_0.90.1dfsg-4etch16_powerpc.deb stable/main/binary-powerpc/libclamav2_0.90.1dfsg-4etch16_powerpc.deb stable/main/binary-powerpc/clamav_0.90.1dfsg-4etch16_powerpc.deb stable/main/binary-powerpc/clamav-dbg_0.90.1dfsg-4etch16_powerpc.deb stable/main/binary-powerpc/clamav-milter_0.90.1dfsg-4etch16_powerpc.deb stable/main/binary-powerpc/clamav-daemon_0.90.1dfsg-4etch16_powerpc.deb clamav (0.90.1dfsg-4etch16) stable-security; urgency=high * [CVE-2008-5050]: libclamav/vba_extract.c: possible buffer overflow (Closes: #505134) * [CVE-2008-5314]: libclamav/special.c: respect recursion limits in cli_check_jpeg_exploit() (Closes: #507624) stable/main/binary-mipsel/clamav-freshclam_0.90.1dfsg-4etch16_mipsel.deb stable/main/binary-mipsel/clamav-milter_0.90.1dfsg-4etch16_mipsel.deb stable/main/binary-mipsel/libclamav-dev_0.90.1dfsg-4etch16_mipsel.deb stable/main/binary-mipsel/clamav-daemon_0.90.1dfsg-4etch16_mipsel.deb stable/main/binary-mipsel/libclamav2_0.90.1dfsg-4etch16_mipsel.deb stable/main/binary-mipsel/clamav_0.90.1dfsg-4etch16_mipsel.deb stable/main/binary-mipsel/clamav-dbg_0.90.1dfsg-4etch16_mipsel.deb clamav (0.90.1dfsg-4etch16) stable-security; urgency=high * [CVE-2008-5050]: libclamav/vba_extract.c: possible buffer overflow (Closes: #505134) * [CVE-2008-5314]: libclamav/special.c: respect recursion limits in cli_check_jpeg_exploit() (Closes: #507624) stable/main/binary-mips/clamav-milter_0.90.1dfsg-4etch16_mips.deb stable/main/binary-mips/clamav-freshclam_0.90.1dfsg-4etch16_mips.deb stable/main/binary-mips/libclamav2_0.90.1dfsg-4etch16_mips.deb stable/main/binary-mips/clamav-dbg_0.90.1dfsg-4etch16_mips.deb stable/main/binary-mips/clamav-daemon_0.90.1dfsg-4etch16_mips.deb stable/main/binary-mips/clamav_0.90.1dfsg-4etch16_mips.deb stable/main/binary-mips/libclamav-dev_0.90.1dfsg-4etch16_mips.deb clamav (0.90.1dfsg-4etch16) stable-security; urgency=high * [CVE-2008-5050]: libclamav/vba_extract.c: possible buffer overflow (Closes: #505134) * [CVE-2008-5314]: libclamav/special.c: respect recursion limits in cli_check_jpeg_exploit() (Closes: #507624) stable/main/binary-ia64/clamav_0.90.1dfsg-4etch16_ia64.deb stable/main/binary-ia64/clamav-dbg_0.90.1dfsg-4etch16_ia64.deb stable/main/binary-ia64/clamav-milter_0.90.1dfsg-4etch16_ia64.deb stable/main/binary-ia64/clamav-daemon_0.90.1dfsg-4etch16_ia64.deb stable/main/binary-ia64/libclamav2_0.90.1dfsg-4etch16_ia64.deb stable/main/binary-ia64/libclamav-dev_0.90.1dfsg-4etch16_ia64.deb stable/main/binary-ia64/clamav-freshclam_0.90.1dfsg-4etch16_ia64.deb clamav (0.90.1dfsg-4etch16) stable-security; urgency=high * [CVE-2008-5050]: libclamav/vba_extract.c: possible buffer overflow (Closes: #505134) * [CVE-2008-5314]: libclamav/special.c: respect recursion limits in cli_check_jpeg_exploit() (Closes: #507624) stable/main/binary-i386/libclamav-dev_0.90.1dfsg-4etch16_i386.deb stable/main/binary-i386/clamav-freshclam_0.90.1dfsg-4etch16_i386.deb stable/main/binary-i386/clamav-milter_0.90.1dfsg-4etch16_i386.deb stable/main/binary-i386/clamav-dbg_0.90.1dfsg-4etch16_i386.deb stable/main/binary-i386/libclamav2_0.90.1dfsg-4etch16_i386.deb stable/main/binary-i386/clamav_0.90.1dfsg-4etch16_i386.deb stable/main/binary-i386/clamav-daemon_0.90.1dfsg-4etch16_i386.deb clamav (0.90.1dfsg-4etch16) stable-security; urgency=high * [CVE-2008-5050]: libclamav/vba_extract.c: possible buffer overflow (Closes: #505134) * [CVE-2008-5314]: libclamav/special.c: respect recursion limits in cli_check_jpeg_exploit() (Closes: #507624) stable/main/binary-hppa/clamav-freshclam_0.90.1dfsg-4etch16_hppa.deb stable/main/binary-hppa/clamav-milter_0.90.1dfsg-4etch16_hppa.deb stable/main/binary-hppa/clamav-daemon_0.90.1dfsg-4etch16_hppa.deb stable/main/binary-hppa/clamav_0.90.1dfsg-4etch16_hppa.deb stable/main/binary-hppa/libclamav2_0.90.1dfsg-4etch16_hppa.deb stable/main/binary-hppa/clamav-dbg_0.90.1dfsg-4etch16_hppa.deb stable/main/binary-hppa/libclamav-dev_0.90.1dfsg-4etch16_hppa.deb clamav (0.90.1dfsg-4etch16) stable-security; urgency=high * [CVE-2008-5050]: libclamav/vba_extract.c: possible buffer overflow (Closes: #505134) * [CVE-2008-5314]: libclamav/special.c: respect recursion limits in cli_check_jpeg_exploit() (Closes: #507624) stable/main/binary-arm/clamav-daemon_0.90.1dfsg-4etch16_arm.deb stable/main/binary-arm/libclamav2_0.90.1dfsg-4etch16_arm.deb stable/main/binary-arm/clamav-dbg_0.90.1dfsg-4etch16_arm.deb stable/main/binary-arm/clamav_0.90.1dfsg-4etch16_arm.deb stable/main/binary-arm/clamav-freshclam_0.90.1dfsg-4etch16_arm.deb stable/main/binary-arm/clamav-milter_0.90.1dfsg-4etch16_arm.deb stable/main/binary-arm/libclamav-dev_0.90.1dfsg-4etch16_arm.deb clamav (0.90.1dfsg-4etch16) stable-security; urgency=high * [CVE-2008-5050]: libclamav/vba_extract.c: possible buffer overflow (Closes: #505134) * [CVE-2008-5314]: libclamav/special.c: respect recursion limits in cli_check_jpeg_exploit() (Closes: #507624) stable/main/binary-alpha/clamav-daemon_0.90.1dfsg-4etch16_alpha.deb stable/main/binary-alpha/libclamav2_0.90.1dfsg-4etch16_alpha.deb stable/main/binary-alpha/clamav-freshclam_0.90.1dfsg-4etch16_alpha.deb stable/main/binary-alpha/libclamav-dev_0.90.1dfsg-4etch16_alpha.deb stable/main/binary-alpha/clamav-dbg_0.90.1dfsg-4etch16_alpha.deb stable/main/binary-alpha/clamav-milter_0.90.1dfsg-4etch16_alpha.deb stable/main/binary-alpha/clamav_0.90.1dfsg-4etch16_alpha.deb clamav (0.90.1dfsg-4etch16) stable-security; urgency=high * [CVE-2008-5050]: libclamav/vba_extract.c: possible buffer overflow (Closes: #505134) * [CVE-2008-5314]: libclamav/special.c: respect recursion limits in cli_check_jpeg_exploit() (Closes: #507624) stable/main/source/clamav_0.90.1dfsg-4etch16.dsc stable/main/binary-amd64/clamav-milter_0.90.1dfsg-4etch16_amd64.deb stable/main/source/clamav_0.90.1dfsg-4etch16.diff.gz stable/main/binary-all/clamav-base_0.90.1dfsg-4etch16_all.deb stable/main/binary-amd64/clamav-freshclam_0.90.1dfsg-4etch16_amd64.deb stable/main/binary-all/clamav-testfiles_0.90.1dfsg-4etch16_all.deb stable/main/binary-amd64/libclamav-dev_0.90.1dfsg-4etch16_amd64.deb stable/main/binary-amd64/clamav_0.90.1dfsg-4etch16_amd64.deb stable/main/binary-all/clamav-docs_0.90.1dfsg-4etch16_all.deb stable/main/binary-amd64/clamav-daemon_0.90.1dfsg-4etch16_amd64.deb stable/main/binary-amd64/libclamav2_0.90.1dfsg-4etch16_amd64.deb stable/main/binary-amd64/clamav-dbg_0.90.1dfsg-4etch16_amd64.deb clamav (0.90.1dfsg-4etch16) stable-security; urgency=high * [CVE-2008-5050]: libclamav/vba_extract.c: possible buffer overflow (Closes: #505134) * [CVE-2008-5314]: libclamav/special.c: respect recursion limits in cli_check_jpeg_exploit() (Closes: #507624) stable/main/binary-sparc/blender_2.42a-8_sparc.deb blender (2.42a-8) stable; urgency=low * Include patch by James Vega (thanks!) to fix security bug: Blender's BPY_interface was calling PySys_SetArgv so that sys.path was prepended with an empty string, resulting in possible arbitrary code execution, when the working directory contains a file named like one that Blender's python scripts try to import (Closes: #503632). That patch removes empty elements from sys.path: - debian/patches/01_sanitize_sys.path This is CVE-2008-4863. * Acknowledge previous NMU by the security team, thanks Devin Carraway. * Update Maintainer/Uploaders. stable/main/binary-s390/blender_2.42a-8_s390.deb blender (2.42a-8) stable; urgency=low * Include patch by James Vega (thanks!) to fix security bug: Blender's BPY_interface was calling PySys_SetArgv so that sys.path was prepended with an empty string, resulting in possible arbitrary code execution, when the working directory contains a file named like one that Blender's python scripts try to import (Closes: #503632). That patch removes empty elements from sys.path: - debian/patches/01_sanitize_sys.path This is CVE-2008-4863. * Acknowledge previous NMU by the security team, thanks Devin Carraway. * Update Maintainer/Uploaders. stable/main/binary-powerpc/blender_2.42a-8_powerpc.deb blender (2.42a-8) stable; urgency=low * Include patch by James Vega (thanks!) to fix security bug: Blender's BPY_interface was calling PySys_SetArgv so that sys.path was prepended with an empty string, resulting in possible arbitrary code execution, when the working directory contains a file named like one that Blender's python scripts try to import (Closes: #503632). That patch removes empty elements from sys.path: - debian/patches/01_sanitize_sys.path This is CVE-2008-4863. * Acknowledge previous NMU by the security team, thanks Devin Carraway. * Update Maintainer/Uploaders. stable/main/binary-mipsel/blender_2.42a-8_mipsel.deb blender (2.42a-8) stable; urgency=low * Include patch by James Vega (thanks!) to fix security bug: Blender's BPY_interface was calling PySys_SetArgv so that sys.path was prepended with an empty string, resulting in possible arbitrary code execution, when the working directory contains a file named like one that Blender's python scripts try to import (Closes: #503632). That patch removes empty elements from sys.path: - debian/patches/01_sanitize_sys.path This is CVE-2008-4863. * Acknowledge previous NMU by the security team, thanks Devin Carraway. * Update Maintainer/Uploaders. stable/main/binary-mips/blender_2.42a-8_mips.deb blender (2.42a-8) stable; urgency=low * Include patch by James Vega (thanks!) to fix security bug: Blender's BPY_interface was calling PySys_SetArgv so that sys.path was prepended with an empty string, resulting in possible arbitrary code execution, when the working directory contains a file named like one that Blender's python scripts try to import (Closes: #503632). That patch removes empty elements from sys.path - debian/patches/01_sanitize_sys.path This is CVE-2008-4863. * Acknowledge previous NMU by the security team, thanks Devin Carraway. * Update Maintainer/Uploaders. stable/main/binary-ia64/blender_2.42a-8_ia64.deb blender (2.42a-8) stable; urgency=low * Include patch by James Vega (thanks!) to fix security bug: Blender's BPY_interface was calling PySys_SetArgv so that sys.path was prepended with an empty string, resulting in possible arbitrary code execution, when the working directory contains a file named like one that Blender's python scripts try to import (Closes: #503632). That patch removes empty elements from sys.path: - debian/patches/01_sanitize_sys.path This is CVE-2008-4863. * Acknowledge previous NMU by the security team, thanks Devin Carraway. * Update Maintainer/Uploaders. stable/main/binary-i386/blender_2.42a-8_i386.deb blender (2.42a-8) stable; urgency=low * Include patch by James Vega (thanks!) to fix security bug: Blender's BPY_interface was calling PySys_SetArgv so that sys.path was prepended with an empty string, resulting in possible arbitrary code execution, when the working directory contains a file named like one that Blender's python scripts try to import (Closes: #503632). That patch removes empty elements from sys.path: - debian/patches/01_sanitize_sys.path This is CVE-2008-4863. * Acknowledge previous NMU by the security team, thanks Devin Carraway. * Update Maintainer/Uploaders. stable/main/binary-hppa/blender_2.42a-8_hppa.deb blender (2.42a-8) stable; urgency=low * Include patch by James Vega (thanks!) to fix security bug: Blender's BPY_interface was calling PySys_SetArgv so that sys.path was prepended with an empty string, resulting in possible arbitrary code execution, when the working directory contains a file named like one that Blender's python scripts try to import (Closes: #503632). That patch removes empty elements from sys.path: - debian/patches/01_sanitize_sys.path This is CVE-2008-4863. * Acknowledge previous NMU by the security team, thanks Devin Carraway. * Update Maintainer/Uploaders. stable/main/binary-arm/blender_2.42a-8_arm.deb blender (2.42a-8) stable; urgency=low * Include patch by James Vega (thanks!) to fix security bug: Blender's BPY_interface was calling PySys_SetArgv so that sys.path was prepended with an empty string, resulting in possible arbitrary code execution, when the working directory contains a file named like one that Blender's python scripts try to import (Closes: #503632). That patch removes empty elements from sys.path: - debian/patches/01_sanitize_sys.path This is CVE-2008-4863. * Acknowledge previous NMU by the security team, thanks Devin Carraway. * Update Maintainer/Uploaders. stable/main/binary-alpha/blender_2.42a-8_alpha.deb blender (2.42a-8) stable; urgency=low * Include patch by James Vega (thanks!) to fix security bug: Blender's BPY_interface was calling PySys_SetArgv so that sys.path was prepended with an empty string, resulting in possible arbitrary code execution, when the working directory contains a file named like one that Blender's python scripts try to import (Closes: #503632). That patch removes empty elements from sys.path: - debian/patches/01_sanitize_sys.path This is CVE-2008-4863. * Acknowledge previous NMU by the security team, thanks Devin Carraway. * Update Maintainer/Uploaders. stable/main/source/blender_2.42a-8.dsc stable/main/source/blender_2.42a-8.diff.gz stable/main/binary-amd64/blender_2.42a-8_amd64.deb blender (2.42a-8) stable; urgency=low * Include patch by James Vega (thanks!) to fix security bug: Blender's BPY_interface was calling PySys_SetArgv so that sys.path was prepended with an empty string, resulting in possible arbitrary code execution, when the working directory contains a file named like one that Blender's python scripts try to import (Closes: #503632). That patch removes empty elements from sys.path: - debian/patches/01_sanitize_sys.path This is CVE-2008-4863. * Acknowledge previous NMU by the security team, thanks Devin Carraway. * Update Maintainer/Uploaders. stable/main/source/awstats_6.5+dfsg-1+etch1.dsc stable/main/binary-all/awstats_6.5+dfsg-1+etch1_all.deb stable/main/source/awstats_6.5+dfsg-1+etch1.diff.gz awstats (6.5+dfsg-1+etch1) stable-security; urgency=high * Strip '"' characters during URL decoding, fixing a cross-site scripting attack (CVE-2008-3714). ========================================= Thu, 23 Oct 2008 - Debian 4.0r5 released ========================================= stable/main/binary-sparc/yaird_0.0.12-18etch1_sparc.deb yaird (0.0.12-18etch1) stable-proposed-updates; urgency=low * Add patch 1018 to ignore "uniq" hint in input devices, added in Linux 2.6.22. Closes: bug#426728, #431534, #434597, #435227, #435268, #435560, thanks to Bin Zhang and lots of others. * Add patch 1022 to fix passing dashed options to run_init. Closes: bug#416927, thanks to Michael Biebl and Roderick Schupp. This may have been the cause of various other problems passing dashed boot options to userspace tools. * Add patch 1024 to load all available thermal modules. Closes: Bug#457459, thanks to maximilian attems. * Add patch 1025 to fix resolving sysfs eventX symlinks for devices introduced in 2.6.23. Closes: bug#443821, thanks to Jan Echternach and others helping to resolve this issue. * Disable local cdbs snippet copyright-check.mk (broken). stable/main/binary-s390/yaird_0.0.12-18etch1_s390.deb yaird (0.0.12-18etch1) stable-proposed-updates; urgency=low * Add patch 1018 to ignore "uniq" hint in input devices, added in Linux 2.6.22. Closes: bug#426728, #431534, #434597, #435227, #435268, #435560, thanks to Bin Zhang and lots of others. * Add patch 1022 to fix passing dashed options to run_init. Closes: bug#416927, thanks to Michael Biebl and Roderick Schupp. This may have been the cause of various other problems passing dashed boot options to userspace tools. * Add patch 1024 to load all available thermal modules. Closes: Bug#457459, thanks to maximilian attems. * Add patch 1025 to fix resolving sysfs eventX symlinks for devices introduced in 2.6.23. Closes: bug#443821, thanks to Jan Echternach and others helping to resolve this issue. * Disable local cdbs snippet copyright-check.mk (broken). stable/main/binary-powerpc/yaird_0.0.12-18etch1_powerpc.deb yaird (0.0.12-18etch1) stable-proposed-updates; urgency=low * Add patch 1018 to ignore "uniq" hint in input devices, added in Linux 2.6.22. Closes: bug#426728, #431534, #434597, #435227, #435268, #435560, thanks to Bin Zhang and lots of others. * Add patch 1022 to fix passing dashed options to run_init. Closes: bug#416927, thanks to Michael Biebl and Roderick Schupp. This may have been the cause of various other problems passing dashed boot options to userspace tools. * Add patch 1024 to load all available thermal modules. Closes: Bug#457459, thanks to maximilian attems. * Add patch 1025 to fix resolving sysfs eventX symlinks for devices introduced in 2.6.23. Closes: bug#443821, thanks to Jan Echternach and others helping to resolve this issue. * Disable local cdbs snippet copyright-check.mk (broken). stable/main/binary-mipsel/yaird_0.0.12-18etch1_mipsel.deb yaird (0.0.12-18etch1) stable-proposed-updates; urgency=low * Add patch 1018 to ignore "uniq" hint in input devices, added in Linux 2.6.22. Closes: bug#426728, #431534, #434597, #435227, #435268, #435560, thanks to Bin Zhang and lots of others. * Add patch 1022 to fix passing dashed options to run_init. Closes: bug#416927, thanks to Michael Biebl and Roderick Schupp. This may have been the cause of various other problems passing dashed boot options to userspace tools. * Add patch 1024 to load all available thermal modules. Closes: Bug#457459, thanks to maximilian attems. * Add patch 1025 to fix resolving sysfs eventX symlinks for devices introduced in 2.6.23. Closes: bug#443821, thanks to Jan Echternach and others helping to resolve this issue. * Disable local cdbs snippet copyright-check.mk (broken). stable/main/binary-mips/yaird_0.0.12-18etch1_mips.deb yaird (0.0.12-18etch1) stable-proposed-updates; urgency=low * Add patch 1018 to ignore "uniq" hint in input devices, added in Linux 2.6.22. Closes: bug#426728, #431534, #434597, #435227, #435268, #435560, thanks to Bin Zhang and lots of others. * Add patch 1022 to fix passing dashed options to run_init. Closes: bug#416927, thanks to Michael Biebl and Roderick Schupp. This may have been the cause of various other problems passing dashed boot options to userspace tools. * Add patch 1024 to load all available thermal modules. Closes: Bug#457459, thanks to maximilian attems. * Add patch 1025 to fix resolving sysfs eventX symlinks for devices introduced in 2.6.23. Closes: bug#443821, thanks to Jan Echternach and others helping to resolve this issue. * Disable local cdbs snippet copyright-check.mk (broken). stable/main/binary-ia64/yaird_0.0.12-18etch1_ia64.deb yaird (0.0.12-18etch1) stable-proposed-updates; urgency=low * Add patch 1018 to ignore "uniq" hint in input devices, added in Linux 2.6.22. Closes: bug#426728, #431534, #434597, #435227, #435268, #435560, thanks to Bin Zhang and lots of others. * Add patch 1022 to fix passing dashed options to run_init. Closes: bug#416927, thanks to Michael Biebl and Roderick Schupp. This may have been the cause of various other problems passing dashed boot options to userspace tools. * Add patch 1024 to load all available thermal modules. Closes: Bug#457459, thanks to maximilian attems. * Add patch 1025 to fix resolving sysfs eventX symlinks for devices introduced in 2.6.23. Closes: bug#443821, thanks to Jan Echternach and others helping to resolve this issue. * Disable local cdbs snippet copyright-check.mk (broken). stable/main/binary-i386/yaird_0.0.12-18etch1_i386.deb yaird (0.0.12-18etch1) stable-proposed-updates; urgency=low * Add patch 1018 to ignore "uniq" hint in input devices, added in Linux 2.6.22. Closes: bug#426728, #431534, #434597, #435227, #435268, #435560, thanks to Bin Zhang and lots of others. * Add patch 1022 to fix passing dashed options to run_init. Closes: bug#416927, thanks to Michael Biebl and Roderick Schupp. This may have been the cause of various other problems passing dashed boot options to userspace tools. * Add patch 1024 to load all available thermal modules. Closes: Bug#457459, thanks to maximilian attems. * Add patch 1025 to fix resolving sysfs eventX symlinks for devices introduced in 2.6.23. Closes: bug#443821, thanks to Jan Echternach and others helping to resolve this issue. * Disable local cdbs snippet copyright-check.mk (broken). stable/main/binary-hppa/yaird_0.0.12-18etch1_hppa.deb yaird (0.0.12-18etch1) stable-proposed-updates; urgency=low * Add patch 1018 to ignore "uniq" hint in input devices, added in Linux 2.6.22. Closes: bug#426728, #431534, #434597, #435227, #435268, #435560, thanks to Bin Zhang and lots of others. * Add patch 1022 to fix passing dashed options to run_init. Closes: bug#416927, thanks to Michael Biebl and Roderick Schupp. This may have been the cause of various other problems passing dashed boot options to userspace tools. * Add patch 1024 to load all available thermal modules. Closes: Bug#457459, thanks to maximilian attems. * Add patch 1025 to fix resolving sysfs eventX symlinks for devices introduced in 2.6.23. Closes: bug#443821, thanks to Jan Echternach and others helping to resolve this issue. * Disable local cdbs snippet copyright-check.mk (broken). stable/main/binary-arm/yaird_0.0.12-18etch1_arm.deb yaird (0.0.12-18etch1) stable-proposed-updates; urgency=low * Add patch 1018 to ignore "uniq" hint in input devices, added in Linux 2.6.22. Closes: bug#426728, #431534, #434597, #435227, #435268, #435560, thanks to Bin Zhang and lots of others. * Add patch 1022 to fix passing dashed options to run_init. Closes: bug#416927, thanks to Michael Biebl and Roderick Schupp. This may have been the cause of various other problems passing dashed boot options to userspace tools. * Add patch 1024 to load all available thermal modules. Closes: Bug#457459, thanks to maximilian attems. * Add patch 1025 to fix resolving sysfs eventX symlinks for devices introduced in 2.6.23. Closes: bug#443821, thanks to Jan Echternach and others helping to resolve this issue. * Disable local cdbs snippet copyright-check.mk (broken). stable/main/binary-alpha/yaird_0.0.12-18etch1_alpha.deb yaird (0.0.12-18etch1) stable-proposed-updates; urgency=low * Add patch 1018 to ignore "uniq" hint in input devices, added in Linux 2.6.22. Closes: bug#426728, #431534, #434597, #435227, #435268, #435560, thanks to Bin Zhang and lots of others. * Add patch 1022 to fix passing dashed options to run_init. Closes: bug#416927, thanks to Michael Biebl and Roderick Schupp. This may have been the cause of various other problems passing dashed boot options to userspace tools. * Add patch 1024 to load all available thermal modules. Closes: Bug#457459, thanks to maximilian attems. * Add patch 1025 to fix resolving sysfs eventX symlinks for devices introduced in 2.6.23. Closes: bug#443821, thanks to Jan Echternach and others helping to resolve this issue. * Disable local cdbs snippet copyright-check.mk (broken). stable/main/binary-amd64/yaird_0.0.12-18etch1_amd64.deb stable/main/source/yaird_0.0.12-18etch1.dsc stable/main/source/yaird_0.0.12-18etch1.diff.gz yaird (0.0.12-18etch1) stable-proposed-updates; urgency=low * Add patch 1018 to ignore "uniq" hint in input devices, added in Linux 2.6.22. Closes: bug#426728, #431534, #434597, #435227, #435268, #435560, thanks to Bin Zhang and lots of others. * Add patch 1022 to fix passing dashed options to run_init. Closes: bug#416927, thanks to Michael Biebl and Roderick Schupp. This may have been the cause of various other problems passing dashed boot options to userspace tools. * Add patch 1024 to load all available thermal modules. Closes: Bug#457459, thanks to maximilian attems. * Add patch 1025 to fix resolving sysfs eventX symlinks for devices introduced in 2.6.23. Closes: bug#443821, thanks to Jan Echternach and others helping to resolve this issue. * Disable local cdbs snippet copyright-check.mk (broken). stable/main/binary-sparc/python-xpcom_1.8.0.15~pre080614d-0etch1_sparc.deb stable/main/binary-sparc/xulrunner_1.8.0.15~pre080614d-0etch1_sparc.deb stable/main/binary-sparc/libnspr4-0d-dbg_1.8.0.15~pre080614d-0etch1_sparc.deb stable/main/binary-sparc/libmozjs0d_1.8.0.15~pre080614d-0etch1_sparc.deb stable/main/binary-sparc/libnspr4-0d_1.8.0.15~pre080614d-0etch1_sparc.deb stable/main/binary-sparc/libxul0d_1.8.0.15~pre080614d-0etch1_sparc.deb stable/main/binary-sparc/libnss3-0d_1.8.0.15~pre080614d-0etch1_sparc.deb stable/main/binary-sparc/libmozjs0d-dbg_1.8.0.15~pre080614d-0etch1_sparc.deb stable/main/binary-sparc/libnss3-0d-dbg_1.8.0.15~pre080614d-0etch1_sparc.deb stable/main/binary-sparc/libxul0d-dbg_1.8.0.15~pre080614d-0etch1_sparc.deb stable/main/binary-sparc/spidermonkey-bin_1.8.0.15~pre080614d-0etch1_sparc.deb stable/main/binary-sparc/libnss3-tools_1.8.0.15~pre080614d-0etch1_sparc.deb stable/main/binary-sparc/xulrunner-gnome-support_1.8.0.15~pre080614d-0etch1_sparc.deb xulrunner (1.8.0.15~pre080614d-0etch1) stable-security; urgency=low [ Alexander Sack ] * New security/stability upstream release (backports for 2.0.0.15 + 2.0.0.16) * Upstream advisories (v2.0.0.15): MFSA 2008-21 aka CVE-2008-2798 Crashes with evidence of memory corruption (rv:1.8.1.15) MFSA 2008-21 aka CVE-2008-2799 Crashes with evidence of memory corruption (rv:1.8.1.15) MFSA 2008-22 aka CVE-2008-2800 - XSS through JavaScript same-origin violation MFSA 2008-23 aka CVE-2008-2801 - Signed JAR tampering MFSA 2008-24 aka CVE-2008-2802 - Chrome script loading from fastload file MFSA 2008-25 aka CVE-2008-2803 - Arbitrary code execution in mozIJSSubScriptLoader.loadSubScript() MFSA 2008-27 aka CVE-2008-2805 - Arbitrary file upload via originalTarget and DOM Range MFSA 2008-28 aka CVE-2008-2806 - Arbitrary socket connections with Java LiveConnect on Mac OS X MFSA 2008-29 aka CVE-2008-2807 - Faulty .properties file results in uninitialized memory being used MFSA 2008-30 aka CVE-2008-2808 - File location URL in directory listings not escaped properly MFSA 2008-31 aka CVE-2008-2809 - Peer-trusted certs can use alt names to spoof MFSA 2008-32 aka CVE-2008-2810 - Remote site run as local file via Windows URL shortcut MFSA 2008-33 aka CVE-2008-2811 - Crash and remote code execution in block reflow * Upstream advisories (v2.0.0.16): MFSA 2008-35 aka CVE-2008-2785 - Command-line URLs launch multiple tabs when Firefox not running MFSA 2008-34 aka CVE-2008-2933 - Remote code execution by overflowing CSS reference counter MFSA 2008-36 aka CVE-2008-2934 - Crash with malformed GIF file on Mac OS X * debian/patches/90_bz421622.dpatch,90_bz425576.dpatch: drop prepatched prepatches which are now shipped in upstream source. * debian/patches/00list: Updated accordingly. * debian/patches/00list: disable 20_visibility patch now shipped upstream * debian/patches/99_configure.dpatch: updated accordingly. stable/main/binary-s390/libnspr4-0d-dbg_1.8.0.15~pre080614d-0etch1_s390.deb stable/main/binary-s390/libxul0d_1.8.0.15~pre080614d-0etch1_s390.deb stable/main/binary-s390/libmozjs0d_1.8.0.15~pre080614d-0etch1_s390.deb stable/main/binary-s390/libnss3-0d_1.8.0.15~pre080614d-0etch1_s390.deb stable/main/binary-s390/xulrunner_1.8.0.15~pre080614d-0etch1_s390.deb stable/main/binary-s390/libnss3-0d-dbg_1.8.0.15~pre080614d-0etch1_s390.deb stable/main/binary-s390/libxul0d-dbg_1.8.0.15~pre080614d-0etch1_s390.deb stable/main/binary-s390/spidermonkey-bin_1.8.0.15~pre080614d-0etch1_s390.deb stable/main/binary-s390/libnss3-tools_1.8.0.15~pre080614d-0etch1_s390.deb stable/main/binary-s390/libmozjs0d-dbg_1.8.0.15~pre080614d-0etch1_s390.deb stable/main/binary-s390/xulrunner-gnome-support_1.8.0.15~pre080614d-0etch1_s390.deb stable/main/binary-s390/python-xpcom_1.8.0.15~pre080614d-0etch1_s390.deb stable/main/binary-s390/libnspr4-0d_1.8.0.15~pre080614d-0etch1_s390.deb xulrunner (1.8.0.15~pre080614d-0etch1) stable-security; urgency=low [ Alexander Sack ] * New security/stability upstream release (backports for 2.0.0.15 + 2.0.0.16) * Upstream advisories (v2.0.0.15): MFSA 2008-21 aka CVE-2008-2798 Crashes with evidence of memory corruption (rv:1.8.1.15) MFSA 2008-21 aka CVE-2008-2799 Crashes with evidence of memory corruption (rv:1.8.1.15) MFSA 2008-22 aka CVE-2008-2800 - XSS through JavaScript same-origin violation MFSA 2008-23 aka CVE-2008-2801 - Signed JAR tampering MFSA 2008-24 aka CVE-2008-2802 - Chrome script loading from fastload file MFSA 2008-25 aka CVE-2008-2803 - Arbitrary code execution in mozIJSSubScriptLoader.loadSubScript() MFSA 2008-27 aka CVE-2008-2805 - Arbitrary file upload via originalTarget and DOM Range MFSA 2008-28 aka CVE-2008-2806 - Arbitrary socket connections with Java LiveConnect on Mac OS X MFSA 2008-29 aka CVE-2008-2807 - Faulty .properties file results in uninitialized memory being used MFSA 2008-30 aka CVE-2008-2808 - File location URL in directory listings not escaped properly MFSA 2008-31 aka CVE-2008-2809 - Peer-trusted certs can use alt names to spoof MFSA 2008-32 aka CVE-2008-2810 - Remote site run as local file via Windows URL shortcut MFSA 2008-33 aka CVE-2008-2811 - Crash and remote code execution in block reflow * Upstream advisories (v2.0.0.16): MFSA 2008-35 aka CVE-2008-2785 - Command-line URLs launch multiple tabs when Firefox not running MFSA 2008-34 aka CVE-2008-2933 - Remote code execution by overflowing CSS reference counter MFSA 2008-36 aka CVE-2008-2934 - Crash with malformed GIF file on Mac OS X * debian/patches/90_bz421622.dpatch,90_bz425576.dpatch: drop prepatched prepatches which are now shipped in upstream source. * debian/patches/00list: Updated accordingly. * debian/patches/00list: disable 20_visibility patch now shipped upstream * debian/patches/99_configure.dpatch: updated accordingly. stable/main/binary-powerpc/libnss3-tools_1.8.0.15~pre080614d-0etch1_powerpc.deb stable/main/binary-powerpc/libnspr4-0d_1.8.0.15~pre080614d-0etch1_powerpc.deb stable/main/binary-powerpc/libmozjs0d_1.8.0.15~pre080614d-0etch1_powerpc.deb stable/main/binary-powerpc/libnss3-0d_1.8.0.15~pre080614d-0etch1_powerpc.deb stable/main/binary-powerpc/libnss3-0d-dbg_1.8.0.15~pre080614d-0etch1_powerpc.deb stable/main/binary-powerpc/libmozjs0d-dbg_1.8.0.15~pre080614d-0etch1_powerpc.deb stable/main/binary-powerpc/libnspr4-0d-dbg_1.8.0.15~pre080614d-0etch1_powerpc.deb stable/main/binary-powerpc/spidermonkey-bin_1.8.0.15~pre080614d-0etch1_powerpc.deb stable/main/binary-powerpc/libxul0d_1.8.0.15~pre080614d-0etch1_powerpc.deb stable/main/binary-powerpc/libxul0d-dbg_1.8.0.15~pre080614d-0etch1_powerpc.deb stable/main/binary-powerpc/python-xpcom_1.8.0.15~pre080614d-0etch1_powerpc.deb stable/main/binary-powerpc/xulrunner-gnome-support_1.8.0.15~pre080614d-0etch1_powerpc.deb stable/main/binary-powerpc/xulrunner_1.8.0.15~pre080614d-0etch1_powerpc.deb xulrunner (1.8.0.15~pre080614d-0etch1) stable-security; urgency=low [ Alexander Sack ] * New security/stability upstream release (backports for 2.0.0.15 + 2.0.0.16) * Upstream advisories (v2.0.0.15): MFSA 2008-21 aka CVE-2008-2798 Crashes with evidence of memory corruption (rv:1.8.1.15) MFSA 2008-21 aka CVE-2008-2799 Crashes with evidence of memory corruption (rv:1.8.1.15) MFSA 2008-22 aka CVE-2008-2800 - XSS through JavaScript same-origin violation MFSA 2008-23 aka CVE-2008-2801 - Signed JAR tampering MFSA 2008-24 aka CVE-2008-2802 - Chrome script loading from fastload file MFSA 2008-25 aka CVE-2008-2803 - Arbitrary code execution in mozIJSSubScriptLoader.loadSubScript() MFSA 2008-27 aka CVE-2008-2805 - Arbitrary file upload via originalTarget and DOM Range MFSA 2008-28 aka CVE-2008-2806 - Arbitrary socket connections with Java LiveConnect on Mac OS X MFSA 2008-29 aka CVE-2008-2807 - Faulty .properties file results in uninitialized memory being used MFSA 2008-30 aka CVE-2008-2808 - File location URL in directory listings not escaped properly MFSA 2008-31 aka CVE-2008-2809 - Peer-trusted certs can use alt names to spoof MFSA 2008-32 aka CVE-2008-2810 - Remote site run as local file via Windows URL shortcut MFSA 2008-33 aka CVE-2008-2811 - Crash and remote code execution in block reflow * Upstream advisories (v2.0.0.16): MFSA 2008-35 aka CVE-2008-2785 - Command-line URLs launch multiple tabs when Firefox not running MFSA 2008-34 aka CVE-2008-2933 - Remote code execution by overflowing CSS reference counter MFSA 2008-36 aka CVE-2008-2934 - Crash with malformed GIF file on Mac OS X * debian/patches/90_bz421622.dpatch,90_bz425576.dpatch: drop prepatched prepatches which are now shipped in upstream source. * debian/patches/00list: Updated accordingly. * debian/patches/00list: disable 20_visibility patch now shipped upstream * debian/patches/99_configure.dpatch: updated accordingly. stable/main/binary-mipsel/libnss3-0d_1.8.0.15~pre080614d-0etch1_mipsel.deb stable/main/binary-mipsel/libmozjs0d-dbg_1.8.0.15~pre080614d-0etch1_mipsel.deb stable/main/binary-mipsel/libnspr4-0d_1.8.0.15~pre080614d-0etch1_mipsel.deb stable/main/binary-mipsel/libnspr4-0d-dbg_1.8.0.15~pre080614d-0etch1_mipsel.deb stable/main/binary-mipsel/python-xpcom_1.8.0.15~pre080614d-0etch1_mipsel.deb stable/main/binary-mipsel/xulrunner-gnome-support_1.8.0.15~pre080614d-0etch1_mipsel.deb stable/main/binary-mipsel/libxul0d-dbg_1.8.0.15~pre080614d-0etch1_mipsel.deb stable/main/binary-mipsel/xulrunner_1.8.0.15~pre080614d-0etch1_mipsel.deb stable/main/binary-mipsel/libxul0d_1.8.0.15~pre080614d-0etch1_mipsel.deb stable/main/binary-mipsel/libnss3-tools_1.8.0.15~pre080614d-0etch1_mipsel.deb stable/main/binary-mipsel/libmozjs0d_1.8.0.15~pre080614d-0etch1_mipsel.deb stable/main/binary-mipsel/spidermonkey-bin_1.8.0.15~pre080614d-0etch1_mipsel.deb stable/main/binary-mipsel/libnss3-0d-dbg_1.8.0.15~pre080614d-0etch1_mipsel.deb xulrunner (1.8.0.15~pre080614d-0etch1) stable-security; urgency=low [ Alexander Sack ] * New security/stability upstream release (backports for 2.0.0.15 + 2.0.0.16) * Upstream advisories (v2.0.0.15): MFSA 2008-21 aka CVE-2008-2798 Crashes with evidence of memory corruption (rv:1.8.1.15) MFSA 2008-21 aka CVE-2008-2799 Crashes with evidence of memory corruption (rv:1.8.1.15) MFSA 2008-22 aka CVE-2008-2800 - XSS through JavaScript same-origin violation MFSA 2008-23 aka CVE-2008-2801 - Signed JAR tampering MFSA 2008-24 aka CVE-2008-2802 - Chrome script loading from fastload file MFSA 2008-25 aka CVE-2008-2803 - Arbitrary code execution in mozIJSSubScriptLoader.loadSubScript() MFSA 2008-27 aka CVE-2008-2805 - Arbitrary file upload via originalTarget and DOM Range MFSA 2008-28 aka CVE-2008-2806 - Arbitrary socket connections with Java LiveConnect on Mac OS X MFSA 2008-29 aka CVE-2008-2807 - Faulty .properties file results in uninitialized memory being used MFSA 2008-30 aka CVE-2008-2808 - File location URL in directory listings not escaped properly MFSA 2008-31 aka CVE-2008-2809 - Peer-trusted certs can use alt names to spoof MFSA 2008-32 aka CVE-2008-2810 - Remote site run as local file via Windows URL shortcut MFSA 2008-33 aka CVE-2008-2811 - Crash and remote code execution in block reflow * Upstream advisories (v2.0.0.16): MFSA 2008-35 aka CVE-2008-2785 - Command-line URLs launch multiple tabs when Firefox not running MFSA 2008-34 aka CVE-2008-2933 - Remote code execution by overflowing CSS reference counter MFSA 2008-36 aka CVE-2008-2934 - Crash with malformed GIF file on Mac OS X * debian/patches/90_bz421622.dpatch,90_bz425576.dpatch: drop prepatched prepatches which are now shipped in upstream source. * debian/patches/00list: Updated accordingly. * debian/patches/00list: disable 20_visibility patch now shipped upstream * debian/patches/99_configure.dpatch: updated accordingly. stable/main/binary-mips/xulrunner-gnome-support_1.8.0.15~pre080614d-0etch1_mips.deb stable/main/binary-mips/libnss3-0d-dbg_1.8.0.15~pre080614d-0etch1_mips.deb stable/main/binary-mips/libnss3-0d_1.8.0.15~pre080614d-0etch1_mips.deb stable/main/binary-mips/libmozjs0d-dbg_1.8.0.15~pre080614d-0etch1_mips.deb stable/main/binary-mips/libxul0d-dbg_1.8.0.15~pre080614d-0etch1_mips.deb stable/main/binary-mips/libnspr4-0d-dbg_1.8.0.15~pre080614d-0etch1_mips.deb stable/main/binary-mips/libnspr4-0d_1.8.0.15~pre080614d-0etch1_mips.deb stable/main/binary-mips/xulrunner_1.8.0.15~pre080614d-0etch1_mips.deb stable/main/binary-mips/python-xpcom_1.8.0.15~pre080614d-0etch1_mips.deb stable/main/binary-mips/spidermonkey-bin_1.8.0.15~pre080614d-0etch1_mips.deb stable/main/binary-mips/libmozjs0d_1.8.0.15~pre080614d-0etch1_mips.deb stable/main/binary-mips/libnss3-tools_1.8.0.15~pre080614d-0etch1_mips.deb stable/main/binary-mips/libxul0d_1.8.0.15~pre080614d-0etch1_mips.deb xulrunner (1.8.0.15~pre080614d-0etch1) stable-security; urgency=low [ Alexander Sack ] * New security/stability upstream release (backports for 2.0.0.15 + 2.0.0.16) * Upstream advisories (v2.0.0.15): MFSA 2008-21 aka CVE-2008-2798 Crashes with evidence of memory corruption (rv:1.8.1.15) MFSA 2008-21 aka CVE-2008-2799 Crashes with evidence of memory corruption (rv:1.8.1.15) MFSA 2008-22 aka CVE-2008-2800 - XSS through JavaScript same-origin violation MFSA 2008-23 aka CVE-2008-2801 - Signed JAR tampering MFSA 2008-24 aka CVE-2008-2802 - Chrome script loading from fastload file MFSA 2008-25 aka CVE-2008-2803 - Arbitrary code execution in mozIJSSubScriptLoader.loadSubScript() MFSA 2008-27 aka CVE-2008-2805 - Arbitrary file upload via originalTarget and DOM Range MFSA 2008-28 aka CVE-2008-2806 - Arbitrary socket connections with Java LiveConnect on Mac OS X MFSA 2008-29 aka CVE-2008-2807 - Faulty .properties file results in uninitialized memory being used MFSA 2008-30 aka CVE-2008-2808 - File location URL in directory listings not escaped properly MFSA 2008-31 aka CVE-2008-2809 - Peer-trusted certs can use alt names to spoof MFSA 2008-32 aka CVE-2008-2810 - Remote site run as local file via Windows URL shortcut MFSA 2008-33 aka CVE-2008-2811 - Crash and remote code execution in block reflow * Upstream advisories (v2.0.0.16): MFSA 2008-35 aka CVE-2008-2785 - Command-line URLs launch multiple tabs when Firefox not running MFSA 2008-34 aka CVE-2008-2933 - Remote code execution by overflowing CSS reference counter MFSA 2008-36 aka CVE-2008-2934 - Crash with malformed GIF file on Mac OS X * debian/patches/90_bz421622.dpatch,90_bz425576.dpatch: drop prepatched prepatches which are now shipped in upstream source. * debian/patches/00list: Updated accordingly. * debian/patches/00list: disable 20_visibility patch now shipped upstream * debian/patches/99_configure.dpatch: updated accordingly. stable/main/binary-ia64/libnspr4-0d-dbg_1.8.0.15~pre080614d-0etch1_ia64.deb stable/main/binary-ia64/libnss3-0d_1.8.0.15~pre080614d-0etch1_ia64.deb stable/main/binary-ia64/xulrunner-gnome-support_1.8.0.15~pre080614d-0etch1_ia64.deb stable/main/binary-ia64/spidermonkey-bin_1.8.0.15~pre080614d-0etch1_ia64.deb stable/main/binary-ia64/libxul0d-dbg_1.8.0.15~pre080614d-0etch1_ia64.deb stable/main/binary-ia64/libnss3-0d-dbg_1.8.0.15~pre080614d-0etch1_ia64.deb stable/main/binary-ia64/libmozjs0d-dbg_1.8.0.15~pre080614d-0etch1_ia64.deb stable/main/binary-ia64/libmozjs0d_1.8.0.15~pre080614d-0etch1_ia64.deb stable/main/binary-ia64/libnss3-tools_1.8.0.15~pre080614d-0etch1_ia64.deb stable/main/binary-ia64/libxul0d_1.8.0.15~pre080614d-0etch1_ia64.deb stable/main/binary-ia64/libnspr4-0d_1.8.0.15~pre080614d-0etch1_ia64.deb stable/main/binary-ia64/python-xpcom_1.8.0.15~pre080614d-0etch1_ia64.deb stable/main/binary-ia64/xulrunner_1.8.0.15~pre080614d-0etch1_ia64.deb xulrunner (1.8.0.15~pre080614d-0etch1) stable-security; urgency=low [ Alexander Sack ] * New security/stability upstream release (backports for 2.0.0.15 + 2.0.0.16) * Upstream advisories (v2.0.0.15): MFSA 2008-21 aka CVE-2008-2798 Crashes with evidence of memory corruption (rv:1.8.1.15) MFSA 2008-21 aka CVE-2008-2799 Crashes with evidence of memory corruption (rv:1.8.1.15) MFSA 2008-22 aka CVE-2008-2800 - XSS through JavaScript same-origin violation MFSA 2008-23 aka CVE-2008-2801 - Signed JAR tampering MFSA 2008-24 aka CVE-2008-2802 - Chrome script loading from fastload file MFSA 2008-25 aka CVE-2008-2803 - Arbitrary code execution in mozIJSSubScriptLoader.loadSubScript() MFSA 2008-27 aka CVE-2008-2805 - Arbitrary file upload via originalTarget and DOM Range MFSA 2008-28 aka CVE-2008-2806 - Arbitrary socket connections with Java LiveConnect on Mac OS X MFSA 2008-29 aka CVE-2008-2807 - Faulty .properties file results in uninitialized memory being used MFSA 2008-30 aka CVE-2008-2808 - File location URL in directory listings not escaped properly MFSA 2008-31 aka CVE-2008-2809 - Peer-trusted certs can use alt names to spoof MFSA 2008-32 aka CVE-2008-2810 - Remote site run as local file via Windows URL shortcut MFSA 2008-33 aka CVE-2008-2811 - Crash and remote code execution in block reflow * Upstream advisories (v2.0.0.16): MFSA 2008-35 aka CVE-2008-2785 - Command-line URLs launch multiple tabs when Firefox not running MFSA 2008-34 aka CVE-2008-2933 - Remote code execution by overflowing CSS reference counter MFSA 2008-36 aka CVE-2008-2934 - Crash with malformed GIF file on Mac OS X * debian/patches/90_bz421622.dpatch,90_bz425576.dpatch: drop prepatched prepatches which are now shipped in upstream source. * debian/patches/00list: Updated accordingly. * debian/patches/00list: disable 20_visibility patch now shipped upstream * debian/patches/99_configure.dpatch: updated accordingly. stable/main/binary-hppa/libnspr4-0d_1.8.0.15~pre080614d-0etch1_hppa.deb stable/main/binary-hppa/libnss3-0d-dbg_1.8.0.15~pre080614d-0etch1_hppa.deb stable/main/binary-hppa/libnss3-tools_1.8.0.15~pre080614d-0etch1_hppa.deb stable/main/binary-hppa/libxul0d-dbg_1.8.0.15~pre080614d-0etch1_hppa.deb stable/main/binary-hppa/libnss3-0d_1.8.0.15~pre080614d-0etch1_hppa.deb stable/main/binary-hppa/xulrunner_1.8.0.15~pre080614d-0etch1_hppa.deb stable/main/binary-hppa/libmozjs0d_1.8.0.15~pre080614d-0etch1_hppa.deb stable/main/binary-hppa/python-xpcom_1.8.0.15~pre080614d-0etch1_hppa.deb stable/main/binary-hppa/libxul0d_1.8.0.15~pre080614d-0etch1_hppa.deb stable/main/binary-hppa/spidermonkey-bin_1.8.0.15~pre080614d-0etch1_hppa.deb stable/main/binary-hppa/xulrunner-gnome-support_1.8.0.15~pre080614d-0etch1_hppa.deb stable/main/binary-hppa/libnspr4-0d-dbg_1.8.0.15~pre080614d-0etch1_hppa.deb stable/main/binary-hppa/libmozjs0d-dbg_1.8.0.15~pre080614d-0etch1_hppa.deb xulrunner (1.8.0.15~pre080614d-0etch1) stable-security; urgency=low [ Alexander Sack ] * New security/stability upstream release (backports for 2.0.0.15 + 2.0.0.16) * Upstream advisories (v2.0.0.15): MFSA 2008-21 aka CVE-2008-2798 Crashes with evidence of memory corruption (rv:1.8.1.15) MFSA 2008-21 aka CVE-2008-2799 Crashes with evidence of memory corruption (rv:1.8.1.15) MFSA 2008-22 aka CVE-2008-2800 - XSS through JavaScript same-origin violation MFSA 2008-23 aka CVE-2008-2801 - Signed JAR tampering MFSA 2008-24 aka CVE-2008-2802 - Chrome script loading from fastload file MFSA 2008-25 aka CVE-2008-2803 - Arbitrary code execution in mozIJSSubScriptLoader.loadSubScript() MFSA 2008-27 aka CVE-2008-2805 - Arbitrary file upload via originalTarget and DOM Range MFSA 2008-28 aka CVE-2008-2806 - Arbitrary socket connections with Java LiveConnect on Mac OS X MFSA 2008-29 aka CVE-2008-2807 - Faulty .properties file results in uninitialized memory being used MFSA 2008-30 aka CVE-2008-2808 - File location URL in directory listings not escaped properly MFSA 2008-31 aka CVE-2008-2809 - Peer-trusted certs can use alt names to spoof MFSA 2008-32 aka CVE-2008-2810 - Remote site run as local file via Windows URL shortcut MFSA 2008-33 aka CVE-2008-2811 - Crash and remote code execution in block reflow * Upstream advisories (v2.0.0.16): MFSA 2008-35 aka CVE-2008-2785 - Command-line URLs launch multiple tabs when Firefox not running MFSA 2008-34 aka CVE-2008-2933 - Remote code execution by overflowing CSS reference counter MFSA 2008-36 aka CVE-2008-2934 - Crash with malformed GIF file on Mac OS X * debian/patches/90_bz421622.dpatch,90_bz425576.dpatch: drop prepatched prepatches which are now shipped in upstream source. * debian/patches/00list: Updated accordingly. * debian/patches/00list: disable 20_visibility patch now shipped upstream * debian/patches/99_configure.dpatch: updated accordingly. stable/main/binary-arm/xulrunner_1.8.0.15~pre080614d-0etch1_arm.deb stable/main/binary-arm/libnspr4-0d_1.8.0.15~pre080614d-0etch1_arm.deb stable/main/binary-arm/python-xpcom_1.8.0.15~pre080614d-0etch1_arm.deb stable/main/binary-arm/libnss3-0d-dbg_1.8.0.15~pre080614d-0etch1_arm.deb stable/main/binary-arm/libmozjs0d-dbg_1.8.0.15~pre080614d-0etch1_arm.deb stable/main/binary-arm/libmozjs0d_1.8.0.15~pre080614d-0etch1_arm.deb stable/main/binary-arm/spidermonkey-bin_1.8.0.15~pre080614d-0etch1_arm.deb stable/main/binary-arm/libnss3-tools_1.8.0.15~pre080614d-0etch1_arm.deb stable/main/binary-arm/libnspr4-0d-dbg_1.8.0.15~pre080614d-0etch1_arm.deb stable/main/binary-arm/xulrunner-gnome-support_1.8.0.15~pre080614d-0etch1_arm.deb stable/main/binary-arm/libxul0d_1.8.0.15~pre080614d-0etch1_arm.deb stable/main/binary-arm/libnss3-0d_1.8.0.15~pre080614d-0etch1_arm.deb stable/main/binary-arm/libxul0d-dbg_1.8.0.15~pre080614d-0etch1_arm.deb xulrunner (1.8.0.15~pre080614d-0etch1) stable-security; urgency=low [ Alexander Sack ] * New security/stability upstream release (backports for 2.0.0.15 + 2.0.0.16) * Upstream advisories (v2.0.0.15): MFSA 2008-21 aka CVE-2008-2798 Crashes with evidence of memory corruption (rv:1.8.1.15) MFSA 2008-21 aka CVE-2008-2799 Crashes with evidence of memory corruption (rv:1.8.1.15) MFSA 2008-22 aka CVE-2008-2800 - XSS through JavaScript same-origin violation MFSA 2008-23 aka CVE-2008-2801 - Signed JAR tampering MFSA 2008-24 aka CVE-2008-2802 - Chrome script loading from fastload file MFSA 2008-25 aka CVE-2008-2803 - Arbitrary code execution in mozIJSSubScriptLoader.loadSubScript() MFSA 2008-27 aka CVE-2008-2805 - Arbitrary file upload via originalTarget and DOM Range MFSA 2008-28 aka CVE-2008-2806 - Arbitrary socket connections with Java LiveConnect on Mac OS X MFSA 2008-29 aka CVE-2008-2807 - Faulty .properties file results in uninitialized memory being used MFSA 2008-30 aka CVE-2008-2808 - File location URL in directory listings not escaped properly MFSA 2008-31 aka CVE-2008-2809 - Peer-trusted certs can use alt names to spoof MFSA 2008-32 aka CVE-2008-2810 - Remote site run as local file via Windows URL shortcut MFSA 2008-33 aka CVE-2008-2811 - Crash and remote code execution in block reflow * Upstream advisories (v2.0.0.16): MFSA 2008-35 aka CVE-2008-2785 - Command-line URLs launch multiple tabs when Firefox not running MFSA 2008-34 aka CVE-2008-2933 - Remote code execution by overflowing CSS reference counter MFSA 2008-36 aka CVE-2008-2934 - Crash with malformed GIF file on Mac OS X * debian/patches/90_bz421622.dpatch,90_bz425576.dpatch: drop prepatched prepatches which are now shipped in upstream source. * debian/patches/00list: Updated accordingly. * debian/patches/00list: disable 20_visibility patch now shipped upstream * debian/patches/99_configure.dpatch: updated accordingly. stable/main/binary-amd64/libmozjs0d-dbg_1.8.0.15~pre080614d-0etch1_amd64.deb stable/main/binary-amd64/xulrunner-gnome-support_1.8.0.15~pre080614d-0etch1_amd64.deb stable/main/binary-amd64/libnss3-0d_1.8.0.15~pre080614d-0etch1_amd64.deb stable/main/binary-amd64/libmozjs0d_1.8.0.15~pre080614d-0etch1_amd64.deb stable/main/binary-amd64/libnspr4-0d_1.8.0.15~pre080614d-0etch1_amd64.deb stable/main/binary-amd64/spidermonkey-bin_1.8.0.15~pre080614d-0etch1_amd64.deb stable/main/binary-amd64/python-xpcom_1.8.0.15~pre080614d-0etch1_amd64.deb stable/main/binary-amd64/libnss3-0d-dbg_1.8.0.15~pre080614d-0etch1_amd64.deb stable/main/binary-amd64/libnss3-tools_1.8.0.15~pre080614d-0etch1_amd64.deb stable/main/binary-amd64/libxul0d-dbg_1.8.0.15~pre080614d-0etch1_amd64.deb stable/main/binary-amd64/xulrunner_1.8.0.15~pre080614d-0etch1_amd64.deb stable/main/binary-amd64/libxul0d_1.8.0.15~pre080614d-0etch1_amd64.deb stable/main/binary-amd64/libnspr4-0d-dbg_1.8.0.15~pre080614d-0etch1_amd64.deb xulrunner (1.8.0.15~pre080614d-0etch1) stable-security; urgency=low [ Alexander Sack ] * New security/stability upstream release (backports for 2.0.0.15 + 2.0.0.16) * Upstream advisories (v2.0.0.15): MFSA 2008-21 aka CVE-2008-2798 Crashes with evidence of memory corruption (rv:1.8.1.15) MFSA 2008-21 aka CVE-2008-2799 Crashes with evidence of memory corruption (rv:1.8.1.15) MFSA 2008-22 aka CVE-2008-2800 - XSS through JavaScript same-origin violation MFSA 2008-23 aka CVE-2008-2801 - Signed JAR tampering MFSA 2008-24 aka CVE-2008-2802 - Chrome script loading from fastload file MFSA 2008-25 aka CVE-2008-2803 - Arbitrary code execution in mozIJSSubScriptLoader.loadSubScript() MFSA 2008-27 aka CVE-2008-2805 - Arbitrary file upload via originalTarget and DOM Range MFSA 2008-28 aka CVE-2008-2806 - Arbitrary socket connections with Java LiveConnect on Mac OS X MFSA 2008-29 aka CVE-2008-2807 - Faulty .properties file results in uninitialized memory being used MFSA 2008-30 aka CVE-2008-2808 - File location URL in directory listings not escaped properly MFSA 2008-31 aka CVE-2008-2809 - Peer-trusted certs can use alt names to spoof MFSA 2008-32 aka CVE-2008-2810 - Remote site run as local file via Windows URL shortcut MFSA 2008-33 aka CVE-2008-2811 - Crash and remote code execution in block reflow * Upstream advisories (v2.0.0.16): MFSA 2008-35 aka CVE-2008-2785 - Command-line URLs launch multiple tabs when Firefox not running MFSA 2008-34 aka CVE-2008-2933 - Remote code execution by overflowing CSS reference counter MFSA 2008-36 aka CVE-2008-2934 - Crash with malformed GIF file on Mac OS X * debian/patches/90_bz421622.dpatch,90_bz425576.dpatch: drop prepatched prepatches which are now shipped in upstream source. * debian/patches/00list: Updated accordingly. * debian/patches/00list: disable 20_visibility patch now shipped upstream * debian/patches/99_configure.dpatch: updated accordingly. stable/main/binary-alpha/libxul0d_1.8.0.15~pre080614d-0etch1_alpha.deb stable/main/binary-alpha/libxul0d-dbg_1.8.0.15~pre080614d-0etch1_alpha.deb stable/main/binary-alpha/xulrunner_1.8.0.15~pre080614d-0etch1_alpha.deb stable/main/binary-alpha/libmozjs0d_1.8.0.15~pre080614d-0etch1_alpha.deb stable/main/binary-alpha/libnss3-0d-dbg_1.8.0.15~pre080614d-0etch1_alpha.deb stable/main/binary-alpha/spidermonkey-bin_1.8.0.15~pre080614d-0etch1_alpha.deb stable/main/binary-alpha/libnss3-0d_1.8.0.15~pre080614d-0etch1_alpha.deb stable/main/binary-alpha/libnspr4-0d-dbg_1.8.0.15~pre080614d-0etch1_alpha.deb stable/main/binary-alpha/libnss3-tools_1.8.0.15~pre080614d-0etch1_alpha.deb stable/main/binary-alpha/xulrunner-gnome-support_1.8.0.15~pre080614d-0etch1_alpha.deb stable/main/binary-alpha/libmozjs0d-dbg_1.8.0.15~pre080614d-0etch1_alpha.deb stable/main/binary-alpha/python-xpcom_1.8.0.15~pre080614d-0etch1_alpha.deb stable/main/binary-alpha/libnspr4-0d_1.8.0.15~pre080614d-0etch1_alpha.deb xulrunner (1.8.0.15~pre080614d-0etch1) stable-security; urgency=low [ Alexander Sack ] * New security/stability upstream release (backports for 2.0.0.15 + 2.0.0.16) * Upstream advisories (v2.0.0.15): MFSA 2008-21 aka CVE-2008-2798 Crashes with evidence of memory corruption (rv:1.8.1.15) MFSA 2008-21 aka CVE-2008-2799 Crashes with evidence of memory corruption (rv:1.8.1.15) MFSA 2008-22 aka CVE-2008-2800 - XSS through JavaScript same-origin violation MFSA 2008-23 aka CVE-2008-2801 - Signed JAR tampering MFSA 2008-24 aka CVE-2008-2802 - Chrome script loading from fastload file MFSA 2008-25 aka CVE-2008-2803 - Arbitrary code execution in mozIJSSubScriptLoader.loadSubScript() MFSA 2008-27 aka CVE-2008-2805 - Arbitrary file upload via originalTarget and DOM Range MFSA 2008-28 aka CVE-2008-2806 - Arbitrary socket connections with Java LiveConnect on Mac OS X MFSA 2008-29 aka CVE-2008-2807 - Faulty .properties file results in uninitialized memory being used MFSA 2008-30 aka CVE-2008-2808 - File location URL in directory listings not escaped properly MFSA 2008-31 aka CVE-2008-2809 - Peer-trusted certs can use alt names to spoof MFSA 2008-32 aka CVE-2008-2810 - Remote site run as local file via Windows URL shortcut MFSA 2008-33 aka CVE-2008-2811 - Crash and remote code execution in block reflow * Upstream advisories (v2.0.0.16): MFSA 2008-35 aka CVE-2008-2785 - Command-line URLs launch multiple tabs when Firefox not running MFSA 2008-34 aka CVE-2008-2933 - Remote code execution by overflowing CSS reference counter MFSA 2008-36 aka CVE-2008-2934 - Crash with malformed GIF file on Mac OS X * debian/patches/90_bz421622.dpatch,90_bz425576.dpatch: drop prepatched prepatches which are now shipped in upstream source. * debian/patches/00list: Updated accordingly. * debian/patches/00list: disable 20_visibility patch now shipped upstream * debian/patches/99_configure.dpatch: updated accordingly. stable/main/binary-all/libxul-dev_1.8.0.15~pre080614d-0etch1_all.deb stable/main/binary-all/libnss3-dev_1.8.0.15~pre080614d-0etch1_all.deb stable/main/binary-all/libsmjs-dev_1.8.0.15~pre080614d-0etch1_all.deb stable/main/binary-all/libxul-common_1.8.0.15~pre080614d-0etch1_all.deb stable/main/binary-all/libmozillainterfaces-java_1.8.0.15~pre080614d-0etch1_all.deb stable/main/binary-i386/libmozjs0d_1.8.0.15~pre080614d-0etch1_i386.deb stable/main/binary-i386/libnss3-0d-dbg_1.8.0.15~pre080614d-0etch1_i386.deb stable/main/binary-i386/xulrunner_1.8.0.15~pre080614d-0etch1_i386.deb stable/main/binary-i386/libnspr4-0d_1.8.0.15~pre080614d-0etch1_i386.deb stable/main/binary-i386/spidermonkey-bin_1.8.0.15~pre080614d-0etch1_i386.deb stable/main/binary-i386/libnss3-0d_1.8.0.15~pre080614d-0etch1_i386.deb stable/main/binary-i386/python-xpcom_1.8.0.15~pre080614d-0etch1_i386.deb stable/main/source/xulrunner_1.8.0.15~pre080614d.orig.tar.gz stable/main/source/xulrunner_1.8.0.15~pre080614d-0etch1.dsc stable/main/source/xulrunner_1.8.0.15~pre080614d-0etch1.diff.gz stable/main/binary-all/libmozjs-dev_1.8.0.15~pre080614d-0etch1_all.deb stable/main/binary-i386/xulrunner-gnome-support_1.8.0.15~pre080614d-0etch1_i386.deb stable/main/binary-i386/libmozjs0d-dbg_1.8.0.15~pre080614d-0etch1_i386.deb stable/main/binary-all/libnspr4-dev_1.8.0.15~pre080614d-0etch1_all.deb stable/main/binary-i386/libxul0d-dbg_1.8.0.15~pre080614d-0etch1_i386.deb stable/main/binary-i386/libxul0d_1.8.0.15~pre080614d-0etch1_i386.deb stable/main/binary-i386/libnss3-tools_1.8.0.15~pre080614d-0etch1_i386.deb stable/main/binary-all/libsmjs1_1.8.0.15~pre080614d-0etch1_all.deb stable/main/binary-i386/libnspr4-0d-dbg_1.8.0.15~pre080614d-0etch1_i386.deb xulrunner (1.8.0.15~pre080614d-0etch1) stable-security; urgency=low [ Alexander Sack ] * New security/stability upstream release (backports for 2.0.0.15 + 2.0.0.16) * Upstream advisories (v2.0.0.15): MFSA 2008-21 aka CVE-2008-2798 Crashes with evidence of memory corruption (rv:1.8.1.15) MFSA 2008-21 aka CVE-2008-2799 Crashes with evidence of memory corruption (rv:1.8.1.15) MFSA 2008-22 aka CVE-2008-2800 - XSS through JavaScript same-origin violation MFSA 2008-23 aka CVE-2008-2801 - Signed JAR tampering MFSA 2008-24 aka CVE-2008-2802 - Chrome script loading from fastload file MFSA 2008-25 aka CVE-2008-2803 - Arbitrary code execution in mozIJSSubScriptLoader.loadSubScript() MFSA 2008-27 aka CVE-2008-2805 - Arbitrary file upload via originalTarget and DOM Range MFSA 2008-28 aka CVE-2008-2806 - Arbitrary socket connections with Java LiveConnect on Mac OS X MFSA 2008-29 aka CVE-2008-2807 - Faulty .properties file results in uninitialized memory being used MFSA 2008-30 aka CVE-2008-2808 - File location URL in directory listings not escaped properly MFSA 2008-31 aka CVE-2008-2809 - Peer-trusted certs can use alt names to spoof MFSA 2008-32 aka CVE-2008-2810 - Remote site run as local file via Windows URL shortcut MFSA 2008-33 aka CVE-2008-2811 - Crash and remote code execution in block reflow * Upstream advisories (v2.0.0.16): MFSA 2008-35 aka CVE-2008-2785 - Command-line URLs launch multiple tabs when Firefox not running MFSA 2008-34 aka CVE-2008-2933 - Remote code execution by overflowing CSS reference counter MFSA 2008-36 aka CVE-2008-2934 - Crash with malformed GIF file on Mac OS X * debian/patches/90_bz421622.dpatch,90_bz425576.dpatch: drop prepatched prepatches which are now shipped in upstream source. * debian/patches/00list: Updated accordingly. * debian/patches/00list: disable 20_visibility patch now shipped upstream * debian/patches/99_configure.dpatch: updated accordingly. stable/main/binary-sparc/wordnet-dev_2.1-4+etch2_sparc.deb stable/main/binary-sparc/wordnet_2.1-4+etch2_sparc.deb wordnet (1:2.1-4+etch2) stable-security; urgency=high * Non-maintainer upload by the security team * Update patch to fix regression bug that broke wordnet checks for synonyms, which was introduced by the security fix stable/main/binary-s390/wordnet_2.1-4+etch2_s390.deb stable/main/binary-s390/wordnet-dev_2.1-4+etch2_s390.deb wordnet (1:2.1-4+etch2) stable-security; urgency=high * Non-maintainer upload by the security team * Update patch to fix regression bug that broke wordnet checks for synonyms, which was introduced by the security fix stable/main/binary-powerpc/wordnet-dev_2.1-4+etch2_powerpc.deb stable/main/binary-powerpc/wordnet_2.1-4+etch2_powerpc.deb wordnet (1:2.1-4+etch2) stable-security; urgency=high * Non-maintainer upload by the security team * Update patch to fix regression bug that broke wordnet checks for synonyms, which was introduced by the security fix stable/main/binary-mipsel/wordnet_2.1-4+etch2_mipsel.deb stable/main/binary-mipsel/wordnet-dev_2.1-4+etch2_mipsel.deb wordnet (1:2.1-4+etch2) stable-security; urgency=high * Non-maintainer upload by the security team * Update patch to fix regression bug that broke wordnet checks for synonyms, which was introduced by the security fix stable/main/binary-mips/wordnet_2.1-4+etch2_mips.deb stable/main/binary-mips/wordnet-dev_2.1-4+etch2_mips.deb wordnet (1:2.1-4+etch2) stable-security; urgency=high * Non-maintainer upload by the security team * Update patch to fix regression bug that broke wordnet checks for synonyms, which was introduced by the security fix stable/main/binary-ia64/wordnet_2.1-4+etch2_ia64.deb stable/main/binary-ia64/wordnet-dev_2.1-4+etch2_ia64.deb wordnet (1:2.1-4+etch2) stable-security; urgency=high * Non-maintainer upload by the security team * Update patch to fix regression bug that broke wordnet checks for synonyms, which was introduced by the security fix stable/main/binary-hppa/wordnet-dev_2.1-4+etch2_hppa.deb stable/main/binary-hppa/wordnet_2.1-4+etch2_hppa.deb wordnet (1:2.1-4+etch2) stable-security; urgency=high * Non-maintainer upload by the security team * Update patch to fix regression bug that broke wordnet checks for synonyms, which was introduced by the security fix stable/main/binary-arm/wordnet_2.1-4+etch2_arm.deb stable/main/binary-arm/wordnet-dev_2.1-4+etch2_arm.deb wordnet (1:2.1-4+etch2) stable-security; urgency=high * Non-maintainer upload by the security team * Update patch to fix regression bug that broke wordnet checks for synonyms, which was introduced by the security fix stable/main/binary-amd64/wordnet-dev_2.1-4+etch2_amd64.deb stable/main/binary-amd64/wordnet_2.1-4+etch2_amd64.deb wordnet (1:2.1-4+etch2) stable-security; urgency=high * Non-maintainer upload by the security team * Update patch to fix regression bug that broke wordnet checks for synonyms, which was introduced by the security fix stable/main/binary-alpha/wordnet_2.1-4+etch2_alpha.deb stable/main/binary-alpha/wordnet-dev_2.1-4+etch2_alpha.deb wordnet (1:2.1-4+etch2) stable-security; urgency=high * Non-maintainer upload by the security team * Update patch to fix regression bug that broke wordnet checks for synonyms, which was introduced by the security fix stable/main/binary-all/wordnet-sense-index_2.1-4+etch2_all.deb stable/main/binary-i386/wordnet_2.1-4+etch2_i386.deb stable/main/binary-i386/wordnet-dev_2.1-4+etch2_i386.deb stable/main/source/wordnet_2.1-4+etch2.dsc stable/main/source/wordnet_2.1-4+etch2.diff.gz stable/main/binary-all/wordnet-base_2.1-4+etch2_all.deb wordnet (1:2.1-4+etch2) stable-security; urgency=high * Non-maintainer upload by the security team * Update patch to fix regression bug that broke wordnet checks for synonyms, which was introduced by the security fix stable/main/binary-sparc/wdiff_0.5-16etch1_sparc.deb wdiff (0.5-16etch1) stable-proposed-updates; urgency=low * Changed wdiff.c to use mkstemp and fdopen instead of tmpnam to avoid a race condition (Bug #425254). Backported from 0.5-18. stable/main/binary-s390/wdiff_0.5-16etch1_s390.deb wdiff (0.5-16etch1) stable-proposed-updates; urgency=low * Changed wdiff.c to use mkstemp and fdopen instead of tmpnam to avoid a race condition (Bug #425254). Backported from 0.5-18. stable/main/binary-powerpc/wdiff_0.5-16etch1_powerpc.deb wdiff (0.5-16etch1) stable-proposed-updates; urgency=low * Changed wdiff.c to use mkstemp and fdopen instead of tmpnam to avoid a race condition (Bug #425254). Backported from 0.5-18. stable/main/binary-mipsel/wdiff_0.5-16etch1_mipsel.deb wdiff (0.5-16etch1) stable-proposed-updates; urgency=low * Changed wdiff.c to use mkstemp and fdopen instead of tmpnam to avoid a race condition (Bug #425254). Backported from 0.5-18. stable/main/binary-mips/wdiff_0.5-16etch1_mips.deb wdiff (0.5-16etch1) stable-proposed-updates; urgency=low * Changed wdiff.c to use mkstemp and fdopen instead of tmpnam to avoid a race condition (Bug #425254). Backported from 0.5-18. stable/main/binary-ia64/wdiff_0.5-16etch1_ia64.deb wdiff (0.5-16etch1) stable-proposed-updates; urgency=low * Changed wdiff.c to use mkstemp and fdopen instead of tmpnam to avoid a race condition (Bug #425254). Backported from 0.5-18. stable/main/binary-i386/wdiff_0.5-16etch1_i386.deb wdiff (0.5-16etch1) stable-proposed-updates; urgency=low * Changed wdiff.c to use mkstemp and fdopen instead of tmpnam to avoid a race condition (Bug #425254). Backported from 0.5-18. stable/main/binary-hppa/wdiff_0.5-16etch1_hppa.deb wdiff (0.5-16etch1) stable-proposed-updates; urgency=low * Changed wdiff.c to use mkstemp and fdopen instead of tmpnam to avoid a race condition (Bug #425254). Backported from 0.5-18. stable/main/binary-arm/wdiff_0.5-16etch1_arm.deb wdiff (0.5-16etch1) stable-proposed-updates; urgency=low * Changed wdiff.c to use mkstemp and fdopen instead of tmpnam to avoid a race condition (Bug #425254). Backported from 0.5-18. stable/main/binary-alpha/wdiff_0.5-16etch1_alpha.deb wdiff (0.5-16etch1) stable-proposed-updates; urgency=low * Changed wdiff.c to use mkstemp and fdopen instead of tmpnam to avoid a race condition (Bug #425254). Backported from 0.5-18. stable/main/binary-all/wdiff-doc_0.5-16etch1_all.deb stable/main/source/wdiff_0.5-16etch1.diff.gz stable/main/binary-amd64/wdiff_0.5-16etch1_amd64.deb stable/main/source/wdiff_0.5-16etch1.dsc wdiff (0.5-16etch1) stable-proposed-updates; urgency=low * Changed wdiff.c to use mkstemp and fdopen instead of tmpnam to avoid a race condition (Bug #425254). Backported from 0.5-18. stable/main/binary-i386/user-mode-linux_2.6.18-1um-2etch.23_i386.deb stable/main/source/user-mode-linux_2.6.18-1um-2etch.23.dsc stable/main/source/user-mode-linux_2.6.18-1um-2etch.23.diff.gz user-mode-linux (2.6.18-1um-2etch.23) stable; urgency=high * Rebuild against linux-source-2.6.18_2.6.18.dfsg.1-23: [ Ian Campbell ] * Fix DMA crash under Xen when no IOMMU is present (closes: #445987) [ dann frazier ] * [xfs] Fix attr2 corruption with btree data extents (closes: #498309) stable/main/source/tzdata_2008e-1etch3.diff.gz stable/main/binary-all/tzdata_2008e-1etch3_all.deb stable/main/source/tzdata_2008e-1etch3.dsc tzdata (2008e-1etch3) stable; urgency=low * Non-maintainer upload as requested by the maintainers. * Fix Argentina again, setting up the DST and adding exceptions for the provinces that don't change. Closes: #502430 stable/main/source/twiki_4.0.5-9.1etch1.dsc stable/main/source/twiki_4.0.5-9.1etch1.diff.gz stable/main/binary-all/twiki_4.0.5-9.1etch1_all.deb twiki (1:4.0.5-9.1etch1) stable-security; urgency=high * Non-maintainer upload by The Security Team. * Fix file disclosure, and execution of arbitrary commands via bin/configure. [CVE-2008-3195] stable/main/source/trac_0.10.3-1etch4.diff.gz stable/main/binary-all/trac_0.10.3-1etch4_all.deb stable/main/source/trac_0.10.3-1etch4.dsc trac (0.10.3-1etch4) stable; urgency=low [ Luis Matos ] * Wiki link formatter: missing escape for links look-alike. CVE-2008- 3328 * Fixing a cross-site redirection vulnerability in the quickjump functionality. CVE-2008-2951. stable/main/binary-sparc/libtiff4-dev_3.8.2-7+etch1_sparc.deb stable/main/binary-sparc/libtiff4_3.8.2-7+etch1_sparc.deb stable/main/binary-sparc/libtiffxx0c2_3.8.2-7+etch1_sparc.deb stable/main/binary-sparc/libtiff-tools_3.8.2-7+etch1_sparc.deb stable/main/binary-sparc/libtiff-opengl_3.8.2-7+etch1_sparc.deb tiff (3.8.2-7+etch1) stable-security; urgency=high * Apply patches from Drew Yao of Apple Product Security to fix CVE-2008-2327, a potential buffer underflow in the LZW decoder (tif_lzw.c). stable/main/binary-s390/libtiff-opengl_3.8.2-7+etch1_s390.deb stable/main/binary-s390/libtiff4_3.8.2-7+etch1_s390.deb stable/main/binary-s390/libtiffxx0c2_3.8.2-7+etch1_s390.deb stable/main/binary-s390/libtiff4-dev_3.8.2-7+etch1_s390.deb stable/main/binary-s390/libtiff-tools_3.8.2-7+etch1_s390.deb tiff (3.8.2-7+etch1) stable-security; urgency=high * Apply patches from Drew Yao of Apple Product Security to fix CVE-2008-2327, a potential buffer underflow in the LZW decoder (tif_lzw.c). stable/main/binary-powerpc/libtiff4-dev_3.8.2-7+etch1_powerpc.deb stable/main/binary-powerpc/libtiff4_3.8.2-7+etch1_powerpc.deb stable/main/binary-powerpc/libtiff-opengl_3.8.2-7+etch1_powerpc.deb stable/main/binary-powerpc/libtiffxx0c2_3.8.2-7+etch1_powerpc.deb stable/main/binary-powerpc/libtiff-tools_3.8.2-7+etch1_powerpc.deb tiff (3.8.2-7+etch1) stable-security; urgency=high * Apply patches from Drew Yao of Apple Product Security to fix CVE-2008-2327, a potential buffer underflow in the LZW decoder (tif_lzw.c). stable/main/binary-mipsel/libtiffxx0c2_3.8.2-7+etch1_mipsel.deb stable/main/binary-mipsel/libtiff-tools_3.8.2-7+etch1_mipsel.deb stable/main/binary-mipsel/libtiff4-dev_3.8.2-7+etch1_mipsel.deb stable/main/binary-mipsel/libtiff4_3.8.2-7+etch1_mipsel.deb stable/main/binary-mipsel/libtiff-opengl_3.8.2-7+etch1_mipsel.deb tiff (3.8.2-7+etch1) stable-security; urgency=high * Apply patches from Drew Yao of Apple Product Security to fix CVE-2008-2327, a potential buffer underflow in the LZW decoder (tif_lzw.c). stable/main/binary-mips/libtiff-tools_3.8.2-7+etch1_mips.deb stable/main/binary-mips/libtiff-opengl_3.8.2-7+etch1_mips.deb stable/main/binary-mips/libtiff4_3.8.2-7+etch1_mips.deb stable/main/binary-mips/libtiff4-dev_3.8.2-7+etch1_mips.deb stable/main/binary-mips/libtiffxx0c2_3.8.2-7+etch1_mips.deb tiff (3.8.2-7+etch1) stable-security; urgency=high * Apply patches from Drew Yao of Apple Product Security to fix CVE-2008-2327, a potential buffer underflow in the LZW decoder (tif_lzw.c). stable/main/binary-ia64/libtiff4-dev_3.8.2-7+etch1_ia64.deb stable/main/binary-ia64/libtiff4_3.8.2-7+etch1_ia64.deb stable/main/binary-ia64/libtiffxx0c2_3.8.2-7+etch1_ia64.deb stable/main/binary-ia64/libtiff-tools_3.8.2-7+etch1_ia64.deb stable/main/binary-ia64/libtiff-opengl_3.8.2-7+etch1_ia64.deb tiff (3.8.2-7+etch1) stable-security; urgency=high * Apply patches from Drew Yao of Apple Product Security to fix CVE-2008-2327, a potential buffer underflow in the LZW decoder (tif_lzw.c). stable/main/binary-hppa/libtiffxx0c2_3.8.2-7+etch1_hppa.deb stable/main/binary-hppa/libtiff-opengl_3.8.2-7+etch1_hppa.deb stable/main/binary-hppa/libtiff4_3.8.2-7+etch1_hppa.deb stable/main/binary-hppa/libtiff-tools_3.8.2-7+etch1_hppa.deb stable/main/binary-hppa/libtiff4-dev_3.8.2-7+etch1_hppa.deb tiff (3.8.2-7+etch1) stable-security; urgency=high * Apply patches from Drew Yao of Apple Product Security to fix CVE-2008-2327, a potential buffer underflow in the LZW decoder (tif_lzw.c). stable/main/binary-arm/libtiff-opengl_3.8.2-7+etch1_arm.deb stable/main/binary-arm/libtiff-tools_3.8.2-7+etch1_arm.deb stable/main/binary-arm/libtiff4_3.8.2-7+etch1_arm.deb stable/main/binary-arm/libtiff4-dev_3.8.2-7+etch1_arm.deb stable/main/binary-arm/libtiffxx0c2_3.8.2-7+etch1_arm.deb tiff (3.8.2-7+etch1) stable-security; urgency=high * Apply patches from Drew Yao of Apple Product Security to fix CVE-2008-2327, a potential buffer underflow in the LZW decoder (tif_lzw.c). stable/main/binary-amd64/libtiff4_3.8.2-7+etch1_amd64.deb stable/main/binary-amd64/libtiff-opengl_3.8.2-7+etch1_amd64.deb stable/main/binary-amd64/libtiff-tools_3.8.2-7+etch1_amd64.deb stable/main/binary-amd64/libtiff4-dev_3.8.2-7+etch1_amd64.deb stable/main/binary-amd64/libtiffxx0c2_3.8.2-7+etch1_amd64.deb tiff (3.8.2-7+etch1) stable-security; urgency=high * Apply patches from Drew Yao of Apple Product Security to fix CVE-2008-2327, a potential buffer underflow in the LZW decoder (tif_lzw.c). stable/main/binary-alpha/libtiff4_3.8.2-7+etch1_alpha.deb stable/main/binary-alpha/libtiff4-dev_3.8.2-7+etch1_alpha.deb stable/main/binary-alpha/libtiffxx0c2_3.8.2-7+etch1_alpha.deb stable/main/binary-alpha/libtiff-opengl_3.8.2-7+etch1_alpha.deb stable/main/binary-alpha/libtiff-tools_3.8.2-7+etch1_alpha.deb tiff (3.8.2-7+etch1) stable-security; urgency=high * Apply patches from Drew Yao of Apple Product Security to fix CVE-2008-2327, a potential buffer underflow in the LZW decoder (tif_lzw.c). stable/main/binary-i386/libtiff4_3.8.2-7+etch1_i386.deb stable/main/binary-i386/libtiff-opengl_3.8.2-7+etch1_i386.deb stable/main/binary-i386/libtiff-tools_3.8.2-7+etch1_i386.deb stable/main/source/tiff_3.8.2-7+etch1.dsc stable/main/binary-i386/libtiffxx0c2_3.8.2-7+etch1_i386.deb stable/main/source/tiff_3.8.2-7+etch1.diff.gz stable/main/binary-i386/libtiff4-dev_3.8.2-7+etch1_i386.deb tiff (3.8.2-7+etch1) stable-security; urgency=high * Apply patches from Drew Yao of Apple Product Security to fix CVE-2008-2327, a potential buffer underflow in the LZW decoder (tif_lzw.c). stable/main/binary-sparc/squid_2.6.5-6etch4_sparc.deb stable/main/binary-sparc/squid-cgi_2.6.5-6etch4_sparc.deb stable/main/binary-sparc/squidclient_2.6.5-6etch4_sparc.deb squid (2.6.5-6etch4) stable-security; urgency=high * Non-maintainer upload by the security team. * Actually apply debian/patches/59-dos-cache-update-2.dpatch in the build. Thanks to Christoph Biedl for the catch. stable/main/binary-s390/squid-cgi_2.6.5-6etch4_s390.deb stable/main/binary-s390/squidclient_2.6.5-6etch4_s390.deb stable/main/binary-s390/squid_2.6.5-6etch4_s390.deb squid (2.6.5-6etch4) stable-security; urgency=high * Non-maintainer upload by the security team. * Actually apply debian/patches/59-dos-cache-update-2.dpatch in the build. Thanks to Christoph Biedl for the catch. stable/main/binary-powerpc/squidclient_2.6.5-6etch4_powerpc.deb stable/main/binary-powerpc/squid_2.6.5-6etch4_powerpc.deb stable/main/binary-powerpc/squid-cgi_2.6.5-6etch4_powerpc.deb squid (2.6.5-6etch4) stable-security; urgency=high * Non-maintainer upload by the security team. * Actually apply debian/patches/59-dos-cache-update-2.dpatch in the build. Thanks to Christoph Biedl for the catch. stable/main/binary-mipsel/squidclient_2.6.5-6etch4_mipsel.deb stable/main/binary-mipsel/squid_2.6.5-6etch4_mipsel.deb stable/main/binary-mipsel/squid-cgi_2.6.5-6etch4_mipsel.deb squid (2.6.5-6etch4) stable-security; urgency=high * Non-maintainer upload by the security team. * Actually apply debian/patches/59-dos-cache-update-2.dpatch in the build. Thanks to Christoph Biedl for the catch. stable/main/binary-mips/squidclient_2.6.5-6etch4_mips.deb stable/main/binary-mips/squid_2.6.5-6etch4_mips.deb stable/main/binary-mips/squid-cgi_2.6.5-6etch4_mips.deb squid (2.6.5-6etch4) stable-security; urgency=high * Non-maintainer upload by the security team. * Actually apply debian/patches/59-dos-cache-update-2.dpatch in the build. Thanks to Christoph Biedl for the catch. stable/main/binary-ia64/squid_2.6.5-6etch4_ia64.deb stable/main/binary-ia64/squidclient_2.6.5-6etch4_ia64.deb stable/main/binary-ia64/squid-cgi_2.6.5-6etch4_ia64.deb squid (2.6.5-6etch4) stable-security; urgency=high * Non-maintainer upload by the security team. * Actually apply debian/patches/59-dos-cache-update-2.dpatch in the build. Thanks to Christoph Biedl for the catch. stable/main/binary-i386/squid-cgi_2.6.5-6etch4_i386.deb stable/main/binary-i386/squid_2.6.5-6etch4_i386.deb stable/main/binary-i386/squidclient_2.6.5-6etch4_i386.deb squid (2.6.5-6etch4) stable-security; urgency=high * Non-maintainer upload by the security team. * Actually apply debian/patches/59-dos-cache-update-2.dpatch in the build. Thanks to Christoph Biedl for the catch. stable/main/binary-hppa/squid_2.6.5-6etch4_hppa.deb stable/main/binary-hppa/squidclient_2.6.5-6etch4_hppa.deb stable/main/binary-hppa/squid-cgi_2.6.5-6etch4_hppa.deb squid (2.6.5-6etch4) stable-security; urgency=high * Non-maintainer upload by the security team. * Actually apply debian/patches/59-dos-cache-update-2.dpatch in the build. Thanks to Christoph Biedl for the catch. stable/main/binary-arm/squid-cgi_2.6.5-6etch4_arm.deb stable/main/binary-arm/squidclient_2.6.5-6etch4_arm.deb stable/main/binary-arm/squid_2.6.5-6etch4_arm.deb squid (2.6.5-6etch4) stable-security; urgency=high * Non-maintainer upload by the security team. * Actually apply debian/patches/59-dos-cache-update-2.dpatch in the build. Thanks to Christoph Biedl for the catch. stable/main/binary-alpha/squid-cgi_2.6.5-6etch4_alpha.deb stable/main/binary-alpha/squidclient_2.6.5-6etch4_alpha.deb stable/main/binary-alpha/squid_2.6.5-6etch4_alpha.deb squid (2.6.5-6etch4) stable-security; urgency=high * Non-maintainer upload by the security team. * Actually apply debian/patches/59-dos-cache-update-2.dpatch in the build. Thanks to Christoph Biedl for the catch. stable/main/binary-amd64/squid-cgi_2.6.5-6etch4_amd64.deb stable/main/source/squid_2.6.5-6etch4.diff.gz stable/main/binary-all/squid-common_2.6.5-6etch4_all.deb stable/main/binary-amd64/squidclient_2.6.5-6etch4_amd64.deb stable/main/source/squid_2.6.5-6etch4.dsc stable/main/binary-amd64/squid_2.6.5-6etch4_amd64.deb squid (2.6.5-6etch4) stable-security; urgency=high * Non-maintainer upload by the security team. * Actually apply debian/patches/59-dos-cache-update-2.dpatch in the build. Thanks to Christoph Biedl for the catch. stable/main/binary-sparc/sobby_0.4.1-1+b2_sparc.deb sobby (0.4.1-1+b2) stable; urgency=low * Binary-only non-maintainer upload for sparc; no source changes. * rebuild against net6 1.3.1-4 stable/main/binary-s390/sobby_0.4.1-1+b2_s390.deb sobby (0.4.1-1+b2) stable; urgency=low * Binary-only non-maintainer upload for s390; no source changes. * rebuild against net6 1.3.1-4 stable/main/binary-powerpc/sobby_0.4.1-1+b2_powerpc.deb sobby (0.4.1-1+b2) stable; urgency=low * Binary-only non-maintainer upload for powerpc; no source changes. * rebuild against net6 1.3.1-4 stable/main/binary-mipsel/sobby_0.4.1-1+b2_mipsel.deb sobby (0.4.1-1+b2) stable; urgency=low * Binary-only non-maintainer upload for mipsel; no source changes. * rebuild against net6 1.3.1-4 stable/main/binary-mips/sobby_0.4.1-1+b2_mips.deb sobby (0.4.1-1+b2) stable; urgency=low * Binary-only non-maintainer upload for mips; no source changes. * rebuild against net6 1.3.1-4 stable/main/binary-ia64/sobby_0.4.1-1+b2_ia64.deb sobby (0.4.1-1+b2) stable; urgency=low * Binary-only non-maintainer upload for ia64; no source changes. * rebuild against net6 1.3.1-4 stable/main/binary-i386/sobby_0.4.1-1+b2_i386.deb sobby (0.4.1-1+b2) stable; urgency=low * Binary-only non-maintainer upload for i386; no source changes. * rebuild against net6 1.3.1-4 stable/main/binary-hppa/sobby_0.4.1-1+b2_hppa.deb sobby (0.4.1-1+b2) stable; urgency=low * Binary-only non-maintainer upload for hppa; no source changes. * rebuild against net6 1.3.1-4 stable/main/binary-arm/sobby_0.4.1-1+b2_arm.deb sobby (0.4.1-1+b2) stable; urgency=low * Binary-only non-maintainer upload for arm; no source changes. * rebuild against net6 1.3.1-4 stable/main/binary-amd64/sobby_0.4.1-1+b2_amd64.deb sobby (0.4.1-1+b2) stable; urgency=low * Binary-only non-maintainer upload for amd64; no source changes. * rebuild against net6 1.3.1-4 stable/main/binary-alpha/sobby_0.4.1-1+b2_alpha.deb sobby (0.4.1-1+b2) stable; urgency=low * Binary-only non-maintainer upload for alpha; no source changes. * rebuild against net6 1.3.1-4 stable/main/binary-sparc/slash_2.2.6-8etch1_sparc.deb slash (2.2.6-8etch1) stable-security; urgency=high * Security fixes for CVE-2008-2231 and CVE-2008-2553 (Closes: #484499) stable/main/binary-s390/slash_2.2.6-8etch1_s390.deb slash (2.2.6-8etch1) stable-security; urgency=high * Security fixes for CVE-2008-2231 and CVE-2008-2553 (Closes: #484499) stable/main/binary-powerpc/slash_2.2.6-8etch1_powerpc.deb slash (2.2.6-8etch1) stable-security; urgency=high * Security fixes for CVE-2008-2231 and CVE-2008-2553 (Closes: #484499) stable/main/binary-mipsel/slash_2.2.6-8etch1_mipsel.deb slash (2.2.6-8etch1) stable-security; urgency=high * Security fixes for CVE-2008-2231 and CVE-2008-2553 (Closes: #484499) stable/main/binary-mips/slash_2.2.6-8etch1_mips.deb slash (2.2.6-8etch1) stable-security; urgency=high * Security fixes for CVE-2008-2231 and CVE-2008-2553 (Closes: #484499) stable/main/binary-ia64/slash_2.2.6-8etch1_ia64.deb slash (2.2.6-8etch1) stable-security; urgency=high * Security fixes for CVE-2008-2231 and CVE-2008-2553 (Closes: #484499) stable/main/binary-i386/slash_2.2.6-8etch1_i386.deb slash (2.2.6-8etch1) stable-security; urgency=high * Security fixes for CVE-2008-2231 and CVE-2008-2553 (Closes: #484499) stable/main/binary-hppa/slash_2.2.6-8etch1_hppa.deb slash (2.2.6-8etch1) stable-security; urgency=high * Security fixes for CVE-2008-2231 and CVE-2008-2553 (Closes: #484499) stable/main/binary-arm/slash_2.2.6-8etch1_arm.deb slash (2.2.6-8etch1) stable-security; urgency=high * Security fixes for CVE-2008-2231 and CVE-2008-2553 (Closes: #484499) stable/main/binary-alpha/slash_2.2.6-8etch1_alpha.deb slash (2.2.6-8etch1) stable-security; urgency=high * Security fixes for CVE-2008-2231 and CVE-2008-2553 (Closes: #484499) stable/main/source/slash_2.2.6-8etch1.dsc stable/main/binary-amd64/slash_2.2.6-8etch1_amd64.deb stable/main/source/slash_2.2.6-8etch1.diff.gz slash (2.2.6-8etch1) stable-security; urgency=high * Security fixes for CVE-2008-2231 and CVE-2008-2553 (Closes: #484499) stable/main/binary-sparc/ruby1.9-dev_1.9.0+20060609-1etch3_sparc.deb stable/main/binary-sparc/libgdbm-ruby1.9_1.9.0+20060609-1etch3_sparc.deb stable/main/binary-sparc/libruby1.9-dbg_1.9.0+20060609-1etch3_sparc.deb stable/main/binary-sparc/libtcltk-ruby1.9_1.9.0+20060609-1etch3_sparc.deb stable/main/binary-sparc/libdbm-ruby1.9_1.9.0+20060609-1etch3_sparc.deb stable/main/binary-sparc/libruby1.9_1.9.0+20060609-1etch3_sparc.deb stable/main/binary-sparc/libopenssl-ruby1.9_1.9.0+20060609-1etch3_sparc.deb stable/main/binary-sparc/libreadline-ruby1.9_1.9.0+20060609-1etch3_sparc.deb stable/main/binary-sparc/ruby1.9_1.9.0+20060609-1etch3_sparc.deb ruby1.9 (1.9.0+20060609-1etch3) stable-security; urgency=high * applied debian/patches/103_multiple_vuln_200808: backported fixes for multiple vulnerabilities issued at and . - untrace_var is permitted at safe level 4 (from v1_8_7_32) - $PROGRAM_NAME may be modified at safe level 4 (from v1_8_7_35) (CVE-2008-3655) - Insecure methods may be called at safe level 1-3 (from v1_8_7_33) - Syslog operations are permitted at safe level 4 (from v1_8_7_44) - DoS vulnerability in WEBrick (from v1_8_7_69) (CVE-2008-3656) - Lack of taintness check in dl (from r18496 and r18510) (CVE-2008-3657) - DNS spoofing vulnerability in resolv.rb (from v1_8_7_71) (CVE-2008-1447) * applied debian/patches/168_rexml_dos: backported r19033 of trunk of ruby svn repository which fixes REXML DoS vulnerablility (CVE-2008-3790) . * applied debian/patches/105_cgi_empty_content: invalid multipart data can make cgi.rb infinite loop and CPU consumption. (CVE-2006-5467) stable/main/binary-s390/libopenssl-ruby1.9_1.9.0+20060609-1etch3_s390.deb stable/main/binary-s390/libgdbm-ruby1.9_1.9.0+20060609-1etch3_s390.deb stable/main/binary-s390/libtcltk-ruby1.9_1.9.0+20060609-1etch3_s390.deb stable/main/binary-s390/libruby1.9-dbg_1.9.0+20060609-1etch3_s390.deb stable/main/binary-s390/libruby1.9_1.9.0+20060609-1etch3_s390.deb stable/main/binary-s390/ruby1.9_1.9.0+20060609-1etch3_s390.deb stable/main/binary-s390/ruby1.9-dev_1.9.0+20060609-1etch3_s390.deb stable/main/binary-s390/libreadline-ruby1.9_1.9.0+20060609-1etch3_s390.deb stable/main/binary-s390/libdbm-ruby1.9_1.9.0+20060609-1etch3_s390.deb ruby1.9 (1.9.0+20060609-1etch3) stable-security; urgency=high * applied debian/patches/103_multiple_vuln_200808: backported fixes for multiple vulnerabilities issued at and . - untrace_var is permitted at safe level 4 (from v1_8_7_32) - $PROGRAM_NAME may be modified at safe level 4 (from v1_8_7_35) (CVE-2008-3655) - Insecure methods may be called at safe level 1-3 (from v1_8_7_33) - Syslog operations are permitted at safe level 4 (from v1_8_7_44) - DoS vulnerability in WEBrick (from v1_8_7_69) (CVE-2008-3656) - Lack of taintness check in dl (from r18496 and r18510) (CVE-2008-3657) - DNS spoofing vulnerability in resolv.rb (from v1_8_7_71) (CVE-2008-1447) * applied debian/patches/168_rexml_dos: backported r19033 of trunk of ruby svn repository which fixes REXML DoS vulnerablility (CVE-2008-3790) . * applied debian/patches/105_cgi_empty_content: invalid multipart data can make cgi.rb infinite loop and CPU consumption. (CVE-2006-5467) stable/main/binary-powerpc/libdbm-ruby1.9_1.9.0+20060609-1etch3_powerpc.deb stable/main/binary-powerpc/libgdbm-ruby1.9_1.9.0+20060609-1etch3_powerpc.deb stable/main/binary-powerpc/libopenssl-ruby1.9_1.9.0+20060609-1etch3_powerpc.deb stable/main/binary-powerpc/libruby1.9_1.9.0+20060609-1etch3_powerpc.deb stable/main/binary-powerpc/libreadline-ruby1.9_1.9.0+20060609-1etch3_powerpc.deb stable/main/binary-powerpc/ruby1.9_1.9.0+20060609-1etch3_powerpc.deb stable/main/binary-powerpc/ruby1.9-dev_1.9.0+20060609-1etch3_powerpc.deb stable/main/binary-powerpc/libruby1.9-dbg_1.9.0+20060609-1etch3_powerpc.deb stable/main/binary-powerpc/libtcltk-ruby1.9_1.9.0+20060609-1etch3_powerpc.deb ruby1.9 (1.9.0+20060609-1etch3) stable-security; urgency=high * applied debian/patches/103_multiple_vuln_200808: backported fixes for multiple vulnerabilities issued at and . - untrace_var is permitted at safe level 4 (from v1_8_7_32) - $PROGRAM_NAME may be modified at safe level 4 (from v1_8_7_35) (CVE-2008-3655) - Insecure methods may be called at safe level 1-3 (from v1_8_7_33) - Syslog operations are permitted at safe level 4 (from v1_8_7_44) - DoS vulnerability in WEBrick (from v1_8_7_69) (CVE-2008-3656) - Lack of taintness check in dl (from r18496 and r18510) (CVE-2008-3657) - DNS spoofing vulnerability in resolv.rb (from v1_8_7_71) (CVE-2008-1447) * applied debian/patches/168_rexml_dos: backported r19033 of trunk of ruby svn repository which fixes REXML DoS vulnerablility (CVE-2008-3790) . * applied debian/patches/105_cgi_empty_content: invalid multipart data can make cgi.rb infinite loop and CPU consumption. (CVE-2006-5467) stable/main/binary-mipsel/libtcltk-ruby1.9_1.9.0+20060609-1etch3_mipsel.deb stable/main/binary-mipsel/libgdbm-ruby1.9_1.9.0+20060609-1etch3_mipsel.deb stable/main/binary-mipsel/libreadline-ruby1.9_1.9.0+20060609-1etch3_mipsel.deb stable/main/binary-mipsel/libruby1.9-dbg_1.9.0+20060609-1etch3_mipsel.deb stable/main/binary-mipsel/libruby1.9_1.9.0+20060609-1etch3_mipsel.deb stable/main/binary-mipsel/libopenssl-ruby1.9_1.9.0+20060609-1etch3_mipsel.deb stable/main/binary-mipsel/libdbm-ruby1.9_1.9.0+20060609-1etch3_mipsel.deb stable/main/binary-mipsel/ruby1.9-dev_1.9.0+20060609-1etch3_mipsel.deb stable/main/binary-mipsel/ruby1.9_1.9.0+20060609-1etch3_mipsel.deb ruby1.9 (1.9.0+20060609-1etch3) stable-security; urgency=high * applied debian/patches/103_multiple_vuln_200808: backported fixes for multiple vulnerabilities issued at and . - untrace_var is permitted at safe level 4 (from v1_8_7_32) - $PROGRAM_NAME may be modified at safe level 4 (from v1_8_7_35) (CVE-2008-3655) - Insecure methods may be called at safe level 1-3 (from v1_8_7_33) - Syslog operations are permitted at safe level 4 (from v1_8_7_44) - DoS vulnerability in WEBrick (from v1_8_7_69) (CVE-2008-3656) - Lack of taintness check in dl (from r18496 and r18510) (CVE-2008-3657) - DNS spoofing vulnerability in resolv.rb (from v1_8_7_71) (CVE-2008-1447) * applied debian/patches/168_rexml_dos: backported r19033 of trunk of ruby svn repository which fixes REXML DoS vulnerablility (CVE-2008-3790) . * applied debian/patches/105_cgi_empty_content: invalid multipart data can make cgi.rb infinite loop and CPU consumption. (CVE-2006-5467) stable/main/binary-mips/ruby1.9_1.9.0+20060609-1etch3_mips.deb stable/main/binary-mips/libdbm-ruby1.9_1.9.0+20060609-1etch3_mips.deb stable/main/binary-mips/libgdbm-ruby1.9_1.9.0+20060609-1etch3_mips.deb stable/main/binary-mips/libtcltk-ruby1.9_1.9.0+20060609-1etch3_mips.deb stable/main/binary-mips/libruby1.9-dbg_1.9.0+20060609-1etch3_mips.deb stable/main/binary-mips/libreadline-ruby1.9_1.9.0+20060609-1etch3_mips.deb stable/main/binary-mips/libruby1.9_1.9.0+20060609-1etch3_mips.deb stable/main/binary-mips/ruby1.9-dev_1.9.0+20060609-1etch3_mips.deb stable/main/binary-mips/libopenssl-ruby1.9_1.9.0+20060609-1etch3_mips.deb ruby1.9 (1.9.0+20060609-1etch3) stable-security; urgency=high * applied debian/patches/103_multiple_vuln_200808: backported fixes for multiple vulnerabilities issued at and . - untrace_var is permitted at safe level 4 (from v1_8_7_32) - $PROGRAM_NAME may be modified at safe level 4 (from v1_8_7_35) (CVE-2008-3655) - Insecure methods may be called at safe level 1-3 (from v1_8_7_33) - Syslog operations are permitted at safe level 4 (from v1_8_7_44) - DoS vulnerability in WEBrick (from v1_8_7_69) (CVE-2008-3656) - Lack of taintness check in dl (from r18496 and r18510) (CVE-2008-3657) - DNS spoofing vulnerability in resolv.rb (from v1_8_7_71) (CVE-2008-1447) * applied debian/patches/168_rexml_dos: backported r19033 of trunk of ruby svn repository which fixes REXML DoS vulnerablility (CVE-2008-3790) . * applied debian/patches/105_cgi_empty_content: invalid multipart data can make cgi.rb infinite loop and CPU consumption. (CVE-2006-5467) stable/main/binary-ia64/libruby1.9_1.9.0+20060609-1etch3_ia64.deb stable/main/binary-ia64/libgdbm-ruby1.9_1.9.0+20060609-1etch3_ia64.deb stable/main/binary-ia64/ruby1.9-dev_1.9.0+20060609-1etch3_ia64.deb stable/main/binary-ia64/ruby1.9_1.9.0+20060609-1etch3_ia64.deb stable/main/binary-ia64/libreadline-ruby1.9_1.9.0+20060609-1etch3_ia64.deb stable/main/binary-ia64/libdbm-ruby1.9_1.9.0+20060609-1etch3_ia64.deb stable/main/binary-ia64/libruby1.9-dbg_1.9.0+20060609-1etch3_ia64.deb stable/main/binary-ia64/libopenssl-ruby1.9_1.9.0+20060609-1etch3_ia64.deb stable/main/binary-ia64/libtcltk-ruby1.9_1.9.0+20060609-1etch3_ia64.deb ruby1.9 (1.9.0+20060609-1etch3) stable-security; urgency=high * applied debian/patches/103_multiple_vuln_200808: backported fixes for multiple vulnerabilities issued at and . - untrace_var is permitted at safe level 4 (from v1_8_7_32) - $PROGRAM_NAME may be modified at safe level 4 (from v1_8_7_35) (CVE-2008-3655) - Insecure methods may be called at safe level 1-3 (from v1_8_7_33) - Syslog operations are permitted at safe level 4 (from v1_8_7_44) - DoS vulnerability in WEBrick (from v1_8_7_69) (CVE-2008-3656) - Lack of taintness check in dl (from r18496 and r18510) (CVE-2008-3657) - DNS spoofing vulnerability in resolv.rb (from v1_8_7_71) (CVE-2008-1447) * applied debian/patches/168_rexml_dos: backported r19033 of trunk of ruby svn repository which fixes REXML DoS vulnerablility (CVE-2008-3790) . * applied debian/patches/105_cgi_empty_content: invalid multipart data can make cgi.rb infinite loop and CPU consumption. (CVE-2006-5467) stable/main/binary-hppa/ruby1.9-dev_1.9.0+20060609-1etch3_hppa.deb stable/main/binary-hppa/libdbm-ruby1.9_1.9.0+20060609-1etch3_hppa.deb stable/main/binary-hppa/libruby1.9_1.9.0+20060609-1etch3_hppa.deb stable/main/binary-hppa/libgdbm-ruby1.9_1.9.0+20060609-1etch3_hppa.deb stable/main/binary-hppa/ruby1.9_1.9.0+20060609-1etch3_hppa.deb stable/main/binary-hppa/libtcltk-ruby1.9_1.9.0+20060609-1etch3_hppa.deb stable/main/binary-hppa/libruby1.9-dbg_1.9.0+20060609-1etch3_hppa.deb stable/main/binary-hppa/libopenssl-ruby1.9_1.9.0+20060609-1etch3_hppa.deb stable/main/binary-hppa/libreadline-ruby1.9_1.9.0+20060609-1etch3_hppa.deb ruby1.9 (1.9.0+20060609-1etch3) stable-security; urgency=high * applied debian/patches/103_multiple_vuln_200808: backported fixes for multiple vulnerabilities issued at and . - untrace_var is permitted at safe level 4 (from v1_8_7_32) - $PROGRAM_NAME may be modified at safe level 4 (from v1_8_7_35) (CVE-2008-3655) - Insecure methods may be called at safe level 1-3 (from v1_8_7_33) - Syslog operations are permitted at safe level 4 (from v1_8_7_44) - DoS vulnerability in WEBrick (from v1_8_7_69) (CVE-2008-3656) - Lack of taintness check in dl (from r18496 and r18510) (CVE-2008-3657) - DNS spoofing vulnerability in resolv.rb (from v1_8_7_71) (CVE-2008-1447) * applied debian/patches/168_rexml_dos: backported r19033 of trunk of ruby svn repository which fixes REXML DoS vulnerablility (CVE-2008-3790) . * applied debian/patches/105_cgi_empty_content: invalid multipart data can make cgi.rb infinite loop and CPU consumption. (CVE-2006-5467) stable/main/binary-arm/ruby1.9_1.9.0+20060609-1etch3_arm.deb stable/main/binary-arm/libdbm-ruby1.9_1.9.0+20060609-1etch3_arm.deb stable/main/binary-arm/libgdbm-ruby1.9_1.9.0+20060609-1etch3_arm.deb stable/main/binary-arm/libtcltk-ruby1.9_1.9.0+20060609-1etch3_arm.deb stable/main/binary-arm/ruby1.9-dev_1.9.0+20060609-1etch3_arm.deb stable/main/binary-arm/libruby1.9-dbg_1.9.0+20060609-1etch3_arm.deb stable/main/binary-arm/libruby1.9_1.9.0+20060609-1etch3_arm.deb stable/main/binary-arm/libopenssl-ruby1.9_1.9.0+20060609-1etch3_arm.deb stable/main/binary-arm/libreadline-ruby1.9_1.9.0+20060609-1etch3_arm.deb ruby1.9 (1.9.0+20060609-1etch3) stable-security; urgency=high * applied debian/patches/103_multiple_vuln_200808: backported fixes for multiple vulnerabilities issued at and . - untrace_var is permitted at safe level 4 (from v1_8_7_32) - $PROGRAM_NAME may be modified at safe level 4 (from v1_8_7_35) (CVE-2008-3655) - Insecure methods may be called at safe level 1-3 (from v1_8_7_33) - Syslog operations are permitted at safe level 4 (from v1_8_7_44) - DoS vulnerability in WEBrick (from v1_8_7_69) (CVE-2008-3656) - Lack of taintness check in dl (from r18496 and r18510) (CVE-2008-3657) - DNS spoofing vulnerability in resolv.rb (from v1_8_7_71) (CVE-2008-1447) * applied debian/patches/168_rexml_dos: backported r19033 of trunk of ruby svn repository which fixes REXML DoS vulnerablility (CVE-2008-3790) . * applied debian/patches/105_cgi_empty_content: invalid multipart data can make cgi.rb infinite loop and CPU consumption. (CVE-2006-5467) stable/main/binary-amd64/libreadline-ruby1.9_1.9.0+20060609-1etch3_amd64.deb stable/main/binary-amd64/libruby1.9-dbg_1.9.0+20060609-1etch3_amd64.deb stable/main/binary-amd64/libtcltk-ruby1.9_1.9.0+20060609-1etch3_amd64.deb stable/main/binary-amd64/ruby1.9_1.9.0+20060609-1etch3_amd64.deb stable/main/binary-amd64/libruby1.9_1.9.0+20060609-1etch3_amd64.deb stable/main/binary-amd64/libdbm-ruby1.9_1.9.0+20060609-1etch3_amd64.deb stable/main/binary-amd64/libgdbm-ruby1.9_1.9.0+20060609-1etch3_amd64.deb stable/main/binary-amd64/ruby1.9-dev_1.9.0+20060609-1etch3_amd64.deb stable/main/binary-amd64/libopenssl-ruby1.9_1.9.0+20060609-1etch3_amd64.deb ruby1.9 (1.9.0+20060609-1etch3) stable-security; urgency=high * applied debian/patches/103_multiple_vuln_200808: backported fixes for multiple vulnerabilities issued at and . - untrace_var is permitted at safe level 4 (from v1_8_7_32) - $PROGRAM_NAME may be modified at safe level 4 (from v1_8_7_35) (CVE-2008-3655) - Insecure methods may be called at safe level 1-3 (from v1_8_7_33) - Syslog operations are permitted at safe level 4 (from v1_8_7_44) - DoS vulnerability in WEBrick (from v1_8_7_69) (CVE-2008-3656) - Lack of taintness check in dl (from r18496 and r18510) (CVE-2008-3657) - DNS spoofing vulnerability in resolv.rb (from v1_8_7_71) (CVE-2008-1447) * applied debian/patches/168_rexml_dos: backported r19033 of trunk of ruby svn repository which fixes REXML DoS vulnerablility (CVE-2008-3790) . * applied debian/patches/105_cgi_empty_content: invalid multipart data can make cgi.rb infinite loop and CPU consumption. (CVE-2006-5467) stable/main/binary-alpha/libdbm-ruby1.9_1.9.0+20060609-1etch3_alpha.deb stable/main/binary-alpha/ruby1.9_1.9.0+20060609-1etch3_alpha.deb stable/main/binary-alpha/libopenssl-ruby1.9_1.9.0+20060609-1etch3_alpha.deb stable/main/binary-alpha/libruby1.9-dbg_1.9.0+20060609-1etch3_alpha.deb stable/main/binary-alpha/libruby1.9_1.9.0+20060609-1etch3_alpha.deb stable/main/binary-alpha/libgdbm-ruby1.9_1.9.0+20060609-1etch3_alpha.deb stable/main/binary-alpha/libtcltk-ruby1.9_1.9.0+20060609-1etch3_alpha.deb stable/main/binary-alpha/libreadline-ruby1.9_1.9.0+20060609-1etch3_alpha.deb stable/main/binary-alpha/ruby1.9-dev_1.9.0+20060609-1etch3_alpha.deb ruby1.9 (1.9.0+20060609-1etch3) stable-security; urgency=high * applied debian/patches/103_multiple_vuln_200808: backported fixes for multiple vulnerabilities issued at and . - untrace_var is permitted at safe level 4 (from v1_8_7_32) - $PROGRAM_NAME may be modified at safe level 4 (from v1_8_7_35) (CVE-2008-3655) - Insecure methods may be called at safe level 1-3 (from v1_8_7_33) - Syslog operations are permitted at safe level 4 (from v1_8_7_44) - DoS vulnerability in WEBrick (from v1_8_7_69) (CVE-2008-3656) - Lack of taintness check in dl (from r18496 and r18510) (CVE-2008-3657) - DNS spoofing vulnerability in resolv.rb (from v1_8_7_71) (CVE-2008-1447) * applied debian/patches/168_rexml_dos: backported r19033 of trunk of ruby svn repository which fixes REXML DoS vulnerablility (CVE-2008-3790) . * applied debian/patches/105_cgi_empty_content: invalid multipart data can make cgi.rb infinite loop and CPU consumption. (CVE-2006-5467) stable/main/binary-all/ruby1.9-examples_1.9.0+20060609-1etch3_all.deb stable/main/binary-all/ruby1.9-elisp_1.9.0+20060609-1etch3_all.deb stable/main/binary-i386/ruby1.9_1.9.0+20060609-1etch3_i386.deb stable/main/binary-all/irb1.9_1.9.0+20060609-1etch3_all.deb stable/main/source/ruby1.9_1.9.0+20060609-1etch3.diff.gz stable/main/binary-i386/ruby1.9-dev_1.9.0+20060609-1etch3_i386.deb stable/main/binary-i386/libopenssl-ruby1.9_1.9.0+20060609-1etch3_i386.deb stable/main/binary-i386/libdbm-ruby1.9_1.9.0+20060609-1etch3_i386.deb stable/main/binary-i386/libreadline-ruby1.9_1.9.0+20060609-1etch3_i386.deb stable/main/binary-all/ri1.9_1.9.0+20060609-1etch3_all.deb stable/main/binary-i386/libruby1.9_1.9.0+20060609-1etch3_i386.deb stable/main/binary-i386/libtcltk-ruby1.9_1.9.0+20060609-1etch3_i386.deb stable/main/binary-i386/libruby1.9-dbg_1.9.0+20060609-1etch3_i386.deb stable/main/binary-all/rdoc1.9_1.9.0+20060609-1etch3_all.deb stable/main/binary-i386/libgdbm-ruby1.9_1.9.0+20060609-1etch3_i386.deb stable/main/source/ruby1.9_1.9.0+20060609-1etch3.dsc ruby1.9 (1.9.0+20060609-1etch3) stable-security; urgency=high * applied debian/patches/103_multiple_vuln_200808: backported fixes for multiple vulnerabilities issued at and . - untrace_var is permitted at safe level 4 (from v1_8_7_32) - $PROGRAM_NAME may be modified at safe level 4 (from v1_8_7_35) (CVE-2008-3655) - Insecure methods may be called at safe level 1-3 (from v1_8_7_33) - Syslog operations are permitted at safe level 4 (from v1_8_7_44) - DoS vulnerability in WEBrick (from v1_8_7_69) (CVE-2008-3656) - Lack of taintness check in dl (from r18496 and r18510) (CVE-2008-3657) - DNS spoofing vulnerability in resolv.rb (from v1_8_7_71) (CVE-2008-1447) * applied debian/patches/168_rexml_dos: backported r19033 of trunk of ruby svn repository which fixes REXML DoS vulnerablility (CVE-2008-3790) . * applied debian/patches/105_cgi_empty_content: invalid multipart data can make cgi.rb infinite loop and CPU consumption. (CVE-2006-5467) stable/main/binary-sparc/libruby1.8-dbg_1.8.5-4etch3_sparc.deb stable/main/binary-sparc/libtcltk-ruby1.8_1.8.5-4etch3_sparc.deb stable/main/binary-sparc/libgdbm-ruby1.8_1.8.5-4etch3_sparc.deb stable/main/binary-sparc/libdbm-ruby1.8_1.8.5-4etch3_sparc.deb stable/main/binary-sparc/libruby1.8_1.8.5-4etch3_sparc.deb stable/main/binary-sparc/libreadline-ruby1.8_1.8.5-4etch3_sparc.deb stable/main/binary-sparc/ruby1.8-dev_1.8.5-4etch3_sparc.deb stable/main/binary-sparc/libopenssl-ruby1.8_1.8.5-4etch3_sparc.deb stable/main/binary-sparc/ruby1.8_1.8.5-4etch3_sparc.deb ruby1.8 (1.8.5-4etch3) stable-security; urgency=high * applied debian/patches/167_multiple_vuln_200808: backported fixes for multiple vulnerabilities issued at and . - untrace_var is permitted at safe level 4 (from v1_8_7_32) - $PROGRAM_NAME may be modified at safe level 4 (from v1_8_7_35) (CVE-2008-3655) - Insecure methods may be called at safe level 1-3 (from v1_8_7_33) - Syslog operations are permitted at safe level 4 (from v1_8_7_44) - DoS vulnerability in WEBrick (from v1_8_7_69) (CVE-2008-3656) - Lack of taintness check in dl (from v1_8_7_72) (CVE-2008-3657) - DNS spoofing vulnerability in resolv.rb (backported ressolv.rb and resolv-replace.rb from 1.8.7.22-p72) (CVE-2008-1447) * applied debian/patches/168_rexml_dos: backported r19033 of trunk of ruby svn repository which fixes REXML DoS vulnerablility (CVE-2008-3790) . stable/main/binary-s390/libopenssl-ruby1.8_1.8.5-4etch3_s390.deb stable/main/binary-s390/ruby1.8-dev_1.8.5-4etch3_s390.deb stable/main/binary-s390/libruby1.8_1.8.5-4etch3_s390.deb stable/main/binary-s390/libgdbm-ruby1.8_1.8.5-4etch3_s390.deb stable/main/binary-s390/libdbm-ruby1.8_1.8.5-4etch3_s390.deb stable/main/binary-s390/libruby1.8-dbg_1.8.5-4etch3_s390.deb stable/main/binary-s390/ruby1.8_1.8.5-4etch3_s390.deb stable/main/binary-s390/libtcltk-ruby1.8_1.8.5-4etch3_s390.deb stable/main/binary-s390/libreadline-ruby1.8_1.8.5-4etch3_s390.deb ruby1.8 (1.8.5-4etch3) stable-security; urgency=high * applied debian/patches/167_multiple_vuln_200808: backported fixes for multiple vulnerabilities issued at and . - untrace_var is permitted at safe level 4 (from v1_8_7_32) - $PROGRAM_NAME may be modified at safe level 4 (from v1_8_7_35) (CVE-2008-3655) - Insecure methods may be called at safe level 1-3 (from v1_8_7_33) - Syslog operations are permitted at safe level 4 (from v1_8_7_44) - DoS vulnerability in WEBrick (from v1_8_7_69) (CVE-2008-3656) - Lack of taintness check in dl (from v1_8_7_72) (CVE-2008-3657) - DNS spoofing vulnerability in resolv.rb (backported ressolv.rb and resolv-replace.rb from 1.8.7.22-p72) (CVE-2008-1447) * applied debian/patches/168_rexml_dos: backported r19033 of trunk of ruby svn repository which fixes REXML DoS vulnerablility (CVE-2008-3790) . stable/main/binary-powerpc/ruby1.8_1.8.5-4etch3_powerpc.deb stable/main/binary-powerpc/libopenssl-ruby1.8_1.8.5-4etch3_powerpc.deb stable/main/binary-powerpc/libgdbm-ruby1.8_1.8.5-4etch3_powerpc.deb stable/main/binary-powerpc/libreadline-ruby1.8_1.8.5-4etch3_powerpc.deb stable/main/binary-powerpc/ruby1.8-dev_1.8.5-4etch3_powerpc.deb stable/main/binary-powerpc/libdbm-ruby1.8_1.8.5-4etch3_powerpc.deb stable/main/binary-powerpc/libtcltk-ruby1.8_1.8.5-4etch3_powerpc.deb stable/main/binary-powerpc/libruby1.8-dbg_1.8.5-4etch3_powerpc.deb stable/main/binary-powerpc/libruby1.8_1.8.5-4etch3_powerpc.deb ruby1.8 (1.8.5-4etch3) stable-security; urgency=high * applied debian/patches/167_multiple_vuln_200808: backported fixes for multiple vulnerabilities issued at and . - untrace_var is permitted at safe level 4 (from v1_8_7_32) - $PROGRAM_NAME may be modified at safe level 4 (from v1_8_7_35) (CVE-2008-3655) - Insecure methods may be called at safe level 1-3 (from v1_8_7_33) - Syslog operations are permitted at safe level 4 (from v1_8_7_44) - DoS vulnerability in WEBrick (from v1_8_7_69) (CVE-2008-3656) - Lack of taintness check in dl (from v1_8_7_72) (CVE-2008-3657) - DNS spoofing vulnerability in resolv.rb (backported ressolv.rb and resolv-replace.rb from 1.8.7.22-p72) (CVE-2008-1447) * applied debian/patches/168_rexml_dos: backported r19033 of trunk of ruby svn repository which fixes REXML DoS vulnerablility (CVE-2008-3790) . stable/main/binary-mipsel/libgdbm-ruby1.8_1.8.5-4etch3_mipsel.deb stable/main/binary-mipsel/libruby1.8-dbg_1.8.5-4etch3_mipsel.deb stable/main/binary-mipsel/libopenssl-ruby1.8_1.8.5-4etch3_mipsel.deb stable/main/binary-mipsel/libreadline-ruby1.8_1.8.5-4etch3_mipsel.deb stable/main/binary-mipsel/libruby1.8_1.8.5-4etch3_mipsel.deb stable/main/binary-mipsel/ruby1.8_1.8.5-4etch3_mipsel.deb stable/main/binary-mipsel/ruby1.8-dev_1.8.5-4etch3_mipsel.deb stable/main/binary-mipsel/libtcltk-ruby1.8_1.8.5-4etch3_mipsel.deb stable/main/binary-mipsel/libdbm-ruby1.8_1.8.5-4etch3_mipsel.deb ruby1.8 (1.8.5-4etch3) stable-security; urgency=high * applied debian/patches/167_multiple_vuln_200808: backported fixes for multiple vulnerabilities issued at and . - untrace_var is permitted at safe level 4 (from v1_8_7_32) - $PROGRAM_NAME may be modified at safe level 4 (from v1_8_7_35) (CVE-2008-3655) - Insecure methods may be called at safe level 1-3 (from v1_8_7_33) - Syslog operations are permitted at safe level 4 (from v1_8_7_44) - DoS vulnerability in WEBrick (from v1_8_7_69) (CVE-2008-3656) - Lack of taintness check in dl (from v1_8_7_72) (CVE-2008-3657) - DNS spoofing vulnerability in resolv.rb (backported ressolv.rb and resolv-replace.rb from 1.8.7.22-p72) (CVE-2008-1447) * applied debian/patches/168_rexml_dos: backported r19033 of trunk of ruby svn repository which fixes REXML DoS vulnerablility (CVE-2008-3790) . stable/main/binary-mips/libdbm-ruby1.8_1.8.5-4etch3_mips.deb stable/main/binary-mips/ruby1.8-dev_1.8.5-4etch3_mips.deb stable/main/binary-mips/ruby1.8_1.8.5-4etch3_mips.deb stable/main/binary-mips/libreadline-ruby1.8_1.8.5-4etch3_mips.deb stable/main/binary-mips/libopenssl-ruby1.8_1.8.5-4etch3_mips.deb stable/main/binary-mips/libruby1.8-dbg_1.8.5-4etch3_mips.deb stable/main/binary-mips/libtcltk-ruby1.8_1.8.5-4etch3_mips.deb stable/main/binary-mips/libruby1.8_1.8.5-4etch3_mips.deb stable/main/binary-mips/libgdbm-ruby1.8_1.8.5-4etch3_mips.deb ruby1.8 (1.8.5-4etch3) stable-security; urgency=high * applied debian/patches/167_multiple_vuln_200808: backported fixes for multiple vulnerabilities issued at and . - untrace_var is permitted at safe level 4 (from v1_8_7_32) - $PROGRAM_NAME may be modified at safe level 4 (from v1_8_7_35) (CVE-2008-3655) - Insecure methods may be called at safe level 1-3 (from v1_8_7_33) - Syslog operations are permitted at safe level 4 (from v1_8_7_44) - DoS vulnerability in WEBrick (from v1_8_7_69) (CVE-2008-3656) - Lack of taintness check in dl (from v1_8_7_72) (CVE-2008-3657) - DNS spoofing vulnerability in resolv.rb (backported ressolv.rb and resolv-replace.rb from 1.8.7.22-p72) (CVE-2008-1447) * applied debian/patches/168_rexml_dos: backported r19033 of trunk of ruby svn repository which fixes REXML DoS vulnerablility (CVE-2008-3790) . stable/main/binary-ia64/libreadline-ruby1.8_1.8.5-4etch3_ia64.deb stable/main/binary-ia64/libopenssl-ruby1.8_1.8.5-4etch3_ia64.deb stable/main/binary-ia64/libruby1.8_1.8.5-4etch3_ia64.deb stable/main/binary-ia64/ruby1.8-dev_1.8.5-4etch3_ia64.deb stable/main/binary-ia64/libdbm-ruby1.8_1.8.5-4etch3_ia64.deb stable/main/binary-ia64/ruby1.8_1.8.5-4etch3_ia64.deb stable/main/binary-ia64/libtcltk-ruby1.8_1.8.5-4etch3_ia64.deb stable/main/binary-ia64/libgdbm-ruby1.8_1.8.5-4etch3_ia64.deb stable/main/binary-ia64/libruby1.8-dbg_1.8.5-4etch3_ia64.deb ruby1.8 (1.8.5-4etch3) stable-security; urgency=high * applied debian/patches/167_multiple_vuln_200808: backported fixes for multiple vulnerabilities issued at and . - untrace_var is permitted at safe level 4 (from v1_8_7_32) - $PROGRAM_NAME may be modified at safe level 4 (from v1_8_7_35) (CVE-2008-3655) - Insecure methods may be called at safe level 1-3 (from v1_8_7_33) - Syslog operations are permitted at safe level 4 (from v1_8_7_44) - DoS vulnerability in WEBrick (from v1_8_7_69) (CVE-2008-3656) - Lack of taintness check in dl (from v1_8_7_72) (CVE-2008-3657) - DNS spoofing vulnerability in resolv.rb (backported ressolv.rb and resolv-replace.rb from 1.8.7.22-p72) (CVE-2008-1447) * applied debian/patches/168_rexml_dos: backported r19033 of trunk of ruby svn repository which fixes REXML DoS vulnerablility (CVE-2008-3790) . stable/main/binary-hppa/libgdbm-ruby1.8_1.8.5-4etch3_hppa.deb stable/main/binary-hppa/libreadline-ruby1.8_1.8.5-4etch3_hppa.deb stable/main/binary-hppa/libruby1.8_1.8.5-4etch3_hppa.deb stable/main/binary-hppa/libtcltk-ruby1.8_1.8.5-4etch3_hppa.deb stable/main/binary-hppa/ruby1.8-dev_1.8.5-4etch3_hppa.deb stable/main/binary-hppa/libruby1.8-dbg_1.8.5-4etch3_hppa.deb stable/main/binary-hppa/libopenssl-ruby1.8_1.8.5-4etch3_hppa.deb stable/main/binary-hppa/libdbm-ruby1.8_1.8.5-4etch3_hppa.deb stable/main/binary-hppa/ruby1.8_1.8.5-4etch3_hppa.deb ruby1.8 (1.8.5-4etch3) stable-security; urgency=high * applied debian/patches/167_multiple_vuln_200808: backported fixes for multiple vulnerabilities issued at and . - untrace_var is permitted at safe level 4 (from v1_8_7_32) - $PROGRAM_NAME may be modified at safe level 4 (from v1_8_7_35) (CVE-2008-3655) - Insecure methods may be called at safe level 1-3 (from v1_8_7_33) - Syslog operations are permitted at safe level 4 (from v1_8_7_44) - DoS vulnerability in WEBrick (from v1_8_7_69) (CVE-2008-3656) - Lack of taintness check in dl (from v1_8_7_72) (CVE-2008-3657) - DNS spoofing vulnerability in resolv.rb (backported ressolv.rb and resolv-replace.rb from 1.8.7.22-p72) (CVE-2008-1447) * applied debian/patches/168_rexml_dos: backported r19033 of trunk of ruby svn repository which fixes REXML DoS vulnerablility (CVE-2008-3790) . stable/main/binary-arm/ruby1.8-dev_1.8.5-4etch3_arm.deb stable/main/binary-arm/libopenssl-ruby1.8_1.8.5-4etch3_arm.deb stable/main/binary-arm/libgdbm-ruby1.8_1.8.5-4etch3_arm.deb stable/main/binary-arm/libreadline-ruby1.8_1.8.5-4etch3_arm.deb stable/main/binary-arm/libruby1.8_1.8.5-4etch3_arm.deb stable/main/binary-arm/libdbm-ruby1.8_1.8.5-4etch3_arm.deb stable/main/binary-arm/libtcltk-ruby1.8_1.8.5-4etch3_arm.deb stable/main/binary-arm/libruby1.8-dbg_1.8.5-4etch3_arm.deb stable/main/binary-arm/ruby1.8_1.8.5-4etch3_arm.deb ruby1.8 (1.8.5-4etch3) stable-security; urgency=high * applied debian/patches/167_multiple_vuln_200808: backported fixes for multiple vulnerabilities issued at and . - untrace_var is permitted at safe level 4 (from v1_8_7_32) - $PROGRAM_NAME may be modified at safe level 4 (from v1_8_7_35) (CVE-2008-3655) - Insecure methods may be called at safe level 1-3 (from v1_8_7_33) - Syslog operations are permitted at safe level 4 (from v1_8_7_44) - DoS vulnerability in WEBrick (from v1_8_7_69) (CVE-2008-3656) - Lack of taintness check in dl (from v1_8_7_72) (CVE-2008-3657) - DNS spoofing vulnerability in resolv.rb (backported ressolv.rb and resolv-replace.rb from 1.8.7.22-p72) (CVE-2008-1447) * applied debian/patches/168_rexml_dos: backported r19033 of trunk of ruby svn repository which fixes REXML DoS vulnerablility (CVE-2008-3790) . stable/main/binary-amd64/libruby1.8-dbg_1.8.5-4etch3_amd64.deb stable/main/binary-amd64/ruby1.8_1.8.5-4etch3_amd64.deb stable/main/binary-amd64/libreadline-ruby1.8_1.8.5-4etch3_amd64.deb stable/main/binary-amd64/libopenssl-ruby1.8_1.8.5-4etch3_amd64.deb stable/main/binary-amd64/libruby1.8_1.8.5-4etch3_amd64.deb stable/main/binary-amd64/ruby1.8-dev_1.8.5-4etch3_amd64.deb stable/main/binary-amd64/libtcltk-ruby1.8_1.8.5-4etch3_amd64.deb stable/main/binary-amd64/libdbm-ruby1.8_1.8.5-4etch3_amd64.deb stable/main/binary-amd64/libgdbm-ruby1.8_1.8.5-4etch3_amd64.deb ruby1.8 (1.8.5-4etch3) stable-security; urgency=high * applied debian/patches/167_multiple_vuln_200808: backported fixes for multiple vulnerabilities issued at and . - untrace_var is permitted at safe level 4 (from v1_8_7_32) - $PROGRAM_NAME may be modified at safe level 4 (from v1_8_7_35) (CVE-2008-3655) - Insecure methods may be called at safe level 1-3 (from v1_8_7_33) - Syslog operations are permitted at safe level 4 (from v1_8_7_44) - DoS vulnerability in WEBrick (from v1_8_7_69) (CVE-2008-3656) - Lack of taintness check in dl (from v1_8_7_72) (CVE-2008-3657) - DNS spoofing vulnerability in resolv.rb (backported ressolv.rb and resolv-replace.rb from 1.8.7.22-p72) (CVE-2008-1447) * applied debian/patches/168_rexml_dos: backported r19033 of trunk of ruby svn repository which fixes REXML DoS vulnerablility (CVE-2008-3790) . stable/main/binary-alpha/ruby1.8-dev_1.8.5-4etch3_alpha.deb stable/main/binary-alpha/libtcltk-ruby1.8_1.8.5-4etch3_alpha.deb stable/main/binary-alpha/libruby1.8_1.8.5-4etch3_alpha.deb stable/main/binary-alpha/libgdbm-ruby1.8_1.8.5-4etch3_alpha.deb stable/main/binary-alpha/libdbm-ruby1.8_1.8.5-4etch3_alpha.deb stable/main/binary-alpha/libruby1.8-dbg_1.8.5-4etch3_alpha.deb stable/main/binary-alpha/ruby1.8_1.8.5-4etch3_alpha.deb stable/main/binary-alpha/libreadline-ruby1.8_1.8.5-4etch3_alpha.deb stable/main/binary-alpha/libopenssl-ruby1.8_1.8.5-4etch3_alpha.deb ruby1.8 (1.8.5-4etch3) stable-security; urgency=high * applied debian/patches/167_multiple_vuln_200808: backported fixes for multiple vulnerabilities issued at and . - untrace_var is permitted at safe level 4 (from v1_8_7_32) - $PROGRAM_NAME may be modified at safe level 4 (from v1_8_7_35) (CVE-2008-3655) - Insecure methods may be called at safe level 1-3 (from v1_8_7_33) - Syslog operations are permitted at safe level 4 (from v1_8_7_44) - DoS vulnerability in WEBrick (from v1_8_7_69) (CVE-2008-3656) - Lack of taintness check in dl (from v1_8_7_72) (CVE-2008-3657) - DNS spoofing vulnerability in resolv.rb (backported ressolv.rb and resolv-replace.rb from 1.8.7.22-p72) (CVE-2008-1447) * applied debian/patches/168_rexml_dos: backported r19033 of trunk of ruby svn repository which fixes REXML DoS vulnerablility (CVE-2008-3790) . stable/main/binary-i386/libruby1.8-dbg_1.8.5-4etch3_i386.deb stable/main/binary-i386/libdbm-ruby1.8_1.8.5-4etch3_i386.deb stable/main/binary-all/ri1.8_1.8.5-4etch3_all.deb stable/main/binary-all/ruby1.8-elisp_1.8.5-4etch3_all.deb stable/main/binary-i386/libreadline-ruby1.8_1.8.5-4etch3_i386.deb stable/main/binary-all/rdoc1.8_1.8.5-4etch3_all.deb stable/main/source/ruby1.8_1.8.5-4etch3.dsc stable/main/binary-i386/libruby1.8_1.8.5-4etch3_i386.deb stable/main/binary-i386/ruby1.8_1.8.5-4etch3_i386.deb stable/main/binary-all/irb1.8_1.8.5-4etch3_all.deb stable/main/binary-i386/libopenssl-ruby1.8_1.8.5-4etch3_i386.deb stable/main/binary-i386/ruby1.8-dev_1.8.5-4etch3_i386.deb stable/main/binary-i386/libtcltk-ruby1.8_1.8.5-4etch3_i386.deb stable/main/binary-i386/libgdbm-ruby1.8_1.8.5-4etch3_i386.deb stable/main/binary-all/ruby1.8-examples_1.8.5-4etch3_all.deb stable/main/source/ruby1.8_1.8.5-4etch3.diff.gz ruby1.8 (1.8.5-4etch3) stable-security; urgency=high * applied debian/patches/167_multiple_vuln_200808: backported fixes for multiple vulnerabilities issued at and . - untrace_var is permitted at safe level 4 (from v1_8_7_32) - $PROGRAM_NAME may be modified at safe level 4 (from v1_8_7_35) (CVE-2008-3655) - Insecure methods may be called at safe level 1-3 (from v1_8_7_33) - Syslog operations are permitted at safe level 4 (from v1_8_7_44) - DoS vulnerability in WEBrick (from v1_8_7_69) (CVE-2008-3656) - Lack of taintness check in dl (from v1_8_7_72) (CVE-2008-3657) - DNS spoofing vulnerability in resolv.rb (backported ressolv.rb and resolv-replace.rb from 1.8.7.22-p72) (CVE-2008-1447) * applied debian/patches/168_rexml_dos: backported r19033 of trunk of ruby svn repository which fixes REXML DoS vulnerablility (CVE-2008-3790) . stable/main/binary-sparc/python2.5-minimal_2.5-5+etch1_sparc.deb stable/main/binary-sparc/python2.5_2.5-5+etch1_sparc.deb stable/main/binary-sparc/python2.5-dbg_2.5-5+etch1_sparc.deb stable/main/binary-sparc/python2.5-dev_2.5-5+etch1_sparc.deb python2.5 (2.5-5+etch1) stable-security; urgency=high * Non-maintainer upload by the Security Team. * CVE-2007-4965 * CVE-2008-1721 * http://bugs.python.org/issue2587 stable/main/binary-s390/python2.5-minimal_2.5-5+etch1_s390.deb stable/main/binary-s390/python2.5-dev_2.5-5+etch1_s390.deb stable/main/binary-s390/python2.5-dbg_2.5-5+etch1_s390.deb stable/main/binary-s390/python2.5_2.5-5+etch1_s390.deb python2.5 (2.5-5+etch1) stable-security; urgency=high * Non-maintainer upload by the Security Team. * CVE-2007-4965 * CVE-2008-1721 * http://bugs.python.org/issue2587 stable/main/binary-powerpc/python2.5_2.5-5+etch1_powerpc.deb stable/main/binary-powerpc/python2.5-minimal_2.5-5+etch1_powerpc.deb stable/main/binary-powerpc/python2.5-dbg_2.5-5+etch1_powerpc.deb stable/main/binary-powerpc/python2.5-dev_2.5-5+etch1_powerpc.deb python2.5 (2.5-5+etch1) stable-security; urgency=high * Non-maintainer upload by the Security Team. * CVE-2007-4965 * CVE-2008-1721 * http://bugs.python.org/issue2587 stable/main/binary-mipsel/python2.5-minimal_2.5-5+etch1_mipsel.deb stable/main/binary-mipsel/python2.5_2.5-5+etch1_mipsel.deb stable/main/binary-mipsel/python2.5-dev_2.5-5+etch1_mipsel.deb stable/main/binary-mipsel/python2.5-dbg_2.5-5+etch1_mipsel.deb python2.5 (2.5-5+etch1) stable-security; urgency=high * Non-maintainer upload by the Security Team. * CVE-2007-4965 * CVE-2008-1721 * http://bugs.python.org/issue2587 stable/main/binary-mips/python2.5-minimal_2.5-5+etch1_mips.deb stable/main/binary-mips/python2.5-dev_2.5-5+etch1_mips.deb stable/main/binary-mips/python2.5_2.5-5+etch1_mips.deb stable/main/binary-mips/python2.5-dbg_2.5-5+etch1_mips.deb python2.5 (2.5-5+etch1) stable-security; urgency=high * Non-maintainer upload by the Security Team. * CVE-2007-4965 * CVE-2008-1721 * http://bugs.python.org/issue2587 stable/main/binary-ia64/python2.5-minimal_2.5-5+etch1_ia64.deb stable/main/binary-ia64/python2.5_2.5-5+etch1_ia64.deb stable/main/binary-ia64/python2.5-dev_2.5-5+etch1_ia64.deb stable/main/binary-ia64/python2.5-dbg_2.5-5+etch1_ia64.deb python2.5 (2.5-5+etch1) stable-security; urgency=high * Non-maintainer upload by the Security Team. * CVE-2007-4965 * CVE-2008-1721 * http://bugs.python.org/issue2587 stable/main/binary-hppa/python2.5-minimal_2.5-5+etch1_hppa.deb stable/main/binary-hppa/python2.5_2.5-5+etch1_hppa.deb stable/main/binary-hppa/python2.5-dev_2.5-5+etch1_hppa.deb stable/main/binary-hppa/python2.5-dbg_2.5-5+etch1_hppa.deb python2.5 (2.5-5+etch1) stable-security; urgency=high * Non-maintainer upload by the Security Team. * CVE-2007-4965 * CVE-2008-1721 * http://bugs.python.org/issue2587 stable/main/binary-arm/python2.5-minimal_2.5-5+etch1_arm.deb stable/main/binary-arm/python2.5-dev_2.5-5+etch1_arm.deb stable/main/binary-arm/python2.5_2.5-5+etch1_arm.deb stable/main/binary-arm/python2.5-dbg_2.5-5+etch1_arm.deb python2.5 (2.5-5+etch1) stable-security; urgency=high * Non-maintainer upload by the Security Team. * CVE-2007-4965 * CVE-2008-1721 * http://bugs.python.org/issue2587 stable/main/binary-amd64/python2.5-dev_2.5-5+etch1_amd64.deb stable/main/binary-amd64/python2.5_2.5-5+etch1_amd64.deb stable/main/binary-amd64/python2.5-dbg_2.5-5+etch1_amd64.deb stable/main/binary-amd64/python2.5-minimal_2.5-5+etch1_amd64.deb python2.5 (2.5-5+etch1) stable-security; urgency=high * Non-maintainer upload by the Security Team. * CVE-2007-4965 * CVE-2008-1721 * http://bugs.python.org/issue2587 stable/main/binary-alpha/python2.5-minimal_2.5-5+etch1_alpha.deb stable/main/binary-alpha/python2.5-dev_2.5-5+etch1_alpha.deb stable/main/binary-alpha/python2.5_2.5-5+etch1_alpha.deb stable/main/binary-alpha/python2.5-dbg_2.5-5+etch1_alpha.deb python2.5 (2.5-5+etch1) stable-security; urgency=high * Non-maintainer upload by the Security Team. * CVE-2007-4965 * CVE-2008-1721 * http://bugs.python.org/issue2587 stable/main/binary-all/python2.5-examples_2.5-5+etch1_all.deb stable/main/binary-i386/python2.5-minimal_2.5-5+etch1_i386.deb stable/main/binary-i386/python2.5_2.5-5+etch1_i386.deb stable/main/binary-all/idle-python2.5_2.5-5+etch1_all.deb stable/main/source/python2.5_2.5-5+etch1.diff.gz stable/main/source/python2.5_2.5-5+etch1.dsc stable/main/binary-i386/python2.5-dev_2.5-5+etch1_i386.deb stable/main/binary-i386/python2.5-dbg_2.5-5+etch1_i386.deb python2.5 (2.5-5+etch1) stable-security; urgency=high * Non-maintainer upload by the Security Team. * CVE-2007-4965 * CVE-2008-1721 * http://bugs.python.org/issue2587 stable/main/source/python-dns_2.3.0-5.2+etch2.diff.gz stable/main/binary-all/python-dns_2.3.0-5.2+etch2_all.deb stable/main/source/python-dns_2.3.0-5.2+etch2.dsc python-dns (2.3.0-5.2+etch2) stable-security; urgency=high * Non-maintainer upload by the security team; thanks (again) to Scott Kitterman for preparing the fix * Modify DNS/Lib.py so unicode DNS names don't cause a crash (Closes: #499277) * Update DNS/Base.py changes for #490217 to more robust upstream fix stable/main/source/python-django_0.95.1-1etch2.dsc stable/main/binary-all/python-django_0.95.1-1etch2_all.deb stable/main/source/python-django_0.95.1-1etch2.diff.gz python-django (0.95.1-1etch2) stable-security; urgency=low * debian/patches/04_csrf_fix.diff - Fixes cross-site request forgery vulnerability. http://www.djangoproject.com/weblog/2008/sep/02/security/ Closes: 497765 * debian/patches/05_i18n_dos_fix.diff. - Fixes denial of service vulnerability (CVE-2007-5712). Closes: 448838 stable/main/binary-sparc/libecpg-dev_8.1.13-0etch1_sparc.deb stable/main/binary-sparc/libpq-dev_8.1.13-0etch1_sparc.deb stable/main/binary-sparc/libpq4_8.1.13-0etch1_sparc.deb stable/main/binary-sparc/libecpg-compat2_8.1.13-0etch1_sparc.deb stable/main/binary-sparc/postgresql-plperl-8.1_8.1.13-0etch1_sparc.deb stable/main/binary-sparc/libecpg5_8.1.13-0etch1_sparc.deb stable/main/binary-sparc/postgresql-contrib-8.1_8.1.13-0etch1_sparc.deb stable/main/binary-sparc/postgresql-client-8.1_8.1.13-0etch1_sparc.deb stable/main/binary-sparc/libpgtypes2_8.1.13-0etch1_sparc.deb stable/main/binary-sparc/postgresql-8.1_8.1.13-0etch1_sparc.deb stable/main/binary-sparc/postgresql-plpython-8.1_8.1.13-0etch1_sparc.deb stable/main/binary-sparc/postgresql-pltcl-8.1_8.1.13-0etch1_sparc.deb stable/main/binary-sparc/postgresql-server-dev-8.1_8.1.13-0etch1_sparc.deb postgresql-8.1 (8.1.13-0etch1) stable; urgency=low * New upstream bugfix release (please note that 8.1.12 was never released, due to the discovery of another major bug): - Make "ALTER AGGREGATE ... OWNER TO" update pg_shdepend. This oversight could lead to problems if the aggregate was later involved in a "DROP OWNED" or "REASSIGN OWNED" operation. - Fix "ALTER TABLE ADD COLUMN ... PRIMARY KEY" so that the new column is correctly checked to see if it's been initialized to all non-nulls. Previous versions neglected to check this requirement at all. - Fix possible "CREATE TABLE" failure when inheriting the "same" constraint from multiple parent relations that inherited that constraint from a common ancestor. - Fix conversions between ISO-8859-5 and other encodings to handle Cyrillic "Yo" characters (e and E with two dots). - Fix a few datatype input functions that were allowing unused bytes in their results to contain uninitialized, unpredictable values. This could lead to failures in which two apparently identical literal values were not seen as equal, resulting in the parser complaining about unmatched ORDER BY and DISTINCT expressions. - Fix a corner case in regular-expression substring matching. - Fix incorrect result from ecpg's PGTYPEStimestamp_sub() function. - Fix core dump in "contrib/xml2"'s xpath_table() function when the input query returns a NULL value. - Fix longstanding "LISTEN"/"NOTIFY" race condition. In rare cases a session that had just executed a "LISTEN" might not get a notification, even though one would be expected because the concurrent transaction executing "NOTIFY" was observed to commit later. A side effect of the fix is that a transaction that has executed a not-yet-committed "LISTEN" command will not see any row in pg_listener for the "LISTEN", should it choose to look; formerly it would have. This behavior was never documented one way or the other, but it is possible that some applications depend on the old behavior. - Disallow "LISTEN" and "UNLISTEN" within a prepared transaction. This was formerly allowed but trying to do it had various unpleasant consequences, notably that the originating backend could not exit as long as an "UNLISTEN" remained uncommitted. - Fix rare crash when an error occurs during a query using a hash index. - Fix input of datetime values for February 29 in years BC. The former coding was mistaken about which years were leap years. - Fix "unrecognized node type" error in some variants of "ALTER OWNER". - Fix pg_ctl to correctly extract the postmaster's port number from command-line options. Previously, pg_ctl start -w could try to contact the postmaster on the wrong port, leading to bogus reports of startup failure. - Fix display of constant expressions in ORDER BY and GROUP BY. An explictly casted constant would be shown incorrectly. This could for example lead to corruption of a view definition during dump and reload. - Fix libpq to handle NOTICE messages correctly during COPY OUT. This failure has only been observed to occur when a user-defined datatype's output routine issues a NOTICE, but there is no guarantee it couldn't happen due to other causes. stable/main/binary-s390/postgresql-pltcl-8.1_8.1.13-0etch1_s390.deb stable/main/binary-s390/libpgtypes2_8.1.13-0etch1_s390.deb stable/main/binary-s390/postgresql-8.1_8.1.13-0etch1_s390.deb stable/main/binary-s390/libecpg5_8.1.13-0etch1_s390.deb stable/main/binary-s390/libecpg-dev_8.1.13-0etch1_s390.deb stable/main/binary-s390/postgresql-plpython-8.1_8.1.13-0etch1_s390.deb stable/main/binary-s390/postgresql-server-dev-8.1_8.1.13-0etch1_s390.deb stable/main/binary-s390/libecpg-compat2_8.1.13-0etch1_s390.deb stable/main/binary-s390/postgresql-client-8.1_8.1.13-0etch1_s390.deb stable/main/binary-s390/postgresql-plperl-8.1_8.1.13-0etch1_s390.deb stable/main/binary-s390/postgresql-contrib-8.1_8.1.13-0etch1_s390.deb stable/main/binary-s390/libpq-dev_8.1.13-0etch1_s390.deb stable/main/binary-s390/libpq4_8.1.13-0etch1_s390.deb postgresql-8.1 (8.1.13-0etch1) stable; urgency=low * New upstream bugfix release (please note that 8.1.12 was never released, due to the discovery of another major bug): - Make "ALTER AGGREGATE ... OWNER TO" update pg_shdepend. This oversight could lead to problems if the aggregate was later involved in a "DROP OWNED" or "REASSIGN OWNED" operation. - Fix "ALTER TABLE ADD COLUMN ... PRIMARY KEY" so that the new column is correctly checked to see if it's been initialized to all non-nulls. Previous versions neglected to check this requirement at all. - Fix possible "CREATE TABLE" failure when inheriting the "same" constraint from multiple parent relations that inherited that constraint from a common ancestor. - Fix conversions between ISO-8859-5 and other encodings to handle Cyrillic "Yo" characters (e and E with two dots). - Fix a few datatype input functions that were allowing unused bytes in their results to contain uninitialized, unpredictable values. This could lead to failures in which two apparently identical literal values were not seen as equal, resulting in the parser complaining about unmatched ORDER BY and DISTINCT expressions. - Fix a corner case in regular-expression substring matching. - Fix incorrect result from ecpg's PGTYPEStimestamp_sub() function. - Fix core dump in "contrib/xml2"'s xpath_table() function when the input query returns a NULL value. - Fix longstanding "LISTEN"/"NOTIFY" race condition. In rare cases a session that had just executed a "LISTEN" might not get a notification, even though one would be expected because the concurrent transaction executing "NOTIFY" was observed to commit later. A side effect of the fix is that a transaction that has executed a not-yet-committed "LISTEN" command will not see any row in pg_listener for the "LISTEN", should it choose to look; formerly it would have. This behavior was never documented one way or the other, but it is possible that some applications depend on the old behavior. - Disallow "LISTEN" and "UNLISTEN" within a prepared transaction. This was formerly allowed but trying to do it had various unpleasant consequences, notably that the originating backend could not exit as long as an "UNLISTEN" remained uncommitted. - Fix rare crash when an error occurs during a query using a hash index. - Fix input of datetime values for February 29 in years BC. The former coding was mistaken about which years were leap years. - Fix "unrecognized node type" error in some variants of "ALTER OWNER". - Fix pg_ctl to correctly extract the postmaster's port number from command-line options. Previously, pg_ctl start -w could try to contact the postmaster on the wrong port, leading to bogus reports of startup failure. - Fix display of constant expressions in ORDER BY and GROUP BY. An explictly casted constant would be shown incorrectly. This could for example lead to corruption of a view definition during dump and reload. - Fix libpq to handle NOTICE messages correctly during COPY OUT. This failure has only been observed to occur when a user-defined datatype's output routine issues a NOTICE, but there is no guarantee it couldn't happen due to other causes. stable/main/binary-powerpc/postgresql-contrib-8.1_8.1.13-0etch1_powerpc.deb stable/main/binary-powerpc/libpgtypes2_8.1.13-0etch1_powerpc.deb stable/main/binary-powerpc/libecpg-dev_8.1.13-0etch1_powerpc.deb stable/main/binary-powerpc/postgresql-server-dev-8.1_8.1.13-0etch1_powerpc.deb stable/main/binary-powerpc/libpq4_8.1.13-0etch1_powerpc.deb stable/main/binary-powerpc/postgresql-client-8.1_8.1.13-0etch1_powerpc.deb stable/main/binary-powerpc/postgresql-8.1_8.1.13-0etch1_powerpc.deb stable/main/binary-powerpc/postgresql-pltcl-8.1_8.1.13-0etch1_powerpc.deb stable/main/binary-powerpc/postgresql-plperl-8.1_8.1.13-0etch1_powerpc.deb stable/main/binary-powerpc/libecpg5_8.1.13-0etch1_powerpc.deb stable/main/binary-powerpc/postgresql-plpython-8.1_8.1.13-0etch1_powerpc.deb stable/main/binary-powerpc/libecpg-compat2_8.1.13-0etch1_powerpc.deb stable/main/binary-powerpc/libpq-dev_8.1.13-0etch1_powerpc.deb postgresql-8.1 (8.1.13-0etch1) stable; urgency=low * New upstream bugfix release (please note that 8.1.12 was never released, due to the discovery of another major bug): - Make "ALTER AGGREGATE ... OWNER TO" update pg_shdepend. This oversight could lead to problems if the aggregate was later involved in a "DROP OWNED" or "REASSIGN OWNED" operation. - Fix "ALTER TABLE ADD COLUMN ... PRIMARY KEY" so that the new column is correctly checked to see if it's been initialized to all non-nulls. Previous versions neglected to check this requirement at all. - Fix possible "CREATE TABLE" failure when inheriting the "same" constraint from multiple parent relations that inherited that constraint from a common ancestor. - Fix conversions between ISO-8859-5 and other encodings to handle Cyrillic "Yo" characters (e and E with two dots). - Fix a few datatype input functions that were allowing unused bytes in their results to contain uninitialized, unpredictable values. This could lead to failures in which two apparently identical literal values were not seen as equal, resulting in the parser complaining about unmatched ORDER BY and DISTINCT expressions. - Fix a corner case in regular-expression substring matching. - Fix incorrect result from ecpg's PGTYPEStimestamp_sub() function. - Fix core dump in "contrib/xml2"'s xpath_table() function when the input query returns a NULL value. - Fix longstanding "LISTEN"/"NOTIFY" race condition. In rare cases a session that had just executed a "LISTEN" might not get a notification, even though one would be expected because the concurrent transaction executing "NOTIFY" was observed to commit later. A side effect of the fix is that a transaction that has executed a not-yet-committed "LISTEN" command will not see any row in pg_listener for the "LISTEN", should it choose to look; formerly it would have. This behavior was never documented one way or the other, but it is possible that some applications depend on the old behavior. - Disallow "LISTEN" and "UNLISTEN" within a prepared transaction. This was formerly allowed but trying to do it had various unpleasant consequences, notably that the originating backend could not exit as long as an "UNLISTEN" remained uncommitted. - Fix rare crash when an error occurs during a query using a hash index. - Fix input of datetime values for February 29 in years BC. The former coding was mistaken about which years were leap years. - Fix "unrecognized node type" error in some variants of "ALTER OWNER". - Fix pg_ctl to correctly extract the postmaster's port number from command-line options. Previously, pg_ctl start -w could try to contact the postmaster on the wrong port, leading to bogus reports of startup failure. - Fix display of constant expressions in ORDER BY and GROUP BY. An explictly casted constant would be shown incorrectly. This could for example lead to corruption of a view definition during dump and reload. - Fix libpq to handle NOTICE messages correctly during COPY OUT. This failure has only been observed to occur when a user-defined datatype's output routine issues a NOTICE, but there is no guarantee it couldn't happen due to other causes. stable/main/binary-mipsel/postgresql-pltcl-8.1_8.1.13-0etch1_mipsel.deb stable/main/binary-mipsel/postgresql-client-8.1_8.1.13-0etch1_mipsel.deb stable/main/binary-mipsel/libecpg-dev_8.1.13-0etch1_mipsel.deb stable/main/binary-mipsel/postgresql-8.1_8.1.13-0etch1_mipsel.deb stable/main/binary-mipsel/libecpg5_8.1.13-0etch1_mipsel.deb stable/main/binary-mipsel/postgresql-plperl-8.1_8.1.13-0etch1_mipsel.deb stable/main/binary-mipsel/postgresql-plpython-8.1_8.1.13-0etch1_mipsel.deb stable/main/binary-mipsel/libpq-dev_8.1.13-0etch1_mipsel.deb stable/main/binary-mipsel/postgresql-contrib-8.1_8.1.13-0etch1_mipsel.deb stable/main/binary-mipsel/libpgtypes2_8.1.13-0etch1_mipsel.deb stable/main/binary-mipsel/postgresql-server-dev-8.1_8.1.13-0etch1_mipsel.deb stable/main/binary-mipsel/libpq4_8.1.13-0etch1_mipsel.deb stable/main/binary-mipsel/libecpg-compat2_8.1.13-0etch1_mipsel.deb postgresql-8.1 (8.1.13-0etch1) stable; urgency=low * New upstream bugfix release (please note that 8.1.12 was never released, due to the discovery of another major bug): - Make "ALTER AGGREGATE ... OWNER TO" update pg_shdepend. This oversight could lead to problems if the aggregate was later involved in a "DROP OWNED" or "REASSIGN OWNED" operation. - Fix "ALTER TABLE ADD COLUMN ... PRIMARY KEY" so that the new column is correctly checked to see if it's been initialized to all non-nulls. Previous versions neglected to check this requirement at all. - Fix possible "CREATE TABLE" failure when inheriting the "same" constraint from multiple parent relations that inherited that constraint from a common ancestor. - Fix conversions between ISO-8859-5 and other encodings to handle Cyrillic "Yo" characters (e and E with two dots). - Fix a few datatype input functions that were allowing unused bytes in their results to contain uninitialized, unpredictable values. This could lead to failures in which two apparently identical literal values were not seen as equal, resulting in the parser complaining about unmatched ORDER BY and DISTINCT expressions. - Fix a corner case in regular-expression substring matching. - Fix incorrect result from ecpg's PGTYPEStimestamp_sub() function. - Fix core dump in "contrib/xml2"'s xpath_table() function when the input query returns a NULL value. - Fix longstanding "LISTEN"/"NOTIFY" race condition. In rare cases a session that had just executed a "LISTEN" might not get a notification, even though one would be expected because the concurrent transaction executing "NOTIFY" was observed to commit later. A side effect of the fix is that a transaction that has executed a not-yet-committed "LISTEN" command will not see any row in pg_listener for the "LISTEN", should it choose to look; formerly it would have. This behavior was never documented one way or the other, but it is possible that some applications depend on the old behavior. - Disallow "LISTEN" and "UNLISTEN" within a prepared transaction. This was formerly allowed but trying to do it had various unpleasant consequences, notably that the originating backend could not exit as long as an "UNLISTEN" remained uncommitted. - Fix rare crash when an error occurs during a query using a hash index. - Fix input of datetime values for February 29 in years BC. The former coding was mistaken about which years were leap years. - Fix "unrecognized node type" error in some variants of "ALTER OWNER". - Fix pg_ctl to correctly extract the postmaster's port number from command-line options. Previously, pg_ctl start -w could try to contact the postmaster on the wrong port, leading to bogus reports of startup failure. - Fix display of constant expressions in ORDER BY and GROUP BY. An explictly casted constant would be shown incorrectly. This could for example lead to corruption of a view definition during dump and reload. - Fix libpq to handle NOTICE messages correctly during COPY OUT. This failure has only been observed to occur when a user-defined datatype's output routine issues a NOTICE, but there is no guarantee it couldn't happen due to other causes. stable/main/binary-mips/postgresql-pltcl-8.1_8.1.13-0etch1_mips.deb stable/main/binary-mips/postgresql-plperl-8.1_8.1.13-0etch1_mips.deb stable/main/binary-mips/libpgtypes2_8.1.13-0etch1_mips.deb stable/main/binary-mips/postgresql-plpython-8.1_8.1.13-0etch1_mips.deb stable/main/binary-mips/postgresql-8.1_8.1.13-0etch1_mips.deb stable/main/binary-mips/postgresql-contrib-8.1_8.1.13-0etch1_mips.deb stable/main/binary-mips/libpq-dev_8.1.13-0etch1_mips.deb stable/main/binary-mips/libecpg5_8.1.13-0etch1_mips.deb stable/main/binary-mips/libecpg-compat2_8.1.13-0etch1_mips.deb stable/main/binary-mips/postgresql-server-dev-8.1_8.1.13-0etch1_mips.deb stable/main/binary-mips/libecpg-dev_8.1.13-0etch1_mips.deb stable/main/binary-mips/libpq4_8.1.13-0etch1_mips.deb stable/main/binary-mips/postgresql-client-8.1_8.1.13-0etch1_mips.deb postgresql-8.1 (8.1.13-0etch1) stable; urgency=low * New upstream bugfix release (please note that 8.1.12 was never released, due to the discovery of another major bug): - Make "ALTER AGGREGATE ... OWNER TO" update pg_shdepend. This oversight could lead to problems if the aggregate was later involved in a "DROP OWNED" or "REASSIGN OWNED" operation. - Fix "ALTER TABLE ADD COLUMN ... PRIMARY KEY" so that the new column is correctly checked to see if it's been initialized to all non-nulls. Previous versions neglected to check this requirement at all. - Fix possible "CREATE TABLE" failure when inheriting the "same" constraint from multiple parent relations that inherited that constraint from a common ancestor. - Fix conversions between ISO-8859-5 and other encodings to handle Cyrillic "Yo" characters (e and E with two dots). - Fix a few datatype input functions that were allowing unused bytes in their results to contain uninitialized, unpredictable values. This could lead to failures in which two apparently identical literal values were not seen as equal, resulting in the parser complaining about unmatched ORDER BY and DISTINCT expressions. - Fix a corner case in regular-expression substring matching. - Fix incorrect result from ecpg's PGTYPEStimestamp_sub() function. - Fix core dump in "contrib/xml2"'s xpath_table() function when the input query returns a NULL value. - Fix longstanding "LISTEN"/"NOTIFY" race condition. In rare cases a session that had just executed a "LISTEN" might not get a notification, even though one would be expected because the concurrent transaction executing "NOTIFY" was observed to commit later. A side effect of the fix is that a transaction that has executed a not-yet-committed "LISTEN" command will not see any row in pg_listener for the "LISTEN", should it choose to look; formerly it would have. This behavior was never documented one way or the other, but it is possible that some applications depend on the old behavior. - Disallow "LISTEN" and "UNLISTEN" within a prepared transaction. This was formerly allowed but trying to do it had various unpleasant consequences, notably that the originating backend could not exit as long as an "UNLISTEN" remained uncommitted. - Fix rare crash when an error occurs during a query using a hash index. - Fix input of datetime values for February 29 in years BC. The former coding was mistaken about which years were leap years. - Fix "unrecognized node type" error in some variants of "ALTER OWNER". - Fix pg_ctl to correctly extract the postmaster's port number from command-line options. Previously, pg_ctl start -w could try to contact the postmaster on the wrong port, leading to bogus reports of startup failure. - Fix display of constant expressions in ORDER BY and GROUP BY. An explictly casted constant would be shown incorrectly. This could for example lead to corruption of a view definition during dump and reload. - Fix libpq to handle NOTICE messages correctly during COPY OUT. This failure has only been observed to occur when a user-defined datatype's output routine issues a NOTICE, but there is no guarantee it couldn't happen due to other causes. stable/main/binary-ia64/postgresql-server-dev-8.1_8.1.13-0etch1_ia64.deb stable/main/binary-ia64/libecpg5_8.1.13-0etch1_ia64.deb stable/main/binary-ia64/postgresql-8.1_8.1.13-0etch1_ia64.deb stable/main/binary-ia64/postgresql-plperl-8.1_8.1.13-0etch1_ia64.deb stable/main/binary-ia64/libpgtypes2_8.1.13-0etch1_ia64.deb stable/main/binary-ia64/libecpg-dev_8.1.13-0etch1_ia64.deb stable/main/binary-ia64/libpq4_8.1.13-0etch1_ia64.deb stable/main/binary-ia64/postgresql-plpython-8.1_8.1.13-0etch1_ia64.deb stable/main/binary-ia64/postgresql-pltcl-8.1_8.1.13-0etch1_ia64.deb stable/main/binary-ia64/postgresql-client-8.1_8.1.13-0etch1_ia64.deb stable/main/binary-ia64/libpq-dev_8.1.13-0etch1_ia64.deb stable/main/binary-ia64/postgresql-contrib-8.1_8.1.13-0etch1_ia64.deb stable/main/binary-ia64/libecpg-compat2_8.1.13-0etch1_ia64.deb postgresql-8.1 (8.1.13-0etch1) stable; urgency=low * New upstream bugfix release (please note that 8.1.12 was never released, due to the discovery of another major bug): - Make "ALTER AGGREGATE ... OWNER TO" update pg_shdepend. This oversight could lead to problems if the aggregate was later involved in a "DROP OWNED" or "REASSIGN OWNED" operation. - Fix "ALTER TABLE ADD COLUMN ... PRIMARY KEY" so that the new column is correctly checked to see if it's been initialized to all non-nulls. Previous versions neglected to check this requirement at all. - Fix possible "CREATE TABLE" failure when inheriting the "same" constraint from multiple parent relations that inherited that constraint from a common ancestor. - Fix conversions between ISO-8859-5 and other encodings to handle Cyrillic "Yo" characters (e and E with two dots). - Fix a few datatype input functions that were allowing unused bytes in their results to contain uninitialized, unpredictable values. This could lead to failures in which two apparently identical literal values were not seen as equal, resulting in the parser complaining about unmatched ORDER BY and DISTINCT expressions. - Fix a corner case in regular-expression substring matching. - Fix incorrect result from ecpg's PGTYPEStimestamp_sub() function. - Fix core dump in "contrib/xml2"'s xpath_table() function when the input query returns a NULL value. - Fix longstanding "LISTEN"/"NOTIFY" race condition. In rare cases a session that had just executed a "LISTEN" might not get a notification, even though one would be expected because the concurrent transaction executing "NOTIFY" was observed to commit later. A side effect of the fix is that a transaction that has executed a not-yet-committed "LISTEN" command will not see any row in pg_listener for the "LISTEN", should it choose to look; formerly it would have. This behavior was never documented one way or the other, but it is possible that some applications depend on the old behavior. - Disallow "LISTEN" and "UNLISTEN" within a prepared transaction. This was formerly allowed but trying to do it had various unpleasant consequences, notably that the originating backend could not exit as long as an "UNLISTEN" remained uncommitted. - Fix rare crash when an error occurs during a query using a hash index. - Fix input of datetime values for February 29 in years BC. The former coding was mistaken about which years were leap years. - Fix "unrecognized node type" error in some variants of "ALTER OWNER". - Fix pg_ctl to correctly extract the postmaster's port number from command-line options. Previously, pg_ctl start -w could try to contact the postmaster on the wrong port, leading to bogus reports of startup failure. - Fix display of constant expressions in ORDER BY and GROUP BY. An explictly casted constant would be shown incorrectly. This could for example lead to corruption of a view definition during dump and reload. - Fix libpq to handle NOTICE messages correctly during COPY OUT. This failure has only been observed to occur when a user-defined datatype's output routine issues a NOTICE, but there is no guarantee it couldn't happen due to other causes. stable/main/binary-hppa/libecpg5_8.1.13-0etch1_hppa.deb stable/main/binary-hppa/postgresql-plperl-8.1_8.1.13-0etch1_hppa.deb stable/main/binary-hppa/postgresql-8.1_8.1.13-0etch1_hppa.deb stable/main/binary-hppa/postgresql-plpython-8.1_8.1.13-0etch1_hppa.deb stable/main/binary-hppa/libpq4_8.1.13-0etch1_hppa.deb stable/main/binary-hppa/libecpg-dev_8.1.13-0etch1_hppa.deb stable/main/binary-hppa/postgresql-pltcl-8.1_8.1.13-0etch1_hppa.deb stable/main/binary-hppa/postgresql-client-8.1_8.1.13-0etch1_hppa.deb stable/main/binary-hppa/postgresql-server-dev-8.1_8.1.13-0etch1_hppa.deb stable/main/binary-hppa/libpq-dev_8.1.13-0etch1_hppa.deb stable/main/binary-hppa/libecpg-compat2_8.1.13-0etch1_hppa.deb stable/main/binary-hppa/postgresql-contrib-8.1_8.1.13-0etch1_hppa.deb stable/main/binary-hppa/libpgtypes2_8.1.13-0etch1_hppa.deb postgresql-8.1 (8.1.13-0etch1) stable; urgency=low * New upstream bugfix release (please note that 8.1.12 was never released, due to the discovery of another major bug): - Make "ALTER AGGREGATE ... OWNER TO" update pg_shdepend. This oversight could lead to problems if the aggregate was later involved in a "DROP OWNED" or "REASSIGN OWNED" operation. - Fix "ALTER TABLE ADD COLUMN ... PRIMARY KEY" so that the new column is correctly checked to see if it's been initialized to all non-nulls. Previous versions neglected to check this requirement at all. - Fix possible "CREATE TABLE" failure when inheriting the "same" constraint from multiple parent relations that inherited that constraint from a common ancestor. - Fix conversions between ISO-8859-5 and other encodings to handle Cyrillic "Yo" characters (e and E with two dots). - Fix a few datatype input functions that were allowing unused bytes in their results to contain uninitialized, unpredictable values. This could lead to failures in which two apparently identical literal values were not seen as equal, resulting in the parser complaining about unmatched ORDER BY and DISTINCT expressions. - Fix a corner case in regular-expression substring matching. - Fix incorrect result from ecpg's PGTYPEStimestamp_sub() function. - Fix core dump in "contrib/xml2"'s xpath_table() function when the input query returns a NULL value. - Fix longstanding "LISTEN"/"NOTIFY" race condition. In rare cases a session that had just executed a "LISTEN" might not get a notification, even though one would be expected because the concurrent transaction executing "NOTIFY" was observed to commit later. A side effect of the fix is that a transaction that has executed a not-yet-committed "LISTEN" command will not see any row in pg_listener for the "LISTEN", should it choose to look; formerly it would have. This behavior was never documented one way or the other, but it is possible that some applications depend on the old behavior. - Disallow "LISTEN" and "UNLISTEN" within a prepared transaction. This was formerly allowed but trying to do it had various unpleasant consequences, notably that the originating backend could not exit as long as an "UNLISTEN" remained uncommitted. - Fix rare crash when an error occurs during a query using a hash index. - Fix input of datetime values for February 29 in years BC. The former coding was mistaken about which years were leap years. - Fix "unrecognized node type" error in some variants of "ALTER OWNER". - Fix pg_ctl to correctly extract the postmaster's port number from command-line options. Previously, pg_ctl start -w could try to contact the postmaster on the wrong port, leading to bogus reports of startup failure. - Fix display of constant expressions in ORDER BY and GROUP BY. An explictly casted constant would be shown incorrectly. This could for example lead to corruption of a view definition during dump and reload. - Fix libpq to handle NOTICE messages correctly during COPY OUT. This failure has only been observed to occur when a user-defined datatype's output routine issues a NOTICE, but there is no guarantee it couldn't happen due to other causes. stable/main/binary-arm/libecpg-dev_8.1.13-0etch1_arm.deb stable/main/binary-arm/postgresql-plperl-8.1_8.1.13-0etch1_arm.deb stable/main/binary-arm/postgresql-pltcl-8.1_8.1.13-0etch1_arm.deb stable/main/binary-arm/postgresql-server-dev-8.1_8.1.13-0etch1_arm.deb stable/main/binary-arm/libecpg-compat2_8.1.13-0etch1_arm.deb stable/main/binary-arm/libpq-dev_8.1.13-0etch1_arm.deb stable/main/binary-arm/postgresql-8.1_8.1.13-0etch1_arm.deb stable/main/binary-arm/postgresql-contrib-8.1_8.1.13-0etch1_arm.deb stable/main/binary-arm/libpq4_8.1.13-0etch1_arm.deb stable/main/binary-arm/postgresql-client-8.1_8.1.13-0etch1_arm.deb stable/main/binary-arm/libpgtypes2_8.1.13-0etch1_arm.deb stable/main/binary-arm/postgresql-plpython-8.1_8.1.13-0etch1_arm.deb stable/main/binary-arm/libecpg5_8.1.13-0etch1_arm.deb postgresql-8.1 (8.1.13-0etch1) stable; urgency=low * New upstream bugfix release (please note that 8.1.12 was never released, due to the discovery of another major bug): - Make "ALTER AGGREGATE ... OWNER TO" update pg_shdepend. This oversight could lead to problems if the aggregate was later involved in a "DROP OWNED" or "REASSIGN OWNED" operation. - Fix "ALTER TABLE ADD COLUMN ... PRIMARY KEY" so that the new column is correctly checked to see if it's been initialized to all non-nulls. Previous versions neglected to check this requirement at all. - Fix possible "CREATE TABLE" failure when inheriting the "same" constraint from multiple parent relations that inherited that constraint from a common ancestor. - Fix conversions between ISO-8859-5 and other encodings to handle Cyrillic "Yo" characters (e and E with two dots). - Fix a few datatype input functions that were allowing unused bytes in their results to contain uninitialized, unpredictable values. This could lead to failures in which two apparently identical literal values were not seen as equal, resulting in the parser complaining about unmatched ORDER BY and DISTINCT expressions. - Fix a corner case in regular-expression substring matching. - Fix incorrect result from ecpg's PGTYPEStimestamp_sub() function. - Fix core dump in "contrib/xml2"'s xpath_table() function when the input query returns a NULL value. - Fix longstanding "LISTEN"/"NOTIFY" race condition. In rare cases a session that had just executed a "LISTEN" might not get a notification, even though one would be expected because the concurrent transaction executing "NOTIFY" was observed to commit later. A side effect of the fix is that a transaction that has executed a not-yet-committed "LISTEN" command will not see any row in pg_listener for the "LISTEN", should it choose to look; formerly it would have. This behavior was never documented one way or the other, but it is possible that some applications depend on the old behavior. - Disallow "LISTEN" and "UNLISTEN" within a prepared transaction. This was formerly allowed but trying to do it had various unpleasant consequences, notably that the originating backend could not exit as long as an "UNLISTEN" remained uncommitted. - Fix rare crash when an error occurs during a query using a hash index. - Fix input of datetime values for February 29 in years BC. The former coding was mistaken about which years were leap years. - Fix "unrecognized node type" error in some variants of "ALTER OWNER". - Fix pg_ctl to correctly extract the postmaster's port number from command-line options. Previously, pg_ctl start -w could try to contact the postmaster on the wrong port, leading to bogus reports of startup failure. - Fix display of constant expressions in ORDER BY and GROUP BY. An explictly casted constant would be shown incorrectly. This could for example lead to corruption of a view definition during dump and reload. - Fix libpq to handle NOTICE messages correctly during COPY OUT. This failure has only been observed to occur when a user-defined datatype's output routine issues a NOTICE, but there is no guarantee it couldn't happen due to other causes. stable/main/binary-amd64/postgresql-contrib-8.1_8.1.13-0etch1_amd64.deb stable/main/binary-amd64/postgresql-plperl-8.1_8.1.13-0etch1_amd64.deb stable/main/binary-amd64/libecpg-compat2_8.1.13-0etch1_amd64.deb stable/main/binary-amd64/libpgtypes2_8.1.13-0etch1_amd64.deb stable/main/binary-amd64/libpq-dev_8.1.13-0etch1_amd64.deb stable/main/binary-amd64/postgresql-pltcl-8.1_8.1.13-0etch1_amd64.deb stable/main/binary-amd64/postgresql-plpython-8.1_8.1.13-0etch1_amd64.deb stable/main/binary-amd64/postgresql-client-8.1_8.1.13-0etch1_amd64.deb stable/main/binary-amd64/postgresql-8.1_8.1.13-0etch1_amd64.deb stable/main/binary-amd64/libecpg-dev_8.1.13-0etch1_amd64.deb stable/main/binary-amd64/libecpg5_8.1.13-0etch1_amd64.deb stable/main/binary-amd64/libpq4_8.1.13-0etch1_amd64.deb stable/main/binary-amd64/postgresql-server-dev-8.1_8.1.13-0etch1_amd64.deb postgresql-8.1 (8.1.13-0etch1) stable; urgency=low * New upstream bugfix release (please note that 8.1.12 was never released, due to the discovery of another major bug): - Make "ALTER AGGREGATE ... OWNER TO" update pg_shdepend. This oversight could lead to problems if the aggregate was later involved in a "DROP OWNED" or "REASSIGN OWNED" operation. - Fix "ALTER TABLE ADD COLUMN ... PRIMARY KEY" so that the new column is correctly checked to see if it's been initialized to all non-nulls. Previous versions neglected to check this requirement at all. - Fix possible "CREATE TABLE" failure when inheriting the "same" constraint from multiple parent relations that inherited that constraint from a common ancestor. - Fix conversions between ISO-8859-5 and other encodings to handle Cyrillic "Yo" characters (e and E with two dots). - Fix a few datatype input functions that were allowing unused bytes in their results to contain uninitialized, unpredictable values. This could lead to failures in which two apparently identical literal values were not seen as equal, resulting in the parser complaining about unmatched ORDER BY and DISTINCT expressions. - Fix a corner case in regular-expression substring matching. - Fix incorrect result from ecpg's PGTYPEStimestamp_sub() function. - Fix core dump in "contrib/xml2"'s xpath_table() function when the input query returns a NULL value. - Fix longstanding "LISTEN"/"NOTIFY" race condition. In rare cases a session that had just executed a "LISTEN" might not get a notification, even though one would be expected because the concurrent transaction executing "NOTIFY" was observed to commit later. A side effect of the fix is that a transaction that has executed a not-yet-committed "LISTEN" command will not see any row in pg_listener for the "LISTEN", should it choose to look; formerly it would have. This behavior was never documented one way or the other, but it is possible that some applications depend on the old behavior. - Disallow "LISTEN" and "UNLISTEN" within a prepared transaction. This was formerly allowed but trying to do it had various unpleasant consequences, notably that the originating backend could not exit as long as an "UNLISTEN" remained uncommitted. - Fix rare crash when an error occurs during a query using a hash index. - Fix input of datetime values for February 29 in years BC. The former coding was mistaken about which years were leap years. - Fix "unrecognized node type" error in some variants of "ALTER OWNER". - Fix pg_ctl to correctly extract the postmaster's port number from command-line options. Previously, pg_ctl start -w could try to contact the postmaster on the wrong port, leading to bogus reports of startup failure. - Fix display of constant expressions in ORDER BY and GROUP BY. An explictly casted constant would be shown incorrectly. This could for example lead to corruption of a view definition during dump and reload. - Fix libpq to handle NOTICE messages correctly during COPY OUT. This failure has only been observed to occur when a user-defined datatype's output routine issues a NOTICE, but there is no guarantee it couldn't happen due to other causes. stable/main/binary-alpha/libecpg5_8.1.13-0etch1_alpha.deb stable/main/binary-alpha/postgresql-pltcl-8.1_8.1.13-0etch1_alpha.deb stable/main/binary-alpha/postgresql-plpython-8.1_8.1.13-0etch1_alpha.deb stable/main/binary-alpha/libpq-dev_8.1.13-0etch1_alpha.deb stable/main/binary-alpha/libecpg-dev_8.1.13-0etch1_alpha.deb stable/main/binary-alpha/postgresql-contrib-8.1_8.1.13-0etch1_alpha.deb stable/main/binary-alpha/postgresql-server-dev-8.1_8.1.13-0etch1_alpha.deb stable/main/binary-alpha/postgresql-client-8.1_8.1.13-0etch1_alpha.deb stable/main/binary-alpha/libpq4_8.1.13-0etch1_alpha.deb stable/main/binary-alpha/libecpg-compat2_8.1.13-0etch1_alpha.deb stable/main/binary-alpha/postgresql-plperl-8.1_8.1.13-0etch1_alpha.deb stable/main/binary-alpha/postgresql-8.1_8.1.13-0etch1_alpha.deb stable/main/binary-alpha/libpgtypes2_8.1.13-0etch1_alpha.deb postgresql-8.1 (8.1.13-0etch1) stable; urgency=low * New upstream bugfix release (please note that 8.1.12 was never released, due to the discovery of another major bug): - Make "ALTER AGGREGATE ... OWNER TO" update pg_shdepend. This oversight could lead to problems if the aggregate was later involved in a "DROP OWNED" or "REASSIGN OWNED" operation. - Fix "ALTER TABLE ADD COLUMN ... PRIMARY KEY" so that the new column is correctly checked to see if it's been initialized to all non-nulls. Previous versions neglected to check this requirement at all. - Fix possible "CREATE TABLE" failure when inheriting the "same" constraint from multiple parent relations that inherited that constraint from a common ancestor. - Fix conversions between ISO-8859-5 and other encodings to handle Cyrillic "Yo" characters (e and E with two dots). - Fix a few datatype input functions that were allowing unused bytes in their results to contain uninitialized, unpredictable values. This could lead to failures in which two apparently identical literal values were not seen as equal, resulting in the parser complaining about unmatched ORDER BY and DISTINCT expressions. - Fix a corner case in regular-expression substring matching. - Fix incorrect result from ecpg's PGTYPEStimestamp_sub() function. - Fix core dump in "contrib/xml2"'s xpath_table() function when the input query returns a NULL value. - Fix longstanding "LISTEN"/"NOTIFY" race condition. In rare cases a session that had just executed a "LISTEN" might not get a notification, even though one would be expected because the concurrent transaction executing "NOTIFY" was observed to commit later. A side effect of the fix is that a transaction that has executed a not-yet-committed "LISTEN" command will not see any row in pg_listener for the "LISTEN", should it choose to look; formerly it would have. This behavior was never documented one way or the other, but it is possible that some applications depend on the old behavior. - Disallow "LISTEN" and "UNLISTEN" within a prepared transaction. This was formerly allowed but trying to do it had various unpleasant consequences, notably that the originating backend could not exit as long as an "UNLISTEN" remained uncommitted. - Fix rare crash when an error occurs during a query using a hash index. - Fix input of datetime values for February 29 in years BC. The former coding was mistaken about which years were leap years. - Fix "unrecognized node type" error in some variants of "ALTER OWNER". - Fix pg_ctl to correctly extract the postmaster's port number from command-line options. Previously, pg_ctl start -w could try to contact the postmaster on the wrong port, leading to bogus reports of startup failure. - Fix display of constant expressions in ORDER BY and GROUP BY. An explictly casted constant would be shown incorrectly. This could for example lead to corruption of a view definition during dump and reload. - Fix libpq to handle NOTICE messages correctly during COPY OUT. This failure has only been observed to occur when a user-defined datatype's output routine issues a NOTICE, but there is no guarantee it couldn't happen due to other causes. stable/main/binary-i386/postgresql-plpython-8.1_8.1.13-0etch1_i386.deb stable/main/binary-i386/libecpg5_8.1.13-0etch1_i386.deb stable/main/binary-i386/postgresql-client-8.1_8.1.13-0etch1_i386.deb stable/main/binary-i386/libecpg-compat2_8.1.13-0etch1_i386.deb stable/main/source/postgresql-8.1_8.1.13-0etch1.diff.gz stable/main/binary-i386/postgresql-pltcl-8.1_8.1.13-0etch1_i386.deb stable/main/binary-i386/postgresql-server-dev-8.1_8.1.13-0etch1_i386.deb stable/main/binary-i386/libpq4_8.1.13-0etch1_i386.deb stable/main/binary-i386/libecpg-dev_8.1.13-0etch1_i386.deb stable/main/source/postgresql-8.1_8.1.13-0etch1.dsc stable/main/binary-all/postgresql-doc-8.1_8.1.13-0etch1_all.deb stable/main/binary-i386/postgresql-contrib-8.1_8.1.13-0etch1_i386.deb stable/main/source/postgresql-8.1_8.1.13.orig.tar.gz stable/main/binary-i386/libpq-dev_8.1.13-0etch1_i386.deb stable/main/binary-i386/libpgtypes2_8.1.13-0etch1_i386.deb stable/main/binary-i386/postgresql-plperl-8.1_8.1.13-0etch1_i386.deb stable/main/binary-i386/postgresql-8.1_8.1.13-0etch1_i386.deb postgresql-8.1 (8.1.13-0etch1) stable; urgency=low * New upstream bugfix release (please note that 8.1.12 was never released, due to the discovery of another major bug): - Make "ALTER AGGREGATE ... OWNER TO" update pg_shdepend. This oversight could lead to problems if the aggregate was later involved in a "DROP OWNED" or "REASSIGN OWNED" operation. - Fix "ALTER TABLE ADD COLUMN ... PRIMARY KEY" so that the new column is correctly checked to see if it's been initialized to all non-nulls. Previous versions neglected to check this requirement at all. - Fix possible "CREATE TABLE" failure when inheriting the "same" constraint from multiple parent relations that inherited that constraint from a common ancestor. - Fix conversions between ISO-8859-5 and other encodings to handle Cyrillic "Yo" characters (e and E with two dots). - Fix a few datatype input functions that were allowing unused bytes in their results to contain uninitialized, unpredictable values. This could lead to failures in which two apparently identical literal values were not seen as equal, resulting in the parser complaining about unmatched ORDER BY and DISTINCT expressions. - Fix a corner case in regular-expression substring matching. - Fix incorrect result from ecpg's PGTYPEStimestamp_sub() function. - Fix core dump in "contrib/xml2"'s xpath_table() function when the input query returns a NULL value. - Fix longstanding "LISTEN"/"NOTIFY" race condition. In rare cases a session that had just executed a "LISTEN" might not get a notification, even though one would be expected because the concurrent transaction executing "NOTIFY" was observed to commit later. A side effect of the fix is that a transaction that has executed a not-yet-committed "LISTEN" command will not see any row in pg_listener for the "LISTEN", should it choose to look; formerly it would have. This behavior was never documented one way or the other, but it is possible that some applications depend on the old behavior. - Disallow "LISTEN" and "UNLISTEN" within a prepared transaction. This was formerly allowed but trying to do it had various unpleasant consequences, notably that the originating backend could not exit as long as an "UNLISTEN" remained uncommitted. - Fix rare crash when an error occurs during a query using a hash index. - Fix input of datetime values for February 29 in years BC. The former coding was mistaken about which years were leap years. - Fix "unrecognized node type" error in some variants of "ALTER OWNER". - Fix pg_ctl to correctly extract the postmaster's port number from command-line options. Previously, pg_ctl start -w could try to contact the postmaster on the wrong port, leading to bogus reports of startup failure. - Fix display of constant expressions in ORDER BY and GROUP BY. An explictly casted constant would be shown incorrectly. This could for example lead to corruption of a view definition during dump and reload. - Fix libpq to handle NOTICE messages correctly during COPY OUT. This failure has only been observed to occur when a user-defined datatype's output routine issues a NOTICE, but there is no guarantee it couldn't happen due to other causes. stable/main/binary-sparc/postfix-cdb_2.3.8-2+etch1_sparc.deb stable/main/binary-sparc/postfix_2.3.8-2+etch1_sparc.deb stable/main/binary-sparc/postfix-ldap_2.3.8-2+etch1_sparc.deb stable/main/binary-sparc/postfix-pgsql_2.3.8-2+etch1_sparc.deb stable/main/binary-sparc/postfix-pcre_2.3.8-2+etch1_sparc.deb stable/main/binary-sparc/postfix-mysql_2.3.8-2+etch1_sparc.deb postfix (2.3.8-2+etch1) stable-security; urgency=low * Increase version number to be higher than binNMU'ed version (Closes: #495604). stable/main/binary-s390/postfix-ldap_2.3.8-2+etch1_s390.deb stable/main/binary-s390/postfix_2.3.8-2+etch1_s390.deb stable/main/binary-s390/postfix-cdb_2.3.8-2+etch1_s390.deb stable/main/binary-s390/postfix-mysql_2.3.8-2+etch1_s390.deb stable/main/binary-s390/postfix-pcre_2.3.8-2+etch1_s390.deb stable/main/binary-s390/postfix-pgsql_2.3.8-2+etch1_s390.deb postfix (2.3.8-2+etch1) stable-security; urgency=low * Increase version number to be higher than binNMU'ed version (Closes: #495604). stable/main/binary-powerpc/postfix-mysql_2.3.8-2+etch1_powerpc.deb stable/main/binary-powerpc/postfix-cdb_2.3.8-2+etch1_powerpc.deb stable/main/binary-powerpc/postfix-pgsql_2.3.8-2+etch1_powerpc.deb stable/main/binary-powerpc/postfix-ldap_2.3.8-2+etch1_powerpc.deb stable/main/binary-powerpc/postfix_2.3.8-2+etch1_powerpc.deb stable/main/binary-powerpc/postfix-pcre_2.3.8-2+etch1_powerpc.deb postfix (2.3.8-2+etch1) stable-security; urgency=low * Increase version number to be higher than binNMU'ed version (Closes: #495604). stable/main/binary-mipsel/postfix-ldap_2.3.8-2+etch1_mipsel.deb stable/main/binary-mipsel/postfix-pcre_2.3.8-2+etch1_mipsel.deb stable/main/binary-mipsel/postfix-cdb_2.3.8-2+etch1_mipsel.deb stable/main/binary-mipsel/postfix-pgsql_2.3.8-2+etch1_mipsel.deb stable/main/binary-mipsel/postfix-mysql_2.3.8-2+etch1_mipsel.deb stable/main/binary-mipsel/postfix_2.3.8-2+etch1_mipsel.deb postfix (2.3.8-2+etch1) stable-security; urgency=low * Increase version number to be higher than binNMU'ed version (Closes: #495604). stable/main/binary-mips/postfix_2.3.8-2+etch1_mips.deb stable/main/binary-mips/postfix-cdb_2.3.8-2+etch1_mips.deb stable/main/binary-mips/postfix-mysql_2.3.8-2+etch1_mips.deb stable/main/binary-mips/postfix-pgsql_2.3.8-2+etch1_mips.deb stable/main/binary-mips/postfix-ldap_2.3.8-2+etch1_mips.deb stable/main/binary-mips/postfix-pcre_2.3.8-2+etch1_mips.deb postfix (2.3.8-2+etch1) stable-security; urgency=low * Increase version number to be higher than binNMU'ed version (Closes: #495604). stable/main/binary-ia64/postfix-ldap_2.3.8-2+etch1_ia64.deb stable/main/binary-ia64/postfix-pgsql_2.3.8-2+etch1_ia64.deb stable/main/binary-ia64/postfix-mysql_2.3.8-2+etch1_ia64.deb stable/main/binary-ia64/postfix-cdb_2.3.8-2+etch1_ia64.deb stable/main/binary-ia64/postfix_2.3.8-2+etch1_ia64.deb stable/main/binary-ia64/postfix-pcre_2.3.8-2+etch1_ia64.deb postfix (2.3.8-2+etch1) stable-security; urgency=low * Increase version number to be higher than binNMU'ed version (Closes: #495604). stable/main/binary-hppa/postfix-cdb_2.3.8-2+etch1_hppa.deb stable/main/binary-hppa/postfix-ldap_2.3.8-2+etch1_hppa.deb stable/main/binary-hppa/postfix_2.3.8-2+etch1_hppa.deb stable/main/binary-hppa/postfix-pcre_2.3.8-2+etch1_hppa.deb stable/main/binary-hppa/postfix-pgsql_2.3.8-2+etch1_hppa.deb stable/main/binary-hppa/postfix-mysql_2.3.8-2+etch1_hppa.deb postfix (2.3.8-2+etch1) stable-security; urgency=low * Increase version number to be higher than binNMU'ed version (Closes: #495604). stable/main/binary-arm/postfix-pgsql_2.3.8-2+etch1_arm.deb stable/main/binary-arm/postfix-mysql_2.3.8-2+etch1_arm.deb stable/main/binary-arm/postfix-cdb_2.3.8-2+etch1_arm.deb stable/main/binary-arm/postfix-pcre_2.3.8-2+etch1_arm.deb stable/main/binary-arm/postfix_2.3.8-2+etch1_arm.deb stable/main/binary-arm/postfix-ldap_2.3.8-2+etch1_arm.deb postfix (2.3.8-2+etch1) stable-security; urgency=low * Increase version number to be higher than binNMU'ed version (Closes: #495604). stable/main/binary-amd64/postfix-pcre_2.3.8-2+etch1_amd64.deb stable/main/binary-amd64/postfix_2.3.8-2+etch1_amd64.deb stable/main/binary-amd64/postfix-mysql_2.3.8-2+etch1_amd64.deb stable/main/binary-amd64/postfix-ldap_2.3.8-2+etch1_amd64.deb stable/main/binary-amd64/postfix-cdb_2.3.8-2+etch1_amd64.deb stable/main/binary-amd64/postfix-pgsql_2.3.8-2+etch1_amd64.deb postfix (2.3.8-2+etch1) stable-security; urgency=low * Increase version number to be higher than binNMU'ed version (Closes: #495604). stable/main/binary-alpha/postfix-pcre_2.3.8-2+etch1_alpha.deb stable/main/binary-alpha/postfix_2.3.8-2+etch1_alpha.deb stable/main/binary-alpha/postfix-mysql_2.3.8-2+etch1_alpha.deb stable/main/binary-alpha/postfix-cdb_2.3.8-2+etch1_alpha.deb stable/main/binary-alpha/postfix-pgsql_2.3.8-2+etch1_alpha.deb stable/main/binary-alpha/postfix-ldap_2.3.8-2+etch1_alpha.deb postfix (2.3.8-2+etch1) stable-security; urgency=low * Increase version number to be higher than binNMU'ed version (Closes: #495604). stable/main/binary-all/postfix-doc_2.3.8-2+etch1_all.deb stable/main/binary-i386/postfix_2.3.8-2+etch1_i386.deb stable/main/binary-i386/postfix-cdb_2.3.8-2+etch1_i386.deb stable/main/binary-i386/postfix-pcre_2.3.8-2+etch1_i386.deb stable/main/source/postfix_2.3.8-2+etch1.diff.gz stable/main/binary-i386/postfix-mysql_2.3.8-2+etch1_i386.deb stable/main/source/postfix_2.3.8-2+etch1.dsc stable/main/binary-i386/postfix-pgsql_2.3.8-2+etch1_i386.deb stable/main/binary-i386/postfix-ldap_2.3.8-2+etch1_i386.deb stable/main/binary-all/postfix-dev_2.3.8-2+etch1_all.deb postfix (2.3.8-2+etch1) stable-security; urgency=low * Increase version number to be higher than binNMU'ed version (Closes: #495604). stable/main/source/phpmyadmin_2.9.1.1-8.dsc stable/main/source/phpmyadmin_2.9.1.1-8.diff.gz stable/main/binary-all/phpmyadmin_2.9.1.1-8_all.deb phpmyadmin (4:2.9.1.1-8) stable-security; urgency=high * Update for etch to address security issues. * Remote code execution by authenticated users. [PMASA-2008-7, CVE-2008-4096] * Prohibit phpMyAdmin to be framed by a remote site [PMASA-2008-6, CVE-2008-3456, CVE-2008-3457] * Cross site request forgery to create a database or change the character set (mostly annoyance). [PMASA-2008-5, CVE-2008-3197] stable/main/binary-sparc/php5-common_5.2.0-8+etch13_sparc.deb stable/main/binary-sparc/php5-pgsql_5.2.0-8+etch13_sparc.deb stable/main/binary-sparc/php5-tidy_5.2.0-8+etch13_sparc.deb stable/main/binary-sparc/libapache-mod-php5_5.2.0-8+etch13_sparc.deb stable/main/binary-sparc/php5-cli_5.2.0-8+etch13_sparc.deb stable/main/binary-sparc/php5-sybase_5.2.0-8+etch13_sparc.deb stable/main/binary-sparc/php5-mhash_5.2.0-8+etch13_sparc.deb stable/main/binary-sparc/php5-pspell_5.2.0-8+etch13_sparc.deb stable/main/binary-sparc/php5-mcrypt_5.2.0-8+etch13_sparc.deb stable/main/binary-sparc/php5-cgi_5.2.0-8+etch13_sparc.deb stable/main/binary-sparc/php5-snmp_5.2.0-8+etch13_sparc.deb stable/main/binary-sparc/php5-mysql_5.2.0-8+etch13_sparc.deb stable/main/binary-sparc/php5-curl_5.2.0-8+etch13_sparc.deb stable/main/binary-sparc/php5-recode_5.2.0-8+etch13_sparc.deb stable/main/binary-sparc/php5-xmlrpc_5.2.0-8+etch13_sparc.deb stable/main/binary-sparc/php5-ldap_5.2.0-8+etch13_sparc.deb stable/main/binary-sparc/libapache2-mod-php5_5.2.0-8+etch13_sparc.deb stable/main/binary-sparc/php5-sqlite_5.2.0-8+etch13_sparc.deb stable/main/binary-sparc/php5-imap_5.2.0-8+etch13_sparc.deb stable/main/binary-sparc/php5-gd_5.2.0-8+etch13_sparc.deb stable/main/binary-sparc/php5-xsl_5.2.0-8+etch13_sparc.deb stable/main/binary-sparc/php5-odbc_5.2.0-8+etch13_sparc.deb stable/main/binary-sparc/php5-dev_5.2.0-8+etch13_sparc.deb php5 (5.2.0-8+etch13) stable-security; urgency=high * Upload to etch for security issues * The following security issues are addressed with this update: - CVE-2008-3658: Buffer overflow in the imageloadfont function. Patch: 140-CVE-2008-3658.patch (closes: #499989) - CVE-2008-3659: Buffer overflow in the memnstr function. Patch: 139-CVE-2008-3659.patch (closes: #499988) - CVE-2008-3660: Remote DoS in fastcgi module Patch: CVE-2008-3660.patch (closes: #499987) * Revert previous security patch for CVE-2008-2829. A fix for this will not be possible without an updated version of the UW c-client libraries. stable/main/binary-s390/php5-imap_5.2.0-8+etch13_s390.deb stable/main/binary-s390/php5-cgi_5.2.0-8+etch13_s390.deb stable/main/binary-s390/php5-mysql_5.2.0-8+etch13_s390.deb stable/main/binary-s390/php5-mcrypt_5.2.0-8+etch13_s390.deb stable/main/binary-s390/php5-xmlrpc_5.2.0-8+etch13_s390.deb stable/main/binary-s390/libapache-mod-php5_5.2.0-8+etch13_s390.deb stable/main/binary-s390/php5-cli_5.2.0-8+etch13_s390.deb stable/main/binary-s390/php5-common_5.2.0-8+etch13_s390.deb stable/main/binary-s390/php5-xsl_5.2.0-8+etch13_s390.deb stable/main/binary-s390/php5-recode_5.2.0-8+etch13_s390.deb stable/main/binary-s390/php5-sybase_5.2.0-8+etch13_s390.deb stable/main/binary-s390/php5-gd_5.2.0-8+etch13_s390.deb stable/main/binary-s390/php5-dev_5.2.0-8+etch13_s390.deb stable/main/binary-s390/php5-snmp_5.2.0-8+etch13_s390.deb stable/main/binary-s390/php5-sqlite_5.2.0-8+etch13_s390.deb stable/main/binary-s390/php5-pgsql_5.2.0-8+etch13_s390.deb stable/main/binary-s390/php5-curl_5.2.0-8+etch13_s390.deb stable/main/binary-s390/php5-pspell_5.2.0-8+etch13_s390.deb stable/main/binary-s390/php5-odbc_5.2.0-8+etch13_s390.deb stable/main/binary-s390/php5-mhash_5.2.0-8+etch13_s390.deb stable/main/binary-s390/php5-tidy_5.2.0-8+etch13_s390.deb stable/main/binary-s390/php5-ldap_5.2.0-8+etch13_s390.deb stable/main/binary-s390/libapache2-mod-php5_5.2.0-8+etch13_s390.deb php5 (5.2.0-8+etch13) stable-security; urgency=high * Upload to etch for security issues * The following security issues are addressed with this update: - CVE-2008-3658: Buffer overflow in the imageloadfont function. Patch: 140-CVE-2008-3658.patch (closes: #499989) - CVE-2008-3659: Buffer overflow in the memnstr function. Patch: 139-CVE-2008-3659.patch (closes: #499988) - CVE-2008-3660: Remote DoS in fastcgi module Patch: CVE-2008-3660.patch (closes: #499987) * Revert previous security patch for CVE-2008-2829. A fix for this will not be possible without an updated version of the UW c-client libraries. stable/main/binary-powerpc/php5-imap_5.2.0-8+etch13_powerpc.deb stable/main/binary-powerpc/php5-dev_5.2.0-8+etch13_powerpc.deb stable/main/binary-powerpc/php5-xsl_5.2.0-8+etch13_powerpc.deb stable/main/binary-powerpc/php5-gd_5.2.0-8+etch13_powerpc.deb stable/main/binary-powerpc/php5-cgi_5.2.0-8+etch13_powerpc.deb stable/main/binary-powerpc/php5-xmlrpc_5.2.0-8+etch13_powerpc.deb stable/main/binary-powerpc/php5-recode_5.2.0-8+etch13_powerpc.deb stable/main/binary-powerpc/php5-common_5.2.0-8+etch13_powerpc.deb stable/main/binary-powerpc/php5-sqlite_5.2.0-8+etch13_powerpc.deb stable/main/binary-powerpc/php5-snmp_5.2.0-8+etch13_powerpc.deb stable/main/binary-powerpc/php5-mysql_5.2.0-8+etch13_powerpc.deb stable/main/binary-powerpc/php5-curl_5.2.0-8+etch13_powerpc.deb stable/main/binary-powerpc/php5-odbc_5.2.0-8+etch13_powerpc.deb stable/main/binary-powerpc/php5-ldap_5.2.0-8+etch13_powerpc.deb stable/main/binary-powerpc/php5-mcrypt_5.2.0-8+etch13_powerpc.deb stable/main/binary-powerpc/php5-mhash_5.2.0-8+etch13_powerpc.deb stable/main/binary-powerpc/php5-sybase_5.2.0-8+etch13_powerpc.deb stable/main/binary-powerpc/libapache2-mod-php5_5.2.0-8+etch13_powerpc.deb stable/main/binary-powerpc/php5-pgsql_5.2.0-8+etch13_powerpc.deb stable/main/binary-powerpc/php5-tidy_5.2.0-8+etch13_powerpc.deb stable/main/binary-powerpc/libapache-mod-php5_5.2.0-8+etch13_powerpc.deb stable/main/binary-powerpc/php5-cli_5.2.0-8+etch13_powerpc.deb stable/main/binary-powerpc/php5-pspell_5.2.0-8+etch13_powerpc.deb php5 (5.2.0-8+etch13) stable-security; urgency=high * Upload to etch for security issues * The following security issues are addressed with this update: - CVE-2008-3658: Buffer overflow in the imageloadfont function. Patch: 140-CVE-2008-3658.patch (closes: #499989) - CVE-2008-3659: Buffer overflow in the memnstr function. Patch: 139-CVE-2008-3659.patch (closes: #499988) - CVE-2008-3660: Remote DoS in fastcgi module Patch: CVE-2008-3660.patch (closes: #499987) * Revert previous security patch for CVE-2008-2829. A fix for this will not be possible without an updated version of the UW c-client libraries. stable/main/binary-mipsel/php5-cli_5.2.0-8+etch13_mipsel.deb stable/main/binary-mipsel/libapache-mod-php5_5.2.0-8+etch13_mipsel.deb stable/main/binary-mipsel/php5-dev_5.2.0-8+etch13_mipsel.deb stable/main/binary-mipsel/php5-imap_5.2.0-8+etch13_mipsel.deb stable/main/binary-mipsel/php5-odbc_5.2.0-8+etch13_mipsel.deb stable/main/binary-mipsel/php5-recode_5.2.0-8+etch13_mipsel.deb stable/main/binary-mipsel/php5-sybase_5.2.0-8+etch13_mipsel.deb stable/main/binary-mipsel/php5-pspell_5.2.0-8+etch13_mipsel.deb stable/main/binary-mipsel/php5-mhash_5.2.0-8+etch13_mipsel.deb stable/main/binary-mipsel/php5-cgi_5.2.0-8+etch13_mipsel.deb stable/main/binary-mipsel/php5-common_5.2.0-8+etch13_mipsel.deb stable/main/binary-mipsel/php5-xmlrpc_5.2.0-8+etch13_mipsel.deb stable/main/binary-mipsel/php5-xsl_5.2.0-8+etch13_mipsel.deb stable/main/binary-mipsel/php5-gd_5.2.0-8+etch13_mipsel.deb stable/main/binary-mipsel/php5-pgsql_5.2.0-8+etch13_mipsel.deb stable/main/binary-mipsel/php5-ldap_5.2.0-8+etch13_mipsel.deb stable/main/binary-mipsel/php5-curl_5.2.0-8+etch13_mipsel.deb stable/main/binary-mipsel/php5-mysql_5.2.0-8+etch13_mipsel.deb stable/main/binary-mipsel/libapache2-mod-php5_5.2.0-8+etch13_mipsel.deb stable/main/binary-mipsel/php5-mcrypt_5.2.0-8+etch13_mipsel.deb stable/main/binary-mipsel/php5-sqlite_5.2.0-8+etch13_mipsel.deb stable/main/binary-mipsel/php5-snmp_5.2.0-8+etch13_mipsel.deb stable/main/binary-mipsel/php5-tidy_5.2.0-8+etch13_mipsel.deb php5 (5.2.0-8+etch13) stable-security; urgency=high * Upload to etch for security issues * The following security issues are addressed with this update: - CVE-2008-3658: Buffer overflow in the imageloadfont function. Patch: 140-CVE-2008-3658.patch (closes: #499989) - CVE-2008-3659: Buffer overflow in the memnstr function. Patch: 139-CVE-2008-3659.patch (closes: #499988) - CVE-2008-3660: Remote DoS in fastcgi module Patch: CVE-2008-3660.patch (closes: #499987) * Revert previous security patch for CVE-2008-2829. A fix for this will not be possible without an updated version of the UW c-client libraries. stable/main/binary-mips/php5-dev_5.2.0-8+etch13_mips.deb stable/main/binary-mips/php5-sybase_5.2.0-8+etch13_mips.deb stable/main/binary-mips/php5-cli_5.2.0-8+etch13_mips.deb stable/main/binary-mips/php5-mhash_5.2.0-8+etch13_mips.deb stable/main/binary-mips/php5-ldap_5.2.0-8+etch13_mips.deb stable/main/binary-mips/php5-imap_5.2.0-8+etch13_mips.deb stable/main/binary-mips/php5-cgi_5.2.0-8+etch13_mips.deb stable/main/binary-mips/php5-gd_5.2.0-8+etch13_mips.deb stable/main/binary-mips/php5-odbc_5.2.0-8+etch13_mips.deb stable/main/binary-mips/libapache2-mod-php5_5.2.0-8+etch13_mips.deb stable/main/binary-mips/php5-xmlrpc_5.2.0-8+etch13_mips.deb stable/main/binary-mips/php5-snmp_5.2.0-8+etch13_mips.deb stable/main/binary-mips/php5-sqlite_5.2.0-8+etch13_mips.deb stable/main/binary-mips/php5-pgsql_5.2.0-8+etch13_mips.deb stable/main/binary-mips/php5-recode_5.2.0-8+etch13_mips.deb stable/main/binary-mips/php5-xsl_5.2.0-8+etch13_mips.deb stable/main/binary-mips/libapache-mod-php5_5.2.0-8+etch13_mips.deb stable/main/binary-mips/php5-pspell_5.2.0-8+etch13_mips.deb stable/main/binary-mips/php5-common_5.2.0-8+etch13_mips.deb stable/main/binary-mips/php5-curl_5.2.0-8+etch13_mips.deb stable/main/binary-mips/php5-mysql_5.2.0-8+etch13_mips.deb stable/main/binary-mips/php5-tidy_5.2.0-8+etch13_mips.deb stable/main/binary-mips/php5-mcrypt_5.2.0-8+etch13_mips.deb php5 (5.2.0-8+etch13) stable-security; urgency=high * Upload to etch for security issues * The following security issues are addressed with this update: - CVE-2008-3658: Buffer overflow in the imageloadfont function. Patch: 140-CVE-2008-3658.patch (closes: #499989) - CVE-2008-3659: Buffer overflow in the memnstr function. Patch: 139-CVE-2008-3659.patch (closes: #499988) - CVE-2008-3660: Remote DoS in fastcgi module Patch: CVE-2008-3660.patch (closes: #499987) * Revert previous security patch for CVE-2008-2829. A fix for this will not be possible without an updated version of the UW c-client libraries. stable/main/binary-ia64/php5-xsl_5.2.0-8+etch13_ia64.deb stable/main/binary-ia64/php5-cli_5.2.0-8+etch13_ia64.deb stable/main/binary-ia64/php5-mcrypt_5.2.0-8+etch13_ia64.deb stable/main/binary-ia64/libapache-mod-php5_5.2.0-8+etch13_ia64.deb stable/main/binary-ia64/php5-xmlrpc_5.2.0-8+etch13_ia64.deb stable/main/binary-ia64/php5-odbc_5.2.0-8+etch13_ia64.deb stable/main/binary-ia64/php5-common_5.2.0-8+etch13_ia64.deb stable/main/binary-ia64/php5-recode_5.2.0-8+etch13_ia64.deb stable/main/binary-ia64/php5-sybase_5.2.0-8+etch13_ia64.deb stable/main/binary-ia64/libapache2-mod-php5_5.2.0-8+etch13_ia64.deb stable/main/binary-ia64/php5-curl_5.2.0-8+etch13_ia64.deb stable/main/binary-ia64/php5-imap_5.2.0-8+etch13_ia64.deb stable/main/binary-ia64/php5-pspell_5.2.0-8+etch13_ia64.deb stable/main/binary-ia64/php5-cgi_5.2.0-8+etch13_ia64.deb stable/main/binary-ia64/php5-dev_5.2.0-8+etch13_ia64.deb stable/main/binary-ia64/php5-sqlite_5.2.0-8+etch13_ia64.deb stable/main/binary-ia64/php5-tidy_5.2.0-8+etch13_ia64.deb stable/main/binary-ia64/php5-pgsql_5.2.0-8+etch13_ia64.deb stable/main/binary-ia64/php5-snmp_5.2.0-8+etch13_ia64.deb stable/main/binary-ia64/php5-ldap_5.2.0-8+etch13_ia64.deb stable/main/binary-ia64/php5-mhash_5.2.0-8+etch13_ia64.deb stable/main/binary-ia64/php5-mysql_5.2.0-8+etch13_ia64.deb stable/main/binary-ia64/php5-gd_5.2.0-8+etch13_ia64.deb php5 (5.2.0-8+etch13) stable-security; urgency=high * Upload to etch for security issues * The following security issues are addressed with this update: - CVE-2008-3658: Buffer overflow in the imageloadfont function. Patch: 140-CVE-2008-3658.patch (closes: #499989) - CVE-2008-3659: Buffer overflow in the memnstr function. Patch: 139-CVE-2008-3659.patch (closes: #499988) - CVE-2008-3660: Remote DoS in fastcgi module Patch: CVE-2008-3660.patch (closes: #499987) * Revert previous security patch for CVE-2008-2829. A fix for this will not be possible without an updated version of the UW c-client libraries. stable/main/binary-i386/php5-mysql_5.2.0-8+etch13_i386.deb stable/main/binary-i386/libapache-mod-php5_5.2.0-8+etch13_i386.deb stable/main/binary-i386/php5-ldap_5.2.0-8+etch13_i386.deb stable/main/binary-i386/php5-odbc_5.2.0-8+etch13_i386.deb stable/main/binary-i386/php5-pgsql_5.2.0-8+etch13_i386.deb stable/main/binary-i386/php5-tidy_5.2.0-8+etch13_i386.deb stable/main/binary-i386/php5-interbase_5.2.0-8+etch13_i386.deb stable/main/binary-i386/php5-gd_5.2.0-8+etch13_i386.deb stable/main/binary-i386/php5-imap_5.2.0-8+etch13_i386.deb stable/main/binary-i386/libapache2-mod-php5_5.2.0-8+etch13_i386.deb stable/main/binary-i386/php5-sybase_5.2.0-8+etch13_i386.deb stable/main/binary-i386/php5-common_5.2.0-8+etch13_i386.deb stable/main/binary-i386/php5-xmlrpc_5.2.0-8+etch13_i386.deb stable/main/binary-i386/php5-dev_5.2.0-8+etch13_i386.deb stable/main/binary-i386/php5-xsl_5.2.0-8+etch13_i386.deb stable/main/binary-i386/php5-cli_5.2.0-8+etch13_i386.deb stable/main/binary-i386/php5-sqlite_5.2.0-8+etch13_i386.deb stable/main/binary-i386/php5-mcrypt_5.2.0-8+etch13_i386.deb stable/main/binary-i386/php5-snmp_5.2.0-8+etch13_i386.deb stable/main/binary-i386/php5-mhash_5.2.0-8+etch13_i386.deb stable/main/binary-i386/php5-cgi_5.2.0-8+etch13_i386.deb stable/main/binary-i386/php5-curl_5.2.0-8+etch13_i386.deb stable/main/binary-i386/php5-pspell_5.2.0-8+etch13_i386.deb stable/main/binary-i386/php5-recode_5.2.0-8+etch13_i386.deb php5 (5.2.0-8+etch13) stable-security; urgency=high * Upload to etch for security issues * The following security issues are addressed with this update: - CVE-2008-3658: Buffer overflow in the imageloadfont function. Patch: 140-CVE-2008-3658.patch (closes: #499989) - CVE-2008-3659: Buffer overflow in the memnstr function. Patch: 139-CVE-2008-3659.patch (closes: #499988) - CVE-2008-3660: Remote DoS in fastcgi module Patch: CVE-2008-3660.patch (closes: #499987) * Revert previous security patch for CVE-2008-2829. A fix for this will not be possible without an updated version of the UW c-client libraries. stable/main/binary-hppa/php5-cgi_5.2.0-8+etch13_hppa.deb stable/main/binary-hppa/php5-curl_5.2.0-8+etch13_hppa.deb stable/main/binary-hppa/php5-gd_5.2.0-8+etch13_hppa.deb stable/main/binary-hppa/php5-pspell_5.2.0-8+etch13_hppa.deb stable/main/binary-hppa/php5-cli_5.2.0-8+etch13_hppa.deb stable/main/binary-hppa/php5-tidy_5.2.0-8+etch13_hppa.deb stable/main/binary-hppa/php5-common_5.2.0-8+etch13_hppa.deb stable/main/binary-hppa/php5-mcrypt_5.2.0-8+etch13_hppa.deb stable/main/binary-hppa/php5-imap_5.2.0-8+etch13_hppa.deb stable/main/binary-hppa/php5-dev_5.2.0-8+etch13_hppa.deb stable/main/binary-hppa/php5-mysql_5.2.0-8+etch13_hppa.deb stable/main/binary-hppa/php5-odbc_5.2.0-8+etch13_hppa.deb stable/main/binary-hppa/php5-snmp_5.2.0-8+etch13_hppa.deb stable/main/binary-hppa/php5-sqlite_5.2.0-8+etch13_hppa.deb stable/main/binary-hppa/php5-xmlrpc_5.2.0-8+etch13_hppa.deb stable/main/binary-hppa/php5-recode_5.2.0-8+etch13_hppa.deb stable/main/binary-hppa/libapache-mod-php5_5.2.0-8+etch13_hppa.deb stable/main/binary-hppa/libapache2-mod-php5_5.2.0-8+etch13_hppa.deb stable/main/binary-hppa/php5-mhash_5.2.0-8+etch13_hppa.deb stable/main/binary-hppa/php5-pgsql_5.2.0-8+etch13_hppa.deb stable/main/binary-hppa/php5-ldap_5.2.0-8+etch13_hppa.deb stable/main/binary-hppa/php5-xsl_5.2.0-8+etch13_hppa.deb stable/main/binary-hppa/php5-sybase_5.2.0-8+etch13_hppa.deb php5 (5.2.0-8+etch13) stable-security; urgency=high * Upload to etch for security issues * The following security issues are addressed with this update: - CVE-2008-3658: Buffer overflow in the imageloadfont function. Patch: 140-CVE-2008-3658.patch (closes: #499989) - CVE-2008-3659: Buffer overflow in the memnstr function. Patch: 139-CVE-2008-3659.patch (closes: #499988) - CVE-2008-3660: Remote DoS in fastcgi module Patch: CVE-2008-3660.patch (closes: #499987) * Revert previous security patch for CVE-2008-2829. A fix for this will not be possible without an updated version of the UW c-client libraries. stable/main/binary-arm/php5-dev_5.2.0-8+etch13_arm.deb stable/main/binary-arm/php5-snmp_5.2.0-8+etch13_arm.deb stable/main/binary-arm/php5-sqlite_5.2.0-8+etch13_arm.deb stable/main/binary-arm/php5-mysql_5.2.0-8+etch13_arm.deb stable/main/binary-arm/libapache2-mod-php5_5.2.0-8+etch13_arm.deb stable/main/binary-arm/php5-curl_5.2.0-8+etch13_arm.deb stable/main/binary-arm/php5-pgsql_5.2.0-8+etch13_arm.deb stable/main/binary-arm/php5-mhash_5.2.0-8+etch13_arm.deb stable/main/binary-arm/libapache-mod-php5_5.2.0-8+etch13_arm.deb stable/main/binary-arm/php5-pspell_5.2.0-8+etch13_arm.deb stable/main/binary-arm/php5-mcrypt_5.2.0-8+etch13_arm.deb stable/main/binary-arm/php5-cgi_5.2.0-8+etch13_arm.deb stable/main/binary-arm/php5-sybase_5.2.0-8+etch13_arm.deb stable/main/binary-arm/php5-xsl_5.2.0-8+etch13_arm.deb stable/main/binary-arm/php5-gd_5.2.0-8+etch13_arm.deb stable/main/binary-arm/php5-xmlrpc_5.2.0-8+etch13_arm.deb stable/main/binary-arm/php5-ldap_5.2.0-8+etch13_arm.deb stable/main/binary-arm/php5-cli_5.2.0-8+etch13_arm.deb stable/main/binary-arm/php5-recode_5.2.0-8+etch13_arm.deb stable/main/binary-arm/php5-tidy_5.2.0-8+etch13_arm.deb stable/main/binary-arm/php5-imap_5.2.0-8+etch13_arm.deb stable/main/binary-arm/php5-odbc_5.2.0-8+etch13_arm.deb stable/main/binary-arm/php5-common_5.2.0-8+etch13_arm.deb php5 (5.2.0-8+etch13) stable-security; urgency=high * Upload to etch for security issues * The following security issues are addressed with this update: - CVE-2008-3658: Buffer overflow in the imageloadfont function. Patch: 140-CVE-2008-3658.patch (closes: #499989) - CVE-2008-3659: Buffer overflow in the memnstr function. Patch: 139-CVE-2008-3659.patch (closes: #499988) - CVE-2008-3660: Remote DoS in fastcgi module Patch: CVE-2008-3660.patch (closes: #499987) * Revert previous security patch for CVE-2008-2829. A fix for this will not be possible without an updated version of the UW c-client libraries. stable/main/binary-alpha/php5-dev_5.2.0-8+etch13_alpha.deb stable/main/binary-alpha/php5-tidy_5.2.0-8+etch13_alpha.deb stable/main/binary-alpha/php5-xmlrpc_5.2.0-8+etch13_alpha.deb stable/main/binary-alpha/php5-ldap_5.2.0-8+etch13_alpha.deb stable/main/binary-alpha/php5-mysql_5.2.0-8+etch13_alpha.deb stable/main/binary-alpha/php5-mhash_5.2.0-8+etch13_alpha.deb stable/main/binary-alpha/php5-pspell_5.2.0-8+etch13_alpha.deb stable/main/binary-alpha/php5-pgsql_5.2.0-8+etch13_alpha.deb stable/main/binary-alpha/php5-cgi_5.2.0-8+etch13_alpha.deb stable/main/binary-alpha/libapache-mod-php5_5.2.0-8+etch13_alpha.deb stable/main/binary-alpha/php5-xsl_5.2.0-8+etch13_alpha.deb stable/main/binary-alpha/php5-gd_5.2.0-8+etch13_alpha.deb stable/main/binary-alpha/php5-imap_5.2.0-8+etch13_alpha.deb stable/main/binary-alpha/php5-snmp_5.2.0-8+etch13_alpha.deb stable/main/binary-alpha/php5-recode_5.2.0-8+etch13_alpha.deb stable/main/binary-alpha/php5-sqlite_5.2.0-8+etch13_alpha.deb stable/main/binary-alpha/php5-sybase_5.2.0-8+etch13_alpha.deb stable/main/binary-alpha/php5-mcrypt_5.2.0-8+etch13_alpha.deb stable/main/binary-alpha/php5-curl_5.2.0-8+etch13_alpha.deb stable/main/binary-alpha/php5-cli_5.2.0-8+etch13_alpha.deb stable/main/binary-alpha/libapache2-mod-php5_5.2.0-8+etch13_alpha.deb stable/main/binary-alpha/php5-odbc_5.2.0-8+etch13_alpha.deb stable/main/binary-alpha/php5-common_5.2.0-8+etch13_alpha.deb php5 (5.2.0-8+etch13) stable-security; urgency=high * Upload to etch for security issues * The following security issues are addressed with this update: - CVE-2008-3658: Buffer overflow in the imageloadfont function. Patch: 140-CVE-2008-3658.patch (closes: #499989) - CVE-2008-3659: Buffer overflow in the memnstr function. Patch: 139-CVE-2008-3659.patch (closes: #499988) - CVE-2008-3660: Remote DoS in fastcgi module Patch: CVE-2008-3660.patch (closes: #499987) * Revert previous security patch for CVE-2008-2829. A fix for this will not be possible without an updated version of the UW c-client libraries. stable/main/binary-amd64/libapache2-mod-php5_5.2.0-8+etch13_amd64.deb stable/main/binary-amd64/php5-common_5.2.0-8+etch13_amd64.deb stable/main/binary-amd64/php5-curl_5.2.0-8+etch13_amd64.deb stable/main/binary-amd64/php5-mhash_5.2.0-8+etch13_amd64.deb stable/main/binary-amd64/php5-tidy_5.2.0-8+etch13_amd64.deb stable/main/binary-all/php-pear_5.2.0-8+etch13_all.deb stable/main/binary-amd64/php5-imap_5.2.0-8+etch13_amd64.deb stable/main/binary-amd64/php5-sqlite_5.2.0-8+etch13_amd64.deb stable/main/binary-amd64/php5-snmp_5.2.0-8+etch13_amd64.deb stable/main/source/php5_5.2.0-8+etch13.dsc stable/main/binary-amd64/php5-dev_5.2.0-8+etch13_amd64.deb stable/main/binary-amd64/php5-cgi_5.2.0-8+etch13_amd64.deb stable/main/binary-amd64/php5-xsl_5.2.0-8+etch13_amd64.deb stable/main/binary-amd64/php5-gd_5.2.0-8+etch13_amd64.deb stable/main/binary-amd64/php5-sybase_5.2.0-8+etch13_amd64.deb stable/main/binary-amd64/php5-ldap_5.2.0-8+etch13_amd64.deb stable/main/source/php5_5.2.0-8+etch13.diff.gz stable/main/binary-amd64/php5-mcrypt_5.2.0-8+etch13_amd64.deb stable/main/binary-amd64/php5-xmlrpc_5.2.0-8+etch13_amd64.deb stable/main/binary-amd64/php5-cli_5.2.0-8+etch13_amd64.deb stable/main/binary-amd64/libapache-mod-php5_5.2.0-8+etch13_amd64.deb stable/main/binary-amd64/php5-pspell_5.2.0-8+etch13_amd64.deb stable/main/binary-amd64/php5-recode_5.2.0-8+etch13_amd64.deb stable/main/binary-amd64/php5-odbc_5.2.0-8+etch13_amd64.deb stable/main/binary-amd64/php5-interbase_5.2.0-8+etch13_amd64.deb stable/main/binary-amd64/php5-mysql_5.2.0-8+etch13_amd64.deb stable/main/binary-all/php5_5.2.0-8+etch13_all.deb stable/main/binary-amd64/php5-pgsql_5.2.0-8+etch13_amd64.deb php5 (5.2.0-8+etch13) stable-security; urgency=high * Upload to etch for security issues * The following security issues are addressed with this update: - CVE-2008-3658: Buffer overflow in the imageloadfont function. Patch: 140-CVE-2008-3658.patch (closes: #499989) - CVE-2008-3659: Buffer overflow in the memnstr function. Patch: 139-CVE-2008-3659.patch (closes: #499988) - CVE-2008-3660: Remote DoS in fastcgi module Patch: CVE-2008-3660.patch (closes: #499987) * Revert previous security patch for CVE-2008-2829. A fix for this will not be possible without an updated version of the UW c-client libraries. stable/main/binary-sparc/pdns-backend-mysql_2.9.20-8+etch1_sparc.deb stable/main/binary-sparc/pdns-backend-geo_2.9.20-8+etch1_sparc.deb stable/main/binary-sparc/pdns-server_2.9.20-8+etch1_sparc.deb stable/main/binary-sparc/pdns-backend-pgsql_2.9.20-8+etch1_sparc.deb stable/main/binary-sparc/pdns-backend-sqlite_2.9.20-8+etch1_sparc.deb stable/main/binary-sparc/pdns-backend-ldap_2.9.20-8+etch1_sparc.deb stable/main/binary-sparc/pdns-backend-pipe_2.9.20-8+etch1_sparc.deb pdns (2.9.20-8+etch1) stable-security; urgency=high * Fixes security issue CVE-2008-3337 as announced in http://mailman.powerdns.com/pipermail/pdns-announce/2008-August/000094.html stable/main/binary-s390/pdns-backend-mysql_2.9.20-8+etch1_s390.deb stable/main/binary-s390/pdns-backend-pipe_2.9.20-8+etch1_s390.deb stable/main/binary-s390/pdns-server_2.9.20-8+etch1_s390.deb stable/main/binary-s390/pdns-backend-pgsql_2.9.20-8+etch1_s390.deb stable/main/binary-s390/pdns-backend-sqlite_2.9.20-8+etch1_s390.deb stable/main/binary-s390/pdns-backend-geo_2.9.20-8+etch1_s390.deb stable/main/binary-s390/pdns-backend-ldap_2.9.20-8+etch1_s390.deb pdns (2.9.20-8+etch1) stable-security; urgency=high * Fixes security issue CVE-2008-3337 as announced in http://mailman.powerdns.com/pipermail/pdns-announce/2008-August/000094.html stable/main/binary-powerpc/pdns-server_2.9.20-8+etch1_powerpc.deb stable/main/binary-powerpc/pdns-backend-pipe_2.9.20-8+etch1_powerpc.deb stable/main/binary-powerpc/pdns-backend-ldap_2.9.20-8+etch1_powerpc.deb stable/main/binary-powerpc/pdns-backend-mysql_2.9.20-8+etch1_powerpc.deb stable/main/binary-powerpc/pdns-backend-pgsql_2.9.20-8+etch1_powerpc.deb stable/main/binary-powerpc/pdns-backend-sqlite_2.9.20-8+etch1_powerpc.deb stable/main/binary-powerpc/pdns-backend-geo_2.9.20-8+etch1_powerpc.deb pdns (2.9.20-8+etch1) stable-security; urgency=high * Fixes security issue CVE-2008-3337 as announced in http://mailman.powerdns.com/pipermail/pdns-announce/2008-August/000094.html stable/main/binary-mipsel/pdns-backend-sqlite_2.9.20-8+etch1_mipsel.deb stable/main/binary-mipsel/pdns-backend-pgsql_2.9.20-8+etch1_mipsel.deb stable/main/binary-mipsel/pdns-backend-geo_2.9.20-8+etch1_mipsel.deb stable/main/binary-mipsel/pdns-backend-pipe_2.9.20-8+etch1_mipsel.deb stable/main/binary-mipsel/pdns-backend-ldap_2.9.20-8+etch1_mipsel.deb stable/main/binary-mipsel/pdns-backend-mysql_2.9.20-8+etch1_mipsel.deb stable/main/binary-mipsel/pdns-server_2.9.20-8+etch1_mipsel.deb pdns (2.9.20-8+etch1) stable-security; urgency=high * Fixes security issue CVE-2008-3337 as announced in http://mailman.powerdns.com/pipermail/pdns-announce/2008-August/000094.html stable/main/binary-mips/pdns-backend-pgsql_2.9.20-8+etch1_mips.deb stable/main/binary-mips/pdns-backend-pipe_2.9.20-8+etch1_mips.deb stable/main/binary-mips/pdns-backend-sqlite_2.9.20-8+etch1_mips.deb stable/main/binary-mips/pdns-backend-geo_2.9.20-8+etch1_mips.deb stable/main/binary-mips/pdns-server_2.9.20-8+etch1_mips.deb stable/main/binary-mips/pdns-backend-ldap_2.9.20-8+etch1_mips.deb stable/main/binary-mips/pdns-backend-mysql_2.9.20-8+etch1_mips.deb pdns (2.9.20-8+etch1) stable-security; urgency=high * Fixes security issue CVE-2008-3337 as announced in http://mailman.powerdns.com/pipermail/pdns-announce/2008-August/000094.html stable/main/binary-ia64/pdns-backend-geo_2.9.20-8+etch1_ia64.deb stable/main/binary-ia64/pdns-backend-mysql_2.9.20-8+etch1_ia64.deb stable/main/binary-ia64/pdns-backend-pipe_2.9.20-8+etch1_ia64.deb stable/main/binary-ia64/pdns-server_2.9.20-8+etch1_ia64.deb stable/main/binary-ia64/pdns-backend-pgsql_2.9.20-8+etch1_ia64.deb stable/main/binary-ia64/pdns-backend-sqlite_2.9.20-8+etch1_ia64.deb stable/main/binary-ia64/pdns-backend-ldap_2.9.20-8+etch1_ia64.deb pdns (2.9.20-8+etch1) stable-security; urgency=high * Fixes security issue CVE-2008-3337 as announced in http://mailman.powerdns.com/pipermail/pdns-announce/2008-August/000094.html stable/main/binary-hppa/pdns-backend-mysql_2.9.20-8+etch1_hppa.deb stable/main/binary-hppa/pdns-backend-pgsql_2.9.20-8+etch1_hppa.deb stable/main/binary-hppa/pdns-server_2.9.20-8+etch1_hppa.deb stable/main/binary-hppa/pdns-backend-geo_2.9.20-8+etch1_hppa.deb stable/main/binary-hppa/pdns-backend-pipe_2.9.20-8+etch1_hppa.deb stable/main/binary-hppa/pdns-backend-sqlite_2.9.20-8+etch1_hppa.deb stable/main/binary-hppa/pdns-backend-ldap_2.9.20-8+etch1_hppa.deb pdns (2.9.20-8+etch1) stable-security; urgency=high * Fixes security issue CVE-2008-3337 as announced in http://mailman.powerdns.com/pipermail/pdns-announce/2008-August/000094.html stable/main/binary-arm/pdns-backend-sqlite_2.9.20-8+etch1_arm.deb stable/main/binary-arm/pdns-backend-pipe_2.9.20-8+etch1_arm.deb stable/main/binary-arm/pdns-backend-ldap_2.9.20-8+etch1_arm.deb stable/main/binary-arm/pdns-backend-geo_2.9.20-8+etch1_arm.deb stable/main/binary-arm/pdns-backend-mysql_2.9.20-8+etch1_arm.deb stable/main/binary-arm/pdns-backend-pgsql_2.9.20-8+etch1_arm.deb stable/main/binary-arm/pdns-server_2.9.20-8+etch1_arm.deb pdns (2.9.20-8+etch1) stable-security; urgency=high * Fixes security issue CVE-2008-3337 as announced in http://mailman.powerdns.com/pipermail/pdns-announce/2008-August/000094.html stable/main/binary-amd64/pdns-backend-geo_2.9.20-8+etch1_amd64.deb stable/main/binary-amd64/pdns-backend-sqlite_2.9.20-8+etch1_amd64.deb stable/main/binary-amd64/pdns-backend-pgsql_2.9.20-8+etch1_amd64.deb stable/main/binary-amd64/pdns-backend-pipe_2.9.20-8+etch1_amd64.deb stable/main/binary-amd64/pdns-backend-ldap_2.9.20-8+etch1_amd64.deb stable/main/binary-amd64/pdns-server_2.9.20-8+etch1_amd64.deb stable/main/binary-amd64/pdns-backend-mysql_2.9.20-8+etch1_amd64.deb pdns (2.9.20-8+etch1) stable-security; urgency=high * Fixes security issue CVE-2008-3337 as announced in http://mailman.powerdns.com/pipermail/pdns-announce/2008-August/000094.html stable/main/binary-alpha/pdns-backend-ldap_2.9.20-8+etch1_alpha.deb stable/main/binary-alpha/pdns-backend-sqlite_2.9.20-8+etch1_alpha.deb stable/main/binary-alpha/pdns-backend-pgsql_2.9.20-8+etch1_alpha.deb stable/main/binary-alpha/pdns-backend-mysql_2.9.20-8+etch1_alpha.deb stable/main/binary-alpha/pdns-backend-geo_2.9.20-8+etch1_alpha.deb stable/main/binary-alpha/pdns-backend-pipe_2.9.20-8+etch1_alpha.deb stable/main/binary-alpha/pdns-server_2.9.20-8+etch1_alpha.deb pdns (2.9.20-8+etch1) stable-security; urgency=high * Fixes security issue CVE-2008-3337 as announced in http://mailman.powerdns.com/pipermail/pdns-announce/2008-August/000094.html stable/main/source/pdns_2.9.20-8+etch1.dsc stable/main/binary-all/pdns_2.9.20-8+etch1_all.deb stable/main/binary-i386/pdns-server_2.9.20-8+etch1_i386.deb stable/main/binary-i386/pdns-backend-pgsql_2.9.20-8+etch1_i386.deb stable/main/binary-i386/pdns-backend-mysql_2.9.20-8+etch1_i386.deb stable/main/binary-i386/pdns-backend-ldap_2.9.20-8+etch1_i386.deb stable/main/binary-i386/pdns-backend-sqlite_2.9.20-8+etch1_i386.deb stable/main/binary-i386/pdns-backend-pipe_2.9.20-8+etch1_i386.deb stable/main/binary-i386/pdns-backend-geo_2.9.20-8+etch1_i386.deb stable/main/source/pdns_2.9.20-8+etch1.diff.gz stable/main/binary-all/pdns-doc_2.9.20-8+etch1_all.deb pdns (2.9.20-8+etch1) stable-security; urgency=high * Fixes security issue CVE-2008-3337 as announced in http://mailman.powerdns.com/pipermail/pdns-announce/2008-August/000094.html stable/main/binary-sparc/openssh-server_4.3p2-9etch3_sparc.deb stable/main/binary-sparc/openssh-client-udeb_4.3p2-9etch3_sparc.udeb stable/main/binary-sparc/openssh-client_4.3p2-9etch3_sparc.deb stable/main/binary-sparc/ssh-askpass-gnome_4.3p2-9etch3_sparc.deb stable/main/binary-sparc/openssh-server-udeb_4.3p2-9etch3_sparc.udeb openssh (1:4.3p2-9etch3) stable-security; urgency=high * Fix incomplete patch for CVE-2006-5051 by completely removing logging from the signal handler. stable/main/binary-s390/openssh-server_4.3p2-9etch3_s390.deb stable/main/binary-s390/openssh-client-udeb_4.3p2-9etch3_s390.udeb stable/main/binary-s390/ssh-askpass-gnome_4.3p2-9etch3_s390.deb stable/main/binary-s390/openssh-client_4.3p2-9etch3_s390.deb stable/main/binary-s390/openssh-server-udeb_4.3p2-9etch3_s390.udeb openssh (1:4.3p2-9etch3) stable-security; urgency=high * Fix incomplete patch for CVE-2006-5051 by completely removing logging from the signal handler. stable/main/binary-powerpc/openssh-client-udeb_4.3p2-9etch3_powerpc.udeb stable/main/binary-powerpc/openssh-server_4.3p2-9etch3_powerpc.deb stable/main/binary-powerpc/openssh-server-udeb_4.3p2-9etch3_powerpc.udeb stable/main/binary-powerpc/openssh-client_4.3p2-9etch3_powerpc.deb stable/main/binary-powerpc/ssh-askpass-gnome_4.3p2-9etch3_powerpc.deb openssh (1:4.3p2-9etch3) stable-security; urgency=high * Fix incomplete patch for CVE-2006-5051 by completely removing logging from the signal handler. stable/main/binary-mipsel/openssh-server_4.3p2-9etch3_mipsel.deb stable/main/binary-mipsel/openssh-client_4.3p2-9etch3_mipsel.deb stable/main/binary-mipsel/openssh-client-udeb_4.3p2-9etch3_mipsel.udeb stable/main/binary-mipsel/ssh-askpass-gnome_4.3p2-9etch3_mipsel.deb stable/main/binary-mipsel/openssh-server-udeb_4.3p2-9etch3_mipsel.udeb openssh (1:4.3p2-9etch3) stable-security; urgency=high * Fix incomplete patch for CVE-2006-5051 by completely removing logging from the signal handler. stable/main/binary-mips/openssh-client_4.3p2-9etch3_mips.deb stable/main/binary-mips/openssh-client-udeb_4.3p2-9etch3_mips.udeb stable/main/binary-mips/openssh-server_4.3p2-9etch3_mips.deb stable/main/binary-mips/openssh-server-udeb_4.3p2-9etch3_mips.udeb stable/main/binary-mips/ssh-askpass-gnome_4.3p2-9etch3_mips.deb openssh (1:4.3p2-9etch3) stable-security; urgency=high * Fix incomplete patch for CVE-2006-5051 by completely removing logging from the signal handler. stable/main/binary-ia64/openssh-server_4.3p2-9etch3_ia64.deb stable/main/binary-ia64/openssh-client_4.3p2-9etch3_ia64.deb stable/main/binary-ia64/openssh-client-udeb_4.3p2-9etch3_ia64.udeb stable/main/binary-ia64/ssh-askpass-gnome_4.3p2-9etch3_ia64.deb stable/main/binary-ia64/openssh-server-udeb_4.3p2-9etch3_ia64.udeb openssh (1:4.3p2-9etch3) stable-security; urgency=high * Fix incomplete patch for CVE-2006-5051 by completely removing logging from the signal handler. stable/main/binary-i386/ssh-askpass-gnome_4.3p2-9etch3_i386.deb stable/main/binary-i386/openssh-server_4.3p2-9etch3_i386.deb stable/main/binary-i386/openssh-client-udeb_4.3p2-9etch3_i386.udeb stable/main/binary-i386/openssh-client_4.3p2-9etch3_i386.deb stable/main/binary-i386/openssh-server-udeb_4.3p2-9etch3_i386.udeb openssh (1:4.3p2-9etch3) stable-security; urgency=high * Fix incomplete patch for CVE-2006-5051 by completely removing logging from the signal handler. stable/main/binary-hppa/openssh-client_4.3p2-9etch3_hppa.deb stable/main/binary-hppa/openssh-client-udeb_4.3p2-9etch3_hppa.udeb stable/main/binary-hppa/openssh-server_4.3p2-9etch3_hppa.deb stable/main/binary-hppa/openssh-server-udeb_4.3p2-9etch3_hppa.udeb stable/main/binary-hppa/ssh-askpass-gnome_4.3p2-9etch3_hppa.deb openssh (1:4.3p2-9etch3) stable-security; urgency=high * Fix incomplete patch for CVE-2006-5051 by completely removing logging from the signal handler. stable/main/binary-arm/openssh-client_4.3p2-9etch3_arm.deb stable/main/binary-arm/ssh-askpass-gnome_4.3p2-9etch3_arm.deb stable/main/binary-arm/openssh-client-udeb_4.3p2-9etch3_arm.udeb stable/main/binary-arm/openssh-server_4.3p2-9etch3_arm.deb stable/main/binary-arm/openssh-server-udeb_4.3p2-9etch3_arm.udeb openssh (1:4.3p2-9etch3) stable-security; urgency=high * Fix incomplete patch for CVE-2006-5051 by completely removing logging from the signal handler. stable/main/binary-alpha/openssh-client_4.3p2-9etch3_alpha.deb stable/main/binary-alpha/ssh-askpass-gnome_4.3p2-9etch3_alpha.deb stable/main/binary-alpha/openssh-server-udeb_4.3p2-9etch3_alpha.udeb stable/main/binary-alpha/openssh-server_4.3p2-9etch3_alpha.deb stable/main/binary-alpha/openssh-client-udeb_4.3p2-9etch3_alpha.udeb openssh (1:4.3p2-9etch3) stable-security; urgency=high * Fix incomplete patch for CVE-2006-5051 by completely removing logging from the signal handler. stable/main/source/openssh_4.3p2-9etch3.dsc stable/main/binary-all/ssh-krb5_4.3p2-9etch3_all.deb stable/main/binary-amd64/openssh-server_4.3p2-9etch3_amd64.deb stable/main/binary-amd64/openssh-client_4.3p2-9etch3_amd64.deb stable/main/binary-amd64/ssh-askpass-gnome_4.3p2-9etch3_amd64.deb stable/main/source/openssh_4.3p2-9etch3.diff.gz stable/main/binary-all/ssh_4.3p2-9etch3_all.deb stable/main/binary-amd64/openssh-server-udeb_4.3p2-9etch3_amd64.udeb stable/main/binary-amd64/openssh-client-udeb_4.3p2-9etch3_amd64.udeb openssh (1:4.3p2-9etch3) stable-security; urgency=high * Fix incomplete patch for CVE-2006-5051 by completely removing logging from the signal handler. stable/main/binary-sparc/libopensc2_0.11.1-2etch2_sparc.deb stable/main/binary-sparc/libopensc2-dev_0.11.1-2etch2_sparc.deb stable/main/binary-sparc/libopensc2-dbg_0.11.1-2etch2_sparc.deb stable/main/binary-sparc/opensc_0.11.1-2etch2_sparc.deb stable/main/binary-sparc/mozilla-opensc_0.11.1-2etch2_sparc.deb opensc (0.11.1-2etch2) stable-security; urgency=critical * src/tools/pkcs15-tool.c: Small fix to the previous security vulnerability to remove a strict check for the default card label. stable/main/binary-s390/libopensc2_0.11.1-2etch2_s390.deb stable/main/binary-s390/opensc_0.11.1-2etch2_s390.deb stable/main/binary-s390/mozilla-opensc_0.11.1-2etch2_s390.deb stable/main/binary-s390/libopensc2-dev_0.11.1-2etch2_s390.deb stable/main/binary-s390/libopensc2-dbg_0.11.1-2etch2_s390.deb opensc (0.11.1-2etch2) stable-security; urgency=critical * src/tools/pkcs15-tool.c: Small fix to the previous security vulnerability to remove a strict check for the default card label. stable/main/binary-powerpc/libopensc2-dev_0.11.1-2etch2_powerpc.deb stable/main/binary-powerpc/libopensc2-dbg_0.11.1-2etch2_powerpc.deb stable/main/binary-powerpc/libopensc2_0.11.1-2etch2_powerpc.deb stable/main/binary-powerpc/opensc_0.11.1-2etch2_powerpc.deb stable/main/binary-powerpc/mozilla-opensc_0.11.1-2etch2_powerpc.deb opensc (0.11.1-2etch2) stable-security; urgency=critical * src/tools/pkcs15-tool.c: Small fix to the previous security vulnerability to remove a strict check for the default card label. stable/main/binary-mipsel/libopensc2_0.11.1-2etch2_mipsel.deb stable/main/binary-mipsel/opensc_0.11.1-2etch2_mipsel.deb stable/main/binary-mipsel/libopensc2-dev_0.11.1-2etch2_mipsel.deb stable/main/binary-mipsel/libopensc2-dbg_0.11.1-2etch2_mipsel.deb stable/main/binary-mipsel/mozilla-opensc_0.11.1-2etch2_mipsel.deb opensc (0.11.1-2etch2) stable-security; urgency=critical * src/tools/pkcs15-tool.c: Small fix to the previous security vulnerability to remove a strict check for the default card label. stable/main/binary-mips/libopensc2_0.11.1-2etch2_mips.deb stable/main/binary-mips/mozilla-opensc_0.11.1-2etch2_mips.deb stable/main/binary-mips/opensc_0.11.1-2etch2_mips.deb stable/main/binary-mips/libopensc2-dev_0.11.1-2etch2_mips.deb stable/main/binary-mips/libopensc2-dbg_0.11.1-2etch2_mips.deb opensc (0.11.1-2etch2) stable-security; urgency=critical * src/tools/pkcs15-tool.c: Small fix to the previous security vulnerability to remove a strict check for the default card label. stable/main/binary-ia64/libopensc2-dev_0.11.1-2etch2_ia64.deb stable/main/binary-ia64/opensc_0.11.1-2etch2_ia64.deb stable/main/binary-ia64/libopensc2-dbg_0.11.1-2etch2_ia64.deb stable/main/binary-ia64/libopensc2_0.11.1-2etch2_ia64.deb stable/main/binary-ia64/mozilla-opensc_0.11.1-2etch2_ia64.deb opensc (0.11.1-2etch2) stable-security; urgency=critical * src/tools/pkcs15-tool.c: Small fix to the previous security vulnerability to remove a strict check for the default card label. stable/main/binary-i386/libopensc2-dev_0.11.1-2etch2_i386.deb stable/main/binary-i386/libopensc2_0.11.1-2etch2_i386.deb stable/main/binary-i386/mozilla-opensc_0.11.1-2etch2_i386.deb stable/main/binary-i386/opensc_0.11.1-2etch2_i386.deb stable/main/binary-i386/libopensc2-dbg_0.11.1-2etch2_i386.deb opensc (0.11.1-2etch2) stable-security; urgency=critical * src/tools/pkcs15-tool.c: Small fix to the previous security vulnerability to remove a strict check for the default card label. stable/main/binary-hppa/libopensc2_0.11.1-2etch2_hppa.deb stable/main/binary-hppa/mozilla-opensc_0.11.1-2etch2_hppa.deb stable/main/binary-hppa/libopensc2-dev_0.11.1-2etch2_hppa.deb stable/main/binary-hppa/libopensc2-dbg_0.11.1-2etch2_hppa.deb stable/main/binary-hppa/opensc_0.11.1-2etch2_hppa.deb opensc (0.11.1-2etch2) stable-security; urgency=critical * src/tools/pkcs15-tool.c: Small fix to the previous security vulnerability to remove a strict check for the default card label. stable/main/binary-arm/libopensc2-dev_0.11.1-2etch2_arm.deb stable/main/binary-arm/libopensc2_0.11.1-2etch2_arm.deb stable/main/binary-arm/opensc_0.11.1-2etch2_arm.deb stable/main/binary-arm/libopensc2-dbg_0.11.1-2etch2_arm.deb stable/main/binary-arm/mozilla-opensc_0.11.1-2etch2_arm.deb opensc (0.11.1-2etch2) stable-security; urgency=critical * src/tools/pkcs15-tool.c: Small fix to the previous security vulnerability to remove a strict check for the default card label. stable/main/binary-alpha/opensc_0.11.1-2etch2_alpha.deb stable/main/binary-alpha/mozilla-opensc_0.11.1-2etch2_alpha.deb stable/main/binary-alpha/libopensc2-dev_0.11.1-2etch2_alpha.deb stable/main/binary-alpha/libopensc2-dbg_0.11.1-2etch2_alpha.deb stable/main/binary-alpha/libopensc2_0.11.1-2etch2_alpha.deb opensc (0.11.1-2etch2) stable-security; urgency=critical * src/tools/pkcs15-tool.c: Small fix to the previous security vulnerability to remove a strict check for the default card label. stable/main/binary-amd64/libopensc2_0.11.1-2etch2_amd64.deb stable/main/binary-amd64/opensc_0.11.1-2etch2_amd64.deb stable/main/binary-amd64/libopensc2-dbg_0.11.1-2etch2_amd64.deb stable/main/binary-amd64/mozilla-opensc_0.11.1-2etch2_amd64.deb stable/main/source/opensc_0.11.1-2etch2.diff.gz stable/main/binary-amd64/libopensc2-dev_0.11.1-2etch2_amd64.deb stable/main/source/opensc_0.11.1-2etch2.dsc opensc (0.11.1-2etch2) stable-security; urgency=critical * src/tools/pkcs15-tool.c: Small fix to the previous security vulnerability to remove a strict check for the default card label. stable/main/binary-sparc/ldap-utils_2.3.30-5+etch2_sparc.deb stable/main/binary-sparc/libldap-2.3-0_2.3.30-5+etch2_sparc.deb stable/main/binary-sparc/slapd_2.3.30-5+etch2_sparc.deb openldap2.3 (2.3.30-5+etch2) stable-security; urgency=high * Non-maintainer upload by the Security Team * CVE-2008-2952 stable/main/binary-s390/ldap-utils_2.3.30-5+etch2_s390.deb stable/main/binary-s390/slapd_2.3.30-5+etch2_s390.deb stable/main/binary-s390/libldap-2.3-0_2.3.30-5+etch2_s390.deb openldap2.3 (2.3.30-5+etch2) stable-security; urgency=high * Non-maintainer upload by the Security Team * CVE-2008-2952 stable/main/binary-powerpc/slapd_2.3.30-5+etch2_powerpc.deb stable/main/binary-powerpc/ldap-utils_2.3.30-5+etch2_powerpc.deb stable/main/binary-powerpc/libldap-2.3-0_2.3.30-5+etch2_powerpc.deb openldap2.3 (2.3.30-5+etch2) stable-security; urgency=high * Non-maintainer upload by the Security Team * CVE-2008-2952 stable/main/binary-mipsel/slapd_2.3.30-5+etch2_mipsel.deb stable/main/binary-mipsel/libldap-2.3-0_2.3.30-5+etch2_mipsel.deb stable/main/binary-mipsel/ldap-utils_2.3.30-5+etch2_mipsel.deb openldap2.3 (2.3.30-5+etch2) stable-security; urgency=high * Non-maintainer upload by the Security Team * CVE-2008-2952 stable/main/binary-mips/slapd_2.3.30-5+etch2_mips.deb stable/main/binary-mips/ldap-utils_2.3.30-5+etch2_mips.deb stable/main/binary-mips/libldap-2.3-0_2.3.30-5+etch2_mips.deb openldap2.3 (2.3.30-5+etch2) stable-security; urgency=high * Non-maintainer upload by the Security Team * CVE-2008-2952 stable/main/binary-ia64/slapd_2.3.30-5+etch2_ia64.deb stable/main/binary-ia64/libldap-2.3-0_2.3.30-5+etch2_ia64.deb stable/main/binary-ia64/ldap-utils_2.3.30-5+etch2_ia64.deb openldap2.3 (2.3.30-5+etch2) stable-security; urgency=high * Non-maintainer upload by the Security Team * CVE-2008-2952 stable/main/binary-hppa/libldap-2.3-0_2.3.30-5+etch2_hppa.deb stable/main/binary-hppa/slapd_2.3.30-5+etch2_hppa.deb stable/main/binary-hppa/ldap-utils_2.3.30-5+etch2_hppa.deb openldap2.3 (2.3.30-5+etch2) stable-security; urgency=high * Non-maintainer upload by the Security Team * CVE-2008-2952 stable/main/binary-arm/libldap-2.3-0_2.3.30-5+etch2_arm.deb stable/main/binary-arm/ldap-utils_2.3.30-5+etch2_arm.deb stable/main/binary-arm/slapd_2.3.30-5+etch2_arm.deb openldap2.3 (2.3.30-5+etch2) stable-security; urgency=high * Non-maintainer upload by the Security Team * CVE-2008-2952 stable/main/binary-amd64/slapd_2.3.30-5+etch2_amd64.deb stable/main/binary-amd64/libldap-2.3-0_2.3.30-5+etch2_amd64.deb stable/main/binary-amd64/ldap-utils_2.3.30-5+etch2_amd64.deb openldap2.3 (2.3.30-5+etch2) stable-security; urgency=high * Non-maintainer upload by the Security Team * CVE-2008-2952 stable/main/binary-alpha/slapd_2.3.30-5+etch2_alpha.deb stable/main/binary-alpha/libldap-2.3-0_2.3.30-5+etch2_alpha.deb stable/main/binary-alpha/ldap-utils_2.3.30-5+etch2_alpha.deb openldap2.3 (2.3.30-5+etch2) stable-security; urgency=high * Non-maintainer upload by the Security Team * CVE-2008-2952 stable/main/binary-i386/libldap-2.3-0_2.3.30-5+etch2_i386.deb stable/main/binary-i386/ldap-utils_2.3.30-5+etch2_i386.deb stable/main/source/openldap2.3_2.3.30-5+etch2.dsc stable/main/source/openldap2.3_2.3.30-5+etch2.diff.gz stable/main/binary-i386/slapd_2.3.30-5+etch2_i386.deb openldap2.3 (2.3.30-5+etch2) stable-security; urgency=high * Non-maintainer upload by the Security Team * CVE-2008-2952 stable/main/binary-i386/libobby-0.4-0_0.4.1-2+b2_i386.deb stable/main/binary-i386/libobby-0.4-0-dbg_0.4.1-2+b2_i386.deb stable/main/binary-i386/libobby-0.4-dev_0.4.1-2+b2_i386.deb obby (0.4.1-2+b2) stable; urgency=low * Binary-only non-maintainer upload for i386; no source changes. * rebuild against net6 1.3.1-4 stable/main/binary-sparc/libobby-0.4-dev_0.4.1-2+b1_sparc.deb stable/main/binary-sparc/libobby-0.4-0_0.4.1-2+b1_sparc.deb stable/main/binary-sparc/libobby-0.4-0-dbg_0.4.1-2+b1_sparc.deb obby (0.4.1-2+b1) stable; urgency=low * Binary-only non-maintainer upload for sparc; no source changes. * rebuild against net6 1.3.1-4 stable/main/binary-s390/libobby-0.4-0-dbg_0.4.1-2+b1_s390.deb stable/main/binary-s390/libobby-0.4-dev_0.4.1-2+b1_s390.deb stable/main/binary-s390/libobby-0.4-0_0.4.1-2+b1_s390.deb obby (0.4.1-2+b1) stable; urgency=low * Binary-only non-maintainer upload for s390; no source changes. * rebuild against net6 1.3.1-4 stable/main/binary-powerpc/libobby-0.4-0_0.4.1-2+b1_powerpc.deb stable/main/binary-powerpc/libobby-0.4-0-dbg_0.4.1-2+b1_powerpc.deb stable/main/binary-powerpc/libobby-0.4-dev_0.4.1-2+b1_powerpc.deb obby (0.4.1-2+b1) stable; urgency=low * Binary-only non-maintainer upload for powerpc; no source changes. * rebuild against net6 1.3.1-4 stable/main/binary-mipsel/libobby-0.4-dev_0.4.1-2+b1_mipsel.deb stable/main/binary-mipsel/libobby-0.4-0-dbg_0.4.1-2+b1_mipsel.deb stable/main/binary-mipsel/libobby-0.4-0_0.4.1-2+b1_mipsel.deb obby (0.4.1-2+b1) stable; urgency=low * Binary-only non-maintainer upload for mipsel; no source changes. * rebuild against net6 1.3.1-4 stable/main/binary-mips/libobby-0.4-0-dbg_0.4.1-2+b1_mips.deb stable/main/binary-mips/libobby-0.4-dev_0.4.1-2+b1_mips.deb stable/main/binary-mips/libobby-0.4-0_0.4.1-2+b1_mips.deb obby (0.4.1-2+b1) stable; urgency=low * Binary-only non-maintainer upload for mips; no source changes. * rebuild against net6 1.3.1-4 stable/main/binary-ia64/libobby-0.4-0_0.4.1-2+b1_ia64.deb stable/main/binary-ia64/libobby-0.4-dev_0.4.1-2+b1_ia64.deb stable/main/binary-ia64/libobby-0.4-0-dbg_0.4.1-2+b1_ia64.deb obby (0.4.1-2+b1) stable; urgency=low * Binary-only non-maintainer upload for ia64; no source changes. * rebuild against net6 1.3.1-4 stable/main/binary-hppa/libobby-0.4-dev_0.4.1-2+b1_hppa.deb stable/main/binary-hppa/libobby-0.4-0-dbg_0.4.1-2+b1_hppa.deb stable/main/binary-hppa/libobby-0.4-0_0.4.1-2+b1_hppa.deb obby (0.4.1-2+b1) stable; urgency=low * Binary-only non-maintainer upload for hppa; no source changes. * rebuild against net6 1.3.1-4 stable/main/binary-arm/libobby-0.4-dev_0.4.1-2+b1_arm.deb stable/main/binary-arm/libobby-0.4-0-dbg_0.4.1-2+b1_arm.deb stable/main/binary-arm/libobby-0.4-0_0.4.1-2+b1_arm.deb obby (0.4.1-2+b1) stable; urgency=low * Binary-only non-maintainer upload for arm; no source changes. * rebuild against net6 1.3.1-4 stable/main/binary-amd64/libobby-0.4-0-dbg_0.4.1-2+b1_amd64.deb stable/main/binary-amd64/libobby-0.4-0_0.4.1-2+b1_amd64.deb stable/main/binary-amd64/libobby-0.4-dev_0.4.1-2+b1_amd64.deb obby (0.4.1-2+b1) stable; urgency=low * Binary-only non-maintainer upload for amd64; no source changes. * rebuild against net6 1.3.1-4 stable/main/binary-alpha/libobby-0.4-dev_0.4.1-2+b1_alpha.deb stable/main/binary-alpha/libobby-0.4-0-dbg_0.4.1-2+b1_alpha.deb stable/main/binary-alpha/libobby-0.4-0_0.4.1-2+b1_alpha.deb obby (0.4.1-2+b1) stable; urgency=low * Binary-only non-maintainer upload for alpha; no source changes. * rebuild against net6 1.3.1-4 stable/main/binary-sparc/libnet6-1.3-dev_1.3.1-4_sparc.deb stable/main/binary-sparc/libnet6-1.3-0-dbg_1.3.1-4_sparc.deb stable/main/binary-sparc/libnet6-1.3-0_1.3.1-4_sparc.deb net6 (1:1.3.1-4) stable; urgency=low * Added a patch from upstream git (dated May 2007 and already included in various upstream releases) to fix the access of an object after deallocation causing garbage to be sent to the client. This also fixes the on-the-wire protocol and reenables proper communication with post-1.3.5 clients. The reverse depends of this package need to be recompile to pick up the changes. stable/main/binary-s390/libnet6-1.3-0_1.3.1-4_s390.deb stable/main/binary-s390/libnet6-1.3-dev_1.3.1-4_s390.deb stable/main/binary-s390/libnet6-1.3-0-dbg_1.3.1-4_s390.deb net6 (1:1.3.1-4) stable; urgency=low * Added a patch from upstream git (dated May 2007 and already included in various upstream releases) to fix the access of an object after deallocation causing garbage to be sent to the client. This also fixes the on-the-wire protocol and reenables proper communication with post-1.3.5 clients. The reverse depends of this package need to be recompile to pick up the changes. stable/main/binary-powerpc/libnet6-1.3-0-dbg_1.3.1-4_powerpc.deb stable/main/binary-powerpc/libnet6-1.3-0_1.3.1-4_powerpc.deb stable/main/binary-powerpc/libnet6-1.3-dev_1.3.1-4_powerpc.deb net6 (1:1.3.1-4) stable; urgency=low * Added a patch from upstream git (dated May 2007 and already included in various upstream releases) to fix the access of an object after deallocation causing garbage to be sent to the client. This also fixes the on-the-wire protocol and reenables proper communication with post-1.3.5 clients. The reverse depends of this package need to be recompile to pick up the changes. stable/main/binary-mipsel/libnet6-1.3-dev_1.3.1-4_mipsel.deb stable/main/binary-mipsel/libnet6-1.3-0-dbg_1.3.1-4_mipsel.deb stable/main/binary-mipsel/libnet6-1.3-0_1.3.1-4_mipsel.deb net6 (1:1.3.1-4) stable; urgency=low * Added a patch from upstream git (dated May 2007 and already included in various upstream releases) to fix the access of an object after deallocation causing garbage to be sent to the client. This also fixes the on-the-wire protocol and reenables proper communication with post-1.3.5 clients. The reverse depends of this package need to be recompile to pick up the changes. stable/main/binary-mips/libnet6-1.3-0_1.3.1-4_mips.deb stable/main/binary-mips/libnet6-1.3-dev_1.3.1-4_mips.deb stable/main/binary-mips/libnet6-1.3-0-dbg_1.3.1-4_mips.deb net6 (1:1.3.1-4) stable; urgency=low * Added a patch from upstream git (dated May 2007 and already included in various upstream releases) to fix the access of an object after deallocation causing garbage to be sent to the client. This also fixes the on-the-wire protocol and reenables proper communication with post-1.3.5 clients. The reverse depends of this package need to be recompile to pick up the changes. stable/main/binary-ia64/libnet6-1.3-0_1.3.1-4_ia64.deb stable/main/binary-ia64/libnet6-1.3-0-dbg_1.3.1-4_ia64.deb stable/main/binary-ia64/libnet6-1.3-dev_1.3.1-4_ia64.deb net6 (1:1.3.1-4) stable; urgency=low * Added a patch from upstream git (dated May 2007 and already included in various upstream releases) to fix the access of an object after deallocation causing garbage to be sent to the client. This also fixes the on-the-wire protocol and reenables proper communication with post-1.3.5 clients. The reverse depends of this package need to be recompile to pick up the changes. stable/main/binary-i386/libnet6-1.3-0-dbg_1.3.1-4_i386.deb stable/main/binary-i386/libnet6-1.3-dev_1.3.1-4_i386.deb stable/main/binary-i386/libnet6-1.3-0_1.3.1-4_i386.deb net6 (1:1.3.1-4) stable; urgency=low * Added a patch from upstream git (dated May 2007 and already included in various upstream releases) to fix the access of an object after deallocation causing garbage to be sent to the client. This also fixes the on-the-wire protocol and reenables proper communication with post-1.3.5 clients. The reverse depends of this package need to be recompile to pick up the changes. stable/main/binary-hppa/libnet6-1.3-0-dbg_1.3.1-4_hppa.deb stable/main/binary-hppa/libnet6-1.3-0_1.3.1-4_hppa.deb stable/main/binary-hppa/libnet6-1.3-dev_1.3.1-4_hppa.deb net6 (1:1.3.1-4) stable; urgency=low * Added a patch from upstream git (dated May 2007 and already included in various upstream releases) to fix the access of an object after deallocation causing garbage to be sent to the client. This also fixes the on-the-wire protocol and reenables proper communication with post-1.3.5 clients. The reverse depends of this package need to be recompile to pick up the changes. stable/main/binary-arm/libnet6-1.3-dev_1.3.1-4_arm.deb stable/main/binary-arm/libnet6-1.3-0_1.3.1-4_arm.deb stable/main/binary-arm/libnet6-1.3-0-dbg_1.3.1-4_arm.deb net6 (1:1.3.1-4) stable; urgency=low * Added a patch from upstream git (dated May 2007 and already included in various upstream releases) to fix the access of an object after deallocation causing garbage to be sent to the client. This also fixes the on-the-wire protocol and reenables proper communication with post-1.3.5 clients. The reverse depends of this package need to be recompile to pick up the changes. stable/main/binary-alpha/libnet6-1.3-0_1.3.1-4_alpha.deb stable/main/binary-alpha/libnet6-1.3-0-dbg_1.3.1-4_alpha.deb stable/main/binary-alpha/libnet6-1.3-dev_1.3.1-4_alpha.deb net6 (1:1.3.1-4) stable; urgency=low * Added a patch from upstream git (dated May 2007 and already included in various upstream releases) to fix the access of an object after deallocation causing garbage to be sent to the client. This also fixes the on-the-wire protocol and reenables proper communication with post-1.3.5 clients. The reverse depends of this package need to be recompile to pick up the changes. stable/main/source/net6_1.3.1-4.dsc stable/main/binary-amd64/libnet6-1.3-0-dbg_1.3.1-4_amd64.deb stable/main/binary-amd64/libnet6-1.3-dev_1.3.1-4_amd64.deb stable/main/source/net6_1.3.1-4.diff.gz stable/main/binary-amd64/libnet6-1.3-0_1.3.1-4_amd64.deb net6 (1:1.3.1-4) stable; urgency=low * Added a patch from upstream git (dated May 2007 and already included in various upstream releases) to fix the access of an object after deallocation causing garbage to be sent to the client. This also fixes the on-the-wire protocol and reenables proper communication with post-1.3.5 clients. The reverse depends of this package need to be recompile to pick up the changes. stable/main/binary-sparc/libmyspell-dev_3.1-18etch1_sparc.deb stable/main/binary-sparc/libmyspell3c2_3.1-18etch1_sparc.deb myspell (1:3.0+pre3.1-18etch1) stable; urgency=high * fix insecure temp file usage, thanks Thijs Kinkhorst and Agustin Martin Domingo(closes: #496392); update 09_numbers.dpatch stable/main/binary-s390/libmyspell-dev_3.1-18etch1_s390.deb stable/main/binary-s390/libmyspell3c2_3.1-18etch1_s390.deb myspell (1:3.0+pre3.1-18etch1) stable; urgency=high * fix insecure temp file usage, thanks Thijs Kinkhorst and Agustin Martin Domingo(closes: #496392); update 09_numbers.dpatch stable/main/binary-powerpc/libmyspell-dev_3.1-18etch1_powerpc.deb stable/main/binary-powerpc/libmyspell3c2_3.1-18etch1_powerpc.deb myspell (1:3.0+pre3.1-18etch1) stable; urgency=high * fix insecure temp file usage, thanks Thijs Kinkhorst and Agustin Martin Domingo(closes: #496392); update 09_numbers.dpatch stable/main/binary-mipsel/libmyspell3c2_3.1-18etch1_mipsel.deb stable/main/binary-mipsel/libmyspell-dev_3.1-18etch1_mipsel.deb myspell (1:3.0+pre3.1-18etch1) stable; urgency=high * fix insecure temp file usage, thanks Thijs Kinkhorst and Agustin Martin Domingo(closes: #496392); update 09_numbers.dpatch stable/main/binary-mips/libmyspell-dev_3.1-18etch1_mips.deb stable/main/binary-mips/libmyspell3c2_3.1-18etch1_mips.deb myspell (1:3.0+pre3.1-18etch1) stable; urgency=high * fix insecure temp file usage, thanks Thijs Kinkhorst and Agustin Martin Domingo(closes: #496392); update 09_numbers.dpatch stable/main/binary-ia64/libmyspell-dev_3.1-18etch1_ia64.deb stable/main/binary-ia64/libmyspell3c2_3.1-18etch1_ia64.deb myspell (1:3.0+pre3.1-18etch1) stable; urgency=high * fix insecure temp file usage, thanks Thijs Kinkhorst and Agustin Martin Domingo(closes: #496392); update 09_numbers.dpatch stable/main/binary-i386/libmyspell3c2_3.1-18etch1_i386.deb stable/main/binary-i386/libmyspell-dev_3.1-18etch1_i386.deb myspell (1:3.0+pre3.1-18etch1) stable; urgency=high * fix insecure temp file usage, thanks Thijs Kinkhorst and Agustin Martin Domingo(closes: #496392); update 09_numbers.dpatch stable/main/binary-hppa/libmyspell3c2_3.1-18etch1_hppa.deb stable/main/binary-hppa/libmyspell-dev_3.1-18etch1_hppa.deb myspell (1:3.0+pre3.1-18etch1) stable; urgency=high * fix insecure temp file usage, thanks Thijs Kinkhorst and Agustin Martin Domingo(closes: #496392); update 09_numbers.dpatch stable/main/binary-arm/libmyspell3c2_3.1-18etch1_arm.deb stable/main/binary-arm/libmyspell-dev_3.1-18etch1_arm.deb myspell (1:3.0+pre3.1-18etch1) stable; urgency=high * fix insecure temp file usage, thanks Thijs Kinkhorst and Agustin Martin Domingo(closes: #496392); update 09_numbers.dpatch stable/main/binary-alpha/libmyspell3c2_3.1-18etch1_alpha.deb stable/main/binary-alpha/libmyspell-dev_3.1-18etch1_alpha.deb myspell (1:3.0+pre3.1-18etch1) stable; urgency=high * fix insecure temp file usage, thanks Thijs Kinkhorst and Agustin Martin Domingo(closes: #496392); update 09_numbers.dpatch stable/main/binary-amd64/libmyspell3c2_3.1-18etch1_amd64.deb stable/main/source/myspell_3.0+pre3.1-18etch1.dsc stable/main/binary-amd64/libmyspell-dev_3.1-18etch1_amd64.deb stable/main/source/myspell_3.0+pre3.1-18etch1.diff.gz myspell (1:3.0+pre3.1-18etch1) stable; urgency=high * fix insecure temp file usage, thanks Thijs Kinkhorst and Agustin Martin Domingo(closes: #496392); update 09_numbers.dpatch stable/main/binary-sparc/mt-daapd_0.2.4+r1376-1.1+etch2_sparc.deb mt-daapd (0.2.4+r1376-1.1+etch2) stable-security; urgency=high * Non-maintainer upload by the security team * Correct logic flaw in 04_upstream_CVE-2007-5824_CVE-2007-5825.dpatch which broke authentication; thanks to Martijn Plak for the report and fix. stable/main/binary-s390/mt-daapd_0.2.4+r1376-1.1+etch2_s390.deb mt-daapd (0.2.4+r1376-1.1+etch2) stable-security; urgency=high * Non-maintainer upload by the security team * Correct logic flaw in 04_upstream_CVE-2007-5824_CVE-2007-5825.dpatch which broke authentication; thanks to Martijn Plak for the report and fix. stable/main/binary-powerpc/mt-daapd_0.2.4+r1376-1.1+etch2_powerpc.deb mt-daapd (0.2.4+r1376-1.1+etch2) stable-security; urgency=high * Non-maintainer upload by the security team * Correct logic flaw in 04_upstream_CVE-2007-5824_CVE-2007-5825.dpatch which broke authentication; thanks to Martijn Plak for the report and fix. stable/main/binary-mipsel/mt-daapd_0.2.4+r1376-1.1+etch2_mipsel.deb mt-daapd (0.2.4+r1376-1.1+etch2) stable-security; urgency=high * Non-maintainer upload by the security team * Correct logic flaw in 04_upstream_CVE-2007-5824_CVE-2007-5825.dpatch which broke authentication; thanks to Martijn Plak for the report and fix. stable/main/binary-mips/mt-daapd_0.2.4+r1376-1.1+etch2_mips.deb mt-daapd (0.2.4+r1376-1.1+etch2) stable-security; urgency=high * Non-maintainer upload by the security team * Correct logic flaw in 04_upstream_CVE-2007-5824_CVE-2007-5825.dpatch which broke authentication; thanks to Martijn Plak for the report and fix. stable/main/binary-ia64/mt-daapd_0.2.4+r1376-1.1+etch2_ia64.deb mt-daapd (0.2.4+r1376-1.1+etch2) stable-security; urgency=high * Non-maintainer upload by the security team * Correct logic flaw in 04_upstream_CVE-2007-5824_CVE-2007-5825.dpatch which broke authentication; thanks to Martijn Plak for the report and fix. stable/main/binary-i386/mt-daapd_0.2.4+r1376-1.1+etch2_i386.deb mt-daapd (0.2.4+r1376-1.1+etch2) stable-security; urgency=high * Non-maintainer upload by the security team * Correct logic flaw in 04_upstream_CVE-2007-5824_CVE-2007-5825.dpatch which broke authentication; thanks to Martijn Plak for the report and fix. stable/main/binary-hppa/mt-daapd_0.2.4+r1376-1.1+etch2_hppa.deb mt-daapd (0.2.4+r1376-1.1+etch2) stable-security; urgency=high * Non-maintainer upload by the security team * Correct logic flaw in 04_upstream_CVE-2007-5824_CVE-2007-5825.dpatch which broke authentication; thanks to Martijn Plak for the report and fix. stable/main/binary-arm/mt-daapd_0.2.4+r1376-1.1+etch2_arm.deb mt-daapd (0.2.4+r1376-1.1+etch2) stable-security; urgency=high * Non-maintainer upload by the security team * Correct logic flaw in 04_upstream_CVE-2007-5824_CVE-2007-5825.dpatch which broke authentication; thanks to Martijn Plak for the report and fix. stable/main/binary-alpha/mt-daapd_0.2.4+r1376-1.1+etch2_alpha.deb mt-daapd (0.2.4+r1376-1.1+etch2) stable-security; urgency=high * Non-maintainer upload by the security team * Correct logic flaw in 04_upstream_CVE-2007-5824_CVE-2007-5825.dpatch which broke authentication; thanks to Martijn Plak for the report and fix. stable/main/source/mt-daapd_0.2.4+r1376-1.1+etch2.dsc stable/main/source/mt-daapd_0.2.4+r1376-1.1+etch2.diff.gz stable/main/binary-amd64/mt-daapd_0.2.4+r1376-1.1+etch2_amd64.deb mt-daapd (0.2.4+r1376-1.1+etch2) stable-security; urgency=high * Non-maintainer upload by the security team * Correct logic flaw in 04_upstream_CVE-2007-5824_CVE-2007-5825.dpatch which broke authentication; thanks to Martijn Plak for the report and fix. stable/main/binary-sparc/mplayer_1.0~rc1-12etch5_sparc.deb mplayer (1.0~rc1-12etch5) stable-security; urgency=high * Non-maintainer upload by the security team. Thanks to A Mennucc1 for preparing the fix. * fix oCERT-2008-013 Mplayer real demuxer heap. Thanks to Felipe Andres Manzano, Andrea Barisani, Steffen Joeris, Reimar Döffinger. stable/main/binary-s390/mplayer_1.0~rc1-12etch5_s390.deb mplayer (1.0~rc1-12etch5) stable-security; urgency=high * Non-maintainer upload by the security team. Thanks to A Mennucc1 for preparing the fix. * fix oCERT-2008-013 Mplayer real demuxer heap. Thanks to Felipe Andres Manzano, Andrea Barisani, Steffen Joeris, Reimar Döffinger. stable/main/binary-powerpc/mplayer_1.0~rc1-12etch5_powerpc.deb mplayer (1.0~rc1-12etch5) stable-security; urgency=high * Non-maintainer upload by the security team. Thanks to A Mennucc1 for preparing the fix. * fix oCERT-2008-013 Mplayer real demuxer heap. Thanks to Felipe Andres Manzano, Andrea Barisani, Steffen Joeris, Reimar Döffinger. stable/main/binary-mipsel/mplayer_1.0~rc1-12etch5_mipsel.deb mplayer (1.0~rc1-12etch5) stable-security; urgency=high * Non-maintainer upload by the security team. Thanks to A Mennucc1 for preparing the fix. * fix oCERT-2008-013 Mplayer real demuxer heap. Thanks to Felipe Andres Manzano, Andrea Barisani, Steffen Joeris, Reimar Döffinger. stable/main/binary-mips/mplayer_1.0~rc1-12etch5_mips.deb mplayer (1.0~rc1-12etch5) stable-security; urgency=high * Non-maintainer upload by the security team. Thanks to A Mennucc1 for preparing the fix. * fix oCERT-2008-013 Mplayer real demuxer heap. Thanks to Felipe Andres Manzano, Andrea Barisani, Steffen Joeris, Reimar Döffinger. stable/main/binary-ia64/mplayer_1.0~rc1-12etch5_ia64.deb mplayer (1.0~rc1-12etch5) stable-security; urgency=high * Non-maintainer upload by the security team. Thanks to A Mennucc1 for preparing the fix. * fix oCERT-2008-013 Mplayer real demuxer heap. Thanks to Felipe Andres Manzano, Andrea Barisani, Steffen Joeris, Reimar Döffinger. stable/main/binary-i386/mplayer_1.0~rc1-12etch5_i386.deb mplayer (1.0~rc1-12etch5) stable-security; urgency=high * Non-maintainer upload by the security team. Thanks to A Mennucc1 for preparing the fix. * fix oCERT-2008-013 Mplayer real demuxer heap. Thanks to Felipe Andres Manzano, Andrea Barisani, Steffen Joeris, Reimar Döffinger. stable/main/binary-hppa/mplayer_1.0~rc1-12etch5_hppa.deb mplayer (1.0~rc1-12etch5) stable-security; urgency=high * Non-maintainer upload by the security team. Thanks to A Mennucc1 for preparing the fix. * fix oCERT-2008-013 Mplayer real demuxer heap. Thanks to Felipe Andres Manzano, Andrea Barisani, Steffen Joeris, Reimar Döffinger. stable/main/binary-arm/mplayer_1.0~rc1-12etch5_arm.deb mplayer (1.0~rc1-12etch5) stable-security; urgency=high * Non-maintainer upload by the security team. Thanks to A Mennucc1 for preparing the fix. * fix oCERT-2008-013 Mplayer real demuxer heap. Thanks to Felipe Andres Manzano, Andrea Barisani, Steffen Joeris, Reimar Döffinger. stable/main/binary-alpha/mplayer_1.0~rc1-12etch5_alpha.deb mplayer (1.0~rc1-12etch5) stable-security; urgency=high * Non-maintainer upload by the security team. Thanks to A Mennucc1 for preparing the fix. * fix oCERT-2008-013 Mplayer real demuxer heap. Thanks to Felipe Andres Manzano, Andrea Barisani, Steffen Joeris, Reimar Döffinger. stable/main/source/mplayer_1.0~rc1-12etch5.diff.gz stable/main/binary-amd64/mplayer_1.0~rc1-12etch5_amd64.deb stable/main/source/mplayer_1.0~rc1-12etch5.dsc stable/main/binary-all/mplayer-doc_1.0~rc1-12etch5_all.deb mplayer (1.0~rc1-12etch5) stable-security; urgency=high * Non-maintainer upload by the security team. Thanks to A Mennucc1 for preparing the fix. * fix oCERT-2008-013 Mplayer real demuxer heap. Thanks to Felipe Andres Manzano, Andrea Barisani, Steffen Joeris, Reimar Döffinger. stable/main/binary-sparc/mon_0.99.2-9+etch2_sparc.deb mon (0.99.2-9+etch2) stable-security; urgency=high * Non-maintainer upload by the security team * Make sure to use /var/log/mon/ for logging, since it runs under the daemon user by default and would otherwise lack permissions stable/main/binary-s390/mon_0.99.2-9+etch2_s390.deb mon (0.99.2-9+etch2) stable-security; urgency=high * Non-maintainer upload by the security team * Make sure to use /var/log/mon/ for logging, since it runs under the daemon user by default and would otherwise lack permissions stable/main/binary-powerpc/mon_0.99.2-9+etch2_powerpc.deb mon (0.99.2-9+etch2) stable-security; urgency=high * Non-maintainer upload by the security team * Make sure to use /var/log/mon/ for logging, since it runs under the daemon user by default and would otherwise lack permissions stable/main/binary-mipsel/mon_0.99.2-9+etch2_mipsel.deb mon (0.99.2-9+etch2) stable-security; urgency=high * Non-maintainer upload by the security team * Make sure to use /var/log/mon/ for logging, since it runs under the daemon user by default and would otherwise lack permissions stable/main/binary-mips/mon_0.99.2-9+etch2_mips.deb mon (0.99.2-9+etch2) stable-security; urgency=high * Non-maintainer upload by the security team * Make sure to use /var/log/mon/ for logging, since it runs under the daemon user by default and would otherwise lack permissions stable/main/binary-ia64/mon_0.99.2-9+etch2_ia64.deb mon (0.99.2-9+etch2) stable-security; urgency=high * Non-maintainer upload by the security team * Make sure to use /var/log/mon/ for logging, since it runs under the daemon user by default and would otherwise lack permissions stable/main/binary-hppa/mon_0.99.2-9+etch2_hppa.deb mon (0.99.2-9+etch2) stable-security; urgency=high * Non-maintainer upload by the security team * Make sure to use /var/log/mon/ for logging, since it runs under the daemon user by default and would otherwise lack permissions stable/main/binary-arm/mon_0.99.2-9+etch2_arm.deb mon (0.99.2-9+etch2) stable-security; urgency=high * Non-maintainer upload by the security team * Make sure to use /var/log/mon/ for logging, since it runs under the daemon user by default and would otherwise lack permissions stable/main/binary-amd64/mon_0.99.2-9+etch2_amd64.deb mon (0.99.2-9+etch2) stable-security; urgency=high * Non-maintainer upload by the security team * Make sure to use /var/log/mon/ for logging, since it runs under the daemon user by default and would otherwise lack permissions stable/main/binary-alpha/mon_0.99.2-9+etch2_alpha.deb mon (0.99.2-9+etch2) stable-security; urgency=high * Non-maintainer upload by the security team * Make sure to use /var/log/mon/ for logging, since it runs under the daemon user by default and would otherwise lack permissions stable/main/source/mon_0.99.2-9+etch2.dsc stable/main/binary-i386/mon_0.99.2-9+etch2_i386.deb stable/main/source/mon_0.99.2-9+etch2.diff.gz mon (0.99.2-9+etch2) stable-security; urgency=high * Non-maintainer upload by the security team * Make sure to use /var/log/mon/ for logging, since it runs under the daemon user by default and would otherwise lack permissions stable/main/binary-sparc/linux-headers-2.6.24-etchnhalf.1-all-sparc_2.6.24-6~etchnhalf.6_sparc.deb stable/main/binary-sparc/linux-image-2.6.24-etchnhalf.1-sparc64-smp_2.6.24-6~etchnhalf.6_sparc.deb stable/main/binary-sparc/linux-image-2.6.24-etchnhalf.1-sparc64_2.6.24-6~etchnhalf.6_sparc.deb stable/main/binary-sparc/linux-headers-2.6.24-etchnhalf.1-common_2.6.24-6~etchnhalf.6_sparc.deb stable/main/binary-sparc/linux-headers-2.6.24-etchnhalf.1-sparc64_2.6.24-6~etchnhalf.6_sparc.deb stable/main/binary-sparc/linux-headers-2.6.24-etchnhalf.1-sparc64-smp_2.6.24-6~etchnhalf.6_sparc.deb stable/main/binary-sparc/linux-headers-2.6.24-etchnhalf.1-all_2.6.24-6~etchnhalf.6_sparc.deb linux-2.6.24 (2.6.24-6~etchnhalf.6) stable-security; urgency=high * Add missing capability checks in sbni_ioctl (CVE-2008-3525) * [s390] prevent ptrace padding area read/write in 31-bit mode (CVE-2008-1514) * sctp: fix random memory dereference with SCTP_HMAC_IDENT option. (CVE-2008-4113) * sctp: fix bounds checking in sctp_auth_ep_set_hmacs (CVE-2008-4445) * Restrict access to the DRM_I915_HWS_ADDR ioctl (CVE-2008-3831) stable/main/binary-s390/linux-headers-2.6.24-etchnhalf.1-all-s390_2.6.24-6~etchnhalf.6_s390.deb stable/main/binary-s390/linux-headers-2.6.24-etchnhalf.1-all_2.6.24-6~etchnhalf.6_s390.deb stable/main/binary-s390/linux-image-2.6.24-etchnhalf.1-s390_2.6.24-6~etchnhalf.6_s390.deb stable/main/binary-s390/linux-headers-2.6.24-etchnhalf.1-s390_2.6.24-6~etchnhalf.6_s390.deb stable/main/binary-s390/linux-image-2.6.24-etchnhalf.1-s390-tape_2.6.24-6~etchnhalf.6_s390.deb stable/main/binary-s390/linux-image-2.6.24-etchnhalf.1-s390x_2.6.24-6~etchnhalf.6_s390.deb stable/main/binary-s390/linux-headers-2.6.24-etchnhalf.1-common_2.6.24-6~etchnhalf.6_s390.deb stable/main/binary-s390/linux-headers-2.6.24-etchnhalf.1-s390x_2.6.24-6~etchnhalf.6_s390.deb linux-2.6.24 (2.6.24-6~etchnhalf.6) stable-security; urgency=high * Add missing capability checks in sbni_ioctl (CVE-2008-3525) * [s390] prevent ptrace padding area read/write in 31-bit mode (CVE-2008-1514) * sctp: fix random memory dereference with SCTP_HMAC_IDENT option. (CVE-2008-4113) * sctp: fix bounds checking in sctp_auth_ep_set_hmacs (CVE-2008-4445) * Restrict access to the DRM_I915_HWS_ADDR ioctl (CVE-2008-3831) stable/main/binary-powerpc/linux-image-2.6.24-etchnhalf.1-powerpc-smp_2.6.24-6~etchnhalf.6_powerpc.deb stable/main/binary-powerpc/linux-headers-2.6.24-etchnhalf.1-all-powerpc_2.6.24-6~etchnhalf.6_powerpc.deb stable/main/binary-powerpc/linux-headers-2.6.24-etchnhalf.1-powerpc-miboot_2.6.24-6~etchnhalf.6_powerpc.deb stable/main/binary-powerpc/linux-headers-2.6.24-etchnhalf.1-powerpc_2.6.24-6~etchnhalf.6_powerpc.deb stable/main/binary-powerpc/linux-image-2.6.24-etchnhalf.1-powerpc_2.6.24-6~etchnhalf.6_powerpc.deb stable/main/binary-powerpc/linux-headers-2.6.24-etchnhalf.1-powerpc64_2.6.24-6~etchnhalf.6_powerpc.deb stable/main/binary-powerpc/linux-image-2.6.24-etchnhalf.1-powerpc64_2.6.24-6~etchnhalf.6_powerpc.deb stable/main/binary-powerpc/linux-headers-2.6.24-etchnhalf.1-powerpc-smp_2.6.24-6~etchnhalf.6_powerpc.deb stable/main/binary-powerpc/linux-image-2.6.24-etchnhalf.1-powerpc-miboot_2.6.24-6~etchnhalf.6_powerpc.deb stable/main/binary-powerpc/linux-headers-2.6.24-etchnhalf.1-common_2.6.24-6~etchnhalf.6_powerpc.deb stable/main/binary-powerpc/linux-headers-2.6.24-etchnhalf.1-all_2.6.24-6~etchnhalf.6_powerpc.deb linux-2.6.24 (2.6.24-6~etchnhalf.6) stable-security; urgency=high * Add missing capability checks in sbni_ioctl (CVE-2008-3525) * [s390] prevent ptrace padding area read/write in 31-bit mode (CVE-2008-1514) * sctp: fix random memory dereference with SCTP_HMAC_IDENT option. (CVE-2008-4113) * sctp: fix bounds checking in sctp_auth_ep_set_hmacs (CVE-2008-4445) * Restrict access to the DRM_I915_HWS_ADDR ioctl (CVE-2008-3831) stable/main/binary-mipsel/linux-headers-2.6.24-etchnhalf.1-sb1a-bcm91480b_2.6.24-6~etchnhalf.6_mipsel.deb stable/main/binary-mipsel/linux-image-2.6.24-etchnhalf.1-r5k-cobalt_2.6.24-6~etchnhalf.6_mipsel.deb stable/main/binary-mipsel/linux-image-2.6.24-etchnhalf.1-4kc-malta_2.6.24-6~etchnhalf.6_mipsel.deb stable/main/binary-mipsel/linux-headers-2.6.24-etchnhalf.1-all-mipsel_2.6.24-6~etchnhalf.6_mipsel.deb stable/main/binary-mipsel/linux-headers-2.6.24-etchnhalf.1-common_2.6.24-6~etchnhalf.6_mipsel.deb stable/main/binary-mipsel/linux-headers-2.6.24-etchnhalf.1-r5k-cobalt_2.6.24-6~etchnhalf.6_mipsel.deb stable/main/binary-mipsel/linux-headers-2.6.24-etchnhalf.1-4kc-malta_2.6.24-6~etchnhalf.6_mipsel.deb stable/main/binary-mipsel/linux-image-2.6.24-etchnhalf.1-5kc-malta_2.6.24-6~etchnhalf.6_mipsel.deb stable/main/binary-mipsel/linux-headers-2.6.24-etchnhalf.1-all_2.6.24-6~etchnhalf.6_mipsel.deb stable/main/binary-mipsel/linux-headers-2.6.24-etchnhalf.1-sb1-bcm91250a_2.6.24-6~etchnhalf.6_mipsel.deb stable/main/binary-mipsel/linux-image-2.6.24-etchnhalf.1-sb1-bcm91250a_2.6.24-6~etchnhalf.6_mipsel.deb stable/main/binary-mipsel/linux-image-2.6.24-etchnhalf.1-sb1a-bcm91480b_2.6.24-6~etchnhalf.6_mipsel.deb stable/main/binary-mipsel/linux-headers-2.6.24-etchnhalf.1-5kc-malta_2.6.24-6~etchnhalf.6_mipsel.deb linux-2.6.24 (2.6.24-6~etchnhalf.6) stable-security; urgency=high * Add missing capability checks in sbni_ioctl (CVE-2008-3525) * [s390] prevent ptrace padding area read/write in 31-bit mode (CVE-2008-1514) * sctp: fix random memory dereference with SCTP_HMAC_IDENT option. (CVE-2008-4113) * sctp: fix bounds checking in sctp_auth_ep_set_hmacs (CVE-2008-4445) * Restrict access to the DRM_I915_HWS_ADDR ioctl (CVE-2008-3831) stable/main/binary-mips/linux-headers-2.6.24-etchnhalf.1-r5k-ip32_2.6.24-6~etchnhalf.6_mips.deb stable/main/binary-mips/linux-headers-2.6.24-etchnhalf.1-common_2.6.24-6~etchnhalf.6_mips.deb stable/main/binary-mips/linux-headers-2.6.24-etchnhalf.1-5kc-malta_2.6.24-6~etchnhalf.6_mips.deb stable/main/binary-mips/linux-headers-2.6.24-etchnhalf.1-sb1-bcm91250a_2.6.24-6~etchnhalf.6_mips.deb stable/main/binary-mips/linux-image-2.6.24-etchnhalf.1-5kc-malta_2.6.24-6~etchnhalf.6_mips.deb stable/main/binary-mips/linux-headers-2.6.24-etchnhalf.1-all_2.6.24-6~etchnhalf.6_mips.deb stable/main/binary-mips/linux-image-2.6.24-etchnhalf.1-4kc-malta_2.6.24-6~etchnhalf.6_mips.deb stable/main/binary-mips/linux-headers-2.6.24-etchnhalf.1-4kc-malta_2.6.24-6~etchnhalf.6_mips.deb stable/main/binary-mips/linux-image-2.6.24-etchnhalf.1-sb1-bcm91250a_2.6.24-6~etchnhalf.6_mips.deb stable/main/binary-mips/linux-headers-2.6.24-etchnhalf.1-r4k-ip22_2.6.24-6~etchnhalf.6_mips.deb stable/main/binary-mips/linux-image-2.6.24-etchnhalf.1-sb1a-bcm91480b_2.6.24-6~etchnhalf.6_mips.deb stable/main/binary-mips/linux-headers-2.6.24-etchnhalf.1-all-mips_2.6.24-6~etchnhalf.6_mips.deb stable/main/binary-mips/linux-image-2.6.24-etchnhalf.1-r5k-ip32_2.6.24-6~etchnhalf.6_mips.deb stable/main/binary-mips/linux-image-2.6.24-etchnhalf.1-r4k-ip22_2.6.24-6~etchnhalf.6_mips.deb stable/main/binary-mips/linux-headers-2.6.24-etchnhalf.1-sb1a-bcm91480b_2.6.24-6~etchnhalf.6_mips.deb linux-2.6.24 (2.6.24-6~etchnhalf.6) stable-security; urgency=high * Add missing capability checks in sbni_ioctl (CVE-2008-3525) * [s390] prevent ptrace padding area read/write in 31-bit mode (CVE-2008-1514) * sctp: fix random memory dereference with SCTP_HMAC_IDENT option. (CVE-2008-4113) * sctp: fix bounds checking in sctp_auth_ep_set_hmacs (CVE-2008-4445) * Restrict access to the DRM_I915_HWS_ADDR ioctl (CVE-2008-3831) stable/main/binary-ia64/linux-image-2.6.24-etchnhalf.1-itanium_2.6.24-6~etchnhalf.6_ia64.deb stable/main/binary-ia64/linux-headers-2.6.24-etchnhalf.1-all-ia64_2.6.24-6~etchnhalf.6_ia64.deb stable/main/binary-ia64/linux-headers-2.6.24-etchnhalf.1-mckinley_2.6.24-6~etchnhalf.6_ia64.deb stable/main/binary-ia64/linux-headers-2.6.24-etchnhalf.1-common_2.6.24-6~etchnhalf.6_ia64.deb stable/main/binary-ia64/linux-headers-2.6.24-etchnhalf.1-all_2.6.24-6~etchnhalf.6_ia64.deb stable/main/binary-ia64/linux-image-2.6.24-etchnhalf.1-mckinley_2.6.24-6~etchnhalf.6_ia64.deb stable/main/binary-ia64/linux-headers-2.6.24-etchnhalf.1-itanium_2.6.24-6~etchnhalf.6_ia64.deb linux-2.6.24 (2.6.24-6~etchnhalf.6) stable-security; urgency=high * Add missing capability checks in sbni_ioctl (CVE-2008-3525) * [s390] prevent ptrace padding area read/write in 31-bit mode (CVE-2008-1514) * sctp: fix random memory dereference with SCTP_HMAC_IDENT option. (CVE-2008-4113) * sctp: fix bounds checking in sctp_auth_ep_set_hmacs (CVE-2008-4445) * Restrict access to the DRM_I915_HWS_ADDR ioctl (CVE-2008-3831) stable/main/binary-hppa/linux-headers-2.6.24-etchnhalf.1-parisc_2.6.24-6~etchnhalf.6_hppa.deb stable/main/binary-hppa/linux-headers-2.6.24-etchnhalf.1-parisc-smp_2.6.24-6~etchnhalf.6_hppa.deb stable/main/binary-hppa/linux-image-2.6.24-etchnhalf.1-parisc64_2.6.24-6~etchnhalf.6_hppa.deb stable/main/binary-hppa/linux-headers-2.6.24-etchnhalf.1-parisc64_2.6.24-6~etchnhalf.6_hppa.deb stable/main/binary-hppa/linux-headers-2.6.24-etchnhalf.1-all_2.6.24-6~etchnhalf.6_hppa.deb stable/main/binary-hppa/linux-image-2.6.24-etchnhalf.1-parisc-smp_2.6.24-6~etchnhalf.6_hppa.deb stable/main/binary-hppa/linux-headers-2.6.24-etchnhalf.1-common_2.6.24-6~etchnhalf.6_hppa.deb stable/main/binary-hppa/linux-headers-2.6.24-etchnhalf.1-all-hppa_2.6.24-6~etchnhalf.6_hppa.deb stable/main/binary-hppa/linux-image-2.6.24-etchnhalf.1-parisc_2.6.24-6~etchnhalf.6_hppa.deb stable/main/binary-hppa/linux-headers-2.6.24-etchnhalf.1-parisc64-smp_2.6.24-6~etchnhalf.6_hppa.deb stable/main/binary-hppa/linux-image-2.6.24-etchnhalf.1-parisc64-smp_2.6.24-6~etchnhalf.6_hppa.deb linux-2.6.24 (2.6.24-6~etchnhalf.6) stable-security; urgency=high * Add missing capability checks in sbni_ioctl (CVE-2008-3525) * [s390] prevent ptrace padding area read/write in 31-bit mode (CVE-2008-1514) * sctp: fix random memory dereference with SCTP_HMAC_IDENT option. (CVE-2008-4113) * sctp: fix bounds checking in sctp_auth_ep_set_hmacs (CVE-2008-4445) * Restrict access to the DRM_I915_HWS_ADDR ioctl (CVE-2008-3831) stable/main/binary-arm/linux-headers-2.6.24-etchnhalf.1-all_2.6.24-6~etchnhalf.6_arm.deb stable/main/binary-arm/linux-headers-2.6.24-etchnhalf.1-common_2.6.24-6~etchnhalf.6_arm.deb stable/main/binary-arm/linux-image-2.6.24-etchnhalf.1-footbridge_2.6.24-6~etchnhalf.6_arm.deb stable/main/binary-arm/linux-headers-2.6.24-etchnhalf.1-ixp4xx_2.6.24-6~etchnhalf.6_arm.deb stable/main/binary-arm/linux-headers-2.6.24-etchnhalf.1-footbridge_2.6.24-6~etchnhalf.6_arm.deb stable/main/binary-arm/linux-headers-2.6.24-etchnhalf.1-all-arm_2.6.24-6~etchnhalf.6_arm.deb stable/main/binary-arm/linux-image-2.6.24-etchnhalf.1-ixp4xx_2.6.24-6~etchnhalf.6_arm.deb stable/main/binary-arm/linux-headers-2.6.24-etchnhalf.1-iop32x_2.6.24-6~etchnhalf.6_arm.deb stable/main/binary-arm/linux-image-2.6.24-etchnhalf.1-iop32x_2.6.24-6~etchnhalf.6_arm.deb linux-2.6.24 (2.6.24-6~etchnhalf.6) stable-security; urgency=high * Add missing capability checks in sbni_ioctl (CVE-2008-3525) * [s390] prevent ptrace padding area read/write in 31-bit mode (CVE-2008-1514) * sctp: fix random memory dereference with SCTP_HMAC_IDENT option. (CVE-2008-4113) * sctp: fix bounds checking in sctp_auth_ep_set_hmacs (CVE-2008-4445) * Restrict access to the DRM_I915_HWS_ADDR ioctl (CVE-2008-3831) stable/main/binary-amd64/linux-headers-2.6.24-etchnhalf.1-amd64_2.6.24-6~etchnhalf.6_amd64.deb stable/main/binary-amd64/linux-headers-2.6.24-etchnhalf.1-common_2.6.24-6~etchnhalf.6_amd64.deb stable/main/binary-amd64/linux-image-2.6.24-etchnhalf.1-amd64_2.6.24-6~etchnhalf.6_amd64.deb stable/main/binary-amd64/linux-headers-2.6.24-etchnhalf.1-all-amd64_2.6.24-6~etchnhalf.6_amd64.deb stable/main/binary-amd64/linux-headers-2.6.24-etchnhalf.1-all_2.6.24-6~etchnhalf.6_amd64.deb linux-2.6.24 (2.6.24-6~etchnhalf.6) stable-security; urgency=high * Add missing capability checks in sbni_ioctl (CVE-2008-3525) * [s390] prevent ptrace padding area read/write in 31-bit mode (CVE-2008-1514) * sctp: fix random memory dereference with SCTP_HMAC_IDENT option. (CVE-2008-4113) * sctp: fix bounds checking in sctp_auth_ep_set_hmacs (CVE-2008-4445) * Restrict access to the DRM_I915_HWS_ADDR ioctl (CVE-2008-3831) stable/main/binary-alpha/linux-headers-2.6.24-etchnhalf.1-alpha-generic_2.6.24-6~etchnhalf.6_alpha.deb stable/main/binary-alpha/linux-headers-2.6.24-etchnhalf.1-all_2.6.24-6~etchnhalf.6_alpha.deb stable/main/binary-alpha/linux-headers-2.6.24-etchnhalf.1-all-alpha_2.6.24-6~etchnhalf.6_alpha.deb stable/main/binary-alpha/linux-image-2.6.24-etchnhalf.1-alpha-legacy_2.6.24-6~etchnhalf.6_alpha.deb stable/main/binary-alpha/linux-headers-2.6.24-etchnhalf.1-alpha-legacy_2.6.24-6~etchnhalf.6_alpha.deb stable/main/binary-alpha/linux-headers-2.6.24-etchnhalf.1-alpha-smp_2.6.24-6~etchnhalf.6_alpha.deb stable/main/binary-alpha/linux-image-2.6.24-etchnhalf.1-alpha-smp_2.6.24-6~etchnhalf.6_alpha.deb stable/main/binary-alpha/linux-image-2.6.24-etchnhalf.1-alpha-generic_2.6.24-6~etchnhalf.6_alpha.deb stable/main/binary-alpha/linux-headers-2.6.24-etchnhalf.1-common_2.6.24-6~etchnhalf.6_alpha.deb linux-2.6.24 (2.6.24-6~etchnhalf.6) stable-security; urgency=high * Add missing capability checks in sbni_ioctl (CVE-2008-3525) * [s390] prevent ptrace padding area read/write in 31-bit mode (CVE-2008-1514) * sctp: fix random memory dereference with SCTP_HMAC_IDENT option. (CVE-2008-4113) * sctp: fix bounds checking in sctp_auth_ep_set_hmacs (CVE-2008-4445) * Restrict access to the DRM_I915_HWS_ADDR ioctl (CVE-2008-3831) stable/main/source/linux-2.6.24_2.6.24-6~etchnhalf.6.dsc stable/main/binary-i386/linux-headers-2.6.24-etchnhalf.1-686-bigmem_2.6.24-6~etchnhalf.6_i386.deb stable/main/source/linux-2.6.24_2.6.24-6~etchnhalf.6.diff.gz stable/main/binary-i386/linux-headers-2.6.24-etchnhalf.1-all-i386_2.6.24-6~etchnhalf.6_i386.deb stable/main/binary-i386/linux-image-2.6.24-etchnhalf.1-amd64_2.6.24-6~etchnhalf.6_i386.deb stable/main/binary-i386/linux-headers-2.6.24-etchnhalf.1-common_2.6.24-6~etchnhalf.6_i386.deb stable/main/binary-i386/linux-headers-2.6.24-etchnhalf.1-all_2.6.24-6~etchnhalf.6_i386.deb stable/main/binary-i386/linux-image-2.6.24-etchnhalf.1-486_2.6.24-6~etchnhalf.6_i386.deb stable/main/binary-all/linux-tree-2.6.24_2.6.24-6~etchnhalf.6_all.deb stable/main/binary-all/linux-source-2.6.24_2.6.24-6~etchnhalf.6_all.deb stable/main/binary-i386/linux-image-2.6.24-etchnhalf.1-686_2.6.24-6~etchnhalf.6_i386.deb stable/main/binary-i386/linux-headers-2.6.24-etchnhalf.1-686_2.6.24-6~etchnhalf.6_i386.deb stable/main/binary-i386/linux-image-2.6.24-etchnhalf.1-686-bigmem_2.6.24-6~etchnhalf.6_i386.deb stable/main/binary-i386/linux-headers-2.6.24-etchnhalf.1-486_2.6.24-6~etchnhalf.6_i386.deb stable/main/binary-all/linux-patch-debian-2.6.24_2.6.24-6~etchnhalf.6_all.deb stable/main/binary-all/linux-support-2.6.24-etchnhalf.1_2.6.24-6~etchnhalf.6_all.deb stable/main/binary-all/linux-doc-2.6.24_2.6.24-6~etchnhalf.6_all.deb stable/main/binary-all/linux-manual-2.6.24_2.6.24-6~etchnhalf.6_all.deb stable/main/binary-i386/linux-headers-2.6.24-etchnhalf.1-amd64_2.6.24-6~etchnhalf.6_i386.deb linux-2.6.24 (2.6.24-6~etchnhalf.6) stable-security; urgency=high * Add missing capability checks in sbni_ioctl (CVE-2008-3525) * [s390] prevent ptrace padding area read/write in 31-bit mode (CVE-2008-1514) * sctp: fix random memory dereference with SCTP_HMAC_IDENT option. (CVE-2008-4113) * sctp: fix bounds checking in sctp_auth_ep_set_hmacs (CVE-2008-4445) * Restrict access to the DRM_I915_HWS_ADDR ioctl (CVE-2008-3831) stable/main/binary-sparc/linux-headers-2.6.18-6-vserver_2.6.18.dfsg.1-23_sparc.deb stable/main/binary-sparc/linux-headers-2.6.18-6-all-sparc_2.6.18.dfsg.1-23_sparc.deb stable/main/binary-sparc/linux-image-2.6.18-6-sparc64_2.6.18.dfsg.1-23_sparc.deb stable/main/binary-sparc/linux-image-2.6.18-6-sparc64-smp_2.6.18.dfsg.1-23_sparc.deb stable/main/binary-sparc/linux-headers-2.6.18-6-all_2.6.18.dfsg.1-23_sparc.deb stable/main/binary-sparc/linux-headers-2.6.18-6_2.6.18.dfsg.1-23_sparc.deb stable/main/binary-sparc/linux-image-2.6.18-6-sparc32_2.6.18.dfsg.1-23_sparc.deb stable/main/binary-sparc/linux-image-2.6.18-6-vserver-sparc64_2.6.18.dfsg.1-23_sparc.deb stable/main/binary-sparc/linux-headers-2.6.18-6-sparc64_2.6.18.dfsg.1-23_sparc.deb stable/main/binary-sparc/linux-headers-2.6.18-6-sparc32_2.6.18.dfsg.1-23_sparc.deb stable/main/binary-sparc/linux-headers-2.6.18-6-sparc64-smp_2.6.18.dfsg.1-23_sparc.deb stable/main/binary-sparc/linux-headers-2.6.18-6-vserver-sparc64_2.6.18.dfsg.1-23_sparc.deb linux-2.6 (2.6.18.dfsg.1-23) stable; urgency=high [ Ian Campbell ] * Fix DMA crash under Xen when no IOMMU is present (closes: #445987) [ dann frazier ] * [xfs] Fix attr2 corruption with btree data extents (closes: #498309) stable/main/binary-s390/linux-image-2.6.18-6-s390_2.6.18.dfsg.1-23_s390.deb stable/main/binary-s390/linux-headers-2.6.18-6-all-s390_2.6.18.dfsg.1-23_s390.deb stable/main/binary-s390/linux-headers-2.6.18-6_2.6.18.dfsg.1-23_s390.deb stable/main/binary-s390/linux-headers-2.6.18-6-vserver-s390x_2.6.18.dfsg.1-23_s390.deb stable/main/binary-s390/linux-image-2.6.18-6-s390x_2.6.18.dfsg.1-23_s390.deb stable/main/binary-s390/linux-headers-2.6.18-6-vserver_2.6.18.dfsg.1-23_s390.deb stable/main/binary-s390/linux-headers-2.6.18-6-all_2.6.18.dfsg.1-23_s390.deb stable/main/binary-s390/linux-headers-2.6.18-6-s390x_2.6.18.dfsg.1-23_s390.deb stable/main/binary-s390/linux-image-2.6.18-6-s390-tape_2.6.18.dfsg.1-23_s390.deb stable/main/binary-s390/linux-image-2.6.18-6-vserver-s390x_2.6.18.dfsg.1-23_s390.deb stable/main/binary-s390/linux-headers-2.6.18-6-s390_2.6.18.dfsg.1-23_s390.deb linux-2.6 (2.6.18.dfsg.1-23) stable; urgency=high [ Ian Campbell ] * Fix DMA crash under Xen when no IOMMU is present (closes: #445987) [ dann frazier ] * [xfs] Fix attr2 corruption with btree data extents (closes: #498309) stable/main/binary-powerpc/linux-image-2.6.18-6-vserver-powerpc64_2.6.18.dfsg.1-23_powerpc.deb stable/main/binary-powerpc/linux-headers-2.6.18-6-powerpc-smp_2.6.18.dfsg.1-23_powerpc.deb stable/main/binary-powerpc/linux-image-2.6.18-6-powerpc64_2.6.18.dfsg.1-23_powerpc.deb stable/main/binary-powerpc/linux-headers-2.6.18-6-powerpc64_2.6.18.dfsg.1-23_powerpc.deb stable/main/binary-powerpc/linux-image-2.6.18-6-vserver-powerpc_2.6.18.dfsg.1-23_powerpc.deb stable/main/binary-powerpc/linux-headers-2.6.18-6-all_2.6.18.dfsg.1-23_powerpc.deb stable/main/binary-powerpc/linux-headers-2.6.18-6-all-powerpc_2.6.18.dfsg.1-23_powerpc.deb stable/main/binary-powerpc/linux-headers-2.6.18-6-vserver_2.6.18.dfsg.1-23_powerpc.deb stable/main/binary-powerpc/linux-image-2.6.18-6-prep_2.6.18.dfsg.1-23_powerpc.deb stable/main/binary-powerpc/linux-headers-2.6.18-6-powerpc-miboot_2.6.18.dfsg.1-23_powerpc.deb stable/main/binary-powerpc/linux-headers-2.6.18-6-vserver-powerpc_2.6.18.dfsg.1-23_powerpc.deb stable/main/binary-powerpc/linux-headers-2.6.18-6_2.6.18.dfsg.1-23_powerpc.deb stable/main/binary-powerpc/linux-image-2.6.18-6-powerpc_2.6.18.dfsg.1-23_powerpc.deb stable/main/binary-powerpc/linux-image-2.6.18-6-powerpc-smp_2.6.18.dfsg.1-23_powerpc.deb stable/main/binary-powerpc/linux-headers-2.6.18-6-powerpc_2.6.18.dfsg.1-23_powerpc.deb stable/main/binary-powerpc/linux-headers-2.6.18-6-vserver-powerpc64_2.6.18.dfsg.1-23_powerpc.deb stable/main/binary-powerpc/linux-image-2.6.18-6-powerpc-miboot_2.6.18.dfsg.1-23_powerpc.deb stable/main/binary-powerpc/linux-headers-2.6.18-6-prep_2.6.18.dfsg.1-23_powerpc.deb linux-2.6 (2.6.18.dfsg.1-23) stable; urgency=high [ Ian Campbell ] * Fix DMA crash under Xen when no IOMMU is present (closes: #445987) [ dann frazier ] * [xfs] Fix attr2 corruption with btree data extents (closes: #498309) stable/main/binary-mipsel/linux-headers-2.6.18-6-r4k-kn04_2.6.18.dfsg.1-23_mipsel.deb stable/main/binary-mipsel/linux-headers-2.6.18-6-r3k-kn02_2.6.18.dfsg.1-23_mipsel.deb stable/main/binary-mipsel/linux-headers-2.6.18-6-sb1-bcm91250a_2.6.18.dfsg.1-23_mipsel.deb stable/main/binary-mipsel/linux-image-2.6.18-6-r3k-kn02_2.6.18.dfsg.1-23_mipsel.deb stable/main/binary-mipsel/linux-headers-2.6.18-6-all-mipsel_2.6.18.dfsg.1-23_mipsel.deb stable/main/binary-mipsel/linux-image-2.6.18-6-sb1-bcm91250a_2.6.18.dfsg.1-23_mipsel.deb stable/main/binary-mipsel/linux-headers-2.6.18-6-all_2.6.18.dfsg.1-23_mipsel.deb stable/main/binary-mipsel/linux-headers-2.6.18-6-sb1a-bcm91480b_2.6.18.dfsg.1-23_mipsel.deb stable/main/binary-mipsel/linux-headers-2.6.18-6_2.6.18.dfsg.1-23_mipsel.deb stable/main/binary-mipsel/linux-image-2.6.18-6-sb1a-bcm91480b_2.6.18.dfsg.1-23_mipsel.deb stable/main/binary-mipsel/linux-headers-2.6.18-6-qemu_2.6.18.dfsg.1-23_mipsel.deb stable/main/binary-mipsel/linux-image-2.6.18-6-r5k-cobalt_2.6.18.dfsg.1-23_mipsel.deb stable/main/binary-mipsel/linux-image-2.6.18-6-r4k-kn04_2.6.18.dfsg.1-23_mipsel.deb stable/main/binary-mipsel/linux-headers-2.6.18-6-r5k-cobalt_2.6.18.dfsg.1-23_mipsel.deb stable/main/binary-mipsel/linux-image-2.6.18-6-qemu_2.6.18.dfsg.1-23_mipsel.deb linux-2.6 (2.6.18.dfsg.1-23) stable; urgency=high [ Ian Campbell ] * Fix DMA crash under Xen when no IOMMU is present (closes: #445987) [ dann frazier ] * [xfs] Fix attr2 corruption with btree data extents (closes: #498309) stable/main/binary-mips/linux-headers-2.6.18-6-sb1a-bcm91480b_2.6.18.dfsg.1-23_mips.deb stable/main/binary-mips/linux-headers-2.6.18-6_2.6.18.dfsg.1-23_mips.deb stable/main/binary-mips/linux-headers-2.6.18-6-all-mips_2.6.18.dfsg.1-23_mips.deb stable/main/binary-mips/linux-image-2.6.18-6-qemu_2.6.18.dfsg.1-23_mips.deb stable/main/binary-mips/linux-image-2.6.18-6-sb1-bcm91250a_2.6.18.dfsg.1-23_mips.deb stable/main/binary-mips/linux-image-2.6.18-6-r4k-ip22_2.6.18.dfsg.1-23_mips.deb stable/main/binary-mips/linux-headers-2.6.18-6-all_2.6.18.dfsg.1-23_mips.deb stable/main/binary-mips/linux-image-2.6.18-6-sb1a-bcm91480b_2.6.18.dfsg.1-23_mips.deb stable/main/binary-mips/linux-image-2.6.18-6-r5k-ip32_2.6.18.dfsg.1-23_mips.deb stable/main/binary-mips/linux-headers-2.6.18-6-r4k-ip22_2.6.18.dfsg.1-23_mips.deb stable/main/binary-mips/linux-headers-2.6.18-6-qemu_2.6.18.dfsg.1-23_mips.deb stable/main/binary-mips/linux-headers-2.6.18-6-sb1-bcm91250a_2.6.18.dfsg.1-23_mips.deb stable/main/binary-mips/linux-headers-2.6.18-6-r5k-ip32_2.6.18.dfsg.1-23_mips.deb linux-2.6 (2.6.18.dfsg.1-23) stable; urgency=high [ Ian Campbell ] * Fix DMA crash under Xen when no IOMMU is present (closes: #445987) [ dann frazier ] * [xfs] Fix attr2 corruption with btree data extents (closes: #498309) stable/main/binary-ia64/linux-headers-2.6.18-6-all-ia64_2.6.18.dfsg.1-23_ia64.deb stable/main/binary-ia64/linux-headers-2.6.18-6-mckinley_2.6.18.dfsg.1-23_ia64.deb stable/main/binary-ia64/linux-image-2.6.18-6-mckinley_2.6.18.dfsg.1-23_ia64.deb stable/main/binary-ia64/linux-headers-2.6.18-6-itanium_2.6.18.dfsg.1-23_ia64.deb stable/main/binary-ia64/linux-headers-2.6.18-6_2.6.18.dfsg.1-23_ia64.deb stable/main/binary-ia64/linux-image-2.6.18-6-itanium_2.6.18.dfsg.1-23_ia64.deb stable/main/binary-ia64/linux-headers-2.6.18-6-all_2.6.18.dfsg.1-23_ia64.deb linux-2.6 (2.6.18.dfsg.1-23) stable; urgency=high [ Ian Campbell ] * Fix DMA crash under Xen when no IOMMU is present (closes: #445987) [ dann frazier ] * [xfs] Fix attr2 corruption with btree data extents (closes: #498309) stable/main/binary-hppa/linux-image-2.6.18-6-parisc64-smp_2.6.18.dfsg.1-23_hppa.deb stable/main/binary-hppa/linux-headers-2.6.18-6_2.6.18.dfsg.1-23_hppa.deb stable/main/binary-hppa/linux-headers-2.6.18-6-parisc64_2.6.18.dfsg.1-23_hppa.deb stable/main/binary-hppa/linux-headers-2.6.18-6-all-hppa_2.6.18.dfsg.1-23_hppa.deb stable/main/binary-hppa/linux-headers-2.6.18-6-parisc64-smp_2.6.18.dfsg.1-23_hppa.deb stable/main/binary-hppa/linux-image-2.6.18-6-parisc-smp_2.6.18.dfsg.1-23_hppa.deb stable/main/binary-hppa/linux-headers-2.6.18-6-all_2.6.18.dfsg.1-23_hppa.deb stable/main/binary-hppa/linux-headers-2.6.18-6-parisc-smp_2.6.18.dfsg.1-23_hppa.deb stable/main/binary-hppa/linux-headers-2.6.18-6-parisc_2.6.18.dfsg.1-23_hppa.deb stable/main/binary-hppa/linux-image-2.6.18-6-parisc_2.6.18.dfsg.1-23_hppa.deb stable/main/binary-hppa/linux-image-2.6.18-6-parisc64_2.6.18.dfsg.1-23_hppa.deb linux-2.6 (2.6.18.dfsg.1-23) stable; urgency=high [ Ian Campbell ] * Fix DMA crash under Xen when no IOMMU is present (closes: #445987) [ dann frazier ] * [xfs] Fix attr2 corruption with btree data extents (closes: #498309) stable/main/binary-arm/linux-image-2.6.18-6-footbridge_2.6.18.dfsg.1-23_arm.deb stable/main/binary-arm/linux-image-2.6.18-6-s3c2410_2.6.18.dfsg.1-23_arm.deb stable/main/binary-arm/linux-headers-2.6.18-6-iop32x_2.6.18.dfsg.1-23_arm.deb stable/main/binary-arm/linux-headers-2.6.18-6-all_2.6.18.dfsg.1-23_arm.deb stable/main/binary-arm/linux-headers-2.6.18-6-footbridge_2.6.18.dfsg.1-23_arm.deb stable/main/binary-arm/linux-headers-2.6.18-6-ixp4xx_2.6.18.dfsg.1-23_arm.deb stable/main/binary-arm/linux-image-2.6.18-6-ixp4xx_2.6.18.dfsg.1-23_arm.deb stable/main/binary-arm/linux-headers-2.6.18-6_2.6.18.dfsg.1-23_arm.deb stable/main/binary-arm/linux-image-2.6.18-6-iop32x_2.6.18.dfsg.1-23_arm.deb stable/main/binary-arm/linux-headers-2.6.18-6-all-arm_2.6.18.dfsg.1-23_arm.deb stable/main/binary-arm/linux-headers-2.6.18-6-rpc_2.6.18.dfsg.1-23_arm.deb stable/main/binary-arm/linux-headers-2.6.18-6-s3c2410_2.6.18.dfsg.1-23_arm.deb stable/main/binary-arm/linux-image-2.6.18-6-rpc_2.6.18.dfsg.1-23_arm.deb linux-2.6 (2.6.18.dfsg.1-23) stable; urgency=high [ Ian Campbell ] * Fix DMA crash under Xen when no IOMMU is present (closes: #445987) [ dann frazier ] * [xfs] Fix attr2 corruption with btree data extents (closes: #498309) stable/main/binary-amd64/linux-image-2.6.18-6-xen-amd64_2.6.18.dfsg.1-23_amd64.deb stable/main/binary-amd64/linux-modules-2.6.18-6-xen-vserver-amd64_2.6.18.dfsg.1-23_amd64.deb stable/main/binary-amd64/linux-image-2.6.18-6-amd64_2.6.18.dfsg.1-23_amd64.deb stable/main/binary-amd64/linux-image-2.6.18-6-vserver-amd64_2.6.18.dfsg.1-23_amd64.deb stable/main/binary-amd64/linux-headers-2.6.18-6-xen-vserver-amd64_2.6.18.dfsg.1-23_amd64.deb stable/main/binary-amd64/linux-headers-2.6.18-6-all_2.6.18.dfsg.1-23_amd64.deb stable/main/binary-amd64/xen-linux-system-2.6.18-6-xen-amd64_2.6.18.dfsg.1-23_amd64.deb stable/main/binary-amd64/linux-headers-2.6.18-6-all-amd64_2.6.18.dfsg.1-23_amd64.deb stable/main/binary-amd64/linux-modules-2.6.18-6-xen-amd64_2.6.18.dfsg.1-23_amd64.deb stable/main/binary-amd64/linux-headers-2.6.18-6-vserver-amd64_2.6.18.dfsg.1-23_amd64.deb stable/main/binary-amd64/linux-headers-2.6.18-6-amd64_2.6.18.dfsg.1-23_amd64.deb stable/main/binary-amd64/linux-headers-2.6.18-6-vserver_2.6.18.dfsg.1-23_amd64.deb stable/main/binary-amd64/linux-headers-2.6.18-6-xen-amd64_2.6.18.dfsg.1-23_amd64.deb stable/main/binary-amd64/linux-headers-2.6.18-6-xen_2.6.18.dfsg.1-23_amd64.deb stable/main/binary-amd64/linux-headers-2.6.18-6-xen-vserver_2.6.18.dfsg.1-23_amd64.deb stable/main/binary-amd64/linux-image-2.6.18-6-xen-vserver-amd64_2.6.18.dfsg.1-23_amd64.deb stable/main/binary-amd64/linux-headers-2.6.18-6_2.6.18.dfsg.1-23_amd64.deb stable/main/binary-amd64/xen-linux-system-2.6.18-6-xen-vserver-amd64_2.6.18.dfsg.1-23_amd64.deb linux-2.6 (2.6.18.dfsg.1-23) stable; urgency=high [ Ian Campbell ] * Fix DMA crash under Xen when no IOMMU is present (closes: #445987) [ dann frazier ] * [xfs] Fix attr2 corruption with btree data extents (closes: #498309) stable/main/binary-alpha/linux-headers-2.6.18-6-alpha-generic_2.6.18.dfsg.1-23_alpha.deb stable/main/binary-alpha/linux-image-2.6.18-6-alpha-smp_2.6.18.dfsg.1-23_alpha.deb stable/main/binary-alpha/linux-headers-2.6.18-6_2.6.18.dfsg.1-23_alpha.deb stable/main/binary-alpha/linux-image-2.6.18-6-alpha-legacy_2.6.18.dfsg.1-23_alpha.deb stable/main/binary-alpha/linux-headers-2.6.18-6-alpha-legacy_2.6.18.dfsg.1-23_alpha.deb stable/main/binary-alpha/linux-image-2.6.18-6-alpha-generic_2.6.18.dfsg.1-23_alpha.deb stable/main/binary-alpha/linux-headers-2.6.18-6-all_2.6.18.dfsg.1-23_alpha.deb stable/main/binary-alpha/linux-headers-2.6.18-6-vserver_2.6.18.dfsg.1-23_alpha.deb stable/main/binary-alpha/linux-image-2.6.18-6-vserver-alpha_2.6.18.dfsg.1-23_alpha.deb stable/main/binary-alpha/linux-headers-2.6.18-6-all-alpha_2.6.18.dfsg.1-23_alpha.deb stable/main/binary-alpha/linux-headers-2.6.18-6-alpha-smp_2.6.18.dfsg.1-23_alpha.deb stable/main/binary-alpha/linux-headers-2.6.18-6-vserver-alpha_2.6.18.dfsg.1-23_alpha.deb linux-2.6 (2.6.18.dfsg.1-23) stable; urgency=high [ Ian Campbell ] * Fix DMA crash under Xen when no IOMMU is present (closes: #445987) [ dann frazier ] * [xfs] Fix attr2 corruption with btree data extents (closes: #498309) stable/main/binary-i386/linux-image-2.6.18-6-686-bigmem_2.6.18.dfsg.1-23_i386.deb stable/main/binary-i386/linux-headers-2.6.18-6-k7_2.6.18.dfsg.1-23_i386.deb stable/main/binary-i386/linux-headers-2.6.18-6-xen-686_2.6.18.dfsg.1-23_i386.deb stable/main/binary-i386/linux-headers-2.6.18-6-vserver_2.6.18.dfsg.1-23_i386.deb stable/main/binary-i386/linux-headers-2.6.18-6_2.6.18.dfsg.1-23_i386.deb stable/main/binary-i386/linux-modules-2.6.18-6-xen-vserver-686_2.6.18.dfsg.1-23_i386.deb stable/main/source/linux-2.6_2.6.18.dfsg.1-23.diff.gz stable/main/binary-all/linux-source-2.6.18_2.6.18.dfsg.1-23_all.deb stable/main/binary-i386/linux-image-2.6.18-6-k7_2.6.18.dfsg.1-23_i386.deb stable/main/binary-i386/linux-image-2.6.18-6-486_2.6.18.dfsg.1-23_i386.deb stable/main/binary-i386/linux-headers-2.6.18-6-xen-vserver_2.6.18.dfsg.1-23_i386.deb stable/main/binary-i386/linux-image-2.6.18-6-vserver-k7_2.6.18.dfsg.1-23_i386.deb stable/main/source/linux-2.6_2.6.18.dfsg.1-23.dsc stable/main/binary-all/linux-patch-debian-2.6.18_2.6.18.dfsg.1-23_all.deb stable/main/binary-i386/linux-headers-2.6.18-6-686-bigmem_2.6.18.dfsg.1-23_i386.deb stable/main/binary-i386/linux-image-2.6.18-6-xen-vserver-686_2.6.18.dfsg.1-23_i386.deb stable/main/binary-i386/linux-headers-2.6.18-6-amd64_2.6.18.dfsg.1-23_i386.deb stable/main/binary-i386/linux-headers-2.6.18-6-vserver-686_2.6.18.dfsg.1-23_i386.deb stable/main/binary-i386/linux-modules-2.6.18-6-xen-686_2.6.18.dfsg.1-23_i386.deb stable/main/binary-i386/linux-headers-2.6.18-6-all_2.6.18.dfsg.1-23_i386.deb stable/main/binary-i386/linux-headers-2.6.18-6-486_2.6.18.dfsg.1-23_i386.deb stable/main/binary-i386/linux-image-2.6.18-6-xen-686_2.6.18.dfsg.1-23_i386.deb stable/main/binary-i386/linux-headers-2.6.18-6-686_2.6.18.dfsg.1-23_i386.deb stable/main/binary-i386/xen-linux-system-2.6.18-6-xen-686_2.6.18.dfsg.1-23_i386.deb stable/main/binary-i386/linux-headers-2.6.18-6-all-i386_2.6.18.dfsg.1-23_i386.deb stable/main/binary-i386/linux-headers-2.6.18-6-xen_2.6.18.dfsg.1-23_i386.deb stable/main/binary-i386/linux-image-2.6.18-6-vserver-686_2.6.18.dfsg.1-23_i386.deb stable/main/binary-i386/xen-linux-system-2.6.18-6-xen-vserver-686_2.6.18.dfsg.1-23_i386.deb stable/main/binary-all/linux-support-2.6.18-6_2.6.18.dfsg.1-23_all.deb stable/main/binary-i386/linux-image-2.6.18-6-686_2.6.18.dfsg.1-23_i386.deb stable/main/binary-all/linux-manual-2.6.18_2.6.18.dfsg.1-23_all.deb stable/main/binary-i386/linux-image-2.6.18-6-amd64_2.6.18.dfsg.1-23_i386.deb stable/main/binary-i386/linux-headers-2.6.18-6-xen-vserver-686_2.6.18.dfsg.1-23_i386.deb stable/main/binary-i386/linux-headers-2.6.18-6-vserver-k7_2.6.18.dfsg.1-23_i386.deb stable/main/binary-all/linux-doc-2.6.18_2.6.18.dfsg.1-23_all.deb stable/main/binary-all/linux-tree-2.6.18_2.6.18.dfsg.1-23_all.deb linux-2.6 (2.6.18.dfsg.1-23) stable; urgency=high [ Ian Campbell ] * Fix DMA crash under Xen when no IOMMU is present (closes: #445987) [ dann frazier ] * [xfs] Fix attr2 corruption with btree data extents (closes: #498309) stable/main/binary-sparc/lighttpd-mod-magnet_1.4.13-4etch11_sparc.deb stable/main/binary-sparc/lighttpd-mod-cml_1.4.13-4etch11_sparc.deb stable/main/binary-sparc/lighttpd-mod-mysql-vhost_1.4.13-4etch11_sparc.deb stable/main/binary-sparc/lighttpd-mod-webdav_1.4.13-4etch11_sparc.deb stable/main/binary-sparc/lighttpd-mod-trigger-b4-dl_1.4.13-4etch11_sparc.deb stable/main/binary-sparc/lighttpd_1.4.13-4etch11_sparc.deb lighttpd (1.4.13-4etch11) stable-security; urgency=low * Security upload. * Apply patch for lighttpd SA 2008-05 - Rewrite/redirect rules and URL encoding [CVE-2008-4359] * Apply patch for lighttpd SA 2008-06 - mod_userdir information disclosure [CVE-2008-4360] * Apply patch for lighttpd SA 2008-07 - Memory leak in request header handling [CVE-2008-4298] stable/main/binary-s390/lighttpd-mod-cml_1.4.13-4etch11_s390.deb stable/main/binary-s390/lighttpd-mod-webdav_1.4.13-4etch11_s390.deb stable/main/binary-s390/lighttpd_1.4.13-4etch11_s390.deb stable/main/binary-s390/lighttpd-mod-trigger-b4-dl_1.4.13-4etch11_s390.deb stable/main/binary-s390/lighttpd-mod-magnet_1.4.13-4etch11_s390.deb stable/main/binary-s390/lighttpd-mod-mysql-vhost_1.4.13-4etch11_s390.deb lighttpd (1.4.13-4etch11) stable-security; urgency=low * Security upload. * Apply patch for lighttpd SA 2008-05 - Rewrite/redirect rules and URL encoding [CVE-2008-4359] * Apply patch for lighttpd SA 2008-06 - mod_userdir information disclosure [CVE-2008-4360] * Apply patch for lighttpd SA 2008-07 - Memory leak in request header handling [CVE-2008-4298] stable/main/binary-powerpc/lighttpd-mod-cml_1.4.13-4etch11_powerpc.deb stable/main/binary-powerpc/lighttpd-mod-magnet_1.4.13-4etch11_powerpc.deb stable/main/binary-powerpc/lighttpd-mod-webdav_1.4.13-4etch11_powerpc.deb stable/main/binary-powerpc/lighttpd_1.4.13-4etch11_powerpc.deb stable/main/binary-powerpc/lighttpd-mod-trigger-b4-dl_1.4.13-4etch11_powerpc.deb stable/main/binary-powerpc/lighttpd-mod-mysql-vhost_1.4.13-4etch11_powerpc.deb lighttpd (1.4.13-4etch11) stable-security; urgency=low * Security upload. * Apply patch for lighttpd SA 2008-05 - Rewrite/redirect rules and URL encoding [CVE-2008-4359] * Apply patch for lighttpd SA 2008-06 - mod_userdir information disclosure [CVE-2008-4360] * Apply patch for lighttpd SA 2008-07 - Memory leak in request header handling [CVE-2008-4298] stable/main/binary-mipsel/lighttpd-mod-mysql-vhost_1.4.13-4etch11_mipsel.deb stable/main/binary-mipsel/lighttpd_1.4.13-4etch11_mipsel.deb stable/main/binary-mipsel/lighttpd-mod-cml_1.4.13-4etch11_mipsel.deb stable/main/binary-mipsel/lighttpd-mod-trigger-b4-dl_1.4.13-4etch11_mipsel.deb stable/main/binary-mipsel/lighttpd-mod-magnet_1.4.13-4etch11_mipsel.deb stable/main/binary-mipsel/lighttpd-mod-webdav_1.4.13-4etch11_mipsel.deb lighttpd (1.4.13-4etch11) stable-security; urgency=low * Security upload. * Apply patch for lighttpd SA 2008-05 - Rewrite/redirect rules and URL encoding [CVE-2008-4359] * Apply patch for lighttpd SA 2008-06 - mod_userdir information disclosure [CVE-2008-4360] * Apply patch for lighttpd SA 2008-07 - Memory leak in request header handling [CVE-2008-4298] stable/main/binary-mips/lighttpd-mod-mysql-vhost_1.4.13-4etch11_mips.deb stable/main/binary-mips/lighttpd-mod-cml_1.4.13-4etch11_mips.deb stable/main/binary-mips/lighttpd-mod-webdav_1.4.13-4etch11_mips.deb stable/main/binary-mips/lighttpd_1.4.13-4etch11_mips.deb stable/main/binary-mips/lighttpd-mod-magnet_1.4.13-4etch11_mips.deb stable/main/binary-mips/lighttpd-mod-trigger-b4-dl_1.4.13-4etch11_mips.deb lighttpd (1.4.13-4etch11) stable-security; urgency=low * Security upload. * Apply patch for lighttpd SA 2008-05 - Rewrite/redirect rules and URL encoding [CVE-2008-4359] * Apply patch for lighttpd SA 2008-06 - mod_userdir information disclosure [CVE-2008-4360] * Apply patch for lighttpd SA 2008-07 - Memory leak in request header handling [CVE-2008-4298] stable/main/binary-ia64/lighttpd-mod-cml_1.4.13-4etch11_ia64.deb stable/main/binary-ia64/lighttpd-mod-mysql-vhost_1.4.13-4etch11_ia64.deb stable/main/binary-ia64/lighttpd-mod-trigger-b4-dl_1.4.13-4etch11_ia64.deb stable/main/binary-ia64/lighttpd-mod-magnet_1.4.13-4etch11_ia64.deb stable/main/binary-ia64/lighttpd_1.4.13-4etch11_ia64.deb stable/main/binary-ia64/lighttpd-mod-webdav_1.4.13-4etch11_ia64.deb lighttpd (1.4.13-4etch11) stable-security; urgency=low * Security upload. * Apply patch for lighttpd SA 2008-05 - Rewrite/redirect rules and URL encoding [CVE-2008-4359] * Apply patch for lighttpd SA 2008-06 - mod_userdir information disclosure [CVE-2008-4360] * Apply patch for lighttpd SA 2008-07 - Memory leak in request header handling [CVE-2008-4298] stable/main/binary-i386/lighttpd-mod-trigger-b4-dl_1.4.13-4etch11_i386.deb stable/main/binary-i386/lighttpd-mod-magnet_1.4.13-4etch11_i386.deb stable/main/binary-i386/lighttpd_1.4.13-4etch11_i386.deb stable/main/binary-i386/lighttpd-mod-cml_1.4.13-4etch11_i386.deb stable/main/binary-i386/lighttpd-mod-mysql-vhost_1.4.13-4etch11_i386.deb stable/main/binary-i386/lighttpd-mod-webdav_1.4.13-4etch11_i386.deb lighttpd (1.4.13-4etch11) stable-security; urgency=low * Security upload. * Apply patch for lighttpd SA 2008-05 - Rewrite/redirect rules and URL encoding [CVE-2008-4359] * Apply patch for lighttpd SA 2008-06 - mod_userdir information disclosure [CVE-2008-4360] * Apply patch for lighttpd SA 2008-07 - Memory leak in request header handling [CVE-2008-4298] stable/main/binary-hppa/lighttpd-mod-webdav_1.4.13-4etch11_hppa.deb stable/main/binary-hppa/lighttpd_1.4.13-4etch11_hppa.deb stable/main/binary-hppa/lighttpd-mod-trigger-b4-dl_1.4.13-4etch11_hppa.deb stable/main/binary-hppa/lighttpd-mod-magnet_1.4.13-4etch11_hppa.deb stable/main/binary-hppa/lighttpd-mod-cml_1.4.13-4etch11_hppa.deb stable/main/binary-hppa/lighttpd-mod-mysql-vhost_1.4.13-4etch11_hppa.deb lighttpd (1.4.13-4etch11) stable-security; urgency=low * Security upload. * Apply patch for lighttpd SA 2008-05 - Rewrite/redirect rules and URL encoding [CVE-2008-4359] * Apply patch for lighttpd SA 2008-06 - mod_userdir information disclosure [CVE-2008-4360] * Apply patch for lighttpd SA 2008-07 - Memory leak in request header handling [CVE-2008-4298] stable/main/binary-arm/lighttpd-mod-webdav_1.4.13-4etch11_arm.deb stable/main/binary-arm/lighttpd-mod-trigger-b4-dl_1.4.13-4etch11_arm.deb stable/main/binary-arm/lighttpd-mod-magnet_1.4.13-4etch11_arm.deb stable/main/binary-arm/lighttpd-mod-cml_1.4.13-4etch11_arm.deb stable/main/binary-arm/lighttpd-mod-mysql-vhost_1.4.13-4etch11_arm.deb stable/main/binary-arm/lighttpd_1.4.13-4etch11_arm.deb lighttpd (1.4.13-4etch11) stable-security; urgency=low * Security upload. * Apply patch for lighttpd SA 2008-05 - Rewrite/redirect rules and URL encoding [CVE-2008-4359] * Apply patch for lighttpd SA 2008-06 - mod_userdir information disclosure [CVE-2008-4360] * Apply patch for lighttpd SA 2008-07 - Memory leak in request header handling [CVE-2008-4298] stable/main/binary-alpha/lighttpd_1.4.13-4etch11_alpha.deb stable/main/binary-alpha/lighttpd-mod-trigger-b4-dl_1.4.13-4etch11_alpha.deb stable/main/binary-alpha/lighttpd-mod-mysql-vhost_1.4.13-4etch11_alpha.deb stable/main/binary-alpha/lighttpd-mod-cml_1.4.13-4etch11_alpha.deb stable/main/binary-alpha/lighttpd-mod-magnet_1.4.13-4etch11_alpha.deb stable/main/binary-alpha/lighttpd-mod-webdav_1.4.13-4etch11_alpha.deb lighttpd (1.4.13-4etch11) stable-security; urgency=low * Security upload. * Apply patch for lighttpd SA 2008-05 - Rewrite/redirect rules and URL encoding [CVE-2008-4359] * Apply patch for lighttpd SA 2008-06 - mod_userdir information disclosure [CVE-2008-4360] * Apply patch for lighttpd SA 2008-07 - Memory leak in request header handling [CVE-2008-4298] stable/main/binary-amd64/lighttpd_1.4.13-4etch11_amd64.deb stable/main/binary-amd64/lighttpd-mod-cml_1.4.13-4etch11_amd64.deb stable/main/binary-amd64/lighttpd-mod-webdav_1.4.13-4etch11_amd64.deb stable/main/binary-amd64/lighttpd-mod-mysql-vhost_1.4.13-4etch11_amd64.deb stable/main/source/lighttpd_1.4.13-4etch11.diff.gz stable/main/binary-amd64/lighttpd-mod-trigger-b4-dl_1.4.13-4etch11_amd64.deb stable/main/binary-amd64/lighttpd-mod-magnet_1.4.13-4etch11_amd64.deb stable/main/source/lighttpd_1.4.13-4etch11.dsc stable/main/binary-all/lighttpd-doc_1.4.13-4etch11_all.deb lighttpd (1.4.13-4etch11) stable-security; urgency=low * Security upload. * Apply patch for lighttpd SA 2008-05 - Rewrite/redirect rules and URL encoding [CVE-2008-4359] * Apply patch for lighttpd SA 2008-06 - mod_userdir information disclosure [CVE-2008-4360] * Apply patch for lighttpd SA 2008-07 - Memory leak in request header handling [CVE-2008-4298] stable/main/binary-sparc/libxslt1-dev_1.1.19-3_sparc.deb stable/main/binary-sparc/libxslt1.1_1.1.19-3_sparc.deb stable/main/binary-sparc/xsltproc_1.1.19-3_sparc.deb stable/main/binary-sparc/libxslt1-dbg_1.1.19-3_sparc.deb stable/main/binary-sparc/python-libxslt1_1.1.19-3_sparc.deb libxslt (1.1.19-3) stable-security; urgency=high * CVE-2008-2935 stable/main/binary-s390/libxslt1-dev_1.1.19-3_s390.deb stable/main/binary-s390/libxslt1-dbg_1.1.19-3_s390.deb stable/main/binary-s390/xsltproc_1.1.19-3_s390.deb stable/main/binary-s390/libxslt1.1_1.1.19-3_s390.deb stable/main/binary-s390/python-libxslt1_1.1.19-3_s390.deb libxslt (1.1.19-3) stable-security; urgency=high * CVE-2008-2935 stable/main/binary-powerpc/libxslt1.1_1.1.19-3_powerpc.deb stable/main/binary-powerpc/python-libxslt1_1.1.19-3_powerpc.deb stable/main/binary-powerpc/libxslt1-dev_1.1.19-3_powerpc.deb stable/main/binary-powerpc/libxslt1-dbg_1.1.19-3_powerpc.deb stable/main/binary-powerpc/xsltproc_1.1.19-3_powerpc.deb libxslt (1.1.19-3) stable-security; urgency=high * CVE-2008-2935 stable/main/binary-mipsel/libxslt1-dev_1.1.19-3_mipsel.deb stable/main/binary-mipsel/libxslt1-dbg_1.1.19-3_mipsel.deb stable/main/binary-mipsel/xsltproc_1.1.19-3_mipsel.deb stable/main/binary-mipsel/python-libxslt1_1.1.19-3_mipsel.deb stable/main/binary-mipsel/libxslt1.1_1.1.19-3_mipsel.deb libxslt (1.1.19-3) stable-security; urgency=high * CVE-2008-2935 stable/main/binary-mips/libxslt1-dev_1.1.19-3_mips.deb stable/main/binary-mips/libxslt1-dbg_1.1.19-3_mips.deb stable/main/binary-mips/python-libxslt1_1.1.19-3_mips.deb stable/main/binary-mips/libxslt1.1_1.1.19-3_mips.deb stable/main/binary-mips/xsltproc_1.1.19-3_mips.deb libxslt (1.1.19-3) stable-security; urgency=high * CVE-2008-2935 stable/main/binary-ia64/libxslt1-dev_1.1.19-3_ia64.deb stable/main/binary-ia64/xsltproc_1.1.19-3_ia64.deb stable/main/binary-ia64/libxslt1-dbg_1.1.19-3_ia64.deb stable/main/binary-ia64/python-libxslt1_1.1.19-3_ia64.deb stable/main/binary-ia64/libxslt1.1_1.1.19-3_ia64.deb libxslt (1.1.19-3) stable-security; urgency=high * CVE-2008-2935 stable/main/binary-hppa/libxslt1-dev_1.1.19-3_hppa.deb stable/main/binary-hppa/libxslt1.1_1.1.19-3_hppa.deb stable/main/binary-hppa/xsltproc_1.1.19-3_hppa.deb stable/main/binary-hppa/libxslt1-dbg_1.1.19-3_hppa.deb stable/main/binary-hppa/python-libxslt1_1.1.19-3_hppa.deb libxslt (1.1.19-3) stable-security; urgency=high * CVE-2008-2935 stable/main/binary-arm/xsltproc_1.1.19-3_arm.deb stable/main/binary-arm/libxslt1-dbg_1.1.19-3_arm.deb stable/main/binary-arm/libxslt1-dev_1.1.19-3_arm.deb stable/main/binary-arm/libxslt1.1_1.1.19-3_arm.deb stable/main/binary-arm/python-libxslt1_1.1.19-3_arm.deb libxslt (1.1.19-3) stable-security; urgency=high * CVE-2008-2935 stable/main/binary-amd64/libxslt1-dev_1.1.19-3_amd64.deb stable/main/binary-amd64/libxslt1.1_1.1.19-3_amd64.deb stable/main/binary-amd64/libxslt1-dbg_1.1.19-3_amd64.deb stable/main/binary-amd64/xsltproc_1.1.19-3_amd64.deb stable/main/binary-amd64/python-libxslt1_1.1.19-3_amd64.deb libxslt (1.1.19-3) stable-security; urgency=high * CVE-2008-2935 stable/main/binary-alpha/xsltproc_1.1.19-3_alpha.deb stable/main/binary-alpha/libxslt1-dbg_1.1.19-3_alpha.deb stable/main/binary-alpha/libxslt1-dev_1.1.19-3_alpha.deb stable/main/binary-alpha/libxslt1.1_1.1.19-3_alpha.deb stable/main/binary-alpha/python-libxslt1_1.1.19-3_alpha.deb libxslt (1.1.19-3) stable-security; urgency=high * CVE-2008-2935 stable/main/binary-i386/xsltproc_1.1.19-3_i386.deb stable/main/binary-i386/libxslt1-dev_1.1.19-3_i386.deb stable/main/binary-i386/libxslt1.1_1.1.19-3_i386.deb stable/main/source/libxslt_1.1.19-3.diff.gz stable/main/binary-i386/python-libxslt1_1.1.19-3_i386.deb stable/main/binary-i386/libxslt1-dbg_1.1.19-3_i386.deb stable/main/source/libxslt_1.1.19-3.dsc libxslt (1.1.19-3) stable-security; urgency=high * CVE-2008-2935 stable/main/binary-sparc/libxml2-utils_2.6.27.dfsg-5_sparc.deb stable/main/binary-sparc/libxml2_2.6.27.dfsg-5_sparc.deb stable/main/binary-sparc/libxml2-dev_2.6.27.dfsg-5_sparc.deb stable/main/binary-sparc/libxml2-dbg_2.6.27.dfsg-5_sparc.deb stable/main/binary-sparc/python-libxml2_2.6.27.dfsg-5_sparc.deb libxml2 (2.6.27.dfsg-5) stable-security; urgency=low * Fix regressions due to previous security fixes. Fixes: CVE-2008-3529. Closes: #498768. stable/main/binary-s390/libxml2-utils_2.6.27.dfsg-5_s390.deb stable/main/binary-s390/libxml2_2.6.27.dfsg-5_s390.deb stable/main/binary-s390/libxml2-dev_2.6.27.dfsg-5_s390.deb stable/main/binary-s390/libxml2-dbg_2.6.27.dfsg-5_s390.deb stable/main/binary-s390/python-libxml2_2.6.27.dfsg-5_s390.deb libxml2 (2.6.27.dfsg-5) stable-security; urgency=low * Fix regressions due to previous security fixes. Fixes: CVE-2008-3529. Closes: #498768. stable/main/binary-powerpc/libxml2-dbg_2.6.27.dfsg-5_powerpc.deb stable/main/binary-powerpc/libxml2_2.6.27.dfsg-5_powerpc.deb stable/main/binary-powerpc/python-libxml2_2.6.27.dfsg-5_powerpc.deb stable/main/binary-powerpc/libxml2-utils_2.6.27.dfsg-5_powerpc.deb stable/main/binary-powerpc/libxml2-dev_2.6.27.dfsg-5_powerpc.deb libxml2 (2.6.27.dfsg-5) stable-security; urgency=low * Fix regressions due to previous security fixes. Fixes: CVE-2008-3529. Closes: #498768. stable/main/binary-mipsel/libxml2-utils_2.6.27.dfsg-5_mipsel.deb stable/main/binary-mipsel/libxml2-dev_2.6.27.dfsg-5_mipsel.deb stable/main/binary-mipsel/libxml2_2.6.27.dfsg-5_mipsel.deb stable/main/binary-mipsel/libxml2-dbg_2.6.27.dfsg-5_mipsel.deb stable/main/binary-mipsel/python-libxml2_2.6.27.dfsg-5_mipsel.deb libxml2 (2.6.27.dfsg-5) stable-security; urgency=low * Fix regressions due to previous security fixes. Fixes: CVE-2008-3529. Closes: #498768. stable/main/binary-mips/libxml2-utils_2.6.27.dfsg-5_mips.deb stable/main/binary-mips/libxml2_2.6.27.dfsg-5_mips.deb stable/main/binary-mips/libxml2-dbg_2.6.27.dfsg-5_mips.deb stable/main/binary-mips/libxml2-dev_2.6.27.dfsg-5_mips.deb stable/main/binary-mips/python-libxml2_2.6.27.dfsg-5_mips.deb libxml2 (2.6.27.dfsg-5) stable-security; urgency=low * Fix regressions due to previous security fixes. Fixes: CVE-2008-3529. Closes: #498768. stable/main/binary-ia64/libxml2-dev_2.6.27.dfsg-5_ia64.deb stable/main/binary-ia64/libxml2-dbg_2.6.27.dfsg-5_ia64.deb stable/main/binary-ia64/libxml2_2.6.27.dfsg-5_ia64.deb stable/main/binary-ia64/libxml2-utils_2.6.27.dfsg-5_ia64.deb stable/main/binary-ia64/python-libxml2_2.6.27.dfsg-5_ia64.deb libxml2 (2.6.27.dfsg-5) stable-security; urgency=low * Fix regressions due to previous security fixes. Fixes: CVE-2008-3529. Closes: #498768. stable/main/binary-i386/libxml2_2.6.27.dfsg-5_i386.deb stable/main/binary-i386/python-libxml2_2.6.27.dfsg-5_i386.deb stable/main/binary-i386/libxml2-dev_2.6.27.dfsg-5_i386.deb stable/main/binary-i386/libxml2-dbg_2.6.27.dfsg-5_i386.deb stable/main/binary-i386/libxml2-utils_2.6.27.dfsg-5_i386.deb libxml2 (2.6.27.dfsg-5) stable-security; urgency=low * Fix regressions due to previous security fixes. Fixes: CVE-2008-3529. Closes: #498768. stable/main/binary-hppa/libxml2-dev_2.6.27.dfsg-5_hppa.deb stable/main/binary-hppa/libxml2_2.6.27.dfsg-5_hppa.deb stable/main/binary-hppa/python-libxml2_2.6.27.dfsg-5_hppa.deb stable/main/binary-hppa/libxml2-dbg_2.6.27.dfsg-5_hppa.deb stable/main/binary-hppa/libxml2-utils_2.6.27.dfsg-5_hppa.deb libxml2 (2.6.27.dfsg-5) stable-security; urgency=low * Fix regressions due to previous security fixes. Fixes: CVE-2008-3529. Closes: #498768. stable/main/binary-arm/libxml2_2.6.27.dfsg-5_arm.deb stable/main/binary-arm/libxml2-utils_2.6.27.dfsg-5_arm.deb stable/main/binary-arm/libxml2-dev_2.6.27.dfsg-5_arm.deb stable/main/binary-arm/libxml2-dbg_2.6.27.dfsg-5_arm.deb stable/main/binary-arm/python-libxml2_2.6.27.dfsg-5_arm.deb libxml2 (2.6.27.dfsg-5) stable-security; urgency=low * Fix regressions due to previous security fixes. Fixes: CVE-2008-3529. Closes: #498768. stable/main/binary-alpha/libxml2_2.6.27.dfsg-5_alpha.deb stable/main/binary-alpha/libxml2-dbg_2.6.27.dfsg-5_alpha.deb stable/main/binary-alpha/python-libxml2_2.6.27.dfsg-5_alpha.deb stable/main/binary-alpha/libxml2-utils_2.6.27.dfsg-5_alpha.deb stable/main/binary-alpha/libxml2-dev_2.6.27.dfsg-5_alpha.deb libxml2 (2.6.27.dfsg-5) stable-security; urgency=low * Fix regressions due to previous security fixes. Fixes: CVE-2008-3529. Closes: #498768. stable/main/source/libxml2_2.6.27.dfsg-5.diff.gz stable/main/binary-amd64/libxml2-utils_2.6.27.dfsg-5_amd64.deb stable/main/binary-amd64/python-libxml2_2.6.27.dfsg-5_amd64.deb stable/main/binary-amd64/libxml2_2.6.27.dfsg-5_amd64.deb stable/main/binary-all/libxml2-doc_2.6.27.dfsg-5_all.deb stable/main/source/libxml2_2.6.27.dfsg-5.dsc stable/main/binary-amd64/libxml2-dev_2.6.27.dfsg-5_amd64.deb stable/main/binary-amd64/libxml2-dbg_2.6.27.dfsg-5_amd64.deb libxml2 (2.6.27.dfsg-5) stable-security; urgency=low * Fix regressions due to previous security fixes. Fixes: CVE-2008-3529. Closes: #498768. stable/main/binary-sparc/libpam-pwdfile_0.99-3etch1_sparc.deb libpam-pwdfile (0.99-3etch1) stable; urgency=low * Non-maintainer upload. * Link using gcc instead of ld (closes: #499203). * Mark the pam_sm_* functions as __attribute__((visibility("default"))) and build with -fvisibility=hidden. stable/main/binary-s390/libpam-pwdfile_0.99-3etch1_s390.deb libpam-pwdfile (0.99-3etch1) stable; urgency=low * Non-maintainer upload. * Link using gcc instead of ld (closes: #499203). * Mark the pam_sm_* functions as __attribute__((visibility("default"))) and build with -fvisibility=hidden. stable/main/binary-powerpc/libpam-pwdfile_0.99-3etch1_powerpc.deb libpam-pwdfile (0.99-3etch1) stable; urgency=low * Non-maintainer upload. * Link using gcc instead of ld (closes: #499203). * Mark the pam_sm_* functions as __attribute__((visibility("default"))) and build with -fvisibility=hidden. stable/main/binary-mipsel/libpam-pwdfile_0.99-3etch1_mipsel.deb libpam-pwdfile (0.99-3etch1) stable; urgency=low * Non-maintainer upload. * Link using gcc instead of ld (closes: #499203). * Mark the pam_sm_* functions as __attribute__((visibility("default"))) and build with -fvisibility=hidden. stable/main/binary-mips/libpam-pwdfile_0.99-3etch1_mips.deb libpam-pwdfile (0.99-3etch1) stable; urgency=low * Non-maintainer upload. * Link using gcc instead of ld (closes: #499203). * Mark the pam_sm_* functions as __attribute__((visibility("default"))) and build with -fvisibility=hidden. stable/main/binary-ia64/libpam-pwdfile_0.99-3etch1_ia64.deb libpam-pwdfile (0.99-3etch1) stable; urgency=low * Non-maintainer upload. * Link using gcc instead of ld (closes: #499203). * Mark the pam_sm_* functions as __attribute__((visibility("default"))) and build with -fvisibility=hidden. stable/main/binary-hppa/libpam-pwdfile_0.99-3etch1_hppa.deb libpam-pwdfile (0.99-3etch1) stable; urgency=low * Non-maintainer upload. * Link using gcc instead of ld (closes: #499203). * Mark the pam_sm_* functions as __attribute__((visibility("default"))) and build with -fvisibility=hidden. stable/main/binary-arm/libpam-pwdfile_0.99-3etch1_arm.deb libpam-pwdfile (0.99-3etch1) stable; urgency=low * Non-maintainer upload. * Link using gcc instead of ld (closes: #499203). * Mark the pam_sm_* functions as __attribute__((visibility("default"))) and build with -fvisibility=hidden. stable/main/binary-amd64/libpam-pwdfile_0.99-3etch1_amd64.deb libpam-pwdfile (0.99-3etch1) stable; urgency=low * Non-maintainer upload. * Link using gcc instead of ld (closes: #499203). * Mark the pam_sm_* functions as __attribute__((visibility("default"))) and build with -fvisibility=hidden. stable/main/binary-alpha/libpam-pwdfile_0.99-3etch1_alpha.deb libpam-pwdfile (0.99-3etch1) stable; urgency=low * Non-maintainer upload. * Link using gcc instead of ld (closes: #499203). * Mark the pam_sm_* functions as __attribute__((visibility("default"))) and build with -fvisibility=hidden. stable/main/binary-i386/libpam-pwdfile_0.99-3etch1_i386.deb stable/main/source/libpam-pwdfile_0.99-3etch1.diff.gz stable/main/source/libpam-pwdfile_0.99-3etch1.dsc libpam-pwdfile (0.99-3etch1) stable; urgency=low * Non-maintainer upload. * Link using gcc instead of ld (closes: #499203). * Mark the pam_sm_* functions as __attribute__((visibility("default"))) and build with -fvisibility=hidden. stable/main/binary-sparc/jumpnbump_1.50-6+etch1_sparc.deb jumpnbump (1.50-6+etch1) stable; urgency=high * Update for etch to address a security issue. * Fix insecure handling of /tmp (Closes: #500611) * Set Maintainer to Debian Games Team, add Francois Marier and myself as Uploaders (same as in unstable) stable/main/binary-s390/jumpnbump_1.50-6+etch1_s390.deb jumpnbump (1.50-6+etch1) stable; urgency=high * Update for etch to address a security issue. * Fix insecure handling of /tmp (Closes: #500611) * Set Maintainer to Debian Games Team, add Francois Marier and myself as Uploaders (same as in unstable) stable/main/binary-mipsel/jumpnbump_1.50-6+etch1_mipsel.deb jumpnbump (1.50-6+etch1) stable; urgency=high * Update for etch to address a security issue. * Fix insecure handling of /tmp (Closes: #500611) * Set Maintainer to Debian Games Team, add Francois Marier and myself as Uploaders (same as in unstable) stable/main/binary-mips/jumpnbump_1.50-6+etch1_mips.deb jumpnbump (1.50-6+etch1) stable; urgency=high * Update for etch to address a security issue. * Fix insecure handling of /tmp (Closes: #500611) * Set Maintainer to Debian Games Team, add Francois Marier and myself as Uploaders (same as in unstable) stable/main/binary-ia64/jumpnbump_1.50-6+etch1_ia64.deb jumpnbump (1.50-6+etch1) stable; urgency=high * Update for etch to address a security issue. * Fix insecure handling of /tmp (Closes: #500611) * Set Maintainer to Debian Games Team, add Francois Marier and myself as Uploaders (same as in unstable) stable/main/binary-i386/jumpnbump_1.50-6+etch1_i386.deb jumpnbump (1.50-6+etch1) stable; urgency=high * Update for etch to address a security issue. * Fix insecure handling of /tmp (Closes: #500611) * Set Maintainer to Debian Games Team, add Francois Marier and myself as Uploaders (same as in unstable) stable/main/binary-hppa/jumpnbump_1.50-6+etch1_hppa.deb jumpnbump (1.50-6+etch1) stable; urgency=high * Update for etch to address a security issue. * Fix insecure handling of /tmp (Closes: #500611) * Set Maintainer to Debian Games Team, add Francois Marier and myself as Uploaders (same as in unstable) stable/main/binary-arm/jumpnbump_1.50-6+etch1_arm.deb jumpnbump (1.50-6+etch1) stable; urgency=high * Update for etch to address a security issue. * Fix insecure handling of /tmp (Closes: #500611) * Set Maintainer to Debian Games Team, add Francois Marier and myself as Uploaders (same as in unstable) stable/main/binary-amd64/jumpnbump_1.50-6+etch1_amd64.deb jumpnbump (1.50-6+etch1) stable; urgency=high * Update for etch to address a security issue. * Fix insecure handling of /tmp (Closes: #500611) * Set Maintainer to Debian Games Team, add Francois Marier and myself as Uploaders (same as in unstable) stable/main/binary-alpha/jumpnbump_1.50-6+etch1_alpha.deb jumpnbump (1.50-6+etch1) stable; urgency=high * Update for etch to address a security issue. * Fix insecure handling of /tmp (Closes: #500611) * Set Maintainer to Debian Games Team, add Francois Marier and myself as Uploaders (same as in unstable) stable/main/source/jumpnbump_1.50-6+etch1.dsc stable/main/binary-powerpc/jumpnbump_1.50-6+etch1_powerpc.deb stable/main/source/jumpnbump_1.50-6+etch1.diff.gz jumpnbump (1.50-6+etch1) stable; urgency=high * Update for etch to address a security issue. * Fix insecure handling of /tmp (Closes: #500611) * Set Maintainer to Debian Games Team, add Francois Marier and myself as Uploaders (same as in unstable) stable/main/binary-sparc/irqbalance_0.12-7etch1_sparc.deb irqbalance (0.12-7etch1) stable; urgency=low * Non maintainer upload. * irqbalance would segfault on startup when /proc/interrupts contains an interrupt with a number of 256 or larger, since internally it stored data in a fixed-length array. Newer versions (say 0.55) have replaced the data structure with a list so this is fixed there. For now we just skip interrupts with such high numbers, since it's the least invasive approach during the stable cycle (closes: #500985). stable/main/binary-s390/irqbalance_0.12-7etch1_s390.deb irqbalance (0.12-7etch1) stable; urgency=low * Non maintainer upload. * irqbalance would segfault on startup when /proc/interrupts contains an interrupt with a number of 256 or larger, since internally it stored data in a fixed-length array. Newer versions (say 0.55) have replaced the data structure with a list so this is fixed there. For now we just skip interrupts with such high numbers, since it's the least invasive approach during the stable cycle (closes: #500985). stable/main/binary-powerpc/irqbalance_0.12-7etch1_powerpc.deb irqbalance (0.12-7etch1) stable; urgency=low * Non maintainer upload. * irqbalance would segfault on startup when /proc/interrupts contains an interrupt with a number of 256 or larger, since internally it stored data in a fixed-length array. Newer versions (say 0.55) have replaced the data structure with a list so this is fixed there. For now we just skip interrupts with such high numbers, since it's the least invasive approach during the stable cycle (closes: #500985). stable/main/binary-mipsel/irqbalance_0.12-7etch1_mipsel.deb irqbalance (0.12-7etch1) stable; urgency=low * Non maintainer upload. * irqbalance would segfault on startup when /proc/interrupts contains an interrupt with a number of 256 or larger, since internally it stored data in a fixed-length array. Newer versions (say 0.55) have replaced the data structure with a list so this is fixed there. For now we just skip interrupts with such high numbers, since it's the least invasive approach during the stable cycle (closes: #500985). stable/main/binary-mips/irqbalance_0.12-7etch1_mips.deb irqbalance (0.12-7etch1) stable; urgency=low * Non maintainer upload. * irqbalance would segfault on startup when /proc/interrupts contains an interrupt with a number of 256 or larger, since internally it stored data in a fixed-length array. Newer versions (say 0.55) have replaced the data structure with a list so this is fixed there. For now we just skip interrupts with such high numbers, since it's the least invasive approach during the stable cycle (closes: #500985). stable/main/binary-ia64/irqbalance_0.12-7etch1_ia64.deb irqbalance (0.12-7etch1) stable; urgency=low * Non maintainer upload. * irqbalance would segfault on startup when /proc/interrupts contains an interrupt with a number of 256 or larger, since internally it stored data in a fixed-length array. Newer versions (say 0.55) have replaced the data structure with a list so this is fixed there. For now we just skip interrupts with such high numbers, since it's the least invasive approach during the stable cycle (closes: #500985). stable/main/binary-hppa/irqbalance_0.12-7etch1_hppa.deb irqbalance (0.12-7etch1) stable; urgency=low * Non maintainer upload. * irqbalance would segfault on startup when /proc/interrupts contains an interrupt with a number of 256 or larger, since internally it stored data in a fixed-length array. Newer versions (say 0.55) have replaced the data structure with a list so this is fixed there. For now we just skip interrupts with such high numbers, since it's the least invasive approach during the stable cycle (closes: #500985). stable/main/binary-arm/irqbalance_0.12-7etch1_arm.deb irqbalance (0.12-7etch1) stable; urgency=low * Non maintainer upload. * irqbalance would segfault on startup when /proc/interrupts contains an interrupt with a number of 256 or larger, since internally it stored data in a fixed-length array. Newer versions (say 0.55) have replaced the data structure with a list so this is fixed there. For now we just skip interrupts with such high numbers, since it's the least invasive approach during the stable cycle (closes: #500985). stable/main/binary-amd64/irqbalance_0.12-7etch1_amd64.deb irqbalance (0.12-7etch1) stable; urgency=low * Non maintainer upload. * irqbalance would segfault on startup when /proc/interrupts contains an interrupt with a number of 256 or larger, since internally it stored data in a fixed-length array. Newer versions (say 0.55) have replaced the data structure with a list so this is fixed there. For now we just skip interrupts with such high numbers, since it's the least invasive approach during the stable cycle (closes: #500985). stable/main/binary-alpha/irqbalance_0.12-7etch1_alpha.deb irqbalance (0.12-7etch1) stable; urgency=low * Non maintainer upload. * irqbalance would segfault on startup when /proc/interrupts contains an interrupt with a number of 256 or larger, since internally it stored data in a fixed-length array. Newer versions (say 0.55) have replaced the data structure with a list so this is fixed there. For now we just skip interrupts with such high numbers, since it's the least invasive approach during the stable cycle (closes: #500985). stable/main/source/irqbalance_0.12-7etch1.dsc stable/main/binary-i386/irqbalance_0.12-7etch1_i386.deb stable/main/source/irqbalance_0.12-7etch1.diff.gz irqbalance (0.12-7etch1) stable; urgency=low * Non maintainer upload. * irqbalance would segfault on startup when /proc/interrupts contains an interrupt with a number of 256 or larger, since internally it stored data in a fixed-length array. Newer versions (say 0.55) have replaced the data structure with a list so this is fixed there. For now we just skip interrupts with such high numbers, since it's the least invasive approach during the stable cycle (closes: #500985). stable/main/binary-sparc/iceweasel-dbg_2.0.0.17-0etch1_sparc.deb stable/main/binary-sparc/iceweasel-gnome-support_2.0.0.17-0etch1_sparc.deb stable/main/binary-sparc/iceweasel_2.0.0.17-0etch1_sparc.deb iceweasel (2.0.0.17-0etch1) stable-security; urgency=critical * New upstream security release. * Fixes mfsa 2008-37 aka CVE-2008-0016; mfsa 2008-38 aka CVE-2008-3835; mfsa 2008-39 aka CVE-2008-3836; mfsa 2008-40 aka CVE-2008-3837; mfsa 2008-41 aka CVE-2008-4058, CVE-2008-4059 and CVE-2008-4060; mfsa 2008-42 aka CVE-2008-4061 and CVE-2008-4062; mfsa 2008-43 aka CVE-2008-4065 and CVE-2008-4066; mfsa 2008-44 aka CVE-2008-4067 and CVE-2008-4068; mfsa 2008-45 aka CVE-2008-4069. (Closes: #501195) stable/main/binary-s390/iceweasel_2.0.0.17-0etch1_s390.deb stable/main/binary-s390/iceweasel-dbg_2.0.0.17-0etch1_s390.deb stable/main/binary-s390/iceweasel-gnome-support_2.0.0.17-0etch1_s390.deb iceweasel (2.0.0.17-0etch1) stable-security; urgency=critical * New upstream security release. * Fixes mfsa 2008-37 aka CVE-2008-0016; mfsa 2008-38 aka CVE-2008-3835; mfsa 2008-39 aka CVE-2008-3836; mfsa 2008-40 aka CVE-2008-3837; mfsa 2008-41 aka CVE-2008-4058, CVE-2008-4059 and CVE-2008-4060; mfsa 2008-42 aka CVE-2008-4061 and CVE-2008-4062; mfsa 2008-43 aka CVE-2008-4065 and CVE-2008-4066; mfsa 2008-44 aka CVE-2008-4067 and CVE-2008-4068; mfsa 2008-45 aka CVE-2008-4069. (Closes: #501195) stable/main/binary-powerpc/iceweasel_2.0.0.17-0etch1_powerpc.deb stable/main/binary-powerpc/iceweasel-dbg_2.0.0.17-0etch1_powerpc.deb stable/main/binary-powerpc/iceweasel-gnome-support_2.0.0.17-0etch1_powerpc.deb iceweasel (2.0.0.17-0etch1) stable-security; urgency=critical * New upstream security release. * Fixes mfsa 2008-37 aka CVE-2008-0016; mfsa 2008-38 aka CVE-2008-3835; mfsa 2008-39 aka CVE-2008-3836; mfsa 2008-40 aka CVE-2008-3837; mfsa 2008-41 aka CVE-2008-4058, CVE-2008-4059 and CVE-2008-4060; mfsa 2008-42 aka CVE-2008-4061 and CVE-2008-4062; mfsa 2008-43 aka CVE-2008-4065 and CVE-2008-4066; mfsa 2008-44 aka CVE-2008-4067 and CVE-2008-4068; mfsa 2008-45 aka CVE-2008-4069. (Closes: #501195) stable/main/binary-mipsel/iceweasel-gnome-support_2.0.0.17-0etch1_mipsel.deb stable/main/binary-mipsel/iceweasel_2.0.0.17-0etch1_mipsel.deb stable/main/binary-mipsel/iceweasel-dbg_2.0.0.17-0etch1_mipsel.deb iceweasel (2.0.0.17-0etch1) stable-security; urgency=critical * New upstream security release. * Fixes mfsa 2008-37 aka CVE-2008-0016; mfsa 2008-38 aka CVE-2008-3835; mfsa 2008-39 aka CVE-2008-3836; mfsa 2008-40 aka CVE-2008-3837; mfsa 2008-41 aka CVE-2008-4058, CVE-2008-4059 and CVE-2008-4060; mfsa 2008-42 aka CVE-2008-4061 and CVE-2008-4062; mfsa 2008-43 aka CVE-2008-4065 and CVE-2008-4066; mfsa 2008-44 aka CVE-2008-4067 and CVE-2008-4068; mfsa 2008-45 aka CVE-2008-4069. (Closes: #501195) stable/main/binary-mips/iceweasel_2.0.0.17-0etch1_mips.deb stable/main/binary-mips/iceweasel-gnome-support_2.0.0.17-0etch1_mips.deb stable/main/binary-mips/iceweasel-dbg_2.0.0.17-0etch1_mips.deb iceweasel (2.0.0.17-0etch1) stable-security; urgency=critical * New upstream security release. * Fixes mfsa 2008-37 aka CVE-2008-0016; mfsa 2008-38 aka CVE-2008-3835; mfsa 2008-39 aka CVE-2008-3836; mfsa 2008-40 aka CVE-2008-3837; mfsa 2008-41 aka CVE-2008-4058, CVE-2008-4059 and CVE-2008-4060; mfsa 2008-42 aka CVE-2008-4061 and CVE-2008-4062; mfsa 2008-43 aka CVE-2008-4065 and CVE-2008-4066; mfsa 2008-44 aka CVE-2008-4067 and CVE-2008-4068; mfsa 2008-45 aka CVE-2008-4069. (Closes: #501195) stable/main/binary-ia64/iceweasel_2.0.0.17-0etch1_ia64.deb stable/main/binary-ia64/iceweasel-gnome-support_2.0.0.17-0etch1_ia64.deb stable/main/binary-ia64/iceweasel-dbg_2.0.0.17-0etch1_ia64.deb iceweasel (2.0.0.17-0etch1) stable-security; urgency=critical * New upstream security release. * Fixes mfsa 2008-37 aka CVE-2008-0016; mfsa 2008-38 aka CVE-2008-3835; mfsa 2008-39 aka CVE-2008-3836; mfsa 2008-40 aka CVE-2008-3837; mfsa 2008-41 aka CVE-2008-4058, CVE-2008-4059 and CVE-2008-4060; mfsa 2008-42 aka CVE-2008-4061 and CVE-2008-4062; mfsa 2008-43 aka CVE-2008-4065 and CVE-2008-4066; mfsa 2008-44 aka CVE-2008-4067 and CVE-2008-4068; mfsa 2008-45 aka CVE-2008-4069. (Closes: #501195) stable/main/binary-i386/iceweasel-dbg_2.0.0.17-0etch1_i386.deb stable/main/binary-i386/iceweasel-gnome-support_2.0.0.17-0etch1_i386.deb stable/main/binary-i386/iceweasel_2.0.0.17-0etch1_i386.deb iceweasel (2.0.0.17-0etch1) stable-security; urgency=critical * New upstream security release. * Fixes mfsa 2008-37 aka CVE-2008-0016; mfsa 2008-38 aka CVE-2008-3835; mfsa 2008-39 aka CVE-2008-3836; mfsa 2008-40 aka CVE-2008-3837; mfsa 2008-41 aka CVE-2008-4058, CVE-2008-4059 and CVE-2008-4060; mfsa 2008-42 aka CVE-2008-4061 and CVE-2008-4062; mfsa 2008-43 aka CVE-2008-4065 and CVE-2008-4066; mfsa 2008-44 aka CVE-2008-4067 and CVE-2008-4068; mfsa 2008-45 aka CVE-2008-4069. (Closes: #501195) stable/main/binary-hppa/iceweasel_2.0.0.17-0etch1_hppa.deb stable/main/binary-hppa/iceweasel-gnome-support_2.0.0.17-0etch1_hppa.deb stable/main/binary-hppa/iceweasel-dbg_2.0.0.17-0etch1_hppa.deb iceweasel (2.0.0.17-0etch1) stable-security; urgency=critical * New upstream security release. * Fixes mfsa 2008-37 aka CVE-2008-0016; mfsa 2008-38 aka CVE-2008-3835; mfsa 2008-39 aka CVE-2008-3836; mfsa 2008-40 aka CVE-2008-3837; mfsa 2008-41 aka CVE-2008-4058, CVE-2008-4059 and CVE-2008-4060; mfsa 2008-42 aka CVE-2008-4061 and CVE-2008-4062; mfsa 2008-43 aka CVE-2008-4065 and CVE-2008-4066; mfsa 2008-44 aka CVE-2008-4067 and CVE-2008-4068; mfsa 2008-45 aka CVE-2008-4069. (Closes: #501195) stable/main/binary-arm/iceweasel-dbg_2.0.0.17-0etch1_arm.deb stable/main/binary-arm/iceweasel-gnome-support_2.0.0.17-0etch1_arm.deb stable/main/binary-arm/iceweasel_2.0.0.17-0etch1_arm.deb iceweasel (2.0.0.17-0etch1) stable-security; urgency=critical * New upstream security release. * Fixes mfsa 2008-37 aka CVE-2008-0016; mfsa 2008-38 aka CVE-2008-3835; mfsa 2008-39 aka CVE-2008-3836; mfsa 2008-40 aka CVE-2008-3837; mfsa 2008-41 aka CVE-2008-4058, CVE-2008-4059 and CVE-2008-4060; mfsa 2008-42 aka CVE-2008-4061 and CVE-2008-4062; mfsa 2008-43 aka CVE-2008-4065 and CVE-2008-4066; mfsa 2008-44 aka CVE-2008-4067 and CVE-2008-4068; mfsa 2008-45 aka CVE-2008-4069. (Closes: #501195) stable/main/binary-alpha/iceweasel_2.0.0.17-0etch1_alpha.deb stable/main/binary-alpha/iceweasel-dbg_2.0.0.17-0etch1_alpha.deb stable/main/binary-alpha/iceweasel-gnome-support_2.0.0.17-0etch1_alpha.deb iceweasel (2.0.0.17-0etch1) stable-security; urgency=critical * New upstream security release. * Fixes mfsa 2008-37 aka CVE-2008-0016; mfsa 2008-38 aka CVE-2008-3835; mfsa 2008-39 aka CVE-2008-3836; mfsa 2008-40 aka CVE-2008-3837; mfsa 2008-41 aka CVE-2008-4058, CVE-2008-4059 and CVE-2008-4060; mfsa 2008-42 aka CVE-2008-4061 and CVE-2008-4062; mfsa 2008-43 aka CVE-2008-4065 and CVE-2008-4066; mfsa 2008-44 aka CVE-2008-4067 and CVE-2008-4068; mfsa 2008-45 aka CVE-2008-4069. (Closes: #501195) stable/main/binary-all/firefox_2.0.0.17-0etch1_all.deb stable/main/binary-all/firefox-dom-inspector_2.0.0.17-0etch1_all.deb stable/main/binary-all/mozilla-firefox-dom-inspector_2.0.0.17-0etch1_all.deb stable/main/binary-amd64/iceweasel_2.0.0.17-0etch1_amd64.deb stable/main/binary-amd64/iceweasel-gnome-support_2.0.0.17-0etch1_amd64.deb stable/main/binary-all/mozilla-firefox-gnome-support_2.0.0.17-0etch1_all.deb stable/main/binary-amd64/iceweasel-dbg_2.0.0.17-0etch1_amd64.deb stable/main/source/iceweasel_2.0.0.17-0etch1.diff.gz stable/main/source/iceweasel_2.0.0.17.orig.tar.gz stable/main/binary-all/iceweasel-dom-inspector_2.0.0.17-0etch1_all.deb stable/main/binary-all/mozilla-firefox_2.0.0.17-0etch1_all.deb stable/main/binary-all/firefox-gnome-support_2.0.0.17-0etch1_all.deb stable/main/source/iceweasel_2.0.0.17-0etch1.dsc iceweasel (2.0.0.17-0etch1) stable-security; urgency=critical * New upstream security release. * Fixes mfsa 2008-37 aka CVE-2008-0016; mfsa 2008-38 aka CVE-2008-3835; mfsa 2008-39 aka CVE-2008-3836; mfsa 2008-40 aka CVE-2008-3837; mfsa 2008-41 aka CVE-2008-4058, CVE-2008-4059 and CVE-2008-4060; mfsa 2008-42 aka CVE-2008-4061 and CVE-2008-4062; mfsa 2008-43 aka CVE-2008-4065 and CVE-2008-4066; mfsa 2008-44 aka CVE-2008-4067 and CVE-2008-4068; mfsa 2008-45 aka CVE-2008-4069. (Closes: #501195) stable/main/binary-sparc/icedove-gnome-support_1.5.0.13+1.5.0.15b.dfsg1+prepatch080614d-0etch1_sparc.deb stable/main/binary-sparc/icedove-dbg_1.5.0.13+1.5.0.15b.dfsg1+prepatch080614d-0etch1_sparc.deb stable/main/binary-sparc/icedove_1.5.0.13+1.5.0.15b.dfsg1+prepatch080614d-0etch1_sparc.deb stable/main/binary-sparc/icedove-typeaheadfind_1.5.0.13+1.5.0.15b.dfsg1+prepatch080614d-0etch1_sparc.deb stable/main/binary-sparc/icedove-dev_1.5.0.13+1.5.0.15b.dfsg1+prepatch080614d-0etch1_sparc.deb stable/main/binary-sparc/icedove-inspector_1.5.0.13+1.5.0.15b.dfsg1+prepatch080614d-0etch1_sparc.deb icedove (1.5.0.13+1.5.0.15b.dfsg1+prepatch080614d-0etch1) stable-security; urgency=low * backports for thunderbird 2.0.0.16 stability/security update * MFSA 2008-21 aka CVE-2008-2798 - Crashes with evidence of memory corruption * MFSA 2008-21 aka CVE-2008-2799 - Crashes with evidence of memory corruption * MFSA 2008-24 aka CVE-2008-2802 - Chrome script loading from fastload file * MFSA 2008-25 aka CVE-2008-2803 - Arbitrary code execution in mozIJSSubScriptLoader.loadSubScript() * MFSA 2008-26 aka CVE-2008-0304 - (followup) Buffer length checks in MIME processing * MFSA 2008-29 aka CVE-2008-2807 - Faulty .properties file results in uninitialized memory being used * MFSA 2008-31 aka CVE-2008-2809 - Peer-trusted certs can use alt names to spoof * MFSA 2008-33 aka CVE-2008-2811 - Crash and remote code execution in block reflow * MFSA 2008-34 aka CVE-2008-2785 - Remote code execution by overflowing CSS reference counter * disable 10_visibility_hidden_patch.dpatch - which is now shipped in upstream tarball - update debian/patches/00list stable/main/binary-s390/icedove-inspector_1.5.0.13+1.5.0.15b.dfsg1+prepatch080614d-0etch1_s390.deb stable/main/binary-s390/icedove-dev_1.5.0.13+1.5.0.15b.dfsg1+prepatch080614d-0etch1_s390.deb stable/main/binary-s390/icedove-typeaheadfind_1.5.0.13+1.5.0.15b.dfsg1+prepatch080614d-0etch1_s390.deb stable/main/binary-s390/icedove-dbg_1.5.0.13+1.5.0.15b.dfsg1+prepatch080614d-0etch1_s390.deb stable/main/binary-s390/icedove_1.5.0.13+1.5.0.15b.dfsg1+prepatch080614d-0etch1_s390.deb stable/main/binary-s390/icedove-gnome-support_1.5.0.13+1.5.0.15b.dfsg1+prepatch080614d-0etch1_s390.deb icedove (1.5.0.13+1.5.0.15b.dfsg1+prepatch080614d-0etch1) stable-security; urgency=low * backports for thunderbird 2.0.0.16 stability/security update * MFSA 2008-21 aka CVE-2008-2798 - Crashes with evidence of memory corruption * MFSA 2008-21 aka CVE-2008-2799 - Crashes with evidence of memory corruption * MFSA 2008-24 aka CVE-2008-2802 - Chrome script loading from fastload file * MFSA 2008-25 aka CVE-2008-2803 - Arbitrary code execution in mozIJSSubScriptLoader.loadSubScript() * MFSA 2008-26 aka CVE-2008-0304 - (followup) Buffer length checks in MIME processing * MFSA 2008-29 aka CVE-2008-2807 - Faulty .properties file results in uninitialized memory being used * MFSA 2008-31 aka CVE-2008-2809 - Peer-trusted certs can use alt names to spoof * MFSA 2008-33 aka CVE-2008-2811 - Crash and remote code execution in block reflow * MFSA 2008-34 aka CVE-2008-2785 - Remote code execution by overflowing CSS reference counter * disable 10_visibility_hidden_patch.dpatch - which is now shipped in upstream tarball - update debian/patches/00list stable/main/binary-powerpc/icedove-inspector_1.5.0.13+1.5.0.15b.dfsg1+prepatch080614d-0etch1_powerpc.deb stable/main/binary-powerpc/icedove-dev_1.5.0.13+1.5.0.15b.dfsg1+prepatch080614d-0etch1_powerpc.deb stable/main/binary-powerpc/icedove-gnome-support_1.5.0.13+1.5.0.15b.dfsg1+prepatch080614d-0etch1_powerpc.deb stable/main/binary-powerpc/icedove-dbg_1.5.0.13+1.5.0.15b.dfsg1+prepatch080614d-0etch1_powerpc.deb stable/main/binary-powerpc/icedove-typeaheadfind_1.5.0.13+1.5.0.15b.dfsg1+prepatch080614d-0etch1_powerpc.deb stable/main/binary-powerpc/icedove_1.5.0.13+1.5.0.15b.dfsg1+prepatch080614d-0etch1_powerpc.deb icedove (1.5.0.13+1.5.0.15b.dfsg1+prepatch080614d-0etch1) stable-security; urgency=low * backports for thunderbird 2.0.0.16 stability/security update * MFSA 2008-21 aka CVE-2008-2798 - Crashes with evidence of memory corruption * MFSA 2008-21 aka CVE-2008-2799 - Crashes with evidence of memory corruption * MFSA 2008-24 aka CVE-2008-2802 - Chrome script loading from fastload file * MFSA 2008-25 aka CVE-2008-2803 - Arbitrary code execution in mozIJSSubScriptLoader.loadSubScript() * MFSA 2008-26 aka CVE-2008-0304 - (followup) Buffer length checks in MIME processing * MFSA 2008-29 aka CVE-2008-2807 - Faulty .properties file results in uninitialized memory being used * MFSA 2008-31 aka CVE-2008-2809 - Peer-trusted certs can use alt names to spoof * MFSA 2008-33 aka CVE-2008-2811 - Crash and remote code execution in block reflow * MFSA 2008-34 aka CVE-2008-2785 - Remote code execution by overflowing CSS reference counter * disable 10_visibility_hidden_patch.dpatch - which is now shipped in upstream tarball - update debian/patches/00list stable/main/binary-mipsel/icedove_1.5.0.13+1.5.0.15b.dfsg1+prepatch080614d-0etch1_mipsel.deb stable/main/binary-mipsel/icedove-typeaheadfind_1.5.0.13+1.5.0.15b.dfsg1+prepatch080614d-0etch1_mipsel.deb stable/main/binary-mipsel/icedove-dbg_1.5.0.13+1.5.0.15b.dfsg1+prepatch080614d-0etch1_mipsel.deb stable/main/binary-mipsel/icedove-gnome-support_1.5.0.13+1.5.0.15b.dfsg1+prepatch080614d-0etch1_mipsel.deb stable/main/binary-mipsel/icedove-dev_1.5.0.13+1.5.0.15b.dfsg1+prepatch080614d-0etch1_mipsel.deb stable/main/binary-mipsel/icedove-inspector_1.5.0.13+1.5.0.15b.dfsg1+prepatch080614d-0etch1_mipsel.deb icedove (1.5.0.13+1.5.0.15b.dfsg1+prepatch080614d-0etch1) stable-security; urgency=low * backports for thunderbird 2.0.0.16 stability/security update * MFSA 2008-21 aka CVE-2008-2798 - Crashes with evidence of memory corruption * MFSA 2008-21 aka CVE-2008-2799 - Crashes with evidence of memory corruption * MFSA 2008-24 aka CVE-2008-2802 - Chrome script loading from fastload file * MFSA 2008-25 aka CVE-2008-2803 - Arbitrary code execution in mozIJSSubScriptLoader.loadSubScript() * MFSA 2008-26 aka CVE-2008-0304 - (followup) Buffer length checks in MIME processing * MFSA 2008-29 aka CVE-2008-2807 - Faulty .properties file results in uninitialized memory being used * MFSA 2008-31 aka CVE-2008-2809 - Peer-trusted certs can use alt names to spoof * MFSA 2008-33 aka CVE-2008-2811 - Crash and remote code execution in block reflow * MFSA 2008-34 aka CVE-2008-2785 - Remote code execution by overflowing CSS reference counter * disable 10_visibility_hidden_patch.dpatch - which is now shipped in upstream tarball - update debian/patches/00list stable/main/binary-mips/icedove-dev_1.5.0.13+1.5.0.15b.dfsg1+prepatch080614d-0etch1_mips.deb stable/main/binary-mips/icedove_1.5.0.13+1.5.0.15b.dfsg1+prepatch080614d-0etch1_mips.deb stable/main/binary-mips/icedove-gnome-support_1.5.0.13+1.5.0.15b.dfsg1+prepatch080614d-0etch1_mips.deb stable/main/binary-mips/icedove-inspector_1.5.0.13+1.5.0.15b.dfsg1+prepatch080614d-0etch1_mips.deb stable/main/binary-mips/icedove-typeaheadfind_1.5.0.13+1.5.0.15b.dfsg1+prepatch080614d-0etch1_mips.deb stable/main/binary-mips/icedove-dbg_1.5.0.13+1.5.0.15b.dfsg1+prepatch080614d-0etch1_mips.deb icedove (1.5.0.13+1.5.0.15b.dfsg1+prepatch080614d-0etch1) stable-security; urgency=low * backports for thunderbird 2.0.0.16 stability/security update * MFSA 2008-21 aka CVE-2008-2798 - Crashes with evidence of memory corruption * MFSA 2008-21 aka CVE-2008-2799 - Crashes with evidence of memory corruption * MFSA 2008-24 aka CVE-2008-2802 - Chrome script loading from fastload file * MFSA 2008-25 aka CVE-2008-2803 - Arbitrary code execution in mozIJSSubScriptLoader.loadSubScript() * MFSA 2008-26 aka CVE-2008-0304 - (followup) Buffer length checks in MIME processing * MFSA 2008-29 aka CVE-2008-2807 - Faulty .properties file results in uninitialized memory being used * MFSA 2008-31 aka CVE-2008-2809 - Peer-trusted certs can use alt names to spoof * MFSA 2008-33 aka CVE-2008-2811 - Crash and remote code execution in block reflow * MFSA 2008-34 aka CVE-2008-2785 - Remote code execution by overflowing CSS reference counter * disable 10_visibility_hidden_patch.dpatch - which is now shipped in upstream tarball - update debian/patches/00list stable/main/binary-ia64/icedove-inspector_1.5.0.13+1.5.0.15b.dfsg1+prepatch080614d-0etch1_ia64.deb stable/main/binary-ia64/icedove-dbg_1.5.0.13+1.5.0.15b.dfsg1+prepatch080614d-0etch1_ia64.deb stable/main/binary-ia64/icedove-typeaheadfind_1.5.0.13+1.5.0.15b.dfsg1+prepatch080614d-0etch1_ia64.deb stable/main/binary-ia64/icedove-dev_1.5.0.13+1.5.0.15b.dfsg1+prepatch080614d-0etch1_ia64.deb stable/main/binary-ia64/icedove-gnome-support_1.5.0.13+1.5.0.15b.dfsg1+prepatch080614d-0etch1_ia64.deb stable/main/binary-ia64/icedove_1.5.0.13+1.5.0.15b.dfsg1+prepatch080614d-0etch1_ia64.deb icedove (1.5.0.13+1.5.0.15b.dfsg1+prepatch080614d-0etch1) stable-security; urgency=low * backports for thunderbird 2.0.0.16 stability/security update * MFSA 2008-21 aka CVE-2008-2798 - Crashes with evidence of memory corruption * MFSA 2008-21 aka CVE-2008-2799 - Crashes with evidence of memory corruption * MFSA 2008-24 aka CVE-2008-2802 - Chrome script loading from fastload file * MFSA 2008-25 aka CVE-2008-2803 - Arbitrary code execution in mozIJSSubScriptLoader.loadSubScript() * MFSA 2008-26 aka CVE-2008-0304 - (followup) Buffer length checks in MIME processing * MFSA 2008-29 aka CVE-2008-2807 - Faulty .properties file results in uninitialized memory being used * MFSA 2008-31 aka CVE-2008-2809 - Peer-trusted certs can use alt names to spoof * MFSA 2008-33 aka CVE-2008-2811 - Crash and remote code execution in block reflow * MFSA 2008-34 aka CVE-2008-2785 - Remote code execution by overflowing CSS reference counter * disable 10_visibility_hidden_patch.dpatch - which is now shipped in upstream tarball - update debian/patches/00list stable/main/binary-i386/icedove-inspector_1.5.0.13+1.5.0.15b.dfsg1+prepatch080614d-0etch1_i386.deb stable/main/binary-i386/icedove_1.5.0.13+1.5.0.15b.dfsg1+prepatch080614d-0etch1_i386.deb stable/main/binary-i386/icedove-gnome-support_1.5.0.13+1.5.0.15b.dfsg1+prepatch080614d-0etch1_i386.deb stable/main/binary-i386/icedove-dbg_1.5.0.13+1.5.0.15b.dfsg1+prepatch080614d-0etch1_i386.deb stable/main/binary-i386/icedove-typeaheadfind_1.5.0.13+1.5.0.15b.dfsg1+prepatch080614d-0etch1_i386.deb stable/main/binary-i386/icedove-dev_1.5.0.13+1.5.0.15b.dfsg1+prepatch080614d-0etch1_i386.deb icedove (1.5.0.13+1.5.0.15b.dfsg1+prepatch080614d-0etch1) stable-security; urgency=low * backports for thunderbird 2.0.0.16 stability/security update * MFSA 2008-21 aka CVE-2008-2798 - Crashes with evidence of memory corruption * MFSA 2008-21 aka CVE-2008-2799 - Crashes with evidence of memory corruption * MFSA 2008-24 aka CVE-2008-2802 - Chrome script loading from fastload file * MFSA 2008-25 aka CVE-2008-2803 - Arbitrary code execution in mozIJSSubScriptLoader.loadSubScript() * MFSA 2008-26 aka CVE-2008-0304 - (followup) Buffer length checks in MIME processing * MFSA 2008-29 aka CVE-2008-2807 - Faulty .properties file results in uninitialized memory being used * MFSA 2008-31 aka CVE-2008-2809 - Peer-trusted certs can use alt names to spoof * MFSA 2008-33 aka CVE-2008-2811 - Crash and remote code execution in block reflow * MFSA 2008-34 aka CVE-2008-2785 - Remote code execution by overflowing CSS reference counter * disable 10_visibility_hidden_patch.dpatch - which is now shipped in upstream tarball - update debian/patches/00list stable/main/binary-hppa/icedove_1.5.0.13+1.5.0.15b.dfsg1+prepatch080614d-0etch1_hppa.deb stable/main/binary-hppa/icedove-typeaheadfind_1.5.0.13+1.5.0.15b.dfsg1+prepatch080614d-0etch1_hppa.deb stable/main/binary-hppa/icedove-dev_1.5.0.13+1.5.0.15b.dfsg1+prepatch080614d-0etch1_hppa.deb stable/main/binary-hppa/icedove-dbg_1.5.0.13+1.5.0.15b.dfsg1+prepatch080614d-0etch1_hppa.deb stable/main/binary-hppa/icedove-gnome-support_1.5.0.13+1.5.0.15b.dfsg1+prepatch080614d-0etch1_hppa.deb stable/main/binary-hppa/icedove-inspector_1.5.0.13+1.5.0.15b.dfsg1+prepatch080614d-0etch1_hppa.deb icedove (1.5.0.13+1.5.0.15b.dfsg1+prepatch080614d-0etch1) stable-security; urgency=low * backports for thunderbird 2.0.0.16 stability/security update * MFSA 2008-21 aka CVE-2008-2798 - Crashes with evidence of memory corruption * MFSA 2008-21 aka CVE-2008-2799 - Crashes with evidence of memory corruption * MFSA 2008-24 aka CVE-2008-2802 - Chrome script loading from fastload file * MFSA 2008-25 aka CVE-2008-2803 - Arbitrary code execution in mozIJSSubScriptLoader.loadSubScript() * MFSA 2008-26 aka CVE-2008-0304 - (followup) Buffer length checks in MIME processing * MFSA 2008-29 aka CVE-2008-2807 - Faulty .properties file results in uninitialized memory being used * MFSA 2008-31 aka CVE-2008-2809 - Peer-trusted certs can use alt names to spoof * MFSA 2008-33 aka CVE-2008-2811 - Crash and remote code execution in block reflow * MFSA 2008-34 aka CVE-2008-2785 - Remote code execution by overflowing CSS reference counter * disable 10_visibility_hidden_patch.dpatch - which is now shipped in upstream tarball - update debian/patches/00list stable/main/binary-arm/icedove-gnome-support_1.5.0.13+1.5.0.15b.dfsg1+prepatch080614d-0etch1_arm.deb stable/main/binary-arm/icedove_1.5.0.13+1.5.0.15b.dfsg1+prepatch080614d-0etch1_arm.deb stable/main/binary-arm/icedove-inspector_1.5.0.13+1.5.0.15b.dfsg1+prepatch080614d-0etch1_arm.deb stable/main/binary-arm/icedove-dev_1.5.0.13+1.5.0.15b.dfsg1+prepatch080614d-0etch1_arm.deb stable/main/binary-arm/icedove-dbg_1.5.0.13+1.5.0.15b.dfsg1+prepatch080614d-0etch1_arm.deb stable/main/binary-arm/icedove-typeaheadfind_1.5.0.13+1.5.0.15b.dfsg1+prepatch080614d-0etch1_arm.deb icedove (1.5.0.13+1.5.0.15b.dfsg1+prepatch080614d-0etch1) stable-security; urgency=low * backports for thunderbird 2.0.0.16 stability/security update * MFSA 2008-21 aka CVE-2008-2798 - Crashes with evidence of memory corruption * MFSA 2008-21 aka CVE-2008-2799 - Crashes with evidence of memory corruption * MFSA 2008-24 aka CVE-2008-2802 - Chrome script loading from fastload file * MFSA 2008-25 aka CVE-2008-2803 - Arbitrary code execution in mozIJSSubScriptLoader.loadSubScript() * MFSA 2008-26 aka CVE-2008-0304 - (followup) Buffer length checks in MIME processing * MFSA 2008-29 aka CVE-2008-2807 - Faulty .properties file results in uninitialized memory being used * MFSA 2008-31 aka CVE-2008-2809 - Peer-trusted certs can use alt names to spoof * MFSA 2008-33 aka CVE-2008-2811 - Crash and remote code execution in block reflow * MFSA 2008-34 aka CVE-2008-2785 - Remote code execution by overflowing CSS reference counter * disable 10_visibility_hidden_patch.dpatch - which is now shipped in upstream tarball - update debian/patches/00list stable/main/binary-alpha/icedove-inspector_1.5.0.13+1.5.0.15b.dfsg1+prepatch080614d-0etch1_alpha.deb stable/main/binary-alpha/icedove-gnome-support_1.5.0.13+1.5.0.15b.dfsg1+prepatch080614d-0etch1_alpha.deb stable/main/binary-alpha/icedove-dev_1.5.0.13+1.5.0.15b.dfsg1+prepatch080614d-0etch1_alpha.deb stable/main/binary-alpha/icedove_1.5.0.13+1.5.0.15b.dfsg1+prepatch080614d-0etch1_alpha.deb stable/main/binary-alpha/icedove-dbg_1.5.0.13+1.5.0.15b.dfsg1+prepatch080614d-0etch1_alpha.deb stable/main/binary-alpha/icedove-typeaheadfind_1.5.0.13+1.5.0.15b.dfsg1+prepatch080614d-0etch1_alpha.deb icedove (1.5.0.13+1.5.0.15b.dfsg1+prepatch080614d-0etch1) stable-security; urgency=low * backports for thunderbird 2.0.0.16 stability/security update * MFSA 2008-21 aka CVE-2008-2798 - Crashes with evidence of memory corruption * MFSA 2008-21 aka CVE-2008-2799 - Crashes with evidence of memory corruption * MFSA 2008-24 aka CVE-2008-2802 - Chrome script loading from fastload file * MFSA 2008-25 aka CVE-2008-2803 - Arbitrary code execution in mozIJSSubScriptLoader.loadSubScript() * MFSA 2008-26 aka CVE-2008-0304 - (followup) Buffer length checks in MIME processing * MFSA 2008-29 aka CVE-2008-2807 - Faulty .properties file results in uninitialized memory being used * MFSA 2008-31 aka CVE-2008-2809 - Peer-trusted certs can use alt names to spoof * MFSA 2008-33 aka CVE-2008-2811 - Crash and remote code execution in block reflow * MFSA 2008-34 aka CVE-2008-2785 - Remote code execution by overflowing CSS reference counter * disable 10_visibility_hidden_patch.dpatch - which is now shipped in upstream tarball - update debian/patches/00list stable/main/binary-all/mozilla-thunderbird-dev_1.5.0.13+1.5.0.15b.dfsg1+prepatch080614d-0etch1_all.deb stable/main/binary-all/mozilla-thunderbird-typeaheadfind_1.5.0.13+1.5.0.15b.dfsg1+prepatch080614d-0etch1_all.deb stable/main/binary-amd64/icedove-typeaheadfind_1.5.0.13+1.5.0.15b.dfsg1+prepatch080614d-0etch1_amd64.deb stable/main/source/icedove_1.5.0.13+1.5.0.15b.dfsg1+prepatch080614d.orig.tar.gz stable/main/binary-all/thunderbird-inspector_1.5.0.13+1.5.0.15b.dfsg1+prepatch080614d-0etch1_all.deb stable/main/binary-all/thunderbird-gnome-support_1.5.0.13+1.5.0.15b.dfsg1+prepatch080614d-0etch1_all.deb stable/main/binary-amd64/icedove-dev_1.5.0.13+1.5.0.15b.dfsg1+prepatch080614d-0etch1_amd64.deb stable/main/binary-amd64/icedove_1.5.0.13+1.5.0.15b.dfsg1+prepatch080614d-0etch1_amd64.deb stable/main/binary-all/mozilla-thunderbird_1.5.0.13+1.5.0.15b.dfsg1+prepatch080614d-0etch1_all.deb stable/main/binary-all/thunderbird-typeaheadfind_1.5.0.13+1.5.0.15b.dfsg1+prepatch080614d-0etch1_all.deb stable/main/source/icedove_1.5.0.13+1.5.0.15b.dfsg1+prepatch080614d-0etch1.diff.gz stable/main/binary-all/mozilla-thunderbird-inspector_1.5.0.13+1.5.0.15b.dfsg1+prepatch080614d-0etch1_all.deb stable/main/binary-all/thunderbird-dev_1.5.0.13+1.5.0.15b.dfsg1+prepatch080614d-0etch1_all.deb stable/main/source/icedove_1.5.0.13+1.5.0.15b.dfsg1+prepatch080614d-0etch1.dsc stable/main/binary-amd64/icedove-dbg_1.5.0.13+1.5.0.15b.dfsg1+prepatch080614d-0etch1_amd64.deb stable/main/binary-amd64/icedove-gnome-support_1.5.0.13+1.5.0.15b.dfsg1+prepatch080614d-0etch1_amd64.deb stable/main/binary-amd64/icedove-inspector_1.5.0.13+1.5.0.15b.dfsg1+prepatch080614d-0etch1_amd64.deb stable/main/binary-all/thunderbird-dbg_1.5.0.13+1.5.0.15b.dfsg1+prepatch080614d-0etch1_all.deb stable/main/binary-all/thunderbird_1.5.0.13+1.5.0.15b.dfsg1+prepatch080614d-0etch1_all.deb icedove (1.5.0.13+1.5.0.15b.dfsg1+prepatch080614d-0etch1) stable-security; urgency=low * backports for thunderbird 2.0.0.16 stability/security update * MFSA 2008-21 aka CVE-2008-2798 - Crashes with evidence of memory corruption * MFSA 2008-21 aka CVE-2008-2799 - Crashes with evidence of memory corruption * MFSA 2008-24 aka CVE-2008-2802 - Chrome script loading from fastload file * MFSA 2008-25 aka CVE-2008-2803 - Arbitrary code execution in mozIJSSubScriptLoader.loadSubScript() * MFSA 2008-26 aka CVE-2008-0304 - (followup) Buffer length checks in MIME processing * MFSA 2008-29 aka CVE-2008-2807 - Faulty .properties file results in uninitialized memory being used * MFSA 2008-31 aka CVE-2008-2809 - Peer-trusted certs can use alt names to spoof * MFSA 2008-33 aka CVE-2008-2811 - Crash and remote code execution in block reflow * MFSA 2008-34 aka CVE-2008-2785 - Remote code execution by overflowing CSS reference counter * disable 10_visibility_hidden_patch.dpatch - which is now shipped in upstream tarball - update debian/patches/00list stable/main/binary-sparc/proxytrack_3.40.4-3.1+etch1_sparc.deb stable/main/binary-sparc/libhttrack1_3.40.4-3.1+etch1_sparc.deb stable/main/binary-sparc/webhttrack_3.40.4-3.1+etch1_sparc.deb stable/main/binary-sparc/libhttrack-dev_3.40.4-3.1+etch1_sparc.deb stable/main/binary-sparc/httrack_3.40.4-3.1+etch1_sparc.deb httrack (3.40.4-3.1+etch1) stable-security; urgency=high * Non-maintainer upload by the security team. * Fix buffer overflow when processing an overly long URL, which could be exploited into a crash or code execution. Patch supplied by maintainer. [FrSIRT/ADV-2008-2221] stable/main/binary-s390/httrack_3.40.4-3.1+etch1_s390.deb stable/main/binary-s390/libhttrack-dev_3.40.4-3.1+etch1_s390.deb stable/main/binary-s390/libhttrack1_3.40.4-3.1+etch1_s390.deb stable/main/binary-s390/webhttrack_3.40.4-3.1+etch1_s390.deb stable/main/binary-s390/proxytrack_3.40.4-3.1+etch1_s390.deb httrack (3.40.4-3.1+etch1) stable-security; urgency=high * Non-maintainer upload by the security team. * Fix buffer overflow when processing an overly long URL, which could be exploited into a crash or code execution. Patch supplied by maintainer. [FrSIRT/ADV-2008-2221] stable/main/binary-powerpc/proxytrack_3.40.4-3.1+etch1_powerpc.deb stable/main/binary-powerpc/libhttrack-dev_3.40.4-3.1+etch1_powerpc.deb stable/main/binary-powerpc/webhttrack_3.40.4-3.1+etch1_powerpc.deb stable/main/binary-powerpc/libhttrack1_3.40.4-3.1+etch1_powerpc.deb stable/main/binary-powerpc/httrack_3.40.4-3.1+etch1_powerpc.deb httrack (3.40.4-3.1+etch1) stable-security; urgency=high * Non-maintainer upload by the security team. * Fix buffer overflow when processing an overly long URL, which could be exploited into a crash or code execution. Patch supplied by maintainer. [FrSIRT/ADV-2008-2221] stable/main/binary-mipsel/libhttrack-dev_3.40.4-3.1+etch1_mipsel.deb stable/main/binary-mipsel/proxytrack_3.40.4-3.1+etch1_mipsel.deb stable/main/binary-mipsel/httrack_3.40.4-3.1+etch1_mipsel.deb stable/main/binary-mipsel/webhttrack_3.40.4-3.1+etch1_mipsel.deb stable/main/binary-mipsel/libhttrack1_3.40.4-3.1+etch1_mipsel.deb httrack (3.40.4-3.1+etch1) stable-security; urgency=high * Non-maintainer upload by the security team. * Fix buffer overflow when processing an overly long URL, which could be exploited into a crash or code execution. Patch supplied by maintainer. [FrSIRT/ADV-2008-2221] stable/main/binary-mips/httrack_3.40.4-3.1+etch1_mips.deb stable/main/binary-mips/libhttrack1_3.40.4-3.1+etch1_mips.deb stable/main/binary-mips/webhttrack_3.40.4-3.1+etch1_mips.deb stable/main/binary-mips/libhttrack-dev_3.40.4-3.1+etch1_mips.deb stable/main/binary-mips/proxytrack_3.40.4-3.1+etch1_mips.deb httrack (3.40.4-3.1+etch1) stable-security; urgency=high * Non-maintainer upload by the security team. * Fix buffer overflow when processing an overly long URL, which could be exploited into a crash or code execution. Patch supplied by maintainer. [FrSIRT/ADV-2008-2221] stable/main/binary-ia64/proxytrack_3.40.4-3.1+etch1_ia64.deb stable/main/binary-ia64/httrack_3.40.4-3.1+etch1_ia64.deb stable/main/binary-ia64/libhttrack-dev_3.40.4-3.1+etch1_ia64.deb stable/main/binary-ia64/webhttrack_3.40.4-3.1+etch1_ia64.deb stable/main/binary-ia64/libhttrack1_3.40.4-3.1+etch1_ia64.deb httrack (3.40.4-3.1+etch1) stable-security; urgency=high * Non-maintainer upload by the security team. * Fix buffer overflow when processing an overly long URL, which could be exploited into a crash or code execution. Patch supplied by maintainer. [FrSIRT/ADV-2008-2221] stable/main/binary-hppa/httrack_3.40.4-3.1+etch1_hppa.deb stable/main/binary-hppa/proxytrack_3.40.4-3.1+etch1_hppa.deb stable/main/binary-hppa/libhttrack1_3.40.4-3.1+etch1_hppa.deb stable/main/binary-hppa/webhttrack_3.40.4-3.1+etch1_hppa.deb stable/main/binary-hppa/libhttrack-dev_3.40.4-3.1+etch1_hppa.deb httrack (3.40.4-3.1+etch1) stable-security; urgency=high * Non-maintainer upload by the security team. * Fix buffer overflow when processing an overly long URL, which could be exploited into a crash or code execution. Patch supplied by maintainer. [FrSIRT/ADV-2008-2221] stable/main/binary-arm/httrack_3.40.4-3.1+etch1_arm.deb stable/main/binary-arm/libhttrack1_3.40.4-3.1+etch1_arm.deb stable/main/binary-arm/libhttrack-dev_3.40.4-3.1+etch1_arm.deb stable/main/binary-arm/webhttrack_3.40.4-3.1+etch1_arm.deb stable/main/binary-arm/proxytrack_3.40.4-3.1+etch1_arm.deb httrack (3.40.4-3.1+etch1) stable-security; urgency=high * Non-maintainer upload by the security team. * Fix buffer overflow when processing an overly long URL, which could be exploited into a crash or code execution. Patch supplied by maintainer. [FrSIRT/ADV-2008-2221] stable/main/binary-amd64/webhttrack_3.40.4-3.1+etch1_amd64.deb stable/main/binary-amd64/libhttrack1_3.40.4-3.1+etch1_amd64.deb stable/main/binary-amd64/httrack_3.40.4-3.1+etch1_amd64.deb stable/main/binary-amd64/libhttrack-dev_3.40.4-3.1+etch1_amd64.deb stable/main/binary-amd64/proxytrack_3.40.4-3.1+etch1_amd64.deb httrack (3.40.4-3.1+etch1) stable-security; urgency=high * Non-maintainer upload by the security team. * Fix buffer overflow when processing an overly long URL, which could be exploited into a crash or code execution. Patch supplied by maintainer. [FrSIRT/ADV-2008-2221] stable/main/binary-alpha/httrack_3.40.4-3.1+etch1_alpha.deb stable/main/binary-alpha/webhttrack_3.40.4-3.1+etch1_alpha.deb stable/main/binary-alpha/libhttrack1_3.40.4-3.1+etch1_alpha.deb stable/main/binary-alpha/proxytrack_3.40.4-3.1+etch1_alpha.deb stable/main/binary-alpha/libhttrack-dev_3.40.4-3.1+etch1_alpha.deb httrack (3.40.4-3.1+etch1) stable-security; urgency=high * Non-maintainer upload by the security team. * Fix buffer overflow when processing an overly long URL, which could be exploited into a crash or code execution. Patch supplied by maintainer. [FrSIRT/ADV-2008-2221] stable/main/source/httrack_3.40.4-3.1+etch1.dsc stable/main/binary-i386/proxytrack_3.40.4-3.1+etch1_i386.deb stable/main/binary-i386/libhttrack-dev_3.40.4-3.1+etch1_i386.deb stable/main/binary-all/httrack-doc_3.40.4-3.1+etch1_all.deb stable/main/source/httrack_3.40.4-3.1+etch1.diff.gz stable/main/binary-i386/httrack_3.40.4-3.1+etch1_i386.deb stable/main/binary-i386/webhttrack_3.40.4-3.1+etch1_i386.deb stable/main/binary-i386/libhttrack1_3.40.4-3.1+etch1_i386.deb httrack (3.40.4-3.1+etch1) stable-security; urgency=high * Non-maintainer upload by the security team. * Fix buffer overflow when processing an overly long URL, which could be exploited into a crash or code execution. Patch supplied by maintainer. [FrSIRT/ADV-2008-2221] stable/main/source/horde3_3.1.3-4etch4.dsc stable/main/binary-all/horde3_3.1.3-4etch4_all.deb stable/main/source/horde3_3.1.3-4etch4.diff.gz horde3 (3.1.3-4etch4) stable-security; urgency=high * Further improved the XSS filter for HTML (See CVE-2008-3823 for more informations). stable/main/binary-sparc/gobby_0.4.1-2+b1_sparc.deb gobby (0.4.1-2+b1) stable; urgency=low * Binary-only non-maintainer upload for sparc; no source changes. * rebuild against net6 1.3.1-4 stable/main/binary-s390/gobby_0.4.1-2+b1_s390.deb gobby (0.4.1-2+b1) stable; urgency=low * Binary-only non-maintainer upload for s390; no source changes. * rebuild against net6 1.3.1-4 stable/main/binary-powerpc/gobby_0.4.1-2+b1_powerpc.deb gobby (0.4.1-2+b1) stable; urgency=low * Binary-only non-maintainer upload for powerpc; no source changes. * rebuild against net6 1.3.1-4 stable/main/binary-mipsel/gobby_0.4.1-2+b1_mipsel.deb gobby (0.4.1-2+b1) stable; urgency=low * Binary-only non-maintainer upload for mipsel; no source changes. * rebuild against net6 1.3.1-4 stable/main/binary-mips/gobby_0.4.1-2+b1_mips.deb gobby (0.4.1-2+b1) stable; urgency=low * Binary-only non-maintainer upload for mips; no source changes. * rebuild against net6 1.3.1-4 stable/main/binary-ia64/gobby_0.4.1-2+b1_ia64.deb gobby (0.4.1-2+b1) stable; urgency=low * Binary-only non-maintainer upload for ia64; no source changes. * rebuild against net6 1.3.1-4 stable/main/binary-i386/gobby_0.4.1-2+b1_i386.deb gobby (0.4.1-2+b1) stable; urgency=low * Binary-only non-maintainer upload for i386; no source changes. * rebuild against net6 1.3.1-4 stable/main/binary-hppa/gobby_0.4.1-2+b1_hppa.deb gobby (0.4.1-2+b1) stable; urgency=low * Binary-only non-maintainer upload for hppa; no source changes. * rebuild against net6 1.3.1-4 stable/main/binary-arm/gobby_0.4.1-2+b1_arm.deb gobby (0.4.1-2+b1) stable; urgency=low * Binary-only non-maintainer upload for arm; no source changes. * rebuild against net6 1.3.1-4 stable/main/binary-amd64/gobby_0.4.1-2+b1_amd64.deb gobby (0.4.1-2+b1) stable; urgency=low * Binary-only non-maintainer upload for amd64; no source changes. * rebuild against net6 1.3.1-4 stable/main/binary-alpha/gobby_0.4.1-2+b1_alpha.deb gobby (0.4.1-2+b1) stable; urgency=low * Binary-only non-maintainer upload for alpha; no source changes. * rebuild against net6 1.3.1-4 stable/main/binary-sparc/git-core_1.4.4.4-4_sparc.deb git-core (1:1.4.4.4-4) stable; urgency=low [ Pierre Habouzit ] * Non-maintainer upload with maintainer permission. * Merge upstream 1.4.4.5 tag as debian/diff/support-packs-v2.diff so that Debian stable can cope with packs v2 through dumb transports. Thanks a lot to the upstream that provided the minimal series specifically for Debian. [ Thijs Kinkhorst ] * Merge in security update and increment version number. stable/main/binary-s390/git-core_1.4.4.4-4_s390.deb git-core (1:1.4.4.4-4) stable; urgency=low [ Pierre Habouzit ] * Non-maintainer upload with maintainer permission. * Merge upstream 1.4.4.5 tag as debian/diff/support-packs-v2.diff so that Debian stable can cope with packs v2 through dumb transports. Thanks a lot to the upstream that provided the minimal series specifically for Debian. [ Thijs Kinkhorst ] * Merge in security update and increment version number. stable/main/binary-powerpc/git-core_1.4.4.4-4_powerpc.deb git-core (1:1.4.4.4-4) stable; urgency=low [ Pierre Habouzit ] * Non-maintainer upload with maintainer permission. * Merge upstream 1.4.4.5 tag as debian/diff/support-packs-v2.diff so that Debian stable can cope with packs v2 through dumb transports. Thanks a lot to the upstream that provided the minimal series specifically for Debian. [ Thijs Kinkhorst ] * Merge in security update and increment version number. stable/main/binary-mipsel/git-core_1.4.4.4-4_mipsel.deb git-core (1:1.4.4.4-4) stable; urgency=low [ Pierre Habouzit ] * Non-maintainer upload with maintainer permission. * Merge upstream 1.4.4.5 tag as debian/diff/support-packs-v2.diff so that Debian stable can cope with packs v2 through dumb transports. Thanks a lot to the upstream that provided the minimal series specifically for Debian. [ Thijs Kinkhorst ] * Merge in security update and increment version number. stable/main/binary-mips/git-core_1.4.4.4-4_mips.deb git-core (1:1.4.4.4-4) stable; urgency=low [ Pierre Habouzit ] * Non-maintainer upload with maintainer permission. * Merge upstream 1.4.4.5 tag as debian/diff/support-packs-v2.diff so that Debian stable can cope with packs v2 through dumb transports. Thanks a lot to the upstream that provided the minimal series specifically for Debian. [ Thijs Kinkhorst ] * Merge in security update and increment version number. stable/main/binary-ia64/git-core_1.4.4.4-4_ia64.deb git-core (1:1.4.4.4-4) stable; urgency=low [ Pierre Habouzit ] * Non-maintainer upload with maintainer permission. * Merge upstream 1.4.4.5 tag as debian/diff/support-packs-v2.diff so that Debian stable can cope with packs v2 through dumb transports. Thanks a lot to the upstream that provided the minimal series specifically for Debian. [ Thijs Kinkhorst ] * Merge in security update and increment version number. stable/main/binary-hppa/git-core_1.4.4.4-4_hppa.deb git-core (1:1.4.4.4-4) stable; urgency=low [ Pierre Habouzit ] * Non-maintainer upload with maintainer permission. * Merge upstream 1.4.4.5 tag as debian/diff/support-packs-v2.diff so that Debian stable can cope with packs v2 through dumb transports. Thanks a lot to the upstream that provided the minimal series specifically for Debian. [ Thijs Kinkhorst ] * Merge in security update and increment version number. stable/main/binary-arm/git-core_1.4.4.4-4_arm.deb git-core (1:1.4.4.4-4) stable; urgency=low [ Pierre Habouzit ] * Non-maintainer upload with maintainer permission. * Merge upstream 1.4.4.5 tag as debian/diff/support-packs-v2.diff so that Debian stable can cope with packs v2 through dumb transports. Thanks a lot to the upstream that provided the minimal series specifically for Debian. [ Thijs Kinkhorst ] * Merge in security update and increment version number. stable/main/binary-amd64/git-core_1.4.4.4-4_amd64.deb git-core (1:1.4.4.4-4) stable; urgency=low [ Pierre Habouzit ] * Non-maintainer upload with maintainer permission. * Merge upstream 1.4.4.5 tag as debian/diff/support-packs-v2.diff so that Debian stable can cope with packs v2 through dumb transports. Thanks a lot to the upstream that provided the minimal series specifically for Debian. [ Thijs Kinkhorst ] * Merge in security update and increment version number. stable/main/binary-alpha/git-core_1.4.4.4-4_alpha.deb git-core (1:1.4.4.4-4) stable; urgency=low [ Pierre Habouzit ] * Non-maintainer upload with maintainer permission. * Merge upstream 1.4.4.5 tag as debian/diff/support-packs-v2.diff so that Debian stable can cope with packs v2 through dumb transports. Thanks a lot to the upstream that provided the minimal series specifically for Debian. [ Thijs Kinkhorst ] * Merge in security update and increment version number. stable/main/binary-i386/git-core_1.4.4.4-4_i386.deb stable/main/source/git-core_1.4.4.4-4.diff.gz stable/main/binary-all/gitweb_1.4.4.4-4_all.deb stable/main/binary-all/git-email_1.4.4.4-4_all.deb stable/main/binary-all/git-daemon-run_1.4.4.4-4_all.deb stable/main/binary-all/git-doc_1.4.4.4-4_all.deb stable/main/binary-all/git-cvs_1.4.4.4-4_all.deb stable/main/source/git-core_1.4.4.4-4.dsc stable/main/binary-all/gitk_1.4.4.4-4_all.deb stable/main/binary-all/git-arch_1.4.4.4-4_all.deb stable/main/binary-all/git-svn_1.4.4.4-4_all.deb git-core (1:1.4.4.4-4) stable; urgency=low [ Pierre Habouzit ] * Non-maintainer upload with maintainer permission. * Merge upstream 1.4.4.5 tag as debian/diff/support-packs-v2.diff so that Debian stable can cope with packs v2 through dumb transports. Thanks a lot to the upstream that provided the minimal series specifically for Debian. [ Thijs Kinkhorst ] * Merge in security update and increment version number. stable/main/binary-all/feta_1.4.15+etch1_all.deb stable/main/source/feta_1.4.15+etch1.dsc stable/main/source/feta_1.4.15+etch1.tar.gz feta (1.4.15+etch1) stable-security; urgency=high * Non-maintainer upload by the Security Team * Fix insecure temp file usage in to-upgrade plugin stable/main/binary-powerpc/fai-kernels_1.17+etch.23_powerpc.deb fai-kernels (1.17+etch.23) stable; urgency=high * Rebuild against linux-source-2.6.18_2.6.18.dfsg.1-23: [ Ian Campbell ] * Fix DMA crash under Xen when no IOMMU is present (closes: #445987) [ dann frazier ] * [xfs] Fix attr2 corruption with btree data extents (closes: #498309) stable/main/binary-amd64/fai-kernels_1.17+etch.23_amd64.deb fai-kernels (1.17+etch.23) stable; urgency=high * Rebuild against linux-source-2.6.18_2.6.18.dfsg.1-23: [ Ian Campbell ] * Fix DMA crash under Xen when no IOMMU is present (closes: #445987) [ dann frazier ] * [xfs] Fix attr2 corruption with btree data extents (closes: #498309) stable/main/source/fai-kernels_1.17+etch.23.tar.gz stable/main/binary-i386/fai-kernels_1.17+etch.23_i386.deb stable/main/source/fai-kernels_1.17+etch.23.dsc fai-kernels (1.17+etch.23) stable; urgency=high * Rebuild against linux-source-2.6.18_2.6.18.dfsg.1-23: [ Ian Campbell ] * Fix DMA crash under Xen when no IOMMU is present (closes: #445987) [ dann frazier ] * [xfs] Fix attr2 corruption with btree data extents (closes: #498309) stable/main/binary-sparc/dnsmasq_2.35-1+etch4_sparc.deb dnsmasq (2.35-1+etch4) stable-security; urgency=low * Fix another crash stable/main/binary-s390/dnsmasq_2.35-1+etch4_s390.deb dnsmasq (2.35-1+etch4) stable-security; urgency=low * Fix another crash stable/main/binary-powerpc/dnsmasq_2.35-1+etch4_powerpc.deb dnsmasq (2.35-1+etch4) stable-security; urgency=low * Fix another crash stable/main/binary-mipsel/dnsmasq_2.35-1+etch4_mipsel.deb dnsmasq (2.35-1+etch4) stable-security; urgency=low * Fix another crash stable/main/binary-mips/dnsmasq_2.35-1+etch4_mips.deb dnsmasq (2.35-1+etch4) stable-security; urgency=low * Fix another crash stable/main/binary-ia64/dnsmasq_2.35-1+etch4_ia64.deb dnsmasq (2.35-1+etch4) stable-security; urgency=low * Fix another crash stable/main/binary-hppa/dnsmasq_2.35-1+etch4_hppa.deb dnsmasq (2.35-1+etch4) stable-security; urgency=low * Fix another crash stable/main/binary-arm/dnsmasq_2.35-1+etch4_arm.deb dnsmasq (2.35-1+etch4) stable-security; urgency=low * Fix another crash stable/main/binary-amd64/dnsmasq_2.35-1+etch4_amd64.deb dnsmasq (2.35-1+etch4) stable-security; urgency=low * Fix another crash stable/main/binary-alpha/dnsmasq_2.35-1+etch4_alpha.deb dnsmasq (2.35-1+etch4) stable-security; urgency=low * Fix another crash stable/main/source/dnsmasq_2.35-1+etch4.dsc stable/main/binary-i386/dnsmasq_2.35-1+etch4_i386.deb stable/main/source/dnsmasq_2.35-1+etch4.diff.gz dnsmasq (2.35-1+etch4) stable-security; urgency=low * Fix another crash stable/main/source/dist_3.70-31etch1.dsc stable/main/source/dist_3.70-31etch1.diff.gz stable/main/binary-all/dist_3.70-31etch1_all.deb dist (3.70-31etch1) stable; urgency=high * Backport patches from the Lenny version to fix security issues. If a script uses a temp file which is created in /tmp, then an attacker can create symlink with the same name in this directory in order to destroy or rewrite some system or user files. Symlink attack may also lead not only to the data desctruction but to denial of service as well. Creating files with rand or pid to randomize the file names is not adequate to protect the system. We now use File::Temp to safely create the temporary files as needed. This closes a grave bug. There are no code changes in this version, apart from the bug fix. #496412. stable/main/binary-sparc/libcupsys2-dev_1.2.7-4etch4_sparc.deb stable/main/binary-sparc/cupsys-client_1.2.7-4etch4_sparc.deb stable/main/binary-sparc/cupsys-bsd_1.2.7-4etch4_sparc.deb stable/main/binary-sparc/libcupsys2_1.2.7-4etch4_sparc.deb stable/main/binary-sparc/libcupsimage2-dev_1.2.7-4etch4_sparc.deb stable/main/binary-sparc/libcupsimage2_1.2.7-4etch4_sparc.deb stable/main/binary-sparc/cupsys-dbg_1.2.7-4etch4_sparc.deb stable/main/binary-sparc/cupsys_1.2.7-4etch4_sparc.deb cupsys (1.2.7-4etch4) stable-security; urgency=high * Add 74_CVE-2008-0053.dpatch: Fix buffer overflows in filter/hpgl-input.c by crated HP-GL files; possibly exploitable to run arbitrary code. (CVE-2008-0053, upstream SVN trunk r7219) * Add 75_CVE-2008-1373.dpatch: Fix buffer overflow in GIF filter by crafted images with large code_size value; potentially exploitable to run arbitrary code. (CVE-2008-1373, STR#2765, upstream svn trunk r7420) * Add 76_CVE-2008-1722.dpatch: Fix integer overflows in PNG filter by crafted images with large dimensions; potentially exploitable to run arbitrary code. (CVE-2008-1722, STR #2790, svn trunk r7437) (Closes: #476305) stable/main/binary-s390/libcupsys2_1.2.7-4etch4_s390.deb stable/main/binary-s390/cupsys_1.2.7-4etch4_s390.deb stable/main/binary-s390/libcupsimage2_1.2.7-4etch4_s390.deb stable/main/binary-s390/cupsys-dbg_1.2.7-4etch4_s390.deb stable/main/binary-s390/cupsys-bsd_1.2.7-4etch4_s390.deb stable/main/binary-s390/cupsys-client_1.2.7-4etch4_s390.deb stable/main/binary-s390/libcupsimage2-dev_1.2.7-4etch4_s390.deb stable/main/binary-s390/libcupsys2-dev_1.2.7-4etch4_s390.deb cupsys (1.2.7-4etch4) stable-security; urgency=high * Add 74_CVE-2008-0053.dpatch: Fix buffer overflows in filter/hpgl-input.c by crated HP-GL files; possibly exploitable to run arbitrary code. (CVE-2008-0053, upstream SVN trunk r7219) * Add 75_CVE-2008-1373.dpatch: Fix buffer overflow in GIF filter by crafted images with large code_size value; potentially exploitable to run arbitrary code. (CVE-2008-1373, STR#2765, upstream svn trunk r7420) * Add 76_CVE-2008-1722.dpatch: Fix integer overflows in PNG filter by crafted images with large dimensions; potentially exploitable to run arbitrary code. (CVE-2008-1722, STR #2790, svn trunk r7437) (Closes: #476305) stable/main/binary-powerpc/libcupsys2_1.2.7-4etch4_powerpc.deb stable/main/binary-powerpc/libcupsimage2_1.2.7-4etch4_powerpc.deb stable/main/binary-powerpc/cupsys_1.2.7-4etch4_powerpc.deb stable/main/binary-powerpc/libcupsimage2-dev_1.2.7-4etch4_powerpc.deb stable/main/binary-powerpc/cupsys-bsd_1.2.7-4etch4_powerpc.deb stable/main/binary-powerpc/cupsys-client_1.2.7-4etch4_powerpc.deb stable/main/binary-powerpc/cupsys-dbg_1.2.7-4etch4_powerpc.deb stable/main/binary-powerpc/libcupsys2-dev_1.2.7-4etch4_powerpc.deb cupsys (1.2.7-4etch4) stable-security; urgency=high * Add 74_CVE-2008-0053.dpatch: Fix buffer overflows in filter/hpgl-input.c by crated HP-GL files; possibly exploitable to run arbitrary code. (CVE-2008-0053, upstream SVN trunk r7219) * Add 75_CVE-2008-1373.dpatch: Fix buffer overflow in GIF filter by crafted images with large code_size value; potentially exploitable to run arbitrary code. (CVE-2008-1373, STR#2765, upstream svn trunk r7420) * Add 76_CVE-2008-1722.dpatch: Fix integer overflows in PNG filter by crafted images with large dimensions; potentially exploitable to run arbitrary code. (CVE-2008-1722, STR #2790, svn trunk r7437) (Closes: #476305) stable/main/binary-mipsel/libcupsimage2_1.2.7-4etch4_mipsel.deb stable/main/binary-mipsel/cupsys_1.2.7-4etch4_mipsel.deb stable/main/binary-mipsel/libcupsys2-dev_1.2.7-4etch4_mipsel.deb stable/main/binary-mipsel/cupsys-bsd_1.2.7-4etch4_mipsel.deb stable/main/binary-mipsel/libcupsys2_1.2.7-4etch4_mipsel.deb stable/main/binary-mipsel/libcupsimage2-dev_1.2.7-4etch4_mipsel.deb stable/main/binary-mipsel/cupsys-dbg_1.2.7-4etch4_mipsel.deb stable/main/binary-mipsel/cupsys-client_1.2.7-4etch4_mipsel.deb cupsys (1.2.7-4etch4) stable-security; urgency=high * Add 74_CVE-2008-0053.dpatch: Fix buffer overflows in filter/hpgl-input.c by crated HP-GL files; possibly exploitable to run arbitrary code. (CVE-2008-0053, upstream SVN trunk r7219) * Add 75_CVE-2008-1373.dpatch: Fix buffer overflow in GIF filter by crafted images with large code_size value; potentially exploitable to run arbitrary code. (CVE-2008-1373, STR#2765, upstream svn trunk r7420) * Add 76_CVE-2008-1722.dpatch: Fix integer overflows in PNG filter by crafted images with large dimensions; potentially exploitable to run arbitrary code. (CVE-2008-1722, STR #2790, svn trunk r7437) (Closes: #476305) stable/main/binary-mips/libcupsimage2_1.2.7-4etch4_mips.deb stable/main/binary-mips/cupsys-client_1.2.7-4etch4_mips.deb stable/main/binary-mips/cupsys-bsd_1.2.7-4etch4_mips.deb stable/main/binary-mips/libcupsys2-dev_1.2.7-4etch4_mips.deb stable/main/binary-mips/cupsys-dbg_1.2.7-4etch4_mips.deb stable/main/binary-mips/libcupsys2_1.2.7-4etch4_mips.deb stable/main/binary-mips/cupsys_1.2.7-4etch4_mips.deb stable/main/binary-mips/libcupsimage2-dev_1.2.7-4etch4_mips.deb cupsys (1.2.7-4etch4) stable-security; urgency=high * Add 74_CVE-2008-0053.dpatch: Fix buffer overflows in filter/hpgl-input.c by crated HP-GL files; possibly exploitable to run arbitrary code. (CVE-2008-0053, upstream SVN trunk r7219) * Add 75_CVE-2008-1373.dpatch: Fix buffer overflow in GIF filter by crafted images with large code_size value; potentially exploitable to run arbitrary code. (CVE-2008-1373, STR#2765, upstream svn trunk r7420) * Add 76_CVE-2008-1722.dpatch: Fix integer overflows in PNG filter by crafted images with large dimensions; potentially exploitable to run arbitrary code. (CVE-2008-1722, STR #2790, svn trunk r7437) (Closes: #476305) stable/main/binary-ia64/libcupsys2_1.2.7-4etch4_ia64.deb stable/main/binary-ia64/cupsys-bsd_1.2.7-4etch4_ia64.deb stable/main/binary-ia64/libcupsimage2_1.2.7-4etch4_ia64.deb stable/main/binary-ia64/cupsys-dbg_1.2.7-4etch4_ia64.deb stable/main/binary-ia64/libcupsys2-dev_1.2.7-4etch4_ia64.deb stable/main/binary-ia64/cupsys_1.2.7-4etch4_ia64.deb stable/main/binary-ia64/libcupsimage2-dev_1.2.7-4etch4_ia64.deb stable/main/binary-ia64/cupsys-client_1.2.7-4etch4_ia64.deb cupsys (1.2.7-4etch4) stable-security; urgency=high * Add 74_CVE-2008-0053.dpatch: Fix buffer overflows in filter/hpgl-input.c by crated HP-GL files; possibly exploitable to run arbitrary code. (CVE-2008-0053, upstream SVN trunk r7219) * Add 75_CVE-2008-1373.dpatch: Fix buffer overflow in GIF filter by crafted images with large code_size value; potentially exploitable to run arbitrary code. (CVE-2008-1373, STR#2765, upstream svn trunk r7420) * Add 76_CVE-2008-1722.dpatch: Fix integer overflows in PNG filter by crafted images with large dimensions; potentially exploitable to run arbitrary code. (CVE-2008-1722, STR #2790, svn trunk r7437) (Closes: #476305) stable/main/binary-hppa/libcupsys2_1.2.7-4etch4_hppa.deb stable/main/binary-hppa/libcupsimage2_1.2.7-4etch4_hppa.deb stable/main/binary-hppa/cupsys-dbg_1.2.7-4etch4_hppa.deb stable/main/binary-hppa/libcupsimage2-dev_1.2.7-4etch4_hppa.deb stable/main/binary-hppa/libcupsys2-dev_1.2.7-4etch4_hppa.deb stable/main/binary-hppa/cupsys-client_1.2.7-4etch4_hppa.deb stable/main/binary-hppa/cupsys_1.2.7-4etch4_hppa.deb stable/main/binary-hppa/cupsys-bsd_1.2.7-4etch4_hppa.deb cupsys (1.2.7-4etch4) stable-security; urgency=high * Add 74_CVE-2008-0053.dpatch: Fix buffer overflows in filter/hpgl-input.c by crated HP-GL files; possibly exploitable to run arbitrary code. (CVE-2008-0053, upstream SVN trunk r7219) * Add 75_CVE-2008-1373.dpatch: Fix buffer overflow in GIF filter by crafted images with large code_size value; potentially exploitable to run arbitrary code. (CVE-2008-1373, STR#2765, upstream svn trunk r7420) * Add 76_CVE-2008-1722.dpatch: Fix integer overflows in PNG filter by crafted images with large dimensions; potentially exploitable to run arbitrary code. (CVE-2008-1722, STR #2790, svn trunk r7437) (Closes: #476305) stable/main/binary-arm/libcupsimage2-dev_1.2.7-4etch4_arm.deb stable/main/binary-arm/cupsys-client_1.2.7-4etch4_arm.deb stable/main/binary-arm/cupsys-bsd_1.2.7-4etch4_arm.deb stable/main/binary-arm/cupsys-dbg_1.2.7-4etch4_arm.deb stable/main/binary-arm/libcupsys2-dev_1.2.7-4etch4_arm.deb stable/main/binary-arm/libcupsys2_1.2.7-4etch4_arm.deb stable/main/binary-arm/cupsys_1.2.7-4etch4_arm.deb stable/main/binary-arm/libcupsimage2_1.2.7-4etch4_arm.deb cupsys (1.2.7-4etch4) stable-security; urgency=high * Add 74_CVE-2008-0053.dpatch: Fix buffer overflows in filter/hpgl-input.c by crated HP-GL files; possibly exploitable to run arbitrary code. (CVE-2008-0053, upstream SVN trunk r7219) * Add 75_CVE-2008-1373.dpatch: Fix buffer overflow in GIF filter by crafted images with large code_size value; potentially exploitable to run arbitrary code. (CVE-2008-1373, STR#2765, upstream svn trunk r7420) * Add 76_CVE-2008-1722.dpatch: Fix integer overflows in PNG filter by crafted images with large dimensions; potentially exploitable to run arbitrary code. (CVE-2008-1722, STR #2790, svn trunk r7437) (Closes: #476305) stable/main/binary-amd64/cupsys-dbg_1.2.7-4etch4_amd64.deb stable/main/binary-amd64/libcupsimage2-dev_1.2.7-4etch4_amd64.deb stable/main/binary-amd64/libcupsys2-dev_1.2.7-4etch4_amd64.deb stable/main/binary-amd64/cupsys_1.2.7-4etch4_amd64.deb stable/main/binary-amd64/cupsys-client_1.2.7-4etch4_amd64.deb stable/main/binary-amd64/libcupsimage2_1.2.7-4etch4_amd64.deb stable/main/binary-amd64/cupsys-bsd_1.2.7-4etch4_amd64.deb stable/main/binary-amd64/libcupsys2_1.2.7-4etch4_amd64.deb cupsys (1.2.7-4etch4) stable-security; urgency=high * Add 74_CVE-2008-0053.dpatch: Fix buffer overflows in filter/hpgl-input.c by crated HP-GL files; possibly exploitable to run arbitrary code. (CVE-2008-0053, upstream SVN trunk r7219) * Add 75_CVE-2008-1373.dpatch: Fix buffer overflow in GIF filter by crafted images with large code_size value; potentially exploitable to run arbitrary code. (CVE-2008-1373, STR#2765, upstream svn trunk r7420) * Add 76_CVE-2008-1722.dpatch: Fix integer overflows in PNG filter by crafted images with large dimensions; potentially exploitable to run arbitrary code. (CVE-2008-1722, STR #2790, svn trunk r7437) (Closes: #476305) stable/main/binary-alpha/cupsys-bsd_1.2.7-4etch4_alpha.deb stable/main/binary-alpha/libcupsimage2-dev_1.2.7-4etch4_alpha.deb stable/main/binary-alpha/cupsys-dbg_1.2.7-4etch4_alpha.deb stable/main/binary-alpha/libcupsimage2_1.2.7-4etch4_alpha.deb stable/main/binary-alpha/cupsys-client_1.2.7-4etch4_alpha.deb stable/main/binary-alpha/cupsys_1.2.7-4etch4_alpha.deb stable/main/binary-alpha/libcupsys2-dev_1.2.7-4etch4_alpha.deb stable/main/binary-alpha/libcupsys2_1.2.7-4etch4_alpha.deb cupsys (1.2.7-4etch4) stable-security; urgency=high * Add 74_CVE-2008-0053.dpatch: Fix buffer overflows in filter/hpgl-input.c by crated HP-GL files; possibly exploitable to run arbitrary code. (CVE-2008-0053, upstream SVN trunk r7219) * Add 75_CVE-2008-1373.dpatch: Fix buffer overflow in GIF filter by crafted images with large code_size value; potentially exploitable to run arbitrary code. (CVE-2008-1373, STR#2765, upstream svn trunk r7420) * Add 76_CVE-2008-1722.dpatch: Fix integer overflows in PNG filter by crafted images with large dimensions; potentially exploitable to run arbitrary code. (CVE-2008-1722, STR #2790, svn trunk r7437) (Closes: #476305) stable/main/binary-i386/libcupsimage2_1.2.7-4etch4_i386.deb stable/main/binary-i386/cupsys-client_1.2.7-4etch4_i386.deb stable/main/source/cupsys_1.2.7-4etch4.diff.gz stable/main/binary-all/cupsys-common_1.2.7-4etch4_all.deb stable/main/binary-i386/cupsys_1.2.7-4etch4_i386.deb stable/main/binary-i386/libcupsimage2-dev_1.2.7-4etch4_i386.deb stable/main/source/cupsys_1.2.7-4etch4.dsc stable/main/binary-i386/cupsys-dbg_1.2.7-4etch4_i386.deb stable/main/binary-all/libcupsys2-gnutls10_1.2.7-4etch4_all.deb stable/main/binary-i386/libcupsys2-dev_1.2.7-4etch4_i386.deb stable/main/binary-i386/libcupsys2_1.2.7-4etch4_i386.deb stable/main/binary-i386/cupsys-bsd_1.2.7-4etch4_i386.deb cupsys (1.2.7-4etch4) stable-security; urgency=high * Add 74_CVE-2008-0053.dpatch: Fix buffer overflows in filter/hpgl-input.c by crated HP-GL files; possibly exploitable to run arbitrary code. (CVE-2008-0053, upstream SVN trunk r7219) * Add 75_CVE-2008-1373.dpatch: Fix buffer overflow in GIF filter by crafted images with large code_size value; potentially exploitable to run arbitrary code. (CVE-2008-1373, STR#2765, upstream svn trunk r7420) * Add 76_CVE-2008-1722.dpatch: Fix integer overflows in PNG filter by crafted images with large dimensions; potentially exploitable to run arbitrary code. (CVE-2008-1722, STR #2790, svn trunk r7437) (Closes: #476305) stable/main/binary-sparc/clamav_0.90.1dfsg-3.1+etch14_sparc.deb stable/main/binary-sparc/libclamav2_0.90.1dfsg-3.1+etch14_sparc.deb stable/main/binary-sparc/clamav-milter_0.90.1dfsg-3.1+etch14_sparc.deb stable/main/binary-sparc/clamav-freshclam_0.90.1dfsg-3.1+etch14_sparc.deb stable/main/binary-sparc/libclamav-dev_0.90.1dfsg-3.1+etch14_sparc.deb stable/main/binary-sparc/clamav-dbg_0.90.1dfsg-3.1+etch14_sparc.deb stable/main/binary-sparc/clamav-daemon_0.90.1dfsg-3.1+etch14_sparc.deb clamav (0.90.1dfsg-3.1+etch14) stable-security; urgency=high * Non-maintainer upload by the security team * Reinstate dropped patch for CVE-2008-2713, which was somehow left out of 0.90.1dfsg-3etch13 (Closes: #492252) stable/main/binary-s390/clamav_0.90.1dfsg-3.1+etch14_s390.deb stable/main/binary-s390/clamav-dbg_0.90.1dfsg-3.1+etch14_s390.deb stable/main/binary-s390/clamav-milter_0.90.1dfsg-3.1+etch14_s390.deb stable/main/binary-s390/libclamav-dev_0.90.1dfsg-3.1+etch14_s390.deb stable/main/binary-s390/clamav-freshclam_0.90.1dfsg-3.1+etch14_s390.deb stable/main/binary-s390/clamav-daemon_0.90.1dfsg-3.1+etch14_s390.deb stable/main/binary-s390/libclamav2_0.90.1dfsg-3.1+etch14_s390.deb clamav (0.90.1dfsg-3.1+etch14) stable-security; urgency=high * Non-maintainer upload by the security team * Reinstate dropped patch for CVE-2008-2713, which was somehow left out of 0.90.1dfsg-3etch13 (Closes: #492252) stable/main/binary-powerpc/libclamav-dev_0.90.1dfsg-3.1+etch14_powerpc.deb stable/main/binary-powerpc/clamav-dbg_0.90.1dfsg-3.1+etch14_powerpc.deb stable/main/binary-powerpc/clamav_0.90.1dfsg-3.1+etch14_powerpc.deb stable/main/binary-powerpc/clamav-milter_0.90.1dfsg-3.1+etch14_powerpc.deb stable/main/binary-powerpc/clamav-daemon_0.90.1dfsg-3.1+etch14_powerpc.deb stable/main/binary-powerpc/libclamav2_0.90.1dfsg-3.1+etch14_powerpc.deb stable/main/binary-powerpc/clamav-freshclam_0.90.1dfsg-3.1+etch14_powerpc.deb clamav (0.90.1dfsg-3.1+etch14) stable-security; urgency=high * Non-maintainer upload by the security team * Reinstate dropped patch for CVE-2008-2713, which was somehow left out of 0.90.1dfsg-3etch13 (Closes: #492252) stable/main/binary-mipsel/clamav-freshclam_0.90.1dfsg-3.1+etch14_mipsel.deb stable/main/binary-mipsel/clamav-daemon_0.90.1dfsg-3.1+etch14_mipsel.deb stable/main/binary-mipsel/clamav_0.90.1dfsg-3.1+etch14_mipsel.deb stable/main/binary-mipsel/clamav-milter_0.90.1dfsg-3.1+etch14_mipsel.deb stable/main/binary-mipsel/clamav-dbg_0.90.1dfsg-3.1+etch14_mipsel.deb stable/main/binary-mipsel/libclamav2_0.90.1dfsg-3.1+etch14_mipsel.deb stable/main/binary-mipsel/libclamav-dev_0.90.1dfsg-3.1+etch14_mipsel.deb clamav (0.90.1dfsg-3.1+etch14) stable-security; urgency=high * Non-maintainer upload by the security team * Reinstate dropped patch for CVE-2008-2713, which was somehow left out of 0.90.1dfsg-3etch13 (Closes: #492252) stable/main/binary-mips/clamav-freshclam_0.90.1dfsg-3.1+etch14_mips.deb stable/main/binary-mips/clamav-dbg_0.90.1dfsg-3.1+etch14_mips.deb stable/main/binary-mips/libclamav2_0.90.1dfsg-3.1+etch14_mips.deb stable/main/binary-mips/clamav-daemon_0.90.1dfsg-3.1+etch14_mips.deb stable/main/binary-mips/clamav-milter_0.90.1dfsg-3.1+etch14_mips.deb stable/main/binary-mips/clamav_0.90.1dfsg-3.1+etch14_mips.deb stable/main/binary-mips/libclamav-dev_0.90.1dfsg-3.1+etch14_mips.deb clamav (0.90.1dfsg-3.1+etch14) stable-security; urgency=high * Non-maintainer upload by the security team * Reinstate dropped patch for CVE-2008-2713, which was somehow left out of 0.90.1dfsg-3etch13 (Closes: #492252) stable/main/binary-ia64/libclamav2_0.90.1dfsg-3.1+etch14_ia64.deb stable/main/binary-ia64/clamav-milter_0.90.1dfsg-3.1+etch14_ia64.deb stable/main/binary-ia64/clamav-freshclam_0.90.1dfsg-3.1+etch14_ia64.deb stable/main/binary-ia64/libclamav-dev_0.90.1dfsg-3.1+etch14_ia64.deb stable/main/binary-ia64/clamav-daemon_0.90.1dfsg-3.1+etch14_ia64.deb stable/main/binary-ia64/clamav-dbg_0.90.1dfsg-3.1+etch14_ia64.deb stable/main/binary-ia64/clamav_0.90.1dfsg-3.1+etch14_ia64.deb clamav (0.90.1dfsg-3.1+etch14) stable-security; urgency=high * Non-maintainer upload by the security team * Reinstate dropped patch for CVE-2008-2713, which was somehow left out of 0.90.1dfsg-3etch13 (Closes: #492252) stable/main/binary-i386/clamav_0.90.1dfsg-3.1+etch14_i386.deb stable/main/binary-i386/clamav-daemon_0.90.1dfsg-3.1+etch14_i386.deb stable/main/binary-i386/libclamav-dev_0.90.1dfsg-3.1+etch14_i386.deb stable/main/binary-i386/clamav-dbg_0.90.1dfsg-3.1+etch14_i386.deb stable/main/binary-i386/libclamav2_0.90.1dfsg-3.1+etch14_i386.deb stable/main/binary-i386/clamav-milter_0.90.1dfsg-3.1+etch14_i386.deb stable/main/binary-i386/clamav-freshclam_0.90.1dfsg-3.1+etch14_i386.deb clamav (0.90.1dfsg-3.1+etch14) stable-security; urgency=high * Non-maintainer upload by the security team * Reinstate dropped patch for CVE-2008-2713, which was somehow left out of 0.90.1dfsg-3etch13 (Closes: #492252) stable/main/binary-hppa/clamav-daemon_0.90.1dfsg-3.1+etch14_hppa.deb stable/main/binary-hppa/clamav-freshclam_0.90.1dfsg-3.1+etch14_hppa.deb stable/main/binary-hppa/clamav-dbg_0.90.1dfsg-3.1+etch14_hppa.deb stable/main/binary-hppa/clamav-milter_0.90.1dfsg-3.1+etch14_hppa.deb stable/main/binary-hppa/libclamav2_0.90.1dfsg-3.1+etch14_hppa.deb stable/main/binary-hppa/clamav_0.90.1dfsg-3.1+etch14_hppa.deb stable/main/binary-hppa/libclamav-dev_0.90.1dfsg-3.1+etch14_hppa.deb clamav (0.90.1dfsg-3.1+etch14) stable-security; urgency=high * Non-maintainer upload by the security team * Reinstate dropped patch for CVE-2008-2713, which was somehow left out of 0.90.1dfsg-3etch13 (Closes: #492252) stable/main/binary-arm/clamav-daemon_0.90.1dfsg-3.1+etch14_arm.deb stable/main/binary-arm/clamav-freshclam_0.90.1dfsg-3.1+etch14_arm.deb stable/main/binary-arm/libclamav-dev_0.90.1dfsg-3.1+etch14_arm.deb stable/main/binary-arm/libclamav2_0.90.1dfsg-3.1+etch14_arm.deb stable/main/binary-arm/clamav_0.90.1dfsg-3.1+etch14_arm.deb stable/main/binary-arm/clamav-milter_0.90.1dfsg-3.1+etch14_arm.deb stable/main/binary-arm/clamav-dbg_0.90.1dfsg-3.1+etch14_arm.deb clamav (0.90.1dfsg-3.1+etch14) stable-security; urgency=high * Non-maintainer upload by the security team * Reinstate dropped patch for CVE-2008-2713, which was somehow left out of 0.90.1dfsg-3etch13 (Closes: #492252) stable/main/binary-alpha/clamav-daemon_0.90.1dfsg-3.1+etch14_alpha.deb stable/main/binary-alpha/clamav_0.90.1dfsg-3.1+etch14_alpha.deb stable/main/binary-alpha/clamav-freshclam_0.90.1dfsg-3.1+etch14_alpha.deb stable/main/binary-alpha/libclamav-dev_0.90.1dfsg-3.1+etch14_alpha.deb stable/main/binary-alpha/libclamav2_0.90.1dfsg-3.1+etch14_alpha.deb stable/main/binary-alpha/clamav-dbg_0.90.1dfsg-3.1+etch14_alpha.deb stable/main/binary-alpha/clamav-milter_0.90.1dfsg-3.1+etch14_alpha.deb clamav (0.90.1dfsg-3.1+etch14) stable-security; urgency=high * Non-maintainer upload by the security team * Reinstate dropped patch for CVE-2008-2713, which was somehow left out of 0.90.1dfsg-3etch13 (Closes: #492252) stable/main/binary-amd64/libclamav2_0.90.1dfsg-3.1+etch14_amd64.deb stable/main/source/clamav_0.90.1dfsg-3.1+etch14.dsc stable/main/binary-amd64/clamav_0.90.1dfsg-3.1+etch14_amd64.deb stable/main/binary-amd64/clamav-milter_0.90.1dfsg-3.1+etch14_amd64.deb stable/main/binary-amd64/clamav-daemon_0.90.1dfsg-3.1+etch14_amd64.deb stable/main/binary-all/clamav-testfiles_0.90.1dfsg-3.1+etch14_all.deb stable/main/source/clamav_0.90.1dfsg-3.1+etch14.diff.gz stable/main/binary-all/clamav-docs_0.90.1dfsg-3.1+etch14_all.deb stable/main/binary-amd64/clamav-dbg_0.90.1dfsg-3.1+etch14_amd64.deb stable/main/binary-amd64/clamav-freshclam_0.90.1dfsg-3.1+etch14_amd64.deb stable/main/binary-amd64/libclamav-dev_0.90.1dfsg-3.1+etch14_amd64.deb stable/main/binary-all/clamav-base_0.90.1dfsg-3.1+etch14_all.deb clamav (0.90.1dfsg-3.1+etch14) stable-security; urgency=high * Non-maintainer upload by the security team * Reinstate dropped patch for CVE-2008-2713, which was somehow left out of 0.90.1dfsg-3etch13 (Closes: #492252) stable/main/binary-all/blosxom_2.0-14+etch1_all.deb stable/main/source/blosxom_2.0-14+etch1.diff.gz stable/main/source/blosxom_2.0-14+etch1.dsc blosxom (2.0-14+etch1) stable; urgency=high * Apply patch to fix Cross-Site Scripting (XSS) vulnerability with respect to unknown flavours (CVE-2008-2236) (closes: #500873) * Only use param("-f") if $ENV{GATEWAY_INTERFACE} isn't set (closes: #423441) stable/main/binary-sparc/apache2-mpm-itk_2.2.3-01-2+etch1_sparc.deb apache2-mpm-itk (2.2.3-01-2+etch1) stable; urgency=low * Port fix for processes hanging on graceful restart or shutdown from apache2 2.2.3-4+etch6 to apache2-mpm-itk. stable/main/binary-s390/apache2-mpm-itk_2.2.3-01-2+etch1_s390.deb apache2-mpm-itk (2.2.3-01-2+etch1) stable; urgency=low * Port fix for processes hanging on graceful restart or shutdown from apache2 2.2.3-4+etch6 to apache2-mpm-itk. stable/main/binary-powerpc/apache2-mpm-itk_2.2.3-01-2+etch1_powerpc.deb apache2-mpm-itk (2.2.3-01-2+etch1) stable; urgency=low * Port fix for processes hanging on graceful restart or shutdown from apache2 2.2.3-4+etch6 to apache2-mpm-itk. stable/main/binary-mipsel/apache2-mpm-itk_2.2.3-01-2+etch1_mipsel.deb apache2-mpm-itk (2.2.3-01-2+etch1) stable; urgency=low * Port fix for processes hanging on graceful restart or shutdown from apache2 2.2.3-4+etch6 to apache2-mpm-itk. stable/main/binary-mips/apache2-mpm-itk_2.2.3-01-2+etch1_mips.deb apache2-mpm-itk (2.2.3-01-2+etch1) stable; urgency=low * Port fix for processes hanging on graceful restart or shutdown from apache2 2.2.3-4+etch6 to apache2-mpm-itk. stable/main/binary-ia64/apache2-mpm-itk_2.2.3-01-2+etch1_ia64.deb apache2-mpm-itk (2.2.3-01-2+etch1) stable; urgency=low * Port fix for processes hanging on graceful restart or shutdown from apache2 2.2.3-4+etch6 to apache2-mpm-itk. stable/main/binary-hppa/apache2-mpm-itk_2.2.3-01-2+etch1_hppa.deb apache2-mpm-itk (2.2.3-01-2+etch1) stable; urgency=low * Port fix for processes hanging on graceful restart or shutdown from apache2 2.2.3-4+etch6 to apache2-mpm-itk. stable/main/binary-arm/apache2-mpm-itk_2.2.3-01-2+etch1_arm.deb apache2-mpm-itk (2.2.3-01-2+etch1) stable; urgency=low * Port fix for processes hanging on graceful restart or shutdown from apache2 2.2.3-4+etch6 to apache2-mpm-itk. stable/main/binary-amd64/apache2-mpm-itk_2.2.3-01-2+etch1_amd64.deb apache2-mpm-itk (2.2.3-01-2+etch1) stable; urgency=low * Port fix for processes hanging on graceful restart or shutdown from apache2 2.2.3-4+etch6 to apache2-mpm-itk. stable/main/binary-alpha/apache2-mpm-itk_2.2.3-01-2+etch1_alpha.deb apache2-mpm-itk (2.2.3-01-2+etch1) stable; urgency=low * Port fix for processes hanging on graceful restart or shutdown from apache2 2.2.3-4+etch6 to apache2-mpm-itk. stable/main/source/apache2-mpm-itk_2.2.3-01-2+etch1.dsc stable/main/binary-i386/apache2-mpm-itk_2.2.3-01-2+etch1_i386.deb stable/main/source/apache2-mpm-itk_2.2.3-01-2+etch1.diff.gz apache2-mpm-itk (2.2.3-01-2+etch1) stable; urgency=low * Port fix for processes hanging on graceful restart or shutdown from apache2 2.2.3-4+etch6 to apache2-mpm-itk. stable/main/binary-sparc/apache2-prefork-dev_2.2.3-4+etch6_sparc.deb stable/main/binary-sparc/apache2-utils_2.2.3-4+etch6_sparc.deb stable/main/binary-sparc/apache2-mpm-worker_2.2.3-4+etch6_sparc.deb stable/main/binary-sparc/apache2.2-common_2.2.3-4+etch6_sparc.deb stable/main/binary-sparc/apache2-mpm-event_2.2.3-4+etch6_sparc.deb stable/main/binary-sparc/apache2-mpm-prefork_2.2.3-4+etch6_sparc.deb stable/main/binary-sparc/apache2-threaded-dev_2.2.3-4+etch6_sparc.deb apache2 (2.2.3-4+etch6) stable; urgency=low * Fix CVE-2007-6388: XSS in mod_status * Fix CVE-2008-2939: XSS in mod_proxy_ftp * Fix CVE-2008-2364: DoS in mod_proxy_http * Fix salt generation weakness in htpasswd (Closes: #489899) * Fix processes hanging on graceful restart or shutdown with prefork MPM. * mod_cache: Handle If-Range correctly if the cached resource was stale. This fixes problems when using apt with mod_cache (closes: #470652). stable/main/binary-s390/apache2-prefork-dev_2.2.3-4+etch6_s390.deb stable/main/binary-s390/apache2-threaded-dev_2.2.3-4+etch6_s390.deb stable/main/binary-s390/apache2-utils_2.2.3-4+etch6_s390.deb stable/main/binary-s390/apache2-mpm-worker_2.2.3-4+etch6_s390.deb stable/main/binary-s390/apache2.2-common_2.2.3-4+etch6_s390.deb stable/main/binary-s390/apache2-mpm-event_2.2.3-4+etch6_s390.deb stable/main/binary-s390/apache2-mpm-prefork_2.2.3-4+etch6_s390.deb apache2 (2.2.3-4+etch6) stable; urgency=low * Fix CVE-2007-6388: XSS in mod_status * Fix CVE-2008-2939: XSS in mod_proxy_ftp * Fix CVE-2008-2364: DoS in mod_proxy_http * Fix salt generation weakness in htpasswd (Closes: #489899) * Fix processes hanging on graceful restart or shutdown with prefork MPM. * mod_cache: Handle If-Range correctly if the cached resource was stale. This fixes problems when using apt with mod_cache (closes: #470652). stable/main/binary-powerpc/apache2-threaded-dev_2.2.3-4+etch6_powerpc.deb stable/main/binary-powerpc/apache2-utils_2.2.3-4+etch6_powerpc.deb stable/main/binary-powerpc/apache2-mpm-worker_2.2.3-4+etch6_powerpc.deb stable/main/binary-powerpc/apache2-mpm-event_2.2.3-4+etch6_powerpc.deb stable/main/binary-powerpc/apache2-mpm-prefork_2.2.3-4+etch6_powerpc.deb stable/main/binary-powerpc/apache2-prefork-dev_2.2.3-4+etch6_powerpc.deb stable/main/binary-powerpc/apache2.2-common_2.2.3-4+etch6_powerpc.deb apache2 (2.2.3-4+etch6) stable; urgency=low * Fix CVE-2007-6388: XSS in mod_status * Fix CVE-2008-2939: XSS in mod_proxy_ftp * Fix CVE-2008-2364: DoS in mod_proxy_http * Fix salt generation weakness in htpasswd (Closes: #489899) * Fix processes hanging on graceful restart or shutdown with prefork MPM. * mod_cache: Handle If-Range correctly if the cached resource was stale. This fixes problems when using apt with mod_cache (closes: #470652). stable/main/binary-mipsel/apache2-prefork-dev_2.2.3-4+etch6_mipsel.deb stable/main/binary-mipsel/apache2.2-common_2.2.3-4+etch6_mipsel.deb stable/main/binary-mipsel/apache2-mpm-worker_2.2.3-4+etch6_mipsel.deb stable/main/binary-mipsel/apache2-mpm-event_2.2.3-4+etch6_mipsel.deb stable/main/binary-mipsel/apache2-mpm-prefork_2.2.3-4+etch6_mipsel.deb stable/main/binary-mipsel/apache2-utils_2.2.3-4+etch6_mipsel.deb stable/main/binary-mipsel/apache2-threaded-dev_2.2.3-4+etch6_mipsel.deb apache2 (2.2.3-4+etch6) stable; urgency=low * Fix CVE-2007-6388: XSS in mod_status * Fix CVE-2008-2939: XSS in mod_proxy_ftp * Fix CVE-2008-2364: DoS in mod_proxy_http * Fix salt generation weakness in htpasswd (Closes: #489899) * Fix processes hanging on graceful restart or shutdown with prefork MPM. * mod_cache: Handle If-Range correctly if the cached resource was stale. This fixes problems when using apt with mod_cache (closes: #470652). stable/main/binary-mips/apache2.2-common_2.2.3-4+etch6_mips.deb stable/main/binary-mips/apache2-prefork-dev_2.2.3-4+etch6_mips.deb stable/main/binary-mips/apache2-mpm-prefork_2.2.3-4+etch6_mips.deb stable/main/binary-mips/apache2-mpm-event_2.2.3-4+etch6_mips.deb stable/main/binary-mips/apache2-threaded-dev_2.2.3-4+etch6_mips.deb stable/main/binary-mips/apache2-utils_2.2.3-4+etch6_mips.deb stable/main/binary-mips/apache2-mpm-worker_2.2.3-4+etch6_mips.deb apache2 (2.2.3-4+etch6) stable; urgency=low * Fix CVE-2007-6388: XSS in mod_status * Fix CVE-2008-2939: XSS in mod_proxy_ftp * Fix CVE-2008-2364: DoS in mod_proxy_http * Fix salt generation weakness in htpasswd (Closes: #489899) * Fix processes hanging on graceful restart or shutdown with prefork MPM. * mod_cache: Handle If-Range correctly if the cached resource was stale. This fixes problems when using apt with mod_cache (closes: #470652). stable/main/binary-ia64/apache2-threaded-dev_2.2.3-4+etch6_ia64.deb stable/main/binary-ia64/apache2-prefork-dev_2.2.3-4+etch6_ia64.deb stable/main/binary-ia64/apache2.2-common_2.2.3-4+etch6_ia64.deb stable/main/binary-ia64/apache2-mpm-event_2.2.3-4+etch6_ia64.deb stable/main/binary-ia64/apache2-utils_2.2.3-4+etch6_ia64.deb stable/main/binary-ia64/apache2-mpm-worker_2.2.3-4+etch6_ia64.deb stable/main/binary-ia64/apache2-mpm-prefork_2.2.3-4+etch6_ia64.deb apache2 (2.2.3-4+etch6) stable; urgency=low * Fix CVE-2007-6388: XSS in mod_status * Fix CVE-2008-2939: XSS in mod_proxy_ftp * Fix CVE-2008-2364: DoS in mod_proxy_http * Fix salt generation weakness in htpasswd (Closes: #489899) * Fix processes hanging on graceful restart or shutdown with prefork MPM. * mod_cache: Handle If-Range correctly if the cached resource was stale. This fixes problems when using apt with mod_cache (closes: #470652). stable/main/binary-hppa/apache2.2-common_2.2.3-4+etch6_hppa.deb stable/main/binary-hppa/apache2-threaded-dev_2.2.3-4+etch6_hppa.deb stable/main/binary-hppa/apache2-utils_2.2.3-4+etch6_hppa.deb stable/main/binary-hppa/apache2-mpm-prefork_2.2.3-4+etch6_hppa.deb stable/main/binary-hppa/apache2-prefork-dev_2.2.3-4+etch6_hppa.deb stable/main/binary-hppa/apache2-mpm-event_2.2.3-4+etch6_hppa.deb stable/main/binary-hppa/apache2-mpm-worker_2.2.3-4+etch6_hppa.deb apache2 (2.2.3-4+etch6) stable; urgency=low * Fix CVE-2007-6388: XSS in mod_status * Fix CVE-2008-2939: XSS in mod_proxy_ftp * Fix CVE-2008-2364: DoS in mod_proxy_http * Fix salt generation weakness in htpasswd (Closes: #489899) * Fix processes hanging on graceful restart or shutdown with prefork MPM. * mod_cache: Handle If-Range correctly if the cached resource was stale. This fixes problems when using apt with mod_cache (closes: #470652). stable/main/binary-arm/apache2.2-common_2.2.3-4+etch6_arm.deb stable/main/binary-arm/apache2-mpm-prefork_2.2.3-4+etch6_arm.deb stable/main/binary-arm/apache2-prefork-dev_2.2.3-4+etch6_arm.deb stable/main/binary-arm/apache2-threaded-dev_2.2.3-4+etch6_arm.deb stable/main/binary-arm/apache2-utils_2.2.3-4+etch6_arm.deb stable/main/binary-arm/apache2-mpm-worker_2.2.3-4+etch6_arm.deb stable/main/binary-arm/apache2-mpm-event_2.2.3-4+etch6_arm.deb apache2 (2.2.3-4+etch6) stable; urgency=low * Fix CVE-2007-6388: XSS in mod_status * Fix CVE-2008-2939: XSS in mod_proxy_ftp * Fix CVE-2008-2364: DoS in mod_proxy_http * Fix salt generation weakness in htpasswd (Closes: #489899) * Fix processes hanging on graceful restart or shutdown with prefork MPM. * mod_cache: Handle If-Range correctly if the cached resource was stale. This fixes problems when using apt with mod_cache (closes: #470652). stable/main/binary-amd64/apache2-prefork-dev_2.2.3-4+etch6_amd64.deb stable/main/binary-amd64/apache2-mpm-prefork_2.2.3-4+etch6_amd64.deb stable/main/binary-amd64/apache2-mpm-event_2.2.3-4+etch6_amd64.deb stable/main/binary-amd64/apache2-threaded-dev_2.2.3-4+etch6_amd64.deb stable/main/binary-amd64/apache2-utils_2.2.3-4+etch6_amd64.deb stable/main/binary-amd64/apache2.2-common_2.2.3-4+etch6_amd64.deb stable/main/binary-amd64/apache2-mpm-worker_2.2.3-4+etch6_amd64.deb apache2 (2.2.3-4+etch6) stable; urgency=low * Fix CVE-2007-6388: XSS in mod_status * Fix CVE-2008-2939: XSS in mod_proxy_ftp * Fix CVE-2008-2364: DoS in mod_proxy_http * Fix salt generation weakness in htpasswd (Closes: #489899) * Fix processes hanging on graceful restart or shutdown with prefork MPM. * mod_cache: Handle If-Range correctly if the cached resource was stale. This fixes problems when using apt with mod_cache (closes: #470652). stable/main/binary-alpha/apache2-prefork-dev_2.2.3-4+etch6_alpha.deb stable/main/binary-alpha/apache2.2-common_2.2.3-4+etch6_alpha.deb stable/main/binary-alpha/apache2-mpm-worker_2.2.3-4+etch6_alpha.deb stable/main/binary-alpha/apache2-mpm-prefork_2.2.3-4+etch6_alpha.deb stable/main/binary-alpha/apache2-mpm-event_2.2.3-4+etch6_alpha.deb stable/main/binary-alpha/apache2-threaded-dev_2.2.3-4+etch6_alpha.deb stable/main/binary-alpha/apache2-utils_2.2.3-4+etch6_alpha.deb apache2 (2.2.3-4+etch6) stable; urgency=low * Fix CVE-2007-6388: XSS in mod_status * Fix CVE-2008-2939: XSS in mod_proxy_ftp * Fix CVE-2008-2364: DoS in mod_proxy_http * Fix salt generation weakness in htpasswd (Closes: #489899) * Fix processes hanging on graceful restart or shutdown with prefork MPM. * mod_cache: Handle If-Range correctly if the cached resource was stale. This fixes problems when using apt with mod_cache (closes: #470652). stable/main/binary-i386/apache2-mpm-worker_2.2.3-4+etch6_i386.deb stable/main/binary-all/apache2-mpm-perchild_2.2.3-4+etch6_all.deb stable/main/binary-i386/apache2-prefork-dev_2.2.3-4+etch6_i386.deb stable/main/binary-i386/apache2-threaded-dev_2.2.3-4+etch6_i386.deb stable/main/binary-all/apache2-doc_2.2.3-4+etch6_all.deb stable/main/source/apache2_2.2.3-4+etch6.diff.gz stable/main/binary-i386/apache2.2-common_2.2.3-4+etch6_i386.deb stable/main/binary-i386/apache2-mpm-prefork_2.2.3-4+etch6_i386.deb stable/main/binary-i386/apache2-mpm-event_2.2.3-4+etch6_i386.deb stable/main/binary-all/apache2-src_2.2.3-4+etch6_all.deb stable/main/binary-all/apache2_2.2.3-4+etch6_all.deb stable/main/source/apache2_2.2.3-4+etch6.dsc stable/main/binary-i386/apache2-utils_2.2.3-4+etch6_i386.deb apache2 (2.2.3-4+etch6) stable; urgency=low * Fix CVE-2007-6388: XSS in mod_status * Fix CVE-2008-2939: XSS in mod_proxy_ftp * Fix CVE-2008-2364: DoS in mod_proxy_http * Fix salt generation weakness in htpasswd (Closes: #489899) * Fix processes hanging on graceful restart or shutdown with prefork MPM. * mod_cache: Handle If-Range correctly if the cached resource was stale. This fixes problems when using apt with mod_cache (closes: #470652). ========================================= Thu, 31 Jul 2008 - Debian 4.0r4a released ========================================= stable/main/source/squashfs-etchnhalf_3.3.orig.tar.gz stable/main/source/squashfs-etchnhalf_3.3-7~etchnhalf.2.dsc stable/main/source/squashfs-etchnhalf_3.3-7~etchnhalf.2.diff.gz stable/main/binary-all/squashfs-source-etchnhalf_3.3-7~etchnhalf.2_all.deb squashfs-etchnhalf (1:3.3-7~etchnhalf.2) stable; urgency=low * Revert dependency on gcc-4.2-hppa64 and binutils-hppa64. Neither is needed in etch. * Note FSF copyright of french manpage in copyright file * Drop redundant build-dep on zlib1g-dev stable/main/source/loop-aes-etchnhalf_3.2c-2~etchnhalf.2.dsc stable/main/source/loop-aes-etchnhalf_3.2c-2~etchnhalf.2.diff.gz stable/main/binary-all/loop-aes-source-etchnhalf_3.2c-2~etchnhalf.2_all.deb stable/main/source/loop-aes-etchnhalf_3.2c.orig.tar.gz loop-aes-etchnhalf (3.2c-2~etchnhalf.2) stable; urgency=low * Update copyright for loop-aes-keygen stable/main/binary-sparc/atl2-modules-2.6.24-etchnhalf.1-sparc64_2.6.24+2.0.3-6~etchnhalf.1_sparc.deb stable/main/binary-sparc/loop-aes-modules-2.6.24-etchnhalf.1-sparc64-smp_2.6.24+3.2c-6~etchnhalf.1_sparc.deb stable/main/binary-sparc/loop-aes-modules-2.6.24-etchnhalf.1-sparc64_2.6.24+3.2c-6~etchnhalf.1_sparc.deb stable/main/binary-sparc/squashfs-modules-2.6.24-etchnhalf.1-sparc64_2.6.24+3.3-6~etchnhalf.1_sparc.deb stable/main/binary-sparc/atl2-modules-2.6.24-etchnhalf.1-sparc64-smp_2.6.24+2.0.3-6~etchnhalf.1_sparc.deb stable/main/binary-sparc/atl2-modules-2.6-sparc64-smp-etchnhalf_2.6.24-6~etchnhalf.1_sparc.deb stable/main/binary-sparc/atl2-modules-2.6-sparc64-etchnhalf_2.6.24-6~etchnhalf.1_sparc.deb stable/main/binary-sparc/loop-aes-modules-2.6-sparc64-smp-etchnhalf_2.6.24-6~etchnhalf.1_sparc.deb stable/main/binary-sparc/loop-aes-modules-2.6-sparc64-etchnhalf_2.6.24-6~etchnhalf.1_sparc.deb stable/main/binary-sparc/squashfs-modules-2.6-sparc64-etchnhalf_2.6.24-6~etchnhalf.1_sparc.deb stable/main/binary-sparc/squashfs-modules-2.6.24-etchnhalf.1-sparc64-smp_2.6.24+3.3-6~etchnhalf.1_sparc.deb stable/main/binary-sparc/squashfs-modules-2.6-sparc64-smp-etchnhalf_2.6.24-6~etchnhalf.1_sparc.deb linux-modules-extra-2.6-etchnhalf (2.6.24-6~etchnhalf.1) stable; urgency=low * Branch for etchnhalf stable/main/binary-s390/loop-aes-modules-2.6.24-etchnhalf.1-s390_2.6.24+3.2c-6~etchnhalf.1_s390.deb stable/main/binary-s390/squashfs-modules-2.6.24-etchnhalf.1-s390x_2.6.24+3.3-6~etchnhalf.1_s390.deb stable/main/binary-s390/squashfs-modules-2.6.24-etchnhalf.1-s390_2.6.24+3.3-6~etchnhalf.1_s390.deb stable/main/binary-s390/squashfs-modules-2.6-s390-etchnhalf_2.6.24-6~etchnhalf.1_s390.deb stable/main/binary-s390/loop-aes-modules-2.6.24-etchnhalf.1-s390x_2.6.24+3.2c-6~etchnhalf.1_s390.deb stable/main/binary-s390/loop-aes-modules-2.6-s390-etchnhalf_2.6.24-6~etchnhalf.1_s390.deb stable/main/binary-s390/squashfs-modules-2.6-s390x-etchnhalf_2.6.24-6~etchnhalf.1_s390.deb stable/main/binary-s390/loop-aes-modules-2.6-s390x-etchnhalf_2.6.24-6~etchnhalf.1_s390.deb linux-modules-extra-2.6-etchnhalf (2.6.24-6~etchnhalf.1) stable; urgency=low * Branch for etchnhalf stable/main/binary-powerpc/squashfs-modules-2.6.24-etchnhalf.1-powerpc_2.6.24+3.3-6~etchnhalf.1_powerpc.deb stable/main/binary-powerpc/atl2-modules-2.6-powerpc64-etchnhalf_2.6.24-6~etchnhalf.1_powerpc.deb stable/main/binary-powerpc/loop-aes-modules-2.6-powerpc-smp-etchnhalf_2.6.24-6~etchnhalf.1_powerpc.deb stable/main/binary-powerpc/squashfs-modules-2.6-powerpc-etchnhalf_2.6.24-6~etchnhalf.1_powerpc.deb stable/main/binary-powerpc/squashfs-modules-2.6.24-etchnhalf.1-powerpc-smp_2.6.24+3.3-6~etchnhalf.1_powerpc.deb stable/main/binary-powerpc/loop-aes-modules-2.6.24-etchnhalf.1-powerpc-smp_2.6.24+3.2c-6~etchnhalf.1_powerpc.deb stable/main/binary-powerpc/loop-aes-modules-2.6.24-etchnhalf.1-powerpc64_2.6.24+3.2c-6~etchnhalf.1_powerpc.deb stable/main/binary-powerpc/atl2-modules-2.6-powerpc-smp-etchnhalf_2.6.24-6~etchnhalf.1_powerpc.deb stable/main/binary-powerpc/atl2-modules-2.6.24-etchnhalf.1-powerpc64_2.6.24+2.0.3-6~etchnhalf.1_powerpc.deb stable/main/binary-powerpc/squashfs-modules-2.6-powerpc64-etchnhalf_2.6.24-6~etchnhalf.1_powerpc.deb stable/main/binary-powerpc/atl2-modules-2.6-powerpc-miboot-etchnhalf_2.6.24-6~etchnhalf.1_powerpc.deb stable/main/binary-powerpc/squashfs-modules-2.6-powerpc-miboot-etchnhalf_2.6.24-6~etchnhalf.1_powerpc.deb stable/main/binary-powerpc/squashfs-modules-2.6.24-etchnhalf.1-powerpc-miboot_2.6.24+3.3-6~etchnhalf.1_powerpc.deb stable/main/binary-powerpc/squashfs-modules-2.6-powerpc-smp-etchnhalf_2.6.24-6~etchnhalf.1_powerpc.deb stable/main/binary-powerpc/loop-aes-modules-2.6.24-etchnhalf.1-powerpc-miboot_2.6.24+3.2c-6~etchnhalf.1_powerpc.deb stable/main/binary-powerpc/loop-aes-modules-2.6.24-etchnhalf.1-powerpc_2.6.24+3.2c-6~etchnhalf.1_powerpc.deb stable/main/binary-powerpc/atl2-modules-2.6.24-etchnhalf.1-powerpc_2.6.24+2.0.3-6~etchnhalf.1_powerpc.deb stable/main/binary-powerpc/atl2-modules-2.6.24-etchnhalf.1-powerpc-smp_2.6.24+2.0.3-6~etchnhalf.1_powerpc.deb stable/main/binary-powerpc/loop-aes-modules-2.6-powerpc-miboot-etchnhalf_2.6.24-6~etchnhalf.1_powerpc.deb stable/main/binary-powerpc/loop-aes-modules-2.6-powerpc64-etchnhalf_2.6.24-6~etchnhalf.1_powerpc.deb stable/main/binary-powerpc/atl2-modules-2.6.24-etchnhalf.1-powerpc-miboot_2.6.24+2.0.3-6~etchnhalf.1_powerpc.deb stable/main/binary-powerpc/squashfs-modules-2.6.24-etchnhalf.1-powerpc64_2.6.24+3.3-6~etchnhalf.1_powerpc.deb stable/main/binary-powerpc/atl2-modules-2.6-powerpc-etchnhalf_2.6.24-6~etchnhalf.1_powerpc.deb stable/main/binary-powerpc/loop-aes-modules-2.6-powerpc-etchnhalf_2.6.24-6~etchnhalf.1_powerpc.deb linux-modules-extra-2.6-etchnhalf (2.6.24-6~etchnhalf.1) stable; urgency=low * Branch for etchnhalf stable/main/binary-mipsel/squashfs-modules-2.6.24-etchnhalf.1-sb1a-bcm91480b_2.6.24+3.3-6~etchnhalf.1_mipsel.deb stable/main/binary-mipsel/squashfs-modules-2.6.24-etchnhalf.1-5kc-malta_2.6.24+3.3-6~etchnhalf.1_mipsel.deb stable/main/binary-mipsel/loop-aes-modules-2.6.24-etchnhalf.1-5kc-malta_2.6.24+3.2c-6~etchnhalf.1_mipsel.deb stable/main/binary-mipsel/loop-aes-modules-2.6-5kc-malta-etchnhalf_2.6.24-6~etchnhalf.1_mipsel.deb stable/main/binary-mipsel/squashfs-modules-2.6.24-etchnhalf.1-4kc-malta_2.6.24+3.3-6~etchnhalf.1_mipsel.deb stable/main/binary-mipsel/atl2-modules-2.6.24-etchnhalf.1-sb1-bcm91250a_2.6.24+2.0.3-6~etchnhalf.1_mipsel.deb stable/main/binary-mipsel/loop-aes-modules-2.6-sb1a-bcm91480b-etchnhalf_2.6.24-6~etchnhalf.1_mipsel.deb stable/main/binary-mipsel/squashfs-modules-2.6-4kc-malta-etchnhalf_2.6.24-6~etchnhalf.1_mipsel.deb stable/main/binary-mipsel/atl2-modules-2.6.24-etchnhalf.1-4kc-malta_2.6.24+2.0.3-6~etchnhalf.1_mipsel.deb stable/main/binary-mipsel/loop-aes-modules-2.6-sb1-bcm91250a-etchnhalf_2.6.24-6~etchnhalf.1_mipsel.deb stable/main/binary-mipsel/atl2-modules-2.6.24-etchnhalf.1-sb1a-bcm91480b_2.6.24+2.0.3-6~etchnhalf.1_mipsel.deb stable/main/binary-mipsel/loop-aes-modules-2.6-r5k-cobalt-etchnhalf_2.6.24-6~etchnhalf.1_mipsel.deb stable/main/binary-mipsel/squashfs-modules-2.6.24-etchnhalf.1-r5k-cobalt_2.6.24+3.3-6~etchnhalf.1_mipsel.deb stable/main/binary-mipsel/atl2-modules-2.6-4kc-malta-etchnhalf_2.6.24-6~etchnhalf.1_mipsel.deb stable/main/binary-mipsel/atl2-modules-2.6.24-etchnhalf.1-5kc-malta_2.6.24+2.0.3-6~etchnhalf.1_mipsel.deb stable/main/binary-mipsel/loop-aes-modules-2.6.24-etchnhalf.1-sb1a-bcm91480b_2.6.24+3.2c-6~etchnhalf.1_mipsel.deb stable/main/binary-mipsel/loop-aes-modules-2.6.24-etchnhalf.1-4kc-malta_2.6.24+3.2c-6~etchnhalf.1_mipsel.deb stable/main/binary-mipsel/squashfs-modules-2.6-5kc-malta-etchnhalf_2.6.24-6~etchnhalf.1_mipsel.deb stable/main/binary-mipsel/loop-aes-modules-2.6-4kc-malta-etchnhalf_2.6.24-6~etchnhalf.1_mipsel.deb stable/main/binary-mipsel/atl2-modules-2.6.24-etchnhalf.1-r5k-cobalt_2.6.24+2.0.3-6~etchnhalf.1_mipsel.deb stable/main/binary-mipsel/loop-aes-modules-2.6.24-etchnhalf.1-sb1-bcm91250a_2.6.24+3.2c-6~etchnhalf.1_mipsel.deb stable/main/binary-mipsel/atl2-modules-2.6-r5k-cobalt-etchnhalf_2.6.24-6~etchnhalf.1_mipsel.deb stable/main/binary-mipsel/squashfs-modules-2.6-r5k-cobalt-etchnhalf_2.6.24-6~etchnhalf.1_mipsel.deb stable/main/binary-mipsel/atl2-modules-2.6-5kc-malta-etchnhalf_2.6.24-6~etchnhalf.1_mipsel.deb stable/main/binary-mipsel/squashfs-modules-2.6-sb1a-bcm91480b-etchnhalf_2.6.24-6~etchnhalf.1_mipsel.deb stable/main/binary-mipsel/squashfs-modules-2.6.24-etchnhalf.1-sb1-bcm91250a_2.6.24+3.3-6~etchnhalf.1_mipsel.deb stable/main/binary-mipsel/loop-aes-modules-2.6.24-etchnhalf.1-r5k-cobalt_2.6.24+3.2c-6~etchnhalf.1_mipsel.deb stable/main/binary-mipsel/squashfs-modules-2.6-sb1-bcm91250a-etchnhalf_2.6.24-6~etchnhalf.1_mipsel.deb stable/main/binary-mipsel/atl2-modules-2.6-sb1a-bcm91480b-etchnhalf_2.6.24-6~etchnhalf.1_mipsel.deb stable/main/binary-mipsel/atl2-modules-2.6-sb1-bcm91250a-etchnhalf_2.6.24-6~etchnhalf.1_mipsel.deb linux-modules-extra-2.6-etchnhalf (2.6.24-6~etchnhalf.1) stable; urgency=low * Branch for etchnhalf stable/main/binary-mips/squashfs-modules-2.6-sb1-bcm91250a-etchnhalf_2.6.24-6~etchnhalf.1_mips.deb stable/main/binary-mips/loop-aes-modules-2.6.24-etchnhalf.1-r4k-ip22_2.6.24+3.2c-6~etchnhalf.1_mips.deb stable/main/binary-mips/loop-aes-modules-2.6.24-etchnhalf.1-5kc-malta_2.6.24+3.2c-6~etchnhalf.1_mips.deb stable/main/binary-mips/loop-aes-modules-2.6-r4k-ip22-etchnhalf_2.6.24-6~etchnhalf.1_mips.deb stable/main/binary-mips/loop-aes-modules-2.6.24-etchnhalf.1-sb1a-bcm91480b_2.6.24+3.2c-6~etchnhalf.1_mips.deb stable/main/binary-mips/squashfs-modules-2.6.24-etchnhalf.1-sb1a-bcm91480b_2.6.24+3.3-6~etchnhalf.1_mips.deb stable/main/binary-mips/squashfs-modules-2.6-r5k-ip32-etchnhalf_2.6.24-6~etchnhalf.1_mips.deb stable/main/binary-mips/squashfs-modules-2.6.24-etchnhalf.1-4kc-malta_2.6.24+3.3-6~etchnhalf.1_mips.deb stable/main/binary-mips/loop-aes-modules-2.6-r5k-ip32-etchnhalf_2.6.24-6~etchnhalf.1_mips.deb stable/main/binary-mips/loop-aes-modules-2.6.24-etchnhalf.1-sb1-bcm91250a_2.6.24+3.2c-6~etchnhalf.1_mips.deb stable/main/binary-mips/squashfs-modules-2.6.24-etchnhalf.1-5kc-malta_2.6.24+3.3-6~etchnhalf.1_mips.deb stable/main/binary-mips/loop-aes-modules-2.6-sb1-bcm91250a-etchnhalf_2.6.24-6~etchnhalf.1_mips.deb stable/main/binary-mips/loop-aes-modules-2.6.24-etchnhalf.1-r5k-ip32_2.6.24+3.2c-6~etchnhalf.1_mips.deb stable/main/binary-mips/squashfs-modules-2.6-sb1a-bcm91480b-etchnhalf_2.6.24-6~etchnhalf.1_mips.deb stable/main/binary-mips/loop-aes-modules-2.6-sb1a-bcm91480b-etchnhalf_2.6.24-6~etchnhalf.1_mips.deb stable/main/binary-mips/loop-aes-modules-2.6.24-etchnhalf.1-4kc-malta_2.6.24+3.2c-6~etchnhalf.1_mips.deb stable/main/binary-mips/squashfs-modules-2.6-5kc-malta-etchnhalf_2.6.24-6~etchnhalf.1_mips.deb stable/main/binary-mips/squashfs-modules-2.6-4kc-malta-etchnhalf_2.6.24-6~etchnhalf.1_mips.deb stable/main/binary-mips/squashfs-modules-2.6.24-etchnhalf.1-r5k-ip32_2.6.24+3.3-6~etchnhalf.1_mips.deb stable/main/binary-mips/squashfs-modules-2.6.24-etchnhalf.1-sb1-bcm91250a_2.6.24+3.3-6~etchnhalf.1_mips.deb stable/main/binary-mips/squashfs-modules-2.6.24-etchnhalf.1-r4k-ip22_2.6.24+3.3-6~etchnhalf.1_mips.deb stable/main/binary-mips/squashfs-modules-2.6-r4k-ip22-etchnhalf_2.6.24-6~etchnhalf.1_mips.deb stable/main/binary-mips/loop-aes-modules-2.6-5kc-malta-etchnhalf_2.6.24-6~etchnhalf.1_mips.deb stable/main/binary-mips/loop-aes-modules-2.6-4kc-malta-etchnhalf_2.6.24-6~etchnhalf.1_mips.deb linux-modules-extra-2.6-etchnhalf (2.6.24-6~etchnhalf.1) stable; urgency=low * Branch for etchnhalf stable/main/binary-i386/loop-aes-modules-2.6-486-etchnhalf_2.6.24-6~etchnhalf.1_i386.deb stable/main/binary-i386/squashfs-modules-2.6-486-etchnhalf_2.6.24-6~etchnhalf.1_i386.deb stable/main/binary-i386/atl2-modules-2.6-686-etchnhalf_2.6.24-6~etchnhalf.1_i386.deb stable/main/binary-i386/squashfs-modules-2.6.24-etchnhalf.1-686_2.6.24+3.3-6~etchnhalf.1_i386.deb stable/main/binary-i386/atl2-modules-2.6.24-etchnhalf.1-amd64_2.6.24+2.0.3-6~etchnhalf.1_i386.deb stable/main/binary-i386/loop-aes-modules-2.6-amd64-etchnhalf_2.6.24-6~etchnhalf.1_i386.deb stable/main/binary-i386/squashfs-modules-2.6.24-etchnhalf.1-686-bigmem_2.6.24+3.3-6~etchnhalf.1_i386.deb stable/main/binary-i386/loop-aes-modules-2.6.24-etchnhalf.1-amd64_2.6.24+3.2c-6~etchnhalf.1_i386.deb stable/main/binary-i386/loop-aes-modules-2.6-686-etchnhalf_2.6.24-6~etchnhalf.1_i386.deb stable/main/binary-i386/atl2-modules-2.6.24-etchnhalf.1-686_2.6.24+2.0.3-6~etchnhalf.1_i386.deb stable/main/binary-i386/loop-aes-modules-2.6-686-bigmem-etchnhalf_2.6.24-6~etchnhalf.1_i386.deb stable/main/binary-i386/squashfs-modules-2.6.24-etchnhalf.1-amd64_2.6.24+3.3-6~etchnhalf.1_i386.deb stable/main/binary-i386/atl2-modules-2.6-486-etchnhalf_2.6.24-6~etchnhalf.1_i386.deb stable/main/binary-i386/loop-aes-modules-2.6.24-etchnhalf.1-686_2.6.24+3.2c-6~etchnhalf.1_i386.deb stable/main/binary-i386/loop-aes-modules-2.6.24-etchnhalf.1-686-bigmem_2.6.24+3.2c-6~etchnhalf.1_i386.deb stable/main/binary-i386/squashfs-modules-2.6-amd64-etchnhalf_2.6.24-6~etchnhalf.1_i386.deb stable/main/binary-i386/squashfs-modules-2.6-686-bigmem-etchnhalf_2.6.24-6~etchnhalf.1_i386.deb stable/main/binary-i386/atl2-modules-2.6.24-etchnhalf.1-686-bigmem_2.6.24+2.0.3-6~etchnhalf.1_i386.deb stable/main/binary-i386/atl2-modules-2.6.24-etchnhalf.1-486_2.6.24+2.0.3-6~etchnhalf.1_i386.deb stable/main/binary-i386/squashfs-modules-2.6-686-etchnhalf_2.6.24-6~etchnhalf.1_i386.deb stable/main/binary-i386/atl2-modules-2.6-686-bigmem-etchnhalf_2.6.24-6~etchnhalf.1_i386.deb stable/main/binary-i386/atl2-modules-2.6-amd64-etchnhalf_2.6.24-6~etchnhalf.1_i386.deb stable/main/binary-i386/loop-aes-modules-2.6.24-etchnhalf.1-486_2.6.24+3.2c-6~etchnhalf.1_i386.deb stable/main/binary-i386/squashfs-modules-2.6.24-etchnhalf.1-486_2.6.24+3.3-6~etchnhalf.1_i386.deb linux-modules-extra-2.6-etchnhalf (2.6.24-6~etchnhalf.1) stable; urgency=low * Branch for etchnhalf stable/main/binary-hppa/atl2-modules-2.6.24-etchnhalf.1-parisc_2.6.24+2.0.3-6~etchnhalf.1_hppa.deb stable/main/binary-hppa/loop-aes-modules-2.6.24-etchnhalf.1-parisc_2.6.24+3.2c-6~etchnhalf.1_hppa.deb stable/main/binary-hppa/loop-aes-modules-2.6.24-etchnhalf.1-parisc-smp_2.6.24+3.2c-6~etchnhalf.1_hppa.deb stable/main/binary-hppa/loop-aes-modules-2.6-parisc-etchnhalf_2.6.24-6~etchnhalf.1_hppa.deb stable/main/binary-hppa/atl2-modules-2.6-parisc64-etchnhalf_2.6.24-6~etchnhalf.1_hppa.deb stable/main/binary-hppa/loop-aes-modules-2.6-parisc-smp-etchnhalf_2.6.24-6~etchnhalf.1_hppa.deb stable/main/binary-hppa/atl2-modules-2.6.24-etchnhalf.1-parisc-smp_2.6.24+2.0.3-6~etchnhalf.1_hppa.deb stable/main/binary-hppa/loop-aes-modules-2.6-parisc64-etchnhalf_2.6.24-6~etchnhalf.1_hppa.deb stable/main/binary-hppa/loop-aes-modules-2.6-parisc64-smp-etchnhalf_2.6.24-6~etchnhalf.1_hppa.deb stable/main/binary-hppa/atl2-modules-2.6-parisc64-smp-etchnhalf_2.6.24-6~etchnhalf.1_hppa.deb stable/main/binary-hppa/atl2-modules-2.6-parisc-smp-etchnhalf_2.6.24-6~etchnhalf.1_hppa.deb stable/main/binary-hppa/atl2-modules-2.6-parisc-etchnhalf_2.6.24-6~etchnhalf.1_hppa.deb stable/main/binary-hppa/loop-aes-modules-2.6.24-etchnhalf.1-parisc64-smp_2.6.24+3.2c-6~etchnhalf.1_hppa.deb stable/main/binary-hppa/loop-aes-modules-2.6.24-etchnhalf.1-parisc64_2.6.24+3.2c-6~etchnhalf.1_hppa.deb stable/main/binary-hppa/atl2-modules-2.6.24-etchnhalf.1-parisc64-smp_2.6.24+2.0.3-6~etchnhalf.1_hppa.deb stable/main/binary-hppa/atl2-modules-2.6.24-etchnhalf.1-parisc64_2.6.24+2.0.3-6~etchnhalf.1_hppa.deb linux-modules-extra-2.6-etchnhalf (2.6.24-6~etchnhalf.1) stable; urgency=low * Branch for etchnhalf stable/main/binary-arm/loop-aes-modules-2.6-iop32x-etchnhalf_2.6.24-6~etchnhalf.1_arm.deb stable/main/binary-arm/loop-aes-modules-2.6.24-etchnhalf.1-iop32x_2.6.24+3.2c-6~etchnhalf.1_arm.deb stable/main/binary-arm/squashfs-modules-2.6-iop32x-etchnhalf_2.6.24-6~etchnhalf.1_arm.deb stable/main/binary-arm/atl2-modules-2.6-ixp4xx-etchnhalf_2.6.24-6~etchnhalf.1_arm.deb stable/main/binary-arm/squashfs-modules-2.6-footbridge-etchnhalf_2.6.24-6~etchnhalf.1_arm.deb stable/main/binary-arm/squashfs-modules-2.6.24-etchnhalf.1-footbridge_2.6.24+3.3-6~etchnhalf.1_arm.deb stable/main/binary-arm/loop-aes-modules-2.6.24-etchnhalf.1-ixp4xx_2.6.24+3.2c-6~etchnhalf.1_arm.deb stable/main/binary-arm/atl2-modules-2.6-iop32x-etchnhalf_2.6.24-6~etchnhalf.1_arm.deb stable/main/binary-arm/atl2-modules-2.6.24-etchnhalf.1-footbridge_2.6.24+2.0.3-6~etchnhalf.1_arm.deb stable/main/binary-arm/loop-aes-modules-2.6-ixp4xx-etchnhalf_2.6.24-6~etchnhalf.1_arm.deb stable/main/binary-arm/atl2-modules-2.6-footbridge-etchnhalf_2.6.24-6~etchnhalf.1_arm.deb stable/main/binary-arm/atl2-modules-2.6.24-etchnhalf.1-iop32x_2.6.24+2.0.3-6~etchnhalf.1_arm.deb stable/main/binary-arm/atl2-modules-2.6.24-etchnhalf.1-ixp4xx_2.6.24+2.0.3-6~etchnhalf.1_arm.deb stable/main/binary-arm/squashfs-modules-2.6-ixp4xx-etchnhalf_2.6.24-6~etchnhalf.1_arm.deb stable/main/binary-arm/squashfs-modules-2.6.24-etchnhalf.1-ixp4xx_2.6.24+3.3-6~etchnhalf.1_arm.deb stable/main/binary-arm/loop-aes-modules-2.6.24-etchnhalf.1-footbridge_2.6.24+3.2c-6~etchnhalf.1_arm.deb stable/main/binary-arm/loop-aes-modules-2.6-footbridge-etchnhalf_2.6.24-6~etchnhalf.1_arm.deb stable/main/binary-arm/squashfs-modules-2.6.24-etchnhalf.1-iop32x_2.6.24+3.3-6~etchnhalf.1_arm.deb linux-modules-extra-2.6-etchnhalf (2.6.24-6~etchnhalf.1) stable; urgency=low * Branch for etchnhalf stable/main/binary-amd64/loop-aes-modules-2.6-amd64-etchnhalf_2.6.24-6~etchnhalf.1_amd64.deb stable/main/binary-amd64/atl2-modules-2.6-amd64-etchnhalf_2.6.24-6~etchnhalf.1_amd64.deb stable/main/binary-amd64/loop-aes-modules-2.6.24-etchnhalf.1-amd64_2.6.24+3.2c-6~etchnhalf.1_amd64.deb stable/main/binary-amd64/squashfs-modules-2.6-amd64-etchnhalf_2.6.24-6~etchnhalf.1_amd64.deb stable/main/binary-amd64/squashfs-modules-2.6.24-etchnhalf.1-amd64_2.6.24+3.3-6~etchnhalf.1_amd64.deb stable/main/binary-amd64/atl2-modules-2.6.24-etchnhalf.1-amd64_2.6.24+2.0.3-6~etchnhalf.1_amd64.deb linux-modules-extra-2.6-etchnhalf (2.6.24-6~etchnhalf.1) stable; urgency=low * Branch for etchnhalf stable/main/binary-alpha/squashfs-modules-2.6.24-etchnhalf.1-alpha-legacy_2.6.24+3.3-6~etchnhalf.1_alpha.deb stable/main/binary-alpha/atl2-modules-2.6.24-etchnhalf.1-alpha-generic_2.6.24+2.0.3-6~etchnhalf.1_alpha.deb stable/main/binary-alpha/atl2-modules-2.6-alpha-generic-etchnhalf_2.6.24-6~etchnhalf.1_alpha.deb stable/main/binary-alpha/squashfs-modules-2.6-alpha-generic-etchnhalf_2.6.24-6~etchnhalf.1_alpha.deb stable/main/binary-alpha/squashfs-modules-2.6-alpha-smp-etchnhalf_2.6.24-6~etchnhalf.1_alpha.deb stable/main/binary-alpha/atl2-modules-2.6-alpha-legacy-etchnhalf_2.6.24-6~etchnhalf.1_alpha.deb stable/main/binary-alpha/squashfs-modules-2.6-alpha-legacy-etchnhalf_2.6.24-6~etchnhalf.1_alpha.deb stable/main/binary-alpha/squashfs-modules-2.6.24-etchnhalf.1-alpha-generic_2.6.24+3.3-6~etchnhalf.1_alpha.deb stable/main/binary-alpha/loop-aes-modules-2.6-alpha-legacy-etchnhalf_2.6.24-6~etchnhalf.1_alpha.deb stable/main/binary-alpha/loop-aes-modules-2.6.24-etchnhalf.1-alpha-legacy_2.6.24+3.2c-6~etchnhalf.1_alpha.deb stable/main/binary-alpha/loop-aes-modules-2.6-alpha-generic-etchnhalf_2.6.24-6~etchnhalf.1_alpha.deb stable/main/binary-alpha/loop-aes-modules-2.6.24-etchnhalf.1-alpha-smp_2.6.24+3.2c-6~etchnhalf.1_alpha.deb stable/main/binary-alpha/atl2-modules-2.6.24-etchnhalf.1-alpha-legacy_2.6.24+2.0.3-6~etchnhalf.1_alpha.deb stable/main/binary-alpha/loop-aes-modules-2.6-alpha-smp-etchnhalf_2.6.24-6~etchnhalf.1_alpha.deb stable/main/binary-alpha/loop-aes-modules-2.6.24-etchnhalf.1-alpha-generic_2.6.24+3.2c-6~etchnhalf.1_alpha.deb stable/main/binary-alpha/atl2-modules-2.6-alpha-smp-etchnhalf_2.6.24-6~etchnhalf.1_alpha.deb stable/main/binary-alpha/squashfs-modules-2.6.24-etchnhalf.1-alpha-smp_2.6.24+3.3-6~etchnhalf.1_alpha.deb stable/main/binary-alpha/atl2-modules-2.6.24-etchnhalf.1-alpha-smp_2.6.24+2.0.3-6~etchnhalf.1_alpha.deb linux-modules-extra-2.6-etchnhalf (2.6.24-6~etchnhalf.1) stable; urgency=low * Branch for etchnhalf stable/main/binary-ia64/loop-aes-modules-2.6.24-etchnhalf.1-itanium_2.6.24+3.2c-6~etchnhalf.1_ia64.deb stable/main/binary-ia64/atl2-modules-2.6-mckinley-etchnhalf_2.6.24-6~etchnhalf.1_ia64.deb stable/main/binary-ia64/squashfs-modules-2.6-itanium-etchnhalf_2.6.24-6~etchnhalf.1_ia64.deb stable/main/source/linux-modules-extra-2.6-etchnhalf_2.6.24-6~etchnhalf.1.tar.gz stable/main/binary-ia64/squashfs-modules-2.6-mckinley-etchnhalf_2.6.24-6~etchnhalf.1_ia64.deb stable/main/binary-ia64/atl2-modules-2.6-itanium-etchnhalf_2.6.24-6~etchnhalf.1_ia64.deb stable/main/binary-ia64/atl2-modules-2.6.24-etchnhalf.1-mckinley_2.6.24+2.0.3-6~etchnhalf.1_ia64.deb stable/main/binary-ia64/squashfs-modules-2.6.24-etchnhalf.1-itanium_2.6.24+3.3-6~etchnhalf.1_ia64.deb stable/main/binary-ia64/loop-aes-modules-2.6-itanium-etchnhalf_2.6.24-6~etchnhalf.1_ia64.deb stable/main/binary-ia64/atl2-modules-2.6.24-etchnhalf.1-itanium_2.6.24+2.0.3-6~etchnhalf.1_ia64.deb stable/main/source/linux-modules-extra-2.6-etchnhalf_2.6.24-6~etchnhalf.1.dsc stable/main/binary-ia64/loop-aes-modules-2.6.24-etchnhalf.1-mckinley_2.6.24+3.2c-6~etchnhalf.1_ia64.deb stable/main/binary-ia64/loop-aes-modules-2.6-mckinley-etchnhalf_2.6.24-6~etchnhalf.1_ia64.deb stable/main/binary-ia64/squashfs-modules-2.6.24-etchnhalf.1-mckinley_2.6.24+3.3-6~etchnhalf.1_ia64.deb linux-modules-extra-2.6-etchnhalf (2.6.24-6~etchnhalf.1) stable; urgency=low * Branch for etchnhalf stable/main/source/atl2-etchnhalf_2.0.3-3~etchnhalf.1.diff.gz stable/main/source/atl2-etchnhalf_2.0.3-3~etchnhalf.1.dsc stable/main/source/atl2-etchnhalf_2.0.3.orig.tar.gz stable/main/binary-all/atl2-source-etchnhalf_2.0.3-3~etchnhalf.1_all.deb atl2-etchnhalf (2.0.3-3~etchnhalf.1) stable; urgency=low * Backport for etchnhalf ========================================= Sat, 26 Jul 2008 - Debian 4.0r4 released ========================================= [Date: Sat, 26 Jul 2008 10:16:22 +0000] [ftpmaster: Joerg Jaspert] Removed the following packages from stable: glimpse | 4.18.5-1 | source, alpha, amd64, arm, hppa, i386, ia64, mips, mipsel, powerpc, sparc Closed bugs: 474322 ------------------- Reason ------------------- RoSRM; license problem ---------------------------------------------- Removed the following packages from stable: libsqldbc75 | 7.5.00.34-7 | amd64, i386, ia64 libsqldbc75-dev | 7.5.00.34-7 | amd64, i386, ia64 libsqlod75 | 7.5.00.34-7 | amd64, i386, ia64 libsqlod75-dev | 7.5.00.34-7 | amd64, i386, ia64 maxdb-7.5.00 | 7.5.00.34-7 | source maxdb-dbanalyzer | 7.5.00.34-7 | amd64, i386, ia64 maxdb-dbmcli | 7.5.00.34-7 | amd64, i386, ia64 maxdb-loadercli | 7.5.00.34-7 | amd64, i386, ia64 maxdb-lserver | 7.5.00.34-7 | amd64, i386, ia64 maxdb-server | 7.5.00.34-7 | amd64, i386, ia64 maxdb-server-7.5.00 | 7.5.00.34-7 | amd64, i386, ia64 maxdb-server-dbg-7.5.00 | 7.5.00.34-7 | amd64, i386, ia64 maxdb-sqlcli | 7.5.00.34-7 | amd64, i386, ia64 maxdb-webtools | 7.5.00.34-7 | amd64, i386, ia64 python-maxdb | 7.5.00.34-7 | amd64, i386, ia64 python-maxdb-loader | 7.5.00.34-7 | amd64, i386, ia64 Closed bugs: 481231 ------------------- Reason ------------------- ROST; Unfixable security bug, upstream went non-free ---------------------------------------------- Removed the following packages from stable: dcc | 1.2.74-4 | source dcc-client | 1.2.74-4 | alpha, amd64, arm, hppa, i386, ia64, mips, mipsel, powerpc, s390, sparc dcc-common | 1.2.74-4 | alpha, amd64, arm, hppa, i386, ia64, mips, mipsel, powerpc, s390, sparc dcc-milter | 1.2.74-4 | alpha, amd64, arm, hppa, i386, ia64, mips, mipsel, powerpc, s390, sparc dcc-server | 1.2.74-4 | alpha, amd64, arm, hppa, i386, ia64, mips, mipsel, powerpc, s390, sparc Closed bugs: 475088 ------------------- Reason ------------------- ROST; Upstream requests removal, security issues, upstream went non-free ---------------------------------------------- stable/main/binary-sparc/znc_0.045-3+etch1_sparc.deb znc (0.045-3+etch1) stable; urgency=low * Set myself as new maintainer. * Applied two patches from upstream which fixes two crash bugs: - Crash bug when doing /nick while not connected to IRC (NULL pointer). - Crash bug when using *status while not connected to IRC (NULL pointer). stable/main/binary-s390/znc_0.045-3+etch1_s390.deb znc (0.045-3+etch1) stable; urgency=low * Set myself as new maintainer. * Applied two patches from upstream which fixes two crash bugs: - Crash bug when doing /nick while not connected to IRC (NULL pointer). - Crash bug when using *status while not connected to IRC (NULL pointer). stable/main/binary-powerpc/znc_0.045-3+etch1_powerpc.deb znc (0.045-3+etch1) stable; urgency=low * Set myself as new maintainer. * Applied two patches from upstream which fixes two crash bugs: - Crash bug when doing /nick while not connected to IRC (NULL pointer). - Crash bug when using *status while not connected to IRC (NULL pointer). stable/main/binary-mipsel/znc_0.045-3+etch1_mipsel.deb znc (0.045-3+etch1) stable; urgency=low * Set myself as new maintainer. * Applied two patches from upstream which fixes two crash bugs: - Crash bug when doing /nick while not connected to IRC (NULL pointer). - Crash bug when using *status while not connected to IRC (NULL pointer). stable/main/binary-mips/znc_0.045-3+etch1_mips.deb znc (0.045-3+etch1) stable; urgency=low * Set myself as new maintainer. * Applied two patches from upstream which fixes two crash bugs: - Crash bug when doing /nick while not connected to IRC (NULL pointer). - Crash bug when using *status while not connected to IRC (NULL pointer). stable/main/binary-ia64/znc_0.045-3+etch1_ia64.deb znc (0.045-3+etch1) stable; urgency=low * Set myself as new maintainer. * Applied two patches from upstream which fixes two crash bugs: - Crash bug when doing /nick while not connected to IRC (NULL pointer). - Crash bug when using *status while not connected to IRC (NULL pointer). stable/main/binary-hppa/znc_0.045-3+etch1_hppa.deb znc (0.045-3+etch1) stable; urgency=low * Set myself as new maintainer. * Applied two patches from upstream which fixes two crash bugs: - Crash bug when doing /nick while not connected to IRC (NULL pointer). - Crash bug when using *status while not connected to IRC (NULL pointer). stable/main/binary-arm/znc_0.045-3+etch1_arm.deb znc (0.045-3+etch1) stable; urgency=low * Set myself as new maintainer. * Applied two patches from upstream which fixes two crash bugs: - Crash bug when doing /nick while not connected to IRC (NULL pointer). - Crash bug when using *status while not connected to IRC (NULL pointer). stable/main/binary-amd64/znc_0.045-3+etch1_amd64.deb znc (0.045-3+etch1) stable; urgency=low * Set myself as new maintainer. * Applied two patches from upstream which fixes two crash bugs: - Crash bug when doing /nick while not connected to IRC (NULL pointer). - Crash bug when using *status while not connected to IRC (NULL pointer). stable/main/binary-alpha/znc_0.045-3+etch1_alpha.deb znc (0.045-3+etch1) stable; urgency=low * Set myself as new maintainer. * Applied two patches from upstream which fixes two crash bugs: - Crash bug when doing /nick while not connected to IRC (NULL pointer). - Crash bug when using *status while not connected to IRC (NULL pointer). stable/main/binary-i386/znc_0.045-3+etch1_i386.deb stable/main/source/znc_0.045-3+etch1.diff.gz stable/main/source/znc_0.045-3+etch1.dsc znc (0.045-3+etch1) stable; urgency=low * Set myself as new maintainer. * Applied two patches from upstream which fixes two crash bugs: - Crash bug when doing /nick while not connected to IRC (NULL pointer). - Crash bug when using *status while not connected to IRC (NULL pointer). stable/main/binary-sparc/xwine_1.0.1-1etch1_sparc.deb xwine (1.0.1-1etch1) stable-security; urgency=high * Non-maintainer upload by The Security Team. * Avoid unsafe use of temporary files. [CVE-2008-0930] * Avoid making the system-wide Wine configuration file world-writable. [CVE-2008-0931] stable/main/binary-s390/xwine_1.0.1-1etch1_s390.deb xwine (1.0.1-1etch1) stable-security; urgency=high * Non-maintainer upload by The Security Team. * Avoid unsafe use of temporary files. [CVE-2008-0930] * Avoid making the system-wide Wine configuration file world-writable. [CVE-2008-0931] stable/main/binary-powerpc/xwine_1.0.1-1etch1_powerpc.deb xwine (1.0.1-1etch1) stable-security; urgency=high * Non-maintainer upload by The Security Team. * Avoid unsafe use of temporary files. [CVE-2008-0930] * Avoid making the system-wide Wine configuration file world-writable. [CVE-2008-0931] stable/main/binary-ia64/xwine_1.0.1-1etch1_ia64.deb xwine (1.0.1-1etch1) stable-security; urgency=high * Non-maintainer upload by The Security Team. * Avoid unsafe use of temporary files. [CVE-2008-0930] * Avoid making the system-wide Wine configuration file world-writable. [CVE-2008-0931] stable/main/binary-hppa/xwine_1.0.1-1etch1_hppa.deb xwine (1.0.1-1etch1) stable-security; urgency=high * Non-maintainer upload by The Security Team. * Avoid unsafe use of temporary files. [CVE-2008-0930] * Avoid making the system-wide Wine configuration file world-writable. [CVE-2008-0931] stable/main/binary-arm/xwine_1.0.1-1etch1_arm.deb xwine (1.0.1-1etch1) stable-security; urgency=high * Non-maintainer upload by The Security Team. * Avoid unsafe use of temporary files. [CVE-2008-0930] * Avoid making the system-wide Wine configuration file world-writable. [CVE-2008-0931] stable/main/binary-amd64/xwine_1.0.1-1etch1_amd64.deb xwine (1.0.1-1etch1) stable-security; urgency=high * Non-maintainer upload by The Security Team. * Avoid unsafe use of temporary files. [CVE-2008-0930] * Avoid making the system-wide Wine configuration file world-writable. [CVE-2008-0931] stable/main/binary-alpha/xwine_1.0.1-1etch1_alpha.deb xwine (1.0.1-1etch1) stable-security; urgency=high * Non-maintainer upload by The Security Team. * Avoid unsafe use of temporary files. [CVE-2008-0930] * Avoid making the system-wide Wine configuration file world-writable. [CVE-2008-0931] stable/main/binary-i386/xwine_1.0.1-1etch1_i386.deb stable/main/source/xwine_1.0.1-1etch1.diff.gz stable/main/source/xwine_1.0.1-1etch1.dsc xwine (1.0.1-1etch1) stable-security; urgency=high * Non-maintainer upload by The Security Team. * Avoid unsafe use of temporary files. [CVE-2008-0930] * Avoid making the system-wide Wine configuration file world-writable. [CVE-2008-0931] stable/main/binary-sparc/xulrunner_1.8.0.15~pre080323b-0etch2_sparc.deb stable/main/binary-sparc/libmozjs0d-dbg_1.8.0.15~pre080323b-0etch2_sparc.deb stable/main/binary-sparc/libnspr4-0d-dbg_1.8.0.15~pre080323b-0etch2_sparc.deb stable/main/binary-sparc/xulrunner-gnome-support_1.8.0.15~pre080323b-0etch2_sparc.deb stable/main/binary-sparc/libnspr4-0d_1.8.0.15~pre080323b-0etch2_sparc.deb stable/main/binary-sparc/libnss3-0d-dbg_1.8.0.15~pre080323b-0etch2_sparc.deb stable/main/binary-sparc/libxul0d-dbg_1.8.0.15~pre080323b-0etch2_sparc.deb stable/main/binary-sparc/libxul0d_1.8.0.15~pre080323b-0etch2_sparc.deb stable/main/binary-sparc/python-xpcom_1.8.0.15~pre080323b-0etch2_sparc.deb stable/main/binary-sparc/libmozjs0d_1.8.0.15~pre080323b-0etch2_sparc.deb stable/main/binary-sparc/spidermonkey-bin_1.8.0.15~pre080323b-0etch2_sparc.deb stable/main/binary-sparc/libnss3-0d_1.8.0.15~pre080323b-0etch2_sparc.deb stable/main/binary-sparc/libnss3-tools_1.8.0.15~pre080323b-0etch2_sparc.deb xulrunner (1.8.0.15~pre080323b-0etch2) stable-security; urgency=low * debian/patches/90_bz421622.dpatch: Fix a regression introduced by fix for CVE-2008-1234. * debian/patches/90_bz425576.dpatch: Fix for MFSA 2008-20 aka CVE-2008-1380. * debian/patches/00list: Updated accordingly. stable/main/binary-s390/libnss3-0d_1.8.0.15~pre080323b-0etch2_s390.deb stable/main/binary-s390/libmozjs0d_1.8.0.15~pre080323b-0etch2_s390.deb stable/main/binary-s390/libmozjs0d-dbg_1.8.0.15~pre080323b-0etch2_s390.deb stable/main/binary-s390/libnspr4-0d-dbg_1.8.0.15~pre080323b-0etch2_s390.deb stable/main/binary-s390/spidermonkey-bin_1.8.0.15~pre080323b-0etch2_s390.deb stable/main/binary-s390/xulrunner-gnome-support_1.8.0.15~pre080323b-0etch2_s390.deb stable/main/binary-s390/libnss3-tools_1.8.0.15~pre080323b-0etch2_s390.deb stable/main/binary-s390/libnss3-0d-dbg_1.8.0.15~pre080323b-0etch2_s390.deb stable/main/binary-s390/xulrunner_1.8.0.15~pre080323b-0etch2_s390.deb stable/main/binary-s390/libxul0d_1.8.0.15~pre080323b-0etch2_s390.deb stable/main/binary-s390/python-xpcom_1.8.0.15~pre080323b-0etch2_s390.deb stable/main/binary-s390/libnspr4-0d_1.8.0.15~pre080323b-0etch2_s390.deb stable/main/binary-s390/libxul0d-dbg_1.8.0.15~pre080323b-0etch2_s390.deb xulrunner (1.8.0.15~pre080323b-0etch2) stable-security; urgency=low * debian/patches/90_bz421622.dpatch: Fix a regression introduced by fix for CVE-2008-1234. * debian/patches/90_bz425576.dpatch: Fix for MFSA 2008-20 aka CVE-2008-1380. * debian/patches/00list: Updated accordingly. stable/main/binary-powerpc/spidermonkey-bin_1.8.0.15~pre080323b-0etch2_powerpc.deb stable/main/binary-powerpc/libnss3-tools_1.8.0.15~pre080323b-0etch2_powerpc.deb stable/main/binary-powerpc/xulrunner-gnome-support_1.8.0.15~pre080323b-0etch2_powerpc.deb stable/main/binary-powerpc/xulrunner_1.8.0.15~pre080323b-0etch2_powerpc.deb stable/main/binary-powerpc/libxul0d_1.8.0.15~pre080323b-0etch2_powerpc.deb stable/main/binary-powerpc/libmozjs0d_1.8.0.15~pre080323b-0etch2_powerpc.deb stable/main/binary-powerpc/libnss3-0d-dbg_1.8.0.15~pre080323b-0etch2_powerpc.deb stable/main/binary-powerpc/python-xpcom_1.8.0.15~pre080323b-0etch2_powerpc.deb stable/main/binary-powerpc/libnspr4-0d_1.8.0.15~pre080323b-0etch2_powerpc.deb stable/main/binary-powerpc/libxul0d-dbg_1.8.0.15~pre080323b-0etch2_powerpc.deb stable/main/binary-powerpc/libnspr4-0d-dbg_1.8.0.15~pre080323b-0etch2_powerpc.deb stable/main/binary-powerpc/libnss3-0d_1.8.0.15~pre080323b-0etch2_powerpc.deb stable/main/binary-powerpc/libmozjs0d-dbg_1.8.0.15~pre080323b-0etch2_powerpc.deb xulrunner (1.8.0.15~pre080323b-0etch2) stable-security; urgency=low * debian/patches/90_bz421622.dpatch: Fix a regression introduced by fix for CVE-2008-1234. * debian/patches/90_bz425576.dpatch: Fix for MFSA 2008-20 aka CVE-2008-1380. * debian/patches/00list: Updated accordingly. stable/main/binary-mipsel/libnss3-0d_1.8.0.15~pre080323b-0etch2_mipsel.deb stable/main/binary-mipsel/libxul0d_1.8.0.15~pre080323b-0etch2_mipsel.deb stable/main/binary-mipsel/libmozjs0d_1.8.0.15~pre080323b-0etch2_mipsel.deb stable/main/binary-mipsel/libnspr4-0d_1.8.0.15~pre080323b-0etch2_mipsel.deb stable/main/binary-mipsel/libnss3-tools_1.8.0.15~pre080323b-0etch2_mipsel.deb stable/main/binary-mipsel/libnspr4-0d-dbg_1.8.0.15~pre080323b-0etch2_mipsel.deb stable/main/binary-mipsel/xulrunner-gnome-support_1.8.0.15~pre080323b-0etch2_mipsel.deb stable/main/binary-mipsel/spidermonkey-bin_1.8.0.15~pre080323b-0etch2_mipsel.deb stable/main/binary-mipsel/libmozjs0d-dbg_1.8.0.15~pre080323b-0etch2_mipsel.deb stable/main/binary-mipsel/libnss3-0d-dbg_1.8.0.15~pre080323b-0etch2_mipsel.deb stable/main/binary-mipsel/xulrunner_1.8.0.15~pre080323b-0etch2_mipsel.deb stable/main/binary-mipsel/libxul0d-dbg_1.8.0.15~pre080323b-0etch2_mipsel.deb stable/main/binary-mipsel/python-xpcom_1.8.0.15~pre080323b-0etch2_mipsel.deb xulrunner (1.8.0.15~pre080323b-0etch2) stable-security; urgency=low * debian/patches/90_bz421622.dpatch: Fix a regression introduced by fix for CVE-2008-1234. * debian/patches/90_bz425576.dpatch: Fix for MFSA 2008-20 aka CVE-2008-1380. * debian/patches/00list: Updated accordingly. stable/main/binary-mips/libmozjs0d_1.8.0.15~pre080323b-0etch2_mips.deb stable/main/binary-mips/libxul0d-dbg_1.8.0.15~pre080323b-0etch2_mips.deb stable/main/binary-mips/python-xpcom_1.8.0.15~pre080323b-0etch2_mips.deb stable/main/binary-mips/libnss3-0d_1.8.0.15~pre080323b-0etch2_mips.deb stable/main/binary-mips/xulrunner_1.8.0.15~pre080323b-0etch2_mips.deb stable/main/binary-mips/libnss3-0d-dbg_1.8.0.15~pre080323b-0etch2_mips.deb stable/main/binary-mips/libnspr4-0d_1.8.0.15~pre080323b-0etch2_mips.deb stable/main/binary-mips/libnss3-tools_1.8.0.15~pre080323b-0etch2_mips.deb stable/main/binary-mips/libmozjs0d-dbg_1.8.0.15~pre080323b-0etch2_mips.deb stable/main/binary-mips/libnspr4-0d-dbg_1.8.0.15~pre080323b-0etch2_mips.deb stable/main/binary-mips/spidermonkey-bin_1.8.0.15~pre080323b-0etch2_mips.deb stable/main/binary-mips/xulrunner-gnome-support_1.8.0.15~pre080323b-0etch2_mips.deb stable/main/binary-mips/libxul0d_1.8.0.15~pre080323b-0etch2_mips.deb xulrunner (1.8.0.15~pre080323b-0etch2) stable-security; urgency=low * debian/patches/90_bz421622.dpatch: Fix a regression introduced by fix for CVE-2008-1234. * debian/patches/90_bz425576.dpatch: Fix for MFSA 2008-20 aka CVE-2008-1380. * debian/patches/00list: Updated accordingly. stable/main/binary-ia64/libnss3-0d_1.8.0.15~pre080323b-0etch2_ia64.deb stable/main/binary-ia64/libmozjs0d_1.8.0.15~pre080323b-0etch2_ia64.deb stable/main/binary-ia64/libnspr4-0d_1.8.0.15~pre080323b-0etch2_ia64.deb stable/main/binary-ia64/libnspr4-0d-dbg_1.8.0.15~pre080323b-0etch2_ia64.deb stable/main/binary-ia64/python-xpcom_1.8.0.15~pre080323b-0etch2_ia64.deb stable/main/binary-ia64/spidermonkey-bin_1.8.0.15~pre080323b-0etch2_ia64.deb stable/main/binary-ia64/libxul0d-dbg_1.8.0.15~pre080323b-0etch2_ia64.deb stable/main/binary-ia64/xulrunner-gnome-support_1.8.0.15~pre080323b-0etch2_ia64.deb stable/main/binary-ia64/xulrunner_1.8.0.15~pre080323b-0etch2_ia64.deb stable/main/binary-ia64/libnss3-tools_1.8.0.15~pre080323b-0etch2_ia64.deb stable/main/binary-ia64/libxul0d_1.8.0.15~pre080323b-0etch2_ia64.deb stable/main/binary-ia64/libnss3-0d-dbg_1.8.0.15~pre080323b-0etch2_ia64.deb stable/main/binary-ia64/libmozjs0d-dbg_1.8.0.15~pre080323b-0etch2_ia64.deb xulrunner (1.8.0.15~pre080323b-0etch2) stable-security; urgency=low * debian/patches/90_bz421622.dpatch: Fix a regression introduced by fix for CVE-2008-1234. * debian/patches/90_bz425576.dpatch: Fix for MFSA 2008-20 aka CVE-2008-1380. * debian/patches/00list: Updated accordingly. stable/main/binary-i386/libnspr4-0d_1.8.0.15~pre080323b-0etch2_i386.deb stable/main/binary-i386/libnss3-tools_1.8.0.15~pre080323b-0etch2_i386.deb stable/main/binary-i386/libxul0d-dbg_1.8.0.15~pre080323b-0etch2_i386.deb stable/main/binary-i386/xulrunner-gnome-support_1.8.0.15~pre080323b-0etch2_i386.deb stable/main/binary-i386/libxul0d_1.8.0.15~pre080323b-0etch2_i386.deb stable/main/binary-i386/python-xpcom_1.8.0.15~pre080323b-0etch2_i386.deb stable/main/binary-i386/spidermonkey-bin_1.8.0.15~pre080323b-0etch2_i386.deb stable/main/binary-i386/libnss3-0d-dbg_1.8.0.15~pre080323b-0etch2_i386.deb stable/main/binary-i386/xulrunner_1.8.0.15~pre080323b-0etch2_i386.deb stable/main/binary-i386/libnss3-0d_1.8.0.15~pre080323b-0etch2_i386.deb stable/main/binary-i386/libmozjs0d_1.8.0.15~pre080323b-0etch2_i386.deb stable/main/binary-i386/libmozjs0d-dbg_1.8.0.15~pre080323b-0etch2_i386.deb stable/main/binary-i386/libnspr4-0d-dbg_1.8.0.15~pre080323b-0etch2_i386.deb xulrunner (1.8.0.15~pre080323b-0etch2) stable-security; urgency=low * debian/patches/90_bz421622.dpatch: Fix a regression introduced by fix for CVE-2008-1234. * debian/patches/90_bz425576.dpatch: Fix for MFSA 2008-20 aka CVE-2008-1380. * debian/patches/00list: Updated accordingly. stable/main/binary-hppa/libnspr4-0d_1.8.0.15~pre080323b-0etch2_hppa.deb stable/main/binary-hppa/libnss3-tools_1.8.0.15~pre080323b-0etch2_hppa.deb stable/main/binary-hppa/spidermonkey-bin_1.8.0.15~pre080323b-0etch2_hppa.deb stable/main/binary-hppa/libnss3-0d_1.8.0.15~pre080323b-0etch2_hppa.deb stable/main/binary-hppa/libxul0d_1.8.0.15~pre080323b-0etch2_hppa.deb stable/main/binary-hppa/libnspr4-0d-dbg_1.8.0.15~pre080323b-0etch2_hppa.deb stable/main/binary-hppa/xulrunner-gnome-support_1.8.0.15~pre080323b-0etch2_hppa.deb stable/main/binary-hppa/libmozjs0d-dbg_1.8.0.15~pre080323b-0etch2_hppa.deb stable/main/binary-hppa/libnss3-0d-dbg_1.8.0.15~pre080323b-0etch2_hppa.deb stable/main/binary-hppa/python-xpcom_1.8.0.15~pre080323b-0etch2_hppa.deb stable/main/binary-hppa/libxul0d-dbg_1.8.0.15~pre080323b-0etch2_hppa.deb stable/main/binary-hppa/libmozjs0d_1.8.0.15~pre080323b-0etch2_hppa.deb stable/main/binary-hppa/xulrunner_1.8.0.15~pre080323b-0etch2_hppa.deb xulrunner (1.8.0.15~pre080323b-0etch2) stable-security; urgency=low * debian/patches/90_bz421622.dpatch: Fix a regression introduced by fix for CVE-2008-1234. * debian/patches/90_bz425576.dpatch: Fix for MFSA 2008-20 aka CVE-2008-1380. * debian/patches/00list: Updated accordingly. stable/main/binary-arm/libnss3-0d_1.8.0.15~pre080323b-0etch2_arm.deb stable/main/binary-arm/xulrunner_1.8.0.15~pre080323b-0etch2_arm.deb stable/main/binary-arm/libnspr4-0d_1.8.0.15~pre080323b-0etch2_arm.deb stable/main/binary-arm/libmozjs0d_1.8.0.15~pre080323b-0etch2_arm.deb stable/main/binary-arm/libnss3-0d-dbg_1.8.0.15~pre080323b-0etch2_arm.deb stable/main/binary-arm/python-xpcom_1.8.0.15~pre080323b-0etch2_arm.deb stable/main/binary-arm/libmozjs0d-dbg_1.8.0.15~pre080323b-0etch2_arm.deb stable/main/binary-arm/libnspr4-0d-dbg_1.8.0.15~pre080323b-0etch2_arm.deb stable/main/binary-arm/libxul0d_1.8.0.15~pre080323b-0etch2_arm.deb stable/main/binary-arm/libxul0d-dbg_1.8.0.15~pre080323b-0etch2_arm.deb stable/main/binary-arm/xulrunner-gnome-support_1.8.0.15~pre080323b-0etch2_arm.deb stable/main/binary-arm/libnss3-tools_1.8.0.15~pre080323b-0etch2_arm.deb stable/main/binary-arm/spidermonkey-bin_1.8.0.15~pre080323b-0etch2_arm.deb xulrunner (1.8.0.15~pre080323b-0etch2) stable-security; urgency=low * debian/patches/90_bz421622.dpatch: Fix a regression introduced by fix for CVE-2008-1234. * debian/patches/90_bz425576.dpatch: Fix for MFSA 2008-20 aka CVE-2008-1380. * debian/patches/00list: Updated accordingly. stable/main/binary-alpha/libnspr4-0d_1.8.0.15~pre080323b-0etch2_alpha.deb stable/main/binary-alpha/libnss3-0d_1.8.0.15~pre080323b-0etch2_alpha.deb stable/main/binary-alpha/libmozjs0d-dbg_1.8.0.15~pre080323b-0etch2_alpha.deb stable/main/binary-alpha/libmozjs0d_1.8.0.15~pre080323b-0etch2_alpha.deb stable/main/binary-alpha/libnspr4-0d-dbg_1.8.0.15~pre080323b-0etch2_alpha.deb stable/main/binary-alpha/libnss3-0d-dbg_1.8.0.15~pre080323b-0etch2_alpha.deb stable/main/binary-alpha/libxul0d_1.8.0.15~pre080323b-0etch2_alpha.deb stable/main/binary-alpha/python-xpcom_1.8.0.15~pre080323b-0etch2_alpha.deb stable/main/binary-alpha/spidermonkey-bin_1.8.0.15~pre080323b-0etch2_alpha.deb stable/main/binary-alpha/libnss3-tools_1.8.0.15~pre080323b-0etch2_alpha.deb stable/main/binary-alpha/libxul0d-dbg_1.8.0.15~pre080323b-0etch2_alpha.deb stable/main/binary-alpha/xulrunner-gnome-support_1.8.0.15~pre080323b-0etch2_alpha.deb stable/main/binary-alpha/xulrunner_1.8.0.15~pre080323b-0etch2_alpha.deb xulrunner (1.8.0.15~pre080323b-0etch2) stable-security; urgency=low * debian/patches/90_bz421622.dpatch: Fix a regression introduced by fix for CVE-2008-1234. * debian/patches/90_bz425576.dpatch: Fix for MFSA 2008-20 aka CVE-2008-1380. * debian/patches/00list: Updated accordingly. stable/main/binary-all/libnss3-dev_1.8.0.15~pre080323b-0etch2_all.deb stable/main/binary-amd64/xulrunner_1.8.0.15~pre080323b-0etch2_amd64.deb stable/main/binary-amd64/xulrunner-gnome-support_1.8.0.15~pre080323b-0etch2_amd64.deb stable/main/binary-all/libsmjs1_1.8.0.15~pre080323b-0etch2_all.deb stable/main/binary-all/libxul-common_1.8.0.15~pre080323b-0etch2_all.deb stable/main/binary-amd64/libxul0d-dbg_1.8.0.15~pre080323b-0etch2_amd64.deb stable/main/binary-amd64/libxul0d_1.8.0.15~pre080323b-0etch2_amd64.deb stable/main/binary-amd64/libnss3-tools_1.8.0.15~pre080323b-0etch2_amd64.deb stable/main/binary-amd64/libmozjs0d_1.8.0.15~pre080323b-0etch2_amd64.deb stable/main/binary-amd64/libnspr4-0d_1.8.0.15~pre080323b-0etch2_amd64.deb stable/main/binary-amd64/libmozjs0d-dbg_1.8.0.15~pre080323b-0etch2_amd64.deb stable/main/binary-amd64/python-xpcom_1.8.0.15~pre080323b-0etch2_amd64.deb stable/main/binary-all/libmozjs-dev_1.8.0.15~pre080323b-0etch2_all.deb stable/main/source/xulrunner_1.8.0.15~pre080323b-0etch2.diff.gz stable/main/binary-all/libnspr4-dev_1.8.0.15~pre080323b-0etch2_all.deb stable/main/source/xulrunner_1.8.0.15~pre080323b-0etch2.dsc stable/main/binary-all/libsmjs-dev_1.8.0.15~pre080323b-0etch2_all.deb stable/main/binary-amd64/libnspr4-0d-dbg_1.8.0.15~pre080323b-0etch2_amd64.deb stable/main/binary-amd64/libnss3-0d_1.8.0.15~pre080323b-0etch2_amd64.deb stable/main/binary-all/libmozillainterfaces-java_1.8.0.15~pre080323b-0etch2_all.deb stable/main/binary-all/libxul-dev_1.8.0.15~pre080323b-0etch2_all.deb stable/main/binary-amd64/libnss3-0d-dbg_1.8.0.15~pre080323b-0etch2_amd64.deb stable/main/binary-amd64/spidermonkey-bin_1.8.0.15~pre080323b-0etch2_amd64.deb xulrunner (1.8.0.15~pre080323b-0etch2) stable-security; urgency=low * debian/patches/90_bz421622.dpatch: Fix a regression introduced by fix for CVE-2008-1234. * debian/patches/90_bz425576.dpatch: Fix for MFSA 2008-20 aka CVE-2008-1380. * debian/patches/00list: Updated accordingly. stable/main/binary-sparc/xserver-xorg-video-nv_2.0.3-1_sparc.deb xserver-xorg-video-nv (1:2.0.3-1) proposed-updates; urgency=low * Etch and a half upload for new hardware support. * This version works with G80-class cards. stable/main/binary-s390/xserver-xorg-video-nv_2.0.3-1_s390.deb xserver-xorg-video-nv (1:2.0.3-1) proposed-updates; urgency=low * Etch and a half upload for new hardware support. * This version works with G80-class cards. stable/main/binary-powerpc/xserver-xorg-video-nv_2.0.3-1_powerpc.deb xserver-xorg-video-nv (1:2.0.3-1) proposed-updates; urgency=low * Etch and a half upload for new hardware support. * This version works with G80-class cards. stable/main/binary-mipsel/xserver-xorg-video-nv_2.0.3-1_mipsel.deb xserver-xorg-video-nv (1:2.0.3-1) proposed-updates; urgency=low * Etch and a half upload for new hardware support. * This version works with G80-class cards. stable/main/binary-mips/xserver-xorg-video-nv_2.0.3-1_mips.deb xserver-xorg-video-nv (1:2.0.3-1) proposed-updates; urgency=low * Etch and a half upload for new hardware support. * This version works with G80-class cards. stable/main/binary-ia64/xserver-xorg-video-nv_2.0.3-1_ia64.deb xserver-xorg-video-nv (1:2.0.3-1) proposed-updates; urgency=low * Etch and a half upload for new hardware support. * This version works with G80-class cards. stable/main/binary-hppa/xserver-xorg-video-nv_2.0.3-1_hppa.deb xserver-xorg-video-nv (1:2.0.3-1) proposed-updates; urgency=low * Etch and a half upload for new hardware support. * This version works with G80-class cards. stable/main/binary-arm/xserver-xorg-video-nv_2.0.3-1_arm.deb xserver-xorg-video-nv (1:2.0.3-1) proposed-updates; urgency=low * Etch and a half upload for new hardware support. * This version works with G80-class cards. stable/main/binary-amd64/xserver-xorg-video-nv_2.0.3-1_amd64.deb xserver-xorg-video-nv (1:2.0.3-1) proposed-updates; urgency=low * Etch and a half upload for new hardware support. * This version works with G80-class cards. stable/main/binary-alpha/xserver-xorg-video-nv_2.0.3-1_alpha.deb xserver-xorg-video-nv (1:2.0.3-1) proposed-updates; urgency=low * Etch and a half upload for new hardware support. * This version works with G80-class cards. stable/main/source/xserver-xorg-video-nv_2.0.3-1.dsc stable/main/source/xserver-xorg-video-nv_2.0.3-1.diff.gz stable/main/source/xserver-xorg-video-nv_2.0.3.orig.tar.gz stable/main/binary-i386/xserver-xorg-video-nv_2.0.3-1_i386.deb xserver-xorg-video-nv (1:2.0.3-1) proposed-updates; urgency=low * Etch and a half upload for new hardware support. * This version works with G80-class cards. stable/main/binary-amd64/xserver-xorg-video-intel_2.2.1-1~etchnhalf2_amd64.deb xserver-xorg-video-intel (2:2.2.1-1~etchnhalf2) proposed-updates; urgency=low * Update debian/copyright, thanks to Thomas Viehmann for reporting, and Moritz Muehlenhoff for the thorough analysis (closes: #486340). stable/main/source/xserver-xorg-video-intel_2.2.1.orig.tar.gz stable/main/binary-i386/xserver-xorg-video-intel_2.2.1-1~etchnhalf2_i386.deb stable/main/source/xserver-xorg-video-intel_2.2.1-1~etchnhalf2.diff.gz stable/main/source/xserver-xorg-video-intel_2.2.1-1~etchnhalf2.dsc xserver-xorg-video-intel (2:2.2.1-1~etchnhalf2) proposed-updates; urgency=low * Update debian/copyright, thanks to Thomas Viehmann for reporting, and Moritz Muehlenhoff for the thorough analysis (closes: #486340). stable/main/binary-sparc/xpenguins-applet_2.1.1-3.1etch1_sparc.deb xpenguins-applet (2.1.1-3.1etch1) stable; urgency=low * Fixed src/applet_main.c to avoid double free, thanks to Tim Retout for the patch (Closes: #442284, #364590) * Set correct maintainer stable/main/binary-s390/xpenguins-applet_2.1.1-3.1etch1_s390.deb xpenguins-applet (2.1.1-3.1etch1) stable; urgency=low * Fixed src/applet_main.c to avoid double free, thanks to Tim Retout for the patch (Closes: #442284, #364590) * Set correct maintainer stable/main/binary-powerpc/xpenguins-applet_2.1.1-3.1etch1_powerpc.deb xpenguins-applet (2.1.1-3.1etch1) stable; urgency=low * Fixed src/applet_main.c to avoid double free, thanks to Tim Retout for the patch (Closes: #442284, #364590) * Set correct maintainer stable/main/binary-mipsel/xpenguins-applet_2.1.1-3.1etch1_mipsel.deb xpenguins-applet (2.1.1-3.1etch1) stable; urgency=low * Fixed src/applet_main.c to avoid double free, thanks to Tim Retout for the patch (Closes: #442284, #364590) * Set correct maintainer stable/main/binary-mips/xpenguins-applet_2.1.1-3.1etch1_mips.deb xpenguins-applet (2.1.1-3.1etch1) stable; urgency=low * Fixed src/applet_main.c to avoid double free, thanks to Tim Retout for the patch (Closes: #442284, #364590) * Set correct maintainer stable/main/binary-ia64/xpenguins-applet_2.1.1-3.1etch1_ia64.deb xpenguins-applet (2.1.1-3.1etch1) stable; urgency=low * Fixed src/applet_main.c to avoid double free, thanks to Tim Retout for the patch (Closes: #442284, #364590) * Set correct maintainer stable/main/binary-hppa/xpenguins-applet_2.1.1-3.1etch1_hppa.deb xpenguins-applet (2.1.1-3.1etch1) stable; urgency=low * Fixed src/applet_main.c to avoid double free, thanks to Tim Retout for the patch (Closes: #442284, #364590) * Set correct maintainer stable/main/binary-arm/xpenguins-applet_2.1.1-3.1etch1_arm.deb xpenguins-applet (2.1.1-3.1etch1) stable; urgency=low * Fixed src/applet_main.c to avoid double free, thanks to Tim Retout for the patch (Closes: #442284, #364590) * Set correct maintainer stable/main/binary-amd64/xpenguins-applet_2.1.1-3.1etch1_amd64.deb xpenguins-applet (2.1.1-3.1etch1) stable; urgency=low * Fixed src/applet_main.c to avoid double free, thanks to Tim Retout for the patch (Closes: #442284, #364590) * Set correct maintainer stable/main/binary-alpha/xpenguins-applet_2.1.1-3.1etch1_alpha.deb xpenguins-applet (2.1.1-3.1etch1) stable; urgency=low * Fixed src/applet_main.c to avoid double free, thanks to Tim Retout for the patch (Closes: #442284, #364590) * Set correct maintainer stable/main/source/xpenguins-applet_2.1.1-3.1etch1.dsc stable/main/binary-i386/xpenguins-applet_2.1.1-3.1etch1_i386.deb stable/main/source/xpenguins-applet_2.1.1-3.1etch1.diff.gz xpenguins-applet (2.1.1-3.1etch1) stable; urgency=low * Fixed src/applet_main.c to avoid double free, thanks to Tim Retout for the patch (Closes: #442284, #364590) * Set correct maintainer stable/main/binary-sparc/xpdf-reader_3.01-9.1+etch5_sparc.deb stable/main/binary-sparc/xpdf-utils_3.01-9.1+etch5_sparc.deb xpdf (3.01-9.1+etch5) stable; urgency=low * Remove the strictly versionned dependency on xpdf-utils. Without this the transition from pdftohtml to poppler-utils removes xpdf. stable/main/binary-s390/xpdf-reader_3.01-9.1+etch5_s390.deb stable/main/binary-s390/xpdf-utils_3.01-9.1+etch5_s390.deb xpdf (3.01-9.1+etch5) stable; urgency=low * Remove the strictly versionned dependency on xpdf-utils. Without this the transition from pdftohtml to poppler-utils removes xpdf. stable/main/binary-powerpc/xpdf-reader_3.01-9.1+etch5_powerpc.deb stable/main/binary-powerpc/xpdf-utils_3.01-9.1+etch5_powerpc.deb xpdf (3.01-9.1+etch5) stable; urgency=low * Remove the strictly versionned dependency on xpdf-utils. Without this the transition from pdftohtml to poppler-utils removes xpdf. stable/main/binary-mipsel/xpdf-utils_3.01-9.1+etch5_mipsel.deb stable/main/binary-mipsel/xpdf-reader_3.01-9.1+etch5_mipsel.deb xpdf (3.01-9.1+etch5) stable; urgency=low * Remove the strictly versionned dependency on xpdf-utils. Without this the transition from pdftohtml to poppler-utils removes xpdf. stable/main/binary-mips/xpdf-reader_3.01-9.1+etch5_mips.deb stable/main/binary-mips/xpdf-utils_3.01-9.1+etch5_mips.deb xpdf (3.01-9.1+etch5) stable; urgency=low * Remove the strictly versionned dependency on xpdf-utils. Without this the transition from pdftohtml to poppler-utils removes xpdf. stable/main/binary-ia64/xpdf-utils_3.01-9.1+etch5_ia64.deb stable/main/binary-ia64/xpdf-reader_3.01-9.1+etch5_ia64.deb xpdf (3.01-9.1+etch5) stable; urgency=low * Remove the strictly versionned dependency on xpdf-utils. Without this the transition from pdftohtml to poppler-utils removes xpdf. stable/main/binary-i386/xpdf-utils_3.01-9.1+etch5_i386.deb stable/main/binary-i386/xpdf-reader_3.01-9.1+etch5_i386.deb xpdf (3.01-9.1+etch5) stable; urgency=low * Remove the strictly versionned dependency on xpdf-utils. Without this the transition from pdftohtml to poppler-utils removes xpdf. stable/main/binary-hppa/xpdf-reader_3.01-9.1+etch5_hppa.deb stable/main/binary-hppa/xpdf-utils_3.01-9.1+etch5_hppa.deb xpdf (3.01-9.1+etch5) stable; urgency=low * Remove the strictly versionned dependency on xpdf-utils. Without this the transition from pdftohtml to poppler-utils removes xpdf. stable/main/binary-arm/xpdf-utils_3.01-9.1+etch5_arm.deb stable/main/binary-arm/xpdf-reader_3.01-9.1+etch5_arm.deb xpdf (3.01-9.1+etch5) stable; urgency=low * Remove the strictly versionned dependency on xpdf-utils. Without this the transition from pdftohtml to poppler-utils removes xpdf. stable/main/binary-alpha/xpdf-reader_3.01-9.1+etch5_alpha.deb stable/main/binary-alpha/xpdf-utils_3.01-9.1+etch5_alpha.deb xpdf (3.01-9.1+etch5) stable; urgency=low * Remove the strictly versionned dependency on xpdf-utils. Without this the transition from pdftohtml to poppler-utils removes xpdf. stable/main/source/xpdf_3.01-9.1+etch5.dsc stable/main/binary-all/xpdf-common_3.01-9.1+etch5_all.deb stable/main/binary-amd64/xpdf-utils_3.01-9.1+etch5_amd64.deb stable/main/source/xpdf_3.01-9.1+etch5.diff.gz stable/main/binary-all/xpdf_3.01-9.1+etch5_all.deb stable/main/binary-amd64/xpdf-reader_3.01-9.1+etch5_amd64.deb xpdf (3.01-9.1+etch5) stable; urgency=low * Remove the strictly versionned dependency on xpdf-utils. Without this the transition from pdftohtml to poppler-utils removes xpdf. stable/main/binary-sparc/xvfb_1.1.1-21etch5_sparc.deb stable/main/binary-sparc/xnest_1.1.1-21etch5_sparc.deb stable/main/binary-sparc/xserver-xephyr_1.1.1-21etch5_sparc.deb stable/main/binary-sparc/xdmx-tools_1.1.1-21etch5_sparc.deb stable/main/binary-sparc/xdmx_1.1.1-21etch5_sparc.deb stable/main/binary-sparc/xserver-xorg-core_1.1.1-21etch5_sparc.deb stable/main/binary-sparc/xserver-xorg-dev_1.1.1-21etch5_sparc.deb xorg-server (2:1.1.1-21etch5) stable-security; urgency=high * Security update, fixes several vulnerabilities. References: CVE-2008-2360 - RENDER Extension heap buffer overflow CVE-2008-2361 - RENDER Extension crash CVE-2008-2362 - RENDER Extension memory corruption CVE-2008-1379 - MIT-SHM arbitrary memory read CVE-2008-1377 - RECORD and Security extensions memory corruption stable/main/binary-s390/xserver-xorg-core_1.1.1-21etch5_s390.deb stable/main/binary-s390/xserver-xephyr_1.1.1-21etch5_s390.deb stable/main/binary-s390/xnest_1.1.1-21etch5_s390.deb stable/main/binary-s390/xdmx-tools_1.1.1-21etch5_s390.deb stable/main/binary-s390/xserver-xorg-dev_1.1.1-21etch5_s390.deb stable/main/binary-s390/xdmx_1.1.1-21etch5_s390.deb stable/main/binary-s390/xvfb_1.1.1-21etch5_s390.deb xorg-server (2:1.1.1-21etch5) stable-security; urgency=high * Security update, fixes several vulnerabilities. References: CVE-2008-2360 - RENDER Extension heap buffer overflow CVE-2008-2361 - RENDER Extension crash CVE-2008-2362 - RENDER Extension memory corruption CVE-2008-1379 - MIT-SHM arbitrary memory read CVE-2008-1377 - RECORD and Security extensions memory corruption stable/main/binary-powerpc/xdmx_1.1.1-21etch5_powerpc.deb stable/main/binary-powerpc/xserver-xorg-core_1.1.1-21etch5_powerpc.deb stable/main/binary-powerpc/xserver-xorg-dev_1.1.1-21etch5_powerpc.deb stable/main/binary-powerpc/xserver-xephyr_1.1.1-21etch5_powerpc.deb stable/main/binary-powerpc/xnest_1.1.1-21etch5_powerpc.deb stable/main/binary-powerpc/xvfb_1.1.1-21etch5_powerpc.deb stable/main/binary-powerpc/xdmx-tools_1.1.1-21etch5_powerpc.deb xorg-server (2:1.1.1-21etch5) stable-security; urgency=high * Security update, fixes several vulnerabilities. References: CVE-2008-2360 - RENDER Extension heap buffer overflow CVE-2008-2361 - RENDER Extension crash CVE-2008-2362 - RENDER Extension memory corruption CVE-2008-1379 - MIT-SHM arbitrary memory read CVE-2008-1377 - RECORD and Security extensions memory corruption stable/main/binary-mipsel/xdmx-tools_1.1.1-21etch5_mipsel.deb stable/main/binary-mipsel/xserver-xorg-dev_1.1.1-21etch5_mipsel.deb stable/main/binary-mipsel/xnest_1.1.1-21etch5_mipsel.deb stable/main/binary-mipsel/xvfb_1.1.1-21etch5_mipsel.deb stable/main/binary-mipsel/xserver-xorg-core_1.1.1-21etch5_mipsel.deb stable/main/binary-mipsel/xserver-xephyr_1.1.1-21etch5_mipsel.deb stable/main/binary-mipsel/xdmx_1.1.1-21etch5_mipsel.deb xorg-server (2:1.1.1-21etch5) stable-security; urgency=high * Security update, fixes several vulnerabilities. References: CVE-2008-2360 - RENDER Extension heap buffer overflow CVE-2008-2361 - RENDER Extension crash CVE-2008-2362 - RENDER Extension memory corruption CVE-2008-1379 - MIT-SHM arbitrary memory read CVE-2008-1377 - RECORD and Security extensions memory corruption stable/main/binary-mips/xdmx-tools_1.1.1-21etch5_mips.deb stable/main/binary-mips/xserver-xephyr_1.1.1-21etch5_mips.deb stable/main/binary-mips/xdmx_1.1.1-21etch5_mips.deb stable/main/binary-mips/xserver-xorg-core_1.1.1-21etch5_mips.deb stable/main/binary-mips/xvfb_1.1.1-21etch5_mips.deb stable/main/binary-mips/xnest_1.1.1-21etch5_mips.deb stable/main/binary-mips/xserver-xorg-dev_1.1.1-21etch5_mips.deb xorg-server (2:1.1.1-21etch5) stable-security; urgency=high * Security update, fixes several vulnerabilities. References: CVE-2008-2360 - RENDER Extension heap buffer overflow CVE-2008-2361 - RENDER Extension crash CVE-2008-2362 - RENDER Extension memory corruption CVE-2008-1379 - MIT-SHM arbitrary memory read CVE-2008-1377 - RECORD and Security extensions memory corruption stable/main/binary-ia64/xserver-xephyr_1.1.1-21etch5_ia64.deb stable/main/binary-ia64/xdmx_1.1.1-21etch5_ia64.deb stable/main/binary-ia64/xvfb_1.1.1-21etch5_ia64.deb stable/main/binary-ia64/xserver-xorg-core_1.1.1-21etch5_ia64.deb stable/main/binary-ia64/xnest_1.1.1-21etch5_ia64.deb stable/main/binary-ia64/xserver-xorg-dev_1.1.1-21etch5_ia64.deb stable/main/binary-ia64/xdmx-tools_1.1.1-21etch5_ia64.deb xorg-server (2:1.1.1-21etch5) stable-security; urgency=high * Security update, fixes several vulnerabilities. References: CVE-2008-2360 - RENDER Extension heap buffer overflow CVE-2008-2361 - RENDER Extension crash CVE-2008-2362 - RENDER Extension memory corruption CVE-2008-1379 - MIT-SHM arbitrary memory read CVE-2008-1377 - RECORD and Security extensions memory corruption stable/main/binary-hppa/xdmx-tools_1.1.1-21etch5_hppa.deb stable/main/binary-hppa/xdmx_1.1.1-21etch5_hppa.deb stable/main/binary-hppa/xserver-xephyr_1.1.1-21etch5_hppa.deb stable/main/binary-hppa/xvfb_1.1.1-21etch5_hppa.deb stable/main/binary-hppa/xnest_1.1.1-21etch5_hppa.deb stable/main/binary-hppa/xserver-xorg-core_1.1.1-21etch5_hppa.deb stable/main/binary-hppa/xserver-xorg-dev_1.1.1-21etch5_hppa.deb xorg-server (2:1.1.1-21etch5) stable-security; urgency=high * Security update, fixes several vulnerabilities. References: CVE-2008-2360 - RENDER Extension heap buffer overflow CVE-2008-2361 - RENDER Extension crash CVE-2008-2362 - RENDER Extension memory corruption CVE-2008-1379 - MIT-SHM arbitrary memory read CVE-2008-1377 - RECORD and Security extensions memory corruption stable/main/binary-arm/xserver-xorg-dev_1.1.1-21etch5_arm.deb stable/main/binary-arm/xdmx_1.1.1-21etch5_arm.deb stable/main/binary-arm/xdmx-tools_1.1.1-21etch5_arm.deb stable/main/binary-arm/xvfb_1.1.1-21etch5_arm.deb stable/main/binary-arm/xnest_1.1.1-21etch5_arm.deb stable/main/binary-arm/xserver-xorg-core_1.1.1-21etch5_arm.deb stable/main/binary-arm/xserver-xephyr_1.1.1-21etch5_arm.deb xorg-server (2:1.1.1-21etch5) stable-security; urgency=high * Security update, fixes several vulnerabilities. References: CVE-2008-2360 - RENDER Extension heap buffer overflow CVE-2008-2361 - RENDER Extension crash CVE-2008-2362 - RENDER Extension memory corruption CVE-2008-1379 - MIT-SHM arbitrary memory read CVE-2008-1377 - RECORD and Security extensions memory corruption stable/main/binary-amd64/xdmx-tools_1.1.1-21etch5_amd64.deb stable/main/binary-amd64/xdmx_1.1.1-21etch5_amd64.deb stable/main/binary-amd64/xnest_1.1.1-21etch5_amd64.deb stable/main/binary-amd64/xvfb_1.1.1-21etch5_amd64.deb stable/main/binary-amd64/xserver-xorg-dev_1.1.1-21etch5_amd64.deb stable/main/binary-amd64/xserver-xephyr_1.1.1-21etch5_amd64.deb stable/main/binary-amd64/xserver-xorg-core_1.1.1-21etch5_amd64.deb xorg-server (2:1.1.1-21etch5) stable-security; urgency=high * Security update, fixes several vulnerabilities. References: CVE-2008-2360 - RENDER Extension heap buffer overflow CVE-2008-2361 - RENDER Extension crash CVE-2008-2362 - RENDER Extension memory corruption CVE-2008-1379 - MIT-SHM arbitrary memory read CVE-2008-1377 - RECORD and Security extensions memory corruption stable/main/binary-alpha/xserver-xorg-dev_1.1.1-21etch5_alpha.deb stable/main/binary-alpha/xserver-xorg-core_1.1.1-21etch5_alpha.deb stable/main/binary-alpha/xdmx-tools_1.1.1-21etch5_alpha.deb stable/main/binary-alpha/xdmx_1.1.1-21etch5_alpha.deb stable/main/binary-alpha/xserver-xephyr_1.1.1-21etch5_alpha.deb stable/main/binary-alpha/xnest_1.1.1-21etch5_alpha.deb stable/main/binary-alpha/xvfb_1.1.1-21etch5_alpha.deb xorg-server (2:1.1.1-21etch5) stable-security; urgency=high * Security update, fixes several vulnerabilities. References: CVE-2008-2360 - RENDER Extension heap buffer overflow CVE-2008-2361 - RENDER Extension crash CVE-2008-2362 - RENDER Extension memory corruption CVE-2008-1379 - MIT-SHM arbitrary memory read CVE-2008-1377 - RECORD and Security extensions memory corruption stable/main/binary-i386/xdmx_1.1.1-21etch5_i386.deb stable/main/source/xorg-server_1.1.1-21etch5.dsc stable/main/binary-i386/xnest_1.1.1-21etch5_i386.deb stable/main/binary-i386/xvfb_1.1.1-21etch5_i386.deb stable/main/binary-i386/xdmx-tools_1.1.1-21etch5_i386.deb stable/main/source/xorg-server_1.1.1-21etch5.diff.gz stable/main/binary-i386/xserver-xorg-dev_1.1.1-21etch5_i386.deb stable/main/binary-i386/xserver-xorg-core_1.1.1-21etch5_i386.deb stable/main/binary-i386/xserver-xephyr_1.1.1-21etch5_i386.deb xorg-server (2:1.1.1-21etch5) stable-security; urgency=high * Security update, fixes several vulnerabilities. References: CVE-2008-2360 - RENDER Extension heap buffer overflow CVE-2008-2361 - RENDER Extension crash CVE-2008-2362 - RENDER Extension memory corruption CVE-2008-1379 - MIT-SHM arbitrary memory read CVE-2008-1377 - RECORD and Security extensions memory corruption stable/main/binary-sparc/libxine1_1.1.2+dfsg-7_sparc.deb stable/main/binary-sparc/libxine-dev_1.1.2+dfsg-7_sparc.deb stable/main/binary-sparc/libxine1-dbg_1.1.2+dfsg-7_sparc.deb xine-lib (1.1.2+dfsg-7) stable-security; urgency=low * Non-maintainer upload by the security team * Patches from maintainer: - CVE-2008-1482: Fix various integer overflows in Qt, Real, WC3Movie, Matroska and FILM demuxers, allowing remote attackers to trigger heap overflows and possibly execute arbitrary code; fix other possible NULL pointer dereferences caused by missing alloc checks. (Closes: #472639) The FLV (Flash) demuxer in this version is not patched since the affected code was added in 1.1.4. - CVE-2008-1686: Unchecked array index may allow remote attackers to execute arbitrary code via a header structure containing a negative offset, which is used to dereference a function pointer. - CVE-2008-1878: Buffer overflow in the NSF demuxer which may allow remote attackers to cause a denial of service (crash) or possibly execute arbitrary code via an NSF file with a long title or copyright message. - Backport more calloc usage from the 1.2 branch for extra safety against possible integer overflows such as found in CVE-2008-1482. stable/main/binary-s390/libxine1_1.1.2+dfsg-7_s390.deb stable/main/binary-s390/libxine-dev_1.1.2+dfsg-7_s390.deb stable/main/binary-s390/libxine1-dbg_1.1.2+dfsg-7_s390.deb xine-lib (1.1.2+dfsg-7) stable-security; urgency=low * Non-maintainer upload by the security team * Patches from maintainer: - CVE-2008-1482: Fix various integer overflows in Qt, Real, WC3Movie, Matroska and FILM demuxers, allowing remote attackers to trigger heap overflows and possibly execute arbitrary code; fix other possible NULL pointer dereferences caused by missing alloc checks. (Closes: #472639) The FLV (Flash) demuxer in this version is not patched since the affected code was added in 1.1.4. - CVE-2008-1686: Unchecked array index may allow remote attackers to execute arbitrary code via a header structure containing a negative offset, which is used to dereference a function pointer. - CVE-2008-1878: Buffer overflow in the NSF demuxer which may allow remote attackers to cause a denial of service (crash) or possibly execute arbitrary code via an NSF file with a long title or copyright message. - Backport more calloc usage from the 1.2 branch for extra safety against possible integer overflows such as found in CVE-2008-1482. stable/main/binary-powerpc/libxine1-dbg_1.1.2+dfsg-7_powerpc.deb stable/main/binary-powerpc/libxine1_1.1.2+dfsg-7_powerpc.deb stable/main/binary-powerpc/libxine-dev_1.1.2+dfsg-7_powerpc.deb xine-lib (1.1.2+dfsg-7) stable-security; urgency=low * Non-maintainer upload by the security team * Patches from maintainer: - CVE-2008-1482: Fix various integer overflows in Qt, Real, WC3Movie, Matroska and FILM demuxers, allowing remote attackers to trigger heap overflows and possibly execute arbitrary code; fix other possible NULL pointer dereferences caused by missing alloc checks. (Closes: #472639) The FLV (Flash) demuxer in this version is not patched since the affected code was added in 1.1.4. - CVE-2008-1686: Unchecked array index may allow remote attackers to execute arbitrary code via a header structure containing a negative offset, which is used to dereference a function pointer. - CVE-2008-1878: Buffer overflow in the NSF demuxer which may allow remote attackers to cause a denial of service (crash) or possibly execute arbitrary code via an NSF file with a long title or copyright message. - Backport more calloc usage from the 1.2 branch for extra safety against possible integer overflows such as found in CVE-2008-1482. stable/main/binary-mipsel/libxine1_1.1.2+dfsg-7_mipsel.deb stable/main/binary-mipsel/libxine-dev_1.1.2+dfsg-7_mipsel.deb stable/main/binary-mipsel/libxine1-dbg_1.1.2+dfsg-7_mipsel.deb xine-lib (1.1.2+dfsg-7) stable-security; urgency=low * Non-maintainer upload by the security team * Patches from maintainer: - CVE-2008-1482: Fix various integer overflows in Qt, Real, WC3Movie, Matroska and FILM demuxers, allowing remote attackers to trigger heap overflows and possibly execute arbitrary code; fix other possible NULL pointer dereferences caused by missing alloc checks. (Closes: #472639) The FLV (Flash) demuxer in this version is not patched since the affected code was added in 1.1.4. - CVE-2008-1686: Unchecked array index may allow remote attackers to execute arbitrary code via a header structure containing a negative offset, which is used to dereference a function pointer. - CVE-2008-1878: Buffer overflow in the NSF demuxer which may allow remote attackers to cause a denial of service (crash) or possibly execute arbitrary code via an NSF file with a long title or copyright message. - Backport more calloc usage from the 1.2 branch for extra safety against possible integer overflows such as found in CVE-2008-1482. stable/main/binary-mips/libxine1_1.1.2+dfsg-7_mips.deb stable/main/binary-mips/libxine1-dbg_1.1.2+dfsg-7_mips.deb stable/main/binary-mips/libxine-dev_1.1.2+dfsg-7_mips.deb xine-lib (1.1.2+dfsg-7) stable-security; urgency=low * Non-maintainer upload by the security team * Patches from maintainer: - CVE-2008-1482: Fix various integer overflows in Qt, Real, WC3Movie, Matroska and FILM demuxers, allowing remote attackers to trigger heap overflows and possibly execute arbitrary code; fix other possible NULL pointer dereferences caused by missing alloc checks. (Closes: #472639) The FLV (Flash) demuxer in this version is not patched since the affected code was added in 1.1.4. - CVE-2008-1686: Unchecked array index may allow remote attackers to execute arbitrary code via a header structure containing a negative offset, which is used to dereference a function pointer. - CVE-2008-1878: Buffer overflow in the NSF demuxer which may allow remote attackers to cause a denial of service (crash) or possibly execute arbitrary code via an NSF file with a long title or copyright message. - Backport more calloc usage from the 1.2 branch for extra safety against possible integer overflows such as found in CVE-2008-1482. stable/main/binary-ia64/libxine1_1.1.2+dfsg-7_ia64.deb stable/main/binary-ia64/libxine-dev_1.1.2+dfsg-7_ia64.deb stable/main/binary-ia64/libxine1-dbg_1.1.2+dfsg-7_ia64.deb xine-lib (1.1.2+dfsg-7) stable-security; urgency=low * Non-maintainer upload by the security team * Patches from maintainer: - CVE-2008-1482: Fix various integer overflows in Qt, Real, WC3Movie, Matroska and FILM demuxers, allowing remote attackers to trigger heap overflows and possibly execute arbitrary code; fix other possible NULL pointer dereferences caused by missing alloc checks. (Closes: #472639) The FLV (Flash) demuxer in this version is not patched since the affected code was added in 1.1.4. - CVE-2008-1686: Unchecked array index may allow remote attackers to execute arbitrary code via a header structure containing a negative offset, which is used to dereference a function pointer. - CVE-2008-1878: Buffer overflow in the NSF demuxer which may allow remote attackers to cause a denial of service (crash) or possibly execute arbitrary code via an NSF file with a long title or copyright message. - Backport more calloc usage from the 1.2 branch for extra safety against possible integer overflows such as found in CVE-2008-1482. stable/main/binary-i386/libxine-dev_1.1.2+dfsg-7_i386.deb stable/main/binary-i386/libxine1-dbg_1.1.2+dfsg-7_i386.deb stable/main/binary-i386/libxine1_1.1.2+dfsg-7_i386.deb xine-lib (1.1.2+dfsg-7) stable-security; urgency=low * Non-maintainer upload by the security team * Patches from maintainer: - CVE-2008-1482: Fix various integer overflows in Qt, Real, WC3Movie, Matroska and FILM demuxers, allowing remote attackers to trigger heap overflows and possibly execute arbitrary code; fix other possible NULL pointer dereferences caused by missing alloc checks. (Closes: #472639) The FLV (Flash) demuxer in this version is not patched since the affected code was added in 1.1.4. - CVE-2008-1686: Unchecked array index may allow remote attackers to execute arbitrary code via a header structure containing a negative offset, which is used to dereference a function pointer. - CVE-2008-1878: Buffer overflow in the NSF demuxer which may allow remote attackers to cause a denial of service (crash) or possibly execute arbitrary code via an NSF file with a long title or copyright message. - Backport more calloc usage from the 1.2 branch for extra safety against possible integer overflows such as found in CVE-2008-1482. stable/main/binary-hppa/libxine1_1.1.2+dfsg-7_hppa.deb stable/main/binary-hppa/libxine-dev_1.1.2+dfsg-7_hppa.deb stable/main/binary-hppa/libxine1-dbg_1.1.2+dfsg-7_hppa.deb xine-lib (1.1.2+dfsg-7) stable-security; urgency=low * Non-maintainer upload by the security team * Patches from maintainer: - CVE-2008-1482: Fix various integer overflows in Qt, Real, WC3Movie, Matroska and FILM demuxers, allowing remote attackers to trigger heap overflows and possibly execute arbitrary code; fix other possible NULL pointer dereferences caused by missing alloc checks. (Closes: #472639) The FLV (Flash) demuxer in this version is not patched since the affected code was added in 1.1.4. - CVE-2008-1686: Unchecked array index may allow remote attackers to execute arbitrary code via a header structure containing a negative offset, which is used to dereference a function pointer. - CVE-2008-1878: Buffer overflow in the NSF demuxer which may allow remote attackers to cause a denial of service (crash) or possibly execute arbitrary code via an NSF file with a long title or copyright message. - Backport more calloc usage from the 1.2 branch for extra safety against possible integer overflows such as found in CVE-2008-1482. stable/main/binary-arm/libxine-dev_1.1.2+dfsg-7_arm.deb stable/main/binary-arm/libxine1_1.1.2+dfsg-7_arm.deb stable/main/binary-arm/libxine1-dbg_1.1.2+dfsg-7_arm.deb xine-lib (1.1.2+dfsg-7) stable-security; urgency=low * Non-maintainer upload by the security team * Patches from maintainer: - CVE-2008-1482: Fix various integer overflows in Qt, Real, WC3Movie, Matroska and FILM demuxers, allowing remote attackers to trigger heap overflows and possibly execute arbitrary code; fix other possible NULL pointer dereferences caused by missing alloc checks. (Closes: #472639) The FLV (Flash) demuxer in this version is not patched since the affected code was added in 1.1.4. - CVE-2008-1686: Unchecked array index may allow remote attackers to execute arbitrary code via a header structure containing a negative offset, which is used to dereference a function pointer. - CVE-2008-1878: Buffer overflow in the NSF demuxer which may allow remote attackers to cause a denial of service (crash) or possibly execute arbitrary code via an NSF file with a long title or copyright message. - Backport more calloc usage from the 1.2 branch for extra safety against possible integer overflows such as found in CVE-2008-1482. stable/main/binary-alpha/libxine1_1.1.2+dfsg-7_alpha.deb stable/main/binary-alpha/libxine-dev_1.1.2+dfsg-7_alpha.deb stable/main/binary-alpha/libxine1-dbg_1.1.2+dfsg-7_alpha.deb xine-lib (1.1.2+dfsg-7) stable-security; urgency=low * Non-maintainer upload by the security team * Patches from maintainer: - CVE-2008-1482: Fix various integer overflows in Qt, Real, WC3Movie, Matroska and FILM demuxers, allowing remote attackers to trigger heap overflows and possibly execute arbitrary code; fix other possible NULL pointer dereferences caused by missing alloc checks. (Closes: #472639) The FLV (Flash) demuxer in this version is not patched since the affected code was added in 1.1.4. - CVE-2008-1686: Unchecked array index may allow remote attackers to execute arbitrary code via a header structure containing a negative offset, which is used to dereference a function pointer. - CVE-2008-1878: Buffer overflow in the NSF demuxer which may allow remote attackers to cause a denial of service (crash) or possibly execute arbitrary code via an NSF file with a long title or copyright message. - Backport more calloc usage from the 1.2 branch for extra safety against possible integer overflows such as found in CVE-2008-1482. stable/main/source/xine-lib_1.1.2+dfsg-7.dsc stable/main/binary-amd64/libxine-dev_1.1.2+dfsg-7_amd64.deb stable/main/source/xine-lib_1.1.2+dfsg-7.diff.gz stable/main/binary-amd64/libxine1_1.1.2+dfsg-7_amd64.deb stable/main/binary-amd64/libxine1-dbg_1.1.2+dfsg-7_amd64.deb xine-lib (1.1.2+dfsg-7) stable-security; urgency=low * Non-maintainer upload by the security team * Patches from maintainer: - CVE-2008-1482: Fix various integer overflows in Qt, Real, WC3Movie, Matroska and FILM demuxers, allowing remote attackers to trigger heap overflows and possibly execute arbitrary code; fix other possible NULL pointer dereferences caused by missing alloc checks. (Closes: #472639) The FLV (Flash) demuxer in this version is not patched since the affected code was added in 1.1.4. - CVE-2008-1686: Unchecked array index may allow remote attackers to execute arbitrary code via a header structure containing a negative offset, which is used to dereference a function pointer. - CVE-2008-1878: Buffer overflow in the NSF demuxer which may allow remote attackers to cause a denial of service (crash) or possibly execute arbitrary code via an NSF file with a long title or copyright message. - Backport more calloc usage from the 1.2 branch for extra safety against possible integer overflows such as found in CVE-2008-1482. stable/main/binary-sparc/wxmaxima_0.7.0a-1.1_sparc.deb wxmaxima (0.7.0a-1.1) stable; urgency=low * Non-maintainer upload. * Imported the patch from bug 1573741 in Upstream's bugtracker. This solves grave connexion problems. (Closes: #432665) stable/main/binary-s390/wxmaxima_0.7.0a-1.1_s390.deb wxmaxima (0.7.0a-1.1) stable; urgency=low * Non-maintainer upload. * Imported the patch from bug 1573741 in Upstream's bugtracker. This solves grave connexion problems. (Closes: #432665) stable/main/binary-mipsel/wxmaxima_0.7.0a-1.1_mipsel.deb wxmaxima (0.7.0a-1.1) stable; urgency=low * Non-maintainer upload. * Imported the patch from bug 1573741 in Upstream's bugtracker. This solves grave connexion problems. (Closes: #432665) stable/main/binary-mips/wxmaxima_0.7.0a-1.1_mips.deb wxmaxima (0.7.0a-1.1) stable; urgency=low * Non-maintainer upload. * Imported the patch from bug 1573741 in Upstream's bugtracker. This solves grave connexion problems. (Closes: #432665) stable/main/binary-ia64/wxmaxima_0.7.0a-1.1_ia64.deb wxmaxima (0.7.0a-1.1) stable; urgency=low * Non-maintainer upload. * Imported the patch from bug 1573741 in Upstream's bugtracker. This solves grave connexion problems. (Closes: #432665) stable/main/binary-i386/wxmaxima_0.7.0a-1.1_i386.deb wxmaxima (0.7.0a-1.1) stable; urgency=low * Non-maintainer upload. * Imported the patch from bug 1573741 in Upstream's bugtracker. This solves grave connexion problems. (Closes: #432665) stable/main/binary-hppa/wxmaxima_0.7.0a-1.1_hppa.deb wxmaxima (0.7.0a-1.1) stable; urgency=low * Non-maintainer upload. * Imported the patch from bug 1573741 in Upstream's bugtracker. This solves grave connexion problems. (Closes: #432665) stable/main/binary-arm/wxmaxima_0.7.0a-1.1_arm.deb wxmaxima (0.7.0a-1.1) stable; urgency=low * Non-maintainer upload. * Imported the patch from bug 1573741 in Upstream's bugtracker. This solves grave connexion problems. (Closes: #432665) stable/main/binary-amd64/wxmaxima_0.7.0a-1.1_amd64.deb wxmaxima (0.7.0a-1.1) stable; urgency=low * Non-maintainer upload. * Imported the patch from bug 1573741 in Upstream's bugtracker. This solves grave connexion problems. (Closes: #432665) stable/main/binary-alpha/wxmaxima_0.7.0a-1.1_alpha.deb wxmaxima (0.7.0a-1.1) stable; urgency=low * Non-maintainer upload. * Imported the patch from bug 1573741 in Upstream's bugtracker. This solves grave connexion problems. (Closes: #432665) stable/main/source/wxmaxima_0.7.0a-1.1.diff.gz stable/main/source/wxmaxima_0.7.0a-1.1.dsc stable/main/binary-powerpc/wxmaxima_0.7.0a-1.1_powerpc.deb wxmaxima (0.7.0a-1.1) stable; urgency=low * Non-maintainer upload. * Imported the patch from bug 1573741 in Upstream's bugtracker. This solves grave connexion problems. (Closes: #432665) stable/main/source/wordpress_2.0.10-1etch3.dsc stable/main/source/wordpress_2.0.10-1etch3.diff.gz stable/main/binary-all/wordpress_2.0.10-1etch3_all.deb wordpress (2.0.10-1etch3) stable-security; urgency=high * Added 009CVE2007-1599.patch to fix redirect issue through wp-login.php (CVE-2007-1599) * Added 011CVE2008-0664.patch to fix remote post edit by unauthorized users issue in xml-rpc (CVE-2007-0664) stable/main/binary-sparc/wml_2.0.11-1etch2_sparc.deb wml (2.0.11-1etch2) stable-security; urgency=medium * Non-maintainer * Use the tempdir() function from File::Temp with the automatic cleanup option to remove temporary directories upon exit [wml_backend/p1_ipp/ipp.src] (closes: Bug#471345) stable/main/binary-s390/wml_2.0.11-1etch2_s390.deb wml (2.0.11-1etch2) stable-security; urgency=medium * Non-maintainer * Use the tempdir() function from File::Temp with the automatic cleanup option to remove temporary directories upon exit [wml_backend/p1_ipp/ipp.src] (closes: Bug#471345) stable/main/binary-powerpc/wml_2.0.11-1etch2_powerpc.deb wml (2.0.11-1etch2) stable-security; urgency=medium * Non-maintainer * Use the tempdir() function from File::Temp with the automatic cleanup option to remove temporary directories upon exit [wml_backend/p1_ipp/ipp.src] (closes: Bug#471345) stable/main/binary-mipsel/wml_2.0.11-1etch2_mipsel.deb wml (2.0.11-1etch2) stable-security; urgency=medium * Non-maintainer * Use the tempdir() function from File::Temp with the automatic cleanup option to remove temporary directories upon exit [wml_backend/p1_ipp/ipp.src] (closes: Bug#471345) stable/main/binary-mips/wml_2.0.11-1etch2_mips.deb wml (2.0.11-1etch2) stable-security; urgency=medium * Non-maintainer * Use the tempdir() function from File::Temp with the automatic cleanup option to remove temporary directories upon exit [wml_backend/p1_ipp/ipp.src] (closes: Bug#471345) stable/main/binary-ia64/wml_2.0.11-1etch2_ia64.deb wml (2.0.11-1etch2) stable-security; urgency=medium * Non-maintainer * Use the tempdir() function from File::Temp with the automatic cleanup option to remove temporary directories upon exit [wml_backend/p1_ipp/ipp.src] (closes: Bug#471345) stable/main/binary-hppa/wml_2.0.11-1etch2_hppa.deb wml (2.0.11-1etch2) stable-security; urgency=medium * Non-maintainer * Use the tempdir() function from File::Temp with the automatic cleanup option to remove temporary directories upon exit [wml_backend/p1_ipp/ipp.src] (closes: Bug#471345) stable/main/binary-arm/wml_2.0.11-1etch2_arm.deb wml (2.0.11-1etch2) stable-security; urgency=medium * Non-maintainer * Use the tempdir() function from File::Temp with the automatic cleanup option to remove temporary directories upon exit [wml_backend/p1_ipp/ipp.src] (closes: Bug#471345) stable/main/binary-amd64/wml_2.0.11-1etch2_amd64.deb wml (2.0.11-1etch2) stable-security; urgency=medium * Non-maintainer * Use the tempdir() function from File::Temp with the automatic cleanup option to remove temporary directories upon exit [wml_backend/p1_ipp/ipp.src] (closes: Bug#471345) stable/main/binary-alpha/wml_2.0.11-1etch2_alpha.deb wml (2.0.11-1etch2) stable-security; urgency=medium * Non-maintainer * Use the tempdir() function from File::Temp with the automatic cleanup option to remove temporary directories upon exit [wml_backend/p1_ipp/ipp.src] (closes: Bug#471345) stable/main/binary-i386/wml_2.0.11-1etch2_i386.deb stable/main/source/wml_2.0.11-1etch2.diff.gz stable/main/source/wml_2.0.11-1etch2.dsc wml (2.0.11-1etch2) stable-security; urgency=medium * Non-maintainer * Use the tempdir() function from File::Temp with the automatic cleanup option to remove temporary directories upon exit [wml_backend/p1_ipp/ipp.src] (closes: Bug#471345) stable/main/binary-sparc/libiw28_28-1+etchnhalf.1_sparc.deb stable/main/binary-sparc/ifrename_28-1+etchnhalf.1_sparc.deb stable/main/binary-sparc/libiw-dev_28-1+etchnhalf.1_sparc.deb stable/main/binary-sparc/wireless-tools_28-1+etchnhalf.1_sparc.deb stable/main/binary-sparc/libiw28-udeb_28-1+etchnhalf.1_sparc.udeb stable/main/binary-sparc/wireless-tools-udeb_28-1+etchnhalf.1_sparc.udeb wireless-tools (28-1+etchnhalf.1) stable; urgency=low * Non-maintainer upload. * Up WE_MAX_VERSION to 22. This tells wireless-tools that it is forward-compatible with version 22 of WE (used in >= 2.6.23 kernels), silencing a warning to the user about potential incompatibilities that were never introduced. stable/main/binary-s390/libiw28_28-1+etchnhalf.1_s390.deb stable/main/binary-s390/ifrename_28-1+etchnhalf.1_s390.deb stable/main/binary-s390/libiw-dev_28-1+etchnhalf.1_s390.deb stable/main/binary-s390/wireless-tools-udeb_28-1+etchnhalf.1_s390.udeb stable/main/binary-s390/wireless-tools_28-1+etchnhalf.1_s390.deb stable/main/binary-s390/libiw28-udeb_28-1+etchnhalf.1_s390.udeb wireless-tools (28-1+etchnhalf.1) stable; urgency=low * Non-maintainer upload. * Up WE_MAX_VERSION to 22. This tells wireless-tools that it is forward-compatible with version 22 of WE (used in >= 2.6.23 kernels), silencing a warning to the user about potential incompatibilities that were never introduced. stable/main/binary-powerpc/libiw28-udeb_28-1+etchnhalf.1_powerpc.udeb stable/main/binary-powerpc/ifrename_28-1+etchnhalf.1_powerpc.deb stable/main/binary-powerpc/libiw28_28-1+etchnhalf.1_powerpc.deb stable/main/binary-powerpc/libiw-dev_28-1+etchnhalf.1_powerpc.deb stable/main/binary-powerpc/wireless-tools_28-1+etchnhalf.1_powerpc.deb stable/main/binary-powerpc/wireless-tools-udeb_28-1+etchnhalf.1_powerpc.udeb wireless-tools (28-1+etchnhalf.1) stable; urgency=low * Non-maintainer upload. * Up WE_MAX_VERSION to 22. This tells wireless-tools that it is forward-compatible with version 22 of WE (used in >= 2.6.23 kernels), silencing a warning to the user about potential incompatibilities that were never introduced. stable/main/binary-mipsel/wireless-tools_28-1+etchnhalf.1_mipsel.deb stable/main/binary-mipsel/libiw28-udeb_28-1+etchnhalf.1_mipsel.udeb stable/main/binary-mipsel/libiw28_28-1+etchnhalf.1_mipsel.deb stable/main/binary-mipsel/wireless-tools-udeb_28-1+etchnhalf.1_mipsel.udeb stable/main/binary-mipsel/libiw-dev_28-1+etchnhalf.1_mipsel.deb stable/main/binary-mipsel/ifrename_28-1+etchnhalf.1_mipsel.deb wireless-tools (28-1+etchnhalf.1) stable; urgency=low * Non-maintainer upload. * Up WE_MAX_VERSION to 22. This tells wireless-tools that it is forward-compatible with version 22 of WE (used in >= 2.6.23 kernels), silencing a warning to the user about potential incompatibilities that were never introduced. stable/main/binary-mips/wireless-tools_28-1+etchnhalf.1_mips.deb stable/main/binary-mips/wireless-tools-udeb_28-1+etchnhalf.1_mips.udeb stable/main/binary-mips/ifrename_28-1+etchnhalf.1_mips.deb stable/main/binary-mips/libiw-dev_28-1+etchnhalf.1_mips.deb stable/main/binary-mips/libiw28-udeb_28-1+etchnhalf.1_mips.udeb stable/main/binary-mips/libiw28_28-1+etchnhalf.1_mips.deb wireless-tools (28-1+etchnhalf.1) stable; urgency=low * Non-maintainer upload. * Up WE_MAX_VERSION to 22. This tells wireless-tools that it is forward-compatible with version 22 of WE (used in >= 2.6.23 kernels), silencing a warning to the user about potential incompatibilities that were never introduced. stable/main/binary-i386/wireless-tools-udeb_28-1+etchnhalf.1_i386.udeb stable/main/binary-i386/wireless-tools_28-1+etchnhalf.1_i386.deb stable/main/binary-i386/libiw-dev_28-1+etchnhalf.1_i386.deb stable/main/binary-i386/ifrename_28-1+etchnhalf.1_i386.deb stable/main/binary-i386/libiw28_28-1+etchnhalf.1_i386.deb stable/main/binary-i386/libiw28-udeb_28-1+etchnhalf.1_i386.udeb wireless-tools (28-1+etchnhalf.1) stable; urgency=low * Non-maintainer upload. * Up WE_MAX_VERSION to 22. This tells wireless-tools that it is forward-compatible with version 22 of WE (used in >= 2.6.23 kernels), silencing a warning to the user about potential incompatibilities that were never introduced. stable/main/binary-hppa/libiw28_28-1+etchnhalf.1_hppa.deb stable/main/binary-hppa/wireless-tools-udeb_28-1+etchnhalf.1_hppa.udeb stable/main/binary-hppa/wireless-tools_28-1+etchnhalf.1_hppa.deb stable/main/binary-hppa/libiw28-udeb_28-1+etchnhalf.1_hppa.udeb stable/main/binary-hppa/ifrename_28-1+etchnhalf.1_hppa.deb stable/main/binary-hppa/libiw-dev_28-1+etchnhalf.1_hppa.deb wireless-tools (28-1+etchnhalf.1) stable; urgency=low * Non-maintainer upload. * Up WE_MAX_VERSION to 22. This tells wireless-tools that it is forward-compatible with version 22 of WE (used in >= 2.6.23 kernels), silencing a warning to the user about potential incompatibilities that were never introduced. stable/main/binary-arm/wireless-tools-udeb_28-1+etchnhalf.1_arm.udeb stable/main/binary-arm/libiw28_28-1+etchnhalf.1_arm.deb stable/main/binary-arm/libiw-dev_28-1+etchnhalf.1_arm.deb stable/main/binary-arm/ifrename_28-1+etchnhalf.1_arm.deb stable/main/binary-arm/libiw28-udeb_28-1+etchnhalf.1_arm.udeb stable/main/binary-arm/wireless-tools_28-1+etchnhalf.1_arm.deb wireless-tools (28-1+etchnhalf.1) stable; urgency=low * Non-maintainer upload. * Up WE_MAX_VERSION to 22. This tells wireless-tools that it is forward-compatible with version 22 of WE (used in >= 2.6.23 kernels), silencing a warning to the user about potential incompatibilities that were never introduced. stable/main/binary-amd64/wireless-tools_28-1+etchnhalf.1_amd64.deb stable/main/binary-amd64/libiw28-udeb_28-1+etchnhalf.1_amd64.udeb stable/main/binary-amd64/libiw-dev_28-1+etchnhalf.1_amd64.deb stable/main/binary-amd64/wireless-tools-udeb_28-1+etchnhalf.1_amd64.udeb stable/main/binary-amd64/ifrename_28-1+etchnhalf.1_amd64.deb stable/main/binary-amd64/libiw28_28-1+etchnhalf.1_amd64.deb wireless-tools (28-1+etchnhalf.1) stable; urgency=low * Non-maintainer upload. * Up WE_MAX_VERSION to 22. This tells wireless-tools that it is forward-compatible with version 22 of WE (used in >= 2.6.23 kernels), silencing a warning to the user about potential incompatibilities that were never introduced. stable/main/binary-alpha/wireless-tools_28-1+etchnhalf.1_alpha.deb stable/main/binary-alpha/libiw-dev_28-1+etchnhalf.1_alpha.deb stable/main/binary-alpha/libiw28-udeb_28-1+etchnhalf.1_alpha.udeb stable/main/binary-alpha/libiw28_28-1+etchnhalf.1_alpha.deb stable/main/binary-alpha/ifrename_28-1+etchnhalf.1_alpha.deb stable/main/binary-alpha/wireless-tools-udeb_28-1+etchnhalf.1_alpha.udeb wireless-tools (28-1+etchnhalf.1) stable; urgency=low * Non-maintainer upload. * Up WE_MAX_VERSION to 22. This tells wireless-tools that it is forward-compatible with version 22 of WE (used in >= 2.6.23 kernels), silencing a warning to the user about potential incompatibilities that were never introduced. stable/main/binary-ia64/libiw28_28-1+etchnhalf.1_ia64.deb stable/main/source/wireless-tools_28-1+etchnhalf.1.dsc stable/main/binary-ia64/wireless-tools_28-1+etchnhalf.1_ia64.deb stable/main/source/wireless-tools_28-1+etchnhalf.1.diff.gz stable/main/binary-ia64/libiw-dev_28-1+etchnhalf.1_ia64.deb stable/main/binary-ia64/ifrename_28-1+etchnhalf.1_ia64.deb stable/main/binary-ia64/libiw28-udeb_28-1+etchnhalf.1_ia64.udeb stable/main/binary-ia64/wireless-tools-udeb_28-1+etchnhalf.1_ia64.udeb wireless-tools (28-1+etchnhalf.1) stable; urgency=low * Non-maintainer upload. * Up WE_MAX_VERSION to 22. This tells wireless-tools that it is forward-compatible with version 22 of WE (used in >= 2.6.23 kernels), silencing a warning to the user about potential incompatibilities that were never introduced. stable/main/binary-ia64/vzctl_3.0.11-14_ia64.deb vzctl (3.0.11-14) stable; urgency=high * Correction for serious permission problem with migration, closes: #469293. stable/main/binary-amd64/vzctl_3.0.11-14_amd64.deb vzctl (3.0.11-14) stable; urgency=high * Correction for serious permission problem with migration, closes: #469293. stable/main/source/vzctl_3.0.11-14.dsc stable/main/source/vzctl_3.0.11-14.diff.gz stable/main/binary-i386/vzctl_3.0.11-14_i386.deb vzctl (3.0.11-14) stable; urgency=high * Correction for serious permission problem with migration, closes: #469293. stable/main/binary-sparc/vlc-plugin-ggi_0.8.6-svn20061012.debian-5.1+etch2_sparc.deb stable/main/binary-sparc/vlc_0.8.6-svn20061012.debian-5.1+etch2_sparc.deb stable/main/binary-sparc/vlc-plugin-sdl_0.8.6-svn20061012.debian-5.1+etch2_sparc.deb stable/main/binary-sparc/vlc-plugin-arts_0.8.6-svn20061012.debian-5.1+etch2_sparc.deb stable/main/binary-sparc/vlc-nox_0.8.6-svn20061012.debian-5.1+etch2_sparc.deb stable/main/binary-sparc/libvlc0-dev_0.8.6-svn20061012.debian-5.1+etch2_sparc.deb stable/main/binary-sparc/mozilla-plugin-vlc_0.8.6-svn20061012.debian-5.1+etch2_sparc.deb stable/main/binary-sparc/vlc-plugin-esd_0.8.6-svn20061012.debian-5.1+etch2_sparc.deb stable/main/binary-sparc/libvlc0_0.8.6-svn20061012.debian-5.1+etch2_sparc.deb vlc (0.8.6-svn20061012.debian-5.1+etch2) stable-security; urgency=high * Non-maintainer upload by the security team * sec-subtitle_buffer_overflow.diff: + CVE-2007-6681: Stack buffer overflow in subtitle demuxer * sec-httpd_formatstring.diff: + CVE-2007-6682: Format string vulnerability in HTTP streaming * sec-backported-CVE-2007-6683.patch: + CVE-2007-6683: Arbitrary file overwrite vulnerability in browser plugin * sec-CVE-2008-0296_CVE-2008-0295.diff: + CVE-2008-0295: Heap buffer overflow in RTSP session description protocol (SDP) handlers + CVE-2008-0296: Heap buffer overflow in RTSP stream handling * sec-backported-CVE-2008-0073.patch: + CVE-2008-0073: Array index error in RTSP session description protocol metadata handling * sec-CVE-2008-0984.diff: + CVE-2008-0984: Inadequate integer bounds checking enables memory scribble and arbitrary code execution stable/main/binary-s390/libvlc0-dev_0.8.6-svn20061012.debian-5.1+etch2_s390.deb stable/main/binary-s390/vlc_0.8.6-svn20061012.debian-5.1+etch2_s390.deb stable/main/binary-s390/vlc-plugin-sdl_0.8.6-svn20061012.debian-5.1+etch2_s390.deb stable/main/binary-s390/mozilla-plugin-vlc_0.8.6-svn20061012.debian-5.1+etch2_s390.deb stable/main/binary-s390/vlc-nox_0.8.6-svn20061012.debian-5.1+etch2_s390.deb stable/main/binary-s390/vlc-plugin-esd_0.8.6-svn20061012.debian-5.1+etch2_s390.deb stable/main/binary-s390/vlc-plugin-ggi_0.8.6-svn20061012.debian-5.1+etch2_s390.deb stable/main/binary-s390/libvlc0_0.8.6-svn20061012.debian-5.1+etch2_s390.deb stable/main/binary-s390/vlc-plugin-arts_0.8.6-svn20061012.debian-5.1+etch2_s390.deb vlc (0.8.6-svn20061012.debian-5.1+etch2) stable-security; urgency=high * Non-maintainer upload by the security team * sec-subtitle_buffer_overflow.diff: + CVE-2007-6681: Stack buffer overflow in subtitle demuxer * sec-httpd_formatstring.diff: + CVE-2007-6682: Format string vulnerability in HTTP streaming * sec-backported-CVE-2007-6683.patch: + CVE-2007-6683: Arbitrary file overwrite vulnerability in browser plugin * sec-CVE-2008-0296_CVE-2008-0295.diff: + CVE-2008-0295: Heap buffer overflow in RTSP session description protocol (SDP) handlers + CVE-2008-0296: Heap buffer overflow in RTSP stream handling * sec-backported-CVE-2008-0073.patch: + CVE-2008-0073: Array index error in RTSP session description protocol metadata handling * sec-CVE-2008-0984.diff: + CVE-2008-0984: Inadequate integer bounds checking enables memory scribble and arbitrary code execution stable/main/binary-powerpc/libvlc0_0.8.6-svn20061012.debian-5.1+etch2_powerpc.deb stable/main/binary-powerpc/libvlc0-dev_0.8.6-svn20061012.debian-5.1+etch2_powerpc.deb stable/main/binary-powerpc/vlc-plugin-ggi_0.8.6-svn20061012.debian-5.1+etch2_powerpc.deb stable/main/binary-powerpc/vlc-nox_0.8.6-svn20061012.debian-5.1+etch2_powerpc.deb stable/main/binary-powerpc/mozilla-plugin-vlc_0.8.6-svn20061012.debian-5.1+etch2_powerpc.deb stable/main/binary-powerpc/vlc_0.8.6-svn20061012.debian-5.1+etch2_powerpc.deb stable/main/binary-powerpc/vlc-plugin-sdl_0.8.6-svn20061012.debian-5.1+etch2_powerpc.deb stable/main/binary-powerpc/vlc-plugin-arts_0.8.6-svn20061012.debian-5.1+etch2_powerpc.deb stable/main/binary-powerpc/vlc-plugin-esd_0.8.6-svn20061012.debian-5.1+etch2_powerpc.deb vlc (0.8.6-svn20061012.debian-5.1+etch2) stable-security; urgency=high * Non-maintainer upload by the security team * sec-subtitle_buffer_overflow.diff: + CVE-2007-6681: Stack buffer overflow in subtitle demuxer * sec-httpd_formatstring.diff: + CVE-2007-6682: Format string vulnerability in HTTP streaming * sec-backported-CVE-2007-6683.patch: + CVE-2007-6683: Arbitrary file overwrite vulnerability in browser plugin * sec-CVE-2008-0296_CVE-2008-0295.diff: + CVE-2008-0295: Heap buffer overflow in RTSP session description protocol (SDP) handlers + CVE-2008-0296: Heap buffer overflow in RTSP stream handling * sec-backported-CVE-2008-0073.patch: + CVE-2008-0073: Array index error in RTSP session description protocol metadata handling * sec-CVE-2008-0984.diff: + CVE-2008-0984: Inadequate integer bounds checking enables memory scribble and arbitrary code execution stable/main/binary-mipsel/vlc_0.8.6-svn20061012.debian-5.1+etch2_mipsel.deb stable/main/binary-mipsel/vlc-plugin-sdl_0.8.6-svn20061012.debian-5.1+etch2_mipsel.deb stable/main/binary-mipsel/mozilla-plugin-vlc_0.8.6-svn20061012.debian-5.1+etch2_mipsel.deb stable/main/binary-mipsel/libvlc0-dev_0.8.6-svn20061012.debian-5.1+etch2_mipsel.deb stable/main/binary-mipsel/libvlc0_0.8.6-svn20061012.debian-5.1+etch2_mipsel.deb stable/main/binary-mipsel/vlc-plugin-esd_0.8.6-svn20061012.debian-5.1+etch2_mipsel.deb stable/main/binary-mipsel/vlc-plugin-arts_0.8.6-svn20061012.debian-5.1+etch2_mipsel.deb stable/main/binary-mipsel/vlc-nox_0.8.6-svn20061012.debian-5.1+etch2_mipsel.deb stable/main/binary-mipsel/vlc-plugin-ggi_0.8.6-svn20061012.debian-5.1+etch2_mipsel.deb vlc (0.8.6-svn20061012.debian-5.1+etch2) stable-security; urgency=high * Non-maintainer upload by the security team * sec-subtitle_buffer_overflow.diff: + CVE-2007-6681: Stack buffer overflow in subtitle demuxer * sec-httpd_formatstring.diff: + CVE-2007-6682: Format string vulnerability in HTTP streaming * sec-backported-CVE-2007-6683.patch: + CVE-2007-6683: Arbitrary file overwrite vulnerability in browser plugin * sec-CVE-2008-0296_CVE-2008-0295.diff: + CVE-2008-0295: Heap buffer overflow in RTSP session description protocol (SDP) handlers + CVE-2008-0296: Heap buffer overflow in RTSP stream handling * sec-backported-CVE-2008-0073.patch: + CVE-2008-0073: Array index error in RTSP session description protocol metadata handling * sec-CVE-2008-0984.diff: + CVE-2008-0984: Inadequate integer bounds checking enables memory scribble and arbitrary code execution stable/main/binary-mips/vlc-nox_0.8.6-svn20061012.debian-5.1+etch2_mips.deb stable/main/binary-mips/libvlc0-dev_0.8.6-svn20061012.debian-5.1+etch2_mips.deb stable/main/binary-mips/vlc-plugin-ggi_0.8.6-svn20061012.debian-5.1+etch2_mips.deb stable/main/binary-mips/vlc-plugin-esd_0.8.6-svn20061012.debian-5.1+etch2_mips.deb stable/main/binary-mips/mozilla-plugin-vlc_0.8.6-svn20061012.debian-5.1+etch2_mips.deb stable/main/binary-mips/vlc_0.8.6-svn20061012.debian-5.1+etch2_mips.deb stable/main/binary-mips/vlc-plugin-sdl_0.8.6-svn20061012.debian-5.1+etch2_mips.deb stable/main/binary-mips/vlc-plugin-arts_0.8.6-svn20061012.debian-5.1+etch2_mips.deb stable/main/binary-mips/libvlc0_0.8.6-svn20061012.debian-5.1+etch2_mips.deb vlc (0.8.6-svn20061012.debian-5.1+etch2) stable-security; urgency=high * Non-maintainer upload by the security team * sec-subtitle_buffer_overflow.diff: + CVE-2007-6681: Stack buffer overflow in subtitle demuxer * sec-httpd_formatstring.diff: + CVE-2007-6682: Format string vulnerability in HTTP streaming * sec-backported-CVE-2007-6683.patch: + CVE-2007-6683: Arbitrary file overwrite vulnerability in browser plugin * sec-CVE-2008-0296_CVE-2008-0295.diff: + CVE-2008-0295: Heap buffer overflow in RTSP session description protocol (SDP) handlers + CVE-2008-0296: Heap buffer overflow in RTSP stream handling * sec-backported-CVE-2008-0073.patch: + CVE-2008-0073: Array index error in RTSP session description protocol metadata handling * sec-CVE-2008-0984.diff: + CVE-2008-0984: Inadequate integer bounds checking enables memory scribble and arbitrary code execution stable/main/binary-ia64/vlc-plugin-sdl_0.8.6-svn20061012.debian-5.1+etch2_ia64.deb stable/main/binary-ia64/vlc_0.8.6-svn20061012.debian-5.1+etch2_ia64.deb stable/main/binary-ia64/mozilla-plugin-vlc_0.8.6-svn20061012.debian-5.1+etch2_ia64.deb stable/main/binary-ia64/vlc-nox_0.8.6-svn20061012.debian-5.1+etch2_ia64.deb stable/main/binary-ia64/libvlc0_0.8.6-svn20061012.debian-5.1+etch2_ia64.deb stable/main/binary-ia64/libvlc0-dev_0.8.6-svn20061012.debian-5.1+etch2_ia64.deb stable/main/binary-ia64/vlc-plugin-ggi_0.8.6-svn20061012.debian-5.1+etch2_ia64.deb stable/main/binary-ia64/vlc-plugin-esd_0.8.6-svn20061012.debian-5.1+etch2_ia64.deb stable/main/binary-ia64/vlc-plugin-arts_0.8.6-svn20061012.debian-5.1+etch2_ia64.deb vlc (0.8.6-svn20061012.debian-5.1+etch2) stable-security; urgency=high * Non-maintainer upload by the security team * sec-subtitle_buffer_overflow.diff: + CVE-2007-6681: Stack buffer overflow in subtitle demuxer * sec-httpd_formatstring.diff: + CVE-2007-6682: Format string vulnerability in HTTP streaming * sec-backported-CVE-2007-6683.patch: + CVE-2007-6683: Arbitrary file overwrite vulnerability in browser plugin * sec-CVE-2008-0296_CVE-2008-0295.diff: + CVE-2008-0295: Heap buffer overflow in RTSP session description protocol (SDP) handlers + CVE-2008-0296: Heap buffer overflow in RTSP stream handling * sec-backported-CVE-2008-0073.patch: + CVE-2008-0073: Array index error in RTSP session description protocol metadata handling * sec-CVE-2008-0984.diff: + CVE-2008-0984: Inadequate integer bounds checking enables memory scribble and arbitrary code execution stable/main/binary-i386/vlc-plugin-arts_0.8.6-svn20061012.debian-5.1+etch2_i386.deb stable/main/binary-i386/libvlc0-dev_0.8.6-svn20061012.debian-5.1+etch2_i386.deb stable/main/binary-i386/libvlc0_0.8.6-svn20061012.debian-5.1+etch2_i386.deb stable/main/binary-i386/vlc-plugin-esd_0.8.6-svn20061012.debian-5.1+etch2_i386.deb stable/main/binary-i386/vlc-plugin-ggi_0.8.6-svn20061012.debian-5.1+etch2_i386.deb stable/main/binary-i386/vlc-plugin-svgalib_0.8.6-svn20061012.debian-5.1+etch2_i386.deb stable/main/binary-i386/vlc-plugin-sdl_0.8.6-svn20061012.debian-5.1+etch2_i386.deb stable/main/binary-i386/vlc-nox_0.8.6-svn20061012.debian-5.1+etch2_i386.deb stable/main/binary-i386/vlc_0.8.6-svn20061012.debian-5.1+etch2_i386.deb stable/main/binary-i386/vlc-plugin-glide_0.8.6-svn20061012.debian-5.1+etch2_i386.deb stable/main/binary-i386/mozilla-plugin-vlc_0.8.6-svn20061012.debian-5.1+etch2_i386.deb vlc (0.8.6-svn20061012.debian-5.1+etch2) stable-security; urgency=high * Non-maintainer upload by the security team * sec-subtitle_buffer_overflow.diff: + CVE-2007-6681: Stack buffer overflow in subtitle demuxer * sec-httpd_formatstring.diff: + CVE-2007-6682: Format string vulnerability in HTTP streaming * sec-backported-CVE-2007-6683.patch: + CVE-2007-6683: Arbitrary file overwrite vulnerability in browser plugin * sec-CVE-2008-0296_CVE-2008-0295.diff: + CVE-2008-0295: Heap buffer overflow in RTSP session description protocol (SDP) handlers + CVE-2008-0296: Heap buffer overflow in RTSP stream handling * sec-backported-CVE-2008-0073.patch: + CVE-2008-0073: Array index error in RTSP session description protocol metadata handling * sec-CVE-2008-0984.diff: + CVE-2008-0984: Inadequate integer bounds checking enables memory scribble and arbitrary code execution stable/main/binary-hppa/vlc-plugin-sdl_0.8.6-svn20061012.debian-5.1+etch2_hppa.deb stable/main/binary-hppa/vlc-nox_0.8.6-svn20061012.debian-5.1+etch2_hppa.deb stable/main/binary-hppa/libvlc0_0.8.6-svn20061012.debian-5.1+etch2_hppa.deb stable/main/binary-hppa/mozilla-plugin-vlc_0.8.6-svn20061012.debian-5.1+etch2_hppa.deb stable/main/binary-hppa/vlc_0.8.6-svn20061012.debian-5.1+etch2_hppa.deb stable/main/binary-hppa/vlc-plugin-esd_0.8.6-svn20061012.debian-5.1+etch2_hppa.deb stable/main/binary-hppa/vlc-plugin-arts_0.8.6-svn20061012.debian-5.1+etch2_hppa.deb stable/main/binary-hppa/libvlc0-dev_0.8.6-svn20061012.debian-5.1+etch2_hppa.deb stable/main/binary-hppa/vlc-plugin-ggi_0.8.6-svn20061012.debian-5.1+etch2_hppa.deb vlc (0.8.6-svn20061012.debian-5.1+etch2) stable-security; urgency=high * Non-maintainer upload by the security team * sec-subtitle_buffer_overflow.diff: + CVE-2007-6681: Stack buffer overflow in subtitle demuxer * sec-httpd_formatstring.diff: + CVE-2007-6682: Format string vulnerability in HTTP streaming * sec-backported-CVE-2007-6683.patch: + CVE-2007-6683: Arbitrary file overwrite vulnerability in browser plugin * sec-CVE-2008-0296_CVE-2008-0295.diff: + CVE-2008-0295: Heap buffer overflow in RTSP session description protocol (SDP) handlers + CVE-2008-0296: Heap buffer overflow in RTSP stream handling * sec-backported-CVE-2008-0073.patch: + CVE-2008-0073: Array index error in RTSP session description protocol metadata handling * sec-CVE-2008-0984.diff: + CVE-2008-0984: Inadequate integer bounds checking enables memory scribble and arbitrary code execution stable/main/binary-arm/vlc_0.8.6-svn20061012.debian-5.1+etch2_arm.deb stable/main/binary-arm/vlc-plugin-ggi_0.8.6-svn20061012.debian-5.1+etch2_arm.deb stable/main/binary-arm/libvlc0-dev_0.8.6-svn20061012.debian-5.1+etch2_arm.deb stable/main/binary-arm/mozilla-plugin-vlc_0.8.6-svn20061012.debian-5.1+etch2_arm.deb stable/main/binary-arm/vlc-nox_0.8.6-svn20061012.debian-5.1+etch2_arm.deb stable/main/binary-arm/vlc-plugin-arts_0.8.6-svn20061012.debian-5.1+etch2_arm.deb stable/main/binary-arm/vlc-plugin-sdl_0.8.6-svn20061012.debian-5.1+etch2_arm.deb stable/main/binary-arm/vlc-plugin-esd_0.8.6-svn20061012.debian-5.1+etch2_arm.deb stable/main/binary-arm/libvlc0_0.8.6-svn20061012.debian-5.1+etch2_arm.deb vlc (0.8.6-svn20061012.debian-5.1+etch2) stable-security; urgency=high * Non-maintainer upload by the security team * sec-subtitle_buffer_overflow.diff: + CVE-2007-6681: Stack buffer overflow in subtitle demuxer * sec-httpd_formatstring.diff: + CVE-2007-6682: Format string vulnerability in HTTP streaming * sec-backported-CVE-2007-6683.patch: + CVE-2007-6683: Arbitrary file overwrite vulnerability in browser plugin * sec-CVE-2008-0296_CVE-2008-0295.diff: + CVE-2008-0295: Heap buffer overflow in RTSP session description protocol (SDP) handlers + CVE-2008-0296: Heap buffer overflow in RTSP stream handling * sec-backported-CVE-2008-0073.patch: + CVE-2008-0073: Array index error in RTSP session description protocol metadata handling * sec-CVE-2008-0984.diff: + CVE-2008-0984: Inadequate integer bounds checking enables memory scribble and arbitrary code execution stable/main/binary-alpha/vlc-plugin-sdl_0.8.6-svn20061012.debian-5.1+etch2_alpha.deb stable/main/binary-alpha/vlc-plugin-arts_0.8.6-svn20061012.debian-5.1+etch2_alpha.deb stable/main/binary-alpha/libvlc0-dev_0.8.6-svn20061012.debian-5.1+etch2_alpha.deb stable/main/binary-alpha/mozilla-plugin-vlc_0.8.6-svn20061012.debian-5.1+etch2_alpha.deb stable/main/binary-alpha/vlc-nox_0.8.6-svn20061012.debian-5.1+etch2_alpha.deb stable/main/binary-alpha/vlc-plugin-esd_0.8.6-svn20061012.debian-5.1+etch2_alpha.deb stable/main/binary-alpha/libvlc0_0.8.6-svn20061012.debian-5.1+etch2_alpha.deb stable/main/binary-alpha/vlc_0.8.6-svn20061012.debian-5.1+etch2_alpha.deb stable/main/binary-alpha/vlc-plugin-ggi_0.8.6-svn20061012.debian-5.1+etch2_alpha.deb vlc (0.8.6-svn20061012.debian-5.1+etch2) stable-security; urgency=high * Non-maintainer upload by the security team * sec-subtitle_buffer_overflow.diff: + CVE-2007-6681: Stack buffer overflow in subtitle demuxer * sec-httpd_formatstring.diff: + CVE-2007-6682: Format string vulnerability in HTTP streaming * sec-backported-CVE-2007-6683.patch: + CVE-2007-6683: Arbitrary file overwrite vulnerability in browser plugin * sec-CVE-2008-0296_CVE-2008-0295.diff: + CVE-2008-0295: Heap buffer overflow in RTSP session description protocol (SDP) handlers + CVE-2008-0296: Heap buffer overflow in RTSP stream handling * sec-backported-CVE-2008-0073.patch: + CVE-2008-0073: Array index error in RTSP session description protocol metadata handling * sec-CVE-2008-0984.diff: + CVE-2008-0984: Inadequate integer bounds checking enables memory scribble and arbitrary code execution stable/main/binary-amd64/vlc-plugin-arts_0.8.6-svn20061012.debian-5.1+etch2_amd64.deb stable/main/source/vlc_0.8.6-svn20061012.debian-5.1+etch2.dsc stable/main/binary-all/vlc-plugin-alsa_0.8.6-svn20061012.debian-5.1+etch2_all.deb stable/main/binary-amd64/vlc_0.8.6-svn20061012.debian-5.1+etch2_amd64.deb stable/main/binary-amd64/libvlc0-dev_0.8.6-svn20061012.debian-5.1+etch2_amd64.deb stable/main/binary-amd64/vlc-nox_0.8.6-svn20061012.debian-5.1+etch2_amd64.deb stable/main/binary-amd64/vlc-plugin-esd_0.8.6-svn20061012.debian-5.1+etch2_amd64.deb stable/main/binary-amd64/libvlc0_0.8.6-svn20061012.debian-5.1+etch2_amd64.deb stable/main/binary-amd64/mozilla-plugin-vlc_0.8.6-svn20061012.debian-5.1+etch2_amd64.deb stable/main/binary-amd64/vlc-plugin-sdl_0.8.6-svn20061012.debian-5.1+etch2_amd64.deb stable/main/source/vlc_0.8.6-svn20061012.debian-5.1+etch2.diff.gz stable/main/binary-amd64/vlc-plugin-ggi_0.8.6-svn20061012.debian-5.1+etch2_amd64.deb stable/main/binary-all/wxvlc_0.8.6-svn20061012.debian-5.1+etch2_all.deb vlc (0.8.6-svn20061012.debian-5.1+etch2) stable-security; urgency=high * Non-maintainer upload by the security team * sec-subtitle_buffer_overflow.diff: + CVE-2007-6681: Stack buffer overflow in subtitle demuxer * sec-httpd_formatstring.diff: + CVE-2007-6682: Format string vulnerability in HTTP streaming * sec-backported-CVE-2007-6683.patch: + CVE-2007-6683: Arbitrary file overwrite vulnerability in browser plugin * sec-CVE-2008-0296_CVE-2008-0295.diff: + CVE-2008-0295: Heap buffer overflow in RTSP session description protocol (SDP) handlers + CVE-2008-0296: Heap buffer overflow in RTSP stream handling * sec-backported-CVE-2008-0073.patch: + CVE-2008-0073: Array index error in RTSP session description protocol metadata handling * sec-CVE-2008-0984.diff: + CVE-2008-0984: Inadequate integer bounds checking enables memory scribble and arbitrary code execution stable/main/source/user-mode-linux_2.6.18-1um-2etch.21.dsc stable/main/binary-i386/user-mode-linux_2.6.18-1um-2etch.21_i386.deb stable/main/source/user-mode-linux_2.6.18-1um-2etch.21.diff.gz user-mode-linux (2.6.18-1um-2etch.21) stable; urgency=high * Rebuild against linux-source-2.6.18_2.6.18.dfsg.1-21 stable/main/binary-sparc/unzip_5.52-9etch1_sparc.deb unzip (5.52-9etch1) stable-security; urgency=high * Apply patch from Tavis Ormandy to address invalid free() calls in the inflate_dynamic() function (CVE-2008-0888). stable/main/binary-s390/unzip_5.52-9etch1_s390.deb unzip (5.52-9etch1) stable-security; urgency=high * Apply patch from Tavis Ormandy to address invalid free() calls in the inflate_dynamic() function (CVE-2008-0888). stable/main/binary-powerpc/unzip_5.52-9etch1_powerpc.deb unzip (5.52-9etch1) stable-security; urgency=high * Apply patch from Tavis Ormandy to address invalid free() calls in the inflate_dynamic() function (CVE-2008-0888). stable/main/binary-mipsel/unzip_5.52-9etch1_mipsel.deb unzip (5.52-9etch1) stable-security; urgency=high * Apply patch from Tavis Ormandy to address invalid free() calls in the inflate_dynamic() function (CVE-2008-0888). stable/main/binary-mips/unzip_5.52-9etch1_mips.deb unzip (5.52-9etch1) stable-security; urgency=high * Apply patch from Tavis Ormandy to address invalid free() calls in the inflate_dynamic() function (CVE-2008-0888). stable/main/binary-ia64/unzip_5.52-9etch1_ia64.deb unzip (5.52-9etch1) stable-security; urgency=high * Apply patch from Tavis Ormandy to address invalid free() calls in the inflate_dynamic() function (CVE-2008-0888). stable/main/binary-i386/unzip_5.52-9etch1_i386.deb unzip (5.52-9etch1) stable-security; urgency=high * Apply patch from Tavis Ormandy to address invalid free() calls in the inflate_dynamic() function (CVE-2008-0888). stable/main/binary-hppa/unzip_5.52-9etch1_hppa.deb unzip (5.52-9etch1) stable-security; urgency=high * Apply patch from Tavis Ormandy to address invalid free() calls in the inflate_dynamic() function (CVE-2008-0888). stable/main/binary-arm/unzip_5.52-9etch1_arm.deb unzip (5.52-9etch1) stable-security; urgency=high * Apply patch from Tavis Ormandy to address invalid free() calls in the inflate_dynamic() function (CVE-2008-0888). stable/main/binary-alpha/unzip_5.52-9etch1_alpha.deb unzip (5.52-9etch1) stable-security; urgency=high * Apply patch from Tavis Ormandy to address invalid free() calls in the inflate_dynamic() function (CVE-2008-0888). stable/main/source/unzip_5.52-9etch1.dsc stable/main/binary-amd64/unzip_5.52-9etch1_amd64.deb stable/main/source/unzip_5.52-9etch1.diff.gz unzip (5.52-9etch1) stable-security; urgency=high * Apply patch from Tavis Ormandy to address invalid free() calls in the inflate_dynamic() function (CVE-2008-0888). stable/main/source/tzdata_2007k.orig.tar.gz stable/main/source/tzdata_2007k-1etch1.dsc stable/main/binary-all/tzdata_2007k-1etch1_all.deb stable/main/source/tzdata_2007k-1etch1.diff.gz tzdata (2007k-1etch1) stable; urgency=low * New upstream release. - Drop Argentina patch (fixed upstream in a different way). * Add a Provides: tzdata-etch. * debian/patches/chile_2008.diff: add Chile DST rule for 2008. closes: #469194. stable/main/source/typo3-src_4.0.2+debian-5.diff.gz stable/main/binary-all/typo3_4.0.2+debian-5_all.deb stable/main/source/typo3-src_4.0.2+debian-5.dsc stable/main/binary-all/typo3-src-4.0_4.0.2+debian-5_all.deb typo3-src (4.0.2+debian-5) stable-security; urgency=high * Fixed security problem "Multiple vulnerabilities in TYPO3 Core" (TYPO3-20080611-1) with patch taken from 4.0.9. (Closes: #485814) stable/main/source/turba2_2.1.3-1etch1.diff.gz stable/main/source/turba2_2.1.3-1etch1.dsc stable/main/binary-all/turba2_2.1.3-1etch1_all.deb turba2 (2.1.3-1etch1) stable-security; urgency=high * Fix unchecked access to contacts in the same SQL table, if the unique key of another user's contact can be guessed. See CVE-2008-0807 for more informations. (Closes: #464058) * Fix privilege escalation in the Horde API. stable/main/source/trac_0.10.3-1etch3.dsc stable/main/source/trac_0.10.3-1etch3.diff.gz stable/main/binary-all/trac_0.10.3-1etch3_all.deb trac (0.10.3-1etch3) stable; urgency=low * Fix contrib/sourceforge2trac to work with Trac 0.10.3. Closes: #444052 * Fix redirection to https after posting. Closes: #438685 stable/main/source/tomcat5.5_5.5.20-2etch3.dsc stable/main/binary-all/libtomcat5.5-java_5.5.20-2etch3_all.deb stable/main/binary-all/tomcat5.5_5.5.20-2etch3_all.deb stable/main/binary-all/tomcat5.5-admin_5.5.20-2etch3_all.deb stable/main/source/tomcat5.5_5.5.20-2etch3.diff.gz stable/main/binary-all/tomcat5.5-webapps_5.5.20-2etch3_all.deb tomcat5.5 (5.5.20-2etch3) stable-security; urgency=high * CVE-2008-1947: Fix XSS issue in host-manager web application. Closes: #484643 stable/main/binary-sparc/sysvinit-utils_2.86.ds1-38+etchnhalf.1_sparc.deb stable/main/binary-sparc/initscripts_2.86.ds1-38+etchnhalf.1_sparc.deb stable/main/binary-sparc/sysvinit_2.86.ds1-38+etchnhalf.1_sparc.deb sysvinit (2.86.ds1-38+etchnhalf.1) stable; urgency=low * Include patch from Werner Fink at SuSe to handle each disk individually and automatically instead of guessing in the init.d script how to handle them collectively (Closes: #426224). stable/main/binary-s390/sysvinit-utils_2.86.ds1-38+etchnhalf.1_s390.deb stable/main/binary-s390/sysvinit_2.86.ds1-38+etchnhalf.1_s390.deb stable/main/binary-s390/initscripts_2.86.ds1-38+etchnhalf.1_s390.deb sysvinit (2.86.ds1-38+etchnhalf.1) stable; urgency=low * Include patch from Werner Fink at SuSe to handle each disk individually and automatically instead of guessing in the init.d script how to handle them collectively (Closes: #426224). stable/main/binary-powerpc/sysvinit-utils_2.86.ds1-38+etchnhalf.1_powerpc.deb stable/main/binary-powerpc/sysvinit_2.86.ds1-38+etchnhalf.1_powerpc.deb stable/main/binary-powerpc/initscripts_2.86.ds1-38+etchnhalf.1_powerpc.deb sysvinit (2.86.ds1-38+etchnhalf.1) stable; urgency=low * Include patch from Werner Fink at SuSe to handle each disk individually and automatically instead of guessing in the init.d script how to handle them collectively (Closes: #426224). stable/main/binary-mipsel/sysvinit_2.86.ds1-38+etchnhalf.1_mipsel.deb stable/main/binary-mipsel/sysvinit-utils_2.86.ds1-38+etchnhalf.1_mipsel.deb stable/main/binary-mipsel/initscripts_2.86.ds1-38+etchnhalf.1_mipsel.deb sysvinit (2.86.ds1-38+etchnhalf.1) stable; urgency=low * Include patch from Werner Fink at SuSe to handle each disk individually and automatically instead of guessing in the init.d script how to handle them collectively (Closes: #426224). stable/main/binary-mips/sysvinit-utils_2.86.ds1-38+etchnhalf.1_mips.deb stable/main/binary-mips/sysvinit_2.86.ds1-38+etchnhalf.1_mips.deb stable/main/binary-mips/initscripts_2.86.ds1-38+etchnhalf.1_mips.deb sysvinit (2.86.ds1-38+etchnhalf.1) stable; urgency=low * Include patch from Werner Fink at SuSe to handle each disk individually and automatically instead of guessing in the init.d script how to handle them collectively (Closes: #426224). stable/main/binary-i386/initscripts_2.86.ds1-38+etchnhalf.1_i386.deb stable/main/binary-i386/sysvinit_2.86.ds1-38+etchnhalf.1_i386.deb stable/main/binary-i386/sysvinit-utils_2.86.ds1-38+etchnhalf.1_i386.deb sysvinit (2.86.ds1-38+etchnhalf.1) stable; urgency=low * Include patch from Werner Fink at SuSe to handle each disk individually and automatically instead of guessing in the init.d script how to handle them collectively (Closes: #426224). stable/main/binary-hppa/initscripts_2.86.ds1-38+etchnhalf.1_hppa.deb stable/main/binary-hppa/sysvinit-utils_2.86.ds1-38+etchnhalf.1_hppa.deb stable/main/binary-hppa/sysvinit_2.86.ds1-38+etchnhalf.1_hppa.deb sysvinit (2.86.ds1-38+etchnhalf.1) stable; urgency=low * Include patch from Werner Fink at SuSe to handle each disk individually and automatically instead of guessing in the init.d script how to handle them collectively (Closes: #426224). stable/main/binary-arm/initscripts_2.86.ds1-38+etchnhalf.1_arm.deb stable/main/binary-arm/sysvinit_2.86.ds1-38+etchnhalf.1_arm.deb stable/main/binary-arm/sysvinit-utils_2.86.ds1-38+etchnhalf.1_arm.deb sysvinit (2.86.ds1-38+etchnhalf.1) stable; urgency=low * Include patch from Werner Fink at SuSe to handle each disk individually and automatically instead of guessing in the init.d script how to handle them collectively (Closes: #426224). stable/main/binary-amd64/sysvinit-utils_2.86.ds1-38+etchnhalf.1_amd64.deb stable/main/binary-amd64/sysvinit_2.86.ds1-38+etchnhalf.1_amd64.deb stable/main/binary-amd64/initscripts_2.86.ds1-38+etchnhalf.1_amd64.deb sysvinit (2.86.ds1-38+etchnhalf.1) stable; urgency=low * Include patch from Werner Fink at SuSe to handle each disk individually and automatically instead of guessing in the init.d script how to handle them collectively (Closes: #426224). stable/main/binary-alpha/sysvinit_2.86.ds1-38+etchnhalf.1_alpha.deb stable/main/binary-alpha/initscripts_2.86.ds1-38+etchnhalf.1_alpha.deb stable/main/binary-alpha/sysvinit-utils_2.86.ds1-38+etchnhalf.1_alpha.deb sysvinit (2.86.ds1-38+etchnhalf.1) stable; urgency=low * Include patch from Werner Fink at SuSe to handle each disk individually and automatically instead of guessing in the init.d script how to handle them collectively (Closes: #426224). stable/main/binary-ia64/initscripts_2.86.ds1-38+etchnhalf.1_ia64.deb stable/main/source/sysvinit_2.86.ds1-38+etchnhalf.1.diff.gz stable/main/source/sysvinit_2.86.ds1-38+etchnhalf.1.dsc stable/main/binary-ia64/sysvinit-utils_2.86.ds1-38+etchnhalf.1_ia64.deb stable/main/binary-ia64/sysvinit_2.86.ds1-38+etchnhalf.1_ia64.deb stable/main/binary-all/sysv-rc_2.86.ds1-38+etchnhalf.1_all.deb sysvinit (2.86.ds1-38+etchnhalf.1) stable; urgency=low * Include patch from Werner Fink at SuSe to handle each disk individually and automatically instead of guessing in the init.d script how to handle them collectively (Closes: #426224). stable/main/binary-sparc/sympa_5.2.3-1.2+etch1_sparc.deb sympa (5.2.3-1.2+etch1) stable-security; urgency=high * Non-maintainer upload by the Security Team. * Fix possible denial of service attack triggered via a malformed email header (CVE-2008-1648; Closes: #475163). stable/main/binary-s390/sympa_5.2.3-1.2+etch1_s390.deb sympa (5.2.3-1.2+etch1) stable-security; urgency=high * Non-maintainer upload by the Security Team. * Fix possible denial of service attack triggered via a malformed email header (CVE-2008-1648; Closes: #475163). stable/main/binary-powerpc/sympa_5.2.3-1.2+etch1_powerpc.deb sympa (5.2.3-1.2+etch1) stable-security; urgency=high * Non-maintainer upload by the Security Team. * Fix possible denial of service attack triggered via a malformed email header (CVE-2008-1648; Closes: #475163). stable/main/binary-mipsel/sympa_5.2.3-1.2+etch1_mipsel.deb sympa (5.2.3-1.2+etch1) stable-security; urgency=high * Non-maintainer upload by the Security Team. * Fix possible denial of service attack triggered via a malformed email header (CVE-2008-1648; Closes: #475163). stable/main/binary-mips/sympa_5.2.3-1.2+etch1_mips.deb sympa (5.2.3-1.2+etch1) stable-security; urgency=high * Non-maintainer upload by the Security Team. * Fix possible denial of service attack triggered via a malformed email header (CVE-2008-1648; Closes: #475163). stable/main/binary-ia64/sympa_5.2.3-1.2+etch1_ia64.deb sympa (5.2.3-1.2+etch1) stable-security; urgency=high * Non-maintainer upload by the Security Team. * Fix possible denial of service attack triggered via a malformed email header (CVE-2008-1648; Closes: #475163). stable/main/binary-i386/sympa_5.2.3-1.2+etch1_i386.deb sympa (5.2.3-1.2+etch1) stable-security; urgency=high * Non-maintainer upload by the Security Team. * Fix possible denial of service attack triggered via a malformed email header (CVE-2008-1648; Closes: #475163). stable/main/binary-hppa/sympa_5.2.3-1.2+etch1_hppa.deb sympa (5.2.3-1.2+etch1) stable-security; urgency=high * Non-maintainer upload by the Security Team. * Fix possible denial of service attack triggered via a malformed email header (CVE-2008-1648; Closes: #475163). stable/main/binary-arm/sympa_5.2.3-1.2+etch1_arm.deb sympa (5.2.3-1.2+etch1) stable-security; urgency=high * Non-maintainer upload by the Security Team. * Fix possible denial of service attack triggered via a malformed email header (CVE-2008-1648; Closes: #475163). stable/main/binary-alpha/sympa_5.2.3-1.2+etch1_alpha.deb sympa (5.2.3-1.2+etch1) stable-security; urgency=high * Non-maintainer upload by the Security Team. * Fix possible denial of service attack triggered via a malformed email header (CVE-2008-1648; Closes: #475163). stable/main/source/sympa_5.2.3-1.2+etch1.dsc stable/main/source/sympa_5.2.3-1.2+etch1.diff.gz stable/main/binary-amd64/sympa_5.2.3-1.2+etch1_amd64.deb sympa (5.2.3-1.2+etch1) stable-security; urgency=high * Non-maintainer upload by the Security Team. * Fix possible denial of service attack triggered via a malformed email header (CVE-2008-1648; Closes: #475163). stable/main/binary-sparc/libsword-dev_1.5.9-2etch1_sparc.deb stable/main/binary-sparc/libsword6_1.5.9-2etch1_sparc.deb stable/main/binary-sparc/diatheke_1.5.9-2etch1_sparc.deb sword (1.5.9-2etch1) stable-security; urgency=high * Non-maintainer upload by the security team. * Fix remote command execution in diatheke.pl (Closes: #466449) with maintainer-supplied patch. stable/main/binary-s390/libsword6_1.5.9-2etch1_s390.deb stable/main/binary-s390/libsword-dev_1.5.9-2etch1_s390.deb stable/main/binary-s390/diatheke_1.5.9-2etch1_s390.deb sword (1.5.9-2etch1) stable-security; urgency=high * Non-maintainer upload by the security team. * Fix remote command execution in diatheke.pl (Closes: #466449) with maintainer-supplied patch. stable/main/binary-powerpc/diatheke_1.5.9-2etch1_powerpc.deb stable/main/binary-powerpc/libsword-dev_1.5.9-2etch1_powerpc.deb stable/main/binary-powerpc/libsword6_1.5.9-2etch1_powerpc.deb sword (1.5.9-2etch1) stable-security; urgency=high * Non-maintainer upload by the security team. * Fix remote command execution in diatheke.pl (Closes: #466449) with maintainer-supplied patch. stable/main/binary-mipsel/libsword-dev_1.5.9-2etch1_mipsel.deb stable/main/binary-mipsel/libsword6_1.5.9-2etch1_mipsel.deb stable/main/binary-mipsel/diatheke_1.5.9-2etch1_mipsel.deb sword (1.5.9-2etch1) stable-security; urgency=high * Non-maintainer upload by the security team. * Fix remote command execution in diatheke.pl (Closes: #466449) with maintainer-supplied patch. stable/main/binary-mips/libsword6_1.5.9-2etch1_mips.deb stable/main/binary-mips/libsword-dev_1.5.9-2etch1_mips.deb stable/main/binary-mips/diatheke_1.5.9-2etch1_mips.deb sword (1.5.9-2etch1) stable-security; urgency=high * Non-maintainer upload by the security team. * Fix remote command execution in diatheke.pl (Closes: #466449) with maintainer-supplied patch. stable/main/binary-ia64/diatheke_1.5.9-2etch1_ia64.deb stable/main/binary-ia64/libsword-dev_1.5.9-2etch1_ia64.deb stable/main/binary-ia64/libsword6_1.5.9-2etch1_ia64.deb sword (1.5.9-2etch1) stable-security; urgency=high * Non-maintainer upload by the security team. * Fix remote command execution in diatheke.pl (Closes: #466449) with maintainer-supplied patch. stable/main/binary-hppa/libsword6_1.5.9-2etch1_hppa.deb stable/main/binary-hppa/libsword-dev_1.5.9-2etch1_hppa.deb stable/main/binary-hppa/diatheke_1.5.9-2etch1_hppa.deb sword (1.5.9-2etch1) stable-security; urgency=high * Non-maintainer upload by the security team. * Fix remote command execution in diatheke.pl (Closes: #466449) with maintainer-supplied patch. stable/main/binary-arm/libsword6_1.5.9-2etch1_arm.deb stable/main/binary-arm/libsword-dev_1.5.9-2etch1_arm.deb stable/main/binary-arm/diatheke_1.5.9-2etch1_arm.deb sword (1.5.9-2etch1) stable-security; urgency=high * Non-maintainer upload by the security team. * Fix remote command execution in diatheke.pl (Closes: #466449) with maintainer-supplied patch. stable/main/binary-amd64/libsword6_1.5.9-2etch1_amd64.deb stable/main/binary-amd64/libsword-dev_1.5.9-2etch1_amd64.deb stable/main/binary-amd64/diatheke_1.5.9-2etch1_amd64.deb sword (1.5.9-2etch1) stable-security; urgency=high * Non-maintainer upload by the security team. * Fix remote command execution in diatheke.pl (Closes: #466449) with maintainer-supplied patch. stable/main/binary-alpha/diatheke_1.5.9-2etch1_alpha.deb stable/main/binary-alpha/libsword-dev_1.5.9-2etch1_alpha.deb stable/main/binary-alpha/libsword6_1.5.9-2etch1_alpha.deb sword (1.5.9-2etch1) stable-security; urgency=high * Non-maintainer upload by the security team. * Fix remote command execution in diatheke.pl (Closes: #466449) with maintainer-supplied patch. stable/main/source/sword_1.5.9-2etch1.diff.gz stable/main/binary-i386/diatheke_1.5.9-2etch1_i386.deb stable/main/source/sword_1.5.9-2etch1.dsc stable/main/binary-i386/libsword-dev_1.5.9-2etch1_i386.deb stable/main/binary-i386/libsword6_1.5.9-2etch1_i386.deb sword (1.5.9-2etch1) stable-security; urgency=high * Non-maintainer upload by the security team. * Fix remote command execution in diatheke.pl (Closes: #466449) with maintainer-supplied patch. stable/main/binary-sparc/libapache2-mod-suphp_0.6.2-1+etch0_sparc.deb stable/main/binary-sparc/libapache-mod-suphp_0.6.2-1+etch0_sparc.deb stable/main/binary-sparc/suphp-common_0.6.2-1+etch0_sparc.deb suphp (0.6.2-1+etch0) stable-security; urgency=high * The following security issue is addressed with this update: - CVE-2008-1614: allows local users to gain privileges via a race condition in symlinks handling stable/main/binary-s390/suphp-common_0.6.2-1+etch0_s390.deb stable/main/binary-s390/libapache-mod-suphp_0.6.2-1+etch0_s390.deb stable/main/binary-s390/libapache2-mod-suphp_0.6.2-1+etch0_s390.deb suphp (0.6.2-1+etch0) stable-security; urgency=high * The following security issue is addressed with this update: - CVE-2008-1614: allows local users to gain privileges via a race condition in symlinks handling stable/main/binary-powerpc/libapache-mod-suphp_0.6.2-1+etch0_powerpc.deb stable/main/binary-powerpc/libapache2-mod-suphp_0.6.2-1+etch0_powerpc.deb stable/main/binary-powerpc/suphp-common_0.6.2-1+etch0_powerpc.deb suphp (0.6.2-1+etch0) stable-security; urgency=high * The following security issue is addressed with this update: - CVE-2008-1614: allows local users to gain privileges via a race condition in symlinks handling stable/main/binary-mipsel/suphp-common_0.6.2-1+etch0_mipsel.deb stable/main/binary-mipsel/libapache2-mod-suphp_0.6.2-1+etch0_mipsel.deb stable/main/binary-mipsel/libapache-mod-suphp_0.6.2-1+etch0_mipsel.deb suphp (0.6.2-1+etch0) stable-security; urgency=high * The following security issue is addressed with this update: - CVE-2008-1614: allows local users to gain privileges via a race condition in symlinks handling stable/main/binary-mips/suphp-common_0.6.2-1+etch0_mips.deb stable/main/binary-mips/libapache-mod-suphp_0.6.2-1+etch0_mips.deb stable/main/binary-mips/libapache2-mod-suphp_0.6.2-1+etch0_mips.deb suphp (0.6.2-1+etch0) stable-security; urgency=high * The following security issue is addressed with this update: - CVE-2008-1614: allows local users to gain privileges via a race condition in symlinks handling stable/main/binary-ia64/libapache2-mod-suphp_0.6.2-1+etch0_ia64.deb stable/main/binary-ia64/libapache-mod-suphp_0.6.2-1+etch0_ia64.deb stable/main/binary-ia64/suphp-common_0.6.2-1+etch0_ia64.deb suphp (0.6.2-1+etch0) stable-security; urgency=high * The following security issue is addressed with this update: - CVE-2008-1614: allows local users to gain privileges via a race condition in symlinks handling stable/main/binary-hppa/suphp-common_0.6.2-1+etch0_hppa.deb stable/main/binary-hppa/libapache-mod-suphp_0.6.2-1+etch0_hppa.deb stable/main/binary-hppa/libapache2-mod-suphp_0.6.2-1+etch0_hppa.deb suphp (0.6.2-1+etch0) stable-security; urgency=high * The following security issue is addressed with this update: - CVE-2008-1614: allows local users to gain privileges via a race condition in symlinks handling stable/main/binary-arm/suphp-common_0.6.2-1+etch0_arm.deb stable/main/binary-arm/libapache2-mod-suphp_0.6.2-1+etch0_arm.deb stable/main/binary-arm/libapache-mod-suphp_0.6.2-1+etch0_arm.deb suphp (0.6.2-1+etch0) stable-security; urgency=high * The following security issue is addressed with this update: - CVE-2008-1614: allows local users to gain privileges via a race condition in symlinks handling stable/main/binary-amd64/libapache-mod-suphp_0.6.2-1+etch0_amd64.deb stable/main/binary-amd64/suphp-common_0.6.2-1+etch0_amd64.deb stable/main/binary-amd64/libapache2-mod-suphp_0.6.2-1+etch0_amd64.deb suphp (0.6.2-1+etch0) stable-security; urgency=high * The following security issue is addressed with this update: - CVE-2008-1614: allows local users to gain privileges via a race condition in symlinks handling stable/main/binary-alpha/libapache-mod-suphp_0.6.2-1+etch0_alpha.deb stable/main/binary-alpha/suphp-common_0.6.2-1+etch0_alpha.deb stable/main/binary-alpha/libapache2-mod-suphp_0.6.2-1+etch0_alpha.deb suphp (0.6.2-1+etch0) stable-security; urgency=high * The following security issue is addressed with this update: - CVE-2008-1614: allows local users to gain privileges via a race condition in symlinks handling stable/main/binary-i386/suphp-common_0.6.2-1+etch0_i386.deb stable/main/source/suphp_0.6.2-1+etch0.diff.gz stable/main/binary-i386/libapache2-mod-suphp_0.6.2-1+etch0_i386.deb stable/main/binary-i386/libapache-mod-suphp_0.6.2-1+etch0_i386.deb stable/main/source/suphp_0.6.2-1+etch0.dsc suphp (0.6.2-1+etch0) stable-security; urgency=high * The following security issue is addressed with this update: - CVE-2008-1614: allows local users to gain privileges via a race condition in symlinks handling stable/main/binary-sparc/splitvt_1.6.5-9etch1_sparc.deb splitvt (1.6.5-9etch1) stable-security; urgency=high * Non-maintainer upload by The Security Team. * Ensure we drop privileges prior to running external commands. [CVE-2008-0162] stable/main/binary-s390/splitvt_1.6.5-9etch1_s390.deb splitvt (1.6.5-9etch1) stable-security; urgency=high * Non-maintainer upload by The Security Team. * Ensure we drop privileges prior to running external commands. [CVE-2008-0162] stable/main/binary-powerpc/splitvt_1.6.5-9etch1_powerpc.deb splitvt (1.6.5-9etch1) stable-security; urgency=high * Non-maintainer upload by The Security Team. * Ensure we drop privileges prior to running external commands. [CVE-2008-0162] stable/main/binary-mipsel/splitvt_1.6.5-9etch1_mipsel.deb splitvt (1.6.5-9etch1) stable-security; urgency=high * Non-maintainer upload by The Security Team. * Ensure we drop privileges prior to running external commands. [CVE-2008-0162] stable/main/binary-mips/splitvt_1.6.5-9etch1_mips.deb splitvt (1.6.5-9etch1) stable-security; urgency=high * Non-maintainer upload by The Security Team. * Ensure we drop privileges prior to running external commands. [CVE-2008-0162] stable/main/binary-ia64/splitvt_1.6.5-9etch1_ia64.deb splitvt (1.6.5-9etch1) stable-security; urgency=high * Non-maintainer upload by The Security Team. * Ensure we drop privileges prior to running external commands. [CVE-2008-0162] stable/main/binary-hppa/splitvt_1.6.5-9etch1_hppa.deb splitvt (1.6.5-9etch1) stable-security; urgency=high * Non-maintainer upload by The Security Team. * Ensure we drop privileges prior to running external commands. [CVE-2008-0162] stable/main/binary-arm/splitvt_1.6.5-9etch1_arm.deb splitvt (1.6.5-9etch1) stable-security; urgency=high * Non-maintainer upload by The Security Team. * Ensure we drop privileges prior to running external commands. [CVE-2008-0162] stable/main/binary-amd64/splitvt_1.6.5-9etch1_amd64.deb splitvt (1.6.5-9etch1) stable-security; urgency=high * Non-maintainer upload by The Security Team. * Ensure we drop privileges prior to running external commands. [CVE-2008-0162] stable/main/binary-alpha/splitvt_1.6.5-9etch1_alpha.deb splitvt (1.6.5-9etch1) stable-security; urgency=high * Non-maintainer upload by The Security Team. * Ensure we drop privileges prior to running external commands. [CVE-2008-0162] stable/main/binary-i386/splitvt_1.6.5-9etch1_i386.deb stable/main/source/splitvt_1.6.5-9etch1.dsc stable/main/source/splitvt_1.6.5-9etch1.diff.gz splitvt (1.6.5-9etch1) stable-security; urgency=high * Non-maintainer upload by The Security Team. * Ensure we drop privileges prior to running external commands. [CVE-2008-0162] stable/main/binary-sparc/libspeex-dev_1.1.12-3etch1_sparc.deb stable/main/binary-sparc/libspeex1_1.1.12-3etch1_sparc.deb stable/main/binary-sparc/speex_1.1.12-3etch1_sparc.deb speex (1.1.12-3etch1) stable-security; urgency=high * Non-maintainer upload by the security team * Fix arbitrary code execution due to insufficient boundary check on a header structure of a speex stream (Fixes: CVE-2008-1686) stable/main/binary-s390/libspeex-dev_1.1.12-3etch1_s390.deb stable/main/binary-s390/libspeex1_1.1.12-3etch1_s390.deb stable/main/binary-s390/speex_1.1.12-3etch1_s390.deb speex (1.1.12-3etch1) stable-security; urgency=high * Non-maintainer upload by the security team * Fix arbitrary code execution due to insufficient boundary check on a header structure of a speex stream (Fixes: CVE-2008-1686) stable/main/binary-powerpc/libspeex-dev_1.1.12-3etch1_powerpc.deb stable/main/binary-powerpc/libspeex1_1.1.12-3etch1_powerpc.deb stable/main/binary-powerpc/speex_1.1.12-3etch1_powerpc.deb speex (1.1.12-3etch1) stable-security; urgency=high * Non-maintainer upload by the security team * Fix arbitrary code execution due to insufficient boundary check on a header structure of a speex stream (Fixes: CVE-2008-1686) stable/main/binary-mipsel/speex_1.1.12-3etch1_mipsel.deb stable/main/binary-mipsel/libspeex-dev_1.1.12-3etch1_mipsel.deb stable/main/binary-mipsel/libspeex1_1.1.12-3etch1_mipsel.deb speex (1.1.12-3etch1) stable-security; urgency=high * Non-maintainer upload by the security team * Fix arbitrary code execution due to insufficient boundary check on a header structure of a speex stream (Fixes: CVE-2008-1686) stable/main/binary-mips/speex_1.1.12-3etch1_mips.deb stable/main/binary-mips/libspeex1_1.1.12-3etch1_mips.deb stable/main/binary-mips/libspeex-dev_1.1.12-3etch1_mips.deb speex (1.1.12-3etch1) stable-security; urgency=high * Non-maintainer upload by the security team * Fix arbitrary code execution due to insufficient boundary check on a header structure of a speex stream (Fixes: CVE-2008-1686) stable/main/binary-ia64/libspeex-dev_1.1.12-3etch1_ia64.deb stable/main/binary-ia64/speex_1.1.12-3etch1_ia64.deb stable/main/binary-ia64/libspeex1_1.1.12-3etch1_ia64.deb speex (1.1.12-3etch1) stable-security; urgency=high * Non-maintainer upload by the security team * Fix arbitrary code execution due to insufficient boundary check on a header structure of a speex stream (Fixes: CVE-2008-1686) stable/main/binary-hppa/libspeex1_1.1.12-3etch1_hppa.deb stable/main/binary-hppa/speex_1.1.12-3etch1_hppa.deb stable/main/binary-hppa/libspeex-dev_1.1.12-3etch1_hppa.deb speex (1.1.12-3etch1) stable-security; urgency=high * Non-maintainer upload by the security team * Fix arbitrary code execution due to insufficient boundary check on a header structure of a speex stream (Fixes: CVE-2008-1686) stable/main/binary-arm/speex_1.1.12-3etch1_arm.deb stable/main/binary-arm/libspeex1_1.1.12-3etch1_arm.deb stable/main/binary-arm/libspeex-dev_1.1.12-3etch1_arm.deb speex (1.1.12-3etch1) stable-security; urgency=high * Non-maintainer upload by the security team * Fix arbitrary code execution due to insufficient boundary check on a header structure of a speex stream (Fixes: CVE-2008-1686) stable/main/binary-amd64/libspeex1_1.1.12-3etch1_amd64.deb stable/main/binary-amd64/speex_1.1.12-3etch1_amd64.deb stable/main/binary-amd64/libspeex-dev_1.1.12-3etch1_amd64.deb speex (1.1.12-3etch1) stable-security; urgency=high * Non-maintainer upload by the security team * Fix arbitrary code execution due to insufficient boundary check on a header structure of a speex stream (Fixes: CVE-2008-1686) stable/main/binary-alpha/libspeex1_1.1.12-3etch1_alpha.deb stable/main/binary-alpha/speex_1.1.12-3etch1_alpha.deb stable/main/binary-alpha/libspeex-dev_1.1.12-3etch1_alpha.deb speex (1.1.12-3etch1) stable-security; urgency=high * Non-maintainer upload by the security team * Fix arbitrary code execution due to insufficient boundary check on a header structure of a speex stream (Fixes: CVE-2008-1686) stable/main/binary-all/speex-doc_1.1.12-3etch1_all.deb stable/main/source/speex_1.1.12-3etch1.diff.gz stable/main/binary-i386/libspeex-dev_1.1.12-3etch1_i386.deb stable/main/source/speex_1.1.12-3etch1.dsc stable/main/binary-i386/libspeex1_1.1.12-3etch1_i386.deb stable/main/binary-i386/speex_1.1.12-3etch1_i386.deb speex (1.1.12-3etch1) stable-security; urgency=high * Non-maintainer upload by the security team * Fix arbitrary code execution due to insufficient boundary check on a header structure of a speex stream (Fixes: CVE-2008-1686) stable/main/source/smarty_2.6.14-1etch1.dsc stable/main/binary-all/smarty_2.6.14-1etch1_all.deb stable/main/source/smarty_2.6.14-1etch1.diff.gz smarty (2.6.14-1etch1) stable-security; urgency=high * Non-maintainer upload by the security team. * A \0 character in a search string could be abused to call arbitrary PHP functions via templates. CVE-2008-1066, closes: #469492 stable/main/source/serendipity_1.0.4-1+etch1.diff.gz stable/main/binary-all/serendipity_1.0.4-1+etch1_all.deb stable/main/source/serendipity_1.0.4-1+etch1.dsc serendipity (1.0.4-1+etch1) stable-security; urgency=high * Upload to stable-security for security issues. * Fix CVE-2008-????: XSS in published trackbacks. * Fix CVE-2008-0124: XSS in user realnames. * Fix CVE-2007-6205: XSS in remoterss plugin. stable/main/binary-ia64/sear_0.6.1-1+b1_ia64.deb sear (0.6.1-1+b1) stable; urgency=low * Binary-only non-maintainer upload for ia64; no source changes. * Rebuild against lib3ds-dev 1.2.0-4.1+etch1, to propagate the fix for bug #399761 stable/main/binary-sparc/libsdl-image1.2-dev_1.2.5-2+etch1_sparc.deb stable/main/binary-sparc/libsdl-image1.2_1.2.5-2+etch1_sparc.deb sdl-image1.2 (1.2.5-2+etch1) stable-security; urgency=low * Rebuild with higher version number than binary NMU's, no other changes (closes: #465598). stable/main/binary-s390/libsdl-image1.2_1.2.5-2+etch1_s390.deb stable/main/binary-s390/libsdl-image1.2-dev_1.2.5-2+etch1_s390.deb sdl-image1.2 (1.2.5-2+etch1) stable-security; urgency=low * Rebuild with higher version number than binary NMU's, no other changes (closes: #465598). stable/main/binary-powerpc/libsdl-image1.2-dev_1.2.5-2+etch1_powerpc.deb stable/main/binary-powerpc/libsdl-image1.2_1.2.5-2+etch1_powerpc.deb sdl-image1.2 (1.2.5-2+etch1) stable-security; urgency=low * Rebuild with higher version number than binary NMU's, no other changes (closes: #465598). stable/main/binary-mipsel/libsdl-image1.2-dev_1.2.5-2+etch1_mipsel.deb stable/main/binary-mipsel/libsdl-image1.2_1.2.5-2+etch1_mipsel.deb sdl-image1.2 (1.2.5-2+etch1) stable-security; urgency=low * Rebuild with higher version number than binary NMU's, no other changes (closes: #465598). stable/main/binary-mips/libsdl-image1.2_1.2.5-2+etch1_mips.deb stable/main/binary-mips/libsdl-image1.2-dev_1.2.5-2+etch1_mips.deb sdl-image1.2 (1.2.5-2+etch1) stable-security; urgency=low * Rebuild with higher version number than binary NMU's, no other changes (closes: #465598). stable/main/binary-ia64/libsdl-image1.2_1.2.5-2+etch1_ia64.deb stable/main/binary-ia64/libsdl-image1.2-dev_1.2.5-2+etch1_ia64.deb sdl-image1.2 (1.2.5-2+etch1) stable-security; urgency=low * Rebuild with higher version number than binary NMU's, no other changes (closes: #465598). stable/main/binary-hppa/libsdl-image1.2-dev_1.2.5-2+etch1_hppa.deb stable/main/binary-hppa/libsdl-image1.2_1.2.5-2+etch1_hppa.deb sdl-image1.2 (1.2.5-2+etch1) stable-security; urgency=low * Rebuild with higher version number than binary NMU's, no other changes (closes: #465598). stable/main/binary-arm/libsdl-image1.2_1.2.5-2+etch1_arm.deb stable/main/binary-arm/libsdl-image1.2-dev_1.2.5-2+etch1_arm.deb sdl-image1.2 (1.2.5-2+etch1) stable-security; urgency=low * Rebuild with higher version number than binary NMU's, no other changes (closes: #465598). stable/main/binary-amd64/libsdl-image1.2-dev_1.2.5-2+etch1_amd64.deb stable/main/binary-amd64/libsdl-image1.2_1.2.5-2+etch1_amd64.deb sdl-image1.2 (1.2.5-2+etch1) stable-security; urgency=low * Rebuild with higher version number than binary NMU's, no other changes (closes: #465598). stable/main/binary-alpha/libsdl-image1.2_1.2.5-2+etch1_alpha.deb stable/main/binary-alpha/libsdl-image1.2-dev_1.2.5-2+etch1_alpha.deb sdl-image1.2 (1.2.5-2+etch1) stable-security; urgency=low * Rebuild with higher version number than binary NMU's, no other changes (closes: #465598). stable/main/source/sdl-image1.2_1.2.5-2+etch1.dsc stable/main/binary-i386/libsdl-image1.2-dev_1.2.5-2+etch1_i386.deb stable/main/source/sdl-image1.2_1.2.5-2+etch1.diff.gz stable/main/binary-i386/libsdl-image1.2_1.2.5-2+etch1_i386.deb sdl-image1.2 (1.2.5-2+etch1) stable-security; urgency=low * Rebuild with higher version number than binary NMU's, no other changes (closes: #465598). stable/main/binary-sparc/samba-common_3.0.24-6etch10_sparc.deb stable/main/binary-sparc/swat_3.0.24-6etch10_sparc.deb stable/main/binary-sparc/libsmbclient-dev_3.0.24-6etch10_sparc.deb stable/main/binary-sparc/samba-dbg_3.0.24-6etch10_sparc.deb stable/main/binary-sparc/python-samba_3.0.24-6etch10_sparc.deb stable/main/binary-sparc/libpam-smbpass_3.0.24-6etch10_sparc.deb stable/main/binary-sparc/smbfs_3.0.24-6etch10_sparc.deb stable/main/binary-sparc/libsmbclient_3.0.24-6etch10_sparc.deb stable/main/binary-sparc/smbclient_3.0.24-6etch10_sparc.deb stable/main/binary-sparc/winbind_3.0.24-6etch10_sparc.deb stable/main/binary-sparc/samba_3.0.24-6etch10_sparc.deb samba (3.0.24-6etch10) stable-security; urgency=high * debian/patches/security-CVE-2008-1105.patch: fix a heap overflow when parsing SMB responses in client code. (CVE-2008-1105) Closes: #483410 stable/main/binary-s390/libpam-smbpass_3.0.24-6etch10_s390.deb stable/main/binary-s390/python-samba_3.0.24-6etch10_s390.deb stable/main/binary-s390/libsmbclient-dev_3.0.24-6etch10_s390.deb stable/main/binary-s390/swat_3.0.24-6etch10_s390.deb stable/main/binary-s390/libsmbclient_3.0.24-6etch10_s390.deb stable/main/binary-s390/smbclient_3.0.24-6etch10_s390.deb stable/main/binary-s390/winbind_3.0.24-6etch10_s390.deb stable/main/binary-s390/samba_3.0.24-6etch10_s390.deb stable/main/binary-s390/samba-dbg_3.0.24-6etch10_s390.deb stable/main/binary-s390/smbfs_3.0.24-6etch10_s390.deb stable/main/binary-s390/samba-common_3.0.24-6etch10_s390.deb samba (3.0.24-6etch10) stable-security; urgency=high * debian/patches/security-CVE-2008-1105.patch: fix a heap overflow when parsing SMB responses in client code. (CVE-2008-1105) Closes: #483410 stable/main/binary-powerpc/samba_3.0.24-6etch10_powerpc.deb stable/main/binary-powerpc/libpam-smbpass_3.0.24-6etch10_powerpc.deb stable/main/binary-powerpc/libsmbclient_3.0.24-6etch10_powerpc.deb stable/main/binary-powerpc/smbclient_3.0.24-6etch10_powerpc.deb stable/main/binary-powerpc/libsmbclient-dev_3.0.24-6etch10_powerpc.deb stable/main/binary-powerpc/python-samba_3.0.24-6etch10_powerpc.deb stable/main/binary-powerpc/winbind_3.0.24-6etch10_powerpc.deb stable/main/binary-powerpc/samba-dbg_3.0.24-6etch10_powerpc.deb stable/main/binary-powerpc/samba-common_3.0.24-6etch10_powerpc.deb stable/main/binary-powerpc/swat_3.0.24-6etch10_powerpc.deb stable/main/binary-powerpc/smbfs_3.0.24-6etch10_powerpc.deb samba (3.0.24-6etch10) stable-security; urgency=high * debian/patches/security-CVE-2008-1105.patch: fix a heap overflow when parsing SMB responses in client code. (CVE-2008-1105) Closes: #483410 stable/main/binary-mipsel/python-samba_3.0.24-6etch10_mipsel.deb stable/main/binary-mipsel/samba-dbg_3.0.24-6etch10_mipsel.deb stable/main/binary-mipsel/libsmbclient-dev_3.0.24-6etch10_mipsel.deb stable/main/binary-mipsel/libsmbclient_3.0.24-6etch10_mipsel.deb stable/main/binary-mipsel/libpam-smbpass_3.0.24-6etch10_mipsel.deb stable/main/binary-mipsel/smbclient_3.0.24-6etch10_mipsel.deb stable/main/binary-mipsel/winbind_3.0.24-6etch10_mipsel.deb stable/main/binary-mipsel/samba_3.0.24-6etch10_mipsel.deb stable/main/binary-mipsel/smbfs_3.0.24-6etch10_mipsel.deb stable/main/binary-mipsel/samba-common_3.0.24-6etch10_mipsel.deb stable/main/binary-mipsel/swat_3.0.24-6etch10_mipsel.deb samba (3.0.24-6etch10) stable-security; urgency=high * debian/patches/security-CVE-2008-1105.patch: fix a heap overflow when parsing SMB responses in client code. (CVE-2008-1105) Closes: #483410 stable/main/binary-mips/swat_3.0.24-6etch10_mips.deb stable/main/binary-mips/libpam-smbpass_3.0.24-6etch10_mips.deb stable/main/binary-mips/python-samba_3.0.24-6etch10_mips.deb stable/main/binary-mips/samba_3.0.24-6etch10_mips.deb stable/main/binary-mips/libsmbclient_3.0.24-6etch10_mips.deb stable/main/binary-mips/libsmbclient-dev_3.0.24-6etch10_mips.deb stable/main/binary-mips/samba-dbg_3.0.24-6etch10_mips.deb stable/main/binary-mips/smbfs_3.0.24-6etch10_mips.deb stable/main/binary-mips/samba-common_3.0.24-6etch10_mips.deb stable/main/binary-mips/winbind_3.0.24-6etch10_mips.deb stable/main/binary-mips/smbclient_3.0.24-6etch10_mips.deb samba (3.0.24-6etch10) stable-security; urgency=high * debian/patches/security-CVE-2008-1105.patch: fix a heap overflow when parsing SMB responses in client code. (CVE-2008-1105) Closes: #483410 stable/main/binary-ia64/swat_3.0.24-6etch10_ia64.deb stable/main/binary-ia64/samba-common_3.0.24-6etch10_ia64.deb stable/main/binary-ia64/samba_3.0.24-6etch10_ia64.deb stable/main/binary-ia64/libsmbclient_3.0.24-6etch10_ia64.deb stable/main/binary-ia64/libpam-smbpass_3.0.24-6etch10_ia64.deb stable/main/binary-ia64/python-samba_3.0.24-6etch10_ia64.deb stable/main/binary-ia64/winbind_3.0.24-6etch10_ia64.deb stable/main/binary-ia64/smbfs_3.0.24-6etch10_ia64.deb stable/main/binary-ia64/libsmbclient-dev_3.0.24-6etch10_ia64.deb stable/main/binary-ia64/samba-dbg_3.0.24-6etch10_ia64.deb stable/main/binary-ia64/smbclient_3.0.24-6etch10_ia64.deb samba (3.0.24-6etch10) stable-security; urgency=high * debian/patches/security-CVE-2008-1105.patch: fix a heap overflow when parsing SMB responses in client code. (CVE-2008-1105) Closes: #483410 stable/main/binary-hppa/smbfs_3.0.24-6etch10_hppa.deb stable/main/binary-hppa/libsmbclient_3.0.24-6etch10_hppa.deb stable/main/binary-hppa/swat_3.0.24-6etch10_hppa.deb stable/main/binary-hppa/libsmbclient-dev_3.0.24-6etch10_hppa.deb stable/main/binary-hppa/libpam-smbpass_3.0.24-6etch10_hppa.deb stable/main/binary-hppa/samba-common_3.0.24-6etch10_hppa.deb stable/main/binary-hppa/python-samba_3.0.24-6etch10_hppa.deb stable/main/binary-hppa/samba-dbg_3.0.24-6etch10_hppa.deb stable/main/binary-hppa/winbind_3.0.24-6etch10_hppa.deb stable/main/binary-hppa/smbclient_3.0.24-6etch10_hppa.deb stable/main/binary-hppa/samba_3.0.24-6etch10_hppa.deb samba (3.0.24-6etch10) stable-security; urgency=high * debian/patches/security-CVE-2008-1105.patch: fix a heap overflow when parsing SMB responses in client code. (CVE-2008-1105) Closes: #483410 stable/main/binary-arm/libsmbclient-dev_3.0.24-6etch10_arm.deb stable/main/binary-arm/smbfs_3.0.24-6etch10_arm.deb stable/main/binary-arm/libsmbclient_3.0.24-6etch10_arm.deb stable/main/binary-arm/samba-dbg_3.0.24-6etch10_arm.deb stable/main/binary-arm/smbclient_3.0.24-6etch10_arm.deb stable/main/binary-arm/winbind_3.0.24-6etch10_arm.deb stable/main/binary-arm/swat_3.0.24-6etch10_arm.deb stable/main/binary-arm/python-samba_3.0.24-6etch10_arm.deb stable/main/binary-arm/samba-common_3.0.24-6etch10_arm.deb stable/main/binary-arm/libpam-smbpass_3.0.24-6etch10_arm.deb stable/main/binary-arm/samba_3.0.24-6etch10_arm.deb samba (3.0.24-6etch10) stable-security; urgency=high * debian/patches/security-CVE-2008-1105.patch: fix a heap overflow when parsing SMB responses in client code. (CVE-2008-1105) Closes: #483410 stable/main/binary-amd64/smbclient_3.0.24-6etch10_amd64.deb stable/main/binary-amd64/samba-dbg_3.0.24-6etch10_amd64.deb stable/main/binary-amd64/samba_3.0.24-6etch10_amd64.deb stable/main/binary-amd64/smbfs_3.0.24-6etch10_amd64.deb stable/main/binary-amd64/swat_3.0.24-6etch10_amd64.deb stable/main/binary-amd64/samba-common_3.0.24-6etch10_amd64.deb stable/main/binary-amd64/libpam-smbpass_3.0.24-6etch10_amd64.deb stable/main/binary-amd64/python-samba_3.0.24-6etch10_amd64.deb stable/main/binary-amd64/libsmbclient-dev_3.0.24-6etch10_amd64.deb stable/main/binary-amd64/winbind_3.0.24-6etch10_amd64.deb stable/main/binary-amd64/libsmbclient_3.0.24-6etch10_amd64.deb samba (3.0.24-6etch10) stable-security; urgency=high * debian/patches/security-CVE-2008-1105.patch: fix a heap overflow when parsing SMB responses in client code. (CVE-2008-1105) Closes: #483410 stable/main/binary-alpha/libpam-smbpass_3.0.24-6etch10_alpha.deb stable/main/binary-alpha/libsmbclient-dev_3.0.24-6etch10_alpha.deb stable/main/binary-alpha/python-samba_3.0.24-6etch10_alpha.deb stable/main/binary-alpha/swat_3.0.24-6etch10_alpha.deb stable/main/binary-alpha/winbind_3.0.24-6etch10_alpha.deb stable/main/binary-alpha/smbclient_3.0.24-6etch10_alpha.deb stable/main/binary-alpha/samba-common_3.0.24-6etch10_alpha.deb stable/main/binary-alpha/samba-dbg_3.0.24-6etch10_alpha.deb stable/main/binary-alpha/samba_3.0.24-6etch10_alpha.deb stable/main/binary-alpha/smbfs_3.0.24-6etch10_alpha.deb stable/main/binary-alpha/libsmbclient_3.0.24-6etch10_alpha.deb samba (3.0.24-6etch10) stable-security; urgency=high * debian/patches/security-CVE-2008-1105.patch: fix a heap overflow when parsing SMB responses in client code. (CVE-2008-1105) Closes: #483410 stable/main/binary-i386/smbfs_3.0.24-6etch10_i386.deb stable/main/binary-i386/samba_3.0.24-6etch10_i386.deb stable/main/binary-i386/samba-dbg_3.0.24-6etch10_i386.deb stable/main/binary-i386/swat_3.0.24-6etch10_i386.deb stable/main/binary-i386/winbind_3.0.24-6etch10_i386.deb stable/main/binary-i386/libsmbclient_3.0.24-6etch10_i386.deb stable/main/binary-i386/samba-common_3.0.24-6etch10_i386.deb stable/main/binary-i386/smbclient_3.0.24-6etch10_i386.deb stable/main/binary-i386/libsmbclient-dev_3.0.24-6etch10_i386.deb stable/main/binary-all/samba-doc_3.0.24-6etch10_all.deb stable/main/source/samba_3.0.24-6etch10.dsc stable/main/binary-i386/libpam-smbpass_3.0.24-6etch10_i386.deb stable/main/binary-i386/python-samba_3.0.24-6etch10_i386.deb stable/main/source/samba_3.0.24-6etch10.diff.gz stable/main/binary-all/samba-doc-pdf_3.0.24-6etch10_all.deb samba (3.0.24-6etch10) stable-security; urgency=high * debian/patches/security-CVE-2008-1105.patch: fix a heap overflow when parsing SMB responses in client code. (CVE-2008-1105) Closes: #483410 stable/main/binary-ia64/libsage-dev_0.1.2-1+b2_ia64.deb stable/main/binary-ia64/libsage0_0.1.2-1+b2_ia64.deb sage (0.1.2-1+b2) stable; urgency=low * Binary-only non-maintainer upload for ia64; no source changes. * Rebuild against libsdl1.2-dev (>= 1.2.11-7) to clean up .la files stable/main/binary-sparc/libreadline-ruby1.8_1.8.5-4etch2_sparc.deb stable/main/binary-sparc/libopenssl-ruby1.8_1.8.5-4etch2_sparc.deb stable/main/binary-sparc/ruby1.8_1.8.5-4etch2_sparc.deb stable/main/binary-sparc/ruby1.8-dev_1.8.5-4etch2_sparc.deb stable/main/binary-sparc/libgdbm-ruby1.8_1.8.5-4etch2_sparc.deb stable/main/binary-sparc/libruby1.8_1.8.5-4etch2_sparc.deb stable/main/binary-sparc/libruby1.8-dbg_1.8.5-4etch2_sparc.deb stable/main/binary-sparc/libdbm-ruby1.8_1.8.5-4etch2_sparc.deb stable/main/binary-sparc/libtcltk-ruby1.8_1.8.5-4etch2_sparc.deb ruby1.8 (1.8.5-4etch2) stable-security; urgency=low * applied debian/patches/165_CVE-2008-2662,2663,2664,2725,2726.patch and appiled debian/patches/166_CVE-2008-2376.patch: - security fixes for CVE-2008-2662, CVE-2008-2663, CVE-2008-2664, CVE-2008-2725, CVE-2008-2726, CVE-2008-2376. (Closes: #487238) stable/main/binary-s390/ruby1.8_1.8.5-4etch2_s390.deb stable/main/binary-s390/ruby1.8-dev_1.8.5-4etch2_s390.deb stable/main/binary-s390/libruby1.8-dbg_1.8.5-4etch2_s390.deb stable/main/binary-s390/libdbm-ruby1.8_1.8.5-4etch2_s390.deb stable/main/binary-s390/libopenssl-ruby1.8_1.8.5-4etch2_s390.deb stable/main/binary-s390/libtcltk-ruby1.8_1.8.5-4etch2_s390.deb stable/main/binary-s390/libreadline-ruby1.8_1.8.5-4etch2_s390.deb stable/main/binary-s390/libgdbm-ruby1.8_1.8.5-4etch2_s390.deb stable/main/binary-s390/libruby1.8_1.8.5-4etch2_s390.deb ruby1.8 (1.8.5-4etch2) stable-security; urgency=low * applied debian/patches/165_CVE-2008-2662,2663,2664,2725,2726.patch and appiled debian/patches/166_CVE-2008-2376.patch: - security fixes for CVE-2008-2662, CVE-2008-2663, CVE-2008-2664, CVE-2008-2725, CVE-2008-2726, CVE-2008-2376. (Closes: #487238) stable/main/binary-powerpc/libopenssl-ruby1.8_1.8.5-4etch2_powerpc.deb stable/main/binary-powerpc/libdbm-ruby1.8_1.8.5-4etch2_powerpc.deb stable/main/binary-powerpc/libreadline-ruby1.8_1.8.5-4etch2_powerpc.deb stable/main/binary-powerpc/ruby1.8_1.8.5-4etch2_powerpc.deb stable/main/binary-powerpc/libtcltk-ruby1.8_1.8.5-4etch2_powerpc.deb stable/main/binary-powerpc/libruby1.8_1.8.5-4etch2_powerpc.deb stable/main/binary-powerpc/libruby1.8-dbg_1.8.5-4etch2_powerpc.deb stable/main/binary-powerpc/ruby1.8-dev_1.8.5-4etch2_powerpc.deb stable/main/binary-powerpc/libgdbm-ruby1.8_1.8.5-4etch2_powerpc.deb ruby1.8 (1.8.5-4etch2) stable-security; urgency=low * applied debian/patches/165_CVE-2008-2662,2663,2664,2725,2726.patch and appiled debian/patches/166_CVE-2008-2376.patch: - security fixes for CVE-2008-2662, CVE-2008-2663, CVE-2008-2664, CVE-2008-2725, CVE-2008-2726, CVE-2008-2376. (Closes: #487238) stable/main/binary-mipsel/ruby1.8_1.8.5-4etch2_mipsel.deb stable/main/binary-mipsel/libruby1.8-dbg_1.8.5-4etch2_mipsel.deb stable/main/binary-mipsel/ruby1.8-dev_1.8.5-4etch2_mipsel.deb stable/main/binary-mipsel/libopenssl-ruby1.8_1.8.5-4etch2_mipsel.deb stable/main/binary-mipsel/libreadline-ruby1.8_1.8.5-4etch2_mipsel.deb stable/main/binary-mipsel/libdbm-ruby1.8_1.8.5-4etch2_mipsel.deb stable/main/binary-mipsel/libgdbm-ruby1.8_1.8.5-4etch2_mipsel.deb stable/main/binary-mipsel/libtcltk-ruby1.8_1.8.5-4etch2_mipsel.deb stable/main/binary-mipsel/libruby1.8_1.8.5-4etch2_mipsel.deb ruby1.8 (1.8.5-4etch2) stable-security; urgency=low * applied debian/patches/165_CVE-2008-2662,2663,2664,2725,2726.patch and appiled debian/patches/166_CVE-2008-2376.patch: - security fixes for CVE-2008-2662, CVE-2008-2663, CVE-2008-2664, CVE-2008-2725, CVE-2008-2726, CVE-2008-2376. (Closes: #487238) stable/main/binary-mips/libruby1.8_1.8.5-4etch2_mips.deb stable/main/binary-mips/libruby1.8-dbg_1.8.5-4etch2_mips.deb stable/main/binary-mips/ruby1.8-dev_1.8.5-4etch2_mips.deb stable/main/binary-mips/libgdbm-ruby1.8_1.8.5-4etch2_mips.deb stable/main/binary-mips/libopenssl-ruby1.8_1.8.5-4etch2_mips.deb stable/main/binary-mips/libtcltk-ruby1.8_1.8.5-4etch2_mips.deb stable/main/binary-mips/libdbm-ruby1.8_1.8.5-4etch2_mips.deb stable/main/binary-mips/ruby1.8_1.8.5-4etch2_mips.deb stable/main/binary-mips/libreadline-ruby1.8_1.8.5-4etch2_mips.deb ruby1.8 (1.8.5-4etch2) stable-security; urgency=low * applied debian/patches/165_CVE-2008-2662,2663,2664,2725,2726.patch and appiled debian/patches/166_CVE-2008-2376.patch: - security fixes for CVE-2008-2662, CVE-2008-2663, CVE-2008-2664, CVE-2008-2725, CVE-2008-2726, CVE-2008-2376. (Closes: #487238) stable/main/binary-ia64/libtcltk-ruby1.8_1.8.5-4etch2_ia64.deb stable/main/binary-ia64/ruby1.8-dev_1.8.5-4etch2_ia64.deb stable/main/binary-ia64/libruby1.8-dbg_1.8.5-4etch2_ia64.deb stable/main/binary-ia64/libdbm-ruby1.8_1.8.5-4etch2_ia64.deb stable/main/binary-ia64/libruby1.8_1.8.5-4etch2_ia64.deb stable/main/binary-ia64/libreadline-ruby1.8_1.8.5-4etch2_ia64.deb stable/main/binary-ia64/libgdbm-ruby1.8_1.8.5-4etch2_ia64.deb stable/main/binary-ia64/ruby1.8_1.8.5-4etch2_ia64.deb stable/main/binary-ia64/libopenssl-ruby1.8_1.8.5-4etch2_ia64.deb ruby1.8 (1.8.5-4etch2) stable-security; urgency=low * applied debian/patches/165_CVE-2008-2662,2663,2664,2725,2726.patch and appiled debian/patches/166_CVE-2008-2376.patch: - security fixes for CVE-2008-2662, CVE-2008-2663, CVE-2008-2664, CVE-2008-2725, CVE-2008-2726, CVE-2008-2376. (Closes: #487238) stable/main/binary-hppa/libdbm-ruby1.8_1.8.5-4etch2_hppa.deb stable/main/binary-hppa/libtcltk-ruby1.8_1.8.5-4etch2_hppa.deb stable/main/binary-hppa/ruby1.8_1.8.5-4etch2_hppa.deb stable/main/binary-hppa/libgdbm-ruby1.8_1.8.5-4etch2_hppa.deb stable/main/binary-hppa/libruby1.8_1.8.5-4etch2_hppa.deb stable/main/binary-hppa/libopenssl-ruby1.8_1.8.5-4etch2_hppa.deb stable/main/binary-hppa/ruby1.8-dev_1.8.5-4etch2_hppa.deb stable/main/binary-hppa/libreadline-ruby1.8_1.8.5-4etch2_hppa.deb stable/main/binary-hppa/libruby1.8-dbg_1.8.5-4etch2_hppa.deb ruby1.8 (1.8.5-4etch2) stable-security; urgency=low * applied debian/patches/165_CVE-2008-2662,2663,2664,2725,2726.patch and appiled debian/patches/166_CVE-2008-2376.patch: - security fixes for CVE-2008-2662, CVE-2008-2663, CVE-2008-2664, CVE-2008-2725, CVE-2008-2726, CVE-2008-2376. (Closes: #487238) stable/main/binary-arm/libgdbm-ruby1.8_1.8.5-4etch2_arm.deb stable/main/binary-arm/libreadline-ruby1.8_1.8.5-4etch2_arm.deb stable/main/binary-arm/libtcltk-ruby1.8_1.8.5-4etch2_arm.deb stable/main/binary-arm/libruby1.8_1.8.5-4etch2_arm.deb stable/main/binary-arm/libdbm-ruby1.8_1.8.5-4etch2_arm.deb stable/main/binary-arm/libruby1.8-dbg_1.8.5-4etch2_arm.deb stable/main/binary-arm/ruby1.8_1.8.5-4etch2_arm.deb stable/main/binary-arm/libopenssl-ruby1.8_1.8.5-4etch2_arm.deb stable/main/binary-arm/ruby1.8-dev_1.8.5-4etch2_arm.deb ruby1.8 (1.8.5-4etch2) stable-security; urgency=low * applied debian/patches/165_CVE-2008-2662,2663,2664,2725,2726.patch and appiled debian/patches/166_CVE-2008-2376.patch: - security fixes for CVE-2008-2662, CVE-2008-2663, CVE-2008-2664, CVE-2008-2725, CVE-2008-2726, CVE-2008-2376. (Closes: #487238) stable/main/binary-amd64/libopenssl-ruby1.8_1.8.5-4etch2_amd64.deb stable/main/binary-amd64/libgdbm-ruby1.8_1.8.5-4etch2_amd64.deb stable/main/binary-amd64/libruby1.8_1.8.5-4etch2_amd64.deb stable/main/binary-amd64/libdbm-ruby1.8_1.8.5-4etch2_amd64.deb stable/main/binary-amd64/ruby1.8_1.8.5-4etch2_amd64.deb stable/main/binary-amd64/libruby1.8-dbg_1.8.5-4etch2_amd64.deb stable/main/binary-amd64/libtcltk-ruby1.8_1.8.5-4etch2_amd64.deb stable/main/binary-amd64/ruby1.8-dev_1.8.5-4etch2_amd64.deb stable/main/binary-amd64/libreadline-ruby1.8_1.8.5-4etch2_amd64.deb ruby1.8 (1.8.5-4etch2) stable-security; urgency=low * applied debian/patches/165_CVE-2008-2662,2663,2664,2725,2726.patch and appiled debian/patches/166_CVE-2008-2376.patch: - security fixes for CVE-2008-2662, CVE-2008-2663, CVE-2008-2664, CVE-2008-2725, CVE-2008-2726, CVE-2008-2376. (Closes: #487238) stable/main/binary-alpha/ruby1.8-dev_1.8.5-4etch2_alpha.deb stable/main/binary-alpha/libruby1.8-dbg_1.8.5-4etch2_alpha.deb stable/main/binary-alpha/ruby1.8_1.8.5-4etch2_alpha.deb stable/main/binary-alpha/libdbm-ruby1.8_1.8.5-4etch2_alpha.deb stable/main/binary-alpha/libopenssl-ruby1.8_1.8.5-4etch2_alpha.deb stable/main/binary-alpha/libtcltk-ruby1.8_1.8.5-4etch2_alpha.deb stable/main/binary-alpha/libruby1.8_1.8.5-4etch2_alpha.deb stable/main/binary-alpha/libgdbm-ruby1.8_1.8.5-4etch2_alpha.deb stable/main/binary-alpha/libreadline-ruby1.8_1.8.5-4etch2_alpha.deb ruby1.8 (1.8.5-4etch2) stable-security; urgency=low * applied debian/patches/165_CVE-2008-2662,2663,2664,2725,2726.patch and appiled debian/patches/166_CVE-2008-2376.patch: - security fixes for CVE-2008-2662, CVE-2008-2663, CVE-2008-2664, CVE-2008-2725, CVE-2008-2726, CVE-2008-2376. (Closes: #487238) stable/main/binary-all/ruby1.8-examples_1.8.5-4etch2_all.deb stable/main/binary-i386/libreadline-ruby1.8_1.8.5-4etch2_i386.deb stable/main/binary-all/rdoc1.8_1.8.5-4etch2_all.deb stable/main/binary-i386/libopenssl-ruby1.8_1.8.5-4etch2_i386.deb stable/main/source/ruby1.8_1.8.5-4etch2.diff.gz stable/main/binary-i386/ruby1.8-dev_1.8.5-4etch2_i386.deb stable/main/source/ruby1.8_1.8.5-4etch2.dsc stable/main/binary-all/ruby1.8-elisp_1.8.5-4etch2_all.deb stable/main/binary-all/ri1.8_1.8.5-4etch2_all.deb stable/main/binary-i386/libgdbm-ruby1.8_1.8.5-4etch2_i386.deb stable/main/binary-i386/libruby1.8_1.8.5-4etch2_i386.deb stable/main/binary-i386/libtcltk-ruby1.8_1.8.5-4etch2_i386.deb stable/main/binary-i386/ruby1.8_1.8.5-4etch2_i386.deb stable/main/binary-i386/libdbm-ruby1.8_1.8.5-4etch2_i386.deb stable/main/binary-all/irb1.8_1.8.5-4etch2_all.deb stable/main/binary-i386/libruby1.8-dbg_1.8.5-4etch2_i386.deb ruby1.8 (1.8.5-4etch2) stable-security; urgency=low * applied debian/patches/165_CVE-2008-2662,2663,2664,2725,2726.patch and appiled debian/patches/166_CVE-2008-2376.patch: - security fixes for CVE-2008-2662, CVE-2008-2663, CVE-2008-2664, CVE-2008-2725, CVE-2008-2726, CVE-2008-2376. (Closes: #487238) stable/main/binary-sparc/rsync_2.6.9-2etch2_sparc.deb rsync (2.6.9-2etch2) stable-security; urgency=high * Non-maintainer upload by the Security Team * Fix heap overflow in xattrs handling stable/main/binary-s390/rsync_2.6.9-2etch2_s390.deb rsync (2.6.9-2etch2) stable-security; urgency=high * Non-maintainer upload by the Security Team * Fix heap overflow in xattrs handling stable/main/binary-powerpc/rsync_2.6.9-2etch2_powerpc.deb rsync (2.6.9-2etch2) stable-security; urgency=high * Non-maintainer upload by the Security Team * Fix heap overflow in xattrs handling stable/main/binary-mipsel/rsync_2.6.9-2etch2_mipsel.deb rsync (2.6.9-2etch2) stable-security; urgency=high * Non-maintainer upload by the Security Team * Fix heap overflow in xattrs handling stable/main/binary-mips/rsync_2.6.9-2etch2_mips.deb rsync (2.6.9-2etch2) stable-security; urgency=high * Non-maintainer upload by the Security Team * Fix heap overflow in xattrs handling stable/main/binary-ia64/rsync_2.6.9-2etch2_ia64.deb rsync (2.6.9-2etch2) stable-security; urgency=high * Non-maintainer upload by the Security Team * Fix heap overflow in xattrs handling stable/main/binary-hppa/rsync_2.6.9-2etch2_hppa.deb rsync (2.6.9-2etch2) stable-security; urgency=high * Non-maintainer upload by the Security Team * Fix heap overflow in xattrs handling stable/main/binary-arm/rsync_2.6.9-2etch2_arm.deb rsync (2.6.9-2etch2) stable-security; urgency=high * Non-maintainer upload by the Security Team * Fix heap overflow in xattrs handling stable/main/binary-amd64/rsync_2.6.9-2etch2_amd64.deb rsync (2.6.9-2etch2) stable-security; urgency=high * Non-maintainer upload by the Security Team * Fix heap overflow in xattrs handling stable/main/binary-alpha/rsync_2.6.9-2etch2_alpha.deb rsync (2.6.9-2etch2) stable-security; urgency=high * Non-maintainer upload by the Security Team * Fix heap overflow in xattrs handling stable/main/source/rsync_2.6.9-2etch2.dsc stable/main/binary-i386/rsync_2.6.9-2etch2_i386.deb stable/main/source/rsync_2.6.9-2etch2.diff.gz rsync (2.6.9-2etch2) stable-security; urgency=high * Non-maintainer upload by the Security Team * Fix heap overflow in xattrs handling stable/main/source/roundup_1.2.1-5+etch2.dsc stable/main/binary-all/roundup_1.2.1-5+etch2_all.deb stable/main/source/roundup_1.2.1-5+etch2.diff.gz roundup (1.2.1-5+etch2) stable-security; urgency=high * Non-maintainer upload by the security team. * Fix regression introduced in DSA 1554-1 (closes: #477438). stable/main/binary-sparc/rdesktop_1.5.0-1etch2_sparc.deb rdesktop (1.5.0-1etch2) stable-security; urgency=high * Fix two remote code execution and integer signedness vulnerabilities (CVE-2008-1801, CVE-2008-1802 and CVE-2008-1803). stable/main/binary-s390/rdesktop_1.5.0-1etch2_s390.deb rdesktop (1.5.0-1etch2) stable-security; urgency=high * Fix two remote code execution and integer signedness vulnerabilities (CVE-2008-1801, CVE-2008-1802 and CVE-2008-1803). stable/main/binary-powerpc/rdesktop_1.5.0-1etch2_powerpc.deb rdesktop (1.5.0-1etch2) stable-security; urgency=high * Fix two remote code execution and integer signedness vulnerabilities (CVE-2008-1801, CVE-2008-1802 and CVE-2008-1803). stable/main/binary-mipsel/rdesktop_1.5.0-1etch2_mipsel.deb rdesktop (1.5.0-1etch2) stable-security; urgency=high * Fix two remote code execution and integer signedness vulnerabilities (CVE-2008-1801, CVE-2008-1802 and CVE-2008-1803). stable/main/binary-mips/rdesktop_1.5.0-1etch2_mips.deb rdesktop (1.5.0-1etch2) stable-security; urgency=high * Fix two remote code execution and integer signedness vulnerabilities (CVE-2008-1801, CVE-2008-1802 and CVE-2008-1803). stable/main/binary-ia64/rdesktop_1.5.0-1etch2_ia64.deb rdesktop (1.5.0-1etch2) stable-security; urgency=high * Fix two remote code execution and integer signedness vulnerabilities (CVE-2008-1801, CVE-2008-1802 and CVE-2008-1803). stable/main/binary-hppa/rdesktop_1.5.0-1etch2_hppa.deb rdesktop (1.5.0-1etch2) stable-security; urgency=high * Fix two remote code execution and integer signedness vulnerabilities (CVE-2008-1801, CVE-2008-1802 and CVE-2008-1803). stable/main/binary-arm/rdesktop_1.5.0-1etch2_arm.deb rdesktop (1.5.0-1etch2) stable-security; urgency=high * Fix two remote code execution and integer signedness vulnerabilities (CVE-2008-1801, CVE-2008-1802 and CVE-2008-1803). stable/main/binary-amd64/rdesktop_1.5.0-1etch2_amd64.deb rdesktop (1.5.0-1etch2) stable-security; urgency=high * Fix two remote code execution and integer signedness vulnerabilities (CVE-2008-1801, CVE-2008-1802 and CVE-2008-1803). stable/main/binary-alpha/rdesktop_1.5.0-1etch2_alpha.deb rdesktop (1.5.0-1etch2) stable-security; urgency=high * Fix two remote code execution and integer signedness vulnerabilities (CVE-2008-1801, CVE-2008-1802 and CVE-2008-1803). stable/main/binary-i386/rdesktop_1.5.0-1etch2_i386.deb stable/main/source/rdesktop_1.5.0-1etch2.diff.gz stable/main/source/rdesktop_1.5.0-1etch2.dsc rdesktop (1.5.0-1etch2) stable-security; urgency=high * Fix two remote code execution and integer signedness vulnerabilities (CVE-2008-1801, CVE-2008-1802 and CVE-2008-1803). stable/main/binary-sparc/qt3-dev-tools_3.3.7-4etch2_sparc.deb stable/main/binary-sparc/libqt3-mt_3.3.7-4etch2_sparc.deb stable/main/binary-sparc/libqt3-mt-dev_3.3.7-4etch2_sparc.deb stable/main/binary-sparc/qt3-dev-tools-compat_3.3.7-4etch2_sparc.deb stable/main/binary-sparc/qt3-linguist_3.3.7-4etch2_sparc.deb stable/main/binary-sparc/qt3-dev-tools-embedded_3.3.7-4etch2_sparc.deb stable/main/binary-sparc/libqt3-mt-psql_3.3.7-4etch2_sparc.deb stable/main/binary-sparc/libqt3-mt-mysql_3.3.7-4etch2_sparc.deb stable/main/binary-sparc/qt3-designer_3.3.7-4etch2_sparc.deb stable/main/binary-sparc/qt-x11-free-dbg_3.3.7-4etch2_sparc.deb stable/main/binary-sparc/libqt3-mt-odbc_3.3.7-4etch2_sparc.deb stable/main/binary-sparc/qt3-qtconfig_3.3.7-4etch2_sparc.deb stable/main/binary-sparc/libqt3-compat-headers_3.3.7-4etch2_sparc.deb stable/main/binary-sparc/libqt3-headers_3.3.7-4etch2_sparc.deb stable/main/binary-sparc/qt3-assistant_3.3.7-4etch2_sparc.deb stable/main/binary-sparc/libqt3-mt-sqlite_3.3.7-4etch2_sparc.deb stable/main/binary-sparc/qt3-apps-dev_3.3.7-4etch2_sparc.deb qt-x11-free (3:3.3.7-4etch2) stable; urgency=low * Don't trust uname -m. Trust dpkg-arch. stable/main/binary-s390/qt3-dev-tools-embedded_3.3.7-4etch2_s390.deb stable/main/binary-s390/libqt3-mt-sqlite_3.3.7-4etch2_s390.deb stable/main/binary-s390/libqt3-mt_3.3.7-4etch2_s390.deb stable/main/binary-s390/qt3-dev-tools-compat_3.3.7-4etch2_s390.deb stable/main/binary-s390/libqt3-mt-dev_3.3.7-4etch2_s390.deb stable/main/binary-s390/libqt3-mt-psql_3.3.7-4etch2_s390.deb stable/main/binary-s390/qt3-dev-tools_3.3.7-4etch2_s390.deb stable/main/binary-s390/qt3-qtconfig_3.3.7-4etch2_s390.deb stable/main/binary-s390/libqt3-mt-mysql_3.3.7-4etch2_s390.deb stable/main/binary-s390/qt-x11-free-dbg_3.3.7-4etch2_s390.deb stable/main/binary-s390/libqt3-compat-headers_3.3.7-4etch2_s390.deb stable/main/binary-s390/qt3-assistant_3.3.7-4etch2_s390.deb stable/main/binary-s390/qt3-apps-dev_3.3.7-4etch2_s390.deb stable/main/binary-s390/libqt3-mt-odbc_3.3.7-4etch2_s390.deb stable/main/binary-s390/libqt3-headers_3.3.7-4etch2_s390.deb stable/main/binary-s390/qt3-linguist_3.3.7-4etch2_s390.deb stable/main/binary-s390/qt3-designer_3.3.7-4etch2_s390.deb qt-x11-free (3:3.3.7-4etch2) stable; urgency=low * Don't trust uname -m. Trust dpkg-arch. stable/main/binary-powerpc/libqt3-compat-headers_3.3.7-4etch2_powerpc.deb stable/main/binary-powerpc/libqt3-headers_3.3.7-4etch2_powerpc.deb stable/main/binary-powerpc/libqt3-mt-psql_3.3.7-4etch2_powerpc.deb stable/main/binary-powerpc/qt3-apps-dev_3.3.7-4etch2_powerpc.deb stable/main/binary-powerpc/qt3-qtconfig_3.3.7-4etch2_powerpc.deb stable/main/binary-powerpc/qt3-dev-tools_3.3.7-4etch2_powerpc.deb stable/main/binary-powerpc/qt3-dev-tools-embedded_3.3.7-4etch2_powerpc.deb stable/main/binary-powerpc/libqt3-mt-dev_3.3.7-4etch2_powerpc.deb stable/main/binary-powerpc/qt3-dev-tools-compat_3.3.7-4etch2_powerpc.deb stable/main/binary-powerpc/libqt3-mt-odbc_3.3.7-4etch2_powerpc.deb stable/main/binary-powerpc/qt3-linguist_3.3.7-4etch2_powerpc.deb stable/main/binary-powerpc/libqt3-mt-sqlite_3.3.7-4etch2_powerpc.deb stable/main/binary-powerpc/qt3-designer_3.3.7-4etch2_powerpc.deb stable/main/binary-powerpc/libqt3-mt-mysql_3.3.7-4etch2_powerpc.deb stable/main/binary-powerpc/qt-x11-free-dbg_3.3.7-4etch2_powerpc.deb stable/main/binary-powerpc/libqt3-mt_3.3.7-4etch2_powerpc.deb stable/main/binary-powerpc/qt3-assistant_3.3.7-4etch2_powerpc.deb qt-x11-free (3:3.3.7-4etch2) stable; urgency=low * Don't trust uname -m. Trust dpkg-arch. stable/main/binary-mipsel/qt3-dev-tools_3.3.7-4etch2_mipsel.deb stable/main/binary-mipsel/libqt3-mt-dev_3.3.7-4etch2_mipsel.deb stable/main/binary-mipsel/libqt3-compat-headers_3.3.7-4etch2_mipsel.deb stable/main/binary-mipsel/qt3-linguist_3.3.7-4etch2_mipsel.deb stable/main/binary-mipsel/qt3-dev-tools-embedded_3.3.7-4etch2_mipsel.deb stable/main/binary-mipsel/qt3-dev-tools-compat_3.3.7-4etch2_mipsel.deb stable/main/binary-mipsel/libqt3-mt-psql_3.3.7-4etch2_mipsel.deb stable/main/binary-mipsel/qt3-qtconfig_3.3.7-4etch2_mipsel.deb stable/main/binary-mipsel/qt-x11-free-dbg_3.3.7-4etch2_mipsel.deb stable/main/binary-mipsel/qt3-apps-dev_3.3.7-4etch2_mipsel.deb stable/main/binary-mipsel/qt3-assistant_3.3.7-4etch2_mipsel.deb stable/main/binary-mipsel/libqt3-mt-mysql_3.3.7-4etch2_mipsel.deb stable/main/binary-mipsel/libqt3-mt-odbc_3.3.7-4etch2_mipsel.deb stable/main/binary-mipsel/libqt3-mt-sqlite_3.3.7-4etch2_mipsel.deb stable/main/binary-mipsel/qt3-designer_3.3.7-4etch2_mipsel.deb stable/main/binary-mipsel/libqt3-headers_3.3.7-4etch2_mipsel.deb stable/main/binary-mipsel/libqt3-mt_3.3.7-4etch2_mipsel.deb qt-x11-free (3:3.3.7-4etch2) stable; urgency=low * Don't trust uname -m. Trust dpkg-arch. stable/main/binary-mips/libqt3-headers_3.3.7-4etch2_mips.deb stable/main/binary-mips/libqt3-mt_3.3.7-4etch2_mips.deb stable/main/binary-mips/libqt3-mt-psql_3.3.7-4etch2_mips.deb stable/main/binary-mips/libqt3-mt-dev_3.3.7-4etch2_mips.deb stable/main/binary-mips/qt3-designer_3.3.7-4etch2_mips.deb stable/main/binary-mips/qt3-qtconfig_3.3.7-4etch2_mips.deb stable/main/binary-mips/qt3-linguist_3.3.7-4etch2_mips.deb stable/main/binary-mips/qt3-apps-dev_3.3.7-4etch2_mips.deb stable/main/binary-mips/qt3-assistant_3.3.7-4etch2_mips.deb stable/main/binary-mips/qt3-dev-tools-compat_3.3.7-4etch2_mips.deb stable/main/binary-mips/libqt3-mt-sqlite_3.3.7-4etch2_mips.deb stable/main/binary-mips/qt3-dev-tools-embedded_3.3.7-4etch2_mips.deb stable/main/binary-mips/qt3-dev-tools_3.3.7-4etch2_mips.deb stable/main/binary-mips/libqt3-mt-odbc_3.3.7-4etch2_mips.deb stable/main/binary-mips/libqt3-mt-mysql_3.3.7-4etch2_mips.deb stable/main/binary-mips/qt-x11-free-dbg_3.3.7-4etch2_mips.deb stable/main/binary-mips/libqt3-compat-headers_3.3.7-4etch2_mips.deb qt-x11-free (3:3.3.7-4etch2) stable; urgency=low * Don't trust uname -m. Trust dpkg-arch. stable/main/binary-ia64/libqt3-mt-mysql_3.3.7-4etch2_ia64.deb stable/main/binary-ia64/libqt3-mt-dev_3.3.7-4etch2_ia64.deb stable/main/binary-ia64/qt3-qtconfig_3.3.7-4etch2_ia64.deb stable/main/binary-ia64/libqt3-mt-sqlite_3.3.7-4etch2_ia64.deb stable/main/binary-ia64/libqt3-headers_3.3.7-4etch2_ia64.deb stable/main/binary-ia64/libqt3-mt-odbc_3.3.7-4etch2_ia64.deb stable/main/binary-ia64/qt3-apps-dev_3.3.7-4etch2_ia64.deb stable/main/binary-ia64/qt3-dev-tools_3.3.7-4etch2_ia64.deb stable/main/binary-ia64/qt3-assistant_3.3.7-4etch2_ia64.deb stable/main/binary-ia64/libqt3-mt_3.3.7-4etch2_ia64.deb stable/main/binary-ia64/qt3-designer_3.3.7-4etch2_ia64.deb stable/main/binary-ia64/qt-x11-free-dbg_3.3.7-4etch2_ia64.deb stable/main/binary-ia64/qt3-dev-tools-embedded_3.3.7-4etch2_ia64.deb stable/main/binary-ia64/qt3-dev-tools-compat_3.3.7-4etch2_ia64.deb stable/main/binary-ia64/libqt3-mt-psql_3.3.7-4etch2_ia64.deb stable/main/binary-ia64/libqt3-compat-headers_3.3.7-4etch2_ia64.deb stable/main/binary-ia64/qt3-linguist_3.3.7-4etch2_ia64.deb qt-x11-free (3:3.3.7-4etch2) stable; urgency=low * Don't trust uname -m. Trust dpkg-arch. stable/main/binary-hppa/libqt3-mt-sqlite_3.3.7-4etch2_hppa.deb stable/main/binary-hppa/qt-x11-free-dbg_3.3.7-4etch2_hppa.deb stable/main/binary-hppa/libqt3-mt-odbc_3.3.7-4etch2_hppa.deb stable/main/binary-hppa/libqt3-headers_3.3.7-4etch2_hppa.deb stable/main/binary-hppa/libqt3-mt-dev_3.3.7-4etch2_hppa.deb stable/main/binary-hppa/qt3-dev-tools_3.3.7-4etch2_hppa.deb stable/main/binary-hppa/qt3-dev-tools-embedded_3.3.7-4etch2_hppa.deb stable/main/binary-hppa/qt3-designer_3.3.7-4etch2_hppa.deb stable/main/binary-hppa/libqt3-mt-psql_3.3.7-4etch2_hppa.deb stable/main/binary-hppa/qt3-qtconfig_3.3.7-4etch2_hppa.deb stable/main/binary-hppa/libqt3-compat-headers_3.3.7-4etch2_hppa.deb stable/main/binary-hppa/libqt3-mt_3.3.7-4etch2_hppa.deb stable/main/binary-hppa/qt3-linguist_3.3.7-4etch2_hppa.deb stable/main/binary-hppa/libqt3-mt-mysql_3.3.7-4etch2_hppa.deb stable/main/binary-hppa/qt3-dev-tools-compat_3.3.7-4etch2_hppa.deb stable/main/binary-hppa/qt3-assistant_3.3.7-4etch2_hppa.deb stable/main/binary-hppa/qt3-apps-dev_3.3.7-4etch2_hppa.deb qt-x11-free (3:3.3.7-4etch2) stable; urgency=low * Don't trust uname -m. Trust dpkg-arch. stable/main/binary-arm/qt3-apps-dev_3.3.7-4etch2_arm.deb stable/main/binary-arm/qt3-assistant_3.3.7-4etch2_arm.deb stable/main/binary-arm/qt3-dev-tools-embedded_3.3.7-4etch2_arm.deb stable/main/binary-arm/libqt3-mt-psql_3.3.7-4etch2_arm.deb stable/main/binary-arm/qt-x11-free-dbg_3.3.7-4etch2_arm.deb stable/main/binary-arm/qt3-linguist_3.3.7-4etch2_arm.deb stable/main/binary-arm/libqt3-compat-headers_3.3.7-4etch2_arm.deb stable/main/binary-arm/qt3-dev-tools-compat_3.3.7-4etch2_arm.deb stable/main/binary-arm/qt3-qtconfig_3.3.7-4etch2_arm.deb stable/main/binary-arm/libqt3-mt_3.3.7-4etch2_arm.deb stable/main/binary-arm/libqt3-mt-sqlite_3.3.7-4etch2_arm.deb stable/main/binary-arm/libqt3-mt-odbc_3.3.7-4etch2_arm.deb stable/main/binary-arm/libqt3-mt-dev_3.3.7-4etch2_arm.deb stable/main/binary-arm/libqt3-headers_3.3.7-4etch2_arm.deb stable/main/binary-arm/qt3-designer_3.3.7-4etch2_arm.deb stable/main/binary-arm/libqt3-mt-mysql_3.3.7-4etch2_arm.deb stable/main/binary-arm/qt3-dev-tools_3.3.7-4etch2_arm.deb qt-x11-free (3:3.3.7-4etch2) stable; urgency=low * Don't trust uname -m. Trust dpkg-arch. stable/main/binary-amd64/qt3-designer_3.3.7-4etch2_amd64.deb stable/main/binary-amd64/qt3-dev-tools_3.3.7-4etch2_amd64.deb stable/main/binary-amd64/qt3-apps-dev_3.3.7-4etch2_amd64.deb stable/main/binary-amd64/libqt3-compat-headers_3.3.7-4etch2_amd64.deb stable/main/binary-amd64/libqt3-mt_3.3.7-4etch2_amd64.deb stable/main/binary-amd64/qt3-qtconfig_3.3.7-4etch2_amd64.deb stable/main/binary-amd64/qt-x11-free-dbg_3.3.7-4etch2_amd64.deb stable/main/binary-amd64/libqt3-headers_3.3.7-4etch2_amd64.deb stable/main/binary-amd64/libqt3-mt-sqlite_3.3.7-4etch2_amd64.deb stable/main/binary-amd64/qt3-dev-tools-compat_3.3.7-4etch2_amd64.deb stable/main/binary-amd64/qt3-assistant_3.3.7-4etch2_amd64.deb stable/main/binary-amd64/qt3-dev-tools-embedded_3.3.7-4etch2_amd64.deb stable/main/binary-amd64/libqt3-mt-dev_3.3.7-4etch2_amd64.deb stable/main/binary-amd64/libqt3-mt-mysql_3.3.7-4etch2_amd64.deb stable/main/binary-amd64/libqt3-mt-psql_3.3.7-4etch2_amd64.deb stable/main/binary-amd64/libqt3-mt-odbc_3.3.7-4etch2_amd64.deb stable/main/binary-amd64/libqt3-mt-ibase_3.3.7-4etch2_amd64.deb stable/main/binary-amd64/qt3-linguist_3.3.7-4etch2_amd64.deb qt-x11-free (3:3.3.7-4etch2) stable; urgency=low * Don't trust uname -m. Trust dpkg-arch. stable/main/binary-alpha/qt3-dev-tools-embedded_3.3.7-4etch2_alpha.deb stable/main/binary-alpha/qt3-dev-tools-compat_3.3.7-4etch2_alpha.deb stable/main/binary-alpha/libqt3-headers_3.3.7-4etch2_alpha.deb stable/main/binary-alpha/libqt3-mt_3.3.7-4etch2_alpha.deb stable/main/binary-alpha/libqt3-mt-psql_3.3.7-4etch2_alpha.deb stable/main/binary-alpha/libqt3-mt-dev_3.3.7-4etch2_alpha.deb stable/main/binary-alpha/qt3-linguist_3.3.7-4etch2_alpha.deb stable/main/binary-alpha/qt-x11-free-dbg_3.3.7-4etch2_alpha.deb stable/main/binary-alpha/libqt3-mt-sqlite_3.3.7-4etch2_alpha.deb stable/main/binary-alpha/libqt3-mt-odbc_3.3.7-4etch2_alpha.deb stable/main/binary-alpha/qt3-assistant_3.3.7-4etch2_alpha.deb stable/main/binary-alpha/qt3-apps-dev_3.3.7-4etch2_alpha.deb stable/main/binary-alpha/qt3-designer_3.3.7-4etch2_alpha.deb stable/main/binary-alpha/libqt3-mt-mysql_3.3.7-4etch2_alpha.deb stable/main/binary-alpha/qt3-qtconfig_3.3.7-4etch2_alpha.deb stable/main/binary-alpha/libqt3-compat-headers_3.3.7-4etch2_alpha.deb stable/main/binary-alpha/qt3-dev-tools_3.3.7-4etch2_alpha.deb qt-x11-free (3:3.3.7-4etch2) stable; urgency=low * Don't trust uname -m. Trust dpkg-arch. stable/main/binary-all/qt3-doc_3.3.7-4etch2_all.deb stable/main/binary-i386/libqt3-mt-sqlite_3.3.7-4etch2_i386.deb stable/main/binary-i386/qt3-designer_3.3.7-4etch2_i386.deb stable/main/binary-all/libqt3-i18n_3.3.7-4etch2_all.deb stable/main/binary-i386/libqt3-mt-odbc_3.3.7-4etch2_i386.deb stable/main/binary-i386/libqt3-mt-psql_3.3.7-4etch2_i386.deb stable/main/binary-i386/qt3-dev-tools-embedded_3.3.7-4etch2_i386.deb stable/main/binary-i386/qt3-qtconfig_3.3.7-4etch2_i386.deb stable/main/source/qt-x11-free_3.3.7-4etch2.diff.gz stable/main/binary-i386/qt3-dev-tools_3.3.7-4etch2_i386.deb stable/main/binary-i386/libqt3-compat-headers_3.3.7-4etch2_i386.deb stable/main/binary-all/qt3-examples_3.3.7-4etch2_all.deb stable/main/binary-i386/qt3-apps-dev_3.3.7-4etch2_i386.deb stable/main/binary-i386/qt3-assistant_3.3.7-4etch2_i386.deb stable/main/binary-i386/libqt3-headers_3.3.7-4etch2_i386.deb stable/main/binary-i386/libqt3-mt-dev_3.3.7-4etch2_i386.deb stable/main/source/qt-x11-free_3.3.7-4etch2.dsc stable/main/binary-i386/qt3-linguist_3.3.7-4etch2_i386.deb stable/main/binary-i386/libqt3-mt-ibase_3.3.7-4etch2_i386.deb stable/main/binary-i386/qt3-dev-tools-compat_3.3.7-4etch2_i386.deb stable/main/binary-i386/qt-x11-free-dbg_3.3.7-4etch2_i386.deb stable/main/binary-i386/libqt3-mt-mysql_3.3.7-4etch2_i386.deb stable/main/binary-i386/libqt3-mt_3.3.7-4etch2_i386.deb qt-x11-free (3:3.3.7-4etch2) stable; urgency=low * Don't trust uname -m. Trust dpkg-arch. stable/main/binary-sparc/qsynth_0.2.5-2+etch1_sparc.deb qsynth (0.2.5-2+etch1) stable-proposed-updates; urgency=low * Non-maintainer upload. * Fix desktop file name (Closes: #415327). stable/main/binary-s390/qsynth_0.2.5-2+etch1_s390.deb qsynth (0.2.5-2+etch1) stable-proposed-updates; urgency=low * Non-maintainer upload. * Fix desktop file name (Closes: #415327). stable/main/binary-powerpc/qsynth_0.2.5-2+etch1_powerpc.deb qsynth (0.2.5-2+etch1) stable-proposed-updates; urgency=low * Non-maintainer upload. * Fix desktop file name (Closes: #415327). stable/main/binary-mipsel/qsynth_0.2.5-2+etch1_mipsel.deb qsynth (0.2.5-2+etch1) stable-proposed-updates; urgency=low * Non-maintainer upload. * Fix desktop file name (Closes: #415327). stable/main/binary-mips/qsynth_0.2.5-2+etch1_mips.deb qsynth (0.2.5-2+etch1) stable-proposed-updates; urgency=low * Non-maintainer upload. * Fix desktop file name (Closes: #415327). stable/main/binary-ia64/qsynth_0.2.5-2+etch1_ia64.deb qsynth (0.2.5-2+etch1) stable-proposed-updates; urgency=low * Non-maintainer upload. * Fix desktop file name (Closes: #415327). stable/main/binary-hppa/qsynth_0.2.5-2+etch1_hppa.deb qsynth (0.2.5-2+etch1) stable-proposed-updates; urgency=low * Non-maintainer upload. * Fix desktop file name (Closes: #415327). stable/main/binary-arm/qsynth_0.2.5-2+etch1_arm.deb qsynth (0.2.5-2+etch1) stable-proposed-updates; urgency=low * Non-maintainer upload. * Fix desktop file name (Closes: #415327). stable/main/binary-amd64/qsynth_0.2.5-2+etch1_amd64.deb qsynth (0.2.5-2+etch1) stable-proposed-updates; urgency=low * Non-maintainer upload. * Fix desktop file name (Closes: #415327). stable/main/binary-alpha/qsynth_0.2.5-2+etch1_alpha.deb qsynth (0.2.5-2+etch1) stable-proposed-updates; urgency=low * Non-maintainer upload. * Fix desktop file name (Closes: #415327). stable/main/source/qsynth_0.2.5-2+etch1.dsc stable/main/source/qsynth_0.2.5-2+etch1.diff.gz stable/main/binary-i386/qsynth_0.2.5-2+etch1_i386.deb qsynth (0.2.5-2+etch1) stable-proposed-updates; urgency=low * Non-maintainer upload. * Fix desktop file name (Closes: #415327). stable/main/binary-sparc/python2.4_2.4.4-3+etch1_sparc.deb stable/main/binary-sparc/python2.4-minimal_2.4.4-3+etch1_sparc.deb stable/main/binary-sparc/python2.4-dbg_2.4.4-3+etch1_sparc.deb stable/main/binary-sparc/python2.4-dev_2.4.4-3+etch1_sparc.deb python2.4 (2.4.4-3+etch1) stable-security; urgency=high * Non-maintainer upload by the Security Team. * CVE-2007-4965 * CVE-2008-1721 * CVE-2008-1679 * http://bugs.python.org/issue2587 stable/main/binary-s390/python2.4-minimal_2.4.4-3+etch1_s390.deb stable/main/binary-s390/python2.4_2.4.4-3+etch1_s390.deb stable/main/binary-s390/python2.4-dev_2.4.4-3+etch1_s390.deb stable/main/binary-s390/python2.4-dbg_2.4.4-3+etch1_s390.deb python2.4 (2.4.4-3+etch1) stable-security; urgency=high * Non-maintainer upload by the Security Team. * CVE-2007-4965 * CVE-2008-1721 * CVE-2008-1679 * http://bugs.python.org/issue2587 stable/main/binary-powerpc/python2.4-dbg_2.4.4-3+etch1_powerpc.deb stable/main/binary-powerpc/python2.4-dev_2.4.4-3+etch1_powerpc.deb stable/main/binary-powerpc/python2.4_2.4.4-3+etch1_powerpc.deb stable/main/binary-powerpc/python2.4-minimal_2.4.4-3+etch1_powerpc.deb python2.4 (2.4.4-3+etch1) stable-security; urgency=high * Non-maintainer upload by the Security Team. * CVE-2007-4965 * CVE-2008-1721 * CVE-2008-1679 * http://bugs.python.org/issue2587 stable/main/binary-mipsel/python2.4-minimal_2.4.4-3+etch1_mipsel.deb stable/main/binary-mipsel/python2.4-dev_2.4.4-3+etch1_mipsel.deb stable/main/binary-mipsel/python2.4-dbg_2.4.4-3+etch1_mipsel.deb stable/main/binary-mipsel/python2.4_2.4.4-3+etch1_mipsel.deb python2.4 (2.4.4-3+etch1) stable-security; urgency=high * Non-maintainer upload by the Security Team. * CVE-2007-4965 * CVE-2008-1721 * CVE-2008-1679 * http://bugs.python.org/issue2587 stable/main/binary-mips/python2.4_2.4.4-3+etch1_mips.deb stable/main/binary-mips/python2.4-dev_2.4.4-3+etch1_mips.deb stable/main/binary-mips/python2.4-minimal_2.4.4-3+etch1_mips.deb stable/main/binary-mips/python2.4-dbg_2.4.4-3+etch1_mips.deb python2.4 (2.4.4-3+etch1) stable-security; urgency=high * Non-maintainer upload by the Security Team. * CVE-2007-4965 * CVE-2008-1721 * CVE-2008-1679 * http://bugs.python.org/issue2587 stable/main/binary-ia64/python2.4_2.4.4-3+etch1_ia64.deb stable/main/binary-ia64/python2.4-minimal_2.4.4-3+etch1_ia64.deb stable/main/binary-ia64/python2.4-dev_2.4.4-3+etch1_ia64.deb stable/main/binary-ia64/python2.4-dbg_2.4.4-3+etch1_ia64.deb python2.4 (2.4.4-3+etch1) stable-security; urgency=high * Non-maintainer upload by the Security Team. * CVE-2007-4965 * CVE-2008-1721 * CVE-2008-1679 * http://bugs.python.org/issue2587 stable/main/binary-hppa/python2.4_2.4.4-3+etch1_hppa.deb stable/main/binary-hppa/python2.4-minimal_2.4.4-3+etch1_hppa.deb stable/main/binary-hppa/python2.4-dev_2.4.4-3+etch1_hppa.deb stable/main/binary-hppa/python2.4-dbg_2.4.4-3+etch1_hppa.deb python2.4 (2.4.4-3+etch1) stable-security; urgency=high * Non-maintainer upload by the Security Team. * CVE-2007-4965 * CVE-2008-1721 * CVE-2008-1679 * http://bugs.python.org/issue2587 stable/main/binary-arm/python2.4_2.4.4-3+etch1_arm.deb stable/main/binary-arm/python2.4-minimal_2.4.4-3+etch1_arm.deb stable/main/binary-arm/python2.4-dev_2.4.4-3+etch1_arm.deb stable/main/binary-arm/python2.4-dbg_2.4.4-3+etch1_arm.deb python2.4 (2.4.4-3+etch1) stable-security; urgency=high * Non-maintainer upload by the Security Team. * CVE-2007-4965 * CVE-2008-1721 * CVE-2008-1679 * http://bugs.python.org/issue2587 stable/main/binary-amd64/python2.4_2.4.4-3+etch1_amd64.deb stable/main/binary-amd64/python2.4-minimal_2.4.4-3+etch1_amd64.deb stable/main/binary-amd64/python2.4-dev_2.4.4-3+etch1_amd64.deb stable/main/binary-amd64/python2.4-dbg_2.4.4-3+etch1_amd64.deb python2.4 (2.4.4-3+etch1) stable-security; urgency=high * Non-maintainer upload by the Security Team. * CVE-2007-4965 * CVE-2008-1721 * CVE-2008-1679 * http://bugs.python.org/issue2587 stable/main/binary-alpha/python2.4_2.4.4-3+etch1_alpha.deb stable/main/binary-alpha/python2.4-dev_2.4.4-3+etch1_alpha.deb stable/main/binary-alpha/python2.4-minimal_2.4.4-3+etch1_alpha.deb stable/main/binary-alpha/python2.4-dbg_2.4.4-3+etch1_alpha.deb python2.4 (2.4.4-3+etch1) stable-security; urgency=high * Non-maintainer upload by the Security Team. * CVE-2007-4965 * CVE-2008-1721 * CVE-2008-1679 * http://bugs.python.org/issue2587 stable/main/source/python2.4_2.4.4-3+etch1.diff.gz stable/main/binary-all/python2.4-examples_2.4.4-3+etch1_all.deb stable/main/binary-i386/python2.4-dev_2.4.4-3+etch1_i386.deb stable/main/binary-all/idle-python2.4_2.4.4-3+etch1_all.deb stable/main/binary-i386/python2.4-minimal_2.4.4-3+etch1_i386.deb stable/main/binary-i386/python2.4_2.4.4-3+etch1_i386.deb stable/main/source/python2.4_2.4.4-3+etch1.dsc stable/main/binary-i386/python2.4-dbg_2.4.4-3+etch1_i386.deb python2.4 (2.4.4-3+etch1) stable-security; urgency=high * Non-maintainer upload by the Security Team. * CVE-2007-4965 * CVE-2008-1721 * CVE-2008-1679 * http://bugs.python.org/issue2587 stable/main/source/python-django_0.95.1-1etch1.dsc stable/main/source/python-django_0.95.1-1etch1.diff.gz stable/main/binary-all/python-django_0.95.1-1etch1_all.deb python-django (0.95.1-1etch1) stable; urgency=low * Add new patch debian/patches/03_xss_fix.diff. Fixes cross-site scripting vulnerability (CVE-2008-2302). Closes: #481164 stable/main/binary-sparc/proftpd_1.3.0-19etch1_sparc.deb proftpd-dfsg (1.3.0-19etch1) stable; urgency=low * [SECURITY] Added patch auth_cache.dpatch. It fixes CVE-2007-2165. stable/main/binary-s390/proftpd_1.3.0-19etch1_s390.deb proftpd-dfsg (1.3.0-19etch1) stable; urgency=low * [SECURITY] Added patch auth_cache.dpatch. It fixes CVE-2007-2165. stable/main/binary-powerpc/proftpd_1.3.0-19etch1_powerpc.deb proftpd-dfsg (1.3.0-19etch1) stable; urgency=low * [SECURITY] Added patch auth_cache.dpatch. It fixes CVE-2007-2165. stable/main/binary-mipsel/proftpd_1.3.0-19etch1_mipsel.deb proftpd-dfsg (1.3.0-19etch1) stable; urgency=low * [SECURITY] Added patch auth_cache.dpatch. It fixes CVE-2007-2165. stable/main/binary-mips/proftpd_1.3.0-19etch1_mips.deb proftpd-dfsg (1.3.0-19etch1) stable; urgency=low * [SECURITY] Added patch auth_cache.dpatch. It fixes CVE-2007-2165. stable/main/binary-ia64/proftpd_1.3.0-19etch1_ia64.deb proftpd-dfsg (1.3.0-19etch1) stable; urgency=low * [SECURITY] Added patch auth_cache.dpatch. It fixes CVE-2007-2165. stable/main/binary-hppa/proftpd_1.3.0-19etch1_hppa.deb proftpd-dfsg (1.3.0-19etch1) stable; urgency=low * [SECURITY] Added patch auth_cache.dpatch. It fixes CVE-2007-2165. stable/main/binary-arm/proftpd_1.3.0-19etch1_arm.deb proftpd-dfsg (1.3.0-19etch1) stable; urgency=low * [SECURITY] Added patch auth_cache.dpatch. It fixes CVE-2007-2165. stable/main/binary-amd64/proftpd_1.3.0-19etch1_amd64.deb proftpd-dfsg (1.3.0-19etch1) stable; urgency=low * [SECURITY] Added patch auth_cache.dpatch. It fixes CVE-2007-2165. stable/main/binary-alpha/proftpd_1.3.0-19etch1_alpha.deb proftpd-dfsg (1.3.0-19etch1) stable; urgency=low * [SECURITY] Added patch auth_cache.dpatch. It fixes CVE-2007-2165. stable/main/binary-all/proftpd-mysql_1.3.0-19etch1_all.deb stable/main/source/proftpd-dfsg_1.3.0-19etch1.diff.gz stable/main/binary-all/proftpd-doc_1.3.0-19etch1_all.deb stable/main/source/proftpd-dfsg_1.3.0-19etch1.dsc stable/main/binary-all/proftpd-pgsql_1.3.0-19etch1_all.deb stable/main/binary-i386/proftpd_1.3.0-19etch1_i386.deb stable/main/binary-all/proftpd-ldap_1.3.0-19etch1_all.deb proftpd-dfsg (1.3.0-19etch1) stable; urgency=low * [SECURITY] Added patch auth_cache.dpatch. It fixes CVE-2007-2165. stable/main/binary-sparc/libpoppler-dev_0.4.5-5.1etch3_sparc.deb stable/main/binary-sparc/poppler-utils_0.4.5-5.1etch3_sparc.deb stable/main/binary-sparc/libpoppler0c2-qt_0.4.5-5.1etch3_sparc.deb stable/main/binary-sparc/libpoppler0c2_0.4.5-5.1etch3_sparc.deb stable/main/binary-sparc/libpoppler0c2-glib_0.4.5-5.1etch3_sparc.deb stable/main/binary-sparc/libpoppler-glib-dev_0.4.5-5.1etch3_sparc.deb stable/main/binary-sparc/libpoppler-qt-dev_0.4.5-5.1etch3_sparc.deb poppler (0.4.5-5.1etch3) stable-security; urgency=high * Non-maintainer upload by the security team * Make sure the CairoFont::create function properly handles embedded fonts in PDF files to avoid arbitrary code execution Fixes: CVE-2008-1693 stable/main/binary-s390/libpoppler-qt-dev_0.4.5-5.1etch3_s390.deb stable/main/binary-s390/libpoppler0c2_0.4.5-5.1etch3_s390.deb stable/main/binary-s390/libpoppler0c2-qt_0.4.5-5.1etch3_s390.deb stable/main/binary-s390/libpoppler-glib-dev_0.4.5-5.1etch3_s390.deb stable/main/binary-s390/libpoppler-dev_0.4.5-5.1etch3_s390.deb stable/main/binary-s390/libpoppler0c2-glib_0.4.5-5.1etch3_s390.deb stable/main/binary-s390/poppler-utils_0.4.5-5.1etch3_s390.deb poppler (0.4.5-5.1etch3) stable-security; urgency=high * Non-maintainer upload by the security team * Make sure the CairoFont::create function properly handles embedded fonts in PDF files to avoid arbitrary code execution Fixes: CVE-2008-1693 stable/main/binary-powerpc/libpoppler-qt-dev_0.4.5-5.1etch3_powerpc.deb stable/main/binary-powerpc/libpoppler-dev_0.4.5-5.1etch3_powerpc.deb stable/main/binary-powerpc/poppler-utils_0.4.5-5.1etch3_powerpc.deb stable/main/binary-powerpc/libpoppler0c2-glib_0.4.5-5.1etch3_powerpc.deb stable/main/binary-powerpc/libpoppler0c2_0.4.5-5.1etch3_powerpc.deb stable/main/binary-powerpc/libpoppler-glib-dev_0.4.5-5.1etch3_powerpc.deb stable/main/binary-powerpc/libpoppler0c2-qt_0.4.5-5.1etch3_powerpc.deb poppler (0.4.5-5.1etch3) stable-security; urgency=high * Non-maintainer upload by the security team * Make sure the CairoFont::create function properly handles embedded fonts in PDF files to avoid arbitrary code execution Fixes: CVE-2008-1693 stable/main/binary-mipsel/libpoppler0c2-qt_0.4.5-5.1etch3_mipsel.deb stable/main/binary-mipsel/libpoppler-glib-dev_0.4.5-5.1etch3_mipsel.deb stable/main/binary-mipsel/libpoppler0c2-glib_0.4.5-5.1etch3_mipsel.deb stable/main/binary-mipsel/libpoppler-dev_0.4.5-5.1etch3_mipsel.deb stable/main/binary-mipsel/libpoppler0c2_0.4.5-5.1etch3_mipsel.deb stable/main/binary-mipsel/libpoppler-qt-dev_0.4.5-5.1etch3_mipsel.deb stable/main/binary-mipsel/poppler-utils_0.4.5-5.1etch3_mipsel.deb poppler (0.4.5-5.1etch3) stable-security; urgency=high * Non-maintainer upload by the security team * Make sure the CairoFont::create function properly handles embedded fonts in PDF files to avoid arbitrary code execution Fixes: CVE-2008-1693 stable/main/binary-mips/libpoppler-dev_0.4.5-5.1etch3_mips.deb stable/main/binary-mips/poppler-utils_0.4.5-5.1etch3_mips.deb stable/main/binary-mips/libpoppler-glib-dev_0.4.5-5.1etch3_mips.deb stable/main/binary-mips/libpoppler0c2_0.4.5-5.1etch3_mips.deb stable/main/binary-mips/libpoppler-qt-dev_0.4.5-5.1etch3_mips.deb stable/main/binary-mips/libpoppler0c2-glib_0.4.5-5.1etch3_mips.deb stable/main/binary-mips/libpoppler0c2-qt_0.4.5-5.1etch3_mips.deb poppler (0.4.5-5.1etch3) stable-security; urgency=high * Non-maintainer upload by the security team * Make sure the CairoFont::create function properly handles embedded fonts in PDF files to avoid arbitrary code execution Fixes: CVE-2008-1693 stable/main/binary-ia64/libpoppler-qt-dev_0.4.5-5.1etch3_ia64.deb stable/main/binary-ia64/poppler-utils_0.4.5-5.1etch3_ia64.deb stable/main/binary-ia64/libpoppler0c2_0.4.5-5.1etch3_ia64.deb stable/main/binary-ia64/libpoppler0c2-qt_0.4.5-5.1etch3_ia64.deb stable/main/binary-ia64/libpoppler-glib-dev_0.4.5-5.1etch3_ia64.deb stable/main/binary-ia64/libpoppler-dev_0.4.5-5.1etch3_ia64.deb stable/main/binary-ia64/libpoppler0c2-glib_0.4.5-5.1etch3_ia64.deb poppler (0.4.5-5.1etch3) stable-security; urgency=high * Non-maintainer upload by the security team * Make sure the CairoFont::create function properly handles embedded fonts in PDF files to avoid arbitrary code execution Fixes: CVE-2008-1693 stable/main/binary-hppa/libpoppler-dev_0.4.5-5.1etch3_hppa.deb stable/main/binary-hppa/libpoppler0c2_0.4.5-5.1etch3_hppa.deb stable/main/binary-hppa/libpoppler0c2-glib_0.4.5-5.1etch3_hppa.deb stable/main/binary-hppa/poppler-utils_0.4.5-5.1etch3_hppa.deb stable/main/binary-hppa/libpoppler-glib-dev_0.4.5-5.1etch3_hppa.deb stable/main/binary-hppa/libpoppler-qt-dev_0.4.5-5.1etch3_hppa.deb stable/main/binary-hppa/libpoppler0c2-qt_0.4.5-5.1etch3_hppa.deb poppler (0.4.5-5.1etch3) stable-security; urgency=high * Non-maintainer upload by the security team * Make sure the CairoFont::create function properly handles embedded fonts in PDF files to avoid arbitrary code execution Fixes: CVE-2008-1693 stable/main/binary-arm/libpoppler0c2-qt_0.4.5-5.1etch3_arm.deb stable/main/binary-arm/libpoppler0c2-glib_0.4.5-5.1etch3_arm.deb stable/main/binary-arm/libpoppler-qt-dev_0.4.5-5.1etch3_arm.deb stable/main/binary-arm/poppler-utils_0.4.5-5.1etch3_arm.deb stable/main/binary-arm/libpoppler-dev_0.4.5-5.1etch3_arm.deb stable/main/binary-arm/libpoppler0c2_0.4.5-5.1etch3_arm.deb stable/main/binary-arm/libpoppler-glib-dev_0.4.5-5.1etch3_arm.deb poppler (0.4.5-5.1etch3) stable-security; urgency=high * Non-maintainer upload by the security team * Make sure the CairoFont::create function properly handles embedded fonts in PDF files to avoid arbitrary code execution Fixes: CVE-2008-1693 stable/main/binary-amd64/libpoppler-dev_0.4.5-5.1etch3_amd64.deb stable/main/binary-amd64/libpoppler-glib-dev_0.4.5-5.1etch3_amd64.deb stable/main/binary-amd64/libpoppler0c2-glib_0.4.5-5.1etch3_amd64.deb stable/main/binary-amd64/libpoppler0c2_0.4.5-5.1etch3_amd64.deb stable/main/binary-amd64/libpoppler-qt-dev_0.4.5-5.1etch3_amd64.deb stable/main/binary-amd64/poppler-utils_0.4.5-5.1etch3_amd64.deb stable/main/binary-amd64/libpoppler0c2-qt_0.4.5-5.1etch3_amd64.deb poppler (0.4.5-5.1etch3) stable-security; urgency=high * Non-maintainer upload by the security team * Make sure the CairoFont::create function properly handles embedded fonts in PDF files to avoid arbitrary code execution Fixes: CVE-2008-1693 stable/main/binary-alpha/libpoppler-qt-dev_0.4.5-5.1etch3_alpha.deb stable/main/binary-alpha/libpoppler0c2-qt_0.4.5-5.1etch3_alpha.deb stable/main/binary-alpha/libpoppler0c2-glib_0.4.5-5.1etch3_alpha.deb stable/main/binary-alpha/libpoppler-dev_0.4.5-5.1etch3_alpha.deb stable/main/binary-alpha/libpoppler0c2_0.4.5-5.1etch3_alpha.deb stable/main/binary-alpha/libpoppler-glib-dev_0.4.5-5.1etch3_alpha.deb stable/main/binary-alpha/poppler-utils_0.4.5-5.1etch3_alpha.deb poppler (0.4.5-5.1etch3) stable-security; urgency=high * Non-maintainer upload by the security team * Make sure the CairoFont::create function properly handles embedded fonts in PDF files to avoid arbitrary code execution Fixes: CVE-2008-1693 stable/main/binary-i386/libpoppler0c2-glib_0.4.5-5.1etch3_i386.deb stable/main/binary-i386/libpoppler-dev_0.4.5-5.1etch3_i386.deb stable/main/binary-i386/libpoppler-qt-dev_0.4.5-5.1etch3_i386.deb stable/main/binary-i386/libpoppler0c2-qt_0.4.5-5.1etch3_i386.deb stable/main/binary-i386/libpoppler-glib-dev_0.4.5-5.1etch3_i386.deb stable/main/source/poppler_0.4.5-5.1etch3.dsc stable/main/binary-i386/poppler-utils_0.4.5-5.1etch3_i386.deb stable/main/source/poppler_0.4.5-5.1etch3.diff.gz stable/main/binary-i386/libpoppler0c2_0.4.5-5.1etch3_i386.deb poppler (0.4.5-5.1etch3) stable-security; urgency=high * Non-maintainer upload by the security team * Make sure the CairoFont::create function properly handles embedded fonts in PDF files to avoid arbitrary code execution Fixes: CVE-2008-1693 stable/main/binary-all/policyd-weight_0.1.14-beta-6etch2_all.deb stable/main/source/policyd-weight_0.1.14-beta-6etch2.dsc stable/main/source/policyd-weight_0.1.14-beta-6etch2.diff.gz policyd-weight (0.1.14-beta-6etch2) stable-security; urgency=high * adjust symlinkfix.diff to make the fix proper, since perl and test(1) seems to ignore the request for -l/-L, trailing '/' are stripped stable/main/binary-all/phpmyadmin_2.9.1.1-7_all.deb stable/main/source/phpmyadmin_2.9.1.1-7.diff.gz stable/main/source/phpmyadmin_2.9.1.1-7.dsc phpmyadmin (4:2.9.1.1-7) stable-security; urgency=high * Update for etch to address a security issue. * Attackers with CREATE table permissions were allowed to read arbitrary files via a crafted HTTP POST request, related to use of an undefined UploadDir variable. [PMASA-2008-3, CVE-2008-1924] * Stores the MySQL (1) username and (2) password, and the (3) Blowfish secret key, in cleartext in a Session file under /tmp, which allows local users to obtain sensitive information. [PMASA-2008-2, CVE-2008-1567] * phpMyAdmin accesses $_REQUEST to obtain some parameters instead of $_GET and $_POST, which allows attackers in the same domain to override certain variables and conduct SQL injection and Cross Site Request Forgery (CSRF) attacks by using crafed cookies. [PMASA-2008-1, CVE-2008-1149] stable/main/source/phpgedview_4.0.2.dfsg-4.diff.gz stable/main/binary-all/phpgedview-themes_4.0.2.dfsg-4_all.deb stable/main/binary-all/phpgedview-languages_4.0.2.dfsg-4_all.deb stable/main/binary-all/phpgedview_4.0.2.dfsg-4_all.deb stable/main/source/phpgedview_4.0.2.dfsg-4.dsc stable/main/binary-all/phpgedview-places_4.0.2.dfsg-4_all.deb phpgedview (4.0.2.dfsg-4) stable-security; urgency=high * Upload to stable to fix security issue. * No longer install pgvnuke and postgedview.php. These have a fundamental design flaw that allowed for privilege escalation. This flaw can't be fixed without reworking a large part of the API, which is not acceptable to a security update. Since this is a peripheral part of the package, we decided to disable it in this update. Those needing the functionality are encouraged to use a backported version of phpgedview from lenny. [CVE-2008-2064] stable/main/binary-sparc/php5-common_5.2.0-8+etch11_sparc.deb stable/main/binary-sparc/php5-mcrypt_5.2.0-8+etch11_sparc.deb stable/main/binary-sparc/php5-xmlrpc_5.2.0-8+etch11_sparc.deb stable/main/binary-sparc/php5-odbc_5.2.0-8+etch11_sparc.deb stable/main/binary-sparc/php5-curl_5.2.0-8+etch11_sparc.deb stable/main/binary-sparc/php5-imap_5.2.0-8+etch11_sparc.deb stable/main/binary-sparc/php5-snmp_5.2.0-8+etch11_sparc.deb stable/main/binary-sparc/libapache2-mod-php5_5.2.0-8+etch11_sparc.deb stable/main/binary-sparc/php5-dev_5.2.0-8+etch11_sparc.deb stable/main/binary-sparc/php5-tidy_5.2.0-8+etch11_sparc.deb stable/main/binary-sparc/php5-mysql_5.2.0-8+etch11_sparc.deb stable/main/binary-sparc/php5-pgsql_5.2.0-8+etch11_sparc.deb stable/main/binary-sparc/php5-ldap_5.2.0-8+etch11_sparc.deb stable/main/binary-sparc/php5-sybase_5.2.0-8+etch11_sparc.deb stable/main/binary-sparc/php5-pspell_5.2.0-8+etch11_sparc.deb stable/main/binary-sparc/php5-mhash_5.2.0-8+etch11_sparc.deb stable/main/binary-sparc/php5-recode_5.2.0-8+etch11_sparc.deb stable/main/binary-sparc/php5-gd_5.2.0-8+etch11_sparc.deb stable/main/binary-sparc/php5-xsl_5.2.0-8+etch11_sparc.deb stable/main/binary-sparc/libapache-mod-php5_5.2.0-8+etch11_sparc.deb stable/main/binary-sparc/php5-cli_5.2.0-8+etch11_sparc.deb stable/main/binary-sparc/php5-cgi_5.2.0-8+etch11_sparc.deb stable/main/binary-sparc/php5-sqlite_5.2.0-8+etch11_sparc.deb php5 (5.2.0-8+etch11) stable-security; urgency=high * Upload to etch for security issues. * The following security issues are addressed with this update: - CVE-2007-3806: glob denial of service - CVE-2008-1384: integer overflow in printf() - CVE-2008-2050: possible stack buffer overflow in the FastCGI SAPI - CVE-2008-2051: incomplete multibyte chars inside escapeshellcmd() closes: #479723 stable/main/binary-s390/php5-mhash_5.2.0-8+etch11_s390.deb stable/main/binary-s390/php5-mcrypt_5.2.0-8+etch11_s390.deb stable/main/binary-s390/php5-curl_5.2.0-8+etch11_s390.deb stable/main/binary-s390/libapache2-mod-php5_5.2.0-8+etch11_s390.deb stable/main/binary-s390/php5-cgi_5.2.0-8+etch11_s390.deb stable/main/binary-s390/php5-xsl_5.2.0-8+etch11_s390.deb stable/main/binary-s390/php5-ldap_5.2.0-8+etch11_s390.deb stable/main/binary-s390/php5-imap_5.2.0-8+etch11_s390.deb stable/main/binary-s390/php5-mysql_5.2.0-8+etch11_s390.deb stable/main/binary-s390/php5-sybase_5.2.0-8+etch11_s390.deb stable/main/binary-s390/php5-recode_5.2.0-8+etch11_s390.deb stable/main/binary-s390/php5-pgsql_5.2.0-8+etch11_s390.deb stable/main/binary-s390/php5-odbc_5.2.0-8+etch11_s390.deb stable/main/binary-s390/php5-sqlite_5.2.0-8+etch11_s390.deb stable/main/binary-s390/php5-snmp_5.2.0-8+etch11_s390.deb stable/main/binary-s390/php5-tidy_5.2.0-8+etch11_s390.deb stable/main/binary-s390/php5-cli_5.2.0-8+etch11_s390.deb stable/main/binary-s390/php5-common_5.2.0-8+etch11_s390.deb stable/main/binary-s390/php5-xmlrpc_5.2.0-8+etch11_s390.deb stable/main/binary-s390/php5-dev_5.2.0-8+etch11_s390.deb stable/main/binary-s390/php5-gd_5.2.0-8+etch11_s390.deb stable/main/binary-s390/php5-pspell_5.2.0-8+etch11_s390.deb stable/main/binary-s390/libapache-mod-php5_5.2.0-8+etch11_s390.deb php5 (5.2.0-8+etch11) stable-security; urgency=high * Upload to etch for security issues. * The following security issues are addressed with this update: - CVE-2007-3806: glob denial of service - CVE-2008-1384: integer overflow in printf() - CVE-2008-2050: possible stack buffer overflow in the FastCGI SAPI - CVE-2008-2051: incomplete multibyte chars inside escapeshellcmd() closes: #479723 stable/main/binary-powerpc/php5-xmlrpc_5.2.0-8+etch11_powerpc.deb stable/main/binary-powerpc/php5-mcrypt_5.2.0-8+etch11_powerpc.deb stable/main/binary-powerpc/php5-pspell_5.2.0-8+etch11_powerpc.deb stable/main/binary-powerpc/php5-snmp_5.2.0-8+etch11_powerpc.deb stable/main/binary-powerpc/php5-cli_5.2.0-8+etch11_powerpc.deb stable/main/binary-powerpc/php5-sqlite_5.2.0-8+etch11_powerpc.deb stable/main/binary-powerpc/php5-tidy_5.2.0-8+etch11_powerpc.deb stable/main/binary-powerpc/php5-curl_5.2.0-8+etch11_powerpc.deb stable/main/binary-powerpc/php5-sybase_5.2.0-8+etch11_powerpc.deb stable/main/binary-powerpc/php5-mhash_5.2.0-8+etch11_powerpc.deb stable/main/binary-powerpc/php5-pgsql_5.2.0-8+etch11_powerpc.deb stable/main/binary-powerpc/php5-mysql_5.2.0-8+etch11_powerpc.deb stable/main/binary-powerpc/php5-ldap_5.2.0-8+etch11_powerpc.deb stable/main/binary-powerpc/php5-cgi_5.2.0-8+etch11_powerpc.deb stable/main/binary-powerpc/libapache2-mod-php5_5.2.0-8+etch11_powerpc.deb stable/main/binary-powerpc/php5-dev_5.2.0-8+etch11_powerpc.deb stable/main/binary-powerpc/php5-imap_5.2.0-8+etch11_powerpc.deb stable/main/binary-powerpc/php5-recode_5.2.0-8+etch11_powerpc.deb stable/main/binary-powerpc/libapache-mod-php5_5.2.0-8+etch11_powerpc.deb stable/main/binary-powerpc/php5-xsl_5.2.0-8+etch11_powerpc.deb stable/main/binary-powerpc/php5-gd_5.2.0-8+etch11_powerpc.deb stable/main/binary-powerpc/php5-odbc_5.2.0-8+etch11_powerpc.deb stable/main/binary-powerpc/php5-common_5.2.0-8+etch11_powerpc.deb php5 (5.2.0-8+etch11) stable-security; urgency=high * Upload to etch for security issues. * The following security issues are addressed with this update: - CVE-2007-3806: glob denial of service - CVE-2008-1384: integer overflow in printf() - CVE-2008-2050: possible stack buffer overflow in the FastCGI SAPI - CVE-2008-2051: incomplete multibyte chars inside escapeshellcmd() closes: #479723 stable/main/binary-mipsel/php5-sqlite_5.2.0-8+etch11_mipsel.deb stable/main/binary-mipsel/php5-pspell_5.2.0-8+etch11_mipsel.deb stable/main/binary-mipsel/libapache-mod-php5_5.2.0-8+etch11_mipsel.deb stable/main/binary-mipsel/php5-snmp_5.2.0-8+etch11_mipsel.deb stable/main/binary-mipsel/php5-odbc_5.2.0-8+etch11_mipsel.deb stable/main/binary-mipsel/php5-ldap_5.2.0-8+etch11_mipsel.deb stable/main/binary-mipsel/php5-imap_5.2.0-8+etch11_mipsel.deb stable/main/binary-mipsel/libapache2-mod-php5_5.2.0-8+etch11_mipsel.deb stable/main/binary-mipsel/php5-cgi_5.2.0-8+etch11_mipsel.deb stable/main/binary-mipsel/php5-mcrypt_5.2.0-8+etch11_mipsel.deb stable/main/binary-mipsel/php5-pgsql_5.2.0-8+etch11_mipsel.deb stable/main/binary-mipsel/php5-curl_5.2.0-8+etch11_mipsel.deb stable/main/binary-mipsel/php5-mysql_5.2.0-8+etch11_mipsel.deb stable/main/binary-mipsel/php5-tidy_5.2.0-8+etch11_mipsel.deb stable/main/binary-mipsel/php5-cli_5.2.0-8+etch11_mipsel.deb stable/main/binary-mipsel/php5-dev_5.2.0-8+etch11_mipsel.deb stable/main/binary-mipsel/php5-xmlrpc_5.2.0-8+etch11_mipsel.deb stable/main/binary-mipsel/php5-common_5.2.0-8+etch11_mipsel.deb stable/main/binary-mipsel/php5-mhash_5.2.0-8+etch11_mipsel.deb stable/main/binary-mipsel/php5-gd_5.2.0-8+etch11_mipsel.deb stable/main/binary-mipsel/php5-sybase_5.2.0-8+etch11_mipsel.deb stable/main/binary-mipsel/php5-xsl_5.2.0-8+etch11_mipsel.deb stable/main/binary-mipsel/php5-recode_5.2.0-8+etch11_mipsel.deb php5 (5.2.0-8+etch11) stable-security; urgency=high * Upload to etch for security issues. * The following security issues are addressed with this update: - CVE-2007-3806: glob denial of service - CVE-2008-1384: integer overflow in printf() - CVE-2008-2050: possible stack buffer overflow in the FastCGI SAPI - CVE-2008-2051: incomplete multibyte chars inside escapeshellcmd() closes: #479723 stable/main/binary-mips/php5-tidy_5.2.0-8+etch11_mips.deb stable/main/binary-mips/php5-pgsql_5.2.0-8+etch11_mips.deb stable/main/binary-mips/libapache2-mod-php5_5.2.0-8+etch11_mips.deb stable/main/binary-mips/php5-cgi_5.2.0-8+etch11_mips.deb stable/main/binary-mips/php5-xsl_5.2.0-8+etch11_mips.deb stable/main/binary-mips/libapache-mod-php5_5.2.0-8+etch11_mips.deb stable/main/binary-mips/php5-mcrypt_5.2.0-8+etch11_mips.deb stable/main/binary-mips/php5-ldap_5.2.0-8+etch11_mips.deb stable/main/binary-mips/php5-dev_5.2.0-8+etch11_mips.deb stable/main/binary-mips/php5-gd_5.2.0-8+etch11_mips.deb stable/main/binary-mips/php5-mysql_5.2.0-8+etch11_mips.deb stable/main/binary-mips/php5-sqlite_5.2.0-8+etch11_mips.deb stable/main/binary-mips/php5-cli_5.2.0-8+etch11_mips.deb stable/main/binary-mips/php5-snmp_5.2.0-8+etch11_mips.deb stable/main/binary-mips/php5-odbc_5.2.0-8+etch11_mips.deb stable/main/binary-mips/php5-curl_5.2.0-8+etch11_mips.deb stable/main/binary-mips/php5-mhash_5.2.0-8+etch11_mips.deb stable/main/binary-mips/php5-sybase_5.2.0-8+etch11_mips.deb stable/main/binary-mips/php5-pspell_5.2.0-8+etch11_mips.deb stable/main/binary-mips/php5-xmlrpc_5.2.0-8+etch11_mips.deb stable/main/binary-mips/php5-common_5.2.0-8+etch11_mips.deb stable/main/binary-mips/php5-recode_5.2.0-8+etch11_mips.deb stable/main/binary-mips/php5-imap_5.2.0-8+etch11_mips.deb php5 (5.2.0-8+etch11) stable-security; urgency=high * Upload to etch for security issues. * The following security issues are addressed with this update: - CVE-2007-3806: glob denial of service - CVE-2008-1384: integer overflow in printf() - CVE-2008-2050: possible stack buffer overflow in the FastCGI SAPI - CVE-2008-2051: incomplete multibyte chars inside escapeshellcmd() closes: #479723 stable/main/binary-ia64/php5-mhash_5.2.0-8+etch11_ia64.deb stable/main/binary-ia64/libapache2-mod-php5_5.2.0-8+etch11_ia64.deb stable/main/binary-ia64/php5-xsl_5.2.0-8+etch11_ia64.deb stable/main/binary-ia64/php5-cgi_5.2.0-8+etch11_ia64.deb stable/main/binary-ia64/php5-pgsql_5.2.0-8+etch11_ia64.deb stable/main/binary-ia64/php5-mysql_5.2.0-8+etch11_ia64.deb stable/main/binary-ia64/php5-odbc_5.2.0-8+etch11_ia64.deb stable/main/binary-ia64/php5-sqlite_5.2.0-8+etch11_ia64.deb stable/main/binary-ia64/php5-snmp_5.2.0-8+etch11_ia64.deb stable/main/binary-ia64/php5-sybase_5.2.0-8+etch11_ia64.deb stable/main/binary-ia64/libapache-mod-php5_5.2.0-8+etch11_ia64.deb stable/main/binary-ia64/php5-tidy_5.2.0-8+etch11_ia64.deb stable/main/binary-ia64/php5-curl_5.2.0-8+etch11_ia64.deb stable/main/binary-ia64/php5-mcrypt_5.2.0-8+etch11_ia64.deb stable/main/binary-ia64/php5-cli_5.2.0-8+etch11_ia64.deb stable/main/binary-ia64/php5-common_5.2.0-8+etch11_ia64.deb stable/main/binary-ia64/php5-ldap_5.2.0-8+etch11_ia64.deb stable/main/binary-ia64/php5-dev_5.2.0-8+etch11_ia64.deb stable/main/binary-ia64/php5-gd_5.2.0-8+etch11_ia64.deb stable/main/binary-ia64/php5-recode_5.2.0-8+etch11_ia64.deb stable/main/binary-ia64/php5-pspell_5.2.0-8+etch11_ia64.deb stable/main/binary-ia64/php5-xmlrpc_5.2.0-8+etch11_ia64.deb stable/main/binary-ia64/php5-imap_5.2.0-8+etch11_ia64.deb php5 (5.2.0-8+etch11) stable-security; urgency=high * Upload to etch for security issues. * The following security issues are addressed with this update: - CVE-2007-3806: glob denial of service - CVE-2008-1384: integer overflow in printf() - CVE-2008-2050: possible stack buffer overflow in the FastCGI SAPI - CVE-2008-2051: incomplete multibyte chars inside escapeshellcmd() closes: #479723 stable/main/binary-hppa/php5-tidy_5.2.0-8+etch11_hppa.deb stable/main/binary-hppa/php5-xsl_5.2.0-8+etch11_hppa.deb stable/main/binary-hppa/php5-common_5.2.0-8+etch11_hppa.deb stable/main/binary-hppa/php5-dev_5.2.0-8+etch11_hppa.deb stable/main/binary-hppa/php5-sybase_5.2.0-8+etch11_hppa.deb stable/main/binary-hppa/libapache2-mod-php5_5.2.0-8+etch11_hppa.deb stable/main/binary-hppa/php5-imap_5.2.0-8+etch11_hppa.deb stable/main/binary-hppa/php5-mhash_5.2.0-8+etch11_hppa.deb stable/main/binary-hppa/php5-snmp_5.2.0-8+etch11_hppa.deb stable/main/binary-hppa/php5-mcrypt_5.2.0-8+etch11_hppa.deb stable/main/binary-hppa/php5-xmlrpc_5.2.0-8+etch11_hppa.deb stable/main/binary-hppa/php5-cgi_5.2.0-8+etch11_hppa.deb stable/main/binary-hppa/php5-pgsql_5.2.0-8+etch11_hppa.deb stable/main/binary-hppa/php5-ldap_5.2.0-8+etch11_hppa.deb stable/main/binary-hppa/libapache-mod-php5_5.2.0-8+etch11_hppa.deb stable/main/binary-hppa/php5-mysql_5.2.0-8+etch11_hppa.deb stable/main/binary-hppa/php5-curl_5.2.0-8+etch11_hppa.deb stable/main/binary-hppa/php5-odbc_5.2.0-8+etch11_hppa.deb stable/main/binary-hppa/php5-sqlite_5.2.0-8+etch11_hppa.deb stable/main/binary-hppa/php5-gd_5.2.0-8+etch11_hppa.deb stable/main/binary-hppa/php5-pspell_5.2.0-8+etch11_hppa.deb stable/main/binary-hppa/php5-recode_5.2.0-8+etch11_hppa.deb stable/main/binary-hppa/php5-cli_5.2.0-8+etch11_hppa.deb php5 (5.2.0-8+etch11) stable-security; urgency=high * Upload to etch for security issues. * The following security issues are addressed with this update: - CVE-2007-3806: glob denial of service - CVE-2008-1384: integer overflow in printf() - CVE-2008-2050: possible stack buffer overflow in the FastCGI SAPI - CVE-2008-2051: incomplete multibyte chars inside escapeshellcmd() closes: #479723 stable/main/binary-arm/php5-xmlrpc_5.2.0-8+etch11_arm.deb stable/main/binary-arm/php5-odbc_5.2.0-8+etch11_arm.deb stable/main/binary-arm/php5-sqlite_5.2.0-8+etch11_arm.deb stable/main/binary-arm/php5-curl_5.2.0-8+etch11_arm.deb stable/main/binary-arm/php5-snmp_5.2.0-8+etch11_arm.deb stable/main/binary-arm/php5-cgi_5.2.0-8+etch11_arm.deb stable/main/binary-arm/php5-sybase_5.2.0-8+etch11_arm.deb stable/main/binary-arm/php5-imap_5.2.0-8+etch11_arm.deb stable/main/binary-arm/php5-xsl_5.2.0-8+etch11_arm.deb stable/main/binary-arm/php5-gd_5.2.0-8+etch11_arm.deb stable/main/binary-arm/php5-ldap_5.2.0-8+etch11_arm.deb stable/main/binary-arm/php5-mysql_5.2.0-8+etch11_arm.deb stable/main/binary-arm/php5-dev_5.2.0-8+etch11_arm.deb stable/main/binary-arm/php5-recode_5.2.0-8+etch11_arm.deb stable/main/binary-arm/php5-pgsql_5.2.0-8+etch11_arm.deb stable/main/binary-arm/php5-tidy_5.2.0-8+etch11_arm.deb stable/main/binary-arm/php5-pspell_5.2.0-8+etch11_arm.deb stable/main/binary-arm/libapache2-mod-php5_5.2.0-8+etch11_arm.deb stable/main/binary-arm/php5-mhash_5.2.0-8+etch11_arm.deb stable/main/binary-arm/php5-common_5.2.0-8+etch11_arm.deb stable/main/binary-arm/php5-mcrypt_5.2.0-8+etch11_arm.deb stable/main/binary-arm/php5-cli_5.2.0-8+etch11_arm.deb stable/main/binary-arm/libapache-mod-php5_5.2.0-8+etch11_arm.deb php5 (5.2.0-8+etch11) stable-security; urgency=high * Upload to etch for security issues. * The following security issues are addressed with this update: - CVE-2007-3806: glob denial of service - CVE-2008-1384: integer overflow in printf() - CVE-2008-2050: possible stack buffer overflow in the FastCGI SAPI - CVE-2008-2051: incomplete multibyte chars inside escapeshellcmd() closes: #479723 stable/main/binary-amd64/php5-pspell_5.2.0-8+etch11_amd64.deb stable/main/binary-amd64/php5-sqlite_5.2.0-8+etch11_amd64.deb stable/main/binary-amd64/php5-mcrypt_5.2.0-8+etch11_amd64.deb stable/main/binary-amd64/php5-snmp_5.2.0-8+etch11_amd64.deb stable/main/binary-amd64/libapache2-mod-php5_5.2.0-8+etch11_amd64.deb stable/main/binary-amd64/php5-mysql_5.2.0-8+etch11_amd64.deb stable/main/binary-amd64/php5-pgsql_5.2.0-8+etch11_amd64.deb stable/main/binary-amd64/php5-interbase_5.2.0-8+etch11_amd64.deb stable/main/binary-amd64/php5-common_5.2.0-8+etch11_amd64.deb stable/main/binary-amd64/php5-xsl_5.2.0-8+etch11_amd64.deb stable/main/binary-amd64/php5-gd_5.2.0-8+etch11_amd64.deb stable/main/binary-amd64/php5-cgi_5.2.0-8+etch11_amd64.deb stable/main/binary-amd64/php5-tidy_5.2.0-8+etch11_amd64.deb stable/main/binary-amd64/php5-mhash_5.2.0-8+etch11_amd64.deb stable/main/binary-amd64/php5-imap_5.2.0-8+etch11_amd64.deb stable/main/binary-amd64/php5-cli_5.2.0-8+etch11_amd64.deb stable/main/binary-amd64/php5-odbc_5.2.0-8+etch11_amd64.deb stable/main/binary-amd64/php5-curl_5.2.0-8+etch11_amd64.deb stable/main/binary-amd64/php5-sybase_5.2.0-8+etch11_amd64.deb stable/main/binary-amd64/php5-dev_5.2.0-8+etch11_amd64.deb stable/main/binary-amd64/libapache-mod-php5_5.2.0-8+etch11_amd64.deb stable/main/binary-amd64/php5-ldap_5.2.0-8+etch11_amd64.deb stable/main/binary-amd64/php5-recode_5.2.0-8+etch11_amd64.deb stable/main/binary-amd64/php5-xmlrpc_5.2.0-8+etch11_amd64.deb php5 (5.2.0-8+etch11) stable-security; urgency=high * Upload to etch for security issues. * The following security issues are addressed with this update: - CVE-2007-3806: glob denial of service - CVE-2008-1384: integer overflow in printf() - CVE-2008-2050: possible stack buffer overflow in the FastCGI SAPI - CVE-2008-2051: incomplete multibyte chars inside escapeshellcmd() closes: #479723 stable/main/binary-alpha/php5-recode_5.2.0-8+etch11_alpha.deb stable/main/binary-alpha/php5-mhash_5.2.0-8+etch11_alpha.deb stable/main/binary-alpha/php5-snmp_5.2.0-8+etch11_alpha.deb stable/main/binary-alpha/php5-sqlite_5.2.0-8+etch11_alpha.deb stable/main/binary-alpha/php5-curl_5.2.0-8+etch11_alpha.deb stable/main/binary-alpha/php5-ldap_5.2.0-8+etch11_alpha.deb stable/main/binary-alpha/php5-xmlrpc_5.2.0-8+etch11_alpha.deb stable/main/binary-alpha/php5-common_5.2.0-8+etch11_alpha.deb stable/main/binary-alpha/php5-mcrypt_5.2.0-8+etch11_alpha.deb stable/main/binary-alpha/php5-cgi_5.2.0-8+etch11_alpha.deb stable/main/binary-alpha/libapache2-mod-php5_5.2.0-8+etch11_alpha.deb stable/main/binary-alpha/php5-odbc_5.2.0-8+etch11_alpha.deb stable/main/binary-alpha/php5-mysql_5.2.0-8+etch11_alpha.deb stable/main/binary-alpha/php5-tidy_5.2.0-8+etch11_alpha.deb stable/main/binary-alpha/php5-gd_5.2.0-8+etch11_alpha.deb stable/main/binary-alpha/php5-imap_5.2.0-8+etch11_alpha.deb stable/main/binary-alpha/php5-dev_5.2.0-8+etch11_alpha.deb stable/main/binary-alpha/libapache-mod-php5_5.2.0-8+etch11_alpha.deb stable/main/binary-alpha/php5-pspell_5.2.0-8+etch11_alpha.deb stable/main/binary-alpha/php5-cli_5.2.0-8+etch11_alpha.deb stable/main/binary-alpha/php5-pgsql_5.2.0-8+etch11_alpha.deb stable/main/binary-alpha/php5-xsl_5.2.0-8+etch11_alpha.deb stable/main/binary-alpha/php5-sybase_5.2.0-8+etch11_alpha.deb php5 (5.2.0-8+etch11) stable-security; urgency=high * Upload to etch for security issues. * The following security issues are addressed with this update: - CVE-2007-3806: glob denial of service - CVE-2008-1384: integer overflow in printf() - CVE-2008-2050: possible stack buffer overflow in the FastCGI SAPI - CVE-2008-2051: incomplete multibyte chars inside escapeshellcmd() closes: #479723 stable/main/binary-i386/php5-recode_5.2.0-8+etch11_i386.deb stable/main/binary-i386/libapache2-mod-php5_5.2.0-8+etch11_i386.deb stable/main/binary-i386/php5-sqlite_5.2.0-8+etch11_i386.deb stable/main/binary-i386/php5-odbc_5.2.0-8+etch11_i386.deb stable/main/binary-i386/php5-gd_5.2.0-8+etch11_i386.deb stable/main/binary-i386/libapache-mod-php5_5.2.0-8+etch11_i386.deb stable/main/binary-i386/php5-dev_5.2.0-8+etch11_i386.deb stable/main/source/php5_5.2.0-8+etch11.diff.gz stable/main/binary-i386/php5-mcrypt_5.2.0-8+etch11_i386.deb stable/main/binary-i386/php5-snmp_5.2.0-8+etch11_i386.deb stable/main/binary-i386/php5-common_5.2.0-8+etch11_i386.deb stable/main/binary-all/php5_5.2.0-8+etch11_all.deb stable/main/source/php5_5.2.0-8+etch11.dsc stable/main/binary-i386/php5-pspell_5.2.0-8+etch11_i386.deb stable/main/binary-i386/php5-pgsql_5.2.0-8+etch11_i386.deb stable/main/binary-i386/php5-interbase_5.2.0-8+etch11_i386.deb stable/main/binary-i386/php5-mysql_5.2.0-8+etch11_i386.deb stable/main/binary-i386/php5-cli_5.2.0-8+etch11_i386.deb stable/main/binary-i386/php5-imap_5.2.0-8+etch11_i386.deb stable/main/binary-i386/php5-xmlrpc_5.2.0-8+etch11_i386.deb stable/main/binary-i386/php5-cgi_5.2.0-8+etch11_i386.deb stable/main/binary-i386/php5-xsl_5.2.0-8+etch11_i386.deb stable/main/binary-i386/php5-curl_5.2.0-8+etch11_i386.deb stable/main/binary-i386/php5-sybase_5.2.0-8+etch11_i386.deb stable/main/binary-all/php-pear_5.2.0-8+etch11_all.deb stable/main/binary-i386/php5-tidy_5.2.0-8+etch11_i386.deb stable/main/binary-i386/php5-ldap_5.2.0-8+etch11_i386.deb stable/main/binary-i386/php5-mhash_5.2.0-8+etch11_i386.deb php5 (5.2.0-8+etch11) stable-security; urgency=high * Upload to etch for security issues. * The following security issues are addressed with this update: - CVE-2007-3806: glob denial of service - CVE-2008-1384: integer overflow in printf() - CVE-2008-2050: possible stack buffer overflow in the FastCGI SAPI - CVE-2008-2051: incomplete multibyte chars inside escapeshellcmd() closes: #479723 php5 (5.2.0-8+etch11~p1) stable; urgency=high * zend_parse_parameters does not handle size_t's, causing issues with 043-recode_size_t.patch and segmentation faults for recode-using pages. changed problematic parameters back to "int" and added an overflow check. thanks to Thomas Stegbauer, Tim Dijkstra, Bart Cortooms, Sebastian Göbel, and Vincent Tondellier for their reports. closes: #459020. stable/main/binary-sparc/php4-domxml_4.4.4-8+etch6_sparc.deb stable/main/binary-sparc/php4-recode_4.4.4-8+etch6_sparc.deb stable/main/binary-sparc/php4-odbc_4.4.4-8+etch6_sparc.deb stable/main/binary-sparc/php4-sybase_4.4.4-8+etch6_sparc.deb stable/main/binary-sparc/libapache2-mod-php4_4.4.4-8+etch6_sparc.deb stable/main/binary-sparc/php4-pgsql_4.4.4-8+etch6_sparc.deb stable/main/binary-sparc/php4-gd_4.4.4-8+etch6_sparc.deb stable/main/binary-sparc/php4-mysql_4.4.4-8+etch6_sparc.deb stable/main/binary-sparc/php4-pspell_4.4.4-8+etch6_sparc.deb stable/main/binary-sparc/php4-mcal_4.4.4-8+etch6_sparc.deb stable/main/binary-sparc/php4-mcrypt_4.4.4-8+etch6_sparc.deb stable/main/binary-sparc/php4-mhash_4.4.4-8+etch6_sparc.deb stable/main/binary-sparc/php4-cli_4.4.4-8+etch6_sparc.deb stable/main/binary-sparc/php4-ldap_4.4.4-8+etch6_sparc.deb stable/main/binary-sparc/php4-imap_4.4.4-8+etch6_sparc.deb stable/main/binary-sparc/php4-snmp_4.4.4-8+etch6_sparc.deb stable/main/binary-sparc/php4-cgi_4.4.4-8+etch6_sparc.deb stable/main/binary-sparc/php4-common_4.4.4-8+etch6_sparc.deb stable/main/binary-sparc/php4-curl_4.4.4-8+etch6_sparc.deb stable/main/binary-sparc/php4-xslt_4.4.4-8+etch6_sparc.deb stable/main/binary-sparc/libapache-mod-php4_4.4.4-8+etch6_sparc.deb stable/main/binary-sparc/php4-dev_4.4.4-8+etch6_sparc.deb php4 (6:4.4.4-8+etch6) stable-security; urgency=low * NMU prepared for the security team by the package maintainer. * The following security issues are addressed with this update: - CVE-2007-3806: glob denial of service - CVE-2007-3998: vulnerability in wordwrap - CVE-2008-2051: incomplete multibyte chars inside escapeshellcmd() stable/main/binary-s390/libapache2-mod-php4_4.4.4-8+etch6_s390.deb stable/main/binary-s390/php4-xslt_4.4.4-8+etch6_s390.deb stable/main/binary-s390/php4-pspell_4.4.4-8+etch6_s390.deb stable/main/binary-s390/php4-domxml_4.4.4-8+etch6_s390.deb stable/main/binary-s390/php4-snmp_4.4.4-8+etch6_s390.deb stable/main/binary-s390/php4-mhash_4.4.4-8+etch6_s390.deb stable/main/binary-s390/php4-cli_4.4.4-8+etch6_s390.deb stable/main/binary-s390/php4-recode_4.4.4-8+etch6_s390.deb stable/main/binary-s390/php4-odbc_4.4.4-8+etch6_s390.deb stable/main/binary-s390/php4-sybase_4.4.4-8+etch6_s390.deb stable/main/binary-s390/php4-common_4.4.4-8+etch6_s390.deb stable/main/binary-s390/php4-mysql_4.4.4-8+etch6_s390.deb stable/main/binary-s390/php4-ldap_4.4.4-8+etch6_s390.deb stable/main/binary-s390/php4-curl_4.4.4-8+etch6_s390.deb stable/main/binary-s390/php4-dev_4.4.4-8+etch6_s390.deb stable/main/binary-s390/libapache-mod-php4_4.4.4-8+etch6_s390.deb stable/main/binary-s390/php4-imap_4.4.4-8+etch6_s390.deb stable/main/binary-s390/php4-cgi_4.4.4-8+etch6_s390.deb stable/main/binary-s390/php4-mcrypt_4.4.4-8+etch6_s390.deb stable/main/binary-s390/php4-pgsql_4.4.4-8+etch6_s390.deb stable/main/binary-s390/php4-mcal_4.4.4-8+etch6_s390.deb stable/main/binary-s390/php4-gd_4.4.4-8+etch6_s390.deb php4 (6:4.4.4-8+etch6) stable-security; urgency=low * NMU prepared for the security team by the package maintainer. * The following security issues are addressed with this update: - CVE-2007-3806: glob denial of service - CVE-2007-3998: vulnerability in wordwrap - CVE-2008-2051: incomplete multibyte chars inside escapeshellcmd() stable/main/binary-powerpc/php4-gd_4.4.4-8+etch6_powerpc.deb stable/main/binary-powerpc/libapache-mod-php4_4.4.4-8+etch6_powerpc.deb stable/main/binary-powerpc/php4-mcal_4.4.4-8+etch6_powerpc.deb stable/main/binary-powerpc/libapache2-mod-php4_4.4.4-8+etch6_powerpc.deb stable/main/binary-powerpc/php4-domxml_4.4.4-8+etch6_powerpc.deb stable/main/binary-powerpc/php4-ldap_4.4.4-8+etch6_powerpc.deb stable/main/binary-powerpc/php4-imap_4.4.4-8+etch6_powerpc.deb stable/main/binary-powerpc/php4-xslt_4.4.4-8+etch6_powerpc.deb stable/main/binary-powerpc/php4-common_4.4.4-8+etch6_powerpc.deb stable/main/binary-powerpc/php4-recode_4.4.4-8+etch6_powerpc.deb stable/main/binary-powerpc/php4-sybase_4.4.4-8+etch6_powerpc.deb stable/main/binary-powerpc/php4-pgsql_4.4.4-8+etch6_powerpc.deb stable/main/binary-powerpc/php4-mcrypt_4.4.4-8+etch6_powerpc.deb stable/main/binary-powerpc/php4-cgi_4.4.4-8+etch6_powerpc.deb stable/main/binary-powerpc/php4-mhash_4.4.4-8+etch6_powerpc.deb stable/main/binary-powerpc/php4-cli_4.4.4-8+etch6_powerpc.deb stable/main/binary-powerpc/php4-pspell_4.4.4-8+etch6_powerpc.deb stable/main/binary-powerpc/php4-mysql_4.4.4-8+etch6_powerpc.deb stable/main/binary-powerpc/php4-curl_4.4.4-8+etch6_powerpc.deb stable/main/binary-powerpc/php4-snmp_4.4.4-8+etch6_powerpc.deb stable/main/binary-powerpc/php4-dev_4.4.4-8+etch6_powerpc.deb stable/main/binary-powerpc/php4-odbc_4.4.4-8+etch6_powerpc.deb php4 (6:4.4.4-8+etch6) stable-security; urgency=low * NMU prepared for the security team by the package maintainer. * The following security issues are addressed with this update: - CVE-2007-3806: glob denial of service - CVE-2007-3998: vulnerability in wordwrap - CVE-2008-2051: incomplete multibyte chars inside escapeshellcmd() stable/main/binary-mipsel/php4-odbc_4.4.4-8+etch6_mipsel.deb stable/main/binary-mipsel/php4-recode_4.4.4-8+etch6_mipsel.deb stable/main/binary-mipsel/php4-sybase_4.4.4-8+etch6_mipsel.deb stable/main/binary-mipsel/php4-domxml_4.4.4-8+etch6_mipsel.deb stable/main/binary-mipsel/php4-pspell_4.4.4-8+etch6_mipsel.deb stable/main/binary-mipsel/php4-gd_4.4.4-8+etch6_mipsel.deb stable/main/binary-mipsel/php4-snmp_4.4.4-8+etch6_mipsel.deb stable/main/binary-mipsel/php4-cgi_4.4.4-8+etch6_mipsel.deb stable/main/binary-mipsel/libapache-mod-php4_4.4.4-8+etch6_mipsel.deb stable/main/binary-mipsel/php4-mcrypt_4.4.4-8+etch6_mipsel.deb stable/main/binary-mipsel/php4-mcal_4.4.4-8+etch6_mipsel.deb stable/main/binary-mipsel/php4-cli_4.4.4-8+etch6_mipsel.deb stable/main/binary-mipsel/php4-mhash_4.4.4-8+etch6_mipsel.deb stable/main/binary-mipsel/php4-ldap_4.4.4-8+etch6_mipsel.deb stable/main/binary-mipsel/libapache2-mod-php4_4.4.4-8+etch6_mipsel.deb stable/main/binary-mipsel/php4-common_4.4.4-8+etch6_mipsel.deb stable/main/binary-mipsel/php4-pgsql_4.4.4-8+etch6_mipsel.deb stable/main/binary-mipsel/php4-xslt_4.4.4-8+etch6_mipsel.deb stable/main/binary-mipsel/php4-dev_4.4.4-8+etch6_mipsel.deb stable/main/binary-mipsel/php4-curl_4.4.4-8+etch6_mipsel.deb stable/main/binary-mipsel/php4-imap_4.4.4-8+etch6_mipsel.deb stable/main/binary-mipsel/php4-mysql_4.4.4-8+etch6_mipsel.deb php4 (6:4.4.4-8+etch6) stable-security; urgency=low * NMU prepared for the security team by the package maintainer. * The following security issues are addressed with this update: - CVE-2007-3806: glob denial of service - CVE-2007-3998: vulnerability in wordwrap - CVE-2008-2051: incomplete multibyte chars inside escapeshellcmd() stable/main/binary-mips/php4-mcal_4.4.4-8+etch6_mips.deb stable/main/binary-mips/php4-imap_4.4.4-8+etch6_mips.deb stable/main/binary-mips/php4-pspell_4.4.4-8+etch6_mips.deb stable/main/binary-mips/php4-cli_4.4.4-8+etch6_mips.deb stable/main/binary-mips/php4-dev_4.4.4-8+etch6_mips.deb stable/main/binary-mips/php4-mysql_4.4.4-8+etch6_mips.deb stable/main/binary-mips/php4-gd_4.4.4-8+etch6_mips.deb stable/main/binary-mips/php4-recode_4.4.4-8+etch6_mips.deb stable/main/binary-mips/php4-ldap_4.4.4-8+etch6_mips.deb stable/main/binary-mips/php4-snmp_4.4.4-8+etch6_mips.deb stable/main/binary-mips/php4-pgsql_4.4.4-8+etch6_mips.deb stable/main/binary-mips/php4-mcrypt_4.4.4-8+etch6_mips.deb stable/main/binary-mips/php4-domxml_4.4.4-8+etch6_mips.deb stable/main/binary-mips/php4-odbc_4.4.4-8+etch6_mips.deb stable/main/binary-mips/php4-mhash_4.4.4-8+etch6_mips.deb stable/main/binary-mips/php4-common_4.4.4-8+etch6_mips.deb stable/main/binary-mips/php4-cgi_4.4.4-8+etch6_mips.deb stable/main/binary-mips/php4-xslt_4.4.4-8+etch6_mips.deb stable/main/binary-mips/php4-sybase_4.4.4-8+etch6_mips.deb stable/main/binary-mips/libapache2-mod-php4_4.4.4-8+etch6_mips.deb stable/main/binary-mips/php4-curl_4.4.4-8+etch6_mips.deb stable/main/binary-mips/libapache-mod-php4_4.4.4-8+etch6_mips.deb php4 (6:4.4.4-8+etch6) stable-security; urgency=low * NMU prepared for the security team by the package maintainer. * The following security issues are addressed with this update: - CVE-2007-3806: glob denial of service - CVE-2007-3998: vulnerability in wordwrap - CVE-2008-2051: incomplete multibyte chars inside escapeshellcmd() stable/main/binary-ia64/php4-pspell_4.4.4-8+etch6_ia64.deb stable/main/binary-ia64/php4-xslt_4.4.4-8+etch6_ia64.deb stable/main/binary-ia64/php4-curl_4.4.4-8+etch6_ia64.deb stable/main/binary-ia64/php4-recode_4.4.4-8+etch6_ia64.deb stable/main/binary-ia64/php4-snmp_4.4.4-8+etch6_ia64.deb stable/main/binary-ia64/php4-cgi_4.4.4-8+etch6_ia64.deb stable/main/binary-ia64/php4-mysql_4.4.4-8+etch6_ia64.deb stable/main/binary-ia64/php4-imap_4.4.4-8+etch6_ia64.deb stable/main/binary-ia64/php4-ldap_4.4.4-8+etch6_ia64.deb stable/main/binary-ia64/php4-sybase_4.4.4-8+etch6_ia64.deb stable/main/binary-ia64/php4-gd_4.4.4-8+etch6_ia64.deb stable/main/binary-ia64/php4-cli_4.4.4-8+etch6_ia64.deb stable/main/binary-ia64/libapache-mod-php4_4.4.4-8+etch6_ia64.deb stable/main/binary-ia64/php4-mcrypt_4.4.4-8+etch6_ia64.deb stable/main/binary-ia64/php4-mcal_4.4.4-8+etch6_ia64.deb stable/main/binary-ia64/php4-mhash_4.4.4-8+etch6_ia64.deb stable/main/binary-ia64/libapache2-mod-php4_4.4.4-8+etch6_ia64.deb stable/main/binary-ia64/php4-domxml_4.4.4-8+etch6_ia64.deb stable/main/binary-ia64/php4-dev_4.4.4-8+etch6_ia64.deb stable/main/binary-ia64/php4-pgsql_4.4.4-8+etch6_ia64.deb stable/main/binary-ia64/php4-odbc_4.4.4-8+etch6_ia64.deb stable/main/binary-ia64/php4-common_4.4.4-8+etch6_ia64.deb php4 (6:4.4.4-8+etch6) stable-security; urgency=low * NMU prepared for the security team by the package maintainer. * The following security issues are addressed with this update: - CVE-2007-3806: glob denial of service - CVE-2007-3998: vulnerability in wordwrap - CVE-2008-2051: incomplete multibyte chars inside escapeshellcmd() stable/main/binary-i386/php4-cgi_4.4.4-8+etch6_i386.deb stable/main/binary-i386/php4-mcrypt_4.4.4-8+etch6_i386.deb stable/main/binary-i386/php4-pgsql_4.4.4-8+etch6_i386.deb stable/main/binary-i386/php4-curl_4.4.4-8+etch6_i386.deb stable/main/binary-i386/php4-cli_4.4.4-8+etch6_i386.deb stable/main/binary-i386/php4-mhash_4.4.4-8+etch6_i386.deb stable/main/binary-i386/libapache-mod-php4_4.4.4-8+etch6_i386.deb stable/main/binary-i386/php4-mysql_4.4.4-8+etch6_i386.deb stable/main/binary-i386/php4-mcal_4.4.4-8+etch6_i386.deb stable/main/binary-i386/libapache2-mod-php4_4.4.4-8+etch6_i386.deb stable/main/binary-i386/php4-common_4.4.4-8+etch6_i386.deb stable/main/binary-i386/php4-odbc_4.4.4-8+etch6_i386.deb stable/main/binary-i386/php4-interbase_4.4.4-8+etch6_i386.deb stable/main/binary-i386/php4-ldap_4.4.4-8+etch6_i386.deb stable/main/binary-i386/php4-domxml_4.4.4-8+etch6_i386.deb stable/main/binary-i386/php4-gd_4.4.4-8+etch6_i386.deb stable/main/binary-i386/php4-sybase_4.4.4-8+etch6_i386.deb stable/main/binary-i386/php4-imap_4.4.4-8+etch6_i386.deb stable/main/binary-i386/php4-snmp_4.4.4-8+etch6_i386.deb stable/main/binary-i386/php4-recode_4.4.4-8+etch6_i386.deb stable/main/binary-i386/php4-dev_4.4.4-8+etch6_i386.deb stable/main/binary-i386/php4-pspell_4.4.4-8+etch6_i386.deb stable/main/binary-i386/php4-xslt_4.4.4-8+etch6_i386.deb php4 (6:4.4.4-8+etch6) stable-security; urgency=low * NMU prepared for the security team by the package maintainer. * The following security issues are addressed with this update: - CVE-2007-3806: glob denial of service - CVE-2007-3998: vulnerability in wordwrap - CVE-2008-2051: incomplete multibyte chars inside escapeshellcmd() stable/main/binary-hppa/php4-mcrypt_4.4.4-8+etch6_hppa.deb stable/main/binary-hppa/php4-imap_4.4.4-8+etch6_hppa.deb stable/main/binary-hppa/php4-recode_4.4.4-8+etch6_hppa.deb stable/main/binary-hppa/php4-snmp_4.4.4-8+etch6_hppa.deb stable/main/binary-hppa/php4-common_4.4.4-8+etch6_hppa.deb stable/main/binary-hppa/php4-sybase_4.4.4-8+etch6_hppa.deb stable/main/binary-hppa/php4-curl_4.4.4-8+etch6_hppa.deb stable/main/binary-hppa/php4-cgi_4.4.4-8+etch6_hppa.deb stable/main/binary-hppa/php4-mhash_4.4.4-8+etch6_hppa.deb stable/main/binary-hppa/php4-dev_4.4.4-8+etch6_hppa.deb stable/main/binary-hppa/php4-xslt_4.4.4-8+etch6_hppa.deb stable/main/binary-hppa/php4-domxml_4.4.4-8+etch6_hppa.deb stable/main/binary-hppa/php4-gd_4.4.4-8+etch6_hppa.deb stable/main/binary-hppa/php4-pspell_4.4.4-8+etch6_hppa.deb stable/main/binary-hppa/php4-mcal_4.4.4-8+etch6_hppa.deb stable/main/binary-hppa/libapache2-mod-php4_4.4.4-8+etch6_hppa.deb stable/main/binary-hppa/php4-ldap_4.4.4-8+etch6_hppa.deb stable/main/binary-hppa/libapache-mod-php4_4.4.4-8+etch6_hppa.deb stable/main/binary-hppa/php4-odbc_4.4.4-8+etch6_hppa.deb stable/main/binary-hppa/php4-mysql_4.4.4-8+etch6_hppa.deb stable/main/binary-hppa/php4-pgsql_4.4.4-8+etch6_hppa.deb stable/main/binary-hppa/php4-cli_4.4.4-8+etch6_hppa.deb php4 (6:4.4.4-8+etch6) stable-security; urgency=low * NMU prepared for the security team by the package maintainer. * The following security issues are addressed with this update: - CVE-2007-3806: glob denial of service - CVE-2007-3998: vulnerability in wordwrap - CVE-2008-2051: incomplete multibyte chars inside escapeshellcmd() stable/main/binary-arm/libapache-mod-php4_4.4.4-8+etch6_arm.deb stable/main/binary-arm/php4-gd_4.4.4-8+etch6_arm.deb stable/main/binary-arm/php4-pspell_4.4.4-8+etch6_arm.deb stable/main/binary-arm/php4-xslt_4.4.4-8+etch6_arm.deb stable/main/binary-arm/libapache2-mod-php4_4.4.4-8+etch6_arm.deb stable/main/binary-arm/php4-common_4.4.4-8+etch6_arm.deb stable/main/binary-arm/php4-odbc_4.4.4-8+etch6_arm.deb stable/main/binary-arm/php4-mysql_4.4.4-8+etch6_arm.deb stable/main/binary-arm/php4-curl_4.4.4-8+etch6_arm.deb stable/main/binary-arm/php4-imap_4.4.4-8+etch6_arm.deb stable/main/binary-arm/php4-pgsql_4.4.4-8+etch6_arm.deb stable/main/binary-arm/php4-ldap_4.4.4-8+etch6_arm.deb stable/main/binary-arm/php4-mhash_4.4.4-8+etch6_arm.deb stable/main/binary-arm/php4-snmp_4.4.4-8+etch6_arm.deb stable/main/binary-arm/php4-cli_4.4.4-8+etch6_arm.deb stable/main/binary-arm/php4-cgi_4.4.4-8+etch6_arm.deb stable/main/binary-arm/php4-recode_4.4.4-8+etch6_arm.deb stable/main/binary-arm/php4-mcrypt_4.4.4-8+etch6_arm.deb stable/main/binary-arm/php4-mcal_4.4.4-8+etch6_arm.deb stable/main/binary-arm/php4-dev_4.4.4-8+etch6_arm.deb stable/main/binary-arm/php4-domxml_4.4.4-8+etch6_arm.deb stable/main/binary-arm/php4-sybase_4.4.4-8+etch6_arm.deb php4 (6:4.4.4-8+etch6) stable-security; urgency=low * NMU prepared for the security team by the package maintainer. * The following security issues are addressed with this update: - CVE-2007-3806: glob denial of service - CVE-2007-3998: vulnerability in wordwrap - CVE-2008-2051: incomplete multibyte chars inside escapeshellcmd() stable/main/binary-alpha/php4-xslt_4.4.4-8+etch6_alpha.deb stable/main/binary-alpha/libapache2-mod-php4_4.4.4-8+etch6_alpha.deb stable/main/binary-alpha/php4-cgi_4.4.4-8+etch6_alpha.deb stable/main/binary-alpha/libapache-mod-php4_4.4.4-8+etch6_alpha.deb stable/main/binary-alpha/php4-imap_4.4.4-8+etch6_alpha.deb stable/main/binary-alpha/php4-mcrypt_4.4.4-8+etch6_alpha.deb stable/main/binary-alpha/php4-odbc_4.4.4-8+etch6_alpha.deb stable/main/binary-alpha/php4-recode_4.4.4-8+etch6_alpha.deb stable/main/binary-alpha/php4-pspell_4.4.4-8+etch6_alpha.deb stable/main/binary-alpha/php4-mysql_4.4.4-8+etch6_alpha.deb stable/main/binary-alpha/php4-common_4.4.4-8+etch6_alpha.deb stable/main/binary-alpha/php4-gd_4.4.4-8+etch6_alpha.deb stable/main/binary-alpha/php4-domxml_4.4.4-8+etch6_alpha.deb stable/main/binary-alpha/php4-pgsql_4.4.4-8+etch6_alpha.deb stable/main/binary-alpha/php4-cli_4.4.4-8+etch6_alpha.deb stable/main/binary-alpha/php4-curl_4.4.4-8+etch6_alpha.deb stable/main/binary-alpha/php4-mhash_4.4.4-8+etch6_alpha.deb stable/main/binary-alpha/php4-dev_4.4.4-8+etch6_alpha.deb stable/main/binary-alpha/php4-sybase_4.4.4-8+etch6_alpha.deb stable/main/binary-alpha/php4-mcal_4.4.4-8+etch6_alpha.deb stable/main/binary-alpha/php4-ldap_4.4.4-8+etch6_alpha.deb stable/main/binary-alpha/php4-snmp_4.4.4-8+etch6_alpha.deb php4 (6:4.4.4-8+etch6) stable-security; urgency=low * NMU prepared for the security team by the package maintainer. * The following security issues are addressed with this update: - CVE-2007-3806: glob denial of service - CVE-2007-3998: vulnerability in wordwrap - CVE-2008-2051: incomplete multibyte chars inside escapeshellcmd() stable/main/source/php4_4.4.4-8+etch6.dsc stable/main/binary-amd64/php4-sybase_4.4.4-8+etch6_amd64.deb stable/main/binary-amd64/php4-interbase_4.4.4-8+etch6_amd64.deb stable/main/binary-amd64/php4-common_4.4.4-8+etch6_amd64.deb stable/main/binary-amd64/libapache-mod-php4_4.4.4-8+etch6_amd64.deb stable/main/binary-amd64/php4-curl_4.4.4-8+etch6_amd64.deb stable/main/binary-all/php4-pear_4.4.4-8+etch6_all.deb stable/main/binary-amd64/php4-odbc_4.4.4-8+etch6_amd64.deb stable/main/binary-amd64/php4-ldap_4.4.4-8+etch6_amd64.deb stable/main/binary-amd64/php4-cli_4.4.4-8+etch6_amd64.deb stable/main/binary-amd64/php4-mcrypt_4.4.4-8+etch6_amd64.deb stable/main/binary-amd64/php4-imap_4.4.4-8+etch6_amd64.deb stable/main/binary-amd64/php4-xslt_4.4.4-8+etch6_amd64.deb stable/main/binary-amd64/php4-pgsql_4.4.4-8+etch6_amd64.deb stable/main/binary-amd64/php4-cgi_4.4.4-8+etch6_amd64.deb stable/main/binary-amd64/php4-mysql_4.4.4-8+etch6_amd64.deb stable/main/binary-amd64/php4-snmp_4.4.4-8+etch6_amd64.deb stable/main/binary-amd64/php4-recode_4.4.4-8+etch6_amd64.deb stable/main/binary-amd64/php4-domxml_4.4.4-8+etch6_amd64.deb stable/main/binary-amd64/php4-gd_4.4.4-8+etch6_amd64.deb stable/main/binary-amd64/libapache2-mod-php4_4.4.4-8+etch6_amd64.deb stable/main/binary-amd64/php4-mhash_4.4.4-8+etch6_amd64.deb stable/main/binary-amd64/php4-mcal_4.4.4-8+etch6_amd64.deb stable/main/binary-amd64/php4-dev_4.4.4-8+etch6_amd64.deb stable/main/binary-amd64/php4-pspell_4.4.4-8+etch6_amd64.deb stable/main/binary-all/php4_4.4.4-8+etch6_all.deb stable/main/source/php4_4.4.4-8+etch6.diff.gz php4 (6:4.4.4-8+etch6) stable-security; urgency=low * NMU prepared for the security team by the package maintainer. * The following security issues are addressed with this update: - CVE-2007-3806: glob denial of service - CVE-2007-3998: vulnerability in wordwrap - CVE-2008-2051: incomplete multibyte chars inside escapeshellcmd() stable/main/binary-sparc/perl-base_5.8.8-7etch3_sparc.deb stable/main/binary-sparc/libperl-dev_5.8.8-7etch3_sparc.deb stable/main/binary-sparc/perl-debug_5.8.8-7etch3_sparc.deb stable/main/binary-sparc/perl_5.8.8-7etch3_sparc.deb stable/main/binary-sparc/libperl5.8_5.8.8-7etch3_sparc.deb stable/main/binary-sparc/perl-suid_5.8.8-7etch3_sparc.deb perl (5.8.8-7etch3) stable-security; urgency=high * Actually apply the patch to fix CVE-2008-1927, a heap overflow in the UTF-8 regexp compiler. Closes: #454792. stable/main/binary-s390/perl-debug_5.8.8-7etch3_s390.deb stable/main/binary-s390/perl-suid_5.8.8-7etch3_s390.deb stable/main/binary-s390/perl_5.8.8-7etch3_s390.deb stable/main/binary-s390/libperl-dev_5.8.8-7etch3_s390.deb stable/main/binary-s390/perl-base_5.8.8-7etch3_s390.deb stable/main/binary-s390/libperl5.8_5.8.8-7etch3_s390.deb perl (5.8.8-7etch3) stable-security; urgency=high * Actually apply the patch to fix CVE-2008-1927, a heap overflow in the UTF-8 regexp compiler. Closes: #454792. stable/main/binary-powerpc/perl-base_5.8.8-7etch3_powerpc.deb stable/main/binary-powerpc/perl-debug_5.8.8-7etch3_powerpc.deb stable/main/binary-powerpc/perl-suid_5.8.8-7etch3_powerpc.deb stable/main/binary-powerpc/libperl5.8_5.8.8-7etch3_powerpc.deb stable/main/binary-powerpc/libperl-dev_5.8.8-7etch3_powerpc.deb stable/main/binary-powerpc/perl_5.8.8-7etch3_powerpc.deb perl (5.8.8-7etch3) stable-security; urgency=high * Actually apply the patch to fix CVE-2008-1927, a heap overflow in the UTF-8 regexp compiler. Closes: #454792. stable/main/binary-mipsel/perl_5.8.8-7etch3_mipsel.deb stable/main/binary-mipsel/perl-debug_5.8.8-7etch3_mipsel.deb stable/main/binary-mipsel/libperl5.8_5.8.8-7etch3_mipsel.deb stable/main/binary-mipsel/perl-suid_5.8.8-7etch3_mipsel.deb stable/main/binary-mipsel/libperl-dev_5.8.8-7etch3_mipsel.deb stable/main/binary-mipsel/perl-base_5.8.8-7etch3_mipsel.deb perl (5.8.8-7etch3) stable-security; urgency=high * Actually apply the patch to fix CVE-2008-1927, a heap overflow in the UTF-8 regexp compiler. Closes: #454792. stable/main/binary-mips/perl-base_5.8.8-7etch3_mips.deb stable/main/binary-mips/perl-debug_5.8.8-7etch3_mips.deb stable/main/binary-mips/perl-suid_5.8.8-7etch3_mips.deb stable/main/binary-mips/perl_5.8.8-7etch3_mips.deb stable/main/binary-mips/libperl5.8_5.8.8-7etch3_mips.deb stable/main/binary-mips/libperl-dev_5.8.8-7etch3_mips.deb perl (5.8.8-7etch3) stable-security; urgency=high * Actually apply the patch to fix CVE-2008-1927, a heap overflow in the UTF-8 regexp compiler. Closes: #454792. stable/main/binary-ia64/libperl5.8_5.8.8-7etch3_ia64.deb stable/main/binary-ia64/perl-debug_5.8.8-7etch3_ia64.deb stable/main/binary-ia64/perl_5.8.8-7etch3_ia64.deb stable/main/binary-ia64/perl-suid_5.8.8-7etch3_ia64.deb stable/main/binary-ia64/libperl-dev_5.8.8-7etch3_ia64.deb stable/main/binary-ia64/perl-base_5.8.8-7etch3_ia64.deb perl (5.8.8-7etch3) stable-security; urgency=high * Actually apply the patch to fix CVE-2008-1927, a heap overflow in the UTF-8 regexp compiler. Closes: #454792. stable/main/binary-i386/libperl-dev_5.8.8-7etch3_i386.deb stable/main/binary-i386/perl_5.8.8-7etch3_i386.deb stable/main/binary-i386/perl-debug_5.8.8-7etch3_i386.deb stable/main/binary-i386/perl-base_5.8.8-7etch3_i386.deb stable/main/binary-i386/libperl5.8_5.8.8-7etch3_i386.deb stable/main/binary-i386/perl-suid_5.8.8-7etch3_i386.deb perl (5.8.8-7etch3) stable-security; urgency=high * Actually apply the patch to fix CVE-2008-1927, a heap overflow in the UTF-8 regexp compiler. Closes: #454792. stable/main/binary-hppa/libperl-dev_5.8.8-7etch3_hppa.deb stable/main/binary-hppa/perl-debug_5.8.8-7etch3_hppa.deb stable/main/binary-hppa/libperl5.8_5.8.8-7etch3_hppa.deb stable/main/binary-hppa/perl-suid_5.8.8-7etch3_hppa.deb stable/main/binary-hppa/perl_5.8.8-7etch3_hppa.deb stable/main/binary-hppa/perl-base_5.8.8-7etch3_hppa.deb perl (5.8.8-7etch3) stable-security; urgency=high * Actually apply the patch to fix CVE-2008-1927, a heap overflow in the UTF-8 regexp compiler. Closes: #454792. stable/main/binary-arm/perl_5.8.8-7etch3_arm.deb stable/main/binary-arm/perl-suid_5.8.8-7etch3_arm.deb stable/main/binary-arm/perl-debug_5.8.8-7etch3_arm.deb stable/main/binary-arm/perl-base_5.8.8-7etch3_arm.deb stable/main/binary-arm/libperl-dev_5.8.8-7etch3_arm.deb stable/main/binary-arm/libperl5.8_5.8.8-7etch3_arm.deb perl (5.8.8-7etch3) stable-security; urgency=high * Actually apply the patch to fix CVE-2008-1927, a heap overflow in the UTF-8 regexp compiler. Closes: #454792. stable/main/binary-alpha/perl_5.8.8-7etch3_alpha.deb stable/main/binary-alpha/perl-debug_5.8.8-7etch3_alpha.deb stable/main/binary-alpha/perl-base_5.8.8-7etch3_alpha.deb stable/main/binary-alpha/libperl5.8_5.8.8-7etch3_alpha.deb stable/main/binary-alpha/perl-suid_5.8.8-7etch3_alpha.deb stable/main/binary-alpha/libperl-dev_5.8.8-7etch3_alpha.deb perl (5.8.8-7etch3) stable-security; urgency=high * Actually apply the patch to fix CVE-2008-1927, a heap overflow in the UTF-8 regexp compiler. Closes: #454792. stable/main/source/perl_5.8.8-7etch3.dsc stable/main/binary-all/perl-modules_5.8.8-7etch3_all.deb stable/main/binary-amd64/perl-debug_5.8.8-7etch3_amd64.deb stable/main/binary-all/perl-doc_5.8.8-7etch3_all.deb stable/main/binary-amd64/libperl-dev_5.8.8-7etch3_amd64.deb stable/main/binary-amd64/perl_5.8.8-7etch3_amd64.deb stable/main/source/perl_5.8.8-7etch3.diff.gz stable/main/binary-amd64/perl-suid_5.8.8-7etch3_amd64.deb stable/main/binary-amd64/perl-base_5.8.8-7etch3_amd64.deb stable/main/binary-all/libcgi-fast-perl_5.8.8-7etch3_all.deb stable/main/binary-amd64/libperl5.8_5.8.8-7etch3_amd64.deb perl (5.8.8-7etch3) stable-security; urgency=high * Actually apply the patch to fix CVE-2008-1927, a heap overflow in the UTF-8 regexp compiler. Closes: #454792. stable/main/binary-sparc/peercast-servent_0.1217.toots.20060314-1etch1_sparc.deb stable/main/binary-sparc/libpeercast0_0.1217.toots.20060314-1etch1_sparc.deb stable/main/binary-sparc/libpeercast0-dev_0.1217.toots.20060314-1etch1_sparc.deb stable/main/binary-sparc/peercast_0.1217.toots.20060314-1etch1_sparc.deb peercast (0.1217.toots.20060314-1etch1) stable-security; urgency=low * Fixed CVE-2008-2040: | stack-based buffer overfow in the | HTTP::getAuthUserPass function leading | to remote DoS or arbitrary code execution | if peercast is configured to use http-basic | authentication Closes: #478573 Thanks to Nico Golde for reporting and fixing the issue. stable/main/binary-s390/peercast-servent_0.1217.toots.20060314-1etch1_s390.deb stable/main/binary-s390/libpeercast0_0.1217.toots.20060314-1etch1_s390.deb stable/main/binary-s390/libpeercast0-dev_0.1217.toots.20060314-1etch1_s390.deb stable/main/binary-s390/peercast_0.1217.toots.20060314-1etch1_s390.deb peercast (0.1217.toots.20060314-1etch1) stable-security; urgency=low * Fixed CVE-2008-2040: | stack-based buffer overfow in the | HTTP::getAuthUserPass function leading | to remote DoS or arbitrary code execution | if peercast is configured to use http-basic | authentication Closes: #478573 Thanks to Nico Golde for reporting and fixing the issue. stable/main/binary-powerpc/peercast_0.1217.toots.20060314-1etch1_powerpc.deb stable/main/binary-powerpc/libpeercast0-dev_0.1217.toots.20060314-1etch1_powerpc.deb stable/main/binary-powerpc/peercast-servent_0.1217.toots.20060314-1etch1_powerpc.deb stable/main/binary-powerpc/libpeercast0_0.1217.toots.20060314-1etch1_powerpc.deb peercast (0.1217.toots.20060314-1etch1) stable-security; urgency=low * Fixed CVE-2008-2040: | stack-based buffer overfow in the | HTTP::getAuthUserPass function leading | to remote DoS or arbitrary code execution | if peercast is configured to use http-basic | authentication Closes: #478573 Thanks to Nico Golde for reporting and fixing the issue. stable/main/binary-mipsel/libpeercast0_0.1217.toots.20060314-1etch1_mipsel.deb stable/main/binary-mipsel/peercast_0.1217.toots.20060314-1etch1_mipsel.deb stable/main/binary-mipsel/libpeercast0-dev_0.1217.toots.20060314-1etch1_mipsel.deb stable/main/binary-mipsel/peercast-servent_0.1217.toots.20060314-1etch1_mipsel.deb peercast (0.1217.toots.20060314-1etch1) stable-security; urgency=low * Fixed CVE-2008-2040: | stack-based buffer overfow in the | HTTP::getAuthUserPass function leading | to remote DoS or arbitrary code execution | if peercast is configured to use http-basic | authentication Closes: #478573 Thanks to Nico Golde for reporting and fixing the issue. stable/main/binary-mips/peercast_0.1217.toots.20060314-1etch1_mips.deb stable/main/binary-mips/libpeercast0-dev_0.1217.toots.20060314-1etch1_mips.deb stable/main/binary-mips/peercast-servent_0.1217.toots.20060314-1etch1_mips.deb stable/main/binary-mips/libpeercast0_0.1217.toots.20060314-1etch1_mips.deb peercast (0.1217.toots.20060314-1etch1) stable-security; urgency=low * Fixed CVE-2008-2040: | stack-based buffer overfow in the | HTTP::getAuthUserPass function leading | to remote DoS or arbitrary code execution | if peercast is configured to use http-basic | authentication Closes: #478573 Thanks to Nico Golde for reporting and fixing the issue. stable/main/binary-ia64/libpeercast0-dev_0.1217.toots.20060314-1etch1_ia64.deb stable/main/binary-ia64/libpeercast0_0.1217.toots.20060314-1etch1_ia64.deb stable/main/binary-ia64/peercast_0.1217.toots.20060314-1etch1_ia64.deb stable/main/binary-ia64/peercast-servent_0.1217.toots.20060314-1etch1_ia64.deb peercast (0.1217.toots.20060314-1etch1) stable-security; urgency=low * Fixed CVE-2008-2040: | stack-based buffer overfow in the | HTTP::getAuthUserPass function leading | to remote DoS or arbitrary code execution | if peercast is configured to use http-basic | authentication Closes: #478573 Thanks to Nico Golde for reporting and fixing the issue. stable/main/binary-i386/libpeercast0_0.1217.toots.20060314-1etch1_i386.deb stable/main/binary-i386/peercast-servent_0.1217.toots.20060314-1etch1_i386.deb stable/main/binary-i386/libpeercast0-dev_0.1217.toots.20060314-1etch1_i386.deb stable/main/binary-i386/peercast_0.1217.toots.20060314-1etch1_i386.deb peercast (0.1217.toots.20060314-1etch1) stable-security; urgency=low * Fixed CVE-2008-2040: | stack-based buffer overfow in the | HTTP::getAuthUserPass function leading | to remote DoS or arbitrary code execution | if peercast is configured to use http-basic | authentication Closes: #478573 Thanks to Nico Golde for reporting and fixing the issue. stable/main/binary-hppa/peercast_0.1217.toots.20060314-1etch1_hppa.deb stable/main/binary-hppa/libpeercast0_0.1217.toots.20060314-1etch1_hppa.deb stable/main/binary-hppa/libpeercast0-dev_0.1217.toots.20060314-1etch1_hppa.deb stable/main/binary-hppa/peercast-servent_0.1217.toots.20060314-1etch1_hppa.deb peercast (0.1217.toots.20060314-1etch1) stable-security; urgency=low * Fixed CVE-2008-2040: | stack-based buffer overfow in the | HTTP::getAuthUserPass function leading | to remote DoS or arbitrary code execution | if peercast is configured to use http-basic | authentication Closes: #478573 Thanks to Nico Golde for reporting and fixing the issue. stable/main/binary-arm/libpeercast0_0.1217.toots.20060314-1etch1_arm.deb stable/main/binary-arm/peercast-servent_0.1217.toots.20060314-1etch1_arm.deb stable/main/binary-arm/peercast_0.1217.toots.20060314-1etch1_arm.deb stable/main/binary-arm/libpeercast0-dev_0.1217.toots.20060314-1etch1_arm.deb peercast (0.1217.toots.20060314-1etch1) stable-security; urgency=low * Fixed CVE-2008-2040: | stack-based buffer overfow in the | HTTP::getAuthUserPass function leading | to remote DoS or arbitrary code execution | if peercast is configured to use http-basic | authentication Closes: #478573 Thanks to Nico Golde for reporting and fixing the issue. stable/main/binary-alpha/libpeercast0_0.1217.toots.20060314-1etch1_alpha.deb stable/main/binary-alpha/peercast_0.1217.toots.20060314-1etch1_alpha.deb stable/main/binary-alpha/peercast-servent_0.1217.toots.20060314-1etch1_alpha.deb stable/main/binary-alpha/libpeercast0-dev_0.1217.toots.20060314-1etch1_alpha.deb peercast (0.1217.toots.20060314-1etch1) stable-security; urgency=low * Fixed CVE-2008-2040: | stack-based buffer overfow in the | HTTP::getAuthUserPass function leading | to remote DoS or arbitrary code execution | if peercast is configured to use http-basic | authentication Closes: #478573 Thanks to Nico Golde for reporting and fixing the issue. stable/main/source/peercast_0.1217.toots.20060314-1etch1.dsc stable/main/binary-all/peercast-handlers_0.1217.toots.20060314-1etch1_all.deb stable/main/binary-amd64/peercast-servent_0.1217.toots.20060314-1etch1_amd64.deb stable/main/binary-amd64/libpeercast0-dev_0.1217.toots.20060314-1etch1_amd64.deb stable/main/binary-amd64/peercast_0.1217.toots.20060314-1etch1_amd64.deb stable/main/source/peercast_0.1217.toots.20060314-1etch1.diff.gz stable/main/binary-amd64/libpeercast0_0.1217.toots.20060314-1etch1_amd64.deb peercast (0.1217.toots.20060314-1etch1) stable-security; urgency=low * Fixed CVE-2008-2040: | stack-based buffer overfow in the | HTTP::getAuthUserPass function leading | to remote DoS or arbitrary code execution | if peercast is configured to use http-basic | authentication Closes: #478573 Thanks to Nico Golde for reporting and fixing the issue. stable/main/binary-s390/pdns-recursor_3.1.4-1+etch2_s390.deb pdns-recursor (3.1.4-1+etch2) stable-security; urgency=high * Use the strong PRNG for UDP source port numbers, too. * Change IP address of L.ROOT-SERVERS.NET. stable/main/binary-powerpc/pdns-recursor_3.1.4-1+etch2_powerpc.deb pdns-recursor (3.1.4-1+etch2) stable-security; urgency=high * Use the strong PRNG for UDP source port numbers, too. * Change IP address of L.ROOT-SERVERS.NET. stable/main/binary-ia64/pdns-recursor_3.1.4-1+etch2_ia64.deb pdns-recursor (3.1.4-1+etch2) stable-security; urgency=high * Use the strong PRNG for UDP source port numbers, too. * Change IP address of L.ROOT-SERVERS.NET. stable/main/binary-i386/pdns-recursor_3.1.4-1+etch2_i386.deb pdns-recursor (3.1.4-1+etch2) stable-security; urgency=high * Use the strong PRNG for UDP source port numbers, too. * Change IP address of L.ROOT-SERVERS.NET. stable/main/binary-alpha/pdns-recursor_3.1.4-1+etch2_alpha.deb pdns-recursor (3.1.4-1+etch2) stable-security; urgency=high * Use the strong PRNG for UDP source port numbers, too. * Change IP address of L.ROOT-SERVERS.NET. stable/main/source/pdns-recursor_3.1.4-1+etch2.diff.gz stable/main/binary-amd64/pdns-recursor_3.1.4-1+etch2_amd64.deb stable/main/source/pdns-recursor_3.1.4-1+etch2.dsc pdns-recursor (3.1.4-1+etch2) stable-security; urgency=high * Use the strong PRNG for UDP source port numbers, too. * Change IP address of L.ROOT-SERVERS.NET. stable/main/binary-sparc/pdftohtml_0.36-13etch1_sparc.deb pdftohtml (0.36-13etch1) stable; urgency=high * same as 0.36-14 * pdftohtml is now a transitional package; it exists only to ease the transition to poppler-utils, as it now provides a pdftohtml implementation and will be easier to maintain security-wise. stable/main/binary-s390/pdftohtml_0.36-13etch1_s390.deb pdftohtml (0.36-13etch1) stable; urgency=high * same as 0.36-14 * pdftohtml is now a transitional package; it exists only to ease the transition to poppler-utils, as it now provides a pdftohtml implementation and will be easier to maintain security-wise. stable/main/binary-powerpc/pdftohtml_0.36-13etch1_powerpc.deb pdftohtml (0.36-13etch1) stable; urgency=high * same as 0.36-14 * pdftohtml is now a transitional package; it exists only to ease the transition to poppler-utils, as it now provides a pdftohtml implementation and will be easier to maintain security-wise. stable/main/binary-mipsel/pdftohtml_0.36-13etch1_mipsel.deb pdftohtml (0.36-13etch1) stable; urgency=high * same as 0.36-14 * pdftohtml is now a transitional package; it exists only to ease the transition to poppler-utils, as it now provides a pdftohtml implementation and will be easier to maintain security-wise. stable/main/binary-mips/pdftohtml_0.36-13etch1_mips.deb pdftohtml (0.36-13etch1) stable; urgency=high * same as 0.36-14 * pdftohtml is now a transitional package; it exists only to ease the transition to poppler-utils, as it now provides a pdftohtml implementation and will be easier to maintain security-wise. stable/main/binary-ia64/pdftohtml_0.36-13etch1_ia64.deb pdftohtml (0.36-13etch1) stable; urgency=high * same as 0.36-14 * pdftohtml is now a transitional package; it exists only to ease the transition to poppler-utils, as it now provides a pdftohtml implementation and will be easier to maintain security-wise. stable/main/binary-hppa/pdftohtml_0.36-13etch1_hppa.deb pdftohtml (0.36-13etch1) stable; urgency=high * same as 0.36-14 * pdftohtml is now a transitional package; it exists only to ease the transition to poppler-utils, as it now provides a pdftohtml implementation and will be easier to maintain security-wise. stable/main/binary-arm/pdftohtml_0.36-13etch1_arm.deb pdftohtml (0.36-13etch1) stable; urgency=high * same as 0.36-14 * pdftohtml is now a transitional package; it exists only to ease the transition to poppler-utils, as it now provides a pdftohtml implementation and will be easier to maintain security-wise. stable/main/binary-amd64/pdftohtml_0.36-13etch1_amd64.deb pdftohtml (0.36-13etch1) stable; urgency=high * same as 0.36-14 * pdftohtml is now a transitional package; it exists only to ease the transition to poppler-utils, as it now provides a pdftohtml implementation and will be easier to maintain security-wise. stable/main/binary-alpha/pdftohtml_0.36-13etch1_alpha.deb pdftohtml (0.36-13etch1) stable; urgency=high * same as 0.36-14 * pdftohtml is now a transitional package; it exists only to ease the transition to poppler-utils, as it now provides a pdftohtml implementation and will be easier to maintain security-wise. stable/main/source/pdftohtml_0.36-13etch1.dsc stable/main/source/pdftohtml_0.36-13etch1.diff.gz stable/main/binary-i386/pdftohtml_0.36-13etch1_i386.deb pdftohtml (0.36-13etch1) stable; urgency=high * same as 0.36-14 * pdftohtml is now a transitional package; it exists only to ease the transition to poppler-utils, as it now provides a pdftohtml implementation and will be easier to maintain security-wise. stable/main/binary-sparc/libpcre3_6.7+7.4-4_sparc.deb stable/main/binary-sparc/pcregrep_6.7+7.4-4_sparc.deb stable/main/binary-sparc/libpcre3-dev_6.7+7.4-4_sparc.deb stable/main/binary-sparc/libpcrecpp0_6.7+7.4-4_sparc.deb pcre3 (6.7+7.4-4) stable-security; urgency=high * Non-maintainer upload by the security team. * Apply patch from Tavis Ormandy to fix a heap overflow in the compiler, triggered by patterns which contain options and multiple branches (CVE-2008-2371). stable/main/binary-s390/libpcre3_6.7+7.4-4_s390.deb stable/main/binary-s390/libpcre3-dev_6.7+7.4-4_s390.deb stable/main/binary-s390/libpcrecpp0_6.7+7.4-4_s390.deb stable/main/binary-s390/pcregrep_6.7+7.4-4_s390.deb pcre3 (6.7+7.4-4) stable-security; urgency=high * Non-maintainer upload by the security team. * Apply patch from Tavis Ormandy to fix a heap overflow in the compiler, triggered by patterns which contain options and multiple branches (CVE-2008-2371). stable/main/binary-powerpc/libpcre3_6.7+7.4-4_powerpc.deb stable/main/binary-powerpc/libpcre3-dev_6.7+7.4-4_powerpc.deb stable/main/binary-powerpc/libpcrecpp0_6.7+7.4-4_powerpc.deb stable/main/binary-powerpc/pcregrep_6.7+7.4-4_powerpc.deb pcre3 (6.7+7.4-4) stable-security; urgency=high * Non-maintainer upload by the security team. * Apply patch from Tavis Ormandy to fix a heap overflow in the compiler, triggered by patterns which contain options and multiple branches (CVE-2008-2371). stable/main/binary-mipsel/libpcrecpp0_6.7+7.4-4_mipsel.deb stable/main/binary-mipsel/libpcre3-dev_6.7+7.4-4_mipsel.deb stable/main/binary-mipsel/libpcre3_6.7+7.4-4_mipsel.deb stable/main/binary-mipsel/pcregrep_6.7+7.4-4_mipsel.deb pcre3 (6.7+7.4-4) stable-security; urgency=high * Non-maintainer upload by the security team. * Apply patch from Tavis Ormandy to fix a heap overflow in the compiler, triggered by patterns which contain options and multiple branches (CVE-2008-2371). stable/main/binary-mips/libpcre3_6.7+7.4-4_mips.deb stable/main/binary-mips/libpcre3-dev_6.7+7.4-4_mips.deb stable/main/binary-mips/libpcrecpp0_6.7+7.4-4_mips.deb stable/main/binary-mips/pcregrep_6.7+7.4-4_mips.deb pcre3 (6.7+7.4-4) stable-security; urgency=high * Non-maintainer upload by the security team. * Apply patch from Tavis Ormandy to fix a heap overflow in the compiler, triggered by patterns which contain options and multiple branches (CVE-2008-2371). stable/main/binary-ia64/libpcre3_6.7+7.4-4_ia64.deb stable/main/binary-ia64/pcregrep_6.7+7.4-4_ia64.deb stable/main/binary-ia64/libpcre3-dev_6.7+7.4-4_ia64.deb stable/main/binary-ia64/libpcrecpp0_6.7+7.4-4_ia64.deb pcre3 (6.7+7.4-4) stable-security; urgency=high * Non-maintainer upload by the security team. * Apply patch from Tavis Ormandy to fix a heap overflow in the compiler, triggered by patterns which contain options and multiple branches (CVE-2008-2371). stable/main/binary-i386/libpcrecpp0_6.7+7.4-4_i386.deb stable/main/binary-i386/libpcre3-dev_6.7+7.4-4_i386.deb stable/main/binary-i386/libpcre3_6.7+7.4-4_i386.deb stable/main/binary-i386/pcregrep_6.7+7.4-4_i386.deb pcre3 (6.7+7.4-4) stable-security; urgency=high * Non-maintainer upload by the security team. * Apply patch from Tavis Ormandy to fix a heap overflow in the compiler, triggered by patterns which contain options and multiple branches (CVE-2008-2371). stable/main/binary-hppa/libpcrecpp0_6.7+7.4-4_hppa.deb stable/main/binary-hppa/libpcre3-dev_6.7+7.4-4_hppa.deb stable/main/binary-hppa/libpcre3_6.7+7.4-4_hppa.deb stable/main/binary-hppa/pcregrep_6.7+7.4-4_hppa.deb pcre3 (6.7+7.4-4) stable-security; urgency=high * Non-maintainer upload by the security team. * Apply patch from Tavis Ormandy to fix a heap overflow in the compiler, triggered by patterns which contain options and multiple branches (CVE-2008-2371). stable/main/binary-arm/libpcrecpp0_6.7+7.4-4_arm.deb stable/main/binary-arm/libpcre3_6.7+7.4-4_arm.deb stable/main/binary-arm/libpcre3-dev_6.7+7.4-4_arm.deb stable/main/binary-arm/pcregrep_6.7+7.4-4_arm.deb pcre3 (6.7+7.4-4) stable-security; urgency=high * Non-maintainer upload by the security team. * Apply patch from Tavis Ormandy to fix a heap overflow in the compiler, triggered by patterns which contain options and multiple branches (CVE-2008-2371). stable/main/binary-alpha/libpcre3_6.7+7.4-4_alpha.deb stable/main/binary-alpha/libpcrecpp0_6.7+7.4-4_alpha.deb stable/main/binary-alpha/libpcre3-dev_6.7+7.4-4_alpha.deb stable/main/binary-alpha/pcregrep_6.7+7.4-4_alpha.deb pcre3 (6.7+7.4-4) stable-security; urgency=high * Non-maintainer upload by the security team. * Apply patch from Tavis Ormandy to fix a heap overflow in the compiler, triggered by patterns which contain options and multiple branches (CVE-2008-2371). stable/main/source/pcre3_6.7+7.4-4.dsc stable/main/binary-amd64/libpcre3_6.7+7.4-4_amd64.deb stable/main/binary-amd64/libpcre3-dev_6.7+7.4-4_amd64.deb stable/main/binary-amd64/pcregrep_6.7+7.4-4_amd64.deb stable/main/binary-amd64/libpcrecpp0_6.7+7.4-4_amd64.deb stable/main/source/pcre3_6.7+7.4-4.diff.gz pcre3 (6.7+7.4-4) stable-security; urgency=high * Non-maintainer upload by the security team. * Apply patch from Tavis Ormandy to fix a heap overflow in the compiler, triggered by patterns which contain options and multiple branches (CVE-2008-2371). stable/main/source/partman-lvm_53etch1.dsc stable/main/binary-all/partman-lvm_53etch1_all.udeb stable/main/source/partman-lvm_53etch1.tar.gz partman-lvm (53etch1) stable; urgency=low * Do not only exclude /dev/md/X devices, but also /dev/mdX devices for LVM sync flag handling. This solves a bug where libparted can complain it cannot commit changes to a RAID device (for example #470374). stable/main/binary-sparc/openssl_0.9.8c-4etch3_sparc.deb stable/main/binary-sparc/libssl0.9.8-dbg_0.9.8c-4etch3_sparc.deb stable/main/binary-sparc/libcrypto0.9.8-udeb_0.9.8c-4etch3_sparc.udeb stable/main/binary-sparc/libssl0.9.8_0.9.8c-4etch3_sparc.deb stable/main/binary-sparc/libssl-dev_0.9.8c-4etch3_sparc.deb openssl (0.9.8c-4etch3) stable-security; urgency=high * Re-introducing seeding of the random number generator. Patch from the maintainer. stable/main/binary-s390/libcrypto0.9.8-udeb_0.9.8c-4etch3_s390.udeb stable/main/binary-s390/libssl0.9.8-dbg_0.9.8c-4etch3_s390.deb stable/main/binary-s390/openssl_0.9.8c-4etch3_s390.deb stable/main/binary-s390/libssl0.9.8_0.9.8c-4etch3_s390.deb stable/main/binary-s390/libssl-dev_0.9.8c-4etch3_s390.deb openssl (0.9.8c-4etch3) stable-security; urgency=high * Re-introducing seeding of the random number generator. Patch from the maintainer. stable/main/binary-powerpc/openssl_0.9.8c-4etch3_powerpc.deb stable/main/binary-powerpc/libssl0.9.8_0.9.8c-4etch3_powerpc.deb stable/main/binary-powerpc/libcrypto0.9.8-udeb_0.9.8c-4etch3_powerpc.udeb stable/main/binary-powerpc/libssl-dev_0.9.8c-4etch3_powerpc.deb stable/main/binary-powerpc/libssl0.9.8-dbg_0.9.8c-4etch3_powerpc.deb openssl (0.9.8c-4etch3) stable-security; urgency=high * Re-introducing seeding of the random number generator. Patch from the maintainer. stable/main/binary-mipsel/libcrypto0.9.8-udeb_0.9.8c-4etch3_mipsel.udeb stable/main/binary-mipsel/openssl_0.9.8c-4etch3_mipsel.deb stable/main/binary-mipsel/libssl-dev_0.9.8c-4etch3_mipsel.deb stable/main/binary-mipsel/libssl0.9.8_0.9.8c-4etch3_mipsel.deb stable/main/binary-mipsel/libssl0.9.8-dbg_0.9.8c-4etch3_mipsel.deb openssl (0.9.8c-4etch3) stable-security; urgency=high * Re-introducing seeding of the random number generator. Patch from the maintainer. stable/main/binary-mips/libcrypto0.9.8-udeb_0.9.8c-4etch3_mips.udeb stable/main/binary-mips/openssl_0.9.8c-4etch3_mips.deb stable/main/binary-mips/libssl0.9.8-dbg_0.9.8c-4etch3_mips.deb stable/main/binary-mips/libssl0.9.8_0.9.8c-4etch3_mips.deb stable/main/binary-mips/libssl-dev_0.9.8c-4etch3_mips.deb openssl (0.9.8c-4etch3) stable-security; urgency=high * Re-introducing seeding of the random number generator. Patch from the maintainer. stable/main/binary-ia64/libcrypto0.9.8-udeb_0.9.8c-4etch3_ia64.udeb stable/main/binary-ia64/libssl0.9.8_0.9.8c-4etch3_ia64.deb stable/main/binary-ia64/openssl_0.9.8c-4etch3_ia64.deb stable/main/binary-ia64/libssl0.9.8-dbg_0.9.8c-4etch3_ia64.deb stable/main/binary-ia64/libssl-dev_0.9.8c-4etch3_ia64.deb openssl (0.9.8c-4etch3) stable-security; urgency=high * Re-introducing seeding of the random number generator. Patch from the maintainer. stable/main/binary-i386/libssl-dev_0.9.8c-4etch3_i386.deb stable/main/binary-i386/openssl_0.9.8c-4etch3_i386.deb stable/main/binary-i386/libssl0.9.8-dbg_0.9.8c-4etch3_i386.deb stable/main/binary-i386/libssl0.9.8_0.9.8c-4etch3_i386.deb stable/main/binary-i386/libcrypto0.9.8-udeb_0.9.8c-4etch3_i386.udeb openssl (0.9.8c-4etch3) stable-security; urgency=high * Re-introducing seeding of the random number generator. Patch from the maintainer. stable/main/binary-hppa/libssl0.9.8-dbg_0.9.8c-4etch3_hppa.deb stable/main/binary-hppa/libcrypto0.9.8-udeb_0.9.8c-4etch3_hppa.udeb stable/main/binary-hppa/openssl_0.9.8c-4etch3_hppa.deb stable/main/binary-hppa/libssl0.9.8_0.9.8c-4etch3_hppa.deb stable/main/binary-hppa/libssl-dev_0.9.8c-4etch3_hppa.deb openssl (0.9.8c-4etch3) stable-security; urgency=high * Re-introducing seeding of the random number generator. Patch from the maintainer. stable/main/binary-arm/libssl0.9.8-dbg_0.9.8c-4etch3_arm.deb stable/main/binary-arm/libssl0.9.8_0.9.8c-4etch3_arm.deb stable/main/binary-arm/openssl_0.9.8c-4etch3_arm.deb stable/main/binary-arm/libssl-dev_0.9.8c-4etch3_arm.deb stable/main/binary-arm/libcrypto0.9.8-udeb_0.9.8c-4etch3_arm.udeb openssl (0.9.8c-4etch3) stable-security; urgency=high * Re-introducing seeding of the random number generator. Patch from the maintainer. stable/main/binary-alpha/openssl_0.9.8c-4etch3_alpha.deb stable/main/binary-alpha/libssl0.9.8-dbg_0.9.8c-4etch3_alpha.deb stable/main/binary-alpha/libssl0.9.8_0.9.8c-4etch3_alpha.deb stable/main/binary-alpha/libssl-dev_0.9.8c-4etch3_alpha.deb stable/main/binary-alpha/libcrypto0.9.8-udeb_0.9.8c-4etch3_alpha.udeb openssl (0.9.8c-4etch3) stable-security; urgency=high * Re-introducing seeding of the random number generator. Patch from the maintainer. stable/main/binary-amd64/libssl0.9.8-dbg_0.9.8c-4etch3_amd64.deb stable/main/binary-amd64/libssl0.9.8_0.9.8c-4etch3_amd64.deb stable/main/binary-amd64/libssl-dev_0.9.8c-4etch3_amd64.deb stable/main/source/openssl_0.9.8c-4etch3.diff.gz stable/main/source/openssl_0.9.8c-4etch3.dsc stable/main/binary-amd64/openssl_0.9.8c-4etch3_amd64.deb stable/main/binary-amd64/libcrypto0.9.8-udeb_0.9.8c-4etch3_amd64.udeb openssl (0.9.8c-4etch3) stable-security; urgency=high * Re-introducing seeding of the random number generator. Patch from the maintainer. stable/main/binary-all/openssh-blacklist_0.1.1_all.deb stable/main/source/openssh-blacklist_0.1.1.dsc stable/main/source/openssh-blacklist_0.1.1.tar.gz openssh-blacklist (0.1.1) stable-security; urgency=low * Set Maintainer to Kees for Debian. stable/main/binary-sparc/openssh-server-udeb_4.3p2-9etch2_sparc.udeb stable/main/binary-sparc/openssh-client_4.3p2-9etch2_sparc.deb stable/main/binary-sparc/ssh-askpass-gnome_4.3p2-9etch2_sparc.deb stable/main/binary-sparc/openssh-client-udeb_4.3p2-9etch2_sparc.udeb stable/main/binary-sparc/openssh-server_4.3p2-9etch2_sparc.deb openssh (1:4.3p2-9etch2) stable-security; urgency=low * Add a FILES section to ssh-vulnkey(1) (thanks, Hugh Daniel). * ssh-vulnkey handles options in authorized_keys (LP: #230029), and treats # as introducing a comment even if it is preceded by whitespace. stable/main/binary-s390/openssh-server_4.3p2-9etch2_s390.deb stable/main/binary-s390/openssh-client_4.3p2-9etch2_s390.deb stable/main/binary-s390/openssh-client-udeb_4.3p2-9etch2_s390.udeb stable/main/binary-s390/ssh-askpass-gnome_4.3p2-9etch2_s390.deb stable/main/binary-s390/openssh-server-udeb_4.3p2-9etch2_s390.udeb openssh (1:4.3p2-9etch2) stable-security; urgency=low * Add a FILES section to ssh-vulnkey(1) (thanks, Hugh Daniel). * ssh-vulnkey handles options in authorized_keys (LP: #230029), and treats # as introducing a comment even if it is preceded by whitespace. stable/main/binary-powerpc/openssh-client_4.3p2-9etch2_powerpc.deb stable/main/binary-powerpc/ssh-askpass-gnome_4.3p2-9etch2_powerpc.deb stable/main/binary-powerpc/openssh-client-udeb_4.3p2-9etch2_powerpc.udeb stable/main/binary-powerpc/openssh-server_4.3p2-9etch2_powerpc.deb stable/main/binary-powerpc/openssh-server-udeb_4.3p2-9etch2_powerpc.udeb openssh (1:4.3p2-9etch2) stable-security; urgency=low * Add a FILES section to ssh-vulnkey(1) (thanks, Hugh Daniel). * ssh-vulnkey handles options in authorized_keys (LP: #230029), and treats # as introducing a comment even if it is preceded by whitespace. stable/main/binary-mipsel/openssh-client-udeb_4.3p2-9etch2_mipsel.udeb stable/main/binary-mipsel/openssh-server_4.3p2-9etch2_mipsel.deb stable/main/binary-mipsel/openssh-server-udeb_4.3p2-9etch2_mipsel.udeb stable/main/binary-mipsel/ssh-askpass-gnome_4.3p2-9etch2_mipsel.deb stable/main/binary-mipsel/openssh-client_4.3p2-9etch2_mipsel.deb openssh (1:4.3p2-9etch2) stable-security; urgency=low * Add a FILES section to ssh-vulnkey(1) (thanks, Hugh Daniel). * ssh-vulnkey handles options in authorized_keys (LP: #230029), and treats # as introducing a comment even if it is preceded by whitespace. stable/main/binary-mips/openssh-server_4.3p2-9etch2_mips.deb stable/main/binary-mips/openssh-server-udeb_4.3p2-9etch2_mips.udeb stable/main/binary-mips/ssh-askpass-gnome_4.3p2-9etch2_mips.deb stable/main/binary-mips/openssh-client_4.3p2-9etch2_mips.deb stable/main/binary-mips/openssh-client-udeb_4.3p2-9etch2_mips.udeb openssh (1:4.3p2-9etch2) stable-security; urgency=low * Add a FILES section to ssh-vulnkey(1) (thanks, Hugh Daniel). * ssh-vulnkey handles options in authorized_keys (LP: #230029), and treats # as introducing a comment even if it is preceded by whitespace. stable/main/binary-ia64/openssh-client-udeb_4.3p2-9etch2_ia64.udeb stable/main/binary-ia64/ssh-askpass-gnome_4.3p2-9etch2_ia64.deb stable/main/binary-ia64/openssh-server_4.3p2-9etch2_ia64.deb stable/main/binary-ia64/openssh-server-udeb_4.3p2-9etch2_ia64.udeb stable/main/binary-ia64/openssh-client_4.3p2-9etch2_ia64.deb openssh (1:4.3p2-9etch2) stable-security; urgency=low * Add a FILES section to ssh-vulnkey(1) (thanks, Hugh Daniel). * ssh-vulnkey handles options in authorized_keys (LP: #230029), and treats # as introducing a comment even if it is preceded by whitespace. stable/main/binary-i386/openssh-server_4.3p2-9etch2_i386.deb stable/main/binary-i386/openssh-server-udeb_4.3p2-9etch2_i386.udeb stable/main/binary-i386/ssh-askpass-gnome_4.3p2-9etch2_i386.deb stable/main/binary-i386/openssh-client_4.3p2-9etch2_i386.deb stable/main/binary-i386/openssh-client-udeb_4.3p2-9etch2_i386.udeb openssh (1:4.3p2-9etch2) stable-security; urgency=low * Add a FILES section to ssh-vulnkey(1) (thanks, Hugh Daniel). * ssh-vulnkey handles options in authorized_keys (LP: #230029), and treats # as introducing a comment even if it is preceded by whitespace. stable/main/binary-hppa/openssh-client_4.3p2-9etch2_hppa.deb stable/main/binary-hppa/ssh-askpass-gnome_4.3p2-9etch2_hppa.deb stable/main/binary-hppa/openssh-server-udeb_4.3p2-9etch2_hppa.udeb stable/main/binary-hppa/openssh-server_4.3p2-9etch2_hppa.deb stable/main/binary-hppa/openssh-client-udeb_4.3p2-9etch2_hppa.udeb openssh (1:4.3p2-9etch2) stable-security; urgency=low * Add a FILES section to ssh-vulnkey(1) (thanks, Hugh Daniel). * ssh-vulnkey handles options in authorized_keys (LP: #230029), and treats # as introducing a comment even if it is preceded by whitespace. stable/main/binary-arm/openssh-server_4.3p2-9etch2_arm.deb stable/main/binary-arm/ssh-askpass-gnome_4.3p2-9etch2_arm.deb stable/main/binary-arm/openssh-client_4.3p2-9etch2_arm.deb stable/main/binary-arm/openssh-client-udeb_4.3p2-9etch2_arm.udeb stable/main/binary-arm/openssh-server-udeb_4.3p2-9etch2_arm.udeb openssh (1:4.3p2-9etch2) stable-security; urgency=low * Add a FILES section to ssh-vulnkey(1) (thanks, Hugh Daniel). * ssh-vulnkey handles options in authorized_keys (LP: #230029), and treats # as introducing a comment even if it is preceded by whitespace. stable/main/binary-alpha/ssh-askpass-gnome_4.3p2-9etch2_alpha.deb stable/main/binary-alpha/openssh-client_4.3p2-9etch2_alpha.deb stable/main/binary-alpha/openssh-server_4.3p2-9etch2_alpha.deb stable/main/binary-alpha/openssh-client-udeb_4.3p2-9etch2_alpha.udeb stable/main/binary-alpha/openssh-server-udeb_4.3p2-9etch2_alpha.udeb openssh (1:4.3p2-9etch2) stable-security; urgency=low * Add a FILES section to ssh-vulnkey(1) (thanks, Hugh Daniel). * ssh-vulnkey handles options in authorized_keys (LP: #230029), and treats # as introducing a comment even if it is preceded by whitespace. stable/main/binary-amd64/ssh-askpass-gnome_4.3p2-9etch2_amd64.deb stable/main/binary-all/ssh-krb5_4.3p2-9etch2_all.deb stable/main/binary-all/ssh_4.3p2-9etch2_all.deb stable/main/binary-amd64/openssh-client_4.3p2-9etch2_amd64.deb stable/main/binary-amd64/openssh-client-udeb_4.3p2-9etch2_amd64.udeb stable/main/source/openssh_4.3p2-9etch2.dsc stable/main/binary-amd64/openssh-server-udeb_4.3p2-9etch2_amd64.udeb stable/main/source/openssh_4.3p2-9etch2.diff.gz stable/main/binary-amd64/openssh-server_4.3p2-9etch2_amd64.deb openssh (1:4.3p2-9etch2) stable-security; urgency=low * Add a FILES section to ssh-vulnkey(1) (thanks, Hugh Daniel). * ssh-vulnkey handles options in authorized_keys (LP: #230029), and treats # as introducing a comment even if it is preceded by whitespace. stable/main/binary-sparc/python-uno_2.0.4.dfsg.2-7etch5_sparc.deb stable/main/binary-sparc/openoffice.org-gtk-gnome_2.0.4.dfsg.2-7etch5_sparc.deb stable/main/binary-sparc/openoffice.org-dbg_2.0.4.dfsg.2-7etch5_sparc.deb stable/main/binary-sparc/openoffice.org-qa-tools_2.0.4.dfsg.2-7etch5_sparc.deb stable/main/binary-sparc/openoffice.org-gcj_2.0.4.dfsg.2-7etch5_sparc.deb stable/main/binary-sparc/openoffice.org-evolution_2.0.4.dfsg.2-7etch5_sparc.deb stable/main/binary-sparc/openoffice.org-filter-so52_2.0.4.dfsg.2-7etch5_sparc.deb stable/main/binary-sparc/libmythes-dev_2.0.4.dfsg.2-7etch5_sparc.deb stable/main/binary-sparc/openoffice.org-kde_2.0.4.dfsg.2-7etch5_sparc.deb stable/main/binary-sparc/openoffice.org-impress_2.0.4.dfsg.2-7etch5_sparc.deb stable/main/binary-sparc/openoffice.org-math_2.0.4.dfsg.2-7etch5_sparc.deb stable/main/binary-sparc/openoffice.org_2.0.4.dfsg.2-7etch5_sparc.deb stable/main/binary-sparc/openoffice.org-gtk_2.0.4.dfsg.2-7etch5_sparc.deb stable/main/binary-sparc/openoffice.org-dev_2.0.4.dfsg.2-7etch5_sparc.deb stable/main/binary-sparc/openoffice.org-officebean_2.0.4.dfsg.2-7etch5_sparc.deb stable/main/binary-sparc/openoffice.org-gnome_2.0.4.dfsg.2-7etch5_sparc.deb stable/main/binary-sparc/openoffice.org-base_2.0.4.dfsg.2-7etch5_sparc.deb stable/main/binary-sparc/openoffice.org-draw_2.0.4.dfsg.2-7etch5_sparc.deb stable/main/binary-sparc/openoffice.org-calc_2.0.4.dfsg.2-7etch5_sparc.deb stable/main/binary-sparc/openoffice.org-core_2.0.4.dfsg.2-7etch5_sparc.deb stable/main/binary-sparc/openoffice.org-writer_2.0.4.dfsg.2-7etch5_sparc.deb openoffice.org (2.0.4.dfsg.2-7etch5) stable-security; urgency=high * ooo-build/patches/src680/workspace.fwk82.diff, ooo-build/patches/src680/workspace.sjfixes03.diff: fix CVE-2007-5745, CVE-2007-5746,CVE-2007-5747 and CVE-2008-0320 * ooo-build/patches/src680/cws-jl85.diff: fix XML signing problem where the document can be manipulated so that the signature dialog display a false issuer stable/main/binary-s390/libmythes-dev_2.0.4.dfsg.2-7etch5_s390.deb openoffice.org (2.0.4.dfsg.2-7etch5) stable-security; urgency=high * ooo-build/patches/src680/workspace.fwk82.diff, ooo-build/patches/src680/workspace.sjfixes03.diff: fix CVE-2007-5745, CVE-2007-5746,CVE-2007-5747 and CVE-2008-0320 * ooo-build/patches/src680/cws-jl85.diff: fix XML signing problem where the document can be manipulated so that the signature dialog display a false issuer stable/main/binary-powerpc/openoffice.org-writer_2.0.4.dfsg.2-7etch5_powerpc.deb stable/main/binary-powerpc/openoffice.org_2.0.4.dfsg.2-7etch5_powerpc.deb stable/main/binary-powerpc/python-uno_2.0.4.dfsg.2-7etch5_powerpc.deb stable/main/binary-powerpc/openoffice.org-qa-tools_2.0.4.dfsg.2-7etch5_powerpc.deb stable/main/binary-powerpc/openoffice.org-calc_2.0.4.dfsg.2-7etch5_powerpc.deb stable/main/binary-powerpc/openoffice.org-gcj_2.0.4.dfsg.2-7etch5_powerpc.deb stable/main/binary-powerpc/openoffice.org-core_2.0.4.dfsg.2-7etch5_powerpc.deb stable/main/binary-powerpc/openoffice.org-dev_2.0.4.dfsg.2-7etch5_powerpc.deb stable/main/binary-powerpc/openoffice.org-draw_2.0.4.dfsg.2-7etch5_powerpc.deb stable/main/binary-powerpc/openoffice.org-impress_2.0.4.dfsg.2-7etch5_powerpc.deb stable/main/binary-powerpc/openoffice.org-kde_2.0.4.dfsg.2-7etch5_powerpc.deb stable/main/binary-powerpc/openoffice.org-gtk_2.0.4.dfsg.2-7etch5_powerpc.deb stable/main/binary-powerpc/openoffice.org-gtk-gnome_2.0.4.dfsg.2-7etch5_powerpc.deb stable/main/binary-powerpc/openoffice.org-gnome_2.0.4.dfsg.2-7etch5_powerpc.deb stable/main/binary-powerpc/openoffice.org-evolution_2.0.4.dfsg.2-7etch5_powerpc.deb stable/main/binary-powerpc/openoffice.org-filter-so52_2.0.4.dfsg.2-7etch5_powerpc.deb stable/main/binary-powerpc/libmythes-dev_2.0.4.dfsg.2-7etch5_powerpc.deb stable/main/binary-powerpc/openoffice.org-base_2.0.4.dfsg.2-7etch5_powerpc.deb stable/main/binary-powerpc/openoffice.org-officebean_2.0.4.dfsg.2-7etch5_powerpc.deb stable/main/binary-powerpc/openoffice.org-math_2.0.4.dfsg.2-7etch5_powerpc.deb stable/main/binary-powerpc/openoffice.org-dbg_2.0.4.dfsg.2-7etch5_powerpc.deb openoffice.org (2.0.4.dfsg.2-7etch5) stable-security; urgency=high * ooo-build/patches/src680/workspace.fwk82.diff, ooo-build/patches/src680/workspace.sjfixes03.diff: fix CVE-2007-5745, CVE-2007-5746,CVE-2007-5747 and CVE-2008-0320 * ooo-build/patches/src680/cws-jl85.diff: fix XML signing problem where the document can be manipulated so that the signature dialog display a false issuer stable/main/binary-mipsel/libmythes-dev_2.0.4.dfsg.2-7etch5_mipsel.deb openoffice.org (2.0.4.dfsg.2-7etch5) stable-security; urgency=high * ooo-build/patches/src680/workspace.fwk82.diff, ooo-build/patches/src680/workspace.sjfixes03.diff: fix CVE-2007-5745, CVE-2007-5746,CVE-2007-5747 and CVE-2008-0320 * ooo-build/patches/src680/cws-jl85.diff: fix XML signing problem where the document can be manipulated so that the signature dialog display a false issuer stable/main/binary-mips/libmythes-dev_2.0.4.dfsg.2-7etch5_mips.deb openoffice.org (2.0.4.dfsg.2-7etch5) stable-security; urgency=high * ooo-build/patches/src680/workspace.fwk82.diff, ooo-build/patches/src680/workspace.sjfixes03.diff: fix CVE-2007-5745, CVE-2007-5746,CVE-2007-5747 and CVE-2008-0320 * ooo-build/patches/src680/cws-jl85.diff: fix XML signing problem where the document can be manipulated so that the signature dialog display a false issuer stable/main/binary-ia64/libmythes-dev_2.0.4.dfsg.2-7etch5_ia64.deb openoffice.org (2.0.4.dfsg.2-7etch5) stable-security; urgency=high * ooo-build/patches/src680/workspace.fwk82.diff, ooo-build/patches/src680/workspace.sjfixes03.diff: fix CVE-2007-5745, CVE-2007-5746,CVE-2007-5747 and CVE-2008-0320 * ooo-build/patches/src680/cws-jl85.diff: fix XML signing problem where the document can be manipulated so that the signature dialog display a false issuer stable/main/binary-i386/openoffice.org-dbg_2.0.4.dfsg.2-7etch5_i386.deb stable/main/binary-i386/openoffice.org-kde_2.0.4.dfsg.2-7etch5_i386.deb stable/main/binary-i386/openoffice.org-impress_2.0.4.dfsg.2-7etch5_i386.deb stable/main/binary-i386/openoffice.org-gtk_2.0.4.dfsg.2-7etch5_i386.deb stable/main/binary-i386/openoffice.org-dev_2.0.4.dfsg.2-7etch5_i386.deb stable/main/binary-i386/openoffice.org-base_2.0.4.dfsg.2-7etch5_i386.deb stable/main/binary-i386/openoffice.org-gnome_2.0.4.dfsg.2-7etch5_i386.deb stable/main/binary-i386/libmythes-dev_2.0.4.dfsg.2-7etch5_i386.deb stable/main/binary-i386/openoffice.org-gtk-gnome_2.0.4.dfsg.2-7etch5_i386.deb stable/main/binary-i386/openoffice.org-officebean_2.0.4.dfsg.2-7etch5_i386.deb stable/main/binary-i386/python-uno_2.0.4.dfsg.2-7etch5_i386.deb stable/main/binary-i386/openoffice.org-writer_2.0.4.dfsg.2-7etch5_i386.deb stable/main/binary-i386/openoffice.org-gcj_2.0.4.dfsg.2-7etch5_i386.deb stable/main/binary-i386/openoffice.org-math_2.0.4.dfsg.2-7etch5_i386.deb stable/main/binary-i386/openoffice.org-core_2.0.4.dfsg.2-7etch5_i386.deb stable/main/binary-i386/openoffice.org_2.0.4.dfsg.2-7etch5_i386.deb stable/main/binary-i386/openoffice.org-filter-so52_2.0.4.dfsg.2-7etch5_i386.deb stable/main/binary-i386/openoffice.org-qa-tools_2.0.4.dfsg.2-7etch5_i386.deb stable/main/binary-i386/openoffice.org-evolution_2.0.4.dfsg.2-7etch5_i386.deb stable/main/binary-i386/openoffice.org-calc_2.0.4.dfsg.2-7etch5_i386.deb stable/main/binary-i386/openoffice.org-draw_2.0.4.dfsg.2-7etch5_i386.deb openoffice.org (2.0.4.dfsg.2-7etch5) stable-security; urgency=high * ooo-build/patches/src680/workspace.fwk82.diff, ooo-build/patches/src680/workspace.sjfixes03.diff: fix CVE-2007-5745, CVE-2007-5746,CVE-2007-5747 and CVE-2008-0320 * ooo-build/patches/src680/cws-jl85.diff: fix XML signing problem where the document can be manipulated so that the signature dialog display a false issuer stable/main/binary-hppa/libmythes-dev_2.0.4.dfsg.2-7etch5_hppa.deb openoffice.org (2.0.4.dfsg.2-7etch5) stable-security; urgency=high * ooo-build/patches/src680/workspace.fwk82.diff, ooo-build/patches/src680/workspace.sjfixes03.diff: fix CVE-2007-5745, CVE-2007-5746,CVE-2007-5747 and CVE-2008-0320 * ooo-build/patches/src680/cws-jl85.diff: fix XML signing problem where the document can be manipulated so that the signature dialog display a false issuer stable/main/binary-arm/libmythes-dev_2.0.4.dfsg.2-7etch5_arm.deb openoffice.org (2.0.4.dfsg.2-7etch5) stable-security; urgency=high * ooo-build/patches/src680/workspace.fwk82.diff, ooo-build/patches/src680/workspace.sjfixes03.diff: fix CVE-2007-5745, CVE-2007-5746,CVE-2007-5747 and CVE-2008-0320 * ooo-build/patches/src680/cws-jl85.diff: fix XML signing problem where the document can be manipulated so that the signature dialog display a false issuer stable/main/binary-alpha/libmythes-dev_2.0.4.dfsg.2-7etch5_alpha.deb openoffice.org (2.0.4.dfsg.2-7etch5) stable-security; urgency=high * ooo-build/patches/src680/workspace.fwk82.diff, ooo-build/patches/src680/workspace.sjfixes03.diff: fix CVE-2007-5745, CVE-2007-5746,CVE-2007-5747 and CVE-2008-0320 * ooo-build/patches/src680/cws-jl85.diff: fix XML signing problem where the document can be manipulated so that the signature dialog display a false issuer stable/main/binary-amd64/openoffice.org-officebean_2.0.4.dfsg.2-7etch5_amd64.deb stable/main/binary-all/openoffice.org-l10n-hi-in_2.0.4.dfsg.2-7etch5_all.deb stable/main/binary-all/openoffice.org-help-es_2.0.4.dfsg.2-7etch5_all.deb stable/main/binary-all/openoffice.org-dev-doc_2.0.4.dfsg.2-7etch5_all.deb stable/main/binary-all/openoffice.org-l10n-uk_2.0.4.dfsg.2-7etch5_all.deb stable/main/binary-all/openoffice.org-l10n-te-in_2.0.4.dfsg.2-7etch5_all.deb stable/main/binary-all/openoffice.org-l10n-da_2.0.4.dfsg.2-7etch5_all.deb stable/main/binary-all/openoffice.org-l10n-xh_2.0.4.dfsg.2-7etch5_all.deb stable/main/binary-all/openoffice.org-l10n-et_2.0.4.dfsg.2-7etch5_all.deb stable/main/binary-all/openoffice.org-help-ru_2.0.4.dfsg.2-7etch5_all.deb stable/main/binary-all/openoffice.org-l10n-lv_2.0.4.dfsg.2-7etch5_all.deb stable/main/binary-all/openoffice.org-l10n-or-in_2.0.4.dfsg.2-7etch5_all.deb stable/main/binary-all/openoffice.org-help-pt-br_2.0.4.dfsg.2-7etch5_all.deb stable/main/binary-all/openoffice.org-help-ko_2.0.4.dfsg.2-7etch5_all.deb stable/main/binary-all/openoffice.org-l10n-dz_2.0.4.dfsg.2-7etch5_all.deb stable/main/binary-all/openoffice.org-l10n-nl_2.0.4.dfsg.2-7etch5_all.deb stable/main/binary-all/openoffice.org-l10n-br_2.0.4.dfsg.2-7etch5_all.deb stable/main/binary-all/openoffice.org-help-sl_2.0.4.dfsg.2-7etch5_all.deb stable/main/binary-amd64/openoffice.org-dbg_2.0.4.dfsg.2-7etch5_amd64.deb stable/main/binary-all/openoffice.org-dtd-officedocument1.0_2.0.4.dfsg.2-7etch5_all.deb stable/main/binary-all/openoffice.org-l10n-mk_2.0.4.dfsg.2-7etch5_all.deb stable/main/binary-all/openoffice.org-l10n-bg_2.0.4.dfsg.2-7etch5_all.deb stable/main/binary-all/openoffice.org-help-da_2.0.4.dfsg.2-7etch5_all.deb stable/main/binary-all/openoffice.org-help-hi-in_2.0.4.dfsg.2-7etch5_all.deb stable/main/binary-all/openoffice.org-l10n-hi_2.0.4.dfsg.2-7etch5_all.deb stable/main/binary-all/openoffice.org-l10n-tr_2.0.4.dfsg.2-7etch5_all.deb stable/main/binary-all/openoffice.org-l10n-fr_2.0.4.dfsg.2-7etch5_all.deb stable/main/binary-all/openoffice.org-l10n-sk_2.0.4.dfsg.2-7etch5_all.deb stable/main/binary-all/openoffice.org-l10n-ne_2.0.4.dfsg.2-7etch5_all.deb stable/main/binary-all/openoffice.org-help-zh-tw_2.0.4.dfsg.2-7etch5_all.deb stable/main/binary-all/openoffice.org-l10n-zu_2.0.4.dfsg.2-7etch5_all.deb stable/main/binary-all/broffice.org_2.0.4.dfsg.2-7etch5_all.deb stable/main/binary-amd64/openoffice.org-evolution_2.0.4.dfsg.2-7etch5_amd64.deb stable/main/binary-all/openoffice.org-l10n-ko_2.0.4.dfsg.2-7etch5_all.deb stable/main/binary-all/openoffice.org-help-zh-cn_2.0.4.dfsg.2-7etch5_all.deb stable/main/binary-all/openoffice.org-l10n-sl_2.0.4.dfsg.2-7etch5_all.deb stable/main/binary-amd64/libmythes-dev_2.0.4.dfsg.2-7etch5_amd64.deb stable/main/binary-all/openoffice.org-l10n-nb_2.0.4.dfsg.2-7etch5_all.deb stable/main/binary-all/openoffice.org-help-cs_2.0.4.dfsg.2-7etch5_all.deb stable/main/binary-all/openoffice.org-help-fr_2.0.4.dfsg.2-7etch5_all.deb stable/main/binary-all/openoffice.org-l10n-de_2.0.4.dfsg.2-7etch5_all.deb stable/main/binary-all/openoffice.org-l10n-ns_2.0.4.dfsg.2-7etch5_all.deb stable/main/binary-all/openoffice.org-l10n-el_2.0.4.dfsg.2-7etch5_all.deb stable/main/binary-all/openoffice.org-l10n-cy_2.0.4.dfsg.2-7etch5_all.deb stable/main/binary-all/openoffice.org-l10n-as-in_2.0.4.dfsg.2-7etch5_all.deb stable/main/binary-all/openoffice.org-l10n-tg_2.0.4.dfsg.2-7etch5_all.deb stable/main/source/openoffice.org_2.0.4.dfsg.2-7etch5.dsc stable/main/binary-all/openoffice.org-l10n-fa_2.0.4.dfsg.2-7etch5_all.deb stable/main/binary-amd64/python-uno_2.0.4.dfsg.2-7etch5_amd64.deb stable/main/binary-all/openoffice.org-l10n-eo_2.0.4.dfsg.2-7etch5_all.deb stable/main/binary-amd64/openoffice.org_2.0.4.dfsg.2-7etch5_amd64.deb stable/main/binary-all/openoffice.org-l10n-th_2.0.4.dfsg.2-7etch5_all.deb stable/main/binary-all/openoffice.org-l10n-st_2.0.4.dfsg.2-7etch5_all.deb stable/main/binary-all/openoffice.org-l10n-ku_2.0.4.dfsg.2-7etch5_all.deb stable/main/binary-all/openoffice.org-l10n-in_2.0.4.dfsg.2-7etch5_all.deb stable/main/binary-all/openoffice.org-l10n-zh-cn_2.0.4.dfsg.2-7etch5_all.deb stable/main/binary-all/openoffice.org-l10n-ga_2.0.4.dfsg.2-7etch5_all.deb stable/main/binary-amd64/openoffice.org-gnome_2.0.4.dfsg.2-7etch5_amd64.deb stable/main/binary-amd64/openoffice.org-impress_2.0.4.dfsg.2-7etch5_amd64.deb stable/main/binary-all/openoffice.org-l10n-ta-in_2.0.4.dfsg.2-7etch5_all.deb stable/main/binary-all/openoffice.org-l10n-en-za_2.0.4.dfsg.2-7etch5_all.deb stable/main/binary-all/openoffice.org-l10n-gu-in_2.0.4.dfsg.2-7etch5_all.deb stable/main/binary-all/openoffice.org-help-de_2.0.4.dfsg.2-7etch5_all.deb stable/main/binary-all/openoffice.org-l10n-pt-br_2.0.4.dfsg.2-7etch5_all.deb stable/main/binary-all/openoffice.org-l10n-af_2.0.4.dfsg.2-7etch5_all.deb stable/main/binary-all/openoffice.org-l10n-be-by_2.0.4.dfsg.2-7etch5_all.deb stable/main/binary-amd64/openoffice.org-calc_2.0.4.dfsg.2-7etch5_amd64.deb stable/main/binary-all/openoffice.org-l10n-ka_2.0.4.dfsg.2-7etch5_all.deb stable/main/binary-amd64/openoffice.org-dev_2.0.4.dfsg.2-7etch5_amd64.deb stable/main/binary-all/openoffice.org-qa-api-tests_2.0.4.dfsg.2-7etch5_all.deb stable/main/binary-all/openoffice.org-help-ja_2.0.4.dfsg.2-7etch5_all.deb stable/main/binary-all/openoffice.org-l10n-pa-in_2.0.4.dfsg.2-7etch5_all.deb stable/main/binary-all/openoffice.org-l10n-ml-in_2.0.4.dfsg.2-7etch5_all.deb stable/main/binary-amd64/openoffice.org-draw_2.0.4.dfsg.2-7etch5_amd64.deb stable/main/binary-all/openoffice.org-l10n-hu_2.0.4.dfsg.2-7etch5_all.deb stable/main/binary-all/openoffice.org-l10n-bs_2.0.4.dfsg.2-7etch5_all.deb stable/main/binary-all/openoffice.org-l10n-fi_2.0.4.dfsg.2-7etch5_all.deb stable/main/binary-amd64/openoffice.org-gtk_2.0.4.dfsg.2-7etch5_amd64.deb stable/main/binary-amd64/openoffice.org-gtk-gnome_2.0.4.dfsg.2-7etch5_amd64.deb stable/main/binary-all/openoffice.org-l10n-he_2.0.4.dfsg.2-7etch5_all.deb stable/main/binary-all/openoffice.org-l10n-ss_2.0.4.dfsg.2-7etch5_all.deb stable/main/binary-all/openoffice.org-l10n-za_2.0.4.dfsg.2-7etch5_all.deb stable/main/binary-all/openoffice.org-l10n-ru_2.0.4.dfsg.2-7etch5_all.deb stable/main/binary-all/openoffice.org-help-hu_2.0.4.dfsg.2-7etch5_all.deb stable/main/binary-all/openoffice.org-l10n-en-gb_2.0.4.dfsg.2-7etch5_all.deb stable/main/binary-all/openoffice.org-l10n-sr-cs_2.0.4.dfsg.2-7etch5_all.deb stable/main/binary-all/openoffice.org-help-en-us_2.0.4.dfsg.2-7etch5_all.deb stable/main/binary-all/openoffice.org-help-km_2.0.4.dfsg.2-7etch5_all.deb stable/main/binary-amd64/openoffice.org-kde_2.0.4.dfsg.2-7etch5_amd64.deb stable/main/binary-all/openoffice.org-l10n-sv_2.0.4.dfsg.2-7etch5_all.deb stable/main/binary-all/openoffice.org-help-sv_2.0.4.dfsg.2-7etch5_all.deb stable/main/binary-all/openoffice.org-l10n-rw_2.0.4.dfsg.2-7etch5_all.deb stable/main/binary-amd64/openoffice.org-qa-tools_2.0.4.dfsg.2-7etch5_amd64.deb stable/main/binary-all/openoffice.org-l10n-ts_2.0.4.dfsg.2-7etch5_all.deb stable/main/binary-all/openoffice.org-l10n-nr_2.0.4.dfsg.2-7etch5_all.deb stable/main/binary-amd64/openoffice.org-core_2.0.4.dfsg.2-7etch5_amd64.deb stable/main/binary-all/openoffice.org-l10n-tn_2.0.4.dfsg.2-7etch5_all.deb stable/main/binary-all/openoffice.org-help-dz_2.0.4.dfsg.2-7etch5_all.deb stable/main/binary-all/openoffice.org-l10n-cs_2.0.4.dfsg.2-7etch5_all.deb stable/main/source/openoffice.org_2.0.4.dfsg.2-7etch5.diff.gz stable/main/binary-all/openoffice.org-l10n-lt_2.0.4.dfsg.2-7etch5_all.deb stable/main/binary-all/openoffice.org-java-common_2.0.4.dfsg.2-7etch5_all.deb stable/main/binary-all/openoffice.org-help-en_2.0.4.dfsg.2-7etch5_all.deb stable/main/binary-all/openoffice.org-l10n-nn_2.0.4.dfsg.2-7etch5_all.deb stable/main/binary-all/openoffice.org-l10n-ve_2.0.4.dfsg.2-7etch5_all.deb stable/main/binary-all/openoffice.org-help-et_2.0.4.dfsg.2-7etch5_all.deb stable/main/binary-all/ttf-opensymbol_2.0.4.dfsg.2-7etch5_all.deb stable/main/binary-all/openoffice.org-l10n-bn_2.0.4.dfsg.2-7etch5_all.deb stable/main/binary-amd64/openoffice.org-math_2.0.4.dfsg.2-7etch5_amd64.deb stable/main/binary-all/openoffice.org-l10n-pl_2.0.4.dfsg.2-7etch5_all.deb stable/main/binary-all/openoffice.org-help-it_2.0.4.dfsg.2-7etch5_all.deb stable/main/binary-all/openoffice.org-l10n-hr_2.0.4.dfsg.2-7etch5_all.deb stable/main/binary-amd64/openoffice.org-gcj_2.0.4.dfsg.2-7etch5_amd64.deb stable/main/binary-all/openoffice.org-l10n-es_2.0.4.dfsg.2-7etch5_all.deb stable/main/binary-amd64/openoffice.org-writer_2.0.4.dfsg.2-7etch5_amd64.deb stable/main/binary-all/openoffice.org-l10n-pt_2.0.4.dfsg.2-7etch5_all.deb stable/main/binary-all/openoffice.org-filter-mobiledev_2.0.4.dfsg.2-7etch5_all.deb stable/main/binary-all/openoffice.org-help-nl_2.0.4.dfsg.2-7etch5_all.deb stable/main/binary-all/openoffice.org-help-pl_2.0.4.dfsg.2-7etch5_all.deb stable/main/binary-all/openoffice.org-l10n-it_2.0.4.dfsg.2-7etch5_all.deb stable/main/binary-all/openoffice.org-l10n-km_2.0.4.dfsg.2-7etch5_all.deb stable/main/binary-all/openoffice.org-l10n-ja_2.0.4.dfsg.2-7etch5_all.deb stable/main/binary-amd64/openoffice.org-base_2.0.4.dfsg.2-7etch5_amd64.deb stable/main/binary-all/openoffice.org-l10n-lo_2.0.4.dfsg.2-7etch5_all.deb stable/main/binary-all/openoffice.org-l10n-ca_2.0.4.dfsg.2-7etch5_all.deb stable/main/binary-all/openoffice.org-l10n-zh-tw_2.0.4.dfsg.2-7etch5_all.deb stable/main/binary-amd64/openoffice.org-filter-so52_2.0.4.dfsg.2-7etch5_amd64.deb stable/main/binary-all/openoffice.org-common_2.0.4.dfsg.2-7etch5_all.deb stable/main/binary-all/openoffice.org-help-en-gb_2.0.4.dfsg.2-7etch5_all.deb stable/main/binary-all/openoffice.org-l10n-vi_2.0.4.dfsg.2-7etch5_all.deb openoffice.org (2.0.4.dfsg.2-7etch5) stable-security; urgency=high * ooo-build/patches/src680/workspace.fwk82.diff, ooo-build/patches/src680/workspace.sjfixes03.diff: fix CVE-2007-5745, CVE-2007-5746,CVE-2007-5747 and CVE-2008-0320 * ooo-build/patches/src680/cws-jl85.diff: fix XML signing problem where the document can be manipulated so that the signature dialog display a false issuer stable/main/binary-sparc/slapd_2.3.30-5+etch1_sparc.deb stable/main/binary-sparc/libldap-2.3-0_2.3.30-5+etch1_sparc.deb stable/main/binary-sparc/ldap-utils_2.3.30-5+etch1_sparc.deb openldap2.3 (2.3.30-5+etch1) stable-security; urgency=high * Non-maintainer upload by the Security Team * CVE-2007-5707 CVE-2007-5708 CVE-2007-6698 CVE-2008-0658 stable/main/binary-s390/slapd_2.3.30-5+etch1_s390.deb stable/main/binary-s390/libldap-2.3-0_2.3.30-5+etch1_s390.deb stable/main/binary-s390/ldap-utils_2.3.30-5+etch1_s390.deb openldap2.3 (2.3.30-5+etch1) stable-security; urgency=high * Non-maintainer upload by the Security Team * CVE-2007-5707 CVE-2007-5708 CVE-2007-6698 CVE-2008-0658 stable/main/binary-powerpc/libldap-2.3-0_2.3.30-5+etch1_powerpc.deb stable/main/binary-powerpc/ldap-utils_2.3.30-5+etch1_powerpc.deb stable/main/binary-powerpc/slapd_2.3.30-5+etch1_powerpc.deb openldap2.3 (2.3.30-5+etch1) stable-security; urgency=high * Non-maintainer upload by the Security Team * CVE-2007-5707 CVE-2007-5708 CVE-2007-6698 CVE-2008-0658 stable/main/binary-mipsel/slapd_2.3.30-5+etch1_mipsel.deb stable/main/binary-mipsel/libldap-2.3-0_2.3.30-5+etch1_mipsel.deb stable/main/binary-mipsel/ldap-utils_2.3.30-5+etch1_mipsel.deb openldap2.3 (2.3.30-5+etch1) stable-security; urgency=high * Non-maintainer upload by the Security Team * CVE-2007-5707 CVE-2007-5708 CVE-2007-6698 CVE-2008-0658 stable/main/binary-mips/ldap-utils_2.3.30-5+etch1_mips.deb stable/main/binary-mips/slapd_2.3.30-5+etch1_mips.deb stable/main/binary-mips/libldap-2.3-0_2.3.30-5+etch1_mips.deb openldap2.3 (2.3.30-5+etch1) stable-security; urgency=high * Non-maintainer upload by the Security Team * CVE-2007-5707 CVE-2007-5708 CVE-2007-6698 CVE-2008-0658 stable/main/binary-ia64/libldap-2.3-0_2.3.30-5+etch1_ia64.deb stable/main/binary-ia64/slapd_2.3.30-5+etch1_ia64.deb stable/main/binary-ia64/ldap-utils_2.3.30-5+etch1_ia64.deb openldap2.3 (2.3.30-5+etch1) stable-security; urgency=high * Non-maintainer upload by the Security Team * CVE-2007-5707 CVE-2007-5708 CVE-2007-6698 CVE-2008-0658 stable/main/binary-hppa/slapd_2.3.30-5+etch1_hppa.deb stable/main/binary-hppa/libldap-2.3-0_2.3.30-5+etch1_hppa.deb stable/main/binary-hppa/ldap-utils_2.3.30-5+etch1_hppa.deb openldap2.3 (2.3.30-5+etch1) stable-security; urgency=high * Non-maintainer upload by the Security Team * CVE-2007-5707 CVE-2007-5708 CVE-2007-6698 CVE-2008-0658 stable/main/binary-arm/slapd_2.3.30-5+etch1_arm.deb stable/main/binary-arm/ldap-utils_2.3.30-5+etch1_arm.deb stable/main/binary-arm/libldap-2.3-0_2.3.30-5+etch1_arm.deb openldap2.3 (2.3.30-5+etch1) stable-security; urgency=high * Non-maintainer upload by the Security Team * CVE-2007-5707 CVE-2007-5708 CVE-2007-6698 CVE-2008-0658 stable/main/binary-amd64/ldap-utils_2.3.30-5+etch1_amd64.deb stable/main/binary-amd64/libldap-2.3-0_2.3.30-5+etch1_amd64.deb stable/main/binary-amd64/slapd_2.3.30-5+etch1_amd64.deb openldap2.3 (2.3.30-5+etch1) stable-security; urgency=high * Non-maintainer upload by the Security Team * CVE-2007-5707 CVE-2007-5708 CVE-2007-6698 CVE-2008-0658 stable/main/binary-alpha/ldap-utils_2.3.30-5+etch1_alpha.deb stable/main/binary-alpha/libldap-2.3-0_2.3.30-5+etch1_alpha.deb stable/main/binary-alpha/slapd_2.3.30-5+etch1_alpha.deb openldap2.3 (2.3.30-5+etch1) stable-security; urgency=high * Non-maintainer upload by the Security Team * CVE-2007-5707 CVE-2007-5708 CVE-2007-6698 CVE-2008-0658 stable/main/source/openldap2.3_2.3.30-5+etch1.diff.gz stable/main/binary-i386/slapd_2.3.30-5+etch1_i386.deb stable/main/binary-i386/ldap-utils_2.3.30-5+etch1_i386.deb stable/main/source/openldap2.3_2.3.30-5+etch1.dsc stable/main/binary-i386/libldap-2.3-0_2.3.30-5+etch1_i386.deb openldap2.3 (2.3.30-5+etch1) stable-security; urgency=high * Non-maintainer upload by the Security Team * CVE-2007-5707 CVE-2007-5708 CVE-2007-6698 CVE-2008-0658 stable/main/binary-sparc/libnetpbm9-dev_10.0-11.1+etch1_sparc.deb stable/main/binary-sparc/libnetpbm9_10.0-11.1+etch1_sparc.deb stable/main/binary-sparc/libnetpbm10-dev_10.0-11.1+etch1_sparc.deb stable/main/binary-sparc/netpbm_10.0-11.1+etch1_sparc.deb stable/main/binary-sparc/libnetpbm10_10.0-11.1+etch1_sparc.deb netpbm-free (2:10.0-11.1+etch1) stable-security; urgency=high * Non-maintainer upload by the security team * CVE-2008-0554: Apply upstream change to correct a buffer overrun in GIF reader code allowing arbitary code execution stable/main/binary-s390/netpbm_10.0-11.1+etch1_s390.deb stable/main/binary-s390/libnetpbm9_10.0-11.1+etch1_s390.deb stable/main/binary-s390/libnetpbm10-dev_10.0-11.1+etch1_s390.deb stable/main/binary-s390/libnetpbm9-dev_10.0-11.1+etch1_s390.deb stable/main/binary-s390/libnetpbm10_10.0-11.1+etch1_s390.deb netpbm-free (2:10.0-11.1+etch1) stable-security; urgency=high * Non-maintainer upload by the security team * CVE-2008-0554: Apply upstream change to correct a buffer overrun in GIF reader code allowing arbitary code execution stable/main/binary-powerpc/libnetpbm9-dev_10.0-11.1+etch1_powerpc.deb stable/main/binary-powerpc/libnetpbm9_10.0-11.1+etch1_powerpc.deb stable/main/binary-powerpc/netpbm_10.0-11.1+etch1_powerpc.deb stable/main/binary-powerpc/libnetpbm10-dev_10.0-11.1+etch1_powerpc.deb stable/main/binary-powerpc/libnetpbm10_10.0-11.1+etch1_powerpc.deb netpbm-free (2:10.0-11.1+etch1) stable-security; urgency=high * Non-maintainer upload by the security team * CVE-2008-0554: Apply upstream change to correct a buffer overrun in GIF reader code allowing arbitary code execution stable/main/binary-mipsel/libnetpbm10-dev_10.0-11.1+etch1_mipsel.deb stable/main/binary-mipsel/libnetpbm10_10.0-11.1+etch1_mipsel.deb stable/main/binary-mipsel/netpbm_10.0-11.1+etch1_mipsel.deb stable/main/binary-mipsel/libnetpbm9_10.0-11.1+etch1_mipsel.deb stable/main/binary-mipsel/libnetpbm9-dev_10.0-11.1+etch1_mipsel.deb netpbm-free (2:10.0-11.1+etch1) stable-security; urgency=high * Non-maintainer upload by the security team * CVE-2008-0554: Apply upstream change to correct a buffer overrun in GIF reader code allowing arbitary code execution stable/main/binary-mips/libnetpbm10-dev_10.0-11.1+etch1_mips.deb stable/main/binary-mips/libnetpbm9-dev_10.0-11.1+etch1_mips.deb stable/main/binary-mips/libnetpbm9_10.0-11.1+etch1_mips.deb stable/main/binary-mips/netpbm_10.0-11.1+etch1_mips.deb stable/main/binary-mips/libnetpbm10_10.0-11.1+etch1_mips.deb netpbm-free (2:10.0-11.1+etch1) stable-security; urgency=high * Non-maintainer upload by the security team * CVE-2008-0554: Apply upstream change to correct a buffer overrun in GIF reader code allowing arbitary code execution stable/main/binary-ia64/libnetpbm9_10.0-11.1+etch1_ia64.deb stable/main/binary-ia64/libnetpbm10_10.0-11.1+etch1_ia64.deb stable/main/binary-ia64/netpbm_10.0-11.1+etch1_ia64.deb stable/main/binary-ia64/libnetpbm10-dev_10.0-11.1+etch1_ia64.deb stable/main/binary-ia64/libnetpbm9-dev_10.0-11.1+etch1_ia64.deb netpbm-free (2:10.0-11.1+etch1) stable-security; urgency=high * Non-maintainer upload by the security team * CVE-2008-0554: Apply upstream change to correct a buffer overrun in GIF reader code allowing arbitary code execution stable/main/binary-i386/libnetpbm10_10.0-11.1+etch1_i386.deb stable/main/binary-i386/netpbm_10.0-11.1+etch1_i386.deb stable/main/binary-i386/libnetpbm9_10.0-11.1+etch1_i386.deb stable/main/binary-i386/libnetpbm9-dev_10.0-11.1+etch1_i386.deb stable/main/binary-i386/libnetpbm10-dev_10.0-11.1+etch1_i386.deb netpbm-free (2:10.0-11.1+etch1) stable-security; urgency=high * Non-maintainer upload by the security team * CVE-2008-0554: Apply upstream change to correct a buffer overrun in GIF reader code allowing arbitary code execution stable/main/binary-hppa/netpbm_10.0-11.1+etch1_hppa.deb stable/main/binary-hppa/libnetpbm9_10.0-11.1+etch1_hppa.deb stable/main/binary-hppa/libnetpbm10-dev_10.0-11.1+etch1_hppa.deb stable/main/binary-hppa/libnetpbm9-dev_10.0-11.1+etch1_hppa.deb stable/main/binary-hppa/libnetpbm10_10.0-11.1+etch1_hppa.deb netpbm-free (2:10.0-11.1+etch1) stable-security; urgency=high * Non-maintainer upload by the security team * CVE-2008-0554: Apply upstream change to correct a buffer overrun in GIF reader code allowing arbitary code execution stable/main/binary-arm/libnetpbm10_10.0-11.1+etch1_arm.deb stable/main/binary-arm/netpbm_10.0-11.1+etch1_arm.deb stable/main/binary-arm/libnetpbm10-dev_10.0-11.1+etch1_arm.deb stable/main/binary-arm/libnetpbm9_10.0-11.1+etch1_arm.deb stable/main/binary-arm/libnetpbm9-dev_10.0-11.1+etch1_arm.deb netpbm-free (2:10.0-11.1+etch1) stable-security; urgency=high * Non-maintainer upload by the security team * CVE-2008-0554: Apply upstream change to correct a buffer overrun in GIF reader code allowing arbitary code execution stable/main/binary-alpha/libnetpbm9_10.0-11.1+etch1_alpha.deb stable/main/binary-alpha/libnetpbm9-dev_10.0-11.1+etch1_alpha.deb stable/main/binary-alpha/libnetpbm10_10.0-11.1+etch1_alpha.deb stable/main/binary-alpha/netpbm_10.0-11.1+etch1_alpha.deb stable/main/binary-alpha/libnetpbm10-dev_10.0-11.1+etch1_alpha.deb netpbm-free (2:10.0-11.1+etch1) stable-security; urgency=high * Non-maintainer upload by the security team * CVE-2008-0554: Apply upstream change to correct a buffer overrun in GIF reader code allowing arbitary code execution stable/main/source/netpbm-free_10.0-11.1+etch1.diff.gz stable/main/binary-amd64/libnetpbm9_10.0-11.1+etch1_amd64.deb stable/main/source/netpbm-free_10.0-11.1+etch1.dsc stable/main/binary-amd64/libnetpbm10_10.0-11.1+etch1_amd64.deb stable/main/binary-amd64/netpbm_10.0-11.1+etch1_amd64.deb stable/main/binary-amd64/libnetpbm10-dev_10.0-11.1+etch1_amd64.deb stable/main/binary-amd64/libnetpbm9-dev_10.0-11.1+etch1_amd64.deb netpbm-free (2:10.0-11.1+etch1) stable-security; urgency=high * Non-maintainer upload by the security team * CVE-2008-0554: Apply upstream change to correct a buffer overrun in GIF reader code allowing arbitary code execution stable/main/binary-sparc/libmysqlclient15off_5.0.32-7etch6_sparc.deb stable/main/binary-sparc/mysql-client-5.0_5.0.32-7etch6_sparc.deb stable/main/binary-sparc/libmysqlclient15-dev_5.0.32-7etch6_sparc.deb stable/main/binary-sparc/mysql-server-5.0_5.0.32-7etch6_sparc.deb stable/main/binary-sparc/mysql-server-4.1_5.0.32-7etch6_sparc.deb mysql-dfsg-5.0 (5.0.32-7etch6) stable-security; urgency=high * Non-maintainer upload by the security team. * Backport a corrected form of upstream's fix for CVE-2008-2079, which allowed local users to bypass authorization checks by creating MyISAM tables using specific DATA DIRECTORY or INDEX DIRECTORY arguments within the MySQL data directory subsequently used by tables in other databases to which they would not normally have access. Note that this alters the behavior of table creation in that it disallows specification of data or index directories in or under mysqld's own homedir. * Adjust 95_SECURITY_CVE-2007-3781.dpatch, introduced in 5.0.32-7etch4, so as not to drop a spurious rejected patch file during the build. stable/main/binary-s390/mysql-server-4.1_5.0.32-7etch6_s390.deb stable/main/binary-s390/mysql-server-5.0_5.0.32-7etch6_s390.deb stable/main/binary-s390/mysql-client-5.0_5.0.32-7etch6_s390.deb stable/main/binary-s390/libmysqlclient15off_5.0.32-7etch6_s390.deb stable/main/binary-s390/libmysqlclient15-dev_5.0.32-7etch6_s390.deb mysql-dfsg-5.0 (5.0.32-7etch6) stable-security; urgency=high * Non-maintainer upload by the security team. * Backport a corrected form of upstream's fix for CVE-2008-2079, which allowed local users to bypass authorization checks by creating MyISAM tables using specific DATA DIRECTORY or INDEX DIRECTORY arguments within the MySQL data directory subsequently used by tables in other databases to which they would not normally have access. Note that this alters the behavior of table creation in that it disallows specification of data or index directories in or under mysqld's own homedir. * Adjust 95_SECURITY_CVE-2007-3781.dpatch, introduced in 5.0.32-7etch4, so as not to drop a spurious rejected patch file during the build. stable/main/binary-powerpc/libmysqlclient15off_5.0.32-7etch6_powerpc.deb stable/main/binary-powerpc/mysql-server-4.1_5.0.32-7etch6_powerpc.deb stable/main/binary-powerpc/libmysqlclient15-dev_5.0.32-7etch6_powerpc.deb stable/main/binary-powerpc/mysql-server-5.0_5.0.32-7etch6_powerpc.deb stable/main/binary-powerpc/mysql-client-5.0_5.0.32-7etch6_powerpc.deb mysql-dfsg-5.0 (5.0.32-7etch6) stable-security; urgency=high * Non-maintainer upload by the security team. * Backport a corrected form of upstream's fix for CVE-2008-2079, which allowed local users to bypass authorization checks by creating MyISAM tables using specific DATA DIRECTORY or INDEX DIRECTORY arguments within the MySQL data directory subsequently used by tables in other databases to which they would not normally have access. Note that this alters the behavior of table creation in that it disallows specification of data or index directories in or under mysqld's own homedir. * Adjust 95_SECURITY_CVE-2007-3781.dpatch, introduced in 5.0.32-7etch4, so as not to drop a spurious rejected patch file during the build. stable/main/binary-mipsel/libmysqlclient15-dev_5.0.32-7etch6_mipsel.deb stable/main/binary-mipsel/libmysqlclient15off_5.0.32-7etch6_mipsel.deb stable/main/binary-mipsel/mysql-server-5.0_5.0.32-7etch6_mipsel.deb stable/main/binary-mipsel/mysql-server-4.1_5.0.32-7etch6_mipsel.deb stable/main/binary-mipsel/mysql-client-5.0_5.0.32-7etch6_mipsel.deb mysql-dfsg-5.0 (5.0.32-7etch6) stable-security; urgency=high * Non-maintainer upload by the security team. * Backport a corrected form of upstream's fix for CVE-2008-2079, which allowed local users to bypass authorization checks by creating MyISAM tables using specific DATA DIRECTORY or INDEX DIRECTORY arguments within the MySQL data directory subsequently used by tables in other databases to which they would not normally have access. Note that this alters the behavior of table creation in that it disallows specification of data or index directories in or under mysqld's own homedir. * Adjust 95_SECURITY_CVE-2007-3781.dpatch, introduced in 5.0.32-7etch4, so as not to drop a spurious rejected patch file during the build. stable/main/binary-mips/mysql-client-5.0_5.0.32-7etch6_mips.deb stable/main/binary-mips/mysql-server-5.0_5.0.32-7etch6_mips.deb stable/main/binary-mips/libmysqlclient15off_5.0.32-7etch6_mips.deb stable/main/binary-mips/libmysqlclient15-dev_5.0.32-7etch6_mips.deb stable/main/binary-mips/mysql-server-4.1_5.0.32-7etch6_mips.deb mysql-dfsg-5.0 (5.0.32-7etch6) stable-security; urgency=high * Non-maintainer upload by the security team. * Backport a corrected form of upstream's fix for CVE-2008-2079, which allowed local users to bypass authorization checks by creating MyISAM tables using specific DATA DIRECTORY or INDEX DIRECTORY arguments within the MySQL data directory subsequently used by tables in other databases to which they would not normally have access. Note that this alters the behavior of table creation in that it disallows specification of data or index directories in or under mysqld's own homedir. * Adjust 95_SECURITY_CVE-2007-3781.dpatch, introduced in 5.0.32-7etch4, so as not to drop a spurious rejected patch file during the build. stable/main/binary-ia64/libmysqlclient15off_5.0.32-7etch6_ia64.deb stable/main/binary-ia64/libmysqlclient15-dev_5.0.32-7etch6_ia64.deb stable/main/binary-ia64/mysql-server-5.0_5.0.32-7etch6_ia64.deb stable/main/binary-ia64/mysql-server-4.1_5.0.32-7etch6_ia64.deb stable/main/binary-ia64/mysql-client-5.0_5.0.32-7etch6_ia64.deb mysql-dfsg-5.0 (5.0.32-7etch6) stable-security; urgency=high * Non-maintainer upload by the security team. * Backport a corrected form of upstream's fix for CVE-2008-2079, which allowed local users to bypass authorization checks by creating MyISAM tables using specific DATA DIRECTORY or INDEX DIRECTORY arguments within the MySQL data directory subsequently used by tables in other databases to which they would not normally have access. Note that this alters the behavior of table creation in that it disallows specification of data or index directories in or under mysqld's own homedir. * Adjust 95_SECURITY_CVE-2007-3781.dpatch, introduced in 5.0.32-7etch4, so as not to drop a spurious rejected patch file during the build. stable/main/binary-i386/libmysqlclient15off_5.0.32-7etch6_i386.deb stable/main/binary-i386/mysql-client-5.0_5.0.32-7etch6_i386.deb stable/main/binary-i386/libmysqlclient15-dev_5.0.32-7etch6_i386.deb stable/main/binary-i386/mysql-server-4.1_5.0.32-7etch6_i386.deb stable/main/binary-i386/mysql-server-5.0_5.0.32-7etch6_i386.deb mysql-dfsg-5.0 (5.0.32-7etch6) stable-security; urgency=high * Non-maintainer upload by the security team. * Backport a corrected form of upstream's fix for CVE-2008-2079, which allowed local users to bypass authorization checks by creating MyISAM tables using specific DATA DIRECTORY or INDEX DIRECTORY arguments within the MySQL data directory subsequently used by tables in other databases to which they would not normally have access. Note that this alters the behavior of table creation in that it disallows specification of data or index directories in or under mysqld's own homedir. * Adjust 95_SECURITY_CVE-2007-3781.dpatch, introduced in 5.0.32-7etch4, so as not to drop a spurious rejected patch file during the build. stable/main/binary-hppa/libmysqlclient15-dev_5.0.32-7etch6_hppa.deb stable/main/binary-hppa/mysql-client-5.0_5.0.32-7etch6_hppa.deb stable/main/binary-hppa/libmysqlclient15off_5.0.32-7etch6_hppa.deb stable/main/binary-hppa/mysql-server-5.0_5.0.32-7etch6_hppa.deb stable/main/binary-hppa/mysql-server-4.1_5.0.32-7etch6_hppa.deb mysql-dfsg-5.0 (5.0.32-7etch6) stable-security; urgency=high * Non-maintainer upload by the security team. * Backport a corrected form of upstream's fix for CVE-2008-2079, which allowed local users to bypass authorization checks by creating MyISAM tables using specific DATA DIRECTORY or INDEX DIRECTORY arguments within the MySQL data directory subsequently used by tables in other databases to which they would not normally have access. Note that this alters the behavior of table creation in that it disallows specification of data or index directories in or under mysqld's own homedir. * Adjust 95_SECURITY_CVE-2007-3781.dpatch, introduced in 5.0.32-7etch4, so as not to drop a spurious rejected patch file during the build. stable/main/binary-arm/libmysqlclient15off_5.0.32-7etch6_arm.deb stable/main/binary-arm/libmysqlclient15-dev_5.0.32-7etch6_arm.deb stable/main/binary-arm/mysql-server-5.0_5.0.32-7etch6_arm.deb stable/main/binary-arm/mysql-client-5.0_5.0.32-7etch6_arm.deb stable/main/binary-arm/mysql-server-4.1_5.0.32-7etch6_arm.deb mysql-dfsg-5.0 (5.0.32-7etch6) stable-security; urgency=high * Non-maintainer upload by the security team. * Backport a corrected form of upstream's fix for CVE-2008-2079, which allowed local users to bypass authorization checks by creating MyISAM tables using specific DATA DIRECTORY or INDEX DIRECTORY arguments within the MySQL data directory subsequently used by tables in other databases to which they would not normally have access. Note that this alters the behavior of table creation in that it disallows specification of data or index directories in or under mysqld's own homedir. * Adjust 95_SECURITY_CVE-2007-3781.dpatch, introduced in 5.0.32-7etch4, so as not to drop a spurious rejected patch file during the build. stable/main/binary-alpha/libmysqlclient15off_5.0.32-7etch6_alpha.deb stable/main/binary-alpha/libmysqlclient15-dev_5.0.32-7etch6_alpha.deb stable/main/binary-alpha/mysql-client-5.0_5.0.32-7etch6_alpha.deb stable/main/binary-alpha/mysql-server-5.0_5.0.32-7etch6_alpha.deb stable/main/binary-alpha/mysql-server-4.1_5.0.32-7etch6_alpha.deb mysql-dfsg-5.0 (5.0.32-7etch6) stable-security; urgency=high * Non-maintainer upload by the security team. * Backport a corrected form of upstream's fix for CVE-2008-2079, which allowed local users to bypass authorization checks by creating MyISAM tables using specific DATA DIRECTORY or INDEX DIRECTORY arguments within the MySQL data directory subsequently used by tables in other databases to which they would not normally have access. Note that this alters the behavior of table creation in that it disallows specification of data or index directories in or under mysqld's own homedir. * Adjust 95_SECURITY_CVE-2007-3781.dpatch, introduced in 5.0.32-7etch4, so as not to drop a spurious rejected patch file during the build. stable/main/binary-amd64/mysql-server-4.1_5.0.32-7etch6_amd64.deb stable/main/binary-amd64/mysql-client-5.0_5.0.32-7etch6_amd64.deb stable/main/binary-all/mysql-client_5.0.32-7etch6_all.deb stable/main/binary-amd64/libmysqlclient15off_5.0.32-7etch6_amd64.deb stable/main/binary-all/mysql-common_5.0.32-7etch6_all.deb stable/main/binary-all/mysql-server_5.0.32-7etch6_all.deb stable/main/source/mysql-dfsg-5.0_5.0.32-7etch6.diff.gz stable/main/binary-amd64/mysql-server-5.0_5.0.32-7etch6_amd64.deb stable/main/source/mysql-dfsg-5.0_5.0.32-7etch6.dsc stable/main/binary-amd64/libmysqlclient15-dev_5.0.32-7etch6_amd64.deb mysql-dfsg-5.0 (5.0.32-7etch6) stable-security; urgency=high * Non-maintainer upload by the security team. * Backport a corrected form of upstream's fix for CVE-2008-2079, which allowed local users to bypass authorization checks by creating MyISAM tables using specific DATA DIRECTORY or INDEX DIRECTORY arguments within the MySQL data directory subsequently used by tables in other databases to which they would not normally have access. Note that this alters the behavior of table creation in that it disallows specification of data or index directories in or under mysqld's own homedir. * Adjust 95_SECURITY_CVE-2007-3781.dpatch, introduced in 5.0.32-7etch4, so as not to drop a spurious rejected patch file during the build. stable/main/binary-sparc/mtr_0.71-2etch1_sparc.deb stable/main/binary-sparc/mtr-tiny_0.71-2etch1_sparc.deb mtr (0.71-2etch1) stable-security; urgency=high * Non-maintainer upload by the security team * Fix possible buffer overflow in split.c by using snprintf, instead of sprintf Fixes: CVE-2008-2357 stable/main/binary-s390/mtr-tiny_0.71-2etch1_s390.deb stable/main/binary-s390/mtr_0.71-2etch1_s390.deb mtr (0.71-2etch1) stable-security; urgency=high * Non-maintainer upload by the security team * Fix possible buffer overflow in split.c by using snprintf, instead of sprintf Fixes: CVE-2008-2357 stable/main/binary-powerpc/mtr-tiny_0.71-2etch1_powerpc.deb stable/main/binary-powerpc/mtr_0.71-2etch1_powerpc.deb mtr (0.71-2etch1) stable-security; urgency=high * Non-maintainer upload by the security team * Fix possible buffer overflow in split.c by using snprintf, instead of sprintf Fixes: CVE-2008-2357 stable/main/binary-mipsel/mtr_0.71-2etch1_mipsel.deb stable/main/binary-mipsel/mtr-tiny_0.71-2etch1_mipsel.deb mtr (0.71-2etch1) stable-security; urgency=high * Non-maintainer upload by the security team * Fix possible buffer overflow in split.c by using snprintf, instead of sprintf Fixes: CVE-2008-2357 stable/main/binary-mips/mtr_0.71-2etch1_mips.deb stable/main/binary-mips/mtr-tiny_0.71-2etch1_mips.deb mtr (0.71-2etch1) stable-security; urgency=high * Non-maintainer upload by the security team * Fix possible buffer overflow in split.c by using snprintf, instead of sprintf Fixes: CVE-2008-2357 stable/main/binary-ia64/mtr-tiny_0.71-2etch1_ia64.deb stable/main/binary-ia64/mtr_0.71-2etch1_ia64.deb mtr (0.71-2etch1) stable-security; urgency=high * Non-maintainer upload by the security team * Fix possible buffer overflow in split.c by using snprintf, instead of sprintf Fixes: CVE-2008-2357 stable/main/binary-hppa/mtr_0.71-2etch1_hppa.deb stable/main/binary-hppa/mtr-tiny_0.71-2etch1_hppa.deb mtr (0.71-2etch1) stable-security; urgency=high * Non-maintainer upload by the security team * Fix possible buffer overflow in split.c by using snprintf, instead of sprintf Fixes: CVE-2008-2357 stable/main/binary-arm/mtr_0.71-2etch1_arm.deb stable/main/binary-arm/mtr-tiny_0.71-2etch1_arm.deb mtr (0.71-2etch1) stable-security; urgency=high * Non-maintainer upload by the security team * Fix possible buffer overflow in split.c by using snprintf, instead of sprintf Fixes: CVE-2008-2357 stable/main/binary-amd64/mtr_0.71-2etch1_amd64.deb stable/main/binary-amd64/mtr-tiny_0.71-2etch1_amd64.deb mtr (0.71-2etch1) stable-security; urgency=high * Non-maintainer upload by the security team * Fix possible buffer overflow in split.c by using snprintf, instead of sprintf Fixes: CVE-2008-2357 stable/main/binary-alpha/mtr-tiny_0.71-2etch1_alpha.deb stable/main/binary-alpha/mtr_0.71-2etch1_alpha.deb mtr (0.71-2etch1) stable-security; urgency=high * Non-maintainer upload by the security team * Fix possible buffer overflow in split.c by using snprintf, instead of sprintf Fixes: CVE-2008-2357 stable/main/source/mtr_0.71-2etch1.dsc stable/main/source/mtr_0.71-2etch1.diff.gz stable/main/binary-i386/mtr-tiny_0.71-2etch1_i386.deb stable/main/binary-i386/mtr_0.71-2etch1_i386.deb mtr (0.71-2etch1) stable-security; urgency=high * Non-maintainer upload by the security team * Fix possible buffer overflow in split.c by using snprintf, instead of sprintf Fixes: CVE-2008-2357 stable/main/binary-sparc/mt-daapd_0.2.4+r1376-1.1+etch1_sparc.deb mt-daapd (0.2.4+r1376-1.1+etch1) stable-security; urgency=high * Non-maintainer upload by the security team * Apply backport of upstream fixes for two related vulnerabilities (Closes: #459961): + CVE-2007-5824: Remote denial-of-service through a null pointer dereference in src/webserver.c's authorization header handling + CVE-2007-5825: Remote arbitrary code execution through a format string vulnerability in authorization header of an /xml-rpc request * Apply fix from Nico Golde for CVE-2008-1771, an integer overflow vulnerability also in src/webserver.c, potentilly enabling execution of arbitrary code (Closes: #476241) stable/main/binary-s390/mt-daapd_0.2.4+r1376-1.1+etch1_s390.deb mt-daapd (0.2.4+r1376-1.1+etch1) stable-security; urgency=high * Non-maintainer upload by the security team * Apply backport of upstream fixes for two related vulnerabilities (Closes: #459961): + CVE-2007-5824: Remote denial-of-service through a null pointer dereference in src/webserver.c's authorization header handling + CVE-2007-5825: Remote arbitrary code execution through a format string vulnerability in authorization header of an /xml-rpc request * Apply fix from Nico Golde for CVE-2008-1771, an integer overflow vulnerability also in src/webserver.c, potentilly enabling execution of arbitrary code (Closes: #476241) stable/main/binary-powerpc/mt-daapd_0.2.4+r1376-1.1+etch1_powerpc.deb mt-daapd (0.2.4+r1376-1.1+etch1) stable-security; urgency=high * Non-maintainer upload by the security team * Apply backport of upstream fixes for two related vulnerabilities (Closes: #459961): + CVE-2007-5824: Remote denial-of-service through a null pointer dereference in src/webserver.c's authorization header handling + CVE-2007-5825: Remote arbitrary code execution through a format string vulnerability in authorization header of an /xml-rpc request * Apply fix from Nico Golde for CVE-2008-1771, an integer overflow vulnerability also in src/webserver.c, potentilly enabling execution of arbitrary code (Closes: #476241) stable/main/binary-mipsel/mt-daapd_0.2.4+r1376-1.1+etch1_mipsel.deb mt-daapd (0.2.4+r1376-1.1+etch1) stable-security; urgency=high * Non-maintainer upload by the security team * Apply backport of upstream fixes for two related vulnerabilities (Closes: #459961): + CVE-2007-5824: Remote denial-of-service through a null pointer dereference in src/webserver.c's authorization header handling + CVE-2007-5825: Remote arbitrary code execution through a format string vulnerability in authorization header of an /xml-rpc request * Apply fix from Nico Golde for CVE-2008-1771, an integer overflow vulnerability also in src/webserver.c, potentilly enabling execution of arbitrary code (Closes: #476241) stable/main/binary-mips/mt-daapd_0.2.4+r1376-1.1+etch1_mips.deb mt-daapd (0.2.4+r1376-1.1+etch1) stable-security; urgency=high * Non-maintainer upload by the security team * Apply backport of upstream fixes for two related vulnerabilities (Closes: #459961): + CVE-2007-5824: Remote denial-of-service through a null pointer dereference in src/webserver.c's authorization header handling + CVE-2007-5825: Remote arbitrary code execution through a format string vulnerability in authorization header of an /xml-rpc request * Apply fix from Nico Golde for CVE-2008-1771, an integer overflow vulnerability also in src/webserver.c, potentilly enabling execution of arbitrary code (Closes: #476241) stable/main/binary-ia64/mt-daapd_0.2.4+r1376-1.1+etch1_ia64.deb mt-daapd (0.2.4+r1376-1.1+etch1) stable-security; urgency=high * Non-maintainer upload by the security team * Apply backport of upstream fixes for two related vulnerabilities (Closes: #459961): + CVE-2007-5824: Remote denial-of-service through a null pointer dereference in src/webserver.c's authorization header handling + CVE-2007-5825: Remote arbitrary code execution through a format string vulnerability in authorization header of an /xml-rpc request * Apply fix from Nico Golde for CVE-2008-1771, an integer overflow vulnerability also in src/webserver.c, potentilly enabling execution of arbitrary code (Closes: #476241) stable/main/binary-i386/mt-daapd_0.2.4+r1376-1.1+etch1_i386.deb mt-daapd (0.2.4+r1376-1.1+etch1) stable-security; urgency=high * Non-maintainer upload by the security team * Apply backport of upstream fixes for two related vulnerabilities (Closes: #459961): + CVE-2007-5824: Remote denial-of-service through a null pointer dereference in src/webserver.c's authorization header handling + CVE-2007-5825: Remote arbitrary code execution through a format string vulnerability in authorization header of an /xml-rpc request * Apply fix from Nico Golde for CVE-2008-1771, an integer overflow vulnerability also in src/webserver.c, potentilly enabling execution of arbitrary code (Closes: #476241) stable/main/binary-hppa/mt-daapd_0.2.4+r1376-1.1+etch1_hppa.deb mt-daapd (0.2.4+r1376-1.1+etch1) stable-security; urgency=high * Non-maintainer upload by the security team * Apply backport of upstream fixes for two related vulnerabilities (Closes: #459961): + CVE-2007-5824: Remote denial-of-service through a null pointer dereference in src/webserver.c's authorization header handling + CVE-2007-5825: Remote arbitrary code execution through a format string vulnerability in authorization header of an /xml-rpc request * Apply fix from Nico Golde for CVE-2008-1771, an integer overflow vulnerability also in src/webserver.c, potentilly enabling execution of arbitrary code (Closes: #476241) stable/main/binary-arm/mt-daapd_0.2.4+r1376-1.1+etch1_arm.deb mt-daapd (0.2.4+r1376-1.1+etch1) stable-security; urgency=high * Non-maintainer upload by the security team * Apply backport of upstream fixes for two related vulnerabilities (Closes: #459961): + CVE-2007-5824: Remote denial-of-service through a null pointer dereference in src/webserver.c's authorization header handling + CVE-2007-5825: Remote arbitrary code execution through a format string vulnerability in authorization header of an /xml-rpc request * Apply fix from Nico Golde for CVE-2008-1771, an integer overflow vulnerability also in src/webserver.c, potentilly enabling execution of arbitrary code (Closes: #476241) stable/main/binary-alpha/mt-daapd_0.2.4+r1376-1.1+etch1_alpha.deb mt-daapd (0.2.4+r1376-1.1+etch1) stable-security; urgency=high * Non-maintainer upload by the security team * Apply backport of upstream fixes for two related vulnerabilities (Closes: #459961): + CVE-2007-5824: Remote denial-of-service through a null pointer dereference in src/webserver.c's authorization header handling + CVE-2007-5825: Remote arbitrary code execution through a format string vulnerability in authorization header of an /xml-rpc request * Apply fix from Nico Golde for CVE-2008-1771, an integer overflow vulnerability also in src/webserver.c, potentilly enabling execution of arbitrary code (Closes: #476241) stable/main/source/mt-daapd_0.2.4+r1376-1.1+etch1.dsc stable/main/binary-amd64/mt-daapd_0.2.4+r1376-1.1+etch1_amd64.deb stable/main/source/mt-daapd_0.2.4+r1376-1.1+etch1.diff.gz mt-daapd (0.2.4+r1376-1.1+etch1) stable-security; urgency=high * Non-maintainer upload by the security team * Apply backport of upstream fixes for two related vulnerabilities (Closes: #459961): + CVE-2007-5824: Remote denial-of-service through a null pointer dereference in src/webserver.c's authorization header handling + CVE-2007-5825: Remote arbitrary code execution through a format string vulnerability in authorization header of an /xml-rpc request * Apply fix from Nico Golde for CVE-2008-1771, an integer overflow vulnerability also in src/webserver.c, potentilly enabling execution of arbitrary code (Closes: #476241) stable/main/binary-sparc/mplayer_1.0~rc1-12etch3_sparc.deb mplayer (1.0~rc1-12etch3) stable-security; urgency=low * fix CVE-2008-0073, remote code execution via crafted rtsp stream, thanks to Nico Golde and Reimar Döffinger (Closes: #473056). stable/main/binary-s390/mplayer_1.0~rc1-12etch3_s390.deb mplayer (1.0~rc1-12etch3) stable-security; urgency=low * fix CVE-2008-0073, remote code execution via crafted rtsp stream, thanks to Nico Golde and Reimar Döffinger (Closes: #473056). stable/main/binary-powerpc/mplayer_1.0~rc1-12etch3_powerpc.deb mplayer (1.0~rc1-12etch3) stable-security; urgency=low * fix CVE-2008-0073, remote code execution via crafted rtsp stream, thanks to Nico Golde and Reimar Döffinger (Closes: #473056). stable/main/binary-mipsel/mplayer_1.0~rc1-12etch3_mipsel.deb mplayer (1.0~rc1-12etch3) stable-security; urgency=low * fix CVE-2008-0073, remote code execution via crafted rtsp stream, thanks to Nico Golde and Reimar Döffinger (Closes: #473056). stable/main/binary-mips/mplayer_1.0~rc1-12etch3_mips.deb mplayer (1.0~rc1-12etch3) stable-security; urgency=low * fix CVE-2008-0073, remote code execution via crafted rtsp stream, thanks to Nico Golde and Reimar Döffinger (Closes: #473056). stable/main/binary-ia64/mplayer_1.0~rc1-12etch3_ia64.deb mplayer (1.0~rc1-12etch3) stable-security; urgency=low * fix CVE-2008-0073, remote code execution via crafted rtsp stream, thanks to Nico Golde and Reimar Döffinger (Closes: #473056). stable/main/binary-i386/mplayer_1.0~rc1-12etch3_i386.deb mplayer (1.0~rc1-12etch3) stable-security; urgency=low * fix CVE-2008-0073, remote code execution via crafted rtsp stream, thanks to Nico Golde and Reimar Döffinger (Closes: #473056). stable/main/binary-hppa/mplayer_1.0~rc1-12etch3_hppa.deb mplayer (1.0~rc1-12etch3) stable-security; urgency=low * fix CVE-2008-0073, remote code execution via crafted rtsp stream, thanks to Nico Golde and Reimar Döffinger (Closes: #473056). stable/main/binary-arm/mplayer_1.0~rc1-12etch3_arm.deb mplayer (1.0~rc1-12etch3) stable-security; urgency=low * fix CVE-2008-0073, remote code execution via crafted rtsp stream, thanks to Nico Golde and Reimar Döffinger (Closes: #473056). stable/main/binary-alpha/mplayer_1.0~rc1-12etch3_alpha.deb mplayer (1.0~rc1-12etch3) stable-security; urgency=low * fix CVE-2008-0073, remote code execution via crafted rtsp stream, thanks to Nico Golde and Reimar Döffinger (Closes: #473056). stable/main/binary-all/mplayer-doc_1.0~rc1-12etch3_all.deb stable/main/binary-amd64/mplayer_1.0~rc1-12etch3_amd64.deb stable/main/source/mplayer_1.0~rc1-12etch3.dsc stable/main/source/mplayer_1.0~rc1-12etch3.diff.gz mplayer (1.0~rc1-12etch3) stable-security; urgency=low * fix CVE-2008-0073, remote code execution via crafted rtsp stream, thanks to Nico Golde and Reimar Döffinger (Closes: #473056). stable/main/source/moin_1.5.3-1.2etch1.dsc stable/main/source/moin_1.5.3-1.2etch1.diff.gz stable/main/binary-all/moinmoin-common_1.5.3-1.2etch1_all.deb stable/main/binary-all/python-moinmoin_1.5.3-1.2etch1_all.deb moin (1.5.3-1.2etch1) stable-security; urgency=high * Non-maintainer upload. * Adding patches from BTS / upstream up to changeset 856 db212dfc58ef + cross-site scripting vulnerabilities using AttachFile, CVE-2007-2423, CVE-2008-0781 + missing access control checks for includes and calendars, CVE-2007-2637 (Closes: #422408) + directory traversal in MOIN_ID cookie vulnerability, CVE-2008-0782 (Closes: #462984) + XSS problem in login (CVE-2008-780) + XSS problem in gui editor + XSS problem in delete page + ACL check for dictionaries + fix password reminder mails (Closes: #403363) stable/main/binary-sparc/perl-mapscript_4.10.0-5.1+etch2_sparc.deb stable/main/binary-sparc/python-mapscript_4.10.0-5.1+etch2_sparc.deb stable/main/binary-sparc/php5-mapscript_4.10.0-5.1+etch2_sparc.deb stable/main/binary-sparc/php4-mapscript_4.10.0-5.1+etch2_sparc.deb stable/main/binary-sparc/mapserver-bin_4.10.0-5.1+etch2_sparc.deb stable/main/binary-sparc/cgi-mapserver_4.10.0-5.1+etch2_sparc.deb mapserver (4.10.0-5.1+etch2) stable-security; urgency=high * Non-maintainer upload by the Security Team. * Apply upstream patches fixing two vulnerabilities: - CVE-2007-4542: Cross-site scripting (XSS) vulnerabilities using mapserver's writeError function (upstream fix also addresses a potential buffer overflow) - CVE-2007-4629: Multiple stack buffer overflow vulnerabilities in template handlers, potentially allowing the execution of arbitrary code via a maliciously crafted map file stable/main/binary-s390/mapserver-bin_4.10.0-5.1+etch2_s390.deb stable/main/binary-s390/php4-mapscript_4.10.0-5.1+etch2_s390.deb stable/main/binary-s390/php5-mapscript_4.10.0-5.1+etch2_s390.deb stable/main/binary-s390/cgi-mapserver_4.10.0-5.1+etch2_s390.deb stable/main/binary-s390/perl-mapscript_4.10.0-5.1+etch2_s390.deb stable/main/binary-s390/python-mapscript_4.10.0-5.1+etch2_s390.deb mapserver (4.10.0-5.1+etch2) stable-security; urgency=high * Non-maintainer upload by the Security Team. * Apply upstream patches fixing two vulnerabilities: - CVE-2007-4542: Cross-site scripting (XSS) vulnerabilities using mapserver's writeError function (upstream fix also addresses a potential buffer overflow) - CVE-2007-4629: Multiple stack buffer overflow vulnerabilities in template handlers, potentially allowing the execution of arbitrary code via a maliciously crafted map file stable/main/binary-powerpc/perl-mapscript_4.10.0-5.1+etch2_powerpc.deb stable/main/binary-powerpc/cgi-mapserver_4.10.0-5.1+etch2_powerpc.deb stable/main/binary-powerpc/python-mapscript_4.10.0-5.1+etch2_powerpc.deb stable/main/binary-powerpc/php4-mapscript_4.10.0-5.1+etch2_powerpc.deb stable/main/binary-powerpc/mapserver-bin_4.10.0-5.1+etch2_powerpc.deb stable/main/binary-powerpc/php5-mapscript_4.10.0-5.1+etch2_powerpc.deb mapserver (4.10.0-5.1+etch2) stable-security; urgency=high * Non-maintainer upload by the Security Team. * Apply upstream patches fixing two vulnerabilities: - CVE-2007-4542: Cross-site scripting (XSS) vulnerabilities using mapserver's writeError function (upstream fix also addresses a potential buffer overflow) - CVE-2007-4629: Multiple stack buffer overflow vulnerabilities in template handlers, potentially allowing the execution of arbitrary code via a maliciously crafted map file stable/main/binary-mipsel/mapserver-bin_4.10.0-5.1+etch2_mipsel.deb stable/main/binary-mipsel/python-mapscript_4.10.0-5.1+etch2_mipsel.deb stable/main/binary-mipsel/cgi-mapserver_4.10.0-5.1+etch2_mipsel.deb stable/main/binary-mipsel/php4-mapscript_4.10.0-5.1+etch2_mipsel.deb stable/main/binary-mipsel/php5-mapscript_4.10.0-5.1+etch2_mipsel.deb stable/main/binary-mipsel/perl-mapscript_4.10.0-5.1+etch2_mipsel.deb mapserver (4.10.0-5.1+etch2) stable-security; urgency=high * Non-maintainer upload by the Security Team. * Apply upstream patches fixing two vulnerabilities: - CVE-2007-4542: Cross-site scripting (XSS) vulnerabilities using mapserver's writeError function (upstream fix also addresses a potential buffer overflow) - CVE-2007-4629: Multiple stack buffer overflow vulnerabilities in template handlers, potentially allowing the execution of arbitrary code via a maliciously crafted map file stable/main/binary-mips/php4-mapscript_4.10.0-5.1+etch2_mips.deb stable/main/binary-mips/cgi-mapserver_4.10.0-5.1+etch2_mips.deb stable/main/binary-mips/php5-mapscript_4.10.0-5.1+etch2_mips.deb stable/main/binary-mips/mapserver-bin_4.10.0-5.1+etch2_mips.deb stable/main/binary-mips/perl-mapscript_4.10.0-5.1+etch2_mips.deb stable/main/binary-mips/python-mapscript_4.10.0-5.1+etch2_mips.deb mapserver (4.10.0-5.1+etch2) stable-security; urgency=high * Non-maintainer upload by the Security Team. * Apply upstream patches fixing two vulnerabilities: - CVE-2007-4542: Cross-site scripting (XSS) vulnerabilities using mapserver's writeError function (upstream fix also addresses a potential buffer overflow) - CVE-2007-4629: Multiple stack buffer overflow vulnerabilities in template handlers, potentially allowing the execution of arbitrary code via a maliciously crafted map file stable/main/binary-ia64/php5-mapscript_4.10.0-5.1+etch2_ia64.deb stable/main/binary-ia64/mapserver-bin_4.10.0-5.1+etch2_ia64.deb stable/main/binary-ia64/php4-mapscript_4.10.0-5.1+etch2_ia64.deb stable/main/binary-ia64/cgi-mapserver_4.10.0-5.1+etch2_ia64.deb stable/main/binary-ia64/python-mapscript_4.10.0-5.1+etch2_ia64.deb stable/main/binary-ia64/perl-mapscript_4.10.0-5.1+etch2_ia64.deb mapserver (4.10.0-5.1+etch2) stable-security; urgency=high * Non-maintainer upload by the Security Team. * Apply upstream patches fixing two vulnerabilities: - CVE-2007-4542: Cross-site scripting (XSS) vulnerabilities using mapserver's writeError function (upstream fix also addresses a potential buffer overflow) - CVE-2007-4629: Multiple stack buffer overflow vulnerabilities in template handlers, potentially allowing the execution of arbitrary code via a maliciously crafted map file stable/main/binary-i386/perl-mapscript_4.10.0-5.1+etch2_i386.deb stable/main/binary-i386/python-mapscript_4.10.0-5.1+etch2_i386.deb stable/main/binary-i386/php4-mapscript_4.10.0-5.1+etch2_i386.deb stable/main/binary-i386/mapserver-bin_4.10.0-5.1+etch2_i386.deb stable/main/binary-i386/cgi-mapserver_4.10.0-5.1+etch2_i386.deb stable/main/binary-i386/php5-mapscript_4.10.0-5.1+etch2_i386.deb mapserver (4.10.0-5.1+etch2) stable-security; urgency=high * Non-maintainer upload by the Security Team. * Apply upstream patches fixing two vulnerabilities: - CVE-2007-4542: Cross-site scripting (XSS) vulnerabilities using mapserver's writeError function (upstream fix also addresses a potential buffer overflow) - CVE-2007-4629: Multiple stack buffer overflow vulnerabilities in template handlers, potentially allowing the execution of arbitrary code via a maliciously crafted map file stable/main/binary-hppa/cgi-mapserver_4.10.0-5.1+etch2_hppa.deb stable/main/binary-hppa/mapserver-bin_4.10.0-5.1+etch2_hppa.deb stable/main/binary-hppa/php5-mapscript_4.10.0-5.1+etch2_hppa.deb stable/main/binary-hppa/php4-mapscript_4.10.0-5.1+etch2_hppa.deb stable/main/binary-hppa/perl-mapscript_4.10.0-5.1+etch2_hppa.deb stable/main/binary-hppa/python-mapscript_4.10.0-5.1+etch2_hppa.deb mapserver (4.10.0-5.1+etch2) stable-security; urgency=high * Non-maintainer upload by the Security Team. * Apply upstream patches fixing two vulnerabilities: - CVE-2007-4542: Cross-site scripting (XSS) vulnerabilities using mapserver's writeError function (upstream fix also addresses a potential buffer overflow) - CVE-2007-4629: Multiple stack buffer overflow vulnerabilities in template handlers, potentially allowing the execution of arbitrary code via a maliciously crafted map file stable/main/binary-arm/mapserver-bin_4.10.0-5.1+etch2_arm.deb stable/main/binary-arm/php4-mapscript_4.10.0-5.1+etch2_arm.deb stable/main/binary-arm/php5-mapscript_4.10.0-5.1+etch2_arm.deb stable/main/binary-arm/cgi-mapserver_4.10.0-5.1+etch2_arm.deb stable/main/binary-arm/perl-mapscript_4.10.0-5.1+etch2_arm.deb stable/main/binary-arm/python-mapscript_4.10.0-5.1+etch2_arm.deb mapserver (4.10.0-5.1+etch2) stable-security; urgency=high * Non-maintainer upload by the Security Team. * Apply upstream patches fixing two vulnerabilities: - CVE-2007-4542: Cross-site scripting (XSS) vulnerabilities using mapserver's writeError function (upstream fix also addresses a potential buffer overflow) - CVE-2007-4629: Multiple stack buffer overflow vulnerabilities in template handlers, potentially allowing the execution of arbitrary code via a maliciously crafted map file stable/main/binary-alpha/cgi-mapserver_4.10.0-5.1+etch2_alpha.deb stable/main/binary-alpha/python-mapscript_4.10.0-5.1+etch2_alpha.deb stable/main/binary-alpha/php5-mapscript_4.10.0-5.1+etch2_alpha.deb stable/main/binary-alpha/php4-mapscript_4.10.0-5.1+etch2_alpha.deb stable/main/binary-alpha/mapserver-bin_4.10.0-5.1+etch2_alpha.deb stable/main/binary-alpha/perl-mapscript_4.10.0-5.1+etch2_alpha.deb mapserver (4.10.0-5.1+etch2) stable-security; urgency=high * Non-maintainer upload by the Security Team. * Apply upstream patches fixing two vulnerabilities: - CVE-2007-4542: Cross-site scripting (XSS) vulnerabilities using mapserver's writeError function (upstream fix also addresses a potential buffer overflow) - CVE-2007-4629: Multiple stack buffer overflow vulnerabilities in template handlers, potentially allowing the execution of arbitrary code via a maliciously crafted map file stable/main/binary-all/mapserver-doc_4.10.0-5.1+etch2_all.deb stable/main/binary-amd64/php4-mapscript_4.10.0-5.1+etch2_amd64.deb stable/main/source/mapserver_4.10.0-5.1+etch2.diff.gz stable/main/binary-amd64/python-mapscript_4.10.0-5.1+etch2_amd64.deb stable/main/binary-amd64/php5-mapscript_4.10.0-5.1+etch2_amd64.deb stable/main/binary-amd64/perl-mapscript_4.10.0-5.1+etch2_amd64.deb stable/main/source/mapserver_4.10.0-5.1+etch2.dsc stable/main/binary-amd64/mapserver-bin_4.10.0-5.1+etch2_amd64.deb stable/main/binary-amd64/cgi-mapserver_4.10.0-5.1+etch2_amd64.deb mapserver (4.10.0-5.1+etch2) stable-security; urgency=high * Non-maintainer upload by the Security Team. * Apply upstream patches fixing two vulnerabilities: - CVE-2007-4542: Cross-site scripting (XSS) vulnerabilities using mapserver's writeError function (upstream fix also addresses a potential buffer overflow) - CVE-2007-4629: Multiple stack buffer overflow vulnerabilities in template handlers, potentially allowing the execution of arbitrary code via a maliciously crafted map file stable/main/binary-sparc/ltsp-client_0.99debian11+etch1_sparc.deb ltsp (0.99debian11+etch1) stable-security; urgency=high * Non-maintainer upload by the security team. * X connections to :6 on LTSP clients were possible from any machine on the network. Thanks Vagrant Cascadian for the patch. (CVE-2008-1293, closes: #469462) stable/main/binary-s390/ltsp-client_0.99debian11+etch1_s390.deb ltsp (0.99debian11+etch1) stable-security; urgency=high * Non-maintainer upload by the security team. * X connections to :6 on LTSP clients were possible from any machine on the network. Thanks Vagrant Cascadian for the patch. (CVE-2008-1293, closes: #469462) stable/main/binary-powerpc/ltsp-client_0.99debian11+etch1_powerpc.deb ltsp (0.99debian11+etch1) stable-security; urgency=high * Non-maintainer upload by the security team. * X connections to :6 on LTSP clients were possible from any machine on the network. Thanks Vagrant Cascadian for the patch. (CVE-2008-1293, closes: #469462) stable/main/binary-mipsel/ltsp-client_0.99debian11+etch1_mipsel.deb ltsp (0.99debian11+etch1) stable-security; urgency=high * Non-maintainer upload by the security team. * X connections to :6 on LTSP clients were possible from any machine on the network. Thanks Vagrant Cascadian for the patch. (CVE-2008-1293, closes: #469462) stable/main/binary-mips/ltsp-client_0.99debian11+etch1_mips.deb ltsp (0.99debian11+etch1) stable-security; urgency=high * Non-maintainer upload by the security team. * X connections to :6 on LTSP clients were possible from any machine on the network. Thanks Vagrant Cascadian for the patch. (CVE-2008-1293, closes: #469462) stable/main/binary-ia64/ltsp-client_0.99debian11+etch1_ia64.deb ltsp (0.99debian11+etch1) stable-security; urgency=high * Non-maintainer upload by the security team. * X connections to :6 on LTSP clients were possible from any machine on the network. Thanks Vagrant Cascadian for the patch. (CVE-2008-1293, closes: #469462) stable/main/binary-hppa/ltsp-client_0.99debian11+etch1_hppa.deb ltsp (0.99debian11+etch1) stable-security; urgency=high * Non-maintainer upload by the security team. * X connections to :6 on LTSP clients were possible from any machine on the network. Thanks Vagrant Cascadian for the patch. (CVE-2008-1293, closes: #469462) stable/main/binary-arm/ltsp-client_0.99debian11+etch1_arm.deb ltsp (0.99debian11+etch1) stable-security; urgency=high * Non-maintainer upload by the security team. * X connections to :6 on LTSP clients were possible from any machine on the network. Thanks Vagrant Cascadian for the patch. (CVE-2008-1293, closes: #469462) stable/main/binary-amd64/ltsp-client_0.99debian11+etch1_amd64.deb ltsp (0.99debian11+etch1) stable-security; urgency=high * Non-maintainer upload by the security team. * X connections to :6 on LTSP clients were possible from any machine on the network. Thanks Vagrant Cascadian for the patch. (CVE-2008-1293, closes: #469462) stable/main/binary-alpha/ltsp-client_0.99debian11+etch1_alpha.deb ltsp (0.99debian11+etch1) stable-security; urgency=high * Non-maintainer upload by the security team. * X connections to :6 on LTSP clients were possible from any machine on the network. Thanks Vagrant Cascadian for the patch. (CVE-2008-1293, closes: #469462) stable/main/binary-all/ltsp-server-standalone_0.99debian11+etch1_all.deb stable/main/binary-all/ltsp-server_0.99debian11+etch1_all.deb stable/main/binary-all/ldm_0.99debian11+etch1_all.deb stable/main/binary-all/ltsp-client-builder_0.99debian11+etch1_all.udeb stable/main/source/ltsp_0.99debian11+etch1.tar.gz stable/main/source/ltsp_0.99debian11+etch1.dsc stable/main/binary-i386/ltsp-client_0.99debian11+etch1_i386.deb ltsp (0.99debian11+etch1) stable-security; urgency=high * Non-maintainer upload by the security team. * X connections to :6 on LTSP clients were possible from any machine on the network. Thanks Vagrant Cascadian for the patch. (CVE-2008-1293, closes: #469462) stable/main/binary-i386/linux-image-2.6-486-etchnhalf_2.6.24+13~etchnhalf.1_i386.deb stable/main/binary-hppa/linux-headers-2.6-parisc-etchnhalf_2.6.24+13~etchnhalf.1_hppa.deb stable/main/binary-i386/linux-image-2.6-686-bigmem-etchnhalf_2.6.24+13~etchnhalf.1_i386.deb stable/main/binary-arm/linux-image-2.6-iop32x-etchnhalf_2.6.24+13~etchnhalf.1_arm.deb stable/main/binary-s390/linux-image-2.6-s390-tape-etchnhalf_2.6.24+13~etchnhalf.1_s390.deb stable/main/source/linux-latest-2.6-etchnhalf_13~etchnhalf.1.tar.gz stable/main/binary-mipsel/linux-image-2.6-4kc-malta-etchnhalf_2.6.24+13~etchnhalf.1_mipsel.deb stable/main/binary-hppa/linux-headers-2.6-parisc-smp-etchnhalf_2.6.24+13~etchnhalf.1_hppa.deb stable/main/binary-powerpc/linux-headers-2.6-powerpc-smp-etchnhalf_2.6.24+13~etchnhalf.1_powerpc.deb stable/main/binary-mipsel/linux-headers-2.6-sb1a-bcm91480b-etchnhalf_2.6.24+13~etchnhalf.1_mipsel.deb stable/main/binary-mips/linux-headers-2.6-sb1-bcm91250a-etchnhalf_2.6.24+13~etchnhalf.1_mips.deb stable/main/binary-alpha/linux-image-2.6-alpha-smp-etchnhalf_2.6.24+13~etchnhalf.1_alpha.deb stable/main/binary-mips/linux-headers-2.6-r4k-ip22-etchnhalf_2.6.24+13~etchnhalf.1_mips.deb stable/main/binary-arm/linux-image-2.6-footbridge-etchnhalf_2.6.24+13~etchnhalf.1_arm.deb stable/main/binary-arm/linux-headers-2.6-ixp4xx-etchnhalf_2.6.24+13~etchnhalf.1_arm.deb stable/main/binary-mips/linux-image-2.6-r5k-ip32-etchnhalf_2.6.24+13~etchnhalf.1_mips.deb stable/main/binary-powerpc/linux-headers-2.6-powerpc-etchnhalf_2.6.24+13~etchnhalf.1_powerpc.deb stable/main/binary-i386/linux-headers-2.6-amd64-etchnhalf_2.6.24+13~etchnhalf.1_i386.deb stable/main/binary-hppa/linux-image-2.6-parisc-smp-etchnhalf_2.6.24+13~etchnhalf.1_hppa.deb stable/main/binary-s390/linux-headers-2.6-s390x-etchnhalf_2.6.24+13~etchnhalf.1_s390.deb stable/main/binary-s390/linux-headers-2.6-s390-etchnhalf_2.6.24+13~etchnhalf.1_s390.deb stable/main/binary-alpha/linux-headers-2.6-alpha-generic-etchnhalf_2.6.24+13~etchnhalf.1_alpha.deb stable/main/binary-mipsel/linux-image-2.6-r5k-cobalt-etchnhalf_2.6.24+13~etchnhalf.1_mipsel.deb stable/main/binary-i386/linux-headers-2.6-686-bigmem-etchnhalf_2.6.24+13~etchnhalf.1_i386.deb stable/main/binary-alpha/linux-image-2.6-alpha-legacy-etchnhalf_2.6.24+13~etchnhalf.1_alpha.deb stable/main/binary-alpha/linux-headers-2.6-alpha-legacy-etchnhalf_2.6.24+13~etchnhalf.1_alpha.deb stable/main/binary-powerpc/linux-headers-2.6-powerpc-miboot-etchnhalf_2.6.24+13~etchnhalf.1_powerpc.deb stable/main/binary-powerpc/linux-image-2.6-powerpc-etchnhalf_2.6.24+13~etchnhalf.1_powerpc.deb stable/main/binary-mipsel/linux-headers-2.6-4kc-malta-etchnhalf_2.6.24+13~etchnhalf.1_mipsel.deb stable/main/binary-sparc/linux-image-2.6-sparc64-smp-etchnhalf_2.6.24+13~etchnhalf.1_sparc.deb stable/main/binary-sparc/linux-headers-2.6-sparc64-smp-etchnhalf_2.6.24+13~etchnhalf.1_sparc.deb stable/main/binary-hppa/linux-headers-2.6-parisc64-smp-etchnhalf_2.6.24+13~etchnhalf.1_hppa.deb stable/main/binary-ia64/linux-image-2.6-mckinley-etchnhalf_2.6.24+13~etchnhalf.1_ia64.deb stable/main/binary-i386/linux-image-2.6-686-etchnhalf_2.6.24+13~etchnhalf.1_i386.deb stable/main/binary-powerpc/linux-image-2.6-powerpc-miboot-etchnhalf_2.6.24+13~etchnhalf.1_powerpc.deb stable/main/binary-hppa/linux-image-2.6-parisc64-etchnhalf_2.6.24+13~etchnhalf.1_hppa.deb stable/main/binary-ia64/linux-headers-2.6-itanium-etchnhalf_2.6.24+13~etchnhalf.1_ia64.deb stable/main/binary-mips/linux-image-2.6-sb1a-bcm91480b-etchnhalf_2.6.24+13~etchnhalf.1_mips.deb stable/main/binary-hppa/linux-image-2.6-parisc64-smp-etchnhalf_2.6.24+13~etchnhalf.1_hppa.deb stable/main/binary-alpha/linux-headers-2.6-alpha-smp-etchnhalf_2.6.24+13~etchnhalf.1_alpha.deb stable/main/binary-mips/linux-image-2.6-5kc-malta-etchnhalf_2.6.24+13~etchnhalf.1_mips.deb stable/main/binary-mipsel/linux-headers-2.6-sb1-bcm91250a-etchnhalf_2.6.24+13~etchnhalf.1_mipsel.deb stable/main/binary-mips/linux-headers-2.6-4kc-malta-etchnhalf_2.6.24+13~etchnhalf.1_mips.deb stable/main/binary-sparc/linux-headers-2.6-sparc64-etchnhalf_2.6.24+13~etchnhalf.1_sparc.deb stable/main/binary-hppa/linux-headers-2.6-parisc64-etchnhalf_2.6.24+13~etchnhalf.1_hppa.deb stable/main/binary-powerpc/linux-headers-2.6-powerpc64-etchnhalf_2.6.24+13~etchnhalf.1_powerpc.deb stable/main/binary-sparc/linux-image-2.6-sparc64-etchnhalf_2.6.24+13~etchnhalf.1_sparc.deb stable/main/binary-mipsel/linux-image-2.6-sb1a-bcm91480b-etchnhalf_2.6.24+13~etchnhalf.1_mipsel.deb stable/main/binary-s390/linux-image-2.6-s390x-etchnhalf_2.6.24+13~etchnhalf.1_s390.deb stable/main/source/linux-latest-2.6-etchnhalf_13~etchnhalf.1.dsc stable/main/binary-mips/linux-image-2.6-sb1-bcm91250a-etchnhalf_2.6.24+13~etchnhalf.1_mips.deb stable/main/binary-mips/linux-headers-2.6-sb1a-bcm91480b-etchnhalf_2.6.24+13~etchnhalf.1_mips.deb stable/main/binary-ia64/linux-headers-2.6-mckinley-etchnhalf_2.6.24+13~etchnhalf.1_ia64.deb stable/main/binary-amd64/linux-image-2.6-amd64-etchnhalf_2.6.24+13~etchnhalf.1_amd64.deb stable/main/binary-powerpc/linux-image-2.6-powerpc-smp-etchnhalf_2.6.24+13~etchnhalf.1_powerpc.deb stable/main/binary-mipsel/linux-image-2.6-sb1-bcm91250a-etchnhalf_2.6.24+13~etchnhalf.1_mipsel.deb stable/main/binary-alpha/linux-image-2.6-alpha-generic-etchnhalf_2.6.24+13~etchnhalf.1_alpha.deb stable/main/binary-mipsel/linux-headers-2.6-r5k-cobalt-etchnhalf_2.6.24+13~etchnhalf.1_mipsel.deb stable/main/binary-arm/linux-image-2.6-ixp4xx-etchnhalf_2.6.24+13~etchnhalf.1_arm.deb stable/main/binary-arm/linux-headers-2.6-iop32x-etchnhalf_2.6.24+13~etchnhalf.1_arm.deb stable/main/binary-arm/linux-headers-2.6-footbridge-etchnhalf_2.6.24+13~etchnhalf.1_arm.deb stable/main/binary-i386/linux-headers-2.6-486-etchnhalf_2.6.24+13~etchnhalf.1_i386.deb stable/main/binary-hppa/linux-image-2.6-parisc-etchnhalf_2.6.24+13~etchnhalf.1_hppa.deb stable/main/binary-mipsel/linux-headers-2.6-5kc-malta-etchnhalf_2.6.24+13~etchnhalf.1_mipsel.deb stable/main/binary-powerpc/linux-image-2.6-powerpc64-etchnhalf_2.6.24+13~etchnhalf.1_powerpc.deb stable/main/binary-s390/linux-image-2.6-s390-etchnhalf_2.6.24+13~etchnhalf.1_s390.deb stable/main/binary-mips/linux-headers-2.6-5kc-malta-etchnhalf_2.6.24+13~etchnhalf.1_mips.deb stable/main/binary-amd64/linux-headers-2.6-amd64-etchnhalf_2.6.24+13~etchnhalf.1_amd64.deb stable/main/binary-mipsel/linux-image-2.6-5kc-malta-etchnhalf_2.6.24+13~etchnhalf.1_mipsel.deb stable/main/binary-mips/linux-image-2.6-4kc-malta-etchnhalf_2.6.24+13~etchnhalf.1_mips.deb stable/main/binary-ia64/linux-image-2.6-itanium-etchnhalf_2.6.24+13~etchnhalf.1_ia64.deb stable/main/binary-i386/linux-headers-2.6-686-etchnhalf_2.6.24+13~etchnhalf.1_i386.deb stable/main/binary-mips/linux-image-2.6-r4k-ip22-etchnhalf_2.6.24+13~etchnhalf.1_mips.deb stable/main/binary-i386/linux-image-2.6-amd64-etchnhalf_2.6.24+13~etchnhalf.1_i386.deb stable/main/binary-mips/linux-headers-2.6-r5k-ip32-etchnhalf_2.6.24+13~etchnhalf.1_mips.deb linux-latest-2.6-etchnhalf (13~etchnhalf.1) stable; urgency=low * Branch and rename source for etchnhalf. * Drop transitional packages. Existing etch users should not migrate to etchnhalf kernels automatically. * Add extraversion to templates to provide 'etchnhalf' string. stable/main/binary-sparc/linux-kbuild-2.6.24_2.6.24-1~etchnhalf.1_sparc.deb linux-kbuild-2.6.24 (2.6.24-1~etchnhalf.1) stable; urgency=low * Branch and rename source to linux-2.6.24 targeted for etchnhalf. stable/main/binary-s390/linux-kbuild-2.6.24_2.6.24-1~etchnhalf.1_s390.deb linux-kbuild-2.6.24 (2.6.24-1~etchnhalf.1) stable; urgency=low * Branch and rename source to linux-2.6.24 targeted for etchnhalf. stable/main/binary-powerpc/linux-kbuild-2.6.24_2.6.24-1~etchnhalf.1_powerpc.deb linux-kbuild-2.6.24 (2.6.24-1~etchnhalf.1) stable; urgency=low * Branch and rename source to linux-2.6.24 targeted for etchnhalf. stable/main/binary-mipsel/linux-kbuild-2.6.24_2.6.24-1~etchnhalf.1_mipsel.deb linux-kbuild-2.6.24 (2.6.24-1~etchnhalf.1) stable; urgency=low * Branch and rename source to linux-2.6.24 targeted for etchnhalf. stable/main/binary-mips/linux-kbuild-2.6.24_2.6.24-1~etchnhalf.1_mips.deb linux-kbuild-2.6.24 (2.6.24-1~etchnhalf.1) stable; urgency=low * Branch and rename source to linux-2.6.24 targeted for etchnhalf. stable/main/binary-i386/linux-kbuild-2.6.24_2.6.24-1~etchnhalf.1_i386.deb linux-kbuild-2.6.24 (2.6.24-1~etchnhalf.1) stable; urgency=low * Branch and rename source to linux-2.6.24 targeted for etchnhalf. stable/main/binary-hppa/linux-kbuild-2.6.24_2.6.24-1~etchnhalf.1_hppa.deb linux-kbuild-2.6.24 (2.6.24-1~etchnhalf.1) stable; urgency=low * Branch and rename source to linux-2.6.24 targeted for etchnhalf. stable/main/binary-arm/linux-kbuild-2.6.24_2.6.24-1~etchnhalf.1_arm.deb linux-kbuild-2.6.24 (2.6.24-1~etchnhalf.1) stable; urgency=low * Branch and rename source to linux-2.6.24 targeted for etchnhalf. stable/main/binary-amd64/linux-kbuild-2.6.24_2.6.24-1~etchnhalf.1_amd64.deb linux-kbuild-2.6.24 (2.6.24-1~etchnhalf.1) stable; urgency=low * Branch and rename source to linux-2.6.24 targeted for etchnhalf. stable/main/binary-alpha/linux-kbuild-2.6.24_2.6.24-1~etchnhalf.1_alpha.deb linux-kbuild-2.6.24 (2.6.24-1~etchnhalf.1) stable; urgency=low * Branch and rename source to linux-2.6.24 targeted for etchnhalf. stable/main/source/linux-kbuild-2.6.24_2.6.24-1~etchnhalf.1.dsc stable/main/binary-ia64/linux-kbuild-2.6.24_2.6.24-1~etchnhalf.1_ia64.deb stable/main/source/linux-kbuild-2.6.24_2.6.24-1~etchnhalf.1.diff.gz stable/main/source/linux-kbuild-2.6.24_2.6.24.orig.tar.gz linux-kbuild-2.6.24 (2.6.24-1~etchnhalf.1) stable; urgency=low * Branch and rename source to linux-2.6.24 targeted for etchnhalf. stable/main/binary-sparc/linux-headers-2.6.24-etchnhalf.1-all_2.6.24-6~etchnhalf.4_sparc.deb stable/main/binary-sparc/linux-headers-2.6.24-etchnhalf.1-all-sparc_2.6.24-6~etchnhalf.4_sparc.deb stable/main/binary-sparc/linux-image-2.6.24-etchnhalf.1-sparc64-smp_2.6.24-6~etchnhalf.4_sparc.deb stable/main/binary-sparc/linux-image-2.6.24-etchnhalf.1-sparc64_2.6.24-6~etchnhalf.4_sparc.deb stable/main/binary-sparc/linux-headers-2.6.24-etchnhalf.1-sparc64_2.6.24-6~etchnhalf.4_sparc.deb stable/main/binary-sparc/linux-headers-2.6.24-etchnhalf.1-sparc64-smp_2.6.24-6~etchnhalf.4_sparc.deb stable/main/binary-sparc/linux-headers-2.6.24-etchnhalf.1-common_2.6.24-6~etchnhalf.4_sparc.deb linux-2.6.24 (2.6.24-6~etchnhalf.4) stable; urgency=low [ dann frazier ] * Fix potential overflow condition in sctp_getsockopt_local_addrs_old (CVE-2008-2826) * Reinstate ZERO_PAGE optimization in 'get_user_pages()' and fix XIP (CVE-2008-2372) [ Steve Langasek ] * Re-enable the smbfs module, which is still needed with the etch userspace. Closes: #490293. [ dann frazier ] * Avoid tripping BUG() in IPsec code when the first fragment of an ESP packet does not contain the entire ESP header and IV (CVE-2007-6282) * Fix potential memory corruption in pppol2tp_recvmsg (CVE-2008-2750) * Fix issues with tty operation handling in various drivers (CVE-2008-2812) * Fix memory leak in the copy_user routine, see #490910. (CVE-2008-0598) stable/main/binary-s390/linux-headers-2.6.24-etchnhalf.1-all_2.6.24-6~etchnhalf.4_s390.deb stable/main/binary-s390/linux-headers-2.6.24-etchnhalf.1-all-s390_2.6.24-6~etchnhalf.4_s390.deb stable/main/binary-s390/linux-headers-2.6.24-etchnhalf.1-s390_2.6.24-6~etchnhalf.4_s390.deb stable/main/binary-s390/linux-image-2.6.24-etchnhalf.1-s390-tape_2.6.24-6~etchnhalf.4_s390.deb stable/main/binary-s390/linux-headers-2.6.24-etchnhalf.1-common_2.6.24-6~etchnhalf.4_s390.deb stable/main/binary-s390/linux-headers-2.6.24-etchnhalf.1-s390x_2.6.24-6~etchnhalf.4_s390.deb stable/main/binary-s390/linux-image-2.6.24-etchnhalf.1-s390_2.6.24-6~etchnhalf.4_s390.deb stable/main/binary-s390/linux-image-2.6.24-etchnhalf.1-s390x_2.6.24-6~etchnhalf.4_s390.deb linux-2.6.24 (2.6.24-6~etchnhalf.4) stable; urgency=low [ dann frazier ] * Fix potential overflow condition in sctp_getsockopt_local_addrs_old (CVE-2008-2826) * Reinstate ZERO_PAGE optimization in 'get_user_pages()' and fix XIP (CVE-2008-2372) [ Steve Langasek ] * Re-enable the smbfs module, which is still needed with the etch userspace. Closes: #490293. [ dann frazier ] * Avoid tripping BUG() in IPsec code when the first fragment of an ESP packet does not contain the entire ESP header and IV (CVE-2007-6282) * Fix potential memory corruption in pppol2tp_recvmsg (CVE-2008-2750) * Fix issues with tty operation handling in various drivers (CVE-2008-2812) * Fix memory leak in the copy_user routine, see #490910. (CVE-2008-0598) stable/main/binary-powerpc/linux-image-2.6.24-etchnhalf.1-powerpc-smp_2.6.24-6~etchnhalf.4_powerpc.deb stable/main/binary-powerpc/linux-headers-2.6.24-etchnhalf.1-all-powerpc_2.6.24-6~etchnhalf.4_powerpc.deb stable/main/binary-powerpc/linux-image-2.6.24-etchnhalf.1-powerpc64_2.6.24-6~etchnhalf.4_powerpc.deb stable/main/binary-powerpc/linux-headers-2.6.24-etchnhalf.1-powerpc-smp_2.6.24-6~etchnhalf.4_powerpc.deb stable/main/binary-powerpc/linux-headers-2.6.24-etchnhalf.1-all_2.6.24-6~etchnhalf.4_powerpc.deb stable/main/binary-powerpc/linux-headers-2.6.24-etchnhalf.1-powerpc-miboot_2.6.24-6~etchnhalf.4_powerpc.deb stable/main/binary-powerpc/linux-headers-2.6.24-etchnhalf.1-common_2.6.24-6~etchnhalf.4_powerpc.deb stable/main/binary-powerpc/linux-headers-2.6.24-etchnhalf.1-powerpc64_2.6.24-6~etchnhalf.4_powerpc.deb stable/main/binary-powerpc/linux-headers-2.6.24-etchnhalf.1-powerpc_2.6.24-6~etchnhalf.4_powerpc.deb stable/main/binary-powerpc/linux-image-2.6.24-etchnhalf.1-powerpc-miboot_2.6.24-6~etchnhalf.4_powerpc.deb stable/main/binary-powerpc/linux-image-2.6.24-etchnhalf.1-powerpc_2.6.24-6~etchnhalf.4_powerpc.deb linux-2.6.24 (2.6.24-6~etchnhalf.4) stable; urgency=low [ dann frazier ] * Fix potential overflow condition in sctp_getsockopt_local_addrs_old (CVE-2008-2826) * Reinstate ZERO_PAGE optimization in 'get_user_pages()' and fix XIP (CVE-2008-2372) [ Steve Langasek ] * Re-enable the smbfs module, which is still needed with the etch userspace. Closes: #490293. [ dann frazier ] * Avoid tripping BUG() in IPsec code when the first fragment of an ESP packet does not contain the entire ESP header and IV (CVE-2007-6282) * Fix potential memory corruption in pppol2tp_recvmsg (CVE-2008-2750) * Fix issues with tty operation handling in various drivers (CVE-2008-2812) * Fix memory leak in the copy_user routine, see #490910. (CVE-2008-0598) stable/main/binary-mipsel/linux-headers-2.6.24-etchnhalf.1-all_2.6.24-6~etchnhalf.4_mipsel.deb stable/main/binary-mipsel/linux-image-2.6.24-etchnhalf.1-r5k-cobalt_2.6.24-6~etchnhalf.4_mipsel.deb stable/main/binary-mipsel/linux-headers-2.6.24-etchnhalf.1-r5k-cobalt_2.6.24-6~etchnhalf.4_mipsel.deb stable/main/binary-mipsel/linux-headers-2.6.24-etchnhalf.1-4kc-malta_2.6.24-6~etchnhalf.4_mipsel.deb stable/main/binary-mipsel/linux-image-2.6.24-etchnhalf.1-sb1-bcm91250a_2.6.24-6~etchnhalf.4_mipsel.deb stable/main/binary-mipsel/linux-headers-2.6.24-etchnhalf.1-5kc-malta_2.6.24-6~etchnhalf.4_mipsel.deb stable/main/binary-mipsel/linux-headers-2.6.24-etchnhalf.1-common_2.6.24-6~etchnhalf.4_mipsel.deb stable/main/binary-mipsel/linux-headers-2.6.24-etchnhalf.1-sb1a-bcm91480b_2.6.24-6~etchnhalf.4_mipsel.deb stable/main/binary-mipsel/linux-image-2.6.24-etchnhalf.1-5kc-malta_2.6.24-6~etchnhalf.4_mipsel.deb stable/main/binary-mipsel/linux-image-2.6.24-etchnhalf.1-4kc-malta_2.6.24-6~etchnhalf.4_mipsel.deb stable/main/binary-mipsel/linux-headers-2.6.24-etchnhalf.1-all-mipsel_2.6.24-6~etchnhalf.4_mipsel.deb stable/main/binary-mipsel/linux-headers-2.6.24-etchnhalf.1-sb1-bcm91250a_2.6.24-6~etchnhalf.4_mipsel.deb stable/main/binary-mipsel/linux-image-2.6.24-etchnhalf.1-sb1a-bcm91480b_2.6.24-6~etchnhalf.4_mipsel.deb linux-2.6.24 (2.6.24-6~etchnhalf.4) stable; urgency=low [ dann frazier ] * Fix potential overflow condition in sctp_getsockopt_local_addrs_old (CVE-2008-2826) * Reinstate ZERO_PAGE optimization in 'get_user_pages()' and fix XIP (CVE-2008-2372) [ Steve Langasek ] * Re-enable the smbfs module, which is still needed with the etch userspace. Closes: #490293. [ dann frazier ] * Avoid tripping BUG() in IPsec code when the first fragment of an ESP packet does not contain the entire ESP header and IV (CVE-2007-6282) * Fix potential memory corruption in pppol2tp_recvmsg (CVE-2008-2750) * Fix issues with tty operation handling in various drivers (CVE-2008-2812) * Fix memory leak in the copy_user routine, see #490910. (CVE-2008-0598) stable/main/binary-mips/linux-headers-2.6.24-etchnhalf.1-all_2.6.24-6~etchnhalf.4_mips.deb stable/main/binary-mips/linux-image-2.6.24-etchnhalf.1-sb1a-bcm91480b_2.6.24-6~etchnhalf.4_mips.deb stable/main/binary-mips/linux-headers-2.6.24-etchnhalf.1-common_2.6.24-6~etchnhalf.4_mips.deb stable/main/binary-mips/linux-image-2.6.24-etchnhalf.1-sb1-bcm91250a_2.6.24-6~etchnhalf.4_mips.deb stable/main/binary-mips/linux-image-2.6.24-etchnhalf.1-4kc-malta_2.6.24-6~etchnhalf.4_mips.deb stable/main/binary-mips/linux-headers-2.6.24-etchnhalf.1-r5k-ip32_2.6.24-6~etchnhalf.4_mips.deb stable/main/binary-mips/linux-image-2.6.24-etchnhalf.1-r5k-ip32_2.6.24-6~etchnhalf.4_mips.deb stable/main/binary-mips/linux-headers-2.6.24-etchnhalf.1-r4k-ip22_2.6.24-6~etchnhalf.4_mips.deb stable/main/binary-mips/linux-headers-2.6.24-etchnhalf.1-all-mips_2.6.24-6~etchnhalf.4_mips.deb stable/main/binary-mips/linux-image-2.6.24-etchnhalf.1-r4k-ip22_2.6.24-6~etchnhalf.4_mips.deb stable/main/binary-mips/linux-headers-2.6.24-etchnhalf.1-4kc-malta_2.6.24-6~etchnhalf.4_mips.deb stable/main/binary-mips/linux-headers-2.6.24-etchnhalf.1-sb1-bcm91250a_2.6.24-6~etchnhalf.4_mips.deb stable/main/binary-mips/linux-image-2.6.24-etchnhalf.1-5kc-malta_2.6.24-6~etchnhalf.4_mips.deb stable/main/binary-mips/linux-headers-2.6.24-etchnhalf.1-5kc-malta_2.6.24-6~etchnhalf.4_mips.deb stable/main/binary-mips/linux-headers-2.6.24-etchnhalf.1-sb1a-bcm91480b_2.6.24-6~etchnhalf.4_mips.deb linux-2.6.24 (2.6.24-6~etchnhalf.4) stable; urgency=low [ dann frazier ] * Fix potential overflow condition in sctp_getsockopt_local_addrs_old (CVE-2008-2826) * Reinstate ZERO_PAGE optimization in 'get_user_pages()' and fix XIP (CVE-2008-2372) [ Steve Langasek ] * Re-enable the smbfs module, which is still needed with the etch userspace. Closes: #490293. [ dann frazier ] * Avoid tripping BUG() in IPsec code when the first fragment of an ESP packet does not contain the entire ESP header and IV (CVE-2007-6282) * Fix potential memory corruption in pppol2tp_recvmsg (CVE-2008-2750) * Fix issues with tty operation handling in various drivers (CVE-2008-2812) * Fix memory leak in the copy_user routine, see #490910. (CVE-2008-0598) stable/main/binary-ia64/linux-headers-2.6.24-etchnhalf.1-itanium_2.6.24-6~etchnhalf.4_ia64.deb stable/main/binary-ia64/linux-headers-2.6.24-etchnhalf.1-common_2.6.24-6~etchnhalf.4_ia64.deb stable/main/binary-ia64/linux-image-2.6.24-etchnhalf.1-mckinley_2.6.24-6~etchnhalf.4_ia64.deb stable/main/binary-ia64/linux-headers-2.6.24-etchnhalf.1-mckinley_2.6.24-6~etchnhalf.4_ia64.deb stable/main/binary-ia64/linux-image-2.6.24-etchnhalf.1-itanium_2.6.24-6~etchnhalf.4_ia64.deb stable/main/binary-ia64/linux-headers-2.6.24-etchnhalf.1-all_2.6.24-6~etchnhalf.4_ia64.deb stable/main/binary-ia64/linux-headers-2.6.24-etchnhalf.1-all-ia64_2.6.24-6~etchnhalf.4_ia64.deb linux-2.6.24 (2.6.24-6~etchnhalf.4) stable; urgency=low [ dann frazier ] * Fix potential overflow condition in sctp_getsockopt_local_addrs_old (CVE-2008-2826) * Reinstate ZERO_PAGE optimization in 'get_user_pages()' and fix XIP (CVE-2008-2372) [ Steve Langasek ] * Re-enable the smbfs module, which is still needed with the etch userspace. Closes: #490293. [ dann frazier ] * Avoid tripping BUG() in IPsec code when the first fragment of an ESP packet does not contain the entire ESP header and IV (CVE-2007-6282) * Fix potential memory corruption in pppol2tp_recvmsg (CVE-2008-2750) * Fix issues with tty operation handling in various drivers (CVE-2008-2812) * Fix memory leak in the copy_user routine, see #490910. (CVE-2008-0598) stable/main/binary-i386/linux-headers-2.6.24-etchnhalf.1-common_2.6.24-6~etchnhalf.4_i386.deb stable/main/binary-i386/linux-image-2.6.24-etchnhalf.1-486_2.6.24-6~etchnhalf.4_i386.deb stable/main/binary-i386/linux-headers-2.6.24-etchnhalf.1-all_2.6.24-6~etchnhalf.4_i386.deb stable/main/binary-i386/linux-headers-2.6.24-etchnhalf.1-686_2.6.24-6~etchnhalf.4_i386.deb stable/main/binary-i386/linux-headers-2.6.24-etchnhalf.1-all-i386_2.6.24-6~etchnhalf.4_i386.deb stable/main/binary-i386/linux-headers-2.6.24-etchnhalf.1-amd64_2.6.24-6~etchnhalf.4_i386.deb stable/main/binary-i386/linux-image-2.6.24-etchnhalf.1-686-bigmem_2.6.24-6~etchnhalf.4_i386.deb stable/main/binary-i386/linux-image-2.6.24-etchnhalf.1-amd64_2.6.24-6~etchnhalf.4_i386.deb stable/main/binary-i386/linux-headers-2.6.24-etchnhalf.1-686-bigmem_2.6.24-6~etchnhalf.4_i386.deb stable/main/binary-i386/linux-headers-2.6.24-etchnhalf.1-486_2.6.24-6~etchnhalf.4_i386.deb stable/main/binary-i386/linux-image-2.6.24-etchnhalf.1-686_2.6.24-6~etchnhalf.4_i386.deb linux-2.6.24 (2.6.24-6~etchnhalf.4) stable; urgency=low [ dann frazier ] * Fix potential overflow condition in sctp_getsockopt_local_addrs_old (CVE-2008-2826) * Reinstate ZERO_PAGE optimization in 'get_user_pages()' and fix XIP (CVE-2008-2372) [ Steve Langasek ] * Re-enable the smbfs module, which is still needed with the etch userspace. Closes: #490293. [ dann frazier ] * Avoid tripping BUG() in IPsec code when the first fragment of an ESP packet does not contain the entire ESP header and IV (CVE-2007-6282) * Fix potential memory corruption in pppol2tp_recvmsg (CVE-2008-2750) * Fix issues with tty operation handling in various drivers (CVE-2008-2812) * Fix memory leak in the copy_user routine, see #490910. (CVE-2008-0598) stable/main/binary-hppa/linux-headers-2.6.24-etchnhalf.1-common_2.6.24-6~etchnhalf.4_hppa.deb stable/main/binary-hppa/linux-image-2.6.24-etchnhalf.1-parisc64-smp_2.6.24-6~etchnhalf.4_hppa.deb stable/main/binary-hppa/linux-image-2.6.24-etchnhalf.1-parisc64_2.6.24-6~etchnhalf.4_hppa.deb stable/main/binary-hppa/linux-headers-2.6.24-etchnhalf.1-all-hppa_2.6.24-6~etchnhalf.4_hppa.deb stable/main/binary-hppa/linux-headers-2.6.24-etchnhalf.1-parisc_2.6.24-6~etchnhalf.4_hppa.deb stable/main/binary-hppa/linux-headers-2.6.24-etchnhalf.1-parisc64-smp_2.6.24-6~etchnhalf.4_hppa.deb stable/main/binary-hppa/linux-image-2.6.24-etchnhalf.1-parisc-smp_2.6.24-6~etchnhalf.4_hppa.deb stable/main/binary-hppa/linux-headers-2.6.24-etchnhalf.1-parisc-smp_2.6.24-6~etchnhalf.4_hppa.deb stable/main/binary-hppa/linux-headers-2.6.24-etchnhalf.1-all_2.6.24-6~etchnhalf.4_hppa.deb stable/main/binary-hppa/linux-image-2.6.24-etchnhalf.1-parisc_2.6.24-6~etchnhalf.4_hppa.deb stable/main/binary-hppa/linux-headers-2.6.24-etchnhalf.1-parisc64_2.6.24-6~etchnhalf.4_hppa.deb linux-2.6.24 (2.6.24-6~etchnhalf.4) stable; urgency=low [ dann frazier ] * Fix potential overflow condition in sctp_getsockopt_local_addrs_old (CVE-2008-2826) * Reinstate ZERO_PAGE optimization in 'get_user_pages()' and fix XIP (CVE-2008-2372) [ Steve Langasek ] * Re-enable the smbfs module, which is still needed with the etch userspace. Closes: #490293. [ dann frazier ] * Avoid tripping BUG() in IPsec code when the first fragment of an ESP packet does not contain the entire ESP header and IV (CVE-2007-6282) * Fix potential memory corruption in pppol2tp_recvmsg (CVE-2008-2750) * Fix issues with tty operation handling in various drivers (CVE-2008-2812) * Fix memory leak in the copy_user routine, see #490910. (CVE-2008-0598) stable/main/binary-arm/linux-headers-2.6.24-etchnhalf.1-iop32x_2.6.24-6~etchnhalf.4_arm.deb stable/main/binary-arm/linux-image-2.6.24-etchnhalf.1-iop32x_2.6.24-6~etchnhalf.4_arm.deb stable/main/binary-arm/linux-headers-2.6.24-etchnhalf.1-all-arm_2.6.24-6~etchnhalf.4_arm.deb stable/main/binary-arm/linux-image-2.6.24-etchnhalf.1-ixp4xx_2.6.24-6~etchnhalf.4_arm.deb stable/main/binary-arm/linux-headers-2.6.24-etchnhalf.1-all_2.6.24-6~etchnhalf.4_arm.deb stable/main/binary-arm/linux-headers-2.6.24-etchnhalf.1-footbridge_2.6.24-6~etchnhalf.4_arm.deb stable/main/binary-arm/linux-headers-2.6.24-etchnhalf.1-common_2.6.24-6~etchnhalf.4_arm.deb stable/main/binary-arm/linux-image-2.6.24-etchnhalf.1-footbridge_2.6.24-6~etchnhalf.4_arm.deb stable/main/binary-arm/linux-headers-2.6.24-etchnhalf.1-ixp4xx_2.6.24-6~etchnhalf.4_arm.deb linux-2.6.24 (2.6.24-6~etchnhalf.4) stable; urgency=low [ dann frazier ] * Fix potential overflow condition in sctp_getsockopt_local_addrs_old (CVE-2008-2826) * Reinstate ZERO_PAGE optimization in 'get_user_pages()' and fix XIP (CVE-2008-2372) [ Steve Langasek ] * Re-enable the smbfs module, which is still needed with the etch userspace. Closes: #490293. [ dann frazier ] * Avoid tripping BUG() in IPsec code when the first fragment of an ESP packet does not contain the entire ESP header and IV (CVE-2007-6282) * Fix potential memory corruption in pppol2tp_recvmsg (CVE-2008-2750) * Fix issues with tty operation handling in various drivers (CVE-2008-2812) * Fix memory leak in the copy_user routine, see #490910. (CVE-2008-0598) stable/main/binary-amd64/linux-image-2.6.24-etchnhalf.1-amd64_2.6.24-6~etchnhalf.4_amd64.deb stable/main/binary-amd64/linux-headers-2.6.24-etchnhalf.1-all_2.6.24-6~etchnhalf.4_amd64.deb stable/main/binary-amd64/linux-headers-2.6.24-etchnhalf.1-all-amd64_2.6.24-6~etchnhalf.4_amd64.deb stable/main/binary-amd64/linux-headers-2.6.24-etchnhalf.1-common_2.6.24-6~etchnhalf.4_amd64.deb stable/main/binary-amd64/linux-headers-2.6.24-etchnhalf.1-amd64_2.6.24-6~etchnhalf.4_amd64.deb linux-2.6.24 (2.6.24-6~etchnhalf.4) stable; urgency=low [ dann frazier ] * Fix potential overflow condition in sctp_getsockopt_local_addrs_old (CVE-2008-2826) * Reinstate ZERO_PAGE optimization in 'get_user_pages()' and fix XIP (CVE-2008-2372) [ Steve Langasek ] * Re-enable the smbfs module, which is still needed with the etch userspace. Closes: #490293. [ dann frazier ] * Avoid tripping BUG() in IPsec code when the first fragment of an ESP packet does not contain the entire ESP header and IV (CVE-2007-6282) * Fix potential memory corruption in pppol2tp_recvmsg (CVE-2008-2750) * Fix issues with tty operation handling in various drivers (CVE-2008-2812) * Fix memory leak in the copy_user routine, see #490910. (CVE-2008-0598) stable/main/source/linux-2.6.24_2.6.24-6~etchnhalf.4.dsc stable/main/binary-alpha/linux-image-2.6.24-etchnhalf.1-alpha-legacy_2.6.24-6~etchnhalf.4_alpha.deb stable/main/binary-all/linux-patch-debian-2.6.24_2.6.24-6~etchnhalf.4_all.deb stable/main/binary-all/linux-manual-2.6.24_2.6.24-6~etchnhalf.4_all.deb stable/main/binary-alpha/linux-headers-2.6.24-etchnhalf.1-alpha-generic_2.6.24-6~etchnhalf.4_alpha.deb stable/main/binary-alpha/linux-headers-2.6.24-etchnhalf.1-alpha-smp_2.6.24-6~etchnhalf.4_alpha.deb stable/main/binary-all/linux-support-2.6.24-etchnhalf.1_2.6.24-6~etchnhalf.4_all.deb stable/main/binary-all/linux-tree-2.6.24_2.6.24-6~etchnhalf.4_all.deb stable/main/binary-alpha/linux-image-2.6.24-etchnhalf.1-alpha-generic_2.6.24-6~etchnhalf.4_alpha.deb stable/main/binary-all/linux-doc-2.6.24_2.6.24-6~etchnhalf.4_all.deb stable/main/binary-all/linux-source-2.6.24_2.6.24-6~etchnhalf.4_all.deb stable/main/binary-alpha/linux-headers-2.6.24-etchnhalf.1-all_2.6.24-6~etchnhalf.4_alpha.deb stable/main/source/linux-2.6.24_2.6.24-6~etchnhalf.4.diff.gz stable/main/binary-alpha/linux-image-2.6.24-etchnhalf.1-alpha-smp_2.6.24-6~etchnhalf.4_alpha.deb stable/main/binary-alpha/linux-headers-2.6.24-etchnhalf.1-alpha-legacy_2.6.24-6~etchnhalf.4_alpha.deb stable/main/binary-alpha/linux-headers-2.6.24-etchnhalf.1-common_2.6.24-6~etchnhalf.4_alpha.deb stable/main/binary-alpha/linux-headers-2.6.24-etchnhalf.1-all-alpha_2.6.24-6~etchnhalf.4_alpha.deb linux-2.6.24 (2.6.24-6~etchnhalf.4) stable; urgency=low [ dann frazier ] * Fix potential overflow condition in sctp_getsockopt_local_addrs_old (CVE-2008-2826) * Reinstate ZERO_PAGE optimization in 'get_user_pages()' and fix XIP (CVE-2008-2372) [ Steve Langasek ] * Re-enable the smbfs module, which is still needed with the etch userspace. Closes: #490293. [ dann frazier ] * Avoid tripping BUG() in IPsec code when the first fragment of an ESP packet does not contain the entire ESP header and IV (CVE-2007-6282) * Fix potential memory corruption in pppol2tp_recvmsg (CVE-2008-2750) * Fix issues with tty operation handling in various drivers (CVE-2008-2812) * Fix memory leak in the copy_user routine, see #490910. (CVE-2008-0598) stable/main/binary-sparc/linux-headers-2.6.18-6_2.6.18.dfsg.1-22_sparc.deb stable/main/binary-sparc/linux-headers-2.6.18-6-sparc32_2.6.18.dfsg.1-22_sparc.deb stable/main/binary-sparc/linux-headers-2.6.18-6-sparc64_2.6.18.dfsg.1-22_sparc.deb stable/main/binary-sparc/linux-headers-2.6.18-6-vserver-sparc64_2.6.18.dfsg.1-22_sparc.deb stable/main/binary-sparc/linux-headers-2.6.18-6-sparc64-smp_2.6.18.dfsg.1-22_sparc.deb stable/main/binary-sparc/linux-image-2.6.18-6-sparc64_2.6.18.dfsg.1-22_sparc.deb stable/main/binary-sparc/linux-headers-2.6.18-6-all-sparc_2.6.18.dfsg.1-22_sparc.deb stable/main/binary-sparc/linux-image-2.6.18-6-vserver-sparc64_2.6.18.dfsg.1-22_sparc.deb stable/main/binary-sparc/linux-image-2.6.18-6-sparc64-smp_2.6.18.dfsg.1-22_sparc.deb stable/main/binary-sparc/linux-image-2.6.18-6-sparc32_2.6.18.dfsg.1-22_sparc.deb stable/main/binary-sparc/linux-headers-2.6.18-6-vserver_2.6.18.dfsg.1-22_sparc.deb stable/main/binary-sparc/linux-headers-2.6.18-6-all_2.6.18.dfsg.1-22_sparc.deb linux-2.6 (2.6.18.dfsg.1-22) stable; urgency=high [ dann frazier ] * Merge in changes from 2.6.18.dfsg.1-18etch6 [ Frederik SchC for the patch. stable/main/binary-arm/kdelibs-dbg_3.5.5a.dfsg.1-8etch1+b1_arm.deb stable/main/binary-arm/kdelibs4c2a_3.5.5a.dfsg.1-8etch1+b1_arm.deb stable/main/binary-arm/kdelibs4-dev_3.5.5a.dfsg.1-8etch1+b1_arm.deb kdelibs (4:3.5.5a.dfsg.1-8etch1+b1) stable; urgency=low * Binary-only non-maintainer upload for arm; no source changes. * Rebuild against newest qt-x11-free stable/main/binary-arm/kpager_3.5.5a.dfsg.1-6etch2+b1_arm.deb stable/main/binary-arm/ksplash_3.5.5a.dfsg.1-6etch2+b1_arm.deb stable/main/binary-arm/kdebase-dev_3.5.5a.dfsg.1-6etch2+b1_arm.deb stable/main/binary-arm/kate_3.5.5a.dfsg.1-6etch2+b1_arm.deb stable/main/binary-arm/ktip_3.5.5a.dfsg.1-6etch2+b1_arm.deb stable/main/binary-arm/kdebase-dbg_3.5.5a.dfsg.1-6etch2+b1_arm.deb stable/main/binary-arm/kappfinder_3.5.5a.dfsg.1-6etch2+b1_arm.deb stable/main/binary-arm/kdebase-kio-plugins_3.5.5a.dfsg.1-6etch2+b1_arm.deb stable/main/binary-arm/libkonq4-dev_3.5.5a.dfsg.1-6etch2+b1_arm.deb stable/main/binary-arm/kdebase-bin_3.5.5a.dfsg.1-6etch2+b1_arm.deb stable/main/binary-arm/kdepasswd_3.5.5a.dfsg.1-6etch2+b1_arm.deb stable/main/binary-arm/kdesktop_3.5.5a.dfsg.1-6etch2+b1_arm.deb stable/main/binary-arm/kdeprint_3.5.5a.dfsg.1-6etch2+b1_arm.deb stable/main/binary-arm/kpersonalizer_3.5.5a.dfsg.1-6etch2+b1_arm.deb stable/main/binary-arm/kcontrol_3.5.5a.dfsg.1-6etch2+b1_arm.deb stable/main/binary-arm/ksysguard_3.5.5a.dfsg.1-6etch2+b1_arm.deb stable/main/binary-arm/ksysguardd_3.5.5a.dfsg.1-6etch2+b1_arm.deb stable/main/binary-arm/kdm_3.5.5a.dfsg.1-6etch2+b1_arm.deb stable/main/binary-arm/kmenuedit_3.5.5a.dfsg.1-6etch2+b1_arm.deb stable/main/binary-arm/khelpcenter_3.5.5a.dfsg.1-6etch2+b1_arm.deb stable/main/binary-arm/libkonq4_3.5.5a.dfsg.1-6etch2+b1_arm.deb stable/main/binary-arm/klipper_3.5.5a.dfsg.1-6etch2+b1_arm.deb stable/main/binary-arm/kfind_3.5.5a.dfsg.1-6etch2+b1_arm.deb stable/main/binary-arm/kwin_3.5.5a.dfsg.1-6etch2+b1_arm.deb stable/main/binary-arm/kicker_3.5.5a.dfsg.1-6etch2+b1_arm.deb stable/main/binary-arm/ksmserver_3.5.5a.dfsg.1-6etch2+b1_arm.deb stable/main/binary-arm/konqueror_3.5.5a.dfsg.1-6etch2+b1_arm.deb stable/main/binary-arm/konsole_3.5.5a.dfsg.1-6etch2+b1_arm.deb stable/main/binary-arm/konqueror-nsplugins_3.5.5a.dfsg.1-6etch2+b1_arm.deb kdebase (4:3.5.5a.dfsg.1-6etch2+b1) stable; urgency=low * Binary-only non-maintainer upload for arm; no source changes. * Rebuild against qt-x11-free 3:3.3.7-4etch2 and kdelibs 4:3.5.5a.dfsg.1-8etch1+b1 stable/main/binary-sparc/kazehakase_0.4.2-1etch1_sparc.deb kazehakase (0.4.2-1etch1) stable-security; urgency=high * Stop building against the bundled PCRE (v4.5) library, and instead build against the system's PCRE (v6.7) library. This fixes a security problem in kazehakase's PCRE that has already been fixed in Debian's pcre3 packages (closes: #464756). stable/main/binary-s390/kazehakase_0.4.2-1etch1_s390.deb kazehakase (0.4.2-1etch1) stable-security; urgency=high * Stop building against the bundled PCRE (v4.5) library, and instead build against the system's PCRE (v6.7) library. This fixes a security problem in kazehakase's PCRE that has already been fixed in Debian's pcre3 packages (closes: #464756). stable/main/binary-powerpc/kazehakase_0.4.2-1etch1_powerpc.deb kazehakase (0.4.2-1etch1) stable-security; urgency=high * Stop building against the bundled PCRE (v4.5) library, and instead build against the system's PCRE (v6.7) library. This fixes a security problem in kazehakase's PCRE that has already been fixed in Debian's pcre3 packages (closes: #464756). stable/main/binary-mipsel/kazehakase_0.4.2-1etch1_mipsel.deb kazehakase (0.4.2-1etch1) stable-security; urgency=high * Stop building against the bundled PCRE (v4.5) library, and instead build against the system's PCRE (v6.7) library. This fixes a security problem in kazehakase's PCRE that has already been fixed in Debian's pcre3 packages (closes: #464756). stable/main/binary-mips/kazehakase_0.4.2-1etch1_mips.deb kazehakase (0.4.2-1etch1) stable-security; urgency=high * Stop building against the bundled PCRE (v4.5) library, and instead build against the system's PCRE (v6.7) library. This fixes a security problem in kazehakase's PCRE that has already been fixed in Debian's pcre3 packages (closes: #464756). stable/main/binary-ia64/kazehakase_0.4.2-1etch1_ia64.deb kazehakase (0.4.2-1etch1) stable-security; urgency=high * Stop building against the bundled PCRE (v4.5) library, and instead build against the system's PCRE (v6.7) library. This fixes a security problem in kazehakase's PCRE that has already been fixed in Debian's pcre3 packages (closes: #464756). stable/main/binary-hppa/kazehakase_0.4.2-1etch1_hppa.deb kazehakase (0.4.2-1etch1) stable-security; urgency=high * Stop building against the bundled PCRE (v4.5) library, and instead build against the system's PCRE (v6.7) library. This fixes a security problem in kazehakase's PCRE that has already been fixed in Debian's pcre3 packages (closes: #464756). stable/main/binary-arm/kazehakase_0.4.2-1etch1_arm.deb kazehakase (0.4.2-1etch1) stable-security; urgency=high * Stop building against the bundled PCRE (v4.5) library, and instead build against the system's PCRE (v6.7) library. This fixes a security problem in kazehakase's PCRE that has already been fixed in Debian's pcre3 packages (closes: #464756). stable/main/binary-amd64/kazehakase_0.4.2-1etch1_amd64.deb kazehakase (0.4.2-1etch1) stable-security; urgency=high * Stop building against the bundled PCRE (v4.5) library, and instead build against the system's PCRE (v6.7) library. This fixes a security problem in kazehakase's PCRE that has already been fixed in Debian's pcre3 packages (closes: #464756). stable/main/binary-alpha/kazehakase_0.4.2-1etch1_alpha.deb kazehakase (0.4.2-1etch1) stable-security; urgency=high * Stop building against the bundled PCRE (v4.5) library, and instead build against the system's PCRE (v6.7) library. This fixes a security problem in kazehakase's PCRE that has already been fixed in Debian's pcre3 packages (closes: #464756). stable/main/binary-i386/kazehakase_0.4.2-1etch1_i386.deb stable/main/source/kazehakase_0.4.2-1etch1.diff.gz stable/main/source/kazehakase_0.4.2-1etch1.dsc kazehakase (0.4.2-1etch1) stable-security; urgency=high * Stop building against the bundled PCRE (v4.5) library, and instead build against the system's PCRE (v6.7) library. This fixes a security problem in kazehakase's PCRE that has already been fixed in Debian's pcre3 packages (closes: #464756). stable/main/binary-all/initramfs-tools_0.85i_all.deb stable/main/source/initramfs-tools_0.85i.tar.gz stable/main/source/initramfs-tools_0.85i.dsc initramfs-tools (0.85i) stable; urgency=low * update-initramfs: mbr_check() fix for /dev/md/X naming. * hook-functions: Fix Xen boot with Lenny glibc. stable/main/binary-sparc/libimlib2-dev_1.3.0.0debian1-4+etch1_sparc.deb stable/main/binary-sparc/libimlib2_1.3.0.0debian1-4+etch1_sparc.deb imlib2 (1.3.0.0debian1-4+etch1) stable-security; urgency=high * Fix buffer overflows in XPM and PNM loaders. (CVE-2008-2426) stable/main/binary-s390/libimlib2_1.3.0.0debian1-4+etch1_s390.deb stable/main/binary-s390/libimlib2-dev_1.3.0.0debian1-4+etch1_s390.deb imlib2 (1.3.0.0debian1-4+etch1) stable-security; urgency=high * Fix buffer overflows in XPM and PNM loaders. (CVE-2008-2426) stable/main/binary-powerpc/libimlib2-dev_1.3.0.0debian1-4+etch1_powerpc.deb stable/main/binary-powerpc/libimlib2_1.3.0.0debian1-4+etch1_powerpc.deb imlib2 (1.3.0.0debian1-4+etch1) stable-security; urgency=high * Fix buffer overflows in XPM and PNM loaders. (CVE-2008-2426) stable/main/binary-mipsel/libimlib2_1.3.0.0debian1-4+etch1_mipsel.deb stable/main/binary-mipsel/libimlib2-dev_1.3.0.0debian1-4+etch1_mipsel.deb imlib2 (1.3.0.0debian1-4+etch1) stable-security; urgency=high * Fix buffer overflows in XPM and PNM loaders. (CVE-2008-2426) stable/main/binary-mips/libimlib2_1.3.0.0debian1-4+etch1_mips.deb stable/main/binary-mips/libimlib2-dev_1.3.0.0debian1-4+etch1_mips.deb imlib2 (1.3.0.0debian1-4+etch1) stable-security; urgency=high * Fix buffer overflows in XPM and PNM loaders. (CVE-2008-2426) stable/main/binary-ia64/libimlib2-dev_1.3.0.0debian1-4+etch1_ia64.deb stable/main/binary-ia64/libimlib2_1.3.0.0debian1-4+etch1_ia64.deb imlib2 (1.3.0.0debian1-4+etch1) stable-security; urgency=high * Fix buffer overflows in XPM and PNM loaders. (CVE-2008-2426) stable/main/binary-hppa/libimlib2_1.3.0.0debian1-4+etch1_hppa.deb stable/main/binary-hppa/libimlib2-dev_1.3.0.0debian1-4+etch1_hppa.deb imlib2 (1.3.0.0debian1-4+etch1) stable-security; urgency=high * Fix buffer overflows in XPM and PNM loaders. (CVE-2008-2426) stable/main/binary-arm/libimlib2_1.3.0.0debian1-4+etch1_arm.deb stable/main/binary-arm/libimlib2-dev_1.3.0.0debian1-4+etch1_arm.deb imlib2 (1.3.0.0debian1-4+etch1) stable-security; urgency=high * Fix buffer overflows in XPM and PNM loaders. (CVE-2008-2426) stable/main/binary-amd64/libimlib2_1.3.0.0debian1-4+etch1_amd64.deb stable/main/binary-amd64/libimlib2-dev_1.3.0.0debian1-4+etch1_amd64.deb imlib2 (1.3.0.0debian1-4+etch1) stable-security; urgency=high * Fix buffer overflows in XPM and PNM loaders. (CVE-2008-2426) stable/main/binary-alpha/libimlib2_1.3.0.0debian1-4+etch1_alpha.deb stable/main/binary-alpha/libimlib2-dev_1.3.0.0debian1-4+etch1_alpha.deb imlib2 (1.3.0.0debian1-4+etch1) stable-security; urgency=high * Fix buffer overflows in XPM and PNM loaders. (CVE-2008-2426) stable/main/binary-i386/libimlib2-dev_1.3.0.0debian1-4+etch1_i386.deb stable/main/source/imlib2_1.3.0.0debian1-4+etch1.diff.gz stable/main/source/imlib2_1.3.0.0debian1-4+etch1.dsc stable/main/binary-i386/libimlib2_1.3.0.0debian1-4+etch1_i386.deb imlib2 (1.3.0.0debian1-4+etch1) stable-security; urgency=high * Fix buffer overflows in XPM and PNM loaders. (CVE-2008-2426) stable/main/source/ikiwiki_1.33.6.tar.gz stable/main/binary-all/ikiwiki_1.33.6_all.deb stable/main/source/ikiwiki_1.33.6.dsc ikiwiki (1.33.6) stable-security; urgency=low * Some error messages in recent backported security fixes used gettext, but this version of ikiwiki is not localised and display of those error messages would fail. Remove the gettext use. * Fix a problem with cookie setting when httpauth is used. Closes: #479658 This bug was always present, but was only exposed by the CSRF fixes. stable/main/binary-sparc/libicu36_3.6-2etch1_sparc.deb stable/main/binary-sparc/libicu36-dev_3.6-2etch1_sparc.deb icu (3.6-2etch1) stable-security; urgency=high * Add debian/patches/00-cve-2007-4770-4771.patch created from with svn diff -c 23292 \ http://source.icu-project.org/repos/icu/icu/branches/maint/maint-3-8 to address the following security vulnerablilities: - CVE-2007-4770: reference to non-existent capture group may cause access to invalid memory - CVE-2007-4771: buffer overflow in regexcmp.cpp stable/main/binary-s390/libicu36_3.6-2etch1_s390.deb stable/main/binary-s390/libicu36-dev_3.6-2etch1_s390.deb icu (3.6-2etch1) stable-security; urgency=high * Add debian/patches/00-cve-2007-4770-4771.patch created from with svn diff -c 23292 \ http://source.icu-project.org/repos/icu/icu/branches/maint/maint-3-8 to address the following security vulnerablilities: - CVE-2007-4770: reference to non-existent capture group may cause access to invalid memory - CVE-2007-4771: buffer overflow in regexcmp.cpp stable/main/binary-powerpc/libicu36_3.6-2etch1_powerpc.deb stable/main/binary-powerpc/libicu36-dev_3.6-2etch1_powerpc.deb icu (3.6-2etch1) stable-security; urgency=high * Add debian/patches/00-cve-2007-4770-4771.patch created from with svn diff -c 23292 \ http://source.icu-project.org/repos/icu/icu/branches/maint/maint-3-8 to address the following security vulnerablilities: - CVE-2007-4770: reference to non-existent capture group may cause access to invalid memory - CVE-2007-4771: buffer overflow in regexcmp.cpp stable/main/binary-mipsel/libicu36_3.6-2etch1_mipsel.deb stable/main/binary-mipsel/libicu36-dev_3.6-2etch1_mipsel.deb icu (3.6-2etch1) stable-security; urgency=high * Add debian/patches/00-cve-2007-4770-4771.patch created from with svn diff -c 23292 \ http://source.icu-project.org/repos/icu/icu/branches/maint/maint-3-8 to address the following security vulnerablilities: - CVE-2007-4770: reference to non-existent capture group may cause access to invalid memory - CVE-2007-4771: buffer overflow in regexcmp.cpp stable/main/binary-mips/libicu36-dev_3.6-2etch1_mips.deb stable/main/binary-mips/libicu36_3.6-2etch1_mips.deb icu (3.6-2etch1) stable-security; urgency=high * Add debian/patches/00-cve-2007-4770-4771.patch created from with svn diff -c 23292 \ http://source.icu-project.org/repos/icu/icu/branches/maint/maint-3-8 to address the following security vulnerablilities: - CVE-2007-4770: reference to non-existent capture group may cause access to invalid memory - CVE-2007-4771: buffer overflow in regexcmp.cpp stable/main/binary-ia64/libicu36-dev_3.6-2etch1_ia64.deb stable/main/binary-ia64/libicu36_3.6-2etch1_ia64.deb icu (3.6-2etch1) stable-security; urgency=high * Add debian/patches/00-cve-2007-4770-4771.patch created from with svn diff -c 23292 \ http://source.icu-project.org/repos/icu/icu/branches/maint/maint-3-8 to address the following security vulnerablilities: - CVE-2007-4770: reference to non-existent capture group may cause access to invalid memory - CVE-2007-4771: buffer overflow in regexcmp.cpp stable/main/binary-i386/libicu36_3.6-2etch1_i386.deb stable/main/binary-i386/libicu36-dev_3.6-2etch1_i386.deb icu (3.6-2etch1) stable-security; urgency=high * Add debian/patches/00-cve-2007-4770-4771.patch created from with svn diff -c 23292 \ http://source.icu-project.org/repos/icu/icu/branches/maint/maint-3-8 to address the following security vulnerablilities: - CVE-2007-4770: reference to non-existent capture group may cause access to invalid memory - CVE-2007-4771: buffer overflow in regexcmp.cpp stable/main/binary-hppa/libicu36-dev_3.6-2etch1_hppa.deb stable/main/binary-hppa/libicu36_3.6-2etch1_hppa.deb icu (3.6-2etch1) stable-security; urgency=high * Add debian/patches/00-cve-2007-4770-4771.patch created from with svn diff -c 23292 \ http://source.icu-project.org/repos/icu/icu/branches/maint/maint-3-8 to address the following security vulnerablilities: - CVE-2007-4770: reference to non-existent capture group may cause access to invalid memory - CVE-2007-4771: buffer overflow in regexcmp.cpp stable/main/binary-arm/libicu36-dev_3.6-2etch1_arm.deb stable/main/binary-arm/libicu36_3.6-2etch1_arm.deb icu (3.6-2etch1) stable-security; urgency=high * Add debian/patches/00-cve-2007-4770-4771.patch created from with svn diff -c 23292 \ http://source.icu-project.org/repos/icu/icu/branches/maint/maint-3-8 to address the following security vulnerablilities: - CVE-2007-4770: reference to non-existent capture group may cause access to invalid memory - CVE-2007-4771: buffer overflow in regexcmp.cpp stable/main/binary-alpha/libicu36-dev_3.6-2etch1_alpha.deb stable/main/binary-alpha/libicu36_3.6-2etch1_alpha.deb icu (3.6-2etch1) stable-security; urgency=high * Add debian/patches/00-cve-2007-4770-4771.patch created from with svn diff -c 23292 \ http://source.icu-project.org/repos/icu/icu/branches/maint/maint-3-8 to address the following security vulnerablilities: - CVE-2007-4770: reference to non-existent capture group may cause access to invalid memory - CVE-2007-4771: buffer overflow in regexcmp.cpp stable/main/binary-amd64/libicu36-dev_3.6-2etch1_amd64.deb stable/main/source/icu_3.6-2etch1.diff.gz stable/main/binary-all/icu-doc_3.6-2etch1_all.deb stable/main/binary-amd64/libicu36_3.6-2etch1_amd64.deb stable/main/source/icu_3.6-2etch1.dsc icu (3.6-2etch1) stable-security; urgency=high * Add debian/patches/00-cve-2007-4770-4771.patch created from with svn diff -c 23292 \ http://source.icu-project.org/repos/icu/icu/branches/maint/maint-3-8 to address the following security vulnerablilities: - CVE-2007-4770: reference to non-existent capture group may cause access to invalid memory - CVE-2007-4771: buffer overflow in regexcmp.cpp stable/main/binary-sparc/iceweasel-gnome-support_2.0.0.15-0etch1_sparc.deb stable/main/binary-sparc/iceweasel-dbg_2.0.0.15-0etch1_sparc.deb stable/main/binary-sparc/iceweasel_2.0.0.15-0etch1_sparc.deb iceweasel (2.0.0.15-0etch1) stable-security; urgency=critical * New upstream security release. * Fixes mfsa 2008-21 aka CVE-2008-2798 and CVE-2008-2799; mfsa 2008-22 aka CVE-2008-2800; mfsa 2008-23 aka CVE-2008-2801; mfsa 2008-24 aka CVE-2008-2802; mfsa 2008-25 aka CVE-2008-2803; mfsa 2008-27 aka CVE-2008-2805; mfsa 2008-28 aka CVE-2008-2806; mfsa 2008-29 aka CVE-2008-2807; mfsa 2008-30 aka CVE-2008-2808; mfsa 2008-31 aka CVE-2008-2809; mfsa 2008-32 aka CVE-2008-2810; mfsa 2008-33 aka CVE-2008-2811. stable/main/binary-s390/iceweasel-gnome-support_2.0.0.15-0etch1_s390.deb stable/main/binary-s390/iceweasel-dbg_2.0.0.15-0etch1_s390.deb stable/main/binary-s390/iceweasel_2.0.0.15-0etch1_s390.deb iceweasel (2.0.0.15-0etch1) stable-security; urgency=critical * New upstream security release. * Fixes mfsa 2008-21 aka CVE-2008-2798 and CVE-2008-2799; mfsa 2008-22 aka CVE-2008-2800; mfsa 2008-23 aka CVE-2008-2801; mfsa 2008-24 aka CVE-2008-2802; mfsa 2008-25 aka CVE-2008-2803; mfsa 2008-27 aka CVE-2008-2805; mfsa 2008-28 aka CVE-2008-2806; mfsa 2008-29 aka CVE-2008-2807; mfsa 2008-30 aka CVE-2008-2808; mfsa 2008-31 aka CVE-2008-2809; mfsa 2008-32 aka CVE-2008-2810; mfsa 2008-33 aka CVE-2008-2811. stable/main/binary-powerpc/iceweasel_2.0.0.15-0etch1_powerpc.deb stable/main/binary-powerpc/iceweasel-gnome-support_2.0.0.15-0etch1_powerpc.deb stable/main/binary-powerpc/iceweasel-dbg_2.0.0.15-0etch1_powerpc.deb iceweasel (2.0.0.15-0etch1) stable-security; urgency=critical * New upstream security release. * Fixes mfsa 2008-21 aka CVE-2008-2798 and CVE-2008-2799; mfsa 2008-22 aka CVE-2008-2800; mfsa 2008-23 aka CVE-2008-2801; mfsa 2008-24 aka CVE-2008-2802; mfsa 2008-25 aka CVE-2008-2803; mfsa 2008-27 aka CVE-2008-2805; mfsa 2008-28 aka CVE-2008-2806; mfsa 2008-29 aka CVE-2008-2807; mfsa 2008-30 aka CVE-2008-2808; mfsa 2008-31 aka CVE-2008-2809; mfsa 2008-32 aka CVE-2008-2810; mfsa 2008-33 aka CVE-2008-2811. stable/main/binary-mipsel/iceweasel-dbg_2.0.0.15-0etch1_mipsel.deb stable/main/binary-mipsel/iceweasel_2.0.0.15-0etch1_mipsel.deb stable/main/binary-mipsel/iceweasel-gnome-support_2.0.0.15-0etch1_mipsel.deb iceweasel (2.0.0.15-0etch1) stable-security; urgency=critical * New upstream security release. * Fixes mfsa 2008-21 aka CVE-2008-2798 and CVE-2008-2799; mfsa 2008-22 aka CVE-2008-2800; mfsa 2008-23 aka CVE-2008-2801; mfsa 2008-24 aka CVE-2008-2802; mfsa 2008-25 aka CVE-2008-2803; mfsa 2008-27 aka CVE-2008-2805; mfsa 2008-28 aka CVE-2008-2806; mfsa 2008-29 aka CVE-2008-2807; mfsa 2008-30 aka CVE-2008-2808; mfsa 2008-31 aka CVE-2008-2809; mfsa 2008-32 aka CVE-2008-2810; mfsa 2008-33 aka CVE-2008-2811. stable/main/binary-mips/iceweasel_2.0.0.15-0etch1_mips.deb stable/main/binary-mips/iceweasel-gnome-support_2.0.0.15-0etch1_mips.deb stable/main/binary-mips/iceweasel-dbg_2.0.0.15-0etch1_mips.deb iceweasel (2.0.0.15-0etch1) stable-security; urgency=critical * New upstream security release. * Fixes mfsa 2008-21 aka CVE-2008-2798 and CVE-2008-2799; mfsa 2008-22 aka CVE-2008-2800; mfsa 2008-23 aka CVE-2008-2801; mfsa 2008-24 aka CVE-2008-2802; mfsa 2008-25 aka CVE-2008-2803; mfsa 2008-27 aka CVE-2008-2805; mfsa 2008-28 aka CVE-2008-2806; mfsa 2008-29 aka CVE-2008-2807; mfsa 2008-30 aka CVE-2008-2808; mfsa 2008-31 aka CVE-2008-2809; mfsa 2008-32 aka CVE-2008-2810; mfsa 2008-33 aka CVE-2008-2811. stable/main/binary-ia64/iceweasel_2.0.0.15-0etch1_ia64.deb stable/main/binary-ia64/iceweasel-dbg_2.0.0.15-0etch1_ia64.deb stable/main/binary-ia64/iceweasel-gnome-support_2.0.0.15-0etch1_ia64.deb iceweasel (2.0.0.15-0etch1) stable-security; urgency=critical * New upstream security release. * Fixes mfsa 2008-21 aka CVE-2008-2798 and CVE-2008-2799; mfsa 2008-22 aka CVE-2008-2800; mfsa 2008-23 aka CVE-2008-2801; mfsa 2008-24 aka CVE-2008-2802; mfsa 2008-25 aka CVE-2008-2803; mfsa 2008-27 aka CVE-2008-2805; mfsa 2008-28 aka CVE-2008-2806; mfsa 2008-29 aka CVE-2008-2807; mfsa 2008-30 aka CVE-2008-2808; mfsa 2008-31 aka CVE-2008-2809; mfsa 2008-32 aka CVE-2008-2810; mfsa 2008-33 aka CVE-2008-2811. stable/main/binary-i386/iceweasel-dbg_2.0.0.15-0etch1_i386.deb stable/main/binary-i386/iceweasel-gnome-support_2.0.0.15-0etch1_i386.deb stable/main/binary-i386/iceweasel_2.0.0.15-0etch1_i386.deb iceweasel (2.0.0.15-0etch1) stable-security; urgency=critical * New upstream security release. * Fixes mfsa 2008-21 aka CVE-2008-2798 and CVE-2008-2799; mfsa 2008-22 aka CVE-2008-2800; mfsa 2008-23 aka CVE-2008-2801; mfsa 2008-24 aka CVE-2008-2802; mfsa 2008-25 aka CVE-2008-2803; mfsa 2008-27 aka CVE-2008-2805; mfsa 2008-28 aka CVE-2008-2806; mfsa 2008-29 aka CVE-2008-2807; mfsa 2008-30 aka CVE-2008-2808; mfsa 2008-31 aka CVE-2008-2809; mfsa 2008-32 aka CVE-2008-2810; mfsa 2008-33 aka CVE-2008-2811. stable/main/binary-hppa/iceweasel-dbg_2.0.0.15-0etch1_hppa.deb stable/main/binary-hppa/iceweasel_2.0.0.15-0etch1_hppa.deb stable/main/binary-hppa/iceweasel-gnome-support_2.0.0.15-0etch1_hppa.deb iceweasel (2.0.0.15-0etch1) stable-security; urgency=critical * New upstream security release. * Fixes mfsa 2008-21 aka CVE-2008-2798 and CVE-2008-2799; mfsa 2008-22 aka CVE-2008-2800; mfsa 2008-23 aka CVE-2008-2801; mfsa 2008-24 aka CVE-2008-2802; mfsa 2008-25 aka CVE-2008-2803; mfsa 2008-27 aka CVE-2008-2805; mfsa 2008-28 aka CVE-2008-2806; mfsa 2008-29 aka CVE-2008-2807; mfsa 2008-30 aka CVE-2008-2808; mfsa 2008-31 aka CVE-2008-2809; mfsa 2008-32 aka CVE-2008-2810; mfsa 2008-33 aka CVE-2008-2811. stable/main/binary-arm/iceweasel-dbg_2.0.0.15-0etch1_arm.deb stable/main/binary-arm/iceweasel-gnome-support_2.0.0.15-0etch1_arm.deb stable/main/binary-arm/iceweasel_2.0.0.15-0etch1_arm.deb iceweasel (2.0.0.15-0etch1) stable-security; urgency=critical * New upstream security release. * Fixes mfsa 2008-21 aka CVE-2008-2798 and CVE-2008-2799; mfsa 2008-22 aka CVE-2008-2800; mfsa 2008-23 aka CVE-2008-2801; mfsa 2008-24 aka CVE-2008-2802; mfsa 2008-25 aka CVE-2008-2803; mfsa 2008-27 aka CVE-2008-2805; mfsa 2008-28 aka CVE-2008-2806; mfsa 2008-29 aka CVE-2008-2807; mfsa 2008-30 aka CVE-2008-2808; mfsa 2008-31 aka CVE-2008-2809; mfsa 2008-32 aka CVE-2008-2810; mfsa 2008-33 aka CVE-2008-2811. stable/main/binary-alpha/iceweasel-gnome-support_2.0.0.15-0etch1_alpha.deb stable/main/binary-alpha/iceweasel_2.0.0.15-0etch1_alpha.deb stable/main/binary-alpha/iceweasel-dbg_2.0.0.15-0etch1_alpha.deb iceweasel (2.0.0.15-0etch1) stable-security; urgency=critical * New upstream security release. * Fixes mfsa 2008-21 aka CVE-2008-2798 and CVE-2008-2799; mfsa 2008-22 aka CVE-2008-2800; mfsa 2008-23 aka CVE-2008-2801; mfsa 2008-24 aka CVE-2008-2802; mfsa 2008-25 aka CVE-2008-2803; mfsa 2008-27 aka CVE-2008-2805; mfsa 2008-28 aka CVE-2008-2806; mfsa 2008-29 aka CVE-2008-2807; mfsa 2008-30 aka CVE-2008-2808; mfsa 2008-31 aka CVE-2008-2809; mfsa 2008-32 aka CVE-2008-2810; mfsa 2008-33 aka CVE-2008-2811. stable/main/binary-amd64/iceweasel-dbg_2.0.0.15-0etch1_amd64.deb stable/main/binary-amd64/iceweasel-gnome-support_2.0.0.15-0etch1_amd64.deb stable/main/source/iceweasel_2.0.0.15-0etch1.diff.gz stable/main/binary-all/mozilla-firefox_2.0.0.15-0etch1_all.deb stable/main/binary-all/iceweasel-dom-inspector_2.0.0.15-0etch1_all.deb stable/main/source/iceweasel_2.0.0.15.orig.tar.gz stable/main/binary-all/firefox-gnome-support_2.0.0.15-0etch1_all.deb stable/main/binary-amd64/iceweasel_2.0.0.15-0etch1_amd64.deb stable/main/binary-all/firefox_2.0.0.15-0etch1_all.deb stable/main/binary-all/mozilla-firefox-dom-inspector_2.0.0.15-0etch1_all.deb stable/main/source/iceweasel_2.0.0.15-0etch1.dsc stable/main/binary-all/mozilla-firefox-gnome-support_2.0.0.15-0etch1_all.deb stable/main/binary-all/firefox-dom-inspector_2.0.0.15-0etch1_all.deb iceweasel (2.0.0.15-0etch1) stable-security; urgency=critical * New upstream security release. * Fixes mfsa 2008-21 aka CVE-2008-2798 and CVE-2008-2799; mfsa 2008-22 aka CVE-2008-2800; mfsa 2008-23 aka CVE-2008-2801; mfsa 2008-24 aka CVE-2008-2802; mfsa 2008-25 aka CVE-2008-2803; mfsa 2008-27 aka CVE-2008-2805; mfsa 2008-28 aka CVE-2008-2806; mfsa 2008-29 aka CVE-2008-2807; mfsa 2008-30 aka CVE-2008-2808; mfsa 2008-31 aka CVE-2008-2809; mfsa 2008-32 aka CVE-2008-2810; mfsa 2008-33 aka CVE-2008-2811. stable/main/binary-sparc/icedove_1.5.0.13+1.5.0.15b.dfsg1+prepatch080417a-0etch1_sparc.deb stable/main/binary-sparc/icedove-typeaheadfind_1.5.0.13+1.5.0.15b.dfsg1+prepatch080417a-0etch1_sparc.deb stable/main/binary-sparc/icedove-dev_1.5.0.13+1.5.0.15b.dfsg1+prepatch080417a-0etch1_sparc.deb stable/main/binary-sparc/icedove-dbg_1.5.0.13+1.5.0.15b.dfsg1+prepatch080417a-0etch1_sparc.deb stable/main/binary-sparc/icedove-gnome-support_1.5.0.13+1.5.0.15b.dfsg1+prepatch080417a-0etch1_sparc.deb stable/main/binary-sparc/icedove-inspector_1.5.0.13+1.5.0.15b.dfsg1+prepatch080417a-0etch1_sparc.deb icedove (1.5.0.13+1.5.0.15b.dfsg1+prepatch080417a-0etch1) stable-security; urgency=low * backports for thunderbird 2.0.0.14 stability/security update * MFSA 2008-15 aka CVE-2008-1236 - Crashes with evidence of memory corruption (rv:1.8.1.13) - browser engine * MFSA 2008-15 aka CVE-2008-1237 - Crashes with evidence of memory corruption (rv:1.8.1.13) - javascript engine * MFSA 2008-14 aka CVE-2008-1233, CVE-2008-1234, CVE-2008-1235 - JavaScript privilege escalation and arbitrary code execution * drop patches applied upstream: - 0071_279505-attachment-297724-fix-396613-regression stable/main/binary-s390/icedove_1.5.0.13+1.5.0.15b.dfsg1+prepatch080417a-0etch1_s390.deb stable/main/binary-s390/icedove-dbg_1.5.0.13+1.5.0.15b.dfsg1+prepatch080417a-0etch1_s390.deb stable/main/binary-s390/icedove-gnome-support_1.5.0.13+1.5.0.15b.dfsg1+prepatch080417a-0etch1_s390.deb stable/main/binary-s390/icedove-dev_1.5.0.13+1.5.0.15b.dfsg1+prepatch080417a-0etch1_s390.deb stable/main/binary-s390/icedove-typeaheadfind_1.5.0.13+1.5.0.15b.dfsg1+prepatch080417a-0etch1_s390.deb stable/main/binary-s390/icedove-inspector_1.5.0.13+1.5.0.15b.dfsg1+prepatch080417a-0etch1_s390.deb icedove (1.5.0.13+1.5.0.15b.dfsg1+prepatch080417a-0etch1) stable-security; urgency=low * backports for thunderbird 2.0.0.14 stability/security update * MFSA 2008-15 aka CVE-2008-1236 - Crashes with evidence of memory corruption (rv:1.8.1.13) - browser engine * MFSA 2008-15 aka CVE-2008-1237 - Crashes with evidence of memory corruption (rv:1.8.1.13) - javascript engine * MFSA 2008-14 aka CVE-2008-1233, CVE-2008-1234, CVE-2008-1235 - JavaScript privilege escalation and arbitrary code execution * drop patches applied upstream: - 0071_279505-attachment-297724-fix-396613-regression stable/main/binary-powerpc/icedove-dbg_1.5.0.13+1.5.0.15b.dfsg1+prepatch080417a-0etch1_powerpc.deb stable/main/binary-powerpc/icedove_1.5.0.13+1.5.0.15b.dfsg1+prepatch080417a-0etch1_powerpc.deb stable/main/binary-powerpc/icedove-dev_1.5.0.13+1.5.0.15b.dfsg1+prepatch080417a-0etch1_powerpc.deb stable/main/binary-powerpc/icedove-typeaheadfind_1.5.0.13+1.5.0.15b.dfsg1+prepatch080417a-0etch1_powerpc.deb stable/main/binary-powerpc/icedove-inspector_1.5.0.13+1.5.0.15b.dfsg1+prepatch080417a-0etch1_powerpc.deb stable/main/binary-powerpc/icedove-gnome-support_1.5.0.13+1.5.0.15b.dfsg1+prepatch080417a-0etch1_powerpc.deb icedove (1.5.0.13+1.5.0.15b.dfsg1+prepatch080417a-0etch1) stable-security; urgency=low * backports for thunderbird 2.0.0.14 stability/security update * MFSA 2008-15 aka CVE-2008-1236 - Crashes with evidence of memory corruption (rv:1.8.1.13) - browser engine * MFSA 2008-15 aka CVE-2008-1237 - Crashes with evidence of memory corruption (rv:1.8.1.13) - javascript engine * MFSA 2008-14 aka CVE-2008-1233, CVE-2008-1234, CVE-2008-1235 - JavaScript privilege escalation and arbitrary code execution * drop patches applied upstream: - 0071_279505-attachment-297724-fix-396613-regression stable/main/binary-mipsel/icedove-gnome-support_1.5.0.13+1.5.0.15b.dfsg1+prepatch080417a-0etch1_mipsel.deb stable/main/binary-mipsel/icedove-typeaheadfind_1.5.0.13+1.5.0.15b.dfsg1+prepatch080417a-0etch1_mipsel.deb stable/main/binary-mipsel/icedove-inspector_1.5.0.13+1.5.0.15b.dfsg1+prepatch080417a-0etch1_mipsel.deb stable/main/binary-mipsel/icedove_1.5.0.13+1.5.0.15b.dfsg1+prepatch080417a-0etch1_mipsel.deb stable/main/binary-mipsel/icedove-dev_1.5.0.13+1.5.0.15b.dfsg1+prepatch080417a-0etch1_mipsel.deb stable/main/binary-mipsel/icedove-dbg_1.5.0.13+1.5.0.15b.dfsg1+prepatch080417a-0etch1_mipsel.deb icedove (1.5.0.13+1.5.0.15b.dfsg1+prepatch080417a-0etch1) stable-security; urgency=low * backports for thunderbird 2.0.0.14 stability/security update * MFSA 2008-15 aka CVE-2008-1236 - Crashes with evidence of memory corruption (rv:1.8.1.13) - browser engine * MFSA 2008-15 aka CVE-2008-1237 - Crashes with evidence of memory corruption (rv:1.8.1.13) - javascript engine * MFSA 2008-14 aka CVE-2008-1233, CVE-2008-1234, CVE-2008-1235 - JavaScript privilege escalation and arbitrary code execution * drop patches applied upstream: - 0071_279505-attachment-297724-fix-396613-regression stable/main/binary-mips/icedove-gnome-support_1.5.0.13+1.5.0.15b.dfsg1+prepatch080417a-0etch1_mips.deb stable/main/binary-mips/icedove_1.5.0.13+1.5.0.15b.dfsg1+prepatch080417a-0etch1_mips.deb stable/main/binary-mips/icedove-inspector_1.5.0.13+1.5.0.15b.dfsg1+prepatch080417a-0etch1_mips.deb stable/main/binary-mips/icedove-dev_1.5.0.13+1.5.0.15b.dfsg1+prepatch080417a-0etch1_mips.deb stable/main/binary-mips/icedove-typeaheadfind_1.5.0.13+1.5.0.15b.dfsg1+prepatch080417a-0etch1_mips.deb stable/main/binary-mips/icedove-dbg_1.5.0.13+1.5.0.15b.dfsg1+prepatch080417a-0etch1_mips.deb icedove (1.5.0.13+1.5.0.15b.dfsg1+prepatch080417a-0etch1) stable-security; urgency=low * backports for thunderbird 2.0.0.14 stability/security update * MFSA 2008-15 aka CVE-2008-1236 - Crashes with evidence of memory corruption (rv:1.8.1.13) - browser engine * MFSA 2008-15 aka CVE-2008-1237 - Crashes with evidence of memory corruption (rv:1.8.1.13) - javascript engine * MFSA 2008-14 aka CVE-2008-1233, CVE-2008-1234, CVE-2008-1235 - JavaScript privilege escalation and arbitrary code execution * drop patches applied upstream: - 0071_279505-attachment-297724-fix-396613-regression stable/main/binary-ia64/icedove-gnome-support_1.5.0.13+1.5.0.15b.dfsg1+prepatch080417a-0etch1_ia64.deb stable/main/binary-ia64/icedove_1.5.0.13+1.5.0.15b.dfsg1+prepatch080417a-0etch1_ia64.deb stable/main/binary-ia64/icedove-dbg_1.5.0.13+1.5.0.15b.dfsg1+prepatch080417a-0etch1_ia64.deb stable/main/binary-ia64/icedove-typeaheadfind_1.5.0.13+1.5.0.15b.dfsg1+prepatch080417a-0etch1_ia64.deb stable/main/binary-ia64/icedove-dev_1.5.0.13+1.5.0.15b.dfsg1+prepatch080417a-0etch1_ia64.deb stable/main/binary-ia64/icedove-inspector_1.5.0.13+1.5.0.15b.dfsg1+prepatch080417a-0etch1_ia64.deb icedove (1.5.0.13+1.5.0.15b.dfsg1+prepatch080417a-0etch1) stable-security; urgency=low * backports for thunderbird 2.0.0.14 stability/security update * MFSA 2008-15 aka CVE-2008-1236 - Crashes with evidence of memory corruption (rv:1.8.1.13) - browser engine * MFSA 2008-15 aka CVE-2008-1237 - Crashes with evidence of memory corruption (rv:1.8.1.13) - javascript engine * MFSA 2008-14 aka CVE-2008-1233, CVE-2008-1234, CVE-2008-1235 - JavaScript privilege escalation and arbitrary code execution * drop patches applied upstream: - 0071_279505-attachment-297724-fix-396613-regression stable/main/binary-i386/icedove-inspector_1.5.0.13+1.5.0.15b.dfsg1+prepatch080417a-0etch1_i386.deb stable/main/binary-i386/icedove-dev_1.5.0.13+1.5.0.15b.dfsg1+prepatch080417a-0etch1_i386.deb stable/main/binary-i386/icedove-dbg_1.5.0.13+1.5.0.15b.dfsg1+prepatch080417a-0etch1_i386.deb stable/main/binary-i386/icedove-typeaheadfind_1.5.0.13+1.5.0.15b.dfsg1+prepatch080417a-0etch1_i386.deb stable/main/binary-i386/icedove_1.5.0.13+1.5.0.15b.dfsg1+prepatch080417a-0etch1_i386.deb stable/main/binary-i386/icedove-gnome-support_1.5.0.13+1.5.0.15b.dfsg1+prepatch080417a-0etch1_i386.deb icedove (1.5.0.13+1.5.0.15b.dfsg1+prepatch080417a-0etch1) stable-security; urgency=low * backports for thunderbird 2.0.0.14 stability/security update * MFSA 2008-15 aka CVE-2008-1236 - Crashes with evidence of memory corruption (rv:1.8.1.13) - browser engine * MFSA 2008-15 aka CVE-2008-1237 - Crashes with evidence of memory corruption (rv:1.8.1.13) - javascript engine * MFSA 2008-14 aka CVE-2008-1233, CVE-2008-1234, CVE-2008-1235 - JavaScript privilege escalation and arbitrary code execution * drop patches applied upstream: - 0071_279505-attachment-297724-fix-396613-regression stable/main/binary-hppa/icedove-gnome-support_1.5.0.13+1.5.0.15b.dfsg1+prepatch080417a-0etch1_hppa.deb stable/main/binary-hppa/icedove-typeaheadfind_1.5.0.13+1.5.0.15b.dfsg1+prepatch080417a-0etch1_hppa.deb stable/main/binary-hppa/icedove-inspector_1.5.0.13+1.5.0.15b.dfsg1+prepatch080417a-0etch1_hppa.deb stable/main/binary-hppa/icedove-dbg_1.5.0.13+1.5.0.15b.dfsg1+prepatch080417a-0etch1_hppa.deb stable/main/binary-hppa/icedove_1.5.0.13+1.5.0.15b.dfsg1+prepatch080417a-0etch1_hppa.deb stable/main/binary-hppa/icedove-dev_1.5.0.13+1.5.0.15b.dfsg1+prepatch080417a-0etch1_hppa.deb icedove (1.5.0.13+1.5.0.15b.dfsg1+prepatch080417a-0etch1) stable-security; urgency=low * backports for thunderbird 2.0.0.14 stability/security update * MFSA 2008-15 aka CVE-2008-1236 - Crashes with evidence of memory corruption (rv:1.8.1.13) - browser engine * MFSA 2008-15 aka CVE-2008-1237 - Crashes with evidence of memory corruption (rv:1.8.1.13) - javascript engine * MFSA 2008-14 aka CVE-2008-1233, CVE-2008-1234, CVE-2008-1235 - JavaScript privilege escalation and arbitrary code execution * drop patches applied upstream: - 0071_279505-attachment-297724-fix-396613-regression stable/main/binary-arm/icedove-inspector_1.5.0.13+1.5.0.15b.dfsg1+prepatch080417a-0etch1_arm.deb stable/main/binary-arm/icedove-gnome-support_1.5.0.13+1.5.0.15b.dfsg1+prepatch080417a-0etch1_arm.deb stable/main/binary-arm/icedove_1.5.0.13+1.5.0.15b.dfsg1+prepatch080417a-0etch1_arm.deb stable/main/binary-arm/icedove-dbg_1.5.0.13+1.5.0.15b.dfsg1+prepatch080417a-0etch1_arm.deb stable/main/binary-arm/icedove-typeaheadfind_1.5.0.13+1.5.0.15b.dfsg1+prepatch080417a-0etch1_arm.deb stable/main/binary-arm/icedove-dev_1.5.0.13+1.5.0.15b.dfsg1+prepatch080417a-0etch1_arm.deb icedove (1.5.0.13+1.5.0.15b.dfsg1+prepatch080417a-0etch1) stable-security; urgency=low * backports for thunderbird 2.0.0.14 stability/security update * MFSA 2008-15 aka CVE-2008-1236 - Crashes with evidence of memory corruption (rv:1.8.1.13) - browser engine * MFSA 2008-15 aka CVE-2008-1237 - Crashes with evidence of memory corruption (rv:1.8.1.13) - javascript engine * MFSA 2008-14 aka CVE-2008-1233, CVE-2008-1234, CVE-2008-1235 - JavaScript privilege escalation and arbitrary code execution * drop patches applied upstream: - 0071_279505-attachment-297724-fix-396613-regression stable/main/binary-alpha/icedove-dbg_1.5.0.13+1.5.0.15b.dfsg1+prepatch080417a-0etch1_alpha.deb stable/main/binary-alpha/icedove-inspector_1.5.0.13+1.5.0.15b.dfsg1+prepatch080417a-0etch1_alpha.deb stable/main/binary-alpha/icedove-dev_1.5.0.13+1.5.0.15b.dfsg1+prepatch080417a-0etch1_alpha.deb stable/main/binary-alpha/icedove-gnome-support_1.5.0.13+1.5.0.15b.dfsg1+prepatch080417a-0etch1_alpha.deb stable/main/binary-alpha/icedove_1.5.0.13+1.5.0.15b.dfsg1+prepatch080417a-0etch1_alpha.deb stable/main/binary-alpha/icedove-typeaheadfind_1.5.0.13+1.5.0.15b.dfsg1+prepatch080417a-0etch1_alpha.deb icedove (1.5.0.13+1.5.0.15b.dfsg1+prepatch080417a-0etch1) stable-security; urgency=low * backports for thunderbird 2.0.0.14 stability/security update * MFSA 2008-15 aka CVE-2008-1236 - Crashes with evidence of memory corruption (rv:1.8.1.13) - browser engine * MFSA 2008-15 aka CVE-2008-1237 - Crashes with evidence of memory corruption (rv:1.8.1.13) - javascript engine * MFSA 2008-14 aka CVE-2008-1233, CVE-2008-1234, CVE-2008-1235 - JavaScript privilege escalation and arbitrary code execution * drop patches applied upstream: - 0071_279505-attachment-297724-fix-396613-regression stable/main/binary-all/mozilla-thunderbird-inspector_1.5.0.13+1.5.0.15b.dfsg1+prepatch080417a-0etch1_all.deb stable/main/binary-all/mozilla-thunderbird-dev_1.5.0.13+1.5.0.15b.dfsg1+prepatch080417a-0etch1_all.deb stable/main/source/icedove_1.5.0.13+1.5.0.15b.dfsg1+prepatch080417a-0etch1.diff.gz stable/main/binary-all/thunderbird-gnome-support_1.5.0.13+1.5.0.15b.dfsg1+prepatch080417a-0etch1_all.deb stable/main/binary-amd64/icedove-typeaheadfind_1.5.0.13+1.5.0.15b.dfsg1+prepatch080417a-0etch1_amd64.deb stable/main/binary-amd64/icedove-inspector_1.5.0.13+1.5.0.15b.dfsg1+prepatch080417a-0etch1_amd64.deb stable/main/binary-amd64/icedove-dbg_1.5.0.13+1.5.0.15b.dfsg1+prepatch080417a-0etch1_amd64.deb stable/main/binary-all/thunderbird-dev_1.5.0.13+1.5.0.15b.dfsg1+prepatch080417a-0etch1_all.deb stable/main/binary-all/mozilla-thunderbird-typeaheadfind_1.5.0.13+1.5.0.15b.dfsg1+prepatch080417a-0etch1_all.deb stable/main/source/icedove_1.5.0.13+1.5.0.15b.dfsg1+prepatch080417a-0etch1.dsc stable/main/binary-all/mozilla-thunderbird_1.5.0.13+1.5.0.15b.dfsg1+prepatch080417a-0etch1_all.deb stable/main/binary-all/thunderbird-dbg_1.5.0.13+1.5.0.15b.dfsg1+prepatch080417a-0etch1_all.deb stable/main/binary-all/thunderbird_1.5.0.13+1.5.0.15b.dfsg1+prepatch080417a-0etch1_all.deb stable/main/binary-amd64/icedove-dev_1.5.0.13+1.5.0.15b.dfsg1+prepatch080417a-0etch1_amd64.deb stable/main/source/icedove_1.5.0.13+1.5.0.15b.dfsg1+prepatch080417a.orig.tar.gz stable/main/binary-amd64/icedove-gnome-support_1.5.0.13+1.5.0.15b.dfsg1+prepatch080417a-0etch1_amd64.deb stable/main/binary-all/thunderbird-typeaheadfind_1.5.0.13+1.5.0.15b.dfsg1+prepatch080417a-0etch1_all.deb stable/main/binary-amd64/icedove_1.5.0.13+1.5.0.15b.dfsg1+prepatch080417a-0etch1_amd64.deb stable/main/binary-all/thunderbird-inspector_1.5.0.13+1.5.0.15b.dfsg1+prepatch080417a-0etch1_all.deb icedove (1.5.0.13+1.5.0.15b.dfsg1+prepatch080417a-0etch1) stable-security; urgency=low * backports for thunderbird 2.0.0.14 stability/security update * MFSA 2008-15 aka CVE-2008-1236 - Crashes with evidence of memory corruption (rv:1.8.1.13) - browser engine * MFSA 2008-15 aka CVE-2008-1237 - Crashes with evidence of memory corruption (rv:1.8.1.13) - javascript engine * MFSA 2008-14 aka CVE-2008-1233, CVE-2008-1234, CVE-2008-1235 - JavaScript privilege escalation and arbitrary code execution * drop patches applied upstream: - 0071_279505-attachment-297724-fix-396613-regression stable/main/binary-sparc/iceape-dom-inspector_1.0.13~pre080323b-0etch3_sparc.deb stable/main/binary-sparc/iceape-calendar_1.0.13~pre080323b-0etch3_sparc.deb stable/main/binary-sparc/iceape-gnome-support_1.0.13~pre080323b-0etch3_sparc.deb stable/main/binary-sparc/iceape-mailnews_1.0.13~pre080323b-0etch3_sparc.deb stable/main/binary-sparc/iceape-dbg_1.0.13~pre080323b-0etch3_sparc.deb stable/main/binary-sparc/iceape-browser_1.0.13~pre080323b-0etch3_sparc.deb iceape (1.0.13~pre080323b-0etch3) stable-security; urgency=low * debian/patches/90_bz416282.dpatch: Fix for MFSA 2008-08 aka CVE-2008-0591, which was not actually in 1.0.12~pre080131b-0etch1. * debian/patches/90_bz421622.dpatch: Fix a regression introduced by fix for CVE-2008-1234. * debian/patches/90_bz425576.dpatch: Fix for MFSA 2008-20 aka CVE-2008-1380. * debian/patches/00list: Updated accordingly. stable/main/binary-s390/iceape-gnome-support_1.0.13~pre080323b-0etch3_s390.deb stable/main/binary-s390/iceape-browser_1.0.13~pre080323b-0etch3_s390.deb stable/main/binary-s390/iceape-mailnews_1.0.13~pre080323b-0etch3_s390.deb stable/main/binary-s390/iceape-dom-inspector_1.0.13~pre080323b-0etch3_s390.deb stable/main/binary-s390/iceape-calendar_1.0.13~pre080323b-0etch3_s390.deb stable/main/binary-s390/iceape-dbg_1.0.13~pre080323b-0etch3_s390.deb iceape (1.0.13~pre080323b-0etch3) stable-security; urgency=low * debian/patches/90_bz416282.dpatch: Fix for MFSA 2008-08 aka CVE-2008-0591, which was not actually in 1.0.12~pre080131b-0etch1. * debian/patches/90_bz421622.dpatch: Fix a regression introduced by fix for CVE-2008-1234. * debian/patches/90_bz425576.dpatch: Fix for MFSA 2008-20 aka CVE-2008-1380. * debian/patches/00list: Updated accordingly. stable/main/binary-powerpc/iceape-browser_1.0.13~pre080323b-0etch3_powerpc.deb stable/main/binary-powerpc/iceape-dom-inspector_1.0.13~pre080323b-0etch3_powerpc.deb stable/main/binary-powerpc/iceape-dbg_1.0.13~pre080323b-0etch3_powerpc.deb stable/main/binary-powerpc/iceape-gnome-support_1.0.13~pre080323b-0etch3_powerpc.deb stable/main/binary-powerpc/iceape-calendar_1.0.13~pre080323b-0etch3_powerpc.deb stable/main/binary-powerpc/iceape-mailnews_1.0.13~pre080323b-0etch3_powerpc.deb iceape (1.0.13~pre080323b-0etch3) stable-security; urgency=low * debian/patches/90_bz416282.dpatch: Fix for MFSA 2008-08 aka CVE-2008-0591, which was not actually in 1.0.12~pre080131b-0etch1. * debian/patches/90_bz421622.dpatch: Fix a regression introduced by fix for CVE-2008-1234. * debian/patches/90_bz425576.dpatch: Fix for MFSA 2008-20 aka CVE-2008-1380. * debian/patches/00list: Updated accordingly. stable/main/binary-mipsel/iceape-mailnews_1.0.13~pre080323b-0etch3_mipsel.deb stable/main/binary-mipsel/iceape-gnome-support_1.0.13~pre080323b-0etch3_mipsel.deb stable/main/binary-mipsel/iceape-browser_1.0.13~pre080323b-0etch3_mipsel.deb stable/main/binary-mipsel/iceape-dom-inspector_1.0.13~pre080323b-0etch3_mipsel.deb stable/main/binary-mipsel/iceape-dbg_1.0.13~pre080323b-0etch3_mipsel.deb stable/main/binary-mipsel/iceape-calendar_1.0.13~pre080323b-0etch3_mipsel.deb iceape (1.0.13~pre080323b-0etch3) stable-security; urgency=low * debian/patches/90_bz416282.dpatch: Fix for MFSA 2008-08 aka CVE-2008-0591, which was not actually in 1.0.12~pre080131b-0etch1. * debian/patches/90_bz421622.dpatch: Fix a regression introduced by fix for CVE-2008-1234. * debian/patches/90_bz425576.dpatch: Fix for MFSA 2008-20 aka CVE-2008-1380. * debian/patches/00list: Updated accordingly. stable/main/binary-mips/iceape-gnome-support_1.0.13~pre080323b-0etch3_mips.deb stable/main/binary-mips/iceape-mailnews_1.0.13~pre080323b-0etch3_mips.deb stable/main/binary-mips/iceape-dom-inspector_1.0.13~pre080323b-0etch3_mips.deb stable/main/binary-mips/iceape-browser_1.0.13~pre080323b-0etch3_mips.deb stable/main/binary-mips/iceape-calendar_1.0.13~pre080323b-0etch3_mips.deb stable/main/binary-mips/iceape-dbg_1.0.13~pre080323b-0etch3_mips.deb iceape (1.0.13~pre080323b-0etch3) stable-security; urgency=low * debian/patches/90_bz416282.dpatch: Fix for MFSA 2008-08 aka CVE-2008-0591, which was not actually in 1.0.12~pre080131b-0etch1. * debian/patches/90_bz421622.dpatch: Fix a regression introduced by fix for CVE-2008-1234. * debian/patches/90_bz425576.dpatch: Fix for MFSA 2008-20 aka CVE-2008-1380. * debian/patches/00list: Updated accordingly. stable/main/binary-ia64/iceape-calendar_1.0.13~pre080323b-0etch3_ia64.deb stable/main/binary-ia64/iceape-gnome-support_1.0.13~pre080323b-0etch3_ia64.deb stable/main/binary-ia64/iceape-browser_1.0.13~pre080323b-0etch3_ia64.deb stable/main/binary-ia64/iceape-mailnews_1.0.13~pre080323b-0etch3_ia64.deb stable/main/binary-ia64/iceape-dbg_1.0.13~pre080323b-0etch3_ia64.deb stable/main/binary-ia64/iceape-dom-inspector_1.0.13~pre080323b-0etch3_ia64.deb iceape (1.0.13~pre080323b-0etch3) stable-security; urgency=low * debian/patches/90_bz416282.dpatch: Fix for MFSA 2008-08 aka CVE-2008-0591, which was not actually in 1.0.12~pre080131b-0etch1. * debian/patches/90_bz421622.dpatch: Fix a regression introduced by fix for CVE-2008-1234. * debian/patches/90_bz425576.dpatch: Fix for MFSA 2008-20 aka CVE-2008-1380. * debian/patches/00list: Updated accordingly. stable/main/binary-i386/iceape-dom-inspector_1.0.13~pre080323b-0etch3_i386.deb stable/main/binary-i386/iceape-mailnews_1.0.13~pre080323b-0etch3_i386.deb stable/main/binary-i386/iceape-dbg_1.0.13~pre080323b-0etch3_i386.deb stable/main/binary-i386/iceape-browser_1.0.13~pre080323b-0etch3_i386.deb stable/main/binary-i386/iceape-gnome-support_1.0.13~pre080323b-0etch3_i386.deb stable/main/binary-i386/iceape-calendar_1.0.13~pre080323b-0etch3_i386.deb iceape (1.0.13~pre080323b-0etch3) stable-security; urgency=low * debian/patches/90_bz416282.dpatch: Fix for MFSA 2008-08 aka CVE-2008-0591, which was not actually in 1.0.12~pre080131b-0etch1. * debian/patches/90_bz421622.dpatch: Fix a regression introduced by fix for CVE-2008-1234. * debian/patches/90_bz425576.dpatch: Fix for MFSA 2008-20 aka CVE-2008-1380. * debian/patches/00list: Updated accordingly. stable/main/binary-hppa/iceape-dom-inspector_1.0.13~pre080323b-0etch3_hppa.deb stable/main/binary-hppa/iceape-browser_1.0.13~pre080323b-0etch3_hppa.deb stable/main/binary-hppa/iceape-mailnews_1.0.13~pre080323b-0etch3_hppa.deb stable/main/binary-hppa/iceape-calendar_1.0.13~pre080323b-0etch3_hppa.deb stable/main/binary-hppa/iceape-gnome-support_1.0.13~pre080323b-0etch3_hppa.deb stable/main/binary-hppa/iceape-dbg_1.0.13~pre080323b-0etch3_hppa.deb iceape (1.0.13~pre080323b-0etch3) stable-security; urgency=low * debian/patches/90_bz416282.dpatch: Fix for MFSA 2008-08 aka CVE-2008-0591, which was not actually in 1.0.12~pre080131b-0etch1. * debian/patches/90_bz421622.dpatch: Fix a regression introduced by fix for CVE-2008-1234. * debian/patches/90_bz425576.dpatch: Fix for MFSA 2008-20 aka CVE-2008-1380. * debian/patches/00list: Updated accordingly. stable/main/binary-arm/iceape-dbg_1.0.13~pre080323b-0etch3_arm.deb stable/main/binary-arm/iceape-browser_1.0.13~pre080323b-0etch3_arm.deb stable/main/binary-arm/iceape-calendar_1.0.13~pre080323b-0etch3_arm.deb stable/main/binary-arm/iceape-dom-inspector_1.0.13~pre080323b-0etch3_arm.deb stable/main/binary-arm/iceape-mailnews_1.0.13~pre080323b-0etch3_arm.deb stable/main/binary-arm/iceape-gnome-support_1.0.13~pre080323b-0etch3_arm.deb iceape (1.0.13~pre080323b-0etch3) stable-security; urgency=low * debian/patches/90_bz416282.dpatch: Fix for MFSA 2008-08 aka CVE-2008-0591, which was not actually in 1.0.12~pre080131b-0etch1. * debian/patches/90_bz421622.dpatch: Fix a regression introduced by fix for CVE-2008-1234. * debian/patches/90_bz425576.dpatch: Fix for MFSA 2008-20 aka CVE-2008-1380. * debian/patches/00list: Updated accordingly. stable/main/binary-alpha/iceape-browser_1.0.13~pre080323b-0etch3_alpha.deb stable/main/binary-alpha/iceape-mailnews_1.0.13~pre080323b-0etch3_alpha.deb stable/main/binary-alpha/iceape-gnome-support_1.0.13~pre080323b-0etch3_alpha.deb stable/main/binary-alpha/iceape-calendar_1.0.13~pre080323b-0etch3_alpha.deb stable/main/binary-alpha/iceape-dom-inspector_1.0.13~pre080323b-0etch3_alpha.deb stable/main/binary-alpha/iceape-dbg_1.0.13~pre080323b-0etch3_alpha.deb iceape (1.0.13~pre080323b-0etch3) stable-security; urgency=low * debian/patches/90_bz416282.dpatch: Fix for MFSA 2008-08 aka CVE-2008-0591, which was not actually in 1.0.12~pre080131b-0etch1. * debian/patches/90_bz421622.dpatch: Fix a regression introduced by fix for CVE-2008-1234. * debian/patches/90_bz425576.dpatch: Fix for MFSA 2008-20 aka CVE-2008-1380. * debian/patches/00list: Updated accordingly. stable/main/binary-all/mozilla-calendar_1.8+1.0.13~pre080323b-0etch3_all.deb stable/main/binary-amd64/iceape-dom-inspector_1.0.13~pre080323b-0etch3_amd64.deb stable/main/binary-all/mozilla-dom-inspector_1.8+1.0.13~pre080323b-0etch3_all.deb stable/main/binary-all/iceape_1.0.13~pre080323b-0etch3_all.deb stable/main/binary-all/iceape-dev_1.0.13~pre080323b-0etch3_all.deb stable/main/binary-amd64/iceape-calendar_1.0.13~pre080323b-0etch3_amd64.deb stable/main/binary-all/iceape-chatzilla_1.0.13~pre080323b-0etch3_all.deb stable/main/binary-all/mozilla-js-debugger_1.8+1.0.13~pre080323b-0etch3_all.deb stable/main/binary-all/mozilla-browser_1.8+1.0.13~pre080323b-0etch3_all.deb stable/main/binary-amd64/iceape-gnome-support_1.0.13~pre080323b-0etch3_amd64.deb stable/main/binary-all/mozilla-psm_1.8+1.0.13~pre080323b-0etch3_all.deb stable/main/binary-all/mozilla-mailnews_1.8+1.0.13~pre080323b-0etch3_all.deb stable/main/source/iceape_1.0.13~pre080323b-0etch3.dsc stable/main/binary-all/mozilla_1.8+1.0.13~pre080323b-0etch3_all.deb stable/main/binary-all/mozilla-dev_1.8+1.0.13~pre080323b-0etch3_all.deb stable/main/binary-all/mozilla-chatzilla_1.8+1.0.13~pre080323b-0etch3_all.deb stable/main/binary-amd64/iceape-dbg_1.0.13~pre080323b-0etch3_amd64.deb stable/main/binary-amd64/iceape-mailnews_1.0.13~pre080323b-0etch3_amd64.deb stable/main/binary-amd64/iceape-browser_1.0.13~pre080323b-0etch3_amd64.deb stable/main/source/iceape_1.0.13~pre080323b-0etch3.diff.gz iceape (1.0.13~pre080323b-0etch3) stable-security; urgency=low * debian/patches/90_bz416282.dpatch: Fix for MFSA 2008-08 aka CVE-2008-0591, which was not actually in 1.0.12~pre080131b-0etch1. * debian/patches/90_bz421622.dpatch: Fix a regression introduced by fix for CVE-2008-1234. * debian/patches/90_bz425576.dpatch: Fix for MFSA 2008-20 aka CVE-2008-1380. * debian/patches/00list: Updated accordingly. stable/main/source/horde3_3.1.3-4etch3.diff.gz stable/main/binary-all/horde3_3.1.3-4etch3_all.deb stable/main/source/horde3_3.1.3-4etch3.dsc horde3 (3.1.3-4etch3) stable-security; urgency=high * Fix arbitrary file inclusion through abuse of the theme preference (see CVE-2008-1284 for more informations). (Closes: #470640 stable/main/binary-sparc/libhal-storage-dev_0.5.8.1-9etch1_sparc.deb stable/main/binary-sparc/libhal-dev_0.5.8.1-9etch1_sparc.deb stable/main/binary-sparc/libhal1_0.5.8.1-9etch1_sparc.deb stable/main/binary-sparc/hal_0.5.8.1-9etch1_sparc.deb stable/main/binary-sparc/libhal-storage1_0.5.8.1-9etch1_sparc.deb hal (0.5.8.1-9etch1) stable; urgency=low * debian/patches/10_ntfs_uid_mount.patch - Allow uid/gid mount option for ntfs. (Closes: #418176, #427109) stable/main/binary-s390/libhal-dev_0.5.8.1-9etch1_s390.deb stable/main/binary-s390/libhal-storage-dev_0.5.8.1-9etch1_s390.deb stable/main/binary-s390/libhal-storage1_0.5.8.1-9etch1_s390.deb stable/main/binary-s390/hal_0.5.8.1-9etch1_s390.deb stable/main/binary-s390/libhal1_0.5.8.1-9etch1_s390.deb hal (0.5.8.1-9etch1) stable; urgency=low * debian/patches/10_ntfs_uid_mount.patch - Allow uid/gid mount option for ntfs. (Closes: #418176, #427109) stable/main/binary-powerpc/libhal-dev_0.5.8.1-9etch1_powerpc.deb stable/main/binary-powerpc/libhal-storage-dev_0.5.8.1-9etch1_powerpc.deb stable/main/binary-powerpc/libhal1_0.5.8.1-9etch1_powerpc.deb stable/main/binary-powerpc/hal_0.5.8.1-9etch1_powerpc.deb stable/main/binary-powerpc/libhal-storage1_0.5.8.1-9etch1_powerpc.deb hal (0.5.8.1-9etch1) stable; urgency=low * debian/patches/10_ntfs_uid_mount.patch - Allow uid/gid mount option for ntfs. (Closes: #418176, #427109) stable/main/binary-mipsel/hal_0.5.8.1-9etch1_mipsel.deb stable/main/binary-mipsel/libhal-storage-dev_0.5.8.1-9etch1_mipsel.deb stable/main/binary-mipsel/libhal1_0.5.8.1-9etch1_mipsel.deb stable/main/binary-mipsel/libhal-dev_0.5.8.1-9etch1_mipsel.deb stable/main/binary-mipsel/libhal-storage1_0.5.8.1-9etch1_mipsel.deb hal (0.5.8.1-9etch1) stable; urgency=low * debian/patches/10_ntfs_uid_mount.patch - Allow uid/gid mount option for ntfs. (Closes: #418176, #427109) stable/main/binary-mips/libhal-dev_0.5.8.1-9etch1_mips.deb stable/main/binary-mips/libhal-storage-dev_0.5.8.1-9etch1_mips.deb stable/main/binary-mips/libhal1_0.5.8.1-9etch1_mips.deb stable/main/binary-mips/hal_0.5.8.1-9etch1_mips.deb stable/main/binary-mips/libhal-storage1_0.5.8.1-9etch1_mips.deb hal (0.5.8.1-9etch1) stable; urgency=low * debian/patches/10_ntfs_uid_mount.patch - Allow uid/gid mount option for ntfs. (Closes: #418176, #427109) stable/main/binary-ia64/libhal-dev_0.5.8.1-9etch1_ia64.deb stable/main/binary-ia64/libhal-storage-dev_0.5.8.1-9etch1_ia64.deb stable/main/binary-ia64/libhal1_0.5.8.1-9etch1_ia64.deb stable/main/binary-ia64/hal_0.5.8.1-9etch1_ia64.deb stable/main/binary-ia64/libhal-storage1_0.5.8.1-9etch1_ia64.deb hal (0.5.8.1-9etch1) stable; urgency=low * debian/patches/10_ntfs_uid_mount.patch - Allow uid/gid mount option for ntfs. (Closes: #418176, #427109) stable/main/binary-hppa/hal_0.5.8.1-9etch1_hppa.deb stable/main/binary-hppa/libhal-storage-dev_0.5.8.1-9etch1_hppa.deb stable/main/binary-hppa/libhal1_0.5.8.1-9etch1_hppa.deb stable/main/binary-hppa/libhal-dev_0.5.8.1-9etch1_hppa.deb stable/main/binary-hppa/libhal-storage1_0.5.8.1-9etch1_hppa.deb hal (0.5.8.1-9etch1) stable; urgency=low * debian/patches/10_ntfs_uid_mount.patch - Allow uid/gid mount option for ntfs. (Closes: #418176, #427109) stable/main/binary-arm/libhal-storage1_0.5.8.1-9etch1_arm.deb stable/main/binary-arm/hal_0.5.8.1-9etch1_arm.deb stable/main/binary-arm/libhal-storage-dev_0.5.8.1-9etch1_arm.deb stable/main/binary-arm/libhal1_0.5.8.1-9etch1_arm.deb stable/main/binary-arm/libhal-dev_0.5.8.1-9etch1_arm.deb hal (0.5.8.1-9etch1) stable; urgency=low * debian/patches/10_ntfs_uid_mount.patch - Allow uid/gid mount option for ntfs. (Closes: #418176, #427109) stable/main/binary-amd64/libhal-storage1_0.5.8.1-9etch1_amd64.deb stable/main/binary-amd64/libhal-storage-dev_0.5.8.1-9etch1_amd64.deb stable/main/binary-amd64/libhal-dev_0.5.8.1-9etch1_amd64.deb stable/main/binary-amd64/libhal1_0.5.8.1-9etch1_amd64.deb stable/main/binary-amd64/hal_0.5.8.1-9etch1_amd64.deb hal (0.5.8.1-9etch1) stable; urgency=low * debian/patches/10_ntfs_uid_mount.patch - Allow uid/gid mount option for ntfs. (Closes: #418176, #427109) stable/main/binary-alpha/libhal-storage1_0.5.8.1-9etch1_alpha.deb stable/main/binary-alpha/hal_0.5.8.1-9etch1_alpha.deb stable/main/binary-alpha/libhal1_0.5.8.1-9etch1_alpha.deb stable/main/binary-alpha/libhal-storage-dev_0.5.8.1-9etch1_alpha.deb stable/main/binary-alpha/libhal-dev_0.5.8.1-9etch1_alpha.deb hal (0.5.8.1-9etch1) stable; urgency=low * debian/patches/10_ntfs_uid_mount.patch - Allow uid/gid mount option for ntfs. (Closes: #418176, #427109) stable/main/binary-i386/libhal-dev_0.5.8.1-9etch1_i386.deb stable/main/binary-i386/libhal1_0.5.8.1-9etch1_i386.deb stable/main/binary-all/hal-device-manager_0.5.8.1-9etch1_all.deb stable/main/binary-i386/libhal-storage-dev_0.5.8.1-9etch1_i386.deb stable/main/binary-all/hal-doc_0.5.8.1-9etch1_all.deb stable/main/binary-i386/hal_0.5.8.1-9etch1_i386.deb stable/main/source/hal_0.5.8.1-9etch1.diff.gz stable/main/binary-i386/libhal-storage1_0.5.8.1-9etch1_i386.deb stable/main/source/hal_0.5.8.1-9etch1.dsc hal (0.5.8.1-9etch1) stable; urgency=low * debian/patches/10_ntfs_uid_mount.patch - Allow uid/gid mount option for ntfs. (Closes: #418176, #427109) stable/main/binary-amd64/gtimer_1.1.6-11+b1_amd64.deb gtimer (1.1.6-11+b1) stable; urgency=low * Binary-only non-maintainer upload for amd64; no source changes. * Rebuild against final etch libraries to correct a broken build stable/main/binary-sparc/gs-gpl_8.54.dfsg.1-5etch1_sparc.deb gs-gpl (8.54.dfsg.1-5etch1) stable-security; urgency=high * Fix CVE-2008-0411 stable/main/binary-s390/gs-gpl_8.54.dfsg.1-5etch1_s390.deb gs-gpl (8.54.dfsg.1-5etch1) stable-security; urgency=high * Fix CVE-2008-0411 stable/main/binary-powerpc/gs-gpl_8.54.dfsg.1-5etch1_powerpc.deb gs-gpl (8.54.dfsg.1-5etch1) stable-security; urgency=high * Fix CVE-2008-0411 stable/main/binary-mipsel/gs-gpl_8.54.dfsg.1-5etch1_mipsel.deb gs-gpl (8.54.dfsg.1-5etch1) stable-security; urgency=high * Fix CVE-2008-0411 stable/main/binary-mips/gs-gpl_8.54.dfsg.1-5etch1_mips.deb gs-gpl (8.54.dfsg.1-5etch1) stable-security; urgency=high * Fix CVE-2008-0411 stable/main/binary-ia64/gs-gpl_8.54.dfsg.1-5etch1_ia64.deb gs-gpl (8.54.dfsg.1-5etch1) stable-security; urgency=high * Fix CVE-2008-0411 stable/main/binary-hppa/gs-gpl_8.54.dfsg.1-5etch1_hppa.deb gs-gpl (8.54.dfsg.1-5etch1) stable-security; urgency=high * Fix CVE-2008-0411 stable/main/binary-arm/gs-gpl_8.54.dfsg.1-5etch1_arm.deb gs-gpl (8.54.dfsg.1-5etch1) stable-security; urgency=high * Fix CVE-2008-0411 stable/main/binary-amd64/gs-gpl_8.54.dfsg.1-5etch1_amd64.deb gs-gpl (8.54.dfsg.1-5etch1) stable-security; urgency=high * Fix CVE-2008-0411 stable/main/binary-alpha/gs-gpl_8.54.dfsg.1-5etch1_alpha.deb gs-gpl (8.54.dfsg.1-5etch1) stable-security; urgency=high * Fix CVE-2008-0411 stable/main/binary-all/gs_8.54.dfsg.1-5etch1_all.deb stable/main/source/gs-gpl_8.54.dfsg.1-5etch1.diff.gz stable/main/binary-i386/gs-gpl_8.54.dfsg.1-5etch1_i386.deb stable/main/source/gs-gpl_8.54.dfsg.1-5etch1.dsc gs-gpl (8.54.dfsg.1-5etch1) stable-security; urgency=high * Fix CVE-2008-0411 stable/main/binary-sparc/gs-esp_8.15.3.dfsg.1-1etch1_sparc.deb gs-esp (8.15.3.dfsg.1-1etch1) stable-security; urgency=high * Fix buffer overflow, patch by Werner Fink stable/main/binary-s390/gs-esp_8.15.3.dfsg.1-1etch1_s390.deb gs-esp (8.15.3.dfsg.1-1etch1) stable-security; urgency=high * Fix buffer overflow, patch by Werner Fink stable/main/binary-powerpc/gs-esp_8.15.3.dfsg.1-1etch1_powerpc.deb gs-esp (8.15.3.dfsg.1-1etch1) stable-security; urgency=high * Fix buffer overflow, patch by Werner Fink stable/main/binary-mipsel/gs-esp_8.15.3.dfsg.1-1etch1_mipsel.deb gs-esp (8.15.3.dfsg.1-1etch1) stable-security; urgency=high * Fix buffer overflow, patch by Werner Fink stable/main/binary-mips/gs-esp_8.15.3.dfsg.1-1etch1_mips.deb gs-esp (8.15.3.dfsg.1-1etch1) stable-security; urgency=high * Fix buffer overflow, patch by Werner Fink stable/main/binary-ia64/gs-esp_8.15.3.dfsg.1-1etch1_ia64.deb gs-esp (8.15.3.dfsg.1-1etch1) stable-security; urgency=high * Fix buffer overflow, patch by Werner Fink stable/main/binary-hppa/gs-esp_8.15.3.dfsg.1-1etch1_hppa.deb gs-esp (8.15.3.dfsg.1-1etch1) stable-security; urgency=high * Fix buffer overflow, patch by Werner Fink stable/main/binary-arm/gs-esp_8.15.3.dfsg.1-1etch1_arm.deb gs-esp (8.15.3.dfsg.1-1etch1) stable-security; urgency=high * Fix buffer overflow, patch by Werner Fink stable/main/binary-amd64/gs-esp_8.15.3.dfsg.1-1etch1_amd64.deb gs-esp (8.15.3.dfsg.1-1etch1) stable-security; urgency=high * Fix buffer overflow, patch by Werner Fink stable/main/binary-alpha/gs-esp_8.15.3.dfsg.1-1etch1_alpha.deb gs-esp (8.15.3.dfsg.1-1etch1) stable-security; urgency=high * Fix buffer overflow, patch by Werner Fink stable/main/source/gs-esp_8.15.3.dfsg.1-1etch1.diff.gz stable/main/source/gs-esp_8.15.3.dfsg.1-1etch1.dsc stable/main/binary-i386/gs-esp_8.15.3.dfsg.1-1etch1_i386.deb gs-esp (8.15.3.dfsg.1-1etch1) stable-security; urgency=high * Fix buffer overflow, patch by Werner Fink stable/main/binary-i386/grub_0.97-27etch1_i386.deb grub (0.97-27etch1) stable; urgency=low * 1tib_disk_limit.diff: Fix 1 TiB disk addressing limit. (Closes: #450951) stable/main/source/grub_0.97-27etch1.diff.gz stable/main/binary-all/grub-disk_0.97-27etch1_all.deb stable/main/binary-amd64/grub_0.97-27etch1_amd64.deb stable/main/source/grub_0.97-27etch1.dsc stable/main/binary-all/grub-doc_0.97-27etch1_all.deb grub (0.97-27etch1) stable; urgency=low * 1tib_disk_limit.diff: Fix 1 TiB disk addressing limit. (Closes: #450951) stable/main/binary-sparc/libgnutls13-dbg_1.4.4-3+etch1_sparc.deb stable/main/binary-sparc/libgnutls13_1.4.4-3+etch1_sparc.deb stable/main/binary-sparc/gnutls-bin_1.4.4-3+etch1_sparc.deb stable/main/binary-sparc/libgnutls-dev_1.4.4-3+etch1_sparc.deb gnutls13 (1.4.4-3+etch1) stable-security; urgency=high * Apply patch from Simon Josefsson to fix three security vulnerabilities (GNUTLS-SA-2008-1): - Fix crash when sending invalid server name (GNUTLS-SA-2008-1-1) - Fix crash when sending repeated client hellos (GNUTLS-SA-2008-1-2) - Fix crash in cipher padding decoding for invalid record lengths (GNUTLS-SA-2008-1-3) stable/main/binary-s390/libgnutls13-dbg_1.4.4-3+etch1_s390.deb stable/main/binary-s390/libgnutls-dev_1.4.4-3+etch1_s390.deb stable/main/binary-s390/libgnutls13_1.4.4-3+etch1_s390.deb stable/main/binary-s390/gnutls-bin_1.4.4-3+etch1_s390.deb gnutls13 (1.4.4-3+etch1) stable-security; urgency=high * Apply patch from Simon Josefsson to fix three security vulnerabilities (GNUTLS-SA-2008-1): - Fix crash when sending invalid server name (GNUTLS-SA-2008-1-1) - Fix crash when sending repeated client hellos (GNUTLS-SA-2008-1-2) - Fix crash in cipher padding decoding for invalid record lengths (GNUTLS-SA-2008-1-3) stable/main/binary-powerpc/libgnutls-dev_1.4.4-3+etch1_powerpc.deb stable/main/binary-powerpc/libgnutls13_1.4.4-3+etch1_powerpc.deb stable/main/binary-powerpc/libgnutls13-dbg_1.4.4-3+etch1_powerpc.deb stable/main/binary-powerpc/gnutls-bin_1.4.4-3+etch1_powerpc.deb gnutls13 (1.4.4-3+etch1) stable-security; urgency=high * Apply patch from Simon Josefsson to fix three security vulnerabilities (GNUTLS-SA-2008-1): - Fix crash when sending invalid server name (GNUTLS-SA-2008-1-1) - Fix crash when sending repeated client hellos (GNUTLS-SA-2008-1-2) - Fix crash in cipher padding decoding for invalid record lengths (GNUTLS-SA-2008-1-3) stable/main/binary-mipsel/libgnutls13-dbg_1.4.4-3+etch1_mipsel.deb stable/main/binary-mipsel/libgnutls-dev_1.4.4-3+etch1_mipsel.deb stable/main/binary-mipsel/libgnutls13_1.4.4-3+etch1_mipsel.deb stable/main/binary-mipsel/gnutls-bin_1.4.4-3+etch1_mipsel.deb gnutls13 (1.4.4-3+etch1) stable-security; urgency=high * Apply patch from Simon Josefsson to fix three security vulnerabilities (GNUTLS-SA-2008-1): - Fix crash when sending invalid server name (GNUTLS-SA-2008-1-1) - Fix crash when sending repeated client hellos (GNUTLS-SA-2008-1-2) - Fix crash in cipher padding decoding for invalid record lengths (GNUTLS-SA-2008-1-3) stable/main/binary-mips/libgnutls13-dbg_1.4.4-3+etch1_mips.deb stable/main/binary-mips/gnutls-bin_1.4.4-3+etch1_mips.deb stable/main/binary-mips/libgnutls-dev_1.4.4-3+etch1_mips.deb stable/main/binary-mips/libgnutls13_1.4.4-3+etch1_mips.deb gnutls13 (1.4.4-3+etch1) stable-security; urgency=high * Apply patch from Simon Josefsson to fix three security vulnerabilities (GNUTLS-SA-2008-1): - Fix crash when sending invalid server name (GNUTLS-SA-2008-1-1) - Fix crash when sending repeated client hellos (GNUTLS-SA-2008-1-2) - Fix crash in cipher padding decoding for invalid record lengths (GNUTLS-SA-2008-1-3) stable/main/binary-ia64/libgnutls-dev_1.4.4-3+etch1_ia64.deb stable/main/binary-ia64/libgnutls13-dbg_1.4.4-3+etch1_ia64.deb stable/main/binary-ia64/libgnutls13_1.4.4-3+etch1_ia64.deb stable/main/binary-ia64/gnutls-bin_1.4.4-3+etch1_ia64.deb gnutls13 (1.4.4-3+etch1) stable-security; urgency=high * Apply patch from Simon Josefsson to fix three security vulnerabilities (GNUTLS-SA-2008-1): - Fix crash when sending invalid server name (GNUTLS-SA-2008-1-1) - Fix crash when sending repeated client hellos (GNUTLS-SA-2008-1-2) - Fix crash in cipher padding decoding for invalid record lengths (GNUTLS-SA-2008-1-3) stable/main/binary-i386/libgnutls-dev_1.4.4-3+etch1_i386.deb stable/main/binary-i386/libgnutls13_1.4.4-3+etch1_i386.deb stable/main/binary-i386/libgnutls13-dbg_1.4.4-3+etch1_i386.deb stable/main/binary-i386/gnutls-bin_1.4.4-3+etch1_i386.deb gnutls13 (1.4.4-3+etch1) stable-security; urgency=high * Apply patch from Simon Josefsson to fix three security vulnerabilities (GNUTLS-SA-2008-1): - Fix crash when sending invalid server name (GNUTLS-SA-2008-1-1) - Fix crash when sending repeated client hellos (GNUTLS-SA-2008-1-2) - Fix crash in cipher padding decoding for invalid record lengths (GNUTLS-SA-2008-1-3) stable/main/binary-hppa/libgnutls13-dbg_1.4.4-3+etch1_hppa.deb stable/main/binary-hppa/gnutls-bin_1.4.4-3+etch1_hppa.deb stable/main/binary-hppa/libgnutls13_1.4.4-3+etch1_hppa.deb stable/main/binary-hppa/libgnutls-dev_1.4.4-3+etch1_hppa.deb gnutls13 (1.4.4-3+etch1) stable-security; urgency=high * Apply patch from Simon Josefsson to fix three security vulnerabilities (GNUTLS-SA-2008-1): - Fix crash when sending invalid server name (GNUTLS-SA-2008-1-1) - Fix crash when sending repeated client hellos (GNUTLS-SA-2008-1-2) - Fix crash in cipher padding decoding for invalid record lengths (GNUTLS-SA-2008-1-3) stable/main/binary-arm/libgnutls-dev_1.4.4-3+etch1_arm.deb stable/main/binary-arm/libgnutls13-dbg_1.4.4-3+etch1_arm.deb stable/main/binary-arm/libgnutls13_1.4.4-3+etch1_arm.deb stable/main/binary-arm/gnutls-bin_1.4.4-3+etch1_arm.deb gnutls13 (1.4.4-3+etch1) stable-security; urgency=high * Apply patch from Simon Josefsson to fix three security vulnerabilities (GNUTLS-SA-2008-1): - Fix crash when sending invalid server name (GNUTLS-SA-2008-1-1) - Fix crash when sending repeated client hellos (GNUTLS-SA-2008-1-2) - Fix crash in cipher padding decoding for invalid record lengths (GNUTLS-SA-2008-1-3) stable/main/binary-alpha/libgnutls13_1.4.4-3+etch1_alpha.deb stable/main/binary-alpha/libgnutls13-dbg_1.4.4-3+etch1_alpha.deb stable/main/binary-alpha/libgnutls-dev_1.4.4-3+etch1_alpha.deb stable/main/binary-alpha/gnutls-bin_1.4.4-3+etch1_alpha.deb gnutls13 (1.4.4-3+etch1) stable-security; urgency=high * Apply patch from Simon Josefsson to fix three security vulnerabilities (GNUTLS-SA-2008-1): - Fix crash when sending invalid server name (GNUTLS-SA-2008-1-1) - Fix crash when sending repeated client hellos (GNUTLS-SA-2008-1-2) - Fix crash in cipher padding decoding for invalid record lengths (GNUTLS-SA-2008-1-3) stable/main/binary-amd64/gnutls-bin_1.4.4-3+etch1_amd64.deb stable/main/source/gnutls13_1.4.4-3+etch1.dsc stable/main/binary-amd64/libgnutls13_1.4.4-3+etch1_amd64.deb stable/main/binary-all/gnutls-doc_1.4.4-3+etch1_all.deb stable/main/source/gnutls13_1.4.4-3+etch1.diff.gz stable/main/binary-amd64/libgnutls13-dbg_1.4.4-3+etch1_amd64.deb stable/main/binary-amd64/libgnutls-dev_1.4.4-3+etch1_amd64.deb gnutls13 (1.4.4-3+etch1) stable-security; urgency=high * Apply patch from Simon Josefsson to fix three security vulnerabilities (GNUTLS-SA-2008-1): - Fix crash when sending invalid server name (GNUTLS-SA-2008-1-1) - Fix crash when sending repeated client hellos (GNUTLS-SA-2008-1-2) - Fix crash in cipher padding decoding for invalid record lengths (GNUTLS-SA-2008-1-3) stable/main/binary-sparc/gnumeric-plugins-extra_1.6.3-5.1+etch1_sparc.deb stable/main/binary-sparc/gnumeric_1.6.3-5.1+etch1_sparc.deb gnumeric (1.6.3-5.1+etch1) stable-security; urgency=high * Non-maintainer upload by the Security Team. * Backport fix from upstream SVN: - CVE-2008-0668: arbitrary code execution through integer overflow in Excel spreadsheet HLINK handling stable/main/binary-s390/gnumeric_1.6.3-5.1+etch1_s390.deb stable/main/binary-s390/gnumeric-plugins-extra_1.6.3-5.1+etch1_s390.deb gnumeric (1.6.3-5.1+etch1) stable-security; urgency=high * Non-maintainer upload by the Security Team. * Backport fix from upstream SVN: - CVE-2008-0668: arbitrary code execution through integer overflow in Excel spreadsheet HLINK handling stable/main/binary-powerpc/gnumeric_1.6.3-5.1+etch1_powerpc.deb stable/main/binary-powerpc/gnumeric-plugins-extra_1.6.3-5.1+etch1_powerpc.deb gnumeric (1.6.3-5.1+etch1) stable-security; urgency=high * Non-maintainer upload by the Security Team. * Backport fix from upstream SVN: - CVE-2008-0668: arbitrary code execution through integer overflow in Excel spreadsheet HLINK handling stable/main/binary-mipsel/gnumeric_1.6.3-5.1+etch1_mipsel.deb stable/main/binary-mipsel/gnumeric-plugins-extra_1.6.3-5.1+etch1_mipsel.deb gnumeric (1.6.3-5.1+etch1) stable-security; urgency=high * Non-maintainer upload by the Security Team. * Backport fix from upstream SVN: - CVE-2008-0668: arbitrary code execution through integer overflow in Excel spreadsheet HLINK handling stable/main/binary-mips/gnumeric-plugins-extra_1.6.3-5.1+etch1_mips.deb stable/main/binary-mips/gnumeric_1.6.3-5.1+etch1_mips.deb gnumeric (1.6.3-5.1+etch1) stable-security; urgency=high * Non-maintainer upload by the Security Team. * Backport fix from upstream SVN: - CVE-2008-0668: arbitrary code execution through integer overflow in Excel spreadsheet HLINK handling stable/main/binary-ia64/gnumeric_1.6.3-5.1+etch1_ia64.deb stable/main/binary-ia64/gnumeric-plugins-extra_1.6.3-5.1+etch1_ia64.deb gnumeric (1.6.3-5.1+etch1) stable-security; urgency=high * Non-maintainer upload by the Security Team. * Backport fix from upstream SVN: - CVE-2008-0668: arbitrary code execution through integer overflow in Excel spreadsheet HLINK handling stable/main/binary-i386/gnumeric_1.6.3-5.1+etch1_i386.deb stable/main/binary-i386/gnumeric-plugins-extra_1.6.3-5.1+etch1_i386.deb gnumeric (1.6.3-5.1+etch1) stable-security; urgency=high * Non-maintainer upload by the Security Team. * Backport fix from upstream SVN: - CVE-2008-0668: arbitrary code execution through integer overflow in Excel spreadsheet HLINK handling stable/main/binary-hppa/gnumeric_1.6.3-5.1+etch1_hppa.deb stable/main/binary-hppa/gnumeric-plugins-extra_1.6.3-5.1+etch1_hppa.deb gnumeric (1.6.3-5.1+etch1) stable-security; urgency=high * Non-maintainer upload by the Security Team. * Backport fix from upstream SVN: - CVE-2008-0668: arbitrary code execution through integer overflow in Excel spreadsheet HLINK handling stable/main/binary-arm/gnumeric_1.6.3-5.1+etch1_arm.deb stable/main/binary-arm/gnumeric-plugins-extra_1.6.3-5.1+etch1_arm.deb gnumeric (1.6.3-5.1+etch1) stable-security; urgency=high * Non-maintainer upload by the Security Team. * Backport fix from upstream SVN: - CVE-2008-0668: arbitrary code execution through integer overflow in Excel spreadsheet HLINK handling stable/main/binary-alpha/gnumeric-plugins-extra_1.6.3-5.1+etch1_alpha.deb stable/main/binary-alpha/gnumeric_1.6.3-5.1+etch1_alpha.deb gnumeric (1.6.3-5.1+etch1) stable-security; urgency=high * Non-maintainer upload by the Security Team. * Backport fix from upstream SVN: - CVE-2008-0668: arbitrary code execution through integer overflow in Excel spreadsheet HLINK handling stable/main/binary-all/gnumeric-common_1.6.3-5.1+etch1_all.deb stable/main/source/gnumeric_1.6.3-5.1+etch1.dsc stable/main/binary-all/gnumeric-doc_1.6.3-5.1+etch1_all.deb stable/main/binary-amd64/gnumeric_1.6.3-5.1+etch1_amd64.deb stable/main/binary-amd64/gnumeric-plugins-extra_1.6.3-5.1+etch1_amd64.deb stable/main/source/gnumeric_1.6.3-5.1+etch1.diff.gz gnumeric (1.6.3-5.1+etch1) stable-security; urgency=high * Non-maintainer upload by the Security Team. * Backport fix from upstream SVN: - CVE-2008-0668: arbitrary code execution through integer overflow in Excel spreadsheet HLINK handling stable/main/binary-sparc/gnome-peercast_0.5.4-1.1etch0_sparc.deb gnome-peercast (0.5.4-1.1etch0) stable-security; urgency=high * Non-maintainer upload by the Security Team. * Fixed CVE-2007-6454: | Heap-based buffer overflow in the handshakeHTTP function in servhs.cpp | in PeerCast 0.1217 and earlier, and SVN 344 and earlier, allows remote | attackers to cause a denial of service and possibly execute arbitrary | code via a long SOURCE request. * Fixed CVE-2008-2040: | stack-based buffer overfow in the | HTTP::getAuthUserPass function leading | to remote DoS or arbitrary code execution | if peercast is configured to use http-basic | authentication stable/main/binary-s390/gnome-peercast_0.5.4-1.1etch0_s390.deb gnome-peercast (0.5.4-1.1etch0) stable-security; urgency=high * Non-maintainer upload by the Security Team. * Fixed CVE-2007-6454: | Heap-based buffer overflow in the handshakeHTTP function in servhs.cpp | in PeerCast 0.1217 and earlier, and SVN 344 and earlier, allows remote | attackers to cause a denial of service and possibly execute arbitrary | code via a long SOURCE request. * Fixed CVE-2008-2040: | stack-based buffer overfow in the | HTTP::getAuthUserPass function leading | to remote DoS or arbitrary code execution | if peercast is configured to use http-basic | authentication stable/main/binary-powerpc/gnome-peercast_0.5.4-1.1etch0_powerpc.deb gnome-peercast (0.5.4-1.1etch0) stable-security; urgency=high * Non-maintainer upload by the Security Team. * Fixed CVE-2007-6454: | Heap-based buffer overflow in the handshakeHTTP function in servhs.cpp | in PeerCast 0.1217 and earlier, and SVN 344 and earlier, allows remote | attackers to cause a denial of service and possibly execute arbitrary | code via a long SOURCE request. * Fixed CVE-2008-2040: | stack-based buffer overfow in the | HTTP::getAuthUserPass function leading | to remote DoS or arbitrary code execution | if peercast is configured to use http-basic | authentication stable/main/binary-mipsel/gnome-peercast_0.5.4-1.1etch0_mipsel.deb gnome-peercast (0.5.4-1.1etch0) stable-security; urgency=high * Non-maintainer upload by the Security Team. * Fixed CVE-2007-6454: | Heap-based buffer overflow in the handshakeHTTP function in servhs.cpp | in PeerCast 0.1217 and earlier, and SVN 344 and earlier, allows remote | attackers to cause a denial of service and possibly execute arbitrary | code via a long SOURCE request. * Fixed CVE-2008-2040: | stack-based buffer overfow in the | HTTP::getAuthUserPass function leading | to remote DoS or arbitrary code execution | if peercast is configured to use http-basic | authentication stable/main/binary-mips/gnome-peercast_0.5.4-1.1etch0_mips.deb gnome-peercast (0.5.4-1.1etch0) stable-security; urgency=high * Non-maintainer upload by the Security Team. * Fixed CVE-2007-6454: | Heap-based buffer overflow in the handshakeHTTP function in servhs.cpp | in PeerCast 0.1217 and earlier, and SVN 344 and earlier, allows remote | attackers to cause a denial of service and possibly execute arbitrary | code via a long SOURCE request. * Fixed CVE-2008-2040: | stack-based buffer overfow in the | HTTP::getAuthUserPass function leading | to remote DoS or arbitrary code execution | if peercast is configured to use http-basic | authentication stable/main/binary-ia64/gnome-peercast_0.5.4-1.1etch0_ia64.deb gnome-peercast (0.5.4-1.1etch0) stable-security; urgency=high * Non-maintainer upload by the Security Team. * Fixed CVE-2007-6454: | Heap-based buffer overflow in the handshakeHTTP function in servhs.cpp | in PeerCast 0.1217 and earlier, and SVN 344 and earlier, allows remote | attackers to cause a denial of service and possibly execute arbitrary | code via a long SOURCE request. * Fixed CVE-2008-2040: | stack-based buffer overfow in the | HTTP::getAuthUserPass function leading | to remote DoS or arbitrary code execution | if peercast is configured to use http-basic | authentication stable/main/binary-i386/gnome-peercast_0.5.4-1.1etch0_i386.deb gnome-peercast (0.5.4-1.1etch0) stable-security; urgency=high * Non-maintainer upload by the Security Team. * Fixed CVE-2007-6454: | Heap-based buffer overflow in the handshakeHTTP function in servhs.cpp | in PeerCast 0.1217 and earlier, and SVN 344 and earlier, allows remote | attackers to cause a denial of service and possibly execute arbitrary | code via a long SOURCE request. * Fixed CVE-2008-2040: | stack-based buffer overfow in the | HTTP::getAuthUserPass function leading | to remote DoS or arbitrary code execution | if peercast is configured to use http-basic | authentication stable/main/binary-hppa/gnome-peercast_0.5.4-1.1etch0_hppa.deb gnome-peercast (0.5.4-1.1etch0) stable-security; urgency=high * Non-maintainer upload by the Security Team. * Fixed CVE-2007-6454: | Heap-based buffer overflow in the handshakeHTTP function in servhs.cpp | in PeerCast 0.1217 and earlier, and SVN 344 and earlier, allows remote | attackers to cause a denial of service and possibly execute arbitrary | code via a long SOURCE request. * Fixed CVE-2008-2040: | stack-based buffer overfow in the | HTTP::getAuthUserPass function leading | to remote DoS or arbitrary code execution | if peercast is configured to use http-basic | authentication stable/main/binary-arm/gnome-peercast_0.5.4-1.1etch0_arm.deb gnome-peercast (0.5.4-1.1etch0) stable-security; urgency=high * Non-maintainer upload by the Security Team. * Fixed CVE-2007-6454: | Heap-based buffer overflow in the handshakeHTTP function in servhs.cpp | in PeerCast 0.1217 and earlier, and SVN 344 and earlier, allows remote | attackers to cause a denial of service and possibly execute arbitrary | code via a long SOURCE request. * Fixed CVE-2008-2040: | stack-based buffer overfow in the | HTTP::getAuthUserPass function leading | to remote DoS or arbitrary code execution | if peercast is configured to use http-basic | authentication stable/main/binary-alpha/gnome-peercast_0.5.4-1.1etch0_alpha.deb gnome-peercast (0.5.4-1.1etch0) stable-security; urgency=high * Non-maintainer upload by the Security Team. * Fixed CVE-2007-6454: | Heap-based buffer overflow in the handshakeHTTP function in servhs.cpp | in PeerCast 0.1217 and earlier, and SVN 344 and earlier, allows remote | attackers to cause a denial of service and possibly execute arbitrary | code via a long SOURCE request. * Fixed CVE-2008-2040: | stack-based buffer overfow in the | HTTP::getAuthUserPass function leading | to remote DoS or arbitrary code execution | if peercast is configured to use http-basic | authentication stable/main/source/gnome-peercast_0.5.4-1.1etch0.dsc stable/main/source/gnome-peercast_0.5.4-1.1etch0.diff.gz stable/main/binary-amd64/gnome-peercast_0.5.4-1.1etch0_amd64.deb gnome-peercast (0.5.4-1.1etch0) stable-security; urgency=high * Non-maintainer upload by the Security Team. * Fixed CVE-2007-6454: | Heap-based buffer overflow in the handshakeHTTP function in servhs.cpp | in PeerCast 0.1217 and earlier, and SVN 344 and earlier, allows remote | attackers to cause a denial of service and possibly execute arbitrary | code via a long SOURCE request. * Fixed CVE-2008-2040: | stack-based buffer overfow in the | HTTP::getAuthUserPass function leading | to remote DoS or arbitrary code execution | if peercast is configured to use http-basic | authentication stable/main/binary-sparc/libc6-dev-sparc64_2.3.6.ds1-13etch7_sparc.deb stable/main/binary-sparc/libc6-dbg_2.3.6.ds1-13etch7_sparc.deb stable/main/binary-sparc/libc6_2.3.6.ds1-13etch7_sparc.deb stable/main/binary-sparc/locales-all_2.3.6.ds1-13etch7_sparc.deb stable/main/binary-sparc/libc6-sparc64_2.3.6.ds1-13etch7_sparc.deb stable/main/binary-sparc/libc6-prof_2.3.6.ds1-13etch7_sparc.deb stable/main/binary-sparc/libc6-udeb_2.3.6.ds1-13etch7_sparc.udeb stable/main/binary-sparc/libnss-files-udeb_2.3.6.ds1-13etch7_sparc.udeb stable/main/binary-sparc/libc6-sparcv9_2.3.6.ds1-13etch7_sparc.deb stable/main/binary-sparc/libc6-dev_2.3.6.ds1-13etch7_sparc.deb stable/main/binary-sparc/libc6-pic_2.3.6.ds1-13etch7_sparc.deb stable/main/binary-sparc/libnss-dns-udeb_2.3.6.ds1-13etch7_sparc.udeb stable/main/binary-sparc/libc6-sparcv9b_2.3.6.ds1-13etch7_sparc.deb stable/main/binary-sparc/nscd_2.3.6.ds1-13etch7_sparc.deb glibc (2.3.6.ds1-13etch7) stable; urgency=low * patches/any/cvs-tls-link.diff: fix linker script for libraries using TLS. Closes: #478542. stable/main/binary-s390/nscd_2.3.6.ds1-13etch7_s390.deb stable/main/binary-s390/libc6-pic_2.3.6.ds1-13etch7_s390.deb stable/main/binary-s390/libc6-udeb_2.3.6.ds1-13etch7_s390.udeb stable/main/binary-s390/libc6-s390x_2.3.6.ds1-13etch7_s390.deb stable/main/binary-s390/libc6-dev-s390x_2.3.6.ds1-13etch7_s390.deb stable/main/binary-s390/libc6-dbg_2.3.6.ds1-13etch7_s390.deb stable/main/binary-s390/libnss-dns-udeb_2.3.6.ds1-13etch7_s390.udeb stable/main/binary-s390/locales-all_2.3.6.ds1-13etch7_s390.deb stable/main/binary-s390/libc6-dev_2.3.6.ds1-13etch7_s390.deb stable/main/binary-s390/libc6_2.3.6.ds1-13etch7_s390.deb stable/main/binary-s390/libnss-files-udeb_2.3.6.ds1-13etch7_s390.udeb stable/main/binary-s390/libc6-prof_2.3.6.ds1-13etch7_s390.deb glibc (2.3.6.ds1-13etch7) stable; urgency=low * patches/any/cvs-tls-link.diff: fix linker script for libraries using TLS. Closes: #478542. stable/main/binary-powerpc/libc6-prof_2.3.6.ds1-13etch7_powerpc.deb stable/main/binary-powerpc/libc6-pic_2.3.6.ds1-13etch7_powerpc.deb stable/main/binary-powerpc/libc6-dbg_2.3.6.ds1-13etch7_powerpc.deb stable/main/binary-powerpc/libc6_2.3.6.ds1-13etch7_powerpc.deb stable/main/binary-powerpc/libc6-udeb_2.3.6.ds1-13etch7_powerpc.udeb stable/main/binary-powerpc/libc6-dev-ppc64_2.3.6.ds1-13etch7_powerpc.deb stable/main/binary-powerpc/nscd_2.3.6.ds1-13etch7_powerpc.deb stable/main/binary-powerpc/libnss-files-udeb_2.3.6.ds1-13etch7_powerpc.udeb stable/main/binary-powerpc/libnss-dns-udeb_2.3.6.ds1-13etch7_powerpc.udeb stable/main/binary-powerpc/libc6-ppc64_2.3.6.ds1-13etch7_powerpc.deb stable/main/binary-powerpc/locales-all_2.3.6.ds1-13etch7_powerpc.deb stable/main/binary-powerpc/libc6-dev_2.3.6.ds1-13etch7_powerpc.deb glibc (2.3.6.ds1-13etch7) stable; urgency=low * patches/any/cvs-tls-link.diff: fix linker script for libraries using TLS. Closes: #478542. stable/main/binary-mipsel/libnss-dns-udeb_2.3.6.ds1-13etch7_mipsel.udeb stable/main/binary-mipsel/libc6-prof_2.3.6.ds1-13etch7_mipsel.deb stable/main/binary-mipsel/libc6_2.3.6.ds1-13etch7_mipsel.deb stable/main/binary-mipsel/locales-all_2.3.6.ds1-13etch7_mipsel.deb stable/main/binary-mipsel/nscd_2.3.6.ds1-13etch7_mipsel.deb stable/main/binary-mipsel/libc6-dbg_2.3.6.ds1-13etch7_mipsel.deb stable/main/binary-mipsel/libc6-pic_2.3.6.ds1-13etch7_mipsel.deb stable/main/binary-mipsel/libc6-dev_2.3.6.ds1-13etch7_mipsel.deb stable/main/binary-mipsel/libc6-udeb_2.3.6.ds1-13etch7_mipsel.udeb stable/main/binary-mipsel/libnss-files-udeb_2.3.6.ds1-13etch7_mipsel.udeb glibc (2.3.6.ds1-13etch7) stable; urgency=low * patches/any/cvs-tls-link.diff: fix linker script for libraries using TLS. Closes: #478542. stable/main/binary-ia64/libc6.1-prof_2.3.6.ds1-13etch7_ia64.deb stable/main/binary-ia64/locales-all_2.3.6.ds1-13etch7_ia64.deb stable/main/binary-ia64/libc6.1-dbg_2.3.6.ds1-13etch7_ia64.deb stable/main/binary-ia64/libc6.1_2.3.6.ds1-13etch7_ia64.deb stable/main/binary-ia64/nscd_2.3.6.ds1-13etch7_ia64.deb stable/main/binary-ia64/libnss-files-udeb_2.3.6.ds1-13etch7_ia64.udeb stable/main/binary-ia64/libnss-dns-udeb_2.3.6.ds1-13etch7_ia64.udeb stable/main/binary-ia64/libc6.1-dev_2.3.6.ds1-13etch7_ia64.deb stable/main/binary-ia64/libc6.1-pic_2.3.6.ds1-13etch7_ia64.deb stable/main/binary-ia64/libc6.1-udeb_2.3.6.ds1-13etch7_ia64.udeb glibc (2.3.6.ds1-13etch7) stable; urgency=low * patches/any/cvs-tls-link.diff: fix linker script for libraries using TLS. Closes: #478542. stable/main/binary-i386/libc6-amd64_2.3.6.ds1-13etch7_i386.deb stable/main/binary-i386/libc6_2.3.6.ds1-13etch7_i386.deb stable/main/binary-i386/libnss-dns-udeb_2.3.6.ds1-13etch7_i386.udeb stable/main/binary-i386/libc6-prof_2.3.6.ds1-13etch7_i386.deb stable/main/binary-i386/libnss-files-udeb_2.3.6.ds1-13etch7_i386.udeb stable/main/binary-i386/libc6-dev_2.3.6.ds1-13etch7_i386.deb stable/main/binary-i386/libc6-dev-amd64_2.3.6.ds1-13etch7_i386.deb stable/main/binary-i386/libc6-xen_2.3.6.ds1-13etch7_i386.deb stable/main/binary-i386/nscd_2.3.6.ds1-13etch7_i386.deb stable/main/binary-i386/libc6-dbg_2.3.6.ds1-13etch7_i386.deb stable/main/binary-i386/libc6-i686_2.3.6.ds1-13etch7_i386.deb stable/main/binary-i386/libc6-udeb_2.3.6.ds1-13etch7_i386.udeb stable/main/binary-i386/locales-all_2.3.6.ds1-13etch7_i386.deb stable/main/binary-i386/libc6-pic_2.3.6.ds1-13etch7_i386.deb glibc (2.3.6.ds1-13etch7) stable; urgency=low * patches/any/cvs-tls-link.diff: fix linker script for libraries using TLS. Closes: #478542. stable/main/binary-hppa/libc6-dbg_2.3.6.ds1-13etch7_hppa.deb stable/main/binary-hppa/nscd_2.3.6.ds1-13etch7_hppa.deb stable/main/binary-hppa/libc6-udeb_2.3.6.ds1-13etch7_hppa.udeb stable/main/binary-hppa/libc6-dev_2.3.6.ds1-13etch7_hppa.deb stable/main/binary-hppa/libnss-files-udeb_2.3.6.ds1-13etch7_hppa.udeb stable/main/binary-hppa/locales-all_2.3.6.ds1-13etch7_hppa.deb stable/main/binary-hppa/libc6_2.3.6.ds1-13etch7_hppa.deb stable/main/binary-hppa/libc6-pic_2.3.6.ds1-13etch7_hppa.deb stable/main/binary-hppa/libc6-prof_2.3.6.ds1-13etch7_hppa.deb stable/main/binary-hppa/libnss-dns-udeb_2.3.6.ds1-13etch7_hppa.udeb glibc (2.3.6.ds1-13etch7) stable; urgency=low * patches/any/cvs-tls-link.diff: fix linker script for libraries using TLS. Closes: #478542. stable/main/binary-arm/libc6-dbg_2.3.6.ds1-13etch7_arm.deb stable/main/binary-arm/libc6_2.3.6.ds1-13etch7_arm.deb stable/main/binary-arm/locales-all_2.3.6.ds1-13etch7_arm.deb stable/main/binary-arm/nscd_2.3.6.ds1-13etch7_arm.deb stable/main/binary-arm/libc6-prof_2.3.6.ds1-13etch7_arm.deb stable/main/binary-arm/libnss-dns-udeb_2.3.6.ds1-13etch7_arm.udeb stable/main/binary-arm/libc6-udeb_2.3.6.ds1-13etch7_arm.udeb stable/main/binary-arm/libc6-pic_2.3.6.ds1-13etch7_arm.deb stable/main/binary-arm/libc6-dev_2.3.6.ds1-13etch7_arm.deb stable/main/binary-arm/libnss-files-udeb_2.3.6.ds1-13etch7_arm.udeb glibc (2.3.6.ds1-13etch7) stable; urgency=low * patches/any/cvs-tls-link.diff: fix linker script for libraries using TLS. Closes: #478542. stable/main/binary-amd64/libc6-prof_2.3.6.ds1-13etch7_amd64.deb stable/main/binary-amd64/nscd_2.3.6.ds1-13etch7_amd64.deb stable/main/binary-amd64/libnss-dns-udeb_2.3.6.ds1-13etch7_amd64.udeb stable/main/binary-amd64/libc6_2.3.6.ds1-13etch7_amd64.deb stable/main/binary-amd64/libc6-pic_2.3.6.ds1-13etch7_amd64.deb stable/main/binary-amd64/libnss-files-udeb_2.3.6.ds1-13etch7_amd64.udeb stable/main/binary-amd64/libc6-dev_2.3.6.ds1-13etch7_amd64.deb stable/main/binary-amd64/locales-all_2.3.6.ds1-13etch7_amd64.deb stable/main/binary-amd64/libc6-dev-i386_2.3.6.ds1-13etch7_amd64.deb stable/main/binary-amd64/libc6-i386_2.3.6.ds1-13etch7_amd64.deb stable/main/binary-amd64/libc6-dbg_2.3.6.ds1-13etch7_amd64.deb stable/main/binary-amd64/libc6-udeb_2.3.6.ds1-13etch7_amd64.udeb glibc (2.3.6.ds1-13etch7) stable; urgency=low * patches/any/cvs-tls-link.diff: fix linker script for libraries using TLS. Closes: #478542. stable/main/binary-alpha/libc6.1-pic_2.3.6.ds1-13etch7_alpha.deb stable/main/binary-alpha/libc6.1_2.3.6.ds1-13etch7_alpha.deb stable/main/binary-alpha/locales-all_2.3.6.ds1-13etch7_alpha.deb stable/main/binary-alpha/libnss-dns-udeb_2.3.6.ds1-13etch7_alpha.udeb stable/main/binary-alpha/libc6.1-udeb_2.3.6.ds1-13etch7_alpha.udeb stable/main/binary-alpha/libc6.1-dev_2.3.6.ds1-13etch7_alpha.deb stable/main/binary-alpha/libc6.1-dbg_2.3.6.ds1-13etch7_alpha.deb stable/main/binary-alpha/libnss-files-udeb_2.3.6.ds1-13etch7_alpha.udeb stable/main/binary-alpha/nscd_2.3.6.ds1-13etch7_alpha.deb stable/main/binary-alpha/libc6.1-prof_2.3.6.ds1-13etch7_alpha.deb glibc (2.3.6.ds1-13etch7) stable; urgency=low * patches/any/cvs-tls-link.diff: fix linker script for libraries using TLS. Closes: #478542. stable/main/binary-mips/libc6-pic_2.3.6.ds1-13etch7_mips.deb stable/main/binary-mips/libc6-udeb_2.3.6.ds1-13etch7_mips.udeb stable/main/binary-all/locales_2.3.6.ds1-13etch7_all.deb stable/main/source/glibc_2.3.6.ds1-13etch7.diff.gz stable/main/binary-mips/libnss-dns-udeb_2.3.6.ds1-13etch7_mips.udeb stable/main/binary-mips/libnss-files-udeb_2.3.6.ds1-13etch7_mips.udeb stable/main/binary-mips/locales-all_2.3.6.ds1-13etch7_mips.deb stable/main/binary-mips/libc6-prof_2.3.6.ds1-13etch7_mips.deb stable/main/source/glibc_2.3.6.ds1-13etch7.dsc stable/main/binary-all/glibc-doc_2.3.6.ds1-13etch7_all.deb stable/main/binary-mips/libc6_2.3.6.ds1-13etch7_mips.deb stable/main/binary-mips/libc6-dev_2.3.6.ds1-13etch7_mips.deb stable/main/binary-mips/nscd_2.3.6.ds1-13etch7_mips.deb stable/main/binary-mips/libc6-dbg_2.3.6.ds1-13etch7_mips.deb glibc (2.3.6.ds1-13etch7) stable; urgency=low * patches/any/cvs-tls-link.diff: fix linker script for libraries using TLS. Closes: #478542. stable/main/binary-all/gforge-common_4.5.14-22etch8_all.deb stable/main/binary-all/gforge-mta-exim_4.5.14-22etch8_all.deb stable/main/binary-all/gforge-mta-exim4_4.5.14-22etch8_all.deb stable/main/binary-all/gforge-lists-mailman_4.5.14-22etch8_all.deb stable/main/source/gforge_4.5.14-22etch8.diff.gz stable/main/binary-all/gforge-web-apache_4.5.14-22etch8_all.deb stable/main/binary-all/gforge-mta-courier_4.5.14-22etch8_all.deb stable/main/binary-all/gforge_4.5.14-22etch8_all.deb stable/main/binary-all/gforge-mta-postfix_4.5.14-22etch8_all.deb stable/main/source/gforge_4.5.14-22etch8.dsc stable/main/binary-all/gforge-shell-ldap_4.5.14-22etch8_all.deb stable/main/binary-all/gforge-shell-postgresql_4.5.14-22etch8_all.deb stable/main/binary-all/gforge-ftp-proftpd_4.5.14-22etch8_all.deb stable/main/binary-all/gforge-db-postgresql_4.5.14-22etch8_all.deb stable/main/binary-all/gforge-ldap-openldap_4.5.14-22etch8_all.deb stable/main/binary-all/gforge-dns-bind9_4.5.14-22etch8_all.deb gforge (4.5.14-22etch8) stable-security; urgency=high * Also fixed a syntax error specific to ssh_dump_update.pl introduced in -22etch6. stable/main/binary-sparc/gaim-dev_2.0.0+beta5-10etch1_sparc.deb stable/main/binary-sparc/gaim_2.0.0+beta5-10etch1_sparc.deb stable/main/binary-sparc/gaim-dbg_2.0.0+beta5-10etch1_sparc.deb gaim (1:2.0.0+beta5-10etch1) stable-security; urgency=high * Non-maintainer upload by the security team * Fix MSN integer overflow via a malformed SLP message Fixes: CVE-2008-2927 stable/main/binary-s390/gaim-dev_2.0.0+beta5-10etch1_s390.deb stable/main/binary-s390/gaim-dbg_2.0.0+beta5-10etch1_s390.deb stable/main/binary-s390/gaim_2.0.0+beta5-10etch1_s390.deb gaim (1:2.0.0+beta5-10etch1) stable-security; urgency=high * Non-maintainer upload by the security team * Fix MSN integer overflow via a malformed SLP message Fixes: CVE-2008-2927 stable/main/binary-powerpc/gaim_2.0.0+beta5-10etch1_powerpc.deb stable/main/binary-powerpc/gaim-dev_2.0.0+beta5-10etch1_powerpc.deb stable/main/binary-powerpc/gaim-dbg_2.0.0+beta5-10etch1_powerpc.deb gaim (1:2.0.0+beta5-10etch1) stable-security; urgency=high * Non-maintainer upload by the security team * Fix MSN integer overflow via a malformed SLP message Fixes: CVE-2008-2927 stable/main/binary-mipsel/gaim-dev_2.0.0+beta5-10etch1_mipsel.deb stable/main/binary-mipsel/gaim_2.0.0+beta5-10etch1_mipsel.deb stable/main/binary-mipsel/gaim-dbg_2.0.0+beta5-10etch1_mipsel.deb gaim (1:2.0.0+beta5-10etch1) stable-security; urgency=high * Non-maintainer upload by the security team * Fix MSN integer overflow via a malformed SLP message Fixes: CVE-2008-2927 stable/main/binary-mips/gaim-dev_2.0.0+beta5-10etch1_mips.deb stable/main/binary-mips/gaim-dbg_2.0.0+beta5-10etch1_mips.deb stable/main/binary-mips/gaim_2.0.0+beta5-10etch1_mips.deb gaim (1:2.0.0+beta5-10etch1) stable-security; urgency=high * Non-maintainer upload by the security team * Fix MSN integer overflow via a malformed SLP message Fixes: CVE-2008-2927 stable/main/binary-ia64/gaim_2.0.0+beta5-10etch1_ia64.deb stable/main/binary-ia64/gaim-dev_2.0.0+beta5-10etch1_ia64.deb stable/main/binary-ia64/gaim-dbg_2.0.0+beta5-10etch1_ia64.deb gaim (1:2.0.0+beta5-10etch1) stable-security; urgency=high * Non-maintainer upload by the security team * Fix MSN integer overflow via a malformed SLP message Fixes: CVE-2008-2927 stable/main/binary-hppa/gaim-dev_2.0.0+beta5-10etch1_hppa.deb stable/main/binary-hppa/gaim-dbg_2.0.0+beta5-10etch1_hppa.deb stable/main/binary-hppa/gaim_2.0.0+beta5-10etch1_hppa.deb gaim (1:2.0.0+beta5-10etch1) stable-security; urgency=high * Non-maintainer upload by the security team * Fix MSN integer overflow via a malformed SLP message Fixes: CVE-2008-2927 stable/main/binary-arm/gaim-dev_2.0.0+beta5-10etch1_arm.deb stable/main/binary-arm/gaim-dbg_2.0.0+beta5-10etch1_arm.deb stable/main/binary-arm/gaim_2.0.0+beta5-10etch1_arm.deb gaim (1:2.0.0+beta5-10etch1) stable-security; urgency=high * Non-maintainer upload by the security team * Fix MSN integer overflow via a malformed SLP message Fixes: CVE-2008-2927 stable/main/binary-amd64/gaim-dev_2.0.0+beta5-10etch1_amd64.deb stable/main/binary-amd64/gaim-dbg_2.0.0+beta5-10etch1_amd64.deb stable/main/binary-amd64/gaim_2.0.0+beta5-10etch1_amd64.deb gaim (1:2.0.0+beta5-10etch1) stable-security; urgency=high * Non-maintainer upload by the security team * Fix MSN integer overflow via a malformed SLP message Fixes: CVE-2008-2927 stable/main/binary-alpha/gaim-dev_2.0.0+beta5-10etch1_alpha.deb stable/main/binary-alpha/gaim-dbg_2.0.0+beta5-10etch1_alpha.deb stable/main/binary-alpha/gaim_2.0.0+beta5-10etch1_alpha.deb gaim (1:2.0.0+beta5-10etch1) stable-security; urgency=high * Non-maintainer upload by the security team * Fix MSN integer overflow via a malformed SLP message Fixes: CVE-2008-2927 stable/main/source/gaim_2.0.0+beta5-10etch1.dsc stable/main/binary-i386/gaim-dev_2.0.0+beta5-10etch1_i386.deb stable/main/binary-all/gaim-data_2.0.0+beta5-10etch1_all.deb stable/main/binary-i386/gaim_2.0.0+beta5-10etch1_i386.deb stable/main/source/gaim_2.0.0+beta5-10etch1.diff.gz stable/main/binary-i386/gaim-dbg_2.0.0+beta5-10etch1_i386.deb gaim (1:2.0.0+beta5-10etch1) stable-security; urgency=high * Non-maintainer upload by the security team * Fix MSN integer overflow via a malformed SLP message Fixes: CVE-2008-2927 stable/non-free/binary-all/firmware-qlogic-di_0.4+etchnhalf.1_all.udeb stable/non-free/binary-all/firmware-qlogic_0.4+etchnhalf.1_all.deb stable/non-free/binary-all/firmware-bnx2_0.4+etchnhalf.1_all.deb stable/non-free/source/firmware-nonfree_0.4+etchnhalf.1.tar.gz stable/non-free/binary-all/firmware-iwlwifi-di_0.4+etchnhalf.1_all.udeb stable/non-free/binary-all/firmware-ipw3945_0.4+etchnhalf.1_all.deb stable/non-free/binary-all/firmware-ipw3945-di_0.4+etchnhalf.1_all.udeb stable/non-free/source/firmware-nonfree_0.4+etchnhalf.1.dsc stable/non-free/binary-all/firmware-iwlwifi_0.4+etchnhalf.1_all.deb stable/non-free/binary-all/firmware-bnx2-di_0.4+etchnhalf.1_all.udeb firmware-nonfree (0.4+etchnhalf.1) stable; urgency=low * Backport iwlwifi and bnx2 firmware from 0.11 release, only used in etch by drivers in the etchnhalf kernel. * Add initramfs hook support for bnx2 * Correct path to initramfs.conf file in postinst which was preventing initramfs updates for qlogic (and now bnx2) fw, closes: #432042 stable/main/binary-powerpc/fai-kernels_1.17+etch.21_powerpc.deb fai-kernels (1.17+etch.21) stable; urgency=high * Rebuild against linux-source-2.6.18_2.6.18.dfsg.1-21 stable/main/binary-amd64/fai-kernels_1.17+etch.21_amd64.deb fai-kernels (1.17+etch.21) stable; urgency=high * Rebuild against linux-source-2.6.18_2.6.18.dfsg.1-21 stable/main/source/fai-kernels_1.17+etch.21.tar.gz stable/main/source/fai-kernels_1.17+etch.21.dsc stable/main/binary-i386/fai-kernels_1.17+etch.21_i386.deb fai-kernels (1.17+etch.21) stable; urgency=high * Rebuild against linux-source-2.6.18_2.6.18.dfsg.1-21 stable/main/binary-sparc/exiv2_0.10-1.6_sparc.deb stable/main/binary-sparc/libexiv2-dev_0.10-1.6_sparc.deb stable/main/binary-sparc/libexiv2-0.10_0.10-1.6_sparc.deb exiv2 (0.10-1.6) stable; urgency=low * Non-maintainer upload. * Add quilt build dependency and adjust debian/rules to use it. * Add patch to fix gwenview and konqueror crashes, introduced in latest stable security update 0.10-1.5. Thanks to Daniel Hermann. (Closes: #462450) stable/main/binary-s390/libexiv2-0.10_0.10-1.6_s390.deb stable/main/binary-s390/libexiv2-dev_0.10-1.6_s390.deb stable/main/binary-s390/exiv2_0.10-1.6_s390.deb exiv2 (0.10-1.6) stable; urgency=low * Non-maintainer upload. * Add quilt build dependency and adjust debian/rules to use it. * Add patch to fix gwenview and konqueror crashes, introduced in latest stable security update 0.10-1.5. Thanks to Daniel Hermann. (Closes: #462450) stable/main/binary-powerpc/exiv2_0.10-1.6_powerpc.deb stable/main/binary-powerpc/libexiv2-dev_0.10-1.6_powerpc.deb stable/main/binary-powerpc/libexiv2-0.10_0.10-1.6_powerpc.deb exiv2 (0.10-1.6) stable; urgency=low * Non-maintainer upload. * Add quilt build dependency and adjust debian/rules to use it. * Add patch to fix gwenview and konqueror crashes, introduced in latest stable security update 0.10-1.5. Thanks to Daniel Hermann. (Closes: #462450) stable/main/binary-mipsel/libexiv2-dev_0.10-1.6_mipsel.deb stable/main/binary-mipsel/libexiv2-0.10_0.10-1.6_mipsel.deb stable/main/binary-mipsel/exiv2_0.10-1.6_mipsel.deb exiv2 (0.10-1.6) stable; urgency=low * Non-maintainer upload. * Add quilt build dependency and adjust debian/rules to use it. * Add patch to fix gwenview and konqueror crashes, introduced in latest stable security update 0.10-1.5. Thanks to Daniel Hermann. (Closes: #462450) stable/main/binary-mips/exiv2_0.10-1.6_mips.deb stable/main/binary-mips/libexiv2-dev_0.10-1.6_mips.deb stable/main/binary-mips/libexiv2-0.10_0.10-1.6_mips.deb exiv2 (0.10-1.6) stable; urgency=low * Non-maintainer upload. * Add quilt build dependency and adjust debian/rules to use it. * Add patch to fix gwenview and konqueror crashes, introduced in latest stable security update 0.10-1.5. Thanks to Daniel Hermann. (Closes: #462450) stable/main/binary-ia64/libexiv2-dev_0.10-1.6_ia64.deb stable/main/binary-ia64/libexiv2-0.10_0.10-1.6_ia64.deb stable/main/binary-ia64/exiv2_0.10-1.6_ia64.deb exiv2 (0.10-1.6) stable; urgency=low * Non-maintainer upload. * Add quilt build dependency and adjust debian/rules to use it. * Add patch to fix gwenview and konqueror crashes, introduced in latest stable security update 0.10-1.5. Thanks to Daniel Hermann. (Closes: #462450) stable/main/binary-i386/libexiv2-0.10_0.10-1.6_i386.deb stable/main/binary-i386/exiv2_0.10-1.6_i386.deb stable/main/binary-i386/libexiv2-dev_0.10-1.6_i386.deb exiv2 (0.10-1.6) stable; urgency=low * Non-maintainer upload. * Add quilt build dependency and adjust debian/rules to use it. * Add patch to fix gwenview and konqueror crashes, introduced in latest stable security update 0.10-1.5. Thanks to Daniel Hermann. (Closes: #462450) stable/main/binary-hppa/libexiv2-dev_0.10-1.6_hppa.deb stable/main/binary-hppa/exiv2_0.10-1.6_hppa.deb stable/main/binary-hppa/libexiv2-0.10_0.10-1.6_hppa.deb exiv2 (0.10-1.6) stable; urgency=low * Non-maintainer upload. * Add quilt build dependency and adjust debian/rules to use it. * Add patch to fix gwenview and konqueror crashes, introduced in latest stable security update 0.10-1.5. Thanks to Daniel Hermann. (Closes: #462450) stable/main/binary-arm/libexiv2-0.10_0.10-1.6_arm.deb stable/main/binary-arm/libexiv2-dev_0.10-1.6_arm.deb stable/main/binary-arm/exiv2_0.10-1.6_arm.deb exiv2 (0.10-1.6) stable; urgency=low * Non-maintainer upload. * Add quilt build dependency and adjust debian/rules to use it. * Add patch to fix gwenview and konqueror crashes, introduced in latest stable security update 0.10-1.5. Thanks to Daniel Hermann. (Closes: #462450) stable/main/binary-alpha/libexiv2-0.10_0.10-1.6_alpha.deb stable/main/binary-alpha/exiv2_0.10-1.6_alpha.deb stable/main/binary-alpha/libexiv2-dev_0.10-1.6_alpha.deb exiv2 (0.10-1.6) stable; urgency=low * Non-maintainer upload. * Add quilt build dependency and adjust debian/rules to use it. * Add patch to fix gwenview and konqueror crashes, introduced in latest stable security update 0.10-1.5. Thanks to Daniel Hermann. (Closes: #462450) stable/main/binary-amd64/libexiv2-0.10_0.10-1.6_amd64.deb stable/main/binary-amd64/libexiv2-dev_0.10-1.6_amd64.deb stable/main/source/exiv2_0.10-1.6.diff.gz stable/main/binary-all/libexiv2-doc_0.10-1.6_all.deb stable/main/source/exiv2_0.10-1.6.dsc stable/main/binary-amd64/exiv2_0.10-1.6_amd64.deb exiv2 (0.10-1.6) stable; urgency=low * Non-maintainer upload. * Add quilt build dependency and adjust debian/rules to use it. * Add patch to fix gwenview and konqueror crashes, introduced in latest stable security update 0.10-1.5. Thanks to Daniel Hermann. (Closes: #462450) stable/main/binary-sparc/exiftags_0.98-1.1+etch1_sparc.deb exiftags (0.98-1.1+etch1) stable-security; urgency=high * Non-maintainer upload by the Security Team. * Backport upstream fixes from v1.01: - CVE-2007-6354, CVE-2007-6355: integer overflow and memory access errors through inadequate EXIF data validation - CVE-2007-6356: recursive IFD references in EXIF data would cause a denial of service via infinite loop stable/main/binary-s390/exiftags_0.98-1.1+etch1_s390.deb exiftags (0.98-1.1+etch1) stable-security; urgency=high * Non-maintainer upload by the Security Team. * Backport upstream fixes from v1.01: - CVE-2007-6354, CVE-2007-6355: integer overflow and memory access errors through inadequate EXIF data validation - CVE-2007-6356: recursive IFD references in EXIF data would cause a denial of service via infinite loop stable/main/binary-powerpc/exiftags_0.98-1.1+etch1_powerpc.deb exiftags (0.98-1.1+etch1) stable-security; urgency=high * Non-maintainer upload by the Security Team. * Backport upstream fixes from v1.01: - CVE-2007-6354, CVE-2007-6355: integer overflow and memory access errors through inadequate EXIF data validation - CVE-2007-6356: recursive IFD references in EXIF data would cause a denial of service via infinite loop stable/main/binary-mipsel/exiftags_0.98-1.1+etch1_mipsel.deb exiftags (0.98-1.1+etch1) stable-security; urgency=high * Non-maintainer upload by the Security Team. * Backport upstream fixes from v1.01: - CVE-2007-6354, CVE-2007-6355: integer overflow and memory access errors through inadequate EXIF data validation - CVE-2007-6356: recursive IFD references in EXIF data would cause a denial of service via infinite loop stable/main/binary-mips/exiftags_0.98-1.1+etch1_mips.deb exiftags (0.98-1.1+etch1) stable-security; urgency=high * Non-maintainer upload by the Security Team. * Backport upstream fixes from v1.01: - CVE-2007-6354, CVE-2007-6355: integer overflow and memory access errors through inadequate EXIF data validation - CVE-2007-6356: recursive IFD references in EXIF data would cause a denial of service via infinite loop stable/main/binary-ia64/exiftags_0.98-1.1+etch1_ia64.deb exiftags (0.98-1.1+etch1) stable-security; urgency=high * Non-maintainer upload by the Security Team. * Backport upstream fixes from v1.01: - CVE-2007-6354, CVE-2007-6355: integer overflow and memory access errors through inadequate EXIF data validation - CVE-2007-6356: recursive IFD references in EXIF data would cause a denial of service via infinite loop stable/main/binary-i386/exiftags_0.98-1.1+etch1_i386.deb exiftags (0.98-1.1+etch1) stable-security; urgency=high * Non-maintainer upload by the Security Team. * Backport upstream fixes from v1.01: - CVE-2007-6354, CVE-2007-6355: integer overflow and memory access errors through inadequate EXIF data validation - CVE-2007-6356: recursive IFD references in EXIF data would cause a denial of service via infinite loop stable/main/binary-hppa/exiftags_0.98-1.1+etch1_hppa.deb exiftags (0.98-1.1+etch1) stable-security; urgency=high * Non-maintainer upload by the Security Team. * Backport upstream fixes from v1.01: - CVE-2007-6354, CVE-2007-6355: integer overflow and memory access errors through inadequate EXIF data validation - CVE-2007-6356: recursive IFD references in EXIF data would cause a denial of service via infinite loop stable/main/binary-arm/exiftags_0.98-1.1+etch1_arm.deb exiftags (0.98-1.1+etch1) stable-security; urgency=high * Non-maintainer upload by the Security Team. * Backport upstream fixes from v1.01: - CVE-2007-6354, CVE-2007-6355: integer overflow and memory access errors through inadequate EXIF data validation - CVE-2007-6356: recursive IFD references in EXIF data would cause a denial of service via infinite loop stable/main/binary-alpha/exiftags_0.98-1.1+etch1_alpha.deb exiftags (0.98-1.1+etch1) stable-security; urgency=high * Non-maintainer upload by the Security Team. * Backport upstream fixes from v1.01: - CVE-2007-6354, CVE-2007-6355: integer overflow and memory access errors through inadequate EXIF data validation - CVE-2007-6356: recursive IFD references in EXIF data would cause a denial of service via infinite loop stable/main/source/exiftags_0.98-1.1+etch1.dsc stable/main/source/exiftags_0.98-1.1+etch1.diff.gz stable/main/binary-amd64/exiftags_0.98-1.1+etch1_amd64.deb exiftags (0.98-1.1+etch1) stable-security; urgency=high * Non-maintainer upload by the Security Team. * Backport upstream fixes from v1.01: - CVE-2007-6354, CVE-2007-6355: integer overflow and memory access errors through inadequate EXIF data validation - CVE-2007-6356: recursive IFD references in EXIF data would cause a denial of service via infinite loop stable/main/binary-sparc/evolution-plugins_2.6.3-6etch2_sparc.deb stable/main/binary-sparc/evolution-dev_2.6.3-6etch2_sparc.deb stable/main/binary-sparc/evolution-plugins-experimental_2.6.3-6etch2_sparc.deb stable/main/binary-sparc/evolution_2.6.3-6etch2_sparc.deb stable/main/binary-sparc/evolution-dbg_2.6.3-6etch2_sparc.deb evolution (2.6.3-6etch2) stable-security; urgency=high * Non-maintainer upload by the security team. * Fix Encrypted Message Version Format String Vulnerability (CVE-2008-0072). stable/main/binary-s390/evolution-dev_2.6.3-6etch2_s390.deb stable/main/binary-s390/evolution-dbg_2.6.3-6etch2_s390.deb stable/main/binary-s390/evolution_2.6.3-6etch2_s390.deb stable/main/binary-s390/evolution-plugins-experimental_2.6.3-6etch2_s390.deb stable/main/binary-s390/evolution-plugins_2.6.3-6etch2_s390.deb evolution (2.6.3-6etch2) stable-security; urgency=high * Non-maintainer upload by the security team. * Fix Encrypted Message Version Format String Vulnerability (CVE-2008-0072). stable/main/binary-powerpc/evolution-plugins_2.6.3-6etch2_powerpc.deb stable/main/binary-powerpc/evolution_2.6.3-6etch2_powerpc.deb stable/main/binary-powerpc/evolution-dev_2.6.3-6etch2_powerpc.deb stable/main/binary-powerpc/evolution-dbg_2.6.3-6etch2_powerpc.deb stable/main/binary-powerpc/evolution-plugins-experimental_2.6.3-6etch2_powerpc.deb evolution (2.6.3-6etch2) stable-security; urgency=high * Non-maintainer upload by the security team. * Fix Encrypted Message Version Format String Vulnerability (CVE-2008-0072). stable/main/binary-mipsel/evolution-plugins-experimental_2.6.3-6etch2_mipsel.deb stable/main/binary-mipsel/evolution-dev_2.6.3-6etch2_mipsel.deb stable/main/binary-mipsel/evolution_2.6.3-6etch2_mipsel.deb stable/main/binary-mipsel/evolution-plugins_2.6.3-6etch2_mipsel.deb stable/main/binary-mipsel/evolution-dbg_2.6.3-6etch2_mipsel.deb evolution (2.6.3-6etch2) stable-security; urgency=high * Non-maintainer upload by the security team. * Fix Encrypted Message Version Format String Vulnerability (CVE-2008-0072). stable/main/binary-mips/evolution-dev_2.6.3-6etch2_mips.deb stable/main/binary-mips/evolution-dbg_2.6.3-6etch2_mips.deb stable/main/binary-mips/evolution-plugins_2.6.3-6etch2_mips.deb stable/main/binary-mips/evolution_2.6.3-6etch2_mips.deb stable/main/binary-mips/evolution-plugins-experimental_2.6.3-6etch2_mips.deb evolution (2.6.3-6etch2) stable-security; urgency=high * Non-maintainer upload by the security team. * Fix Encrypted Message Version Format String Vulnerability (CVE-2008-0072). stable/main/binary-ia64/evolution-plugins_2.6.3-6etch2_ia64.deb stable/main/binary-ia64/evolution_2.6.3-6etch2_ia64.deb stable/main/binary-ia64/evolution-plugins-experimental_2.6.3-6etch2_ia64.deb stable/main/binary-ia64/evolution-dev_2.6.3-6etch2_ia64.deb stable/main/binary-ia64/evolution-dbg_2.6.3-6etch2_ia64.deb evolution (2.6.3-6etch2) stable-security; urgency=high * Non-maintainer upload by the security team. * Fix Encrypted Message Version Format String Vulnerability (CVE-2008-0072). stable/main/binary-hppa/evolution-dev_2.6.3-6etch2_hppa.deb stable/main/binary-hppa/evolution-dbg_2.6.3-6etch2_hppa.deb stable/main/binary-hppa/evolution_2.6.3-6etch2_hppa.deb stable/main/binary-hppa/evolution-plugins_2.6.3-6etch2_hppa.deb stable/main/binary-hppa/evolution-plugins-experimental_2.6.3-6etch2_hppa.deb evolution (2.6.3-6etch2) stable-security; urgency=high * Non-maintainer upload by the security team. * Fix Encrypted Message Version Format String Vulnerability (CVE-2008-0072). stable/main/binary-arm/evolution-dev_2.6.3-6etch2_arm.deb stable/main/binary-arm/evolution-dbg_2.6.3-6etch2_arm.deb stable/main/binary-arm/evolution_2.6.3-6etch2_arm.deb stable/main/binary-arm/evolution-plugins-experimental_2.6.3-6etch2_arm.deb stable/main/binary-arm/evolution-plugins_2.6.3-6etch2_arm.deb evolution (2.6.3-6etch2) stable-security; urgency=high * Non-maintainer upload by the security team. * Fix Encrypted Message Version Format String Vulnerability (CVE-2008-0072). stable/main/binary-amd64/evolution-dev_2.6.3-6etch2_amd64.deb stable/main/binary-amd64/evolution_2.6.3-6etch2_amd64.deb stable/main/binary-amd64/evolution-plugins_2.6.3-6etch2_amd64.deb stable/main/binary-amd64/evolution-dbg_2.6.3-6etch2_amd64.deb stable/main/binary-amd64/evolution-plugins-experimental_2.6.3-6etch2_amd64.deb evolution (2.6.3-6etch2) stable-security; urgency=high * Non-maintainer upload by the security team. * Fix Encrypted Message Version Format String Vulnerability (CVE-2008-0072). stable/main/binary-alpha/evolution-dev_2.6.3-6etch2_alpha.deb stable/main/binary-alpha/evolution-plugins_2.6.3-6etch2_alpha.deb stable/main/binary-alpha/evolution-dbg_2.6.3-6etch2_alpha.deb stable/main/binary-alpha/evolution_2.6.3-6etch2_alpha.deb stable/main/binary-alpha/evolution-plugins-experimental_2.6.3-6etch2_alpha.deb evolution (2.6.3-6etch2) stable-security; urgency=high * Non-maintainer upload by the security team. * Fix Encrypted Message Version Format String Vulnerability (CVE-2008-0072). stable/main/binary-all/evolution-common_2.6.3-6etch2_all.deb stable/main/source/evolution_2.6.3-6etch2.dsc stable/main/source/evolution_2.6.3-6etch2.diff.gz stable/main/binary-i386/evolution-plugins_2.6.3-6etch2_i386.deb stable/main/binary-i386/evolution-dbg_2.6.3-6etch2_i386.deb stable/main/binary-i386/evolution-plugins-experimental_2.6.3-6etch2_i386.deb stable/main/binary-i386/evolution-dev_2.6.3-6etch2_i386.deb stable/main/binary-i386/evolution_2.6.3-6etch2_i386.deb evolution (2.6.3-6etch2) stable-security; urgency=high * Non-maintainer upload by the security team. * Fix Encrypted Message Version Format String Vulnerability (CVE-2008-0072). stable/main/binary-sparc/libdspam7-drv-sqlite3_3.6.8-5etch1_sparc.deb stable/main/binary-sparc/libdspam7-drv-pgsql_3.6.8-5etch1_sparc.deb stable/main/binary-sparc/libdspam7-drv-mysql_3.6.8-5etch1_sparc.deb stable/main/binary-sparc/libdspam7-drv-db4_3.6.8-5etch1_sparc.deb stable/main/binary-sparc/dspam_3.6.8-5etch1_sparc.deb stable/main/binary-sparc/libdspam7_3.6.8-5etch1_sparc.deb stable/main/binary-sparc/libdspam7-dev_3.6.8-5etch1_sparc.deb dspam (3.6.8-5etch1) stable-security; urgency=high * Non-maintainer upload by the security team. * Fix leaking of the MySQL password of the dspam database in the libdspam7-drv-mysql cronjob (CVE-2007-6418, closes: #448519). Thanks Adrian Friedli for the patch. stable/main/binary-s390/libdspam7-dev_3.6.8-5etch1_s390.deb stable/main/binary-s390/libdspam7_3.6.8-5etch1_s390.deb stable/main/binary-s390/libdspam7-drv-mysql_3.6.8-5etch1_s390.deb stable/main/binary-s390/dspam_3.6.8-5etch1_s390.deb stable/main/binary-s390/libdspam7-drv-db4_3.6.8-5etch1_s390.deb stable/main/binary-s390/libdspam7-drv-sqlite3_3.6.8-5etch1_s390.deb stable/main/binary-s390/libdspam7-drv-pgsql_3.6.8-5etch1_s390.deb dspam (3.6.8-5etch1) stable-security; urgency=high * Non-maintainer upload by the security team. * Fix leaking of the MySQL password of the dspam database in the libdspam7-drv-mysql cronjob (CVE-2007-6418, closes: #448519). Thanks Adrian Friedli for the patch. stable/main/binary-powerpc/dspam_3.6.8-5etch1_powerpc.deb stable/main/binary-powerpc/libdspam7_3.6.8-5etch1_powerpc.deb stable/main/binary-powerpc/libdspam7-drv-db4_3.6.8-5etch1_powerpc.deb stable/main/binary-powerpc/libdspam7-drv-sqlite3_3.6.8-5etch1_powerpc.deb stable/main/binary-powerpc/libdspam7-drv-mysql_3.6.8-5etch1_powerpc.deb stable/main/binary-powerpc/libdspam7-drv-pgsql_3.6.8-5etch1_powerpc.deb stable/main/binary-powerpc/libdspam7-dev_3.6.8-5etch1_powerpc.deb dspam (3.6.8-5etch1) stable-security; urgency=high * Non-maintainer upload by the security team. * Fix leaking of the MySQL password of the dspam database in the libdspam7-drv-mysql cronjob (CVE-2007-6418, closes: #448519). Thanks Adrian Friedli for the patch. stable/main/binary-mipsel/libdspam7-drv-db4_3.6.8-5etch1_mipsel.deb stable/main/binary-mipsel/libdspam7-drv-mysql_3.6.8-5etch1_mipsel.deb stable/main/binary-mipsel/libdspam7-drv-sqlite3_3.6.8-5etch1_mipsel.deb stable/main/binary-mipsel/libdspam7-dev_3.6.8-5etch1_mipsel.deb stable/main/binary-mipsel/libdspam7_3.6.8-5etch1_mipsel.deb stable/main/binary-mipsel/libdspam7-drv-pgsql_3.6.8-5etch1_mipsel.deb stable/main/binary-mipsel/dspam_3.6.8-5etch1_mipsel.deb dspam (3.6.8-5etch1) stable-security; urgency=high * Non-maintainer upload by the security team. * Fix leaking of the MySQL password of the dspam database in the libdspam7-drv-mysql cronjob (CVE-2007-6418, closes: #448519). Thanks Adrian Friedli for the patch. stable/main/binary-mips/libdspam7-drv-db4_3.6.8-5etch1_mips.deb stable/main/binary-mips/libdspam7-dev_3.6.8-5etch1_mips.deb stable/main/binary-mips/libdspam7-drv-sqlite3_3.6.8-5etch1_mips.deb stable/main/binary-mips/libdspam7-drv-pgsql_3.6.8-5etch1_mips.deb stable/main/binary-mips/dspam_3.6.8-5etch1_mips.deb stable/main/binary-mips/libdspam7_3.6.8-5etch1_mips.deb stable/main/binary-mips/libdspam7-drv-mysql_3.6.8-5etch1_mips.deb dspam (3.6.8-5etch1) stable-security; urgency=high * Non-maintainer upload by the security team. * Fix leaking of the MySQL password of the dspam database in the libdspam7-drv-mysql cronjob (CVE-2007-6418, closes: #448519). Thanks Adrian Friedli for the patch. stable/main/binary-ia64/libdspam7-drv-pgsql_3.6.8-5etch1_ia64.deb stable/main/binary-ia64/libdspam7-dev_3.6.8-5etch1_ia64.deb stable/main/binary-ia64/dspam_3.6.8-5etch1_ia64.deb stable/main/binary-ia64/libdspam7-drv-sqlite3_3.6.8-5etch1_ia64.deb stable/main/binary-ia64/libdspam7-drv-mysql_3.6.8-5etch1_ia64.deb stable/main/binary-ia64/libdspam7_3.6.8-5etch1_ia64.deb stable/main/binary-ia64/libdspam7-drv-db4_3.6.8-5etch1_ia64.deb dspam (3.6.8-5etch1) stable-security; urgency=high * Non-maintainer upload by the security team. * Fix leaking of the MySQL password of the dspam database in the libdspam7-drv-mysql cronjob (CVE-2007-6418, closes: #448519). Thanks Adrian Friedli for the patch. stable/main/binary-hppa/libdspam7-drv-db4_3.6.8-5etch1_hppa.deb stable/main/binary-hppa/libdspam7_3.6.8-5etch1_hppa.deb stable/main/binary-hppa/dspam_3.6.8-5etch1_hppa.deb stable/main/binary-hppa/libdspam7-dev_3.6.8-5etch1_hppa.deb stable/main/binary-hppa/libdspam7-drv-pgsql_3.6.8-5etch1_hppa.deb stable/main/binary-hppa/libdspam7-drv-mysql_3.6.8-5etch1_hppa.deb stable/main/binary-hppa/libdspam7-drv-sqlite3_3.6.8-5etch1_hppa.deb dspam (3.6.8-5etch1) stable-security; urgency=high * Non-maintainer upload by the security team. * Fix leaking of the MySQL password of the dspam database in the libdspam7-drv-mysql cronjob (CVE-2007-6418, closes: #448519). Thanks Adrian Friedli for the patch. stable/main/binary-arm/libdspam7-drv-db4_3.6.8-5etch1_arm.deb stable/main/binary-arm/libdspam7-drv-mysql_3.6.8-5etch1_arm.deb stable/main/binary-arm/libdspam7_3.6.8-5etch1_arm.deb stable/main/binary-arm/libdspam7-drv-pgsql_3.6.8-5etch1_arm.deb stable/main/binary-arm/libdspam7-dev_3.6.8-5etch1_arm.deb stable/main/binary-arm/dspam_3.6.8-5etch1_arm.deb stable/main/binary-arm/libdspam7-drv-sqlite3_3.6.8-5etch1_arm.deb dspam (3.6.8-5etch1) stable-security; urgency=high * Non-maintainer upload by the security team. * Fix leaking of the MySQL password of the dspam database in the libdspam7-drv-mysql cronjob (CVE-2007-6418, closes: #448519). Thanks Adrian Friedli for the patch. stable/main/binary-amd64/libdspam7-drv-sqlite3_3.6.8-5etch1_amd64.deb stable/main/binary-amd64/libdspam7-dev_3.6.8-5etch1_amd64.deb stable/main/binary-amd64/libdspam7-drv-pgsql_3.6.8-5etch1_amd64.deb stable/main/binary-amd64/libdspam7_3.6.8-5etch1_amd64.deb stable/main/binary-amd64/libdspam7-drv-mysql_3.6.8-5etch1_amd64.deb stable/main/binary-amd64/libdspam7-drv-db4_3.6.8-5etch1_amd64.deb stable/main/binary-amd64/dspam_3.6.8-5etch1_amd64.deb dspam (3.6.8-5etch1) stable-security; urgency=high * Non-maintainer upload by the security team. * Fix leaking of the MySQL password of the dspam database in the libdspam7-drv-mysql cronjob (CVE-2007-6418, closes: #448519). Thanks Adrian Friedli for the patch. stable/main/binary-alpha/libdspam7_3.6.8-5etch1_alpha.deb stable/main/binary-alpha/libdspam7-drv-db4_3.6.8-5etch1_alpha.deb stable/main/binary-alpha/libdspam7-drv-mysql_3.6.8-5etch1_alpha.deb stable/main/binary-alpha/libdspam7-dev_3.6.8-5etch1_alpha.deb stable/main/binary-alpha/dspam_3.6.8-5etch1_alpha.deb stable/main/binary-alpha/libdspam7-drv-pgsql_3.6.8-5etch1_alpha.deb stable/main/binary-alpha/libdspam7-drv-sqlite3_3.6.8-5etch1_alpha.deb dspam (3.6.8-5etch1) stable-security; urgency=high * Non-maintainer upload by the security team. * Fix leaking of the MySQL password of the dspam database in the libdspam7-drv-mysql cronjob (CVE-2007-6418, closes: #448519). Thanks Adrian Friedli for the patch. stable/main/source/dspam_3.6.8-5etch1.diff.gz stable/main/binary-i386/dspam_3.6.8-5etch1_i386.deb stable/main/binary-i386/libdspam7-drv-sqlite3_3.6.8-5etch1_i386.deb stable/main/binary-i386/libdspam7_3.6.8-5etch1_i386.deb stable/main/binary-i386/libdspam7-drv-pgsql_3.6.8-5etch1_i386.deb stable/main/binary-i386/libdspam7-drv-db4_3.6.8-5etch1_i386.deb stable/main/binary-i386/libdspam7-drv-mysql_3.6.8-5etch1_i386.deb stable/main/source/dspam_3.6.8-5etch1.dsc stable/main/binary-i386/libdspam7-dev_3.6.8-5etch1_i386.deb stable/main/binary-all/dspam-webfrontend_3.6.8-5etch1_all.deb stable/main/binary-all/dspam-doc_3.6.8-5etch1_all.deb dspam (3.6.8-5etch1) stable-security; urgency=high * Non-maintainer upload by the security team. * Fix leaking of the MySQL password of the dspam database in the libdspam7-drv-mysql cronjob (CVE-2007-6418, closes: #448519). Thanks Adrian Friedli for the patch. stable/main/binary-sparc/dovecot-imapd_1.0.rc15-2etch4_sparc.deb stable/main/binary-sparc/dovecot-common_1.0.rc15-2etch4_sparc.deb stable/main/binary-sparc/dovecot-pop3d_1.0.rc15-2etch4_sparc.deb dovecot (1.0.rc15-2etch4) stable-security; urgency=high * Security issue: some passdbs allowed users to log in without a valid password (http://dovecot.org/list/dovecot-news/2008-March/000064.html) Applied upstream patch for the 1.0.x branch, downloaded from: http://hg.dovecot.org/dovecot-1.0/raw-rev/da2a9372e26e (Closes: #470685) * Security usse: mail_extra_groups setting is often used insecurely (http://dovecot.org/list/dovecot-news/2008-March/000060.html). Applied upstream patch for the 1.0.x branch, downloaded from: http://dovecot.org/patches/1.0/dovecot-1.0.10.mail_priv_groups.diff stable/main/binary-s390/dovecot-pop3d_1.0.rc15-2etch4_s390.deb stable/main/binary-s390/dovecot-common_1.0.rc15-2etch4_s390.deb stable/main/binary-s390/dovecot-imapd_1.0.rc15-2etch4_s390.deb dovecot (1.0.rc15-2etch4) stable-security; urgency=high * Security issue: some passdbs allowed users to log in without a valid password (http://dovecot.org/list/dovecot-news/2008-March/000064.html) Applied upstream patch for the 1.0.x branch, downloaded from: http://hg.dovecot.org/dovecot-1.0/raw-rev/da2a9372e26e (Closes: #470685) * Security usse: mail_extra_groups setting is often used insecurely (http://dovecot.org/list/dovecot-news/2008-March/000060.html). Applied upstream patch for the 1.0.x branch, downloaded from: http://dovecot.org/patches/1.0/dovecot-1.0.10.mail_priv_groups.diff stable/main/binary-powerpc/dovecot-imapd_1.0.rc15-2etch4_powerpc.deb stable/main/binary-powerpc/dovecot-pop3d_1.0.rc15-2etch4_powerpc.deb stable/main/binary-powerpc/dovecot-common_1.0.rc15-2etch4_powerpc.deb dovecot (1.0.rc15-2etch4) stable-security; urgency=high * Security issue: some passdbs allowed users to log in without a valid password (http://dovecot.org/list/dovecot-news/2008-March/000064.html) Applied upstream patch for the 1.0.x branch, downloaded from: http://hg.dovecot.org/dovecot-1.0/raw-rev/da2a9372e26e (Closes: #470685) * Security usse: mail_extra_groups setting is often used insecurely (http://dovecot.org/list/dovecot-news/2008-March/000060.html). Applied upstream patch for the 1.0.x branch, downloaded from: http://dovecot.org/patches/1.0/dovecot-1.0.10.mail_priv_groups.diff stable/main/binary-mipsel/dovecot-common_1.0.rc15-2etch4_mipsel.deb stable/main/binary-mipsel/dovecot-imapd_1.0.rc15-2etch4_mipsel.deb stable/main/binary-mipsel/dovecot-pop3d_1.0.rc15-2etch4_mipsel.deb dovecot (1.0.rc15-2etch4) stable-security; urgency=high * Security issue: some passdbs allowed users to log in without a valid password (http://dovecot.org/list/dovecot-news/2008-March/000064.html) Applied upstream patch for the 1.0.x branch, downloaded from: http://hg.dovecot.org/dovecot-1.0/raw-rev/da2a9372e26e (Closes: #470685) * Security usse: mail_extra_groups setting is often used insecurely (http://dovecot.org/list/dovecot-news/2008-March/000060.html). Applied upstream patch for the 1.0.x branch, downloaded from: http://dovecot.org/patches/1.0/dovecot-1.0.10.mail_priv_groups.diff stable/main/binary-mips/dovecot-pop3d_1.0.rc15-2etch4_mips.deb stable/main/binary-mips/dovecot-imapd_1.0.rc15-2etch4_mips.deb stable/main/binary-mips/dovecot-common_1.0.rc15-2etch4_mips.deb dovecot (1.0.rc15-2etch4) stable-security; urgency=high * Security issue: some passdbs allowed users to log in without a valid password (http://dovecot.org/list/dovecot-news/2008-March/000064.html) Applied upstream patch for the 1.0.x branch, downloaded from: http://hg.dovecot.org/dovecot-1.0/raw-rev/da2a9372e26e (Closes: #470685) * Security usse: mail_extra_groups setting is often used insecurely (http://dovecot.org/list/dovecot-news/2008-March/000060.html). Applied upstream patch for the 1.0.x branch, downloaded from: http://dovecot.org/patches/1.0/dovecot-1.0.10.mail_priv_groups.diff stable/main/binary-ia64/dovecot-imapd_1.0.rc15-2etch4_ia64.deb stable/main/binary-ia64/dovecot-pop3d_1.0.rc15-2etch4_ia64.deb stable/main/binary-ia64/dovecot-common_1.0.rc15-2etch4_ia64.deb dovecot (1.0.rc15-2etch4) stable-security; urgency=high * Security issue: some passdbs allowed users to log in without a valid password (http://dovecot.org/list/dovecot-news/2008-March/000064.html) Applied upstream patch for the 1.0.x branch, downloaded from: http://hg.dovecot.org/dovecot-1.0/raw-rev/da2a9372e26e (Closes: #470685) * Security usse: mail_extra_groups setting is often used insecurely (http://dovecot.org/list/dovecot-news/2008-March/000060.html). Applied upstream patch for the 1.0.x branch, downloaded from: http://dovecot.org/patches/1.0/dovecot-1.0.10.mail_priv_groups.diff stable/main/binary-i386/dovecot-common_1.0.rc15-2etch4_i386.deb stable/main/binary-i386/dovecot-imapd_1.0.rc15-2etch4_i386.deb stable/main/binary-i386/dovecot-pop3d_1.0.rc15-2etch4_i386.deb dovecot (1.0.rc15-2etch4) stable-security; urgency=high * Security issue: some passdbs allowed users to log in without a valid password (http://dovecot.org/list/dovecot-news/2008-March/000064.html) Applied upstream patch for the 1.0.x branch, downloaded from: http://hg.dovecot.org/dovecot-1.0/raw-rev/da2a9372e26e (Closes: #470685) * Security usse: mail_extra_groups setting is often used insecurely (http://dovecot.org/list/dovecot-news/2008-March/000060.html). Applied upstream patch for the 1.0.x branch, downloaded from: http://dovecot.org/patches/1.0/dovecot-1.0.10.mail_priv_groups.diff stable/main/binary-hppa/dovecot-common_1.0.rc15-2etch4_hppa.deb stable/main/binary-hppa/dovecot-pop3d_1.0.rc15-2etch4_hppa.deb stable/main/binary-hppa/dovecot-imapd_1.0.rc15-2etch4_hppa.deb dovecot (1.0.rc15-2etch4) stable-security; urgency=high * Security issue: some passdbs allowed users to log in without a valid password (http://dovecot.org/list/dovecot-news/2008-March/000064.html) Applied upstream patch for the 1.0.x branch, downloaded from: http://hg.dovecot.org/dovecot-1.0/raw-rev/da2a9372e26e (Closes: #470685) * Security usse: mail_extra_groups setting is often used insecurely (http://dovecot.org/list/dovecot-news/2008-March/000060.html). Applied upstream patch for the 1.0.x branch, downloaded from: http://dovecot.org/patches/1.0/dovecot-1.0.10.mail_priv_groups.diff stable/main/binary-arm/dovecot-common_1.0.rc15-2etch4_arm.deb stable/main/binary-arm/dovecot-pop3d_1.0.rc15-2etch4_arm.deb stable/main/binary-arm/dovecot-imapd_1.0.rc15-2etch4_arm.deb dovecot (1.0.rc15-2etch4) stable-security; urgency=high * Security issue: some passdbs allowed users to log in without a valid password (http://dovecot.org/list/dovecot-news/2008-March/000064.html) Applied upstream patch for the 1.0.x branch, downloaded from: http://hg.dovecot.org/dovecot-1.0/raw-rev/da2a9372e26e (Closes: #470685) * Security usse: mail_extra_groups setting is often used insecurely (http://dovecot.org/list/dovecot-news/2008-March/000060.html). Applied upstream patch for the 1.0.x branch, downloaded from: http://dovecot.org/patches/1.0/dovecot-1.0.10.mail_priv_groups.diff stable/main/binary-alpha/dovecot-pop3d_1.0.rc15-2etch4_alpha.deb stable/main/binary-alpha/dovecot-common_1.0.rc15-2etch4_alpha.deb stable/main/binary-alpha/dovecot-imapd_1.0.rc15-2etch4_alpha.deb dovecot (1.0.rc15-2etch4) stable-security; urgency=high * Security issue: some passdbs allowed users to log in without a valid password (http://dovecot.org/list/dovecot-news/2008-March/000064.html) Applied upstream patch for the 1.0.x branch, downloaded from: http://hg.dovecot.org/dovecot-1.0/raw-rev/da2a9372e26e (Closes: #470685) * Security usse: mail_extra_groups setting is often used insecurely (http://dovecot.org/list/dovecot-news/2008-March/000060.html). Applied upstream patch for the 1.0.x branch, downloaded from: http://dovecot.org/patches/1.0/dovecot-1.0.10.mail_priv_groups.diff stable/main/source/dovecot_1.0.rc15-2etch4.dsc stable/main/binary-amd64/dovecot-common_1.0.rc15-2etch4_amd64.deb stable/main/binary-amd64/dovecot-pop3d_1.0.rc15-2etch4_amd64.deb stable/main/source/dovecot_1.0.rc15-2etch4.diff.gz stable/main/binary-amd64/dovecot-imapd_1.0.rc15-2etch4_amd64.deb dovecot (1.0.rc15-2etch4) stable-security; urgency=high * Security issue: some passdbs allowed users to log in without a valid password (http://dovecot.org/list/dovecot-news/2008-March/000064.html) Applied upstream patch for the 1.0.x branch, downloaded from: http://hg.dovecot.org/dovecot-1.0/raw-rev/da2a9372e26e (Closes: #470685) * Security usse: mail_extra_groups setting is often used insecurely (http://dovecot.org/list/dovecot-news/2008-March/000060.html). Applied upstream patch for the 1.0.x branch, downloaded from: http://dovecot.org/patches/1.0/dovecot-1.0.10.mail_priv_groups.diff stable/main/binary-sparc/dns-flood-detector_1.12-1etch1_sparc.deb dns-flood-detector (1.12-1etch1) stable; urgency=low * make start-stop-daemon working instead of using kill (Closes: #431676). stable/main/binary-s390/dns-flood-detector_1.12-1etch1_s390.deb dns-flood-detector (1.12-1etch1) stable; urgency=low * make start-stop-daemon working instead of using kill (Closes: #431676). stable/main/binary-powerpc/dns-flood-detector_1.12-1etch1_powerpc.deb dns-flood-detector (1.12-1etch1) stable; urgency=low * make start-stop-daemon working instead of using kill (Closes: #431676). stable/main/binary-mipsel/dns-flood-detector_1.12-1etch1_mipsel.deb dns-flood-detector (1.12-1etch1) stable; urgency=low * make start-stop-daemon working instead of using kill (Closes: #431676). stable/main/binary-mips/dns-flood-detector_1.12-1etch1_mips.deb dns-flood-detector (1.12-1etch1) stable; urgency=low * make start-stop-daemon working instead of using kill (Closes: #431676). stable/main/binary-ia64/dns-flood-detector_1.12-1etch1_ia64.deb dns-flood-detector (1.12-1etch1) stable; urgency=low * make start-stop-daemon working instead of using kill (Closes: #431676). stable/main/binary-hppa/dns-flood-detector_1.12-1etch1_hppa.deb dns-flood-detector (1.12-1etch1) stable; urgency=low * make start-stop-daemon working instead of using kill (Closes: #431676). stable/main/binary-arm/dns-flood-detector_1.12-1etch1_arm.deb dns-flood-detector (1.12-1etch1) stable; urgency=low * make start-stop-daemon working instead of using kill (Closes: #431676). stable/main/binary-amd64/dns-flood-detector_1.12-1etch1_amd64.deb dns-flood-detector (1.12-1etch1) stable; urgency=low * make start-stop-daemon working instead of using kill (Closes: #431676). stable/main/binary-alpha/dns-flood-detector_1.12-1etch1_alpha.deb dns-flood-detector (1.12-1etch1) stable; urgency=low * make start-stop-daemon working instead of using kill (Closes: #431676). stable/main/source/dns-flood-detector_1.12-1etch1.dsc stable/main/binary-i386/dns-flood-detector_1.12-1etch1_i386.deb stable/main/source/dns-flood-detector_1.12-1etch1.diff.gz dns-flood-detector (1.12-1etch1) stable; urgency=low * make start-stop-daemon working instead of using kill (Closes: #431676). stable/main/binary-sparc/debian-installer_20070308etch3_sparc.deb debian-installer (20070308etch3) stable; urgency=low * Rebuild to ensure the installer includes fixed versions of openssh for the SSH key vulnerability (DSA-1576-1). This affects architectures using network-console (arm, mipsel) and generic (s390) images. The upcoming 4.0r4 point release will ensure fixed versions of openssh are also included for all CD-based installations. Closes: #491263. stable/main/binary-powerpc/debian-installer_20070308etch3_powerpc.deb debian-installer (20070308etch3) stable; urgency=low * Rebuild to ensure the installer includes fixed versions of openssh for the SSH key vulnerability (DSA-1576-1). This affects architectures using network-console (arm, mipsel) and generic (s390) images. The upcoming 4.0r4 point release will ensure fixed versions of openssh are also included for all CD-based installations. Closes: #491263. stable/main/binary-mipsel/debian-installer_20070308etch3_mipsel.deb debian-installer (20070308etch3) stable; urgency=low * Rebuild to ensure the installer includes fixed versions of openssh for the SSH key vulnerability (DSA-1576-1). This affects architectures using network-console (arm, mipsel) and generic (s390) images. The upcoming 4.0r4 point release will ensure fixed versions of openssh are also included for all CD-based installations. Closes: #491263. stable/main/binary-mips/debian-installer_20070308etch3_mips.deb debian-installer (20070308etch3) stable; urgency=low * Rebuild to ensure the installer includes fixed versions of openssh for the SSH key vulnerability (DSA-1576-1). This affects architectures using network-console (arm, mipsel) and generic (s390) images. The upcoming 4.0r4 point release will ensure fixed versions of openssh are also included for all CD-based installations. Closes: #491263. stable/main/binary-ia64/debian-installer_20070308etch3_ia64.deb debian-installer (20070308etch3) stable; urgency=low * Rebuild to ensure the installer includes fixed versions of openssh for the SSH key vulnerability (DSA-1576-1). This affects architectures using network-console (arm, mipsel) and generic (s390) images. The upcoming 4.0r4 point release will ensure fixed versions of openssh are also included for all CD-based installations. Closes: #491263. stable/main/binary-i386/debian-installer_20070308etch3_i386.deb debian-installer (20070308etch3) stable; urgency=low * Rebuild to ensure the installer includes fixed versions of openssh for the SSH key vulnerability (DSA-1576-1). This affects architectures using network-console (arm, mipsel) and generic (s390) images. The upcoming 4.0r4 point release will ensure fixed versions of openssh are also included for all CD-based installations. Closes: #491263. stable/main/binary-hppa/debian-installer_20070308etch3_hppa.deb debian-installer (20070308etch3) stable; urgency=low * Rebuild to ensure the installer includes fixed versions of openssh for the SSH key vulnerability (DSA-1576-1). This affects architectures using network-console (arm, mipsel) and generic (s390) images. The upcoming 4.0r4 point release will ensure fixed versions of openssh are also included for all CD-based installations. Closes: #491263. stable/main/binary-arm/debian-installer_20070308etch3_arm.deb debian-installer (20070308etch3) stable; urgency=low * Rebuild to ensure the installer includes fixed versions of openssh for the SSH key vulnerability (DSA-1576-1). This affects architectures using network-console (arm, mipsel) and generic (s390) images. The upcoming 4.0r4 point release will ensure fixed versions of openssh are also included for all CD-based installations. Closes: #491263. stable/main/binary-amd64/debian-installer_20070308etch3_amd64.deb debian-installer (20070308etch3) stable; urgency=low * Rebuild to ensure the installer includes fixed versions of openssh for the SSH key vulnerability (DSA-1576-1). This affects architectures using network-console (arm, mipsel) and generic (s390) images. The upcoming 4.0r4 point release will ensure fixed versions of openssh are also included for all CD-based installations. Closes: #491263. stable/main/binary-alpha/debian-installer_20070308etch3_alpha.deb debian-installer (20070308etch3) stable; urgency=low * Rebuild to ensure the installer includes fixed versions of openssh for the SSH key vulnerability (DSA-1576-1). This affects architectures using network-console (arm, mipsel) and generic (s390) images. The upcoming 4.0r4 point release will ensure fixed versions of openssh are also included for all CD-based installations. Closes: #491263. stable/main/source/debian-installer_20070308etch3.dsc stable/main/binary-s390/debian-installer_20070308etch3_s390.deb stable/main/source/debian-installer_20070308etch3.tar.gz debian-installer (20070308etch3) stable; urgency=low * Rebuild to ensure the installer includes fixed versions of openssh for the SSH key vulnerability (DSA-1576-1). This affects architectures using network-console (arm, mipsel) and generic (s390) images. The upcoming 4.0r4 point release will ensure fixed versions of openssh are also included for all CD-based installations. Closes: #491263. stable/main/binary-all/debian-goodies_0.27+etch1_all.deb stable/main/source/debian-goodies_0.27+etch1.dsc stable/main/source/debian-goodies_0.27+etch1.tar.gz debian-goodies (0.27+etch1) stable-security; urgency=high * Fix security bug that enables users to generate files in the filesystem with shell metacharacters and have the checkrestart script run external code (as root, since the script will only run as admin). Thanks to Thomas de Grenier de Latour for spotting this and providing a patch. (CVE-2007-3912, Closes: 440411) stable/main/binary-all/debconf-i18n_1.5.11etch2_all.deb stable/main/binary-all/debconf-doc_1.5.11etch2_all.deb stable/main/source/debconf_1.5.11etch2.dsc stable/main/binary-all/debconf-utils_1.5.11etch2_all.deb stable/main/binary-all/debconf-english_1.5.11etch2_all.deb stable/main/source/debconf_1.5.11etch2.tar.gz stable/main/binary-all/debconf_1.5.11etch2_all.deb debconf (1.5.11etch2) stable; urgency=low * Backport changes to make debconf-apt-progress compatible with the Lenny debian-installer: - Add --no-progress option intended to be used by apt-install in d-i. - Notice if the child exited abnormally, and exit nonzero. - Add --dlwaypoint option (without the cancel changes). - Fix tasksel hangs when $debconf_command_eof never became true because of buggy daemons. STATUS_READ should be the last fd to close, so checking $status_eof is sufficient. (LP: #141601) - Fix use of 'next' rather than 'return' in debconf-apt-progress handle_status. stable/main/binary-sparc/libdbus-1-3_1.0.2-1+etch1_sparc.deb stable/main/binary-sparc/dbus-1-utils_1.0.2-1+etch1_sparc.deb stable/main/binary-sparc/dbus_1.0.2-1+etch1_sparc.deb stable/main/binary-sparc/libdbus-1-dev_1.0.2-1+etch1_sparc.deb dbus (1.0.2-1+etch1) stable-security; urgency=high * Fix CVE-2008-0595 stable/main/binary-s390/dbus_1.0.2-1+etch1_s390.deb stable/main/binary-s390/dbus-1-utils_1.0.2-1+etch1_s390.deb stable/main/binary-s390/libdbus-1-3_1.0.2-1+etch1_s390.deb stable/main/binary-s390/libdbus-1-dev_1.0.2-1+etch1_s390.deb dbus (1.0.2-1+etch1) stable-security; urgency=high * Fix CVE-2008-0595 stable/main/binary-powerpc/libdbus-1-dev_1.0.2-1+etch1_powerpc.deb stable/main/binary-powerpc/dbus_1.0.2-1+etch1_powerpc.deb stable/main/binary-powerpc/dbus-1-utils_1.0.2-1+etch1_powerpc.deb stable/main/binary-powerpc/libdbus-1-3_1.0.2-1+etch1_powerpc.deb dbus (1.0.2-1+etch1) stable-security; urgency=high * Fix CVE-2008-0595 stable/main/binary-mipsel/dbus_1.0.2-1+etch1_mipsel.deb stable/main/binary-mipsel/dbus-1-utils_1.0.2-1+etch1_mipsel.deb stable/main/binary-mipsel/libdbus-1-3_1.0.2-1+etch1_mipsel.deb stable/main/binary-mipsel/libdbus-1-dev_1.0.2-1+etch1_mipsel.deb dbus (1.0.2-1+etch1) stable-security; urgency=high * Fix CVE-2008-0595 stable/main/binary-mips/dbus_1.0.2-1+etch1_mips.deb stable/main/binary-mips/dbus-1-utils_1.0.2-1+etch1_mips.deb stable/main/binary-mips/libdbus-1-3_1.0.2-1+etch1_mips.deb stable/main/binary-mips/libdbus-1-dev_1.0.2-1+etch1_mips.deb dbus (1.0.2-1+etch1) stable-security; urgency=high * Fix CVE-2008-0595 stable/main/binary-ia64/dbus-1-utils_1.0.2-1+etch1_ia64.deb stable/main/binary-ia64/dbus_1.0.2-1+etch1_ia64.deb stable/main/binary-ia64/libdbus-1-3_1.0.2-1+etch1_ia64.deb stable/main/binary-ia64/libdbus-1-dev_1.0.2-1+etch1_ia64.deb dbus (1.0.2-1+etch1) stable-security; urgency=high * Fix CVE-2008-0595 stable/main/binary-hppa/dbus_1.0.2-1+etch1_hppa.deb stable/main/binary-hppa/dbus-1-utils_1.0.2-1+etch1_hppa.deb stable/main/binary-hppa/libdbus-1-dev_1.0.2-1+etch1_hppa.deb stable/main/binary-hppa/libdbus-1-3_1.0.2-1+etch1_hppa.deb dbus (1.0.2-1+etch1) stable-security; urgency=high * Fix CVE-2008-0595 stable/main/binary-arm/dbus_1.0.2-1+etch1_arm.deb stable/main/binary-arm/dbus-1-utils_1.0.2-1+etch1_arm.deb stable/main/binary-arm/libdbus-1-3_1.0.2-1+etch1_arm.deb stable/main/binary-arm/libdbus-1-dev_1.0.2-1+etch1_arm.deb dbus (1.0.2-1+etch1) stable-security; urgency=high * Fix CVE-2008-0595 stable/main/binary-amd64/dbus-1-utils_1.0.2-1+etch1_amd64.deb stable/main/binary-amd64/dbus_1.0.2-1+etch1_amd64.deb stable/main/binary-amd64/libdbus-1-dev_1.0.2-1+etch1_amd64.deb stable/main/binary-amd64/libdbus-1-3_1.0.2-1+etch1_amd64.deb dbus (1.0.2-1+etch1) stable-security; urgency=high * Fix CVE-2008-0595 stable/main/binary-alpha/dbus-1-utils_1.0.2-1+etch1_alpha.deb stable/main/binary-alpha/dbus_1.0.2-1+etch1_alpha.deb stable/main/binary-alpha/libdbus-1-3_1.0.2-1+etch1_alpha.deb stable/main/binary-alpha/libdbus-1-dev_1.0.2-1+etch1_alpha.deb dbus (1.0.2-1+etch1) stable-security; urgency=high * Fix CVE-2008-0595 stable/main/binary-i386/dbus_1.0.2-1+etch1_i386.deb stable/main/source/dbus_1.0.2-1+etch1.dsc stable/main/binary-i386/dbus-1-utils_1.0.2-1+etch1_i386.deb stable/main/binary-all/dbus-1-doc_1.0.2-1+etch1_all.deb stable/main/binary-i386/libdbus-1-3_1.0.2-1+etch1_i386.deb stable/main/binary-i386/libdbus-1-dev_1.0.2-1+etch1_i386.deb stable/main/source/dbus_1.0.2-1+etch1.diff.gz dbus (1.0.2-1+etch1) stable-security; urgency=high * Fix CVE-2008-0595 stable/main/binary-sparc/cupsys-client_1.2.7-4etch3_sparc.deb stable/main/binary-sparc/libcupsimage2-dev_1.2.7-4etch3_sparc.deb stable/main/binary-sparc/libcupsimage2_1.2.7-4etch3_sparc.deb stable/main/binary-sparc/libcupsys2_1.2.7-4etch3_sparc.deb stable/main/binary-sparc/cupsys-bsd_1.2.7-4etch3_sparc.deb stable/main/binary-sparc/cupsys-dbg_1.2.7-4etch3_sparc.deb stable/main/binary-sparc/libcupsys2-dev_1.2.7-4etch3_sparc.deb stable/main/binary-sparc/cupsys_1.2.7-4etch3_sparc.deb cupsys (1.2.7-4etch3) stable-security; urgency=high * Add 72_CVE-2008-0047.dpatch: Fix buffer overflow in cgiCompileSearch() using crafted search expressions. Exploitable if printer sharing is enabled. (CVE-2008-0047, STR #2729, Closes: #472105) * Add 73_CVE-2008-0882.dpatch: Fix double-free in process_browse_data(), which could be exploited to a remote DoS by sending crafted data to the cups UDP port. Thanks to Nico Golde for the report and dpatchifying! (CVE-2008-0882, STR #2656, Closes: #467653) * 47_pid.dpatch: Specify PidFile in temporary directory in the self test's cupsd.conf. This affects the test suite (in the sense that it actually works now) and does not affect the built binaries at all. (Backported from trunk). stable/main/binary-s390/libcupsys2_1.2.7-4etch3_s390.deb stable/main/binary-s390/cupsys-bsd_1.2.7-4etch3_s390.deb stable/main/binary-s390/cupsys-dbg_1.2.7-4etch3_s390.deb stable/main/binary-s390/libcupsimage2_1.2.7-4etch3_s390.deb stable/main/binary-s390/libcupsimage2-dev_1.2.7-4etch3_s390.deb stable/main/binary-s390/cupsys-client_1.2.7-4etch3_s390.deb stable/main/binary-s390/libcupsys2-dev_1.2.7-4etch3_s390.deb stable/main/binary-s390/cupsys_1.2.7-4etch3_s390.deb cupsys (1.2.7-4etch3) stable-security; urgency=high * Add 72_CVE-2008-0047.dpatch: Fix buffer overflow in cgiCompileSearch() using crafted search expressions. Exploitable if printer sharing is enabled. (CVE-2008-0047, STR #2729, Closes: #472105) * Add 73_CVE-2008-0882.dpatch: Fix double-free in process_browse_data(), which could be exploited to a remote DoS by sending crafted data to the cups UDP port. Thanks to Nico Golde for the report and dpatchifying! (CVE-2008-0882, STR #2656, Closes: #467653) * 47_pid.dpatch: Specify PidFile in temporary directory in the self test's cupsd.conf. This affects the test suite (in the sense that it actually works now) and does not affect the built binaries at all. (Backported from trunk). stable/main/binary-powerpc/libcupsys2-dev_1.2.7-4etch3_powerpc.deb stable/main/binary-powerpc/libcupsys2_1.2.7-4etch3_powerpc.deb stable/main/binary-powerpc/libcupsimage2_1.2.7-4etch3_powerpc.deb stable/main/binary-powerpc/cupsys-bsd_1.2.7-4etch3_powerpc.deb stable/main/binary-powerpc/cupsys-client_1.2.7-4etch3_powerpc.deb stable/main/binary-powerpc/libcupsimage2-dev_1.2.7-4etch3_powerpc.deb stable/main/binary-powerpc/cupsys-dbg_1.2.7-4etch3_powerpc.deb stable/main/binary-powerpc/cupsys_1.2.7-4etch3_powerpc.deb cupsys (1.2.7-4etch3) stable-security; urgency=high * Add 72_CVE-2008-0047.dpatch: Fix buffer overflow in cgiCompileSearch() using crafted search expressions. Exploitable if printer sharing is enabled. (CVE-2008-0047, STR #2729, Closes: #472105) * Add 73_CVE-2008-0882.dpatch: Fix double-free in process_browse_data(), which could be exploited to a remote DoS by sending crafted data to the cups UDP port. Thanks to Nico Golde for the report and dpatchifying! (CVE-2008-0882, STR #2656, Closes: #467653) * 47_pid.dpatch: Specify PidFile in temporary directory in the self test's cupsd.conf. This affects the test suite (in the sense that it actually works now) and does not affect the built binaries at all. (Backported from trunk). stable/main/binary-mipsel/libcupsimage2_1.2.7-4etch3_mipsel.deb stable/main/binary-mipsel/libcupsys2_1.2.7-4etch3_mipsel.deb stable/main/binary-mipsel/cupsys_1.2.7-4etch3_mipsel.deb stable/main/binary-mipsel/cupsys-bsd_1.2.7-4etch3_mipsel.deb stable/main/binary-mipsel/cupsys-dbg_1.2.7-4etch3_mipsel.deb stable/main/binary-mipsel/libcupsimage2-dev_1.2.7-4etch3_mipsel.deb stable/main/binary-mipsel/cupsys-client_1.2.7-4etch3_mipsel.deb stable/main/binary-mipsel/libcupsys2-dev_1.2.7-4etch3_mipsel.deb cupsys (1.2.7-4etch3) stable-security; urgency=high * Add 72_CVE-2008-0047.dpatch: Fix buffer overflow in cgiCompileSearch() using crafted search expressions. Exploitable if printer sharing is enabled. (CVE-2008-0047, STR #2729, Closes: #472105) * Add 73_CVE-2008-0882.dpatch: Fix double-free in process_browse_data(), which could be exploited to a remote DoS by sending crafted data to the cups UDP port. Thanks to Nico Golde for the report and dpatchifying! (CVE-2008-0882, STR #2656, Closes: #467653) * 47_pid.dpatch: Specify PidFile in temporary directory in the self test's cupsd.conf. This affects the test suite (in the sense that it actually works now) and does not affect the built binaries at all. (Backported from trunk). stable/main/binary-mips/libcupsimage2_1.2.7-4etch3_mips.deb stable/main/binary-mips/cupsys-dbg_1.2.7-4etch3_mips.deb stable/main/binary-mips/cupsys_1.2.7-4etch3_mips.deb stable/main/binary-mips/libcupsimage2-dev_1.2.7-4etch3_mips.deb stable/main/binary-mips/libcupsys2_1.2.7-4etch3_mips.deb stable/main/binary-mips/libcupsys2-dev_1.2.7-4etch3_mips.deb stable/main/binary-mips/cupsys-client_1.2.7-4etch3_mips.deb stable/main/binary-mips/cupsys-bsd_1.2.7-4etch3_mips.deb cupsys (1.2.7-4etch3) stable-security; urgency=high * Add 72_CVE-2008-0047.dpatch: Fix buffer overflow in cgiCompileSearch() using crafted search expressions. Exploitable if printer sharing is enabled. (CVE-2008-0047, STR #2729, Closes: #472105) * Add 73_CVE-2008-0882.dpatch: Fix double-free in process_browse_data(), which could be exploited to a remote DoS by sending crafted data to the cups UDP port. Thanks to Nico Golde for the report and dpatchifying! (CVE-2008-0882, STR #2656, Closes: #467653) * 47_pid.dpatch: Specify PidFile in temporary directory in the self test's cupsd.conf. This affects the test suite (in the sense that it actually works now) and does not affect the built binaries at all. (Backported from trunk). stable/main/binary-ia64/cupsys_1.2.7-4etch3_ia64.deb stable/main/binary-ia64/libcupsys2_1.2.7-4etch3_ia64.deb stable/main/binary-ia64/cupsys-dbg_1.2.7-4etch3_ia64.deb stable/main/binary-ia64/libcupsimage2-dev_1.2.7-4etch3_ia64.deb stable/main/binary-ia64/libcupsimage2_1.2.7-4etch3_ia64.deb stable/main/binary-ia64/cupsys-client_1.2.7-4etch3_ia64.deb stable/main/binary-ia64/libcupsys2-dev_1.2.7-4etch3_ia64.deb stable/main/binary-ia64/cupsys-bsd_1.2.7-4etch3_ia64.deb cupsys (1.2.7-4etch3) stable-security; urgency=high * Add 72_CVE-2008-0047.dpatch: Fix buffer overflow in cgiCompileSearch() using crafted search expressions. Exploitable if printer sharing is enabled. (CVE-2008-0047, STR #2729, Closes: #472105) * Add 73_CVE-2008-0882.dpatch: Fix double-free in process_browse_data(), which could be exploited to a remote DoS by sending crafted data to the cups UDP port. Thanks to Nico Golde for the report and dpatchifying! (CVE-2008-0882, STR #2656, Closes: #467653) * 47_pid.dpatch: Specify PidFile in temporary directory in the self test's cupsd.conf. This affects the test suite (in the sense that it actually works now) and does not affect the built binaries at all. (Backported from trunk). stable/main/binary-hppa/libcupsimage2-dev_1.2.7-4etch3_hppa.deb stable/main/binary-hppa/cupsys-dbg_1.2.7-4etch3_hppa.deb stable/main/binary-hppa/libcupsys2-dev_1.2.7-4etch3_hppa.deb stable/main/binary-hppa/cupsys-client_1.2.7-4etch3_hppa.deb stable/main/binary-hppa/cupsys_1.2.7-4etch3_hppa.deb stable/main/binary-hppa/libcupsys2_1.2.7-4etch3_hppa.deb stable/main/binary-hppa/libcupsimage2_1.2.7-4etch3_hppa.deb stable/main/binary-hppa/cupsys-bsd_1.2.7-4etch3_hppa.deb cupsys (1.2.7-4etch3) stable-security; urgency=high * Add 72_CVE-2008-0047.dpatch: Fix buffer overflow in cgiCompileSearch() using crafted search expressions. Exploitable if printer sharing is enabled. (CVE-2008-0047, STR #2729, Closes: #472105) * Add 73_CVE-2008-0882.dpatch: Fix double-free in process_browse_data(), which could be exploited to a remote DoS by sending crafted data to the cups UDP port. Thanks to Nico Golde for the report and dpatchifying! (CVE-2008-0882, STR #2656, Closes: #467653) * 47_pid.dpatch: Specify PidFile in temporary directory in the self test's cupsd.conf. This affects the test suite (in the sense that it actually works now) and does not affect the built binaries at all. (Backported from trunk). stable/main/binary-arm/cupsys-bsd_1.2.7-4etch3_arm.deb stable/main/binary-arm/libcupsys2_1.2.7-4etch3_arm.deb stable/main/binary-arm/libcupsys2-dev_1.2.7-4etch3_arm.deb stable/main/binary-arm/libcupsimage2_1.2.7-4etch3_arm.deb stable/main/binary-arm/libcupsimage2-dev_1.2.7-4etch3_arm.deb stable/main/binary-arm/cupsys_1.2.7-4etch3_arm.deb stable/main/binary-arm/cupsys-client_1.2.7-4etch3_arm.deb stable/main/binary-arm/cupsys-dbg_1.2.7-4etch3_arm.deb cupsys (1.2.7-4etch3) stable-security; urgency=high * Add 72_CVE-2008-0047.dpatch: Fix buffer overflow in cgiCompileSearch() using crafted search expressions. Exploitable if printer sharing is enabled. (CVE-2008-0047, STR #2729, Closes: #472105) * Add 73_CVE-2008-0882.dpatch: Fix double-free in process_browse_data(), which could be exploited to a remote DoS by sending crafted data to the cups UDP port. Thanks to Nico Golde for the report and dpatchifying! (CVE-2008-0882, STR #2656, Closes: #467653) * 47_pid.dpatch: Specify PidFile in temporary directory in the self test's cupsd.conf. This affects the test suite (in the sense that it actually works now) and does not affect the built binaries at all. (Backported from trunk). stable/main/binary-amd64/cupsys-client_1.2.7-4etch3_amd64.deb stable/main/binary-amd64/libcupsimage2-dev_1.2.7-4etch3_amd64.deb stable/main/binary-amd64/cupsys_1.2.7-4etch3_amd64.deb stable/main/binary-amd64/libcupsimage2_1.2.7-4etch3_amd64.deb stable/main/binary-amd64/libcupsys2-dev_1.2.7-4etch3_amd64.deb stable/main/binary-amd64/libcupsys2_1.2.7-4etch3_amd64.deb stable/main/binary-amd64/cupsys-dbg_1.2.7-4etch3_amd64.deb stable/main/binary-amd64/cupsys-bsd_1.2.7-4etch3_amd64.deb cupsys (1.2.7-4etch3) stable-security; urgency=high * Add 72_CVE-2008-0047.dpatch: Fix buffer overflow in cgiCompileSearch() using crafted search expressions. Exploitable if printer sharing is enabled. (CVE-2008-0047, STR #2729, Closes: #472105) * Add 73_CVE-2008-0882.dpatch: Fix double-free in process_browse_data(), which could be exploited to a remote DoS by sending crafted data to the cups UDP port. Thanks to Nico Golde for the report and dpatchifying! (CVE-2008-0882, STR #2656, Closes: #467653) * 47_pid.dpatch: Specify PidFile in temporary directory in the self test's cupsd.conf. This affects the test suite (in the sense that it actually works now) and does not affect the built binaries at all. (Backported from trunk). stable/main/binary-alpha/cupsys-dbg_1.2.7-4etch3_alpha.deb stable/main/binary-alpha/cupsys-bsd_1.2.7-4etch3_alpha.deb stable/main/binary-alpha/libcupsimage2-dev_1.2.7-4etch3_alpha.deb stable/main/binary-alpha/cupsys-client_1.2.7-4etch3_alpha.deb stable/main/binary-alpha/libcupsimage2_1.2.7-4etch3_alpha.deb stable/main/binary-alpha/cupsys_1.2.7-4etch3_alpha.deb stable/main/binary-alpha/libcupsys2-dev_1.2.7-4etch3_alpha.deb stable/main/binary-alpha/libcupsys2_1.2.7-4etch3_alpha.deb cupsys (1.2.7-4etch3) stable-security; urgency=high * Add 72_CVE-2008-0047.dpatch: Fix buffer overflow in cgiCompileSearch() using crafted search expressions. Exploitable if printer sharing is enabled. (CVE-2008-0047, STR #2729, Closes: #472105) * Add 73_CVE-2008-0882.dpatch: Fix double-free in process_browse_data(), which could be exploited to a remote DoS by sending crafted data to the cups UDP port. Thanks to Nico Golde for the report and dpatchifying! (CVE-2008-0882, STR #2656, Closes: #467653) * 47_pid.dpatch: Specify PidFile in temporary directory in the self test's cupsd.conf. This affects the test suite (in the sense that it actually works now) and does not affect the built binaries at all. (Backported from trunk). stable/main/binary-i386/cupsys_1.2.7-4etch3_i386.deb stable/main/binary-i386/cupsys-bsd_1.2.7-4etch3_i386.deb stable/main/binary-i386/libcupsys2_1.2.7-4etch3_i386.deb stable/main/binary-i386/cupsys-client_1.2.7-4etch3_i386.deb stable/main/binary-i386/libcupsimage2_1.2.7-4etch3_i386.deb stable/main/binary-i386/cupsys-dbg_1.2.7-4etch3_i386.deb stable/main/binary-all/cupsys-common_1.2.7-4etch3_all.deb stable/main/source/cupsys_1.2.7-4etch3.dsc stable/main/binary-i386/libcupsimage2-dev_1.2.7-4etch3_i386.deb stable/main/binary-i386/libcupsys2-dev_1.2.7-4etch3_i386.deb stable/main/source/cupsys_1.2.7-4etch3.diff.gz stable/main/binary-all/libcupsys2-gnutls10_1.2.7-4etch3_all.deb cupsys (1.2.7-4etch3) stable-security; urgency=high * Add 72_CVE-2008-0047.dpatch: Fix buffer overflow in cgiCompileSearch() using crafted search expressions. Exploitable if printer sharing is enabled. (CVE-2008-0047, STR #2729, Closes: #472105) * Add 73_CVE-2008-0882.dpatch: Fix double-free in process_browse_data(), which could be exploited to a remote DoS by sending crafted data to the cups UDP port. Thanks to Nico Golde for the report and dpatchifying! (CVE-2008-0882, STR #2656, Closes: #467653) * 47_pid.dpatch: Specify PidFile in temporary directory in the self test's cupsd.conf. This affects the test suite (in the sense that it actually works now) and does not affect the built binaries at all. (Backported from trunk). stable/main/binary-sparc/cpio_2.6-18.1+etch1_sparc.deb cpio (2.6-18.1+etch1) stable-security; urgency=high * Non-maintainer upload by the security team. * Apply upstream patch for CVE-2007-4476, correcting an allocation weakness in safer_name_suffix() which could lead to a crash stable/main/binary-s390/cpio_2.6-18.1+etch1_s390.deb cpio (2.6-18.1+etch1) stable-security; urgency=high * Non-maintainer upload by the security team. * Apply upstream patch for CVE-2007-4476, correcting an allocation weakness in safer_name_suffix() which could lead to a crash stable/main/binary-powerpc/cpio_2.6-18.1+etch1_powerpc.deb cpio (2.6-18.1+etch1) stable-security; urgency=high * Non-maintainer upload by the security team. * Apply upstream patch for CVE-2007-4476, correcting an allocation weakness in safer_name_suffix() which could lead to a crash stable/main/binary-mipsel/cpio_2.6-18.1+etch1_mipsel.deb cpio (2.6-18.1+etch1) stable-security; urgency=high * Non-maintainer upload by the security team. * Apply upstream patch for CVE-2007-4476, correcting an allocation weakness in safer_name_suffix() which could lead to a crash stable/main/binary-mips/cpio_2.6-18.1+etch1_mips.deb cpio (2.6-18.1+etch1) stable-security; urgency=high * Non-maintainer upload by the security team. * Apply upstream patch for CVE-2007-4476, correcting an allocation weakness in safer_name_suffix() which could lead to a crash stable/main/binary-ia64/cpio_2.6-18.1+etch1_ia64.deb cpio (2.6-18.1+etch1) stable-security; urgency=high * Non-maintainer upload by the security team. * Apply upstream patch for CVE-2007-4476, correcting an allocation weakness in safer_name_suffix() which could lead to a crash stable/main/binary-i386/cpio_2.6-18.1+etch1_i386.deb cpio (2.6-18.1+etch1) stable-security; urgency=high * Non-maintainer upload by the security team. * Apply upstream patch for CVE-2007-4476, correcting an allocation weakness in safer_name_suffix() which could lead to a crash stable/main/binary-hppa/cpio_2.6-18.1+etch1_hppa.deb cpio (2.6-18.1+etch1) stable-security; urgency=high * Non-maintainer upload by the security team. * Apply upstream patch for CVE-2007-4476, correcting an allocation weakness in safer_name_suffix() which could lead to a crash stable/main/binary-arm/cpio_2.6-18.1+etch1_arm.deb cpio (2.6-18.1+etch1) stable-security; urgency=high * Non-maintainer upload by the security team. * Apply upstream patch for CVE-2007-4476, correcting an allocation weakness in safer_name_suffix() which could lead to a crash stable/main/binary-alpha/cpio_2.6-18.1+etch1_alpha.deb cpio (2.6-18.1+etch1) stable-security; urgency=high * Non-maintainer upload by the security team. * Apply upstream patch for CVE-2007-4476, correcting an allocation weakness in safer_name_suffix() which could lead to a crash stable/main/binary-amd64/cpio_2.6-18.1+etch1_amd64.deb stable/main/source/cpio_2.6-18.1+etch1.dsc stable/main/source/cpio_2.6-18.1+etch1.diff.gz cpio (2.6-18.1+etch1) stable-security; urgency=high * Non-maintainer upload by the security team. * Apply upstream patch for CVE-2007-4476, correcting an allocation weakness in safer_name_suffix() which could lead to a crash stable/main/binary-sparc/clamav_0.90.1dfsg-3etch11_sparc.deb stable/main/binary-sparc/clamav-dbg_0.90.1dfsg-3etch11_sparc.deb stable/main/binary-sparc/clamav-freshclam_0.90.1dfsg-3etch11_sparc.deb stable/main/binary-sparc/libclamav-dev_0.90.1dfsg-3etch11_sparc.deb stable/main/binary-sparc/clamav-milter_0.90.1dfsg-3etch11_sparc.deb stable/main/binary-sparc/libclamav2_0.90.1dfsg-3etch11_sparc.deb stable/main/binary-sparc/clamav-daemon_0.90.1dfsg-3etch11_sparc.deb clamav (0.90.1dfsg-3etch11) stable-security; urgency=high * libclamav/pe.c: possible integer overflow in wwpack * [CVE-2008-1100]: libclamav/pe.c: possible integer overflow in upack * [CVE-2008-1387]: libclamav/spin.c: possible integer overflow stable/main/binary-s390/libclamav-dev_0.90.1dfsg-3etch11_s390.deb stable/main/binary-s390/clamav-freshclam_0.90.1dfsg-3etch11_s390.deb stable/main/binary-s390/clamav-milter_0.90.1dfsg-3etch11_s390.deb stable/main/binary-s390/clamav-daemon_0.90.1dfsg-3etch11_s390.deb stable/main/binary-s390/clamav_0.90.1dfsg-3etch11_s390.deb stable/main/binary-s390/clamav-dbg_0.90.1dfsg-3etch11_s390.deb stable/main/binary-s390/libclamav2_0.90.1dfsg-3etch11_s390.deb clamav (0.90.1dfsg-3etch11) stable-security; urgency=high * libclamav/pe.c: possible integer overflow in wwpack * [CVE-2008-1100]: libclamav/pe.c: possible integer overflow in upack * [CVE-2008-1387]: libclamav/spin.c: possible integer overflow stable/main/binary-powerpc/clamav-daemon_0.90.1dfsg-3etch11_powerpc.deb stable/main/binary-powerpc/libclamav2_0.90.1dfsg-3etch11_powerpc.deb stable/main/binary-powerpc/clamav-freshclam_0.90.1dfsg-3etch11_powerpc.deb stable/main/binary-powerpc/clamav-dbg_0.90.1dfsg-3etch11_powerpc.deb stable/main/binary-powerpc/libclamav-dev_0.90.1dfsg-3etch11_powerpc.deb stable/main/binary-powerpc/clamav_0.90.1dfsg-3etch11_powerpc.deb stable/main/binary-powerpc/clamav-milter_0.90.1dfsg-3etch11_powerpc.deb clamav (0.90.1dfsg-3etch11) stable-security; urgency=high * libclamav/pe.c: possible integer overflow in wwpack * [CVE-2008-1100]: libclamav/pe.c: possible integer overflow in upack * [CVE-2008-1387]: libclamav/spin.c: possible integer overflow stable/main/binary-mipsel/clamav-daemon_0.90.1dfsg-3etch11_mipsel.deb stable/main/binary-mipsel/clamav-milter_0.90.1dfsg-3etch11_mipsel.deb stable/main/binary-mipsel/clamav_0.90.1dfsg-3etch11_mipsel.deb stable/main/binary-mipsel/clamav-dbg_0.90.1dfsg-3etch11_mipsel.deb stable/main/binary-mipsel/libclamav-dev_0.90.1dfsg-3etch11_mipsel.deb stable/main/binary-mipsel/clamav-freshclam_0.90.1dfsg-3etch11_mipsel.deb stable/main/binary-mipsel/libclamav2_0.90.1dfsg-3etch11_mipsel.deb clamav (0.90.1dfsg-3etch11) stable-security; urgency=high * libclamav/pe.c: possible integer overflow in wwpack * [CVE-2008-1100]: libclamav/pe.c: possible integer overflow in upack * [CVE-2008-1387]: libclamav/spin.c: possible integer overflow stable/main/binary-mips/clamav-freshclam_0.90.1dfsg-3etch11_mips.deb stable/main/binary-mips/libclamav-dev_0.90.1dfsg-3etch11_mips.deb stable/main/binary-mips/libclamav2_0.90.1dfsg-3etch11_mips.deb stable/main/binary-mips/clamav-dbg_0.90.1dfsg-3etch11_mips.deb stable/main/binary-mips/clamav-milter_0.90.1dfsg-3etch11_mips.deb stable/main/binary-mips/clamav-daemon_0.90.1dfsg-3etch11_mips.deb stable/main/binary-mips/clamav_0.90.1dfsg-3etch11_mips.deb clamav (0.90.1dfsg-3etch11) stable-security; urgency=high * libclamav/pe.c: possible integer overflow in wwpack * [CVE-2008-1100]: libclamav/pe.c: possible integer overflow in upack * [CVE-2008-1387]: libclamav/spin.c: possible integer overflow stable/main/binary-ia64/clamav-freshclam_0.90.1dfsg-3etch11_ia64.deb stable/main/binary-ia64/clamav-daemon_0.90.1dfsg-3etch11_ia64.deb stable/main/binary-ia64/clamav-milter_0.90.1dfsg-3etch11_ia64.deb stable/main/binary-ia64/libclamav-dev_0.90.1dfsg-3etch11_ia64.deb stable/main/binary-ia64/clamav-dbg_0.90.1dfsg-3etch11_ia64.deb stable/main/binary-ia64/libclamav2_0.90.1dfsg-3etch11_ia64.deb stable/main/binary-ia64/clamav_0.90.1dfsg-3etch11_ia64.deb clamav (0.90.1dfsg-3etch11) stable-security; urgency=high * libclamav/pe.c: possible integer overflow in wwpack * [CVE-2008-1100]: libclamav/pe.c: possible integer overflow in upack * [CVE-2008-1387]: libclamav/spin.c: possible integer overflow stable/main/binary-hppa/clamav-dbg_0.90.1dfsg-3etch11_hppa.deb stable/main/binary-hppa/clamav-milter_0.90.1dfsg-3etch11_hppa.deb stable/main/binary-hppa/clamav-daemon_0.90.1dfsg-3etch11_hppa.deb stable/main/binary-hppa/clamav_0.90.1dfsg-3etch11_hppa.deb stable/main/binary-hppa/clamav-freshclam_0.90.1dfsg-3etch11_hppa.deb stable/main/binary-hppa/libclamav-dev_0.90.1dfsg-3etch11_hppa.deb stable/main/binary-hppa/libclamav2_0.90.1dfsg-3etch11_hppa.deb clamav (0.90.1dfsg-3etch11) stable-security; urgency=high * libclamav/pe.c: possible integer overflow in wwpack * [CVE-2008-1100]: libclamav/pe.c: possible integer overflow in upack * [CVE-2008-1387]: libclamav/spin.c: possible integer overflow stable/main/binary-arm/clamav-freshclam_0.90.1dfsg-3etch11_arm.deb stable/main/binary-arm/clamav_0.90.1dfsg-3etch11_arm.deb stable/main/binary-arm/libclamav2_0.90.1dfsg-3etch11_arm.deb stable/main/binary-arm/clamav-dbg_0.90.1dfsg-3etch11_arm.deb stable/main/binary-arm/clamav-milter_0.90.1dfsg-3etch11_arm.deb stable/main/binary-arm/libclamav-dev_0.90.1dfsg-3etch11_arm.deb stable/main/binary-arm/clamav-daemon_0.90.1dfsg-3etch11_arm.deb clamav (0.90.1dfsg-3etch11) stable-security; urgency=high * libclamav/pe.c: possible integer overflow in wwpack * [CVE-2008-1100]: libclamav/pe.c: possible integer overflow in upack * [CVE-2008-1387]: libclamav/spin.c: possible integer overflow stable/main/binary-amd64/clamav-dbg_0.90.1dfsg-3etch11_amd64.deb stable/main/binary-amd64/libclamav2_0.90.1dfsg-3etch11_amd64.deb stable/main/binary-amd64/libclamav-dev_0.90.1dfsg-3etch11_amd64.deb stable/main/binary-amd64/clamav_0.90.1dfsg-3etch11_amd64.deb stable/main/binary-amd64/clamav-freshclam_0.90.1dfsg-3etch11_amd64.deb stable/main/binary-amd64/clamav-milter_0.90.1dfsg-3etch11_amd64.deb stable/main/binary-amd64/clamav-daemon_0.90.1dfsg-3etch11_amd64.deb clamav (0.90.1dfsg-3etch11) stable-security; urgency=high * libclamav/pe.c: possible integer overflow in wwpack * [CVE-2008-1100]: libclamav/pe.c: possible integer overflow in upack * [CVE-2008-1387]: libclamav/spin.c: possible integer overflow stable/main/binary-alpha/libclamav-dev_0.90.1dfsg-3etch11_alpha.deb stable/main/binary-alpha/libclamav2_0.90.1dfsg-3etch11_alpha.deb stable/main/binary-alpha/clamav_0.90.1dfsg-3etch11_alpha.deb stable/main/binary-alpha/clamav-freshclam_0.90.1dfsg-3etch11_alpha.deb stable/main/binary-alpha/clamav-daemon_0.90.1dfsg-3etch11_alpha.deb stable/main/binary-alpha/clamav-dbg_0.90.1dfsg-3etch11_alpha.deb stable/main/binary-alpha/clamav-milter_0.90.1dfsg-3etch11_alpha.deb clamav (0.90.1dfsg-3etch11) stable-security; urgency=high * libclamav/pe.c: possible integer overflow in wwpack * [CVE-2008-1100]: libclamav/pe.c: possible integer overflow in upack * [CVE-2008-1387]: libclamav/spin.c: possible integer overflow stable/main/binary-all/clamav-testfiles_0.90.1dfsg-3etch11_all.deb stable/main/binary-i386/libclamav-dev_0.90.1dfsg-3etch11_i386.deb stable/main/binary-i386/clamav-milter_0.90.1dfsg-3etch11_i386.deb stable/main/source/clamav_0.90.1dfsg-3etch11.diff.gz stable/main/binary-i386/clamav_0.90.1dfsg-3etch11_i386.deb stable/main/binary-i386/clamav-dbg_0.90.1dfsg-3etch11_i386.deb stable/main/binary-i386/libclamav2_0.90.1dfsg-3etch11_i386.deb stable/main/binary-all/clamav-docs_0.90.1dfsg-3etch11_all.deb stable/main/binary-i386/clamav-daemon_0.90.1dfsg-3etch11_i386.deb stable/main/binary-all/clamav-base_0.90.1dfsg-3etch11_all.deb stable/main/source/clamav_0.90.1dfsg-3etch11.dsc stable/main/binary-i386/clamav-freshclam_0.90.1dfsg-3etch11_i386.deb clamav (0.90.1dfsg-3etch11) stable-security; urgency=high * libclamav/pe.c: possible integer overflow in wwpack * [CVE-2008-1100]: libclamav/pe.c: possible integer overflow in upack * [CVE-2008-1387]: libclamav/spin.c: possible integer overflow stable/main/binary-sparc/chkrootkit_0.47-2_sparc.deb chkrootkit (0.47-2) stable; urgency=low * Remove Enye check which was killing random applications (closes: #421864) * Set myself as maintainer since the package has been orphaned stable/main/binary-s390/chkrootkit_0.47-2_s390.deb chkrootkit (0.47-2) stable; urgency=low * Remove Enye check which was killing random applications (closes: #421864) * Set myself as maintainer since the package has been orphaned stable/main/binary-powerpc/chkrootkit_0.47-2_powerpc.deb chkrootkit (0.47-2) stable; urgency=low * Remove Enye check which was killing random applications (closes: #421864) * Set myself as maintainer since the package has been orphaned stable/main/binary-mipsel/chkrootkit_0.47-2_mipsel.deb chkrootkit (0.47-2) stable; urgency=low * Remove Enye check which was killing random applications (closes: #421864) * Set myself as maintainer since the package has been orphaned stable/main/binary-mips/chkrootkit_0.47-2_mips.deb chkrootkit (0.47-2) stable; urgency=low * Remove Enye check which was killing random applications (closes: #421864) * Set myself as maintainer since the package has been orphaned stable/main/binary-ia64/chkrootkit_0.47-2_ia64.deb chkrootkit (0.47-2) stable; urgency=low * Remove Enye check which was killing random applications (closes: #421864) * Set myself as maintainer since the package has been orphaned stable/main/binary-i386/chkrootkit_0.47-2_i386.deb chkrootkit (0.47-2) stable; urgency=low * Remove Enye check which was killing random applications (closes: #421864) * Set myself as maintainer since the package has been orphaned stable/main/binary-hppa/chkrootkit_0.47-2_hppa.deb chkrootkit (0.47-2) stable; urgency=low * Remove Enye check which was killing random applications (closes: #421864) * Set myself as maintainer since the package has been orphaned stable/main/binary-arm/chkrootkit_0.47-2_arm.deb chkrootkit (0.47-2) stable; urgency=low * Remove Enye check which was killing random applications (closes: #421864) * Set myself as maintainer since the package has been orphaned stable/main/binary-alpha/chkrootkit_0.47-2_alpha.deb chkrootkit (0.47-2) stable; urgency=low * Remove Enye check which was killing random applications (closes: #421864) * Set myself as maintainer since the package has been orphaned stable/main/source/chkrootkit_0.47-2.dsc stable/main/binary-amd64/chkrootkit_0.47-2_amd64.deb stable/main/source/chkrootkit_0.47-2.diff.gz chkrootkit (0.47-2) stable; urgency=low * Remove Enye check which was killing random applications (closes: #421864) * Set myself as maintainer since the package has been orphaned stable/main/binary-sparc/cbrpager_0.9.14-3+etch1_sparc.deb cbrpager (0.9.14-3+etch1) stable-proposed-updates; urgency=high * Backported security fixes from upstream 0.9.18 for CVE-2008-2575. stable/main/binary-s390/cbrpager_0.9.14-3+etch1_s390.deb cbrpager (0.9.14-3+etch1) stable-proposed-updates; urgency=high * Backported security fixes from upstream 0.9.18 for CVE-2008-2575. stable/main/binary-powerpc/cbrpager_0.9.14-3+etch1_powerpc.deb cbrpager (0.9.14-3+etch1) stable-proposed-updates; urgency=high * Backported security fixes from upstream 0.9.18 for CVE-2008-2575. stable/main/binary-mipsel/cbrpager_0.9.14-3+etch1_mipsel.deb cbrpager (0.9.14-3+etch1) stable-proposed-updates; urgency=high * Backported security fixes from upstream 0.9.18 for CVE-2008-2575. stable/main/binary-mips/cbrpager_0.9.14-3+etch1_mips.deb cbrpager (0.9.14-3+etch1) stable-proposed-updates; urgency=high * Backported security fixes from upstream 0.9.18 for CVE-2008-2575. stable/main/binary-ia64/cbrpager_0.9.14-3+etch1_ia64.deb cbrpager (0.9.14-3+etch1) stable-proposed-updates; urgency=high * Backported security fixes from upstream 0.9.18 for CVE-2008-2575. stable/main/binary-hppa/cbrpager_0.9.14-3+etch1_hppa.deb cbrpager (0.9.14-3+etch1) stable-proposed-updates; urgency=high * Backported security fixes from upstream 0.9.18 for CVE-2008-2575. stable/main/binary-arm/cbrpager_0.9.14-3+etch1_arm.deb cbrpager (0.9.14-3+etch1) stable-proposed-updates; urgency=high * Backported security fixes from upstream 0.9.18 for CVE-2008-2575. stable/main/binary-amd64/cbrpager_0.9.14-3+etch1_amd64.deb cbrpager (0.9.14-3+etch1) stable-proposed-updates; urgency=high * Backported security fixes from upstream 0.9.18 for CVE-2008-2575. stable/main/binary-alpha/cbrpager_0.9.14-3+etch1_alpha.deb cbrpager (0.9.14-3+etch1) stable-proposed-updates; urgency=high * Backported security fixes from upstream 0.9.18 for CVE-2008-2575. stable/main/source/cbrpager_0.9.14-3+etch1.dsc stable/main/source/cbrpager_0.9.14-3+etch1.diff.gz stable/main/binary-i386/cbrpager_0.9.14-3+etch1_i386.deb cbrpager (0.9.14-3+etch1) stable-proposed-updates; urgency=high * Backported security fixes from upstream 0.9.18 for CVE-2008-2575. stable/main/source/cacti_0.8.6i-3.5.dsc stable/main/binary-all/cacti_0.8.6i-3.5_all.deb stable/main/source/cacti_0.8.6i-3.5.diff.gz cacti (0.8.6i-3.5) stable-security; urgency=low * Security update to fix regression in previous upload. - restore 08_svn_timespan_breakage_fix.dpatch, which was removed in previous upload (closes: #482533). stable/main/binary-sparc/blender_2.42a-7.1+etch1_sparc.deb blender (2.42a-7.1+etch1) stable-security; urgency=high * Non-maintainer upload by the security team * CVE-2008-1102: Apply upstream patch to correct overrun of two unused stack buffers in imb_loadhdr() stable/main/binary-s390/blender_2.42a-7.1+etch1_s390.deb blender (2.42a-7.1+etch1) stable-security; urgency=high * Non-maintainer upload by the security team * CVE-2008-1102: Apply upstream patch to correct overrun of two unused stack buffers in imb_loadhdr() stable/main/binary-powerpc/blender_2.42a-7.1+etch1_powerpc.deb blender (2.42a-7.1+etch1) stable-security; urgency=high * Non-maintainer upload by the security team * CVE-2008-1102: Apply upstream patch to correct overrun of two unused stack buffers in imb_loadhdr() stable/main/binary-mipsel/blender_2.42a-7.1+etch1_mipsel.deb blender (2.42a-7.1+etch1) stable-security; urgency=high * Non-maintainer upload by the security team * CVE-2008-1102: Apply upstream patch to correct overrun of two unused stack buffers in imb_loadhdr() stable/main/binary-mips/blender_2.42a-7.1+etch1_mips.deb blender (2.42a-7.1+etch1) stable-security; urgency=high * Non-maintainer upload by the security team * CVE-2008-1102: Apply upstream patch to correct overrun of two unused stack buffers in imb_loadhdr() stable/main/binary-ia64/blender_2.42a-7.1+etch1_ia64.deb blender (2.42a-7.1+etch1) stable-security; urgency=high * Non-maintainer upload by the security team * CVE-2008-1102: Apply upstream patch to correct overrun of two unused stack buffers in imb_loadhdr() stable/main/binary-i386/blender_2.42a-7.1+etch1_i386.deb blender (2.42a-7.1+etch1) stable-security; urgency=high * Non-maintainer upload by the security team * CVE-2008-1102: Apply upstream patch to correct overrun of two unused stack buffers in imb_loadhdr() stable/main/binary-hppa/blender_2.42a-7.1+etch1_hppa.deb blender (2.42a-7.1+etch1) stable-security; urgency=high * Non-maintainer upload by the security team * CVE-2008-1102: Apply upstream patch to correct overrun of two unused stack buffers in imb_loadhdr() stable/main/binary-arm/blender_2.42a-7.1+etch1_arm.deb blender (2.42a-7.1+etch1) stable-security; urgency=high * Non-maintainer upload by the security team * CVE-2008-1102: Apply upstream patch to correct overrun of two unused stack buffers in imb_loadhdr() stable/main/binary-alpha/blender_2.42a-7.1+etch1_alpha.deb blender (2.42a-7.1+etch1) stable-security; urgency=high * Non-maintainer upload by the security team * CVE-2008-1102: Apply upstream patch to correct overrun of two unused stack buffers in imb_loadhdr() stable/main/source/blender_2.42a-7.1+etch1.dsc stable/main/source/blender_2.42a-7.1+etch1.diff.gz stable/main/binary-amd64/blender_2.42a-7.1+etch1_amd64.deb blender (2.42a-7.1+etch1) stable-security; urgency=high * Non-maintainer upload by the security team * CVE-2008-1102: Apply upstream patch to correct overrun of two unused stack buffers in imb_loadhdr() stable/main/binary-sparc/bind9_9.3.4-2etch3_sparc.deb stable/main/binary-sparc/libbind9-0_9.3.4-2etch3_sparc.deb stable/main/binary-sparc/libisccc0_9.3.4-2etch3_sparc.deb stable/main/binary-sparc/libbind-dev_9.3.4-2etch3_sparc.deb stable/main/binary-sparc/lwresd_9.3.4-2etch3_sparc.deb stable/main/binary-sparc/libisc11_9.3.4-2etch3_sparc.deb stable/main/binary-sparc/libisccfg1_9.3.4-2etch3_sparc.deb stable/main/binary-sparc/libdns22_9.3.4-2etch3_sparc.deb stable/main/binary-sparc/dnsutils_9.3.4-2etch3_sparc.deb stable/main/binary-sparc/bind9-host_9.3.4-2etch3_sparc.deb stable/main/binary-sparc/liblwres9_9.3.4-2etch3_sparc.deb bind9 (1:9.3.4-2etch3) stable-security; urgency=high * Randomize UDP query source ports to improve forgery resilience. (CVE-2008-1447) stable/main/binary-s390/libbind-dev_9.3.4-2etch3_s390.deb stable/main/binary-s390/bind9_9.3.4-2etch3_s390.deb stable/main/binary-s390/liblwres9_9.3.4-2etch3_s390.deb stable/main/binary-s390/libisccfg1_9.3.4-2etch3_s390.deb stable/main/binary-s390/libisccc0_9.3.4-2etch3_s390.deb stable/main/binary-s390/libisc11_9.3.4-2etch3_s390.deb stable/main/binary-s390/dnsutils_9.3.4-2etch3_s390.deb stable/main/binary-s390/bind9-host_9.3.4-2etch3_s390.deb stable/main/binary-s390/libbind9-0_9.3.4-2etch3_s390.deb stable/main/binary-s390/libdns22_9.3.4-2etch3_s390.deb stable/main/binary-s390/lwresd_9.3.4-2etch3_s390.deb bind9 (1:9.3.4-2etch3) stable-security; urgency=high * Randomize UDP query source ports to improve forgery resilience. (CVE-2008-1447) stable/main/binary-powerpc/libisc11_9.3.4-2etch3_powerpc.deb stable/main/binary-powerpc/liblwres9_9.3.4-2etch3_powerpc.deb stable/main/binary-powerpc/bind9-host_9.3.4-2etch3_powerpc.deb stable/main/binary-powerpc/libdns22_9.3.4-2etch3_powerpc.deb stable/main/binary-powerpc/libbind-dev_9.3.4-2etch3_powerpc.deb stable/main/binary-powerpc/libisccc0_9.3.4-2etch3_powerpc.deb stable/main/binary-powerpc/libbind9-0_9.3.4-2etch3_powerpc.deb stable/main/binary-powerpc/bind9_9.3.4-2etch3_powerpc.deb stable/main/binary-powerpc/libisccfg1_9.3.4-2etch3_powerpc.deb stable/main/binary-powerpc/dnsutils_9.3.4-2etch3_powerpc.deb stable/main/binary-powerpc/lwresd_9.3.4-2etch3_powerpc.deb bind9 (1:9.3.4-2etch3) stable-security; urgency=high * Randomize UDP query source ports to improve forgery resilience. (CVE-2008-1447) stable/main/binary-mipsel/bind9_9.3.4-2etch3_mipsel.deb stable/main/binary-mipsel/libdns22_9.3.4-2etch3_mipsel.deb stable/main/binary-mipsel/libbind-dev_9.3.4-2etch3_mipsel.deb stable/main/binary-mipsel/bind9-host_9.3.4-2etch3_mipsel.deb stable/main/binary-mipsel/liblwres9_9.3.4-2etch3_mipsel.deb stable/main/binary-mipsel/libisc11_9.3.4-2etch3_mipsel.deb stable/main/binary-mipsel/dnsutils_9.3.4-2etch3_mipsel.deb stable/main/binary-mipsel/lwresd_9.3.4-2etch3_mipsel.deb stable/main/binary-mipsel/libisccc0_9.3.4-2etch3_mipsel.deb stable/main/binary-mipsel/libisccfg1_9.3.4-2etch3_mipsel.deb stable/main/binary-mipsel/libbind9-0_9.3.4-2etch3_mipsel.deb bind9 (1:9.3.4-2etch3) stable-security; urgency=high * Randomize UDP query source ports to improve forgery resilience. (CVE-2008-1447) stable/main/binary-mips/libisc11_9.3.4-2etch3_mips.deb stable/main/binary-mips/bind9_9.3.4-2etch3_mips.deb stable/main/binary-mips/liblwres9_9.3.4-2etch3_mips.deb stable/main/binary-mips/dnsutils_9.3.4-2etch3_mips.deb stable/main/binary-mips/libbind-dev_9.3.4-2etch3_mips.deb stable/main/binary-mips/lwresd_9.3.4-2etch3_mips.deb stable/main/binary-mips/libisccc0_9.3.4-2etch3_mips.deb stable/main/binary-mips/libbind9-0_9.3.4-2etch3_mips.deb stable/main/binary-mips/libdns22_9.3.4-2etch3_mips.deb stable/main/binary-mips/bind9-host_9.3.4-2etch3_mips.deb stable/main/binary-mips/libisccfg1_9.3.4-2etch3_mips.deb bind9 (1:9.3.4-2etch3) stable-security; urgency=high * Randomize UDP query source ports to improve forgery resilience. (CVE-2008-1447) stable/main/binary-ia64/libisc11_9.3.4-2etch3_ia64.deb stable/main/binary-ia64/libbind9-0_9.3.4-2etch3_ia64.deb stable/main/binary-ia64/bind9_9.3.4-2etch3_ia64.deb stable/main/binary-ia64/libdns22_9.3.4-2etch3_ia64.deb stable/main/binary-ia64/liblwres9_9.3.4-2etch3_ia64.deb stable/main/binary-ia64/dnsutils_9.3.4-2etch3_ia64.deb stable/main/binary-ia64/bind9-host_9.3.4-2etch3_ia64.deb stable/main/binary-ia64/libbind-dev_9.3.4-2etch3_ia64.deb stable/main/binary-ia64/libisccfg1_9.3.4-2etch3_ia64.deb stable/main/binary-ia64/libisccc0_9.3.4-2etch3_ia64.deb stable/main/binary-ia64/lwresd_9.3.4-2etch3_ia64.deb bind9 (1:9.3.4-2etch3) stable-security; urgency=high * Randomize UDP query source ports to improve forgery resilience. (CVE-2008-1447) stable/main/binary-hppa/libisccc0_9.3.4-2etch3_hppa.deb stable/main/binary-hppa/libbind9-0_9.3.4-2etch3_hppa.deb stable/main/binary-hppa/libisc11_9.3.4-2etch3_hppa.deb stable/main/binary-hppa/bind9-host_9.3.4-2etch3_hppa.deb stable/main/binary-hppa/libdns22_9.3.4-2etch3_hppa.deb stable/main/binary-hppa/libbind-dev_9.3.4-2etch3_hppa.deb stable/main/binary-hppa/bind9_9.3.4-2etch3_hppa.deb stable/main/binary-hppa/dnsutils_9.3.4-2etch3_hppa.deb stable/main/binary-hppa/liblwres9_9.3.4-2etch3_hppa.deb stable/main/binary-hppa/lwresd_9.3.4-2etch3_hppa.deb stable/main/binary-hppa/libisccfg1_9.3.4-2etch3_hppa.deb bind9 (1:9.3.4-2etch3) stable-security; urgency=high * Randomize UDP query source ports to improve forgery resilience. (CVE-2008-1447) stable/main/binary-arm/libisccfg1_9.3.4-2etch3_arm.deb stable/main/binary-arm/liblwres9_9.3.4-2etch3_arm.deb stable/main/binary-arm/bind9-host_9.3.4-2etch3_arm.deb stable/main/binary-arm/libdns22_9.3.4-2etch3_arm.deb stable/main/binary-arm/dnsutils_9.3.4-2etch3_arm.deb stable/main/binary-arm/libisccc0_9.3.4-2etch3_arm.deb stable/main/binary-arm/libisc11_9.3.4-2etch3_arm.deb stable/main/binary-arm/lwresd_9.3.4-2etch3_arm.deb stable/main/binary-arm/libbind9-0_9.3.4-2etch3_arm.deb stable/main/binary-arm/libbind-dev_9.3.4-2etch3_arm.deb stable/main/binary-arm/bind9_9.3.4-2etch3_arm.deb bind9 (1:9.3.4-2etch3) stable-security; urgency=high * Randomize UDP query source ports to improve forgery resilience. (CVE-2008-1447) stable/main/binary-amd64/lwresd_9.3.4-2etch3_amd64.deb stable/main/binary-amd64/libbind-dev_9.3.4-2etch3_amd64.deb stable/main/binary-amd64/dnsutils_9.3.4-2etch3_amd64.deb stable/main/binary-amd64/bind9_9.3.4-2etch3_amd64.deb stable/main/binary-amd64/libdns22_9.3.4-2etch3_amd64.deb stable/main/binary-amd64/libbind9-0_9.3.4-2etch3_amd64.deb stable/main/binary-amd64/bind9-host_9.3.4-2etch3_amd64.deb stable/main/binary-amd64/libisc11_9.3.4-2etch3_amd64.deb stable/main/binary-amd64/libisccfg1_9.3.4-2etch3_amd64.deb stable/main/binary-amd64/liblwres9_9.3.4-2etch3_amd64.deb stable/main/binary-amd64/libisccc0_9.3.4-2etch3_amd64.deb bind9 (1:9.3.4-2etch3) stable-security; urgency=high * Randomize UDP query source ports to improve forgery resilience. (CVE-2008-1447) stable/main/binary-alpha/libisccc0_9.3.4-2etch3_alpha.deb stable/main/binary-alpha/libbind-dev_9.3.4-2etch3_alpha.deb stable/main/binary-alpha/lwresd_9.3.4-2etch3_alpha.deb stable/main/binary-alpha/bind9-host_9.3.4-2etch3_alpha.deb stable/main/binary-alpha/bind9_9.3.4-2etch3_alpha.deb stable/main/binary-alpha/libisc11_9.3.4-2etch3_alpha.deb stable/main/binary-alpha/libbind9-0_9.3.4-2etch3_alpha.deb stable/main/binary-alpha/libdns22_9.3.4-2etch3_alpha.deb stable/main/binary-alpha/dnsutils_9.3.4-2etch3_alpha.deb stable/main/binary-alpha/liblwres9_9.3.4-2etch3_alpha.deb stable/main/binary-alpha/libisccfg1_9.3.4-2etch3_alpha.deb bind9 (1:9.3.4-2etch3) stable-security; urgency=high * Randomize UDP query source ports to improve forgery resilience. (CVE-2008-1447) stable/main/binary-i386/libisccfg1_9.3.4-2etch3_i386.deb stable/main/binary-i386/dnsutils_9.3.4-2etch3_i386.deb stable/main/binary-i386/libisccc0_9.3.4-2etch3_i386.deb stable/main/binary-i386/lwresd_9.3.4-2etch3_i386.deb stable/main/binary-i386/bind9-host_9.3.4-2etch3_i386.deb stable/main/source/bind9_9.3.4-2etch3.diff.gz stable/main/binary-i386/libbind9-0_9.3.4-2etch3_i386.deb stable/main/binary-i386/libdns22_9.3.4-2etch3_i386.deb stable/main/binary-i386/libisc11_9.3.4-2etch3_i386.deb stable/main/binary-i386/bind9_9.3.4-2etch3_i386.deb stable/main/source/bind9_9.3.4-2etch3.dsc stable/main/binary-i386/libbind-dev_9.3.4-2etch3_i386.deb stable/main/binary-i386/liblwres9_9.3.4-2etch3_i386.deb stable/main/binary-all/bind9-doc_9.3.4-2etch3_all.deb bind9 (1:9.3.4-2etch3) stable-security; urgency=high * Randomize UDP query source ports to improve forgery resilience. (CVE-2008-1447) stable/main/binary-sparc/base-installer_1.76etch1_sparc.udeb base-installer (1.76etch1) stable; urgency=low * powerpc: correctly recognize systems with 'RS64-IV (sstar)' cpu as powerpc64 (closes: #469030). stable/main/binary-s390/base-installer_1.76etch1_s390.udeb base-installer (1.76etch1) stable; urgency=low * powerpc: correctly recognize systems with 'RS64-IV (sstar)' cpu as powerpc64 (closes: #469030). stable/main/binary-powerpc/base-installer_1.76etch1_powerpc.udeb base-installer (1.76etch1) stable; urgency=low * powerpc: correctly recognize systems with 'RS64-IV (sstar)' cpu as powerpc64 (closes: #469030). stable/main/binary-mipsel/base-installer_1.76etch1_mipsel.udeb base-installer (1.76etch1) stable; urgency=low * powerpc: correctly recognize systems with 'RS64-IV (sstar)' cpu as powerpc64 (closes: #469030). stable/main/binary-mips/base-installer_1.76etch1_mips.udeb base-installer (1.76etch1) stable; urgency=low * powerpc: correctly recognize systems with 'RS64-IV (sstar)' cpu as powerpc64 (closes: #469030). stable/main/binary-ia64/base-installer_1.76etch1_ia64.udeb base-installer (1.76etch1) stable; urgency=low * powerpc: correctly recognize systems with 'RS64-IV (sstar)' cpu as powerpc64 (closes: #469030). stable/main/binary-i386/base-installer_1.76etch1_i386.udeb base-installer (1.76etch1) stable; urgency=low * powerpc: correctly recognize systems with 'RS64-IV (sstar)' cpu as powerpc64 (closes: #469030). stable/main/binary-hppa/base-installer_1.76etch1_hppa.udeb base-installer (1.76etch1) stable; urgency=low * powerpc: correctly recognize systems with 'RS64-IV (sstar)' cpu as powerpc64 (closes: #469030). stable/main/binary-arm/base-installer_1.76etch1_arm.udeb base-installer (1.76etch1) stable; urgency=low * powerpc: correctly recognize systems with 'RS64-IV (sstar)' cpu as powerpc64 (closes: #469030). stable/main/binary-alpha/base-installer_1.76etch1_alpha.udeb base-installer (1.76etch1) stable; urgency=low * powerpc: correctly recognize systems with 'RS64-IV (sstar)' cpu as powerpc64 (closes: #469030). stable/main/source/base-installer_1.76etch1.dsc stable/main/binary-amd64/base-installer_1.76etch1_amd64.udeb stable/main/source/base-installer_1.76etch1.tar.gz base-installer (1.76etch1) stable; urgency=low * powerpc: correctly recognize systems with 'RS64-IV (sstar)' cpu as powerpc64 (closes: #469030). stable/main/binary-sparc/balsa_2.3.13-3_sparc.deb balsa (2.3.13-3) stable; urgency=low * 01_CVE-2007-5007.patch: fix for stack-based buffer overflow in the ir_fetch_seq function, which might allow remote IMAP servers to execute arbitrary code via a long response to a FETCH command. Thanks Evil Ninja Squirrel for discovering the issue and providing a patch, and Nico Golde for signaling it. stable/main/binary-s390/balsa_2.3.13-3_s390.deb balsa (2.3.13-3) stable; urgency=low * 01_CVE-2007-5007.patch: fix for stack-based buffer overflow in the ir_fetch_seq function, which might allow remote IMAP servers to execute arbitrary code via a long response to a FETCH command. Thanks Evil Ninja Squirrel for discovering the issue and providing a patch, and Nico Golde for signaling it. stable/main/binary-powerpc/balsa_2.3.13-3_powerpc.deb balsa (2.3.13-3) stable; urgency=low * 01_CVE-2007-5007.patch: fix for stack-based buffer overflow in the ir_fetch_seq function, which might allow remote IMAP servers to execute arbitrary code via a long response to a FETCH command. Thanks Evil Ninja Squirrel for discovering the issue and providing a patch, and Nico Golde for signaling it. stable/main/binary-mipsel/balsa_2.3.13-3_mipsel.deb balsa (2.3.13-3) stable; urgency=low * 01_CVE-2007-5007.patch: fix for stack-based buffer overflow in the ir_fetch_seq function, which might allow remote IMAP servers to execute arbitrary code via a long response to a FETCH command. Thanks Evil Ninja Squirrel for discovering the issue and providing a patch, and Nico Golde for signaling it. stable/main/binary-mips/balsa_2.3.13-3_mips.deb balsa (2.3.13-3) stable; urgency=low * 01_CVE-2007-5007.patch: fix for stack-based buffer overflow in the ir_fetch_seq function, which might allow remote IMAP servers to execute arbitrary code via a long response to a FETCH command. Thanks Evil Ninja Squirrel for discovering the issue and providing a patch, and Nico Golde for signaling it. stable/main/binary-ia64/balsa_2.3.13-3_ia64.deb balsa (2.3.13-3) stable; urgency=low * 01_CVE-2007-5007.patch: fix for stack-based buffer overflow in the ir_fetch_seq function, which might allow remote IMAP servers to execute arbitrary code via a long response to a FETCH command. Thanks Evil Ninja Squirrel for discovering the issue and providing a patch, and Nico Golde for signaling it. stable/main/binary-i386/balsa_2.3.13-3_i386.deb balsa (2.3.13-3) stable; urgency=low * 01_CVE-2007-5007.patch: fix for stack-based buffer overflow in the ir_fetch_seq function, which might allow remote IMAP servers to execute arbitrary code via a long response to a FETCH command. Thanks Evil Ninja Squirrel for discovering the issue and providing a patch, and Nico Golde for signaling it. stable/main/binary-hppa/balsa_2.3.13-3_hppa.deb balsa (2.3.13-3) stable; urgency=low * 01_CVE-2007-5007.patch: fix for stack-based buffer overflow in the ir_fetch_seq function, which might allow remote IMAP servers to execute arbitrary code via a long response to a FETCH command. Thanks Evil Ninja Squirrel for discovering the issue and providing a patch, and Nico Golde for signaling it. stable/main/binary-arm/balsa_2.3.13-3_arm.deb balsa (2.3.13-3) stable; urgency=low * 01_CVE-2007-5007.patch: fix for stack-based buffer overflow in the ir_fetch_seq function, which might allow remote IMAP servers to execute arbitrary code via a long response to a FETCH command. Thanks Evil Ninja Squirrel for discovering the issue and providing a patch, and Nico Golde for signaling it. stable/main/binary-alpha/balsa_2.3.13-3_alpha.deb balsa (2.3.13-3) stable; urgency=low * 01_CVE-2007-5007.patch: fix for stack-based buffer overflow in the ir_fetch_seq function, which might allow remote IMAP servers to execute arbitrary code via a long response to a FETCH command. Thanks Evil Ninja Squirrel for discovering the issue and providing a patch, and Nico Golde for signaling it. stable/main/source/balsa_2.3.13-3.diff.gz stable/main/source/balsa_2.3.13-3.dsc stable/main/binary-amd64/balsa_2.3.13-3_amd64.deb balsa (2.3.13-3) stable; urgency=low * 01_CVE-2007-5007.patch: fix for stack-based buffer overflow in the ir_fetch_seq function, which might allow remote IMAP servers to execute arbitrary code via a long response to a FETCH command. Thanks Evil Ninja Squirrel for discovering the issue and providing a patch, and Nico Golde for signaling it. stable/contrib/binary-sparc/b43-fwcutter_011-1~etchnhalf.2_sparc.deb b43-fwcutter (1:011-1~etchnhalf.2) stable; urgency=low * add fixed es.po (closes: #479281) stable/contrib/binary-s390/b43-fwcutter_011-1~etchnhalf.2_s390.deb b43-fwcutter (1:011-1~etchnhalf.2) stable; urgency=low * add fixed es.po (closes: #479281) stable/contrib/binary-powerpc/b43-fwcutter_011-1~etchnhalf.2_powerpc.deb b43-fwcutter (1:011-1~etchnhalf.2) stable; urgency=low * add fixed es.po (closes: #479281) stable/contrib/binary-mipsel/b43-fwcutter_011-1~etchnhalf.2_mipsel.deb b43-fwcutter (1:011-1~etchnhalf.2) stable; urgency=low * add fixed es.po (closes: #479281) stable/contrib/binary-mips/b43-fwcutter_011-1~etchnhalf.2_mips.deb b43-fwcutter (1:011-1~etchnhalf.2) stable; urgency=low * add fixed es.po (closes: #479281) stable/contrib/binary-ia64/b43-fwcutter_011-1~etchnhalf.2_ia64.deb b43-fwcutter (1:011-1~etchnhalf.2) stable; urgency=low * add fixed es.po (closes: #479281) stable/contrib/binary-i386/b43-fwcutter_011-1~etchnhalf.2_i386.deb b43-fwcutter (1:011-1~etchnhalf.2) stable; urgency=low * add fixed es.po (closes: #479281) stable/contrib/binary-hppa/b43-fwcutter_011-1~etchnhalf.2_hppa.deb b43-fwcutter (1:011-1~etchnhalf.2) stable; urgency=low * add fixed es.po (closes: #479281) stable/contrib/binary-arm/b43-fwcutter_011-1~etchnhalf.2_arm.deb b43-fwcutter (1:011-1~etchnhalf.2) stable; urgency=low * add fixed es.po (closes: #479281) stable/contrib/binary-alpha/b43-fwcutter_011-1~etchnhalf.2_alpha.deb b43-fwcutter (1:011-1~etchnhalf.2) stable; urgency=low * add fixed es.po (closes: #479281) stable/contrib/source/b43-fwcutter_011-1~etchnhalf.2.diff.gz stable/contrib/source/b43-fwcutter_011-1~etchnhalf.2.dsc stable/contrib/binary-amd64/b43-fwcutter_011-1~etchnhalf.2_amd64.deb b43-fwcutter (1:011-1~etchnhalf.2) stable; urgency=low * add fixed es.po (closes: #479281) stable/main/binary-all/b2evolution_0.9.2-3+etch1_all.deb stable/main/source/b2evolution_0.9.2-3+etch1.diff.gz stable/main/source/b2evolution_0.9.2-3+etch1.dsc b2evolution (0.9.2-3+etch1) stable-security; urgency=high * Non-maintainer upload by the security team. * Fix cross site scripting in htsrv/login.php. (CVE-2007-0175, closes: #410568) stable/main/binary-sparc/asterisk-classic_1.2.13~dfsg-2etch4_sparc.deb stable/main/binary-sparc/asterisk-bristuff_1.2.13~dfsg-2etch4_sparc.deb stable/main/binary-sparc/asterisk-h323_1.2.13~dfsg-2etch4_sparc.deb asterisk (1:1.2.13~dfsg-2etch4) stable-security; urgency=high * New upstream bugfix release: AST-2008-006 / CVE-2008-1897 (Closes: #477472). stable/main/binary-s390/asterisk-classic_1.2.13~dfsg-2etch4_s390.deb stable/main/binary-s390/asterisk-h323_1.2.13~dfsg-2etch4_s390.deb stable/main/binary-s390/asterisk-bristuff_1.2.13~dfsg-2etch4_s390.deb asterisk (1:1.2.13~dfsg-2etch4) stable-security; urgency=high * New upstream bugfix release: AST-2008-006 / CVE-2008-1897 (Closes: #477472). stable/main/binary-powerpc/asterisk-classic_1.2.13~dfsg-2etch4_powerpc.deb stable/main/binary-powerpc/asterisk-h323_1.2.13~dfsg-2etch4_powerpc.deb stable/main/binary-powerpc/asterisk-bristuff_1.2.13~dfsg-2etch4_powerpc.deb asterisk (1:1.2.13~dfsg-2etch4) stable-security; urgency=high * New upstream bugfix release: AST-2008-006 / CVE-2008-1897 (Closes: #477472). stable/main/binary-mipsel/asterisk-h323_1.2.13~dfsg-2etch4_mipsel.deb stable/main/binary-mipsel/asterisk-classic_1.2.13~dfsg-2etch4_mipsel.deb stable/main/binary-mipsel/asterisk-bristuff_1.2.13~dfsg-2etch4_mipsel.deb asterisk (1:1.2.13~dfsg-2etch4) stable-security; urgency=high * New upstream bugfix release: AST-2008-006 / CVE-2008-1897 (Closes: #477472). stable/main/binary-mips/asterisk-h323_1.2.13~dfsg-2etch4_mips.deb stable/main/binary-mips/asterisk-classic_1.2.13~dfsg-2etch4_mips.deb stable/main/binary-mips/asterisk-bristuff_1.2.13~dfsg-2etch4_mips.deb asterisk (1:1.2.13~dfsg-2etch4) stable-security; urgency=high * New upstream bugfix release: AST-2008-006 / CVE-2008-1897 (Closes: #477472). stable/main/binary-ia64/asterisk-classic_1.2.13~dfsg-2etch4_ia64.deb stable/main/binary-ia64/asterisk-h323_1.2.13~dfsg-2etch4_ia64.deb stable/main/binary-ia64/asterisk-bristuff_1.2.13~dfsg-2etch4_ia64.deb asterisk (1:1.2.13~dfsg-2etch4) stable-security; urgency=high * New upstream bugfix release: AST-2008-006 / CVE-2008-1897 (Closes: #477472). stable/main/binary-hppa/asterisk-classic_1.2.13~dfsg-2etch4_hppa.deb stable/main/binary-hppa/asterisk-bristuff_1.2.13~dfsg-2etch4_hppa.deb stable/main/binary-hppa/asterisk-h323_1.2.13~dfsg-2etch4_hppa.deb asterisk (1:1.2.13~dfsg-2etch4) stable-security; urgency=high * New upstream bugfix release: AST-2008-006 / CVE-2008-1897 (Closes: #477472). stable/main/binary-arm/asterisk-bristuff_1.2.13~dfsg-2etch4_arm.deb stable/main/binary-arm/asterisk-h323_1.2.13~dfsg-2etch4_arm.deb stable/main/binary-arm/asterisk-classic_1.2.13~dfsg-2etch4_arm.deb asterisk (1:1.2.13~dfsg-2etch4) stable-security; urgency=high * New upstream bugfix release: AST-2008-006 / CVE-2008-1897 (Closes: #477472). stable/main/binary-amd64/asterisk-h323_1.2.13~dfsg-2etch4_amd64.deb stable/main/binary-amd64/asterisk-bristuff_1.2.13~dfsg-2etch4_amd64.deb stable/main/binary-amd64/asterisk-classic_1.2.13~dfsg-2etch4_amd64.deb asterisk (1:1.2.13~dfsg-2etch4) stable-security; urgency=high * New upstream bugfix release: AST-2008-006 / CVE-2008-1897 (Closes: #477472). stable/main/binary-alpha/asterisk-classic_1.2.13~dfsg-2etch4_alpha.deb stable/main/binary-alpha/asterisk-h323_1.2.13~dfsg-2etch4_alpha.deb stable/main/binary-alpha/asterisk-bristuff_1.2.13~dfsg-2etch4_alpha.deb asterisk (1:1.2.13~dfsg-2etch4) stable-security; urgency=high * New upstream bugfix release: AST-2008-006 / CVE-2008-1897 (Closes: #477472). stable/main/source/asterisk_1.2.13~dfsg-2etch4.dsc stable/main/binary-all/asterisk-doc_1.2.13~dfsg-2etch4_all.deb stable/main/binary-all/asterisk-dev_1.2.13~dfsg-2etch4_all.deb stable/main/binary-all/asterisk-web-vmail_1.2.13~dfsg-2etch4_all.deb stable/main/binary-all/asterisk-config_1.2.13~dfsg-2etch4_all.deb stable/main/binary-all/asterisk-sounds-main_1.2.13~dfsg-2etch4_all.deb stable/main/binary-all/asterisk_1.2.13~dfsg-2etch4_all.deb stable/main/binary-i386/asterisk-h323_1.2.13~dfsg-2etch4_i386.deb stable/main/binary-i386/asterisk-bristuff_1.2.13~dfsg-2etch4_i386.deb stable/main/source/asterisk_1.2.13~dfsg-2etch4.diff.gz stable/main/binary-i386/asterisk-classic_1.2.13~dfsg-2etch4_i386.deb asterisk (1:1.2.13~dfsg-2etch4) stable-security; urgency=high * New upstream bugfix release: AST-2008-006 / CVE-2008-1897 (Closes: #477472). stable/main/binary-sparc/apache2-mpm-itk_2.2.3-01-2+b2_sparc.deb apache2-mpm-itk (2.2.3-01-2+b2) stable; urgency=low * Binary-only non-maintainer upload for sparc; no source changes. * rebuild against apache2 in proposed-updates stable/main/binary-s390/apache2-mpm-itk_2.2.3-01-2+b2_s390.deb apache2-mpm-itk (2.2.3-01-2+b2) stable; urgency=low * Binary-only non-maintainer upload for s390; no source changes. * rebuild against apache2 in proposed-updates stable/main/binary-powerpc/apache2-mpm-itk_2.2.3-01-2+b2_powerpc.deb apache2-mpm-itk (2.2.3-01-2+b2) stable; urgency=low * Binary-only non-maintainer upload for powerpc; no source changes. * rebuild against apache2 in proposed-updates stable/main/binary-mipsel/apache2-mpm-itk_2.2.3-01-2+b2_mipsel.deb apache2-mpm-itk (2.2.3-01-2+b2) stable; urgency=low * Binary-only non-maintainer upload for mipsel; no source changes. * rebuild against apache2 in proposed-updates stable/main/binary-mips/apache2-mpm-itk_2.2.3-01-2+b2_mips.deb apache2-mpm-itk (2.2.3-01-2+b2) stable; urgency=low * Binary-only non-maintainer upload for mips; no source changes. * rebuild against apache2 in proposed-updates stable/main/binary-ia64/apache2-mpm-itk_2.2.3-01-2+b2_ia64.deb apache2-mpm-itk (2.2.3-01-2+b2) stable; urgency=low * Binary-only non-maintainer upload for ia64; no source changes. * rebuild against apache2 in proposed-updates stable/main/binary-i386/apache2-mpm-itk_2.2.3-01-2+b2_i386.deb apache2-mpm-itk (2.2.3-01-2+b2) stable; urgency=low * Binary-only non-maintainer upload for i386; no source changes. * rebuild against apache2 in proposed-updates stable/main/binary-hppa/apache2-mpm-itk_2.2.3-01-2+b2_hppa.deb apache2-mpm-itk (2.2.3-01-2+b2) stable; urgency=low * Binary-only non-maintainer upload for hppa; no source changes. * rebuild against apache2 in proposed-updates stable/main/binary-arm/apache2-mpm-itk_2.2.3-01-2+b2_arm.deb apache2-mpm-itk (2.2.3-01-2+b2) stable; urgency=low * Binary-only non-maintainer upload for arm; no source changes. * rebuild against apache2 in proposed-updates stable/main/binary-amd64/apache2-mpm-itk_2.2.3-01-2+b2_amd64.deb apache2-mpm-itk (2.2.3-01-2+b2) stable; urgency=low * Binary-only non-maintainer upload for amd64; no source changes. * rebuild against apache2 in proposed-updates stable/main/binary-alpha/apache2-mpm-itk_2.2.3-01-2+b2_alpha.deb apache2-mpm-itk (2.2.3-01-2+b2) stable; urgency=low * Binary-only non-maintainer upload for alpha; no source changes. * rebuild against apache2 in proposed-updates stable/main/binary-sparc/apache2-threaded-dev_2.2.3-4+etch5_sparc.deb stable/main/binary-sparc/apache2-utils_2.2.3-4+etch5_sparc.deb stable/main/binary-sparc/apache2-mpm-prefork_2.2.3-4+etch5_sparc.deb stable/main/binary-sparc/apache2.2-common_2.2.3-4+etch5_sparc.deb stable/main/binary-sparc/apache2-mpm-worker_2.2.3-4+etch5_sparc.deb stable/main/binary-sparc/apache2-prefork-dev_2.2.3-4+etch5_sparc.deb stable/main/binary-sparc/apache2-mpm-event_2.2.3-4+etch5_sparc.deb apache2 (2.2.3-4+etch5) stable; urgency=low * Fix a regression introduced by the patch for CVE-2007-6421 which could lead to a segfault when viewing the balancer manager page. (Closes: #468289) * Fix SSL renegotiation with POST requests. (Closes: #462458) * Make mod_authn_dbd depend on mod_dbd. stable/main/binary-s390/apache2-prefork-dev_2.2.3-4+etch5_s390.deb stable/main/binary-s390/apache2-mpm-event_2.2.3-4+etch5_s390.deb stable/main/binary-s390/apache2-mpm-worker_2.2.3-4+etch5_s390.deb stable/main/binary-s390/apache2-utils_2.2.3-4+etch5_s390.deb stable/main/binary-s390/apache2.2-common_2.2.3-4+etch5_s390.deb stable/main/binary-s390/apache2-mpm-prefork_2.2.3-4+etch5_s390.deb stable/main/binary-s390/apache2-threaded-dev_2.2.3-4+etch5_s390.deb apache2 (2.2.3-4+etch5) stable; urgency=low * Fix a regression introduced by the patch for CVE-2007-6421 which could lead to a segfault when viewing the balancer manager page. (Closes: #468289) * Fix SSL renegotiation with POST requests. (Closes: #462458) * Make mod_authn_dbd depend on mod_dbd. stable/main/binary-powerpc/apache2-prefork-dev_2.2.3-4+etch5_powerpc.deb stable/main/binary-powerpc/apache2-threaded-dev_2.2.3-4+etch5_powerpc.deb stable/main/binary-powerpc/apache2-mpm-event_2.2.3-4+etch5_powerpc.deb stable/main/binary-powerpc/apache2.2-common_2.2.3-4+etch5_powerpc.deb stable/main/binary-powerpc/apache2-utils_2.2.3-4+etch5_powerpc.deb stable/main/binary-powerpc/apache2-mpm-prefork_2.2.3-4+etch5_powerpc.deb stable/main/binary-powerpc/apache2-mpm-worker_2.2.3-4+etch5_powerpc.deb apache2 (2.2.3-4+etch5) stable; urgency=low * Fix a regression introduced by the patch for CVE-2007-6421 which could lead to a segfault when viewing the balancer manager page. (Closes: #468289) * Fix SSL renegotiation with POST requests. (Closes: #462458) * Make mod_authn_dbd depend on mod_dbd. stable/main/binary-mipsel/apache2.2-common_2.2.3-4+etch5_mipsel.deb stable/main/binary-mipsel/apache2-mpm-worker_2.2.3-4+etch5_mipsel.deb stable/main/binary-mipsel/apache2-mpm-prefork_2.2.3-4+etch5_mipsel.deb stable/main/binary-mipsel/apache2-utils_2.2.3-4+etch5_mipsel.deb stable/main/binary-mipsel/apache2-threaded-dev_2.2.3-4+etch5_mipsel.deb stable/main/binary-mipsel/apache2-prefork-dev_2.2.3-4+etch5_mipsel.deb stable/main/binary-mipsel/apache2-mpm-event_2.2.3-4+etch5_mipsel.deb apache2 (2.2.3-4+etch5) stable; urgency=low * Fix a regression introduced by the patch for CVE-2007-6421 which could lead to a segfault when viewing the balancer manager page. (Closes: #468289) * Fix SSL renegotiation with POST requests. (Closes: #462458) * Make mod_authn_dbd depend on mod_dbd. stable/main/binary-mips/apache2-mpm-event_2.2.3-4+etch5_mips.deb stable/main/binary-mips/apache2-mpm-prefork_2.2.3-4+etch5_mips.deb stable/main/binary-mips/apache2-mpm-worker_2.2.3-4+etch5_mips.deb stable/main/binary-mips/apache2-prefork-dev_2.2.3-4+etch5_mips.deb stable/main/binary-mips/apache2.2-common_2.2.3-4+etch5_mips.deb stable/main/binary-mips/apache2-threaded-dev_2.2.3-4+etch5_mips.deb stable/main/binary-mips/apache2-utils_2.2.3-4+etch5_mips.deb apache2 (2.2.3-4+etch5) stable; urgency=low * Fix a regression introduced by the patch for CVE-2007-6421 which could lead to a segfault when viewing the balancer manager page. (Closes: #468289) * Fix SSL renegotiation with POST requests. (Closes: #462458) * Make mod_authn_dbd depend on mod_dbd. stable/main/binary-ia64/apache2-prefork-dev_2.2.3-4+etch5_ia64.deb stable/main/binary-ia64/apache2-threaded-dev_2.2.3-4+etch5_ia64.deb stable/main/binary-ia64/apache2-utils_2.2.3-4+etch5_ia64.deb stable/main/binary-ia64/apache2-mpm-worker_2.2.3-4+etch5_ia64.deb stable/main/binary-ia64/apache2.2-common_2.2.3-4+etch5_ia64.deb stable/main/binary-ia64/apache2-mpm-event_2.2.3-4+etch5_ia64.deb stable/main/binary-ia64/apache2-mpm-prefork_2.2.3-4+etch5_ia64.deb apache2 (2.2.3-4+etch5) stable; urgency=low * Fix a regression introduced by the patch for CVE-2007-6421 which could lead to a segfault when viewing the balancer manager page. (Closes: #468289) * Fix SSL renegotiation with POST requests. (Closes: #462458) * Make mod_authn_dbd depend on mod_dbd. stable/main/binary-hppa/apache2-mpm-event_2.2.3-4+etch5_hppa.deb stable/main/binary-hppa/apache2-mpm-worker_2.2.3-4+etch5_hppa.deb stable/main/binary-hppa/apache2-prefork-dev_2.2.3-4+etch5_hppa.deb stable/main/binary-hppa/apache2-threaded-dev_2.2.3-4+etch5_hppa.deb stable/main/binary-hppa/apache2-utils_2.2.3-4+etch5_hppa.deb stable/main/binary-hppa/apache2.2-common_2.2.3-4+etch5_hppa.deb stable/main/binary-hppa/apache2-mpm-prefork_2.2.3-4+etch5_hppa.deb apache2 (2.2.3-4+etch5) stable; urgency=low * Fix a regression introduced by the patch for CVE-2007-6421 which could lead to a segfault when viewing the balancer manager page. (Closes: #468289) * Fix SSL renegotiation with POST requests. (Closes: #462458) * Make mod_authn_dbd depend on mod_dbd. stable/main/binary-arm/apache2-mpm-event_2.2.3-4+etch5_arm.deb stable/main/binary-arm/apache2-mpm-worker_2.2.3-4+etch5_arm.deb stable/main/binary-arm/apache2-utils_2.2.3-4+etch5_arm.deb stable/main/binary-arm/apache2-mpm-prefork_2.2.3-4+etch5_arm.deb stable/main/binary-arm/apache2.2-common_2.2.3-4+etch5_arm.deb stable/main/binary-arm/apache2-prefork-dev_2.2.3-4+etch5_arm.deb stable/main/binary-arm/apache2-threaded-dev_2.2.3-4+etch5_arm.deb apache2 (2.2.3-4+etch5) stable; urgency=low * Fix a regression introduced by the patch for CVE-2007-6421 which could lead to a segfault when viewing the balancer manager page. (Closes: #468289) * Fix SSL renegotiation with POST requests. (Closes: #462458) * Make mod_authn_dbd depend on mod_dbd. stable/main/binary-amd64/apache2-mpm-prefork_2.2.3-4+etch5_amd64.deb stable/main/binary-amd64/apache2-utils_2.2.3-4+etch5_amd64.deb stable/main/binary-amd64/apache2-threaded-dev_2.2.3-4+etch5_amd64.deb stable/main/binary-amd64/apache2-mpm-event_2.2.3-4+etch5_amd64.deb stable/main/binary-amd64/apache2-mpm-worker_2.2.3-4+etch5_amd64.deb stable/main/binary-amd64/apache2.2-common_2.2.3-4+etch5_amd64.deb stable/main/binary-amd64/apache2-prefork-dev_2.2.3-4+etch5_amd64.deb apache2 (2.2.3-4+etch5) stable; urgency=low * Fix a regression introduced by the patch for CVE-2007-6421 which could lead to a segfault when viewing the balancer manager page. (Closes: #468289) * Fix SSL renegotiation with POST requests. (Closes: #462458) * Make mod_authn_dbd depend on mod_dbd. stable/main/binary-alpha/apache2-mpm-event_2.2.3-4+etch5_alpha.deb stable/main/binary-alpha/apache2-prefork-dev_2.2.3-4+etch5_alpha.deb stable/main/binary-alpha/apache2-mpm-worker_2.2.3-4+etch5_alpha.deb stable/main/binary-alpha/apache2.2-common_2.2.3-4+etch5_alpha.deb stable/main/binary-alpha/apache2-utils_2.2.3-4+etch5_alpha.deb stable/main/binary-alpha/apache2-threaded-dev_2.2.3-4+etch5_alpha.deb stable/main/binary-alpha/apache2-mpm-prefork_2.2.3-4+etch5_alpha.deb apache2 (2.2.3-4+etch5) stable; urgency=low * Fix a regression introduced by the patch for CVE-2007-6421 which could lead to a segfault when viewing the balancer manager page. (Closes: #468289) * Fix SSL renegotiation with POST requests. (Closes: #462458) * Make mod_authn_dbd depend on mod_dbd. stable/main/binary-all/apache2-doc_2.2.3-4+etch5_all.deb stable/main/binary-i386/apache2.2-common_2.2.3-4+etch5_i386.deb stable/main/binary-all/apache2-src_2.2.3-4+etch5_all.deb stable/main/binary-i386/apache2-mpm-prefork_2.2.3-4+etch5_i386.deb stable/main/source/apache2_2.2.3-4+etch5.diff.gz stable/main/binary-i386/apache2-threaded-dev_2.2.3-4+etch5_i386.deb stable/main/binary-i386/apache2-prefork-dev_2.2.3-4+etch5_i386.deb stable/main/binary-all/apache2_2.2.3-4+etch5_all.deb stable/main/source/apache2_2.2.3-4+etch5.dsc stable/main/binary-i386/apache2-mpm-event_2.2.3-4+etch5_i386.deb stable/main/binary-i386/apache2-mpm-worker_2.2.3-4+etch5_i386.deb stable/main/binary-i386/apache2-utils_2.2.3-4+etch5_i386.deb stable/main/binary-all/apache2-mpm-perchild_2.2.3-4+etch5_all.deb apache2 (2.2.3-4+etch5) stable; urgency=low * Fix a regression introduced by the patch for CVE-2007-6421 which could lead to a segfault when viewing the balancer manager page. (Closes: #468289) * Fix SSL renegotiation with POST requests. (Closes: #462458) * Make mod_authn_dbd depend on mod_dbd. stable/main/binary-sparc/libalsaplayer-dev_0.99.76-9+etch1_sparc.deb stable/main/binary-sparc/libalsaplayer0_0.99.76-9+etch1_sparc.deb stable/main/binary-sparc/alsaplayer-daemon_0.99.76-9+etch1_sparc.deb stable/main/binary-sparc/alsaplayer-gtk_0.99.76-9+etch1_sparc.deb stable/main/binary-sparc/alsaplayer-nas_0.99.76-9+etch1_sparc.deb stable/main/binary-sparc/alsaplayer-alsa_0.99.76-9+etch1_sparc.deb stable/main/binary-sparc/alsaplayer-jack_0.99.76-9+etch1_sparc.deb stable/main/binary-sparc/alsaplayer-xosd_0.99.76-9+etch1_sparc.deb stable/main/binary-sparc/alsaplayer-common_0.99.76-9+etch1_sparc.deb stable/main/binary-sparc/alsaplayer-esd_0.99.76-9+etch1_sparc.deb stable/main/binary-sparc/alsaplayer-oss_0.99.76-9+etch1_sparc.deb stable/main/binary-sparc/alsaplayer-text_0.99.76-9+etch1_sparc.deb alsaplayer (0.99.76-9+etch1) stable-security; urgency=high * Non-maintainer upload by the Security Team. * 32_security_CVE-2007-5301: patch from upstream for CVE-2007-5301, correcting a buffer overflow vulnerability in the Vorbis plugin. Closes: #446034 stable/main/binary-s390/alsaplayer-xosd_0.99.76-9+etch1_s390.deb stable/main/binary-s390/alsaplayer-alsa_0.99.76-9+etch1_s390.deb stable/main/binary-s390/alsaplayer-text_0.99.76-9+etch1_s390.deb stable/main/binary-s390/alsaplayer-esd_0.99.76-9+etch1_s390.deb stable/main/binary-s390/alsaplayer-daemon_0.99.76-9+etch1_s390.deb stable/main/binary-s390/alsaplayer-common_0.99.76-9+etch1_s390.deb stable/main/binary-s390/libalsaplayer-dev_0.99.76-9+etch1_s390.deb stable/main/binary-s390/alsaplayer-gtk_0.99.76-9+etch1_s390.deb stable/main/binary-s390/alsaplayer-jack_0.99.76-9+etch1_s390.deb stable/main/binary-s390/alsaplayer-nas_0.99.76-9+etch1_s390.deb stable/main/binary-s390/alsaplayer-oss_0.99.76-9+etch1_s390.deb stable/main/binary-s390/libalsaplayer0_0.99.76-9+etch1_s390.deb alsaplayer (0.99.76-9+etch1) stable-security; urgency=high * Non-maintainer upload by the Security Team. * 32_security_CVE-2007-5301: patch from upstream for CVE-2007-5301, correcting a buffer overflow vulnerability in the Vorbis plugin. Closes: #446034 stable/main/binary-powerpc/alsaplayer-alsa_0.99.76-9+etch1_powerpc.deb stable/main/binary-powerpc/libalsaplayer-dev_0.99.76-9+etch1_powerpc.deb stable/main/binary-powerpc/alsaplayer-text_0.99.76-9+etch1_powerpc.deb stable/main/binary-powerpc/alsaplayer-daemon_0.99.76-9+etch1_powerpc.deb stable/main/binary-powerpc/alsaplayer-esd_0.99.76-9+etch1_powerpc.deb stable/main/binary-powerpc/alsaplayer-xosd_0.99.76-9+etch1_powerpc.deb stable/main/binary-powerpc/libalsaplayer0_0.99.76-9+etch1_powerpc.deb stable/main/binary-powerpc/alsaplayer-jack_0.99.76-9+etch1_powerpc.deb stable/main/binary-powerpc/alsaplayer-nas_0.99.76-9+etch1_powerpc.deb stable/main/binary-powerpc/alsaplayer-oss_0.99.76-9+etch1_powerpc.deb stable/main/binary-powerpc/alsaplayer-common_0.99.76-9+etch1_powerpc.deb stable/main/binary-powerpc/alsaplayer-gtk_0.99.76-9+etch1_powerpc.deb alsaplayer (0.99.76-9+etch1) stable-security; urgency=high * Non-maintainer upload by the Security Team. * 32_security_CVE-2007-5301: patch from upstream for CVE-2007-5301, correcting a buffer overflow vulnerability in the Vorbis plugin. Closes: #446034 stable/main/binary-mipsel/alsaplayer-esd_0.99.76-9+etch1_mipsel.deb stable/main/binary-mipsel/alsaplayer-alsa_0.99.76-9+etch1_mipsel.deb stable/main/binary-mipsel/alsaplayer-text_0.99.76-9+etch1_mipsel.deb stable/main/binary-mipsel/alsaplayer-daemon_0.99.76-9+etch1_mipsel.deb stable/main/binary-mipsel/libalsaplayer0_0.99.76-9+etch1_mipsel.deb stable/main/binary-mipsel/libalsaplayer-dev_0.99.76-9+etch1_mipsel.deb stable/main/binary-mipsel/alsaplayer-common_0.99.76-9+etch1_mipsel.deb stable/main/binary-mipsel/alsaplayer-nas_0.99.76-9+etch1_mipsel.deb stable/main/binary-mipsel/alsaplayer-oss_0.99.76-9+etch1_mipsel.deb stable/main/binary-mipsel/alsaplayer-jack_0.99.76-9+etch1_mipsel.deb stable/main/binary-mipsel/alsaplayer-xosd_0.99.76-9+etch1_mipsel.deb stable/main/binary-mipsel/alsaplayer-gtk_0.99.76-9+etch1_mipsel.deb alsaplayer (0.99.76-9+etch1) stable-security; urgency=high * Non-maintainer upload by the Security Team. * 32_security_CVE-2007-5301: patch from upstream for CVE-2007-5301, correcting a buffer overflow vulnerability in the Vorbis plugin. Closes: #446034 stable/main/binary-mips/alsaplayer-common_0.99.76-9+etch1_mips.deb stable/main/binary-mips/alsaplayer-xosd_0.99.76-9+etch1_mips.deb stable/main/binary-mips/alsaplayer-alsa_0.99.76-9+etch1_mips.deb stable/main/binary-mips/alsaplayer-text_0.99.76-9+etch1_mips.deb stable/main/binary-mips/alsaplayer-gtk_0.99.76-9+etch1_mips.deb stable/main/binary-mips/alsaplayer-oss_0.99.76-9+etch1_mips.deb stable/main/binary-mips/alsaplayer-esd_0.99.76-9+etch1_mips.deb stable/main/binary-mips/alsaplayer-daemon_0.99.76-9+etch1_mips.deb stable/main/binary-mips/libalsaplayer-dev_0.99.76-9+etch1_mips.deb stable/main/binary-mips/alsaplayer-nas_0.99.76-9+etch1_mips.deb stable/main/binary-mips/alsaplayer-jack_0.99.76-9+etch1_mips.deb stable/main/binary-mips/libalsaplayer0_0.99.76-9+etch1_mips.deb alsaplayer (0.99.76-9+etch1) stable-security; urgency=high * Non-maintainer upload by the Security Team. * 32_security_CVE-2007-5301: patch from upstream for CVE-2007-5301, correcting a buffer overflow vulnerability in the Vorbis plugin. Closes: #446034 stable/main/binary-ia64/alsaplayer-esd_0.99.76-9+etch1_ia64.deb stable/main/binary-ia64/alsaplayer-text_0.99.76-9+etch1_ia64.deb stable/main/binary-ia64/alsaplayer-xosd_0.99.76-9+etch1_ia64.deb stable/main/binary-ia64/alsaplayer-nas_0.99.76-9+etch1_ia64.deb stable/main/binary-ia64/alsaplayer-oss_0.99.76-9+etch1_ia64.deb stable/main/binary-ia64/alsaplayer-jack_0.99.76-9+etch1_ia64.deb stable/main/binary-ia64/alsaplayer-alsa_0.99.76-9+etch1_ia64.deb stable/main/binary-ia64/libalsaplayer-dev_0.99.76-9+etch1_ia64.deb stable/main/binary-ia64/alsaplayer-common_0.99.76-9+etch1_ia64.deb stable/main/binary-ia64/libalsaplayer0_0.99.76-9+etch1_ia64.deb stable/main/binary-ia64/alsaplayer-daemon_0.99.76-9+etch1_ia64.deb stable/main/binary-ia64/alsaplayer-gtk_0.99.76-9+etch1_ia64.deb alsaplayer (0.99.76-9+etch1) stable-security; urgency=high * Non-maintainer upload by the Security Team. * 32_security_CVE-2007-5301: patch from upstream for CVE-2007-5301, correcting a buffer overflow vulnerability in the Vorbis plugin. Closes: #446034 stable/main/binary-hppa/alsaplayer-jack_0.99.76-9+etch1_hppa.deb stable/main/binary-hppa/alsaplayer-alsa_0.99.76-9+etch1_hppa.deb stable/main/binary-hppa/alsaplayer-xosd_0.99.76-9+etch1_hppa.deb stable/main/binary-hppa/alsaplayer-nas_0.99.76-9+etch1_hppa.deb stable/main/binary-hppa/libalsaplayer0_0.99.76-9+etch1_hppa.deb stable/main/binary-hppa/alsaplayer-oss_0.99.76-9+etch1_hppa.deb stable/main/binary-hppa/alsaplayer-text_0.99.76-9+etch1_hppa.deb stable/main/binary-hppa/alsaplayer-gtk_0.99.76-9+etch1_hppa.deb stable/main/binary-hppa/alsaplayer-daemon_0.99.76-9+etch1_hppa.deb stable/main/binary-hppa/alsaplayer-common_0.99.76-9+etch1_hppa.deb stable/main/binary-hppa/alsaplayer-esd_0.99.76-9+etch1_hppa.deb stable/main/binary-hppa/libalsaplayer-dev_0.99.76-9+etch1_hppa.deb alsaplayer (0.99.76-9+etch1) stable-security; urgency=high * Non-maintainer upload by the Security Team. * 32_security_CVE-2007-5301: patch from upstream for CVE-2007-5301, correcting a buffer overflow vulnerability in the Vorbis plugin. Closes: #446034 stable/main/binary-arm/alsaplayer-text_0.99.76-9+etch1_arm.deb stable/main/binary-arm/alsaplayer-alsa_0.99.76-9+etch1_arm.deb stable/main/binary-arm/alsaplayer-nas_0.99.76-9+etch1_arm.deb stable/main/binary-arm/alsaplayer-gtk_0.99.76-9+etch1_arm.deb stable/main/binary-arm/libalsaplayer-dev_0.99.76-9+etch1_arm.deb stable/main/binary-arm/alsaplayer-daemon_0.99.76-9+etch1_arm.deb stable/main/binary-arm/alsaplayer-jack_0.99.76-9+etch1_arm.deb stable/main/binary-arm/alsaplayer-xosd_0.99.76-9+etch1_arm.deb stable/main/binary-arm/alsaplayer-oss_0.99.76-9+etch1_arm.deb stable/main/binary-arm/alsaplayer-common_0.99.76-9+etch1_arm.deb stable/main/binary-arm/alsaplayer-esd_0.99.76-9+etch1_arm.deb stable/main/binary-arm/libalsaplayer0_0.99.76-9+etch1_arm.deb alsaplayer (0.99.76-9+etch1) stable-security; urgency=high * Non-maintainer upload by the Security Team. * 32_security_CVE-2007-5301: patch from upstream for CVE-2007-5301, correcting a buffer overflow vulnerability in the Vorbis plugin. Closes: #446034 stable/main/binary-amd64/alsaplayer-daemon_0.99.76-9+etch1_amd64.deb stable/main/binary-amd64/alsaplayer-gtk_0.99.76-9+etch1_amd64.deb stable/main/binary-amd64/alsaplayer-common_0.99.76-9+etch1_amd64.deb stable/main/binary-amd64/alsaplayer-oss_0.99.76-9+etch1_amd64.deb stable/main/binary-amd64/alsaplayer-nas_0.99.76-9+etch1_amd64.deb stable/main/binary-amd64/alsaplayer-text_0.99.76-9+etch1_amd64.deb stable/main/binary-amd64/alsaplayer-xosd_0.99.76-9+etch1_amd64.deb stable/main/binary-amd64/alsaplayer-alsa_0.99.76-9+etch1_amd64.deb stable/main/binary-amd64/alsaplayer-jack_0.99.76-9+etch1_amd64.deb stable/main/binary-amd64/libalsaplayer0_0.99.76-9+etch1_amd64.deb stable/main/binary-amd64/libalsaplayer-dev_0.99.76-9+etch1_amd64.deb stable/main/binary-amd64/alsaplayer-esd_0.99.76-9+etch1_amd64.deb alsaplayer (0.99.76-9+etch1) stable-security; urgency=high * Non-maintainer upload by the Security Team. * 32_security_CVE-2007-5301: patch from upstream for CVE-2007-5301, correcting a buffer overflow vulnerability in the Vorbis plugin. Closes: #446034 stable/main/binary-alpha/alsaplayer-alsa_0.99.76-9+etch1_alpha.deb stable/main/binary-alpha/alsaplayer-xosd_0.99.76-9+etch1_alpha.deb stable/main/binary-alpha/alsaplayer-daemon_0.99.76-9+etch1_alpha.deb stable/main/binary-alpha/alsaplayer-jack_0.99.76-9+etch1_alpha.deb stable/main/binary-alpha/alsaplayer-oss_0.99.76-9+etch1_alpha.deb stable/main/binary-alpha/alsaplayer-common_0.99.76-9+etch1_alpha.deb stable/main/binary-alpha/alsaplayer-esd_0.99.76-9+etch1_alpha.deb stable/main/binary-alpha/alsaplayer-nas_0.99.76-9+etch1_alpha.deb stable/main/binary-alpha/alsaplayer-gtk_0.99.76-9+etch1_alpha.deb stable/main/binary-alpha/libalsaplayer0_0.99.76-9+etch1_alpha.deb stable/main/binary-alpha/libalsaplayer-dev_0.99.76-9+etch1_alpha.deb stable/main/binary-alpha/alsaplayer-text_0.99.76-9+etch1_alpha.deb alsaplayer (0.99.76-9+etch1) stable-security; urgency=high * Non-maintainer upload by the Security Team. * 32_security_CVE-2007-5301: patch from upstream for CVE-2007-5301, correcting a buffer overflow vulnerability in the Vorbis plugin. Closes: #446034 stable/main/binary-i386/libalsaplayer0_0.99.76-9+etch1_i386.deb stable/main/binary-i386/alsaplayer-text_0.99.76-9+etch1_i386.deb stable/main/binary-i386/alsaplayer-nas_0.99.76-9+etch1_i386.deb stable/main/binary-i386/libalsaplayer-dev_0.99.76-9+etch1_i386.deb stable/main/binary-i386/alsaplayer-oss_0.99.76-9+etch1_i386.deb stable/main/source/alsaplayer_0.99.76-9+etch1.diff.gz stable/main/binary-i386/alsaplayer-gtk_0.99.76-9+etch1_i386.deb stable/main/binary-i386/alsaplayer-daemon_0.99.76-9+etch1_i386.deb stable/main/binary-i386/alsaplayer-alsa_0.99.76-9+etch1_i386.deb stable/main/binary-i386/alsaplayer-jack_0.99.76-9+etch1_i386.deb stable/main/binary-i386/alsaplayer-common_0.99.76-9+etch1_i386.deb stable/main/binary-i386/alsaplayer-xosd_0.99.76-9+etch1_i386.deb stable/main/binary-i386/alsaplayer-esd_0.99.76-9+etch1_i386.deb stable/main/source/alsaplayer_0.99.76-9+etch1.dsc alsaplayer (0.99.76-9+etch1) stable-security; urgency=high * Non-maintainer upload by the Security Team. * 32_security_CVE-2007-5301: patch from upstream for CVE-2007-5301, correcting a buffer overflow vulnerability in the Vorbis plugin. Closes: #446034 stable/main/binary-sparc/afuse_0.1.1-1+etch1_sparc.deb afuse (0.1.1-1+etch1) stable-security; urgency=high * Non-maintainer upload by the security team * Fix privilege escalation in afuse by correctly splitting command line arguments Thanks to Anders Kaseorg stable/main/binary-s390/afuse_0.1.1-1+etch1_s390.deb afuse (0.1.1-1+etch1) stable-security; urgency=high * Non-maintainer upload by the security team * Fix privilege escalation in afuse by correctly splitting command line arguments Thanks to Anders Kaseorg stable/main/binary-powerpc/afuse_0.1.1-1+etch1_powerpc.deb afuse (0.1.1-1+etch1) stable-security; urgency=high * Non-maintainer upload by the security team * Fix privilege escalation in afuse by correctly splitting command line arguments Thanks to Anders Kaseorg stable/main/binary-mipsel/afuse_0.1.1-1+etch1_mipsel.deb afuse (0.1.1-1+etch1) stable-security; urgency=high * Non-maintainer upload by the security team * Fix privilege escalation in afuse by correctly splitting command line arguments Thanks to Anders Kaseorg stable/main/binary-mips/afuse_0.1.1-1+etch1_mips.deb afuse (0.1.1-1+etch1) stable-security; urgency=high * Non-maintainer upload by the security team * Fix privilege escalation in afuse by correctly splitting command line arguments Thanks to Anders Kaseorg stable/main/binary-ia64/afuse_0.1.1-1+etch1_ia64.deb afuse (0.1.1-1+etch1) stable-security; urgency=high * Non-maintainer upload by the security team * Fix privilege escalation in afuse by correctly splitting command line arguments Thanks to Anders Kaseorg stable/main/binary-hppa/afuse_0.1.1-1+etch1_hppa.deb afuse (0.1.1-1+etch1) stable-security; urgency=high * Non-maintainer upload by the security team * Fix privilege escalation in afuse by correctly splitting command line arguments Thanks to Anders Kaseorg stable/main/binary-arm/afuse_0.1.1-1+etch1_arm.deb afuse (0.1.1-1+etch1) stable-security; urgency=high * Non-maintainer upload by the security team * Fix privilege escalation in afuse by correctly splitting command line arguments Thanks to Anders Kaseorg stable/main/binary-amd64/afuse_0.1.1-1+etch1_amd64.deb afuse (0.1.1-1+etch1) stable-security; urgency=high * Non-maintainer upload by the security team * Fix privilege escalation in afuse by correctly splitting command line arguments Thanks to Anders Kaseorg stable/main/binary-alpha/afuse_0.1.1-1+etch1_alpha.deb afuse (0.1.1-1+etch1) stable-security; urgency=high * Non-maintainer upload by the security team * Fix privilege escalation in afuse by correctly splitting command line arguments Thanks to Anders Kaseorg stable/main/source/afuse_0.1.1-1+etch1.diff.gz stable/main/source/afuse_0.1.1-1+etch1.dsc stable/main/binary-i386/afuse_0.1.1-1+etch1_i386.deb afuse (0.1.1-1+etch1) stable-security; urgency=high * Non-maintainer upload by the security team * Fix privilege escalation in afuse by correctly splitting command line arguments Thanks to Anders Kaseorg stable/main/binary-sparc/aboot-cross_0.9b-3+etchnhalf.1_sparc.deb aboot (0.9b-3+etchnhalf.1) stable; urgency=low * Fix unrepreducible build issue. Though etch's aboot successfully built on etch/alpha, it was not producing the same set of binaries - i.e., it was building aboot-cross instead of aboot. This was corrected in 1.0~pre20040408-1 with the following change, originally from Steve Langasek: - Update debian/rules to use DEB_HOST_GNU_CPU instead of DEB_HOST_GNU_TYPE, to fix a misbuild in unstable. * Correcting the above creates two new FTBFS issues, likely due to the use of the newer gcc in etch (the aboot that shipped with etch was the same binary package that shipped in sarge): - error: conflicting types for 'dispatch' - Drop duplicate definition of dispatch() from cons.c - net.c: In function 'load_kernel': net.c:129: error: invalid lvalue in assignment - Change assignment to move casting to rvalue * Add support for booting >= 2.6.23 kernels, needed for etchnhalf. This was corrected in 1.0~pre20040408-1 with the following change, originally from Steve Langasek: - Update bootlx to ignore ELF header sections not of type PT_LOAD when loading the kernel, so that the new PT_NOTE sections in 2.6.23rc1 and above don't cause load failures. Thanks to Richard Henderson for the patch. stable/main/binary-s390/aboot-cross_0.9b-3+etchnhalf.1_s390.deb aboot (0.9b-3+etchnhalf.1) stable; urgency=low * Fix unrepreducible build issue. Though etch's aboot successfully built on etch/alpha, it was not producing the same set of binaries - i.e., it was building aboot-cross instead of aboot. This was corrected in 1.0~pre20040408-1 with the following change, originally from Steve Langasek: - Update debian/rules to use DEB_HOST_GNU_CPU instead of DEB_HOST_GNU_TYPE, to fix a misbuild in unstable. * Correcting the above creates two new FTBFS issues, likely due to the use of the newer gcc in etch (the aboot that shipped with etch was the same binary package that shipped in sarge): - error: conflicting types for 'dispatch' - Drop duplicate definition of dispatch() from cons.c - net.c: In function 'load_kernel': net.c:129: error: invalid lvalue in assignment - Change assignment to move casting to rvalue * Add support for booting >= 2.6.23 kernels, needed for etchnhalf. This was corrected in 1.0~pre20040408-1 with the following change, originally from Steve Langasek: - Update bootlx to ignore ELF header sections not of type PT_LOAD when loading the kernel, so that the new PT_NOTE sections in 2.6.23rc1 and above don't cause load failures. Thanks to Richard Henderson for the patch. stable/main/binary-powerpc/aboot-cross_0.9b-3+etchnhalf.1_powerpc.deb aboot (0.9b-3+etchnhalf.1) stable; urgency=low * Fix unrepreducible build issue. Though etch's aboot successfully built on etch/alpha, it was not producing the same set of binaries - i.e., it was building aboot-cross instead of aboot. This was corrected in 1.0~pre20040408-1 with the following change, originally from Steve Langasek: - Update debian/rules to use DEB_HOST_GNU_CPU instead of DEB_HOST_GNU_TYPE, to fix a misbuild in unstable. * Correcting the above creates two new FTBFS issues, likely due to the use of the newer gcc in etch (the aboot that shipped with etch was the same binary package that shipped in sarge): - error: conflicting types for 'dispatch' - Drop duplicate definition of dispatch() from cons.c - net.c: In function 'load_kernel': net.c:129: error: invalid lvalue in assignment - Change assignment to move casting to rvalue * Add support for booting >= 2.6.23 kernels, needed for etchnhalf. This was corrected in 1.0~pre20040408-1 with the following change, originally from Steve Langasek: - Update bootlx to ignore ELF header sections not of type PT_LOAD when loading the kernel, so that the new PT_NOTE sections in 2.6.23rc1 and above don't cause load failures. Thanks to Richard Henderson for the patch. stable/main/binary-mipsel/aboot-cross_0.9b-3+etchnhalf.1_mipsel.deb aboot (0.9b-3+etchnhalf.1) stable; urgency=low * Fix unrepreducible build issue. Though etch's aboot successfully built on etch/alpha, it was not producing the same set of binaries - i.e., it was building aboot-cross instead of aboot. This was corrected in 1.0~pre20040408-1 with the following change, originally from Steve Langasek: - Update debian/rules to use DEB_HOST_GNU_CPU instead of DEB_HOST_GNU_TYPE, to fix a misbuild in unstable. * Correcting the above creates two new FTBFS issues, likely due to the use of the newer gcc in etch (the aboot that shipped with etch was the same binary package that shipped in sarge): - error: conflicting types for 'dispatch' - Drop duplicate definition of dispatch() from cons.c - net.c: In function 'load_kernel': net.c:129: error: invalid lvalue in assignment - Change assignment to move casting to rvalue * Add support for booting >= 2.6.23 kernels, needed for etchnhalf. This was corrected in 1.0~pre20040408-1 with the following change, originally from Steve Langasek: - Update bootlx to ignore ELF header sections not of type PT_LOAD when loading the kernel, so that the new PT_NOTE sections in 2.6.23rc1 and above don't cause load failures. Thanks to Richard Henderson for the patch. stable/main/binary-mips/aboot-cross_0.9b-3+etchnhalf.1_mips.deb aboot (0.9b-3+etchnhalf.1) stable; urgency=low * Fix unrepreducible build issue. Though etch's aboot successfully built on etch/alpha, it was not producing the same set of binaries - i.e., it was building aboot-cross instead of aboot. This was corrected in 1.0~pre20040408-1 with the following change, originally from Steve Langasek: - Update debian/rules to use DEB_HOST_GNU_CPU instead of DEB_HOST_GNU_TYPE, to fix a misbuild in unstable. * Correcting the above creates two new FTBFS issues, likely due to the use of the newer gcc in etch (the aboot that shipped with etch was the same binary package that shipped in sarge): - error: conflicting types for 'dispatch' - Drop duplicate definition of dispatch() from cons.c - net.c: In function 'load_kernel': net.c:129: error: invalid lvalue in assignment - Change assignment to move casting to rvalue * Add support for booting >= 2.6.23 kernels, needed for etchnhalf. This was corrected in 1.0~pre20040408-1 with the following change, originally from Steve Langasek: - Update bootlx to ignore ELF header sections not of type PT_LOAD when loading the kernel, so that the new PT_NOTE sections in 2.6.23rc1 and above don't cause load failures. Thanks to Richard Henderson for the patch. stable/main/binary-ia64/aboot-cross_0.9b-3+etchnhalf.1_ia64.deb aboot (0.9b-3+etchnhalf.1) stable; urgency=low * Fix unrepreducible build issue. Though etch's aboot successfully built on etch/alpha, it was not producing the same set of binaries - i.e., it was building aboot-cross instead of aboot. This was corrected in 1.0~pre20040408-1 with the following change, originally from Steve Langasek: - Update debian/rules to use DEB_HOST_GNU_CPU instead of DEB_HOST_GNU_TYPE, to fix a misbuild in unstable. * Correcting the above creates two new FTBFS issues, likely due to the use of the newer gcc in etch (the aboot that shipped with etch was the same binary package that shipped in sarge): - error: conflicting types for 'dispatch' - Drop duplicate definition of dispatch() from cons.c - net.c: In function 'load_kernel': net.c:129: error: invalid lvalue in assignment - Change assignment to move casting to rvalue * Add support for booting >= 2.6.23 kernels, needed for etchnhalf. This was corrected in 1.0~pre20040408-1 with the following change, originally from Steve Langasek: - Update bootlx to ignore ELF header sections not of type PT_LOAD when loading the kernel, so that the new PT_NOTE sections in 2.6.23rc1 and above don't cause load failures. Thanks to Richard Henderson for the patch. stable/main/binary-i386/aboot-cross_0.9b-3+etchnhalf.1_i386.deb aboot (0.9b-3+etchnhalf.1) stable; urgency=low * Fix unrepreducible build issue. Though etch's aboot successfully built on etch/alpha, it was not producing the same set of binaries - i.e., it was building aboot-cross instead of aboot. This was corrected in 1.0~pre20040408-1 with the following change, originally from Steve Langasek: - Update debian/rules to use DEB_HOST_GNU_CPU instead of DEB_HOST_GNU_TYPE, to fix a misbuild in unstable. * Correcting the above creates two new FTBFS issues, likely due to the use of the newer gcc in etch (the aboot that shipped with etch was the same binary package that shipped in sarge): - error: conflicting types for 'dispatch' - Drop duplicate definition of dispatch() from cons.c - net.c: In function 'load_kernel': net.c:129: error: invalid lvalue in assignment - Change assignment to move casting to rvalue * Add support for booting >= 2.6.23 kernels, needed for etchnhalf. This was corrected in 1.0~pre20040408-1 with the following change, originally from Steve Langasek: - Update bootlx to ignore ELF header sections not of type PT_LOAD when loading the kernel, so that the new PT_NOTE sections in 2.6.23rc1 and above don't cause load failures. Thanks to Richard Henderson for the patch. stable/main/binary-hppa/aboot-cross_0.9b-3+etchnhalf.1_hppa.deb aboot (0.9b-3+etchnhalf.1) stable; urgency=low * Fix unrepreducible build issue. Though etch's aboot successfully built on etch/alpha, it was not producing the same set of binaries - i.e., it was building aboot-cross instead of aboot. This was corrected in 1.0~pre20040408-1 with the following change, originally from Steve Langasek: - Update debian/rules to use DEB_HOST_GNU_CPU instead of DEB_HOST_GNU_TYPE, to fix a misbuild in unstable. * Correcting the above creates two new FTBFS issues, likely due to the use of the newer gcc in etch (the aboot that shipped with etch was the same binary package that shipped in sarge): - error: conflicting types for 'dispatch' - Drop duplicate definition of dispatch() from cons.c - net.c: In function 'load_kernel': net.c:129: error: invalid lvalue in assignment - Change assignment to move casting to rvalue * Add support for booting >= 2.6.23 kernels, needed for etchnhalf. This was corrected in 1.0~pre20040408-1 with the following change, originally from Steve Langasek: - Update bootlx to ignore ELF header sections not of type PT_LOAD when loading the kernel, so that the new PT_NOTE sections in 2.6.23rc1 and above don't cause load failures. Thanks to Richard Henderson for the patch. stable/main/binary-arm/aboot-cross_0.9b-3+etchnhalf.1_arm.deb aboot (0.9b-3+etchnhalf.1) stable; urgency=low * Fix unrepreducible build issue. Though etch's aboot successfully built on etch/alpha, it was not producing the same set of binaries - i.e., it was building aboot-cross instead of aboot. This was corrected in 1.0~pre20040408-1 with the following change, originally from Steve Langasek: - Update debian/rules to use DEB_HOST_GNU_CPU instead of DEB_HOST_GNU_TYPE, to fix a misbuild in unstable. * Correcting the above creates two new FTBFS issues, likely due to the use of the newer gcc in etch (the aboot that shipped with etch was the same binary package that shipped in sarge): - error: conflicting types for 'dispatch' - Drop duplicate definition of dispatch() from cons.c - net.c: In function 'load_kernel': net.c:129: error: invalid lvalue in assignment - Change assignment to move casting to rvalue * Add support for booting >= 2.6.23 kernels, needed for etchnhalf. This was corrected in 1.0~pre20040408-1 with the following change, originally from Steve Langasek: - Update bootlx to ignore ELF header sections not of type PT_LOAD when loading the kernel, so that the new PT_NOTE sections in 2.6.23rc1 and above don't cause load failures. Thanks to Richard Henderson for the patch. stable/main/binary-amd64/aboot-cross_0.9b-3+etchnhalf.1_amd64.deb aboot (0.9b-3+etchnhalf.1) stable; urgency=low * Fix unrepreducible build issue. Though etch's aboot successfully built on etch/alpha, it was not producing the same set of binaries - i.e., it was building aboot-cross instead of aboot. This was corrected in 1.0~pre20040408-1 with the following change, originally from Steve Langasek: - Update debian/rules to use DEB_HOST_GNU_CPU instead of DEB_HOST_GNU_TYPE, to fix a misbuild in unstable. * Correcting the above creates two new FTBFS issues, likely due to the use of the newer gcc in etch (the aboot that shipped with etch was the same binary package that shipped in sarge): - error: conflicting types for 'dispatch' - Drop duplicate definition of dispatch() from cons.c - net.c: In function 'load_kernel': net.c:129: error: invalid lvalue in assignment - Change assignment to move casting to rvalue * Add support for booting >= 2.6.23 kernels, needed for etchnhalf. This was corrected in 1.0~pre20040408-1 with the following change, originally from Steve Langasek: - Update bootlx to ignore ELF header sections not of type PT_LOAD when loading the kernel, so that the new PT_NOTE sections in 2.6.23rc1 and above don't cause load failures. Thanks to Richard Henderson for the patch. stable/main/binary-all/aboot-base_0.9b-3+etchnhalf.1_all.deb stable/main/source/aboot_0.9b-3+etchnhalf.1.dsc stable/main/source/aboot_0.9b-3+etchnhalf.1.diff.gz stable/main/binary-alpha/aboot_0.9b-3+etchnhalf.1_alpha.deb aboot (0.9b-3+etchnhalf.1) stable; urgency=low * Fix unrepreducible build issue. Though etch's aboot successfully built on etch/alpha, it was not producing the same set of binaries - i.e., it was building aboot-cross instead of aboot. This was corrected in 1.0~pre20040408-1 with the following change, originally from Steve Langasek: - Update debian/rules to use DEB_HOST_GNU_CPU instead of DEB_HOST_GNU_TYPE, to fix a misbuild in unstable. * Correcting the above creates two new FTBFS issues, likely due to the use of the newer gcc in etch (the aboot that shipped with etch was the same binary package that shipped in sarge): - error: conflicting types for 'dispatch' - Drop duplicate definition of dispatch() from cons.c - net.c: In function 'load_kernel': net.c:129: error: invalid lvalue in assignment - Change assignment to move casting to rvalue * Add support for booting >= 2.6.23 kernels, needed for etchnhalf. This was corrected in 1.0~pre20040408-1 with the following change, originally from Steve Langasek: - Update bootlx to ignore ELF header sections not of type PT_LOAD when loading the kernel, so that the new PT_NOTE sections in 2.6.23rc1 and above don't cause load failures. Thanks to Richard Henderson for the patch. stable/main/binary-all/alsa-source_1.0.13-5etch1_all.deb stable/main/source/alsa-driver_1.0.13-5etch1.diff.gz stable/main/binary-all/linux-sound-base_1.0.13-5etch1_all.deb stable/main/source/alsa-driver_1.0.13-5etch1.dsc stable/main/binary-all/alsa-base_1.0.13-5etch1_all.deb alsa-driver (1.0.13-5etch1) stable-security; urgency=high * NMU by the Security Team * 20_snd-page-alloc-leak.dpatch: Fix an issue in the alsa subsystem that allows a local user to read potentially sensitive kernel memory from the proc filesystem. See CVE-2007-4571 * Adjust memalloc.patch to apply on top of 20_snd-page-alloc-leak.dpatch ========================================= Sat, 16 Feb 2008 - Debian 4.0r3 released ========================================= stable/non-free/binary-amd64/unace-nonfree_2.5-1etch1_amd64.deb unace-nonfree (2.5-1etch1) stable; urgency=medium * debian/control: + Reduced supported Archs to i386 and amd64 for the time being. * Applied a series of patches courtesy of Michael Karcher : * debian/patches/04-64bit.dpatch: + Replace declare.h by a generic stdint based version (Closes: #449395). * debian/patches/11-possibly-critical.dpatch: + Fixes a possible security issue by initialising a local variable. stable/non-free/binary-i386/unace-nonfree_2.5-1etch1_i386.deb stable/non-free/source/unace-nonfree_2.5-1etch1.diff.gz stable/non-free/source/unace-nonfree_2.5-1etch1.dsc unace-nonfree (2.5-1etch1) stable; urgency=medium * debian/control: + Reduced supported Archs to i386 and amd64 for the time being. * Applied a series of patches courtesy of Michael Karcher : * debian/patches/04-64bit.dpatch: + Replace declare.h by a generic stdint based version (Closes: #449395). * debian/patches/11-possibly-critical.dpatch: + Fixes a possible security issue by initialising a local variable. stable/main/source/zope-cmfplone_2.5.1-4etch3.diff.gz stable/main/source/zope-cmfplone_2.5.1-4etch3.dsc stable/main/binary-all/plone-site_2.5.1-4etch3_all.deb stable/main/binary-all/zope-cmfplone_2.5.1-4etch3_all.deb zope-cmfplone (2.5.1-4etch3) stable-security; urgency=high * Updated hotfix for Plone CVE 2007-5741: http://plone.org/products/plone-hotfix/releases/20071106-2 stable/main/source/yarssr_0.2.2-1etch1.diff.gz stable/main/source/yarssr_0.2.2-1etch1.dsc stable/main/binary-all/yarssr_0.2.2-1etch1_all.deb yarssr (0.2.2-1etch1) stable-security; urgency=high * Fix CVE-2007-5837. stable/main/binary-sparc/libnspr4-0d_1.8.0.15~pre080131b-0etch1_sparc.deb stable/main/binary-sparc/libnss3-0d-dbg_1.8.0.15~pre080131b-0etch1_sparc.deb stable/main/binary-sparc/python-xpcom_1.8.0.15~pre080131b-0etch1_sparc.deb stable/main/binary-sparc/libnss3-0d_1.8.0.15~pre080131b-0etch1_sparc.deb stable/main/binary-sparc/xulrunner_1.8.0.15~pre080131b-0etch1_sparc.deb stable/main/binary-sparc/libxul0d_1.8.0.15~pre080131b-0etch1_sparc.deb stable/main/binary-sparc/libxul0d-dbg_1.8.0.15~pre080131b-0etch1_sparc.deb stable/main/binary-sparc/libmozjs0d-dbg_1.8.0.15~pre080131b-0etch1_sparc.deb stable/main/binary-sparc/libmozjs0d_1.8.0.15~pre080131b-0etch1_sparc.deb stable/main/binary-sparc/spidermonkey-bin_1.8.0.15~pre080131b-0etch1_sparc.deb stable/main/binary-sparc/libnspr4-0d-dbg_1.8.0.15~pre080131b-0etch1_sparc.deb stable/main/binary-sparc/libnss3-tools_1.8.0.15~pre080131b-0etch1_sparc.deb stable/main/binary-sparc/xulrunner-gnome-support_1.8.0.15~pre080131b-0etch1_sparc.deb xulrunner (1.8.0.15~pre080131b-0etch1) stable-security; urgency=critical [ Alexander Sack ] * New security/stability upstream release (backports for v2.0.0.12) * MFSA 2008-01 aka CVE-2008-0412: Crashes with evidence of memory corruption v1.8.1.12 (Browser crashes) * MFSA 2008-01 aka CVE-2008-0413: Crashes with evidence of memory corruption v1.8.1.12 (javascript crashes) * MFSA 2008-02 aka CVE-2008-0414: Multiple file input focus stealing vulnerabilities: 1. Focus shifting bugs and 2. Selective keystroke blocking bugs * MFSA 2008-03 aka CVE-2008-0415: Privilege escalation, XSS, Remote Code Execution (JavaScript privilege escalation bugs) * MFSA 2008-04 aka CVE-2008-0417: Stored password corruption * MFSA 2008-05 aka CVE-2008-0418: Directory traversal via chrome: URI * MFSA 2008-06 aka CVE-2008-0419: Web browsing history and forward navigation stealing * MFSA 2008-08 aka CVE-2008-0591: File action dialog tampering * MFSA 2008-09 aka CVE-2008-0592: Mishandling of locally-saved plain text files * MFSA 2008-10 aka CVE-2008-0593: URL token stealing via stylesheet redirect * MFSA 2008-11 aka CVE-2008-0594: Web forgery overwrite with div overlay stable/main/binary-s390/xulrunner_1.8.0.15~pre080131b-0etch1_s390.deb stable/main/binary-s390/libmozjs0d-dbg_1.8.0.15~pre080131b-0etch1_s390.deb stable/main/binary-s390/libnspr4-0d-dbg_1.8.0.15~pre080131b-0etch1_s390.deb stable/main/binary-s390/libnss3-0d_1.8.0.15~pre080131b-0etch1_s390.deb stable/main/binary-s390/libmozjs0d_1.8.0.15~pre080131b-0etch1_s390.deb stable/main/binary-s390/libnss3-0d-dbg_1.8.0.15~pre080131b-0etch1_s390.deb stable/main/binary-s390/spidermonkey-bin_1.8.0.15~pre080131b-0etch1_s390.deb stable/main/binary-s390/xulrunner-gnome-support_1.8.0.15~pre080131b-0etch1_s390.deb stable/main/binary-s390/libnss3-tools_1.8.0.15~pre080131b-0etch1_s390.deb stable/main/binary-s390/python-xpcom_1.8.0.15~pre080131b-0etch1_s390.deb stable/main/binary-s390/libnspr4-0d_1.8.0.15~pre080131b-0etch1_s390.deb stable/main/binary-s390/libxul0d_1.8.0.15~pre080131b-0etch1_s390.deb stable/main/binary-s390/libxul0d-dbg_1.8.0.15~pre080131b-0etch1_s390.deb xulrunner (1.8.0.15~pre080131b-0etch1) stable-security; urgency=critical [ Alexander Sack ] * New security/stability upstream release (backports for v2.0.0.12) * MFSA 2008-01 aka CVE-2008-0412: Crashes with evidence of memory corruption v1.8.1.12 (Browser crashes) * MFSA 2008-01 aka CVE-2008-0413: Crashes with evidence of memory corruption v1.8.1.12 (javascript crashes) * MFSA 2008-02 aka CVE-2008-0414: Multiple file input focus stealing vulnerabilities: 1. Focus shifting bugs and 2. Selective keystroke blocking bugs * MFSA 2008-03 aka CVE-2008-0415: Privilege escalation, XSS, Remote Code Execution (JavaScript privilege escalation bugs) * MFSA 2008-04 aka CVE-2008-0417: Stored password corruption * MFSA 2008-05 aka CVE-2008-0418: Directory traversal via chrome: URI * MFSA 2008-06 aka CVE-2008-0419: Web browsing history and forward navigation stealing * MFSA 2008-08 aka CVE-2008-0591: File action dialog tampering * MFSA 2008-09 aka CVE-2008-0592: Mishandling of locally-saved plain text files * MFSA 2008-10 aka CVE-2008-0593: URL token stealing via stylesheet redirect * MFSA 2008-11 aka CVE-2008-0594: Web forgery overwrite with div overlay stable/main/binary-powerpc/spidermonkey-bin_1.8.0.15~pre080131b-0etch1_powerpc.deb stable/main/binary-powerpc/libnss3-tools_1.8.0.15~pre080131b-0etch1_powerpc.deb stable/main/binary-powerpc/libnspr4-0d-dbg_1.8.0.15~pre080131b-0etch1_powerpc.deb stable/main/binary-powerpc/xulrunner-gnome-support_1.8.0.15~pre080131b-0etch1_powerpc.deb stable/main/binary-powerpc/libmozjs0d-dbg_1.8.0.15~pre080131b-0etch1_powerpc.deb stable/main/binary-powerpc/libmozjs0d_1.8.0.15~pre080131b-0etch1_powerpc.deb stable/main/binary-powerpc/xulrunner_1.8.0.15~pre080131b-0etch1_powerpc.deb stable/main/binary-powerpc/libnspr4-0d_1.8.0.15~pre080131b-0etch1_powerpc.deb stable/main/binary-powerpc/libxul0d-dbg_1.8.0.15~pre080131b-0etch1_powerpc.deb stable/main/binary-powerpc/libxul0d_1.8.0.15~pre080131b-0etch1_powerpc.deb stable/main/binary-powerpc/libnss3-0d-dbg_1.8.0.15~pre080131b-0etch1_powerpc.deb stable/main/binary-powerpc/libnss3-0d_1.8.0.15~pre080131b-0etch1_powerpc.deb stable/main/binary-powerpc/python-xpcom_1.8.0.15~pre080131b-0etch1_powerpc.deb xulrunner (1.8.0.15~pre080131b-0etch1) stable-security; urgency=critical [ Alexander Sack ] * New security/stability upstream release (backports for v2.0.0.12) * MFSA 2008-01 aka CVE-2008-0412: Crashes with evidence of memory corruption v1.8.1.12 (Browser crashes) * MFSA 2008-01 aka CVE-2008-0413: Crashes with evidence of memory corruption v1.8.1.12 (javascript crashes) * MFSA 2008-02 aka CVE-2008-0414: Multiple file input focus stealing vulnerabilities: 1. Focus shifting bugs and 2. Selective keystroke blocking bugs * MFSA 2008-03 aka CVE-2008-0415: Privilege escalation, XSS, Remote Code Execution (JavaScript privilege escalation bugs) * MFSA 2008-04 aka CVE-2008-0417: Stored password corruption * MFSA 2008-05 aka CVE-2008-0418: Directory traversal via chrome: URI * MFSA 2008-06 aka CVE-2008-0419: Web browsing history and forward navigation stealing * MFSA 2008-08 aka CVE-2008-0591: File action dialog tampering * MFSA 2008-09 aka CVE-2008-0592: Mishandling of locally-saved plain text files * MFSA 2008-10 aka CVE-2008-0593: URL token stealing via stylesheet redirect * MFSA 2008-11 aka CVE-2008-0594: Web forgery overwrite with div overlay stable/main/binary-mipsel/xulrunner_1.8.0.15~pre080131b-0etch1_mipsel.deb stable/main/binary-mipsel/libnspr4-0d-dbg_1.8.0.15~pre080131b-0etch1_mipsel.deb stable/main/binary-mipsel/xulrunner-gnome-support_1.8.0.15~pre080131b-0etch1_mipsel.deb stable/main/binary-mipsel/libxul0d_1.8.0.15~pre080131b-0etch1_mipsel.deb stable/main/binary-mipsel/libmozjs0d_1.8.0.15~pre080131b-0etch1_mipsel.deb stable/main/binary-mipsel/libnss3-tools_1.8.0.15~pre080131b-0etch1_mipsel.deb stable/main/binary-mipsel/libnss3-0d-dbg_1.8.0.15~pre080131b-0etch1_mipsel.deb stable/main/binary-mipsel/spidermonkey-bin_1.8.0.15~pre080131b-0etch1_mipsel.deb stable/main/binary-mipsel/python-xpcom_1.8.0.15~pre080131b-0etch1_mipsel.deb stable/main/binary-mipsel/libmozjs0d-dbg_1.8.0.15~pre080131b-0etch1_mipsel.deb stable/main/binary-mipsel/libnss3-0d_1.8.0.15~pre080131b-0etch1_mipsel.deb stable/main/binary-mipsel/libnspr4-0d_1.8.0.15~pre080131b-0etch1_mipsel.deb stable/main/binary-mipsel/libxul0d-dbg_1.8.0.15~pre080131b-0etch1_mipsel.deb xulrunner (1.8.0.15~pre080131b-0etch1) stable-security; urgency=critical [ Alexander Sack ] * New security/stability upstream release (backports for v2.0.0.12) * MFSA 2008-01 aka CVE-2008-0412: Crashes with evidence of memory corruption v1.8.1.12 (Browser crashes) * MFSA 2008-01 aka CVE-2008-0413: Crashes with evidence of memory corruption v1.8.1.12 (javascript crashes) * MFSA 2008-02 aka CVE-2008-0414: Multiple file input focus stealing vulnerabilities: 1. Focus shifting bugs and 2. Selective keystroke blocking bugs * MFSA 2008-03 aka CVE-2008-0415: Privilege escalation, XSS, Remote Code Execution (JavaScript privilege escalation bugs) * MFSA 2008-04 aka CVE-2008-0417: Stored password corruption * MFSA 2008-05 aka CVE-2008-0418: Directory traversal via chrome: URI * MFSA 2008-06 aka CVE-2008-0419: Web browsing history and forward navigation stealing * MFSA 2008-08 aka CVE-2008-0591: File action dialog tampering * MFSA 2008-09 aka CVE-2008-0592: Mishandling of locally-saved plain text files * MFSA 2008-10 aka CVE-2008-0593: URL token stealing via stylesheet redirect * MFSA 2008-11 aka CVE-2008-0594: Web forgery overwrite with div overlay stable/main/binary-mips/libnspr4-0d-dbg_1.8.0.15~pre080131b-0etch1_mips.deb stable/main/binary-mips/libnss3-0d_1.8.0.15~pre080131b-0etch1_mips.deb stable/main/binary-mips/xulrunner-gnome-support_1.8.0.15~pre080131b-0etch1_mips.deb stable/main/binary-mips/libmozjs0d_1.8.0.15~pre080131b-0etch1_mips.deb stable/main/binary-mips/python-xpcom_1.8.0.15~pre080131b-0etch1_mips.deb stable/main/binary-mips/libnspr4-0d_1.8.0.15~pre080131b-0etch1_mips.deb stable/main/binary-mips/xulrunner_1.8.0.15~pre080131b-0etch1_mips.deb stable/main/binary-mips/libnss3-tools_1.8.0.15~pre080131b-0etch1_mips.deb stable/main/binary-mips/libxul0d-dbg_1.8.0.15~pre080131b-0etch1_mips.deb stable/main/binary-mips/libnss3-0d-dbg_1.8.0.15~pre080131b-0etch1_mips.deb stable/main/binary-mips/spidermonkey-bin_1.8.0.15~pre080131b-0etch1_mips.deb stable/main/binary-mips/libmozjs0d-dbg_1.8.0.15~pre080131b-0etch1_mips.deb stable/main/binary-mips/libxul0d_1.8.0.15~pre080131b-0etch1_mips.deb xulrunner (1.8.0.15~pre080131b-0etch1) stable-security; urgency=critical [ Alexander Sack ] * New security/stability upstream release (backports for v2.0.0.12) * MFSA 2008-01 aka CVE-2008-0412: Crashes with evidence of memory corruption v1.8.1.12 (Browser crashes) * MFSA 2008-01 aka CVE-2008-0413: Crashes with evidence of memory corruption v1.8.1.12 (javascript crashes) * MFSA 2008-02 aka CVE-2008-0414: Multiple file input focus stealing vulnerabilities: 1. Focus shifting bugs and 2. Selective keystroke blocking bugs * MFSA 2008-03 aka CVE-2008-0415: Privilege escalation, XSS, Remote Code Execution (JavaScript privilege escalation bugs) * MFSA 2008-04 aka CVE-2008-0417: Stored password corruption * MFSA 2008-05 aka CVE-2008-0418: Directory traversal via chrome: URI * MFSA 2008-06 aka CVE-2008-0419: Web browsing history and forward navigation stealing * MFSA 2008-08 aka CVE-2008-0591: File action dialog tampering * MFSA 2008-09 aka CVE-2008-0592: Mishandling of locally-saved plain text files * MFSA 2008-10 aka CVE-2008-0593: URL token stealing via stylesheet redirect * MFSA 2008-11 aka CVE-2008-0594: Web forgery overwrite with div overlay stable/main/binary-ia64/libnspr4-0d_1.8.0.15~pre080131b-0etch1_ia64.deb stable/main/binary-ia64/libmozjs0d_1.8.0.15~pre080131b-0etch1_ia64.deb stable/main/binary-ia64/libnspr4-0d-dbg_1.8.0.15~pre080131b-0etch1_ia64.deb stable/main/binary-ia64/libxul0d-dbg_1.8.0.15~pre080131b-0etch1_ia64.deb stable/main/binary-ia64/spidermonkey-bin_1.8.0.15~pre080131b-0etch1_ia64.deb stable/main/binary-ia64/libmozjs0d-dbg_1.8.0.15~pre080131b-0etch1_ia64.deb stable/main/binary-ia64/xulrunner-gnome-support_1.8.0.15~pre080131b-0etch1_ia64.deb stable/main/binary-ia64/libnss3-0d-dbg_1.8.0.15~pre080131b-0etch1_ia64.deb stable/main/binary-ia64/libnss3-tools_1.8.0.15~pre080131b-0etch1_ia64.deb stable/main/binary-ia64/libxul0d_1.8.0.15~pre080131b-0etch1_ia64.deb stable/main/binary-ia64/libnss3-0d_1.8.0.15~pre080131b-0etch1_ia64.deb stable/main/binary-ia64/xulrunner_1.8.0.15~pre080131b-0etch1_ia64.deb stable/main/binary-ia64/python-xpcom_1.8.0.15~pre080131b-0etch1_ia64.deb xulrunner (1.8.0.15~pre080131b-0etch1) stable-security; urgency=critical [ Alexander Sack ] * New security/stability upstream release (backports for v2.0.0.12) * MFSA 2008-01 aka CVE-2008-0412: Crashes with evidence of memory corruption v1.8.1.12 (Browser crashes) * MFSA 2008-01 aka CVE-2008-0413: Crashes with evidence of memory corruption v1.8.1.12 (javascript crashes) * MFSA 2008-02 aka CVE-2008-0414: Multiple file input focus stealing vulnerabilities: 1. Focus shifting bugs and 2. Selective keystroke blocking bugs * MFSA 2008-03 aka CVE-2008-0415: Privilege escalation, XSS, Remote Code Execution (JavaScript privilege escalation bugs) * MFSA 2008-04 aka CVE-2008-0417: Stored password corruption * MFSA 2008-05 aka CVE-2008-0418: Directory traversal via chrome: URI * MFSA 2008-06 aka CVE-2008-0419: Web browsing history and forward navigation stealing * MFSA 2008-08 aka CVE-2008-0591: File action dialog tampering * MFSA 2008-09 aka CVE-2008-0592: Mishandling of locally-saved plain text files * MFSA 2008-10 aka CVE-2008-0593: URL token stealing via stylesheet redirect * MFSA 2008-11 aka CVE-2008-0594: Web forgery overwrite with div overlay stable/main/binary-i386/libmozjs0d-dbg_1.8.0.15~pre080131b-0etch1_i386.deb stable/main/binary-i386/libnspr4-0d-dbg_1.8.0.15~pre080131b-0etch1_i386.deb stable/main/binary-i386/libnss3-tools_1.8.0.15~pre080131b-0etch1_i386.deb stable/main/binary-i386/xulrunner-gnome-support_1.8.0.15~pre080131b-0etch1_i386.deb stable/main/binary-i386/libxul0d_1.8.0.15~pre080131b-0etch1_i386.deb stable/main/binary-i386/libxul0d-dbg_1.8.0.15~pre080131b-0etch1_i386.deb stable/main/binary-i386/spidermonkey-bin_1.8.0.15~pre080131b-0etch1_i386.deb stable/main/binary-i386/python-xpcom_1.8.0.15~pre080131b-0etch1_i386.deb stable/main/binary-i386/xulrunner_1.8.0.15~pre080131b-0etch1_i386.deb stable/main/binary-i386/libnss3-0d_1.8.0.15~pre080131b-0etch1_i386.deb stable/main/binary-i386/libmozjs0d_1.8.0.15~pre080131b-0etch1_i386.deb stable/main/binary-i386/libnss3-0d-dbg_1.8.0.15~pre080131b-0etch1_i386.deb stable/main/binary-i386/libnspr4-0d_1.8.0.15~pre080131b-0etch1_i386.deb xulrunner (1.8.0.15~pre080131b-0etch1) stable-security; urgency=critical [ Alexander Sack ] * New security/stability upstream release (backports for v2.0.0.12) * MFSA 2008-01 aka CVE-2008-0412: Crashes with evidence of memory corruption v1.8.1.12 (Browser crashes) * MFSA 2008-01 aka CVE-2008-0413: Crashes with evidence of memory corruption v1.8.1.12 (javascript crashes) * MFSA 2008-02 aka CVE-2008-0414: Multiple file input focus stealing vulnerabilities: 1. Focus shifting bugs and 2. Selective keystroke blocking bugs * MFSA 2008-03 aka CVE-2008-0415: Privilege escalation, XSS, Remote Code Execution (JavaScript privilege escalation bugs) * MFSA 2008-04 aka CVE-2008-0417: Stored password corruption * MFSA 2008-05 aka CVE-2008-0418: Directory traversal via chrome: URI * MFSA 2008-06 aka CVE-2008-0419: Web browsing history and forward navigation stealing * MFSA 2008-08 aka CVE-2008-0591: File action dialog tampering * MFSA 2008-09 aka CVE-2008-0592: Mishandling of locally-saved plain text files * MFSA 2008-10 aka CVE-2008-0593: URL token stealing via stylesheet redirect * MFSA 2008-11 aka CVE-2008-0594: Web forgery overwrite with div overlay stable/main/binary-hppa/spidermonkey-bin_1.8.0.15~pre080131b-0etch1_hppa.deb stable/main/binary-hppa/libnspr4-0d-dbg_1.8.0.15~pre080131b-0etch1_hppa.deb stable/main/binary-hppa/libnss3-tools_1.8.0.15~pre080131b-0etch1_hppa.deb stable/main/binary-hppa/xulrunner_1.8.0.15~pre080131b-0etch1_hppa.deb stable/main/binary-hppa/libmozjs0d_1.8.0.15~pre080131b-0etch1_hppa.deb stable/main/binary-hppa/libxul0d_1.8.0.15~pre080131b-0etch1_hppa.deb stable/main/binary-hppa/libnss3-0d-dbg_1.8.0.15~pre080131b-0etch1_hppa.deb stable/main/binary-hppa/python-xpcom_1.8.0.15~pre080131b-0etch1_hppa.deb stable/main/binary-hppa/xulrunner-gnome-support_1.8.0.15~pre080131b-0etch1_hppa.deb stable/main/binary-hppa/libxul0d-dbg_1.8.0.15~pre080131b-0etch1_hppa.deb stable/main/binary-hppa/libnspr4-0d_1.8.0.15~pre080131b-0etch1_hppa.deb stable/main/binary-hppa/libnss3-0d_1.8.0.15~pre080131b-0etch1_hppa.deb stable/main/binary-hppa/libmozjs0d-dbg_1.8.0.15~pre080131b-0etch1_hppa.deb xulrunner (1.8.0.15~pre080131b-0etch1) stable-security; urgency=critical [ Alexander Sack ] * New security/stability upstream release (backports for v2.0.0.12) * MFSA 2008-01 aka CVE-2008-0412: Crashes with evidence of memory corruption v1.8.1.12 (Browser crashes) * MFSA 2008-01 aka CVE-2008-0413: Crashes with evidence of memory corruption v1.8.1.12 (javascript crashes) * MFSA 2008-02 aka CVE-2008-0414: Multiple file input focus stealing vulnerabilities: 1. Focus shifting bugs and 2. Selective keystroke blocking bugs * MFSA 2008-03 aka CVE-2008-0415: Privilege escalation, XSS, Remote Code Execution (JavaScript privilege escalation bugs) * MFSA 2008-04 aka CVE-2008-0417: Stored password corruption * MFSA 2008-05 aka CVE-2008-0418: Directory traversal via chrome: URI * MFSA 2008-06 aka CVE-2008-0419: Web browsing history and forward navigation stealing * MFSA 2008-08 aka CVE-2008-0591: File action dialog tampering * MFSA 2008-09 aka CVE-2008-0592: Mishandling of locally-saved plain text files * MFSA 2008-10 aka CVE-2008-0593: URL token stealing via stylesheet redirect * MFSA 2008-11 aka CVE-2008-0594: Web forgery overwrite with div overlay stable/main/binary-arm/xulrunner_1.8.0.15~pre080131b-0etch1_arm.deb stable/main/binary-arm/libmozjs0d_1.8.0.15~pre080131b-0etch1_arm.deb stable/main/binary-arm/libxul0d-dbg_1.8.0.15~pre080131b-0etch1_arm.deb stable/main/binary-arm/libmozjs0d-dbg_1.8.0.15~pre080131b-0etch1_arm.deb stable/main/binary-arm/python-xpcom_1.8.0.15~pre080131b-0etch1_arm.deb stable/main/binary-arm/libnss3-0d_1.8.0.15~pre080131b-0etch1_arm.deb stable/main/binary-arm/libnss3-0d-dbg_1.8.0.15~pre080131b-0etch1_arm.deb stable/main/binary-arm/libxul0d_1.8.0.15~pre080131b-0etch1_arm.deb stable/main/binary-arm/xulrunner-gnome-support_1.8.0.15~pre080131b-0etch1_arm.deb stable/main/binary-arm/libnspr4-0d_1.8.0.15~pre080131b-0etch1_arm.deb stable/main/binary-arm/libnss3-tools_1.8.0.15~pre080131b-0etch1_arm.deb stable/main/binary-arm/libnspr4-0d-dbg_1.8.0.15~pre080131b-0etch1_arm.deb stable/main/binary-arm/spidermonkey-bin_1.8.0.15~pre080131b-0etch1_arm.deb xulrunner (1.8.0.15~pre080131b-0etch1) stable-security; urgency=critical [ Alexander Sack ] * New security/stability upstream release (backports for v2.0.0.12) * MFSA 2008-01 aka CVE-2008-0412: Crashes with evidence of memory corruption v1.8.1.12 (Browser crashes) * MFSA 2008-01 aka CVE-2008-0413: Crashes with evidence of memory corruption v1.8.1.12 (javascript crashes) * MFSA 2008-02 aka CVE-2008-0414: Multiple file input focus stealing vulnerabilities: 1. Focus shifting bugs and 2. Selective keystroke blocking bugs * MFSA 2008-03 aka CVE-2008-0415: Privilege escalation, XSS, Remote Code Execution (JavaScript privilege escalation bugs) * MFSA 2008-04 aka CVE-2008-0417: Stored password corruption * MFSA 2008-05 aka CVE-2008-0418: Directory traversal via chrome: URI * MFSA 2008-06 aka CVE-2008-0419: Web browsing history and forward navigation stealing * MFSA 2008-08 aka CVE-2008-0591: File action dialog tampering * MFSA 2008-09 aka CVE-2008-0592: Mishandling of locally-saved plain text files * MFSA 2008-10 aka CVE-2008-0593: URL token stealing via stylesheet redirect * MFSA 2008-11 aka CVE-2008-0594: Web forgery overwrite with div overlay stable/main/binary-alpha/libnspr4-0d-dbg_1.8.0.15~pre080131b-0etch1_alpha.deb stable/main/binary-alpha/libmozjs0d-dbg_1.8.0.15~pre080131b-0etch1_alpha.deb stable/main/binary-alpha/libnss3-0d_1.8.0.15~pre080131b-0etch1_alpha.deb stable/main/binary-alpha/libnss3-0d-dbg_1.8.0.15~pre080131b-0etch1_alpha.deb stable/main/binary-alpha/xulrunner_1.8.0.15~pre080131b-0etch1_alpha.deb stable/main/binary-alpha/libmozjs0d_1.8.0.15~pre080131b-0etch1_alpha.deb stable/main/binary-alpha/libxul0d_1.8.0.15~pre080131b-0etch1_alpha.deb stable/main/binary-alpha/python-xpcom_1.8.0.15~pre080131b-0etch1_alpha.deb stable/main/binary-alpha/libxul0d-dbg_1.8.0.15~pre080131b-0etch1_alpha.deb stable/main/binary-alpha/spidermonkey-bin_1.8.0.15~pre080131b-0etch1_alpha.deb stable/main/binary-alpha/libnss3-tools_1.8.0.15~pre080131b-0etch1_alpha.deb stable/main/binary-alpha/xulrunner-gnome-support_1.8.0.15~pre080131b-0etch1_alpha.deb stable/main/binary-alpha/libnspr4-0d_1.8.0.15~pre080131b-0etch1_alpha.deb xulrunner (1.8.0.15~pre080131b-0etch1) stable-security; urgency=critical [ Alexander Sack ] * New security/stability upstream release (backports for v2.0.0.12) * MFSA 2008-01 aka CVE-2008-0412: Crashes with evidence of memory corruption v1.8.1.12 (Browser crashes) * MFSA 2008-01 aka CVE-2008-0413: Crashes with evidence of memory corruption v1.8.1.12 (javascript crashes) * MFSA 2008-02 aka CVE-2008-0414: Multiple file input focus stealing vulnerabilities: 1. Focus shifting bugs and 2. Selective keystroke blocking bugs * MFSA 2008-03 aka CVE-2008-0415: Privilege escalation, XSS, Remote Code Execution (JavaScript privilege escalation bugs) * MFSA 2008-04 aka CVE-2008-0417: Stored password corruption * MFSA 2008-05 aka CVE-2008-0418: Directory traversal via chrome: URI * MFSA 2008-06 aka CVE-2008-0419: Web browsing history and forward navigation stealing * MFSA 2008-08 aka CVE-2008-0591: File action dialog tampering * MFSA 2008-09 aka CVE-2008-0592: Mishandling of locally-saved plain text files * MFSA 2008-10 aka CVE-2008-0593: URL token stealing via stylesheet redirect * MFSA 2008-11 aka CVE-2008-0594: Web forgery overwrite with div overlay stable/main/binary-all/libxul-common_1.8.0.15~pre080131b-0etch1_all.deb stable/main/binary-all/libmozjs-dev_1.8.0.15~pre080131b-0etch1_all.deb stable/main/source/xulrunner_1.8.0.15~pre080131b-0etch1.dsc stable/main/binary-all/libxul-dev_1.8.0.15~pre080131b-0etch1_all.deb stable/main/binary-amd64/libnspr4-0d_1.8.0.15~pre080131b-0etch1_amd64.deb stable/main/binary-amd64/xulrunner-gnome-support_1.8.0.15~pre080131b-0etch1_amd64.deb stable/main/binary-all/libnspr4-dev_1.8.0.15~pre080131b-0etch1_all.deb stable/main/binary-all/libmozillainterfaces-java_1.8.0.15~pre080131b-0etch1_all.deb stable/main/binary-amd64/libnspr4-0d-dbg_1.8.0.15~pre080131b-0etch1_amd64.deb stable/main/source/xulrunner_1.8.0.15~pre080131b.orig.tar.gz stable/main/source/xulrunner_1.8.0.15~pre080131b-0etch1.diff.gz stable/main/binary-amd64/libnss3-0d_1.8.0.15~pre080131b-0etch1_amd64.deb stable/main/binary-all/libnss3-dev_1.8.0.15~pre080131b-0etch1_all.deb stable/main/binary-amd64/libxul0d-dbg_1.8.0.15~pre080131b-0etch1_amd64.deb stable/main/binary-amd64/python-xpcom_1.8.0.15~pre080131b-0etch1_amd64.deb stable/main/binary-all/libsmjs-dev_1.8.0.15~pre080131b-0etch1_all.deb stable/main/binary-amd64/libnss3-0d-dbg_1.8.0.15~pre080131b-0etch1_amd64.deb stable/main/binary-all/libsmjs1_1.8.0.15~pre080131b-0etch1_all.deb stable/main/binary-amd64/libxul0d_1.8.0.15~pre080131b-0etch1_amd64.deb stable/main/binary-amd64/libnss3-tools_1.8.0.15~pre080131b-0etch1_amd64.deb stable/main/binary-amd64/libmozjs0d_1.8.0.15~pre080131b-0etch1_amd64.deb stable/main/binary-amd64/spidermonkey-bin_1.8.0.15~pre080131b-0etch1_amd64.deb stable/main/binary-amd64/xulrunner_1.8.0.15~pre080131b-0etch1_amd64.deb stable/main/binary-amd64/libmozjs0d-dbg_1.8.0.15~pre080131b-0etch1_amd64.deb xulrunner (1.8.0.15~pre080131b-0etch1) stable-security; urgency=critical [ Alexander Sack ] * New security/stability upstream release (backports for v2.0.0.12) * MFSA 2008-01 aka CVE-2008-0412: Crashes with evidence of memory corruption v1.8.1.12 (Browser crashes) * MFSA 2008-01 aka CVE-2008-0413: Crashes with evidence of memory corruption v1.8.1.12 (javascript crashes) * MFSA 2008-02 aka CVE-2008-0414: Multiple file input focus stealing vulnerabilities: 1. Focus shifting bugs and 2. Selective keystroke blocking bugs * MFSA 2008-03 aka CVE-2008-0415: Privilege escalation, XSS, Remote Code Execution (JavaScript privilege escalation bugs) * MFSA 2008-04 aka CVE-2008-0417: Stored password corruption * MFSA 2008-05 aka CVE-2008-0418: Directory traversal via chrome: URI * MFSA 2008-06 aka CVE-2008-0419: Web browsing history and forward navigation stealing * MFSA 2008-08 aka CVE-2008-0591: File action dialog tampering * MFSA 2008-09 aka CVE-2008-0592: Mishandling of locally-saved plain text files * MFSA 2008-10 aka CVE-2008-0593: URL token stealing via stylesheet redirect * MFSA 2008-11 aka CVE-2008-0594: Web forgery overwrite with div overlay stable/main/binary-sparc/xdmx_1.1.1-21etch4_sparc.deb stable/main/binary-sparc/xnest_1.1.1-21etch4_sparc.deb stable/main/binary-sparc/xvfb_1.1.1-21etch4_sparc.deb stable/main/binary-sparc/xserver-xorg-core_1.1.1-21etch4_sparc.deb stable/main/binary-sparc/xserver-xephyr_1.1.1-21etch4_sparc.deb stable/main/binary-sparc/xdmx-tools_1.1.1-21etch4_sparc.deb stable/main/binary-sparc/xserver-xorg-dev_1.1.1-21etch4_sparc.deb xorg-server (2:1.1.1-21etch4) stable; urgency=low [ Julien Cristau ] * Add patch by Michael Karcher to fix inline asm in fb/fbpict.c. On processors without the cpuid instruction, the X server would get a SIGILL (closes: #353494). [ Brice Goglin ] * Add myself to Uploaders. stable/main/binary-s390/xdmx_1.1.1-21etch4_s390.deb stable/main/binary-s390/xdmx-tools_1.1.1-21etch4_s390.deb stable/main/binary-s390/xvfb_1.1.1-21etch4_s390.deb stable/main/binary-s390/xserver-xorg-core_1.1.1-21etch4_s390.deb stable/main/binary-s390/xserver-xephyr_1.1.1-21etch4_s390.deb stable/main/binary-s390/xserver-xorg-dev_1.1.1-21etch4_s390.deb stable/main/binary-s390/xnest_1.1.1-21etch4_s390.deb xorg-server (2:1.1.1-21etch4) stable; urgency=low [ Julien Cristau ] * Add patch by Michael Karcher to fix inline asm in fb/fbpict.c. On processors without the cpuid instruction, the X server would get a SIGILL (closes: #353494). [ Brice Goglin ] * Add myself to Uploaders. stable/main/binary-powerpc/xvfb_1.1.1-21etch4_powerpc.deb stable/main/binary-powerpc/xdmx_1.1.1-21etch4_powerpc.deb stable/main/binary-powerpc/xserver-xorg-core_1.1.1-21etch4_powerpc.deb stable/main/binary-powerpc/xserver-xorg-dev_1.1.1-21etch4_powerpc.deb stable/main/binary-powerpc/xnest_1.1.1-21etch4_powerpc.deb stable/main/binary-powerpc/xserver-xephyr_1.1.1-21etch4_powerpc.deb stable/main/binary-powerpc/xdmx-tools_1.1.1-21etch4_powerpc.deb xorg-server (2:1.1.1-21etch4) stable; urgency=low [ Julien Cristau ] * Add patch by Michael Karcher to fix inline asm in fb/fbpict.c. On processors without the cpuid instruction, the X server would get a SIGILL (closes: #353494). [ Brice Goglin ] * Add myself to Uploaders. stable/main/binary-mipsel/xserver-xorg-core_1.1.1-21etch4_mipsel.deb stable/main/binary-mipsel/xserver-xorg-dev_1.1.1-21etch4_mipsel.deb stable/main/binary-mipsel/xdmx-tools_1.1.1-21etch4_mipsel.deb stable/main/binary-mipsel/xvfb_1.1.1-21etch4_mipsel.deb stable/main/binary-mipsel/xnest_1.1.1-21etch4_mipsel.deb stable/main/binary-mipsel/xdmx_1.1.1-21etch4_mipsel.deb stable/main/binary-mipsel/xserver-xephyr_1.1.1-21etch4_mipsel.deb xorg-server (2:1.1.1-21etch4) stable; urgency=low [ Julien Cristau ] * Add patch by Michael Karcher to fix inline asm in fb/fbpict.c. On processors without the cpuid instruction, the X server would get a SIGILL (closes: #353494). [ Brice Goglin ] * Add myself to Uploaders. stable/main/binary-mips/xserver-xephyr_1.1.1-21etch4_mips.deb stable/main/binary-mips/xserver-xorg-core_1.1.1-21etch4_mips.deb stable/main/binary-mips/xdmx-tools_1.1.1-21etch4_mips.deb stable/main/binary-mips/xvfb_1.1.1-21etch4_mips.deb stable/main/binary-mips/xdmx_1.1.1-21etch4_mips.deb stable/main/binary-mips/xserver-xorg-dev_1.1.1-21etch4_mips.deb stable/main/binary-mips/xnest_1.1.1-21etch4_mips.deb xorg-server (2:1.1.1-21etch4) stable; urgency=low [ Julien Cristau ] * Add patch by Michael Karcher to fix inline asm in fb/fbpict.c. On processors without the cpuid instruction, the X server would get a SIGILL (closes: #353494). [ Brice Goglin ] * Add myself to Uploaders. stable/main/binary-ia64/xdmx-tools_1.1.1-21etch4_ia64.deb stable/main/binary-ia64/xdmx_1.1.1-21etch4_ia64.deb stable/main/binary-ia64/xserver-xephyr_1.1.1-21etch4_ia64.deb stable/main/binary-ia64/xserver-xorg-core_1.1.1-21etch4_ia64.deb stable/main/binary-ia64/xserver-xorg-dev_1.1.1-21etch4_ia64.deb stable/main/binary-ia64/xnest_1.1.1-21etch4_ia64.deb stable/main/binary-ia64/xvfb_1.1.1-21etch4_ia64.deb xorg-server (2:1.1.1-21etch4) stable; urgency=low [ Julien Cristau ] * Add patch by Michael Karcher to fix inline asm in fb/fbpict.c. On processors without the cpuid instruction, the X server would get a SIGILL (closes: #353494). [ Brice Goglin ] * Add myself to Uploaders. stable/main/binary-hppa/xvfb_1.1.1-21etch4_hppa.deb stable/main/binary-hppa/xserver-xephyr_1.1.1-21etch4_hppa.deb stable/main/binary-hppa/xdmx-tools_1.1.1-21etch4_hppa.deb stable/main/binary-hppa/xserver-xorg-dev_1.1.1-21etch4_hppa.deb stable/main/binary-hppa/xnest_1.1.1-21etch4_hppa.deb stable/main/binary-hppa/xserver-xorg-core_1.1.1-21etch4_hppa.deb stable/main/binary-hppa/xdmx_1.1.1-21etch4_hppa.deb xorg-server (2:1.1.1-21etch4) stable; urgency=low [ Julien Cristau ] * Add patch by Michael Karcher to fix inline asm in fb/fbpict.c. On processors without the cpuid instruction, the X server would get a SIGILL (closes: #353494). [ Brice Goglin ] * Add myself to Uploaders. stable/main/binary-arm/xvfb_1.1.1-21etch4_arm.deb stable/main/binary-arm/xnest_1.1.1-21etch4_arm.deb stable/main/binary-arm/xserver-xephyr_1.1.1-21etch4_arm.deb stable/main/binary-arm/xserver-xorg-dev_1.1.1-21etch4_arm.deb stable/main/binary-arm/xdmx_1.1.1-21etch4_arm.deb stable/main/binary-arm/xdmx-tools_1.1.1-21etch4_arm.deb stable/main/binary-arm/xserver-xorg-core_1.1.1-21etch4_arm.deb xorg-server (2:1.1.1-21etch4) stable; urgency=low [ Julien Cristau ] * Add patch by Michael Karcher to fix inline asm in fb/fbpict.c. On processors without the cpuid instruction, the X server would get a SIGILL (closes: #353494). [ Brice Goglin ] * Add myself to Uploaders. stable/main/binary-amd64/xserver-xorg-dev_1.1.1-21etch4_amd64.deb stable/main/binary-amd64/xserver-xephyr_1.1.1-21etch4_amd64.deb stable/main/binary-amd64/xdmx_1.1.1-21etch4_amd64.deb stable/main/binary-amd64/xserver-xorg-core_1.1.1-21etch4_amd64.deb stable/main/binary-amd64/xdmx-tools_1.1.1-21etch4_amd64.deb stable/main/binary-amd64/xvfb_1.1.1-21etch4_amd64.deb stable/main/binary-amd64/xnest_1.1.1-21etch4_amd64.deb xorg-server (2:1.1.1-21etch4) stable; urgency=low [ Julien Cristau ] * Add patch by Michael Karcher to fix inline asm in fb/fbpict.c. On processors without the cpuid instruction, the X server would get a SIGILL (closes: #353494). [ Brice Goglin ] * Add myself to Uploaders. stable/main/binary-alpha/xserver-xorg-dev_1.1.1-21etch4_alpha.deb stable/main/binary-alpha/xserver-xorg-core_1.1.1-21etch4_alpha.deb stable/main/binary-alpha/xdmx-tools_1.1.1-21etch4_alpha.deb stable/main/binary-alpha/xdmx_1.1.1-21etch4_alpha.deb stable/main/binary-alpha/xserver-xephyr_1.1.1-21etch4_alpha.deb stable/main/binary-alpha/xvfb_1.1.1-21etch4_alpha.deb stable/main/binary-alpha/xnest_1.1.1-21etch4_alpha.deb xorg-server (2:1.1.1-21etch4) stable; urgency=low [ Julien Cristau ] * Add patch by Michael Karcher to fix inline asm in fb/fbpict.c. On processors without the cpuid instruction, the X server would get a SIGILL (closes: #353494). [ Brice Goglin ] * Add myself to Uploaders. stable/main/binary-i386/xserver-xorg-core_1.1.1-21etch4_i386.deb stable/main/binary-i386/xserver-xorg-dev_1.1.1-21etch4_i386.deb stable/main/binary-i386/xserver-xephyr_1.1.1-21etch4_i386.deb stable/main/source/xorg-server_1.1.1-21etch4.diff.gz stable/main/binary-i386/xdmx_1.1.1-21etch4_i386.deb stable/main/source/xorg-server_1.1.1-21etch4.dsc stable/main/binary-i386/xdmx-tools_1.1.1-21etch4_i386.deb stable/main/binary-i386/xnest_1.1.1-21etch4_i386.deb stable/main/binary-i386/xvfb_1.1.1-21etch4_i386.deb xorg-server (2:1.1.1-21etch4) stable; urgency=low [ Julien Cristau ] * Add patch by Michael Karcher to fix inline asm in fb/fbpict.c. On processors without the cpuid instruction, the X server would get a SIGILL (closes: #353494). [ Brice Goglin ] * Add myself to Uploaders. stable/main/binary-sparc/libxine-dev_1.1.2+dfsg-5_sparc.deb stable/main/binary-sparc/libxine1_1.1.2+dfsg-5_sparc.deb stable/main/binary-sparc/libxine1-dbg_1.1.2+dfsg-5_sparc.deb xine-lib (1.1.2+dfsg-5) stable-security; urgency=low * Fix a buffer overflow in RTSP header-handling code. (CVE-2008-0225) (backported from xine-lib 1.1.9.1) stable/main/binary-s390/libxine-dev_1.1.2+dfsg-5_s390.deb stable/main/binary-s390/libxine1_1.1.2+dfsg-5_s390.deb stable/main/binary-s390/libxine1-dbg_1.1.2+dfsg-5_s390.deb xine-lib (1.1.2+dfsg-5) stable-security; urgency=low * Fix a buffer overflow in RTSP header-handling code. (CVE-2008-0225) (backported from xine-lib 1.1.9.1) stable/main/binary-powerpc/libxine1-dbg_1.1.2+dfsg-5_powerpc.deb stable/main/binary-powerpc/libxine-dev_1.1.2+dfsg-5_powerpc.deb stable/main/binary-powerpc/libxine1_1.1.2+dfsg-5_powerpc.deb xine-lib (1.1.2+dfsg-5) stable-security; urgency=low * Fix a buffer overflow in RTSP header-handling code. (CVE-2008-0225) (backported from xine-lib 1.1.9.1) stable/main/binary-mipsel/libxine-dev_1.1.2+dfsg-5_mipsel.deb stable/main/binary-mipsel/libxine1_1.1.2+dfsg-5_mipsel.deb stable/main/binary-mipsel/libxine1-dbg_1.1.2+dfsg-5_mipsel.deb xine-lib (1.1.2+dfsg-5) stable-security; urgency=low * Fix a buffer overflow in RTSP header-handling code. (CVE-2008-0225) (backported from xine-lib 1.1.9.1) stable/main/binary-mips/libxine1_1.1.2+dfsg-5_mips.deb stable/main/binary-mips/libxine-dev_1.1.2+dfsg-5_mips.deb stable/main/binary-mips/libxine1-dbg_1.1.2+dfsg-5_mips.deb xine-lib (1.1.2+dfsg-5) stable-security; urgency=low * Fix a buffer overflow in RTSP header-handling code. (CVE-2008-0225) (backported from xine-lib 1.1.9.1) stable/main/binary-ia64/libxine1-dbg_1.1.2+dfsg-5_ia64.deb stable/main/binary-ia64/libxine1_1.1.2+dfsg-5_ia64.deb stable/main/binary-ia64/libxine-dev_1.1.2+dfsg-5_ia64.deb xine-lib (1.1.2+dfsg-5) stable-security; urgency=low * Fix a buffer overflow in RTSP header-handling code. (CVE-2008-0225) (backported from xine-lib 1.1.9.1) stable/main/binary-hppa/libxine1_1.1.2+dfsg-5_hppa.deb stable/main/binary-hppa/libxine-dev_1.1.2+dfsg-5_hppa.deb stable/main/binary-hppa/libxine1-dbg_1.1.2+dfsg-5_hppa.deb xine-lib (1.1.2+dfsg-5) stable-security; urgency=low * Fix a buffer overflow in RTSP header-handling code. (CVE-2008-0225) (backported from xine-lib 1.1.9.1) stable/main/binary-arm/libxine1_1.1.2+dfsg-5_arm.deb stable/main/binary-arm/libxine-dev_1.1.2+dfsg-5_arm.deb stable/main/binary-arm/libxine1-dbg_1.1.2+dfsg-5_arm.deb xine-lib (1.1.2+dfsg-5) stable-security; urgency=low * Fix a buffer overflow in RTSP header-handling code. (CVE-2008-0225) (backported from xine-lib 1.1.9.1) stable/main/binary-amd64/libxine-dev_1.1.2+dfsg-5_amd64.deb stable/main/binary-amd64/libxine1_1.1.2+dfsg-5_amd64.deb stable/main/binary-amd64/libxine1-dbg_1.1.2+dfsg-5_amd64.deb xine-lib (1.1.2+dfsg-5) stable-security; urgency=low * Fix a buffer overflow in RTSP header-handling code. (CVE-2008-0225) (backported from xine-lib 1.1.9.1) stable/main/binary-alpha/libxine1_1.1.2+dfsg-5_alpha.deb stable/main/binary-alpha/libxine-dev_1.1.2+dfsg-5_alpha.deb stable/main/binary-alpha/libxine1-dbg_1.1.2+dfsg-5_alpha.deb xine-lib (1.1.2+dfsg-5) stable-security; urgency=low * Fix a buffer overflow in RTSP header-handling code. (CVE-2008-0225) (backported from xine-lib 1.1.9.1) stable/main/binary-i386/libxine1_1.1.2+dfsg-5_i386.deb stable/main/source/xine-lib_1.1.2+dfsg-5.dsc stable/main/binary-i386/libxine-dev_1.1.2+dfsg-5_i386.deb stable/main/binary-i386/libxine1-dbg_1.1.2+dfsg-5_i386.deb stable/main/source/xine-lib_1.1.2+dfsg-5.diff.gz xine-lib (1.1.2+dfsg-5) stable-security; urgency=low * Fix a buffer overflow in RTSP header-handling code. (CVE-2008-0225) (backported from xine-lib 1.1.9.1) stable/main/binary-sparc/wzdftpd-back-mysql_0.8.1-2etch1_sparc.deb stable/main/binary-sparc/wzdftpd-mod-tcl_0.8.1-2etch1_sparc.deb stable/main/binary-sparc/wzdftpd-dev_0.8.1-2etch1_sparc.deb stable/main/binary-sparc/wzdftpd-mod-perl_0.8.1-2etch1_sparc.deb stable/main/binary-sparc/wzdftpd_0.8.1-2etch1_sparc.deb stable/main/binary-sparc/wzdftpd-back-pgsql_0.8.1-2etch1_sparc.deb stable/main/binary-sparc/wzdftpd-mod-avahi_0.8.1-2etch1_sparc.deb wzdftpd (0.8.1-2etch1) stable-security; urgency=high * Non-maintainer upload by the security team * Fix off-by-one in wzd_login.c which leads to a remote denial of service vulnerability Fixes: CVE-2007-5300 stable/main/binary-s390/wzdftpd-back-pgsql_0.8.1-2etch1_s390.deb stable/main/binary-s390/wzdftpd_0.8.1-2etch1_s390.deb stable/main/binary-s390/wzdftpd-dev_0.8.1-2etch1_s390.deb stable/main/binary-s390/wzdftpd-mod-avahi_0.8.1-2etch1_s390.deb stable/main/binary-s390/wzdftpd-back-mysql_0.8.1-2etch1_s390.deb stable/main/binary-s390/wzdftpd-mod-tcl_0.8.1-2etch1_s390.deb stable/main/binary-s390/wzdftpd-mod-perl_0.8.1-2etch1_s390.deb wzdftpd (0.8.1-2etch1) stable-security; urgency=high * Non-maintainer upload by the security team * Fix off-by-one in wzd_login.c which leads to a remote denial of service vulnerability Fixes: CVE-2007-5300 stable/main/binary-powerpc/wzdftpd-back-mysql_0.8.1-2etch1_powerpc.deb stable/main/binary-powerpc/wzdftpd-back-pgsql_0.8.1-2etch1_powerpc.deb stable/main/binary-powerpc/wzdftpd-mod-tcl_0.8.1-2etch1_powerpc.deb stable/main/binary-powerpc/wzdftpd-mod-perl_0.8.1-2etch1_powerpc.deb stable/main/binary-powerpc/wzdftpd-mod-avahi_0.8.1-2etch1_powerpc.deb stable/main/binary-powerpc/wzdftpd-dev_0.8.1-2etch1_powerpc.deb stable/main/binary-powerpc/wzdftpd_0.8.1-2etch1_powerpc.deb wzdftpd (0.8.1-2etch1) stable-security; urgency=high * Non-maintainer upload by the security team * Fix off-by-one in wzd_login.c which leads to a remote denial of service vulnerability Fixes: CVE-2007-5300 stable/main/binary-mipsel/wzdftpd-dev_0.8.1-2etch1_mipsel.deb stable/main/binary-mipsel/wzdftpd-back-mysql_0.8.1-2etch1_mipsel.deb stable/main/binary-mipsel/wzdftpd-mod-tcl_0.8.1-2etch1_mipsel.deb stable/main/binary-mipsel/wzdftpd-mod-perl_0.8.1-2etch1_mipsel.deb stable/main/binary-mipsel/wzdftpd-mod-avahi_0.8.1-2etch1_mipsel.deb stable/main/binary-mipsel/wzdftpd-back-pgsql_0.8.1-2etch1_mipsel.deb stable/main/binary-mipsel/wzdftpd_0.8.1-2etch1_mipsel.deb wzdftpd (0.8.1-2etch1) stable-security; urgency=high * Non-maintainer upload by the security team * Fix off-by-one in wzd_login.c which leads to a remote denial of service vulnerability Fixes: CVE-2007-5300 stable/main/binary-mips/wzdftpd-back-mysql_0.8.1-2etch1_mips.deb stable/main/binary-mips/wzdftpd-mod-avahi_0.8.1-2etch1_mips.deb stable/main/binary-mips/wzdftpd-back-pgsql_0.8.1-2etch1_mips.deb stable/main/binary-mips/wzdftpd_0.8.1-2etch1_mips.deb stable/main/binary-mips/wzdftpd-mod-perl_0.8.1-2etch1_mips.deb stable/main/binary-mips/wzdftpd-mod-tcl_0.8.1-2etch1_mips.deb stable/main/binary-mips/wzdftpd-dev_0.8.1-2etch1_mips.deb wzdftpd (0.8.1-2etch1) stable-security; urgency=high * Non-maintainer upload by the security team * Fix off-by-one in wzd_login.c which leads to a remote denial of service vulnerability Fixes: CVE-2007-5300 stable/main/binary-ia64/wzdftpd-back-pgsql_0.8.1-2etch1_ia64.deb stable/main/binary-ia64/wzdftpd_0.8.1-2etch1_ia64.deb stable/main/binary-ia64/wzdftpd-mod-perl_0.8.1-2etch1_ia64.deb stable/main/binary-ia64/wzdftpd-dev_0.8.1-2etch1_ia64.deb stable/main/binary-ia64/wzdftpd-mod-avahi_0.8.1-2etch1_ia64.deb stable/main/binary-ia64/wzdftpd-back-mysql_0.8.1-2etch1_ia64.deb stable/main/binary-ia64/wzdftpd-mod-tcl_0.8.1-2etch1_ia64.deb wzdftpd (0.8.1-2etch1) stable-security; urgency=high * Non-maintainer upload by the security team * Fix off-by-one in wzd_login.c which leads to a remote denial of service vulnerability Fixes: CVE-2007-5300 stable/main/binary-hppa/wzdftpd-mod-perl_0.8.1-2etch1_hppa.deb stable/main/binary-hppa/wzdftpd-mod-tcl_0.8.1-2etch1_hppa.deb stable/main/binary-hppa/wzdftpd-mod-avahi_0.8.1-2etch1_hppa.deb stable/main/binary-hppa/wzdftpd_0.8.1-2etch1_hppa.deb stable/main/binary-hppa/wzdftpd-back-mysql_0.8.1-2etch1_hppa.deb stable/main/binary-hppa/wzdftpd-back-pgsql_0.8.1-2etch1_hppa.deb stable/main/binary-hppa/wzdftpd-dev_0.8.1-2etch1_hppa.deb wzdftpd (0.8.1-2etch1) stable-security; urgency=high * Non-maintainer upload by the security team * Fix off-by-one in wzd_login.c which leads to a remote denial of service vulnerability Fixes: CVE-2007-5300 stable/main/binary-arm/wzdftpd_0.8.1-2etch1_arm.deb stable/main/binary-arm/wzdftpd-mod-avahi_0.8.1-2etch1_arm.deb stable/main/binary-arm/wzdftpd-dev_0.8.1-2etch1_arm.deb stable/main/binary-arm/wzdftpd-mod-tcl_0.8.1-2etch1_arm.deb stable/main/binary-arm/wzdftpd-mod-perl_0.8.1-2etch1_arm.deb stable/main/binary-arm/wzdftpd-back-pgsql_0.8.1-2etch1_arm.deb stable/main/binary-arm/wzdftpd-back-mysql_0.8.1-2etch1_arm.deb wzdftpd (0.8.1-2etch1) stable-security; urgency=high * Non-maintainer upload by the security team * Fix off-by-one in wzd_login.c which leads to a remote denial of service vulnerability Fixes: CVE-2007-5300 stable/main/binary-amd64/wzdftpd-back-mysql_0.8.1-2etch1_amd64.deb stable/main/binary-amd64/wzdftpd-mod-tcl_0.8.1-2etch1_amd64.deb stable/main/binary-amd64/wzdftpd-dev_0.8.1-2etch1_amd64.deb stable/main/binary-amd64/wzdftpd_0.8.1-2etch1_amd64.deb stable/main/binary-amd64/wzdftpd-mod-avahi_0.8.1-2etch1_amd64.deb stable/main/binary-amd64/wzdftpd-back-pgsql_0.8.1-2etch1_amd64.deb stable/main/binary-amd64/wzdftpd-mod-perl_0.8.1-2etch1_amd64.deb wzdftpd (0.8.1-2etch1) stable-security; urgency=high * Non-maintainer upload by the security team * Fix off-by-one in wzd_login.c which leads to a remote denial of service vulnerability Fixes: CVE-2007-5300 stable/main/binary-alpha/wzdftpd-mod-perl_0.8.1-2etch1_alpha.deb stable/main/binary-alpha/wzdftpd-back-pgsql_0.8.1-2etch1_alpha.deb stable/main/binary-alpha/wzdftpd-mod-avahi_0.8.1-2etch1_alpha.deb stable/main/binary-alpha/wzdftpd-back-mysql_0.8.1-2etch1_alpha.deb stable/main/binary-alpha/wzdftpd-dev_0.8.1-2etch1_alpha.deb stable/main/binary-alpha/wzdftpd-mod-tcl_0.8.1-2etch1_alpha.deb stable/main/binary-alpha/wzdftpd_0.8.1-2etch1_alpha.deb wzdftpd (0.8.1-2etch1) stable-security; urgency=high * Non-maintainer upload by the security team * Fix off-by-one in wzd_login.c which leads to a remote denial of service vulnerability Fixes: CVE-2007-5300 stable/main/binary-i386/wzdftpd-dev_0.8.1-2etch1_i386.deb stable/main/binary-i386/wzdftpd_0.8.1-2etch1_i386.deb stable/main/source/wzdftpd_0.8.1-2etch1.diff.gz stable/main/binary-i386/wzdftpd-mod-perl_0.8.1-2etch1_i386.deb stable/main/binary-i386/wzdftpd-back-pgsql_0.8.1-2etch1_i386.deb stable/main/source/wzdftpd_0.8.1-2etch1.dsc stable/main/binary-i386/wzdftpd-mod-avahi_0.8.1-2etch1_i386.deb stable/main/binary-i386/wzdftpd-mod-tcl_0.8.1-2etch1_i386.deb stable/main/binary-i386/wzdftpd-back-mysql_0.8.1-2etch1_i386.deb wzdftpd (0.8.1-2etch1) stable-security; urgency=high * Non-maintainer upload by the security team * Fix off-by-one in wzd_login.c which leads to a remote denial of service vulnerability Fixes: CVE-2007-5300 stable/main/binary-sparc/wml_2.0.11-1etch1_sparc.deb wml (2.0.11-1etch1) stable-security; urgency=high * Non-maintainer upload by security team. * CVE-2008-0665, CVE-2008-0666: Fix insecure temporary file creations in eperl and ipp backends and a similar issue in the wmg.cgi contrib file leading to possible symlink attacks. If you already use wmg.cgi please update your copy (Closes: #463907). Patch by Nico Golde and Frank Lichtenheld. * Add libpng-dev to build-depends since apparently it was previously compiled against it. stable/main/binary-s390/wml_2.0.11-1etch1_s390.deb wml (2.0.11-1etch1) stable-security; urgency=high * Non-maintainer upload by security team. * CVE-2008-0665, CVE-2008-0666: Fix insecure temporary file creations in eperl and ipp backends and a similar issue in the wmg.cgi contrib file leading to possible symlink attacks. If you already use wmg.cgi please update your copy (Closes: #463907). Patch by Nico Golde and Frank Lichtenheld. * Add libpng-dev to build-depends since apparently it was previously compiled against it. stable/main/binary-powerpc/wml_2.0.11-1etch1_powerpc.deb wml (2.0.11-1etch1) stable-security; urgency=high * Non-maintainer upload by security team. * CVE-2008-0665, CVE-2008-0666: Fix insecure temporary file creations in eperl and ipp backends and a similar issue in the wmg.cgi contrib file leading to possible symlink attacks. If you already use wmg.cgi please update your copy (Closes: #463907). Patch by Nico Golde and Frank Lichtenheld. * Add libpng-dev to build-depends since apparently it was previously compiled against it. stable/main/binary-mipsel/wml_2.0.11-1etch1_mipsel.deb wml (2.0.11-1etch1) stable-security; urgency=high * Non-maintainer upload by security team. * CVE-2008-0665, CVE-2008-0666: Fix insecure temporary file creations in eperl and ipp backends and a similar issue in the wmg.cgi contrib file leading to possible symlink attacks. If you already use wmg.cgi please update your copy (Closes: #463907). Patch by Nico Golde and Frank Lichtenheld. * Add libpng-dev to build-depends since apparently it was previously compiled against it. stable/main/binary-mips/wml_2.0.11-1etch1_mips.deb wml (2.0.11-1etch1) stable-security; urgency=high * Non-maintainer upload by security team. * CVE-2008-0665, CVE-2008-0666: Fix insecure temporary file creations in eperl and ipp backends and a similar issue in the wmg.cgi contrib file leading to possible symlink attacks. If you already use wmg.cgi please update your copy (Closes: #463907). Patch by Nico Golde and Frank Lichtenheld. * Add libpng-dev to build-depends since apparently it was previously compiled against it. stable/main/binary-ia64/wml_2.0.11-1etch1_ia64.deb wml (2.0.11-1etch1) stable-security; urgency=high * Non-maintainer upload by security team. * CVE-2008-0665, CVE-2008-0666: Fix insecure temporary file creations in eperl and ipp backends and a similar issue in the wmg.cgi contrib file leading to possible symlink attacks. If you already use wmg.cgi please update your copy (Closes: #463907). Patch by Nico Golde and Frank Lichtenheld. * Add libpng-dev to build-depends since apparently it was previously compiled against it. stable/main/binary-hppa/wml_2.0.11-1etch1_hppa.deb wml (2.0.11-1etch1) stable-security; urgency=high * Non-maintainer upload by security team. * CVE-2008-0665, CVE-2008-0666: Fix insecure temporary file creations in eperl and ipp backends and a similar issue in the wmg.cgi contrib file leading to possible symlink attacks. If you already use wmg.cgi please update your copy (Closes: #463907). Patch by Nico Golde and Frank Lichtenheld. * Add libpng-dev to build-depends since apparently it was previously compiled against it. stable/main/binary-arm/wml_2.0.11-1etch1_arm.deb wml (2.0.11-1etch1) stable-security; urgency=high * Non-maintainer upload by security team. * CVE-2008-0665, CVE-2008-0666: Fix insecure temporary file creations in eperl and ipp backends and a similar issue in the wmg.cgi contrib file leading to possible symlink attacks. If you already use wmg.cgi please update your copy (Closes: #463907). Patch by Nico Golde and Frank Lichtenheld. * Add libpng-dev to build-depends since apparently it was previously compiled against it. stable/main/binary-amd64/wml_2.0.11-1etch1_amd64.deb wml (2.0.11-1etch1) stable-security; urgency=high * Non-maintainer upload by security team. * CVE-2008-0665, CVE-2008-0666: Fix insecure temporary file creations in eperl and ipp backends and a similar issue in the wmg.cgi contrib file leading to possible symlink attacks. If you already use wmg.cgi please update your copy (Closes: #463907). Patch by Nico Golde and Frank Lichtenheld. * Add libpng-dev to build-depends since apparently it was previously compiled against it. stable/main/binary-alpha/wml_2.0.11-1etch1_alpha.deb wml (2.0.11-1etch1) stable-security; urgency=high * Non-maintainer upload by security team. * CVE-2008-0665, CVE-2008-0666: Fix insecure temporary file creations in eperl and ipp backends and a similar issue in the wmg.cgi contrib file leading to possible symlink attacks. If you already use wmg.cgi please update your copy (Closes: #463907). Patch by Nico Golde and Frank Lichtenheld. * Add libpng-dev to build-depends since apparently it was previously compiled against it. stable/main/binary-i386/wml_2.0.11-1etch1_i386.deb stable/main/source/wml_2.0.11-1etch1.dsc stable/main/source/wml_2.0.11-1etch1.diff.gz wml (2.0.11-1etch1) stable-security; urgency=high * Non-maintainer upload by security team. * CVE-2008-0665, CVE-2008-0666: Fix insecure temporary file creations in eperl and ipp backends and a similar issue in the wmg.cgi contrib file leading to possible symlink attacks. If you already use wmg.cgi please update your copy (Closes: #463907). Patch by Nico Golde and Frank Lichtenheld. * Add libpng-dev to build-depends since apparently it was previously compiled against it. stable/main/binary-sparc/ethereal-dev_0.99.4-5.etch.2_sparc.deb stable/main/binary-sparc/ethereal-common_0.99.4-5.etch.2_sparc.deb stable/main/binary-sparc/tshark_0.99.4-5.etch.2_sparc.deb stable/main/binary-sparc/ethereal_0.99.4-5.etch.2_sparc.deb stable/main/binary-sparc/wireshark-common_0.99.4-5.etch.2_sparc.deb stable/main/binary-sparc/wireshark_0.99.4-5.etch.2_sparc.deb stable/main/binary-sparc/tethereal_0.99.4-5.etch.2_sparc.deb stable/main/binary-sparc/wireshark-dev_0.99.4-5.etch.2_sparc.deb wireshark (0.99.4-5.etch.2) stable-security; urgency=high * Backport two further security fixes reported later: CVE-2007-6450, CVE-2007-6451 stable/main/binary-s390/wireshark_0.99.4-5.etch.2_s390.deb stable/main/binary-s390/tshark_0.99.4-5.etch.2_s390.deb stable/main/binary-s390/ethereal-common_0.99.4-5.etch.2_s390.deb stable/main/binary-s390/wireshark-common_0.99.4-5.etch.2_s390.deb stable/main/binary-s390/wireshark-dev_0.99.4-5.etch.2_s390.deb stable/main/binary-s390/ethereal_0.99.4-5.etch.2_s390.deb stable/main/binary-s390/tethereal_0.99.4-5.etch.2_s390.deb stable/main/binary-s390/ethereal-dev_0.99.4-5.etch.2_s390.deb wireshark (0.99.4-5.etch.2) stable-security; urgency=high * Backport two further security fixes reported later: CVE-2007-6450, CVE-2007-6451 stable/main/binary-powerpc/wireshark_0.99.4-5.etch.2_powerpc.deb stable/main/binary-powerpc/tethereal_0.99.4-5.etch.2_powerpc.deb stable/main/binary-powerpc/ethereal_0.99.4-5.etch.2_powerpc.deb stable/main/binary-powerpc/wireshark-dev_0.99.4-5.etch.2_powerpc.deb stable/main/binary-powerpc/wireshark-common_0.99.4-5.etch.2_powerpc.deb stable/main/binary-powerpc/ethereal-dev_0.99.4-5.etch.2_powerpc.deb stable/main/binary-powerpc/ethereal-common_0.99.4-5.etch.2_powerpc.deb stable/main/binary-powerpc/tshark_0.99.4-5.etch.2_powerpc.deb wireshark (0.99.4-5.etch.2) stable-security; urgency=high * Backport two further security fixes reported later: CVE-2007-6450, CVE-2007-6451 stable/main/binary-mipsel/ethereal_0.99.4-5.etch.2_mipsel.deb stable/main/binary-mipsel/tshark_0.99.4-5.etch.2_mipsel.deb stable/main/binary-mipsel/ethereal-common_0.99.4-5.etch.2_mipsel.deb stable/main/binary-mipsel/ethereal-dev_0.99.4-5.etch.2_mipsel.deb stable/main/binary-mipsel/wireshark-common_0.99.4-5.etch.2_mipsel.deb stable/main/binary-mipsel/wireshark_0.99.4-5.etch.2_mipsel.deb stable/main/binary-mipsel/wireshark-dev_0.99.4-5.etch.2_mipsel.deb stable/main/binary-mipsel/tethereal_0.99.4-5.etch.2_mipsel.deb wireshark (0.99.4-5.etch.2) stable-security; urgency=high * Backport two further security fixes reported later: CVE-2007-6450, CVE-2007-6451 stable/main/binary-mips/ethereal-common_0.99.4-5.etch.2_mips.deb stable/main/binary-mips/tethereal_0.99.4-5.etch.2_mips.deb stable/main/binary-mips/tshark_0.99.4-5.etch.2_mips.deb stable/main/binary-mips/wireshark_0.99.4-5.etch.2_mips.deb stable/main/binary-mips/ethereal-dev_0.99.4-5.etch.2_mips.deb stable/main/binary-mips/wireshark-common_0.99.4-5.etch.2_mips.deb stable/main/binary-mips/wireshark-dev_0.99.4-5.etch.2_mips.deb stable/main/binary-mips/ethereal_0.99.4-5.etch.2_mips.deb wireshark (0.99.4-5.etch.2) stable-security; urgency=high * Backport two further security fixes reported later: CVE-2007-6450, CVE-2007-6451 stable/main/binary-ia64/tethereal_0.99.4-5.etch.2_ia64.deb stable/main/binary-ia64/wireshark_0.99.4-5.etch.2_ia64.deb stable/main/binary-ia64/ethereal-common_0.99.4-5.etch.2_ia64.deb stable/main/binary-ia64/wireshark-common_0.99.4-5.etch.2_ia64.deb stable/main/binary-ia64/tshark_0.99.4-5.etch.2_ia64.deb stable/main/binary-ia64/ethereal_0.99.4-5.etch.2_ia64.deb stable/main/binary-ia64/ethereal-dev_0.99.4-5.etch.2_ia64.deb stable/main/binary-ia64/wireshark-dev_0.99.4-5.etch.2_ia64.deb wireshark (0.99.4-5.etch.2) stable-security; urgency=high * Backport two further security fixes reported later: CVE-2007-6450, CVE-2007-6451 stable/main/binary-hppa/wireshark-dev_0.99.4-5.etch.2_hppa.deb stable/main/binary-hppa/tshark_0.99.4-5.etch.2_hppa.deb stable/main/binary-hppa/ethereal-dev_0.99.4-5.etch.2_hppa.deb stable/main/binary-hppa/ethereal_0.99.4-5.etch.2_hppa.deb stable/main/binary-hppa/ethereal-common_0.99.4-5.etch.2_hppa.deb stable/main/binary-hppa/tethereal_0.99.4-5.etch.2_hppa.deb stable/main/binary-hppa/wireshark_0.99.4-5.etch.2_hppa.deb stable/main/binary-hppa/wireshark-common_0.99.4-5.etch.2_hppa.deb wireshark (0.99.4-5.etch.2) stable-security; urgency=high * Backport two further security fixes reported later: CVE-2007-6450, CVE-2007-6451 stable/main/binary-arm/wireshark-dev_0.99.4-5.etch.2_arm.deb stable/main/binary-arm/ethereal_0.99.4-5.etch.2_arm.deb stable/main/binary-arm/tethereal_0.99.4-5.etch.2_arm.deb stable/main/binary-arm/tshark_0.99.4-5.etch.2_arm.deb stable/main/binary-arm/ethereal-common_0.99.4-5.etch.2_arm.deb stable/main/binary-arm/wireshark-common_0.99.4-5.etch.2_arm.deb stable/main/binary-arm/ethereal-dev_0.99.4-5.etch.2_arm.deb stable/main/binary-arm/wireshark_0.99.4-5.etch.2_arm.deb wireshark (0.99.4-5.etch.2) stable-security; urgency=high * Backport two further security fixes reported later: CVE-2007-6450, CVE-2007-6451 stable/main/binary-amd64/ethereal-dev_0.99.4-5.etch.2_amd64.deb stable/main/binary-amd64/tethereal_0.99.4-5.etch.2_amd64.deb stable/main/binary-amd64/wireshark-dev_0.99.4-5.etch.2_amd64.deb stable/main/binary-amd64/tshark_0.99.4-5.etch.2_amd64.deb stable/main/binary-amd64/wireshark-common_0.99.4-5.etch.2_amd64.deb stable/main/binary-amd64/wireshark_0.99.4-5.etch.2_amd64.deb stable/main/binary-amd64/ethereal-common_0.99.4-5.etch.2_amd64.deb stable/main/binary-amd64/ethereal_0.99.4-5.etch.2_amd64.deb wireshark (0.99.4-5.etch.2) stable-security; urgency=high * Backport two further security fixes reported later: CVE-2007-6450, CVE-2007-6451 stable/main/binary-alpha/ethereal-common_0.99.4-5.etch.2_alpha.deb stable/main/binary-alpha/wireshark-common_0.99.4-5.etch.2_alpha.deb stable/main/binary-alpha/wireshark-dev_0.99.4-5.etch.2_alpha.deb stable/main/binary-alpha/ethereal_0.99.4-5.etch.2_alpha.deb stable/main/binary-alpha/tshark_0.99.4-5.etch.2_alpha.deb stable/main/binary-alpha/tethereal_0.99.4-5.etch.2_alpha.deb stable/main/binary-alpha/ethereal-dev_0.99.4-5.etch.2_alpha.deb stable/main/binary-alpha/wireshark_0.99.4-5.etch.2_alpha.deb wireshark (0.99.4-5.etch.2) stable-security; urgency=high * Backport two further security fixes reported later: CVE-2007-6450, CVE-2007-6451 stable/main/binary-i386/ethereal-dev_0.99.4-5.etch.2_i386.deb stable/main/source/wireshark_0.99.4-5.etch.2.diff.gz stable/main/binary-i386/wireshark-dev_0.99.4-5.etch.2_i386.deb stable/main/binary-i386/wireshark-common_0.99.4-5.etch.2_i386.deb stable/main/binary-i386/ethereal_0.99.4-5.etch.2_i386.deb stable/main/binary-i386/tshark_0.99.4-5.etch.2_i386.deb stable/main/binary-i386/ethereal-common_0.99.4-5.etch.2_i386.deb stable/main/source/wireshark_0.99.4-5.etch.2.dsc stable/main/binary-i386/tethereal_0.99.4-5.etch.2_i386.deb stable/main/binary-i386/wireshark_0.99.4-5.etch.2_i386.deb wireshark (0.99.4-5.etch.2) stable-security; urgency=high * Backport two further security fixes reported later: CVE-2007-6450, CVE-2007-6451 stable/main/binary-all/viewcvs-query_0.9.2+cvs.1.0.dev.2004.07.28-4.1etch1_all.deb stable/main/source/viewcvs_0.9.2+cvs.1.0.dev.2004.07.28-4.1etch1.diff.gz stable/main/binary-all/viewcvs_0.9.2+cvs.1.0.dev.2004.07.28-4.1etch1_all.deb stable/main/source/viewcvs_0.9.2+cvs.1.0.dev.2004.07.28-4.1etch1.dsc viewcvs (0.9.2+cvs.1.0.dev.2004.07.28-4.1etch1) stable; urgency=low * No change NMU to bump the version to something suitable for Etch (closes: #372655, #422141) stable/main/binary-sparc/mount_2.12r-19etch1_sparc.deb stable/main/binary-sparc/fdisk-udeb_2.12r-19etch1_sparc.udeb stable/main/binary-sparc/util-linux_2.12r-19etch1_sparc.deb stable/main/binary-sparc/bsdutils_2.12r-19etch1_sparc.deb util-linux (2.12r-19etch1) stable-security; urgency=high * Non-maintainer upload by the security team * Fix privilege escalation by calling setuid() and setgid() in the wrong order and not checking the return values in mount and umount Fixes: CVE-2007-5191 stable/main/binary-s390/mount_2.12r-19etch1_s390.deb stable/main/binary-s390/fdisk-udeb_2.12r-19etch1_s390.udeb stable/main/binary-s390/cfdisk-udeb_2.12r-19etch1_s390.udeb stable/main/binary-s390/util-linux_2.12r-19etch1_s390.deb stable/main/binary-s390/bsdutils_2.12r-19etch1_s390.deb util-linux (2.12r-19etch1) stable-security; urgency=high * Non-maintainer upload by the security team * Fix privilege escalation by calling setuid() and setgid() in the wrong order and not checking the return values in mount and umount Fixes: CVE-2007-5191 stable/main/binary-powerpc/fdisk-udeb_2.12r-19etch1_powerpc.udeb stable/main/binary-powerpc/util-linux_2.12r-19etch1_powerpc.deb stable/main/binary-powerpc/bsdutils_2.12r-19etch1_powerpc.deb stable/main/binary-powerpc/mount_2.12r-19etch1_powerpc.deb stable/main/binary-powerpc/cfdisk-udeb_2.12r-19etch1_powerpc.udeb util-linux (2.12r-19etch1) stable-security; urgency=high * Non-maintainer upload by the security team * Fix privilege escalation by calling setuid() and setgid() in the wrong order and not checking the return values in mount and umount Fixes: CVE-2007-5191 stable/main/binary-mipsel/mount_2.12r-19etch1_mipsel.deb stable/main/binary-mipsel/cfdisk-udeb_2.12r-19etch1_mipsel.udeb stable/main/binary-mipsel/util-linux_2.12r-19etch1_mipsel.deb stable/main/binary-mipsel/fdisk-udeb_2.12r-19etch1_mipsel.udeb stable/main/binary-mipsel/bsdutils_2.12r-19etch1_mipsel.deb util-linux (2.12r-19etch1) stable-security; urgency=high * Non-maintainer upload by the security team * Fix privilege escalation by calling setuid() and setgid() in the wrong order and not checking the return values in mount and umount Fixes: CVE-2007-5191 stable/main/binary-mips/util-linux_2.12r-19etch1_mips.deb stable/main/binary-mips/fdisk-udeb_2.12r-19etch1_mips.udeb stable/main/binary-mips/cfdisk-udeb_2.12r-19etch1_mips.udeb stable/main/binary-mips/bsdutils_2.12r-19etch1_mips.deb stable/main/binary-mips/mount_2.12r-19etch1_mips.deb util-linux (2.12r-19etch1) stable-security; urgency=high * Non-maintainer upload by the security team * Fix privilege escalation by calling setuid() and setgid() in the wrong order and not checking the return values in mount and umount Fixes: CVE-2007-5191 stable/main/binary-ia64/util-linux_2.12r-19etch1_ia64.deb stable/main/binary-ia64/mount_2.12r-19etch1_ia64.deb stable/main/binary-ia64/cfdisk-udeb_2.12r-19etch1_ia64.udeb stable/main/binary-ia64/fdisk-udeb_2.12r-19etch1_ia64.udeb stable/main/binary-ia64/bsdutils_2.12r-19etch1_ia64.deb util-linux (2.12r-19etch1) stable-security; urgency=high * Non-maintainer upload by the security team * Fix privilege escalation by calling setuid() and setgid() in the wrong order and not checking the return values in mount and umount Fixes: CVE-2007-5191 stable/main/binary-hppa/cfdisk-udeb_2.12r-19etch1_hppa.udeb stable/main/binary-hppa/util-linux_2.12r-19etch1_hppa.deb stable/main/binary-hppa/fdisk-udeb_2.12r-19etch1_hppa.udeb stable/main/binary-hppa/mount_2.12r-19etch1_hppa.deb stable/main/binary-hppa/bsdutils_2.12r-19etch1_hppa.deb util-linux (2.12r-19etch1) stable-security; urgency=high * Non-maintainer upload by the security team * Fix privilege escalation by calling setuid() and setgid() in the wrong order and not checking the return values in mount and umount Fixes: CVE-2007-5191 stable/main/binary-arm/cfdisk-udeb_2.12r-19etch1_arm.udeb stable/main/binary-arm/fdisk-udeb_2.12r-19etch1_arm.udeb stable/main/binary-arm/mount_2.12r-19etch1_arm.deb stable/main/binary-arm/bsdutils_2.12r-19etch1_arm.deb stable/main/binary-arm/util-linux_2.12r-19etch1_arm.deb util-linux (2.12r-19etch1) stable-security; urgency=high * Non-maintainer upload by the security team * Fix privilege escalation by calling setuid() and setgid() in the wrong order and not checking the return values in mount and umount Fixes: CVE-2007-5191 stable/main/binary-amd64/mount_2.12r-19etch1_amd64.deb stable/main/binary-amd64/util-linux_2.12r-19etch1_amd64.deb stable/main/binary-amd64/cfdisk-udeb_2.12r-19etch1_amd64.udeb stable/main/binary-amd64/fdisk-udeb_2.12r-19etch1_amd64.udeb stable/main/binary-amd64/bsdutils_2.12r-19etch1_amd64.deb util-linux (2.12r-19etch1) stable-security; urgency=high * Non-maintainer upload by the security team * Fix privilege escalation by calling setuid() and setgid() in the wrong order and not checking the return values in mount and umount Fixes: CVE-2007-5191 stable/main/binary-alpha/cfdisk-udeb_2.12r-19etch1_alpha.udeb stable/main/binary-alpha/bsdutils_2.12r-19etch1_alpha.deb stable/main/binary-alpha/util-linux_2.12r-19etch1_alpha.deb stable/main/binary-alpha/fdisk-udeb_2.12r-19etch1_alpha.udeb stable/main/binary-alpha/mount_2.12r-19etch1_alpha.deb util-linux (2.12r-19etch1) stable-security; urgency=high * Non-maintainer upload by the security team * Fix privilege escalation by calling setuid() and setgid() in the wrong order and not checking the return values in mount and umount Fixes: CVE-2007-5191 stable/main/binary-i386/cfdisk-udeb_2.12r-19etch1_i386.udeb stable/main/binary-all/util-linux-locales_2.12r-19etch1_all.deb stable/main/binary-i386/mount_2.12r-19etch1_i386.deb stable/main/binary-i386/fdisk-udeb_2.12r-19etch1_i386.udeb stable/main/binary-i386/bsdutils_2.12r-19etch1_i386.deb stable/main/source/util-linux_2.12r-19etch1.dsc stable/main/source/util-linux_2.12r-19etch1.diff.gz stable/main/binary-i386/util-linux_2.12r-19etch1_i386.deb util-linux (2.12r-19etch1) stable-security; urgency=high * Non-maintainer upload by the security team * Fix privilege escalation by calling setuid() and setgid() in the wrong order and not checking the return values in mount and umount Fixes: CVE-2007-5191 stable/main/binary-i386/user-mode-linux_2.6.18-1um-2etch.18etch1_i386.deb stable/main/source/user-mode-linux_2.6.18-1um-2etch.18etch1.dsc stable/main/source/user-mode-linux_2.6.18-1um-2etch.18etch1.diff.gz user-mode-linux (2.6.18-1um-2etch.18etch1) stable-security; urgency=high * Rebuild against linux-source-2.6.18 (2.6.18.dfsg.1-18etch1) * bugfix/vmsplice-security.patch [SECURITY] Fix missing access check in vmsplice. See CVE-2008-0010, CVE-2008-0600 * bugfix/all/vserver/proc-link-security.patch [SECURITY][vserver] Fix access checks for the links in /proc/$pid. * Changes from linux-source-2.6.18 (2.6.18.dfsg.1-18) [ Martin Michlmayr ] * [mips] Fix network on Cobalt RaQ1, thanks Thomas Bogendoerfer (closes: #460337). [ dann frazier ] * [ia64] Fix an issue with unaligned accesses and certain floating point instructions that can result in silent user data corruption (closes: #461493). * Update abi reference files for ABI 6 stable/non-free/binary-sparc/unrar_3.5.4-1.1_sparc.deb unrar-nonfree (1:3.5.4-1.1) stable; urgency=low * Non-maintainer upload. * Fix CVE-2007-0855: stack based buffer overflow (Closes: #410580). stable/non-free/binary-s390/unrar_3.5.4-1.1_s390.deb unrar-nonfree (1:3.5.4-1.1) stable; urgency=low * Non-maintainer upload. * Fix CVE-2007-0855: stack based buffer overflow (Closes: #410580). stable/non-free/binary-powerpc/unrar_3.5.4-1.1_powerpc.deb unrar-nonfree (1:3.5.4-1.1) stable; urgency=low * Non-maintainer upload. * Fix CVE-2007-0855: stack based buffer overflow (Closes: #410580). stable/non-free/binary-mipsel/unrar_3.5.4-1.1_mipsel.deb unrar-nonfree (1:3.5.4-1.1) stable; urgency=low * Non-maintainer upload. * Fix CVE-2007-0855: stack based buffer overflow (Closes: #410580). stable/non-free/binary-mips/unrar_3.5.4-1.1_mips.deb unrar-nonfree (1:3.5.4-1.1) stable; urgency=low * Non-maintainer upload. * Fix CVE-2007-0855: stack based buffer overflow (Closes: #410580). stable/non-free/binary-ia64/unrar_3.5.4-1.1_ia64.deb unrar-nonfree (1:3.5.4-1.1) stable; urgency=low * Non-maintainer upload. * Fix CVE-2007-0855: stack based buffer overflow (Closes: #410580). stable/non-free/binary-hppa/unrar_3.5.4-1.1_hppa.deb unrar-nonfree (1:3.5.4-1.1) stable; urgency=low * Non-maintainer upload. * Fix CVE-2007-0855: stack based buffer overflow (Closes: #410580). stable/non-free/binary-arm/unrar_3.5.4-1.1_arm.deb unrar-nonfree (1:3.5.4-1.1) stable; urgency=low * Non-maintainer upload. * Fix CVE-2007-0855: stack based buffer overflow (Closes: #410580). stable/non-free/binary-amd64/unrar_3.5.4-1.1_amd64.deb unrar-nonfree (1:3.5.4-1.1) stable; urgency=low * Non-maintainer upload. * Fix CVE-2007-0855: stack based buffer overflow (Closes: #410580). stable/non-free/binary-alpha/unrar_3.5.4-1.1_alpha.deb unrar-nonfree (1:3.5.4-1.1) stable; urgency=low * Non-maintainer upload. * Fix CVE-2007-0855: stack based buffer overflow (Closes: #410580). stable/non-free/source/unrar-nonfree_3.5.4-1.1.diff.gz stable/non-free/binary-i386/unrar_3.5.4-1.1_i386.deb stable/non-free/source/unrar-nonfree_3.5.4-1.1.dsc unrar-nonfree (1:3.5.4-1.1) stable; urgency=low * Non-maintainer upload. * Fix CVE-2007-0855: stack based buffer overflow (Closes: #410580). stable/main/source/typo3-src_4.0.2+debian-4.diff.gz stable/main/source/typo3-src_4.0.2+debian-4.dsc stable/main/binary-all/typo3_4.0.2+debian-4_all.deb stable/main/binary-all/typo3-src-4.0_4.0.2+debian-4_all.deb typo3-src (4.0.2+debian-4) stable-security; urgency=high * Fixed security problem "SQL Injection in system extension indexed_search" (CVE-2007-6381) with patch taken from 4.0.8. (Closes: 457446) stable/main/source/tomcat5.5_5.5.20-2etch2.diff.gz stable/main/binary-all/tomcat5.5-admin_5.5.20-2etch2_all.deb stable/main/source/tomcat5.5_5.5.20-2etch2.dsc stable/main/binary-all/tomcat5.5-webapps_5.5.20-2etch2_all.deb stable/main/binary-all/libtomcat5.5-java_5.5.20-2etch2_all.deb stable/main/binary-all/tomcat5.5_5.5.20-2etch2_all.deb tomcat5.5 (5.5.20-2etch2) stable-security; urgency=high * CVE-2007-2450: Fixed multiple cross-site scripting (XSS) vulnerabilities. * CVE-2008-0128: Fixed issue with single sign-on cookie and https. * Fixed permissions for tomcat5.5-webapps. Closes: #460839. stable/main/binary-all/tomcat5_5.0.30-12etch1_all.deb stable/main/source/tomcat5_5.0.30-12etch1.dsc stable/main/binary-all/tomcat5-admin_5.0.30-12etch1_all.deb stable/main/binary-all/tomcat5-webapps_5.0.30-12etch1_all.deb stable/main/binary-all/libtomcat5-java_5.0.30-12etch1_all.deb stable/main/source/tomcat5_5.0.30-12etch1.diff.gz tomcat5 (5.0.30-12etch1) stable-security; urgency=high * CVE-2007-3382, CVE-2007-3385, CVE-2007-5461 stable/main/binary-sparc/tk8.4_8.4.12-1etch2_sparc.deb stable/main/binary-sparc/tk8.4-dev_8.4.12-1etch2_sparc.deb tk8.4 (8.4.12-1etch2) stable-security; urgency=high * Fix CVE-2008-0553. stable/main/binary-s390/tk8.4_8.4.12-1etch2_s390.deb stable/main/binary-s390/tk8.4-dev_8.4.12-1etch2_s390.deb tk8.4 (8.4.12-1etch2) stable-security; urgency=high * Fix CVE-2008-0553. stable/main/binary-powerpc/tk8.4_8.4.12-1etch2_powerpc.deb stable/main/binary-powerpc/tk8.4-dev_8.4.12-1etch2_powerpc.deb tk8.4 (8.4.12-1etch2) stable-security; urgency=high * Fix CVE-2008-0553. stable/main/binary-mipsel/tk8.4_8.4.12-1etch2_mipsel.deb stable/main/binary-mipsel/tk8.4-dev_8.4.12-1etch2_mipsel.deb tk8.4 (8.4.12-1etch2) stable-security; urgency=high * Fix CVE-2008-0553. stable/main/binary-mips/tk8.4-dev_8.4.12-1etch2_mips.deb stable/main/binary-mips/tk8.4_8.4.12-1etch2_mips.deb tk8.4 (8.4.12-1etch2) stable-security; urgency=high * Fix CVE-2008-0553. stable/main/binary-ia64/tk8.4-dev_8.4.12-1etch2_ia64.deb stable/main/binary-ia64/tk8.4_8.4.12-1etch2_ia64.deb tk8.4 (8.4.12-1etch2) stable-security; urgency=high * Fix CVE-2008-0553. stable/main/binary-hppa/tk8.4_8.4.12-1etch2_hppa.deb stable/main/binary-hppa/tk8.4-dev_8.4.12-1etch2_hppa.deb tk8.4 (8.4.12-1etch2) stable-security; urgency=high * Fix CVE-2008-0553. stable/main/binary-arm/tk8.4-dev_8.4.12-1etch2_arm.deb stable/main/binary-arm/tk8.4_8.4.12-1etch2_arm.deb tk8.4 (8.4.12-1etch2) stable-security; urgency=high * Fix CVE-2008-0553. stable/main/binary-amd64/tk8.4_8.4.12-1etch2_amd64.deb stable/main/binary-amd64/tk8.4-dev_8.4.12-1etch2_amd64.deb tk8.4 (8.4.12-1etch2) stable-security; urgency=high * Fix CVE-2008-0553. stable/main/binary-alpha/tk8.4-dev_8.4.12-1etch2_alpha.deb stable/main/binary-alpha/tk8.4_8.4.12-1etch2_alpha.deb tk8.4 (8.4.12-1etch2) stable-security; urgency=high * Fix CVE-2008-0553. stable/main/source/tk8.4_8.4.12-1etch2.dsc stable/main/binary-i386/tk8.4_8.4.12-1etch2_i386.deb stable/main/source/tk8.4_8.4.12-1etch2.diff.gz stable/main/binary-i386/tk8.4-dev_8.4.12-1etch2_i386.deb stable/main/binary-all/tk8.4-doc_8.4.12-1etch2_all.deb tk8.4 (8.4.12-1etch2) stable-security; urgency=high * Fix CVE-2008-0553. stable/main/binary-sparc/tk8.3-dev_8.3.5-6etch2_sparc.deb stable/main/binary-sparc/tk8.3_8.3.5-6etch2_sparc.deb tk8.3 (8.3.5-6etch2) stable-security; urgency=high * Fix CVE-2008-0553. stable/main/binary-s390/tk8.3_8.3.5-6etch2_s390.deb stable/main/binary-s390/tk8.3-dev_8.3.5-6etch2_s390.deb tk8.3 (8.3.5-6etch2) stable-security; urgency=high * Fix CVE-2008-0553. stable/main/binary-powerpc/tk8.3-dev_8.3.5-6etch2_powerpc.deb stable/main/binary-powerpc/tk8.3_8.3.5-6etch2_powerpc.deb tk8.3 (8.3.5-6etch2) stable-security; urgency=high * Fix CVE-2008-0553. stable/main/binary-mipsel/tk8.3_8.3.5-6etch2_mipsel.deb stable/main/binary-mipsel/tk8.3-dev_8.3.5-6etch2_mipsel.deb tk8.3 (8.3.5-6etch2) stable-security; urgency=high * Fix CVE-2008-0553. stable/main/binary-mips/tk8.3-dev_8.3.5-6etch2_mips.deb stable/main/binary-mips/tk8.3_8.3.5-6etch2_mips.deb tk8.3 (8.3.5-6etch2) stable-security; urgency=high * Fix CVE-2008-0553. stable/main/binary-ia64/tk8.3_8.3.5-6etch2_ia64.deb stable/main/binary-ia64/tk8.3-dev_8.3.5-6etch2_ia64.deb tk8.3 (8.3.5-6etch2) stable-security; urgency=high * Fix CVE-2008-0553. stable/main/binary-hppa/tk8.3_8.3.5-6etch2_hppa.deb stable/main/binary-hppa/tk8.3-dev_8.3.5-6etch2_hppa.deb tk8.3 (8.3.5-6etch2) stable-security; urgency=high * Fix CVE-2008-0553. stable/main/binary-arm/tk8.3_8.3.5-6etch2_arm.deb stable/main/binary-arm/tk8.3-dev_8.3.5-6etch2_arm.deb tk8.3 (8.3.5-6etch2) stable-security; urgency=high * Fix CVE-2008-0553. stable/main/binary-amd64/tk8.3_8.3.5-6etch2_amd64.deb stable/main/binary-amd64/tk8.3-dev_8.3.5-6etch2_amd64.deb tk8.3 (8.3.5-6etch2) stable-security; urgency=high * Fix CVE-2008-0553. stable/main/binary-alpha/tk8.3_8.3.5-6etch2_alpha.deb stable/main/binary-alpha/tk8.3-dev_8.3.5-6etch2_alpha.deb tk8.3 (8.3.5-6etch2) stable-security; urgency=high * Fix CVE-2008-0553. stable/main/source/tk8.3_8.3.5-6etch2.dsc stable/main/source/tk8.3_8.3.5-6etch2.diff.gz stable/main/binary-i386/tk8.3_8.3.5-6etch2_i386.deb stable/main/binary-all/tk8.3-doc_8.3.5-6etch2_all.deb stable/main/binary-i386/tk8.3-dev_8.3.5-6etch2_i386.deb tk8.3 (8.3.5-6etch2) stable-security; urgency=high * Fix CVE-2008-0553. stable/main/binary-sparc/tcpreen_1.4.3-0.1etch1_sparc.deb tcpreen (1.4.3-0.1etch1) stable-security; urgency=high * Fix multiple buffer overflows. (CVE-2007-6562) stable/main/binary-s390/tcpreen_1.4.3-0.1etch1_s390.deb tcpreen (1.4.3-0.1etch1) stable-security; urgency=high * Fix multiple buffer overflows. (CVE-2007-6562) stable/main/binary-powerpc/tcpreen_1.4.3-0.1etch1_powerpc.deb tcpreen (1.4.3-0.1etch1) stable-security; urgency=high * Fix multiple buffer overflows. (CVE-2007-6562) stable/main/binary-mipsel/tcpreen_1.4.3-0.1etch1_mipsel.deb tcpreen (1.4.3-0.1etch1) stable-security; urgency=high * Fix multiple buffer overflows. (CVE-2007-6562) stable/main/binary-mips/tcpreen_1.4.3-0.1etch1_mips.deb tcpreen (1.4.3-0.1etch1) stable-security; urgency=high * Fix multiple buffer overflows. (CVE-2007-6562) stable/main/binary-ia64/tcpreen_1.4.3-0.1etch1_ia64.deb tcpreen (1.4.3-0.1etch1) stable-security; urgency=high * Fix multiple buffer overflows. (CVE-2007-6562) stable/main/binary-hppa/tcpreen_1.4.3-0.1etch1_hppa.deb tcpreen (1.4.3-0.1etch1) stable-security; urgency=high * Fix multiple buffer overflows. (CVE-2007-6562) stable/main/binary-arm/tcpreen_1.4.3-0.1etch1_arm.deb tcpreen (1.4.3-0.1etch1) stable-security; urgency=high * Fix multiple buffer overflows. (CVE-2007-6562) stable/main/binary-amd64/tcpreen_1.4.3-0.1etch1_amd64.deb tcpreen (1.4.3-0.1etch1) stable-security; urgency=high * Fix multiple buffer overflows. (CVE-2007-6562) stable/main/binary-alpha/tcpreen_1.4.3-0.1etch1_alpha.deb tcpreen (1.4.3-0.1etch1) stable-security; urgency=high * Fix multiple buffer overflows. (CVE-2007-6562) stable/main/source/tcpreen_1.4.3-0.1etch1.dsc stable/main/binary-i386/tcpreen_1.4.3-0.1etch1_i386.deb stable/main/source/tcpreen_1.4.3-0.1etch1.diff.gz tcpreen (1.4.3-0.1etch1) stable-security; urgency=high * Fix multiple buffer overflows. (CVE-2007-6562) stable/main/binary-sparc/tar_1.16-2etch1_sparc.deb tar (1.16-2etch1) stable-security; urgency=high * Non-maintainer upload by the security team * Apply patch from Dmitry V. Levin to avoid a stack-based buffer overflow while processing certain file names (CVE-2007-4476). Closes: #441444. * Apply patch from Dmitry V. Levin to fix double-dot recognition in case of duplicate / (CVE-2007-4131). Closes: #439335. * Update the autoconf scripts to the etch version (no functional changes, hopefully). stable/main/binary-s390/tar_1.16-2etch1_s390.deb tar (1.16-2etch1) stable-security; urgency=high * Non-maintainer upload by the security team * Apply patch from Dmitry V. Levin to avoid a stack-based buffer overflow while processing certain file names (CVE-2007-4476). Closes: #441444. * Apply patch from Dmitry V. Levin to fix double-dot recognition in case of duplicate / (CVE-2007-4131). Closes: #439335. * Update the autoconf scripts to the etch version (no functional changes, hopefully). stable/main/binary-powerpc/tar_1.16-2etch1_powerpc.deb tar (1.16-2etch1) stable-security; urgency=high * Non-maintainer upload by the security team * Apply patch from Dmitry V. Levin to avoid a stack-based buffer overflow while processing certain file names (CVE-2007-4476). Closes: #441444. * Apply patch from Dmitry V. Levin to fix double-dot recognition in case of duplicate / (CVE-2007-4131). Closes: #439335. * Update the autoconf scripts to the etch version (no functional changes, hopefully). stable/main/binary-mipsel/tar_1.16-2etch1_mipsel.deb tar (1.16-2etch1) stable-security; urgency=high * Non-maintainer upload by the security team * Apply patch from Dmitry V. Levin to avoid a stack-based buffer overflow while processing certain file names (CVE-2007-4476). Closes: #441444. * Apply patch from Dmitry V. Levin to fix double-dot recognition in case of duplicate / (CVE-2007-4131). Closes: #439335. * Update the autoconf scripts to the etch version (no functional changes, hopefully). stable/main/binary-mips/tar_1.16-2etch1_mips.deb tar (1.16-2etch1) stable-security; urgency=high * Non-maintainer upload by the security team * Apply patch from Dmitry V. Levin to avoid a stack-based buffer overflow while processing certain file names (CVE-2007-4476). Closes: #441444. * Apply patch from Dmitry V. Levin to fix double-dot recognition in case of duplicate / (CVE-2007-4131). Closes: #439335. * Update the autoconf scripts to the etch version (no functional changes, hopefully). stable/main/binary-ia64/tar_1.16-2etch1_ia64.deb tar (1.16-2etch1) stable-security; urgency=high * Non-maintainer upload by the security team * Apply patch from Dmitry V. Levin to avoid a stack-based buffer overflow while processing certain file names (CVE-2007-4476). Closes: #441444. * Apply patch from Dmitry V. Levin to fix double-dot recognition in case of duplicate / (CVE-2007-4131). Closes: #439335. * Update the autoconf scripts to the etch version (no functional changes, hopefully). stable/main/binary-i386/tar_1.16-2etch1_i386.deb tar (1.16-2etch1) stable-security; urgency=high * Non-maintainer upload by the security team * Apply patch from Dmitry V. Levin to avoid a stack-based buffer overflow while processing certain file names (CVE-2007-4476). Closes: #441444. * Apply patch from Dmitry V. Levin to fix double-dot recognition in case of duplicate / (CVE-2007-4131). Closes: #439335. * Update the autoconf scripts to the etch version (no functional changes, hopefully). stable/main/binary-hppa/tar_1.16-2etch1_hppa.deb tar (1.16-2etch1) stable-security; urgency=high * Non-maintainer upload by the security team * Apply patch from Dmitry V. Levin to avoid a stack-based buffer overflow while processing certain file names (CVE-2007-4476). Closes: #441444. * Apply patch from Dmitry V. Levin to fix double-dot recognition in case of duplicate / (CVE-2007-4131). Closes: #439335. * Update the autoconf scripts to the etch version (no functional changes, hopefully). stable/main/binary-arm/tar_1.16-2etch1_arm.deb tar (1.16-2etch1) stable-security; urgency=high * Non-maintainer upload by the security team * Apply patch from Dmitry V. Levin to avoid a stack-based buffer overflow while processing certain file names (CVE-2007-4476). Closes: #441444. * Apply patch from Dmitry V. Levin to fix double-dot recognition in case of duplicate / (CVE-2007-4131). Closes: #439335. * Update the autoconf scripts to the etch version (no functional changes, hopefully). stable/main/binary-alpha/tar_1.16-2etch1_alpha.deb tar (1.16-2etch1) stable-security; urgency=high * Non-maintainer upload by the security team * Apply patch from Dmitry V. Levin to avoid a stack-based buffer overflow while processing certain file names (CVE-2007-4476). Closes: #441444. * Apply patch from Dmitry V. Levin to fix double-dot recognition in case of duplicate / (CVE-2007-4131). Closes: #439335. * Update the autoconf scripts to the etch version (no functional changes, hopefully). stable/main/binary-amd64/tar_1.16-2etch1_amd64.deb stable/main/source/tar_1.16-2etch1.diff.gz stable/main/source/tar_1.16-2etch1.dsc tar (1.16-2etch1) stable-security; urgency=high * Non-maintainer upload by the security team * Apply patch from Dmitry V. Levin to avoid a stack-based buffer overflow while processing certain file names (CVE-2007-4476). Closes: #441444. * Apply patch from Dmitry V. Levin to fix double-dot recognition in case of duplicate / (CVE-2007-4131). Closes: #439335. * Update the autoconf scripts to the etch version (no functional changes, hopefully). stable/main/binary-sparc/syslog-ng_2.0.0-1etch1_sparc.deb syslog-ng (2.0.0-1etch1) stable-security; urgency=high * Fix CVE-2007-6437. stable/main/binary-s390/syslog-ng_2.0.0-1etch1_s390.deb syslog-ng (2.0.0-1etch1) stable-security; urgency=high * Fix CVE-2007-6437. stable/main/binary-powerpc/syslog-ng_2.0.0-1etch1_powerpc.deb syslog-ng (2.0.0-1etch1) stable-security; urgency=high * Fix CVE-2007-6437. stable/main/binary-mipsel/syslog-ng_2.0.0-1etch1_mipsel.deb syslog-ng (2.0.0-1etch1) stable-security; urgency=high * Fix CVE-2007-6437. stable/main/binary-mips/syslog-ng_2.0.0-1etch1_mips.deb syslog-ng (2.0.0-1etch1) stable-security; urgency=high * Fix CVE-2007-6437. stable/main/binary-ia64/syslog-ng_2.0.0-1etch1_ia64.deb syslog-ng (2.0.0-1etch1) stable-security; urgency=high * Fix CVE-2007-6437. stable/main/binary-hppa/syslog-ng_2.0.0-1etch1_hppa.deb syslog-ng (2.0.0-1etch1) stable-security; urgency=high * Fix CVE-2007-6437. stable/main/binary-arm/syslog-ng_2.0.0-1etch1_arm.deb syslog-ng (2.0.0-1etch1) stable-security; urgency=high * Fix CVE-2007-6437. stable/main/binary-amd64/syslog-ng_2.0.0-1etch1_amd64.deb syslog-ng (2.0.0-1etch1) stable-security; urgency=high * Fix CVE-2007-6437. stable/main/binary-alpha/syslog-ng_2.0.0-1etch1_alpha.deb syslog-ng (2.0.0-1etch1) stable-security; urgency=high * Fix CVE-2007-6437. stable/main/source/syslog-ng_2.0.0-1etch1.dsc stable/main/binary-i386/syslog-ng_2.0.0-1etch1_i386.deb stable/main/source/syslog-ng_2.0.0-1etch1.diff.gz syslog-ng (2.0.0-1etch1) stable-security; urgency=high * Fix CVE-2007-6437. stable/non-free/binary-i386/sun-java5-plugin_1.5.0-14-1etch1_i386.deb stable/non-free/binary-amd64/sun-java5-bin_1.5.0-14-1etch1_amd64.deb stable/non-free/binary-amd64/sun-java5-jdk_1.5.0-14-1etch1_amd64.deb stable/non-free/binary-amd64/ia32-sun-java5-bin_1.5.0-14-1etch1_amd64.deb stable/non-free/binary-i386/sun-java5-jdk_1.5.0-14-1etch1_i386.deb stable/non-free/binary-all/sun-java5-doc_1.5.0-14-1etch1_all.deb stable/non-free/binary-all/sun-java5-fonts_1.5.0-14-1etch1_all.deb stable/non-free/binary-i386/sun-java5-bin_1.5.0-14-1etch1_i386.deb stable/non-free/source/sun-java5_1.5.0-14-1etch1.diff.gz stable/non-free/binary-i386/sun-java5-demo_1.5.0-14-1etch1_i386.deb stable/non-free/binary-all/sun-java5-source_1.5.0-14-1etch1_all.deb stable/non-free/source/sun-java5_1.5.0-14-1etch1.dsc stable/non-free/binary-amd64/sun-java5-demo_1.5.0-14-1etch1_amd64.deb stable/non-free/binary-ia64/ia32-sun-java5-bin_1.5.0-14-1etch1_ia64.deb stable/non-free/binary-all/sun-java5-jre_1.5.0-14-1etch1_all.deb sun-java5 (1.5.0-14-1etch1) stable; urgency=low * Upload to etch-updates. * New upstream bug fix release. For a list of changes see http://java.sun.com/j2se/1.5.0/ReleaseNotes.html. * Fixes among other: - Do not allow unauthorized remote arbitrary code execution (CVE-2007-5689). Closes: #463501. stable/main/binary-sparc/squid_2.6.5-6etch1_sparc.deb stable/main/binary-sparc/squidclient_2.6.5-6etch1_sparc.deb stable/main/binary-sparc/squid-cgi_2.6.5-6etch1_sparc.deb squid (2.6.5-6etch1) stable-security; urgency=high * debian/patches/58-dos-cache-update - Added upstream patch to fix potential DoS during some cache update reply processing (Ref: CVE-2007-6239, SQUID-2007:2) (Update prepared by Luigi Gangitano) stable/main/binary-s390/squid-cgi_2.6.5-6etch1_s390.deb stable/main/binary-s390/squidclient_2.6.5-6etch1_s390.deb stable/main/binary-s390/squid_2.6.5-6etch1_s390.deb squid (2.6.5-6etch1) stable-security; urgency=high * debian/patches/58-dos-cache-update - Added upstream patch to fix potential DoS during some cache update reply processing (Ref: CVE-2007-6239, SQUID-2007:2) (Update prepared by Luigi Gangitano) stable/main/binary-powerpc/squid_2.6.5-6etch1_powerpc.deb stable/main/binary-powerpc/squidclient_2.6.5-6etch1_powerpc.deb stable/main/binary-powerpc/squid-cgi_2.6.5-6etch1_powerpc.deb squid (2.6.5-6etch1) stable-security; urgency=high * debian/patches/58-dos-cache-update - Added upstream patch to fix potential DoS during some cache update reply processing (Ref: CVE-2007-6239, SQUID-2007:2) (Update prepared by Luigi Gangitano) stable/main/binary-mipsel/squid-cgi_2.6.5-6etch1_mipsel.deb stable/main/binary-mipsel/squidclient_2.6.5-6etch1_mipsel.deb stable/main/binary-mipsel/squid_2.6.5-6etch1_mipsel.deb squid (2.6.5-6etch1) stable-security; urgency=high * debian/patches/58-dos-cache-update - Added upstream patch to fix potential DoS during some cache update reply processing (Ref: CVE-2007-6239, SQUID-2007:2) (Update prepared by Luigi Gangitano) stable/main/binary-mips/squid-cgi_2.6.5-6etch1_mips.deb stable/main/binary-mips/squidclient_2.6.5-6etch1_mips.deb stable/main/binary-mips/squid_2.6.5-6etch1_mips.deb squid (2.6.5-6etch1) stable-security; urgency=high * debian/patches/58-dos-cache-update - Added upstream patch to fix potential DoS during some cache update reply processing (Ref: CVE-2007-6239, SQUID-2007:2) (Update prepared by Luigi Gangitano) stable/main/binary-ia64/squid_2.6.5-6etch1_ia64.deb stable/main/binary-ia64/squidclient_2.6.5-6etch1_ia64.deb stable/main/binary-ia64/squid-cgi_2.6.5-6etch1_ia64.deb squid (2.6.5-6etch1) stable-security; urgency=high * debian/patches/58-dos-cache-update - Added upstream patch to fix potential DoS during some cache update reply processing (Ref: CVE-2007-6239, SQUID-2007:2) (Update prepared by Luigi Gangitano) stable/main/binary-hppa/squid-cgi_2.6.5-6etch1_hppa.deb stable/main/binary-hppa/squid_2.6.5-6etch1_hppa.deb stable/main/binary-hppa/squidclient_2.6.5-6etch1_hppa.deb squid (2.6.5-6etch1) stable-security; urgency=high * debian/patches/58-dos-cache-update - Added upstream patch to fix potential DoS during some cache update reply processing (Ref: CVE-2007-6239, SQUID-2007:2) (Update prepared by Luigi Gangitano) stable/main/binary-arm/squid-cgi_2.6.5-6etch1_arm.deb stable/main/binary-arm/squid_2.6.5-6etch1_arm.deb stable/main/binary-arm/squidclient_2.6.5-6etch1_arm.deb squid (2.6.5-6etch1) stable-security; urgency=high * debian/patches/58-dos-cache-update - Added upstream patch to fix potential DoS during some cache update reply processing (Ref: CVE-2007-6239, SQUID-2007:2) (Update prepared by Luigi Gangitano) stable/main/binary-amd64/squid_2.6.5-6etch1_amd64.deb stable/main/binary-amd64/squid-cgi_2.6.5-6etch1_amd64.deb stable/main/binary-amd64/squidclient_2.6.5-6etch1_amd64.deb squid (2.6.5-6etch1) stable-security; urgency=high * debian/patches/58-dos-cache-update - Added upstream patch to fix potential DoS during some cache update reply processing (Ref: CVE-2007-6239, SQUID-2007:2) (Update prepared by Luigi Gangitano) stable/main/binary-alpha/squid_2.6.5-6etch1_alpha.deb stable/main/binary-alpha/squidclient_2.6.5-6etch1_alpha.deb stable/main/binary-alpha/squid-cgi_2.6.5-6etch1_alpha.deb squid (2.6.5-6etch1) stable-security; urgency=high * debian/patches/58-dos-cache-update - Added upstream patch to fix potential DoS during some cache update reply processing (Ref: CVE-2007-6239, SQUID-2007:2) (Update prepared by Luigi Gangitano) stable/main/source/squid_2.6.5-6etch1.dsc stable/main/binary-i386/squidclient_2.6.5-6etch1_i386.deb stable/main/binary-i386/squid-cgi_2.6.5-6etch1_i386.deb stable/main/binary-all/squid-common_2.6.5-6etch1_all.deb stable/main/binary-i386/squid_2.6.5-6etch1_i386.deb stable/main/source/squid_2.6.5-6etch1.diff.gz squid (2.6.5-6etch1) stable-security; urgency=high * debian/patches/58-dos-cache-update - Added upstream patch to fix potential DoS during some cache update reply processing (Ref: CVE-2007-6239, SQUID-2007:2) (Update prepared by Luigi Gangitano) stable/main/binary-sparc/sing_1.1-13etch1_sparc.deb sing (1.1-13etch1) stable; urgency=low * Patched parser.c to drop privileges when opening log file and running sing SUID. (CVE-2007-6211) Thanks a lot to Nico Golde for the patch. (Closes: #454167) stable/main/binary-s390/sing_1.1-13etch1_s390.deb sing (1.1-13etch1) stable; urgency=low * Patched parser.c to drop privileges when opening log file and running sing SUID. (CVE-2007-6211) Thanks a lot to Nico Golde for the patch. (Closes: #454167) stable/main/binary-powerpc/sing_1.1-13etch1_powerpc.deb sing (1.1-13etch1) stable; urgency=low * Patched parser.c to drop privileges when opening log file and running sing SUID. (CVE-2007-6211) Thanks a lot to Nico Golde for the patch. (Closes: #454167) stable/main/binary-mipsel/sing_1.1-13etch1_mipsel.deb sing (1.1-13etch1) stable; urgency=low * Patched parser.c to drop privileges when opening log file and running sing SUID. (CVE-2007-6211) Thanks a lot to Nico Golde for the patch. (Closes: #454167) stable/main/binary-mips/sing_1.1-13etch1_mips.deb sing (1.1-13etch1) stable; urgency=low * Patched parser.c to drop privileges when opening log file and running sing SUID. (CVE-2007-6211) Thanks a lot to Nico Golde for the patch. (Closes: #454167) stable/main/binary-ia64/sing_1.1-13etch1_ia64.deb sing (1.1-13etch1) stable; urgency=low * Patched parser.c to drop privileges when opening log file and running sing SUID. (CVE-2007-6211) Thanks a lot to Nico Golde for the patch. (Closes: #454167) stable/main/binary-hppa/sing_1.1-13etch1_hppa.deb sing (1.1-13etch1) stable; urgency=low * Patched parser.c to drop privileges when opening log file and running sing SUID. (CVE-2007-6211) Thanks a lot to Nico Golde for the patch. (Closes: #454167) stable/main/binary-arm/sing_1.1-13etch1_arm.deb sing (1.1-13etch1) stable; urgency=low * Patched parser.c to drop privileges when opening log file and running sing SUID. (CVE-2007-6211) Thanks a lot to Nico Golde for the patch. (Closes: #454167) stable/main/binary-amd64/sing_1.1-13etch1_amd64.deb sing (1.1-13etch1) stable; urgency=low * Patched parser.c to drop privileges when opening log file and running sing SUID. (CVE-2007-6211) Thanks a lot to Nico Golde for the patch. (Closes: #454167) stable/main/binary-alpha/sing_1.1-13etch1_alpha.deb sing (1.1-13etch1) stable; urgency=low * Patched parser.c to drop privileges when opening log file and running sing SUID. (CVE-2007-6211) Thanks a lot to Nico Golde for the patch. (Closes: #454167) stable/main/source/sing_1.1-13etch1.diff.gz stable/main/binary-i386/sing_1.1-13etch1_i386.deb stable/main/source/sing_1.1-13etch1.dsc sing (1.1-13etch1) stable; urgency=low * Patched parser.c to drop privileges when opening log file and running sing SUID. (CVE-2007-6211) Thanks a lot to Nico Golde for the patch. (Closes: #454167) stable/main/binary-sparc/libsdl-image1.2-dev_1.2.5-2etch1_sparc.deb stable/main/binary-sparc/libsdl-image1.2_1.2.5-2etch1_sparc.deb sdl-image1.2 (1.2.5-2etch1) stable-security; urgency=high * CVE-2007-6697: Fix buffer overflow in GIF handling. * CVE-2008-0544: Fix heap based buffer overflow in IMG_LoadLBM_RW. stable/main/binary-s390/libsdl-image1.2-dev_1.2.5-2etch1_s390.deb stable/main/binary-s390/libsdl-image1.2_1.2.5-2etch1_s390.deb sdl-image1.2 (1.2.5-2etch1) stable-security; urgency=high * CVE-2007-6697: Fix buffer overflow in GIF handling. * CVE-2008-0544: Fix heap based buffer overflow in IMG_LoadLBM_RW. stable/main/binary-powerpc/libsdl-image1.2_1.2.5-2etch1_powerpc.deb stable/main/binary-powerpc/libsdl-image1.2-dev_1.2.5-2etch1_powerpc.deb sdl-image1.2 (1.2.5-2etch1) stable-security; urgency=high * CVE-2007-6697: Fix buffer overflow in GIF handling. * CVE-2008-0544: Fix heap based buffer overflow in IMG_LoadLBM_RW. stable/main/binary-mipsel/libsdl-image1.2_1.2.5-2etch1_mipsel.deb stable/main/binary-mipsel/libsdl-image1.2-dev_1.2.5-2etch1_mipsel.deb sdl-image1.2 (1.2.5-2etch1) stable-security; urgency=high * CVE-2007-6697: Fix buffer overflow in GIF handling. * CVE-2008-0544: Fix heap based buffer overflow in IMG_LoadLBM_RW. stable/main/binary-mips/libsdl-image1.2-dev_1.2.5-2etch1_mips.deb stable/main/binary-mips/libsdl-image1.2_1.2.5-2etch1_mips.deb sdl-image1.2 (1.2.5-2etch1) stable-security; urgency=high * CVE-2007-6697: Fix buffer overflow in GIF handling. * CVE-2008-0544: Fix heap based buffer overflow in IMG_LoadLBM_RW. stable/main/binary-ia64/libsdl-image1.2-dev_1.2.5-2etch1_ia64.deb stable/main/binary-ia64/libsdl-image1.2_1.2.5-2etch1_ia64.deb sdl-image1.2 (1.2.5-2etch1) stable-security; urgency=high * CVE-2007-6697: Fix buffer overflow in GIF handling. * CVE-2008-0544: Fix heap based buffer overflow in IMG_LoadLBM_RW. stable/main/binary-hppa/libsdl-image1.2-dev_1.2.5-2etch1_hppa.deb stable/main/binary-hppa/libsdl-image1.2_1.2.5-2etch1_hppa.deb sdl-image1.2 (1.2.5-2etch1) stable-security; urgency=high * CVE-2007-6697: Fix buffer overflow in GIF handling. * CVE-2008-0544: Fix heap based buffer overflow in IMG_LoadLBM_RW. stable/main/binary-arm/libsdl-image1.2-dev_1.2.5-2etch1_arm.deb stable/main/binary-arm/libsdl-image1.2_1.2.5-2etch1_arm.deb sdl-image1.2 (1.2.5-2etch1) stable-security; urgency=high * CVE-2007-6697: Fix buffer overflow in GIF handling. * CVE-2008-0544: Fix heap based buffer overflow in IMG_LoadLBM_RW. stable/main/binary-amd64/libsdl-image1.2-dev_1.2.5-2etch1_amd64.deb stable/main/binary-amd64/libsdl-image1.2_1.2.5-2etch1_amd64.deb sdl-image1.2 (1.2.5-2etch1) stable-security; urgency=high * CVE-2007-6697: Fix buffer overflow in GIF handling. * CVE-2008-0544: Fix heap based buffer overflow in IMG_LoadLBM_RW. stable/main/binary-alpha/libsdl-image1.2-dev_1.2.5-2etch1_alpha.deb stable/main/binary-alpha/libsdl-image1.2_1.2.5-2etch1_alpha.deb sdl-image1.2 (1.2.5-2etch1) stable-security; urgency=high * CVE-2007-6697: Fix buffer overflow in GIF handling. * CVE-2008-0544: Fix heap based buffer overflow in IMG_LoadLBM_RW. stable/main/source/sdl-image1.2_1.2.5-2etch1.dsc stable/main/source/sdl-image1.2_1.2.5-2etch1.diff.gz stable/main/binary-i386/libsdl-image1.2-dev_1.2.5-2etch1_i386.deb stable/main/binary-i386/libsdl-image1.2_1.2.5-2etch1_i386.deb sdl-image1.2 (1.2.5-2etch1) stable-security; urgency=high * CVE-2007-6697: Fix buffer overflow in GIF handling. * CVE-2008-0544: Fix heap based buffer overflow in IMG_LoadLBM_RW. stable/main/binary-sparc/scponly_4.6-1etch1_sparc.deb scponly (4.6-1etch1) stable-security; urgency=high * Non-maintainer upload by the Security Team * Remove rsync, Subversion and Unison support because it was possible to gain shell access through them (CVE-2007-6350). Closes: #437148. * scp: -o and -F options are dangerous (CVE-2007-6415). stable/main/binary-s390/scponly_4.6-1etch1_s390.deb scponly (4.6-1etch1) stable-security; urgency=high * Non-maintainer upload by the Security Team * Remove rsync, Subversion and Unison support because it was possible to gain shell access through them (CVE-2007-6350). Closes: #437148. * scp: -o and -F options are dangerous (CVE-2007-6415). stable/main/binary-powerpc/scponly_4.6-1etch1_powerpc.deb scponly (4.6-1etch1) stable-security; urgency=high * Non-maintainer upload by the Security Team * Remove rsync, Subversion and Unison support because it was possible to gain shell access through them (CVE-2007-6350). Closes: #437148. * scp: -o and -F options are dangerous (CVE-2007-6415). stable/main/binary-mipsel/scponly_4.6-1etch1_mipsel.deb scponly (4.6-1etch1) stable-security; urgency=high * Non-maintainer upload by the Security Team * Remove rsync, Subversion and Unison support because it was possible to gain shell access through them (CVE-2007-6350). Closes: #437148. * scp: -o and -F options are dangerous (CVE-2007-6415). stable/main/binary-mips/scponly_4.6-1etch1_mips.deb scponly (4.6-1etch1) stable-security; urgency=high * Non-maintainer upload by the Security Team * Remove rsync, Subversion and Unison support because it was possible to gain shell access through them (CVE-2007-6350). Closes: #437148. * scp: -o and -F options are dangerous (CVE-2007-6415). stable/main/binary-ia64/scponly_4.6-1etch1_ia64.deb scponly (4.6-1etch1) stable-security; urgency=high * Non-maintainer upload by the Security Team * Remove rsync, Subversion and Unison support because it was possible to gain shell access through them (CVE-2007-6350). Closes: #437148. * scp: -o and -F options are dangerous (CVE-2007-6415). stable/main/binary-i386/scponly_4.6-1etch1_i386.deb scponly (4.6-1etch1) stable-security; urgency=high * Non-maintainer upload by the Security Team * Remove rsync, Subversion and Unison support because it was possible to gain shell access through them (CVE-2007-6350). Closes: #437148. * scp: -o and -F options are dangerous (CVE-2007-6415). stable/main/binary-hppa/scponly_4.6-1etch1_hppa.deb scponly (4.6-1etch1) stable-security; urgency=high * Non-maintainer upload by the Security Team * Remove rsync, Subversion and Unison support because it was possible to gain shell access through them (CVE-2007-6350). Closes: #437148. * scp: -o and -F options are dangerous (CVE-2007-6415). stable/main/binary-arm/scponly_4.6-1etch1_arm.deb scponly (4.6-1etch1) stable-security; urgency=high * Non-maintainer upload by the Security Team * Remove rsync, Subversion and Unison support because it was possible to gain shell access through them (CVE-2007-6350). Closes: #437148. * scp: -o and -F options are dangerous (CVE-2007-6415). stable/main/binary-alpha/scponly_4.6-1etch1_alpha.deb scponly (4.6-1etch1) stable-security; urgency=high * Non-maintainer upload by the Security Team * Remove rsync, Subversion and Unison support because it was possible to gain shell access through them (CVE-2007-6350). Closes: #437148. * scp: -o and -F options are dangerous (CVE-2007-6415). stable/main/source/scponly_4.6-1etch1.diff.gz stable/main/source/scponly_4.6-1etch1.dsc stable/main/binary-amd64/scponly_4.6-1etch1_amd64.deb scponly (4.6-1etch1) stable-security; urgency=high * Non-maintainer upload by the Security Team * Remove rsync, Subversion and Unison support because it was possible to gain shell access through them (CVE-2007-6350). Closes: #437148. * scp: -o and -F options are dangerous (CVE-2007-6415). stable/main/source/python-cherrypy_2.2.1-3etch1.dsc stable/main/binary-all/python-cherrypy_2.2.1-3etch1_all.deb stable/main/source/python-cherrypy_2.2.1-3etch1.diff.gz python-cherrypy (2.2.1-3etch1) stable-security; urgency=high * Fix directory traversal (CVE-2008-0252). stable/main/binary-sparc/libpulse-mainloop-glib0_0.9.5-5etch1_sparc.deb stable/main/binary-sparc/pulseaudio-module-lirc_0.9.5-5etch1_sparc.deb stable/main/binary-sparc/pulseaudio-module-gconf_0.9.5-5etch1_sparc.deb stable/main/binary-sparc/libpulse-dev_0.9.5-5etch1_sparc.deb stable/main/binary-sparc/pulseaudio-module-zeroconf_0.9.5-5etch1_sparc.deb stable/main/binary-sparc/pulseaudio_0.9.5-5etch1_sparc.deb stable/main/binary-sparc/libpulse-browse0_0.9.5-5etch1_sparc.deb stable/main/binary-sparc/libpulse0_0.9.5-5etch1_sparc.deb stable/main/binary-sparc/pulseaudio-module-x11_0.9.5-5etch1_sparc.deb stable/main/binary-sparc/pulseaudio-module-jack_0.9.5-5etch1_sparc.deb stable/main/binary-sparc/pulseaudio-utils_0.9.5-5etch1_sparc.deb stable/main/binary-sparc/pulseaudio-module-hal_0.9.5-5etch1_sparc.deb stable/main/binary-sparc/pulseaudio-esound-compat_0.9.5-5etch1_sparc.deb pulseaudio (0.9.5-5etch1) stable-security; urgency=low * debian/paches/06_pa-CVE-2008-0008-pa0.9.5.dpatch: + Added. Assert that dropping permissions succeeds. stable/main/binary-s390/pulseaudio-esound-compat_0.9.5-5etch1_s390.deb stable/main/binary-s390/pulseaudio-module-x11_0.9.5-5etch1_s390.deb stable/main/binary-s390/pulseaudio-module-zeroconf_0.9.5-5etch1_s390.deb stable/main/binary-s390/pulseaudio-module-gconf_0.9.5-5etch1_s390.deb stable/main/binary-s390/pulseaudio-module-jack_0.9.5-5etch1_s390.deb stable/main/binary-s390/libpulse-browse0_0.9.5-5etch1_s390.deb stable/main/binary-s390/pulseaudio-utils_0.9.5-5etch1_s390.deb stable/main/binary-s390/pulseaudio_0.9.5-5etch1_s390.deb stable/main/binary-s390/pulseaudio-module-lirc_0.9.5-5etch1_s390.deb stable/main/binary-s390/libpulse0_0.9.5-5etch1_s390.deb stable/main/binary-s390/libpulse-mainloop-glib0_0.9.5-5etch1_s390.deb stable/main/binary-s390/pulseaudio-module-hal_0.9.5-5etch1_s390.deb stable/main/binary-s390/libpulse-dev_0.9.5-5etch1_s390.deb pulseaudio (0.9.5-5etch1) stable-security; urgency=low * debian/paches/06_pa-CVE-2008-0008-pa0.9.5.dpatch: + Added. Assert that dropping permissions succeeds. stable/main/binary-powerpc/pulseaudio-module-x11_0.9.5-5etch1_powerpc.deb stable/main/binary-powerpc/pulseaudio-module-jack_0.9.5-5etch1_powerpc.deb stable/main/binary-powerpc/libpulse-mainloop-glib0_0.9.5-5etch1_powerpc.deb stable/main/binary-powerpc/pulseaudio-module-gconf_0.9.5-5etch1_powerpc.deb stable/main/binary-powerpc/libpulse-browse0_0.9.5-5etch1_powerpc.deb stable/main/binary-powerpc/pulseaudio-module-zeroconf_0.9.5-5etch1_powerpc.deb stable/main/binary-powerpc/pulseaudio_0.9.5-5etch1_powerpc.deb stable/main/binary-powerpc/pulseaudio-esound-compat_0.9.5-5etch1_powerpc.deb stable/main/binary-powerpc/libpulse0_0.9.5-5etch1_powerpc.deb stable/main/binary-powerpc/pulseaudio-utils_0.9.5-5etch1_powerpc.deb stable/main/binary-powerpc/pulseaudio-module-hal_0.9.5-5etch1_powerpc.deb stable/main/binary-powerpc/pulseaudio-module-lirc_0.9.5-5etch1_powerpc.deb stable/main/binary-powerpc/libpulse-dev_0.9.5-5etch1_powerpc.deb pulseaudio (0.9.5-5etch1) stable-security; urgency=low * debian/paches/06_pa-CVE-2008-0008-pa0.9.5.dpatch: + Added. Assert that dropping permissions succeeds. stable/main/binary-mipsel/pulseaudio_0.9.5-5etch1_mipsel.deb stable/main/binary-mipsel/pulseaudio-module-zeroconf_0.9.5-5etch1_mipsel.deb stable/main/binary-mipsel/pulseaudio-module-lirc_0.9.5-5etch1_mipsel.deb stable/main/binary-mipsel/pulseaudio-module-hal_0.9.5-5etch1_mipsel.deb stable/main/binary-mipsel/libpulse0_0.9.5-5etch1_mipsel.deb stable/main/binary-mipsel/pulseaudio-module-gconf_0.9.5-5etch1_mipsel.deb stable/main/binary-mipsel/libpulse-dev_0.9.5-5etch1_mipsel.deb stable/main/binary-mipsel/libpulse-mainloop-glib0_0.9.5-5etch1_mipsel.deb stable/main/binary-mipsel/libpulse-browse0_0.9.5-5etch1_mipsel.deb stable/main/binary-mipsel/pulseaudio-utils_0.9.5-5etch1_mipsel.deb stable/main/binary-mipsel/pulseaudio-module-x11_0.9.5-5etch1_mipsel.deb stable/main/binary-mipsel/pulseaudio-esound-compat_0.9.5-5etch1_mipsel.deb stable/main/binary-mipsel/pulseaudio-module-jack_0.9.5-5etch1_mipsel.deb pulseaudio (0.9.5-5etch1) stable-security; urgency=low * debian/paches/06_pa-CVE-2008-0008-pa0.9.5.dpatch: + Added. Assert that dropping permissions succeeds. stable/main/binary-mips/libpulse0_0.9.5-5etch1_mips.deb stable/main/binary-mips/pulseaudio-module-hal_0.9.5-5etch1_mips.deb stable/main/binary-mips/pulseaudio-module-zeroconf_0.9.5-5etch1_mips.deb stable/main/binary-mips/pulseaudio-module-lirc_0.9.5-5etch1_mips.deb stable/main/binary-mips/pulseaudio-module-x11_0.9.5-5etch1_mips.deb stable/main/binary-mips/pulseaudio-utils_0.9.5-5etch1_mips.deb stable/main/binary-mips/pulseaudio-esound-compat_0.9.5-5etch1_mips.deb stable/main/binary-mips/pulseaudio-module-jack_0.9.5-5etch1_mips.deb stable/main/binary-mips/libpulse-dev_0.9.5-5etch1_mips.deb stable/main/binary-mips/libpulse-browse0_0.9.5-5etch1_mips.deb stable/main/binary-mips/pulseaudio_0.9.5-5etch1_mips.deb stable/main/binary-mips/libpulse-mainloop-glib0_0.9.5-5etch1_mips.deb stable/main/binary-mips/pulseaudio-module-gconf_0.9.5-5etch1_mips.deb pulseaudio (0.9.5-5etch1) stable-security; urgency=low * debian/paches/06_pa-CVE-2008-0008-pa0.9.5.dpatch: + Added. Assert that dropping permissions succeeds. stable/main/binary-ia64/pulseaudio-module-x11_0.9.5-5etch1_ia64.deb stable/main/binary-ia64/pulseaudio-module-hal_0.9.5-5etch1_ia64.deb stable/main/binary-ia64/libpulse0_0.9.5-5etch1_ia64.deb stable/main/binary-ia64/pulseaudio-module-gconf_0.9.5-5etch1_ia64.deb stable/main/binary-ia64/pulseaudio-utils_0.9.5-5etch1_ia64.deb stable/main/binary-ia64/libpulse-browse0_0.9.5-5etch1_ia64.deb stable/main/binary-ia64/pulseaudio-module-lirc_0.9.5-5etch1_ia64.deb stable/main/binary-ia64/pulseaudio-esound-compat_0.9.5-5etch1_ia64.deb stable/main/binary-ia64/libpulse-mainloop-glib0_0.9.5-5etch1_ia64.deb stable/main/binary-ia64/pulseaudio-module-jack_0.9.5-5etch1_ia64.deb stable/main/binary-ia64/pulseaudio-module-zeroconf_0.9.5-5etch1_ia64.deb stable/main/binary-ia64/pulseaudio_0.9.5-5etch1_ia64.deb stable/main/binary-ia64/libpulse-dev_0.9.5-5etch1_ia64.deb pulseaudio (0.9.5-5etch1) stable-security; urgency=low * debian/paches/06_pa-CVE-2008-0008-pa0.9.5.dpatch: + Added. Assert that dropping permissions succeeds. stable/main/binary-hppa/libpulse0_0.9.5-5etch1_hppa.deb stable/main/binary-hppa/libpulse-browse0_0.9.5-5etch1_hppa.deb stable/main/binary-hppa/pulseaudio-utils_0.9.5-5etch1_hppa.deb stable/main/binary-hppa/pulseaudio-module-hal_0.9.5-5etch1_hppa.deb stable/main/binary-hppa/pulseaudio-module-zeroconf_0.9.5-5etch1_hppa.deb stable/main/binary-hppa/pulseaudio-module-x11_0.9.5-5etch1_hppa.deb stable/main/binary-hppa/libpulse-dev_0.9.5-5etch1_hppa.deb stable/main/binary-hppa/pulseaudio-module-lirc_0.9.5-5etch1_hppa.deb stable/main/binary-hppa/pulseaudio-module-jack_0.9.5-5etch1_hppa.deb stable/main/binary-hppa/pulseaudio-esound-compat_0.9.5-5etch1_hppa.deb stable/main/binary-hppa/pulseaudio-module-gconf_0.9.5-5etch1_hppa.deb stable/main/binary-hppa/pulseaudio_0.9.5-5etch1_hppa.deb stable/main/binary-hppa/libpulse-mainloop-glib0_0.9.5-5etch1_hppa.deb pulseaudio (0.9.5-5etch1) stable-security; urgency=low * debian/paches/06_pa-CVE-2008-0008-pa0.9.5.dpatch: + Added. Assert that dropping permissions succeeds. stable/main/binary-arm/pulseaudio-module-gconf_0.9.5-5etch1_arm.deb stable/main/binary-arm/libpulse0_0.9.5-5etch1_arm.deb stable/main/binary-arm/libpulse-mainloop-glib0_0.9.5-5etch1_arm.deb stable/main/binary-arm/pulseaudio-module-hal_0.9.5-5etch1_arm.deb stable/main/binary-arm/pulseaudio-module-zeroconf_0.9.5-5etch1_arm.deb stable/main/binary-arm/pulseaudio-module-x11_0.9.5-5etch1_arm.deb stable/main/binary-arm/libpulse-browse0_0.9.5-5etch1_arm.deb stable/main/binary-arm/pulseaudio-esound-compat_0.9.5-5etch1_arm.deb stable/main/binary-arm/pulseaudio-module-jack_0.9.5-5etch1_arm.deb stable/main/binary-arm/pulseaudio-utils_0.9.5-5etch1_arm.deb stable/main/binary-arm/pulseaudio_0.9.5-5etch1_arm.deb stable/main/binary-arm/pulseaudio-module-lirc_0.9.5-5etch1_arm.deb stable/main/binary-arm/libpulse-dev_0.9.5-5etch1_arm.deb pulseaudio (0.9.5-5etch1) stable-security; urgency=low * debian/paches/06_pa-CVE-2008-0008-pa0.9.5.dpatch: + Added. Assert that dropping permissions succeeds. stable/main/binary-amd64/pulseaudio-module-hal_0.9.5-5etch1_amd64.deb stable/main/binary-amd64/pulseaudio-utils_0.9.5-5etch1_amd64.deb stable/main/binary-amd64/pulseaudio-module-gconf_0.9.5-5etch1_amd64.deb stable/main/binary-amd64/libpulse-mainloop-glib0_0.9.5-5etch1_amd64.deb stable/main/binary-amd64/pulseaudio-module-zeroconf_0.9.5-5etch1_amd64.deb stable/main/binary-amd64/pulseaudio-esound-compat_0.9.5-5etch1_amd64.deb stable/main/binary-amd64/libpulse-browse0_0.9.5-5etch1_amd64.deb stable/main/binary-amd64/libpulse-dev_0.9.5-5etch1_amd64.deb stable/main/binary-amd64/pulseaudio-module-lirc_0.9.5-5etch1_amd64.deb stable/main/binary-amd64/pulseaudio_0.9.5-5etch1_amd64.deb stable/main/binary-amd64/pulseaudio-module-jack_0.9.5-5etch1_amd64.deb stable/main/binary-amd64/pulseaudio-module-x11_0.9.5-5etch1_amd64.deb stable/main/binary-amd64/libpulse0_0.9.5-5etch1_amd64.deb pulseaudio (0.9.5-5etch1) stable-security; urgency=low * debian/paches/06_pa-CVE-2008-0008-pa0.9.5.dpatch: + Added. Assert that dropping permissions succeeds. stable/main/binary-alpha/pulseaudio-esound-compat_0.9.5-5etch1_alpha.deb stable/main/binary-alpha/pulseaudio-module-gconf_0.9.5-5etch1_alpha.deb stable/main/binary-alpha/pulseaudio-utils_0.9.5-5etch1_alpha.deb stable/main/binary-alpha/libpulse0_0.9.5-5etch1_alpha.deb stable/main/binary-alpha/libpulse-dev_0.9.5-5etch1_alpha.deb stable/main/binary-alpha/pulseaudio-module-zeroconf_0.9.5-5etch1_alpha.deb stable/main/binary-alpha/pulseaudio-module-x11_0.9.5-5etch1_alpha.deb stable/main/binary-alpha/pulseaudio-module-jack_0.9.5-5etch1_alpha.deb stable/main/binary-alpha/libpulse-browse0_0.9.5-5etch1_alpha.deb stable/main/binary-alpha/pulseaudio-module-lirc_0.9.5-5etch1_alpha.deb stable/main/binary-alpha/pulseaudio_0.9.5-5etch1_alpha.deb stable/main/binary-alpha/pulseaudio-module-hal_0.9.5-5etch1_alpha.deb stable/main/binary-alpha/libpulse-mainloop-glib0_0.9.5-5etch1_alpha.deb pulseaudio (0.9.5-5etch1) stable-security; urgency=low * debian/paches/06_pa-CVE-2008-0008-pa0.9.5.dpatch: + Added. Assert that dropping permissions succeeds. stable/main/binary-i386/pulseaudio_0.9.5-5etch1_i386.deb stable/main/source/pulseaudio_0.9.5-5etch1.diff.gz stable/main/binary-i386/pulseaudio-esound-compat_0.9.5-5etch1_i386.deb stable/main/source/pulseaudio_0.9.5-5etch1.dsc stable/main/binary-i386/pulseaudio-module-jack_0.9.5-5etch1_i386.deb stable/main/binary-i386/pulseaudio-module-lirc_0.9.5-5etch1_i386.deb stable/main/binary-i386/pulseaudio-module-gconf_0.9.5-5etch1_i386.deb stable/main/binary-i386/libpulse-browse0_0.9.5-5etch1_i386.deb stable/main/binary-i386/pulseaudio-utils_0.9.5-5etch1_i386.deb stable/main/binary-i386/pulseaudio-module-zeroconf_0.9.5-5etch1_i386.deb stable/main/binary-i386/libpulse-mainloop-glib0_0.9.5-5etch1_i386.deb stable/main/binary-i386/pulseaudio-module-hal_0.9.5-5etch1_i386.deb stable/main/binary-i386/libpulse-dev_0.9.5-5etch1_i386.deb stable/main/binary-i386/pulseaudio-module-x11_0.9.5-5etch1_i386.deb stable/main/binary-i386/libpulse0_0.9.5-5etch1_i386.deb pulseaudio (0.9.5-5etch1) stable-security; urgency=low * debian/paches/06_pa-CVE-2008-0008-pa0.9.5.dpatch: + Added. Assert that dropping permissions succeeds. stable/main/binary-sparc/postgresql-server-dev-8.1_8.1.11-0etch1_sparc.deb stable/main/binary-sparc/libecpg-compat2_8.1.11-0etch1_sparc.deb stable/main/binary-sparc/postgresql-plperl-8.1_8.1.11-0etch1_sparc.deb stable/main/binary-sparc/libpq4_8.1.11-0etch1_sparc.deb stable/main/binary-sparc/postgresql-client-8.1_8.1.11-0etch1_sparc.deb stable/main/binary-sparc/postgresql-8.1_8.1.11-0etch1_sparc.deb stable/main/binary-sparc/libecpg-dev_8.1.11-0etch1_sparc.deb stable/main/binary-sparc/postgresql-contrib-8.1_8.1.11-0etch1_sparc.deb stable/main/binary-sparc/libpq-dev_8.1.11-0etch1_sparc.deb stable/main/binary-sparc/postgresql-plpython-8.1_8.1.11-0etch1_sparc.deb stable/main/binary-sparc/libecpg5_8.1.11-0etch1_sparc.deb stable/main/binary-sparc/postgresql-pltcl-8.1_8.1.11-0etch1_sparc.deb stable/main/binary-sparc/libpgtypes2_8.1.11-0etch1_sparc.deb postgresql-8.1 (8.1.11-0etch1) stable-security; urgency=low * New upstream security/bugfix release: - Prevent functions in indexes from executing with the privileges of the user running "VACUUM", "ANALYZE", etc. "SET ROLE" is now forbidden within a SECURITY DEFINER context. [CVE-2007-6600] - Suitably crafted regular-expression patterns could cause crashes, infinite or near-infinite looping, and/or massive memory consumption, all of which pose denial-of-service hazards for applications that accept regex search patterns from untrustworthy sources. [CVE-2007-4769, CVE-2007-4772, CVE-2007-6067] - Require non-superusers who use "/contrib/dblink" to use only password authentication, as a security measure. The fix that appeared for this in 8.2.5 was incomplete, as it plugged the hole for only some "dblink" functions. [CVE-2007-6601, CVE-2007-3278] - Fix bugs in WAL replay for GIN indexes. - Fix GIN index build to work properly when maintenance_work_mem is 4GB or more. - Improve planner's handling of LIKE/regex estimation in non-C locales. - Fix planning-speed problem for deep outer-join nests, as well as possible poor choice of join order. - Fix planner failure in some cases of WHERE false AND var IN (SELECT ...). - Make "CREATE TABLE ... SERIAL" and "ALTER SEQUENCE ... OWNED BY" not change the currval() state of the sequence. - Preserve the tablespace and storage parameters of indexes that are rebuilt by "ALTER TABLE ... ALTER COLUMN TYPE". - Make archive recovery always start a new WAL timeline, rather than only when a recovery stop time was used. This avoids a corner-case risk of trying to overwrite an existing archived copy of the last WAL segment, and seems simpler and cleaner than the original definition. - Make "VACUUM" not use all of maintenance_work_mem when the table is too small for it to be useful. - Fix potential crash in translate() when using a multibyte database encoding. - Make corr() return the correct result for negative correlation values. - Fix overflow in extract(epoch from interval) for intervals exceeding 68 years. - Fix PL/Perl to not fail when a UTF-8 regular expression is used in a trusted function. - Fix PL/Python to work correctly with Python 2.5 on 64-bit machines (Marko Kreen) - Fix PL/Python to not crash on long exception messages. - Fix pg_dump to correctly handle inheritance child tables that have default expressions different from their parent's. - Fix libpq crash when PGPASSFILE refers to a file that is not a plain file. - ecpg parser fixes. - Make "contrib/tablefunc"'s crosstab() handle NULL rowid as a category in its own right, rather than crashing. - Fix tsvector and tsquery output routines to escape backslashes correctly. - Fix crash of to_tsvector() on huge input strings. stable/main/binary-s390/postgresql-contrib-8.1_8.1.11-0etch1_s390.deb stable/main/binary-s390/libecpg5_8.1.11-0etch1_s390.deb stable/main/binary-s390/postgresql-pltcl-8.1_8.1.11-0etch1_s390.deb stable/main/binary-s390/postgresql-plpython-8.1_8.1.11-0etch1_s390.deb stable/main/binary-s390/libecpg-dev_8.1.11-0etch1_s390.deb stable/main/binary-s390/postgresql-server-dev-8.1_8.1.11-0etch1_s390.deb stable/main/binary-s390/libpgtypes2_8.1.11-0etch1_s390.deb stable/main/binary-s390/postgresql-plperl-8.1_8.1.11-0etch1_s390.deb stable/main/binary-s390/libpq4_8.1.11-0etch1_s390.deb stable/main/binary-s390/postgresql-8.1_8.1.11-0etch1_s390.deb stable/main/binary-s390/libpq-dev_8.1.11-0etch1_s390.deb stable/main/binary-s390/libecpg-compat2_8.1.11-0etch1_s390.deb stable/main/binary-s390/postgresql-client-8.1_8.1.11-0etch1_s390.deb postgresql-8.1 (8.1.11-0etch1) stable-security; urgency=low * New upstream security/bugfix release: - Prevent functions in indexes from executing with the privileges of the user running "VACUUM", "ANALYZE", etc. "SET ROLE" is now forbidden within a SECURITY DEFINER context. [CVE-2007-6600] - Suitably crafted regular-expression patterns could cause crashes, infinite or near-infinite looping, and/or massive memory consumption, all of which pose denial-of-service hazards for applications that accept regex search patterns from untrustworthy sources. [CVE-2007-4769, CVE-2007-4772, CVE-2007-6067] - Require non-superusers who use "/contrib/dblink" to use only password authentication, as a security measure. The fix that appeared for this in 8.2.5 was incomplete, as it plugged the hole for only some "dblink" functions. [CVE-2007-6601, CVE-2007-3278] - Fix bugs in WAL replay for GIN indexes. - Fix GIN index build to work properly when maintenance_work_mem is 4GB or more. - Improve planner's handling of LIKE/regex estimation in non-C locales. - Fix planning-speed problem for deep outer-join nests, as well as possible poor choice of join order. - Fix planner failure in some cases of WHERE false AND var IN (SELECT ...). - Make "CREATE TABLE ... SERIAL" and "ALTER SEQUENCE ... OWNED BY" not change the currval() state of the sequence. - Preserve the tablespace and storage parameters of indexes that are rebuilt by "ALTER TABLE ... ALTER COLUMN TYPE". - Make archive recovery always start a new WAL timeline, rather than only when a recovery stop time was used. This avoids a corner-case risk of trying to overwrite an existing archived copy of the last WAL segment, and seems simpler and cleaner than the original definition. - Make "VACUUM" not use all of maintenance_work_mem when the table is too small for it to be useful. - Fix potential crash in translate() when using a multibyte database encoding. - Make corr() return the correct result for negative correlation values. - Fix overflow in extract(epoch from interval) for intervals exceeding 68 years. - Fix PL/Perl to not fail when a UTF-8 regular expression is used in a trusted function. - Fix PL/Python to work correctly with Python 2.5 on 64-bit machines (Marko Kreen) - Fix PL/Python to not crash on long exception messages. - Fix pg_dump to correctly handle inheritance child tables that have default expressions different from their parent's. - Fix libpq crash when PGPASSFILE refers to a file that is not a plain file. - ecpg parser fixes. - Make "contrib/tablefunc"'s crosstab() handle NULL rowid as a category in its own right, rather than crashing. - Fix tsvector and tsquery output routines to escape backslashes correctly. - Fix crash of to_tsvector() on huge input strings. stable/main/binary-powerpc/postgresql-pltcl-8.1_8.1.11-0etch1_powerpc.deb stable/main/binary-powerpc/libecpg-compat2_8.1.11-0etch1_powerpc.deb stable/main/binary-powerpc/postgresql-plpython-8.1_8.1.11-0etch1_powerpc.deb stable/main/binary-powerpc/libecpg-dev_8.1.11-0etch1_powerpc.deb stable/main/binary-powerpc/libecpg5_8.1.11-0etch1_powerpc.deb stable/main/binary-powerpc/postgresql-server-dev-8.1_8.1.11-0etch1_powerpc.deb stable/main/binary-powerpc/libpq-dev_8.1.11-0etch1_powerpc.deb stable/main/binary-powerpc/postgresql-contrib-8.1_8.1.11-0etch1_powerpc.deb stable/main/binary-powerpc/libpq4_8.1.11-0etch1_powerpc.deb stable/main/binary-powerpc/postgresql-client-8.1_8.1.11-0etch1_powerpc.deb stable/main/binary-powerpc/postgresql-8.1_8.1.11-0etch1_powerpc.deb stable/main/binary-powerpc/libpgtypes2_8.1.11-0etch1_powerpc.deb stable/main/binary-powerpc/postgresql-plperl-8.1_8.1.11-0etch1_powerpc.deb postgresql-8.1 (8.1.11-0etch1) stable-security; urgency=low * New upstream security/bugfix release: - Prevent functions in indexes from executing with the privileges of the user running "VACUUM", "ANALYZE", etc. "SET ROLE" is now forbidden within a SECURITY DEFINER context. [CVE-2007-6600] - Suitably crafted regular-expression patterns could cause crashes, infinite or near-infinite looping, and/or massive memory consumption, all of which pose denial-of-service hazards for applications that accept regex search patterns from untrustworthy sources. [CVE-2007-4769, CVE-2007-4772, CVE-2007-6067] - Require non-superusers who use "/contrib/dblink" to use only password authentication, as a security measure. The fix that appeared for this in 8.2.5 was incomplete, as it plugged the hole for only some "dblink" functions. [CVE-2007-6601, CVE-2007-3278] - Fix bugs in WAL replay for GIN indexes. - Fix GIN index build to work properly when maintenance_work_mem is 4GB or more. - Improve planner's handling of LIKE/regex estimation in non-C locales. - Fix planning-speed problem for deep outer-join nests, as well as possible poor choice of join order. - Fix planner failure in some cases of WHERE false AND var IN (SELECT ...). - Make "CREATE TABLE ... SERIAL" and "ALTER SEQUENCE ... OWNED BY" not change the currval() state of the sequence. - Preserve the tablespace and storage parameters of indexes that are rebuilt by "ALTER TABLE ... ALTER COLUMN TYPE". - Make archive recovery always start a new WAL timeline, rather than only when a recovery stop time was used. This avoids a corner-case risk of trying to overwrite an existing archived copy of the last WAL segment, and seems simpler and cleaner than the original definition. - Make "VACUUM" not use all of maintenance_work_mem when the table is too small for it to be useful. - Fix potential crash in translate() when using a multibyte database encoding. - Make corr() return the correct result for negative correlation values. - Fix overflow in extract(epoch from interval) for intervals exceeding 68 years. - Fix PL/Perl to not fail when a UTF-8 regular expression is used in a trusted function. - Fix PL/Python to work correctly with Python 2.5 on 64-bit machines (Marko Kreen) - Fix PL/Python to not crash on long exception messages. - Fix pg_dump to correctly handle inheritance child tables that have default expressions different from their parent's. - Fix libpq crash when PGPASSFILE refers to a file that is not a plain file. - ecpg parser fixes. - Make "contrib/tablefunc"'s crosstab() handle NULL rowid as a category in its own right, rather than crashing. - Fix tsvector and tsquery output routines to escape backslashes correctly. - Fix crash of to_tsvector() on huge input strings. stable/main/binary-mipsel/libpq4_8.1.11-0etch1_mipsel.deb stable/main/binary-mipsel/libecpg-dev_8.1.11-0etch1_mipsel.deb stable/main/binary-mipsel/postgresql-plperl-8.1_8.1.11-0etch1_mipsel.deb stable/main/binary-mipsel/libecpg-compat2_8.1.11-0etch1_mipsel.deb stable/main/binary-mipsel/postgresql-8.1_8.1.11-0etch1_mipsel.deb stable/main/binary-mipsel/libpgtypes2_8.1.11-0etch1_mipsel.deb stable/main/binary-mipsel/libecpg5_8.1.11-0etch1_mipsel.deb stable/main/binary-mipsel/postgresql-contrib-8.1_8.1.11-0etch1_mipsel.deb stable/main/binary-mipsel/postgresql-plpython-8.1_8.1.11-0etch1_mipsel.deb stable/main/binary-mipsel/postgresql-client-8.1_8.1.11-0etch1_mipsel.deb stable/main/binary-mipsel/postgresql-pltcl-8.1_8.1.11-0etch1_mipsel.deb stable/main/binary-mipsel/postgresql-server-dev-8.1_8.1.11-0etch1_mipsel.deb stable/main/binary-mipsel/libpq-dev_8.1.11-0etch1_mipsel.deb postgresql-8.1 (8.1.11-0etch1) stable-security; urgency=low * New upstream security/bugfix release: - Prevent functions in indexes from executing with the privileges of the user running "VACUUM", "ANALYZE", etc. "SET ROLE" is now forbidden within a SECURITY DEFINER context. [CVE-2007-6600] - Suitably crafted regular-expression patterns could cause crashes, infinite or near-infinite looping, and/or massive memory consumption, all of which pose denial-of-service hazards for applications that accept regex search patterns from untrustworthy sources. [CVE-2007-4769, CVE-2007-4772, CVE-2007-6067] - Require non-superusers who use "/contrib/dblink" to use only password authentication, as a security measure. The fix that appeared for this in 8.2.5 was incomplete, as it plugged the hole for only some "dblink" functions. [CVE-2007-6601, CVE-2007-3278] - Fix bugs in WAL replay for GIN indexes. - Fix GIN index build to work properly when maintenance_work_mem is 4GB or more. - Improve planner's handling of LIKE/regex estimation in non-C locales. - Fix planning-speed problem for deep outer-join nests, as well as possible poor choice of join order. - Fix planner failure in some cases of WHERE false AND var IN (SELECT ...). - Make "CREATE TABLE ... SERIAL" and "ALTER SEQUENCE ... OWNED BY" not change the currval() state of the sequence. - Preserve the tablespace and storage parameters of indexes that are rebuilt by "ALTER TABLE ... ALTER COLUMN TYPE". - Make archive recovery always start a new WAL timeline, rather than only when a recovery stop time was used. This avoids a corner-case risk of trying to overwrite an existing archived copy of the last WAL segment, and seems simpler and cleaner than the original definition. - Make "VACUUM" not use all of maintenance_work_mem when the table is too small for it to be useful. - Fix potential crash in translate() when using a multibyte database encoding. - Make corr() return the correct result for negative correlation values. - Fix overflow in extract(epoch from interval) for intervals exceeding 68 years. - Fix PL/Perl to not fail when a UTF-8 regular expression is used in a trusted function. - Fix PL/Python to work correctly with Python 2.5 on 64-bit machines (Marko Kreen) - Fix PL/Python to not crash on long exception messages. - Fix pg_dump to correctly handle inheritance child tables that have default expressions different from their parent's. - Fix libpq crash when PGPASSFILE refers to a file that is not a plain file. - ecpg parser fixes. - Make "contrib/tablefunc"'s crosstab() handle NULL rowid as a category in its own right, rather than crashing. - Fix tsvector and tsquery output routines to escape backslashes correctly. - Fix crash of to_tsvector() on huge input strings. stable/main/binary-mips/postgresql-8.1_8.1.11-0etch1_mips.deb stable/main/binary-mips/libecpg-dev_8.1.11-0etch1_mips.deb stable/main/binary-mips/postgresql-plpython-8.1_8.1.11-0etch1_mips.deb stable/main/binary-mips/postgresql-pltcl-8.1_8.1.11-0etch1_mips.deb stable/main/binary-mips/libpq-dev_8.1.11-0etch1_mips.deb stable/main/binary-mips/libecpg-compat2_8.1.11-0etch1_mips.deb stable/main/binary-mips/libpq4_8.1.11-0etch1_mips.deb stable/main/binary-mips/libecpg5_8.1.11-0etch1_mips.deb stable/main/binary-mips/postgresql-plperl-8.1_8.1.11-0etch1_mips.deb stable/main/binary-mips/postgresql-contrib-8.1_8.1.11-0etch1_mips.deb stable/main/binary-mips/postgresql-server-dev-8.1_8.1.11-0etch1_mips.deb stable/main/binary-mips/libpgtypes2_8.1.11-0etch1_mips.deb stable/main/binary-mips/postgresql-client-8.1_8.1.11-0etch1_mips.deb postgresql-8.1 (8.1.11-0etch1) stable-security; urgency=low * New upstream security/bugfix release: - Prevent functions in indexes from executing with the privileges of the user running "VACUUM", "ANALYZE", etc. "SET ROLE" is now forbidden within a SECURITY DEFINER context. [CVE-2007-6600] - Suitably crafted regular-expression patterns could cause crashes, infinite or near-infinite looping, and/or massive memory consumption, all of which pose denial-of-service hazards for applications that accept regex search patterns from untrustworthy sources. [CVE-2007-4769, CVE-2007-4772, CVE-2007-6067] - Require non-superusers who use "/contrib/dblink" to use only password authentication, as a security measure. The fix that appeared for this in 8.2.5 was incomplete, as it plugged the hole for only some "dblink" functions. [CVE-2007-6601, CVE-2007-3278] - Fix bugs in WAL replay for GIN indexes. - Fix GIN index build to work properly when maintenance_work_mem is 4GB or more. - Improve planner's handling of LIKE/regex estimation in non-C locales. - Fix planning-speed problem for deep outer-join nests, as well as possible poor choice of join order. - Fix planner failure in some cases of WHERE false AND var IN (SELECT ...). - Make "CREATE TABLE ... SERIAL" and "ALTER SEQUENCE ... OWNED BY" not change the currval() state of the sequence. - Preserve the tablespace and storage parameters of indexes that are rebuilt by "ALTER TABLE ... ALTER COLUMN TYPE". - Make archive recovery always start a new WAL timeline, rather than only when a recovery stop time was used. This avoids a corner-case risk of trying to overwrite an existing archived copy of the last WAL segment, and seems simpler and cleaner than the original definition. - Make "VACUUM" not use all of maintenance_work_mem when the table is too small for it to be useful. - Fix potential crash in translate() when using a multibyte database encoding. - Make corr() return the correct result for negative correlation values. - Fix overflow in extract(epoch from interval) for intervals exceeding 68 years. - Fix PL/Perl to not fail when a UTF-8 regular expression is used in a trusted function. - Fix PL/Python to work correctly with Python 2.5 on 64-bit machines (Marko Kreen) - Fix PL/Python to not crash on long exception messages. - Fix pg_dump to correctly handle inheritance child tables that have default expressions different from their parent's. - Fix libpq crash when PGPASSFILE refers to a file that is not a plain file. - ecpg parser fixes. - Make "contrib/tablefunc"'s crosstab() handle NULL rowid as a category in its own right, rather than crashing. - Fix tsvector and tsquery output routines to escape backslashes correctly. - Fix crash of to_tsvector() on huge input strings. stable/main/binary-ia64/libpgtypes2_8.1.11-0etch1_ia64.deb stable/main/binary-ia64/postgresql-pltcl-8.1_8.1.11-0etch1_ia64.deb stable/main/binary-ia64/postgresql-client-8.1_8.1.11-0etch1_ia64.deb stable/main/binary-ia64/postgresql-plpython-8.1_8.1.11-0etch1_ia64.deb stable/main/binary-ia64/libecpg-dev_8.1.11-0etch1_ia64.deb stable/main/binary-ia64/postgresql-contrib-8.1_8.1.11-0etch1_ia64.deb stable/main/binary-ia64/postgresql-server-dev-8.1_8.1.11-0etch1_ia64.deb stable/main/binary-ia64/postgresql-plperl-8.1_8.1.11-0etch1_ia64.deb stable/main/binary-ia64/libpq-dev_8.1.11-0etch1_ia64.deb stable/main/binary-ia64/postgresql-8.1_8.1.11-0etch1_ia64.deb stable/main/binary-ia64/libpq4_8.1.11-0etch1_ia64.deb stable/main/binary-ia64/libecpg-compat2_8.1.11-0etch1_ia64.deb stable/main/binary-ia64/libecpg5_8.1.11-0etch1_ia64.deb postgresql-8.1 (8.1.11-0etch1) stable-security; urgency=low * New upstream security/bugfix release: - Prevent functions in indexes from executing with the privileges of the user running "VACUUM", "ANALYZE", etc. "SET ROLE" is now forbidden within a SECURITY DEFINER context. [CVE-2007-6600] - Suitably crafted regular-expression patterns could cause crashes, infinite or near-infinite looping, and/or massive memory consumption, all of which pose denial-of-service hazards for applications that accept regex search patterns from untrustworthy sources. [CVE-2007-4769, CVE-2007-4772, CVE-2007-6067] - Require non-superusers who use "/contrib/dblink" to use only password authentication, as a security measure. The fix that appeared for this in 8.2.5 was incomplete, as it plugged the hole for only some "dblink" functions. [CVE-2007-6601, CVE-2007-3278] - Fix bugs in WAL replay for GIN indexes. - Fix GIN index build to work properly when maintenance_work_mem is 4GB or more. - Improve planner's handling of LIKE/regex estimation in non-C locales. - Fix planning-speed problem for deep outer-join nests, as well as possible poor choice of join order. - Fix planner failure in some cases of WHERE false AND var IN (SELECT ...). - Make "CREATE TABLE ... SERIAL" and "ALTER SEQUENCE ... OWNED BY" not change the currval() state of the sequence. - Preserve the tablespace and storage parameters of indexes that are rebuilt by "ALTER TABLE ... ALTER COLUMN TYPE". - Make archive recovery always start a new WAL timeline, rather than only when a recovery stop time was used. This avoids a corner-case risk of trying to overwrite an existing archived copy of the last WAL segment, and seems simpler and cleaner than the original definition. - Make "VACUUM" not use all of maintenance_work_mem when the table is too small for it to be useful. - Fix potential crash in translate() when using a multibyte database encoding. - Make corr() return the correct result for negative correlation values. - Fix overflow in extract(epoch from interval) for intervals exceeding 68 years. - Fix PL/Perl to not fail when a UTF-8 regular expression is used in a trusted function. - Fix PL/Python to work correctly with Python 2.5 on 64-bit machines (Marko Kreen) - Fix PL/Python to not crash on long exception messages. - Fix pg_dump to correctly handle inheritance child tables that have default expressions different from their parent's. - Fix libpq crash when PGPASSFILE refers to a file that is not a plain file. - ecpg parser fixes. - Make "contrib/tablefunc"'s crosstab() handle NULL rowid as a category in its own right, rather than crashing. - Fix tsvector and tsquery output routines to escape backslashes correctly. - Fix crash of to_tsvector() on huge input strings. stable/main/binary-hppa/libpgtypes2_8.1.11-0etch1_hppa.deb stable/main/binary-hppa/libecpg-compat2_8.1.11-0etch1_hppa.deb stable/main/binary-hppa/libecpg5_8.1.11-0etch1_hppa.deb stable/main/binary-hppa/libpq4_8.1.11-0etch1_hppa.deb stable/main/binary-hppa/postgresql-contrib-8.1_8.1.11-0etch1_hppa.deb stable/main/binary-hppa/postgresql-client-8.1_8.1.11-0etch1_hppa.deb stable/main/binary-hppa/postgresql-plpython-8.1_8.1.11-0etch1_hppa.deb stable/main/binary-hppa/postgresql-server-dev-8.1_8.1.11-0etch1_hppa.deb stable/main/binary-hppa/postgresql-8.1_8.1.11-0etch1_hppa.deb stable/main/binary-hppa/libpq-dev_8.1.11-0etch1_hppa.deb stable/main/binary-hppa/postgresql-plperl-8.1_8.1.11-0etch1_hppa.deb stable/main/binary-hppa/postgresql-pltcl-8.1_8.1.11-0etch1_hppa.deb stable/main/binary-hppa/libecpg-dev_8.1.11-0etch1_hppa.deb postgresql-8.1 (8.1.11-0etch1) stable-security; urgency=low * New upstream security/bugfix release: - Prevent functions in indexes from executing with the privileges of the user running "VACUUM", "ANALYZE", etc. "SET ROLE" is now forbidden within a SECURITY DEFINER context. [CVE-2007-6600] - Suitably crafted regular-expression patterns could cause crashes, infinite or near-infinite looping, and/or massive memory consumption, all of which pose denial-of-service hazards for applications that accept regex search patterns from untrustworthy sources. [CVE-2007-4769, CVE-2007-4772, CVE-2007-6067] - Require non-superusers who use "/contrib/dblink" to use only password authentication, as a security measure. The fix that appeared for this in 8.2.5 was incomplete, as it plugged the hole for only some "dblink" functions. [CVE-2007-6601, CVE-2007-3278] - Fix bugs in WAL replay for GIN indexes. - Fix GIN index build to work properly when maintenance_work_mem is 4GB or more. - Improve planner's handling of LIKE/regex estimation in non-C locales. - Fix planning-speed problem for deep outer-join nests, as well as possible poor choice of join order. - Fix planner failure in some cases of WHERE false AND var IN (SELECT ...). - Make "CREATE TABLE ... SERIAL" and "ALTER SEQUENCE ... OWNED BY" not change the currval() state of the sequence. - Preserve the tablespace and storage parameters of indexes that are rebuilt by "ALTER TABLE ... ALTER COLUMN TYPE". - Make archive recovery always start a new WAL timeline, rather than only when a recovery stop time was used. This avoids a corner-case risk of trying to overwrite an existing archived copy of the last WAL segment, and seems simpler and cleaner than the original definition. - Make "VACUUM" not use all of maintenance_work_mem when the table is too small for it to be useful. - Fix potential crash in translate() when using a multibyte database encoding. - Make corr() return the correct result for negative correlation values. - Fix overflow in extract(epoch from interval) for intervals exceeding 68 years. - Fix PL/Perl to not fail when a UTF-8 regular expression is used in a trusted function. - Fix PL/Python to work correctly with Python 2.5 on 64-bit machines (Marko Kreen) - Fix PL/Python to not crash on long exception messages. - Fix pg_dump to correctly handle inheritance child tables that have default expressions different from their parent's. - Fix libpq crash when PGPASSFILE refers to a file that is not a plain file. - ecpg parser fixes. - Make "contrib/tablefunc"'s crosstab() handle NULL rowid as a category in its own right, rather than crashing. - Fix tsvector and tsquery output routines to escape backslashes correctly. - Fix crash of to_tsvector() on huge input strings. stable/main/binary-arm/postgresql-8.1_8.1.11-0etch1_arm.deb stable/main/binary-arm/libecpg-dev_8.1.11-0etch1_arm.deb stable/main/binary-arm/postgresql-server-dev-8.1_8.1.11-0etch1_arm.deb stable/main/binary-arm/libpgtypes2_8.1.11-0etch1_arm.deb stable/main/binary-arm/libecpg-compat2_8.1.11-0etch1_arm.deb stable/main/binary-arm/libpq-dev_8.1.11-0etch1_arm.deb stable/main/binary-arm/postgresql-pltcl-8.1_8.1.11-0etch1_arm.deb stable/main/binary-arm/libpq4_8.1.11-0etch1_arm.deb stable/main/binary-arm/postgresql-client-8.1_8.1.11-0etch1_arm.deb stable/main/binary-arm/postgresql-plpython-8.1_8.1.11-0etch1_arm.deb stable/main/binary-arm/libecpg5_8.1.11-0etch1_arm.deb stable/main/binary-arm/postgresql-contrib-8.1_8.1.11-0etch1_arm.deb stable/main/binary-arm/postgresql-plperl-8.1_8.1.11-0etch1_arm.deb postgresql-8.1 (8.1.11-0etch1) stable-security; urgency=low * New upstream security/bugfix release: - Prevent functions in indexes from executing with the privileges of the user running "VACUUM", "ANALYZE", etc. "SET ROLE" is now forbidden within a SECURITY DEFINER context. [CVE-2007-6600] - Suitably crafted regular-expression patterns could cause crashes, infinite or near-infinite looping, and/or massive memory consumption, all of which pose denial-of-service hazards for applications that accept regex search patterns from untrustworthy sources. [CVE-2007-4769, CVE-2007-4772, CVE-2007-6067] - Require non-superusers who use "/contrib/dblink" to use only password authentication, as a security measure. The fix that appeared for this in 8.2.5 was incomplete, as it plugged the hole for only some "dblink" functions. [CVE-2007-6601, CVE-2007-3278] - Fix bugs in WAL replay for GIN indexes. - Fix GIN index build to work properly when maintenance_work_mem is 4GB or more. - Improve planner's handling of LIKE/regex estimation in non-C locales. - Fix planning-speed problem for deep outer-join nests, as well as possible poor choice of join order. - Fix planner failure in some cases of WHERE false AND var IN (SELECT ...). - Make "CREATE TABLE ... SERIAL" and "ALTER SEQUENCE ... OWNED BY" not change the currval() state of the sequence. - Preserve the tablespace and storage parameters of indexes that are rebuilt by "ALTER TABLE ... ALTER COLUMN TYPE". - Make archive recovery always start a new WAL timeline, rather than only when a recovery stop time was used. This avoids a corner-case risk of trying to overwrite an existing archived copy of the last WAL segment, and seems simpler and cleaner than the original definition. - Make "VACUUM" not use all of maintenance_work_mem when the table is too small for it to be useful. - Fix potential crash in translate() when using a multibyte database encoding. - Make corr() return the correct result for negative correlation values. - Fix overflow in extract(epoch from interval) for intervals exceeding 68 years. - Fix PL/Perl to not fail when a UTF-8 regular expression is used in a trusted function. - Fix PL/Python to work correctly with Python 2.5 on 64-bit machines (Marko Kreen) - Fix PL/Python to not crash on long exception messages. - Fix pg_dump to correctly handle inheritance child tables that have default expressions different from their parent's. - Fix libpq crash when PGPASSFILE refers to a file that is not a plain file. - ecpg parser fixes. - Make "contrib/tablefunc"'s crosstab() handle NULL rowid as a category in its own right, rather than crashing. - Fix tsvector and tsquery output routines to escape backslashes correctly. - Fix crash of to_tsvector() on huge input strings. stable/main/binary-amd64/libecpg-compat2_8.1.11-0etch1_amd64.deb stable/main/binary-amd64/libecpg-dev_8.1.11-0etch1_amd64.deb stable/main/binary-amd64/postgresql-8.1_8.1.11-0etch1_amd64.deb stable/main/binary-amd64/libecpg5_8.1.11-0etch1_amd64.deb stable/main/binary-amd64/libpq-dev_8.1.11-0etch1_amd64.deb stable/main/binary-amd64/postgresql-plperl-8.1_8.1.11-0etch1_amd64.deb stable/main/binary-amd64/postgresql-pltcl-8.1_8.1.11-0etch1_amd64.deb stable/main/binary-amd64/postgresql-server-dev-8.1_8.1.11-0etch1_amd64.deb stable/main/binary-amd64/postgresql-plpython-8.1_8.1.11-0etch1_amd64.deb stable/main/binary-amd64/libpq4_8.1.11-0etch1_amd64.deb stable/main/binary-amd64/libpgtypes2_8.1.11-0etch1_amd64.deb stable/main/binary-amd64/postgresql-contrib-8.1_8.1.11-0etch1_amd64.deb stable/main/binary-amd64/postgresql-client-8.1_8.1.11-0etch1_amd64.deb postgresql-8.1 (8.1.11-0etch1) stable-security; urgency=low * New upstream security/bugfix release: - Prevent functions in indexes from executing with the privileges of the user running "VACUUM", "ANALYZE", etc. "SET ROLE" is now forbidden within a SECURITY DEFINER context. [CVE-2007-6600] - Suitably crafted regular-expression patterns could cause crashes, infinite or near-infinite looping, and/or massive memory consumption, all of which pose denial-of-service hazards for applications that accept regex search patterns from untrustworthy sources. [CVE-2007-4769, CVE-2007-4772, CVE-2007-6067] - Require non-superusers who use "/contrib/dblink" to use only password authentication, as a security measure. The fix that appeared for this in 8.2.5 was incomplete, as it plugged the hole for only some "dblink" functions. [CVE-2007-6601, CVE-2007-3278] - Fix bugs in WAL replay for GIN indexes. - Fix GIN index build to work properly when maintenance_work_mem is 4GB or more. - Improve planner's handling of LIKE/regex estimation in non-C locales. - Fix planning-speed problem for deep outer-join nests, as well as possible poor choice of join order. - Fix planner failure in some cases of WHERE false AND var IN (SELECT ...). - Make "CREATE TABLE ... SERIAL" and "ALTER SEQUENCE ... OWNED BY" not change the currval() state of the sequence. - Preserve the tablespace and storage parameters of indexes that are rebuilt by "ALTER TABLE ... ALTER COLUMN TYPE". - Make archive recovery always start a new WAL timeline, rather than only when a recovery stop time was used. This avoids a corner-case risk of trying to overwrite an existing archived copy of the last WAL segment, and seems simpler and cleaner than the original definition. - Make "VACUUM" not use all of maintenance_work_mem when the table is too small for it to be useful. - Fix potential crash in translate() when using a multibyte database encoding. - Make corr() return the correct result for negative correlation values. - Fix overflow in extract(epoch from interval) for intervals exceeding 68 years. - Fix PL/Perl to not fail when a UTF-8 regular expression is used in a trusted function. - Fix PL/Python to work correctly with Python 2.5 on 64-bit machines (Marko Kreen) - Fix PL/Python to not crash on long exception messages. - Fix pg_dump to correctly handle inheritance child tables that have default expressions different from their parent's. - Fix libpq crash when PGPASSFILE refers to a file that is not a plain file. - ecpg parser fixes. - Make "contrib/tablefunc"'s crosstab() handle NULL rowid as a category in its own right, rather than crashing. - Fix tsvector and tsquery output routines to escape backslashes correctly. - Fix crash of to_tsvector() on huge input strings. stable/main/binary-alpha/postgresql-contrib-8.1_8.1.11-0etch1_alpha.deb stable/main/binary-alpha/postgresql-server-dev-8.1_8.1.11-0etch1_alpha.deb stable/main/binary-alpha/postgresql-plpython-8.1_8.1.11-0etch1_alpha.deb stable/main/binary-alpha/libpq4_8.1.11-0etch1_alpha.deb stable/main/binary-alpha/libpgtypes2_8.1.11-0etch1_alpha.deb stable/main/binary-alpha/libecpg-dev_8.1.11-0etch1_alpha.deb stable/main/binary-alpha/libpq-dev_8.1.11-0etch1_alpha.deb stable/main/binary-alpha/libecpg5_8.1.11-0etch1_alpha.deb stable/main/binary-alpha/postgresql-pltcl-8.1_8.1.11-0etch1_alpha.deb stable/main/binary-alpha/postgresql-plperl-8.1_8.1.11-0etch1_alpha.deb stable/main/binary-alpha/libecpg-compat2_8.1.11-0etch1_alpha.deb stable/main/binary-alpha/postgresql-client-8.1_8.1.11-0etch1_alpha.deb stable/main/binary-alpha/postgresql-8.1_8.1.11-0etch1_alpha.deb postgresql-8.1 (8.1.11-0etch1) stable-security; urgency=low * New upstream security/bugfix release: - Prevent functions in indexes from executing with the privileges of the user running "VACUUM", "ANALYZE", etc. "SET ROLE" is now forbidden within a SECURITY DEFINER context. [CVE-2007-6600] - Suitably crafted regular-expression patterns could cause crashes, infinite or near-infinite looping, and/or massive memory consumption, all of which pose denial-of-service hazards for applications that accept regex search patterns from untrustworthy sources. [CVE-2007-4769, CVE-2007-4772, CVE-2007-6067] - Require non-superusers who use "/contrib/dblink" to use only password authentication, as a security measure. The fix that appeared for this in 8.2.5 was incomplete, as it plugged the hole for only some "dblink" functions. [CVE-2007-6601, CVE-2007-3278] - Fix bugs in WAL replay for GIN indexes. - Fix GIN index build to work properly when maintenance_work_mem is 4GB or more. - Improve planner's handling of LIKE/regex estimation in non-C locales. - Fix planning-speed problem for deep outer-join nests, as well as possible poor choice of join order. - Fix planner failure in some cases of WHERE false AND var IN (SELECT ...). - Make "CREATE TABLE ... SERIAL" and "ALTER SEQUENCE ... OWNED BY" not change the currval() state of the sequence. - Preserve the tablespace and storage parameters of indexes that are rebuilt by "ALTER TABLE ... ALTER COLUMN TYPE". - Make archive recovery always start a new WAL timeline, rather than only when a recovery stop time was used. This avoids a corner-case risk of trying to overwrite an existing archived copy of the last WAL segment, and seems simpler and cleaner than the original definition. - Make "VACUUM" not use all of maintenance_work_mem when the table is too small for it to be useful. - Fix potential crash in translate() when using a multibyte database encoding. - Make corr() return the correct result for negative correlation values. - Fix overflow in extract(epoch from interval) for intervals exceeding 68 years. - Fix PL/Perl to not fail when a UTF-8 regular expression is used in a trusted function. - Fix PL/Python to work correctly with Python 2.5 on 64-bit machines (Marko Kreen) - Fix PL/Python to not crash on long exception messages. - Fix pg_dump to correctly handle inheritance child tables that have default expressions different from their parent's. - Fix libpq crash when PGPASSFILE refers to a file that is not a plain file. - ecpg parser fixes. - Make "contrib/tablefunc"'s crosstab() handle NULL rowid as a category in its own right, rather than crashing. - Fix tsvector and tsquery output routines to escape backslashes correctly. - Fix crash of to_tsvector() on huge input strings. stable/main/binary-i386/libecpg-compat2_8.1.11-0etch1_i386.deb stable/main/binary-i386/postgresql-pltcl-8.1_8.1.11-0etch1_i386.deb stable/main/binary-i386/libpq-dev_8.1.11-0etch1_i386.deb stable/main/binary-i386/postgresql-server-dev-8.1_8.1.11-0etch1_i386.deb stable/main/binary-i386/libpq4_8.1.11-0etch1_i386.deb stable/main/binary-i386/libecpg-dev_8.1.11-0etch1_i386.deb stable/main/binary-i386/postgresql-plperl-8.1_8.1.11-0etch1_i386.deb stable/main/binary-i386/postgresql-contrib-8.1_8.1.11-0etch1_i386.deb stable/main/binary-all/postgresql-doc-8.1_8.1.11-0etch1_all.deb stable/main/source/postgresql-8.1_8.1.11-0etch1.dsc stable/main/binary-i386/libpgtypes2_8.1.11-0etch1_i386.deb stable/main/binary-i386/postgresql-8.1_8.1.11-0etch1_i386.deb stable/main/binary-i386/libecpg5_8.1.11-0etch1_i386.deb stable/main/binary-i386/postgresql-plpython-8.1_8.1.11-0etch1_i386.deb stable/main/source/postgresql-8.1_8.1.11.orig.tar.gz stable/main/binary-i386/postgresql-client-8.1_8.1.11-0etch1_i386.deb stable/main/source/postgresql-8.1_8.1.11-0etch1.diff.gz postgresql-8.1 (8.1.11-0etch1) stable-security; urgency=low * New upstream security/bugfix release: - Prevent functions in indexes from executing with the privileges of the user running "VACUUM", "ANALYZE", etc. "SET ROLE" is now forbidden within a SECURITY DEFINER context. [CVE-2007-6600] - Suitably crafted regular-expression patterns could cause crashes, infinite or near-infinite looping, and/or massive memory consumption, all of which pose denial-of-service hazards for applications that accept regex search patterns from untrustworthy sources. [CVE-2007-4769, CVE-2007-4772, CVE-2007-6067] - Require non-superusers who use "/contrib/dblink" to use only password authentication, as a security measure. The fix that appeared for this in 8.2.5 was incomplete, as it plugged the hole for only some "dblink" functions. [CVE-2007-6601, CVE-2007-3278] - Fix bugs in WAL replay for GIN indexes. - Fix GIN index build to work properly when maintenance_work_mem is 4GB or more. - Improve planner's handling of LIKE/regex estimation in non-C locales. - Fix planning-speed problem for deep outer-join nests, as well as possible poor choice of join order. - Fix planner failure in some cases of WHERE false AND var IN (SELECT ...). - Make "CREATE TABLE ... SERIAL" and "ALTER SEQUENCE ... OWNED BY" not change the currval() state of the sequence. - Preserve the tablespace and storage parameters of indexes that are rebuilt by "ALTER TABLE ... ALTER COLUMN TYPE". - Make archive recovery always start a new WAL timeline, rather than only when a recovery stop time was used. This avoids a corner-case risk of trying to overwrite an existing archived copy of the last WAL segment, and seems simpler and cleaner than the original definition. - Make "VACUUM" not use all of maintenance_work_mem when the table is too small for it to be useful. - Fix potential crash in translate() when using a multibyte database encoding. - Make corr() return the correct result for negative correlation values. - Fix overflow in extract(epoch from interval) for intervals exceeding 68 years. - Fix PL/Perl to not fail when a UTF-8 regular expression is used in a trusted function. - Fix PL/Python to work correctly with Python 2.5 on 64-bit machines (Marko Kreen) - Fix PL/Python to not crash on long exception messages. - Fix pg_dump to correctly handle inheritance child tables that have default expressions different from their parent's. - Fix libpq crash when PGPASSFILE refers to a file that is not a plain file. - ecpg parser fixes. - Make "contrib/tablefunc"'s crosstab() handle NULL rowid as a category in its own right, rather than crashing. - Fix tsvector and tsquery output routines to escape backslashes correctly. - Fix crash of to_tsvector() on huge input strings. stable/main/binary-sparc/postgresql-plperl-7.4_7.4.19-0etch1_sparc.deb stable/main/binary-sparc/postgresql-contrib-7.4_7.4.19-0etch1_sparc.deb stable/main/binary-sparc/postgresql-client-7.4_7.4.19-0etch1_sparc.deb stable/main/binary-sparc/postgresql-plpython-7.4_7.4.19-0etch1_sparc.deb stable/main/binary-sparc/postgresql-7.4_7.4.19-0etch1_sparc.deb stable/main/binary-sparc/postgresql-pltcl-7.4_7.4.19-0etch1_sparc.deb postgresql-7.4 (1:7.4.19-0etch1) stable-security; urgency=low * New upstream bugfix release 7.4.18: - Require non-superusers who use "/contrib/dblink" to use only password authentication, as a security measure. [CVE-2007-3278, CVE-2007-3280] - Make "CREATE DOMAIN ... DEFAULT NULL" work properly. - Fix excessive logging of SSL error messages. - Fix crash when log_min_error_statement logging runs out of memory. - Prevent "CLUSTER" from failing due to attempting to process temporary tables of other sessions. * New upstream security/bugfix release 7.4.19: - Prevent functions in indexes from executing with the privileges of the user running "VACUUM", "ANALYZE", etc. "SET ROLE" is now forbidden within a SECURITY DEFINER context. [CVE-2007-6600] - Suitably crafted regular-expression patterns could cause crashes, infinite or near-infinite looping, and/or massive memory consumption, all of which pose denial-of-service hazards for applications that accept regex search patterns from untrustworthy sources. [CVE-2007-4769, CVE-2007-4772, CVE-2007-6067] - Require non-superusers who use "/contrib/dblink" to use only password authentication, as a security measure. The fix that appeared for this in 8.2.5 was incomplete, as it plugged the hole for only some "dblink" functions. [CVE-2007-6601, CVE-2007-3278] - Fix planner failure in some cases of WHERE false AND var IN (SELECT ...). - Fix potential crash in translate() when using a multibyte database encoding. - Fix PL/Python to not crash on long exception messages. - ecpg parser fixes. - Make "contrib/tablefunc"'s crosstab() handle NULL rowid as a category in its own right, rather than crashing. - Fix tsvector and tsquery output routines to escape backslashes correctly. - Fix crash of to_tsvector() on huge input strings. * debian/patches/21_krb5_check_hostname.patch: Adapt to new upstream release. stable/main/binary-s390/postgresql-plpython-7.4_7.4.19-0etch1_s390.deb stable/main/binary-s390/postgresql-pltcl-7.4_7.4.19-0etch1_s390.deb stable/main/binary-s390/postgresql-7.4_7.4.19-0etch1_s390.deb stable/main/binary-s390/postgresql-plperl-7.4_7.4.19-0etch1_s390.deb stable/main/binary-s390/postgresql-client-7.4_7.4.19-0etch1_s390.deb stable/main/binary-s390/postgresql-contrib-7.4_7.4.19-0etch1_s390.deb postgresql-7.4 (1:7.4.19-0etch1) stable-security; urgency=low * New upstream bugfix release 7.4.18: - Require non-superusers who use "/contrib/dblink" to use only password authentication, as a security measure. [CVE-2007-3278, CVE-2007-3280] - Make "CREATE DOMAIN ... DEFAULT NULL" work properly. - Fix excessive logging of SSL error messages. - Fix crash when log_min_error_statement logging runs out of memory. - Prevent "CLUSTER" from failing due to attempting to process temporary tables of other sessions. * New upstream security/bugfix release 7.4.19: - Prevent functions in indexes from executing with the privileges of the user running "VACUUM", "ANALYZE", etc. "SET ROLE" is now forbidden within a SECURITY DEFINER context. [CVE-2007-6600] - Suitably crafted regular-expression patterns could cause crashes, infinite or near-infinite looping, and/or massive memory consumption, all of which pose denial-of-service hazards for applications that accept regex search patterns from untrustworthy sources. [CVE-2007-4769, CVE-2007-4772, CVE-2007-6067] - Require non-superusers who use "/contrib/dblink" to use only password authentication, as a security measure. The fix that appeared for this in 8.2.5 was incomplete, as it plugged the hole for only some "dblink" functions. [CVE-2007-6601, CVE-2007-3278] - Fix planner failure in some cases of WHERE false AND var IN (SELECT ...). - Fix potential crash in translate() when using a multibyte database encoding. - Fix PL/Python to not crash on long exception messages. - ecpg parser fixes. - Make "contrib/tablefunc"'s crosstab() handle NULL rowid as a category in its own right, rather than crashing. - Fix tsvector and tsquery output routines to escape backslashes correctly. - Fix crash of to_tsvector() on huge input strings. * debian/patches/21_krb5_check_hostname.patch: Adapt to new upstream release. stable/main/binary-powerpc/postgresql-7.4_7.4.19-0etch1_powerpc.deb stable/main/binary-powerpc/postgresql-plpython-7.4_7.4.19-0etch1_powerpc.deb stable/main/binary-powerpc/postgresql-client-7.4_7.4.19-0etch1_powerpc.deb stable/main/binary-powerpc/postgresql-pltcl-7.4_7.4.19-0etch1_powerpc.deb stable/main/binary-powerpc/postgresql-contrib-7.4_7.4.19-0etch1_powerpc.deb stable/main/binary-powerpc/postgresql-plperl-7.4_7.4.19-0etch1_powerpc.deb postgresql-7.4 (1:7.4.19-0etch1) stable-security; urgency=low * New upstream bugfix release 7.4.18: - Require non-superusers who use "/contrib/dblink" to use only password authentication, as a security measure. [CVE-2007-3278, CVE-2007-3280] - Make "CREATE DOMAIN ... DEFAULT NULL" work properly. - Fix excessive logging of SSL error messages. - Fix crash when log_min_error_statement logging runs out of memory. - Prevent "CLUSTER" from failing due to attempting to process temporary tables of other sessions. * New upstream security/bugfix release 7.4.19: - Prevent functions in indexes from executing with the privileges of the user running "VACUUM", "ANALYZE", etc. "SET ROLE" is now forbidden within a SECURITY DEFINER context. [CVE-2007-6600] - Suitably crafted regular-expression patterns could cause crashes, infinite or near-infinite looping, and/or massive memory consumption, all of which pose denial-of-service hazards for applications that accept regex search patterns from untrustworthy sources. [CVE-2007-4769, CVE-2007-4772, CVE-2007-6067] - Require non-superusers who use "/contrib/dblink" to use only password authentication, as a security measure. The fix that appeared for this in 8.2.5 was incomplete, as it plugged the hole for only some "dblink" functions. [CVE-2007-6601, CVE-2007-3278] - Fix planner failure in some cases of WHERE false AND var IN (SELECT ...). - Fix potential crash in translate() when using a multibyte database encoding. - Fix PL/Python to not crash on long exception messages. - ecpg parser fixes. - Make "contrib/tablefunc"'s crosstab() handle NULL rowid as a category in its own right, rather than crashing. - Fix tsvector and tsquery output routines to escape backslashes correctly. - Fix crash of to_tsvector() on huge input strings. * debian/patches/21_krb5_check_hostname.patch: Adapt to new upstream release. stable/main/binary-mipsel/postgresql-contrib-7.4_7.4.19-0etch1_mipsel.deb stable/main/binary-mipsel/postgresql-7.4_7.4.19-0etch1_mipsel.deb stable/main/binary-mipsel/postgresql-plperl-7.4_7.4.19-0etch1_mipsel.deb stable/main/binary-mipsel/postgresql-pltcl-7.4_7.4.19-0etch1_mipsel.deb stable/main/binary-mipsel/postgresql-plpython-7.4_7.4.19-0etch1_mipsel.deb stable/main/binary-mipsel/postgresql-client-7.4_7.4.19-0etch1_mipsel.deb postgresql-7.4 (1:7.4.19-0etch1) stable-security; urgency=low * New upstream bugfix release 7.4.18: - Require non-superusers who use "/contrib/dblink" to use only password authentication, as a security measure. [CVE-2007-3278, CVE-2007-3280] - Make "CREATE DOMAIN ... DEFAULT NULL" work properly. - Fix excessive logging of SSL error messages. - Fix crash when log_min_error_statement logging runs out of memory. - Prevent "CLUSTER" from failing due to attempting to process temporary tables of other sessions. * New upstream security/bugfix release 7.4.19: - Prevent functions in indexes from executing with the privileges of the user running "VACUUM", "ANALYZE", etc. "SET ROLE" is now forbidden within a SECURITY DEFINER context. [CVE-2007-6600] - Suitably crafted regular-expression patterns could cause crashes, infinite or near-infinite looping, and/or massive memory consumption, all of which pose denial-of-service hazards for applications that accept regex search patterns from untrustworthy sources. [CVE-2007-4769, CVE-2007-4772, CVE-2007-6067] - Require non-superusers who use "/contrib/dblink" to use only password authentication, as a security measure. The fix that appeared for this in 8.2.5 was incomplete, as it plugged the hole for only some "dblink" functions. [CVE-2007-6601, CVE-2007-3278] - Fix planner failure in some cases of WHERE false AND var IN (SELECT ...). - Fix potential crash in translate() when using a multibyte database encoding. - Fix PL/Python to not crash on long exception messages. - ecpg parser fixes. - Make "contrib/tablefunc"'s crosstab() handle NULL rowid as a category in its own right, rather than crashing. - Fix tsvector and tsquery output routines to escape backslashes correctly. - Fix crash of to_tsvector() on huge input strings. * debian/patches/21_krb5_check_hostname.patch: Adapt to new upstream release. stable/main/binary-mips/postgresql-plpython-7.4_7.4.19-0etch1_mips.deb stable/main/binary-mips/postgresql-client-7.4_7.4.19-0etch1_mips.deb stable/main/binary-mips/postgresql-plperl-7.4_7.4.19-0etch1_mips.deb stable/main/binary-mips/postgresql-7.4_7.4.19-0etch1_mips.deb stable/main/binary-mips/postgresql-pltcl-7.4_7.4.19-0etch1_mips.deb stable/main/binary-mips/postgresql-contrib-7.4_7.4.19-0etch1_mips.deb postgresql-7.4 (1:7.4.19-0etch1) stable-security; urgency=low * New upstream bugfix release 7.4.18: - Require non-superusers who use "/contrib/dblink" to use only password authentication, as a security measure. [CVE-2007-3278, CVE-2007-3280] - Make "CREATE DOMAIN ... DEFAULT NULL" work properly. - Fix excessive logging of SSL error messages. - Fix crash when log_min_error_statement logging runs out of memory. - Prevent "CLUSTER" from failing due to attempting to process temporary tables of other sessions. * New upstream security/bugfix release 7.4.19: - Prevent functions in indexes from executing with the privileges of the user running "VACUUM", "ANALYZE", etc. "SET ROLE" is now forbidden within a SECURITY DEFINER context. [CVE-2007-6600] - Suitably crafted regular-expression patterns could cause crashes, infinite or near-infinite looping, and/or massive memory consumption, all of which pose denial-of-service hazards for applications that accept regex search patterns from untrustworthy sources. [CVE-2007-4769, CVE-2007-4772, CVE-2007-6067] - Require non-superusers who use "/contrib/dblink" to use only password authentication, as a security measure. The fix that appeared for this in 8.2.5 was incomplete, as it plugged the hole for only some "dblink" functions. [CVE-2007-6601, CVE-2007-3278] - Fix planner failure in some cases of WHERE false AND var IN (SELECT ...). - Fix potential crash in translate() when using a multibyte database encoding. - Fix PL/Python to not crash on long exception messages. - ecpg parser fixes. - Make "contrib/tablefunc"'s crosstab() handle NULL rowid as a category in its own right, rather than crashing. - Fix tsvector and tsquery output routines to escape backslashes correctly. - Fix crash of to_tsvector() on huge input strings. * debian/patches/21_krb5_check_hostname.patch: Adapt to new upstream release. stable/main/binary-ia64/postgresql-plpython-7.4_7.4.19-0etch1_ia64.deb stable/main/binary-ia64/postgresql-pltcl-7.4_7.4.19-0etch1_ia64.deb stable/main/binary-ia64/postgresql-7.4_7.4.19-0etch1_ia64.deb stable/main/binary-ia64/postgresql-client-7.4_7.4.19-0etch1_ia64.deb stable/main/binary-ia64/postgresql-plperl-7.4_7.4.19-0etch1_ia64.deb stable/main/binary-ia64/postgresql-contrib-7.4_7.4.19-0etch1_ia64.deb postgresql-7.4 (1:7.4.19-0etch1) stable-security; urgency=low * New upstream bugfix release 7.4.18: - Require non-superusers who use "/contrib/dblink" to use only password authentication, as a security measure. [CVE-2007-3278, CVE-2007-3280] - Make "CREATE DOMAIN ... DEFAULT NULL" work properly. - Fix excessive logging of SSL error messages. - Fix crash when log_min_error_statement logging runs out of memory. - Prevent "CLUSTER" from failing due to attempting to process temporary tables of other sessions. * New upstream security/bugfix release 7.4.19: - Prevent functions in indexes from executing with the privileges of the user running "VACUUM", "ANALYZE", etc. "SET ROLE" is now forbidden within a SECURITY DEFINER context. [CVE-2007-6600] - Suitably crafted regular-expression patterns could cause crashes, infinite or near-infinite looping, and/or massive memory consumption, all of which pose denial-of-service hazards for applications that accept regex search patterns from untrustworthy sources. [CVE-2007-4769, CVE-2007-4772, CVE-2007-6067] - Require non-superusers who use "/contrib/dblink" to use only password authentication, as a security measure. The fix that appeared for this in 8.2.5 was incomplete, as it plugged the hole for only some "dblink" functions. [CVE-2007-6601, CVE-2007-3278] - Fix planner failure in some cases of WHERE false AND var IN (SELECT ...). - Fix potential crash in translate() when using a multibyte database encoding. - Fix PL/Python to not crash on long exception messages. - ecpg parser fixes. - Make "contrib/tablefunc"'s crosstab() handle NULL rowid as a category in its own right, rather than crashing. - Fix tsvector and tsquery output routines to escape backslashes correctly. - Fix crash of to_tsvector() on huge input strings. * debian/patches/21_krb5_check_hostname.patch: Adapt to new upstream release. stable/main/binary-hppa/postgresql-pltcl-7.4_7.4.19-0etch1_hppa.deb stable/main/binary-hppa/postgresql-client-7.4_7.4.19-0etch1_hppa.deb stable/main/binary-hppa/postgresql-plpython-7.4_7.4.19-0etch1_hppa.deb stable/main/binary-hppa/postgresql-contrib-7.4_7.4.19-0etch1_hppa.deb stable/main/binary-hppa/postgresql-plperl-7.4_7.4.19-0etch1_hppa.deb stable/main/binary-hppa/postgresql-7.4_7.4.19-0etch1_hppa.deb postgresql-7.4 (1:7.4.19-0etch1) stable-security; urgency=low * New upstream bugfix release 7.4.18: - Require non-superusers who use "/contrib/dblink" to use only password authentication, as a security measure. [CVE-2007-3278, CVE-2007-3280] - Make "CREATE DOMAIN ... DEFAULT NULL" work properly. - Fix excessive logging of SSL error messages. - Fix crash when log_min_error_statement logging runs out of memory. - Prevent "CLUSTER" from failing due to attempting to process temporary tables of other sessions. * New upstream security/bugfix release 7.4.19: - Prevent functions in indexes from executing with the privileges of the user running "VACUUM", "ANALYZE", etc. "SET ROLE" is now forbidden within a SECURITY DEFINER context. [CVE-2007-6600] - Suitably crafted regular-expression patterns could cause crashes, infinite or near-infinite looping, and/or massive memory consumption, all of which pose denial-of-service hazards for applications that accept regex search patterns from untrustworthy sources. [CVE-2007-4769, CVE-2007-4772, CVE-2007-6067] - Require non-superusers who use "/contrib/dblink" to use only password authentication, as a security measure. The fix that appeared for this in 8.2.5 was incomplete, as it plugged the hole for only some "dblink" functions. [CVE-2007-6601, CVE-2007-3278] - Fix planner failure in some cases of WHERE false AND var IN (SELECT ...). - Fix potential crash in translate() when using a multibyte database encoding. - Fix PL/Python to not crash on long exception messages. - ecpg parser fixes. - Make "contrib/tablefunc"'s crosstab() handle NULL rowid as a category in its own right, rather than crashing. - Fix tsvector and tsquery output routines to escape backslashes correctly. - Fix crash of to_tsvector() on huge input strings. * debian/patches/21_krb5_check_hostname.patch: Adapt to new upstream release. stable/main/binary-arm/postgresql-client-7.4_7.4.19-0etch1_arm.deb stable/main/binary-arm/postgresql-contrib-7.4_7.4.19-0etch1_arm.deb stable/main/binary-arm/postgresql-plperl-7.4_7.4.19-0etch1_arm.deb stable/main/binary-arm/postgresql-pltcl-7.4_7.4.19-0etch1_arm.deb stable/main/binary-arm/postgresql-plpython-7.4_7.4.19-0etch1_arm.deb stable/main/binary-arm/postgresql-7.4_7.4.19-0etch1_arm.deb postgresql-7.4 (1:7.4.19-0etch1) stable-security; urgency=low * New upstream bugfix release 7.4.18: - Require non-superusers who use "/contrib/dblink" to use only password authentication, as a security measure. [CVE-2007-3278, CVE-2007-3280] - Make "CREATE DOMAIN ... DEFAULT NULL" work properly. - Fix excessive logging of SSL error messages. - Fix crash when log_min_error_statement logging runs out of memory. - Prevent "CLUSTER" from failing due to attempting to process temporary tables of other sessions. * New upstream security/bugfix release 7.4.19: - Prevent functions in indexes from executing with the privileges of the user running "VACUUM", "ANALYZE", etc. "SET ROLE" is now forbidden within a SECURITY DEFINER context. [CVE-2007-6600] - Suitably crafted regular-expression patterns could cause crashes, infinite or near-infinite looping, and/or massive memory consumption, all of which pose denial-of-service hazards for applications that accept regex search patterns from untrustworthy sources. [CVE-2007-4769, CVE-2007-4772, CVE-2007-6067] - Require non-superusers who use "/contrib/dblink" to use only password authentication, as a security measure. The fix that appeared for this in 8.2.5 was incomplete, as it plugged the hole for only some "dblink" functions. [CVE-2007-6601, CVE-2007-3278] - Fix planner failure in some cases of WHERE false AND var IN (SELECT ...). - Fix potential crash in translate() when using a multibyte database encoding. - Fix PL/Python to not crash on long exception messages. - ecpg parser fixes. - Make "contrib/tablefunc"'s crosstab() handle NULL rowid as a category in its own right, rather than crashing. - Fix tsvector and tsquery output routines to escape backslashes correctly. - Fix crash of to_tsvector() on huge input strings. * debian/patches/21_krb5_check_hostname.patch: Adapt to new upstream release. stable/main/binary-amd64/postgresql-client-7.4_7.4.19-0etch1_amd64.deb stable/main/binary-amd64/postgresql-7.4_7.4.19-0etch1_amd64.deb stable/main/binary-amd64/postgresql-plperl-7.4_7.4.19-0etch1_amd64.deb stable/main/binary-amd64/postgresql-pltcl-7.4_7.4.19-0etch1_amd64.deb stable/main/binary-amd64/postgresql-plpython-7.4_7.4.19-0etch1_amd64.deb stable/main/binary-amd64/postgresql-contrib-7.4_7.4.19-0etch1_amd64.deb postgresql-7.4 (1:7.4.19-0etch1) stable-security; urgency=low * New upstream bugfix release 7.4.18: - Require non-superusers who use "/contrib/dblink" to use only password authentication, as a security measure. [CVE-2007-3278, CVE-2007-3280] - Make "CREATE DOMAIN ... DEFAULT NULL" work properly. - Fix excessive logging of SSL error messages. - Fix crash when log_min_error_statement logging runs out of memory. - Prevent "CLUSTER" from failing due to attempting to process temporary tables of other sessions. * New upstream security/bugfix release 7.4.19: - Prevent functions in indexes from executing with the privileges of the user running "VACUUM", "ANALYZE", etc. "SET ROLE" is now forbidden within a SECURITY DEFINER context. [CVE-2007-6600] - Suitably crafted regular-expression patterns could cause crashes, infinite or near-infinite looping, and/or massive memory consumption, all of which pose denial-of-service hazards for applications that accept regex search patterns from untrustworthy sources. [CVE-2007-4769, CVE-2007-4772, CVE-2007-6067] - Require non-superusers who use "/contrib/dblink" to use only password authentication, as a security measure. The fix that appeared for this in 8.2.5 was incomplete, as it plugged the hole for only some "dblink" functions. [CVE-2007-6601, CVE-2007-3278] - Fix planner failure in some cases of WHERE false AND var IN (SELECT ...). - Fix potential crash in translate() when using a multibyte database encoding. - Fix PL/Python to not crash on long exception messages. - ecpg parser fixes. - Make "contrib/tablefunc"'s crosstab() handle NULL rowid as a category in its own right, rather than crashing. - Fix tsvector and tsquery output routines to escape backslashes correctly. - Fix crash of to_tsvector() on huge input strings. * debian/patches/21_krb5_check_hostname.patch: Adapt to new upstream release. stable/main/binary-alpha/postgresql-plpython-7.4_7.4.19-0etch1_alpha.deb stable/main/binary-alpha/postgresql-plperl-7.4_7.4.19-0etch1_alpha.deb stable/main/binary-alpha/postgresql-contrib-7.4_7.4.19-0etch1_alpha.deb stable/main/binary-alpha/postgresql-7.4_7.4.19-0etch1_alpha.deb stable/main/binary-alpha/postgresql-client-7.4_7.4.19-0etch1_alpha.deb stable/main/binary-alpha/postgresql-pltcl-7.4_7.4.19-0etch1_alpha.deb postgresql-7.4 (1:7.4.19-0etch1) stable-security; urgency=low * New upstream bugfix release 7.4.18: - Require non-superusers who use "/contrib/dblink" to use only password authentication, as a security measure. [CVE-2007-3278, CVE-2007-3280] - Make "CREATE DOMAIN ... DEFAULT NULL" work properly. - Fix excessive logging of SSL error messages. - Fix crash when log_min_error_statement logging runs out of memory. - Prevent "CLUSTER" from failing due to attempting to process temporary tables of other sessions. * New upstream security/bugfix release 7.4.19: - Prevent functions in indexes from executing with the privileges of the user running "VACUUM", "ANALYZE", etc. "SET ROLE" is now forbidden within a SECURITY DEFINER context. [CVE-2007-6600] - Suitably crafted regular-expression patterns could cause crashes, infinite or near-infinite looping, and/or massive memory consumption, all of which pose denial-of-service hazards for applications that accept regex search patterns from untrustworthy sources. [CVE-2007-4769, CVE-2007-4772, CVE-2007-6067] - Require non-superusers who use "/contrib/dblink" to use only password authentication, as a security measure. The fix that appeared for this in 8.2.5 was incomplete, as it plugged the hole for only some "dblink" functions. [CVE-2007-6601, CVE-2007-3278] - Fix planner failure in some cases of WHERE false AND var IN (SELECT ...). - Fix potential crash in translate() when using a multibyte database encoding. - Fix PL/Python to not crash on long exception messages. - ecpg parser fixes. - Make "contrib/tablefunc"'s crosstab() handle NULL rowid as a category in its own right, rather than crashing. - Fix tsvector and tsquery output routines to escape backslashes correctly. - Fix crash of to_tsvector() on huge input strings. * debian/patches/21_krb5_check_hostname.patch: Adapt to new upstream release. stable/main/binary-i386/postgresql-7.4_7.4.19-0etch1_i386.deb stable/main/binary-all/postgresql-server-dev-7.4_7.4.19-0etch1_all.deb stable/main/source/postgresql-7.4_7.4.19-0etch1.dsc stable/main/binary-i386/postgresql-contrib-7.4_7.4.19-0etch1_i386.deb stable/main/binary-all/postgresql-doc-7.4_7.4.19-0etch1_all.deb stable/main/binary-i386/postgresql-pltcl-7.4_7.4.19-0etch1_i386.deb stable/main/binary-i386/postgresql-plperl-7.4_7.4.19-0etch1_i386.deb stable/main/binary-i386/postgresql-client-7.4_7.4.19-0etch1_i386.deb stable/main/source/postgresql-7.4_7.4.19.orig.tar.gz stable/main/source/postgresql-7.4_7.4.19-0etch1.diff.gz stable/main/binary-i386/postgresql-plpython-7.4_7.4.19-0etch1_i386.deb postgresql-7.4 (1:7.4.19-0etch1) stable-security; urgency=low * New upstream bugfix release 7.4.18: - Require non-superusers who use "/contrib/dblink" to use only password authentication, as a security measure. [CVE-2007-3278, CVE-2007-3280] - Make "CREATE DOMAIN ... DEFAULT NULL" work properly. - Fix excessive logging of SSL error messages. - Fix crash when log_min_error_statement logging runs out of memory. - Prevent "CLUSTER" from failing due to attempting to process temporary tables of other sessions. * New upstream security/bugfix release 7.4.19: - Prevent functions in indexes from executing with the privileges of the user running "VACUUM", "ANALYZE", etc. "SET ROLE" is now forbidden within a SECURITY DEFINER context. [CVE-2007-6600] - Suitably crafted regular-expression patterns could cause crashes, infinite or near-infinite looping, and/or massive memory consumption, all of which pose denial-of-service hazards for applications that accept regex search patterns from untrustworthy sources. [CVE-2007-4769, CVE-2007-4772, CVE-2007-6067] - Require non-superusers who use "/contrib/dblink" to use only password authentication, as a security measure. The fix that appeared for this in 8.2.5 was incomplete, as it plugged the hole for only some "dblink" functions. [CVE-2007-6601, CVE-2007-3278] - Fix planner failure in some cases of WHERE false AND var IN (SELECT ...). - Fix potential crash in translate() when using a multibyte database encoding. - Fix PL/Python to not crash on long exception messages. - ecpg parser fixes. - Make "contrib/tablefunc"'s crosstab() handle NULL rowid as a category in its own right, rather than crashing. - Fix tsvector and tsquery output routines to escape backslashes correctly. - Fix crash of to_tsvector() on huge input strings. * debian/patches/21_krb5_check_hostname.patch: Adapt to new upstream release. stable/main/binary-sparc/poppler-utils_0.4.5-5.1etch2_sparc.deb stable/main/binary-sparc/libpoppler0c2_0.4.5-5.1etch2_sparc.deb stable/main/binary-sparc/libpoppler-qt-dev_0.4.5-5.1etch2_sparc.deb stable/main/binary-sparc/libpoppler0c2-glib_0.4.5-5.1etch2_sparc.deb stable/main/binary-sparc/libpoppler-dev_0.4.5-5.1etch2_sparc.deb stable/main/binary-sparc/libpoppler-glib-dev_0.4.5-5.1etch2_sparc.deb stable/main/binary-sparc/libpoppler0c2-qt_0.4.5-5.1etch2_sparc.deb poppler (0.4.5-5.1etch2) stable-security; urgency=high * Fix CVE-2007-4352 CVE-2007-5392 CVE-2007-5393 stable/main/binary-s390/libpoppler-glib-dev_0.4.5-5.1etch2_s390.deb stable/main/binary-s390/libpoppler0c2-glib_0.4.5-5.1etch2_s390.deb stable/main/binary-s390/libpoppler-dev_0.4.5-5.1etch2_s390.deb stable/main/binary-s390/libpoppler-qt-dev_0.4.5-5.1etch2_s390.deb stable/main/binary-s390/poppler-utils_0.4.5-5.1etch2_s390.deb stable/main/binary-s390/libpoppler0c2-qt_0.4.5-5.1etch2_s390.deb stable/main/binary-s390/libpoppler0c2_0.4.5-5.1etch2_s390.deb poppler (0.4.5-5.1etch2) stable-security; urgency=high * Fix CVE-2007-4352 CVE-2007-5392 CVE-2007-5393 stable/main/binary-powerpc/libpoppler-glib-dev_0.4.5-5.1etch2_powerpc.deb stable/main/binary-powerpc/poppler-utils_0.4.5-5.1etch2_powerpc.deb stable/main/binary-powerpc/libpoppler0c2_0.4.5-5.1etch2_powerpc.deb stable/main/binary-powerpc/libpoppler0c2-glib_0.4.5-5.1etch2_powerpc.deb stable/main/binary-powerpc/libpoppler0c2-qt_0.4.5-5.1etch2_powerpc.deb stable/main/binary-powerpc/libpoppler-dev_0.4.5-5.1etch2_powerpc.deb stable/main/binary-powerpc/libpoppler-qt-dev_0.4.5-5.1etch2_powerpc.deb poppler (0.4.5-5.1etch2) stable-security; urgency=high * Fix CVE-2007-4352 CVE-2007-5392 CVE-2007-5393 stable/main/binary-mipsel/libpoppler0c2-qt_0.4.5-5.1etch2_mipsel.deb stable/main/binary-mipsel/libpoppler-dev_0.4.5-5.1etch2_mipsel.deb stable/main/binary-mipsel/libpoppler0c2-glib_0.4.5-5.1etch2_mipsel.deb stable/main/binary-mipsel/libpoppler-qt-dev_0.4.5-5.1etch2_mipsel.deb stable/main/binary-mipsel/libpoppler0c2_0.4.5-5.1etch2_mipsel.deb stable/main/binary-mipsel/poppler-utils_0.4.5-5.1etch2_mipsel.deb stable/main/binary-mipsel/libpoppler-glib-dev_0.4.5-5.1etch2_mipsel.deb poppler (0.4.5-5.1etch2) stable-security; urgency=high * Fix CVE-2007-4352 CVE-2007-5392 CVE-2007-5393 stable/main/binary-mips/libpoppler-qt-dev_0.4.5-5.1etch2_mips.deb stable/main/binary-mips/libpoppler0c2_0.4.5-5.1etch2_mips.deb stable/main/binary-mips/libpoppler-glib-dev_0.4.5-5.1etch2_mips.deb stable/main/binary-mips/libpoppler-dev_0.4.5-5.1etch2_mips.deb stable/main/binary-mips/libpoppler0c2-qt_0.4.5-5.1etch2_mips.deb stable/main/binary-mips/poppler-utils_0.4.5-5.1etch2_mips.deb stable/main/binary-mips/libpoppler0c2-glib_0.4.5-5.1etch2_mips.deb poppler (0.4.5-5.1etch2) stable-security; urgency=high * Fix CVE-2007-4352 CVE-2007-5392 CVE-2007-5393 stable/main/binary-ia64/libpoppler-glib-dev_0.4.5-5.1etch2_ia64.deb stable/main/binary-ia64/poppler-utils_0.4.5-5.1etch2_ia64.deb stable/main/binary-ia64/libpoppler-dev_0.4.5-5.1etch2_ia64.deb stable/main/binary-ia64/libpoppler0c2-glib_0.4.5-5.1etch2_ia64.deb stable/main/binary-ia64/libpoppler-qt-dev_0.4.5-5.1etch2_ia64.deb stable/main/binary-ia64/libpoppler0c2-qt_0.4.5-5.1etch2_ia64.deb stable/main/binary-ia64/libpoppler0c2_0.4.5-5.1etch2_ia64.deb poppler (0.4.5-5.1etch2) stable-security; urgency=high * Fix CVE-2007-4352 CVE-2007-5392 CVE-2007-5393 stable/main/binary-hppa/libpoppler0c2_0.4.5-5.1etch2_hppa.deb stable/main/binary-hppa/libpoppler0c2-qt_0.4.5-5.1etch2_hppa.deb stable/main/binary-hppa/libpoppler-dev_0.4.5-5.1etch2_hppa.deb stable/main/binary-hppa/libpoppler-qt-dev_0.4.5-5.1etch2_hppa.deb stable/main/binary-hppa/libpoppler-glib-dev_0.4.5-5.1etch2_hppa.deb stable/main/binary-hppa/libpoppler0c2-glib_0.4.5-5.1etch2_hppa.deb stable/main/binary-hppa/poppler-utils_0.4.5-5.1etch2_hppa.deb poppler (0.4.5-5.1etch2) stable-security; urgency=high * Fix CVE-2007-4352 CVE-2007-5392 CVE-2007-5393 stable/main/binary-arm/libpoppler-qt-dev_0.4.5-5.1etch2_arm.deb stable/main/binary-arm/poppler-utils_0.4.5-5.1etch2_arm.deb stable/main/binary-arm/libpoppler-glib-dev_0.4.5-5.1etch2_arm.deb stable/main/binary-arm/libpoppler0c2_0.4.5-5.1etch2_arm.deb stable/main/binary-arm/libpoppler0c2-qt_0.4.5-5.1etch2_arm.deb stable/main/binary-arm/libpoppler-dev_0.4.5-5.1etch2_arm.deb stable/main/binary-arm/libpoppler0c2-glib_0.4.5-5.1etch2_arm.deb poppler (0.4.5-5.1etch2) stable-security; urgency=high * Fix CVE-2007-4352 CVE-2007-5392 CVE-2007-5393 stable/main/binary-amd64/libpoppler0c2-qt_0.4.5-5.1etch2_amd64.deb stable/main/binary-amd64/libpoppler0c2_0.4.5-5.1etch2_amd64.deb stable/main/binary-amd64/libpoppler-qt-dev_0.4.5-5.1etch2_amd64.deb stable/main/binary-amd64/poppler-utils_0.4.5-5.1etch2_amd64.deb stable/main/binary-amd64/libpoppler-dev_0.4.5-5.1etch2_amd64.deb stable/main/binary-amd64/libpoppler-glib-dev_0.4.5-5.1etch2_amd64.deb stable/main/binary-amd64/libpoppler0c2-glib_0.4.5-5.1etch2_amd64.deb poppler (0.4.5-5.1etch2) stable-security; urgency=high * Fix CVE-2007-4352 CVE-2007-5392 CVE-2007-5393 stable/main/binary-alpha/libpoppler-qt-dev_0.4.5-5.1etch2_alpha.deb stable/main/binary-alpha/libpoppler0c2-qt_0.4.5-5.1etch2_alpha.deb stable/main/binary-alpha/libpoppler0c2-glib_0.4.5-5.1etch2_alpha.deb stable/main/binary-alpha/libpoppler-glib-dev_0.4.5-5.1etch2_alpha.deb stable/main/binary-alpha/libpoppler0c2_0.4.5-5.1etch2_alpha.deb stable/main/binary-alpha/poppler-utils_0.4.5-5.1etch2_alpha.deb stable/main/binary-alpha/libpoppler-dev_0.4.5-5.1etch2_alpha.deb poppler (0.4.5-5.1etch2) stable-security; urgency=high * Fix CVE-2007-4352 CVE-2007-5392 CVE-2007-5393 stable/main/binary-i386/libpoppler0c2_0.4.5-5.1etch2_i386.deb stable/main/binary-i386/libpoppler0c2-qt_0.4.5-5.1etch2_i386.deb stable/main/source/poppler_0.4.5-5.1etch2.dsc stable/main/binary-i386/poppler-utils_0.4.5-5.1etch2_i386.deb stable/main/binary-i386/libpoppler-glib-dev_0.4.5-5.1etch2_i386.deb stable/main/binary-i386/libpoppler0c2-glib_0.4.5-5.1etch2_i386.deb stable/main/binary-i386/libpoppler-qt-dev_0.4.5-5.1etch2_i386.deb stable/main/source/poppler_0.4.5-5.1etch2.diff.gz stable/main/binary-i386/libpoppler-dev_0.4.5-5.1etch2_i386.deb poppler (0.4.5-5.1etch2) stable-security; urgency=high * Fix CVE-2007-4352 CVE-2007-5392 CVE-2007-5393 stable/main/binary-all/phpbb2-languages_2.0.21-7_all.deb stable/main/binary-all/phpbb2_2.0.21-7_all.deb stable/main/source/phpbb2_2.0.21-7.diff.gz stable/main/binary-all/phpbb2-conf-mysql_2.0.21-7_all.deb stable/main/source/phpbb2_2.0.21-7.dsc phpbb2 (2.0.21-7) stable-security; urgency=high * Upload to stable to fix cross site request forgery in private messaging (CVE-2008-0471, closes: #463589). stable/main/binary-sparc/php5-xsl_5.2.0-8+etch10_sparc.deb stable/main/binary-sparc/php5-gd_5.2.0-8+etch10_sparc.deb stable/main/binary-sparc/libapache2-mod-php5_5.2.0-8+etch10_sparc.deb stable/main/binary-sparc/php5-dev_5.2.0-8+etch10_sparc.deb stable/main/binary-sparc/php5-sqlite_5.2.0-8+etch10_sparc.deb stable/main/binary-sparc/php5-mcrypt_5.2.0-8+etch10_sparc.deb stable/main/binary-sparc/php5-snmp_5.2.0-8+etch10_sparc.deb stable/main/binary-sparc/php5-pgsql_5.2.0-8+etch10_sparc.deb stable/main/binary-sparc/php5-ldap_5.2.0-8+etch10_sparc.deb stable/main/binary-sparc/php5-xmlrpc_5.2.0-8+etch10_sparc.deb stable/main/binary-sparc/php5-mysql_5.2.0-8+etch10_sparc.deb stable/main/binary-sparc/php5-mhash_5.2.0-8+etch10_sparc.deb stable/main/binary-sparc/libapache-mod-php5_5.2.0-8+etch10_sparc.deb stable/main/binary-sparc/php5-sybase_5.2.0-8+etch10_sparc.deb stable/main/binary-sparc/php5-curl_5.2.0-8+etch10_sparc.deb stable/main/binary-sparc/php5-cli_5.2.0-8+etch10_sparc.deb stable/main/binary-sparc/php5-odbc_5.2.0-8+etch10_sparc.deb stable/main/binary-sparc/php5-tidy_5.2.0-8+etch10_sparc.deb stable/main/binary-sparc/php5-cgi_5.2.0-8+etch10_sparc.deb stable/main/binary-sparc/php5-common_5.2.0-8+etch10_sparc.deb stable/main/binary-sparc/php5-pspell_5.2.0-8+etch10_sparc.deb stable/main/binary-sparc/php5-recode_5.2.0-8+etch10_sparc.deb stable/main/binary-sparc/php5-imap_5.2.0-8+etch10_sparc.deb php5 (5.2.0-8+etch10) stable-security; urgency=high * Drop the patch for CVE-2007-4659 for now, since it causes regressions in some environments. stable/main/binary-s390/php5-sybase_5.2.0-8+etch10_s390.deb stable/main/binary-s390/php5-odbc_5.2.0-8+etch10_s390.deb stable/main/binary-s390/php5-mhash_5.2.0-8+etch10_s390.deb stable/main/binary-s390/libapache-mod-php5_5.2.0-8+etch10_s390.deb stable/main/binary-s390/php5-cli_5.2.0-8+etch10_s390.deb stable/main/binary-s390/php5-cgi_5.2.0-8+etch10_s390.deb stable/main/binary-s390/php5-recode_5.2.0-8+etch10_s390.deb stable/main/binary-s390/php5-gd_5.2.0-8+etch10_s390.deb stable/main/binary-s390/php5-pspell_5.2.0-8+etch10_s390.deb stable/main/binary-s390/php5-dev_5.2.0-8+etch10_s390.deb stable/main/binary-s390/php5-ldap_5.2.0-8+etch10_s390.deb stable/main/binary-s390/php5-mcrypt_5.2.0-8+etch10_s390.deb stable/main/binary-s390/php5-tidy_5.2.0-8+etch10_s390.deb stable/main/binary-s390/php5-curl_5.2.0-8+etch10_s390.deb stable/main/binary-s390/php5-mysql_5.2.0-8+etch10_s390.deb stable/main/binary-s390/php5-pgsql_5.2.0-8+etch10_s390.deb stable/main/binary-s390/libapache2-mod-php5_5.2.0-8+etch10_s390.deb stable/main/binary-s390/php5-xsl_5.2.0-8+etch10_s390.deb stable/main/binary-s390/php5-imap_5.2.0-8+etch10_s390.deb stable/main/binary-s390/php5-snmp_5.2.0-8+etch10_s390.deb stable/main/binary-s390/php5-sqlite_5.2.0-8+etch10_s390.deb stable/main/binary-s390/php5-common_5.2.0-8+etch10_s390.deb stable/main/binary-s390/php5-xmlrpc_5.2.0-8+etch10_s390.deb php5 (5.2.0-8+etch10) stable-security; urgency=high * Drop the patch for CVE-2007-4659 for now, since it causes regressions in some environments. stable/main/binary-powerpc/php5-pspell_5.2.0-8+etch10_powerpc.deb stable/main/binary-powerpc/php5-odbc_5.2.0-8+etch10_powerpc.deb stable/main/binary-powerpc/php5-cli_5.2.0-8+etch10_powerpc.deb stable/main/binary-powerpc/php5-tidy_5.2.0-8+etch10_powerpc.deb stable/main/binary-powerpc/php5-mysql_5.2.0-8+etch10_powerpc.deb stable/main/binary-powerpc/php5-pgsql_5.2.0-8+etch10_powerpc.deb stable/main/binary-powerpc/libapache-mod-php5_5.2.0-8+etch10_powerpc.deb stable/main/binary-powerpc/php5-common_5.2.0-8+etch10_powerpc.deb stable/main/binary-powerpc/php5-curl_5.2.0-8+etch10_powerpc.deb stable/main/binary-powerpc/php5-mhash_5.2.0-8+etch10_powerpc.deb stable/main/binary-powerpc/php5-imap_5.2.0-8+etch10_powerpc.deb stable/main/binary-powerpc/libapache2-mod-php5_5.2.0-8+etch10_powerpc.deb stable/main/binary-powerpc/php5-xsl_5.2.0-8+etch10_powerpc.deb stable/main/binary-powerpc/php5-dev_5.2.0-8+etch10_powerpc.deb stable/main/binary-powerpc/php5-xmlrpc_5.2.0-8+etch10_powerpc.deb stable/main/binary-powerpc/php5-sybase_5.2.0-8+etch10_powerpc.deb stable/main/binary-powerpc/php5-cgi_5.2.0-8+etch10_powerpc.deb stable/main/binary-powerpc/php5-gd_5.2.0-8+etch10_powerpc.deb stable/main/binary-powerpc/php5-snmp_5.2.0-8+etch10_powerpc.deb stable/main/binary-powerpc/php5-mcrypt_5.2.0-8+etch10_powerpc.deb stable/main/binary-powerpc/php5-sqlite_5.2.0-8+etch10_powerpc.deb stable/main/binary-powerpc/php5-ldap_5.2.0-8+etch10_powerpc.deb stable/main/binary-powerpc/php5-recode_5.2.0-8+etch10_powerpc.deb php5 (5.2.0-8+etch10) stable-security; urgency=high * Drop the patch for CVE-2007-4659 for now, since it causes regressions in some environments. stable/main/binary-mipsel/libapache-mod-php5_5.2.0-8+etch10_mipsel.deb stable/main/binary-mipsel/libapache2-mod-php5_5.2.0-8+etch10_mipsel.deb stable/main/binary-mipsel/php5-imap_5.2.0-8+etch10_mipsel.deb stable/main/binary-mipsel/php5-mcrypt_5.2.0-8+etch10_mipsel.deb stable/main/binary-mipsel/php5-sqlite_5.2.0-8+etch10_mipsel.deb stable/main/binary-mipsel/php5-snmp_5.2.0-8+etch10_mipsel.deb stable/main/binary-mipsel/php5-mysql_5.2.0-8+etch10_mipsel.deb stable/main/binary-mipsel/php5-recode_5.2.0-8+etch10_mipsel.deb stable/main/binary-mipsel/php5-common_5.2.0-8+etch10_mipsel.deb stable/main/binary-mipsel/php5-tidy_5.2.0-8+etch10_mipsel.deb stable/main/binary-mipsel/php5-curl_5.2.0-8+etch10_mipsel.deb stable/main/binary-mipsel/php5-sybase_5.2.0-8+etch10_mipsel.deb stable/main/binary-mipsel/php5-dev_5.2.0-8+etch10_mipsel.deb stable/main/binary-mipsel/php5-cli_5.2.0-8+etch10_mipsel.deb stable/main/binary-mipsel/php5-pspell_5.2.0-8+etch10_mipsel.deb stable/main/binary-mipsel/php5-cgi_5.2.0-8+etch10_mipsel.deb stable/main/binary-mipsel/php5-odbc_5.2.0-8+etch10_mipsel.deb stable/main/binary-mipsel/php5-mhash_5.2.0-8+etch10_mipsel.deb stable/main/binary-mipsel/php5-pgsql_5.2.0-8+etch10_mipsel.deb stable/main/binary-mipsel/php5-xmlrpc_5.2.0-8+etch10_mipsel.deb stable/main/binary-mipsel/php5-gd_5.2.0-8+etch10_mipsel.deb stable/main/binary-mipsel/php5-xsl_5.2.0-8+etch10_mipsel.deb stable/main/binary-mipsel/php5-ldap_5.2.0-8+etch10_mipsel.deb php5 (5.2.0-8+etch10) stable-security; urgency=high * Drop the patch for CVE-2007-4659 for now, since it causes regressions in some environments. stable/main/binary-mips/php5-mysql_5.2.0-8+etch10_mips.deb stable/main/binary-mips/php5-sybase_5.2.0-8+etch10_mips.deb stable/main/binary-mips/php5-gd_5.2.0-8+etch10_mips.deb stable/main/binary-mips/php5-ldap_5.2.0-8+etch10_mips.deb stable/main/binary-mips/php5-xmlrpc_5.2.0-8+etch10_mips.deb stable/main/binary-mips/libapache2-mod-php5_5.2.0-8+etch10_mips.deb stable/main/binary-mips/php5-recode_5.2.0-8+etch10_mips.deb stable/main/binary-mips/php5-snmp_5.2.0-8+etch10_mips.deb stable/main/binary-mips/php5-sqlite_5.2.0-8+etch10_mips.deb stable/main/binary-mips/php5-odbc_5.2.0-8+etch10_mips.deb stable/main/binary-mips/php5-imap_5.2.0-8+etch10_mips.deb stable/main/binary-mips/php5-curl_5.2.0-8+etch10_mips.deb stable/main/binary-mips/php5-mcrypt_5.2.0-8+etch10_mips.deb stable/main/binary-mips/php5-cli_5.2.0-8+etch10_mips.deb stable/main/binary-mips/php5-mhash_5.2.0-8+etch10_mips.deb stable/main/binary-mips/php5-common_5.2.0-8+etch10_mips.deb stable/main/binary-mips/php5-tidy_5.2.0-8+etch10_mips.deb stable/main/binary-mips/php5-pgsql_5.2.0-8+etch10_mips.deb stable/main/binary-mips/libapache-mod-php5_5.2.0-8+etch10_mips.deb stable/main/binary-mips/php5-pspell_5.2.0-8+etch10_mips.deb stable/main/binary-mips/php5-dev_5.2.0-8+etch10_mips.deb stable/main/binary-mips/php5-xsl_5.2.0-8+etch10_mips.deb stable/main/binary-mips/php5-cgi_5.2.0-8+etch10_mips.deb php5 (5.2.0-8+etch10) stable-security; urgency=high * Drop the patch for CVE-2007-4659 for now, since it causes regressions in some environments. stable/main/binary-ia64/php5-tidy_5.2.0-8+etch10_ia64.deb stable/main/binary-ia64/php5-curl_5.2.0-8+etch10_ia64.deb stable/main/binary-ia64/php5-gd_5.2.0-8+etch10_ia64.deb stable/main/binary-ia64/php5-pspell_5.2.0-8+etch10_ia64.deb stable/main/binary-ia64/php5-mcrypt_5.2.0-8+etch10_ia64.deb stable/main/binary-ia64/php5-recode_5.2.0-8+etch10_ia64.deb stable/main/binary-ia64/php5-dev_5.2.0-8+etch10_ia64.deb stable/main/binary-ia64/php5-ldap_5.2.0-8+etch10_ia64.deb stable/main/binary-ia64/libapache2-mod-php5_5.2.0-8+etch10_ia64.deb stable/main/binary-ia64/php5-sqlite_5.2.0-8+etch10_ia64.deb stable/main/binary-ia64/php5-imap_5.2.0-8+etch10_ia64.deb stable/main/binary-ia64/php5-xmlrpc_5.2.0-8+etch10_ia64.deb stable/main/binary-ia64/php5-odbc_5.2.0-8+etch10_ia64.deb stable/main/binary-ia64/php5-pgsql_5.2.0-8+etch10_ia64.deb stable/main/binary-ia64/php5-mysql_5.2.0-8+etch10_ia64.deb stable/main/binary-ia64/php5-mhash_5.2.0-8+etch10_ia64.deb stable/main/binary-ia64/php5-common_5.2.0-8+etch10_ia64.deb stable/main/binary-ia64/php5-xsl_5.2.0-8+etch10_ia64.deb stable/main/binary-ia64/php5-sybase_5.2.0-8+etch10_ia64.deb stable/main/binary-ia64/php5-cli_5.2.0-8+etch10_ia64.deb stable/main/binary-ia64/php5-snmp_5.2.0-8+etch10_ia64.deb stable/main/binary-ia64/php5-cgi_5.2.0-8+etch10_ia64.deb stable/main/binary-ia64/libapache-mod-php5_5.2.0-8+etch10_ia64.deb php5 (5.2.0-8+etch10) stable-security; urgency=high * Drop the patch for CVE-2007-4659 for now, since it causes regressions in some environments. stable/main/binary-hppa/php5-curl_5.2.0-8+etch10_hppa.deb stable/main/binary-hppa/php5-mysql_5.2.0-8+etch10_hppa.deb stable/main/binary-hppa/libapache-mod-php5_5.2.0-8+etch10_hppa.deb stable/main/binary-hppa/php5-xsl_5.2.0-8+etch10_hppa.deb stable/main/binary-hppa/php5-cli_5.2.0-8+etch10_hppa.deb stable/main/binary-hppa/libapache2-mod-php5_5.2.0-8+etch10_hppa.deb stable/main/binary-hppa/php5-sybase_5.2.0-8+etch10_hppa.deb stable/main/binary-hppa/php5-dev_5.2.0-8+etch10_hppa.deb stable/main/binary-hppa/php5-xmlrpc_5.2.0-8+etch10_hppa.deb stable/main/binary-hppa/php5-odbc_5.2.0-8+etch10_hppa.deb stable/main/binary-hppa/php5-common_5.2.0-8+etch10_hppa.deb stable/main/binary-hppa/php5-imap_5.2.0-8+etch10_hppa.deb stable/main/binary-hppa/php5-recode_5.2.0-8+etch10_hppa.deb stable/main/binary-hppa/php5-mhash_5.2.0-8+etch10_hppa.deb stable/main/binary-hppa/php5-pspell_5.2.0-8+etch10_hppa.deb stable/main/binary-hppa/php5-gd_5.2.0-8+etch10_hppa.deb stable/main/binary-hppa/php5-snmp_5.2.0-8+etch10_hppa.deb stable/main/binary-hppa/php5-ldap_5.2.0-8+etch10_hppa.deb stable/main/binary-hppa/php5-sqlite_5.2.0-8+etch10_hppa.deb stable/main/binary-hppa/php5-mcrypt_5.2.0-8+etch10_hppa.deb stable/main/binary-hppa/php5-pgsql_5.2.0-8+etch10_hppa.deb stable/main/binary-hppa/php5-tidy_5.2.0-8+etch10_hppa.deb stable/main/binary-hppa/php5-cgi_5.2.0-8+etch10_hppa.deb php5 (5.2.0-8+etch10) stable-security; urgency=high * Drop the patch for CVE-2007-4659 for now, since it causes regressions in some environments. stable/main/binary-arm/php5-mhash_5.2.0-8+etch10_arm.deb stable/main/binary-arm/php5-mcrypt_5.2.0-8+etch10_arm.deb stable/main/binary-arm/php5-xmlrpc_5.2.0-8+etch10_arm.deb stable/main/binary-arm/php5-cli_5.2.0-8+etch10_arm.deb stable/main/binary-arm/php5-pspell_5.2.0-8+etch10_arm.deb stable/main/binary-arm/php5-mysql_5.2.0-8+etch10_arm.deb stable/main/binary-arm/php5-sqlite_5.2.0-8+etch10_arm.deb stable/main/binary-arm/php5-dev_5.2.0-8+etch10_arm.deb stable/main/binary-arm/php5-ldap_5.2.0-8+etch10_arm.deb stable/main/binary-arm/libapache2-mod-php5_5.2.0-8+etch10_arm.deb stable/main/binary-arm/libapache-mod-php5_5.2.0-8+etch10_arm.deb stable/main/binary-arm/php5-snmp_5.2.0-8+etch10_arm.deb stable/main/binary-arm/php5-cgi_5.2.0-8+etch10_arm.deb stable/main/binary-arm/php5-gd_5.2.0-8+etch10_arm.deb stable/main/binary-arm/php5-pgsql_5.2.0-8+etch10_arm.deb stable/main/binary-arm/php5-tidy_5.2.0-8+etch10_arm.deb stable/main/binary-arm/php5-sybase_5.2.0-8+etch10_arm.deb stable/main/binary-arm/php5-xsl_5.2.0-8+etch10_arm.deb stable/main/binary-arm/php5-common_5.2.0-8+etch10_arm.deb stable/main/binary-arm/php5-recode_5.2.0-8+etch10_arm.deb stable/main/binary-arm/php5-curl_5.2.0-8+etch10_arm.deb stable/main/binary-arm/php5-odbc_5.2.0-8+etch10_arm.deb stable/main/binary-arm/php5-imap_5.2.0-8+etch10_arm.deb php5 (5.2.0-8+etch10) stable-security; urgency=high * Drop the patch for CVE-2007-4659 for now, since it causes regressions in some environments. stable/main/binary-amd64/php5-recode_5.2.0-8+etch10_amd64.deb stable/main/binary-amd64/php5-pspell_5.2.0-8+etch10_amd64.deb stable/main/binary-amd64/php5-xmlrpc_5.2.0-8+etch10_amd64.deb stable/main/binary-amd64/php5-cli_5.2.0-8+etch10_amd64.deb stable/main/binary-amd64/php5-snmp_5.2.0-8+etch10_amd64.deb stable/main/binary-amd64/php5-common_5.2.0-8+etch10_amd64.deb stable/main/binary-amd64/php5-sqlite_5.2.0-8+etch10_amd64.deb stable/main/binary-amd64/php5-gd_5.2.0-8+etch10_amd64.deb stable/main/binary-amd64/php5-odbc_5.2.0-8+etch10_amd64.deb stable/main/binary-amd64/php5-curl_5.2.0-8+etch10_amd64.deb stable/main/binary-amd64/php5-mhash_5.2.0-8+etch10_amd64.deb stable/main/binary-amd64/php5-xsl_5.2.0-8+etch10_amd64.deb stable/main/binary-amd64/php5-mcrypt_5.2.0-8+etch10_amd64.deb stable/main/binary-amd64/php5-tidy_5.2.0-8+etch10_amd64.deb stable/main/binary-amd64/php5-sybase_5.2.0-8+etch10_amd64.deb stable/main/binary-amd64/libapache2-mod-php5_5.2.0-8+etch10_amd64.deb stable/main/binary-amd64/libapache-mod-php5_5.2.0-8+etch10_amd64.deb stable/main/binary-amd64/php5-pgsql_5.2.0-8+etch10_amd64.deb stable/main/binary-amd64/php5-ldap_5.2.0-8+etch10_amd64.deb stable/main/binary-amd64/php5-dev_5.2.0-8+etch10_amd64.deb stable/main/binary-amd64/php5-interbase_5.2.0-8+etch10_amd64.deb stable/main/binary-amd64/php5-mysql_5.2.0-8+etch10_amd64.deb stable/main/binary-amd64/php5-imap_5.2.0-8+etch10_amd64.deb stable/main/binary-amd64/php5-cgi_5.2.0-8+etch10_amd64.deb php5 (5.2.0-8+etch10) stable-security; urgency=high * Drop the patch for CVE-2007-4659 for now, since it causes regressions in some environments. stable/main/binary-alpha/php5-recode_5.2.0-8+etch10_alpha.deb stable/main/binary-alpha/php5-xsl_5.2.0-8+etch10_alpha.deb stable/main/binary-alpha/php5-cgi_5.2.0-8+etch10_alpha.deb stable/main/binary-alpha/php5-mysql_5.2.0-8+etch10_alpha.deb stable/main/binary-alpha/php5-gd_5.2.0-8+etch10_alpha.deb stable/main/binary-alpha/libapache2-mod-php5_5.2.0-8+etch10_alpha.deb stable/main/binary-alpha/php5-pgsql_5.2.0-8+etch10_alpha.deb stable/main/binary-alpha/php5-snmp_5.2.0-8+etch10_alpha.deb stable/main/binary-alpha/php5-sqlite_5.2.0-8+etch10_alpha.deb stable/main/binary-alpha/php5-pspell_5.2.0-8+etch10_alpha.deb stable/main/binary-alpha/php5-mcrypt_5.2.0-8+etch10_alpha.deb stable/main/binary-alpha/php5-sybase_5.2.0-8+etch10_alpha.deb stable/main/binary-alpha/php5-ldap_5.2.0-8+etch10_alpha.deb stable/main/binary-alpha/php5-tidy_5.2.0-8+etch10_alpha.deb stable/main/binary-alpha/php5-odbc_5.2.0-8+etch10_alpha.deb stable/main/binary-alpha/php5-mhash_5.2.0-8+etch10_alpha.deb stable/main/binary-alpha/libapache-mod-php5_5.2.0-8+etch10_alpha.deb stable/main/binary-alpha/php5-cli_5.2.0-8+etch10_alpha.deb stable/main/binary-alpha/php5-common_5.2.0-8+etch10_alpha.deb stable/main/binary-alpha/php5-xmlrpc_5.2.0-8+etch10_alpha.deb stable/main/binary-alpha/php5-dev_5.2.0-8+etch10_alpha.deb stable/main/binary-alpha/php5-imap_5.2.0-8+etch10_alpha.deb stable/main/binary-alpha/php5-curl_5.2.0-8+etch10_alpha.deb php5 (5.2.0-8+etch10) stable-security; urgency=high * Drop the patch for CVE-2007-4659 for now, since it causes regressions in some environments. stable/main/binary-i386/php5-cgi_5.2.0-8+etch10_i386.deb stable/main/binary-i386/php5-dev_5.2.0-8+etch10_i386.deb stable/main/binary-all/php5_5.2.0-8+etch10_all.deb stable/main/binary-i386/php5-imap_5.2.0-8+etch10_i386.deb stable/main/binary-i386/php5-xsl_5.2.0-8+etch10_i386.deb stable/main/binary-i386/php5-mcrypt_5.2.0-8+etch10_i386.deb stable/main/binary-i386/php5-xmlrpc_5.2.0-8+etch10_i386.deb stable/main/binary-i386/php5-ldap_5.2.0-8+etch10_i386.deb stable/main/source/php5_5.2.0-8+etch10.dsc stable/main/binary-i386/php5-pspell_5.2.0-8+etch10_i386.deb stable/main/binary-i386/php5-mysql_5.2.0-8+etch10_i386.deb stable/main/binary-i386/php5-cli_5.2.0-8+etch10_i386.deb stable/main/binary-i386/php5-odbc_5.2.0-8+etch10_i386.deb stable/main/binary-i386/php5-curl_5.2.0-8+etch10_i386.deb stable/main/binary-i386/php5-interbase_5.2.0-8+etch10_i386.deb stable/main/binary-all/php-pear_5.2.0-8+etch10_all.deb stable/main/binary-i386/php5-sybase_5.2.0-8+etch10_i386.deb stable/main/binary-i386/php5-recode_5.2.0-8+etch10_i386.deb stable/main/binary-i386/php5-tidy_5.2.0-8+etch10_i386.deb stable/main/binary-i386/php5-common_5.2.0-8+etch10_i386.deb stable/main/binary-i386/php5-mhash_5.2.0-8+etch10_i386.deb stable/main/source/php5_5.2.0-8+etch10.diff.gz stable/main/binary-i386/libapache2-mod-php5_5.2.0-8+etch10_i386.deb stable/main/binary-i386/php5-sqlite_5.2.0-8+etch10_i386.deb stable/main/binary-i386/php5-gd_5.2.0-8+etch10_i386.deb stable/main/binary-i386/php5-snmp_5.2.0-8+etch10_i386.deb stable/main/binary-i386/php5-pgsql_5.2.0-8+etch10_i386.deb stable/main/binary-i386/libapache-mod-php5_5.2.0-8+etch10_i386.deb php5 (5.2.0-8+etch10) stable-security; urgency=high * Drop the patch for CVE-2007-4659 for now, since it causes regressions in some environments. stable/main/binary-sparc/peercast_0.1217.toots.20060314-1etch0_sparc.deb stable/main/binary-sparc/libpeercast0-dev_0.1217.toots.20060314-1etch0_sparc.deb stable/main/binary-sparc/peercast-servent_0.1217.toots.20060314-1etch0_sparc.deb stable/main/binary-sparc/libpeercast0_0.1217.toots.20060314-1etch0_sparc.deb peercast (0.1217.toots.20060314-1etch0) stable-security; urgency=high * Fixed CVE-2007-6454: | Heap-based buffer overflow in the handshakeHTTP function in servhs.cpp | in PeerCast 0.1217 and earlier, and SVN 344 and earlier, allows remote | attackers to cause a denial of service and possibly execute arbitrary | code via a long SOURCE request. Closes: #457300 stable/main/binary-s390/libpeercast0_0.1217.toots.20060314-1etch0_s390.deb stable/main/binary-s390/peercast_0.1217.toots.20060314-1etch0_s390.deb stable/main/binary-s390/libpeercast0-dev_0.1217.toots.20060314-1etch0_s390.deb stable/main/binary-s390/peercast-servent_0.1217.toots.20060314-1etch0_s390.deb peercast (0.1217.toots.20060314-1etch0) stable-security; urgency=high * Fixed CVE-2007-6454: | Heap-based buffer overflow in the handshakeHTTP function in servhs.cpp | in PeerCast 0.1217 and earlier, and SVN 344 and earlier, allows remote | attackers to cause a denial of service and possibly execute arbitrary | code via a long SOURCE request. Closes: #457300 stable/main/binary-powerpc/peercast-servent_0.1217.toots.20060314-1etch0_powerpc.deb stable/main/binary-powerpc/libpeercast0_0.1217.toots.20060314-1etch0_powerpc.deb stable/main/binary-powerpc/libpeercast0-dev_0.1217.toots.20060314-1etch0_powerpc.deb stable/main/binary-powerpc/peercast_0.1217.toots.20060314-1etch0_powerpc.deb peercast (0.1217.toots.20060314-1etch0) stable-security; urgency=high * Fixed CVE-2007-6454: | Heap-based buffer overflow in the handshakeHTTP function in servhs.cpp | in PeerCast 0.1217 and earlier, and SVN 344 and earlier, allows remote | attackers to cause a denial of service and possibly execute arbitrary | code via a long SOURCE request. Closes: #457300 stable/main/binary-mipsel/peercast_0.1217.toots.20060314-1etch0_mipsel.deb stable/main/binary-mipsel/peercast-servent_0.1217.toots.20060314-1etch0_mipsel.deb stable/main/binary-mipsel/libpeercast0_0.1217.toots.20060314-1etch0_mipsel.deb stable/main/binary-mipsel/libpeercast0-dev_0.1217.toots.20060314-1etch0_mipsel.deb peercast (0.1217.toots.20060314-1etch0) stable-security; urgency=high * Fixed CVE-2007-6454: | Heap-based buffer overflow in the handshakeHTTP function in servhs.cpp | in PeerCast 0.1217 and earlier, and SVN 344 and earlier, allows remote | attackers to cause a denial of service and possibly execute arbitrary | code via a long SOURCE request. Closes: #457300 stable/main/binary-mips/libpeercast0_0.1217.toots.20060314-1etch0_mips.deb stable/main/binary-mips/peercast_0.1217.toots.20060314-1etch0_mips.deb stable/main/binary-mips/peercast-servent_0.1217.toots.20060314-1etch0_mips.deb stable/main/binary-mips/libpeercast0-dev_0.1217.toots.20060314-1etch0_mips.deb peercast (0.1217.toots.20060314-1etch0) stable-security; urgency=high * Fixed CVE-2007-6454: | Heap-based buffer overflow in the handshakeHTTP function in servhs.cpp | in PeerCast 0.1217 and earlier, and SVN 344 and earlier, allows remote | attackers to cause a denial of service and possibly execute arbitrary | code via a long SOURCE request. Closes: #457300 stable/main/binary-ia64/peercast-servent_0.1217.toots.20060314-1etch0_ia64.deb stable/main/binary-ia64/libpeercast0_0.1217.toots.20060314-1etch0_ia64.deb stable/main/binary-ia64/peercast_0.1217.toots.20060314-1etch0_ia64.deb stable/main/binary-ia64/libpeercast0-dev_0.1217.toots.20060314-1etch0_ia64.deb peercast (0.1217.toots.20060314-1etch0) stable-security; urgency=high * Fixed CVE-2007-6454: | Heap-based buffer overflow in the handshakeHTTP function in servhs.cpp | in PeerCast 0.1217 and earlier, and SVN 344 and earlier, allows remote | attackers to cause a denial of service and possibly execute arbitrary | code via a long SOURCE request. Closes: #457300 stable/main/binary-i386/libpeercast0-dev_0.1217.toots.20060314-1etch0_i386.deb stable/main/binary-i386/peercast-servent_0.1217.toots.20060314-1etch0_i386.deb stable/main/binary-i386/peercast_0.1217.toots.20060314-1etch0_i386.deb stable/main/binary-i386/libpeercast0_0.1217.toots.20060314-1etch0_i386.deb peercast (0.1217.toots.20060314-1etch0) stable-security; urgency=high * Fixed CVE-2007-6454: | Heap-based buffer overflow in the handshakeHTTP function in servhs.cpp | in PeerCast 0.1217 and earlier, and SVN 344 and earlier, allows remote | attackers to cause a denial of service and possibly execute arbitrary | code via a long SOURCE request. Closes: #457300 stable/main/binary-hppa/peercast_0.1217.toots.20060314-1etch0_hppa.deb stable/main/binary-hppa/libpeercast0_0.1217.toots.20060314-1etch0_hppa.deb stable/main/binary-hppa/peercast-servent_0.1217.toots.20060314-1etch0_hppa.deb stable/main/binary-hppa/libpeercast0-dev_0.1217.toots.20060314-1etch0_hppa.deb peercast (0.1217.toots.20060314-1etch0) stable-security; urgency=high * Fixed CVE-2007-6454: | Heap-based buffer overflow in the handshakeHTTP function in servhs.cpp | in PeerCast 0.1217 and earlier, and SVN 344 and earlier, allows remote | attackers to cause a denial of service and possibly execute arbitrary | code via a long SOURCE request. Closes: #457300 stable/main/binary-arm/libpeercast0-dev_0.1217.toots.20060314-1etch0_arm.deb stable/main/binary-arm/peercast_0.1217.toots.20060314-1etch0_arm.deb stable/main/binary-arm/libpeercast0_0.1217.toots.20060314-1etch0_arm.deb stable/main/binary-arm/peercast-servent_0.1217.toots.20060314-1etch0_arm.deb peercast (0.1217.toots.20060314-1etch0) stable-security; urgency=high * Fixed CVE-2007-6454: | Heap-based buffer overflow in the handshakeHTTP function in servhs.cpp | in PeerCast 0.1217 and earlier, and SVN 344 and earlier, allows remote | attackers to cause a denial of service and possibly execute arbitrary | code via a long SOURCE request. Closes: #457300 stable/main/binary-alpha/libpeercast0_0.1217.toots.20060314-1etch0_alpha.deb stable/main/binary-alpha/peercast_0.1217.toots.20060314-1etch0_alpha.deb stable/main/binary-alpha/libpeercast0-dev_0.1217.toots.20060314-1etch0_alpha.deb stable/main/binary-alpha/peercast-servent_0.1217.toots.20060314-1etch0_alpha.deb peercast (0.1217.toots.20060314-1etch0) stable-security; urgency=high * Fixed CVE-2007-6454: | Heap-based buffer overflow in the handshakeHTTP function in servhs.cpp | in PeerCast 0.1217 and earlier, and SVN 344 and earlier, allows remote | attackers to cause a denial of service and possibly execute arbitrary | code via a long SOURCE request. Closes: #457300 stable/main/source/peercast_0.1217.toots.20060314-1etch0.diff.gz stable/main/binary-amd64/libpeercast0_0.1217.toots.20060314-1etch0_amd64.deb stable/main/binary-amd64/libpeercast0-dev_0.1217.toots.20060314-1etch0_amd64.deb stable/main/binary-all/peercast-handlers_0.1217.toots.20060314-1etch0_all.deb stable/main/source/peercast_0.1217.toots.20060314-1etch0.dsc stable/main/binary-amd64/peercast_0.1217.toots.20060314-1etch0_amd64.deb stable/main/binary-amd64/peercast-servent_0.1217.toots.20060314-1etch0_amd64.deb peercast (0.1217.toots.20060314-1etch0) stable-security; urgency=high * Fixed CVE-2007-6454: | Heap-based buffer overflow in the handshakeHTTP function in servhs.cpp | in PeerCast 0.1217 and earlier, and SVN 344 and earlier, allows remote | attackers to cause a denial of service and possibly execute arbitrary | code via a long SOURCE request. Closes: #457300 stable/main/binary-sparc/libpam-openafs-kaserver_1.4.2-6etch1_sparc.deb stable/main/binary-sparc/openafs-fileserver_1.4.2-6etch1_sparc.deb stable/main/binary-sparc/openafs-client_1.4.2-6etch1_sparc.deb stable/main/binary-sparc/openafs-dbg_1.4.2-6etch1_sparc.deb stable/main/binary-sparc/libopenafs-dev_1.4.2-6etch1_sparc.deb stable/main/binary-sparc/openafs-dbserver_1.4.2-6etch1_sparc.deb stable/main/binary-sparc/openafs-kpasswd_1.4.2-6etch1_sparc.deb stable/main/binary-sparc/openafs-krb5_1.4.2-6etch1_sparc.deb openafs (1.4.2-6etch1) stable-security; urgency=high * Non-maintainer upload by the security team * apply fixes for OpenAFS Security Advisory 2007-003 (CVE-2007-6599) stable/main/binary-s390/openafs-dbg_1.4.2-6etch1_s390.deb stable/main/binary-s390/openafs-kpasswd_1.4.2-6etch1_s390.deb stable/main/binary-s390/openafs-client_1.4.2-6etch1_s390.deb stable/main/binary-s390/openafs-krb5_1.4.2-6etch1_s390.deb stable/main/binary-s390/openafs-dbserver_1.4.2-6etch1_s390.deb stable/main/binary-s390/libpam-openafs-kaserver_1.4.2-6etch1_s390.deb stable/main/binary-s390/openafs-fileserver_1.4.2-6etch1_s390.deb stable/main/binary-s390/libopenafs-dev_1.4.2-6etch1_s390.deb openafs (1.4.2-6etch1) stable-security; urgency=high * Non-maintainer upload by the security team * apply fixes for OpenAFS Security Advisory 2007-003 (CVE-2007-6599) stable/main/binary-powerpc/libopenafs-dev_1.4.2-6etch1_powerpc.deb stable/main/binary-powerpc/openafs-krb5_1.4.2-6etch1_powerpc.deb stable/main/binary-powerpc/openafs-dbg_1.4.2-6etch1_powerpc.deb stable/main/binary-powerpc/openafs-client_1.4.2-6etch1_powerpc.deb stable/main/binary-powerpc/openafs-kpasswd_1.4.2-6etch1_powerpc.deb stable/main/binary-powerpc/openafs-dbserver_1.4.2-6etch1_powerpc.deb stable/main/binary-powerpc/openafs-fileserver_1.4.2-6etch1_powerpc.deb stable/main/binary-powerpc/libpam-openafs-kaserver_1.4.2-6etch1_powerpc.deb openafs (1.4.2-6etch1) stable-security; urgency=high * Non-maintainer upload by the security team * apply fixes for OpenAFS Security Advisory 2007-003 (CVE-2007-6599) stable/main/binary-ia64/openafs-dbg_1.4.2-6etch1_ia64.deb stable/main/binary-ia64/openafs-kpasswd_1.4.2-6etch1_ia64.deb stable/main/binary-ia64/openafs-krb5_1.4.2-6etch1_ia64.deb stable/main/binary-ia64/openafs-dbserver_1.4.2-6etch1_ia64.deb stable/main/binary-ia64/openafs-fileserver_1.4.2-6etch1_ia64.deb stable/main/binary-ia64/libpam-openafs-kaserver_1.4.2-6etch1_ia64.deb stable/main/binary-ia64/libopenafs-dev_1.4.2-6etch1_ia64.deb stable/main/binary-ia64/openafs-client_1.4.2-6etch1_ia64.deb openafs (1.4.2-6etch1) stable-security; urgency=high * Non-maintainer upload by the security team * apply fixes for OpenAFS Security Advisory 2007-003 (CVE-2007-6599) stable/main/binary-hppa/openafs-kpasswd_1.4.2-6etch1_hppa.deb stable/main/binary-hppa/openafs-dbg_1.4.2-6etch1_hppa.deb stable/main/binary-hppa/openafs-dbserver_1.4.2-6etch1_hppa.deb stable/main/binary-hppa/openafs-fileserver_1.4.2-6etch1_hppa.deb stable/main/binary-hppa/libopenafs-dev_1.4.2-6etch1_hppa.deb stable/main/binary-hppa/openafs-krb5_1.4.2-6etch1_hppa.deb stable/main/binary-hppa/libpam-openafs-kaserver_1.4.2-6etch1_hppa.deb stable/main/binary-hppa/openafs-client_1.4.2-6etch1_hppa.deb openafs (1.4.2-6etch1) stable-security; urgency=high * Non-maintainer upload by the security team * apply fixes for OpenAFS Security Advisory 2007-003 (CVE-2007-6599) stable/main/binary-amd64/libpam-openafs-kaserver_1.4.2-6etch1_amd64.deb stable/main/binary-amd64/openafs-kpasswd_1.4.2-6etch1_amd64.deb stable/main/binary-amd64/libopenafs-dev_1.4.2-6etch1_amd64.deb stable/main/binary-amd64/openafs-krb5_1.4.2-6etch1_amd64.deb stable/main/binary-amd64/openafs-client_1.4.2-6etch1_amd64.deb stable/main/binary-amd64/openafs-fileserver_1.4.2-6etch1_amd64.deb stable/main/binary-amd64/openafs-dbg_1.4.2-6etch1_amd64.deb stable/main/binary-amd64/openafs-dbserver_1.4.2-6etch1_amd64.deb openafs (1.4.2-6etch1) stable-security; urgency=high * Non-maintainer upload by the security team * apply fixes for OpenAFS Security Advisory 2007-003 (CVE-2007-6599) stable/main/binary-alpha/openafs-client_1.4.2-6etch1_alpha.deb stable/main/binary-alpha/openafs-fileserver_1.4.2-6etch1_alpha.deb stable/main/binary-alpha/openafs-krb5_1.4.2-6etch1_alpha.deb stable/main/binary-alpha/openafs-dbg_1.4.2-6etch1_alpha.deb stable/main/binary-alpha/libopenafs-dev_1.4.2-6etch1_alpha.deb stable/main/binary-alpha/openafs-kpasswd_1.4.2-6etch1_alpha.deb stable/main/binary-alpha/openafs-dbserver_1.4.2-6etch1_alpha.deb stable/main/binary-alpha/libpam-openafs-kaserver_1.4.2-6etch1_alpha.deb openafs (1.4.2-6etch1) stable-security; urgency=high * Non-maintainer upload by the security team * apply fixes for OpenAFS Security Advisory 2007-003 (CVE-2007-6599) stable/main/binary-i386/openafs-dbserver_1.4.2-6etch1_i386.deb stable/main/source/openafs_1.4.2-6etch1.diff.gz stable/main/binary-i386/openafs-kpasswd_1.4.2-6etch1_i386.deb stable/main/binary-all/openafs-modules-source_1.4.2-6etch1_all.deb stable/main/source/openafs_1.4.2-6etch1.dsc stable/main/binary-i386/libopenafs-dev_1.4.2-6etch1_i386.deb stable/main/binary-all/openafs-doc_1.4.2-6etch1_all.deb stable/main/binary-i386/openafs-krb5_1.4.2-6etch1_i386.deb stable/main/binary-i386/libpam-openafs-kaserver_1.4.2-6etch1_i386.deb stable/main/binary-i386/openafs-fileserver_1.4.2-6etch1_i386.deb stable/main/binary-i386/openafs-client_1.4.2-6etch1_i386.deb stable/main/binary-i386/openafs-dbg_1.4.2-6etch1_i386.deb openafs (1.4.2-6etch1) stable-security; urgency=high * Non-maintainer upload by the security team * apply fixes for OpenAFS Security Advisory 2007-003 (CVE-2007-6599) stable/non-free/binary-i386/nvidia-kernel-2.6-486_1.0.8776+6etch2_i386.deb stable/non-free/source/nvidia-graphics-modules-i386_1.0.8776+6etch2.dsc stable/non-free/binary-i386/nvidia-kernel-2.6.18-6-686_1.0.8776+6etch2_i386.deb stable/non-free/source/nvidia-graphics-modules-i386_1.0.8776+6etch2.tar.gz stable/non-free/binary-i386/nvidia-kernel-2.6-k7_1.0.8776+6etch2_i386.deb stable/non-free/binary-i386/nvidia-kernel-2.6.18-6-k7_1.0.8776+6etch2_i386.deb stable/non-free/binary-i386/nvidia-kernel-2.6-686_1.0.8776+6etch2_i386.deb stable/non-free/binary-i386/nvidia-kernel-2.6.18-6-486_1.0.8776+6etch2_i386.deb nvidia-graphics-modules-i386 (1.0.8776+6etch2) stable-security; urgency=high * NMU by the Security Team * build 2.6.18-6 stable/non-free/source/nvidia-graphics-modules-amd64_1.0.8776+6etch2.tar.gz stable/non-free/binary-amd64/nvidia-kernel-2.6.18-6-amd64_1.0.8776+6etch2_amd64.deb stable/non-free/source/nvidia-graphics-modules-amd64_1.0.8776+6etch2.dsc stable/non-free/binary-amd64/nvidia-kernel-2.6-amd64_1.0.8776+6etch2_amd64.deb nvidia-graphics-modules-amd64 (1.0.8776+6etch2) stable-security; urgency=high * NMU by the Security Team * build 2.6.18-6 stable/non-free/binary-i386/nvidia-kernel-legacy-2.6.18-6-486_1.0.7184+6etch2_i386.deb stable/non-free/source/nvidia-graphics-legacy-modules-i386_1.0.7184+6etch2.tar.gz stable/non-free/source/nvidia-graphics-legacy-modules-i386_1.0.7184+6etch2.dsc stable/non-free/binary-i386/nvidia-kernel-legacy-2.6.18-6-k7_1.0.7184+6etch2_i386.deb stable/non-free/binary-i386/nvidia-kernel-legacy-2.6-486_1.0.7184+6etch2_i386.deb stable/non-free/binary-i386/nvidia-kernel-legacy-2.6-686_1.0.7184+6etch2_i386.deb stable/non-free/binary-i386/nvidia-kernel-legacy-2.6.18-6-686_1.0.7184+6etch2_i386.deb stable/non-free/binary-i386/nvidia-kernel-legacy-2.6-k7_1.0.7184+6etch2_i386.deb nvidia-graphics-legacy-modules-i386 (1.0.7184+6etch2) stable-security; urgency=high * NMU by the Security Team * build for 2.6.18-6 stable/non-free/source/nvidia-graphics-legacy-modules-amd64_1.0.7184+6etch2.tar.gz stable/non-free/source/nvidia-graphics-legacy-modules-amd64_1.0.7184+6etch2.dsc stable/non-free/binary-amd64/nvidia-kernel-legacy-2.6-amd64_1.0.7184+6etch2_amd64.deb stable/non-free/binary-amd64/nvidia-kernel-legacy-2.6.18-6-amd64_1.0.7184+6etch2_amd64.deb nvidia-graphics-legacy-modules-amd64 (1.0.7184+6etch2) stable-security; urgency=high * NMU by the Security Team * build for 2.6.18-6 stable/main/binary-sparc/ngircd_0.10.0-2etch1_sparc.deb ngircd (0.10.0-2etch1) stable; urgency=medium * Security upload fixing CVE-2007-6062: Remote vulnerability in ngircd before 0.10.3. Closes: #451875 * Thanks to Sebastian Vesper for finding the issue. * Thanks to Christoph Biedl for noticing, the patch and reminding. stable/main/binary-s390/ngircd_0.10.0-2etch1_s390.deb ngircd (0.10.0-2etch1) stable; urgency=medium * Security upload fixing CVE-2007-6062: Remote vulnerability in ngircd before 0.10.3. Closes: #451875 * Thanks to Sebastian Vesper for finding the issue. * Thanks to Christoph Biedl for noticing, the patch and reminding. stable/main/binary-powerpc/ngircd_0.10.0-2etch1_powerpc.deb ngircd (0.10.0-2etch1) stable; urgency=medium * Security upload fixing CVE-2007-6062: Remote vulnerability in ngircd before 0.10.3. Closes: #451875 * Thanks to Sebastian Vesper for finding the issue. * Thanks to Christoph Biedl for noticing, the patch and reminding. stable/main/binary-mipsel/ngircd_0.10.0-2etch1_mipsel.deb ngircd (0.10.0-2etch1) stable; urgency=medium * Security upload fixing CVE-2007-6062: Remote vulnerability in ngircd before 0.10.3. Closes: #451875 * Thanks to Sebastian Vesper for finding the issue. * Thanks to Christoph Biedl for noticing, the patch and reminding. stable/main/binary-mips/ngircd_0.10.0-2etch1_mips.deb ngircd (0.10.0-2etch1) stable; urgency=medium * Security upload fixing CVE-2007-6062: Remote vulnerability in ngircd before 0.10.3. Closes: #451875 * Thanks to Sebastian Vesper for finding the issue. * Thanks to Christoph Biedl for noticing, the patch and reminding. stable/main/binary-i386/ngircd_0.10.0-2etch1_i386.deb ngircd (0.10.0-2etch1) stable; urgency=medium * Security upload fixing CVE-2007-6062: Remote vulnerability in ngircd before 0.10.3. Closes: #451875 * Thanks to Sebastian Vesper for finding the issue. * Thanks to Christoph Biedl for noticing, the patch and reminding. stable/main/binary-hppa/ngircd_0.10.0-2etch1_hppa.deb ngircd (0.10.0-2etch1) stable; urgency=medium * Security upload fixing CVE-2007-6062: Remote vulnerability in ngircd before 0.10.3. Closes: #451875 * Thanks to Sebastian Vesper for finding the issue. * Thanks to Christoph Biedl for noticing, the patch and reminding. stable/main/binary-arm/ngircd_0.10.0-2etch1_arm.deb ngircd (0.10.0-2etch1) stable; urgency=medium * Security upload fixing CVE-2007-6062: Remote vulnerability in ngircd before 0.10.3. Closes: #451875 * Thanks to Sebastian Vesper for finding the issue. * Thanks to Christoph Biedl for noticing, the patch and reminding. stable/main/binary-amd64/ngircd_0.10.0-2etch1_amd64.deb ngircd (0.10.0-2etch1) stable; urgency=medium * Security upload fixing CVE-2007-6062: Remote vulnerability in ngircd before 0.10.3. Closes: #451875 * Thanks to Sebastian Vesper for finding the issue. * Thanks to Christoph Biedl for noticing, the patch and reminding. stable/main/binary-alpha/ngircd_0.10.0-2etch1_alpha.deb ngircd (0.10.0-2etch1) stable; urgency=medium * Security upload fixing CVE-2007-6062: Remote vulnerability in ngircd before 0.10.3. Closes: #451875 * Thanks to Sebastian Vesper for finding the issue. * Thanks to Christoph Biedl for noticing, the patch and reminding. stable/main/source/ngircd_0.10.0-2etch1.dsc stable/main/binary-ia64/ngircd_0.10.0-2etch1_ia64.deb stable/main/source/ngircd_0.10.0-2etch1.diff.gz ngircd (0.10.0-2etch1) stable; urgency=medium * Security upload fixing CVE-2007-6062: Remote vulnerability in ngircd before 0.10.3. Closes: #451875 * Thanks to Sebastian Vesper for finding the issue. * Thanks to Christoph Biedl for noticing, the patch and reminding. stable/main/binary-sparc/libsnmp-perl_5.2.3-7etch2_sparc.deb stable/main/binary-sparc/libsnmp9_5.2.3-7etch2_sparc.deb stable/main/binary-sparc/snmp_5.2.3-7etch2_sparc.deb stable/main/binary-sparc/snmpd_5.2.3-7etch2_sparc.deb stable/main/binary-sparc/libsnmp9-dev_5.2.3-7etch2_sparc.deb net-snmp (5.2.3-7etch2) stable-security; urgency=high * Non-maintainer upload by the security team * Apply changes from http://sourceforge.net/tracker/download.php?group_id=12694&atid=112694&file_id=228217&aid=1712988 to fix CVE-2007-5864 stable/main/binary-s390/snmpd_5.2.3-7etch2_s390.deb stable/main/binary-s390/libsnmp-perl_5.2.3-7etch2_s390.deb stable/main/binary-s390/libsnmp9_5.2.3-7etch2_s390.deb stable/main/binary-s390/snmp_5.2.3-7etch2_s390.deb stable/main/binary-s390/libsnmp9-dev_5.2.3-7etch2_s390.deb net-snmp (5.2.3-7etch2) stable-security; urgency=high * Non-maintainer upload by the security team * Apply changes from http://sourceforge.net/tracker/download.php?group_id=12694&atid=112694&file_id=228217&aid=1712988 to fix CVE-2007-5864 stable/main/binary-powerpc/snmp_5.2.3-7etch2_powerpc.deb stable/main/binary-powerpc/libsnmp9-dev_5.2.3-7etch2_powerpc.deb stable/main/binary-powerpc/snmpd_5.2.3-7etch2_powerpc.deb stable/main/binary-powerpc/libsnmp9_5.2.3-7etch2_powerpc.deb stable/main/binary-powerpc/libsnmp-perl_5.2.3-7etch2_powerpc.deb net-snmp (5.2.3-7etch2) stable-security; urgency=high * Non-maintainer upload by the security team * Apply changes from http://sourceforge.net/tracker/download.php?group_id=12694&atid=112694&file_id=228217&aid=1712988 to fix CVE-2007-5864 stable/main/binary-mipsel/libsnmp9_5.2.3-7etch2_mipsel.deb stable/main/binary-mipsel/libsnmp-perl_5.2.3-7etch2_mipsel.deb stable/main/binary-mipsel/libsnmp9-dev_5.2.3-7etch2_mipsel.deb stable/main/binary-mipsel/snmpd_5.2.3-7etch2_mipsel.deb stable/main/binary-mipsel/snmp_5.2.3-7etch2_mipsel.deb net-snmp (5.2.3-7etch2) stable-security; urgency=high * Non-maintainer upload by the security team * Apply changes from http://sourceforge.net/tracker/download.php?group_id=12694&atid=112694&file_id=228217&aid=1712988 to fix CVE-2007-5864 stable/main/binary-mips/snmp_5.2.3-7etch2_mips.deb stable/main/binary-mips/snmpd_5.2.3-7etch2_mips.deb stable/main/binary-mips/libsnmp9_5.2.3-7etch2_mips.deb stable/main/binary-mips/libsnmp9-dev_5.2.3-7etch2_mips.deb stable/main/binary-mips/libsnmp-perl_5.2.3-7etch2_mips.deb net-snmp (5.2.3-7etch2) stable-security; urgency=high * Non-maintainer upload by the security team * Apply changes from http://sourceforge.net/tracker/download.php?group_id=12694&atid=112694&file_id=228217&aid=1712988 to fix CVE-2007-5864 stable/main/binary-ia64/libsnmp-perl_5.2.3-7etch2_ia64.deb stable/main/binary-ia64/snmp_5.2.3-7etch2_ia64.deb stable/main/binary-ia64/libsnmp9-dev_5.2.3-7etch2_ia64.deb stable/main/binary-ia64/snmpd_5.2.3-7etch2_ia64.deb stable/main/binary-ia64/libsnmp9_5.2.3-7etch2_ia64.deb net-snmp (5.2.3-7etch2) stable-security; urgency=high * Non-maintainer upload by the security team * Apply changes from http://sourceforge.net/tracker/download.php?group_id=12694&atid=112694&file_id=228217&aid=1712988 to fix CVE-2007-5864 stable/main/binary-i386/snmpd_5.2.3-7etch2_i386.deb stable/main/binary-i386/libsnmp-perl_5.2.3-7etch2_i386.deb stable/main/binary-i386/libsnmp9_5.2.3-7etch2_i386.deb stable/main/binary-i386/snmp_5.2.3-7etch2_i386.deb stable/main/binary-i386/libsnmp9-dev_5.2.3-7etch2_i386.deb net-snmp (5.2.3-7etch2) stable-security; urgency=high * Non-maintainer upload by the security team * Apply changes from http://sourceforge.net/tracker/download.php?group_id=12694&atid=112694&file_id=228217&aid=1712988 to fix CVE-2007-5864 stable/main/binary-hppa/libsnmp9_5.2.3-7etch2_hppa.deb stable/main/binary-hppa/snmp_5.2.3-7etch2_hppa.deb stable/main/binary-hppa/libsnmp-perl_5.2.3-7etch2_hppa.deb stable/main/binary-hppa/libsnmp9-dev_5.2.3-7etch2_hppa.deb stable/main/binary-hppa/snmpd_5.2.3-7etch2_hppa.deb net-snmp (5.2.3-7etch2) stable-security; urgency=high * Non-maintainer upload by the security team * Apply changes from http://sourceforge.net/tracker/download.php?group_id=12694&atid=112694&file_id=228217&aid=1712988 to fix CVE-2007-5864 stable/main/binary-arm/libsnmp9_5.2.3-7etch2_arm.deb stable/main/binary-arm/snmpd_5.2.3-7etch2_arm.deb stable/main/binary-arm/snmp_5.2.3-7etch2_arm.deb stable/main/binary-arm/libsnmp9-dev_5.2.3-7etch2_arm.deb stable/main/binary-arm/libsnmp-perl_5.2.3-7etch2_arm.deb net-snmp (5.2.3-7etch2) stable-security; urgency=high * Non-maintainer upload by the security team * Apply changes from http://sourceforge.net/tracker/download.php?group_id=12694&atid=112694&file_id=228217&aid=1712988 to fix CVE-2007-5864 stable/main/binary-alpha/snmpd_5.2.3-7etch2_alpha.deb stable/main/binary-alpha/snmp_5.2.3-7etch2_alpha.deb stable/main/binary-alpha/libsnmp9_5.2.3-7etch2_alpha.deb stable/main/binary-alpha/libsnmp9-dev_5.2.3-7etch2_alpha.deb stable/main/binary-alpha/libsnmp-perl_5.2.3-7etch2_alpha.deb net-snmp (5.2.3-7etch2) stable-security; urgency=high * Non-maintainer upload by the security team * Apply changes from http://sourceforge.net/tracker/download.php?group_id=12694&atid=112694&file_id=228217&aid=1712988 to fix CVE-2007-5864 stable/main/source/net-snmp_5.2.3-7etch2.dsc stable/main/binary-amd64/libsnmp9_5.2.3-7etch2_amd64.deb stable/main/binary-all/tkmib_5.2.3-7etch2_all.deb stable/main/binary-all/libsnmp-base_5.2.3-7etch2_all.deb stable/main/binary-amd64/snmp_5.2.3-7etch2_amd64.deb stable/main/binary-amd64/snmpd_5.2.3-7etch2_amd64.deb stable/main/source/net-snmp_5.2.3-7etch2.diff.gz stable/main/binary-amd64/libsnmp9-dev_5.2.3-7etch2_amd64.deb stable/main/binary-amd64/libsnmp-perl_5.2.3-7etch2_amd64.deb net-snmp (5.2.3-7etch2) stable-security; urgency=high * Non-maintainer upload by the security team * Apply changes from http://sourceforge.net/tracker/download.php?group_id=12694&atid=112694&file_id=228217&aid=1712988 to fix CVE-2007-5864 stable/main/binary-sparc/nagios-plugins_1.4.5-1etch1_sparc.deb stable/main/binary-sparc/nagios-plugins-basic_1.4.5-1etch1_sparc.deb stable/main/binary-sparc/nagios-plugins-standard_1.4.5-1etch1_sparc.deb nagios-plugins (1.4.5-1etch1) stable-security; urgency=high * Fix CVE-2007-5198 CVE-2007-5623 stable/main/binary-s390/nagios-plugins_1.4.5-1etch1_s390.deb stable/main/binary-s390/nagios-plugins-basic_1.4.5-1etch1_s390.deb stable/main/binary-s390/nagios-plugins-standard_1.4.5-1etch1_s390.deb nagios-plugins (1.4.5-1etch1) stable-security; urgency=high * Fix CVE-2007-5198 CVE-2007-5623 stable/main/binary-powerpc/nagios-plugins-basic_1.4.5-1etch1_powerpc.deb stable/main/binary-powerpc/nagios-plugins_1.4.5-1etch1_powerpc.deb stable/main/binary-powerpc/nagios-plugins-standard_1.4.5-1etch1_powerpc.deb nagios-plugins (1.4.5-1etch1) stable-security; urgency=high * Fix CVE-2007-5198 CVE-2007-5623 stable/main/binary-mipsel/nagios-plugins-basic_1.4.5-1etch1_mipsel.deb stable/main/binary-mipsel/nagios-plugins-standard_1.4.5-1etch1_mipsel.deb stable/main/binary-mipsel/nagios-plugins_1.4.5-1etch1_mipsel.deb nagios-plugins (1.4.5-1etch1) stable-security; urgency=high * Fix CVE-2007-5198 CVE-2007-5623 stable/main/binary-mips/nagios-plugins-basic_1.4.5-1etch1_mips.deb stable/main/binary-mips/nagios-plugins_1.4.5-1etch1_mips.deb stable/main/binary-mips/nagios-plugins-standard_1.4.5-1etch1_mips.deb nagios-plugins (1.4.5-1etch1) stable-security; urgency=high * Fix CVE-2007-5198 CVE-2007-5623 stable/main/binary-ia64/nagios-plugins_1.4.5-1etch1_ia64.deb stable/main/binary-ia64/nagios-plugins-basic_1.4.5-1etch1_ia64.deb stable/main/binary-ia64/nagios-plugins-standard_1.4.5-1etch1_ia64.deb nagios-plugins (1.4.5-1etch1) stable-security; urgency=high * Fix CVE-2007-5198 CVE-2007-5623 stable/main/binary-hppa/nagios-plugins_1.4.5-1etch1_hppa.deb stable/main/binary-hppa/nagios-plugins-basic_1.4.5-1etch1_hppa.deb stable/main/binary-hppa/nagios-plugins-standard_1.4.5-1etch1_hppa.deb nagios-plugins (1.4.5-1etch1) stable-security; urgency=high * Fix CVE-2007-5198 CVE-2007-5623 stable/main/binary-arm/nagios-plugins-basic_1.4.5-1etch1_arm.deb stable/main/binary-arm/nagios-plugins-standard_1.4.5-1etch1_arm.deb stable/main/binary-arm/nagios-plugins_1.4.5-1etch1_arm.deb nagios-plugins (1.4.5-1etch1) stable-security; urgency=high * Fix CVE-2007-5198 CVE-2007-5623 stable/main/binary-amd64/nagios-plugins-basic_1.4.5-1etch1_amd64.deb stable/main/binary-amd64/nagios-plugins-standard_1.4.5-1etch1_amd64.deb stable/main/binary-amd64/nagios-plugins_1.4.5-1etch1_amd64.deb nagios-plugins (1.4.5-1etch1) stable-security; urgency=high * Fix CVE-2007-5198 CVE-2007-5623 stable/main/binary-alpha/nagios-plugins-basic_1.4.5-1etch1_alpha.deb stable/main/binary-alpha/nagios-plugins_1.4.5-1etch1_alpha.deb stable/main/binary-alpha/nagios-plugins-standard_1.4.5-1etch1_alpha.deb nagios-plugins (1.4.5-1etch1) stable-security; urgency=high * Fix CVE-2007-5198 CVE-2007-5623 stable/main/binary-i386/nagios-plugins-standard_1.4.5-1etch1_i386.deb stable/main/binary-i386/nagios-plugins_1.4.5-1etch1_i386.deb stable/main/source/nagios-plugins_1.4.5-1etch1.dsc stable/main/binary-i386/nagios-plugins-basic_1.4.5-1etch1_i386.deb stable/main/source/nagios-plugins_1.4.5-1etch1.diff.gz nagios-plugins (1.4.5-1etch1) stable-security; urgency=high * Fix CVE-2007-5198 CVE-2007-5623 stable/main/binary-sparc/mysql-client-5.0_5.0.32-7etch5_sparc.deb stable/main/binary-sparc/libmysqlclient15-dev_5.0.32-7etch5_sparc.deb stable/main/binary-sparc/libmysqlclient15off_5.0.32-7etch5_sparc.deb stable/main/binary-sparc/mysql-server-5.0_5.0.32-7etch5_sparc.deb stable/main/binary-sparc/mysql-server-4.1_5.0.32-7etch5_sparc.deb mysql-dfsg-5.0 (5.0.32-7etch5) stable-security; urgency=high * SECURITY: Fix for CVE-2008-0226 and CVE-2008-0227: Three vulnerabilities in yaSSL versions 1.7.5 and earlier were discovered that could lead to a server crash or execution of unauthorized code. The exploit requires a server with yaSSL enabled and TCP/IP connections enabled, but does not require valid MySQL account credentials. The exploit does not apply to OpenSSL. (closes: #460873) stable/main/binary-s390/libmysqlclient15off_5.0.32-7etch5_s390.deb stable/main/binary-s390/mysql-server-5.0_5.0.32-7etch5_s390.deb stable/main/binary-s390/libmysqlclient15-dev_5.0.32-7etch5_s390.deb stable/main/binary-s390/mysql-client-5.0_5.0.32-7etch5_s390.deb stable/main/binary-s390/mysql-server-4.1_5.0.32-7etch5_s390.deb mysql-dfsg-5.0 (5.0.32-7etch5) stable-security; urgency=high * SECURITY: Fix for CVE-2008-0226 and CVE-2008-0227: Three vulnerabilities in yaSSL versions 1.7.5 and earlier were discovered that could lead to a server crash or execution of unauthorized code. The exploit requires a server with yaSSL enabled and TCP/IP connections enabled, but does not require valid MySQL account credentials. The exploit does not apply to OpenSSL. (closes: #460873) stable/main/binary-powerpc/libmysqlclient15off_5.0.32-7etch5_powerpc.deb stable/main/binary-powerpc/mysql-client-5.0_5.0.32-7etch5_powerpc.deb stable/main/binary-powerpc/libmysqlclient15-dev_5.0.32-7etch5_powerpc.deb stable/main/binary-powerpc/mysql-server-4.1_5.0.32-7etch5_powerpc.deb stable/main/binary-powerpc/mysql-server-5.0_5.0.32-7etch5_powerpc.deb mysql-dfsg-5.0 (5.0.32-7etch5) stable-security; urgency=high * SECURITY: Fix for CVE-2008-0226 and CVE-2008-0227: Three vulnerabilities in yaSSL versions 1.7.5 and earlier were discovered that could lead to a server crash or execution of unauthorized code. The exploit requires a server with yaSSL enabled and TCP/IP connections enabled, but does not require valid MySQL account credentials. The exploit does not apply to OpenSSL. (closes: #460873) stable/main/binary-mipsel/mysql-client-5.0_5.0.32-7etch5_mipsel.deb stable/main/binary-mipsel/libmysqlclient15off_5.0.32-7etch5_mipsel.deb stable/main/binary-mipsel/libmysqlclient15-dev_5.0.32-7etch5_mipsel.deb stable/main/binary-mipsel/mysql-server-5.0_5.0.32-7etch5_mipsel.deb stable/main/binary-mipsel/mysql-server-4.1_5.0.32-7etch5_mipsel.deb mysql-dfsg-5.0 (5.0.32-7etch5) stable-security; urgency=high * SECURITY: Fix for CVE-2008-0226 and CVE-2008-0227: Three vulnerabilities in yaSSL versions 1.7.5 and earlier were discovered that could lead to a server crash or execution of unauthorized code. The exploit requires a server with yaSSL enabled and TCP/IP connections enabled, but does not require valid MySQL account credentials. The exploit does not apply to OpenSSL. (closes: #460873) stable/main/binary-mips/mysql-client-5.0_5.0.32-7etch5_mips.deb stable/main/binary-mips/mysql-server-4.1_5.0.32-7etch5_mips.deb stable/main/binary-mips/libmysqlclient15-dev_5.0.32-7etch5_mips.deb stable/main/binary-mips/libmysqlclient15off_5.0.32-7etch5_mips.deb stable/main/binary-mips/mysql-server-5.0_5.0.32-7etch5_mips.deb mysql-dfsg-5.0 (5.0.32-7etch5) stable-security; urgency=high * SECURITY: Fix for CVE-2008-0226 and CVE-2008-0227: Three vulnerabilities in yaSSL versions 1.7.5 and earlier were discovered that could lead to a server crash or execution of unauthorized code. The exploit requires a server with yaSSL enabled and TCP/IP connections enabled, but does not require valid MySQL account credentials. The exploit does not apply to OpenSSL. (closes: #460873) stable/main/binary-ia64/libmysqlclient15-dev_5.0.32-7etch5_ia64.deb stable/main/binary-ia64/mysql-client-5.0_5.0.32-7etch5_ia64.deb stable/main/binary-ia64/libmysqlclient15off_5.0.32-7etch5_ia64.deb stable/main/binary-ia64/mysql-server-5.0_5.0.32-7etch5_ia64.deb stable/main/binary-ia64/mysql-server-4.1_5.0.32-7etch5_ia64.deb mysql-dfsg-5.0 (5.0.32-7etch5) stable-security; urgency=high * SECURITY: Fix for CVE-2008-0226 and CVE-2008-0227: Three vulnerabilities in yaSSL versions 1.7.5 and earlier were discovered that could lead to a server crash or execution of unauthorized code. The exploit requires a server with yaSSL enabled and TCP/IP connections enabled, but does not require valid MySQL account credentials. The exploit does not apply to OpenSSL. (closes: #460873) stable/main/binary-hppa/libmysqlclient15off_5.0.32-7etch5_hppa.deb stable/main/binary-hppa/libmysqlclient15-dev_5.0.32-7etch5_hppa.deb stable/main/binary-hppa/mysql-server-5.0_5.0.32-7etch5_hppa.deb stable/main/binary-hppa/mysql-server-4.1_5.0.32-7etch5_hppa.deb stable/main/binary-hppa/mysql-client-5.0_5.0.32-7etch5_hppa.deb mysql-dfsg-5.0 (5.0.32-7etch5) stable-security; urgency=high * SECURITY: Fix for CVE-2008-0226 and CVE-2008-0227: Three vulnerabilities in yaSSL versions 1.7.5 and earlier were discovered that could lead to a server crash or execution of unauthorized code. The exploit requires a server with yaSSL enabled and TCP/IP connections enabled, but does not require valid MySQL account credentials. The exploit does not apply to OpenSSL. (closes: #460873) stable/main/binary-arm/libmysqlclient15off_5.0.32-7etch5_arm.deb stable/main/binary-arm/mysql-server-5.0_5.0.32-7etch5_arm.deb stable/main/binary-arm/libmysqlclient15-dev_5.0.32-7etch5_arm.deb stable/main/binary-arm/mysql-client-5.0_5.0.32-7etch5_arm.deb stable/main/binary-arm/mysql-server-4.1_5.0.32-7etch5_arm.deb mysql-dfsg-5.0 (5.0.32-7etch5) stable-security; urgency=high * SECURITY: Fix for CVE-2008-0226 and CVE-2008-0227: Three vulnerabilities in yaSSL versions 1.7.5 and earlier were discovered that could lead to a server crash or execution of unauthorized code. The exploit requires a server with yaSSL enabled and TCP/IP connections enabled, but does not require valid MySQL account credentials. The exploit does not apply to OpenSSL. (closes: #460873) stable/main/binary-amd64/libmysqlclient15-dev_5.0.32-7etch5_amd64.deb stable/main/binary-amd64/libmysqlclient15off_5.0.32-7etch5_amd64.deb stable/main/binary-amd64/mysql-client-5.0_5.0.32-7etch5_amd64.deb stable/main/binary-amd64/mysql-server-5.0_5.0.32-7etch5_amd64.deb stable/main/binary-amd64/mysql-server-4.1_5.0.32-7etch5_amd64.deb mysql-dfsg-5.0 (5.0.32-7etch5) stable-security; urgency=high * SECURITY: Fix for CVE-2008-0226 and CVE-2008-0227: Three vulnerabilities in yaSSL versions 1.7.5 and earlier were discovered that could lead to a server crash or execution of unauthorized code. The exploit requires a server with yaSSL enabled and TCP/IP connections enabled, but does not require valid MySQL account credentials. The exploit does not apply to OpenSSL. (closes: #460873) stable/main/binary-alpha/libmysqlclient15-dev_5.0.32-7etch5_alpha.deb stable/main/binary-alpha/libmysqlclient15off_5.0.32-7etch5_alpha.deb stable/main/binary-alpha/mysql-client-5.0_5.0.32-7etch5_alpha.deb stable/main/binary-alpha/mysql-server-5.0_5.0.32-7etch5_alpha.deb stable/main/binary-alpha/mysql-server-4.1_5.0.32-7etch5_alpha.deb mysql-dfsg-5.0 (5.0.32-7etch5) stable-security; urgency=high * SECURITY: Fix for CVE-2008-0226 and CVE-2008-0227: Three vulnerabilities in yaSSL versions 1.7.5 and earlier were discovered that could lead to a server crash or execution of unauthorized code. The exploit requires a server with yaSSL enabled and TCP/IP connections enabled, but does not require valid MySQL account credentials. The exploit does not apply to OpenSSL. (closes: #460873) stable/main/source/mysql-dfsg-5.0_5.0.32-7etch5.diff.gz stable/main/binary-i386/mysql-server-5.0_5.0.32-7etch5_i386.deb stable/main/binary-i386/mysql-client-5.0_5.0.32-7etch5_i386.deb stable/main/binary-all/mysql-server_5.0.32-7etch5_all.deb stable/main/binary-all/mysql-client_5.0.32-7etch5_all.deb stable/main/binary-i386/libmysqlclient15-dev_5.0.32-7etch5_i386.deb stable/main/source/mysql-dfsg-5.0_5.0.32-7etch5.dsc stable/main/binary-all/mysql-common_5.0.32-7etch5_all.deb stable/main/binary-i386/libmysqlclient15off_5.0.32-7etch5_i386.deb stable/main/binary-i386/mysql-server-4.1_5.0.32-7etch5_i386.deb mysql-dfsg-5.0 (5.0.32-7etch5) stable-security; urgency=high * SECURITY: Fix for CVE-2008-0226 and CVE-2008-0227: Three vulnerabilities in yaSSL versions 1.7.5 and earlier were discovered that could lead to a server crash or execution of unauthorized code. The exploit requires a server with yaSSL enabled and TCP/IP connections enabled, but does not require valid MySQL account credentials. The exploit does not apply to OpenSSL. (closes: #460873) stable/main/binary-sparc/mplayer_1.0~rc1-12etch2_sparc.deb mplayer (1.0~rc1-12etch2) stable-security; urgency=high * fix SVN25823 for CVE-2008-0630, buffer overflow via crafted url , thanks Niko Golde (closes: #464532) * fix SVN25824 for CVE-2008-0629, buffer overflow via crafted cddb title thanks Niko Golde (closes: #464533) * fix for CVE-2008-0485 Array index error in libmpdemux/demux_mov.c a.k.a. CORE-2007-1218: MPlayer 1.0rc2 buffer overflow vulnerability thanks Stefan Fritsch * fix for CVE-2008-0486 Array index vulnerability in libmpdemux/demux_audio.c a.k.a. CORE-2008-0122: MPlayer arbitrary pointer dereference thanks Stefan Fritsch (closes: #464060) stable/main/binary-s390/mplayer_1.0~rc1-12etch2_s390.deb mplayer (1.0~rc1-12etch2) stable-security; urgency=high * fix SVN25823 for CVE-2008-0630, buffer overflow via crafted url , thanks Niko Golde (closes: #464532) * fix SVN25824 for CVE-2008-0629, buffer overflow via crafted cddb title thanks Niko Golde (closes: #464533) * fix for CVE-2008-0485 Array index error in libmpdemux/demux_mov.c a.k.a. CORE-2007-1218: MPlayer 1.0rc2 buffer overflow vulnerability thanks Stefan Fritsch * fix for CVE-2008-0486 Array index vulnerability in libmpdemux/demux_audio.c a.k.a. CORE-2008-0122: MPlayer arbitrary pointer dereference thanks Stefan Fritsch (closes: #464060) stable/main/binary-powerpc/mplayer_1.0~rc1-12etch2_powerpc.deb mplayer (1.0~rc1-12etch2) stable-security; urgency=high * fix SVN25823 for CVE-2008-0630, buffer overflow via crafted url , thanks Niko Golde (closes: #464532) * fix SVN25824 for CVE-2008-0629, buffer overflow via crafted cddb title thanks Niko Golde (closes: #464533) * fix for CVE-2008-0485 Array index error in libmpdemux/demux_mov.c a.k.a. CORE-2007-1218: MPlayer 1.0rc2 buffer overflow vulnerability thanks Stefan Fritsch * fix for CVE-2008-0486 Array index vulnerability in libmpdemux/demux_audio.c a.k.a. CORE-2008-0122: MPlayer arbitrary pointer dereference thanks Stefan Fritsch (closes: #464060) stable/main/binary-mipsel/mplayer_1.0~rc1-12etch2_mipsel.deb mplayer (1.0~rc1-12etch2) stable-security; urgency=high * fix SVN25823 for CVE-2008-0630, buffer overflow via crafted url , thanks Niko Golde (closes: #464532) * fix SVN25824 for CVE-2008-0629, buffer overflow via crafted cddb title thanks Niko Golde (closes: #464533) * fix for CVE-2008-0485 Array index error in libmpdemux/demux_mov.c a.k.a. CORE-2007-1218: MPlayer 1.0rc2 buffer overflow vulnerability thanks Stefan Fritsch * fix for CVE-2008-0486 Array index vulnerability in libmpdemux/demux_audio.c a.k.a. CORE-2008-0122: MPlayer arbitrary pointer dereference thanks Stefan Fritsch (closes: #464060) stable/main/binary-mips/mplayer_1.0~rc1-12etch2_mips.deb mplayer (1.0~rc1-12etch2) stable-security; urgency=high * fix SVN25823 for CVE-2008-0630, buffer overflow via crafted url , thanks Niko Golde (closes: #464532) * fix SVN25824 for CVE-2008-0629, buffer overflow via crafted cddb title thanks Niko Golde (closes: #464533) * fix for CVE-2008-0485 Array index error in libmpdemux/demux_mov.c a.k.a. CORE-2007-1218: MPlayer 1.0rc2 buffer overflow vulnerability thanks Stefan Fritsch * fix for CVE-2008-0486 Array index vulnerability in libmpdemux/demux_audio.c a.k.a. CORE-2008-0122: MPlayer arbitrary pointer dereference thanks Stefan Fritsch (closes: #464060) stable/main/binary-ia64/mplayer_1.0~rc1-12etch2_ia64.deb mplayer (1.0~rc1-12etch2) stable-security; urgency=high * fix SVN25823 for CVE-2008-0630, buffer overflow via crafted url , thanks Niko Golde (closes: #464532) * fix SVN25824 for CVE-2008-0629, buffer overflow via crafted cddb title thanks Niko Golde (closes: #464533) * fix for CVE-2008-0485 Array index error in libmpdemux/demux_mov.c a.k.a. CORE-2007-1218: MPlayer 1.0rc2 buffer overflow vulnerability thanks Stefan Fritsch * fix for CVE-2008-0486 Array index vulnerability in libmpdemux/demux_audio.c a.k.a. CORE-2008-0122: MPlayer arbitrary pointer dereference thanks Stefan Fritsch (closes: #464060) stable/main/binary-hppa/mplayer_1.0~rc1-12etch2_hppa.deb mplayer (1.0~rc1-12etch2) stable-security; urgency=high * fix SVN25823 for CVE-2008-0630, buffer overflow via crafted url , thanks Niko Golde (closes: #464532) * fix SVN25824 for CVE-2008-0629, buffer overflow via crafted cddb title thanks Niko Golde (closes: #464533) * fix for CVE-2008-0485 Array index error in libmpdemux/demux_mov.c a.k.a. CORE-2007-1218: MPlayer 1.0rc2 buffer overflow vulnerability thanks Stefan Fritsch * fix for CVE-2008-0486 Array index vulnerability in libmpdemux/demux_audio.c a.k.a. CORE-2008-0122: MPlayer arbitrary pointer dereference thanks Stefan Fritsch (closes: #464060) stable/main/binary-arm/mplayer_1.0~rc1-12etch2_arm.deb mplayer (1.0~rc1-12etch2) stable-security; urgency=high * fix SVN25823 for CVE-2008-0630, buffer overflow via crafted url , thanks Niko Golde (closes: #464532) * fix SVN25824 for CVE-2008-0629, buffer overflow via crafted cddb title thanks Niko Golde (closes: #464533) * fix for CVE-2008-0485 Array index error in libmpdemux/demux_mov.c a.k.a. CORE-2007-1218: MPlayer 1.0rc2 buffer overflow vulnerability thanks Stefan Fritsch * fix for CVE-2008-0486 Array index vulnerability in libmpdemux/demux_audio.c a.k.a. CORE-2008-0122: MPlayer arbitrary pointer dereference thanks Stefan Fritsch (closes: #464060) stable/main/binary-amd64/mplayer_1.0~rc1-12etch2_amd64.deb mplayer (1.0~rc1-12etch2) stable-security; urgency=high * fix SVN25823 for CVE-2008-0630, buffer overflow via crafted url , thanks Niko Golde (closes: #464532) * fix SVN25824 for CVE-2008-0629, buffer overflow via crafted cddb title thanks Niko Golde (closes: #464533) * fix for CVE-2008-0485 Array index error in libmpdemux/demux_mov.c a.k.a. CORE-2007-1218: MPlayer 1.0rc2 buffer overflow vulnerability thanks Stefan Fritsch * fix for CVE-2008-0486 Array index vulnerability in libmpdemux/demux_audio.c a.k.a. CORE-2008-0122: MPlayer arbitrary pointer dereference thanks Stefan Fritsch (closes: #464060) stable/main/binary-alpha/mplayer_1.0~rc1-12etch2_alpha.deb mplayer (1.0~rc1-12etch2) stable-security; urgency=high * fix SVN25823 for CVE-2008-0630, buffer overflow via crafted url , thanks Niko Golde (closes: #464532) * fix SVN25824 for CVE-2008-0629, buffer overflow via crafted cddb title thanks Niko Golde (closes: #464533) * fix for CVE-2008-0485 Array index error in libmpdemux/demux_mov.c a.k.a. CORE-2007-1218: MPlayer 1.0rc2 buffer overflow vulnerability thanks Stefan Fritsch * fix for CVE-2008-0486 Array index vulnerability in libmpdemux/demux_audio.c a.k.a. CORE-2008-0122: MPlayer arbitrary pointer dereference thanks Stefan Fritsch (closes: #464060) stable/main/binary-all/mplayer-doc_1.0~rc1-12etch2_all.deb stable/main/source/mplayer_1.0~rc1-12etch2.dsc stable/main/source/mplayer_1.0~rc1-12etch2.diff.gz stable/main/binary-i386/mplayer_1.0~rc1-12etch2_i386.deb mplayer (1.0~rc1-12etch2) stable-security; urgency=high * fix SVN25823 for CVE-2008-0630, buffer overflow via crafted url , thanks Niko Golde (closes: #464532) * fix SVN25824 for CVE-2008-0629, buffer overflow via crafted cddb title thanks Niko Golde (closes: #464533) * fix for CVE-2008-0485 Array index error in libmpdemux/demux_mov.c a.k.a. CORE-2007-1218: MPlayer 1.0rc2 buffer overflow vulnerability thanks Stefan Fritsch * fix for CVE-2008-0486 Array index vulnerability in libmpdemux/demux_audio.c a.k.a. CORE-2008-0122: MPlayer arbitrary pointer dereference thanks Stefan Fritsch (closes: #464060) stable/main/binary-sparc/maradns_1.2.12.04-1etch2_sparc.deb maradns (1.2.12.04-1etch2) stable-security; urgency=high * Fix remote DoS stable/main/binary-s390/maradns_1.2.12.04-1etch2_s390.deb maradns (1.2.12.04-1etch2) stable-security; urgency=high * Fix remote DoS stable/main/binary-powerpc/maradns_1.2.12.04-1etch2_powerpc.deb maradns (1.2.12.04-1etch2) stable-security; urgency=high * Fix remote DoS stable/main/binary-mipsel/maradns_1.2.12.04-1etch2_mipsel.deb maradns (1.2.12.04-1etch2) stable-security; urgency=high * Fix remote DoS stable/main/binary-mips/maradns_1.2.12.04-1etch2_mips.deb maradns (1.2.12.04-1etch2) stable-security; urgency=high * Fix remote DoS stable/main/binary-ia64/maradns_1.2.12.04-1etch2_ia64.deb maradns (1.2.12.04-1etch2) stable-security; urgency=high * Fix remote DoS stable/main/binary-hppa/maradns_1.2.12.04-1etch2_hppa.deb maradns (1.2.12.04-1etch2) stable-security; urgency=high * Fix remote DoS stable/main/binary-arm/maradns_1.2.12.04-1etch2_arm.deb maradns (1.2.12.04-1etch2) stable-security; urgency=high * Fix remote DoS stable/main/binary-amd64/maradns_1.2.12.04-1etch2_amd64.deb maradns (1.2.12.04-1etch2) stable-security; urgency=high * Fix remote DoS stable/main/binary-alpha/maradns_1.2.12.04-1etch2_alpha.deb maradns (1.2.12.04-1etch2) stable-security; urgency=high * Fix remote DoS stable/main/source/maradns_1.2.12.04-1etch2.tar.gz stable/main/source/maradns_1.2.12.04-1etch2.dsc stable/main/binary-i386/maradns_1.2.12.04-1etch2_i386.deb maradns (1.2.12.04-1etch2) stable-security; urgency=high * Fix remote DoS stable/non-free/source/madwifi_0.9.2+r1842.20061207-2etch2.diff.gz stable/non-free/binary-all/madwifi-source_0.9.2+r1842.20061207-2etch2_all.deb stable/non-free/source/madwifi_0.9.2+r1842.20061207-2etch2.dsc stable/non-free/binary-all/madwifi-doc_0.9.2+r1842.20061207-2etch2_all.deb madwifi (1:0.9.2+r1842.20061207-2etch2) stable; urgency=low * Add 10_CVE-2007-5448_sanitize_xrates.dpatch from 1:0.9.3.2-2 to fix CVE-2007-5448: - DoS vulnerability via kassert from poor checking of xrate element in scan results (Closes: #446824) stable/main/binary-sparc/mount-aes-udeb_2.12r-15+etch1_sparc.udeb stable/main/binary-sparc/loop-aes-utils_2.12r-15+etch1_sparc.deb loop-aes-utils (2.12r-15+etch1) stable-security; urgency=high * Non-maintainer upload by the security team * Fix privilege escalation by calling setuid() and setgid() in the wrong order and not checking the return values in mount and umount Fixes: CVE-2007-5191 stable/main/binary-s390/loop-aes-utils_2.12r-15+etch1_s390.deb stable/main/binary-s390/mount-aes-udeb_2.12r-15+etch1_s390.udeb loop-aes-utils (2.12r-15+etch1) stable-security; urgency=high * Non-maintainer upload by the security team * Fix privilege escalation by calling setuid() and setgid() in the wrong order and not checking the return values in mount and umount Fixes: CVE-2007-5191 stable/main/binary-powerpc/loop-aes-utils_2.12r-15+etch1_powerpc.deb stable/main/binary-powerpc/mount-aes-udeb_2.12r-15+etch1_powerpc.udeb loop-aes-utils (2.12r-15+etch1) stable-security; urgency=high * Non-maintainer upload by the security team * Fix privilege escalation by calling setuid() and setgid() in the wrong order and not checking the return values in mount and umount Fixes: CVE-2007-5191 stable/main/binary-mipsel/loop-aes-utils_2.12r-15+etch1_mipsel.deb stable/main/binary-mipsel/mount-aes-udeb_2.12r-15+etch1_mipsel.udeb loop-aes-utils (2.12r-15+etch1) stable-security; urgency=high * Non-maintainer upload by the security team * Fix privilege escalation by calling setuid() and setgid() in the wrong order and not checking the return values in mount and umount Fixes: CVE-2007-5191 stable/main/binary-mips/loop-aes-utils_2.12r-15+etch1_mips.deb stable/main/binary-mips/mount-aes-udeb_2.12r-15+etch1_mips.udeb loop-aes-utils (2.12r-15+etch1) stable-security; urgency=high * Non-maintainer upload by the security team * Fix privilege escalation by calling setuid() and setgid() in the wrong order and not checking the return values in mount and umount Fixes: CVE-2007-5191 stable/main/binary-ia64/loop-aes-utils_2.12r-15+etch1_ia64.deb stable/main/binary-ia64/mount-aes-udeb_2.12r-15+etch1_ia64.udeb loop-aes-utils (2.12r-15+etch1) stable-security; urgency=high * Non-maintainer upload by the security team * Fix privilege escalation by calling setuid() and setgid() in the wrong order and not checking the return values in mount and umount Fixes: CVE-2007-5191 stable/main/binary-hppa/loop-aes-utils_2.12r-15+etch1_hppa.deb stable/main/binary-hppa/mount-aes-udeb_2.12r-15+etch1_hppa.udeb loop-aes-utils (2.12r-15+etch1) stable-security; urgency=high * Non-maintainer upload by the security team * Fix privilege escalation by calling setuid() and setgid() in the wrong order and not checking the return values in mount and umount Fixes: CVE-2007-5191 stable/main/binary-arm/loop-aes-utils_2.12r-15+etch1_arm.deb stable/main/binary-arm/mount-aes-udeb_2.12r-15+etch1_arm.udeb loop-aes-utils (2.12r-15+etch1) stable-security; urgency=high * Non-maintainer upload by the security team * Fix privilege escalation by calling setuid() and setgid() in the wrong order and not checking the return values in mount and umount Fixes: CVE-2007-5191 stable/main/binary-amd64/mount-aes-udeb_2.12r-15+etch1_amd64.udeb stable/main/binary-amd64/loop-aes-utils_2.12r-15+etch1_amd64.deb loop-aes-utils (2.12r-15+etch1) stable-security; urgency=high * Non-maintainer upload by the security team * Fix privilege escalation by calling setuid() and setgid() in the wrong order and not checking the return values in mount and umount Fixes: CVE-2007-5191 stable/main/binary-alpha/loop-aes-utils_2.12r-15+etch1_alpha.deb stable/main/binary-alpha/mount-aes-udeb_2.12r-15+etch1_alpha.udeb loop-aes-utils (2.12r-15+etch1) stable-security; urgency=high * Non-maintainer upload by the security team * Fix privilege escalation by calling setuid() and setgid() in the wrong order and not checking the return values in mount and umount Fixes: CVE-2007-5191 stable/main/source/loop-aes-utils_2.12r-15+etch1.dsc stable/main/source/loop-aes-utils_2.12r-15+etch1.diff.gz stable/main/binary-i386/mount-aes-udeb_2.12r-15+etch1_i386.udeb stable/main/binary-i386/loop-aes-utils_2.12r-15+etch1_i386.deb loop-aes-utils (2.12r-15+etch1) stable-security; urgency=high * Non-maintainer upload by the security team * Fix privilege escalation by calling setuid() and setgid() in the wrong order and not checking the return values in mount and umount Fixes: CVE-2007-5191 stable/main/binary-sparc/loop-aes-modules-2.6-sparc64-smp_3.1d-13etch2_sparc.deb stable/main/binary-sparc/loop-aes-modules-2.6-vserver-sparc64_3.1d-13etch2_sparc.deb stable/main/binary-sparc/loop-aes-modules-2.6-sparc32_3.1d-13etch2_sparc.deb stable/main/binary-sparc/loop-aes-modules-2.6-sparc64_3.1d-13etch2_sparc.deb stable/main/binary-sparc/loop-aes-modules-2.6.18-6-sparc32_3.1d-13etch2_sparc.deb stable/main/binary-sparc/loop-aes-modules-2.6.18-6-sparc64_3.1d-13etch2_sparc.deb stable/main/binary-sparc/loop-aes-modules-2.6.18-6-vserver-sparc64_3.1d-13etch2_sparc.deb stable/main/binary-sparc/loop-aes-modules-2.6.18-6-sparc64-smp_3.1d-13etch2_sparc.deb loop-aes (3.1d-13etch2) stable-security; urgency=high * NMU by the Security Team * Update modules to 2.6.18-6 stable/main/binary-s390/loop-aes-modules-2.6-vserver-s390x_3.1d-13etch2_s390.deb stable/main/binary-s390/loop-aes-modules-2.6.18-6-s390x_3.1d-13etch2_s390.deb stable/main/binary-s390/loop-aes-modules-2.6-s390x_3.1d-13etch2_s390.deb stable/main/binary-s390/loop-aes-modules-2.6.18-6-vserver-s390x_3.1d-13etch2_s390.deb stable/main/binary-s390/loop-aes-modules-2.6.18-6-s390_3.1d-13etch2_s390.deb stable/main/binary-s390/loop-aes-modules-2.6-s390_3.1d-13etch2_s390.deb loop-aes (3.1d-13etch2) stable-security; urgency=high * NMU by the Security Team * Update modules to 2.6.18-6 stable/main/binary-powerpc/loop-aes-modules-2.6.18-6-powerpc_3.1d-13etch2_powerpc.deb stable/main/binary-powerpc/loop-aes-modules-2.6-powerpc_3.1d-13etch2_powerpc.deb stable/main/binary-powerpc/loop-aes-modules-2.6-powerpc64_3.1d-13etch2_powerpc.deb stable/main/binary-powerpc/loop-aes-modules-2.6.18-6-vserver-powerpc64_3.1d-13etch2_powerpc.deb stable/main/binary-powerpc/loop-aes-modules-2.6.18-6-prep_3.1d-13etch2_powerpc.deb stable/main/binary-powerpc/loop-aes-modules-2.6-vserver-powerpc_3.1d-13etch2_powerpc.deb stable/main/binary-powerpc/loop-aes-modules-2.6-powerpc-smp_3.1d-13etch2_powerpc.deb stable/main/binary-powerpc/loop-aes-modules-2.6-vserver-powerpc64_3.1d-13etch2_powerpc.deb stable/main/binary-powerpc/loop-aes-modules-2.6.18-6-vserver-powerpc_3.1d-13etch2_powerpc.deb stable/main/binary-powerpc/loop-aes-modules-2.6.18-6-powerpc-miboot_3.1d-13etch2_powerpc.deb stable/main/binary-powerpc/loop-aes-modules-2.6.18-6-powerpc-smp_3.1d-13etch2_powerpc.deb stable/main/binary-powerpc/loop-aes-modules-2.6-prep_3.1d-13etch2_powerpc.deb stable/main/binary-powerpc/loop-aes-modules-2.6-powerpc-miboot_3.1d-13etch2_powerpc.deb stable/main/binary-powerpc/loop-aes-modules-2.6.18-6-powerpc64_3.1d-13etch2_powerpc.deb loop-aes (3.1d-13etch2) stable-security; urgency=high * NMU by the Security Team * Update modules to 2.6.18-6 stable/main/binary-mipsel/loop-aes-modules-2.6.18-6-r3k-kn02_3.1d-13etch2_mipsel.deb stable/main/binary-mipsel/loop-aes-modules-2.6.18-6-r4k-kn04_3.1d-13etch2_mipsel.deb stable/main/binary-mipsel/loop-aes-modules-2.6-r3k-kn02_3.1d-13etch2_mipsel.deb stable/main/binary-mipsel/loop-aes-modules-2.6.18-6-sb1a-bcm91480b_3.1d-13etch2_mipsel.deb stable/main/binary-mipsel/loop-aes-modules-2.6-sb1-bcm91250a_3.1d-13etch2_mipsel.deb stable/main/binary-mipsel/loop-aes-modules-2.6-sb1a-bcm91480b_3.1d-13etch2_mipsel.deb stable/main/binary-mipsel/loop-aes-modules-2.6.18-6-r5k-cobalt_3.1d-13etch2_mipsel.deb stable/main/binary-mipsel/loop-aes-modules-2.6-qemu_3.1d-13etch2_mipsel.deb stable/main/binary-mipsel/loop-aes-modules-2.6.18-6-sb1-bcm91250a_3.1d-13etch2_mipsel.deb stable/main/binary-mipsel/loop-aes-modules-2.6-r4k-kn04_3.1d-13etch2_mipsel.deb stable/main/binary-mipsel/loop-aes-modules-2.6-r5k-cobalt_3.1d-13etch2_mipsel.deb stable/main/binary-mipsel/loop-aes-modules-2.6.18-6-qemu_3.1d-13etch2_mipsel.deb loop-aes (3.1d-13etch2) stable-security; urgency=high * NMU by the Security Team * Update modules to 2.6.18-6 stable/main/binary-mips/loop-aes-modules-2.6-sb1a-bcm91480b_3.1d-13etch2_mips.deb stable/main/binary-mips/loop-aes-modules-2.6-r4k-ip22_3.1d-13etch2_mips.deb stable/main/binary-mips/loop-aes-modules-2.6.18-6-sb1a-bcm91480b_3.1d-13etch2_mips.deb stable/main/binary-mips/loop-aes-modules-2.6-qemu_3.1d-13etch2_mips.deb stable/main/binary-mips/loop-aes-modules-2.6.18-6-qemu_3.1d-13etch2_mips.deb stable/main/binary-mips/loop-aes-modules-2.6.18-6-r5k-ip32_3.1d-13etch2_mips.deb stable/main/binary-mips/loop-aes-modules-2.6-r5k-ip32_3.1d-13etch2_mips.deb stable/main/binary-mips/loop-aes-modules-2.6.18-6-r4k-ip22_3.1d-13etch2_mips.deb stable/main/binary-mips/loop-aes-modules-2.6-sb1-bcm91250a_3.1d-13etch2_mips.deb stable/main/binary-mips/loop-aes-modules-2.6.18-6-sb1-bcm91250a_3.1d-13etch2_mips.deb loop-aes (3.1d-13etch2) stable-security; urgency=high * NMU by the Security Team * Update modules to 2.6.18-6 stable/main/binary-ia64/loop-aes-modules-2.6.18-6-mckinley_3.1d-13etch2_ia64.deb stable/main/binary-ia64/loop-aes-modules-2.6-itanium_3.1d-13etch2_ia64.deb stable/main/binary-ia64/loop-aes-modules-2.6.18-6-itanium_3.1d-13etch2_ia64.deb stable/main/binary-ia64/loop-aes-modules-2.6-mckinley_3.1d-13etch2_ia64.deb loop-aes (3.1d-13etch2) stable-security; urgency=high * NMU by the Security Team * Update modules to 2.6.18-6 stable/main/binary-hppa/loop-aes-modules-2.6-parisc_3.1d-13etch2_hppa.deb stable/main/binary-hppa/loop-aes-modules-2.6.18-6-parisc64-smp_3.1d-13etch2_hppa.deb stable/main/binary-hppa/loop-aes-modules-2.6.18-6-parisc-smp_3.1d-13etch2_hppa.deb stable/main/binary-hppa/loop-aes-modules-2.6-parisc-smp_3.1d-13etch2_hppa.deb stable/main/binary-hppa/loop-aes-modules-2.6.18-6-parisc64_3.1d-13etch2_hppa.deb stable/main/binary-hppa/loop-aes-modules-2.6-parisc64_3.1d-13etch2_hppa.deb stable/main/binary-hppa/loop-aes-modules-2.6.18-6-parisc_3.1d-13etch2_hppa.deb stable/main/binary-hppa/loop-aes-modules-2.6-parisc64-smp_3.1d-13etch2_hppa.deb loop-aes (3.1d-13etch2) stable-security; urgency=high * NMU by the Security Team * Update modules to 2.6.18-6 stable/main/binary-arm/loop-aes-modules-2.6-footbridge_3.1d-13etch2_arm.deb stable/main/binary-arm/loop-aes-modules-2.6.18-6-footbridge_3.1d-13etch2_arm.deb stable/main/binary-arm/loop-aes-modules-2.6-s3c2410_3.1d-13etch2_arm.deb stable/main/binary-arm/loop-aes-modules-2.6.18-6-ixp4xx_3.1d-13etch2_arm.deb stable/main/binary-arm/loop-aes-modules-2.6.18-6-rpc_3.1d-13etch2_arm.deb stable/main/binary-arm/loop-aes-modules-2.6.18-6-iop32x_3.1d-13etch2_arm.deb stable/main/binary-arm/loop-aes-modules-2.6-rpc_3.1d-13etch2_arm.deb stable/main/binary-arm/loop-aes-modules-2.6-iop32x_3.1d-13etch2_arm.deb stable/main/binary-arm/loop-aes-modules-2.6-ixp4xx_3.1d-13etch2_arm.deb stable/main/binary-arm/loop-aes-modules-2.6.18-6-s3c2410_3.1d-13etch2_arm.deb loop-aes (3.1d-13etch2) stable-security; urgency=high * NMU by the Security Team * Update modules to 2.6.18-6 stable/main/binary-amd64/loop-aes-modules-2.6.18-6-amd64_3.1d-13etch2_amd64.deb stable/main/binary-amd64/loop-aes-modules-2.6-xen-vserver-amd64_3.1d-13etch2_amd64.deb stable/main/binary-amd64/loop-aes-modules-2.6.18-6-xen-vserver-amd64_3.1d-13etch2_amd64.deb stable/main/binary-amd64/loop-aes-modules-2.6-amd64_3.1d-13etch2_amd64.deb stable/main/binary-amd64/loop-aes-modules-2.6.18-6-xen-amd64_3.1d-13etch2_amd64.deb stable/main/binary-amd64/loop-aes-modules-2.6-xen-amd64_3.1d-13etch2_amd64.deb stable/main/binary-amd64/loop-aes-modules-2.6-vserver-amd64_3.1d-13etch2_amd64.deb stable/main/binary-amd64/loop-aes-modules-2.6.18-6-vserver-amd64_3.1d-13etch2_amd64.deb loop-aes (3.1d-13etch2) stable-security; urgency=high * NMU by the Security Team * Update modules to 2.6.18-6 stable/main/binary-alpha/loop-aes-modules-2.6.18-6-vserver-alpha_3.1d-13etch2_alpha.deb stable/main/binary-alpha/loop-aes-modules-2.6-alpha-legacy_3.1d-13etch2_alpha.deb stable/main/binary-alpha/loop-aes-modules-2.6.18-6-alpha-generic_3.1d-13etch2_alpha.deb stable/main/binary-alpha/loop-aes-modules-2.6-alpha-generic_3.1d-13etch2_alpha.deb stable/main/binary-alpha/loop-aes-modules-2.6-alpha-smp_3.1d-13etch2_alpha.deb stable/main/binary-alpha/loop-aes-modules-2.6.18-6-alpha-legacy_3.1d-13etch2_alpha.deb stable/main/binary-alpha/loop-aes-modules-2.6.18-6-alpha-smp_3.1d-13etch2_alpha.deb stable/main/binary-alpha/loop-aes-modules-2.6-vserver-alpha_3.1d-13etch2_alpha.deb loop-aes (3.1d-13etch2) stable-security; urgency=high * NMU by the Security Team * Update modules to 2.6.18-6 stable/main/binary-i386/loop-aes-modules-2.6-486_3.1d-13etch2_i386.deb stable/main/binary-i386/loop-aes-modules-2.6.18-6-xen-686_3.1d-13etch2_i386.deb stable/main/binary-all/loop-aes-testsuite_3.1d-13etch2_all.deb stable/main/binary-i386/loop-aes-modules-2.6.18-6-xen-vserver-686_3.1d-13etch2_i386.deb stable/main/binary-i386/loop-aes-modules-2.6.18-6-vserver-k7_3.1d-13etch2_i386.deb stable/main/binary-i386/loop-aes-modules-2.6-xen-686_3.1d-13etch2_i386.deb stable/main/source/loop-aes_3.1d-13etch2.diff.gz stable/main/binary-i386/loop-aes-modules-2.6.18-6-amd64_3.1d-13etch2_i386.deb stable/main/binary-i386/loop-aes-modules-2.6.18-6-vserver-686_3.1d-13etch2_i386.deb stable/main/binary-i386/loop-aes-modules-2.6-vserver-686_3.1d-13etch2_i386.deb stable/main/binary-i386/loop-aes-modules-2.6.18-6-686-bigmem_3.1d-13etch2_i386.deb stable/main/binary-i386/loop-aes-modules-2.6-686_3.1d-13etch2_i386.deb stable/main/source/loop-aes_3.1d-13etch2.dsc stable/main/binary-i386/loop-aes-modules-2.6-xen-vserver-686_3.1d-13etch2_i386.deb stable/main/binary-i386/loop-aes-modules-2.6-k7_3.1d-13etch2_i386.deb stable/main/binary-i386/loop-aes-modules-2.6.18-6-686_3.1d-13etch2_i386.deb stable/main/binary-i386/loop-aes-modules-2.6.18-6-486_3.1d-13etch2_i386.deb stable/main/binary-i386/loop-aes-modules-2.6-amd64_3.1d-13etch2_i386.deb stable/main/binary-i386/loop-aes-modules-2.6-686-bigmem_3.1d-13etch2_i386.deb stable/main/binary-i386/loop-aes-modules-2.6.18-6-k7_3.1d-13etch2_i386.deb stable/main/binary-i386/loop-aes-modules-2.6-vserver-k7_3.1d-13etch2_i386.deb stable/main/binary-all/loop-aes-source_3.1d-13etch2_all.deb loop-aes (3.1d-13etch2) stable-security; urgency=high * NMU by the Security Team * Update modules to 2.6.18-6 stable/non-free/binary-i386/kqemu-modules-2.6-486_2.6.18-4etch2_i386.deb stable/non-free/binary-i386/kqemu-modules-2.6-686_2.6.18-4etch2_i386.deb stable/non-free/source/linux-modules-nonfree-2.6_2.6.18-4etch2.dsc stable/non-free/binary-i386/kqemu-modules-2.6.18-6-686_2.6.18+1.3.0~pre9-4etch2_i386.deb stable/non-free/binary-i386/kqemu-modules-2.6.18-6-486_2.6.18+1.3.0~pre9-4etch2_i386.deb stable/non-free/binary-i386/kqemu-modules-2.6.18-6-686-bigmem_2.6.18+1.3.0~pre9-4etch2_i386.deb stable/non-free/source/linux-modules-nonfree-2.6_2.6.18-4etch2.tar.gz stable/non-free/binary-i386/kqemu-modules-2.6-686-bigmem_2.6.18-4etch2_i386.deb stable/non-free/binary-i386/kqemu-modules-2.6.18-6-k7_2.6.18+1.3.0~pre9-4etch2_i386.deb stable/non-free/binary-i386/kqemu-modules-2.6-k7_2.6.18-4etch2_i386.deb linux-modules-nonfree-2.6 (2.6.18-4etch2) stable-security; urgency=high * Building against 2.6.18-6. stable/main/binary-sparc/squashfs-modules-2.6-sparc64_2.6.18-7+etch4_sparc.deb stable/main/binary-sparc/unionfs-modules-2.6.18-6-sparc64-smp_2.6.18+1.4+debian-7+etch4_sparc.deb stable/main/binary-sparc/redhat-cluster-modules-2.6-sparc64_2.6.18-7+etch4_sparc.deb stable/main/binary-sparc/redhat-cluster-modules-2.6.18-6-sparc64-smp_2.6.18+1.03.00-7+etch4_sparc.deb stable/main/binary-sparc/squashfs-modules-2.6.18-6-sparc64_2.6.18+3.1r2-7+etch4_sparc.deb stable/main/binary-sparc/squashfs-modules-2.6.18-6-sparc32_2.6.18+3.1r2-7+etch4_sparc.deb stable/main/binary-sparc/redhat-cluster-modules-2.6-sparc32_2.6.18-7+etch4_sparc.deb stable/main/binary-sparc/squashfs-modules-2.6.18-6-vserver-sparc64_2.6.18+3.1r2-7+etch4_sparc.deb stable/main/binary-sparc/squashfs-modules-2.6-vserver-sparc64_2.6.18-7+etch4_sparc.deb stable/main/binary-sparc/unionfs-modules-2.6-sparc64_2.6.18-7+etch4_sparc.deb stable/main/binary-sparc/squashfs-modules-2.6-sparc64-smp_2.6.18-7+etch4_sparc.deb stable/main/binary-sparc/redhat-cluster-modules-2.6-vserver-sparc64_2.6.18-7+etch4_sparc.deb stable/main/binary-sparc/redhat-cluster-modules-2.6.18-6-sparc64_2.6.18+1.03.00-7+etch4_sparc.deb stable/main/binary-sparc/redhat-cluster-modules-2.6-sparc64-smp_2.6.18-7+etch4_sparc.deb stable/main/binary-sparc/redhat-cluster-modules-2.6.18-6-sparc32_2.6.18+1.03.00-7+etch4_sparc.deb stable/main/binary-sparc/redhat-cluster-modules-2.6.18-6-vserver-sparc64_2.6.18+1.03.00-7+etch4_sparc.deb stable/main/binary-sparc/unionfs-modules-2.6-sparc64-smp_2.6.18-7+etch4_sparc.deb stable/main/binary-sparc/unionfs-modules-2.6.18-6-sparc64_2.6.18+1.4+debian-7+etch4_sparc.deb stable/main/binary-sparc/squashfs-modules-2.6.18-6-sparc64-smp_2.6.18+3.1r2-7+etch4_sparc.deb stable/main/binary-sparc/unionfs-modules-2.6-sparc32_2.6.18-7+etch4_sparc.deb stable/main/binary-sparc/squashfs-modules-2.6-sparc32_2.6.18-7+etch4_sparc.deb stable/main/binary-sparc/unionfs-modules-2.6.18-6-sparc32_2.6.18+1.4+debian-7+etch4_sparc.deb linux-modules-extra-2.6 (2.6.18-7+etch4) stable-security; urgency=high * Building against 2.6.18-6. stable/main/binary-s390/redhat-cluster-modules-2.6-vserver-s390x_2.6.18-7+etch4_s390.deb stable/main/binary-s390/redhat-cluster-modules-2.6.18-6-s390_2.6.18+1.03.00-7+etch4_s390.deb stable/main/binary-s390/unionfs-modules-2.6-s390_2.6.18-7+etch4_s390.deb stable/main/binary-s390/redhat-cluster-modules-2.6-s390x_2.6.18-7+etch4_s390.deb stable/main/binary-s390/redhat-cluster-modules-2.6.18-6-s390x_2.6.18+1.03.00-7+etch4_s390.deb stable/main/binary-s390/unionfs-modules-2.6.18-6-s390_2.6.18+1.4+debian-7+etch4_s390.deb stable/main/binary-s390/squashfs-modules-2.6.18-6-s390x_2.6.18+3.1r2-7+etch4_s390.deb stable/main/binary-s390/squashfs-modules-2.6-vserver-s390x_2.6.18-7+etch4_s390.deb stable/main/binary-s390/squashfs-modules-2.6.18-6-vserver-s390x_2.6.18+3.1r2-7+etch4_s390.deb stable/main/binary-s390/redhat-cluster-modules-2.6-s390_2.6.18-7+etch4_s390.deb stable/main/binary-s390/squashfs-modules-2.6-s390_2.6.18-7+etch4_s390.deb stable/main/binary-s390/unionfs-modules-2.6-s390x_2.6.18-7+etch4_s390.deb stable/main/binary-s390/unionfs-modules-2.6.18-6-s390x_2.6.18+1.4+debian-7+etch4_s390.deb stable/main/binary-s390/squashfs-modules-2.6.18-6-s390_2.6.18+3.1r2-7+etch4_s390.deb stable/main/binary-s390/squashfs-modules-2.6-s390x_2.6.18-7+etch4_s390.deb stable/main/binary-s390/redhat-cluster-modules-2.6.18-6-vserver-s390x_2.6.18+1.03.00-7+etch4_s390.deb linux-modules-extra-2.6 (2.6.18-7+etch4) stable-security; urgency=high * Building against 2.6.18-6. stable/main/binary-powerpc/mol-modules-2.6-powerpc-smp_2.6.18-7+etch4_powerpc.deb stable/main/binary-powerpc/unionfs-modules-2.6.18-6-powerpc64_2.6.18+1.4+debian-7+etch4_powerpc.deb stable/main/binary-powerpc/squashfs-modules-2.6-prep_2.6.18-7+etch4_powerpc.deb stable/main/binary-powerpc/redhat-cluster-modules-2.6.18-6-powerpc-miboot_2.6.18+1.03.00-7+etch4_powerpc.deb stable/main/binary-powerpc/redhat-cluster-modules-2.6.18-6-powerpc64_2.6.18+1.03.00-7+etch4_powerpc.deb stable/main/binary-powerpc/squashfs-modules-2.6.18-6-powerpc-smp_2.6.18+3.1r2-7+etch4_powerpc.deb stable/main/binary-powerpc/gspca-modules-2.6-powerpc-miboot_2.6.18-7+etch4_powerpc.deb stable/main/binary-powerpc/redhat-cluster-modules-2.6.18-6-powerpc-smp_2.6.18+1.03.00-7+etch4_powerpc.deb stable/main/binary-powerpc/redhat-cluster-modules-2.6-powerpc_2.6.18-7+etch4_powerpc.deb stable/main/binary-powerpc/gspca-modules-2.6-vserver-powerpc_2.6.18-7+etch4_powerpc.deb stable/main/binary-powerpc/squashfs-modules-2.6-vserver-powerpc64_2.6.18-7+etch4_powerpc.deb stable/main/binary-powerpc/gspca-modules-2.6-vserver-powerpc64_2.6.18-7+etch4_powerpc.deb stable/main/binary-powerpc/unionfs-modules-2.6-prep_2.6.18-7+etch4_powerpc.deb stable/main/binary-powerpc/mol-modules-2.6-vserver-powerpc_2.6.18-7+etch4_powerpc.deb stable/main/binary-powerpc/unionfs-modules-2.6.18-6-powerpc-smp_2.6.18+1.4+debian-7+etch4_powerpc.deb stable/main/binary-powerpc/gspca-modules-2.6.18-6-powerpc-miboot_2.6.18+01.00.04-7+etch4_powerpc.deb stable/main/binary-powerpc/squashfs-modules-2.6.18-6-powerpc64_2.6.18+3.1r2-7+etch4_powerpc.deb stable/main/binary-powerpc/squashfs-modules-2.6.18-6-prep_2.6.18+3.1r2-7+etch4_powerpc.deb stable/main/binary-powerpc/redhat-cluster-modules-2.6-powerpc-smp_2.6.18-7+etch4_powerpc.deb stable/main/binary-powerpc/unionfs-modules-2.6.18-6-powerpc-miboot_2.6.18+1.4+debian-7+etch4_powerpc.deb stable/main/binary-powerpc/redhat-cluster-modules-2.6-powerpc-miboot_2.6.18-7+etch4_powerpc.deb stable/main/binary-powerpc/unionfs-modules-2.6-powerpc64_2.6.18-7+etch4_powerpc.deb stable/main/binary-powerpc/redhat-cluster-modules-2.6.18-6-vserver-powerpc_2.6.18+1.03.00-7+etch4_powerpc.deb stable/main/binary-powerpc/squashfs-modules-2.6.18-6-powerpc_2.6.18+3.1r2-7+etch4_powerpc.deb stable/main/binary-powerpc/gspca-modules-2.6.18-6-powerpc64_2.6.18+01.00.04-7+etch4_powerpc.deb stable/main/binary-powerpc/squashfs-modules-2.6-powerpc-smp_2.6.18-7+etch4_powerpc.deb stable/main/binary-powerpc/mol-modules-2.6.18-6-vserver-powerpc_2.6.18+0.9.71.dfsg-7+etch4_powerpc.deb stable/main/binary-powerpc/unionfs-modules-2.6.18-6-prep_2.6.18+1.4+debian-7+etch4_powerpc.deb stable/main/binary-powerpc/squashfs-modules-2.6.18-6-vserver-powerpc64_2.6.18+3.1r2-7+etch4_powerpc.deb stable/main/binary-powerpc/redhat-cluster-modules-2.6-vserver-powerpc64_2.6.18-7+etch4_powerpc.deb stable/main/binary-powerpc/gspca-modules-2.6.18-6-powerpc-smp_2.6.18+01.00.04-7+etch4_powerpc.deb stable/main/binary-powerpc/unionfs-modules-2.6.18-6-powerpc_2.6.18+1.4+debian-7+etch4_powerpc.deb stable/main/binary-powerpc/mol-modules-2.6-powerpc-miboot_2.6.18-7+etch4_powerpc.deb stable/main/binary-powerpc/gspca-modules-2.6-powerpc_2.6.18-7+etch4_powerpc.deb stable/main/binary-powerpc/gspca-modules-2.6.18-6-prep_2.6.18+01.00.04-7+etch4_powerpc.deb stable/main/binary-powerpc/squashfs-modules-2.6-powerpc-miboot_2.6.18-7+etch4_powerpc.deb stable/main/binary-powerpc/unionfs-modules-2.6-powerpc_2.6.18-7+etch4_powerpc.deb stable/main/binary-powerpc/redhat-cluster-modules-2.6.18-6-prep_2.6.18+1.03.00-7+etch4_powerpc.deb stable/main/binary-powerpc/redhat-cluster-modules-2.6-powerpc64_2.6.18-7+etch4_powerpc.deb stable/main/binary-powerpc/redhat-cluster-modules-2.6.18-6-powerpc_2.6.18+1.03.00-7+etch4_powerpc.deb stable/main/binary-powerpc/gspca-modules-2.6.18-6-vserver-powerpc_2.6.18+01.00.04-7+etch4_powerpc.deb stable/main/binary-powerpc/mol-modules-2.6.18-6-powerpc_2.6.18+0.9.71.dfsg-7+etch4_powerpc.deb stable/main/binary-powerpc/squashfs-modules-2.6.18-6-powerpc-miboot_2.6.18+3.1r2-7+etch4_powerpc.deb stable/main/binary-powerpc/gspca-modules-2.6-prep_2.6.18-7+etch4_powerpc.deb stable/main/binary-powerpc/gspca-modules-2.6-powerpc-smp_2.6.18-7+etch4_powerpc.deb stable/main/binary-powerpc/squashfs-modules-2.6-vserver-powerpc_2.6.18-7+etch4_powerpc.deb stable/main/binary-powerpc/redhat-cluster-modules-2.6-prep_2.6.18-7+etch4_powerpc.deb stable/main/binary-powerpc/squashfs-modules-2.6.18-6-vserver-powerpc_2.6.18+3.1r2-7+etch4_powerpc.deb stable/main/binary-powerpc/mol-modules-2.6.18-6-powerpc-miboot_2.6.18+0.9.71.dfsg-7+etch4_powerpc.deb stable/main/binary-powerpc/mol-modules-2.6.18-6-powerpc-smp_2.6.18+0.9.71.dfsg-7+etch4_powerpc.deb stable/main/binary-powerpc/gspca-modules-2.6.18-6-vserver-powerpc64_2.6.18+01.00.04-7+etch4_powerpc.deb stable/main/binary-powerpc/gspca-modules-2.6-powerpc64_2.6.18-7+etch4_powerpc.deb stable/main/binary-powerpc/unionfs-modules-2.6-powerpc-smp_2.6.18-7+etch4_powerpc.deb stable/main/binary-powerpc/squashfs-modules-2.6-powerpc_2.6.18-7+etch4_powerpc.deb stable/main/binary-powerpc/gspca-modules-2.6.18-6-powerpc_2.6.18+01.00.04-7+etch4_powerpc.deb stable/main/binary-powerpc/mol-modules-2.6-powerpc_2.6.18-7+etch4_powerpc.deb stable/main/binary-powerpc/redhat-cluster-modules-2.6-vserver-powerpc_2.6.18-7+etch4_powerpc.deb stable/main/binary-powerpc/squashfs-modules-2.6-powerpc64_2.6.18-7+etch4_powerpc.deb stable/main/binary-powerpc/unionfs-modules-2.6-powerpc-miboot_2.6.18-7+etch4_powerpc.deb stable/main/binary-powerpc/redhat-cluster-modules-2.6.18-6-vserver-powerpc64_2.6.18+1.03.00-7+etch4_powerpc.deb linux-modules-extra-2.6 (2.6.18-7+etch4) stable-security; urgency=high * Building against 2.6.18-6. stable/main/binary-mipsel/unionfs-modules-2.6.18-6-sb1a-bcm91480b_2.6.18+1.4+debian-7+etch4_mipsel.deb stable/main/binary-mipsel/squashfs-modules-2.6-r3k-kn02_2.6.18-7+etch4_mipsel.deb stable/main/binary-mipsel/redhat-cluster-modules-2.6-sb1a-bcm91480b_2.6.18-7+etch4_mipsel.deb stable/main/binary-mipsel/squashfs-modules-2.6.18-6-r4k-kn04_2.6.18+3.1r2-7+etch4_mipsel.deb stable/main/binary-mipsel/squashfs-modules-2.6-r4k-kn04_2.6.18-7+etch4_mipsel.deb stable/main/binary-mipsel/squashfs-modules-2.6.18-6-qemu_2.6.18+3.1r2-7+etch4_mipsel.deb stable/main/binary-mipsel/squashfs-modules-2.6-sb1-bcm91250a_2.6.18-7+etch4_mipsel.deb stable/main/binary-mipsel/unionfs-modules-2.6-sb1-bcm91250a_2.6.18-7+etch4_mipsel.deb stable/main/binary-mipsel/redhat-cluster-modules-2.6.18-6-sb1a-bcm91480b_2.6.18+1.03.00-7+etch4_mipsel.deb stable/main/binary-mipsel/unionfs-modules-2.6-r5k-cobalt_2.6.18-7+etch4_mipsel.deb stable/main/binary-mipsel/unionfs-modules-2.6.18-6-r4k-kn04_2.6.18+1.4+debian-7+etch4_mipsel.deb stable/main/binary-mipsel/unionfs-modules-2.6-r3k-kn02_2.6.18-7+etch4_mipsel.deb stable/main/binary-mipsel/squashfs-modules-2.6.18-6-r3k-kn02_2.6.18+3.1r2-7+etch4_mipsel.deb stable/main/binary-mipsel/unionfs-modules-2.6.18-6-r5k-cobalt_2.6.18+1.4+debian-7+etch4_mipsel.deb stable/main/binary-mipsel/squashfs-modules-2.6-r5k-cobalt_2.6.18-7+etch4_mipsel.deb stable/main/binary-mipsel/squashfs-modules-2.6.18-6-sb1a-bcm91480b_2.6.18+3.1r2-7+etch4_mipsel.deb stable/main/binary-mipsel/redhat-cluster-modules-2.6.18-6-r5k-cobalt_2.6.18+1.03.00-7+etch4_mipsel.deb stable/main/binary-mipsel/unionfs-modules-2.6-qemu_2.6.18-7+etch4_mipsel.deb stable/main/binary-mipsel/unionfs-modules-2.6-sb1a-bcm91480b_2.6.18-7+etch4_mipsel.deb stable/main/binary-mipsel/squashfs-modules-2.6.18-6-r5k-cobalt_2.6.18+3.1r2-7+etch4_mipsel.deb stable/main/binary-mipsel/redhat-cluster-modules-2.6.18-6-r3k-kn02_2.6.18+1.03.00-7+etch4_mipsel.deb stable/main/binary-mipsel/unionfs-modules-2.6.18-6-r3k-kn02_2.6.18+1.4+debian-7+etch4_mipsel.deb stable/main/binary-mipsel/redhat-cluster-modules-2.6.18-6-r4k-kn04_2.6.18+1.03.00-7+etch4_mipsel.deb stable/main/binary-mipsel/unionfs-modules-2.6.18-6-qemu_2.6.18+1.4+debian-7+etch4_mipsel.deb stable/main/binary-mipsel/squashfs-modules-2.6.18-6-sb1-bcm91250a_2.6.18+3.1r2-7+etch4_mipsel.deb stable/main/binary-mipsel/redhat-cluster-modules-2.6-r5k-cobalt_2.6.18-7+etch4_mipsel.deb stable/main/binary-mipsel/squashfs-modules-2.6-qemu_2.6.18-7+etch4_mipsel.deb stable/main/binary-mipsel/redhat-cluster-modules-2.6.18-6-sb1-bcm91250a_2.6.18+1.03.00-7+etch4_mipsel.deb stable/main/binary-mipsel/redhat-cluster-modules-2.6.18-6-qemu_2.6.18+1.03.00-7+etch4_mipsel.deb stable/main/binary-mipsel/squashfs-modules-2.6-sb1a-bcm91480b_2.6.18-7+etch4_mipsel.deb stable/main/binary-mipsel/redhat-cluster-modules-2.6-qemu_2.6.18-7+etch4_mipsel.deb stable/main/binary-mipsel/unionfs-modules-2.6.18-6-sb1-bcm91250a_2.6.18+1.4+debian-7+etch4_mipsel.deb stable/main/binary-mipsel/redhat-cluster-modules-2.6-r4k-kn04_2.6.18-7+etch4_mipsel.deb stable/main/binary-mipsel/redhat-cluster-modules-2.6-r3k-kn02_2.6.18-7+etch4_mipsel.deb stable/main/binary-mipsel/unionfs-modules-2.6-r4k-kn04_2.6.18-7+etch4_mipsel.deb stable/main/binary-mipsel/redhat-cluster-modules-2.6-sb1-bcm91250a_2.6.18-7+etch4_mipsel.deb linux-modules-extra-2.6 (2.6.18-7+etch4) stable-security; urgency=high * Building against 2.6.18-6. stable/main/binary-mips/redhat-cluster-modules-2.6-r4k-ip22_2.6.18-7+etch4_mips.deb stable/main/binary-mips/redhat-cluster-modules-2.6.18-6-qemu_2.6.18+1.03.00-7+etch4_mips.deb stable/main/binary-mips/squashfs-modules-2.6-qemu_2.6.18-7+etch4_mips.deb stable/main/binary-mips/unionfs-modules-2.6-sb1a-bcm91480b_2.6.18-7+etch4_mips.deb stable/main/binary-mips/redhat-cluster-modules-2.6.18-6-r5k-ip32_2.6.18+1.03.00-7+etch4_mips.deb stable/main/binary-mips/unionfs-modules-2.6.18-6-qemu_2.6.18+1.4+debian-7+etch4_mips.deb stable/main/binary-mips/squashfs-modules-2.6-sb1a-bcm91480b_2.6.18-7+etch4_mips.deb stable/main/binary-mips/unionfs-modules-2.6.18-6-sb1-bcm91250a_2.6.18+1.4+debian-7+etch4_mips.deb stable/main/binary-mips/unionfs-modules-2.6-qemu_2.6.18-7+etch4_mips.deb stable/main/binary-mips/squashfs-modules-2.6.18-6-r4k-ip22_2.6.18+3.1r2-7+etch4_mips.deb stable/main/binary-mips/squashfs-modules-2.6.18-6-r5k-ip32_2.6.18+3.1r2-7+etch4_mips.deb stable/main/binary-mips/squashfs-modules-2.6-sb1-bcm91250a_2.6.18-7+etch4_mips.deb stable/main/binary-mips/redhat-cluster-modules-2.6-r5k-ip32_2.6.18-7+etch4_mips.deb stable/main/binary-mips/squashfs-modules-2.6.18-6-sb1a-bcm91480b_2.6.18+3.1r2-7+etch4_mips.deb stable/main/binary-mips/squashfs-modules-2.6.18-6-sb1-bcm91250a_2.6.18+3.1r2-7+etch4_mips.deb stable/main/binary-mips/squashfs-modules-2.6-r5k-ip32_2.6.18-7+etch4_mips.deb stable/main/binary-mips/unionfs-modules-2.6.18-6-r5k-ip32_2.6.18+1.4+debian-7+etch4_mips.deb stable/main/binary-mips/unionfs-modules-2.6-r4k-ip22_2.6.18-7+etch4_mips.deb stable/main/binary-mips/redhat-cluster-modules-2.6-sb1-bcm91250a_2.6.18-7+etch4_mips.deb stable/main/binary-mips/unionfs-modules-2.6.18-6-r4k-ip22_2.6.18+1.4+debian-7+etch4_mips.deb stable/main/binary-mips/squashfs-modules-2.6-r4k-ip22_2.6.18-7+etch4_mips.deb stable/main/binary-mips/unionfs-modules-2.6-r5k-ip32_2.6.18-7+etch4_mips.deb stable/main/binary-mips/redhat-cluster-modules-2.6.18-6-r4k-ip22_2.6.18+1.03.00-7+etch4_mips.deb stable/main/binary-mips/unionfs-modules-2.6.18-6-sb1a-bcm91480b_2.6.18+1.4+debian-7+etch4_mips.deb stable/main/binary-mips/squashfs-modules-2.6.18-6-qemu_2.6.18+3.1r2-7+etch4_mips.deb stable/main/binary-mips/redhat-cluster-modules-2.6-qemu_2.6.18-7+etch4_mips.deb stable/main/binary-mips/redhat-cluster-modules-2.6.18-6-sb1a-bcm91480b_2.6.18+1.03.00-7+etch4_mips.deb stable/main/binary-mips/redhat-cluster-modules-2.6-sb1a-bcm91480b_2.6.18-7+etch4_mips.deb stable/main/binary-mips/unionfs-modules-2.6-sb1-bcm91250a_2.6.18-7+etch4_mips.deb stable/main/binary-mips/redhat-cluster-modules-2.6.18-6-sb1-bcm91250a_2.6.18+1.03.00-7+etch4_mips.deb linux-modules-extra-2.6 (2.6.18-7+etch4) stable-security; urgency=high * Building against 2.6.18-6. stable/main/binary-ia64/squashfs-modules-2.6.18-6-mckinley_2.6.18+3.1r2-7+etch4_ia64.deb stable/main/binary-ia64/redhat-cluster-modules-2.6-mckinley_2.6.18-7+etch4_ia64.deb stable/main/binary-ia64/squashfs-modules-2.6-itanium_2.6.18-7+etch4_ia64.deb stable/main/binary-ia64/redhat-cluster-modules-2.6.18-6-itanium_2.6.18+1.03.00-7+etch4_ia64.deb stable/main/binary-ia64/redhat-cluster-modules-2.6-itanium_2.6.18-7+etch4_ia64.deb stable/main/binary-ia64/redhat-cluster-modules-2.6.18-6-mckinley_2.6.18+1.03.00-7+etch4_ia64.deb stable/main/binary-ia64/unionfs-modules-2.6.18-6-itanium_2.6.18+1.4+debian-7+etch4_ia64.deb stable/main/binary-ia64/unionfs-modules-2.6-itanium_2.6.18-7+etch4_ia64.deb stable/main/binary-ia64/unionfs-modules-2.6-mckinley_2.6.18-7+etch4_ia64.deb stable/main/binary-ia64/squashfs-modules-2.6-mckinley_2.6.18-7+etch4_ia64.deb stable/main/binary-ia64/squashfs-modules-2.6.18-6-itanium_2.6.18+3.1r2-7+etch4_ia64.deb stable/main/binary-ia64/unionfs-modules-2.6.18-6-mckinley_2.6.18+1.4+debian-7+etch4_ia64.deb linux-modules-extra-2.6 (2.6.18-7+etch4) stable-security; urgency=high * Building against 2.6.18-6. stable/main/binary-hppa/unionfs-modules-2.6-parisc_2.6.18-7+etch4_hppa.deb stable/main/binary-hppa/unionfs-modules-2.6.18-6-parisc_2.6.18+1.4+debian-7+etch4_hppa.deb stable/main/binary-hppa/redhat-cluster-modules-2.6.18-6-parisc-smp_2.6.18+1.03.00-7+etch4_hppa.deb stable/main/binary-hppa/redhat-cluster-modules-2.6-parisc_2.6.18-7+etch4_hppa.deb stable/main/binary-hppa/unionfs-modules-2.6.18-6-parisc64-smp_2.6.18+1.4+debian-7+etch4_hppa.deb stable/main/binary-hppa/unionfs-modules-2.6-parisc64-smp_2.6.18-7+etch4_hppa.deb stable/main/binary-hppa/unionfs-modules-2.6-parisc64_2.6.18-7+etch4_hppa.deb stable/main/binary-hppa/redhat-cluster-modules-2.6.18-6-parisc_2.6.18+1.03.00-7+etch4_hppa.deb stable/main/binary-hppa/redhat-cluster-modules-2.6-parisc-smp_2.6.18-7+etch4_hppa.deb stable/main/binary-hppa/redhat-cluster-modules-2.6-parisc64_2.6.18-7+etch4_hppa.deb stable/main/binary-hppa/redhat-cluster-modules-2.6.18-6-parisc64_2.6.18+1.03.00-7+etch4_hppa.deb stable/main/binary-hppa/redhat-cluster-modules-2.6-parisc64-smp_2.6.18-7+etch4_hppa.deb stable/main/binary-hppa/unionfs-modules-2.6.18-6-parisc-smp_2.6.18+1.4+debian-7+etch4_hppa.deb stable/main/binary-hppa/unionfs-modules-2.6-parisc-smp_2.6.18-7+etch4_hppa.deb stable/main/binary-hppa/unionfs-modules-2.6.18-6-parisc64_2.6.18+1.4+debian-7+etch4_hppa.deb stable/main/binary-hppa/redhat-cluster-modules-2.6.18-6-parisc64-smp_2.6.18+1.03.00-7+etch4_hppa.deb linux-modules-extra-2.6 (2.6.18-7+etch4) stable-security; urgency=high * Building against 2.6.18-6. stable/main/binary-arm/redhat-cluster-modules-2.6.18-6-iop32x_2.6.18+1.03.00-7+etch4_arm.deb stable/main/binary-arm/unionfs-modules-2.6.18-6-footbridge_2.6.18+1.4+debian-7+etch4_arm.deb stable/main/binary-arm/unionfs-modules-2.6-rpc_2.6.18-7+etch4_arm.deb stable/main/binary-arm/redhat-cluster-modules-2.6.18-6-footbridge_2.6.18+1.03.00-7+etch4_arm.deb stable/main/binary-arm/unionfs-modules-2.6-iop32x_2.6.18-7+etch4_arm.deb stable/main/binary-arm/unionfs-modules-2.6.18-6-rpc_2.6.18+1.4+debian-7+etch4_arm.deb stable/main/binary-arm/unionfs-modules-2.6.18-6-s3c2410_2.6.18+1.4+debian-7+etch4_arm.deb stable/main/binary-arm/unionfs-modules-2.6-ixp4xx_2.6.18-7+etch4_arm.deb stable/main/binary-arm/unionfs-modules-2.6-s3c2410_2.6.18-7+etch4_arm.deb stable/main/binary-arm/redhat-cluster-modules-2.6-ixp4xx_2.6.18-7+etch4_arm.deb stable/main/binary-arm/redhat-cluster-modules-2.6.18-6-s3c2410_2.6.18+1.03.00-7+etch4_arm.deb stable/main/binary-arm/redhat-cluster-modules-2.6.18-6-rpc_2.6.18+1.03.00-7+etch4_arm.deb stable/main/binary-arm/redhat-cluster-modules-2.6-s3c2410_2.6.18-7+etch4_arm.deb stable/main/binary-arm/unionfs-modules-2.6-footbridge_2.6.18-7+etch4_arm.deb stable/main/binary-arm/redhat-cluster-modules-2.6.18-6-ixp4xx_2.6.18+1.03.00-7+etch4_arm.deb stable/main/binary-arm/redhat-cluster-modules-2.6-rpc_2.6.18-7+etch4_arm.deb stable/main/binary-arm/redhat-cluster-modules-2.6-iop32x_2.6.18-7+etch4_arm.deb stable/main/binary-arm/redhat-cluster-modules-2.6-footbridge_2.6.18-7+etch4_arm.deb stable/main/binary-arm/unionfs-modules-2.6.18-6-iop32x_2.6.18+1.4+debian-7+etch4_arm.deb stable/main/binary-arm/unionfs-modules-2.6.18-6-ixp4xx_2.6.18+1.4+debian-7+etch4_arm.deb linux-modules-extra-2.6 (2.6.18-7+etch4) stable-security; urgency=high * Building against 2.6.18-6. stable/main/binary-amd64/squashfs-modules-2.6-vserver-amd64_2.6.18-7+etch4_amd64.deb stable/main/binary-amd64/gspca-modules-2.6-xen-vserver-amd64_2.6.18-7+etch4_amd64.deb stable/main/binary-amd64/redhat-cluster-modules-2.6.18-6-xen-amd64_2.6.18+1.03.00-7+etch4_amd64.deb stable/main/binary-amd64/gspca-modules-2.6-amd64_2.6.18-7+etch4_amd64.deb stable/main/binary-amd64/squashfs-modules-2.6-xen-amd64_2.6.18-7+etch4_amd64.deb stable/main/binary-amd64/unionfs-modules-2.6-amd64_2.6.18-7+etch4_amd64.deb stable/main/binary-amd64/redhat-cluster-modules-2.6.18-6-vserver-amd64_2.6.18+1.03.00-7+etch4_amd64.deb stable/main/binary-amd64/squashfs-modules-2.6-xen-vserver-amd64_2.6.18-7+etch4_amd64.deb stable/main/binary-amd64/unionfs-modules-2.6.18-6-amd64_2.6.18+1.4+debian-7+etch4_amd64.deb stable/main/binary-amd64/redhat-cluster-modules-2.6-xen-vserver-amd64_2.6.18-7+etch4_amd64.deb stable/main/binary-amd64/redhat-cluster-modules-2.6-amd64_2.6.18-7+etch4_amd64.deb stable/main/binary-amd64/gspca-modules-2.6.18-6-amd64_2.6.18+01.00.04-7+etch4_amd64.deb stable/main/binary-amd64/squashfs-modules-2.6.18-6-xen-amd64_2.6.18+3.1r2-7+etch4_amd64.deb stable/main/binary-amd64/squashfs-modules-2.6.18-6-amd64_2.6.18+3.1r2-7+etch4_amd64.deb stable/main/binary-amd64/gspca-modules-2.6.18-6-xen-amd64_2.6.18+01.00.04-7+etch4_amd64.deb stable/main/binary-amd64/redhat-cluster-modules-2.6-vserver-amd64_2.6.18-7+etch4_amd64.deb stable/main/binary-amd64/redhat-cluster-modules-2.6-xen-amd64_2.6.18-7+etch4_amd64.deb stable/main/binary-amd64/squashfs-modules-2.6.18-6-vserver-amd64_2.6.18+3.1r2-7+etch4_amd64.deb stable/main/binary-amd64/redhat-cluster-modules-2.6.18-6-xen-vserver-amd64_2.6.18+1.03.00-7+etch4_amd64.deb stable/main/binary-amd64/squashfs-modules-2.6-amd64_2.6.18-7+etch4_amd64.deb stable/main/binary-amd64/gspca-modules-2.6.18-6-vserver-amd64_2.6.18+01.00.04-7+etch4_amd64.deb stable/main/binary-amd64/gspca-modules-2.6.18-6-xen-vserver-amd64_2.6.18+01.00.04-7+etch4_amd64.deb stable/main/binary-amd64/squashfs-modules-2.6.18-6-xen-vserver-amd64_2.6.18+3.1r2-7+etch4_amd64.deb stable/main/binary-amd64/gspca-modules-2.6-xen-amd64_2.6.18-7+etch4_amd64.deb stable/main/binary-amd64/gspca-modules-2.6-vserver-amd64_2.6.18-7+etch4_amd64.deb stable/main/binary-amd64/redhat-cluster-modules-2.6.18-6-amd64_2.6.18+1.03.00-7+etch4_amd64.deb linux-modules-extra-2.6 (2.6.18-7+etch4) stable-security; urgency=high * Building against 2.6.18-6. stable/main/binary-alpha/redhat-cluster-modules-2.6-alpha-smp_2.6.18-7+etch4_alpha.deb stable/main/binary-alpha/squashfs-modules-2.6-alpha-smp_2.6.18-7+etch4_alpha.deb stable/main/binary-alpha/redhat-cluster-modules-2.6.18-6-alpha-smp_2.6.18+1.03.00-7+etch4_alpha.deb stable/main/binary-alpha/squashfs-modules-2.6.18-6-alpha-generic_2.6.18+3.1r2-7+etch4_alpha.deb stable/main/binary-alpha/unionfs-modules-2.6.18-6-alpha-smp_2.6.18+1.4+debian-7+etch4_alpha.deb stable/main/binary-alpha/squashfs-modules-2.6-alpha-legacy_2.6.18-7+etch4_alpha.deb stable/main/binary-alpha/redhat-cluster-modules-2.6.18-6-alpha-generic_2.6.18+1.03.00-7+etch4_alpha.deb stable/main/binary-alpha/squashfs-modules-2.6.18-6-alpha-smp_2.6.18+3.1r2-7+etch4_alpha.deb stable/main/binary-alpha/squashfs-modules-2.6.18-6-vserver-alpha_2.6.18+3.1r2-7+etch4_alpha.deb stable/main/binary-alpha/redhat-cluster-modules-2.6-vserver-alpha_2.6.18-7+etch4_alpha.deb stable/main/binary-alpha/squashfs-modules-2.6.18-6-alpha-legacy_2.6.18+3.1r2-7+etch4_alpha.deb stable/main/binary-alpha/unionfs-modules-2.6.18-6-alpha-generic_2.6.18+1.4+debian-7+etch4_alpha.deb stable/main/binary-alpha/squashfs-modules-2.6-alpha-generic_2.6.18-7+etch4_alpha.deb stable/main/binary-alpha/unionfs-modules-2.6-alpha-generic_2.6.18-7+etch4_alpha.deb stable/main/binary-alpha/unionfs-modules-2.6.18-6-alpha-legacy_2.6.18+1.4+debian-7+etch4_alpha.deb stable/main/binary-alpha/squashfs-modules-2.6-vserver-alpha_2.6.18-7+etch4_alpha.deb stable/main/binary-alpha/redhat-cluster-modules-2.6.18-6-vserver-alpha_2.6.18+1.03.00-7+etch4_alpha.deb stable/main/binary-alpha/unionfs-modules-2.6-alpha-smp_2.6.18-7+etch4_alpha.deb stable/main/binary-alpha/redhat-cluster-modules-2.6-alpha-legacy_2.6.18-7+etch4_alpha.deb stable/main/binary-alpha/redhat-cluster-modules-2.6-alpha-generic_2.6.18-7+etch4_alpha.deb stable/main/binary-alpha/unionfs-modules-2.6-alpha-legacy_2.6.18-7+etch4_alpha.deb stable/main/binary-alpha/redhat-cluster-modules-2.6.18-6-alpha-legacy_2.6.18+1.03.00-7+etch4_alpha.deb linux-modules-extra-2.6 (2.6.18-7+etch4) stable-security; urgency=high * Building against 2.6.18-6. stable/main/binary-i386/gspca-modules-2.6.18-6-k7_2.6.18+01.00.04-7+etch4_i386.deb stable/main/binary-i386/redhat-cluster-modules-2.6-686_2.6.18-7+etch4_i386.deb stable/main/binary-i386/squashfs-modules-2.6.18-6-686_2.6.18+3.1r2-7+etch4_i386.deb stable/main/binary-i386/gspca-modules-2.6.18-6-amd64_2.6.18+01.00.04-7+etch4_i386.deb stable/main/binary-i386/squashfs-modules-2.6-k7_2.6.18-7+etch4_i386.deb stable/main/binary-i386/redhat-cluster-modules-2.6-686-bigmem_2.6.18-7+etch4_i386.deb stable/main/binary-i386/squashfs-modules-2.6-xen-vserver-686_2.6.18-7+etch4_i386.deb stable/main/source/linux-modules-extra-2.6_2.6.18-7+etch4.tar.gz stable/main/binary-i386/squashfs-modules-2.6-686_2.6.18-7+etch4_i386.deb stable/main/binary-i386/gspca-modules-2.6-486_2.6.18-7+etch4_i386.deb stable/main/binary-i386/gspca-modules-2.6-vserver-k7_2.6.18-7+etch4_i386.deb stable/main/binary-i386/squashfs-modules-2.6.18-6-xen-vserver-686_2.6.18+3.1r2-7+etch4_i386.deb stable/main/binary-i386/redhat-cluster-modules-2.6-amd64_2.6.18-7+etch4_i386.deb stable/main/binary-i386/gspca-modules-2.6-xen-vserver-686_2.6.18-7+etch4_i386.deb stable/main/binary-i386/gspca-modules-2.6-k7_2.6.18-7+etch4_i386.deb stable/main/binary-i386/unionfs-modules-2.6-686_2.6.18-7+etch4_i386.deb stable/main/binary-i386/gspca-modules-2.6.18-6-686-bigmem_2.6.18+01.00.04-7+etch4_i386.deb stable/main/binary-i386/unionfs-modules-2.6-486_2.6.18-7+etch4_i386.deb stable/main/binary-i386/squashfs-modules-2.6.18-6-amd64_2.6.18+3.1r2-7+etch4_i386.deb stable/main/binary-i386/redhat-cluster-modules-2.6-vserver-k7_2.6.18-7+etch4_i386.deb stable/main/binary-i386/redhat-cluster-modules-2.6.18-6-486_2.6.18+1.03.00-7+etch4_i386.deb stable/main/binary-i386/squashfs-modules-2.6.18-6-686-bigmem_2.6.18+3.1r2-7+etch4_i386.deb stable/main/binary-i386/gspca-modules-2.6-686_2.6.18-7+etch4_i386.deb stable/main/binary-i386/unionfs-modules-2.6.18-6-686-bigmem_2.6.18+1.4+debian-7+etch4_i386.deb stable/main/binary-i386/gspca-modules-2.6-xen-686_2.6.18-7+etch4_i386.deb stable/main/binary-i386/squashfs-modules-2.6.18-6-k7_2.6.18+3.1r2-7+etch4_i386.deb stable/main/source/linux-modules-extra-2.6_2.6.18-7+etch4.dsc stable/main/binary-i386/redhat-cluster-modules-2.6.18-6-vserver-k7_2.6.18+1.03.00-7+etch4_i386.deb stable/main/binary-i386/unionfs-modules-2.6-amd64_2.6.18-7+etch4_i386.deb stable/main/binary-i386/gspca-modules-2.6.18-6-vserver-686_2.6.18+01.00.04-7+etch4_i386.deb stable/main/binary-i386/gspca-modules-2.6.18-6-xen-vserver-686_2.6.18+01.00.04-7+etch4_i386.deb stable/main/binary-i386/gspca-modules-2.6-amd64_2.6.18-7+etch4_i386.deb stable/main/binary-i386/redhat-cluster-modules-2.6.18-6-xen-686_2.6.18+1.03.00-7+etch4_i386.deb stable/main/binary-i386/squashfs-modules-2.6-686-bigmem_2.6.18-7+etch4_i386.deb stable/main/binary-i386/redhat-cluster-modules-2.6-486_2.6.18-7+etch4_i386.deb stable/main/binary-i386/gspca-modules-2.6-686-bigmem_2.6.18-7+etch4_i386.deb stable/main/binary-i386/squashfs-modules-2.6-xen-686_2.6.18-7+etch4_i386.deb stable/main/binary-i386/squashfs-modules-2.6.18-6-xen-686_2.6.18+3.1r2-7+etch4_i386.deb stable/main/binary-i386/redhat-cluster-modules-2.6.18-6-686-bigmem_2.6.18+1.03.00-7+etch4_i386.deb stable/main/binary-i386/squashfs-modules-2.6.18-6-vserver-686_2.6.18+3.1r2-7+etch4_i386.deb stable/main/binary-i386/squashfs-modules-2.6.18-6-486_2.6.18+3.1r2-7+etch4_i386.deb stable/main/binary-i386/unionfs-modules-2.6-686-bigmem_2.6.18-7+etch4_i386.deb stable/main/binary-i386/redhat-cluster-modules-2.6.18-6-vserver-686_2.6.18+1.03.00-7+etch4_i386.deb stable/main/binary-i386/gspca-modules-2.6.18-6-vserver-k7_2.6.18+01.00.04-7+etch4_i386.deb stable/main/binary-i386/unionfs-modules-2.6.18-6-486_2.6.18+1.4+debian-7+etch4_i386.deb stable/main/binary-i386/squashfs-modules-2.6.18-6-vserver-k7_2.6.18+3.1r2-7+etch4_i386.deb stable/main/binary-i386/squashfs-modules-2.6-amd64_2.6.18-7+etch4_i386.deb stable/main/binary-i386/gspca-modules-2.6-vserver-686_2.6.18-7+etch4_i386.deb stable/main/binary-i386/unionfs-modules-2.6.18-6-k7_2.6.18+1.4+debian-7+etch4_i386.deb stable/main/binary-i386/gspca-modules-2.6.18-6-686_2.6.18+01.00.04-7+etch4_i386.deb stable/main/binary-i386/gspca-modules-2.6.18-6-xen-686_2.6.18+01.00.04-7+etch4_i386.deb stable/main/binary-i386/redhat-cluster-modules-2.6.18-6-k7_2.6.18+1.03.00-7+etch4_i386.deb stable/main/binary-i386/squashfs-modules-2.6-vserver-k7_2.6.18-7+etch4_i386.deb stable/main/binary-i386/redhat-cluster-modules-2.6.18-6-686_2.6.18+1.03.00-7+etch4_i386.deb stable/main/binary-i386/squashfs-modules-2.6-486_2.6.18-7+etch4_i386.deb stable/main/binary-i386/redhat-cluster-modules-2.6-xen-vserver-686_2.6.18-7+etch4_i386.deb stable/main/binary-i386/redhat-cluster-modules-2.6.18-6-amd64_2.6.18+1.03.00-7+etch4_i386.deb stable/main/binary-i386/redhat-cluster-modules-2.6.18-6-xen-vserver-686_2.6.18+1.03.00-7+etch4_i386.deb stable/main/binary-i386/unionfs-modules-2.6-k7_2.6.18-7+etch4_i386.deb stable/main/binary-i386/unionfs-modules-2.6.18-6-amd64_2.6.18+1.4+debian-7+etch4_i386.deb stable/main/binary-i386/unionfs-modules-2.6.18-6-686_2.6.18+1.4+debian-7+etch4_i386.deb stable/main/binary-i386/redhat-cluster-modules-2.6-vserver-686_2.6.18-7+etch4_i386.deb stable/main/binary-i386/gspca-modules-2.6.18-6-486_2.6.18+01.00.04-7+etch4_i386.deb stable/main/binary-i386/squashfs-modules-2.6-vserver-686_2.6.18-7+etch4_i386.deb stable/main/binary-i386/redhat-cluster-modules-2.6-xen-686_2.6.18-7+etch4_i386.deb stable/main/binary-i386/redhat-cluster-modules-2.6-k7_2.6.18-7+etch4_i386.deb linux-modules-extra-2.6 (2.6.18-7+etch4) stable-security; urgency=high * Building against 2.6.18-6. stable/main/source/linux-modules-di-sparc-2.6_1.04etch2.tar.gz stable/main/source/linux-modules-di-sparc-2.6_1.04etch2.dsc stable/main/binary-sparc/loop-aes-modules-2.6.18-6-sparc64-di_1.04etch2_sparc.udeb stable/main/binary-sparc/loop-aes-modules-2.6.18-6-sparc32-di_1.04etch2_sparc.udeb linux-modules-di-sparc-2.6 (1.04etch2) stable; urgency=low * Update to kernel ABI 2.6.18-6. * Built against version 3.1d-13etch2 of loop-aes. stable/main/source/linux-modules-di-s390-2.6_1.01etch2.tar.gz stable/main/binary-s390/loop-aes-modules-2.6.18-6-s390-di_1.01etch2_s390.udeb stable/main/source/linux-modules-di-s390-2.6_1.01etch2.dsc linux-modules-di-s390-2.6 (1.01etch2) stable; urgency=low * Update to kernel ABI 2.6.18-6. * Built against version 3.1d-13etch2 of loop-aes. stable/main/source/linux-modules-di-powerpc-2.6_1.03etch2.tar.gz stable/main/source/linux-modules-di-powerpc-2.6_1.03etch2.dsc stable/main/binary-powerpc/loop-aes-modules-2.6.18-6-powerpc-miboot-di_1.03etch2_powerpc.udeb stable/main/binary-powerpc/loop-aes-modules-2.6.18-6-powerpc64-di_1.03etch2_powerpc.udeb stable/main/binary-powerpc/loop-aes-modules-2.6.18-6-powerpc-di_1.03etch2_powerpc.udeb stable/main/binary-powerpc/loop-aes-modules-2.6.18-6-prep-di_1.03etch2_powerpc.udeb linux-modules-di-powerpc-2.6 (1.03etch2) stable; urgency=low * Update to kernel ABI 2.6.18-6. * Built against version 3.1d-13etch2 of loop-aes. stable/main/binary-mipsel/loop-aes-modules-2.6.18-6-r3k-kn02-di_1.03etch2_mipsel.udeb stable/main/binary-mipsel/loop-aes-modules-2.6.18-6-r4k-kn04-di_1.03etch2_mipsel.udeb stable/main/binary-mipsel/loop-aes-modules-2.6.18-6-sb1a-bcm91480b-di_1.03etch2_mipsel.udeb stable/main/binary-mipsel/loop-aes-modules-2.6.18-6-r5k-cobalt-di_1.03etch2_mipsel.udeb stable/main/binary-mipsel/loop-aes-modules-2.6.18-6-qemu-di_1.03etch2_mipsel.udeb stable/main/source/linux-modules-di-mipsel-2.6_1.03etch2.tar.gz stable/main/source/linux-modules-di-mipsel-2.6_1.03etch2.dsc stable/main/binary-mipsel/loop-aes-modules-2.6.18-6-sb1-bcm91250a-di_1.03etch2_mipsel.udeb linux-modules-di-mipsel-2.6 (1.03etch2) stable; urgency=low * Update to kernel ABI 2.6.18-6. * Built against version 3.1d-13etch2 of loop-aes. stable/main/binary-mips/loop-aes-modules-2.6.18-6-r4k-ip22-di_1.01etch2_mips.udeb stable/main/binary-mips/loop-aes-modules-2.6.18-6-qemu-di_1.01etch2_mips.udeb stable/main/binary-mips/loop-aes-modules-2.6.18-6-r5k-ip32-di_1.01etch2_mips.udeb stable/main/source/linux-modules-di-mips-2.6_1.01etch2.dsc stable/main/source/linux-modules-di-mips-2.6_1.01etch2.tar.gz stable/main/binary-mips/loop-aes-modules-2.6.18-6-sb1a-bcm91480b-di_1.01etch2_mips.udeb stable/main/binary-mips/loop-aes-modules-2.6.18-6-sb1-bcm91250a-di_1.01etch2_mips.udeb linux-modules-di-mips-2.6 (1.01etch2) stable; urgency=low * Update to kernel ABI 2.6.18-6. * Built against version 3.1d-13etch2 of loop-aes. stable/main/source/linux-modules-di-ia64-2.6_1.02etch2.dsc stable/main/binary-ia64/loop-aes-modules-2.6.18-6-itanium-di_1.02etch2_ia64.udeb stable/main/source/linux-modules-di-ia64-2.6_1.02etch2.tar.gz linux-modules-di-ia64-2.6 (1.02etch2) stable; urgency=low * Update to kernel ABI 2.6.18-6. * Built against version 3.1d-13etch2 of loop-aes. stable/main/source/linux-modules-di-i386-2.6_1.03etch2.dsc stable/main/binary-i386/loop-aes-modules-2.6.18-6-486-di_1.03etch2_i386.udeb stable/main/source/linux-modules-di-i386-2.6_1.03etch2.tar.gz linux-modules-di-i386-2.6 (1.03etch2) stable; urgency=low * Update to kernel ABI 2.6.18-6. * Built against version 3.1d-13etch2 of loop-aes. stable/main/binary-hppa/loop-aes-modules-2.6.18-6-parisc64-di_1.03etch2_hppa.udeb stable/main/source/linux-modules-di-hppa-2.6_1.03etch2.tar.gz stable/main/binary-hppa/loop-aes-modules-2.6.18-6-parisc-di_1.03etch2_hppa.udeb stable/main/source/linux-modules-di-hppa-2.6_1.03etch2.dsc linux-modules-di-hppa-2.6 (1.03etch2) stable; urgency=low * Update to kernel ABI 2.6.18-6. * Built against version 3.1d-13etch2 of loop-aes. stable/main/binary-arm/loop-aes-modules-2.6.18-6-footbridge-di_1.04etch2_arm.udeb stable/main/binary-arm/loop-aes-modules-2.6.18-6-iop32x-di_1.04etch2_arm.udeb stable/main/source/linux-modules-di-arm-2.6_1.04etch2.tar.gz stable/main/binary-arm/loop-aes-modules-2.6.18-6-ixp4xx-di_1.04etch2_arm.udeb stable/main/binary-arm/loop-aes-modules-2.6.18-6-rpc-di_1.04etch2_arm.udeb stable/main/source/linux-modules-di-arm-2.6_1.04etch2.dsc linux-modules-di-arm-2.6 (1.04etch2) stable; urgency=low * Update to kernel ABI 2.6.18-6. * Built against version 3.1d-13etch2 of loop-aes. stable/main/source/linux-modules-di-amd64-2.6_1.03etch2.tar.gz stable/main/source/linux-modules-di-amd64-2.6_1.03etch2.dsc stable/main/binary-amd64/loop-aes-modules-2.6.18-6-amd64-di_1.03etch2_amd64.udeb linux-modules-di-amd64-2.6 (1.03etch2) stable; urgency=low * Update to kernel ABI 2.6.18-6. * Built against version 3.1d-13etch2 of loop-aes. stable/main/binary-alpha/loop-aes-modules-2.6.18-6-alpha-generic-di_1.03etch2_alpha.udeb stable/main/source/linux-modules-di-alpha-2.6_1.03etch2.tar.gz stable/main/source/linux-modules-di-alpha-2.6_1.03etch2.dsc linux-modules-di-alpha-2.6 (1.03etch2) stable; urgency=low * Update to kernel ABI 2.6.18-6. * Built against version 3.1d-13etch2 of loop-aes. stable/contrib/binary-sparc/ivtv-modules-2.6-sparc64-smp_2.6.18-4+etch3_sparc.deb stable/contrib/binary-sparc/ivtv-modules-2.6-sparc64_2.6.18-4+etch3_sparc.deb stable/contrib/binary-sparc/ivtv-modules-2.6-sparc32_2.6.18-4+etch3_sparc.deb stable/contrib/binary-sparc/ivtv-modules-2.6-vserver-sparc64_2.6.18-4+etch3_sparc.deb stable/contrib/binary-sparc/ivtv-modules-2.6.18-6-vserver-sparc64_2.6.18+0.8.2-4+etch3_sparc.deb stable/contrib/binary-sparc/ivtv-modules-2.6.18-6-sparc32_2.6.18+0.8.2-4+etch3_sparc.deb stable/contrib/binary-sparc/ivtv-modules-2.6.18-6-sparc64-smp_2.6.18+0.8.2-4+etch3_sparc.deb stable/contrib/binary-sparc/ivtv-modules-2.6.18-6-sparc64_2.6.18+0.8.2-4+etch3_sparc.deb linux-modules-contrib-2.6 (2.6.18-4+etch3) stable-security; urgency=high * Building against 2.6.18-6. stable/contrib/binary-powerpc/ivtv-modules-2.6-powerpc_2.6.18-4+etch3_powerpc.deb stable/contrib/binary-powerpc/ivtv-modules-2.6.18-6-powerpc_2.6.18+0.8.2-4+etch3_powerpc.deb stable/contrib/binary-powerpc/ivtv-modules-2.6.18-6-vserver-powerpc_2.6.18+0.8.2-4+etch3_powerpc.deb stable/contrib/binary-powerpc/ivtv-modules-2.6-powerpc-smp_2.6.18-4+etch3_powerpc.deb stable/contrib/binary-powerpc/ivtv-modules-2.6.18-6-powerpc-miboot_2.6.18+0.8.2-4+etch3_powerpc.deb stable/contrib/binary-powerpc/ivtv-modules-2.6-vserver-powerpc_2.6.18-4+etch3_powerpc.deb stable/contrib/binary-powerpc/ivtv-modules-2.6.18-6-prep_2.6.18+0.8.2-4+etch3_powerpc.deb stable/contrib/binary-powerpc/ivtv-modules-2.6-powerpc64_2.6.18-4+etch3_powerpc.deb stable/contrib/binary-powerpc/ivtv-modules-2.6.18-6-vserver-powerpc64_2.6.18+0.8.2-4+etch3_powerpc.deb stable/contrib/binary-powerpc/ivtv-modules-2.6-vserver-powerpc64_2.6.18-4+etch3_powerpc.deb stable/contrib/binary-powerpc/ivtv-modules-2.6.18-6-powerpc64_2.6.18+0.8.2-4+etch3_powerpc.deb stable/contrib/binary-powerpc/ivtv-modules-2.6-prep_2.6.18-4+etch3_powerpc.deb stable/contrib/binary-powerpc/ivtv-modules-2.6-powerpc-miboot_2.6.18-4+etch3_powerpc.deb stable/contrib/binary-powerpc/ivtv-modules-2.6.18-6-powerpc-smp_2.6.18+0.8.2-4+etch3_powerpc.deb linux-modules-contrib-2.6 (2.6.18-4+etch3) stable-security; urgency=high * Building against 2.6.18-6. stable/contrib/binary-ia64/ivtv-modules-2.6.18-6-itanium_2.6.18+0.8.2-4+etch3_ia64.deb stable/contrib/binary-ia64/ivtv-modules-2.6-itanium_2.6.18-4+etch3_ia64.deb stable/contrib/binary-ia64/ivtv-modules-2.6.18-6-mckinley_2.6.18+0.8.2-4+etch3_ia64.deb stable/contrib/binary-ia64/ivtv-modules-2.6-mckinley_2.6.18-4+etch3_ia64.deb linux-modules-contrib-2.6 (2.6.18-4+etch3) stable-security; urgency=high * Building against 2.6.18-6. stable/contrib/binary-hppa/ivtv-modules-2.6-parisc_2.6.18-4+etch3_hppa.deb stable/contrib/binary-hppa/ivtv-modules-2.6.18-6-parisc64_2.6.18+0.8.2-4+etch3_hppa.deb stable/contrib/binary-hppa/ivtv-modules-2.6.18-6-parisc_2.6.18+0.8.2-4+etch3_hppa.deb stable/contrib/binary-hppa/ivtv-modules-2.6.18-6-parisc64-smp_2.6.18+0.8.2-4+etch3_hppa.deb stable/contrib/binary-hppa/ivtv-modules-2.6-parisc64_2.6.18-4+etch3_hppa.deb stable/contrib/binary-hppa/ivtv-modules-2.6-parisc-smp_2.6.18-4+etch3_hppa.deb stable/contrib/binary-hppa/ivtv-modules-2.6-parisc64-smp_2.6.18-4+etch3_hppa.deb stable/contrib/binary-hppa/ivtv-modules-2.6.18-6-parisc-smp_2.6.18+0.8.2-4+etch3_hppa.deb linux-modules-contrib-2.6 (2.6.18-4+etch3) stable-security; urgency=high * Building against 2.6.18-6. stable/contrib/binary-amd64/ipw2200-modules-2.6-xen-amd64_2.6.18-4+etch3_amd64.deb stable/contrib/binary-amd64/ipw2100-modules-2.6.18-6-xen-amd64_2.6.18+1.2.1-4+etch3_amd64.deb stable/contrib/binary-amd64/ivtv-modules-2.6.18-6-xen-vserver-amd64_2.6.18+0.8.2-4+etch3_amd64.deb stable/contrib/binary-amd64/ipw3945-modules-2.6-xen-amd64_2.6.18-4+etch3_amd64.deb stable/contrib/binary-amd64/ipw2200-modules-2.6.18-6-xen-vserver-amd64_2.6.18+1.2.0-4+etch3_amd64.deb stable/contrib/binary-amd64/ipw2200-modules-2.6-xen-vserver-amd64_2.6.18-4+etch3_amd64.deb stable/contrib/binary-amd64/ipw2100-modules-2.6-xen-vserver-amd64_2.6.18-4+etch3_amd64.deb stable/contrib/binary-amd64/ipw2100-modules-2.6.18-6-amd64_2.6.18+1.2.1-4+etch3_amd64.deb stable/contrib/binary-amd64/ipw2100-modules-2.6-xen-amd64_2.6.18-4+etch3_amd64.deb stable/contrib/binary-amd64/ipw3945-modules-2.6.18-6-xen-vserver-amd64_2.6.18+1.1.2-4+etch3_amd64.deb stable/contrib/binary-amd64/ipw3945-modules-2.6.18-6-amd64_2.6.18+1.1.2-4+etch3_amd64.deb stable/contrib/binary-amd64/ipw2100-modules-2.6-vserver-amd64_2.6.18-4+etch3_amd64.deb stable/contrib/binary-amd64/ipw2200-modules-2.6.18-6-vserver-amd64_2.6.18+1.2.0-4+etch3_amd64.deb stable/contrib/binary-amd64/ipw3945-modules-2.6.18-6-vserver-amd64_2.6.18+1.1.2-4+etch3_amd64.deb stable/contrib/binary-amd64/ipw2200-modules-2.6.18-6-xen-amd64_2.6.18+1.2.0-4+etch3_amd64.deb stable/contrib/binary-amd64/ipw2200-modules-2.6-vserver-amd64_2.6.18-4+etch3_amd64.deb stable/contrib/binary-amd64/ivtv-modules-2.6.18-6-xen-amd64_2.6.18+0.8.2-4+etch3_amd64.deb stable/contrib/binary-amd64/ivtv-modules-2.6.18-6-vserver-amd64_2.6.18+0.8.2-4+etch3_amd64.deb stable/contrib/binary-amd64/ivtv-modules-2.6-xen-amd64_2.6.18-4+etch3_amd64.deb stable/contrib/binary-amd64/ipw3945-modules-2.6.18-6-xen-amd64_2.6.18+1.1.2-4+etch3_amd64.deb stable/contrib/binary-amd64/ivtv-modules-2.6-amd64_2.6.18-4+etch3_amd64.deb stable/contrib/binary-amd64/ipw3945-modules-2.6-xen-vserver-amd64_2.6.18-4+etch3_amd64.deb stable/contrib/binary-amd64/ivtv-modules-2.6-vserver-amd64_2.6.18-4+etch3_amd64.deb stable/contrib/binary-amd64/ipw2100-modules-2.6.18-6-vserver-amd64_2.6.18+1.2.1-4+etch3_amd64.deb stable/contrib/binary-amd64/ipw2200-modules-2.6-amd64_2.6.18-4+etch3_amd64.deb stable/contrib/binary-amd64/ipw3945-modules-2.6-amd64_2.6.18-4+etch3_amd64.deb stable/contrib/binary-amd64/ivtv-modules-2.6-xen-vserver-amd64_2.6.18-4+etch3_amd64.deb stable/contrib/binary-amd64/ipw3945-modules-2.6-vserver-amd64_2.6.18-4+etch3_amd64.deb stable/contrib/binary-amd64/ipw2100-modules-2.6-amd64_2.6.18-4+etch3_amd64.deb stable/contrib/binary-amd64/ipw2200-modules-2.6.18-6-amd64_2.6.18+1.2.0-4+etch3_amd64.deb stable/contrib/binary-amd64/ivtv-modules-2.6.18-6-amd64_2.6.18+0.8.2-4+etch3_amd64.deb stable/contrib/binary-amd64/ipw2100-modules-2.6.18-6-xen-vserver-amd64_2.6.18+1.2.1-4+etch3_amd64.deb linux-modules-contrib-2.6 (2.6.18-4+etch3) stable-security; urgency=high * Building against 2.6.18-6. stable/contrib/binary-alpha/ivtv-modules-2.6.18-6-alpha-legacy_2.6.18+0.8.2-4+etch3_alpha.deb stable/contrib/binary-alpha/ivtv-modules-2.6.18-6-vserver-alpha_2.6.18+0.8.2-4+etch3_alpha.deb stable/contrib/binary-alpha/ivtv-modules-2.6-alpha-legacy_2.6.18-4+etch3_alpha.deb stable/contrib/binary-alpha/ivtv-modules-2.6-alpha-generic_2.6.18-4+etch3_alpha.deb stable/contrib/binary-alpha/ivtv-modules-2.6-vserver-alpha_2.6.18-4+etch3_alpha.deb stable/contrib/binary-alpha/ivtv-modules-2.6.18-6-alpha-smp_2.6.18+0.8.2-4+etch3_alpha.deb stable/contrib/binary-alpha/ivtv-modules-2.6.18-6-alpha-generic_2.6.18+0.8.2-4+etch3_alpha.deb stable/contrib/binary-alpha/ivtv-modules-2.6-alpha-smp_2.6.18-4+etch3_alpha.deb linux-modules-contrib-2.6 (2.6.18-4+etch3) stable-security; urgency=high * Building against 2.6.18-6. stable/contrib/binary-i386/ipw3945-modules-2.6-xen-vserver-686_2.6.18-4+etch3_i386.deb stable/contrib/binary-i386/ipw2200-modules-2.6.18-6-xen-vserver-686_2.6.18+1.2.0-4+etch3_i386.deb stable/contrib/binary-i386/ipw2200-modules-2.6-686-bigmem_2.6.18-4+etch3_i386.deb stable/contrib/source/linux-modules-contrib-2.6_2.6.18-4+etch3.tar.gz stable/contrib/binary-i386/ipw3945-modules-2.6-vserver-k7_2.6.18-4+etch3_i386.deb stable/contrib/binary-i386/ipw2200-modules-2.6-k7_2.6.18-4+etch3_i386.deb stable/contrib/binary-i386/ipw3945-modules-2.6-k7_2.6.18-4+etch3_i386.deb stable/contrib/binary-i386/ipw2200-modules-2.6-xen-vserver-686_2.6.18-4+etch3_i386.deb stable/contrib/binary-i386/ipw2200-modules-2.6.18-6-amd64_2.6.18+1.2.0-4+etch3_i386.deb stable/contrib/binary-i386/ivtv-modules-2.6-486_2.6.18-4+etch3_i386.deb stable/contrib/binary-i386/ivtv-modules-2.6.18-6-686-bigmem_2.6.18+0.8.2-4+etch3_i386.deb stable/contrib/binary-i386/ipw3945-modules-2.6-686_2.6.18-4+etch3_i386.deb stable/contrib/binary-i386/ivtv-modules-2.6-vserver-k7_2.6.18-4+etch3_i386.deb stable/contrib/binary-i386/ipw2100-modules-2.6.18-6-xen-vserver-686_2.6.18+1.2.1-4+etch3_i386.deb stable/contrib/binary-i386/ipw2200-modules-2.6.18-6-k7_2.6.18+1.2.0-4+etch3_i386.deb stable/contrib/binary-i386/ipw2200-modules-2.6-amd64_2.6.18-4+etch3_i386.deb stable/contrib/binary-i386/ipw3945-modules-2.6.18-6-amd64_2.6.18+1.1.2-4+etch3_i386.deb stable/contrib/binary-i386/ipw3945-modules-2.6-amd64_2.6.18-4+etch3_i386.deb stable/contrib/binary-i386/ipw2200-modules-2.6.18-6-vserver-k7_2.6.18+1.2.0-4+etch3_i386.deb stable/contrib/binary-i386/ipw2100-modules-2.6-amd64_2.6.18-4+etch3_i386.deb stable/contrib/binary-i386/ipw2200-modules-2.6.18-6-vserver-686_2.6.18+1.2.0-4+etch3_i386.deb stable/contrib/binary-i386/ipw2200-modules-2.6.18-6-486_2.6.18+1.2.0-4+etch3_i386.deb stable/contrib/binary-i386/ivtv-modules-2.6.18-6-686_2.6.18+0.8.2-4+etch3_i386.deb stable/contrib/binary-i386/ipw2100-modules-2.6.18-6-xen-686_2.6.18+1.2.1-4+etch3_i386.deb stable/contrib/binary-i386/ipw2100-modules-2.6.18-6-vserver-686_2.6.18+1.2.1-4+etch3_i386.deb stable/contrib/binary-i386/ipw3945-modules-2.6.18-6-686_2.6.18+1.1.2-4+etch3_i386.deb stable/contrib/binary-i386/ipw2100-modules-2.6.18-6-k7_2.6.18+1.2.1-4+etch3_i386.deb stable/contrib/binary-i386/ivtv-modules-2.6-686-bigmem_2.6.18-4+etch3_i386.deb stable/contrib/binary-i386/ipw2200-modules-2.6-686_2.6.18-4+etch3_i386.deb stable/contrib/binary-i386/ipw3945-modules-2.6-486_2.6.18-4+etch3_i386.deb stable/contrib/binary-i386/ipw2100-modules-2.6-686-bigmem_2.6.18-4+etch3_i386.deb stable/contrib/binary-i386/ivtv-modules-2.6.18-6-vserver-686_2.6.18+0.8.2-4+etch3_i386.deb stable/contrib/binary-i386/ipw2100-modules-2.6-k7_2.6.18-4+etch3_i386.deb stable/contrib/binary-i386/ivtv-modules-2.6-xen-686_2.6.18-4+etch3_i386.deb stable/contrib/binary-i386/ipw2100-modules-2.6.18-6-amd64_2.6.18+1.2.1-4+etch3_i386.deb stable/contrib/binary-i386/ipw2100-modules-2.6-vserver-k7_2.6.18-4+etch3_i386.deb stable/contrib/binary-i386/ipw3945-modules-2.6.18-6-vserver-k7_2.6.18+1.1.2-4+etch3_i386.deb stable/contrib/binary-i386/ipw3945-modules-2.6.18-6-k7_2.6.18+1.1.2-4+etch3_i386.deb stable/contrib/binary-i386/ipw2100-modules-2.6.18-6-vserver-k7_2.6.18+1.2.1-4+etch3_i386.deb stable/contrib/binary-i386/ipw2100-modules-2.6-xen-vserver-686_2.6.18-4+etch3_i386.deb stable/contrib/binary-i386/ipw2200-modules-2.6-vserver-686_2.6.18-4+etch3_i386.deb stable/contrib/binary-i386/ivtv-modules-2.6.18-6-amd64_2.6.18+0.8.2-4+etch3_i386.deb stable/contrib/binary-i386/ipw2200-modules-2.6-vserver-k7_2.6.18-4+etch3_i386.deb stable/contrib/binary-i386/ipw3945-modules-2.6.18-6-686-bigmem_2.6.18+1.1.2-4+etch3_i386.deb stable/contrib/binary-i386/ipw2200-modules-2.6.18-6-686-bigmem_2.6.18+1.2.0-4+etch3_i386.deb stable/contrib/binary-i386/ipw3945-modules-2.6-xen-686_2.6.18-4+etch3_i386.deb stable/contrib/binary-i386/ivtv-modules-2.6-k7_2.6.18-4+etch3_i386.deb stable/contrib/binary-i386/ipw3945-modules-2.6.18-6-xen-vserver-686_2.6.18+1.1.2-4+etch3_i386.deb stable/contrib/binary-i386/ipw3945-modules-2.6-vserver-686_2.6.18-4+etch3_i386.deb stable/contrib/binary-i386/ipw3945-modules-2.6.18-6-xen-686_2.6.18+1.1.2-4+etch3_i386.deb stable/contrib/binary-i386/ipw2100-modules-2.6.18-6-686_2.6.18+1.2.1-4+etch3_i386.deb stable/contrib/binary-i386/ivtv-modules-2.6.18-6-xen-686_2.6.18+0.8.2-4+etch3_i386.deb stable/contrib/binary-i386/ivtv-modules-2.6-vserver-686_2.6.18-4+etch3_i386.deb stable/contrib/binary-i386/ipw2200-modules-2.6-486_2.6.18-4+etch3_i386.deb stable/contrib/binary-i386/ipw2100-modules-2.6.18-6-486_2.6.18+1.2.1-4+etch3_i386.deb stable/contrib/binary-i386/ipw2200-modules-2.6.18-6-686_2.6.18+1.2.0-4+etch3_i386.deb stable/contrib/binary-i386/ipw2100-modules-2.6-xen-686_2.6.18-4+etch3_i386.deb stable/contrib/binary-i386/ipw2200-modules-2.6.18-6-xen-686_2.6.18+1.2.0-4+etch3_i386.deb stable/contrib/binary-i386/ivtv-modules-2.6-686_2.6.18-4+etch3_i386.deb stable/contrib/binary-i386/ivtv-modules-2.6-xen-vserver-686_2.6.18-4+etch3_i386.deb stable/contrib/binary-i386/ipw2100-modules-2.6-686_2.6.18-4+etch3_i386.deb stable/contrib/binary-i386/ivtv-modules-2.6-amd64_2.6.18-4+etch3_i386.deb stable/contrib/binary-i386/ipw2100-modules-2.6.18-6-686-bigmem_2.6.18+1.2.1-4+etch3_i386.deb stable/contrib/binary-i386/ipw2100-modules-2.6-vserver-686_2.6.18-4+etch3_i386.deb stable/contrib/binary-i386/ivtv-modules-2.6.18-6-vserver-k7_2.6.18+0.8.2-4+etch3_i386.deb stable/contrib/binary-i386/ipw3945-modules-2.6-686-bigmem_2.6.18-4+etch3_i386.deb stable/contrib/binary-i386/ipw2100-modules-2.6-486_2.6.18-4+etch3_i386.deb stable/contrib/binary-i386/ivtv-modules-2.6.18-6-486_2.6.18+0.8.2-4+etch3_i386.deb stable/contrib/binary-i386/ivtv-modules-2.6.18-6-xen-vserver-686_2.6.18+0.8.2-4+etch3_i386.deb stable/contrib/binary-i386/ipw2200-modules-2.6-xen-686_2.6.18-4+etch3_i386.deb stable/contrib/binary-i386/ipw3945-modules-2.6.18-6-486_2.6.18+1.1.2-4+etch3_i386.deb stable/contrib/binary-i386/ivtv-modules-2.6.18-6-k7_2.6.18+0.8.2-4+etch3_i386.deb stable/contrib/source/linux-modules-contrib-2.6_2.6.18-4+etch3.dsc stable/contrib/binary-i386/ipw3945-modules-2.6.18-6-vserver-686_2.6.18+1.1.2-4+etch3_i386.deb linux-modules-contrib-2.6 (2.6.18-4+etch3) stable-security; urgency=high * Building against 2.6.18-6. stable/main/binary-amd64/kernel-image-2.6-amd64-generic_2.6.18+6etch3_amd64.deb stable/main/binary-powerpc/kernel-image-2.6-powerpc-smp_2.6.18+6etch3_powerpc.deb stable/main/binary-sparc/linux-image-2.6-sparc64_2.6.18+6etch3_sparc.deb stable/main/binary-alpha/kernel-image-2.6-generic_2.6.18+6etch3_alpha.deb stable/main/binary-alpha/linux-headers-2.6-vserver-alpha_2.6.18+6etch3_alpha.deb stable/main/binary-powerpc/kernel-image-2.6-power4-smp_2.6.18+6etch3_powerpc.deb stable/main/binary-powerpc/linux-image-2.6-powerpc64_2.6.18+6etch3_powerpc.deb stable/main/binary-arm/linux-image-footbridge_2.6.18+6etch3_arm.deb stable/main/binary-mipsel/linux-headers-2.6-r5k-cobalt_2.6.18+6etch3_mipsel.deb stable/main/binary-mips/linux-headers-2.6-r4k-ip22_2.6.18+6etch3_mips.deb stable/main/binary-i386/linux-image-2.6-686-smp_2.6.18+6etch3_i386.deb stable/main/binary-hppa/linux-image-2.6-parisc64-smp_2.6.18+6etch3_hppa.deb stable/main/binary-sparc/linux-headers-2.6-vserver-sparc64_2.6.18+6etch3_sparc.deb stable/main/binary-powerpc/kernel-image-2.6-power4_2.6.18+6etch3_powerpc.deb stable/main/binary-i386/linux-image-686-bigmem_2.6.18+6etch3_i386.deb stable/main/binary-powerpc/linux-headers-2.6-prep_2.6.18+6etch3_powerpc.deb stable/main/binary-mipsel/linux-headers-2.6-r4k-kn04_2.6.18+6etch3_mipsel.deb stable/main/binary-s390/kernel-image-2.6-s390x_2.6.18+6etch3_s390.deb stable/main/binary-mipsel/linux-image-qemu_2.6.18+6etch3_mipsel.deb stable/main/binary-mips/linux-headers-2.6-sb1-bcm91250a_2.6.18+6etch3_mips.deb stable/main/binary-s390/linux-headers-2.6-s390x_2.6.18+6etch3_s390.deb stable/main/binary-amd64/linux-image-amd64_2.6.18+6etch3_amd64.deb stable/main/binary-arm/linux-image-2.6-ixp4xx_2.6.18+6etch3_arm.deb stable/main/binary-arm/linux-image-2.6-rpc_2.6.18+6etch3_arm.deb stable/main/binary-ia64/linux-image-2.6-mckinley-smp_2.6.18+6etch3_ia64.deb stable/main/binary-i386/linux-image-2.6-486_2.6.18+6etch3_i386.deb stable/main/binary-s390/kernel-image-2.6-s390_2.6.18+6etch3_s390.deb stable/main/binary-powerpc/kernel-image-power4_2.6.18+6etch3_powerpc.deb stable/main/binary-i386/kernel-image-2.6-686-smp_2.6.18+6etch3_i386.deb stable/main/binary-amd64/kernel-image-2.6-amd64-k8_2.6.18+6etch3_amd64.deb stable/main/binary-alpha/linux-image-alpha-smp_2.6.18+6etch3_alpha.deb stable/main/binary-i386/kernel-image-2.6-386_2.6.18+6etch3_i386.deb stable/main/binary-powerpc/linux-image-2.6-vserver-powerpc_2.6.18+6etch3_powerpc.deb stable/main/binary-powerpc/kernel-image-powerpc_2.6.18+6etch3_powerpc.deb stable/main/binary-ia64/kernel-image-2.6-mckinley_2.6.18+6etch3_ia64.deb stable/main/binary-alpha/linux-image-vserver-alpha_2.6.18+6etch3_alpha.deb stable/main/binary-ia64/linux-image-2.6-itanium-smp_2.6.18+6etch3_ia64.deb stable/main/binary-mips/linux-image-sb1a-bcm91480b_2.6.18+6etch3_mips.deb stable/main/binary-i386/kernel-image-2.6-k7-smp_2.6.18+6etch3_i386.deb stable/main/binary-i386/linux-image-2.6-vserver-686_2.6.18+6etch3_i386.deb stable/main/binary-arm/linux-headers-2.6-footbridge_2.6.18+6etch3_arm.deb stable/main/binary-sparc/linux-image-2.6-sparc32_2.6.18+6etch3_sparc.deb stable/main/binary-powerpc/kernel-image-2.6-power3-smp_2.6.18+6etch3_powerpc.deb stable/main/binary-alpha/kernel-image-2.6-smp_2.6.18+6etch3_alpha.deb stable/main/binary-powerpc/linux-headers-2.6-powerpc64_2.6.18+6etch3_powerpc.deb stable/main/binary-sparc/kernel-image-2.6-sparc64_2.6.18+6etch3_sparc.deb stable/main/binary-powerpc/linux-image-powerpc_2.6.18+6etch3_powerpc.deb stable/main/binary-mipsel/linux-image-2.6-qemu_2.6.18+6etch3_mipsel.deb stable/main/binary-i386/linux-headers-2.6-vserver-k7_2.6.18+6etch3_i386.deb stable/main/binary-powerpc/kernel-image-powerpc-smp_2.6.18+6etch3_powerpc.deb stable/main/binary-amd64/linux-image-2.6-vserver-amd64-k8-smp_2.6.18+6etch3_amd64.deb stable/main/binary-arm/linux-image-2.6-s3c2410_2.6.18+6etch3_arm.deb stable/main/binary-mipsel/linux-headers-2.6-sb1-bcm91250a_2.6.18+6etch3_mipsel.deb stable/main/binary-hppa/linux-image-parisc64-smp_2.6.18+6etch3_hppa.deb stable/main/binary-mips/linux-image-2.6-r4k-ip22_2.6.18+6etch3_mips.deb stable/main/binary-hppa/linux-headers-2.6-parisc64-smp_2.6.18+6etch3_hppa.deb stable/main/binary-s390/linux-image-vserver-s390x_2.6.18+6etch3_s390.deb stable/main/binary-amd64/linux-headers-2.6-amd64_2.6.18+6etch3_amd64.deb stable/main/binary-s390/linux-image-s390_2.6.18+6etch3_s390.deb stable/main/binary-powerpc/linux-headers-2.6-powerpc-smp_2.6.18+6etch3_powerpc.deb stable/main/binary-mipsel/linux-image-2.6-r3k-kn02_2.6.18+6etch3_mipsel.deb stable/main/binary-i386/linux-image-2.6-k7_2.6.18+6etch3_i386.deb stable/main/binary-i386/linux-headers-2.6-686-bigmem_2.6.18+6etch3_i386.deb stable/main/binary-sparc/linux-image-sparc32_2.6.18+6etch3_sparc.deb stable/main/binary-powerpc/kernel-image-power4-smp_2.6.18+6etch3_powerpc.deb stable/main/binary-i386/linux-headers-2.6-xen-686_2.6.18+6etch3_i386.deb stable/main/binary-mips/linux-headers-2.6-r5k-ip32_2.6.18+6etch3_mips.deb stable/main/binary-mipsel/linux-image-2.6-r5k-cobalt_2.6.18+6etch3_mipsel.deb stable/main/binary-i386/linux-headers-2.6-686_2.6.18+6etch3_i386.deb stable/main/binary-sparc/kernel-image-2.6-sparc64-smp_2.6.18+6etch3_sparc.deb stable/main/binary-mips/linux-image-r5k-ip32_2.6.18+6etch3_mips.deb stable/main/binary-i386/linux-headers-2.6-amd64_2.6.18+6etch3_i386.deb stable/main/binary-sparc/linux-headers-2.6-sparc32_2.6.18+6etch3_sparc.deb stable/main/binary-alpha/linux-image-alpha-legacy_2.6.18+6etch3_alpha.deb stable/main/binary-sparc/linux-image-vserver-sparc64_2.6.18+6etch3_sparc.deb stable/main/binary-s390/linux-headers-2.6-s390_2.6.18+6etch3_s390.deb stable/main/binary-alpha/linux-image-2.6-alpha-generic_2.6.18+6etch3_alpha.deb stable/main/binary-ia64/linux-image-2.6-itanium_2.6.18+6etch3_ia64.deb stable/main/binary-hppa/linux-headers-2.6-parisc-smp_2.6.18+6etch3_hppa.deb stable/main/binary-arm/linux-image-s3c2410_2.6.18+6etch3_arm.deb stable/main/binary-i386/linux-image-486_2.6.18+6etch3_i386.deb stable/main/binary-amd64/kernel-image-2.6-amd64-k8-smp_2.6.18+6etch3_amd64.deb stable/main/binary-i386/linux-image-2.6-k7-smp_2.6.18+6etch3_i386.deb stable/main/binary-ia64/linux-headers-2.6-mckinley_2.6.18+6etch3_ia64.deb stable/main/binary-mipsel/linux-image-2.6-sb1-bcm91250a_2.6.18+6etch3_mipsel.deb stable/main/binary-alpha/linux-image-2.6-alpha-smp_2.6.18+6etch3_alpha.deb stable/main/binary-amd64/linux-headers-2.6-xen-vserver-amd64_2.6.18+6etch3_amd64.deb stable/main/binary-hppa/linux-image-2.6-parisc64_2.6.18+6etch3_hppa.deb stable/main/binary-amd64/linux-image-2.6-amd64-k8_2.6.18+6etch3_amd64.deb stable/main/source/linux-latest-2.6_6etch3.tar.gz stable/main/binary-ia64/linux-headers-2.6-itanium_2.6.18+6etch3_ia64.deb stable/main/binary-mipsel/linux-headers-2.6-qemu_2.6.18+6etch3_mipsel.deb stable/main/binary-i386/linux-image-2.6-xen-686_2.6.18+6etch3_i386.deb stable/main/binary-powerpc/linux-headers-2.6-vserver-powerpc64_2.6.18+6etch3_powerpc.deb stable/main/binary-i386/kernel-image-2.6-amd64-generic_2.6.18+6etch3_i386.deb stable/main/binary-arm/linux-headers-2.6-s3c2410_2.6.18+6etch3_arm.deb stable/main/binary-hppa/linux-image-2.6-parisc_2.6.18+6etch3_hppa.deb stable/main/binary-alpha/linux-headers-2.6-alpha-smp_2.6.18+6etch3_alpha.deb stable/main/binary-mipsel/linux-image-r3k-kn02_2.6.18+6etch3_mipsel.deb stable/main/binary-i386/linux-headers-2.6-xen-vserver-686_2.6.18+6etch3_i386.deb stable/main/binary-mipsel/linux-headers-2.6-sb1a-bcm91480b_2.6.18+6etch3_mipsel.deb stable/main/binary-amd64/linux-image-vserver-amd64_2.6.18+6etch3_amd64.deb stable/main/binary-s390/linux-image-2.6-vserver-s390x_2.6.18+6etch3_s390.deb stable/main/binary-arm/linux-image-2.6-footbridge_2.6.18+6etch3_arm.deb stable/main/binary-arm/linux-image-2.6-iop32x_2.6.18+6etch3_arm.deb stable/main/binary-powerpc/kernel-image-power3-smp_2.6.18+6etch3_powerpc.deb stable/main/binary-mips/linux-headers-2.6-qemu_2.6.18+6etch3_mips.deb stable/main/binary-powerpc/linux-headers-2.6-powerpc-miboot_2.6.18+6etch3_powerpc.deb stable/main/binary-powerpc/linux-image-powerpc64_2.6.18+6etch3_powerpc.deb stable/main/binary-ia64/kernel-image-2.6-mckinley-smp_2.6.18+6etch3_ia64.deb stable/main/binary-i386/linux-image-vserver-k7_2.6.18+6etch3_i386.deb stable/main/binary-i386/linux-image-vserver-686_2.6.18+6etch3_i386.deb stable/main/binary-arm/linux-image-rpc_2.6.18+6etch3_arm.deb stable/main/binary-sparc/linux-image-sparc64_2.6.18+6etch3_sparc.deb stable/main/binary-powerpc/linux-headers-2.6-powerpc_2.6.18+6etch3_powerpc.deb stable/main/binary-amd64/linux-image-2.6-xen-vserver-amd64_2.6.18+6etch3_amd64.deb stable/main/binary-i386/kernel-image-2.6-k7_2.6.18+6etch3_i386.deb stable/main/binary-i386/linux-image-k7_2.6.18+6etch3_i386.deb stable/main/binary-i386/linux-image-xen-vserver-686_2.6.18+6etch3_i386.deb stable/main/binary-sparc/linux-image-2.6-vserver-sparc64_2.6.18+6etch3_sparc.deb stable/main/binary-mips/linux-headers-2.6-sb1a-bcm91480b_2.6.18+6etch3_mips.deb stable/main/binary-mipsel/linux-image-sb1a-bcm91480b_2.6.18+6etch3_mipsel.deb stable/main/binary-sparc/linux-headers-2.6-sparc64-smp_2.6.18+6etch3_sparc.deb stable/main/binary-i386/linux-image-2.6-686_2.6.18+6etch3_i386.deb stable/main/binary-i386/kernel-image-2.6-686_2.6.18+6etch3_i386.deb stable/main/binary-s390/linux-headers-2.6-vserver-s390x_2.6.18+6etch3_s390.deb stable/main/binary-arm/linux-headers-2.6-ixp4xx_2.6.18+6etch3_arm.deb stable/main/binary-i386/kernel-image-2.6-em64t-p4-smp_2.6.18+6etch3_i386.deb stable/main/binary-hppa/linux-image-parisc-smp_2.6.18+6etch3_hppa.deb stable/main/binary-hppa/linux-image-2.6-parisc-smp_2.6.18+6etch3_hppa.deb stable/main/binary-ia64/linux-image-2.6-mckinley_2.6.18+6etch3_ia64.deb stable/main/binary-mips/linux-image-2.6-qemu_2.6.18+6etch3_mips.deb stable/main/binary-i386/linux-image-2.6-686-bigmem_2.6.18+6etch3_i386.deb stable/main/binary-amd64/kernel-image-2.6-em64t-p4-smp_2.6.18+6etch3_amd64.deb stable/main/binary-powerpc/kernel-image-2.6-powerpc_2.6.18+6etch3_powerpc.deb stable/main/binary-amd64/linux-headers-2.6-xen-amd64_2.6.18+6etch3_amd64.deb stable/main/binary-amd64/linux-headers-2.6-vserver-amd64_2.6.18+6etch3_amd64.deb stable/main/binary-amd64/kernel-image-2.6-em64t-p4_2.6.18+6etch3_amd64.deb stable/main/binary-sparc/linux-headers-2.6-sparc64_2.6.18+6etch3_sparc.deb stable/main/binary-alpha/linux-image-alpha-generic_2.6.18+6etch3_alpha.deb stable/main/binary-ia64/kernel-image-2.6-itanium_2.6.18+6etch3_ia64.deb stable/main/binary-powerpc/linux-image-2.6-vserver-powerpc64_2.6.18+6etch3_powerpc.deb stable/main/binary-powerpc/kernel-image-2.6-power3_2.6.18+6etch3_powerpc.deb stable/main/binary-mipsel/linux-image-2.6-sb1a-bcm91480b_2.6.18+6etch3_mipsel.deb stable/main/binary-alpha/linux-headers-2.6-alpha-legacy_2.6.18+6etch3_alpha.deb stable/main/binary-i386/linux-headers-2.6-k7_2.6.18+6etch3_i386.deb stable/main/binary-arm/linux-headers-2.6-rpc_2.6.18+6etch3_arm.deb stable/main/binary-powerpc/linux-image-vserver-powerpc_2.6.18+6etch3_powerpc.deb stable/main/binary-powerpc/linux-image-2.6-powerpc_2.6.18+6etch3_powerpc.deb stable/main/binary-ia64/linux-image-mckinley_2.6.18+6etch3_ia64.deb stable/main/binary-powerpc/linux-image-powerpc-miboot_2.6.18+6etch3_powerpc.deb stable/main/binary-amd64/linux-image-2.6-vserver-amd64_2.6.18+6etch3_amd64.deb stable/main/binary-alpha/linux-headers-2.6-alpha-generic_2.6.18+6etch3_alpha.deb stable/main/binary-powerpc/linux-image-2.6-prep_2.6.18+6etch3_powerpc.deb stable/main/binary-s390/linux-image-s390x_2.6.18+6etch3_s390.deb stable/main/binary-powerpc/linux-image-2.6-powerpc-miboot_2.6.18+6etch3_powerpc.deb stable/main/binary-i386/linux-headers-2.6-vserver-686_2.6.18+6etch3_i386.deb stable/main/binary-mipsel/linux-headers-2.6-r3k-kn02_2.6.18+6etch3_mipsel.deb stable/main/binary-powerpc/linux-image-2.6-powerpc-smp_2.6.18+6etch3_powerpc.deb stable/main/binary-amd64/linux-image-2.6-amd64-k8-smp_2.6.18+6etch3_amd64.deb stable/main/binary-ia64/linux-image-itanium_2.6.18+6etch3_ia64.deb stable/main/binary-amd64/linux-image-2.6-em64t-p4_2.6.18+6etch3_amd64.deb stable/main/binary-amd64/linux-image-2.6-amd64-generic_2.6.18+6etch3_amd64.deb stable/main/binary-amd64/linux-image-2.6-em64t-p4-smp_2.6.18+6etch3_amd64.deb stable/main/binary-i386/linux-image-686_2.6.18+6etch3_i386.deb stable/main/binary-i386/linux-image-2.6-xen-vserver-686_2.6.18+6etch3_i386.deb stable/main/binary-i386/linux-image-xen-686_2.6.18+6etch3_i386.deb stable/main/binary-amd64/linux-image-xen-vserver-amd64_2.6.18+6etch3_amd64.deb stable/main/binary-alpha/linux-image-2.6-vserver-alpha_2.6.18+6etch3_alpha.deb stable/main/binary-mipsel/linux-image-2.6-r4k-kn04_2.6.18+6etch3_mipsel.deb stable/main/binary-mipsel/linux-image-r5k-cobalt_2.6.18+6etch3_mipsel.deb stable/main/binary-mips/linux-image-sb1-bcm91250a_2.6.18+6etch3_mips.deb stable/main/binary-i386/kernel-image-2.6-em64t-p4_2.6.18+6etch3_i386.deb stable/main/binary-mips/linux-image-2.6-r5k-ip32_2.6.18+6etch3_mips.deb stable/main/binary-mips/linux-image-r4k-ip22_2.6.18+6etch3_mips.deb stable/main/binary-mipsel/linux-image-r4k-kn04_2.6.18+6etch3_mipsel.deb stable/main/source/linux-latest-2.6_6etch3.dsc stable/main/binary-hppa/linux-image-parisc64_2.6.18+6etch3_hppa.deb stable/main/binary-powerpc/linux-image-powerpc-smp_2.6.18+6etch3_powerpc.deb stable/main/binary-powerpc/linux-image-vserver-powerpc64_2.6.18+6etch3_powerpc.deb stable/main/binary-sparc/linux-image-sparc64-smp_2.6.18+6etch3_sparc.deb stable/main/binary-arm/linux-headers-2.6-iop32x_2.6.18+6etch3_arm.deb stable/main/binary-hppa/linux-image-parisc_2.6.18+6etch3_hppa.deb stable/main/binary-i386/linux-image-amd64_2.6.18+6etch3_i386.deb stable/main/binary-i386/kernel-image-2.6-amd64-k8-smp_2.6.18+6etch3_i386.deb stable/main/binary-s390/linux-image-2.6-s390-tape_2.6.18+6etch3_s390.deb stable/main/binary-amd64/linux-image-2.6-vserver-em64t-p4-smp_2.6.18+6etch3_amd64.deb stable/main/binary-hppa/linux-headers-2.6-parisc64_2.6.18+6etch3_hppa.deb stable/main/binary-sparc/linux-image-2.6-sparc64-smp_2.6.18+6etch3_sparc.deb stable/main/binary-amd64/linux-image-2.6-xen-amd64_2.6.18+6etch3_amd64.deb stable/main/binary-i386/linux-image-2.6-vserver-k7_2.6.18+6etch3_i386.deb stable/main/binary-mips/linux-image-2.6-sb1-bcm91250a_2.6.18+6etch3_mips.deb stable/main/binary-i386/linux-headers-2.6-486_2.6.18+6etch3_i386.deb stable/main/binary-s390/linux-image-2.6-s390x_2.6.18+6etch3_s390.deb stable/main/binary-arm/linux-image-ixp4xx_2.6.18+6etch3_arm.deb stable/main/binary-powerpc/linux-headers-2.6-vserver-powerpc_2.6.18+6etch3_powerpc.deb stable/main/binary-powerpc/kernel-image-power3_2.6.18+6etch3_powerpc.deb stable/main/binary-i386/linux-image-2.6-amd64_2.6.18+6etch3_i386.deb stable/main/binary-mips/linux-image-qemu_2.6.18+6etch3_mips.deb stable/main/binary-mipsel/linux-image-sb1-bcm91250a_2.6.18+6etch3_mipsel.deb stable/main/binary-s390/linux-image-s390-tape_2.6.18+6etch3_s390.deb stable/main/binary-i386/kernel-image-2.6-amd64-k8_2.6.18+6etch3_i386.deb stable/main/binary-s390/linux-image-2.6-s390_2.6.18+6etch3_s390.deb stable/main/binary-alpha/linux-image-2.6-alpha-legacy_2.6.18+6etch3_alpha.deb stable/main/binary-amd64/linux-image-2.6-amd64_2.6.18+6etch3_amd64.deb stable/main/binary-amd64/linux-image-xen-amd64_2.6.18+6etch3_amd64.deb stable/main/binary-ia64/kernel-image-2.6-itanium-smp_2.6.18+6etch3_ia64.deb stable/main/binary-powerpc/linux-image-prep_2.6.18+6etch3_powerpc.deb stable/main/binary-hppa/linux-headers-2.6-parisc_2.6.18+6etch3_hppa.deb stable/main/binary-mips/linux-image-2.6-sb1a-bcm91480b_2.6.18+6etch3_mips.deb stable/main/binary-arm/linux-image-iop32x_2.6.18+6etch3_arm.deb linux-latest-2.6 (6etch3) stable-security; urgency=high * Update to 2.6.18-6. stable/main/binary-sparc/jfs-modules-2.6.18-6-sparc64-di_1.20etch3_sparc.udeb stable/main/binary-sparc/ext3-modules-2.6.18-6-sparc32-di_1.20etch3_sparc.udeb stable/main/binary-sparc/xfs-modules-2.6.18-6-sparc32-di_1.20etch3_sparc.udeb stable/main/binary-sparc/cdrom-core-modules-2.6.18-6-sparc32-di_1.20etch3_sparc.udeb stable/main/binary-sparc/crypto-modules-2.6.18-6-sparc64-di_1.20etch3_sparc.udeb stable/main/binary-sparc/kernel-image-2.6.18-6-sparc32-di_1.20etch3_sparc.udeb stable/main/binary-sparc/ppp-modules-2.6.18-6-sparc64-di_1.20etch3_sparc.udeb stable/main/binary-sparc/reiserfs-modules-2.6.18-6-sparc32-di_1.20etch3_sparc.udeb stable/main/source/linux-kernel-di-sparc-2.6_1.20etch3.tar.gz stable/main/binary-sparc/scsi-core-modules-2.6.18-6-sparc64-di_1.20etch3_sparc.udeb stable/main/binary-sparc/scsi-common-modules-2.6.18-6-sparc32-di_1.20etch3_sparc.udeb stable/main/binary-sparc/usb-modules-2.6.18-6-sparc64-di_1.20etch3_sparc.udeb stable/main/binary-sparc/xfs-modules-2.6.18-6-sparc64-di_1.20etch3_sparc.udeb stable/main/binary-sparc/cdrom-core-modules-2.6.18-6-sparc64-di_1.20etch3_sparc.udeb stable/main/binary-sparc/md-modules-2.6.18-6-sparc32-di_1.20etch3_sparc.udeb stable/main/binary-sparc/crypto-modules-2.6.18-6-sparc32-di_1.20etch3_sparc.udeb stable/main/binary-sparc/scsi-extra-modules-2.6.18-6-sparc64-di_1.20etch3_sparc.udeb stable/main/binary-sparc/ipv6-modules-2.6.18-6-sparc64-di_1.20etch3_sparc.udeb stable/main/binary-sparc/nic-modules-2.6.18-6-sparc32-di_1.20etch3_sparc.udeb stable/main/binary-sparc/nic-modules-2.6.18-6-sparc64-di_1.20etch3_sparc.udeb stable/main/binary-sparc/md-modules-2.6.18-6-sparc64-di_1.20etch3_sparc.udeb stable/main/binary-sparc/ext3-modules-2.6.18-6-sparc64-di_1.20etch3_sparc.udeb stable/main/binary-sparc/ipv6-modules-2.6.18-6-sparc32-di_1.20etch3_sparc.udeb stable/main/binary-sparc/ppp-modules-2.6.18-6-sparc32-di_1.20etch3_sparc.udeb stable/main/binary-sparc/sata-modules-2.6.18-6-sparc64-di_1.20etch3_sparc.udeb stable/main/binary-sparc/plip-modules-2.6.18-6-sparc64-di_1.20etch3_sparc.udeb stable/main/binary-sparc/ide-modules-2.6.18-6-sparc64-di_1.20etch3_sparc.udeb stable/main/binary-sparc/scsi-common-modules-2.6.18-6-sparc64-di_1.20etch3_sparc.udeb stable/main/binary-sparc/reiserfs-modules-2.6.18-6-sparc64-di_1.20etch3_sparc.udeb stable/main/binary-sparc/scsi-core-modules-2.6.18-6-sparc32-di_1.20etch3_sparc.udeb stable/main/binary-sparc/plip-modules-2.6.18-6-sparc32-di_1.20etch3_sparc.udeb stable/main/binary-sparc/fat-modules-2.6.18-6-sparc64-di_1.20etch3_sparc.udeb stable/main/binary-sparc/kernel-image-2.6.18-6-sparc64-di_1.20etch3_sparc.udeb stable/main/source/linux-kernel-di-sparc-2.6_1.20etch3.dsc stable/main/binary-sparc/fat-modules-2.6.18-6-sparc32-di_1.20etch3_sparc.udeb linux-kernel-di-sparc-2.6 (1.20etch3) stable; urgency=low * Update to kernel ABI 2.6.18-6. * Built against version 2.6.18.dfsg.1-18 of linux-2.6. stable/main/binary-s390/scsi-core-modules-2.6.18-6-s390-di_0.13etch3_s390.udeb stable/main/binary-s390/fat-modules-2.6.18-6-s390-di_0.13etch3_s390.udeb stable/main/source/linux-kernel-di-s390-2.6_0.13etch3.dsc stable/main/binary-s390/dasd-modules-2.6.18-6-s390-di_0.13etch3_s390.udeb stable/main/binary-s390/kernel-image-2.6.18-6-s390-tape-di_0.13etch3_s390.udeb stable/main/binary-s390/nic-modules-2.6.18-6-s390-di_0.13etch3_s390.udeb stable/main/binary-s390/scsi-modules-2.6.18-6-s390-di_0.13etch3_s390.udeb stable/main/binary-s390/md-modules-2.6.18-6-s390-di_0.13etch3_s390.udeb stable/main/source/linux-kernel-di-s390-2.6_0.13etch3.tar.gz stable/main/binary-s390/crypto-modules-2.6.18-6-s390-di_0.13etch3_s390.udeb stable/main/binary-s390/xfs-modules-2.6.18-6-s390-di_0.13etch3_s390.udeb stable/main/binary-s390/kernel-image-2.6.18-6-s390-di_0.13etch3_s390.udeb linux-kernel-di-s390-2.6 (0.13etch3) stable; urgency=low * Update to kernel ABI 2.6.18-6. * Built against version 2.6.18.dfsg.1-18 of linux-2.6. stable/main/binary-powerpc/fs-common-modules-2.6.18-6-powerpc-miboot-di_1.29etch3_powerpc.udeb stable/main/binary-powerpc/fat-modules-2.6.18-6-powerpc-di_1.29etch3_powerpc.udeb stable/main/binary-powerpc/scsi-extra-modules-2.6.18-6-powerpc-di_1.29etch3_powerpc.udeb stable/main/binary-powerpc/firewire-core-modules-2.6.18-6-powerpc64-di_1.29etch3_powerpc.udeb stable/main/binary-powerpc/ufs-modules-2.6.18-6-prep-di_1.29etch3_powerpc.udeb stable/main/binary-powerpc/ufs-modules-2.6.18-6-powerpc64-di_1.29etch3_powerpc.udeb stable/main/binary-powerpc/input-modules-2.6.18-6-powerpc64-di_1.29etch3_powerpc.udeb stable/main/binary-powerpc/usb-serial-modules-2.6.18-6-powerpc-miboot-di_1.29etch3_powerpc.udeb stable/main/binary-powerpc/sata-modules-2.6.18-6-powerpc-miboot-di_1.29etch3_powerpc.udeb stable/main/binary-powerpc/pcmcia-modules-2.6.18-6-powerpc-miboot-di_1.29etch3_powerpc.udeb stable/main/binary-powerpc/affs-modules-2.6.18-6-powerpc-di_1.29etch3_powerpc.udeb stable/main/binary-powerpc/nic-extra-modules-2.6.18-6-powerpc64-di_1.29etch3_powerpc.udeb stable/main/binary-powerpc/ext3-modules-2.6.18-6-powerpc-di_1.29etch3_powerpc.udeb stable/main/binary-powerpc/serial-modules-2.6.18-6-powerpc64-di_1.29etch3_powerpc.udeb stable/main/binary-powerpc/usb-modules-2.6.18-6-powerpc-di_1.29etch3_powerpc.udeb stable/main/binary-powerpc/irda-modules-2.6.18-6-powerpc64-di_1.29etch3_powerpc.udeb stable/main/binary-powerpc/usb-storage-modules-2.6.18-6-powerpc-miboot-di_1.29etch3_powerpc.udeb stable/main/binary-powerpc/pcmcia-modules-2.6.18-6-powerpc64-di_1.29etch3_powerpc.udeb stable/main/binary-powerpc/irda-modules-2.6.18-6-prep-di_1.29etch3_powerpc.udeb stable/main/binary-powerpc/serial-modules-2.6.18-6-prep-di_1.29etch3_powerpc.udeb stable/main/binary-powerpc/nic-shared-modules-2.6.18-6-powerpc-di_1.29etch3_powerpc.udeb stable/main/binary-powerpc/nic-modules-2.6.18-6-powerpc-miboot-di_1.29etch3_powerpc.udeb stable/main/binary-powerpc/input-modules-2.6.18-6-powerpc-di_1.29etch3_powerpc.udeb stable/main/binary-powerpc/nic-extra-modules-2.6.18-6-prep-di_1.29etch3_powerpc.udeb stable/main/binary-powerpc/md-modules-2.6.18-6-powerpc64-di_1.29etch3_powerpc.udeb stable/main/binary-powerpc/ppp-modules-2.6.18-6-powerpc-miboot-di_1.29etch3_powerpc.udeb stable/main/binary-powerpc/pcmcia-storage-modules-2.6.18-6-prep-di_1.29etch3_powerpc.udeb stable/main/binary-powerpc/usb-serial-modules-2.6.18-6-powerpc-di_1.29etch3_powerpc.udeb stable/main/binary-powerpc/kernel-image-2.6.18-6-powerpc-di_1.29etch3_powerpc.udeb stable/main/binary-powerpc/affs-modules-2.6.18-6-prep-di_1.29etch3_powerpc.udeb stable/main/binary-powerpc/nic-pcmcia-modules-2.6.18-6-powerpc-miboot-di_1.29etch3_powerpc.udeb stable/main/binary-powerpc/firmware-modules-2.6.18-6-prep-di_1.29etch3_powerpc.udeb stable/main/binary-powerpc/hfs-modules-2.6.18-6-powerpc-di_1.29etch3_powerpc.udeb stable/main/binary-powerpc/ipv6-modules-2.6.18-6-powerpc-di_1.29etch3_powerpc.udeb stable/main/binary-powerpc/firewire-core-modules-2.6.18-6-powerpc-miboot-di_1.29etch3_powerpc.udeb stable/main/binary-powerpc/sata-modules-2.6.18-6-prep-di_1.29etch3_powerpc.udeb stable/main/binary-powerpc/reiserfs-modules-2.6.18-6-powerpc64-di_1.29etch3_powerpc.udeb stable/main/binary-powerpc/xfs-modules-2.6.18-6-powerpc-miboot-di_1.29etch3_powerpc.udeb stable/main/binary-powerpc/floppy-modules-2.6.18-6-powerpc-miboot-di_1.29etch3_powerpc.udeb stable/main/binary-powerpc/ide-modules-2.6.18-6-powerpc64-di_1.29etch3_powerpc.udeb stable/main/binary-powerpc/cdrom-core-modules-2.6.18-6-powerpc-di_1.29etch3_powerpc.udeb stable/main/binary-powerpc/firmware-modules-2.6.18-6-powerpc-miboot-di_1.29etch3_powerpc.udeb stable/main/binary-powerpc/scsi-core-modules-2.6.18-6-powerpc64-di_1.29etch3_powerpc.udeb stable/main/binary-powerpc/ext2-modules-2.6.18-6-powerpc-di_1.29etch3_powerpc.udeb stable/main/binary-powerpc/ppp-modules-2.6.18-6-powerpc64-di_1.29etch3_powerpc.udeb stable/main/binary-powerpc/ipv6-modules-2.6.18-6-prep-di_1.29etch3_powerpc.udeb stable/main/binary-powerpc/usb-modules-2.6.18-6-powerpc-miboot-di_1.29etch3_powerpc.udeb stable/main/binary-powerpc/firmware-modules-2.6.18-6-powerpc64-di_1.29etch3_powerpc.udeb stable/main/binary-powerpc/nic-extra-modules-2.6.18-6-powerpc-di_1.29etch3_powerpc.udeb stable/main/binary-powerpc/scsi-core-modules-2.6.18-6-powerpc-di_1.29etch3_powerpc.udeb stable/main/binary-powerpc/crypto-modules-2.6.18-6-powerpc-di_1.29etch3_powerpc.udeb stable/main/binary-powerpc/firewire-core-modules-2.6.18-6-powerpc-di_1.29etch3_powerpc.udeb stable/main/source/linux-kernel-di-powerpc-2.6_1.29etch3.tar.gz stable/main/binary-powerpc/jfs-modules-2.6.18-6-powerpc64-di_1.29etch3_powerpc.udeb stable/main/binary-powerpc/nic-pcmcia-modules-2.6.18-6-powerpc-di_1.29etch3_powerpc.udeb stable/main/binary-powerpc/cdrom-core-modules-2.6.18-6-powerpc-miboot-di_1.29etch3_powerpc.udeb stable/main/binary-powerpc/xfs-modules-2.6.18-6-powerpc-di_1.29etch3_powerpc.udeb stable/main/binary-powerpc/nic-shared-modules-2.6.18-6-powerpc64-di_1.29etch3_powerpc.udeb stable/main/binary-powerpc/ext3-modules-2.6.18-6-powerpc64-di_1.29etch3_powerpc.udeb stable/main/binary-powerpc/nic-modules-2.6.18-6-powerpc64-di_1.29etch3_powerpc.udeb stable/main/binary-powerpc/fat-modules-2.6.18-6-powerpc-miboot-di_1.29etch3_powerpc.udeb stable/main/binary-powerpc/nic-modules-2.6.18-6-prep-di_1.29etch3_powerpc.udeb stable/main/binary-powerpc/usb-modules-2.6.18-6-prep-di_1.29etch3_powerpc.udeb stable/main/binary-powerpc/fs-common-modules-2.6.18-6-powerpc-di_1.29etch3_powerpc.udeb stable/main/binary-powerpc/fat-modules-2.6.18-6-powerpc64-di_1.29etch3_powerpc.udeb stable/main/binary-powerpc/loop-modules-2.6.18-6-prep-di_1.29etch3_powerpc.udeb stable/main/binary-powerpc/pcmcia-storage-modules-2.6.18-6-powerpc-miboot-di_1.29etch3_powerpc.udeb stable/main/binary-powerpc/pcmcia-storage-modules-2.6.18-6-powerpc64-di_1.29etch3_powerpc.udeb stable/main/binary-powerpc/hypervisor-modules-2.6.18-6-powerpc64-di_1.29etch3_powerpc.udeb stable/main/binary-powerpc/pcmcia-storage-modules-2.6.18-6-powerpc-di_1.29etch3_powerpc.udeb stable/main/binary-powerpc/fs-common-modules-2.6.18-6-prep-di_1.29etch3_powerpc.udeb stable/main/binary-powerpc/scsi-common-modules-2.6.18-6-powerpc64-di_1.29etch3_powerpc.udeb stable/main/binary-powerpc/nic-modules-2.6.18-6-powerpc-di_1.29etch3_powerpc.udeb stable/main/binary-powerpc/affs-modules-2.6.18-6-powerpc64-di_1.29etch3_powerpc.udeb stable/main/binary-powerpc/scsi-modules-2.6.18-6-powerpc-miboot-di_1.29etch3_powerpc.udeb stable/main/binary-powerpc/jfs-modules-2.6.18-6-powerpc-miboot-di_1.29etch3_powerpc.udeb stable/main/binary-powerpc/ide-modules-2.6.18-6-powerpc-di_1.29etch3_powerpc.udeb stable/main/binary-powerpc/fancontrol-modules-2.6.18-6-powerpc64-di_1.29etch3_powerpc.udeb stable/main/binary-powerpc/usb-storage-modules-2.6.18-6-powerpc64-di_1.29etch3_powerpc.udeb stable/main/binary-powerpc/pcmcia-modules-2.6.18-6-powerpc-di_1.29etch3_powerpc.udeb stable/main/binary-powerpc/scsi-extra-modules-2.6.18-6-powerpc64-di_1.29etch3_powerpc.udeb stable/main/binary-powerpc/mouse-modules-2.6.18-6-powerpc64-di_1.29etch3_powerpc.udeb stable/main/binary-powerpc/loop-modules-2.6.18-6-powerpc64-di_1.29etch3_powerpc.udeb stable/main/binary-powerpc/serial-modules-2.6.18-6-powerpc-miboot-di_1.29etch3_powerpc.udeb stable/main/binary-powerpc/scsi-core-modules-2.6.18-6-powerpc-miboot-di_1.29etch3_powerpc.udeb stable/main/binary-powerpc/nic-pcmcia-modules-2.6.18-6-powerpc64-di_1.29etch3_powerpc.udeb stable/main/binary-powerpc/ppp-modules-2.6.18-6-prep-di_1.29etch3_powerpc.udeb stable/main/binary-powerpc/ipv6-modules-2.6.18-6-powerpc-miboot-di_1.29etch3_powerpc.udeb stable/main/binary-powerpc/input-modules-2.6.18-6-prep-di_1.29etch3_powerpc.udeb stable/main/binary-powerpc/pcmcia-modules-2.6.18-6-prep-di_1.29etch3_powerpc.udeb stable/main/binary-powerpc/affs-modules-2.6.18-6-powerpc-miboot-di_1.29etch3_powerpc.udeb stable/main/binary-powerpc/md-modules-2.6.18-6-prep-di_1.29etch3_powerpc.udeb stable/main/binary-powerpc/ext2-modules-2.6.18-6-powerpc64-di_1.29etch3_powerpc.udeb stable/main/binary-powerpc/usb-storage-modules-2.6.18-6-powerpc-di_1.29etch3_powerpc.udeb stable/main/binary-powerpc/usb-serial-modules-2.6.18-6-powerpc64-di_1.29etch3_powerpc.udeb stable/main/binary-powerpc/ext2-modules-2.6.18-6-prep-di_1.29etch3_powerpc.udeb stable/main/binary-powerpc/usb-serial-modules-2.6.18-6-prep-di_1.29etch3_powerpc.udeb stable/main/binary-powerpc/nic-shared-modules-2.6.18-6-prep-di_1.29etch3_powerpc.udeb stable/main/binary-powerpc/ide-modules-2.6.18-6-powerpc-miboot-di_1.29etch3_powerpc.udeb stable/main/binary-powerpc/floppy-modules-2.6.18-6-powerpc64-di_1.29etch3_powerpc.udeb stable/main/binary-powerpc/kernel-image-2.6.18-6-powerpc64-di_1.29etch3_powerpc.udeb stable/main/binary-powerpc/xfs-modules-2.6.18-6-powerpc64-di_1.29etch3_powerpc.udeb stable/main/source/linux-kernel-di-powerpc-2.6_1.29etch3.dsc stable/main/binary-powerpc/kernel-image-2.6.18-6-powerpc-miboot-di_1.29etch3_powerpc.udeb stable/main/binary-powerpc/scsi-modules-2.6.18-6-powerpc64-di_1.29etch3_powerpc.udeb stable/main/binary-powerpc/usb-storage-modules-2.6.18-6-prep-di_1.29etch3_powerpc.udeb stable/main/binary-powerpc/ufs-modules-2.6.18-6-powerpc-miboot-di_1.29etch3_powerpc.udeb stable/main/binary-powerpc/md-modules-2.6.18-6-powerpc-miboot-di_1.29etch3_powerpc.udeb stable/main/binary-powerpc/scsi-common-modules-2.6.18-6-powerpc-miboot-di_1.29etch3_powerpc.udeb stable/main/binary-powerpc/reiserfs-modules-2.6.18-6-prep-di_1.29etch3_powerpc.udeb stable/main/binary-powerpc/md-modules-2.6.18-6-powerpc-di_1.29etch3_powerpc.udeb stable/main/binary-powerpc/serial-modules-2.6.18-6-powerpc-di_1.29etch3_powerpc.udeb stable/main/binary-powerpc/hfs-modules-2.6.18-6-prep-di_1.29etch3_powerpc.udeb stable/main/binary-powerpc/mouse-modules-2.6.18-6-powerpc-di_1.29etch3_powerpc.udeb stable/main/binary-powerpc/scsi-common-modules-2.6.18-6-powerpc-di_1.29etch3_powerpc.udeb stable/main/binary-powerpc/usb-modules-2.6.18-6-powerpc64-di_1.29etch3_powerpc.udeb stable/main/binary-powerpc/irda-modules-2.6.18-6-powerpc-di_1.29etch3_powerpc.udeb stable/main/binary-powerpc/mouse-modules-2.6.18-6-prep-di_1.29etch3_powerpc.udeb stable/main/binary-powerpc/crypto-modules-2.6.18-6-prep-di_1.29etch3_powerpc.udeb stable/main/binary-powerpc/nic-extra-modules-2.6.18-6-powerpc-miboot-di_1.29etch3_powerpc.udeb stable/main/binary-powerpc/firmware-modules-2.6.18-6-powerpc-di_1.29etch3_powerpc.udeb stable/main/binary-powerpc/scsi-modules-2.6.18-6-powerpc-di_1.29etch3_powerpc.udeb stable/main/binary-powerpc/ext3-modules-2.6.18-6-prep-di_1.29etch3_powerpc.udeb stable/main/binary-powerpc/scsi-core-modules-2.6.18-6-prep-di_1.29etch3_powerpc.udeb stable/main/binary-powerpc/scsi-extra-modules-2.6.18-6-prep-di_1.29etch3_powerpc.udeb stable/main/binary-powerpc/input-modules-2.6.18-6-powerpc-miboot-di_1.29etch3_powerpc.udeb stable/main/binary-powerpc/ext2-modules-2.6.18-6-powerpc-miboot-di_1.29etch3_powerpc.udeb stable/main/binary-powerpc/ufs-modules-2.6.18-6-powerpc-di_1.29etch3_powerpc.udeb stable/main/binary-powerpc/nic-shared-modules-2.6.18-6-powerpc-miboot-di_1.29etch3_powerpc.udeb stable/main/binary-powerpc/reiserfs-modules-2.6.18-6-powerpc-miboot-di_1.29etch3_powerpc.udeb stable/main/binary-powerpc/crypto-modules-2.6.18-6-powerpc-miboot-di_1.29etch3_powerpc.udeb stable/main/binary-powerpc/mouse-modules-2.6.18-6-powerpc-miboot-di_1.29etch3_powerpc.udeb stable/main/binary-powerpc/scsi-modules-2.6.18-6-prep-di_1.29etch3_powerpc.udeb stable/main/binary-powerpc/loop-modules-2.6.18-6-powerpc-di_1.29etch3_powerpc.udeb stable/main/binary-powerpc/hfs-modules-2.6.18-6-powerpc64-di_1.29etch3_powerpc.udeb stable/main/binary-powerpc/crypto-modules-2.6.18-6-powerpc64-di_1.29etch3_powerpc.udeb stable/main/binary-powerpc/ext3-modules-2.6.18-6-powerpc-miboot-di_1.29etch3_powerpc.udeb stable/main/binary-powerpc/xfs-modules-2.6.18-6-prep-di_1.29etch3_powerpc.udeb stable/main/binary-powerpc/scsi-common-modules-2.6.18-6-prep-di_1.29etch3_powerpc.udeb stable/main/binary-powerpc/cdrom-core-modules-2.6.18-6-powerpc64-di_1.29etch3_powerpc.udeb stable/main/binary-powerpc/jfs-modules-2.6.18-6-powerpc-di_1.29etch3_powerpc.udeb stable/main/binary-powerpc/sata-modules-2.6.18-6-powerpc64-di_1.29etch3_powerpc.udeb stable/main/binary-powerpc/loop-modules-2.6.18-6-powerpc-miboot-di_1.29etch3_powerpc.udeb stable/main/binary-powerpc/kernel-image-2.6.18-6-prep-di_1.29etch3_powerpc.udeb stable/main/binary-powerpc/fat-modules-2.6.18-6-prep-di_1.29etch3_powerpc.udeb stable/main/binary-powerpc/cdrom-core-modules-2.6.18-6-prep-di_1.29etch3_powerpc.udeb stable/main/binary-powerpc/nic-pcmcia-modules-2.6.18-6-prep-di_1.29etch3_powerpc.udeb stable/main/binary-powerpc/hfs-modules-2.6.18-6-powerpc-miboot-di_1.29etch3_powerpc.udeb stable/main/binary-powerpc/scsi-extra-modules-2.6.18-6-powerpc-miboot-di_1.29etch3_powerpc.udeb stable/main/binary-powerpc/jfs-modules-2.6.18-6-prep-di_1.29etch3_powerpc.udeb stable/main/binary-powerpc/reiserfs-modules-2.6.18-6-powerpc-di_1.29etch3_powerpc.udeb stable/main/binary-powerpc/sata-modules-2.6.18-6-powerpc-di_1.29etch3_powerpc.udeb stable/main/binary-powerpc/ppp-modules-2.6.18-6-powerpc-di_1.29etch3_powerpc.udeb stable/main/binary-powerpc/fs-common-modules-2.6.18-6-powerpc64-di_1.29etch3_powerpc.udeb stable/main/binary-powerpc/ide-modules-2.6.18-6-prep-di_1.29etch3_powerpc.udeb stable/main/binary-powerpc/floppy-modules-2.6.18-6-powerpc-di_1.29etch3_powerpc.udeb stable/main/binary-powerpc/irda-modules-2.6.18-6-powerpc-miboot-di_1.29etch3_powerpc.udeb stable/main/binary-powerpc/firewire-core-modules-2.6.18-6-prep-di_1.29etch3_powerpc.udeb stable/main/binary-powerpc/floppy-modules-2.6.18-6-prep-di_1.29etch3_powerpc.udeb stable/main/binary-powerpc/ipv6-modules-2.6.18-6-powerpc64-di_1.29etch3_powerpc.udeb linux-kernel-di-powerpc-2.6 (1.29etch3) stable; urgency=low * Update to kernel ABI 2.6.18-6. * Built against version 2.6.18.dfsg.1-18 of linux-2.6. stable/main/binary-mipsel/kernel-image-2.6.18-6-r3k-kn02-di_0.13etch3_mipsel.udeb stable/main/binary-mipsel/scsi-core-modules-2.6.18-6-sb1a-bcm91480b-di_0.13etch3_mipsel.udeb stable/main/binary-mipsel/sata-modules-2.6.18-6-sb1-bcm91250a-di_0.13etch3_mipsel.udeb stable/main/binary-mipsel/loop-modules-2.6.18-6-r5k-cobalt-di_0.13etch3_mipsel.udeb stable/main/binary-mipsel/input-modules-2.6.18-6-sb1-bcm91250a-di_0.13etch3_mipsel.udeb stable/main/binary-mipsel/kernel-image-2.6.18-6-qemu-di_0.13etch3_mipsel.udeb stable/main/binary-mipsel/ide-modules-2.6.18-6-sb1-bcm91250a-di_0.13etch3_mipsel.udeb stable/main/binary-mipsel/fat-modules-2.6.18-6-sb1a-bcm91480b-di_0.13etch3_mipsel.udeb stable/main/binary-mipsel/usb-storage-modules-2.6.18-6-sb1a-bcm91480b-di_0.13etch3_mipsel.udeb stable/main/binary-mipsel/scsi-modules-2.6.18-6-sb1a-bcm91480b-di_0.13etch3_mipsel.udeb stable/main/binary-mipsel/fat-modules-2.6.18-6-sb1-bcm91250a-di_0.13etch3_mipsel.udeb stable/main/binary-mipsel/kernel-image-2.6.18-6-sb1-bcm91250a-di_0.13etch3_mipsel.udeb stable/main/binary-mipsel/crypto-modules-2.6.18-6-r4k-kn04-di_0.13etch3_mipsel.udeb stable/main/binary-mipsel/kernel-image-2.6.18-6-r4k-kn04-di_0.13etch3_mipsel.udeb stable/main/binary-mipsel/usb-storage-modules-2.6.18-6-sb1-bcm91250a-di_0.13etch3_mipsel.udeb stable/main/binary-mipsel/crypto-modules-2.6.18-6-r3k-kn02-di_0.13etch3_mipsel.udeb stable/main/binary-mipsel/xfs-modules-2.6.18-6-r5k-cobalt-di_0.13etch3_mipsel.udeb stable/main/binary-mipsel/ppp-modules-2.6.18-6-sb1-bcm91250a-di_0.13etch3_mipsel.udeb stable/main/binary-mipsel/ppp-modules-2.6.18-6-r5k-cobalt-di_0.13etch3_mipsel.udeb stable/main/binary-mipsel/loop-modules-2.6.18-6-qemu-di_0.13etch3_mipsel.udeb stable/main/binary-mipsel/scsi-common-modules-2.6.18-6-sb1-bcm91250a-di_0.13etch3_mipsel.udeb stable/main/binary-mipsel/cdrom-core-modules-2.6.18-6-sb1-bcm91250a-di_0.13etch3_mipsel.udeb stable/main/binary-mipsel/nfs-modules-2.6.18-6-r5k-cobalt-di_0.13etch3_mipsel.udeb stable/main/source/linux-kernel-di-mipsel-2.6_0.13etch3.dsc stable/main/binary-mipsel/jfs-modules-2.6.18-6-r5k-cobalt-di_0.13etch3_mipsel.udeb stable/main/binary-mipsel/reiserfs-modules-2.6.18-6-r3k-kn02-di_0.13etch3_mipsel.udeb stable/main/binary-mipsel/md-modules-2.6.18-6-r5k-cobalt-di_0.13etch3_mipsel.udeb stable/main/binary-mipsel/ipv6-modules-2.6.18-6-sb1-bcm91250a-di_0.13etch3_mipsel.udeb stable/main/binary-mipsel/md-modules-2.6.18-6-qemu-di_0.13etch3_mipsel.udeb stable/main/binary-mipsel/usb-modules-2.6.18-6-sb1a-bcm91480b-di_0.13etch3_mipsel.udeb stable/main/source/linux-kernel-di-mipsel-2.6_0.13etch3.tar.gz stable/main/binary-mipsel/fb-modules-2.6.18-6-sb1-bcm91250a-di_0.13etch3_mipsel.udeb stable/main/binary-mipsel/reiserfs-modules-2.6.18-6-sb1-bcm91250a-di_0.13etch3_mipsel.udeb stable/main/binary-mipsel/xfs-modules-2.6.18-6-sb1a-bcm91480b-di_0.13etch3_mipsel.udeb stable/main/binary-mipsel/crypto-modules-2.6.18-6-r5k-cobalt-di_0.13etch3_mipsel.udeb stable/main/binary-mipsel/crypto-modules-2.6.18-6-sb1-bcm91250a-di_0.13etch3_mipsel.udeb stable/main/binary-mipsel/jfs-modules-2.6.18-6-sb1-bcm91250a-di_0.13etch3_mipsel.udeb stable/main/binary-mipsel/input-modules-2.6.18-6-sb1a-bcm91480b-di_0.13etch3_mipsel.udeb stable/main/binary-mipsel/reiserfs-modules-2.6.18-6-sb1a-bcm91480b-di_0.13etch3_mipsel.udeb stable/main/binary-mipsel/cdrom-core-modules-2.6.18-6-sb1a-bcm91480b-di_0.13etch3_mipsel.udeb stable/main/binary-mipsel/reiserfs-modules-2.6.18-6-r5k-cobalt-di_0.13etch3_mipsel.udeb stable/main/binary-mipsel/scsi-modules-2.6.18-6-sb1-bcm91250a-di_0.13etch3_mipsel.udeb stable/main/binary-mipsel/fat-modules-2.6.18-6-r5k-cobalt-di_0.13etch3_mipsel.udeb stable/main/binary-mipsel/usb-modules-2.6.18-6-sb1-bcm91250a-di_0.13etch3_mipsel.udeb stable/main/binary-mipsel/ppp-modules-2.6.18-6-sb1a-bcm91480b-di_0.13etch3_mipsel.udeb stable/main/binary-mipsel/crypto-modules-2.6.18-6-sb1a-bcm91480b-di_0.13etch3_mipsel.udeb stable/main/binary-mipsel/ide-modules-2.6.18-6-sb1a-bcm91480b-di_0.13etch3_mipsel.udeb stable/main/binary-mipsel/kernel-image-2.6.18-6-sb1a-bcm91480b-di_0.13etch3_mipsel.udeb stable/main/binary-mipsel/scsi-common-modules-2.6.18-6-sb1a-bcm91480b-di_0.13etch3_mipsel.udeb stable/main/binary-mipsel/jfs-modules-2.6.18-6-sb1a-bcm91480b-di_0.13etch3_mipsel.udeb stable/main/binary-mipsel/scsi-core-modules-2.6.18-6-sb1-bcm91250a-di_0.13etch3_mipsel.udeb stable/main/binary-mipsel/loop-modules-2.6.18-6-sb1-bcm91250a-di_0.13etch3_mipsel.udeb stable/main/binary-mipsel/jfs-modules-2.6.18-6-qemu-di_0.13etch3_mipsel.udeb stable/main/binary-mipsel/ipv6-modules-2.6.18-6-r3k-kn02-di_0.13etch3_mipsel.udeb stable/main/binary-mipsel/xfs-modules-2.6.18-6-qemu-di_0.13etch3_mipsel.udeb stable/main/binary-mipsel/reiserfs-modules-2.6.18-6-qemu-di_0.13etch3_mipsel.udeb stable/main/binary-mipsel/loop-modules-2.6.18-6-sb1a-bcm91480b-di_0.13etch3_mipsel.udeb stable/main/binary-mipsel/kernel-image-2.6.18-6-r5k-cobalt-di_0.13etch3_mipsel.udeb stable/main/binary-mipsel/md-modules-2.6.18-6-sb1a-bcm91480b-di_0.13etch3_mipsel.udeb stable/main/binary-mipsel/fat-modules-2.6.18-6-qemu-di_0.13etch3_mipsel.udeb stable/main/binary-mipsel/sata-modules-2.6.18-6-sb1a-bcm91480b-di_0.13etch3_mipsel.udeb stable/main/binary-mipsel/xfs-modules-2.6.18-6-sb1-bcm91250a-di_0.13etch3_mipsel.udeb stable/main/binary-mipsel/fb-modules-2.6.18-6-sb1a-bcm91480b-di_0.13etch3_mipsel.udeb stable/main/binary-mipsel/ipv6-modules-2.6.18-6-r4k-kn04-di_0.13etch3_mipsel.udeb stable/main/binary-mipsel/ipv6-modules-2.6.18-6-r5k-cobalt-di_0.13etch3_mipsel.udeb stable/main/binary-mipsel/cdrom-core-modules-2.6.18-6-r5k-cobalt-di_0.13etch3_mipsel.udeb stable/main/binary-mipsel/md-modules-2.6.18-6-sb1-bcm91250a-di_0.13etch3_mipsel.udeb stable/main/binary-mipsel/reiserfs-modules-2.6.18-6-r4k-kn04-di_0.13etch3_mipsel.udeb stable/main/binary-mipsel/ipv6-modules-2.6.18-6-sb1a-bcm91480b-di_0.13etch3_mipsel.udeb linux-kernel-di-mipsel-2.6 (0.13etch3) stable; urgency=low * Update to kernel ABI 2.6.18-6. * Built against version 2.6.18.dfsg.1-18 of linux-2.6. stable/main/binary-mips/md-modules-2.6.18-6-sb1a-bcm91480b-di_0.13etch3_mips.udeb stable/main/binary-mips/scsi-core-modules-2.6.18-6-sb1-bcm91250a-di_0.13etch3_mips.udeb stable/main/binary-mips/ide-modules-2.6.18-6-sb1-bcm91250a-di_0.13etch3_mips.udeb stable/main/binary-mips/ipv6-modules-2.6.18-6-sb1-bcm91250a-di_0.13etch3_mips.udeb stable/main/binary-mips/scsi-core-modules-2.6.18-6-sb1a-bcm91480b-di_0.13etch3_mips.udeb stable/main/binary-mips/cdrom-core-modules-2.6.18-6-sb1a-bcm91480b-di_0.13etch3_mips.udeb stable/main/binary-mips/loop-modules-2.6.18-6-r5k-ip32-di_0.13etch3_mips.udeb stable/main/binary-mips/jfs-modules-2.6.18-6-r4k-ip22-di_0.13etch3_mips.udeb stable/main/binary-mips/ppp-modules-2.6.18-6-r5k-ip32-di_0.13etch3_mips.udeb stable/main/source/linux-kernel-di-mips-2.6_0.13etch3.dsc stable/main/binary-mips/sata-modules-2.6.18-6-sb1-bcm91250a-di_0.13etch3_mips.udeb stable/main/binary-mips/sata-modules-2.6.18-6-sb1a-bcm91480b-di_0.13etch3_mips.udeb stable/main/binary-mips/scsi-modules-2.6.18-6-sb1a-bcm91480b-di_0.13etch3_mips.udeb stable/main/binary-mips/fat-modules-2.6.18-6-sb1-bcm91250a-di_0.13etch3_mips.udeb stable/main/binary-mips/xfs-modules-2.6.18-6-sb1-bcm91250a-di_0.13etch3_mips.udeb stable/main/binary-mips/crypto-modules-2.6.18-6-sb1-bcm91250a-di_0.13etch3_mips.udeb stable/main/binary-mips/md-modules-2.6.18-6-r5k-ip32-di_0.13etch3_mips.udeb stable/main/binary-mips/reiserfs-modules-2.6.18-6-qemu-di_0.13etch3_mips.udeb stable/main/binary-mips/jfs-modules-2.6.18-6-qemu-di_0.13etch3_mips.udeb stable/main/binary-mips/crypto-modules-2.6.18-6-r4k-ip22-di_0.13etch3_mips.udeb stable/main/binary-mips/loop-modules-2.6.18-6-qemu-di_0.13etch3_mips.udeb stable/main/binary-mips/kernel-image-2.6.18-6-qemu-di_0.13etch3_mips.udeb stable/main/binary-mips/ipv6-modules-2.6.18-6-r5k-ip32-di_0.13etch3_mips.udeb stable/main/binary-mips/reiserfs-modules-2.6.18-6-sb1-bcm91250a-di_0.13etch3_mips.udeb stable/main/binary-mips/jfs-modules-2.6.18-6-sb1a-bcm91480b-di_0.13etch3_mips.udeb stable/main/binary-mips/ppp-modules-2.6.18-6-sb1-bcm91250a-di_0.13etch3_mips.udeb stable/main/binary-mips/usb-storage-modules-2.6.18-6-sb1a-bcm91480b-di_0.13etch3_mips.udeb stable/main/binary-mips/usb-modules-2.6.18-6-sb1-bcm91250a-di_0.13etch3_mips.udeb stable/main/binary-mips/input-modules-2.6.18-6-sb1a-bcm91480b-di_0.13etch3_mips.udeb stable/main/binary-mips/reiserfs-modules-2.6.18-6-r4k-ip22-di_0.13etch3_mips.udeb stable/main/binary-mips/usb-storage-modules-2.6.18-6-sb1-bcm91250a-di_0.13etch3_mips.udeb stable/main/binary-mips/ipv6-modules-2.6.18-6-sb1a-bcm91480b-di_0.13etch3_mips.udeb stable/main/binary-mips/fat-modules-2.6.18-6-sb1a-bcm91480b-di_0.13etch3_mips.udeb stable/main/binary-mips/crypto-modules-2.6.18-6-r5k-ip32-di_0.13etch3_mips.udeb stable/main/binary-mips/scsi-common-modules-2.6.18-6-sb1a-bcm91480b-di_0.13etch3_mips.udeb stable/main/binary-mips/cdrom-core-modules-2.6.18-6-sb1-bcm91250a-di_0.13etch3_mips.udeb stable/main/binary-mips/kernel-image-2.6.18-6-r4k-ip22-di_0.13etch3_mips.udeb stable/main/binary-mips/jfs-modules-2.6.18-6-r5k-ip32-di_0.13etch3_mips.udeb stable/main/binary-mips/ppp-modules-2.6.18-6-sb1a-bcm91480b-di_0.13etch3_mips.udeb stable/main/binary-mips/md-modules-2.6.18-6-qemu-di_0.13etch3_mips.udeb stable/main/binary-mips/kernel-image-2.6.18-6-r5k-ip32-di_0.13etch3_mips.udeb stable/main/binary-mips/fb-modules-2.6.18-6-sb1-bcm91250a-di_0.13etch3_mips.udeb stable/main/binary-mips/loop-modules-2.6.18-6-sb1-bcm91250a-di_0.13etch3_mips.udeb stable/main/binary-mips/reiserfs-modules-2.6.18-6-r5k-ip32-di_0.13etch3_mips.udeb stable/main/binary-mips/reiserfs-modules-2.6.18-6-sb1a-bcm91480b-di_0.13etch3_mips.udeb stable/main/binary-mips/loop-modules-2.6.18-6-sb1a-bcm91480b-di_0.13etch3_mips.udeb stable/main/binary-mips/xfs-modules-2.6.18-6-qemu-di_0.13etch3_mips.udeb stable/main/binary-mips/xfs-modules-2.6.18-6-r4k-ip22-di_0.13etch3_mips.udeb stable/main/binary-mips/xfs-modules-2.6.18-6-r5k-ip32-di_0.13etch3_mips.udeb stable/main/binary-mips/crypto-modules-2.6.18-6-sb1a-bcm91480b-di_0.13etch3_mips.udeb stable/main/binary-mips/fb-modules-2.6.18-6-sb1a-bcm91480b-di_0.13etch3_mips.udeb stable/main/binary-mips/scsi-modules-2.6.18-6-sb1-bcm91250a-di_0.13etch3_mips.udeb stable/main/binary-mips/loop-modules-2.6.18-6-r4k-ip22-di_0.13etch3_mips.udeb stable/main/binary-mips/ppp-modules-2.6.18-6-r4k-ip22-di_0.13etch3_mips.udeb stable/main/binary-mips/kernel-image-2.6.18-6-sb1-bcm91250a-di_0.13etch3_mips.udeb stable/main/source/linux-kernel-di-mips-2.6_0.13etch3.tar.gz stable/main/binary-mips/fat-modules-2.6.18-6-qemu-di_0.13etch3_mips.udeb stable/main/binary-mips/kernel-image-2.6.18-6-sb1a-bcm91480b-di_0.13etch3_mips.udeb stable/main/binary-mips/md-modules-2.6.18-6-sb1-bcm91250a-di_0.13etch3_mips.udeb stable/main/binary-mips/usb-modules-2.6.18-6-sb1a-bcm91480b-di_0.13etch3_mips.udeb stable/main/binary-mips/ide-modules-2.6.18-6-sb1a-bcm91480b-di_0.13etch3_mips.udeb stable/main/binary-mips/xfs-modules-2.6.18-6-sb1a-bcm91480b-di_0.13etch3_mips.udeb stable/main/binary-mips/input-modules-2.6.18-6-sb1-bcm91250a-di_0.13etch3_mips.udeb stable/main/binary-mips/jfs-modules-2.6.18-6-sb1-bcm91250a-di_0.13etch3_mips.udeb stable/main/binary-mips/md-modules-2.6.18-6-r4k-ip22-di_0.13etch3_mips.udeb stable/main/binary-mips/scsi-common-modules-2.6.18-6-sb1-bcm91250a-di_0.13etch3_mips.udeb stable/main/binary-mips/ipv6-modules-2.6.18-6-r4k-ip22-di_0.13etch3_mips.udeb linux-kernel-di-mips-2.6 (0.13etch3) stable; urgency=low * Update to kernel ABI 2.6.18-6. * Built against version 2.6.18.dfsg.1-18 of linux-2.6. stable/main/binary-ia64/cdrom-core-modules-2.6.18-6-itanium-di_1.18etch3_ia64.udeb stable/main/binary-ia64/reiserfs-modules-2.6.18-6-itanium-di_1.18etch3_ia64.udeb stable/main/binary-ia64/sn-modules-2.6.18-6-itanium-di_1.18etch3_ia64.udeb stable/main/binary-ia64/fat-modules-2.6.18-6-itanium-di_1.18etch3_ia64.udeb stable/main/source/linux-kernel-di-ia64-2.6_1.18etch3.dsc stable/main/binary-ia64/ppp-modules-2.6.18-6-itanium-di_1.18etch3_ia64.udeb stable/main/binary-ia64/nic-usb-modules-2.6.18-6-itanium-di_1.18etch3_ia64.udeb stable/main/binary-ia64/pcmcia-modules-2.6.18-6-itanium-di_1.18etch3_ia64.udeb stable/main/binary-ia64/efi-modules-2.6.18-6-itanium-di_1.18etch3_ia64.udeb stable/main/binary-ia64/crypto-modules-2.6.18-6-itanium-di_1.18etch3_ia64.udeb stable/main/binary-ia64/md-modules-2.6.18-6-itanium-di_1.18etch3_ia64.udeb stable/main/source/linux-kernel-di-ia64-2.6_1.18etch3.tar.gz stable/main/binary-ia64/scsi-core-modules-2.6.18-6-itanium-di_1.18etch3_ia64.udeb stable/main/binary-ia64/xfs-modules-2.6.18-6-itanium-di_1.18etch3_ia64.udeb stable/main/binary-ia64/kernel-image-2.6.18-6-itanium-di_1.18etch3_ia64.udeb stable/main/binary-ia64/ntfs-modules-2.6.18-6-itanium-di_1.18etch3_ia64.udeb stable/main/binary-ia64/ide-core-modules-2.6.18-6-itanium-di_1.18etch3_ia64.udeb stable/main/binary-ia64/parport-modules-2.6.18-6-itanium-di_1.18etch3_ia64.udeb stable/main/binary-ia64/input-modules-2.6.18-6-itanium-di_1.18etch3_ia64.udeb stable/main/binary-ia64/ufs-modules-2.6.18-6-itanium-di_1.18etch3_ia64.udeb stable/main/binary-ia64/crc-modules-2.6.18-6-itanium-di_1.18etch3_ia64.udeb stable/main/binary-ia64/acpi-modules-2.6.18-6-itanium-di_1.18etch3_ia64.udeb stable/main/binary-ia64/fb-modules-2.6.18-6-itanium-di_1.18etch3_ia64.udeb stable/main/binary-ia64/ide-modules-2.6.18-6-itanium-di_1.18etch3_ia64.udeb stable/main/binary-ia64/usb-storage-modules-2.6.18-6-itanium-di_1.18etch3_ia64.udeb stable/main/binary-ia64/ext3-modules-2.6.18-6-itanium-di_1.18etch3_ia64.udeb stable/main/binary-ia64/sata-modules-2.6.18-6-itanium-di_1.18etch3_ia64.udeb stable/main/binary-ia64/scsi-common-modules-2.6.18-6-itanium-di_1.18etch3_ia64.udeb stable/main/binary-ia64/nic-modules-2.6.18-6-itanium-di_1.18etch3_ia64.udeb stable/main/binary-ia64/nic-shared-modules-2.6.18-6-itanium-di_1.18etch3_ia64.udeb stable/main/binary-ia64/jfs-modules-2.6.18-6-itanium-di_1.18etch3_ia64.udeb stable/main/binary-ia64/usb-modules-2.6.18-6-itanium-di_1.18etch3_ia64.udeb stable/main/binary-ia64/firmware-modules-2.6.18-6-itanium-di_1.18etch3_ia64.udeb stable/main/binary-ia64/irda-modules-2.6.18-6-itanium-di_1.18etch3_ia64.udeb stable/main/binary-ia64/loop-modules-2.6.18-6-itanium-di_1.18etch3_ia64.udeb stable/main/binary-ia64/serial-modules-2.6.18-6-itanium-di_1.18etch3_ia64.udeb stable/main/binary-ia64/mouse-modules-2.6.18-6-itanium-di_1.18etch3_ia64.udeb stable/main/binary-ia64/scsi-modules-2.6.18-6-itanium-di_1.18etch3_ia64.udeb stable/main/binary-ia64/ipv6-modules-2.6.18-6-itanium-di_1.18etch3_ia64.udeb stable/main/binary-ia64/plip-modules-2.6.18-6-itanium-di_1.18etch3_ia64.udeb stable/main/binary-ia64/firewire-core-modules-2.6.18-6-itanium-di_1.18etch3_ia64.udeb linux-kernel-di-ia64-2.6 (1.18etch3) stable; urgency=low * Update to kernel ABI 2.6.18-6. * Built against version 2.6.18.dfsg.1-18 of linux-2.6. stable/main/binary-i386/fb-modules-2.6.18-6-486-di_1.44etch3_i386.udeb stable/main/binary-i386/parport-modules-2.6.18-6-486-di_1.44etch3_i386.udeb stable/main/binary-i386/usb-storage-modules-2.6.18-6-486-di_1.44etch3_i386.udeb stable/main/binary-i386/loop-modules-2.6.18-6-486-di_1.44etch3_i386.udeb stable/main/binary-i386/acpi-modules-2.6.18-6-486-di_1.44etch3_i386.udeb stable/main/binary-i386/nic-modules-2.6.18-6-486-di_1.44etch3_i386.udeb stable/main/binary-i386/cdrom-core-modules-2.6.18-6-486-di_1.44etch3_i386.udeb stable/main/binary-i386/kernel-image-2.6.18-6-486-di_1.44etch3_i386.udeb stable/main/binary-i386/serial-modules-2.6.18-6-486-di_1.44etch3_i386.udeb stable/main/binary-i386/ufs-modules-2.6.18-6-486-di_1.44etch3_i386.udeb stable/main/binary-i386/irda-modules-2.6.18-6-486-di_1.44etch3_i386.udeb stable/main/binary-i386/md-modules-2.6.18-6-486-di_1.44etch3_i386.udeb stable/main/binary-i386/scsi-common-modules-2.6.18-6-486-di_1.44etch3_i386.udeb stable/main/binary-i386/nic-shared-modules-2.6.18-6-486-di_1.44etch3_i386.udeb stable/main/binary-i386/crc-modules-2.6.18-6-486-di_1.44etch3_i386.udeb stable/main/binary-i386/mouse-modules-2.6.18-6-486-di_1.44etch3_i386.udeb stable/main/binary-i386/qnx4-modules-2.6.18-6-486-di_1.44etch3_i386.udeb stable/main/binary-i386/plip-modules-2.6.18-6-486-di_1.44etch3_i386.udeb stable/main/binary-i386/floppy-modules-2.6.18-6-486-di_1.44etch3_i386.udeb stable/main/binary-i386/firewire-core-modules-2.6.18-6-486-di_1.44etch3_i386.udeb stable/main/binary-i386/pcmcia-modules-2.6.18-6-486-di_1.44etch3_i386.udeb stable/main/source/linux-kernel-di-i386-2.6_1.44etch3.dsc stable/main/binary-i386/nic-usb-modules-2.6.18-6-486-di_1.44etch3_i386.udeb stable/main/binary-i386/usb-modules-2.6.18-6-486-di_1.44etch3_i386.udeb stable/main/binary-i386/ppp-modules-2.6.18-6-486-di_1.44etch3_i386.udeb stable/main/binary-i386/jfs-modules-2.6.18-6-486-di_1.44etch3_i386.udeb stable/main/binary-i386/nic-pcmcia-modules-2.6.18-6-486-di_1.44etch3_i386.udeb stable/main/binary-i386/firmware-modules-2.6.18-6-486-di_1.44etch3_i386.udeb stable/main/binary-i386/crypto-modules-2.6.18-6-486-di_1.44etch3_i386.udeb stable/main/binary-i386/scsi-core-modules-2.6.18-6-486-di_1.44etch3_i386.udeb stable/main/binary-i386/scsi-extra-modules-2.6.18-6-486-di_1.44etch3_i386.udeb stable/main/binary-i386/ipv6-modules-2.6.18-6-486-di_1.44etch3_i386.udeb stable/main/source/linux-kernel-di-i386-2.6_1.44etch3.tar.gz stable/main/binary-i386/scsi-modules-2.6.18-6-486-di_1.44etch3_i386.udeb stable/main/binary-i386/usb-serial-modules-2.6.18-6-486-di_1.44etch3_i386.udeb stable/main/binary-i386/pcmcia-storage-modules-2.6.18-6-486-di_1.44etch3_i386.udeb stable/main/binary-i386/efi-modules-2.6.18-6-486-di_1.44etch3_i386.udeb stable/main/binary-i386/reiserfs-modules-2.6.18-6-486-di_1.44etch3_i386.udeb stable/main/binary-i386/ntfs-modules-2.6.18-6-486-di_1.44etch3_i386.udeb stable/main/binary-i386/nic-extra-modules-2.6.18-6-486-di_1.44etch3_i386.udeb stable/main/binary-i386/ext3-modules-2.6.18-6-486-di_1.44etch3_i386.udeb stable/main/binary-i386/sata-modules-2.6.18-6-486-di_1.44etch3_i386.udeb stable/main/binary-i386/fat-modules-2.6.18-6-486-di_1.44etch3_i386.udeb stable/main/binary-i386/xfs-modules-2.6.18-6-486-di_1.44etch3_i386.udeb stable/main/binary-i386/ide-modules-2.6.18-6-486-di_1.44etch3_i386.udeb stable/main/binary-i386/cdrom-modules-2.6.18-6-486-di_1.44etch3_i386.udeb stable/main/binary-i386/input-modules-2.6.18-6-486-di_1.44etch3_i386.udeb stable/main/binary-i386/ide-core-modules-2.6.18-6-486-di_1.44etch3_i386.udeb linux-kernel-di-i386-2.6 (1.44etch3) stable; urgency=low * Update to kernel ABI 2.6.18-6. * Built against version 2.6.18.dfsg.1-18 of linux-2.6. stable/main/binary-hppa/nic-modules-2.6.18-6-parisc64-di_1.17etch3_hppa.udeb stable/main/source/linux-kernel-di-hppa-2.6_1.17etch3.tar.gz stable/main/binary-hppa/crypto-modules-2.6.18-6-parisc-di_1.17etch3_hppa.udeb stable/main/binary-hppa/kernel-image-2.6.18-6-parisc-di_1.17etch3_hppa.udeb stable/main/source/linux-kernel-di-hppa-2.6_1.17etch3.dsc stable/main/binary-hppa/usb-modules-2.6.18-6-parisc64-di_1.17etch3_hppa.udeb stable/main/binary-hppa/ext3-modules-2.6.18-6-parisc64-di_1.17etch3_hppa.udeb stable/main/binary-hppa/usb-storage-modules-2.6.18-6-parisc-di_1.17etch3_hppa.udeb stable/main/binary-hppa/input-modules-2.6.18-6-parisc-di_1.17etch3_hppa.udeb stable/main/binary-hppa/ext3-modules-2.6.18-6-parisc-di_1.17etch3_hppa.udeb stable/main/binary-hppa/ppp-modules-2.6.18-6-parisc-di_1.17etch3_hppa.udeb stable/main/binary-hppa/kernel-image-2.6.18-6-parisc64-di_1.17etch3_hppa.udeb stable/main/binary-hppa/cdrom-core-modules-2.6.18-6-parisc-di_1.17etch3_hppa.udeb stable/main/binary-hppa/loop-modules-2.6.18-6-parisc-di_1.17etch3_hppa.udeb stable/main/binary-hppa/ipv6-modules-2.6.18-6-parisc64-di_1.17etch3_hppa.udeb stable/main/binary-hppa/scsi-modules-2.6.18-6-parisc-di_1.17etch3_hppa.udeb stable/main/binary-hppa/md-modules-2.6.18-6-parisc64-di_1.17etch3_hppa.udeb stable/main/binary-hppa/scsi-modules-2.6.18-6-parisc64-di_1.17etch3_hppa.udeb stable/main/binary-hppa/ide-modules-2.6.18-6-parisc64-di_1.17etch3_hppa.udeb stable/main/binary-hppa/input-modules-2.6.18-6-parisc64-di_1.17etch3_hppa.udeb stable/main/binary-hppa/cdrom-core-modules-2.6.18-6-parisc64-di_1.17etch3_hppa.udeb stable/main/binary-hppa/usb-storage-modules-2.6.18-6-parisc64-di_1.17etch3_hppa.udeb stable/main/binary-hppa/crypto-modules-2.6.18-6-parisc64-di_1.17etch3_hppa.udeb stable/main/binary-hppa/ipv6-modules-2.6.18-6-parisc-di_1.17etch3_hppa.udeb stable/main/binary-hppa/loop-modules-2.6.18-6-parisc64-di_1.17etch3_hppa.udeb stable/main/binary-hppa/ide-modules-2.6.18-6-parisc-di_1.17etch3_hppa.udeb stable/main/binary-hppa/nic-modules-2.6.18-6-parisc-di_1.17etch3_hppa.udeb stable/main/binary-hppa/usb-modules-2.6.18-6-parisc-di_1.17etch3_hppa.udeb stable/main/binary-hppa/md-modules-2.6.18-6-parisc-di_1.17etch3_hppa.udeb stable/main/binary-hppa/ppp-modules-2.6.18-6-parisc64-di_1.17etch3_hppa.udeb linux-kernel-di-hppa-2.6 (1.17etch3) stable; urgency=low * Update to kernel ABI 2.6.18-6. * Built against version 2.6.18.dfsg.1-18 of linux-2.6. stable/main/binary-arm/loop-modules-2.6.18-6-iop32x-di_1.10etch3_arm.udeb stable/main/binary-arm/nic-modules-2.6.18-6-footbridge-di_1.10etch3_arm.udeb stable/main/binary-arm/md-modules-2.6.18-6-ixp4xx-di_1.10etch3_arm.udeb stable/main/binary-arm/ext3-modules-2.6.18-6-iop32x-di_1.10etch3_arm.udeb stable/main/binary-arm/fat-modules-2.6.18-6-ixp4xx-di_1.10etch3_arm.udeb stable/main/binary-arm/reiserfs-modules-2.6.18-6-footbridge-di_1.10etch3_arm.udeb stable/main/source/linux-kernel-di-arm-2.6_1.10etch3.tar.gz stable/main/binary-arm/loop-modules-2.6.18-6-footbridge-di_1.10etch3_arm.udeb stable/main/binary-arm/usb-modules-2.6.18-6-iop32x-di_1.10etch3_arm.udeb stable/main/binary-arm/ide-modules-2.6.18-6-iop32x-di_1.10etch3_arm.udeb stable/main/binary-arm/scsi-core-modules-2.6.18-6-ixp4xx-di_1.10etch3_arm.udeb stable/main/binary-arm/ext3-modules-2.6.18-6-ixp4xx-di_1.10etch3_arm.udeb stable/main/binary-arm/usb-storage-modules-2.6.18-6-footbridge-di_1.10etch3_arm.udeb stable/main/binary-arm/scsi-core-modules-2.6.18-6-rpc-di_1.10etch3_arm.udeb stable/main/binary-arm/fat-modules-2.6.18-6-footbridge-di_1.10etch3_arm.udeb stable/main/binary-arm/kernel-image-2.6.18-6-footbridge-di_1.10etch3_arm.udeb stable/main/binary-arm/scsi-core-modules-2.6.18-6-iop32x-di_1.10etch3_arm.udeb stable/main/source/linux-kernel-di-arm-2.6_1.10etch3.dsc stable/main/binary-arm/nic-modules-2.6.18-6-iop32x-di_1.10etch3_arm.udeb stable/main/binary-arm/kernel-image-2.6.18-6-rpc-di_1.10etch3_arm.udeb stable/main/binary-arm/ide-modules-2.6.18-6-footbridge-di_1.10etch3_arm.udeb stable/main/binary-arm/usb-modules-2.6.18-6-ixp4xx-di_1.10etch3_arm.udeb stable/main/binary-arm/ide-core-modules-2.6.18-6-iop32x-di_1.10etch3_arm.udeb stable/main/binary-arm/crc-modules-2.6.18-6-footbridge-di_1.10etch3_arm.udeb stable/main/binary-arm/sata-modules-2.6.18-6-iop32x-di_1.10etch3_arm.udeb stable/main/binary-arm/loop-modules-2.6.18-6-ixp4xx-di_1.10etch3_arm.udeb stable/main/binary-arm/usb-storage-modules-2.6.18-6-ixp4xx-di_1.10etch3_arm.udeb stable/main/binary-arm/nic-usb-modules-2.6.18-6-iop32x-di_1.10etch3_arm.udeb stable/main/binary-arm/md-modules-2.6.18-6-iop32x-di_1.10etch3_arm.udeb stable/main/binary-arm/cdrom-core-modules-2.6.18-6-footbridge-di_1.10etch3_arm.udeb stable/main/binary-arm/md-modules-2.6.18-6-footbridge-di_1.10etch3_arm.udeb stable/main/binary-arm/fat-modules-2.6.18-6-rpc-di_1.10etch3_arm.udeb stable/main/binary-arm/scsi-core-modules-2.6.18-6-footbridge-di_1.10etch3_arm.udeb stable/main/binary-arm/usb-modules-2.6.18-6-footbridge-di_1.10etch3_arm.udeb stable/main/binary-arm/nic-modules-2.6.18-6-ixp4xx-di_1.10etch3_arm.udeb stable/main/binary-arm/kernel-image-2.6.18-6-ixp4xx-di_1.10etch3_arm.udeb stable/main/binary-arm/loop-modules-2.6.18-6-rpc-di_1.10etch3_arm.udeb stable/main/binary-arm/reiserfs-modules-2.6.18-6-iop32x-di_1.10etch3_arm.udeb stable/main/binary-arm/reiserfs-modules-2.6.18-6-rpc-di_1.10etch3_arm.udeb stable/main/binary-arm/reiserfs-modules-2.6.18-6-ixp4xx-di_1.10etch3_arm.udeb stable/main/binary-arm/cdrom-core-modules-2.6.18-6-iop32x-di_1.10etch3_arm.udeb stable/main/binary-arm/crc-modules-2.6.18-6-iop32x-di_1.10etch3_arm.udeb stable/main/binary-arm/nic-usb-modules-2.6.18-6-ixp4xx-di_1.10etch3_arm.udeb stable/main/binary-arm/input-modules-2.6.18-6-ixp4xx-di_1.10etch3_arm.udeb stable/main/binary-arm/usb-storage-modules-2.6.18-6-iop32x-di_1.10etch3_arm.udeb stable/main/binary-arm/kernel-image-2.6.18-6-iop32x-di_1.10etch3_arm.udeb stable/main/binary-arm/crc-modules-2.6.18-6-ixp4xx-di_1.10etch3_arm.udeb stable/main/binary-arm/nic-shared-modules-2.6.18-6-footbridge-di_1.10etch3_arm.udeb stable/main/binary-arm/fat-modules-2.6.18-6-iop32x-di_1.10etch3_arm.udeb linux-kernel-di-arm-2.6 (1.10etch3) stable; urgency=low * Update to kernel ABI 2.6.18-6. * Built against version 2.6.18.dfsg.1-18 of linux-2.6. stable/main/binary-amd64/xfs-modules-2.6.18-6-amd64-di_1.21etch3_amd64.udeb stable/main/binary-amd64/fb-modules-2.6.18-6-amd64-di_1.21etch3_amd64.udeb stable/main/binary-amd64/scsi-modules-2.6.18-6-amd64-di_1.21etch3_amd64.udeb stable/main/binary-amd64/ext2-modules-2.6.18-6-amd64-di_1.21etch3_amd64.udeb stable/main/binary-amd64/md-modules-2.6.18-6-amd64-di_1.21etch3_amd64.udeb stable/main/binary-amd64/nic-modules-2.6.18-6-amd64-di_1.21etch3_amd64.udeb stable/main/binary-amd64/ide-core-modules-2.6.18-6-amd64-di_1.21etch3_amd64.udeb stable/main/binary-amd64/scsi-extra-modules-2.6.18-6-amd64-di_1.21etch3_amd64.udeb stable/main/binary-amd64/ipv6-modules-2.6.18-6-amd64-di_1.21etch3_amd64.udeb stable/main/binary-amd64/acpi-modules-2.6.18-6-amd64-di_1.21etch3_amd64.udeb stable/main/binary-amd64/jfs-modules-2.6.18-6-amd64-di_1.21etch3_amd64.udeb stable/main/binary-amd64/usb-storage-modules-2.6.18-6-amd64-di_1.21etch3_amd64.udeb stable/main/binary-amd64/usb-serial-modules-2.6.18-6-amd64-di_1.21etch3_amd64.udeb stable/main/binary-amd64/ide-modules-2.6.18-6-amd64-di_1.21etch3_amd64.udeb stable/main/binary-amd64/irda-modules-2.6.18-6-amd64-di_1.21etch3_amd64.udeb stable/main/binary-amd64/pcmcia-modules-2.6.18-6-amd64-di_1.21etch3_amd64.udeb stable/main/binary-amd64/serial-modules-2.6.18-6-amd64-di_1.21etch3_amd64.udeb stable/main/binary-amd64/ext3-modules-2.6.18-6-amd64-di_1.21etch3_amd64.udeb stable/main/binary-amd64/scsi-common-modules-2.6.18-6-amd64-di_1.21etch3_amd64.udeb stable/main/binary-amd64/plip-modules-2.6.18-6-amd64-di_1.21etch3_amd64.udeb stable/main/binary-amd64/kernel-image-2.6.18-6-amd64-di_1.21etch3_amd64.udeb stable/main/binary-amd64/parport-modules-2.6.18-6-amd64-di_1.21etch3_amd64.udeb stable/main/binary-amd64/qnx4-modules-2.6.18-6-amd64-di_1.21etch3_amd64.udeb stable/main/binary-amd64/fat-modules-2.6.18-6-amd64-di_1.21etch3_amd64.udeb stable/main/binary-amd64/mouse-modules-2.6.18-6-amd64-di_1.21etch3_amd64.udeb stable/main/binary-amd64/ppp-modules-2.6.18-6-amd64-di_1.21etch3_amd64.udeb stable/main/binary-amd64/cdrom-core-modules-2.6.18-6-amd64-di_1.21etch3_amd64.udeb stable/main/binary-amd64/firewire-core-modules-2.6.18-6-amd64-di_1.21etch3_amd64.udeb stable/main/binary-amd64/reiserfs-modules-2.6.18-6-amd64-di_1.21etch3_amd64.udeb stable/main/binary-amd64/usb-modules-2.6.18-6-amd64-di_1.21etch3_amd64.udeb stable/main/binary-amd64/scsi-core-modules-2.6.18-6-amd64-di_1.21etch3_amd64.udeb stable/main/binary-amd64/nic-usb-modules-2.6.18-6-amd64-di_1.21etch3_amd64.udeb stable/main/source/linux-kernel-di-amd64-2.6_1.21etch3.dsc stable/main/binary-amd64/nic-shared-modules-2.6.18-6-amd64-di_1.21etch3_amd64.udeb stable/main/binary-amd64/ufs-modules-2.6.18-6-amd64-di_1.21etch3_amd64.udeb stable/main/binary-amd64/core-modules-2.6.18-6-amd64-di_1.21etch3_amd64.udeb stable/main/binary-amd64/pcmcia-storage-modules-2.6.18-6-amd64-di_1.21etch3_amd64.udeb stable/main/binary-amd64/loop-modules-2.6.18-6-amd64-di_1.21etch3_amd64.udeb stable/main/binary-amd64/sata-modules-2.6.18-6-amd64-di_1.21etch3_amd64.udeb stable/main/source/linux-kernel-di-amd64-2.6_1.21etch3.tar.gz stable/main/binary-amd64/crc-modules-2.6.18-6-amd64-di_1.21etch3_amd64.udeb stable/main/binary-amd64/crypto-modules-2.6.18-6-amd64-di_1.21etch3_amd64.udeb stable/main/binary-amd64/ntfs-modules-2.6.18-6-amd64-di_1.21etch3_amd64.udeb stable/main/binary-amd64/nic-extra-modules-2.6.18-6-amd64-di_1.21etch3_amd64.udeb stable/main/binary-amd64/nic-pcmcia-modules-2.6.18-6-amd64-di_1.21etch3_amd64.udeb stable/main/binary-amd64/floppy-modules-2.6.18-6-amd64-di_1.21etch3_amd64.udeb stable/main/binary-amd64/input-modules-2.6.18-6-amd64-di_1.21etch3_amd64.udeb linux-kernel-di-amd64-2.6 (1.21etch3) stable; urgency=low * Update to kernel ABI 2.6.18-6. * Built against version 2.6.18.dfsg.1-18 of linux-2.6. stable/main/binary-alpha/nic-modules-2.6.18-6-alpha-generic-di_0.17etch3_alpha.udeb stable/main/binary-alpha/ppp-modules-2.6.18-6-alpha-generic-di_0.17etch3_alpha.udeb stable/main/binary-alpha/xfs-modules-2.6.18-6-alpha-generic-di_0.17etch3_alpha.udeb stable/main/binary-alpha/cdrom-modules-2.6.18-6-alpha-generic-di_0.17etch3_alpha.udeb stable/main/binary-alpha/crc-modules-2.6.18-6-alpha-generic-di_0.17etch3_alpha.udeb stable/main/binary-alpha/firmware-modules-2.6.18-6-alpha-generic-di_0.17etch3_alpha.udeb stable/main/binary-alpha/usb-serial-modules-2.6.18-6-alpha-generic-di_0.17etch3_alpha.udeb stable/main/binary-alpha/crypto-modules-2.6.18-6-alpha-generic-di_0.17etch3_alpha.udeb stable/main/binary-alpha/usb-modules-2.6.18-6-alpha-generic-di_0.17etch3_alpha.udeb stable/main/source/linux-kernel-di-alpha-2.6_0.17etch3.dsc stable/main/binary-alpha/ipv6-modules-2.6.18-6-alpha-generic-di_0.17etch3_alpha.udeb stable/main/source/linux-kernel-di-alpha-2.6_0.17etch3.tar.gz stable/main/binary-alpha/reiserfs-modules-2.6.18-6-alpha-generic-di_0.17etch3_alpha.udeb stable/main/binary-alpha/scsi-modules-2.6.18-6-alpha-generic-di_0.17etch3_alpha.udeb stable/main/binary-alpha/fat-modules-2.6.18-6-alpha-generic-di_0.17etch3_alpha.udeb stable/main/binary-alpha/scsi-core-modules-2.6.18-6-alpha-generic-di_0.17etch3_alpha.udeb stable/main/binary-alpha/nic-extra-modules-2.6.18-6-alpha-generic-di_0.17etch3_alpha.udeb stable/main/binary-alpha/fb-modules-2.6.18-6-alpha-generic-di_0.17etch3_alpha.udeb stable/main/binary-alpha/usb-storage-modules-2.6.18-6-alpha-generic-di_0.17etch3_alpha.udeb stable/main/binary-alpha/ide-modules-2.6.18-6-alpha-generic-di_0.17etch3_alpha.udeb stable/main/binary-alpha/md-modules-2.6.18-6-alpha-generic-di_0.17etch3_alpha.udeb stable/main/binary-alpha/ext3-modules-2.6.18-6-alpha-generic-di_0.17etch3_alpha.udeb stable/main/binary-alpha/scsi-extra-modules-2.6.18-6-alpha-generic-di_0.17etch3_alpha.udeb stable/main/binary-alpha/srm-modules-2.6.18-6-alpha-generic-di_0.17etch3_alpha.udeb stable/main/binary-alpha/sata-modules-2.6.18-6-alpha-generic-di_0.17etch3_alpha.udeb stable/main/binary-alpha/kernel-image-2.6.18-6-alpha-generic-di_0.17etch3_alpha.udeb stable/main/binary-alpha/scsi-common-modules-2.6.18-6-alpha-generic-di_0.17etch3_alpha.udeb stable/main/binary-alpha/jfs-modules-2.6.18-6-alpha-generic-di_0.17etch3_alpha.udeb stable/main/binary-alpha/nic-shared-modules-2.6.18-6-alpha-generic-di_0.17etch3_alpha.udeb stable/main/binary-alpha/cdrom-core-modules-2.6.18-6-alpha-generic-di_0.17etch3_alpha.udeb stable/main/binary-alpha/ide-core-modules-2.6.18-6-alpha-generic-di_0.17etch3_alpha.udeb stable/main/binary-alpha/plip-modules-2.6.18-6-alpha-generic-di_0.17etch3_alpha.udeb stable/main/binary-alpha/parport-modules-2.6.18-6-alpha-generic-di_0.17etch3_alpha.udeb linux-kernel-di-alpha-2.6 (0.17etch3) stable; urgency=low * Update to kernel ABI 2.6.18-6. * Built against version 2.6.18.dfsg.1-18 of linux-2.6. stable/main/binary-sparc/linux-headers-2.6.18-6-sparc64_2.6.18.dfsg.1-18etch1_sparc.deb stable/main/binary-sparc/linux-headers-2.6.18-6-sparc64-smp_2.6.18.dfsg.1-18etch1_sparc.deb stable/main/binary-sparc/linux-headers-2.6.18-6-sparc32_2.6.18.dfsg.1-18etch1_sparc.deb stable/main/binary-sparc/linux-image-2.6.18-6-vserver-sparc64_2.6.18.dfsg.1-18etch1_sparc.deb stable/main/binary-sparc/linux-image-2.6.18-6-sparc32_2.6.18.dfsg.1-18etch1_sparc.deb stable/main/binary-sparc/linux-image-2.6.18-6-sparc64_2.6.18.dfsg.1-18etch1_sparc.deb stable/main/binary-sparc/linux-headers-2.6.18-6-all_2.6.18.dfsg.1-18etch1_sparc.deb stable/main/binary-sparc/linux-headers-2.6.18-6-all-sparc_2.6.18.dfsg.1-18etch1_sparc.deb stable/main/binary-sparc/linux-image-2.6.18-6-sparc64-smp_2.6.18.dfsg.1-18etch1_sparc.deb stable/main/binary-sparc/linux-headers-2.6.18-6_2.6.18.dfsg.1-18etch1_sparc.deb stable/main/binary-sparc/linux-headers-2.6.18-6-vserver-sparc64_2.6.18.dfsg.1-18etch1_sparc.deb stable/main/binary-sparc/linux-headers-2.6.18-6-vserver_2.6.18.dfsg.1-18etch1_sparc.deb linux-2.6 (2.6.18.dfsg.1-18etch1) stable-security; urgency=high * bugfix/vmsplice-security.patch [SECURITY] Fix missing access check in vmsplice. See CVE-2008-0010, CVE-2008-0600 * bugfix/all/vserver/proc-link-security.patch [SECURITY][vserver] Fix access checks for the links in /proc/$pid. stable/main/binary-s390/linux-headers-2.6.18-6_2.6.18.dfsg.1-18etch1_s390.deb stable/main/binary-s390/linux-image-2.6.18-6-s390x_2.6.18.dfsg.1-18etch1_s390.deb stable/main/binary-s390/linux-headers-2.6.18-6-s390x_2.6.18.dfsg.1-18etch1_s390.deb stable/main/binary-s390/linux-headers-2.6.18-6-all-s390_2.6.18.dfsg.1-18etch1_s390.deb stable/main/binary-s390/linux-image-2.6.18-6-vserver-s390x_2.6.18.dfsg.1-18etch1_s390.deb stable/main/binary-s390/linux-headers-2.6.18-6-all_2.6.18.dfsg.1-18etch1_s390.deb stable/main/binary-s390/linux-image-2.6.18-6-s390_2.6.18.dfsg.1-18etch1_s390.deb stable/main/binary-s390/linux-headers-2.6.18-6-vserver_2.6.18.dfsg.1-18etch1_s390.deb stable/main/binary-s390/linux-image-2.6.18-6-s390-tape_2.6.18.dfsg.1-18etch1_s390.deb stable/main/binary-s390/linux-headers-2.6.18-6-vserver-s390x_2.6.18.dfsg.1-18etch1_s390.deb stable/main/binary-s390/linux-headers-2.6.18-6-s390_2.6.18.dfsg.1-18etch1_s390.deb linux-2.6 (2.6.18.dfsg.1-18etch1) stable-security; urgency=high * bugfix/vmsplice-security.patch [SECURITY] Fix missing access check in vmsplice. See CVE-2008-0010, CVE-2008-0600 * bugfix/all/vserver/proc-link-security.patch [SECURITY][vserver] Fix access checks for the links in /proc/$pid. stable/main/binary-powerpc/linux-headers-2.6.18-6-vserver_2.6.18.dfsg.1-18etch1_powerpc.deb stable/main/binary-powerpc/linux-image-2.6.18-6-prep_2.6.18.dfsg.1-18etch1_powerpc.deb stable/main/binary-powerpc/linux-headers-2.6.18-6-all-powerpc_2.6.18.dfsg.1-18etch1_powerpc.deb stable/main/binary-powerpc/linux-headers-2.6.18-6-prep_2.6.18.dfsg.1-18etch1_powerpc.deb stable/main/binary-powerpc/linux-headers-2.6.18-6-powerpc-smp_2.6.18.dfsg.1-18etch1_powerpc.deb stable/main/binary-powerpc/linux-image-2.6.18-6-powerpc-smp_2.6.18.dfsg.1-18etch1_powerpc.deb stable/main/binary-powerpc/linux-image-2.6.18-6-vserver-powerpc_2.6.18.dfsg.1-18etch1_powerpc.deb stable/main/binary-powerpc/linux-headers-2.6.18-6-vserver-powerpc_2.6.18.dfsg.1-18etch1_powerpc.deb stable/main/binary-powerpc/linux-image-2.6.18-6-powerpc_2.6.18.dfsg.1-18etch1_powerpc.deb stable/main/binary-powerpc/linux-headers-2.6.18-6-powerpc-miboot_2.6.18.dfsg.1-18etch1_powerpc.deb stable/main/binary-powerpc/linux-headers-2.6.18-6_2.6.18.dfsg.1-18etch1_powerpc.deb stable/main/binary-powerpc/linux-image-2.6.18-6-powerpc64_2.6.18.dfsg.1-18etch1_powerpc.deb stable/main/binary-powerpc/linux-image-2.6.18-6-vserver-powerpc64_2.6.18.dfsg.1-18etch1_powerpc.deb stable/main/binary-powerpc/linux-headers-2.6.18-6-powerpc_2.6.18.dfsg.1-18etch1_powerpc.deb stable/main/binary-powerpc/linux-headers-2.6.18-6-powerpc64_2.6.18.dfsg.1-18etch1_powerpc.deb stable/main/binary-powerpc/linux-image-2.6.18-6-powerpc-miboot_2.6.18.dfsg.1-18etch1_powerpc.deb stable/main/binary-powerpc/linux-headers-2.6.18-6-vserver-powerpc64_2.6.18.dfsg.1-18etch1_powerpc.deb stable/main/binary-powerpc/linux-headers-2.6.18-6-all_2.6.18.dfsg.1-18etch1_powerpc.deb linux-2.6 (2.6.18.dfsg.1-18etch1) stable-security; urgency=high * bugfix/vmsplice-security.patch [SECURITY] Fix missing access check in vmsplice. See CVE-2008-0010, CVE-2008-0600 * bugfix/all/vserver/proc-link-security.patch [SECURITY][vserver] Fix access checks for the links in /proc/$pid. stable/main/binary-mipsel/linux-image-2.6.18-6-r5k-cobalt_2.6.18.dfsg.1-18etch1_mipsel.deb stable/main/binary-mipsel/linux-headers-2.6.18-6-r5k-cobalt_2.6.18.dfsg.1-18etch1_mipsel.deb stable/main/binary-mipsel/linux-image-2.6.18-6-sb1-bcm91250a_2.6.18.dfsg.1-18etch1_mipsel.deb stable/main/binary-mipsel/linux-headers-2.6.18-6-all-mipsel_2.6.18.dfsg.1-18etch1_mipsel.deb stable/main/binary-mipsel/linux-headers-2.6.18-6-qemu_2.6.18.dfsg.1-18etch1_mipsel.deb stable/main/binary-mipsel/linux-headers-2.6.18-6-r4k-kn04_2.6.18.dfsg.1-18etch1_mipsel.deb stable/main/binary-mipsel/linux-headers-2.6.18-6-sb1-bcm91250a_2.6.18.dfsg.1-18etch1_mipsel.deb stable/main/binary-mipsel/linux-headers-2.6.18-6-sb1a-bcm91480b_2.6.18.dfsg.1-18etch1_mipsel.deb stable/main/binary-mipsel/linux-image-2.6.18-6-r3k-kn02_2.6.18.dfsg.1-18etch1_mipsel.deb stable/main/binary-mipsel/linux-headers-2.6.18-6-r3k-kn02_2.6.18.dfsg.1-18etch1_mipsel.deb stable/main/binary-mipsel/linux-headers-2.6.18-6-all_2.6.18.dfsg.1-18etch1_mipsel.deb stable/main/binary-mipsel/linux-headers-2.6.18-6_2.6.18.dfsg.1-18etch1_mipsel.deb stable/main/binary-mipsel/linux-image-2.6.18-6-qemu_2.6.18.dfsg.1-18etch1_mipsel.deb stable/main/binary-mipsel/linux-image-2.6.18-6-sb1a-bcm91480b_2.6.18.dfsg.1-18etch1_mipsel.deb stable/main/binary-mipsel/linux-image-2.6.18-6-r4k-kn04_2.6.18.dfsg.1-18etch1_mipsel.deb linux-2.6 (2.6.18.dfsg.1-18etch1) stable-security; urgency=high * bugfix/vmsplice-security.patch [SECURITY] Fix missing access check in vmsplice. See CVE-2008-0010, CVE-2008-0600 * bugfix/all/vserver/proc-link-security.patch [SECURITY][vserver] Fix access checks for the links in /proc/$pid. stable/main/binary-mips/linux-headers-2.6.18-6-r4k-ip22_2.6.18.dfsg.1-18etch1_mips.deb stable/main/binary-mips/linux-image-2.6.18-6-r5k-ip32_2.6.18.dfsg.1-18etch1_mips.deb stable/main/binary-mips/linux-image-2.6.18-6-sb1-bcm91250a_2.6.18.dfsg.1-18etch1_mips.deb stable/main/binary-mips/linux-image-2.6.18-6-qemu_2.6.18.dfsg.1-18etch1_mips.deb stable/main/binary-mips/linux-headers-2.6.18-6-sb1-bcm91250a_2.6.18.dfsg.1-18etch1_mips.deb stable/main/binary-mips/linux-headers-2.6.18-6-sb1a-bcm91480b_2.6.18.dfsg.1-18etch1_mips.deb stable/main/binary-mips/linux-image-2.6.18-6-r4k-ip22_2.6.18.dfsg.1-18etch1_mips.deb stable/main/binary-mips/linux-headers-2.6.18-6-all_2.6.18.dfsg.1-18etch1_mips.deb stable/main/binary-mips/linux-image-2.6.18-6-sb1a-bcm91480b_2.6.18.dfsg.1-18etch1_mips.deb stable/main/binary-mips/linux-headers-2.6.18-6_2.6.18.dfsg.1-18etch1_mips.deb stable/main/binary-mips/linux-headers-2.6.18-6-all-mips_2.6.18.dfsg.1-18etch1_mips.deb stable/main/binary-mips/linux-headers-2.6.18-6-qemu_2.6.18.dfsg.1-18etch1_mips.deb stable/main/binary-mips/linux-headers-2.6.18-6-r5k-ip32_2.6.18.dfsg.1-18etch1_mips.deb linux-2.6 (2.6.18.dfsg.1-18etch1) stable-security; urgency=high * bugfix/vmsplice-security.patch [SECURITY] Fix missing access check in vmsplice. See CVE-2008-0010, CVE-2008-0600 * bugfix/all/vserver/proc-link-security.patch [SECURITY][vserver] Fix access checks for the links in /proc/$pid. stable/main/binary-ia64/linux-headers-2.6.18-6-itanium_2.6.18.dfsg.1-18etch1_ia64.deb stable/main/binary-ia64/linux-headers-2.6.18-6-mckinley_2.6.18.dfsg.1-18etch1_ia64.deb stable/main/binary-ia64/linux-headers-2.6.18-6-all-ia64_2.6.18.dfsg.1-18etch1_ia64.deb stable/main/binary-ia64/linux-image-2.6.18-6-itanium_2.6.18.dfsg.1-18etch1_ia64.deb stable/main/binary-ia64/linux-headers-2.6.18-6-all_2.6.18.dfsg.1-18etch1_ia64.deb stable/main/binary-ia64/linux-image-2.6.18-6-mckinley_2.6.18.dfsg.1-18etch1_ia64.deb stable/main/binary-ia64/linux-headers-2.6.18-6_2.6.18.dfsg.1-18etch1_ia64.deb linux-2.6 (2.6.18.dfsg.1-18etch1) stable-security; urgency=high * bugfix/vmsplice-security.patch [SECURITY] Fix missing access check in vmsplice. See CVE-2008-0010, CVE-2008-0600 * bugfix/all/vserver/proc-link-security.patch [SECURITY][vserver] Fix access checks for the links in /proc/$pid. stable/main/binary-i386/linux-image-2.6.18-6-amd64_2.6.18.dfsg.1-18etch1_i386.deb stable/main/binary-i386/linux-headers-2.6.18-6-486_2.6.18.dfsg.1-18etch1_i386.deb stable/main/binary-i386/linux-headers-2.6.18-6_2.6.18.dfsg.1-18etch1_i386.deb stable/main/binary-i386/linux-headers-2.6.18-6-xen-vserver-686_2.6.18.dfsg.1-18etch1_i386.deb stable/main/binary-i386/linux-headers-2.6.18-6-vserver_2.6.18.dfsg.1-18etch1_i386.deb stable/main/binary-i386/linux-headers-2.6.18-6-vserver-k7_2.6.18.dfsg.1-18etch1_i386.deb stable/main/binary-i386/linux-image-2.6.18-6-xen-686_2.6.18.dfsg.1-18etch1_i386.deb stable/main/binary-i386/linux-modules-2.6.18-6-xen-686_2.6.18.dfsg.1-18etch1_i386.deb stable/main/binary-i386/linux-headers-2.6.18-6-k7_2.6.18.dfsg.1-18etch1_i386.deb stable/main/binary-i386/linux-headers-2.6.18-6-amd64_2.6.18.dfsg.1-18etch1_i386.deb stable/main/binary-i386/xen-linux-system-2.6.18-6-xen-vserver-686_2.6.18.dfsg.1-18etch1_i386.deb stable/main/binary-i386/linux-image-2.6.18-6-vserver-686_2.6.18.dfsg.1-18etch1_i386.deb stable/main/binary-i386/linux-image-2.6.18-6-vserver-k7_2.6.18.dfsg.1-18etch1_i386.deb stable/main/binary-i386/linux-headers-2.6.18-6-686-bigmem_2.6.18.dfsg.1-18etch1_i386.deb stable/main/binary-i386/xen-linux-system-2.6.18-6-xen-686_2.6.18.dfsg.1-18etch1_i386.deb stable/main/binary-i386/linux-image-2.6.18-6-486_2.6.18.dfsg.1-18etch1_i386.deb stable/main/binary-i386/linux-headers-2.6.18-6-xen_2.6.18.dfsg.1-18etch1_i386.deb stable/main/binary-i386/linux-image-2.6.18-6-xen-vserver-686_2.6.18.dfsg.1-18etch1_i386.deb stable/main/binary-i386/linux-headers-2.6.18-6-all_2.6.18.dfsg.1-18etch1_i386.deb stable/main/binary-i386/linux-headers-2.6.18-6-all-i386_2.6.18.dfsg.1-18etch1_i386.deb stable/main/binary-i386/linux-image-2.6.18-6-k7_2.6.18.dfsg.1-18etch1_i386.deb stable/main/binary-i386/linux-headers-2.6.18-6-xen-686_2.6.18.dfsg.1-18etch1_i386.deb stable/main/binary-i386/linux-modules-2.6.18-6-xen-vserver-686_2.6.18.dfsg.1-18etch1_i386.deb stable/main/binary-i386/linux-headers-2.6.18-6-vserver-686_2.6.18.dfsg.1-18etch1_i386.deb stable/main/binary-i386/linux-headers-2.6.18-6-686_2.6.18.dfsg.1-18etch1_i386.deb stable/main/binary-i386/linux-image-2.6.18-6-686-bigmem_2.6.18.dfsg.1-18etch1_i386.deb stable/main/binary-i386/linux-headers-2.6.18-6-xen-vserver_2.6.18.dfsg.1-18etch1_i386.deb stable/main/binary-i386/linux-image-2.6.18-6-686_2.6.18.dfsg.1-18etch1_i386.deb linux-2.6 (2.6.18.dfsg.1-18etch1) stable-security; urgency=high * bugfix/vmsplice-security.patch [SECURITY] Fix missing access check in vmsplice. See CVE-2008-0010, CVE-2008-0600 * bugfix/all/vserver/proc-link-security.patch [SECURITY][vserver] Fix access checks for the links in /proc/$pid. stable/main/binary-hppa/linux-headers-2.6.18-6-all-hppa_2.6.18.dfsg.1-18etch1_hppa.deb stable/main/binary-hppa/linux-image-2.6.18-6-parisc64_2.6.18.dfsg.1-18etch1_hppa.deb stable/main/binary-hppa/linux-image-2.6.18-6-parisc_2.6.18.dfsg.1-18etch1_hppa.deb stable/main/binary-hppa/linux-image-2.6.18-6-parisc64-smp_2.6.18.dfsg.1-18etch1_hppa.deb stable/main/binary-hppa/linux-headers-2.6.18-6-parisc64-smp_2.6.18.dfsg.1-18etch1_hppa.deb stable/main/binary-hppa/linux-headers-2.6.18-6-parisc64_2.6.18.dfsg.1-18etch1_hppa.deb stable/main/binary-hppa/linux-headers-2.6.18-6-parisc_2.6.18.dfsg.1-18etch1_hppa.deb stable/main/binary-hppa/linux-headers-2.6.18-6-all_2.6.18.dfsg.1-18etch1_hppa.deb stable/main/binary-hppa/linux-headers-2.6.18-6_2.6.18.dfsg.1-18etch1_hppa.deb stable/main/binary-hppa/linux-image-2.6.18-6-parisc-smp_2.6.18.dfsg.1-18etch1_hppa.deb stable/main/binary-hppa/linux-headers-2.6.18-6-parisc-smp_2.6.18.dfsg.1-18etch1_hppa.deb linux-2.6 (2.6.18.dfsg.1-18etch1) stable-security; urgency=high * bugfix/vmsplice-security.patch [SECURITY] Fix missing access check in vmsplice. See CVE-2008-0010, CVE-2008-0600 * bugfix/all/vserver/proc-link-security.patch [SECURITY][vserver] Fix access checks for the links in /proc/$pid. stable/main/binary-arm/linux-image-2.6.18-6-ixp4xx_2.6.18.dfsg.1-18etch1_arm.deb stable/main/binary-arm/linux-headers-2.6.18-6-rpc_2.6.18.dfsg.1-18etch1_arm.deb stable/main/binary-arm/linux-headers-2.6.18-6-iop32x_2.6.18.dfsg.1-18etch1_arm.deb stable/main/binary-arm/linux-image-2.6.18-6-footbridge_2.6.18.dfsg.1-18etch1_arm.deb stable/main/binary-arm/linux-headers-2.6.18-6-s3c2410_2.6.18.dfsg.1-18etch1_arm.deb stable/main/binary-arm/linux-image-2.6.18-6-s3c2410_2.6.18.dfsg.1-18etch1_arm.deb stable/main/binary-arm/linux-headers-2.6.18-6-all-arm_2.6.18.dfsg.1-18etch1_arm.deb stable/main/binary-arm/linux-image-2.6.18-6-iop32x_2.6.18.dfsg.1-18etch1_arm.deb stable/main/binary-arm/linux-headers-2.6.18-6-footbridge_2.6.18.dfsg.1-18etch1_arm.deb stable/main/binary-arm/linux-headers-2.6.18-6-all_2.6.18.dfsg.1-18etch1_arm.deb stable/main/binary-arm/linux-headers-2.6.18-6-ixp4xx_2.6.18.dfsg.1-18etch1_arm.deb stable/main/binary-arm/linux-headers-2.6.18-6_2.6.18.dfsg.1-18etch1_arm.deb stable/main/binary-arm/linux-image-2.6.18-6-rpc_2.6.18.dfsg.1-18etch1_arm.deb linux-2.6 (2.6.18.dfsg.1-18etch1) stable-security; urgency=high * bugfix/vmsplice-security.patch [SECURITY] Fix missing access check in vmsplice. See CVE-2008-0010, CVE-2008-0600 * bugfix/all/vserver/proc-link-security.patch [SECURITY][vserver] Fix access checks for the links in /proc/$pid. stable/main/binary-alpha/linux-headers-2.6.18-6-all_2.6.18.dfsg.1-18etch1_alpha.deb stable/main/binary-alpha/linux-image-2.6.18-6-alpha-smp_2.6.18.dfsg.1-18etch1_alpha.deb stable/main/binary-alpha/linux-headers-2.6.18-6_2.6.18.dfsg.1-18etch1_alpha.deb stable/main/binary-alpha/linux-image-2.6.18-6-vserver-alpha_2.6.18.dfsg.1-18etch1_alpha.deb stable/main/binary-alpha/linux-headers-2.6.18-6-vserver-alpha_2.6.18.dfsg.1-18etch1_alpha.deb stable/main/binary-alpha/linux-headers-2.6.18-6-alpha-legacy_2.6.18.dfsg.1-18etch1_alpha.deb stable/main/binary-alpha/linux-image-2.6.18-6-alpha-generic_2.6.18.dfsg.1-18etch1_alpha.deb stable/main/binary-alpha/linux-headers-2.6.18-6-all-alpha_2.6.18.dfsg.1-18etch1_alpha.deb stable/main/binary-alpha/linux-headers-2.6.18-6-vserver_2.6.18.dfsg.1-18etch1_alpha.deb stable/main/binary-alpha/linux-headers-2.6.18-6-alpha-smp_2.6.18.dfsg.1-18etch1_alpha.deb stable/main/binary-alpha/linux-headers-2.6.18-6-alpha-generic_2.6.18.dfsg.1-18etch1_alpha.deb stable/main/binary-alpha/linux-image-2.6.18-6-alpha-legacy_2.6.18.dfsg.1-18etch1_alpha.deb linux-2.6 (2.6.18.dfsg.1-18etch1) stable-security; urgency=high * bugfix/vmsplice-security.patch [SECURITY] Fix missing access check in vmsplice. See CVE-2008-0010, CVE-2008-0600 * bugfix/all/vserver/proc-link-security.patch [SECURITY][vserver] Fix access checks for the links in /proc/$pid. stable/main/binary-amd64/linux-image-2.6.18-6-xen-amd64_2.6.18.dfsg.1-18etch1_amd64.deb stable/main/binary-all/linux-patch-debian-2.6.18_2.6.18.dfsg.1-18etch1_all.deb stable/main/source/linux-2.6_2.6.18.dfsg.1-18etch1.dsc stable/main/binary-amd64/xen-linux-system-2.6.18-6-xen-amd64_2.6.18.dfsg.1-18etch1_amd64.deb stable/main/binary-amd64/linux-headers-2.6.18-6-vserver_2.6.18.dfsg.1-18etch1_amd64.deb stable/main/binary-amd64/linux-image-2.6.18-6-amd64_2.6.18.dfsg.1-18etch1_amd64.deb stable/main/binary-amd64/xen-linux-system-2.6.18-6-xen-vserver-amd64_2.6.18.dfsg.1-18etch1_amd64.deb stable/main/binary-amd64/linux-headers-2.6.18-6-xen-amd64_2.6.18.dfsg.1-18etch1_amd64.deb stable/main/binary-all/linux-source-2.6.18_2.6.18.dfsg.1-18etch1_all.deb stable/main/binary-amd64/linux-modules-2.6.18-6-xen-amd64_2.6.18.dfsg.1-18etch1_amd64.deb stable/main/source/linux-2.6_2.6.18.dfsg.1-18etch1.diff.gz stable/main/binary-amd64/linux-headers-2.6.18-6_2.6.18.dfsg.1-18etch1_amd64.deb stable/main/binary-amd64/linux-headers-2.6.18-6-all-amd64_2.6.18.dfsg.1-18etch1_amd64.deb stable/main/binary-amd64/linux-headers-2.6.18-6-xen_2.6.18.dfsg.1-18etch1_amd64.deb stable/main/binary-all/linux-doc-2.6.18_2.6.18.dfsg.1-18etch1_all.deb stable/main/binary-all/linux-tree-2.6.18_2.6.18.dfsg.1-18etch1_all.deb stable/main/binary-amd64/linux-headers-2.6.18-6-all_2.6.18.dfsg.1-18etch1_amd64.deb stable/main/binary-amd64/linux-image-2.6.18-6-xen-vserver-amd64_2.6.18.dfsg.1-18etch1_amd64.deb stable/main/binary-amd64/linux-headers-2.6.18-6-xen-vserver-amd64_2.6.18.dfsg.1-18etch1_amd64.deb stable/main/binary-amd64/linux-headers-2.6.18-6-amd64_2.6.18.dfsg.1-18etch1_amd64.deb stable/main/binary-amd64/linux-headers-2.6.18-6-vserver-amd64_2.6.18.dfsg.1-18etch1_amd64.deb stable/main/binary-amd64/linux-headers-2.6.18-6-xen-vserver_2.6.18.dfsg.1-18etch1_amd64.deb stable/main/binary-amd64/linux-image-2.6.18-6-vserver-amd64_2.6.18.dfsg.1-18etch1_amd64.deb stable/main/binary-all/linux-manual-2.6.18_2.6.18.dfsg.1-18etch1_all.deb stable/main/binary-all/linux-support-2.6.18-6_2.6.18.dfsg.1-18etch1_all.deb stable/main/binary-amd64/linux-modules-2.6.18-6-xen-vserver-amd64_2.6.18.dfsg.1-18etch1_amd64.deb linux-2.6 (2.6.18.dfsg.1-18etch1) stable-security; urgency=high * bugfix/vmsplice-security.patch [SECURITY] Fix missing access check in vmsplice. See CVE-2008-0010, CVE-2008-0600 * bugfix/all/vserver/proc-link-security.patch [SECURITY][vserver] Fix access checks for the links in /proc/$pid. stable/main/binary-sparc/libxml2-utils_2.6.27.dfsg-2_sparc.deb stable/main/binary-sparc/libxml2_2.6.27.dfsg-2_sparc.deb stable/main/binary-sparc/libxml2-dbg_2.6.27.dfsg-2_sparc.deb stable/main/binary-sparc/python-libxml2_2.6.27.dfsg-2_sparc.deb stable/main/binary-sparc/libxml2-dev_2.6.27.dfsg-2_sparc.deb libxml2 (2.6.27.dfsg-2) stable-security; urgency=high * Fix CVE-2007-6284 stable/main/binary-s390/libxml2-dev_2.6.27.dfsg-2_s390.deb stable/main/binary-s390/libxml2-dbg_2.6.27.dfsg-2_s390.deb stable/main/binary-s390/libxml2_2.6.27.dfsg-2_s390.deb stable/main/binary-s390/libxml2-utils_2.6.27.dfsg-2_s390.deb stable/main/binary-s390/python-libxml2_2.6.27.dfsg-2_s390.deb libxml2 (2.6.27.dfsg-2) stable-security; urgency=high * Fix CVE-2007-6284 stable/main/binary-powerpc/libxml2_2.6.27.dfsg-2_powerpc.deb stable/main/binary-powerpc/libxml2-dev_2.6.27.dfsg-2_powerpc.deb stable/main/binary-powerpc/python-libxml2_2.6.27.dfsg-2_powerpc.deb stable/main/binary-powerpc/libxml2-dbg_2.6.27.dfsg-2_powerpc.deb stable/main/binary-powerpc/libxml2-utils_2.6.27.dfsg-2_powerpc.deb libxml2 (2.6.27.dfsg-2) stable-security; urgency=high * Fix CVE-2007-6284 stable/main/binary-mipsel/libxml2-utils_2.6.27.dfsg-2_mipsel.deb stable/main/binary-mipsel/libxml2_2.6.27.dfsg-2_mipsel.deb stable/main/binary-mipsel/libxml2-dbg_2.6.27.dfsg-2_mipsel.deb stable/main/binary-mipsel/libxml2-dev_2.6.27.dfsg-2_mipsel.deb stable/main/binary-mipsel/python-libxml2_2.6.27.dfsg-2_mipsel.deb libxml2 (2.6.27.dfsg-2) stable-security; urgency=high * Fix CVE-2007-6284 stable/main/binary-mips/libxml2-utils_2.6.27.dfsg-2_mips.deb stable/main/binary-mips/libxml2-dev_2.6.27.dfsg-2_mips.deb stable/main/binary-mips/python-libxml2_2.6.27.dfsg-2_mips.deb stable/main/binary-mips/libxml2_2.6.27.dfsg-2_mips.deb stable/main/binary-mips/libxml2-dbg_2.6.27.dfsg-2_mips.deb libxml2 (2.6.27.dfsg-2) stable-security; urgency=high * Fix CVE-2007-6284 stable/main/binary-ia64/libxml2-utils_2.6.27.dfsg-2_ia64.deb stable/main/binary-ia64/libxml2_2.6.27.dfsg-2_ia64.deb stable/main/binary-ia64/libxml2-dev_2.6.27.dfsg-2_ia64.deb stable/main/binary-ia64/libxml2-dbg_2.6.27.dfsg-2_ia64.deb stable/main/binary-ia64/python-libxml2_2.6.27.dfsg-2_ia64.deb libxml2 (2.6.27.dfsg-2) stable-security; urgency=high * Fix CVE-2007-6284 stable/main/binary-hppa/libxml2-utils_2.6.27.dfsg-2_hppa.deb stable/main/binary-hppa/libxml2-dev_2.6.27.dfsg-2_hppa.deb stable/main/binary-hppa/python-libxml2_2.6.27.dfsg-2_hppa.deb stable/main/binary-hppa/libxml2-dbg_2.6.27.dfsg-2_hppa.deb stable/main/binary-hppa/libxml2_2.6.27.dfsg-2_hppa.deb libxml2 (2.6.27.dfsg-2) stable-security; urgency=high * Fix CVE-2007-6284 stable/main/binary-arm/libxml2-utils_2.6.27.dfsg-2_arm.deb stable/main/binary-arm/libxml2-dev_2.6.27.dfsg-2_arm.deb stable/main/binary-arm/libxml2_2.6.27.dfsg-2_arm.deb stable/main/binary-arm/libxml2-dbg_2.6.27.dfsg-2_arm.deb stable/main/binary-arm/python-libxml2_2.6.27.dfsg-2_arm.deb libxml2 (2.6.27.dfsg-2) stable-security; urgency=high * Fix CVE-2007-6284 stable/main/binary-amd64/libxml2-utils_2.6.27.dfsg-2_amd64.deb stable/main/binary-amd64/libxml2-dev_2.6.27.dfsg-2_amd64.deb stable/main/binary-amd64/python-libxml2_2.6.27.dfsg-2_amd64.deb stable/main/binary-amd64/libxml2-dbg_2.6.27.dfsg-2_amd64.deb stable/main/binary-amd64/libxml2_2.6.27.dfsg-2_amd64.deb libxml2 (2.6.27.dfsg-2) stable-security; urgency=high * Fix CVE-2007-6284 stable/main/binary-alpha/libxml2-utils_2.6.27.dfsg-2_alpha.deb stable/main/binary-alpha/libxml2-dev_2.6.27.dfsg-2_alpha.deb stable/main/binary-alpha/python-libxml2_2.6.27.dfsg-2_alpha.deb stable/main/binary-alpha/libxml2_2.6.27.dfsg-2_alpha.deb stable/main/binary-alpha/libxml2-dbg_2.6.27.dfsg-2_alpha.deb libxml2 (2.6.27.dfsg-2) stable-security; urgency=high * Fix CVE-2007-6284 stable/main/source/libxml2_2.6.27.dfsg-2.dsc stable/main/binary-i386/libxml2-utils_2.6.27.dfsg-2_i386.deb stable/main/binary-i386/libxml2_2.6.27.dfsg-2_i386.deb stable/main/binary-all/libxml2-doc_2.6.27.dfsg-2_all.deb stable/main/source/libxml2_2.6.27.dfsg-2.diff.gz stable/main/binary-i386/libxml2-dev_2.6.27.dfsg-2_i386.deb stable/main/binary-i386/python-libxml2_2.6.27.dfsg-2_i386.deb stable/main/binary-i386/libxml2-dbg_2.6.27.dfsg-2_i386.deb libxml2 (2.6.27.dfsg-2) stable-security; urgency=high * Fix CVE-2007-6284 stable/main/binary-sparc/libxfont1-dbg_1.2.2-2.etch1_sparc.deb stable/main/binary-sparc/libxfont1_1.2.2-2.etch1_sparc.deb stable/main/binary-sparc/libxfont-dev_1.2.2-2.etch1_sparc.deb libxfont (1:1.2.2-2.etch1) stable-security; urgency=high * Security update * Fix a buffer overflow in the PCF font handler (fd.o bug#13526). stable/main/binary-s390/libxfont-dev_1.2.2-2.etch1_s390.deb stable/main/binary-s390/libxfont1_1.2.2-2.etch1_s390.deb stable/main/binary-s390/libxfont1-dbg_1.2.2-2.etch1_s390.deb libxfont (1:1.2.2-2.etch1) stable-security; urgency=high * Security update * Fix a buffer overflow in the PCF font handler (fd.o bug#13526). stable/main/binary-powerpc/libxfont1_1.2.2-2.etch1_powerpc.deb stable/main/binary-powerpc/libxfont1-dbg_1.2.2-2.etch1_powerpc.deb stable/main/binary-powerpc/libxfont-dev_1.2.2-2.etch1_powerpc.deb libxfont (1:1.2.2-2.etch1) stable-security; urgency=high * Security update * Fix a buffer overflow in the PCF font handler (fd.o bug#13526). stable/main/binary-mipsel/libxfont-dev_1.2.2-2.etch1_mipsel.deb stable/main/binary-mipsel/libxfont1_1.2.2-2.etch1_mipsel.deb stable/main/binary-mipsel/libxfont1-dbg_1.2.2-2.etch1_mipsel.deb libxfont (1:1.2.2-2.etch1) stable-security; urgency=high * Security update * Fix a buffer overflow in the PCF font handler (fd.o bug#13526). stable/main/binary-mips/libxfont1-dbg_1.2.2-2.etch1_mips.deb stable/main/binary-mips/libxfont-dev_1.2.2-2.etch1_mips.deb stable/main/binary-mips/libxfont1_1.2.2-2.etch1_mips.deb libxfont (1:1.2.2-2.etch1) stable-security; urgency=high * Security update * Fix a buffer overflow in the PCF font handler (fd.o bug#13526). stable/main/binary-ia64/libxfont1-dbg_1.2.2-2.etch1_ia64.deb stable/main/binary-ia64/libxfont1_1.2.2-2.etch1_ia64.deb stable/main/binary-ia64/libxfont-dev_1.2.2-2.etch1_ia64.deb libxfont (1:1.2.2-2.etch1) stable-security; urgency=high * Security update * Fix a buffer overflow in the PCF font handler (fd.o bug#13526). stable/main/binary-hppa/libxfont1-dbg_1.2.2-2.etch1_hppa.deb stable/main/binary-hppa/libxfont-dev_1.2.2-2.etch1_hppa.deb stable/main/binary-hppa/libxfont1_1.2.2-2.etch1_hppa.deb libxfont (1:1.2.2-2.etch1) stable-security; urgency=high * Security update * Fix a buffer overflow in the PCF font handler (fd.o bug#13526). stable/main/binary-arm/libxfont1-dbg_1.2.2-2.etch1_arm.deb stable/main/binary-arm/libxfont-dev_1.2.2-2.etch1_arm.deb stable/main/binary-arm/libxfont1_1.2.2-2.etch1_arm.deb libxfont (1:1.2.2-2.etch1) stable-security; urgency=high * Security update * Fix a buffer overflow in the PCF font handler (fd.o bug#13526). stable/main/binary-amd64/libxfont1-dbg_1.2.2-2.etch1_amd64.deb stable/main/binary-amd64/libxfont-dev_1.2.2-2.etch1_amd64.deb stable/main/binary-amd64/libxfont1_1.2.2-2.etch1_amd64.deb libxfont (1:1.2.2-2.etch1) stable-security; urgency=high * Security update * Fix a buffer overflow in the PCF font handler (fd.o bug#13526). stable/main/binary-alpha/libxfont1-dbg_1.2.2-2.etch1_alpha.deb stable/main/binary-alpha/libxfont1_1.2.2-2.etch1_alpha.deb stable/main/binary-alpha/libxfont-dev_1.2.2-2.etch1_alpha.deb libxfont (1:1.2.2-2.etch1) stable-security; urgency=high * Security update * Fix a buffer overflow in the PCF font handler (fd.o bug#13526). stable/main/source/libxfont_1.2.2-2.etch1.dsc stable/main/binary-i386/libxfont-dev_1.2.2-2.etch1_i386.deb stable/main/binary-i386/libxfont1_1.2.2-2.etch1_i386.deb stable/main/source/libxfont_1.2.2-2.etch1.diff.gz stable/main/binary-i386/libxfont1-dbg_1.2.2-2.etch1_i386.deb libxfont (1:1.2.2-2.etch1) stable-security; urgency=high * Security update * Fix a buffer overflow in the PCF font handler (fd.o bug#13526). stable/main/binary-sparc/libvorbis0a_1.1.2.dfsg-1.3_sparc.deb stable/main/binary-sparc/libvorbisenc2_1.1.2.dfsg-1.3_sparc.deb stable/main/binary-sparc/libvorbisfile3_1.1.2.dfsg-1.3_sparc.deb stable/main/binary-sparc/libvorbis-dev_1.1.2.dfsg-1.3_sparc.deb libvorbis (1.1.2.dfsg-1.3) stable-security; urgency=low * Fix CVE-2007-3106 CVE-2007-4029 CVE-2007-4065 CVE-2007-4066 stable/main/binary-s390/libvorbisenc2_1.1.2.dfsg-1.3_s390.deb stable/main/binary-s390/libvorbisfile3_1.1.2.dfsg-1.3_s390.deb stable/main/binary-s390/libvorbis-dev_1.1.2.dfsg-1.3_s390.deb stable/main/binary-s390/libvorbis0a_1.1.2.dfsg-1.3_s390.deb libvorbis (1.1.2.dfsg-1.3) stable-security; urgency=low * Fix CVE-2007-3106 CVE-2007-4029 CVE-2007-4065 CVE-2007-4066 stable/main/binary-powerpc/libvorbisenc2_1.1.2.dfsg-1.3_powerpc.deb stable/main/binary-powerpc/libvorbisfile3_1.1.2.dfsg-1.3_powerpc.deb stable/main/binary-powerpc/libvorbis0a_1.1.2.dfsg-1.3_powerpc.deb stable/main/binary-powerpc/libvorbis-dev_1.1.2.dfsg-1.3_powerpc.deb libvorbis (1.1.2.dfsg-1.3) stable-security; urgency=low * Fix CVE-2007-3106 CVE-2007-4029 CVE-2007-4065 CVE-2007-4066 stable/main/binary-mipsel/libvorbis0a_1.1.2.dfsg-1.3_mipsel.deb stable/main/binary-mipsel/libvorbisfile3_1.1.2.dfsg-1.3_mipsel.deb stable/main/binary-mipsel/libvorbisenc2_1.1.2.dfsg-1.3_mipsel.deb stable/main/binary-mipsel/libvorbis-dev_1.1.2.dfsg-1.3_mipsel.deb libvorbis (1.1.2.dfsg-1.3) stable-security; urgency=low * Fix CVE-2007-3106 CVE-2007-4029 CVE-2007-4065 CVE-2007-4066 stable/main/binary-mips/libvorbisfile3_1.1.2.dfsg-1.3_mips.deb stable/main/binary-mips/libvorbis0a_1.1.2.dfsg-1.3_mips.deb stable/main/binary-mips/libvorbisenc2_1.1.2.dfsg-1.3_mips.deb stable/main/binary-mips/libvorbis-dev_1.1.2.dfsg-1.3_mips.deb libvorbis (1.1.2.dfsg-1.3) stable-security; urgency=low * Fix CVE-2007-3106 CVE-2007-4029 CVE-2007-4065 CVE-2007-4066 stable/main/binary-ia64/libvorbis0a_1.1.2.dfsg-1.3_ia64.deb stable/main/binary-ia64/libvorbis-dev_1.1.2.dfsg-1.3_ia64.deb stable/main/binary-ia64/libvorbisenc2_1.1.2.dfsg-1.3_ia64.deb stable/main/binary-ia64/libvorbisfile3_1.1.2.dfsg-1.3_ia64.deb libvorbis (1.1.2.dfsg-1.3) stable-security; urgency=low * Fix CVE-2007-3106 CVE-2007-4029 CVE-2007-4065 CVE-2007-4066 stable/main/binary-hppa/libvorbisfile3_1.1.2.dfsg-1.3_hppa.deb stable/main/binary-hppa/libvorbis0a_1.1.2.dfsg-1.3_hppa.deb stable/main/binary-hppa/libvorbisenc2_1.1.2.dfsg-1.3_hppa.deb stable/main/binary-hppa/libvorbis-dev_1.1.2.dfsg-1.3_hppa.deb libvorbis (1.1.2.dfsg-1.3) stable-security; urgency=low * Fix CVE-2007-3106 CVE-2007-4029 CVE-2007-4065 CVE-2007-4066 stable/main/binary-arm/libvorbisenc2_1.1.2.dfsg-1.3_arm.deb stable/main/binary-arm/libvorbis-dev_1.1.2.dfsg-1.3_arm.deb stable/main/binary-arm/libvorbisfile3_1.1.2.dfsg-1.3_arm.deb stable/main/binary-arm/libvorbis0a_1.1.2.dfsg-1.3_arm.deb libvorbis (1.1.2.dfsg-1.3) stable-security; urgency=low * Fix CVE-2007-3106 CVE-2007-4029 CVE-2007-4065 CVE-2007-4066 stable/main/binary-amd64/libvorbisenc2_1.1.2.dfsg-1.3_amd64.deb stable/main/binary-amd64/libvorbisfile3_1.1.2.dfsg-1.3_amd64.deb stable/main/binary-amd64/libvorbis0a_1.1.2.dfsg-1.3_amd64.deb stable/main/binary-amd64/libvorbis-dev_1.1.2.dfsg-1.3_amd64.deb libvorbis (1.1.2.dfsg-1.3) stable-security; urgency=low * Fix CVE-2007-3106 CVE-2007-4029 CVE-2007-4065 CVE-2007-4066 stable/main/binary-alpha/libvorbisfile3_1.1.2.dfsg-1.3_alpha.deb stable/main/binary-alpha/libvorbis0a_1.1.2.dfsg-1.3_alpha.deb stable/main/binary-alpha/libvorbisenc2_1.1.2.dfsg-1.3_alpha.deb stable/main/binary-alpha/libvorbis-dev_1.1.2.dfsg-1.3_alpha.deb libvorbis (1.1.2.dfsg-1.3) stable-security; urgency=low * Fix CVE-2007-3106 CVE-2007-4029 CVE-2007-4065 CVE-2007-4066 stable/main/binary-i386/libvorbisenc2_1.1.2.dfsg-1.3_i386.deb stable/main/binary-i386/libvorbis0a_1.1.2.dfsg-1.3_i386.deb stable/main/source/libvorbis_1.1.2.dfsg-1.3.diff.gz stable/main/binary-i386/libvorbis-dev_1.1.2.dfsg-1.3_i386.deb stable/main/source/libvorbis_1.1.2.dfsg-1.3.dsc stable/main/binary-i386/libvorbisfile3_1.1.2.dfsg-1.3_i386.deb libvorbis (1.1.2.dfsg-1.3) stable-security; urgency=low * Fix CVE-2007-3106 CVE-2007-4029 CVE-2007-4065 CVE-2007-4066 stable/main/binary-sparc/sndfile-programs_1.0.16-2_sparc.deb stable/main/binary-sparc/libsndfile1_1.0.16-2_sparc.deb stable/main/binary-sparc/libsndfile1-dev_1.0.16-2_sparc.deb libsndfile (1.0.16-2) stable-security; urgency=high * Fix buffer overflow in FLAC code. (CVE-2007-4974) stable/main/binary-s390/libsndfile1-dev_1.0.16-2_s390.deb stable/main/binary-s390/sndfile-programs_1.0.16-2_s390.deb stable/main/binary-s390/libsndfile1_1.0.16-2_s390.deb libsndfile (1.0.16-2) stable-security; urgency=high * Fix buffer overflow in FLAC code. (CVE-2007-4974) stable/main/binary-powerpc/libsndfile1_1.0.16-2_powerpc.deb stable/main/binary-powerpc/libsndfile1-dev_1.0.16-2_powerpc.deb stable/main/binary-powerpc/sndfile-programs_1.0.16-2_powerpc.deb libsndfile (1.0.16-2) stable-security; urgency=high * Fix buffer overflow in FLAC code. (CVE-2007-4974) stable/main/binary-mipsel/sndfile-programs_1.0.16-2_mipsel.deb stable/main/binary-mipsel/libsndfile1-dev_1.0.16-2_mipsel.deb stable/main/binary-mipsel/libsndfile1_1.0.16-2_mipsel.deb libsndfile (1.0.16-2) stable-security; urgency=high * Fix buffer overflow in FLAC code. (CVE-2007-4974) stable/main/binary-mips/libsndfile1_1.0.16-2_mips.deb stable/main/binary-mips/libsndfile1-dev_1.0.16-2_mips.deb stable/main/binary-mips/sndfile-programs_1.0.16-2_mips.deb libsndfile (1.0.16-2) stable-security; urgency=high * Fix buffer overflow in FLAC code. (CVE-2007-4974) stable/main/binary-ia64/libsndfile1_1.0.16-2_ia64.deb stable/main/binary-ia64/libsndfile1-dev_1.0.16-2_ia64.deb stable/main/binary-ia64/sndfile-programs_1.0.16-2_ia64.deb libsndfile (1.0.16-2) stable-security; urgency=high * Fix buffer overflow in FLAC code. (CVE-2007-4974) stable/main/binary-hppa/sndfile-programs_1.0.16-2_hppa.deb stable/main/binary-hppa/libsndfile1_1.0.16-2_hppa.deb stable/main/binary-hppa/libsndfile1-dev_1.0.16-2_hppa.deb libsndfile (1.0.16-2) stable-security; urgency=high * Fix buffer overflow in FLAC code. (CVE-2007-4974) stable/main/binary-arm/sndfile-programs_1.0.16-2_arm.deb stable/main/binary-arm/libsndfile1-dev_1.0.16-2_arm.deb stable/main/binary-arm/libsndfile1_1.0.16-2_arm.deb libsndfile (1.0.16-2) stable-security; urgency=high * Fix buffer overflow in FLAC code. (CVE-2007-4974) stable/main/binary-amd64/sndfile-programs_1.0.16-2_amd64.deb stable/main/binary-amd64/libsndfile1_1.0.16-2_amd64.deb stable/main/binary-amd64/libsndfile1-dev_1.0.16-2_amd64.deb libsndfile (1.0.16-2) stable-security; urgency=high * Fix buffer overflow in FLAC code. (CVE-2007-4974) stable/main/binary-alpha/libsndfile1-dev_1.0.16-2_alpha.deb stable/main/binary-alpha/libsndfile1_1.0.16-2_alpha.deb stable/main/binary-alpha/sndfile-programs_1.0.16-2_alpha.deb libsndfile (1.0.16-2) stable-security; urgency=high * Fix buffer overflow in FLAC code. (CVE-2007-4974) stable/main/source/libsndfile_1.0.16-2.dsc stable/main/binary-i386/sndfile-programs_1.0.16-2_i386.deb stable/main/binary-i386/libsndfile1-dev_1.0.16-2_i386.deb stable/main/binary-i386/libsndfile1_1.0.16-2_i386.deb stable/main/source/libsndfile_1.0.16-2.diff.gz libsndfile (1.0.16-2) stable-security; urgency=high * Fix buffer overflow in FLAC code. (CVE-2007-4974) stable/main/binary-sparc/libexif12_0.6.13-5etch2_sparc.deb stable/main/binary-sparc/libexif-dev_0.6.13-5etch2_sparc.deb libexif (0.6.13-5etch2) stable-security; urgency=high * Fix CVE-2007-2645, CVE-2007-6151, CVE-2007-6253 plus two crash bugs. stable/main/binary-s390/libexif12_0.6.13-5etch2_s390.deb stable/main/binary-s390/libexif-dev_0.6.13-5etch2_s390.deb libexif (0.6.13-5etch2) stable-security; urgency=high * Fix CVE-2007-2645, CVE-2007-6151, CVE-2007-6253 plus two crash bugs. stable/main/binary-powerpc/libexif12_0.6.13-5etch2_powerpc.deb stable/main/binary-powerpc/libexif-dev_0.6.13-5etch2_powerpc.deb libexif (0.6.13-5etch2) stable-security; urgency=high * Fix CVE-2007-2645, CVE-2007-6151, CVE-2007-6253 plus two crash bugs. stable/main/binary-mipsel/libexif12_0.6.13-5etch2_mipsel.deb stable/main/binary-mipsel/libexif-dev_0.6.13-5etch2_mipsel.deb libexif (0.6.13-5etch2) stable-security; urgency=high * Fix CVE-2007-2645, CVE-2007-6151, CVE-2007-6253 plus two crash bugs. stable/main/binary-mips/libexif-dev_0.6.13-5etch2_mips.deb stable/main/binary-mips/libexif12_0.6.13-5etch2_mips.deb libexif (0.6.13-5etch2) stable-security; urgency=high * Fix CVE-2007-2645, CVE-2007-6151, CVE-2007-6253 plus two crash bugs. stable/main/binary-ia64/libexif12_0.6.13-5etch2_ia64.deb stable/main/binary-ia64/libexif-dev_0.6.13-5etch2_ia64.deb libexif (0.6.13-5etch2) stable-security; urgency=high * Fix CVE-2007-2645, CVE-2007-6151, CVE-2007-6253 plus two crash bugs. stable/main/binary-hppa/libexif12_0.6.13-5etch2_hppa.deb stable/main/binary-hppa/libexif-dev_0.6.13-5etch2_hppa.deb libexif (0.6.13-5etch2) stable-security; urgency=high * Fix CVE-2007-2645, CVE-2007-6151, CVE-2007-6253 plus two crash bugs. stable/main/binary-arm/libexif12_0.6.13-5etch2_arm.deb stable/main/binary-arm/libexif-dev_0.6.13-5etch2_arm.deb libexif (0.6.13-5etch2) stable-security; urgency=high * Fix CVE-2007-2645, CVE-2007-6151, CVE-2007-6253 plus two crash bugs. stable/main/binary-amd64/libexif-dev_0.6.13-5etch2_amd64.deb stable/main/binary-amd64/libexif12_0.6.13-5etch2_amd64.deb libexif (0.6.13-5etch2) stable-security; urgency=high * Fix CVE-2007-2645, CVE-2007-6151, CVE-2007-6253 plus two crash bugs. stable/main/binary-alpha/libexif12_0.6.13-5etch2_alpha.deb stable/main/binary-alpha/libexif-dev_0.6.13-5etch2_alpha.deb libexif (0.6.13-5etch2) stable-security; urgency=high * Fix CVE-2007-2645, CVE-2007-6151, CVE-2007-6253 plus two crash bugs. stable/main/binary-i386/libexif12_0.6.13-5etch2_i386.deb stable/main/binary-i386/libexif-dev_0.6.13-5etch2_i386.deb stable/main/source/libexif_0.6.13-5etch2.dsc stable/main/source/libexif_0.6.13-5etch2.diff.gz libexif (0.6.13-5etch2) stable-security; urgency=high * Fix CVE-2007-2645, CVE-2007-6151, CVE-2007-6253 plus two crash bugs. stable/main/binary-sparc/libchipcard2-tools_2.1.9-3_sparc.deb stable/main/binary-sparc/libchipcard2-0c2_2.1.9-3_sparc.deb stable/main/binary-sparc/libchipcard2-libgwenhywfar38-plugins_2.1.9-3_sparc.deb libchipcard2 (2.1.9-3) stable; urgency=low * Let libchipcard2-0c2 depend on libchipcard2-data. Otherwise applications linking against libchipcard2 suffer from segfaults when libchipcard2-data is not installed (closes: #457412). * Set myself as maintainer. Thanks to Thomas for his contributions so far. stable/main/binary-s390/libchipcard2-libgwenhywfar38-plugins_2.1.9-3_s390.deb stable/main/binary-s390/libchipcard2-tools_2.1.9-3_s390.deb stable/main/binary-s390/libchipcard2-0c2_2.1.9-3_s390.deb libchipcard2 (2.1.9-3) stable; urgency=low * Let libchipcard2-0c2 depend on libchipcard2-data. Otherwise applications linking against libchipcard2 suffer from segfaults when libchipcard2-data is not installed (closes: #457412). * Set myself as maintainer. Thanks to Thomas for his contributions so far. stable/main/binary-powerpc/libchipcard2-0c2_2.1.9-3_powerpc.deb stable/main/binary-powerpc/libchipcard2-tools_2.1.9-3_powerpc.deb stable/main/binary-powerpc/libchipcard2-libgwenhywfar38-plugins_2.1.9-3_powerpc.deb libchipcard2 (2.1.9-3) stable; urgency=low * Let libchipcard2-0c2 depend on libchipcard2-data. Otherwise applications linking against libchipcard2 suffer from segfaults when libchipcard2-data is not installed (closes: #457412). * Set myself as maintainer. Thanks to Thomas for his contributions so far. stable/main/binary-mipsel/libchipcard2-libgwenhywfar38-plugins_2.1.9-3_mipsel.deb stable/main/binary-mipsel/libchipcard2-0c2_2.1.9-3_mipsel.deb stable/main/binary-mipsel/libchipcard2-tools_2.1.9-3_mipsel.deb libchipcard2 (2.1.9-3) stable; urgency=low * Let libchipcard2-0c2 depend on libchipcard2-data. Otherwise applications linking against libchipcard2 suffer from segfaults when libchipcard2-data is not installed (closes: #457412). * Set myself as maintainer. Thanks to Thomas for his contributions so far. stable/main/binary-mips/libchipcard2-tools_2.1.9-3_mips.deb stable/main/binary-mips/libchipcard2-libgwenhywfar38-plugins_2.1.9-3_mips.deb stable/main/binary-mips/libchipcard2-0c2_2.1.9-3_mips.deb libchipcard2 (2.1.9-3) stable; urgency=low * Let libchipcard2-0c2 depend on libchipcard2-data. Otherwise applications linking against libchipcard2 suffer from segfaults when libchipcard2-data is not installed (closes: #457412). * Set myself as maintainer. Thanks to Thomas for his contributions so far. stable/main/binary-ia64/libchipcard2-libgwenhywfar38-plugins_2.1.9-3_ia64.deb stable/main/binary-ia64/libchipcard2-0c2_2.1.9-3_ia64.deb stable/main/binary-ia64/libchipcard2-tools_2.1.9-3_ia64.deb libchipcard2 (2.1.9-3) stable; urgency=low * Let libchipcard2-0c2 depend on libchipcard2-data. Otherwise applications linking against libchipcard2 suffer from segfaults when libchipcard2-data is not installed (closes: #457412). * Set myself as maintainer. Thanks to Thomas for his contributions so far. stable/main/binary-hppa/libchipcard2-libgwenhywfar38-plugins_2.1.9-3_hppa.deb stable/main/binary-hppa/libchipcard2-tools_2.1.9-3_hppa.deb stable/main/binary-hppa/libchipcard2-0c2_2.1.9-3_hppa.deb libchipcard2 (2.1.9-3) stable; urgency=low * Let libchipcard2-0c2 depend on libchipcard2-data. Otherwise applications linking against libchipcard2 suffer from segfaults when libchipcard2-data is not installed (closes: #457412). * Set myself as maintainer. Thanks to Thomas for his contributions so far. stable/main/binary-arm/libchipcard2-libgwenhywfar38-plugins_2.1.9-3_arm.deb stable/main/binary-arm/libchipcard2-tools_2.1.9-3_arm.deb stable/main/binary-arm/libchipcard2-0c2_2.1.9-3_arm.deb libchipcard2 (2.1.9-3) stable; urgency=low * Let libchipcard2-0c2 depend on libchipcard2-data. Otherwise applications linking against libchipcard2 suffer from segfaults when libchipcard2-data is not installed (closes: #457412). * Set myself as maintainer. Thanks to Thomas for his contributions so far. stable/main/binary-amd64/libchipcard2-libgwenhywfar38-plugins_2.1.9-3_amd64.deb stable/main/binary-amd64/libchipcard2-tools_2.1.9-3_amd64.deb stable/main/binary-amd64/libchipcard2-0c2_2.1.9-3_amd64.deb libchipcard2 (2.1.9-3) stable; urgency=low * Let libchipcard2-0c2 depend on libchipcard2-data. Otherwise applications linking against libchipcard2 suffer from segfaults when libchipcard2-data is not installed (closes: #457412). * Set myself as maintainer. Thanks to Thomas for his contributions so far. stable/main/binary-alpha/libchipcard2-tools_2.1.9-3_alpha.deb stable/main/binary-alpha/libchipcard2-libgwenhywfar38-plugins_2.1.9-3_alpha.deb stable/main/binary-alpha/libchipcard2-0c2_2.1.9-3_alpha.deb libchipcard2 (2.1.9-3) stable; urgency=low * Let libchipcard2-0c2 depend on libchipcard2-data. Otherwise applications linking against libchipcard2 suffer from segfaults when libchipcard2-data is not installed (closes: #457412). * Set myself as maintainer. Thanks to Thomas for his contributions so far. stable/main/binary-i386/libchipcard2-0c2_2.1.9-3_i386.deb stable/main/source/libchipcard2_2.1.9-3.dsc stable/main/binary-i386/libchipcard2-tools_2.1.9-3_i386.deb stable/main/source/libchipcard2_2.1.9-3.diff.gz stable/main/binary-all/libchipcard2-dev_2.1.9-3_all.deb stable/main/binary-i386/libchipcard2-libgwenhywfar38-plugins_2.1.9-3_i386.deb stable/main/binary-all/libchipcard2-data_2.1.9-3_all.deb libchipcard2 (2.1.9-3) stable; urgency=low * Let libchipcard2-0c2 depend on libchipcard2-data. Otherwise applications linking against libchipcard2 suffer from segfaults when libchipcard2-data is not installed (closes: #457412). * Set myself as maintainer. Thanks to Thomas for his contributions so far. stable/main/binary-sparc/bsdtar_1.2.53-2etch1_sparc.deb stable/main/binary-sparc/libarchive1_1.2.53-2etch1_sparc.deb stable/main/binary-sparc/libarchive-dev_1.2.53-2etch1_sparc.deb libarchive (1.2.53-2etch1) stable-security; urgency=high * Non-maintainer upload by the security team * Fix buffer overflow, NULL pointer reference and DoS in archive_read_support_format_tar.c Fixes: CVE-2007-3641, CVE-2007-3644, CVE-2007-3645 stable/main/binary-s390/bsdtar_1.2.53-2etch1_s390.deb stable/main/binary-s390/libarchive-dev_1.2.53-2etch1_s390.deb stable/main/binary-s390/libarchive1_1.2.53-2etch1_s390.deb libarchive (1.2.53-2etch1) stable-security; urgency=high * Non-maintainer upload by the security team * Fix buffer overflow, NULL pointer reference and DoS in archive_read_support_format_tar.c Fixes: CVE-2007-3641, CVE-2007-3644, CVE-2007-3645 stable/main/binary-powerpc/libarchive-dev_1.2.53-2etch1_powerpc.deb stable/main/binary-powerpc/bsdtar_1.2.53-2etch1_powerpc.deb stable/main/binary-powerpc/libarchive1_1.2.53-2etch1_powerpc.deb libarchive (1.2.53-2etch1) stable-security; urgency=high * Non-maintainer upload by the security team * Fix buffer overflow, NULL pointer reference and DoS in archive_read_support_format_tar.c Fixes: CVE-2007-3641, CVE-2007-3644, CVE-2007-3645 stable/main/binary-mipsel/libarchive-dev_1.2.53-2etch1_mipsel.deb stable/main/binary-mipsel/libarchive1_1.2.53-2etch1_mipsel.deb stable/main/binary-mipsel/bsdtar_1.2.53-2etch1_mipsel.deb libarchive (1.2.53-2etch1) stable-security; urgency=high * Non-maintainer upload by the security team * Fix buffer overflow, NULL pointer reference and DoS in archive_read_support_format_tar.c Fixes: CVE-2007-3641, CVE-2007-3644, CVE-2007-3645 stable/main/binary-mips/bsdtar_1.2.53-2etch1_mips.deb stable/main/binary-mips/libarchive-dev_1.2.53-2etch1_mips.deb stable/main/binary-mips/libarchive1_1.2.53-2etch1_mips.deb libarchive (1.2.53-2etch1) stable-security; urgency=high * Non-maintainer upload by the security team * Fix buffer overflow, NULL pointer reference and DoS in archive_read_support_format_tar.c Fixes: CVE-2007-3641, CVE-2007-3644, CVE-2007-3645 stable/main/binary-ia64/libarchive-dev_1.2.53-2etch1_ia64.deb stable/main/binary-ia64/libarchive1_1.2.53-2etch1_ia64.deb stable/main/binary-ia64/bsdtar_1.2.53-2etch1_ia64.deb libarchive (1.2.53-2etch1) stable-security; urgency=high * Non-maintainer upload by the security team * Fix buffer overflow, NULL pointer reference and DoS in archive_read_support_format_tar.c Fixes: CVE-2007-3641, CVE-2007-3644, CVE-2007-3645 stable/main/binary-hppa/bsdtar_1.2.53-2etch1_hppa.deb stable/main/binary-hppa/libarchive1_1.2.53-2etch1_hppa.deb stable/main/binary-hppa/libarchive-dev_1.2.53-2etch1_hppa.deb libarchive (1.2.53-2etch1) stable-security; urgency=high * Non-maintainer upload by the security team * Fix buffer overflow, NULL pointer reference and DoS in archive_read_support_format_tar.c Fixes: CVE-2007-3641, CVE-2007-3644, CVE-2007-3645 stable/main/binary-arm/libarchive1_1.2.53-2etch1_arm.deb stable/main/binary-arm/bsdtar_1.2.53-2etch1_arm.deb stable/main/binary-arm/libarchive-dev_1.2.53-2etch1_arm.deb libarchive (1.2.53-2etch1) stable-security; urgency=high * Non-maintainer upload by the security team * Fix buffer overflow, NULL pointer reference and DoS in archive_read_support_format_tar.c Fixes: CVE-2007-3641, CVE-2007-3644, CVE-2007-3645 stable/main/binary-amd64/bsdtar_1.2.53-2etch1_amd64.deb stable/main/binary-amd64/libarchive-dev_1.2.53-2etch1_amd64.deb stable/main/binary-amd64/libarchive1_1.2.53-2etch1_amd64.deb libarchive (1.2.53-2etch1) stable-security; urgency=high * Non-maintainer upload by the security team * Fix buffer overflow, NULL pointer reference and DoS in archive_read_support_format_tar.c Fixes: CVE-2007-3641, CVE-2007-3644, CVE-2007-3645 stable/main/binary-alpha/libarchive-dev_1.2.53-2etch1_alpha.deb stable/main/binary-alpha/bsdtar_1.2.53-2etch1_alpha.deb stable/main/binary-alpha/libarchive1_1.2.53-2etch1_alpha.deb libarchive (1.2.53-2etch1) stable-security; urgency=high * Non-maintainer upload by the security team * Fix buffer overflow, NULL pointer reference and DoS in archive_read_support_format_tar.c Fixes: CVE-2007-3641, CVE-2007-3644, CVE-2007-3645 stable/main/binary-i386/libarchive1_1.2.53-2etch1_i386.deb stable/main/source/libarchive_1.2.53-2etch1.diff.gz stable/main/binary-i386/libarchive-dev_1.2.53-2etch1_i386.deb stable/main/binary-i386/bsdtar_1.2.53-2etch1_i386.deb stable/main/source/libarchive_1.2.53-2etch1.dsc libarchive (1.2.53-2etch1) stable-security; urgency=high * Non-maintainer upload by the security team * Fix buffer overflow, NULL pointer reference and DoS in archive_read_support_format_tar.c Fixes: CVE-2007-3641, CVE-2007-3644, CVE-2007-3645 stable/main/binary-sparc/kregexpeditor_3.5.5-3etch1_sparc.deb stable/main/binary-sparc/ktimer_3.5.5-3etch1_sparc.deb stable/main/binary-sparc/kdeutils-dev_3.5.5-3etch1_sparc.deb stable/main/binary-sparc/khexedit_3.5.5-3etch1_sparc.deb stable/main/binary-sparc/kfloppy_3.5.5-3etch1_sparc.deb stable/main/binary-sparc/kcharselect_3.5.5-3etch1_sparc.deb stable/main/binary-sparc/kdf_3.5.5-3etch1_sparc.deb stable/main/binary-sparc/klaptopdaemon_3.5.5-3etch1_sparc.deb stable/main/binary-sparc/ark_3.5.5-3etch1_sparc.deb stable/main/binary-sparc/kgpg_3.5.5-3etch1_sparc.deb stable/main/binary-sparc/kdessh_3.5.5-3etch1_sparc.deb stable/main/binary-sparc/kdeutils-dbg_3.5.5-3etch1_sparc.deb stable/main/binary-sparc/ksim_3.5.5-3etch1_sparc.deb stable/main/binary-sparc/kcalc_3.5.5-3etch1_sparc.deb stable/main/binary-sparc/superkaramba_3.5.5-3etch1_sparc.deb stable/main/binary-sparc/kdelirc_3.5.5-3etch1_sparc.deb stable/main/binary-sparc/kwalletmanager_3.5.5-3etch1_sparc.deb stable/main/binary-sparc/kedit_3.5.5-3etch1_sparc.deb stable/main/binary-sparc/kmilo_3.5.5-3etch1_sparc.deb stable/main/binary-sparc/kjots_3.5.5-3etch1_sparc.deb kdeutils (4:3.5.5-3etch1) stable; urgency=low * Add patch 17_klaptopdaemon_lock_and_hibernate to avoid unauthorised access when the system is supposed to be locked and hibernated. (Closes: #416824) stable/main/binary-s390/kcharselect_3.5.5-3etch1_s390.deb stable/main/binary-s390/kdelirc_3.5.5-3etch1_s390.deb stable/main/binary-s390/ark_3.5.5-3etch1_s390.deb stable/main/binary-s390/kedit_3.5.5-3etch1_s390.deb stable/main/binary-s390/ksim_3.5.5-3etch1_s390.deb stable/main/binary-s390/kdessh_3.5.5-3etch1_s390.deb stable/main/binary-s390/kcalc_3.5.5-3etch1_s390.deb stable/main/binary-s390/khexedit_3.5.5-3etch1_s390.deb stable/main/binary-s390/kwalletmanager_3.5.5-3etch1_s390.deb stable/main/binary-s390/kdeutils-dev_3.5.5-3etch1_s390.deb stable/main/binary-s390/kdeutils-dbg_3.5.5-3etch1_s390.deb stable/main/binary-s390/kmilo_3.5.5-3etch1_s390.deb stable/main/binary-s390/klaptopdaemon_3.5.5-3etch1_s390.deb stable/main/binary-s390/kjots_3.5.5-3etch1_s390.deb stable/main/binary-s390/kdf_3.5.5-3etch1_s390.deb stable/main/binary-s390/ktimer_3.5.5-3etch1_s390.deb stable/main/binary-s390/superkaramba_3.5.5-3etch1_s390.deb stable/main/binary-s390/kgpg_3.5.5-3etch1_s390.deb stable/main/binary-s390/kfloppy_3.5.5-3etch1_s390.deb stable/main/binary-s390/kregexpeditor_3.5.5-3etch1_s390.deb kdeutils (4:3.5.5-3etch1) stable; urgency=low * Add patch 17_klaptopdaemon_lock_and_hibernate to avoid unauthorised access when the system is supposed to be locked and hibernated. (Closes: #416824) stable/main/binary-powerpc/kedit_3.5.5-3etch1_powerpc.deb stable/main/binary-powerpc/ark_3.5.5-3etch1_powerpc.deb stable/main/binary-powerpc/kgpg_3.5.5-3etch1_powerpc.deb stable/main/binary-powerpc/kfloppy_3.5.5-3etch1_powerpc.deb stable/main/binary-powerpc/ksim_3.5.5-3etch1_powerpc.deb stable/main/binary-powerpc/kdeutils-dbg_3.5.5-3etch1_powerpc.deb stable/main/binary-powerpc/klaptopdaemon_3.5.5-3etch1_powerpc.deb stable/main/binary-powerpc/kdessh_3.5.5-3etch1_powerpc.deb stable/main/binary-powerpc/kcharselect_3.5.5-3etch1_powerpc.deb stable/main/binary-powerpc/ktimer_3.5.5-3etch1_powerpc.deb stable/main/binary-powerpc/kdf_3.5.5-3etch1_powerpc.deb stable/main/binary-powerpc/kwalletmanager_3.5.5-3etch1_powerpc.deb stable/main/binary-powerpc/kdelirc_3.5.5-3etch1_powerpc.deb stable/main/binary-powerpc/kdeutils-dev_3.5.5-3etch1_powerpc.deb stable/main/binary-powerpc/kcalc_3.5.5-3etch1_powerpc.deb stable/main/binary-powerpc/kmilo_3.5.5-3etch1_powerpc.deb stable/main/binary-powerpc/kregexpeditor_3.5.5-3etch1_powerpc.deb stable/main/binary-powerpc/superkaramba_3.5.5-3etch1_powerpc.deb stable/main/binary-powerpc/khexedit_3.5.5-3etch1_powerpc.deb stable/main/binary-powerpc/kjots_3.5.5-3etch1_powerpc.deb kdeutils (4:3.5.5-3etch1) stable; urgency=low * Add patch 17_klaptopdaemon_lock_and_hibernate to avoid unauthorised access when the system is supposed to be locked and hibernated. (Closes: #416824) stable/main/binary-mipsel/kdelirc_3.5.5-3etch1_mipsel.deb stable/main/binary-mipsel/kcharselect_3.5.5-3etch1_mipsel.deb stable/main/binary-mipsel/kedit_3.5.5-3etch1_mipsel.deb stable/main/binary-mipsel/kjots_3.5.5-3etch1_mipsel.deb stable/main/binary-mipsel/kdeutils-dbg_3.5.5-3etch1_mipsel.deb stable/main/binary-mipsel/kdf_3.5.5-3etch1_mipsel.deb stable/main/binary-mipsel/kgpg_3.5.5-3etch1_mipsel.deb stable/main/binary-mipsel/ark_3.5.5-3etch1_mipsel.deb stable/main/binary-mipsel/ksim_3.5.5-3etch1_mipsel.deb stable/main/binary-mipsel/kmilo_3.5.5-3etch1_mipsel.deb stable/main/binary-mipsel/superkaramba_3.5.5-3etch1_mipsel.deb stable/main/binary-mipsel/kdessh_3.5.5-3etch1_mipsel.deb stable/main/binary-mipsel/kcalc_3.5.5-3etch1_mipsel.deb stable/main/binary-mipsel/ktimer_3.5.5-3etch1_mipsel.deb stable/main/binary-mipsel/khexedit_3.5.5-3etch1_mipsel.deb stable/main/binary-mipsel/kdeutils-dev_3.5.5-3etch1_mipsel.deb stable/main/binary-mipsel/klaptopdaemon_3.5.5-3etch1_mipsel.deb stable/main/binary-mipsel/kwalletmanager_3.5.5-3etch1_mipsel.deb stable/main/binary-mipsel/kregexpeditor_3.5.5-3etch1_mipsel.deb stable/main/binary-mipsel/kfloppy_3.5.5-3etch1_mipsel.deb kdeutils (4:3.5.5-3etch1) stable; urgency=low * Add patch 17_klaptopdaemon_lock_and_hibernate to avoid unauthorised access when the system is supposed to be locked and hibernated. (Closes: #416824) stable/main/binary-mips/kjots_3.5.5-3etch1_mips.deb stable/main/binary-mips/kdf_3.5.5-3etch1_mips.deb stable/main/binary-mips/khexedit_3.5.5-3etch1_mips.deb stable/main/binary-mips/kedit_3.5.5-3etch1_mips.deb stable/main/binary-mips/kcharselect_3.5.5-3etch1_mips.deb stable/main/binary-mips/superkaramba_3.5.5-3etch1_mips.deb stable/main/binary-mips/kdeutils-dbg_3.5.5-3etch1_mips.deb stable/main/binary-mips/kdeutils-dev_3.5.5-3etch1_mips.deb stable/main/binary-mips/ksim_3.5.5-3etch1_mips.deb stable/main/binary-mips/klaptopdaemon_3.5.5-3etch1_mips.deb stable/main/binary-mips/kdessh_3.5.5-3etch1_mips.deb stable/main/binary-mips/ark_3.5.5-3etch1_mips.deb stable/main/binary-mips/kregexpeditor_3.5.5-3etch1_mips.deb stable/main/binary-mips/ktimer_3.5.5-3etch1_mips.deb stable/main/binary-mips/kfloppy_3.5.5-3etch1_mips.deb stable/main/binary-mips/kgpg_3.5.5-3etch1_mips.deb stable/main/binary-mips/kdelirc_3.5.5-3etch1_mips.deb stable/main/binary-mips/kcalc_3.5.5-3etch1_mips.deb stable/main/binary-mips/kwalletmanager_3.5.5-3etch1_mips.deb stable/main/binary-mips/kmilo_3.5.5-3etch1_mips.deb kdeutils (4:3.5.5-3etch1) stable; urgency=low * Add patch 17_klaptopdaemon_lock_and_hibernate to avoid unauthorised access when the system is supposed to be locked and hibernated. (Closes: #416824) stable/main/binary-ia64/kcharselect_3.5.5-3etch1_ia64.deb stable/main/binary-ia64/ark_3.5.5-3etch1_ia64.deb stable/main/binary-ia64/kjots_3.5.5-3etch1_ia64.deb stable/main/binary-ia64/kdf_3.5.5-3etch1_ia64.deb stable/main/binary-ia64/ksim_3.5.5-3etch1_ia64.deb stable/main/binary-ia64/kgpg_3.5.5-3etch1_ia64.deb stable/main/binary-ia64/kcalc_3.5.5-3etch1_ia64.deb stable/main/binary-ia64/kedit_3.5.5-3etch1_ia64.deb stable/main/binary-ia64/kdeutils-dev_3.5.5-3etch1_ia64.deb stable/main/binary-ia64/kdessh_3.5.5-3etch1_ia64.deb stable/main/binary-ia64/kdelirc_3.5.5-3etch1_ia64.deb stable/main/binary-ia64/kdeutils-dbg_3.5.5-3etch1_ia64.deb stable/main/binary-ia64/klaptopdaemon_3.5.5-3etch1_ia64.deb stable/main/binary-ia64/khexedit_3.5.5-3etch1_ia64.deb stable/main/binary-ia64/ktimer_3.5.5-3etch1_ia64.deb stable/main/binary-ia64/kfloppy_3.5.5-3etch1_ia64.deb stable/main/binary-ia64/superkaramba_3.5.5-3etch1_ia64.deb stable/main/binary-ia64/kmilo_3.5.5-3etch1_ia64.deb stable/main/binary-ia64/kwalletmanager_3.5.5-3etch1_ia64.deb stable/main/binary-ia64/kregexpeditor_3.5.5-3etch1_ia64.deb kdeutils (4:3.5.5-3etch1) stable; urgency=low * Add patch 17_klaptopdaemon_lock_and_hibernate to avoid unauthorised access when the system is supposed to be locked and hibernated. (Closes: #416824) stable/main/binary-i386/kdeutils-dev_3.5.5-3etch1_i386.deb stable/main/binary-i386/kwalletmanager_3.5.5-3etch1_i386.deb stable/main/binary-i386/superkaramba_3.5.5-3etch1_i386.deb stable/main/binary-i386/kfloppy_3.5.5-3etch1_i386.deb stable/main/binary-i386/ktimer_3.5.5-3etch1_i386.deb stable/main/binary-i386/kmilo_3.5.5-3etch1_i386.deb stable/main/binary-i386/kdessh_3.5.5-3etch1_i386.deb stable/main/binary-i386/kregexpeditor_3.5.5-3etch1_i386.deb stable/main/binary-i386/kgpg_3.5.5-3etch1_i386.deb stable/main/binary-i386/kdf_3.5.5-3etch1_i386.deb stable/main/binary-i386/khexedit_3.5.5-3etch1_i386.deb stable/main/binary-i386/kedit_3.5.5-3etch1_i386.deb stable/main/binary-i386/kjots_3.5.5-3etch1_i386.deb stable/main/binary-i386/kdeutils-dbg_3.5.5-3etch1_i386.deb stable/main/binary-i386/kcalc_3.5.5-3etch1_i386.deb stable/main/binary-i386/klaptopdaemon_3.5.5-3etch1_i386.deb stable/main/binary-i386/kdelirc_3.5.5-3etch1_i386.deb stable/main/binary-i386/ksim_3.5.5-3etch1_i386.deb stable/main/binary-i386/kcharselect_3.5.5-3etch1_i386.deb stable/main/binary-i386/ark_3.5.5-3etch1_i386.deb kdeutils (4:3.5.5-3etch1) stable; urgency=low * Add patch 17_klaptopdaemon_lock_and_hibernate to avoid unauthorised access when the system is supposed to be locked and hibernated. (Closes: #416824) stable/main/binary-hppa/kmilo_3.5.5-3etch1_hppa.deb stable/main/binary-hppa/khexedit_3.5.5-3etch1_hppa.deb stable/main/binary-hppa/kregexpeditor_3.5.5-3etch1_hppa.deb stable/main/binary-hppa/ark_3.5.5-3etch1_hppa.deb stable/main/binary-hppa/ktimer_3.5.5-3etch1_hppa.deb stable/main/binary-hppa/kjots_3.5.5-3etch1_hppa.deb stable/main/binary-hppa/kdf_3.5.5-3etch1_hppa.deb stable/main/binary-hppa/kdeutils-dev_3.5.5-3etch1_hppa.deb stable/main/binary-hppa/kcalc_3.5.5-3etch1_hppa.deb stable/main/binary-hppa/kcharselect_3.5.5-3etch1_hppa.deb stable/main/binary-hppa/kgpg_3.5.5-3etch1_hppa.deb stable/main/binary-hppa/kdelirc_3.5.5-3etch1_hppa.deb stable/main/binary-hppa/klaptopdaemon_3.5.5-3etch1_hppa.deb stable/main/binary-hppa/kdeutils-dbg_3.5.5-3etch1_hppa.deb stable/main/binary-hppa/kfloppy_3.5.5-3etch1_hppa.deb stable/main/binary-hppa/ksim_3.5.5-3etch1_hppa.deb stable/main/binary-hppa/kedit_3.5.5-3etch1_hppa.deb stable/main/binary-hppa/superkaramba_3.5.5-3etch1_hppa.deb stable/main/binary-hppa/kwalletmanager_3.5.5-3etch1_hppa.deb stable/main/binary-hppa/kdessh_3.5.5-3etch1_hppa.deb kdeutils (4:3.5.5-3etch1) stable; urgency=low * Add patch 17_klaptopdaemon_lock_and_hibernate to avoid unauthorised access when the system is supposed to be locked and hibernated. (Closes: #416824) stable/main/binary-alpha/kwalletmanager_3.5.5-3etch1_alpha.deb stable/main/binary-alpha/kregexpeditor_3.5.5-3etch1_alpha.deb stable/main/binary-alpha/kdelirc_3.5.5-3etch1_alpha.deb stable/main/binary-alpha/ksim_3.5.5-3etch1_alpha.deb stable/main/binary-alpha/superkaramba_3.5.5-3etch1_alpha.deb stable/main/binary-alpha/khexedit_3.5.5-3etch1_alpha.deb stable/main/binary-alpha/kcharselect_3.5.5-3etch1_alpha.deb stable/main/binary-alpha/kgpg_3.5.5-3etch1_alpha.deb stable/main/binary-alpha/kmilo_3.5.5-3etch1_alpha.deb stable/main/binary-alpha/ark_3.5.5-3etch1_alpha.deb stable/main/binary-alpha/kdeutils-dbg_3.5.5-3etch1_alpha.deb stable/main/binary-alpha/klaptopdaemon_3.5.5-3etch1_alpha.deb stable/main/binary-alpha/kdeutils-dev_3.5.5-3etch1_alpha.deb stable/main/binary-alpha/kdessh_3.5.5-3etch1_alpha.deb stable/main/binary-alpha/kdf_3.5.5-3etch1_alpha.deb stable/main/binary-alpha/kjots_3.5.5-3etch1_alpha.deb stable/main/binary-alpha/kcalc_3.5.5-3etch1_alpha.deb stable/main/binary-alpha/ktimer_3.5.5-3etch1_alpha.deb stable/main/binary-alpha/kedit_3.5.5-3etch1_alpha.deb stable/main/binary-alpha/kfloppy_3.5.5-3etch1_alpha.deb kdeutils (4:3.5.5-3etch1) stable; urgency=low * Add patch 17_klaptopdaemon_lock_and_hibernate to avoid unauthorised access when the system is supposed to be locked and hibernated. (Closes: #416824) stable/main/binary-amd64/kdf_3.5.5-3etch1_amd64.deb stable/main/binary-amd64/kjots_3.5.5-3etch1_amd64.deb stable/main/binary-amd64/kcalc_3.5.5-3etch1_amd64.deb stable/main/source/kdeutils_3.5.5-3etch1.diff.gz stable/main/binary-amd64/klaptopdaemon_3.5.5-3etch1_amd64.deb stable/main/binary-amd64/ksim_3.5.5-3etch1_amd64.deb stable/main/binary-amd64/kedit_3.5.5-3etch1_amd64.deb stable/main/binary-amd64/kregexpeditor_3.5.5-3etch1_amd64.deb stable/main/binary-all/kdeutils_3.5.5-3etch1_all.deb stable/main/binary-amd64/kgpg_3.5.5-3etch1_amd64.deb stable/main/binary-amd64/ark_3.5.5-3etch1_amd64.deb stable/main/binary-amd64/superkaramba_3.5.5-3etch1_amd64.deb stable/main/binary-amd64/kdeutils-dev_3.5.5-3etch1_amd64.deb stable/main/binary-amd64/kdessh_3.5.5-3etch1_amd64.deb stable/main/source/kdeutils_3.5.5-3etch1.dsc stable/main/binary-amd64/kfloppy_3.5.5-3etch1_amd64.deb stable/main/binary-amd64/khexedit_3.5.5-3etch1_amd64.deb stable/main/binary-amd64/kmilo_3.5.5-3etch1_amd64.deb stable/main/binary-amd64/kdeutils-dbg_3.5.5-3etch1_amd64.deb stable/main/binary-all/kdeutils-doc_3.5.5-3etch1_all.deb stable/main/binary-all/kdeutils-doc-html_3.5.5-3etch1_all.deb stable/main/binary-amd64/ktimer_3.5.5-3etch1_amd64.deb stable/main/binary-amd64/kwalletmanager_3.5.5-3etch1_amd64.deb stable/main/binary-amd64/kcharselect_3.5.5-3etch1_amd64.deb stable/main/binary-amd64/kdelirc_3.5.5-3etch1_amd64.deb kdeutils (4:3.5.5-3etch1) stable; urgency=low * Add patch 17_klaptopdaemon_lock_and_hibernate to avoid unauthorised access when the system is supposed to be locked and hibernated. (Closes: #416824) stable/main/binary-sparc/kdelibs4c2a_3.5.5a.dfsg.1-8etch1_sparc.deb stable/main/binary-sparc/kdelibs4-dev_3.5.5a.dfsg.1-8etch1_sparc.deb stable/main/binary-sparc/kdelibs-dbg_3.5.5a.dfsg.1-8etch1_sparc.deb kdelibs (4:3.5.5a.dfsg.1-8etch1) stable; urgency=low * Add patch to support latest flash plugin. It consists of 2 parts patches. This is the first part. Second part is in kdebase. stable/main/binary-s390/kdelibs4c2a_3.5.5a.dfsg.1-8etch1_s390.deb stable/main/binary-s390/kdelibs4-dev_3.5.5a.dfsg.1-8etch1_s390.deb stable/main/binary-s390/kdelibs-dbg_3.5.5a.dfsg.1-8etch1_s390.deb kdelibs (4:3.5.5a.dfsg.1-8etch1) stable; urgency=low * Add patch to support latest flash plugin. It consists of 2 parts patches. This is the first part. Second part is in kdebase. stable/main/binary-powerpc/kdelibs-dbg_3.5.5a.dfsg.1-8etch1_powerpc.deb stable/main/binary-powerpc/kdelibs4-dev_3.5.5a.dfsg.1-8etch1_powerpc.deb stable/main/binary-powerpc/kdelibs4c2a_3.5.5a.dfsg.1-8etch1_powerpc.deb kdelibs (4:3.5.5a.dfsg.1-8etch1) stable; urgency=low * Add patch to support latest flash plugin. It consists of 2 parts patches. This is the first part. Second part is in kdebase. stable/main/binary-mipsel/kdelibs-dbg_3.5.5a.dfsg.1-8etch1_mipsel.deb stable/main/binary-mipsel/kdelibs4-dev_3.5.5a.dfsg.1-8etch1_mipsel.deb stable/main/binary-mipsel/kdelibs4c2a_3.5.5a.dfsg.1-8etch1_mipsel.deb kdelibs (4:3.5.5a.dfsg.1-8etch1) stable; urgency=low * Add patch to support latest flash plugin. It consists of 2 parts patches. This is the first part. Second part is in kdebase. stable/main/binary-mips/kdelibs4c2a_3.5.5a.dfsg.1-8etch1_mips.deb stable/main/binary-mips/kdelibs4-dev_3.5.5a.dfsg.1-8etch1_mips.deb stable/main/binary-mips/kdelibs-dbg_3.5.5a.dfsg.1-8etch1_mips.deb kdelibs (4:3.5.5a.dfsg.1-8etch1) stable; urgency=low * Add patch to support latest flash plugin. It consists of 2 parts patches. This is the first part. Second part is in kdebase. stable/main/binary-ia64/kdelibs4-dev_3.5.5a.dfsg.1-8etch1_ia64.deb stable/main/binary-ia64/kdelibs4c2a_3.5.5a.dfsg.1-8etch1_ia64.deb stable/main/binary-ia64/kdelibs-dbg_3.5.5a.dfsg.1-8etch1_ia64.deb kdelibs (4:3.5.5a.dfsg.1-8etch1) stable; urgency=low * Add patch to support latest flash plugin. It consists of 2 parts patches. This is the first part. Second part is in kdebase. stable/main/binary-i386/kdelibs-dbg_3.5.5a.dfsg.1-8etch1_i386.deb stable/main/binary-i386/kdelibs4-dev_3.5.5a.dfsg.1-8etch1_i386.deb stable/main/binary-i386/kdelibs4c2a_3.5.5a.dfsg.1-8etch1_i386.deb kdelibs (4:3.5.5a.dfsg.1-8etch1) stable; urgency=low * Add patch to support latest flash plugin. It consists of 2 parts patches. This is the first part. Second part is in kdebase. stable/main/binary-hppa/kdelibs4c2a_3.5.5a.dfsg.1-8etch1_hppa.deb stable/main/binary-hppa/kdelibs4-dev_3.5.5a.dfsg.1-8etch1_hppa.deb stable/main/binary-hppa/kdelibs-dbg_3.5.5a.dfsg.1-8etch1_hppa.deb kdelibs (4:3.5.5a.dfsg.1-8etch1) stable; urgency=low * Add patch to support latest flash plugin. It consists of 2 parts patches. This is the first part. Second part is in kdebase. stable/main/binary-arm/kdelibs4c2a_3.5.5a.dfsg.1-8etch1_arm.deb stable/main/binary-arm/kdelibs-dbg_3.5.5a.dfsg.1-8etch1_arm.deb stable/main/binary-arm/kdelibs4-dev_3.5.5a.dfsg.1-8etch1_arm.deb kdelibs (4:3.5.5a.dfsg.1-8etch1) stable; urgency=low * Add patch to support latest flash plugin. It consists of 2 parts patches. This is the first part. Second part is in kdebase. stable/main/binary-alpha/kdelibs4c2a_3.5.5a.dfsg.1-8etch1_alpha.deb stable/main/binary-alpha/kdelibs-dbg_3.5.5a.dfsg.1-8etch1_alpha.deb stable/main/binary-alpha/kdelibs4-dev_3.5.5a.dfsg.1-8etch1_alpha.deb kdelibs (4:3.5.5a.dfsg.1-8etch1) stable; urgency=low * Add patch to support latest flash plugin. It consists of 2 parts patches. This is the first part. Second part is in kdebase. stable/main/source/kdelibs_3.5.5a.dfsg.1-8etch1.dsc stable/main/source/kdelibs_3.5.5a.dfsg.1-8etch1.diff.gz stable/main/binary-amd64/kdelibs4c2a_3.5.5a.dfsg.1-8etch1_amd64.deb stable/main/binary-amd64/kdelibs4-dev_3.5.5a.dfsg.1-8etch1_amd64.deb stable/main/binary-all/kdelibs4-doc_3.5.5a.dfsg.1-8etch1_all.deb stable/main/binary-all/kdelibs_3.5.5a.dfsg.1-8etch1_all.deb stable/main/binary-amd64/kdelibs-dbg_3.5.5a.dfsg.1-8etch1_amd64.deb stable/main/binary-all/kdelibs-data_3.5.5a.dfsg.1-8etch1_all.deb kdelibs (4:3.5.5a.dfsg.1-8etch1) stable; urgency=low * Add patch to support latest flash plugin. It consists of 2 parts patches. This is the first part. Second part is in kdebase. stable/main/binary-sparc/khelpcenter_3.5.5a.dfsg.1-6etch2_sparc.deb stable/main/binary-sparc/kpersonalizer_3.5.5a.dfsg.1-6etch2_sparc.deb stable/main/binary-sparc/kmenuedit_3.5.5a.dfsg.1-6etch2_sparc.deb stable/main/binary-sparc/kpager_3.5.5a.dfsg.1-6etch2_sparc.deb stable/main/binary-sparc/kdeprint_3.5.5a.dfsg.1-6etch2_sparc.deb stable/main/binary-sparc/kwin_3.5.5a.dfsg.1-6etch2_sparc.deb stable/main/binary-sparc/kdesktop_3.5.5a.dfsg.1-6etch2_sparc.deb stable/main/binary-sparc/kcontrol_3.5.5a.dfsg.1-6etch2_sparc.deb stable/main/binary-sparc/kdebase-dev_3.5.5a.dfsg.1-6etch2_sparc.deb stable/main/binary-sparc/ksmserver_3.5.5a.dfsg.1-6etch2_sparc.deb stable/main/binary-sparc/klipper_3.5.5a.dfsg.1-6etch2_sparc.deb stable/main/binary-sparc/kdebase-dbg_3.5.5a.dfsg.1-6etch2_sparc.deb stable/main/binary-sparc/ksplash_3.5.5a.dfsg.1-6etch2_sparc.deb stable/main/binary-sparc/ktip_3.5.5a.dfsg.1-6etch2_sparc.deb stable/main/binary-sparc/kdepasswd_3.5.5a.dfsg.1-6etch2_sparc.deb stable/main/binary-sparc/konsole_3.5.5a.dfsg.1-6etch2_sparc.deb stable/main/binary-sparc/ksysguardd_3.5.5a.dfsg.1-6etch2_sparc.deb stable/main/binary-sparc/kdm_3.5.5a.dfsg.1-6etch2_sparc.deb stable/main/binary-sparc/kdebase-kio-plugins_3.5.5a.dfsg.1-6etch2_sparc.deb stable/main/binary-sparc/kdebase-bin_3.5.5a.dfsg.1-6etch2_sparc.deb stable/main/binary-sparc/konqueror_3.5.5a.dfsg.1-6etch2_sparc.deb stable/main/binary-sparc/kicker_3.5.5a.dfsg.1-6etch2_sparc.deb stable/main/binary-sparc/libkonq4-dev_3.5.5a.dfsg.1-6etch2_sparc.deb stable/main/binary-sparc/konqueror-nsplugins_3.5.5a.dfsg.1-6etch2_sparc.deb stable/main/binary-sparc/ksysguard_3.5.5a.dfsg.1-6etch2_sparc.deb stable/main/binary-sparc/kappfinder_3.5.5a.dfsg.1-6etch2_sparc.deb stable/main/binary-sparc/kfind_3.5.5a.dfsg.1-6etch2_sparc.deb stable/main/binary-sparc/kate_3.5.5a.dfsg.1-6etch2_sparc.deb stable/main/binary-sparc/libkonq4_3.5.5a.dfsg.1-6etch2_sparc.deb kdebase (4:3.5.5a.dfsg.1-6etch2) stable; urgency=low * Add patch to support latest flash plugin. It consists of 2 parts patches. This is the second part. First part is in kdelibs. (Closes: #455689) * Add patch to fix regression in kcontrol administrator mode introduced by the changes done in the flash plugin patch: - Do not put kcontrol's own widgets inside of QXEmbed. * Add nsplugins viewer 64bit fix. (Closes: #444214) stable/main/binary-s390/kwin_3.5.5a.dfsg.1-6etch2_s390.deb stable/main/binary-s390/kicker_3.5.5a.dfsg.1-6etch2_s390.deb stable/main/binary-s390/kdebase-kio-plugins_3.5.5a.dfsg.1-6etch2_s390.deb stable/main/binary-s390/klipper_3.5.5a.dfsg.1-6etch2_s390.deb stable/main/binary-s390/kappfinder_3.5.5a.dfsg.1-6etch2_s390.deb stable/main/binary-s390/ksmserver_3.5.5a.dfsg.1-6etch2_s390.deb stable/main/binary-s390/kdesktop_3.5.5a.dfsg.1-6etch2_s390.deb stable/main/binary-s390/libkonq4-dev_3.5.5a.dfsg.1-6etch2_s390.deb stable/main/binary-s390/kdm_3.5.5a.dfsg.1-6etch2_s390.deb stable/main/binary-s390/khelpcenter_3.5.5a.dfsg.1-6etch2_s390.deb stable/main/binary-s390/kdepasswd_3.5.5a.dfsg.1-6etch2_s390.deb stable/main/binary-s390/kdebase-bin_3.5.5a.dfsg.1-6etch2_s390.deb stable/main/binary-s390/kfind_3.5.5a.dfsg.1-6etch2_s390.deb stable/main/binary-s390/ksysguard_3.5.5a.dfsg.1-6etch2_s390.deb stable/main/binary-s390/kdebase-dbg_3.5.5a.dfsg.1-6etch2_s390.deb stable/main/binary-s390/ktip_3.5.5a.dfsg.1-6etch2_s390.deb stable/main/binary-s390/kmenuedit_3.5.5a.dfsg.1-6etch2_s390.deb stable/main/binary-s390/kdeprint_3.5.5a.dfsg.1-6etch2_s390.deb stable/main/binary-s390/ksysguardd_3.5.5a.dfsg.1-6etch2_s390.deb stable/main/binary-s390/kdebase-dev_3.5.5a.dfsg.1-6etch2_s390.deb stable/main/binary-s390/libkonq4_3.5.5a.dfsg.1-6etch2_s390.deb stable/main/binary-s390/kpager_3.5.5a.dfsg.1-6etch2_s390.deb stable/main/binary-s390/kate_3.5.5a.dfsg.1-6etch2_s390.deb stable/main/binary-s390/konqueror-nsplugins_3.5.5a.dfsg.1-6etch2_s390.deb stable/main/binary-s390/kpersonalizer_3.5.5a.dfsg.1-6etch2_s390.deb stable/main/binary-s390/konsole_3.5.5a.dfsg.1-6etch2_s390.deb stable/main/binary-s390/konqueror_3.5.5a.dfsg.1-6etch2_s390.deb stable/main/binary-s390/kcontrol_3.5.5a.dfsg.1-6etch2_s390.deb stable/main/binary-s390/ksplash_3.5.5a.dfsg.1-6etch2_s390.deb kdebase (4:3.5.5a.dfsg.1-6etch2) stable; urgency=low * Add patch to support latest flash plugin. It consists of 2 parts patches. This is the second part. First part is in kdelibs. (Closes: #455689) * Add patch to fix regression in kcontrol administrator mode introduced by the changes done in the flash plugin patch: - Do not put kcontrol's own widgets inside of QXEmbed. * Add nsplugins viewer 64bit fix. (Closes: #444214) stable/main/binary-powerpc/ksysguardd_3.5.5a.dfsg.1-6etch2_powerpc.deb stable/main/binary-powerpc/kdebase-bin_3.5.5a.dfsg.1-6etch2_powerpc.deb stable/main/binary-powerpc/kdeprint_3.5.5a.dfsg.1-6etch2_powerpc.deb stable/main/binary-powerpc/libkonq4-dev_3.5.5a.dfsg.1-6etch2_powerpc.deb stable/main/binary-powerpc/kappfinder_3.5.5a.dfsg.1-6etch2_powerpc.deb stable/main/binary-powerpc/kpager_3.5.5a.dfsg.1-6etch2_powerpc.deb stable/main/binary-powerpc/kate_3.5.5a.dfsg.1-6etch2_powerpc.deb stable/main/binary-powerpc/kpersonalizer_3.5.5a.dfsg.1-6etch2_powerpc.deb stable/main/binary-powerpc/kdebase-kio-plugins_3.5.5a.dfsg.1-6etch2_powerpc.deb stable/main/binary-powerpc/kdebase-dbg_3.5.5a.dfsg.1-6etch2_powerpc.deb stable/main/binary-powerpc/kmenuedit_3.5.5a.dfsg.1-6etch2_powerpc.deb stable/main/binary-powerpc/ktip_3.5.5a.dfsg.1-6etch2_powerpc.deb stable/main/binary-powerpc/ksysguard_3.5.5a.dfsg.1-6etch2_powerpc.deb stable/main/binary-powerpc/konqueror_3.5.5a.dfsg.1-6etch2_powerpc.deb stable/main/binary-powerpc/konsole_3.5.5a.dfsg.1-6etch2_powerpc.deb stable/main/binary-powerpc/konqueror-nsplugins_3.5.5a.dfsg.1-6etch2_powerpc.deb stable/main/binary-powerpc/kdepasswd_3.5.5a.dfsg.1-6etch2_powerpc.deb stable/main/binary-powerpc/klipper_3.5.5a.dfsg.1-6etch2_powerpc.deb stable/main/binary-powerpc/khelpcenter_3.5.5a.dfsg.1-6etch2_powerpc.deb stable/main/binary-powerpc/kdesktop_3.5.5a.dfsg.1-6etch2_powerpc.deb stable/main/binary-powerpc/kdebase-dev_3.5.5a.dfsg.1-6etch2_powerpc.deb stable/main/binary-powerpc/ksmserver_3.5.5a.dfsg.1-6etch2_powerpc.deb stable/main/binary-powerpc/kcontrol_3.5.5a.dfsg.1-6etch2_powerpc.deb stable/main/binary-powerpc/kicker_3.5.5a.dfsg.1-6etch2_powerpc.deb stable/main/binary-powerpc/kwin_3.5.5a.dfsg.1-6etch2_powerpc.deb stable/main/binary-powerpc/libkonq4_3.5.5a.dfsg.1-6etch2_powerpc.deb stable/main/binary-powerpc/kdm_3.5.5a.dfsg.1-6etch2_powerpc.deb stable/main/binary-powerpc/ksplash_3.5.5a.dfsg.1-6etch2_powerpc.deb stable/main/binary-powerpc/kfind_3.5.5a.dfsg.1-6etch2_powerpc.deb kdebase (4:3.5.5a.dfsg.1-6etch2) stable; urgency=low * Add patch to support latest flash plugin. It consists of 2 parts patches. This is the second part. First part is in kdelibs. (Closes: #455689) * Add patch to fix regression in kcontrol administrator mode introduced by the changes done in the flash plugin patch: - Do not put kcontrol's own widgets inside of QXEmbed. * Add nsplugins viewer 64bit fix. (Closes: #444214) stable/main/binary-mipsel/kappfinder_3.5.5a.dfsg.1-6etch2_mipsel.deb stable/main/binary-mipsel/kate_3.5.5a.dfsg.1-6etch2_mipsel.deb stable/main/binary-mipsel/ksmserver_3.5.5a.dfsg.1-6etch2_mipsel.deb stable/main/binary-mipsel/ksysguardd_3.5.5a.dfsg.1-6etch2_mipsel.deb stable/main/binary-mipsel/kmenuedit_3.5.5a.dfsg.1-6etch2_mipsel.deb stable/main/binary-mipsel/kcontrol_3.5.5a.dfsg.1-6etch2_mipsel.deb stable/main/binary-mipsel/kdesktop_3.5.5a.dfsg.1-6etch2_mipsel.deb stable/main/binary-mipsel/kpersonalizer_3.5.5a.dfsg.1-6etch2_mipsel.deb stable/main/binary-mipsel/kdm_3.5.5a.dfsg.1-6etch2_mipsel.deb stable/main/binary-mipsel/libkonq4_3.5.5a.dfsg.1-6etch2_mipsel.deb stable/main/binary-mipsel/ksysguard_3.5.5a.dfsg.1-6etch2_mipsel.deb stable/main/binary-mipsel/kdeprint_3.5.5a.dfsg.1-6etch2_mipsel.deb stable/main/binary-mipsel/ktip_3.5.5a.dfsg.1-6etch2_mipsel.deb stable/main/binary-mipsel/kwin_3.5.5a.dfsg.1-6etch2_mipsel.deb stable/main/binary-mipsel/konqueror-nsplugins_3.5.5a.dfsg.1-6etch2_mipsel.deb stable/main/binary-mipsel/klipper_3.5.5a.dfsg.1-6etch2_mipsel.deb stable/main/binary-mipsel/kpager_3.5.5a.dfsg.1-6etch2_mipsel.deb stable/main/binary-mipsel/ksplash_3.5.5a.dfsg.1-6etch2_mipsel.deb stable/main/binary-mipsel/libkonq4-dev_3.5.5a.dfsg.1-6etch2_mipsel.deb stable/main/binary-mipsel/kdebase-kio-plugins_3.5.5a.dfsg.1-6etch2_mipsel.deb stable/main/binary-mipsel/khelpcenter_3.5.5a.dfsg.1-6etch2_mipsel.deb stable/main/binary-mipsel/kdebase-bin_3.5.5a.dfsg.1-6etch2_mipsel.deb stable/main/binary-mipsel/konsole_3.5.5a.dfsg.1-6etch2_mipsel.deb stable/main/binary-mipsel/kfind_3.5.5a.dfsg.1-6etch2_mipsel.deb stable/main/binary-mipsel/konqueror_3.5.5a.dfsg.1-6etch2_mipsel.deb stable/main/binary-mipsel/kdebase-dev_3.5.5a.dfsg.1-6etch2_mipsel.deb stable/main/binary-mipsel/kicker_3.5.5a.dfsg.1-6etch2_mipsel.deb stable/main/binary-mipsel/kdepasswd_3.5.5a.dfsg.1-6etch2_mipsel.deb stable/main/binary-mipsel/kdebase-dbg_3.5.5a.dfsg.1-6etch2_mipsel.deb kdebase (4:3.5.5a.dfsg.1-6etch2) stable; urgency=low * Add patch to support latest flash plugin. It consists of 2 parts patches. This is the second part. First part is in kdelibs. (Closes: #455689) * Add patch to fix regression in kcontrol administrator mode introduced by the changes done in the flash plugin patch: - Do not put kcontrol's own widgets inside of QXEmbed. * Add nsplugins viewer 64bit fix. (Closes: #444214) stable/main/binary-mips/kwin_3.5.5a.dfsg.1-6etch2_mips.deb stable/main/binary-mips/konsole_3.5.5a.dfsg.1-6etch2_mips.deb stable/main/binary-mips/konqueror_3.5.5a.dfsg.1-6etch2_mips.deb stable/main/binary-mips/kpersonalizer_3.5.5a.dfsg.1-6etch2_mips.deb stable/main/binary-mips/klipper_3.5.5a.dfsg.1-6etch2_mips.deb stable/main/binary-mips/kdesktop_3.5.5a.dfsg.1-6etch2_mips.deb stable/main/binary-mips/kdm_3.5.5a.dfsg.1-6etch2_mips.deb stable/main/binary-mips/kdepasswd_3.5.5a.dfsg.1-6etch2_mips.deb stable/main/binary-mips/ktip_3.5.5a.dfsg.1-6etch2_mips.deb stable/main/binary-mips/konqueror-nsplugins_3.5.5a.dfsg.1-6etch2_mips.deb stable/main/binary-mips/kpager_3.5.5a.dfsg.1-6etch2_mips.deb stable/main/binary-mips/ksysguardd_3.5.5a.dfsg.1-6etch2_mips.deb stable/main/binary-mips/ksplash_3.5.5a.dfsg.1-6etch2_mips.deb stable/main/binary-mips/kdebase-bin_3.5.5a.dfsg.1-6etch2_mips.deb stable/main/binary-mips/kdeprint_3.5.5a.dfsg.1-6etch2_mips.deb stable/main/binary-mips/ksysguard_3.5.5a.dfsg.1-6etch2_mips.deb stable/main/binary-mips/khelpcenter_3.5.5a.dfsg.1-6etch2_mips.deb stable/main/binary-mips/kdebase-dbg_3.5.5a.dfsg.1-6etch2_mips.deb stable/main/binary-mips/kappfinder_3.5.5a.dfsg.1-6etch2_mips.deb stable/main/binary-mips/kdebase-kio-plugins_3.5.5a.dfsg.1-6etch2_mips.deb stable/main/binary-mips/libkonq4-dev_3.5.5a.dfsg.1-6etch2_mips.deb stable/main/binary-mips/libkonq4_3.5.5a.dfsg.1-6etch2_mips.deb stable/main/binary-mips/kcontrol_3.5.5a.dfsg.1-6etch2_mips.deb stable/main/binary-mips/kfind_3.5.5a.dfsg.1-6etch2_mips.deb stable/main/binary-mips/kate_3.5.5a.dfsg.1-6etch2_mips.deb stable/main/binary-mips/ksmserver_3.5.5a.dfsg.1-6etch2_mips.deb stable/main/binary-mips/kicker_3.5.5a.dfsg.1-6etch2_mips.deb stable/main/binary-mips/kdebase-dev_3.5.5a.dfsg.1-6etch2_mips.deb stable/main/binary-mips/kmenuedit_3.5.5a.dfsg.1-6etch2_mips.deb kdebase (4:3.5.5a.dfsg.1-6etch2) stable; urgency=low * Add patch to support latest flash plugin. It consists of 2 parts patches. This is the second part. First part is in kdelibs. (Closes: #455689) * Add patch to fix regression in kcontrol administrator mode introduced by the changes done in the flash plugin patch: - Do not put kcontrol's own widgets inside of QXEmbed. * Add nsplugins viewer 64bit fix. (Closes: #444214) stable/main/binary-ia64/kpersonalizer_3.5.5a.dfsg.1-6etch2_ia64.deb stable/main/binary-ia64/kdebase-kio-plugins_3.5.5a.dfsg.1-6etch2_ia64.deb stable/main/binary-ia64/libkonq4_3.5.5a.dfsg.1-6etch2_ia64.deb stable/main/binary-ia64/kfind_3.5.5a.dfsg.1-6etch2_ia64.deb stable/main/binary-ia64/kdesktop_3.5.5a.dfsg.1-6etch2_ia64.deb stable/main/binary-ia64/konqueror-nsplugins_3.5.5a.dfsg.1-6etch2_ia64.deb stable/main/binary-ia64/ktip_3.5.5a.dfsg.1-6etch2_ia64.deb stable/main/binary-ia64/kdebase-dbg_3.5.5a.dfsg.1-6etch2_ia64.deb stable/main/binary-ia64/khelpcenter_3.5.5a.dfsg.1-6etch2_ia64.deb stable/main/binary-ia64/konqueror_3.5.5a.dfsg.1-6etch2_ia64.deb stable/main/binary-ia64/kdebase-bin_3.5.5a.dfsg.1-6etch2_ia64.deb stable/main/binary-ia64/ksysguardd_3.5.5a.dfsg.1-6etch2_ia64.deb stable/main/binary-ia64/ksysguard_3.5.5a.dfsg.1-6etch2_ia64.deb stable/main/binary-ia64/kicker_3.5.5a.dfsg.1-6etch2_ia64.deb stable/main/binary-ia64/kpager_3.5.5a.dfsg.1-6etch2_ia64.deb stable/main/binary-ia64/kmenuedit_3.5.5a.dfsg.1-6etch2_ia64.deb stable/main/binary-ia64/kcontrol_3.5.5a.dfsg.1-6etch2_ia64.deb stable/main/binary-ia64/kdepasswd_3.5.5a.dfsg.1-6etch2_ia64.deb stable/main/binary-ia64/kdeprint_3.5.5a.dfsg.1-6etch2_ia64.deb stable/main/binary-ia64/kdebase-dev_3.5.5a.dfsg.1-6etch2_ia64.deb stable/main/binary-ia64/kappfinder_3.5.5a.dfsg.1-6etch2_ia64.deb stable/main/binary-ia64/klipper_3.5.5a.dfsg.1-6etch2_ia64.deb stable/main/binary-ia64/kwin_3.5.5a.dfsg.1-6etch2_ia64.deb stable/main/binary-ia64/ksplash_3.5.5a.dfsg.1-6etch2_ia64.deb stable/main/binary-ia64/konsole_3.5.5a.dfsg.1-6etch2_ia64.deb stable/main/binary-ia64/ksmserver_3.5.5a.dfsg.1-6etch2_ia64.deb stable/main/binary-ia64/kate_3.5.5a.dfsg.1-6etch2_ia64.deb stable/main/binary-ia64/libkonq4-dev_3.5.5a.dfsg.1-6etch2_ia64.deb stable/main/binary-ia64/kdm_3.5.5a.dfsg.1-6etch2_ia64.deb kdebase (4:3.5.5a.dfsg.1-6etch2) stable; urgency=low * Add patch to support latest flash plugin. It consists of 2 parts patches. This is the second part. First part is in kdelibs. (Closes: #455689) * Add patch to fix regression in kcontrol administrator mode introduced by the changes done in the flash plugin patch: - Do not put kcontrol's own widgets inside of QXEmbed. * Add nsplugins viewer 64bit fix. (Closes: #444214) stable/main/binary-i386/ksplash_3.5.5a.dfsg.1-6etch2_i386.deb stable/main/binary-i386/kicker_3.5.5a.dfsg.1-6etch2_i386.deb stable/main/binary-i386/kdesktop_3.5.5a.dfsg.1-6etch2_i386.deb stable/main/binary-i386/kfind_3.5.5a.dfsg.1-6etch2_i386.deb stable/main/binary-i386/khelpcenter_3.5.5a.dfsg.1-6etch2_i386.deb stable/main/binary-i386/ksysguard_3.5.5a.dfsg.1-6etch2_i386.deb stable/main/binary-i386/kdepasswd_3.5.5a.dfsg.1-6etch2_i386.deb stable/main/binary-i386/libkonq4-dev_3.5.5a.dfsg.1-6etch2_i386.deb stable/main/binary-i386/kcontrol_3.5.5a.dfsg.1-6etch2_i386.deb stable/main/binary-i386/kdebase-dbg_3.5.5a.dfsg.1-6etch2_i386.deb stable/main/binary-i386/kate_3.5.5a.dfsg.1-6etch2_i386.deb stable/main/binary-i386/klipper_3.5.5a.dfsg.1-6etch2_i386.deb stable/main/binary-i386/kmenuedit_3.5.5a.dfsg.1-6etch2_i386.deb stable/main/binary-i386/ktip_3.5.5a.dfsg.1-6etch2_i386.deb stable/main/binary-i386/kwin_3.5.5a.dfsg.1-6etch2_i386.deb stable/main/binary-i386/kdeprint_3.5.5a.dfsg.1-6etch2_i386.deb stable/main/binary-i386/kpager_3.5.5a.dfsg.1-6etch2_i386.deb stable/main/binary-i386/konqueror_3.5.5a.dfsg.1-6etch2_i386.deb stable/main/binary-i386/konsole_3.5.5a.dfsg.1-6etch2_i386.deb stable/main/binary-i386/kdm_3.5.5a.dfsg.1-6etch2_i386.deb stable/main/binary-i386/kdebase-dev_3.5.5a.dfsg.1-6etch2_i386.deb stable/main/binary-i386/konqueror-nsplugins_3.5.5a.dfsg.1-6etch2_i386.deb stable/main/binary-i386/kappfinder_3.5.5a.dfsg.1-6etch2_i386.deb stable/main/binary-i386/ksysguardd_3.5.5a.dfsg.1-6etch2_i386.deb stable/main/binary-i386/ksmserver_3.5.5a.dfsg.1-6etch2_i386.deb stable/main/binary-i386/kdebase-bin_3.5.5a.dfsg.1-6etch2_i386.deb stable/main/binary-i386/kpersonalizer_3.5.5a.dfsg.1-6etch2_i386.deb stable/main/binary-i386/kdebase-kio-plugins_3.5.5a.dfsg.1-6etch2_i386.deb stable/main/binary-i386/libkonq4_3.5.5a.dfsg.1-6etch2_i386.deb kdebase (4:3.5.5a.dfsg.1-6etch2) stable; urgency=low * Add patch to support latest flash plugin. It consists of 2 parts patches. This is the second part. First part is in kdelibs. (Closes: #455689) * Add patch to fix regression in kcontrol administrator mode introduced by the changes done in the flash plugin patch: - Do not put kcontrol's own widgets inside of QXEmbed. * Add nsplugins viewer 64bit fix. (Closes: #444214) stable/main/binary-hppa/kicker_3.5.5a.dfsg.1-6etch2_hppa.deb stable/main/binary-hppa/ksysguardd_3.5.5a.dfsg.1-6etch2_hppa.deb stable/main/binary-hppa/kpersonalizer_3.5.5a.dfsg.1-6etch2_hppa.deb stable/main/binary-hppa/konqueror_3.5.5a.dfsg.1-6etch2_hppa.deb stable/main/binary-hppa/kdebase-dev_3.5.5a.dfsg.1-6etch2_hppa.deb stable/main/binary-hppa/kcontrol_3.5.5a.dfsg.1-6etch2_hppa.deb stable/main/binary-hppa/kmenuedit_3.5.5a.dfsg.1-6etch2_hppa.deb stable/main/binary-hppa/konsole_3.5.5a.dfsg.1-6etch2_hppa.deb stable/main/binary-hppa/kappfinder_3.5.5a.dfsg.1-6etch2_hppa.deb stable/main/binary-hppa/kdepasswd_3.5.5a.dfsg.1-6etch2_hppa.deb stable/main/binary-hppa/libkonq4-dev_3.5.5a.dfsg.1-6etch2_hppa.deb stable/main/binary-hppa/kwin_3.5.5a.dfsg.1-6etch2_hppa.deb stable/main/binary-hppa/kdm_3.5.5a.dfsg.1-6etch2_hppa.deb stable/main/binary-hppa/ksmserver_3.5.5a.dfsg.1-6etch2_hppa.deb stable/main/binary-hppa/klipper_3.5.5a.dfsg.1-6etch2_hppa.deb stable/main/binary-hppa/kfind_3.5.5a.dfsg.1-6etch2_hppa.deb stable/main/binary-hppa/kdebase-dbg_3.5.5a.dfsg.1-6etch2_hppa.deb stable/main/binary-hppa/kdesktop_3.5.5a.dfsg.1-6etch2_hppa.deb stable/main/binary-hppa/kdebase-bin_3.5.5a.dfsg.1-6etch2_hppa.deb stable/main/binary-hppa/konqueror-nsplugins_3.5.5a.dfsg.1-6etch2_hppa.deb stable/main/binary-hppa/ktip_3.5.5a.dfsg.1-6etch2_hppa.deb stable/main/binary-hppa/kdeprint_3.5.5a.dfsg.1-6etch2_hppa.deb stable/main/binary-hppa/kpager_3.5.5a.dfsg.1-6etch2_hppa.deb stable/main/binary-hppa/ksplash_3.5.5a.dfsg.1-6etch2_hppa.deb stable/main/binary-hppa/ksysguard_3.5.5a.dfsg.1-6etch2_hppa.deb stable/main/binary-hppa/khelpcenter_3.5.5a.dfsg.1-6etch2_hppa.deb stable/main/binary-hppa/libkonq4_3.5.5a.dfsg.1-6etch2_hppa.deb stable/main/binary-hppa/kate_3.5.5a.dfsg.1-6etch2_hppa.deb stable/main/binary-hppa/kdebase-kio-plugins_3.5.5a.dfsg.1-6etch2_hppa.deb kdebase (4:3.5.5a.dfsg.1-6etch2) stable; urgency=low * Add patch to support latest flash plugin. It consists of 2 parts patches. This is the second part. First part is in kdelibs. (Closes: #455689) * Add patch to fix regression in kcontrol administrator mode introduced by the changes done in the flash plugin patch: - Do not put kcontrol's own widgets inside of QXEmbed. * Add nsplugins viewer 64bit fix. (Closes: #444214) stable/main/binary-arm/kpager_3.5.5a.dfsg.1-6etch2_arm.deb stable/main/binary-arm/ktip_3.5.5a.dfsg.1-6etch2_arm.deb stable/main/binary-arm/kfind_3.5.5a.dfsg.1-6etch2_arm.deb stable/main/binary-arm/kdm_3.5.5a.dfsg.1-6etch2_arm.deb stable/main/binary-arm/konqueror-nsplugins_3.5.5a.dfsg.1-6etch2_arm.deb stable/main/binary-arm/kdebase-kio-plugins_3.5.5a.dfsg.1-6etch2_arm.deb stable/main/binary-arm/kcontrol_3.5.5a.dfsg.1-6etch2_arm.deb stable/main/binary-arm/ksmserver_3.5.5a.dfsg.1-6etch2_arm.deb stable/main/binary-arm/ksplash_3.5.5a.dfsg.1-6etch2_arm.deb stable/main/binary-arm/kicker_3.5.5a.dfsg.1-6etch2_arm.deb stable/main/binary-arm/libkonq4_3.5.5a.dfsg.1-6etch2_arm.deb stable/main/binary-arm/kdebase-dev_3.5.5a.dfsg.1-6etch2_arm.deb stable/main/binary-arm/kdesktop_3.5.5a.dfsg.1-6etch2_arm.deb stable/main/binary-arm/konsole_3.5.5a.dfsg.1-6etch2_arm.deb stable/main/binary-arm/kmenuedit_3.5.5a.dfsg.1-6etch2_arm.deb stable/main/binary-arm/kpersonalizer_3.5.5a.dfsg.1-6etch2_arm.deb stable/main/binary-arm/ksysguardd_3.5.5a.dfsg.1-6etch2_arm.deb stable/main/binary-arm/kate_3.5.5a.dfsg.1-6etch2_arm.deb stable/main/binary-arm/kdepasswd_3.5.5a.dfsg.1-6etch2_arm.deb stable/main/binary-arm/kwin_3.5.5a.dfsg.1-6etch2_arm.deb stable/main/binary-arm/konqueror_3.5.5a.dfsg.1-6etch2_arm.deb stable/main/binary-arm/klipper_3.5.5a.dfsg.1-6etch2_arm.deb stable/main/binary-arm/libkonq4-dev_3.5.5a.dfsg.1-6etch2_arm.deb stable/main/binary-arm/kdebase-dbg_3.5.5a.dfsg.1-6etch2_arm.deb stable/main/binary-arm/kappfinder_3.5.5a.dfsg.1-6etch2_arm.deb stable/main/binary-arm/ksysguard_3.5.5a.dfsg.1-6etch2_arm.deb stable/main/binary-arm/khelpcenter_3.5.5a.dfsg.1-6etch2_arm.deb stable/main/binary-arm/kdeprint_3.5.5a.dfsg.1-6etch2_arm.deb stable/main/binary-arm/kdebase-bin_3.5.5a.dfsg.1-6etch2_arm.deb kdebase (4:3.5.5a.dfsg.1-6etch2) stable; urgency=low * Add patch to support latest flash plugin. It consists of 2 parts patches. This is the second part. First part is in kdelibs. (Closes: #455689) * Add patch to fix regression in kcontrol administrator mode introduced by the changes done in the flash plugin patch: - Do not put kcontrol's own widgets inside of QXEmbed. * Add nsplugins viewer 64bit fix. (Closes: #444214) stable/main/binary-alpha/kdebase-kio-plugins_3.5.5a.dfsg.1-6etch2_alpha.deb stable/main/binary-alpha/kmenuedit_3.5.5a.dfsg.1-6etch2_alpha.deb stable/main/binary-alpha/konqueror_3.5.5a.dfsg.1-6etch2_alpha.deb stable/main/binary-alpha/kicker_3.5.5a.dfsg.1-6etch2_alpha.deb stable/main/binary-alpha/kdebase-bin_3.5.5a.dfsg.1-6etch2_alpha.deb stable/main/binary-alpha/libkonq4_3.5.5a.dfsg.1-6etch2_alpha.deb stable/main/binary-alpha/kpager_3.5.5a.dfsg.1-6etch2_alpha.deb stable/main/binary-alpha/kdesktop_3.5.5a.dfsg.1-6etch2_alpha.deb stable/main/binary-alpha/kwin_3.5.5a.dfsg.1-6etch2_alpha.deb stable/main/binary-alpha/kappfinder_3.5.5a.dfsg.1-6etch2_alpha.deb stable/main/binary-alpha/kdeprint_3.5.5a.dfsg.1-6etch2_alpha.deb stable/main/binary-alpha/khelpcenter_3.5.5a.dfsg.1-6etch2_alpha.deb stable/main/binary-alpha/kpersonalizer_3.5.5a.dfsg.1-6etch2_alpha.deb stable/main/binary-alpha/ksplash_3.5.5a.dfsg.1-6etch2_alpha.deb stable/main/binary-alpha/ksysguardd_3.5.5a.dfsg.1-6etch2_alpha.deb stable/main/binary-alpha/ksysguard_3.5.5a.dfsg.1-6etch2_alpha.deb stable/main/binary-alpha/konsole_3.5.5a.dfsg.1-6etch2_alpha.deb stable/main/binary-alpha/kdebase-dev_3.5.5a.dfsg.1-6etch2_alpha.deb stable/main/binary-alpha/klipper_3.5.5a.dfsg.1-6etch2_alpha.deb stable/main/binary-alpha/ksmserver_3.5.5a.dfsg.1-6etch2_alpha.deb stable/main/binary-alpha/ktip_3.5.5a.dfsg.1-6etch2_alpha.deb stable/main/binary-alpha/konqueror-nsplugins_3.5.5a.dfsg.1-6etch2_alpha.deb stable/main/binary-alpha/libkonq4-dev_3.5.5a.dfsg.1-6etch2_alpha.deb stable/main/binary-alpha/kdm_3.5.5a.dfsg.1-6etch2_alpha.deb stable/main/binary-alpha/kate_3.5.5a.dfsg.1-6etch2_alpha.deb stable/main/binary-alpha/kfind_3.5.5a.dfsg.1-6etch2_alpha.deb stable/main/binary-alpha/kdepasswd_3.5.5a.dfsg.1-6etch2_alpha.deb stable/main/binary-alpha/kdebase-dbg_3.5.5a.dfsg.1-6etch2_alpha.deb stable/main/binary-alpha/kcontrol_3.5.5a.dfsg.1-6etch2_alpha.deb kdebase (4:3.5.5a.dfsg.1-6etch2) stable; urgency=low * Add patch to support latest flash plugin. It consists of 2 parts patches. This is the second part. First part is in kdelibs. (Closes: #455689) * Add patch to fix regression in kcontrol administrator mode introduced by the changes done in the flash plugin patch: - Do not put kcontrol's own widgets inside of QXEmbed. * Add nsplugins viewer 64bit fix. (Closes: #444214) stable/main/binary-amd64/kcontrol_3.5.5a.dfsg.1-6etch2_amd64.deb stable/main/binary-amd64/konsole_3.5.5a.dfsg.1-6etch2_amd64.deb stable/main/binary-amd64/kappfinder_3.5.5a.dfsg.1-6etch2_amd64.deb stable/main/binary-amd64/kate_3.5.5a.dfsg.1-6etch2_amd64.deb stable/main/binary-amd64/kmenuedit_3.5.5a.dfsg.1-6etch2_amd64.deb stable/main/binary-amd64/ktip_3.5.5a.dfsg.1-6etch2_amd64.deb stable/main/binary-amd64/ksysguardd_3.5.5a.dfsg.1-6etch2_amd64.deb stable/main/source/kdebase_3.5.5a.dfsg.1-6etch2.diff.gz stable/main/binary-amd64/kdebase-dev_3.5.5a.dfsg.1-6etch2_amd64.deb stable/main/binary-amd64/kdesktop_3.5.5a.dfsg.1-6etch2_amd64.deb stable/main/binary-amd64/kdepasswd_3.5.5a.dfsg.1-6etch2_amd64.deb stable/main/binary-all/kdebase_3.5.5a.dfsg.1-6etch2_all.deb stable/main/source/kdebase_3.5.5a.dfsg.1-6etch2.dsc stable/main/binary-amd64/klipper_3.5.5a.dfsg.1-6etch2_amd64.deb stable/main/binary-amd64/libkonq4_3.5.5a.dfsg.1-6etch2_amd64.deb stable/main/binary-amd64/ksmserver_3.5.5a.dfsg.1-6etch2_amd64.deb stable/main/binary-amd64/kpager_3.5.5a.dfsg.1-6etch2_amd64.deb stable/main/binary-all/kdebase-doc_3.5.5a.dfsg.1-6etch2_all.deb stable/main/binary-amd64/libkonq4-dev_3.5.5a.dfsg.1-6etch2_amd64.deb stable/main/binary-all/kdebase-doc-html_3.5.5a.dfsg.1-6etch2_all.deb stable/main/binary-amd64/konqueror_3.5.5a.dfsg.1-6etch2_amd64.deb stable/main/binary-all/kdebase-data_3.5.5a.dfsg.1-6etch2_all.deb stable/main/binary-amd64/kdebase-dbg_3.5.5a.dfsg.1-6etch2_amd64.deb stable/main/binary-amd64/kdeprint_3.5.5a.dfsg.1-6etch2_amd64.deb stable/main/binary-amd64/kdebase-kio-plugins_3.5.5a.dfsg.1-6etch2_amd64.deb stable/main/binary-amd64/kpersonalizer_3.5.5a.dfsg.1-6etch2_amd64.deb stable/main/binary-amd64/kdm_3.5.5a.dfsg.1-6etch2_amd64.deb stable/main/binary-amd64/kwin_3.5.5a.dfsg.1-6etch2_amd64.deb stable/main/binary-amd64/ksysguard_3.5.5a.dfsg.1-6etch2_amd64.deb stable/main/binary-amd64/konqueror-nsplugins_3.5.5a.dfsg.1-6etch2_amd64.deb stable/main/binary-amd64/khelpcenter_3.5.5a.dfsg.1-6etch2_amd64.deb stable/main/binary-amd64/kdebase-bin_3.5.5a.dfsg.1-6etch2_amd64.deb stable/main/binary-amd64/kicker_3.5.5a.dfsg.1-6etch2_amd64.deb stable/main/binary-amd64/ksplash_3.5.5a.dfsg.1-6etch2_amd64.deb stable/main/binary-amd64/kfind_3.5.5a.dfsg.1-6etch2_amd64.deb kdebase (4:3.5.5a.dfsg.1-6etch2) stable; urgency=low * Add patch to support latest flash plugin. It consists of 2 parts patches. This is the second part. First part is in kdelibs. (Closes: #455689) * Add patch to fix regression in kcontrol administrator mode introduced by the changes done in the flash plugin patch: - Do not put kcontrol's own widgets inside of QXEmbed. * Add nsplugins viewer 64bit fix. (Closes: #444214) stable/main/binary-powerpc/ipmitool_1.8.8-3_powerpc.deb ipmitool (1.8.8-3) unstable; urgency=low * Ported fix to ipmievd from upstream version 1.8.9 (Closes: #408536): - fix ipmievd fd closing bug. Patch from Rupert Hair. * Started using dpatch to apply patches. Added dpatch to build dependencies. * Add powerpc to the list of supported archs (Closes: #405455) stable/main/binary-ia64/ipmitool_1.8.8-3_ia64.deb ipmitool (1.8.8-3) unstable; urgency=low * Ported fix to ipmievd from upstream version 1.8.9 (Closes: #408536): - fix ipmievd fd closing bug. Patch from Rupert Hair. * Started using dpatch to apply patches. Added dpatch to build dependencies. * Add powerpc to the list of supported archs (Closes: #405455) stable/main/binary-sparc/inotify-tools_3.3-2_sparc.deb inotify-tools (3.3-2) stable-security; urgency=high * Fixes buffer overflow in inotifytools_snprintf (CVE-2007-5037) by backporting changes from new upstream vesion (3.11) (Closes: #443913) stable/main/binary-s390/inotify-tools_3.3-2_s390.deb inotify-tools (3.3-2) stable-security; urgency=high * Fixes buffer overflow in inotifytools_snprintf (CVE-2007-5037) by backporting changes from new upstream vesion (3.11) (Closes: #443913) stable/main/binary-powerpc/inotify-tools_3.3-2_powerpc.deb inotify-tools (3.3-2) stable-security; urgency=high * Fixes buffer overflow in inotifytools_snprintf (CVE-2007-5037) by backporting changes from new upstream vesion (3.11) (Closes: #443913) stable/main/binary-mipsel/inotify-tools_3.3-2_mipsel.deb inotify-tools (3.3-2) stable-security; urgency=high * Fixes buffer overflow in inotifytools_snprintf (CVE-2007-5037) by backporting changes from new upstream vesion (3.11) (Closes: #443913) stable/main/binary-mips/inotify-tools_3.3-2_mips.deb inotify-tools (3.3-2) stable-security; urgency=high * Fixes buffer overflow in inotifytools_snprintf (CVE-2007-5037) by backporting changes from new upstream vesion (3.11) (Closes: #443913) stable/main/binary-ia64/inotify-tools_3.3-2_ia64.deb inotify-tools (3.3-2) stable-security; urgency=high * Fixes buffer overflow in inotifytools_snprintf (CVE-2007-5037) by backporting changes from new upstream vesion (3.11) (Closes: #443913) stable/main/binary-hppa/inotify-tools_3.3-2_hppa.deb inotify-tools (3.3-2) stable-security; urgency=high * Fixes buffer overflow in inotifytools_snprintf (CVE-2007-5037) by backporting changes from new upstream vesion (3.11) (Closes: #443913) stable/main/binary-arm/inotify-tools_3.3-2_arm.deb inotify-tools (3.3-2) stable-security; urgency=high * Fixes buffer overflow in inotifytools_snprintf (CVE-2007-5037) by backporting changes from new upstream vesion (3.11) (Closes: #443913) stable/main/binary-amd64/inotify-tools_3.3-2_amd64.deb inotify-tools (3.3-2) stable-security; urgency=high * Fixes buffer overflow in inotifytools_snprintf (CVE-2007-5037) by backporting changes from new upstream vesion (3.11) (Closes: #443913) stable/main/binary-alpha/inotify-tools_3.3-2_alpha.deb inotify-tools (3.3-2) stable-security; urgency=high * Fixes buffer overflow in inotifytools_snprintf (CVE-2007-5037) by backporting changes from new upstream vesion (3.11) (Closes: #443913) stable/main/source/inotify-tools_3.3-2.dsc stable/main/binary-i386/inotify-tools_3.3-2_i386.deb stable/main/source/inotify-tools_3.3-2.diff.gz inotify-tools (3.3-2) stable-security; urgency=high * Fixes buffer overflow in inotifytools_snprintf (CVE-2007-5037) by backporting changes from new upstream vesion (3.11) (Closes: #443913) stable/main/binary-sparc/iceweasel-gnome-support_2.0.0.12-0etch1_sparc.deb stable/main/binary-sparc/iceweasel_2.0.0.12-0etch1_sparc.deb stable/main/binary-sparc/iceweasel-dbg_2.0.0.12-0etch1_sparc.deb iceweasel (2.0.0.12-0etch1) stable-security; urgency=critical * New upstream security release. * Fixes mfsa 2008-01 aka CVE-2008-0412, CVE-2008-0413; mfsa 2008-02 aka CVE-2008-0414; mfsa 2008-03 aka CVE-2008-0415; mfsa 2008-04 aka CVE-2008-0417; mfsa 2008-05 aka CVE-2008-0418; mfsa 2008-06 aka CVE-2008-0419; mfsa 2008-08 aka CVE-2008-0591; mfsa 2008-09 aka CVE-2008-0592; mfsa 2008-10 aka CVE-2008-0593; mfsa 2008-11 aka CVE-2008-0594. stable/main/binary-s390/iceweasel-gnome-support_2.0.0.12-0etch1_s390.deb stable/main/binary-s390/iceweasel_2.0.0.12-0etch1_s390.deb stable/main/binary-s390/iceweasel-dbg_2.0.0.12-0etch1_s390.deb iceweasel (2.0.0.12-0etch1) stable-security; urgency=critical * New upstream security release. * Fixes mfsa 2008-01 aka CVE-2008-0412, CVE-2008-0413; mfsa 2008-02 aka CVE-2008-0414; mfsa 2008-03 aka CVE-2008-0415; mfsa 2008-04 aka CVE-2008-0417; mfsa 2008-05 aka CVE-2008-0418; mfsa 2008-06 aka CVE-2008-0419; mfsa 2008-08 aka CVE-2008-0591; mfsa 2008-09 aka CVE-2008-0592; mfsa 2008-10 aka CVE-2008-0593; mfsa 2008-11 aka CVE-2008-0594. stable/main/binary-powerpc/iceweasel_2.0.0.12-0etch1_powerpc.deb stable/main/binary-powerpc/iceweasel-gnome-support_2.0.0.12-0etch1_powerpc.deb stable/main/binary-powerpc/iceweasel-dbg_2.0.0.12-0etch1_powerpc.deb iceweasel (2.0.0.12-0etch1) stable-security; urgency=critical * New upstream security release. * Fixes mfsa 2008-01 aka CVE-2008-0412, CVE-2008-0413; mfsa 2008-02 aka CVE-2008-0414; mfsa 2008-03 aka CVE-2008-0415; mfsa 2008-04 aka CVE-2008-0417; mfsa 2008-05 aka CVE-2008-0418; mfsa 2008-06 aka CVE-2008-0419; mfsa 2008-08 aka CVE-2008-0591; mfsa 2008-09 aka CVE-2008-0592; mfsa 2008-10 aka CVE-2008-0593; mfsa 2008-11 aka CVE-2008-0594. stable/main/binary-mipsel/iceweasel-gnome-support_2.0.0.12-0etch1_mipsel.deb stable/main/binary-mipsel/iceweasel_2.0.0.12-0etch1_mipsel.deb stable/main/binary-mipsel/iceweasel-dbg_2.0.0.12-0etch1_mipsel.deb iceweasel (2.0.0.12-0etch1) stable-security; urgency=critical * New upstream security release. * Fixes mfsa 2008-01 aka CVE-2008-0412, CVE-2008-0413; mfsa 2008-02 aka CVE-2008-0414; mfsa 2008-03 aka CVE-2008-0415; mfsa 2008-04 aka CVE-2008-0417; mfsa 2008-05 aka CVE-2008-0418; mfsa 2008-06 aka CVE-2008-0419; mfsa 2008-08 aka CVE-2008-0591; mfsa 2008-09 aka CVE-2008-0592; mfsa 2008-10 aka CVE-2008-0593; mfsa 2008-11 aka CVE-2008-0594. stable/main/binary-mips/iceweasel-dbg_2.0.0.12-0etch1_mips.deb stable/main/binary-mips/iceweasel-gnome-support_2.0.0.12-0etch1_mips.deb stable/main/binary-mips/iceweasel_2.0.0.12-0etch1_mips.deb iceweasel (2.0.0.12-0etch1) stable-security; urgency=critical * New upstream security release. * Fixes mfsa 2008-01 aka CVE-2008-0412, CVE-2008-0413; mfsa 2008-02 aka CVE-2008-0414; mfsa 2008-03 aka CVE-2008-0415; mfsa 2008-04 aka CVE-2008-0417; mfsa 2008-05 aka CVE-2008-0418; mfsa 2008-06 aka CVE-2008-0419; mfsa 2008-08 aka CVE-2008-0591; mfsa 2008-09 aka CVE-2008-0592; mfsa 2008-10 aka CVE-2008-0593; mfsa 2008-11 aka CVE-2008-0594. stable/main/binary-ia64/iceweasel_2.0.0.12-0etch1_ia64.deb stable/main/binary-ia64/iceweasel-gnome-support_2.0.0.12-0etch1_ia64.deb stable/main/binary-ia64/iceweasel-dbg_2.0.0.12-0etch1_ia64.deb iceweasel (2.0.0.12-0etch1) stable-security; urgency=critical * New upstream security release. * Fixes mfsa 2008-01 aka CVE-2008-0412, CVE-2008-0413; mfsa 2008-02 aka CVE-2008-0414; mfsa 2008-03 aka CVE-2008-0415; mfsa 2008-04 aka CVE-2008-0417; mfsa 2008-05 aka CVE-2008-0418; mfsa 2008-06 aka CVE-2008-0419; mfsa 2008-08 aka CVE-2008-0591; mfsa 2008-09 aka CVE-2008-0592; mfsa 2008-10 aka CVE-2008-0593; mfsa 2008-11 aka CVE-2008-0594. stable/main/binary-i386/iceweasel_2.0.0.12-0etch1_i386.deb stable/main/binary-i386/iceweasel-gnome-support_2.0.0.12-0etch1_i386.deb stable/main/binary-i386/iceweasel-dbg_2.0.0.12-0etch1_i386.deb iceweasel (2.0.0.12-0etch1) stable-security; urgency=critical * New upstream security release. * Fixes mfsa 2008-01 aka CVE-2008-0412, CVE-2008-0413; mfsa 2008-02 aka CVE-2008-0414; mfsa 2008-03 aka CVE-2008-0415; mfsa 2008-04 aka CVE-2008-0417; mfsa 2008-05 aka CVE-2008-0418; mfsa 2008-06 aka CVE-2008-0419; mfsa 2008-08 aka CVE-2008-0591; mfsa 2008-09 aka CVE-2008-0592; mfsa 2008-10 aka CVE-2008-0593; mfsa 2008-11 aka CVE-2008-0594. stable/main/binary-hppa/iceweasel-gnome-support_2.0.0.12-0etch1_hppa.deb stable/main/binary-hppa/iceweasel_2.0.0.12-0etch1_hppa.deb stable/main/binary-hppa/iceweasel-dbg_2.0.0.12-0etch1_hppa.deb iceweasel (2.0.0.12-0etch1) stable-security; urgency=critical * New upstream security release. * Fixes mfsa 2008-01 aka CVE-2008-0412, CVE-2008-0413; mfsa 2008-02 aka CVE-2008-0414; mfsa 2008-03 aka CVE-2008-0415; mfsa 2008-04 aka CVE-2008-0417; mfsa 2008-05 aka CVE-2008-0418; mfsa 2008-06 aka CVE-2008-0419; mfsa 2008-08 aka CVE-2008-0591; mfsa 2008-09 aka CVE-2008-0592; mfsa 2008-10 aka CVE-2008-0593; mfsa 2008-11 aka CVE-2008-0594. stable/main/binary-arm/iceweasel-gnome-support_2.0.0.12-0etch1_arm.deb stable/main/binary-arm/iceweasel-dbg_2.0.0.12-0etch1_arm.deb stable/main/binary-arm/iceweasel_2.0.0.12-0etch1_arm.deb iceweasel (2.0.0.12-0etch1) stable-security; urgency=critical * New upstream security release. * Fixes mfsa 2008-01 aka CVE-2008-0412, CVE-2008-0413; mfsa 2008-02 aka CVE-2008-0414; mfsa 2008-03 aka CVE-2008-0415; mfsa 2008-04 aka CVE-2008-0417; mfsa 2008-05 aka CVE-2008-0418; mfsa 2008-06 aka CVE-2008-0419; mfsa 2008-08 aka CVE-2008-0591; mfsa 2008-09 aka CVE-2008-0592; mfsa 2008-10 aka CVE-2008-0593; mfsa 2008-11 aka CVE-2008-0594. stable/main/binary-alpha/iceweasel-gnome-support_2.0.0.12-0etch1_alpha.deb stable/main/binary-alpha/iceweasel-dbg_2.0.0.12-0etch1_alpha.deb stable/main/binary-alpha/iceweasel_2.0.0.12-0etch1_alpha.deb iceweasel (2.0.0.12-0etch1) stable-security; urgency=critical * New upstream security release. * Fixes mfsa 2008-01 aka CVE-2008-0412, CVE-2008-0413; mfsa 2008-02 aka CVE-2008-0414; mfsa 2008-03 aka CVE-2008-0415; mfsa 2008-04 aka CVE-2008-0417; mfsa 2008-05 aka CVE-2008-0418; mfsa 2008-06 aka CVE-2008-0419; mfsa 2008-08 aka CVE-2008-0591; mfsa 2008-09 aka CVE-2008-0592; mfsa 2008-10 aka CVE-2008-0593; mfsa 2008-11 aka CVE-2008-0594. stable/main/binary-all/firefox_2.0.0.12-0etch1_all.deb stable/main/source/iceweasel_2.0.0.12-0etch1.diff.gz stable/main/binary-all/firefox-gnome-support_2.0.0.12-0etch1_all.deb stable/main/binary-amd64/iceweasel-dbg_2.0.0.12-0etch1_amd64.deb stable/main/source/iceweasel_2.0.0.12-0etch1.dsc stable/main/binary-amd64/iceweasel-gnome-support_2.0.0.12-0etch1_amd64.deb stable/main/binary-all/mozilla-firefox-dom-inspector_2.0.0.12-0etch1_all.deb stable/main/binary-all/firefox-dom-inspector_2.0.0.12-0etch1_all.deb stable/main/binary-all/mozilla-firefox_2.0.0.12-0etch1_all.deb stable/main/binary-all/mozilla-firefox-gnome-support_2.0.0.12-0etch1_all.deb stable/main/binary-all/iceweasel-dom-inspector_2.0.0.12-0etch1_all.deb stable/main/binary-amd64/iceweasel_2.0.0.12-0etch1_amd64.deb iceweasel (2.0.0.12-0etch1) stable-security; urgency=critical * New upstream security release. * Fixes mfsa 2008-01 aka CVE-2008-0412, CVE-2008-0413; mfsa 2008-02 aka CVE-2008-0414; mfsa 2008-03 aka CVE-2008-0415; mfsa 2008-04 aka CVE-2008-0417; mfsa 2008-05 aka CVE-2008-0418; mfsa 2008-06 aka CVE-2008-0419; mfsa 2008-08 aka CVE-2008-0591; mfsa 2008-09 aka CVE-2008-0592; mfsa 2008-10 aka CVE-2008-0593; mfsa 2008-11 aka CVE-2008-0594. stable/main/binary-sparc/icedove-dev_1.5.0.13+1.5.0.15b.dfsg1-0etch1_sparc.deb stable/main/binary-sparc/icedove-gnome-support_1.5.0.13+1.5.0.15b.dfsg1-0etch1_sparc.deb stable/main/binary-sparc/icedove-dbg_1.5.0.13+1.5.0.15b.dfsg1-0etch1_sparc.deb stable/main/binary-sparc/icedove_1.5.0.13+1.5.0.15b.dfsg1-0etch1_sparc.deb stable/main/binary-sparc/icedove-inspector_1.5.0.13+1.5.0.15b.dfsg1-0etch1_sparc.deb stable/main/binary-sparc/icedove-typeaheadfind_1.5.0.13+1.5.0.15b.dfsg1-0etch1_sparc.deb icedove (1.5.0.13+1.5.0.15b.dfsg1-0etch1) stable-security; urgency=low [ Alexander Sack ] * security/stability update 1.5.0.13 + 1.5.0.15 (prepatch backports for v2.0.0.12) * MFSA 2008-01 aka CVE-2008-0412: Crashes with evidence of memory corruption v1.8.1.12 (Browser crashes) * MFSA 2008-01 aka CVE-2008-0413: Crashes with evidence of memory corruption v1.8.1.12 (javascript crashes) * MFSA 2008-02 aka CVE-2008-0414: Multiple file input focus stealing vulnerabilities: 1. Focus shifting bugs and 2. Selective keystroke blocking bugs * MFSA 2008-03 aka CVE-2008-0415: Privilege escalation, XSS, Remote Code Execution (JavaScript privilege escalation bugs) * MFSA 2008-04 aka CVE-2008-0417: Stored password corruption * MFSA 2008-05 aka CVE-2008-0418: Directory traversal via chrome: URI * MFSA 2008-06 aka CVE-2008-0419: Web browsing history and forward navigation stealing * MFSA 2008-08 aka CVE-2008-0591: File action dialog tampering * MFSA 2008-09 aka CVE-2008-0592: Mishandling of locally-saved plain text files * MFSA 2008-10 aka CVE-2008-0593: URL token stealing via stylesheet redirect * MFSA 2008-11 aka CVE-2008-0594: Web forgery overwrite with div overlay stable/main/binary-s390/icedove-typeaheadfind_1.5.0.13+1.5.0.15b.dfsg1-0etch1_s390.deb stable/main/binary-s390/icedove-inspector_1.5.0.13+1.5.0.15b.dfsg1-0etch1_s390.deb stable/main/binary-s390/icedove_1.5.0.13+1.5.0.15b.dfsg1-0etch1_s390.deb stable/main/binary-s390/icedove-gnome-support_1.5.0.13+1.5.0.15b.dfsg1-0etch1_s390.deb stable/main/binary-s390/icedove-dev_1.5.0.13+1.5.0.15b.dfsg1-0etch1_s390.deb stable/main/binary-s390/icedove-dbg_1.5.0.13+1.5.0.15b.dfsg1-0etch1_s390.deb icedove (1.5.0.13+1.5.0.15b.dfsg1-0etch1) stable-security; urgency=low [ Alexander Sack ] * security/stability update 1.5.0.13 + 1.5.0.15 (prepatch backports for v2.0.0.12) * MFSA 2008-01 aka CVE-2008-0412: Crashes with evidence of memory corruption v1.8.1.12 (Browser crashes) * MFSA 2008-01 aka CVE-2008-0413: Crashes with evidence of memory corruption v1.8.1.12 (javascript crashes) * MFSA 2008-02 aka CVE-2008-0414: Multiple file input focus stealing vulnerabilities: 1. Focus shifting bugs and 2. Selective keystroke blocking bugs * MFSA 2008-03 aka CVE-2008-0415: Privilege escalation, XSS, Remote Code Execution (JavaScript privilege escalation bugs) * MFSA 2008-04 aka CVE-2008-0417: Stored password corruption * MFSA 2008-05 aka CVE-2008-0418: Directory traversal via chrome: URI * MFSA 2008-06 aka CVE-2008-0419: Web browsing history and forward navigation stealing * MFSA 2008-08 aka CVE-2008-0591: File action dialog tampering * MFSA 2008-09 aka CVE-2008-0592: Mishandling of locally-saved plain text files * MFSA 2008-10 aka CVE-2008-0593: URL token stealing via stylesheet redirect * MFSA 2008-11 aka CVE-2008-0594: Web forgery overwrite with div overlay stable/main/binary-powerpc/icedove-typeaheadfind_1.5.0.13+1.5.0.15b.dfsg1-0etch1_powerpc.deb stable/main/binary-powerpc/icedove-dev_1.5.0.13+1.5.0.15b.dfsg1-0etch1_powerpc.deb stable/main/binary-powerpc/icedove-gnome-support_1.5.0.13+1.5.0.15b.dfsg1-0etch1_powerpc.deb stable/main/binary-powerpc/icedove-inspector_1.5.0.13+1.5.0.15b.dfsg1-0etch1_powerpc.deb stable/main/binary-powerpc/icedove_1.5.0.13+1.5.0.15b.dfsg1-0etch1_powerpc.deb stable/main/binary-powerpc/icedove-dbg_1.5.0.13+1.5.0.15b.dfsg1-0etch1_powerpc.deb icedove (1.5.0.13+1.5.0.15b.dfsg1-0etch1) stable-security; urgency=low [ Alexander Sack ] * security/stability update 1.5.0.13 + 1.5.0.15 (prepatch backports for v2.0.0.12) * MFSA 2008-01 aka CVE-2008-0412: Crashes with evidence of memory corruption v1.8.1.12 (Browser crashes) * MFSA 2008-01 aka CVE-2008-0413: Crashes with evidence of memory corruption v1.8.1.12 (javascript crashes) * MFSA 2008-02 aka CVE-2008-0414: Multiple file input focus stealing vulnerabilities: 1. Focus shifting bugs and 2. Selective keystroke blocking bugs * MFSA 2008-03 aka CVE-2008-0415: Privilege escalation, XSS, Remote Code Execution (JavaScript privilege escalation bugs) * MFSA 2008-04 aka CVE-2008-0417: Stored password corruption * MFSA 2008-05 aka CVE-2008-0418: Directory traversal via chrome: URI * MFSA 2008-06 aka CVE-2008-0419: Web browsing history and forward navigation stealing * MFSA 2008-08 aka CVE-2008-0591: File action dialog tampering * MFSA 2008-09 aka CVE-2008-0592: Mishandling of locally-saved plain text files * MFSA 2008-10 aka CVE-2008-0593: URL token stealing via stylesheet redirect * MFSA 2008-11 aka CVE-2008-0594: Web forgery overwrite with div overlay stable/main/binary-mipsel/icedove_1.5.0.13+1.5.0.15b.dfsg1-0etch1_mipsel.deb stable/main/binary-mipsel/icedove-dev_1.5.0.13+1.5.0.15b.dfsg1-0etch1_mipsel.deb stable/main/binary-mipsel/icedove-gnome-support_1.5.0.13+1.5.0.15b.dfsg1-0etch1_mipsel.deb stable/main/binary-mipsel/icedove-dbg_1.5.0.13+1.5.0.15b.dfsg1-0etch1_mipsel.deb stable/main/binary-mipsel/icedove-typeaheadfind_1.5.0.13+1.5.0.15b.dfsg1-0etch1_mipsel.deb stable/main/binary-mipsel/icedove-inspector_1.5.0.13+1.5.0.15b.dfsg1-0etch1_mipsel.deb icedove (1.5.0.13+1.5.0.15b.dfsg1-0etch1) stable-security; urgency=low [ Alexander Sack ] * security/stability update 1.5.0.13 + 1.5.0.15 (prepatch backports for v2.0.0.12) * MFSA 2008-01 aka CVE-2008-0412: Crashes with evidence of memory corruption v1.8.1.12 (Browser crashes) * MFSA 2008-01 aka CVE-2008-0413: Crashes with evidence of memory corruption v1.8.1.12 (javascript crashes) * MFSA 2008-02 aka CVE-2008-0414: Multiple file input focus stealing vulnerabilities: 1. Focus shifting bugs and 2. Selective keystroke blocking bugs * MFSA 2008-03 aka CVE-2008-0415: Privilege escalation, XSS, Remote Code Execution (JavaScript privilege escalation bugs) * MFSA 2008-04 aka CVE-2008-0417: Stored password corruption * MFSA 2008-05 aka CVE-2008-0418: Directory traversal via chrome: URI * MFSA 2008-06 aka CVE-2008-0419: Web browsing history and forward navigation stealing * MFSA 2008-08 aka CVE-2008-0591: File action dialog tampering * MFSA 2008-09 aka CVE-2008-0592: Mishandling of locally-saved plain text files * MFSA 2008-10 aka CVE-2008-0593: URL token stealing via stylesheet redirect * MFSA 2008-11 aka CVE-2008-0594: Web forgery overwrite with div overlay stable/main/binary-mips/icedove-typeaheadfind_1.5.0.13+1.5.0.15b.dfsg1-0etch1_mips.deb stable/main/binary-mips/icedove-inspector_1.5.0.13+1.5.0.15b.dfsg1-0etch1_mips.deb stable/main/binary-mips/icedove-gnome-support_1.5.0.13+1.5.0.15b.dfsg1-0etch1_mips.deb stable/main/binary-mips/icedove_1.5.0.13+1.5.0.15b.dfsg1-0etch1_mips.deb stable/main/binary-mips/icedove-dev_1.5.0.13+1.5.0.15b.dfsg1-0etch1_mips.deb stable/main/binary-mips/icedove-dbg_1.5.0.13+1.5.0.15b.dfsg1-0etch1_mips.deb icedove (1.5.0.13+1.5.0.15b.dfsg1-0etch1) stable-security; urgency=low [ Alexander Sack ] * security/stability update 1.5.0.13 + 1.5.0.15 (prepatch backports for v2.0.0.12) * MFSA 2008-01 aka CVE-2008-0412: Crashes with evidence of memory corruption v1.8.1.12 (Browser crashes) * MFSA 2008-01 aka CVE-2008-0413: Crashes with evidence of memory corruption v1.8.1.12 (javascript crashes) * MFSA 2008-02 aka CVE-2008-0414: Multiple file input focus stealing vulnerabilities: 1. Focus shifting bugs and 2. Selective keystroke blocking bugs * MFSA 2008-03 aka CVE-2008-0415: Privilege escalation, XSS, Remote Code Execution (JavaScript privilege escalation bugs) * MFSA 2008-04 aka CVE-2008-0417: Stored password corruption * MFSA 2008-05 aka CVE-2008-0418: Directory traversal via chrome: URI * MFSA 2008-06 aka CVE-2008-0419: Web browsing history and forward navigation stealing * MFSA 2008-08 aka CVE-2008-0591: File action dialog tampering * MFSA 2008-09 aka CVE-2008-0592: Mishandling of locally-saved plain text files * MFSA 2008-10 aka CVE-2008-0593: URL token stealing via stylesheet redirect * MFSA 2008-11 aka CVE-2008-0594: Web forgery overwrite with div overlay stable/main/binary-ia64/icedove-typeaheadfind_1.5.0.13+1.5.0.15b.dfsg1-0etch1_ia64.deb stable/main/binary-ia64/icedove-inspector_1.5.0.13+1.5.0.15b.dfsg1-0etch1_ia64.deb stable/main/binary-ia64/icedove_1.5.0.13+1.5.0.15b.dfsg1-0etch1_ia64.deb stable/main/binary-ia64/icedove-dbg_1.5.0.13+1.5.0.15b.dfsg1-0etch1_ia64.deb stable/main/binary-ia64/icedove-gnome-support_1.5.0.13+1.5.0.15b.dfsg1-0etch1_ia64.deb stable/main/binary-ia64/icedove-dev_1.5.0.13+1.5.0.15b.dfsg1-0etch1_ia64.deb icedove (1.5.0.13+1.5.0.15b.dfsg1-0etch1) stable-security; urgency=low [ Alexander Sack ] * security/stability update 1.5.0.13 + 1.5.0.15 (prepatch backports for v2.0.0.12) * MFSA 2008-01 aka CVE-2008-0412: Crashes with evidence of memory corruption v1.8.1.12 (Browser crashes) * MFSA 2008-01 aka CVE-2008-0413: Crashes with evidence of memory corruption v1.8.1.12 (javascript crashes) * MFSA 2008-02 aka CVE-2008-0414: Multiple file input focus stealing vulnerabilities: 1. Focus shifting bugs and 2. Selective keystroke blocking bugs * MFSA 2008-03 aka CVE-2008-0415: Privilege escalation, XSS, Remote Code Execution (JavaScript privilege escalation bugs) * MFSA 2008-04 aka CVE-2008-0417: Stored password corruption * MFSA 2008-05 aka CVE-2008-0418: Directory traversal via chrome: URI * MFSA 2008-06 aka CVE-2008-0419: Web browsing history and forward navigation stealing * MFSA 2008-08 aka CVE-2008-0591: File action dialog tampering * MFSA 2008-09 aka CVE-2008-0592: Mishandling of locally-saved plain text files * MFSA 2008-10 aka CVE-2008-0593: URL token stealing via stylesheet redirect * MFSA 2008-11 aka CVE-2008-0594: Web forgery overwrite with div overlay stable/main/binary-i386/icedove-inspector_1.5.0.13+1.5.0.15b.dfsg1-0etch1_i386.deb stable/main/binary-i386/icedove_1.5.0.13+1.5.0.15b.dfsg1-0etch1_i386.deb stable/main/binary-i386/icedove-gnome-support_1.5.0.13+1.5.0.15b.dfsg1-0etch1_i386.deb stable/main/binary-i386/icedove-dev_1.5.0.13+1.5.0.15b.dfsg1-0etch1_i386.deb stable/main/binary-i386/icedove-dbg_1.5.0.13+1.5.0.15b.dfsg1-0etch1_i386.deb stable/main/binary-i386/icedove-typeaheadfind_1.5.0.13+1.5.0.15b.dfsg1-0etch1_i386.deb icedove (1.5.0.13+1.5.0.15b.dfsg1-0etch1) stable-security; urgency=low [ Alexander Sack ] * security/stability update 1.5.0.13 + 1.5.0.15 (prepatch backports for v2.0.0.12) * MFSA 2008-01 aka CVE-2008-0412: Crashes with evidence of memory corruption v1.8.1.12 (Browser crashes) * MFSA 2008-01 aka CVE-2008-0413: Crashes with evidence of memory corruption v1.8.1.12 (javascript crashes) * MFSA 2008-02 aka CVE-2008-0414: Multiple file input focus stealing vulnerabilities: 1. Focus shifting bugs and 2. Selective keystroke blocking bugs * MFSA 2008-03 aka CVE-2008-0415: Privilege escalation, XSS, Remote Code Execution (JavaScript privilege escalation bugs) * MFSA 2008-04 aka CVE-2008-0417: Stored password corruption * MFSA 2008-05 aka CVE-2008-0418: Directory traversal via chrome: URI * MFSA 2008-06 aka CVE-2008-0419: Web browsing history and forward navigation stealing * MFSA 2008-08 aka CVE-2008-0591: File action dialog tampering * MFSA 2008-09 aka CVE-2008-0592: Mishandling of locally-saved plain text files * MFSA 2008-10 aka CVE-2008-0593: URL token stealing via stylesheet redirect * MFSA 2008-11 aka CVE-2008-0594: Web forgery overwrite with div overlay stable/main/binary-hppa/icedove-gnome-support_1.5.0.13+1.5.0.15b.dfsg1-0etch1_hppa.deb stable/main/binary-hppa/icedove-inspector_1.5.0.13+1.5.0.15b.dfsg1-0etch1_hppa.deb stable/main/binary-hppa/icedove-typeaheadfind_1.5.0.13+1.5.0.15b.dfsg1-0etch1_hppa.deb stable/main/binary-hppa/icedove-dbg_1.5.0.13+1.5.0.15b.dfsg1-0etch1_hppa.deb stable/main/binary-hppa/icedove_1.5.0.13+1.5.0.15b.dfsg1-0etch1_hppa.deb stable/main/binary-hppa/icedove-dev_1.5.0.13+1.5.0.15b.dfsg1-0etch1_hppa.deb icedove (1.5.0.13+1.5.0.15b.dfsg1-0etch1) stable-security; urgency=low [ Alexander Sack ] * security/stability update 1.5.0.13 + 1.5.0.15 (prepatch backports for v2.0.0.12) * MFSA 2008-01 aka CVE-2008-0412: Crashes with evidence of memory corruption v1.8.1.12 (Browser crashes) * MFSA 2008-01 aka CVE-2008-0413: Crashes with evidence of memory corruption v1.8.1.12 (javascript crashes) * MFSA 2008-02 aka CVE-2008-0414: Multiple file input focus stealing vulnerabilities: 1. Focus shifting bugs and 2. Selective keystroke blocking bugs * MFSA 2008-03 aka CVE-2008-0415: Privilege escalation, XSS, Remote Code Execution (JavaScript privilege escalation bugs) * MFSA 2008-04 aka CVE-2008-0417: Stored password corruption * MFSA 2008-05 aka CVE-2008-0418: Directory traversal via chrome: URI * MFSA 2008-06 aka CVE-2008-0419: Web browsing history and forward navigation stealing * MFSA 2008-08 aka CVE-2008-0591: File action dialog tampering * MFSA 2008-09 aka CVE-2008-0592: Mishandling of locally-saved plain text files * MFSA 2008-10 aka CVE-2008-0593: URL token stealing via stylesheet redirect * MFSA 2008-11 aka CVE-2008-0594: Web forgery overwrite with div overlay stable/main/binary-arm/icedove-dbg_1.5.0.13+1.5.0.15b.dfsg1-0etch1_arm.deb stable/main/binary-arm/icedove-gnome-support_1.5.0.13+1.5.0.15b.dfsg1-0etch1_arm.deb stable/main/binary-arm/icedove-inspector_1.5.0.13+1.5.0.15b.dfsg1-0etch1_arm.deb stable/main/binary-arm/icedove-typeaheadfind_1.5.0.13+1.5.0.15b.dfsg1-0etch1_arm.deb stable/main/binary-arm/icedove-dev_1.5.0.13+1.5.0.15b.dfsg1-0etch1_arm.deb stable/main/binary-arm/icedove_1.5.0.13+1.5.0.15b.dfsg1-0etch1_arm.deb icedove (1.5.0.13+1.5.0.15b.dfsg1-0etch1) stable-security; urgency=low [ Alexander Sack ] * security/stability update 1.5.0.13 + 1.5.0.15 (prepatch backports for v2.0.0.12) * MFSA 2008-01 aka CVE-2008-0412: Crashes with evidence of memory corruption v1.8.1.12 (Browser crashes) * MFSA 2008-01 aka CVE-2008-0413: Crashes with evidence of memory corruption v1.8.1.12 (javascript crashes) * MFSA 2008-02 aka CVE-2008-0414: Multiple file input focus stealing vulnerabilities: 1. Focus shifting bugs and 2. Selective keystroke blocking bugs * MFSA 2008-03 aka CVE-2008-0415: Privilege escalation, XSS, Remote Code Execution (JavaScript privilege escalation bugs) * MFSA 2008-04 aka CVE-2008-0417: Stored password corruption * MFSA 2008-05 aka CVE-2008-0418: Directory traversal via chrome: URI * MFSA 2008-06 aka CVE-2008-0419: Web browsing history and forward navigation stealing * MFSA 2008-08 aka CVE-2008-0591: File action dialog tampering * MFSA 2008-09 aka CVE-2008-0592: Mishandling of locally-saved plain text files * MFSA 2008-10 aka CVE-2008-0593: URL token stealing via stylesheet redirect * MFSA 2008-11 aka CVE-2008-0594: Web forgery overwrite with div overlay stable/main/binary-alpha/icedove-typeaheadfind_1.5.0.13+1.5.0.15b.dfsg1-0etch1_alpha.deb stable/main/binary-alpha/icedove-dev_1.5.0.13+1.5.0.15b.dfsg1-0etch1_alpha.deb stable/main/binary-alpha/icedove_1.5.0.13+1.5.0.15b.dfsg1-0etch1_alpha.deb stable/main/binary-alpha/icedove-inspector_1.5.0.13+1.5.0.15b.dfsg1-0etch1_alpha.deb stable/main/binary-alpha/icedove-gnome-support_1.5.0.13+1.5.0.15b.dfsg1-0etch1_alpha.deb stable/main/binary-alpha/icedove-dbg_1.5.0.13+1.5.0.15b.dfsg1-0etch1_alpha.deb icedove (1.5.0.13+1.5.0.15b.dfsg1-0etch1) stable-security; urgency=low [ Alexander Sack ] * security/stability update 1.5.0.13 + 1.5.0.15 (prepatch backports for v2.0.0.12) * MFSA 2008-01 aka CVE-2008-0412: Crashes with evidence of memory corruption v1.8.1.12 (Browser crashes) * MFSA 2008-01 aka CVE-2008-0413: Crashes with evidence of memory corruption v1.8.1.12 (javascript crashes) * MFSA 2008-02 aka CVE-2008-0414: Multiple file input focus stealing vulnerabilities: 1. Focus shifting bugs and 2. Selective keystroke blocking bugs * MFSA 2008-03 aka CVE-2008-0415: Privilege escalation, XSS, Remote Code Execution (JavaScript privilege escalation bugs) * MFSA 2008-04 aka CVE-2008-0417: Stored password corruption * MFSA 2008-05 aka CVE-2008-0418: Directory traversal via chrome: URI * MFSA 2008-06 aka CVE-2008-0419: Web browsing history and forward navigation stealing * MFSA 2008-08 aka CVE-2008-0591: File action dialog tampering * MFSA 2008-09 aka CVE-2008-0592: Mishandling of locally-saved plain text files * MFSA 2008-10 aka CVE-2008-0593: URL token stealing via stylesheet redirect * MFSA 2008-11 aka CVE-2008-0594: Web forgery overwrite with div overlay stable/main/source/icedove_1.5.0.13+1.5.0.15b.dfsg1-0etch1.diff.gz stable/main/source/icedove_1.5.0.13+1.5.0.15b.dfsg1.orig.tar.gz stable/main/binary-all/mozilla-thunderbird-typeaheadfind_1.5.0.13+1.5.0.15b.dfsg1-0etch1_all.deb stable/main/binary-all/mozilla-thunderbird-inspector_1.5.0.13+1.5.0.15b.dfsg1-0etch1_all.deb stable/main/binary-all/mozilla-thunderbird_1.5.0.13+1.5.0.15b.dfsg1-0etch1_all.deb stable/main/binary-amd64/icedove-gnome-support_1.5.0.13+1.5.0.15b.dfsg1-0etch1_amd64.deb stable/main/binary-all/thunderbird-dev_1.5.0.13+1.5.0.15b.dfsg1-0etch1_all.deb stable/main/binary-all/thunderbird_1.5.0.13+1.5.0.15b.dfsg1-0etch1_all.deb stable/main/binary-amd64/icedove-inspector_1.5.0.13+1.5.0.15b.dfsg1-0etch1_amd64.deb stable/main/source/icedove_1.5.0.13+1.5.0.15b.dfsg1-0etch1.dsc stable/main/binary-amd64/icedove-dev_1.5.0.13+1.5.0.15b.dfsg1-0etch1_amd64.deb stable/main/binary-all/mozilla-thunderbird-dev_1.5.0.13+1.5.0.15b.dfsg1-0etch1_all.deb stable/main/binary-amd64/icedove-dbg_1.5.0.13+1.5.0.15b.dfsg1-0etch1_amd64.deb stable/main/binary-all/thunderbird-typeaheadfind_1.5.0.13+1.5.0.15b.dfsg1-0etch1_all.deb stable/main/binary-all/thunderbird-gnome-support_1.5.0.13+1.5.0.15b.dfsg1-0etch1_all.deb stable/main/binary-amd64/icedove_1.5.0.13+1.5.0.15b.dfsg1-0etch1_amd64.deb stable/main/binary-all/thunderbird-dbg_1.5.0.13+1.5.0.15b.dfsg1-0etch1_all.deb stable/main/binary-amd64/icedove-typeaheadfind_1.5.0.13+1.5.0.15b.dfsg1-0etch1_amd64.deb stable/main/binary-all/thunderbird-inspector_1.5.0.13+1.5.0.15b.dfsg1-0etch1_all.deb icedove (1.5.0.13+1.5.0.15b.dfsg1-0etch1) stable-security; urgency=low [ Alexander Sack ] * security/stability update 1.5.0.13 + 1.5.0.15 (prepatch backports for v2.0.0.12) * MFSA 2008-01 aka CVE-2008-0412: Crashes with evidence of memory corruption v1.8.1.12 (Browser crashes) * MFSA 2008-01 aka CVE-2008-0413: Crashes with evidence of memory corruption v1.8.1.12 (javascript crashes) * MFSA 2008-02 aka CVE-2008-0414: Multiple file input focus stealing vulnerabilities: 1. Focus shifting bugs and 2. Selective keystroke blocking bugs * MFSA 2008-03 aka CVE-2008-0415: Privilege escalation, XSS, Remote Code Execution (JavaScript privilege escalation bugs) * MFSA 2008-04 aka CVE-2008-0417: Stored password corruption * MFSA 2008-05 aka CVE-2008-0418: Directory traversal via chrome: URI * MFSA 2008-06 aka CVE-2008-0419: Web browsing history and forward navigation stealing * MFSA 2008-08 aka CVE-2008-0591: File action dialog tampering * MFSA 2008-09 aka CVE-2008-0592: Mishandling of locally-saved plain text files * MFSA 2008-10 aka CVE-2008-0593: URL token stealing via stylesheet redirect * MFSA 2008-11 aka CVE-2008-0594: Web forgery overwrite with div overlay stable/main/binary-sparc/hplip_1.6.10-3etch1_sparc.deb stable/main/binary-sparc/hpijs_2.6.10+1.6.10-3etch1_sparc.deb stable/main/binary-sparc/hplip-dbg_1.6.10-3etch1_sparc.deb hplip (1.6.10-3etch1) stable-security; urgency=high * Non-maintainer upload by the security team * Included CVE-2007-5208.dpatch to fix arbitrary command execution in hpssd via crafted from address because of missing sanitization (CVE-2007-5208) stable/main/binary-s390/hplip_1.6.10-3etch1_s390.deb stable/main/binary-s390/hpijs_2.6.10+1.6.10-3etch1_s390.deb stable/main/binary-s390/hplip-dbg_1.6.10-3etch1_s390.deb hplip (1.6.10-3etch1) stable-security; urgency=high * Non-maintainer upload by the security team * Included CVE-2007-5208.dpatch to fix arbitrary command execution in hpssd via crafted from address because of missing sanitization (CVE-2007-5208) stable/main/binary-powerpc/hpijs_2.6.10+1.6.10-3etch1_powerpc.deb stable/main/binary-powerpc/hplip_1.6.10-3etch1_powerpc.deb stable/main/binary-powerpc/hplip-dbg_1.6.10-3etch1_powerpc.deb hplip (1.6.10-3etch1) stable-security; urgency=high * Non-maintainer upload by the security team * Included CVE-2007-5208.dpatch to fix arbitrary command execution in hpssd via crafted from address because of missing sanitization (CVE-2007-5208) stable/main/binary-mipsel/hplip_1.6.10-3etch1_mipsel.deb stable/main/binary-mipsel/hplip-dbg_1.6.10-3etch1_mipsel.deb stable/main/binary-mipsel/hpijs_2.6.10+1.6.10-3etch1_mipsel.deb hplip (1.6.10-3etch1) stable-security; urgency=high * Non-maintainer upload by the security team * Included CVE-2007-5208.dpatch to fix arbitrary command execution in hpssd via crafted from address because of missing sanitization (CVE-2007-5208) stable/main/binary-mips/hplip-dbg_1.6.10-3etch1_mips.deb stable/main/binary-mips/hplip_1.6.10-3etch1_mips.deb stable/main/binary-mips/hpijs_2.6.10+1.6.10-3etch1_mips.deb hplip (1.6.10-3etch1) stable-security; urgency=high * Non-maintainer upload by the security team * Included CVE-2007-5208.dpatch to fix arbitrary command execution in hpssd via crafted from address because of missing sanitization (CVE-2007-5208) stable/main/binary-ia64/hplip-dbg_1.6.10-3etch1_ia64.deb stable/main/binary-ia64/hplip_1.6.10-3etch1_ia64.deb stable/main/binary-ia64/hpijs_2.6.10+1.6.10-3etch1_ia64.deb hplip (1.6.10-3etch1) stable-security; urgency=high * Non-maintainer upload by the security team * Included CVE-2007-5208.dpatch to fix arbitrary command execution in hpssd via crafted from address because of missing sanitization (CVE-2007-5208) stable/main/binary-hppa/hpijs_2.6.10+1.6.10-3etch1_hppa.deb stable/main/binary-hppa/hplip_1.6.10-3etch1_hppa.deb stable/main/binary-hppa/hplip-dbg_1.6.10-3etch1_hppa.deb hplip (1.6.10-3etch1) stable-security; urgency=high * Non-maintainer upload by the security team * Included CVE-2007-5208.dpatch to fix arbitrary command execution in hpssd via crafted from address because of missing sanitization (CVE-2007-5208) stable/main/binary-arm/hpijs_2.6.10+1.6.10-3etch1_arm.deb stable/main/binary-arm/hplip_1.6.10-3etch1_arm.deb stable/main/binary-arm/hplip-dbg_1.6.10-3etch1_arm.deb hplip (1.6.10-3etch1) stable-security; urgency=high * Non-maintainer upload by the security team * Included CVE-2007-5208.dpatch to fix arbitrary command execution in hpssd via crafted from address because of missing sanitization (CVE-2007-5208) stable/main/binary-amd64/hpijs_2.6.10+1.6.10-3etch1_amd64.deb stable/main/binary-amd64/hplip_1.6.10-3etch1_amd64.deb stable/main/binary-amd64/hplip-dbg_1.6.10-3etch1_amd64.deb hplip (1.6.10-3etch1) stable-security; urgency=high * Non-maintainer upload by the security team * Included CVE-2007-5208.dpatch to fix arbitrary command execution in hpssd via crafted from address because of missing sanitization (CVE-2007-5208) stable/main/binary-alpha/hplip-dbg_1.6.10-3etch1_alpha.deb stable/main/binary-alpha/hplip_1.6.10-3etch1_alpha.deb stable/main/binary-alpha/hpijs_2.6.10+1.6.10-3etch1_alpha.deb hplip (1.6.10-3etch1) stable-security; urgency=high * Non-maintainer upload by the security team * Included CVE-2007-5208.dpatch to fix arbitrary command execution in hpssd via crafted from address because of missing sanitization (CVE-2007-5208) stable/main/source/hplip_1.6.10-3etch1.dsc stable/main/binary-all/hpijs-ppds_2.6.10+1.6.10-3etch1_all.deb stable/main/binary-all/hplip-data_1.6.10-3etch1_all.deb stable/main/binary-i386/hplip-dbg_1.6.10-3etch1_i386.deb stable/main/binary-i386/hpijs_2.6.10+1.6.10-3etch1_i386.deb stable/main/source/hplip_1.6.10-3etch1.diff.gz stable/main/binary-i386/hplip_1.6.10-3etch1_i386.deb stable/main/binary-all/hplip-doc_1.6.10-3etch1_all.deb hplip (1.6.10-3etch1) stable-security; urgency=high * Non-maintainer upload by the security team * Included CVE-2007-5208.dpatch to fix arbitrary command execution in hpssd via crafted from address because of missing sanitization (CVE-2007-5208) stable/main/source/horde3_3.1.3-4etch2.dsc stable/main/binary-all/horde3_3.1.3-4etch2_all.deb stable/main/source/horde3_3.1.3-4etch2.diff.gz horde3 (3.1.3-4etch2) stable-security; urgency=high * Fix XSS vulnerabilities (see CVE-2007-6018 for more informations). (Closes: #461131) * Fix privilege escalation in the Horde API. stable/main/binary-sparc/gpsd-clients_2.33-4etch1_sparc.deb stable/main/binary-sparc/gpsd_2.33-4etch1_sparc.deb gpsd (2.33-4etch1) stable; urgency=low * debian/patches: - Adding 90_leap_year_bug.dpatch to fix a leap year bug which made gpsd stop working with the begin of 2008 (Closes: #461855). * debian/control: - Updating Maintainer entry to reflect the package adoption. stable/main/binary-s390/gpsd_2.33-4etch1_s390.deb stable/main/binary-s390/gpsd-clients_2.33-4etch1_s390.deb gpsd (2.33-4etch1) stable; urgency=low * debian/patches: - Adding 90_leap_year_bug.dpatch to fix a leap year bug which made gpsd stop working with the begin of 2008 (Closes: #461855). * debian/control: - Updating Maintainer entry to reflect the package adoption. stable/main/binary-powerpc/gpsd-clients_2.33-4etch1_powerpc.deb stable/main/binary-powerpc/gpsd_2.33-4etch1_powerpc.deb gpsd (2.33-4etch1) stable; urgency=low * debian/patches: - Adding 90_leap_year_bug.dpatch to fix a leap year bug which made gpsd stop working with the begin of 2008 (Closes: #461855). * debian/control: - Updating Maintainer entry to reflect the package adoption. stable/main/binary-mipsel/gpsd_2.33-4etch1_mipsel.deb stable/main/binary-mipsel/gpsd-clients_2.33-4etch1_mipsel.deb gpsd (2.33-4etch1) stable; urgency=low * debian/patches: - Adding 90_leap_year_bug.dpatch to fix a leap year bug which made gpsd stop working with the begin of 2008 (Closes: #461855). * debian/control: - Updating Maintainer entry to reflect the package adoption. stable/main/binary-mips/gpsd_2.33-4etch1_mips.deb stable/main/binary-mips/gpsd-clients_2.33-4etch1_mips.deb gpsd (2.33-4etch1) stable; urgency=low * debian/patches: - Adding 90_leap_year_bug.dpatch to fix a leap year bug which made gpsd stop working with the begin of 2008 (Closes: #461855). * debian/control: - Updating Maintainer entry to reflect the package adoption. stable/main/binary-ia64/gpsd_2.33-4etch1_ia64.deb stable/main/binary-ia64/gpsd-clients_2.33-4etch1_ia64.deb gpsd (2.33-4etch1) stable; urgency=low * debian/patches: - Adding 90_leap_year_bug.dpatch to fix a leap year bug which made gpsd stop working with the begin of 2008 (Closes: #461855). * debian/control: - Updating Maintainer entry to reflect the package adoption. stable/main/binary-hppa/gpsd-clients_2.33-4etch1_hppa.deb stable/main/binary-hppa/gpsd_2.33-4etch1_hppa.deb gpsd (2.33-4etch1) stable; urgency=low * debian/patches: - Adding 90_leap_year_bug.dpatch to fix a leap year bug which made gpsd stop working with the begin of 2008 (Closes: #461855). * debian/control: - Updating Maintainer entry to reflect the package adoption. stable/main/binary-arm/gpsd_2.33-4etch1_arm.deb stable/main/binary-arm/gpsd-clients_2.33-4etch1_arm.deb gpsd (2.33-4etch1) stable; urgency=low * debian/patches: - Adding 90_leap_year_bug.dpatch to fix a leap year bug which made gpsd stop working with the begin of 2008 (Closes: #461855). * debian/control: - Updating Maintainer entry to reflect the package adoption. stable/main/binary-amd64/gpsd_2.33-4etch1_amd64.deb stable/main/binary-amd64/gpsd-clients_2.33-4etch1_amd64.deb gpsd (2.33-4etch1) stable; urgency=low * debian/patches: - Adding 90_leap_year_bug.dpatch to fix a leap year bug which made gpsd stop working with the begin of 2008 (Closes: #461855). * debian/control: - Updating Maintainer entry to reflect the package adoption. stable/main/binary-alpha/gpsd_2.33-4etch1_alpha.deb stable/main/binary-alpha/gpsd-clients_2.33-4etch1_alpha.deb gpsd (2.33-4etch1) stable; urgency=low * debian/patches: - Adding 90_leap_year_bug.dpatch to fix a leap year bug which made gpsd stop working with the begin of 2008 (Closes: #461855). * debian/control: - Updating Maintainer entry to reflect the package adoption. stable/main/binary-i386/gpsd-clients_2.33-4etch1_i386.deb stable/main/binary-i386/gpsd_2.33-4etch1_i386.deb stable/main/source/gpsd_2.33-4etch1.dsc stable/main/source/gpsd_2.33-4etch1.diff.gz gpsd (2.33-4etch1) stable; urgency=low * debian/patches: - Adding 90_leap_year_bug.dpatch to fix a leap year bug which made gpsd stop working with the begin of 2008 (Closes: #461855). * debian/control: - Updating Maintainer entry to reflect the package adoption. stable/main/source/gnatsweb_4.00-1etch1.dsc stable/main/binary-all/gnatsweb_4.00-1etch1_all.deb stable/main/source/gnatsweb_4.00-1etch1.diff.gz gnatsweb (4.00-1etch1) stable-security; urgency=high * Non-maintainer upload by The Security Team. * Avoid XSS attack against the database paramater. [CVE-2007-2808] stable/main/binary-sparc/libnss-dns-udeb_2.3.6.ds1-13etch5_sparc.udeb stable/main/binary-sparc/libc6-dbg_2.3.6.ds1-13etch5_sparc.deb stable/main/binary-sparc/libc6-sparcv9b_2.3.6.ds1-13etch5_sparc.deb stable/main/binary-sparc/libc6-dev-sparc64_2.3.6.ds1-13etch5_sparc.deb stable/main/binary-sparc/locales-all_2.3.6.ds1-13etch5_sparc.deb stable/main/binary-sparc/libc6_2.3.6.ds1-13etch5_sparc.deb stable/main/binary-sparc/libc6-dev_2.3.6.ds1-13etch5_sparc.deb stable/main/binary-sparc/libc6-prof_2.3.6.ds1-13etch5_sparc.deb stable/main/binary-sparc/libc6-pic_2.3.6.ds1-13etch5_sparc.deb stable/main/binary-sparc/libc6-udeb_2.3.6.ds1-13etch5_sparc.udeb stable/main/binary-sparc/libnss-files-udeb_2.3.6.ds1-13etch5_sparc.udeb stable/main/binary-sparc/libc6-sparc64_2.3.6.ds1-13etch5_sparc.deb stable/main/binary-sparc/nscd_2.3.6.ds1-13etch5_sparc.deb stable/main/binary-sparc/libc6-sparcv9_2.3.6.ds1-13etch5_sparc.deb glibc (2.3.6.ds1-13etch5) stable; urgency=low * patches/any/cvs-sunrpc_rpc_thread.diff: patch by André Cruz to fix sunrpc memory leak. closes: #460226. stable/main/binary-s390/libc6-pic_2.3.6.ds1-13etch5_s390.deb stable/main/binary-s390/libnss-files-udeb_2.3.6.ds1-13etch5_s390.udeb stable/main/binary-s390/nscd_2.3.6.ds1-13etch5_s390.deb stable/main/binary-s390/libc6-dev_2.3.6.ds1-13etch5_s390.deb stable/main/binary-s390/libc6-s390x_2.3.6.ds1-13etch5_s390.deb stable/main/binary-s390/locales-all_2.3.6.ds1-13etch5_s390.deb stable/main/binary-s390/libc6_2.3.6.ds1-13etch5_s390.deb stable/main/binary-s390/libnss-dns-udeb_2.3.6.ds1-13etch5_s390.udeb stable/main/binary-s390/libc6-prof_2.3.6.ds1-13etch5_s390.deb stable/main/binary-s390/libc6-dev-s390x_2.3.6.ds1-13etch5_s390.deb stable/main/binary-s390/libc6-udeb_2.3.6.ds1-13etch5_s390.udeb stable/main/binary-s390/libc6-dbg_2.3.6.ds1-13etch5_s390.deb glibc (2.3.6.ds1-13etch5) stable; urgency=low * patches/any/cvs-sunrpc_rpc_thread.diff: patch by André Cruz to fix sunrpc memory leak. closes: #460226. stable/main/binary-powerpc/libnss-dns-udeb_2.3.6.ds1-13etch5_powerpc.udeb stable/main/binary-powerpc/libc6-udeb_2.3.6.ds1-13etch5_powerpc.udeb stable/main/binary-powerpc/libc6-pic_2.3.6.ds1-13etch5_powerpc.deb stable/main/binary-powerpc/libc6-dev_2.3.6.ds1-13etch5_powerpc.deb stable/main/binary-powerpc/libc6-ppc64_2.3.6.ds1-13etch5_powerpc.deb stable/main/binary-powerpc/libc6-prof_2.3.6.ds1-13etch5_powerpc.deb stable/main/binary-powerpc/libc6-dbg_2.3.6.ds1-13etch5_powerpc.deb stable/main/binary-powerpc/libnss-files-udeb_2.3.6.ds1-13etch5_powerpc.udeb stable/main/binary-powerpc/nscd_2.3.6.ds1-13etch5_powerpc.deb stable/main/binary-powerpc/libc6_2.3.6.ds1-13etch5_powerpc.deb stable/main/binary-powerpc/locales-all_2.3.6.ds1-13etch5_powerpc.deb stable/main/binary-powerpc/libc6-dev-ppc64_2.3.6.ds1-13etch5_powerpc.deb glibc (2.3.6.ds1-13etch5) stable; urgency=low * patches/any/cvs-sunrpc_rpc_thread.diff: patch by AndrC) Cruz to fix sunrpc memory leak. closes: #460226. stable/main/binary-mipsel/libc6-dev_2.3.6.ds1-13etch5_mipsel.deb stable/main/binary-mipsel/libc6-udeb_2.3.6.ds1-13etch5_mipsel.udeb stable/main/binary-mipsel/libc6-pic_2.3.6.ds1-13etch5_mipsel.deb stable/main/binary-mipsel/libnss-dns-udeb_2.3.6.ds1-13etch5_mipsel.udeb stable/main/binary-mipsel/nscd_2.3.6.ds1-13etch5_mipsel.deb stable/main/binary-mipsel/libnss-files-udeb_2.3.6.ds1-13etch5_mipsel.udeb stable/main/binary-mipsel/libc6-prof_2.3.6.ds1-13etch5_mipsel.deb stable/main/binary-mipsel/libc6_2.3.6.ds1-13etch5_mipsel.deb stable/main/binary-mipsel/libc6-dbg_2.3.6.ds1-13etch5_mipsel.deb stable/main/binary-mipsel/locales-all_2.3.6.ds1-13etch5_mipsel.deb glibc (2.3.6.ds1-13etch5) stable; urgency=low * patches/any/cvs-sunrpc_rpc_thread.diff: patch by AndrC) Cruz to fix sunrpc memory leak. closes: #460226. stable/main/binary-mips/libc6-prof_2.3.6.ds1-13etch5_mips.deb stable/main/binary-mips/nscd_2.3.6.ds1-13etch5_mips.deb stable/main/binary-mips/libnss-dns-udeb_2.3.6.ds1-13etch5_mips.udeb stable/main/binary-mips/libc6-dev_2.3.6.ds1-13etch5_mips.deb stable/main/binary-mips/libc6_2.3.6.ds1-13etch5_mips.deb stable/main/binary-mips/locales-all_2.3.6.ds1-13etch5_mips.deb stable/main/binary-mips/libc6-dbg_2.3.6.ds1-13etch5_mips.deb stable/main/binary-mips/libc6-pic_2.3.6.ds1-13etch5_mips.deb stable/main/binary-mips/libc6-udeb_2.3.6.ds1-13etch5_mips.udeb stable/main/binary-mips/libnss-files-udeb_2.3.6.ds1-13etch5_mips.udeb glibc (2.3.6.ds1-13etch5) stable; urgency=low * patches/any/cvs-sunrpc_rpc_thread.diff: patch by AndrC) Cruz to fix sunrpc memory leak. closes: #460226. stable/main/binary-ia64/libnss-files-udeb_2.3.6.ds1-13etch5_ia64.udeb stable/main/binary-ia64/libc6.1-udeb_2.3.6.ds1-13etch5_ia64.udeb stable/main/binary-ia64/libc6.1-prof_2.3.6.ds1-13etch5_ia64.deb stable/main/binary-ia64/nscd_2.3.6.ds1-13etch5_ia64.deb stable/main/binary-ia64/libc6.1-dev_2.3.6.ds1-13etch5_ia64.deb stable/main/binary-ia64/libc6.1_2.3.6.ds1-13etch5_ia64.deb stable/main/binary-ia64/libc6.1-dbg_2.3.6.ds1-13etch5_ia64.deb stable/main/binary-ia64/libc6.1-pic_2.3.6.ds1-13etch5_ia64.deb stable/main/binary-ia64/libnss-dns-udeb_2.3.6.ds1-13etch5_ia64.udeb stable/main/binary-ia64/locales-all_2.3.6.ds1-13etch5_ia64.deb glibc (2.3.6.ds1-13etch5) stable; urgency=low * patches/any/cvs-sunrpc_rpc_thread.diff: patch by André Cruz to fix sunrpc memory leak. closes: #460226. stable/main/binary-hppa/libc6-udeb_2.3.6.ds1-13etch5_hppa.udeb stable/main/binary-hppa/libnss-files-udeb_2.3.6.ds1-13etch5_hppa.udeb stable/main/binary-hppa/libc6_2.3.6.ds1-13etch5_hppa.deb stable/main/binary-hppa/libc6-prof_2.3.6.ds1-13etch5_hppa.deb stable/main/binary-hppa/libc6-dbg_2.3.6.ds1-13etch5_hppa.deb stable/main/binary-hppa/locales-all_2.3.6.ds1-13etch5_hppa.deb stable/main/binary-hppa/nscd_2.3.6.ds1-13etch5_hppa.deb stable/main/binary-hppa/libc6-dev_2.3.6.ds1-13etch5_hppa.deb stable/main/binary-hppa/libc6-pic_2.3.6.ds1-13etch5_hppa.deb stable/main/binary-hppa/libnss-dns-udeb_2.3.6.ds1-13etch5_hppa.udeb glibc (2.3.6.ds1-13etch5) stable; urgency=low * patches/any/cvs-sunrpc_rpc_thread.diff: patch by André Cruz to fix sunrpc memory leak. closes: #460226. stable/main/binary-arm/nscd_2.3.6.ds1-13etch5_arm.deb stable/main/binary-arm/libnss-dns-udeb_2.3.6.ds1-13etch5_arm.udeb stable/main/binary-arm/libc6_2.3.6.ds1-13etch5_arm.deb stable/main/binary-arm/libc6-udeb_2.3.6.ds1-13etch5_arm.udeb stable/main/binary-arm/locales-all_2.3.6.ds1-13etch5_arm.deb stable/main/binary-arm/libnss-files-udeb_2.3.6.ds1-13etch5_arm.udeb stable/main/binary-arm/libc6-pic_2.3.6.ds1-13etch5_arm.deb stable/main/binary-arm/libc6-dev_2.3.6.ds1-13etch5_arm.deb stable/main/binary-arm/libc6-dbg_2.3.6.ds1-13etch5_arm.deb stable/main/binary-arm/libc6-prof_2.3.6.ds1-13etch5_arm.deb glibc (2.3.6.ds1-13etch5) stable; urgency=low * patches/any/cvs-sunrpc_rpc_thread.diff: patch by André Cruz to fix sunrpc memory leak. closes: #460226. stable/main/binary-amd64/libc6-dev_2.3.6.ds1-13etch5_amd64.deb stable/main/binary-amd64/libc6-pic_2.3.6.ds1-13etch5_amd64.deb stable/main/binary-amd64/libc6-dbg_2.3.6.ds1-13etch5_amd64.deb stable/main/binary-amd64/locales-all_2.3.6.ds1-13etch5_amd64.deb stable/main/binary-amd64/libc6_2.3.6.ds1-13etch5_amd64.deb stable/main/binary-amd64/libc6-udeb_2.3.6.ds1-13etch5_amd64.udeb stable/main/binary-amd64/libc6-i386_2.3.6.ds1-13etch5_amd64.deb stable/main/binary-amd64/libc6-prof_2.3.6.ds1-13etch5_amd64.deb stable/main/binary-amd64/libnss-dns-udeb_2.3.6.ds1-13etch5_amd64.udeb stable/main/binary-amd64/nscd_2.3.6.ds1-13etch5_amd64.deb stable/main/binary-amd64/libc6-dev-i386_2.3.6.ds1-13etch5_amd64.deb stable/main/binary-amd64/libnss-files-udeb_2.3.6.ds1-13etch5_amd64.udeb glibc (2.3.6.ds1-13etch5) stable; urgency=low * patches/any/cvs-sunrpc_rpc_thread.diff: patch by AndrC) Cruz to fix sunrpc memory leak. closes: #460226. stable/main/binary-alpha/libnss-files-udeb_2.3.6.ds1-13etch5_alpha.udeb stable/main/binary-alpha/libc6.1-pic_2.3.6.ds1-13etch5_alpha.deb stable/main/binary-alpha/libc6.1-udeb_2.3.6.ds1-13etch5_alpha.udeb stable/main/binary-alpha/libc6.1-dev_2.3.6.ds1-13etch5_alpha.deb stable/main/binary-alpha/libc6.1-dbg_2.3.6.ds1-13etch5_alpha.deb stable/main/binary-alpha/libnss-dns-udeb_2.3.6.ds1-13etch5_alpha.udeb stable/main/binary-alpha/libc6.1-prof_2.3.6.ds1-13etch5_alpha.deb stable/main/binary-alpha/libc6.1_2.3.6.ds1-13etch5_alpha.deb stable/main/binary-alpha/locales-all_2.3.6.ds1-13etch5_alpha.deb stable/main/binary-alpha/nscd_2.3.6.ds1-13etch5_alpha.deb glibc (2.3.6.ds1-13etch5) stable; urgency=low * patches/any/cvs-sunrpc_rpc_thread.diff: patch by AndrC) Cruz to fix sunrpc memory leak. closes: #460226. stable/main/binary-i386/libc6-dev-amd64_2.3.6.ds1-13etch5_i386.deb stable/main/binary-i386/libc6-dev_2.3.6.ds1-13etch5_i386.deb stable/main/source/glibc_2.3.6.ds1-13etch5.dsc stable/main/binary-i386/libc6-xen_2.3.6.ds1-13etch5_i386.deb stable/main/binary-i386/libc6-amd64_2.3.6.ds1-13etch5_i386.deb stable/main/binary-i386/locales-all_2.3.6.ds1-13etch5_i386.deb stable/main/binary-i386/libc6-pic_2.3.6.ds1-13etch5_i386.deb stable/main/binary-i386/libc6-udeb_2.3.6.ds1-13etch5_i386.udeb stable/main/binary-i386/libnss-files-udeb_2.3.6.ds1-13etch5_i386.udeb stable/main/source/glibc_2.3.6.ds1-13etch5.diff.gz stable/main/binary-i386/libc6-prof_2.3.6.ds1-13etch5_i386.deb stable/main/binary-all/locales_2.3.6.ds1-13etch5_all.deb stable/main/binary-i386/libc6-dbg_2.3.6.ds1-13etch5_i386.deb stable/main/binary-i386/libc6-i686_2.3.6.ds1-13etch5_i386.deb stable/main/binary-i386/libc6_2.3.6.ds1-13etch5_i386.deb stable/main/binary-all/glibc-doc_2.3.6.ds1-13etch5_all.deb stable/main/binary-i386/nscd_2.3.6.ds1-13etch5_i386.deb stable/main/binary-i386/libnss-dns-udeb_2.3.6.ds1-13etch5_i386.udeb glibc (2.3.6.ds1-13etch5) stable; urgency=low * patches/any/cvs-sunrpc_rpc_thread.diff: patch by André Cruz to fix sunrpc memory leak. closes: #460226. stable/main/binary-all/gforge-mta-exim4_4.5.14-22etch5_all.deb stable/main/binary-all/gforge-web-apache_4.5.14-22etch5_all.deb stable/main/binary-all/gforge-db-postgresql_4.5.14-22etch5_all.deb stable/main/binary-all/gforge-lists-mailman_4.5.14-22etch5_all.deb stable/main/binary-all/gforge-ftp-proftpd_4.5.14-22etch5_all.deb stable/main/binary-all/gforge-shell-postgresql_4.5.14-22etch5_all.deb stable/main/binary-all/gforge-ldap-openldap_4.5.14-22etch5_all.deb stable/main/binary-all/gforge-mta-postfix_4.5.14-22etch5_all.deb stable/main/binary-all/gforge_4.5.14-22etch5_all.deb stable/main/binary-all/gforge-common_4.5.14-22etch5_all.deb stable/main/binary-all/gforge-mta-exim_4.5.14-22etch5_all.deb stable/main/binary-all/gforge-mta-courier_4.5.14-22etch5_all.deb stable/main/source/gforge_4.5.14-22etch5.dsc stable/main/source/gforge_4.5.14-22etch5.diff.gz stable/main/binary-all/gforge-dns-bind9_4.5.14-22etch5_all.deb stable/main/binary-all/gforge-shell-ldap_4.5.14-22etch5_all.deb gforge (4.5.14-22etch5) stable-security; urgency=high * Fixed cross-site scripting vulnerability (CVE-2007-0176). stable/main/binary-sparc/libfreetype6_2.2.1-5+etch2_sparc.deb stable/main/binary-sparc/freetype2-demos_2.2.1-5+etch2_sparc.deb stable/main/binary-sparc/libfreetype6-dev_2.2.1-5+etch2_sparc.deb stable/main/binary-sparc/libfreetype6-udeb_2.2.1-5+etch2_sparc.udeb freetype (2.2.1-5+etch2) stable-security; urgency=high * debian/patches-freetype/CVE-2007-1351_pdf-overflow: address CVE-2007-1351, an integer overflow bug in the handling of BDF fonts. Closes: #426771. stable/main/binary-s390/freetype2-demos_2.2.1-5+etch2_s390.deb stable/main/binary-s390/libfreetype6-dev_2.2.1-5+etch2_s390.deb stable/main/binary-s390/libfreetype6_2.2.1-5+etch2_s390.deb stable/main/binary-s390/libfreetype6-udeb_2.2.1-5+etch2_s390.udeb freetype (2.2.1-5+etch2) stable-security; urgency=high * debian/patches-freetype/CVE-2007-1351_pdf-overflow: address CVE-2007-1351, an integer overflow bug in the handling of BDF fonts. Closes: #426771. stable/main/binary-powerpc/libfreetype6_2.2.1-5+etch2_powerpc.deb stable/main/binary-powerpc/libfreetype6-dev_2.2.1-5+etch2_powerpc.deb stable/main/binary-powerpc/libfreetype6-udeb_2.2.1-5+etch2_powerpc.udeb stable/main/binary-powerpc/freetype2-demos_2.2.1-5+etch2_powerpc.deb freetype (2.2.1-5+etch2) stable-security; urgency=high * debian/patches-freetype/CVE-2007-1351_pdf-overflow: address CVE-2007-1351, an integer overflow bug in the handling of BDF fonts. Closes: #426771. stable/main/binary-mipsel/freetype2-demos_2.2.1-5+etch2_mipsel.deb stable/main/binary-mipsel/libfreetype6_2.2.1-5+etch2_mipsel.deb stable/main/binary-mipsel/libfreetype6-dev_2.2.1-5+etch2_mipsel.deb stable/main/binary-mipsel/libfreetype6-udeb_2.2.1-5+etch2_mipsel.udeb freetype (2.2.1-5+etch2) stable-security; urgency=high * debian/patches-freetype/CVE-2007-1351_pdf-overflow: address CVE-2007-1351, an integer overflow bug in the handling of BDF fonts. Closes: #426771. stable/main/binary-mips/libfreetype6_2.2.1-5+etch2_mips.deb stable/main/binary-mips/libfreetype6-dev_2.2.1-5+etch2_mips.deb stable/main/binary-mips/libfreetype6-udeb_2.2.1-5+etch2_mips.udeb stable/main/binary-mips/freetype2-demos_2.2.1-5+etch2_mips.deb freetype (2.2.1-5+etch2) stable-security; urgency=high * debian/patches-freetype/CVE-2007-1351_pdf-overflow: address CVE-2007-1351, an integer overflow bug in the handling of BDF fonts. Closes: #426771. stable/main/binary-ia64/libfreetype6-dev_2.2.1-5+etch2_ia64.deb stable/main/binary-ia64/freetype2-demos_2.2.1-5+etch2_ia64.deb stable/main/binary-ia64/libfreetype6-udeb_2.2.1-5+etch2_ia64.udeb stable/main/binary-ia64/libfreetype6_2.2.1-5+etch2_ia64.deb freetype (2.2.1-5+etch2) stable-security; urgency=high * debian/patches-freetype/CVE-2007-1351_pdf-overflow: address CVE-2007-1351, an integer overflow bug in the handling of BDF fonts. Closes: #426771. stable/main/binary-hppa/libfreetype6-udeb_2.2.1-5+etch2_hppa.udeb stable/main/binary-hppa/freetype2-demos_2.2.1-5+etch2_hppa.deb stable/main/binary-hppa/libfreetype6-dev_2.2.1-5+etch2_hppa.deb stable/main/binary-hppa/libfreetype6_2.2.1-5+etch2_hppa.deb freetype (2.2.1-5+etch2) stable-security; urgency=high * debian/patches-freetype/CVE-2007-1351_pdf-overflow: address CVE-2007-1351, an integer overflow bug in the handling of BDF fonts. Closes: #426771. stable/main/binary-arm/freetype2-demos_2.2.1-5+etch2_arm.deb stable/main/binary-arm/libfreetype6-udeb_2.2.1-5+etch2_arm.udeb stable/main/binary-arm/libfreetype6-dev_2.2.1-5+etch2_arm.deb stable/main/binary-arm/libfreetype6_2.2.1-5+etch2_arm.deb freetype (2.2.1-5+etch2) stable-security; urgency=high * debian/patches-freetype/CVE-2007-1351_pdf-overflow: address CVE-2007-1351, an integer overflow bug in the handling of BDF fonts. Closes: #426771. stable/main/binary-amd64/libfreetype6-dev_2.2.1-5+etch2_amd64.deb stable/main/binary-amd64/libfreetype6-udeb_2.2.1-5+etch2_amd64.udeb stable/main/binary-amd64/freetype2-demos_2.2.1-5+etch2_amd64.deb stable/main/binary-amd64/libfreetype6_2.2.1-5+etch2_amd64.deb freetype (2.2.1-5+etch2) stable-security; urgency=high * debian/patches-freetype/CVE-2007-1351_pdf-overflow: address CVE-2007-1351, an integer overflow bug in the handling of BDF fonts. Closes: #426771. stable/main/binary-alpha/libfreetype6-dev_2.2.1-5+etch2_alpha.deb stable/main/binary-alpha/freetype2-demos_2.2.1-5+etch2_alpha.deb stable/main/binary-alpha/libfreetype6_2.2.1-5+etch2_alpha.deb stable/main/binary-alpha/libfreetype6-udeb_2.2.1-5+etch2_alpha.udeb freetype (2.2.1-5+etch2) stable-security; urgency=high * debian/patches-freetype/CVE-2007-1351_pdf-overflow: address CVE-2007-1351, an integer overflow bug in the handling of BDF fonts. Closes: #426771. stable/main/binary-i386/freetype2-demos_2.2.1-5+etch2_i386.deb stable/main/source/freetype_2.2.1-5+etch2.dsc stable/main/binary-i386/libfreetype6_2.2.1-5+etch2_i386.deb stable/main/source/freetype_2.2.1-5+etch2.diff.gz stable/main/binary-i386/libfreetype6-udeb_2.2.1-5+etch2_i386.udeb stable/main/binary-i386/libfreetype6-dev_2.2.1-5+etch2_i386.deb freetype (2.2.1-5+etch2) stable-security; urgency=high * debian/patches-freetype/CVE-2007-1351_pdf-overflow: address CVE-2007-1351, an integer overflow bug in the handling of BDF fonts. Closes: #426771. stable/main/binary-sparc/libflac7_1.1.2-8_sparc.deb stable/main/binary-sparc/liboggflac-dev_1.1.2-8_sparc.deb stable/main/binary-sparc/libflac-dev_1.1.2-8_sparc.deb stable/main/binary-sparc/libflac++-dev_1.1.2-8_sparc.deb stable/main/binary-sparc/liboggflac++2_1.1.2-8_sparc.deb stable/main/binary-sparc/libflac++5_1.1.2-8_sparc.deb stable/main/binary-sparc/flac_1.1.2-8_sparc.deb stable/main/binary-sparc/xmms-flac_1.1.2-8_sparc.deb stable/main/binary-sparc/liboggflac3_1.1.2-8_sparc.deb stable/main/binary-sparc/liboggflac++-dev_1.1.2-8_sparc.deb flac (1.1.2-8) stable-security; urgency=high * Fix ia64 build. stable/main/binary-s390/liboggflac3_1.1.2-8_s390.deb stable/main/binary-s390/libflac++5_1.1.2-8_s390.deb stable/main/binary-s390/liboggflac-dev_1.1.2-8_s390.deb stable/main/binary-s390/liboggflac++-dev_1.1.2-8_s390.deb stable/main/binary-s390/flac_1.1.2-8_s390.deb stable/main/binary-s390/libflac-dev_1.1.2-8_s390.deb stable/main/binary-s390/libflac7_1.1.2-8_s390.deb stable/main/binary-s390/liboggflac++2_1.1.2-8_s390.deb stable/main/binary-s390/libflac++-dev_1.1.2-8_s390.deb stable/main/binary-s390/xmms-flac_1.1.2-8_s390.deb flac (1.1.2-8) stable-security; urgency=high * Fix ia64 build. stable/main/binary-powerpc/libflac++-dev_1.1.2-8_powerpc.deb stable/main/binary-powerpc/liboggflac3_1.1.2-8_powerpc.deb stable/main/binary-powerpc/liboggflac++2_1.1.2-8_powerpc.deb stable/main/binary-powerpc/liboggflac-dev_1.1.2-8_powerpc.deb stable/main/binary-powerpc/libflac++5_1.1.2-8_powerpc.deb stable/main/binary-powerpc/xmms-flac_1.1.2-8_powerpc.deb stable/main/binary-powerpc/liboggflac++-dev_1.1.2-8_powerpc.deb stable/main/binary-powerpc/libflac-dev_1.1.2-8_powerpc.deb stable/main/binary-powerpc/libflac7_1.1.2-8_powerpc.deb stable/main/binary-powerpc/flac_1.1.2-8_powerpc.deb flac (1.1.2-8) stable-security; urgency=high * Fix ia64 build. stable/main/binary-mipsel/xmms-flac_1.1.2-8_mipsel.deb stable/main/binary-mipsel/liboggflac++-dev_1.1.2-8_mipsel.deb stable/main/binary-mipsel/libflac++-dev_1.1.2-8_mipsel.deb stable/main/binary-mipsel/liboggflac++2_1.1.2-8_mipsel.deb stable/main/binary-mipsel/libflac-dev_1.1.2-8_mipsel.deb stable/main/binary-mipsel/liboggflac3_1.1.2-8_mipsel.deb stable/main/binary-mipsel/libflac++5_1.1.2-8_mipsel.deb stable/main/binary-mipsel/liboggflac-dev_1.1.2-8_mipsel.deb stable/main/binary-mipsel/flac_1.1.2-8_mipsel.deb stable/main/binary-mipsel/libflac7_1.1.2-8_mipsel.deb flac (1.1.2-8) stable-security; urgency=high * Fix ia64 build. stable/main/binary-mips/liboggflac3_1.1.2-8_mips.deb stable/main/binary-mips/liboggflac-dev_1.1.2-8_mips.deb stable/main/binary-mips/libflac++-dev_1.1.2-8_mips.deb stable/main/binary-mips/flac_1.1.2-8_mips.deb stable/main/binary-mips/liboggflac++2_1.1.2-8_mips.deb stable/main/binary-mips/xmms-flac_1.1.2-8_mips.deb stable/main/binary-mips/liboggflac++-dev_1.1.2-8_mips.deb stable/main/binary-mips/libflac7_1.1.2-8_mips.deb stable/main/binary-mips/libflac++5_1.1.2-8_mips.deb stable/main/binary-mips/libflac-dev_1.1.2-8_mips.deb flac (1.1.2-8) stable-security; urgency=high * Fix ia64 build. stable/main/binary-ia64/libflac++5_1.1.2-8_ia64.deb stable/main/binary-ia64/liboggflac++2_1.1.2-8_ia64.deb stable/main/binary-ia64/flac_1.1.2-8_ia64.deb stable/main/binary-ia64/liboggflac3_1.1.2-8_ia64.deb stable/main/binary-ia64/libflac7_1.1.2-8_ia64.deb stable/main/binary-ia64/liboggflac++-dev_1.1.2-8_ia64.deb stable/main/binary-ia64/libflac-dev_1.1.2-8_ia64.deb stable/main/binary-ia64/libflac++-dev_1.1.2-8_ia64.deb stable/main/binary-ia64/liboggflac-dev_1.1.2-8_ia64.deb stable/main/binary-ia64/xmms-flac_1.1.2-8_ia64.deb flac (1.1.2-8) stable-security; urgency=high * Fix ia64 build. stable/main/binary-hppa/libflac7_1.1.2-8_hppa.deb stable/main/binary-hppa/liboggflac++-dev_1.1.2-8_hppa.deb stable/main/binary-hppa/libflac++5_1.1.2-8_hppa.deb stable/main/binary-hppa/libflac++-dev_1.1.2-8_hppa.deb stable/main/binary-hppa/xmms-flac_1.1.2-8_hppa.deb stable/main/binary-hppa/liboggflac3_1.1.2-8_hppa.deb stable/main/binary-hppa/flac_1.1.2-8_hppa.deb stable/main/binary-hppa/liboggflac-dev_1.1.2-8_hppa.deb stable/main/binary-hppa/libflac-dev_1.1.2-8_hppa.deb stable/main/binary-hppa/liboggflac++2_1.1.2-8_hppa.deb flac (1.1.2-8) stable-security; urgency=high * Fix ia64 build. stable/main/binary-arm/libflac-dev_1.1.2-8_arm.deb stable/main/binary-arm/libflac++-dev_1.1.2-8_arm.deb stable/main/binary-arm/liboggflac-dev_1.1.2-8_arm.deb stable/main/binary-arm/libflac++5_1.1.2-8_arm.deb stable/main/binary-arm/liboggflac3_1.1.2-8_arm.deb stable/main/binary-arm/libflac7_1.1.2-8_arm.deb stable/main/binary-arm/liboggflac++2_1.1.2-8_arm.deb stable/main/binary-arm/flac_1.1.2-8_arm.deb stable/main/binary-arm/liboggflac++-dev_1.1.2-8_arm.deb stable/main/binary-arm/xmms-flac_1.1.2-8_arm.deb flac (1.1.2-8) stable-security; urgency=high * Fix ia64 build. stable/main/binary-amd64/liboggflac++2_1.1.2-8_amd64.deb stable/main/binary-amd64/libflac-dev_1.1.2-8_amd64.deb stable/main/binary-amd64/liboggflac3_1.1.2-8_amd64.deb stable/main/binary-amd64/flac_1.1.2-8_amd64.deb stable/main/binary-amd64/xmms-flac_1.1.2-8_amd64.deb stable/main/binary-amd64/libflac++-dev_1.1.2-8_amd64.deb stable/main/binary-amd64/liboggflac-dev_1.1.2-8_amd64.deb stable/main/binary-amd64/liboggflac++-dev_1.1.2-8_amd64.deb stable/main/binary-amd64/libflac7_1.1.2-8_amd64.deb stable/main/binary-amd64/libflac++5_1.1.2-8_amd64.deb flac (1.1.2-8) stable-security; urgency=high * Fix ia64 build. stable/main/binary-alpha/libflac++5_1.1.2-8_alpha.deb stable/main/binary-alpha/libflac++-dev_1.1.2-8_alpha.deb stable/main/binary-alpha/liboggflac++2_1.1.2-8_alpha.deb stable/main/binary-alpha/liboggflac-dev_1.1.2-8_alpha.deb stable/main/binary-alpha/liboggflac3_1.1.2-8_alpha.deb stable/main/binary-alpha/xmms-flac_1.1.2-8_alpha.deb stable/main/binary-alpha/libflac-dev_1.1.2-8_alpha.deb stable/main/binary-alpha/libflac7_1.1.2-8_alpha.deb stable/main/binary-alpha/liboggflac++-dev_1.1.2-8_alpha.deb stable/main/binary-alpha/flac_1.1.2-8_alpha.deb flac (1.1.2-8) stable-security; urgency=high * Fix ia64 build. stable/main/binary-i386/liboggflac3_1.1.2-8_i386.deb stable/main/binary-i386/liboggflac++2_1.1.2-8_i386.deb stable/main/binary-i386/libflac++-dev_1.1.2-8_i386.deb stable/main/binary-all/libflac-doc_1.1.2-8_all.deb stable/main/binary-i386/liboggflac-dev_1.1.2-8_i386.deb stable/main/binary-i386/flac_1.1.2-8_i386.deb stable/main/binary-i386/liboggflac++-dev_1.1.2-8_i386.deb stable/main/binary-i386/xmms-flac_1.1.2-8_i386.deb stable/main/source/flac_1.1.2-8.dsc stable/main/binary-i386/libflac++5_1.1.2-8_i386.deb stable/main/source/flac_1.1.2-8.diff.gz stable/main/binary-i386/libflac-dev_1.1.2-8_i386.deb stable/main/binary-i386/libflac7_1.1.2-8_i386.deb flac (1.1.2-8) stable-security; urgency=high * Fix ia64 build. stable/main/binary-all/fail2ban_0.7.5-2etch1_all.deb stable/main/source/fail2ban_0.7.5-2etch1.dsc stable/main/source/fail2ban_0.7.5-2etch1.diff.gz fail2ban (0.7.5-2etch1) stable-security; urgency=high * Propagated fix for asctime pattern from 0.7.8 release (closes: #421848) * Propagated fix for not closed log files from 0.7.8-1 (closes: #439962,434368) * Propagated fix for "reload" bug which is as sever as #439962 and just never was hit by any Debian user yet * Added patch 00_numeric_iptables-L to avoid possible DoS attacks (introduced upstream in 0.7.6) * Propagated "Fixed removal of host in hosts.deny" from 0.7.6, to prevent possible DoS * CVE-2007-4321: anchored sshd and vsftpd failregex at the end of line to prevent DoS on those services. This issue was resolved in sid's version 0.8.0-4 (bugreport 438187). stable/main/binary-powerpc/fai-kernels_1.17+etch.18etch1_powerpc.deb fai-kernels (1.17+etch.18etch1) stable-security; urgency=high * Rebuild against linux-source-2.6.18 (2.6.18.dfsg.1-18etch1) * bugfix/vmsplice-security.patch [SECURITY] Fix missing access check in vmsplice. See CVE-2008-0010, CVE-2008-0600 * bugfix/all/vserver/proc-link-security.patch [SECURITY][vserver] Fix access checks for the links in /proc/$pid. * Changes from linux-source-2.6.18 (2.6.18.dfsg.1-18) [ Martin Michlmayr ] * [mips] Fix network on Cobalt RaQ1, thanks Thomas Bogendoerfer (closes: #460337). [ dann frazier ] * [ia64] Fix an issue with unaligned accesses and certain floating point instructions that can result in silent user data corruption (closes: #461493). * Update abi reference files for ABI 6 stable/main/binary-amd64/fai-kernels_1.17+etch.18etch1_amd64.deb fai-kernels (1.17+etch.18etch1) stable-security; urgency=high * Rebuild against linux-source-2.6.18 (2.6.18.dfsg.1-18etch1) * bugfix/vmsplice-security.patch [SECURITY] Fix missing access check in vmsplice. See CVE-2008-0010, CVE-2008-0600 * bugfix/all/vserver/proc-link-security.patch [SECURITY][vserver] Fix access checks for the links in /proc/$pid. * Changes from linux-source-2.6.18 (2.6.18.dfsg.1-18) [ Martin Michlmayr ] * [mips] Fix network on Cobalt RaQ1, thanks Thomas Bogendoerfer (closes: #460337). [ dann frazier ] * [ia64] Fix an issue with unaligned accesses and certain floating point instructions that can result in silent user data corruption (closes: #461493). * Update abi reference files for ABI 6 stable/main/source/fai-kernels_1.17+etch.18etch1.tar.gz stable/main/binary-i386/fai-kernels_1.17+etch.18etch1_i386.deb stable/main/source/fai-kernels_1.17+etch.18etch1.dsc fai-kernels (1.17+etch.18etch1) stable-security; urgency=high * Rebuild against linux-source-2.6.18 (2.6.18.dfsg.1-18etch1) * bugfix/vmsplice-security.patch [SECURITY] Fix missing access check in vmsplice. See CVE-2008-0010, CVE-2008-0600 * bugfix/all/vserver/proc-link-security.patch [SECURITY][vserver] Fix access checks for the links in /proc/$pid. * Changes from linux-source-2.6.18 (2.6.18.dfsg.1-18) [ Martin Michlmayr ] * [mips] Fix network on Cobalt RaQ1, thanks Thomas Bogendoerfer (closes: #460337). [ dann frazier ] * [ia64] Fix an issue with unaligned accesses and certain floating point instructions that can result in silent user data corruption (closes: #461493). * Update abi reference files for ABI 6 stable/main/binary-sparc/libexiv2-0.10_0.10-1.5_sparc.deb stable/main/binary-sparc/libexiv2-dev_0.10-1.5_sparc.deb stable/main/binary-sparc/exiv2_0.10-1.5_sparc.deb exiv2 (0.10-1.5) stable-security; urgency=high * Fix integer overflow (CVE-2007-6353). stable/main/binary-s390/exiv2_0.10-1.5_s390.deb stable/main/binary-s390/libexiv2-dev_0.10-1.5_s390.deb stable/main/binary-s390/libexiv2-0.10_0.10-1.5_s390.deb exiv2 (0.10-1.5) stable-security; urgency=high * Fix integer overflow (CVE-2007-6353). stable/main/binary-powerpc/libexiv2-0.10_0.10-1.5_powerpc.deb stable/main/binary-powerpc/exiv2_0.10-1.5_powerpc.deb stable/main/binary-powerpc/libexiv2-dev_0.10-1.5_powerpc.deb exiv2 (0.10-1.5) stable-security; urgency=high * Fix integer overflow (CVE-2007-6353). stable/main/binary-mipsel/libexiv2-dev_0.10-1.5_mipsel.deb stable/main/binary-mipsel/exiv2_0.10-1.5_mipsel.deb stable/main/binary-mipsel/libexiv2-0.10_0.10-1.5_mipsel.deb exiv2 (0.10-1.5) stable-security; urgency=high * Fix integer overflow (CVE-2007-6353). stable/main/binary-mips/libexiv2-0.10_0.10-1.5_mips.deb stable/main/binary-mips/exiv2_0.10-1.5_mips.deb stable/main/binary-mips/libexiv2-dev_0.10-1.5_mips.deb exiv2 (0.10-1.5) stable-security; urgency=high * Fix integer overflow (CVE-2007-6353). stable/main/binary-ia64/libexiv2-dev_0.10-1.5_ia64.deb stable/main/binary-ia64/exiv2_0.10-1.5_ia64.deb stable/main/binary-ia64/libexiv2-0.10_0.10-1.5_ia64.deb exiv2 (0.10-1.5) stable-security; urgency=high * Fix integer overflow (CVE-2007-6353). stable/main/binary-hppa/libexiv2-dev_0.10-1.5_hppa.deb stable/main/binary-hppa/libexiv2-0.10_0.10-1.5_hppa.deb stable/main/binary-hppa/exiv2_0.10-1.5_hppa.deb exiv2 (0.10-1.5) stable-security; urgency=high * Fix integer overflow (CVE-2007-6353). stable/main/binary-arm/exiv2_0.10-1.5_arm.deb stable/main/binary-arm/libexiv2-0.10_0.10-1.5_arm.deb stable/main/binary-arm/libexiv2-dev_0.10-1.5_arm.deb exiv2 (0.10-1.5) stable-security; urgency=high * Fix integer overflow (CVE-2007-6353). stable/main/binary-amd64/exiv2_0.10-1.5_amd64.deb stable/main/binary-amd64/libexiv2-dev_0.10-1.5_amd64.deb stable/main/binary-amd64/libexiv2-0.10_0.10-1.5_amd64.deb exiv2 (0.10-1.5) stable-security; urgency=high * Fix integer overflow (CVE-2007-6353). stable/main/binary-alpha/exiv2_0.10-1.5_alpha.deb stable/main/binary-alpha/libexiv2-0.10_0.10-1.5_alpha.deb stable/main/binary-alpha/libexiv2-dev_0.10-1.5_alpha.deb exiv2 (0.10-1.5) stable-security; urgency=high * Fix integer overflow (CVE-2007-6353). stable/main/binary-i386/exiv2_0.10-1.5_i386.deb stable/main/binary-all/libexiv2-doc_0.10-1.5_all.deb stable/main/binary-i386/libexiv2-0.10_0.10-1.5_i386.deb stable/main/binary-i386/libexiv2-dev_0.10-1.5_i386.deb stable/main/source/exiv2_0.10-1.5.diff.gz stable/main/source/exiv2_0.10-1.5.dsc exiv2 (0.10-1.5) stable-security; urgency=high * Fix integer overflow (CVE-2007-6353). stable/main/binary-sparc/eggdrop_1.6.18-1etch1_sparc.deb eggdrop (1.6.18-1etch1) stable-security; urgency=high * Non-maintainer upload * Fix stack based buffer-overflow in mod/server.mod/servrmsg.c, which allows user-assisted, remote IRC servers to execute arbitrary code via a long private message Fixes: CVE-2007-2807 stable/main/binary-s390/eggdrop_1.6.18-1etch1_s390.deb eggdrop (1.6.18-1etch1) stable-security; urgency=high * Non-maintainer upload * Fix stack based buffer-overflow in mod/server.mod/servrmsg.c, which allows user-assisted, remote IRC servers to execute arbitrary code via a long private message Fixes: CVE-2007-2807 stable/main/binary-powerpc/eggdrop_1.6.18-1etch1_powerpc.deb eggdrop (1.6.18-1etch1) stable-security; urgency=high * Non-maintainer upload * Fix stack based buffer-overflow in mod/server.mod/servrmsg.c, which allows user-assisted, remote IRC servers to execute arbitrary code via a long private message Fixes: CVE-2007-2807 stable/main/binary-mipsel/eggdrop_1.6.18-1etch1_mipsel.deb eggdrop (1.6.18-1etch1) stable-security; urgency=high * Non-maintainer upload * Fix stack based buffer-overflow in mod/server.mod/servrmsg.c, which allows user-assisted, remote IRC servers to execute arbitrary code via a long private message Fixes: CVE-2007-2807 stable/main/binary-mips/eggdrop_1.6.18-1etch1_mips.deb eggdrop (1.6.18-1etch1) stable-security; urgency=high * Non-maintainer upload * Fix stack based buffer-overflow in mod/server.mod/servrmsg.c, which allows user-assisted, remote IRC servers to execute arbitrary code via a long private message Fixes: CVE-2007-2807 stable/main/binary-ia64/eggdrop_1.6.18-1etch1_ia64.deb eggdrop (1.6.18-1etch1) stable-security; urgency=high * Non-maintainer upload * Fix stack based buffer-overflow in mod/server.mod/servrmsg.c, which allows user-assisted, remote IRC servers to execute arbitrary code via a long private message Fixes: CVE-2007-2807 stable/main/binary-hppa/eggdrop_1.6.18-1etch1_hppa.deb eggdrop (1.6.18-1etch1) stable-security; urgency=high * Non-maintainer upload * Fix stack based buffer-overflow in mod/server.mod/servrmsg.c, which allows user-assisted, remote IRC servers to execute arbitrary code via a long private message Fixes: CVE-2007-2807 stable/main/binary-arm/eggdrop_1.6.18-1etch1_arm.deb eggdrop (1.6.18-1etch1) stable-security; urgency=high * Non-maintainer upload * Fix stack based buffer-overflow in mod/server.mod/servrmsg.c, which allows user-assisted, remote IRC servers to execute arbitrary code via a long private message Fixes: CVE-2007-2807 stable/main/binary-amd64/eggdrop_1.6.18-1etch1_amd64.deb eggdrop (1.6.18-1etch1) stable-security; urgency=high * Non-maintainer upload * Fix stack based buffer-overflow in mod/server.mod/servrmsg.c, which allows user-assisted, remote IRC servers to execute arbitrary code via a long private message Fixes: CVE-2007-2807 stable/main/binary-alpha/eggdrop_1.6.18-1etch1_alpha.deb eggdrop (1.6.18-1etch1) stable-security; urgency=high * Non-maintainer upload * Fix stack based buffer-overflow in mod/server.mod/servrmsg.c, which allows user-assisted, remote IRC servers to execute arbitrary code via a long private message Fixes: CVE-2007-2807 stable/main/binary-i386/eggdrop_1.6.18-1etch1_i386.deb stable/main/source/eggdrop_1.6.18-1etch1.dsc stable/main/binary-all/eggdrop-data_1.6.18-1etch1_all.deb stable/main/source/eggdrop_1.6.18-1etch1.diff.gz eggdrop (1.6.18-1etch1) stable-security; urgency=high * Non-maintainer upload * Fix stack based buffer-overflow in mod/server.mod/servrmsg.c, which allows user-assisted, remote IRC servers to execute arbitrary code via a long private message Fixes: CVE-2007-2807 stable/main/binary-sparc/dovecot-pop3d_1.0.rc15-2etch3_sparc.deb stable/main/binary-sparc/dovecot-common_1.0.rc15-2etch3_sparc.deb stable/main/binary-sparc/dovecot-imapd_1.0.rc15-2etch3_sparc.deb dovecot (1.0.rc15-2etch3) stable-security; urgency=low * Rebuilt, incrementing the version number. * Specific LDAP + auth cache configuration may mix up user logins: http://dovecot.org/list/dovecot-news/2007-December/000057.html; Upstream patch: http://hg.dovecot.org/dovecot-1.0/raw-rev/2cedab21cd6d (Closes: #458315) stable/main/binary-s390/dovecot-imapd_1.0.rc15-2etch3_s390.deb stable/main/binary-s390/dovecot-common_1.0.rc15-2etch3_s390.deb stable/main/binary-s390/dovecot-pop3d_1.0.rc15-2etch3_s390.deb dovecot (1.0.rc15-2etch3) stable-security; urgency=low * Rebuilt, incrementing the version number. * Specific LDAP + auth cache configuration may mix up user logins: http://dovecot.org/list/dovecot-news/2007-December/000057.html; Upstream patch: http://hg.dovecot.org/dovecot-1.0/raw-rev/2cedab21cd6d (Closes: #458315) stable/main/binary-powerpc/dovecot-pop3d_1.0.rc15-2etch3_powerpc.deb stable/main/binary-powerpc/dovecot-imapd_1.0.rc15-2etch3_powerpc.deb stable/main/binary-powerpc/dovecot-common_1.0.rc15-2etch3_powerpc.deb dovecot (1.0.rc15-2etch3) stable-security; urgency=low * Rebuilt, incrementing the version number. * Specific LDAP + auth cache configuration may mix up user logins: http://dovecot.org/list/dovecot-news/2007-December/000057.html; Upstream patch: http://hg.dovecot.org/dovecot-1.0/raw-rev/2cedab21cd6d (Closes: #458315) stable/main/binary-mipsel/dovecot-pop3d_1.0.rc15-2etch3_mipsel.deb stable/main/binary-mipsel/dovecot-imapd_1.0.rc15-2etch3_mipsel.deb stable/main/binary-mipsel/dovecot-common_1.0.rc15-2etch3_mipsel.deb dovecot (1.0.rc15-2etch3) stable-security; urgency=low * Rebuilt, incrementing the version number. * Specific LDAP + auth cache configuration may mix up user logins: http://dovecot.org/list/dovecot-news/2007-December/000057.html; Upstream patch: http://hg.dovecot.org/dovecot-1.0/raw-rev/2cedab21cd6d (Closes: #458315) stable/main/binary-mips/dovecot-imapd_1.0.rc15-2etch3_mips.deb stable/main/binary-mips/dovecot-pop3d_1.0.rc15-2etch3_mips.deb stable/main/binary-mips/dovecot-common_1.0.rc15-2etch3_mips.deb dovecot (1.0.rc15-2etch3) stable-security; urgency=low * Rebuilt, incrementing the version number. * Specific LDAP + auth cache configuration may mix up user logins: http://dovecot.org/list/dovecot-news/2007-December/000057.html; Upstream patch: http://hg.dovecot.org/dovecot-1.0/raw-rev/2cedab21cd6d (Closes: #458315) stable/main/binary-ia64/dovecot-pop3d_1.0.rc15-2etch3_ia64.deb stable/main/binary-ia64/dovecot-imapd_1.0.rc15-2etch3_ia64.deb stable/main/binary-ia64/dovecot-common_1.0.rc15-2etch3_ia64.deb dovecot (1.0.rc15-2etch3) stable-security; urgency=low * Rebuilt, incrementing the version number. * Specific LDAP + auth cache configuration may mix up user logins: http://dovecot.org/list/dovecot-news/2007-December/000057.html; Upstream patch: http://hg.dovecot.org/dovecot-1.0/raw-rev/2cedab21cd6d (Closes: #458315) stable/main/binary-i386/dovecot-common_1.0.rc15-2etch3_i386.deb stable/main/binary-i386/dovecot-pop3d_1.0.rc15-2etch3_i386.deb stable/main/binary-i386/dovecot-imapd_1.0.rc15-2etch3_i386.deb dovecot (1.0.rc15-2etch3) stable-security; urgency=low * Rebuilt, incrementing the version number. * Specific LDAP + auth cache configuration may mix up user logins: http://dovecot.org/list/dovecot-news/2007-December/000057.html; Upstream patch: http://hg.dovecot.org/dovecot-1.0/raw-rev/2cedab21cd6d (Closes: #458315) stable/main/binary-hppa/dovecot-imapd_1.0.rc15-2etch3_hppa.deb stable/main/binary-hppa/dovecot-pop3d_1.0.rc15-2etch3_hppa.deb stable/main/binary-hppa/dovecot-common_1.0.rc15-2etch3_hppa.deb dovecot (1.0.rc15-2etch3) stable-security; urgency=low * Rebuilt, incrementing the version number. * Specific LDAP + auth cache configuration may mix up user logins: http://dovecot.org/list/dovecot-news/2007-December/000057.html; Upstream patch: http://hg.dovecot.org/dovecot-1.0/raw-rev/2cedab21cd6d (Closes: #458315) stable/main/binary-arm/dovecot-common_1.0.rc15-2etch3_arm.deb stable/main/binary-arm/dovecot-imapd_1.0.rc15-2etch3_arm.deb stable/main/binary-arm/dovecot-pop3d_1.0.rc15-2etch3_arm.deb dovecot (1.0.rc15-2etch3) stable-security; urgency=low * Rebuilt, incrementing the version number. * Specific LDAP + auth cache configuration may mix up user logins: http://dovecot.org/list/dovecot-news/2007-December/000057.html; Upstream patch: http://hg.dovecot.org/dovecot-1.0/raw-rev/2cedab21cd6d (Closes: #458315) stable/main/binary-alpha/dovecot-imapd_1.0.rc15-2etch3_alpha.deb stable/main/binary-alpha/dovecot-common_1.0.rc15-2etch3_alpha.deb stable/main/binary-alpha/dovecot-pop3d_1.0.rc15-2etch3_alpha.deb dovecot (1.0.rc15-2etch3) stable-security; urgency=low * Rebuilt, incrementing the version number. * Specific LDAP + auth cache configuration may mix up user logins: http://dovecot.org/list/dovecot-news/2007-December/000057.html; Upstream patch: http://hg.dovecot.org/dovecot-1.0/raw-rev/2cedab21cd6d (Closes: #458315) stable/main/binary-amd64/dovecot-common_1.0.rc15-2etch3_amd64.deb stable/main/binary-amd64/dovecot-imapd_1.0.rc15-2etch3_amd64.deb stable/main/source/dovecot_1.0.rc15-2etch3.dsc stable/main/source/dovecot_1.0.rc15-2etch3.diff.gz stable/main/binary-amd64/dovecot-pop3d_1.0.rc15-2etch3_amd64.deb dovecot (1.0.rc15-2etch3) stable-security; urgency=low * Rebuilt, incrementing the version number. * Specific LDAP + auth cache configuration may mix up user logins: http://dovecot.org/list/dovecot-news/2007-December/000057.html; Upstream patch: http://hg.dovecot.org/dovecot-1.0/raw-rev/2cedab21cd6d (Closes: #458315) stable/main/binary-sparc/dircproxy_1.0.5-5etch1_sparc.deb dircproxy (1.0.5-5etch1) stable; urgency=low * Non-maintainer upload by SRM * Backport upstream patch to fix a NULL pointer reference, which can lead to a DoS (Closes: #445883) Fixes: CVE-2007-5226 stable/main/binary-s390/dircproxy_1.0.5-5etch1_s390.deb dircproxy (1.0.5-5etch1) stable; urgency=low * Non-maintainer upload by SRM * Backport upstream patch to fix a NULL pointer reference, which can lead to a DoS (Closes: #445883) Fixes: CVE-2007-5226 stable/main/binary-powerpc/dircproxy_1.0.5-5etch1_powerpc.deb dircproxy (1.0.5-5etch1) stable; urgency=low * Non-maintainer upload by SRM * Backport upstream patch to fix a NULL pointer reference, which can lead to a DoS (Closes: #445883) Fixes: CVE-2007-5226 stable/main/binary-mipsel/dircproxy_1.0.5-5etch1_mipsel.deb dircproxy (1.0.5-5etch1) stable; urgency=low * Non-maintainer upload by SRM * Backport upstream patch to fix a NULL pointer reference, which can lead to a DoS (Closes: #445883) Fixes: CVE-2007-5226 stable/main/binary-mips/dircproxy_1.0.5-5etch1_mips.deb dircproxy (1.0.5-5etch1) stable; urgency=low * Non-maintainer upload by SRM * Backport upstream patch to fix a NULL pointer reference, which can lead to a DoS (Closes: #445883) Fixes: CVE-2007-5226 stable/main/binary-ia64/dircproxy_1.0.5-5etch1_ia64.deb dircproxy (1.0.5-5etch1) stable; urgency=low * Non-maintainer upload by SRM * Backport upstream patch to fix a NULL pointer reference, which can lead to a DoS (Closes: #445883) Fixes: CVE-2007-5226 stable/main/binary-hppa/dircproxy_1.0.5-5etch1_hppa.deb dircproxy (1.0.5-5etch1) stable; urgency=low * Non-maintainer upload by SRM * Backport upstream patch to fix a NULL pointer reference, which can lead to a DoS (Closes: #445883) Fixes: CVE-2007-5226 stable/main/binary-arm/dircproxy_1.0.5-5etch1_arm.deb dircproxy (1.0.5-5etch1) stable; urgency=low * Non-maintainer upload by SRM * Backport upstream patch to fix a NULL pointer reference, which can lead to a DoS (Closes: #445883) Fixes: CVE-2007-5226 stable/main/binary-amd64/dircproxy_1.0.5-5etch1_amd64.deb dircproxy (1.0.5-5etch1) stable; urgency=low * Non-maintainer upload by SRM * Backport upstream patch to fix a NULL pointer reference, which can lead to a DoS (Closes: #445883) Fixes: CVE-2007-5226 stable/main/binary-alpha/dircproxy_1.0.5-5etch1_alpha.deb dircproxy (1.0.5-5etch1) stable; urgency=low * Non-maintainer upload by SRM * Backport upstream patch to fix a NULL pointer reference, which can lead to a DoS (Closes: #445883) Fixes: CVE-2007-5226 stable/main/source/dircproxy_1.0.5-5etch1.diff.gz stable/main/source/dircproxy_1.0.5-5etch1.dsc stable/main/binary-i386/dircproxy_1.0.5-5etch1_i386.deb dircproxy (1.0.5-5etch1) stable; urgency=low * Non-maintainer upload by SRM * Backport upstream patch to fix a NULL pointer reference, which can lead to a DoS (Closes: #445883) Fixes: CVE-2007-5226 stable/main/source/denyhosts_2.6-1etch1.dsc stable/main/binary-all/denyhosts_2.6-1etch1_all.deb stable/main/source/denyhosts_2.6-1etch1.diff.gz denyhosts (2.6-1etch1) stable; urgency=low * Non-maintainer upload by SRM * Included 07_fix_CVE-2007-4323.dpatch to fix CVE-2007-4323 (Closes: #438162). stable/main/binary-sparc/debian-installer_20070308etch2_sparc.deb debian-installer (20070308etch2) stable; urgency=low * Update all architectures to use 2.6.18-6 kernels. stable/main/binary-s390/debian-installer_20070308etch2_s390.deb debian-installer (20070308etch2) stable; urgency=low * Update all architectures to use 2.6.18-6 kernels. stable/main/binary-powerpc/debian-installer_20070308etch2_powerpc.deb debian-installer (20070308etch2) stable; urgency=low * Update all architectures to use 2.6.18-6 kernels. stable/main/binary-mipsel/debian-installer_20070308etch2_mipsel.deb debian-installer (20070308etch2) stable; urgency=low * Update all architectures to use 2.6.18-6 kernels. stable/main/binary-mips/debian-installer_20070308etch2_mips.deb debian-installer (20070308etch2) stable; urgency=low * Update all architectures to use 2.6.18-6 kernels. stable/main/binary-ia64/debian-installer_20070308etch2_ia64.deb debian-installer (20070308etch2) stable; urgency=low * Update all architectures to use 2.6.18-6 kernels. stable/main/binary-i386/debian-installer_20070308etch2_i386.deb debian-installer (20070308etch2) stable; urgency=low * Update all architectures to use 2.6.18-6 kernels. stable/main/binary-hppa/debian-installer_20070308etch2_hppa.deb debian-installer (20070308etch2) stable; urgency=low * Update all architectures to use 2.6.18-6 kernels. stable/main/binary-arm/debian-installer_20070308etch2_arm.deb debian-installer (20070308etch2) stable; urgency=low * Update all architectures to use 2.6.18-6 kernels. stable/main/binary-alpha/debian-installer_20070308etch2_alpha.deb debian-installer (20070308etch2) stable; urgency=low * Update all architectures to use 2.6.18-6 kernels. stable/main/source/debian-installer_20070308etch2.tar.gz stable/main/binary-amd64/debian-installer_20070308etch2_amd64.deb stable/main/source/debian-installer_20070308etch2.dsc debian-installer (20070308etch2) stable; urgency=low * Update all architectures to use 2.6.18-6 kernels. stable/main/binary-sparc/libcupsimage2-dev_1.2.7-4etch2_sparc.deb stable/main/binary-sparc/libcupsys2-dev_1.2.7-4etch2_sparc.deb stable/main/binary-sparc/cupsys_1.2.7-4etch2_sparc.deb stable/main/binary-sparc/libcupsimage2_1.2.7-4etch2_sparc.deb stable/main/binary-sparc/cupsys-dbg_1.2.7-4etch2_sparc.deb stable/main/binary-sparc/libcupsys2_1.2.7-4etch2_sparc.deb stable/main/binary-sparc/cupsys-client_1.2.7-4etch2_sparc.deb stable/main/binary-sparc/cupsys-bsd_1.2.7-4etch2_sparc.deb cupsys (1.2.7-4etch2) stable-security; urgency=low * Fix CVE-2007-5849 and CVE-2007-6358. stable/main/binary-s390/cupsys_1.2.7-4etch2_s390.deb stable/main/binary-s390/cupsys-dbg_1.2.7-4etch2_s390.deb stable/main/binary-s390/libcupsimage2_1.2.7-4etch2_s390.deb stable/main/binary-s390/cupsys-bsd_1.2.7-4etch2_s390.deb stable/main/binary-s390/cupsys-client_1.2.7-4etch2_s390.deb stable/main/binary-s390/libcupsimage2-dev_1.2.7-4etch2_s390.deb stable/main/binary-s390/libcupsys2-dev_1.2.7-4etch2_s390.deb stable/main/binary-s390/libcupsys2_1.2.7-4etch2_s390.deb cupsys (1.2.7-4etch2) stable-security; urgency=low * Fix CVE-2007-5849 and CVE-2007-6358. stable/main/binary-powerpc/libcupsimage2-dev_1.2.7-4etch2_powerpc.deb stable/main/binary-powerpc/cupsys-client_1.2.7-4etch2_powerpc.deb stable/main/binary-powerpc/libcupsys2-dev_1.2.7-4etch2_powerpc.deb stable/main/binary-powerpc/libcupsimage2_1.2.7-4etch2_powerpc.deb stable/main/binary-powerpc/cupsys_1.2.7-4etch2_powerpc.deb stable/main/binary-powerpc/cupsys-dbg_1.2.7-4etch2_powerpc.deb stable/main/binary-powerpc/libcupsys2_1.2.7-4etch2_powerpc.deb stable/main/binary-powerpc/cupsys-bsd_1.2.7-4etch2_powerpc.deb cupsys (1.2.7-4etch2) stable-security; urgency=low * Fix CVE-2007-5849 and CVE-2007-6358. stable/main/binary-mipsel/libcupsimage2_1.2.7-4etch2_mipsel.deb stable/main/binary-mipsel/cupsys_1.2.7-4etch2_mipsel.deb stable/main/binary-mipsel/libcupsys2_1.2.7-4etch2_mipsel.deb stable/main/binary-mipsel/cupsys-dbg_1.2.7-4etch2_mipsel.deb stable/main/binary-mipsel/cupsys-bsd_1.2.7-4etch2_mipsel.deb stable/main/binary-mipsel/cupsys-client_1.2.7-4etch2_mipsel.deb stable/main/binary-mipsel/libcupsimage2-dev_1.2.7-4etch2_mipsel.deb stable/main/binary-mipsel/libcupsys2-dev_1.2.7-4etch2_mipsel.deb cupsys (1.2.7-4etch2) stable-security; urgency=low * Fix CVE-2007-5849 and CVE-2007-6358. stable/main/binary-mips/cupsys-client_1.2.7-4etch2_mips.deb stable/main/binary-mips/libcupsimage2_1.2.7-4etch2_mips.deb stable/main/binary-mips/libcupsys2_1.2.7-4etch2_mips.deb stable/main/binary-mips/cupsys-dbg_1.2.7-4etch2_mips.deb stable/main/binary-mips/cupsys-bsd_1.2.7-4etch2_mips.deb stable/main/binary-mips/libcupsys2-dev_1.2.7-4etch2_mips.deb stable/main/binary-mips/cupsys_1.2.7-4etch2_mips.deb stable/main/binary-mips/libcupsimage2-dev_1.2.7-4etch2_mips.deb cupsys (1.2.7-4etch2) stable-security; urgency=low * Fix CVE-2007-5849 and CVE-2007-6358. stable/main/binary-ia64/cupsys-dbg_1.2.7-4etch2_ia64.deb stable/main/binary-ia64/cupsys-client_1.2.7-4etch2_ia64.deb stable/main/binary-ia64/cupsys-bsd_1.2.7-4etch2_ia64.deb stable/main/binary-ia64/libcupsys2_1.2.7-4etch2_ia64.deb stable/main/binary-ia64/libcupsimage2_1.2.7-4etch2_ia64.deb stable/main/binary-ia64/libcupsimage2-dev_1.2.7-4etch2_ia64.deb stable/main/binary-ia64/libcupsys2-dev_1.2.7-4etch2_ia64.deb stable/main/binary-ia64/cupsys_1.2.7-4etch2_ia64.deb cupsys (1.2.7-4etch2) stable-security; urgency=low * Fix CVE-2007-5849 and CVE-2007-6358. stable/main/binary-hppa/cupsys-bsd_1.2.7-4etch2_hppa.deb stable/main/binary-hppa/cupsys-client_1.2.7-4etch2_hppa.deb stable/main/binary-hppa/libcupsimage2_1.2.7-4etch2_hppa.deb stable/main/binary-hppa/libcupsimage2-dev_1.2.7-4etch2_hppa.deb stable/main/binary-hppa/libcupsys2_1.2.7-4etch2_hppa.deb stable/main/binary-hppa/cupsys_1.2.7-4etch2_hppa.deb stable/main/binary-hppa/libcupsys2-dev_1.2.7-4etch2_hppa.deb stable/main/binary-hppa/cupsys-dbg_1.2.7-4etch2_hppa.deb cupsys (1.2.7-4etch2) stable-security; urgency=low * Fix CVE-2007-5849 and CVE-2007-6358. stable/main/binary-arm/libcupsimage2-dev_1.2.7-4etch2_arm.deb stable/main/binary-arm/cupsys-dbg_1.2.7-4etch2_arm.deb stable/main/binary-arm/cupsys-bsd_1.2.7-4etch2_arm.deb stable/main/binary-arm/cupsys-client_1.2.7-4etch2_arm.deb stable/main/binary-arm/libcupsys2-dev_1.2.7-4etch2_arm.deb stable/main/binary-arm/libcupsys2_1.2.7-4etch2_arm.deb stable/main/binary-arm/libcupsimage2_1.2.7-4etch2_arm.deb stable/main/binary-arm/cupsys_1.2.7-4etch2_arm.deb cupsys (1.2.7-4etch2) stable-security; urgency=low * Fix CVE-2007-5849 and CVE-2007-6358. stable/main/binary-amd64/libcupsys2-dev_1.2.7-4etch2_amd64.deb stable/main/binary-amd64/cupsys-bsd_1.2.7-4etch2_amd64.deb stable/main/binary-amd64/libcupsys2_1.2.7-4etch2_amd64.deb stable/main/binary-amd64/libcupsimage2_1.2.7-4etch2_amd64.deb stable/main/binary-amd64/cupsys-client_1.2.7-4etch2_amd64.deb stable/main/binary-amd64/cupsys_1.2.7-4etch2_amd64.deb stable/main/binary-amd64/libcupsimage2-dev_1.2.7-4etch2_amd64.deb stable/main/binary-amd64/cupsys-dbg_1.2.7-4etch2_amd64.deb cupsys (1.2.7-4etch2) stable-security; urgency=low * Fix CVE-2007-5849 and CVE-2007-6358. stable/main/binary-alpha/cupsys-dbg_1.2.7-4etch2_alpha.deb stable/main/binary-alpha/libcupsimage2_1.2.7-4etch2_alpha.deb stable/main/binary-alpha/cupsys_1.2.7-4etch2_alpha.deb stable/main/binary-alpha/libcupsys2_1.2.7-4etch2_alpha.deb stable/main/binary-alpha/cupsys-client_1.2.7-4etch2_alpha.deb stable/main/binary-alpha/libcupsys2-dev_1.2.7-4etch2_alpha.deb stable/main/binary-alpha/cupsys-bsd_1.2.7-4etch2_alpha.deb stable/main/binary-alpha/libcupsimage2-dev_1.2.7-4etch2_alpha.deb cupsys (1.2.7-4etch2) stable-security; urgency=low * Fix CVE-2007-5849 and CVE-2007-6358. stable/main/binary-all/libcupsys2-gnutls10_1.2.7-4etch2_all.deb stable/main/binary-i386/libcupsimage2-dev_1.2.7-4etch2_i386.deb stable/main/binary-i386/libcupsys2-dev_1.2.7-4etch2_i386.deb stable/main/source/cupsys_1.2.7-4etch2.dsc stable/main/binary-all/cupsys-common_1.2.7-4etch2_all.deb stable/main/binary-i386/libcupsys2_1.2.7-4etch2_i386.deb stable/main/binary-i386/cupsys_1.2.7-4etch2_i386.deb stable/main/binary-i386/cupsys-client_1.2.7-4etch2_i386.deb stable/main/binary-i386/libcupsimage2_1.2.7-4etch2_i386.deb stable/main/source/cupsys_1.2.7-4etch2.diff.gz stable/main/binary-i386/cupsys-dbg_1.2.7-4etch2_i386.deb stable/main/binary-i386/cupsys-bsd_1.2.7-4etch2_i386.deb cupsys (1.2.7-4etch2) stable-security; urgency=low * Fix CVE-2007-5849 and CVE-2007-6358. stable/main/binary-sparc/cpio_2.6-18_sparc.deb cpio (2.6-18) stable; urgency=low * Apply patch from Russell Stuart to fix some malformed creation of ustar archives. closes: #358990. stable/main/binary-s390/cpio_2.6-18_s390.deb cpio (2.6-18) stable; urgency=low * Apply patch from Russell Stuart to fix some malformed creation of ustar archives. closes: #358990. stable/main/binary-powerpc/cpio_2.6-18_powerpc.deb cpio (2.6-18) stable; urgency=low * Apply patch from Russell Stuart to fix some malformed creation of ustar archives. closes: #358990. stable/main/binary-mipsel/cpio_2.6-18_mipsel.deb cpio (2.6-18) stable; urgency=low * Apply patch from Russell Stuart to fix some malformed creation of ustar archives. closes: #358990. stable/main/binary-mips/cpio_2.6-18_mips.deb cpio (2.6-18) stable; urgency=low * Apply patch from Russell Stuart to fix some malformed creation of ustar archives. closes: #358990. stable/main/binary-ia64/cpio_2.6-18_ia64.deb cpio (2.6-18) stable; urgency=low * Apply patch from Russell Stuart to fix some malformed creation of ustar archives. closes: #358990. stable/main/binary-hppa/cpio_2.6-18_hppa.deb cpio (2.6-18) stable; urgency=low * Apply patch from Russell Stuart to fix some malformed creation of ustar archives. closes: #358990. stable/main/binary-arm/cpio_2.6-18_arm.deb cpio (2.6-18) stable; urgency=low * Apply patch from Russell Stuart to fix some malformed creation of ustar archives. closes: #358990. stable/main/binary-amd64/cpio_2.6-18_amd64.deb cpio (2.6-18) stable; urgency=low * Apply patch from Russell Stuart to fix some malformed creation of ustar archives. closes: #358990. stable/main/binary-alpha/cpio_2.6-18_alpha.deb cpio (2.6-18) stable; urgency=low * Apply patch from Russell Stuart to fix some malformed creation of ustar archives. closes: #358990. stable/main/binary-i386/cpio_2.6-18_i386.deb stable/main/source/cpio_2.6-18.dsc stable/main/source/cpio_2.6-18.diff.gz cpio (2.6-18) stable; urgency=low * Apply patch from Russell Stuart to fix some malformed creation of ustar archives. closes: #358990. stable/main/binary-sparc/libclamav2_0.90.1dfsg-3etch9_sparc.deb stable/main/binary-sparc/clamav_0.90.1dfsg-3etch9_sparc.deb stable/main/binary-sparc/clamav-daemon_0.90.1dfsg-3etch9_sparc.deb stable/main/binary-sparc/clamav-dbg_0.90.1dfsg-3etch9_sparc.deb stable/main/binary-sparc/clamav-milter_0.90.1dfsg-3etch9_sparc.deb stable/main/binary-sparc/libclamav-dev_0.90.1dfsg-3etch9_sparc.deb stable/main/binary-sparc/clamav-freshclam_0.90.1dfsg-3etch9_sparc.deb clamav (0.90.1dfsg-3etch9) stable; urgency=low * Remove non-free unrar code. - This change breaks all rar scanning. Sorry - This also means we don't have to ship patches for removed code. stable/main/binary-s390/clamav-freshclam_0.90.1dfsg-3etch9_s390.deb stable/main/binary-s390/clamav-daemon_0.90.1dfsg-3etch9_s390.deb stable/main/binary-s390/libclamav-dev_0.90.1dfsg-3etch9_s390.deb stable/main/binary-s390/clamav-dbg_0.90.1dfsg-3etch9_s390.deb stable/main/binary-s390/clamav-milter_0.90.1dfsg-3etch9_s390.deb stable/main/binary-s390/libclamav2_0.90.1dfsg-3etch9_s390.deb stable/main/binary-s390/clamav_0.90.1dfsg-3etch9_s390.deb clamav (0.90.1dfsg-3etch9) stable; urgency=low * Remove non-free unrar code. - This change breaks all rar scanning. Sorry - This also means we don't have to ship patches for removed code. stable/main/binary-powerpc/clamav-daemon_0.90.1dfsg-3etch9_powerpc.deb stable/main/binary-powerpc/clamav_0.90.1dfsg-3etch9_powerpc.deb stable/main/binary-powerpc/libclamav2_0.90.1dfsg-3etch9_powerpc.deb stable/main/binary-powerpc/libclamav-dev_0.90.1dfsg-3etch9_powerpc.deb stable/main/binary-powerpc/clamav-dbg_0.90.1dfsg-3etch9_powerpc.deb stable/main/binary-powerpc/clamav-freshclam_0.90.1dfsg-3etch9_powerpc.deb stable/main/binary-powerpc/clamav-milter_0.90.1dfsg-3etch9_powerpc.deb clamav (0.90.1dfsg-3etch9) stable; urgency=low * Remove non-free unrar code. - This change breaks all rar scanning. Sorry - This also means we don't have to ship patches for removed code. stable/main/binary-mipsel/clamav-freshclam_0.90.1dfsg-3etch9_mipsel.deb stable/main/binary-mipsel/clamav-daemon_0.90.1dfsg-3etch9_mipsel.deb stable/main/binary-mipsel/libclamav2_0.90.1dfsg-3etch9_mipsel.deb stable/main/binary-mipsel/clamav-dbg_0.90.1dfsg-3etch9_mipsel.deb stable/main/binary-mipsel/libclamav-dev_0.90.1dfsg-3etch9_mipsel.deb stable/main/binary-mipsel/clamav-milter_0.90.1dfsg-3etch9_mipsel.deb stable/main/binary-mipsel/clamav_0.90.1dfsg-3etch9_mipsel.deb clamav (0.90.1dfsg-3etch9) stable; urgency=low * Remove non-free unrar code. - This change breaks all rar scanning. Sorry - This also means we don't have to ship patches for removed code. stable/main/binary-mips/clamav-freshclam_0.90.1dfsg-3etch9_mips.deb stable/main/binary-mips/clamav-daemon_0.90.1dfsg-3etch9_mips.deb stable/main/binary-mips/clamav_0.90.1dfsg-3etch9_mips.deb stable/main/binary-mips/clamav-dbg_0.90.1dfsg-3etch9_mips.deb stable/main/binary-mips/clamav-milter_0.90.1dfsg-3etch9_mips.deb stable/main/binary-mips/libclamav-dev_0.90.1dfsg-3etch9_mips.deb stable/main/binary-mips/libclamav2_0.90.1dfsg-3etch9_mips.deb clamav (0.90.1dfsg-3etch9) stable; urgency=low * Remove non-free unrar code. - This change breaks all rar scanning. Sorry - This also means we don't have to ship patches for removed code. stable/main/binary-ia64/clamav-daemon_0.90.1dfsg-3etch9_ia64.deb stable/main/binary-ia64/libclamav-dev_0.90.1dfsg-3etch9_ia64.deb stable/main/binary-ia64/libclamav2_0.90.1dfsg-3etch9_ia64.deb stable/main/binary-ia64/clamav-dbg_0.90.1dfsg-3etch9_ia64.deb stable/main/binary-ia64/clamav-milter_0.90.1dfsg-3etch9_ia64.deb stable/main/binary-ia64/clamav_0.90.1dfsg-3etch9_ia64.deb stable/main/binary-ia64/clamav-freshclam_0.90.1dfsg-3etch9_ia64.deb clamav (0.90.1dfsg-3etch9) stable; urgency=low * Remove non-free unrar code. - This change breaks all rar scanning. Sorry - This also means we don't have to ship patches for removed code. stable/main/binary-hppa/clamav_0.90.1dfsg-3etch9_hppa.deb stable/main/binary-hppa/clamav-dbg_0.90.1dfsg-3etch9_hppa.deb stable/main/binary-hppa/clamav-milter_0.90.1dfsg-3etch9_hppa.deb stable/main/binary-hppa/clamav-freshclam_0.90.1dfsg-3etch9_hppa.deb stable/main/binary-hppa/clamav-daemon_0.90.1dfsg-3etch9_hppa.deb stable/main/binary-hppa/libclamav2_0.90.1dfsg-3etch9_hppa.deb stable/main/binary-hppa/libclamav-dev_0.90.1dfsg-3etch9_hppa.deb clamav (0.90.1dfsg-3etch9) stable; urgency=low * Remove non-free unrar code. - This change breaks all rar scanning. Sorry - This also means we don't have to ship patches for removed code. stable/main/binary-arm/clamav-milter_0.90.1dfsg-3etch9_arm.deb stable/main/binary-arm/clamav_0.90.1dfsg-3etch9_arm.deb stable/main/binary-arm/libclamav2_0.90.1dfsg-3etch9_arm.deb stable/main/binary-arm/clamav-daemon_0.90.1dfsg-3etch9_arm.deb stable/main/binary-arm/clamav-freshclam_0.90.1dfsg-3etch9_arm.deb stable/main/binary-arm/libclamav-dev_0.90.1dfsg-3etch9_arm.deb stable/main/binary-arm/clamav-dbg_0.90.1dfsg-3etch9_arm.deb clamav (0.90.1dfsg-3etch9) stable; urgency=low * Remove non-free unrar code. - This change breaks all rar scanning. Sorry - This also means we don't have to ship patches for removed code. stable/main/binary-amd64/clamav-freshclam_0.90.1dfsg-3etch9_amd64.deb stable/main/binary-amd64/libclamav2_0.90.1dfsg-3etch9_amd64.deb stable/main/binary-amd64/clamav-dbg_0.90.1dfsg-3etch9_amd64.deb stable/main/binary-amd64/clamav_0.90.1dfsg-3etch9_amd64.deb stable/main/binary-amd64/clamav-milter_0.90.1dfsg-3etch9_amd64.deb stable/main/binary-amd64/clamav-daemon_0.90.1dfsg-3etch9_amd64.deb stable/main/binary-amd64/libclamav-dev_0.90.1dfsg-3etch9_amd64.deb clamav (0.90.1dfsg-3etch9) stable; urgency=low * Remove non-free unrar code. - This change breaks all rar scanning. Sorry - This also means we don't have to ship patches for removed code. stable/main/binary-alpha/libclamav-dev_0.90.1dfsg-3etch9_alpha.deb stable/main/binary-alpha/clamav-freshclam_0.90.1dfsg-3etch9_alpha.deb stable/main/binary-alpha/clamav-dbg_0.90.1dfsg-3etch9_alpha.deb stable/main/binary-alpha/clamav_0.90.1dfsg-3etch9_alpha.deb stable/main/binary-alpha/libclamav2_0.90.1dfsg-3etch9_alpha.deb stable/main/binary-alpha/clamav-daemon_0.90.1dfsg-3etch9_alpha.deb stable/main/binary-alpha/clamav-milter_0.90.1dfsg-3etch9_alpha.deb clamav (0.90.1dfsg-3etch9) stable; urgency=low * Remove non-free unrar code. - This change breaks all rar scanning. Sorry - This also means we don't have to ship patches for removed code. stable/main/binary-all/clamav-testfiles_0.90.1dfsg-3etch9_all.deb stable/main/source/clamav_0.90.1dfsg-3etch9.diff.gz stable/main/binary-all/clamav-base_0.90.1dfsg-3etch9_all.deb stable/main/binary-all/clamav-docs_0.90.1dfsg-3etch9_all.deb stable/main/binary-i386/libclamav2_0.90.1dfsg-3etch9_i386.deb stable/main/binary-i386/clamav-daemon_0.90.1dfsg-3etch9_i386.deb stable/main/binary-i386/clamav_0.90.1dfsg-3etch9_i386.deb stable/main/source/clamav_0.90.1dfsg.orig.tar.gz stable/main/binary-i386/clamav-milter_0.90.1dfsg-3etch9_i386.deb stable/main/binary-i386/clamav-freshclam_0.90.1dfsg-3etch9_i386.deb stable/main/binary-i386/libclamav-dev_0.90.1dfsg-3etch9_i386.deb stable/main/source/clamav_0.90.1dfsg-3etch9.dsc stable/main/binary-i386/clamav-dbg_0.90.1dfsg-3etch9_i386.deb clamav (0.90.1dfsg-3etch9) stable; urgency=low * Remove non-free unrar code. - This change breaks all rar scanning. Sorry - This also means we don't have to ship patches for removed code. stable/main/binary-sparc/choose-mirror-bin_2.13etch2_sparc.udeb choose-mirror (2.13etch2) stable; urgency=low * Update mirror list. stable/main/binary-s390/choose-mirror-bin_2.13etch2_s390.udeb choose-mirror (2.13etch2) stable; urgency=low * Update mirror list. stable/main/binary-powerpc/choose-mirror-bin_2.13etch2_powerpc.udeb choose-mirror (2.13etch2) stable; urgency=low * Update mirror list. stable/main/binary-mipsel/choose-mirror-bin_2.13etch2_mipsel.udeb choose-mirror (2.13etch2) stable; urgency=low * Update mirror list. stable/main/binary-mips/choose-mirror-bin_2.13etch2_mips.udeb choose-mirror (2.13etch2) stable; urgency=low * Update mirror list. stable/main/binary-ia64/choose-mirror-bin_2.13etch2_ia64.udeb choose-mirror (2.13etch2) stable; urgency=low * Update mirror list. stable/main/binary-i386/choose-mirror-bin_2.13etch2_i386.udeb choose-mirror (2.13etch2) stable; urgency=low * Update mirror list. stable/main/binary-hppa/choose-mirror-bin_2.13etch2_hppa.udeb choose-mirror (2.13etch2) stable; urgency=low * Update mirror list. stable/main/binary-arm/choose-mirror-bin_2.13etch2_arm.udeb choose-mirror (2.13etch2) stable; urgency=low * Update mirror list. stable/main/binary-alpha/choose-mirror-bin_2.13etch2_alpha.udeb choose-mirror (2.13etch2) stable; urgency=low * Update mirror list. stable/main/source/choose-mirror_2.13etch2.tar.gz stable/main/source/choose-mirror_2.13etch2.dsc stable/main/binary-all/choose-mirror_2.13etch2_all.udeb stable/main/binary-amd64/choose-mirror-bin_2.13etch2_amd64.udeb choose-mirror (2.13etch2) stable; urgency=low * Update mirror list. stable/main/source/bos_1.1.dfsg-0etch1.diff.gz stable/main/binary-all/bos_1.1.dfsg-0etch1_all.deb stable/main/source/bos_1.1.dfsg-0etch1.dsc bos (1.1.dfsg-0etch1) stable; urgency=low * NMU. * data/music/title.ogg: Removing since according to upstream we have no rights to distribute it. (Closes: #440638) stable/main/source/apt-listchanges_2.72.5etch2.tar.gz stable/main/source/apt-listchanges_2.72.5etch2.dsc stable/main/binary-all/apt-listchanges_2.72.5etch2_all.deb apt-listchanges (2.72.5etch2) stable-security; urgency=high * Non-maintainer upload by The Security Team. * Fixed regression introduced in previous upload. stable/main/binary-sparc/apache2-mpm-itk_2.2.3-01-2+b1_sparc.deb apache2-mpm-itk (2.2.3-01-2+b1) stable; urgency=low * Binary-only non-maintainer upload for sparc; no source changes. * Rebuild against apache2 2.2.3-4+etch4 stable/main/binary-s390/apache2-mpm-itk_2.2.3-01-2+b1_s390.deb apache2-mpm-itk (2.2.3-01-2+b1) stable; urgency=low * Binary-only non-maintainer upload for s390; no source changes. * Rebuild against apache2 2.2.3-4+etch4 stable/main/binary-powerpc/apache2-mpm-itk_2.2.3-01-2+b1_powerpc.deb apache2-mpm-itk (2.2.3-01-2+b1) stable; urgency=low * Binary-only non-maintainer upload for powerpc; no source changes. * Rebuild against apache2 2.2.3-4+etch4 stable/main/binary-mipsel/apache2-mpm-itk_2.2.3-01-2+b1_mipsel.deb apache2-mpm-itk (2.2.3-01-2+b1) stable; urgency=low * Binary-only non-maintainer upload for mipsel; no source changes. * Rebuild against apache2 2.2.3-4+etch4 stable/main/binary-mips/apache2-mpm-itk_2.2.3-01-2+b1_mips.deb apache2-mpm-itk (2.2.3-01-2+b1) stable; urgency=low * Binary-only non-maintainer upload for mips; no source changes. * Rebuild against apache2 2.2.3-4+etch4 stable/main/binary-ia64/apache2-mpm-itk_2.2.3-01-2+b1_ia64.deb apache2-mpm-itk (2.2.3-01-2+b1) stable; urgency=low * Binary-only non-maintainer upload for ia64; no source changes. * Rebuild against apache2 2.2.3-4+etch4 stable/main/binary-i386/apache2-mpm-itk_2.2.3-01-2+b1_i386.deb apache2-mpm-itk (2.2.3-01-2+b1) stable; urgency=low * Binary-only non-maintainer upload for i386; no source changes. * Rebuild against apache2 2.2.3-4+etch4 stable/main/binary-hppa/apache2-mpm-itk_2.2.3-01-2+b1_hppa.deb apache2-mpm-itk (2.2.3-01-2+b1) stable; urgency=low * Binary-only non-maintainer upload for hppa; no source changes. * Rebuild against apache2 2.2.3-4+etch4 stable/main/binary-arm/apache2-mpm-itk_2.2.3-01-2+b1_arm.deb apache2-mpm-itk (2.2.3-01-2+b1) stable; urgency=low * Binary-only non-maintainer upload for arm; no source changes. * Rebuild against apache2 2.2.3-4+etch4 stable/main/binary-amd64/apache2-mpm-itk_2.2.3-01-2+b1_amd64.deb apache2-mpm-itk (2.2.3-01-2+b1) stable; urgency=low * Binary-only non-maintainer upload for amd64; no source changes. * Rebuild against apache2 2.2.3-4+etch4 stable/main/binary-alpha/apache2-mpm-itk_2.2.3-01-2+b1_alpha.deb apache2-mpm-itk (2.2.3-01-2+b1) stable; urgency=low * Binary-only non-maintainer upload for alpha; no source changes. * Rebuild against apache2 2.2.3-4+etch4 stable/main/binary-sparc/apache2-mpm-prefork_2.2.3-4+etch4_sparc.deb stable/main/binary-sparc/apache2.2-common_2.2.3-4+etch4_sparc.deb stable/main/binary-sparc/apache2-utils_2.2.3-4+etch4_sparc.deb stable/main/binary-sparc/apache2-threaded-dev_2.2.3-4+etch4_sparc.deb stable/main/binary-sparc/apache2-prefork-dev_2.2.3-4+etch4_sparc.deb stable/main/binary-sparc/apache2-mpm-worker_2.2.3-4+etch4_sparc.deb stable/main/binary-sparc/apache2-mpm-event_2.2.3-4+etch4_sparc.deb apache2 (2.2.3-4+etch4) stable; urgency=low * Fix various cross site scripting vulnerabilities with browsers that do not conform to RFC 2616: Apache now adds explicit ContentType and Charset headers to the output of various modules, even if AddDefaultCharset is commented out. This includes directory indexes generated by mod_autoindex and mod_proxy_ftp, which are now marked as iso-8859-1 by default. (CVE-2007-4465, CVE-2008-0005, closes: #453783) To allow to specify the character set for the directory indexes, the Charset and Type IndexOptions and the ProxyFtpDirCharset directive have been backported from 2.2.8. If you use mod_autoindex and use UTF-8 for your filenames, you should add Charset=UTF-8 to the IndexOptions line in /etc/apache2/apache2.conf . If you use mod_proxy_ftp, the default charset can be set with the ProxyFtpDirCharset directive in /etc/apache2/mods-available/proxy.conf . ProxyFtpDirCharset can also be used inside blocks to set the charset for specific servers. * Reduce memory usage of chunk filter and ap_rwrite/ap_rflush (Closes: #399776, #421557) * More minor security fixes: - XSS in mod_imagemap (CVE-2007-5000) - XSS in mod_proxy_balancer's balancer manager (CVE-2007-6421) - XSS in HTTP method in 413 error message (CVE-2007-6203) - possible crash in mod_proxy_balancer's balancer manager (CVE-2007-6422) * Fix mod_proxy_balancer configuration file parsing (closes: #453630). * Don't ship NEWS.Debian with apache2-utils as it affects only the server. Remove bogus reference to 2.2.3-5 from README.Debian, and add note about MSIE SSL workaround. stable/main/binary-s390/apache2.2-common_2.2.3-4+etch4_s390.deb stable/main/binary-s390/apache2-mpm-event_2.2.3-4+etch4_s390.deb stable/main/binary-s390/apache2-mpm-prefork_2.2.3-4+etch4_s390.deb stable/main/binary-s390/apache2-threaded-dev_2.2.3-4+etch4_s390.deb stable/main/binary-s390/apache2-prefork-dev_2.2.3-4+etch4_s390.deb stable/main/binary-s390/apache2-mpm-worker_2.2.3-4+etch4_s390.deb stable/main/binary-s390/apache2-utils_2.2.3-4+etch4_s390.deb apache2 (2.2.3-4+etch4) stable; urgency=low * Fix various cross site scripting vulnerabilities with browsers that do not conform to RFC 2616: Apache now adds explicit ContentType and Charset headers to the output of various modules, even if AddDefaultCharset is commented out. This includes directory indexes generated by mod_autoindex and mod_proxy_ftp, which are now marked as iso-8859-1 by default. (CVE-2007-4465, CVE-2008-0005, closes: #453783) To allow to specify the character set for the directory indexes, the Charset and Type IndexOptions and the ProxyFtpDirCharset directive have been backported from 2.2.8. If you use mod_autoindex and use UTF-8 for your filenames, you should add Charset=UTF-8 to the IndexOptions line in /etc/apache2/apache2.conf . If you use mod_proxy_ftp, the default charset can be set with the ProxyFtpDirCharset directive in /etc/apache2/mods-available/proxy.conf . ProxyFtpDirCharset can also be used inside blocks to set the charset for specific servers. * Reduce memory usage of chunk filter and ap_rwrite/ap_rflush (Closes: #399776, #421557) * More minor security fixes: - XSS in mod_imagemap (CVE-2007-5000) - XSS in mod_proxy_balancer's balancer manager (CVE-2007-6421) - XSS in HTTP method in 413 error message (CVE-2007-6203) - possible crash in mod_proxy_balancer's balancer manager (CVE-2007-6422) * Fix mod_proxy_balancer configuration file parsing (closes: #453630). * Don't ship NEWS.Debian with apache2-utils as it affects only the server. Remove bogus reference to 2.2.3-5 from README.Debian, and add note about MSIE SSL workaround. stable/main/binary-powerpc/apache2-threaded-dev_2.2.3-4+etch4_powerpc.deb stable/main/binary-powerpc/apache2-utils_2.2.3-4+etch4_powerpc.deb stable/main/binary-powerpc/apache2-mpm-worker_2.2.3-4+etch4_powerpc.deb stable/main/binary-powerpc/apache2-mpm-event_2.2.3-4+etch4_powerpc.deb stable/main/binary-powerpc/apache2.2-common_2.2.3-4+etch4_powerpc.deb stable/main/binary-powerpc/apache2-mpm-prefork_2.2.3-4+etch4_powerpc.deb stable/main/binary-powerpc/apache2-prefork-dev_2.2.3-4+etch4_powerpc.deb apache2 (2.2.3-4+etch4) stable; urgency=low * Fix various cross site scripting vulnerabilities with browsers that do not conform to RFC 2616: Apache now adds explicit ContentType and Charset headers to the output of various modules, even if AddDefaultCharset is commented out. This includes directory indexes generated by mod_autoindex and mod_proxy_ftp, which are now marked as iso-8859-1 by default. (CVE-2007-4465, CVE-2008-0005, closes: #453783) To allow to specify the character set for the directory indexes, the Charset and Type IndexOptions and the ProxyFtpDirCharset directive have been backported from 2.2.8. If you use mod_autoindex and use UTF-8 for your filenames, you should add Charset=UTF-8 to the IndexOptions line in /etc/apache2/apache2.conf . If you use mod_proxy_ftp, the default charset can be set with the ProxyFtpDirCharset directive in /etc/apache2/mods-available/proxy.conf . ProxyFtpDirCharset can also be used inside blocks to set the charset for specific servers. * Reduce memory usage of chunk filter and ap_rwrite/ap_rflush (Closes: #399776, #421557) * More minor security fixes: - XSS in mod_imagemap (CVE-2007-5000) - XSS in mod_proxy_balancer's balancer manager (CVE-2007-6421) - XSS in HTTP method in 413 error message (CVE-2007-6203) - possible crash in mod_proxy_balancer's balancer manager (CVE-2007-6422) * Fix mod_proxy_balancer configuration file parsing (closes: #453630). * Don't ship NEWS.Debian with apache2-utils as it affects only the server. Remove bogus reference to 2.2.3-5 from README.Debian, and add note about MSIE SSL workaround. stable/main/binary-mipsel/apache2-mpm-worker_2.2.3-4+etch4_mipsel.deb stable/main/binary-mipsel/apache2-prefork-dev_2.2.3-4+etch4_mipsel.deb stable/main/binary-mipsel/apache2.2-common_2.2.3-4+etch4_mipsel.deb stable/main/binary-mipsel/apache2-mpm-event_2.2.3-4+etch4_mipsel.deb stable/main/binary-mipsel/apache2-mpm-prefork_2.2.3-4+etch4_mipsel.deb stable/main/binary-mipsel/apache2-threaded-dev_2.2.3-4+etch4_mipsel.deb stable/main/binary-mipsel/apache2-utils_2.2.3-4+etch4_mipsel.deb apache2 (2.2.3-4+etch4) stable; urgency=low * Fix various cross site scripting vulnerabilities with browsers that do not conform to RFC 2616: Apache now adds explicit ContentType and Charset headers to the output of various modules, even if AddDefaultCharset is commented out. This includes directory indexes generated by mod_autoindex and mod_proxy_ftp, which are now marked as iso-8859-1 by default. (CVE-2007-4465, CVE-2008-0005, closes: #453783) To allow to specify the character set for the directory indexes, the Charset and Type IndexOptions and the ProxyFtpDirCharset directive have been backported from 2.2.8. If you use mod_autoindex and use UTF-8 for your filenames, you should add Charset=UTF-8 to the IndexOptions line in /etc/apache2/apache2.conf . If you use mod_proxy_ftp, the default charset can be set with the ProxyFtpDirCharset directive in /etc/apache2/mods-available/proxy.conf . ProxyFtpDirCharset can also be used inside blocks to set the charset for specific servers. * Reduce memory usage of chunk filter and ap_rwrite/ap_rflush (Closes: #399776, #421557) * More minor security fixes: - XSS in mod_imagemap (CVE-2007-5000) - XSS in mod_proxy_balancer's balancer manager (CVE-2007-6421) - XSS in HTTP method in 413 error message (CVE-2007-6203) - possible crash in mod_proxy_balancer's balancer manager (CVE-2007-6422) * Fix mod_proxy_balancer configuration file parsing (closes: #453630). * Don't ship NEWS.Debian with apache2-utils as it affects only the server. Remove bogus reference to 2.2.3-5 from README.Debian, and add note about MSIE SSL workaround. stable/main/binary-mips/apache2-mpm-worker_2.2.3-4+etch4_mips.deb stable/main/binary-mips/apache2-mpm-event_2.2.3-4+etch4_mips.deb stable/main/binary-mips/apache2-mpm-prefork_2.2.3-4+etch4_mips.deb stable/main/binary-mips/apache2-prefork-dev_2.2.3-4+etch4_mips.deb stable/main/binary-mips/apache2-threaded-dev_2.2.3-4+etch4_mips.deb stable/main/binary-mips/apache2.2-common_2.2.3-4+etch4_mips.deb stable/main/binary-mips/apache2-utils_2.2.3-4+etch4_mips.deb apache2 (2.2.3-4+etch4) stable; urgency=low * Fix various cross site scripting vulnerabilities with browsers that do not conform to RFC 2616: Apache now adds explicit ContentType and Charset headers to the output of various modules, even if AddDefaultCharset is commented out. This includes directory indexes generated by mod_autoindex and mod_proxy_ftp, which are now marked as iso-8859-1 by default. (CVE-2007-4465, CVE-2008-0005, closes: #453783) To allow to specify the character set for the directory indexes, the Charset and Type IndexOptions and the ProxyFtpDirCharset directive have been backported from 2.2.8. If you use mod_autoindex and use UTF-8 for your filenames, you should add Charset=UTF-8 to the IndexOptions line in /etc/apache2/apache2.conf . If you use mod_proxy_ftp, the default charset can be set with the ProxyFtpDirCharset directive in /etc/apache2/mods-available/proxy.conf . ProxyFtpDirCharset can also be used inside blocks to set the charset for specific servers. * Reduce memory usage of chunk filter and ap_rwrite/ap_rflush (Closes: #399776, #421557) * More minor security fixes: - XSS in mod_imagemap (CVE-2007-5000) - XSS in mod_proxy_balancer's balancer manager (CVE-2007-6421) - XSS in HTTP method in 413 error message (CVE-2007-6203) - possible crash in mod_proxy_balancer's balancer manager (CVE-2007-6422) * Fix mod_proxy_balancer configuration file parsing (closes: #453630). * Don't ship NEWS.Debian with apache2-utils as it affects only the server. Remove bogus reference to 2.2.3-5 from README.Debian, and add note about MSIE SSL workaround. stable/main/binary-ia64/apache2.2-common_2.2.3-4+etch4_ia64.deb stable/main/binary-ia64/apache2-mpm-prefork_2.2.3-4+etch4_ia64.deb stable/main/binary-ia64/apache2-mpm-event_2.2.3-4+etch4_ia64.deb stable/main/binary-ia64/apache2-mpm-worker_2.2.3-4+etch4_ia64.deb stable/main/binary-ia64/apache2-utils_2.2.3-4+etch4_ia64.deb stable/main/binary-ia64/apache2-prefork-dev_2.2.3-4+etch4_ia64.deb stable/main/binary-ia64/apache2-threaded-dev_2.2.3-4+etch4_ia64.deb apache2 (2.2.3-4+etch4) stable; urgency=low * Fix various cross site scripting vulnerabilities with browsers that do not conform to RFC 2616: Apache now adds explicit ContentType and Charset headers to the output of various modules, even if AddDefaultCharset is commented out. This includes directory indexes generated by mod_autoindex and mod_proxy_ftp, which are now marked as iso-8859-1 by default. (CVE-2007-4465, CVE-2008-0005, closes: #453783) To allow to specify the character set for the directory indexes, the Charset and Type IndexOptions and the ProxyFtpDirCharset directive have been backported from 2.2.8. If you use mod_autoindex and use UTF-8 for your filenames, you should add Charset=UTF-8 to the IndexOptions line in /etc/apache2/apache2.conf . If you use mod_proxy_ftp, the default charset can be set with the ProxyFtpDirCharset directive in /etc/apache2/mods-available/proxy.conf . ProxyFtpDirCharset can also be used inside blocks to set the charset for specific servers. * Reduce memory usage of chunk filter and ap_rwrite/ap_rflush (Closes: #399776, #421557) * More minor security fixes: - XSS in mod_imagemap (CVE-2007-5000) - XSS in mod_proxy_balancer's balancer manager (CVE-2007-6421) - XSS in HTTP method in 413 error message (CVE-2007-6203) - possible crash in mod_proxy_balancer's balancer manager (CVE-2007-6422) * Fix mod_proxy_balancer configuration file parsing (closes: #453630). * Don't ship NEWS.Debian with apache2-utils as it affects only the server. Remove bogus reference to 2.2.3-5 from README.Debian, and add note about MSIE SSL workaround. stable/main/binary-hppa/apache2-threaded-dev_2.2.3-4+etch4_hppa.deb stable/main/binary-hppa/apache2-mpm-prefork_2.2.3-4+etch4_hppa.deb stable/main/binary-hppa/apache2.2-common_2.2.3-4+etch4_hppa.deb stable/main/binary-hppa/apache2-mpm-event_2.2.3-4+etch4_hppa.deb stable/main/binary-hppa/apache2-utils_2.2.3-4+etch4_hppa.deb stable/main/binary-hppa/apache2-prefork-dev_2.2.3-4+etch4_hppa.deb stable/main/binary-hppa/apache2-mpm-worker_2.2.3-4+etch4_hppa.deb apache2 (2.2.3-4+etch4) stable; urgency=low * Fix various cross site scripting vulnerabilities with browsers that do not conform to RFC 2616: Apache now adds explicit ContentType and Charset headers to the output of various modules, even if AddDefaultCharset is commented out. This includes directory indexes generated by mod_autoindex and mod_proxy_ftp, which are now marked as iso-8859-1 by default. (CVE-2007-4465, CVE-2008-0005, closes: #453783) To allow to specify the character set for the directory indexes, the Charset and Type IndexOptions and the ProxyFtpDirCharset directive have been backported from 2.2.8. If you use mod_autoindex and use UTF-8 for your filenames, you should add Charset=UTF-8 to the IndexOptions line in /etc/apache2/apache2.conf . If you use mod_proxy_ftp, the default charset can be set with the ProxyFtpDirCharset directive in /etc/apache2/mods-available/proxy.conf . ProxyFtpDirCharset can also be used inside blocks to set the charset for specific servers. * Reduce memory usage of chunk filter and ap_rwrite/ap_rflush (Closes: #399776, #421557) * More minor security fixes: - XSS in mod_imagemap (CVE-2007-5000) - XSS in mod_proxy_balancer's balancer manager (CVE-2007-6421) - XSS in HTTP method in 413 error message (CVE-2007-6203) - possible crash in mod_proxy_balancer's balancer manager (CVE-2007-6422) * Fix mod_proxy_balancer configuration file parsing (closes: #453630). * Don't ship NEWS.Debian with apache2-utils as it affects only the server. Remove bogus reference to 2.2.3-5 from README.Debian, and add note about MSIE SSL workaround. stable/main/binary-arm/apache2-threaded-dev_2.2.3-4+etch4_arm.deb stable/main/binary-arm/apache2-prefork-dev_2.2.3-4+etch4_arm.deb stable/main/binary-arm/apache2-mpm-worker_2.2.3-4+etch4_arm.deb stable/main/binary-arm/apache2-mpm-event_2.2.3-4+etch4_arm.deb stable/main/binary-arm/apache2-utils_2.2.3-4+etch4_arm.deb stable/main/binary-arm/apache2-mpm-prefork_2.2.3-4+etch4_arm.deb stable/main/binary-arm/apache2.2-common_2.2.3-4+etch4_arm.deb apache2 (2.2.3-4+etch4) stable; urgency=low * Fix various cross site scripting vulnerabilities with browsers that do not conform to RFC 2616: Apache now adds explicit ContentType and Charset headers to the output of various modules, even if AddDefaultCharset is commented out. This includes directory indexes generated by mod_autoindex and mod_proxy_ftp, which are now marked as iso-8859-1 by default. (CVE-2007-4465, CVE-2008-0005, closes: #453783) To allow to specify the character set for the directory indexes, the Charset and Type IndexOptions and the ProxyFtpDirCharset directive have been backported from 2.2.8. If you use mod_autoindex and use UTF-8 for your filenames, you should add Charset=UTF-8 to the IndexOptions line in /etc/apache2/apache2.conf . If you use mod_proxy_ftp, the default charset can be set with the ProxyFtpDirCharset directive in /etc/apache2/mods-available/proxy.conf . ProxyFtpDirCharset can also be used inside blocks to set the charset for specific servers. * Reduce memory usage of chunk filter and ap_rwrite/ap_rflush (Closes: #399776, #421557) * More minor security fixes: - XSS in mod_imagemap (CVE-2007-5000) - XSS in mod_proxy_balancer's balancer manager (CVE-2007-6421) - XSS in HTTP method in 413 error message (CVE-2007-6203) - possible crash in mod_proxy_balancer's balancer manager (CVE-2007-6422) * Fix mod_proxy_balancer configuration file parsing (closes: #453630). * Don't ship NEWS.Debian with apache2-utils as it affects only the server. Remove bogus reference to 2.2.3-5 from README.Debian, and add note about MSIE SSL workaround. stable/main/binary-amd64/apache2-mpm-worker_2.2.3-4+etch4_amd64.deb stable/main/binary-amd64/apache2-mpm-event_2.2.3-4+etch4_amd64.deb stable/main/binary-amd64/apache2.2-common_2.2.3-4+etch4_amd64.deb stable/main/binary-amd64/apache2-prefork-dev_2.2.3-4+etch4_amd64.deb stable/main/binary-amd64/apache2-mpm-prefork_2.2.3-4+etch4_amd64.deb stable/main/binary-amd64/apache2-threaded-dev_2.2.3-4+etch4_amd64.deb stable/main/binary-amd64/apache2-utils_2.2.3-4+etch4_amd64.deb apache2 (2.2.3-4+etch4) stable; urgency=low * Fix various cross site scripting vulnerabilities with browsers that do not conform to RFC 2616: Apache now adds explicit ContentType and Charset headers to the output of various modules, even if AddDefaultCharset is commented out. This includes directory indexes generated by mod_autoindex and mod_proxy_ftp, which are now marked as iso-8859-1 by default. (CVE-2007-4465, CVE-2008-0005, closes: #453783) To allow to specify the character set for the directory indexes, the Charset and Type IndexOptions and the ProxyFtpDirCharset directive have been backported from 2.2.8. If you use mod_autoindex and use UTF-8 for your filenames, you should add Charset=UTF-8 to the IndexOptions line in /etc/apache2/apache2.conf . If you use mod_proxy_ftp, the default charset can be set with the ProxyFtpDirCharset directive in /etc/apache2/mods-available/proxy.conf . ProxyFtpDirCharset can also be used inside blocks to set the charset for specific servers. * Reduce memory usage of chunk filter and ap_rwrite/ap_rflush (Closes: #399776, #421557) * More minor security fixes: - XSS in mod_imagemap (CVE-2007-5000) - XSS in mod_proxy_balancer's balancer manager (CVE-2007-6421) - XSS in HTTP method in 413 error message (CVE-2007-6203) - possible crash in mod_proxy_balancer's balancer manager (CVE-2007-6422) * Fix mod_proxy_balancer configuration file parsing (closes: #453630). * Don't ship NEWS.Debian with apache2-utils as it affects only the server. Remove bogus reference to 2.2.3-5 from README.Debian, and add note about MSIE SSL workaround. stable/main/binary-alpha/apache2-mpm-event_2.2.3-4+etch4_alpha.deb stable/main/binary-alpha/apache2-mpm-prefork_2.2.3-4+etch4_alpha.deb stable/main/binary-alpha/apache2.2-common_2.2.3-4+etch4_alpha.deb stable/main/binary-alpha/apache2-prefork-dev_2.2.3-4+etch4_alpha.deb stable/main/binary-alpha/apache2-mpm-worker_2.2.3-4+etch4_alpha.deb stable/main/binary-alpha/apache2-threaded-dev_2.2.3-4+etch4_alpha.deb stable/main/binary-alpha/apache2-utils_2.2.3-4+etch4_alpha.deb apache2 (2.2.3-4+etch4) stable; urgency=low * Fix various cross site scripting vulnerabilities with browsers that do not conform to RFC 2616: Apache now adds explicit ContentType and Charset headers to the output of various modules, even if AddDefaultCharset is commented out. This includes directory indexes generated by mod_autoindex and mod_proxy_ftp, which are now marked as iso-8859-1 by default. (CVE-2007-4465, CVE-2008-0005, closes: #453783) To allow to specify the character set for the directory indexes, the Charset and Type IndexOptions and the ProxyFtpDirCharset directive have been backported from 2.2.8. If you use mod_autoindex and use UTF-8 for your filenames, you should add Charset=UTF-8 to the IndexOptions line in /etc/apache2/apache2.conf . If you use mod_proxy_ftp, the default charset can be set with the ProxyFtpDirCharset directive in /etc/apache2/mods-available/proxy.conf . ProxyFtpDirCharset can also be used inside blocks to set the charset for specific servers. * Reduce memory usage of chunk filter and ap_rwrite/ap_rflush (Closes: #399776, #421557) * More minor security fixes: - XSS in mod_imagemap (CVE-2007-5000) - XSS in mod_proxy_balancer's balancer manager (CVE-2007-6421) - XSS in HTTP method in 413 error message (CVE-2007-6203) - possible crash in mod_proxy_balancer's balancer manager (CVE-2007-6422) * Fix mod_proxy_balancer configuration file parsing (closes: #453630). * Don't ship NEWS.Debian with apache2-utils as it affects only the server. Remove bogus reference to 2.2.3-5 from README.Debian, and add note about MSIE SSL workaround. stable/main/binary-i386/apache2.2-common_2.2.3-4+etch4_i386.deb stable/main/binary-i386/apache2-mpm-event_2.2.3-4+etch4_i386.deb stable/main/binary-all/apache2-mpm-perchild_2.2.3-4+etch4_all.deb stable/main/binary-i386/apache2-utils_2.2.3-4+etch4_i386.deb stable/main/binary-all/apache2-doc_2.2.3-4+etch4_all.deb stable/main/source/apache2_2.2.3-4+etch4.dsc stable/main/binary-i386/apache2-mpm-worker_2.2.3-4+etch4_i386.deb stable/main/binary-i386/apache2-prefork-dev_2.2.3-4+etch4_i386.deb stable/main/binary-all/apache2-src_2.2.3-4+etch4_all.deb stable/main/binary-all/apache2_2.2.3-4+etch4_all.deb stable/main/binary-i386/apache2-mpm-prefork_2.2.3-4+etch4_i386.deb stable/main/source/apache2_2.2.3-4+etch4.diff.gz stable/main/binary-i386/apache2-threaded-dev_2.2.3-4+etch4_i386.deb apache2 (2.2.3-4+etch4) stable; urgency=low * Fix various cross site scripting vulnerabilities with browsers that do not conform to RFC 2616: Apache now adds explicit ContentType and Charset headers to the output of various modules, even if AddDefaultCharset is commented out. This includes directory indexes generated by mod_autoindex and mod_proxy_ftp, which are now marked as iso-8859-1 by default. (CVE-2007-4465, CVE-2008-0005, closes: #453783) To allow to specify the character set for the directory indexes, the Charset and Type IndexOptions and the ProxyFtpDirCharset directive have been backported from 2.2.8. If you use mod_autoindex and use UTF-8 for your filenames, you should add Charset=UTF-8 to the IndexOptions line in /etc/apache2/apache2.conf . If you use mod_proxy_ftp, the default charset can be set with the ProxyFtpDirCharset directive in /etc/apache2/mods-available/proxy.conf . ProxyFtpDirCharset can also be used inside blocks to set the charset for specific servers. * Reduce memory usage of chunk filter and ap_rwrite/ap_rflush (Closes: #399776, #421557) * More minor security fixes: - XSS in mod_imagemap (CVE-2007-5000) - XSS in mod_proxy_balancer's balancer manager (CVE-2007-6421) - XSS in HTTP method in 413 error message (CVE-2007-6203) - possible crash in mod_proxy_balancer's balancer manager (CVE-2007-6422) * Fix mod_proxy_balancer configuration file parsing (closes: #453630). * Don't ship NEWS.Debian with apache2-utils as it affects only the server. Remove bogus reference to 2.2.3-5 from README.Debian, and add note about MSIE SSL workaround. stable/main/binary-sparc/apache_1.3.34-4.1+etch1_sparc.deb stable/main/binary-sparc/apache-common_1.3.34-4.1+etch1_sparc.deb stable/main/binary-sparc/apache-ssl_1.3.34-4.1+etch1_sparc.deb stable/main/binary-sparc/apache-perl_1.3.34-4.1+etch1_sparc.deb stable/main/binary-sparc/libapache-mod-perl_1.29.0.4-4.1+etch1_sparc.deb stable/main/binary-sparc/apache-dbg_1.3.34-4.1+etch1_sparc.deb apache (1.3.34-4.1+etch1) stable; urgency=low * Minor security fixes: - CVE-2007-1349: DoS in mod_perl - CVE-2007-3304: potential DoS by sending SIGUSR1 to arbitrary processes - CVE-2006-5752, CVE-2007-6388: XSS in mod_status - CVE-2007-5000: XSS in mod_imap stable/main/binary-s390/apache_1.3.34-4.1+etch1_s390.deb stable/main/binary-s390/apache-ssl_1.3.34-4.1+etch1_s390.deb stable/main/binary-s390/apache-dbg_1.3.34-4.1+etch1_s390.deb stable/main/binary-s390/libapache-mod-perl_1.29.0.4-4.1+etch1_s390.deb stable/main/binary-s390/apache-perl_1.3.34-4.1+etch1_s390.deb stable/main/binary-s390/apache-common_1.3.34-4.1+etch1_s390.deb apache (1.3.34-4.1+etch1) stable; urgency=low * Minor security fixes: - CVE-2007-1349: DoS in mod_perl - CVE-2007-3304: potential DoS by sending SIGUSR1 to arbitrary processes - CVE-2006-5752, CVE-2007-6388: XSS in mod_status - CVE-2007-5000: XSS in mod_imap stable/main/binary-powerpc/apache_1.3.34-4.1+etch1_powerpc.deb stable/main/binary-powerpc/apache-ssl_1.3.34-4.1+etch1_powerpc.deb stable/main/binary-powerpc/apache-common_1.3.34-4.1+etch1_powerpc.deb stable/main/binary-powerpc/apache-perl_1.3.34-4.1+etch1_powerpc.deb stable/main/binary-powerpc/libapache-mod-perl_1.29.0.4-4.1+etch1_powerpc.deb stable/main/binary-powerpc/apache-dbg_1.3.34-4.1+etch1_powerpc.deb apache (1.3.34-4.1+etch1) stable; urgency=low * Minor security fixes: - CVE-2007-1349: DoS in mod_perl - CVE-2007-3304: potential DoS by sending SIGUSR1 to arbitrary processes - CVE-2006-5752, CVE-2007-6388: XSS in mod_status - CVE-2007-5000: XSS in mod_imap stable/main/binary-mipsel/libapache-mod-perl_1.29.0.4-4.1+etch1_mipsel.deb stable/main/binary-mipsel/apache-dbg_1.3.34-4.1+etch1_mipsel.deb stable/main/binary-mipsel/apache-common_1.3.34-4.1+etch1_mipsel.deb stable/main/binary-mipsel/apache_1.3.34-4.1+etch1_mipsel.deb stable/main/binary-mipsel/apache-ssl_1.3.34-4.1+etch1_mipsel.deb stable/main/binary-mipsel/apache-perl_1.3.34-4.1+etch1_mipsel.deb apache (1.3.34-4.1+etch1) stable; urgency=low * Minor security fixes: - CVE-2007-1349: DoS in mod_perl - CVE-2007-3304: potential DoS by sending SIGUSR1 to arbitrary processes - CVE-2006-5752, CVE-2007-6388: XSS in mod_status - CVE-2007-5000: XSS in mod_imap stable/main/binary-mips/apache-ssl_1.3.34-4.1+etch1_mips.deb stable/main/binary-mips/apache-perl_1.3.34-4.1+etch1_mips.deb stable/main/binary-mips/apache-dbg_1.3.34-4.1+etch1_mips.deb stable/main/binary-mips/libapache-mod-perl_1.29.0.4-4.1+etch1_mips.deb stable/main/binary-mips/apache-common_1.3.34-4.1+etch1_mips.deb stable/main/binary-mips/apache_1.3.34-4.1+etch1_mips.deb apache (1.3.34-4.1+etch1) stable; urgency=low * Minor security fixes: - CVE-2007-1349: DoS in mod_perl - CVE-2007-3304: potential DoS by sending SIGUSR1 to arbitrary processes - CVE-2006-5752, CVE-2007-6388: XSS in mod_status - CVE-2007-5000: XSS in mod_imap stable/main/binary-ia64/apache_1.3.34-4.1+etch1_ia64.deb stable/main/binary-ia64/apache-ssl_1.3.34-4.1+etch1_ia64.deb stable/main/binary-ia64/apache-dbg_1.3.34-4.1+etch1_ia64.deb stable/main/binary-ia64/libapache-mod-perl_1.29.0.4-4.1+etch1_ia64.deb stable/main/binary-ia64/apache-perl_1.3.34-4.1+etch1_ia64.deb stable/main/binary-ia64/apache-common_1.3.34-4.1+etch1_ia64.deb apache (1.3.34-4.1+etch1) stable; urgency=low * Minor security fixes: - CVE-2007-1349: DoS in mod_perl - CVE-2007-3304: potential DoS by sending SIGUSR1 to arbitrary processes - CVE-2006-5752, CVE-2007-6388: XSS in mod_status - CVE-2007-5000: XSS in mod_imap stable/main/binary-hppa/apache_1.3.34-4.1+etch1_hppa.deb stable/main/binary-hppa/apache-perl_1.3.34-4.1+etch1_hppa.deb stable/main/binary-hppa/apache-common_1.3.34-4.1+etch1_hppa.deb stable/main/binary-hppa/libapache-mod-perl_1.29.0.4-4.1+etch1_hppa.deb stable/main/binary-hppa/apache-ssl_1.3.34-4.1+etch1_hppa.deb stable/main/binary-hppa/apache-dbg_1.3.34-4.1+etch1_hppa.deb apache (1.3.34-4.1+etch1) stable; urgency=low * Minor security fixes: - CVE-2007-1349: DoS in mod_perl - CVE-2007-3304: potential DoS by sending SIGUSR1 to arbitrary processes - CVE-2006-5752, CVE-2007-6388: XSS in mod_status - CVE-2007-5000: XSS in mod_imap stable/main/binary-arm/libapache-mod-perl_1.29.0.4-4.1+etch1_arm.deb stable/main/binary-arm/apache-perl_1.3.34-4.1+etch1_arm.deb stable/main/binary-arm/apache-common_1.3.34-4.1+etch1_arm.deb stable/main/binary-arm/apache_1.3.34-4.1+etch1_arm.deb stable/main/binary-arm/apache-ssl_1.3.34-4.1+etch1_arm.deb stable/main/binary-arm/apache-dbg_1.3.34-4.1+etch1_arm.deb apache (1.3.34-4.1+etch1) stable; urgency=low * Minor security fixes: - CVE-2007-1349: DoS in mod_perl - CVE-2007-3304: potential DoS by sending SIGUSR1 to arbitrary processes - CVE-2006-5752, CVE-2007-6388: XSS in mod_status - CVE-2007-5000: XSS in mod_imap stable/main/binary-amd64/apache-common_1.3.34-4.1+etch1_amd64.deb stable/main/binary-amd64/apache-ssl_1.3.34-4.1+etch1_amd64.deb stable/main/binary-amd64/apache-perl_1.3.34-4.1+etch1_amd64.deb stable/main/binary-amd64/apache-dbg_1.3.34-4.1+etch1_amd64.deb stable/main/binary-amd64/libapache-mod-perl_1.29.0.4-4.1+etch1_amd64.deb stable/main/binary-amd64/apache_1.3.34-4.1+etch1_amd64.deb apache (1.3.34-4.1+etch1) stable; urgency=low * Minor security fixes: - CVE-2007-1349: DoS in mod_perl - CVE-2007-3304: potential DoS by sending SIGUSR1 to arbitrary processes - CVE-2006-5752, CVE-2007-6388: XSS in mod_status - CVE-2007-5000: XSS in mod_imap stable/main/binary-alpha/apache-common_1.3.34-4.1+etch1_alpha.deb stable/main/binary-alpha/libapache-mod-perl_1.29.0.4-4.1+etch1_alpha.deb stable/main/binary-alpha/apache-dbg_1.3.34-4.1+etch1_alpha.deb stable/main/binary-alpha/apache-ssl_1.3.34-4.1+etch1_alpha.deb stable/main/binary-alpha/apache-perl_1.3.34-4.1+etch1_alpha.deb stable/main/binary-alpha/apache_1.3.34-4.1+etch1_alpha.deb apache (1.3.34-4.1+etch1) stable; urgency=low * Minor security fixes: - CVE-2007-1349: DoS in mod_perl - CVE-2007-3304: potential DoS by sending SIGUSR1 to arbitrary processes - CVE-2006-5752, CVE-2007-6388: XSS in mod_status - CVE-2007-5000: XSS in mod_imap stable/main/binary-i386/apache-dbg_1.3.34-4.1+etch1_i386.deb stable/main/binary-i386/apache-common_1.3.34-4.1+etch1_i386.deb stable/main/binary-i386/apache_1.3.34-4.1+etch1_i386.deb stable/main/binary-i386/libapache-mod-perl_1.29.0.4-4.1+etch1_i386.deb stable/main/binary-i386/apache-perl_1.3.34-4.1+etch1_i386.deb stable/main/binary-all/apache-dev_1.3.34-4.1+etch1_all.deb stable/main/binary-i386/apache-ssl_1.3.34-4.1+etch1_i386.deb stable/main/binary-all/apache-doc_1.3.34-4.1+etch1_all.deb stable/main/source/apache_1.3.34-4.1+etch1.dsc stable/main/source/apache_1.3.34-4.1+etch1.diff.gz apache (1.3.34-4.1+etch1) stable; urgency=low * Minor security fixes: - CVE-2007-1349: DoS in mod_perl - CVE-2007-3304: potential DoS by sending SIGUSR1 to arbitrary processes - CVE-2006-5752, CVE-2007-6388: XSS in mod_status - CVE-2007-5000: XSS in mod_imap Removals: unace-nonfree | 2.5-1 | alpha, arm, hppa, ia64, mips, mipsel, powerpc, sparc Closed bugs: 458052 ------------------- Reason ------------------- RoSRM; ANAIS not big-endian safe ---------------------------------------------- flyspray | 0.9.8-10 | source, all Closed bugs: 459296 ------------------- Reason ------------------- RoM; security nightmare, unsupported upstream ---------------------------------------------- bandersnatch | 0.4-1.1 | source, all bandersnatch-frontend | 0.4-1.1 | all Closed bugs: 461525 ------------------- Reason ------------------- RoQA; no remedy yet for security bugs (upstream is MIA) ---------------------------------------------- jags | 0.22.1-2.1 | source, alpha, amd64, arm, i386, ia64, mips, mipsel, powerpc, s390, sparc jags | 0.22.1-2.1+b1 | hppa Closed bugs: 462647 ------------------- Reason ------------------- RoQA; broken beyond repair ---------------------------------------------- ipxripd | 0.7-13.1 | source, alpha, amd64, arm, hppa, i386, ia64, mips, mipsel, powerpc, s390, sparc Closed bugs: 230358 ------------------- Reason ------------------- RoSRM; only works with 2.4 kernels ---------------------------------------------- flashplugin-nonfree | 9.0.115.0.1~etch1 | source, i386 Closed bugs: 458550 ------------------- Reason ------------------- RoSRM; security nightmare ---------------------------------------------- acpi-modules-2.6.18-5-486-di | 1.44etch2 | i386 acpi-modules-2.6.18-5-amd64-di | 1.21etch2 | amd64 acpi-modules-2.6.18-5-itanium-di | 1.18etch2 | ia64 affs-modules-2.6.18-5-powerpc-di | 1.29etch2 | powerpc affs-modules-2.6.18-5-powerpc-miboot-di | 1.29etch2 | powerpc affs-modules-2.6.18-5-powerpc64-di | 1.29etch2 | powerpc affs-modules-2.6.18-5-prep-di | 1.29etch2 | powerpc cdrom-core-modules-2.6.18-5-486-di | 1.44etch2 | i386 cdrom-core-modules-2.6.18-5-alpha-generic-di | 0.17etch2 | alpha cdrom-core-modules-2.6.18-5-amd64-di | 1.21etch2 | amd64 cdrom-core-modules-2.6.18-5-footbridge-di | 1.10etch2 | arm cdrom-core-modules-2.6.18-5-iop32x-di | 1.10etch2 | arm cdrom-core-modules-2.6.18-5-itanium-di | 1.18etch2 | ia64 cdrom-core-modules-2.6.18-5-parisc-di | 1.17etch2 | hppa cdrom-core-modules-2.6.18-5-parisc64-di | 1.17etch2 | hppa cdrom-core-modules-2.6.18-5-powerpc-di | 1.29etch2 | powerpc cdrom-core-modules-2.6.18-5-powerpc-miboot-di | 1.29etch2 | powerpc cdrom-core-modules-2.6.18-5-powerpc64-di | 1.29etch2 | powerpc cdrom-core-modules-2.6.18-5-prep-di | 1.29etch2 | powerpc cdrom-core-modules-2.6.18-5-r5k-cobalt-di | 0.13etch2 | mipsel cdrom-core-modules-2.6.18-5-sb1-bcm91250a-di | 0.13etch2 | mips, mipsel cdrom-core-modules-2.6.18-5-sb1a-bcm91480b-di | 0.13etch2 | mips, mipsel cdrom-core-modules-2.6.18-5-sparc32-di | 1.20etch2 | sparc cdrom-core-modules-2.6.18-5-sparc64-di | 1.20etch2 | sparc cdrom-modules-2.6.18-5-486-di | 1.44etch2 | i386 cdrom-modules-2.6.18-5-alpha-generic-di | 0.17etch2 | alpha core-modules-2.6.18-5-amd64-di | 1.21etch2 | amd64 crc-modules-2.6.18-5-486-di | 1.44etch2 | i386 crc-modules-2.6.18-5-alpha-generic-di | 0.17etch2 | alpha crc-modules-2.6.18-5-amd64-di | 1.21etch2 | amd64 crc-modules-2.6.18-5-footbridge-di | 1.10etch2 | arm crc-modules-2.6.18-5-iop32x-di | 1.10etch2 | arm crc-modules-2.6.18-5-itanium-di | 1.18etch2 | ia64 crc-modules-2.6.18-5-ixp4xx-di | 1.10etch2 | arm crypto-modules-2.6.18-5-486-di | 1.44etch2 | i386 crypto-modules-2.6.18-5-alpha-generic-di | 0.17etch2 | alpha crypto-modules-2.6.18-5-amd64-di | 1.21etch2 | amd64 crypto-modules-2.6.18-5-itanium-di | 1.18etch2 | ia64 crypto-modules-2.6.18-5-parisc-di | 1.17etch2 | hppa crypto-modules-2.6.18-5-parisc64-di | 1.17etch2 | hppa crypto-modules-2.6.18-5-powerpc-di | 1.29etch2 | powerpc crypto-modules-2.6.18-5-powerpc-miboot-di | 1.29etch2 | powerpc crypto-modules-2.6.18-5-powerpc64-di | 1.29etch2 | powerpc crypto-modules-2.6.18-5-prep-di | 1.29etch2 | powerpc crypto-modules-2.6.18-5-r3k-kn02-di | 0.13etch2 | mipsel crypto-modules-2.6.18-5-r4k-ip22-di | 0.13etch2 | mips crypto-modules-2.6.18-5-r4k-kn04-di | 0.13etch2 | mipsel crypto-modules-2.6.18-5-r5k-cobalt-di | 0.13etch2 | mipsel crypto-modules-2.6.18-5-r5k-ip32-di | 0.13etch2 | mips crypto-modules-2.6.18-5-s390-di | 0.13etch2 | s390 crypto-modules-2.6.18-5-sb1-bcm91250a-di | 0.13etch2 | mips, mipsel crypto-modules-2.6.18-5-sb1a-bcm91480b-di | 0.13etch2 | mips, mipsel crypto-modules-2.6.18-5-sparc32-di | 1.20etch2 | sparc crypto-modules-2.6.18-5-sparc64-di | 1.20etch2 | sparc dasd-modules-2.6.18-5-s390-di | 0.13etch2 | s390 efi-modules-2.6.18-5-486-di | 1.44etch2 | i386 efi-modules-2.6.18-5-itanium-di | 1.18etch2 | ia64 ext2-modules-2.6.18-5-amd64-di | 1.21etch2 | amd64 ext2-modules-2.6.18-5-powerpc-di | 1.29etch2 | powerpc ext2-modules-2.6.18-5-powerpc-miboot-di | 1.29etch2 | powerpc ext2-modules-2.6.18-5-powerpc64-di | 1.29etch2 | powerpc ext2-modules-2.6.18-5-prep-di | 1.29etch2 | powerpc ext3-modules-2.6.18-5-486-di | 1.44etch2 | i386 ext3-modules-2.6.18-5-alpha-generic-di | 0.17etch2 | alpha ext3-modules-2.6.18-5-amd64-di | 1.21etch2 | amd64 ext3-modules-2.6.18-5-iop32x-di | 1.10etch2 | arm ext3-modules-2.6.18-5-itanium-di | 1.18etch2 | ia64 ext3-modules-2.6.18-5-ixp4xx-di | 1.10etch2 | arm ext3-modules-2.6.18-5-parisc-di | 1.17etch2 | hppa ext3-modules-2.6.18-5-parisc64-di | 1.17etch2 | hppa ext3-modules-2.6.18-5-powerpc-di | 1.29etch2 | powerpc ext3-modules-2.6.18-5-powerpc-miboot-di | 1.29etch2 | powerpc ext3-modules-2.6.18-5-powerpc64-di | 1.29etch2 | powerpc ext3-modules-2.6.18-5-prep-di | 1.29etch2 | powerpc ext3-modules-2.6.18-5-sparc32-di | 1.20etch2 | sparc ext3-modules-2.6.18-5-sparc64-di | 1.20etch2 | sparc fancontrol-modules-2.6.18-5-powerpc64-di | 1.29etch2 | powerpc fat-modules-2.6.18-5-486-di | 1.44etch2 | i386 fat-modules-2.6.18-5-alpha-generic-di | 0.17etch2 | alpha fat-modules-2.6.18-5-amd64-di | 1.21etch2 | amd64 fat-modules-2.6.18-5-footbridge-di | 1.10etch2 | arm fat-modules-2.6.18-5-iop32x-di | 1.10etch2 | arm fat-modules-2.6.18-5-itanium-di | 1.18etch2 | ia64 fat-modules-2.6.18-5-ixp4xx-di | 1.10etch2 | arm fat-modules-2.6.18-5-powerpc-di | 1.29etch2 | powerpc fat-modules-2.6.18-5-powerpc-miboot-di | 1.29etch2 | powerpc fat-modules-2.6.18-5-powerpc64-di | 1.29etch2 | powerpc fat-modules-2.6.18-5-prep-di | 1.29etch2 | powerpc fat-modules-2.6.18-5-qemu-di | 0.13etch2 | mips, mipsel fat-modules-2.6.18-5-r5k-cobalt-di | 0.13etch2 | mipsel fat-modules-2.6.18-5-rpc-di | 1.10etch2 | arm fat-modules-2.6.18-5-s390-di | 0.13etch2 | s390 fat-modules-2.6.18-5-sb1-bcm91250a-di | 0.13etch2 | mips, mipsel fat-modules-2.6.18-5-sb1a-bcm91480b-di | 0.13etch2 | mips, mipsel fat-modules-2.6.18-5-sparc32-di | 1.20etch2 | sparc fat-modules-2.6.18-5-sparc64-di | 1.20etch2 | sparc fb-modules-2.6.18-5-486-di | 1.44etch2 | i386 fb-modules-2.6.18-5-alpha-generic-di | 0.17etch2 | alpha fb-modules-2.6.18-5-amd64-di | 1.21etch2 | amd64 fb-modules-2.6.18-5-itanium-di | 1.18etch2 | ia64 fb-modules-2.6.18-5-sb1-bcm91250a-di | 0.13etch2 | mips, mipsel fb-modules-2.6.18-5-sb1a-bcm91480b-di | 0.13etch2 | mips, mipsel firewire-core-modules-2.6.18-5-486-di | 1.44etch2 | i386 firewire-core-modules-2.6.18-5-amd64-di | 1.21etch2 | amd64 firewire-core-modules-2.6.18-5-itanium-di | 1.18etch2 | ia64 firewire-core-modules-2.6.18-5-powerpc-di | 1.29etch2 | powerpc firewire-core-modules-2.6.18-5-powerpc-miboot-di | 1.29etch2 | powerpc firewire-core-modules-2.6.18-5-powerpc64-di | 1.29etch2 | powerpc firewire-core-modules-2.6.18-5-prep-di | 1.29etch2 | powerpc firmware-modules-2.6.18-5-486-di | 1.44etch2 | i386 firmware-modules-2.6.18-5-alpha-generic-di | 0.17etch2 | alpha firmware-modules-2.6.18-5-itanium-di | 1.18etch2 | ia64 firmware-modules-2.6.18-5-powerpc-di | 1.29etch2 | powerpc firmware-modules-2.6.18-5-powerpc-miboot-di | 1.29etch2 | powerpc firmware-modules-2.6.18-5-powerpc64-di | 1.29etch2 | powerpc firmware-modules-2.6.18-5-prep-di | 1.29etch2 | powerpc floppy-modules-2.6.18-5-486-di | 1.44etch2 | i386 floppy-modules-2.6.18-5-amd64-di | 1.21etch2 | amd64 floppy-modules-2.6.18-5-powerpc-di | 1.29etch2 | powerpc floppy-modules-2.6.18-5-powerpc-miboot-di | 1.29etch2 | powerpc floppy-modules-2.6.18-5-powerpc64-di | 1.29etch2 | powerpc floppy-modules-2.6.18-5-prep-di | 1.29etch2 | powerpc fs-common-modules-2.6.18-5-powerpc-di | 1.29etch2 | powerpc fs-common-modules-2.6.18-5-powerpc-miboot-di | 1.29etch2 | powerpc fs-common-modules-2.6.18-5-powerpc64-di | 1.29etch2 | powerpc fs-common-modules-2.6.18-5-prep-di | 1.29etch2 | powerpc gspca-modules-2.6.18-5-486 | 2.6.18+01.00.04-7+etch3 | i386 gspca-modules-2.6.18-5-686 | 2.6.18+01.00.04-7+etch3 | i386 gspca-modules-2.6.18-5-686-bigmem | 2.6.18+01.00.04-7+etch3 | i386 gspca-modules-2.6.18-5-amd64 | 2.6.18+01.00.04-7+etch3 | amd64, i386 gspca-modules-2.6.18-5-k7 | 2.6.18+01.00.04-7+etch3 | i386 gspca-modules-2.6.18-5-powerpc | 2.6.18+01.00.04-7+etch3 | powerpc gspca-modules-2.6.18-5-powerpc-miboot | 2.6.18+01.00.04-7+etch3 | powerpc gspca-modules-2.6.18-5-powerpc-smp | 2.6.18+01.00.04-7+etch3 | powerpc gspca-modules-2.6.18-5-powerpc64 | 2.6.18+01.00.04-7+etch3 | powerpc gspca-modules-2.6.18-5-prep | 2.6.18+01.00.04-7+etch3 | powerpc gspca-modules-2.6.18-5-vserver-686 | 2.6.18+01.00.04-7+etch3 | i386 gspca-modules-2.6.18-5-vserver-amd64 | 2.6.18+01.00.04-7+etch3 | amd64 gspca-modules-2.6.18-5-vserver-k7 | 2.6.18+01.00.04-7+etch3 | i386 gspca-modules-2.6.18-5-vserver-powerpc | 2.6.18+01.00.04-7+etch3 | powerpc gspca-modules-2.6.18-5-vserver-powerpc64 | 2.6.18+01.00.04-7+etch3 | powerpc gspca-modules-2.6.18-5-xen-686 | 2.6.18+01.00.04-7+etch3 | i386 gspca-modules-2.6.18-5-xen-amd64 | 2.6.18+01.00.04-7+etch3 | amd64 gspca-modules-2.6.18-5-xen-vserver-686 | 2.6.18+01.00.04-7+etch3 | i386 gspca-modules-2.6.18-5-xen-vserver-amd64 | 2.6.18+01.00.04-7+etch3 | amd64 hfs-modules-2.6.18-5-powerpc-di | 1.29etch2 | powerpc hfs-modules-2.6.18-5-powerpc-miboot-di | 1.29etch2 | powerpc hfs-modules-2.6.18-5-powerpc64-di | 1.29etch2 | powerpc hfs-modules-2.6.18-5-prep-di | 1.29etch2 | powerpc hypervisor-modules-2.6.18-5-powerpc64-di | 1.29etch2 | powerpc ide-core-modules-2.6.18-5-486-di | 1.44etch2 | i386 ide-core-modules-2.6.18-5-alpha-generic-di | 0.17etch2 | alpha ide-core-modules-2.6.18-5-amd64-di | 1.21etch2 | amd64 ide-core-modules-2.6.18-5-iop32x-di | 1.10etch2 | arm ide-core-modules-2.6.18-5-itanium-di | 1.18etch2 | ia64 ide-modules-2.6.18-5-486-di | 1.44etch2 | i386 ide-modules-2.6.18-5-alpha-generic-di | 0.17etch2 | alpha ide-modules-2.6.18-5-amd64-di | 1.21etch2 | amd64 ide-modules-2.6.18-5-footbridge-di | 1.10etch2 | arm ide-modules-2.6.18-5-iop32x-di | 1.10etch2 | arm ide-modules-2.6.18-5-itanium-di | 1.18etch2 | ia64 ide-modules-2.6.18-5-parisc-di | 1.17etch2 | hppa ide-modules-2.6.18-5-parisc64-di | 1.17etch2 | hppa ide-modules-2.6.18-5-powerpc-di | 1.29etch2 | powerpc ide-modules-2.6.18-5-powerpc-miboot-di | 1.29etch2 | powerpc ide-modules-2.6.18-5-powerpc64-di | 1.29etch2 | powerpc ide-modules-2.6.18-5-prep-di | 1.29etch2 | powerpc ide-modules-2.6.18-5-sb1-bcm91250a-di | 0.13etch2 | mips, mipsel ide-modules-2.6.18-5-sb1a-bcm91480b-di | 0.13etch2 | mips, mipsel ide-modules-2.6.18-5-sparc64-di | 1.20etch2 | sparc input-modules-2.6.18-5-486-di | 1.44etch2 | i386 input-modules-2.6.18-5-amd64-di | 1.21etch2 | amd64 input-modules-2.6.18-5-itanium-di | 1.18etch2 | ia64 input-modules-2.6.18-5-ixp4xx-di | 1.10etch2 | arm input-modules-2.6.18-5-parisc-di | 1.17etch2 | hppa input-modules-2.6.18-5-parisc64-di | 1.17etch2 | hppa input-modules-2.6.18-5-powerpc-di | 1.29etch2 | powerpc input-modules-2.6.18-5-powerpc-miboot-di | 1.29etch2 | powerpc input-modules-2.6.18-5-powerpc64-di | 1.29etch2 | powerpc input-modules-2.6.18-5-prep-di | 1.29etch2 | powerpc input-modules-2.6.18-5-sb1-bcm91250a-di | 0.13etch2 | mips, mipsel input-modules-2.6.18-5-sb1a-bcm91480b-di | 0.13etch2 | mips, mipsel ipv6-modules-2.6.18-5-486-di | 1.44etch2 | i386 ipv6-modules-2.6.18-5-alpha-generic-di | 0.17etch2 | alpha ipv6-modules-2.6.18-5-amd64-di | 1.21etch2 | amd64 ipv6-modules-2.6.18-5-itanium-di | 1.18etch2 | ia64 ipv6-modules-2.6.18-5-parisc-di | 1.17etch2 | hppa ipv6-modules-2.6.18-5-parisc64-di | 1.17etch2 | hppa ipv6-modules-2.6.18-5-powerpc-di | 1.29etch2 | powerpc ipv6-modules-2.6.18-5-powerpc-miboot-di | 1.29etch2 | powerpc ipv6-modules-2.6.18-5-powerpc64-di | 1.29etch2 | powerpc ipv6-modules-2.6.18-5-prep-di | 1.29etch2 | powerpc ipv6-modules-2.6.18-5-r3k-kn02-di | 0.13etch2 | mipsel ipv6-modules-2.6.18-5-r4k-ip22-di | 0.13etch2 | mips ipv6-modules-2.6.18-5-r4k-kn04-di | 0.13etch2 | mipsel ipv6-modules-2.6.18-5-r5k-cobalt-di | 0.13etch2 | mipsel ipv6-modules-2.6.18-5-r5k-ip32-di | 0.13etch2 | mips ipv6-modules-2.6.18-5-sb1-bcm91250a-di | 0.13etch2 | mips, mipsel ipv6-modules-2.6.18-5-sb1a-bcm91480b-di | 0.13etch2 | mips, mipsel ipv6-modules-2.6.18-5-sparc32-di | 1.20etch2 | sparc ipv6-modules-2.6.18-5-sparc64-di | 1.20etch2 | sparc ipw2100-modules-2.6.18-5-486 | 2.6.18+1.2.1-4+etch2 | i386 ipw2100-modules-2.6.18-5-686 | 2.6.18+1.2.1-4+etch2 | i386 ipw2100-modules-2.6.18-5-686-bigmem | 2.6.18+1.2.1-4+etch2 | i386 ipw2100-modules-2.6.18-5-amd64 | 2.6.18+1.2.1-4+etch2 | amd64, i386 ipw2100-modules-2.6.18-5-k7 | 2.6.18+1.2.1-4+etch2 | i386 ipw2100-modules-2.6.18-5-vserver-686 | 2.6.18+1.2.1-4+etch2 | i386 ipw2100-modules-2.6.18-5-vserver-amd64 | 2.6.18+1.2.1-4+etch2 | amd64 ipw2100-modules-2.6.18-5-vserver-k7 | 2.6.18+1.2.1-4+etch2 | i386 ipw2100-modules-2.6.18-5-xen-686 | 2.6.18+1.2.1-4+etch2 | i386 ipw2100-modules-2.6.18-5-xen-amd64 | 2.6.18+1.2.1-4+etch2 | amd64 ipw2100-modules-2.6.18-5-xen-vserver-686 | 2.6.18+1.2.1-4+etch2 | i386 ipw2100-modules-2.6.18-5-xen-vserver-amd64 | 2.6.18+1.2.1-4+etch2 | amd64 ipw2200-modules-2.6.18-5-486 | 2.6.18+1.2.0-4+etch2 | i386 ipw2200-modules-2.6.18-5-686 | 2.6.18+1.2.0-4+etch2 | i386 ipw2200-modules-2.6.18-5-686-bigmem | 2.6.18+1.2.0-4+etch2 | i386 ipw2200-modules-2.6.18-5-amd64 | 2.6.18+1.2.0-4+etch2 | amd64, i386 ipw2200-modules-2.6.18-5-k7 | 2.6.18+1.2.0-4+etch2 | i386 ipw2200-modules-2.6.18-5-vserver-686 | 2.6.18+1.2.0-4+etch2 | i386 ipw2200-modules-2.6.18-5-vserver-amd64 | 2.6.18+1.2.0-4+etch2 | amd64 ipw2200-modules-2.6.18-5-vserver-k7 | 2.6.18+1.2.0-4+etch2 | i386 ipw2200-modules-2.6.18-5-xen-686 | 2.6.18+1.2.0-4+etch2 | i386 ipw2200-modules-2.6.18-5-xen-amd64 | 2.6.18+1.2.0-4+etch2 | amd64 ipw2200-modules-2.6.18-5-xen-vserver-686 | 2.6.18+1.2.0-4+etch2 | i386 ipw2200-modules-2.6.18-5-xen-vserver-amd64 | 2.6.18+1.2.0-4+etch2 | amd64 ipw3945-modules-2.6.18-5-486 | 2.6.18+1.1.2-4+etch2 | i386 ipw3945-modules-2.6.18-5-686 | 2.6.18+1.1.2-4+etch2 | i386 ipw3945-modules-2.6.18-5-686-bigmem | 2.6.18+1.1.2-4+etch2 | i386 ipw3945-modules-2.6.18-5-amd64 | 2.6.18+1.1.2-4+etch2 | amd64, i386 ipw3945-modules-2.6.18-5-k7 | 2.6.18+1.1.2-4+etch2 | i386 ipw3945-modules-2.6.18-5-vserver-686 | 2.6.18+1.1.2-4+etch2 | i386 ipw3945-modules-2.6.18-5-vserver-amd64 | 2.6.18+1.1.2-4+etch2 | amd64 ipw3945-modules-2.6.18-5-vserver-k7 | 2.6.18+1.1.2-4+etch2 | i386 ipw3945-modules-2.6.18-5-xen-686 | 2.6.18+1.1.2-4+etch2 | i386 ipw3945-modules-2.6.18-5-xen-amd64 | 2.6.18+1.1.2-4+etch2 | amd64 ipw3945-modules-2.6.18-5-xen-vserver-686 | 2.6.18+1.1.2-4+etch2 | i386 ipw3945-modules-2.6.18-5-xen-vserver-amd64 | 2.6.18+1.1.2-4+etch2 | amd64 irda-modules-2.6.18-5-486-di | 1.44etch2 | i386 irda-modules-2.6.18-5-amd64-di | 1.21etch2 | amd64 irda-modules-2.6.18-5-itanium-di | 1.18etch2 | ia64 irda-modules-2.6.18-5-powerpc-di | 1.29etch2 | powerpc irda-modules-2.6.18-5-powerpc-miboot-di | 1.29etch2 | powerpc irda-modules-2.6.18-5-powerpc64-di | 1.29etch2 | powerpc irda-modules-2.6.18-5-prep-di | 1.29etch2 | powerpc ivtv-modules-2.6.18-5-486 | 2.6.18+0.8.2-4+etch2 | i386 ivtv-modules-2.6.18-5-686 | 2.6.18+0.8.2-4+etch2 | i386 ivtv-modules-2.6.18-5-686-bigmem | 2.6.18+0.8.2-4+etch2 | i386 ivtv-modules-2.6.18-5-alpha-generic | 2.6.18+0.8.2-4+etch2 | alpha ivtv-modules-2.6.18-5-alpha-legacy | 2.6.18+0.8.2-4+etch2 | alpha ivtv-modules-2.6.18-5-alpha-smp | 2.6.18+0.8.2-4+etch2 | alpha ivtv-modules-2.6.18-5-amd64 | 2.6.18+0.8.2-4+etch2 | amd64, i386 ivtv-modules-2.6.18-5-itanium | 2.6.18+0.8.2-4+etch2 | ia64 ivtv-modules-2.6.18-5-k7 | 2.6.18+0.8.2-4+etch2 | i386 ivtv-modules-2.6.18-5-mckinley | 2.6.18+0.8.2-4+etch2 | ia64 ivtv-modules-2.6.18-5-parisc | 2.6.18+0.8.2-4+etch2 | hppa ivtv-modules-2.6.18-5-parisc-smp | 2.6.18+0.8.2-4+etch2 | hppa ivtv-modules-2.6.18-5-parisc64 | 2.6.18+0.8.2-4+etch2 | hppa ivtv-modules-2.6.18-5-parisc64-smp | 2.6.18+0.8.2-4+etch2 | hppa ivtv-modules-2.6.18-5-powerpc | 2.6.18+0.8.2-4+etch2 | powerpc ivtv-modules-2.6.18-5-powerpc-miboot | 2.6.18+0.8.2-4+etch2 | powerpc ivtv-modules-2.6.18-5-powerpc-smp | 2.6.18+0.8.2-4+etch2 | powerpc ivtv-modules-2.6.18-5-powerpc64 | 2.6.18+0.8.2-4+etch2 | powerpc ivtv-modules-2.6.18-5-prep | 2.6.18+0.8.2-4+etch2 | powerpc ivtv-modules-2.6.18-5-sparc32 | 2.6.18+0.8.2-4+etch2 | sparc ivtv-modules-2.6.18-5-sparc64 | 2.6.18+0.8.2-4+etch2 | sparc ivtv-modules-2.6.18-5-sparc64-smp | 2.6.18+0.8.2-4+etch2 | sparc ivtv-modules-2.6.18-5-vserver-686 | 2.6.18+0.8.2-4+etch2 | i386 ivtv-modules-2.6.18-5-vserver-alpha | 2.6.18+0.8.2-4+etch2 | alpha ivtv-modules-2.6.18-5-vserver-amd64 | 2.6.18+0.8.2-4+etch2 | amd64 ivtv-modules-2.6.18-5-vserver-k7 | 2.6.18+0.8.2-4+etch2 | i386 ivtv-modules-2.6.18-5-vserver-powerpc | 2.6.18+0.8.2-4+etch2 | powerpc ivtv-modules-2.6.18-5-vserver-powerpc64 | 2.6.18+0.8.2-4+etch2 | powerpc ivtv-modules-2.6.18-5-vserver-sparc64 | 2.6.18+0.8.2-4+etch2 | sparc ivtv-modules-2.6.18-5-xen-686 | 2.6.18+0.8.2-4+etch2 | i386 ivtv-modules-2.6.18-5-xen-amd64 | 2.6.18+0.8.2-4+etch2 | amd64 ivtv-modules-2.6.18-5-xen-vserver-686 | 2.6.18+0.8.2-4+etch2 | i386 ivtv-modules-2.6.18-5-xen-vserver-amd64 | 2.6.18+0.8.2-4+etch2 | amd64 jfs-modules-2.6.18-5-486-di | 1.44etch2 | i386 jfs-modules-2.6.18-5-alpha-generic-di | 0.17etch2 | alpha jfs-modules-2.6.18-5-amd64-di | 1.21etch2 | amd64 jfs-modules-2.6.18-5-itanium-di | 1.18etch2 | ia64 jfs-modules-2.6.18-5-powerpc-di | 1.29etch2 | powerpc jfs-modules-2.6.18-5-powerpc-miboot-di | 1.29etch2 | powerpc jfs-modules-2.6.18-5-powerpc64-di | 1.29etch2 | powerpc jfs-modules-2.6.18-5-prep-di | 1.29etch2 | powerpc jfs-modules-2.6.18-5-qemu-di | 0.13etch2 | mips, mipsel jfs-modules-2.6.18-5-r4k-ip22-di | 0.13etch2 | mips jfs-modules-2.6.18-5-r5k-cobalt-di | 0.13etch2 | mipsel jfs-modules-2.6.18-5-r5k-ip32-di | 0.13etch2 | mips jfs-modules-2.6.18-5-sb1-bcm91250a-di | 0.13etch2 | mips, mipsel jfs-modules-2.6.18-5-sb1a-bcm91480b-di | 0.13etch2 | mips, mipsel jfs-modules-2.6.18-5-sparc64-di | 1.20etch2 | sparc kernel-image-2.6.18-5-486-di | 1.44etch2 | i386 kernel-image-2.6.18-5-alpha-generic-di | 0.17etch2 | alpha kernel-image-2.6.18-5-amd64-di | 1.21etch2 | amd64 kernel-image-2.6.18-5-footbridge-di | 1.10etch2 | arm kernel-image-2.6.18-5-iop32x-di | 1.10etch2 | arm kernel-image-2.6.18-5-itanium-di | 1.18etch2 | ia64 kernel-image-2.6.18-5-ixp4xx-di | 1.10etch2 | arm kernel-image-2.6.18-5-parisc-di | 1.17etch2 | hppa kernel-image-2.6.18-5-parisc64-di | 1.17etch2 | hppa kernel-image-2.6.18-5-powerpc-di | 1.29etch2 | powerpc kernel-image-2.6.18-5-powerpc-miboot-di | 1.29etch2 | powerpc kernel-image-2.6.18-5-powerpc64-di | 1.29etch2 | powerpc kernel-image-2.6.18-5-prep-di | 1.29etch2 | powerpc kernel-image-2.6.18-5-qemu-di | 0.13etch2 | mips, mipsel kernel-image-2.6.18-5-r3k-kn02-di | 0.13etch2 | mipsel kernel-image-2.6.18-5-r4k-ip22-di | 0.13etch2 | mips kernel-image-2.6.18-5-r4k-kn04-di | 0.13etch2 | mipsel kernel-image-2.6.18-5-r5k-cobalt-di | 0.13etch2 | mipsel kernel-image-2.6.18-5-r5k-ip32-di | 0.13etch2 | mips kernel-image-2.6.18-5-rpc-di | 1.10etch2 | arm kernel-image-2.6.18-5-s390-di | 0.13etch2 | s390 kernel-image-2.6.18-5-s390-tape-di | 0.13etch2 | s390 kernel-image-2.6.18-5-sb1-bcm91250a-di | 0.13etch2 | mips, mipsel kernel-image-2.6.18-5-sb1a-bcm91480b-di | 0.13etch2 | mips, mipsel kernel-image-2.6.18-5-sparc32-di | 1.20etch2 | sparc kernel-image-2.6.18-5-sparc64-di | 1.20etch2 | sparc kqemu-modules-2.6.18-5-486 | 2.6.18+1.3.0~pre9-4etch1 | i386 kqemu-modules-2.6.18-5-686 | 2.6.18+1.3.0~pre9-4etch1 | i386 kqemu-modules-2.6.18-5-686-bigmem | 2.6.18+1.3.0~pre9-4etch1 | i386 kqemu-modules-2.6.18-5-k7 | 2.6.18+1.3.0~pre9-4etch1 | i386 linux-headers-2.6.18-5 | 2.6.18.dfsg.1-17 | alpha, amd64, arm, hppa, i386, ia64, mips, mipsel, powerpc, s390, sparc linux-headers-2.6.18-5-486 | 2.6.18.dfsg.1-17 | i386 linux-headers-2.6.18-5-686 | 2.6.18.dfsg.1-17 | i386 linux-headers-2.6.18-5-686-bigmem | 2.6.18.dfsg.1-17 | i386 linux-headers-2.6.18-5-all | 2.6.18.dfsg.1-17 | alpha, amd64, arm, hppa, i386, ia64, mips, mipsel, powerpc, s390, sparc linux-headers-2.6.18-5-all-alpha | 2.6.18.dfsg.1-17 | alpha linux-headers-2.6.18-5-all-amd64 | 2.6.18.dfsg.1-17 | amd64 linux-headers-2.6.18-5-all-arm | 2.6.18.dfsg.1-17 | arm linux-headers-2.6.18-5-all-hppa | 2.6.18.dfsg.1-17 | hppa linux-headers-2.6.18-5-all-i386 | 2.6.18.dfsg.1-17 | i386 linux-headers-2.6.18-5-all-ia64 | 2.6.18.dfsg.1-17 | ia64 linux-headers-2.6.18-5-all-mips | 2.6.18.dfsg.1-17 | mips linux-headers-2.6.18-5-all-mipsel | 2.6.18.dfsg.1-17 | mipsel linux-headers-2.6.18-5-all-powerpc | 2.6.18.dfsg.1-17 | powerpc linux-headers-2.6.18-5-all-s390 | 2.6.18.dfsg.1-17 | s390 linux-headers-2.6.18-5-all-sparc | 2.6.18.dfsg.1-17 | sparc linux-headers-2.6.18-5-alpha-generic | 2.6.18.dfsg.1-17 | alpha linux-headers-2.6.18-5-alpha-legacy | 2.6.18.dfsg.1-17 | alpha linux-headers-2.6.18-5-alpha-smp | 2.6.18.dfsg.1-17 | alpha linux-headers-2.6.18-5-amd64 | 2.6.18.dfsg.1-17 | amd64, i386 linux-headers-2.6.18-5-footbridge | 2.6.18.dfsg.1-17 | arm linux-headers-2.6.18-5-iop32x | 2.6.18.dfsg.1-17 | arm linux-headers-2.6.18-5-itanium | 2.6.18.dfsg.1-17 | ia64 linux-headers-2.6.18-5-ixp4xx | 2.6.18.dfsg.1-17 | arm linux-headers-2.6.18-5-k7 | 2.6.18.dfsg.1-17 | i386 linux-headers-2.6.18-5-mckinley | 2.6.18.dfsg.1-17 | ia64 linux-headers-2.6.18-5-parisc | 2.6.18.dfsg.1-17 | hppa linux-headers-2.6.18-5-parisc-smp | 2.6.18.dfsg.1-17 | hppa linux-headers-2.6.18-5-parisc64 | 2.6.18.dfsg.1-17 | hppa linux-headers-2.6.18-5-parisc64-smp | 2.6.18.dfsg.1-17 | hppa linux-headers-2.6.18-5-powerpc | 2.6.18.dfsg.1-17 | powerpc linux-headers-2.6.18-5-powerpc-miboot | 2.6.18.dfsg.1-17 | powerpc linux-headers-2.6.18-5-powerpc-smp | 2.6.18.dfsg.1-17 | powerpc linux-headers-2.6.18-5-powerpc64 | 2.6.18.dfsg.1-17 | powerpc linux-headers-2.6.18-5-prep | 2.6.18.dfsg.1-17 | powerpc linux-headers-2.6.18-5-qemu | 2.6.18.dfsg.1-17 | mips, mipsel linux-headers-2.6.18-5-r3k-kn02 | 2.6.18.dfsg.1-17 | mipsel linux-headers-2.6.18-5-r4k-ip22 | 2.6.18.dfsg.1-17 | mips linux-headers-2.6.18-5-r4k-kn04 | 2.6.18.dfsg.1-17 | mipsel linux-headers-2.6.18-5-r5k-cobalt | 2.6.18.dfsg.1-17 | mipsel linux-headers-2.6.18-5-r5k-ip32 | 2.6.18.dfsg.1-17 | mips linux-headers-2.6.18-5-rpc | 2.6.18.dfsg.1-17 | arm linux-headers-2.6.18-5-s390 | 2.6.18.dfsg.1-17 | s390 linux-headers-2.6.18-5-s390x | 2.6.18.dfsg.1-17 | s390 linux-headers-2.6.18-5-s3c2410 | 2.6.18.dfsg.1-17 | arm linux-headers-2.6.18-5-sb1-bcm91250a | 2.6.18.dfsg.1-17 | mips, mipsel linux-headers-2.6.18-5-sb1a-bcm91480b | 2.6.18.dfsg.1-17 | mips, mipsel linux-headers-2.6.18-5-sparc32 | 2.6.18.dfsg.1-17 | sparc linux-headers-2.6.18-5-sparc64 | 2.6.18.dfsg.1-17 | sparc linux-headers-2.6.18-5-sparc64-smp | 2.6.18.dfsg.1-17 | sparc linux-headers-2.6.18-5-vserver | 2.6.18.dfsg.1-17 | alpha, amd64, i386, powerpc, s390, sparc linux-headers-2.6.18-5-vserver-686 | 2.6.18.dfsg.1-17 | i386 linux-headers-2.6.18-5-vserver-alpha | 2.6.18.dfsg.1-17 | alpha linux-headers-2.6.18-5-vserver-amd64 | 2.6.18.dfsg.1-17 | amd64 linux-headers-2.6.18-5-vserver-k7 | 2.6.18.dfsg.1-17 | i386 linux-headers-2.6.18-5-vserver-powerpc | 2.6.18.dfsg.1-17 | powerpc linux-headers-2.6.18-5-vserver-powerpc64 | 2.6.18.dfsg.1-17 | powerpc linux-headers-2.6.18-5-vserver-s390x | 2.6.18.dfsg.1-17 | s390 linux-headers-2.6.18-5-vserver-sparc64 | 2.6.18.dfsg.1-17 | sparc linux-headers-2.6.18-5-xen | 2.6.18.dfsg.1-17 | amd64, i386 linux-headers-2.6.18-5-xen-686 | 2.6.18.dfsg.1-17 | i386 linux-headers-2.6.18-5-xen-amd64 | 2.6.18.dfsg.1-17 | amd64 linux-headers-2.6.18-5-xen-vserver | 2.6.18.dfsg.1-17 | amd64, i386 linux-headers-2.6.18-5-xen-vserver-686 | 2.6.18.dfsg.1-17 | i386 linux-headers-2.6.18-5-xen-vserver-amd64 | 2.6.18.dfsg.1-17 | amd64 linux-image-2.6.18-5-486 | 2.6.18.dfsg.1-17 | i386 linux-image-2.6.18-5-686 | 2.6.18.dfsg.1-17 | i386 linux-image-2.6.18-5-686-bigmem | 2.6.18.dfsg.1-17 | i386 linux-image-2.6.18-5-alpha-generic | 2.6.18.dfsg.1-17 | alpha linux-image-2.6.18-5-alpha-legacy | 2.6.18.dfsg.1-17 | alpha linux-image-2.6.18-5-alpha-smp | 2.6.18.dfsg.1-17 | alpha linux-image-2.6.18-5-amd64 | 2.6.18.dfsg.1-17 | amd64, i386 linux-image-2.6.18-5-footbridge | 2.6.18.dfsg.1-17 | arm linux-image-2.6.18-5-iop32x | 2.6.18.dfsg.1-17 | arm linux-image-2.6.18-5-itanium | 2.6.18.dfsg.1-17 | ia64 linux-image-2.6.18-5-ixp4xx | 2.6.18.dfsg.1-17 | arm linux-image-2.6.18-5-k7 | 2.6.18.dfsg.1-17 | i386 linux-image-2.6.18-5-mckinley | 2.6.18.dfsg.1-17 | ia64 linux-image-2.6.18-5-parisc | 2.6.18.dfsg.1-17 | hppa linux-image-2.6.18-5-parisc-smp | 2.6.18.dfsg.1-17 | hppa linux-image-2.6.18-5-parisc64 | 2.6.18.dfsg.1-17 | hppa linux-image-2.6.18-5-parisc64-smp | 2.6.18.dfsg.1-17 | hppa linux-image-2.6.18-5-powerpc | 2.6.18.dfsg.1-17 | powerpc linux-image-2.6.18-5-powerpc-miboot | 2.6.18.dfsg.1-17 | powerpc linux-image-2.6.18-5-powerpc-smp | 2.6.18.dfsg.1-17 | powerpc linux-image-2.6.18-5-powerpc64 | 2.6.18.dfsg.1-17 | powerpc linux-image-2.6.18-5-prep | 2.6.18.dfsg.1-17 | powerpc linux-image-2.6.18-5-qemu | 2.6.18.dfsg.1-17 | mips, mipsel linux-image-2.6.18-5-r3k-kn02 | 2.6.18.dfsg.1-17 | mipsel linux-image-2.6.18-5-r4k-ip22 | 2.6.18.dfsg.1-17 | mips linux-image-2.6.18-5-r4k-kn04 | 2.6.18.dfsg.1-17 | mipsel linux-image-2.6.18-5-r5k-cobalt | 2.6.18.dfsg.1-17 | mipsel linux-image-2.6.18-5-r5k-ip32 | 2.6.18.dfsg.1-17 | mips linux-image-2.6.18-5-rpc | 2.6.18.dfsg.1-17 | arm linux-image-2.6.18-5-s390 | 2.6.18.dfsg.1-17 | s390 linux-image-2.6.18-5-s390-tape | 2.6.18.dfsg.1-17 | s390 linux-image-2.6.18-5-s390x | 2.6.18.dfsg.1-17 | s390 linux-image-2.6.18-5-s3c2410 | 2.6.18.dfsg.1-17 | arm linux-image-2.6.18-5-sb1-bcm91250a | 2.6.18.dfsg.1-17 | mips, mipsel linux-image-2.6.18-5-sb1a-bcm91480b | 2.6.18.dfsg.1-17 | mips, mipsel linux-image-2.6.18-5-sparc32 | 2.6.18.dfsg.1-17 | sparc linux-image-2.6.18-5-sparc64 | 2.6.18.dfsg.1-17 | sparc linux-image-2.6.18-5-sparc64-smp | 2.6.18.dfsg.1-17 | sparc linux-image-2.6.18-5-vserver-686 | 2.6.18.dfsg.1-17 | i386 linux-image-2.6.18-5-vserver-alpha | 2.6.18.dfsg.1-17 | alpha linux-image-2.6.18-5-vserver-amd64 | 2.6.18.dfsg.1-17 | amd64 linux-image-2.6.18-5-vserver-k7 | 2.6.18.dfsg.1-17 | i386 linux-image-2.6.18-5-vserver-powerpc | 2.6.18.dfsg.1-17 | powerpc linux-image-2.6.18-5-vserver-powerpc64 | 2.6.18.dfsg.1-17 | powerpc linux-image-2.6.18-5-vserver-s390x | 2.6.18.dfsg.1-17 | s390 linux-image-2.6.18-5-vserver-sparc64 | 2.6.18.dfsg.1-17 | sparc linux-image-2.6.18-5-xen-686 | 2.6.18.dfsg.1-17 | i386 linux-image-2.6.18-5-xen-amd64 | 2.6.18.dfsg.1-17 | amd64 linux-image-2.6.18-5-xen-vserver-686 | 2.6.18.dfsg.1-17 | i386 linux-image-2.6.18-5-xen-vserver-amd64 | 2.6.18.dfsg.1-17 | amd64 linux-modules-2.6.18-5-xen-686 | 2.6.18.dfsg.1-17 | i386 linux-modules-2.6.18-5-xen-amd64 | 2.6.18.dfsg.1-17 | amd64 linux-modules-2.6.18-5-xen-vserver-686 | 2.6.18.dfsg.1-17 | i386 linux-modules-2.6.18-5-xen-vserver-amd64 | 2.6.18.dfsg.1-17 | amd64 linux-support-2.6.18-5 | 2.6.18.dfsg.1-17 | all loop-aes-modules-2.6.18-5-486 | 3.1d-13etch1 | i386 loop-aes-modules-2.6.18-5-486-di | 1.03etch1 | i386 loop-aes-modules-2.6.18-5-686 | 3.1d-13etch1 | i386 loop-aes-modules-2.6.18-5-686-bigmem | 3.1d-13etch1 | i386 loop-aes-modules-2.6.18-5-alpha-generic | 3.1d-13etch1 | alpha loop-aes-modules-2.6.18-5-alpha-generic-di | 1.03etch1 | alpha loop-aes-modules-2.6.18-5-alpha-legacy | 3.1d-13etch1 | alpha loop-aes-modules-2.6.18-5-alpha-smp | 3.1d-13etch1 | alpha loop-aes-modules-2.6.18-5-amd64 | 3.1d-13etch1 | amd64, i386 loop-aes-modules-2.6.18-5-amd64-di | 1.03etch1 | amd64 loop-aes-modules-2.6.18-5-footbridge | 3.1d-13etch1 | arm loop-aes-modules-2.6.18-5-footbridge-di | 1.04etch1 | arm loop-aes-modules-2.6.18-5-iop32x | 3.1d-13etch1 | arm loop-aes-modules-2.6.18-5-iop32x-di | 1.04etch1 | arm loop-aes-modules-2.6.18-5-itanium | 3.1d-13etch1 | ia64 loop-aes-modules-2.6.18-5-itanium-di | 1.02etch1 | ia64 loop-aes-modules-2.6.18-5-ixp4xx | 3.1d-13etch1 | arm loop-aes-modules-2.6.18-5-ixp4xx-di | 1.04etch1 | arm loop-aes-modules-2.6.18-5-k7 | 3.1d-13etch1 | i386 loop-aes-modules-2.6.18-5-mckinley | 3.1d-13etch1 | ia64 loop-aes-modules-2.6.18-5-parisc | 3.1d-13etch1 | hppa loop-aes-modules-2.6.18-5-parisc-di | 1.03etch1 | hppa loop-aes-modules-2.6.18-5-parisc-smp | 3.1d-13etch1 | hppa loop-aes-modules-2.6.18-5-parisc64 | 3.1d-13etch1 | hppa loop-aes-modules-2.6.18-5-parisc64-di | 1.03etch1 | hppa loop-aes-modules-2.6.18-5-parisc64-smp | 3.1d-13etch1 | hppa loop-aes-modules-2.6.18-5-powerpc | 3.1d-13etch1 | powerpc loop-aes-modules-2.6.18-5-powerpc-di | 1.03etch1 | powerpc loop-aes-modules-2.6.18-5-powerpc-miboot | 3.1d-13etch1 | powerpc loop-aes-modules-2.6.18-5-powerpc-miboot-di | 1.03etch1 | powerpc loop-aes-modules-2.6.18-5-powerpc-smp | 3.1d-13etch1 | powerpc loop-aes-modules-2.6.18-5-powerpc64 | 3.1d-13etch1 | powerpc loop-aes-modules-2.6.18-5-powerpc64-di | 1.03etch1 | powerpc loop-aes-modules-2.6.18-5-prep | 3.1d-13etch1 | powerpc loop-aes-modules-2.6.18-5-prep-di | 1.03etch1 | powerpc loop-aes-modules-2.6.18-5-qemu | 3.1d-13etch1 | mips, mipsel loop-aes-modules-2.6.18-5-qemu-di | 1.01etch1 | mips loop-aes-modules-2.6.18-5-qemu-di | 1.03etch1 | mipsel loop-aes-modules-2.6.18-5-r3k-kn02 | 3.1d-13etch1 | mipsel loop-aes-modules-2.6.18-5-r3k-kn02-di | 1.03etch1 | mipsel loop-aes-modules-2.6.18-5-r4k-ip22 | 3.1d-13etch1 | mips loop-aes-modules-2.6.18-5-r4k-ip22-di | 1.01etch1 | mips loop-aes-modules-2.6.18-5-r4k-kn04 | 3.1d-13etch1 | mipsel loop-aes-modules-2.6.18-5-r4k-kn04-di | 1.03etch1 | mipsel loop-aes-modules-2.6.18-5-r5k-cobalt | 3.1d-13etch1 | mipsel loop-aes-modules-2.6.18-5-r5k-cobalt-di | 1.03etch1 | mipsel loop-aes-modules-2.6.18-5-r5k-ip32 | 3.1d-13etch1 | mips loop-aes-modules-2.6.18-5-r5k-ip32-di | 1.01etch1 | mips loop-aes-modules-2.6.18-5-rpc | 3.1d-13etch1 | arm loop-aes-modules-2.6.18-5-rpc-di | 1.04etch1 | arm loop-aes-modules-2.6.18-5-s390 | 3.1d-13etch1 | s390 loop-aes-modules-2.6.18-5-s390-di | 1.01etch1 | s390 loop-aes-modules-2.6.18-5-s390x | 3.1d-13etch1 | s390 loop-aes-modules-2.6.18-5-s3c2410 | 3.1d-13etch1 | arm loop-aes-modules-2.6.18-5-sb1-bcm91250a | 3.1d-13etch1 | mips, mipsel loop-aes-modules-2.6.18-5-sb1-bcm91250a-di | 1.01etch1 | mips loop-aes-modules-2.6.18-5-sb1-bcm91250a-di | 1.03etch1 | mipsel loop-aes-modules-2.6.18-5-sb1a-bcm91480b | 3.1d-13etch1 | mips, mipsel loop-aes-modules-2.6.18-5-sb1a-bcm91480b-di | 1.01etch1 | mips loop-aes-modules-2.6.18-5-sb1a-bcm91480b-di | 1.03etch1 | mipsel loop-aes-modules-2.6.18-5-sparc32 | 3.1d-13etch1 | sparc loop-aes-modules-2.6.18-5-sparc32-di | 1.04etch1 | sparc loop-aes-modules-2.6.18-5-sparc64 | 3.1d-13etch1 | sparc loop-aes-modules-2.6.18-5-sparc64-di | 1.04etch1 | sparc loop-aes-modules-2.6.18-5-sparc64-smp | 3.1d-13etch1 | sparc loop-aes-modules-2.6.18-5-vserver-686 | 3.1d-13etch1 | i386 loop-aes-modules-2.6.18-5-vserver-alpha | 3.1d-13etch1 | alpha loop-aes-modules-2.6.18-5-vserver-amd64 | 3.1d-13etch1 | amd64 loop-aes-modules-2.6.18-5-vserver-k7 | 3.1d-13etch1 | i386 loop-aes-modules-2.6.18-5-vserver-powerpc | 3.1d-13etch1 | powerpc loop-aes-modules-2.6.18-5-vserver-powerpc64 | 3.1d-13etch1 | powerpc loop-aes-modules-2.6.18-5-vserver-s390x | 3.1d-13etch1 | s390 loop-aes-modules-2.6.18-5-vserver-sparc64 | 3.1d-13etch1 | sparc loop-aes-modules-2.6.18-5-xen-686 | 3.1d-13etch1 | i386 loop-aes-modules-2.6.18-5-xen-amd64 | 3.1d-13etch1 | amd64 loop-aes-modules-2.6.18-5-xen-vserver-686 | 3.1d-13etch1 | i386 loop-aes-modules-2.6.18-5-xen-vserver-amd64 | 3.1d-13etch1 | amd64 loop-modules-2.6.18-5-486-di | 1.44etch2 | i386 loop-modules-2.6.18-5-amd64-di | 1.21etch2 | amd64 loop-modules-2.6.18-5-footbridge-di | 1.10etch2 | arm loop-modules-2.6.18-5-iop32x-di | 1.10etch2 | arm loop-modules-2.6.18-5-itanium-di | 1.18etch2 | ia64 loop-modules-2.6.18-5-ixp4xx-di | 1.10etch2 | arm loop-modules-2.6.18-5-parisc-di | 1.17etch2 | hppa loop-modules-2.6.18-5-parisc64-di | 1.17etch2 | hppa loop-modules-2.6.18-5-powerpc-di | 1.29etch2 | powerpc loop-modules-2.6.18-5-powerpc-miboot-di | 1.29etch2 | powerpc loop-modules-2.6.18-5-powerpc64-di | 1.29etch2 | powerpc loop-modules-2.6.18-5-prep-di | 1.29etch2 | powerpc loop-modules-2.6.18-5-qemu-di | 0.13etch2 | mips, mipsel loop-modules-2.6.18-5-r4k-ip22-di | 0.13etch2 | mips loop-modules-2.6.18-5-r5k-cobalt-di | 0.13etch2 | mipsel loop-modules-2.6.18-5-r5k-ip32-di | 0.13etch2 | mips loop-modules-2.6.18-5-rpc-di | 1.10etch2 | arm loop-modules-2.6.18-5-sb1-bcm91250a-di | 0.13etch2 | mips, mipsel loop-modules-2.6.18-5-sb1a-bcm91480b-di | 0.13etch2 | mips, mipsel md-modules-2.6.18-5-486-di | 1.44etch2 | i386 md-modules-2.6.18-5-alpha-generic-di | 0.17etch2 | alpha md-modules-2.6.18-5-amd64-di | 1.21etch2 | amd64 md-modules-2.6.18-5-footbridge-di | 1.10etch2 | arm md-modules-2.6.18-5-iop32x-di | 1.10etch2 | arm md-modules-2.6.18-5-itanium-di | 1.18etch2 | ia64 md-modules-2.6.18-5-ixp4xx-di | 1.10etch2 | arm md-modules-2.6.18-5-parisc-di | 1.17etch2 | hppa md-modules-2.6.18-5-parisc64-di | 1.17etch2 | hppa md-modules-2.6.18-5-powerpc-di | 1.29etch2 | powerpc md-modules-2.6.18-5-powerpc-miboot-di | 1.29etch2 | powerpc md-modules-2.6.18-5-powerpc64-di | 1.29etch2 | powerpc md-modules-2.6.18-5-prep-di | 1.29etch2 | powerpc md-modules-2.6.18-5-qemu-di | 0.13etch2 | mips, mipsel md-modules-2.6.18-5-r4k-ip22-di | 0.13etch2 | mips md-modules-2.6.18-5-r5k-cobalt-di | 0.13etch2 | mipsel md-modules-2.6.18-5-r5k-ip32-di | 0.13etch2 | mips md-modules-2.6.18-5-s390-di | 0.13etch2 | s390 md-modules-2.6.18-5-sb1-bcm91250a-di | 0.13etch2 | mips, mipsel md-modules-2.6.18-5-sb1a-bcm91480b-di | 0.13etch2 | mips, mipsel md-modules-2.6.18-5-sparc32-di | 1.20etch2 | sparc md-modules-2.6.18-5-sparc64-di | 1.20etch2 | sparc mol-modules-2.6.18-5-powerpc | 2.6.18+0.9.71.dfsg-7+etch3 | powerpc mol-modules-2.6.18-5-powerpc-miboot | 2.6.18+0.9.71.dfsg-7+etch3 | powerpc mol-modules-2.6.18-5-powerpc-smp | 2.6.18+0.9.71.dfsg-7+etch3 | powerpc mol-modules-2.6.18-5-vserver-powerpc | 2.6.18+0.9.71.dfsg-7+etch3 | powerpc mouse-modules-2.6.18-5-486-di | 1.44etch2 | i386 mouse-modules-2.6.18-5-amd64-di | 1.21etch2 | amd64 mouse-modules-2.6.18-5-itanium-di | 1.18etch2 | ia64 mouse-modules-2.6.18-5-powerpc-di | 1.29etch2 | powerpc mouse-modules-2.6.18-5-powerpc-miboot-di | 1.29etch2 | powerpc mouse-modules-2.6.18-5-powerpc64-di | 1.29etch2 | powerpc mouse-modules-2.6.18-5-prep-di | 1.29etch2 | powerpc nfs-modules-2.6.18-5-r5k-cobalt-di | 0.13etch2 | mipsel nic-extra-modules-2.6.18-5-486-di | 1.44etch2 | i386 nic-extra-modules-2.6.18-5-alpha-generic-di | 0.17etch2 | alpha nic-extra-modules-2.6.18-5-amd64-di | 1.21etch2 | amd64 nic-extra-modules-2.6.18-5-powerpc-di | 1.29etch2 | powerpc nic-extra-modules-2.6.18-5-powerpc-miboot-di | 1.29etch2 | powerpc nic-extra-modules-2.6.18-5-powerpc64-di | 1.29etch2 | powerpc nic-extra-modules-2.6.18-5-prep-di | 1.29etch2 | powerpc nic-modules-2.6.18-5-486-di | 1.44etch2 | i386 nic-modules-2.6.18-5-alpha-generic-di | 0.17etch2 | alpha nic-modules-2.6.18-5-amd64-di | 1.21etch2 | amd64 nic-modules-2.6.18-5-footbridge-di | 1.10etch2 | arm nic-modules-2.6.18-5-iop32x-di | 1.10etch2 | arm nic-modules-2.6.18-5-itanium-di | 1.18etch2 | ia64 nic-modules-2.6.18-5-ixp4xx-di | 1.10etch2 | arm nic-modules-2.6.18-5-parisc-di | 1.17etch2 | hppa nic-modules-2.6.18-5-parisc64-di | 1.17etch2 | hppa nic-modules-2.6.18-5-powerpc-di | 1.29etch2 | powerpc nic-modules-2.6.18-5-powerpc-miboot-di | 1.29etch2 | powerpc nic-modules-2.6.18-5-powerpc64-di | 1.29etch2 | powerpc nic-modules-2.6.18-5-prep-di | 1.29etch2 | powerpc nic-modules-2.6.18-5-s390-di | 0.13etch2 | s390 nic-modules-2.6.18-5-sparc32-di | 1.20etch2 | sparc nic-modules-2.6.18-5-sparc64-di | 1.20etch2 | sparc nic-pcmcia-modules-2.6.18-5-486-di | 1.44etch2 | i386 nic-pcmcia-modules-2.6.18-5-amd64-di | 1.21etch2 | amd64 nic-pcmcia-modules-2.6.18-5-powerpc-di | 1.29etch2 | powerpc nic-pcmcia-modules-2.6.18-5-powerpc-miboot-di | 1.29etch2 | powerpc nic-pcmcia-modules-2.6.18-5-powerpc64-di | 1.29etch2 | powerpc nic-pcmcia-modules-2.6.18-5-prep-di | 1.29etch2 | powerpc nic-shared-modules-2.6.18-5-486-di | 1.44etch2 | i386 nic-shared-modules-2.6.18-5-alpha-generic-di | 0.17etch2 | alpha nic-shared-modules-2.6.18-5-amd64-di | 1.21etch2 | amd64 nic-shared-modules-2.6.18-5-footbridge-di | 1.10etch2 | arm nic-shared-modules-2.6.18-5-itanium-di | 1.18etch2 | ia64 nic-shared-modules-2.6.18-5-powerpc-di | 1.29etch2 | powerpc nic-shared-modules-2.6.18-5-powerpc-miboot-di | 1.29etch2 | powerpc nic-shared-modules-2.6.18-5-powerpc64-di | 1.29etch2 | powerpc nic-shared-modules-2.6.18-5-prep-di | 1.29etch2 | powerpc nic-usb-modules-2.6.18-5-486-di | 1.44etch2 | i386 nic-usb-modules-2.6.18-5-amd64-di | 1.21etch2 | amd64 nic-usb-modules-2.6.18-5-iop32x-di | 1.10etch2 | arm nic-usb-modules-2.6.18-5-itanium-di | 1.18etch2 | ia64 nic-usb-modules-2.6.18-5-ixp4xx-di | 1.10etch2 | arm ntfs-modules-2.6.18-5-486-di | 1.44etch2 | i386 ntfs-modules-2.6.18-5-amd64-di | 1.21etch2 | amd64 ntfs-modules-2.6.18-5-itanium-di | 1.18etch2 | ia64 nvidia-kernel-2.6.18-5-486 | 1.0.8776+6etch1 | i386 nvidia-kernel-2.6.18-5-686 | 1.0.8776+6etch1 | i386 nvidia-kernel-2.6.18-5-amd64 | 1.0.8776+6etch1 | amd64 nvidia-kernel-2.6.18-5-k7 | 1.0.8776+6etch1 | i386 nvidia-kernel-legacy-2.6.18-5-486 | 1.0.7184+6etch1 | i386 nvidia-kernel-legacy-2.6.18-5-686 | 1.0.7184+6etch1 | i386 nvidia-kernel-legacy-2.6.18-5-amd64 | 1.0.7184+6etch1 | amd64 nvidia-kernel-legacy-2.6.18-5-k7 | 1.0.7184+6etch1 | i386 parport-modules-2.6.18-5-486-di | 1.44etch2 | i386 parport-modules-2.6.18-5-alpha-generic-di | 0.17etch2 | alpha parport-modules-2.6.18-5-amd64-di | 1.21etch2 | amd64 parport-modules-2.6.18-5-itanium-di | 1.18etch2 | ia64 pcmcia-modules-2.6.18-5-486-di | 1.44etch2 | i386 pcmcia-modules-2.6.18-5-amd64-di | 1.21etch2 | amd64 pcmcia-modules-2.6.18-5-itanium-di | 1.18etch2 | ia64 pcmcia-modules-2.6.18-5-powerpc-di | 1.29etch2 | powerpc pcmcia-modules-2.6.18-5-powerpc-miboot-di | 1.29etch2 | powerpc pcmcia-modules-2.6.18-5-powerpc64-di | 1.29etch2 | powerpc pcmcia-modules-2.6.18-5-prep-di | 1.29etch2 | powerpc pcmcia-storage-modules-2.6.18-5-486-di | 1.44etch2 | i386 pcmcia-storage-modules-2.6.18-5-amd64-di | 1.21etch2 | amd64 pcmcia-storage-modules-2.6.18-5-powerpc-di | 1.29etch2 | powerpc pcmcia-storage-modules-2.6.18-5-powerpc-miboot-di | 1.29etch2 | powerpc pcmcia-storage-modules-2.6.18-5-powerpc64-di | 1.29etch2 | powerpc pcmcia-storage-modules-2.6.18-5-prep-di | 1.29etch2 | powerpc plip-modules-2.6.18-5-486-di | 1.44etch2 | i386 plip-modules-2.6.18-5-alpha-generic-di | 0.17etch2 | alpha plip-modules-2.6.18-5-amd64-di | 1.21etch2 | amd64 plip-modules-2.6.18-5-itanium-di | 1.18etch2 | ia64 plip-modules-2.6.18-5-sparc32-di | 1.20etch2 | sparc plip-modules-2.6.18-5-sparc64-di | 1.20etch2 | sparc ppp-modules-2.6.18-5-486-di | 1.44etch2 | i386 ppp-modules-2.6.18-5-alpha-generic-di | 0.17etch2 | alpha ppp-modules-2.6.18-5-amd64-di | 1.21etch2 | amd64 ppp-modules-2.6.18-5-itanium-di | 1.18etch2 | ia64 ppp-modules-2.6.18-5-parisc-di | 1.17etch2 | hppa ppp-modules-2.6.18-5-parisc64-di | 1.17etch2 | hppa ppp-modules-2.6.18-5-powerpc-di | 1.29etch2 | powerpc ppp-modules-2.6.18-5-powerpc-miboot-di | 1.29etch2 | powerpc ppp-modules-2.6.18-5-powerpc64-di | 1.29etch2 | powerpc ppp-modules-2.6.18-5-prep-di | 1.29etch2 | powerpc ppp-modules-2.6.18-5-r4k-ip22-di | 0.13etch2 | mips ppp-modules-2.6.18-5-r5k-cobalt-di | 0.13etch2 | mipsel ppp-modules-2.6.18-5-r5k-ip32-di | 0.13etch2 | mips ppp-modules-2.6.18-5-sb1-bcm91250a-di | 0.13etch2 | mips, mipsel ppp-modules-2.6.18-5-sb1a-bcm91480b-di | 0.13etch2 | mips, mipsel ppp-modules-2.6.18-5-sparc32-di | 1.20etch2 | sparc ppp-modules-2.6.18-5-sparc64-di | 1.20etch2 | sparc qnx4-modules-2.6.18-5-486-di | 1.44etch2 | i386 qnx4-modules-2.6.18-5-amd64-di | 1.21etch2 | amd64 redhat-cluster-modules-2.6.18-5-486 | 2.6.18+1.03.00-7+etch3 | i386 redhat-cluster-modules-2.6.18-5-686 | 2.6.18+1.03.00-7+etch3 | i386 redhat-cluster-modules-2.6.18-5-686-bigmem | 2.6.18+1.03.00-7+etch3 | i386 redhat-cluster-modules-2.6.18-5-alpha-generic | 2.6.18+1.03.00-7+etch3 | alpha redhat-cluster-modules-2.6.18-5-alpha-legacy | 2.6.18+1.03.00-7+etch3 | alpha redhat-cluster-modules-2.6.18-5-alpha-smp | 2.6.18+1.03.00-7+etch3 | alpha redhat-cluster-modules-2.6.18-5-amd64 | 2.6.18+1.03.00-7+etch3 | amd64, i386 redhat-cluster-modules-2.6.18-5-footbridge | 2.6.18+1.03.00-7+etch3 | arm redhat-cluster-modules-2.6.18-5-iop32x | 2.6.18+1.03.00-7+etch3 | arm redhat-cluster-modules-2.6.18-5-itanium | 2.6.18+1.03.00-7+etch3 | ia64 redhat-cluster-modules-2.6.18-5-ixp4xx | 2.6.18+1.03.00-7+etch3 | arm redhat-cluster-modules-2.6.18-5-k7 | 2.6.18+1.03.00-7+etch3 | i386 redhat-cluster-modules-2.6.18-5-mckinley | 2.6.18+1.03.00-7+etch3 | ia64 redhat-cluster-modules-2.6.18-5-parisc | 2.6.18+1.03.00-7+etch3 | hppa redhat-cluster-modules-2.6.18-5-parisc-smp | 2.6.18+1.03.00-7+etch3 | hppa redhat-cluster-modules-2.6.18-5-parisc64 | 2.6.18+1.03.00-7+etch3 | hppa redhat-cluster-modules-2.6.18-5-parisc64-smp | 2.6.18+1.03.00-7+etch3 | hppa redhat-cluster-modules-2.6.18-5-powerpc | 2.6.18+1.03.00-7+etch3 | powerpc redhat-cluster-modules-2.6.18-5-powerpc-miboot | 2.6.18+1.03.00-7+etch3 | powerpc redhat-cluster-modules-2.6.18-5-powerpc-smp | 2.6.18+1.03.00-7+etch3 | powerpc redhat-cluster-modules-2.6.18-5-powerpc64 | 2.6.18+1.03.00-7+etch3 | powerpc redhat-cluster-modules-2.6.18-5-prep | 2.6.18+1.03.00-7+etch3 | powerpc redhat-cluster-modules-2.6.18-5-qemu | 2.6.18+1.03.00-7+etch3 | mips, mipsel redhat-cluster-modules-2.6.18-5-r3k-kn02 | 2.6.18+1.03.00-7+etch3 | mipsel redhat-cluster-modules-2.6.18-5-r4k-ip22 | 2.6.18+1.03.00-7+etch3 | mips redhat-cluster-modules-2.6.18-5-r4k-kn04 | 2.6.18+1.03.00-7+etch3 | mipsel redhat-cluster-modules-2.6.18-5-r5k-cobalt | 2.6.18+1.03.00-7+etch3 | mipsel redhat-cluster-modules-2.6.18-5-r5k-ip32 | 2.6.18+1.03.00-7+etch3 | mips redhat-cluster-modules-2.6.18-5-rpc | 2.6.18+1.03.00-7+etch3 | arm redhat-cluster-modules-2.6.18-5-s390 | 2.6.18+1.03.00-7+etch3 | s390 redhat-cluster-modules-2.6.18-5-s390x | 2.6.18+1.03.00-7+etch3 | s390 redhat-cluster-modules-2.6.18-5-s3c2410 | 2.6.18+1.03.00-7+etch3 | arm redhat-cluster-modules-2.6.18-5-sb1-bcm91250a | 2.6.18+1.03.00-7+etch3 | mips, mipsel redhat-cluster-modules-2.6.18-5-sb1a-bcm91480b | 2.6.18+1.03.00-7+etch3 | mips, mipsel redhat-cluster-modules-2.6.18-5-sparc32 | 2.6.18+1.03.00-7+etch3 | sparc redhat-cluster-modules-2.6.18-5-sparc64 | 2.6.18+1.03.00-7+etch3 | sparc redhat-cluster-modules-2.6.18-5-sparc64-smp | 2.6.18+1.03.00-7+etch3 | sparc redhat-cluster-modules-2.6.18-5-vserver-686 | 2.6.18+1.03.00-7+etch3 | i386 redhat-cluster-modules-2.6.18-5-vserver-alpha | 2.6.18+1.03.00-7+etch3 | alpha redhat-cluster-modules-2.6.18-5-vserver-amd64 | 2.6.18+1.03.00-7+etch3 | amd64 redhat-cluster-modules-2.6.18-5-vserver-k7 | 2.6.18+1.03.00-7+etch3 | i386 redhat-cluster-modules-2.6.18-5-vserver-powerpc | 2.6.18+1.03.00-7+etch3 | powerpc redhat-cluster-modules-2.6.18-5-vserver-powerpc64 | 2.6.18+1.03.00-7+etch3 | powerpc redhat-cluster-modules-2.6.18-5-vserver-s390x | 2.6.18+1.03.00-7+etch3 | s390 redhat-cluster-modules-2.6.18-5-vserver-sparc64 | 2.6.18+1.03.00-7+etch3 | sparc redhat-cluster-modules-2.6.18-5-xen-686 | 2.6.18+1.03.00-7+etch3 | i386 redhat-cluster-modules-2.6.18-5-xen-amd64 | 2.6.18+1.03.00-7+etch3 | amd64 redhat-cluster-modules-2.6.18-5-xen-vserver-686 | 2.6.18+1.03.00-7+etch3 | i386 redhat-cluster-modules-2.6.18-5-xen-vserver-amd64 | 2.6.18+1.03.00-7+etch3 | amd64 reiserfs-modules-2.6.18-5-486-di | 1.44etch2 | i386 reiserfs-modules-2.6.18-5-alpha-generic-di | 0.17etch2 | alpha reiserfs-modules-2.6.18-5-amd64-di | 1.21etch2 | amd64 reiserfs-modules-2.6.18-5-footbridge-di | 1.10etch2 | arm reiserfs-modules-2.6.18-5-iop32x-di | 1.10etch2 | arm reiserfs-modules-2.6.18-5-itanium-di | 1.18etch2 | ia64 reiserfs-modules-2.6.18-5-ixp4xx-di | 1.10etch2 | arm reiserfs-modules-2.6.18-5-powerpc-di | 1.29etch2 | powerpc reiserfs-modules-2.6.18-5-powerpc-miboot-di | 1.29etch2 | powerpc reiserfs-modules-2.6.18-5-powerpc64-di | 1.29etch2 | powerpc reiserfs-modules-2.6.18-5-prep-di | 1.29etch2 | powerpc reiserfs-modules-2.6.18-5-qemu-di | 0.13etch2 | mips, mipsel reiserfs-modules-2.6.18-5-r3k-kn02-di | 0.13etch2 | mipsel reiserfs-modules-2.6.18-5-r4k-ip22-di | 0.13etch2 | mips reiserfs-modules-2.6.18-5-r4k-kn04-di | 0.13etch2 | mipsel reiserfs-modules-2.6.18-5-r5k-cobalt-di | 0.13etch2 | mipsel reiserfs-modules-2.6.18-5-r5k-ip32-di | 0.13etch2 | mips reiserfs-modules-2.6.18-5-rpc-di | 1.10etch2 | arm reiserfs-modules-2.6.18-5-sb1-bcm91250a-di | 0.13etch2 | mips, mipsel reiserfs-modules-2.6.18-5-sb1a-bcm91480b-di | 0.13etch2 | mips, mipsel reiserfs-modules-2.6.18-5-sparc32-di | 1.20etch2 | sparc reiserfs-modules-2.6.18-5-sparc64-di | 1.20etch2 | sparc sata-modules-2.6.18-5-486-di | 1.44etch2 | i386 sata-modules-2.6.18-5-alpha-generic-di | 0.17etch2 | alpha sata-modules-2.6.18-5-amd64-di | 1.21etch2 | amd64 sata-modules-2.6.18-5-iop32x-di | 1.10etch2 | arm sata-modules-2.6.18-5-itanium-di | 1.18etch2 | ia64 sata-modules-2.6.18-5-powerpc-di | 1.29etch2 | powerpc sata-modules-2.6.18-5-powerpc-miboot-di | 1.29etch2 | powerpc sata-modules-2.6.18-5-powerpc64-di | 1.29etch2 | powerpc sata-modules-2.6.18-5-prep-di | 1.29etch2 | powerpc sata-modules-2.6.18-5-sb1-bcm91250a-di | 0.13etch2 | mips, mipsel sata-modules-2.6.18-5-sb1a-bcm91480b-di | 0.13etch2 | mips, mipsel sata-modules-2.6.18-5-sparc64-di | 1.20etch2 | sparc scsi-common-modules-2.6.18-5-486-di | 1.44etch2 | i386 scsi-common-modules-2.6.18-5-alpha-generic-di | 0.17etch2 | alpha scsi-common-modules-2.6.18-5-amd64-di | 1.21etch2 | amd64 scsi-common-modules-2.6.18-5-itanium-di | 1.18etch2 | ia64 scsi-common-modules-2.6.18-5-powerpc-di | 1.29etch2 | powerpc scsi-common-modules-2.6.18-5-powerpc-miboot-di | 1.29etch2 | powerpc scsi-common-modules-2.6.18-5-powerpc64-di | 1.29etch2 | powerpc scsi-common-modules-2.6.18-5-prep-di | 1.29etch2 | powerpc scsi-common-modules-2.6.18-5-sb1-bcm91250a-di | 0.13etch2 | mips, mipsel scsi-common-modules-2.6.18-5-sb1a-bcm91480b-di | 0.13etch2 | mips, mipsel scsi-common-modules-2.6.18-5-sparc32-di | 1.20etch2 | sparc scsi-common-modules-2.6.18-5-sparc64-di | 1.20etch2 | sparc scsi-core-modules-2.6.18-5-486-di | 1.44etch2 | i386 scsi-core-modules-2.6.18-5-alpha-generic-di | 0.17etch2 | alpha scsi-core-modules-2.6.18-5-amd64-di | 1.21etch2 | amd64 scsi-core-modules-2.6.18-5-footbridge-di | 1.10etch2 | arm scsi-core-modules-2.6.18-5-iop32x-di | 1.10etch2 | arm scsi-core-modules-2.6.18-5-itanium-di | 1.18etch2 | ia64 scsi-core-modules-2.6.18-5-ixp4xx-di | 1.10etch2 | arm scsi-core-modules-2.6.18-5-powerpc-di | 1.29etch2 | powerpc scsi-core-modules-2.6.18-5-powerpc-miboot-di | 1.29etch2 | powerpc scsi-core-modules-2.6.18-5-powerpc64-di | 1.29etch2 | powerpc scsi-core-modules-2.6.18-5-prep-di | 1.29etch2 | powerpc scsi-core-modules-2.6.18-5-rpc-di | 1.10etch2 | arm scsi-core-modules-2.6.18-5-s390-di | 0.13etch2 | s390 scsi-core-modules-2.6.18-5-sb1-bcm91250a-di | 0.13etch2 | mips, mipsel scsi-core-modules-2.6.18-5-sb1a-bcm91480b-di | 0.13etch2 | mips, mipsel scsi-core-modules-2.6.18-5-sparc32-di | 1.20etch2 | sparc scsi-core-modules-2.6.18-5-sparc64-di | 1.20etch2 | sparc scsi-extra-modules-2.6.18-5-486-di | 1.44etch2 | i386 scsi-extra-modules-2.6.18-5-alpha-generic-di | 0.17etch2 | alpha scsi-extra-modules-2.6.18-5-amd64-di | 1.21etch2 | amd64 scsi-extra-modules-2.6.18-5-powerpc-di | 1.29etch2 | powerpc scsi-extra-modules-2.6.18-5-powerpc-miboot-di | 1.29etch2 | powerpc scsi-extra-modules-2.6.18-5-powerpc64-di | 1.29etch2 | powerpc scsi-extra-modules-2.6.18-5-prep-di | 1.29etch2 | powerpc scsi-extra-modules-2.6.18-5-sparc64-di | 1.20etch2 | sparc scsi-modules-2.6.18-5-486-di | 1.44etch2 | i386 scsi-modules-2.6.18-5-alpha-generic-di | 0.17etch2 | alpha scsi-modules-2.6.18-5-amd64-di | 1.21etch2 | amd64 scsi-modules-2.6.18-5-itanium-di | 1.18etch2 | ia64 scsi-modules-2.6.18-5-parisc-di | 1.17etch2 | hppa scsi-modules-2.6.18-5-parisc64-di | 1.17etch2 | hppa scsi-modules-2.6.18-5-powerpc-di | 1.29etch2 | powerpc scsi-modules-2.6.18-5-powerpc-miboot-di | 1.29etch2 | powerpc scsi-modules-2.6.18-5-powerpc64-di | 1.29etch2 | powerpc scsi-modules-2.6.18-5-prep-di | 1.29etch2 | powerpc scsi-modules-2.6.18-5-s390-di | 0.13etch2 | s390 scsi-modules-2.6.18-5-sb1-bcm91250a-di | 0.13etch2 | mips, mipsel scsi-modules-2.6.18-5-sb1a-bcm91480b-di | 0.13etch2 | mips, mipsel serial-modules-2.6.18-5-486-di | 1.44etch2 | i386 serial-modules-2.6.18-5-amd64-di | 1.21etch2 | amd64 serial-modules-2.6.18-5-itanium-di | 1.18etch2 | ia64 serial-modules-2.6.18-5-powerpc-di | 1.29etch2 | powerpc serial-modules-2.6.18-5-powerpc-miboot-di | 1.29etch2 | powerpc serial-modules-2.6.18-5-powerpc64-di | 1.29etch2 | powerpc serial-modules-2.6.18-5-prep-di | 1.29etch2 | powerpc sn-modules-2.6.18-5-itanium-di | 1.18etch2 | ia64 squashfs-modules-2.6.18-5-486 | 2.6.18+3.1r2-7+etch3 | i386 squashfs-modules-2.6.18-5-686 | 2.6.18+3.1r2-7+etch3 | i386 squashfs-modules-2.6.18-5-686-bigmem | 2.6.18+3.1r2-7+etch3 | i386 squashfs-modules-2.6.18-5-alpha-generic | 2.6.18+3.1r2-7+etch3 | alpha squashfs-modules-2.6.18-5-alpha-legacy | 2.6.18+3.1r2-7+etch3 | alpha squashfs-modules-2.6.18-5-alpha-smp | 2.6.18+3.1r2-7+etch3 | alpha squashfs-modules-2.6.18-5-amd64 | 2.6.18+3.1r2-7+etch3 | amd64, i386 squashfs-modules-2.6.18-5-itanium | 2.6.18+3.1r2-7+etch3 | ia64 squashfs-modules-2.6.18-5-k7 | 2.6.18+3.1r2-7+etch3 | i386 squashfs-modules-2.6.18-5-mckinley | 2.6.18+3.1r2-7+etch3 | ia64 squashfs-modules-2.6.18-5-powerpc | 2.6.18+3.1r2-7+etch3 | powerpc squashfs-modules-2.6.18-5-powerpc-miboot | 2.6.18+3.1r2-7+etch3 | powerpc squashfs-modules-2.6.18-5-powerpc-smp | 2.6.18+3.1r2-7+etch3 | powerpc squashfs-modules-2.6.18-5-powerpc64 | 2.6.18+3.1r2-7+etch3 | powerpc squashfs-modules-2.6.18-5-prep | 2.6.18+3.1r2-7+etch3 | powerpc squashfs-modules-2.6.18-5-qemu | 2.6.18+3.1r2-7+etch3 | mips, mipsel squashfs-modules-2.6.18-5-r3k-kn02 | 2.6.18+3.1r2-7+etch3 | mipsel squashfs-modules-2.6.18-5-r4k-ip22 | 2.6.18+3.1r2-7+etch3 | mips squashfs-modules-2.6.18-5-r4k-kn04 | 2.6.18+3.1r2-7+etch3 | mipsel squashfs-modules-2.6.18-5-r5k-cobalt | 2.6.18+3.1r2-7+etch3 | mipsel squashfs-modules-2.6.18-5-r5k-ip32 | 2.6.18+3.1r2-7+etch3 | mips squashfs-modules-2.6.18-5-s390 | 2.6.18+3.1r2-7+etch3 | s390 squashfs-modules-2.6.18-5-s390x | 2.6.18+3.1r2-7+etch3 | s390 squashfs-modules-2.6.18-5-sb1-bcm91250a | 2.6.18+3.1r2-7+etch3 | mips, mipsel squashfs-modules-2.6.18-5-sb1a-bcm91480b | 2.6.18+3.1r2-7+etch3 | mips, mipsel squashfs-modules-2.6.18-5-sparc32 | 2.6.18+3.1r2-7+etch3 | sparc squashfs-modules-2.6.18-5-sparc64 | 2.6.18+3.1r2-7+etch3 | sparc squashfs-modules-2.6.18-5-sparc64-smp | 2.6.18+3.1r2-7+etch3 | sparc squashfs-modules-2.6.18-5-vserver-686 | 2.6.18+3.1r2-7+etch3 | i386 squashfs-modules-2.6.18-5-vserver-alpha | 2.6.18+3.1r2-7+etch3 | alpha squashfs-modules-2.6.18-5-vserver-amd64 | 2.6.18+3.1r2-7+etch3 | amd64 squashfs-modules-2.6.18-5-vserver-k7 | 2.6.18+3.1r2-7+etch3 | i386 squashfs-modules-2.6.18-5-vserver-powerpc | 2.6.18+3.1r2-7+etch3 | powerpc squashfs-modules-2.6.18-5-vserver-powerpc64 | 2.6.18+3.1r2-7+etch3 | powerpc squashfs-modules-2.6.18-5-vserver-s390x | 2.6.18+3.1r2-7+etch3 | s390 squashfs-modules-2.6.18-5-vserver-sparc64 | 2.6.18+3.1r2-7+etch3 | sparc squashfs-modules-2.6.18-5-xen-686 | 2.6.18+3.1r2-7+etch3 | i386 squashfs-modules-2.6.18-5-xen-amd64 | 2.6.18+3.1r2-7+etch3 | amd64 squashfs-modules-2.6.18-5-xen-vserver-686 | 2.6.18+3.1r2-7+etch3 | i386 squashfs-modules-2.6.18-5-xen-vserver-amd64 | 2.6.18+3.1r2-7+etch3 | amd64 srm-modules-2.6.18-5-alpha-generic-di | 0.17etch2 | alpha ufs-modules-2.6.18-5-486-di | 1.44etch2 | i386 ufs-modules-2.6.18-5-amd64-di | 1.21etch2 | amd64 ufs-modules-2.6.18-5-itanium-di | 1.18etch2 | ia64 ufs-modules-2.6.18-5-powerpc-di | 1.29etch2 | powerpc ufs-modules-2.6.18-5-powerpc-miboot-di | 1.29etch2 | powerpc ufs-modules-2.6.18-5-powerpc64-di | 1.29etch2 | powerpc ufs-modules-2.6.18-5-prep-di | 1.29etch2 | powerpc unionfs-modules-2.6.18-5-486 | 2.6.18+1.4+debian-7+etch3 | i386 unionfs-modules-2.6.18-5-686 | 2.6.18+1.4+debian-7+etch3 | i386 unionfs-modules-2.6.18-5-686-bigmem | 2.6.18+1.4+debian-7+etch3 | i386 unionfs-modules-2.6.18-5-alpha-generic | 2.6.18+1.4+debian-7+etch3 | alpha unionfs-modules-2.6.18-5-alpha-legacy | 2.6.18+1.4+debian-7+etch3 | alpha unionfs-modules-2.6.18-5-alpha-smp | 2.6.18+1.4+debian-7+etch3 | alpha unionfs-modules-2.6.18-5-amd64 | 2.6.18+1.4+debian-7+etch3 | amd64, i386 unionfs-modules-2.6.18-5-footbridge | 2.6.18+1.4+debian-7+etch3 | arm unionfs-modules-2.6.18-5-iop32x | 2.6.18+1.4+debian-7+etch3 | arm unionfs-modules-2.6.18-5-itanium | 2.6.18+1.4+debian-7+etch3 | ia64 unionfs-modules-2.6.18-5-ixp4xx | 2.6.18+1.4+debian-7+etch3 | arm unionfs-modules-2.6.18-5-k7 | 2.6.18+1.4+debian-7+etch3 | i386 unionfs-modules-2.6.18-5-mckinley | 2.6.18+1.4+debian-7+etch3 | ia64 unionfs-modules-2.6.18-5-parisc | 2.6.18+1.4+debian-7+etch3 | hppa unionfs-modules-2.6.18-5-parisc-smp | 2.6.18+1.4+debian-7+etch3 | hppa unionfs-modules-2.6.18-5-parisc64 | 2.6.18+1.4+debian-7+etch3 | hppa unionfs-modules-2.6.18-5-parisc64-smp | 2.6.18+1.4+debian-7+etch3 | hppa unionfs-modules-2.6.18-5-powerpc | 2.6.18+1.4+debian-7+etch3 | powerpc unionfs-modules-2.6.18-5-powerpc-miboot | 2.6.18+1.4+debian-7+etch3 | powerpc unionfs-modules-2.6.18-5-powerpc-smp | 2.6.18+1.4+debian-7+etch3 | powerpc unionfs-modules-2.6.18-5-powerpc64 | 2.6.18+1.4+debian-7+etch3 | powerpc unionfs-modules-2.6.18-5-prep | 2.6.18+1.4+debian-7+etch3 | powerpc unionfs-modules-2.6.18-5-qemu | 2.6.18+1.4+debian-7+etch3 | mips, mipsel unionfs-modules-2.6.18-5-r3k-kn02 | 2.6.18+1.4+debian-7+etch3 | mipsel unionfs-modules-2.6.18-5-r4k-ip22 | 2.6.18+1.4+debian-7+etch3 | mips unionfs-modules-2.6.18-5-r4k-kn04 | 2.6.18+1.4+debian-7+etch3 | mipsel unionfs-modules-2.6.18-5-r5k-cobalt | 2.6.18+1.4+debian-7+etch3 | mipsel unionfs-modules-2.6.18-5-r5k-ip32 | 2.6.18+1.4+debian-7+etch3 | mips unionfs-modules-2.6.18-5-rpc | 2.6.18+1.4+debian-7+etch3 | arm unionfs-modules-2.6.18-5-s390 | 2.6.18+1.4+debian-7+etch3 | s390 unionfs-modules-2.6.18-5-s390x | 2.6.18+1.4+debian-7+etch3 | s390 unionfs-modules-2.6.18-5-s3c2410 | 2.6.18+1.4+debian-7+etch3 | arm unionfs-modules-2.6.18-5-sb1-bcm91250a | 2.6.18+1.4+debian-7+etch3 | mips, mipsel unionfs-modules-2.6.18-5-sb1a-bcm91480b | 2.6.18+1.4+debian-7+etch3 | mips, mipsel unionfs-modules-2.6.18-5-sparc32 | 2.6.18+1.4+debian-7+etch3 | sparc unionfs-modules-2.6.18-5-sparc64 | 2.6.18+1.4+debian-7+etch3 | sparc unionfs-modules-2.6.18-5-sparc64-smp | 2.6.18+1.4+debian-7+etch3 | sparc usb-modules-2.6.18-5-486-di | 1.44etch2 | i386 usb-modules-2.6.18-5-alpha-generic-di | 0.17etch2 | alpha usb-modules-2.6.18-5-amd64-di | 1.21etch2 | amd64 usb-modules-2.6.18-5-footbridge-di | 1.10etch2 | arm usb-modules-2.6.18-5-iop32x-di | 1.10etch2 | arm usb-modules-2.6.18-5-itanium-di | 1.18etch2 | ia64 usb-modules-2.6.18-5-ixp4xx-di | 1.10etch2 | arm usb-modules-2.6.18-5-parisc-di | 1.17etch2 | hppa usb-modules-2.6.18-5-parisc64-di | 1.17etch2 | hppa usb-modules-2.6.18-5-powerpc-di | 1.29etch2 | powerpc usb-modules-2.6.18-5-powerpc-miboot-di | 1.29etch2 | powerpc usb-modules-2.6.18-5-powerpc64-di | 1.29etch2 | powerpc usb-modules-2.6.18-5-prep-di | 1.29etch2 | powerpc usb-modules-2.6.18-5-sb1-bcm91250a-di | 0.13etch2 | mips, mipsel usb-modules-2.6.18-5-sb1a-bcm91480b-di | 0.13etch2 | mips, mipsel usb-modules-2.6.18-5-sparc64-di | 1.20etch2 | sparc usb-serial-modules-2.6.18-5-486-di | 1.44etch2 | i386 usb-serial-modules-2.6.18-5-alpha-generic-di | 0.17etch2 | alpha usb-serial-modules-2.6.18-5-amd64-di | 1.21etch2 | amd64 usb-serial-modules-2.6.18-5-powerpc-di | 1.29etch2 | powerpc usb-serial-modules-2.6.18-5-powerpc-miboot-di | 1.29etch2 | powerpc usb-serial-modules-2.6.18-5-powerpc64-di | 1.29etch2 | powerpc usb-serial-modules-2.6.18-5-prep-di | 1.29etch2 | powerpc usb-storage-modules-2.6.18-5-486-di | 1.44etch2 | i386 usb-storage-modules-2.6.18-5-alpha-generic-di | 0.17etch2 | alpha usb-storage-modules-2.6.18-5-amd64-di | 1.21etch2 | amd64 usb-storage-modules-2.6.18-5-footbridge-di | 1.10etch2 | arm usb-storage-modules-2.6.18-5-iop32x-di | 1.10etch2 | arm usb-storage-modules-2.6.18-5-itanium-di | 1.18etch2 | ia64 usb-storage-modules-2.6.18-5-ixp4xx-di | 1.10etch2 | arm usb-storage-modules-2.6.18-5-parisc-di | 1.17etch2 | hppa usb-storage-modules-2.6.18-5-parisc64-di | 1.17etch2 | hppa usb-storage-modules-2.6.18-5-powerpc-di | 1.29etch2 | powerpc usb-storage-modules-2.6.18-5-powerpc-miboot-di | 1.29etch2 | powerpc usb-storage-modules-2.6.18-5-powerpc64-di | 1.29etch2 | powerpc usb-storage-modules-2.6.18-5-prep-di | 1.29etch2 | powerpc usb-storage-modules-2.6.18-5-sb1-bcm91250a-di | 0.13etch2 | mips, mipsel usb-storage-modules-2.6.18-5-sb1a-bcm91480b-di | 0.13etch2 | mips, mipsel xen-linux-system-2.6.18-5-xen-686 | 2.6.18.dfsg.1-17 | i386 xen-linux-system-2.6.18-5-xen-amd64 | 2.6.18.dfsg.1-17 | amd64 xen-linux-system-2.6.18-5-xen-vserver-686 | 2.6.18.dfsg.1-17 | i386 xen-linux-system-2.6.18-5-xen-vserver-amd64 | 2.6.18.dfsg.1-17 | amd64 xfs-modules-2.6.18-5-486-di | 1.44etch2 | i386 xfs-modules-2.6.18-5-alpha-generic-di | 0.17etch2 | alpha xfs-modules-2.6.18-5-amd64-di | 1.21etch2 | amd64 xfs-modules-2.6.18-5-itanium-di | 1.18etch2 | ia64 xfs-modules-2.6.18-5-powerpc-di | 1.29etch2 | powerpc xfs-modules-2.6.18-5-powerpc-miboot-di | 1.29etch2 | powerpc xfs-modules-2.6.18-5-powerpc64-di | 1.29etch2 | powerpc xfs-modules-2.6.18-5-prep-di | 1.29etch2 | powerpc xfs-modules-2.6.18-5-qemu-di | 0.13etch2 | mips, mipsel xfs-modules-2.6.18-5-r4k-ip22-di | 0.13etch2 | mips xfs-modules-2.6.18-5-r5k-cobalt-di | 0.13etch2 | mipsel xfs-modules-2.6.18-5-r5k-ip32-di | 0.13etch2 | mips xfs-modules-2.6.18-5-s390-di | 0.13etch2 | s390 xfs-modules-2.6.18-5-sb1-bcm91250a-di | 0.13etch2 | mips, mipsel xfs-modules-2.6.18-5-sb1a-bcm91480b-di | 0.13etch2 | mips, mipsel xfs-modules-2.6.18-5-sparc32-di | 1.20etch2 | sparc xfs-modules-2.6.18-5-sparc64-di | 1.20etch2 | sparc ------------------- Reason ------------------- [auto-cruft] NBS ---------------------------------------------- ========================================= Wed, 26 Dec 2007 - Debian 4.0r2 released ========================================= stable/main/binary-alpha/apache2.2-common_2.2.3-4+etch3_alpha.deb stable/main/binary-alpha/apache2-mpm-worker_2.2.3-4+etch3_alpha.deb stable/main/binary-alpha/apache2-mpm-prefork_2.2.3-4+etch3_alpha.deb stable/main/binary-alpha/apache2-mpm-event_2.2.3-4+etch3_alpha.deb stable/main/binary-alpha/apache2-utils_2.2.3-4+etch3_alpha.deb stable/main/binary-alpha/apache2-prefork-dev_2.2.3-4+etch3_alpha.deb stable/main/binary-alpha/apache2-threaded-dev_2.2.3-4+etch3_alpha.deb apache2 (2.2.3-4+etch3) stable; urgency=low * fix CVE-2007-3847: DoS in mod_proxy (for threaded MPMs) (Closes: #441845) * Don't eat all memory on graceful restart when config has changed from many listening sockets to one (Closes: #443196) stable/main/binary-amd64/apache2.2-common_2.2.3-4+etch3_amd64.deb stable/main/binary-amd64/apache2-mpm-worker_2.2.3-4+etch3_amd64.deb stable/main/binary-amd64/apache2-mpm-prefork_2.2.3-4+etch3_amd64.deb stable/main/binary-amd64/apache2-mpm-event_2.2.3-4+etch3_amd64.deb stable/main/binary-amd64/apache2-utils_2.2.3-4+etch3_amd64.deb stable/main/binary-amd64/apache2-prefork-dev_2.2.3-4+etch3_amd64.deb stable/main/binary-amd64/apache2-threaded-dev_2.2.3-4+etch3_amd64.deb apache2 (2.2.3-4+etch3) stable; urgency=low * fix CVE-2007-3847: DoS in mod_proxy (for threaded MPMs) (Closes: #441845) * Don't eat all memory on graceful restart when config has changed from many listening sockets to one (Closes: #443196) stable/main/binary-arm/apache2.2-common_2.2.3-4+etch3_arm.deb stable/main/binary-arm/apache2-mpm-worker_2.2.3-4+etch3_arm.deb stable/main/binary-arm/apache2-mpm-prefork_2.2.3-4+etch3_arm.deb stable/main/binary-arm/apache2-mpm-event_2.2.3-4+etch3_arm.deb stable/main/binary-arm/apache2-utils_2.2.3-4+etch3_arm.deb stable/main/binary-arm/apache2-prefork-dev_2.2.3-4+etch3_arm.deb stable/main/binary-arm/apache2-threaded-dev_2.2.3-4+etch3_arm.deb apache2 (2.2.3-4+etch3) stable; urgency=low * fix CVE-2007-3847: DoS in mod_proxy (for threaded MPMs) (Closes: #441845) * Don't eat all memory on graceful restart when config has changed from many listening sockets to one (Closes: #443196) stable/main/binary-hppa/apache2.2-common_2.2.3-4+etch3_hppa.deb stable/main/binary-hppa/apache2-mpm-worker_2.2.3-4+etch3_hppa.deb stable/main/binary-hppa/apache2-mpm-prefork_2.2.3-4+etch3_hppa.deb stable/main/binary-hppa/apache2-mpm-event_2.2.3-4+etch3_hppa.deb stable/main/binary-hppa/apache2-utils_2.2.3-4+etch3_hppa.deb stable/main/binary-hppa/apache2-prefork-dev_2.2.3-4+etch3_hppa.deb stable/main/binary-hppa/apache2-threaded-dev_2.2.3-4+etch3_hppa.deb apache2 (2.2.3-4+etch3) stable; urgency=low * fix CVE-2007-3847: DoS in mod_proxy (for threaded MPMs) (Closes: #441845) * Don't eat all memory on graceful restart when config has changed from many listening sockets to one (Closes: #443196) stable/main/source/apache2_2.2.3-4+etch3.dsc stable/main/source/apache2_2.2.3-4+etch3.diff.gz stable/main/binary-i386/apache2.2-common_2.2.3-4+etch3_i386.deb stable/main/binary-i386/apache2-mpm-worker_2.2.3-4+etch3_i386.deb stable/main/binary-i386/apache2-mpm-prefork_2.2.3-4+etch3_i386.deb stable/main/binary-i386/apache2-mpm-event_2.2.3-4+etch3_i386.deb stable/main/binary-i386/apache2-utils_2.2.3-4+etch3_i386.deb stable/main/binary-i386/apache2-prefork-dev_2.2.3-4+etch3_i386.deb stable/main/binary-i386/apache2-threaded-dev_2.2.3-4+etch3_i386.deb stable/main/binary-all/apache2-mpm-perchild_2.2.3-4+etch3_all.deb stable/main/binary-all/apache2_2.2.3-4+etch3_all.deb stable/main/binary-all/apache2-doc_2.2.3-4+etch3_all.deb stable/main/binary-all/apache2-src_2.2.3-4+etch3_all.deb apache2 (2.2.3-4+etch3) stable; urgency=low * fix CVE-2007-3847: DoS in mod_proxy (for threaded MPMs) (Closes: #441845) * Don't eat all memory on graceful restart when config has changed from many listening sockets to one (Closes: #443196) stable/main/binary-ia64/apache2.2-common_2.2.3-4+etch3_ia64.deb stable/main/binary-ia64/apache2-mpm-worker_2.2.3-4+etch3_ia64.deb stable/main/binary-ia64/apache2-mpm-prefork_2.2.3-4+etch3_ia64.deb stable/main/binary-ia64/apache2-mpm-event_2.2.3-4+etch3_ia64.deb stable/main/binary-ia64/apache2-utils_2.2.3-4+etch3_ia64.deb stable/main/binary-ia64/apache2-prefork-dev_2.2.3-4+etch3_ia64.deb stable/main/binary-ia64/apache2-threaded-dev_2.2.3-4+etch3_ia64.deb apache2 (2.2.3-4+etch3) stable; urgency=low * fix CVE-2007-3847: DoS in mod_proxy (for threaded MPMs) (Closes: #441845) * Don't eat all memory on graceful restart when config has changed from many listening sockets to one (Closes: #443196) stable/main/binary-mips/apache2.2-common_2.2.3-4+etch3_mips.deb stable/main/binary-mips/apache2-mpm-worker_2.2.3-4+etch3_mips.deb stable/main/binary-mips/apache2-mpm-prefork_2.2.3-4+etch3_mips.deb stable/main/binary-mips/apache2-mpm-event_2.2.3-4+etch3_mips.deb stable/main/binary-mips/apache2-utils_2.2.3-4+etch3_mips.deb stable/main/binary-mips/apache2-prefork-dev_2.2.3-4+etch3_mips.deb stable/main/binary-mips/apache2-threaded-dev_2.2.3-4+etch3_mips.deb apache2 (2.2.3-4+etch3) stable; urgency=low * fix CVE-2007-3847: DoS in mod_proxy (for threaded MPMs) (Closes: #441845) * Don't eat all memory on graceful restart when config has changed from many listening sockets to one (Closes: #443196) stable/main/binary-mipsel/apache2.2-common_2.2.3-4+etch3_mipsel.deb stable/main/binary-mipsel/apache2-mpm-worker_2.2.3-4+etch3_mipsel.deb stable/main/binary-mipsel/apache2-mpm-prefork_2.2.3-4+etch3_mipsel.deb stable/main/binary-mipsel/apache2-mpm-event_2.2.3-4+etch3_mipsel.deb stable/main/binary-mipsel/apache2-utils_2.2.3-4+etch3_mipsel.deb stable/main/binary-mipsel/apache2-prefork-dev_2.2.3-4+etch3_mipsel.deb stable/main/binary-mipsel/apache2-threaded-dev_2.2.3-4+etch3_mipsel.deb apache2 (2.2.3-4+etch3) stable; urgency=low * fix CVE-2007-3847: DoS in mod_proxy (for threaded MPMs) (Closes: #441845) * Don't eat all memory on graceful restart when config has changed from many listening sockets to one (Closes: #443196) stable/main/binary-powerpc/apache2.2-common_2.2.3-4+etch3_powerpc.deb stable/main/binary-powerpc/apache2-mpm-worker_2.2.3-4+etch3_powerpc.deb stable/main/binary-powerpc/apache2-mpm-prefork_2.2.3-4+etch3_powerpc.deb stable/main/binary-powerpc/apache2-mpm-event_2.2.3-4+etch3_powerpc.deb stable/main/binary-powerpc/apache2-utils_2.2.3-4+etch3_powerpc.deb stable/main/binary-powerpc/apache2-prefork-dev_2.2.3-4+etch3_powerpc.deb stable/main/binary-powerpc/apache2-threaded-dev_2.2.3-4+etch3_powerpc.deb apache2 (2.2.3-4+etch3) stable; urgency=low * fix CVE-2007-3847: DoS in mod_proxy (for threaded MPMs) (Closes: #441845) * Don't eat all memory on graceful restart when config has changed from many listening sockets to one (Closes: #443196) stable/main/binary-s390/apache2.2-common_2.2.3-4+etch3_s390.deb stable/main/binary-s390/apache2-mpm-worker_2.2.3-4+etch3_s390.deb stable/main/binary-s390/apache2-mpm-prefork_2.2.3-4+etch3_s390.deb stable/main/binary-s390/apache2-mpm-event_2.2.3-4+etch3_s390.deb stable/main/binary-s390/apache2-utils_2.2.3-4+etch3_s390.deb stable/main/binary-s390/apache2-prefork-dev_2.2.3-4+etch3_s390.deb stable/main/binary-s390/apache2-threaded-dev_2.2.3-4+etch3_s390.deb apache2 (2.2.3-4+etch3) stable; urgency=low * fix CVE-2007-3847: DoS in mod_proxy (for threaded MPMs) (Closes: #441845) * Don't eat all memory on graceful restart when config has changed from many listening sockets to one (Closes: #443196) stable/main/binary-sparc/apache2.2-common_2.2.3-4+etch3_sparc.deb stable/main/binary-sparc/apache2-mpm-worker_2.2.3-4+etch3_sparc.deb stable/main/binary-sparc/apache2-mpm-prefork_2.2.3-4+etch3_sparc.deb stable/main/binary-sparc/apache2-mpm-event_2.2.3-4+etch3_sparc.deb stable/main/binary-sparc/apache2-utils_2.2.3-4+etch3_sparc.deb stable/main/binary-sparc/apache2-prefork-dev_2.2.3-4+etch3_sparc.deb stable/main/binary-sparc/apache2-threaded-dev_2.2.3-4+etch3_sparc.deb apache2 (2.2.3-4+etch3) stable; urgency=low * fix CVE-2007-3847: DoS in mod_proxy (for threaded MPMs) (Closes: #441845) * Don't eat all memory on graceful restart when config has changed from many listening sockets to one (Closes: #443196) stable/main/binary-alpha/apache2-mpm-itk_2.2.3-01-2_alpha.deb apache2-mpm-itk (2.2.3-01-2) stable; urgency=low * Sourceful (but unchanged) upload to get a new apache2-mpm-itk built from apache2 2.2.3-4+etch3 sources for etch r2. stable/main/binary-amd64/apache2-mpm-itk_2.2.3-01-2_amd64.deb apache2-mpm-itk (2.2.3-01-2) stable; urgency=low * Sourceful (but unchanged) upload to get a new apache2-mpm-itk built from apache2 2.2.3-4+etch3 sources for etch r2. stable/main/binary-arm/apache2-mpm-itk_2.2.3-01-2_arm.deb apache2-mpm-itk (2.2.3-01-2) stable; urgency=low * Sourceful (but unchanged) upload to get a new apache2-mpm-itk built from apache2 2.2.3-4+etch3 sources for etch r2. stable/main/binary-hppa/apache2-mpm-itk_2.2.3-01-2_hppa.deb apache2-mpm-itk (2.2.3-01-2) stable; urgency=low * Sourceful (but unchanged) upload to get a new apache2-mpm-itk built from apache2 2.2.3-4+etch3 sources for etch r2. stable/main/source/apache2-mpm-itk_2.2.3-01-2.dsc stable/main/source/apache2-mpm-itk_2.2.3-01-2.diff.gz stable/main/binary-i386/apache2-mpm-itk_2.2.3-01-2_i386.deb apache2-mpm-itk (2.2.3-01-2) stable; urgency=low * Sourceful (but unchanged) upload to get a new apache2-mpm-itk built from apache2 2.2.3-4+etch3 sources for etch r2. stable/main/binary-ia64/apache2-mpm-itk_2.2.3-01-2_ia64.deb apache2-mpm-itk (2.2.3-01-2) stable; urgency=low * Sourceful (but unchanged) upload to get a new apache2-mpm-itk built from apache2 2.2.3-4+etch3 sources for etch r2. stable/main/binary-mips/apache2-mpm-itk_2.2.3-01-2_mips.deb apache2-mpm-itk (2.2.3-01-2) stable; urgency=low * Sourceful (but unchanged) upload to get a new apache2-mpm-itk built from apache2 2.2.3-4+etch3 sources for etch r2. stable/main/binary-mipsel/apache2-mpm-itk_2.2.3-01-2_mipsel.deb apache2-mpm-itk (2.2.3-01-2) stable; urgency=low * Sourceful (but unchanged) upload to get a new apache2-mpm-itk built from apache2 2.2.3-4+etch3 sources for etch r2. stable/main/binary-powerpc/apache2-mpm-itk_2.2.3-01-2_powerpc.deb apache2-mpm-itk (2.2.3-01-2) stable; urgency=low * Sourceful (but unchanged) upload to get a new apache2-mpm-itk built from apache2 2.2.3-4+etch3 sources for etch r2. stable/main/binary-s390/apache2-mpm-itk_2.2.3-01-2_s390.deb apache2-mpm-itk (2.2.3-01-2) stable; urgency=low * Sourceful (but unchanged) upload to get a new apache2-mpm-itk built from apache2 2.2.3-4+etch3 sources for etch r2. stable/main/binary-sparc/apache2-mpm-itk_2.2.3-01-2_sparc.deb apache2-mpm-itk (2.2.3-01-2) stable; urgency=low * Sourceful (but unchanged) upload to get a new apache2-mpm-itk built from apache2 2.2.3-4+etch3 sources for etch r2. stable/main/binary-alpha/asterisk-classic_1.2.13~dfsg-2etch2_alpha.deb stable/main/binary-alpha/asterisk-bristuff_1.2.13~dfsg-2etch2_alpha.deb stable/main/binary-alpha/asterisk-h323_1.2.13~dfsg-2etch2_alpha.deb asterisk (1:1.2.13~dfsg-2etch2) stable-security; urgency=high * cdr/cdr_pgsql.c: properly escape src and dst to avoid SQL injections (AST-2007-026). stable/main/binary-amd64/asterisk-classic_1.2.13~dfsg-2etch2_amd64.deb stable/main/binary-amd64/asterisk-bristuff_1.2.13~dfsg-2etch2_amd64.deb stable/main/binary-amd64/asterisk-h323_1.2.13~dfsg-2etch2_amd64.deb asterisk (1:1.2.13~dfsg-2etch2) stable-security; urgency=high * cdr/cdr_pgsql.c: properly escape src and dst to avoid SQL injections (AST-2007-026). stable/main/binary-arm/asterisk-classic_1.2.13~dfsg-2etch2_arm.deb stable/main/binary-arm/asterisk-bristuff_1.2.13~dfsg-2etch2_arm.deb stable/main/binary-arm/asterisk-h323_1.2.13~dfsg-2etch2_arm.deb asterisk (1:1.2.13~dfsg-2etch2) stable-security; urgency=high * cdr/cdr_pgsql.c: properly escape src and dst to avoid SQL injections (AST-2007-026). stable/main/binary-hppa/asterisk-classic_1.2.13~dfsg-2etch2_hppa.deb stable/main/binary-hppa/asterisk-bristuff_1.2.13~dfsg-2etch2_hppa.deb stable/main/binary-hppa/asterisk-h323_1.2.13~dfsg-2etch2_hppa.deb asterisk (1:1.2.13~dfsg-2etch2) stable-security; urgency=high * cdr/cdr_pgsql.c: properly escape src and dst to avoid SQL injections (AST-2007-026). stable/main/source/asterisk_1.2.13~dfsg-2etch2.dsc stable/main/source/asterisk_1.2.13~dfsg-2etch2.diff.gz stable/main/binary-all/asterisk_1.2.13~dfsg-2etch2_all.deb stable/main/binary-all/asterisk-doc_1.2.13~dfsg-2etch2_all.deb stable/main/binary-all/asterisk-dev_1.2.13~dfsg-2etch2_all.deb stable/main/binary-all/asterisk-sounds-main_1.2.13~dfsg-2etch2_all.deb stable/main/binary-all/asterisk-web-vmail_1.2.13~dfsg-2etch2_all.deb stable/main/binary-all/asterisk-config_1.2.13~dfsg-2etch2_all.deb stable/main/binary-i386/asterisk-classic_1.2.13~dfsg-2etch2_i386.deb stable/main/binary-i386/asterisk-bristuff_1.2.13~dfsg-2etch2_i386.deb stable/main/binary-i386/asterisk-h323_1.2.13~dfsg-2etch2_i386.deb asterisk (1:1.2.13~dfsg-2etch2) stable-security; urgency=high * cdr/cdr_pgsql.c: properly escape src and dst to avoid SQL injections (AST-2007-026). stable/main/binary-ia64/asterisk-classic_1.2.13~dfsg-2etch2_ia64.deb stable/main/binary-ia64/asterisk-bristuff_1.2.13~dfsg-2etch2_ia64.deb stable/main/binary-ia64/asterisk-h323_1.2.13~dfsg-2etch2_ia64.deb asterisk (1:1.2.13~dfsg-2etch2) stable-security; urgency=high * cdr/cdr_pgsql.c: properly escape src and dst to avoid SQL injections (AST-2007-026). stable/main/binary-mips/asterisk-classic_1.2.13~dfsg-2etch2_mips.deb stable/main/binary-mips/asterisk-bristuff_1.2.13~dfsg-2etch2_mips.deb stable/main/binary-mips/asterisk-h323_1.2.13~dfsg-2etch2_mips.deb asterisk (1:1.2.13~dfsg-2etch2) stable-security; urgency=high * cdr/cdr_pgsql.c: properly escape src and dst to avoid SQL injections (AST-2007-026). stable/main/binary-mipsel/asterisk-classic_1.2.13~dfsg-2etch2_mipsel.deb stable/main/binary-mipsel/asterisk-bristuff_1.2.13~dfsg-2etch2_mipsel.deb stable/main/binary-mipsel/asterisk-h323_1.2.13~dfsg-2etch2_mipsel.deb asterisk (1:1.2.13~dfsg-2etch2) stable-security; urgency=high * cdr/cdr_pgsql.c: properly escape src and dst to avoid SQL injections (AST-2007-026). stable/main/binary-powerpc/asterisk-classic_1.2.13~dfsg-2etch2_powerpc.deb stable/main/binary-powerpc/asterisk-bristuff_1.2.13~dfsg-2etch2_powerpc.deb stable/main/binary-powerpc/asterisk-h323_1.2.13~dfsg-2etch2_powerpc.deb asterisk (1:1.2.13~dfsg-2etch2) stable-security; urgency=high * cdr/cdr_pgsql.c: properly escape src and dst to avoid SQL injections (AST-2007-026). stable/main/binary-s390/asterisk-classic_1.2.13~dfsg-2etch2_s390.deb stable/main/binary-s390/asterisk-bristuff_1.2.13~dfsg-2etch2_s390.deb stable/main/binary-s390/asterisk-h323_1.2.13~dfsg-2etch2_s390.deb asterisk (1:1.2.13~dfsg-2etch2) stable-security; urgency=high * cdr/cdr_pgsql.c: properly escape src and dst to avoid SQL injections (AST-2007-026). stable/main/binary-sparc/asterisk-classic_1.2.13~dfsg-2etch2_sparc.deb stable/main/binary-sparc/asterisk-bristuff_1.2.13~dfsg-2etch2_sparc.deb stable/main/binary-sparc/asterisk-h323_1.2.13~dfsg-2etch2_sparc.deb asterisk (1:1.2.13~dfsg-2etch2) stable-security; urgency=high * cdr/cdr_pgsql.c: properly escape src and dst to avoid SQL injections (AST-2007-026). stable/main/binary-alpha/bind9_9.3.4-2etch1_alpha.deb stable/main/binary-alpha/bind9-host_9.3.4-2etch1_alpha.deb stable/main/binary-alpha/libbind-dev_9.3.4-2etch1_alpha.deb stable/main/binary-alpha/libbind9-0_9.3.4-2etch1_alpha.deb stable/main/binary-alpha/libdns22_9.3.4-2etch1_alpha.deb stable/main/binary-alpha/libisc11_9.3.4-2etch1_alpha.deb stable/main/binary-alpha/liblwres9_9.3.4-2etch1_alpha.deb stable/main/binary-alpha/libisccc0_9.3.4-2etch1_alpha.deb stable/main/binary-alpha/libisccfg1_9.3.4-2etch1_alpha.deb stable/main/binary-alpha/dnsutils_9.3.4-2etch1_alpha.deb stable/main/binary-alpha/lwresd_9.3.4-2etch1_alpha.deb bind9 (1:9.3.4-2etch1) stable-security; urgency=high * Fix DNS cache poisoning through predictable query IDs. (CVE-2007-2926) stable/main/binary-amd64/bind9_9.3.4-2etch1_amd64.deb stable/main/binary-amd64/bind9-host_9.3.4-2etch1_amd64.deb stable/main/binary-amd64/libbind-dev_9.3.4-2etch1_amd64.deb stable/main/binary-amd64/libbind9-0_9.3.4-2etch1_amd64.deb stable/main/binary-amd64/libdns22_9.3.4-2etch1_amd64.deb stable/main/binary-amd64/libisc11_9.3.4-2etch1_amd64.deb stable/main/binary-amd64/liblwres9_9.3.4-2etch1_amd64.deb stable/main/binary-amd64/libisccc0_9.3.4-2etch1_amd64.deb stable/main/binary-amd64/libisccfg1_9.3.4-2etch1_amd64.deb stable/main/binary-amd64/dnsutils_9.3.4-2etch1_amd64.deb stable/main/binary-amd64/lwresd_9.3.4-2etch1_amd64.deb bind9 (1:9.3.4-2etch1) stable-security; urgency=high * Fix DNS cache poisoning through predictable query IDs. (CVE-2007-2926) stable/main/binary-arm/bind9_9.3.4-2etch1_arm.deb stable/main/binary-arm/bind9-host_9.3.4-2etch1_arm.deb stable/main/binary-arm/libbind-dev_9.3.4-2etch1_arm.deb stable/main/binary-arm/libbind9-0_9.3.4-2etch1_arm.deb stable/main/binary-arm/libdns22_9.3.4-2etch1_arm.deb stable/main/binary-arm/libisc11_9.3.4-2etch1_arm.deb stable/main/binary-arm/liblwres9_9.3.4-2etch1_arm.deb stable/main/binary-arm/libisccc0_9.3.4-2etch1_arm.deb stable/main/binary-arm/libisccfg1_9.3.4-2etch1_arm.deb stable/main/binary-arm/dnsutils_9.3.4-2etch1_arm.deb stable/main/binary-arm/lwresd_9.3.4-2etch1_arm.deb bind9 (1:9.3.4-2etch1) stable-security; urgency=high * Fix DNS cache poisoning through predictable query IDs. (CVE-2007-2926) stable/main/binary-hppa/bind9_9.3.4-2etch1_hppa.deb stable/main/binary-hppa/bind9-host_9.3.4-2etch1_hppa.deb stable/main/binary-hppa/libbind-dev_9.3.4-2etch1_hppa.deb stable/main/binary-hppa/libbind9-0_9.3.4-2etch1_hppa.deb stable/main/binary-hppa/libdns22_9.3.4-2etch1_hppa.deb stable/main/binary-hppa/libisc11_9.3.4-2etch1_hppa.deb stable/main/binary-hppa/liblwres9_9.3.4-2etch1_hppa.deb stable/main/binary-hppa/libisccc0_9.3.4-2etch1_hppa.deb stable/main/binary-hppa/libisccfg1_9.3.4-2etch1_hppa.deb stable/main/binary-hppa/dnsutils_9.3.4-2etch1_hppa.deb stable/main/binary-hppa/lwresd_9.3.4-2etch1_hppa.deb bind9 (1:9.3.4-2etch1) stable-security; urgency=high * Fix DNS cache poisoning through predictable query IDs. (CVE-2007-2926) stable/main/source/bind9_9.3.4-2etch1.dsc stable/main/source/bind9_9.3.4.orig.tar.gz stable/main/source/bind9_9.3.4-2etch1.diff.gz stable/main/binary-all/bind9-doc_9.3.4-2etch1_all.deb stable/main/binary-i386/bind9_9.3.4-2etch1_i386.deb stable/main/binary-i386/bind9-host_9.3.4-2etch1_i386.deb stable/main/binary-i386/libbind-dev_9.3.4-2etch1_i386.deb stable/main/binary-i386/libbind9-0_9.3.4-2etch1_i386.deb stable/main/binary-i386/libdns22_9.3.4-2etch1_i386.deb stable/main/binary-i386/libisc11_9.3.4-2etch1_i386.deb stable/main/binary-i386/liblwres9_9.3.4-2etch1_i386.deb stable/main/binary-i386/libisccc0_9.3.4-2etch1_i386.deb stable/main/binary-i386/libisccfg1_9.3.4-2etch1_i386.deb stable/main/binary-i386/dnsutils_9.3.4-2etch1_i386.deb stable/main/binary-i386/lwresd_9.3.4-2etch1_i386.deb bind9 (1:9.3.4-2etch1) stable-security; urgency=high * Fix DNS cache poisoning through predictable query IDs. (CVE-2007-2926) stable/main/binary-ia64/bind9_9.3.4-2etch1_ia64.deb stable/main/binary-ia64/bind9-host_9.3.4-2etch1_ia64.deb stable/main/binary-ia64/libbind-dev_9.3.4-2etch1_ia64.deb stable/main/binary-ia64/libbind9-0_9.3.4-2etch1_ia64.deb stable/main/binary-ia64/libdns22_9.3.4-2etch1_ia64.deb stable/main/binary-ia64/libisc11_9.3.4-2etch1_ia64.deb stable/main/binary-ia64/liblwres9_9.3.4-2etch1_ia64.deb stable/main/binary-ia64/libisccc0_9.3.4-2etch1_ia64.deb stable/main/binary-ia64/libisccfg1_9.3.4-2etch1_ia64.deb stable/main/binary-ia64/dnsutils_9.3.4-2etch1_ia64.deb stable/main/binary-ia64/lwresd_9.3.4-2etch1_ia64.deb bind9 (1:9.3.4-2etch1) stable-security; urgency=high * Fix DNS cache poisoning through predictable query IDs. (CVE-2007-2926) stable/main/binary-mips/bind9_9.3.4-2etch1_mips.deb stable/main/binary-mips/bind9-host_9.3.4-2etch1_mips.deb stable/main/binary-mips/libbind-dev_9.3.4-2etch1_mips.deb stable/main/binary-mips/libbind9-0_9.3.4-2etch1_mips.deb stable/main/binary-mips/libdns22_9.3.4-2etch1_mips.deb stable/main/binary-mips/libisc11_9.3.4-2etch1_mips.deb stable/main/binary-mips/liblwres9_9.3.4-2etch1_mips.deb stable/main/binary-mips/libisccc0_9.3.4-2etch1_mips.deb stable/main/binary-mips/libisccfg1_9.3.4-2etch1_mips.deb stable/main/binary-mips/dnsutils_9.3.4-2etch1_mips.deb stable/main/binary-mips/lwresd_9.3.4-2etch1_mips.deb bind9 (1:9.3.4-2etch1) stable-security; urgency=high * Fix DNS cache poisoning through predictable query IDs. (CVE-2007-2926) stable/main/binary-mipsel/bind9_9.3.4-2etch1_mipsel.deb stable/main/binary-mipsel/bind9-host_9.3.4-2etch1_mipsel.deb stable/main/binary-mipsel/libbind-dev_9.3.4-2etch1_mipsel.deb stable/main/binary-mipsel/libbind9-0_9.3.4-2etch1_mipsel.deb stable/main/binary-mipsel/libdns22_9.3.4-2etch1_mipsel.deb stable/main/binary-mipsel/libisc11_9.3.4-2etch1_mipsel.deb stable/main/binary-mipsel/liblwres9_9.3.4-2etch1_mipsel.deb stable/main/binary-mipsel/libisccc0_9.3.4-2etch1_mipsel.deb stable/main/binary-mipsel/libisccfg1_9.3.4-2etch1_mipsel.deb stable/main/binary-mipsel/dnsutils_9.3.4-2etch1_mipsel.deb stable/main/binary-mipsel/lwresd_9.3.4-2etch1_mipsel.deb bind9 (1:9.3.4-2etch1) stable-security; urgency=high * Fix DNS cache poisoning through predictable query IDs. (CVE-2007-2926) stable/main/binary-powerpc/bind9_9.3.4-2etch1_powerpc.deb stable/main/binary-powerpc/bind9-host_9.3.4-2etch1_powerpc.deb stable/main/binary-powerpc/libbind-dev_9.3.4-2etch1_powerpc.deb stable/main/binary-powerpc/libbind9-0_9.3.4-2etch1_powerpc.deb stable/main/binary-powerpc/libdns22_9.3.4-2etch1_powerpc.deb stable/main/binary-powerpc/libisc11_9.3.4-2etch1_powerpc.deb stable/main/binary-powerpc/liblwres9_9.3.4-2etch1_powerpc.deb stable/main/binary-powerpc/libisccc0_9.3.4-2etch1_powerpc.deb stable/main/binary-powerpc/libisccfg1_9.3.4-2etch1_powerpc.deb stable/main/binary-powerpc/dnsutils_9.3.4-2etch1_powerpc.deb stable/main/binary-powerpc/lwresd_9.3.4-2etch1_powerpc.deb bind9 (1:9.3.4-2etch1) stable-security; urgency=high * Fix DNS cache poisoning through predictable query IDs. (CVE-2007-2926) stable/main/binary-s390/bind9_9.3.4-2etch1_s390.deb stable/main/binary-s390/bind9-host_9.3.4-2etch1_s390.deb stable/main/binary-s390/libbind-dev_9.3.4-2etch1_s390.deb stable/main/binary-s390/libbind9-0_9.3.4-2etch1_s390.deb stable/main/binary-s390/libdns22_9.3.4-2etch1_s390.deb stable/main/binary-s390/libisc11_9.3.4-2etch1_s390.deb stable/main/binary-s390/liblwres9_9.3.4-2etch1_s390.deb stable/main/binary-s390/libisccc0_9.3.4-2etch1_s390.deb stable/main/binary-s390/libisccfg1_9.3.4-2etch1_s390.deb stable/main/binary-s390/dnsutils_9.3.4-2etch1_s390.deb stable/main/binary-s390/lwresd_9.3.4-2etch1_s390.deb bind9 (1:9.3.4-2etch1) stable-security; urgency=high * Fix DNS cache poisoning through predictable query IDs. (CVE-2007-2926) stable/main/binary-sparc/bind9_9.3.4-2etch1_sparc.deb stable/main/binary-sparc/bind9-host_9.3.4-2etch1_sparc.deb stable/main/binary-sparc/libbind-dev_9.3.4-2etch1_sparc.deb stable/main/binary-sparc/libbind9-0_9.3.4-2etch1_sparc.deb stable/main/binary-sparc/libdns22_9.3.4-2etch1_sparc.deb stable/main/binary-sparc/libisc11_9.3.4-2etch1_sparc.deb stable/main/binary-sparc/liblwres9_9.3.4-2etch1_sparc.deb stable/main/binary-sparc/libisccc0_9.3.4-2etch1_sparc.deb stable/main/binary-sparc/libisccfg1_9.3.4-2etch1_sparc.deb stable/main/binary-sparc/dnsutils_9.3.4-2etch1_sparc.deb stable/main/binary-sparc/lwresd_9.3.4-2etch1_sparc.deb bind9 (1:9.3.4-2etch1) stable-security; urgency=high * Fix DNS cache poisoning through predictable query IDs. (CVE-2007-2926) stable/main/binary-alpha/bochs_2.3-2etch1_alpha.deb stable/main/binary-alpha/bochs-wx_2.3-2etch1_alpha.deb stable/main/binary-alpha/bochs-sdl_2.3-2etch1_alpha.deb stable/main/binary-alpha/bochs-term_2.3-2etch1_alpha.deb stable/main/binary-alpha/bochs-x_2.3-2etch1_alpha.deb stable/main/binary-alpha/bximage_2.3-2etch1_alpha.deb bochs (2.3-2etch1) stable-security; urgency=high * Fix heap buffer overflow in ne2k emulated driver. (Closes: #427144) CVE-2007-2893 - debian/patches/05_security_ne2k.patch: New file. stable/main/binary-amd64/bochs_2.3-2etch1_amd64.deb stable/main/binary-amd64/bochs-wx_2.3-2etch1_amd64.deb stable/main/binary-amd64/bochs-sdl_2.3-2etch1_amd64.deb stable/main/binary-amd64/bochs-term_2.3-2etch1_amd64.deb stable/main/binary-amd64/bochs-x_2.3-2etch1_amd64.deb stable/main/binary-amd64/bochs-svga_2.3-2etch1_amd64.deb stable/main/binary-amd64/bximage_2.3-2etch1_amd64.deb bochs (2.3-2etch1) stable-security; urgency=high * Fix heap buffer overflow in ne2k emulated driver. (Closes: #427144) CVE-2007-2893 - debian/patches/05_security_ne2k.patch: New file. stable/main/binary-arm/bochs_2.3-2etch1_arm.deb stable/main/binary-arm/bochs-wx_2.3-2etch1_arm.deb stable/main/binary-arm/bochs-sdl_2.3-2etch1_arm.deb stable/main/binary-arm/bochs-term_2.3-2etch1_arm.deb stable/main/binary-arm/bochs-x_2.3-2etch1_arm.deb stable/main/binary-arm/bximage_2.3-2etch1_arm.deb bochs (2.3-2etch1) stable-security; urgency=high * Fix heap buffer overflow in ne2k emulated driver. (Closes: #427144) CVE-2007-2893 - debian/patches/05_security_ne2k.patch: New file. stable/main/binary-hppa/bochs_2.3-2etch1_hppa.deb stable/main/binary-hppa/bochs-wx_2.3-2etch1_hppa.deb stable/main/binary-hppa/bochs-sdl_2.3-2etch1_hppa.deb stable/main/binary-hppa/bochs-term_2.3-2etch1_hppa.deb stable/main/binary-hppa/bochs-x_2.3-2etch1_hppa.deb stable/main/binary-hppa/bximage_2.3-2etch1_hppa.deb bochs (2.3-2etch1) stable-security; urgency=high * Fix heap buffer overflow in ne2k emulated driver. (Closes: #427144) CVE-2007-2893 - debian/patches/05_security_ne2k.patch: New file. stable/main/source/bochs_2.3-2etch1.dsc stable/main/source/bochs_2.3.orig.tar.gz stable/main/source/bochs_2.3-2etch1.diff.gz stable/main/binary-all/bochs-doc_2.3-2etch1_all.deb stable/main/binary-all/bochsbios_2.3-2etch1_all.deb stable/main/binary-i386/bochs_2.3-2etch1_i386.deb stable/main/binary-i386/bochs-wx_2.3-2etch1_i386.deb stable/main/binary-i386/bochs-sdl_2.3-2etch1_i386.deb stable/main/binary-i386/bochs-term_2.3-2etch1_i386.deb stable/main/binary-i386/bochs-x_2.3-2etch1_i386.deb stable/main/binary-i386/bochs-svga_2.3-2etch1_i386.deb stable/main/binary-i386/bximage_2.3-2etch1_i386.deb stable/main/binary-i386/sb16ctrl-bochs_2.3-2etch1_i386.deb bochs (2.3-2etch1) stable-security; urgency=high * Fix heap buffer overflow in ne2k emulated driver. (Closes: #427144) CVE-2007-2893 - debian/patches/05_security_ne2k.patch: New file. stable/main/binary-ia64/bochs_2.3-2etch1_ia64.deb stable/main/binary-ia64/bochs-wx_2.3-2etch1_ia64.deb stable/main/binary-ia64/bochs-sdl_2.3-2etch1_ia64.deb stable/main/binary-ia64/bochs-term_2.3-2etch1_ia64.deb stable/main/binary-ia64/bochs-x_2.3-2etch1_ia64.deb stable/main/binary-ia64/bximage_2.3-2etch1_ia64.deb bochs (2.3-2etch1) stable-security; urgency=high * Fix heap buffer overflow in ne2k emulated driver. (Closes: #427144) CVE-2007-2893 - debian/patches/05_security_ne2k.patch: New file. stable/main/binary-mips/bochs_2.3-2etch1_mips.deb stable/main/binary-mips/bochs-wx_2.3-2etch1_mips.deb stable/main/binary-mips/bochs-sdl_2.3-2etch1_mips.deb stable/main/binary-mips/bochs-term_2.3-2etch1_mips.deb stable/main/binary-mips/bochs-x_2.3-2etch1_mips.deb stable/main/binary-mips/bximage_2.3-2etch1_mips.deb bochs (2.3-2etch1) stable-security; urgency=high * Fix heap buffer overflow in ne2k emulated driver. (Closes: #427144) CVE-2007-2893 - debian/patches/05_security_ne2k.patch: New file. stable/main/binary-mipsel/bochs_2.3-2etch1_mipsel.deb stable/main/binary-mipsel/bochs-wx_2.3-2etch1_mipsel.deb stable/main/binary-mipsel/bochs-sdl_2.3-2etch1_mipsel.deb stable/main/binary-mipsel/bochs-term_2.3-2etch1_mipsel.deb stable/main/binary-mipsel/bochs-x_2.3-2etch1_mipsel.deb stable/main/binary-mipsel/bximage_2.3-2etch1_mipsel.deb bochs (2.3-2etch1) stable-security; urgency=high * Fix heap buffer overflow in ne2k emulated driver. (Closes: #427144) CVE-2007-2893 - debian/patches/05_security_ne2k.patch: New file. stable/main/binary-powerpc/bochs_2.3-2etch1_powerpc.deb stable/main/binary-powerpc/bochs-wx_2.3-2etch1_powerpc.deb stable/main/binary-powerpc/bochs-sdl_2.3-2etch1_powerpc.deb stable/main/binary-powerpc/bochs-term_2.3-2etch1_powerpc.deb stable/main/binary-powerpc/bochs-x_2.3-2etch1_powerpc.deb stable/main/binary-powerpc/bximage_2.3-2etch1_powerpc.deb bochs (2.3-2etch1) stable-security; urgency=high * Fix heap buffer overflow in ne2k emulated driver. (Closes: #427144) CVE-2007-2893 - debian/patches/05_security_ne2k.patch: New file. stable/main/binary-s390/bochs_2.3-2etch1_s390.deb stable/main/binary-s390/bochs-wx_2.3-2etch1_s390.deb stable/main/binary-s390/bochs-sdl_2.3-2etch1_s390.deb stable/main/binary-s390/bochs-term_2.3-2etch1_s390.deb stable/main/binary-s390/bochs-x_2.3-2etch1_s390.deb stable/main/binary-s390/bximage_2.3-2etch1_s390.deb bochs (2.3-2etch1) stable-security; urgency=high * Fix heap buffer overflow in ne2k emulated driver. (Closes: #427144) CVE-2007-2893 - debian/patches/05_security_ne2k.patch: New file. stable/main/binary-sparc/bochs_2.3-2etch1_sparc.deb stable/main/binary-sparc/bochs-wx_2.3-2etch1_sparc.deb stable/main/binary-sparc/bochs-sdl_2.3-2etch1_sparc.deb stable/main/binary-sparc/bochs-term_2.3-2etch1_sparc.deb stable/main/binary-sparc/bochs-x_2.3-2etch1_sparc.deb stable/main/binary-sparc/bximage_2.3-2etch1_sparc.deb bochs (2.3-2etch1) stable-security; urgency=high * Fix heap buffer overflow in ne2k emulated driver. (Closes: #427144) CVE-2007-2893 - debian/patches/05_security_ne2k.patch: New file. stable/main/binary-hppa/boson_0.12dfsg1-2+b1_hppa.deb stable/main/binary-hppa/boson-dbg_0.12dfsg1-2+b1_hppa.deb boson (0.12dfsg1-2+b1) stable; urgency=low * Binary-only non-maintainer upload for hppa; no source changes. * Rebuild against lib3ds-dev 1.2.0-4.1+etch1, to propagate the fix for bug #399761 stable/main/binary-s390/boson_0.12dfsg1-2+b2_s390.deb stable/main/binary-s390/boson-dbg_0.12dfsg1-2+b2_s390.deb boson (0.12dfsg1-2+b2) stable; urgency=low * Binary-only non-maintainer upload for s390; no source changes. * Rebuild against lib3ds-dev 1.2.0-4.1+etch1, to propagate the fix for bug #399761 stable/main/source/cacti_0.8.6i-3.2.dsc stable/main/source/cacti_0.8.6i.orig.tar.gz stable/main/source/cacti_0.8.6i-3.2.diff.gz stable/main/binary-all/cacti_0.8.6i-3.2_all.deb cacti (0.8.6i-3.2) stable-security; urgency=low * Rebuild to correct build error. stable/main/binary-alpha/cdebconf_0.114etch1_alpha.deb stable/main/binary-alpha/libdebconfclient0_0.114etch1_alpha.deb stable/main/binary-alpha/libdebconfclient0-dev_0.114etch1_alpha.deb stable/main/cdebconf-udeb_0.114etch1_alpha.udeb stable/main/libdebconfclient0-udeb_0.114etch1_alpha.udeb stable/main/cdebconf-newt-udeb_0.114etch1_alpha.udeb stable/main/cdebconf-text-udeb_0.114etch1_alpha.udeb stable/main/cdebconf-gtk-udeb_0.114etch1_alpha.udeb cdebconf (0.114etch1) stable; urgency=low [ Colin Watson ] * Fix off-by-one error reading from confmodule (thanks, Baruch Even; closes: #430108). * Fix a bunch of reference-counting bugs and other memory leaks. * Fix another (large!) memory leak: parsed RFC822 stanzas were never freed. stable/main/source/cdebconf_0.114etch1.dsc stable/main/source/cdebconf_0.114etch1.tar.gz stable/main/cdebconf-priority_0.114etch1_all.udeb stable/main/binary-amd64/cdebconf_0.114etch1_amd64.deb stable/main/binary-amd64/libdebconfclient0_0.114etch1_amd64.deb stable/main/binary-amd64/libdebconfclient0-dev_0.114etch1_amd64.deb stable/main/cdebconf-udeb_0.114etch1_amd64.udeb stable/main/libdebconfclient0-udeb_0.114etch1_amd64.udeb stable/main/cdebconf-newt-udeb_0.114etch1_amd64.udeb stable/main/cdebconf-text-udeb_0.114etch1_amd64.udeb stable/main/cdebconf-gtk-udeb_0.114etch1_amd64.udeb cdebconf (0.114etch1) stable; urgency=low [ Colin Watson ] * Fix off-by-one error reading from confmodule (thanks, Baruch Even; closes: #430108). * Fix a bunch of reference-counting bugs and other memory leaks. * Fix another (large!) memory leak: parsed RFC822 stanzas were never freed. stable/main/binary-arm/cdebconf_0.114etch1_arm.deb stable/main/binary-arm/libdebconfclient0_0.114etch1_arm.deb stable/main/binary-arm/libdebconfclient0-dev_0.114etch1_arm.deb stable/main/cdebconf-udeb_0.114etch1_arm.udeb stable/main/libdebconfclient0-udeb_0.114etch1_arm.udeb stable/main/cdebconf-newt-udeb_0.114etch1_arm.udeb stable/main/cdebconf-text-udeb_0.114etch1_arm.udeb stable/main/cdebconf-gtk-udeb_0.114etch1_arm.udeb cdebconf (0.114etch1) stable; urgency=low [ Colin Watson ] * Fix off-by-one error reading from confmodule (thanks, Baruch Even; closes: #430108). * Fix a bunch of reference-counting bugs and other memory leaks. * Fix another (large!) memory leak: parsed RFC822 stanzas were never freed. stable/main/binary-hppa/cdebconf_0.114etch1_hppa.deb stable/main/binary-hppa/libdebconfclient0_0.114etch1_hppa.deb stable/main/binary-hppa/libdebconfclient0-dev_0.114etch1_hppa.deb stable/main/cdebconf-udeb_0.114etch1_hppa.udeb stable/main/libdebconfclient0-udeb_0.114etch1_hppa.udeb stable/main/cdebconf-newt-udeb_0.114etch1_hppa.udeb stable/main/cdebconf-text-udeb_0.114etch1_hppa.udeb stable/main/cdebconf-gtk-udeb_0.114etch1_hppa.udeb cdebconf (0.114etch1) stable; urgency=low [ Colin Watson ] * Fix off-by-one error reading from confmodule (thanks, Baruch Even; closes: #430108). * Fix a bunch of reference-counting bugs and other memory leaks. * Fix another (large!) memory leak: parsed RFC822 stanzas were never freed. stable/main/binary-i386/cdebconf_0.114etch1_i386.deb stable/main/binary-i386/libdebconfclient0_0.114etch1_i386.deb stable/main/binary-i386/libdebconfclient0-dev_0.114etch1_i386.deb stable/main/cdebconf-udeb_0.114etch1_i386.udeb stable/main/libdebconfclient0-udeb_0.114etch1_i386.udeb stable/main/cdebconf-newt-udeb_0.114etch1_i386.udeb stable/main/cdebconf-text-udeb_0.114etch1_i386.udeb stable/main/cdebconf-gtk-udeb_0.114etch1_i386.udeb cdebconf (0.114etch1) stable; urgency=low [ Colin Watson ] * Fix off-by-one error reading from confmodule (thanks, Baruch Even; closes: #430108). * Fix a bunch of reference-counting bugs and other memory leaks. * Fix another (large!) memory leak: parsed RFC822 stanzas were never freed. stable/main/binary-ia64/cdebconf_0.114etch1_ia64.deb stable/main/binary-ia64/libdebconfclient0_0.114etch1_ia64.deb stable/main/binary-ia64/libdebconfclient0-dev_0.114etch1_ia64.deb stable/main/cdebconf-udeb_0.114etch1_ia64.udeb stable/main/libdebconfclient0-udeb_0.114etch1_ia64.udeb stable/main/cdebconf-newt-udeb_0.114etch1_ia64.udeb stable/main/cdebconf-text-udeb_0.114etch1_ia64.udeb stable/main/cdebconf-gtk-udeb_0.114etch1_ia64.udeb cdebconf (0.114etch1) stable; urgency=low [ Colin Watson ] * Fix off-by-one error reading from confmodule (thanks, Baruch Even; closes: #430108). * Fix a bunch of reference-counting bugs and other memory leaks. * Fix another (large!) memory leak: parsed RFC822 stanzas were never freed. stable/main/binary-mips/cdebconf_0.114etch1_mips.deb stable/main/binary-mips/libdebconfclient0_0.114etch1_mips.deb stable/main/binary-mips/libdebconfclient0-dev_0.114etch1_mips.deb stable/main/cdebconf-udeb_0.114etch1_mips.udeb stable/main/libdebconfclient0-udeb_0.114etch1_mips.udeb stable/main/cdebconf-newt-udeb_0.114etch1_mips.udeb stable/main/cdebconf-text-udeb_0.114etch1_mips.udeb stable/main/cdebconf-gtk-udeb_0.114etch1_mips.udeb cdebconf (0.114etch1) stable; urgency=low [ Colin Watson ] * Fix off-by-one error reading from confmodule (thanks, Baruch Even; closes: #430108). * Fix a bunch of reference-counting bugs and other memory leaks. * Fix another (large!) memory leak: parsed RFC822 stanzas were never freed. stable/main/binary-mipsel/cdebconf_0.114etch1_mipsel.deb stable/main/binary-mipsel/libdebconfclient0_0.114etch1_mipsel.deb stable/main/binary-mipsel/libdebconfclient0-dev_0.114etch1_mipsel.deb stable/main/cdebconf-udeb_0.114etch1_mipsel.udeb stable/main/libdebconfclient0-udeb_0.114etch1_mipsel.udeb stable/main/cdebconf-newt-udeb_0.114etch1_mipsel.udeb stable/main/cdebconf-text-udeb_0.114etch1_mipsel.udeb stable/main/cdebconf-gtk-udeb_0.114etch1_mipsel.udeb cdebconf (0.114etch1) stable; urgency=low [ Colin Watson ] * Fix off-by-one error reading from confmodule (thanks, Baruch Even; closes: #430108). * Fix a bunch of reference-counting bugs and other memory leaks. * Fix another (large!) memory leak: parsed RFC822 stanzas were never freed. stable/main/binary-powerpc/cdebconf_0.114etch1_powerpc.deb stable/main/binary-powerpc/libdebconfclient0_0.114etch1_powerpc.deb stable/main/binary-powerpc/libdebconfclient0-dev_0.114etch1_powerpc.deb stable/main/cdebconf-udeb_0.114etch1_powerpc.udeb stable/main/libdebconfclient0-udeb_0.114etch1_powerpc.udeb stable/main/cdebconf-newt-udeb_0.114etch1_powerpc.udeb stable/main/cdebconf-text-udeb_0.114etch1_powerpc.udeb stable/main/cdebconf-gtk-udeb_0.114etch1_powerpc.udeb cdebconf (0.114etch1) stable; urgency=low [ Colin Watson ] * Fix off-by-one error reading from confmodule (thanks, Baruch Even; closes: #430108). * Fix a bunch of reference-counting bugs and other memory leaks. * Fix another (large!) memory leak: parsed RFC822 stanzas were never freed. stable/main/binary-s390/cdebconf_0.114etch1_s390.deb stable/main/binary-s390/libdebconfclient0_0.114etch1_s390.deb stable/main/binary-s390/libdebconfclient0-dev_0.114etch1_s390.deb stable/main/cdebconf-udeb_0.114etch1_s390.udeb stable/main/libdebconfclient0-udeb_0.114etch1_s390.udeb stable/main/cdebconf-newt-udeb_0.114etch1_s390.udeb stable/main/cdebconf-text-udeb_0.114etch1_s390.udeb stable/main/cdebconf-gtk-udeb_0.114etch1_s390.udeb cdebconf (0.114etch1) stable; urgency=low [ Colin Watson ] * Fix off-by-one error reading from confmodule (thanks, Baruch Even; closes: #430108). * Fix a bunch of reference-counting bugs and other memory leaks. * Fix another (large!) memory leak: parsed RFC822 stanzas were never freed. stable/main/binary-sparc/cdebconf_0.114etch1_sparc.deb stable/main/binary-sparc/libdebconfclient0_0.114etch1_sparc.deb stable/main/binary-sparc/libdebconfclient0-dev_0.114etch1_sparc.deb stable/main/cdebconf-udeb_0.114etch1_sparc.udeb stable/main/libdebconfclient0-udeb_0.114etch1_sparc.udeb stable/main/cdebconf-newt-udeb_0.114etch1_sparc.udeb stable/main/cdebconf-text-udeb_0.114etch1_sparc.udeb stable/main/cdebconf-gtk-udeb_0.114etch1_sparc.udeb cdebconf (0.114etch1) stable; urgency=low [ Colin Watson ] * Fix off-by-one error reading from confmodule (thanks, Baruch Even; closes: #430108). * Fix a bunch of reference-counting bugs and other memory leaks. * Fix another (large!) memory leak: parsed RFC822 stanzas were never freed. stable/main/binary-alpha/centericq-common_4.21.0-18etch1_alpha.deb stable/main/binary-alpha/centericq_4.21.0-18etch1_alpha.deb stable/main/binary-alpha/centericq-utf8_4.21.0-18etch1_alpha.deb stable/main/binary-alpha/centericq-fribidi_4.21.0-18etch1_alpha.deb centericq (4.21.0-18etch1) stable-security; urgency=high * Non-maintainer upload by the security team * Backport upstream patch to fix buffer overflows, which can allow remote attackers to execute arbitrary code Fixes: CVE-2007-3713 stable/main/binary-amd64/centericq-common_4.21.0-18etch1_amd64.deb stable/main/binary-amd64/centericq_4.21.0-18etch1_amd64.deb stable/main/binary-amd64/centericq-utf8_4.21.0-18etch1_amd64.deb stable/main/binary-amd64/centericq-fribidi_4.21.0-18etch1_amd64.deb centericq (4.21.0-18etch1) stable-security; urgency=high * Non-maintainer upload by the security team * Backport upstream patch to fix buffer overflows, which can allow remote attackers to execute arbitrary code Fixes: CVE-2007-3713 stable/main/binary-arm/centericq-common_4.21.0-18etch1_arm.deb stable/main/binary-arm/centericq_4.21.0-18etch1_arm.deb stable/main/binary-arm/centericq-utf8_4.21.0-18etch1_arm.deb stable/main/binary-arm/centericq-fribidi_4.21.0-18etch1_arm.deb centericq (4.21.0-18etch1) stable-security; urgency=high * Non-maintainer upload by the security team * Backport upstream patch to fix buffer overflows, which can allow remote attackers to execute arbitrary code Fixes: CVE-2007-3713 stable/main/binary-hppa/centericq-common_4.21.0-18etch1_hppa.deb stable/main/binary-hppa/centericq_4.21.0-18etch1_hppa.deb stable/main/binary-hppa/centericq-utf8_4.21.0-18etch1_hppa.deb stable/main/binary-hppa/centericq-fribidi_4.21.0-18etch1_hppa.deb centericq (4.21.0-18etch1) stable-security; urgency=high * Non-maintainer upload by the security team * Backport upstream patch to fix buffer overflows, which can allow remote attackers to execute arbitrary code Fixes: CVE-2007-3713 stable/main/source/centericq_4.21.0-18etch1.dsc stable/main/source/centericq_4.21.0-18etch1.diff.gz stable/main/binary-i386/centericq-common_4.21.0-18etch1_i386.deb stable/main/binary-i386/centericq_4.21.0-18etch1_i386.deb stable/main/binary-i386/centericq-utf8_4.21.0-18etch1_i386.deb stable/main/binary-i386/centericq-fribidi_4.21.0-18etch1_i386.deb centericq (4.21.0-18etch1) stable-security; urgency=high * Non-maintainer upload by the security team * Backport upstream patch to fix buffer overflows, which can allow remote attackers to execute arbitrary code Fixes: CVE-2007-3713 stable/main/binary-ia64/centericq-common_4.21.0-18etch1_ia64.deb stable/main/binary-ia64/centericq_4.21.0-18etch1_ia64.deb stable/main/binary-ia64/centericq-utf8_4.21.0-18etch1_ia64.deb stable/main/binary-ia64/centericq-fribidi_4.21.0-18etch1_ia64.deb centericq (4.21.0-18etch1) stable-security; urgency=high * Non-maintainer upload by the security team * Backport upstream patch to fix buffer overflows, which can allow remote attackers to execute arbitrary code Fixes: CVE-2007-3713 stable/main/binary-mips/centericq-common_4.21.0-18etch1_mips.deb stable/main/binary-mips/centericq_4.21.0-18etch1_mips.deb stable/main/binary-mips/centericq-utf8_4.21.0-18etch1_mips.deb stable/main/binary-mips/centericq-fribidi_4.21.0-18etch1_mips.deb centericq (4.21.0-18etch1) stable-security; urgency=high * Non-maintainer upload by the security team * Backport upstream patch to fix buffer overflows, which can allow remote attackers to execute arbitrary code Fixes: CVE-2007-3713 stable/main/binary-mipsel/centericq-common_4.21.0-18etch1_mipsel.deb stable/main/binary-mipsel/centericq_4.21.0-18etch1_mipsel.deb stable/main/binary-mipsel/centericq-utf8_4.21.0-18etch1_mipsel.deb stable/main/binary-mipsel/centericq-fribidi_4.21.0-18etch1_mipsel.deb centericq (4.21.0-18etch1) stable-security; urgency=high * Non-maintainer upload by the security team * Backport upstream patch to fix buffer overflows, which can allow remote attackers to execute arbitrary code Fixes: CVE-2007-3713 stable/main/binary-powerpc/centericq-common_4.21.0-18etch1_powerpc.deb stable/main/binary-powerpc/centericq_4.21.0-18etch1_powerpc.deb stable/main/binary-powerpc/centericq-utf8_4.21.0-18etch1_powerpc.deb stable/main/binary-powerpc/centericq-fribidi_4.21.0-18etch1_powerpc.deb centericq (4.21.0-18etch1) stable-security; urgency=high * Non-maintainer upload by the security team * Backport upstream patch to fix buffer overflows, which can allow remote attackers to execute arbitrary code Fixes: CVE-2007-3713 stable/main/binary-s390/centericq-common_4.21.0-18etch1_s390.deb stable/main/binary-s390/centericq_4.21.0-18etch1_s390.deb stable/main/binary-s390/centericq-utf8_4.21.0-18etch1_s390.deb stable/main/binary-s390/centericq-fribidi_4.21.0-18etch1_s390.deb centericq (4.21.0-18etch1) stable-security; urgency=high * Non-maintainer upload by the security team * Backport upstream patch to fix buffer overflows, which can allow remote attackers to execute arbitrary code Fixes: CVE-2007-3713 stable/main/binary-sparc/centericq-common_4.21.0-18etch1_sparc.deb stable/main/binary-sparc/centericq_4.21.0-18etch1_sparc.deb stable/main/binary-sparc/centericq-utf8_4.21.0-18etch1_sparc.deb stable/main/binary-sparc/centericq-fribidi_4.21.0-18etch1_sparc.deb centericq (4.21.0-18etch1) stable-security; urgency=high * Non-maintainer upload by the security team * Backport upstream patch to fix buffer overflows, which can allow remote attackers to execute arbitrary code Fixes: CVE-2007-3713 stable/main/binary-alpha/libclamav2_0.90.1-3etch8_alpha.deb stable/main/binary-alpha/clamav_0.90.1-3etch8_alpha.deb stable/main/binary-alpha/clamav-daemon_0.90.1-3etch8_alpha.deb stable/main/binary-alpha/clamav-freshclam_0.90.1-3etch8_alpha.deb stable/main/binary-alpha/clamav-milter_0.90.1-3etch8_alpha.deb stable/main/binary-alpha/libclamav-dev_0.90.1-3etch8_alpha.deb stable/main/binary-alpha/clamav-dbg_0.90.1-3etch8_alpha.deb clamav (0.90.1-3etch8) stable-security; urgency=low * [CVE-2007-6336]: libclamav/mspack.c: Off-by-one error in LZX_READ_HUFFSYM * [CVE-2007-6335]: libclamav/pe.c: MEW PE File Integer Overflow stable/main/binary-amd64/libclamav2_0.90.1-3etch8_amd64.deb stable/main/binary-amd64/clamav_0.90.1-3etch8_amd64.deb stable/main/binary-amd64/clamav-daemon_0.90.1-3etch8_amd64.deb stable/main/binary-amd64/clamav-freshclam_0.90.1-3etch8_amd64.deb stable/main/binary-amd64/clamav-milter_0.90.1-3etch8_amd64.deb stable/main/binary-amd64/libclamav-dev_0.90.1-3etch8_amd64.deb stable/main/binary-amd64/clamav-dbg_0.90.1-3etch8_amd64.deb clamav (0.90.1-3etch8) stable-security; urgency=low * [CVE-2007-6336]: libclamav/mspack.c: Off-by-one error in LZX_READ_HUFFSYM * [CVE-2007-6335]: libclamav/pe.c: MEW PE File Integer Overflow stable/main/binary-arm/libclamav2_0.90.1-3etch8_arm.deb stable/main/binary-arm/clamav_0.90.1-3etch8_arm.deb stable/main/binary-arm/clamav-daemon_0.90.1-3etch8_arm.deb stable/main/binary-arm/clamav-freshclam_0.90.1-3etch8_arm.deb stable/main/binary-arm/clamav-milter_0.90.1-3etch8_arm.deb stable/main/binary-arm/libclamav-dev_0.90.1-3etch8_arm.deb stable/main/binary-arm/clamav-dbg_0.90.1-3etch8_arm.deb clamav (0.90.1-3etch8) stable-security; urgency=low * [CVE-2007-6336]: libclamav/mspack.c: Off-by-one error in LZX_READ_HUFFSYM * [CVE-2007-6335]: libclamav/pe.c: MEW PE File Integer Overflow stable/main/binary-hppa/libclamav2_0.90.1-3etch8_hppa.deb stable/main/binary-hppa/clamav_0.90.1-3etch8_hppa.deb stable/main/binary-hppa/clamav-daemon_0.90.1-3etch8_hppa.deb stable/main/binary-hppa/clamav-freshclam_0.90.1-3etch8_hppa.deb stable/main/binary-hppa/clamav-milter_0.90.1-3etch8_hppa.deb stable/main/binary-hppa/libclamav-dev_0.90.1-3etch8_hppa.deb stable/main/binary-hppa/clamav-dbg_0.90.1-3etch8_hppa.deb clamav (0.90.1-3etch8) stable-security; urgency=low * [CVE-2007-6336]: libclamav/mspack.c: Off-by-one error in LZX_READ_HUFFSYM * [CVE-2007-6335]: libclamav/pe.c: MEW PE File Integer Overflow stable/main/source/clamav_0.90.1-3etch8.dsc stable/main/source/clamav_0.90.1-3etch8.diff.gz stable/main/binary-all/clamav-base_0.90.1-3etch8_all.deb stable/main/binary-all/clamav-testfiles_0.90.1-3etch8_all.deb stable/main/binary-all/clamav-docs_0.90.1-3etch8_all.deb stable/main/binary-i386/libclamav2_0.90.1-3etch8_i386.deb stable/main/binary-i386/clamav_0.90.1-3etch8_i386.deb stable/main/binary-i386/clamav-daemon_0.90.1-3etch8_i386.deb stable/main/binary-i386/clamav-freshclam_0.90.1-3etch8_i386.deb stable/main/binary-i386/clamav-milter_0.90.1-3etch8_i386.deb stable/main/binary-i386/libclamav-dev_0.90.1-3etch8_i386.deb stable/main/binary-i386/clamav-dbg_0.90.1-3etch8_i386.deb clamav (0.90.1-3etch8) stable-security; urgency=low * [CVE-2007-6336]: libclamav/mspack.c: Off-by-one error in LZX_READ_HUFFSYM * [CVE-2007-6335]: libclamav/pe.c: MEW PE File Integer Overflow stable/main/binary-ia64/libclamav2_0.90.1-3etch8_ia64.deb stable/main/binary-ia64/clamav_0.90.1-3etch8_ia64.deb stable/main/binary-ia64/clamav-daemon_0.90.1-3etch8_ia64.deb stable/main/binary-ia64/clamav-freshclam_0.90.1-3etch8_ia64.deb stable/main/binary-ia64/clamav-milter_0.90.1-3etch8_ia64.deb stable/main/binary-ia64/libclamav-dev_0.90.1-3etch8_ia64.deb stable/main/binary-ia64/clamav-dbg_0.90.1-3etch8_ia64.deb clamav (0.90.1-3etch8) stable-security; urgency=low * [CVE-2007-6336]: libclamav/mspack.c: Off-by-one error in LZX_READ_HUFFSYM * [CVE-2007-6335]: libclamav/pe.c: MEW PE File Integer Overflow stable/main/binary-mips/libclamav2_0.90.1-3etch8_mips.deb stable/main/binary-mips/clamav_0.90.1-3etch8_mips.deb stable/main/binary-mips/clamav-daemon_0.90.1-3etch8_mips.deb stable/main/binary-mips/clamav-freshclam_0.90.1-3etch8_mips.deb stable/main/binary-mips/clamav-milter_0.90.1-3etch8_mips.deb stable/main/binary-mips/libclamav-dev_0.90.1-3etch8_mips.deb stable/main/binary-mips/clamav-dbg_0.90.1-3etch8_mips.deb clamav (0.90.1-3etch8) stable-security; urgency=low * [CVE-2007-6336]: libclamav/mspack.c: Off-by-one error in LZX_READ_HUFFSYM * [CVE-2007-6335]: libclamav/pe.c: MEW PE File Integer Overflow stable/main/binary-mipsel/libclamav2_0.90.1-3etch8_mipsel.deb stable/main/binary-mipsel/clamav_0.90.1-3etch8_mipsel.deb stable/main/binary-mipsel/clamav-daemon_0.90.1-3etch8_mipsel.deb stable/main/binary-mipsel/clamav-freshclam_0.90.1-3etch8_mipsel.deb stable/main/binary-mipsel/clamav-milter_0.90.1-3etch8_mipsel.deb stable/main/binary-mipsel/libclamav-dev_0.90.1-3etch8_mipsel.deb stable/main/binary-mipsel/clamav-dbg_0.90.1-3etch8_mipsel.deb clamav (0.90.1-3etch8) stable-security; urgency=low * [CVE-2007-6336]: libclamav/mspack.c: Off-by-one error in LZX_READ_HUFFSYM * [CVE-2007-6335]: libclamav/pe.c: MEW PE File Integer Overflow stable/main/binary-powerpc/libclamav2_0.90.1-3etch8_powerpc.deb stable/main/binary-powerpc/clamav_0.90.1-3etch8_powerpc.deb stable/main/binary-powerpc/clamav-daemon_0.90.1-3etch8_powerpc.deb stable/main/binary-powerpc/clamav-freshclam_0.90.1-3etch8_powerpc.deb stable/main/binary-powerpc/clamav-milter_0.90.1-3etch8_powerpc.deb stable/main/binary-powerpc/libclamav-dev_0.90.1-3etch8_powerpc.deb stable/main/binary-powerpc/clamav-dbg_0.90.1-3etch8_powerpc.deb clamav (0.90.1-3etch8) stable-security; urgency=low * [CVE-2007-6336]: libclamav/mspack.c: Off-by-one error in LZX_READ_HUFFSYM * [CVE-2007-6335]: libclamav/pe.c: MEW PE File Integer Overflow stable/main/binary-s390/libclamav2_0.90.1-3etch8_s390.deb stable/main/binary-s390/clamav_0.90.1-3etch8_s390.deb stable/main/binary-s390/clamav-daemon_0.90.1-3etch8_s390.deb stable/main/binary-s390/clamav-freshclam_0.90.1-3etch8_s390.deb stable/main/binary-s390/clamav-milter_0.90.1-3etch8_s390.deb stable/main/binary-s390/libclamav-dev_0.90.1-3etch8_s390.deb stable/main/binary-s390/clamav-dbg_0.90.1-3etch8_s390.deb clamav (0.90.1-3etch8) stable-security; urgency=low * [CVE-2007-6336]: libclamav/mspack.c: Off-by-one error in LZX_READ_HUFFSYM * [CVE-2007-6335]: libclamav/pe.c: MEW PE File Integer Overflow stable/main/binary-sparc/libclamav2_0.90.1-3etch8_sparc.deb stable/main/binary-sparc/clamav_0.90.1-3etch8_sparc.deb stable/main/binary-sparc/clamav-daemon_0.90.1-3etch8_sparc.deb stable/main/binary-sparc/clamav-freshclam_0.90.1-3etch8_sparc.deb stable/main/binary-sparc/clamav-milter_0.90.1-3etch8_sparc.deb stable/main/binary-sparc/libclamav-dev_0.90.1-3etch8_sparc.deb stable/main/binary-sparc/clamav-dbg_0.90.1-3etch8_sparc.deb clamav (0.90.1-3etch8) stable-security; urgency=low * [CVE-2007-6336]: libclamav/mspack.c: Off-by-one error in LZX_READ_HUFFSYM * [CVE-2007-6335]: libclamav/pe.c: MEW PE File Integer Overflow stable/main/binary-alpha/libcupsys2_1.2.7-4etch1_alpha.deb stable/main/binary-alpha/libcupsimage2_1.2.7-4etch1_alpha.deb stable/main/binary-alpha/cupsys_1.2.7-4etch1_alpha.deb stable/main/binary-alpha/cupsys-client_1.2.7-4etch1_alpha.deb stable/main/binary-alpha/libcupsys2-dev_1.2.7-4etch1_alpha.deb stable/main/binary-alpha/libcupsimage2-dev_1.2.7-4etch1_alpha.deb stable/main/binary-alpha/cupsys-bsd_1.2.7-4etch1_alpha.deb stable/main/binary-alpha/cupsys-dbg_1.2.7-4etch1_alpha.deb cupsys (1.2.7-4etch1) stable-security; urgency=high * Fix CVE 2007-4351 ippReadIO() could read past the end of a buffer. stable/main/binary-amd64/libcupsys2_1.2.7-4etch1_amd64.deb stable/main/binary-amd64/libcupsimage2_1.2.7-4etch1_amd64.deb stable/main/binary-amd64/cupsys_1.2.7-4etch1_amd64.deb stable/main/binary-amd64/cupsys-client_1.2.7-4etch1_amd64.deb stable/main/binary-amd64/libcupsys2-dev_1.2.7-4etch1_amd64.deb stable/main/binary-amd64/libcupsimage2-dev_1.2.7-4etch1_amd64.deb stable/main/binary-amd64/cupsys-bsd_1.2.7-4etch1_amd64.deb stable/main/binary-amd64/cupsys-dbg_1.2.7-4etch1_amd64.deb cupsys (1.2.7-4etch1) stable-security; urgency=high * Fix CVE 2007-4351 ippReadIO() could read past the end of a buffer. stable/main/binary-arm/libcupsys2_1.2.7-4etch1_arm.deb stable/main/binary-arm/libcupsimage2_1.2.7-4etch1_arm.deb stable/main/binary-arm/cupsys_1.2.7-4etch1_arm.deb stable/main/binary-arm/cupsys-client_1.2.7-4etch1_arm.deb stable/main/binary-arm/libcupsys2-dev_1.2.7-4etch1_arm.deb stable/main/binary-arm/libcupsimage2-dev_1.2.7-4etch1_arm.deb stable/main/binary-arm/cupsys-bsd_1.2.7-4etch1_arm.deb stable/main/binary-arm/cupsys-dbg_1.2.7-4etch1_arm.deb cupsys (1.2.7-4etch1) stable-security; urgency=high * Fix CVE 2007-4351 ippReadIO() could read past the end of a buffer. stable/main/binary-hppa/libcupsys2_1.2.7-4etch1_hppa.deb stable/main/binary-hppa/libcupsimage2_1.2.7-4etch1_hppa.deb stable/main/binary-hppa/cupsys_1.2.7-4etch1_hppa.deb stable/main/binary-hppa/cupsys-client_1.2.7-4etch1_hppa.deb stable/main/binary-hppa/libcupsys2-dev_1.2.7-4etch1_hppa.deb stable/main/binary-hppa/libcupsimage2-dev_1.2.7-4etch1_hppa.deb stable/main/binary-hppa/cupsys-bsd_1.2.7-4etch1_hppa.deb stable/main/binary-hppa/cupsys-dbg_1.2.7-4etch1_hppa.deb cupsys (1.2.7-4etch1) stable-security; urgency=high * Fix CVE 2007-4351 ippReadIO() could read past the end of a buffer. stable/main/source/cupsys_1.2.7-4etch1.dsc stable/main/source/cupsys_1.2.7.orig.tar.gz stable/main/source/cupsys_1.2.7-4etch1.diff.gz stable/main/binary-all/libcupsys2-gnutls10_1.2.7-4etch1_all.deb stable/main/binary-all/cupsys-common_1.2.7-4etch1_all.deb stable/main/binary-i386/libcupsys2_1.2.7-4etch1_i386.deb stable/main/binary-i386/libcupsimage2_1.2.7-4etch1_i386.deb stable/main/binary-i386/cupsys_1.2.7-4etch1_i386.deb stable/main/binary-i386/cupsys-client_1.2.7-4etch1_i386.deb stable/main/binary-i386/libcupsys2-dev_1.2.7-4etch1_i386.deb stable/main/binary-i386/libcupsimage2-dev_1.2.7-4etch1_i386.deb stable/main/binary-i386/cupsys-bsd_1.2.7-4etch1_i386.deb stable/main/binary-i386/cupsys-dbg_1.2.7-4etch1_i386.deb cupsys (1.2.7-4etch1) stable-security; urgency=high * Fix CVE 2007-4351 ippReadIO() could read past the end of a buffer. stable/main/binary-ia64/libcupsys2_1.2.7-4etch1_ia64.deb stable/main/binary-ia64/libcupsimage2_1.2.7-4etch1_ia64.deb stable/main/binary-ia64/cupsys_1.2.7-4etch1_ia64.deb stable/main/binary-ia64/cupsys-client_1.2.7-4etch1_ia64.deb stable/main/binary-ia64/libcupsys2-dev_1.2.7-4etch1_ia64.deb stable/main/binary-ia64/libcupsimage2-dev_1.2.7-4etch1_ia64.deb stable/main/binary-ia64/cupsys-bsd_1.2.7-4etch1_ia64.deb stable/main/binary-ia64/cupsys-dbg_1.2.7-4etch1_ia64.deb cupsys (1.2.7-4etch1) stable-security; urgency=high * Fix CVE 2007-4351 ippReadIO() could read past the end of a buffer. stable/main/binary-mips/libcupsys2_1.2.7-4etch1_mips.deb stable/main/binary-mips/libcupsimage2_1.2.7-4etch1_mips.deb stable/main/binary-mips/cupsys_1.2.7-4etch1_mips.deb stable/main/binary-mips/cupsys-client_1.2.7-4etch1_mips.deb stable/main/binary-mips/libcupsys2-dev_1.2.7-4etch1_mips.deb stable/main/binary-mips/libcupsimage2-dev_1.2.7-4etch1_mips.deb stable/main/binary-mips/cupsys-bsd_1.2.7-4etch1_mips.deb stable/main/binary-mips/cupsys-dbg_1.2.7-4etch1_mips.deb cupsys (1.2.7-4etch1) stable-security; urgency=high * Fix CVE 2007-4351 ippReadIO() could read past the end of a buffer. stable/main/binary-mipsel/libcupsys2_1.2.7-4etch1_mipsel.deb stable/main/binary-mipsel/libcupsimage2_1.2.7-4etch1_mipsel.deb stable/main/binary-mipsel/cupsys_1.2.7-4etch1_mipsel.deb stable/main/binary-mipsel/cupsys-client_1.2.7-4etch1_mipsel.deb stable/main/binary-mipsel/libcupsys2-dev_1.2.7-4etch1_mipsel.deb stable/main/binary-mipsel/libcupsimage2-dev_1.2.7-4etch1_mipsel.deb stable/main/binary-mipsel/cupsys-bsd_1.2.7-4etch1_mipsel.deb stable/main/binary-mipsel/cupsys-dbg_1.2.7-4etch1_mipsel.deb cupsys (1.2.7-4etch1) stable-security; urgency=high * Fix CVE 2007-4351 ippReadIO() could read past the end of a buffer. stable/main/binary-powerpc/libcupsys2_1.2.7-4etch1_powerpc.deb stable/main/binary-powerpc/libcupsimage2_1.2.7-4etch1_powerpc.deb stable/main/binary-powerpc/cupsys_1.2.7-4etch1_powerpc.deb stable/main/binary-powerpc/cupsys-client_1.2.7-4etch1_powerpc.deb stable/main/binary-powerpc/libcupsys2-dev_1.2.7-4etch1_powerpc.deb stable/main/binary-powerpc/libcupsimage2-dev_1.2.7-4etch1_powerpc.deb stable/main/binary-powerpc/cupsys-bsd_1.2.7-4etch1_powerpc.deb stable/main/binary-powerpc/cupsys-dbg_1.2.7-4etch1_powerpc.deb cupsys (1.2.7-4etch1) stable-security; urgency=high * Fix CVE 2007-4351 ippReadIO() could read past the end of a buffer. stable/main/binary-s390/libcupsys2_1.2.7-4etch1_s390.deb stable/main/binary-s390/libcupsimage2_1.2.7-4etch1_s390.deb stable/main/binary-s390/cupsys_1.2.7-4etch1_s390.deb stable/main/binary-s390/cupsys-client_1.2.7-4etch1_s390.deb stable/main/binary-s390/libcupsys2-dev_1.2.7-4etch1_s390.deb stable/main/binary-s390/libcupsimage2-dev_1.2.7-4etch1_s390.deb stable/main/binary-s390/cupsys-bsd_1.2.7-4etch1_s390.deb stable/main/binary-s390/cupsys-dbg_1.2.7-4etch1_s390.deb cupsys (1.2.7-4etch1) stable-security; urgency=high * Fix CVE 2007-4351 ippReadIO() could read past the end of a buffer. stable/main/binary-sparc/libcupsys2_1.2.7-4etch1_sparc.deb stable/main/binary-sparc/libcupsimage2_1.2.7-4etch1_sparc.deb stable/main/binary-sparc/cupsys_1.2.7-4etch1_sparc.deb stable/main/binary-sparc/cupsys-client_1.2.7-4etch1_sparc.deb stable/main/binary-sparc/libcupsys2-dev_1.2.7-4etch1_sparc.deb stable/main/binary-sparc/libcupsimage2-dev_1.2.7-4etch1_sparc.deb stable/main/binary-sparc/cupsys-bsd_1.2.7-4etch1_sparc.deb stable/main/binary-sparc/cupsys-dbg_1.2.7-4etch1_sparc.deb cupsys (1.2.7-4etch1) stable-security; urgency=high * Fix CVE 2007-4351 ippReadIO() could read past the end of a buffer. stable/main/binary-alpha/curl_7.15.5-1etch1_alpha.deb stable/main/binary-alpha/libcurl3_7.15.5-1etch1_alpha.deb stable/main/binary-alpha/libcurl3-gnutls_7.15.5-1etch1_alpha.deb stable/main/binary-alpha/libcurl3-openssl-dev_7.15.5-1etch1_alpha.deb stable/main/binary-alpha/libcurl3-gnutls-dev_7.15.5-1etch1_alpha.deb stable/main/binary-alpha/libcurl3-dbg_7.15.5-1etch1_alpha.deb curl (7.15.5-1etch1) stable-security; urgency=high * Applied security patch to make libcurl/GnuTLS properly reject some outdated or not yet valid server certificates. CVE-2007-3564. stable/main/binary-amd64/curl_7.15.5-1etch1_amd64.deb stable/main/binary-amd64/libcurl3_7.15.5-1etch1_amd64.deb stable/main/binary-amd64/libcurl3-gnutls_7.15.5-1etch1_amd64.deb stable/main/binary-amd64/libcurl3-openssl-dev_7.15.5-1etch1_amd64.deb stable/main/binary-amd64/libcurl3-gnutls-dev_7.15.5-1etch1_amd64.deb stable/main/binary-amd64/libcurl3-dbg_7.15.5-1etch1_amd64.deb curl (7.15.5-1etch1) stable-security; urgency=high * Applied security patch to make libcurl/GnuTLS properly reject some outdated or not yet valid server certificates. CVE-2007-3564. stable/main/binary-arm/curl_7.15.5-1etch1_arm.deb stable/main/binary-arm/libcurl3_7.15.5-1etch1_arm.deb stable/main/binary-arm/libcurl3-gnutls_7.15.5-1etch1_arm.deb stable/main/binary-arm/libcurl3-openssl-dev_7.15.5-1etch1_arm.deb stable/main/binary-arm/libcurl3-gnutls-dev_7.15.5-1etch1_arm.deb stable/main/binary-arm/libcurl3-dbg_7.15.5-1etch1_arm.deb curl (7.15.5-1etch1) stable-security; urgency=high * Applied security patch to make libcurl/GnuTLS properly reject some outdated or not yet valid server certificates. CVE-2007-3564. stable/main/binary-hppa/curl_7.15.5-1etch1_hppa.deb stable/main/binary-hppa/libcurl3_7.15.5-1etch1_hppa.deb stable/main/binary-hppa/libcurl3-gnutls_7.15.5-1etch1_hppa.deb stable/main/binary-hppa/libcurl3-openssl-dev_7.15.5-1etch1_hppa.deb stable/main/binary-hppa/libcurl3-gnutls-dev_7.15.5-1etch1_hppa.deb stable/main/binary-hppa/libcurl3-dbg_7.15.5-1etch1_hppa.deb curl (7.15.5-1etch1) stable-security; urgency=high * Applied security patch to make libcurl/GnuTLS properly reject some outdated or not yet valid server certificates. CVE-2007-3564. stable/main/source/curl_7.15.5-1etch1.dsc stable/main/source/curl_7.15.5.orig.tar.gz stable/main/source/curl_7.15.5-1etch1.diff.gz stable/main/binary-i386/curl_7.15.5-1etch1_i386.deb stable/main/binary-i386/libcurl3_7.15.5-1etch1_i386.deb stable/main/binary-i386/libcurl3-gnutls_7.15.5-1etch1_i386.deb stable/main/binary-i386/libcurl3-openssl-dev_7.15.5-1etch1_i386.deb stable/main/binary-i386/libcurl3-gnutls-dev_7.15.5-1etch1_i386.deb stable/main/binary-all/libcurl3-dev_7.15.5-1etch1_all.deb stable/main/binary-i386/libcurl3-dbg_7.15.5-1etch1_i386.deb curl (7.15.5-1etch1) stable-security; urgency=high * Applied security patch to make libcurl/GnuTLS properly reject some outdated or not yet valid server certificates. CVE-2007-3564. stable/main/binary-ia64/curl_7.15.5-1etch1_ia64.deb stable/main/binary-ia64/libcurl3_7.15.5-1etch1_ia64.deb stable/main/binary-ia64/libcurl3-gnutls_7.15.5-1etch1_ia64.deb stable/main/binary-ia64/libcurl3-openssl-dev_7.15.5-1etch1_ia64.deb stable/main/binary-ia64/libcurl3-gnutls-dev_7.15.5-1etch1_ia64.deb stable/main/binary-ia64/libcurl3-dbg_7.15.5-1etch1_ia64.deb curl (7.15.5-1etch1) stable-security; urgency=high * Applied security patch to make libcurl/GnuTLS properly reject some outdated or not yet valid server certificates. CVE-2007-3564. stable/main/binary-mips/curl_7.15.5-1etch1_mips.deb stable/main/binary-mips/libcurl3_7.15.5-1etch1_mips.deb stable/main/binary-mips/libcurl3-gnutls_7.15.5-1etch1_mips.deb stable/main/binary-mips/libcurl3-openssl-dev_7.15.5-1etch1_mips.deb stable/main/binary-mips/libcurl3-gnutls-dev_7.15.5-1etch1_mips.deb stable/main/binary-mips/libcurl3-dbg_7.15.5-1etch1_mips.deb curl (7.15.5-1etch1) stable-security; urgency=high * Applied security patch to make libcurl/GnuTLS properly reject some outdated or not yet valid server certificates. CVE-2007-3564. stable/main/binary-mipsel/curl_7.15.5-1etch1_mipsel.deb stable/main/binary-mipsel/libcurl3_7.15.5-1etch1_mipsel.deb stable/main/binary-mipsel/libcurl3-gnutls_7.15.5-1etch1_mipsel.deb stable/main/binary-mipsel/libcurl3-openssl-dev_7.15.5-1etch1_mipsel.deb stable/main/binary-mipsel/libcurl3-gnutls-dev_7.15.5-1etch1_mipsel.deb stable/main/binary-mipsel/libcurl3-dbg_7.15.5-1etch1_mipsel.deb curl (7.15.5-1etch1) stable-security; urgency=high * Applied security patch to make libcurl/GnuTLS properly reject some outdated or not yet valid server certificates. CVE-2007-3564. stable/main/binary-powerpc/curl_7.15.5-1etch1_powerpc.deb stable/main/binary-powerpc/libcurl3_7.15.5-1etch1_powerpc.deb stable/main/binary-powerpc/libcurl3-gnutls_7.15.5-1etch1_powerpc.deb stable/main/binary-powerpc/libcurl3-openssl-dev_7.15.5-1etch1_powerpc.deb stable/main/binary-powerpc/libcurl3-gnutls-dev_7.15.5-1etch1_powerpc.deb stable/main/binary-powerpc/libcurl3-dbg_7.15.5-1etch1_powerpc.deb curl (7.15.5-1etch1) stable-security; urgency=high * Applied security patch to make libcurl/GnuTLS properly reject some outdated or not yet valid server certificates. CVE-2007-3564. stable/main/binary-s390/curl_7.15.5-1etch1_s390.deb stable/main/binary-s390/libcurl3_7.15.5-1etch1_s390.deb stable/main/binary-s390/libcurl3-gnutls_7.15.5-1etch1_s390.deb stable/main/binary-s390/libcurl3-openssl-dev_7.15.5-1etch1_s390.deb stable/main/binary-s390/libcurl3-gnutls-dev_7.15.5-1etch1_s390.deb stable/main/binary-s390/libcurl3-dbg_7.15.5-1etch1_s390.deb curl (7.15.5-1etch1) stable-security; urgency=high * Applied security patch to make libcurl/GnuTLS properly reject some outdated or not yet valid server certificates. CVE-2007-3564. stable/main/binary-sparc/curl_7.15.5-1etch1_sparc.deb stable/main/binary-sparc/libcurl3_7.15.5-1etch1_sparc.deb stable/main/binary-sparc/libcurl3-gnutls_7.15.5-1etch1_sparc.deb stable/main/binary-sparc/libcurl3-openssl-dev_7.15.5-1etch1_sparc.deb stable/main/binary-sparc/libcurl3-gnutls-dev_7.15.5-1etch1_sparc.deb stable/main/binary-sparc/libcurl3-dbg_7.15.5-1etch1_sparc.deb curl (7.15.5-1etch1) stable-security; urgency=high * Applied security patch to make libcurl/GnuTLS properly reject some outdated or not yet valid server certificates. CVE-2007-3564. stable/main/source/debconf_1.5.11etch1.dsc stable/main/source/debconf_1.5.11etch1.tar.gz stable/main/binary-all/debconf_1.5.11etch1_all.deb stable/main/binary-all/debconf-i18n_1.5.11etch1_all.deb stable/main/binary-all/debconf-english_1.5.11etch1_all.deb stable/main/binary-all/debconf-doc_1.5.11etch1_all.deb stable/main/binary-all/debconf-utils_1.5.11etch1_all.deb debconf (1.5.11etch1) stable; urgency=low [ Colin Watson ] * Make sure that apt status commands and debconf protocol commands under debconf-apt-progress are properly interleaved. Closes: #425397 stable/main/binary-alpha/dhcp_2.0pl5-19.5etch2_alpha.deb stable/main/binary-alpha/dhcp-client_2.0pl5-19.5etch2_alpha.deb stable/main/binary-alpha/dhcp-relay_2.0pl5-19.5etch2_alpha.deb stable/main/dhcp-client-udeb_2.0pl5-19.5etch2_alpha.udeb dhcp (2.0pl5-19.5etch2) stable-security; urgency=high * Non-maintainer upload by the security team * The previous version's fix for CVE-2007-5365 was incomplete, so we update it based on https://bugzilla.redhat.com/show_bug.cgi?id=327781#c5 * Many thanks to Tomas Hoger of Red Hat for noticing this! stable/main/binary-amd64/dhcp_2.0pl5-19.5etch2_amd64.deb stable/main/binary-amd64/dhcp-client_2.0pl5-19.5etch2_amd64.deb stable/main/binary-amd64/dhcp-relay_2.0pl5-19.5etch2_amd64.deb stable/main/dhcp-client-udeb_2.0pl5-19.5etch2_amd64.udeb dhcp (2.0pl5-19.5etch2) stable-security; urgency=high * Non-maintainer upload by the security team * The previous version's fix for CVE-2007-5365 was incomplete, so we update it based on https://bugzilla.redhat.com/show_bug.cgi?id=327781#c5 * Many thanks to Tomas Hoger of Red Hat for noticing this! stable/main/binary-arm/dhcp_2.0pl5-19.5etch2_arm.deb stable/main/binary-arm/dhcp-client_2.0pl5-19.5etch2_arm.deb stable/main/binary-arm/dhcp-relay_2.0pl5-19.5etch2_arm.deb stable/main/dhcp-client-udeb_2.0pl5-19.5etch2_arm.udeb dhcp (2.0pl5-19.5etch2) stable-security; urgency=high * Non-maintainer upload by the security team * The previous version's fix for CVE-2007-5365 was incomplete, so we update it based on https://bugzilla.redhat.com/show_bug.cgi?id=327781#c5 * Many thanks to Tomas Hoger of Red Hat for noticing this! stable/main/binary-hppa/dhcp_2.0pl5-19.5etch2_hppa.deb stable/main/binary-hppa/dhcp-client_2.0pl5-19.5etch2_hppa.deb stable/main/binary-hppa/dhcp-relay_2.0pl5-19.5etch2_hppa.deb stable/main/dhcp-client-udeb_2.0pl5-19.5etch2_hppa.udeb dhcp (2.0pl5-19.5etch2) stable-security; urgency=high * Non-maintainer upload by the security team * The previous version's fix for CVE-2007-5365 was incomplete, so we update it based on https://bugzilla.redhat.com/show_bug.cgi?id=327781#c5 * Many thanks to Tomas Hoger of Red Hat for noticing this! stable/main/source/dhcp_2.0pl5-19.5etch2.dsc stable/main/source/dhcp_2.0pl5-19.5etch2.diff.gz stable/main/binary-i386/dhcp_2.0pl5-19.5etch2_i386.deb stable/main/binary-i386/dhcp-client_2.0pl5-19.5etch2_i386.deb stable/main/binary-i386/dhcp-relay_2.0pl5-19.5etch2_i386.deb stable/main/dhcp-client-udeb_2.0pl5-19.5etch2_i386.udeb dhcp (2.0pl5-19.5etch2) stable-security; urgency=high * Non-maintainer upload by the security team * The previous version's fix for CVE-2007-5365 was incomplete, so we update it based on https://bugzilla.redhat.com/show_bug.cgi?id=327781#c5 * Many thanks to Tomas Hoger of Red Hat for noticing this! stable/main/binary-ia64/dhcp_2.0pl5-19.5etch2_ia64.deb stable/main/binary-ia64/dhcp-client_2.0pl5-19.5etch2_ia64.deb stable/main/binary-ia64/dhcp-relay_2.0pl5-19.5etch2_ia64.deb stable/main/dhcp-client-udeb_2.0pl5-19.5etch2_ia64.udeb dhcp (2.0pl5-19.5etch2) stable-security; urgency=high * Non-maintainer upload by the security team * The previous version's fix for CVE-2007-5365 was incomplete, so we update it based on https://bugzilla.redhat.com/show_bug.cgi?id=327781#c5 * Many thanks to Tomas Hoger of Red Hat for noticing this! stable/main/binary-mips/dhcp_2.0pl5-19.5etch2_mips.deb stable/main/binary-mips/dhcp-client_2.0pl5-19.5etch2_mips.deb stable/main/binary-mips/dhcp-relay_2.0pl5-19.5etch2_mips.deb stable/main/dhcp-client-udeb_2.0pl5-19.5etch2_mips.udeb dhcp (2.0pl5-19.5etch2) stable-security; urgency=high * Non-maintainer upload by the security team * The previous version's fix for CVE-2007-5365 was incomplete, so we update it based on https://bugzilla.redhat.com/show_bug.cgi?id=327781#c5 * Many thanks to Tomas Hoger of Red Hat for noticing this! stable/main/binary-mipsel/dhcp_2.0pl5-19.5etch2_mipsel.deb stable/main/binary-mipsel/dhcp-client_2.0pl5-19.5etch2_mipsel.deb stable/main/binary-mipsel/dhcp-relay_2.0pl5-19.5etch2_mipsel.deb stable/main/dhcp-client-udeb_2.0pl5-19.5etch2_mipsel.udeb dhcp (2.0pl5-19.5etch2) stable-security; urgency=high * Non-maintainer upload by the security team * The previous version's fix for CVE-2007-5365 was incomplete, so we update it based on https://bugzilla.redhat.com/show_bug.cgi?id=327781#c5 * Many thanks to Tomas Hoger of Red Hat for noticing this! stable/main/binary-powerpc/dhcp_2.0pl5-19.5etch2_powerpc.deb stable/main/binary-powerpc/dhcp-client_2.0pl5-19.5etch2_powerpc.deb stable/main/binary-powerpc/dhcp-relay_2.0pl5-19.5etch2_powerpc.deb stable/main/dhcp-client-udeb_2.0pl5-19.5etch2_powerpc.udeb dhcp (2.0pl5-19.5etch2) stable-security; urgency=high * Non-maintainer upload by the security team * The previous version's fix for CVE-2007-5365 was incomplete, so we update it based on https://bugzilla.redhat.com/show_bug.cgi?id=327781#c5 * Many thanks to Tomas Hoger of Red Hat for noticing this! stable/main/binary-s390/dhcp_2.0pl5-19.5etch2_s390.deb stable/main/binary-s390/dhcp-client_2.0pl5-19.5etch2_s390.deb stable/main/binary-s390/dhcp-relay_2.0pl5-19.5etch2_s390.deb stable/main/dhcp-client-udeb_2.0pl5-19.5etch2_s390.udeb dhcp (2.0pl5-19.5etch2) stable-security; urgency=high * Non-maintainer upload by the security team * The previous version's fix for CVE-2007-5365 was incomplete, so we update it based on https://bugzilla.redhat.com/show_bug.cgi?id=327781#c5 * Many thanks to Tomas Hoger of Red Hat for noticing this! stable/main/binary-sparc/dhcp_2.0pl5-19.5etch2_sparc.deb stable/main/binary-sparc/dhcp-client_2.0pl5-19.5etch2_sparc.deb stable/main/binary-sparc/dhcp-relay_2.0pl5-19.5etch2_sparc.deb stable/main/dhcp-client-udeb_2.0pl5-19.5etch2_sparc.udeb dhcp (2.0pl5-19.5etch2) stable-security; urgency=high * Non-maintainer upload by the security team * The previous version's fix for CVE-2007-5365 was incomplete, so we update it based on https://bugzilla.redhat.com/show_bug.cgi?id=327781#c5 * Many thanks to Tomas Hoger of Red Hat for noticing this! stable/contrib/source/dosemu-freedos_0.0.b9r5a+etch.1-0etch1.dsc stable/contrib/source/dosemu-freedos_0.0.b9r5a+etch.1.orig.tar.gz stable/contrib/source/dosemu-freedos_0.0.b9r5a+etch.1-0etch1.diff.gz stable/contrib/binary-i386/dosemu-freedos_0.0.b9r5a+etch.1-0etch1_i386.deb dosemu-freedos (1:0.0.b9r5a+etch.1-0etch1) stable; urgency=low * Removed rerror. Closes: #442208. stable/main/binary-alpha/dovecot-common_1.0.rc15-2etch1_alpha.deb stable/main/binary-alpha/dovecot-imapd_1.0.rc15-2etch1_alpha.deb stable/main/binary-alpha/dovecot-pop3d_1.0.rc15-2etch1_alpha.deb dovecot (1.0.rc15-2etch1) stable-security; urgency=high * Non-maintainer upload by The Security Team. * Fix a potential directory traversal when using gzipped mailboxes. [CVE-2007-2231] stable/main/source/dovecot_1.0.rc15-2etch1.dsc stable/main/source/dovecot_1.0.rc15.orig.tar.gz stable/main/source/dovecot_1.0.rc15-2etch1.diff.gz stable/main/binary-amd64/dovecot-common_1.0.rc15-2etch1_amd64.deb stable/main/binary-amd64/dovecot-imapd_1.0.rc15-2etch1_amd64.deb stable/main/binary-amd64/dovecot-pop3d_1.0.rc15-2etch1_amd64.deb dovecot (1.0.rc15-2etch1) stable-security; urgency=high * Non-maintainer upload by The Security Team. * Fix a potential directory traversal when using gzipped mailboxes. [CVE-2007-2231] stable/main/binary-arm/dovecot-common_1.0.rc15-2etch1_arm.deb stable/main/binary-arm/dovecot-imapd_1.0.rc15-2etch1_arm.deb stable/main/binary-arm/dovecot-pop3d_1.0.rc15-2etch1_arm.deb dovecot (1.0.rc15-2etch1) stable-security; urgency=high * Non-maintainer upload by The Security Team. * Fix a potential directory traversal when using gzipped mailboxes. [CVE-2007-2231] stable/main/binary-hppa/dovecot-common_1.0.rc15-2etch1_hppa.deb stable/main/binary-hppa/dovecot-imapd_1.0.rc15-2etch1_hppa.deb stable/main/binary-hppa/dovecot-pop3d_1.0.rc15-2etch1_hppa.deb dovecot (1.0.rc15-2etch1) stable-security; urgency=high * Non-maintainer upload by The Security Team. * Fix a potential directory traversal when using gzipped mailboxes. [CVE-2007-2231] stable/main/binary-i386/dovecot-common_1.0.rc15-2etch1_i386.deb stable/main/binary-i386/dovecot-imapd_1.0.rc15-2etch1_i386.deb stable/main/binary-i386/dovecot-pop3d_1.0.rc15-2etch1_i386.deb dovecot (1.0.rc15-2etch1) stable-security; urgency=high * Non-maintainer upload by The Security Team. * Fix a potential directory traversal when using gzipped mailboxes. [CVE-2007-2231] stable/main/binary-ia64/dovecot-common_1.0.rc15-2etch1_ia64.deb stable/main/binary-ia64/dovecot-imapd_1.0.rc15-2etch1_ia64.deb stable/main/binary-ia64/dovecot-pop3d_1.0.rc15-2etch1_ia64.deb dovecot (1.0.rc15-2etch1) stable-security; urgency=high * Non-maintainer upload by The Security Team. * Fix a potential directory traversal when using gzipped mailboxes. [CVE-2007-2231] stable/main/binary-mips/dovecot-common_1.0.rc15-2etch1_mips.deb stable/main/binary-mips/dovecot-imapd_1.0.rc15-2etch1_mips.deb stable/main/binary-mips/dovecot-pop3d_1.0.rc15-2etch1_mips.deb dovecot (1.0.rc15-2etch1) stable-security; urgency=high * Non-maintainer upload by The Security Team. * Fix a potential directory traversal when using gzipped mailboxes. [CVE-2007-2231] stable/main/binary-mipsel/dovecot-common_1.0.rc15-2etch1_mipsel.deb stable/main/binary-mipsel/dovecot-imapd_1.0.rc15-2etch1_mipsel.deb stable/main/binary-mipsel/dovecot-pop3d_1.0.rc15-2etch1_mipsel.deb dovecot (1.0.rc15-2etch1) stable-security; urgency=high * Non-maintainer upload by The Security Team. * Fix a potential directory traversal when using gzipped mailboxes. [CVE-2007-2231] stable/main/binary-powerpc/dovecot-common_1.0.rc15-2etch1_powerpc.deb stable/main/binary-powerpc/dovecot-imapd_1.0.rc15-2etch1_powerpc.deb stable/main/binary-powerpc/dovecot-pop3d_1.0.rc15-2etch1_powerpc.deb dovecot (1.0.rc15-2etch1) stable-security; urgency=high * Non-maintainer upload by The Security Team. * Fix a potential directory traversal when using gzipped mailboxes. [CVE-2007-2231] stable/main/binary-s390/dovecot-common_1.0.rc15-2etch1_s390.deb stable/main/binary-s390/dovecot-imapd_1.0.rc15-2etch1_s390.deb stable/main/binary-s390/dovecot-pop3d_1.0.rc15-2etch1_s390.deb dovecot (1.0.rc15-2etch1) stable-security; urgency=high * Non-maintainer upload by The Security Team. * Fix a potential directory traversal when using gzipped mailboxes. [CVE-2007-2231] stable/main/binary-sparc/dovecot-common_1.0.rc15-2etch1_sparc.deb stable/main/binary-sparc/dovecot-imapd_1.0.rc15-2etch1_sparc.deb stable/main/binary-sparc/dovecot-pop3d_1.0.rc15-2etch1_sparc.deb dovecot (1.0.rc15-2etch1) stable-security; urgency=high * Non-maintainer upload by The Security Team. * Fix a potential directory traversal when using gzipped mailboxes. [CVE-2007-2231] stable/main/binary-alpha/e2fsck-static_1.39+1.40-WIP-2006.11.14+dfsg-2etch1_alpha.deb stable/main/binary-alpha/libcomerr2_1.39+1.40-WIP-2006.11.14+dfsg-2etch1_alpha.deb stable/main/binary-alpha/libss2_1.39+1.40-WIP-2006.11.14+dfsg-2etch1_alpha.deb stable/main/binary-alpha/libuuid1_1.39+1.40-WIP-2006.11.14+dfsg-2etch1_alpha.deb stable/main/binary-alpha/libblkid1_1.39+1.40-WIP-2006.11.14+dfsg-2etch1_alpha.deb stable/main/binary-alpha/libblkid-dev_1.39+1.40-WIP-2006.11.14+dfsg-2etch1_alpha.deb stable/main/binary-alpha/e2fslibs_1.39+1.40-WIP-2006.11.14+dfsg-2etch1_alpha.deb stable/main/binary-alpha/e2fslibs-dev_1.39+1.40-WIP-2006.11.14+dfsg-2etch1_alpha.deb stable/main/binary-alpha/e2fsprogs_1.39+1.40-WIP-2006.11.14+dfsg-2etch1_alpha.deb stable/main/binary-alpha/comerr-dev_2.1-1.39+1.40-WIP-2006.11.14+dfsg-2etch1_alpha.deb stable/main/binary-alpha/ss-dev_2.0-1.39+1.40-WIP-2006.11.14+dfsg-2etch1_alpha.deb stable/main/binary-alpha/uuid-dev_1.2-1.39+1.40-WIP-2006.11.14+dfsg-2etch1_alpha.deb stable/main/e2fsprogs-udeb_1.39+1.40-WIP-2006.11.14+dfsg-2etch1_alpha.udeb stable/main/libblkid1-udeb_1.39+1.40-WIP-2006.11.14+dfsg-2etch1_alpha.udeb stable/main/libuuid1-udeb_1.39+1.40-WIP-2006.11.14+dfsg-2etch1_alpha.udeb e2fsprogs (1.39+1.40-WIP-2006.11.14+dfsg-2etch1) stable-security; urgency=high * Non-maintainer upload by The Security Team. * Fix multiple integer overflows based on sizes contained with the filesystem image. [CVE-2007-5497] stable/main/source/e2fsprogs_1.39+1.40-WIP-2006.11.14+dfsg-2etch1.dsc stable/main/source/e2fsprogs_1.39+1.40-WIP-2006.11.14+dfsg.orig.tar.gz stable/main/source/e2fsprogs_1.39+1.40-WIP-2006.11.14+dfsg-2etch1.diff.gz stable/main/binary-amd64/e2fsck-static_1.39+1.40-WIP-2006.11.14+dfsg-2etch1_amd64.deb stable/main/binary-amd64/libcomerr2_1.39+1.40-WIP-2006.11.14+dfsg-2etch1_amd64.deb stable/main/binary-amd64/libss2_1.39+1.40-WIP-2006.11.14+dfsg-2etch1_amd64.deb stable/main/binary-amd64/libuuid1_1.39+1.40-WIP-2006.11.14+dfsg-2etch1_amd64.deb stable/main/binary-amd64/libblkid1_1.39+1.40-WIP-2006.11.14+dfsg-2etch1_amd64.deb stable/main/binary-amd64/libblkid-dev_1.39+1.40-WIP-2006.11.14+dfsg-2etch1_amd64.deb stable/main/binary-amd64/e2fslibs_1.39+1.40-WIP-2006.11.14+dfsg-2etch1_amd64.deb stable/main/binary-amd64/e2fslibs-dev_1.39+1.40-WIP-2006.11.14+dfsg-2etch1_amd64.deb stable/main/binary-amd64/e2fsprogs_1.39+1.40-WIP-2006.11.14+dfsg-2etch1_amd64.deb stable/main/binary-amd64/comerr-dev_2.1-1.39+1.40-WIP-2006.11.14+dfsg-2etch1_amd64.deb stable/main/binary-amd64/ss-dev_2.0-1.39+1.40-WIP-2006.11.14+dfsg-2etch1_amd64.deb stable/main/binary-amd64/uuid-dev_1.2-1.39+1.40-WIP-2006.11.14+dfsg-2etch1_amd64.deb stable/main/e2fsprogs-udeb_1.39+1.40-WIP-2006.11.14+dfsg-2etch1_amd64.udeb stable/main/libblkid1-udeb_1.39+1.40-WIP-2006.11.14+dfsg-2etch1_amd64.udeb stable/main/libuuid1-udeb_1.39+1.40-WIP-2006.11.14+dfsg-2etch1_amd64.udeb e2fsprogs (1.39+1.40-WIP-2006.11.14+dfsg-2etch1) stable-security; urgency=high * Non-maintainer upload by The Security Team. * Fix multiple integer overflows based on sizes contained with the filesystem image. [CVE-2007-5497] stable/main/binary-arm/e2fsck-static_1.39+1.40-WIP-2006.11.14+dfsg-2etch1_arm.deb stable/main/binary-arm/libcomerr2_1.39+1.40-WIP-2006.11.14+dfsg-2etch1_arm.deb stable/main/binary-arm/libss2_1.39+1.40-WIP-2006.11.14+dfsg-2etch1_arm.deb stable/main/binary-arm/libuuid1_1.39+1.40-WIP-2006.11.14+dfsg-2etch1_arm.deb stable/main/binary-arm/libblkid1_1.39+1.40-WIP-2006.11.14+dfsg-2etch1_arm.deb stable/main/binary-arm/libblkid-dev_1.39+1.40-WIP-2006.11.14+dfsg-2etch1_arm.deb stable/main/binary-arm/e2fslibs_1.39+1.40-WIP-2006.11.14+dfsg-2etch1_arm.deb stable/main/binary-arm/e2fslibs-dev_1.39+1.40-WIP-2006.11.14+dfsg-2etch1_arm.deb stable/main/binary-arm/e2fsprogs_1.39+1.40-WIP-2006.11.14+dfsg-2etch1_arm.deb stable/main/binary-arm/comerr-dev_2.1-1.39+1.40-WIP-2006.11.14+dfsg-2etch1_arm.deb stable/main/binary-arm/ss-dev_2.0-1.39+1.40-WIP-2006.11.14+dfsg-2etch1_arm.deb stable/main/binary-arm/uuid-dev_1.2-1.39+1.40-WIP-2006.11.14+dfsg-2etch1_arm.deb stable/main/e2fsprogs-udeb_1.39+1.40-WIP-2006.11.14+dfsg-2etch1_arm.udeb stable/main/libblkid1-udeb_1.39+1.40-WIP-2006.11.14+dfsg-2etch1_arm.udeb stable/main/libuuid1-udeb_1.39+1.40-WIP-2006.11.14+dfsg-2etch1_arm.udeb e2fsprogs (1.39+1.40-WIP-2006.11.14+dfsg-2etch1) stable-security; urgency=high * Non-maintainer upload by The Security Team. * Fix multiple integer overflows based on sizes contained with the filesystem image. [CVE-2007-5497] stable/main/binary-hppa/e2fsck-static_1.39+1.40-WIP-2006.11.14+dfsg-2etch1_hppa.deb stable/main/binary-hppa/libcomerr2_1.39+1.40-WIP-2006.11.14+dfsg-2etch1_hppa.deb stable/main/binary-hppa/libss2_1.39+1.40-WIP-2006.11.14+dfsg-2etch1_hppa.deb stable/main/binary-hppa/libuuid1_1.39+1.40-WIP-2006.11.14+dfsg-2etch1_hppa.deb stable/main/binary-hppa/libblkid1_1.39+1.40-WIP-2006.11.14+dfsg-2etch1_hppa.deb stable/main/binary-hppa/libblkid-dev_1.39+1.40-WIP-2006.11.14+dfsg-2etch1_hppa.deb stable/main/binary-hppa/e2fslibs_1.39+1.40-WIP-2006.11.14+dfsg-2etch1_hppa.deb stable/main/binary-hppa/e2fslibs-dev_1.39+1.40-WIP-2006.11.14+dfsg-2etch1_hppa.deb stable/main/binary-hppa/e2fsprogs_1.39+1.40-WIP-2006.11.14+dfsg-2etch1_hppa.deb stable/main/binary-hppa/comerr-dev_2.1-1.39+1.40-WIP-2006.11.14+dfsg-2etch1_hppa.deb stable/main/binary-hppa/ss-dev_2.0-1.39+1.40-WIP-2006.11.14+dfsg-2etch1_hppa.deb stable/main/binary-hppa/uuid-dev_1.2-1.39+1.40-WIP-2006.11.14+dfsg-2etch1_hppa.deb stable/main/e2fsprogs-udeb_1.39+1.40-WIP-2006.11.14+dfsg-2etch1_hppa.udeb stable/main/libblkid1-udeb_1.39+1.40-WIP-2006.11.14+dfsg-2etch1_hppa.udeb stable/main/libuuid1-udeb_1.39+1.40-WIP-2006.11.14+dfsg-2etch1_hppa.udeb e2fsprogs (1.39+1.40-WIP-2006.11.14+dfsg-2etch1) stable-security; urgency=high * Non-maintainer upload by The Security Team. * Fix multiple integer overflows based on sizes contained with the filesystem image. [CVE-2007-5497] stable/main/binary-i386/e2fsck-static_1.39+1.40-WIP-2006.11.14+dfsg-2etch1_i386.deb stable/main/binary-i386/libcomerr2_1.39+1.40-WIP-2006.11.14+dfsg-2etch1_i386.deb stable/main/binary-i386/libss2_1.39+1.40-WIP-2006.11.14+dfsg-2etch1_i386.deb stable/main/binary-i386/libuuid1_1.39+1.40-WIP-2006.11.14+dfsg-2etch1_i386.deb stable/main/binary-i386/libblkid1_1.39+1.40-WIP-2006.11.14+dfsg-2etch1_i386.deb stable/main/binary-i386/libblkid-dev_1.39+1.40-WIP-2006.11.14+dfsg-2etch1_i386.deb stable/main/binary-i386/e2fslibs_1.39+1.40-WIP-2006.11.14+dfsg-2etch1_i386.deb stable/main/binary-i386/e2fslibs-dev_1.39+1.40-WIP-2006.11.14+dfsg-2etch1_i386.deb stable/main/binary-i386/e2fsprogs_1.39+1.40-WIP-2006.11.14+dfsg-2etch1_i386.deb stable/main/binary-i386/comerr-dev_2.1-1.39+1.40-WIP-2006.11.14+dfsg-2etch1_i386.deb stable/main/binary-i386/ss-dev_2.0-1.39+1.40-WIP-2006.11.14+dfsg-2etch1_i386.deb stable/main/binary-i386/uuid-dev_1.2-1.39+1.40-WIP-2006.11.14+dfsg-2etch1_i386.deb stable/main/e2fsprogs-udeb_1.39+1.40-WIP-2006.11.14+dfsg-2etch1_i386.udeb stable/main/libblkid1-udeb_1.39+1.40-WIP-2006.11.14+dfsg-2etch1_i386.udeb stable/main/libuuid1-udeb_1.39+1.40-WIP-2006.11.14+dfsg-2etch1_i386.udeb e2fsprogs (1.39+1.40-WIP-2006.11.14+dfsg-2etch1) stable-security; urgency=high * Non-maintainer upload by The Security Team. * Fix multiple integer overflows based on sizes contained with the filesystem image. [CVE-2007-5497] stable/main/binary-ia64/e2fsck-static_1.39+1.40-WIP-2006.11.14+dfsg-2etch1_ia64.deb stable/main/binary-ia64/libcomerr2_1.39+1.40-WIP-2006.11.14+dfsg-2etch1_ia64.deb stable/main/binary-ia64/libss2_1.39+1.40-WIP-2006.11.14+dfsg-2etch1_ia64.deb stable/main/binary-ia64/libuuid1_1.39+1.40-WIP-2006.11.14+dfsg-2etch1_ia64.deb stable/main/binary-ia64/libblkid1_1.39+1.40-WIP-2006.11.14+dfsg-2etch1_ia64.deb stable/main/binary-ia64/libblkid-dev_1.39+1.40-WIP-2006.11.14+dfsg-2etch1_ia64.deb stable/main/binary-ia64/e2fslibs_1.39+1.40-WIP-2006.11.14+dfsg-2etch1_ia64.deb stable/main/binary-ia64/e2fslibs-dev_1.39+1.40-WIP-2006.11.14+dfsg-2etch1_ia64.deb stable/main/binary-ia64/e2fsprogs_1.39+1.40-WIP-2006.11.14+dfsg-2etch1_ia64.deb stable/main/binary-ia64/comerr-dev_2.1-1.39+1.40-WIP-2006.11.14+dfsg-2etch1_ia64.deb stable/main/binary-ia64/ss-dev_2.0-1.39+1.40-WIP-2006.11.14+dfsg-2etch1_ia64.deb stable/main/binary-ia64/uuid-dev_1.2-1.39+1.40-WIP-2006.11.14+dfsg-2etch1_ia64.deb stable/main/e2fsprogs-udeb_1.39+1.40-WIP-2006.11.14+dfsg-2etch1_ia64.udeb stable/main/libblkid1-udeb_1.39+1.40-WIP-2006.11.14+dfsg-2etch1_ia64.udeb stable/main/libuuid1-udeb_1.39+1.40-WIP-2006.11.14+dfsg-2etch1_ia64.udeb e2fsprogs (1.39+1.40-WIP-2006.11.14+dfsg-2etch1) stable-security; urgency=high * Non-maintainer upload by The Security Team. * Fix multiple integer overflows based on sizes contained with the filesystem image. [CVE-2007-5497] stable/main/binary-mips/e2fsck-static_1.39+1.40-WIP-2006.11.14+dfsg-2etch1_mips.deb stable/main/binary-mips/libcomerr2_1.39+1.40-WIP-2006.11.14+dfsg-2etch1_mips.deb stable/main/binary-mips/libss2_1.39+1.40-WIP-2006.11.14+dfsg-2etch1_mips.deb stable/main/binary-mips/libuuid1_1.39+1.40-WIP-2006.11.14+dfsg-2etch1_mips.deb stable/main/binary-mips/libblkid1_1.39+1.40-WIP-2006.11.14+dfsg-2etch1_mips.deb stable/main/binary-mips/libblkid-dev_1.39+1.40-WIP-2006.11.14+dfsg-2etch1_mips.deb stable/main/binary-mips/e2fslibs_1.39+1.40-WIP-2006.11.14+dfsg-2etch1_mips.deb stable/main/binary-mips/e2fslibs-dev_1.39+1.40-WIP-2006.11.14+dfsg-2etch1_mips.deb stable/main/binary-mips/e2fsprogs_1.39+1.40-WIP-2006.11.14+dfsg-2etch1_mips.deb stable/main/binary-mips/comerr-dev_2.1-1.39+1.40-WIP-2006.11.14+dfsg-2etch1_mips.deb stable/main/binary-mips/ss-dev_2.0-1.39+1.40-WIP-2006.11.14+dfsg-2etch1_mips.deb stable/main/binary-mips/uuid-dev_1.2-1.39+1.40-WIP-2006.11.14+dfsg-2etch1_mips.deb stable/main/e2fsprogs-udeb_1.39+1.40-WIP-2006.11.14+dfsg-2etch1_mips.udeb stable/main/libblkid1-udeb_1.39+1.40-WIP-2006.11.14+dfsg-2etch1_mips.udeb stable/main/libuuid1-udeb_1.39+1.40-WIP-2006.11.14+dfsg-2etch1_mips.udeb e2fsprogs (1.39+1.40-WIP-2006.11.14+dfsg-2etch1) stable-security; urgency=high * Non-maintainer upload by The Security Team. * Fix multiple integer overflows based on sizes contained with the filesystem image. [CVE-2007-5497] stable/main/binary-mipsel/e2fsck-static_1.39+1.40-WIP-2006.11.14+dfsg-2etch1_mipsel.deb stable/main/binary-mipsel/libcomerr2_1.39+1.40-WIP-2006.11.14+dfsg-2etch1_mipsel.deb stable/main/binary-mipsel/libss2_1.39+1.40-WIP-2006.11.14+dfsg-2etch1_mipsel.deb stable/main/binary-mipsel/libuuid1_1.39+1.40-WIP-2006.11.14+dfsg-2etch1_mipsel.deb stable/main/binary-mipsel/libblkid1_1.39+1.40-WIP-2006.11.14+dfsg-2etch1_mipsel.deb stable/main/binary-mipsel/libblkid-dev_1.39+1.40-WIP-2006.11.14+dfsg-2etch1_mipsel.deb stable/main/binary-mipsel/e2fslibs_1.39+1.40-WIP-2006.11.14+dfsg-2etch1_mipsel.deb stable/main/binary-mipsel/e2fslibs-dev_1.39+1.40-WIP-2006.11.14+dfsg-2etch1_mipsel.deb stable/main/binary-mipsel/e2fsprogs_1.39+1.40-WIP-2006.11.14+dfsg-2etch1_mipsel.deb stable/main/binary-mipsel/comerr-dev_2.1-1.39+1.40-WIP-2006.11.14+dfsg-2etch1_mipsel.deb stable/main/binary-mipsel/ss-dev_2.0-1.39+1.40-WIP-2006.11.14+dfsg-2etch1_mipsel.deb stable/main/binary-mipsel/uuid-dev_1.2-1.39+1.40-WIP-2006.11.14+dfsg-2etch1_mipsel.deb stable/main/e2fsprogs-udeb_1.39+1.40-WIP-2006.11.14+dfsg-2etch1_mipsel.udeb stable/main/libblkid1-udeb_1.39+1.40-WIP-2006.11.14+dfsg-2etch1_mipsel.udeb stable/main/libuuid1-udeb_1.39+1.40-WIP-2006.11.14+dfsg-2etch1_mipsel.udeb e2fsprogs (1.39+1.40-WIP-2006.11.14+dfsg-2etch1) stable-security; urgency=high * Non-maintainer upload by The Security Team. * Fix multiple integer overflows based on sizes contained with the filesystem image. [CVE-2007-5497] stable/main/binary-powerpc/e2fsck-static_1.39+1.40-WIP-2006.11.14+dfsg-2etch1_powerpc.deb stable/main/binary-powerpc/libcomerr2_1.39+1.40-WIP-2006.11.14+dfsg-2etch1_powerpc.deb stable/main/binary-powerpc/libss2_1.39+1.40-WIP-2006.11.14+dfsg-2etch1_powerpc.deb stable/main/binary-powerpc/libuuid1_1.39+1.40-WIP-2006.11.14+dfsg-2etch1_powerpc.deb stable/main/binary-powerpc/libblkid1_1.39+1.40-WIP-2006.11.14+dfsg-2etch1_powerpc.deb stable/main/binary-powerpc/libblkid-dev_1.39+1.40-WIP-2006.11.14+dfsg-2etch1_powerpc.deb stable/main/binary-powerpc/e2fslibs_1.39+1.40-WIP-2006.11.14+dfsg-2etch1_powerpc.deb stable/main/binary-powerpc/e2fslibs-dev_1.39+1.40-WIP-2006.11.14+dfsg-2etch1_powerpc.deb stable/main/binary-powerpc/e2fsprogs_1.39+1.40-WIP-2006.11.14+dfsg-2etch1_powerpc.deb stable/main/binary-powerpc/comerr-dev_2.1-1.39+1.40-WIP-2006.11.14+dfsg-2etch1_powerpc.deb stable/main/binary-powerpc/ss-dev_2.0-1.39+1.40-WIP-2006.11.14+dfsg-2etch1_powerpc.deb stable/main/binary-powerpc/uuid-dev_1.2-1.39+1.40-WIP-2006.11.14+dfsg-2etch1_powerpc.deb stable/main/e2fsprogs-udeb_1.39+1.40-WIP-2006.11.14+dfsg-2etch1_powerpc.udeb stable/main/libblkid1-udeb_1.39+1.40-WIP-2006.11.14+dfsg-2etch1_powerpc.udeb stable/main/libuuid1-udeb_1.39+1.40-WIP-2006.11.14+dfsg-2etch1_powerpc.udeb e2fsprogs (1.39+1.40-WIP-2006.11.14+dfsg-2etch1) stable-security; urgency=high * Non-maintainer upload by The Security Team. * Fix multiple integer overflows based on sizes contained with the filesystem image. [CVE-2007-5497] stable/main/binary-s390/e2fsck-static_1.39+1.40-WIP-2006.11.14+dfsg-2etch1_s390.deb stable/main/binary-s390/libcomerr2_1.39+1.40-WIP-2006.11.14+dfsg-2etch1_s390.deb stable/main/binary-s390/libss2_1.39+1.40-WIP-2006.11.14+dfsg-2etch1_s390.deb stable/main/binary-s390/libuuid1_1.39+1.40-WIP-2006.11.14+dfsg-2etch1_s390.deb stable/main/binary-s390/libblkid1_1.39+1.40-WIP-2006.11.14+dfsg-2etch1_s390.deb stable/main/binary-s390/libblkid-dev_1.39+1.40-WIP-2006.11.14+dfsg-2etch1_s390.deb stable/main/binary-s390/e2fslibs_1.39+1.40-WIP-2006.11.14+dfsg-2etch1_s390.deb stable/main/binary-s390/e2fslibs-dev_1.39+1.40-WIP-2006.11.14+dfsg-2etch1_s390.deb stable/main/binary-s390/e2fsprogs_1.39+1.40-WIP-2006.11.14+dfsg-2etch1_s390.deb stable/main/binary-s390/comerr-dev_2.1-1.39+1.40-WIP-2006.11.14+dfsg-2etch1_s390.deb stable/main/binary-s390/ss-dev_2.0-1.39+1.40-WIP-2006.11.14+dfsg-2etch1_s390.deb stable/main/binary-s390/uuid-dev_1.2-1.39+1.40-WIP-2006.11.14+dfsg-2etch1_s390.deb stable/main/e2fsprogs-udeb_1.39+1.40-WIP-2006.11.14+dfsg-2etch1_s390.udeb stable/main/libblkid1-udeb_1.39+1.40-WIP-2006.11.14+dfsg-2etch1_s390.udeb stable/main/libuuid1-udeb_1.39+1.40-WIP-2006.11.14+dfsg-2etch1_s390.udeb e2fsprogs (1.39+1.40-WIP-2006.11.14+dfsg-2etch1) stable-security; urgency=high * Non-maintainer upload by The Security Team. * Fix multiple integer overflows based on sizes contained with the filesystem image. [CVE-2007-5497] stable/main/binary-sparc/e2fsck-static_1.39+1.40-WIP-2006.11.14+dfsg-2etch1_sparc.deb stable/main/binary-sparc/libcomerr2_1.39+1.40-WIP-2006.11.14+dfsg-2etch1_sparc.deb stable/main/binary-sparc/libss2_1.39+1.40-WIP-2006.11.14+dfsg-2etch1_sparc.deb stable/main/binary-sparc/libuuid1_1.39+1.40-WIP-2006.11.14+dfsg-2etch1_sparc.deb stable/main/binary-sparc/libblkid1_1.39+1.40-WIP-2006.11.14+dfsg-2etch1_sparc.deb stable/main/binary-sparc/libblkid-dev_1.39+1.40-WIP-2006.11.14+dfsg-2etch1_sparc.deb stable/main/binary-sparc/e2fslibs_1.39+1.40-WIP-2006.11.14+dfsg-2etch1_sparc.deb stable/main/binary-sparc/e2fslibs-dev_1.39+1.40-WIP-2006.11.14+dfsg-2etch1_sparc.deb stable/main/binary-sparc/e2fsprogs_1.39+1.40-WIP-2006.11.14+dfsg-2etch1_sparc.deb stable/main/binary-sparc/comerr-dev_2.1-1.39+1.40-WIP-2006.11.14+dfsg-2etch1_sparc.deb stable/main/binary-sparc/ss-dev_2.0-1.39+1.40-WIP-2006.11.14+dfsg-2etch1_sparc.deb stable/main/binary-sparc/uuid-dev_1.2-1.39+1.40-WIP-2006.11.14+dfsg-2etch1_sparc.deb stable/main/e2fsprogs-udeb_1.39+1.40-WIP-2006.11.14+dfsg-2etch1_sparc.udeb stable/main/libblkid1-udeb_1.39+1.40-WIP-2006.11.14+dfsg-2etch1_sparc.udeb stable/main/libuuid1-udeb_1.39+1.40-WIP-2006.11.14+dfsg-2etch1_sparc.udeb e2fsprogs (1.39+1.40-WIP-2006.11.14+dfsg-2etch1) stable-security; urgency=high * Non-maintainer upload by The Security Team. * Fix multiple integer overflows based on sizes contained with the filesystem image. [CVE-2007-5497] stable/main/binary-alpha/elinks_0.11.1-1.2etch1_alpha.deb stable/main/binary-alpha/elinks-lite_0.11.1-1.2etch1_alpha.deb elinks (0.11.1-1.2etch1) stable-security; urgency=high * Non-maintainer upload by The Security Team. * Avoid leaking information when using POST over an SSL proxy. [CVE-2007-5034] stable/main/binary-amd64/elinks_0.11.1-1.2etch1_amd64.deb stable/main/binary-amd64/elinks-lite_0.11.1-1.2etch1_amd64.deb elinks (0.11.1-1.2etch1) stable-security; urgency=high * Non-maintainer upload by The Security Team. * Avoid leaking information when using POST over an SSL proxy. [CVE-2007-5034] stable/main/binary-arm/elinks_0.11.1-1.2etch1_arm.deb stable/main/binary-arm/elinks-lite_0.11.1-1.2etch1_arm.deb elinks (0.11.1-1.2etch1) stable-security; urgency=high * Non-maintainer upload by The Security Team. * Avoid leaking information when using POST over an SSL proxy. [CVE-2007-5034] stable/main/binary-hppa/elinks_0.11.1-1.2etch1_hppa.deb stable/main/binary-hppa/elinks-lite_0.11.1-1.2etch1_hppa.deb elinks (0.11.1-1.2etch1) stable-security; urgency=high * Non-maintainer upload by The Security Team. * Avoid leaking information when using POST over an SSL proxy. [CVE-2007-5034] stable/main/source/elinks_0.11.1-1.2etch1.dsc stable/main/source/elinks_0.11.1.orig.tar.gz stable/main/source/elinks_0.11.1-1.2etch1.diff.gz stable/main/binary-i386/elinks_0.11.1-1.2etch1_i386.deb stable/main/binary-i386/elinks-lite_0.11.1-1.2etch1_i386.deb elinks (0.11.1-1.2etch1) stable-security; urgency=high * Non-maintainer upload by The Security Team. * Avoid leaking information when using POST over an SSL proxy. [CVE-2007-5034] stable/main/binary-ia64/elinks_0.11.1-1.2etch1_ia64.deb stable/main/binary-ia64/elinks-lite_0.11.1-1.2etch1_ia64.deb elinks (0.11.1-1.2etch1) stable-security; urgency=high * Non-maintainer upload by The Security Team. * Avoid leaking information when using POST over an SSL proxy. [CVE-2007-5034] stable/main/binary-mips/elinks_0.11.1-1.2etch1_mips.deb stable/main/binary-mips/elinks-lite_0.11.1-1.2etch1_mips.deb elinks (0.11.1-1.2etch1) stable-security; urgency=high * Non-maintainer upload by The Security Team. * Avoid leaking information when using POST over an SSL proxy. [CVE-2007-5034] stable/main/binary-mipsel/elinks_0.11.1-1.2etch1_mipsel.deb stable/main/binary-mipsel/elinks-lite_0.11.1-1.2etch1_mipsel.deb elinks (0.11.1-1.2etch1) stable-security; urgency=high * Non-maintainer upload by The Security Team. * Avoid leaking information when using POST over an SSL proxy. [CVE-2007-5034] stable/main/binary-powerpc/elinks_0.11.1-1.2etch1_powerpc.deb stable/main/binary-powerpc/elinks-lite_0.11.1-1.2etch1_powerpc.deb elinks (0.11.1-1.2etch1) stable-security; urgency=high * Non-maintainer upload by The Security Team. * Avoid leaking information when using POST over an SSL proxy. [CVE-2007-5034] stable/main/binary-s390/elinks_0.11.1-1.2etch1_s390.deb stable/main/binary-s390/elinks-lite_0.11.1-1.2etch1_s390.deb elinks (0.11.1-1.2etch1) stable-security; urgency=high * Non-maintainer upload by The Security Team. * Avoid leaking information when using POST over an SSL proxy. [CVE-2007-5034] stable/main/binary-sparc/elinks_0.11.1-1.2etch1_sparc.deb stable/main/binary-sparc/elinks-lite_0.11.1-1.2etch1_sparc.deb elinks (0.11.1-1.2etch1) stable-security; urgency=high * Non-maintainer upload by The Security Team. * Avoid leaking information when using POST over an SSL proxy. [CVE-2007-5034] stable/main/binary-alpha/enigmail_0.94.2-2_alpha.deb enigmail (2:0.94.2-2) stable; urgency=low * debian/patches/88_enigmail-fix-endless-loop-regression.dpatch: fix regression introduced by icedove 1.5.0.10 update (Closes: 445993) * debian/patches/00list.thunderbird: add new patch to dpatch list stable/main/source/enigmail_0.94.2-2.dsc stable/main/source/enigmail_0.94.2-2.diff.gz stable/main/binary-amd64/enigmail_0.94.2-2_amd64.deb stable/main/binary-all/mozilla-thunderbird-enigmail_0.94.2-2_all.deb enigmail (2:0.94.2-2) stable; urgency=low * debian/patches/88_enigmail-fix-endless-loop-regression.dpatch: fix regression introduced by icedove 1.5.0.10 update (Closes: 445993) * debian/patches/00list.thunderbird: add new patch to dpatch list stable/main/binary-arm/enigmail_0.94.2-2_arm.deb enigmail (2:0.94.2-2) stable; urgency=low * debian/patches/88_enigmail-fix-endless-loop-regression.dpatch: fix regression introduced by icedove 1.5.0.10 update (Closes: 445993) * debian/patches/00list.thunderbird: add new patch to dpatch list stable/main/binary-hppa/enigmail_0.94.2-2_hppa.deb enigmail (2:0.94.2-2) stable; urgency=low * debian/patches/88_enigmail-fix-endless-loop-regression.dpatch: fix regression introduced by icedove 1.5.0.10 update (Closes: 445993) * debian/patches/00list.thunderbird: add new patch to dpatch list stable/main/binary-i386/enigmail_0.94.2-2_i386.deb enigmail (2:0.94.2-2) stable; urgency=low * debian/patches/88_enigmail-fix-endless-loop-regression.dpatch: fix regression introduced by icedove 1.5.0.10 update (Closes: 445993) * debian/patches/00list.thunderbird: add new patch to dpatch list stable/main/binary-ia64/enigmail_0.94.2-2_ia64.deb enigmail (2:0.94.2-2) stable; urgency=low * debian/patches/88_enigmail-fix-endless-loop-regression.dpatch: fix regression introduced by icedove 1.5.0.10 update (Closes: 445993) * debian/patches/00list.thunderbird: add new patch to dpatch list stable/main/binary-mips/enigmail_0.94.2-2_mips.deb enigmail (2:0.94.2-2) stable; urgency=low * debian/patches/88_enigmail-fix-endless-loop-regression.dpatch: fix regression introduced by icedove 1.5.0.10 update (Closes: 445993) * debian/patches/00list.thunderbird: add new patch to dpatch list stable/main/binary-mipsel/enigmail_0.94.2-2_mipsel.deb enigmail (2:0.94.2-2) stable; urgency=low * debian/patches/88_enigmail-fix-endless-loop-regression.dpatch: fix regression introduced by icedove 1.5.0.10 update (Closes: 445993) * debian/patches/00list.thunderbird: add new patch to dpatch list stable/main/binary-powerpc/enigmail_0.94.2-2_powerpc.deb enigmail (2:0.94.2-2) stable; urgency=low * debian/patches/88_enigmail-fix-endless-loop-regression.dpatch: fix regression introduced by icedove 1.5.0.10 update (Closes: 445993) * debian/patches/00list.thunderbird: add new patch to dpatch list stable/main/binary-s390/enigmail_0.94.2-2_s390.deb enigmail (2:0.94.2-2) stable; urgency=low * debian/patches/88_enigmail-fix-endless-loop-regression.dpatch: fix regression introduced by icedove 1.5.0.10 update (Closes: 445993) * debian/patches/00list.thunderbird: add new patch to dpatch list stable/main/binary-sparc/enigmail_0.94.2-2_sparc.deb enigmail (2:0.94.2-2) stable; urgency=low * debian/patches/88_enigmail-fix-endless-loop-regression.dpatch: fix regression introduced by icedove 1.5.0.10 update (Closes: 445993) * debian/patches/00list.thunderbird: add new patch to dpatch list stable/main/binary-alpha/evolution_2.6.3-6etch1_alpha.deb stable/main/binary-alpha/evolution-dev_2.6.3-6etch1_alpha.deb stable/main/binary-alpha/evolution-dbg_2.6.3-6etch1_alpha.deb stable/main/binary-alpha/evolution-plugins_2.6.3-6etch1_alpha.deb stable/main/binary-alpha/evolution-plugins-experimental_2.6.3-6etch1_alpha.deb evolution (2.6.3-6etch1) stable-security; urgency=high * Fix format string vulnerability in shared memo handling [91_CVE-2007-1002.patch] stable/main/binary-amd64/evolution_2.6.3-6etch1_amd64.deb stable/main/binary-amd64/evolution-dev_2.6.3-6etch1_amd64.deb stable/main/binary-amd64/evolution-dbg_2.6.3-6etch1_amd64.deb stable/main/binary-amd64/evolution-plugins_2.6.3-6etch1_amd64.deb stable/main/binary-amd64/evolution-plugins-experimental_2.6.3-6etch1_amd64.deb evolution (2.6.3-6etch1) stable-security; urgency=high * Fix format string vulnerability in shared memo handling [91_CVE-2007-1002.patch] stable/main/binary-arm/evolution_2.6.3-6etch1_arm.deb stable/main/binary-arm/evolution-dev_2.6.3-6etch1_arm.deb stable/main/binary-arm/evolution-dbg_2.6.3-6etch1_arm.deb stable/main/binary-arm/evolution-plugins_2.6.3-6etch1_arm.deb stable/main/binary-arm/evolution-plugins-experimental_2.6.3-6etch1_arm.deb evolution (2.6.3-6etch1) stable-security; urgency=high * Fix format string vulnerability in shared memo handling [91_CVE-2007-1002.patch] stable/main/binary-hppa/evolution_2.6.3-6etch1_hppa.deb stable/main/binary-hppa/evolution-dev_2.6.3-6etch1_hppa.deb stable/main/binary-hppa/evolution-dbg_2.6.3-6etch1_hppa.deb stable/main/binary-hppa/evolution-plugins_2.6.3-6etch1_hppa.deb stable/main/binary-hppa/evolution-plugins-experimental_2.6.3-6etch1_hppa.deb evolution (2.6.3-6etch1) stable-security; urgency=high * Fix format string vulnerability in shared memo handling [91_CVE-2007-1002.patch] stable/main/source/evolution_2.6.3-6etch1.dsc stable/main/source/evolution_2.6.3.orig.tar.gz stable/main/source/evolution_2.6.3-6etch1.diff.gz stable/main/binary-all/evolution-common_2.6.3-6etch1_all.deb stable/main/binary-i386/evolution_2.6.3-6etch1_i386.deb stable/main/binary-i386/evolution-dev_2.6.3-6etch1_i386.deb stable/main/binary-i386/evolution-dbg_2.6.3-6etch1_i386.deb stable/main/binary-i386/evolution-plugins_2.6.3-6etch1_i386.deb stable/main/binary-i386/evolution-plugins-experimental_2.6.3-6etch1_i386.deb evolution (2.6.3-6etch1) stable-security; urgency=high * Fix format string vulnerability in shared memo handling [91_CVE-2007-1002.patch] stable/main/binary-ia64/evolution_2.6.3-6etch1_ia64.deb stable/main/binary-ia64/evolution-dev_2.6.3-6etch1_ia64.deb stable/main/binary-ia64/evolution-dbg_2.6.3-6etch1_ia64.deb stable/main/binary-ia64/evolution-plugins_2.6.3-6etch1_ia64.deb stable/main/binary-ia64/evolution-plugins-experimental_2.6.3-6etch1_ia64.deb evolution (2.6.3-6etch1) stable-security; urgency=high * Fix format string vulnerability in shared memo handling [91_CVE-2007-1002.patch] stable/main/binary-mips/evolution_2.6.3-6etch1_mips.deb stable/main/binary-mips/evolution-dev_2.6.3-6etch1_mips.deb stable/main/binary-mips/evolution-dbg_2.6.3-6etch1_mips.deb stable/main/binary-mips/evolution-plugins_2.6.3-6etch1_mips.deb stable/main/binary-mips/evolution-plugins-experimental_2.6.3-6etch1_mips.deb evolution (2.6.3-6etch1) stable-security; urgency=high * Fix format string vulnerability in shared memo handling [91_CVE-2007-1002.patch] stable/main/binary-mipsel/evolution_2.6.3-6etch1_mipsel.deb stable/main/binary-mipsel/evolution-dev_2.6.3-6etch1_mipsel.deb stable/main/binary-mipsel/evolution-dbg_2.6.3-6etch1_mipsel.deb stable/main/binary-mipsel/evolution-plugins_2.6.3-6etch1_mipsel.deb stable/main/binary-mipsel/evolution-plugins-experimental_2.6.3-6etch1_mipsel.deb evolution (2.6.3-6etch1) stable-security; urgency=high * Fix format string vulnerability in shared memo handling [91_CVE-2007-1002.patch] stable/main/binary-powerpc/evolution_2.6.3-6etch1_powerpc.deb stable/main/binary-powerpc/evolution-dev_2.6.3-6etch1_powerpc.deb stable/main/binary-powerpc/evolution-dbg_2.6.3-6etch1_powerpc.deb stable/main/binary-powerpc/evolution-plugins_2.6.3-6etch1_powerpc.deb stable/main/binary-powerpc/evolution-plugins-experimental_2.6.3-6etch1_powerpc.deb evolution (2.6.3-6etch1) stable-security; urgency=high * Fix format string vulnerability in shared memo handling [91_CVE-2007-1002.patch] stable/main/binary-s390/evolution_2.6.3-6etch1_s390.deb stable/main/binary-s390/evolution-dev_2.6.3-6etch1_s390.deb stable/main/binary-s390/evolution-dbg_2.6.3-6etch1_s390.deb stable/main/binary-s390/evolution-plugins_2.6.3-6etch1_s390.deb stable/main/binary-s390/evolution-plugins-experimental_2.6.3-6etch1_s390.deb evolution (2.6.3-6etch1) stable-security; urgency=high * Fix format string vulnerability in shared memo handling [91_CVE-2007-1002.patch] stable/main/binary-sparc/evolution_2.6.3-6etch1_sparc.deb stable/main/binary-sparc/evolution-dev_2.6.3-6etch1_sparc.deb stable/main/binary-sparc/evolution-dbg_2.6.3-6etch1_sparc.deb stable/main/binary-sparc/evolution-plugins_2.6.3-6etch1_sparc.deb stable/main/binary-sparc/evolution-plugins-experimental_2.6.3-6etch1_sparc.deb evolution (2.6.3-6etch1) stable-security; urgency=high * Fix format string vulnerability in shared memo handling [91_CVE-2007-1002.patch] stable/main/binary-alpha/evolution-data-server_1.6.3-5etch1_alpha.deb stable/main/binary-alpha/evolution-data-server-dev_1.6.3-5etch1_alpha.deb stable/main/binary-alpha/evolution-data-server-dbg_1.6.3-5etch1_alpha.deb stable/main/binary-alpha/libedataserver1.2-7_1.6.3-5etch1_alpha.deb stable/main/binary-alpha/libedataserver1.2-dev_1.6.3-5etch1_alpha.deb stable/main/binary-alpha/libcamel1.2-8_1.6.3-5etch1_alpha.deb stable/main/binary-alpha/libcamel1.2-dev_1.6.3-5etch1_alpha.deb stable/main/binary-alpha/libebook1.2-5_1.6.3-5etch1_alpha.deb stable/main/binary-alpha/libebook1.2-dev_1.6.3-5etch1_alpha.deb stable/main/binary-alpha/libedataserverui1.2-6_1.6.3-5etch1_alpha.deb stable/main/binary-alpha/libedataserverui1.2-dev_1.6.3-5etch1_alpha.deb stable/main/binary-alpha/libedata-book1.2-2_1.6.3-5etch1_alpha.deb stable/main/binary-alpha/libedata-book1.2-dev_1.6.3-5etch1_alpha.deb stable/main/binary-alpha/libecal1.2-6_1.6.3-5etch1_alpha.deb stable/main/binary-alpha/libecal1.2-dev_1.6.3-5etch1_alpha.deb stable/main/binary-alpha/libedata-cal1.2-5_1.6.3-5etch1_alpha.deb stable/main/binary-alpha/libedata-cal1.2-dev_1.6.3-5etch1_alpha.deb stable/main/binary-alpha/libegroupwise1.2-10_1.6.3-5etch1_alpha.deb stable/main/binary-alpha/libegroupwise1.2-dev_1.6.3-5etch1_alpha.deb stable/main/binary-alpha/libexchange-storage1.2-1_1.6.3-5etch1_alpha.deb stable/main/binary-alpha/libexchange-storage1.2-dev_1.6.3-5etch1_alpha.deb evolution-data-server (1.6.3-5etch1) stable-security; urgency=high * SECURITY: New patch, 92_imap-negative-array-index, fixes potential negative array index usage in IMAP code (remote); FEDORA-2007-0464; GNOME #447414; closes: #429876. stable/main/binary-amd64/evolution-data-server_1.6.3-5etch1_amd64.deb stable/main/binary-amd64/evolution-data-server-dev_1.6.3-5etch1_amd64.deb stable/main/binary-amd64/evolution-data-server-dbg_1.6.3-5etch1_amd64.deb stable/main/binary-amd64/libedataserver1.2-7_1.6.3-5etch1_amd64.deb stable/main/binary-amd64/libedataserver1.2-dev_1.6.3-5etch1_amd64.deb stable/main/binary-amd64/libcamel1.2-8_1.6.3-5etch1_amd64.deb stable/main/binary-amd64/libcamel1.2-dev_1.6.3-5etch1_amd64.deb stable/main/binary-amd64/libebook1.2-5_1.6.3-5etch1_amd64.deb stable/main/binary-amd64/libebook1.2-dev_1.6.3-5etch1_amd64.deb stable/main/binary-amd64/libedataserverui1.2-6_1.6.3-5etch1_amd64.deb stable/main/binary-amd64/libedataserverui1.2-dev_1.6.3-5etch1_amd64.deb stable/main/binary-amd64/libedata-book1.2-2_1.6.3-5etch1_amd64.deb stable/main/binary-amd64/libedata-book1.2-dev_1.6.3-5etch1_amd64.deb stable/main/binary-amd64/libecal1.2-6_1.6.3-5etch1_amd64.deb stable/main/binary-amd64/libecal1.2-dev_1.6.3-5etch1_amd64.deb stable/main/binary-amd64/libedata-cal1.2-5_1.6.3-5etch1_amd64.deb stable/main/binary-amd64/libedata-cal1.2-dev_1.6.3-5etch1_amd64.deb stable/main/binary-amd64/libegroupwise1.2-10_1.6.3-5etch1_amd64.deb stable/main/binary-amd64/libegroupwise1.2-dev_1.6.3-5etch1_amd64.deb stable/main/binary-amd64/libexchange-storage1.2-1_1.6.3-5etch1_amd64.deb stable/main/binary-amd64/libexchange-storage1.2-dev_1.6.3-5etch1_amd64.deb evolution-data-server (1.6.3-5etch1) stable-security; urgency=high * SECURITY: New patch, 92_imap-negative-array-index, fixes potential negative array index usage in IMAP code (remote); FEDORA-2007-0464; GNOME #447414; closes: #429876. stable/main/binary-arm/evolution-data-server_1.6.3-5etch1_arm.deb stable/main/binary-arm/evolution-data-server-dev_1.6.3-5etch1_arm.deb stable/main/binary-arm/evolution-data-server-dbg_1.6.3-5etch1_arm.deb stable/main/binary-arm/libedataserver1.2-7_1.6.3-5etch1_arm.deb stable/main/binary-arm/libedataserver1.2-dev_1.6.3-5etch1_arm.deb stable/main/binary-arm/libcamel1.2-8_1.6.3-5etch1_arm.deb stable/main/binary-arm/libcamel1.2-dev_1.6.3-5etch1_arm.deb stable/main/binary-arm/libebook1.2-5_1.6.3-5etch1_arm.deb stable/main/binary-arm/libebook1.2-dev_1.6.3-5etch1_arm.deb stable/main/binary-arm/libedataserverui1.2-6_1.6.3-5etch1_arm.deb stable/main/binary-arm/libedataserverui1.2-dev_1.6.3-5etch1_arm.deb stable/main/binary-arm/libedata-book1.2-2_1.6.3-5etch1_arm.deb stable/main/binary-arm/libedata-book1.2-dev_1.6.3-5etch1_arm.deb stable/main/binary-arm/libecal1.2-6_1.6.3-5etch1_arm.deb stable/main/binary-arm/libecal1.2-dev_1.6.3-5etch1_arm.deb stable/main/binary-arm/libedata-cal1.2-5_1.6.3-5etch1_arm.deb stable/main/binary-arm/libedata-cal1.2-dev_1.6.3-5etch1_arm.deb stable/main/binary-arm/libegroupwise1.2-10_1.6.3-5etch1_arm.deb stable/main/binary-arm/libegroupwise1.2-dev_1.6.3-5etch1_arm.deb stable/main/binary-arm/libexchange-storage1.2-1_1.6.3-5etch1_arm.deb stable/main/binary-arm/libexchange-storage1.2-dev_1.6.3-5etch1_arm.deb evolution-data-server (1.6.3-5etch1) stable-security; urgency=high * SECURITY: New patch, 92_imap-negative-array-index, fixes potential negative array index usage in IMAP code (remote); FEDORA-2007-0464; GNOME #447414; closes: #429876. stable/main/binary-hppa/evolution-data-server_1.6.3-5etch1_hppa.deb stable/main/binary-hppa/evolution-data-server-dev_1.6.3-5etch1_hppa.deb stable/main/binary-hppa/evolution-data-server-dbg_1.6.3-5etch1_hppa.deb stable/main/binary-hppa/libedataserver1.2-7_1.6.3-5etch1_hppa.deb stable/main/binary-hppa/libedataserver1.2-dev_1.6.3-5etch1_hppa.deb stable/main/binary-hppa/libcamel1.2-8_1.6.3-5etch1_hppa.deb stable/main/binary-hppa/libcamel1.2-dev_1.6.3-5etch1_hppa.deb stable/main/binary-hppa/libebook1.2-5_1.6.3-5etch1_hppa.deb stable/main/binary-hppa/libebook1.2-dev_1.6.3-5etch1_hppa.deb stable/main/binary-hppa/libedataserverui1.2-6_1.6.3-5etch1_hppa.deb stable/main/binary-hppa/libedataserverui1.2-dev_1.6.3-5etch1_hppa.deb stable/main/binary-hppa/libedata-book1.2-2_1.6.3-5etch1_hppa.deb stable/main/binary-hppa/libedata-book1.2-dev_1.6.3-5etch1_hppa.deb stable/main/binary-hppa/libecal1.2-6_1.6.3-5etch1_hppa.deb stable/main/binary-hppa/libecal1.2-dev_1.6.3-5etch1_hppa.deb stable/main/binary-hppa/libedata-cal1.2-5_1.6.3-5etch1_hppa.deb stable/main/binary-hppa/libedata-cal1.2-dev_1.6.3-5etch1_hppa.deb stable/main/binary-hppa/libegroupwise1.2-10_1.6.3-5etch1_hppa.deb stable/main/binary-hppa/libegroupwise1.2-dev_1.6.3-5etch1_hppa.deb stable/main/binary-hppa/libexchange-storage1.2-1_1.6.3-5etch1_hppa.deb stable/main/binary-hppa/libexchange-storage1.2-dev_1.6.3-5etch1_hppa.deb evolution-data-server (1.6.3-5etch1) stable-security; urgency=high * SECURITY: New patch, 92_imap-negative-array-index, fixes potential negative array index usage in IMAP code (remote); FEDORA-2007-0464; GNOME #447414; closes: #429876. stable/main/source/evolution-data-server_1.6.3-5etch1.dsc stable/main/source/evolution-data-server_1.6.3.orig.tar.gz stable/main/source/evolution-data-server_1.6.3-5etch1.diff.gz stable/main/binary-all/evolution-data-server-common_1.6.3-5etch1_all.deb stable/main/binary-i386/evolution-data-server_1.6.3-5etch1_i386.deb stable/main/binary-i386/evolution-data-server-dev_1.6.3-5etch1_i386.deb stable/main/binary-i386/evolution-data-server-dbg_1.6.3-5etch1_i386.deb stable/main/binary-i386/libedataserver1.2-7_1.6.3-5etch1_i386.deb stable/main/binary-i386/libedataserver1.2-dev_1.6.3-5etch1_i386.deb stable/main/binary-i386/libcamel1.2-8_1.6.3-5etch1_i386.deb stable/main/binary-i386/libcamel1.2-dev_1.6.3-5etch1_i386.deb stable/main/binary-i386/libebook1.2-5_1.6.3-5etch1_i386.deb stable/main/binary-i386/libebook1.2-dev_1.6.3-5etch1_i386.deb stable/main/binary-i386/libedataserverui1.2-6_1.6.3-5etch1_i386.deb stable/main/binary-i386/libedataserverui1.2-dev_1.6.3-5etch1_i386.deb stable/main/binary-i386/libedata-book1.2-2_1.6.3-5etch1_i386.deb stable/main/binary-i386/libedata-book1.2-dev_1.6.3-5etch1_i386.deb stable/main/binary-i386/libecal1.2-6_1.6.3-5etch1_i386.deb stable/main/binary-i386/libecal1.2-dev_1.6.3-5etch1_i386.deb stable/main/binary-i386/libedata-cal1.2-5_1.6.3-5etch1_i386.deb stable/main/binary-i386/libedata-cal1.2-dev_1.6.3-5etch1_i386.deb stable/main/binary-i386/libegroupwise1.2-10_1.6.3-5etch1_i386.deb stable/main/binary-i386/libegroupwise1.2-dev_1.6.3-5etch1_i386.deb stable/main/binary-i386/libexchange-storage1.2-1_1.6.3-5etch1_i386.deb stable/main/binary-i386/libexchange-storage1.2-dev_1.6.3-5etch1_i386.deb evolution-data-server (1.6.3-5etch1) stable-security; urgency=high * SECURITY: New patch, 92_imap-negative-array-index, fixes potential negative array index usage in IMAP code (remote); FEDORA-2007-0464; GNOME #447414; closes: #429876. stable/main/binary-ia64/evolution-data-server_1.6.3-5etch1_ia64.deb stable/main/binary-ia64/evolution-data-server-dev_1.6.3-5etch1_ia64.deb stable/main/binary-ia64/evolution-data-server-dbg_1.6.3-5etch1_ia64.deb stable/main/binary-ia64/libedataserver1.2-7_1.6.3-5etch1_ia64.deb stable/main/binary-ia64/libedataserver1.2-dev_1.6.3-5etch1_ia64.deb stable/main/binary-ia64/libcamel1.2-8_1.6.3-5etch1_ia64.deb stable/main/binary-ia64/libcamel1.2-dev_1.6.3-5etch1_ia64.deb stable/main/binary-ia64/libebook1.2-5_1.6.3-5etch1_ia64.deb stable/main/binary-ia64/libebook1.2-dev_1.6.3-5etch1_ia64.deb stable/main/binary-ia64/libedataserverui1.2-6_1.6.3-5etch1_ia64.deb stable/main/binary-ia64/libedataserverui1.2-dev_1.6.3-5etch1_ia64.deb stable/main/binary-ia64/libedata-book1.2-2_1.6.3-5etch1_ia64.deb stable/main/binary-ia64/libedata-book1.2-dev_1.6.3-5etch1_ia64.deb stable/main/binary-ia64/libecal1.2-6_1.6.3-5etch1_ia64.deb stable/main/binary-ia64/libecal1.2-dev_1.6.3-5etch1_ia64.deb stable/main/binary-ia64/libedata-cal1.2-5_1.6.3-5etch1_ia64.deb stable/main/binary-ia64/libedata-cal1.2-dev_1.6.3-5etch1_ia64.deb stable/main/binary-ia64/libegroupwise1.2-10_1.6.3-5etch1_ia64.deb stable/main/binary-ia64/libegroupwise1.2-dev_1.6.3-5etch1_ia64.deb stable/main/binary-ia64/libexchange-storage1.2-1_1.6.3-5etch1_ia64.deb stable/main/binary-ia64/libexchange-storage1.2-dev_1.6.3-5etch1_ia64.deb evolution-data-server (1.6.3-5etch1) stable-security; urgency=high * SECURITY: New patch, 92_imap-negative-array-index, fixes potential negative array index usage in IMAP code (remote); FEDORA-2007-0464; GNOME #447414; closes: #429876. stable/main/binary-mips/evolution-data-server_1.6.3-5etch1_mips.deb stable/main/binary-mips/evolution-data-server-dev_1.6.3-5etch1_mips.deb stable/main/binary-mips/evolution-data-server-dbg_1.6.3-5etch1_mips.deb stable/main/binary-mips/libedataserver1.2-7_1.6.3-5etch1_mips.deb stable/main/binary-mips/libedataserver1.2-dev_1.6.3-5etch1_mips.deb stable/main/binary-mips/libcamel1.2-8_1.6.3-5etch1_mips.deb stable/main/binary-mips/libcamel1.2-dev_1.6.3-5etch1_mips.deb stable/main/binary-mips/libebook1.2-5_1.6.3-5etch1_mips.deb stable/main/binary-mips/libebook1.2-dev_1.6.3-5etch1_mips.deb stable/main/binary-mips/libedataserverui1.2-6_1.6.3-5etch1_mips.deb stable/main/binary-mips/libedataserverui1.2-dev_1.6.3-5etch1_mips.deb stable/main/binary-mips/libedata-book1.2-2_1.6.3-5etch1_mips.deb stable/main/binary-mips/libedata-book1.2-dev_1.6.3-5etch1_mips.deb stable/main/binary-mips/libecal1.2-6_1.6.3-5etch1_mips.deb stable/main/binary-mips/libecal1.2-dev_1.6.3-5etch1_mips.deb stable/main/binary-mips/libedata-cal1.2-5_1.6.3-5etch1_mips.deb stable/main/binary-mips/libedata-cal1.2-dev_1.6.3-5etch1_mips.deb stable/main/binary-mips/libegroupwise1.2-10_1.6.3-5etch1_mips.deb stable/main/binary-mips/libegroupwise1.2-dev_1.6.3-5etch1_mips.deb stable/main/binary-mips/libexchange-storage1.2-1_1.6.3-5etch1_mips.deb stable/main/binary-mips/libexchange-storage1.2-dev_1.6.3-5etch1_mips.deb evolution-data-server (1.6.3-5etch1) stable-security; urgency=high * SECURITY: New patch, 92_imap-negative-array-index, fixes potential negative array index usage in IMAP code (remote); FEDORA-2007-0464; GNOME #447414; closes: #429876. stable/main/binary-mipsel/evolution-data-server_1.6.3-5etch1_mipsel.deb stable/main/binary-mipsel/evolution-data-server-dev_1.6.3-5etch1_mipsel.deb stable/main/binary-mipsel/evolution-data-server-dbg_1.6.3-5etch1_mipsel.deb stable/main/binary-mipsel/libedataserver1.2-7_1.6.3-5etch1_mipsel.deb stable/main/binary-mipsel/libedataserver1.2-dev_1.6.3-5etch1_mipsel.deb stable/main/binary-mipsel/libcamel1.2-8_1.6.3-5etch1_mipsel.deb stable/main/binary-mipsel/libcamel1.2-dev_1.6.3-5etch1_mipsel.deb stable/main/binary-mipsel/libebook1.2-5_1.6.3-5etch1_mipsel.deb stable/main/binary-mipsel/libebook1.2-dev_1.6.3-5etch1_mipsel.deb stable/main/binary-mipsel/libedataserverui1.2-6_1.6.3-5etch1_mipsel.deb stable/main/binary-mipsel/libedataserverui1.2-dev_1.6.3-5etch1_mipsel.deb stable/main/binary-mipsel/libedata-book1.2-2_1.6.3-5etch1_mipsel.deb stable/main/binary-mipsel/libedata-book1.2-dev_1.6.3-5etch1_mipsel.deb stable/main/binary-mipsel/libecal1.2-6_1.6.3-5etch1_mipsel.deb stable/main/binary-mipsel/libecal1.2-dev_1.6.3-5etch1_mipsel.deb stable/main/binary-mipsel/libedata-cal1.2-5_1.6.3-5etch1_mipsel.deb stable/main/binary-mipsel/libedata-cal1.2-dev_1.6.3-5etch1_mipsel.deb stable/main/binary-mipsel/libegroupwise1.2-10_1.6.3-5etch1_mipsel.deb stable/main/binary-mipsel/libegroupwise1.2-dev_1.6.3-5etch1_mipsel.deb stable/main/binary-mipsel/libexchange-storage1.2-1_1.6.3-5etch1_mipsel.deb stable/main/binary-mipsel/libexchange-storage1.2-dev_1.6.3-5etch1_mipsel.deb evolution-data-server (1.6.3-5etch1) stable-security; urgency=high * SECURITY: New patch, 92_imap-negative-array-index, fixes potential negative array index usage in IMAP code (remote); FEDORA-2007-0464; GNOME #447414; closes: #429876. stable/main/binary-powerpc/evolution-data-server_1.6.3-5etch1_powerpc.deb stable/main/binary-powerpc/evolution-data-server-dev_1.6.3-5etch1_powerpc.deb stable/main/binary-powerpc/evolution-data-server-dbg_1.6.3-5etch1_powerpc.deb stable/main/binary-powerpc/libedataserver1.2-7_1.6.3-5etch1_powerpc.deb stable/main/binary-powerpc/libedataserver1.2-dev_1.6.3-5etch1_powerpc.deb stable/main/binary-powerpc/libcamel1.2-8_1.6.3-5etch1_powerpc.deb stable/main/binary-powerpc/libcamel1.2-dev_1.6.3-5etch1_powerpc.deb stable/main/binary-powerpc/libebook1.2-5_1.6.3-5etch1_powerpc.deb stable/main/binary-powerpc/libebook1.2-dev_1.6.3-5etch1_powerpc.deb stable/main/binary-powerpc/libedataserverui1.2-6_1.6.3-5etch1_powerpc.deb stable/main/binary-powerpc/libedataserverui1.2-dev_1.6.3-5etch1_powerpc.deb stable/main/binary-powerpc/libedata-book1.2-2_1.6.3-5etch1_powerpc.deb stable/main/binary-powerpc/libedata-book1.2-dev_1.6.3-5etch1_powerpc.deb stable/main/binary-powerpc/libecal1.2-6_1.6.3-5etch1_powerpc.deb stable/main/binary-powerpc/libecal1.2-dev_1.6.3-5etch1_powerpc.deb stable/main/binary-powerpc/libedata-cal1.2-5_1.6.3-5etch1_powerpc.deb stable/main/binary-powerpc/libedata-cal1.2-dev_1.6.3-5etch1_powerpc.deb stable/main/binary-powerpc/libegroupwise1.2-10_1.6.3-5etch1_powerpc.deb stable/main/binary-powerpc/libegroupwise1.2-dev_1.6.3-5etch1_powerpc.deb stable/main/binary-powerpc/libexchange-storage1.2-1_1.6.3-5etch1_powerpc.deb stable/main/binary-powerpc/libexchange-storage1.2-dev_1.6.3-5etch1_powerpc.deb evolution-data-server (1.6.3-5etch1) stable-security; urgency=high * SECURITY: New patch, 92_imap-negative-array-index, fixes potential negative array index usage in IMAP code (remote); FEDORA-2007-0464; GNOME #447414; closes: #429876. stable/main/binary-s390/evolution-data-server_1.6.3-5etch1_s390.deb stable/main/binary-s390/evolution-data-server-dev_1.6.3-5etch1_s390.deb stable/main/binary-s390/evolution-data-server-dbg_1.6.3-5etch1_s390.deb stable/main/binary-s390/libedataserver1.2-7_1.6.3-5etch1_s390.deb stable/main/binary-s390/libedataserver1.2-dev_1.6.3-5etch1_s390.deb stable/main/binary-s390/libcamel1.2-8_1.6.3-5etch1_s390.deb stable/main/binary-s390/libcamel1.2-dev_1.6.3-5etch1_s390.deb stable/main/binary-s390/libebook1.2-5_1.6.3-5etch1_s390.deb stable/main/binary-s390/libebook1.2-dev_1.6.3-5etch1_s390.deb stable/main/binary-s390/libedataserverui1.2-6_1.6.3-5etch1_s390.deb stable/main/binary-s390/libedataserverui1.2-dev_1.6.3-5etch1_s390.deb stable/main/binary-s390/libedata-book1.2-2_1.6.3-5etch1_s390.deb stable/main/binary-s390/libedata-book1.2-dev_1.6.3-5etch1_s390.deb stable/main/binary-s390/libecal1.2-6_1.6.3-5etch1_s390.deb stable/main/binary-s390/libecal1.2-dev_1.6.3-5etch1_s390.deb stable/main/binary-s390/libedata-cal1.2-5_1.6.3-5etch1_s390.deb stable/main/binary-s390/libedata-cal1.2-dev_1.6.3-5etch1_s390.deb stable/main/binary-s390/libegroupwise1.2-10_1.6.3-5etch1_s390.deb stable/main/binary-s390/libegroupwise1.2-dev_1.6.3-5etch1_s390.deb stable/main/binary-s390/libexchange-storage1.2-1_1.6.3-5etch1_s390.deb stable/main/binary-s390/libexchange-storage1.2-dev_1.6.3-5etch1_s390.deb evolution-data-server (1.6.3-5etch1) stable-security; urgency=high * SECURITY: New patch, 92_imap-negative-array-index, fixes potential negative array index usage in IMAP code (remote); FEDORA-2007-0464; GNOME #447414; closes: #429876. stable/main/binary-sparc/evolution-data-server_1.6.3-5etch1_sparc.deb stable/main/binary-sparc/evolution-data-server-dev_1.6.3-5etch1_sparc.deb stable/main/binary-sparc/evolution-data-server-dbg_1.6.3-5etch1_sparc.deb stable/main/binary-sparc/libedataserver1.2-7_1.6.3-5etch1_sparc.deb stable/main/binary-sparc/libedataserver1.2-dev_1.6.3-5etch1_sparc.deb stable/main/binary-sparc/libcamel1.2-8_1.6.3-5etch1_sparc.deb stable/main/binary-sparc/libcamel1.2-dev_1.6.3-5etch1_sparc.deb stable/main/binary-sparc/libebook1.2-5_1.6.3-5etch1_sparc.deb stable/main/binary-sparc/libebook1.2-dev_1.6.3-5etch1_sparc.deb stable/main/binary-sparc/libedataserverui1.2-6_1.6.3-5etch1_sparc.deb stable/main/binary-sparc/libedataserverui1.2-dev_1.6.3-5etch1_sparc.deb stable/main/binary-sparc/libedata-book1.2-2_1.6.3-5etch1_sparc.deb stable/main/binary-sparc/libedata-book1.2-dev_1.6.3-5etch1_sparc.deb stable/main/binary-sparc/libecal1.2-6_1.6.3-5etch1_sparc.deb stable/main/binary-sparc/libecal1.2-dev_1.6.3-5etch1_sparc.deb stable/main/binary-sparc/libedata-cal1.2-5_1.6.3-5etch1_sparc.deb stable/main/binary-sparc/libedata-cal1.2-dev_1.6.3-5etch1_sparc.deb stable/main/binary-sparc/libegroupwise1.2-10_1.6.3-5etch1_sparc.deb stable/main/binary-sparc/libegroupwise1.2-dev_1.6.3-5etch1_sparc.deb stable/main/binary-sparc/libexchange-storage1.2-1_1.6.3-5etch1_sparc.deb stable/main/binary-sparc/libexchange-storage1.2-dev_1.6.3-5etch1_sparc.deb evolution-data-server (1.6.3-5etch1) stable-security; urgency=high * SECURITY: New patch, 92_imap-negative-array-index, fixes potential negative array index usage in IMAP code (remote); FEDORA-2007-0464; GNOME #447414; closes: #429876. stable/main/binary-amd64/fai-kernels_1.17+etch.17_amd64.deb fai-kernels (1.17+etch.17) stable; urgency=high * Rebuild against linux-source-2.6.18 (2.6.18.dfsg.1-17): * [futex] Fix address computation in compat code, fixing hangs on sparc64. (closes: #433187) * [x86_64] Mask the NX bit in mk_pte_phys to avoid triggering a RSVD type page fault on non-NX capable systems which causes a crash. (closes: #414742) * [fusion] Avoid holding the device busy for too long in the low level driver, which was causing filesystems in VMWare guests to get remounted read-only under load. (closes: #453120) * Add UNUSUAL_DEV entries for supertop usb drives which require the IGNORE_RESIDUE flag. (closes: #455856) * [sparc64] Enable CONFIG_USB_SERIAL (closes: #412740) stable/main/source/fai-kernels_1.17+etch.17.dsc stable/main/source/fai-kernels_1.17+etch.17.tar.gz stable/main/binary-i386/fai-kernels_1.17+etch.17_i386.deb fai-kernels (1.17+etch.17) stable; urgency=high * Rebuild against linux-source-2.6.18 (2.6.18.dfsg.1-17): * [futex] Fix address computation in compat code, fixing hangs on sparc64. (closes: #433187) * [x86_64] Mask the NX bit in mk_pte_phys to avoid triggering a RSVD type page fault on non-NX capable systems which causes a crash. (closes: #414742) * [fusion] Avoid holding the device busy for too long in the low level driver, which was causing filesystems in VMWare guests to get remounted read-only under load. (closes: #453120) * Add UNUSUAL_DEV entries for supertop usb drives which require the IGNORE_RESIDUE flag. (closes: #455856) * [sparc64] Enable CONFIG_USB_SERIAL (closes: #412740) stable/main/binary-powerpc/fai-kernels_1.17+etch.17_powerpc.deb fai-kernels (1.17+etch.17) stable; urgency=high * Rebuild against linux-source-2.6.18 (2.6.18.dfsg.1-17): * [futex] Fix address computation in compat code, fixing hangs on sparc64. (closes: #433187) * [x86_64] Mask the NX bit in mk_pte_phys to avoid triggering a RSVD type page fault on non-NX capable systems which causes a crash. (closes: #414742) * [fusion] Avoid holding the device busy for too long in the low level driver, which was causing filesystems in VMWare guests to get remounted read-only under load. (closes: #453120) * Add UNUSUAL_DEV entries for supertop usb drives which require the IGNORE_RESIDUE flag. (closes: #455856) * [sparc64] Enable CONFIG_USB_SERIAL (closes: #412740) stable/main/binary-alpha/fetchmail_6.3.6-1etch1_alpha.deb fetchmail (6.3.6-1etch1) stable; urgency=high * Included 02_fix_denial_of_service_CVE-2007-4565.patch to fix DoS in sink.c (CVE-2007-4565, see #440006). stable/main/source/fetchmail_6.3.6-1etch1.dsc stable/main/source/fetchmail_6.3.6.orig.tar.gz stable/main/source/fetchmail_6.3.6-1etch1.diff.gz stable/main/binary-all/fetchmailconf_6.3.6-1etch1_all.deb stable/main/binary-amd64/fetchmail_6.3.6-1etch1_amd64.deb fetchmail (6.3.6-1etch1) stable; urgency=high * Included 02_fix_denial_of_service_CVE-2007-4565.patch to fix DoS in sink.c (CVE-2007-4565, see #440006). stable/main/binary-arm/fetchmail_6.3.6-1etch1_arm.deb fetchmail (6.3.6-1etch1) stable; urgency=high * Included 02_fix_denial_of_service_CVE-2007-4565.patch to fix DoS in sink.c (CVE-2007-4565, see #440006). stable/main/binary-hppa/fetchmail_6.3.6-1etch1_hppa.deb fetchmail (6.3.6-1etch1) stable; urgency=high * Included 02_fix_denial_of_service_CVE-2007-4565.patch to fix DoS in sink.c (CVE-2007-4565, see #440006). stable/main/binary-i386/fetchmail_6.3.6-1etch1_i386.deb fetchmail (6.3.6-1etch1) stable; urgency=high * Included 02_fix_denial_of_service_CVE-2007-4565.patch to fix DoS in sink.c (CVE-2007-4565, see #440006). stable/main/binary-ia64/fetchmail_6.3.6-1etch1_ia64.deb fetchmail (6.3.6-1etch1) stable; urgency=high * Included 02_fix_denial_of_service_CVE-2007-4565.patch to fix DoS in sink.c (CVE-2007-4565, see #440006). stable/main/binary-mips/fetchmail_6.3.6-1etch1_mips.deb fetchmail (6.3.6-1etch1) stable; urgency=high * Included 02_fix_denial_of_service_CVE-2007-4565.patch to fix DoS in sink.c (CVE-2007-4565, see #440006). stable/main/binary-mipsel/fetchmail_6.3.6-1etch1_mipsel.deb fetchmail (6.3.6-1etch1) stable; urgency=high * Included 02_fix_denial_of_service_CVE-2007-4565.patch to fix DoS in sink.c (CVE-2007-4565, see #440006). stable/main/binary-powerpc/fetchmail_6.3.6-1etch1_powerpc.deb fetchmail (6.3.6-1etch1) stable; urgency=high * Included 02_fix_denial_of_service_CVE-2007-4565.patch to fix DoS in sink.c (CVE-2007-4565, see #440006). stable/main/binary-s390/fetchmail_6.3.6-1etch1_s390.deb fetchmail (6.3.6-1etch1) stable; urgency=high * Included 02_fix_denial_of_service_CVE-2007-4565.patch to fix DoS in sink.c (CVE-2007-4565, see #440006). stable/main/binary-sparc/fetchmail_6.3.6-1etch1_sparc.deb fetchmail (6.3.6-1etch1) stable; urgency=high * Included 02_fix_denial_of_service_CVE-2007-4565.patch to fix DoS in sink.c (CVE-2007-4565, see #440006). stable/main/binary-alpha/file_4.17-5etch3_alpha.deb stable/main/binary-alpha/libmagic1_4.17-5etch3_alpha.deb stable/main/binary-alpha/libmagic-dev_4.17-5etch3_alpha.deb stable/main/binary-alpha/python-magic_4.17-5etch3_alpha.deb file (4.17-5etch3) stable-security; urgency=high * Non-maintainer upload by the security team * Merge stable and stable-security branches. 4.17-5etch2 was accidentally uploaded twice, with different contents. stable/main/source/file_4.17-5etch3.dsc stable/main/source/file_4.17-5etch3.diff.gz stable/main/binary-amd64/file_4.17-5etch3_amd64.deb stable/main/binary-amd64/libmagic1_4.17-5etch3_amd64.deb stable/main/binary-amd64/libmagic-dev_4.17-5etch3_amd64.deb stable/main/binary-amd64/python-magic_4.17-5etch3_amd64.deb file (4.17-5etch3) stable-security; urgency=high * Non-maintainer upload by the security team * Merge stable and stable-security branches. 4.17-5etch2 was accidentally uploaded twice, with different contents. stable/main/binary-arm/file_4.17-5etch3_arm.deb stable/main/binary-arm/libmagic1_4.17-5etch3_arm.deb stable/main/binary-arm/libmagic-dev_4.17-5etch3_arm.deb stable/main/binary-arm/python-magic_4.17-5etch3_arm.deb file (4.17-5etch3) stable-security; urgency=high * Non-maintainer upload by the security team * Merge stable and stable-security branches. 4.17-5etch2 was accidentally uploaded twice, with different contents. stable/main/binary-hppa/file_4.17-5etch3_hppa.deb stable/main/binary-hppa/libmagic1_4.17-5etch3_hppa.deb stable/main/binary-hppa/libmagic-dev_4.17-5etch3_hppa.deb stable/main/binary-hppa/python-magic_4.17-5etch3_hppa.deb file (4.17-5etch3) stable-security; urgency=high * Non-maintainer upload by the security team * Merge stable and stable-security branches. 4.17-5etch2 was accidentally uploaded twice, with different contents. stable/main/binary-i386/file_4.17-5etch3_i386.deb stable/main/binary-i386/libmagic1_4.17-5etch3_i386.deb stable/main/binary-i386/libmagic-dev_4.17-5etch3_i386.deb stable/main/binary-i386/python-magic_4.17-5etch3_i386.deb file (4.17-5etch3) stable-security; urgency=high * Non-maintainer upload by the security team * Merge stable and stable-security branches. 4.17-5etch2 was accidentally uploaded twice, with different contents. stable/main/binary-ia64/file_4.17-5etch3_ia64.deb stable/main/binary-ia64/libmagic1_4.17-5etch3_ia64.deb stable/main/binary-ia64/libmagic-dev_4.17-5etch3_ia64.deb stable/main/binary-ia64/python-magic_4.17-5etch3_ia64.deb file (4.17-5etch3) stable-security; urgency=high * Non-maintainer upload by the security team * Merge stable and stable-security branches. 4.17-5etch2 was accidentally uploaded twice, with different contents. stable/main/binary-mips/file_4.17-5etch3_mips.deb stable/main/binary-mips/libmagic1_4.17-5etch3_mips.deb stable/main/binary-mips/libmagic-dev_4.17-5etch3_mips.deb stable/main/binary-mips/python-magic_4.17-5etch3_mips.deb file (4.17-5etch3) stable-security; urgency=high * Non-maintainer upload by the security team * Merge stable and stable-security branches. 4.17-5etch2 was accidentally uploaded twice, with different contents. stable/main/binary-mipsel/file_4.17-5etch3_mipsel.deb stable/main/binary-mipsel/libmagic1_4.17-5etch3_mipsel.deb stable/main/binary-mipsel/libmagic-dev_4.17-5etch3_mipsel.deb stable/main/binary-mipsel/python-magic_4.17-5etch3_mipsel.deb file (4.17-5etch3) stable-security; urgency=high * Non-maintainer upload by the security team * Merge stable and stable-security branches. 4.17-5etch2 was accidentally uploaded twice, with different contents. stable/main/binary-powerpc/file_4.17-5etch3_powerpc.deb stable/main/binary-powerpc/libmagic1_4.17-5etch3_powerpc.deb stable/main/binary-powerpc/libmagic-dev_4.17-5etch3_powerpc.deb stable/main/binary-powerpc/python-magic_4.17-5etch3_powerpc.deb file (4.17-5etch3) stable-security; urgency=high * Non-maintainer upload by the security team * Merge stable and stable-security branches. 4.17-5etch2 was accidentally uploaded twice, with different contents. stable/main/binary-s390/file_4.17-5etch3_s390.deb stable/main/binary-s390/libmagic1_4.17-5etch3_s390.deb stable/main/binary-s390/libmagic-dev_4.17-5etch3_s390.deb stable/main/binary-s390/python-magic_4.17-5etch3_s390.deb file (4.17-5etch3) stable-security; urgency=high * Non-maintainer upload by the security team * Merge stable and stable-security branches. 4.17-5etch2 was accidentally uploaded twice, with different contents. stable/main/binary-sparc/file_4.17-5etch3_sparc.deb stable/main/binary-sparc/libmagic1_4.17-5etch3_sparc.deb stable/main/binary-sparc/libmagic-dev_4.17-5etch3_sparc.deb stable/main/binary-sparc/python-magic_4.17-5etch3_sparc.deb file (4.17-5etch3) stable-security; urgency=high * Non-maintainer upload by the security team * Merge stable and stable-security branches. 4.17-5etch2 was accidentally uploaded twice, with different contents. stable/main/binary-alpha/findutils_4.2.28-1etch1_alpha.deb findutils (4.2.28-1etch1) stable; urgency=low * Fixe locate heap buffer overflow when using databases in old format. (CVE-2007-2452) Closes: #426862 stable/main/binary-amd64/findutils_4.2.28-1etch1_amd64.deb findutils (4.2.28-1etch1) stable; urgency=low * Fixe locate heap buffer overflow when using databases in old format. (CVE-2007-2452) Closes: #426862 stable/main/binary-arm/findutils_4.2.28-1etch1_arm.deb findutils (4.2.28-1etch1) stable; urgency=low * Fixe locate heap buffer overflow when using databases in old format. (CVE-2007-2452) Closes: #426862 stable/main/binary-hppa/findutils_4.2.28-1etch1_hppa.deb findutils (4.2.28-1etch1) stable; urgency=low * Fixe locate heap buffer overflow when using databases in old format. (CVE-2007-2452) Closes: #426862 stable/main/source/findutils_4.2.28-1etch1.dsc stable/main/source/findutils_4.2.28-1etch1.diff.gz stable/main/binary-i386/findutils_4.2.28-1etch1_i386.deb findutils (4.2.28-1etch1) stable; urgency=low * Fixe locate heap buffer overflow when using databases in old format. (CVE-2007-2452) Closes: #426862 stable/main/binary-ia64/findutils_4.2.28-1etch1_ia64.deb findutils (4.2.28-1etch1) stable; urgency=low * Fixe locate heap buffer overflow when using databases in old format. (CVE-2007-2452) Closes: #426862 stable/main/binary-mips/findutils_4.2.28-1etch1_mips.deb findutils (4.2.28-1etch1) stable; urgency=low * Fixe locate heap buffer overflow when using databases in old format. (CVE-2007-2452) Closes: #426862 stable/main/binary-mipsel/findutils_4.2.28-1etch1_mipsel.deb findutils (4.2.28-1etch1) stable; urgency=low * Fixe locate heap buffer overflow when using databases in old format. (CVE-2007-2452) Closes: #426862 stable/main/binary-powerpc/findutils_4.2.28-1etch1_powerpc.deb findutils (4.2.28-1etch1) stable; urgency=low * Fixe locate heap buffer overflow when using databases in old format. (CVE-2007-2452) Closes: #426862 stable/main/binary-s390/findutils_4.2.28-1etch1_s390.deb findutils (4.2.28-1etch1) stable; urgency=low * Fixe locate heap buffer overflow when using databases in old format. (CVE-2007-2452) Closes: #426862 stable/main/binary-sparc/findutils_4.2.28-1etch1_sparc.deb findutils (4.2.28-1etch1) stable; urgency=low * Fixe locate heap buffer overflow when using databases in old format. (CVE-2007-2452) Closes: #426862 stable/main/binary-alpha/fireflier-server_1.1.6-3etch1_alpha.deb stable/main/binary-alpha/fireflier-client-qt_1.1.6-3etch1_alpha.deb stable/main/binary-alpha/fireflier-client-kde_1.1.6-3etch1_alpha.deb stable/main/binary-alpha/fireflier-client-gtk_1.1.6-3etch1_alpha.deb fireflier (1.1.6-3etch1) stable-security; urgency=high * Non-maintainer upload by The Security Team. * Fix the unsafe usage of temporary files, allowing arbitary file deletion. [CVE-2007-2837] stable/main/source/fireflier_1.1.6-3etch1.dsc stable/main/source/fireflier_1.1.6-3etch1.tar.gz stable/main/binary-amd64/fireflier-server_1.1.6-3etch1_amd64.deb stable/main/binary-amd64/fireflier-client-qt_1.1.6-3etch1_amd64.deb stable/main/binary-amd64/fireflier-client-kde_1.1.6-3etch1_amd64.deb stable/main/binary-amd64/fireflier-client-gtk_1.1.6-3etch1_amd64.deb fireflier (1.1.6-3etch1) stable-security; urgency=high * Non-maintainer upload by The Security Team. * Fix the unsafe usage of temporary files, allowing arbitary file deletion. [CVE-2007-2837] stable/main/binary-arm/fireflier-server_1.1.6-3etch1_arm.deb stable/main/binary-arm/fireflier-client-qt_1.1.6-3etch1_arm.deb stable/main/binary-arm/fireflier-client-kde_1.1.6-3etch1_arm.deb stable/main/binary-arm/fireflier-client-gtk_1.1.6-3etch1_arm.deb fireflier (1.1.6-3etch1) stable-security; urgency=high * Non-maintainer upload by The Security Team. * Fix the unsafe usage of temporary files, allowing arbitary file deletion. [CVE-2007-2837] stable/main/binary-hppa/fireflier-server_1.1.6-3etch1_hppa.deb stable/main/binary-hppa/fireflier-client-qt_1.1.6-3etch1_hppa.deb stable/main/binary-hppa/fireflier-client-kde_1.1.6-3etch1_hppa.deb stable/main/binary-hppa/fireflier-client-gtk_1.1.6-3etch1_hppa.deb fireflier (1.1.6-3etch1) stable-security; urgency=high * Non-maintainer upload by The Security Team. * Fix the unsafe usage of temporary files, allowing arbitary file deletion. [CVE-2007-2837] stable/main/binary-i386/fireflier-server_1.1.6-3etch1_i386.deb stable/main/binary-i386/fireflier-client-qt_1.1.6-3etch1_i386.deb stable/main/binary-i386/fireflier-client-kde_1.1.6-3etch1_i386.deb stable/main/binary-i386/fireflier-client-gtk_1.1.6-3etch1_i386.deb fireflier (1.1.6-3etch1) stable-security; urgency=high * Non-maintainer upload by The Security Team. * Fix the unsafe usage of temporary files, allowing arbitary file deletion. [CVE-2007-2837] stable/main/binary-ia64/fireflier-server_1.1.6-3etch1_ia64.deb stable/main/binary-ia64/fireflier-client-qt_1.1.6-3etch1_ia64.deb stable/main/binary-ia64/fireflier-client-kde_1.1.6-3etch1_ia64.deb stable/main/binary-ia64/fireflier-client-gtk_1.1.6-3etch1_ia64.deb fireflier (1.1.6-3etch1) stable-security; urgency=high * Non-maintainer upload by The Security Team. * Fix the unsafe usage of temporary files, allowing arbitary file deletion. [CVE-2007-2837] stable/main/binary-mips/fireflier-server_1.1.6-3etch1_mips.deb stable/main/binary-mips/fireflier-client-qt_1.1.6-3etch1_mips.deb stable/main/binary-mips/fireflier-client-kde_1.1.6-3etch1_mips.deb stable/main/binary-mips/fireflier-client-gtk_1.1.6-3etch1_mips.deb fireflier (1.1.6-3etch1) stable-security; urgency=high * Non-maintainer upload by The Security Team. * Fix the unsafe usage of temporary files, allowing arbitary file deletion. [CVE-2007-2837] stable/main/binary-mipsel/fireflier-server_1.1.6-3etch1_mipsel.deb stable/main/binary-mipsel/fireflier-client-qt_1.1.6-3etch1_mipsel.deb stable/main/binary-mipsel/fireflier-client-kde_1.1.6-3etch1_mipsel.deb stable/main/binary-mipsel/fireflier-client-gtk_1.1.6-3etch1_mipsel.deb fireflier (1.1.6-3etch1) stable-security; urgency=high * Non-maintainer upload by The Security Team. * Fix the unsafe usage of temporary files, allowing arbitary file deletion. [CVE-2007-2837] stable/main/binary-powerpc/fireflier-server_1.1.6-3etch1_powerpc.deb stable/main/binary-powerpc/fireflier-client-qt_1.1.6-3etch1_powerpc.deb stable/main/binary-powerpc/fireflier-client-kde_1.1.6-3etch1_powerpc.deb stable/main/binary-powerpc/fireflier-client-gtk_1.1.6-3etch1_powerpc.deb fireflier (1.1.6-3etch1) stable-security; urgency=high * Non-maintainer upload by The Security Team. * Fix the unsafe usage of temporary files, allowing arbitary file deletion. [CVE-2007-2837] stable/main/binary-s390/fireflier-server_1.1.6-3etch1_s390.deb stable/main/binary-s390/fireflier-client-qt_1.1.6-3etch1_s390.deb stable/main/binary-s390/fireflier-client-kde_1.1.6-3etch1_s390.deb stable/main/binary-s390/fireflier-client-gtk_1.1.6-3etch1_s390.deb fireflier (1.1.6-3etch1) stable-security; urgency=high * Non-maintainer upload by The Security Team. * Fix the unsafe usage of temporary files, allowing arbitary file deletion. [CVE-2007-2837] stable/main/binary-sparc/fireflier-server_1.1.6-3etch1_sparc.deb stable/main/binary-sparc/fireflier-client-qt_1.1.6-3etch1_sparc.deb stable/main/binary-sparc/fireflier-client-kde_1.1.6-3etch1_sparc.deb stable/main/binary-sparc/fireflier-client-gtk_1.1.6-3etch1_sparc.deb fireflier (1.1.6-3etch1) stable-security; urgency=high * Non-maintainer upload by The Security Team. * Fix the unsafe usage of temporary files, allowing arbitary file deletion. [CVE-2007-2837] stable/contrib/source/flashplugin-nonfree_9.0.115.0.1~etch1.dsc stable/contrib/source/flashplugin-nonfree_9.0.115.0.1~etch1.tar.gz stable/contrib/binary-i386/flashplugin-nonfree_9.0.115.0.1~etch1_i386.deb flashplugin-nonfree (9.0.115.0.1~etch1) stable; urgency=low * New plugin release "LNX 9,0,115,0". stable/main/source/gallery2_2.1.2-2.0.etch.1.dsc stable/main/source/gallery2_2.1.2.orig.tar.gz stable/main/source/gallery2_2.1.2-2.0.etch.1.diff.gz stable/main/binary-all/gallery2_2.1.2-2.0.etch.1_all.deb gallery2 (2.1.2-2.0.etch.1) stable-security; urgency=high * Fix multiple unspecified vulnerabilities that allowed attackers to edit unspecified data files using "linked items" in the Reupload module [CVE-2007-4650] (Closes: #441407) stable/main/source/gforge_4.5.14-22etch3.dsc stable/main/source/gforge_4.5.14-22etch3.diff.gz stable/main/binary-all/gforge_4.5.14-22etch3_all.deb stable/main/binary-all/gforge-common_4.5.14-22etch3_all.deb stable/main/binary-all/gforge-web-apache_4.5.14-22etch3_all.deb stable/main/binary-all/gforge-db-postgresql_4.5.14-22etch3_all.deb stable/main/binary-all/gforge-mta-exim4_4.5.14-22etch3_all.deb stable/main/binary-all/gforge-mta-exim_4.5.14-22etch3_all.deb stable/main/binary-all/gforge-mta-postfix_4.5.14-22etch3_all.deb stable/main/binary-all/gforge-mta-courier_4.5.14-22etch3_all.deb stable/main/binary-all/gforge-shell-ldap_4.5.14-22etch3_all.deb stable/main/binary-all/gforge-shell-postgresql_4.5.14-22etch3_all.deb stable/main/binary-all/gforge-ftp-proftpd_4.5.14-22etch3_all.deb stable/main/binary-all/gforge-ldap-openldap_4.5.14-22etch3_all.deb stable/main/binary-all/gforge-dns-bind9_4.5.14-22etch3_all.deb stable/main/binary-all/gforge-lists-mailman_4.5.14-22etch3_all.deb gforge (4.5.14-22etch3) stable-security; urgency=high * Fixed denial of service and file truncation vulnerabilities (CVE-2007-3921). stable/main/binary-alpha/libgimp2.0_2.2.13-1etch4_alpha.deb stable/main/binary-alpha/gimp-helpbrowser_2.2.13-1etch4_alpha.deb stable/main/binary-alpha/gimp-python_2.2.13-1etch4_alpha.deb stable/main/binary-alpha/gimp-svg_2.2.13-1etch4_alpha.deb stable/main/binary-alpha/gimp_2.2.13-1etch4_alpha.deb stable/main/binary-alpha/libgimp2.0-dev_2.2.13-1etch4_alpha.deb stable/main/binary-alpha/gimp-dbg_2.2.13-1etch4_alpha.deb gimp (2.2.13-1etch4) stable-security; urgency=high * Fix PSD regression spotted by Ari stable/main/binary-amd64/libgimp2.0_2.2.13-1etch4_amd64.deb stable/main/binary-amd64/gimp-helpbrowser_2.2.13-1etch4_amd64.deb stable/main/binary-amd64/gimp-python_2.2.13-1etch4_amd64.deb stable/main/binary-amd64/gimp-svg_2.2.13-1etch4_amd64.deb stable/main/binary-amd64/gimp_2.2.13-1etch4_amd64.deb stable/main/binary-amd64/libgimp2.0-dev_2.2.13-1etch4_amd64.deb stable/main/binary-amd64/gimp-dbg_2.2.13-1etch4_amd64.deb gimp (2.2.13-1etch4) stable-security; urgency=high * Fix PSD regression spotted by Ari stable/main/binary-arm/libgimp2.0_2.2.13-1etch4_arm.deb stable/main/binary-arm/gimp-helpbrowser_2.2.13-1etch4_arm.deb stable/main/binary-arm/gimp-python_2.2.13-1etch4_arm.deb stable/main/binary-arm/gimp-svg_2.2.13-1etch4_arm.deb stable/main/binary-arm/gimp_2.2.13-1etch4_arm.deb stable/main/binary-arm/libgimp2.0-dev_2.2.13-1etch4_arm.deb stable/main/binary-arm/gimp-dbg_2.2.13-1etch4_arm.deb gimp (2.2.13-1etch4) stable-security; urgency=high * Fix PSD regression spotted by Ari stable/main/binary-hppa/libgimp2.0_2.2.13-1etch4_hppa.deb stable/main/binary-hppa/gimp-helpbrowser_2.2.13-1etch4_hppa.deb stable/main/binary-hppa/gimp-python_2.2.13-1etch4_hppa.deb stable/main/binary-hppa/gimp-svg_2.2.13-1etch4_hppa.deb stable/main/binary-hppa/gimp_2.2.13-1etch4_hppa.deb stable/main/binary-hppa/libgimp2.0-dev_2.2.13-1etch4_hppa.deb stable/main/binary-hppa/gimp-dbg_2.2.13-1etch4_hppa.deb gimp (2.2.13-1etch4) stable-security; urgency=high * Fix PSD regression spotted by Ari stable/main/source/gimp_2.2.13-1etch4.dsc stable/main/source/gimp_2.2.13-1etch4.diff.gz stable/main/binary-all/gimp-data_2.2.13-1etch4_all.deb stable/main/binary-all/libgimp2.0-doc_2.2.13-1etch4_all.deb stable/main/binary-i386/libgimp2.0_2.2.13-1etch4_i386.deb stable/main/binary-i386/gimp-helpbrowser_2.2.13-1etch4_i386.deb stable/main/binary-i386/gimp-python_2.2.13-1etch4_i386.deb stable/main/binary-i386/gimp-svg_2.2.13-1etch4_i386.deb stable/main/binary-i386/gimp_2.2.13-1etch4_i386.deb stable/main/binary-i386/libgimp2.0-dev_2.2.13-1etch4_i386.deb stable/main/binary-i386/gimp-dbg_2.2.13-1etch4_i386.deb gimp (2.2.13-1etch4) stable-security; urgency=high * Fix PSD regression spotted by Ari stable/main/binary-ia64/libgimp2.0_2.2.13-1etch4_ia64.deb stable/main/binary-ia64/gimp-helpbrowser_2.2.13-1etch4_ia64.deb stable/main/binary-ia64/gimp-python_2.2.13-1etch4_ia64.deb stable/main/binary-ia64/gimp-svg_2.2.13-1etch4_ia64.deb stable/main/binary-ia64/gimp_2.2.13-1etch4_ia64.deb stable/main/binary-ia64/libgimp2.0-dev_2.2.13-1etch4_ia64.deb stable/main/binary-ia64/gimp-dbg_2.2.13-1etch4_ia64.deb gimp (2.2.13-1etch4) stable-security; urgency=high * Fix PSD regression spotted by Ari stable/main/binary-mips/libgimp2.0_2.2.13-1etch4_mips.deb stable/main/binary-mips/gimp-helpbrowser_2.2.13-1etch4_mips.deb stable/main/binary-mips/gimp-python_2.2.13-1etch4_mips.deb stable/main/binary-mips/gimp-svg_2.2.13-1etch4_mips.deb stable/main/binary-mips/gimp_2.2.13-1etch4_mips.deb stable/main/binary-mips/libgimp2.0-dev_2.2.13-1etch4_mips.deb stable/main/binary-mips/gimp-dbg_2.2.13-1etch4_mips.deb gimp (2.2.13-1etch4) stable-security; urgency=high * Fix PSD regression spotted by Ari stable/main/binary-mipsel/libgimp2.0_2.2.13-1etch4_mipsel.deb stable/main/binary-mipsel/gimp-helpbrowser_2.2.13-1etch4_mipsel.deb stable/main/binary-mipsel/gimp-python_2.2.13-1etch4_mipsel.deb stable/main/binary-mipsel/gimp-svg_2.2.13-1etch4_mipsel.deb stable/main/binary-mipsel/gimp_2.2.13-1etch4_mipsel.deb stable/main/binary-mipsel/libgimp2.0-dev_2.2.13-1etch4_mipsel.deb stable/main/binary-mipsel/gimp-dbg_2.2.13-1etch4_mipsel.deb gimp (2.2.13-1etch4) stable-security; urgency=high * Fix PSD regression spotted by Ari stable/main/binary-powerpc/libgimp2.0_2.2.13-1etch4_powerpc.deb stable/main/binary-powerpc/gimp-helpbrowser_2.2.13-1etch4_powerpc.deb stable/main/binary-powerpc/gimp-python_2.2.13-1etch4_powerpc.deb stable/main/binary-powerpc/gimp-svg_2.2.13-1etch4_powerpc.deb stable/main/binary-powerpc/gimp_2.2.13-1etch4_powerpc.deb stable/main/binary-powerpc/libgimp2.0-dev_2.2.13-1etch4_powerpc.deb stable/main/binary-powerpc/gimp-dbg_2.2.13-1etch4_powerpc.deb gimp (2.2.13-1etch4) stable-security; urgency=high * Fix PSD regression spotted by Ari stable/main/binary-s390/libgimp2.0_2.2.13-1etch4_s390.deb stable/main/binary-s390/gimp-helpbrowser_2.2.13-1etch4_s390.deb stable/main/binary-s390/gimp-python_2.2.13-1etch4_s390.deb stable/main/binary-s390/gimp-svg_2.2.13-1etch4_s390.deb stable/main/binary-s390/gimp_2.2.13-1etch4_s390.deb stable/main/binary-s390/libgimp2.0-dev_2.2.13-1etch4_s390.deb stable/main/binary-s390/gimp-dbg_2.2.13-1etch4_s390.deb gimp (2.2.13-1etch4) stable-security; urgency=high * Fix PSD regression spotted by Ari stable/main/binary-sparc/libgimp2.0_2.2.13-1etch4_sparc.deb stable/main/binary-sparc/gimp-helpbrowser_2.2.13-1etch4_sparc.deb stable/main/binary-sparc/gimp-python_2.2.13-1etch4_sparc.deb stable/main/binary-sparc/gimp-svg_2.2.13-1etch4_sparc.deb stable/main/binary-sparc/gimp_2.2.13-1etch4_sparc.deb stable/main/binary-sparc/libgimp2.0-dev_2.2.13-1etch4_sparc.deb stable/main/binary-sparc/gimp-dbg_2.2.13-1etch4_sparc.deb gimp (2.2.13-1etch4) stable-security; urgency=high * Fix PSD regression spotted by Ari stable/main/binary-alpha/libc6.1_2.3.6.ds1-13etch4_alpha.deb stable/main/binary-alpha/libc6.1-dev_2.3.6.ds1-13etch4_alpha.deb stable/main/binary-alpha/libc6.1-prof_2.3.6.ds1-13etch4_alpha.deb stable/main/binary-alpha/libc6.1-pic_2.3.6.ds1-13etch4_alpha.deb stable/main/binary-alpha/locales-all_2.3.6.ds1-13etch4_alpha.deb stable/main/binary-alpha/nscd_2.3.6.ds1-13etch4_alpha.deb stable/main/binary-alpha/libc6.1-dbg_2.3.6.ds1-13etch4_alpha.deb stable/main/libc6.1-udeb_2.3.6.ds1-13etch4_alpha.udeb stable/main/libnss-dns-udeb_2.3.6.ds1-13etch4_alpha.udeb stable/main/libnss-files-udeb_2.3.6.ds1-13etch4_alpha.udeb glibc (2.3.6.ds1-13etch4) stable; urgency=low * patches/any/cvs-vfscanf.diff: add additional test for EOF in loop to look for conversion specifier to avoid testing of wrong errno value. Closes: #426000. stable/main/source/glibc_2.3.6.ds1-13etch4.dsc stable/main/source/glibc_2.3.6.ds1-13etch4.diff.gz stable/main/binary-all/glibc-doc_2.3.6.ds1-13etch4_all.deb stable/main/binary-all/locales_2.3.6.ds1-13etch4_all.deb stable/main/binary-amd64/libc6_2.3.6.ds1-13etch4_amd64.deb stable/main/binary-amd64/libc6-dev_2.3.6.ds1-13etch4_amd64.deb stable/main/binary-amd64/libc6-prof_2.3.6.ds1-13etch4_amd64.deb stable/main/binary-amd64/libc6-pic_2.3.6.ds1-13etch4_amd64.deb stable/main/binary-amd64/locales-all_2.3.6.ds1-13etch4_amd64.deb stable/main/binary-amd64/libc6-i386_2.3.6.ds1-13etch4_amd64.deb stable/main/binary-amd64/libc6-dev-i386_2.3.6.ds1-13etch4_amd64.deb stable/main/binary-amd64/nscd_2.3.6.ds1-13etch4_amd64.deb stable/main/binary-amd64/libc6-dbg_2.3.6.ds1-13etch4_amd64.deb stable/main/libc6-udeb_2.3.6.ds1-13etch4_amd64.udeb stable/main/libnss-dns-udeb_2.3.6.ds1-13etch4_amd64.udeb stable/main/libnss-files-udeb_2.3.6.ds1-13etch4_amd64.udeb glibc (2.3.6.ds1-13etch4) stable; urgency=low * patches/any/cvs-vfscanf.diff: add additional test for EOF in loop to look for conversion specifier to avoid testing of wrong errno value. Closes: #426000. stable/main/binary-arm/libc6_2.3.6.ds1-13etch4_arm.deb stable/main/binary-arm/libc6-dev_2.3.6.ds1-13etch4_arm.deb stable/main/binary-arm/libc6-prof_2.3.6.ds1-13etch4_arm.deb stable/main/binary-arm/libc6-pic_2.3.6.ds1-13etch4_arm.deb stable/main/binary-arm/locales-all_2.3.6.ds1-13etch4_arm.deb stable/main/binary-arm/nscd_2.3.6.ds1-13etch4_arm.deb stable/main/binary-arm/libc6-dbg_2.3.6.ds1-13etch4_arm.deb stable/main/libc6-udeb_2.3.6.ds1-13etch4_arm.udeb stable/main/libnss-dns-udeb_2.3.6.ds1-13etch4_arm.udeb stable/main/libnss-files-udeb_2.3.6.ds1-13etch4_arm.udeb glibc (2.3.6.ds1-13etch4) stable; urgency=low * patches/any/cvs-vfscanf.diff: add additional test for EOF in loop to look for conversion specifier to avoid testing of wrong errno value. Closes: #426000. stable/main/binary-hppa/libc6_2.3.6.ds1-13etch4_hppa.deb stable/main/binary-hppa/libc6-dev_2.3.6.ds1-13etch4_hppa.deb stable/main/binary-hppa/libc6-prof_2.3.6.ds1-13etch4_hppa.deb stable/main/binary-hppa/libc6-pic_2.3.6.ds1-13etch4_hppa.deb stable/main/binary-hppa/locales-all_2.3.6.ds1-13etch4_hppa.deb stable/main/binary-hppa/nscd_2.3.6.ds1-13etch4_hppa.deb stable/main/binary-hppa/libc6-dbg_2.3.6.ds1-13etch4_hppa.deb stable/main/libc6-udeb_2.3.6.ds1-13etch4_hppa.udeb stable/main/libnss-dns-udeb_2.3.6.ds1-13etch4_hppa.udeb stable/main/libnss-files-udeb_2.3.6.ds1-13etch4_hppa.udeb glibc (2.3.6.ds1-13etch4) stable; urgency=low * patches/any/cvs-vfscanf.diff: add additional test for EOF in loop to look for conversion specifier to avoid testing of wrong errno value. Closes: #426000. stable/main/binary-i386/libc6_2.3.6.ds1-13etch4_i386.deb stable/main/binary-i386/libc6-dev_2.3.6.ds1-13etch4_i386.deb stable/main/binary-i386/libc6-prof_2.3.6.ds1-13etch4_i386.deb stable/main/binary-i386/libc6-pic_2.3.6.ds1-13etch4_i386.deb stable/main/binary-i386/locales-all_2.3.6.ds1-13etch4_i386.deb stable/main/binary-i386/libc6-i686_2.3.6.ds1-13etch4_i386.deb stable/main/binary-i386/libc6-xen_2.3.6.ds1-13etch4_i386.deb stable/main/binary-i386/libc6-amd64_2.3.6.ds1-13etch4_i386.deb stable/main/binary-i386/libc6-dev-amd64_2.3.6.ds1-13etch4_i386.deb stable/main/binary-i386/nscd_2.3.6.ds1-13etch4_i386.deb stable/main/binary-i386/libc6-dbg_2.3.6.ds1-13etch4_i386.deb stable/main/libc6-udeb_2.3.6.ds1-13etch4_i386.udeb stable/main/libnss-dns-udeb_2.3.6.ds1-13etch4_i386.udeb stable/main/libnss-files-udeb_2.3.6.ds1-13etch4_i386.udeb glibc (2.3.6.ds1-13etch4) stable; urgency=low * patches/any/cvs-vfscanf.diff: add additional test for EOF in loop to look for conversion specifier to avoid testing of wrong errno value. Closes: #426000. stable/main/binary-ia64/libc6.1_2.3.6.ds1-13etch4_ia64.deb stable/main/binary-ia64/libc6.1-dev_2.3.6.ds1-13etch4_ia64.deb stable/main/binary-ia64/libc6.1-prof_2.3.6.ds1-13etch4_ia64.deb stable/main/binary-ia64/libc6.1-pic_2.3.6.ds1-13etch4_ia64.deb stable/main/binary-ia64/locales-all_2.3.6.ds1-13etch4_ia64.deb stable/main/binary-ia64/nscd_2.3.6.ds1-13etch4_ia64.deb stable/main/binary-ia64/libc6.1-dbg_2.3.6.ds1-13etch4_ia64.deb stable/main/libc6.1-udeb_2.3.6.ds1-13etch4_ia64.udeb stable/main/libnss-dns-udeb_2.3.6.ds1-13etch4_ia64.udeb stable/main/libnss-files-udeb_2.3.6.ds1-13etch4_ia64.udeb glibc (2.3.6.ds1-13etch4) stable; urgency=low * patches/any/cvs-vfscanf.diff: add additional test for EOF in loop to look for conversion specifier to avoid testing of wrong errno value. Closes: #426000. stable/main/binary-mips/libc6_2.3.6.ds1-13etch4_mips.deb stable/main/binary-mips/libc6-dev_2.3.6.ds1-13etch4_mips.deb stable/main/binary-mips/libc6-prof_2.3.6.ds1-13etch4_mips.deb stable/main/binary-mips/libc6-pic_2.3.6.ds1-13etch4_mips.deb stable/main/binary-mips/locales-all_2.3.6.ds1-13etch4_mips.deb stable/main/binary-mips/nscd_2.3.6.ds1-13etch4_mips.deb stable/main/binary-mips/libc6-dbg_2.3.6.ds1-13etch4_mips.deb stable/main/libc6-udeb_2.3.6.ds1-13etch4_mips.udeb stable/main/libnss-dns-udeb_2.3.6.ds1-13etch4_mips.udeb stable/main/libnss-files-udeb_2.3.6.ds1-13etch4_mips.udeb glibc (2.3.6.ds1-13etch4) stable; urgency=low * patches/any/cvs-vfscanf.diff: add additional test for EOF in loop to look for conversion specifier to avoid testing of wrong errno value. Closes: #426000. stable/main/binary-mipsel/libc6_2.3.6.ds1-13etch4_mipsel.deb stable/main/binary-mipsel/libc6-dev_2.3.6.ds1-13etch4_mipsel.deb stable/main/binary-mipsel/libc6-prof_2.3.6.ds1-13etch4_mipsel.deb stable/main/binary-mipsel/libc6-pic_2.3.6.ds1-13etch4_mipsel.deb stable/main/binary-mipsel/locales-all_2.3.6.ds1-13etch4_mipsel.deb stable/main/binary-mipsel/nscd_2.3.6.ds1-13etch4_mipsel.deb stable/main/binary-mipsel/libc6-dbg_2.3.6.ds1-13etch4_mipsel.deb stable/main/libc6-udeb_2.3.6.ds1-13etch4_mipsel.udeb stable/main/libnss-dns-udeb_2.3.6.ds1-13etch4_mipsel.udeb stable/main/libnss-files-udeb_2.3.6.ds1-13etch4_mipsel.udeb glibc (2.3.6.ds1-13etch4) stable; urgency=low * patches/any/cvs-vfscanf.diff: add additional test for EOF in loop to look for conversion specifier to avoid testing of wrong errno value. Closes: #426000. stable/main/binary-powerpc/libc6_2.3.6.ds1-13etch4_powerpc.deb stable/main/binary-powerpc/libc6-dev_2.3.6.ds1-13etch4_powerpc.deb stable/main/binary-powerpc/libc6-prof_2.3.6.ds1-13etch4_powerpc.deb stable/main/binary-powerpc/libc6-pic_2.3.6.ds1-13etch4_powerpc.deb stable/main/binary-powerpc/locales-all_2.3.6.ds1-13etch4_powerpc.deb stable/main/binary-powerpc/libc6-ppc64_2.3.6.ds1-13etch4_powerpc.deb stable/main/binary-powerpc/libc6-dev-ppc64_2.3.6.ds1-13etch4_powerpc.deb stable/main/binary-powerpc/nscd_2.3.6.ds1-13etch4_powerpc.deb stable/main/binary-powerpc/libc6-dbg_2.3.6.ds1-13etch4_powerpc.deb stable/main/libc6-udeb_2.3.6.ds1-13etch4_powerpc.udeb stable/main/libnss-dns-udeb_2.3.6.ds1-13etch4_powerpc.udeb stable/main/libnss-files-udeb_2.3.6.ds1-13etch4_powerpc.udeb glibc (2.3.6.ds1-13etch4) stable; urgency=low * patches/any/cvs-vfscanf.diff: add additional test for EOF in loop to look for conversion specifier to avoid testing of wrong errno value. Closes: #426000. stable/main/binary-s390/libc6_2.3.6.ds1-13etch4_s390.deb stable/main/binary-s390/libc6-dev_2.3.6.ds1-13etch4_s390.deb stable/main/binary-s390/libc6-prof_2.3.6.ds1-13etch4_s390.deb stable/main/binary-s390/libc6-pic_2.3.6.ds1-13etch4_s390.deb stable/main/binary-s390/locales-all_2.3.6.ds1-13etch4_s390.deb stable/main/binary-s390/libc6-s390x_2.3.6.ds1-13etch4_s390.deb stable/main/binary-s390/libc6-dev-s390x_2.3.6.ds1-13etch4_s390.deb stable/main/binary-s390/nscd_2.3.6.ds1-13etch4_s390.deb stable/main/binary-s390/libc6-dbg_2.3.6.ds1-13etch4_s390.deb stable/main/libc6-udeb_2.3.6.ds1-13etch4_s390.udeb stable/main/libnss-dns-udeb_2.3.6.ds1-13etch4_s390.udeb stable/main/libnss-files-udeb_2.3.6.ds1-13etch4_s390.udeb glibc (2.3.6.ds1-13etch4) stable; urgency=low * patches/any/cvs-vfscanf.diff: add additional test for EOF in loop to look for conversion specifier to avoid testing of wrong errno value. Closes: #426000. stable/main/binary-sparc/libc6_2.3.6.ds1-13etch4_sparc.deb stable/main/binary-sparc/libc6-dev_2.3.6.ds1-13etch4_sparc.deb stable/main/binary-sparc/libc6-prof_2.3.6.ds1-13etch4_sparc.deb stable/main/binary-sparc/libc6-pic_2.3.6.ds1-13etch4_sparc.deb stable/main/binary-sparc/locales-all_2.3.6.ds1-13etch4_sparc.deb stable/main/binary-sparc/libc6-sparc64_2.3.6.ds1-13etch4_sparc.deb stable/main/binary-sparc/libc6-dev-sparc64_2.3.6.ds1-13etch4_sparc.deb stable/main/binary-sparc/libc6-sparcv9_2.3.6.ds1-13etch4_sparc.deb stable/main/binary-sparc/libc6-sparcv9b_2.3.6.ds1-13etch4_sparc.deb stable/main/binary-sparc/nscd_2.3.6.ds1-13etch4_sparc.deb stable/main/binary-sparc/libc6-dbg_2.3.6.ds1-13etch4_sparc.deb stable/main/libc6-udeb_2.3.6.ds1-13etch4_sparc.udeb stable/main/libnss-dns-udeb_2.3.6.ds1-13etch4_sparc.udeb stable/main/libnss-files-udeb_2.3.6.ds1-13etch4_sparc.udeb glibc (2.3.6.ds1-13etch4) stable; urgency=low * patches/any/cvs-vfscanf.diff: add additional test for EOF in loop to look for conversion specifier to avoid testing of wrong errno value. Closes: #426000. stable/main/binary-alpha/gnome-hearts_0.1.3-2etch1_alpha.deb gnome-hearts (0.1.3-2etch1) stable; urgency=low * Depend on librsvg2-common (closes: #421372, #430584). stable/main/binary-amd64/gnome-hearts_0.1.3-2etch1_amd64.deb gnome-hearts (0.1.3-2etch1) stable; urgency=low * Depend on librsvg2-common (closes: #421372, #430584). stable/main/binary-arm/gnome-hearts_0.1.3-2etch1_arm.deb gnome-hearts (0.1.3-2etch1) stable; urgency=low * Depend on librsvg2-common (closes: #421372, #430584). stable/main/binary-hppa/gnome-hearts_0.1.3-2etch1_hppa.deb gnome-hearts (0.1.3-2etch1) stable; urgency=low * Depend on librsvg2-common (closes: #421372, #430584). stable/main/source/gnome-hearts_0.1.3-2etch1.dsc stable/main/source/gnome-hearts_0.1.3-2etch1.diff.gz stable/main/binary-i386/gnome-hearts_0.1.3-2etch1_i386.deb gnome-hearts (0.1.3-2etch1) stable; urgency=low * Depend on librsvg2-common (closes: #421372, #430584). stable/main/binary-ia64/gnome-hearts_0.1.3-2etch1_ia64.deb gnome-hearts (0.1.3-2etch1) stable; urgency=low * Depend on librsvg2-common (closes: #421372, #430584). stable/main/binary-mips/gnome-hearts_0.1.3-2etch1_mips.deb gnome-hearts (0.1.3-2etch1) stable; urgency=low * Depend on librsvg2-common (closes: #421372, #430584). stable/main/binary-mipsel/gnome-hearts_0.1.3-2etch1_mipsel.deb gnome-hearts (0.1.3-2etch1) stable; urgency=low * Depend on librsvg2-common (closes: #421372, #430584). stable/main/binary-powerpc/gnome-hearts_0.1.3-2etch1_powerpc.deb gnome-hearts (0.1.3-2etch1) stable; urgency=low * Depend on librsvg2-common (closes: #421372, #430584). stable/main/binary-s390/gnome-hearts_0.1.3-2etch1_s390.deb gnome-hearts (0.1.3-2etch1) stable; urgency=low * Depend on librsvg2-common (closes: #421372, #430584). stable/main/binary-sparc/gnome-hearts_0.1.3-2etch1_sparc.deb gnome-hearts (0.1.3-2etch1) stable; urgency=low * Depend on librsvg2-common (closes: #421372, #430584). stable/main/binary-alpha/gnome-panel_2.14.3-6_alpha.deb stable/main/binary-alpha/libpanel-applet2-0_2.14.3-6_alpha.deb stable/main/binary-alpha/libpanel-applet2-dbg_2.14.3-6_alpha.deb stable/main/binary-alpha/libpanel-applet2-dev_2.14.3-6_alpha.deb gnome-panel (2.14.3-6) stable; urgency=low * 02_switch-user_lock.patch: new patch; lock screen when switching user. Closes: #433259. stable/main/binary-amd64/gnome-panel_2.14.3-6_amd64.deb stable/main/binary-amd64/libpanel-applet2-0_2.14.3-6_amd64.deb stable/main/binary-amd64/libpanel-applet2-dbg_2.14.3-6_amd64.deb stable/main/binary-amd64/libpanel-applet2-dev_2.14.3-6_amd64.deb gnome-panel (2.14.3-6) stable; urgency=low * 02_switch-user_lock.patch: new patch; lock screen when switching user. Closes: #433259. stable/main/binary-arm/gnome-panel_2.14.3-6_arm.deb stable/main/binary-arm/libpanel-applet2-0_2.14.3-6_arm.deb stable/main/binary-arm/libpanel-applet2-dbg_2.14.3-6_arm.deb stable/main/binary-arm/libpanel-applet2-dev_2.14.3-6_arm.deb gnome-panel (2.14.3-6) stable; urgency=low * 02_switch-user_lock.patch: new patch; lock screen when switching user. Closes: #433259. stable/main/binary-hppa/gnome-panel_2.14.3-6_hppa.deb stable/main/binary-hppa/libpanel-applet2-0_2.14.3-6_hppa.deb stable/main/binary-hppa/libpanel-applet2-dbg_2.14.3-6_hppa.deb stable/main/binary-hppa/libpanel-applet2-dev_2.14.3-6_hppa.deb gnome-panel (2.14.3-6) stable; urgency=low * 02_switch-user_lock.patch: new patch; lock screen when switching user. Closes: #433259. stable/main/source/gnome-panel_2.14.3-6.dsc stable/main/source/gnome-panel_2.14.3-6.diff.gz stable/main/binary-all/libpanel-applet2-doc_2.14.3-6_all.deb stable/main/binary-all/gnome-panel-data_2.14.3-6_all.deb stable/main/binary-i386/gnome-panel_2.14.3-6_i386.deb stable/main/binary-i386/libpanel-applet2-0_2.14.3-6_i386.deb stable/main/binary-i386/libpanel-applet2-dbg_2.14.3-6_i386.deb stable/main/binary-i386/libpanel-applet2-dev_2.14.3-6_i386.deb gnome-panel (2.14.3-6) stable; urgency=low * 02_switch-user_lock.patch: new patch; lock screen when switching user. Closes: #433259. stable/main/binary-ia64/gnome-panel_2.14.3-6_ia64.deb stable/main/binary-ia64/libpanel-applet2-0_2.14.3-6_ia64.deb stable/main/binary-ia64/libpanel-applet2-dbg_2.14.3-6_ia64.deb stable/main/binary-ia64/libpanel-applet2-dev_2.14.3-6_ia64.deb gnome-panel (2.14.3-6) stable; urgency=low * 02_switch-user_lock.patch: new patch; lock screen when switching user. Closes: #433259. stable/main/binary-mips/gnome-panel_2.14.3-6_mips.deb stable/main/binary-mips/libpanel-applet2-0_2.14.3-6_mips.deb stable/main/binary-mips/libpanel-applet2-dbg_2.14.3-6_mips.deb stable/main/binary-mips/libpanel-applet2-dev_2.14.3-6_mips.deb gnome-panel (2.14.3-6) stable; urgency=low * 02_switch-user_lock.patch: new patch; lock screen when switching user. Closes: #433259. stable/main/binary-mipsel/gnome-panel_2.14.3-6_mipsel.deb stable/main/binary-mipsel/libpanel-applet2-0_2.14.3-6_mipsel.deb stable/main/binary-mipsel/libpanel-applet2-dbg_2.14.3-6_mipsel.deb stable/main/binary-mipsel/libpanel-applet2-dev_2.14.3-6_mipsel.deb gnome-panel (2.14.3-6) stable; urgency=low * 02_switch-user_lock.patch: new patch; lock screen when switching user. Closes: #433259. stable/main/binary-powerpc/gnome-panel_2.14.3-6_powerpc.deb stable/main/binary-powerpc/libpanel-applet2-0_2.14.3-6_powerpc.deb stable/main/binary-powerpc/libpanel-applet2-dbg_2.14.3-6_powerpc.deb stable/main/binary-powerpc/libpanel-applet2-dev_2.14.3-6_powerpc.deb gnome-panel (2.14.3-6) stable; urgency=low * 02_switch-user_lock.patch: new patch; lock screen when switching user. Closes: #433259. stable/main/binary-s390/gnome-panel_2.14.3-6_s390.deb stable/main/binary-s390/libpanel-applet2-0_2.14.3-6_s390.deb stable/main/binary-s390/libpanel-applet2-dbg_2.14.3-6_s390.deb stable/main/binary-s390/libpanel-applet2-dev_2.14.3-6_s390.deb gnome-panel (2.14.3-6) stable; urgency=low * 02_switch-user_lock.patch: new patch; lock screen when switching user. Closes: #433259. stable/main/binary-sparc/gnome-panel_2.14.3-6_sparc.deb stable/main/binary-sparc/libpanel-applet2-0_2.14.3-6_sparc.deb stable/main/binary-sparc/libpanel-applet2-dbg_2.14.3-6_sparc.deb stable/main/binary-sparc/libpanel-applet2-dev_2.14.3-6_sparc.deb gnome-panel (2.14.3-6) stable; urgency=low * 02_switch-user_lock.patch: new patch; lock screen when switching user. Closes: #433259. stable/main/source/grub-installer_1.22etch1.dsc stable/main/source/grub-installer_1.22etch1.tar.gz stable/main/grub-installer_1.22etch1_amd64.udeb grub-installer (1.22etch1) stable; urgency=low [ Frans Pop ] * Improve code that sets serial console parameters. Closes: #416310. Changes based on a patch by Alex Owen. stable/main/grub-installer_1.22etch1_i386.udeb grub-installer (1.22etch1) stable; urgency=low [ Frans Pop ] * Improve code that sets serial console parameters. Closes: #416310. Changes based on a patch by Alex Owen. stable/main/binary-alpha/gsambad_0.1.4-2etch1_alpha.deb gsambad (0.1.4-2etch1) stable-security; urgency=high * Non-maintainer upload by The Security Team. * Avoid unsafe usage of temporary files. [CVE-2007-2838] stable/main/source/gsambad_0.1.4-2etch1.dsc stable/main/source/gsambad_0.1.4.orig.tar.gz stable/main/source/gsambad_0.1.4-2etch1.diff.gz stable/main/binary-amd64/gsambad_0.1.4-2etch1_amd64.deb gsambad (0.1.4-2etch1) stable-security; urgency=high * Non-maintainer upload by The Security Team. * Avoid unsafe usage of temporary files. [CVE-2007-2838] stable/main/binary-arm/gsambad_0.1.4-2etch1_arm.deb gsambad (0.1.4-2etch1) stable-security; urgency=high * Non-maintainer upload by The Security Team. * Avoid unsafe usage of temporary files. [CVE-2007-2838] stable/main/binary-hppa/gsambad_0.1.4-2etch1_hppa.deb gsambad (0.1.4-2etch1) stable-security; urgency=high * Non-maintainer upload by The Security Team. * Avoid unsafe usage of temporary files. [CVE-2007-2838] stable/main/binary-i386/gsambad_0.1.4-2etch1_i386.deb gsambad (0.1.4-2etch1) stable-security; urgency=high * Non-maintainer upload by The Security Team. * Avoid unsafe usage of temporary files. [CVE-2007-2838] stable/main/binary-ia64/gsambad_0.1.4-2etch1_ia64.deb gsambad (0.1.4-2etch1) stable-security; urgency=high * Non-maintainer upload by The Security Team. * Avoid unsafe usage of temporary files. [CVE-2007-2838] stable/main/binary-mips/gsambad_0.1.4-2etch1_mips.deb gsambad (0.1.4-2etch1) stable-security; urgency=high * Non-maintainer upload by The Security Team. * Avoid unsafe usage of temporary files. [CVE-2007-2838] stable/main/binary-mipsel/gsambad_0.1.4-2etch1_mipsel.deb gsambad (0.1.4-2etch1) stable-security; urgency=high * Non-maintainer upload by The Security Team. * Avoid unsafe usage of temporary files. [CVE-2007-2838] stable/main/binary-powerpc/gsambad_0.1.4-2etch1_powerpc.deb gsambad (0.1.4-2etch1) stable-security; urgency=high * Non-maintainer upload by The Security Team. * Avoid unsafe usage of temporary files. [CVE-2007-2838] stable/main/binary-s390/gsambad_0.1.4-2etch1_s390.deb gsambad (0.1.4-2etch1) stable-security; urgency=high * Non-maintainer upload by The Security Team. * Avoid unsafe usage of temporary files. [CVE-2007-2838] stable/main/binary-sparc/gsambad_0.1.4-2etch1_sparc.deb gsambad (0.1.4-2etch1) stable-security; urgency=high * Non-maintainer upload by The Security Team. * Avoid unsafe usage of temporary files. [CVE-2007-2838] stable/main/source/hiki_0.8.6-1etch1.dsc stable/main/source/hiki_0.8.6.orig.tar.gz stable/main/source/hiki_0.8.6-1etch1.diff.gz stable/main/binary-all/hiki_0.8.6-1etch1_all.deb hiki (0.8.6-1etch1) stable-security; urgency=high * Non-maintainer upload by The Security Team. * Fixed unsafe use of session variable. [CVE-2007-2836] stable/main/source/horde3_3.1.3-4etch1.dsc stable/main/source/horde3_3.1.3.orig.tar.gz stable/main/source/horde3_3.1.3-4etch1.diff.gz stable/main/binary-all/horde3_3.1.3-4etch1_all.deb horde3 (3.1.3-4etch1) stable-security; urgency=high * Fix XSS vulnerability. See CVE-2007-1473 for more information. (Closes: #434045) stable/main/source/hsqldb_1.8.0.7-1etch1.dsc stable/main/source/hsqldb_1.8.0.7.orig.tar.gz stable/main/source/hsqldb_1.8.0.7-1etch1.diff.gz stable/main/binary-all/libhsqldb-java_1.8.0.7-1etch1_all.deb stable/main/binary-all/libhsqldb-java-doc_1.8.0.7-1etch1_all.deb stable/main/binary-all/hsqldb-server_1.8.0.7-1etch1_all.deb hsqldb (1.8.0.7-1etch1) stable-security; urgency=high * backport hsqldb 1.8.0.9 changes to fix CVE-2007-4575 stable/main/binary-alpha/htdig_3.2.0b6-3.1etch1_alpha.deb htdig (1:3.2.0b6-3.1etch1) stable-security; urgency=high * Non-maintainer upload by the security team * Fix XSS in htsearch by not displaying the sort type in htsearch/Display.cc and libhtdig/ResultFetch.cc anymore, if it is unrecognised, thanks to William Grant Fixes: CVE-2007-6110 stable/main/binary-amd64/htdig_3.2.0b6-3.1etch1_amd64.deb htdig (1:3.2.0b6-3.1etch1) stable-security; urgency=high * Non-maintainer upload by the security team * Fix XSS in htsearch by not displaying the sort type in htsearch/Display.cc and libhtdig/ResultFetch.cc anymore, if it is unrecognised, thanks to William Grant Fixes: CVE-2007-6110 stable/main/binary-arm/htdig_3.2.0b6-3.1etch1_arm.deb htdig (1:3.2.0b6-3.1etch1) stable-security; urgency=high * Non-maintainer upload by the security team * Fix XSS in htsearch by not displaying the sort type in htsearch/Display.cc and libhtdig/ResultFetch.cc anymore, if it is unrecognised, thanks to William Grant Fixes: CVE-2007-6110 stable/main/binary-hppa/htdig_3.2.0b6-3.1etch1_hppa.deb htdig (1:3.2.0b6-3.1etch1) stable-security; urgency=high * Non-maintainer upload by the security team * Fix XSS in htsearch by not displaying the sort type in htsearch/Display.cc and libhtdig/ResultFetch.cc anymore, if it is unrecognised, thanks to William Grant Fixes: CVE-2007-6110 stable/main/source/htdig_3.2.0b6-3.1etch1.dsc stable/main/source/htdig_3.2.0b6.orig.tar.gz stable/main/source/htdig_3.2.0b6-3.1etch1.diff.gz stable/main/binary-all/htdig-doc_3.2.0b6-3.1etch1_all.deb stable/main/binary-i386/htdig_3.2.0b6-3.1etch1_i386.deb htdig (1:3.2.0b6-3.1etch1) stable-security; urgency=high * Non-maintainer upload by the security team * Fix XSS in htsearch by not displaying the sort type in htsearch/Display.cc and libhtdig/ResultFetch.cc anymore, if it is unrecognised, thanks to William Grant Fixes: CVE-2007-6110 stable/main/binary-ia64/htdig_3.2.0b6-3.1etch1_ia64.deb htdig (1:3.2.0b6-3.1etch1) stable-security; urgency=high * Non-maintainer upload by the security team * Fix XSS in htsearch by not displaying the sort type in htsearch/Display.cc and libhtdig/ResultFetch.cc anymore, if it is unrecognised, thanks to William Grant Fixes: CVE-2007-6110 stable/main/binary-mips/htdig_3.2.0b6-3.1etch1_mips.deb htdig (1:3.2.0b6-3.1etch1) stable-security; urgency=high * Non-maintainer upload by the security team * Fix XSS in htsearch by not displaying the sort type in htsearch/Display.cc and libhtdig/ResultFetch.cc anymore, if it is unrecognised, thanks to William Grant Fixes: CVE-2007-6110 stable/main/binary-mipsel/htdig_3.2.0b6-3.1etch1_mipsel.deb htdig (1:3.2.0b6-3.1etch1) stable-security; urgency=high * Non-maintainer upload by the security team * Fix XSS in htsearch by not displaying the sort type in htsearch/Display.cc and libhtdig/ResultFetch.cc anymore, if it is unrecognised, thanks to William Grant Fixes: CVE-2007-6110 stable/main/binary-powerpc/htdig_3.2.0b6-3.1etch1_powerpc.deb htdig (1:3.2.0b6-3.1etch1) stable-security; urgency=high * Non-maintainer upload by the security team * Fix XSS in htsearch by not displaying the sort type in htsearch/Display.cc and libhtdig/ResultFetch.cc anymore, if it is unrecognised, thanks to William Grant Fixes: CVE-2007-6110 stable/main/binary-s390/htdig_3.2.0b6-3.1etch1_s390.deb htdig (1:3.2.0b6-3.1etch1) stable-security; urgency=high * Non-maintainer upload by the security team * Fix XSS in htsearch by not displaying the sort type in htsearch/Display.cc and libhtdig/ResultFetch.cc anymore, if it is unrecognised, thanks to William Grant Fixes: CVE-2007-6110 stable/main/binary-sparc/htdig_3.2.0b6-3.1etch1_sparc.deb htdig (1:3.2.0b6-3.1etch1) stable-security; urgency=high * Non-maintainer upload by the security team * Fix XSS in htsearch by not displaying the sort type in htsearch/Display.cc and libhtdig/ResultFetch.cc anymore, if it is unrecognised, thanks to William Grant Fixes: CVE-2007-6110 stable/main/binary-alpha/iceape-browser_1.0.11~pre071022-0etch1_alpha.deb stable/main/binary-alpha/iceape-gnome-support_1.0.11~pre071022-0etch1_alpha.deb stable/main/binary-alpha/iceape-dbg_1.0.11~pre071022-0etch1_alpha.deb stable/main/binary-alpha/iceape-mailnews_1.0.11~pre071022-0etch1_alpha.deb stable/main/binary-alpha/iceape-calendar_1.0.11~pre071022-0etch1_alpha.deb stable/main/binary-alpha/iceape-dom-inspector_1.0.11~pre071022-0etch1_alpha.deb iceape (1.0.11~pre071022-0etch1) stable-security; urgency=critical * New security/stability distributor release (backports for v2.0.0.8) * MFSA 2007-29 aka CVE-2007-5339 (browser), CVE-2007-5340 (javascript) * MFSA 2007-30 aka CVE-2007-1095 * MFSA 2007-31 aka CVE-2007-2292 * MFSA 2007-32 aka CVE-2007-3511, CVE-2006-2894 * MFSA 2007-33 aka CVE-2007-5334 * MFSA 2007-34 aka CVE-2007-5337 * MFSA 2007-35 aka CVE-2007-5338 * MFSA 2007-36 aka CVE-2007-4841 (windows only) * debian/patches/90_MFSA_2007_26.dpatch, debian/patches/90_MFSA_2007_27.dpatch: applied upstream ... dropped. * debian/patches/00list: Updated accordingly. * debian/patches/99_configure.dpatch: rerun autoconf2.13 stable/main/source/iceape_1.0.11~pre071022-0etch1.dsc stable/main/source/iceape_1.0.11~pre071022.orig.tar.gz stable/main/source/iceape_1.0.11~pre071022-0etch1.diff.gz stable/main/binary-all/iceape_1.0.11~pre071022-0etch1_all.deb stable/main/binary-all/iceape-dev_1.0.11~pre071022-0etch1_all.deb stable/main/binary-all/iceape-chatzilla_1.0.11~pre071022-0etch1_all.deb stable/main/binary-all/mozilla_1.8+1.0.11~pre071022-0etch1_all.deb stable/main/binary-all/mozilla-browser_1.8+1.0.11~pre071022-0etch1_all.deb stable/main/binary-all/mozilla-dev_1.8+1.0.11~pre071022-0etch1_all.deb stable/main/binary-all/mozilla-mailnews_1.8+1.0.11~pre071022-0etch1_all.deb stable/main/binary-all/mozilla-chatzilla_1.8+1.0.11~pre071022-0etch1_all.deb stable/main/binary-all/mozilla-psm_1.8+1.0.11~pre071022-0etch1_all.deb stable/main/binary-all/mozilla-dom-inspector_1.8+1.0.11~pre071022-0etch1_all.deb stable/main/binary-all/mozilla-js-debugger_1.8+1.0.11~pre071022-0etch1_all.deb stable/main/binary-all/mozilla-calendar_1.8+1.0.11~pre071022-0etch1_all.deb stable/main/binary-amd64/iceape-browser_1.0.11~pre071022-0etch1_amd64.deb stable/main/binary-amd64/iceape-gnome-support_1.0.11~pre071022-0etch1_amd64.deb stable/main/binary-amd64/iceape-dbg_1.0.11~pre071022-0etch1_amd64.deb stable/main/binary-amd64/iceape-mailnews_1.0.11~pre071022-0etch1_amd64.deb stable/main/binary-amd64/iceape-calendar_1.0.11~pre071022-0etch1_amd64.deb stable/main/binary-amd64/iceape-dom-inspector_1.0.11~pre071022-0etch1_amd64.deb iceape (1.0.11~pre071022-0etch1) stable-security; urgency=critical * New security/stability distributor release (backports for v2.0.0.8) * MFSA 2007-29 aka CVE-2007-5339 (browser), CVE-2007-5340 (javascript) * MFSA 2007-30 aka CVE-2007-1095 * MFSA 2007-31 aka CVE-2007-2292 * MFSA 2007-32 aka CVE-2007-3511, CVE-2006-2894 * MFSA 2007-33 aka CVE-2007-5334 * MFSA 2007-34 aka CVE-2007-5337 * MFSA 2007-35 aka CVE-2007-5338 * MFSA 2007-36 aka CVE-2007-4841 (windows only) * debian/patches/90_MFSA_2007_26.dpatch, debian/patches/90_MFSA_2007_27.dpatch: applied upstream ... dropped. * debian/patches/00list: Updated accordingly. * debian/patches/99_configure.dpatch: rerun autoconf2.13 stable/main/binary-arm/iceape-browser_1.0.11~pre071022-0etch1_arm.deb stable/main/binary-arm/iceape-gnome-support_1.0.11~pre071022-0etch1_arm.deb stable/main/binary-arm/iceape-dbg_1.0.11~pre071022-0etch1_arm.deb stable/main/binary-arm/iceape-mailnews_1.0.11~pre071022-0etch1_arm.deb stable/main/binary-arm/iceape-calendar_1.0.11~pre071022-0etch1_arm.deb stable/main/binary-arm/iceape-dom-inspector_1.0.11~pre071022-0etch1_arm.deb iceape (1.0.11~pre071022-0etch1) stable-security; urgency=critical * New security/stability distributor release (backports for v2.0.0.8) * MFSA 2007-29 aka CVE-2007-5339 (browser), CVE-2007-5340 (javascript) * MFSA 2007-30 aka CVE-2007-1095 * MFSA 2007-31 aka CVE-2007-2292 * MFSA 2007-32 aka CVE-2007-3511, CVE-2006-2894 * MFSA 2007-33 aka CVE-2007-5334 * MFSA 2007-34 aka CVE-2007-5337 * MFSA 2007-35 aka CVE-2007-5338 * MFSA 2007-36 aka CVE-2007-4841 (windows only) * debian/patches/90_MFSA_2007_26.dpatch, debian/patches/90_MFSA_2007_27.dpatch: applied upstream ... dropped. * debian/patches/00list: Updated accordingly. * debian/patches/99_configure.dpatch: rerun autoconf2.13 stable/main/binary-hppa/iceape-browser_1.0.11~pre071022-0etch1_hppa.deb stable/main/binary-hppa/iceape-gnome-support_1.0.11~pre071022-0etch1_hppa.deb stable/main/binary-hppa/iceape-dbg_1.0.11~pre071022-0etch1_hppa.deb stable/main/binary-hppa/iceape-mailnews_1.0.11~pre071022-0etch1_hppa.deb stable/main/binary-hppa/iceape-calendar_1.0.11~pre071022-0etch1_hppa.deb stable/main/binary-hppa/iceape-dom-inspector_1.0.11~pre071022-0etch1_hppa.deb iceape (1.0.11~pre071022-0etch1) stable-security; urgency=critical * New security/stability distributor release (backports for v2.0.0.8) * MFSA 2007-29 aka CVE-2007-5339 (browser), CVE-2007-5340 (javascript) * MFSA 2007-30 aka CVE-2007-1095 * MFSA 2007-31 aka CVE-2007-2292 * MFSA 2007-32 aka CVE-2007-3511, CVE-2006-2894 * MFSA 2007-33 aka CVE-2007-5334 * MFSA 2007-34 aka CVE-2007-5337 * MFSA 2007-35 aka CVE-2007-5338 * MFSA 2007-36 aka CVE-2007-4841 (windows only) * debian/patches/90_MFSA_2007_26.dpatch, debian/patches/90_MFSA_2007_27.dpatch: applied upstream ... dropped. * debian/patches/00list: Updated accordingly. * debian/patches/99_configure.dpatch: rerun autoconf2.13 stable/main/binary-i386/iceape-browser_1.0.11~pre071022-0etch1_i386.deb stable/main/binary-i386/iceape-gnome-support_1.0.11~pre071022-0etch1_i386.deb stable/main/binary-i386/iceape-dbg_1.0.11~pre071022-0etch1_i386.deb stable/main/binary-i386/iceape-mailnews_1.0.11~pre071022-0etch1_i386.deb stable/main/binary-i386/iceape-calendar_1.0.11~pre071022-0etch1_i386.deb stable/main/binary-i386/iceape-dom-inspector_1.0.11~pre071022-0etch1_i386.deb iceape (1.0.11~pre071022-0etch1) stable-security; urgency=critical * New security/stability distributor release (backports for v2.0.0.8) * MFSA 2007-29 aka CVE-2007-5339 (browser), CVE-2007-5340 (javascript) * MFSA 2007-30 aka CVE-2007-1095 * MFSA 2007-31 aka CVE-2007-2292 * MFSA 2007-32 aka CVE-2007-3511, CVE-2006-2894 * MFSA 2007-33 aka CVE-2007-5334 * MFSA 2007-34 aka CVE-2007-5337 * MFSA 2007-35 aka CVE-2007-5338 * MFSA 2007-36 aka CVE-2007-4841 (windows only) * debian/patches/90_MFSA_2007_26.dpatch, debian/patches/90_MFSA_2007_27.dpatch: applied upstream ... dropped. * debian/patches/00list: Updated accordingly. * debian/patches/99_configure.dpatch: rerun autoconf2.13 stable/main/binary-ia64/iceape-browser_1.0.11~pre071022-0etch1_ia64.deb stable/main/binary-ia64/iceape-gnome-support_1.0.11~pre071022-0etch1_ia64.deb stable/main/binary-ia64/iceape-dbg_1.0.11~pre071022-0etch1_ia64.deb stable/main/binary-ia64/iceape-mailnews_1.0.11~pre071022-0etch1_ia64.deb stable/main/binary-ia64/iceape-calendar_1.0.11~pre071022-0etch1_ia64.deb stable/main/binary-ia64/iceape-dom-inspector_1.0.11~pre071022-0etch1_ia64.deb iceape (1.0.11~pre071022-0etch1) stable-security; urgency=critical * New security/stability distributor release (backports for v2.0.0.8) * MFSA 2007-29 aka CVE-2007-5339 (browser), CVE-2007-5340 (javascript) * MFSA 2007-30 aka CVE-2007-1095 * MFSA 2007-31 aka CVE-2007-2292 * MFSA 2007-32 aka CVE-2007-3511, CVE-2006-2894 * MFSA 2007-33 aka CVE-2007-5334 * MFSA 2007-34 aka CVE-2007-5337 * MFSA 2007-35 aka CVE-2007-5338 * MFSA 2007-36 aka CVE-2007-4841 (windows only) * debian/patches/90_MFSA_2007_26.dpatch, debian/patches/90_MFSA_2007_27.dpatch: applied upstream ... dropped. * debian/patches/00list: Updated accordingly. * debian/patches/99_configure.dpatch: rerun autoconf2.13 stable/main/binary-mips/iceape-browser_1.0.11~pre071022-0etch1_mips.deb stable/main/binary-mips/iceape-gnome-support_1.0.11~pre071022-0etch1_mips.deb stable/main/binary-mips/iceape-dbg_1.0.11~pre071022-0etch1_mips.deb stable/main/binary-mips/iceape-mailnews_1.0.11~pre071022-0etch1_mips.deb stable/main/binary-mips/iceape-calendar_1.0.11~pre071022-0etch1_mips.deb stable/main/binary-mips/iceape-dom-inspector_1.0.11~pre071022-0etch1_mips.deb iceape (1.0.11~pre071022-0etch1) stable-security; urgency=critical * New security/stability distributor release (backports for v2.0.0.8) * MFSA 2007-29 aka CVE-2007-5339 (browser), CVE-2007-5340 (javascript) * MFSA 2007-30 aka CVE-2007-1095 * MFSA 2007-31 aka CVE-2007-2292 * MFSA 2007-32 aka CVE-2007-3511, CVE-2006-2894 * MFSA 2007-33 aka CVE-2007-5334 * MFSA 2007-34 aka CVE-2007-5337 * MFSA 2007-35 aka CVE-2007-5338 * MFSA 2007-36 aka CVE-2007-4841 (windows only) * debian/patches/90_MFSA_2007_26.dpatch, debian/patches/90_MFSA_2007_27.dpatch: applied upstream ... dropped. * debian/patches/00list: Updated accordingly. * debian/patches/99_configure.dpatch: rerun autoconf2.13 stable/main/binary-mipsel/iceape-browser_1.0.11~pre071022-0etch1_mipsel.deb stable/main/binary-mipsel/iceape-gnome-support_1.0.11~pre071022-0etch1_mipsel.deb stable/main/binary-mipsel/iceape-dbg_1.0.11~pre071022-0etch1_mipsel.deb stable/main/binary-mipsel/iceape-mailnews_1.0.11~pre071022-0etch1_mipsel.deb stable/main/binary-mipsel/iceape-calendar_1.0.11~pre071022-0etch1_mipsel.deb stable/main/binary-mipsel/iceape-dom-inspector_1.0.11~pre071022-0etch1_mipsel.deb iceape (1.0.11~pre071022-0etch1) stable-security; urgency=critical * New security/stability distributor release (backports for v2.0.0.8) * MFSA 2007-29 aka CVE-2007-5339 (browser), CVE-2007-5340 (javascript) * MFSA 2007-30 aka CVE-2007-1095 * MFSA 2007-31 aka CVE-2007-2292 * MFSA 2007-32 aka CVE-2007-3511, CVE-2006-2894 * MFSA 2007-33 aka CVE-2007-5334 * MFSA 2007-34 aka CVE-2007-5337 * MFSA 2007-35 aka CVE-2007-5338 * MFSA 2007-36 aka CVE-2007-4841 (windows only) * debian/patches/90_MFSA_2007_26.dpatch, debian/patches/90_MFSA_2007_27.dpatch: applied upstream ... dropped. * debian/patches/00list: Updated accordingly. * debian/patches/99_configure.dpatch: rerun autoconf2.13 stable/main/binary-powerpc/iceape-browser_1.0.11~pre071022-0etch1_powerpc.deb stable/main/binary-powerpc/iceape-gnome-support_1.0.11~pre071022-0etch1_powerpc.deb stable/main/binary-powerpc/iceape-dbg_1.0.11~pre071022-0etch1_powerpc.deb stable/main/binary-powerpc/iceape-mailnews_1.0.11~pre071022-0etch1_powerpc.deb stable/main/binary-powerpc/iceape-calendar_1.0.11~pre071022-0etch1_powerpc.deb stable/main/binary-powerpc/iceape-dom-inspector_1.0.11~pre071022-0etch1_powerpc.deb iceape (1.0.11~pre071022-0etch1) stable-security; urgency=critical * New security/stability distributor release (backports for v2.0.0.8) * MFSA 2007-29 aka CVE-2007-5339 (browser), CVE-2007-5340 (javascript) * MFSA 2007-30 aka CVE-2007-1095 * MFSA 2007-31 aka CVE-2007-2292 * MFSA 2007-32 aka CVE-2007-3511, CVE-2006-2894 * MFSA 2007-33 aka CVE-2007-5334 * MFSA 2007-34 aka CVE-2007-5337 * MFSA 2007-35 aka CVE-2007-5338 * MFSA 2007-36 aka CVE-2007-4841 (windows only) * debian/patches/90_MFSA_2007_26.dpatch, debian/patches/90_MFSA_2007_27.dpatch: applied upstream ... dropped. * debian/patches/00list: Updated accordingly. * debian/patches/99_configure.dpatch: rerun autoconf2.13 stable/main/binary-s390/iceape-browser_1.0.11~pre071022-0etch1_s390.deb stable/main/binary-s390/iceape-gnome-support_1.0.11~pre071022-0etch1_s390.deb stable/main/binary-s390/iceape-dbg_1.0.11~pre071022-0etch1_s390.deb stable/main/binary-s390/iceape-mailnews_1.0.11~pre071022-0etch1_s390.deb stable/main/binary-s390/iceape-calendar_1.0.11~pre071022-0etch1_s390.deb stable/main/binary-s390/iceape-dom-inspector_1.0.11~pre071022-0etch1_s390.deb iceape (1.0.11~pre071022-0etch1) stable-security; urgency=critical * New security/stability distributor release (backports for v2.0.0.8) * MFSA 2007-29 aka CVE-2007-5339 (browser), CVE-2007-5340 (javascript) * MFSA 2007-30 aka CVE-2007-1095 * MFSA 2007-31 aka CVE-2007-2292 * MFSA 2007-32 aka CVE-2007-3511, CVE-2006-2894 * MFSA 2007-33 aka CVE-2007-5334 * MFSA 2007-34 aka CVE-2007-5337 * MFSA 2007-35 aka CVE-2007-5338 * MFSA 2007-36 aka CVE-2007-4841 (windows only) * debian/patches/90_MFSA_2007_26.dpatch, debian/patches/90_MFSA_2007_27.dpatch: applied upstream ... dropped. * debian/patches/00list: Updated accordingly. * debian/patches/99_configure.dpatch: rerun autoconf2.13 stable/main/binary-sparc/iceape-browser_1.0.11~pre071022-0etch1_sparc.deb stable/main/binary-sparc/iceape-gnome-support_1.0.11~pre071022-0etch1_sparc.deb stable/main/binary-sparc/iceape-dbg_1.0.11~pre071022-0etch1_sparc.deb stable/main/binary-sparc/iceape-mailnews_1.0.11~pre071022-0etch1_sparc.deb stable/main/binary-sparc/iceape-calendar_1.0.11~pre071022-0etch1_sparc.deb stable/main/binary-sparc/iceape-dom-inspector_1.0.11~pre071022-0etch1_sparc.deb iceape (1.0.11~pre071022-0etch1) stable-security; urgency=critical * New security/stability distributor release (backports for v2.0.0.8) * MFSA 2007-29 aka CVE-2007-5339 (browser), CVE-2007-5340 (javascript) * MFSA 2007-30 aka CVE-2007-1095 * MFSA 2007-31 aka CVE-2007-2292 * MFSA 2007-32 aka CVE-2007-3511, CVE-2006-2894 * MFSA 2007-33 aka CVE-2007-5334 * MFSA 2007-34 aka CVE-2007-5337 * MFSA 2007-35 aka CVE-2007-5338 * MFSA 2007-36 aka CVE-2007-4841 (windows only) * debian/patches/90_MFSA_2007_26.dpatch, debian/patches/90_MFSA_2007_27.dpatch: applied upstream ... dropped. * debian/patches/00list: Updated accordingly. * debian/patches/99_configure.dpatch: rerun autoconf2.13 stable/main/binary-alpha/icedove_1.5.0.13+1.5.0.14b.dfsg1-0etch1_alpha.deb stable/main/binary-alpha/icedove-inspector_1.5.0.13+1.5.0.14b.dfsg1-0etch1_alpha.deb stable/main/binary-alpha/icedove-gnome-support_1.5.0.13+1.5.0.14b.dfsg1-0etch1_alpha.deb stable/main/binary-alpha/icedove-typeaheadfind_1.5.0.13+1.5.0.14b.dfsg1-0etch1_alpha.deb stable/main/binary-alpha/icedove-dev_1.5.0.13+1.5.0.14b.dfsg1-0etch1_alpha.deb stable/main/binary-alpha/icedove-dbg_1.5.0.13+1.5.0.14b.dfsg1-0etch1_alpha.deb icedove (1.5.0.13+1.5.0.14b.dfsg1-0etch1) stable-security; urgency=low [ Alexander Sack ] * security/stability update 1.5.0.13 + 1.5.0.14 (prepatch): - tarball used to produce this tarball: http://people.debian.org/~asac/mozilla-security/patches-ALL-1.8.0.14b.tar.gz Fixed in 1.5.0.13: - CVE-2007-3734, CVE-2007-3735 - MFSA 2007-18: Crashes with evidence of memory corruption (rv:1.8.0.13/1.8.1.5) - CVE-2007-3670 - MFSA 2007-23: Remote code execution by launching Firefox from Internet Explorer. - CVE-2007-3844 - MFSA 2007-26: Privilege escalation through chrome-loaded about:blank windows. - CVE-2007-3845 - MFSA 2007-27: Unescaped URIs passed to external programs. Fixed in 1.5.0.14b: - advisories not yet public/final - will be documented on next upload: CVE-2007-5339 (bulk memory corruption I), CVE-2007-5340 (bulk javascript memory corruption), CVE-2007-5338 (XPCNativeWrapper code execution). CVE-2007-5336 (mutation notify on text change), CVE-2007-5337 (sftp protocol), CVE-2007-2292 (browser digest request splitting), CVE-2007-4841 (windows only). stable/main/source/icedove_1.5.0.13+1.5.0.14b.dfsg1-0etch1.dsc stable/main/source/icedove_1.5.0.13+1.5.0.14b.dfsg1.orig.tar.gz stable/main/source/icedove_1.5.0.13+1.5.0.14b.dfsg1-0etch1.diff.gz stable/main/binary-amd64/icedove_1.5.0.13+1.5.0.14b.dfsg1-0etch1_amd64.deb stable/main/binary-amd64/icedove-inspector_1.5.0.13+1.5.0.14b.dfsg1-0etch1_amd64.deb stable/main/binary-amd64/icedove-gnome-support_1.5.0.13+1.5.0.14b.dfsg1-0etch1_amd64.deb stable/main/binary-all/thunderbird-gnome-support_1.5.0.13+1.5.0.14b.dfsg1-0etch1_all.deb stable/main/binary-amd64/icedove-typeaheadfind_1.5.0.13+1.5.0.14b.dfsg1-0etch1_amd64.deb stable/main/binary-amd64/icedove-dev_1.5.0.13+1.5.0.14b.dfsg1-0etch1_amd64.deb stable/main/binary-amd64/icedove-dbg_1.5.0.13+1.5.0.14b.dfsg1-0etch1_amd64.deb stable/main/binary-all/thunderbird-dbg_1.5.0.13+1.5.0.14b.dfsg1-0etch1_all.deb stable/main/binary-all/thunderbird_1.5.0.13+1.5.0.14b.dfsg1-0etch1_all.deb stable/main/binary-all/mozilla-thunderbird_1.5.0.13+1.5.0.14b.dfsg1-0etch1_all.deb stable/main/binary-all/mozilla-thunderbird-inspector_1.5.0.13+1.5.0.14b.dfsg1-0etch1_all.deb stable/main/binary-all/thunderbird-inspector_1.5.0.13+1.5.0.14b.dfsg1-0etch1_all.deb stable/main/binary-all/mozilla-thunderbird-typeaheadfind_1.5.0.13+1.5.0.14b.dfsg1-0etch1_all.deb stable/main/binary-all/thunderbird-typeaheadfind_1.5.0.13+1.5.0.14b.dfsg1-0etch1_all.deb stable/main/binary-all/thunderbird-dev_1.5.0.13+1.5.0.14b.dfsg1-0etch1_all.deb stable/main/binary-all/mozilla-thunderbird-dev_1.5.0.13+1.5.0.14b.dfsg1-0etch1_all.deb icedove (1.5.0.13+1.5.0.14b.dfsg1-0etch1) stable-security; urgency=low [ Alexander Sack ] * security/stability update 1.5.0.13 + 1.5.0.14 (prepatch): - tarball used to produce this tarball: http://people.debian.org/~asac/mozilla-security/patches-ALL-1.8.0.14b.tar.gz Fixed in 1.5.0.13: - CVE-2007-3734, CVE-2007-3735 - MFSA 2007-18: Crashes with evidence of memory corruption (rv:1.8.0.13/1.8.1.5) - CVE-2007-3670 - MFSA 2007-23: Remote code execution by launching Firefox from Internet Explorer. - CVE-2007-3844 - MFSA 2007-26: Privilege escalation through chrome-loaded about:blank windows. - CVE-2007-3845 - MFSA 2007-27: Unescaped URIs passed to external programs. Fixed in 1.5.0.14b: - advisories not yet public/final - will be documented on next upload: CVE-2007-5339 (bulk memory corruption I), CVE-2007-5340 (bulk javascript memory corruption), CVE-2007-5338 (XPCNativeWrapper code execution). CVE-2007-5336 (mutation notify on text change), CVE-2007-5337 (sftp protocol), CVE-2007-2292 (browser digest request splitting), CVE-2007-4841 (windows only). stable/main/binary-arm/icedove_1.5.0.13+1.5.0.14b.dfsg1-0etch1_arm.deb stable/main/binary-arm/icedove-inspector_1.5.0.13+1.5.0.14b.dfsg1-0etch1_arm.deb stable/main/binary-arm/icedove-gnome-support_1.5.0.13+1.5.0.14b.dfsg1-0etch1_arm.deb stable/main/binary-arm/icedove-typeaheadfind_1.5.0.13+1.5.0.14b.dfsg1-0etch1_arm.deb stable/main/binary-arm/icedove-dev_1.5.0.13+1.5.0.14b.dfsg1-0etch1_arm.deb stable/main/binary-arm/icedove-dbg_1.5.0.13+1.5.0.14b.dfsg1-0etch1_arm.deb icedove (1.5.0.13+1.5.0.14b.dfsg1-0etch1) stable-security; urgency=low [ Alexander Sack ] * security/stability update 1.5.0.13 + 1.5.0.14 (prepatch): - tarball used to produce this tarball: http://people.debian.org/~asac/mozilla-security/patches-ALL-1.8.0.14b.tar.gz Fixed in 1.5.0.13: - CVE-2007-3734, CVE-2007-3735 - MFSA 2007-18: Crashes with evidence of memory corruption (rv:1.8.0.13/1.8.1.5) - CVE-2007-3670 - MFSA 2007-23: Remote code execution by launching Firefox from Internet Explorer. - CVE-2007-3844 - MFSA 2007-26: Privilege escalation through chrome-loaded about:blank windows. - CVE-2007-3845 - MFSA 2007-27: Unescaped URIs passed to external programs. Fixed in 1.5.0.14b: - advisories not yet public/final - will be documented on next upload: CVE-2007-5339 (bulk memory corruption I), CVE-2007-5340 (bulk javascript memory corruption), CVE-2007-5338 (XPCNativeWrapper code execution). CVE-2007-5336 (mutation notify on text change), CVE-2007-5337 (sftp protocol), CVE-2007-2292 (browser digest request splitting), CVE-2007-4841 (windows only). stable/main/binary-hppa/icedove_1.5.0.13+1.5.0.14b.dfsg1-0etch1_hppa.deb stable/main/binary-hppa/icedove-inspector_1.5.0.13+1.5.0.14b.dfsg1-0etch1_hppa.deb stable/main/binary-hppa/icedove-gnome-support_1.5.0.13+1.5.0.14b.dfsg1-0etch1_hppa.deb stable/main/binary-hppa/icedove-typeaheadfind_1.5.0.13+1.5.0.14b.dfsg1-0etch1_hppa.deb stable/main/binary-hppa/icedove-dev_1.5.0.13+1.5.0.14b.dfsg1-0etch1_hppa.deb stable/main/binary-hppa/icedove-dbg_1.5.0.13+1.5.0.14b.dfsg1-0etch1_hppa.deb icedove (1.5.0.13+1.5.0.14b.dfsg1-0etch1) stable-security; urgency=low [ Alexander Sack ] * security/stability update 1.5.0.13 + 1.5.0.14 (prepatch): - tarball used to produce this tarball: http://people.debian.org/~asac/mozilla-security/patches-ALL-1.8.0.14b.tar.gz Fixed in 1.5.0.13: - CVE-2007-3734, CVE-2007-3735 - MFSA 2007-18: Crashes with evidence of memory corruption (rv:1.8.0.13/1.8.1.5) - CVE-2007-3670 - MFSA 2007-23: Remote code execution by launching Firefox from Internet Explorer. - CVE-2007-3844 - MFSA 2007-26: Privilege escalation through chrome-loaded about:blank windows. - CVE-2007-3845 - MFSA 2007-27: Unescaped URIs passed to external programs. Fixed in 1.5.0.14b: - advisories not yet public/final - will be documented on next upload: CVE-2007-5339 (bulk memory corruption I), CVE-2007-5340 (bulk javascript memory corruption), CVE-2007-5338 (XPCNativeWrapper code execution). CVE-2007-5336 (mutation notify on text change), CVE-2007-5337 (sftp protocol), CVE-2007-2292 (browser digest request splitting), CVE-2007-4841 (windows only). stable/main/binary-i386/icedove_1.5.0.13+1.5.0.14b.dfsg1-0etch1_i386.deb stable/main/binary-i386/icedove-inspector_1.5.0.13+1.5.0.14b.dfsg1-0etch1_i386.deb stable/main/binary-i386/icedove-gnome-support_1.5.0.13+1.5.0.14b.dfsg1-0etch1_i386.deb stable/main/binary-i386/icedove-typeaheadfind_1.5.0.13+1.5.0.14b.dfsg1-0etch1_i386.deb stable/main/binary-i386/icedove-dev_1.5.0.13+1.5.0.14b.dfsg1-0etch1_i386.deb stable/main/binary-i386/icedove-dbg_1.5.0.13+1.5.0.14b.dfsg1-0etch1_i386.deb icedove (1.5.0.13+1.5.0.14b.dfsg1-0etch1) stable-security; urgency=low [ Alexander Sack ] * security/stability update 1.5.0.13 + 1.5.0.14 (prepatch): - tarball used to produce this tarball: http://people.debian.org/~asac/mozilla-security/patches-ALL-1.8.0.14b.tar.gz Fixed in 1.5.0.13: - CVE-2007-3734, CVE-2007-3735 - MFSA 2007-18: Crashes with evidence of memory corruption (rv:1.8.0.13/1.8.1.5) - CVE-2007-3670 - MFSA 2007-23: Remote code execution by launching Firefox from Internet Explorer. - CVE-2007-3844 - MFSA 2007-26: Privilege escalation through chrome-loaded about:blank windows. - CVE-2007-3845 - MFSA 2007-27: Unescaped URIs passed to external programs. Fixed in 1.5.0.14b: - advisories not yet public/final - will be documented on next upload: CVE-2007-5339 (bulk memory corruption I), CVE-2007-5340 (bulk javascript memory corruption), CVE-2007-5338 (XPCNativeWrapper code execution). CVE-2007-5336 (mutation notify on text change), CVE-2007-5337 (sftp protocol), CVE-2007-2292 (browser digest request splitting), CVE-2007-4841 (windows only). stable/main/binary-ia64/icedove_1.5.0.13+1.5.0.14b.dfsg1-0etch1_ia64.deb stable/main/binary-ia64/icedove-inspector_1.5.0.13+1.5.0.14b.dfsg1-0etch1_ia64.deb stable/main/binary-ia64/icedove-gnome-support_1.5.0.13+1.5.0.14b.dfsg1-0etch1_ia64.deb stable/main/binary-ia64/icedove-typeaheadfind_1.5.0.13+1.5.0.14b.dfsg1-0etch1_ia64.deb stable/main/binary-ia64/icedove-dev_1.5.0.13+1.5.0.14b.dfsg1-0etch1_ia64.deb stable/main/binary-ia64/icedove-dbg_1.5.0.13+1.5.0.14b.dfsg1-0etch1_ia64.deb icedove (1.5.0.13+1.5.0.14b.dfsg1-0etch1) stable-security; urgency=low [ Alexander Sack ] * security/stability update 1.5.0.13 + 1.5.0.14 (prepatch): - tarball used to produce this tarball: http://people.debian.org/~asac/mozilla-security/patches-ALL-1.8.0.14b.tar.gz Fixed in 1.5.0.13: - CVE-2007-3734, CVE-2007-3735 - MFSA 2007-18: Crashes with evidence of memory corruption (rv:1.8.0.13/1.8.1.5) - CVE-2007-3670 - MFSA 2007-23: Remote code execution by launching Firefox from Internet Explorer. - CVE-2007-3844 - MFSA 2007-26: Privilege escalation through chrome-loaded about:blank windows. - CVE-2007-3845 - MFSA 2007-27: Unescaped URIs passed to external programs. Fixed in 1.5.0.14b: - advisories not yet public/final - will be documented on next upload: CVE-2007-5339 (bulk memory corruption I), CVE-2007-5340 (bulk javascript memory corruption), CVE-2007-5338 (XPCNativeWrapper code execution). CVE-2007-5336 (mutation notify on text change), CVE-2007-5337 (sftp protocol), CVE-2007-2292 (browser digest request splitting), CVE-2007-4841 (windows only). stable/main/binary-mips/icedove_1.5.0.13+1.5.0.14b.dfsg1-0etch1_mips.deb stable/main/binary-mips/icedove-inspector_1.5.0.13+1.5.0.14b.dfsg1-0etch1_mips.deb stable/main/binary-mips/icedove-gnome-support_1.5.0.13+1.5.0.14b.dfsg1-0etch1_mips.deb stable/main/binary-mips/icedove-typeaheadfind_1.5.0.13+1.5.0.14b.dfsg1-0etch1_mips.deb stable/main/binary-mips/icedove-dev_1.5.0.13+1.5.0.14b.dfsg1-0etch1_mips.deb stable/main/binary-mips/icedove-dbg_1.5.0.13+1.5.0.14b.dfsg1-0etch1_mips.deb icedove (1.5.0.13+1.5.0.14b.dfsg1-0etch1) stable-security; urgency=low [ Alexander Sack ] * security/stability update 1.5.0.13 + 1.5.0.14 (prepatch): - tarball used to produce this tarball: http://people.debian.org/~asac/mozilla-security/patches-ALL-1.8.0.14b.tar.gz Fixed in 1.5.0.13: - CVE-2007-3734, CVE-2007-3735 - MFSA 2007-18: Crashes with evidence of memory corruption (rv:1.8.0.13/1.8.1.5) - CVE-2007-3670 - MFSA 2007-23: Remote code execution by launching Firefox from Internet Explorer. - CVE-2007-3844 - MFSA 2007-26: Privilege escalation through chrome-loaded about:blank windows. - CVE-2007-3845 - MFSA 2007-27: Unescaped URIs passed to external programs. Fixed in 1.5.0.14b: - advisories not yet public/final - will be documented on next upload: CVE-2007-5339 (bulk memory corruption I), CVE-2007-5340 (bulk javascript memory corruption), CVE-2007-5338 (XPCNativeWrapper code execution). CVE-2007-5336 (mutation notify on text change), CVE-2007-5337 (sftp protocol), CVE-2007-2292 (browser digest request splitting), CVE-2007-4841 (windows only). stable/main/binary-mipsel/icedove_1.5.0.13+1.5.0.14b.dfsg1-0etch1_mipsel.deb stable/main/binary-mipsel/icedove-inspector_1.5.0.13+1.5.0.14b.dfsg1-0etch1_mipsel.deb stable/main/binary-mipsel/icedove-gnome-support_1.5.0.13+1.5.0.14b.dfsg1-0etch1_mipsel.deb stable/main/binary-mipsel/icedove-typeaheadfind_1.5.0.13+1.5.0.14b.dfsg1-0etch1_mipsel.deb stable/main/binary-mipsel/icedove-dev_1.5.0.13+1.5.0.14b.dfsg1-0etch1_mipsel.deb stable/main/binary-mipsel/icedove-dbg_1.5.0.13+1.5.0.14b.dfsg1-0etch1_mipsel.deb icedove (1.5.0.13+1.5.0.14b.dfsg1-0etch1) stable-security; urgency=low [ Alexander Sack ] * security/stability update 1.5.0.13 + 1.5.0.14 (prepatch): - tarball used to produce this tarball: http://people.debian.org/~asac/mozilla-security/patches-ALL-1.8.0.14b.tar.gz Fixed in 1.5.0.13: - CVE-2007-3734, CVE-2007-3735 - MFSA 2007-18: Crashes with evidence of memory corruption (rv:1.8.0.13/1.8.1.5) - CVE-2007-3670 - MFSA 2007-23: Remote code execution by launching Firefox from Internet Explorer. - CVE-2007-3844 - MFSA 2007-26: Privilege escalation through chrome-loaded about:blank windows. - CVE-2007-3845 - MFSA 2007-27: Unescaped URIs passed to external programs. Fixed in 1.5.0.14b: - advisories not yet public/final - will be documented on next upload: CVE-2007-5339 (bulk memory corruption I), CVE-2007-5340 (bulk javascript memory corruption), CVE-2007-5338 (XPCNativeWrapper code execution). CVE-2007-5336 (mutation notify on text change), CVE-2007-5337 (sftp protocol), CVE-2007-2292 (browser digest request splitting), CVE-2007-4841 (windows only). stable/main/binary-powerpc/icedove_1.5.0.13+1.5.0.14b.dfsg1-0etch1_powerpc.deb stable/main/binary-powerpc/icedove-inspector_1.5.0.13+1.5.0.14b.dfsg1-0etch1_powerpc.deb stable/main/binary-powerpc/icedove-gnome-support_1.5.0.13+1.5.0.14b.dfsg1-0etch1_powerpc.deb stable/main/binary-powerpc/icedove-typeaheadfind_1.5.0.13+1.5.0.14b.dfsg1-0etch1_powerpc.deb stable/main/binary-powerpc/icedove-dev_1.5.0.13+1.5.0.14b.dfsg1-0etch1_powerpc.deb stable/main/binary-powerpc/icedove-dbg_1.5.0.13+1.5.0.14b.dfsg1-0etch1_powerpc.deb icedove (1.5.0.13+1.5.0.14b.dfsg1-0etch1) stable-security; urgency=low [ Alexander Sack ] * security/stability update 1.5.0.13 + 1.5.0.14 (prepatch): - tarball used to produce this tarball: http://people.debian.org/~asac/mozilla-security/patches-ALL-1.8.0.14b.tar.gz Fixed in 1.5.0.13: - CVE-2007-3734, CVE-2007-3735 - MFSA 2007-18: Crashes with evidence of memory corruption (rv:1.8.0.13/1.8.1.5) - CVE-2007-3670 - MFSA 2007-23: Remote code execution by launching Firefox from Internet Explorer. - CVE-2007-3844 - MFSA 2007-26: Privilege escalation through chrome-loaded about:blank windows. - CVE-2007-3845 - MFSA 2007-27: Unescaped URIs passed to external programs. Fixed in 1.5.0.14b: - advisories not yet public/final - will be documented on next upload: CVE-2007-5339 (bulk memory corruption I), CVE-2007-5340 (bulk javascript memory corruption), CVE-2007-5338 (XPCNativeWrapper code execution). CVE-2007-5336 (mutation notify on text change), CVE-2007-5337 (sftp protocol), CVE-2007-2292 (browser digest request splitting), CVE-2007-4841 (windows only). stable/main/binary-s390/icedove_1.5.0.13+1.5.0.14b.dfsg1-0etch1_s390.deb stable/main/binary-s390/icedove-inspector_1.5.0.13+1.5.0.14b.dfsg1-0etch1_s390.deb stable/main/binary-s390/icedove-gnome-support_1.5.0.13+1.5.0.14b.dfsg1-0etch1_s390.deb stable/main/binary-s390/icedove-typeaheadfind_1.5.0.13+1.5.0.14b.dfsg1-0etch1_s390.deb stable/main/binary-s390/icedove-dev_1.5.0.13+1.5.0.14b.dfsg1-0etch1_s390.deb stable/main/binary-s390/icedove-dbg_1.5.0.13+1.5.0.14b.dfsg1-0etch1_s390.deb icedove (1.5.0.13+1.5.0.14b.dfsg1-0etch1) stable-security; urgency=low [ Alexander Sack ] * security/stability update 1.5.0.13 + 1.5.0.14 (prepatch): - tarball used to produce this tarball: http://people.debian.org/~asac/mozilla-security/patches-ALL-1.8.0.14b.tar.gz Fixed in 1.5.0.13: - CVE-2007-3734, CVE-2007-3735 - MFSA 2007-18: Crashes with evidence of memory corruption (rv:1.8.0.13/1.8.1.5) - CVE-2007-3670 - MFSA 2007-23: Remote code execution by launching Firefox from Internet Explorer. - CVE-2007-3844 - MFSA 2007-26: Privilege escalation through chrome-loaded about:blank windows. - CVE-2007-3845 - MFSA 2007-27: Unescaped URIs passed to external programs. Fixed in 1.5.0.14b: - advisories not yet public/final - will be documented on next upload: CVE-2007-5339 (bulk memory corruption I), CVE-2007-5340 (bulk javascript memory corruption), CVE-2007-5338 (XPCNativeWrapper code execution). CVE-2007-5336 (mutation notify on text change), CVE-2007-5337 (sftp protocol), CVE-2007-2292 (browser digest request splitting), CVE-2007-4841 (windows only). stable/main/binary-sparc/icedove_1.5.0.13+1.5.0.14b.dfsg1-0etch1_sparc.deb stable/main/binary-sparc/icedove-inspector_1.5.0.13+1.5.0.14b.dfsg1-0etch1_sparc.deb stable/main/binary-sparc/icedove-gnome-support_1.5.0.13+1.5.0.14b.dfsg1-0etch1_sparc.deb stable/main/binary-sparc/icedove-typeaheadfind_1.5.0.13+1.5.0.14b.dfsg1-0etch1_sparc.deb stable/main/binary-sparc/icedove-dev_1.5.0.13+1.5.0.14b.dfsg1-0etch1_sparc.deb stable/main/binary-sparc/icedove-dbg_1.5.0.13+1.5.0.14b.dfsg1-0etch1_sparc.deb icedove (1.5.0.13+1.5.0.14b.dfsg1-0etch1) stable-security; urgency=low [ Alexander Sack ] * security/stability update 1.5.0.13 + 1.5.0.14 (prepatch): - tarball used to produce this tarball: http://people.debian.org/~asac/mozilla-security/patches-ALL-1.8.0.14b.tar.gz Fixed in 1.5.0.13: - CVE-2007-3734, CVE-2007-3735 - MFSA 2007-18: Crashes with evidence of memory corruption (rv:1.8.0.13/1.8.1.5) - CVE-2007-3670 - MFSA 2007-23: Remote code execution by launching Firefox from Internet Explorer. - CVE-2007-3844 - MFSA 2007-26: Privilege escalation through chrome-loaded about:blank windows. - CVE-2007-3845 - MFSA 2007-27: Unescaped URIs passed to external programs. Fixed in 1.5.0.14b: - advisories not yet public/final - will be documented on next upload: CVE-2007-5339 (bulk memory corruption I), CVE-2007-5340 (bulk javascript memory corruption), CVE-2007-5338 (XPCNativeWrapper code execution). CVE-2007-5336 (mutation notify on text change), CVE-2007-5337 (sftp protocol), CVE-2007-2292 (browser digest request splitting), CVE-2007-4841 (windows only). stable/main/binary-alpha/iceweasel_2.0.0.10-0etch1_alpha.deb stable/main/binary-alpha/iceweasel-gnome-support_2.0.0.10-0etch1_alpha.deb stable/main/binary-alpha/iceweasel-dbg_2.0.0.10-0etch1_alpha.deb iceweasel (2.0.0.10-0etch1) stable-security; urgency=critical * New security/stability upstream release (v2.0.0.10) * Fixes MFSA 2007-37 aka CVE-2007-5947, MFSA 2007-38 aka CVE-2007-5959, MFSA 2007-39 aka CVE-2007-5960. * content/canvas/src/nsCanvasRenderingContext2D.cpp: Apply patch from bz#391028 to fix bz#405584, a regression in Canvas.drawImage. stable/main/source/iceweasel_2.0.0.10-0etch1.dsc stable/main/source/iceweasel_2.0.0.10.orig.tar.gz stable/main/source/iceweasel_2.0.0.10-0etch1.diff.gz stable/main/binary-all/iceweasel-dom-inspector_2.0.0.10-0etch1_all.deb stable/main/binary-all/mozilla-firefox_2.0.0.10-0etch1_all.deb stable/main/binary-all/mozilla-firefox-dom-inspector_2.0.0.10-0etch1_all.deb stable/main/binary-all/mozilla-firefox-gnome-support_2.0.0.10-0etch1_all.deb stable/main/binary-all/firefox_2.0.0.10-0etch1_all.deb stable/main/binary-all/firefox-dom-inspector_2.0.0.10-0etch1_all.deb stable/main/binary-all/firefox-gnome-support_2.0.0.10-0etch1_all.deb stable/main/binary-amd64/iceweasel_2.0.0.10-0etch1_amd64.deb stable/main/binary-amd64/iceweasel-gnome-support_2.0.0.10-0etch1_amd64.deb stable/main/binary-amd64/iceweasel-dbg_2.0.0.10-0etch1_amd64.deb iceweasel (2.0.0.10-0etch1) stable-security; urgency=critical * New security/stability upstream release (v2.0.0.10) * Fixes MFSA 2007-37 aka CVE-2007-5947, MFSA 2007-38 aka CVE-2007-5959, MFSA 2007-39 aka CVE-2007-5960. * content/canvas/src/nsCanvasRenderingContext2D.cpp: Apply patch from bz#391028 to fix bz#405584, a regression in Canvas.drawImage. stable/main/binary-arm/iceweasel_2.0.0.10-0etch1_arm.deb stable/main/binary-arm/iceweasel-gnome-support_2.0.0.10-0etch1_arm.deb stable/main/binary-arm/iceweasel-dbg_2.0.0.10-0etch1_arm.deb iceweasel (2.0.0.10-0etch1) stable-security; urgency=critical * New security/stability upstream release (v2.0.0.10) * Fixes MFSA 2007-37 aka CVE-2007-5947, MFSA 2007-38 aka CVE-2007-5959, MFSA 2007-39 aka CVE-2007-5960. * content/canvas/src/nsCanvasRenderingContext2D.cpp: Apply patch from bz#391028 to fix bz#405584, a regression in Canvas.drawImage. stable/main/binary-hppa/iceweasel_2.0.0.10-0etch1_hppa.deb stable/main/binary-hppa/iceweasel-gnome-support_2.0.0.10-0etch1_hppa.deb stable/main/binary-hppa/iceweasel-dbg_2.0.0.10-0etch1_hppa.deb iceweasel (2.0.0.10-0etch1) stable-security; urgency=critical * New security/stability upstream release (v2.0.0.10) * Fixes MFSA 2007-37 aka CVE-2007-5947, MFSA 2007-38 aka CVE-2007-5959, MFSA 2007-39 aka CVE-2007-5960. * content/canvas/src/nsCanvasRenderingContext2D.cpp: Apply patch from bz#391028 to fix bz#405584, a regression in Canvas.drawImage. stable/main/binary-i386/iceweasel_2.0.0.10-0etch1_i386.deb stable/main/binary-i386/iceweasel-gnome-support_2.0.0.10-0etch1_i386.deb stable/main/binary-i386/iceweasel-dbg_2.0.0.10-0etch1_i386.deb iceweasel (2.0.0.10-0etch1) stable-security; urgency=critical * New security/stability upstream release (v2.0.0.10) * Fixes MFSA 2007-37 aka CVE-2007-5947, MFSA 2007-38 aka CVE-2007-5959, MFSA 2007-39 aka CVE-2007-5960. * content/canvas/src/nsCanvasRenderingContext2D.cpp: Apply patch from bz#391028 to fix bz#405584, a regression in Canvas.drawImage. stable/main/binary-ia64/iceweasel_2.0.0.10-0etch1_ia64.deb stable/main/binary-ia64/iceweasel-gnome-support_2.0.0.10-0etch1_ia64.deb stable/main/binary-ia64/iceweasel-dbg_2.0.0.10-0etch1_ia64.deb iceweasel (2.0.0.10-0etch1) stable-security; urgency=critical * New security/stability upstream release (v2.0.0.10) * Fixes MFSA 2007-37 aka CVE-2007-5947, MFSA 2007-38 aka CVE-2007-5959, MFSA 2007-39 aka CVE-2007-5960. * content/canvas/src/nsCanvasRenderingContext2D.cpp: Apply patch from bz#391028 to fix bz#405584, a regression in Canvas.drawImage. stable/main/binary-mips/iceweasel_2.0.0.10-0etch1_mips.deb stable/main/binary-mips/iceweasel-gnome-support_2.0.0.10-0etch1_mips.deb stable/main/binary-mips/iceweasel-dbg_2.0.0.10-0etch1_mips.deb iceweasel (2.0.0.10-0etch1) stable-security; urgency=critical * New security/stability upstream release (v2.0.0.10) * Fixes MFSA 2007-37 aka CVE-2007-5947, MFSA 2007-38 aka CVE-2007-5959, MFSA 2007-39 aka CVE-2007-5960. * content/canvas/src/nsCanvasRenderingContext2D.cpp: Apply patch from bz#391028 to fix bz#405584, a regression in Canvas.drawImage. stable/main/binary-mipsel/iceweasel_2.0.0.10-0etch1_mipsel.deb stable/main/binary-mipsel/iceweasel-gnome-support_2.0.0.10-0etch1_mipsel.deb stable/main/binary-mipsel/iceweasel-dbg_2.0.0.10-0etch1_mipsel.deb iceweasel (2.0.0.10-0etch1) stable-security; urgency=critical * New security/stability upstream release (v2.0.0.10) * Fixes MFSA 2007-37 aka CVE-2007-5947, MFSA 2007-38 aka CVE-2007-5959, MFSA 2007-39 aka CVE-2007-5960. * content/canvas/src/nsCanvasRenderingContext2D.cpp: Apply patch from bz#391028 to fix bz#405584, a regression in Canvas.drawImage. stable/main/binary-powerpc/iceweasel_2.0.0.10-0etch1_powerpc.deb stable/main/binary-powerpc/iceweasel-gnome-support_2.0.0.10-0etch1_powerpc.deb stable/main/binary-powerpc/iceweasel-dbg_2.0.0.10-0etch1_powerpc.deb iceweasel (2.0.0.10-0etch1) stable-security; urgency=critical * New security/stability upstream release (v2.0.0.10) * Fixes MFSA 2007-37 aka CVE-2007-5947, MFSA 2007-38 aka CVE-2007-5959, MFSA 2007-39 aka CVE-2007-5960. * content/canvas/src/nsCanvasRenderingContext2D.cpp: Apply patch from bz#391028 to fix bz#405584, a regression in Canvas.drawImage. stable/main/binary-s390/iceweasel_2.0.0.10-0etch1_s390.deb stable/main/binary-s390/iceweasel-gnome-support_2.0.0.10-0etch1_s390.deb stable/main/binary-s390/iceweasel-dbg_2.0.0.10-0etch1_s390.deb iceweasel (2.0.0.10-0etch1) stable-security; urgency=critical * New security/stability upstream release (v2.0.0.10) * Fixes MFSA 2007-37 aka CVE-2007-5947, MFSA 2007-38 aka CVE-2007-5959, MFSA 2007-39 aka CVE-2007-5960. * content/canvas/src/nsCanvasRenderingContext2D.cpp: Apply patch from bz#391028 to fix bz#405584, a regression in Canvas.drawImage. stable/main/binary-sparc/iceweasel_2.0.0.10-0etch1_sparc.deb stable/main/binary-sparc/iceweasel-gnome-support_2.0.0.10-0etch1_sparc.deb stable/main/binary-sparc/iceweasel-dbg_2.0.0.10-0etch1_sparc.deb iceweasel (2.0.0.10-0etch1) stable-security; urgency=critical * New security/stability upstream release (v2.0.0.10) * Fixes MFSA 2007-37 aka CVE-2007-5947, MFSA 2007-38 aka CVE-2007-5959, MFSA 2007-39 aka CVE-2007-5960. * content/canvas/src/nsCanvasRenderingContext2D.cpp: Apply patch from bz#391028 to fix bz#405584, a regression in Canvas.drawImage. stable/main/source/iceweasel-l10n_2.0.0.3+debian-1etch1.dsc stable/main/source/iceweasel-l10n_2.0.0.3+debian.orig.tar.gz stable/main/source/iceweasel-l10n_2.0.0.3+debian-1etch1.diff.gz stable/main/binary-all/iceweasel-l10n-af_2.0.0.3+debian-1etch1_all.deb stable/main/binary-all/iceweasel-l10n-ar_2.0.0.3+debian-1etch1_all.deb stable/main/binary-all/iceweasel-l10n-be_2.0.0.3+debian-1etch1_all.deb stable/main/binary-all/iceweasel-l10n-bg_2.0.0.3+debian-1etch1_all.deb stable/main/binary-all/iceweasel-l10n-ca_2.0.0.3+debian-1etch1_all.deb stable/main/binary-all/iceweasel-l10n-cs_2.0.0.3+debian-1etch1_all.deb stable/main/binary-all/iceweasel-l10n-da_2.0.0.3+debian-1etch1_all.deb stable/main/binary-all/iceweasel-l10n-de_2.0.0.3+debian-1etch1_all.deb stable/main/binary-all/iceweasel-l10n-el_2.0.0.3+debian-1etch1_all.deb stable/main/binary-all/iceweasel-l10n-en-gb_2.0.0.3+debian-1etch1_all.deb stable/main/binary-all/iceweasel-l10n-es-ar_2.0.0.3+debian-1etch1_all.deb stable/main/binary-all/iceweasel-l10n-es-es_2.0.0.3+debian-1etch1_all.deb stable/main/binary-all/iceweasel-l10n-eu_2.0.0.3+debian-1etch1_all.deb stable/main/binary-all/iceweasel-l10n-fi_2.0.0.3+debian-1etch1_all.deb stable/main/binary-all/iceweasel-l10n-fr_2.0.0.3+debian-1etch1_all.deb stable/main/binary-all/iceweasel-l10n-fy-nl_2.0.0.3+debian-1etch1_all.deb stable/main/binary-all/iceweasel-l10n-ga-ie_2.0.0.3+debian-1etch1_all.deb stable/main/binary-all/iceweasel-l10n-gu-in_2.0.0.3+debian-1etch1_all.deb stable/main/binary-all/iceweasel-l10n-he_2.0.0.3+debian-1etch1_all.deb stable/main/binary-all/iceweasel-l10n-hu_2.0.0.3+debian-1etch1_all.deb stable/main/binary-all/iceweasel-l10n-it_2.0.0.3+debian-1etch1_all.deb stable/main/binary-all/iceweasel-l10n-ja_2.0.0.3+debian-1etch1_all.deb stable/main/binary-all/iceweasel-l10n-ka_2.0.0.3+debian-1etch1_all.deb stable/main/binary-all/iceweasel-l10n-ko_2.0.0.3+debian-1etch1_all.deb stable/main/binary-all/iceweasel-l10n-ku_2.0.0.3+debian-1etch1_all.deb stable/main/binary-all/iceweasel-l10n-lt_2.0.0.3+debian-1etch1_all.deb stable/main/binary-all/iceweasel-l10n-mk_2.0.0.3+debian-1etch1_all.deb stable/main/binary-all/iceweasel-l10n-mn_2.0.0.3+debian-1etch1_all.deb stable/main/binary-all/iceweasel-l10n-nb-no_2.0.0.3+debian-1etch1_all.deb stable/main/binary-all/iceweasel-l10n-nl_2.0.0.3+debian-1etch1_all.deb stable/main/binary-all/iceweasel-l10n-nn-no_2.0.0.3+debian-1etch1_all.deb stable/main/binary-all/iceweasel-l10n-pa-in_2.0.0.3+debian-1etch1_all.deb stable/main/binary-all/iceweasel-l10n-pl_2.0.0.3+debian-1etch1_all.deb stable/main/binary-all/iceweasel-l10n-pt-br_2.0.0.3+debian-1etch1_all.deb stable/main/binary-all/iceweasel-l10n-pt-pt_2.0.0.3+debian-1etch1_all.deb stable/main/binary-all/iceweasel-l10n-ru_2.0.0.3+debian-1etch1_all.deb stable/main/binary-all/iceweasel-l10n-sk_2.0.0.3+debian-1etch1_all.deb stable/main/binary-all/iceweasel-l10n-sl_2.0.0.3+debian-1etch1_all.deb stable/main/binary-all/iceweasel-l10n-sv-se_2.0.0.3+debian-1etch1_all.deb stable/main/binary-all/iceweasel-l10n-tr_2.0.0.3+debian-1etch1_all.deb stable/main/binary-all/iceweasel-l10n-zh-cn_2.0.0.3+debian-1etch1_all.deb stable/main/binary-all/iceweasel-l10n-zh-tw_2.0.0.3+debian-1etch1_all.deb stable/main/binary-all/mozilla-firefox-locale-bg-bg_2.0.0.3+debian-1etch1_all.deb stable/main/binary-all/mozilla-firefox-locale-ca_2.0.0.3+debian-1etch1_all.deb stable/main/binary-all/mozilla-firefox-locale-cs-cz_2.0.0.3+debian-1etch1_all.deb stable/main/binary-all/mozilla-firefox-locale-da-dk_2.0.0.3+debian-1etch1_all.deb stable/main/binary-all/mozilla-firefox-locale-de-de_2.0.0.3+debian-1etch1_all.deb stable/main/binary-all/mozilla-firefox-locale-en-gb_2.0.0.3+debian-1etch1_all.deb stable/main/binary-all/mozilla-firefox-locale-es-ar_2.0.0.3+debian-1etch1_all.deb stable/main/binary-all/mozilla-firefox-locale-es-es_2.0.0.3+debian-1etch1_all.deb stable/main/binary-all/mozilla-firefox-locale-eu_2.0.0.3+debian-1etch1_all.deb stable/main/binary-all/mozilla-firefox-locale-fi-fi_2.0.0.3+debian-1etch1_all.deb stable/main/binary-all/mozilla-firefox-locale-fr-fr_2.0.0.3+debian-1etch1_all.deb stable/main/binary-all/mozilla-firefox-locale-ga-ie_2.0.0.3+debian-1etch1_all.deb stable/main/binary-all/mozilla-firefox-locale-gu-in_2.0.0.3+debian-1etch1_all.deb stable/main/binary-all/mozilla-firefox-locale-he-il_2.0.0.3+debian-1etch1_all.deb stable/main/binary-all/mozilla-firefox-locale-hu-hu_2.0.0.3+debian-1etch1_all.deb stable/main/binary-all/mozilla-firefox-locale-mk-mk_2.0.0.3+debian-1etch1_all.deb stable/main/binary-all/mozilla-firefox-locale-nl-nl_2.0.0.3+debian-1etch1_all.deb stable/main/binary-all/mozilla-firefox-locale-pa-in_2.0.0.3+debian-1etch1_all.deb stable/main/binary-all/mozilla-firefox-locale-pl-pl_2.0.0.3+debian-1etch1_all.deb stable/main/binary-all/mozilla-firefox-locale-pt-br_2.0.0.3+debian-1etch1_all.deb stable/main/binary-all/mozilla-firefox-locale-ru-ru_2.0.0.3+debian-1etch1_all.deb stable/main/binary-all/mozilla-firefox-locale-sl-si_2.0.0.3+debian-1etch1_all.deb stable/main/binary-all/mozilla-firefox-locale-sv-se_2.0.0.3+debian-1etch1_all.deb stable/main/binary-all/mozilla-firefox-locale-tr-tr_2.0.0.3+debian-1etch1_all.deb stable/main/binary-all/mozilla-firefox-locale-zh-cn_2.0.0.3+debian-1etch1_all.deb stable/main/binary-all/mozilla-firefox-locale-zh-tw_2.0.0.3+debian-1etch1_all.deb stable/main/binary-all/iceweasel-l10n-cy-gb_2.0.0.3+debian-1etch1_all.deb stable/main/binary-all/iceweasel-l10n-dz-bt_2.0.0.3+debian-1etch1_all.deb stable/main/binary-all/iceweasel-l10n-et-ee_2.0.0.3+debian-1etch1_all.deb stable/main/binary-all/iceweasel-l10n-fa-ir_2.0.0.3+debian-1etch1_all.deb stable/main/binary-all/iceweasel-l10n-fur-it_2.0.0.3+debian-1etch1_all.deb stable/main/binary-all/iceweasel-l10n-ro_2.0.0.3+debian-1etch1_all.deb stable/main/binary-all/mozilla-firefox-locale-ro-ro_2.0.0.3+debian-1etch1_all.deb stable/main/binary-all/iceweasel-l10n-uk-ua_2.0.0.3+debian-1etch1_all.deb stable/main/binary-all/mozilla-firefox-locale-uk_2.0.0.3+debian-1etch1_all.deb iceweasel-l10n (2.0.0.3+debian-1etch1) stable; urgency=high * Removing iceweasel-l10n-roa-es-val by request of the Catalan/Valencian Debian translator team * Updated iceweasel-l10n-ca package description. stable/main/binary-alpha/libid3-3.8.3-dev_3.8.3-6etch1_alpha.deb stable/main/binary-alpha/libid3-3.8.3c2a_3.8.3-6etch1_alpha.deb id3lib3.8.3 (3.8.3-6etch1) stable-security; urgency=high * Create temp file securely stable/main/binary-amd64/libid3-3.8.3-dev_3.8.3-6etch1_amd64.deb stable/main/binary-amd64/libid3-3.8.3c2a_3.8.3-6etch1_amd64.deb id3lib3.8.3 (3.8.3-6etch1) stable-security; urgency=high * Create temp file securely stable/main/binary-arm/libid3-3.8.3-dev_3.8.3-6etch1_arm.deb stable/main/binary-arm/libid3-3.8.3c2a_3.8.3-6etch1_arm.deb id3lib3.8.3 (3.8.3-6etch1) stable-security; urgency=high * Create temp file securely stable/main/binary-hppa/libid3-3.8.3-dev_3.8.3-6etch1_hppa.deb stable/main/binary-hppa/libid3-3.8.3c2a_3.8.3-6etch1_hppa.deb id3lib3.8.3 (3.8.3-6etch1) stable-security; urgency=high * Create temp file securely stable/main/source/id3lib3.8.3_3.8.3-6etch1.dsc stable/main/source/id3lib3.8.3_3.8.3.orig.tar.gz stable/main/source/id3lib3.8.3_3.8.3-6etch1.diff.gz stable/main/binary-i386/libid3-3.8.3-dev_3.8.3-6etch1_i386.deb stable/main/binary-i386/libid3-3.8.3c2a_3.8.3-6etch1_i386.deb id3lib3.8.3 (3.8.3-6etch1) stable-security; urgency=high * Create temp file securely stable/main/binary-ia64/libid3-3.8.3-dev_3.8.3-6etch1_ia64.deb stable/main/binary-ia64/libid3-3.8.3c2a_3.8.3-6etch1_ia64.deb id3lib3.8.3 (3.8.3-6etch1) stable-security; urgency=high * Create temp file securely stable/main/binary-mips/libid3-3.8.3-dev_3.8.3-6etch1_mips.deb stable/main/binary-mips/libid3-3.8.3c2a_3.8.3-6etch1_mips.deb id3lib3.8.3 (3.8.3-6etch1) stable-security; urgency=high * Create temp file securely stable/main/binary-mipsel/libid3-3.8.3-dev_3.8.3-6etch1_mipsel.deb stable/main/binary-mipsel/libid3-3.8.3c2a_3.8.3-6etch1_mipsel.deb id3lib3.8.3 (3.8.3-6etch1) stable-security; urgency=high * Create temp file securely stable/main/binary-powerpc/libid3-3.8.3-dev_3.8.3-6etch1_powerpc.deb stable/main/binary-powerpc/libid3-3.8.3c2a_3.8.3-6etch1_powerpc.deb id3lib3.8.3 (3.8.3-6etch1) stable-security; urgency=high * Create temp file securely stable/main/binary-s390/libid3-3.8.3-dev_3.8.3-6etch1_s390.deb stable/main/binary-s390/libid3-3.8.3c2a_3.8.3-6etch1_s390.deb id3lib3.8.3 (3.8.3-6etch1) stable-security; urgency=high * Create temp file securely stable/main/binary-sparc/libid3-3.8.3-dev_3.8.3-6etch1_sparc.deb stable/main/binary-sparc/libid3-3.8.3c2a_3.8.3-6etch1_sparc.deb id3lib3.8.3 (3.8.3-6etch1) stable-security; urgency=high * Create temp file securely stable/main/source/jffnms_0.8.3dfsg.1-2.1etch1.dsc stable/main/source/jffnms_0.8.3dfsg.1.orig.tar.gz stable/main/source/jffnms_0.8.3dfsg.1-2.1etch1.diff.gz stable/main/binary-all/jffnms_0.8.3dfsg.1-2.1etch1_all.deb jffnms (0.8.3dfsg.1-2.1etch1) stable-security; urgency=high * Security Bug Fix * Removes Javascript and SQL injectection bug which allows authentication to be bypassed [CVE-2007-3204, CVE-2007-3190, CVE-2007-3189] * Information disclosure files removed * Backdoor authentication files removed stable/main/binary-powerpc/joystick_20051019-1_powerpc.deb joystick (20051019-1) unstable; urgency=low * New upstream release. Closes: #245108 * drop joystick-device-check - leave device file handling to MAKEDEV or udev this makes everything lots more simple, means debconf is no longer a dependancy, and no need for an initscript. Closes: #164592, #235168, #303682, #331872 * debian/rules: move to CDBS * debian/control: added 'Requires at Linux 2.4 or newer.' Closes: #111117 * debian/control: Standards-Version: 3.6.2 * debian/copyright: updated FSF address * debian/README.Debian: removed * fix spelling mistakes in manpages Closes: #311445, #311446 stable/main/binary-alpha/kappfinder_3.5.5a.dfsg.1-6etch1_alpha.deb stable/main/binary-alpha/kate_3.5.5a.dfsg.1-6etch1_alpha.deb stable/main/binary-alpha/kcontrol_3.5.5a.dfsg.1-6etch1_alpha.deb stable/main/binary-alpha/kdebase-bin_3.5.5a.dfsg.1-6etch1_alpha.deb stable/main/binary-alpha/kdebase-dev_3.5.5a.dfsg.1-6etch1_alpha.deb stable/main/binary-alpha/kdebase-kio-plugins_3.5.5a.dfsg.1-6etch1_alpha.deb stable/main/binary-alpha/kdepasswd_3.5.5a.dfsg.1-6etch1_alpha.deb stable/main/binary-alpha/kdeprint_3.5.5a.dfsg.1-6etch1_alpha.deb stable/main/binary-alpha/kdesktop_3.5.5a.dfsg.1-6etch1_alpha.deb stable/main/binary-alpha/kdm_3.5.5a.dfsg.1-6etch1_alpha.deb stable/main/binary-alpha/kfind_3.5.5a.dfsg.1-6etch1_alpha.deb stable/main/binary-alpha/khelpcenter_3.5.5a.dfsg.1-6etch1_alpha.deb stable/main/binary-alpha/kicker_3.5.5a.dfsg.1-6etch1_alpha.deb stable/main/binary-alpha/klipper_3.5.5a.dfsg.1-6etch1_alpha.deb stable/main/binary-alpha/kmenuedit_3.5.5a.dfsg.1-6etch1_alpha.deb stable/main/binary-alpha/konqueror_3.5.5a.dfsg.1-6etch1_alpha.deb stable/main/binary-alpha/konqueror-nsplugins_3.5.5a.dfsg.1-6etch1_alpha.deb stable/main/binary-alpha/konsole_3.5.5a.dfsg.1-6etch1_alpha.deb stable/main/binary-alpha/kpager_3.5.5a.dfsg.1-6etch1_alpha.deb stable/main/binary-alpha/kpersonalizer_3.5.5a.dfsg.1-6etch1_alpha.deb stable/main/binary-alpha/ksmserver_3.5.5a.dfsg.1-6etch1_alpha.deb stable/main/binary-alpha/ksplash_3.5.5a.dfsg.1-6etch1_alpha.deb stable/main/binary-alpha/ksysguard_3.5.5a.dfsg.1-6etch1_alpha.deb stable/main/binary-alpha/ksysguardd_3.5.5a.dfsg.1-6etch1_alpha.deb stable/main/binary-alpha/ktip_3.5.5a.dfsg.1-6etch1_alpha.deb stable/main/binary-alpha/kwin_3.5.5a.dfsg.1-6etch1_alpha.deb stable/main/binary-alpha/libkonq4_3.5.5a.dfsg.1-6etch1_alpha.deb stable/main/binary-alpha/libkonq4-dev_3.5.5a.dfsg.1-6etch1_alpha.deb stable/main/binary-alpha/kdebase-dbg_3.5.5a.dfsg.1-6etch1_alpha.deb kdebase (4:3.5.5a.dfsg.1-6etch1) stable-security; urgency=high * Non-maintainer upload by The Security Team. * Under certain circumstances it might be possible for a user to login to kdm without a password. This is now fixed. [CVE-2007-4569] stable/main/source/kdebase_3.5.5a.dfsg.1-6etch1.dsc stable/main/source/kdebase_3.5.5a.dfsg.1.orig.tar.gz stable/main/source/kdebase_3.5.5a.dfsg.1-6etch1.diff.gz stable/main/binary-all/kdebase_3.5.5a.dfsg.1-6etch1_all.deb stable/main/binary-all/kdebase-data_3.5.5a.dfsg.1-6etch1_all.deb stable/main/binary-all/kdebase-doc_3.5.5a.dfsg.1-6etch1_all.deb stable/main/binary-all/kdebase-doc-html_3.5.5a.dfsg.1-6etch1_all.deb stable/main/binary-amd64/kappfinder_3.5.5a.dfsg.1-6etch1_amd64.deb stable/main/binary-amd64/kate_3.5.5a.dfsg.1-6etch1_amd64.deb stable/main/binary-amd64/kcontrol_3.5.5a.dfsg.1-6etch1_amd64.deb stable/main/binary-amd64/kdebase-bin_3.5.5a.dfsg.1-6etch1_amd64.deb stable/main/binary-amd64/kdebase-dev_3.5.5a.dfsg.1-6etch1_amd64.deb stable/main/binary-amd64/kdebase-kio-plugins_3.5.5a.dfsg.1-6etch1_amd64.deb stable/main/binary-amd64/kdepasswd_3.5.5a.dfsg.1-6etch1_amd64.deb stable/main/binary-amd64/kdeprint_3.5.5a.dfsg.1-6etch1_amd64.deb stable/main/binary-amd64/kdesktop_3.5.5a.dfsg.1-6etch1_amd64.deb stable/main/binary-amd64/kdm_3.5.5a.dfsg.1-6etch1_amd64.deb stable/main/binary-amd64/kfind_3.5.5a.dfsg.1-6etch1_amd64.deb stable/main/binary-amd64/khelpcenter_3.5.5a.dfsg.1-6etch1_amd64.deb stable/main/binary-amd64/kicker_3.5.5a.dfsg.1-6etch1_amd64.deb stable/main/binary-amd64/klipper_3.5.5a.dfsg.1-6etch1_amd64.deb stable/main/binary-amd64/kmenuedit_3.5.5a.dfsg.1-6etch1_amd64.deb stable/main/binary-amd64/konqueror_3.5.5a.dfsg.1-6etch1_amd64.deb stable/main/binary-amd64/konqueror-nsplugins_3.5.5a.dfsg.1-6etch1_amd64.deb stable/main/binary-amd64/konsole_3.5.5a.dfsg.1-6etch1_amd64.deb stable/main/binary-amd64/kpager_3.5.5a.dfsg.1-6etch1_amd64.deb stable/main/binary-amd64/kpersonalizer_3.5.5a.dfsg.1-6etch1_amd64.deb stable/main/binary-amd64/ksmserver_3.5.5a.dfsg.1-6etch1_amd64.deb stable/main/binary-amd64/ksplash_3.5.5a.dfsg.1-6etch1_amd64.deb stable/main/binary-amd64/ksysguard_3.5.5a.dfsg.1-6etch1_amd64.deb stable/main/binary-amd64/ksysguardd_3.5.5a.dfsg.1-6etch1_amd64.deb stable/main/binary-amd64/ktip_3.5.5a.dfsg.1-6etch1_amd64.deb stable/main/binary-amd64/kwin_3.5.5a.dfsg.1-6etch1_amd64.deb stable/main/binary-amd64/libkonq4_3.5.5a.dfsg.1-6etch1_amd64.deb stable/main/binary-amd64/libkonq4-dev_3.5.5a.dfsg.1-6etch1_amd64.deb stable/main/binary-amd64/kdebase-dbg_3.5.5a.dfsg.1-6etch1_amd64.deb kdebase (4:3.5.5a.dfsg.1-6etch1) stable-security; urgency=high * Non-maintainer upload by The Security Team. * Under certain circumstances it might be possible for a user to login to kdm without a password. This is now fixed. [CVE-2007-4569] stable/main/binary-arm/kappfinder_3.5.5a.dfsg.1-6etch1_arm.deb stable/main/binary-arm/kate_3.5.5a.dfsg.1-6etch1_arm.deb stable/main/binary-arm/kcontrol_3.5.5a.dfsg.1-6etch1_arm.deb stable/main/binary-arm/kdebase-bin_3.5.5a.dfsg.1-6etch1_arm.deb stable/main/binary-arm/kdebase-dev_3.5.5a.dfsg.1-6etch1_arm.deb stable/main/binary-arm/kdebase-kio-plugins_3.5.5a.dfsg.1-6etch1_arm.deb stable/main/binary-arm/kdepasswd_3.5.5a.dfsg.1-6etch1_arm.deb stable/main/binary-arm/kdeprint_3.5.5a.dfsg.1-6etch1_arm.deb stable/main/binary-arm/kdesktop_3.5.5a.dfsg.1-6etch1_arm.deb stable/main/binary-arm/kdm_3.5.5a.dfsg.1-6etch1_arm.deb stable/main/binary-arm/kfind_3.5.5a.dfsg.1-6etch1_arm.deb stable/main/binary-arm/khelpcenter_3.5.5a.dfsg.1-6etch1_arm.deb stable/main/binary-arm/kicker_3.5.5a.dfsg.1-6etch1_arm.deb stable/main/binary-arm/klipper_3.5.5a.dfsg.1-6etch1_arm.deb stable/main/binary-arm/kmenuedit_3.5.5a.dfsg.1-6etch1_arm.deb stable/main/binary-arm/konqueror_3.5.5a.dfsg.1-6etch1_arm.deb stable/main/binary-arm/konqueror-nsplugins_3.5.5a.dfsg.1-6etch1_arm.deb stable/main/binary-arm/konsole_3.5.5a.dfsg.1-6etch1_arm.deb stable/main/binary-arm/kpager_3.5.5a.dfsg.1-6etch1_arm.deb stable/main/binary-arm/kpersonalizer_3.5.5a.dfsg.1-6etch1_arm.deb stable/main/binary-arm/ksmserver_3.5.5a.dfsg.1-6etch1_arm.deb stable/main/binary-arm/ksplash_3.5.5a.dfsg.1-6etch1_arm.deb stable/main/binary-arm/ksysguard_3.5.5a.dfsg.1-6etch1_arm.deb stable/main/binary-arm/ksysguardd_3.5.5a.dfsg.1-6etch1_arm.deb stable/main/binary-arm/ktip_3.5.5a.dfsg.1-6etch1_arm.deb stable/main/binary-arm/kwin_3.5.5a.dfsg.1-6etch1_arm.deb stable/main/binary-arm/libkonq4_3.5.5a.dfsg.1-6etch1_arm.deb stable/main/binary-arm/libkonq4-dev_3.5.5a.dfsg.1-6etch1_arm.deb stable/main/binary-arm/kdebase-dbg_3.5.5a.dfsg.1-6etch1_arm.deb kdebase (4:3.5.5a.dfsg.1-6etch1) stable-security; urgency=high * Non-maintainer upload by The Security Team. * Under certain circumstances it might be possible for a user to login to kdm without a password. This is now fixed. [CVE-2007-4569] stable/main/binary-hppa/kappfinder_3.5.5a.dfsg.1-6etch1_hppa.deb stable/main/binary-hppa/kate_3.5.5a.dfsg.1-6etch1_hppa.deb stable/main/binary-hppa/kcontrol_3.5.5a.dfsg.1-6etch1_hppa.deb stable/main/binary-hppa/kdebase-bin_3.5.5a.dfsg.1-6etch1_hppa.deb stable/main/binary-hppa/kdebase-dev_3.5.5a.dfsg.1-6etch1_hppa.deb stable/main/binary-hppa/kdebase-kio-plugins_3.5.5a.dfsg.1-6etch1_hppa.deb stable/main/binary-hppa/kdepasswd_3.5.5a.dfsg.1-6etch1_hppa.deb stable/main/binary-hppa/kdeprint_3.5.5a.dfsg.1-6etch1_hppa.deb stable/main/binary-hppa/kdesktop_3.5.5a.dfsg.1-6etch1_hppa.deb stable/main/binary-hppa/kdm_3.5.5a.dfsg.1-6etch1_hppa.deb stable/main/binary-hppa/kfind_3.5.5a.dfsg.1-6etch1_hppa.deb stable/main/binary-hppa/khelpcenter_3.5.5a.dfsg.1-6etch1_hppa.deb stable/main/binary-hppa/kicker_3.5.5a.dfsg.1-6etch1_hppa.deb stable/main/binary-hppa/klipper_3.5.5a.dfsg.1-6etch1_hppa.deb stable/main/binary-hppa/kmenuedit_3.5.5a.dfsg.1-6etch1_hppa.deb stable/main/binary-hppa/konqueror_3.5.5a.dfsg.1-6etch1_hppa.deb stable/main/binary-hppa/konqueror-nsplugins_3.5.5a.dfsg.1-6etch1_hppa.deb stable/main/binary-hppa/konsole_3.5.5a.dfsg.1-6etch1_hppa.deb stable/main/binary-hppa/kpager_3.5.5a.dfsg.1-6etch1_hppa.deb stable/main/binary-hppa/kpersonalizer_3.5.5a.dfsg.1-6etch1_hppa.deb stable/main/binary-hppa/ksmserver_3.5.5a.dfsg.1-6etch1_hppa.deb stable/main/binary-hppa/ksplash_3.5.5a.dfsg.1-6etch1_hppa.deb stable/main/binary-hppa/ksysguard_3.5.5a.dfsg.1-6etch1_hppa.deb stable/main/binary-hppa/ksysguardd_3.5.5a.dfsg.1-6etch1_hppa.deb stable/main/binary-hppa/ktip_3.5.5a.dfsg.1-6etch1_hppa.deb stable/main/binary-hppa/kwin_3.5.5a.dfsg.1-6etch1_hppa.deb stable/main/binary-hppa/libkonq4_3.5.5a.dfsg.1-6etch1_hppa.deb stable/main/binary-hppa/libkonq4-dev_3.5.5a.dfsg.1-6etch1_hppa.deb stable/main/binary-hppa/kdebase-dbg_3.5.5a.dfsg.1-6etch1_hppa.deb kdebase (4:3.5.5a.dfsg.1-6etch1) stable-security; urgency=high * Non-maintainer upload by The Security Team. * Under certain circumstances it might be possible for a user to login to kdm without a password. This is now fixed. [CVE-2007-4569] stable/main/binary-i386/kappfinder_3.5.5a.dfsg.1-6etch1_i386.deb stable/main/binary-i386/kate_3.5.5a.dfsg.1-6etch1_i386.deb stable/main/binary-i386/kcontrol_3.5.5a.dfsg.1-6etch1_i386.deb stable/main/binary-i386/kdebase-bin_3.5.5a.dfsg.1-6etch1_i386.deb stable/main/binary-i386/kdebase-dev_3.5.5a.dfsg.1-6etch1_i386.deb stable/main/binary-i386/kdebase-kio-plugins_3.5.5a.dfsg.1-6etch1_i386.deb stable/main/binary-i386/kdepasswd_3.5.5a.dfsg.1-6etch1_i386.deb stable/main/binary-i386/kdeprint_3.5.5a.dfsg.1-6etch1_i386.deb stable/main/binary-i386/kdesktop_3.5.5a.dfsg.1-6etch1_i386.deb stable/main/binary-i386/kdm_3.5.5a.dfsg.1-6etch1_i386.deb stable/main/binary-i386/kfind_3.5.5a.dfsg.1-6etch1_i386.deb stable/main/binary-i386/khelpcenter_3.5.5a.dfsg.1-6etch1_i386.deb stable/main/binary-i386/kicker_3.5.5a.dfsg.1-6etch1_i386.deb stable/main/binary-i386/klipper_3.5.5a.dfsg.1-6etch1_i386.deb stable/main/binary-i386/kmenuedit_3.5.5a.dfsg.1-6etch1_i386.deb stable/main/binary-i386/konqueror_3.5.5a.dfsg.1-6etch1_i386.deb stable/main/binary-i386/konqueror-nsplugins_3.5.5a.dfsg.1-6etch1_i386.deb stable/main/binary-i386/konsole_3.5.5a.dfsg.1-6etch1_i386.deb stable/main/binary-i386/kpager_3.5.5a.dfsg.1-6etch1_i386.deb stable/main/binary-i386/kpersonalizer_3.5.5a.dfsg.1-6etch1_i386.deb stable/main/binary-i386/ksmserver_3.5.5a.dfsg.1-6etch1_i386.deb stable/main/binary-i386/ksplash_3.5.5a.dfsg.1-6etch1_i386.deb stable/main/binary-i386/ksysguard_3.5.5a.dfsg.1-6etch1_i386.deb stable/main/binary-i386/ksysguardd_3.5.5a.dfsg.1-6etch1_i386.deb stable/main/binary-i386/ktip_3.5.5a.dfsg.1-6etch1_i386.deb stable/main/binary-i386/kwin_3.5.5a.dfsg.1-6etch1_i386.deb stable/main/binary-i386/libkonq4_3.5.5a.dfsg.1-6etch1_i386.deb stable/main/binary-i386/libkonq4-dev_3.5.5a.dfsg.1-6etch1_i386.deb stable/main/binary-i386/kdebase-dbg_3.5.5a.dfsg.1-6etch1_i386.deb kdebase (4:3.5.5a.dfsg.1-6etch1) stable-security; urgency=high * Non-maintainer upload by The Security Team. * Under certain circumstances it might be possible for a user to login to kdm without a password. This is now fixed. [CVE-2007-4569] stable/main/binary-ia64/kappfinder_3.5.5a.dfsg.1-6etch1_ia64.deb stable/main/binary-ia64/kate_3.5.5a.dfsg.1-6etch1_ia64.deb stable/main/binary-ia64/kcontrol_3.5.5a.dfsg.1-6etch1_ia64.deb stable/main/binary-ia64/kdebase-bin_3.5.5a.dfsg.1-6etch1_ia64.deb stable/main/binary-ia64/kdebase-dev_3.5.5a.dfsg.1-6etch1_ia64.deb stable/main/binary-ia64/kdebase-kio-plugins_3.5.5a.dfsg.1-6etch1_ia64.deb stable/main/binary-ia64/kdepasswd_3.5.5a.dfsg.1-6etch1_ia64.deb stable/main/binary-ia64/kdeprint_3.5.5a.dfsg.1-6etch1_ia64.deb stable/main/binary-ia64/kdesktop_3.5.5a.dfsg.1-6etch1_ia64.deb stable/main/binary-ia64/kdm_3.5.5a.dfsg.1-6etch1_ia64.deb stable/main/binary-ia64/kfind_3.5.5a.dfsg.1-6etch1_ia64.deb stable/main/binary-ia64/khelpcenter_3.5.5a.dfsg.1-6etch1_ia64.deb stable/main/binary-ia64/kicker_3.5.5a.dfsg.1-6etch1_ia64.deb stable/main/binary-ia64/klipper_3.5.5a.dfsg.1-6etch1_ia64.deb stable/main/binary-ia64/kmenuedit_3.5.5a.dfsg.1-6etch1_ia64.deb stable/main/binary-ia64/konqueror_3.5.5a.dfsg.1-6etch1_ia64.deb stable/main/binary-ia64/konqueror-nsplugins_3.5.5a.dfsg.1-6etch1_ia64.deb stable/main/binary-ia64/konsole_3.5.5a.dfsg.1-6etch1_ia64.deb stable/main/binary-ia64/kpager_3.5.5a.dfsg.1-6etch1_ia64.deb stable/main/binary-ia64/kpersonalizer_3.5.5a.dfsg.1-6etch1_ia64.deb stable/main/binary-ia64/ksmserver_3.5.5a.dfsg.1-6etch1_ia64.deb stable/main/binary-ia64/ksplash_3.5.5a.dfsg.1-6etch1_ia64.deb stable/main/binary-ia64/ksysguard_3.5.5a.dfsg.1-6etch1_ia64.deb stable/main/binary-ia64/ksysguardd_3.5.5a.dfsg.1-6etch1_ia64.deb stable/main/binary-ia64/ktip_3.5.5a.dfsg.1-6etch1_ia64.deb stable/main/binary-ia64/kwin_3.5.5a.dfsg.1-6etch1_ia64.deb stable/main/binary-ia64/libkonq4_3.5.5a.dfsg.1-6etch1_ia64.deb stable/main/binary-ia64/libkonq4-dev_3.5.5a.dfsg.1-6etch1_ia64.deb stable/main/binary-ia64/kdebase-dbg_3.5.5a.dfsg.1-6etch1_ia64.deb kdebase (4:3.5.5a.dfsg.1-6etch1) stable-security; urgency=high * Non-maintainer upload by The Security Team. * Under certain circumstances it might be possible for a user to login to kdm without a password. This is now fixed. [CVE-2007-4569] stable/main/binary-mips/kappfinder_3.5.5a.dfsg.1-6etch1_mips.deb stable/main/binary-mips/kate_3.5.5a.dfsg.1-6etch1_mips.deb stable/main/binary-mips/kcontrol_3.5.5a.dfsg.1-6etch1_mips.deb stable/main/binary-mips/kdebase-bin_3.5.5a.dfsg.1-6etch1_mips.deb stable/main/binary-mips/kdebase-dev_3.5.5a.dfsg.1-6etch1_mips.deb stable/main/binary-mips/kdebase-kio-plugins_3.5.5a.dfsg.1-6etch1_mips.deb stable/main/binary-mips/kdepasswd_3.5.5a.dfsg.1-6etch1_mips.deb stable/main/binary-mips/kdeprint_3.5.5a.dfsg.1-6etch1_mips.deb stable/main/binary-mips/kdesktop_3.5.5a.dfsg.1-6etch1_mips.deb stable/main/binary-mips/kdm_3.5.5a.dfsg.1-6etch1_mips.deb stable/main/binary-mips/kfind_3.5.5a.dfsg.1-6etch1_mips.deb stable/main/binary-mips/khelpcenter_3.5.5a.dfsg.1-6etch1_mips.deb stable/main/binary-mips/kicker_3.5.5a.dfsg.1-6etch1_mips.deb stable/main/binary-mips/klipper_3.5.5a.dfsg.1-6etch1_mips.deb stable/main/binary-mips/kmenuedit_3.5.5a.dfsg.1-6etch1_mips.deb stable/main/binary-mips/konqueror_3.5.5a.dfsg.1-6etch1_mips.deb stable/main/binary-mips/konqueror-nsplugins_3.5.5a.dfsg.1-6etch1_mips.deb stable/main/binary-mips/konsole_3.5.5a.dfsg.1-6etch1_mips.deb stable/main/binary-mips/kpager_3.5.5a.dfsg.1-6etch1_mips.deb stable/main/binary-mips/kpersonalizer_3.5.5a.dfsg.1-6etch1_mips.deb stable/main/binary-mips/ksmserver_3.5.5a.dfsg.1-6etch1_mips.deb stable/main/binary-mips/ksplash_3.5.5a.dfsg.1-6etch1_mips.deb stable/main/binary-mips/ksysguard_3.5.5a.dfsg.1-6etch1_mips.deb stable/main/binary-mips/ksysguardd_3.5.5a.dfsg.1-6etch1_mips.deb stable/main/binary-mips/ktip_3.5.5a.dfsg.1-6etch1_mips.deb stable/main/binary-mips/kwin_3.5.5a.dfsg.1-6etch1_mips.deb stable/main/binary-mips/libkonq4_3.5.5a.dfsg.1-6etch1_mips.deb stable/main/binary-mips/libkonq4-dev_3.5.5a.dfsg.1-6etch1_mips.deb stable/main/binary-mips/kdebase-dbg_3.5.5a.dfsg.1-6etch1_mips.deb kdebase (4:3.5.5a.dfsg.1-6etch1) stable-security; urgency=high * Non-maintainer upload by The Security Team. * Under certain circumstances it might be possible for a user to login to kdm without a password. This is now fixed. [CVE-2007-4569] stable/main/binary-mipsel/kappfinder_3.5.5a.dfsg.1-6etch1_mipsel.deb stable/main/binary-mipsel/kate_3.5.5a.dfsg.1-6etch1_mipsel.deb stable/main/binary-mipsel/kcontrol_3.5.5a.dfsg.1-6etch1_mipsel.deb stable/main/binary-mipsel/kdebase-bin_3.5.5a.dfsg.1-6etch1_mipsel.deb stable/main/binary-mipsel/kdebase-dev_3.5.5a.dfsg.1-6etch1_mipsel.deb stable/main/binary-mipsel/kdebase-kio-plugins_3.5.5a.dfsg.1-6etch1_mipsel.deb stable/main/binary-mipsel/kdepasswd_3.5.5a.dfsg.1-6etch1_mipsel.deb stable/main/binary-mipsel/kdeprint_3.5.5a.dfsg.1-6etch1_mipsel.deb stable/main/binary-mipsel/kdesktop_3.5.5a.dfsg.1-6etch1_mipsel.deb stable/main/binary-mipsel/kdm_3.5.5a.dfsg.1-6etch1_mipsel.deb stable/main/binary-mipsel/kfind_3.5.5a.dfsg.1-6etch1_mipsel.deb stable/main/binary-mipsel/khelpcenter_3.5.5a.dfsg.1-6etch1_mipsel.deb stable/main/binary-mipsel/kicker_3.5.5a.dfsg.1-6etch1_mipsel.deb stable/main/binary-mipsel/klipper_3.5.5a.dfsg.1-6etch1_mipsel.deb stable/main/binary-mipsel/kmenuedit_3.5.5a.dfsg.1-6etch1_mipsel.deb stable/main/binary-mipsel/konqueror_3.5.5a.dfsg.1-6etch1_mipsel.deb stable/main/binary-mipsel/konqueror-nsplugins_3.5.5a.dfsg.1-6etch1_mipsel.deb stable/main/binary-mipsel/konsole_3.5.5a.dfsg.1-6etch1_mipsel.deb stable/main/binary-mipsel/kpager_3.5.5a.dfsg.1-6etch1_mipsel.deb stable/main/binary-mipsel/kpersonalizer_3.5.5a.dfsg.1-6etch1_mipsel.deb stable/main/binary-mipsel/ksmserver_3.5.5a.dfsg.1-6etch1_mipsel.deb stable/main/binary-mipsel/ksplash_3.5.5a.dfsg.1-6etch1_mipsel.deb stable/main/binary-mipsel/ksysguard_3.5.5a.dfsg.1-6etch1_mipsel.deb stable/main/binary-mipsel/ksysguardd_3.5.5a.dfsg.1-6etch1_mipsel.deb stable/main/binary-mipsel/ktip_3.5.5a.dfsg.1-6etch1_mipsel.deb stable/main/binary-mipsel/kwin_3.5.5a.dfsg.1-6etch1_mipsel.deb stable/main/binary-mipsel/libkonq4_3.5.5a.dfsg.1-6etch1_mipsel.deb stable/main/binary-mipsel/libkonq4-dev_3.5.5a.dfsg.1-6etch1_mipsel.deb stable/main/binary-mipsel/kdebase-dbg_3.5.5a.dfsg.1-6etch1_mipsel.deb kdebase (4:3.5.5a.dfsg.1-6etch1) stable-security; urgency=high * Non-maintainer upload by The Security Team. * Under certain circumstances it might be possible for a user to login to kdm without a password. This is now fixed. [CVE-2007-4569] stable/main/binary-powerpc/kappfinder_3.5.5a.dfsg.1-6etch1_powerpc.deb stable/main/binary-powerpc/kate_3.5.5a.dfsg.1-6etch1_powerpc.deb stable/main/binary-powerpc/kcontrol_3.5.5a.dfsg.1-6etch1_powerpc.deb stable/main/binary-powerpc/kdebase-bin_3.5.5a.dfsg.1-6etch1_powerpc.deb stable/main/binary-powerpc/kdebase-dev_3.5.5a.dfsg.1-6etch1_powerpc.deb stable/main/binary-powerpc/kdebase-kio-plugins_3.5.5a.dfsg.1-6etch1_powerpc.deb stable/main/binary-powerpc/kdepasswd_3.5.5a.dfsg.1-6etch1_powerpc.deb stable/main/binary-powerpc/kdeprint_3.5.5a.dfsg.1-6etch1_powerpc.deb stable/main/binary-powerpc/kdesktop_3.5.5a.dfsg.1-6etch1_powerpc.deb stable/main/binary-powerpc/kdm_3.5.5a.dfsg.1-6etch1_powerpc.deb stable/main/binary-powerpc/kfind_3.5.5a.dfsg.1-6etch1_powerpc.deb stable/main/binary-powerpc/khelpcenter_3.5.5a.dfsg.1-6etch1_powerpc.deb stable/main/binary-powerpc/kicker_3.5.5a.dfsg.1-6etch1_powerpc.deb stable/main/binary-powerpc/klipper_3.5.5a.dfsg.1-6etch1_powerpc.deb stable/main/binary-powerpc/kmenuedit_3.5.5a.dfsg.1-6etch1_powerpc.deb stable/main/binary-powerpc/konqueror_3.5.5a.dfsg.1-6etch1_powerpc.deb stable/main/binary-powerpc/konqueror-nsplugins_3.5.5a.dfsg.1-6etch1_powerpc.deb stable/main/binary-powerpc/konsole_3.5.5a.dfsg.1-6etch1_powerpc.deb stable/main/binary-powerpc/kpager_3.5.5a.dfsg.1-6etch1_powerpc.deb stable/main/binary-powerpc/kpersonalizer_3.5.5a.dfsg.1-6etch1_powerpc.deb stable/main/binary-powerpc/ksmserver_3.5.5a.dfsg.1-6etch1_powerpc.deb stable/main/binary-powerpc/ksplash_3.5.5a.dfsg.1-6etch1_powerpc.deb stable/main/binary-powerpc/ksysguard_3.5.5a.dfsg.1-6etch1_powerpc.deb stable/main/binary-powerpc/ksysguardd_3.5.5a.dfsg.1-6etch1_powerpc.deb stable/main/binary-powerpc/ktip_3.5.5a.dfsg.1-6etch1_powerpc.deb stable/main/binary-powerpc/kwin_3.5.5a.dfsg.1-6etch1_powerpc.deb stable/main/binary-powerpc/libkonq4_3.5.5a.dfsg.1-6etch1_powerpc.deb stable/main/binary-powerpc/libkonq4-dev_3.5.5a.dfsg.1-6etch1_powerpc.deb stable/main/binary-powerpc/kdebase-dbg_3.5.5a.dfsg.1-6etch1_powerpc.deb kdebase (4:3.5.5a.dfsg.1-6etch1) stable-security; urgency=high * Non-maintainer upload by The Security Team. * Under certain circumstances it might be possible for a user to login to kdm without a password. This is now fixed. [CVE-2007-4569] stable/main/binary-s390/kappfinder_3.5.5a.dfsg.1-6etch1_s390.deb stable/main/binary-s390/kate_3.5.5a.dfsg.1-6etch1_s390.deb stable/main/binary-s390/kcontrol_3.5.5a.dfsg.1-6etch1_s390.deb stable/main/binary-s390/kdebase-bin_3.5.5a.dfsg.1-6etch1_s390.deb stable/main/binary-s390/kdebase-dev_3.5.5a.dfsg.1-6etch1_s390.deb stable/main/binary-s390/kdebase-kio-plugins_3.5.5a.dfsg.1-6etch1_s390.deb stable/main/binary-s390/kdepasswd_3.5.5a.dfsg.1-6etch1_s390.deb stable/main/binary-s390/kdeprint_3.5.5a.dfsg.1-6etch1_s390.deb stable/main/binary-s390/kdesktop_3.5.5a.dfsg.1-6etch1_s390.deb stable/main/binary-s390/kdm_3.5.5a.dfsg.1-6etch1_s390.deb stable/main/binary-s390/kfind_3.5.5a.dfsg.1-6etch1_s390.deb stable/main/binary-s390/khelpcenter_3.5.5a.dfsg.1-6etch1_s390.deb stable/main/binary-s390/kicker_3.5.5a.dfsg.1-6etch1_s390.deb stable/main/binary-s390/klipper_3.5.5a.dfsg.1-6etch1_s390.deb stable/main/binary-s390/kmenuedit_3.5.5a.dfsg.1-6etch1_s390.deb stable/main/binary-s390/konqueror_3.5.5a.dfsg.1-6etch1_s390.deb stable/main/binary-s390/konqueror-nsplugins_3.5.5a.dfsg.1-6etch1_s390.deb stable/main/binary-s390/konsole_3.5.5a.dfsg.1-6etch1_s390.deb stable/main/binary-s390/kpager_3.5.5a.dfsg.1-6etch1_s390.deb stable/main/binary-s390/kpersonalizer_3.5.5a.dfsg.1-6etch1_s390.deb stable/main/binary-s390/ksmserver_3.5.5a.dfsg.1-6etch1_s390.deb stable/main/binary-s390/ksplash_3.5.5a.dfsg.1-6etch1_s390.deb stable/main/binary-s390/ksysguard_3.5.5a.dfsg.1-6etch1_s390.deb stable/main/binary-s390/ksysguardd_3.5.5a.dfsg.1-6etch1_s390.deb stable/main/binary-s390/ktip_3.5.5a.dfsg.1-6etch1_s390.deb stable/main/binary-s390/kwin_3.5.5a.dfsg.1-6etch1_s390.deb stable/main/binary-s390/libkonq4_3.5.5a.dfsg.1-6etch1_s390.deb stable/main/binary-s390/libkonq4-dev_3.5.5a.dfsg.1-6etch1_s390.deb stable/main/binary-s390/kdebase-dbg_3.5.5a.dfsg.1-6etch1_s390.deb kdebase (4:3.5.5a.dfsg.1-6etch1) stable-security; urgency=high * Non-maintainer upload by The Security Team. * Under certain circumstances it might be possible for a user to login to kdm without a password. This is now fixed. [CVE-2007-4569] stable/main/binary-sparc/kappfinder_3.5.5a.dfsg.1-6etch1_sparc.deb stable/main/binary-sparc/kate_3.5.5a.dfsg.1-6etch1_sparc.deb stable/main/binary-sparc/kcontrol_3.5.5a.dfsg.1-6etch1_sparc.deb stable/main/binary-sparc/kdebase-bin_3.5.5a.dfsg.1-6etch1_sparc.deb stable/main/binary-sparc/kdebase-dev_3.5.5a.dfsg.1-6etch1_sparc.deb stable/main/binary-sparc/kdebase-kio-plugins_3.5.5a.dfsg.1-6etch1_sparc.deb stable/main/binary-sparc/kdepasswd_3.5.5a.dfsg.1-6etch1_sparc.deb stable/main/binary-sparc/kdeprint_3.5.5a.dfsg.1-6etch1_sparc.deb stable/main/binary-sparc/kdesktop_3.5.5a.dfsg.1-6etch1_sparc.deb stable/main/binary-sparc/kdm_3.5.5a.dfsg.1-6etch1_sparc.deb stable/main/binary-sparc/kfind_3.5.5a.dfsg.1-6etch1_sparc.deb stable/main/binary-sparc/khelpcenter_3.5.5a.dfsg.1-6etch1_sparc.deb stable/main/binary-sparc/kicker_3.5.5a.dfsg.1-6etch1_sparc.deb stable/main/binary-sparc/klipper_3.5.5a.dfsg.1-6etch1_sparc.deb stable/main/binary-sparc/kmenuedit_3.5.5a.dfsg.1-6etch1_sparc.deb stable/main/binary-sparc/konqueror_3.5.5a.dfsg.1-6etch1_sparc.deb stable/main/binary-sparc/konqueror-nsplugins_3.5.5a.dfsg.1-6etch1_sparc.deb stable/main/binary-sparc/konsole_3.5.5a.dfsg.1-6etch1_sparc.deb stable/main/binary-sparc/kpager_3.5.5a.dfsg.1-6etch1_sparc.deb stable/main/binary-sparc/kpersonalizer_3.5.5a.dfsg.1-6etch1_sparc.deb stable/main/binary-sparc/ksmserver_3.5.5a.dfsg.1-6etch1_sparc.deb stable/main/binary-sparc/ksplash_3.5.5a.dfsg.1-6etch1_sparc.deb stable/main/binary-sparc/ksysguard_3.5.5a.dfsg.1-6etch1_sparc.deb stable/main/binary-sparc/ksysguardd_3.5.5a.dfsg.1-6etch1_sparc.deb stable/main/binary-sparc/ktip_3.5.5a.dfsg.1-6etch1_sparc.deb stable/main/binary-sparc/kwin_3.5.5a.dfsg.1-6etch1_sparc.deb stable/main/binary-sparc/libkonq4_3.5.5a.dfsg.1-6etch1_sparc.deb stable/main/binary-sparc/libkonq4-dev_3.5.5a.dfsg.1-6etch1_sparc.deb stable/main/binary-sparc/kdebase-dbg_3.5.5a.dfsg.1-6etch1_sparc.deb kdebase (4:3.5.5a.dfsg.1-6etch1) stable-security; urgency=high * Non-maintainer upload by The Security Team. * Under certain circumstances it might be possible for a user to login to kdm without a password. This is now fixed. [CVE-2007-4569] stable/main/binary-alpha/kamera_3.5.5-3etch2_alpha.deb stable/main/binary-alpha/kcoloredit_3.5.5-3etch2_alpha.deb stable/main/binary-alpha/kdegraphics-dev_3.5.5-3etch2_alpha.deb stable/main/binary-alpha/kdegraphics-kfile-plugins_3.5.5-3etch2_alpha.deb stable/main/binary-alpha/kdvi_3.5.5-3etch2_alpha.deb stable/main/binary-alpha/kfax_3.5.5-3etch2_alpha.deb stable/main/binary-alpha/kfaxview_3.5.5-3etch2_alpha.deb stable/main/binary-alpha/kgamma_3.5.5-3etch2_alpha.deb stable/main/binary-alpha/kghostview_3.5.5-3etch2_alpha.deb stable/main/binary-alpha/kiconedit_3.5.5-3etch2_alpha.deb stable/main/binary-alpha/kmrml_3.5.5-3etch2_alpha.deb stable/main/binary-alpha/kolourpaint_3.5.5-3etch2_alpha.deb stable/main/binary-alpha/kooka_3.5.5-3etch2_alpha.deb stable/main/binary-alpha/kpdf_3.5.5-3etch2_alpha.deb stable/main/binary-alpha/kpovmodeler_3.5.5-3etch2_alpha.deb stable/main/binary-alpha/kruler_3.5.5-3etch2_alpha.deb stable/main/binary-alpha/ksnapshot_3.5.5-3etch2_alpha.deb stable/main/binary-alpha/ksvg_3.5.5-3etch2_alpha.deb stable/main/binary-alpha/kuickshow_3.5.5-3etch2_alpha.deb stable/main/binary-alpha/kview_3.5.5-3etch2_alpha.deb stable/main/binary-alpha/kviewshell_3.5.5-3etch2_alpha.deb stable/main/binary-alpha/libkscan-dev_3.5.5-3etch2_alpha.deb stable/main/binary-alpha/libkscan1_3.5.5-3etch2_alpha.deb stable/main/binary-alpha/kdegraphics-dbg_3.5.5-3etch2_alpha.deb kdegraphics (4:3.5.5-3etch2) stable-security; urgency=low * Fix CVE-2007-4352, CVE-2007-5392 and CVE-2007-5493. * Rename previous patch to enforce patch order stable/main/binary-amd64/kamera_3.5.5-3etch2_amd64.deb stable/main/binary-amd64/kcoloredit_3.5.5-3etch2_amd64.deb stable/main/binary-amd64/kdegraphics-dev_3.5.5-3etch2_amd64.deb stable/main/binary-amd64/kdegraphics-kfile-plugins_3.5.5-3etch2_amd64.deb stable/main/binary-amd64/kdvi_3.5.5-3etch2_amd64.deb stable/main/binary-amd64/kfax_3.5.5-3etch2_amd64.deb stable/main/binary-amd64/kfaxview_3.5.5-3etch2_amd64.deb stable/main/binary-amd64/kgamma_3.5.5-3etch2_amd64.deb stable/main/binary-amd64/kghostview_3.5.5-3etch2_amd64.deb stable/main/binary-amd64/kiconedit_3.5.5-3etch2_amd64.deb stable/main/binary-amd64/kmrml_3.5.5-3etch2_amd64.deb stable/main/binary-amd64/kolourpaint_3.5.5-3etch2_amd64.deb stable/main/binary-amd64/kooka_3.5.5-3etch2_amd64.deb stable/main/binary-amd64/kpdf_3.5.5-3etch2_amd64.deb stable/main/binary-amd64/kpovmodeler_3.5.5-3etch2_amd64.deb stable/main/binary-amd64/kruler_3.5.5-3etch2_amd64.deb stable/main/binary-amd64/ksnapshot_3.5.5-3etch2_amd64.deb stable/main/binary-amd64/ksvg_3.5.5-3etch2_amd64.deb stable/main/binary-amd64/kuickshow_3.5.5-3etch2_amd64.deb stable/main/binary-amd64/kview_3.5.5-3etch2_amd64.deb stable/main/binary-amd64/kviewshell_3.5.5-3etch2_amd64.deb stable/main/binary-amd64/libkscan-dev_3.5.5-3etch2_amd64.deb stable/main/binary-amd64/libkscan1_3.5.5-3etch2_amd64.deb stable/main/binary-amd64/kdegraphics-dbg_3.5.5-3etch2_amd64.deb kdegraphics (4:3.5.5-3etch2) stable-security; urgency=low * Fix CVE-2007-4352, CVE-2007-5392 and CVE-2007-5493. * Rename previous patch to enforce patch order stable/main/binary-arm/kamera_3.5.5-3etch2_arm.deb stable/main/binary-arm/kcoloredit_3.5.5-3etch2_arm.deb stable/main/binary-arm/kdegraphics-dev_3.5.5-3etch2_arm.deb stable/main/binary-arm/kdegraphics-kfile-plugins_3.5.5-3etch2_arm.deb stable/main/binary-arm/kdvi_3.5.5-3etch2_arm.deb stable/main/binary-arm/kfax_3.5.5-3etch2_arm.deb stable/main/binary-arm/kfaxview_3.5.5-3etch2_arm.deb stable/main/binary-arm/kgamma_3.5.5-3etch2_arm.deb stable/main/binary-arm/kghostview_3.5.5-3etch2_arm.deb stable/main/binary-arm/kiconedit_3.5.5-3etch2_arm.deb stable/main/binary-arm/kmrml_3.5.5-3etch2_arm.deb stable/main/binary-arm/kolourpaint_3.5.5-3etch2_arm.deb stable/main/binary-arm/kooka_3.5.5-3etch2_arm.deb stable/main/binary-arm/kpdf_3.5.5-3etch2_arm.deb stable/main/binary-arm/kpovmodeler_3.5.5-3etch2_arm.deb stable/main/binary-arm/kruler_3.5.5-3etch2_arm.deb stable/main/binary-arm/ksnapshot_3.5.5-3etch2_arm.deb stable/main/binary-arm/ksvg_3.5.5-3etch2_arm.deb stable/main/binary-arm/kuickshow_3.5.5-3etch2_arm.deb stable/main/binary-arm/kview_3.5.5-3etch2_arm.deb stable/main/binary-arm/kviewshell_3.5.5-3etch2_arm.deb stable/main/binary-arm/libkscan-dev_3.5.5-3etch2_arm.deb stable/main/binary-arm/libkscan1_3.5.5-3etch2_arm.deb stable/main/binary-arm/kdegraphics-dbg_3.5.5-3etch2_arm.deb kdegraphics (4:3.5.5-3etch2) stable-security; urgency=low * Fix CVE-2007-4352, CVE-2007-5392 and CVE-2007-5493. * Rename previous patch to enforce patch order stable/main/binary-hppa/kamera_3.5.5-3etch2_hppa.deb stable/main/binary-hppa/kcoloredit_3.5.5-3etch2_hppa.deb stable/main/binary-hppa/kdegraphics-dev_3.5.5-3etch2_hppa.deb stable/main/binary-hppa/kdegraphics-kfile-plugins_3.5.5-3etch2_hppa.deb stable/main/binary-hppa/kdvi_3.5.5-3etch2_hppa.deb stable/main/binary-hppa/kfax_3.5.5-3etch2_hppa.deb stable/main/binary-hppa/kfaxview_3.5.5-3etch2_hppa.deb stable/main/binary-hppa/kgamma_3.5.5-3etch2_hppa.deb stable/main/binary-hppa/kghostview_3.5.5-3etch2_hppa.deb stable/main/binary-hppa/kiconedit_3.5.5-3etch2_hppa.deb stable/main/binary-hppa/kmrml_3.5.5-3etch2_hppa.deb stable/main/binary-hppa/kolourpaint_3.5.5-3etch2_hppa.deb stable/main/binary-hppa/kooka_3.5.5-3etch2_hppa.deb stable/main/binary-hppa/kpdf_3.5.5-3etch2_hppa.deb stable/main/binary-hppa/kpovmodeler_3.5.5-3etch2_hppa.deb stable/main/binary-hppa/kruler_3.5.5-3etch2_hppa.deb stable/main/binary-hppa/ksnapshot_3.5.5-3etch2_hppa.deb stable/main/binary-hppa/ksvg_3.5.5-3etch2_hppa.deb stable/main/binary-hppa/kuickshow_3.5.5-3etch2_hppa.deb stable/main/binary-hppa/kview_3.5.5-3etch2_hppa.deb stable/main/binary-hppa/kviewshell_3.5.5-3etch2_hppa.deb stable/main/binary-hppa/libkscan-dev_3.5.5-3etch2_hppa.deb stable/main/binary-hppa/libkscan1_3.5.5-3etch2_hppa.deb stable/main/binary-hppa/kdegraphics-dbg_3.5.5-3etch2_hppa.deb kdegraphics (4:3.5.5-3etch2) stable-security; urgency=low * Fix CVE-2007-4352, CVE-2007-5392 and CVE-2007-5493. * Rename previous patch to enforce patch order stable/main/source/kdegraphics_3.5.5-3etch2.dsc stable/main/source/kdegraphics_3.5.5-3etch2.diff.gz stable/main/binary-all/kdegraphics_3.5.5-3etch2_all.deb stable/main/binary-all/kdegraphics-doc-html_3.5.5-3etch2_all.deb stable/main/binary-i386/kamera_3.5.5-3etch2_i386.deb stable/main/binary-i386/kcoloredit_3.5.5-3etch2_i386.deb stable/main/binary-i386/kdegraphics-dev_3.5.5-3etch2_i386.deb stable/main/binary-i386/kdegraphics-kfile-plugins_3.5.5-3etch2_i386.deb stable/main/binary-i386/kdvi_3.5.5-3etch2_i386.deb stable/main/binary-i386/kfax_3.5.5-3etch2_i386.deb stable/main/binary-i386/kfaxview_3.5.5-3etch2_i386.deb stable/main/binary-i386/kgamma_3.5.5-3etch2_i386.deb stable/main/binary-i386/kghostview_3.5.5-3etch2_i386.deb stable/main/binary-i386/kiconedit_3.5.5-3etch2_i386.deb stable/main/binary-i386/kmrml_3.5.5-3etch2_i386.deb stable/main/binary-i386/kolourpaint_3.5.5-3etch2_i386.deb stable/main/binary-i386/kooka_3.5.5-3etch2_i386.deb stable/main/binary-i386/kpdf_3.5.5-3etch2_i386.deb stable/main/binary-i386/kpovmodeler_3.5.5-3etch2_i386.deb stable/main/binary-i386/kruler_3.5.5-3etch2_i386.deb stable/main/binary-i386/ksnapshot_3.5.5-3etch2_i386.deb stable/main/binary-i386/ksvg_3.5.5-3etch2_i386.deb stable/main/binary-i386/kuickshow_3.5.5-3etch2_i386.deb stable/main/binary-i386/kview_3.5.5-3etch2_i386.deb stable/main/binary-i386/kviewshell_3.5.5-3etch2_i386.deb stable/main/binary-i386/libkscan-dev_3.5.5-3etch2_i386.deb stable/main/binary-i386/libkscan1_3.5.5-3etch2_i386.deb stable/main/binary-i386/kdegraphics-dbg_3.5.5-3etch2_i386.deb kdegraphics (4:3.5.5-3etch2) stable-security; urgency=low * Fix CVE-2007-4352, CVE-2007-5392 and CVE-2007-5493. * Rename previous patch to enforce patch order stable/main/binary-ia64/kamera_3.5.5-3etch2_ia64.deb stable/main/binary-ia64/kcoloredit_3.5.5-3etch2_ia64.deb stable/main/binary-ia64/kdegraphics-dev_3.5.5-3etch2_ia64.deb stable/main/binary-ia64/kdegraphics-kfile-plugins_3.5.5-3etch2_ia64.deb stable/main/binary-ia64/kdvi_3.5.5-3etch2_ia64.deb stable/main/binary-ia64/kfax_3.5.5-3etch2_ia64.deb stable/main/binary-ia64/kfaxview_3.5.5-3etch2_ia64.deb stable/main/binary-ia64/kgamma_3.5.5-3etch2_ia64.deb stable/main/binary-ia64/kghostview_3.5.5-3etch2_ia64.deb stable/main/binary-ia64/kiconedit_3.5.5-3etch2_ia64.deb stable/main/binary-ia64/kmrml_3.5.5-3etch2_ia64.deb stable/main/binary-ia64/kolourpaint_3.5.5-3etch2_ia64.deb stable/main/binary-ia64/kooka_3.5.5-3etch2_ia64.deb stable/main/binary-ia64/kpdf_3.5.5-3etch2_ia64.deb stable/main/binary-ia64/kpovmodeler_3.5.5-3etch2_ia64.deb stable/main/binary-ia64/kruler_3.5.5-3etch2_ia64.deb stable/main/binary-ia64/ksnapshot_3.5.5-3etch2_ia64.deb stable/main/binary-ia64/ksvg_3.5.5-3etch2_ia64.deb stable/main/binary-ia64/kuickshow_3.5.5-3etch2_ia64.deb stable/main/binary-ia64/kview_3.5.5-3etch2_ia64.deb stable/main/binary-ia64/kviewshell_3.5.5-3etch2_ia64.deb stable/main/binary-ia64/libkscan-dev_3.5.5-3etch2_ia64.deb stable/main/binary-ia64/libkscan1_3.5.5-3etch2_ia64.deb stable/main/binary-ia64/kdegraphics-dbg_3.5.5-3etch2_ia64.deb kdegraphics (4:3.5.5-3etch2) stable-security; urgency=low * Fix CVE-2007-4352, CVE-2007-5392 and CVE-2007-5493. * Rename previous patch to enforce patch order stable/main/binary-mips/kamera_3.5.5-3etch2_mips.deb stable/main/binary-mips/kcoloredit_3.5.5-3etch2_mips.deb stable/main/binary-mips/kdegraphics-dev_3.5.5-3etch2_mips.deb stable/main/binary-mips/kdegraphics-kfile-plugins_3.5.5-3etch2_mips.deb stable/main/binary-mips/kdvi_3.5.5-3etch2_mips.deb stable/main/binary-mips/kfax_3.5.5-3etch2_mips.deb stable/main/binary-mips/kfaxview_3.5.5-3etch2_mips.deb stable/main/binary-mips/kgamma_3.5.5-3etch2_mips.deb stable/main/binary-mips/kghostview_3.5.5-3etch2_mips.deb stable/main/binary-mips/kiconedit_3.5.5-3etch2_mips.deb stable/main/binary-mips/kmrml_3.5.5-3etch2_mips.deb stable/main/binary-mips/kolourpaint_3.5.5-3etch2_mips.deb stable/main/binary-mips/kooka_3.5.5-3etch2_mips.deb stable/main/binary-mips/kpdf_3.5.5-3etch2_mips.deb stable/main/binary-mips/kpovmodeler_3.5.5-3etch2_mips.deb stable/main/binary-mips/kruler_3.5.5-3etch2_mips.deb stable/main/binary-mips/ksnapshot_3.5.5-3etch2_mips.deb stable/main/binary-mips/ksvg_3.5.5-3etch2_mips.deb stable/main/binary-mips/kuickshow_3.5.5-3etch2_mips.deb stable/main/binary-mips/kview_3.5.5-3etch2_mips.deb stable/main/binary-mips/kviewshell_3.5.5-3etch2_mips.deb stable/main/binary-mips/libkscan-dev_3.5.5-3etch2_mips.deb stable/main/binary-mips/libkscan1_3.5.5-3etch2_mips.deb stable/main/binary-mips/kdegraphics-dbg_3.5.5-3etch2_mips.deb kdegraphics (4:3.5.5-3etch2) stable-security; urgency=low * Fix CVE-2007-4352, CVE-2007-5392 and CVE-2007-5493. * Rename previous patch to enforce patch order stable/main/binary-mipsel/kamera_3.5.5-3etch2_mipsel.deb stable/main/binary-mipsel/kcoloredit_3.5.5-3etch2_mipsel.deb stable/main/binary-mipsel/kdegraphics-dev_3.5.5-3etch2_mipsel.deb stable/main/binary-mipsel/kdegraphics-kfile-plugins_3.5.5-3etch2_mipsel.deb stable/main/binary-mipsel/kdvi_3.5.5-3etch2_mipsel.deb stable/main/binary-mipsel/kfax_3.5.5-3etch2_mipsel.deb stable/main/binary-mipsel/kfaxview_3.5.5-3etch2_mipsel.deb stable/main/binary-mipsel/kgamma_3.5.5-3etch2_mipsel.deb stable/main/binary-mipsel/kghostview_3.5.5-3etch2_mipsel.deb stable/main/binary-mipsel/kiconedit_3.5.5-3etch2_mipsel.deb stable/main/binary-mipsel/kmrml_3.5.5-3etch2_mipsel.deb stable/main/binary-mipsel/kolourpaint_3.5.5-3etch2_mipsel.deb stable/main/binary-mipsel/kooka_3.5.5-3etch2_mipsel.deb stable/main/binary-mipsel/kpdf_3.5.5-3etch2_mipsel.deb stable/main/binary-mipsel/kpovmodeler_3.5.5-3etch2_mipsel.deb stable/main/binary-mipsel/kruler_3.5.5-3etch2_mipsel.deb stable/main/binary-mipsel/ksnapshot_3.5.5-3etch2_mipsel.deb stable/main/binary-mipsel/ksvg_3.5.5-3etch2_mipsel.deb stable/main/binary-mipsel/kuickshow_3.5.5-3etch2_mipsel.deb stable/main/binary-mipsel/kview_3.5.5-3etch2_mipsel.deb stable/main/binary-mipsel/kviewshell_3.5.5-3etch2_mipsel.deb stable/main/binary-mipsel/libkscan-dev_3.5.5-3etch2_mipsel.deb stable/main/binary-mipsel/libkscan1_3.5.5-3etch2_mipsel.deb stable/main/binary-mipsel/kdegraphics-dbg_3.5.5-3etch2_mipsel.deb kdegraphics (4:3.5.5-3etch2) stable-security; urgency=low * Fix CVE-2007-4352, CVE-2007-5392 and CVE-2007-5493. * Rename previous patch to enforce patch order stable/main/binary-powerpc/kamera_3.5.5-3etch2_powerpc.deb stable/main/binary-powerpc/kcoloredit_3.5.5-3etch2_powerpc.deb stable/main/binary-powerpc/kdegraphics-dev_3.5.5-3etch2_powerpc.deb stable/main/binary-powerpc/kdegraphics-kfile-plugins_3.5.5-3etch2_powerpc.deb stable/main/binary-powerpc/kdvi_3.5.5-3etch2_powerpc.deb stable/main/binary-powerpc/kfax_3.5.5-3etch2_powerpc.deb stable/main/binary-powerpc/kfaxview_3.5.5-3etch2_powerpc.deb stable/main/binary-powerpc/kgamma_3.5.5-3etch2_powerpc.deb stable/main/binary-powerpc/kghostview_3.5.5-3etch2_powerpc.deb stable/main/binary-powerpc/kiconedit_3.5.5-3etch2_powerpc.deb stable/main/binary-powerpc/kmrml_3.5.5-3etch2_powerpc.deb stable/main/binary-powerpc/kolourpaint_3.5.5-3etch2_powerpc.deb stable/main/binary-powerpc/kooka_3.5.5-3etch2_powerpc.deb stable/main/binary-powerpc/kpdf_3.5.5-3etch2_powerpc.deb stable/main/binary-powerpc/kpovmodeler_3.5.5-3etch2_powerpc.deb stable/main/binary-powerpc/kruler_3.5.5-3etch2_powerpc.deb stable/main/binary-powerpc/ksnapshot_3.5.5-3etch2_powerpc.deb stable/main/binary-powerpc/ksvg_3.5.5-3etch2_powerpc.deb stable/main/binary-powerpc/kuickshow_3.5.5-3etch2_powerpc.deb stable/main/binary-powerpc/kview_3.5.5-3etch2_powerpc.deb stable/main/binary-powerpc/kviewshell_3.5.5-3etch2_powerpc.deb stable/main/binary-powerpc/libkscan-dev_3.5.5-3etch2_powerpc.deb stable/main/binary-powerpc/libkscan1_3.5.5-3etch2_powerpc.deb stable/main/binary-powerpc/kdegraphics-dbg_3.5.5-3etch2_powerpc.deb kdegraphics (4:3.5.5-3etch2) stable-security; urgency=low * Fix CVE-2007-4352, CVE-2007-5392 and CVE-2007-5493. * Rename previous patch to enforce patch order stable/main/binary-s390/kamera_3.5.5-3etch2_s390.deb stable/main/binary-s390/kcoloredit_3.5.5-3etch2_s390.deb stable/main/binary-s390/kdegraphics-dev_3.5.5-3etch2_s390.deb stable/main/binary-s390/kdegraphics-kfile-plugins_3.5.5-3etch2_s390.deb stable/main/binary-s390/kdvi_3.5.5-3etch2_s390.deb stable/main/binary-s390/kfax_3.5.5-3etch2_s390.deb stable/main/binary-s390/kfaxview_3.5.5-3etch2_s390.deb stable/main/binary-s390/kgamma_3.5.5-3etch2_s390.deb stable/main/binary-s390/kghostview_3.5.5-3etch2_s390.deb stable/main/binary-s390/kiconedit_3.5.5-3etch2_s390.deb stable/main/binary-s390/kmrml_3.5.5-3etch2_s390.deb stable/main/binary-s390/kolourpaint_3.5.5-3etch2_s390.deb stable/main/binary-s390/kooka_3.5.5-3etch2_s390.deb stable/main/binary-s390/kpdf_3.5.5-3etch2_s390.deb stable/main/binary-s390/kpovmodeler_3.5.5-3etch2_s390.deb stable/main/binary-s390/kruler_3.5.5-3etch2_s390.deb stable/main/binary-s390/ksnapshot_3.5.5-3etch2_s390.deb stable/main/binary-s390/ksvg_3.5.5-3etch2_s390.deb stable/main/binary-s390/kuickshow_3.5.5-3etch2_s390.deb stable/main/binary-s390/kview_3.5.5-3etch2_s390.deb stable/main/binary-s390/kviewshell_3.5.5-3etch2_s390.deb stable/main/binary-s390/libkscan-dev_3.5.5-3etch2_s390.deb stable/main/binary-s390/libkscan1_3.5.5-3etch2_s390.deb stable/main/binary-s390/kdegraphics-dbg_3.5.5-3etch2_s390.deb kdegraphics (4:3.5.5-3etch2) stable-security; urgency=low * Fix CVE-2007-4352, CVE-2007-5392 and CVE-2007-5493. * Rename previous patch to enforce patch order stable/main/binary-sparc/kamera_3.5.5-3etch2_sparc.deb stable/main/binary-sparc/kcoloredit_3.5.5-3etch2_sparc.deb stable/main/binary-sparc/kdegraphics-dev_3.5.5-3etch2_sparc.deb stable/main/binary-sparc/kdegraphics-kfile-plugins_3.5.5-3etch2_sparc.deb stable/main/binary-sparc/kdvi_3.5.5-3etch2_sparc.deb stable/main/binary-sparc/kfax_3.5.5-3etch2_sparc.deb stable/main/binary-sparc/kfaxview_3.5.5-3etch2_sparc.deb stable/main/binary-sparc/kgamma_3.5.5-3etch2_sparc.deb stable/main/binary-sparc/kghostview_3.5.5-3etch2_sparc.deb stable/main/binary-sparc/kiconedit_3.5.5-3etch2_sparc.deb stable/main/binary-sparc/kmrml_3.5.5-3etch2_sparc.deb stable/main/binary-sparc/kolourpaint_3.5.5-3etch2_sparc.deb stable/main/binary-sparc/kooka_3.5.5-3etch2_sparc.deb stable/main/binary-sparc/kpdf_3.5.5-3etch2_sparc.deb stable/main/binary-sparc/kpovmodeler_3.5.5-3etch2_sparc.deb stable/main/binary-sparc/kruler_3.5.5-3etch2_sparc.deb stable/main/binary-sparc/ksnapshot_3.5.5-3etch2_sparc.deb stable/main/binary-sparc/ksvg_3.5.5-3etch2_sparc.deb stable/main/binary-sparc/kuickshow_3.5.5-3etch2_sparc.deb stable/main/binary-sparc/kview_3.5.5-3etch2_sparc.deb stable/main/binary-sparc/kviewshell_3.5.5-3etch2_sparc.deb stable/main/binary-sparc/libkscan-dev_3.5.5-3etch2_sparc.deb stable/main/binary-sparc/libkscan1_3.5.5-3etch2_sparc.deb stable/main/binary-sparc/kdegraphics-dbg_3.5.5-3etch2_sparc.deb kdegraphics (4:3.5.5-3etch2) stable-security; urgency=low * Fix CVE-2007-4352, CVE-2007-5392 and CVE-2007-5493. * Rename previous patch to enforce patch order stable/main/source/kernel-patch-openvz_028.18.1etch5.dsc stable/main/source/kernel-patch-openvz_028.18.1etch5.tar.gz stable/main/binary-all/kernel-patch-openvz_028.18.1etch5_all.deb kernel-patch-openvz (028.18.1etch5) stable-security; urgency=high * Update for DSA-1378-2. With this recent change the kernel no longer build. Closes: #444472. Thanks to Marcin Owsiany for the patch. stable/main/binary-alpha/libklibc-dev_1.4.34-2_alpha.deb stable/main/binary-alpha/libklibc_1.4.34-2_alpha.deb stable/main/binary-alpha/klibc-utils_1.4.34-2_alpha.deb stable/main/klibc-utils-udeb_1.4.34-2_alpha.udeb stable/main/klibc-utils-floppy-udeb_1.4.34-2_alpha.udeb stable/main/libklibc-udeb_1.4.34-2_alpha.udeb klibc (1.4.34-2) stable; urgency=low * Add backported 09-mips_sock_dgram.patch for mips/mipsel definitions of . Fixes nfsroot on those archs. (closes: #438123) Thanks Michel Lespinasse for analysis, report and testing. * Bump build dep linux-headers-2.6.18-5. stable/main/binary-amd64/libklibc-dev_1.4.34-2_amd64.deb stable/main/binary-amd64/libklibc_1.4.34-2_amd64.deb stable/main/binary-amd64/klibc-utils_1.4.34-2_amd64.deb stable/main/klibc-utils-udeb_1.4.34-2_amd64.udeb stable/main/klibc-utils-floppy-udeb_1.4.34-2_amd64.udeb stable/main/libklibc-udeb_1.4.34-2_amd64.udeb klibc (1.4.34-2) stable; urgency=low * Add backported 09-mips_sock_dgram.patch for mips/mipsel definitions of . Fixes nfsroot on those archs. (closes: #438123) Thanks Michel Lespinasse for analysis, report and testing. * Bump build dep linux-headers-2.6.18-5. stable/main/binary-arm/libklibc-dev_1.4.34-2_arm.deb stable/main/binary-arm/libklibc_1.4.34-2_arm.deb stable/main/binary-arm/klibc-utils_1.4.34-2_arm.deb stable/main/klibc-utils-udeb_1.4.34-2_arm.udeb stable/main/klibc-utils-floppy-udeb_1.4.34-2_arm.udeb stable/main/libklibc-udeb_1.4.34-2_arm.udeb klibc (1.4.34-2) stable; urgency=low * Add backported 09-mips_sock_dgram.patch for mips/mipsel definitions of . Fixes nfsroot on those archs. (closes: #438123) Thanks Michel Lespinasse for analysis, report and testing. * Bump build dep linux-headers-2.6.18-5. stable/main/binary-hppa/libklibc-dev_1.4.34-2_hppa.deb stable/main/binary-hppa/libklibc_1.4.34-2_hppa.deb stable/main/binary-hppa/klibc-utils_1.4.34-2_hppa.deb stable/main/klibc-utils-udeb_1.4.34-2_hppa.udeb stable/main/klibc-utils-floppy-udeb_1.4.34-2_hppa.udeb stable/main/libklibc-udeb_1.4.34-2_hppa.udeb klibc (1.4.34-2) stable; urgency=low * Add backported 09-mips_sock_dgram.patch for mips/mipsel definitions of . Fixes nfsroot on those archs. (closes: #438123) Thanks Michel Lespinasse for analysis, report and testing. * Bump build dep linux-headers-2.6.18-5. stable/main/source/klibc_1.4.34-2.dsc stable/main/source/klibc_1.4.34-2.diff.gz stable/main/binary-i386/libklibc-dev_1.4.34-2_i386.deb stable/main/binary-i386/libklibc_1.4.34-2_i386.deb stable/main/binary-i386/klibc-utils_1.4.34-2_i386.deb stable/main/klibc-utils-udeb_1.4.34-2_i386.udeb stable/main/klibc-utils-floppy-udeb_1.4.34-2_i386.udeb stable/main/libklibc-udeb_1.4.34-2_i386.udeb klibc (1.4.34-2) stable; urgency=low * Add backported 09-mips_sock_dgram.patch for mips/mipsel definitions of . Fixes nfsroot on those archs. (closes: #438123) Thanks Michel Lespinasse for analysis, report and testing. * Bump build dep linux-headers-2.6.18-5. stable/main/binary-ia64/libklibc-dev_1.4.34-2_ia64.deb stable/main/binary-ia64/libklibc_1.4.34-2_ia64.deb stable/main/binary-ia64/klibc-utils_1.4.34-2_ia64.deb stable/main/klibc-utils-udeb_1.4.34-2_ia64.udeb stable/main/libklibc-udeb_1.4.34-2_ia64.udeb klibc (1.4.34-2) stable; urgency=low * Add backported 09-mips_sock_dgram.patch for mips/mipsel definitions of . Fixes nfsroot on those archs. (closes: #438123) Thanks Michel Lespinasse for analysis, report and testing. * Bump build dep linux-headers-2.6.18-5. stable/main/binary-mips/libklibc-dev_1.4.34-2_mips.deb stable/main/binary-mips/libklibc_1.4.34-2_mips.deb stable/main/binary-mips/klibc-utils_1.4.34-2_mips.deb stable/main/klibc-utils-udeb_1.4.34-2_mips.udeb stable/main/klibc-utils-floppy-udeb_1.4.34-2_mips.udeb stable/main/libklibc-udeb_1.4.34-2_mips.udeb klibc (1.4.34-2) stable; urgency=low * Add backported 09-mips_sock_dgram.patch for mips/mipsel definitions of . Fixes nfsroot on those archs. (closes: #438123) Thanks Michel Lespinasse for analysis, report and testing. * Bump build dep linux-headers-2.6.18-5. stable/main/binary-mipsel/libklibc-dev_1.4.34-2_mipsel.deb stable/main/binary-mipsel/libklibc_1.4.34-2_mipsel.deb stable/main/binary-mipsel/klibc-utils_1.4.34-2_mipsel.deb stable/main/klibc-utils-udeb_1.4.34-2_mipsel.udeb stable/main/klibc-utils-floppy-udeb_1.4.34-2_mipsel.udeb stable/main/libklibc-udeb_1.4.34-2_mipsel.udeb klibc (1.4.34-2) stable; urgency=low * Add backported 09-mips_sock_dgram.patch for mips/mipsel definitions of . Fixes nfsroot on those archs. (closes: #438123) Thanks Michel Lespinasse for analysis, report and testing. * Bump build dep linux-headers-2.6.18-5. stable/main/binary-powerpc/libklibc-dev_1.4.34-2_powerpc.deb stable/main/binary-powerpc/libklibc_1.4.34-2_powerpc.deb stable/main/binary-powerpc/klibc-utils_1.4.34-2_powerpc.deb stable/main/klibc-utils-udeb_1.4.34-2_powerpc.udeb stable/main/klibc-utils-floppy-udeb_1.4.34-2_powerpc.udeb stable/main/libklibc-udeb_1.4.34-2_powerpc.udeb klibc (1.4.34-2) stable; urgency=low * Add backported 09-mips_sock_dgram.patch for mips/mipsel definitions of . Fixes nfsroot on those archs. (closes: #438123) Thanks Michel Lespinasse for analysis, report and testing. * Bump build dep linux-headers-2.6.18-5. stable/main/binary-s390/libklibc-dev_1.4.34-2_s390.deb stable/main/binary-s390/libklibc_1.4.34-2_s390.deb stable/main/binary-s390/klibc-utils_1.4.34-2_s390.deb stable/main/klibc-utils-udeb_1.4.34-2_s390.udeb stable/main/klibc-utils-floppy-udeb_1.4.34-2_s390.udeb stable/main/libklibc-udeb_1.4.34-2_s390.udeb klibc (1.4.34-2) stable; urgency=low * Add backported 09-mips_sock_dgram.patch for mips/mipsel definitions of . Fixes nfsroot on those archs. (closes: #438123) Thanks Michel Lespinasse for analysis, report and testing. * Bump build dep linux-headers-2.6.18-5. stable/main/binary-sparc/libklibc-dev_1.4.34-2_sparc.deb stable/main/binary-sparc/libklibc_1.4.34-2_sparc.deb stable/main/binary-sparc/klibc-utils_1.4.34-2_sparc.deb stable/main/klibc-utils-udeb_1.4.34-2_sparc.udeb stable/main/klibc-utils-floppy-udeb_1.4.34-2_sparc.udeb stable/main/libklibc-udeb_1.4.34-2_sparc.udeb klibc (1.4.34-2) stable; urgency=low * Add backported 09-mips_sock_dgram.patch for mips/mipsel definitions of . Fixes nfsroot on those archs. (closes: #438123) Thanks Michel Lespinasse for analysis, report and testing. * Bump build dep linux-headers-2.6.18-5. stable/main/binary-alpha/karbon_1.6.1-2etch1_alpha.deb stable/main/binary-alpha/kchart_1.6.1-2etch1_alpha.deb stable/main/binary-alpha/kexi_1.6.1-2etch1_alpha.deb stable/main/binary-alpha/kformula_1.6.1-2etch1_alpha.deb stable/main/binary-alpha/kivio_1.6.1-2etch1_alpha.deb stable/main/binary-alpha/koshell_1.6.1-2etch1_alpha.deb stable/main/binary-alpha/kplato_1.6.1-2etch1_alpha.deb stable/main/binary-alpha/kpresenter_1.6.1-2etch1_alpha.deb stable/main/binary-alpha/krita_1.6.1-2etch1_alpha.deb stable/main/binary-alpha/kspread_1.6.1-2etch1_alpha.deb stable/main/binary-alpha/kugar_1.6.1-2etch1_alpha.deb stable/main/binary-alpha/kword_1.6.1-2etch1_alpha.deb stable/main/binary-alpha/kthesaurus_1.6.1-2etch1_alpha.deb stable/main/binary-alpha/koffice-libs_1.6.1-2etch1_alpha.deb stable/main/binary-alpha/koffice-dev_1.6.1-2etch1_alpha.deb stable/main/binary-alpha/koffice-dbg_1.6.1-2etch1_alpha.deb koffice (1:1.6.1-2etch1) stable-security; urgency=low * Fix integer overflow in stream predictor (CVE-2007-3387). stable/main/binary-amd64/karbon_1.6.1-2etch1_amd64.deb stable/main/binary-amd64/kchart_1.6.1-2etch1_amd64.deb stable/main/binary-amd64/kexi_1.6.1-2etch1_amd64.deb stable/main/binary-amd64/kformula_1.6.1-2etch1_amd64.deb stable/main/binary-amd64/kivio_1.6.1-2etch1_amd64.deb stable/main/binary-amd64/koshell_1.6.1-2etch1_amd64.deb stable/main/binary-amd64/kplato_1.6.1-2etch1_amd64.deb stable/main/binary-amd64/kpresenter_1.6.1-2etch1_amd64.deb stable/main/binary-amd64/krita_1.6.1-2etch1_amd64.deb stable/main/binary-amd64/kspread_1.6.1-2etch1_amd64.deb stable/main/binary-amd64/kugar_1.6.1-2etch1_amd64.deb stable/main/binary-amd64/kword_1.6.1-2etch1_amd64.deb stable/main/binary-amd64/kthesaurus_1.6.1-2etch1_amd64.deb stable/main/binary-amd64/koffice-libs_1.6.1-2etch1_amd64.deb stable/main/binary-amd64/koffice-dev_1.6.1-2etch1_amd64.deb stable/main/binary-amd64/koffice-dbg_1.6.1-2etch1_amd64.deb koffice (1:1.6.1-2etch1) stable-security; urgency=low * Fix integer overflow in stream predictor (CVE-2007-3387). stable/main/binary-arm/karbon_1.6.1-2etch1_arm.deb stable/main/binary-arm/kchart_1.6.1-2etch1_arm.deb stable/main/binary-arm/kexi_1.6.1-2etch1_arm.deb stable/main/binary-arm/kformula_1.6.1-2etch1_arm.deb stable/main/binary-arm/kivio_1.6.1-2etch1_arm.deb stable/main/binary-arm/koshell_1.6.1-2etch1_arm.deb stable/main/binary-arm/kplato_1.6.1-2etch1_arm.deb stable/main/binary-arm/kpresenter_1.6.1-2etch1_arm.deb stable/main/binary-arm/krita_1.6.1-2etch1_arm.deb stable/main/binary-arm/kspread_1.6.1-2etch1_arm.deb stable/main/binary-arm/kugar_1.6.1-2etch1_arm.deb stable/main/binary-arm/kword_1.6.1-2etch1_arm.deb stable/main/binary-arm/kthesaurus_1.6.1-2etch1_arm.deb stable/main/binary-arm/koffice-libs_1.6.1-2etch1_arm.deb stable/main/binary-arm/koffice-dev_1.6.1-2etch1_arm.deb stable/main/binary-arm/koffice-dbg_1.6.1-2etch1_arm.deb koffice (1:1.6.1-2etch1) stable-security; urgency=low * Fix integer overflow in stream predictor (CVE-2007-3387). stable/main/binary-hppa/karbon_1.6.1-2etch1_hppa.deb stable/main/binary-hppa/kchart_1.6.1-2etch1_hppa.deb stable/main/binary-hppa/kexi_1.6.1-2etch1_hppa.deb stable/main/binary-hppa/kformula_1.6.1-2etch1_hppa.deb stable/main/binary-hppa/kivio_1.6.1-2etch1_hppa.deb stable/main/binary-hppa/koshell_1.6.1-2etch1_hppa.deb stable/main/binary-hppa/kplato_1.6.1-2etch1_hppa.deb stable/main/binary-hppa/kpresenter_1.6.1-2etch1_hppa.deb stable/main/binary-hppa/krita_1.6.1-2etch1_hppa.deb stable/main/binary-hppa/kspread_1.6.1-2etch1_hppa.deb stable/main/binary-hppa/kugar_1.6.1-2etch1_hppa.deb stable/main/binary-hppa/kword_1.6.1-2etch1_hppa.deb stable/main/binary-hppa/kthesaurus_1.6.1-2etch1_hppa.deb stable/main/binary-hppa/koffice-libs_1.6.1-2etch1_hppa.deb stable/main/binary-hppa/koffice-dev_1.6.1-2etch1_hppa.deb stable/main/binary-hppa/koffice-dbg_1.6.1-2etch1_hppa.deb koffice (1:1.6.1-2etch1) stable-security; urgency=low * Fix integer overflow in stream predictor (CVE-2007-3387). stable/main/source/koffice_1.6.1-2etch1.dsc stable/main/source/koffice_1.6.1.orig.tar.gz stable/main/source/koffice_1.6.1-2etch1.diff.gz stable/main/binary-all/koffice_1.6.1-2etch1_all.deb stable/main/binary-all/koffice-doc_1.6.1-2etch1_all.deb stable/main/binary-all/koffice-doc-html_1.6.1-2etch1_all.deb stable/main/binary-all/kivio-data_1.6.1-2etch1_all.deb stable/main/binary-all/kpresenter-data_1.6.1-2etch1_all.deb stable/main/binary-all/krita-data_1.6.1-2etch1_all.deb stable/main/binary-all/kword-data_1.6.1-2etch1_all.deb stable/main/binary-all/koffice-data_1.6.1-2etch1_all.deb stable/main/binary-i386/karbon_1.6.1-2etch1_i386.deb stable/main/binary-i386/kchart_1.6.1-2etch1_i386.deb stable/main/binary-i386/kexi_1.6.1-2etch1_i386.deb stable/main/binary-i386/kformula_1.6.1-2etch1_i386.deb stable/main/binary-i386/kivio_1.6.1-2etch1_i386.deb stable/main/binary-i386/koshell_1.6.1-2etch1_i386.deb stable/main/binary-i386/kplato_1.6.1-2etch1_i386.deb stable/main/binary-i386/kpresenter_1.6.1-2etch1_i386.deb stable/main/binary-i386/krita_1.6.1-2etch1_i386.deb stable/main/binary-i386/kspread_1.6.1-2etch1_i386.deb stable/main/binary-i386/kugar_1.6.1-2etch1_i386.deb stable/main/binary-i386/kword_1.6.1-2etch1_i386.deb stable/main/binary-i386/kthesaurus_1.6.1-2etch1_i386.deb stable/main/binary-i386/koffice-libs_1.6.1-2etch1_i386.deb stable/main/binary-i386/koffice-dev_1.6.1-2etch1_i386.deb stable/main/binary-i386/koffice-dbg_1.6.1-2etch1_i386.deb koffice (1:1.6.1-2etch1) stable-security; urgency=low * Fix integer overflow in stream predictor (CVE-2007-3387). stable/main/binary-ia64/karbon_1.6.1-2etch1_ia64.deb stable/main/binary-ia64/kchart_1.6.1-2etch1_ia64.deb stable/main/binary-ia64/kexi_1.6.1-2etch1_ia64.deb stable/main/binary-ia64/kformula_1.6.1-2etch1_ia64.deb stable/main/binary-ia64/kivio_1.6.1-2etch1_ia64.deb stable/main/binary-ia64/koshell_1.6.1-2etch1_ia64.deb stable/main/binary-ia64/kplato_1.6.1-2etch1_ia64.deb stable/main/binary-ia64/kpresenter_1.6.1-2etch1_ia64.deb stable/main/binary-ia64/krita_1.6.1-2etch1_ia64.deb stable/main/binary-ia64/kspread_1.6.1-2etch1_ia64.deb stable/main/binary-ia64/kugar_1.6.1-2etch1_ia64.deb stable/main/binary-ia64/kword_1.6.1-2etch1_ia64.deb stable/main/binary-ia64/kthesaurus_1.6.1-2etch1_ia64.deb stable/main/binary-ia64/koffice-libs_1.6.1-2etch1_ia64.deb stable/main/binary-ia64/koffice-dev_1.6.1-2etch1_ia64.deb stable/main/binary-ia64/koffice-dbg_1.6.1-2etch1_ia64.deb koffice (1:1.6.1-2etch1) stable-security; urgency=low * Fix integer overflow in stream predictor (CVE-2007-3387). stable/main/binary-mips/karbon_1.6.1-2etch1_mips.deb stable/main/binary-mips/kchart_1.6.1-2etch1_mips.deb stable/main/binary-mips/kexi_1.6.1-2etch1_mips.deb stable/main/binary-mips/kformula_1.6.1-2etch1_mips.deb stable/main/binary-mips/kivio_1.6.1-2etch1_mips.deb stable/main/binary-mips/koshell_1.6.1-2etch1_mips.deb stable/main/binary-mips/kplato_1.6.1-2etch1_mips.deb stable/main/binary-mips/kpresenter_1.6.1-2etch1_mips.deb stable/main/binary-mips/krita_1.6.1-2etch1_mips.deb stable/main/binary-mips/kspread_1.6.1-2etch1_mips.deb stable/main/binary-mips/kugar_1.6.1-2etch1_mips.deb stable/main/binary-mips/kword_1.6.1-2etch1_mips.deb stable/main/binary-mips/kthesaurus_1.6.1-2etch1_mips.deb stable/main/binary-mips/koffice-libs_1.6.1-2etch1_mips.deb stable/main/binary-mips/koffice-dev_1.6.1-2etch1_mips.deb stable/main/binary-mips/koffice-dbg_1.6.1-2etch1_mips.deb koffice (1:1.6.1-2etch1) stable-security; urgency=low * Fix integer overflow in stream predictor (CVE-2007-3387). stable/main/binary-mipsel/karbon_1.6.1-2etch1_mipsel.deb stable/main/binary-mipsel/kchart_1.6.1-2etch1_mipsel.deb stable/main/binary-mipsel/kexi_1.6.1-2etch1_mipsel.deb stable/main/binary-mipsel/kformula_1.6.1-2etch1_mipsel.deb stable/main/binary-mipsel/kivio_1.6.1-2etch1_mipsel.deb stable/main/binary-mipsel/koshell_1.6.1-2etch1_mipsel.deb stable/main/binary-mipsel/kplato_1.6.1-2etch1_mipsel.deb stable/main/binary-mipsel/kpresenter_1.6.1-2etch1_mipsel.deb stable/main/binary-mipsel/krita_1.6.1-2etch1_mipsel.deb stable/main/binary-mipsel/kspread_1.6.1-2etch1_mipsel.deb stable/main/binary-mipsel/kugar_1.6.1-2etch1_mipsel.deb stable/main/binary-mipsel/kword_1.6.1-2etch1_mipsel.deb stable/main/binary-mipsel/kthesaurus_1.6.1-2etch1_mipsel.deb stable/main/binary-mipsel/koffice-libs_1.6.1-2etch1_mipsel.deb stable/main/binary-mipsel/koffice-dev_1.6.1-2etch1_mipsel.deb stable/main/binary-mipsel/koffice-dbg_1.6.1-2etch1_mipsel.deb koffice (1:1.6.1-2etch1) stable-security; urgency=low * Fix integer overflow in stream predictor (CVE-2007-3387). stable/main/binary-powerpc/karbon_1.6.1-2etch1_powerpc.deb stable/main/binary-powerpc/kchart_1.6.1-2etch1_powerpc.deb stable/main/binary-powerpc/kexi_1.6.1-2etch1_powerpc.deb stable/main/binary-powerpc/kformula_1.6.1-2etch1_powerpc.deb stable/main/binary-powerpc/kivio_1.6.1-2etch1_powerpc.deb stable/main/binary-powerpc/koshell_1.6.1-2etch1_powerpc.deb stable/main/binary-powerpc/kplato_1.6.1-2etch1_powerpc.deb stable/main/binary-powerpc/kpresenter_1.6.1-2etch1_powerpc.deb stable/main/binary-powerpc/krita_1.6.1-2etch1_powerpc.deb stable/main/binary-powerpc/kspread_1.6.1-2etch1_powerpc.deb stable/main/binary-powerpc/kugar_1.6.1-2etch1_powerpc.deb stable/main/binary-powerpc/kword_1.6.1-2etch1_powerpc.deb stable/main/binary-powerpc/kthesaurus_1.6.1-2etch1_powerpc.deb stable/main/binary-powerpc/koffice-libs_1.6.1-2etch1_powerpc.deb stable/main/binary-powerpc/koffice-dev_1.6.1-2etch1_powerpc.deb stable/main/binary-powerpc/koffice-dbg_1.6.1-2etch1_powerpc.deb koffice (1:1.6.1-2etch1) stable-security; urgency=low * Fix integer overflow in stream predictor (CVE-2007-3387). stable/main/binary-s390/karbon_1.6.1-2etch1_s390.deb stable/main/binary-s390/kchart_1.6.1-2etch1_s390.deb stable/main/binary-s390/kexi_1.6.1-2etch1_s390.deb stable/main/binary-s390/kformula_1.6.1-2etch1_s390.deb stable/main/binary-s390/kivio_1.6.1-2etch1_s390.deb stable/main/binary-s390/koshell_1.6.1-2etch1_s390.deb stable/main/binary-s390/kplato_1.6.1-2etch1_s390.deb stable/main/binary-s390/kpresenter_1.6.1-2etch1_s390.deb stable/main/binary-s390/krita_1.6.1-2etch1_s390.deb stable/main/binary-s390/kspread_1.6.1-2etch1_s390.deb stable/main/binary-s390/kugar_1.6.1-2etch1_s390.deb stable/main/binary-s390/kword_1.6.1-2etch1_s390.deb stable/main/binary-s390/kthesaurus_1.6.1-2etch1_s390.deb stable/main/binary-s390/koffice-libs_1.6.1-2etch1_s390.deb stable/main/binary-s390/koffice-dev_1.6.1-2etch1_s390.deb stable/main/binary-s390/koffice-dbg_1.6.1-2etch1_s390.deb koffice (1:1.6.1-2etch1) stable-security; urgency=low * Fix integer overflow in stream predictor (CVE-2007-3387). stable/main/binary-sparc/karbon_1.6.1-2etch1_sparc.deb stable/main/binary-sparc/kchart_1.6.1-2etch1_sparc.deb stable/main/binary-sparc/kexi_1.6.1-2etch1_sparc.deb stable/main/binary-sparc/kformula_1.6.1-2etch1_sparc.deb stable/main/binary-sparc/kivio_1.6.1-2etch1_sparc.deb stable/main/binary-sparc/koshell_1.6.1-2etch1_sparc.deb stable/main/binary-sparc/kplato_1.6.1-2etch1_sparc.deb stable/main/binary-sparc/kpresenter_1.6.1-2etch1_sparc.deb stable/main/binary-sparc/krita_1.6.1-2etch1_sparc.deb stable/main/binary-sparc/kspread_1.6.1-2etch1_sparc.deb stable/main/binary-sparc/kugar_1.6.1-2etch1_sparc.deb stable/main/binary-sparc/kword_1.6.1-2etch1_sparc.deb stable/main/binary-sparc/kthesaurus_1.6.1-2etch1_sparc.deb stable/main/binary-sparc/koffice-libs_1.6.1-2etch1_sparc.deb stable/main/binary-sparc/koffice-dev_1.6.1-2etch1_sparc.deb stable/main/binary-sparc/koffice-dbg_1.6.1-2etch1_sparc.deb koffice (1:1.6.1-2etch1) stable-security; urgency=low * Fix integer overflow in stream predictor (CVE-2007-3387). stable/main/binary-alpha/libkadm55_1.4.4-7etch4_alpha.deb stable/main/binary-alpha/libkrb53_1.4.4-7etch4_alpha.deb stable/main/binary-alpha/krb5-user_1.4.4-7etch4_alpha.deb stable/main/binary-alpha/krb5-clients_1.4.4-7etch4_alpha.deb stable/main/binary-alpha/krb5-rsh-server_1.4.4-7etch4_alpha.deb stable/main/binary-alpha/krb5-ftpd_1.4.4-7etch4_alpha.deb stable/main/binary-alpha/krb5-telnetd_1.4.4-7etch4_alpha.deb stable/main/binary-alpha/krb5-kdc_1.4.4-7etch4_alpha.deb stable/main/binary-alpha/krb5-admin-server_1.4.4-7etch4_alpha.deb stable/main/binary-alpha/libkrb5-dev_1.4.4-7etch4_alpha.deb stable/main/binary-alpha/libkrb5-dbg_1.4.4-7etch4_alpha.deb krb5 (1.4.4-7etch4) stable-security; urgency=emergency * Fix bug in fix for CVE-2007-3999: the previous patch could allow an overflow of up to 32 bytes. Depending on how locals are layed out on the stack, this may or may not be a problem. stable/main/binary-amd64/libkadm55_1.4.4-7etch4_amd64.deb stable/main/binary-amd64/libkrb53_1.4.4-7etch4_amd64.deb stable/main/binary-amd64/krb5-user_1.4.4-7etch4_amd64.deb stable/main/binary-amd64/krb5-clients_1.4.4-7etch4_amd64.deb stable/main/binary-amd64/krb5-rsh-server_1.4.4-7etch4_amd64.deb stable/main/binary-amd64/krb5-ftpd_1.4.4-7etch4_amd64.deb stable/main/binary-amd64/krb5-telnetd_1.4.4-7etch4_amd64.deb stable/main/binary-amd64/krb5-kdc_1.4.4-7etch4_amd64.deb stable/main/binary-amd64/krb5-admin-server_1.4.4-7etch4_amd64.deb stable/main/binary-amd64/libkrb5-dev_1.4.4-7etch4_amd64.deb stable/main/binary-amd64/libkrb5-dbg_1.4.4-7etch4_amd64.deb krb5 (1.4.4-7etch4) stable-security; urgency=emergency * Fix bug in fix for CVE-2007-3999: the previous patch could allow an overflow of up to 32 bytes. Depending on how locals are layed out on the stack, this may or may not be a problem. stable/main/binary-arm/libkadm55_1.4.4-7etch4_arm.deb stable/main/binary-arm/libkrb53_1.4.4-7etch4_arm.deb stable/main/binary-arm/krb5-user_1.4.4-7etch4_arm.deb stable/main/binary-arm/krb5-clients_1.4.4-7etch4_arm.deb stable/main/binary-arm/krb5-rsh-server_1.4.4-7etch4_arm.deb stable/main/binary-arm/krb5-ftpd_1.4.4-7etch4_arm.deb stable/main/binary-arm/krb5-telnetd_1.4.4-7etch4_arm.deb stable/main/binary-arm/krb5-kdc_1.4.4-7etch4_arm.deb stable/main/binary-arm/krb5-admin-server_1.4.4-7etch4_arm.deb stable/main/binary-arm/libkrb5-dev_1.4.4-7etch4_arm.deb stable/main/binary-arm/libkrb5-dbg_1.4.4-7etch4_arm.deb krb5 (1.4.4-7etch4) stable-security; urgency=emergency * Fix bug in fix for CVE-2007-3999: the previous patch could allow an overflow of up to 32 bytes. Depending on how locals are layed out on the stack, this may or may not be a problem. stable/main/binary-hppa/libkadm55_1.4.4-7etch4_hppa.deb stable/main/binary-hppa/libkrb53_1.4.4-7etch4_hppa.deb stable/main/binary-hppa/krb5-user_1.4.4-7etch4_hppa.deb stable/main/binary-hppa/krb5-clients_1.4.4-7etch4_hppa.deb stable/main/binary-hppa/krb5-rsh-server_1.4.4-7etch4_hppa.deb stable/main/binary-hppa/krb5-ftpd_1.4.4-7etch4_hppa.deb stable/main/binary-hppa/krb5-telnetd_1.4.4-7etch4_hppa.deb stable/main/binary-hppa/krb5-kdc_1.4.4-7etch4_hppa.deb stable/main/binary-hppa/krb5-admin-server_1.4.4-7etch4_hppa.deb stable/main/binary-hppa/libkrb5-dev_1.4.4-7etch4_hppa.deb stable/main/binary-hppa/libkrb5-dbg_1.4.4-7etch4_hppa.deb krb5 (1.4.4-7etch4) stable-security; urgency=emergency * Fix bug in fix for CVE-2007-3999: the previous patch could allow an overflow of up to 32 bytes. Depending on how locals are layed out on the stack, this may or may not be a problem. stable/main/source/krb5_1.4.4-7etch4.dsc stable/main/source/krb5_1.4.4-7etch4.diff.gz stable/main/binary-all/krb5-doc_1.4.4-7etch4_all.deb stable/main/binary-i386/libkadm55_1.4.4-7etch4_i386.deb stable/main/binary-i386/libkrb53_1.4.4-7etch4_i386.deb stable/main/binary-i386/krb5-user_1.4.4-7etch4_i386.deb stable/main/binary-i386/krb5-clients_1.4.4-7etch4_i386.deb stable/main/binary-i386/krb5-rsh-server_1.4.4-7etch4_i386.deb stable/main/binary-i386/krb5-ftpd_1.4.4-7etch4_i386.deb stable/main/binary-i386/krb5-telnetd_1.4.4-7etch4_i386.deb stable/main/binary-i386/krb5-kdc_1.4.4-7etch4_i386.deb stable/main/binary-i386/krb5-admin-server_1.4.4-7etch4_i386.deb stable/main/binary-i386/libkrb5-dev_1.4.4-7etch4_i386.deb stable/main/binary-i386/libkrb5-dbg_1.4.4-7etch4_i386.deb krb5 (1.4.4-7etch4) stable-security; urgency=emergency * Fix bug in fix for CVE-2007-3999: the previous patch could allow an overflow of up to 32 bytes. Depending on how locals are layed out on the stack, this may or may not be a problem. stable/main/binary-ia64/libkadm55_1.4.4-7etch4_ia64.deb stable/main/binary-ia64/libkrb53_1.4.4-7etch4_ia64.deb stable/main/binary-ia64/krb5-user_1.4.4-7etch4_ia64.deb stable/main/binary-ia64/krb5-clients_1.4.4-7etch4_ia64.deb stable/main/binary-ia64/krb5-rsh-server_1.4.4-7etch4_ia64.deb stable/main/binary-ia64/krb5-ftpd_1.4.4-7etch4_ia64.deb stable/main/binary-ia64/krb5-telnetd_1.4.4-7etch4_ia64.deb stable/main/binary-ia64/krb5-kdc_1.4.4-7etch4_ia64.deb stable/main/binary-ia64/krb5-admin-server_1.4.4-7etch4_ia64.deb stable/main/binary-ia64/libkrb5-dev_1.4.4-7etch4_ia64.deb stable/main/binary-ia64/libkrb5-dbg_1.4.4-7etch4_ia64.deb krb5 (1.4.4-7etch4) stable-security; urgency=emergency * Fix bug in fix for CVE-2007-3999: the previous patch could allow an overflow of up to 32 bytes. Depending on how locals are layed out on the stack, this may or may not be a problem. stable/main/binary-mips/libkadm55_1.4.4-7etch4_mips.deb stable/main/binary-mips/libkrb53_1.4.4-7etch4_mips.deb stable/main/binary-mips/krb5-user_1.4.4-7etch4_mips.deb stable/main/binary-mips/krb5-clients_1.4.4-7etch4_mips.deb stable/main/binary-mips/krb5-rsh-server_1.4.4-7etch4_mips.deb stable/main/binary-mips/krb5-ftpd_1.4.4-7etch4_mips.deb stable/main/binary-mips/krb5-telnetd_1.4.4-7etch4_mips.deb stable/main/binary-mips/krb5-kdc_1.4.4-7etch4_mips.deb stable/main/binary-mips/krb5-admin-server_1.4.4-7etch4_mips.deb stable/main/binary-mips/libkrb5-dev_1.4.4-7etch4_mips.deb stable/main/binary-mips/libkrb5-dbg_1.4.4-7etch4_mips.deb krb5 (1.4.4-7etch4) stable-security; urgency=emergency * Fix bug in fix for CVE-2007-3999: the previous patch could allow an overflow of up to 32 bytes. Depending on how locals are layed out on the stack, this may or may not be a problem. stable/main/binary-mipsel/libkadm55_1.4.4-7etch4_mipsel.deb stable/main/binary-mipsel/libkrb53_1.4.4-7etch4_mipsel.deb stable/main/binary-mipsel/krb5-user_1.4.4-7etch4_mipsel.deb stable/main/binary-mipsel/krb5-clients_1.4.4-7etch4_mipsel.deb stable/main/binary-mipsel/krb5-rsh-server_1.4.4-7etch4_mipsel.deb stable/main/binary-mipsel/krb5-ftpd_1.4.4-7etch4_mipsel.deb stable/main/binary-mipsel/krb5-telnetd_1.4.4-7etch4_mipsel.deb stable/main/binary-mipsel/krb5-kdc_1.4.4-7etch4_mipsel.deb stable/main/binary-mipsel/krb5-admin-server_1.4.4-7etch4_mipsel.deb stable/main/binary-mipsel/libkrb5-dev_1.4.4-7etch4_mipsel.deb stable/main/binary-mipsel/libkrb5-dbg_1.4.4-7etch4_mipsel.deb krb5 (1.4.4-7etch4) stable-security; urgency=emergency * Fix bug in fix for CVE-2007-3999: the previous patch could allow an overflow of up to 32 bytes. Depending on how locals are layed out on the stack, this may or may not be a problem. stable/main/binary-powerpc/libkadm55_1.4.4-7etch4_powerpc.deb stable/main/binary-powerpc/libkrb53_1.4.4-7etch4_powerpc.deb stable/main/binary-powerpc/krb5-user_1.4.4-7etch4_powerpc.deb stable/main/binary-powerpc/krb5-clients_1.4.4-7etch4_powerpc.deb stable/main/binary-powerpc/krb5-rsh-server_1.4.4-7etch4_powerpc.deb stable/main/binary-powerpc/krb5-ftpd_1.4.4-7etch4_powerpc.deb stable/main/binary-powerpc/krb5-telnetd_1.4.4-7etch4_powerpc.deb stable/main/binary-powerpc/krb5-kdc_1.4.4-7etch4_powerpc.deb stable/main/binary-powerpc/krb5-admin-server_1.4.4-7etch4_powerpc.deb stable/main/binary-powerpc/libkrb5-dev_1.4.4-7etch4_powerpc.deb stable/main/binary-powerpc/libkrb5-dbg_1.4.4-7etch4_powerpc.deb krb5 (1.4.4-7etch4) stable-security; urgency=emergency * Fix bug in fix for CVE-2007-3999: the previous patch could allow an overflow of up to 32 bytes. Depending on how locals are layed out on the stack, this may or may not be a problem. stable/main/binary-s390/libkadm55_1.4.4-7etch4_s390.deb stable/main/binary-s390/libkrb53_1.4.4-7etch4_s390.deb stable/main/binary-s390/krb5-user_1.4.4-7etch4_s390.deb stable/main/binary-s390/krb5-clients_1.4.4-7etch4_s390.deb stable/main/binary-s390/krb5-rsh-server_1.4.4-7etch4_s390.deb stable/main/binary-s390/krb5-ftpd_1.4.4-7etch4_s390.deb stable/main/binary-s390/krb5-telnetd_1.4.4-7etch4_s390.deb stable/main/binary-s390/krb5-kdc_1.4.4-7etch4_s390.deb stable/main/binary-s390/krb5-admin-server_1.4.4-7etch4_s390.deb stable/main/binary-s390/libkrb5-dev_1.4.4-7etch4_s390.deb stable/main/binary-s390/libkrb5-dbg_1.4.4-7etch4_s390.deb krb5 (1.4.4-7etch4) stable-security; urgency=emergency * Fix bug in fix for CVE-2007-3999: the previous patch could allow an overflow of up to 32 bytes. Depending on how locals are layed out on the stack, this may or may not be a problem. stable/main/binary-sparc/libkadm55_1.4.4-7etch4_sparc.deb stable/main/binary-sparc/libkrb53_1.4.4-7etch4_sparc.deb stable/main/binary-sparc/krb5-user_1.4.4-7etch4_sparc.deb stable/main/binary-sparc/krb5-clients_1.4.4-7etch4_sparc.deb stable/main/binary-sparc/krb5-rsh-server_1.4.4-7etch4_sparc.deb stable/main/binary-sparc/krb5-ftpd_1.4.4-7etch4_sparc.deb stable/main/binary-sparc/krb5-telnetd_1.4.4-7etch4_sparc.deb stable/main/binary-sparc/krb5-kdc_1.4.4-7etch4_sparc.deb stable/main/binary-sparc/krb5-admin-server_1.4.4-7etch4_sparc.deb stable/main/binary-sparc/libkrb5-dev_1.4.4-7etch4_sparc.deb stable/main/binary-sparc/libkrb5-dbg_1.4.4-7etch4_sparc.deb krb5 (1.4.4-7etch4) stable-security; urgency=emergency * Fix bug in fix for CVE-2007-3999: the previous patch could allow an overflow of up to 32 bytes. Depending on how locals are layed out on the stack, this may or may not be a problem. stable/main/binary-alpha/ktorrent_2.0.3+dfsg1-2.2etch1_alpha.deb ktorrent (2.0.3+dfsg1-2.2etch1) stable-security; urgency=high * No changes. * Rebuilt with bumped version number. stable/main/source/ktorrent_2.0.3+dfsg1-2.2etch1.dsc stable/main/source/ktorrent_2.0.3+dfsg1-2.2etch1.diff.gz stable/main/binary-amd64/ktorrent_2.0.3+dfsg1-2.2etch1_amd64.deb ktorrent (2.0.3+dfsg1-2.2etch1) stable-security; urgency=high * No changes. * Rebuilt with bumped version number. stable/main/binary-arm/ktorrent_2.0.3+dfsg1-2.2etch1_arm.deb ktorrent (2.0.3+dfsg1-2.2etch1) stable-security; urgency=high * No changes. * Rebuilt with bumped version number. stable/main/binary-hppa/ktorrent_2.0.3+dfsg1-2.2etch1_hppa.deb ktorrent (2.0.3+dfsg1-2.2etch1) stable-security; urgency=high * No changes. * Rebuilt with bumped version number. stable/main/binary-i386/ktorrent_2.0.3+dfsg1-2.2etch1_i386.deb ktorrent (2.0.3+dfsg1-2.2etch1) stable-security; urgency=high * No changes. * Rebuilt with bumped version number. stable/main/binary-ia64/ktorrent_2.0.3+dfsg1-2.2etch1_ia64.deb ktorrent (2.0.3+dfsg1-2.2etch1) stable-security; urgency=high * No changes. * Rebuilt with bumped version number. stable/main/binary-mips/ktorrent_2.0.3+dfsg1-2.2etch1_mips.deb ktorrent (2.0.3+dfsg1-2.2etch1) stable-security; urgency=high * No changes. * Rebuilt with bumped version number. stable/main/binary-mipsel/ktorrent_2.0.3+dfsg1-2.2etch1_mipsel.deb ktorrent (2.0.3+dfsg1-2.2etch1) stable-security; urgency=high * No changes. * Rebuilt with bumped version number. stable/main/binary-powerpc/ktorrent_2.0.3+dfsg1-2.2etch1_powerpc.deb ktorrent (2.0.3+dfsg1-2.2etch1) stable-security; urgency=high * No changes. * Rebuilt with bumped version number. stable/main/binary-s390/ktorrent_2.0.3+dfsg1-2.2etch1_s390.deb ktorrent (2.0.3+dfsg1-2.2etch1) stable-security; urgency=high * No changes. * Rebuilt with bumped version number. stable/main/binary-sparc/ktorrent_2.0.3+dfsg1-2.2etch1_sparc.deb ktorrent (2.0.3+dfsg1-2.2etch1) stable-security; urgency=high * No changes. * Rebuilt with bumped version number. stable/main/binary-alpha/lib3ds-dev_1.2.0-4.1+etch1_alpha.deb lib3ds (1.2.0-4.1+etch1) stable; urgency=low * Non-maintainer upload. * Reupload 1.2.0-4.2 to stable to fix an RC bug. * Use an explicit union instead of an arbitrary cast between pointer types, to fix a bug when built with gcc-4.1 that causes all floats to be read and written wrong in 3ds files due to strict aliasing rules. Closes: #399761. stable/main/binary-amd64/lib3ds-dev_1.2.0-4.1+etch1_amd64.deb lib3ds (1.2.0-4.1+etch1) stable; urgency=low * Non-maintainer upload. * Reupload 1.2.0-4.2 to stable to fix an RC bug. * Use an explicit union instead of an arbitrary cast between pointer types, to fix a bug when built with gcc-4.1 that causes all floats to be read and written wrong in 3ds files due to strict aliasing rules. Closes: #399761. stable/main/binary-arm/lib3ds-dev_1.2.0-4.1+etch1_arm.deb lib3ds (1.2.0-4.1+etch1) stable; urgency=low * Non-maintainer upload. * Reupload 1.2.0-4.2 to stable to fix an RC bug. * Use an explicit union instead of an arbitrary cast between pointer types, to fix a bug when built with gcc-4.1 that causes all floats to be read and written wrong in 3ds files due to strict aliasing rules. Closes: #399761. stable/main/binary-hppa/lib3ds-dev_1.2.0-4.1+etch1_hppa.deb lib3ds (1.2.0-4.1+etch1) stable; urgency=low * Non-maintainer upload. * Reupload 1.2.0-4.2 to stable to fix an RC bug. * Use an explicit union instead of an arbitrary cast between pointer types, to fix a bug when built with gcc-4.1 that causes all floats to be read and written wrong in 3ds files due to strict aliasing rules. Closes: #399761. stable/main/source/lib3ds_1.2.0-4.1+etch1.dsc stable/main/source/lib3ds_1.2.0-4.1+etch1.diff.gz stable/main/binary-i386/lib3ds-dev_1.2.0-4.1+etch1_i386.deb lib3ds (1.2.0-4.1+etch1) stable; urgency=low * Non-maintainer upload. * Reupload 1.2.0-4.2 to stable to fix an RC bug. * Use an explicit union instead of an arbitrary cast between pointer types, to fix a bug when built with gcc-4.1 that causes all floats to be read and written wrong in 3ds files due to strict aliasing rules. Closes: #399761. stable/main/binary-ia64/lib3ds-dev_1.2.0-4.1+etch1_ia64.deb lib3ds (1.2.0-4.1+etch1) stable; urgency=low * Non-maintainer upload. * Reupload 1.2.0-4.2 to stable to fix an RC bug. * Use an explicit union instead of an arbitrary cast between pointer types, to fix a bug when built with gcc-4.1 that causes all floats to be read and written wrong in 3ds files due to strict aliasing rules. Closes: #399761. stable/main/binary-mips/lib3ds-dev_1.2.0-4.1+etch1_mips.deb lib3ds (1.2.0-4.1+etch1) stable; urgency=low * Non-maintainer upload. * Reupload 1.2.0-4.2 to stable to fix an RC bug. * Use an explicit union instead of an arbitrary cast between pointer types, to fix a bug when built with gcc-4.1 that causes all floats to be read and written wrong in 3ds files due to strict aliasing rules. Closes: #399761. stable/main/binary-mipsel/lib3ds-dev_1.2.0-4.1+etch1_mipsel.deb lib3ds (1.2.0-4.1+etch1) stable; urgency=low * Non-maintainer upload. * Reupload 1.2.0-4.2 to stable to fix an RC bug. * Use an explicit union instead of an arbitrary cast between pointer types, to fix a bug when built with gcc-4.1 that causes all floats to be read and written wrong in 3ds files due to strict aliasing rules. Closes: #399761. stable/main/binary-powerpc/lib3ds-dev_1.2.0-4.1+etch1_powerpc.deb lib3ds (1.2.0-4.1+etch1) stable; urgency=low * Non-maintainer upload. * Reupload 1.2.0-4.2 to stable to fix an RC bug. * Use an explicit union instead of an arbitrary cast between pointer types, to fix a bug when built with gcc-4.1 that causes all floats to be read and written wrong in 3ds files due to strict aliasing rules. Closes: #399761. stable/main/binary-s390/lib3ds-dev_1.2.0-4.1+etch1_s390.deb lib3ds (1.2.0-4.1+etch1) stable; urgency=low * Non-maintainer upload. * Reupload 1.2.0-4.2 to stable to fix an RC bug. * Use an explicit union instead of an arbitrary cast between pointer types, to fix a bug when built with gcc-4.1 that causes all floats to be read and written wrong in 3ds files due to strict aliasing rules. Closes: #399761. stable/main/binary-sparc/lib3ds-dev_1.2.0-4.1+etch1_sparc.deb lib3ds (1.2.0-4.1+etch1) stable; urgency=low * Non-maintainer upload. * Reupload 1.2.0-4.2 to stable to fix an RC bug. * Use an explicit union instead of an arbitrary cast between pointer types, to fix a bug when built with gcc-4.1 that causes all floats to be read and written wrong in 3ds files due to strict aliasing rules. Closes: #399761. stable/main/binary-alpha/libdbi-perl_1.53-1etch1_alpha.deb libdbi-perl (1.53-1etch1) stable; urgency=medium * Applied a backported 2-line patch for a "potential" dataloss problem (confirmed in the changelog of 1.57) which turned out to be a real problem as written by a user. I applied only the second part of the user submitted patch as suggested by the DBI author. stable/main/source/libdbi-perl_1.53-1etch1.dsc stable/main/source/libdbi-perl_1.53-1etch1.diff.gz stable/main/binary-amd64/libdbi-perl_1.53-1etch1_amd64.deb libdbi-perl (1.53-1etch1) stable; urgency=medium * Applied a backported 2-line patch for a "potential" dataloss problem (confirmed in the changelog of 1.57) which turned out to be a real problem as written by a user. I applied only the second part of the user submitted patch as suggested by the DBI author. stable/main/binary-arm/libdbi-perl_1.53-1etch1_arm.deb libdbi-perl (1.53-1etch1) stable; urgency=medium * Applied a backported 2-line patch for a "potential" dataloss problem (confirmed in the changelog of 1.57) which turned out to be a real problem as written by a user. I applied only the second part of the user submitted patch as suggested by the DBI author. stable/main/binary-hppa/libdbi-perl_1.53-1etch1_hppa.deb libdbi-perl (1.53-1etch1) stable; urgency=medium * Applied a backported 2-line patch for a "potential" dataloss problem (confirmed in the changelog of 1.57) which turned out to be a real problem as written by a user. I applied only the second part of the user submitted patch as suggested by the DBI author. stable/main/binary-i386/libdbi-perl_1.53-1etch1_i386.deb libdbi-perl (1.53-1etch1) stable; urgency=medium * Applied a backported 2-line patch for a "potential" dataloss problem (confirmed in the changelog of 1.57) which turned out to be a real problem as written by a user. I applied only the second part of the user submitted patch as suggested by the DBI author. stable/main/binary-ia64/libdbi-perl_1.53-1etch1_ia64.deb libdbi-perl (1.53-1etch1) stable; urgency=medium * Applied a backported 2-line patch for a "potential" dataloss problem (confirmed in the changelog of 1.57) which turned out to be a real problem as written by a user. I applied only the second part of the user submitted patch as suggested by the DBI author. stable/main/binary-mips/libdbi-perl_1.53-1etch1_mips.deb libdbi-perl (1.53-1etch1) stable; urgency=medium * Applied a backported 2-line patch for a "potential" dataloss problem (confirmed in the changelog of 1.57) which turned out to be a real problem as written by a user. I applied only the second part of the user submitted patch as suggested by the DBI author. stable/main/binary-mipsel/libdbi-perl_1.53-1etch1_mipsel.deb libdbi-perl (1.53-1etch1) stable; urgency=medium * Applied a backported 2-line patch for a "potential" dataloss problem (confirmed in the changelog of 1.57) which turned out to be a real problem as written by a user. I applied only the second part of the user submitted patch as suggested by the DBI author. stable/main/binary-powerpc/libdbi-perl_1.53-1etch1_powerpc.deb libdbi-perl (1.53-1etch1) stable; urgency=medium * Applied a backported 2-line patch for a "potential" dataloss problem (confirmed in the changelog of 1.57) which turned out to be a real problem as written by a user. I applied only the second part of the user submitted patch as suggested by the DBI author. stable/main/binary-s390/libdbi-perl_1.53-1etch1_s390.deb libdbi-perl (1.53-1etch1) stable; urgency=medium * Applied a backported 2-line patch for a "potential" dataloss problem (confirmed in the changelog of 1.57) which turned out to be a real problem as written by a user. I applied only the second part of the user submitted patch as suggested by the DBI author. stable/main/binary-sparc/libdbi-perl_1.53-1etch1_sparc.deb libdbi-perl (1.53-1etch1) stable; urgency=medium * Applied a backported 2-line patch for a "potential" dataloss problem (confirmed in the changelog of 1.57) which turned out to be a real problem as written by a user. I applied only the second part of the user submitted patch as suggested by the DBI author. stable/main/binary-alpha/libdebian-installer4_0.50etch1_alpha.deb stable/main/binary-alpha/libdebian-installer4-dev_0.50etch1_alpha.deb stable/main/libdebian-installer4-udeb_0.50etch1_alpha.udeb stable/main/binary-alpha/libdebian-installer-extra4_0.50etch1_alpha.deb stable/main/libdebian-installer-extra4-udeb_0.50etch1_alpha.udeb libdebian-installer (0.50etch1) stable; urgency=low [ Martin Michlmayr ] * Match SGI O2 machines with 300MHz RM5200SC (Nevada) CPUs. stable/main/source/libdebian-installer_0.50etch1.dsc stable/main/source/libdebian-installer_0.50etch1.tar.gz stable/main/binary-amd64/libdebian-installer4_0.50etch1_amd64.deb stable/main/binary-amd64/libdebian-installer4-dev_0.50etch1_amd64.deb stable/main/libdebian-installer4-udeb_0.50etch1_amd64.udeb stable/main/binary-amd64/libdebian-installer-extra4_0.50etch1_amd64.deb stable/main/libdebian-installer-extra4-udeb_0.50etch1_amd64.udeb libdebian-installer (0.50etch1) stable; urgency=low [ Martin Michlmayr ] * Match SGI O2 machines with 300MHz RM5200SC (Nevada) CPUs. stable/main/binary-arm/libdebian-installer4_0.50etch1_arm.deb stable/main/binary-arm/libdebian-installer4-dev_0.50etch1_arm.deb stable/main/libdebian-installer4-udeb_0.50etch1_arm.udeb stable/main/binary-arm/libdebian-installer-extra4_0.50etch1_arm.deb stable/main/libdebian-installer-extra4-udeb_0.50etch1_arm.udeb libdebian-installer (0.50etch1) stable; urgency=low [ Martin Michlmayr ] * Match SGI O2 machines with 300MHz RM5200SC (Nevada) CPUs. stable/main/binary-hppa/libdebian-installer4_0.50etch1_hppa.deb stable/main/binary-hppa/libdebian-installer4-dev_0.50etch1_hppa.deb stable/main/libdebian-installer4-udeb_0.50etch1_hppa.udeb stable/main/binary-hppa/libdebian-installer-extra4_0.50etch1_hppa.deb stable/main/libdebian-installer-extra4-udeb_0.50etch1_hppa.udeb libdebian-installer (0.50etch1) stable; urgency=low [ Martin Michlmayr ] * Match SGI O2 machines with 300MHz RM5200SC (Nevada) CPUs. stable/main/binary-i386/libdebian-installer4_0.50etch1_i386.deb stable/main/binary-i386/libdebian-installer4-dev_0.50etch1_i386.deb stable/main/libdebian-installer4-udeb_0.50etch1_i386.udeb stable/main/binary-i386/libdebian-installer-extra4_0.50etch1_i386.deb stable/main/libdebian-installer-extra4-udeb_0.50etch1_i386.udeb libdebian-installer (0.50etch1) stable; urgency=low [ Martin Michlmayr ] * Match SGI O2 machines with 300MHz RM5200SC (Nevada) CPUs. stable/main/binary-ia64/libdebian-installer4_0.50etch1_ia64.deb stable/main/binary-ia64/libdebian-installer4-dev_0.50etch1_ia64.deb stable/main/libdebian-installer4-udeb_0.50etch1_ia64.udeb stable/main/binary-ia64/libdebian-installer-extra4_0.50etch1_ia64.deb stable/main/libdebian-installer-extra4-udeb_0.50etch1_ia64.udeb libdebian-installer (0.50etch1) stable; urgency=low [ Martin Michlmayr ] * Match SGI O2 machines with 300MHz RM5200SC (Nevada) CPUs. stable/main/binary-mips/libdebian-installer4_0.50etch1_mips.deb stable/main/binary-mips/libdebian-installer4-dev_0.50etch1_mips.deb stable/main/libdebian-installer4-udeb_0.50etch1_mips.udeb stable/main/binary-mips/libdebian-installer-extra4_0.50etch1_mips.deb stable/main/libdebian-installer-extra4-udeb_0.50etch1_mips.udeb libdebian-installer (0.50etch1) stable; urgency=low [ Martin Michlmayr ] * Match SGI O2 machines with 300MHz RM5200SC (Nevada) CPUs. stable/main/binary-mipsel/libdebian-installer4_0.50etch1_mipsel.deb stable/main/binary-mipsel/libdebian-installer4-dev_0.50etch1_mipsel.deb stable/main/libdebian-installer4-udeb_0.50etch1_mipsel.udeb stable/main/binary-mipsel/libdebian-installer-extra4_0.50etch1_mipsel.deb stable/main/libdebian-installer-extra4-udeb_0.50etch1_mipsel.udeb libdebian-installer (0.50etch1) stable; urgency=low [ Martin Michlmayr ] * Match SGI O2 machines with 300MHz RM5200SC (Nevada) CPUs. stable/main/binary-powerpc/libdebian-installer4_0.50etch1_powerpc.deb stable/main/binary-powerpc/libdebian-installer4-dev_0.50etch1_powerpc.deb stable/main/libdebian-installer4-udeb_0.50etch1_powerpc.udeb stable/main/binary-powerpc/libdebian-installer-extra4_0.50etch1_powerpc.deb stable/main/libdebian-installer-extra4-udeb_0.50etch1_powerpc.udeb libdebian-installer (0.50etch1) stable; urgency=low [ Martin Michlmayr ] * Match SGI O2 machines with 300MHz RM5200SC (Nevada) CPUs. stable/main/binary-s390/libdebian-installer4_0.50etch1_s390.deb stable/main/binary-s390/libdebian-installer4-dev_0.50etch1_s390.deb stable/main/libdebian-installer4-udeb_0.50etch1_s390.udeb stable/main/binary-s390/libdebian-installer-extra4_0.50etch1_s390.deb stable/main/libdebian-installer-extra4-udeb_0.50etch1_s390.udeb libdebian-installer (0.50etch1) stable; urgency=low [ Martin Michlmayr ] * Match SGI O2 machines with 300MHz RM5200SC (Nevada) CPUs. stable/main/binary-sparc/libdebian-installer4_0.50etch1_sparc.deb stable/main/binary-sparc/libdebian-installer4-dev_0.50etch1_sparc.deb stable/main/libdebian-installer4-udeb_0.50etch1_sparc.udeb stable/main/binary-sparc/libdebian-installer-extra4_0.50etch1_sparc.deb stable/main/libdebian-installer-extra4-udeb_0.50etch1_sparc.udeb libdebian-installer (0.50etch1) stable; urgency=low [ Martin Michlmayr ] * Match SGI O2 machines with 300MHz RM5200SC (Nevada) CPUs. stable/main/binary-alpha/libmarc-charset-perl_0.95-1etch1_alpha.deb libmarc-charset-perl (0.95-1etch1) stable; urgency=low * Apply Niko Tyni's fix from 0.97-2 to version in etch (closes: #429030). stable/main/binary-amd64/libmarc-charset-perl_0.95-1etch1_amd64.deb libmarc-charset-perl (0.95-1etch1) stable; urgency=low * Apply Niko Tyni's fix from 0.97-2 to version in etch (closes: #429030). stable/main/binary-arm/libmarc-charset-perl_0.95-1etch1_arm.deb libmarc-charset-perl (0.95-1etch1) stable; urgency=low * Apply Niko Tyni's fix from 0.97-2 to version in etch (closes: #429030). stable/main/binary-hppa/libmarc-charset-perl_0.95-1etch1_hppa.deb libmarc-charset-perl (0.95-1etch1) stable; urgency=low * Apply Niko Tyni's fix from 0.97-2 to version in etch (closes: #429030). stable/main/source/libmarc-charset-perl_0.95-1etch1.dsc stable/main/source/libmarc-charset-perl_0.95-1etch1.diff.gz stable/main/binary-i386/libmarc-charset-perl_0.95-1etch1_i386.deb libmarc-charset-perl (0.95-1etch1) stable; urgency=low * Apply Niko Tyni's fix from 0.97-2 to version in etch (closes: #429030). stable/main/binary-ia64/libmarc-charset-perl_0.95-1etch1_ia64.deb libmarc-charset-perl (0.95-1etch1) stable; urgency=low * Apply Niko Tyni's fix from 0.97-2 to version in etch (closes: #429030). stable/main/binary-mips/libmarc-charset-perl_0.95-1etch1_mips.deb libmarc-charset-perl (0.95-1etch1) stable; urgency=low * Apply Niko Tyni's fix from 0.97-2 to version in etch (closes: #429030). stable/main/binary-mipsel/libmarc-charset-perl_0.95-1etch1_mipsel.deb libmarc-charset-perl (0.95-1etch1) stable; urgency=low * Apply Niko Tyni's fix from 0.97-2 to version in etch (closes: #429030). stable/main/binary-powerpc/libmarc-charset-perl_0.95-1etch1_powerpc.deb libmarc-charset-perl (0.95-1etch1) stable; urgency=low * Apply Niko Tyni's fix from 0.97-2 to version in etch (closes: #429030). stable/main/binary-s390/libmarc-charset-perl_0.95-1etch1_s390.deb libmarc-charset-perl (0.95-1etch1) stable; urgency=low * Apply Niko Tyni's fix from 0.97-2 to version in etch (closes: #429030). stable/main/binary-sparc/libmarc-charset-perl_0.95-1etch1_sparc.deb libmarc-charset-perl (0.95-1etch1) stable; urgency=low * Apply Niko Tyni's fix from 0.97-2 to version in etch (closes: #429030). stable/main/binary-alpha/libnarray-ruby1.8_0.5.9-1+b1_alpha.deb libnarray-ruby (0.5.9-1+b1) stable; urgency=low * Binary-only non-maintainer upload for alpha; no source changes. * Rebuild against current ruby1.8 to fix a wrong library install directory stable/main/binary-amd64/libnarray-ruby1.8_0.5.9-1+b1_amd64.deb libnarray-ruby (0.5.9-1+b1) stable; urgency=low * Binary-only non-maintainer upload for amd64; no source changes. * Rebuild against current ruby1.8 to fix a wrong library install directory stable/main/binary-arm/libnarray-ruby1.8_0.5.9-1+b1_arm.deb libnarray-ruby (0.5.9-1+b1) stable; urgency=low * Binary-only non-maintainer upload for arm; no source changes. * Rebuild against current ruby1.8 to fix a wrong library install directory stable/main/binary-hppa/libnarray-ruby1.8_0.5.9-1+b1_hppa.deb libnarray-ruby (0.5.9-1+b1) stable; urgency=low * Binary-only non-maintainer upload for hppa; no source changes. * Rebuild against current ruby1.8 to fix a wrong library install directory stable/main/binary-ia64/libnarray-ruby1.8_0.5.9-1+b1_ia64.deb libnarray-ruby (0.5.9-1+b1) stable; urgency=low * Binary-only non-maintainer upload for ia64; no source changes. * Rebuild against current ruby1.8 to fix a wrong library install directory stable/main/binary-mips/libnarray-ruby1.8_0.5.9-1+b1_mips.deb libnarray-ruby (0.5.9-1+b1) stable; urgency=low * Binary-only non-maintainer upload for mips; no source changes. * Rebuild against current ruby1.8 to fix a wrong library install directory stable/main/binary-mipsel/libnarray-ruby1.8_0.5.9-1+b1_mipsel.deb libnarray-ruby (0.5.9-1+b1) stable; urgency=low * Binary-only non-maintainer upload for mipsel; no source changes. * Rebuild against current ruby1.8 to fix a wrong library install directory stable/main/binary-powerpc/libnarray-ruby1.8_0.5.9-1+b1_powerpc.deb libnarray-ruby (0.5.9-1+b1) stable; urgency=low * Binary-only non-maintainer upload for powerpc; no source changes. * Rebuild against current ruby1.8 to fix a wrong library install directory stable/main/binary-s390/libnarray-ruby1.8_0.5.9-1+b1_s390.deb libnarray-ruby (0.5.9-1+b1) stable; urgency=low * Binary-only non-maintainer upload for s390; no source changes. * Rebuild against current ruby1.8 to fix a wrong library install directory stable/main/binary-sparc/libnarray-ruby1.8_0.5.9-1+b1_sparc.deb libnarray-ruby (0.5.9-1+b1) stable; urgency=low * Binary-only non-maintainer upload for sparc; no source changes. * Rebuild against current ruby1.8 to fix a wrong library install directory stable/main/binary-alpha/libnss-ldap_251-7.5etch1_alpha.deb libnss-ldap (251-7.5etch1) stable-security; urgency=high * Non-maintainer upload by the security team * Fix race condition, which could lead to a DoS, when applications use pthread and fork after a call to nss_ldap Fixes: CVE-2007-5794 stable/main/binary-amd64/libnss-ldap_251-7.5etch1_amd64.deb libnss-ldap (251-7.5etch1) stable-security; urgency=high * Non-maintainer upload by the security team * Fix race condition, which could lead to a DoS, when applications use pthread and fork after a call to nss_ldap Fixes: CVE-2007-5794 stable/main/binary-arm/libnss-ldap_251-7.5etch1_arm.deb libnss-ldap (251-7.5etch1) stable-security; urgency=high * Non-maintainer upload by the security team * Fix race condition, which could lead to a DoS, when applications use pthread and fork after a call to nss_ldap Fixes: CVE-2007-5794 stable/main/binary-hppa/libnss-ldap_251-7.5etch1_hppa.deb libnss-ldap (251-7.5etch1) stable-security; urgency=high * Non-maintainer upload by the security team * Fix race condition, which could lead to a DoS, when applications use pthread and fork after a call to nss_ldap Fixes: CVE-2007-5794 stable/main/source/libnss-ldap_251-7.5etch1.dsc stable/main/source/libnss-ldap_251.orig.tar.gz stable/main/source/libnss-ldap_251-7.5etch1.diff.gz stable/main/binary-i386/libnss-ldap_251-7.5etch1_i386.deb libnss-ldap (251-7.5etch1) stable-security; urgency=high * Non-maintainer upload by the security team * Fix race condition, which could lead to a DoS, when applications use pthread and fork after a call to nss_ldap Fixes: CVE-2007-5794 stable/main/binary-ia64/libnss-ldap_251-7.5etch1_ia64.deb libnss-ldap (251-7.5etch1) stable-security; urgency=high * Non-maintainer upload by the security team * Fix race condition, which could lead to a DoS, when applications use pthread and fork after a call to nss_ldap Fixes: CVE-2007-5794 stable/main/binary-mips/libnss-ldap_251-7.5etch1_mips.deb libnss-ldap (251-7.5etch1) stable-security; urgency=high * Non-maintainer upload by the security team * Fix race condition, which could lead to a DoS, when applications use pthread and fork after a call to nss_ldap Fixes: CVE-2007-5794 stable/main/binary-mipsel/libnss-ldap_251-7.5etch1_mipsel.deb libnss-ldap (251-7.5etch1) stable-security; urgency=high * Non-maintainer upload by the security team * Fix race condition, which could lead to a DoS, when applications use pthread and fork after a call to nss_ldap Fixes: CVE-2007-5794 stable/main/binary-powerpc/libnss-ldap_251-7.5etch1_powerpc.deb libnss-ldap (251-7.5etch1) stable-security; urgency=high * Non-maintainer upload by the security team * Fix race condition, which could lead to a DoS, when applications use pthread and fork after a call to nss_ldap Fixes: CVE-2007-5794 stable/main/binary-s390/libnss-ldap_251-7.5etch1_s390.deb libnss-ldap (251-7.5etch1) stable-security; urgency=high * Non-maintainer upload by the security team * Fix race condition, which could lead to a DoS, when applications use pthread and fork after a call to nss_ldap Fixes: CVE-2007-5794 stable/main/binary-sparc/libnss-ldap_251-7.5etch1_sparc.deb libnss-ldap (251-7.5etch1) stable-security; urgency=high * Non-maintainer upload by the security team * Fix race condition, which could lead to a DoS, when applications use pthread and fork after a call to nss_ldap Fixes: CVE-2007-5794 stable/main/binary-alpha/librpcsecgss-dev_0.14-2etch3_alpha.deb stable/main/binary-alpha/librpcsecgss3_0.14-2etch3_alpha.deb librpcsecgss (0.14-2etch3) stable-security; urgency=high * Correct changelog entries (misspelled CVE name) stable/main/source/librpcsecgss_0.14-2etch3.dsc stable/main/source/librpcsecgss_0.14-2etch3.diff.gz stable/main/binary-amd64/librpcsecgss-dev_0.14-2etch3_amd64.deb stable/main/binary-amd64/librpcsecgss3_0.14-2etch3_amd64.deb librpcsecgss (0.14-2etch3) stable-security; urgency=high * Correct changelog entries (misspelled CVE name) stable/main/binary-arm/librpcsecgss-dev_0.14-2etch3_arm.deb stable/main/binary-arm/librpcsecgss3_0.14-2etch3_arm.deb librpcsecgss (0.14-2etch3) stable-security; urgency=high * Correct changelog entries (misspelled CVE name) stable/main/binary-hppa/librpcsecgss-dev_0.14-2etch3_hppa.deb stable/main/binary-hppa/librpcsecgss3_0.14-2etch3_hppa.deb librpcsecgss (0.14-2etch3) stable-security; urgency=high * Correct changelog entries (misspelled CVE name) stable/main/binary-i386/librpcsecgss-dev_0.14-2etch3_i386.deb stable/main/binary-i386/librpcsecgss3_0.14-2etch3_i386.deb librpcsecgss (0.14-2etch3) stable-security; urgency=high * Correct changelog entries (misspelled CVE name) stable/main/binary-ia64/librpcsecgss-dev_0.14-2etch3_ia64.deb stable/main/binary-ia64/librpcsecgss3_0.14-2etch3_ia64.deb librpcsecgss (0.14-2etch3) stable-security; urgency=high * Correct changelog entries (misspelled CVE name) stable/main/binary-mips/librpcsecgss-dev_0.14-2etch3_mips.deb stable/main/binary-mips/librpcsecgss3_0.14-2etch3_mips.deb librpcsecgss (0.14-2etch3) stable-security; urgency=high * Correct changelog entries (misspelled CVE name) stable/main/binary-mipsel/librpcsecgss-dev_0.14-2etch3_mipsel.deb stable/main/binary-mipsel/librpcsecgss3_0.14-2etch3_mipsel.deb librpcsecgss (0.14-2etch3) stable-security; urgency=high * Correct changelog entries (misspelled CVE name) stable/main/binary-powerpc/librpcsecgss-dev_0.14-2etch3_powerpc.deb stable/main/binary-powerpc/librpcsecgss3_0.14-2etch3_powerpc.deb librpcsecgss (0.14-2etch3) stable-security; urgency=high * Correct changelog entries (misspelled CVE name) stable/main/binary-s390/librpcsecgss-dev_0.14-2etch3_s390.deb stable/main/binary-s390/librpcsecgss3_0.14-2etch3_s390.deb librpcsecgss (0.14-2etch3) stable-security; urgency=high * Correct changelog entries (misspelled CVE name) stable/main/binary-sparc/librpcsecgss-dev_0.14-2etch3_sparc.deb stable/main/binary-sparc/librpcsecgss3_0.14-2etch3_sparc.deb librpcsecgss (0.14-2etch3) stable-security; urgency=high * Correct changelog entries (misspelled CVE name) stable/main/binary-alpha/lighttpd_1.4.13-4etch4_alpha.deb stable/main/binary-alpha/lighttpd-mod-mysql-vhost_1.4.13-4etch4_alpha.deb stable/main/binary-alpha/lighttpd-mod-trigger-b4-dl_1.4.13-4etch4_alpha.deb stable/main/binary-alpha/lighttpd-mod-cml_1.4.13-4etch4_alpha.deb stable/main/binary-alpha/lighttpd-mod-magnet_1.4.13-4etch4_alpha.deb stable/main/binary-alpha/lighttpd-mod-webdav_1.4.13-4etch4_alpha.deb lighttpd (1.4.13-4etch4) stable-security; urgency=high * Non-maintainer upload by The Security Team. * This update correctly patches a potential header overflow which was claimed to have been fixed in 1.4.13-4etch3/DSA-1362-1. [CVE-2007-4727]. stable/main/source/lighttpd_1.4.13-4etch4.dsc stable/main/source/lighttpd_1.4.13.orig.tar.gz stable/main/source/lighttpd_1.4.13-4etch4.diff.gz stable/main/binary-all/lighttpd-doc_1.4.13-4etch4_all.deb stable/main/binary-amd64/lighttpd_1.4.13-4etch4_amd64.deb stable/main/binary-amd64/lighttpd-mod-mysql-vhost_1.4.13-4etch4_amd64.deb stable/main/binary-amd64/lighttpd-mod-trigger-b4-dl_1.4.13-4etch4_amd64.deb stable/main/binary-amd64/lighttpd-mod-cml_1.4.13-4etch4_amd64.deb stable/main/binary-amd64/lighttpd-mod-magnet_1.4.13-4etch4_amd64.deb stable/main/binary-amd64/lighttpd-mod-webdav_1.4.13-4etch4_amd64.deb lighttpd (1.4.13-4etch4) stable-security; urgency=high * Non-maintainer upload by The Security Team. * This update correctly patches a potential header overflow which was claimed to have been fixed in 1.4.13-4etch3/DSA-1362-1. [CVE-2007-4727]. stable/main/binary-arm/lighttpd_1.4.13-4etch4_arm.deb stable/main/binary-arm/lighttpd-mod-mysql-vhost_1.4.13-4etch4_arm.deb stable/main/binary-arm/lighttpd-mod-trigger-b4-dl_1.4.13-4etch4_arm.deb stable/main/binary-arm/lighttpd-mod-cml_1.4.13-4etch4_arm.deb stable/main/binary-arm/lighttpd-mod-magnet_1.4.13-4etch4_arm.deb stable/main/binary-arm/lighttpd-mod-webdav_1.4.13-4etch4_arm.deb lighttpd (1.4.13-4etch4) stable-security; urgency=high * Non-maintainer upload by The Security Team. * This update correctly patches a potential header overflow which was claimed to have been fixed in 1.4.13-4etch3/DSA-1362-1. [CVE-2007-4727]. stable/main/binary-hppa/lighttpd_1.4.13-4etch4_hppa.deb stable/main/binary-hppa/lighttpd-mod-mysql-vhost_1.4.13-4etch4_hppa.deb stable/main/binary-hppa/lighttpd-mod-trigger-b4-dl_1.4.13-4etch4_hppa.deb stable/main/binary-hppa/lighttpd-mod-cml_1.4.13-4etch4_hppa.deb stable/main/binary-hppa/lighttpd-mod-magnet_1.4.13-4etch4_hppa.deb stable/main/binary-hppa/lighttpd-mod-webdav_1.4.13-4etch4_hppa.deb lighttpd (1.4.13-4etch4) stable-security; urgency=high * Non-maintainer upload by The Security Team. * This update correctly patches a potential header overflow which was claimed to have been fixed in 1.4.13-4etch3/DSA-1362-1. [CVE-2007-4727]. stable/main/binary-i386/lighttpd_1.4.13-4etch4_i386.deb stable/main/binary-i386/lighttpd-mod-mysql-vhost_1.4.13-4etch4_i386.deb stable/main/binary-i386/lighttpd-mod-trigger-b4-dl_1.4.13-4etch4_i386.deb stable/main/binary-i386/lighttpd-mod-cml_1.4.13-4etch4_i386.deb stable/main/binary-i386/lighttpd-mod-magnet_1.4.13-4etch4_i386.deb stable/main/binary-i386/lighttpd-mod-webdav_1.4.13-4etch4_i386.deb lighttpd (1.4.13-4etch4) stable-security; urgency=high * Non-maintainer upload by The Security Team. * This update correctly patches a potential header overflow which was claimed to have been fixed in 1.4.13-4etch3/DSA-1362-1. [CVE-2007-4727]. stable/main/binary-ia64/lighttpd_1.4.13-4etch4_ia64.deb stable/main/binary-ia64/lighttpd-mod-mysql-vhost_1.4.13-4etch4_ia64.deb stable/main/binary-ia64/lighttpd-mod-trigger-b4-dl_1.4.13-4etch4_ia64.deb stable/main/binary-ia64/lighttpd-mod-cml_1.4.13-4etch4_ia64.deb stable/main/binary-ia64/lighttpd-mod-magnet_1.4.13-4etch4_ia64.deb stable/main/binary-ia64/lighttpd-mod-webdav_1.4.13-4etch4_ia64.deb lighttpd (1.4.13-4etch4) stable-security; urgency=high * Non-maintainer upload by The Security Team. * This update correctly patches a potential header overflow which was claimed to have been fixed in 1.4.13-4etch3/DSA-1362-1. [CVE-2007-4727]. stable/main/binary-mips/lighttpd_1.4.13-4etch4_mips.deb stable/main/binary-mips/lighttpd-mod-mysql-vhost_1.4.13-4etch4_mips.deb stable/main/binary-mips/lighttpd-mod-trigger-b4-dl_1.4.13-4etch4_mips.deb stable/main/binary-mips/lighttpd-mod-cml_1.4.13-4etch4_mips.deb stable/main/binary-mips/lighttpd-mod-magnet_1.4.13-4etch4_mips.deb stable/main/binary-mips/lighttpd-mod-webdav_1.4.13-4etch4_mips.deb lighttpd (1.4.13-4etch4) stable-security; urgency=high * Non-maintainer upload by The Security Team. * This update correctly patches a potential header overflow which was claimed to have been fixed in 1.4.13-4etch3/DSA-1362-1. [CVE-2007-4727]. stable/main/binary-mipsel/lighttpd_1.4.13-4etch4_mipsel.deb stable/main/binary-mipsel/lighttpd-mod-mysql-vhost_1.4.13-4etch4_mipsel.deb stable/main/binary-mipsel/lighttpd-mod-trigger-b4-dl_1.4.13-4etch4_mipsel.deb stable/main/binary-mipsel/lighttpd-mod-cml_1.4.13-4etch4_mipsel.deb stable/main/binary-mipsel/lighttpd-mod-magnet_1.4.13-4etch4_mipsel.deb stable/main/binary-mipsel/lighttpd-mod-webdav_1.4.13-4etch4_mipsel.deb lighttpd (1.4.13-4etch4) stable-security; urgency=high * Non-maintainer upload by The Security Team. * This update correctly patches a potential header overflow which was claimed to have been fixed in 1.4.13-4etch3/DSA-1362-1. [CVE-2007-4727]. stable/main/binary-powerpc/lighttpd_1.4.13-4etch4_powerpc.deb stable/main/binary-powerpc/lighttpd-mod-mysql-vhost_1.4.13-4etch4_powerpc.deb stable/main/binary-powerpc/lighttpd-mod-trigger-b4-dl_1.4.13-4etch4_powerpc.deb stable/main/binary-powerpc/lighttpd-mod-cml_1.4.13-4etch4_powerpc.deb stable/main/binary-powerpc/lighttpd-mod-magnet_1.4.13-4etch4_powerpc.deb stable/main/binary-powerpc/lighttpd-mod-webdav_1.4.13-4etch4_powerpc.deb lighttpd (1.4.13-4etch4) stable-security; urgency=high * Non-maintainer upload by The Security Team. * This update correctly patches a potential header overflow which was claimed to have been fixed in 1.4.13-4etch3/DSA-1362-1. [CVE-2007-4727]. stable/main/binary-s390/lighttpd_1.4.13-4etch4_s390.deb stable/main/binary-s390/lighttpd-mod-mysql-vhost_1.4.13-4etch4_s390.deb stable/main/binary-s390/lighttpd-mod-trigger-b4-dl_1.4.13-4etch4_s390.deb stable/main/binary-s390/lighttpd-mod-cml_1.4.13-4etch4_s390.deb stable/main/binary-s390/lighttpd-mod-magnet_1.4.13-4etch4_s390.deb stable/main/binary-s390/lighttpd-mod-webdav_1.4.13-4etch4_s390.deb lighttpd (1.4.13-4etch4) stable-security; urgency=high * Non-maintainer upload by The Security Team. * This update correctly patches a potential header overflow which was claimed to have been fixed in 1.4.13-4etch3/DSA-1362-1. [CVE-2007-4727]. stable/main/binary-sparc/lighttpd_1.4.13-4etch4_sparc.deb stable/main/binary-sparc/lighttpd-mod-mysql-vhost_1.4.13-4etch4_sparc.deb stable/main/binary-sparc/lighttpd-mod-trigger-b4-dl_1.4.13-4etch4_sparc.deb stable/main/binary-sparc/lighttpd-mod-cml_1.4.13-4etch4_sparc.deb stable/main/binary-sparc/lighttpd-mod-magnet_1.4.13-4etch4_sparc.deb stable/main/binary-sparc/lighttpd-mod-webdav_1.4.13-4etch4_sparc.deb lighttpd (1.4.13-4etch4) stable-security; urgency=high * Non-maintainer upload by The Security Team. * This update correctly patches a potential header overflow which was claimed to have been fixed in 1.4.13-4etch3/DSA-1362-1. [CVE-2007-4727]. stable/main/binary-alpha/link-grammar_4.2.2-4etch1_alpha.deb stable/main/binary-alpha/liblink-grammar4_4.2.2-4etch1_alpha.deb stable/main/binary-alpha/liblink-grammar4-dev_4.2.2-4etch1_alpha.deb link-grammar (4.2.2-4etch1) stable-security; urgency=high * Non-maintainer upload by the security team * Fix stack-based buffer overflow in the separate_word function in tokenize.c to prevent remote attackes to execute arbitrary code Fixes: CVE-2007-5395 stable/main/binary-amd64/link-grammar_4.2.2-4etch1_amd64.deb stable/main/binary-amd64/liblink-grammar4_4.2.2-4etch1_amd64.deb stable/main/binary-amd64/liblink-grammar4-dev_4.2.2-4etch1_amd64.deb link-grammar (4.2.2-4etch1) stable-security; urgency=high * Non-maintainer upload by the security team * Fix stack-based buffer overflow in the separate_word function in tokenize.c to prevent remote attackes to execute arbitrary code Fixes: CVE-2007-5395 stable/main/binary-arm/link-grammar_4.2.2-4etch1_arm.deb stable/main/binary-arm/liblink-grammar4_4.2.2-4etch1_arm.deb stable/main/binary-arm/liblink-grammar4-dev_4.2.2-4etch1_arm.deb link-grammar (4.2.2-4etch1) stable-security; urgency=high * Non-maintainer upload by the security team * Fix stack-based buffer overflow in the separate_word function in tokenize.c to prevent remote attackes to execute arbitrary code Fixes: CVE-2007-5395 stable/main/binary-hppa/link-grammar_4.2.2-4etch1_hppa.deb stable/main/binary-hppa/liblink-grammar4_4.2.2-4etch1_hppa.deb stable/main/binary-hppa/liblink-grammar4-dev_4.2.2-4etch1_hppa.deb link-grammar (4.2.2-4etch1) stable-security; urgency=high * Non-maintainer upload by the security team * Fix stack-based buffer overflow in the separate_word function in tokenize.c to prevent remote attackes to execute arbitrary code Fixes: CVE-2007-5395 stable/main/source/link-grammar_4.2.2-4etch1.dsc stable/main/source/link-grammar_4.2.2.orig.tar.gz stable/main/source/link-grammar_4.2.2-4etch1.diff.gz stable/main/binary-all/link-grammar-dictionaries-en_4.2.2-4etch1_all.deb stable/main/binary-i386/link-grammar_4.2.2-4etch1_i386.deb stable/main/binary-i386/liblink-grammar4_4.2.2-4etch1_i386.deb stable/main/binary-i386/liblink-grammar4-dev_4.2.2-4etch1_i386.deb link-grammar (4.2.2-4etch1) stable-security; urgency=high * Non-maintainer upload by the security team * Fix stack-based buffer overflow in the separate_word function in tokenize.c to prevent remote attackes to execute arbitrary code Fixes: CVE-2007-5395 stable/main/binary-ia64/link-grammar_4.2.2-4etch1_ia64.deb stable/main/binary-ia64/liblink-grammar4_4.2.2-4etch1_ia64.deb stable/main/binary-ia64/liblink-grammar4-dev_4.2.2-4etch1_ia64.deb link-grammar (4.2.2-4etch1) stable-security; urgency=high * Non-maintainer upload by the security team * Fix stack-based buffer overflow in the separate_word function in tokenize.c to prevent remote attackes to execute arbitrary code Fixes: CVE-2007-5395 stable/main/binary-mips/link-grammar_4.2.2-4etch1_mips.deb stable/main/binary-mips/liblink-grammar4_4.2.2-4etch1_mips.deb stable/main/binary-mips/liblink-grammar4-dev_4.2.2-4etch1_mips.deb link-grammar (4.2.2-4etch1) stable-security; urgency=high * Non-maintainer upload by the security team * Fix stack-based buffer overflow in the separate_word function in tokenize.c to prevent remote attackes to execute arbitrary code Fixes: CVE-2007-5395 stable/main/binary-mipsel/link-grammar_4.2.2-4etch1_mipsel.deb stable/main/binary-mipsel/liblink-grammar4_4.2.2-4etch1_mipsel.deb stable/main/binary-mipsel/liblink-grammar4-dev_4.2.2-4etch1_mipsel.deb link-grammar (4.2.2-4etch1) stable-security; urgency=high * Non-maintainer upload by the security team * Fix stack-based buffer overflow in the separate_word function in tokenize.c to prevent remote attackes to execute arbitrary code Fixes: CVE-2007-5395 stable/main/binary-powerpc/link-grammar_4.2.2-4etch1_powerpc.deb stable/main/binary-powerpc/liblink-grammar4_4.2.2-4etch1_powerpc.deb stable/main/binary-powerpc/liblink-grammar4-dev_4.2.2-4etch1_powerpc.deb link-grammar (4.2.2-4etch1) stable-security; urgency=high * Non-maintainer upload by the security team * Fix stack-based buffer overflow in the separate_word function in tokenize.c to prevent remote attackes to execute arbitrary code Fixes: CVE-2007-5395 stable/main/binary-s390/link-grammar_4.2.2-4etch1_s390.deb stable/main/binary-s390/liblink-grammar4_4.2.2-4etch1_s390.deb stable/main/binary-s390/liblink-grammar4-dev_4.2.2-4etch1_s390.deb link-grammar (4.2.2-4etch1) stable-security; urgency=high * Non-maintainer upload by the security team * Fix stack-based buffer overflow in the separate_word function in tokenize.c to prevent remote attackes to execute arbitrary code Fixes: CVE-2007-5395 stable/main/binary-sparc/link-grammar_4.2.2-4etch1_sparc.deb stable/main/binary-sparc/liblink-grammar4_4.2.2-4etch1_sparc.deb stable/main/binary-sparc/liblink-grammar4-dev_4.2.2-4etch1_sparc.deb link-grammar (4.2.2-4etch1) stable-security; urgency=high * Non-maintainer upload by the security team * Fix stack-based buffer overflow in the separate_word function in tokenize.c to prevent remote attackes to execute arbitrary code Fixes: CVE-2007-5395 stable/main/binary-alpha/linux-headers-2.6.18-5-all_2.6.18.dfsg.1-17_alpha.deb stable/main/binary-alpha/linux-headers-2.6.18-5-all-alpha_2.6.18.dfsg.1-17_alpha.deb stable/main/binary-alpha/linux-headers-2.6.18-5_2.6.18.dfsg.1-17_alpha.deb stable/main/binary-alpha/linux-image-2.6.18-5-alpha-generic_2.6.18.dfsg.1-17_alpha.deb stable/main/binary-alpha/linux-headers-2.6.18-5-alpha-generic_2.6.18.dfsg.1-17_alpha.deb stable/main/binary-alpha/linux-image-2.6.18-5-alpha-smp_2.6.18.dfsg.1-17_alpha.deb stable/main/binary-alpha/linux-headers-2.6.18-5-alpha-smp_2.6.18.dfsg.1-17_alpha.deb stable/main/binary-alpha/linux-image-2.6.18-5-alpha-legacy_2.6.18.dfsg.1-17_alpha.deb stable/main/binary-alpha/linux-headers-2.6.18-5-alpha-legacy_2.6.18.dfsg.1-17_alpha.deb stable/main/binary-alpha/linux-headers-2.6.18-5-vserver_2.6.18.dfsg.1-17_alpha.deb stable/main/binary-alpha/linux-image-2.6.18-5-vserver-alpha_2.6.18.dfsg.1-17_alpha.deb stable/main/binary-alpha/linux-headers-2.6.18-5-vserver-alpha_2.6.18.dfsg.1-17_alpha.deb linux-2.6 (2.6.18.dfsg.1-17) stable; urgency=high * [futex] Fix address computation in compat code, fixing hangs on sparc64. (closes: #433187) * [x86_64] Mask the NX bit in mk_pte_phys to avoid triggering a RSVD type page fault on non-NX capable systems which causes a crash. (closes: #414742) * [fusion] Avoid holding the device busy for too long in the low level driver, which was causing filesystems in VMWare guests to get remounted read-only under load. (closes: #453120) * Add UNUSUAL_DEV entries for supertop usb drives which require the IGNORE_RESIDUE flag. (closes: #455856) * [sparc64] Enable CONFIG_USB_SERIAL (closes: #412740) stable/main/binary-amd64/linux-headers-2.6.18-5-all_2.6.18.dfsg.1-17_amd64.deb stable/main/binary-amd64/linux-headers-2.6.18-5-all-amd64_2.6.18.dfsg.1-17_amd64.deb stable/main/binary-amd64/linux-headers-2.6.18-5_2.6.18.dfsg.1-17_amd64.deb stable/main/binary-amd64/linux-image-2.6.18-5-amd64_2.6.18.dfsg.1-17_amd64.deb stable/main/binary-amd64/linux-headers-2.6.18-5-amd64_2.6.18.dfsg.1-17_amd64.deb stable/main/binary-amd64/linux-headers-2.6.18-5-vserver_2.6.18.dfsg.1-17_amd64.deb stable/main/binary-amd64/linux-image-2.6.18-5-vserver-amd64_2.6.18.dfsg.1-17_amd64.deb stable/main/binary-amd64/linux-headers-2.6.18-5-vserver-amd64_2.6.18.dfsg.1-17_amd64.deb stable/main/binary-amd64/linux-headers-2.6.18-5-xen_2.6.18.dfsg.1-17_amd64.deb stable/main/binary-amd64/linux-image-2.6.18-5-xen-amd64_2.6.18.dfsg.1-17_amd64.deb stable/main/binary-amd64/linux-modules-2.6.18-5-xen-amd64_2.6.18.dfsg.1-17_amd64.deb stable/main/binary-amd64/linux-headers-2.6.18-5-xen-amd64_2.6.18.dfsg.1-17_amd64.deb stable/main/binary-amd64/xen-linux-system-2.6.18-5-xen-amd64_2.6.18.dfsg.1-17_amd64.deb stable/main/binary-amd64/linux-headers-2.6.18-5-xen-vserver_2.6.18.dfsg.1-17_amd64.deb stable/main/binary-amd64/linux-image-2.6.18-5-xen-vserver-amd64_2.6.18.dfsg.1-17_amd64.deb stable/main/binary-amd64/linux-modules-2.6.18-5-xen-vserver-amd64_2.6.18.dfsg.1-17_amd64.deb stable/main/binary-amd64/linux-headers-2.6.18-5-xen-vserver-amd64_2.6.18.dfsg.1-17_amd64.deb stable/main/binary-amd64/xen-linux-system-2.6.18-5-xen-vserver-amd64_2.6.18.dfsg.1-17_amd64.deb linux-2.6 (2.6.18.dfsg.1-17) stable; urgency=high * [futex] Fix address computation in compat code, fixing hangs on sparc64. (closes: #433187) * [x86_64] Mask the NX bit in mk_pte_phys to avoid triggering a RSVD type page fault on non-NX capable systems which causes a crash. (closes: #414742) * [fusion] Avoid holding the device busy for too long in the low level driver, which was causing filesystems in VMWare guests to get remounted read-only under load. (closes: #453120) * Add UNUSUAL_DEV entries for supertop usb drives which require the IGNORE_RESIDUE flag. (closes: #455856) * [sparc64] Enable CONFIG_USB_SERIAL (closes: #412740) stable/main/binary-arm/linux-headers-2.6.18-5-all_2.6.18.dfsg.1-17_arm.deb stable/main/binary-arm/linux-headers-2.6.18-5-all-arm_2.6.18.dfsg.1-17_arm.deb stable/main/binary-arm/linux-headers-2.6.18-5_2.6.18.dfsg.1-17_arm.deb stable/main/binary-arm/linux-image-2.6.18-5-footbridge_2.6.18.dfsg.1-17_arm.deb stable/main/binary-arm/linux-headers-2.6.18-5-footbridge_2.6.18.dfsg.1-17_arm.deb stable/main/binary-arm/linux-image-2.6.18-5-iop32x_2.6.18.dfsg.1-17_arm.deb stable/main/binary-arm/linux-headers-2.6.18-5-iop32x_2.6.18.dfsg.1-17_arm.deb stable/main/binary-arm/linux-image-2.6.18-5-ixp4xx_2.6.18.dfsg.1-17_arm.deb stable/main/binary-arm/linux-headers-2.6.18-5-ixp4xx_2.6.18.dfsg.1-17_arm.deb stable/main/binary-arm/linux-image-2.6.18-5-rpc_2.6.18.dfsg.1-17_arm.deb stable/main/binary-arm/linux-headers-2.6.18-5-rpc_2.6.18.dfsg.1-17_arm.deb stable/main/binary-arm/linux-image-2.6.18-5-s3c2410_2.6.18.dfsg.1-17_arm.deb stable/main/binary-arm/linux-headers-2.6.18-5-s3c2410_2.6.18.dfsg.1-17_arm.deb linux-2.6 (2.6.18.dfsg.1-17) stable; urgency=high * [futex] Fix address computation in compat code, fixing hangs on sparc64. (closes: #433187) * [x86_64] Mask the NX bit in mk_pte_phys to avoid triggering a RSVD type page fault on non-NX capable systems which causes a crash. (closes: #414742) * [fusion] Avoid holding the device busy for too long in the low level driver, which was causing filesystems in VMWare guests to get remounted read-only under load. (closes: #453120) * Add UNUSUAL_DEV entries for supertop usb drives which require the IGNORE_RESIDUE flag. (closes: #455856) * [sparc64] Enable CONFIG_USB_SERIAL (closes: #412740) stable/main/binary-hppa/linux-headers-2.6.18-5-all_2.6.18.dfsg.1-17_hppa.deb stable/main/binary-hppa/linux-headers-2.6.18-5-all-hppa_2.6.18.dfsg.1-17_hppa.deb stable/main/binary-hppa/linux-headers-2.6.18-5_2.6.18.dfsg.1-17_hppa.deb stable/main/binary-hppa/linux-image-2.6.18-5-parisc_2.6.18.dfsg.1-17_hppa.deb stable/main/binary-hppa/linux-headers-2.6.18-5-parisc_2.6.18.dfsg.1-17_hppa.deb stable/main/binary-hppa/linux-image-2.6.18-5-parisc-smp_2.6.18.dfsg.1-17_hppa.deb stable/main/binary-hppa/linux-headers-2.6.18-5-parisc-smp_2.6.18.dfsg.1-17_hppa.deb stable/main/binary-hppa/linux-image-2.6.18-5-parisc64_2.6.18.dfsg.1-17_hppa.deb stable/main/binary-hppa/linux-headers-2.6.18-5-parisc64_2.6.18.dfsg.1-17_hppa.deb stable/main/binary-hppa/linux-image-2.6.18-5-parisc64-smp_2.6.18.dfsg.1-17_hppa.deb stable/main/binary-hppa/linux-headers-2.6.18-5-parisc64-smp_2.6.18.dfsg.1-17_hppa.deb linux-2.6 (2.6.18.dfsg.1-17) stable; urgency=high * [futex] Fix address computation in compat code, fixing hangs on sparc64. (closes: #433187) * [x86_64] Mask the NX bit in mk_pte_phys to avoid triggering a RSVD type page fault on non-NX capable systems which causes a crash. (closes: #414742) * [fusion] Avoid holding the device busy for too long in the low level driver, which was causing filesystems in VMWare guests to get remounted read-only under load. (closes: #453120) * Add UNUSUAL_DEV entries for supertop usb drives which require the IGNORE_RESIDUE flag. (closes: #455856) * [sparc64] Enable CONFIG_USB_SERIAL (closes: #412740) stable/main/binary-i386/linux-headers-2.6.18-5-all_2.6.18.dfsg.1-17_i386.deb stable/main/binary-i386/linux-headers-2.6.18-5-all-i386_2.6.18.dfsg.1-17_i386.deb stable/main/binary-i386/linux-headers-2.6.18-5_2.6.18.dfsg.1-17_i386.deb stable/main/binary-i386/linux-image-2.6.18-5-486_2.6.18.dfsg.1-17_i386.deb stable/main/binary-i386/linux-headers-2.6.18-5-486_2.6.18.dfsg.1-17_i386.deb stable/main/binary-i386/linux-image-2.6.18-5-686_2.6.18.dfsg.1-17_i386.deb stable/main/binary-i386/linux-headers-2.6.18-5-686_2.6.18.dfsg.1-17_i386.deb stable/main/binary-i386/linux-image-2.6.18-5-k7_2.6.18.dfsg.1-17_i386.deb stable/main/binary-i386/linux-headers-2.6.18-5-k7_2.6.18.dfsg.1-17_i386.deb stable/main/binary-i386/linux-image-2.6.18-5-686-bigmem_2.6.18.dfsg.1-17_i386.deb stable/main/binary-i386/linux-headers-2.6.18-5-686-bigmem_2.6.18.dfsg.1-17_i386.deb stable/main/binary-i386/linux-image-2.6.18-5-amd64_2.6.18.dfsg.1-17_i386.deb stable/main/binary-i386/linux-headers-2.6.18-5-amd64_2.6.18.dfsg.1-17_i386.deb stable/main/binary-i386/linux-headers-2.6.18-5-vserver_2.6.18.dfsg.1-17_i386.deb stable/main/binary-i386/linux-image-2.6.18-5-vserver-686_2.6.18.dfsg.1-17_i386.deb stable/main/binary-i386/linux-headers-2.6.18-5-vserver-686_2.6.18.dfsg.1-17_i386.deb stable/main/binary-i386/linux-image-2.6.18-5-vserver-k7_2.6.18.dfsg.1-17_i386.deb stable/main/binary-i386/linux-headers-2.6.18-5-vserver-k7_2.6.18.dfsg.1-17_i386.deb stable/main/binary-i386/linux-headers-2.6.18-5-xen_2.6.18.dfsg.1-17_i386.deb stable/main/binary-i386/linux-image-2.6.18-5-xen-686_2.6.18.dfsg.1-17_i386.deb stable/main/binary-i386/linux-modules-2.6.18-5-xen-686_2.6.18.dfsg.1-17_i386.deb stable/main/binary-i386/linux-headers-2.6.18-5-xen-686_2.6.18.dfsg.1-17_i386.deb stable/main/binary-i386/xen-linux-system-2.6.18-5-xen-686_2.6.18.dfsg.1-17_i386.deb stable/main/binary-i386/linux-headers-2.6.18-5-xen-vserver_2.6.18.dfsg.1-17_i386.deb stable/main/binary-i386/linux-image-2.6.18-5-xen-vserver-686_2.6.18.dfsg.1-17_i386.deb stable/main/binary-i386/linux-modules-2.6.18-5-xen-vserver-686_2.6.18.dfsg.1-17_i386.deb stable/main/binary-i386/linux-headers-2.6.18-5-xen-vserver-686_2.6.18.dfsg.1-17_i386.deb stable/main/binary-i386/xen-linux-system-2.6.18-5-xen-vserver-686_2.6.18.dfsg.1-17_i386.deb linux-2.6 (2.6.18.dfsg.1-17) stable; urgency=high * [futex] Fix address computation in compat code, fixing hangs on sparc64. (closes: #433187) * [x86_64] Mask the NX bit in mk_pte_phys to avoid triggering a RSVD type page fault on non-NX capable systems which causes a crash. (closes: #414742) * [fusion] Avoid holding the device busy for too long in the low level driver, which was causing filesystems in VMWare guests to get remounted read-only under load. (closes: #453120) * Add UNUSUAL_DEV entries for supertop usb drives which require the IGNORE_RESIDUE flag. (closes: #455856) * [sparc64] Enable CONFIG_USB_SERIAL (closes: #412740) stable/main/binary-ia64/linux-headers-2.6.18-5-all_2.6.18.dfsg.1-17_ia64.deb stable/main/binary-ia64/linux-headers-2.6.18-5-all-ia64_2.6.18.dfsg.1-17_ia64.deb stable/main/binary-ia64/linux-headers-2.6.18-5_2.6.18.dfsg.1-17_ia64.deb stable/main/binary-ia64/linux-image-2.6.18-5-itanium_2.6.18.dfsg.1-17_ia64.deb stable/main/binary-ia64/linux-headers-2.6.18-5-itanium_2.6.18.dfsg.1-17_ia64.deb stable/main/binary-ia64/linux-image-2.6.18-5-mckinley_2.6.18.dfsg.1-17_ia64.deb stable/main/binary-ia64/linux-headers-2.6.18-5-mckinley_2.6.18.dfsg.1-17_ia64.deb linux-2.6 (2.6.18.dfsg.1-17) stable; urgency=high * [futex] Fix address computation in compat code, fixing hangs on sparc64. (closes: #433187) * [x86_64] Mask the NX bit in mk_pte_phys to avoid triggering a RSVD type page fault on non-NX capable systems which causes a crash. (closes: #414742) * [fusion] Avoid holding the device busy for too long in the low level driver, which was causing filesystems in VMWare guests to get remounted read-only under load. (closes: #453120) * Add UNUSUAL_DEV entries for supertop usb drives which require the IGNORE_RESIDUE flag. (closes: #455856) * [sparc64] Enable CONFIG_USB_SERIAL (closes: #412740) stable/main/binary-mips/linux-headers-2.6.18-5-all_2.6.18.dfsg.1-17_mips.deb stable/main/binary-mips/linux-headers-2.6.18-5-all-mips_2.6.18.dfsg.1-17_mips.deb stable/main/binary-mips/linux-headers-2.6.18-5_2.6.18.dfsg.1-17_mips.deb stable/main/binary-mips/linux-image-2.6.18-5-r4k-ip22_2.6.18.dfsg.1-17_mips.deb stable/main/binary-mips/linux-headers-2.6.18-5-r4k-ip22_2.6.18.dfsg.1-17_mips.deb stable/main/binary-mips/linux-image-2.6.18-5-r5k-ip32_2.6.18.dfsg.1-17_mips.deb stable/main/binary-mips/linux-headers-2.6.18-5-r5k-ip32_2.6.18.dfsg.1-17_mips.deb stable/main/binary-mips/linux-image-2.6.18-5-sb1-bcm91250a_2.6.18.dfsg.1-17_mips.deb stable/main/binary-mips/linux-headers-2.6.18-5-sb1-bcm91250a_2.6.18.dfsg.1-17_mips.deb stable/main/binary-mips/linux-image-2.6.18-5-sb1a-bcm91480b_2.6.18.dfsg.1-17_mips.deb stable/main/binary-mips/linux-headers-2.6.18-5-sb1a-bcm91480b_2.6.18.dfsg.1-17_mips.deb stable/main/binary-mips/linux-image-2.6.18-5-qemu_2.6.18.dfsg.1-17_mips.deb stable/main/binary-mips/linux-headers-2.6.18-5-qemu_2.6.18.dfsg.1-17_mips.deb linux-2.6 (2.6.18.dfsg.1-17) stable; urgency=high * [futex] Fix address computation in compat code, fixing hangs on sparc64. (closes: #433187) * [x86_64] Mask the NX bit in mk_pte_phys to avoid triggering a RSVD type page fault on non-NX capable systems which causes a crash. (closes: #414742) * [fusion] Avoid holding the device busy for too long in the low level driver, which was causing filesystems in VMWare guests to get remounted read-only under load. (closes: #453120) * Add UNUSUAL_DEV entries for supertop usb drives which require the IGNORE_RESIDUE flag. (closes: #455856) * [sparc64] Enable CONFIG_USB_SERIAL (closes: #412740) stable/main/binary-mipsel/linux-headers-2.6.18-5-all_2.6.18.dfsg.1-17_mipsel.deb stable/main/binary-mipsel/linux-headers-2.6.18-5-all-mipsel_2.6.18.dfsg.1-17_mipsel.deb stable/main/binary-mipsel/linux-headers-2.6.18-5_2.6.18.dfsg.1-17_mipsel.deb stable/main/binary-mipsel/linux-image-2.6.18-5-r5k-cobalt_2.6.18.dfsg.1-17_mipsel.deb stable/main/binary-mipsel/linux-headers-2.6.18-5-r5k-cobalt_2.6.18.dfsg.1-17_mipsel.deb stable/main/binary-mipsel/linux-image-2.6.18-5-sb1-bcm91250a_2.6.18.dfsg.1-17_mipsel.deb stable/main/binary-mipsel/linux-headers-2.6.18-5-sb1-bcm91250a_2.6.18.dfsg.1-17_mipsel.deb stable/main/binary-mipsel/linux-image-2.6.18-5-sb1a-bcm91480b_2.6.18.dfsg.1-17_mipsel.deb stable/main/binary-mipsel/linux-headers-2.6.18-5-sb1a-bcm91480b_2.6.18.dfsg.1-17_mipsel.deb stable/main/binary-mipsel/linux-image-2.6.18-5-r3k-kn02_2.6.18.dfsg.1-17_mipsel.deb stable/main/binary-mipsel/linux-headers-2.6.18-5-r3k-kn02_2.6.18.dfsg.1-17_mipsel.deb stable/main/binary-mipsel/linux-image-2.6.18-5-r4k-kn04_2.6.18.dfsg.1-17_mipsel.deb stable/main/binary-mipsel/linux-headers-2.6.18-5-r4k-kn04_2.6.18.dfsg.1-17_mipsel.deb stable/main/binary-mipsel/linux-image-2.6.18-5-qemu_2.6.18.dfsg.1-17_mipsel.deb stable/main/binary-mipsel/linux-headers-2.6.18-5-qemu_2.6.18.dfsg.1-17_mipsel.deb linux-2.6 (2.6.18.dfsg.1-17) stable; urgency=high * [futex] Fix address computation in compat code, fixing hangs on sparc64. (closes: #433187) * [x86_64] Mask the NX bit in mk_pte_phys to avoid triggering a RSVD type page fault on non-NX capable systems which causes a crash. (closes: #414742) * [fusion] Avoid holding the device busy for too long in the low level driver, which was causing filesystems in VMWare guests to get remounted read-only under load. (closes: #453120) * Add UNUSUAL_DEV entries for supertop usb drives which require the IGNORE_RESIDUE flag. (closes: #455856) * [sparc64] Enable CONFIG_USB_SERIAL (closes: #412740) stable/main/binary-powerpc/linux-headers-2.6.18-5-all_2.6.18.dfsg.1-17_powerpc.deb stable/main/binary-powerpc/linux-headers-2.6.18-5-all-powerpc_2.6.18.dfsg.1-17_powerpc.deb stable/main/binary-powerpc/linux-headers-2.6.18-5_2.6.18.dfsg.1-17_powerpc.deb stable/main/binary-powerpc/linux-image-2.6.18-5-powerpc_2.6.18.dfsg.1-17_powerpc.deb stable/main/binary-powerpc/linux-headers-2.6.18-5-powerpc_2.6.18.dfsg.1-17_powerpc.deb stable/main/binary-powerpc/linux-image-2.6.18-5-powerpc-smp_2.6.18.dfsg.1-17_powerpc.deb stable/main/binary-powerpc/linux-headers-2.6.18-5-powerpc-smp_2.6.18.dfsg.1-17_powerpc.deb stable/main/binary-powerpc/linux-image-2.6.18-5-powerpc-miboot_2.6.18.dfsg.1-17_powerpc.deb stable/main/binary-powerpc/linux-headers-2.6.18-5-powerpc-miboot_2.6.18.dfsg.1-17_powerpc.deb stable/main/binary-powerpc/linux-image-2.6.18-5-powerpc64_2.6.18.dfsg.1-17_powerpc.deb stable/main/binary-powerpc/linux-headers-2.6.18-5-powerpc64_2.6.18.dfsg.1-17_powerpc.deb stable/main/binary-powerpc/linux-image-2.6.18-5-prep_2.6.18.dfsg.1-17_powerpc.deb stable/main/binary-powerpc/linux-headers-2.6.18-5-prep_2.6.18.dfsg.1-17_powerpc.deb stable/main/binary-powerpc/linux-headers-2.6.18-5-vserver_2.6.18.dfsg.1-17_powerpc.deb stable/main/binary-powerpc/linux-image-2.6.18-5-vserver-powerpc_2.6.18.dfsg.1-17_powerpc.deb stable/main/binary-powerpc/linux-headers-2.6.18-5-vserver-powerpc_2.6.18.dfsg.1-17_powerpc.deb stable/main/binary-powerpc/linux-image-2.6.18-5-vserver-powerpc64_2.6.18.dfsg.1-17_powerpc.deb stable/main/binary-powerpc/linux-headers-2.6.18-5-vserver-powerpc64_2.6.18.dfsg.1-17_powerpc.deb linux-2.6 (2.6.18.dfsg.1-17) stable; urgency=high * [futex] Fix address computation in compat code, fixing hangs on sparc64. (closes: #433187) * [x86_64] Mask the NX bit in mk_pte_phys to avoid triggering a RSVD type page fault on non-NX capable systems which causes a crash. (closes: #414742) * [fusion] Avoid holding the device busy for too long in the low level driver, which was causing filesystems in VMWare guests to get remounted read-only under load. (closes: #453120) * Add UNUSUAL_DEV entries for supertop usb drives which require the IGNORE_RESIDUE flag. (closes: #455856) * [sparc64] Enable CONFIG_USB_SERIAL (closes: #412740) stable/main/binary-s390/linux-headers-2.6.18-5-all_2.6.18.dfsg.1-17_s390.deb stable/main/binary-s390/linux-headers-2.6.18-5-all-s390_2.6.18.dfsg.1-17_s390.deb stable/main/binary-s390/linux-headers-2.6.18-5_2.6.18.dfsg.1-17_s390.deb stable/main/binary-s390/linux-image-2.6.18-5-s390_2.6.18.dfsg.1-17_s390.deb stable/main/binary-s390/linux-headers-2.6.18-5-s390_2.6.18.dfsg.1-17_s390.deb stable/main/binary-s390/linux-image-2.6.18-5-s390-tape_2.6.18.dfsg.1-17_s390.deb stable/main/binary-s390/linux-image-2.6.18-5-s390x_2.6.18.dfsg.1-17_s390.deb stable/main/binary-s390/linux-headers-2.6.18-5-s390x_2.6.18.dfsg.1-17_s390.deb stable/main/binary-s390/linux-headers-2.6.18-5-vserver_2.6.18.dfsg.1-17_s390.deb stable/main/binary-s390/linux-image-2.6.18-5-vserver-s390x_2.6.18.dfsg.1-17_s390.deb stable/main/binary-s390/linux-headers-2.6.18-5-vserver-s390x_2.6.18.dfsg.1-17_s390.deb linux-2.6 (2.6.18.dfsg.1-17) stable; urgency=high * [futex] Fix address computation in compat code, fixing hangs on sparc64. (closes: #433187) * [x86_64] Mask the NX bit in mk_pte_phys to avoid triggering a RSVD type page fault on non-NX capable systems which causes a crash. (closes: #414742) * [fusion] Avoid holding the device busy for too long in the low level driver, which was causing filesystems in VMWare guests to get remounted read-only under load. (closes: #453120) * Add UNUSUAL_DEV entries for supertop usb drives which require the IGNORE_RESIDUE flag. (closes: #455856) * [sparc64] Enable CONFIG_USB_SERIAL (closes: #412740) stable/main/source/linux-2.6_2.6.18.dfsg.1-17.dsc stable/main/source/linux-2.6_2.6.18.dfsg.1-17.diff.gz stable/main/binary-all/linux-doc-2.6.18_2.6.18.dfsg.1-17_all.deb stable/main/binary-all/linux-manual-2.6.18_2.6.18.dfsg.1-17_all.deb stable/main/binary-all/linux-patch-debian-2.6.18_2.6.18.dfsg.1-17_all.deb stable/main/binary-all/linux-source-2.6.18_2.6.18.dfsg.1-17_all.deb stable/main/binary-all/linux-support-2.6.18-5_2.6.18.dfsg.1-17_all.deb stable/main/binary-all/linux-tree-2.6.18_2.6.18.dfsg.1-17_all.deb stable/main/binary-sparc/linux-headers-2.6.18-5-all_2.6.18.dfsg.1-17_sparc.deb stable/main/binary-sparc/linux-headers-2.6.18-5-all-sparc_2.6.18.dfsg.1-17_sparc.deb stable/main/binary-sparc/linux-headers-2.6.18-5_2.6.18.dfsg.1-17_sparc.deb stable/main/binary-sparc/linux-image-2.6.18-5-sparc32_2.6.18.dfsg.1-17_sparc.deb stable/main/binary-sparc/linux-headers-2.6.18-5-sparc32_2.6.18.dfsg.1-17_sparc.deb stable/main/binary-sparc/linux-image-2.6.18-5-sparc64_2.6.18.dfsg.1-17_sparc.deb stable/main/binary-sparc/linux-headers-2.6.18-5-sparc64_2.6.18.dfsg.1-17_sparc.deb stable/main/binary-sparc/linux-image-2.6.18-5-sparc64-smp_2.6.18.dfsg.1-17_sparc.deb stable/main/binary-sparc/linux-headers-2.6.18-5-sparc64-smp_2.6.18.dfsg.1-17_sparc.deb stable/main/binary-sparc/linux-headers-2.6.18-5-vserver_2.6.18.dfsg.1-17_sparc.deb stable/main/binary-sparc/linux-image-2.6.18-5-vserver-sparc64_2.6.18.dfsg.1-17_sparc.deb stable/main/binary-sparc/linux-headers-2.6.18-5-vserver-sparc64_2.6.18.dfsg.1-17_sparc.deb linux-2.6 (2.6.18.dfsg.1-17) stable; urgency=high * [futex] Fix address computation in compat code, fixing hangs on sparc64. (closes: #433187) * [x86_64] Mask the NX bit in mk_pte_phys to avoid triggering a RSVD type page fault on non-NX capable systems which causes a crash. (closes: #414742) * [fusion] Avoid holding the device busy for too long in the low level driver, which was causing filesystems in VMWare guests to get remounted read-only under load. (closes: #453120) * Add UNUSUAL_DEV entries for supertop usb drives which require the IGNORE_RESIDUE flag. (closes: #455856) * [sparc64] Enable CONFIG_USB_SERIAL (closes: #412740) stable/main/source/linux-kernel-di-alpha-2.6_0.17etch2.dsc stable/main/source/linux-kernel-di-alpha-2.6_0.17etch2.tar.gz stable/main/kernel-image-2.6.18-5-alpha-generic-di_0.17etch2_alpha.udeb stable/main/nic-modules-2.6.18-5-alpha-generic-di_0.17etch2_alpha.udeb stable/main/nic-extra-modules-2.6.18-5-alpha-generic-di_0.17etch2_alpha.udeb stable/main/nic-shared-modules-2.6.18-5-alpha-generic-di_0.17etch2_alpha.udeb stable/main/usb-serial-modules-2.6.18-5-alpha-generic-di_0.17etch2_alpha.udeb stable/main/ppp-modules-2.6.18-5-alpha-generic-di_0.17etch2_alpha.udeb stable/main/ide-modules-2.6.18-5-alpha-generic-di_0.17etch2_alpha.udeb stable/main/ide-core-modules-2.6.18-5-alpha-generic-di_0.17etch2_alpha.udeb stable/main/cdrom-core-modules-2.6.18-5-alpha-generic-di_0.17etch2_alpha.udeb stable/main/cdrom-modules-2.6.18-5-alpha-generic-di_0.17etch2_alpha.udeb stable/main/scsi-core-modules-2.6.18-5-alpha-generic-di_0.17etch2_alpha.udeb stable/main/scsi-modules-2.6.18-5-alpha-generic-di_0.17etch2_alpha.udeb stable/main/scsi-common-modules-2.6.18-5-alpha-generic-di_0.17etch2_alpha.udeb stable/main/scsi-extra-modules-2.6.18-5-alpha-generic-di_0.17etch2_alpha.udeb stable/main/plip-modules-2.6.18-5-alpha-generic-di_0.17etch2_alpha.udeb stable/main/ipv6-modules-2.6.18-5-alpha-generic-di_0.17etch2_alpha.udeb stable/main/ext3-modules-2.6.18-5-alpha-generic-di_0.17etch2_alpha.udeb stable/main/jfs-modules-2.6.18-5-alpha-generic-di_0.17etch2_alpha.udeb stable/main/reiserfs-modules-2.6.18-5-alpha-generic-di_0.17etch2_alpha.udeb stable/main/xfs-modules-2.6.18-5-alpha-generic-di_0.17etch2_alpha.udeb stable/main/fat-modules-2.6.18-5-alpha-generic-di_0.17etch2_alpha.udeb stable/main/md-modules-2.6.18-5-alpha-generic-di_0.17etch2_alpha.udeb stable/main/usb-modules-2.6.18-5-alpha-generic-di_0.17etch2_alpha.udeb stable/main/usb-storage-modules-2.6.18-5-alpha-generic-di_0.17etch2_alpha.udeb stable/main/fb-modules-2.6.18-5-alpha-generic-di_0.17etch2_alpha.udeb stable/main/parport-modules-2.6.18-5-alpha-generic-di_0.17etch2_alpha.udeb stable/main/sata-modules-2.6.18-5-alpha-generic-di_0.17etch2_alpha.udeb stable/main/firmware-modules-2.6.18-5-alpha-generic-di_0.17etch2_alpha.udeb stable/main/crc-modules-2.6.18-5-alpha-generic-di_0.17etch2_alpha.udeb stable/main/crypto-modules-2.6.18-5-alpha-generic-di_0.17etch2_alpha.udeb stable/main/srm-modules-2.6.18-5-alpha-generic-di_0.17etch2_alpha.udeb linux-kernel-di-alpha-2.6 (0.17etch2) stable; urgency=low * Built against version 2.6.18.dfsg.1-16 of linux-2.6. stable/main/source/linux-kernel-di-amd64-2.6_1.21etch2.dsc stable/main/source/linux-kernel-di-amd64-2.6_1.21etch2.tar.gz stable/main/kernel-image-2.6.18-5-amd64-di_1.21etch2_amd64.udeb stable/main/nic-modules-2.6.18-5-amd64-di_1.21etch2_amd64.udeb stable/main/nic-extra-modules-2.6.18-5-amd64-di_1.21etch2_amd64.udeb stable/main/nic-shared-modules-2.6.18-5-amd64-di_1.21etch2_amd64.udeb stable/main/serial-modules-2.6.18-5-amd64-di_1.21etch2_amd64.udeb stable/main/usb-serial-modules-2.6.18-5-amd64-di_1.21etch2_amd64.udeb stable/main/ppp-modules-2.6.18-5-amd64-di_1.21etch2_amd64.udeb stable/main/ide-modules-2.6.18-5-amd64-di_1.21etch2_amd64.udeb stable/main/ide-core-modules-2.6.18-5-amd64-di_1.21etch2_amd64.udeb stable/main/cdrom-core-modules-2.6.18-5-amd64-di_1.21etch2_amd64.udeb stable/main/firewire-core-modules-2.6.18-5-amd64-di_1.21etch2_amd64.udeb stable/main/scsi-core-modules-2.6.18-5-amd64-di_1.21etch2_amd64.udeb stable/main/scsi-modules-2.6.18-5-amd64-di_1.21etch2_amd64.udeb stable/main/scsi-common-modules-2.6.18-5-amd64-di_1.21etch2_amd64.udeb stable/main/scsi-extra-modules-2.6.18-5-amd64-di_1.21etch2_amd64.udeb stable/main/plip-modules-2.6.18-5-amd64-di_1.21etch2_amd64.udeb stable/main/floppy-modules-2.6.18-5-amd64-di_1.21etch2_amd64.udeb stable/main/loop-modules-2.6.18-5-amd64-di_1.21etch2_amd64.udeb stable/main/ipv6-modules-2.6.18-5-amd64-di_1.21etch2_amd64.udeb stable/main/ext2-modules-2.6.18-5-amd64-di_1.21etch2_amd64.udeb stable/main/ext3-modules-2.6.18-5-amd64-di_1.21etch2_amd64.udeb stable/main/jfs-modules-2.6.18-5-amd64-di_1.21etch2_amd64.udeb stable/main/ntfs-modules-2.6.18-5-amd64-di_1.21etch2_amd64.udeb stable/main/reiserfs-modules-2.6.18-5-amd64-di_1.21etch2_amd64.udeb stable/main/xfs-modules-2.6.18-5-amd64-di_1.21etch2_amd64.udeb stable/main/fat-modules-2.6.18-5-amd64-di_1.21etch2_amd64.udeb stable/main/ufs-modules-2.6.18-5-amd64-di_1.21etch2_amd64.udeb stable/main/qnx4-modules-2.6.18-5-amd64-di_1.21etch2_amd64.udeb stable/main/md-modules-2.6.18-5-amd64-di_1.21etch2_amd64.udeb stable/main/usb-modules-2.6.18-5-amd64-di_1.21etch2_amd64.udeb stable/main/usb-storage-modules-2.6.18-5-amd64-di_1.21etch2_amd64.udeb stable/main/pcmcia-storage-modules-2.6.18-5-amd64-di_1.21etch2_amd64.udeb stable/main/fb-modules-2.6.18-5-amd64-di_1.21etch2_amd64.udeb stable/main/input-modules-2.6.18-5-amd64-di_1.21etch2_amd64.udeb stable/main/mouse-modules-2.6.18-5-amd64-di_1.21etch2_amd64.udeb stable/main/irda-modules-2.6.18-5-amd64-di_1.21etch2_amd64.udeb stable/main/parport-modules-2.6.18-5-amd64-di_1.21etch2_amd64.udeb stable/main/nic-pcmcia-modules-2.6.18-5-amd64-di_1.21etch2_amd64.udeb stable/main/pcmcia-modules-2.6.18-5-amd64-di_1.21etch2_amd64.udeb stable/main/nic-usb-modules-2.6.18-5-amd64-di_1.21etch2_amd64.udeb stable/main/sata-modules-2.6.18-5-amd64-di_1.21etch2_amd64.udeb stable/main/acpi-modules-2.6.18-5-amd64-di_1.21etch2_amd64.udeb stable/main/crc-modules-2.6.18-5-amd64-di_1.21etch2_amd64.udeb stable/main/crypto-modules-2.6.18-5-amd64-di_1.21etch2_amd64.udeb stable/main/core-modules-2.6.18-5-amd64-di_1.21etch2_amd64.udeb linux-kernel-di-amd64-2.6 (1.21etch2) stable; urgency=low * Built against version 2.6.18.dfsg.1-16 of linux-2.6. stable/main/source/linux-kernel-di-arm-2.6_1.10etch2.dsc stable/main/source/linux-kernel-di-arm-2.6_1.10etch2.tar.gz stable/main/kernel-image-2.6.18-5-footbridge-di_1.10etch2_arm.udeb stable/main/nic-modules-2.6.18-5-footbridge-di_1.10etch2_arm.udeb stable/main/nic-shared-modules-2.6.18-5-footbridge-di_1.10etch2_arm.udeb stable/main/ide-modules-2.6.18-5-footbridge-di_1.10etch2_arm.udeb stable/main/cdrom-core-modules-2.6.18-5-footbridge-di_1.10etch2_arm.udeb stable/main/scsi-core-modules-2.6.18-5-footbridge-di_1.10etch2_arm.udeb stable/main/loop-modules-2.6.18-5-footbridge-di_1.10etch2_arm.udeb stable/main/reiserfs-modules-2.6.18-5-footbridge-di_1.10etch2_arm.udeb stable/main/fat-modules-2.6.18-5-footbridge-di_1.10etch2_arm.udeb stable/main/md-modules-2.6.18-5-footbridge-di_1.10etch2_arm.udeb stable/main/usb-modules-2.6.18-5-footbridge-di_1.10etch2_arm.udeb stable/main/usb-storage-modules-2.6.18-5-footbridge-di_1.10etch2_arm.udeb stable/main/crc-modules-2.6.18-5-footbridge-di_1.10etch2_arm.udeb stable/main/kernel-image-2.6.18-5-iop32x-di_1.10etch2_arm.udeb stable/main/nic-modules-2.6.18-5-iop32x-di_1.10etch2_arm.udeb stable/main/ide-modules-2.6.18-5-iop32x-di_1.10etch2_arm.udeb stable/main/ide-core-modules-2.6.18-5-iop32x-di_1.10etch2_arm.udeb stable/main/cdrom-core-modules-2.6.18-5-iop32x-di_1.10etch2_arm.udeb stable/main/scsi-core-modules-2.6.18-5-iop32x-di_1.10etch2_arm.udeb stable/main/loop-modules-2.6.18-5-iop32x-di_1.10etch2_arm.udeb stable/main/ext3-modules-2.6.18-5-iop32x-di_1.10etch2_arm.udeb stable/main/reiserfs-modules-2.6.18-5-iop32x-di_1.10etch2_arm.udeb stable/main/fat-modules-2.6.18-5-iop32x-di_1.10etch2_arm.udeb stable/main/md-modules-2.6.18-5-iop32x-di_1.10etch2_arm.udeb stable/main/usb-modules-2.6.18-5-iop32x-di_1.10etch2_arm.udeb stable/main/usb-storage-modules-2.6.18-5-iop32x-di_1.10etch2_arm.udeb stable/main/nic-usb-modules-2.6.18-5-iop32x-di_1.10etch2_arm.udeb stable/main/sata-modules-2.6.18-5-iop32x-di_1.10etch2_arm.udeb stable/main/crc-modules-2.6.18-5-iop32x-di_1.10etch2_arm.udeb stable/main/kernel-image-2.6.18-5-ixp4xx-di_1.10etch2_arm.udeb stable/main/nic-modules-2.6.18-5-ixp4xx-di_1.10etch2_arm.udeb stable/main/scsi-core-modules-2.6.18-5-ixp4xx-di_1.10etch2_arm.udeb stable/main/loop-modules-2.6.18-5-ixp4xx-di_1.10etch2_arm.udeb stable/main/ext3-modules-2.6.18-5-ixp4xx-di_1.10etch2_arm.udeb stable/main/reiserfs-modules-2.6.18-5-ixp4xx-di_1.10etch2_arm.udeb stable/main/fat-modules-2.6.18-5-ixp4xx-di_1.10etch2_arm.udeb stable/main/md-modules-2.6.18-5-ixp4xx-di_1.10etch2_arm.udeb stable/main/usb-modules-2.6.18-5-ixp4xx-di_1.10etch2_arm.udeb stable/main/usb-storage-modules-2.6.18-5-ixp4xx-di_1.10etch2_arm.udeb stable/main/input-modules-2.6.18-5-ixp4xx-di_1.10etch2_arm.udeb stable/main/nic-usb-modules-2.6.18-5-ixp4xx-di_1.10etch2_arm.udeb stable/main/crc-modules-2.6.18-5-ixp4xx-di_1.10etch2_arm.udeb stable/main/kernel-image-2.6.18-5-rpc-di_1.10etch2_arm.udeb stable/main/scsi-core-modules-2.6.18-5-rpc-di_1.10etch2_arm.udeb stable/main/loop-modules-2.6.18-5-rpc-di_1.10etch2_arm.udeb stable/main/reiserfs-modules-2.6.18-5-rpc-di_1.10etch2_arm.udeb stable/main/fat-modules-2.6.18-5-rpc-di_1.10etch2_arm.udeb linux-kernel-di-arm-2.6 (1.10etch2) stable; urgency=low * Built against version 2.6.18.dfsg.1-16 of linux-2.6. stable/main/source/linux-kernel-di-hppa-2.6_1.17etch2.dsc stable/main/source/linux-kernel-di-hppa-2.6_1.17etch2.tar.gz stable/main/kernel-image-2.6.18-5-parisc-di_1.17etch2_hppa.udeb stable/main/nic-modules-2.6.18-5-parisc-di_1.17etch2_hppa.udeb stable/main/ppp-modules-2.6.18-5-parisc-di_1.17etch2_hppa.udeb stable/main/ide-modules-2.6.18-5-parisc-di_1.17etch2_hppa.udeb stable/main/cdrom-core-modules-2.6.18-5-parisc-di_1.17etch2_hppa.udeb stable/main/scsi-modules-2.6.18-5-parisc-di_1.17etch2_hppa.udeb stable/main/loop-modules-2.6.18-5-parisc-di_1.17etch2_hppa.udeb stable/main/ipv6-modules-2.6.18-5-parisc-di_1.17etch2_hppa.udeb stable/main/ext3-modules-2.6.18-5-parisc-di_1.17etch2_hppa.udeb stable/main/md-modules-2.6.18-5-parisc-di_1.17etch2_hppa.udeb stable/main/usb-modules-2.6.18-5-parisc-di_1.17etch2_hppa.udeb stable/main/usb-storage-modules-2.6.18-5-parisc-di_1.17etch2_hppa.udeb stable/main/input-modules-2.6.18-5-parisc-di_1.17etch2_hppa.udeb stable/main/crypto-modules-2.6.18-5-parisc-di_1.17etch2_hppa.udeb stable/main/kernel-image-2.6.18-5-parisc64-di_1.17etch2_hppa.udeb stable/main/nic-modules-2.6.18-5-parisc64-di_1.17etch2_hppa.udeb stable/main/ppp-modules-2.6.18-5-parisc64-di_1.17etch2_hppa.udeb stable/main/ide-modules-2.6.18-5-parisc64-di_1.17etch2_hppa.udeb stable/main/cdrom-core-modules-2.6.18-5-parisc64-di_1.17etch2_hppa.udeb stable/main/scsi-modules-2.6.18-5-parisc64-di_1.17etch2_hppa.udeb stable/main/loop-modules-2.6.18-5-parisc64-di_1.17etch2_hppa.udeb stable/main/ipv6-modules-2.6.18-5-parisc64-di_1.17etch2_hppa.udeb stable/main/ext3-modules-2.6.18-5-parisc64-di_1.17etch2_hppa.udeb stable/main/md-modules-2.6.18-5-parisc64-di_1.17etch2_hppa.udeb stable/main/usb-modules-2.6.18-5-parisc64-di_1.17etch2_hppa.udeb stable/main/usb-storage-modules-2.6.18-5-parisc64-di_1.17etch2_hppa.udeb stable/main/input-modules-2.6.18-5-parisc64-di_1.17etch2_hppa.udeb stable/main/crypto-modules-2.6.18-5-parisc64-di_1.17etch2_hppa.udeb linux-kernel-di-hppa-2.6 (1.17etch2) stable; urgency=low * Built against version 2.6.18.dfsg.1-16 of linux-2.6. stable/main/source/linux-kernel-di-i386-2.6_1.44etch2.dsc stable/main/source/linux-kernel-di-i386-2.6_1.44etch2.tar.gz stable/main/kernel-image-2.6.18-5-486-di_1.44etch2_i386.udeb stable/main/nic-modules-2.6.18-5-486-di_1.44etch2_i386.udeb stable/main/nic-extra-modules-2.6.18-5-486-di_1.44etch2_i386.udeb stable/main/nic-shared-modules-2.6.18-5-486-di_1.44etch2_i386.udeb stable/main/serial-modules-2.6.18-5-486-di_1.44etch2_i386.udeb stable/main/usb-serial-modules-2.6.18-5-486-di_1.44etch2_i386.udeb stable/main/ppp-modules-2.6.18-5-486-di_1.44etch2_i386.udeb stable/main/ide-modules-2.6.18-5-486-di_1.44etch2_i386.udeb stable/main/ide-core-modules-2.6.18-5-486-di_1.44etch2_i386.udeb stable/main/cdrom-core-modules-2.6.18-5-486-di_1.44etch2_i386.udeb stable/main/cdrom-modules-2.6.18-5-486-di_1.44etch2_i386.udeb stable/main/firewire-core-modules-2.6.18-5-486-di_1.44etch2_i386.udeb stable/main/scsi-core-modules-2.6.18-5-486-di_1.44etch2_i386.udeb stable/main/scsi-modules-2.6.18-5-486-di_1.44etch2_i386.udeb stable/main/scsi-common-modules-2.6.18-5-486-di_1.44etch2_i386.udeb stable/main/scsi-extra-modules-2.6.18-5-486-di_1.44etch2_i386.udeb stable/main/plip-modules-2.6.18-5-486-di_1.44etch2_i386.udeb stable/main/floppy-modules-2.6.18-5-486-di_1.44etch2_i386.udeb stable/main/loop-modules-2.6.18-5-486-di_1.44etch2_i386.udeb stable/main/ipv6-modules-2.6.18-5-486-di_1.44etch2_i386.udeb stable/main/ext3-modules-2.6.18-5-486-di_1.44etch2_i386.udeb stable/main/jfs-modules-2.6.18-5-486-di_1.44etch2_i386.udeb stable/main/ntfs-modules-2.6.18-5-486-di_1.44etch2_i386.udeb stable/main/reiserfs-modules-2.6.18-5-486-di_1.44etch2_i386.udeb stable/main/xfs-modules-2.6.18-5-486-di_1.44etch2_i386.udeb stable/main/fat-modules-2.6.18-5-486-di_1.44etch2_i386.udeb stable/main/ufs-modules-2.6.18-5-486-di_1.44etch2_i386.udeb stable/main/qnx4-modules-2.6.18-5-486-di_1.44etch2_i386.udeb stable/main/md-modules-2.6.18-5-486-di_1.44etch2_i386.udeb stable/main/usb-modules-2.6.18-5-486-di_1.44etch2_i386.udeb stable/main/usb-storage-modules-2.6.18-5-486-di_1.44etch2_i386.udeb stable/main/pcmcia-storage-modules-2.6.18-5-486-di_1.44etch2_i386.udeb stable/main/fb-modules-2.6.18-5-486-di_1.44etch2_i386.udeb stable/main/input-modules-2.6.18-5-486-di_1.44etch2_i386.udeb stable/main/mouse-modules-2.6.18-5-486-di_1.44etch2_i386.udeb stable/main/irda-modules-2.6.18-5-486-di_1.44etch2_i386.udeb stable/main/parport-modules-2.6.18-5-486-di_1.44etch2_i386.udeb stable/main/nic-pcmcia-modules-2.6.18-5-486-di_1.44etch2_i386.udeb stable/main/pcmcia-modules-2.6.18-5-486-di_1.44etch2_i386.udeb stable/main/nic-usb-modules-2.6.18-5-486-di_1.44etch2_i386.udeb stable/main/sata-modules-2.6.18-5-486-di_1.44etch2_i386.udeb stable/main/firmware-modules-2.6.18-5-486-di_1.44etch2_i386.udeb stable/main/acpi-modules-2.6.18-5-486-di_1.44etch2_i386.udeb stable/main/crc-modules-2.6.18-5-486-di_1.44etch2_i386.udeb stable/main/crypto-modules-2.6.18-5-486-di_1.44etch2_i386.udeb stable/main/efi-modules-2.6.18-5-486-di_1.44etch2_i386.udeb linux-kernel-di-i386-2.6 (1.44etch2) stable; urgency=low * Built against version 2.6.18.dfsg.1-16 of linux-2.6. stable/main/source/linux-kernel-di-ia64-2.6_1.18etch2.dsc stable/main/source/linux-kernel-di-ia64-2.6_1.18etch2.tar.gz stable/main/kernel-image-2.6.18-5-itanium-di_1.18etch2_ia64.udeb stable/main/nic-modules-2.6.18-5-itanium-di_1.18etch2_ia64.udeb stable/main/nic-shared-modules-2.6.18-5-itanium-di_1.18etch2_ia64.udeb stable/main/serial-modules-2.6.18-5-itanium-di_1.18etch2_ia64.udeb stable/main/ppp-modules-2.6.18-5-itanium-di_1.18etch2_ia64.udeb stable/main/ide-modules-2.6.18-5-itanium-di_1.18etch2_ia64.udeb stable/main/ide-core-modules-2.6.18-5-itanium-di_1.18etch2_ia64.udeb stable/main/cdrom-core-modules-2.6.18-5-itanium-di_1.18etch2_ia64.udeb stable/main/firewire-core-modules-2.6.18-5-itanium-di_1.18etch2_ia64.udeb stable/main/scsi-core-modules-2.6.18-5-itanium-di_1.18etch2_ia64.udeb stable/main/scsi-modules-2.6.18-5-itanium-di_1.18etch2_ia64.udeb stable/main/scsi-common-modules-2.6.18-5-itanium-di_1.18etch2_ia64.udeb stable/main/plip-modules-2.6.18-5-itanium-di_1.18etch2_ia64.udeb stable/main/loop-modules-2.6.18-5-itanium-di_1.18etch2_ia64.udeb stable/main/ipv6-modules-2.6.18-5-itanium-di_1.18etch2_ia64.udeb stable/main/ext3-modules-2.6.18-5-itanium-di_1.18etch2_ia64.udeb stable/main/jfs-modules-2.6.18-5-itanium-di_1.18etch2_ia64.udeb stable/main/ntfs-modules-2.6.18-5-itanium-di_1.18etch2_ia64.udeb stable/main/reiserfs-modules-2.6.18-5-itanium-di_1.18etch2_ia64.udeb stable/main/xfs-modules-2.6.18-5-itanium-di_1.18etch2_ia64.udeb stable/main/fat-modules-2.6.18-5-itanium-di_1.18etch2_ia64.udeb stable/main/ufs-modules-2.6.18-5-itanium-di_1.18etch2_ia64.udeb stable/main/md-modules-2.6.18-5-itanium-di_1.18etch2_ia64.udeb stable/main/usb-modules-2.6.18-5-itanium-di_1.18etch2_ia64.udeb stable/main/usb-storage-modules-2.6.18-5-itanium-di_1.18etch2_ia64.udeb stable/main/fb-modules-2.6.18-5-itanium-di_1.18etch2_ia64.udeb stable/main/input-modules-2.6.18-5-itanium-di_1.18etch2_ia64.udeb stable/main/mouse-modules-2.6.18-5-itanium-di_1.18etch2_ia64.udeb stable/main/irda-modules-2.6.18-5-itanium-di_1.18etch2_ia64.udeb stable/main/parport-modules-2.6.18-5-itanium-di_1.18etch2_ia64.udeb stable/main/pcmcia-modules-2.6.18-5-itanium-di_1.18etch2_ia64.udeb stable/main/nic-usb-modules-2.6.18-5-itanium-di_1.18etch2_ia64.udeb stable/main/sata-modules-2.6.18-5-itanium-di_1.18etch2_ia64.udeb stable/main/firmware-modules-2.6.18-5-itanium-di_1.18etch2_ia64.udeb stable/main/acpi-modules-2.6.18-5-itanium-di_1.18etch2_ia64.udeb stable/main/crc-modules-2.6.18-5-itanium-di_1.18etch2_ia64.udeb stable/main/crypto-modules-2.6.18-5-itanium-di_1.18etch2_ia64.udeb stable/main/efi-modules-2.6.18-5-itanium-di_1.18etch2_ia64.udeb stable/main/sn-modules-2.6.18-5-itanium-di_1.18etch2_ia64.udeb linux-kernel-di-ia64-2.6 (1.18etch2) stable; urgency=low * Built against version 2.6.18.dfsg.1-16 of linux-2.6. stable/main/source/linux-kernel-di-mips-2.6_0.13etch2.dsc stable/main/source/linux-kernel-di-mips-2.6_0.13etch2.tar.gz stable/main/kernel-image-2.6.18-5-r4k-ip22-di_0.13etch2_mips.udeb stable/main/ppp-modules-2.6.18-5-r4k-ip22-di_0.13etch2_mips.udeb stable/main/loop-modules-2.6.18-5-r4k-ip22-di_0.13etch2_mips.udeb stable/main/ipv6-modules-2.6.18-5-r4k-ip22-di_0.13etch2_mips.udeb stable/main/jfs-modules-2.6.18-5-r4k-ip22-di_0.13etch2_mips.udeb stable/main/reiserfs-modules-2.6.18-5-r4k-ip22-di_0.13etch2_mips.udeb stable/main/xfs-modules-2.6.18-5-r4k-ip22-di_0.13etch2_mips.udeb stable/main/md-modules-2.6.18-5-r4k-ip22-di_0.13etch2_mips.udeb stable/main/crypto-modules-2.6.18-5-r4k-ip22-di_0.13etch2_mips.udeb stable/main/kernel-image-2.6.18-5-r5k-ip32-di_0.13etch2_mips.udeb stable/main/ppp-modules-2.6.18-5-r5k-ip32-di_0.13etch2_mips.udeb stable/main/loop-modules-2.6.18-5-r5k-ip32-di_0.13etch2_mips.udeb stable/main/ipv6-modules-2.6.18-5-r5k-ip32-di_0.13etch2_mips.udeb stable/main/jfs-modules-2.6.18-5-r5k-ip32-di_0.13etch2_mips.udeb stable/main/reiserfs-modules-2.6.18-5-r5k-ip32-di_0.13etch2_mips.udeb stable/main/xfs-modules-2.6.18-5-r5k-ip32-di_0.13etch2_mips.udeb stable/main/md-modules-2.6.18-5-r5k-ip32-di_0.13etch2_mips.udeb stable/main/crypto-modules-2.6.18-5-r5k-ip32-di_0.13etch2_mips.udeb stable/main/kernel-image-2.6.18-5-sb1-bcm91250a-di_0.13etch2_mips.udeb stable/main/ppp-modules-2.6.18-5-sb1-bcm91250a-di_0.13etch2_mips.udeb stable/main/ide-modules-2.6.18-5-sb1-bcm91250a-di_0.13etch2_mips.udeb stable/main/cdrom-core-modules-2.6.18-5-sb1-bcm91250a-di_0.13etch2_mips.udeb stable/main/scsi-core-modules-2.6.18-5-sb1-bcm91250a-di_0.13etch2_mips.udeb stable/main/scsi-modules-2.6.18-5-sb1-bcm91250a-di_0.13etch2_mips.udeb stable/main/scsi-common-modules-2.6.18-5-sb1-bcm91250a-di_0.13etch2_mips.udeb stable/main/loop-modules-2.6.18-5-sb1-bcm91250a-di_0.13etch2_mips.udeb stable/main/ipv6-modules-2.6.18-5-sb1-bcm91250a-di_0.13etch2_mips.udeb stable/main/jfs-modules-2.6.18-5-sb1-bcm91250a-di_0.13etch2_mips.udeb stable/main/reiserfs-modules-2.6.18-5-sb1-bcm91250a-di_0.13etch2_mips.udeb stable/main/xfs-modules-2.6.18-5-sb1-bcm91250a-di_0.13etch2_mips.udeb stable/main/fat-modules-2.6.18-5-sb1-bcm91250a-di_0.13etch2_mips.udeb stable/main/md-modules-2.6.18-5-sb1-bcm91250a-di_0.13etch2_mips.udeb stable/main/usb-modules-2.6.18-5-sb1-bcm91250a-di_0.13etch2_mips.udeb stable/main/usb-storage-modules-2.6.18-5-sb1-bcm91250a-di_0.13etch2_mips.udeb stable/main/fb-modules-2.6.18-5-sb1-bcm91250a-di_0.13etch2_mips.udeb stable/main/input-modules-2.6.18-5-sb1-bcm91250a-di_0.13etch2_mips.udeb stable/main/sata-modules-2.6.18-5-sb1-bcm91250a-di_0.13etch2_mips.udeb stable/main/crypto-modules-2.6.18-5-sb1-bcm91250a-di_0.13etch2_mips.udeb stable/main/kernel-image-2.6.18-5-sb1a-bcm91480b-di_0.13etch2_mips.udeb stable/main/ppp-modules-2.6.18-5-sb1a-bcm91480b-di_0.13etch2_mips.udeb stable/main/ide-modules-2.6.18-5-sb1a-bcm91480b-di_0.13etch2_mips.udeb stable/main/cdrom-core-modules-2.6.18-5-sb1a-bcm91480b-di_0.13etch2_mips.udeb stable/main/scsi-core-modules-2.6.18-5-sb1a-bcm91480b-di_0.13etch2_mips.udeb stable/main/scsi-modules-2.6.18-5-sb1a-bcm91480b-di_0.13etch2_mips.udeb stable/main/scsi-common-modules-2.6.18-5-sb1a-bcm91480b-di_0.13etch2_mips.udeb stable/main/loop-modules-2.6.18-5-sb1a-bcm91480b-di_0.13etch2_mips.udeb stable/main/ipv6-modules-2.6.18-5-sb1a-bcm91480b-di_0.13etch2_mips.udeb stable/main/jfs-modules-2.6.18-5-sb1a-bcm91480b-di_0.13etch2_mips.udeb stable/main/reiserfs-modules-2.6.18-5-sb1a-bcm91480b-di_0.13etch2_mips.udeb stable/main/xfs-modules-2.6.18-5-sb1a-bcm91480b-di_0.13etch2_mips.udeb stable/main/fat-modules-2.6.18-5-sb1a-bcm91480b-di_0.13etch2_mips.udeb stable/main/md-modules-2.6.18-5-sb1a-bcm91480b-di_0.13etch2_mips.udeb stable/main/usb-modules-2.6.18-5-sb1a-bcm91480b-di_0.13etch2_mips.udeb stable/main/usb-storage-modules-2.6.18-5-sb1a-bcm91480b-di_0.13etch2_mips.udeb stable/main/fb-modules-2.6.18-5-sb1a-bcm91480b-di_0.13etch2_mips.udeb stable/main/input-modules-2.6.18-5-sb1a-bcm91480b-di_0.13etch2_mips.udeb stable/main/sata-modules-2.6.18-5-sb1a-bcm91480b-di_0.13etch2_mips.udeb stable/main/crypto-modules-2.6.18-5-sb1a-bcm91480b-di_0.13etch2_mips.udeb stable/main/kernel-image-2.6.18-5-qemu-di_0.13etch2_mips.udeb stable/main/loop-modules-2.6.18-5-qemu-di_0.13etch2_mips.udeb stable/main/jfs-modules-2.6.18-5-qemu-di_0.13etch2_mips.udeb stable/main/reiserfs-modules-2.6.18-5-qemu-di_0.13etch2_mips.udeb stable/main/xfs-modules-2.6.18-5-qemu-di_0.13etch2_mips.udeb stable/main/fat-modules-2.6.18-5-qemu-di_0.13etch2_mips.udeb stable/main/md-modules-2.6.18-5-qemu-di_0.13etch2_mips.udeb linux-kernel-di-mips-2.6 (0.13etch2) stable; urgency=low * Built against version 2.6.18.dfsg.1-16 of linux-2.6. stable/main/source/linux-kernel-di-mipsel-2.6_0.13etch2.dsc stable/main/source/linux-kernel-di-mipsel-2.6_0.13etch2.tar.gz stable/main/kernel-image-2.6.18-5-r3k-kn02-di_0.13etch2_mipsel.udeb stable/main/ipv6-modules-2.6.18-5-r3k-kn02-di_0.13etch2_mipsel.udeb stable/main/reiserfs-modules-2.6.18-5-r3k-kn02-di_0.13etch2_mipsel.udeb stable/main/crypto-modules-2.6.18-5-r3k-kn02-di_0.13etch2_mipsel.udeb stable/main/kernel-image-2.6.18-5-r4k-kn04-di_0.13etch2_mipsel.udeb stable/main/ipv6-modules-2.6.18-5-r4k-kn04-di_0.13etch2_mipsel.udeb stable/main/reiserfs-modules-2.6.18-5-r4k-kn04-di_0.13etch2_mipsel.udeb stable/main/crypto-modules-2.6.18-5-r4k-kn04-di_0.13etch2_mipsel.udeb stable/main/kernel-image-2.6.18-5-sb1-bcm91250a-di_0.13etch2_mipsel.udeb stable/main/ppp-modules-2.6.18-5-sb1-bcm91250a-di_0.13etch2_mipsel.udeb stable/main/ide-modules-2.6.18-5-sb1-bcm91250a-di_0.13etch2_mipsel.udeb stable/main/cdrom-core-modules-2.6.18-5-sb1-bcm91250a-di_0.13etch2_mipsel.udeb stable/main/scsi-core-modules-2.6.18-5-sb1-bcm91250a-di_0.13etch2_mipsel.udeb stable/main/scsi-modules-2.6.18-5-sb1-bcm91250a-di_0.13etch2_mipsel.udeb stable/main/scsi-common-modules-2.6.18-5-sb1-bcm91250a-di_0.13etch2_mipsel.udeb stable/main/loop-modules-2.6.18-5-sb1-bcm91250a-di_0.13etch2_mipsel.udeb stable/main/ipv6-modules-2.6.18-5-sb1-bcm91250a-di_0.13etch2_mipsel.udeb stable/main/jfs-modules-2.6.18-5-sb1-bcm91250a-di_0.13etch2_mipsel.udeb stable/main/reiserfs-modules-2.6.18-5-sb1-bcm91250a-di_0.13etch2_mipsel.udeb stable/main/xfs-modules-2.6.18-5-sb1-bcm91250a-di_0.13etch2_mipsel.udeb stable/main/fat-modules-2.6.18-5-sb1-bcm91250a-di_0.13etch2_mipsel.udeb stable/main/md-modules-2.6.18-5-sb1-bcm91250a-di_0.13etch2_mipsel.udeb stable/main/usb-modules-2.6.18-5-sb1-bcm91250a-di_0.13etch2_mipsel.udeb stable/main/usb-storage-modules-2.6.18-5-sb1-bcm91250a-di_0.13etch2_mipsel.udeb stable/main/fb-modules-2.6.18-5-sb1-bcm91250a-di_0.13etch2_mipsel.udeb stable/main/input-modules-2.6.18-5-sb1-bcm91250a-di_0.13etch2_mipsel.udeb stable/main/sata-modules-2.6.18-5-sb1-bcm91250a-di_0.13etch2_mipsel.udeb stable/main/crypto-modules-2.6.18-5-sb1-bcm91250a-di_0.13etch2_mipsel.udeb stable/main/kernel-image-2.6.18-5-sb1a-bcm91480b-di_0.13etch2_mipsel.udeb stable/main/ppp-modules-2.6.18-5-sb1a-bcm91480b-di_0.13etch2_mipsel.udeb stable/main/ide-modules-2.6.18-5-sb1a-bcm91480b-di_0.13etch2_mipsel.udeb stable/main/cdrom-core-modules-2.6.18-5-sb1a-bcm91480b-di_0.13etch2_mipsel.udeb stable/main/scsi-core-modules-2.6.18-5-sb1a-bcm91480b-di_0.13etch2_mipsel.udeb stable/main/scsi-modules-2.6.18-5-sb1a-bcm91480b-di_0.13etch2_mipsel.udeb stable/main/scsi-common-modules-2.6.18-5-sb1a-bcm91480b-di_0.13etch2_mipsel.udeb stable/main/loop-modules-2.6.18-5-sb1a-bcm91480b-di_0.13etch2_mipsel.udeb stable/main/ipv6-modules-2.6.18-5-sb1a-bcm91480b-di_0.13etch2_mipsel.udeb stable/main/jfs-modules-2.6.18-5-sb1a-bcm91480b-di_0.13etch2_mipsel.udeb stable/main/reiserfs-modules-2.6.18-5-sb1a-bcm91480b-di_0.13etch2_mipsel.udeb stable/main/xfs-modules-2.6.18-5-sb1a-bcm91480b-di_0.13etch2_mipsel.udeb stable/main/fat-modules-2.6.18-5-sb1a-bcm91480b-di_0.13etch2_mipsel.udeb stable/main/md-modules-2.6.18-5-sb1a-bcm91480b-di_0.13etch2_mipsel.udeb stable/main/usb-modules-2.6.18-5-sb1a-bcm91480b-di_0.13etch2_mipsel.udeb stable/main/usb-storage-modules-2.6.18-5-sb1a-bcm91480b-di_0.13etch2_mipsel.udeb stable/main/fb-modules-2.6.18-5-sb1a-bcm91480b-di_0.13etch2_mipsel.udeb stable/main/input-modules-2.6.18-5-sb1a-bcm91480b-di_0.13etch2_mipsel.udeb stable/main/sata-modules-2.6.18-5-sb1a-bcm91480b-di_0.13etch2_mipsel.udeb stable/main/crypto-modules-2.6.18-5-sb1a-bcm91480b-di_0.13etch2_mipsel.udeb stable/main/kernel-image-2.6.18-5-r5k-cobalt-di_0.13etch2_mipsel.udeb stable/main/ppp-modules-2.6.18-5-r5k-cobalt-di_0.13etch2_mipsel.udeb stable/main/cdrom-core-modules-2.6.18-5-r5k-cobalt-di_0.13etch2_mipsel.udeb stable/main/loop-modules-2.6.18-5-r5k-cobalt-di_0.13etch2_mipsel.udeb stable/main/ipv6-modules-2.6.18-5-r5k-cobalt-di_0.13etch2_mipsel.udeb stable/main/jfs-modules-2.6.18-5-r5k-cobalt-di_0.13etch2_mipsel.udeb stable/main/reiserfs-modules-2.6.18-5-r5k-cobalt-di_0.13etch2_mipsel.udeb stable/main/xfs-modules-2.6.18-5-r5k-cobalt-di_0.13etch2_mipsel.udeb stable/main/fat-modules-2.6.18-5-r5k-cobalt-di_0.13etch2_mipsel.udeb stable/main/nfs-modules-2.6.18-5-r5k-cobalt-di_0.13etch2_mipsel.udeb stable/main/md-modules-2.6.18-5-r5k-cobalt-di_0.13etch2_mipsel.udeb stable/main/crypto-modules-2.6.18-5-r5k-cobalt-di_0.13etch2_mipsel.udeb stable/main/kernel-image-2.6.18-5-qemu-di_0.13etch2_mipsel.udeb stable/main/loop-modules-2.6.18-5-qemu-di_0.13etch2_mipsel.udeb stable/main/jfs-modules-2.6.18-5-qemu-di_0.13etch2_mipsel.udeb stable/main/reiserfs-modules-2.6.18-5-qemu-di_0.13etch2_mipsel.udeb stable/main/xfs-modules-2.6.18-5-qemu-di_0.13etch2_mipsel.udeb stable/main/fat-modules-2.6.18-5-qemu-di_0.13etch2_mipsel.udeb stable/main/md-modules-2.6.18-5-qemu-di_0.13etch2_mipsel.udeb linux-kernel-di-mipsel-2.6 (0.13etch2) stable; urgency=low * Built against version 2.6.18.dfsg.1-16 of linux-2.6. stable/main/source/linux-kernel-di-powerpc-2.6_1.29etch2.dsc stable/main/source/linux-kernel-di-powerpc-2.6_1.29etch2.tar.gz stable/main/kernel-image-2.6.18-5-powerpc-di_1.29etch2_powerpc.udeb stable/main/nic-modules-2.6.18-5-powerpc-di_1.29etch2_powerpc.udeb stable/main/nic-extra-modules-2.6.18-5-powerpc-di_1.29etch2_powerpc.udeb stable/main/nic-shared-modules-2.6.18-5-powerpc-di_1.29etch2_powerpc.udeb stable/main/serial-modules-2.6.18-5-powerpc-di_1.29etch2_powerpc.udeb stable/main/usb-serial-modules-2.6.18-5-powerpc-di_1.29etch2_powerpc.udeb stable/main/ppp-modules-2.6.18-5-powerpc-di_1.29etch2_powerpc.udeb stable/main/ide-modules-2.6.18-5-powerpc-di_1.29etch2_powerpc.udeb stable/main/cdrom-core-modules-2.6.18-5-powerpc-di_1.29etch2_powerpc.udeb stable/main/firewire-core-modules-2.6.18-5-powerpc-di_1.29etch2_powerpc.udeb stable/main/scsi-core-modules-2.6.18-5-powerpc-di_1.29etch2_powerpc.udeb stable/main/scsi-modules-2.6.18-5-powerpc-di_1.29etch2_powerpc.udeb stable/main/scsi-common-modules-2.6.18-5-powerpc-di_1.29etch2_powerpc.udeb stable/main/scsi-extra-modules-2.6.18-5-powerpc-di_1.29etch2_powerpc.udeb stable/main/floppy-modules-2.6.18-5-powerpc-di_1.29etch2_powerpc.udeb stable/main/loop-modules-2.6.18-5-powerpc-di_1.29etch2_powerpc.udeb stable/main/ipv6-modules-2.6.18-5-powerpc-di_1.29etch2_powerpc.udeb stable/main/ext2-modules-2.6.18-5-powerpc-di_1.29etch2_powerpc.udeb stable/main/ext3-modules-2.6.18-5-powerpc-di_1.29etch2_powerpc.udeb stable/main/jfs-modules-2.6.18-5-powerpc-di_1.29etch2_powerpc.udeb stable/main/reiserfs-modules-2.6.18-5-powerpc-di_1.29etch2_powerpc.udeb stable/main/xfs-modules-2.6.18-5-powerpc-di_1.29etch2_powerpc.udeb stable/main/fat-modules-2.6.18-5-powerpc-di_1.29etch2_powerpc.udeb stable/main/hfs-modules-2.6.18-5-powerpc-di_1.29etch2_powerpc.udeb stable/main/affs-modules-2.6.18-5-powerpc-di_1.29etch2_powerpc.udeb stable/main/ufs-modules-2.6.18-5-powerpc-di_1.29etch2_powerpc.udeb stable/main/md-modules-2.6.18-5-powerpc-di_1.29etch2_powerpc.udeb stable/main/usb-modules-2.6.18-5-powerpc-di_1.29etch2_powerpc.udeb stable/main/usb-storage-modules-2.6.18-5-powerpc-di_1.29etch2_powerpc.udeb stable/main/pcmcia-storage-modules-2.6.18-5-powerpc-di_1.29etch2_powerpc.udeb stable/main/input-modules-2.6.18-5-powerpc-di_1.29etch2_powerpc.udeb stable/main/mouse-modules-2.6.18-5-powerpc-di_1.29etch2_powerpc.udeb stable/main/irda-modules-2.6.18-5-powerpc-di_1.29etch2_powerpc.udeb stable/main/nic-pcmcia-modules-2.6.18-5-powerpc-di_1.29etch2_powerpc.udeb stable/main/pcmcia-modules-2.6.18-5-powerpc-di_1.29etch2_powerpc.udeb stable/main/sata-modules-2.6.18-5-powerpc-di_1.29etch2_powerpc.udeb stable/main/firmware-modules-2.6.18-5-powerpc-di_1.29etch2_powerpc.udeb stable/main/crypto-modules-2.6.18-5-powerpc-di_1.29etch2_powerpc.udeb stable/main/fs-common-modules-2.6.18-5-powerpc-di_1.29etch2_powerpc.udeb stable/main/kernel-image-2.6.18-5-powerpc64-di_1.29etch2_powerpc.udeb stable/main/nic-modules-2.6.18-5-powerpc64-di_1.29etch2_powerpc.udeb stable/main/nic-extra-modules-2.6.18-5-powerpc64-di_1.29etch2_powerpc.udeb stable/main/nic-shared-modules-2.6.18-5-powerpc64-di_1.29etch2_powerpc.udeb stable/main/serial-modules-2.6.18-5-powerpc64-di_1.29etch2_powerpc.udeb stable/main/usb-serial-modules-2.6.18-5-powerpc64-di_1.29etch2_powerpc.udeb stable/main/ppp-modules-2.6.18-5-powerpc64-di_1.29etch2_powerpc.udeb stable/main/ide-modules-2.6.18-5-powerpc64-di_1.29etch2_powerpc.udeb stable/main/cdrom-core-modules-2.6.18-5-powerpc64-di_1.29etch2_powerpc.udeb stable/main/firewire-core-modules-2.6.18-5-powerpc64-di_1.29etch2_powerpc.udeb stable/main/scsi-core-modules-2.6.18-5-powerpc64-di_1.29etch2_powerpc.udeb stable/main/scsi-modules-2.6.18-5-powerpc64-di_1.29etch2_powerpc.udeb stable/main/scsi-common-modules-2.6.18-5-powerpc64-di_1.29etch2_powerpc.udeb stable/main/scsi-extra-modules-2.6.18-5-powerpc64-di_1.29etch2_powerpc.udeb stable/main/floppy-modules-2.6.18-5-powerpc64-di_1.29etch2_powerpc.udeb stable/main/loop-modules-2.6.18-5-powerpc64-di_1.29etch2_powerpc.udeb stable/main/ipv6-modules-2.6.18-5-powerpc64-di_1.29etch2_powerpc.udeb stable/main/ext2-modules-2.6.18-5-powerpc64-di_1.29etch2_powerpc.udeb stable/main/ext3-modules-2.6.18-5-powerpc64-di_1.29etch2_powerpc.udeb stable/main/jfs-modules-2.6.18-5-powerpc64-di_1.29etch2_powerpc.udeb stable/main/reiserfs-modules-2.6.18-5-powerpc64-di_1.29etch2_powerpc.udeb stable/main/xfs-modules-2.6.18-5-powerpc64-di_1.29etch2_powerpc.udeb stable/main/fat-modules-2.6.18-5-powerpc64-di_1.29etch2_powerpc.udeb stable/main/hfs-modules-2.6.18-5-powerpc64-di_1.29etch2_powerpc.udeb stable/main/affs-modules-2.6.18-5-powerpc64-di_1.29etch2_powerpc.udeb stable/main/ufs-modules-2.6.18-5-powerpc64-di_1.29etch2_powerpc.udeb stable/main/md-modules-2.6.18-5-powerpc64-di_1.29etch2_powerpc.udeb stable/main/usb-modules-2.6.18-5-powerpc64-di_1.29etch2_powerpc.udeb stable/main/usb-storage-modules-2.6.18-5-powerpc64-di_1.29etch2_powerpc.udeb stable/main/pcmcia-storage-modules-2.6.18-5-powerpc64-di_1.29etch2_powerpc.udeb stable/main/input-modules-2.6.18-5-powerpc64-di_1.29etch2_powerpc.udeb stable/main/mouse-modules-2.6.18-5-powerpc64-di_1.29etch2_powerpc.udeb stable/main/irda-modules-2.6.18-5-powerpc64-di_1.29etch2_powerpc.udeb stable/main/nic-pcmcia-modules-2.6.18-5-powerpc64-di_1.29etch2_powerpc.udeb stable/main/pcmcia-modules-2.6.18-5-powerpc64-di_1.29etch2_powerpc.udeb stable/main/sata-modules-2.6.18-5-powerpc64-di_1.29etch2_powerpc.udeb stable/main/firmware-modules-2.6.18-5-powerpc64-di_1.29etch2_powerpc.udeb stable/main/crypto-modules-2.6.18-5-powerpc64-di_1.29etch2_powerpc.udeb stable/main/fs-common-modules-2.6.18-5-powerpc64-di_1.29etch2_powerpc.udeb stable/main/hypervisor-modules-2.6.18-5-powerpc64-di_1.29etch2_powerpc.udeb stable/main/fancontrol-modules-2.6.18-5-powerpc64-di_1.29etch2_powerpc.udeb stable/main/kernel-image-2.6.18-5-powerpc-miboot-di_1.29etch2_powerpc.udeb stable/main/nic-modules-2.6.18-5-powerpc-miboot-di_1.29etch2_powerpc.udeb stable/main/nic-extra-modules-2.6.18-5-powerpc-miboot-di_1.29etch2_powerpc.udeb stable/main/nic-shared-modules-2.6.18-5-powerpc-miboot-di_1.29etch2_powerpc.udeb stable/main/serial-modules-2.6.18-5-powerpc-miboot-di_1.29etch2_powerpc.udeb stable/main/usb-serial-modules-2.6.18-5-powerpc-miboot-di_1.29etch2_powerpc.udeb stable/main/ppp-modules-2.6.18-5-powerpc-miboot-di_1.29etch2_powerpc.udeb stable/main/ide-modules-2.6.18-5-powerpc-miboot-di_1.29etch2_powerpc.udeb stable/main/cdrom-core-modules-2.6.18-5-powerpc-miboot-di_1.29etch2_powerpc.udeb stable/main/firewire-core-modules-2.6.18-5-powerpc-miboot-di_1.29etch2_powerpc.udeb stable/main/scsi-core-modules-2.6.18-5-powerpc-miboot-di_1.29etch2_powerpc.udeb stable/main/scsi-modules-2.6.18-5-powerpc-miboot-di_1.29etch2_powerpc.udeb stable/main/scsi-common-modules-2.6.18-5-powerpc-miboot-di_1.29etch2_powerpc.udeb stable/main/scsi-extra-modules-2.6.18-5-powerpc-miboot-di_1.29etch2_powerpc.udeb stable/main/floppy-modules-2.6.18-5-powerpc-miboot-di_1.29etch2_powerpc.udeb stable/main/loop-modules-2.6.18-5-powerpc-miboot-di_1.29etch2_powerpc.udeb stable/main/ipv6-modules-2.6.18-5-powerpc-miboot-di_1.29etch2_powerpc.udeb stable/main/ext2-modules-2.6.18-5-powerpc-miboot-di_1.29etch2_powerpc.udeb stable/main/ext3-modules-2.6.18-5-powerpc-miboot-di_1.29etch2_powerpc.udeb stable/main/jfs-modules-2.6.18-5-powerpc-miboot-di_1.29etch2_powerpc.udeb stable/main/reiserfs-modules-2.6.18-5-powerpc-miboot-di_1.29etch2_powerpc.udeb stable/main/xfs-modules-2.6.18-5-powerpc-miboot-di_1.29etch2_powerpc.udeb stable/main/fat-modules-2.6.18-5-powerpc-miboot-di_1.29etch2_powerpc.udeb stable/main/hfs-modules-2.6.18-5-powerpc-miboot-di_1.29etch2_powerpc.udeb stable/main/affs-modules-2.6.18-5-powerpc-miboot-di_1.29etch2_powerpc.udeb stable/main/ufs-modules-2.6.18-5-powerpc-miboot-di_1.29etch2_powerpc.udeb stable/main/md-modules-2.6.18-5-powerpc-miboot-di_1.29etch2_powerpc.udeb stable/main/usb-modules-2.6.18-5-powerpc-miboot-di_1.29etch2_powerpc.udeb stable/main/usb-storage-modules-2.6.18-5-powerpc-miboot-di_1.29etch2_powerpc.udeb stable/main/pcmcia-storage-modules-2.6.18-5-powerpc-miboot-di_1.29etch2_powerpc.udeb stable/main/input-modules-2.6.18-5-powerpc-miboot-di_1.29etch2_powerpc.udeb stable/main/mouse-modules-2.6.18-5-powerpc-miboot-di_1.29etch2_powerpc.udeb stable/main/irda-modules-2.6.18-5-powerpc-miboot-di_1.29etch2_powerpc.udeb stable/main/nic-pcmcia-modules-2.6.18-5-powerpc-miboot-di_1.29etch2_powerpc.udeb stable/main/pcmcia-modules-2.6.18-5-powerpc-miboot-di_1.29etch2_powerpc.udeb stable/main/sata-modules-2.6.18-5-powerpc-miboot-di_1.29etch2_powerpc.udeb stable/main/firmware-modules-2.6.18-5-powerpc-miboot-di_1.29etch2_powerpc.udeb stable/main/crypto-modules-2.6.18-5-powerpc-miboot-di_1.29etch2_powerpc.udeb stable/main/fs-common-modules-2.6.18-5-powerpc-miboot-di_1.29etch2_powerpc.udeb stable/main/kernel-image-2.6.18-5-prep-di_1.29etch2_powerpc.udeb stable/main/nic-modules-2.6.18-5-prep-di_1.29etch2_powerpc.udeb stable/main/nic-extra-modules-2.6.18-5-prep-di_1.29etch2_powerpc.udeb stable/main/nic-shared-modules-2.6.18-5-prep-di_1.29etch2_powerpc.udeb stable/main/serial-modules-2.6.18-5-prep-di_1.29etch2_powerpc.udeb stable/main/usb-serial-modules-2.6.18-5-prep-di_1.29etch2_powerpc.udeb stable/main/ppp-modules-2.6.18-5-prep-di_1.29etch2_powerpc.udeb stable/main/ide-modules-2.6.18-5-prep-di_1.29etch2_powerpc.udeb stable/main/cdrom-core-modules-2.6.18-5-prep-di_1.29etch2_powerpc.udeb stable/main/firewire-core-modules-2.6.18-5-prep-di_1.29etch2_powerpc.udeb stable/main/scsi-core-modules-2.6.18-5-prep-di_1.29etch2_powerpc.udeb stable/main/scsi-modules-2.6.18-5-prep-di_1.29etch2_powerpc.udeb stable/main/scsi-common-modules-2.6.18-5-prep-di_1.29etch2_powerpc.udeb stable/main/scsi-extra-modules-2.6.18-5-prep-di_1.29etch2_powerpc.udeb stable/main/floppy-modules-2.6.18-5-prep-di_1.29etch2_powerpc.udeb stable/main/loop-modules-2.6.18-5-prep-di_1.29etch2_powerpc.udeb stable/main/ipv6-modules-2.6.18-5-prep-di_1.29etch2_powerpc.udeb stable/main/ext2-modules-2.6.18-5-prep-di_1.29etch2_powerpc.udeb stable/main/ext3-modules-2.6.18-5-prep-di_1.29etch2_powerpc.udeb stable/main/jfs-modules-2.6.18-5-prep-di_1.29etch2_powerpc.udeb stable/main/reiserfs-modules-2.6.18-5-prep-di_1.29etch2_powerpc.udeb stable/main/xfs-modules-2.6.18-5-prep-di_1.29etch2_powerpc.udeb stable/main/fat-modules-2.6.18-5-prep-di_1.29etch2_powerpc.udeb stable/main/hfs-modules-2.6.18-5-prep-di_1.29etch2_powerpc.udeb stable/main/affs-modules-2.6.18-5-prep-di_1.29etch2_powerpc.udeb stable/main/ufs-modules-2.6.18-5-prep-di_1.29etch2_powerpc.udeb stable/main/md-modules-2.6.18-5-prep-di_1.29etch2_powerpc.udeb stable/main/usb-modules-2.6.18-5-prep-di_1.29etch2_powerpc.udeb stable/main/usb-storage-modules-2.6.18-5-prep-di_1.29etch2_powerpc.udeb stable/main/pcmcia-storage-modules-2.6.18-5-prep-di_1.29etch2_powerpc.udeb stable/main/input-modules-2.6.18-5-prep-di_1.29etch2_powerpc.udeb stable/main/mouse-modules-2.6.18-5-prep-di_1.29etch2_powerpc.udeb stable/main/irda-modules-2.6.18-5-prep-di_1.29etch2_powerpc.udeb stable/main/nic-pcmcia-modules-2.6.18-5-prep-di_1.29etch2_powerpc.udeb stable/main/pcmcia-modules-2.6.18-5-prep-di_1.29etch2_powerpc.udeb stable/main/sata-modules-2.6.18-5-prep-di_1.29etch2_powerpc.udeb stable/main/firmware-modules-2.6.18-5-prep-di_1.29etch2_powerpc.udeb stable/main/crypto-modules-2.6.18-5-prep-di_1.29etch2_powerpc.udeb stable/main/fs-common-modules-2.6.18-5-prep-di_1.29etch2_powerpc.udeb linux-kernel-di-powerpc-2.6 (1.29etch2) stable; urgency=low * Built against version 2.6.18.dfsg.1-16 of linux-2.6. stable/main/source/linux-kernel-di-s390-2.6_0.13etch2.dsc stable/main/source/linux-kernel-di-s390-2.6_0.13etch2.tar.gz stable/main/kernel-image-2.6.18-5-s390-di_0.13etch2_s390.udeb stable/main/nic-modules-2.6.18-5-s390-di_0.13etch2_s390.udeb stable/main/scsi-core-modules-2.6.18-5-s390-di_0.13etch2_s390.udeb stable/main/scsi-modules-2.6.18-5-s390-di_0.13etch2_s390.udeb stable/main/xfs-modules-2.6.18-5-s390-di_0.13etch2_s390.udeb stable/main/fat-modules-2.6.18-5-s390-di_0.13etch2_s390.udeb stable/main/md-modules-2.6.18-5-s390-di_0.13etch2_s390.udeb stable/main/crypto-modules-2.6.18-5-s390-di_0.13etch2_s390.udeb stable/main/dasd-modules-2.6.18-5-s390-di_0.13etch2_s390.udeb stable/main/kernel-image-2.6.18-5-s390-tape-di_0.13etch2_s390.udeb linux-kernel-di-s390-2.6 (0.13etch2) stable; urgency=low * Built against version 2.6.18.dfsg.1-16 of linux-2.6. stable/main/source/linux-kernel-di-sparc-2.6_1.20etch2.dsc stable/main/source/linux-kernel-di-sparc-2.6_1.20etch2.tar.gz stable/main/kernel-image-2.6.18-5-sparc64-di_1.20etch2_sparc.udeb stable/main/nic-modules-2.6.18-5-sparc64-di_1.20etch2_sparc.udeb stable/main/ppp-modules-2.6.18-5-sparc64-di_1.20etch2_sparc.udeb stable/main/ide-modules-2.6.18-5-sparc64-di_1.20etch2_sparc.udeb stable/main/cdrom-core-modules-2.6.18-5-sparc64-di_1.20etch2_sparc.udeb stable/main/scsi-core-modules-2.6.18-5-sparc64-di_1.20etch2_sparc.udeb stable/main/scsi-common-modules-2.6.18-5-sparc64-di_1.20etch2_sparc.udeb stable/main/scsi-extra-modules-2.6.18-5-sparc64-di_1.20etch2_sparc.udeb stable/main/plip-modules-2.6.18-5-sparc64-di_1.20etch2_sparc.udeb stable/main/ipv6-modules-2.6.18-5-sparc64-di_1.20etch2_sparc.udeb stable/main/ext3-modules-2.6.18-5-sparc64-di_1.20etch2_sparc.udeb stable/main/jfs-modules-2.6.18-5-sparc64-di_1.20etch2_sparc.udeb stable/main/reiserfs-modules-2.6.18-5-sparc64-di_1.20etch2_sparc.udeb stable/main/xfs-modules-2.6.18-5-sparc64-di_1.20etch2_sparc.udeb stable/main/fat-modules-2.6.18-5-sparc64-di_1.20etch2_sparc.udeb stable/main/md-modules-2.6.18-5-sparc64-di_1.20etch2_sparc.udeb stable/main/usb-modules-2.6.18-5-sparc64-di_1.20etch2_sparc.udeb stable/main/sata-modules-2.6.18-5-sparc64-di_1.20etch2_sparc.udeb stable/main/crypto-modules-2.6.18-5-sparc64-di_1.20etch2_sparc.udeb stable/main/kernel-image-2.6.18-5-sparc32-di_1.20etch2_sparc.udeb stable/main/nic-modules-2.6.18-5-sparc32-di_1.20etch2_sparc.udeb stable/main/ppp-modules-2.6.18-5-sparc32-di_1.20etch2_sparc.udeb stable/main/cdrom-core-modules-2.6.18-5-sparc32-di_1.20etch2_sparc.udeb stable/main/scsi-core-modules-2.6.18-5-sparc32-di_1.20etch2_sparc.udeb stable/main/scsi-common-modules-2.6.18-5-sparc32-di_1.20etch2_sparc.udeb stable/main/plip-modules-2.6.18-5-sparc32-di_1.20etch2_sparc.udeb stable/main/ipv6-modules-2.6.18-5-sparc32-di_1.20etch2_sparc.udeb stable/main/ext3-modules-2.6.18-5-sparc32-di_1.20etch2_sparc.udeb stable/main/reiserfs-modules-2.6.18-5-sparc32-di_1.20etch2_sparc.udeb stable/main/xfs-modules-2.6.18-5-sparc32-di_1.20etch2_sparc.udeb stable/main/fat-modules-2.6.18-5-sparc32-di_1.20etch2_sparc.udeb stable/main/md-modules-2.6.18-5-sparc32-di_1.20etch2_sparc.udeb stable/main/crypto-modules-2.6.18-5-sparc32-di_1.20etch2_sparc.udeb linux-kernel-di-sparc-2.6 (1.20etch2) stable; urgency=low * Built against version 2.6.18.dfsg.1-16 of linux-2.6. stable/main/binary-alpha/linux-image-alpha-generic_2.6.18+6etch2_alpha.deb stable/main/binary-alpha/linux-image-2.6-alpha-generic_2.6.18+6etch2_alpha.deb stable/main/binary-alpha/linux-headers-2.6-alpha-generic_2.6.18+6etch2_alpha.deb stable/main/binary-alpha/linux-image-alpha-smp_2.6.18+6etch2_alpha.deb stable/main/binary-alpha/linux-image-2.6-alpha-smp_2.6.18+6etch2_alpha.deb stable/main/binary-alpha/linux-headers-2.6-alpha-smp_2.6.18+6etch2_alpha.deb stable/main/binary-alpha/linux-image-alpha-legacy_2.6.18+6etch2_alpha.deb stable/main/binary-alpha/linux-image-2.6-alpha-legacy_2.6.18+6etch2_alpha.deb stable/main/binary-alpha/linux-headers-2.6-alpha-legacy_2.6.18+6etch2_alpha.deb stable/main/binary-alpha/linux-image-vserver-alpha_2.6.18+6etch2_alpha.deb stable/main/binary-alpha/linux-image-2.6-vserver-alpha_2.6.18+6etch2_alpha.deb stable/main/binary-alpha/linux-headers-2.6-vserver-alpha_2.6.18+6etch2_alpha.deb stable/main/binary-alpha/kernel-image-2.6-generic_2.6.18+6etch2_alpha.deb stable/main/binary-alpha/kernel-image-2.6-smp_2.6.18+6etch2_alpha.deb linux-latest-2.6 (6etch2) stable-security; urgency=high * The arm build of 6etch1 is missing from 4.0r1. Since the latest security update of linux-2.6 (2.6.18.dfsg.1-13etch1) requires this new ABI, and an updated linux-latest-2.6 facilitates the migration to the new ABI. Closes: #438617 stable/main/binary-amd64/linux-image-amd64_2.6.18+6etch2_amd64.deb stable/main/binary-amd64/linux-image-2.6-amd64_2.6.18+6etch2_amd64.deb stable/main/binary-amd64/linux-headers-2.6-amd64_2.6.18+6etch2_amd64.deb stable/main/binary-amd64/linux-image-vserver-amd64_2.6.18+6etch2_amd64.deb stable/main/binary-amd64/linux-image-2.6-vserver-amd64_2.6.18+6etch2_amd64.deb stable/main/binary-amd64/linux-headers-2.6-vserver-amd64_2.6.18+6etch2_amd64.deb stable/main/binary-amd64/linux-image-xen-amd64_2.6.18+6etch2_amd64.deb stable/main/binary-amd64/linux-image-2.6-xen-amd64_2.6.18+6etch2_amd64.deb stable/main/binary-amd64/linux-headers-2.6-xen-amd64_2.6.18+6etch2_amd64.deb stable/main/binary-amd64/linux-image-xen-vserver-amd64_2.6.18+6etch2_amd64.deb stable/main/binary-amd64/linux-image-2.6-xen-vserver-amd64_2.6.18+6etch2_amd64.deb stable/main/binary-amd64/linux-headers-2.6-xen-vserver-amd64_2.6.18+6etch2_amd64.deb stable/main/binary-amd64/kernel-image-2.6-amd64-generic_2.6.18+6etch2_amd64.deb stable/main/binary-amd64/kernel-image-2.6-amd64-k8_2.6.18+6etch2_amd64.deb stable/main/binary-amd64/kernel-image-2.6-amd64-k8-smp_2.6.18+6etch2_amd64.deb stable/main/binary-amd64/kernel-image-2.6-em64t-p4_2.6.18+6etch2_amd64.deb stable/main/binary-amd64/kernel-image-2.6-em64t-p4-smp_2.6.18+6etch2_amd64.deb stable/main/binary-amd64/linux-image-2.6-amd64-generic_2.6.18+6etch2_amd64.deb stable/main/binary-amd64/linux-image-2.6-amd64-k8_2.6.18+6etch2_amd64.deb stable/main/binary-amd64/linux-image-2.6-amd64-k8-smp_2.6.18+6etch2_amd64.deb stable/main/binary-amd64/linux-image-2.6-em64t-p4_2.6.18+6etch2_amd64.deb stable/main/binary-amd64/linux-image-2.6-em64t-p4-smp_2.6.18+6etch2_amd64.deb stable/main/binary-amd64/linux-image-2.6-vserver-amd64-k8-smp_2.6.18+6etch2_amd64.deb stable/main/binary-amd64/linux-image-2.6-vserver-em64t-p4-smp_2.6.18+6etch2_amd64.deb linux-latest-2.6 (6etch2) stable-security; urgency=high * The arm build of 6etch1 is missing from 4.0r1. Since the latest security update of linux-2.6 (2.6.18.dfsg.1-13etch1) requires this new ABI, and an updated linux-latest-2.6 facilitates the migration to the new ABI. Closes: #438617 stable/main/binary-arm/linux-image-footbridge_2.6.18+6etch2_arm.deb stable/main/binary-arm/linux-image-2.6-footbridge_2.6.18+6etch2_arm.deb stable/main/binary-arm/linux-headers-2.6-footbridge_2.6.18+6etch2_arm.deb stable/main/binary-arm/linux-image-iop32x_2.6.18+6etch2_arm.deb stable/main/binary-arm/linux-image-2.6-iop32x_2.6.18+6etch2_arm.deb stable/main/binary-arm/linux-headers-2.6-iop32x_2.6.18+6etch2_arm.deb stable/main/binary-arm/linux-image-ixp4xx_2.6.18+6etch2_arm.deb stable/main/binary-arm/linux-image-2.6-ixp4xx_2.6.18+6etch2_arm.deb stable/main/binary-arm/linux-headers-2.6-ixp4xx_2.6.18+6etch2_arm.deb stable/main/binary-arm/linux-image-rpc_2.6.18+6etch2_arm.deb stable/main/binary-arm/linux-image-2.6-rpc_2.6.18+6etch2_arm.deb stable/main/binary-arm/linux-headers-2.6-rpc_2.6.18+6etch2_arm.deb stable/main/binary-arm/linux-image-s3c2410_2.6.18+6etch2_arm.deb stable/main/binary-arm/linux-image-2.6-s3c2410_2.6.18+6etch2_arm.deb stable/main/binary-arm/linux-headers-2.6-s3c2410_2.6.18+6etch2_arm.deb linux-latest-2.6 (6etch2) stable-security; urgency=high * The arm build of 6etch1 is missing from 4.0r1. Since the latest security update of linux-2.6 (2.6.18.dfsg.1-13etch1) requires this new ABI, and an updated linux-latest-2.6 facilitates the migration to the new ABI. Closes: #438617 stable/main/binary-hppa/linux-image-parisc_2.6.18+6etch2_hppa.deb stable/main/binary-hppa/linux-image-2.6-parisc_2.6.18+6etch2_hppa.deb stable/main/binary-hppa/linux-headers-2.6-parisc_2.6.18+6etch2_hppa.deb stable/main/binary-hppa/linux-image-parisc-smp_2.6.18+6etch2_hppa.deb stable/main/binary-hppa/linux-image-2.6-parisc-smp_2.6.18+6etch2_hppa.deb stable/main/binary-hppa/linux-headers-2.6-parisc-smp_2.6.18+6etch2_hppa.deb stable/main/binary-hppa/linux-image-parisc64_2.6.18+6etch2_hppa.deb stable/main/binary-hppa/linux-image-2.6-parisc64_2.6.18+6etch2_hppa.deb stable/main/binary-hppa/linux-headers-2.6-parisc64_2.6.18+6etch2_hppa.deb stable/main/binary-hppa/linux-image-parisc64-smp_2.6.18+6etch2_hppa.deb stable/main/binary-hppa/linux-image-2.6-parisc64-smp_2.6.18+6etch2_hppa.deb stable/main/binary-hppa/linux-headers-2.6-parisc64-smp_2.6.18+6etch2_hppa.deb linux-latest-2.6 (6etch2) stable-security; urgency=high * The arm build of 6etch1 is missing from 4.0r1. Since the latest security update of linux-2.6 (2.6.18.dfsg.1-13etch1) requires this new ABI, and an updated linux-latest-2.6 facilitates the migration to the new ABI. Closes: #438617 stable/main/binary-i386/linux-image-486_2.6.18+6etch2_i386.deb stable/main/binary-i386/linux-image-2.6-486_2.6.18+6etch2_i386.deb stable/main/binary-i386/linux-headers-2.6-486_2.6.18+6etch2_i386.deb stable/main/binary-i386/linux-image-686_2.6.18+6etch2_i386.deb stable/main/binary-i386/linux-image-2.6-686_2.6.18+6etch2_i386.deb stable/main/binary-i386/linux-headers-2.6-686_2.6.18+6etch2_i386.deb stable/main/binary-i386/linux-image-k7_2.6.18+6etch2_i386.deb stable/main/binary-i386/linux-image-2.6-k7_2.6.18+6etch2_i386.deb stable/main/binary-i386/linux-headers-2.6-k7_2.6.18+6etch2_i386.deb stable/main/binary-i386/linux-image-686-bigmem_2.6.18+6etch2_i386.deb stable/main/binary-i386/linux-image-2.6-686-bigmem_2.6.18+6etch2_i386.deb stable/main/binary-i386/linux-headers-2.6-686-bigmem_2.6.18+6etch2_i386.deb stable/main/binary-i386/linux-image-amd64_2.6.18+6etch2_i386.deb stable/main/binary-i386/linux-image-2.6-amd64_2.6.18+6etch2_i386.deb stable/main/binary-i386/linux-headers-2.6-amd64_2.6.18+6etch2_i386.deb stable/main/binary-i386/linux-image-vserver-686_2.6.18+6etch2_i386.deb stable/main/binary-i386/linux-image-2.6-vserver-686_2.6.18+6etch2_i386.deb stable/main/binary-i386/linux-headers-2.6-vserver-686_2.6.18+6etch2_i386.deb stable/main/binary-i386/linux-image-vserver-k7_2.6.18+6etch2_i386.deb stable/main/binary-i386/linux-image-2.6-vserver-k7_2.6.18+6etch2_i386.deb stable/main/binary-i386/linux-headers-2.6-vserver-k7_2.6.18+6etch2_i386.deb stable/main/binary-i386/linux-image-xen-686_2.6.18+6etch2_i386.deb stable/main/binary-i386/linux-image-2.6-xen-686_2.6.18+6etch2_i386.deb stable/main/binary-i386/linux-headers-2.6-xen-686_2.6.18+6etch2_i386.deb stable/main/binary-i386/linux-image-xen-vserver-686_2.6.18+6etch2_i386.deb stable/main/binary-i386/linux-image-2.6-xen-vserver-686_2.6.18+6etch2_i386.deb stable/main/binary-i386/linux-headers-2.6-xen-vserver-686_2.6.18+6etch2_i386.deb stable/main/binary-i386/kernel-image-2.6-amd64-generic_2.6.18+6etch2_i386.deb stable/main/binary-i386/kernel-image-2.6-amd64-k8_2.6.18+6etch2_i386.deb stable/main/binary-i386/kernel-image-2.6-amd64-k8-smp_2.6.18+6etch2_i386.deb stable/main/binary-i386/kernel-image-2.6-em64t-p4_2.6.18+6etch2_i386.deb stable/main/binary-i386/kernel-image-2.6-em64t-p4-smp_2.6.18+6etch2_i386.deb stable/main/binary-i386/kernel-image-2.6-386_2.6.18+6etch2_i386.deb stable/main/binary-i386/kernel-image-2.6-686_2.6.18+6etch2_i386.deb stable/main/binary-i386/kernel-image-2.6-686-smp_2.6.18+6etch2_i386.deb stable/main/binary-i386/linux-image-2.6-686-smp_2.6.18+6etch2_i386.deb stable/main/binary-i386/kernel-image-2.6-k7_2.6.18+6etch2_i386.deb stable/main/binary-i386/kernel-image-2.6-k7-smp_2.6.18+6etch2_i386.deb stable/main/binary-i386/linux-image-2.6-k7-smp_2.6.18+6etch2_i386.deb linux-latest-2.6 (6etch2) stable-security; urgency=high * The arm build of 6etch1 is missing from 4.0r1. Since the latest security update of linux-2.6 (2.6.18.dfsg.1-13etch1) requires this new ABI, and an updated linux-latest-2.6 facilitates the migration to the new ABI. Closes: #438617 stable/main/source/linux-latest-2.6_6etch2.dsc stable/main/source/linux-latest-2.6_6etch2.tar.gz stable/main/binary-ia64/linux-image-itanium_2.6.18+6etch2_ia64.deb stable/main/binary-ia64/linux-image-2.6-itanium_2.6.18+6etch2_ia64.deb stable/main/binary-ia64/linux-headers-2.6-itanium_2.6.18+6etch2_ia64.deb stable/main/binary-ia64/linux-image-mckinley_2.6.18+6etch2_ia64.deb stable/main/binary-ia64/linux-image-2.6-mckinley_2.6.18+6etch2_ia64.deb stable/main/binary-ia64/linux-headers-2.6-mckinley_2.6.18+6etch2_ia64.deb stable/main/binary-ia64/kernel-image-2.6-itanium_2.6.18+6etch2_ia64.deb stable/main/binary-ia64/kernel-image-2.6-itanium-smp_2.6.18+6etch2_ia64.deb stable/main/binary-ia64/kernel-image-2.6-mckinley_2.6.18+6etch2_ia64.deb stable/main/binary-ia64/kernel-image-2.6-mckinley-smp_2.6.18+6etch2_ia64.deb stable/main/binary-ia64/linux-image-2.6-itanium-smp_2.6.18+6etch2_ia64.deb stable/main/binary-ia64/linux-image-2.6-mckinley-smp_2.6.18+6etch2_ia64.deb linux-latest-2.6 (6etch2) stable-security; urgency=high * The arm build of 6etch1 is missing from 4.0r1. Since the latest security update of linux-2.6 (2.6.18.dfsg.1-13etch1) requires this new ABI, and an updated linux-latest-2.6 facilitates the migration to the new ABI. Closes: #438617 stable/main/binary-mips/linux-image-r4k-ip22_2.6.18+6etch2_mips.deb stable/main/binary-mips/linux-image-2.6-r4k-ip22_2.6.18+6etch2_mips.deb stable/main/binary-mips/linux-headers-2.6-r4k-ip22_2.6.18+6etch2_mips.deb stable/main/binary-mips/linux-image-r5k-ip32_2.6.18+6etch2_mips.deb stable/main/binary-mips/linux-image-2.6-r5k-ip32_2.6.18+6etch2_mips.deb stable/main/binary-mips/linux-headers-2.6-r5k-ip32_2.6.18+6etch2_mips.deb stable/main/binary-mips/linux-image-sb1-bcm91250a_2.6.18+6etch2_mips.deb stable/main/binary-mips/linux-image-2.6-sb1-bcm91250a_2.6.18+6etch2_mips.deb stable/main/binary-mips/linux-headers-2.6-sb1-bcm91250a_2.6.18+6etch2_mips.deb stable/main/binary-mips/linux-image-sb1a-bcm91480b_2.6.18+6etch2_mips.deb stable/main/binary-mips/linux-image-2.6-sb1a-bcm91480b_2.6.18+6etch2_mips.deb stable/main/binary-mips/linux-headers-2.6-sb1a-bcm91480b_2.6.18+6etch2_mips.deb stable/main/binary-mips/linux-image-qemu_2.6.18+6etch2_mips.deb stable/main/binary-mips/linux-image-2.6-qemu_2.6.18+6etch2_mips.deb stable/main/binary-mips/linux-headers-2.6-qemu_2.6.18+6etch2_mips.deb linux-latest-2.6 (6etch2) stable-security; urgency=high * The arm build of 6etch1 is missing from 4.0r1. Since the latest security update of linux-2.6 (2.6.18.dfsg.1-13etch1) requires this new ABI, and an updated linux-latest-2.6 facilitates the migration to the new ABI. Closes: #438617 stable/main/binary-mipsel/linux-image-r5k-cobalt_2.6.18+6etch2_mipsel.deb stable/main/binary-mipsel/linux-image-2.6-r5k-cobalt_2.6.18+6etch2_mipsel.deb stable/main/binary-mipsel/linux-headers-2.6-r5k-cobalt_2.6.18+6etch2_mipsel.deb stable/main/binary-mipsel/linux-image-sb1-bcm91250a_2.6.18+6etch2_mipsel.deb stable/main/binary-mipsel/linux-image-2.6-sb1-bcm91250a_2.6.18+6etch2_mipsel.deb stable/main/binary-mipsel/linux-headers-2.6-sb1-bcm91250a_2.6.18+6etch2_mipsel.deb stable/main/binary-mipsel/linux-image-sb1a-bcm91480b_2.6.18+6etch2_mipsel.deb stable/main/binary-mipsel/linux-image-2.6-sb1a-bcm91480b_2.6.18+6etch2_mipsel.deb stable/main/binary-mipsel/linux-headers-2.6-sb1a-bcm91480b_2.6.18+6etch2_mipsel.deb stable/main/binary-mipsel/linux-image-r3k-kn02_2.6.18+6etch2_mipsel.deb stable/main/binary-mipsel/linux-image-2.6-r3k-kn02_2.6.18+6etch2_mipsel.deb stable/main/binary-mipsel/linux-headers-2.6-r3k-kn02_2.6.18+6etch2_mipsel.deb stable/main/binary-mipsel/linux-image-r4k-kn04_2.6.18+6etch2_mipsel.deb stable/main/binary-mipsel/linux-image-2.6-r4k-kn04_2.6.18+6etch2_mipsel.deb stable/main/binary-mipsel/linux-headers-2.6-r4k-kn04_2.6.18+6etch2_mipsel.deb stable/main/binary-mipsel/linux-image-qemu_2.6.18+6etch2_mipsel.deb stable/main/binary-mipsel/linux-image-2.6-qemu_2.6.18+6etch2_mipsel.deb stable/main/binary-mipsel/linux-headers-2.6-qemu_2.6.18+6etch2_mipsel.deb linux-latest-2.6 (6etch2) stable-security; urgency=high * The arm build of 6etch1 is missing from 4.0r1. Since the latest security update of linux-2.6 (2.6.18.dfsg.1-13etch1) requires this new ABI, and an updated linux-latest-2.6 facilitates the migration to the new ABI. Closes: #438617 stable/main/binary-powerpc/linux-image-powerpc_2.6.18+6etch2_powerpc.deb stable/main/binary-powerpc/linux-image-2.6-powerpc_2.6.18+6etch2_powerpc.deb stable/main/binary-powerpc/linux-headers-2.6-powerpc_2.6.18+6etch2_powerpc.deb stable/main/binary-powerpc/linux-image-powerpc-smp_2.6.18+6etch2_powerpc.deb stable/main/binary-powerpc/linux-image-2.6-powerpc-smp_2.6.18+6etch2_powerpc.deb stable/main/binary-powerpc/linux-headers-2.6-powerpc-smp_2.6.18+6etch2_powerpc.deb stable/main/binary-powerpc/linux-image-powerpc-miboot_2.6.18+6etch2_powerpc.deb stable/main/binary-powerpc/linux-image-2.6-powerpc-miboot_2.6.18+6etch2_powerpc.deb stable/main/binary-powerpc/linux-headers-2.6-powerpc-miboot_2.6.18+6etch2_powerpc.deb stable/main/binary-powerpc/linux-image-powerpc64_2.6.18+6etch2_powerpc.deb stable/main/binary-powerpc/linux-image-2.6-powerpc64_2.6.18+6etch2_powerpc.deb stable/main/binary-powerpc/linux-headers-2.6-powerpc64_2.6.18+6etch2_powerpc.deb stable/main/binary-powerpc/linux-image-prep_2.6.18+6etch2_powerpc.deb stable/main/binary-powerpc/linux-image-2.6-prep_2.6.18+6etch2_powerpc.deb stable/main/binary-powerpc/linux-headers-2.6-prep_2.6.18+6etch2_powerpc.deb stable/main/binary-powerpc/linux-image-vserver-powerpc_2.6.18+6etch2_powerpc.deb stable/main/binary-powerpc/linux-image-2.6-vserver-powerpc_2.6.18+6etch2_powerpc.deb stable/main/binary-powerpc/linux-headers-2.6-vserver-powerpc_2.6.18+6etch2_powerpc.deb stable/main/binary-powerpc/linux-image-vserver-powerpc64_2.6.18+6etch2_powerpc.deb stable/main/binary-powerpc/linux-image-2.6-vserver-powerpc64_2.6.18+6etch2_powerpc.deb stable/main/binary-powerpc/linux-headers-2.6-vserver-powerpc64_2.6.18+6etch2_powerpc.deb stable/main/binary-powerpc/kernel-image-powerpc_2.6.18+6etch2_powerpc.deb stable/main/binary-powerpc/kernel-image-2.6-powerpc_2.6.18+6etch2_powerpc.deb stable/main/binary-powerpc/kernel-image-powerpc-smp_2.6.18+6etch2_powerpc.deb stable/main/binary-powerpc/kernel-image-2.6-powerpc-smp_2.6.18+6etch2_powerpc.deb stable/main/binary-powerpc/kernel-image-power3_2.6.18+6etch2_powerpc.deb stable/main/binary-powerpc/kernel-image-2.6-power3_2.6.18+6etch2_powerpc.deb stable/main/binary-powerpc/kernel-image-power3-smp_2.6.18+6etch2_powerpc.deb stable/main/binary-powerpc/kernel-image-2.6-power3-smp_2.6.18+6etch2_powerpc.deb stable/main/binary-powerpc/kernel-image-power4_2.6.18+6etch2_powerpc.deb stable/main/binary-powerpc/kernel-image-2.6-power4_2.6.18+6etch2_powerpc.deb stable/main/binary-powerpc/kernel-image-power4-smp_2.6.18+6etch2_powerpc.deb stable/main/binary-powerpc/kernel-image-2.6-power4-smp_2.6.18+6etch2_powerpc.deb linux-latest-2.6 (6etch2) stable-security; urgency=high * The arm build of 6etch1 is missing from 4.0r1. Since the latest security update of linux-2.6 (2.6.18.dfsg.1-13etch1) requires this new ABI, and an updated linux-latest-2.6 facilitates the migration to the new ABI. Closes: #438617 stable/main/binary-s390/linux-image-s390_2.6.18+6etch2_s390.deb stable/main/binary-s390/linux-image-2.6-s390_2.6.18+6etch2_s390.deb stable/main/binary-s390/linux-headers-2.6-s390_2.6.18+6etch2_s390.deb stable/main/binary-s390/linux-image-s390-tape_2.6.18+6etch2_s390.deb stable/main/binary-s390/linux-image-2.6-s390-tape_2.6.18+6etch2_s390.deb stable/main/binary-s390/linux-image-s390x_2.6.18+6etch2_s390.deb stable/main/binary-s390/linux-image-2.6-s390x_2.6.18+6etch2_s390.deb stable/main/binary-s390/linux-headers-2.6-s390x_2.6.18+6etch2_s390.deb stable/main/binary-s390/linux-image-vserver-s390x_2.6.18+6etch2_s390.deb stable/main/binary-s390/linux-image-2.6-vserver-s390x_2.6.18+6etch2_s390.deb stable/main/binary-s390/linux-headers-2.6-vserver-s390x_2.6.18+6etch2_s390.deb stable/main/binary-s390/kernel-image-2.6-s390_2.6.18+6etch2_s390.deb stable/main/binary-s390/kernel-image-2.6-s390x_2.6.18+6etch2_s390.deb linux-latest-2.6 (6etch2) stable-security; urgency=high * The arm build of 6etch1 is missing from 4.0r1. Since the latest security update of linux-2.6 (2.6.18.dfsg.1-13etch1) requires this new ABI, and an updated linux-latest-2.6 facilitates the migration to the new ABI. Closes: #438617 stable/main/binary-sparc/linux-image-sparc32_2.6.18+6etch2_sparc.deb stable/main/binary-sparc/linux-image-2.6-sparc32_2.6.18+6etch2_sparc.deb stable/main/binary-sparc/linux-headers-2.6-sparc32_2.6.18+6etch2_sparc.deb stable/main/binary-sparc/linux-image-sparc64_2.6.18+6etch2_sparc.deb stable/main/binary-sparc/linux-image-2.6-sparc64_2.6.18+6etch2_sparc.deb stable/main/binary-sparc/linux-headers-2.6-sparc64_2.6.18+6etch2_sparc.deb stable/main/binary-sparc/linux-image-sparc64-smp_2.6.18+6etch2_sparc.deb stable/main/binary-sparc/linux-image-2.6-sparc64-smp_2.6.18+6etch2_sparc.deb stable/main/binary-sparc/linux-headers-2.6-sparc64-smp_2.6.18+6etch2_sparc.deb stable/main/binary-sparc/linux-image-vserver-sparc64_2.6.18+6etch2_sparc.deb stable/main/binary-sparc/linux-image-2.6-vserver-sparc64_2.6.18+6etch2_sparc.deb stable/main/binary-sparc/linux-headers-2.6-vserver-sparc64_2.6.18+6etch2_sparc.deb stable/main/binary-sparc/kernel-image-2.6-sparc64_2.6.18+6etch2_sparc.deb stable/main/binary-sparc/kernel-image-2.6-sparc64-smp_2.6.18+6etch2_sparc.deb linux-latest-2.6 (6etch2) stable-security; urgency=high * The arm build of 6etch1 is missing from 4.0r1. Since the latest security update of linux-2.6 (2.6.18.dfsg.1-13etch1) requires this new ABI, and an updated linux-latest-2.6 facilitates the migration to the new ABI. Closes: #438617 stable/main/binary-alpha/lvm2_2.02.06-4etch1_alpha.deb stable/main/lvm2-udeb_2.02.06-4etch1_alpha.udeb stable/main/binary-alpha/clvm_2.02.06-4etch1_alpha.deb lvm2 (2.02.06-4etch1) stable; urgency=low * Cope with striped lvm1 metadata volumes. Patch from upstream version 2.02.24, thanks to Steve McIntyre. (closes: #422963) stable/main/source/lvm2_2.02.06-4etch1.dsc stable/main/source/lvm2_2.02.06-4etch1.diff.gz stable/main/binary-amd64/lvm2_2.02.06-4etch1_amd64.deb stable/main/lvm2-udeb_2.02.06-4etch1_amd64.udeb stable/main/binary-amd64/clvm_2.02.06-4etch1_amd64.deb lvm2 (2.02.06-4etch1) stable; urgency=low * Cope with striped lvm1 metadata volumes. Patch from upstream version 2.02.24, thanks to Steve McIntyre. (closes: #422963) stable/main/binary-arm/lvm2_2.02.06-4etch1_arm.deb stable/main/lvm2-udeb_2.02.06-4etch1_arm.udeb stable/main/binary-arm/clvm_2.02.06-4etch1_arm.deb lvm2 (2.02.06-4etch1) stable; urgency=low * Cope with striped lvm1 metadata volumes. Patch from upstream version 2.02.24, thanks to Steve McIntyre. (closes: #422963) stable/main/binary-hppa/lvm2_2.02.06-4etch1_hppa.deb stable/main/lvm2-udeb_2.02.06-4etch1_hppa.udeb stable/main/binary-hppa/clvm_2.02.06-4etch1_hppa.deb lvm2 (2.02.06-4etch1) stable; urgency=low * Cope with striped lvm1 metadata volumes. Patch from upstream version 2.02.24, thanks to Steve McIntyre. (closes: #422963) stable/main/binary-i386/lvm2_2.02.06-4etch1_i386.deb stable/main/lvm2-udeb_2.02.06-4etch1_i386.udeb stable/main/binary-i386/clvm_2.02.06-4etch1_i386.deb lvm2 (2.02.06-4etch1) stable; urgency=low * Cope with striped lvm1 metadata volumes. Patch from upstream version 2.02.24, thanks to Steve McIntyre. (closes: #422963) stable/main/binary-ia64/lvm2_2.02.06-4etch1_ia64.deb stable/main/lvm2-udeb_2.02.06-4etch1_ia64.udeb stable/main/binary-ia64/clvm_2.02.06-4etch1_ia64.deb lvm2 (2.02.06-4etch1) stable; urgency=low * Cope with striped lvm1 metadata volumes. Patch from upstream version 2.02.24, thanks to Steve McIntyre. (closes: #422963) stable/main/binary-mips/lvm2_2.02.06-4etch1_mips.deb stable/main/lvm2-udeb_2.02.06-4etch1_mips.udeb stable/main/binary-mips/clvm_2.02.06-4etch1_mips.deb lvm2 (2.02.06-4etch1) stable; urgency=low * Cope with striped lvm1 metadata volumes. Patch from upstream version 2.02.24, thanks to Steve McIntyre. (closes: #422963) stable/main/binary-mipsel/lvm2_2.02.06-4etch1_mipsel.deb stable/main/lvm2-udeb_2.02.06-4etch1_mipsel.udeb stable/main/binary-mipsel/clvm_2.02.06-4etch1_mipsel.deb lvm2 (2.02.06-4etch1) stable; urgency=low * Cope with striped lvm1 metadata volumes. Patch from upstream version 2.02.24, thanks to Steve McIntyre. (closes: #422963) stable/main/binary-powerpc/lvm2_2.02.06-4etch1_powerpc.deb stable/main/lvm2-udeb_2.02.06-4etch1_powerpc.udeb stable/main/binary-powerpc/clvm_2.02.06-4etch1_powerpc.deb lvm2 (2.02.06-4etch1) stable; urgency=low * Cope with striped lvm1 metadata volumes. Patch from upstream version 2.02.24, thanks to Steve McIntyre. (closes: #422963) stable/main/binary-s390/lvm2_2.02.06-4etch1_s390.deb stable/main/lvm2-udeb_2.02.06-4etch1_s390.udeb stable/main/binary-s390/clvm_2.02.06-4etch1_s390.deb lvm2 (2.02.06-4etch1) stable; urgency=low * Cope with striped lvm1 metadata volumes. Patch from upstream version 2.02.24, thanks to Steve McIntyre. (closes: #422963) stable/main/binary-sparc/lvm2_2.02.06-4etch1_sparc.deb stable/main/lvm2-udeb_2.02.06-4etch1_sparc.udeb stable/main/binary-sparc/clvm_2.02.06-4etch1_sparc.deb lvm2 (2.02.06-4etch1) stable; urgency=low * Cope with striped lvm1 metadata volumes. Patch from upstream version 2.02.24, thanks to Steve McIntyre. (closes: #422963) stable/main/binary-alpha/maradns_1.2.12.04-1etch1_alpha.deb maradns (1.2.12.04-1etch1) stable-security; urgency=high * Fix memleak DoS [CVE-2007-311[456] stable/main/binary-amd64/maradns_1.2.12.04-1etch1_amd64.deb maradns (1.2.12.04-1etch1) stable-security; urgency=high * Fix memleak DoS [CVE-2007-311[456] stable/main/binary-arm/maradns_1.2.12.04-1etch1_arm.deb maradns (1.2.12.04-1etch1) stable-security; urgency=high * Fix memleak DoS [CVE-2007-311[456] stable/main/binary-hppa/maradns_1.2.12.04-1etch1_hppa.deb maradns (1.2.12.04-1etch1) stable-security; urgency=high * Fix memleak DoS [CVE-2007-311[456] stable/main/source/maradns_1.2.12.04-1etch1.dsc stable/main/source/maradns_1.2.12.04-1etch1.tar.gz stable/main/binary-i386/maradns_1.2.12.04-1etch1_i386.deb maradns (1.2.12.04-1etch1) stable-security; urgency=high * Fix memleak DoS [CVE-2007-311[456] stable/main/binary-ia64/maradns_1.2.12.04-1etch1_ia64.deb maradns (1.2.12.04-1etch1) stable-security; urgency=high * Fix memleak DoS [CVE-2007-311[456] stable/main/binary-mips/maradns_1.2.12.04-1etch1_mips.deb maradns (1.2.12.04-1etch1) stable-security; urgency=high * Fix memleak DoS [CVE-2007-311[456] stable/main/binary-mipsel/maradns_1.2.12.04-1etch1_mipsel.deb maradns (1.2.12.04-1etch1) stable-security; urgency=high * Fix memleak DoS [CVE-2007-311[456] stable/main/binary-powerpc/maradns_1.2.12.04-1etch1_powerpc.deb maradns (1.2.12.04-1etch1) stable-security; urgency=high * Fix memleak DoS [CVE-2007-311[456] stable/main/binary-s390/maradns_1.2.12.04-1etch1_s390.deb maradns (1.2.12.04-1etch1) stable-security; urgency=high * Fix memleak DoS [CVE-2007-311[456] stable/main/binary-sparc/maradns_1.2.12.04-1etch1_sparc.deb maradns (1.2.12.04-1etch1) stable-security; urgency=high * Fix memleak DoS [CVE-2007-311[456] stable/main/binary-amd64/mono-common_1.2.2.1-1etch1_amd64.deb stable/main/binary-amd64/mono-runtime_1.2.2.1-1etch1_amd64.deb stable/main/binary-amd64/mono-jit_1.2.2.1-1etch1_amd64.deb stable/main/binary-amd64/mono_1.2.2.1-1etch1_amd64.deb stable/main/binary-amd64/mono-devel_1.2.2.1-1etch1_amd64.deb stable/main/binary-amd64/mono-utils_1.2.2.1-1etch1_amd64.deb stable/main/binary-amd64/libmono0_1.2.2.1-1etch1_amd64.deb stable/main/binary-amd64/libmono-dev_1.2.2.1-1etch1_amd64.deb stable/main/binary-amd64/mono-jay_1.2.2.1-1etch1_amd64.deb mono (1.2.2.1-1etch1) stable-security; urgency=high * debian/patches/fix_BigInteger_overflow_CVE-2007-5197.dpatch: + Fixes CVE-2007-5197 stable/main/binary-arm/mono-common_1.2.2.1-1etch1_arm.deb stable/main/binary-arm/mono-runtime_1.2.2.1-1etch1_arm.deb stable/main/binary-arm/mono-jit_1.2.2.1-1etch1_arm.deb stable/main/binary-arm/mono_1.2.2.1-1etch1_arm.deb stable/main/binary-arm/mono-devel_1.2.2.1-1etch1_arm.deb stable/main/binary-arm/mono-utils_1.2.2.1-1etch1_arm.deb stable/main/binary-arm/libmono0_1.2.2.1-1etch1_arm.deb stable/main/binary-arm/libmono-dev_1.2.2.1-1etch1_arm.deb stable/main/binary-arm/mono-jay_1.2.2.1-1etch1_arm.deb mono (1.2.2.1-1etch1) stable-security; urgency=high * debian/patches/fix_BigInteger_overflow_CVE-2007-5197.dpatch: + Fixes CVE-2007-5197 stable/main/source/mono_1.2.2.1-1etch1.dsc stable/main/source/mono_1.2.2.1-1etch1.diff.gz stable/main/source/mono_1.2.2.1.orig.tar.gz stable/main/binary-all/libmono1.0-cil_1.2.2.1-1etch1_all.deb stable/main/binary-all/libmono2.0-cil_1.2.2.1-1etch1_all.deb stable/main/binary-all/libmono-c5-1.0-cil_1.2.2.1-1etch1_all.deb stable/main/binary-all/libmono-corlib1.0-cil_1.2.2.1-1etch1_all.deb stable/main/binary-all/libmono-corlib2.0-cil_1.2.2.1-1etch1_all.deb stable/main/binary-all/libmono-system1.0-cil_1.2.2.1-1etch1_all.deb stable/main/binary-all/libmono-system2.0-cil_1.2.2.1-1etch1_all.deb stable/main/binary-all/libmono-system-messaging1.0-cil_1.2.2.1-1etch1_all.deb stable/main/binary-all/libmono-system-messaging2.0-cil_1.2.2.1-1etch1_all.deb stable/main/binary-all/libmono-security1.0-cil_1.2.2.1-1etch1_all.deb stable/main/binary-all/libmono-security2.0-cil_1.2.2.1-1etch1_all.deb stable/main/binary-all/libmono-data-tds1.0-cil_1.2.2.1-1etch1_all.deb stable/main/binary-all/libmono-data-tds2.0-cil_1.2.2.1-1etch1_all.deb stable/main/binary-all/libmono-system-data1.0-cil_1.2.2.1-1etch1_all.deb stable/main/binary-all/libmono-system-data2.0-cil_1.2.2.1-1etch1_all.deb stable/main/binary-all/libmono-system-web1.0-cil_1.2.2.1-1etch1_all.deb stable/main/binary-all/libmono-system-web2.0-cil_1.2.2.1-1etch1_all.deb stable/main/binary-all/libmono-system-runtime1.0-cil_1.2.2.1-1etch1_all.deb stable/main/binary-all/libmono-system-runtime2.0-cil_1.2.2.1-1etch1_all.deb stable/main/binary-all/libmono-system-ldap1.0-cil_1.2.2.1-1etch1_all.deb stable/main/binary-all/libmono-system-ldap2.0-cil_1.2.2.1-1etch1_all.deb stable/main/binary-all/libmono-winforms1.0-cil_1.2.2.1-1etch1_all.deb stable/main/binary-all/libmono-winforms2.0-cil_1.2.2.1-1etch1_all.deb stable/main/binary-all/libmono-cairo1.0-cil_1.2.2.1-1etch1_all.deb stable/main/binary-all/libmono-cairo2.0-cil_1.2.2.1-1etch1_all.deb stable/main/binary-all/libmono-sharpzip0.6-cil_1.2.2.1-1etch1_all.deb stable/main/binary-all/libmono-sharpzip0.84-cil_1.2.2.1-1etch1_all.deb stable/main/binary-all/libmono-sharpzip2.6-cil_1.2.2.1-1etch1_all.deb stable/main/binary-all/libmono-sharpzip2.84-cil_1.2.2.1-1etch1_all.deb stable/main/binary-all/libmono-npgsql1.0-cil_1.2.2.1-1etch1_all.deb stable/main/binary-all/libmono-npgsql2.0-cil_1.2.2.1-1etch1_all.deb stable/main/binary-all/libmono-bytefx0.7.6.1-cil_1.2.2.1-1etch1_all.deb stable/main/binary-all/libmono-bytefx0.7.6.2-cil_1.2.2.1-1etch1_all.deb stable/main/binary-all/libmono-firebirdsql1.7-cil_1.2.2.1-1etch1_all.deb stable/main/binary-all/libmono-oracle1.0-cil_1.2.2.1-1etch1_all.deb stable/main/binary-all/libmono-oracle2.0-cil_1.2.2.1-1etch1_all.deb stable/main/binary-all/libmono-sqlite1.0-cil_1.2.2.1-1etch1_all.deb stable/main/binary-all/libmono-sqlite2.0-cil_1.2.2.1-1etch1_all.deb stable/main/binary-all/libmono-accessibility1.0-cil_1.2.2.1-1etch1_all.deb stable/main/binary-all/libmono-accessibility2.0-cil_1.2.2.1-1etch1_all.deb stable/main/binary-all/libmono-cscompmgd7.0-cil_1.2.2.1-1etch1_all.deb stable/main/binary-all/libmono-cscompmgd8.0-cil_1.2.2.1-1etch1_all.deb stable/main/binary-all/libmono-ldap1.0-cil_1.2.2.1-1etch1_all.deb stable/main/binary-all/libmono-ldap2.0-cil_1.2.2.1-1etch1_all.deb stable/main/binary-all/libmono-microsoft-build2.0-cil_1.2.2.1-1etch1_all.deb stable/main/binary-all/libmono-microsoft7.0-cil_1.2.2.1-1etch1_all.deb stable/main/binary-all/libmono-microsoft8.0-cil_1.2.2.1-1etch1_all.deb stable/main/binary-all/libmono-peapi1.0-cil_1.2.2.1-1etch1_all.deb stable/main/binary-all/libmono-peapi2.0-cil_1.2.2.1-1etch1_all.deb stable/main/binary-all/libmono-relaxng1.0-cil_1.2.2.1-1etch1_all.deb stable/main/binary-all/libmono-relaxng2.0-cil_1.2.2.1-1etch1_all.deb stable/main/binary-all/mono-mcs_1.2.2.1-1etch1_all.deb stable/main/binary-all/mono-mjs_1.2.2.1-1etch1_all.deb stable/main/binary-all/mono-gmcs_1.2.2.1-1etch1_all.deb stable/main/binary-all/mono-gac_1.2.2.1-1etch1_all.deb stable/main/binary-i386/mono-common_1.2.2.1-1etch1_i386.deb stable/main/binary-i386/mono-runtime_1.2.2.1-1etch1_i386.deb stable/main/binary-i386/mono-jit_1.2.2.1-1etch1_i386.deb stable/main/binary-i386/mono_1.2.2.1-1etch1_i386.deb stable/main/binary-i386/mono-devel_1.2.2.1-1etch1_i386.deb stable/main/binary-i386/mono-utils_1.2.2.1-1etch1_i386.deb stable/main/binary-i386/libmono0_1.2.2.1-1etch1_i386.deb stable/main/binary-i386/libmono-dev_1.2.2.1-1etch1_i386.deb stable/main/binary-i386/mono-jay_1.2.2.1-1etch1_i386.deb mono (1.2.2.1-1etch1) stable-security; urgency=high * debian/patches/fix_BigInteger_overflow_CVE-2007-5197.dpatch: + Fixes CVE-2007-5197 stable/main/binary-ia64/mono-common_1.2.2.1-1etch1_ia64.deb stable/main/binary-ia64/mono-runtime_1.2.2.1-1etch1_ia64.deb stable/main/binary-ia64/mono-jit_1.2.2.1-1etch1_ia64.deb stable/main/binary-ia64/mono_1.2.2.1-1etch1_ia64.deb stable/main/binary-ia64/mono-devel_1.2.2.1-1etch1_ia64.deb stable/main/binary-ia64/mono-utils_1.2.2.1-1etch1_ia64.deb stable/main/binary-ia64/libmono0_1.2.2.1-1etch1_ia64.deb stable/main/binary-ia64/libmono-dev_1.2.2.1-1etch1_ia64.deb stable/main/binary-ia64/mono-jay_1.2.2.1-1etch1_ia64.deb mono (1.2.2.1-1etch1) stable-security; urgency=high * debian/patches/fix_BigInteger_overflow_CVE-2007-5197.dpatch: + Fixes CVE-2007-5197 stable/main/binary-powerpc/mono-common_1.2.2.1-1etch1_powerpc.deb stable/main/binary-powerpc/mono-runtime_1.2.2.1-1etch1_powerpc.deb stable/main/binary-powerpc/mono-jit_1.2.2.1-1etch1_powerpc.deb stable/main/binary-powerpc/mono_1.2.2.1-1etch1_powerpc.deb stable/main/binary-powerpc/mono-devel_1.2.2.1-1etch1_powerpc.deb stable/main/binary-powerpc/mono-utils_1.2.2.1-1etch1_powerpc.deb stable/main/binary-powerpc/libmono0_1.2.2.1-1etch1_powerpc.deb stable/main/binary-powerpc/libmono-dev_1.2.2.1-1etch1_powerpc.deb stable/main/binary-powerpc/mono-jay_1.2.2.1-1etch1_powerpc.deb mono (1.2.2.1-1etch1) stable-security; urgency=high * debian/patches/fix_BigInteger_overflow_CVE-2007-5197.dpatch: + Fixes CVE-2007-5197 stable/main/binary-i386/mpop_1.0.5-1etch1+b1_i386.deb mpop (1.0.5-1etch1+b1) stable; urgency=low * Binary-only non-maintainer upload for i386; no source changes. * Rebuild against pristine etch, to replace a maintainer upload built against lenny stable/main/binary-alpha/multipath-tools_0.4.7-1.1etch1_alpha.deb multipath-tools (0.4.7-1.1etch1) stable; urgency=low * move the multipath-tools-boot startup link after the udev start (Closes: #445825) - fix taken from 0.4.7-3 * multipath-tools.init: use --oknodo during stop/restart so we don't fail if multipathd isn't running * add a prerm script to fix updates when multipathd isn't running and the old init script is being used. This and the above closes: #439126 - fix taken from 0.4.8-3 stable/main/binary-amd64/multipath-tools_0.4.7-1.1etch1_amd64.deb multipath-tools (0.4.7-1.1etch1) stable; urgency=low * move the multipath-tools-boot startup link after the udev start (Closes: #445825) - fix taken from 0.4.7-3 * multipath-tools.init: use --oknodo during stop/restart so we don't fail if multipathd isn't running * add a prerm script to fix updates when multipathd isn't running and the old init script is being used. This and the above closes: #439126 - fix taken from 0.4.8-3 stable/main/binary-arm/multipath-tools_0.4.7-1.1etch1_arm.deb multipath-tools (0.4.7-1.1etch1) stable; urgency=low * move the multipath-tools-boot startup link after the udev start (Closes: #445825) - fix taken from 0.4.7-3 * multipath-tools.init: use --oknodo during stop/restart so we don't fail if multipathd isn't running * add a prerm script to fix updates when multipathd isn't running and the old init script is being used. This and the above closes: #439126 - fix taken from 0.4.8-3 stable/main/binary-hppa/multipath-tools_0.4.7-1.1etch1_hppa.deb multipath-tools (0.4.7-1.1etch1) stable; urgency=low * move the multipath-tools-boot startup link after the udev start (Closes: #445825) - fix taken from 0.4.7-3 * multipath-tools.init: use --oknodo during stop/restart so we don't fail if multipathd isn't running * add a prerm script to fix updates when multipathd isn't running and the old init script is being used. This and the above closes: #439126 - fix taken from 0.4.8-3 stable/main/binary-i386/multipath-tools_0.4.7-1.1etch1_i386.deb multipath-tools (0.4.7-1.1etch1) stable; urgency=low * move the multipath-tools-boot startup link after the udev start (Closes: #445825) - fix taken from 0.4.7-3 * multipath-tools.init: use --oknodo during stop/restart so we don't fail if multipathd isn't running * add a prerm script to fix updates when multipathd isn't running and the old init script is being used. This and the above closes: #439126 - fix taken from 0.4.8-3 stable/main/binary-ia64/multipath-tools_0.4.7-1.1etch1_ia64.deb multipath-tools (0.4.7-1.1etch1) stable; urgency=low * move the multipath-tools-boot startup link after the udev start (Closes: #445825) - fix taken from 0.4.7-3 * multipath-tools.init: use --oknodo during stop/restart so we don't fail if multipathd isn't running * add a prerm script to fix updates when multipathd isn't running and the old init script is being used. This and the above closes: #439126 - fix taken from 0.4.8-3 stable/main/binary-mips/multipath-tools_0.4.7-1.1etch1_mips.deb multipath-tools (0.4.7-1.1etch1) stable; urgency=low * move the multipath-tools-boot startup link after the udev start (Closes: #445825) - fix taken from 0.4.7-3 * multipath-tools.init: use --oknodo during stop/restart so we don't fail if multipathd isn't running * add a prerm script to fix updates when multipathd isn't running and the old init script is being used. This and the above closes: #439126 - fix taken from 0.4.8-3 stable/main/binary-mipsel/multipath-tools_0.4.7-1.1etch1_mipsel.deb multipath-tools (0.4.7-1.1etch1) stable; urgency=low * move the multipath-tools-boot startup link after the udev start (Closes: #445825) - fix taken from 0.4.7-3 * multipath-tools.init: use --oknodo during stop/restart so we don't fail if multipathd isn't running * add a prerm script to fix updates when multipathd isn't running and the old init script is being used. This and the above closes: #439126 - fix taken from 0.4.8-3 stable/main/source/multipath-tools_0.4.7-1.1etch1.dsc stable/main/source/multipath-tools_0.4.7-1.1etch1.diff.gz stable/main/binary-powerpc/multipath-tools_0.4.7-1.1etch1_powerpc.deb multipath-tools (0.4.7-1.1etch1) stable; urgency=low * move the multipath-tools-boot startup link after the udev start (Closes: #445825) - fix taken from 0.4.7-3 * multipath-tools.init: use --oknodo during stop/restart so we don't fail if multipathd isn't running * add a prerm script to fix updates when multipathd isn't running and the old init script is being used. This and the above closes: #439126 - fix taken from 0.4.8-3 stable/main/binary-s390/multipath-tools_0.4.7-1.1etch1_s390.deb multipath-tools (0.4.7-1.1etch1) stable; urgency=low * move the multipath-tools-boot startup link after the udev start (Closes: #445825) - fix taken from 0.4.7-3 * multipath-tools.init: use --oknodo during stop/restart so we don't fail if multipathd isn't running * add a prerm script to fix updates when multipathd isn't running and the old init script is being used. This and the above closes: #439126 - fix taken from 0.4.8-3 stable/main/binary-sparc/multipath-tools_0.4.7-1.1etch1_sparc.deb multipath-tools (0.4.7-1.1etch1) stable; urgency=low * move the multipath-tools-boot startup link after the udev start (Closes: #445825) - fix taken from 0.4.7-3 * multipath-tools.init: use --oknodo during stop/restart so we don't fail if multipathd isn't running * add a prerm script to fix updates when multipathd isn't running and the old init script is being used. This and the above closes: #439126 - fix taken from 0.4.8-3 stable/main/binary-alpha/mydns-mysql_1.1.0-7etch1_alpha.deb stable/main/binary-alpha/mydns-pgsql_1.1.0-7etch1_alpha.deb mydns (1:1.1.0-7etch1) stable-security; urgency=high * Fix for CVE-2007-2362 Multiple Remote Dynamic DNS Update Vulnerabilities. Philipp Kern patch from lenny package. stable/main/binary-amd64/mydns-mysql_1.1.0-7etch1_amd64.deb stable/main/binary-amd64/mydns-pgsql_1.1.0-7etch1_amd64.deb mydns (1:1.1.0-7etch1) stable-security; urgency=high * Fix for CVE-2007-2362 Multiple Remote Dynamic DNS Update Vulnerabilities. Philipp Kern patch from lenny package. stable/main/binary-arm/mydns-mysql_1.1.0-7etch1_arm.deb stable/main/binary-arm/mydns-pgsql_1.1.0-7etch1_arm.deb mydns (1:1.1.0-7etch1) stable-security; urgency=high * Fix for CVE-2007-2362 Multiple Remote Dynamic DNS Update Vulnerabilities. Philipp Kern patch from lenny package. stable/main/binary-hppa/mydns-mysql_1.1.0-7etch1_hppa.deb stable/main/binary-hppa/mydns-pgsql_1.1.0-7etch1_hppa.deb mydns (1:1.1.0-7etch1) stable-security; urgency=high * Fix for CVE-2007-2362 Multiple Remote Dynamic DNS Update Vulnerabilities. Philipp Kern patch from lenny package. stable/main/source/mydns_1.1.0-7etch1.dsc stable/main/source/mydns_1.1.0.orig.tar.gz stable/main/source/mydns_1.1.0-7etch1.diff.gz stable/main/binary-i386/mydns-mysql_1.1.0-7etch1_i386.deb stable/main/binary-i386/mydns-pgsql_1.1.0-7etch1_i386.deb mydns (1:1.1.0-7etch1) stable-security; urgency=high * Fix for CVE-2007-2362 Multiple Remote Dynamic DNS Update Vulnerabilities. Philipp Kern patch from lenny package. stable/main/binary-ia64/mydns-mysql_1.1.0-7etch1_ia64.deb stable/main/binary-ia64/mydns-pgsql_1.1.0-7etch1_ia64.deb mydns (1:1.1.0-7etch1) stable-security; urgency=high * Fix for CVE-2007-2362 Multiple Remote Dynamic DNS Update Vulnerabilities. Philipp Kern patch from lenny package. stable/main/binary-mips/mydns-mysql_1.1.0-7etch1_mips.deb stable/main/binary-mips/mydns-pgsql_1.1.0-7etch1_mips.deb mydns (1:1.1.0-7etch1) stable-security; urgency=high * Fix for CVE-2007-2362 Multiple Remote Dynamic DNS Update Vulnerabilities. Philipp Kern patch from lenny package. stable/main/binary-mipsel/mydns-mysql_1.1.0-7etch1_mipsel.deb stable/main/binary-mipsel/mydns-pgsql_1.1.0-7etch1_mipsel.deb mydns (1:1.1.0-7etch1) stable-security; urgency=high * Fix for CVE-2007-2362 Multiple Remote Dynamic DNS Update Vulnerabilities. Philipp Kern patch from lenny package. stable/main/binary-powerpc/mydns-mysql_1.1.0-7etch1_powerpc.deb stable/main/binary-powerpc/mydns-pgsql_1.1.0-7etch1_powerpc.deb mydns (1:1.1.0-7etch1) stable-security; urgency=high * Fix for CVE-2007-2362 Multiple Remote Dynamic DNS Update Vulnerabilities. Philipp Kern patch from lenny package. stable/main/binary-s390/mydns-mysql_1.1.0-7etch1_s390.deb stable/main/binary-s390/mydns-pgsql_1.1.0-7etch1_s390.deb mydns (1:1.1.0-7etch1) stable-security; urgency=high * Fix for CVE-2007-2362 Multiple Remote Dynamic DNS Update Vulnerabilities. Philipp Kern patch from lenny package. stable/main/binary-sparc/mydns-mysql_1.1.0-7etch1_sparc.deb stable/main/binary-sparc/mydns-pgsql_1.1.0-7etch1_sparc.deb mydns (1:1.1.0-7etch1) stable-security; urgency=high * Fix for CVE-2007-2362 Multiple Remote Dynamic DNS Update Vulnerabilities. Philipp Kern patch from lenny package. stable/main/binary-alpha/libmysqlclient15off_5.0.32-7etch3_alpha.deb stable/main/binary-alpha/libmysqlclient15-dev_5.0.32-7etch3_alpha.deb stable/main/binary-alpha/mysql-client-5.0_5.0.32-7etch3_alpha.deb stable/main/binary-alpha/mysql-server-5.0_5.0.32-7etch3_alpha.deb stable/main/binary-alpha/mysql-server-4.1_5.0.32-7etch3_alpha.deb mysql-dfsg-5.0 (5.0.32-7etch3) stable-security; urgency=high * SECURITY: Fix for CVE-2007-5925: The convert_search_mode_to_innobase function in ha_innodb.cc in the InnoDB engine in MySQL 5.1.23-BK and earlier allows remote authenticated users to cause a denial of service (database crash) via a certain CONTAINS operation on an indexed column, which triggers an assertion error. (closes: #451235) stable/main/binary-amd64/libmysqlclient15off_5.0.32-7etch3_amd64.deb stable/main/binary-amd64/libmysqlclient15-dev_5.0.32-7etch3_amd64.deb stable/main/binary-amd64/mysql-client-5.0_5.0.32-7etch3_amd64.deb stable/main/binary-amd64/mysql-server-5.0_5.0.32-7etch3_amd64.deb stable/main/binary-amd64/mysql-server-4.1_5.0.32-7etch3_amd64.deb mysql-dfsg-5.0 (5.0.32-7etch3) stable-security; urgency=high * SECURITY: Fix for CVE-2007-5925: The convert_search_mode_to_innobase function in ha_innodb.cc in the InnoDB engine in MySQL 5.1.23-BK and earlier allows remote authenticated users to cause a denial of service (database crash) via a certain CONTAINS operation on an indexed column, which triggers an assertion error. (closes: #451235) stable/main/binary-arm/libmysqlclient15off_5.0.32-7etch3_arm.deb stable/main/binary-arm/libmysqlclient15-dev_5.0.32-7etch3_arm.deb stable/main/binary-arm/mysql-client-5.0_5.0.32-7etch3_arm.deb stable/main/binary-arm/mysql-server-5.0_5.0.32-7etch3_arm.deb stable/main/binary-arm/mysql-server-4.1_5.0.32-7etch3_arm.deb mysql-dfsg-5.0 (5.0.32-7etch3) stable-security; urgency=high * SECURITY: Fix for CVE-2007-5925: The convert_search_mode_to_innobase function in ha_innodb.cc in the InnoDB engine in MySQL 5.1.23-BK and earlier allows remote authenticated users to cause a denial of service (database crash) via a certain CONTAINS operation on an indexed column, which triggers an assertion error. (closes: #451235) stable/main/binary-hppa/libmysqlclient15off_5.0.32-7etch3_hppa.deb stable/main/binary-hppa/libmysqlclient15-dev_5.0.32-7etch3_hppa.deb stable/main/binary-hppa/mysql-client-5.0_5.0.32-7etch3_hppa.deb stable/main/binary-hppa/mysql-server-5.0_5.0.32-7etch3_hppa.deb stable/main/binary-hppa/mysql-server-4.1_5.0.32-7etch3_hppa.deb mysql-dfsg-5.0 (5.0.32-7etch3) stable-security; urgency=high * SECURITY: Fix for CVE-2007-5925: The convert_search_mode_to_innobase function in ha_innodb.cc in the InnoDB engine in MySQL 5.1.23-BK and earlier allows remote authenticated users to cause a denial of service (database crash) via a certain CONTAINS operation on an indexed column, which triggers an assertion error. (closes: #451235) stable/main/source/mysql-dfsg-5.0_5.0.32-7etch3.dsc stable/main/source/mysql-dfsg-5.0_5.0.32-7etch3.diff.gz stable/main/binary-all/mysql-common_5.0.32-7etch3_all.deb stable/main/binary-all/mysql-server_5.0.32-7etch3_all.deb stable/main/binary-all/mysql-client_5.0.32-7etch3_all.deb stable/main/binary-i386/libmysqlclient15off_5.0.32-7etch3_i386.deb stable/main/binary-i386/libmysqlclient15-dev_5.0.32-7etch3_i386.deb stable/main/binary-i386/mysql-client-5.0_5.0.32-7etch3_i386.deb stable/main/binary-i386/mysql-server-5.0_5.0.32-7etch3_i386.deb stable/main/binary-i386/mysql-server-4.1_5.0.32-7etch3_i386.deb mysql-dfsg-5.0 (5.0.32-7etch3) stable-security; urgency=high * SECURITY: Fix for CVE-2007-5925: The convert_search_mode_to_innobase function in ha_innodb.cc in the InnoDB engine in MySQL 5.1.23-BK and earlier allows remote authenticated users to cause a denial of service (database crash) via a certain CONTAINS operation on an indexed column, which triggers an assertion error. (closes: #451235) stable/main/binary-ia64/libmysqlclient15off_5.0.32-7etch3_ia64.deb stable/main/binary-ia64/libmysqlclient15-dev_5.0.32-7etch3_ia64.deb stable/main/binary-ia64/mysql-client-5.0_5.0.32-7etch3_ia64.deb stable/main/binary-ia64/mysql-server-5.0_5.0.32-7etch3_ia64.deb stable/main/binary-ia64/mysql-server-4.1_5.0.32-7etch3_ia64.deb mysql-dfsg-5.0 (5.0.32-7etch3) stable-security; urgency=high * SECURITY: Fix for CVE-2007-5925: The convert_search_mode_to_innobase function in ha_innodb.cc in the InnoDB engine in MySQL 5.1.23-BK and earlier allows remote authenticated users to cause a denial of service (database crash) via a certain CONTAINS operation on an indexed column, which triggers an assertion error. (closes: #451235) stable/main/binary-mips/libmysqlclient15off_5.0.32-7etch3_mips.deb stable/main/binary-mips/libmysqlclient15-dev_5.0.32-7etch3_mips.deb stable/main/binary-mips/mysql-client-5.0_5.0.32-7etch3_mips.deb stable/main/binary-mips/mysql-server-5.0_5.0.32-7etch3_mips.deb stable/main/binary-mips/mysql-server-4.1_5.0.32-7etch3_mips.deb mysql-dfsg-5.0 (5.0.32-7etch3) stable-security; urgency=high * SECURITY: Fix for CVE-2007-5925: The convert_search_mode_to_innobase function in ha_innodb.cc in the InnoDB engine in MySQL 5.1.23-BK and earlier allows remote authenticated users to cause a denial of service (database crash) via a certain CONTAINS operation on an indexed column, which triggers an assertion error. (closes: #451235) stable/main/binary-mipsel/libmysqlclient15off_5.0.32-7etch3_mipsel.deb stable/main/binary-mipsel/libmysqlclient15-dev_5.0.32-7etch3_mipsel.deb stable/main/binary-mipsel/mysql-client-5.0_5.0.32-7etch3_mipsel.deb stable/main/binary-mipsel/mysql-server-5.0_5.0.32-7etch3_mipsel.deb stable/main/binary-mipsel/mysql-server-4.1_5.0.32-7etch3_mipsel.deb mysql-dfsg-5.0 (5.0.32-7etch3) stable-security; urgency=high * SECURITY: Fix for CVE-2007-5925: The convert_search_mode_to_innobase function in ha_innodb.cc in the InnoDB engine in MySQL 5.1.23-BK and earlier allows remote authenticated users to cause a denial of service (database crash) via a certain CONTAINS operation on an indexed column, which triggers an assertion error. (closes: #451235) stable/main/binary-powerpc/libmysqlclient15off_5.0.32-7etch3_powerpc.deb stable/main/binary-powerpc/libmysqlclient15-dev_5.0.32-7etch3_powerpc.deb stable/main/binary-powerpc/mysql-client-5.0_5.0.32-7etch3_powerpc.deb stable/main/binary-powerpc/mysql-server-5.0_5.0.32-7etch3_powerpc.deb stable/main/binary-powerpc/mysql-server-4.1_5.0.32-7etch3_powerpc.deb mysql-dfsg-5.0 (5.0.32-7etch3) stable-security; urgency=high * SECURITY: Fix for CVE-2007-5925: The convert_search_mode_to_innobase function in ha_innodb.cc in the InnoDB engine in MySQL 5.1.23-BK and earlier allows remote authenticated users to cause a denial of service (database crash) via a certain CONTAINS operation on an indexed column, which triggers an assertion error. (closes: #451235) stable/main/binary-s390/libmysqlclient15off_5.0.32-7etch3_s390.deb stable/main/binary-s390/libmysqlclient15-dev_5.0.32-7etch3_s390.deb stable/main/binary-s390/mysql-client-5.0_5.0.32-7etch3_s390.deb stable/main/binary-s390/mysql-server-5.0_5.0.32-7etch3_s390.deb stable/main/binary-s390/mysql-server-4.1_5.0.32-7etch3_s390.deb mysql-dfsg-5.0 (5.0.32-7etch3) stable-security; urgency=high * SECURITY: Fix for CVE-2007-5925: The convert_search_mode_to_innobase function in ha_innodb.cc in the InnoDB engine in MySQL 5.1.23-BK and earlier allows remote authenticated users to cause a denial of service (database crash) via a certain CONTAINS operation on an indexed column, which triggers an assertion error. (closes: #451235) stable/main/binary-sparc/libmysqlclient15off_5.0.32-7etch3_sparc.deb stable/main/binary-sparc/libmysqlclient15-dev_5.0.32-7etch3_sparc.deb stable/main/binary-sparc/mysql-client-5.0_5.0.32-7etch3_sparc.deb stable/main/binary-sparc/mysql-server-5.0_5.0.32-7etch3_sparc.deb stable/main/binary-sparc/mysql-server-4.1_5.0.32-7etch3_sparc.deb mysql-dfsg-5.0 (5.0.32-7etch3) stable-security; urgency=high * SECURITY: Fix for CVE-2007-5925: The convert_search_mode_to_innobase function in ha_innodb.cc in the InnoDB engine in MySQL 5.1.23-BK and earlier allows remote authenticated users to cause a denial of service (database crash) via a certain CONTAINS operation on an indexed column, which triggers an assertion error. (closes: #451235) stable/main/binary-alpha/libopal-2.2.0_2.2.3.dfsg-3+etch1_alpha.deb stable/main/binary-alpha/libopal-dev_2.2.3.dfsg-3+etch1_alpha.deb stable/main/binary-alpha/simpleopal_2.2.3.dfsg-3+etch1_alpha.deb stable/main/binary-alpha/libopal-dbg_2.2.3.dfsg-3+etch1_alpha.deb opal (2.2.3.dfsg-3+etch1) proposed-updates; urgency=high * Fix CVE-2007-4924: OPAL allows remote attackers to cause a denial of service (crash) via an invalid Content-Length header field in Session Initiation Protocol (SIP) packets, which causes a \0 byte to be written to an "attacker-controlled address." (Closes: #454141) stable/main/binary-amd64/libopal-2.2.0_2.2.3.dfsg-3+etch1_amd64.deb stable/main/binary-amd64/libopal-dev_2.2.3.dfsg-3+etch1_amd64.deb stable/main/binary-amd64/simpleopal_2.2.3.dfsg-3+etch1_amd64.deb stable/main/binary-amd64/libopal-dbg_2.2.3.dfsg-3+etch1_amd64.deb opal (2.2.3.dfsg-3+etch1) proposed-updates; urgency=high * Fix CVE-2007-4924: OPAL allows remote attackers to cause a denial of service (crash) via an invalid Content-Length header field in Session Initiation Protocol (SIP) packets, which causes a \0 byte to be written to an "attacker-controlled address." (Closes: #454141) stable/main/binary-arm/libopal-2.2.0_2.2.3.dfsg-3+etch1_arm.deb stable/main/binary-arm/libopal-dev_2.2.3.dfsg-3+etch1_arm.deb stable/main/binary-arm/simpleopal_2.2.3.dfsg-3+etch1_arm.deb stable/main/binary-arm/libopal-dbg_2.2.3.dfsg-3+etch1_arm.deb opal (2.2.3.dfsg-3+etch1) proposed-updates; urgency=high * Fix CVE-2007-4924: OPAL allows remote attackers to cause a denial of service (crash) via an invalid Content-Length header field in Session Initiation Protocol (SIP) packets, which causes a \0 byte to be written to an "attacker-controlled address." (Closes: #454141) stable/main/binary-hppa/libopal-2.2.0_2.2.3.dfsg-3+etch1_hppa.deb stable/main/binary-hppa/libopal-dev_2.2.3.dfsg-3+etch1_hppa.deb stable/main/binary-hppa/simpleopal_2.2.3.dfsg-3+etch1_hppa.deb stable/main/binary-hppa/libopal-dbg_2.2.3.dfsg-3+etch1_hppa.deb opal (2.2.3.dfsg-3+etch1) proposed-updates; urgency=high * Fix CVE-2007-4924: OPAL allows remote attackers to cause a denial of service (crash) via an invalid Content-Length header field in Session Initiation Protocol (SIP) packets, which causes a \0 byte to be written to an "attacker-controlled address." (Closes: #454141) stable/main/source/opal_2.2.3.dfsg-3+etch1.dsc stable/main/source/opal_2.2.3.dfsg-3+etch1.diff.gz stable/main/binary-i386/libopal-2.2.0_2.2.3.dfsg-3+etch1_i386.deb stable/main/binary-i386/libopal-dev_2.2.3.dfsg-3+etch1_i386.deb stable/main/binary-i386/simpleopal_2.2.3.dfsg-3+etch1_i386.deb stable/main/binary-i386/libopal-dbg_2.2.3.dfsg-3+etch1_i386.deb stable/main/binary-all/libopal-doc_2.2.3.dfsg-3+etch1_all.deb opal (2.2.3.dfsg-3+etch1) proposed-updates; urgency=high * Fix CVE-2007-4924: OPAL allows remote attackers to cause a denial of service (crash) via an invalid Content-Length header field in Session Initiation Protocol (SIP) packets, which causes a \0 byte to be written to an "attacker-controlled address." (Closes: #454141) stable/main/binary-ia64/libopal-2.2.0_2.2.3.dfsg-3+etch1_ia64.deb stable/main/binary-ia64/libopal-dev_2.2.3.dfsg-3+etch1_ia64.deb stable/main/binary-ia64/simpleopal_2.2.3.dfsg-3+etch1_ia64.deb stable/main/binary-ia64/libopal-dbg_2.2.3.dfsg-3+etch1_ia64.deb opal (2.2.3.dfsg-3+etch1) proposed-updates; urgency=high * Fix CVE-2007-4924: OPAL allows remote attackers to cause a denial of service (crash) via an invalid Content-Length header field in Session Initiation Protocol (SIP) packets, which causes a \0 byte to be written to an "attacker-controlled address." (Closes: #454141) stable/main/binary-mips/libopal-2.2.0_2.2.3.dfsg-3+etch1_mips.deb stable/main/binary-mips/libopal-dev_2.2.3.dfsg-3+etch1_mips.deb stable/main/binary-mips/simpleopal_2.2.3.dfsg-3+etch1_mips.deb stable/main/binary-mips/libopal-dbg_2.2.3.dfsg-3+etch1_mips.deb opal (2.2.3.dfsg-3+etch1) proposed-updates; urgency=high * Fix CVE-2007-4924: OPAL allows remote attackers to cause a denial of service (crash) via an invalid Content-Length header field in Session Initiation Protocol (SIP) packets, which causes a \0 byte to be written to an "attacker-controlled address." (Closes: #454141) stable/main/binary-mipsel/libopal-2.2.0_2.2.3.dfsg-3+etch1_mipsel.deb stable/main/binary-mipsel/libopal-dev_2.2.3.dfsg-3+etch1_mipsel.deb stable/main/binary-mipsel/simpleopal_2.2.3.dfsg-3+etch1_mipsel.deb stable/main/binary-mipsel/libopal-dbg_2.2.3.dfsg-3+etch1_mipsel.deb opal (2.2.3.dfsg-3+etch1) proposed-updates; urgency=high * Fix CVE-2007-4924: OPAL allows remote attackers to cause a denial of service (crash) via an invalid Content-Length header field in Session Initiation Protocol (SIP) packets, which causes a \0 byte to be written to an "attacker-controlled address." (Closes: #454141) stable/main/binary-powerpc/libopal-2.2.0_2.2.3.dfsg-3+etch1_powerpc.deb stable/main/binary-powerpc/libopal-dev_2.2.3.dfsg-3+etch1_powerpc.deb stable/main/binary-powerpc/simpleopal_2.2.3.dfsg-3+etch1_powerpc.deb stable/main/binary-powerpc/libopal-dbg_2.2.3.dfsg-3+etch1_powerpc.deb opal (2.2.3.dfsg-3+etch1) proposed-updates; urgency=high * Fix CVE-2007-4924: OPAL allows remote attackers to cause a denial of service (crash) via an invalid Content-Length header field in Session Initiation Protocol (SIP) packets, which causes a \0 byte to be written to an "attacker-controlled address." (Closes: #454141) stable/main/binary-s390/libopal-2.2.0_2.2.3.dfsg-3+etch1_s390.deb stable/main/binary-s390/libopal-dev_2.2.3.dfsg-3+etch1_s390.deb stable/main/binary-s390/simpleopal_2.2.3.dfsg-3+etch1_s390.deb stable/main/binary-s390/libopal-dbg_2.2.3.dfsg-3+etch1_s390.deb opal (2.2.3.dfsg-3+etch1) proposed-updates; urgency=high * Fix CVE-2007-4924: OPAL allows remote attackers to cause a denial of service (crash) via an invalid Content-Length header field in Session Initiation Protocol (SIP) packets, which causes a \0 byte to be written to an "attacker-controlled address." (Closes: #454141) stable/main/binary-sparc/libopal-2.2.0_2.2.3.dfsg-3+etch1_sparc.deb stable/main/binary-sparc/libopal-dev_2.2.3.dfsg-3+etch1_sparc.deb stable/main/binary-sparc/simpleopal_2.2.3.dfsg-3+etch1_sparc.deb stable/main/binary-sparc/libopal-dbg_2.2.3.dfsg-3+etch1_sparc.deb opal (2.2.3.dfsg-3+etch1) proposed-updates; urgency=high * Fix CVE-2007-4924: OPAL allows remote attackers to cause a denial of service (crash) via an invalid Content-Length header field in Session Initiation Protocol (SIP) packets, which causes a \0 byte to be written to an "attacker-controlled address." (Closes: #454141) stable/main/binary-alpha/libmythes-dev_2.0.4.dfsg.2-7etch4_alpha.deb openoffice.org (2.0.4.dfsg.2-7etch4) stable-security; urgency=high * ooo-build/patches/src680//cws-hsql1808.diff: fix CVE-2007-4575 * debian/rules: bump hsqldb dependency in the system-hsqldb case to the fixed hsqldb we need stable/main/source/openoffice.org_2.0.4.dfsg.2-7etch4.dsc stable/main/source/openoffice.org_2.0.4.dfsg.2-7etch4.diff.gz stable/main/binary-amd64/openoffice.org_2.0.4.dfsg.2-7etch4_amd64.deb stable/main/binary-amd64/openoffice.org-core_2.0.4.dfsg.2-7etch4_amd64.deb stable/main/binary-amd64/openoffice.org-writer_2.0.4.dfsg.2-7etch4_amd64.deb stable/main/binary-amd64/openoffice.org-calc_2.0.4.dfsg.2-7etch4_amd64.deb stable/main/binary-amd64/openoffice.org-impress_2.0.4.dfsg.2-7etch4_amd64.deb stable/main/binary-amd64/openoffice.org-draw_2.0.4.dfsg.2-7etch4_amd64.deb stable/main/binary-amd64/openoffice.org-math_2.0.4.dfsg.2-7etch4_amd64.deb stable/main/binary-amd64/openoffice.org-base_2.0.4.dfsg.2-7etch4_amd64.deb stable/main/binary-amd64/openoffice.org-kde_2.0.4.dfsg.2-7etch4_amd64.deb stable/main/binary-amd64/openoffice.org-gtk_2.0.4.dfsg.2-7etch4_amd64.deb stable/main/binary-amd64/openoffice.org-gnome_2.0.4.dfsg.2-7etch4_amd64.deb stable/main/binary-amd64/openoffice.org-evolution_2.0.4.dfsg.2-7etch4_amd64.deb stable/main/binary-amd64/python-uno_2.0.4.dfsg.2-7etch4_amd64.deb stable/main/binary-amd64/openoffice.org-officebean_2.0.4.dfsg.2-7etch4_amd64.deb stable/main/binary-amd64/openoffice.org-filter-so52_2.0.4.dfsg.2-7etch4_amd64.deb stable/main/binary-amd64/openoffice.org-dev_2.0.4.dfsg.2-7etch4_amd64.deb stable/main/binary-amd64/libmythes-dev_2.0.4.dfsg.2-7etch4_amd64.deb stable/main/binary-amd64/openoffice.org-gcj_2.0.4.dfsg.2-7etch4_amd64.deb stable/main/binary-amd64/openoffice.org-qa-tools_2.0.4.dfsg.2-7etch4_amd64.deb stable/main/binary-amd64/openoffice.org-dbg_2.0.4.dfsg.2-7etch4_amd64.deb stable/main/binary-amd64/openoffice.org-gtk-gnome_2.0.4.dfsg.2-7etch4_amd64.deb stable/main/binary-all/broffice.org_2.0.4.dfsg.2-7etch4_all.deb stable/main/binary-all/openoffice.org-l10n-za_2.0.4.dfsg.2-7etch4_all.deb stable/main/binary-all/openoffice.org-l10n-in_2.0.4.dfsg.2-7etch4_all.deb stable/main/binary-all/openoffice.org-common_2.0.4.dfsg.2-7etch4_all.deb stable/main/binary-all/openoffice.org-java-common_2.0.4.dfsg.2-7etch4_all.deb stable/main/binary-all/openoffice.org-filter-mobiledev_2.0.4.dfsg.2-7etch4_all.deb stable/main/binary-all/openoffice.org-dev-doc_2.0.4.dfsg.2-7etch4_all.deb stable/main/binary-all/ttf-opensymbol_2.0.4.dfsg.2-7etch4_all.deb stable/main/binary-all/openoffice.org-dtd-officedocument1.0_2.0.4.dfsg.2-7etch4_all.deb stable/main/binary-all/openoffice.org-l10n-af_2.0.4.dfsg.2-7etch4_all.deb stable/main/binary-all/openoffice.org-l10n-as-in_2.0.4.dfsg.2-7etch4_all.deb stable/main/binary-all/openoffice.org-l10n-be-by_2.0.4.dfsg.2-7etch4_all.deb stable/main/binary-all/openoffice.org-l10n-bg_2.0.4.dfsg.2-7etch4_all.deb stable/main/binary-all/openoffice.org-l10n-bn_2.0.4.dfsg.2-7etch4_all.deb stable/main/binary-all/openoffice.org-l10n-br_2.0.4.dfsg.2-7etch4_all.deb stable/main/binary-all/openoffice.org-l10n-bs_2.0.4.dfsg.2-7etch4_all.deb stable/main/binary-all/openoffice.org-l10n-ca_2.0.4.dfsg.2-7etch4_all.deb stable/main/binary-all/openoffice.org-l10n-cs_2.0.4.dfsg.2-7etch4_all.deb stable/main/binary-all/openoffice.org-l10n-cy_2.0.4.dfsg.2-7etch4_all.deb stable/main/binary-all/openoffice.org-l10n-da_2.0.4.dfsg.2-7etch4_all.deb stable/main/binary-all/openoffice.org-l10n-de_2.0.4.dfsg.2-7etch4_all.deb stable/main/binary-all/openoffice.org-l10n-dz_2.0.4.dfsg.2-7etch4_all.deb stable/main/binary-all/openoffice.org-l10n-el_2.0.4.dfsg.2-7etch4_all.deb stable/main/binary-all/openoffice.org-l10n-en-gb_2.0.4.dfsg.2-7etch4_all.deb stable/main/binary-all/openoffice.org-l10n-en-za_2.0.4.dfsg.2-7etch4_all.deb stable/main/binary-all/openoffice.org-l10n-eo_2.0.4.dfsg.2-7etch4_all.deb stable/main/binary-all/openoffice.org-l10n-es_2.0.4.dfsg.2-7etch4_all.deb stable/main/binary-all/openoffice.org-l10n-et_2.0.4.dfsg.2-7etch4_all.deb stable/main/binary-all/openoffice.org-l10n-fa_2.0.4.dfsg.2-7etch4_all.deb stable/main/binary-all/openoffice.org-l10n-fi_2.0.4.dfsg.2-7etch4_all.deb stable/main/binary-all/openoffice.org-l10n-fr_2.0.4.dfsg.2-7etch4_all.deb stable/main/binary-all/openoffice.org-l10n-ga_2.0.4.dfsg.2-7etch4_all.deb stable/main/binary-all/openoffice.org-l10n-gu-in_2.0.4.dfsg.2-7etch4_all.deb stable/main/binary-all/openoffice.org-l10n-he_2.0.4.dfsg.2-7etch4_all.deb stable/main/binary-all/openoffice.org-l10n-hi-in_2.0.4.dfsg.2-7etch4_all.deb stable/main/binary-all/openoffice.org-l10n-hr_2.0.4.dfsg.2-7etch4_all.deb stable/main/binary-all/openoffice.org-l10n-hu_2.0.4.dfsg.2-7etch4_all.deb stable/main/binary-all/openoffice.org-l10n-it_2.0.4.dfsg.2-7etch4_all.deb stable/main/binary-all/openoffice.org-l10n-ja_2.0.4.dfsg.2-7etch4_all.deb stable/main/binary-all/openoffice.org-l10n-ka_2.0.4.dfsg.2-7etch4_all.deb stable/main/binary-all/openoffice.org-l10n-km_2.0.4.dfsg.2-7etch4_all.deb stable/main/binary-all/openoffice.org-l10n-ko_2.0.4.dfsg.2-7etch4_all.deb stable/main/binary-all/openoffice.org-l10n-ku_2.0.4.dfsg.2-7etch4_all.deb stable/main/binary-all/openoffice.org-l10n-lo_2.0.4.dfsg.2-7etch4_all.deb stable/main/binary-all/openoffice.org-l10n-lt_2.0.4.dfsg.2-7etch4_all.deb stable/main/binary-all/openoffice.org-l10n-lv_2.0.4.dfsg.2-7etch4_all.deb stable/main/binary-all/openoffice.org-l10n-mk_2.0.4.dfsg.2-7etch4_all.deb stable/main/binary-all/openoffice.org-l10n-ml-in_2.0.4.dfsg.2-7etch4_all.deb stable/main/binary-all/openoffice.org-l10n-nb_2.0.4.dfsg.2-7etch4_all.deb stable/main/binary-all/openoffice.org-l10n-ne_2.0.4.dfsg.2-7etch4_all.deb stable/main/binary-all/openoffice.org-l10n-nl_2.0.4.dfsg.2-7etch4_all.deb stable/main/binary-all/openoffice.org-l10n-nn_2.0.4.dfsg.2-7etch4_all.deb stable/main/binary-all/openoffice.org-l10n-nr_2.0.4.dfsg.2-7etch4_all.deb stable/main/binary-all/openoffice.org-l10n-ns_2.0.4.dfsg.2-7etch4_all.deb stable/main/binary-all/openoffice.org-l10n-or-in_2.0.4.dfsg.2-7etch4_all.deb stable/main/binary-all/openoffice.org-l10n-pa-in_2.0.4.dfsg.2-7etch4_all.deb stable/main/binary-all/openoffice.org-l10n-pl_2.0.4.dfsg.2-7etch4_all.deb stable/main/binary-all/openoffice.org-l10n-pt_2.0.4.dfsg.2-7etch4_all.deb stable/main/binary-all/openoffice.org-l10n-pt-br_2.0.4.dfsg.2-7etch4_all.deb stable/main/binary-all/openoffice.org-l10n-ru_2.0.4.dfsg.2-7etch4_all.deb stable/main/binary-all/openoffice.org-l10n-rw_2.0.4.dfsg.2-7etch4_all.deb stable/main/binary-all/openoffice.org-l10n-sk_2.0.4.dfsg.2-7etch4_all.deb stable/main/binary-all/openoffice.org-l10n-sl_2.0.4.dfsg.2-7etch4_all.deb stable/main/binary-all/openoffice.org-l10n-sr-cs_2.0.4.dfsg.2-7etch4_all.deb stable/main/binary-all/openoffice.org-l10n-ss_2.0.4.dfsg.2-7etch4_all.deb stable/main/binary-all/openoffice.org-l10n-st_2.0.4.dfsg.2-7etch4_all.deb stable/main/binary-all/openoffice.org-l10n-sv_2.0.4.dfsg.2-7etch4_all.deb stable/main/binary-all/openoffice.org-l10n-ta-in_2.0.4.dfsg.2-7etch4_all.deb stable/main/binary-all/openoffice.org-l10n-te-in_2.0.4.dfsg.2-7etch4_all.deb stable/main/binary-all/openoffice.org-l10n-tg_2.0.4.dfsg.2-7etch4_all.deb stable/main/binary-all/openoffice.org-l10n-th_2.0.4.dfsg.2-7etch4_all.deb stable/main/binary-all/openoffice.org-l10n-tn_2.0.4.dfsg.2-7etch4_all.deb stable/main/binary-all/openoffice.org-l10n-tr_2.0.4.dfsg.2-7etch4_all.deb stable/main/binary-all/openoffice.org-l10n-ts_2.0.4.dfsg.2-7etch4_all.deb stable/main/binary-all/openoffice.org-l10n-uk_2.0.4.dfsg.2-7etch4_all.deb stable/main/binary-all/openoffice.org-l10n-ve_2.0.4.dfsg.2-7etch4_all.deb stable/main/binary-all/openoffice.org-l10n-vi_2.0.4.dfsg.2-7etch4_all.deb stable/main/binary-all/openoffice.org-l10n-xh_2.0.4.dfsg.2-7etch4_all.deb stable/main/binary-all/openoffice.org-l10n-zh-cn_2.0.4.dfsg.2-7etch4_all.deb stable/main/binary-all/openoffice.org-l10n-zh-tw_2.0.4.dfsg.2-7etch4_all.deb stable/main/binary-all/openoffice.org-l10n-zu_2.0.4.dfsg.2-7etch4_all.deb stable/main/binary-all/openoffice.org-help-en-us_2.0.4.dfsg.2-7etch4_all.deb stable/main/binary-all/openoffice.org-help-cs_2.0.4.dfsg.2-7etch4_all.deb stable/main/binary-all/openoffice.org-help-da_2.0.4.dfsg.2-7etch4_all.deb stable/main/binary-all/openoffice.org-help-de_2.0.4.dfsg.2-7etch4_all.deb stable/main/binary-all/openoffice.org-help-dz_2.0.4.dfsg.2-7etch4_all.deb stable/main/binary-all/openoffice.org-help-en-gb_2.0.4.dfsg.2-7etch4_all.deb stable/main/binary-all/openoffice.org-help-es_2.0.4.dfsg.2-7etch4_all.deb stable/main/binary-all/openoffice.org-help-et_2.0.4.dfsg.2-7etch4_all.deb stable/main/binary-all/openoffice.org-help-fr_2.0.4.dfsg.2-7etch4_all.deb stable/main/binary-all/openoffice.org-help-hi-in_2.0.4.dfsg.2-7etch4_all.deb stable/main/binary-all/openoffice.org-help-hu_2.0.4.dfsg.2-7etch4_all.deb stable/main/binary-all/openoffice.org-help-it_2.0.4.dfsg.2-7etch4_all.deb stable/main/binary-all/openoffice.org-help-ja_2.0.4.dfsg.2-7etch4_all.deb stable/main/binary-all/openoffice.org-help-km_2.0.4.dfsg.2-7etch4_all.deb stable/main/binary-all/openoffice.org-help-ko_2.0.4.dfsg.2-7etch4_all.deb stable/main/binary-all/openoffice.org-help-nl_2.0.4.dfsg.2-7etch4_all.deb stable/main/binary-all/openoffice.org-help-pl_2.0.4.dfsg.2-7etch4_all.deb stable/main/binary-all/openoffice.org-help-pt-br_2.0.4.dfsg.2-7etch4_all.deb stable/main/binary-all/openoffice.org-help-ru_2.0.4.dfsg.2-7etch4_all.deb stable/main/binary-all/openoffice.org-help-sl_2.0.4.dfsg.2-7etch4_all.deb stable/main/binary-all/openoffice.org-help-sv_2.0.4.dfsg.2-7etch4_all.deb stable/main/binary-all/openoffice.org-help-zh-cn_2.0.4.dfsg.2-7etch4_all.deb stable/main/binary-all/openoffice.org-help-zh-tw_2.0.4.dfsg.2-7etch4_all.deb stable/main/binary-all/openoffice.org-qa-api-tests_2.0.4.dfsg.2-7etch4_all.deb stable/main/binary-all/openoffice.org-l10n-hi_2.0.4.dfsg.2-7etch4_all.deb stable/main/binary-all/openoffice.org-help-en_2.0.4.dfsg.2-7etch4_all.deb openoffice.org (2.0.4.dfsg.2-7etch4) stable-security; urgency=high * ooo-build/patches/src680//cws-hsql1808.diff: fix CVE-2007-4575 * debian/rules: bump hsqldb dependency in the system-hsqldb case to the fixed hsqldb we need stable/main/binary-arm/libmythes-dev_2.0.4.dfsg.2-7etch4_arm.deb openoffice.org (2.0.4.dfsg.2-7etch4) stable-security; urgency=high * ooo-build/patches/src680//cws-hsql1808.diff: fix CVE-2007-4575 * debian/rules: bump hsqldb dependency in the system-hsqldb case to the fixed hsqldb we need stable/main/binary-hppa/libmythes-dev_2.0.4.dfsg.2-7etch4_hppa.deb openoffice.org (2.0.4.dfsg.2-7etch4) stable-security; urgency=high * ooo-build/patches/src680//cws-hsql1808.diff: fix CVE-2007-4575 * debian/rules: bump hsqldb dependency in the system-hsqldb case to the fixed hsqldb we need stable/main/binary-i386/openoffice.org_2.0.4.dfsg.2-7etch4_i386.deb stable/main/binary-i386/openoffice.org-core_2.0.4.dfsg.2-7etch4_i386.deb stable/main/binary-i386/openoffice.org-writer_2.0.4.dfsg.2-7etch4_i386.deb stable/main/binary-i386/openoffice.org-calc_2.0.4.dfsg.2-7etch4_i386.deb stable/main/binary-i386/openoffice.org-impress_2.0.4.dfsg.2-7etch4_i386.deb stable/main/binary-i386/openoffice.org-draw_2.0.4.dfsg.2-7etch4_i386.deb stable/main/binary-i386/openoffice.org-math_2.0.4.dfsg.2-7etch4_i386.deb stable/main/binary-i386/openoffice.org-base_2.0.4.dfsg.2-7etch4_i386.deb stable/main/binary-i386/openoffice.org-kde_2.0.4.dfsg.2-7etch4_i386.deb stable/main/binary-i386/openoffice.org-gtk_2.0.4.dfsg.2-7etch4_i386.deb stable/main/binary-i386/openoffice.org-gnome_2.0.4.dfsg.2-7etch4_i386.deb stable/main/binary-i386/openoffice.org-evolution_2.0.4.dfsg.2-7etch4_i386.deb stable/main/binary-i386/python-uno_2.0.4.dfsg.2-7etch4_i386.deb stable/main/binary-i386/openoffice.org-officebean_2.0.4.dfsg.2-7etch4_i386.deb stable/main/binary-i386/openoffice.org-filter-so52_2.0.4.dfsg.2-7etch4_i386.deb stable/main/binary-i386/openoffice.org-dev_2.0.4.dfsg.2-7etch4_i386.deb stable/main/binary-i386/libmythes-dev_2.0.4.dfsg.2-7etch4_i386.deb stable/main/binary-i386/openoffice.org-gcj_2.0.4.dfsg.2-7etch4_i386.deb stable/main/binary-i386/openoffice.org-qa-tools_2.0.4.dfsg.2-7etch4_i386.deb stable/main/binary-i386/openoffice.org-dbg_2.0.4.dfsg.2-7etch4_i386.deb stable/main/binary-i386/openoffice.org-gtk-gnome_2.0.4.dfsg.2-7etch4_i386.deb openoffice.org (2.0.4.dfsg.2-7etch4) stable-security; urgency=high * ooo-build/patches/src680//cws-hsql1808.diff: fix CVE-2007-4575 * debian/rules: bump hsqldb dependency in the system-hsqldb case to the fixed hsqldb we need stable/main/binary-ia64/libmythes-dev_2.0.4.dfsg.2-7etch4_ia64.deb openoffice.org (2.0.4.dfsg.2-7etch4) stable-security; urgency=high * ooo-build/patches/src680//cws-hsql1808.diff: fix CVE-2007-4575 * debian/rules: bump hsqldb dependency in the system-hsqldb case to the fixed hsqldb we need stable/main/binary-mips/libmythes-dev_2.0.4.dfsg.2-7etch4_mips.deb openoffice.org (2.0.4.dfsg.2-7etch4) stable-security; urgency=high * ooo-build/patches/src680//cws-hsql1808.diff: fix CVE-2007-4575 * debian/rules: bump hsqldb dependency in the system-hsqldb case to the fixed hsqldb we need stable/main/binary-mipsel/libmythes-dev_2.0.4.dfsg.2-7etch4_mipsel.deb openoffice.org (2.0.4.dfsg.2-7etch4) stable-security; urgency=high * ooo-build/patches/src680//cws-hsql1808.diff: fix CVE-2007-4575 * debian/rules: bump hsqldb dependency in the system-hsqldb case to the fixed hsqldb we need stable/main/binary-powerpc/openoffice.org_2.0.4.dfsg.2-7etch4_powerpc.deb stable/main/binary-powerpc/openoffice.org-core_2.0.4.dfsg.2-7etch4_powerpc.deb stable/main/binary-powerpc/openoffice.org-writer_2.0.4.dfsg.2-7etch4_powerpc.deb stable/main/binary-powerpc/openoffice.org-calc_2.0.4.dfsg.2-7etch4_powerpc.deb stable/main/binary-powerpc/openoffice.org-impress_2.0.4.dfsg.2-7etch4_powerpc.deb stable/main/binary-powerpc/openoffice.org-draw_2.0.4.dfsg.2-7etch4_powerpc.deb stable/main/binary-powerpc/openoffice.org-math_2.0.4.dfsg.2-7etch4_powerpc.deb stable/main/binary-powerpc/openoffice.org-base_2.0.4.dfsg.2-7etch4_powerpc.deb stable/main/binary-powerpc/openoffice.org-kde_2.0.4.dfsg.2-7etch4_powerpc.deb stable/main/binary-powerpc/openoffice.org-gtk_2.0.4.dfsg.2-7etch4_powerpc.deb stable/main/binary-powerpc/openoffice.org-gnome_2.0.4.dfsg.2-7etch4_powerpc.deb stable/main/binary-powerpc/openoffice.org-evolution_2.0.4.dfsg.2-7etch4_powerpc.deb stable/main/binary-powerpc/python-uno_2.0.4.dfsg.2-7etch4_powerpc.deb stable/main/binary-powerpc/openoffice.org-officebean_2.0.4.dfsg.2-7etch4_powerpc.deb stable/main/binary-powerpc/openoffice.org-filter-so52_2.0.4.dfsg.2-7etch4_powerpc.deb stable/main/binary-powerpc/openoffice.org-dev_2.0.4.dfsg.2-7etch4_powerpc.deb stable/main/binary-powerpc/libmythes-dev_2.0.4.dfsg.2-7etch4_powerpc.deb stable/main/binary-powerpc/openoffice.org-gcj_2.0.4.dfsg.2-7etch4_powerpc.deb stable/main/binary-powerpc/openoffice.org-qa-tools_2.0.4.dfsg.2-7etch4_powerpc.deb stable/main/binary-powerpc/openoffice.org-dbg_2.0.4.dfsg.2-7etch4_powerpc.deb stable/main/binary-powerpc/openoffice.org-gtk-gnome_2.0.4.dfsg.2-7etch4_powerpc.deb openoffice.org (2.0.4.dfsg.2-7etch4) stable-security; urgency=high * ooo-build/patches/src680//cws-hsql1808.diff: fix CVE-2007-4575 * debian/rules: bump hsqldb dependency in the system-hsqldb case to the fixed hsqldb we need stable/main/binary-s390/libmythes-dev_2.0.4.dfsg.2-7etch4_s390.deb openoffice.org (2.0.4.dfsg.2-7etch4) stable-security; urgency=high * ooo-build/patches/src680//cws-hsql1808.diff: fix CVE-2007-4575 * debian/rules: bump hsqldb dependency in the system-hsqldb case to the fixed hsqldb we need stable/main/binary-sparc/openoffice.org_2.0.4.dfsg.2-7etch4_sparc.deb stable/main/binary-sparc/openoffice.org-core_2.0.4.dfsg.2-7etch4_sparc.deb stable/main/binary-sparc/openoffice.org-writer_2.0.4.dfsg.2-7etch4_sparc.deb stable/main/binary-sparc/openoffice.org-calc_2.0.4.dfsg.2-7etch4_sparc.deb stable/main/binary-sparc/openoffice.org-impress_2.0.4.dfsg.2-7etch4_sparc.deb stable/main/binary-sparc/openoffice.org-draw_2.0.4.dfsg.2-7etch4_sparc.deb stable/main/binary-sparc/openoffice.org-math_2.0.4.dfsg.2-7etch4_sparc.deb stable/main/binary-sparc/openoffice.org-base_2.0.4.dfsg.2-7etch4_sparc.deb stable/main/binary-sparc/openoffice.org-kde_2.0.4.dfsg.2-7etch4_sparc.deb stable/main/binary-sparc/openoffice.org-gtk_2.0.4.dfsg.2-7etch4_sparc.deb stable/main/binary-sparc/openoffice.org-gnome_2.0.4.dfsg.2-7etch4_sparc.deb stable/main/binary-sparc/openoffice.org-evolution_2.0.4.dfsg.2-7etch4_sparc.deb stable/main/binary-sparc/python-uno_2.0.4.dfsg.2-7etch4_sparc.deb stable/main/binary-sparc/openoffice.org-officebean_2.0.4.dfsg.2-7etch4_sparc.deb stable/main/binary-sparc/openoffice.org-filter-so52_2.0.4.dfsg.2-7etch4_sparc.deb stable/main/binary-sparc/openoffice.org-dev_2.0.4.dfsg.2-7etch4_sparc.deb stable/main/binary-sparc/libmythes-dev_2.0.4.dfsg.2-7etch4_sparc.deb stable/main/binary-sparc/openoffice.org-gcj_2.0.4.dfsg.2-7etch4_sparc.deb stable/main/binary-sparc/openoffice.org-qa-tools_2.0.4.dfsg.2-7etch4_sparc.deb stable/main/binary-sparc/openoffice.org-dbg_2.0.4.dfsg.2-7etch4_sparc.deb stable/main/binary-sparc/openoffice.org-gtk-gnome_2.0.4.dfsg.2-7etch4_sparc.deb openoffice.org (2.0.4.dfsg.2-7etch4) stable-security; urgency=high * ooo-build/patches/src680//cws-hsql1808.diff: fix CVE-2007-4575 * debian/rules: bump hsqldb dependency in the system-hsqldb case to the fixed hsqldb we need stable/main/binary-arm/libopenthreads-dev_1.2.0-2+b2_arm.deb stable/main/binary-arm/libopenthreads4_1.2.0-2+b2_arm.deb stable/main/binary-arm/libopenscenegraph-dev_1.2.0-2+b2_arm.deb stable/main/binary-arm/libopenscenegraph4_1.2.0-2+b2_arm.deb stable/main/binary-arm/libproducer-dev_1.2.0-2+b2_arm.deb stable/main/binary-arm/libproducer4_1.2.0-2+b2_arm.deb stable/main/binary-arm/openscenegraph_1.2.0-2+b2_arm.deb openscenegraph (1.2.0-2+b2) stable; urgency=low * Binary-only non-maintainer upload for arm; no source changes. * Rebuild against lib3ds-dev 1.2.0-4.1+etch1, to propagate the fix for bug #399761 stable/main/binary-hppa/libopenthreads-dev_1.2.0-2+b2_hppa.deb stable/main/binary-hppa/libopenthreads4_1.2.0-2+b2_hppa.deb stable/main/binary-hppa/libopenscenegraph-dev_1.2.0-2+b2_hppa.deb stable/main/binary-hppa/libopenscenegraph4_1.2.0-2+b2_hppa.deb stable/main/binary-hppa/libproducer-dev_1.2.0-2+b2_hppa.deb stable/main/binary-hppa/libproducer4_1.2.0-2+b2_hppa.deb stable/main/binary-hppa/openscenegraph_1.2.0-2+b2_hppa.deb openscenegraph (1.2.0-2+b2) stable; urgency=low * Binary-only non-maintainer upload for hppa; no source changes. * Rebuild against lib3ds-dev 1.2.0-4.1+etch1, to propagate the fix for bug #399761 stable/main/binary-s390/libopenthreads-dev_1.2.0-2+b2_s390.deb stable/main/binary-s390/libopenthreads4_1.2.0-2+b2_s390.deb stable/main/binary-s390/libopenscenegraph-dev_1.2.0-2+b2_s390.deb stable/main/binary-s390/libopenscenegraph4_1.2.0-2+b2_s390.deb stable/main/binary-s390/libproducer-dev_1.2.0-2+b2_s390.deb stable/main/binary-s390/libproducer4_1.2.0-2+b2_s390.deb stable/main/binary-s390/openscenegraph_1.2.0-2+b2_s390.deb openscenegraph (1.2.0-2+b2) stable; urgency=low * Binary-only non-maintainer upload for s390; no source changes. * Rebuild against lib3ds-dev 1.2.0-4.1+etch1, to propagate the fix for bug #399761 stable/main/binary-alpha/libssl0.9.7_0.9.7k-3.1etch1_alpha.deb stable/main/binary-alpha/libssl0.9.7-dbg_0.9.7k-3.1etch1_alpha.deb openssl097 (0.9.7k-3.1etch1) stable-security; urgency=low * CVE-2007-5135: Fix off by one error in SSL_get_shared_ciphers(). (Closes: #444460) stable/main/binary-amd64/libssl0.9.7_0.9.7k-3.1etch1_amd64.deb stable/main/binary-amd64/libssl0.9.7-dbg_0.9.7k-3.1etch1_amd64.deb openssl097 (0.9.7k-3.1etch1) stable-security; urgency=low * CVE-2007-5135: Fix off by one error in SSL_get_shared_ciphers(). (Closes: #444460) stable/main/binary-arm/libssl0.9.7_0.9.7k-3.1etch1_arm.deb stable/main/binary-arm/libssl0.9.7-dbg_0.9.7k-3.1etch1_arm.deb openssl097 (0.9.7k-3.1etch1) stable-security; urgency=low * CVE-2007-5135: Fix off by one error in SSL_get_shared_ciphers(). (Closes: #444460) stable/main/binary-hppa/libssl0.9.7_0.9.7k-3.1etch1_hppa.deb stable/main/binary-hppa/libssl0.9.7-dbg_0.9.7k-3.1etch1_hppa.deb openssl097 (0.9.7k-3.1etch1) stable-security; urgency=low * CVE-2007-5135: Fix off by one error in SSL_get_shared_ciphers(). (Closes: #444460) stable/main/source/openssl097_0.9.7k-3.1etch1.dsc stable/main/source/openssl097_0.9.7k.orig.tar.gz stable/main/source/openssl097_0.9.7k-3.1etch1.diff.gz stable/main/binary-i386/libssl0.9.7_0.9.7k-3.1etch1_i386.deb stable/main/binary-i386/libssl0.9.7-dbg_0.9.7k-3.1etch1_i386.deb openssl097 (0.9.7k-3.1etch1) stable-security; urgency=low * CVE-2007-5135: Fix off by one error in SSL_get_shared_ciphers(). (Closes: #444460) stable/main/binary-ia64/libssl0.9.7_0.9.7k-3.1etch1_ia64.deb stable/main/binary-ia64/libssl0.9.7-dbg_0.9.7k-3.1etch1_ia64.deb openssl097 (0.9.7k-3.1etch1) stable-security; urgency=low * CVE-2007-5135: Fix off by one error in SSL_get_shared_ciphers(). (Closes: #444460) stable/main/binary-mips/libssl0.9.7_0.9.7k-3.1etch1_mips.deb stable/main/binary-mips/libssl0.9.7-dbg_0.9.7k-3.1etch1_mips.deb openssl097 (0.9.7k-3.1etch1) stable-security; urgency=low * CVE-2007-5135: Fix off by one error in SSL_get_shared_ciphers(). (Closes: #444460) stable/main/binary-mipsel/libssl0.9.7_0.9.7k-3.1etch1_mipsel.deb stable/main/binary-mipsel/libssl0.9.7-dbg_0.9.7k-3.1etch1_mipsel.deb openssl097 (0.9.7k-3.1etch1) stable-security; urgency=low * CVE-2007-5135: Fix off by one error in SSL_get_shared_ciphers(). (Closes: #444460) stable/main/binary-powerpc/libssl0.9.7_0.9.7k-3.1etch1_powerpc.deb stable/main/binary-powerpc/libssl0.9.7-dbg_0.9.7k-3.1etch1_powerpc.deb openssl097 (0.9.7k-3.1etch1) stable-security; urgency=low * CVE-2007-5135: Fix off by one error in SSL_get_shared_ciphers(). (Closes: #444460) stable/main/binary-s390/libssl0.9.7_0.9.7k-3.1etch1_s390.deb stable/main/binary-s390/libssl0.9.7-dbg_0.9.7k-3.1etch1_s390.deb openssl097 (0.9.7k-3.1etch1) stable-security; urgency=low * CVE-2007-5135: Fix off by one error in SSL_get_shared_ciphers(). (Closes: #444460) stable/main/binary-sparc/libssl0.9.7_0.9.7k-3.1etch1_sparc.deb stable/main/binary-sparc/libssl0.9.7-dbg_0.9.7k-3.1etch1_sparc.deb openssl097 (0.9.7k-3.1etch1) stable-security; urgency=low * CVE-2007-5135: Fix off by one error in SSL_get_shared_ciphers(). (Closes: #444460) stable/main/binary-alpha/openssl_0.9.8c-4etch1_alpha.deb stable/main/binary-alpha/libssl0.9.8_0.9.8c-4etch1_alpha.deb stable/main/libcrypto0.9.8-udeb_0.9.8c-4etch1_alpha.udeb stable/main/binary-alpha/libssl-dev_0.9.8c-4etch1_alpha.deb stable/main/binary-alpha/libssl0.9.8-dbg_0.9.8c-4etch1_alpha.deb openssl (0.9.8c-4etch1) stable-security; urgency=low * CVE-2007-5135: Fix off by one error in SSL_get_shared_ciphers(). (Closes: #444435) * Add nagios-nrpe-server, clamav-freshclam and clamav-daemon to the list of services to check for restart. stable/main/source/openssl_0.9.8c-4etch1.dsc stable/main/source/openssl_0.9.8c.orig.tar.gz stable/main/source/openssl_0.9.8c-4etch1.diff.gz stable/main/binary-amd64/openssl_0.9.8c-4etch1_amd64.deb stable/main/binary-amd64/libssl0.9.8_0.9.8c-4etch1_amd64.deb stable/main/libcrypto0.9.8-udeb_0.9.8c-4etch1_amd64.udeb stable/main/binary-amd64/libssl-dev_0.9.8c-4etch1_amd64.deb stable/main/binary-amd64/libssl0.9.8-dbg_0.9.8c-4etch1_amd64.deb openssl (0.9.8c-4etch1) stable-security; urgency=low * CVE-2007-5135: Fix off by one error in SSL_get_shared_ciphers(). (Closes: #444435) * Add nagios-nrpe-server, clamav-freshclam and clamav-daemon to the list of services to check for restart. stable/main/binary-arm/openssl_0.9.8c-4etch1_arm.deb stable/main/binary-arm/libssl0.9.8_0.9.8c-4etch1_arm.deb stable/main/libcrypto0.9.8-udeb_0.9.8c-4etch1_arm.udeb stable/main/binary-arm/libssl-dev_0.9.8c-4etch1_arm.deb stable/main/binary-arm/libssl0.9.8-dbg_0.9.8c-4etch1_arm.deb openssl (0.9.8c-4etch1) stable-security; urgency=low * CVE-2007-5135: Fix off by one error in SSL_get_shared_ciphers(). (Closes: #444435) * Add nagios-nrpe-server, clamav-freshclam and clamav-daemon to the list of services to check for restart. stable/main/binary-hppa/openssl_0.9.8c-4etch1_hppa.deb stable/main/binary-hppa/libssl0.9.8_0.9.8c-4etch1_hppa.deb stable/main/libcrypto0.9.8-udeb_0.9.8c-4etch1_hppa.udeb stable/main/binary-hppa/libssl-dev_0.9.8c-4etch1_hppa.deb stable/main/binary-hppa/libssl0.9.8-dbg_0.9.8c-4etch1_hppa.deb openssl (0.9.8c-4etch1) stable-security; urgency=low * CVE-2007-5135: Fix off by one error in SSL_get_shared_ciphers(). (Closes: #444435) * Add nagios-nrpe-server, clamav-freshclam and clamav-daemon to the list of services to check for restart. stable/main/binary-i386/openssl_0.9.8c-4etch1_i386.deb stable/main/binary-i386/libssl0.9.8_0.9.8c-4etch1_i386.deb stable/main/libcrypto0.9.8-udeb_0.9.8c-4etch1_i386.udeb stable/main/binary-i386/libssl-dev_0.9.8c-4etch1_i386.deb stable/main/binary-i386/libssl0.9.8-dbg_0.9.8c-4etch1_i386.deb openssl (0.9.8c-4etch1) stable-security; urgency=low * CVE-2007-5135: Fix off by one error in SSL_get_shared_ciphers(). (Closes: #444435) * Add nagios-nrpe-server, clamav-freshclam and clamav-daemon to the list of services to check for restart. stable/main/binary-ia64/openssl_0.9.8c-4etch1_ia64.deb stable/main/binary-ia64/libssl0.9.8_0.9.8c-4etch1_ia64.deb stable/main/libcrypto0.9.8-udeb_0.9.8c-4etch1_ia64.udeb stable/main/binary-ia64/libssl-dev_0.9.8c-4etch1_ia64.deb stable/main/binary-ia64/libssl0.9.8-dbg_0.9.8c-4etch1_ia64.deb openssl (0.9.8c-4etch1) stable-security; urgency=low * CVE-2007-5135: Fix off by one error in SSL_get_shared_ciphers(). (Closes: #444435) * Add nagios-nrpe-server, clamav-freshclam and clamav-daemon to the list of services to check for restart. stable/main/binary-mips/openssl_0.9.8c-4etch1_mips.deb stable/main/binary-mips/libssl0.9.8_0.9.8c-4etch1_mips.deb stable/main/libcrypto0.9.8-udeb_0.9.8c-4etch1_mips.udeb stable/main/binary-mips/libssl-dev_0.9.8c-4etch1_mips.deb stable/main/binary-mips/libssl0.9.8-dbg_0.9.8c-4etch1_mips.deb openssl (0.9.8c-4etch1) stable-security; urgency=low * CVE-2007-5135: Fix off by one error in SSL_get_shared_ciphers(). (Closes: #444435) * Add nagios-nrpe-server, clamav-freshclam and clamav-daemon to the list of services to check for restart. stable/main/binary-mipsel/openssl_0.9.8c-4etch1_mipsel.deb stable/main/binary-mipsel/libssl0.9.8_0.9.8c-4etch1_mipsel.deb stable/main/libcrypto0.9.8-udeb_0.9.8c-4etch1_mipsel.udeb stable/main/binary-mipsel/libssl-dev_0.9.8c-4etch1_mipsel.deb stable/main/binary-mipsel/libssl0.9.8-dbg_0.9.8c-4etch1_mipsel.deb openssl (0.9.8c-4etch1) stable-security; urgency=low * CVE-2007-5135: Fix off by one error in SSL_get_shared_ciphers(). (Closes: #444435) * Add nagios-nrpe-server, clamav-freshclam and clamav-daemon to the list of services to check for restart. stable/main/binary-powerpc/openssl_0.9.8c-4etch1_powerpc.deb stable/main/binary-powerpc/libssl0.9.8_0.9.8c-4etch1_powerpc.deb stable/main/libcrypto0.9.8-udeb_0.9.8c-4etch1_powerpc.udeb stable/main/binary-powerpc/libssl-dev_0.9.8c-4etch1_powerpc.deb stable/main/binary-powerpc/libssl0.9.8-dbg_0.9.8c-4etch1_powerpc.deb openssl (0.9.8c-4etch1) stable-security; urgency=low * CVE-2007-5135: Fix off by one error in SSL_get_shared_ciphers(). (Closes: #444435) * Add nagios-nrpe-server, clamav-freshclam and clamav-daemon to the list of services to check for restart. stable/main/binary-s390/openssl_0.9.8c-4etch1_s390.deb stable/main/binary-s390/libssl0.9.8_0.9.8c-4etch1_s390.deb stable/main/libcrypto0.9.8-udeb_0.9.8c-4etch1_s390.udeb stable/main/binary-s390/libssl-dev_0.9.8c-4etch1_s390.deb stable/main/binary-s390/libssl0.9.8-dbg_0.9.8c-4etch1_s390.deb openssl (0.9.8c-4etch1) stable-security; urgency=low * CVE-2007-5135: Fix off by one error in SSL_get_shared_ciphers(). (Closes: #444435) * Add nagios-nrpe-server, clamav-freshclam and clamav-daemon to the list of services to check for restart. stable/main/binary-sparc/openssl_0.9.8c-4etch1_sparc.deb stable/main/binary-sparc/libssl0.9.8_0.9.8c-4etch1_sparc.deb stable/main/libcrypto0.9.8-udeb_0.9.8c-4etch1_sparc.udeb stable/main/binary-sparc/libssl-dev_0.9.8c-4etch1_sparc.deb stable/main/binary-sparc/libssl0.9.8-dbg_0.9.8c-4etch1_sparc.deb openssl (0.9.8c-4etch1) stable-security; urgency=low * CVE-2007-5135: Fix off by one error in SSL_get_shared_ciphers(). (Closes: #444435) * Add nagios-nrpe-server, clamav-freshclam and clamav-daemon to the list of services to check for restart. stable/main/binary-alpha/openvpn_2.0.9-4etch1_alpha.deb openvpn (2.0.9-4etch1) stable; urgency=low * Moved liblzo dependency to liblzo2 to fix amd64 general protection errors. (Closes: #390697) stable/main/binary-amd64/openvpn_2.0.9-4etch1_amd64.deb openvpn (2.0.9-4etch1) stable; urgency=low * Moved liblzo dependency to liblzo2 to fix amd64 general protection errors. (Closes: #390697) stable/main/binary-arm/openvpn_2.0.9-4etch1_arm.deb openvpn (2.0.9-4etch1) stable; urgency=low * Moved liblzo dependency to liblzo2 to fix amd64 general protection errors. (Closes: #390697) stable/main/binary-hppa/openvpn_2.0.9-4etch1_hppa.deb openvpn (2.0.9-4etch1) stable; urgency=low * Moved liblzo dependency to liblzo2 to fix amd64 general protection errors. (Closes: #390697) stable/main/source/openvpn_2.0.9-4etch1.dsc stable/main/source/openvpn_2.0.9-4etch1.diff.gz stable/main/binary-i386/openvpn_2.0.9-4etch1_i386.deb openvpn (2.0.9-4etch1) stable; urgency=low * Moved liblzo dependency to liblzo2 to fix amd64 general protection errors. (Closes: #390697) stable/main/binary-ia64/openvpn_2.0.9-4etch1_ia64.deb openvpn (2.0.9-4etch1) stable; urgency=low * Moved liblzo dependency to liblzo2 to fix amd64 general protection errors. (Closes: #390697) stable/main/binary-mips/openvpn_2.0.9-4etch1_mips.deb openvpn (2.0.9-4etch1) stable; urgency=low * Moved liblzo dependency to liblzo2 to fix amd64 general protection errors. (Closes: #390697) stable/main/binary-mipsel/openvpn_2.0.9-4etch1_mipsel.deb openvpn (2.0.9-4etch1) stable; urgency=low * Moved liblzo dependency to liblzo2 to fix amd64 general protection errors. (Closes: #390697) stable/main/binary-powerpc/openvpn_2.0.9-4etch1_powerpc.deb openvpn (2.0.9-4etch1) stable; urgency=low * Moved liblzo dependency to liblzo2 to fix amd64 general protection errors. (Closes: #390697) stable/main/binary-s390/openvpn_2.0.9-4etch1_s390.deb openvpn (2.0.9-4etch1) stable; urgency=low * Moved liblzo dependency to liblzo2 to fix amd64 general protection errors. (Closes: #390697) stable/main/binary-sparc/openvpn_2.0.9-4etch1_sparc.deb openvpn (2.0.9-4etch1) stable; urgency=low * Moved liblzo dependency to liblzo2 to fix amd64 general protection errors. (Closes: #390697) stable/main/binary-alpha/libpam0g_0.79-5_alpha.deb stable/main/binary-alpha/libpam-modules_0.79-5_alpha.deb stable/main/binary-alpha/libpam0g-dev_0.79-5_alpha.deb stable/main/binary-alpha/libpam-cracklib_0.79-5_alpha.deb pam (0.79-5) proposed-updates; urgency=low * CVE-2005-2977: only uid=0 is allowed to invoke unix_chkpwd with an arbitrary username, and then only when SELinux is active. In all other cases root should have privileges to access /etc/shadow directly, and non-root users are not allowed access under the default security policy. This fixes a low-impact brute-force vector when SELinux is enabled and running in non-enforcing mode. Closes: #336344. stable/main/binary-arm/libpam0g_0.79-5_arm.deb stable/main/binary-arm/libpam-modules_0.79-5_arm.deb stable/main/binary-arm/libpam0g-dev_0.79-5_arm.deb stable/main/binary-arm/libpam-cracklib_0.79-5_arm.deb pam (0.79-5) proposed-updates; urgency=low * CVE-2005-2977: only uid=0 is allowed to invoke unix_chkpwd with an arbitrary username, and then only when SELinux is active. In all other cases root should have privileges to access /etc/shadow directly, and non-root users are not allowed access under the default security policy. This fixes a low-impact brute-force vector when SELinux is enabled and running in non-enforcing mode. Closes: #336344. stable/main/binary-hppa/libpam0g_0.79-5_hppa.deb stable/main/binary-hppa/libpam-modules_0.79-5_hppa.deb stable/main/binary-hppa/libpam0g-dev_0.79-5_hppa.deb stable/main/binary-hppa/libpam-cracklib_0.79-5_hppa.deb pam (0.79-5) proposed-updates; urgency=low * CVE-2005-2977: only uid=0 is allowed to invoke unix_chkpwd with an arbitrary username, and then only when SELinux is active. In all other cases root should have privileges to access /etc/shadow directly, and non-root users are not allowed access under the default security policy. This fixes a low-impact brute-force vector when SELinux is enabled and running in non-enforcing mode. Closes: #336344. stable/main/source/pam_0.79-5.dsc stable/main/source/pam_0.79-5.diff.gz stable/main/binary-all/libpam-runtime_0.79-5_all.deb stable/main/binary-all/libpam-doc_0.79-5_all.deb stable/main/binary-i386/libpam0g_0.79-5_i386.deb stable/main/binary-i386/libpam-modules_0.79-5_i386.deb stable/main/binary-i386/libpam0g-dev_0.79-5_i386.deb stable/main/binary-i386/libpam-cracklib_0.79-5_i386.deb stable/main/binary-amd64/libpam0g_0.79-5_amd64.deb stable/main/binary-amd64/libpam-modules_0.79-5_amd64.deb stable/main/binary-amd64/libpam0g-dev_0.79-5_amd64.deb stable/main/binary-amd64/libpam-cracklib_0.79-5_amd64.deb pam (0.79-5) proposed-updates; urgency=low * CVE-2005-2977: only uid=0 is allowed to invoke unix_chkpwd with an arbitrary username, and then only when SELinux is active. In all other cases root should have privileges to access /etc/shadow directly, and non-root users are not allowed access under the default security policy. This fixes a low-impact brute-force vector when SELinux is enabled and running in non-enforcing mode. Closes: #336344. stable/main/binary-ia64/libpam0g_0.79-5_ia64.deb stable/main/binary-ia64/libpam-modules_0.79-5_ia64.deb stable/main/binary-ia64/libpam0g-dev_0.79-5_ia64.deb stable/main/binary-ia64/libpam-cracklib_0.79-5_ia64.deb pam (0.79-5) proposed-updates; urgency=low * CVE-2005-2977: only uid=0 is allowed to invoke unix_chkpwd with an arbitrary username, and then only when SELinux is active. In all other cases root should have privileges to access /etc/shadow directly, and non-root users are not allowed access under the default security policy. This fixes a low-impact brute-force vector when SELinux is enabled and running in non-enforcing mode. Closes: #336344. stable/main/binary-mips/libpam0g_0.79-5_mips.deb stable/main/binary-mips/libpam-modules_0.79-5_mips.deb stable/main/binary-mips/libpam0g-dev_0.79-5_mips.deb stable/main/binary-mips/libpam-cracklib_0.79-5_mips.deb pam (0.79-5) proposed-updates; urgency=low * CVE-2005-2977: only uid=0 is allowed to invoke unix_chkpwd with an arbitrary username, and then only when SELinux is active. In all other cases root should have privileges to access /etc/shadow directly, and non-root users are not allowed access under the default security policy. This fixes a low-impact brute-force vector when SELinux is enabled and running in non-enforcing mode. Closes: #336344. stable/main/binary-mipsel/libpam0g_0.79-5_mipsel.deb stable/main/binary-mipsel/libpam-modules_0.79-5_mipsel.deb stable/main/binary-mipsel/libpam0g-dev_0.79-5_mipsel.deb stable/main/binary-mipsel/libpam-cracklib_0.79-5_mipsel.deb pam (0.79-5) proposed-updates; urgency=low * CVE-2005-2977: only uid=0 is allowed to invoke unix_chkpwd with an arbitrary username, and then only when SELinux is active. In all other cases root should have privileges to access /etc/shadow directly, and non-root users are not allowed access under the default security policy. This fixes a low-impact brute-force vector when SELinux is enabled and running in non-enforcing mode. Closes: #336344. stable/main/binary-powerpc/libpam0g_0.79-5_powerpc.deb stable/main/binary-powerpc/libpam-modules_0.79-5_powerpc.deb stable/main/binary-powerpc/libpam0g-dev_0.79-5_powerpc.deb stable/main/binary-powerpc/libpam-cracklib_0.79-5_powerpc.deb pam (0.79-5) proposed-updates; urgency=low * CVE-2005-2977: only uid=0 is allowed to invoke unix_chkpwd with an arbitrary username, and then only when SELinux is active. In all other cases root should have privileges to access /etc/shadow directly, and non-root users are not allowed access under the default security policy. This fixes a low-impact brute-force vector when SELinux is enabled and running in non-enforcing mode. Closes: #336344. stable/main/binary-s390/libpam0g_0.79-5_s390.deb stable/main/binary-s390/libpam-modules_0.79-5_s390.deb stable/main/binary-s390/libpam0g-dev_0.79-5_s390.deb stable/main/binary-s390/libpam-cracklib_0.79-5_s390.deb pam (0.79-5) proposed-updates; urgency=low * CVE-2005-2977: only uid=0 is allowed to invoke unix_chkpwd with an arbitrary username, and then only when SELinux is active. In all other cases root should have privileges to access /etc/shadow directly, and non-root users are not allowed access under the default security policy. This fixes a low-impact brute-force vector when SELinux is enabled and running in non-enforcing mode. Closes: #336344. stable/main/binary-sparc/libpam0g_0.79-5_sparc.deb stable/main/binary-sparc/libpam-modules_0.79-5_sparc.deb stable/main/binary-sparc/libpam0g-dev_0.79-5_sparc.deb stable/main/binary-sparc/libpam-cracklib_0.79-5_sparc.deb pam (0.79-5) proposed-updates; urgency=low * CVE-2005-2977: only uid=0 is allowed to invoke unix_chkpwd with an arbitrary username, and then only when SELinux is active. In all other cases root should have privileges to access /etc/shadow directly, and non-root users are not allowed access under the default security policy. This fixes a low-impact brute-force vector when SELinux is enabled and running in non-enforcing mode. Closes: #336344. stable/main/partman-crypto_20etch1_alpha.udeb partman-crypto (20etch1) stable; urgency=low [ Frans Pop ] * For hd-media installs the module loop will already be loaded, which prevents loop-aes from being loaded. Attempt to replace loop with loop-aes by unmounting the CD image, replacing the module and remounting the image. As losetup is not available, we cannot check what exactly is loop-mounted, so we just assume that loop is only used for a CD image. Many thanks to Nemui Ailin for identifying the issue. Closes: #434027. stable/main/source/partman-crypto_20etch1.dsc stable/main/source/partman-crypto_20etch1.tar.gz stable/main/partman-crypto-dm_20etch1_all.udeb stable/main/partman-crypto-loop_20etch1_all.udeb stable/main/partman-crypto_20etch1_amd64.udeb partman-crypto (20etch1) stable; urgency=low [ Frans Pop ] * For hd-media installs the module loop will already be loaded, which prevents loop-aes from being loaded. Attempt to replace loop with loop-aes by unmounting the CD image, replacing the module and remounting the image. As losetup is not available, we cannot check what exactly is loop-mounted, so we just assume that loop is only used for a CD image. Many thanks to Nemui Ailin for identifying the issue. Closes: #434027. stable/main/partman-crypto_20etch1_arm.udeb partman-crypto (20etch1) stable; urgency=low [ Frans Pop ] * For hd-media installs the module loop will already be loaded, which prevents loop-aes from being loaded. Attempt to replace loop with loop-aes by unmounting the CD image, replacing the module and remounting the image. As losetup is not available, we cannot check what exactly is loop-mounted, so we just assume that loop is only used for a CD image. Many thanks to Nemui Ailin for identifying the issue. Closes: #434027. stable/main/partman-crypto_20etch1_hppa.udeb partman-crypto (20etch1) stable; urgency=low [ Frans Pop ] * For hd-media installs the module loop will already be loaded, which prevents loop-aes from being loaded. Attempt to replace loop with loop-aes by unmounting the CD image, replacing the module and remounting the image. As losetup is not available, we cannot check what exactly is loop-mounted, so we just assume that loop is only used for a CD image. Many thanks to Nemui Ailin for identifying the issue. Closes: #434027. stable/main/partman-crypto_20etch1_i386.udeb partman-crypto (20etch1) stable; urgency=low [ Frans Pop ] * For hd-media installs the module loop will already be loaded, which prevents loop-aes from being loaded. Attempt to replace loop with loop-aes by unmounting the CD image, replacing the module and remounting the image. As losetup is not available, we cannot check what exactly is loop-mounted, so we just assume that loop is only used for a CD image. Many thanks to Nemui Ailin for identifying the issue. Closes: #434027. stable/main/partman-crypto_20etch1_ia64.udeb partman-crypto (20etch1) stable; urgency=low [ Frans Pop ] * For hd-media installs the module loop will already be loaded, which prevents loop-aes from being loaded. Attempt to replace loop with loop-aes by unmounting the CD image, replacing the module and remounting the image. As losetup is not available, we cannot check what exactly is loop-mounted, so we just assume that loop is only used for a CD image. Many thanks to Nemui Ailin for identifying the issue. Closes: #434027. stable/main/partman-crypto_20etch1_mips.udeb partman-crypto (20etch1) stable; urgency=low [ Frans Pop ] * For hd-media installs the module loop will already be loaded, which prevents loop-aes from being loaded. Attempt to replace loop with loop-aes by unmounting the CD image, replacing the module and remounting the image. As losetup is not available, we cannot check what exactly is loop-mounted, so we just assume that loop is only used for a CD image. Many thanks to Nemui Ailin for identifying the issue. Closes: #434027. stable/main/partman-crypto_20etch1_mipsel.udeb partman-crypto (20etch1) stable; urgency=low [ Frans Pop ] * For hd-media installs the module loop will already be loaded, which prevents loop-aes from being loaded. Attempt to replace loop with loop-aes by unmounting the CD image, replacing the module and remounting the image. As losetup is not available, we cannot check what exactly is loop-mounted, so we just assume that loop is only used for a CD image. Many thanks to Nemui Ailin for identifying the issue. Closes: #434027. stable/main/partman-crypto_20etch1_powerpc.udeb partman-crypto (20etch1) stable; urgency=low [ Frans Pop ] * For hd-media installs the module loop will already be loaded, which prevents loop-aes from being loaded. Attempt to replace loop with loop-aes by unmounting the CD image, replacing the module and remounting the image. As losetup is not available, we cannot check what exactly is loop-mounted, so we just assume that loop is only used for a CD image. Many thanks to Nemui Ailin for identifying the issue. Closes: #434027. stable/main/partman-crypto_20etch1_s390.udeb partman-crypto (20etch1) stable; urgency=low [ Frans Pop ] * For hd-media installs the module loop will already be loaded, which prevents loop-aes from being loaded. Attempt to replace loop with loop-aes by unmounting the CD image, replacing the module and remounting the image. As losetup is not available, we cannot check what exactly is loop-mounted, so we just assume that loop is only used for a CD image. Many thanks to Nemui Ailin for identifying the issue. Closes: #434027. stable/main/partman-crypto_20etch1_sparc.udeb partman-crypto (20etch1) stable; urgency=low [ Frans Pop ] * For hd-media installs the module loop will already be loaded, which prevents loop-aes from being loaded. Attempt to replace loop with loop-aes by unmounting the CD image, replacing the module and remounting the image. As losetup is not available, we cannot check what exactly is loop-mounted, so we just assume that loop is only used for a CD image. Many thanks to Nemui Ailin for identifying the issue. Closes: #434027. stable/main/binary-alpha/libpcre3_6.7+7.4-2_alpha.deb stable/main/binary-alpha/libpcrecpp0_6.7+7.4-2_alpha.deb stable/main/binary-alpha/libpcre3-dev_6.7+7.4-2_alpha.deb stable/main/binary-alpha/pcregrep_6.7+7.4-2_alpha.deb pcre3 (6.7+7.4-2) stable-security; urgency=high * Non-maintainer upload by the security team. * Upgrade to upstream version 7.4 to incorporate results of a security audit. The version included here tries to expose the 6.7 API unchanged, and the pattern language is compatible with version 6.7 (which means that some Perl 5.10 escape sequences are not supported). * This update fixes CVE-2007-1659, CVE-2007-1660, CVE-2007-1661, CVE-2007-1662, CVE-2007-4766, CVE-2007-4767, CVE-2007-4768. * Note that externally stored compiled patterns need to be recompiled becaue the internal bytecodes have changed. (This feature is only rarely used; no further action is required by most users.) stable/main/source/pcre3_6.7+7.4-2.dsc stable/main/source/pcre3_6.7+7.4.orig.tar.gz stable/main/source/pcre3_6.7+7.4-2.diff.gz stable/main/binary-amd64/libpcre3_6.7+7.4-2_amd64.deb stable/main/binary-amd64/libpcrecpp0_6.7+7.4-2_amd64.deb stable/main/binary-amd64/libpcre3-dev_6.7+7.4-2_amd64.deb stable/main/binary-amd64/pcregrep_6.7+7.4-2_amd64.deb pcre3 (6.7+7.4-2) stable-security; urgency=high * Non-maintainer upload by the security team. * Upgrade to upstream version 7.4 to incorporate results of a security audit. The version included here tries to expose the 6.7 API unchanged, and the pattern language is compatible with version 6.7 (which means that some Perl 5.10 escape sequences are not supported). * This update fixes CVE-2007-1659, CVE-2007-1660, CVE-2007-1661, CVE-2007-1662, CVE-2007-4766, CVE-2007-4767, CVE-2007-4768. * Note that externally stored compiled patterns need to be recompiled becaue the internal bytecodes have changed. (This feature is only rarely used; no further action is required by most users.) stable/main/binary-arm/libpcre3_6.7+7.4-2_arm.deb stable/main/binary-arm/libpcrecpp0_6.7+7.4-2_arm.deb stable/main/binary-arm/libpcre3-dev_6.7+7.4-2_arm.deb stable/main/binary-arm/pcregrep_6.7+7.4-2_arm.deb pcre3 (6.7+7.4-2) stable-security; urgency=high * Non-maintainer upload by the security team. * Upgrade to upstream version 7.4 to incorporate results of a security audit. The version included here tries to expose the 6.7 API unchanged, and the pattern language is compatible with version 6.7 (which means that some Perl 5.10 escape sequences are not supported). * This update fixes CVE-2007-1659, CVE-2007-1660, CVE-2007-1661, CVE-2007-1662, CVE-2007-4766, CVE-2007-4767, CVE-2007-4768. * Note that externally stored compiled patterns need to be recompiled becaue the internal bytecodes have changed. (This feature is only rarely used; no further action is required by most users.) stable/main/binary-hppa/libpcre3_6.7+7.4-2_hppa.deb stable/main/binary-hppa/libpcrecpp0_6.7+7.4-2_hppa.deb stable/main/binary-hppa/libpcre3-dev_6.7+7.4-2_hppa.deb stable/main/binary-hppa/pcregrep_6.7+7.4-2_hppa.deb pcre3 (6.7+7.4-2) stable-security; urgency=high * Non-maintainer upload by the security team. * Upgrade to upstream version 7.4 to incorporate results of a security audit. The version included here tries to expose the 6.7 API unchanged, and the pattern language is compatible with version 6.7 (which means that some Perl 5.10 escape sequences are not supported). * This update fixes CVE-2007-1659, CVE-2007-1660, CVE-2007-1661, CVE-2007-1662, CVE-2007-4766, CVE-2007-4767, CVE-2007-4768. * Note that externally stored compiled patterns need to be recompiled becaue the internal bytecodes have changed. (This feature is only rarely used; no further action is required by most users.) stable/main/binary-i386/libpcre3_6.7+7.4-2_i386.deb stable/main/binary-i386/libpcrecpp0_6.7+7.4-2_i386.deb stable/main/binary-i386/libpcre3-dev_6.7+7.4-2_i386.deb stable/main/binary-i386/pcregrep_6.7+7.4-2_i386.deb pcre3 (6.7+7.4-2) stable-security; urgency=high * Non-maintainer upload by the security team. * Upgrade to upstream version 7.4 to incorporate results of a security audit. The version included here tries to expose the 6.7 API unchanged, and the pattern language is compatible with version 6.7 (which means that some Perl 5.10 escape sequences are not supported). * This update fixes CVE-2007-1659, CVE-2007-1660, CVE-2007-1661, CVE-2007-1662, CVE-2007-4766, CVE-2007-4767, CVE-2007-4768. * Note that externally stored compiled patterns need to be recompiled becaue the internal bytecodes have changed. (This feature is only rarely used; no further action is required by most users.) stable/main/binary-ia64/libpcre3_6.7+7.4-2_ia64.deb stable/main/binary-ia64/libpcrecpp0_6.7+7.4-2_ia64.deb stable/main/binary-ia64/libpcre3-dev_6.7+7.4-2_ia64.deb stable/main/binary-ia64/pcregrep_6.7+7.4-2_ia64.deb pcre3 (6.7+7.4-2) stable-security; urgency=high * Non-maintainer upload by the security team. * Upgrade to upstream version 7.4 to incorporate results of a security audit. The version included here tries to expose the 6.7 API unchanged, and the pattern language is compatible with version 6.7 (which means that some Perl 5.10 escape sequences are not supported). * This update fixes CVE-2007-1659, CVE-2007-1660, CVE-2007-1661, CVE-2007-1662, CVE-2007-4766, CVE-2007-4767, CVE-2007-4768. * Note that externally stored compiled patterns need to be recompiled becaue the internal bytecodes have changed. (This feature is only rarely used; no further action is required by most users.) stable/main/binary-mips/libpcre3_6.7+7.4-2_mips.deb stable/main/binary-mips/libpcrecpp0_6.7+7.4-2_mips.deb stable/main/binary-mips/libpcre3-dev_6.7+7.4-2_mips.deb stable/main/binary-mips/pcregrep_6.7+7.4-2_mips.deb pcre3 (6.7+7.4-2) stable-security; urgency=high * Non-maintainer upload by the security team. * Upgrade to upstream version 7.4 to incorporate results of a security audit. The version included here tries to expose the 6.7 API unchanged, and the pattern language is compatible with version 6.7 (which means that some Perl 5.10 escape sequences are not supported). * This update fixes CVE-2007-1659, CVE-2007-1660, CVE-2007-1661, CVE-2007-1662, CVE-2007-4766, CVE-2007-4767, CVE-2007-4768. * Note that externally stored compiled patterns need to be recompiled becaue the internal bytecodes have changed. (This feature is only rarely used; no further action is required by most users.) stable/main/binary-mipsel/libpcre3_6.7+7.4-2_mipsel.deb stable/main/binary-mipsel/libpcrecpp0_6.7+7.4-2_mipsel.deb stable/main/binary-mipsel/libpcre3-dev_6.7+7.4-2_mipsel.deb stable/main/binary-mipsel/pcregrep_6.7+7.4-2_mipsel.deb pcre3 (6.7+7.4-2) stable-security; urgency=high * Non-maintainer upload by the security team. * Upgrade to upstream version 7.4 to incorporate results of a security audit. The version included here tries to expose the 6.7 API unchanged, and the pattern language is compatible with version 6.7 (which means that some Perl 5.10 escape sequences are not supported). * This update fixes CVE-2007-1659, CVE-2007-1660, CVE-2007-1661, CVE-2007-1662, CVE-2007-4766, CVE-2007-4767, CVE-2007-4768. * Note that externally stored compiled patterns need to be recompiled becaue the internal bytecodes have changed. (This feature is only rarely used; no further action is required by most users.) stable/main/binary-powerpc/libpcre3_6.7+7.4-2_powerpc.deb stable/main/binary-powerpc/libpcrecpp0_6.7+7.4-2_powerpc.deb stable/main/binary-powerpc/libpcre3-dev_6.7+7.4-2_powerpc.deb stable/main/binary-powerpc/pcregrep_6.7+7.4-2_powerpc.deb pcre3 (6.7+7.4-2) stable-security; urgency=high * Non-maintainer upload by the security team. * Upgrade to upstream version 7.4 to incorporate results of a security audit. The version included here tries to expose the 6.7 API unchanged, and the pattern language is compatible with version 6.7 (which means that some Perl 5.10 escape sequences are not supported). * This update fixes CVE-2007-1659, CVE-2007-1660, CVE-2007-1661, CVE-2007-1662, CVE-2007-4766, CVE-2007-4767, CVE-2007-4768. * Note that externally stored compiled patterns need to be recompiled becaue the internal bytecodes have changed. (This feature is only rarely used; no further action is required by most users.) stable/main/binary-s390/libpcre3_6.7+7.4-2_s390.deb stable/main/binary-s390/libpcrecpp0_6.7+7.4-2_s390.deb stable/main/binary-s390/libpcre3-dev_6.7+7.4-2_s390.deb stable/main/binary-s390/pcregrep_6.7+7.4-2_s390.deb pcre3 (6.7+7.4-2) stable-security; urgency=high * Non-maintainer upload by the security team. * Upgrade to upstream version 7.4 to incorporate results of a security audit. The version included here tries to expose the 6.7 API unchanged, and the pattern language is compatible with version 6.7 (which means that some Perl 5.10 escape sequences are not supported). * This update fixes CVE-2007-1659, CVE-2007-1660, CVE-2007-1661, CVE-2007-1662, CVE-2007-4766, CVE-2007-4767, CVE-2007-4768. * Note that externally stored compiled patterns need to be recompiled becaue the internal bytecodes have changed. (This feature is only rarely used; no further action is required by most users.) stable/main/binary-sparc/libpcre3_6.7+7.4-2_sparc.deb stable/main/binary-sparc/libpcrecpp0_6.7+7.4-2_sparc.deb stable/main/binary-sparc/libpcre3-dev_6.7+7.4-2_sparc.deb stable/main/binary-sparc/pcregrep_6.7+7.4-2_sparc.deb pcre3 (6.7+7.4-2) stable-security; urgency=high * Non-maintainer upload by the security team. * Upgrade to upstream version 7.4 to incorporate results of a security audit. The version included here tries to expose the 6.7 API unchanged, and the pattern language is compatible with version 6.7 (which means that some Perl 5.10 escape sequences are not supported). * This update fixes CVE-2007-1659, CVE-2007-1660, CVE-2007-1661, CVE-2007-1662, CVE-2007-4766, CVE-2007-4767, CVE-2007-4768. * Note that externally stored compiled patterns need to be recompiled becaue the internal bytecodes have changed. (This feature is only rarely used; no further action is required by most users.) stable/main/binary-alpha/perdition_1.17-7etch1_alpha.deb stable/main/binary-alpha/perdition-dev_1.17-7etch1_alpha.deb stable/main/binary-alpha/perdition-ldap_1.17-7etch1_alpha.deb stable/main/binary-alpha/perdition-mysql_1.17-7etch1_alpha.deb stable/main/binary-alpha/perdition-odbc_1.17-7etch1_alpha.deb stable/main/binary-alpha/perdition-postgresql_1.17-7etch1_alpha.deb perdition (1.17-7etch1) stable-security; urgency=high * Verify that tag read from end-users is valid - CVE-2007-5740 The format string protection mechanism in IMAPD for Perdition Mail Retrieval Proxy 1.17 and earlier allows remote attackers to execute arbitrary code via an IMAP tag with a null byte followed by a format string specifier, which is not counted by the mechanism. stable/main/binary-amd64/perdition_1.17-7etch1_amd64.deb stable/main/binary-amd64/perdition-dev_1.17-7etch1_amd64.deb stable/main/binary-amd64/perdition-ldap_1.17-7etch1_amd64.deb stable/main/binary-amd64/perdition-mysql_1.17-7etch1_amd64.deb stable/main/binary-amd64/perdition-odbc_1.17-7etch1_amd64.deb stable/main/binary-amd64/perdition-postgresql_1.17-7etch1_amd64.deb perdition (1.17-7etch1) stable-security; urgency=high * Verify that tag read from end-users is valid - CVE-2007-5740 The format string protection mechanism in IMAPD for Perdition Mail Retrieval Proxy 1.17 and earlier allows remote attackers to execute arbitrary code via an IMAP tag with a null byte followed by a format string specifier, which is not counted by the mechanism. stable/main/binary-arm/perdition_1.17-7etch1_arm.deb stable/main/binary-arm/perdition-dev_1.17-7etch1_arm.deb stable/main/binary-arm/perdition-ldap_1.17-7etch1_arm.deb stable/main/binary-arm/perdition-mysql_1.17-7etch1_arm.deb stable/main/binary-arm/perdition-odbc_1.17-7etch1_arm.deb stable/main/binary-arm/perdition-postgresql_1.17-7etch1_arm.deb perdition (1.17-7etch1) stable-security; urgency=high * Verify that tag read from end-users is valid - CVE-2007-5740 The format string protection mechanism in IMAPD for Perdition Mail Retrieval Proxy 1.17 and earlier allows remote attackers to execute arbitrary code via an IMAP tag with a null byte followed by a format string specifier, which is not counted by the mechanism. stable/main/binary-hppa/perdition_1.17-7etch1_hppa.deb stable/main/binary-hppa/perdition-dev_1.17-7etch1_hppa.deb stable/main/binary-hppa/perdition-ldap_1.17-7etch1_hppa.deb stable/main/binary-hppa/perdition-mysql_1.17-7etch1_hppa.deb stable/main/binary-hppa/perdition-odbc_1.17-7etch1_hppa.deb stable/main/binary-hppa/perdition-postgresql_1.17-7etch1_hppa.deb perdition (1.17-7etch1) stable-security; urgency=high * Verify that tag read from end-users is valid - CVE-2007-5740 The format string protection mechanism in IMAPD for Perdition Mail Retrieval Proxy 1.17 and earlier allows remote attackers to execute arbitrary code via an IMAP tag with a null byte followed by a format string specifier, which is not counted by the mechanism. stable/main/source/perdition_1.17-7etch1.dsc stable/main/source/perdition_1.17.orig.tar.gz stable/main/source/perdition_1.17-7etch1.diff.gz stable/main/binary-i386/perdition_1.17-7etch1_i386.deb stable/main/binary-i386/perdition-dev_1.17-7etch1_i386.deb stable/main/binary-i386/perdition-ldap_1.17-7etch1_i386.deb stable/main/binary-i386/perdition-mysql_1.17-7etch1_i386.deb stable/main/binary-i386/perdition-odbc_1.17-7etch1_i386.deb stable/main/binary-i386/perdition-postgresql_1.17-7etch1_i386.deb perdition (1.17-7etch1) stable-security; urgency=high * Verify that tag read from end-users is valid - CVE-2007-5740 The format string protection mechanism in IMAPD for Perdition Mail Retrieval Proxy 1.17 and earlier allows remote attackers to execute arbitrary code via an IMAP tag with a null byte followed by a format string specifier, which is not counted by the mechanism. stable/main/binary-ia64/perdition_1.17-7etch1_ia64.deb stable/main/binary-ia64/perdition-dev_1.17-7etch1_ia64.deb stable/main/binary-ia64/perdition-ldap_1.17-7etch1_ia64.deb stable/main/binary-ia64/perdition-mysql_1.17-7etch1_ia64.deb stable/main/binary-ia64/perdition-odbc_1.17-7etch1_ia64.deb stable/main/binary-ia64/perdition-postgresql_1.17-7etch1_ia64.deb perdition (1.17-7etch1) stable-security; urgency=high * Verify that tag read from end-users is valid - CVE-2007-5740 The format string protection mechanism in IMAPD for Perdition Mail Retrieval Proxy 1.17 and earlier allows remote attackers to execute arbitrary code via an IMAP tag with a null byte followed by a format string specifier, which is not counted by the mechanism. stable/main/binary-mips/perdition_1.17-7etch1_mips.deb stable/main/binary-mips/perdition-dev_1.17-7etch1_mips.deb stable/main/binary-mips/perdition-ldap_1.17-7etch1_mips.deb stable/main/binary-mips/perdition-mysql_1.17-7etch1_mips.deb stable/main/binary-mips/perdition-odbc_1.17-7etch1_mips.deb stable/main/binary-mips/perdition-postgresql_1.17-7etch1_mips.deb perdition (1.17-7etch1) stable-security; urgency=high * Verify that tag read from end-users is valid - CVE-2007-5740 The format string protection mechanism in IMAPD for Perdition Mail Retrieval Proxy 1.17 and earlier allows remote attackers to execute arbitrary code via an IMAP tag with a null byte followed by a format string specifier, which is not counted by the mechanism. stable/main/binary-mipsel/perdition_1.17-7etch1_mipsel.deb stable/main/binary-mipsel/perdition-dev_1.17-7etch1_mipsel.deb stable/main/binary-mipsel/perdition-ldap_1.17-7etch1_mipsel.deb stable/main/binary-mipsel/perdition-mysql_1.17-7etch1_mipsel.deb stable/main/binary-mipsel/perdition-odbc_1.17-7etch1_mipsel.deb stable/main/binary-mipsel/perdition-postgresql_1.17-7etch1_mipsel.deb perdition (1.17-7etch1) stable-security; urgency=high * Verify that tag read from end-users is valid - CVE-2007-5740 The format string protection mechanism in IMAPD for Perdition Mail Retrieval Proxy 1.17 and earlier allows remote attackers to execute arbitrary code via an IMAP tag with a null byte followed by a format string specifier, which is not counted by the mechanism. stable/main/binary-powerpc/perdition_1.17-7etch1_powerpc.deb stable/main/binary-powerpc/perdition-dev_1.17-7etch1_powerpc.deb stable/main/binary-powerpc/perdition-ldap_1.17-7etch1_powerpc.deb stable/main/binary-powerpc/perdition-mysql_1.17-7etch1_powerpc.deb stable/main/binary-powerpc/perdition-odbc_1.17-7etch1_powerpc.deb stable/main/binary-powerpc/perdition-postgresql_1.17-7etch1_powerpc.deb perdition (1.17-7etch1) stable-security; urgency=high * Verify that tag read from end-users is valid - CVE-2007-5740 The format string protection mechanism in IMAPD for Perdition Mail Retrieval Proxy 1.17 and earlier allows remote attackers to execute arbitrary code via an IMAP tag with a null byte followed by a format string specifier, which is not counted by the mechanism. stable/main/binary-s390/perdition_1.17-7etch1_s390.deb stable/main/binary-s390/perdition-dev_1.17-7etch1_s390.deb stable/main/binary-s390/perdition-ldap_1.17-7etch1_s390.deb stable/main/binary-s390/perdition-mysql_1.17-7etch1_s390.deb stable/main/binary-s390/perdition-odbc_1.17-7etch1_s390.deb stable/main/binary-s390/perdition-postgresql_1.17-7etch1_s390.deb perdition (1.17-7etch1) stable-security; urgency=high * Verify that tag read from end-users is valid - CVE-2007-5740 The format string protection mechanism in IMAPD for Perdition Mail Retrieval Proxy 1.17 and earlier allows remote attackers to execute arbitrary code via an IMAP tag with a null byte followed by a format string specifier, which is not counted by the mechanism. stable/main/binary-sparc/perdition_1.17-7etch1_sparc.deb stable/main/binary-sparc/perdition-dev_1.17-7etch1_sparc.deb stable/main/binary-sparc/perdition-ldap_1.17-7etch1_sparc.deb stable/main/binary-sparc/perdition-mysql_1.17-7etch1_sparc.deb stable/main/binary-sparc/perdition-odbc_1.17-7etch1_sparc.deb stable/main/binary-sparc/perdition-postgresql_1.17-7etch1_sparc.deb perdition (1.17-7etch1) stable-security; urgency=high * Verify that tag read from end-users is valid - CVE-2007-5740 The format string protection mechanism in IMAPD for Perdition Mail Retrieval Proxy 1.17 and earlier allows remote attackers to execute arbitrary code via an IMAP tag with a null byte followed by a format string specifier, which is not counted by the mechanism. stable/main/binary-alpha/perl-base_5.8.8-7etch1_alpha.deb stable/main/binary-alpha/perl-debug_5.8.8-7etch1_alpha.deb stable/main/binary-alpha/perl-suid_5.8.8-7etch1_alpha.deb stable/main/binary-alpha/libperl5.8_5.8.8-7etch1_alpha.deb stable/main/binary-alpha/libperl-dev_5.8.8-7etch1_alpha.deb stable/main/binary-alpha/perl_5.8.8-7etch1_alpha.deb perl (5.8.8-7etch1) stable-security; urgency=high * Non-maintainer upload by the security team. * Apply patch by Yves Orton to fix CVE-2007-5116. stable/main/source/perl_5.8.8-7etch1.dsc stable/main/source/perl_5.8.8.orig.tar.gz stable/main/source/perl_5.8.8-7etch1.diff.gz stable/main/binary-all/libcgi-fast-perl_5.8.8-7etch1_all.deb stable/main/binary-all/perl-doc_5.8.8-7etch1_all.deb stable/main/binary-all/perl-modules_5.8.8-7etch1_all.deb stable/main/binary-amd64/perl-base_5.8.8-7etch1_amd64.deb stable/main/binary-amd64/perl-debug_5.8.8-7etch1_amd64.deb stable/main/binary-amd64/perl-suid_5.8.8-7etch1_amd64.deb stable/main/binary-amd64/libperl5.8_5.8.8-7etch1_amd64.deb stable/main/binary-amd64/libperl-dev_5.8.8-7etch1_amd64.deb stable/main/binary-amd64/perl_5.8.8-7etch1_amd64.deb perl (5.8.8-7etch1) stable-security; urgency=high * Non-maintainer upload by the security team. * Apply patch by Yves Orton to fix CVE-2007-5116. stable/main/binary-arm/perl-base_5.8.8-7etch1_arm.deb stable/main/binary-arm/perl-debug_5.8.8-7etch1_arm.deb stable/main/binary-arm/perl-suid_5.8.8-7etch1_arm.deb stable/main/binary-arm/libperl5.8_5.8.8-7etch1_arm.deb stable/main/binary-arm/libperl-dev_5.8.8-7etch1_arm.deb stable/main/binary-arm/perl_5.8.8-7etch1_arm.deb perl (5.8.8-7etch1) stable-security; urgency=high * Non-maintainer upload by the security team. * Apply patch by Yves Orton to fix CVE-2007-5116. stable/main/binary-hppa/perl-base_5.8.8-7etch1_hppa.deb stable/main/binary-hppa/perl-debug_5.8.8-7etch1_hppa.deb stable/main/binary-hppa/perl-suid_5.8.8-7etch1_hppa.deb stable/main/binary-hppa/libperl5.8_5.8.8-7etch1_hppa.deb stable/main/binary-hppa/libperl-dev_5.8.8-7etch1_hppa.deb stable/main/binary-hppa/perl_5.8.8-7etch1_hppa.deb perl (5.8.8-7etch1) stable-security; urgency=high * Non-maintainer upload by the security team. * Apply patch by Yves Orton to fix CVE-2007-5116. stable/main/binary-i386/perl-base_5.8.8-7etch1_i386.deb stable/main/binary-i386/perl-debug_5.8.8-7etch1_i386.deb stable/main/binary-i386/perl-suid_5.8.8-7etch1_i386.deb stable/main/binary-i386/libperl5.8_5.8.8-7etch1_i386.deb stable/main/binary-i386/libperl-dev_5.8.8-7etch1_i386.deb stable/main/binary-i386/perl_5.8.8-7etch1_i386.deb perl (5.8.8-7etch1) stable-security; urgency=high * Non-maintainer upload by the security team. * Apply patch by Yves Orton to fix CVE-2007-5116. stable/main/binary-ia64/perl-base_5.8.8-7etch1_ia64.deb stable/main/binary-ia64/perl-debug_5.8.8-7etch1_ia64.deb stable/main/binary-ia64/perl-suid_5.8.8-7etch1_ia64.deb stable/main/binary-ia64/libperl5.8_5.8.8-7etch1_ia64.deb stable/main/binary-ia64/libperl-dev_5.8.8-7etch1_ia64.deb stable/main/binary-ia64/perl_5.8.8-7etch1_ia64.deb perl (5.8.8-7etch1) stable-security; urgency=high * Non-maintainer upload by the security team. * Apply patch by Yves Orton to fix CVE-2007-5116. stable/main/binary-mips/perl-base_5.8.8-7etch1_mips.deb stable/main/binary-mips/perl-debug_5.8.8-7etch1_mips.deb stable/main/binary-mips/perl-suid_5.8.8-7etch1_mips.deb stable/main/binary-mips/libperl5.8_5.8.8-7etch1_mips.deb stable/main/binary-mips/libperl-dev_5.8.8-7etch1_mips.deb stable/main/binary-mips/perl_5.8.8-7etch1_mips.deb perl (5.8.8-7etch1) stable-security; urgency=high * Non-maintainer upload by the security team. * Apply patch by Yves Orton to fix CVE-2007-5116. stable/main/binary-mipsel/perl-base_5.8.8-7etch1_mipsel.deb stable/main/binary-mipsel/perl-debug_5.8.8-7etch1_mipsel.deb stable/main/binary-mipsel/perl-suid_5.8.8-7etch1_mipsel.deb stable/main/binary-mipsel/libperl5.8_5.8.8-7etch1_mipsel.deb stable/main/binary-mipsel/libperl-dev_5.8.8-7etch1_mipsel.deb stable/main/binary-mipsel/perl_5.8.8-7etch1_mipsel.deb perl (5.8.8-7etch1) stable-security; urgency=high * Non-maintainer upload by the security team. * Apply patch by Yves Orton to fix CVE-2007-5116. stable/main/binary-powerpc/perl-base_5.8.8-7etch1_powerpc.deb stable/main/binary-powerpc/perl-debug_5.8.8-7etch1_powerpc.deb stable/main/binary-powerpc/perl-suid_5.8.8-7etch1_powerpc.deb stable/main/binary-powerpc/libperl5.8_5.8.8-7etch1_powerpc.deb stable/main/binary-powerpc/libperl-dev_5.8.8-7etch1_powerpc.deb stable/main/binary-powerpc/perl_5.8.8-7etch1_powerpc.deb perl (5.8.8-7etch1) stable-security; urgency=high * Non-maintainer upload by the security team. * Apply patch by Yves Orton to fix CVE-2007-5116. stable/main/binary-s390/perl-base_5.8.8-7etch1_s390.deb stable/main/binary-s390/perl-debug_5.8.8-7etch1_s390.deb stable/main/binary-s390/perl-suid_5.8.8-7etch1_s390.deb stable/main/binary-s390/libperl5.8_5.8.8-7etch1_s390.deb stable/main/binary-s390/libperl-dev_5.8.8-7etch1_s390.deb stable/main/binary-s390/perl_5.8.8-7etch1_s390.deb perl (5.8.8-7etch1) stable-security; urgency=high * Non-maintainer upload by the security team. * Apply patch by Yves Orton to fix CVE-2007-5116. stable/main/binary-sparc/perl-base_5.8.8-7etch1_sparc.deb stable/main/binary-sparc/perl-debug_5.8.8-7etch1_sparc.deb stable/main/binary-sparc/perl-suid_5.8.8-7etch1_sparc.deb stable/main/binary-sparc/libperl5.8_5.8.8-7etch1_sparc.deb stable/main/binary-sparc/libperl-dev_5.8.8-7etch1_sparc.deb stable/main/binary-sparc/perl_5.8.8-7etch1_sparc.deb perl (5.8.8-7etch1) stable-security; urgency=high * Non-maintainer upload by the security team. * Apply patch by Yves Orton to fix CVE-2007-5116. stable/main/binary-alpha/php4-common_4.4.4-8+etch4_alpha.deb stable/main/binary-alpha/libapache-mod-php4_4.4.4-8+etch4_alpha.deb stable/main/binary-alpha/libapache2-mod-php4_4.4.4-8+etch4_alpha.deb stable/main/binary-alpha/php4-cgi_4.4.4-8+etch4_alpha.deb stable/main/binary-alpha/php4-cli_4.4.4-8+etch4_alpha.deb stable/main/binary-alpha/php4-dev_4.4.4-8+etch4_alpha.deb stable/main/binary-alpha/php4-curl_4.4.4-8+etch4_alpha.deb stable/main/binary-alpha/php4-domxml_4.4.4-8+etch4_alpha.deb stable/main/binary-alpha/php4-gd_4.4.4-8+etch4_alpha.deb stable/main/binary-alpha/php4-imap_4.4.4-8+etch4_alpha.deb stable/main/binary-alpha/php4-ldap_4.4.4-8+etch4_alpha.deb stable/main/binary-alpha/php4-mcal_4.4.4-8+etch4_alpha.deb stable/main/binary-alpha/php4-mcrypt_4.4.4-8+etch4_alpha.deb stable/main/binary-alpha/php4-mhash_4.4.4-8+etch4_alpha.deb stable/main/binary-alpha/php4-mysql_4.4.4-8+etch4_alpha.deb stable/main/binary-alpha/php4-odbc_4.4.4-8+etch4_alpha.deb stable/main/binary-alpha/php4-pgsql_4.4.4-8+etch4_alpha.deb stable/main/binary-alpha/php4-pspell_4.4.4-8+etch4_alpha.deb stable/main/binary-alpha/php4-recode_4.4.4-8+etch4_alpha.deb stable/main/binary-alpha/php4-snmp_4.4.4-8+etch4_alpha.deb stable/main/binary-alpha/php4-sybase_4.4.4-8+etch4_alpha.deb stable/main/binary-alpha/php4-xslt_4.4.4-8+etch4_alpha.deb php4 (6:4.4.4-8+etch4) stable-security; urgency=low * NMU prepared for the security team by the package maintainer. * The following security issue is addressed with this update: - CVE-2007-1864: Buffer overflow in the bundled libxmlrpc library. * Thanks to Joe Orton from redhat for sharing the patch. stable/main/source/php4_4.4.4-8+etch4.dsc stable/main/source/php4_4.4.4-8+etch4.diff.gz stable/main/binary-amd64/php4-common_4.4.4-8+etch4_amd64.deb stable/main/binary-amd64/libapache-mod-php4_4.4.4-8+etch4_amd64.deb stable/main/binary-amd64/libapache2-mod-php4_4.4.4-8+etch4_amd64.deb stable/main/binary-amd64/php4-cgi_4.4.4-8+etch4_amd64.deb stable/main/binary-amd64/php4-cli_4.4.4-8+etch4_amd64.deb stable/main/binary-amd64/php4-dev_4.4.4-8+etch4_amd64.deb stable/main/binary-amd64/php4-curl_4.4.4-8+etch4_amd64.deb stable/main/binary-amd64/php4-domxml_4.4.4-8+etch4_amd64.deb stable/main/binary-amd64/php4-gd_4.4.4-8+etch4_amd64.deb stable/main/binary-amd64/php4-imap_4.4.4-8+etch4_amd64.deb stable/main/binary-amd64/php4-interbase_4.4.4-8+etch4_amd64.deb stable/main/binary-amd64/php4-ldap_4.4.4-8+etch4_amd64.deb stable/main/binary-amd64/php4-mcal_4.4.4-8+etch4_amd64.deb stable/main/binary-amd64/php4-mcrypt_4.4.4-8+etch4_amd64.deb stable/main/binary-amd64/php4-mhash_4.4.4-8+etch4_amd64.deb stable/main/binary-amd64/php4-mysql_4.4.4-8+etch4_amd64.deb stable/main/binary-amd64/php4-odbc_4.4.4-8+etch4_amd64.deb stable/main/binary-amd64/php4-pgsql_4.4.4-8+etch4_amd64.deb stable/main/binary-amd64/php4-pspell_4.4.4-8+etch4_amd64.deb stable/main/binary-amd64/php4-recode_4.4.4-8+etch4_amd64.deb stable/main/binary-amd64/php4-snmp_4.4.4-8+etch4_amd64.deb stable/main/binary-amd64/php4-sybase_4.4.4-8+etch4_amd64.deb stable/main/binary-amd64/php4-xslt_4.4.4-8+etch4_amd64.deb stable/main/binary-all/php4_4.4.4-8+etch4_all.deb stable/main/binary-all/php4-pear_4.4.4-8+etch4_all.deb php4 (6:4.4.4-8+etch4) stable-security; urgency=low * NMU prepared for the security team by the package maintainer. * The following security issue is addressed with this update: - CVE-2007-1864: Buffer overflow in the bundled libxmlrpc library. * Thanks to Joe Orton from redhat for sharing the patch. stable/main/binary-arm/php4-common_4.4.4-8+etch4_arm.deb stable/main/binary-arm/libapache-mod-php4_4.4.4-8+etch4_arm.deb stable/main/binary-arm/libapache2-mod-php4_4.4.4-8+etch4_arm.deb stable/main/binary-arm/php4-cgi_4.4.4-8+etch4_arm.deb stable/main/binary-arm/php4-cli_4.4.4-8+etch4_arm.deb stable/main/binary-arm/php4-dev_4.4.4-8+etch4_arm.deb stable/main/binary-arm/php4-curl_4.4.4-8+etch4_arm.deb stable/main/binary-arm/php4-domxml_4.4.4-8+etch4_arm.deb stable/main/binary-arm/php4-gd_4.4.4-8+etch4_arm.deb stable/main/binary-arm/php4-imap_4.4.4-8+etch4_arm.deb stable/main/binary-arm/php4-ldap_4.4.4-8+etch4_arm.deb stable/main/binary-arm/php4-mcal_4.4.4-8+etch4_arm.deb stable/main/binary-arm/php4-mcrypt_4.4.4-8+etch4_arm.deb stable/main/binary-arm/php4-mhash_4.4.4-8+etch4_arm.deb stable/main/binary-arm/php4-mysql_4.4.4-8+etch4_arm.deb stable/main/binary-arm/php4-odbc_4.4.4-8+etch4_arm.deb stable/main/binary-arm/php4-pgsql_4.4.4-8+etch4_arm.deb stable/main/binary-arm/php4-pspell_4.4.4-8+etch4_arm.deb stable/main/binary-arm/php4-recode_4.4.4-8+etch4_arm.deb stable/main/binary-arm/php4-snmp_4.4.4-8+etch4_arm.deb stable/main/binary-arm/php4-sybase_4.4.4-8+etch4_arm.deb stable/main/binary-arm/php4-xslt_4.4.4-8+etch4_arm.deb php4 (6:4.4.4-8+etch4) stable-security; urgency=low * NMU prepared for the security team by the package maintainer. * The following security issue is addressed with this update: - CVE-2007-1864: Buffer overflow in the bundled libxmlrpc library. * Thanks to Joe Orton from redhat for sharing the patch. stable/main/binary-hppa/php4-common_4.4.4-8+etch4_hppa.deb stable/main/binary-hppa/libapache-mod-php4_4.4.4-8+etch4_hppa.deb stable/main/binary-hppa/libapache2-mod-php4_4.4.4-8+etch4_hppa.deb stable/main/binary-hppa/php4-cgi_4.4.4-8+etch4_hppa.deb stable/main/binary-hppa/php4-cli_4.4.4-8+etch4_hppa.deb stable/main/binary-hppa/php4-dev_4.4.4-8+etch4_hppa.deb stable/main/binary-hppa/php4-curl_4.4.4-8+etch4_hppa.deb stable/main/binary-hppa/php4-domxml_4.4.4-8+etch4_hppa.deb stable/main/binary-hppa/php4-gd_4.4.4-8+etch4_hppa.deb stable/main/binary-hppa/php4-imap_4.4.4-8+etch4_hppa.deb stable/main/binary-hppa/php4-ldap_4.4.4-8+etch4_hppa.deb stable/main/binary-hppa/php4-mcal_4.4.4-8+etch4_hppa.deb stable/main/binary-hppa/php4-mcrypt_4.4.4-8+etch4_hppa.deb stable/main/binary-hppa/php4-mhash_4.4.4-8+etch4_hppa.deb stable/main/binary-hppa/php4-mysql_4.4.4-8+etch4_hppa.deb stable/main/binary-hppa/php4-odbc_4.4.4-8+etch4_hppa.deb stable/main/binary-hppa/php4-pgsql_4.4.4-8+etch4_hppa.deb stable/main/binary-hppa/php4-pspell_4.4.4-8+etch4_hppa.deb stable/main/binary-hppa/php4-recode_4.4.4-8+etch4_hppa.deb stable/main/binary-hppa/php4-snmp_4.4.4-8+etch4_hppa.deb stable/main/binary-hppa/php4-sybase_4.4.4-8+etch4_hppa.deb stable/main/binary-hppa/php4-xslt_4.4.4-8+etch4_hppa.deb php4 (6:4.4.4-8+etch4) stable-security; urgency=low * NMU prepared for the security team by the package maintainer. * The following security issue is addressed with this update: - CVE-2007-1864: Buffer overflow in the bundled libxmlrpc library. * Thanks to Joe Orton from redhat for sharing the patch. stable/main/binary-i386/php4-common_4.4.4-8+etch4_i386.deb stable/main/binary-i386/libapache-mod-php4_4.4.4-8+etch4_i386.deb stable/main/binary-i386/libapache2-mod-php4_4.4.4-8+etch4_i386.deb stable/main/binary-i386/php4-cgi_4.4.4-8+etch4_i386.deb stable/main/binary-i386/php4-cli_4.4.4-8+etch4_i386.deb stable/main/binary-i386/php4-dev_4.4.4-8+etch4_i386.deb stable/main/binary-i386/php4-curl_4.4.4-8+etch4_i386.deb stable/main/binary-i386/php4-domxml_4.4.4-8+etch4_i386.deb stable/main/binary-i386/php4-gd_4.4.4-8+etch4_i386.deb stable/main/binary-i386/php4-imap_4.4.4-8+etch4_i386.deb stable/main/binary-i386/php4-interbase_4.4.4-8+etch4_i386.deb stable/main/binary-i386/php4-ldap_4.4.4-8+etch4_i386.deb stable/main/binary-i386/php4-mcal_4.4.4-8+etch4_i386.deb stable/main/binary-i386/php4-mcrypt_4.4.4-8+etch4_i386.deb stable/main/binary-i386/php4-mhash_4.4.4-8+etch4_i386.deb stable/main/binary-i386/php4-mysql_4.4.4-8+etch4_i386.deb stable/main/binary-i386/php4-odbc_4.4.4-8+etch4_i386.deb stable/main/binary-i386/php4-pgsql_4.4.4-8+etch4_i386.deb stable/main/binary-i386/php4-pspell_4.4.4-8+etch4_i386.deb stable/main/binary-i386/php4-recode_4.4.4-8+etch4_i386.deb stable/main/binary-i386/php4-snmp_4.4.4-8+etch4_i386.deb stable/main/binary-i386/php4-sybase_4.4.4-8+etch4_i386.deb stable/main/binary-i386/php4-xslt_4.4.4-8+etch4_i386.deb php4 (6:4.4.4-8+etch4) stable-security; urgency=low * NMU prepared for the security team by the package maintainer. * The following security issue is addressed with this update: - CVE-2007-1864: Buffer overflow in the bundled libxmlrpc library. * Thanks to Joe Orton from redhat for sharing the patch. stable/main/binary-ia64/php4-common_4.4.4-8+etch4_ia64.deb stable/main/binary-ia64/libapache-mod-php4_4.4.4-8+etch4_ia64.deb stable/main/binary-ia64/libapache2-mod-php4_4.4.4-8+etch4_ia64.deb stable/main/binary-ia64/php4-cgi_4.4.4-8+etch4_ia64.deb stable/main/binary-ia64/php4-cli_4.4.4-8+etch4_ia64.deb stable/main/binary-ia64/php4-dev_4.4.4-8+etch4_ia64.deb stable/main/binary-ia64/php4-curl_4.4.4-8+etch4_ia64.deb stable/main/binary-ia64/php4-domxml_4.4.4-8+etch4_ia64.deb stable/main/binary-ia64/php4-gd_4.4.4-8+etch4_ia64.deb stable/main/binary-ia64/php4-imap_4.4.4-8+etch4_ia64.deb stable/main/binary-ia64/php4-ldap_4.4.4-8+etch4_ia64.deb stable/main/binary-ia64/php4-mcal_4.4.4-8+etch4_ia64.deb stable/main/binary-ia64/php4-mcrypt_4.4.4-8+etch4_ia64.deb stable/main/binary-ia64/php4-mhash_4.4.4-8+etch4_ia64.deb stable/main/binary-ia64/php4-mysql_4.4.4-8+etch4_ia64.deb stable/main/binary-ia64/php4-odbc_4.4.4-8+etch4_ia64.deb stable/main/binary-ia64/php4-pgsql_4.4.4-8+etch4_ia64.deb stable/main/binary-ia64/php4-pspell_4.4.4-8+etch4_ia64.deb stable/main/binary-ia64/php4-recode_4.4.4-8+etch4_ia64.deb stable/main/binary-ia64/php4-snmp_4.4.4-8+etch4_ia64.deb stable/main/binary-ia64/php4-sybase_4.4.4-8+etch4_ia64.deb stable/main/binary-ia64/php4-xslt_4.4.4-8+etch4_ia64.deb php4 (6:4.4.4-8+etch4) stable-security; urgency=low * NMU prepared for the security team by the package maintainer. * The following security issue is addressed with this update: - CVE-2007-1864: Buffer overflow in the bundled libxmlrpc library. * Thanks to Joe Orton from redhat for sharing the patch. stable/main/binary-mips/php4-common_4.4.4-8+etch4_mips.deb stable/main/binary-mips/libapache-mod-php4_4.4.4-8+etch4_mips.deb stable/main/binary-mips/libapache2-mod-php4_4.4.4-8+etch4_mips.deb stable/main/binary-mips/php4-cgi_4.4.4-8+etch4_mips.deb stable/main/binary-mips/php4-cli_4.4.4-8+etch4_mips.deb stable/main/binary-mips/php4-dev_4.4.4-8+etch4_mips.deb stable/main/binary-mips/php4-curl_4.4.4-8+etch4_mips.deb stable/main/binary-mips/php4-domxml_4.4.4-8+etch4_mips.deb stable/main/binary-mips/php4-gd_4.4.4-8+etch4_mips.deb stable/main/binary-mips/php4-imap_4.4.4-8+etch4_mips.deb stable/main/binary-mips/php4-ldap_4.4.4-8+etch4_mips.deb stable/main/binary-mips/php4-mcal_4.4.4-8+etch4_mips.deb stable/main/binary-mips/php4-mcrypt_4.4.4-8+etch4_mips.deb stable/main/binary-mips/php4-mhash_4.4.4-8+etch4_mips.deb stable/main/binary-mips/php4-mysql_4.4.4-8+etch4_mips.deb stable/main/binary-mips/php4-odbc_4.4.4-8+etch4_mips.deb stable/main/binary-mips/php4-pgsql_4.4.4-8+etch4_mips.deb stable/main/binary-mips/php4-pspell_4.4.4-8+etch4_mips.deb stable/main/binary-mips/php4-recode_4.4.4-8+etch4_mips.deb stable/main/binary-mips/php4-snmp_4.4.4-8+etch4_mips.deb stable/main/binary-mips/php4-sybase_4.4.4-8+etch4_mips.deb stable/main/binary-mips/php4-xslt_4.4.4-8+etch4_mips.deb php4 (6:4.4.4-8+etch4) stable-security; urgency=low * NMU prepared for the security team by the package maintainer. * The following security issue is addressed with this update: - CVE-2007-1864: Buffer overflow in the bundled libxmlrpc library. * Thanks to Joe Orton from redhat for sharing the patch. stable/main/binary-mipsel/php4-common_4.4.4-8+etch4_mipsel.deb stable/main/binary-mipsel/libapache-mod-php4_4.4.4-8+etch4_mipsel.deb stable/main/binary-mipsel/libapache2-mod-php4_4.4.4-8+etch4_mipsel.deb stable/main/binary-mipsel/php4-cgi_4.4.4-8+etch4_mipsel.deb stable/main/binary-mipsel/php4-cli_4.4.4-8+etch4_mipsel.deb stable/main/binary-mipsel/php4-dev_4.4.4-8+etch4_mipsel.deb stable/main/binary-mipsel/php4-curl_4.4.4-8+etch4_mipsel.deb stable/main/binary-mipsel/php4-domxml_4.4.4-8+etch4_mipsel.deb stable/main/binary-mipsel/php4-gd_4.4.4-8+etch4_mipsel.deb stable/main/binary-mipsel/php4-imap_4.4.4-8+etch4_mipsel.deb stable/main/binary-mipsel/php4-ldap_4.4.4-8+etch4_mipsel.deb stable/main/binary-mipsel/php4-mcal_4.4.4-8+etch4_mipsel.deb stable/main/binary-mipsel/php4-mcrypt_4.4.4-8+etch4_mipsel.deb stable/main/binary-mipsel/php4-mhash_4.4.4-8+etch4_mipsel.deb stable/main/binary-mipsel/php4-mysql_4.4.4-8+etch4_mipsel.deb stable/main/binary-mipsel/php4-odbc_4.4.4-8+etch4_mipsel.deb stable/main/binary-mipsel/php4-pgsql_4.4.4-8+etch4_mipsel.deb stable/main/binary-mipsel/php4-pspell_4.4.4-8+etch4_mipsel.deb stable/main/binary-mipsel/php4-recode_4.4.4-8+etch4_mipsel.deb stable/main/binary-mipsel/php4-snmp_4.4.4-8+etch4_mipsel.deb stable/main/binary-mipsel/php4-sybase_4.4.4-8+etch4_mipsel.deb stable/main/binary-mipsel/php4-xslt_4.4.4-8+etch4_mipsel.deb php4 (6:4.4.4-8+etch4) stable-security; urgency=low * NMU prepared for the security team by the package maintainer. * The following security issue is addressed with this update: - CVE-2007-1864: Buffer overflow in the bundled libxmlrpc library. * Thanks to Joe Orton from redhat for sharing the patch. stable/main/binary-powerpc/php4-common_4.4.4-8+etch4_powerpc.deb stable/main/binary-powerpc/libapache-mod-php4_4.4.4-8+etch4_powerpc.deb stable/main/binary-powerpc/libapache2-mod-php4_4.4.4-8+etch4_powerpc.deb stable/main/binary-powerpc/php4-cgi_4.4.4-8+etch4_powerpc.deb stable/main/binary-powerpc/php4-cli_4.4.4-8+etch4_powerpc.deb stable/main/binary-powerpc/php4-dev_4.4.4-8+etch4_powerpc.deb stable/main/binary-powerpc/php4-curl_4.4.4-8+etch4_powerpc.deb stable/main/binary-powerpc/php4-domxml_4.4.4-8+etch4_powerpc.deb stable/main/binary-powerpc/php4-gd_4.4.4-8+etch4_powerpc.deb stable/main/binary-powerpc/php4-imap_4.4.4-8+etch4_powerpc.deb stable/main/binary-powerpc/php4-ldap_4.4.4-8+etch4_powerpc.deb stable/main/binary-powerpc/php4-mcal_4.4.4-8+etch4_powerpc.deb stable/main/binary-powerpc/php4-mcrypt_4.4.4-8+etch4_powerpc.deb stable/main/binary-powerpc/php4-mhash_4.4.4-8+etch4_powerpc.deb stable/main/binary-powerpc/php4-mysql_4.4.4-8+etch4_powerpc.deb stable/main/binary-powerpc/php4-odbc_4.4.4-8+etch4_powerpc.deb stable/main/binary-powerpc/php4-pgsql_4.4.4-8+etch4_powerpc.deb stable/main/binary-powerpc/php4-pspell_4.4.4-8+etch4_powerpc.deb stable/main/binary-powerpc/php4-recode_4.4.4-8+etch4_powerpc.deb stable/main/binary-powerpc/php4-snmp_4.4.4-8+etch4_powerpc.deb stable/main/binary-powerpc/php4-sybase_4.4.4-8+etch4_powerpc.deb stable/main/binary-powerpc/php4-xslt_4.4.4-8+etch4_powerpc.deb php4 (6:4.4.4-8+etch4) stable-security; urgency=low * NMU prepared for the security team by the package maintainer. * The following security issue is addressed with this update: - CVE-2007-1864: Buffer overflow in the bundled libxmlrpc library. * Thanks to Joe Orton from redhat for sharing the patch. stable/main/binary-s390/php4-common_4.4.4-8+etch4_s390.deb stable/main/binary-s390/libapache-mod-php4_4.4.4-8+etch4_s390.deb stable/main/binary-s390/libapache2-mod-php4_4.4.4-8+etch4_s390.deb stable/main/binary-s390/php4-cgi_4.4.4-8+etch4_s390.deb stable/main/binary-s390/php4-cli_4.4.4-8+etch4_s390.deb stable/main/binary-s390/php4-dev_4.4.4-8+etch4_s390.deb stable/main/binary-s390/php4-curl_4.4.4-8+etch4_s390.deb stable/main/binary-s390/php4-domxml_4.4.4-8+etch4_s390.deb stable/main/binary-s390/php4-gd_4.4.4-8+etch4_s390.deb stable/main/binary-s390/php4-imap_4.4.4-8+etch4_s390.deb stable/main/binary-s390/php4-ldap_4.4.4-8+etch4_s390.deb stable/main/binary-s390/php4-mcal_4.4.4-8+etch4_s390.deb stable/main/binary-s390/php4-mcrypt_4.4.4-8+etch4_s390.deb stable/main/binary-s390/php4-mhash_4.4.4-8+etch4_s390.deb stable/main/binary-s390/php4-mysql_4.4.4-8+etch4_s390.deb stable/main/binary-s390/php4-odbc_4.4.4-8+etch4_s390.deb stable/main/binary-s390/php4-pgsql_4.4.4-8+etch4_s390.deb stable/main/binary-s390/php4-pspell_4.4.4-8+etch4_s390.deb stable/main/binary-s390/php4-recode_4.4.4-8+etch4_s390.deb stable/main/binary-s390/php4-snmp_4.4.4-8+etch4_s390.deb stable/main/binary-s390/php4-sybase_4.4.4-8+etch4_s390.deb stable/main/binary-s390/php4-xslt_4.4.4-8+etch4_s390.deb php4 (6:4.4.4-8+etch4) stable-security; urgency=low * NMU prepared for the security team by the package maintainer. * The following security issue is addressed with this update: - CVE-2007-1864: Buffer overflow in the bundled libxmlrpc library. * Thanks to Joe Orton from redhat for sharing the patch. stable/main/binary-sparc/php4-common_4.4.4-8+etch4_sparc.deb stable/main/binary-sparc/libapache-mod-php4_4.4.4-8+etch4_sparc.deb stable/main/binary-sparc/libapache2-mod-php4_4.4.4-8+etch4_sparc.deb stable/main/binary-sparc/php4-cgi_4.4.4-8+etch4_sparc.deb stable/main/binary-sparc/php4-cli_4.4.4-8+etch4_sparc.deb stable/main/binary-sparc/php4-dev_4.4.4-8+etch4_sparc.deb stable/main/binary-sparc/php4-curl_4.4.4-8+etch4_sparc.deb stable/main/binary-sparc/php4-domxml_4.4.4-8+etch4_sparc.deb stable/main/binary-sparc/php4-gd_4.4.4-8+etch4_sparc.deb stable/main/binary-sparc/php4-imap_4.4.4-8+etch4_sparc.deb stable/main/binary-sparc/php4-ldap_4.4.4-8+etch4_sparc.deb stable/main/binary-sparc/php4-mcal_4.4.4-8+etch4_sparc.deb stable/main/binary-sparc/php4-mcrypt_4.4.4-8+etch4_sparc.deb stable/main/binary-sparc/php4-mhash_4.4.4-8+etch4_sparc.deb stable/main/binary-sparc/php4-mysql_4.4.4-8+etch4_sparc.deb stable/main/binary-sparc/php4-odbc_4.4.4-8+etch4_sparc.deb stable/main/binary-sparc/php4-pgsql_4.4.4-8+etch4_sparc.deb stable/main/binary-sparc/php4-pspell_4.4.4-8+etch4_sparc.deb stable/main/binary-sparc/php4-recode_4.4.4-8+etch4_sparc.deb stable/main/binary-sparc/php4-snmp_4.4.4-8+etch4_sparc.deb stable/main/binary-sparc/php4-sybase_4.4.4-8+etch4_sparc.deb stable/main/binary-sparc/php4-xslt_4.4.4-8+etch4_sparc.deb php4 (6:4.4.4-8+etch4) stable-security; urgency=low * NMU prepared for the security team by the package maintainer. * The following security issue is addressed with this update: - CVE-2007-1864: Buffer overflow in the bundled libxmlrpc library. * Thanks to Joe Orton from redhat for sharing the patch. stable/main/binary-alpha/php5-common_5.2.0-8+etch7_alpha.deb stable/main/binary-alpha/libapache-mod-php5_5.2.0-8+etch7_alpha.deb stable/main/binary-alpha/libapache2-mod-php5_5.2.0-8+etch7_alpha.deb stable/main/binary-alpha/php5-cgi_5.2.0-8+etch7_alpha.deb stable/main/binary-alpha/php5-cli_5.2.0-8+etch7_alpha.deb stable/main/binary-alpha/php5-dev_5.2.0-8+etch7_alpha.deb stable/main/binary-alpha/php5-curl_5.2.0-8+etch7_alpha.deb stable/main/binary-alpha/php5-gd_5.2.0-8+etch7_alpha.deb stable/main/binary-alpha/php5-imap_5.2.0-8+etch7_alpha.deb stable/main/binary-alpha/php5-ldap_5.2.0-8+etch7_alpha.deb stable/main/binary-alpha/php5-mcrypt_5.2.0-8+etch7_alpha.deb stable/main/binary-alpha/php5-mhash_5.2.0-8+etch7_alpha.deb stable/main/binary-alpha/php5-mysql_5.2.0-8+etch7_alpha.deb stable/main/binary-alpha/php5-odbc_5.2.0-8+etch7_alpha.deb stable/main/binary-alpha/php5-pgsql_5.2.0-8+etch7_alpha.deb stable/main/binary-alpha/php5-pspell_5.2.0-8+etch7_alpha.deb stable/main/binary-alpha/php5-recode_5.2.0-8+etch7_alpha.deb stable/main/binary-alpha/php5-snmp_5.2.0-8+etch7_alpha.deb stable/main/binary-alpha/php5-sqlite_5.2.0-8+etch7_alpha.deb stable/main/binary-alpha/php5-sybase_5.2.0-8+etch7_alpha.deb stable/main/binary-alpha/php5-tidy_5.2.0-8+etch7_alpha.deb stable/main/binary-alpha/php5-xmlrpc_5.2.0-8+etch7_alpha.deb stable/main/binary-alpha/php5-xsl_5.2.0-8+etch7_alpha.deb php5 (5.2.0-8+etch7) stable-security; urgency=low * An addendum to the previous security NMU, the following vulnerability is also fixed: - CVE-2007-1864: Buffer overflow in the bundled libxmlrpc library. * Thanks to Joe Orton from redhat for sharing the patch. stable/main/source/php5_5.2.0-8+etch7.dsc stable/main/source/php5_5.2.0-8+etch7.diff.gz stable/main/binary-amd64/php5-common_5.2.0-8+etch7_amd64.deb stable/main/binary-amd64/libapache-mod-php5_5.2.0-8+etch7_amd64.deb stable/main/binary-amd64/libapache2-mod-php5_5.2.0-8+etch7_amd64.deb stable/main/binary-amd64/php5-cgi_5.2.0-8+etch7_amd64.deb stable/main/binary-amd64/php5-cli_5.2.0-8+etch7_amd64.deb stable/main/binary-amd64/php5-dev_5.2.0-8+etch7_amd64.deb stable/main/binary-amd64/php5-curl_5.2.0-8+etch7_amd64.deb stable/main/binary-amd64/php5-gd_5.2.0-8+etch7_amd64.deb stable/main/binary-amd64/php5-imap_5.2.0-8+etch7_amd64.deb stable/main/binary-amd64/php5-interbase_5.2.0-8+etch7_amd64.deb stable/main/binary-amd64/php5-ldap_5.2.0-8+etch7_amd64.deb stable/main/binary-amd64/php5-mcrypt_5.2.0-8+etch7_amd64.deb stable/main/binary-amd64/php5-mhash_5.2.0-8+etch7_amd64.deb stable/main/binary-amd64/php5-mysql_5.2.0-8+etch7_amd64.deb stable/main/binary-amd64/php5-odbc_5.2.0-8+etch7_amd64.deb stable/main/binary-amd64/php5-pgsql_5.2.0-8+etch7_amd64.deb stable/main/binary-amd64/php5-pspell_5.2.0-8+etch7_amd64.deb stable/main/binary-amd64/php5-recode_5.2.0-8+etch7_amd64.deb stable/main/binary-amd64/php5-snmp_5.2.0-8+etch7_amd64.deb stable/main/binary-amd64/php5-sqlite_5.2.0-8+etch7_amd64.deb stable/main/binary-amd64/php5-sybase_5.2.0-8+etch7_amd64.deb stable/main/binary-amd64/php5-tidy_5.2.0-8+etch7_amd64.deb stable/main/binary-amd64/php5-xmlrpc_5.2.0-8+etch7_amd64.deb stable/main/binary-amd64/php5-xsl_5.2.0-8+etch7_amd64.deb stable/main/binary-all/php5_5.2.0-8+etch7_all.deb stable/main/binary-all/php-pear_5.2.0-8+etch7_all.deb php5 (5.2.0-8+etch7) stable-security; urgency=low * An addendum to the previous security NMU, the following vulnerability is also fixed: - CVE-2007-1864: Buffer overflow in the bundled libxmlrpc library. * Thanks to Joe Orton from redhat for sharing the patch. stable/main/binary-arm/php5-common_5.2.0-8+etch7_arm.deb stable/main/binary-arm/libapache-mod-php5_5.2.0-8+etch7_arm.deb stable/main/binary-arm/libapache2-mod-php5_5.2.0-8+etch7_arm.deb stable/main/binary-arm/php5-cgi_5.2.0-8+etch7_arm.deb stable/main/binary-arm/php5-cli_5.2.0-8+etch7_arm.deb stable/main/binary-arm/php5-dev_5.2.0-8+etch7_arm.deb stable/main/binary-arm/php5-curl_5.2.0-8+etch7_arm.deb stable/main/binary-arm/php5-gd_5.2.0-8+etch7_arm.deb stable/main/binary-arm/php5-imap_5.2.0-8+etch7_arm.deb stable/main/binary-arm/php5-ldap_5.2.0-8+etch7_arm.deb stable/main/binary-arm/php5-mcrypt_5.2.0-8+etch7_arm.deb stable/main/binary-arm/php5-mhash_5.2.0-8+etch7_arm.deb stable/main/binary-arm/php5-mysql_5.2.0-8+etch7_arm.deb stable/main/binary-arm/php5-odbc_5.2.0-8+etch7_arm.deb stable/main/binary-arm/php5-pgsql_5.2.0-8+etch7_arm.deb stable/main/binary-arm/php5-pspell_5.2.0-8+etch7_arm.deb stable/main/binary-arm/php5-recode_5.2.0-8+etch7_arm.deb stable/main/binary-arm/php5-snmp_5.2.0-8+etch7_arm.deb stable/main/binary-arm/php5-sqlite_5.2.0-8+etch7_arm.deb stable/main/binary-arm/php5-sybase_5.2.0-8+etch7_arm.deb stable/main/binary-arm/php5-tidy_5.2.0-8+etch7_arm.deb stable/main/binary-arm/php5-xmlrpc_5.2.0-8+etch7_arm.deb stable/main/binary-arm/php5-xsl_5.2.0-8+etch7_arm.deb php5 (5.2.0-8+etch7) stable-security; urgency=low * An addendum to the previous security NMU, the following vulnerability is also fixed: - CVE-2007-1864: Buffer overflow in the bundled libxmlrpc library. * Thanks to Joe Orton from redhat for sharing the patch. stable/main/binary-hppa/php5-common_5.2.0-8+etch7_hppa.deb stable/main/binary-hppa/libapache-mod-php5_5.2.0-8+etch7_hppa.deb stable/main/binary-hppa/libapache2-mod-php5_5.2.0-8+etch7_hppa.deb stable/main/binary-hppa/php5-cgi_5.2.0-8+etch7_hppa.deb stable/main/binary-hppa/php5-cli_5.2.0-8+etch7_hppa.deb stable/main/binary-hppa/php5-dev_5.2.0-8+etch7_hppa.deb stable/main/binary-hppa/php5-curl_5.2.0-8+etch7_hppa.deb stable/main/binary-hppa/php5-gd_5.2.0-8+etch7_hppa.deb stable/main/binary-hppa/php5-imap_5.2.0-8+etch7_hppa.deb stable/main/binary-hppa/php5-ldap_5.2.0-8+etch7_hppa.deb stable/main/binary-hppa/php5-mcrypt_5.2.0-8+etch7_hppa.deb stable/main/binary-hppa/php5-mhash_5.2.0-8+etch7_hppa.deb stable/main/binary-hppa/php5-mysql_5.2.0-8+etch7_hppa.deb stable/main/binary-hppa/php5-odbc_5.2.0-8+etch7_hppa.deb stable/main/binary-hppa/php5-pgsql_5.2.0-8+etch7_hppa.deb stable/main/binary-hppa/php5-pspell_5.2.0-8+etch7_hppa.deb stable/main/binary-hppa/php5-recode_5.2.0-8+etch7_hppa.deb stable/main/binary-hppa/php5-snmp_5.2.0-8+etch7_hppa.deb stable/main/binary-hppa/php5-sqlite_5.2.0-8+etch7_hppa.deb stable/main/binary-hppa/php5-sybase_5.2.0-8+etch7_hppa.deb stable/main/binary-hppa/php5-tidy_5.2.0-8+etch7_hppa.deb stable/main/binary-hppa/php5-xmlrpc_5.2.0-8+etch7_hppa.deb stable/main/binary-hppa/php5-xsl_5.2.0-8+etch7_hppa.deb php5 (5.2.0-8+etch7) stable-security; urgency=low * An addendum to the previous security NMU, the following vulnerability is also fixed: - CVE-2007-1864: Buffer overflow in the bundled libxmlrpc library. * Thanks to Joe Orton from redhat for sharing the patch. stable/main/binary-i386/php5-common_5.2.0-8+etch7_i386.deb stable/main/binary-i386/libapache-mod-php5_5.2.0-8+etch7_i386.deb stable/main/binary-i386/libapache2-mod-php5_5.2.0-8+etch7_i386.deb stable/main/binary-i386/php5-cgi_5.2.0-8+etch7_i386.deb stable/main/binary-i386/php5-cli_5.2.0-8+etch7_i386.deb stable/main/binary-i386/php5-dev_5.2.0-8+etch7_i386.deb stable/main/binary-i386/php5-curl_5.2.0-8+etch7_i386.deb stable/main/binary-i386/php5-gd_5.2.0-8+etch7_i386.deb stable/main/binary-i386/php5-imap_5.2.0-8+etch7_i386.deb stable/main/binary-i386/php5-interbase_5.2.0-8+etch7_i386.deb stable/main/binary-i386/php5-ldap_5.2.0-8+etch7_i386.deb stable/main/binary-i386/php5-mcrypt_5.2.0-8+etch7_i386.deb stable/main/binary-i386/php5-mhash_5.2.0-8+etch7_i386.deb stable/main/binary-i386/php5-mysql_5.2.0-8+etch7_i386.deb stable/main/binary-i386/php5-odbc_5.2.0-8+etch7_i386.deb stable/main/binary-i386/php5-pgsql_5.2.0-8+etch7_i386.deb stable/main/binary-i386/php5-pspell_5.2.0-8+etch7_i386.deb stable/main/binary-i386/php5-recode_5.2.0-8+etch7_i386.deb stable/main/binary-i386/php5-snmp_5.2.0-8+etch7_i386.deb stable/main/binary-i386/php5-sqlite_5.2.0-8+etch7_i386.deb stable/main/binary-i386/php5-sybase_5.2.0-8+etch7_i386.deb stable/main/binary-i386/php5-tidy_5.2.0-8+etch7_i386.deb stable/main/binary-i386/php5-xmlrpc_5.2.0-8+etch7_i386.deb stable/main/binary-i386/php5-xsl_5.2.0-8+etch7_i386.deb php5 (5.2.0-8+etch7) stable-security; urgency=low * An addendum to the previous security NMU, the following vulnerability is also fixed: - CVE-2007-1864: Buffer overflow in the bundled libxmlrpc library. * Thanks to Joe Orton from redhat for sharing the patch. stable/main/binary-ia64/php5-common_5.2.0-8+etch7_ia64.deb stable/main/binary-ia64/libapache-mod-php5_5.2.0-8+etch7_ia64.deb stable/main/binary-ia64/libapache2-mod-php5_5.2.0-8+etch7_ia64.deb stable/main/binary-ia64/php5-cgi_5.2.0-8+etch7_ia64.deb stable/main/binary-ia64/php5-cli_5.2.0-8+etch7_ia64.deb stable/main/binary-ia64/php5-dev_5.2.0-8+etch7_ia64.deb stable/main/binary-ia64/php5-curl_5.2.0-8+etch7_ia64.deb stable/main/binary-ia64/php5-gd_5.2.0-8+etch7_ia64.deb stable/main/binary-ia64/php5-imap_5.2.0-8+etch7_ia64.deb stable/main/binary-ia64/php5-ldap_5.2.0-8+etch7_ia64.deb stable/main/binary-ia64/php5-mcrypt_5.2.0-8+etch7_ia64.deb stable/main/binary-ia64/php5-mhash_5.2.0-8+etch7_ia64.deb stable/main/binary-ia64/php5-mysql_5.2.0-8+etch7_ia64.deb stable/main/binary-ia64/php5-odbc_5.2.0-8+etch7_ia64.deb stable/main/binary-ia64/php5-pgsql_5.2.0-8+etch7_ia64.deb stable/main/binary-ia64/php5-pspell_5.2.0-8+etch7_ia64.deb stable/main/binary-ia64/php5-recode_5.2.0-8+etch7_ia64.deb stable/main/binary-ia64/php5-snmp_5.2.0-8+etch7_ia64.deb stable/main/binary-ia64/php5-sqlite_5.2.0-8+etch7_ia64.deb stable/main/binary-ia64/php5-sybase_5.2.0-8+etch7_ia64.deb stable/main/binary-ia64/php5-tidy_5.2.0-8+etch7_ia64.deb stable/main/binary-ia64/php5-xmlrpc_5.2.0-8+etch7_ia64.deb stable/main/binary-ia64/php5-xsl_5.2.0-8+etch7_ia64.deb php5 (5.2.0-8+etch7) stable-security; urgency=low * An addendum to the previous security NMU, the following vulnerability is also fixed: - CVE-2007-1864: Buffer overflow in the bundled libxmlrpc library. * Thanks to Joe Orton from redhat for sharing the patch. stable/main/binary-mips/php5-common_5.2.0-8+etch7_mips.deb stable/main/binary-mips/libapache-mod-php5_5.2.0-8+etch7_mips.deb stable/main/binary-mips/libapache2-mod-php5_5.2.0-8+etch7_mips.deb stable/main/binary-mips/php5-cgi_5.2.0-8+etch7_mips.deb stable/main/binary-mips/php5-cli_5.2.0-8+etch7_mips.deb stable/main/binary-mips/php5-dev_5.2.0-8+etch7_mips.deb stable/main/binary-mips/php5-curl_5.2.0-8+etch7_mips.deb stable/main/binary-mips/php5-gd_5.2.0-8+etch7_mips.deb stable/main/binary-mips/php5-imap_5.2.0-8+etch7_mips.deb stable/main/binary-mips/php5-ldap_5.2.0-8+etch7_mips.deb stable/main/binary-mips/php5-mcrypt_5.2.0-8+etch7_mips.deb stable/main/binary-mips/php5-mhash_5.2.0-8+etch7_mips.deb stable/main/binary-mips/php5-mysql_5.2.0-8+etch7_mips.deb stable/main/binary-mips/php5-odbc_5.2.0-8+etch7_mips.deb stable/main/binary-mips/php5-pgsql_5.2.0-8+etch7_mips.deb stable/main/binary-mips/php5-pspell_5.2.0-8+etch7_mips.deb stable/main/binary-mips/php5-recode_5.2.0-8+etch7_mips.deb stable/main/binary-mips/php5-snmp_5.2.0-8+etch7_mips.deb stable/main/binary-mips/php5-sqlite_5.2.0-8+etch7_mips.deb stable/main/binary-mips/php5-sybase_5.2.0-8+etch7_mips.deb stable/main/binary-mips/php5-tidy_5.2.0-8+etch7_mips.deb stable/main/binary-mips/php5-xmlrpc_5.2.0-8+etch7_mips.deb stable/main/binary-mips/php5-xsl_5.2.0-8+etch7_mips.deb php5 (5.2.0-8+etch7) stable-security; urgency=low * An addendum to the previous security NMU, the following vulnerability is also fixed: - CVE-2007-1864: Buffer overflow in the bundled libxmlrpc library. * Thanks to Joe Orton from redhat for sharing the patch. stable/main/binary-mipsel/php5-common_5.2.0-8+etch7_mipsel.deb stable/main/binary-mipsel/libapache-mod-php5_5.2.0-8+etch7_mipsel.deb stable/main/binary-mipsel/libapache2-mod-php5_5.2.0-8+etch7_mipsel.deb stable/main/binary-mipsel/php5-cgi_5.2.0-8+etch7_mipsel.deb stable/main/binary-mipsel/php5-cli_5.2.0-8+etch7_mipsel.deb stable/main/binary-mipsel/php5-dev_5.2.0-8+etch7_mipsel.deb stable/main/binary-mipsel/php5-curl_5.2.0-8+etch7_mipsel.deb stable/main/binary-mipsel/php5-gd_5.2.0-8+etch7_mipsel.deb stable/main/binary-mipsel/php5-imap_5.2.0-8+etch7_mipsel.deb stable/main/binary-mipsel/php5-ldap_5.2.0-8+etch7_mipsel.deb stable/main/binary-mipsel/php5-mcrypt_5.2.0-8+etch7_mipsel.deb stable/main/binary-mipsel/php5-mhash_5.2.0-8+etch7_mipsel.deb stable/main/binary-mipsel/php5-mysql_5.2.0-8+etch7_mipsel.deb stable/main/binary-mipsel/php5-odbc_5.2.0-8+etch7_mipsel.deb stable/main/binary-mipsel/php5-pgsql_5.2.0-8+etch7_mipsel.deb stable/main/binary-mipsel/php5-pspell_5.2.0-8+etch7_mipsel.deb stable/main/binary-mipsel/php5-recode_5.2.0-8+etch7_mipsel.deb stable/main/binary-mipsel/php5-snmp_5.2.0-8+etch7_mipsel.deb stable/main/binary-mipsel/php5-sqlite_5.2.0-8+etch7_mipsel.deb stable/main/binary-mipsel/php5-sybase_5.2.0-8+etch7_mipsel.deb stable/main/binary-mipsel/php5-tidy_5.2.0-8+etch7_mipsel.deb stable/main/binary-mipsel/php5-xmlrpc_5.2.0-8+etch7_mipsel.deb stable/main/binary-mipsel/php5-xsl_5.2.0-8+etch7_mipsel.deb php5 (5.2.0-8+etch7) stable-security; urgency=low * An addendum to the previous security NMU, the following vulnerability is also fixed: - CVE-2007-1864: Buffer overflow in the bundled libxmlrpc library. * Thanks to Joe Orton from redhat for sharing the patch. stable/main/binary-powerpc/php5-common_5.2.0-8+etch7_powerpc.deb stable/main/binary-powerpc/libapache-mod-php5_5.2.0-8+etch7_powerpc.deb stable/main/binary-powerpc/libapache2-mod-php5_5.2.0-8+etch7_powerpc.deb stable/main/binary-powerpc/php5-cgi_5.2.0-8+etch7_powerpc.deb stable/main/binary-powerpc/php5-cli_5.2.0-8+etch7_powerpc.deb stable/main/binary-powerpc/php5-dev_5.2.0-8+etch7_powerpc.deb stable/main/binary-powerpc/php5-curl_5.2.0-8+etch7_powerpc.deb stable/main/binary-powerpc/php5-gd_5.2.0-8+etch7_powerpc.deb stable/main/binary-powerpc/php5-imap_5.2.0-8+etch7_powerpc.deb stable/main/binary-powerpc/php5-ldap_5.2.0-8+etch7_powerpc.deb stable/main/binary-powerpc/php5-mcrypt_5.2.0-8+etch7_powerpc.deb stable/main/binary-powerpc/php5-mhash_5.2.0-8+etch7_powerpc.deb stable/main/binary-powerpc/php5-mysql_5.2.0-8+etch7_powerpc.deb stable/main/binary-powerpc/php5-odbc_5.2.0-8+etch7_powerpc.deb stable/main/binary-powerpc/php5-pgsql_5.2.0-8+etch7_powerpc.deb stable/main/binary-powerpc/php5-pspell_5.2.0-8+etch7_powerpc.deb stable/main/binary-powerpc/php5-recode_5.2.0-8+etch7_powerpc.deb stable/main/binary-powerpc/php5-snmp_5.2.0-8+etch7_powerpc.deb stable/main/binary-powerpc/php5-sqlite_5.2.0-8+etch7_powerpc.deb stable/main/binary-powerpc/php5-sybase_5.2.0-8+etch7_powerpc.deb stable/main/binary-powerpc/php5-tidy_5.2.0-8+etch7_powerpc.deb stable/main/binary-powerpc/php5-xmlrpc_5.2.0-8+etch7_powerpc.deb stable/main/binary-powerpc/php5-xsl_5.2.0-8+etch7_powerpc.deb php5 (5.2.0-8+etch7) stable-security; urgency=low * An addendum to the previous security NMU, the following vulnerability is also fixed: - CVE-2007-1864: Buffer overflow in the bundled libxmlrpc library. * Thanks to Joe Orton from redhat for sharing the patch. stable/main/binary-s390/php5-common_5.2.0-8+etch7_s390.deb stable/main/binary-s390/libapache-mod-php5_5.2.0-8+etch7_s390.deb stable/main/binary-s390/libapache2-mod-php5_5.2.0-8+etch7_s390.deb stable/main/binary-s390/php5-cgi_5.2.0-8+etch7_s390.deb stable/main/binary-s390/php5-cli_5.2.0-8+etch7_s390.deb stable/main/binary-s390/php5-dev_5.2.0-8+etch7_s390.deb stable/main/binary-s390/php5-curl_5.2.0-8+etch7_s390.deb stable/main/binary-s390/php5-gd_5.2.0-8+etch7_s390.deb stable/main/binary-s390/php5-imap_5.2.0-8+etch7_s390.deb stable/main/binary-s390/php5-ldap_5.2.0-8+etch7_s390.deb stable/main/binary-s390/php5-mcrypt_5.2.0-8+etch7_s390.deb stable/main/binary-s390/php5-mhash_5.2.0-8+etch7_s390.deb stable/main/binary-s390/php5-mysql_5.2.0-8+etch7_s390.deb stable/main/binary-s390/php5-odbc_5.2.0-8+etch7_s390.deb stable/main/binary-s390/php5-pgsql_5.2.0-8+etch7_s390.deb stable/main/binary-s390/php5-pspell_5.2.0-8+etch7_s390.deb stable/main/binary-s390/php5-recode_5.2.0-8+etch7_s390.deb stable/main/binary-s390/php5-snmp_5.2.0-8+etch7_s390.deb stable/main/binary-s390/php5-sqlite_5.2.0-8+etch7_s390.deb stable/main/binary-s390/php5-sybase_5.2.0-8+etch7_s390.deb stable/main/binary-s390/php5-tidy_5.2.0-8+etch7_s390.deb stable/main/binary-s390/php5-xmlrpc_5.2.0-8+etch7_s390.deb stable/main/binary-s390/php5-xsl_5.2.0-8+etch7_s390.deb php5 (5.2.0-8+etch7) stable-security; urgency=low * An addendum to the previous security NMU, the following vulnerability is also fixed: - CVE-2007-1864: Buffer overflow in the bundled libxmlrpc library. * Thanks to Joe Orton from redhat for sharing the patch. stable/main/binary-sparc/php5-common_5.2.0-8+etch7_sparc.deb stable/main/binary-sparc/libapache-mod-php5_5.2.0-8+etch7_sparc.deb stable/main/binary-sparc/libapache2-mod-php5_5.2.0-8+etch7_sparc.deb stable/main/binary-sparc/php5-cgi_5.2.0-8+etch7_sparc.deb stable/main/binary-sparc/php5-cli_5.2.0-8+etch7_sparc.deb stable/main/binary-sparc/php5-dev_5.2.0-8+etch7_sparc.deb stable/main/binary-sparc/php5-curl_5.2.0-8+etch7_sparc.deb stable/main/binary-sparc/php5-gd_5.2.0-8+etch7_sparc.deb stable/main/binary-sparc/php5-imap_5.2.0-8+etch7_sparc.deb stable/main/binary-sparc/php5-ldap_5.2.0-8+etch7_sparc.deb stable/main/binary-sparc/php5-mcrypt_5.2.0-8+etch7_sparc.deb stable/main/binary-sparc/php5-mhash_5.2.0-8+etch7_sparc.deb stable/main/binary-sparc/php5-mysql_5.2.0-8+etch7_sparc.deb stable/main/binary-sparc/php5-odbc_5.2.0-8+etch7_sparc.deb stable/main/binary-sparc/php5-pgsql_5.2.0-8+etch7_sparc.deb stable/main/binary-sparc/php5-pspell_5.2.0-8+etch7_sparc.deb stable/main/binary-sparc/php5-recode_5.2.0-8+etch7_sparc.deb stable/main/binary-sparc/php5-snmp_5.2.0-8+etch7_sparc.deb stable/main/binary-sparc/php5-sqlite_5.2.0-8+etch7_sparc.deb stable/main/binary-sparc/php5-sybase_5.2.0-8+etch7_sparc.deb stable/main/binary-sparc/php5-tidy_5.2.0-8+etch7_sparc.deb stable/main/binary-sparc/php5-xmlrpc_5.2.0-8+etch7_sparc.deb stable/main/binary-sparc/php5-xsl_5.2.0-8+etch7_sparc.deb php5 (5.2.0-8+etch7) stable-security; urgency=low * An addendum to the previous security NMU, the following vulnerability is also fixed: - CVE-2007-1864: Buffer overflow in the bundled libxmlrpc library. * Thanks to Joe Orton from redhat for sharing the patch. stable/main/source/phpmyadmin_2.9.1.1-6.dsc stable/main/source/phpmyadmin_2.9.1.1-6.diff.gz stable/main/binary-all/phpmyadmin_2.9.1.1-6_all.deb phpmyadmin (4:2.9.1.1-6) stable-security; urgency=high * Update for etch to address a security issue. * Cross-site scripting (XSS) vulnerability in scripts/setup.php in phpMyAdmin 2.11.1, when accessed by a browser that does not URL-encode requests, allows remote attackers to inject arbitrary web script or HTML via the query string. (CVE-2007-5386, PMASA-2007-5, closes: #446451) phpmyadmin (4:2.9.1.1-5) stable-security; urgency=high * Update for etch to address a security issue. * Muliple cross-site scripting (XSS) vulnerabilities in phpMyAdmin before 2.11.1.2 allow remote attackers to inject arbitrary web script or HTML via certain input available in (1) PHP_SELF in (a) server_status.php, and (b) grab_globals.lib.php, (c) display_change_password.lib.php, and (d) common.lib.php in libraries/; and certain input available in PHP_SELF and (2) PATH_INFO in libraries/common.inc.php. (CVE-2007-5589, PMASA-2007-6) stable/main/source/phpwiki_1.3.12p3-5etch1.dsc stable/main/source/phpwiki_1.3.12p3.orig.tar.gz stable/main/source/phpwiki_1.3.12p3-5etch1.diff.gz stable/main/binary-all/phpwiki_1.3.12p3-5etch1_all.deb phpwiki (1.3.12p3-5etch1) stable-security; urgency=high * Non-maintainer upload by the security team. * CVE-2007-3193: lib/WikiUser/LDAP.php in PhpWiki before 1.3.13p1, when the configuration lacks a nonzero PASSWORD_LENGTH_MINIMUM, might allow remote attackers to bypass authentication via an empty password, which causes ldap_bind to return true when used with certain LDAP implementations. (Closes: #429201) * CVE-2007-2024, CVE-2007-2025: Unrestricted file upload vulnerability in the UpLoad feature (lib/plugin/UpLoad.php) in PhpWiki 1.3.11p1 allows remote attackers to upload arbitrary PHP files with a double extension, as demonstrated by .php.3, which is interpreted by Apache as being a valid PHP file. (Closes: #441390) stable/main/source/po4a_0.29-1etch1.dsc stable/main/source/po4a_0.29-1etch1.diff.gz stable/main/binary-all/po4a_0.29-1etch1_all.deb po4a (0.29-1etch1) proposed-updates; urgency=low * Fix possible arbitrary files overwriting via a symlink attack. (CVE-2007-4462). Closes: #439226 stable/main/binary-alpha/libpoppler0c2_0.4.5-5.1etch1_alpha.deb stable/main/binary-alpha/libpoppler-dev_0.4.5-5.1etch1_alpha.deb stable/main/binary-alpha/libpoppler0c2-glib_0.4.5-5.1etch1_alpha.deb stable/main/binary-alpha/libpoppler-glib-dev_0.4.5-5.1etch1_alpha.deb stable/main/binary-alpha/libpoppler0c2-qt_0.4.5-5.1etch1_alpha.deb stable/main/binary-alpha/libpoppler-qt-dev_0.4.5-5.1etch1_alpha.deb stable/main/binary-alpha/poppler-utils_0.4.5-5.1etch1_alpha.deb poppler (0.4.5-5.1etch1) stable-security; urgency=high * Fix integer overflow in stream predictor (CVE-2007-3387). stable/main/binary-amd64/libpoppler0c2_0.4.5-5.1etch1_amd64.deb stable/main/binary-amd64/libpoppler-dev_0.4.5-5.1etch1_amd64.deb stable/main/binary-amd64/libpoppler0c2-glib_0.4.5-5.1etch1_amd64.deb stable/main/binary-amd64/libpoppler-glib-dev_0.4.5-5.1etch1_amd64.deb stable/main/binary-amd64/libpoppler0c2-qt_0.4.5-5.1etch1_amd64.deb stable/main/binary-amd64/libpoppler-qt-dev_0.4.5-5.1etch1_amd64.deb stable/main/binary-amd64/poppler-utils_0.4.5-5.1etch1_amd64.deb poppler (0.4.5-5.1etch1) stable-security; urgency=high * Fix integer overflow in stream predictor (CVE-2007-3387). stable/main/binary-arm/libpoppler0c2_0.4.5-5.1etch1_arm.deb stable/main/binary-arm/libpoppler-dev_0.4.5-5.1etch1_arm.deb stable/main/binary-arm/libpoppler0c2-glib_0.4.5-5.1etch1_arm.deb stable/main/binary-arm/libpoppler-glib-dev_0.4.5-5.1etch1_arm.deb stable/main/binary-arm/libpoppler0c2-qt_0.4.5-5.1etch1_arm.deb stable/main/binary-arm/libpoppler-qt-dev_0.4.5-5.1etch1_arm.deb stable/main/binary-arm/poppler-utils_0.4.5-5.1etch1_arm.deb poppler (0.4.5-5.1etch1) stable-security; urgency=high * Fix integer overflow in stream predictor (CVE-2007-3387). stable/main/binary-hppa/libpoppler0c2_0.4.5-5.1etch1_hppa.deb stable/main/binary-hppa/libpoppler-dev_0.4.5-5.1etch1_hppa.deb stable/main/binary-hppa/libpoppler0c2-glib_0.4.5-5.1etch1_hppa.deb stable/main/binary-hppa/libpoppler-glib-dev_0.4.5-5.1etch1_hppa.deb stable/main/binary-hppa/libpoppler0c2-qt_0.4.5-5.1etch1_hppa.deb stable/main/binary-hppa/libpoppler-qt-dev_0.4.5-5.1etch1_hppa.deb stable/main/binary-hppa/poppler-utils_0.4.5-5.1etch1_hppa.deb poppler (0.4.5-5.1etch1) stable-security; urgency=high * Fix integer overflow in stream predictor (CVE-2007-3387). stable/main/source/poppler_0.4.5-5.1etch1.dsc stable/main/source/poppler_0.4.5.orig.tar.gz stable/main/source/poppler_0.4.5-5.1etch1.diff.gz stable/main/binary-i386/libpoppler0c2_0.4.5-5.1etch1_i386.deb stable/main/binary-i386/libpoppler-dev_0.4.5-5.1etch1_i386.deb stable/main/binary-i386/libpoppler0c2-glib_0.4.5-5.1etch1_i386.deb stable/main/binary-i386/libpoppler-glib-dev_0.4.5-5.1etch1_i386.deb stable/main/binary-i386/libpoppler0c2-qt_0.4.5-5.1etch1_i386.deb stable/main/binary-i386/libpoppler-qt-dev_0.4.5-5.1etch1_i386.deb stable/main/binary-i386/poppler-utils_0.4.5-5.1etch1_i386.deb poppler (0.4.5-5.1etch1) stable-security; urgency=high * Fix integer overflow in stream predictor (CVE-2007-3387). stable/main/binary-ia64/libpoppler0c2_0.4.5-5.1etch1_ia64.deb stable/main/binary-ia64/libpoppler-dev_0.4.5-5.1etch1_ia64.deb stable/main/binary-ia64/libpoppler0c2-glib_0.4.5-5.1etch1_ia64.deb stable/main/binary-ia64/libpoppler-glib-dev_0.4.5-5.1etch1_ia64.deb stable/main/binary-ia64/libpoppler0c2-qt_0.4.5-5.1etch1_ia64.deb stable/main/binary-ia64/libpoppler-qt-dev_0.4.5-5.1etch1_ia64.deb stable/main/binary-ia64/poppler-utils_0.4.5-5.1etch1_ia64.deb poppler (0.4.5-5.1etch1) stable-security; urgency=high * Fix integer overflow in stream predictor (CVE-2007-3387). stable/main/binary-mips/libpoppler0c2_0.4.5-5.1etch1_mips.deb stable/main/binary-mips/libpoppler-dev_0.4.5-5.1etch1_mips.deb stable/main/binary-mips/libpoppler0c2-glib_0.4.5-5.1etch1_mips.deb stable/main/binary-mips/libpoppler-glib-dev_0.4.5-5.1etch1_mips.deb stable/main/binary-mips/libpoppler0c2-qt_0.4.5-5.1etch1_mips.deb stable/main/binary-mips/libpoppler-qt-dev_0.4.5-5.1etch1_mips.deb stable/main/binary-mips/poppler-utils_0.4.5-5.1etch1_mips.deb poppler (0.4.5-5.1etch1) stable-security; urgency=high * Fix integer overflow in stream predictor (CVE-2007-3387). stable/main/binary-mipsel/libpoppler0c2_0.4.5-5.1etch1_mipsel.deb stable/main/binary-mipsel/libpoppler-dev_0.4.5-5.1etch1_mipsel.deb stable/main/binary-mipsel/libpoppler0c2-glib_0.4.5-5.1etch1_mipsel.deb stable/main/binary-mipsel/libpoppler-glib-dev_0.4.5-5.1etch1_mipsel.deb stable/main/binary-mipsel/libpoppler0c2-qt_0.4.5-5.1etch1_mipsel.deb stable/main/binary-mipsel/libpoppler-qt-dev_0.4.5-5.1etch1_mipsel.deb stable/main/binary-mipsel/poppler-utils_0.4.5-5.1etch1_mipsel.deb poppler (0.4.5-5.1etch1) stable-security; urgency=high * Fix integer overflow in stream predictor (CVE-2007-3387). stable/main/binary-powerpc/libpoppler0c2_0.4.5-5.1etch1_powerpc.deb stable/main/binary-powerpc/libpoppler-dev_0.4.5-5.1etch1_powerpc.deb stable/main/binary-powerpc/libpoppler0c2-glib_0.4.5-5.1etch1_powerpc.deb stable/main/binary-powerpc/libpoppler-glib-dev_0.4.5-5.1etch1_powerpc.deb stable/main/binary-powerpc/libpoppler0c2-qt_0.4.5-5.1etch1_powerpc.deb stable/main/binary-powerpc/libpoppler-qt-dev_0.4.5-5.1etch1_powerpc.deb stable/main/binary-powerpc/poppler-utils_0.4.5-5.1etch1_powerpc.deb poppler (0.4.5-5.1etch1) stable-security; urgency=high * Fix integer overflow in stream predictor (CVE-2007-3387). stable/main/binary-s390/libpoppler0c2_0.4.5-5.1etch1_s390.deb stable/main/binary-s390/libpoppler-dev_0.4.5-5.1etch1_s390.deb stable/main/binary-s390/libpoppler0c2-glib_0.4.5-5.1etch1_s390.deb stable/main/binary-s390/libpoppler-glib-dev_0.4.5-5.1etch1_s390.deb stable/main/binary-s390/libpoppler0c2-qt_0.4.5-5.1etch1_s390.deb stable/main/binary-s390/libpoppler-qt-dev_0.4.5-5.1etch1_s390.deb stable/main/binary-s390/poppler-utils_0.4.5-5.1etch1_s390.deb poppler (0.4.5-5.1etch1) stable-security; urgency=high * Fix integer overflow in stream predictor (CVE-2007-3387). stable/main/binary-sparc/libpoppler0c2_0.4.5-5.1etch1_sparc.deb stable/main/binary-sparc/libpoppler-dev_0.4.5-5.1etch1_sparc.deb stable/main/binary-sparc/libpoppler0c2-glib_0.4.5-5.1etch1_sparc.deb stable/main/binary-sparc/libpoppler-glib-dev_0.4.5-5.1etch1_sparc.deb stable/main/binary-sparc/libpoppler0c2-qt_0.4.5-5.1etch1_sparc.deb stable/main/binary-sparc/libpoppler-qt-dev_0.4.5-5.1etch1_sparc.deb stable/main/binary-sparc/poppler-utils_0.4.5-5.1etch1_sparc.deb poppler (0.4.5-5.1etch1) stable-security; urgency=high * Fix integer overflow in stream predictor (CVE-2007-3387). stable/main/binary-alpha/postfix-policyd_1.80-2.1etch1_alpha.deb postfix-policyd (1.80-2.1etch1) stable-security; urgency=high * Non-maintainer upload by The Security Team. * Fixed a potential buffer overflow via overly long SMTP commands. [CVE-2007-3791] stable/main/source/postfix-policyd_1.80-2.1etch1.dsc stable/main/source/postfix-policyd_1.80.orig.tar.gz stable/main/source/postfix-policyd_1.80-2.1etch1.diff.gz stable/main/binary-amd64/postfix-policyd_1.80-2.1etch1_amd64.deb postfix-policyd (1.80-2.1etch1) stable-security; urgency=high * Non-maintainer upload by The Security Team. * Fixed a potential buffer overflow via overly long SMTP commands. [CVE-2007-3791] stable/main/binary-arm/postfix-policyd_1.80-2.1etch1_arm.deb postfix-policyd (1.80-2.1etch1) stable-security; urgency=high * Non-maintainer upload by The Security Team. * Fixed a potential buffer overflow via overly long SMTP commands. [CVE-2007-3791] stable/main/binary-hppa/postfix-policyd_1.80-2.1etch1_hppa.deb postfix-policyd (1.80-2.1etch1) stable-security; urgency=high * Non-maintainer upload by The Security Team. * Fixed a potential buffer overflow via overly long SMTP commands. [CVE-2007-3791] stable/main/binary-i386/postfix-policyd_1.80-2.1etch1_i386.deb postfix-policyd (1.80-2.1etch1) stable-security; urgency=high * Non-maintainer upload by The Security Team. * Fixed a potential buffer overflow via overly long SMTP commands. [CVE-2007-3791] stable/main/binary-ia64/postfix-policyd_1.80-2.1etch1_ia64.deb postfix-policyd (1.80-2.1etch1) stable-security; urgency=high * Non-maintainer upload by The Security Team. * Fixed a potential buffer overflow via overly long SMTP commands. [CVE-2007-3791] stable/main/binary-mips/postfix-policyd_1.80-2.1etch1_mips.deb postfix-policyd (1.80-2.1etch1) stable-security; urgency=high * Non-maintainer upload by The Security Team. * Fixed a potential buffer overflow via overly long SMTP commands. [CVE-2007-3791] stable/main/binary-mipsel/postfix-policyd_1.80-2.1etch1_mipsel.deb postfix-policyd (1.80-2.1etch1) stable-security; urgency=high * Non-maintainer upload by The Security Team. * Fixed a potential buffer overflow via overly long SMTP commands. [CVE-2007-3791] stable/main/binary-powerpc/postfix-policyd_1.80-2.1etch1_powerpc.deb postfix-policyd (1.80-2.1etch1) stable-security; urgency=high * Non-maintainer upload by The Security Team. * Fixed a potential buffer overflow via overly long SMTP commands. [CVE-2007-3791] stable/main/binary-s390/postfix-policyd_1.80-2.1etch1_s390.deb postfix-policyd (1.80-2.1etch1) stable-security; urgency=high * Non-maintainer upload by The Security Team. * Fixed a potential buffer overflow via overly long SMTP commands. [CVE-2007-3791] stable/main/binary-sparc/postfix-policyd_1.80-2.1etch1_sparc.deb postfix-policyd (1.80-2.1etch1) stable-security; urgency=high * Non-maintainer upload by The Security Team. * Fixed a potential buffer overflow via overly long SMTP commands. [CVE-2007-3791] stable/main/binary-alpha/libpq-dev_8.1.9-0etch2_alpha.deb stable/main/binary-alpha/libpq4_8.1.9-0etch2_alpha.deb stable/main/binary-alpha/libecpg5_8.1.9-0etch2_alpha.deb stable/main/binary-alpha/libecpg-dev_8.1.9-0etch2_alpha.deb stable/main/binary-alpha/libecpg-compat2_8.1.9-0etch2_alpha.deb stable/main/binary-alpha/libpgtypes2_8.1.9-0etch2_alpha.deb stable/main/binary-alpha/postgresql-8.1_8.1.9-0etch2_alpha.deb stable/main/binary-alpha/postgresql-client-8.1_8.1.9-0etch2_alpha.deb stable/main/binary-alpha/postgresql-server-dev-8.1_8.1.9-0etch2_alpha.deb stable/main/binary-alpha/postgresql-contrib-8.1_8.1.9-0etch2_alpha.deb stable/main/binary-alpha/postgresql-plperl-8.1_8.1.9-0etch2_alpha.deb stable/main/binary-alpha/postgresql-plpython-8.1_8.1.9-0etch2_alpha.deb stable/main/binary-alpha/postgresql-pltcl-8.1_8.1.9-0etch2_alpha.deb postgresql-8.1 (8.1.9-0etch2) stable; urgency=high * Add debian/patches/00upstream-01-polymorphic-functions.patch: - Fix regression introduced in 8.1.9: Polymorphic SQL functions with an "anyelement" return value stopped working. - Patch taken from 8.1 branch of upstream CVS: http://developer.postgresql.org/cvsweb.cgi/pgsql/src/backend/optimizer/util/clauses.c.diff?r1=1.201.2.3&r2=1.201.2.4 - Also backported the test cases for this. They only affect build time, not the built .debs, and verify that the fix works, so this should be in a stable update, too. Taken from upstream CVS: http://developer.postgresql.org/cvsweb.cgi/pgsql/src/test/regress/expected/polymorphism.out.diff?r1=1.7&r2=1.7.2.1 http://developer.postgresql.org/cvsweb.cgi/pgsql/src/test/regress/sql/polymorphism.sql.diff?r1=1.1&r2=1.1.10.1 - Closes: #429696 stable/main/binary-amd64/libpq-dev_8.1.9-0etch2_amd64.deb stable/main/binary-amd64/libpq4_8.1.9-0etch2_amd64.deb stable/main/binary-amd64/libecpg5_8.1.9-0etch2_amd64.deb stable/main/binary-amd64/libecpg-dev_8.1.9-0etch2_amd64.deb stable/main/binary-amd64/libecpg-compat2_8.1.9-0etch2_amd64.deb stable/main/binary-amd64/libpgtypes2_8.1.9-0etch2_amd64.deb stable/main/binary-amd64/postgresql-8.1_8.1.9-0etch2_amd64.deb stable/main/binary-amd64/postgresql-client-8.1_8.1.9-0etch2_amd64.deb stable/main/binary-amd64/postgresql-server-dev-8.1_8.1.9-0etch2_amd64.deb stable/main/binary-amd64/postgresql-contrib-8.1_8.1.9-0etch2_amd64.deb stable/main/binary-amd64/postgresql-plperl-8.1_8.1.9-0etch2_amd64.deb stable/main/binary-amd64/postgresql-plpython-8.1_8.1.9-0etch2_amd64.deb stable/main/binary-amd64/postgresql-pltcl-8.1_8.1.9-0etch2_amd64.deb postgresql-8.1 (8.1.9-0etch2) stable; urgency=high * Add debian/patches/00upstream-01-polymorphic-functions.patch: - Fix regression introduced in 8.1.9: Polymorphic SQL functions with an "anyelement" return value stopped working. - Patch taken from 8.1 branch of upstream CVS: http://developer.postgresql.org/cvsweb.cgi/pgsql/src/backend/optimizer/util/clauses.c.diff?r1=1.201.2.3&r2=1.201.2.4 - Also backported the test cases for this. They only affect build time, not the built .debs, and verify that the fix works, so this should be in a stable update, too. Taken from upstream CVS: http://developer.postgresql.org/cvsweb.cgi/pgsql/src/test/regress/expected/polymorphism.out.diff?r1=1.7&r2=1.7.2.1 http://developer.postgresql.org/cvsweb.cgi/pgsql/src/test/regress/sql/polymorphism.sql.diff?r1=1.1&r2=1.1.10.1 - Closes: #429696 stable/main/binary-arm/libpq-dev_8.1.9-0etch2_arm.deb stable/main/binary-arm/libpq4_8.1.9-0etch2_arm.deb stable/main/binary-arm/libecpg5_8.1.9-0etch2_arm.deb stable/main/binary-arm/libecpg-dev_8.1.9-0etch2_arm.deb stable/main/binary-arm/libecpg-compat2_8.1.9-0etch2_arm.deb stable/main/binary-arm/libpgtypes2_8.1.9-0etch2_arm.deb stable/main/binary-arm/postgresql-8.1_8.1.9-0etch2_arm.deb stable/main/binary-arm/postgresql-client-8.1_8.1.9-0etch2_arm.deb stable/main/binary-arm/postgresql-server-dev-8.1_8.1.9-0etch2_arm.deb stable/main/binary-arm/postgresql-contrib-8.1_8.1.9-0etch2_arm.deb stable/main/binary-arm/postgresql-plperl-8.1_8.1.9-0etch2_arm.deb stable/main/binary-arm/postgresql-plpython-8.1_8.1.9-0etch2_arm.deb stable/main/binary-arm/postgresql-pltcl-8.1_8.1.9-0etch2_arm.deb postgresql-8.1 (8.1.9-0etch2) stable; urgency=high * Add debian/patches/00upstream-01-polymorphic-functions.patch: - Fix regression introduced in 8.1.9: Polymorphic SQL functions with an "anyelement" return value stopped working. - Patch taken from 8.1 branch of upstream CVS: http://developer.postgresql.org/cvsweb.cgi/pgsql/src/backend/optimizer/util/clauses.c.diff?r1=1.201.2.3&r2=1.201.2.4 - Also backported the test cases for this. They only affect build time, not the built .debs, and verify that the fix works, so this should be in a stable update, too. Taken from upstream CVS: http://developer.postgresql.org/cvsweb.cgi/pgsql/src/test/regress/expected/polymorphism.out.diff?r1=1.7&r2=1.7.2.1 http://developer.postgresql.org/cvsweb.cgi/pgsql/src/test/regress/sql/polymorphism.sql.diff?r1=1.1&r2=1.1.10.1 - Closes: #429696 stable/main/binary-hppa/libpq-dev_8.1.9-0etch2_hppa.deb stable/main/binary-hppa/libpq4_8.1.9-0etch2_hppa.deb stable/main/binary-hppa/libecpg5_8.1.9-0etch2_hppa.deb stable/main/binary-hppa/libecpg-dev_8.1.9-0etch2_hppa.deb stable/main/binary-hppa/libecpg-compat2_8.1.9-0etch2_hppa.deb stable/main/binary-hppa/libpgtypes2_8.1.9-0etch2_hppa.deb stable/main/binary-hppa/postgresql-8.1_8.1.9-0etch2_hppa.deb stable/main/binary-hppa/postgresql-client-8.1_8.1.9-0etch2_hppa.deb stable/main/binary-hppa/postgresql-server-dev-8.1_8.1.9-0etch2_hppa.deb stable/main/binary-hppa/postgresql-contrib-8.1_8.1.9-0etch2_hppa.deb stable/main/binary-hppa/postgresql-plperl-8.1_8.1.9-0etch2_hppa.deb stable/main/binary-hppa/postgresql-plpython-8.1_8.1.9-0etch2_hppa.deb stable/main/binary-hppa/postgresql-pltcl-8.1_8.1.9-0etch2_hppa.deb postgresql-8.1 (8.1.9-0etch2) stable; urgency=high * Add debian/patches/00upstream-01-polymorphic-functions.patch: - Fix regression introduced in 8.1.9: Polymorphic SQL functions with an "anyelement" return value stopped working. - Patch taken from 8.1 branch of upstream CVS: http://developer.postgresql.org/cvsweb.cgi/pgsql/src/backend/optimizer/util/clauses.c.diff?r1=1.201.2.3&r2=1.201.2.4 - Also backported the test cases for this. They only affect build time, not the built .debs, and verify that the fix works, so this should be in a stable update, too. Taken from upstream CVS: http://developer.postgresql.org/cvsweb.cgi/pgsql/src/test/regress/expected/polymorphism.out.diff?r1=1.7&r2=1.7.2.1 http://developer.postgresql.org/cvsweb.cgi/pgsql/src/test/regress/sql/polymorphism.sql.diff?r1=1.1&r2=1.1.10.1 - Closes: #429696 stable/main/source/postgresql-8.1_8.1.9-0etch2.dsc stable/main/source/postgresql-8.1_8.1.9-0etch2.diff.gz stable/main/binary-all/postgresql-doc-8.1_8.1.9-0etch2_all.deb stable/main/binary-i386/libpq-dev_8.1.9-0etch2_i386.deb stable/main/binary-i386/libpq4_8.1.9-0etch2_i386.deb stable/main/binary-i386/libecpg5_8.1.9-0etch2_i386.deb stable/main/binary-i386/libecpg-dev_8.1.9-0etch2_i386.deb stable/main/binary-i386/libecpg-compat2_8.1.9-0etch2_i386.deb stable/main/binary-i386/libpgtypes2_8.1.9-0etch2_i386.deb stable/main/binary-i386/postgresql-8.1_8.1.9-0etch2_i386.deb stable/main/binary-i386/postgresql-client-8.1_8.1.9-0etch2_i386.deb stable/main/binary-i386/postgresql-server-dev-8.1_8.1.9-0etch2_i386.deb stable/main/binary-i386/postgresql-contrib-8.1_8.1.9-0etch2_i386.deb stable/main/binary-i386/postgresql-plperl-8.1_8.1.9-0etch2_i386.deb stable/main/binary-i386/postgresql-plpython-8.1_8.1.9-0etch2_i386.deb stable/main/binary-i386/postgresql-pltcl-8.1_8.1.9-0etch2_i386.deb postgresql-8.1 (8.1.9-0etch2) stable; urgency=high * Add debian/patches/00upstream-01-polymorphic-functions.patch: - Fix regression introduced in 8.1.9: Polymorphic SQL functions with an "anyelement" return value stopped working. - Patch taken from 8.1 branch of upstream CVS: http://developer.postgresql.org/cvsweb.cgi/pgsql/src/backend/optimizer/util/clauses.c.diff?r1=1.201.2.3&r2=1.201.2.4 - Also backported the test cases for this. They only affect build time, not the built .debs, and verify that the fix works, so this should be in a stable update, too. Taken from upstream CVS: http://developer.postgresql.org/cvsweb.cgi/pgsql/src/test/regress/expected/polymorphism.out.diff?r1=1.7&r2=1.7.2.1 http://developer.postgresql.org/cvsweb.cgi/pgsql/src/test/regress/sql/polymorphism.sql.diff?r1=1.1&r2=1.1.10.1 - Closes: #429696 stable/main/binary-ia64/libpq-dev_8.1.9-0etch2_ia64.deb stable/main/binary-ia64/libpq4_8.1.9-0etch2_ia64.deb stable/main/binary-ia64/libecpg5_8.1.9-0etch2_ia64.deb stable/main/binary-ia64/libecpg-dev_8.1.9-0etch2_ia64.deb stable/main/binary-ia64/libecpg-compat2_8.1.9-0etch2_ia64.deb stable/main/binary-ia64/libpgtypes2_8.1.9-0etch2_ia64.deb stable/main/binary-ia64/postgresql-8.1_8.1.9-0etch2_ia64.deb stable/main/binary-ia64/postgresql-client-8.1_8.1.9-0etch2_ia64.deb stable/main/binary-ia64/postgresql-server-dev-8.1_8.1.9-0etch2_ia64.deb stable/main/binary-ia64/postgresql-contrib-8.1_8.1.9-0etch2_ia64.deb stable/main/binary-ia64/postgresql-plperl-8.1_8.1.9-0etch2_ia64.deb stable/main/binary-ia64/postgresql-plpython-8.1_8.1.9-0etch2_ia64.deb stable/main/binary-ia64/postgresql-pltcl-8.1_8.1.9-0etch2_ia64.deb postgresql-8.1 (8.1.9-0etch2) stable; urgency=high * Add debian/patches/00upstream-01-polymorphic-functions.patch: - Fix regression introduced in 8.1.9: Polymorphic SQL functions with an "anyelement" return value stopped working. - Patch taken from 8.1 branch of upstream CVS: http://developer.postgresql.org/cvsweb.cgi/pgsql/src/backend/optimizer/util/clauses.c.diff?r1=1.201.2.3&r2=1.201.2.4 - Also backported the test cases for this. They only affect build time, not the built .debs, and verify that the fix works, so this should be in a stable update, too. Taken from upstream CVS: http://developer.postgresql.org/cvsweb.cgi/pgsql/src/test/regress/expected/polymorphism.out.diff?r1=1.7&r2=1.7.2.1 http://developer.postgresql.org/cvsweb.cgi/pgsql/src/test/regress/sql/polymorphism.sql.diff?r1=1.1&r2=1.1.10.1 - Closes: #429696 stable/main/binary-mips/libpq-dev_8.1.9-0etch2_mips.deb stable/main/binary-mips/libpq4_8.1.9-0etch2_mips.deb stable/main/binary-mips/libecpg5_8.1.9-0etch2_mips.deb stable/main/binary-mips/libecpg-dev_8.1.9-0etch2_mips.deb stable/main/binary-mips/libecpg-compat2_8.1.9-0etch2_mips.deb stable/main/binary-mips/libpgtypes2_8.1.9-0etch2_mips.deb stable/main/binary-mips/postgresql-8.1_8.1.9-0etch2_mips.deb stable/main/binary-mips/postgresql-client-8.1_8.1.9-0etch2_mips.deb stable/main/binary-mips/postgresql-server-dev-8.1_8.1.9-0etch2_mips.deb stable/main/binary-mips/postgresql-contrib-8.1_8.1.9-0etch2_mips.deb stable/main/binary-mips/postgresql-plperl-8.1_8.1.9-0etch2_mips.deb stable/main/binary-mips/postgresql-plpython-8.1_8.1.9-0etch2_mips.deb stable/main/binary-mips/postgresql-pltcl-8.1_8.1.9-0etch2_mips.deb postgresql-8.1 (8.1.9-0etch2) stable; urgency=high * Add debian/patches/00upstream-01-polymorphic-functions.patch: - Fix regression introduced in 8.1.9: Polymorphic SQL functions with an "anyelement" return value stopped working. - Patch taken from 8.1 branch of upstream CVS: http://developer.postgresql.org/cvsweb.cgi/pgsql/src/backend/optimizer/util/clauses.c.diff?r1=1.201.2.3&r2=1.201.2.4 - Also backported the test cases for this. They only affect build time, not the built .debs, and verify that the fix works, so this should be in a stable update, too. Taken from upstream CVS: http://developer.postgresql.org/cvsweb.cgi/pgsql/src/test/regress/expected/polymorphism.out.diff?r1=1.7&r2=1.7.2.1 http://developer.postgresql.org/cvsweb.cgi/pgsql/src/test/regress/sql/polymorphism.sql.diff?r1=1.1&r2=1.1.10.1 - Closes: #429696 stable/main/binary-mipsel/libpq-dev_8.1.9-0etch2_mipsel.deb stable/main/binary-mipsel/libpq4_8.1.9-0etch2_mipsel.deb stable/main/binary-mipsel/libecpg5_8.1.9-0etch2_mipsel.deb stable/main/binary-mipsel/libecpg-dev_8.1.9-0etch2_mipsel.deb stable/main/binary-mipsel/libecpg-compat2_8.1.9-0etch2_mipsel.deb stable/main/binary-mipsel/libpgtypes2_8.1.9-0etch2_mipsel.deb stable/main/binary-mipsel/postgresql-8.1_8.1.9-0etch2_mipsel.deb stable/main/binary-mipsel/postgresql-client-8.1_8.1.9-0etch2_mipsel.deb stable/main/binary-mipsel/postgresql-server-dev-8.1_8.1.9-0etch2_mipsel.deb stable/main/binary-mipsel/postgresql-contrib-8.1_8.1.9-0etch2_mipsel.deb stable/main/binary-mipsel/postgresql-plperl-8.1_8.1.9-0etch2_mipsel.deb stable/main/binary-mipsel/postgresql-plpython-8.1_8.1.9-0etch2_mipsel.deb stable/main/binary-mipsel/postgresql-pltcl-8.1_8.1.9-0etch2_mipsel.deb postgresql-8.1 (8.1.9-0etch2) stable; urgency=high * Add debian/patches/00upstream-01-polymorphic-functions.patch: - Fix regression introduced in 8.1.9: Polymorphic SQL functions with an "anyelement" return value stopped working. - Patch taken from 8.1 branch of upstream CVS: http://developer.postgresql.org/cvsweb.cgi/pgsql/src/backend/optimizer/util/clauses.c.diff?r1=1.201.2.3&r2=1.201.2.4 - Also backported the test cases for this. They only affect build time, not the built .debs, and verify that the fix works, so this should be in a stable update, too. Taken from upstream CVS: http://developer.postgresql.org/cvsweb.cgi/pgsql/src/test/regress/expected/polymorphism.out.diff?r1=1.7&r2=1.7.2.1 http://developer.postgresql.org/cvsweb.cgi/pgsql/src/test/regress/sql/polymorphism.sql.diff?r1=1.1&r2=1.1.10.1 - Closes: #429696 stable/main/binary-powerpc/libpq-dev_8.1.9-0etch2_powerpc.deb stable/main/binary-powerpc/libpq4_8.1.9-0etch2_powerpc.deb stable/main/binary-powerpc/libecpg5_8.1.9-0etch2_powerpc.deb stable/main/binary-powerpc/libecpg-dev_8.1.9-0etch2_powerpc.deb stable/main/binary-powerpc/libecpg-compat2_8.1.9-0etch2_powerpc.deb stable/main/binary-powerpc/libpgtypes2_8.1.9-0etch2_powerpc.deb stable/main/binary-powerpc/postgresql-8.1_8.1.9-0etch2_powerpc.deb stable/main/binary-powerpc/postgresql-client-8.1_8.1.9-0etch2_powerpc.deb stable/main/binary-powerpc/postgresql-server-dev-8.1_8.1.9-0etch2_powerpc.deb stable/main/binary-powerpc/postgresql-contrib-8.1_8.1.9-0etch2_powerpc.deb stable/main/binary-powerpc/postgresql-plperl-8.1_8.1.9-0etch2_powerpc.deb stable/main/binary-powerpc/postgresql-plpython-8.1_8.1.9-0etch2_powerpc.deb stable/main/binary-powerpc/postgresql-pltcl-8.1_8.1.9-0etch2_powerpc.deb postgresql-8.1 (8.1.9-0etch2) stable; urgency=high * Add debian/patches/00upstream-01-polymorphic-functions.patch: - Fix regression introduced in 8.1.9: Polymorphic SQL functions with an "anyelement" return value stopped working. - Patch taken from 8.1 branch of upstream CVS: http://developer.postgresql.org/cvsweb.cgi/pgsql/src/backend/optimizer/util/clauses.c.diff?r1=1.201.2.3&r2=1.201.2.4 - Also backported the test cases for this. They only affect build time, not the built .debs, and verify that the fix works, so this should be in a stable update, too. Taken from upstream CVS: http://developer.postgresql.org/cvsweb.cgi/pgsql/src/test/regress/expected/polymorphism.out.diff?r1=1.7&r2=1.7.2.1 http://developer.postgresql.org/cvsweb.cgi/pgsql/src/test/regress/sql/polymorphism.sql.diff?r1=1.1&r2=1.1.10.1 - Closes: #429696 stable/main/binary-s390/libpq-dev_8.1.9-0etch2_s390.deb stable/main/binary-s390/libpq4_8.1.9-0etch2_s390.deb stable/main/binary-s390/libecpg5_8.1.9-0etch2_s390.deb stable/main/binary-s390/libecpg-dev_8.1.9-0etch2_s390.deb stable/main/binary-s390/libecpg-compat2_8.1.9-0etch2_s390.deb stable/main/binary-s390/libpgtypes2_8.1.9-0etch2_s390.deb stable/main/binary-s390/postgresql-8.1_8.1.9-0etch2_s390.deb stable/main/binary-s390/postgresql-client-8.1_8.1.9-0etch2_s390.deb stable/main/binary-s390/postgresql-server-dev-8.1_8.1.9-0etch2_s390.deb stable/main/binary-s390/postgresql-contrib-8.1_8.1.9-0etch2_s390.deb stable/main/binary-s390/postgresql-plperl-8.1_8.1.9-0etch2_s390.deb stable/main/binary-s390/postgresql-plpython-8.1_8.1.9-0etch2_s390.deb stable/main/binary-s390/postgresql-pltcl-8.1_8.1.9-0etch2_s390.deb postgresql-8.1 (8.1.9-0etch2) stable; urgency=high * Add debian/patches/00upstream-01-polymorphic-functions.patch: - Fix regression introduced in 8.1.9: Polymorphic SQL functions with an "anyelement" return value stopped working. - Patch taken from 8.1 branch of upstream CVS: http://developer.postgresql.org/cvsweb.cgi/pgsql/src/backend/optimizer/util/clauses.c.diff?r1=1.201.2.3&r2=1.201.2.4 - Also backported the test cases for this. They only affect build time, not the built .debs, and verify that the fix works, so this should be in a stable update, too. Taken from upstream CVS: http://developer.postgresql.org/cvsweb.cgi/pgsql/src/test/regress/expected/polymorphism.out.diff?r1=1.7&r2=1.7.2.1 http://developer.postgresql.org/cvsweb.cgi/pgsql/src/test/regress/sql/polymorphism.sql.diff?r1=1.1&r2=1.1.10.1 - Closes: #429696 stable/main/binary-sparc/libpq-dev_8.1.9-0etch2_sparc.deb stable/main/binary-sparc/libpq4_8.1.9-0etch2_sparc.deb stable/main/binary-sparc/libecpg5_8.1.9-0etch2_sparc.deb stable/main/binary-sparc/libecpg-dev_8.1.9-0etch2_sparc.deb stable/main/binary-sparc/libecpg-compat2_8.1.9-0etch2_sparc.deb stable/main/binary-sparc/libpgtypes2_8.1.9-0etch2_sparc.deb stable/main/binary-sparc/postgresql-8.1_8.1.9-0etch2_sparc.deb stable/main/binary-sparc/postgresql-client-8.1_8.1.9-0etch2_sparc.deb stable/main/binary-sparc/postgresql-server-dev-8.1_8.1.9-0etch2_sparc.deb stable/main/binary-sparc/postgresql-contrib-8.1_8.1.9-0etch2_sparc.deb stable/main/binary-sparc/postgresql-plperl-8.1_8.1.9-0etch2_sparc.deb stable/main/binary-sparc/postgresql-plpython-8.1_8.1.9-0etch2_sparc.deb stable/main/binary-sparc/postgresql-pltcl-8.1_8.1.9-0etch2_sparc.deb postgresql-8.1 (8.1.9-0etch2) stable; urgency=high * Add debian/patches/00upstream-01-polymorphic-functions.patch: - Fix regression introduced in 8.1.9: Polymorphic SQL functions with an "anyelement" return value stopped working. - Patch taken from 8.1 branch of upstream CVS: http://developer.postgresql.org/cvsweb.cgi/pgsql/src/backend/optimizer/util/clauses.c.diff?r1=1.201.2.3&r2=1.201.2.4 - Also backported the test cases for this. They only affect build time, not the built .debs, and verify that the fix works, so this should be in a stable update, too. Taken from upstream CVS: http://developer.postgresql.org/cvsweb.cgi/pgsql/src/test/regress/expected/polymorphism.out.diff?r1=1.7&r2=1.7.2.1 http://developer.postgresql.org/cvsweb.cgi/pgsql/src/test/regress/sql/polymorphism.sql.diff?r1=1.1&r2=1.1.10.1 - Closes: #429696 stable/main/binary-alpha/pptpd_1.3.0-2etch2_alpha.deb stable/main/binary-alpha/bcrelay_1.3.0-2etch2_alpha.deb pptpd (1.3.0-2etch2) stable-security; urgency=low * Fix regression in GRE reordering stable/main/binary-amd64/pptpd_1.3.0-2etch2_amd64.deb stable/main/binary-amd64/bcrelay_1.3.0-2etch2_amd64.deb pptpd (1.3.0-2etch2) stable-security; urgency=low * Fix regression in GRE reordering stable/main/binary-arm/pptpd_1.3.0-2etch2_arm.deb stable/main/binary-arm/bcrelay_1.3.0-2etch2_arm.deb pptpd (1.3.0-2etch2) stable-security; urgency=low * Fix regression in GRE reordering stable/main/binary-hppa/pptpd_1.3.0-2etch2_hppa.deb stable/main/binary-hppa/bcrelay_1.3.0-2etch2_hppa.deb pptpd (1.3.0-2etch2) stable-security; urgency=low * Fix regression in GRE reordering stable/main/source/pptpd_1.3.0-2etch2.dsc stable/main/source/pptpd_1.3.0-2etch2.diff.gz stable/main/binary-i386/pptpd_1.3.0-2etch2_i386.deb stable/main/binary-i386/bcrelay_1.3.0-2etch2_i386.deb pptpd (1.3.0-2etch2) stable-security; urgency=low * Fix regression in GRE reordering stable/main/binary-ia64/pptpd_1.3.0-2etch2_ia64.deb stable/main/binary-ia64/bcrelay_1.3.0-2etch2_ia64.deb pptpd (1.3.0-2etch2) stable-security; urgency=low * Fix regression in GRE reordering stable/main/binary-mips/pptpd_1.3.0-2etch2_mips.deb stable/main/binary-mips/bcrelay_1.3.0-2etch2_mips.deb pptpd (1.3.0-2etch2) stable-security; urgency=low * Fix regression in GRE reordering stable/main/binary-mipsel/pptpd_1.3.0-2etch2_mipsel.deb stable/main/binary-mipsel/bcrelay_1.3.0-2etch2_mipsel.deb pptpd (1.3.0-2etch2) stable-security; urgency=low * Fix regression in GRE reordering stable/main/binary-powerpc/pptpd_1.3.0-2etch2_powerpc.deb stable/main/binary-powerpc/bcrelay_1.3.0-2etch2_powerpc.deb pptpd (1.3.0-2etch2) stable-security; urgency=low * Fix regression in GRE reordering stable/main/binary-s390/pptpd_1.3.0-2etch2_s390.deb stable/main/binary-s390/bcrelay_1.3.0-2etch2_s390.deb pptpd (1.3.0-2etch2) stable-security; urgency=low * Fix regression in GRE reordering stable/main/binary-sparc/pptpd_1.3.0-2etch2_sparc.deb stable/main/binary-sparc/bcrelay_1.3.0-2etch2_sparc.deb pptpd (1.3.0-2etch2) stable-security; urgency=low * Fix regression in GRE reordering stable/main/binary-alpha/libpt-1.10.0_1.10.2-2+etch1_alpha.deb stable/main/binary-alpha/libpt-dev_1.10.2-2+etch1_alpha.deb stable/main/binary-alpha/libpt-dbg_1.10.2-2+etch1_alpha.deb stable/main/binary-alpha/libpt-plugins-v4l_1.10.2-2+etch1_alpha.deb stable/main/binary-alpha/libpt-plugins-v4l2_1.10.2-2+etch1_alpha.deb stable/main/binary-alpha/libpt-plugins-avc_1.10.2-2+etch1_alpha.deb stable/main/binary-alpha/libpt-plugins-dc_1.10.2-2+etch1_alpha.deb stable/main/binary-alpha/libpt-plugins-oss_1.10.2-2+etch1_alpha.deb stable/main/binary-alpha/libpt-plugins-alsa_1.10.2-2+etch1_alpha.deb pwlib (1.10.2-2+etch1) proposed-updates; urgency=high * Fix remote denial of service vulnerability caused by a call to PString::vsprintf if the used object already contained more than 1000 characters (CVE-2007-4897; Closes: #454133). stable/main/binary-amd64/libpt-1.10.0_1.10.2-2+etch1_amd64.deb stable/main/binary-amd64/libpt-dev_1.10.2-2+etch1_amd64.deb stable/main/binary-amd64/libpt-dbg_1.10.2-2+etch1_amd64.deb stable/main/binary-amd64/libpt-plugins-v4l_1.10.2-2+etch1_amd64.deb stable/main/binary-amd64/libpt-plugins-v4l2_1.10.2-2+etch1_amd64.deb stable/main/binary-amd64/libpt-plugins-avc_1.10.2-2+etch1_amd64.deb stable/main/binary-amd64/libpt-plugins-dc_1.10.2-2+etch1_amd64.deb stable/main/binary-amd64/libpt-plugins-oss_1.10.2-2+etch1_amd64.deb stable/main/binary-amd64/libpt-plugins-alsa_1.10.2-2+etch1_amd64.deb pwlib (1.10.2-2+etch1) proposed-updates; urgency=high * Fix remote denial of service vulnerability caused by a call to PString::vsprintf if the used object already contained more than 1000 characters (CVE-2007-4897; Closes: #454133). stable/main/binary-arm/libpt-1.10.0_1.10.2-2+etch1_arm.deb stable/main/binary-arm/libpt-dev_1.10.2-2+etch1_arm.deb stable/main/binary-arm/libpt-dbg_1.10.2-2+etch1_arm.deb stable/main/binary-arm/libpt-plugins-v4l_1.10.2-2+etch1_arm.deb stable/main/binary-arm/libpt-plugins-v4l2_1.10.2-2+etch1_arm.deb stable/main/binary-arm/libpt-plugins-avc_1.10.2-2+etch1_arm.deb stable/main/binary-arm/libpt-plugins-dc_1.10.2-2+etch1_arm.deb stable/main/binary-arm/libpt-plugins-oss_1.10.2-2+etch1_arm.deb stable/main/binary-arm/libpt-plugins-alsa_1.10.2-2+etch1_arm.deb pwlib (1.10.2-2+etch1) proposed-updates; urgency=high * Fix remote denial of service vulnerability caused by a call to PString::vsprintf if the used object already contained more than 1000 characters (CVE-2007-4897; Closes: #454133). stable/main/binary-hppa/libpt-1.10.0_1.10.2-2+etch1_hppa.deb stable/main/binary-hppa/libpt-dev_1.10.2-2+etch1_hppa.deb stable/main/binary-hppa/libpt-dbg_1.10.2-2+etch1_hppa.deb stable/main/binary-hppa/libpt-plugins-v4l_1.10.2-2+etch1_hppa.deb stable/main/binary-hppa/libpt-plugins-v4l2_1.10.2-2+etch1_hppa.deb stable/main/binary-hppa/libpt-plugins-avc_1.10.2-2+etch1_hppa.deb stable/main/binary-hppa/libpt-plugins-dc_1.10.2-2+etch1_hppa.deb stable/main/binary-hppa/libpt-plugins-oss_1.10.2-2+etch1_hppa.deb stable/main/binary-hppa/libpt-plugins-alsa_1.10.2-2+etch1_hppa.deb pwlib (1.10.2-2+etch1) proposed-updates; urgency=high * Fix remote denial of service vulnerability caused by a call to PString::vsprintf if the used object already contained more than 1000 characters (CVE-2007-4897; Closes: #454133). stable/main/source/pwlib_1.10.2-2+etch1.dsc stable/main/source/pwlib_1.10.2-2+etch1.diff.gz stable/main/binary-i386/libpt-1.10.0_1.10.2-2+etch1_i386.deb stable/main/binary-i386/libpt-dev_1.10.2-2+etch1_i386.deb stable/main/binary-i386/libpt-dbg_1.10.2-2+etch1_i386.deb stable/main/binary-i386/libpt-plugins-v4l_1.10.2-2+etch1_i386.deb stable/main/binary-i386/libpt-plugins-v4l2_1.10.2-2+etch1_i386.deb stable/main/binary-i386/libpt-plugins-avc_1.10.2-2+etch1_i386.deb stable/main/binary-i386/libpt-plugins-dc_1.10.2-2+etch1_i386.deb stable/main/binary-i386/libpt-plugins-oss_1.10.2-2+etch1_i386.deb stable/main/binary-i386/libpt-plugins-alsa_1.10.2-2+etch1_i386.deb stable/main/binary-all/libpt-doc_1.10.2-2+etch1_all.deb pwlib (1.10.2-2+etch1) proposed-updates; urgency=high * Fix remote denial of service vulnerability caused by a call to PString::vsprintf if the used object already contained more than 1000 characters (CVE-2007-4897; Closes: #454133). stable/main/binary-ia64/libpt-1.10.0_1.10.2-2+etch1_ia64.deb stable/main/binary-ia64/libpt-dev_1.10.2-2+etch1_ia64.deb stable/main/binary-ia64/libpt-dbg_1.10.2-2+etch1_ia64.deb stable/main/binary-ia64/libpt-plugins-v4l_1.10.2-2+etch1_ia64.deb stable/main/binary-ia64/libpt-plugins-v4l2_1.10.2-2+etch1_ia64.deb stable/main/binary-ia64/libpt-plugins-avc_1.10.2-2+etch1_ia64.deb stable/main/binary-ia64/libpt-plugins-dc_1.10.2-2+etch1_ia64.deb stable/main/binary-ia64/libpt-plugins-oss_1.10.2-2+etch1_ia64.deb stable/main/binary-ia64/libpt-plugins-alsa_1.10.2-2+etch1_ia64.deb pwlib (1.10.2-2+etch1) proposed-updates; urgency=high * Fix remote denial of service vulnerability caused by a call to PString::vsprintf if the used object already contained more than 1000 characters (CVE-2007-4897; Closes: #454133). stable/main/binary-mips/libpt-1.10.0_1.10.2-2+etch1_mips.deb stable/main/binary-mips/libpt-dev_1.10.2-2+etch1_mips.deb stable/main/binary-mips/libpt-dbg_1.10.2-2+etch1_mips.deb stable/main/binary-mips/libpt-plugins-v4l_1.10.2-2+etch1_mips.deb stable/main/binary-mips/libpt-plugins-v4l2_1.10.2-2+etch1_mips.deb stable/main/binary-mips/libpt-plugins-avc_1.10.2-2+etch1_mips.deb stable/main/binary-mips/libpt-plugins-dc_1.10.2-2+etch1_mips.deb stable/main/binary-mips/libpt-plugins-oss_1.10.2-2+etch1_mips.deb stable/main/binary-mips/libpt-plugins-alsa_1.10.2-2+etch1_mips.deb pwlib (1.10.2-2+etch1) proposed-updates; urgency=high * Fix remote denial of service vulnerability caused by a call to PString::vsprintf if the used object already contained more than 1000 characters (CVE-2007-4897; Closes: #454133). stable/main/binary-mipsel/libpt-1.10.0_1.10.2-2+etch1_mipsel.deb stable/main/binary-mipsel/libpt-dev_1.10.2-2+etch1_mipsel.deb stable/main/binary-mipsel/libpt-dbg_1.10.2-2+etch1_mipsel.deb stable/main/binary-mipsel/libpt-plugins-v4l_1.10.2-2+etch1_mipsel.deb stable/main/binary-mipsel/libpt-plugins-v4l2_1.10.2-2+etch1_mipsel.deb stable/main/binary-mipsel/libpt-plugins-avc_1.10.2-2+etch1_mipsel.deb stable/main/binary-mipsel/libpt-plugins-dc_1.10.2-2+etch1_mipsel.deb stable/main/binary-mipsel/libpt-plugins-oss_1.10.2-2+etch1_mipsel.deb stable/main/binary-mipsel/libpt-plugins-alsa_1.10.2-2+etch1_mipsel.deb pwlib (1.10.2-2+etch1) proposed-updates; urgency=high * Fix remote denial of service vulnerability caused by a call to PString::vsprintf if the used object already contained more than 1000 characters (CVE-2007-4897; Closes: #454133). stable/main/binary-powerpc/libpt-1.10.0_1.10.2-2+etch1_powerpc.deb stable/main/binary-powerpc/libpt-dev_1.10.2-2+etch1_powerpc.deb stable/main/binary-powerpc/libpt-dbg_1.10.2-2+etch1_powerpc.deb stable/main/binary-powerpc/libpt-plugins-v4l_1.10.2-2+etch1_powerpc.deb stable/main/binary-powerpc/libpt-plugins-v4l2_1.10.2-2+etch1_powerpc.deb stable/main/binary-powerpc/libpt-plugins-avc_1.10.2-2+etch1_powerpc.deb stable/main/binary-powerpc/libpt-plugins-dc_1.10.2-2+etch1_powerpc.deb stable/main/binary-powerpc/libpt-plugins-oss_1.10.2-2+etch1_powerpc.deb stable/main/binary-powerpc/libpt-plugins-alsa_1.10.2-2+etch1_powerpc.deb pwlib (1.10.2-2+etch1) proposed-updates; urgency=high * Fix remote denial of service vulnerability caused by a call to PString::vsprintf if the used object already contained more than 1000 characters (CVE-2007-4897; Closes: #454133). stable/main/binary-s390/libpt-1.10.0_1.10.2-2+etch1_s390.deb stable/main/binary-s390/libpt-dev_1.10.2-2+etch1_s390.deb stable/main/binary-s390/libpt-dbg_1.10.2-2+etch1_s390.deb stable/main/binary-s390/libpt-plugins-v4l_1.10.2-2+etch1_s390.deb stable/main/binary-s390/libpt-plugins-v4l2_1.10.2-2+etch1_s390.deb stable/main/binary-s390/libpt-plugins-avc_1.10.2-2+etch1_s390.deb stable/main/binary-s390/libpt-plugins-dc_1.10.2-2+etch1_s390.deb stable/main/binary-s390/libpt-plugins-oss_1.10.2-2+etch1_s390.deb stable/main/binary-s390/libpt-plugins-alsa_1.10.2-2+etch1_s390.deb pwlib (1.10.2-2+etch1) proposed-updates; urgency=high * Fix remote denial of service vulnerability caused by a call to PString::vsprintf if the used object already contained more than 1000 characters (CVE-2007-4897; Closes: #454133). stable/main/binary-sparc/libpt-1.10.0_1.10.2-2+etch1_sparc.deb stable/main/binary-sparc/libpt-dev_1.10.2-2+etch1_sparc.deb stable/main/binary-sparc/libpt-dbg_1.10.2-2+etch1_sparc.deb stable/main/binary-sparc/libpt-plugins-v4l_1.10.2-2+etch1_sparc.deb stable/main/binary-sparc/libpt-plugins-v4l2_1.10.2-2+etch1_sparc.deb stable/main/binary-sparc/libpt-plugins-avc_1.10.2-2+etch1_sparc.deb stable/main/binary-sparc/libpt-plugins-dc_1.10.2-2+etch1_sparc.deb stable/main/binary-sparc/libpt-plugins-oss_1.10.2-2+etch1_sparc.deb stable/main/binary-sparc/libpt-plugins-alsa_1.10.2-2+etch1_sparc.deb pwlib (1.10.2-2+etch1) proposed-updates; urgency=high * Fix remote denial of service vulnerability caused by a call to PString::vsprintf if the used object already contained more than 1000 characters (CVE-2007-4897; Closes: #454133). stable/main/binary-alpha/python-pygresql_3.8.1-1etch1_alpha.deb pygresql (1:3.8.1-1etch1) proposed-updates; urgency=low * Non maintainer upload. * Fix package dependency on libpq. Closes: #430836. stable/main/binary-amd64/python-pygresql_3.8.1-1etch1_amd64.deb pygresql (1:3.8.1-1etch1) proposed-updates; urgency=low * Non maintainer upload. * Fix package dependency on libpq. Closes: #430836. stable/main/binary-arm/python-pygresql_3.8.1-1etch1_arm.deb pygresql (1:3.8.1-1etch1) proposed-updates; urgency=low * Non maintainer upload. * Fix package dependency on libpq. Closes: #430836. stable/main/binary-hppa/python-pygresql_3.8.1-1etch1_hppa.deb pygresql (1:3.8.1-1etch1) proposed-updates; urgency=low * Non maintainer upload. * Fix package dependency on libpq. Closes: #430836. stable/main/source/pygresql_3.8.1-1etch1.dsc stable/main/source/pygresql_3.8.1-1etch1.diff.gz stable/main/binary-i386/python-pygresql_3.8.1-1etch1_i386.deb pygresql (1:3.8.1-1etch1) proposed-updates; urgency=low * Non maintainer upload. * Fix package dependency on libpq. Closes: #430836. stable/main/binary-ia64/python-pygresql_3.8.1-1etch1_ia64.deb pygresql (1:3.8.1-1etch1) proposed-updates; urgency=low * Non maintainer upload. * Fix package dependency on libpq. Closes: #430836. stable/main/binary-mips/python-pygresql_3.8.1-1etch1_mips.deb pygresql (1:3.8.1-1etch1) proposed-updates; urgency=low * Non maintainer upload. * Fix package dependency on libpq. Closes: #430836. stable/main/binary-mipsel/python-pygresql_3.8.1-1etch1_mipsel.deb pygresql (1:3.8.1-1etch1) proposed-updates; urgency=low * Non maintainer upload. * Fix package dependency on libpq. Closes: #430836. stable/main/binary-powerpc/python-pygresql_3.8.1-1etch1_powerpc.deb pygresql (1:3.8.1-1etch1) proposed-updates; urgency=low * Non maintainer upload. * Fix package dependency on libpq. Closes: #430836. stable/main/binary-s390/python-pygresql_3.8.1-1etch1_s390.deb pygresql (1:3.8.1-1etch1) proposed-updates; urgency=low * Non maintainer upload. * Fix package dependency on libpq. Closes: #430836. stable/main/binary-sparc/python-pygresql_3.8.1-1etch1_sparc.deb pygresql (1:3.8.1-1etch1) proposed-updates; urgency=low * Non maintainer upload. * Fix package dependency on libpq. Closes: #430836. stable/main/binary-alpha/libqt3-mt_3.3.7-4etch1_alpha.deb stable/main/binary-alpha/libqt3-mt-mysql_3.3.7-4etch1_alpha.deb stable/main/binary-alpha/libqt3-mt-odbc_3.3.7-4etch1_alpha.deb stable/main/binary-alpha/libqt3-mt-psql_3.3.7-4etch1_alpha.deb stable/main/binary-alpha/libqt3-mt-sqlite_3.3.7-4etch1_alpha.deb stable/main/binary-alpha/libqt3-mt-dev_3.3.7-4etch1_alpha.deb stable/main/binary-alpha/libqt3-headers_3.3.7-4etch1_alpha.deb stable/main/binary-alpha/libqt3-compat-headers_3.3.7-4etch1_alpha.deb stable/main/binary-alpha/qt3-dev-tools_3.3.7-4etch1_alpha.deb stable/main/binary-alpha/qt3-designer_3.3.7-4etch1_alpha.deb stable/main/binary-alpha/qt3-apps-dev_3.3.7-4etch1_alpha.deb stable/main/binary-alpha/qt3-linguist_3.3.7-4etch1_alpha.deb stable/main/binary-alpha/qt3-assistant_3.3.7-4etch1_alpha.deb stable/main/binary-alpha/qt3-qtconfig_3.3.7-4etch1_alpha.deb stable/main/binary-alpha/qt3-dev-tools-embedded_3.3.7-4etch1_alpha.deb stable/main/binary-alpha/qt3-dev-tools-compat_3.3.7-4etch1_alpha.deb stable/main/binary-alpha/qt-x11-free-dbg_3.3.7-4etch1_alpha.deb qt-x11-free (3:3.3.7-4etch1) stable-security; urgency=high * Fix format string vulnerabilities. (CVE-2007-3388) * Fix off-by-one in UTF codec. (CVE-2007-4137) stable/main/binary-amd64/libqt3-mt_3.3.7-4etch1_amd64.deb stable/main/binary-amd64/libqt3-mt-mysql_3.3.7-4etch1_amd64.deb stable/main/binary-amd64/libqt3-mt-odbc_3.3.7-4etch1_amd64.deb stable/main/binary-amd64/libqt3-mt-psql_3.3.7-4etch1_amd64.deb stable/main/binary-amd64/libqt3-mt-ibase_3.3.7-4etch1_amd64.deb stable/main/binary-amd64/libqt3-mt-sqlite_3.3.7-4etch1_amd64.deb stable/main/binary-amd64/libqt3-mt-dev_3.3.7-4etch1_amd64.deb stable/main/binary-amd64/libqt3-headers_3.3.7-4etch1_amd64.deb stable/main/binary-amd64/libqt3-compat-headers_3.3.7-4etch1_amd64.deb stable/main/binary-amd64/qt3-dev-tools_3.3.7-4etch1_amd64.deb stable/main/binary-amd64/qt3-designer_3.3.7-4etch1_amd64.deb stable/main/binary-amd64/qt3-apps-dev_3.3.7-4etch1_amd64.deb stable/main/binary-amd64/qt3-linguist_3.3.7-4etch1_amd64.deb stable/main/binary-amd64/qt3-assistant_3.3.7-4etch1_amd64.deb stable/main/binary-amd64/qt3-qtconfig_3.3.7-4etch1_amd64.deb stable/main/binary-amd64/qt3-dev-tools-embedded_3.3.7-4etch1_amd64.deb stable/main/binary-amd64/qt3-dev-tools-compat_3.3.7-4etch1_amd64.deb stable/main/binary-amd64/qt-x11-free-dbg_3.3.7-4etch1_amd64.deb qt-x11-free (3:3.3.7-4etch1) stable-security; urgency=high * Fix format string vulnerabilities. (CVE-2007-3388) * Fix off-by-one in UTF codec. (CVE-2007-4137) stable/main/binary-arm/libqt3-mt_3.3.7-4etch1_arm.deb stable/main/binary-arm/libqt3-mt-mysql_3.3.7-4etch1_arm.deb stable/main/binary-arm/libqt3-mt-odbc_3.3.7-4etch1_arm.deb stable/main/binary-arm/libqt3-mt-psql_3.3.7-4etch1_arm.deb stable/main/binary-arm/libqt3-mt-sqlite_3.3.7-4etch1_arm.deb stable/main/binary-arm/libqt3-mt-dev_3.3.7-4etch1_arm.deb stable/main/binary-arm/libqt3-headers_3.3.7-4etch1_arm.deb stable/main/binary-arm/libqt3-compat-headers_3.3.7-4etch1_arm.deb stable/main/binary-arm/qt3-dev-tools_3.3.7-4etch1_arm.deb stable/main/binary-arm/qt3-designer_3.3.7-4etch1_arm.deb stable/main/binary-arm/qt3-apps-dev_3.3.7-4etch1_arm.deb stable/main/binary-arm/qt3-linguist_3.3.7-4etch1_arm.deb stable/main/binary-arm/qt3-assistant_3.3.7-4etch1_arm.deb stable/main/binary-arm/qt3-qtconfig_3.3.7-4etch1_arm.deb stable/main/binary-arm/qt3-dev-tools-embedded_3.3.7-4etch1_arm.deb stable/main/binary-arm/qt3-dev-tools-compat_3.3.7-4etch1_arm.deb stable/main/binary-arm/qt-x11-free-dbg_3.3.7-4etch1_arm.deb qt-x11-free (3:3.3.7-4etch1) stable-security; urgency=high * Fix format string vulnerabilities. (CVE-2007-3388) * Fix off-by-one in UTF codec. (CVE-2007-4137) stable/main/binary-hppa/libqt3-mt_3.3.7-4etch1_hppa.deb stable/main/binary-hppa/libqt3-mt-mysql_3.3.7-4etch1_hppa.deb stable/main/binary-hppa/libqt3-mt-odbc_3.3.7-4etch1_hppa.deb stable/main/binary-hppa/libqt3-mt-psql_3.3.7-4etch1_hppa.deb stable/main/binary-hppa/libqt3-mt-sqlite_3.3.7-4etch1_hppa.deb stable/main/binary-hppa/libqt3-mt-dev_3.3.7-4etch1_hppa.deb stable/main/binary-hppa/libqt3-headers_3.3.7-4etch1_hppa.deb stable/main/binary-hppa/libqt3-compat-headers_3.3.7-4etch1_hppa.deb stable/main/binary-hppa/qt3-dev-tools_3.3.7-4etch1_hppa.deb stable/main/binary-hppa/qt3-designer_3.3.7-4etch1_hppa.deb stable/main/binary-hppa/qt3-apps-dev_3.3.7-4etch1_hppa.deb stable/main/binary-hppa/qt3-linguist_3.3.7-4etch1_hppa.deb stable/main/binary-hppa/qt3-assistant_3.3.7-4etch1_hppa.deb stable/main/binary-hppa/qt3-qtconfig_3.3.7-4etch1_hppa.deb stable/main/binary-hppa/qt3-dev-tools-embedded_3.3.7-4etch1_hppa.deb stable/main/binary-hppa/qt3-dev-tools-compat_3.3.7-4etch1_hppa.deb stable/main/binary-hppa/qt-x11-free-dbg_3.3.7-4etch1_hppa.deb qt-x11-free (3:3.3.7-4etch1) stable-security; urgency=high * Fix format string vulnerabilities. (CVE-2007-3388) * Fix off-by-one in UTF codec. (CVE-2007-4137) stable/main/source/qt-x11-free_3.3.7-4etch1.dsc stable/main/source/qt-x11-free_3.3.7.orig.tar.gz stable/main/source/qt-x11-free_3.3.7-4etch1.diff.gz stable/main/binary-all/libqt3-i18n_3.3.7-4etch1_all.deb stable/main/binary-all/qt3-doc_3.3.7-4etch1_all.deb stable/main/binary-all/qt3-examples_3.3.7-4etch1_all.deb stable/main/binary-i386/libqt3-mt_3.3.7-4etch1_i386.deb stable/main/binary-i386/libqt3-mt-mysql_3.3.7-4etch1_i386.deb stable/main/binary-i386/libqt3-mt-odbc_3.3.7-4etch1_i386.deb stable/main/binary-i386/libqt3-mt-psql_3.3.7-4etch1_i386.deb stable/main/binary-i386/libqt3-mt-ibase_3.3.7-4etch1_i386.deb stable/main/binary-i386/libqt3-mt-sqlite_3.3.7-4etch1_i386.deb stable/main/binary-i386/libqt3-mt-dev_3.3.7-4etch1_i386.deb stable/main/binary-i386/libqt3-headers_3.3.7-4etch1_i386.deb stable/main/binary-i386/libqt3-compat-headers_3.3.7-4etch1_i386.deb stable/main/binary-i386/qt3-dev-tools_3.3.7-4etch1_i386.deb stable/main/binary-i386/qt3-designer_3.3.7-4etch1_i386.deb stable/main/binary-i386/qt3-apps-dev_3.3.7-4etch1_i386.deb stable/main/binary-i386/qt3-linguist_3.3.7-4etch1_i386.deb stable/main/binary-i386/qt3-assistant_3.3.7-4etch1_i386.deb stable/main/binary-i386/qt3-qtconfig_3.3.7-4etch1_i386.deb stable/main/binary-i386/qt3-dev-tools-embedded_3.3.7-4etch1_i386.deb stable/main/binary-i386/qt3-dev-tools-compat_3.3.7-4etch1_i386.deb stable/main/binary-i386/qt-x11-free-dbg_3.3.7-4etch1_i386.deb qt-x11-free (3:3.3.7-4etch1) stable-security; urgency=high * Fix format string vulnerabilities. (CVE-2007-3388) * Fix off-by-one in UTF codec. (CVE-2007-4137) stable/main/binary-ia64/libqt3-mt_3.3.7-4etch1_ia64.deb stable/main/binary-ia64/libqt3-mt-mysql_3.3.7-4etch1_ia64.deb stable/main/binary-ia64/libqt3-mt-odbc_3.3.7-4etch1_ia64.deb stable/main/binary-ia64/libqt3-mt-psql_3.3.7-4etch1_ia64.deb stable/main/binary-ia64/libqt3-mt-sqlite_3.3.7-4etch1_ia64.deb stable/main/binary-ia64/libqt3-mt-dev_3.3.7-4etch1_ia64.deb stable/main/binary-ia64/libqt3-headers_3.3.7-4etch1_ia64.deb stable/main/binary-ia64/libqt3-compat-headers_3.3.7-4etch1_ia64.deb stable/main/binary-ia64/qt3-dev-tools_3.3.7-4etch1_ia64.deb stable/main/binary-ia64/qt3-designer_3.3.7-4etch1_ia64.deb stable/main/binary-ia64/qt3-apps-dev_3.3.7-4etch1_ia64.deb stable/main/binary-ia64/qt3-linguist_3.3.7-4etch1_ia64.deb stable/main/binary-ia64/qt3-assistant_3.3.7-4etch1_ia64.deb stable/main/binary-ia64/qt3-qtconfig_3.3.7-4etch1_ia64.deb stable/main/binary-ia64/qt3-dev-tools-embedded_3.3.7-4etch1_ia64.deb stable/main/binary-ia64/qt3-dev-tools-compat_3.3.7-4etch1_ia64.deb stable/main/binary-ia64/qt-x11-free-dbg_3.3.7-4etch1_ia64.deb qt-x11-free (3:3.3.7-4etch1) stable-security; urgency=high * Fix format string vulnerabilities. (CVE-2007-3388) * Fix off-by-one in UTF codec. (CVE-2007-4137) stable/main/binary-mips/libqt3-mt_3.3.7-4etch1_mips.deb stable/main/binary-mips/libqt3-mt-mysql_3.3.7-4etch1_mips.deb stable/main/binary-mips/libqt3-mt-odbc_3.3.7-4etch1_mips.deb stable/main/binary-mips/libqt3-mt-psql_3.3.7-4etch1_mips.deb stable/main/binary-mips/libqt3-mt-sqlite_3.3.7-4etch1_mips.deb stable/main/binary-mips/libqt3-mt-dev_3.3.7-4etch1_mips.deb stable/main/binary-mips/libqt3-headers_3.3.7-4etch1_mips.deb stable/main/binary-mips/libqt3-compat-headers_3.3.7-4etch1_mips.deb stable/main/binary-mips/qt3-dev-tools_3.3.7-4etch1_mips.deb stable/main/binary-mips/qt3-designer_3.3.7-4etch1_mips.deb stable/main/binary-mips/qt3-apps-dev_3.3.7-4etch1_mips.deb stable/main/binary-mips/qt3-linguist_3.3.7-4etch1_mips.deb stable/main/binary-mips/qt3-assistant_3.3.7-4etch1_mips.deb stable/main/binary-mips/qt3-qtconfig_3.3.7-4etch1_mips.deb stable/main/binary-mips/qt3-dev-tools-embedded_3.3.7-4etch1_mips.deb stable/main/binary-mips/qt3-dev-tools-compat_3.3.7-4etch1_mips.deb stable/main/binary-mips/qt-x11-free-dbg_3.3.7-4etch1_mips.deb qt-x11-free (3:3.3.7-4etch1) stable-security; urgency=high * Fix format string vulnerabilities. (CVE-2007-3388) * Fix off-by-one in UTF codec. (CVE-2007-4137) stable/main/binary-mipsel/libqt3-mt_3.3.7-4etch1_mipsel.deb stable/main/binary-mipsel/libqt3-mt-mysql_3.3.7-4etch1_mipsel.deb stable/main/binary-mipsel/libqt3-mt-odbc_3.3.7-4etch1_mipsel.deb stable/main/binary-mipsel/libqt3-mt-psql_3.3.7-4etch1_mipsel.deb stable/main/binary-mipsel/libqt3-mt-sqlite_3.3.7-4etch1_mipsel.deb stable/main/binary-mipsel/libqt3-mt-dev_3.3.7-4etch1_mipsel.deb stable/main/binary-mipsel/libqt3-headers_3.3.7-4etch1_mipsel.deb stable/main/binary-mipsel/libqt3-compat-headers_3.3.7-4etch1_mipsel.deb stable/main/binary-mipsel/qt3-dev-tools_3.3.7-4etch1_mipsel.deb stable/main/binary-mipsel/qt3-designer_3.3.7-4etch1_mipsel.deb stable/main/binary-mipsel/qt3-apps-dev_3.3.7-4etch1_mipsel.deb stable/main/binary-mipsel/qt3-linguist_3.3.7-4etch1_mipsel.deb stable/main/binary-mipsel/qt3-assistant_3.3.7-4etch1_mipsel.deb stable/main/binary-mipsel/qt3-qtconfig_3.3.7-4etch1_mipsel.deb stable/main/binary-mipsel/qt3-dev-tools-embedded_3.3.7-4etch1_mipsel.deb stable/main/binary-mipsel/qt3-dev-tools-compat_3.3.7-4etch1_mipsel.deb stable/main/binary-mipsel/qt-x11-free-dbg_3.3.7-4etch1_mipsel.deb qt-x11-free (3:3.3.7-4etch1) stable-security; urgency=high * Fix format string vulnerabilities. (CVE-2007-3388) * Fix off-by-one in UTF codec. (CVE-2007-4137) stable/main/binary-powerpc/libqt3-mt_3.3.7-4etch1_powerpc.deb stable/main/binary-powerpc/libqt3-mt-mysql_3.3.7-4etch1_powerpc.deb stable/main/binary-powerpc/libqt3-mt-odbc_3.3.7-4etch1_powerpc.deb stable/main/binary-powerpc/libqt3-mt-psql_3.3.7-4etch1_powerpc.deb stable/main/binary-powerpc/libqt3-mt-sqlite_3.3.7-4etch1_powerpc.deb stable/main/binary-powerpc/libqt3-mt-dev_3.3.7-4etch1_powerpc.deb stable/main/binary-powerpc/libqt3-headers_3.3.7-4etch1_powerpc.deb stable/main/binary-powerpc/libqt3-compat-headers_3.3.7-4etch1_powerpc.deb stable/main/binary-powerpc/qt3-dev-tools_3.3.7-4etch1_powerpc.deb stable/main/binary-powerpc/qt3-designer_3.3.7-4etch1_powerpc.deb stable/main/binary-powerpc/qt3-apps-dev_3.3.7-4etch1_powerpc.deb stable/main/binary-powerpc/qt3-linguist_3.3.7-4etch1_powerpc.deb stable/main/binary-powerpc/qt3-assistant_3.3.7-4etch1_powerpc.deb stable/main/binary-powerpc/qt3-qtconfig_3.3.7-4etch1_powerpc.deb stable/main/binary-powerpc/qt3-dev-tools-embedded_3.3.7-4etch1_powerpc.deb stable/main/binary-powerpc/qt3-dev-tools-compat_3.3.7-4etch1_powerpc.deb stable/main/binary-powerpc/qt-x11-free-dbg_3.3.7-4etch1_powerpc.deb qt-x11-free (3:3.3.7-4etch1) stable-security; urgency=high * Fix format string vulnerabilities. (CVE-2007-3388) * Fix off-by-one in UTF codec. (CVE-2007-4137) stable/main/binary-s390/libqt3-mt_3.3.7-4etch1_s390.deb stable/main/binary-s390/libqt3-mt-mysql_3.3.7-4etch1_s390.deb stable/main/binary-s390/libqt3-mt-odbc_3.3.7-4etch1_s390.deb stable/main/binary-s390/libqt3-mt-psql_3.3.7-4etch1_s390.deb stable/main/binary-s390/libqt3-mt-sqlite_3.3.7-4etch1_s390.deb stable/main/binary-s390/libqt3-mt-dev_3.3.7-4etch1_s390.deb stable/main/binary-s390/libqt3-headers_3.3.7-4etch1_s390.deb stable/main/binary-s390/libqt3-compat-headers_3.3.7-4etch1_s390.deb stable/main/binary-s390/qt3-dev-tools_3.3.7-4etch1_s390.deb stable/main/binary-s390/qt3-designer_3.3.7-4etch1_s390.deb stable/main/binary-s390/qt3-apps-dev_3.3.7-4etch1_s390.deb stable/main/binary-s390/qt3-linguist_3.3.7-4etch1_s390.deb stable/main/binary-s390/qt3-assistant_3.3.7-4etch1_s390.deb stable/main/binary-s390/qt3-qtconfig_3.3.7-4etch1_s390.deb stable/main/binary-s390/qt3-dev-tools-embedded_3.3.7-4etch1_s390.deb stable/main/binary-s390/qt3-dev-tools-compat_3.3.7-4etch1_s390.deb stable/main/binary-s390/qt-x11-free-dbg_3.3.7-4etch1_s390.deb qt-x11-free (3:3.3.7-4etch1) stable-security; urgency=high * Fix format string vulnerabilities. (CVE-2007-3388) * Fix off-by-one in UTF codec. (CVE-2007-4137) stable/main/binary-sparc/libqt3-mt_3.3.7-4etch1_sparc.deb stable/main/binary-sparc/libqt3-mt-mysql_3.3.7-4etch1_sparc.deb stable/main/binary-sparc/libqt3-mt-odbc_3.3.7-4etch1_sparc.deb stable/main/binary-sparc/libqt3-mt-psql_3.3.7-4etch1_sparc.deb stable/main/binary-sparc/libqt3-mt-sqlite_3.3.7-4etch1_sparc.deb stable/main/binary-sparc/libqt3-mt-dev_3.3.7-4etch1_sparc.deb stable/main/binary-sparc/libqt3-headers_3.3.7-4etch1_sparc.deb stable/main/binary-sparc/libqt3-compat-headers_3.3.7-4etch1_sparc.deb stable/main/binary-sparc/qt3-dev-tools_3.3.7-4etch1_sparc.deb stable/main/binary-sparc/qt3-designer_3.3.7-4etch1_sparc.deb stable/main/binary-sparc/qt3-apps-dev_3.3.7-4etch1_sparc.deb stable/main/binary-sparc/qt3-linguist_3.3.7-4etch1_sparc.deb stable/main/binary-sparc/qt3-assistant_3.3.7-4etch1_sparc.deb stable/main/binary-sparc/qt3-qtconfig_3.3.7-4etch1_sparc.deb stable/main/binary-sparc/qt3-dev-tools-embedded_3.3.7-4etch1_sparc.deb stable/main/binary-sparc/qt3-dev-tools-compat_3.3.7-4etch1_sparc.deb stable/main/binary-sparc/qt-x11-free-dbg_3.3.7-4etch1_sparc.deb qt-x11-free (3:3.3.7-4etch1) stable-security; urgency=high * Fix format string vulnerabilities. (CVE-2007-3388) * Fix off-by-one in UTF codec. (CVE-2007-4137) stable/main/binary-alpha/quagga_0.99.5-5etch3_alpha.deb quagga (0.99.5-5etch3) stable-security; urgency=high * SECURITY: A bgpd could be crashed if a peer sent a malformed OPEN message or a malformed COMMUNITY attribute. Only configured peers can do this. The bug is fixed by 96_SECURITY_ubuntu_fix_dos_malformed_community.dpatch. CVE-2007-4826. Closes: 442133 stable/main/source/quagga_0.99.5-5etch3.dsc stable/main/source/quagga_0.99.5-5etch3.diff.gz stable/main/binary-all/quagga-doc_0.99.5-5etch3_all.deb stable/main/binary-amd64/quagga_0.99.5-5etch3_amd64.deb quagga (0.99.5-5etch3) stable-security; urgency=high * SECURITY: A bgpd could be crashed if a peer sent a malformed OPEN message or a malformed COMMUNITY attribute. Only configured peers can do this. The bug is fixed by 96_SECURITY_ubuntu_fix_dos_malformed_community.dpatch. CVE-2007-4826. Closes: 442133 stable/main/binary-arm/quagga_0.99.5-5etch3_arm.deb quagga (0.99.5-5etch3) stable-security; urgency=high * SECURITY: A bgpd could be crashed if a peer sent a malformed OPEN message or a malformed COMMUNITY attribute. Only configured peers can do this. The bug is fixed by 96_SECURITY_ubuntu_fix_dos_malformed_community.dpatch. CVE-2007-4826. Closes: 442133 stable/main/binary-hppa/quagga_0.99.5-5etch3_hppa.deb quagga (0.99.5-5etch3) stable-security; urgency=high * SECURITY: A bgpd could be crashed if a peer sent a malformed OPEN message or a malformed COMMUNITY attribute. Only configured peers can do this. The bug is fixed by 96_SECURITY_ubuntu_fix_dos_malformed_community.dpatch. CVE-2007-4826. Closes: 442133 stable/main/binary-i386/quagga_0.99.5-5etch3_i386.deb quagga (0.99.5-5etch3) stable-security; urgency=high * SECURITY: A bgpd could be crashed if a peer sent a malformed OPEN message or a malformed COMMUNITY attribute. Only configured peers can do this. The bug is fixed by 96_SECURITY_ubuntu_fix_dos_malformed_community.dpatch. CVE-2007-4826. Closes: 442133 stable/main/binary-ia64/quagga_0.99.5-5etch3_ia64.deb quagga (0.99.5-5etch3) stable-security; urgency=high * SECURITY: A bgpd could be crashed if a peer sent a malformed OPEN message or a malformed COMMUNITY attribute. Only configured peers can do this. The bug is fixed by 96_SECURITY_ubuntu_fix_dos_malformed_community.dpatch. CVE-2007-4826. Closes: 442133 stable/main/binary-mips/quagga_0.99.5-5etch3_mips.deb quagga (0.99.5-5etch3) stable-security; urgency=high * SECURITY: A bgpd could be crashed if a peer sent a malformed OPEN message or a malformed COMMUNITY attribute. Only configured peers can do this. The bug is fixed by 96_SECURITY_ubuntu_fix_dos_malformed_community.dpatch. CVE-2007-4826. Closes: 442133 stable/main/binary-mipsel/quagga_0.99.5-5etch3_mipsel.deb quagga (0.99.5-5etch3) stable-security; urgency=high * SECURITY: A bgpd could be crashed if a peer sent a malformed OPEN message or a malformed COMMUNITY attribute. Only configured peers can do this. The bug is fixed by 96_SECURITY_ubuntu_fix_dos_malformed_community.dpatch. CVE-2007-4826. Closes: 442133 stable/main/binary-powerpc/quagga_0.99.5-5etch3_powerpc.deb quagga (0.99.5-5etch3) stable-security; urgency=high * SECURITY: A bgpd could be crashed if a peer sent a malformed OPEN message or a malformed COMMUNITY attribute. Only configured peers can do this. The bug is fixed by 96_SECURITY_ubuntu_fix_dos_malformed_community.dpatch. CVE-2007-4826. Closes: 442133 stable/main/binary-s390/quagga_0.99.5-5etch3_s390.deb quagga (0.99.5-5etch3) stable-security; urgency=high * SECURITY: A bgpd could be crashed if a peer sent a malformed OPEN message or a malformed COMMUNITY attribute. Only configured peers can do this. The bug is fixed by 96_SECURITY_ubuntu_fix_dos_malformed_community.dpatch. CVE-2007-4826. Closes: 442133 stable/main/binary-sparc/quagga_0.99.5-5etch3_sparc.deb quagga (0.99.5-5etch3) stable-security; urgency=high * SECURITY: A bgpd could be crashed if a peer sent a malformed OPEN message or a malformed COMMUNITY attribute. Only configured peers can do this. The bug is fixed by 96_SECURITY_ubuntu_fix_dos_malformed_community.dpatch. CVE-2007-4826. Closes: 442133 stable/main/binary-alpha/reprepro_1.3.1+1-1_alpha.deb reprepro (1.3.1+1-1) stable-security; urgency=high * Fix bug causing a Release.gpg with only unknown signatures considered as properly signed. stable/main/binary-amd64/reprepro_1.3.1+1-1_amd64.deb reprepro (1.3.1+1-1) stable-security; urgency=high * Fix bug causing a Release.gpg with only unknown signatures considered as properly signed. stable/main/binary-arm/reprepro_1.3.1+1-1_arm.deb reprepro (1.3.1+1-1) stable-security; urgency=high * Fix bug causing a Release.gpg with only unknown signatures considered as properly signed. stable/main/binary-hppa/reprepro_1.3.1+1-1_hppa.deb reprepro (1.3.1+1-1) stable-security; urgency=high * Fix bug causing a Release.gpg with only unknown signatures considered as properly signed. stable/main/source/reprepro_1.3.1+1-1.dsc stable/main/source/reprepro_1.3.1+1.orig.tar.gz stable/main/source/reprepro_1.3.1+1-1.diff.gz stable/main/binary-i386/reprepro_1.3.1+1-1_i386.deb reprepro (1.3.1+1-1) stable-security; urgency=high * Fix bug causing a Release.gpg with only unknown signatures considered as properly signed. stable/main/binary-ia64/reprepro_1.3.1+1-1_ia64.deb reprepro (1.3.1+1-1) stable-security; urgency=high * Fix bug causing a Release.gpg with only unknown signatures considered as properly signed. stable/main/binary-mips/reprepro_1.3.1+1-1_mips.deb reprepro (1.3.1+1-1) stable-security; urgency=high * Fix bug causing a Release.gpg with only unknown signatures considered as properly signed. stable/main/binary-mipsel/reprepro_1.3.1+1-1_mipsel.deb reprepro (1.3.1+1-1) stable-security; urgency=high * Fix bug causing a Release.gpg with only unknown signatures considered as properly signed. stable/main/binary-powerpc/reprepro_1.3.1+1-1_powerpc.deb reprepro (1.3.1+1-1) stable-security; urgency=high * Fix bug causing a Release.gpg with only unknown signatures considered as properly signed. stable/main/binary-s390/reprepro_1.3.1+1-1_s390.deb reprepro (1.3.1+1-1) stable-security; urgency=high * Fix bug causing a Release.gpg with only unknown signatures considered as properly signed. stable/main/binary-sparc/reprepro_1.3.1+1-1_sparc.deb reprepro (1.3.1+1-1) stable-security; urgency=high * Fix bug causing a Release.gpg with only unknown signatures considered as properly signed. stable/main/rootskel_1.50+b1_alpha.udeb stable/main/rootskel-bootfloppy_1.50+b1_alpha.udeb rootskel (1.50+b1) stable; urgency=low * Binary-only non-maintainer upload for alpha; no source changes. * Rebuild against klibc_1.4.34-2 stable/main/rootskel_1.50+b1_amd64.udeb stable/main/rootskel-bootfloppy_1.50+b1_amd64.udeb rootskel (1.50+b1) stable; urgency=low * Binary-only non-maintainer upload for amd64; no source changes. * Rebuild against klibc_1.4.34-2 stable/main/rootskel_1.50+b1_arm.udeb stable/main/rootskel-bootfloppy_1.50+b1_arm.udeb rootskel (1.50+b1) stable; urgency=low * Binary-only non-maintainer upload for arm; no source changes. * Rebuild against klibc_1.4.34-2 stable/main/rootskel_1.50+b1_hppa.udeb stable/main/rootskel-bootfloppy_1.50+b1_hppa.udeb rootskel (1.50+b1) stable; urgency=low * Binary-only non-maintainer upload for hppa; no source changes. * Rebuild against klibc_1.4.34-2 stable/main/rootskel_1.50+b1_i386.udeb stable/main/rootskel-bootfloppy_1.50+b1_i386.udeb rootskel (1.50+b1) stable; urgency=low * Binary-only non-maintainer upload for i386; no source changes. * Rebuild against klibc_1.4.34-2 stable/main/rootskel_1.50+b1_ia64.udeb stable/main/rootskel-bootfloppy_1.50+b1_ia64.udeb rootskel (1.50+b1) stable; urgency=low * Binary-only non-maintainer upload for ia64; no source changes. * Rebuild against klibc_1.4.34-2 stable/main/rootskel_1.50+b1_mips.udeb stable/main/rootskel-bootfloppy_1.50+b1_mips.udeb rootskel (1.50+b1) stable; urgency=low * Binary-only non-maintainer upload for mips; no source changes. * Rebuild against klibc_1.4.34-2 stable/main/rootskel_1.50+b1_mipsel.udeb stable/main/rootskel-bootfloppy_1.50+b1_mipsel.udeb rootskel (1.50+b1) stable; urgency=low * Binary-only non-maintainer upload for mipsel; no source changes. * Rebuild against klibc_1.4.34-2 stable/main/rootskel_1.50+b1_powerpc.udeb stable/main/rootskel-bootfloppy_1.50+b1_powerpc.udeb rootskel (1.50+b1) stable; urgency=low * Binary-only non-maintainer upload for powerpc; no source changes. * Rebuild against klibc_1.4.34-2 stable/main/rootskel_1.50+b1_s390.udeb stable/main/rootskel-bootfloppy_1.50+b1_s390.udeb rootskel (1.50+b1) stable; urgency=low * Binary-only non-maintainer upload for s390; no source changes. * Rebuild against klibc_1.4.34-2 stable/main/rootskel_1.50+b1_sparc.udeb stable/main/rootskel-bootfloppy_1.50+b1_sparc.udeb rootskel (1.50+b1) stable; urgency=low * Binary-only non-maintainer upload for sparc; no source changes. * Rebuild against klibc_1.4.34-2 stable/main/binary-alpha/rsync_2.6.9-2etch1_alpha.deb rsync (2.6.9-2etch1) stable-security; urgency=high * Non-maintainer upload by The Security Team. * Fix an off-by-one error in handling filenames. [CVE-2007-4091] stable/main/source/rsync_2.6.9-2etch1.dsc stable/main/source/rsync_2.6.9.orig.tar.gz stable/main/source/rsync_2.6.9-2etch1.diff.gz stable/main/binary-amd64/rsync_2.6.9-2etch1_amd64.deb rsync (2.6.9-2etch1) stable-security; urgency=high * Non-maintainer upload by The Security Team. * Fix an off-by-one error in handling filenames. [CVE-2007-4091] stable/main/binary-arm/rsync_2.6.9-2etch1_arm.deb rsync (2.6.9-2etch1) stable-security; urgency=high * Non-maintainer upload by The Security Team. * Fix an off-by-one error in handling filenames. [CVE-2007-4091] stable/main/binary-hppa/rsync_2.6.9-2etch1_hppa.deb rsync (2.6.9-2etch1) stable-security; urgency=high * Non-maintainer upload by The Security Team. * Fix an off-by-one error in handling filenames. [CVE-2007-4091] stable/main/binary-i386/rsync_2.6.9-2etch1_i386.deb rsync (2.6.9-2etch1) stable-security; urgency=high * Non-maintainer upload by The Security Team. * Fix an off-by-one error in handling filenames. [CVE-2007-4091] stable/main/binary-ia64/rsync_2.6.9-2etch1_ia64.deb rsync (2.6.9-2etch1) stable-security; urgency=high * Non-maintainer upload by The Security Team. * Fix an off-by-one error in handling filenames. [CVE-2007-4091] stable/main/binary-mips/rsync_2.6.9-2etch1_mips.deb rsync (2.6.9-2etch1) stable-security; urgency=high * Non-maintainer upload by The Security Team. * Fix an off-by-one error in handling filenames. [CVE-2007-4091] stable/main/binary-mipsel/rsync_2.6.9-2etch1_mipsel.deb rsync (2.6.9-2etch1) stable-security; urgency=high * Non-maintainer upload by The Security Team. * Fix an off-by-one error in handling filenames. [CVE-2007-4091] stable/main/binary-powerpc/rsync_2.6.9-2etch1_powerpc.deb rsync (2.6.9-2etch1) stable-security; urgency=high * Non-maintainer upload by The Security Team. * Fix an off-by-one error in handling filenames. [CVE-2007-4091] stable/main/binary-s390/rsync_2.6.9-2etch1_s390.deb rsync (2.6.9-2etch1) stable-security; urgency=high * Non-maintainer upload by The Security Team. * Fix an off-by-one error in handling filenames. [CVE-2007-4091] stable/main/binary-sparc/rsync_2.6.9-2etch1_sparc.deb rsync (2.6.9-2etch1) stable-security; urgency=high * Non-maintainer upload by The Security Team. * Fix an off-by-one error in handling filenames. [CVE-2007-4091] stable/main/binary-alpha/ruby1.8_1.8.5-4etch1_alpha.deb stable/main/binary-alpha/libruby1.8_1.8.5-4etch1_alpha.deb stable/main/binary-alpha/libruby1.8-dbg_1.8.5-4etch1_alpha.deb stable/main/binary-alpha/ruby1.8-dev_1.8.5-4etch1_alpha.deb stable/main/binary-alpha/libdbm-ruby1.8_1.8.5-4etch1_alpha.deb stable/main/binary-alpha/libgdbm-ruby1.8_1.8.5-4etch1_alpha.deb stable/main/binary-alpha/libreadline-ruby1.8_1.8.5-4etch1_alpha.deb stable/main/binary-alpha/libtcltk-ruby1.8_1.8.5-4etch1_alpha.deb stable/main/binary-alpha/libopenssl-ruby1.8_1.8.5-4etch1_alpha.deb ruby1.8 (1.8.5-4etch1) stable-security; urgency=high * applied debian/patches/164_CVE-2007-5162.patch: - security fixes for CVE-2007-5162. - backported r13500, r13501 and r13657 from ruby_1_8 branch. (closes: #444929) stable/main/binary-amd64/ruby1.8_1.8.5-4etch1_amd64.deb stable/main/binary-amd64/libruby1.8_1.8.5-4etch1_amd64.deb stable/main/binary-amd64/libruby1.8-dbg_1.8.5-4etch1_amd64.deb stable/main/binary-amd64/ruby1.8-dev_1.8.5-4etch1_amd64.deb stable/main/binary-amd64/libdbm-ruby1.8_1.8.5-4etch1_amd64.deb stable/main/binary-amd64/libgdbm-ruby1.8_1.8.5-4etch1_amd64.deb stable/main/binary-amd64/libreadline-ruby1.8_1.8.5-4etch1_amd64.deb stable/main/binary-amd64/libtcltk-ruby1.8_1.8.5-4etch1_amd64.deb stable/main/binary-amd64/libopenssl-ruby1.8_1.8.5-4etch1_amd64.deb ruby1.8 (1.8.5-4etch1) stable-security; urgency=high * applied debian/patches/164_CVE-2007-5162.patch: - security fixes for CVE-2007-5162. - backported r13500, r13501 and r13657 from ruby_1_8 branch. (closes: #444929) stable/main/binary-arm/ruby1.8_1.8.5-4etch1_arm.deb stable/main/binary-arm/libruby1.8_1.8.5-4etch1_arm.deb stable/main/binary-arm/libruby1.8-dbg_1.8.5-4etch1_arm.deb stable/main/binary-arm/ruby1.8-dev_1.8.5-4etch1_arm.deb stable/main/binary-arm/libdbm-ruby1.8_1.8.5-4etch1_arm.deb stable/main/binary-arm/libgdbm-ruby1.8_1.8.5-4etch1_arm.deb stable/main/binary-arm/libreadline-ruby1.8_1.8.5-4etch1_arm.deb stable/main/binary-arm/libtcltk-ruby1.8_1.8.5-4etch1_arm.deb stable/main/binary-arm/libopenssl-ruby1.8_1.8.5-4etch1_arm.deb ruby1.8 (1.8.5-4etch1) stable-security; urgency=high * applied debian/patches/164_CVE-2007-5162.patch: - security fixes for CVE-2007-5162. - backported r13500, r13501 and r13657 from ruby_1_8 branch. (closes: #444929) stable/main/binary-hppa/ruby1.8_1.8.5-4etch1_hppa.deb stable/main/binary-hppa/libruby1.8_1.8.5-4etch1_hppa.deb stable/main/binary-hppa/libruby1.8-dbg_1.8.5-4etch1_hppa.deb stable/main/binary-hppa/ruby1.8-dev_1.8.5-4etch1_hppa.deb stable/main/binary-hppa/libdbm-ruby1.8_1.8.5-4etch1_hppa.deb stable/main/binary-hppa/libgdbm-ruby1.8_1.8.5-4etch1_hppa.deb stable/main/binary-hppa/libreadline-ruby1.8_1.8.5-4etch1_hppa.deb stable/main/binary-hppa/libtcltk-ruby1.8_1.8.5-4etch1_hppa.deb stable/main/binary-hppa/libopenssl-ruby1.8_1.8.5-4etch1_hppa.deb ruby1.8 (1.8.5-4etch1) stable-security; urgency=high * applied debian/patches/164_CVE-2007-5162.patch: - security fixes for CVE-2007-5162. - backported r13500, r13501 and r13657 from ruby_1_8 branch. (closes: #444929) stable/main/source/ruby1.8_1.8.5-4etch1.dsc stable/main/source/ruby1.8_1.8.5.orig.tar.gz stable/main/source/ruby1.8_1.8.5-4etch1.diff.gz stable/main/binary-i386/ruby1.8_1.8.5-4etch1_i386.deb stable/main/binary-i386/libruby1.8_1.8.5-4etch1_i386.deb stable/main/binary-i386/libruby1.8-dbg_1.8.5-4etch1_i386.deb stable/main/binary-i386/ruby1.8-dev_1.8.5-4etch1_i386.deb stable/main/binary-i386/libdbm-ruby1.8_1.8.5-4etch1_i386.deb stable/main/binary-i386/libgdbm-ruby1.8_1.8.5-4etch1_i386.deb stable/main/binary-i386/libreadline-ruby1.8_1.8.5-4etch1_i386.deb stable/main/binary-i386/libtcltk-ruby1.8_1.8.5-4etch1_i386.deb stable/main/binary-i386/libopenssl-ruby1.8_1.8.5-4etch1_i386.deb stable/main/binary-all/ruby1.8-examples_1.8.5-4etch1_all.deb stable/main/binary-all/ruby1.8-elisp_1.8.5-4etch1_all.deb stable/main/binary-all/ri1.8_1.8.5-4etch1_all.deb stable/main/binary-all/rdoc1.8_1.8.5-4etch1_all.deb stable/main/binary-all/irb1.8_1.8.5-4etch1_all.deb ruby1.8 (1.8.5-4etch1) stable-security; urgency=high * applied debian/patches/164_CVE-2007-5162.patch: - security fixes for CVE-2007-5162. - backported r13500, r13501 and r13657 from ruby_1_8 branch. (closes: #444929) stable/main/binary-ia64/ruby1.8_1.8.5-4etch1_ia64.deb stable/main/binary-ia64/libruby1.8_1.8.5-4etch1_ia64.deb stable/main/binary-ia64/libruby1.8-dbg_1.8.5-4etch1_ia64.deb stable/main/binary-ia64/ruby1.8-dev_1.8.5-4etch1_ia64.deb stable/main/binary-ia64/libdbm-ruby1.8_1.8.5-4etch1_ia64.deb stable/main/binary-ia64/libgdbm-ruby1.8_1.8.5-4etch1_ia64.deb stable/main/binary-ia64/libreadline-ruby1.8_1.8.5-4etch1_ia64.deb stable/main/binary-ia64/libtcltk-ruby1.8_1.8.5-4etch1_ia64.deb stable/main/binary-ia64/libopenssl-ruby1.8_1.8.5-4etch1_ia64.deb ruby1.8 (1.8.5-4etch1) stable-security; urgency=high * applied debian/patches/164_CVE-2007-5162.patch: - security fixes for CVE-2007-5162. - backported r13500, r13501 and r13657 from ruby_1_8 branch. (closes: #444929) stable/main/binary-mips/ruby1.8_1.8.5-4etch1_mips.deb stable/main/binary-mips/libruby1.8_1.8.5-4etch1_mips.deb stable/main/binary-mips/libruby1.8-dbg_1.8.5-4etch1_mips.deb stable/main/binary-mips/ruby1.8-dev_1.8.5-4etch1_mips.deb stable/main/binary-mips/libdbm-ruby1.8_1.8.5-4etch1_mips.deb stable/main/binary-mips/libgdbm-ruby1.8_1.8.5-4etch1_mips.deb stable/main/binary-mips/libreadline-ruby1.8_1.8.5-4etch1_mips.deb stable/main/binary-mips/libtcltk-ruby1.8_1.8.5-4etch1_mips.deb stable/main/binary-mips/libopenssl-ruby1.8_1.8.5-4etch1_mips.deb ruby1.8 (1.8.5-4etch1) stable-security; urgency=high * applied debian/patches/164_CVE-2007-5162.patch: - security fixes for CVE-2007-5162. - backported r13500, r13501 and r13657 from ruby_1_8 branch. (closes: #444929) stable/main/binary-mipsel/ruby1.8_1.8.5-4etch1_mipsel.deb stable/main/binary-mipsel/libruby1.8_1.8.5-4etch1_mipsel.deb stable/main/binary-mipsel/libruby1.8-dbg_1.8.5-4etch1_mipsel.deb stable/main/binary-mipsel/ruby1.8-dev_1.8.5-4etch1_mipsel.deb stable/main/binary-mipsel/libdbm-ruby1.8_1.8.5-4etch1_mipsel.deb stable/main/binary-mipsel/libgdbm-ruby1.8_1.8.5-4etch1_mipsel.deb stable/main/binary-mipsel/libreadline-ruby1.8_1.8.5-4etch1_mipsel.deb stable/main/binary-mipsel/libtcltk-ruby1.8_1.8.5-4etch1_mipsel.deb stable/main/binary-mipsel/libopenssl-ruby1.8_1.8.5-4etch1_mipsel.deb ruby1.8 (1.8.5-4etch1) stable-security; urgency=high * applied debian/patches/164_CVE-2007-5162.patch: - security fixes for CVE-2007-5162. - backported r13500, r13501 and r13657 from ruby_1_8 branch. (closes: #444929) stable/main/binary-powerpc/ruby1.8_1.8.5-4etch1_powerpc.deb stable/main/binary-powerpc/libruby1.8_1.8.5-4etch1_powerpc.deb stable/main/binary-powerpc/libruby1.8-dbg_1.8.5-4etch1_powerpc.deb stable/main/binary-powerpc/ruby1.8-dev_1.8.5-4etch1_powerpc.deb stable/main/binary-powerpc/libdbm-ruby1.8_1.8.5-4etch1_powerpc.deb stable/main/binary-powerpc/libgdbm-ruby1.8_1.8.5-4etch1_powerpc.deb stable/main/binary-powerpc/libreadline-ruby1.8_1.8.5-4etch1_powerpc.deb stable/main/binary-powerpc/libtcltk-ruby1.8_1.8.5-4etch1_powerpc.deb stable/main/binary-powerpc/libopenssl-ruby1.8_1.8.5-4etch1_powerpc.deb ruby1.8 (1.8.5-4etch1) stable-security; urgency=high * applied debian/patches/164_CVE-2007-5162.patch: - security fixes for CVE-2007-5162. - backported r13500, r13501 and r13657 from ruby_1_8 branch. (closes: #444929) stable/main/binary-s390/ruby1.8_1.8.5-4etch1_s390.deb stable/main/binary-s390/libruby1.8_1.8.5-4etch1_s390.deb stable/main/binary-s390/libruby1.8-dbg_1.8.5-4etch1_s390.deb stable/main/binary-s390/ruby1.8-dev_1.8.5-4etch1_s390.deb stable/main/binary-s390/libdbm-ruby1.8_1.8.5-4etch1_s390.deb stable/main/binary-s390/libgdbm-ruby1.8_1.8.5-4etch1_s390.deb stable/main/binary-s390/libreadline-ruby1.8_1.8.5-4etch1_s390.deb stable/main/binary-s390/libtcltk-ruby1.8_1.8.5-4etch1_s390.deb stable/main/binary-s390/libopenssl-ruby1.8_1.8.5-4etch1_s390.deb ruby1.8 (1.8.5-4etch1) stable-security; urgency=high * applied debian/patches/164_CVE-2007-5162.patch: - security fixes for CVE-2007-5162. - backported r13500, r13501 and r13657 from ruby_1_8 branch. (closes: #444929) stable/main/binary-sparc/ruby1.8_1.8.5-4etch1_sparc.deb stable/main/binary-sparc/libruby1.8_1.8.5-4etch1_sparc.deb stable/main/binary-sparc/libruby1.8-dbg_1.8.5-4etch1_sparc.deb stable/main/binary-sparc/ruby1.8-dev_1.8.5-4etch1_sparc.deb stable/main/binary-sparc/libdbm-ruby1.8_1.8.5-4etch1_sparc.deb stable/main/binary-sparc/libgdbm-ruby1.8_1.8.5-4etch1_sparc.deb stable/main/binary-sparc/libreadline-ruby1.8_1.8.5-4etch1_sparc.deb stable/main/binary-sparc/libtcltk-ruby1.8_1.8.5-4etch1_sparc.deb stable/main/binary-sparc/libopenssl-ruby1.8_1.8.5-4etch1_sparc.deb ruby1.8 (1.8.5-4etch1) stable-security; urgency=high * applied debian/patches/164_CVE-2007-5162.patch: - security fixes for CVE-2007-5162. - backported r13500, r13501 and r13657 from ruby_1_8 branch. (closes: #444929) stable/main/binary-alpha/ruby1.9_1.9.0+20060609-1etch1_alpha.deb stable/main/binary-alpha/libruby1.9_1.9.0+20060609-1etch1_alpha.deb stable/main/binary-alpha/libruby1.9-dbg_1.9.0+20060609-1etch1_alpha.deb stable/main/binary-alpha/ruby1.9-dev_1.9.0+20060609-1etch1_alpha.deb stable/main/binary-alpha/libdbm-ruby1.9_1.9.0+20060609-1etch1_alpha.deb stable/main/binary-alpha/libgdbm-ruby1.9_1.9.0+20060609-1etch1_alpha.deb stable/main/binary-alpha/libreadline-ruby1.9_1.9.0+20060609-1etch1_alpha.deb stable/main/binary-alpha/libtcltk-ruby1.9_1.9.0+20060609-1etch1_alpha.deb stable/main/binary-alpha/libopenssl-ruby1.9_1.9.0+20060609-1etch1_alpha.deb ruby1.9 (1.9.0+20060609-1etch1) stable-security; urgency=high * applied debian/patches/164_CVE-2007-5162.patch: - security fixes for CVE-2007-5162. - bacported r13656, r13499 and r13501 from trunk. stable/main/binary-amd64/ruby1.9_1.9.0+20060609-1etch1_amd64.deb stable/main/binary-amd64/libruby1.9_1.9.0+20060609-1etch1_amd64.deb stable/main/binary-amd64/libruby1.9-dbg_1.9.0+20060609-1etch1_amd64.deb stable/main/binary-amd64/ruby1.9-dev_1.9.0+20060609-1etch1_amd64.deb stable/main/binary-amd64/libdbm-ruby1.9_1.9.0+20060609-1etch1_amd64.deb stable/main/binary-amd64/libgdbm-ruby1.9_1.9.0+20060609-1etch1_amd64.deb stable/main/binary-amd64/libreadline-ruby1.9_1.9.0+20060609-1etch1_amd64.deb stable/main/binary-amd64/libtcltk-ruby1.9_1.9.0+20060609-1etch1_amd64.deb stable/main/binary-amd64/libopenssl-ruby1.9_1.9.0+20060609-1etch1_amd64.deb ruby1.9 (1.9.0+20060609-1etch1) stable-security; urgency=high * applied debian/patches/164_CVE-2007-5162.patch: - security fixes for CVE-2007-5162. - bacported r13656, r13499 and r13501 from trunk. stable/main/binary-arm/ruby1.9_1.9.0+20060609-1etch1_arm.deb stable/main/binary-arm/libruby1.9_1.9.0+20060609-1etch1_arm.deb stable/main/binary-arm/libruby1.9-dbg_1.9.0+20060609-1etch1_arm.deb stable/main/binary-arm/ruby1.9-dev_1.9.0+20060609-1etch1_arm.deb stable/main/binary-arm/libdbm-ruby1.9_1.9.0+20060609-1etch1_arm.deb stable/main/binary-arm/libgdbm-ruby1.9_1.9.0+20060609-1etch1_arm.deb stable/main/binary-arm/libreadline-ruby1.9_1.9.0+20060609-1etch1_arm.deb stable/main/binary-arm/libtcltk-ruby1.9_1.9.0+20060609-1etch1_arm.deb stable/main/binary-arm/libopenssl-ruby1.9_1.9.0+20060609-1etch1_arm.deb ruby1.9 (1.9.0+20060609-1etch1) stable-security; urgency=high * applied debian/patches/164_CVE-2007-5162.patch: - security fixes for CVE-2007-5162. - bacported r13656, r13499 and r13501 from trunk. stable/main/binary-hppa/ruby1.9_1.9.0+20060609-1etch1_hppa.deb stable/main/binary-hppa/libruby1.9_1.9.0+20060609-1etch1_hppa.deb stable/main/binary-hppa/libruby1.9-dbg_1.9.0+20060609-1etch1_hppa.deb stable/main/binary-hppa/ruby1.9-dev_1.9.0+20060609-1etch1_hppa.deb stable/main/binary-hppa/libdbm-ruby1.9_1.9.0+20060609-1etch1_hppa.deb stable/main/binary-hppa/libgdbm-ruby1.9_1.9.0+20060609-1etch1_hppa.deb stable/main/binary-hppa/libreadline-ruby1.9_1.9.0+20060609-1etch1_hppa.deb stable/main/binary-hppa/libtcltk-ruby1.9_1.9.0+20060609-1etch1_hppa.deb stable/main/binary-hppa/libopenssl-ruby1.9_1.9.0+20060609-1etch1_hppa.deb ruby1.9 (1.9.0+20060609-1etch1) stable-security; urgency=high * applied debian/patches/164_CVE-2007-5162.patch: - security fixes for CVE-2007-5162. - bacported r13656, r13499 and r13501 from trunk. stable/main/source/ruby1.9_1.9.0+20060609-1etch1.dsc stable/main/source/ruby1.9_1.9.0+20060609.orig.tar.gz stable/main/source/ruby1.9_1.9.0+20060609-1etch1.diff.gz stable/main/binary-all/ruby1.9-examples_1.9.0+20060609-1etch1_all.deb stable/main/binary-all/ruby1.9-elisp_1.9.0+20060609-1etch1_all.deb stable/main/binary-all/ri1.9_1.9.0+20060609-1etch1_all.deb stable/main/binary-all/rdoc1.9_1.9.0+20060609-1etch1_all.deb stable/main/binary-all/irb1.9_1.9.0+20060609-1etch1_all.deb stable/main/binary-i386/ruby1.9_1.9.0+20060609-1etch1_i386.deb stable/main/binary-i386/libruby1.9_1.9.0+20060609-1etch1_i386.deb stable/main/binary-i386/libruby1.9-dbg_1.9.0+20060609-1etch1_i386.deb stable/main/binary-i386/ruby1.9-dev_1.9.0+20060609-1etch1_i386.deb stable/main/binary-i386/libdbm-ruby1.9_1.9.0+20060609-1etch1_i386.deb stable/main/binary-i386/libgdbm-ruby1.9_1.9.0+20060609-1etch1_i386.deb stable/main/binary-i386/libreadline-ruby1.9_1.9.0+20060609-1etch1_i386.deb stable/main/binary-i386/libtcltk-ruby1.9_1.9.0+20060609-1etch1_i386.deb stable/main/binary-i386/libopenssl-ruby1.9_1.9.0+20060609-1etch1_i386.deb ruby1.9 (1.9.0+20060609-1etch1) stable-security; urgency=high * applied debian/patches/164_CVE-2007-5162.patch: - security fixes for CVE-2007-5162. - bacported r13656, r13499 and r13501 from trunk. stable/main/binary-ia64/ruby1.9_1.9.0+20060609-1etch1_ia64.deb stable/main/binary-ia64/libruby1.9_1.9.0+20060609-1etch1_ia64.deb stable/main/binary-ia64/libruby1.9-dbg_1.9.0+20060609-1etch1_ia64.deb stable/main/binary-ia64/ruby1.9-dev_1.9.0+20060609-1etch1_ia64.deb stable/main/binary-ia64/libdbm-ruby1.9_1.9.0+20060609-1etch1_ia64.deb stable/main/binary-ia64/libgdbm-ruby1.9_1.9.0+20060609-1etch1_ia64.deb stable/main/binary-ia64/libreadline-ruby1.9_1.9.0+20060609-1etch1_ia64.deb stable/main/binary-ia64/libtcltk-ruby1.9_1.9.0+20060609-1etch1_ia64.deb stable/main/binary-ia64/libopenssl-ruby1.9_1.9.0+20060609-1etch1_ia64.deb ruby1.9 (1.9.0+20060609-1etch1) stable-security; urgency=high * applied debian/patches/164_CVE-2007-5162.patch: - security fixes for CVE-2007-5162. - bacported r13656, r13499 and r13501 from trunk. stable/main/binary-mips/ruby1.9_1.9.0+20060609-1etch1_mips.deb stable/main/binary-mips/libruby1.9_1.9.0+20060609-1etch1_mips.deb stable/main/binary-mips/libruby1.9-dbg_1.9.0+20060609-1etch1_mips.deb stable/main/binary-mips/ruby1.9-dev_1.9.0+20060609-1etch1_mips.deb stable/main/binary-mips/libdbm-ruby1.9_1.9.0+20060609-1etch1_mips.deb stable/main/binary-mips/libgdbm-ruby1.9_1.9.0+20060609-1etch1_mips.deb stable/main/binary-mips/libreadline-ruby1.9_1.9.0+20060609-1etch1_mips.deb stable/main/binary-mips/libtcltk-ruby1.9_1.9.0+20060609-1etch1_mips.deb stable/main/binary-mips/libopenssl-ruby1.9_1.9.0+20060609-1etch1_mips.deb ruby1.9 (1.9.0+20060609-1etch1) stable-security; urgency=high * applied debian/patches/164_CVE-2007-5162.patch: - security fixes for CVE-2007-5162. - bacported r13656, r13499 and r13501 from trunk. stable/main/binary-mipsel/ruby1.9_1.9.0+20060609-1etch1_mipsel.deb stable/main/binary-mipsel/libruby1.9_1.9.0+20060609-1etch1_mipsel.deb stable/main/binary-mipsel/libruby1.9-dbg_1.9.0+20060609-1etch1_mipsel.deb stable/main/binary-mipsel/ruby1.9-dev_1.9.0+20060609-1etch1_mipsel.deb stable/main/binary-mipsel/libdbm-ruby1.9_1.9.0+20060609-1etch1_mipsel.deb stable/main/binary-mipsel/libgdbm-ruby1.9_1.9.0+20060609-1etch1_mipsel.deb stable/main/binary-mipsel/libreadline-ruby1.9_1.9.0+20060609-1etch1_mipsel.deb stable/main/binary-mipsel/libtcltk-ruby1.9_1.9.0+20060609-1etch1_mipsel.deb stable/main/binary-mipsel/libopenssl-ruby1.9_1.9.0+20060609-1etch1_mipsel.deb ruby1.9 (1.9.0+20060609-1etch1) stable-security; urgency=high * applied debian/patches/164_CVE-2007-5162.patch: - security fixes for CVE-2007-5162. - bacported r13656, r13499 and r13501 from trunk. stable/main/binary-powerpc/ruby1.9_1.9.0+20060609-1etch1_powerpc.deb stable/main/binary-powerpc/libruby1.9_1.9.0+20060609-1etch1_powerpc.deb stable/main/binary-powerpc/libruby1.9-dbg_1.9.0+20060609-1etch1_powerpc.deb stable/main/binary-powerpc/ruby1.9-dev_1.9.0+20060609-1etch1_powerpc.deb stable/main/binary-powerpc/libdbm-ruby1.9_1.9.0+20060609-1etch1_powerpc.deb stable/main/binary-powerpc/libgdbm-ruby1.9_1.9.0+20060609-1etch1_powerpc.deb stable/main/binary-powerpc/libreadline-ruby1.9_1.9.0+20060609-1etch1_powerpc.deb stable/main/binary-powerpc/libtcltk-ruby1.9_1.9.0+20060609-1etch1_powerpc.deb stable/main/binary-powerpc/libopenssl-ruby1.9_1.9.0+20060609-1etch1_powerpc.deb ruby1.9 (1.9.0+20060609-1etch1) stable-security; urgency=high * applied debian/patches/164_CVE-2007-5162.patch: - security fixes for CVE-2007-5162. - bacported r13656, r13499 and r13501 from trunk. stable/main/binary-s390/ruby1.9_1.9.0+20060609-1etch1_s390.deb stable/main/binary-s390/libruby1.9_1.9.0+20060609-1etch1_s390.deb stable/main/binary-s390/libruby1.9-dbg_1.9.0+20060609-1etch1_s390.deb stable/main/binary-s390/ruby1.9-dev_1.9.0+20060609-1etch1_s390.deb stable/main/binary-s390/libdbm-ruby1.9_1.9.0+20060609-1etch1_s390.deb stable/main/binary-s390/libgdbm-ruby1.9_1.9.0+20060609-1etch1_s390.deb stable/main/binary-s390/libreadline-ruby1.9_1.9.0+20060609-1etch1_s390.deb stable/main/binary-s390/libtcltk-ruby1.9_1.9.0+20060609-1etch1_s390.deb stable/main/binary-s390/libopenssl-ruby1.9_1.9.0+20060609-1etch1_s390.deb ruby1.9 (1.9.0+20060609-1etch1) stable-security; urgency=high * applied debian/patches/164_CVE-2007-5162.patch: - security fixes for CVE-2007-5162. - bacported r13656, r13499 and r13501 from trunk. stable/main/binary-sparc/ruby1.9_1.9.0+20060609-1etch1_sparc.deb stable/main/binary-sparc/libruby1.9_1.9.0+20060609-1etch1_sparc.deb stable/main/binary-sparc/libruby1.9-dbg_1.9.0+20060609-1etch1_sparc.deb stable/main/binary-sparc/ruby1.9-dev_1.9.0+20060609-1etch1_sparc.deb stable/main/binary-sparc/libdbm-ruby1.9_1.9.0+20060609-1etch1_sparc.deb stable/main/binary-sparc/libgdbm-ruby1.9_1.9.0+20060609-1etch1_sparc.deb stable/main/binary-sparc/libreadline-ruby1.9_1.9.0+20060609-1etch1_sparc.deb stable/main/binary-sparc/libtcltk-ruby1.9_1.9.0+20060609-1etch1_sparc.deb stable/main/binary-sparc/libopenssl-ruby1.9_1.9.0+20060609-1etch1_sparc.deb ruby1.9 (1.9.0+20060609-1etch1) stable-security; urgency=high * applied debian/patches/164_CVE-2007-5162.patch: - security fixes for CVE-2007-5162. - bacported r13656, r13499 and r13501 from trunk. stable/main/binary-alpha/libglib2-ruby_0.15.0-1.1etch1_alpha.deb stable/main/binary-alpha/libatk1-ruby_0.15.0-1.1etch1_alpha.deb stable/main/binary-alpha/libpango1-ruby_0.15.0-1.1etch1_alpha.deb stable/main/binary-alpha/libgdk-pixbuf2-ruby_0.15.0-1.1etch1_alpha.deb stable/main/binary-alpha/libgtk2-ruby_0.15.0-1.1etch1_alpha.deb stable/main/binary-alpha/libart2-ruby_0.15.0-1.1etch1_alpha.deb stable/main/binary-alpha/libgnomecanvas2-ruby_0.15.0-1.1etch1_alpha.deb stable/main/binary-alpha/libgnome2-ruby_0.15.0-1.1etch1_alpha.deb stable/main/binary-alpha/libgconf2-ruby_0.15.0-1.1etch1_alpha.deb stable/main/binary-alpha/libglade2-ruby_0.15.0-1.1etch1_alpha.deb stable/main/binary-alpha/libgtkhtml2-ruby_0.15.0-1.1etch1_alpha.deb stable/main/binary-alpha/libgda2-ruby_0.15.0-1.1etch1_alpha.deb stable/main/binary-alpha/libgtkglext1-ruby_0.15.0-1.1etch1_alpha.deb stable/main/binary-alpha/libgnomevfs2-ruby_0.15.0-1.1etch1_alpha.deb stable/main/binary-alpha/libgstreamer0.8-ruby_0.15.0-1.1etch1_alpha.deb stable/main/binary-alpha/libgtksourceview1-ruby_0.15.0-1.1etch1_alpha.deb stable/main/binary-alpha/libpanel-applet2-ruby_0.15.0-1.1etch1_alpha.deb stable/main/binary-alpha/libgnomeprint2-ruby_0.15.0-1.1etch1_alpha.deb stable/main/binary-alpha/libgnomeprintui2-ruby_0.15.0-1.1etch1_alpha.deb stable/main/binary-alpha/librsvg2-ruby_0.15.0-1.1etch1_alpha.deb stable/main/binary-alpha/libgtk-mozembed-ruby_0.15.0-1.1etch1_alpha.deb stable/main/binary-alpha/libvte-ruby_0.15.0-1.1etch1_alpha.deb ruby-gnome2 (0.15.0-1.1etch1) stable-security; urgency=high * Non-maintainer upload by the security team * Included CVE-2007-6183.patch to fix format string vulnerability in rbgtkmessagedialog.c which might lead to arbitrary code execution Fixes: CVE-2007-6183 stable/main/binary-amd64/libglib2-ruby_0.15.0-1.1etch1_amd64.deb stable/main/binary-amd64/libatk1-ruby_0.15.0-1.1etch1_amd64.deb stable/main/binary-amd64/libpango1-ruby_0.15.0-1.1etch1_amd64.deb stable/main/binary-amd64/libgdk-pixbuf2-ruby_0.15.0-1.1etch1_amd64.deb stable/main/binary-amd64/libgtk2-ruby_0.15.0-1.1etch1_amd64.deb stable/main/binary-amd64/libart2-ruby_0.15.0-1.1etch1_amd64.deb stable/main/binary-amd64/libgnomecanvas2-ruby_0.15.0-1.1etch1_amd64.deb stable/main/binary-amd64/libgnome2-ruby_0.15.0-1.1etch1_amd64.deb stable/main/binary-amd64/libgconf2-ruby_0.15.0-1.1etch1_amd64.deb stable/main/binary-amd64/libglade2-ruby_0.15.0-1.1etch1_amd64.deb stable/main/binary-amd64/libgtkhtml2-ruby_0.15.0-1.1etch1_amd64.deb stable/main/binary-amd64/libgda2-ruby_0.15.0-1.1etch1_amd64.deb stable/main/binary-amd64/libgtkglext1-ruby_0.15.0-1.1etch1_amd64.deb stable/main/binary-amd64/libgnomevfs2-ruby_0.15.0-1.1etch1_amd64.deb stable/main/binary-amd64/libgstreamer0.8-ruby_0.15.0-1.1etch1_amd64.deb stable/main/binary-amd64/libgtksourceview1-ruby_0.15.0-1.1etch1_amd64.deb stable/main/binary-amd64/libpanel-applet2-ruby_0.15.0-1.1etch1_amd64.deb stable/main/binary-amd64/libgnomeprint2-ruby_0.15.0-1.1etch1_amd64.deb stable/main/binary-amd64/libgnomeprintui2-ruby_0.15.0-1.1etch1_amd64.deb stable/main/binary-amd64/librsvg2-ruby_0.15.0-1.1etch1_amd64.deb stable/main/binary-amd64/libgtk-mozembed-ruby_0.15.0-1.1etch1_amd64.deb stable/main/binary-amd64/libvte-ruby_0.15.0-1.1etch1_amd64.deb ruby-gnome2 (0.15.0-1.1etch1) stable-security; urgency=high * Non-maintainer upload by the security team * Included CVE-2007-6183.patch to fix format string vulnerability in rbgtkmessagedialog.c which might lead to arbitrary code execution Fixes: CVE-2007-6183 stable/main/binary-arm/libglib2-ruby_0.15.0-1.1etch1_arm.deb stable/main/binary-arm/libatk1-ruby_0.15.0-1.1etch1_arm.deb stable/main/binary-arm/libpango1-ruby_0.15.0-1.1etch1_arm.deb stable/main/binary-arm/libgdk-pixbuf2-ruby_0.15.0-1.1etch1_arm.deb stable/main/binary-arm/libgtk2-ruby_0.15.0-1.1etch1_arm.deb stable/main/binary-arm/libart2-ruby_0.15.0-1.1etch1_arm.deb stable/main/binary-arm/libgnomecanvas2-ruby_0.15.0-1.1etch1_arm.deb stable/main/binary-arm/libgnome2-ruby_0.15.0-1.1etch1_arm.deb stable/main/binary-arm/libgconf2-ruby_0.15.0-1.1etch1_arm.deb stable/main/binary-arm/libglade2-ruby_0.15.0-1.1etch1_arm.deb stable/main/binary-arm/libgtkhtml2-ruby_0.15.0-1.1etch1_arm.deb stable/main/binary-arm/libgda2-ruby_0.15.0-1.1etch1_arm.deb stable/main/binary-arm/libgtkglext1-ruby_0.15.0-1.1etch1_arm.deb stable/main/binary-arm/libgnomevfs2-ruby_0.15.0-1.1etch1_arm.deb stable/main/binary-arm/libgstreamer0.8-ruby_0.15.0-1.1etch1_arm.deb stable/main/binary-arm/libgtksourceview1-ruby_0.15.0-1.1etch1_arm.deb stable/main/binary-arm/libpanel-applet2-ruby_0.15.0-1.1etch1_arm.deb stable/main/binary-arm/libgnomeprint2-ruby_0.15.0-1.1etch1_arm.deb stable/main/binary-arm/libgnomeprintui2-ruby_0.15.0-1.1etch1_arm.deb stable/main/binary-arm/librsvg2-ruby_0.15.0-1.1etch1_arm.deb stable/main/binary-arm/libgtk-mozembed-ruby_0.15.0-1.1etch1_arm.deb stable/main/binary-arm/libvte-ruby_0.15.0-1.1etch1_arm.deb ruby-gnome2 (0.15.0-1.1etch1) stable-security; urgency=high * Non-maintainer upload by the security team * Included CVE-2007-6183.patch to fix format string vulnerability in rbgtkmessagedialog.c which might lead to arbitrary code execution Fixes: CVE-2007-6183 stable/main/binary-hppa/libglib2-ruby_0.15.0-1.1etch1_hppa.deb stable/main/binary-hppa/libatk1-ruby_0.15.0-1.1etch1_hppa.deb stable/main/binary-hppa/libpango1-ruby_0.15.0-1.1etch1_hppa.deb stable/main/binary-hppa/libgdk-pixbuf2-ruby_0.15.0-1.1etch1_hppa.deb stable/main/binary-hppa/libgtk2-ruby_0.15.0-1.1etch1_hppa.deb stable/main/binary-hppa/libart2-ruby_0.15.0-1.1etch1_hppa.deb stable/main/binary-hppa/libgnomecanvas2-ruby_0.15.0-1.1etch1_hppa.deb stable/main/binary-hppa/libgnome2-ruby_0.15.0-1.1etch1_hppa.deb stable/main/binary-hppa/libgconf2-ruby_0.15.0-1.1etch1_hppa.deb stable/main/binary-hppa/libglade2-ruby_0.15.0-1.1etch1_hppa.deb stable/main/binary-hppa/libgtkhtml2-ruby_0.15.0-1.1etch1_hppa.deb stable/main/binary-hppa/libgda2-ruby_0.15.0-1.1etch1_hppa.deb stable/main/binary-hppa/libgtkglext1-ruby_0.15.0-1.1etch1_hppa.deb stable/main/binary-hppa/libgnomevfs2-ruby_0.15.0-1.1etch1_hppa.deb stable/main/binary-hppa/libgstreamer0.8-ruby_0.15.0-1.1etch1_hppa.deb stable/main/binary-hppa/libgtksourceview1-ruby_0.15.0-1.1etch1_hppa.deb stable/main/binary-hppa/libpanel-applet2-ruby_0.15.0-1.1etch1_hppa.deb stable/main/binary-hppa/libgnomeprint2-ruby_0.15.0-1.1etch1_hppa.deb stable/main/binary-hppa/libgnomeprintui2-ruby_0.15.0-1.1etch1_hppa.deb stable/main/binary-hppa/librsvg2-ruby_0.15.0-1.1etch1_hppa.deb stable/main/binary-hppa/libgtk-mozembed-ruby_0.15.0-1.1etch1_hppa.deb stable/main/binary-hppa/libvte-ruby_0.15.0-1.1etch1_hppa.deb ruby-gnome2 (0.15.0-1.1etch1) stable-security; urgency=high * Non-maintainer upload by the security team * Included CVE-2007-6183.patch to fix format string vulnerability in rbgtkmessagedialog.c which might lead to arbitrary code execution Fixes: CVE-2007-6183 stable/main/source/ruby-gnome2_0.15.0-1.1etch1.dsc stable/main/source/ruby-gnome2_0.15.0.orig.tar.gz stable/main/source/ruby-gnome2_0.15.0-1.1etch1.diff.gz stable/main/binary-all/ruby-gnome2_0.15.0-1.1etch1_all.deb stable/main/binary-i386/libglib2-ruby_0.15.0-1.1etch1_i386.deb stable/main/binary-i386/libatk1-ruby_0.15.0-1.1etch1_i386.deb stable/main/binary-i386/libpango1-ruby_0.15.0-1.1etch1_i386.deb stable/main/binary-i386/libgdk-pixbuf2-ruby_0.15.0-1.1etch1_i386.deb stable/main/binary-i386/libgtk2-ruby_0.15.0-1.1etch1_i386.deb stable/main/binary-i386/libart2-ruby_0.15.0-1.1etch1_i386.deb stable/main/binary-i386/libgnomecanvas2-ruby_0.15.0-1.1etch1_i386.deb stable/main/binary-i386/libgnome2-ruby_0.15.0-1.1etch1_i386.deb stable/main/binary-i386/libgconf2-ruby_0.15.0-1.1etch1_i386.deb stable/main/binary-i386/libglade2-ruby_0.15.0-1.1etch1_i386.deb stable/main/binary-i386/libgtkhtml2-ruby_0.15.0-1.1etch1_i386.deb stable/main/binary-i386/libgda2-ruby_0.15.0-1.1etch1_i386.deb stable/main/binary-i386/libgtkglext1-ruby_0.15.0-1.1etch1_i386.deb stable/main/binary-i386/libgnomevfs2-ruby_0.15.0-1.1etch1_i386.deb stable/main/binary-i386/libgstreamer0.8-ruby_0.15.0-1.1etch1_i386.deb stable/main/binary-i386/libgtksourceview1-ruby_0.15.0-1.1etch1_i386.deb stable/main/binary-i386/libpanel-applet2-ruby_0.15.0-1.1etch1_i386.deb stable/main/binary-i386/libgnomeprint2-ruby_0.15.0-1.1etch1_i386.deb stable/main/binary-i386/libgnomeprintui2-ruby_0.15.0-1.1etch1_i386.deb stable/main/binary-i386/librsvg2-ruby_0.15.0-1.1etch1_i386.deb stable/main/binary-i386/libgtk-mozembed-ruby_0.15.0-1.1etch1_i386.deb stable/main/binary-i386/libvte-ruby_0.15.0-1.1etch1_i386.deb ruby-gnome2 (0.15.0-1.1etch1) stable-security; urgency=high * Non-maintainer upload by the security team * Included CVE-2007-6183.patch to fix format string vulnerability in rbgtkmessagedialog.c which might lead to arbitrary code execution Fixes: CVE-2007-6183 stable/main/binary-ia64/libglib2-ruby_0.15.0-1.1etch1_ia64.deb stable/main/binary-ia64/libatk1-ruby_0.15.0-1.1etch1_ia64.deb stable/main/binary-ia64/libpango1-ruby_0.15.0-1.1etch1_ia64.deb stable/main/binary-ia64/libgdk-pixbuf2-ruby_0.15.0-1.1etch1_ia64.deb stable/main/binary-ia64/libgtk2-ruby_0.15.0-1.1etch1_ia64.deb stable/main/binary-ia64/libart2-ruby_0.15.0-1.1etch1_ia64.deb stable/main/binary-ia64/libgnomecanvas2-ruby_0.15.0-1.1etch1_ia64.deb stable/main/binary-ia64/libgnome2-ruby_0.15.0-1.1etch1_ia64.deb stable/main/binary-ia64/libgconf2-ruby_0.15.0-1.1etch1_ia64.deb stable/main/binary-ia64/libglade2-ruby_0.15.0-1.1etch1_ia64.deb stable/main/binary-ia64/libgtkhtml2-ruby_0.15.0-1.1etch1_ia64.deb stable/main/binary-ia64/libgda2-ruby_0.15.0-1.1etch1_ia64.deb stable/main/binary-ia64/libgtkglext1-ruby_0.15.0-1.1etch1_ia64.deb stable/main/binary-ia64/libgnomevfs2-ruby_0.15.0-1.1etch1_ia64.deb stable/main/binary-ia64/libgstreamer0.8-ruby_0.15.0-1.1etch1_ia64.deb stable/main/binary-ia64/libgtksourceview1-ruby_0.15.0-1.1etch1_ia64.deb stable/main/binary-ia64/libpanel-applet2-ruby_0.15.0-1.1etch1_ia64.deb stable/main/binary-ia64/libgnomeprint2-ruby_0.15.0-1.1etch1_ia64.deb stable/main/binary-ia64/libgnomeprintui2-ruby_0.15.0-1.1etch1_ia64.deb stable/main/binary-ia64/librsvg2-ruby_0.15.0-1.1etch1_ia64.deb stable/main/binary-ia64/libgtk-mozembed-ruby_0.15.0-1.1etch1_ia64.deb stable/main/binary-ia64/libvte-ruby_0.15.0-1.1etch1_ia64.deb ruby-gnome2 (0.15.0-1.1etch1) stable-security; urgency=high * Non-maintainer upload by the security team * Included CVE-2007-6183.patch to fix format string vulnerability in rbgtkmessagedialog.c which might lead to arbitrary code execution Fixes: CVE-2007-6183 stable/main/binary-mips/libglib2-ruby_0.15.0-1.1etch1_mips.deb stable/main/binary-mips/libatk1-ruby_0.15.0-1.1etch1_mips.deb stable/main/binary-mips/libpango1-ruby_0.15.0-1.1etch1_mips.deb stable/main/binary-mips/libgdk-pixbuf2-ruby_0.15.0-1.1etch1_mips.deb stable/main/binary-mips/libgtk2-ruby_0.15.0-1.1etch1_mips.deb stable/main/binary-mips/libart2-ruby_0.15.0-1.1etch1_mips.deb stable/main/binary-mips/libgnomecanvas2-ruby_0.15.0-1.1etch1_mips.deb stable/main/binary-mips/libgnome2-ruby_0.15.0-1.1etch1_mips.deb stable/main/binary-mips/libgconf2-ruby_0.15.0-1.1etch1_mips.deb stable/main/binary-mips/libglade2-ruby_0.15.0-1.1etch1_mips.deb stable/main/binary-mips/libgtkhtml2-ruby_0.15.0-1.1etch1_mips.deb stable/main/binary-mips/libgda2-ruby_0.15.0-1.1etch1_mips.deb stable/main/binary-mips/libgtkglext1-ruby_0.15.0-1.1etch1_mips.deb stable/main/binary-mips/libgnomevfs2-ruby_0.15.0-1.1etch1_mips.deb stable/main/binary-mips/libgstreamer0.8-ruby_0.15.0-1.1etch1_mips.deb stable/main/binary-mips/libgtksourceview1-ruby_0.15.0-1.1etch1_mips.deb stable/main/binary-mips/libpanel-applet2-ruby_0.15.0-1.1etch1_mips.deb stable/main/binary-mips/libgnomeprint2-ruby_0.15.0-1.1etch1_mips.deb stable/main/binary-mips/libgnomeprintui2-ruby_0.15.0-1.1etch1_mips.deb stable/main/binary-mips/librsvg2-ruby_0.15.0-1.1etch1_mips.deb stable/main/binary-mips/libgtk-mozembed-ruby_0.15.0-1.1etch1_mips.deb stable/main/binary-mips/libvte-ruby_0.15.0-1.1etch1_mips.deb ruby-gnome2 (0.15.0-1.1etch1) stable-security; urgency=high * Non-maintainer upload by the security team * Included CVE-2007-6183.patch to fix format string vulnerability in rbgtkmessagedialog.c which might lead to arbitrary code execution Fixes: CVE-2007-6183 stable/main/binary-mipsel/libglib2-ruby_0.15.0-1.1etch1_mipsel.deb stable/main/binary-mipsel/libatk1-ruby_0.15.0-1.1etch1_mipsel.deb stable/main/binary-mipsel/libpango1-ruby_0.15.0-1.1etch1_mipsel.deb stable/main/binary-mipsel/libgdk-pixbuf2-ruby_0.15.0-1.1etch1_mipsel.deb stable/main/binary-mipsel/libgtk2-ruby_0.15.0-1.1etch1_mipsel.deb stable/main/binary-mipsel/libart2-ruby_0.15.0-1.1etch1_mipsel.deb stable/main/binary-mipsel/libgnomecanvas2-ruby_0.15.0-1.1etch1_mipsel.deb stable/main/binary-mipsel/libgnome2-ruby_0.15.0-1.1etch1_mipsel.deb stable/main/binary-mipsel/libgconf2-ruby_0.15.0-1.1etch1_mipsel.deb stable/main/binary-mipsel/libglade2-ruby_0.15.0-1.1etch1_mipsel.deb stable/main/binary-mipsel/libgtkhtml2-ruby_0.15.0-1.1etch1_mipsel.deb stable/main/binary-mipsel/libgda2-ruby_0.15.0-1.1etch1_mipsel.deb stable/main/binary-mipsel/libgtkglext1-ruby_0.15.0-1.1etch1_mipsel.deb stable/main/binary-mipsel/libgnomevfs2-ruby_0.15.0-1.1etch1_mipsel.deb stable/main/binary-mipsel/libgstreamer0.8-ruby_0.15.0-1.1etch1_mipsel.deb stable/main/binary-mipsel/libgtksourceview1-ruby_0.15.0-1.1etch1_mipsel.deb stable/main/binary-mipsel/libpanel-applet2-ruby_0.15.0-1.1etch1_mipsel.deb stable/main/binary-mipsel/libgnomeprint2-ruby_0.15.0-1.1etch1_mipsel.deb stable/main/binary-mipsel/libgnomeprintui2-ruby_0.15.0-1.1etch1_mipsel.deb stable/main/binary-mipsel/librsvg2-ruby_0.15.0-1.1etch1_mipsel.deb stable/main/binary-mipsel/libgtk-mozembed-ruby_0.15.0-1.1etch1_mipsel.deb stable/main/binary-mipsel/libvte-ruby_0.15.0-1.1etch1_mipsel.deb ruby-gnome2 (0.15.0-1.1etch1) stable-security; urgency=high * Non-maintainer upload by the security team * Included CVE-2007-6183.patch to fix format string vulnerability in rbgtkmessagedialog.c which might lead to arbitrary code execution Fixes: CVE-2007-6183 stable/main/binary-powerpc/libglib2-ruby_0.15.0-1.1etch1_powerpc.deb stable/main/binary-powerpc/libatk1-ruby_0.15.0-1.1etch1_powerpc.deb stable/main/binary-powerpc/libpango1-ruby_0.15.0-1.1etch1_powerpc.deb stable/main/binary-powerpc/libgdk-pixbuf2-ruby_0.15.0-1.1etch1_powerpc.deb stable/main/binary-powerpc/libgtk2-ruby_0.15.0-1.1etch1_powerpc.deb stable/main/binary-powerpc/libart2-ruby_0.15.0-1.1etch1_powerpc.deb stable/main/binary-powerpc/libgnomecanvas2-ruby_0.15.0-1.1etch1_powerpc.deb stable/main/binary-powerpc/libgnome2-ruby_0.15.0-1.1etch1_powerpc.deb stable/main/binary-powerpc/libgconf2-ruby_0.15.0-1.1etch1_powerpc.deb stable/main/binary-powerpc/libglade2-ruby_0.15.0-1.1etch1_powerpc.deb stable/main/binary-powerpc/libgtkhtml2-ruby_0.15.0-1.1etch1_powerpc.deb stable/main/binary-powerpc/libgda2-ruby_0.15.0-1.1etch1_powerpc.deb stable/main/binary-powerpc/libgtkglext1-ruby_0.15.0-1.1etch1_powerpc.deb stable/main/binary-powerpc/libgnomevfs2-ruby_0.15.0-1.1etch1_powerpc.deb stable/main/binary-powerpc/libgstreamer0.8-ruby_0.15.0-1.1etch1_powerpc.deb stable/main/binary-powerpc/libgtksourceview1-ruby_0.15.0-1.1etch1_powerpc.deb stable/main/binary-powerpc/libpanel-applet2-ruby_0.15.0-1.1etch1_powerpc.deb stable/main/binary-powerpc/libgnomeprint2-ruby_0.15.0-1.1etch1_powerpc.deb stable/main/binary-powerpc/libgnomeprintui2-ruby_0.15.0-1.1etch1_powerpc.deb stable/main/binary-powerpc/librsvg2-ruby_0.15.0-1.1etch1_powerpc.deb stable/main/binary-powerpc/libgtk-mozembed-ruby_0.15.0-1.1etch1_powerpc.deb stable/main/binary-powerpc/libvte-ruby_0.15.0-1.1etch1_powerpc.deb ruby-gnome2 (0.15.0-1.1etch1) stable-security; urgency=high * Non-maintainer upload by the security team * Included CVE-2007-6183.patch to fix format string vulnerability in rbgtkmessagedialog.c which might lead to arbitrary code execution Fixes: CVE-2007-6183 stable/main/binary-s390/libglib2-ruby_0.15.0-1.1etch1_s390.deb stable/main/binary-s390/libatk1-ruby_0.15.0-1.1etch1_s390.deb stable/main/binary-s390/libpango1-ruby_0.15.0-1.1etch1_s390.deb stable/main/binary-s390/libgdk-pixbuf2-ruby_0.15.0-1.1etch1_s390.deb stable/main/binary-s390/libgtk2-ruby_0.15.0-1.1etch1_s390.deb stable/main/binary-s390/libart2-ruby_0.15.0-1.1etch1_s390.deb stable/main/binary-s390/libgnomecanvas2-ruby_0.15.0-1.1etch1_s390.deb stable/main/binary-s390/libgnome2-ruby_0.15.0-1.1etch1_s390.deb stable/main/binary-s390/libgconf2-ruby_0.15.0-1.1etch1_s390.deb stable/main/binary-s390/libglade2-ruby_0.15.0-1.1etch1_s390.deb stable/main/binary-s390/libgtkhtml2-ruby_0.15.0-1.1etch1_s390.deb stable/main/binary-s390/libgda2-ruby_0.15.0-1.1etch1_s390.deb stable/main/binary-s390/libgtkglext1-ruby_0.15.0-1.1etch1_s390.deb stable/main/binary-s390/libgnomevfs2-ruby_0.15.0-1.1etch1_s390.deb stable/main/binary-s390/libgstreamer0.8-ruby_0.15.0-1.1etch1_s390.deb stable/main/binary-s390/libgtksourceview1-ruby_0.15.0-1.1etch1_s390.deb stable/main/binary-s390/libpanel-applet2-ruby_0.15.0-1.1etch1_s390.deb stable/main/binary-s390/libgnomeprint2-ruby_0.15.0-1.1etch1_s390.deb stable/main/binary-s390/libgnomeprintui2-ruby_0.15.0-1.1etch1_s390.deb stable/main/binary-s390/librsvg2-ruby_0.15.0-1.1etch1_s390.deb stable/main/binary-s390/libgtk-mozembed-ruby_0.15.0-1.1etch1_s390.deb stable/main/binary-s390/libvte-ruby_0.15.0-1.1etch1_s390.deb ruby-gnome2 (0.15.0-1.1etch1) stable-security; urgency=high * Non-maintainer upload by the security team * Included CVE-2007-6183.patch to fix format string vulnerability in rbgtkmessagedialog.c which might lead to arbitrary code execution Fixes: CVE-2007-6183 stable/main/binary-sparc/libglib2-ruby_0.15.0-1.1etch1_sparc.deb stable/main/binary-sparc/libatk1-ruby_0.15.0-1.1etch1_sparc.deb stable/main/binary-sparc/libpango1-ruby_0.15.0-1.1etch1_sparc.deb stable/main/binary-sparc/libgdk-pixbuf2-ruby_0.15.0-1.1etch1_sparc.deb stable/main/binary-sparc/libgtk2-ruby_0.15.0-1.1etch1_sparc.deb stable/main/binary-sparc/libart2-ruby_0.15.0-1.1etch1_sparc.deb stable/main/binary-sparc/libgnomecanvas2-ruby_0.15.0-1.1etch1_sparc.deb stable/main/binary-sparc/libgnome2-ruby_0.15.0-1.1etch1_sparc.deb stable/main/binary-sparc/libgconf2-ruby_0.15.0-1.1etch1_sparc.deb stable/main/binary-sparc/libglade2-ruby_0.15.0-1.1etch1_sparc.deb stable/main/binary-sparc/libgtkhtml2-ruby_0.15.0-1.1etch1_sparc.deb stable/main/binary-sparc/libgda2-ruby_0.15.0-1.1etch1_sparc.deb stable/main/binary-sparc/libgtkglext1-ruby_0.15.0-1.1etch1_sparc.deb stable/main/binary-sparc/libgnomevfs2-ruby_0.15.0-1.1etch1_sparc.deb stable/main/binary-sparc/libgstreamer0.8-ruby_0.15.0-1.1etch1_sparc.deb stable/main/binary-sparc/libgtksourceview1-ruby_0.15.0-1.1etch1_sparc.deb stable/main/binary-sparc/libpanel-applet2-ruby_0.15.0-1.1etch1_sparc.deb stable/main/binary-sparc/libgnomeprint2-ruby_0.15.0-1.1etch1_sparc.deb stable/main/binary-sparc/libgnomeprintui2-ruby_0.15.0-1.1etch1_sparc.deb stable/main/binary-sparc/librsvg2-ruby_0.15.0-1.1etch1_sparc.deb stable/main/binary-sparc/libgtk-mozembed-ruby_0.15.0-1.1etch1_sparc.deb stable/main/binary-sparc/libvte-ruby_0.15.0-1.1etch1_sparc.deb ruby-gnome2 (0.15.0-1.1etch1) stable-security; urgency=high * Non-maintainer upload by the security team * Included CVE-2007-6183.patch to fix format string vulnerability in rbgtkmessagedialog.c which might lead to arbitrary code execution Fixes: CVE-2007-6183 stable/main/binary-alpha/samba_3.0.24-6etch9_alpha.deb stable/main/binary-alpha/samba-common_3.0.24-6etch9_alpha.deb stable/main/binary-alpha/smbclient_3.0.24-6etch9_alpha.deb stable/main/binary-alpha/swat_3.0.24-6etch9_alpha.deb stable/main/binary-alpha/smbfs_3.0.24-6etch9_alpha.deb stable/main/binary-alpha/libpam-smbpass_3.0.24-6etch9_alpha.deb stable/main/binary-alpha/libsmbclient_3.0.24-6etch9_alpha.deb stable/main/binary-alpha/libsmbclient-dev_3.0.24-6etch9_alpha.deb stable/main/binary-alpha/winbind_3.0.24-6etch9_alpha.deb stable/main/binary-alpha/python-samba_3.0.24-6etch9_alpha.deb stable/main/binary-alpha/samba-dbg_3.0.24-6etch9_alpha.deb samba (3.0.24-6etch9) stable-security; urgency=high * debian/patches/security-CVE-2007-6015.patch: fix a remote code execution vulnerability when running as a domain logon server (PDC or BDC). (CVE-2007-6015) stable/main/source/samba_3.0.24-6etch9.dsc stable/main/source/samba_3.0.24-6etch9.diff.gz stable/main/binary-all/samba-doc_3.0.24-6etch9_all.deb stable/main/binary-all/samba-doc-pdf_3.0.24-6etch9_all.deb stable/main/binary-amd64/samba_3.0.24-6etch9_amd64.deb stable/main/binary-amd64/samba-common_3.0.24-6etch9_amd64.deb stable/main/binary-amd64/smbclient_3.0.24-6etch9_amd64.deb stable/main/binary-amd64/swat_3.0.24-6etch9_amd64.deb stable/main/binary-amd64/smbfs_3.0.24-6etch9_amd64.deb stable/main/binary-amd64/libpam-smbpass_3.0.24-6etch9_amd64.deb stable/main/binary-amd64/libsmbclient_3.0.24-6etch9_amd64.deb stable/main/binary-amd64/libsmbclient-dev_3.0.24-6etch9_amd64.deb stable/main/binary-amd64/winbind_3.0.24-6etch9_amd64.deb stable/main/binary-amd64/python-samba_3.0.24-6etch9_amd64.deb stable/main/binary-amd64/samba-dbg_3.0.24-6etch9_amd64.deb samba (3.0.24-6etch9) stable-security; urgency=high * debian/patches/security-CVE-2007-6015.patch: fix a remote code execution vulnerability when running as a domain logon server (PDC or BDC). (CVE-2007-6015) stable/main/binary-arm/samba_3.0.24-6etch9_arm.deb stable/main/binary-arm/samba-common_3.0.24-6etch9_arm.deb stable/main/binary-arm/smbclient_3.0.24-6etch9_arm.deb stable/main/binary-arm/swat_3.0.24-6etch9_arm.deb stable/main/binary-arm/smbfs_3.0.24-6etch9_arm.deb stable/main/binary-arm/libpam-smbpass_3.0.24-6etch9_arm.deb stable/main/binary-arm/libsmbclient_3.0.24-6etch9_arm.deb stable/main/binary-arm/libsmbclient-dev_3.0.24-6etch9_arm.deb stable/main/binary-arm/winbind_3.0.24-6etch9_arm.deb stable/main/binary-arm/python-samba_3.0.24-6etch9_arm.deb stable/main/binary-arm/samba-dbg_3.0.24-6etch9_arm.deb samba (3.0.24-6etch9) stable-security; urgency=high * debian/patches/security-CVE-2007-6015.patch: fix a remote code execution vulnerability when running as a domain logon server (PDC or BDC). (CVE-2007-6015) stable/main/binary-hppa/samba_3.0.24-6etch9_hppa.deb stable/main/binary-hppa/samba-common_3.0.24-6etch9_hppa.deb stable/main/binary-hppa/smbclient_3.0.24-6etch9_hppa.deb stable/main/binary-hppa/swat_3.0.24-6etch9_hppa.deb stable/main/binary-hppa/smbfs_3.0.24-6etch9_hppa.deb stable/main/binary-hppa/libpam-smbpass_3.0.24-6etch9_hppa.deb stable/main/binary-hppa/libsmbclient_3.0.24-6etch9_hppa.deb stable/main/binary-hppa/libsmbclient-dev_3.0.24-6etch9_hppa.deb stable/main/binary-hppa/winbind_3.0.24-6etch9_hppa.deb stable/main/binary-hppa/python-samba_3.0.24-6etch9_hppa.deb stable/main/binary-hppa/samba-dbg_3.0.24-6etch9_hppa.deb samba (3.0.24-6etch9) stable-security; urgency=high * debian/patches/security-CVE-2007-6015.patch: fix a remote code execution vulnerability when running as a domain logon server (PDC or BDC). (CVE-2007-6015) stable/main/binary-i386/samba_3.0.24-6etch9_i386.deb stable/main/binary-i386/samba-common_3.0.24-6etch9_i386.deb stable/main/binary-i386/smbclient_3.0.24-6etch9_i386.deb stable/main/binary-i386/swat_3.0.24-6etch9_i386.deb stable/main/binary-i386/smbfs_3.0.24-6etch9_i386.deb stable/main/binary-i386/libpam-smbpass_3.0.24-6etch9_i386.deb stable/main/binary-i386/libsmbclient_3.0.24-6etch9_i386.deb stable/main/binary-i386/libsmbclient-dev_3.0.24-6etch9_i386.deb stable/main/binary-i386/winbind_3.0.24-6etch9_i386.deb stable/main/binary-i386/python-samba_3.0.24-6etch9_i386.deb stable/main/binary-i386/samba-dbg_3.0.24-6etch9_i386.deb samba (3.0.24-6etch9) stable-security; urgency=high * debian/patches/security-CVE-2007-6015.patch: fix a remote code execution vulnerability when running as a domain logon server (PDC or BDC). (CVE-2007-6015) stable/main/binary-ia64/samba_3.0.24-6etch9_ia64.deb stable/main/binary-ia64/samba-common_3.0.24-6etch9_ia64.deb stable/main/binary-ia64/smbclient_3.0.24-6etch9_ia64.deb stable/main/binary-ia64/swat_3.0.24-6etch9_ia64.deb stable/main/binary-ia64/smbfs_3.0.24-6etch9_ia64.deb stable/main/binary-ia64/libpam-smbpass_3.0.24-6etch9_ia64.deb stable/main/binary-ia64/libsmbclient_3.0.24-6etch9_ia64.deb stable/main/binary-ia64/libsmbclient-dev_3.0.24-6etch9_ia64.deb stable/main/binary-ia64/winbind_3.0.24-6etch9_ia64.deb stable/main/binary-ia64/python-samba_3.0.24-6etch9_ia64.deb stable/main/binary-ia64/samba-dbg_3.0.24-6etch9_ia64.deb samba (3.0.24-6etch9) stable-security; urgency=high * debian/patches/security-CVE-2007-6015.patch: fix a remote code execution vulnerability when running as a domain logon server (PDC or BDC). (CVE-2007-6015) stable/main/binary-mips/samba_3.0.24-6etch9_mips.deb stable/main/binary-mips/samba-common_3.0.24-6etch9_mips.deb stable/main/binary-mips/smbclient_3.0.24-6etch9_mips.deb stable/main/binary-mips/swat_3.0.24-6etch9_mips.deb stable/main/binary-mips/smbfs_3.0.24-6etch9_mips.deb stable/main/binary-mips/libpam-smbpass_3.0.24-6etch9_mips.deb stable/main/binary-mips/libsmbclient_3.0.24-6etch9_mips.deb stable/main/binary-mips/libsmbclient-dev_3.0.24-6etch9_mips.deb stable/main/binary-mips/winbind_3.0.24-6etch9_mips.deb stable/main/binary-mips/python-samba_3.0.24-6etch9_mips.deb stable/main/binary-mips/samba-dbg_3.0.24-6etch9_mips.deb samba (3.0.24-6etch9) stable-security; urgency=high * debian/patches/security-CVE-2007-6015.patch: fix a remote code execution vulnerability when running as a domain logon server (PDC or BDC). (CVE-2007-6015) stable/main/binary-mipsel/samba_3.0.24-6etch9_mipsel.deb stable/main/binary-mipsel/samba-common_3.0.24-6etch9_mipsel.deb stable/main/binary-mipsel/smbclient_3.0.24-6etch9_mipsel.deb stable/main/binary-mipsel/swat_3.0.24-6etch9_mipsel.deb stable/main/binary-mipsel/smbfs_3.0.24-6etch9_mipsel.deb stable/main/binary-mipsel/libpam-smbpass_3.0.24-6etch9_mipsel.deb stable/main/binary-mipsel/libsmbclient_3.0.24-6etch9_mipsel.deb stable/main/binary-mipsel/libsmbclient-dev_3.0.24-6etch9_mipsel.deb stable/main/binary-mipsel/winbind_3.0.24-6etch9_mipsel.deb stable/main/binary-mipsel/python-samba_3.0.24-6etch9_mipsel.deb stable/main/binary-mipsel/samba-dbg_3.0.24-6etch9_mipsel.deb samba (3.0.24-6etch9) stable-security; urgency=high * debian/patches/security-CVE-2007-6015.patch: fix a remote code execution vulnerability when running as a domain logon server (PDC or BDC). (CVE-2007-6015) stable/main/binary-powerpc/samba_3.0.24-6etch9_powerpc.deb stable/main/binary-powerpc/samba-common_3.0.24-6etch9_powerpc.deb stable/main/binary-powerpc/smbclient_3.0.24-6etch9_powerpc.deb stable/main/binary-powerpc/swat_3.0.24-6etch9_powerpc.deb stable/main/binary-powerpc/smbfs_3.0.24-6etch9_powerpc.deb stable/main/binary-powerpc/libpam-smbpass_3.0.24-6etch9_powerpc.deb stable/main/binary-powerpc/libsmbclient_3.0.24-6etch9_powerpc.deb stable/main/binary-powerpc/libsmbclient-dev_3.0.24-6etch9_powerpc.deb stable/main/binary-powerpc/winbind_3.0.24-6etch9_powerpc.deb stable/main/binary-powerpc/python-samba_3.0.24-6etch9_powerpc.deb stable/main/binary-powerpc/samba-dbg_3.0.24-6etch9_powerpc.deb samba (3.0.24-6etch9) stable-security; urgency=high * debian/patches/security-CVE-2007-6015.patch: fix a remote code execution vulnerability when running as a domain logon server (PDC or BDC). (CVE-2007-6015) stable/main/binary-s390/samba_3.0.24-6etch9_s390.deb stable/main/binary-s390/samba-common_3.0.24-6etch9_s390.deb stable/main/binary-s390/smbclient_3.0.24-6etch9_s390.deb stable/main/binary-s390/swat_3.0.24-6etch9_s390.deb stable/main/binary-s390/smbfs_3.0.24-6etch9_s390.deb stable/main/binary-s390/libpam-smbpass_3.0.24-6etch9_s390.deb stable/main/binary-s390/libsmbclient_3.0.24-6etch9_s390.deb stable/main/binary-s390/libsmbclient-dev_3.0.24-6etch9_s390.deb stable/main/binary-s390/winbind_3.0.24-6etch9_s390.deb stable/main/binary-s390/python-samba_3.0.24-6etch9_s390.deb stable/main/binary-s390/samba-dbg_3.0.24-6etch9_s390.deb samba (3.0.24-6etch9) stable-security; urgency=high * debian/patches/security-CVE-2007-6015.patch: fix a remote code execution vulnerability when running as a domain logon server (PDC or BDC). (CVE-2007-6015) stable/main/binary-sparc/samba_3.0.24-6etch9_sparc.deb stable/main/binary-sparc/samba-common_3.0.24-6etch9_sparc.deb stable/main/binary-sparc/smbclient_3.0.24-6etch9_sparc.deb stable/main/binary-sparc/swat_3.0.24-6etch9_sparc.deb stable/main/binary-sparc/smbfs_3.0.24-6etch9_sparc.deb stable/main/binary-sparc/libpam-smbpass_3.0.24-6etch9_sparc.deb stable/main/binary-sparc/libsmbclient_3.0.24-6etch9_sparc.deb stable/main/binary-sparc/libsmbclient-dev_3.0.24-6etch9_sparc.deb stable/main/binary-sparc/winbind_3.0.24-6etch9_sparc.deb stable/main/binary-sparc/python-samba_3.0.24-6etch9_sparc.deb stable/main/binary-sparc/samba-dbg_3.0.24-6etch9_sparc.deb samba (3.0.24-6etch9) stable-security; urgency=high * debian/patches/security-CVE-2007-6015.patch: fix a remote code execution vulnerability when running as a domain logon server (PDC or BDC). (CVE-2007-6015) stable/main/binary-alpha/sear_0.6.1-1+b1_alpha.deb sear (0.6.1-1+b1) stable; urgency=low * Binary-only non-maintainer upload for alpha; no source changes. * Rebuild against lib3ds-dev 1.2.0-4.1+etch1, to propagate the fix for bug #399761 stable/main/binary-arm/sear_0.6.1-1+b1_arm.deb sear (0.6.1-1+b1) stable; urgency=low * Binary-only non-maintainer upload for arm; no source changes. * Rebuild against lib3ds-dev 1.2.0-4.1+etch1, to propagate the fix for bug #399761 stable/main/binary-i386/sear_0.6.1-1+b1_i386.deb sear (0.6.1-1+b1) stable; urgency=low * Binary-only non-maintainer upload for i386; no source changes. * Rebuild against lib3ds-dev 1.2.0-4.1+etch1, to propagate the fix for bug #399761 stable/main/binary-mips/sear_0.6.1-1+b1_mips.deb sear (0.6.1-1+b1) stable; urgency=low * Binary-only non-maintainer upload for mips; no source changes. * Rebuild against lib3ds-dev 1.2.0-4.1+etch1, to propagate the fix for bug #399761 stable/main/binary-mipsel/sear_0.6.1-1+b1_mipsel.deb sear (0.6.1-1+b1) stable; urgency=low * Binary-only non-maintainer upload for mipsel; no source changes. * Rebuild against lib3ds-dev 1.2.0-4.1+etch1, to propagate the fix for bug #399761 stable/main/binary-powerpc/sear_0.6.1-1+b1_powerpc.deb sear (0.6.1-1+b1) stable; urgency=low * Binary-only non-maintainer upload for powerpc; no source changes. * Rebuild against lib3ds-dev 1.2.0-4.1+etch1, to propagate the fix for bug #399761 stable/main/binary-s390/sear_0.6.1-1+b1_s390.deb sear (0.6.1-1+b1) stable; urgency=low * Binary-only non-maintainer upload for s390; no source changes. * Rebuild against lib3ds-dev 1.2.0-4.1+etch1, to propagate the fix for bug #399761 stable/main/binary-sparc/sear_0.6.1-1+b1_sparc.deb sear (0.6.1-1+b1) stable; urgency=low * Binary-only non-maintainer upload for sparc; no source changes. * Rebuild against lib3ds-dev 1.2.0-4.1+etch1, to propagate the fix for bug #399761 stable/main/binary-hppa/sear_0.6.1-1+b2_hppa.deb sear (0.6.1-1+b2) stable; urgency=low * Binary-only non-maintainer upload for hppa; no source changes. * Rebuild against lib3ds-dev 1.2.0-4.1+etch1, to propagate the fix for bug #399761 stable/main/binary-amd64/sear_0.6.1-1+b3_amd64.deb sear (0.6.1-1+b3) stable; urgency=low * Binary-only non-maintainer upload for amd64; no source changes. * Rebuild against lib3ds-dev 1.2.0-4.1+etch1, to propagate the fix for bug #399761 stable/main/source/sitebar_3.3.8-7etch1.dsc stable/main/source/sitebar_3.3.8.orig.tar.gz stable/main/source/sitebar_3.3.8-7etch1.diff.gz stable/main/binary-all/sitebar_3.3.8-7etch1_all.deb sitebar (3.3.8-7etch1) stable-security; urgency=high * Non-maintainer upload by the security team * Fix multiple security issues in the translator module (translator.php) Fixes: CVE-2007-5491, CVE-2007-5492, CVE-2007-5693, CVE-2007-5694 (Closes: #447135) * Fix possible redirect to other websites via the forward parameter in command.php Fixes: CVE-2007-5695 (Closes: #448690) * Fix multiple XSS by adding more checks for certain parameters Fixes: CVE-2007-5692 (Closes: #448689) stable/main/binary-alpha/libt1-5_5.1.0-2etch1_alpha.deb stable/main/binary-alpha/libt1-dev_5.1.0-2etch1_alpha.deb stable/main/binary-alpha/t1lib-bin_5.1.0-2etch1_alpha.deb t1lib (5.1.0-2etch1) stable-security; urgency=high * Non-maintainer upload by the security team. * Apply patch from Artur R. Czechowski to fix CVE-2007-4033. stable/main/binary-amd64/libt1-5_5.1.0-2etch1_amd64.deb stable/main/binary-amd64/libt1-dev_5.1.0-2etch1_amd64.deb stable/main/binary-amd64/t1lib-bin_5.1.0-2etch1_amd64.deb t1lib (5.1.0-2etch1) stable-security; urgency=high * Non-maintainer upload by the security team. * Apply patch from Artur R. Czechowski to fix CVE-2007-4033. stable/main/binary-arm/libt1-5_5.1.0-2etch1_arm.deb stable/main/binary-arm/libt1-dev_5.1.0-2etch1_arm.deb stable/main/binary-arm/t1lib-bin_5.1.0-2etch1_arm.deb t1lib (5.1.0-2etch1) stable-security; urgency=high * Non-maintainer upload by the security team. * Apply patch from Artur R. Czechowski to fix CVE-2007-4033. stable/main/binary-hppa/libt1-5_5.1.0-2etch1_hppa.deb stable/main/binary-hppa/libt1-dev_5.1.0-2etch1_hppa.deb stable/main/binary-hppa/t1lib-bin_5.1.0-2etch1_hppa.deb t1lib (5.1.0-2etch1) stable-security; urgency=high * Non-maintainer upload by the security team. * Apply patch from Artur R. Czechowski to fix CVE-2007-4033. stable/main/source/t1lib_5.1.0-2etch1.dsc stable/main/source/t1lib_5.1.0-2etch1.diff.gz stable/main/binary-all/libt1-doc_5.1.0-2etch1_all.deb stable/main/binary-i386/libt1-5_5.1.0-2etch1_i386.deb stable/main/binary-i386/libt1-dev_5.1.0-2etch1_i386.deb stable/main/binary-i386/t1lib-bin_5.1.0-2etch1_i386.deb stable/main/source/t1lib_5.1.0.orig.tar.gz t1lib (5.1.0-2etch1) stable-security; urgency=high * Non-maintainer upload by the security team. * Apply patch from Artur R. Czechowski to fix CVE-2007-4033. stable/main/binary-ia64/libt1-5_5.1.0-2etch1_ia64.deb stable/main/binary-ia64/libt1-dev_5.1.0-2etch1_ia64.deb stable/main/binary-ia64/t1lib-bin_5.1.0-2etch1_ia64.deb t1lib (5.1.0-2etch1) stable-security; urgency=high * Non-maintainer upload by the security team. * Apply patch from Artur R. Czechowski to fix CVE-2007-4033. stable/main/binary-mips/libt1-5_5.1.0-2etch1_mips.deb stable/main/binary-mips/libt1-dev_5.1.0-2etch1_mips.deb stable/main/binary-mips/t1lib-bin_5.1.0-2etch1_mips.deb t1lib (5.1.0-2etch1) stable-security; urgency=high * Non-maintainer upload by the security team. * Apply patch from Artur R. Czechowski to fix CVE-2007-4033. stable/main/binary-mipsel/libt1-5_5.1.0-2etch1_mipsel.deb stable/main/binary-mipsel/libt1-dev_5.1.0-2etch1_mipsel.deb stable/main/binary-mipsel/t1lib-bin_5.1.0-2etch1_mipsel.deb t1lib (5.1.0-2etch1) stable-security; urgency=high * Non-maintainer upload by the security team. * Apply patch from Artur R. Czechowski to fix CVE-2007-4033. stable/main/binary-powerpc/libt1-5_5.1.0-2etch1_powerpc.deb stable/main/binary-powerpc/libt1-dev_5.1.0-2etch1_powerpc.deb stable/main/binary-powerpc/t1lib-bin_5.1.0-2etch1_powerpc.deb t1lib (5.1.0-2etch1) stable-security; urgency=high * Non-maintainer upload by the security team. * Apply patch from Artur R. Czechowski to fix CVE-2007-4033. stable/main/binary-s390/libt1-5_5.1.0-2etch1_s390.deb stable/main/binary-s390/libt1-dev_5.1.0-2etch1_s390.deb stable/main/binary-s390/t1lib-bin_5.1.0-2etch1_s390.deb t1lib (5.1.0-2etch1) stable-security; urgency=high * Non-maintainer upload by the security team. * Apply patch from Artur R. Czechowski to fix CVE-2007-4033. stable/main/binary-sparc/libt1-5_5.1.0-2etch1_sparc.deb stable/main/binary-sparc/libt1-dev_5.1.0-2etch1_sparc.deb stable/main/binary-sparc/t1lib-bin_5.1.0-2etch1_sparc.deb t1lib (5.1.0-2etch1) stable-security; urgency=high * Non-maintainer upload by the security team. * Apply patch from Artur R. Czechowski to fix CVE-2007-4033. stable/main/binary-alpha/tcpdump_3.9.5-2etch1_alpha.deb tcpdump (3.9.5-2etch1) stable-security; urgency=high * Fix integer overflow in BGP dissector (CVE-2007-3798). stable/main/binary-amd64/tcpdump_3.9.5-2etch1_amd64.deb tcpdump (3.9.5-2etch1) stable-security; urgency=high * Fix integer overflow in BGP dissector (CVE-2007-3798). stable/main/binary-arm/tcpdump_3.9.5-2etch1_arm.deb tcpdump (3.9.5-2etch1) stable-security; urgency=high * Fix integer overflow in BGP dissector (CVE-2007-3798). stable/main/binary-hppa/tcpdump_3.9.5-2etch1_hppa.deb tcpdump (3.9.5-2etch1) stable-security; urgency=high * Fix integer overflow in BGP dissector (CVE-2007-3798). stable/main/source/tcpdump_3.9.5-2etch1.dsc stable/main/source/tcpdump_3.9.5.orig.tar.gz stable/main/source/tcpdump_3.9.5-2etch1.diff.gz stable/main/binary-i386/tcpdump_3.9.5-2etch1_i386.deb tcpdump (3.9.5-2etch1) stable-security; urgency=high * Fix integer overflow in BGP dissector (CVE-2007-3798). stable/main/binary-ia64/tcpdump_3.9.5-2etch1_ia64.deb tcpdump (3.9.5-2etch1) stable-security; urgency=high * Fix integer overflow in BGP dissector (CVE-2007-3798). stable/main/binary-mips/tcpdump_3.9.5-2etch1_mips.deb tcpdump (3.9.5-2etch1) stable-security; urgency=high * Fix integer overflow in BGP dissector (CVE-2007-3798). stable/main/binary-mipsel/tcpdump_3.9.5-2etch1_mipsel.deb tcpdump (3.9.5-2etch1) stable-security; urgency=high * Fix integer overflow in BGP dissector (CVE-2007-3798). stable/main/binary-powerpc/tcpdump_3.9.5-2etch1_powerpc.deb tcpdump (3.9.5-2etch1) stable-security; urgency=high * Fix integer overflow in BGP dissector (CVE-2007-3798). stable/main/binary-s390/tcpdump_3.9.5-2etch1_s390.deb tcpdump (3.9.5-2etch1) stable-security; urgency=high * Fix integer overflow in BGP dissector (CVE-2007-3798). stable/main/binary-sparc/tcpdump_3.9.5-2etch1_sparc.deb tcpdump (3.9.5-2etch1) stable-security; urgency=high * Fix integer overflow in BGP dissector (CVE-2007-3798). stable/main/binary-alpha/tinymux_2.4.3.31-1etch1_alpha.deb tinymux (2.4.3.31-1etch1) stable-security; urgency=high * Non-maintainer upload by The Security Team. * Fixed a potential buffer overflow involving math operations. [CVE-2007-1655] stable/main/source/tinymux_2.4.3.31-1etch1.dsc stable/main/source/tinymux_2.4.3.31.orig.tar.gz stable/main/source/tinymux_2.4.3.31-1etch1.diff.gz stable/main/binary-amd64/tinymux_2.4.3.31-1etch1_amd64.deb tinymux (2.4.3.31-1etch1) stable-security; urgency=high * Non-maintainer upload by The Security Team. * Fixed a potential buffer overflow involving math operations. [CVE-2007-1655] stable/main/binary-arm/tinymux_2.4.3.31-1etch1_arm.deb tinymux (2.4.3.31-1etch1) stable-security; urgency=high * Non-maintainer upload by The Security Team. * Fixed a potential buffer overflow involving math operations. [CVE-2007-1655] stable/main/binary-hppa/tinymux_2.4.3.31-1etch1_hppa.deb tinymux (2.4.3.31-1etch1) stable-security; urgency=high * Non-maintainer upload by The Security Team. * Fixed a potential buffer overflow involving math operations. [CVE-2007-1655] stable/main/binary-i386/tinymux_2.4.3.31-1etch1_i386.deb tinymux (2.4.3.31-1etch1) stable-security; urgency=high * Non-maintainer upload by The Security Team. * Fixed a potential buffer overflow involving math operations. [CVE-2007-1655] stable/main/binary-ia64/tinymux_2.4.3.31-1etch1_ia64.deb tinymux (2.4.3.31-1etch1) stable-security; urgency=high * Non-maintainer upload by The Security Team. * Fixed a potential buffer overflow involving math operations. [CVE-2007-1655] stable/main/binary-mips/tinymux_2.4.3.31-1etch1_mips.deb tinymux (2.4.3.31-1etch1) stable-security; urgency=high * Non-maintainer upload by The Security Team. * Fixed a potential buffer overflow involving math operations. [CVE-2007-1655] stable/main/binary-mipsel/tinymux_2.4.3.31-1etch1_mipsel.deb tinymux (2.4.3.31-1etch1) stable-security; urgency=high * Non-maintainer upload by The Security Team. * Fixed a potential buffer overflow involving math operations. [CVE-2007-1655] stable/main/binary-powerpc/tinymux_2.4.3.31-1etch1_powerpc.deb tinymux (2.4.3.31-1etch1) stable-security; urgency=high * Non-maintainer upload by The Security Team. * Fixed a potential buffer overflow involving math operations. [CVE-2007-1655] stable/main/binary-s390/tinymux_2.4.3.31-1etch1_s390.deb tinymux (2.4.3.31-1etch1) stable-security; urgency=high * Non-maintainer upload by The Security Team. * Fixed a potential buffer overflow involving math operations. [CVE-2007-1655] stable/main/binary-sparc/tinymux_2.4.3.31-1etch1_sparc.deb tinymux (2.4.3.31-1etch1) stable-security; urgency=high * Non-maintainer upload by The Security Team. * Fixed a potential buffer overflow involving math operations. [CVE-2007-1655] stable/main/binary-alpha/tk8.3_8.3.5-6etch1_alpha.deb stable/main/binary-alpha/tk8.3-dev_8.3.5-6etch1_alpha.deb tk8.3 (8.3.5-6etch1) stable-security; urgency=high * Applied patches by Nico Golde which correctly fix security vulnerability CVE-2007-5137 arbitrary code execution via multi-frame interlaced GIF not introducing CVE-2007-5378. stable/main/binary-amd64/tk8.3_8.3.5-6etch1_amd64.deb stable/main/binary-amd64/tk8.3-dev_8.3.5-6etch1_amd64.deb tk8.3 (8.3.5-6etch1) stable-security; urgency=high * Applied patches by Nico Golde which correctly fix security vulnerability CVE-2007-5137 arbitrary code execution via multi-frame interlaced GIF not introducing CVE-2007-5378. stable/main/binary-arm/tk8.3_8.3.5-6etch1_arm.deb stable/main/binary-arm/tk8.3-dev_8.3.5-6etch1_arm.deb tk8.3 (8.3.5-6etch1) stable-security; urgency=high * Applied patches by Nico Golde which correctly fix security vulnerability CVE-2007-5137 arbitrary code execution via multi-frame interlaced GIF not introducing CVE-2007-5378. stable/main/binary-hppa/tk8.3_8.3.5-6etch1_hppa.deb stable/main/binary-hppa/tk8.3-dev_8.3.5-6etch1_hppa.deb tk8.3 (8.3.5-6etch1) stable-security; urgency=high * Applied patches by Nico Golde which correctly fix security vulnerability CVE-2007-5137 arbitrary code execution via multi-frame interlaced GIF not introducing CVE-2007-5378. stable/main/source/tk8.3_8.3.5-6etch1.dsc stable/main/source/tk8.3_8.3.5.orig.tar.gz stable/main/source/tk8.3_8.3.5-6etch1.diff.gz stable/main/binary-all/tk8.3-doc_8.3.5-6etch1_all.deb stable/main/binary-i386/tk8.3_8.3.5-6etch1_i386.deb stable/main/binary-i386/tk8.3-dev_8.3.5-6etch1_i386.deb tk8.3 (8.3.5-6etch1) stable-security; urgency=high * Applied patches by Nico Golde which correctly fix security vulnerability CVE-2007-5137 arbitrary code execution via multi-frame interlaced GIF not introducing CVE-2007-5378. stable/main/binary-ia64/tk8.3_8.3.5-6etch1_ia64.deb stable/main/binary-ia64/tk8.3-dev_8.3.5-6etch1_ia64.deb tk8.3 (8.3.5-6etch1) stable-security; urgency=high * Applied patches by Nico Golde which correctly fix security vulnerability CVE-2007-5137 arbitrary code execution via multi-frame interlaced GIF not introducing CVE-2007-5378. stable/main/binary-mips/tk8.3_8.3.5-6etch1_mips.deb stable/main/binary-mips/tk8.3-dev_8.3.5-6etch1_mips.deb tk8.3 (8.3.5-6etch1) stable-security; urgency=high * Applied patches by Nico Golde which correctly fix security vulnerability CVE-2007-5137 arbitrary code execution via multi-frame interlaced GIF not introducing CVE-2007-5378. stable/main/binary-mipsel/tk8.3_8.3.5-6etch1_mipsel.deb stable/main/binary-mipsel/tk8.3-dev_8.3.5-6etch1_mipsel.deb tk8.3 (8.3.5-6etch1) stable-security; urgency=high * Applied patches by Nico Golde which correctly fix security vulnerability CVE-2007-5137 arbitrary code execution via multi-frame interlaced GIF not introducing CVE-2007-5378. stable/main/binary-powerpc/tk8.3_8.3.5-6etch1_powerpc.deb stable/main/binary-powerpc/tk8.3-dev_8.3.5-6etch1_powerpc.deb tk8.3 (8.3.5-6etch1) stable-security; urgency=high * Applied patches by Nico Golde which correctly fix security vulnerability CVE-2007-5137 arbitrary code execution via multi-frame interlaced GIF not introducing CVE-2007-5378. stable/main/binary-s390/tk8.3_8.3.5-6etch1_s390.deb stable/main/binary-s390/tk8.3-dev_8.3.5-6etch1_s390.deb tk8.3 (8.3.5-6etch1) stable-security; urgency=high * Applied patches by Nico Golde which correctly fix security vulnerability CVE-2007-5137 arbitrary code execution via multi-frame interlaced GIF not introducing CVE-2007-5378. stable/main/binary-sparc/tk8.3_8.3.5-6etch1_sparc.deb stable/main/binary-sparc/tk8.3-dev_8.3.5-6etch1_sparc.deb tk8.3 (8.3.5-6etch1) stable-security; urgency=high * Applied patches by Nico Golde which correctly fix security vulnerability CVE-2007-5137 arbitrary code execution via multi-frame interlaced GIF not introducing CVE-2007-5378. stable/main/binary-alpha/tk8.4_8.4.12-1etch1_alpha.deb stable/main/binary-alpha/tk8.4-dev_8.4.12-1etch1_alpha.deb tk8.4 (8.4.12-1etch1) stable-security; urgency=high * Applied patches by Nico Golde which correctly fix security vulnerability CVE-2007-5137 arbitrary code execution via multi-frame interlaced GIF not introducing CVE-2007-5378. stable/main/binary-amd64/tk8.4_8.4.12-1etch1_amd64.deb stable/main/binary-amd64/tk8.4-dev_8.4.12-1etch1_amd64.deb tk8.4 (8.4.12-1etch1) stable-security; urgency=high * Applied patches by Nico Golde which correctly fix security vulnerability CVE-2007-5137 arbitrary code execution via multi-frame interlaced GIF not introducing CVE-2007-5378. stable/main/binary-arm/tk8.4_8.4.12-1etch1_arm.deb stable/main/binary-arm/tk8.4-dev_8.4.12-1etch1_arm.deb tk8.4 (8.4.12-1etch1) stable-security; urgency=high * Applied patches by Nico Golde which correctly fix security vulnerability CVE-2007-5137 arbitrary code execution via multi-frame interlaced GIF not introducing CVE-2007-5378. stable/main/binary-hppa/tk8.4_8.4.12-1etch1_hppa.deb stable/main/binary-hppa/tk8.4-dev_8.4.12-1etch1_hppa.deb tk8.4 (8.4.12-1etch1) stable-security; urgency=high * Applied patches by Nico Golde which correctly fix security vulnerability CVE-2007-5137 arbitrary code execution via multi-frame interlaced GIF not introducing CVE-2007-5378. stable/main/source/tk8.4_8.4.12-1etch1.dsc stable/main/source/tk8.4_8.4.12.orig.tar.gz stable/main/source/tk8.4_8.4.12-1etch1.diff.gz stable/main/binary-all/tk8.4-doc_8.4.12-1etch1_all.deb stable/main/binary-i386/tk8.4_8.4.12-1etch1_i386.deb stable/main/binary-i386/tk8.4-dev_8.4.12-1etch1_i386.deb tk8.4 (8.4.12-1etch1) stable-security; urgency=high * Applied patches by Nico Golde which correctly fix security vulnerability CVE-2007-5137 arbitrary code execution via multi-frame interlaced GIF not introducing CVE-2007-5378. stable/main/binary-ia64/tk8.4_8.4.12-1etch1_ia64.deb stable/main/binary-ia64/tk8.4-dev_8.4.12-1etch1_ia64.deb tk8.4 (8.4.12-1etch1) stable-security; urgency=high * Applied patches by Nico Golde which correctly fix security vulnerability CVE-2007-5137 arbitrary code execution via multi-frame interlaced GIF not introducing CVE-2007-5378. stable/main/binary-mips/tk8.4_8.4.12-1etch1_mips.deb stable/main/binary-mips/tk8.4-dev_8.4.12-1etch1_mips.deb tk8.4 (8.4.12-1etch1) stable-security; urgency=high * Applied patches by Nico Golde which correctly fix security vulnerability CVE-2007-5137 arbitrary code execution via multi-frame interlaced GIF not introducing CVE-2007-5378. stable/main/binary-mipsel/tk8.4_8.4.12-1etch1_mipsel.deb stable/main/binary-mipsel/tk8.4-dev_8.4.12-1etch1_mipsel.deb tk8.4 (8.4.12-1etch1) stable-security; urgency=high * Applied patches by Nico Golde which correctly fix security vulnerability CVE-2007-5137 arbitrary code execution via multi-frame interlaced GIF not introducing CVE-2007-5378. stable/main/binary-powerpc/tk8.4_8.4.12-1etch1_powerpc.deb stable/main/binary-powerpc/tk8.4-dev_8.4.12-1etch1_powerpc.deb tk8.4 (8.4.12-1etch1) stable-security; urgency=high * Applied patches by Nico Golde which correctly fix security vulnerability CVE-2007-5137 arbitrary code execution via multi-frame interlaced GIF not introducing CVE-2007-5378. stable/main/binary-s390/tk8.4_8.4.12-1etch1_s390.deb stable/main/binary-s390/tk8.4-dev_8.4.12-1etch1_s390.deb tk8.4 (8.4.12-1etch1) stable-security; urgency=high * Applied patches by Nico Golde which correctly fix security vulnerability CVE-2007-5137 arbitrary code execution via multi-frame interlaced GIF not introducing CVE-2007-5378. stable/main/binary-sparc/tk8.4_8.4.12-1etch1_sparc.deb stable/main/binary-sparc/tk8.4-dev_8.4.12-1etch1_sparc.deb tk8.4 (8.4.12-1etch1) stable-security; urgency=high * Applied patches by Nico Golde which correctly fix security vulnerability CVE-2007-5137 arbitrary code execution via multi-frame interlaced GIF not introducing CVE-2007-5378. stable/main/source/tzdata_2007j-1etch1.dsc stable/main/source/tzdata_2007j-1etch1.diff.gz stable/main/binary-all/tzdata_2007j-1etch1_all.deb tzdata (2007j-1etch1) stable; urgency=low * New upstream release for Etch: - Only the timezone definitions have been changed, all scripts are left unchanged. stable/main/binary-alpha/unace_1.2b-4etch1_alpha.deb unace (1.2b-4etch1) stable; urgency=low * Make the program 64 bit clean, by using to typedef the data types independently of the target system. (Closes: #431380) - debian/patches/004_64_bit_clean.patch: New file. stable/main/binary-amd64/unace_1.2b-4etch1_amd64.deb unace (1.2b-4etch1) stable; urgency=low * Make the program 64 bit clean, by using to typedef the data types independently of the target system. (Closes: #431380) - debian/patches/004_64_bit_clean.patch: New file. stable/main/binary-arm/unace_1.2b-4etch1_arm.deb unace (1.2b-4etch1) stable; urgency=low * Make the program 64 bit clean, by using to typedef the data types independently of the target system. (Closes: #431380) - debian/patches/004_64_bit_clean.patch: New file. stable/main/binary-hppa/unace_1.2b-4etch1_hppa.deb unace (1.2b-4etch1) stable; urgency=low * Make the program 64 bit clean, by using to typedef the data types independently of the target system. (Closes: #431380) - debian/patches/004_64_bit_clean.patch: New file. stable/main/source/unace_1.2b-4etch1.dsc stable/main/source/unace_1.2b-4etch1.diff.gz stable/main/binary-i386/unace_1.2b-4etch1_i386.deb unace (1.2b-4etch1) stable; urgency=low * Make the program 64 bit clean, by using to typedef the data types independently of the target system. (Closes: #431380) - debian/patches/004_64_bit_clean.patch: New file. stable/main/binary-ia64/unace_1.2b-4etch1_ia64.deb unace (1.2b-4etch1) stable; urgency=low * Make the program 64 bit clean, by using to typedef the data types independently of the target system. (Closes: #431380) - debian/patches/004_64_bit_clean.patch: New file. stable/main/binary-mips/unace_1.2b-4etch1_mips.deb unace (1.2b-4etch1) stable; urgency=low * Make the program 64 bit clean, by using to typedef the data types independently of the target system. (Closes: #431380) - debian/patches/004_64_bit_clean.patch: New file. stable/main/binary-mipsel/unace_1.2b-4etch1_mipsel.deb unace (1.2b-4etch1) stable; urgency=low * Make the program 64 bit clean, by using to typedef the data types independently of the target system. (Closes: #431380) - debian/patches/004_64_bit_clean.patch: New file. stable/main/binary-powerpc/unace_1.2b-4etch1_powerpc.deb unace (1.2b-4etch1) stable; urgency=low * Make the program 64 bit clean, by using to typedef the data types independently of the target system. (Closes: #431380) - debian/patches/004_64_bit_clean.patch: New file. stable/main/binary-s390/unace_1.2b-4etch1_s390.deb unace (1.2b-4etch1) stable; urgency=low * Make the program 64 bit clean, by using to typedef the data types independently of the target system. (Closes: #431380) - debian/patches/004_64_bit_clean.patch: New file. stable/main/binary-sparc/unace_1.2b-4etch1_sparc.deb unace (1.2b-4etch1) stable; urgency=low * Make the program 64 bit clean, by using to typedef the data types independently of the target system. (Closes: #431380) - debian/patches/004_64_bit_clean.patch: New file. stable/main/binary-alpha/unicon-imc2_3.0.4-11etch1_alpha.deb unicon (3.0.4-11etch1) stable-security; urgency=high * Non-maintainer upload by The Security Team. * Fix the unsafe use of environmental variables. [CVE-2007-2835] stable/main/source/unicon_3.0.4-11etch1.dsc stable/main/source/unicon_3.0.4.orig.tar.gz stable/main/source/unicon_3.0.4-11etch1.diff.gz stable/main/binary-amd64/unicon-imc2_3.0.4-11etch1_amd64.deb unicon (3.0.4-11etch1) stable-security; urgency=high * Non-maintainer upload by The Security Team. * Fix the unsafe use of environmental variables. [CVE-2007-2835] stable/main/binary-arm/unicon-imc2_3.0.4-11etch1_arm.deb unicon (3.0.4-11etch1) stable-security; urgency=high * Non-maintainer upload by The Security Team. * Fix the unsafe use of environmental variables. [CVE-2007-2835] stable/main/binary-hppa/unicon-imc2_3.0.4-11etch1_hppa.deb unicon (3.0.4-11etch1) stable-security; urgency=high * Non-maintainer upload by The Security Team. * Fix the unsafe use of environmental variables. [CVE-2007-2835] stable/main/binary-i386/unicon-imc2_3.0.4-11etch1_i386.deb unicon (3.0.4-11etch1) stable-security; urgency=high * Non-maintainer upload by The Security Team. * Fix the unsafe use of environmental variables. [CVE-2007-2835] stable/main/binary-ia64/unicon-imc2_3.0.4-11etch1_ia64.deb unicon (3.0.4-11etch1) stable-security; urgency=high * Non-maintainer upload by The Security Team. * Fix the unsafe use of environmental variables. [CVE-2007-2835] stable/main/binary-mips/unicon-imc2_3.0.4-11etch1_mips.deb unicon (3.0.4-11etch1) stable-security; urgency=high * Non-maintainer upload by The Security Team. * Fix the unsafe use of environmental variables. [CVE-2007-2835] stable/main/binary-mipsel/unicon-imc2_3.0.4-11etch1_mipsel.deb unicon (3.0.4-11etch1) stable-security; urgency=high * Non-maintainer upload by The Security Team. * Fix the unsafe use of environmental variables. [CVE-2007-2835] stable/main/binary-powerpc/unicon-imc2_3.0.4-11etch1_powerpc.deb unicon (3.0.4-11etch1) stable-security; urgency=high * Non-maintainer upload by The Security Team. * Fix the unsafe use of environmental variables. [CVE-2007-2835] stable/main/binary-s390/unicon-imc2_3.0.4-11etch1_s390.deb unicon (3.0.4-11etch1) stable-security; urgency=high * Non-maintainer upload by The Security Team. * Fix the unsafe use of environmental variables. [CVE-2007-2835] stable/main/binary-sparc/unicon-imc2_3.0.4-11etch1_sparc.deb unicon (3.0.4-11etch1) stable-security; urgency=high * Non-maintainer upload by The Security Team. * Fix the unsafe use of environmental variables. [CVE-2007-2835] stable/main/source/user-mode-linux_2.6.18-1um-2etch.17.dsc stable/main/source/user-mode-linux_2.6.18-1um-2etch.17.diff.gz stable/main/binary-i386/user-mode-linux_2.6.18-1um-2etch.17_i386.deb user-mode-linux (2.6.18-1um-2etch.17) stable; urgency=high * Rebuild against linux-source-2.6.18 (2.6.18.dfsg.1-17): * [futex] Fix address computation in compat code, fixing hangs on sparc64. (closes: #433187) * [x86_64] Mask the NX bit in mk_pte_phys to avoid triggering a RSVD type page fault on non-NX capable systems which causes a crash. (closes: #414742) * [fusion] Avoid holding the device busy for too long in the low level driver, which was causing filesystems in VMWare guests to get remounted read-only under load. (closes: #453120) * Add UNUSUAL_DEV entries for supertop usb drives which require the IGNORE_RESIDUE flag. (closes: #455856) * [sparc64] Enable CONFIG_USB_SERIAL (closes: #412740) stable/main/source/uswsusp_0.3~cvs20060928-7etch1.dsc stable/main/source/uswsusp_0.3~cvs20060928-7etch1.diff.gz stable/main/binary-amd64/uswsusp_0.3~cvs20060928-7etch1_amd64.deb uswsusp (0.3~cvs20060928-7etch1) stable; urgency=low * Fix work around from last upload to not ask useless question (closes: #427104) * Fix spelling error in nl.po. stable/main/binary-i386/uswsusp_0.3~cvs20060928-7etch1_i386.deb uswsusp (0.3~cvs20060928-7etch1) stable; urgency=low * Fix work around from last upload to not ask useless question (closes: #427104) * Fix spelling error in nl.po. stable/main/binary-alpha/view3ds_1.0.0-9.2+b1_alpha.deb view3ds (1.0.0-9.2+b1) stable; urgency=low * Binary-only non-maintainer upload for alpha; no source changes. * Rebuild against lib3ds-dev 1.2.0-4.1+etch1, to propagate the fix for bug #399761 stable/main/binary-amd64/view3ds_1.0.0-9.2+b1_amd64.deb view3ds (1.0.0-9.2+b1) stable; urgency=low * Binary-only non-maintainer upload for amd64; no source changes. * Rebuild against lib3ds-dev 1.2.0-4.1+etch1, to propagate the fix for bug #399761 stable/main/binary-hppa/view3ds_1.0.0-9.2+b1_hppa.deb view3ds (1.0.0-9.2+b1) stable; urgency=low * Binary-only non-maintainer upload for hppa; no source changes. * Rebuild against lib3ds-dev 1.2.0-4.1+etch1, to propagate the fix for bug #399761 stable/main/binary-i386/view3ds_1.0.0-9.2+b1_i386.deb view3ds (1.0.0-9.2+b1) stable; urgency=low * Binary-only non-maintainer upload for i386; no source changes. * Rebuild against lib3ds-dev 1.2.0-4.1+etch1, to propagate the fix for bug #399761 stable/main/binary-ia64/view3ds_1.0.0-9.2+b1_ia64.deb view3ds (1.0.0-9.2+b1) stable; urgency=low * Binary-only non-maintainer upload for ia64; no source changes. * Rebuild against lib3ds-dev 1.2.0-4.1+etch1, to propagate the fix for bug #399761 stable/main/binary-mips/view3ds_1.0.0-9.2+b1_mips.deb view3ds (1.0.0-9.2+b1) stable; urgency=low * Binary-only non-maintainer upload for mips; no source changes. * Rebuild against lib3ds-dev 1.2.0-4.1+etch1, to propagate the fix for bug #399761 stable/main/binary-mipsel/view3ds_1.0.0-9.2+b1_mipsel.deb view3ds (1.0.0-9.2+b1) stable; urgency=low * Binary-only non-maintainer upload for mipsel; no source changes. * Rebuild against lib3ds-dev 1.2.0-4.1+etch1, to propagate the fix for bug #399761 stable/main/binary-powerpc/view3ds_1.0.0-9.2+b1_powerpc.deb view3ds (1.0.0-9.2+b1) stable; urgency=low * Binary-only non-maintainer upload for powerpc; no source changes. * Rebuild against lib3ds-dev 1.2.0-4.1+etch1, to propagate the fix for bug #399761 stable/main/binary-s390/view3ds_1.0.0-9.2+b1_s390.deb view3ds (1.0.0-9.2+b1) stable; urgency=low * Binary-only non-maintainer upload for s390; no source changes. * Rebuild against lib3ds-dev 1.2.0-4.1+etch1, to propagate the fix for bug #399761 stable/main/binary-sparc/view3ds_1.0.0-9.2+b1_sparc.deb view3ds (1.0.0-9.2+b1) stable; urgency=low * Binary-only non-maintainer upload for sparc; no source changes. * Rebuild against lib3ds-dev 1.2.0-4.1+etch1, to propagate the fix for bug #399761 stable/main/source/viewcvs_0.9.2+cvs.1.0.dev.2004.07.28-4.1~0etch1.dsc stable/main/source/viewcvs_0.9.2+cvs.1.0.dev.2004.07.28-4.1~0etch1.diff.gz stable/main/binary-all/viewcvs_0.9.2+cvs.1.0.dev.2004.07.28-4.1~0etch1_all.deb stable/main/binary-all/viewcvs-query_0.9.2+cvs.1.0.dev.2004.07.28-4.1~0etch1_all.deb viewcvs (0.9.2+cvs.1.0.dev.2004.07.28-4.1~0etch1) stable; urgency=low * Fix interoperability with etch CVS (closes: #372655, #422141). stable/main/binary-alpha/vim-tiny_7.0-122+1etch3_alpha.deb stable/main/binary-alpha/vim-ruby_7.0-122+1etch3_alpha.deb stable/main/binary-alpha/vim-tcl_7.0-122+1etch3_alpha.deb stable/main/binary-alpha/vim-gtk_7.0-122+1etch3_alpha.deb stable/main/binary-alpha/vim-lesstif_7.0-122+1etch3_alpha.deb stable/main/binary-alpha/vim-perl_7.0-122+1etch3_alpha.deb stable/main/binary-alpha/vim-python_7.0-122+1etch3_alpha.deb stable/main/binary-alpha/vim-gnome_7.0-122+1etch3_alpha.deb stable/main/binary-alpha/vim-full_7.0-122+1etch3_alpha.deb stable/main/binary-alpha/vim-common_7.0-122+1etch3_alpha.deb stable/main/binary-alpha/vim_7.0-122+1etch3_alpha.deb vim (1:7.0-122+1etch3) stable-security; urgency=high * Add upstream patches 7.0.234 and 7.0.235 which fix CVE-2007-2438. (Closes: #435401) * Add upstream patch 7.1.039 which fixes CVE-2007-2953. (Closes: #438593) stable/main/binary-amd64/vim-tiny_7.0-122+1etch3_amd64.deb stable/main/binary-amd64/vim-ruby_7.0-122+1etch3_amd64.deb stable/main/binary-amd64/vim-tcl_7.0-122+1etch3_amd64.deb stable/main/binary-amd64/vim-gtk_7.0-122+1etch3_amd64.deb stable/main/binary-amd64/vim-lesstif_7.0-122+1etch3_amd64.deb stable/main/binary-amd64/vim-perl_7.0-122+1etch3_amd64.deb stable/main/binary-amd64/vim-python_7.0-122+1etch3_amd64.deb stable/main/binary-amd64/vim-gnome_7.0-122+1etch3_amd64.deb stable/main/binary-amd64/vim-full_7.0-122+1etch3_amd64.deb stable/main/binary-amd64/vim-common_7.0-122+1etch3_amd64.deb stable/main/binary-amd64/vim_7.0-122+1etch3_amd64.deb vim (1:7.0-122+1etch3) stable-security; urgency=high * Add upstream patches 7.0.234 and 7.0.235 which fix CVE-2007-2438. (Closes: #435401) * Add upstream patch 7.1.039 which fixes CVE-2007-2953. (Closes: #438593) stable/main/binary-arm/vim-tiny_7.0-122+1etch3_arm.deb stable/main/binary-arm/vim-ruby_7.0-122+1etch3_arm.deb stable/main/binary-arm/vim-tcl_7.0-122+1etch3_arm.deb stable/main/binary-arm/vim-gtk_7.0-122+1etch3_arm.deb stable/main/binary-arm/vim-lesstif_7.0-122+1etch3_arm.deb stable/main/binary-arm/vim-perl_7.0-122+1etch3_arm.deb stable/main/binary-arm/vim-python_7.0-122+1etch3_arm.deb stable/main/binary-arm/vim-gnome_7.0-122+1etch3_arm.deb stable/main/binary-arm/vim-full_7.0-122+1etch3_arm.deb stable/main/binary-arm/vim-common_7.0-122+1etch3_arm.deb stable/main/binary-arm/vim_7.0-122+1etch3_arm.deb vim (1:7.0-122+1etch3) stable-security; urgency=high * Add upstream patches 7.0.234 and 7.0.235 which fix CVE-2007-2438. (Closes: #435401) * Add upstream patch 7.1.039 which fixes CVE-2007-2953. (Closes: #438593) stable/main/binary-hppa/vim-tiny_7.0-122+1etch3_hppa.deb stable/main/binary-hppa/vim-ruby_7.0-122+1etch3_hppa.deb stable/main/binary-hppa/vim-tcl_7.0-122+1etch3_hppa.deb stable/main/binary-hppa/vim-gtk_7.0-122+1etch3_hppa.deb stable/main/binary-hppa/vim-lesstif_7.0-122+1etch3_hppa.deb stable/main/binary-hppa/vim-perl_7.0-122+1etch3_hppa.deb stable/main/binary-hppa/vim-python_7.0-122+1etch3_hppa.deb stable/main/binary-hppa/vim-gnome_7.0-122+1etch3_hppa.deb stable/main/binary-hppa/vim-full_7.0-122+1etch3_hppa.deb stable/main/binary-hppa/vim-common_7.0-122+1etch3_hppa.deb stable/main/binary-hppa/vim_7.0-122+1etch3_hppa.deb vim (1:7.0-122+1etch3) stable-security; urgency=high * Add upstream patches 7.0.234 and 7.0.235 which fix CVE-2007-2438. (Closes: #435401) * Add upstream patch 7.1.039 which fixes CVE-2007-2953. (Closes: #438593) stable/main/source/vim_7.0-122+1etch3.dsc stable/main/source/vim_7.0.orig.tar.gz stable/main/source/vim_7.0-122+1etch3.diff.gz stable/main/binary-all/vim-gui-common_7.0-122+1etch3_all.deb stable/main/binary-all/vim-runtime_7.0-122+1etch3_all.deb stable/main/binary-all/vim-doc_7.0-122+1etch3_all.deb stable/main/binary-i386/vim-tiny_7.0-122+1etch3_i386.deb stable/main/binary-i386/vim-ruby_7.0-122+1etch3_i386.deb stable/main/binary-i386/vim-tcl_7.0-122+1etch3_i386.deb stable/main/binary-i386/vim-gtk_7.0-122+1etch3_i386.deb stable/main/binary-i386/vim-lesstif_7.0-122+1etch3_i386.deb stable/main/binary-i386/vim-perl_7.0-122+1etch3_i386.deb stable/main/binary-i386/vim-python_7.0-122+1etch3_i386.deb stable/main/binary-i386/vim-gnome_7.0-122+1etch3_i386.deb stable/main/binary-i386/vim-full_7.0-122+1etch3_i386.deb stable/main/binary-i386/vim-common_7.0-122+1etch3_i386.deb stable/main/binary-i386/vim_7.0-122+1etch3_i386.deb vim (1:7.0-122+1etch3) stable-security; urgency=high * Add upstream patches 7.0.234 and 7.0.235 which fix CVE-2007-2438. (Closes: #435401) * Add upstream patch 7.1.039 which fixes CVE-2007-2953. (Closes: #438593) stable/main/binary-ia64/vim-tiny_7.0-122+1etch3_ia64.deb stable/main/binary-ia64/vim-ruby_7.0-122+1etch3_ia64.deb stable/main/binary-ia64/vim-tcl_7.0-122+1etch3_ia64.deb stable/main/binary-ia64/vim-gtk_7.0-122+1etch3_ia64.deb stable/main/binary-ia64/vim-lesstif_7.0-122+1etch3_ia64.deb stable/main/binary-ia64/vim-perl_7.0-122+1etch3_ia64.deb stable/main/binary-ia64/vim-python_7.0-122+1etch3_ia64.deb stable/main/binary-ia64/vim-gnome_7.0-122+1etch3_ia64.deb stable/main/binary-ia64/vim-full_7.0-122+1etch3_ia64.deb stable/main/binary-ia64/vim-common_7.0-122+1etch3_ia64.deb stable/main/binary-ia64/vim_7.0-122+1etch3_ia64.deb vim (1:7.0-122+1etch3) stable-security; urgency=high * Add upstream patches 7.0.234 and 7.0.235 which fix CVE-2007-2438. (Closes: #435401) * Add upstream patch 7.1.039 which fixes CVE-2007-2953. (Closes: #438593) stable/main/binary-mips/vim-tiny_7.0-122+1etch3_mips.deb stable/main/binary-mips/vim-ruby_7.0-122+1etch3_mips.deb stable/main/binary-mips/vim-tcl_7.0-122+1etch3_mips.deb stable/main/binary-mips/vim-gtk_7.0-122+1etch3_mips.deb stable/main/binary-mips/vim-lesstif_7.0-122+1etch3_mips.deb stable/main/binary-mips/vim-perl_7.0-122+1etch3_mips.deb stable/main/binary-mips/vim-python_7.0-122+1etch3_mips.deb stable/main/binary-mips/vim-gnome_7.0-122+1etch3_mips.deb stable/main/binary-mips/vim-full_7.0-122+1etch3_mips.deb stable/main/binary-mips/vim-common_7.0-122+1etch3_mips.deb stable/main/binary-mips/vim_7.0-122+1etch3_mips.deb vim (1:7.0-122+1etch3) stable-security; urgency=high * Add upstream patches 7.0.234 and 7.0.235 which fix CVE-2007-2438. (Closes: #435401) * Add upstream patch 7.1.039 which fixes CVE-2007-2953. (Closes: #438593) stable/main/binary-mipsel/vim-tiny_7.0-122+1etch3_mipsel.deb stable/main/binary-mipsel/vim-ruby_7.0-122+1etch3_mipsel.deb stable/main/binary-mipsel/vim-tcl_7.0-122+1etch3_mipsel.deb stable/main/binary-mipsel/vim-gtk_7.0-122+1etch3_mipsel.deb stable/main/binary-mipsel/vim-lesstif_7.0-122+1etch3_mipsel.deb stable/main/binary-mipsel/vim-perl_7.0-122+1etch3_mipsel.deb stable/main/binary-mipsel/vim-python_7.0-122+1etch3_mipsel.deb stable/main/binary-mipsel/vim-gnome_7.0-122+1etch3_mipsel.deb stable/main/binary-mipsel/vim-full_7.0-122+1etch3_mipsel.deb stable/main/binary-mipsel/vim-common_7.0-122+1etch3_mipsel.deb stable/main/binary-mipsel/vim_7.0-122+1etch3_mipsel.deb vim (1:7.0-122+1etch3) stable-security; urgency=high * Add upstream patches 7.0.234 and 7.0.235 which fix CVE-2007-2438. (Closes: #435401) * Add upstream patch 7.1.039 which fixes CVE-2007-2953. (Closes: #438593) stable/main/binary-powerpc/vim-tiny_7.0-122+1etch3_powerpc.deb stable/main/binary-powerpc/vim-ruby_7.0-122+1etch3_powerpc.deb stable/main/binary-powerpc/vim-tcl_7.0-122+1etch3_powerpc.deb stable/main/binary-powerpc/vim-gtk_7.0-122+1etch3_powerpc.deb stable/main/binary-powerpc/vim-lesstif_7.0-122+1etch3_powerpc.deb stable/main/binary-powerpc/vim-perl_7.0-122+1etch3_powerpc.deb stable/main/binary-powerpc/vim-python_7.0-122+1etch3_powerpc.deb stable/main/binary-powerpc/vim-gnome_7.0-122+1etch3_powerpc.deb stable/main/binary-powerpc/vim-full_7.0-122+1etch3_powerpc.deb stable/main/binary-powerpc/vim-common_7.0-122+1etch3_powerpc.deb stable/main/binary-powerpc/vim_7.0-122+1etch3_powerpc.deb vim (1:7.0-122+1etch3) stable-security; urgency=high * Add upstream patches 7.0.234 and 7.0.235 which fix CVE-2007-2438. (Closes: #435401) * Add upstream patch 7.1.039 which fixes CVE-2007-2953. (Closes: #438593) stable/main/binary-s390/vim-tiny_7.0-122+1etch3_s390.deb stable/main/binary-s390/vim-ruby_7.0-122+1etch3_s390.deb stable/main/binary-s390/vim-tcl_7.0-122+1etch3_s390.deb stable/main/binary-s390/vim-gtk_7.0-122+1etch3_s390.deb stable/main/binary-s390/vim-lesstif_7.0-122+1etch3_s390.deb stable/main/binary-s390/vim-perl_7.0-122+1etch3_s390.deb stable/main/binary-s390/vim-python_7.0-122+1etch3_s390.deb stable/main/binary-s390/vim-gnome_7.0-122+1etch3_s390.deb stable/main/binary-s390/vim-full_7.0-122+1etch3_s390.deb stable/main/binary-s390/vim-common_7.0-122+1etch3_s390.deb stable/main/binary-s390/vim_7.0-122+1etch3_s390.deb vim (1:7.0-122+1etch3) stable-security; urgency=high * Add upstream patches 7.0.234 and 7.0.235 which fix CVE-2007-2438. (Closes: #435401) * Add upstream patch 7.1.039 which fixes CVE-2007-2953. (Closes: #438593) stable/main/binary-sparc/vim-tiny_7.0-122+1etch3_sparc.deb stable/main/binary-sparc/vim-ruby_7.0-122+1etch3_sparc.deb stable/main/binary-sparc/vim-tcl_7.0-122+1etch3_sparc.deb stable/main/binary-sparc/vim-gtk_7.0-122+1etch3_sparc.deb stable/main/binary-sparc/vim-lesstif_7.0-122+1etch3_sparc.deb stable/main/binary-sparc/vim-perl_7.0-122+1etch3_sparc.deb stable/main/binary-sparc/vim-python_7.0-122+1etch3_sparc.deb stable/main/binary-sparc/vim-gnome_7.0-122+1etch3_sparc.deb stable/main/binary-sparc/vim-full_7.0-122+1etch3_sparc.deb stable/main/binary-sparc/vim-common_7.0-122+1etch3_sparc.deb stable/main/binary-sparc/vim_7.0-122+1etch3_sparc.deb vim (1:7.0-122+1etch3) stable-security; urgency=high * Add upstream patches 7.0.234 and 7.0.235 which fix CVE-2007-2438. (Closes: #435401) * Add upstream patch 7.1.039 which fixes CVE-2007-2953. (Closes: #438593) stable/main/binary-alpha/vlc_0.8.6-svn20061012.debian-5etch1_alpha.deb stable/main/binary-alpha/vlc-nox_0.8.6-svn20061012.debian-5etch1_alpha.deb stable/main/binary-alpha/libvlc0_0.8.6-svn20061012.debian-5etch1_alpha.deb stable/main/binary-alpha/libvlc0-dev_0.8.6-svn20061012.debian-5etch1_alpha.deb stable/main/binary-alpha/vlc-plugin-esd_0.8.6-svn20061012.debian-5etch1_alpha.deb stable/main/binary-alpha/vlc-plugin-sdl_0.8.6-svn20061012.debian-5etch1_alpha.deb stable/main/binary-alpha/vlc-plugin-ggi_0.8.6-svn20061012.debian-5etch1_alpha.deb stable/main/binary-alpha/vlc-plugin-arts_0.8.6-svn20061012.debian-5etch1_alpha.deb stable/main/binary-alpha/mozilla-plugin-vlc_0.8.6-svn20061012.debian-5etch1_alpha.deb vlc (0.8.6-svn20061012.debian-5etch1) stable-security; urgency=high * patch-formatstring-0.8.6debian-0.8.6c.diff: + Fix format string vulnerabilities (VideoLAN-SA-0702) (Closes: #429726). * patch-overflows-0.8.6debian-0.8.6c.diff: + Fix integer and buffer overflows. * patch-memleak-0.8.6debian-0.8.6c.diff: * patch-missingchecks-0.8.6debian-0.8.6c.diff: * patch-uninitialised-0.8.6debian-0.8.6c.diff: + Fix memory leaks, missing checks and uninitialised variables that can lead to denials of service. stable/main/binary-amd64/vlc_0.8.6-svn20061012.debian-5etch1_amd64.deb stable/main/binary-amd64/vlc-nox_0.8.6-svn20061012.debian-5etch1_amd64.deb stable/main/binary-amd64/libvlc0_0.8.6-svn20061012.debian-5etch1_amd64.deb stable/main/binary-amd64/libvlc0-dev_0.8.6-svn20061012.debian-5etch1_amd64.deb stable/main/binary-amd64/vlc-plugin-esd_0.8.6-svn20061012.debian-5etch1_amd64.deb stable/main/binary-amd64/vlc-plugin-sdl_0.8.6-svn20061012.debian-5etch1_amd64.deb stable/main/binary-amd64/vlc-plugin-ggi_0.8.6-svn20061012.debian-5etch1_amd64.deb stable/main/binary-amd64/vlc-plugin-arts_0.8.6-svn20061012.debian-5etch1_amd64.deb stable/main/binary-amd64/mozilla-plugin-vlc_0.8.6-svn20061012.debian-5etch1_amd64.deb vlc (0.8.6-svn20061012.debian-5etch1) stable-security; urgency=high * patch-formatstring-0.8.6debian-0.8.6c.diff: + Fix format string vulnerabilities (VideoLAN-SA-0702) (Closes: #429726). * patch-overflows-0.8.6debian-0.8.6c.diff: + Fix integer and buffer overflows. * patch-memleak-0.8.6debian-0.8.6c.diff: * patch-missingchecks-0.8.6debian-0.8.6c.diff: * patch-uninitialised-0.8.6debian-0.8.6c.diff: + Fix memory leaks, missing checks and uninitialised variables that can lead to denials of service. stable/main/binary-arm/vlc_0.8.6-svn20061012.debian-5etch1_arm.deb stable/main/binary-arm/vlc-nox_0.8.6-svn20061012.debian-5etch1_arm.deb stable/main/binary-arm/libvlc0_0.8.6-svn20061012.debian-5etch1_arm.deb stable/main/binary-arm/libvlc0-dev_0.8.6-svn20061012.debian-5etch1_arm.deb stable/main/binary-arm/vlc-plugin-esd_0.8.6-svn20061012.debian-5etch1_arm.deb stable/main/binary-arm/vlc-plugin-sdl_0.8.6-svn20061012.debian-5etch1_arm.deb stable/main/binary-arm/vlc-plugin-ggi_0.8.6-svn20061012.debian-5etch1_arm.deb stable/main/binary-arm/vlc-plugin-arts_0.8.6-svn20061012.debian-5etch1_arm.deb stable/main/binary-arm/mozilla-plugin-vlc_0.8.6-svn20061012.debian-5etch1_arm.deb vlc (0.8.6-svn20061012.debian-5etch1) stable-security; urgency=high * patch-formatstring-0.8.6debian-0.8.6c.diff: + Fix format string vulnerabilities (VideoLAN-SA-0702) (Closes: #429726). * patch-overflows-0.8.6debian-0.8.6c.diff: + Fix integer and buffer overflows. * patch-memleak-0.8.6debian-0.8.6c.diff: * patch-missingchecks-0.8.6debian-0.8.6c.diff: * patch-uninitialised-0.8.6debian-0.8.6c.diff: + Fix memory leaks, missing checks and uninitialised variables that can lead to denials of service. stable/main/binary-hppa/vlc_0.8.6-svn20061012.debian-5etch1_hppa.deb stable/main/binary-hppa/vlc-nox_0.8.6-svn20061012.debian-5etch1_hppa.deb stable/main/binary-hppa/libvlc0_0.8.6-svn20061012.debian-5etch1_hppa.deb stable/main/binary-hppa/libvlc0-dev_0.8.6-svn20061012.debian-5etch1_hppa.deb stable/main/binary-hppa/vlc-plugin-esd_0.8.6-svn20061012.debian-5etch1_hppa.deb stable/main/binary-hppa/vlc-plugin-sdl_0.8.6-svn20061012.debian-5etch1_hppa.deb stable/main/binary-hppa/vlc-plugin-ggi_0.8.6-svn20061012.debian-5etch1_hppa.deb stable/main/binary-hppa/vlc-plugin-arts_0.8.6-svn20061012.debian-5etch1_hppa.deb stable/main/binary-hppa/mozilla-plugin-vlc_0.8.6-svn20061012.debian-5etch1_hppa.deb vlc (0.8.6-svn20061012.debian-5etch1) stable-security; urgency=high * patch-formatstring-0.8.6debian-0.8.6c.diff: + Fix format string vulnerabilities (VideoLAN-SA-0702) (Closes: #429726). * patch-overflows-0.8.6debian-0.8.6c.diff: + Fix integer and buffer overflows. * patch-memleak-0.8.6debian-0.8.6c.diff: * patch-missingchecks-0.8.6debian-0.8.6c.diff: * patch-uninitialised-0.8.6debian-0.8.6c.diff: + Fix memory leaks, missing checks and uninitialised variables that can lead to denials of service. stable/main/source/vlc_0.8.6-svn20061012.debian-5etch1.dsc stable/main/source/vlc_0.8.6-svn20061012.debian.orig.tar.gz stable/main/source/vlc_0.8.6-svn20061012.debian-5etch1.diff.gz stable/main/binary-all/vlc-plugin-alsa_0.8.6-svn20061012.debian-5etch1_all.deb stable/main/binary-all/wxvlc_0.8.6-svn20061012.debian-5etch1_all.deb stable/main/binary-i386/vlc_0.8.6-svn20061012.debian-5etch1_i386.deb stable/main/binary-i386/vlc-nox_0.8.6-svn20061012.debian-5etch1_i386.deb stable/main/binary-i386/libvlc0_0.8.6-svn20061012.debian-5etch1_i386.deb stable/main/binary-i386/libvlc0-dev_0.8.6-svn20061012.debian-5etch1_i386.deb stable/main/binary-i386/vlc-plugin-esd_0.8.6-svn20061012.debian-5etch1_i386.deb stable/main/binary-i386/vlc-plugin-sdl_0.8.6-svn20061012.debian-5etch1_i386.deb stable/main/binary-i386/vlc-plugin-ggi_0.8.6-svn20061012.debian-5etch1_i386.deb stable/main/binary-i386/vlc-plugin-glide_0.8.6-svn20061012.debian-5etch1_i386.deb stable/main/binary-i386/vlc-plugin-arts_0.8.6-svn20061012.debian-5etch1_i386.deb stable/main/binary-i386/mozilla-plugin-vlc_0.8.6-svn20061012.debian-5etch1_i386.deb stable/main/binary-i386/vlc-plugin-svgalib_0.8.6-svn20061012.debian-5etch1_i386.deb vlc (0.8.6-svn20061012.debian-5etch1) stable-security; urgency=high * patch-formatstring-0.8.6debian-0.8.6c.diff: + Fix format string vulnerabilities (VideoLAN-SA-0702) (Closes: #429726). * patch-overflows-0.8.6debian-0.8.6c.diff: + Fix integer and buffer overflows. * patch-memleak-0.8.6debian-0.8.6c.diff: * patch-missingchecks-0.8.6debian-0.8.6c.diff: * patch-uninitialised-0.8.6debian-0.8.6c.diff: + Fix memory leaks, missing checks and uninitialised variables that can lead to denials of service. stable/main/binary-ia64/vlc_0.8.6-svn20061012.debian-5etch1_ia64.deb stable/main/binary-ia64/vlc-nox_0.8.6-svn20061012.debian-5etch1_ia64.deb stable/main/binary-ia64/libvlc0_0.8.6-svn20061012.debian-5etch1_ia64.deb stable/main/binary-ia64/libvlc0-dev_0.8.6-svn20061012.debian-5etch1_ia64.deb stable/main/binary-ia64/vlc-plugin-esd_0.8.6-svn20061012.debian-5etch1_ia64.deb stable/main/binary-ia64/vlc-plugin-sdl_0.8.6-svn20061012.debian-5etch1_ia64.deb stable/main/binary-ia64/vlc-plugin-ggi_0.8.6-svn20061012.debian-5etch1_ia64.deb stable/main/binary-ia64/vlc-plugin-arts_0.8.6-svn20061012.debian-5etch1_ia64.deb stable/main/binary-ia64/mozilla-plugin-vlc_0.8.6-svn20061012.debian-5etch1_ia64.deb vlc (0.8.6-svn20061012.debian-5etch1) stable-security; urgency=high * patch-formatstring-0.8.6debian-0.8.6c.diff: + Fix format string vulnerabilities (VideoLAN-SA-0702) (Closes: #429726). * patch-overflows-0.8.6debian-0.8.6c.diff: + Fix integer and buffer overflows. * patch-memleak-0.8.6debian-0.8.6c.diff: * patch-missingchecks-0.8.6debian-0.8.6c.diff: * patch-uninitialised-0.8.6debian-0.8.6c.diff: + Fix memory leaks, missing checks and uninitialised variables that can lead to denials of service. stable/main/binary-mips/vlc_0.8.6-svn20061012.debian-5etch1_mips.deb stable/main/binary-mips/vlc-nox_0.8.6-svn20061012.debian-5etch1_mips.deb stable/main/binary-mips/libvlc0_0.8.6-svn20061012.debian-5etch1_mips.deb stable/main/binary-mips/libvlc0-dev_0.8.6-svn20061012.debian-5etch1_mips.deb stable/main/binary-mips/vlc-plugin-esd_0.8.6-svn20061012.debian-5etch1_mips.deb stable/main/binary-mips/vlc-plugin-sdl_0.8.6-svn20061012.debian-5etch1_mips.deb stable/main/binary-mips/vlc-plugin-ggi_0.8.6-svn20061012.debian-5etch1_mips.deb stable/main/binary-mips/vlc-plugin-arts_0.8.6-svn20061012.debian-5etch1_mips.deb stable/main/binary-mips/mozilla-plugin-vlc_0.8.6-svn20061012.debian-5etch1_mips.deb vlc (0.8.6-svn20061012.debian-5etch1) stable-security; urgency=high * patch-formatstring-0.8.6debian-0.8.6c.diff: + Fix format string vulnerabilities (VideoLAN-SA-0702) (Closes: #429726). * patch-overflows-0.8.6debian-0.8.6c.diff: + Fix integer and buffer overflows. * patch-memleak-0.8.6debian-0.8.6c.diff: * patch-missingchecks-0.8.6debian-0.8.6c.diff: * patch-uninitialised-0.8.6debian-0.8.6c.diff: + Fix memory leaks, missing checks and uninitialised variables that can lead to denials of service. stable/main/binary-mipsel/vlc_0.8.6-svn20061012.debian-5etch1_mipsel.deb stable/main/binary-mipsel/vlc-nox_0.8.6-svn20061012.debian-5etch1_mipsel.deb stable/main/binary-mipsel/libvlc0_0.8.6-svn20061012.debian-5etch1_mipsel.deb stable/main/binary-mipsel/libvlc0-dev_0.8.6-svn20061012.debian-5etch1_mipsel.deb stable/main/binary-mipsel/vlc-plugin-esd_0.8.6-svn20061012.debian-5etch1_mipsel.deb stable/main/binary-mipsel/vlc-plugin-sdl_0.8.6-svn20061012.debian-5etch1_mipsel.deb stable/main/binary-mipsel/vlc-plugin-ggi_0.8.6-svn20061012.debian-5etch1_mipsel.deb stable/main/binary-mipsel/vlc-plugin-arts_0.8.6-svn20061012.debian-5etch1_mipsel.deb stable/main/binary-mipsel/mozilla-plugin-vlc_0.8.6-svn20061012.debian-5etch1_mipsel.deb vlc (0.8.6-svn20061012.debian-5etch1) stable-security; urgency=high * patch-formatstring-0.8.6debian-0.8.6c.diff: + Fix format string vulnerabilities (VideoLAN-SA-0702) (Closes: #429726). * patch-overflows-0.8.6debian-0.8.6c.diff: + Fix integer and buffer overflows. * patch-memleak-0.8.6debian-0.8.6c.diff: * patch-missingchecks-0.8.6debian-0.8.6c.diff: * patch-uninitialised-0.8.6debian-0.8.6c.diff: + Fix memory leaks, missing checks and uninitialised variables that can lead to denials of service. stable/main/binary-powerpc/vlc_0.8.6-svn20061012.debian-5etch1_powerpc.deb stable/main/binary-powerpc/vlc-nox_0.8.6-svn20061012.debian-5etch1_powerpc.deb stable/main/binary-powerpc/libvlc0_0.8.6-svn20061012.debian-5etch1_powerpc.deb stable/main/binary-powerpc/libvlc0-dev_0.8.6-svn20061012.debian-5etch1_powerpc.deb stable/main/binary-powerpc/vlc-plugin-esd_0.8.6-svn20061012.debian-5etch1_powerpc.deb stable/main/binary-powerpc/vlc-plugin-sdl_0.8.6-svn20061012.debian-5etch1_powerpc.deb stable/main/binary-powerpc/vlc-plugin-ggi_0.8.6-svn20061012.debian-5etch1_powerpc.deb stable/main/binary-powerpc/vlc-plugin-arts_0.8.6-svn20061012.debian-5etch1_powerpc.deb stable/main/binary-powerpc/mozilla-plugin-vlc_0.8.6-svn20061012.debian-5etch1_powerpc.deb vlc (0.8.6-svn20061012.debian-5etch1) stable-security; urgency=high * patch-formatstring-0.8.6debian-0.8.6c.diff: + Fix format string vulnerabilities (VideoLAN-SA-0702) (Closes: #429726). * patch-overflows-0.8.6debian-0.8.6c.diff: + Fix integer and buffer overflows. * patch-memleak-0.8.6debian-0.8.6c.diff: * patch-missingchecks-0.8.6debian-0.8.6c.diff: * patch-uninitialised-0.8.6debian-0.8.6c.diff: + Fix memory leaks, missing checks and uninitialised variables that can lead to denials of service. stable/main/binary-s390/vlc_0.8.6-svn20061012.debian-5etch1_s390.deb stable/main/binary-s390/vlc-nox_0.8.6-svn20061012.debian-5etch1_s390.deb stable/main/binary-s390/libvlc0_0.8.6-svn20061012.debian-5etch1_s390.deb stable/main/binary-s390/libvlc0-dev_0.8.6-svn20061012.debian-5etch1_s390.deb stable/main/binary-s390/vlc-plugin-esd_0.8.6-svn20061012.debian-5etch1_s390.deb stable/main/binary-s390/vlc-plugin-sdl_0.8.6-svn20061012.debian-5etch1_s390.deb stable/main/binary-s390/vlc-plugin-ggi_0.8.6-svn20061012.debian-5etch1_s390.deb stable/main/binary-s390/vlc-plugin-arts_0.8.6-svn20061012.debian-5etch1_s390.deb stable/main/binary-s390/mozilla-plugin-vlc_0.8.6-svn20061012.debian-5etch1_s390.deb vlc (0.8.6-svn20061012.debian-5etch1) stable-security; urgency=high * patch-formatstring-0.8.6debian-0.8.6c.diff: + Fix format string vulnerabilities (VideoLAN-SA-0702) (Closes: #429726). * patch-overflows-0.8.6debian-0.8.6c.diff: + Fix integer and buffer overflows. * patch-memleak-0.8.6debian-0.8.6c.diff: * patch-missingchecks-0.8.6debian-0.8.6c.diff: * patch-uninitialised-0.8.6debian-0.8.6c.diff: + Fix memory leaks, missing checks and uninitialised variables that can lead to denials of service. stable/main/binary-sparc/vlc_0.8.6-svn20061012.debian-5etch1_sparc.deb stable/main/binary-sparc/vlc-nox_0.8.6-svn20061012.debian-5etch1_sparc.deb stable/main/binary-sparc/libvlc0_0.8.6-svn20061012.debian-5etch1_sparc.deb stable/main/binary-sparc/libvlc0-dev_0.8.6-svn20061012.debian-5etch1_sparc.deb stable/main/binary-sparc/vlc-plugin-esd_0.8.6-svn20061012.debian-5etch1_sparc.deb stable/main/binary-sparc/vlc-plugin-sdl_0.8.6-svn20061012.debian-5etch1_sparc.deb stable/main/binary-sparc/vlc-plugin-ggi_0.8.6-svn20061012.debian-5etch1_sparc.deb stable/main/binary-sparc/vlc-plugin-arts_0.8.6-svn20061012.debian-5etch1_sparc.deb stable/main/binary-sparc/mozilla-plugin-vlc_0.8.6-svn20061012.debian-5etch1_sparc.deb vlc (0.8.6-svn20061012.debian-5etch1) stable-security; urgency=high * patch-formatstring-0.8.6debian-0.8.6c.diff: + Fix format string vulnerabilities (VideoLAN-SA-0702) (Closes: #429726). * patch-overflows-0.8.6debian-0.8.6c.diff: + Fix integer and buffer overflows. * patch-memleak-0.8.6debian-0.8.6c.diff: * patch-missingchecks-0.8.6debian-0.8.6c.diff: * patch-uninitialised-0.8.6debian-0.8.6c.diff: + Fix memory leaks, missing checks and uninitialised variables that can lead to denials of service. stable/main/binary-alpha/wesnoth_1.2-4_alpha.deb stable/main/binary-alpha/wesnoth-server_1.2-4_alpha.deb stable/main/binary-alpha/wesnoth-editor_1.2-4_alpha.deb wesnoth (1.2-4) stable; urgency=low * Remove WML turn_cmd which can lead to forking yes and through that 100% CPU usage and stdout filling [CVE-2007-6201]. Patch CVE-2007-6201 was pulled from upstream svn (revision 21907). stable/main/binary-amd64/wesnoth_1.2-4_amd64.deb stable/main/binary-amd64/wesnoth-server_1.2-4_amd64.deb stable/main/binary-amd64/wesnoth-editor_1.2-4_amd64.deb wesnoth (1.2-4) stable; urgency=low * Remove WML turn_cmd which can lead to forking yes and through that 100% CPU usage and stdout filling [CVE-2007-6201]. Patch CVE-2007-6201 was pulled from upstream svn (revision 21907). stable/main/binary-arm/wesnoth_1.2-4_arm.deb stable/main/binary-arm/wesnoth-server_1.2-4_arm.deb stable/main/binary-arm/wesnoth-editor_1.2-4_arm.deb wesnoth (1.2-4) stable; urgency=low * Remove WML turn_cmd which can lead to forking yes and through that 100% CPU usage and stdout filling [CVE-2007-6201]. Patch CVE-2007-6201 was pulled from upstream svn (revision 21907). stable/main/binary-hppa/wesnoth_1.2-4_hppa.deb stable/main/binary-hppa/wesnoth-server_1.2-4_hppa.deb stable/main/binary-hppa/wesnoth-editor_1.2-4_hppa.deb wesnoth (1.2-4) stable; urgency=low * Remove WML turn_cmd which can lead to forking yes and through that 100% CPU usage and stdout filling [CVE-2007-6201]. Patch CVE-2007-6201 was pulled from upstream svn (revision 21907). stable/main/binary-i386/wesnoth_1.2-4_i386.deb stable/main/binary-i386/wesnoth-server_1.2-4_i386.deb stable/main/binary-i386/wesnoth-editor_1.2-4_i386.deb wesnoth (1.2-4) stable; urgency=low * Remove WML turn_cmd which can lead to forking yes and through that 100% CPU usage and stdout filling [CVE-2007-6201]. Patch CVE-2007-6201 was pulled from upstream svn (revision 21907). stable/main/binary-ia64/wesnoth_1.2-4_ia64.deb stable/main/binary-ia64/wesnoth-server_1.2-4_ia64.deb stable/main/binary-ia64/wesnoth-editor_1.2-4_ia64.deb wesnoth (1.2-4) stable; urgency=low * Remove WML turn_cmd which can lead to forking yes and through that 100% CPU usage and stdout filling [CVE-2007-6201]. Patch CVE-2007-6201 was pulled from upstream svn (revision 21907). stable/main/binary-mips/wesnoth_1.2-4_mips.deb stable/main/binary-mips/wesnoth-server_1.2-4_mips.deb stable/main/binary-mips/wesnoth-editor_1.2-4_mips.deb wesnoth (1.2-4) stable; urgency=low * Remove WML turn_cmd which can lead to forking yes and through that 100% CPU usage and stdout filling [CVE-2007-6201]. Patch CVE-2007-6201 was pulled from upstream svn (revision 21907). stable/main/binary-mipsel/wesnoth_1.2-4_mipsel.deb stable/main/binary-mipsel/wesnoth-server_1.2-4_mipsel.deb stable/main/binary-mipsel/wesnoth-editor_1.2-4_mipsel.deb wesnoth (1.2-4) stable; urgency=low * Remove WML turn_cmd which can lead to forking yes and through that 100% CPU usage and stdout filling [CVE-2007-6201]. Patch CVE-2007-6201 was pulled from upstream svn (revision 21907). stable/main/source/wesnoth_1.2-4.dsc stable/main/source/wesnoth_1.2-4.diff.gz stable/main/binary-all/wesnoth-data_1.2-4_all.deb stable/main/binary-all/wesnoth-music_1.2-4_all.deb stable/main/binary-all/wesnoth-httt_1.2-4_all.deb stable/main/binary-all/wesnoth-tsg_1.2-4_all.deb stable/main/binary-all/wesnoth-trow_1.2-4_all.deb stable/main/binary-all/wesnoth-ttb_1.2-4_all.deb stable/main/binary-all/wesnoth-ei_1.2-4_all.deb stable/main/binary-all/wesnoth-utbs_1.2-4_all.deb stable/main/binary-powerpc/wesnoth_1.2-4_powerpc.deb stable/main/binary-powerpc/wesnoth-server_1.2-4_powerpc.deb stable/main/binary-powerpc/wesnoth-editor_1.2-4_powerpc.deb wesnoth (1.2-4) stable; urgency=low * Remove WML turn_cmd which can lead to forking yes and through that 100% CPU usage and stdout filling [CVE-2007-6201]. Patch CVE-2007-6201 was pulled from upstream svn (revision 21907). stable/main/binary-s390/wesnoth_1.2-4_s390.deb stable/main/binary-s390/wesnoth-server_1.2-4_s390.deb stable/main/binary-s390/wesnoth-editor_1.2-4_s390.deb wesnoth (1.2-4) stable; urgency=low * Remove WML turn_cmd which can lead to forking yes and through that 100% CPU usage and stdout filling [CVE-2007-6201]. Patch CVE-2007-6201 was pulled from upstream svn (revision 21907). stable/main/binary-sparc/wesnoth_1.2-4_sparc.deb stable/main/binary-sparc/wesnoth-server_1.2-4_sparc.deb stable/main/binary-sparc/wesnoth-editor_1.2-4_sparc.deb wesnoth (1.2-4) stable; urgency=low * Remove WML turn_cmd which can lead to forking yes and through that 100% CPU usage and stdout filling [CVE-2007-6201]. Patch CVE-2007-6201 was pulled from upstream svn (revision 21907). stable/main/binary-alpha/wireshark-common_0.99.4-5.etch.1_alpha.deb stable/main/binary-alpha/wireshark_0.99.4-5.etch.1_alpha.deb stable/main/binary-alpha/tshark_0.99.4-5.etch.1_alpha.deb stable/main/binary-alpha/wireshark-dev_0.99.4-5.etch.1_alpha.deb stable/main/binary-alpha/ethereal-common_0.99.4-5.etch.1_alpha.deb stable/main/binary-alpha/ethereal-dev_0.99.4-5.etch.1_alpha.deb stable/main/binary-alpha/ethereal_0.99.4-5.etch.1_alpha.deb stable/main/binary-alpha/tethereal_0.99.4-5.etch.1_alpha.deb wireshark (0.99.4-5.etch.1) stable-security; urgency=high * Backported security fixes from 0.99.7 stable/main/binary-amd64/wireshark-common_0.99.4-5.etch.1_amd64.deb stable/main/binary-amd64/wireshark_0.99.4-5.etch.1_amd64.deb stable/main/binary-amd64/tshark_0.99.4-5.etch.1_amd64.deb stable/main/binary-amd64/wireshark-dev_0.99.4-5.etch.1_amd64.deb stable/main/binary-amd64/ethereal-common_0.99.4-5.etch.1_amd64.deb stable/main/binary-amd64/ethereal-dev_0.99.4-5.etch.1_amd64.deb stable/main/binary-amd64/ethereal_0.99.4-5.etch.1_amd64.deb stable/main/binary-amd64/tethereal_0.99.4-5.etch.1_amd64.deb wireshark (0.99.4-5.etch.1) stable-security; urgency=high * Backported security fixes from 0.99.7 stable/main/binary-arm/wireshark-common_0.99.4-5.etch.1_arm.deb stable/main/binary-arm/wireshark_0.99.4-5.etch.1_arm.deb stable/main/binary-arm/tshark_0.99.4-5.etch.1_arm.deb stable/main/binary-arm/wireshark-dev_0.99.4-5.etch.1_arm.deb stable/main/binary-arm/ethereal-common_0.99.4-5.etch.1_arm.deb stable/main/binary-arm/ethereal-dev_0.99.4-5.etch.1_arm.deb stable/main/binary-arm/ethereal_0.99.4-5.etch.1_arm.deb stable/main/binary-arm/tethereal_0.99.4-5.etch.1_arm.deb wireshark (0.99.4-5.etch.1) stable-security; urgency=high * Backported security fixes from 0.99.7 stable/main/binary-hppa/wireshark-common_0.99.4-5.etch.1_hppa.deb stable/main/binary-hppa/wireshark_0.99.4-5.etch.1_hppa.deb stable/main/binary-hppa/tshark_0.99.4-5.etch.1_hppa.deb stable/main/binary-hppa/wireshark-dev_0.99.4-5.etch.1_hppa.deb stable/main/binary-hppa/ethereal-common_0.99.4-5.etch.1_hppa.deb stable/main/binary-hppa/ethereal-dev_0.99.4-5.etch.1_hppa.deb stable/main/binary-hppa/ethereal_0.99.4-5.etch.1_hppa.deb stable/main/binary-hppa/tethereal_0.99.4-5.etch.1_hppa.deb wireshark (0.99.4-5.etch.1) stable-security; urgency=high * Backported security fixes from 0.99.7 stable/main/source/wireshark_0.99.4-5.etch.1.dsc stable/main/source/wireshark_0.99.4-5.etch.1.diff.gz stable/main/binary-i386/wireshark-common_0.99.4-5.etch.1_i386.deb stable/main/binary-i386/wireshark_0.99.4-5.etch.1_i386.deb stable/main/binary-i386/tshark_0.99.4-5.etch.1_i386.deb stable/main/binary-i386/wireshark-dev_0.99.4-5.etch.1_i386.deb stable/main/binary-i386/ethereal-common_0.99.4-5.etch.1_i386.deb stable/main/binary-i386/ethereal-dev_0.99.4-5.etch.1_i386.deb stable/main/binary-i386/ethereal_0.99.4-5.etch.1_i386.deb stable/main/binary-i386/tethereal_0.99.4-5.etch.1_i386.deb wireshark (0.99.4-5.etch.1) stable-security; urgency=high * Backported security fixes from 0.99.7 stable/main/binary-ia64/wireshark-common_0.99.4-5.etch.1_ia64.deb stable/main/binary-ia64/wireshark_0.99.4-5.etch.1_ia64.deb stable/main/binary-ia64/tshark_0.99.4-5.etch.1_ia64.deb stable/main/binary-ia64/wireshark-dev_0.99.4-5.etch.1_ia64.deb stable/main/binary-ia64/ethereal-common_0.99.4-5.etch.1_ia64.deb stable/main/binary-ia64/ethereal-dev_0.99.4-5.etch.1_ia64.deb stable/main/binary-ia64/ethereal_0.99.4-5.etch.1_ia64.deb stable/main/binary-ia64/tethereal_0.99.4-5.etch.1_ia64.deb wireshark (0.99.4-5.etch.1) stable-security; urgency=high * Backported security fixes from 0.99.7 stable/main/binary-mips/wireshark-common_0.99.4-5.etch.1_mips.deb stable/main/binary-mips/wireshark_0.99.4-5.etch.1_mips.deb stable/main/binary-mips/tshark_0.99.4-5.etch.1_mips.deb stable/main/binary-mips/wireshark-dev_0.99.4-5.etch.1_mips.deb stable/main/binary-mips/ethereal-common_0.99.4-5.etch.1_mips.deb stable/main/binary-mips/ethereal-dev_0.99.4-5.etch.1_mips.deb stable/main/binary-mips/ethereal_0.99.4-5.etch.1_mips.deb stable/main/binary-mips/tethereal_0.99.4-5.etch.1_mips.deb wireshark (0.99.4-5.etch.1) stable-security; urgency=high * Backported security fixes from 0.99.7 stable/main/binary-mipsel/wireshark-common_0.99.4-5.etch.1_mipsel.deb stable/main/binary-mipsel/wireshark_0.99.4-5.etch.1_mipsel.deb stable/main/binary-mipsel/tshark_0.99.4-5.etch.1_mipsel.deb stable/main/binary-mipsel/wireshark-dev_0.99.4-5.etch.1_mipsel.deb stable/main/binary-mipsel/ethereal-common_0.99.4-5.etch.1_mipsel.deb stable/main/binary-mipsel/ethereal-dev_0.99.4-5.etch.1_mipsel.deb stable/main/binary-mipsel/ethereal_0.99.4-5.etch.1_mipsel.deb stable/main/binary-mipsel/tethereal_0.99.4-5.etch.1_mipsel.deb wireshark (0.99.4-5.etch.1) stable-security; urgency=high * Backported security fixes from 0.99.7 stable/main/binary-powerpc/wireshark-common_0.99.4-5.etch.1_powerpc.deb stable/main/binary-powerpc/wireshark_0.99.4-5.etch.1_powerpc.deb stable/main/binary-powerpc/tshark_0.99.4-5.etch.1_powerpc.deb stable/main/binary-powerpc/wireshark-dev_0.99.4-5.etch.1_powerpc.deb stable/main/binary-powerpc/ethereal-common_0.99.4-5.etch.1_powerpc.deb stable/main/binary-powerpc/ethereal-dev_0.99.4-5.etch.1_powerpc.deb stable/main/binary-powerpc/ethereal_0.99.4-5.etch.1_powerpc.deb stable/main/binary-powerpc/tethereal_0.99.4-5.etch.1_powerpc.deb wireshark (0.99.4-5.etch.1) stable-security; urgency=high * Backported security fixes from 0.99.7 stable/main/binary-s390/wireshark-common_0.99.4-5.etch.1_s390.deb stable/main/binary-s390/wireshark_0.99.4-5.etch.1_s390.deb stable/main/binary-s390/tshark_0.99.4-5.etch.1_s390.deb stable/main/binary-s390/wireshark-dev_0.99.4-5.etch.1_s390.deb stable/main/binary-s390/ethereal-common_0.99.4-5.etch.1_s390.deb stable/main/binary-s390/ethereal-dev_0.99.4-5.etch.1_s390.deb stable/main/binary-s390/ethereal_0.99.4-5.etch.1_s390.deb stable/main/binary-s390/tethereal_0.99.4-5.etch.1_s390.deb wireshark (0.99.4-5.etch.1) stable-security; urgency=high * Backported security fixes from 0.99.7 stable/main/binary-sparc/wireshark-common_0.99.4-5.etch.1_sparc.deb stable/main/binary-sparc/wireshark_0.99.4-5.etch.1_sparc.deb stable/main/binary-sparc/tshark_0.99.4-5.etch.1_sparc.deb stable/main/binary-sparc/wireshark-dev_0.99.4-5.etch.1_sparc.deb stable/main/binary-sparc/ethereal-common_0.99.4-5.etch.1_sparc.deb stable/main/binary-sparc/ethereal-dev_0.99.4-5.etch.1_sparc.deb stable/main/binary-sparc/ethereal_0.99.4-5.etch.1_sparc.deb stable/main/binary-sparc/tethereal_0.99.4-5.etch.1_sparc.deb wireshark (0.99.4-5.etch.1) stable-security; urgency=high * Backported security fixes from 0.99.7 stable/main/source/xen-3.0_3.0.3-0-4.dsc stable/main/source/xen-3.0_3.0.3-0-4.diff.gz stable/main/binary-all/xen-docs-3.0_3.0.3-0-4_all.deb stable/main/binary-amd64/xen-utils-3.0.3-1_3.0.3-0-4_amd64.deb stable/main/binary-amd64/xen-ioemu-3.0.3-1_3.0.3-0-4_amd64.deb stable/main/binary-amd64/xen-hypervisor-3.0.3-1-amd64_3.0.3-0-4_amd64.deb xen-3.0 (3.0.3-0-4) stable-security; urgency=low * Non-maintainer upload by The Security Team. * Avoid the use of an insecure temporary file for communication between xenmon.py & xenbaked. [CVE-2007-3919] stable/main/binary-i386/xen-utils-3.0.3-1_3.0.3-0-4_i386.deb stable/main/binary-i386/xen-ioemu-3.0.3-1_3.0.3-0-4_i386.deb stable/main/binary-i386/xen-hypervisor-3.0.3-1-i386_3.0.3-0-4_i386.deb stable/main/binary-i386/xen-hypervisor-3.0.3-1-i386-pae_3.0.3-0-4_i386.deb xen-3.0 (3.0.3-0-4) stable-security; urgency=low * Non-maintainer upload by The Security Team. * Avoid the use of an insecure temporary file for communication between xenmon.py & xenbaked. [CVE-2007-3919] stable/main/binary-alpha/xfce4-terminal_0.2.5.6rc1-2etch1_alpha.deb xfce4-terminal (0.2.5.6rc1-2etch1) stable-security; urgency=high * Non-maintainer upload by The Security Team. * Fix security problem in URL handling code thanks to Darren Salt. [CVE-2007-3770] stable/main/source/xfce4-terminal_0.2.5.6rc1-2etch1.dsc stable/main/source/xfce4-terminal_0.2.5.6rc1.orig.tar.gz stable/main/source/xfce4-terminal_0.2.5.6rc1-2etch1.diff.gz stable/main/binary-amd64/xfce4-terminal_0.2.5.6rc1-2etch1_amd64.deb xfce4-terminal (0.2.5.6rc1-2etch1) stable-security; urgency=high * Non-maintainer upload by The Security Team. * Fix security problem in URL handling code thanks to Darren Salt. [CVE-2007-3770] stable/main/binary-arm/xfce4-terminal_0.2.5.6rc1-2etch1_arm.deb xfce4-terminal (0.2.5.6rc1-2etch1) stable-security; urgency=high * Non-maintainer upload by The Security Team. * Fix security problem in URL handling code thanks to Darren Salt. [CVE-2007-3770] stable/main/binary-hppa/xfce4-terminal_0.2.5.6rc1-2etch1_hppa.deb xfce4-terminal (0.2.5.6rc1-2etch1) stable-security; urgency=high * Non-maintainer upload by The Security Team. * Fix security problem in URL handling code thanks to Darren Salt. [CVE-2007-3770] stable/main/binary-i386/xfce4-terminal_0.2.5.6rc1-2etch1_i386.deb xfce4-terminal (0.2.5.6rc1-2etch1) stable-security; urgency=high * Non-maintainer upload by The Security Team. * Fix security problem in URL handling code thanks to Darren Salt. [CVE-2007-3770] stable/main/binary-ia64/xfce4-terminal_0.2.5.6rc1-2etch1_ia64.deb xfce4-terminal (0.2.5.6rc1-2etch1) stable-security; urgency=high * Non-maintainer upload by The Security Team. * Fix security problem in URL handling code thanks to Darren Salt. [CVE-2007-3770] stable/main/binary-mips/xfce4-terminal_0.2.5.6rc1-2etch1_mips.deb xfce4-terminal (0.2.5.6rc1-2etch1) stable-security; urgency=high * Non-maintainer upload by The Security Team. * Fix security problem in URL handling code thanks to Darren Salt. [CVE-2007-3770] stable/main/binary-mipsel/xfce4-terminal_0.2.5.6rc1-2etch1_mipsel.deb xfce4-terminal (0.2.5.6rc1-2etch1) stable-security; urgency=high * Non-maintainer upload by The Security Team. * Fix security problem in URL handling code thanks to Darren Salt. [CVE-2007-3770] stable/main/binary-powerpc/xfce4-terminal_0.2.5.6rc1-2etch1_powerpc.deb xfce4-terminal (0.2.5.6rc1-2etch1) stable-security; urgency=high * Non-maintainer upload by The Security Team. * Fix security problem in URL handling code thanks to Darren Salt. [CVE-2007-3770] stable/main/binary-s390/xfce4-terminal_0.2.5.6rc1-2etch1_s390.deb xfce4-terminal (0.2.5.6rc1-2etch1) stable-security; urgency=high * Non-maintainer upload by The Security Team. * Fix security problem in URL handling code thanks to Darren Salt. [CVE-2007-3770] stable/main/binary-sparc/xfce4-terminal_0.2.5.6rc1-2etch1_sparc.deb xfce4-terminal (0.2.5.6rc1-2etch1) stable-security; urgency=high * Non-maintainer upload by The Security Team. * Fix security problem in URL handling code thanks to Darren Salt. [CVE-2007-3770] stable/main/binary-alpha/xfs_1.0.1-7_alpha.deb xfs (1:1.0.1-7) stable-security; urgency=high * Security upload. * Fix several vulnerabilities (CVE-2007-4568): The QueryXBitmaps and QueryXExtents protocol requests suffer from lack of validation of their 'length' parameters. Maliciously crafted requests can either cause two different problems with both requests: + An integer overflow in the computation of the size of a dynamic buffer can lead to a heap overflow in the build_range() function. + An arbitrary number of bytes on the heap can be swapped by the swap_char2b() function. * See upstream security advisory: http://lists.freedesktop.org/archives/xorg-announce/2007-October/000416.html stable/main/binary-amd64/xfs_1.0.1-7_amd64.deb xfs (1:1.0.1-7) stable-security; urgency=high * Security upload. * Fix several vulnerabilities (CVE-2007-4568): The QueryXBitmaps and QueryXExtents protocol requests suffer from lack of validation of their 'length' parameters. Maliciously crafted requests can either cause two different problems with both requests: + An integer overflow in the computation of the size of a dynamic buffer can lead to a heap overflow in the build_range() function. + An arbitrary number of bytes on the heap can be swapped by the swap_char2b() function. * See upstream security advisory: http://lists.freedesktop.org/archives/xorg-announce/2007-October/000416.html stable/main/binary-arm/xfs_1.0.1-7_arm.deb xfs (1:1.0.1-7) stable-security; urgency=high * Security upload. * Fix several vulnerabilities (CVE-2007-4568): The QueryXBitmaps and QueryXExtents protocol requests suffer from lack of validation of their 'length' parameters. Maliciously crafted requests can either cause two different problems with both requests: + An integer overflow in the computation of the size of a dynamic buffer can lead to a heap overflow in the build_range() function. + An arbitrary number of bytes on the heap can be swapped by the swap_char2b() function. * See upstream security advisory: http://lists.freedesktop.org/archives/xorg-announce/2007-October/000416.html stable/main/binary-hppa/xfs_1.0.1-7_hppa.deb xfs (1:1.0.1-7) stable-security; urgency=high * Security upload. * Fix several vulnerabilities (CVE-2007-4568): The QueryXBitmaps and QueryXExtents protocol requests suffer from lack of validation of their 'length' parameters. Maliciously crafted requests can either cause two different problems with both requests: + An integer overflow in the computation of the size of a dynamic buffer can lead to a heap overflow in the build_range() function. + An arbitrary number of bytes on the heap can be swapped by the swap_char2b() function. * See upstream security advisory: http://lists.freedesktop.org/archives/xorg-announce/2007-October/000416.html stable/main/source/xfs_1.0.1-7.dsc stable/main/source/xfs_1.0.1-7.diff.gz stable/main/binary-i386/xfs_1.0.1-7_i386.deb xfs (1:1.0.1-7) stable-security; urgency=high * Security upload. * Fix several vulnerabilities (CVE-2007-4568): The QueryXBitmaps and QueryXExtents protocol requests suffer from lack of validation of their 'length' parameters. Maliciously crafted requests can either cause two different problems with both requests: + An integer overflow in the computation of the size of a dynamic buffer can lead to a heap overflow in the build_range() function. + An arbitrary number of bytes on the heap can be swapped by the swap_char2b() function. * See upstream security advisory: http://lists.freedesktop.org/archives/xorg-announce/2007-October/000416.html stable/main/binary-ia64/xfs_1.0.1-7_ia64.deb xfs (1:1.0.1-7) stable-security; urgency=high * Security upload. * Fix several vulnerabilities (CVE-2007-4568): The QueryXBitmaps and QueryXExtents protocol requests suffer from lack of validation of their 'length' parameters. Maliciously crafted requests can either cause two different problems with both requests: + An integer overflow in the computation of the size of a dynamic buffer can lead to a heap overflow in the build_range() function. + An arbitrary number of bytes on the heap can be swapped by the swap_char2b() function. * See upstream security advisory: http://lists.freedesktop.org/archives/xorg-announce/2007-October/000416.html stable/main/binary-mips/xfs_1.0.1-7_mips.deb xfs (1:1.0.1-7) stable-security; urgency=high * Security upload. * Fix several vulnerabilities (CVE-2007-4568): The QueryXBitmaps and QueryXExtents protocol requests suffer from lack of validation of their 'length' parameters. Maliciously crafted requests can either cause two different problems with both requests: + An integer overflow in the computation of the size of a dynamic buffer can lead to a heap overflow in the build_range() function. + An arbitrary number of bytes on the heap can be swapped by the swap_char2b() function. * See upstream security advisory: http://lists.freedesktop.org/archives/xorg-announce/2007-October/000416.html stable/main/binary-mipsel/xfs_1.0.1-7_mipsel.deb xfs (1:1.0.1-7) stable-security; urgency=high * Security upload. * Fix several vulnerabilities (CVE-2007-4568): The QueryXBitmaps and QueryXExtents protocol requests suffer from lack of validation of their 'length' parameters. Maliciously crafted requests can either cause two different problems with both requests: + An integer overflow in the computation of the size of a dynamic buffer can lead to a heap overflow in the build_range() function. + An arbitrary number of bytes on the heap can be swapped by the swap_char2b() function. * See upstream security advisory: http://lists.freedesktop.org/archives/xorg-announce/2007-October/000416.html stable/main/binary-powerpc/xfs_1.0.1-7_powerpc.deb xfs (1:1.0.1-7) stable-security; urgency=high * Security upload. * Fix several vulnerabilities (CVE-2007-4568): The QueryXBitmaps and QueryXExtents protocol requests suffer from lack of validation of their 'length' parameters. Maliciously crafted requests can either cause two different problems with both requests: + An integer overflow in the computation of the size of a dynamic buffer can lead to a heap overflow in the build_range() function. + An arbitrary number of bytes on the heap can be swapped by the swap_char2b() function. * See upstream security advisory: http://lists.freedesktop.org/archives/xorg-announce/2007-October/000416.html stable/main/binary-s390/xfs_1.0.1-7_s390.deb xfs (1:1.0.1-7) stable-security; urgency=high * Security upload. * Fix several vulnerabilities (CVE-2007-4568): The QueryXBitmaps and QueryXExtents protocol requests suffer from lack of validation of their 'length' parameters. Maliciously crafted requests can either cause two different problems with both requests: + An integer overflow in the computation of the size of a dynamic buffer can lead to a heap overflow in the build_range() function. + An arbitrary number of bytes on the heap can be swapped by the swap_char2b() function. * See upstream security advisory: http://lists.freedesktop.org/archives/xorg-announce/2007-October/000416.html stable/main/binary-sparc/xfs_1.0.1-7_sparc.deb xfs (1:1.0.1-7) stable-security; urgency=high * Security upload. * Fix several vulnerabilities (CVE-2007-4568): The QueryXBitmaps and QueryXExtents protocol requests suffer from lack of validation of their 'length' parameters. Maliciously crafted requests can either cause two different problems with both requests: + An integer overflow in the computation of the size of a dynamic buffer can lead to a heap overflow in the build_range() function. + An arbitrary number of bytes on the heap can be swapped by the swap_char2b() function. * See upstream security advisory: http://lists.freedesktop.org/archives/xorg-announce/2007-October/000416.html stable/main/binary-alpha/xserver-xorg-core_1.1.1-21etch1_alpha.deb stable/main/binary-alpha/xserver-xorg-dev_1.1.1-21etch1_alpha.deb stable/main/binary-alpha/xdmx_1.1.1-21etch1_alpha.deb stable/main/binary-alpha/xdmx-tools_1.1.1-21etch1_alpha.deb stable/main/binary-alpha/xnest_1.1.1-21etch1_alpha.deb stable/main/binary-alpha/xvfb_1.1.1-21etch1_alpha.deb stable/main/binary-alpha/xserver-xephyr_1.1.1-21etch1_alpha.deb xorg-server (2:1.1.1-21etch1) stable-security; urgency=high * Add patch to fix a buffer overflow in the composite extension (freedesktop.org bug#7447). stable/main/binary-amd64/xserver-xorg-core_1.1.1-21etch1_amd64.deb stable/main/binary-amd64/xserver-xorg-dev_1.1.1-21etch1_amd64.deb stable/main/binary-amd64/xdmx_1.1.1-21etch1_amd64.deb stable/main/binary-amd64/xdmx-tools_1.1.1-21etch1_amd64.deb stable/main/binary-amd64/xnest_1.1.1-21etch1_amd64.deb stable/main/binary-amd64/xvfb_1.1.1-21etch1_amd64.deb stable/main/binary-amd64/xserver-xephyr_1.1.1-21etch1_amd64.deb xorg-server (2:1.1.1-21etch1) stable-security; urgency=high * Add patch to fix a buffer overflow in the composite extension (freedesktop.org bug#7447). stable/main/binary-arm/xserver-xorg-core_1.1.1-21etch1_arm.deb stable/main/binary-arm/xserver-xorg-dev_1.1.1-21etch1_arm.deb stable/main/binary-arm/xdmx_1.1.1-21etch1_arm.deb stable/main/binary-arm/xdmx-tools_1.1.1-21etch1_arm.deb stable/main/binary-arm/xnest_1.1.1-21etch1_arm.deb stable/main/binary-arm/xvfb_1.1.1-21etch1_arm.deb stable/main/binary-arm/xserver-xephyr_1.1.1-21etch1_arm.deb xorg-server (2:1.1.1-21etch1) stable-security; urgency=high * Add patch to fix a buffer overflow in the composite extension (freedesktop.org bug#7447). stable/main/binary-hppa/xserver-xorg-core_1.1.1-21etch1_hppa.deb stable/main/binary-hppa/xserver-xorg-dev_1.1.1-21etch1_hppa.deb stable/main/binary-hppa/xdmx_1.1.1-21etch1_hppa.deb stable/main/binary-hppa/xdmx-tools_1.1.1-21etch1_hppa.deb stable/main/binary-hppa/xnest_1.1.1-21etch1_hppa.deb stable/main/binary-hppa/xvfb_1.1.1-21etch1_hppa.deb stable/main/binary-hppa/xserver-xephyr_1.1.1-21etch1_hppa.deb xorg-server (2:1.1.1-21etch1) stable-security; urgency=high * Add patch to fix a buffer overflow in the composite extension (freedesktop.org bug#7447). stable/main/source/xorg-server_1.1.1-21etch1.dsc stable/main/source/xorg-server_1.1.1.orig.tar.gz stable/main/source/xorg-server_1.1.1-21etch1.diff.gz stable/main/binary-i386/xserver-xorg-core_1.1.1-21etch1_i386.deb stable/main/binary-i386/xserver-xorg-dev_1.1.1-21etch1_i386.deb stable/main/binary-i386/xdmx_1.1.1-21etch1_i386.deb stable/main/binary-i386/xdmx-tools_1.1.1-21etch1_i386.deb stable/main/binary-i386/xnest_1.1.1-21etch1_i386.deb stable/main/binary-i386/xvfb_1.1.1-21etch1_i386.deb stable/main/binary-i386/xserver-xephyr_1.1.1-21etch1_i386.deb xorg-server (2:1.1.1-21etch1) stable-security; urgency=high * Add patch to fix a buffer overflow in the composite extension (freedesktop.org bug#7447). stable/main/binary-ia64/xserver-xorg-core_1.1.1-21etch1_ia64.deb stable/main/binary-ia64/xserver-xorg-dev_1.1.1-21etch1_ia64.deb stable/main/binary-ia64/xdmx_1.1.1-21etch1_ia64.deb stable/main/binary-ia64/xdmx-tools_1.1.1-21etch1_ia64.deb stable/main/binary-ia64/xnest_1.1.1-21etch1_ia64.deb stable/main/binary-ia64/xvfb_1.1.1-21etch1_ia64.deb stable/main/binary-ia64/xserver-xephyr_1.1.1-21etch1_ia64.deb xorg-server (2:1.1.1-21etch1) stable-security; urgency=high * Add patch to fix a buffer overflow in the composite extension (freedesktop.org bug#7447). stable/main/binary-mips/xserver-xorg-core_1.1.1-21etch1_mips.deb stable/main/binary-mips/xserver-xorg-dev_1.1.1-21etch1_mips.deb stable/main/binary-mips/xdmx_1.1.1-21etch1_mips.deb stable/main/binary-mips/xdmx-tools_1.1.1-21etch1_mips.deb stable/main/binary-mips/xnest_1.1.1-21etch1_mips.deb stable/main/binary-mips/xvfb_1.1.1-21etch1_mips.deb stable/main/binary-mips/xserver-xephyr_1.1.1-21etch1_mips.deb xorg-server (2:1.1.1-21etch1) stable-security; urgency=high * Add patch to fix a buffer overflow in the composite extension (freedesktop.org bug#7447). stable/main/binary-mipsel/xserver-xorg-core_1.1.1-21etch1_mipsel.deb stable/main/binary-mipsel/xserver-xorg-dev_1.1.1-21etch1_mipsel.deb stable/main/binary-mipsel/xdmx_1.1.1-21etch1_mipsel.deb stable/main/binary-mipsel/xdmx-tools_1.1.1-21etch1_mipsel.deb stable/main/binary-mipsel/xnest_1.1.1-21etch1_mipsel.deb stable/main/binary-mipsel/xvfb_1.1.1-21etch1_mipsel.deb stable/main/binary-mipsel/xserver-xephyr_1.1.1-21etch1_mipsel.deb xorg-server (2:1.1.1-21etch1) stable-security; urgency=high * Add patch to fix a buffer overflow in the composite extension (freedesktop.org bug#7447). stable/main/binary-powerpc/xserver-xorg-core_1.1.1-21etch1_powerpc.deb stable/main/binary-powerpc/xserver-xorg-dev_1.1.1-21etch1_powerpc.deb stable/main/binary-powerpc/xdmx_1.1.1-21etch1_powerpc.deb stable/main/binary-powerpc/xdmx-tools_1.1.1-21etch1_powerpc.deb stable/main/binary-powerpc/xnest_1.1.1-21etch1_powerpc.deb stable/main/binary-powerpc/xvfb_1.1.1-21etch1_powerpc.deb stable/main/binary-powerpc/xserver-xephyr_1.1.1-21etch1_powerpc.deb xorg-server (2:1.1.1-21etch1) stable-security; urgency=high * Add patch to fix a buffer overflow in the composite extension (freedesktop.org bug#7447). stable/main/binary-s390/xserver-xorg-core_1.1.1-21etch1_s390.deb stable/main/binary-s390/xserver-xorg-dev_1.1.1-21etch1_s390.deb stable/main/binary-s390/xdmx_1.1.1-21etch1_s390.deb stable/main/binary-s390/xdmx-tools_1.1.1-21etch1_s390.deb stable/main/binary-s390/xnest_1.1.1-21etch1_s390.deb stable/main/binary-s390/xvfb_1.1.1-21etch1_s390.deb stable/main/binary-s390/xserver-xephyr_1.1.1-21etch1_s390.deb xorg-server (2:1.1.1-21etch1) stable-security; urgency=high * Add patch to fix a buffer overflow in the composite extension (freedesktop.org bug#7447). stable/main/binary-sparc/xserver-xorg-core_1.1.1-21etch1_sparc.deb stable/main/binary-sparc/xserver-xorg-dev_1.1.1-21etch1_sparc.deb stable/main/binary-sparc/xdmx_1.1.1-21etch1_sparc.deb stable/main/binary-sparc/xdmx-tools_1.1.1-21etch1_sparc.deb stable/main/binary-sparc/xnest_1.1.1-21etch1_sparc.deb stable/main/binary-sparc/xvfb_1.1.1-21etch1_sparc.deb stable/main/binary-sparc/xserver-xephyr_1.1.1-21etch1_sparc.deb xorg-server (2:1.1.1-21etch1) stable-security; urgency=high * Add patch to fix a buffer overflow in the composite extension (freedesktop.org bug#7447). stable/main/binary-alpha/xpdf-reader_3.01-9etch1_alpha.deb stable/main/binary-alpha/xpdf-utils_3.01-9etch1_alpha.deb xpdf (3.01-9etch1) stable-security; urgency=high * Fix integer overflow in stream predictor (CVE-2007-3387). stable/main/binary-amd64/xpdf-reader_3.01-9etch1_amd64.deb stable/main/binary-amd64/xpdf-utils_3.01-9etch1_amd64.deb xpdf (3.01-9etch1) stable-security; urgency=high * Fix integer overflow in stream predictor (CVE-2007-3387). stable/main/binary-arm/xpdf-reader_3.01-9etch1_arm.deb stable/main/binary-arm/xpdf-utils_3.01-9etch1_arm.deb xpdf (3.01-9etch1) stable-security; urgency=high * Fix integer overflow in stream predictor (CVE-2007-3387). stable/main/binary-hppa/xpdf-reader_3.01-9etch1_hppa.deb stable/main/binary-hppa/xpdf-utils_3.01-9etch1_hppa.deb xpdf (3.01-9etch1) stable-security; urgency=high * Fix integer overflow in stream predictor (CVE-2007-3387). stable/main/source/xpdf_3.01-9etch1.dsc stable/main/source/xpdf_3.01.orig.tar.gz stable/main/source/xpdf_3.01-9etch1.diff.gz stable/main/binary-all/xpdf_3.01-9etch1_all.deb stable/main/binary-all/xpdf-common_3.01-9etch1_all.deb stable/main/binary-i386/xpdf-reader_3.01-9etch1_i386.deb stable/main/binary-i386/xpdf-utils_3.01-9etch1_i386.deb xpdf (3.01-9etch1) stable-security; urgency=high * Fix integer overflow in stream predictor (CVE-2007-3387). stable/main/binary-ia64/xpdf-reader_3.01-9etch1_ia64.deb stable/main/binary-ia64/xpdf-utils_3.01-9etch1_ia64.deb xpdf (3.01-9etch1) stable-security; urgency=high * Fix integer overflow in stream predictor (CVE-2007-3387). stable/main/binary-mips/xpdf-reader_3.01-9etch1_mips.deb stable/main/binary-mips/xpdf-utils_3.01-9etch1_mips.deb xpdf (3.01-9etch1) stable-security; urgency=high * Fix integer overflow in stream predictor (CVE-2007-3387). stable/main/binary-mipsel/xpdf-reader_3.01-9etch1_mipsel.deb stable/main/binary-mipsel/xpdf-utils_3.01-9etch1_mipsel.deb xpdf (3.01-9etch1) stable-security; urgency=high * Fix integer overflow in stream predictor (CVE-2007-3387). stable/main/binary-powerpc/xpdf-reader_3.01-9etch1_powerpc.deb stable/main/binary-powerpc/xpdf-utils_3.01-9etch1_powerpc.deb xpdf (3.01-9etch1) stable-security; urgency=high * Fix integer overflow in stream predictor (CVE-2007-3387). stable/main/binary-s390/xpdf-reader_3.01-9etch1_s390.deb stable/main/binary-s390/xpdf-utils_3.01-9etch1_s390.deb xpdf (3.01-9etch1) stable-security; urgency=high * Fix integer overflow in stream predictor (CVE-2007-3387). stable/main/binary-sparc/xpdf-reader_3.01-9etch1_sparc.deb stable/main/binary-sparc/xpdf-utils_3.01-9etch1_sparc.deb xpdf (3.01-9etch1) stable-security; urgency=high * Fix integer overflow in stream predictor (CVE-2007-3387). stable/main/binary-alpha/xulrunner_1.8.0.14~pre071019c-0etch1_alpha.deb stable/main/binary-alpha/xulrunner-gnome-support_1.8.0.14~pre071019c-0etch1_alpha.deb stable/main/binary-alpha/libnspr4-0d_1.8.0.14~pre071019c-0etch1_alpha.deb stable/main/binary-alpha/libnspr4-0d-dbg_1.8.0.14~pre071019c-0etch1_alpha.deb stable/main/binary-alpha/libmozjs0d_1.8.0.14~pre071019c-0etch1_alpha.deb stable/main/binary-alpha/libmozjs0d-dbg_1.8.0.14~pre071019c-0etch1_alpha.deb stable/main/binary-alpha/spidermonkey-bin_1.8.0.14~pre071019c-0etch1_alpha.deb stable/main/binary-alpha/libxul0d_1.8.0.14~pre071019c-0etch1_alpha.deb stable/main/binary-alpha/libxul0d-dbg_1.8.0.14~pre071019c-0etch1_alpha.deb stable/main/binary-alpha/libnss3-0d_1.8.0.14~pre071019c-0etch1_alpha.deb stable/main/binary-alpha/libnss3-tools_1.8.0.14~pre071019c-0etch1_alpha.deb stable/main/binary-alpha/libnss3-0d-dbg_1.8.0.14~pre071019c-0etch1_alpha.deb stable/main/binary-alpha/python-xpcom_1.8.0.14~pre071019c-0etch1_alpha.deb xulrunner (1.8.0.14~pre071019c-0etch1) stable-security; urgency=critical * New security/stability upstream release (v2.0.0.10) * MFSA 2007-37 aka CVE-2007-5947 * MFSA 2007-38 aka CVE-2007-5959 * MFSA 2007-39 aka CVE-2007-5960 stable/main/source/xulrunner_1.8.0.14~pre071019c-0etch1.dsc stable/main/source/xulrunner_1.8.0.14~pre071019c.orig.tar.gz stable/main/source/xulrunner_1.8.0.14~pre071019c-0etch1.diff.gz stable/main/binary-all/libnspr4-dev_1.8.0.14~pre071019c-0etch1_all.deb stable/main/binary-all/libmozjs-dev_1.8.0.14~pre071019c-0etch1_all.deb stable/main/binary-all/libsmjs1_1.8.0.14~pre071019c-0etch1_all.deb stable/main/binary-all/libsmjs-dev_1.8.0.14~pre071019c-0etch1_all.deb stable/main/binary-all/libxul-common_1.8.0.14~pre071019c-0etch1_all.deb stable/main/binary-all/libxul-dev_1.8.0.14~pre071019c-0etch1_all.deb stable/main/binary-all/libnss3-dev_1.8.0.14~pre071019c-0etch1_all.deb stable/main/binary-all/libmozillainterfaces-java_1.8.0.14~pre071019c-0etch1_all.deb stable/main/binary-amd64/xulrunner_1.8.0.14~pre071019c-0etch1_amd64.deb stable/main/binary-amd64/xulrunner-gnome-support_1.8.0.14~pre071019c-0etch1_amd64.deb stable/main/binary-amd64/libnspr4-0d_1.8.0.14~pre071019c-0etch1_amd64.deb stable/main/binary-amd64/libnspr4-0d-dbg_1.8.0.14~pre071019c-0etch1_amd64.deb stable/main/binary-amd64/libmozjs0d_1.8.0.14~pre071019c-0etch1_amd64.deb stable/main/binary-amd64/libmozjs0d-dbg_1.8.0.14~pre071019c-0etch1_amd64.deb stable/main/binary-amd64/spidermonkey-bin_1.8.0.14~pre071019c-0etch1_amd64.deb stable/main/binary-amd64/libxul0d_1.8.0.14~pre071019c-0etch1_amd64.deb stable/main/binary-amd64/libxul0d-dbg_1.8.0.14~pre071019c-0etch1_amd64.deb stable/main/binary-amd64/libnss3-0d_1.8.0.14~pre071019c-0etch1_amd64.deb stable/main/binary-amd64/libnss3-tools_1.8.0.14~pre071019c-0etch1_amd64.deb stable/main/binary-amd64/libnss3-0d-dbg_1.8.0.14~pre071019c-0etch1_amd64.deb stable/main/binary-amd64/python-xpcom_1.8.0.14~pre071019c-0etch1_amd64.deb xulrunner (1.8.0.14~pre071019c-0etch1) stable-security; urgency=critical * New security/stability upstream release (v2.0.0.10) * MFSA 2007-37 aka CVE-2007-5947 * MFSA 2007-38 aka CVE-2007-5959 * MFSA 2007-39 aka CVE-2007-5960 stable/main/binary-arm/xulrunner_1.8.0.14~pre071019c-0etch1_arm.deb stable/main/binary-arm/xulrunner-gnome-support_1.8.0.14~pre071019c-0etch1_arm.deb stable/main/binary-arm/libnspr4-0d_1.8.0.14~pre071019c-0etch1_arm.deb stable/main/binary-arm/libnspr4-0d-dbg_1.8.0.14~pre071019c-0etch1_arm.deb stable/main/binary-arm/libmozjs0d_1.8.0.14~pre071019c-0etch1_arm.deb stable/main/binary-arm/libmozjs0d-dbg_1.8.0.14~pre071019c-0etch1_arm.deb stable/main/binary-arm/spidermonkey-bin_1.8.0.14~pre071019c-0etch1_arm.deb stable/main/binary-arm/libxul0d_1.8.0.14~pre071019c-0etch1_arm.deb stable/main/binary-arm/libxul0d-dbg_1.8.0.14~pre071019c-0etch1_arm.deb stable/main/binary-arm/libnss3-0d_1.8.0.14~pre071019c-0etch1_arm.deb stable/main/binary-arm/libnss3-tools_1.8.0.14~pre071019c-0etch1_arm.deb stable/main/binary-arm/libnss3-0d-dbg_1.8.0.14~pre071019c-0etch1_arm.deb stable/main/binary-arm/python-xpcom_1.8.0.14~pre071019c-0etch1_arm.deb xulrunner (1.8.0.14~pre071019c-0etch1) stable-security; urgency=critical * New security/stability upstream release (v2.0.0.10) * MFSA 2007-37 aka CVE-2007-5947 * MFSA 2007-38 aka CVE-2007-5959 * MFSA 2007-39 aka CVE-2007-5960 stable/main/binary-hppa/xulrunner_1.8.0.14~pre071019c-0etch1_hppa.deb stable/main/binary-hppa/xulrunner-gnome-support_1.8.0.14~pre071019c-0etch1_hppa.deb stable/main/binary-hppa/libnspr4-0d_1.8.0.14~pre071019c-0etch1_hppa.deb stable/main/binary-hppa/libnspr4-0d-dbg_1.8.0.14~pre071019c-0etch1_hppa.deb stable/main/binary-hppa/libmozjs0d_1.8.0.14~pre071019c-0etch1_hppa.deb stable/main/binary-hppa/libmozjs0d-dbg_1.8.0.14~pre071019c-0etch1_hppa.deb stable/main/binary-hppa/spidermonkey-bin_1.8.0.14~pre071019c-0etch1_hppa.deb stable/main/binary-hppa/libxul0d_1.8.0.14~pre071019c-0etch1_hppa.deb stable/main/binary-hppa/libxul0d-dbg_1.8.0.14~pre071019c-0etch1_hppa.deb stable/main/binary-hppa/libnss3-0d_1.8.0.14~pre071019c-0etch1_hppa.deb stable/main/binary-hppa/libnss3-tools_1.8.0.14~pre071019c-0etch1_hppa.deb stable/main/binary-hppa/libnss3-0d-dbg_1.8.0.14~pre071019c-0etch1_hppa.deb stable/main/binary-hppa/python-xpcom_1.8.0.14~pre071019c-0etch1_hppa.deb xulrunner (1.8.0.14~pre071019c-0etch1) stable-security; urgency=critical * New security/stability upstream release (v2.0.0.10) * MFSA 2007-37 aka CVE-2007-5947 * MFSA 2007-38 aka CVE-2007-5959 * MFSA 2007-39 aka CVE-2007-5960 stable/main/binary-i386/xulrunner_1.8.0.14~pre071019c-0etch1_i386.deb stable/main/binary-i386/xulrunner-gnome-support_1.8.0.14~pre071019c-0etch1_i386.deb stable/main/binary-i386/libnspr4-0d_1.8.0.14~pre071019c-0etch1_i386.deb stable/main/binary-i386/libnspr4-0d-dbg_1.8.0.14~pre071019c-0etch1_i386.deb stable/main/binary-i386/libmozjs0d_1.8.0.14~pre071019c-0etch1_i386.deb stable/main/binary-i386/libmozjs0d-dbg_1.8.0.14~pre071019c-0etch1_i386.deb stable/main/binary-i386/spidermonkey-bin_1.8.0.14~pre071019c-0etch1_i386.deb stable/main/binary-i386/libxul0d_1.8.0.14~pre071019c-0etch1_i386.deb stable/main/binary-i386/libxul0d-dbg_1.8.0.14~pre071019c-0etch1_i386.deb stable/main/binary-i386/libnss3-0d_1.8.0.14~pre071019c-0etch1_i386.deb stable/main/binary-i386/libnss3-tools_1.8.0.14~pre071019c-0etch1_i386.deb stable/main/binary-i386/libnss3-0d-dbg_1.8.0.14~pre071019c-0etch1_i386.deb stable/main/binary-i386/python-xpcom_1.8.0.14~pre071019c-0etch1_i386.deb xulrunner (1.8.0.14~pre071019c-0etch1) stable-security; urgency=critical * New security/stability upstream release (v2.0.0.10) * MFSA 2007-37 aka CVE-2007-5947 * MFSA 2007-38 aka CVE-2007-5959 * MFSA 2007-39 aka CVE-2007-5960 stable/main/binary-ia64/xulrunner_1.8.0.14~pre071019c-0etch1_ia64.deb stable/main/binary-ia64/xulrunner-gnome-support_1.8.0.14~pre071019c-0etch1_ia64.deb stable/main/binary-ia64/libnspr4-0d_1.8.0.14~pre071019c-0etch1_ia64.deb stable/main/binary-ia64/libnspr4-0d-dbg_1.8.0.14~pre071019c-0etch1_ia64.deb stable/main/binary-ia64/libmozjs0d_1.8.0.14~pre071019c-0etch1_ia64.deb stable/main/binary-ia64/libmozjs0d-dbg_1.8.0.14~pre071019c-0etch1_ia64.deb stable/main/binary-ia64/spidermonkey-bin_1.8.0.14~pre071019c-0etch1_ia64.deb stable/main/binary-ia64/libxul0d_1.8.0.14~pre071019c-0etch1_ia64.deb stable/main/binary-ia64/libxul0d-dbg_1.8.0.14~pre071019c-0etch1_ia64.deb stable/main/binary-ia64/libnss3-0d_1.8.0.14~pre071019c-0etch1_ia64.deb stable/main/binary-ia64/libnss3-tools_1.8.0.14~pre071019c-0etch1_ia64.deb stable/main/binary-ia64/libnss3-0d-dbg_1.8.0.14~pre071019c-0etch1_ia64.deb stable/main/binary-ia64/python-xpcom_1.8.0.14~pre071019c-0etch1_ia64.deb xulrunner (1.8.0.14~pre071019c-0etch1) stable-security; urgency=critical * New security/stability upstream release (v2.0.0.10) * MFSA 2007-37 aka CVE-2007-5947 * MFSA 2007-38 aka CVE-2007-5959 * MFSA 2007-39 aka CVE-2007-5960 stable/main/binary-mips/xulrunner_1.8.0.14~pre071019c-0etch1_mips.deb stable/main/binary-mips/xulrunner-gnome-support_1.8.0.14~pre071019c-0etch1_mips.deb stable/main/binary-mips/libnspr4-0d_1.8.0.14~pre071019c-0etch1_mips.deb stable/main/binary-mips/libnspr4-0d-dbg_1.8.0.14~pre071019c-0etch1_mips.deb stable/main/binary-mips/libmozjs0d_1.8.0.14~pre071019c-0etch1_mips.deb stable/main/binary-mips/libmozjs0d-dbg_1.8.0.14~pre071019c-0etch1_mips.deb stable/main/binary-mips/spidermonkey-bin_1.8.0.14~pre071019c-0etch1_mips.deb stable/main/binary-mips/libxul0d_1.8.0.14~pre071019c-0etch1_mips.deb stable/main/binary-mips/libxul0d-dbg_1.8.0.14~pre071019c-0etch1_mips.deb stable/main/binary-mips/libnss3-0d_1.8.0.14~pre071019c-0etch1_mips.deb stable/main/binary-mips/libnss3-tools_1.8.0.14~pre071019c-0etch1_mips.deb stable/main/binary-mips/libnss3-0d-dbg_1.8.0.14~pre071019c-0etch1_mips.deb stable/main/binary-mips/python-xpcom_1.8.0.14~pre071019c-0etch1_mips.deb xulrunner (1.8.0.14~pre071019c-0etch1) stable-security; urgency=critical * New security/stability upstream release (v2.0.0.10) * MFSA 2007-37 aka CVE-2007-5947 * MFSA 2007-38 aka CVE-2007-5959 * MFSA 2007-39 aka CVE-2007-5960 stable/main/binary-mipsel/xulrunner_1.8.0.14~pre071019c-0etch1_mipsel.deb stable/main/binary-mipsel/xulrunner-gnome-support_1.8.0.14~pre071019c-0etch1_mipsel.deb stable/main/binary-mipsel/libnspr4-0d_1.8.0.14~pre071019c-0etch1_mipsel.deb stable/main/binary-mipsel/libnspr4-0d-dbg_1.8.0.14~pre071019c-0etch1_mipsel.deb stable/main/binary-mipsel/libmozjs0d_1.8.0.14~pre071019c-0etch1_mipsel.deb stable/main/binary-mipsel/libmozjs0d-dbg_1.8.0.14~pre071019c-0etch1_mipsel.deb stable/main/binary-mipsel/spidermonkey-bin_1.8.0.14~pre071019c-0etch1_mipsel.deb stable/main/binary-mipsel/libxul0d_1.8.0.14~pre071019c-0etch1_mipsel.deb stable/main/binary-mipsel/libxul0d-dbg_1.8.0.14~pre071019c-0etch1_mipsel.deb stable/main/binary-mipsel/libnss3-0d_1.8.0.14~pre071019c-0etch1_mipsel.deb stable/main/binary-mipsel/libnss3-tools_1.8.0.14~pre071019c-0etch1_mipsel.deb stable/main/binary-mipsel/libnss3-0d-dbg_1.8.0.14~pre071019c-0etch1_mipsel.deb stable/main/binary-mipsel/python-xpcom_1.8.0.14~pre071019c-0etch1_mipsel.deb xulrunner (1.8.0.14~pre071019c-0etch1) stable-security; urgency=critical * New security/stability upstream release (v2.0.0.10) * MFSA 2007-37 aka CVE-2007-5947 * MFSA 2007-38 aka CVE-2007-5959 * MFSA 2007-39 aka CVE-2007-5960 stable/main/binary-powerpc/xulrunner_1.8.0.14~pre071019c-0etch1_powerpc.deb stable/main/binary-powerpc/xulrunner-gnome-support_1.8.0.14~pre071019c-0etch1_powerpc.deb stable/main/binary-powerpc/libnspr4-0d_1.8.0.14~pre071019c-0etch1_powerpc.deb stable/main/binary-powerpc/libnspr4-0d-dbg_1.8.0.14~pre071019c-0etch1_powerpc.deb stable/main/binary-powerpc/libmozjs0d_1.8.0.14~pre071019c-0etch1_powerpc.deb stable/main/binary-powerpc/libmozjs0d-dbg_1.8.0.14~pre071019c-0etch1_powerpc.deb stable/main/binary-powerpc/spidermonkey-bin_1.8.0.14~pre071019c-0etch1_powerpc.deb stable/main/binary-powerpc/libxul0d_1.8.0.14~pre071019c-0etch1_powerpc.deb stable/main/binary-powerpc/libxul0d-dbg_1.8.0.14~pre071019c-0etch1_powerpc.deb stable/main/binary-powerpc/libnss3-0d_1.8.0.14~pre071019c-0etch1_powerpc.deb stable/main/binary-powerpc/libnss3-tools_1.8.0.14~pre071019c-0etch1_powerpc.deb stable/main/binary-powerpc/libnss3-0d-dbg_1.8.0.14~pre071019c-0etch1_powerpc.deb stable/main/binary-powerpc/python-xpcom_1.8.0.14~pre071019c-0etch1_powerpc.deb xulrunner (1.8.0.14~pre071019c-0etch1) stable-security; urgency=critical * New security/stability upstream release (v2.0.0.10) * MFSA 2007-37 aka CVE-2007-5947 * MFSA 2007-38 aka CVE-2007-5959 * MFSA 2007-39 aka CVE-2007-5960 stable/main/binary-s390/xulrunner_1.8.0.14~pre071019c-0etch1_s390.deb stable/main/binary-s390/xulrunner-gnome-support_1.8.0.14~pre071019c-0etch1_s390.deb stable/main/binary-s390/libnspr4-0d_1.8.0.14~pre071019c-0etch1_s390.deb stable/main/binary-s390/libnspr4-0d-dbg_1.8.0.14~pre071019c-0etch1_s390.deb stable/main/binary-s390/libmozjs0d_1.8.0.14~pre071019c-0etch1_s390.deb stable/main/binary-s390/libmozjs0d-dbg_1.8.0.14~pre071019c-0etch1_s390.deb stable/main/binary-s390/spidermonkey-bin_1.8.0.14~pre071019c-0etch1_s390.deb stable/main/binary-s390/libxul0d_1.8.0.14~pre071019c-0etch1_s390.deb stable/main/binary-s390/libxul0d-dbg_1.8.0.14~pre071019c-0etch1_s390.deb stable/main/binary-s390/libnss3-0d_1.8.0.14~pre071019c-0etch1_s390.deb stable/main/binary-s390/libnss3-tools_1.8.0.14~pre071019c-0etch1_s390.deb stable/main/binary-s390/libnss3-0d-dbg_1.8.0.14~pre071019c-0etch1_s390.deb stable/main/binary-s390/python-xpcom_1.8.0.14~pre071019c-0etch1_s390.deb xulrunner (1.8.0.14~pre071019c-0etch1) stable-security; urgency=critical * New security/stability upstream release (v2.0.0.10) * MFSA 2007-37 aka CVE-2007-5947 * MFSA 2007-38 aka CVE-2007-5959 * MFSA 2007-39 aka CVE-2007-5960 stable/main/binary-sparc/xulrunner_1.8.0.14~pre071019c-0etch1_sparc.deb stable/main/binary-sparc/xulrunner-gnome-support_1.8.0.14~pre071019c-0etch1_sparc.deb stable/main/binary-sparc/libnspr4-0d_1.8.0.14~pre071019c-0etch1_sparc.deb stable/main/binary-sparc/libnspr4-0d-dbg_1.8.0.14~pre071019c-0etch1_sparc.deb stable/main/binary-sparc/libmozjs0d_1.8.0.14~pre071019c-0etch1_sparc.deb stable/main/binary-sparc/libmozjs0d-dbg_1.8.0.14~pre071019c-0etch1_sparc.deb stable/main/binary-sparc/spidermonkey-bin_1.8.0.14~pre071019c-0etch1_sparc.deb stable/main/binary-sparc/libxul0d_1.8.0.14~pre071019c-0etch1_sparc.deb stable/main/binary-sparc/libxul0d-dbg_1.8.0.14~pre071019c-0etch1_sparc.deb stable/main/binary-sparc/libnss3-0d_1.8.0.14~pre071019c-0etch1_sparc.deb stable/main/binary-sparc/libnss3-tools_1.8.0.14~pre071019c-0etch1_sparc.deb stable/main/binary-sparc/libnss3-0d-dbg_1.8.0.14~pre071019c-0etch1_sparc.deb stable/main/binary-sparc/python-xpcom_1.8.0.14~pre071019c-0etch1_sparc.deb xulrunner (1.8.0.14~pre071019c-0etch1) stable-security; urgency=critical * New security/stability upstream release (v2.0.0.10) * MFSA 2007-37 aka CVE-2007-5947 * MFSA 2007-38 aka CVE-2007-5959 * MFSA 2007-39 aka CVE-2007-5960 stable/main/binary-alpha/zabbix-agent_1.1.4-10etch1_alpha.deb stable/main/binary-alpha/zabbix-server-mysql_1.1.4-10etch1_alpha.deb stable/main/binary-alpha/zabbix-server-pgsql_1.1.4-10etch1_alpha.deb zabbix (1:1.1.4-10etch1) stable-security; urgency=high * Fix execution of UserParameters with gid 0. (CVE-2007-XXX) Closes: #452682 stable/main/source/zabbix_1.1.4-10etch1.dsc stable/main/source/zabbix_1.1.4.orig.tar.gz stable/main/source/zabbix_1.1.4-10etch1.diff.gz stable/main/binary-amd64/zabbix-agent_1.1.4-10etch1_amd64.deb stable/main/binary-amd64/zabbix-server-mysql_1.1.4-10etch1_amd64.deb stable/main/binary-amd64/zabbix-server-pgsql_1.1.4-10etch1_amd64.deb stable/main/binary-all/zabbix-frontend-php_1.1.4-10etch1_all.deb zabbix (1:1.1.4-10etch1) stable-security; urgency=high * Fix execution of UserParameters with gid 0. (CVE-2007-XXX) Closes: #452682 stable/main/binary-arm/zabbix-agent_1.1.4-10etch1_arm.deb stable/main/binary-arm/zabbix-server-mysql_1.1.4-10etch1_arm.deb stable/main/binary-arm/zabbix-server-pgsql_1.1.4-10etch1_arm.deb zabbix (1:1.1.4-10etch1) stable-security; urgency=high * Fix execution of UserParameters with gid 0. (CVE-2007-XXX) Closes: #452682 stable/main/binary-hppa/zabbix-agent_1.1.4-10etch1_hppa.deb stable/main/binary-hppa/zabbix-server-mysql_1.1.4-10etch1_hppa.deb stable/main/binary-hppa/zabbix-server-pgsql_1.1.4-10etch1_hppa.deb zabbix (1:1.1.4-10etch1) stable-security; urgency=high * Fix execution of UserParameters with gid 0. (CVE-2007-XXX) Closes: #452682 stable/main/binary-i386/zabbix-agent_1.1.4-10etch1_i386.deb stable/main/binary-i386/zabbix-server-mysql_1.1.4-10etch1_i386.deb stable/main/binary-i386/zabbix-server-pgsql_1.1.4-10etch1_i386.deb zabbix (1:1.1.4-10etch1) stable-security; urgency=high * Fix execution of UserParameters with gid 0. (CVE-2007-XXX) Closes: #452682 stable/main/binary-ia64/zabbix-agent_1.1.4-10etch1_ia64.deb stable/main/binary-ia64/zabbix-server-mysql_1.1.4-10etch1_ia64.deb stable/main/binary-ia64/zabbix-server-pgsql_1.1.4-10etch1_ia64.deb zabbix (1:1.1.4-10etch1) stable-security; urgency=high * Fix execution of UserParameters with gid 0. (CVE-2007-XXX) Closes: #452682 stable/main/binary-mips/zabbix-agent_1.1.4-10etch1_mips.deb stable/main/binary-mips/zabbix-server-mysql_1.1.4-10etch1_mips.deb stable/main/binary-mips/zabbix-server-pgsql_1.1.4-10etch1_mips.deb zabbix (1:1.1.4-10etch1) stable-security; urgency=high * Fix execution of UserParameters with gid 0. (CVE-2007-XXX) Closes: #452682 stable/main/binary-mipsel/zabbix-agent_1.1.4-10etch1_mipsel.deb stable/main/binary-mipsel/zabbix-server-mysql_1.1.4-10etch1_mipsel.deb stable/main/binary-mipsel/zabbix-server-pgsql_1.1.4-10etch1_mipsel.deb zabbix (1:1.1.4-10etch1) stable-security; urgency=high * Fix execution of UserParameters with gid 0. (CVE-2007-XXX) Closes: #452682 stable/main/binary-powerpc/zabbix-agent_1.1.4-10etch1_powerpc.deb stable/main/binary-powerpc/zabbix-server-mysql_1.1.4-10etch1_powerpc.deb stable/main/binary-powerpc/zabbix-server-pgsql_1.1.4-10etch1_powerpc.deb zabbix (1:1.1.4-10etch1) stable-security; urgency=high * Fix execution of UserParameters with gid 0. (CVE-2007-XXX) Closes: #452682 stable/main/binary-s390/zabbix-agent_1.1.4-10etch1_s390.deb stable/main/binary-s390/zabbix-server-mysql_1.1.4-10etch1_s390.deb stable/main/binary-s390/zabbix-server-pgsql_1.1.4-10etch1_s390.deb zabbix (1:1.1.4-10etch1) stable-security; urgency=high * Fix execution of UserParameters with gid 0. (CVE-2007-XXX) Closes: #452682 stable/main/binary-sparc/zabbix-agent_1.1.4-10etch1_sparc.deb stable/main/binary-sparc/zabbix-server-mysql_1.1.4-10etch1_sparc.deb stable/main/binary-sparc/zabbix-server-pgsql_1.1.4-10etch1_sparc.deb zabbix (1:1.1.4-10etch1) stable-security; urgency=high * Fix execution of UserParameters with gid 0. (CVE-2007-XXX) Closes: #452682 stable/main/source/zope-cmfplone_2.5.1-4etch2.dsc stable/main/source/zope-cmfplone_2.5.1-4etch2.diff.gz stable/main/binary-all/zope-cmfplone_2.5.1-4etch2_all.deb stable/main/binary-all/plone-site_2.5.1-4etch2_all.deb zope-cmfplone (2.5.1-4etch2) stable-security; urgency=high * utils.py: fixed a bug introduced with the security upload, delay the import of Products.CMFPlone otherwise statusmessages.py breaks. (Closes: #450767) stable/main/source/zoph_0.6-2.1etch1.dsc stable/main/source/zoph_0.6.orig.tar.gz stable/main/source/zoph_0.6-2.1etch1.diff.gz stable/main/binary-all/zoph_0.6-2.1etch1_all.deb zoph (0.6-2.1etch1) stable-security; urgency=high * Non-maintainer upload by the security team. * Fix SQL injection vulnerability in edit_photos.php & photos.php (CVE-2007-3905, closes: 435711) Removals: iceweasel-l10n-roa-es-val | 2.0.0.3+debian-1 | all ------------------- Reason ------------------- [auto-cruft] NBS ---------------------------------------------- ========================================= Wed, 15 Aug 2007 - Debian 4.0r1 released ========================================= stable/main/binary-sparc/libxul0d_1.8.0.12-0etch1_sparc.deb stable/main/binary-sparc/xulrunner_1.8.0.12-0etch1_sparc.deb stable/main/binary-sparc/libnspr4-0d-dbg_1.8.0.12-0etch1_sparc.deb stable/main/binary-sparc/libmozjs0d_1.8.0.12-0etch1_sparc.deb stable/main/binary-sparc/libnss3-0d-dbg_1.8.0.12-0etch1_sparc.deb stable/main/binary-sparc/libnspr4-0d_1.8.0.12-0etch1_sparc.deb stable/main/binary-sparc/libmozjs0d-dbg_1.8.0.12-0etch1_sparc.deb stable/main/binary-sparc/libnss3-tools_1.8.0.12-0etch1_sparc.deb stable/main/binary-sparc/spidermonkey-bin_1.8.0.12-0etch1_sparc.deb stable/main/binary-sparc/libnss3-0d_1.8.0.12-0etch1_sparc.deb stable/main/binary-sparc/python-xpcom_1.8.0.12-0etch1_sparc.deb stable/main/binary-sparc/libxul0d-dbg_1.8.0.12-0etch1_sparc.deb stable/main/binary-sparc/xulrunner-gnome-support_1.8.0.12-0etch1_sparc.deb xulrunner (1.8.0.12-0etch1) stable-security; urgency=low * New upstream release (taken from upstream CVS) * Fixes mfsa-2007-{12-14}, mfsa-2007-{16-17}, also known as CVE-2007-1362, CVE-2007-2867, CVE-2007-2868, CVE-2007-2869, CVE-2007-2870, CVE-2007-2871. stable/main/binary-s390/xulrunner-gnome-support_1.8.0.12-0etch1_s390.deb stable/main/binary-s390/libnss3-tools_1.8.0.12-0etch1_s390.deb stable/main/binary-s390/python-xpcom_1.8.0.12-0etch1_s390.deb stable/main/binary-s390/libnspr4-0d_1.8.0.12-0etch1_s390.deb stable/main/binary-s390/libmozjs0d_1.8.0.12-0etch1_s390.deb stable/main/binary-s390/libnss3-0d-dbg_1.8.0.12-0etch1_s390.deb stable/main/binary-s390/libxul0d_1.8.0.12-0etch1_s390.deb stable/main/binary-s390/libxul0d-dbg_1.8.0.12-0etch1_s390.deb stable/main/binary-s390/libmozjs0d-dbg_1.8.0.12-0etch1_s390.deb stable/main/binary-s390/libnss3-0d_1.8.0.12-0etch1_s390.deb stable/main/binary-s390/spidermonkey-bin_1.8.0.12-0etch1_s390.deb stable/main/binary-s390/xulrunner_1.8.0.12-0etch1_s390.deb stable/main/binary-s390/libnspr4-0d-dbg_1.8.0.12-0etch1_s390.deb xulrunner (1.8.0.12-0etch1) stable-security; urgency=low * New upstream release (taken from upstream CVS) * Fixes mfsa-2007-{12-14}, mfsa-2007-{16-17}, also known as CVE-2007-1362, CVE-2007-2867, CVE-2007-2868, CVE-2007-2869, CVE-2007-2870, CVE-2007-2871. stable/main/binary-powerpc/libnss3-0d_1.8.0.12-0etch1_powerpc.deb stable/main/binary-powerpc/libmozjs0d_1.8.0.12-0etch1_powerpc.deb stable/main/binary-powerpc/xulrunner-gnome-support_1.8.0.12-0etch1_powerpc.deb stable/main/binary-powerpc/libnss3-tools_1.8.0.12-0etch1_powerpc.deb stable/main/binary-powerpc/libnspr4-0d_1.8.0.12-0etch1_powerpc.deb stable/main/binary-powerpc/libnss3-0d-dbg_1.8.0.12-0etch1_powerpc.deb stable/main/binary-powerpc/libmozjs0d-dbg_1.8.0.12-0etch1_powerpc.deb stable/main/binary-powerpc/xulrunner_1.8.0.12-0etch1_powerpc.deb stable/main/binary-powerpc/spidermonkey-bin_1.8.0.12-0etch1_powerpc.deb stable/main/binary-powerpc/libnspr4-0d-dbg_1.8.0.12-0etch1_powerpc.deb stable/main/binary-powerpc/libxul0d_1.8.0.12-0etch1_powerpc.deb stable/main/binary-powerpc/libxul0d-dbg_1.8.0.12-0etch1_powerpc.deb stable/main/binary-powerpc/python-xpcom_1.8.0.12-0etch1_powerpc.deb xulrunner (1.8.0.12-0etch1) stable-security; urgency=low * New upstream release (taken from upstream CVS) * Fixes mfsa-2007-{12-14}, mfsa-2007-{16-17}, also known as CVE-2007-1362, CVE-2007-2867, CVE-2007-2868, CVE-2007-2869, CVE-2007-2870, CVE-2007-2871. stable/main/binary-mipsel/spidermonkey-bin_1.8.0.12-0etch1_mipsel.deb stable/main/binary-mipsel/libnss3-tools_1.8.0.12-0etch1_mipsel.deb stable/main/binary-mipsel/libnspr4-0d_1.8.0.12-0etch1_mipsel.deb stable/main/binary-mipsel/xulrunner-gnome-support_1.8.0.12-0etch1_mipsel.deb stable/main/binary-mipsel/libmozjs0d_1.8.0.12-0etch1_mipsel.deb stable/main/binary-mipsel/python-xpcom_1.8.0.12-0etch1_mipsel.deb stable/main/binary-mipsel/libnss3-0d_1.8.0.12-0etch1_mipsel.deb stable/main/binary-mipsel/libmozjs0d-dbg_1.8.0.12-0etch1_mipsel.deb stable/main/binary-mipsel/xulrunner_1.8.0.12-0etch1_mipsel.deb stable/main/binary-mipsel/libxul0d-dbg_1.8.0.12-0etch1_mipsel.deb stable/main/binary-mipsel/libxul0d_1.8.0.12-0etch1_mipsel.deb stable/main/binary-mipsel/libnspr4-0d-dbg_1.8.0.12-0etch1_mipsel.deb stable/main/binary-mipsel/libnss3-0d-dbg_1.8.0.12-0etch1_mipsel.deb xulrunner (1.8.0.12-0etch1) stable-security; urgency=low * New upstream release (taken from upstream CVS) * Fixes mfsa-2007-{12-14}, mfsa-2007-{16-17}, also known as CVE-2007-1362, CVE-2007-2867, CVE-2007-2868, CVE-2007-2869, CVE-2007-2870, CVE-2007-2871. stable/main/binary-mips/xulrunner-gnome-support_1.8.0.12-0etch1_mips.deb stable/main/binary-mips/libnspr4-0d_1.8.0.12-0etch1_mips.deb stable/main/binary-mips/xulrunner_1.8.0.12-0etch1_mips.deb stable/main/binary-mips/libmozjs0d_1.8.0.12-0etch1_mips.deb stable/main/binary-mips/python-xpcom_1.8.0.12-0etch1_mips.deb stable/main/binary-mips/libnss3-tools_1.8.0.12-0etch1_mips.deb stable/main/binary-mips/libxul0d-dbg_1.8.0.12-0etch1_mips.deb stable/main/binary-mips/libmozjs0d-dbg_1.8.0.12-0etch1_mips.deb stable/main/binary-mips/libnss3-0d_1.8.0.12-0etch1_mips.deb stable/main/binary-mips/libnspr4-0d-dbg_1.8.0.12-0etch1_mips.deb stable/main/binary-mips/libnss3-0d-dbg_1.8.0.12-0etch1_mips.deb stable/main/binary-mips/spidermonkey-bin_1.8.0.12-0etch1_mips.deb stable/main/binary-mips/libxul0d_1.8.0.12-0etch1_mips.deb xulrunner (1.8.0.12-0etch1) stable-security; urgency=low * New upstream release (taken from upstream CVS) * Fixes mfsa-2007-{12-14}, mfsa-2007-{16-17}, also known as CVE-2007-1362, CVE-2007-2867, CVE-2007-2868, CVE-2007-2869, CVE-2007-2870, CVE-2007-2871. stable/main/binary-ia64/libxul0d-dbg_1.8.0.12-0etch1_ia64.deb stable/main/binary-ia64/libnss3-tools_1.8.0.12-0etch1_ia64.deb stable/main/binary-ia64/python-xpcom_1.8.0.12-0etch1_ia64.deb stable/main/binary-ia64/libnspr4-0d_1.8.0.12-0etch1_ia64.deb stable/main/binary-ia64/xulrunner-gnome-support_1.8.0.12-0etch1_ia64.deb stable/main/binary-ia64/xulrunner_1.8.0.12-0etch1_ia64.deb stable/main/binary-ia64/libnspr4-0d-dbg_1.8.0.12-0etch1_ia64.deb stable/main/binary-ia64/libmozjs0d-dbg_1.8.0.12-0etch1_ia64.deb stable/main/binary-ia64/libnss3-0d_1.8.0.12-0etch1_ia64.deb stable/main/binary-ia64/libxul0d_1.8.0.12-0etch1_ia64.deb stable/main/binary-ia64/libmozjs0d_1.8.0.12-0etch1_ia64.deb stable/main/binary-ia64/spidermonkey-bin_1.8.0.12-0etch1_ia64.deb stable/main/binary-ia64/libnss3-0d-dbg_1.8.0.12-0etch1_ia64.deb xulrunner (1.8.0.12-0etch1) stable-security; urgency=low * New upstream release (taken from upstream CVS) * Fixes mfsa-2007-{12-14}, mfsa-2007-{16-17}, also known as CVE-2007-1362, CVE-2007-2867, CVE-2007-2868, CVE-2007-2869, CVE-2007-2870, CVE-2007-2871. stable/main/binary-hppa/xulrunner-gnome-support_1.8.0.12-0etch1_hppa.deb stable/main/binary-hppa/libnspr4-0d-dbg_1.8.0.12-0etch1_hppa.deb stable/main/binary-hppa/libnss3-0d-dbg_1.8.0.12-0etch1_hppa.deb stable/main/binary-hppa/libnss3-0d_1.8.0.12-0etch1_hppa.deb stable/main/binary-hppa/libxul0d-dbg_1.8.0.12-0etch1_hppa.deb stable/main/binary-hppa/libmozjs0d-dbg_1.8.0.12-0etch1_hppa.deb stable/main/binary-hppa/libxul0d_1.8.0.12-0etch1_hppa.deb stable/main/binary-hppa/xulrunner_1.8.0.12-0etch1_hppa.deb stable/main/binary-hppa/libmozjs0d_1.8.0.12-0etch1_hppa.deb stable/main/binary-hppa/spidermonkey-bin_1.8.0.12-0etch1_hppa.deb stable/main/binary-hppa/libnspr4-0d_1.8.0.12-0etch1_hppa.deb stable/main/binary-hppa/libnss3-tools_1.8.0.12-0etch1_hppa.deb stable/main/binary-hppa/python-xpcom_1.8.0.12-0etch1_hppa.deb xulrunner (1.8.0.12-0etch1) stable-security; urgency=low * New upstream release (taken from upstream CVS) * Fixes mfsa-2007-{12-14}, mfsa-2007-{16-17}, also known as CVE-2007-1362, CVE-2007-2867, CVE-2007-2868, CVE-2007-2869, CVE-2007-2870, CVE-2007-2871. stable/main/binary-arm/xulrunner-gnome-support_1.8.0.12-0etch1_arm.deb stable/main/binary-arm/libmozjs0d-dbg_1.8.0.12-0etch1_arm.deb stable/main/binary-arm/libnss3-0d-dbg_1.8.0.12-0etch1_arm.deb stable/main/binary-arm/libnspr4-0d_1.8.0.12-0etch1_arm.deb stable/main/binary-arm/libxul0d_1.8.0.12-0etch1_arm.deb stable/main/binary-arm/libmozjs0d_1.8.0.12-0etch1_arm.deb stable/main/binary-arm/libxul0d-dbg_1.8.0.12-0etch1_arm.deb stable/main/binary-arm/python-xpcom_1.8.0.12-0etch1_arm.deb stable/main/binary-arm/spidermonkey-bin_1.8.0.12-0etch1_arm.deb stable/main/binary-arm/libnss3-0d_1.8.0.12-0etch1_arm.deb stable/main/binary-arm/libnspr4-0d-dbg_1.8.0.12-0etch1_arm.deb stable/main/binary-arm/libnss3-tools_1.8.0.12-0etch1_arm.deb stable/main/binary-arm/xulrunner_1.8.0.12-0etch1_arm.deb xulrunner (1.8.0.12-0etch1) stable-security; urgency=low * New upstream release (taken from upstream CVS) * Fixes mfsa-2007-{12-14}, mfsa-2007-{16-17}, also known as CVE-2007-1362, CVE-2007-2867, CVE-2007-2868, CVE-2007-2869, CVE-2007-2870, CVE-2007-2871. stable/main/binary-amd64/spidermonkey-bin_1.8.0.12-0etch1_amd64.deb stable/main/binary-amd64/libnspr4-0d_1.8.0.12-0etch1_amd64.deb stable/main/binary-amd64/libnss3-tools_1.8.0.12-0etch1_amd64.deb stable/main/binary-amd64/xulrunner_1.8.0.12-0etch1_amd64.deb stable/main/binary-amd64/libmozjs0d_1.8.0.12-0etch1_amd64.deb stable/main/binary-amd64/libnss3-0d-dbg_1.8.0.12-0etch1_amd64.deb stable/main/binary-amd64/libmozjs0d-dbg_1.8.0.12-0etch1_amd64.deb stable/main/binary-amd64/python-xpcom_1.8.0.12-0etch1_amd64.deb stable/main/binary-amd64/xulrunner-gnome-support_1.8.0.12-0etch1_amd64.deb stable/main/binary-amd64/libnspr4-0d-dbg_1.8.0.12-0etch1_amd64.deb stable/main/binary-amd64/libxul0d-dbg_1.8.0.12-0etch1_amd64.deb stable/main/binary-amd64/libnss3-0d_1.8.0.12-0etch1_amd64.deb stable/main/binary-amd64/libxul0d_1.8.0.12-0etch1_amd64.deb xulrunner (1.8.0.12-0etch1) stable-security; urgency=low * New upstream release (taken from upstream CVS) * Fixes mfsa-2007-{12-14}, mfsa-2007-{16-17}, also known as CVE-2007-1362, CVE-2007-2867, CVE-2007-2868, CVE-2007-2869, CVE-2007-2870, CVE-2007-2871. stable/main/binary-alpha/xulrunner-gnome-support_1.8.0.12-0etch1_alpha.deb stable/main/binary-alpha/libnss3-0d-dbg_1.8.0.12-0etch1_alpha.deb stable/main/binary-alpha/xulrunner_1.8.0.12-0etch1_alpha.deb stable/main/binary-alpha/python-xpcom_1.8.0.12-0etch1_alpha.deb stable/main/binary-alpha/libxul0d_1.8.0.12-0etch1_alpha.deb stable/main/binary-alpha/libxul0d-dbg_1.8.0.12-0etch1_alpha.deb stable/main/binary-alpha/libnspr4-0d_1.8.0.12-0etch1_alpha.deb stable/main/binary-alpha/libmozjs0d_1.8.0.12-0etch1_alpha.deb stable/main/binary-alpha/spidermonkey-bin_1.8.0.12-0etch1_alpha.deb stable/main/binary-alpha/libnspr4-0d-dbg_1.8.0.12-0etch1_alpha.deb stable/main/binary-alpha/libnss3-0d_1.8.0.12-0etch1_alpha.deb stable/main/binary-alpha/libmozjs0d-dbg_1.8.0.12-0etch1_alpha.deb stable/main/binary-alpha/libnss3-tools_1.8.0.12-0etch1_alpha.deb xulrunner (1.8.0.12-0etch1) stable-security; urgency=low * New upstream release (taken from upstream CVS) * Fixes mfsa-2007-{12-14}, mfsa-2007-{16-17}, also known as CVE-2007-1362, CVE-2007-2867, CVE-2007-2868, CVE-2007-2869, CVE-2007-2870, CVE-2007-2871. stable/main/binary-i386/libmozjs0d-dbg_1.8.0.12-0etch1_i386.deb stable/main/binary-all/libsmjs1_1.8.0.12-0etch1_all.deb stable/main/binary-all/libnss3-dev_1.8.0.12-0etch1_all.deb stable/main/binary-all/libxul-common_1.8.0.12-0etch1_all.deb stable/main/binary-i386/libxul0d-dbg_1.8.0.12-0etch1_i386.deb stable/main/binary-i386/libxul0d_1.8.0.12-0etch1_i386.deb stable/main/binary-all/libsmjs-dev_1.8.0.12-0etch1_all.deb stable/main/source/xulrunner_1.8.0.12-0etch1.dsc stable/main/binary-i386/spidermonkey-bin_1.8.0.12-0etch1_i386.deb stable/main/source/xulrunner_1.8.0.12-0etch1.diff.gz stable/main/binary-i386/python-xpcom_1.8.0.12-0etch1_i386.deb stable/main/binary-i386/libnss3-0d-dbg_1.8.0.12-0etch1_i386.deb stable/main/binary-all/libmozjs-dev_1.8.0.12-0etch1_all.deb stable/main/binary-i386/libnss3-0d_1.8.0.12-0etch1_i386.deb stable/main/binary-i386/libnspr4-0d_1.8.0.12-0etch1_i386.deb stable/main/binary-i386/xulrunner-gnome-support_1.8.0.12-0etch1_i386.deb stable/main/binary-all/libnspr4-dev_1.8.0.12-0etch1_all.deb stable/main/source/xulrunner_1.8.0.12.orig.tar.gz stable/main/binary-i386/xulrunner_1.8.0.12-0etch1_i386.deb stable/main/binary-all/libmozillainterfaces-java_1.8.0.12-0etch1_all.deb stable/main/binary-all/libxul-dev_1.8.0.12-0etch1_all.deb stable/main/binary-i386/libmozjs0d_1.8.0.12-0etch1_i386.deb stable/main/binary-i386/libnspr4-0d-dbg_1.8.0.12-0etch1_i386.deb stable/main/binary-i386/libnss3-tools_1.8.0.12-0etch1_i386.deb xulrunner (1.8.0.12-0etch1) stable-security; urgency=low * New upstream release (taken from upstream CVS) * Fixes mfsa-2007-{12-14}, mfsa-2007-{16-17}, also known as CVE-2007-1362, CVE-2007-2867, CVE-2007-2868, CVE-2007-2869, CVE-2007-2870, CVE-2007-2871. stable/main/binary-s390/xserver-xorg-video-voodoo_1.1.0-4_s390.deb xserver-xorg-video-voodoo (1:1.1.0-4) unstable; urgency=low * Typo fix in man page. Closes: #364555. * Use dh_installman to install man pages. * Exclude voodoo_drv.la from dh_install. * Standards version 3.7.2. stable/main/binary-s390/xserver-xorg-video-via_0.2.1-6_s390.deb xserver-xorg-video-via (1:0.2.1-6) unstable; urgency=low [ Julien Cristau ] * Add link to xserver-xorg-core bug script, so that bugreports contain the user's config and log files. * Bump dependency on xserver-xorg-core to >= 2:1.1.1-11, as previous versions don't have the bug script. [ David Nusinow ] * Remove extra build-dep on libdrm-dev * Don't build-dep on libdrm-dev on hurd-i386. Thanks Michael Banck. Closes: #392859 * Bump standards version to 3.7.2.2. No changes needed. stable/main/binary-s390/xserver-xorg-video-tseng_1.1.0-3_s390.deb xserver-xorg-video-tseng (1:1.1.0-3) unstable; urgency=low [ Steve Langasek ] * Upload to unstable stable/main/binary-s390/xserver-xorg-video-sis_0.9.1-4_s390.deb xserver-xorg-video-sis (1:0.9.1-4) unstable; urgency=low * Add 01_missing_assert.diff to include assert.h because the driver now uses the assert macro. Thanks Nate Eldredge. Closes: #392546 * Add 02_missing_unistd.diff to include unistd.h and fcntl.h because sis_regs.h and sis_driver.c uses various functions defined in there, and yet it doesn't include it. Thanks Martin Michlmayr. Closes: #392595 stable/main/binary-s390/xserver-xorg-video-savage_2.1.2-3_s390.deb xserver-xorg-video-savage (1:2.1.2-3) unstable; urgency=medium * SavageMamMem -> SavageMapMem in the previous patch. Thanks Mikael Petersson for reporting the bug, and Jon K Hellan for noticing the fix. Closes: #405061, #405021 stable/main/binary-s390/xserver-xorg-video-s3_0.4.1-5_s390.deb xserver-xorg-video-s3 (1:0.4.1-5) unstable; urgency=low [ Julien Cristau ] * Add link to xserver-xorg-core bug script, so that bugreports contain the user's config and log files. * Bump dependency on xserver-xorg-core to >= 2:1.1.1-11, as previous versions don't have the bug script. [ David Nusinow ] * Replace old 01_enable_new_mmio.diff with new patch that doesn't break old chips that don't have the new mmio scheme. Thanks Eugene Konev for pointing out the problem and Evgeny M. Zubok for writing the patch. Closes: #377386 stable/main/binary-s390/xserver-xorg-video-rendition_4.1.0.dfsg.1-4_s390.deb xserver-xorg-video-rendition (1:4.1.0.dfsg.1-4) unstable; urgency=low [ Steve Langasek ] * Add missing build-depends on quilt. Closes: #388485. stable/main/binary-s390/xserver-xorg-video-nv_1.2.0-3_s390.deb xserver-xorg-video-nv (1:1.2.0-3) unstable; urgency=low [ Steve Langasek ] * Upload to unstable stable/main/binary-s390/xserver-xorg-video-nsc_2.8.1-3_s390.deb xserver-xorg-video-nsc (1:2.8.1-3) unstable; urgency=low [ Steve Langasek ] * Upload to unstable stable/main/binary-s390/xserver-xorg-video-i128_1.2.0-3_s390.deb xserver-xorg-video-i128 (1:1.2.0-3) unstable; urgency=low [ Steve Langasek ] * Upload to unstable stable/main/binary-s390/xserver-xorg-video-ark_0.6.0-3_s390.deb xserver-xorg-video-ark (1:0.6.0-3) unstable; urgency=low [ Steve Langasek ] * Prepare for upload to unstable [ Drew Parsons ] * Standards version 3.7.2. * Use debhelper 5. * Exclude ark_drv.la from dh_install. stable/main/binary-s390/xserver-xorg-video-apm_1.1.1-3_s390.deb xserver-xorg-video-apm (1:1.1.1-3) unstable; urgency=low [ Steve Langasek ] * Prepare for upload to unstable [ Drew Parsons ] * Use dh_installman to install man pages. * Exclude apm_drv.la from dh_install. * Standards version 3.7.2. * Use debhelper 5. stable/main/binary-s390/xserver-xorg-input-summa_1.1.0-1_s390.deb xserver-xorg-input-summa (1:1.1.0-1) unstable; urgency=low [ Andres Salomon ] * Test for obj-$(DEB_BUILD_GNU_TYPE) before creating it during build; idempotency fix. * Run dh_install w/ --list-missing. [ David Nusinow ] * New upstream version. Fixes FTBFS with current server. * Exclude summa_drv.la from dh_install * Bump standards version to 3.7.2.2. No changes needed. * Bump build-depends on xserver-xorg-dev and depends on xserver-xorg-core to 2:1.1.1 or greater. * Remove Fabio from uploaders with his permission. He's always welcome back. stable/main/binary-s390/xserver-xorg-input-mouse_1.1.1-3_s390.deb xserver-xorg-input-mouse (1:1.1.1-3) unstable; urgency=low * xserver-xorg dependencies should be 2:1.1 not 1:1.1. Closes: #385028. * Upload to unstable (X11R7.1 transition). stable/main/binary-s390/xserver-xorg-input-kbd_1.1.0-4_s390.deb xserver-xorg-input-keyboard (1:1.1.0-4) unstable; urgency=low * Depends: xserver-xorg-core (>= 2:1.1.1-4). Closes: #391563. stable/main/binary-s390/xserver-xorg-input-joystick_1.1.0-1_s390.deb xserver-xorg-input-joystick (1:1.1.0-1) unstable; urgency=low [ Andres Salomon ] * Test for obj-$(DEB_BUILD_GNU_TYPE) before creating it during build; idempotency fix. * Run dh_install w/ --list-missing. [ Drew Parsons ] * New upstream version (X11R7.1). * Standards version 3.7.2. * [Build-] Depends: xserver-xorg (>= 2:1.1.1-1). * Use debhelper 5. * Use dh_installman to install man pages. * Exclude joystick_drv.la from dh_install. stable/main/binary-s390/xserver-xorg-input-evdev_1.1.2-6_s390.deb xserver-xorg-input-evdev (1:1.1.2-6) unstable; urgency=low * Apply upstream patch 30-absolute-axis.patch to avert potential crashes in the absolute axis setup. * Also apply 40-close-fd.patch, as the last "trivial" patch from upstream before the major changes of 1.1.3. * Use dh_installman to install man pages. stable/main/binary-s390/xserver-xorg-input-acecad_1.1.0-1_s390.deb xserver-xorg-input-acecad (1:1.1.0-1) unstable; urgency=low [ Andres Salomon ] * Test for obj-$(DEB_BUILD_GNU_TYPE) before creating it during build; idempotency fix. * Run dh_install w/ --list-missing. [ Drew Parsons ] * New upstream version (X11R7.1). * Standards version 3.7.2. * Use debhelper 5. * Use dh_installman to install man pages. * Exclude acecad_drv.la from dh_install. * Use versioned depends on xserver-xorg-dev. stable/main/binary-sparc/xserver-xorg-input-all_7.1.0-19_sparc.deb stable/main/binary-sparc/x11-common_7.1.0-19_sparc.deb stable/main/binary-sparc/xserver-xorg-video-all_7.1.0-19_sparc.deb xorg (1:7.1.0-19) stable; urgency=high * Add ${shlibs:Depends} to x11-common's Depends field, because the X server wrapper is an ELF object... oops. stable/main/binary-s390/x11-common_7.1.0-19_s390.deb stable/main/binary-s390/xserver-xorg-input-all_7.1.0-19_s390.deb stable/main/binary-s390/xserver-xorg-video-all_7.1.0-19_s390.deb xorg (1:7.1.0-19) stable; urgency=high * Add ${shlibs:Depends} to x11-common's Depends field, because the X server wrapper is an ELF object... oops. stable/main/binary-powerpc/xserver-xorg-input-all_7.1.0-19_powerpc.deb stable/main/binary-powerpc/x11-common_7.1.0-19_powerpc.deb stable/main/binary-powerpc/xserver-xorg-video-all_7.1.0-19_powerpc.deb xorg (1:7.1.0-19) stable; urgency=high * Add ${shlibs:Depends} to x11-common's Depends field, because the X server wrapper is an ELF object... oops. stable/main/binary-mipsel/xserver-xorg-video-all_7.1.0-19_mipsel.deb stable/main/binary-mipsel/x11-common_7.1.0-19_mipsel.deb stable/main/binary-mipsel/xserver-xorg-input-all_7.1.0-19_mipsel.deb xorg (1:7.1.0-19) stable; urgency=high * Add ${shlibs:Depends} to x11-common's Depends field, because the X server wrapper is an ELF object... oops. stable/main/binary-mips/x11-common_7.1.0-19_mips.deb stable/main/binary-mips/xserver-xorg-input-all_7.1.0-19_mips.deb stable/main/binary-mips/xserver-xorg-video-all_7.1.0-19_mips.deb xorg (1:7.1.0-19) stable; urgency=high * Add ${shlibs:Depends} to x11-common's Depends field, because the X server wrapper is an ELF object... oops. stable/main/binary-ia64/xserver-xorg-video-all_7.1.0-19_ia64.deb stable/main/binary-ia64/x11-common_7.1.0-19_ia64.deb stable/main/binary-ia64/xserver-xorg-input-all_7.1.0-19_ia64.deb xorg (1:7.1.0-19) stable; urgency=high * Add ${shlibs:Depends} to x11-common's Depends field, because the X server wrapper is an ELF object... oops. stable/main/binary-hppa/xserver-xorg-input-all_7.1.0-19_hppa.deb stable/main/binary-hppa/x11-common_7.1.0-19_hppa.deb stable/main/binary-hppa/xserver-xorg-video-all_7.1.0-19_hppa.deb xorg (1:7.1.0-19) stable; urgency=high * Add ${shlibs:Depends} to x11-common's Depends field, because the X server wrapper is an ELF object... oops. stable/main/binary-arm/xserver-xorg-video-all_7.1.0-19_arm.deb stable/main/binary-arm/x11-common_7.1.0-19_arm.deb stable/main/binary-arm/xserver-xorg-input-all_7.1.0-19_arm.deb xorg (1:7.1.0-19) stable; urgency=high * Add ${shlibs:Depends} to x11-common's Depends field, because the X server wrapper is an ELF object... oops. stable/main/binary-amd64/x11-common_7.1.0-19_amd64.deb stable/main/binary-amd64/xserver-xorg-input-all_7.1.0-19_amd64.deb stable/main/binary-amd64/xserver-xorg-video-all_7.1.0-19_amd64.deb xorg (1:7.1.0-19) stable; urgency=high * Add ${shlibs:Depends} to x11-common's Depends field, because the X server wrapper is an ELF object... oops. stable/main/binary-alpha/x11-common_7.1.0-19_alpha.deb stable/main/binary-alpha/xserver-xorg-video-all_7.1.0-19_alpha.deb stable/main/binary-alpha/xserver-xorg-input-all_7.1.0-19_alpha.deb xorg (1:7.1.0-19) stable; urgency=high * Add ${shlibs:Depends} to x11-common's Depends field, because the X server wrapper is an ELF object... oops. stable/main/binary-all/xlibmesa-gl_7.1.0-19_all.deb stable/main/binary-all/xlibmesa-dri_7.1.0-19_all.deb stable/main/binary-all/xlibmesa-gl-dev_7.1.0-19_all.deb stable/main/source/xorg_7.1.0-19.dsc stable/main/binary-all/xserver-xfree86_7.1.0-19_all.deb stable/main/binary-all/xorg-dev_7.1.0-19_all.deb stable/main/binary-all/x-window-system_7.1.0-19_all.deb stable/main/binary-all/xlibs-data_7.1.0-19_all.deb stable/main/binary-all/xlibs-static-dev_7.1.0-19_all.deb stable/main/binary-all/xlibmesa-glu_7.1.0-19_all.deb stable/main/binary-all/libglu1-xorg-dev_7.1.0-19_all.deb stable/main/binary-i386/x11-common_7.1.0-19_i386.deb stable/main/binary-all/xorg_7.1.0-19_all.deb stable/main/binary-all/libglu1-xorg_7.1.0-19_all.deb stable/main/binary-i386/xserver-xorg-video-all_7.1.0-19_i386.deb stable/main/source/xorg_7.1.0-19.tar.gz stable/main/binary-all/xserver-xorg_7.1.0-19_all.deb stable/main/binary-i386/xserver-xorg-input-all_7.1.0-19_i386.deb stable/main/binary-all/x-window-system-core_7.1.0-19_all.deb xorg (1:7.1.0-19) stable; urgency=high * Add ${shlibs:Depends} to x11-common's Depends field, because the X server wrapper is an ELF object... oops. stable/main/binary-arm/xfce4-session_4.3.99.1-2_arm.deb xfce4-session (4.3.99.1-2) testing; urgency=low * Remove xfce4-session.rc from package and depends on desktop-base to use its file, with Debian Artwork splascreen. stable/main/source/wordpress_2.0.10-1.diff.gz stable/main/source/wordpress_2.0.10.orig.tar.gz stable/main/binary-all/wordpress_2.0.10-1_all.deb stable/main/source/wordpress_2.0.10-1.dsc wordpress (2.0.10-1) stable-security; urgency=high * Non-maintainer upload by the Security Team. Thanks to Kai Hendry for preparing the update. * New upstream security release * http://wordpress.org/development/2007/04/wordpress-213-and-2010/ * http://trac.wordpress.org/milestone/2.0.10 * CVE-2007-1622, CVE-2007-1893, CVE-2007-1894, CVE-2007-1897 stable/contrib/binary-sparc/vice_1.19-1etch1_sparc.deb vice (1.19-1etch1) stable; urgency=low * Fix regression caused by libx11-6 security fix (closes: #418295). * Correct menu file. stable/contrib/binary-s390/vice_1.19-1etch1_s390.deb vice (1.19-1etch1) stable; urgency=low * Fix regression caused by libx11-6 security fix (closes: #418295). * Correct menu file. stable/contrib/binary-powerpc/vice_1.19-1etch1_powerpc.deb vice (1.19-1etch1) stable; urgency=low * Fix regression caused by libx11-6 security fix (closes: #418295). * Correct menu file. stable/contrib/binary-mipsel/vice_1.19-1etch1_mipsel.deb vice (1.19-1etch1) stable; urgency=low * Fix regression caused by libx11-6 security fix (closes: #418295). * Correct menu file. stable/contrib/binary-mips/vice_1.19-1etch1_mips.deb vice (1.19-1etch1) stable; urgency=low * Fix regression caused by libx11-6 security fix (closes: #418295). * Correct menu file. stable/contrib/binary-ia64/vice_1.19-1etch1_ia64.deb vice (1.19-1etch1) stable; urgency=low * Fix regression caused by libx11-6 security fix (closes: #418295). * Correct menu file. stable/contrib/binary-hppa/vice_1.19-1etch1_hppa.deb vice (1.19-1etch1) stable; urgency=low * Fix regression caused by libx11-6 security fix (closes: #418295). * Correct menu file. stable/contrib/binary-arm/vice_1.19-1etch1_arm.deb vice (1.19-1etch1) stable; urgency=low * Fix regression caused by libx11-6 security fix (closes: #418295). * Correct menu file. stable/contrib/binary-amd64/vice_1.19-1etch1_amd64.deb vice (1.19-1etch1) stable; urgency=low * Fix regression caused by libx11-6 security fix (closes: #418295). * Correct menu file. stable/contrib/binary-alpha/vice_1.19-1etch1_alpha.deb vice (1.19-1etch1) stable; urgency=low * Fix regression caused by libx11-6 security fix (closes: #418295). * Correct menu file. stable/contrib/source/vice_1.19-1etch1.diff.gz stable/contrib/binary-i386/vice_1.19-1etch1_i386.deb stable/contrib/source/vice_1.19-1etch1.dsc vice (1.19-1etch1) stable; urgency=low * Fix regression caused by libx11-6 security fix (closes: #418295). * Correct menu file. stable/main/binary-all/user-setup-udeb_1.11etch1_all.udeb stable/main/source/user-setup_1.11etch1.tar.gz stable/main/source/user-setup_1.11etch1.dsc stable/main/binary-all/user-setup_1.11etch1_all.deb user-setup (1.11etch1) stable; urgency=low [ Joey Hess ] * Fix user-setup-apply to properly set up gksu alternatives for sudo mode. The chroot calls were broken. Closes: #421323 * Additionally, fix chroot call bug in sudo installation code. stable/main/source/user-mode-linux_2.6.18-1um-2etch2.dsc stable/main/source/user-mode-linux_2.6.18-1um-2etch2.diff.gz stable/main/binary-i386/user-mode-linux_2.6.18-1um-2etch2_i386.deb user-mode-linux (2.6.18-1um-2etch2) stable-security; urgency=high * NMU by the Security Team * Rebuild against linux-source-2.6.18 (2.6.18.dfsg.1-12etch2): * bugfix/nfnetlink_log-null-deref.patch [SECURITY] Fix remotely exploitable NULL pointer dereference in nfulnl_recv_config() See CVE-2007-1496 * bugfix/nf_conntrack-set-nfctinfo.patch [SECURITY] Fix incorrect classification of IPv6 fragments as ESTABLISHED, which allows remote attackers to bypass certain rulesets See CVE-2007-1497 * bugfix/netlink-infinite-recursion.patch [SECURITY] Fix infinite recursion bug in netlink See CVE-2007-1861 * bugfix/nl_fib_lookup-oops.patch Add fix for oops bug added by previous patch stable/main/binary-alpha/twinkle_0.9-6_alpha.deb twinkle (1:0.9-6) testing-proposed-updates; urgency=medium * Apply upstream memman.patch to fix random twinkle crashes - crash on call end (Closes: #402509) * Loaded direct to t-p-u as discussed on debian-release stable/main/source/trac_0.10.3-1etch2.dsc stable/main/binary-all/trac_0.10.3-1etch2_all.deb stable/main/source/trac_0.10.3-1etch2.diff.gz trac (0.10.3-1etch2) stable; urgency=low * Add 03_backport_r4664_r4670_r4699.dpatch patch backporting fixes from 0.10.4 to concurrent resync handling. (Closes: #425909) stable/main/source/tetex-base_3.0.dfsg.3-5etch1.diff.gz stable/main/binary-all/tetex-extra_3.0.dfsg.3-5etch1_all.deb stable/main/binary-all/tetex-base_3.0.dfsg.3-5etch1_all.deb stable/main/source/tetex-base_3.0.dfsg.3-5etch1.dsc stable/main/binary-all/tetex-doc_3.0.dfsg.3-5etch1_all.deb tetex-base (3.0.dfsg.3-5etch1) stable; urgency=low * The postrm script does no longer remove lots of supposedly obsolete files upon purge. These files are now again needed for texlive (closes: #420390) * Upload to stable-proposed-updates stable/main/binary-amd64/stalin_0.11-1_amd64.deb stalin (0.11-1) unstable; urgency=medium * Migrate to a new upstream release; This should resolve the licensing issues with the opengl/xlib bindings. (closes: #375943) * Remove dependency on gcc-3.4. The bug in gcc-4.1 has been fixed, and gcc-4.0 should work correctly as well. * Add dependencies on dpkg-dev; stalin-architecture-name uses it now. * Add support for ia64 and amd64. * Generate new precompiled C source for all architectures. (closes: #337169) * Drop support for m68k and arm since, if nothing else, their buildds don't have enough RAM. For the same reason, don't add powerpc. (closes: #271836, #273130) * Change xlibs-dev dependency to libx11-dev. (closes: #347053) * Add build-time support for selection of scheme compiler, i.e. "stalin=./stalin ./build" * Change upstream gcc -O3 to -O2; -O3 requires much more RAM. * Generalize makefile architecture support (i.e. stalin-arch-%.c) and add all-precompiled-srcs target. * Test the build by running some benchmarks afterward. * Invoke benchmarks/make-clean from "make clean". * Drop stalin-wrapper; stalin itself handles things now. stable/main/source/squirrelmail_1.4.9a-2.dsc stable/main/binary-all/squirrelmail_1.4.9a-2_all.deb stable/main/source/squirrelmail_1.4.9a-2.diff.gz squirrelmail (2:1.4.9a-2) stable-security; urgency=high * Security upload for stable. - Fixes cross site scripting in the HTML filter [CVE-2007-1262] stable/main/binary-s390/slang-cfitsio_0.3.2b-5_s390.deb slcfitsio (0.3.2b-5) unstable; urgency=low +++ Changes by Rafael Laboissiere * debian/watch: Added file * debian/patches/slsh-debug-option.patch: Removed patch, which was introduced in the last release for testing purposes * debian/rules: No inclusion of CDBS' simple-patchsys.mk stable/main/binary-mipsel/slang-cfitsio_0.3.2b-5_mipsel.deb slcfitsio (0.3.2b-5) unstable; urgency=low +++ Changes by Rafael Laboissiere * debian/watch: Added file * debian/patches/slsh-debug-option.patch: Removed patch, which was introduced in the last release for testing purposes * debian/rules: No inclusion of CDBS' simple-patchsys.mk stable/main/binary-arm/slang-cfitsio_0.3.2b-5_arm.deb slcfitsio (0.3.2b-5) unstable; urgency=low +++ Changes by Rafael Laboissiere * debian/watch: Added file * debian/patches/slsh-debug-option.patch: Removed patch, which was introduced in the last release for testing purposes * debian/rules: No inclusion of CDBS' simple-patchsys.mk stable/main/binary-s390/setpwc_1.1-4_s390.deb setpwc (1.1-4) unstable; urgency=low * Set Architecture free. (Closes: #402724: packages restricted to i386 and amd64 for no reason) stable/main/binary-sparc/samba-dbg_3.0.24-6etch4_sparc.deb stable/main/binary-sparc/swat_3.0.24-6etch4_sparc.deb stable/main/binary-sparc/python-samba_3.0.24-6etch4_sparc.deb stable/main/binary-sparc/smbfs_3.0.24-6etch4_sparc.deb stable/main/binary-sparc/samba_3.0.24-6etch4_sparc.deb stable/main/binary-sparc/samba-common_3.0.24-6etch4_sparc.deb stable/main/binary-sparc/winbind_3.0.24-6etch4_sparc.deb stable/main/binary-sparc/smbclient_3.0.24-6etch4_sparc.deb stable/main/binary-sparc/libsmbclient_3.0.24-6etch4_sparc.deb stable/main/binary-sparc/libsmbclient-dev_3.0.24-6etch4_sparc.deb stable/main/binary-sparc/libpam-smbpass_3.0.24-6etch4_sparc.deb samba (3.0.24-6etch4) stable-security; urgency=high * Fix a regression introduced by the fix for CVE-2007-2446, which broke connections to servers that are domain members. Closes: #425680 stable/main/binary-s390/samba_3.0.24-6etch4_s390.deb stable/main/binary-s390/winbind_3.0.24-6etch4_s390.deb stable/main/binary-s390/smbclient_3.0.24-6etch4_s390.deb stable/main/binary-s390/samba-common_3.0.24-6etch4_s390.deb stable/main/binary-s390/python-samba_3.0.24-6etch4_s390.deb stable/main/binary-s390/libpam-smbpass_3.0.24-6etch4_s390.deb stable/main/binary-s390/swat_3.0.24-6etch4_s390.deb stable/main/binary-s390/libsmbclient_3.0.24-6etch4_s390.deb stable/main/binary-s390/smbfs_3.0.24-6etch4_s390.deb stable/main/binary-s390/samba-dbg_3.0.24-6etch4_s390.deb stable/main/binary-s390/libsmbclient-dev_3.0.24-6etch4_s390.deb samba (3.0.24-6etch4) stable-security; urgency=high * Fix a regression introduced by the fix for CVE-2007-2446, which broke connections to servers that are domain members. Closes: #425680 stable/main/binary-powerpc/swat_3.0.24-6etch4_powerpc.deb stable/main/binary-powerpc/python-samba_3.0.24-6etch4_powerpc.deb stable/main/binary-powerpc/libsmbclient-dev_3.0.24-6etch4_powerpc.deb stable/main/binary-powerpc/libpam-smbpass_3.0.24-6etch4_powerpc.deb stable/main/binary-powerpc/smbclient_3.0.24-6etch4_powerpc.deb stable/main/binary-powerpc/samba-common_3.0.24-6etch4_powerpc.deb stable/main/binary-powerpc/samba-dbg_3.0.24-6etch4_powerpc.deb stable/main/binary-powerpc/samba_3.0.24-6etch4_powerpc.deb stable/main/binary-powerpc/smbfs_3.0.24-6etch4_powerpc.deb stable/main/binary-powerpc/winbind_3.0.24-6etch4_powerpc.deb stable/main/binary-powerpc/libsmbclient_3.0.24-6etch4_powerpc.deb samba (3.0.24-6etch4) stable-security; urgency=high * Fix a regression introduced by the fix for CVE-2007-2446, which broke connections to servers that are domain members. Closes: #425680 stable/main/binary-mipsel/samba-common_3.0.24-6etch4_mipsel.deb stable/main/binary-mipsel/samba_3.0.24-6etch4_mipsel.deb stable/main/binary-mipsel/swat_3.0.24-6etch4_mipsel.deb stable/main/binary-mipsel/smbclient_3.0.24-6etch4_mipsel.deb stable/main/binary-mipsel/winbind_3.0.24-6etch4_mipsel.deb stable/main/binary-mipsel/python-samba_3.0.24-6etch4_mipsel.deb stable/main/binary-mipsel/libpam-smbpass_3.0.24-6etch4_mipsel.deb stable/main/binary-mipsel/smbfs_3.0.24-6etch4_mipsel.deb stable/main/binary-mipsel/libsmbclient_3.0.24-6etch4_mipsel.deb stable/main/binary-mipsel/libsmbclient-dev_3.0.24-6etch4_mipsel.deb stable/main/binary-mipsel/samba-dbg_3.0.24-6etch4_mipsel.deb samba (3.0.24-6etch4) stable-security; urgency=high * Fix a regression introduced by the fix for CVE-2007-2446, which broke connections to servers that are domain members. Closes: #425680 stable/main/binary-mips/smbfs_3.0.24-6etch4_mips.deb stable/main/binary-mips/samba-common_3.0.24-6etch4_mips.deb stable/main/binary-mips/samba-dbg_3.0.24-6etch4_mips.deb stable/main/binary-mips/libsmbclient-dev_3.0.24-6etch4_mips.deb stable/main/binary-mips/smbclient_3.0.24-6etch4_mips.deb stable/main/binary-mips/samba_3.0.24-6etch4_mips.deb stable/main/binary-mips/libpam-smbpass_3.0.24-6etch4_mips.deb stable/main/binary-mips/python-samba_3.0.24-6etch4_mips.deb stable/main/binary-mips/winbind_3.0.24-6etch4_mips.deb stable/main/binary-mips/swat_3.0.24-6etch4_mips.deb stable/main/binary-mips/libsmbclient_3.0.24-6etch4_mips.deb samba (3.0.24-6etch4) stable-security; urgency=high * Fix a regression introduced by the fix for CVE-2007-2446, which broke connections to servers that are domain members. Closes: #425680 stable/main/binary-ia64/libsmbclient_3.0.24-6etch4_ia64.deb stable/main/binary-ia64/smbfs_3.0.24-6etch4_ia64.deb stable/main/binary-ia64/libsmbclient-dev_3.0.24-6etch4_ia64.deb stable/main/binary-ia64/winbind_3.0.24-6etch4_ia64.deb stable/main/binary-ia64/samba_3.0.24-6etch4_ia64.deb stable/main/binary-ia64/samba-dbg_3.0.24-6etch4_ia64.deb stable/main/binary-ia64/swat_3.0.24-6etch4_ia64.deb stable/main/binary-ia64/samba-common_3.0.24-6etch4_ia64.deb stable/main/binary-ia64/smbclient_3.0.24-6etch4_ia64.deb stable/main/binary-ia64/libpam-smbpass_3.0.24-6etch4_ia64.deb stable/main/binary-ia64/python-samba_3.0.24-6etch4_ia64.deb samba (3.0.24-6etch4) stable-security; urgency=high * Fix a regression introduced by the fix for CVE-2007-2446, which broke connections to servers that are domain members. Closes: #425680 stable/main/binary-hppa/python-samba_3.0.24-6etch4_hppa.deb stable/main/binary-hppa/libsmbclient_3.0.24-6etch4_hppa.deb stable/main/binary-hppa/smbfs_3.0.24-6etch4_hppa.deb stable/main/binary-hppa/samba_3.0.24-6etch4_hppa.deb stable/main/binary-hppa/libpam-smbpass_3.0.24-6etch4_hppa.deb stable/main/binary-hppa/winbind_3.0.24-6etch4_hppa.deb stable/main/binary-hppa/samba-dbg_3.0.24-6etch4_hppa.deb stable/main/binary-hppa/samba-common_3.0.24-6etch4_hppa.deb stable/main/binary-hppa/swat_3.0.24-6etch4_hppa.deb stable/main/binary-hppa/smbclient_3.0.24-6etch4_hppa.deb stable/main/binary-hppa/libsmbclient-dev_3.0.24-6etch4_hppa.deb samba (3.0.24-6etch4) stable-security; urgency=high * Fix a regression introduced by the fix for CVE-2007-2446, which broke connections to servers that are domain members. Closes: #425680 stable/main/binary-arm/python-samba_3.0.24-6etch4_arm.deb stable/main/binary-arm/libsmbclient-dev_3.0.24-6etch4_arm.deb stable/main/binary-arm/samba-common_3.0.24-6etch4_arm.deb stable/main/binary-arm/smbfs_3.0.24-6etch4_arm.deb stable/main/binary-arm/libpam-smbpass_3.0.24-6etch4_arm.deb stable/main/binary-arm/libsmbclient_3.0.24-6etch4_arm.deb stable/main/binary-arm/smbclient_3.0.24-6etch4_arm.deb stable/main/binary-arm/swat_3.0.24-6etch4_arm.deb stable/main/binary-arm/winbind_3.0.24-6etch4_arm.deb stable/main/binary-arm/samba_3.0.24-6etch4_arm.deb stable/main/binary-arm/samba-dbg_3.0.24-6etch4_arm.deb samba (3.0.24-6etch4) stable-security; urgency=high * Fix a regression introduced by the fix for CVE-2007-2446, which broke connections to servers that are domain members. Closes: #425680 stable/main/binary-amd64/smbfs_3.0.24-6etch4_amd64.deb stable/main/binary-amd64/smbclient_3.0.24-6etch4_amd64.deb stable/main/binary-amd64/libsmbclient-dev_3.0.24-6etch4_amd64.deb stable/main/binary-amd64/swat_3.0.24-6etch4_amd64.deb stable/main/binary-amd64/samba-common_3.0.24-6etch4_amd64.deb stable/main/binary-amd64/samba-dbg_3.0.24-6etch4_amd64.deb stable/main/binary-amd64/libpam-smbpass_3.0.24-6etch4_amd64.deb stable/main/binary-amd64/winbind_3.0.24-6etch4_amd64.deb stable/main/binary-amd64/python-samba_3.0.24-6etch4_amd64.deb stable/main/binary-amd64/samba_3.0.24-6etch4_amd64.deb stable/main/binary-amd64/libsmbclient_3.0.24-6etch4_amd64.deb samba (3.0.24-6etch4) stable-security; urgency=high * Fix a regression introduced by the fix for CVE-2007-2446, which broke connections to servers that are domain members. Closes: #425680 stable/main/binary-alpha/smbclient_3.0.24-6etch4_alpha.deb stable/main/binary-alpha/samba-common_3.0.24-6etch4_alpha.deb stable/main/binary-alpha/samba_3.0.24-6etch4_alpha.deb stable/main/binary-alpha/python-samba_3.0.24-6etch4_alpha.deb stable/main/binary-alpha/libpam-smbpass_3.0.24-6etch4_alpha.deb stable/main/binary-alpha/libsmbclient-dev_3.0.24-6etch4_alpha.deb stable/main/binary-alpha/winbind_3.0.24-6etch4_alpha.deb stable/main/binary-alpha/swat_3.0.24-6etch4_alpha.deb stable/main/binary-alpha/libsmbclient_3.0.24-6etch4_alpha.deb stable/main/binary-alpha/smbfs_3.0.24-6etch4_alpha.deb stable/main/binary-alpha/samba-dbg_3.0.24-6etch4_alpha.deb samba (3.0.24-6etch4) stable-security; urgency=high * Fix a regression introduced by the fix for CVE-2007-2446, which broke connections to servers that are domain members. Closes: #425680 stable/main/binary-i386/samba-dbg_3.0.24-6etch4_i386.deb stable/main/binary-i386/smbclient_3.0.24-6etch4_i386.deb stable/main/source/samba_3.0.24-6etch4.dsc stable/main/binary-i386/swat_3.0.24-6etch4_i386.deb stable/main/binary-i386/libsmbclient_3.0.24-6etch4_i386.deb stable/main/binary-all/samba-doc-pdf_3.0.24-6etch4_all.deb stable/main/binary-all/samba-doc_3.0.24-6etch4_all.deb stable/main/binary-i386/libsmbclient-dev_3.0.24-6etch4_i386.deb stable/main/binary-i386/samba_3.0.24-6etch4_i386.deb stable/main/binary-i386/winbind_3.0.24-6etch4_i386.deb stable/main/binary-i386/libpam-smbpass_3.0.24-6etch4_i386.deb stable/main/binary-i386/samba-common_3.0.24-6etch4_i386.deb stable/main/binary-i386/smbfs_3.0.24-6etch4_i386.deb stable/main/source/samba_3.0.24-6etch4.diff.gz stable/main/binary-i386/python-samba_3.0.24-6etch4_i386.deb samba (3.0.24-6etch4) stable-security; urgency=high * Fix a regression introduced by the fix for CVE-2007-2446, which broke connections to servers that are domain members. Closes: #425680 stable/main/binary-powerpc/rlwrap_0.24-2_powerpc.deb rlwrap (0.24-2) testing; urgency=medium * Changed debian/rules to use $(CURDIR) instead of $(PWD) so package building works in sudo based environments. (Closes: #403952). stable/main/binary-arm/rlwrap_0.24-2_arm.deb rlwrap (0.24-2) testing; urgency=medium * Changed debian/rules to use $(CURDIR) instead of $(PWD) so package building works in sudo based environments. (Closes: #403952). stable/main/binary-amd64/rlwrap_0.24-2_amd64.deb rlwrap (0.24-2) testing; urgency=medium * Changed debian/rules to use $(CURDIR) instead of $(PWD) so package building works in sudo based environments. (Closes: #403952). stable/main/binary-sparc/rdesktop_1.5.0-1etch1_sparc.deb rdesktop (1.5.0-1etch1) stable; urgency=low * Fix segfault regression caused by libx11-6 security fix (closes: #418654). stable/main/binary-s390/rdesktop_1.5.0-1etch1_s390.deb rdesktop (1.5.0-1etch1) stable; urgency=low * Fix segfault regression caused by libx11-6 security fix (closes: #418654). stable/main/binary-powerpc/rdesktop_1.5.0-1etch1_powerpc.deb rdesktop (1.5.0-1etch1) stable; urgency=low * Fix segfault regression caused by libx11-6 security fix (closes: #418654). stable/main/binary-mipsel/rdesktop_1.5.0-1etch1_mipsel.deb rdesktop (1.5.0-1etch1) stable; urgency=low * Fix segfault regression caused by libx11-6 security fix (closes: #418654). stable/main/binary-mips/rdesktop_1.5.0-1etch1_mips.deb rdesktop (1.5.0-1etch1) stable; urgency=low * Fix segfault regression caused by libx11-6 security fix (closes: #418654). stable/main/binary-ia64/rdesktop_1.5.0-1etch1_ia64.deb rdesktop (1.5.0-1etch1) stable; urgency=low * Fix segfault regression caused by libx11-6 security fix (closes: #418654). stable/main/binary-hppa/rdesktop_1.5.0-1etch1_hppa.deb rdesktop (1.5.0-1etch1) stable; urgency=low * Fix segfault regression caused by libx11-6 security fix (closes: #418654). stable/main/binary-arm/rdesktop_1.5.0-1etch1_arm.deb rdesktop (1.5.0-1etch1) stable; urgency=low * Fix segfault regression caused by libx11-6 security fix (closes: #418654). stable/main/binary-amd64/rdesktop_1.5.0-1etch1_amd64.deb rdesktop (1.5.0-1etch1) stable; urgency=low * Fix segfault regression caused by libx11-6 security fix (closes: #418654). stable/main/binary-alpha/rdesktop_1.5.0-1etch1_alpha.deb rdesktop (1.5.0-1etch1) stable; urgency=low * Fix segfault regression caused by libx11-6 security fix (closes: #418654). stable/main/binary-i386/rdesktop_1.5.0-1etch1_i386.deb stable/main/source/rdesktop_1.5.0-1etch1.dsc stable/main/source/rdesktop_1.5.0-1etch1.diff.gz rdesktop (1.5.0-1etch1) stable; urgency=low * Fix segfault regression caused by libx11-6 security fix (closes: #418654). stable/main/binary-sparc/quagga_0.99.5-5etch2_sparc.deb quagga (0.99.5-5etch2) stable-security; urgency=high * SECURITY: The bgpd daemon was vulnerable to a Denial-of-Service. Configured peers could cause a Quagga bgpd to, typically, assert() and abort. The DoS could be triggered by peers by sending an UPDATE message with a crafted, malformed Multi-Protocol reachable/unreachable NLRI attribute. Quagga Bug#354. Closes: #418323 stable/main/binary-s390/quagga_0.99.5-5etch2_s390.deb quagga (0.99.5-5etch2) stable-security; urgency=high * SECURITY: The bgpd daemon was vulnerable to a Denial-of-Service. Configured peers could cause a Quagga bgpd to, typically, assert() and abort. The DoS could be triggered by peers by sending an UPDATE message with a crafted, malformed Multi-Protocol reachable/unreachable NLRI attribute. Quagga Bug#354. Closes: #418323 stable/main/binary-powerpc/quagga_0.99.5-5etch2_powerpc.deb quagga (0.99.5-5etch2) stable-security; urgency=high * SECURITY: The bgpd daemon was vulnerable to a Denial-of-Service. Configured peers could cause a Quagga bgpd to, typically, assert() and abort. The DoS could be triggered by peers by sending an UPDATE message with a crafted, malformed Multi-Protocol reachable/unreachable NLRI attribute. Quagga Bug#354. Closes: #418323 stable/main/binary-mipsel/quagga_0.99.5-5etch2_mipsel.deb quagga (0.99.5-5etch2) stable-security; urgency=high * SECURITY: The bgpd daemon was vulnerable to a Denial-of-Service. Configured peers could cause a Quagga bgpd to, typically, assert() and abort. The DoS could be triggered by peers by sending an UPDATE message with a crafted, malformed Multi-Protocol reachable/unreachable NLRI attribute. Quagga Bug#354. Closes: #418323 stable/main/binary-mips/quagga_0.99.5-5etch2_mips.deb quagga (0.99.5-5etch2) stable-security; urgency=high * SECURITY: The bgpd daemon was vulnerable to a Denial-of-Service. Configured peers could cause a Quagga bgpd to, typically, assert() and abort. The DoS could be triggered by peers by sending an UPDATE message with a crafted, malformed Multi-Protocol reachable/unreachable NLRI attribute. Quagga Bug#354. Closes: #418323 stable/main/binary-ia64/quagga_0.99.5-5etch2_ia64.deb quagga (0.99.5-5etch2) stable-security; urgency=high * SECURITY: The bgpd daemon was vulnerable to a Denial-of-Service. Configured peers could cause a Quagga bgpd to, typically, assert() and abort. The DoS could be triggered by peers by sending an UPDATE message with a crafted, malformed Multi-Protocol reachable/unreachable NLRI attribute. Quagga Bug#354. Closes: #418323 stable/main/binary-i386/quagga_0.99.5-5etch2_i386.deb quagga (0.99.5-5etch2) stable-security; urgency=high * SECURITY: The bgpd daemon was vulnerable to a Denial-of-Service. Configured peers could cause a Quagga bgpd to, typically, assert() and abort. The DoS could be triggered by peers by sending an UPDATE message with a crafted, malformed Multi-Protocol reachable/unreachable NLRI attribute. Quagga Bug#354. Closes: #418323 stable/main/binary-hppa/quagga_0.99.5-5etch2_hppa.deb quagga (0.99.5-5etch2) stable-security; urgency=high * SECURITY: The bgpd daemon was vulnerable to a Denial-of-Service. Configured peers could cause a Quagga bgpd to, typically, assert() and abort. The DoS could be triggered by peers by sending an UPDATE message with a crafted, malformed Multi-Protocol reachable/unreachable NLRI attribute. Quagga Bug#354. Closes: #418323 stable/main/binary-arm/quagga_0.99.5-5etch2_arm.deb quagga (0.99.5-5etch2) stable-security; urgency=high * SECURITY: The bgpd daemon was vulnerable to a Denial-of-Service. Configured peers could cause a Quagga bgpd to, typically, assert() and abort. The DoS could be triggered by peers by sending an UPDATE message with a crafted, malformed Multi-Protocol reachable/unreachable NLRI attribute. Quagga Bug#354. Closes: #418323 stable/main/binary-alpha/quagga_0.99.5-5etch2_alpha.deb quagga (0.99.5-5etch2) stable-security; urgency=high * SECURITY: The bgpd daemon was vulnerable to a Denial-of-Service. Configured peers could cause a Quagga bgpd to, typically, assert() and abort. The DoS could be triggered by peers by sending an UPDATE message with a crafted, malformed Multi-Protocol reachable/unreachable NLRI attribute. Quagga Bug#354. Closes: #418323 stable/main/binary-amd64/quagga_0.99.5-5etch2_amd64.deb stable/main/source/quagga_0.99.5-5etch2.diff.gz stable/main/source/quagga_0.99.5-5etch2.dsc stable/main/binary-all/quagga-doc_0.99.5-5etch2_all.deb quagga (0.99.5-5etch2) stable-security; urgency=high * SECURITY: The bgpd daemon was vulnerable to a Denial-of-Service. Configured peers could cause a Quagga bgpd to, typically, assert() and abort. The DoS could be triggered by peers by sending an UPDATE message with a crafted, malformed Multi-Protocol reachable/unreachable NLRI attribute. Quagga Bug#354. Closes: #418323 stable/main/binary-sparc/libqt4-debug_4.2.1-2+etch1_sparc.deb stable/main/binary-sparc/qt4-qtconfig_4.2.1-2+etch1_sparc.deb stable/main/binary-sparc/qt4-designer_4.2.1-2+etch1_sparc.deb stable/main/binary-sparc/libqt4-dev_4.2.1-2+etch1_sparc.deb stable/main/binary-sparc/qt4-dev-tools_4.2.1-2+etch1_sparc.deb stable/main/binary-sparc/libqt4-gui_4.2.1-2+etch1_sparc.deb stable/main/binary-sparc/libqt4-sql_4.2.1-2+etch1_sparc.deb stable/main/binary-sparc/libqt4-core_4.2.1-2+etch1_sparc.deb stable/main/binary-sparc/libqt4-qt3support_4.2.1-2+etch1_sparc.deb qt4-x11 (4.2.1-2+etch1) stable-security; urgency=high * Non-maintainer upload by the Security Team * Fix UTF8 long sequence rejection bug (CVE-2007-0242) stable/main/binary-s390/libqt4-sql_4.2.1-2+etch1_s390.deb stable/main/binary-s390/libqt4-gui_4.2.1-2+etch1_s390.deb stable/main/binary-s390/qt4-designer_4.2.1-2+etch1_s390.deb stable/main/binary-s390/libqt4-qt3support_4.2.1-2+etch1_s390.deb stable/main/binary-s390/libqt4-dev_4.2.1-2+etch1_s390.deb stable/main/binary-s390/qt4-qtconfig_4.2.1-2+etch1_s390.deb stable/main/binary-s390/libqt4-debug_4.2.1-2+etch1_s390.deb stable/main/binary-s390/libqt4-core_4.2.1-2+etch1_s390.deb stable/main/binary-s390/qt4-dev-tools_4.2.1-2+etch1_s390.deb qt4-x11 (4.2.1-2+etch1) stable-security; urgency=high * Non-maintainer upload by the Security Team * Fix UTF8 long sequence rejection bug (CVE-2007-0242) stable/main/binary-powerpc/libqt4-sql_4.2.1-2+etch1_powerpc.deb stable/main/binary-powerpc/libqt4-qt3support_4.2.1-2+etch1_powerpc.deb stable/main/binary-powerpc/libqt4-core_4.2.1-2+etch1_powerpc.deb stable/main/binary-powerpc/qt4-dev-tools_4.2.1-2+etch1_powerpc.deb stable/main/binary-powerpc/libqt4-dev_4.2.1-2+etch1_powerpc.deb stable/main/binary-powerpc/qt4-designer_4.2.1-2+etch1_powerpc.deb stable/main/binary-powerpc/libqt4-gui_4.2.1-2+etch1_powerpc.deb stable/main/binary-powerpc/libqt4-debug_4.2.1-2+etch1_powerpc.deb stable/main/binary-powerpc/qt4-qtconfig_4.2.1-2+etch1_powerpc.deb qt4-x11 (4.2.1-2+etch1) stable-security; urgency=high * Non-maintainer upload by the Security Team * Fix UTF8 long sequence rejection bug (CVE-2007-0242) stable/main/binary-mipsel/qt4-dev-tools_4.2.1-2+etch1_mipsel.deb stable/main/binary-mipsel/libqt4-debug_4.2.1-2+etch1_mipsel.deb stable/main/binary-mipsel/qt4-qtconfig_4.2.1-2+etch1_mipsel.deb stable/main/binary-mipsel/libqt4-dev_4.2.1-2+etch1_mipsel.deb stable/main/binary-mipsel/libqt4-qt3support_4.2.1-2+etch1_mipsel.deb stable/main/binary-mipsel/libqt4-gui_4.2.1-2+etch1_mipsel.deb stable/main/binary-mipsel/libqt4-core_4.2.1-2+etch1_mipsel.deb stable/main/binary-mipsel/libqt4-sql_4.2.1-2+etch1_mipsel.deb stable/main/binary-mipsel/qt4-designer_4.2.1-2+etch1_mipsel.deb qt4-x11 (4.2.1-2+etch1) stable-security; urgency=high * Non-maintainer upload by the Security Team * Fix UTF8 long sequence rejection bug (CVE-2007-0242) stable/main/binary-mips/libqt4-dev_4.2.1-2+etch1_mips.deb stable/main/binary-mips/qt4-qtconfig_4.2.1-2+etch1_mips.deb stable/main/binary-mips/qt4-designer_4.2.1-2+etch1_mips.deb stable/main/binary-mips/libqt4-gui_4.2.1-2+etch1_mips.deb stable/main/binary-mips/libqt4-sql_4.2.1-2+etch1_mips.deb stable/main/binary-mips/qt4-dev-tools_4.2.1-2+etch1_mips.deb stable/main/binary-mips/libqt4-qt3support_4.2.1-2+etch1_mips.deb stable/main/binary-mips/libqt4-debug_4.2.1-2+etch1_mips.deb stable/main/binary-mips/libqt4-core_4.2.1-2+etch1_mips.deb qt4-x11 (4.2.1-2+etch1) stable-security; urgency=high * Non-maintainer upload by the Security Team * Fix UTF8 long sequence rejection bug (CVE-2007-0242) stable/main/binary-ia64/libqt4-sql_4.2.1-2+etch1_ia64.deb stable/main/binary-ia64/libqt4-gui_4.2.1-2+etch1_ia64.deb stable/main/binary-ia64/qt4-designer_4.2.1-2+etch1_ia64.deb stable/main/binary-ia64/qt4-qtconfig_4.2.1-2+etch1_ia64.deb stable/main/binary-ia64/libqt4-dev_4.2.1-2+etch1_ia64.deb stable/main/binary-ia64/libqt4-qt3support_4.2.1-2+etch1_ia64.deb stable/main/binary-ia64/libqt4-debug_4.2.1-2+etch1_ia64.deb stable/main/binary-ia64/qt4-dev-tools_4.2.1-2+etch1_ia64.deb stable/main/binary-ia64/libqt4-core_4.2.1-2+etch1_ia64.deb qt4-x11 (4.2.1-2+etch1) stable-security; urgency=high * Non-maintainer upload by the Security Team * Fix UTF8 long sequence rejection bug (CVE-2007-0242) stable/main/binary-i386/libqt4-core_4.2.1-2+etch1_i386.deb stable/main/binary-i386/libqt4-debug_4.2.1-2+etch1_i386.deb stable/main/binary-i386/qt4-dev-tools_4.2.1-2+etch1_i386.deb stable/main/binary-i386/qt4-qtconfig_4.2.1-2+etch1_i386.deb stable/main/binary-i386/qt4-designer_4.2.1-2+etch1_i386.deb stable/main/binary-i386/libqt4-dev_4.2.1-2+etch1_i386.deb stable/main/binary-i386/libqt4-qt3support_4.2.1-2+etch1_i386.deb stable/main/binary-i386/libqt4-sql_4.2.1-2+etch1_i386.deb stable/main/binary-i386/libqt4-gui_4.2.1-2+etch1_i386.deb qt4-x11 (4.2.1-2+etch1) stable-security; urgency=high * Non-maintainer upload by the Security Team * Fix UTF8 long sequence rejection bug (CVE-2007-0242) stable/main/binary-hppa/libqt4-sql_4.2.1-2+etch1_hppa.deb stable/main/binary-hppa/qt4-designer_4.2.1-2+etch1_hppa.deb stable/main/binary-hppa/qt4-qtconfig_4.2.1-2+etch1_hppa.deb stable/main/binary-hppa/libqt4-qt3support_4.2.1-2+etch1_hppa.deb stable/main/binary-hppa/libqt4-dev_4.2.1-2+etch1_hppa.deb stable/main/binary-hppa/libqt4-debug_4.2.1-2+etch1_hppa.deb stable/main/binary-hppa/libqt4-core_4.2.1-2+etch1_hppa.deb stable/main/binary-hppa/qt4-dev-tools_4.2.1-2+etch1_hppa.deb stable/main/binary-hppa/libqt4-gui_4.2.1-2+etch1_hppa.deb qt4-x11 (4.2.1-2+etch1) stable-security; urgency=high * Non-maintainer upload by the Security Team * Fix UTF8 long sequence rejection bug (CVE-2007-0242) stable/main/binary-arm/libqt4-core_4.2.1-2+etch1_arm.deb stable/main/binary-arm/libqt4-sql_4.2.1-2+etch1_arm.deb stable/main/binary-arm/qt4-qtconfig_4.2.1-2+etch1_arm.deb stable/main/binary-arm/qt4-designer_4.2.1-2+etch1_arm.deb stable/main/binary-arm/qt4-dev-tools_4.2.1-2+etch1_arm.deb stable/main/binary-arm/libqt4-gui_4.2.1-2+etch1_arm.deb stable/main/binary-arm/libqt4-qt3support_4.2.1-2+etch1_arm.deb stable/main/binary-arm/libqt4-dev_4.2.1-2+etch1_arm.deb stable/main/binary-arm/libqt4-debug_4.2.1-2+etch1_arm.deb qt4-x11 (4.2.1-2+etch1) stable-security; urgency=high * Non-maintainer upload by the Security Team * Fix UTF8 long sequence rejection bug (CVE-2007-0242) stable/main/binary-alpha/libqt4-gui_4.2.1-2+etch1_alpha.deb stable/main/binary-alpha/libqt4-dev_4.2.1-2+etch1_alpha.deb stable/main/binary-alpha/libqt4-qt3support_4.2.1-2+etch1_alpha.deb stable/main/binary-alpha/qt4-designer_4.2.1-2+etch1_alpha.deb stable/main/binary-alpha/qt4-qtconfig_4.2.1-2+etch1_alpha.deb stable/main/binary-alpha/libqt4-core_4.2.1-2+etch1_alpha.deb stable/main/binary-alpha/qt4-dev-tools_4.2.1-2+etch1_alpha.deb stable/main/binary-alpha/libqt4-sql_4.2.1-2+etch1_alpha.deb stable/main/binary-alpha/libqt4-debug_4.2.1-2+etch1_alpha.deb qt4-x11 (4.2.1-2+etch1) stable-security; urgency=high * Non-maintainer upload by the Security Team * Fix UTF8 long sequence rejection bug (CVE-2007-0242) stable/main/binary-amd64/libqt4-debug_4.2.1-2+etch1_amd64.deb stable/main/source/qt4-x11_4.2.1-2+etch1.diff.gz stable/main/binary-all/qt4-doc_4.2.1-2+etch1_all.deb stable/main/binary-amd64/qt4-qtconfig_4.2.1-2+etch1_amd64.deb stable/main/binary-amd64/libqt4-dev_4.2.1-2+etch1_amd64.deb stable/main/binary-amd64/libqt4-qt3support_4.2.1-2+etch1_amd64.deb stable/main/binary-amd64/qt4-designer_4.2.1-2+etch1_amd64.deb stable/main/binary-amd64/qt4-dev-tools_4.2.1-2+etch1_amd64.deb stable/main/binary-amd64/libqt4-core_4.2.1-2+etch1_amd64.deb stable/main/source/qt4-x11_4.2.1-2+etch1.dsc stable/main/binary-amd64/libqt4-sql_4.2.1-2+etch1_amd64.deb stable/main/binary-amd64/libqt4-gui_4.2.1-2+etch1_amd64.deb qt4-x11 (4.2.1-2+etch1) stable-security; urgency=high * Non-maintainer upload by the Security Team * Fix UTF8 long sequence rejection bug (CVE-2007-0242) stable/main/binary-powerpc/qemu_0.8.2-4etch1_powerpc.deb qemu (0.8.2-4etch1) stable-security; urgency=high [ Guillem Jover ] * Fix several security issues found by Tavis Ormandy : - Cirrus LGD-54XX "bitblt" Heap Overflow. CVE-2007-1320 - NE2000 "mtu" heap overflow. - QEMU "net socket" heap overflow. - QEMU NE2000 "receive" integer signedness error. CVE-2007-1321 - Infinite loop in the emulated SB16 device. - Unprivileged "aam" instruction does not correctly handle the undocumented divisor operand. CVE-2007-1322 - Unprivileged "icebp" instruction will halt emulation. CVE-2007-1322 - debian/patches/90_security.patch: New file. stable/main/binary-amd64/qemu_0.8.2-4etch1_amd64.deb qemu (0.8.2-4etch1) stable-security; urgency=high [ Guillem Jover ] * Fix several security issues found by Tavis Ormandy : - Cirrus LGD-54XX "bitblt" Heap Overflow. CVE-2007-1320 - NE2000 "mtu" heap overflow. - QEMU "net socket" heap overflow. - QEMU NE2000 "receive" integer signedness error. CVE-2007-1321 - Infinite loop in the emulated SB16 device. - Unprivileged "aam" instruction does not correctly handle the undocumented divisor operand. CVE-2007-1322 - Unprivileged "icebp" instruction will halt emulation. CVE-2007-1322 - debian/patches/90_security.patch: New file. stable/main/source/qemu_0.8.2-4etch1.dsc stable/main/binary-i386/qemu_0.8.2-4etch1_i386.deb stable/main/source/qemu_0.8.2-4etch1.diff.gz qemu (0.8.2-4etch1) stable-security; urgency=high [ Guillem Jover ] * Fix several security issues found by Tavis Ormandy : - Cirrus LGD-54XX "bitblt" Heap Overflow. CVE-2007-1320 - NE2000 "mtu" heap overflow. - QEMU "net socket" heap overflow. - QEMU NE2000 "receive" integer signedness error. CVE-2007-1321 - Infinite loop in the emulated SB16 device. - Unprivileged "aam" instruction does not correctly handle the undocumented divisor operand. CVE-2007-1322 - Unprivileged "icebp" instruction will halt emulation. CVE-2007-1322 - debian/patches/90_security.patch: New file. stable/main/binary-sparc/bcrelay_1.3.0-2etch1_sparc.deb stable/main/binary-sparc/pptpd_1.3.0-2etch1_sparc.deb pptpd (1.3.0-2etch1) stable-security; urgency=high * Non-maintainer upload by the Security Team Fix DoS in GRE re-ordering (CVE-2007-0244) stable/main/binary-s390/pptpd_1.3.0-2etch1_s390.deb stable/main/binary-s390/bcrelay_1.3.0-2etch1_s390.deb pptpd (1.3.0-2etch1) stable-security; urgency=high * Non-maintainer upload by the Security Team Fix DoS in GRE re-ordering (CVE-2007-0244) stable/main/binary-powerpc/pptpd_1.3.0-2etch1_powerpc.deb stable/main/binary-powerpc/bcrelay_1.3.0-2etch1_powerpc.deb pptpd (1.3.0-2etch1) stable-security; urgency=high * Non-maintainer upload by the Security Team Fix DoS in GRE re-ordering (CVE-2007-0244) stable/main/binary-mipsel/pptpd_1.3.0-2etch1_mipsel.deb stable/main/binary-mipsel/bcrelay_1.3.0-2etch1_mipsel.deb pptpd (1.3.0-2etch1) stable-security; urgency=high * Non-maintainer upload by the Security Team Fix DoS in GRE re-ordering (CVE-2007-0244) stable/main/binary-mips/pptpd_1.3.0-2etch1_mips.deb stable/main/binary-mips/bcrelay_1.3.0-2etch1_mips.deb pptpd (1.3.0-2etch1) stable-security; urgency=high * Non-maintainer upload by the Security Team Fix DoS in GRE re-ordering (CVE-2007-0244) stable/main/binary-ia64/pptpd_1.3.0-2etch1_ia64.deb stable/main/binary-ia64/bcrelay_1.3.0-2etch1_ia64.deb pptpd (1.3.0-2etch1) stable-security; urgency=high * Non-maintainer upload by the Security Team Fix DoS in GRE re-ordering (CVE-2007-0244) stable/main/binary-hppa/pptpd_1.3.0-2etch1_hppa.deb stable/main/binary-hppa/bcrelay_1.3.0-2etch1_hppa.deb pptpd (1.3.0-2etch1) stable-security; urgency=high * Non-maintainer upload by the Security Team Fix DoS in GRE re-ordering (CVE-2007-0244) stable/main/binary-arm/bcrelay_1.3.0-2etch1_arm.deb stable/main/binary-arm/pptpd_1.3.0-2etch1_arm.deb pptpd (1.3.0-2etch1) stable-security; urgency=high * Non-maintainer upload by the Security Team Fix DoS in GRE re-ordering (CVE-2007-0244) stable/main/binary-amd64/bcrelay_1.3.0-2etch1_amd64.deb stable/main/binary-amd64/pptpd_1.3.0-2etch1_amd64.deb pptpd (1.3.0-2etch1) stable-security; urgency=high * Non-maintainer upload by the Security Team Fix DoS in GRE re-ordering (CVE-2007-0244) stable/main/binary-alpha/pptpd_1.3.0-2etch1_alpha.deb stable/main/binary-alpha/bcrelay_1.3.0-2etch1_alpha.deb pptpd (1.3.0-2etch1) stable-security; urgency=high * Non-maintainer upload by the Security Team Fix DoS in GRE re-ordering (CVE-2007-0244) stable/main/binary-i386/bcrelay_1.3.0-2etch1_i386.deb stable/main/binary-i386/pptpd_1.3.0-2etch1_i386.deb stable/main/source/pptpd_1.3.0-2etch1.dsc stable/main/source/pptpd_1.3.0-2etch1.diff.gz pptpd (1.3.0-2etch1) stable-security; urgency=high * Non-maintainer upload by the Security Team Fix DoS in GRE re-ordering (CVE-2007-0244) stable/main/source/pppconfig_2.3.15.etch1.tar.gz stable/main/binary-all/pppconfig_2.3.15.etch1_all.deb stable/main/source/pppconfig_2.3.15.etch1.dsc pppconfig (2.3.15.etch1) proposed-updates; urgency=low * Non-maintainer upload. * Add Replaces: manpages-fr (<< 2.39.1-5) (Closes: #418350) stable/main/binary-sparc/postgresql-plpython-8.1_8.1.9-0etch1_sparc.deb stable/main/binary-sparc/postgresql-client-8.1_8.1.9-0etch1_sparc.deb stable/main/binary-sparc/libecpg-compat2_8.1.9-0etch1_sparc.deb stable/main/binary-sparc/postgresql-contrib-8.1_8.1.9-0etch1_sparc.deb stable/main/binary-sparc/postgresql-server-dev-8.1_8.1.9-0etch1_sparc.deb stable/main/binary-sparc/libpgtypes2_8.1.9-0etch1_sparc.deb stable/main/binary-sparc/libecpg-dev_8.1.9-0etch1_sparc.deb stable/main/binary-sparc/libpq4_8.1.9-0etch1_sparc.deb stable/main/binary-sparc/libpq-dev_8.1.9-0etch1_sparc.deb stable/main/binary-sparc/postgresql-8.1_8.1.9-0etch1_sparc.deb stable/main/binary-sparc/postgresql-plperl-8.1_8.1.9-0etch1_sparc.deb stable/main/binary-sparc/libecpg5_8.1.9-0etch1_sparc.deb stable/main/binary-sparc/postgresql-pltcl-8.1_8.1.9-0etch1_sparc.deb postgresql-8.1 (8.1.9-0etch1) stable-security; urgency=low * New upstream security/bugfix release: - Support explicit placement of the temporary-table schema within search_path, and disable searching it for functions and operators. This is needed to allow a security-definer function to set a truly secure value of search_path. Without it, an unprivileged SQL user can use temporary objects to execute code with the privileges of the security-definer function (CVE-2007-2138). See "CREATE FUNCTION" for more information. - "/contrib/tsearch2" crash fixes. - Require "COMMIT PREPARED" to be executed in the same database as the transaction was prepared in. - Fix potential-data-corruption bug in how "VACUUM FULL" handles "UPDATE" chains. - Planner fixes, including improving outer join and bitmap scan selection logic. - Fix PANIC during enlargement of a hash index (bug introduced in 8.1.6). - Fix POSIX-style timezone specs to follow new USA DST rules. stable/main/binary-s390/postgresql-pltcl-8.1_8.1.9-0etch1_s390.deb stable/main/binary-s390/libpq-dev_8.1.9-0etch1_s390.deb stable/main/binary-s390/postgresql-plperl-8.1_8.1.9-0etch1_s390.deb stable/main/binary-s390/libpgtypes2_8.1.9-0etch1_s390.deb stable/main/binary-s390/libecpg-dev_8.1.9-0etch1_s390.deb stable/main/binary-s390/postgresql-8.1_8.1.9-0etch1_s390.deb stable/main/binary-s390/libecpg-compat2_8.1.9-0etch1_s390.deb stable/main/binary-s390/libecpg5_8.1.9-0etch1_s390.deb stable/main/binary-s390/postgresql-contrib-8.1_8.1.9-0etch1_s390.deb stable/main/binary-s390/libpq4_8.1.9-0etch1_s390.deb stable/main/binary-s390/postgresql-server-dev-8.1_8.1.9-0etch1_s390.deb stable/main/binary-s390/postgresql-plpython-8.1_8.1.9-0etch1_s390.deb stable/main/binary-s390/postgresql-client-8.1_8.1.9-0etch1_s390.deb postgresql-8.1 (8.1.9-0etch1) stable-security; urgency=low * New upstream security/bugfix release: - Support explicit placement of the temporary-table schema within search_path, and disable searching it for functions and operators. This is needed to allow a security-definer function to set a truly secure value of search_path. Without it, an unprivileged SQL user can use temporary objects to execute code with the privileges of the security-definer function (CVE-2007-2138). See "CREATE FUNCTION" for more information. - "/contrib/tsearch2" crash fixes. - Require "COMMIT PREPARED" to be executed in the same database as the transaction was prepared in. - Fix potential-data-corruption bug in how "VACUUM FULL" handles "UPDATE" chains. - Planner fixes, including improving outer join and bitmap scan selection logic. - Fix PANIC during enlargement of a hash index (bug introduced in 8.1.6). - Fix POSIX-style timezone specs to follow new USA DST rules. stable/main/binary-powerpc/postgresql-pltcl-8.1_8.1.9-0etch1_powerpc.deb stable/main/binary-powerpc/postgresql-contrib-8.1_8.1.9-0etch1_powerpc.deb stable/main/binary-powerpc/postgresql-plpython-8.1_8.1.9-0etch1_powerpc.deb stable/main/binary-powerpc/postgresql-server-dev-8.1_8.1.9-0etch1_powerpc.deb stable/main/binary-powerpc/libecpg-dev_8.1.9-0etch1_powerpc.deb stable/main/binary-powerpc/postgresql-plperl-8.1_8.1.9-0etch1_powerpc.deb stable/main/binary-powerpc/libpq-dev_8.1.9-0etch1_powerpc.deb stable/main/binary-powerpc/libpgtypes2_8.1.9-0etch1_powerpc.deb stable/main/binary-powerpc/libpq4_8.1.9-0etch1_powerpc.deb stable/main/binary-powerpc/libecpg5_8.1.9-0etch1_powerpc.deb stable/main/binary-powerpc/libecpg-compat2_8.1.9-0etch1_powerpc.deb stable/main/binary-powerpc/postgresql-client-8.1_8.1.9-0etch1_powerpc.deb stable/main/binary-powerpc/postgresql-8.1_8.1.9-0etch1_powerpc.deb postgresql-8.1 (8.1.9-0etch1) stable-security; urgency=low * New upstream security/bugfix release: - Support explicit placement of the temporary-table schema within search_path, and disable searching it for functions and operators. This is needed to allow a security-definer function to set a truly secure value of search_path. Without it, an unprivileged SQL user can use temporary objects to execute code with the privileges of the security-definer function (CVE-2007-2138). See "CREATE FUNCTION" for more information. - "/contrib/tsearch2" crash fixes. - Require "COMMIT PREPARED" to be executed in the same database as the transaction was prepared in. - Fix potential-data-corruption bug in how "VACUUM FULL" handles "UPDATE" chains. - Planner fixes, including improving outer join and bitmap scan selection logic. - Fix PANIC during enlargement of a hash index (bug introduced in 8.1.6). - Fix POSIX-style timezone specs to follow new USA DST rules. stable/main/binary-mipsel/postgresql-plperl-8.1_8.1.9-0etch1_mipsel.deb stable/main/binary-mipsel/libpgtypes2_8.1.9-0etch1_mipsel.deb stable/main/binary-mipsel/postgresql-server-dev-8.1_8.1.9-0etch1_mipsel.deb stable/main/binary-mipsel/libecpg-compat2_8.1.9-0etch1_mipsel.deb stable/main/binary-mipsel/postgresql-contrib-8.1_8.1.9-0etch1_mipsel.deb stable/main/binary-mipsel/libecpg-dev_8.1.9-0etch1_mipsel.deb stable/main/binary-mipsel/libecpg5_8.1.9-0etch1_mipsel.deb stable/main/binary-mipsel/libpq4_8.1.9-0etch1_mipsel.deb stable/main/binary-mipsel/postgresql-client-8.1_8.1.9-0etch1_mipsel.deb stable/main/binary-mipsel/postgresql-plpython-8.1_8.1.9-0etch1_mipsel.deb stable/main/binary-mipsel/postgresql-pltcl-8.1_8.1.9-0etch1_mipsel.deb stable/main/binary-mipsel/libpq-dev_8.1.9-0etch1_mipsel.deb stable/main/binary-mipsel/postgresql-8.1_8.1.9-0etch1_mipsel.deb postgresql-8.1 (8.1.9-0etch1) stable-security; urgency=low * New upstream security/bugfix release: - Support explicit placement of the temporary-table schema within search_path, and disable searching it for functions and operators. This is needed to allow a security-definer function to set a truly secure value of search_path. Without it, an unprivileged SQL user can use temporary objects to execute code with the privileges of the security-definer function (CVE-2007-2138). See "CREATE FUNCTION" for more information. - "/contrib/tsearch2" crash fixes. - Require "COMMIT PREPARED" to be executed in the same database as the transaction was prepared in. - Fix potential-data-corruption bug in how "VACUUM FULL" handles "UPDATE" chains. - Planner fixes, including improving outer join and bitmap scan selection logic. - Fix PANIC during enlargement of a hash index (bug introduced in 8.1.6). - Fix POSIX-style timezone specs to follow new USA DST rules. stable/main/binary-mips/libecpg-dev_8.1.9-0etch1_mips.deb stable/main/binary-mips/libpgtypes2_8.1.9-0etch1_mips.deb stable/main/binary-mips/postgresql-8.1_8.1.9-0etch1_mips.deb stable/main/binary-mips/postgresql-contrib-8.1_8.1.9-0etch1_mips.deb stable/main/binary-mips/postgresql-pltcl-8.1_8.1.9-0etch1_mips.deb stable/main/binary-mips/libecpg5_8.1.9-0etch1_mips.deb stable/main/binary-mips/postgresql-plperl-8.1_8.1.9-0etch1_mips.deb stable/main/binary-mips/libpq4_8.1.9-0etch1_mips.deb stable/main/binary-mips/libpq-dev_8.1.9-0etch1_mips.deb stable/main/binary-mips/postgresql-server-dev-8.1_8.1.9-0etch1_mips.deb stable/main/binary-mips/postgresql-client-8.1_8.1.9-0etch1_mips.deb stable/main/binary-mips/libecpg-compat2_8.1.9-0etch1_mips.deb stable/main/binary-mips/postgresql-plpython-8.1_8.1.9-0etch1_mips.deb postgresql-8.1 (8.1.9-0etch1) stable-security; urgency=low * New upstream security/bugfix release: - Support explicit placement of the temporary-table schema within search_path, and disable searching it for functions and operators. This is needed to allow a security-definer function to set a truly secure value of search_path. Without it, an unprivileged SQL user can use temporary objects to execute code with the privileges of the security-definer function (CVE-2007-2138). See "CREATE FUNCTION" for more information. - "/contrib/tsearch2" crash fixes. - Require "COMMIT PREPARED" to be executed in the same database as the transaction was prepared in. - Fix potential-data-corruption bug in how "VACUUM FULL" handles "UPDATE" chains. - Planner fixes, including improving outer join and bitmap scan selection logic. - Fix PANIC during enlargement of a hash index (bug introduced in 8.1.6). - Fix POSIX-style timezone specs to follow new USA DST rules. stable/main/binary-ia64/postgresql-pltcl-8.1_8.1.9-0etch1_ia64.deb stable/main/binary-ia64/postgresql-server-dev-8.1_8.1.9-0etch1_ia64.deb stable/main/binary-ia64/postgresql-8.1_8.1.9-0etch1_ia64.deb stable/main/binary-ia64/libecpg-dev_8.1.9-0etch1_ia64.deb stable/main/binary-ia64/postgresql-plpython-8.1_8.1.9-0etch1_ia64.deb stable/main/binary-ia64/libecpg5_8.1.9-0etch1_ia64.deb stable/main/binary-ia64/postgresql-contrib-8.1_8.1.9-0etch1_ia64.deb stable/main/binary-ia64/postgresql-client-8.1_8.1.9-0etch1_ia64.deb stable/main/binary-ia64/libpgtypes2_8.1.9-0etch1_ia64.deb stable/main/binary-ia64/postgresql-plperl-8.1_8.1.9-0etch1_ia64.deb stable/main/binary-ia64/libecpg-compat2_8.1.9-0etch1_ia64.deb stable/main/binary-ia64/libpq-dev_8.1.9-0etch1_ia64.deb stable/main/binary-ia64/libpq4_8.1.9-0etch1_ia64.deb postgresql-8.1 (8.1.9-0etch1) stable-security; urgency=low * New upstream security/bugfix release: - Support explicit placement of the temporary-table schema within search_path, and disable searching it for functions and operators. This is needed to allow a security-definer function to set a truly secure value of search_path. Without it, an unprivileged SQL user can use temporary objects to execute code with the privileges of the security-definer function (CVE-2007-2138). See "CREATE FUNCTION" for more information. - "/contrib/tsearch2" crash fixes. - Require "COMMIT PREPARED" to be executed in the same database as the transaction was prepared in. - Fix potential-data-corruption bug in how "VACUUM FULL" handles "UPDATE" chains. - Planner fixes, including improving outer join and bitmap scan selection logic. - Fix PANIC during enlargement of a hash index (bug introduced in 8.1.6). - Fix POSIX-style timezone specs to follow new USA DST rules. stable/main/binary-hppa/postgresql-8.1_8.1.9-0etch1_hppa.deb stable/main/binary-hppa/libpq4_8.1.9-0etch1_hppa.deb stable/main/binary-hppa/libecpg-compat2_8.1.9-0etch1_hppa.deb stable/main/binary-hppa/postgresql-plpython-8.1_8.1.9-0etch1_hppa.deb stable/main/binary-hppa/libecpg-dev_8.1.9-0etch1_hppa.deb stable/main/binary-hppa/libpq-dev_8.1.9-0etch1_hppa.deb stable/main/binary-hppa/postgresql-pltcl-8.1_8.1.9-0etch1_hppa.deb stable/main/binary-hppa/postgresql-server-dev-8.1_8.1.9-0etch1_hppa.deb stable/main/binary-hppa/libecpg5_8.1.9-0etch1_hppa.deb stable/main/binary-hppa/postgresql-plperl-8.1_8.1.9-0etch1_hppa.deb stable/main/binary-hppa/libpgtypes2_8.1.9-0etch1_hppa.deb stable/main/binary-hppa/postgresql-contrib-8.1_8.1.9-0etch1_hppa.deb stable/main/binary-hppa/postgresql-client-8.1_8.1.9-0etch1_hppa.deb postgresql-8.1 (8.1.9-0etch1) stable-security; urgency=low * New upstream security/bugfix release: - Support explicit placement of the temporary-table schema within search_path, and disable searching it for functions and operators. This is needed to allow a security-definer function to set a truly secure value of search_path. Without it, an unprivileged SQL user can use temporary objects to execute code with the privileges of the security-definer function (CVE-2007-2138). See "CREATE FUNCTION" for more information. - "/contrib/tsearch2" crash fixes. - Require "COMMIT PREPARED" to be executed in the same database as the transaction was prepared in. - Fix potential-data-corruption bug in how "VACUUM FULL" handles "UPDATE" chains. - Planner fixes, including improving outer join and bitmap scan selection logic. - Fix PANIC during enlargement of a hash index (bug introduced in 8.1.6). - Fix POSIX-style timezone specs to follow new USA DST rules. stable/main/binary-arm/postgresql-pltcl-8.1_8.1.9-0etch1_arm.deb stable/main/binary-arm/postgresql-client-8.1_8.1.9-0etch1_arm.deb stable/main/binary-arm/libecpg-compat2_8.1.9-0etch1_arm.deb stable/main/binary-arm/postgresql-server-dev-8.1_8.1.9-0etch1_arm.deb stable/main/binary-arm/postgresql-contrib-8.1_8.1.9-0etch1_arm.deb stable/main/binary-arm/libecpg-dev_8.1.9-0etch1_arm.deb stable/main/binary-arm/libpq4_8.1.9-0etch1_arm.deb stable/main/binary-arm/postgresql-8.1_8.1.9-0etch1_arm.deb stable/main/binary-arm/libpgtypes2_8.1.9-0etch1_arm.deb stable/main/binary-arm/postgresql-plpython-8.1_8.1.9-0etch1_arm.deb stable/main/binary-arm/libpq-dev_8.1.9-0etch1_arm.deb stable/main/binary-arm/postgresql-plperl-8.1_8.1.9-0etch1_arm.deb stable/main/binary-arm/libecpg5_8.1.9-0etch1_arm.deb postgresql-8.1 (8.1.9-0etch1) stable-security; urgency=low * New upstream security/bugfix release: - Support explicit placement of the temporary-table schema within search_path, and disable searching it for functions and operators. This is needed to allow a security-definer function to set a truly secure value of search_path. Without it, an unprivileged SQL user can use temporary objects to execute code with the privileges of the security-definer function (CVE-2007-2138). See "CREATE FUNCTION" for more information. - "/contrib/tsearch2" crash fixes. - Require "COMMIT PREPARED" to be executed in the same database as the transaction was prepared in. - Fix potential-data-corruption bug in how "VACUUM FULL" handles "UPDATE" chains. - Planner fixes, including improving outer join and bitmap scan selection logic. - Fix PANIC during enlargement of a hash index (bug introduced in 8.1.6). - Fix POSIX-style timezone specs to follow new USA DST rules. stable/main/binary-amd64/postgresql-8.1_8.1.9-0etch1_amd64.deb stable/main/binary-amd64/libpq-dev_8.1.9-0etch1_amd64.deb stable/main/binary-amd64/libpq4_8.1.9-0etch1_amd64.deb stable/main/binary-amd64/postgresql-client-8.1_8.1.9-0etch1_amd64.deb stable/main/binary-amd64/libpgtypes2_8.1.9-0etch1_amd64.deb stable/main/binary-amd64/postgresql-server-dev-8.1_8.1.9-0etch1_amd64.deb stable/main/binary-amd64/libecpg-compat2_8.1.9-0etch1_amd64.deb stable/main/binary-amd64/postgresql-plperl-8.1_8.1.9-0etch1_amd64.deb stable/main/binary-amd64/libecpg5_8.1.9-0etch1_amd64.deb stable/main/binary-amd64/libecpg-dev_8.1.9-0etch1_amd64.deb stable/main/binary-amd64/postgresql-contrib-8.1_8.1.9-0etch1_amd64.deb stable/main/binary-amd64/postgresql-pltcl-8.1_8.1.9-0etch1_amd64.deb stable/main/binary-amd64/postgresql-plpython-8.1_8.1.9-0etch1_amd64.deb postgresql-8.1 (8.1.9-0etch1) stable-security; urgency=low * New upstream security/bugfix release: - Support explicit placement of the temporary-table schema within search_path, and disable searching it for functions and operators. This is needed to allow a security-definer function to set a truly secure value of search_path. Without it, an unprivileged SQL user can use temporary objects to execute code with the privileges of the security-definer function (CVE-2007-2138). See "CREATE FUNCTION" for more information. - "/contrib/tsearch2" crash fixes. - Require "COMMIT PREPARED" to be executed in the same database as the transaction was prepared in. - Fix potential-data-corruption bug in how "VACUUM FULL" handles "UPDATE" chains. - Planner fixes, including improving outer join and bitmap scan selection logic. - Fix PANIC during enlargement of a hash index (bug introduced in 8.1.6). - Fix POSIX-style timezone specs to follow new USA DST rules. stable/main/binary-alpha/postgresql-8.1_8.1.9-0etch1_alpha.deb stable/main/binary-alpha/postgresql-pltcl-8.1_8.1.9-0etch1_alpha.deb stable/main/binary-alpha/postgresql-plperl-8.1_8.1.9-0etch1_alpha.deb stable/main/binary-alpha/postgresql-server-dev-8.1_8.1.9-0etch1_alpha.deb stable/main/binary-alpha/libecpg-dev_8.1.9-0etch1_alpha.deb stable/main/binary-alpha/libecpg-compat2_8.1.9-0etch1_alpha.deb stable/main/binary-alpha/postgresql-plpython-8.1_8.1.9-0etch1_alpha.deb stable/main/binary-alpha/libecpg5_8.1.9-0etch1_alpha.deb stable/main/binary-alpha/postgresql-contrib-8.1_8.1.9-0etch1_alpha.deb stable/main/binary-alpha/libpq-dev_8.1.9-0etch1_alpha.deb stable/main/binary-alpha/postgresql-client-8.1_8.1.9-0etch1_alpha.deb stable/main/binary-alpha/libpq4_8.1.9-0etch1_alpha.deb stable/main/binary-alpha/libpgtypes2_8.1.9-0etch1_alpha.deb postgresql-8.1 (8.1.9-0etch1) stable-security; urgency=low * New upstream security/bugfix release: - Support explicit placement of the temporary-table schema within search_path, and disable searching it for functions and operators. This is needed to allow a security-definer function to set a truly secure value of search_path. Without it, an unprivileged SQL user can use temporary objects to execute code with the privileges of the security-definer function (CVE-2007-2138). See "CREATE FUNCTION" for more information. - "/contrib/tsearch2" crash fixes. - Require "COMMIT PREPARED" to be executed in the same database as the transaction was prepared in. - Fix potential-data-corruption bug in how "VACUUM FULL" handles "UPDATE" chains. - Planner fixes, including improving outer join and bitmap scan selection logic. - Fix PANIC during enlargement of a hash index (bug introduced in 8.1.6). - Fix POSIX-style timezone specs to follow new USA DST rules. stable/main/binary-i386/libpq4_8.1.9-0etch1_i386.deb stable/main/binary-i386/postgresql-server-dev-8.1_8.1.9-0etch1_i386.deb stable/main/binary-all/postgresql-doc-8.1_8.1.9-0etch1_all.deb stable/main/binary-i386/postgresql-contrib-8.1_8.1.9-0etch1_i386.deb stable/main/binary-i386/libpq-dev_8.1.9-0etch1_i386.deb stable/main/source/postgresql-8.1_8.1.9-0etch1.dsc stable/main/binary-i386/postgresql-8.1_8.1.9-0etch1_i386.deb stable/main/binary-i386/postgresql-plperl-8.1_8.1.9-0etch1_i386.deb stable/main/binary-i386/libecpg-compat2_8.1.9-0etch1_i386.deb stable/main/source/postgresql-8.1_8.1.9-0etch1.diff.gz stable/main/binary-i386/libpgtypes2_8.1.9-0etch1_i386.deb stable/main/binary-i386/libecpg-dev_8.1.9-0etch1_i386.deb stable/main/binary-i386/libecpg5_8.1.9-0etch1_i386.deb stable/main/binary-i386/postgresql-plpython-8.1_8.1.9-0etch1_i386.deb stable/main/binary-i386/postgresql-client-8.1_8.1.9-0etch1_i386.deb stable/main/binary-i386/postgresql-pltcl-8.1_8.1.9-0etch1_i386.deb postgresql-8.1 (8.1.9-0etch1) stable-security; urgency=low * New upstream security/bugfix release: - Support explicit placement of the temporary-table schema within search_path, and disable searching it for functions and operators. This is needed to allow a security-definer function to set a truly secure value of search_path. Without it, an unprivileged SQL user can use temporary objects to execute code with the privileges of the security-definer function (CVE-2007-2138). See "CREATE FUNCTION" for more information. - "/contrib/tsearch2" crash fixes. - Require "COMMIT PREPARED" to be executed in the same database as the transaction was prepared in. - Fix potential-data-corruption bug in how "VACUUM FULL" handles "UPDATE" chains. - Planner fixes, including improving outer join and bitmap scan selection logic. - Fix PANIC during enlargement of a hash index (bug introduced in 8.1.6). - Fix POSIX-style timezone specs to follow new USA DST rules. stable/main/binary-sparc/postgresql-client-7.4_7.4.17-0etch1_sparc.deb stable/main/binary-sparc/postgresql-plpython-7.4_7.4.17-0etch1_sparc.deb stable/main/binary-sparc/postgresql-pltcl-7.4_7.4.17-0etch1_sparc.deb stable/main/binary-sparc/postgresql-plperl-7.4_7.4.17-0etch1_sparc.deb stable/main/binary-sparc/postgresql-contrib-7.4_7.4.17-0etch1_sparc.deb stable/main/binary-sparc/postgresql-7.4_7.4.17-0etch1_sparc.deb postgresql-7.4 (1:7.4.17-0etch1) stable-security; urgency=low * New upstream security/bugfix release: - Support explicit placement of the temporary-table schema within search_path, and disable searching it for functions and operators This is needed to allow a security-definer function to set a truly secure value of search_path. Without it, an unprivileged SQL user can use temporary objects to execute code with the privileges of the security-definer function (CVE-2007-2138). See "CREATE FUNCTION" for more information. - "/contrib/tsearch2" crash fixes. - Fix potential-data-corruption bug in how "VACUUM FULL" handles "UPDATE" chains. - Fix PANIC during enlargement of a hash index. stable/main/binary-s390/postgresql-contrib-7.4_7.4.17-0etch1_s390.deb stable/main/binary-s390/postgresql-pltcl-7.4_7.4.17-0etch1_s390.deb stable/main/binary-s390/postgresql-client-7.4_7.4.17-0etch1_s390.deb stable/main/binary-s390/postgresql-plpython-7.4_7.4.17-0etch1_s390.deb stable/main/binary-s390/postgresql-plperl-7.4_7.4.17-0etch1_s390.deb stable/main/binary-s390/postgresql-7.4_7.4.17-0etch1_s390.deb postgresql-7.4 (1:7.4.17-0etch1) stable-security; urgency=low * New upstream security/bugfix release: - Support explicit placement of the temporary-table schema within search_path, and disable searching it for functions and operators This is needed to allow a security-definer function to set a truly secure value of search_path. Without it, an unprivileged SQL user can use temporary objects to execute code with the privileges of the security-definer function (CVE-2007-2138). See "CREATE FUNCTION" for more information. - "/contrib/tsearch2" crash fixes. - Fix potential-data-corruption bug in how "VACUUM FULL" handles "UPDATE" chains. - Fix PANIC during enlargement of a hash index. stable/main/binary-powerpc/postgresql-7.4_7.4.17-0etch1_powerpc.deb stable/main/binary-powerpc/postgresql-plperl-7.4_7.4.17-0etch1_powerpc.deb stable/main/binary-powerpc/postgresql-plpython-7.4_7.4.17-0etch1_powerpc.deb stable/main/binary-powerpc/postgresql-pltcl-7.4_7.4.17-0etch1_powerpc.deb stable/main/binary-powerpc/postgresql-client-7.4_7.4.17-0etch1_powerpc.deb stable/main/binary-powerpc/postgresql-contrib-7.4_7.4.17-0etch1_powerpc.deb postgresql-7.4 (1:7.4.17-0etch1) stable-security; urgency=low * New upstream security/bugfix release: - Support explicit placement of the temporary-table schema within search_path, and disable searching it for functions and operators This is needed to allow a security-definer function to set a truly secure value of search_path. Without it, an unprivileged SQL user can use temporary objects to execute code with the privileges of the security-definer function (CVE-2007-2138). See "CREATE FUNCTION" for more information. - "/contrib/tsearch2" crash fixes. - Fix potential-data-corruption bug in how "VACUUM FULL" handles "UPDATE" chains. - Fix PANIC during enlargement of a hash index. stable/main/binary-mipsel/postgresql-contrib-7.4_7.4.17-0etch1_mipsel.deb stable/main/binary-mipsel/postgresql-7.4_7.4.17-0etch1_mipsel.deb stable/main/binary-mipsel/postgresql-client-7.4_7.4.17-0etch1_mipsel.deb stable/main/binary-mipsel/postgresql-plpython-7.4_7.4.17-0etch1_mipsel.deb stable/main/binary-mipsel/postgresql-pltcl-7.4_7.4.17-0etch1_mipsel.deb stable/main/binary-mipsel/postgresql-plperl-7.4_7.4.17-0etch1_mipsel.deb postgresql-7.4 (1:7.4.17-0etch1) stable-security; urgency=low * New upstream security/bugfix release: - Support explicit placement of the temporary-table schema within search_path, and disable searching it for functions and operators This is needed to allow a security-definer function to set a truly secure value of search_path. Without it, an unprivileged SQL user can use temporary objects to execute code with the privileges of the security-definer function (CVE-2007-2138). See "CREATE FUNCTION" for more information. - "/contrib/tsearch2" crash fixes. - Fix potential-data-corruption bug in how "VACUUM FULL" handles "UPDATE" chains. - Fix PANIC during enlargement of a hash index. stable/main/binary-mips/postgresql-7.4_7.4.17-0etch1_mips.deb stable/main/binary-mips/postgresql-pltcl-7.4_7.4.17-0etch1_mips.deb stable/main/binary-mips/postgresql-plperl-7.4_7.4.17-0etch1_mips.deb stable/main/binary-mips/postgresql-client-7.4_7.4.17-0etch1_mips.deb stable/main/binary-mips/postgresql-contrib-7.4_7.4.17-0etch1_mips.deb stable/main/binary-mips/postgresql-plpython-7.4_7.4.17-0etch1_mips.deb postgresql-7.4 (1:7.4.17-0etch1) stable-security; urgency=low * New upstream security/bugfix release: - Support explicit placement of the temporary-table schema within search_path, and disable searching it for functions and operators This is needed to allow a security-definer function to set a truly secure value of search_path. Without it, an unprivileged SQL user can use temporary objects to execute code with the privileges of the security-definer function (CVE-2007-2138). See "CREATE FUNCTION" for more information. - "/contrib/tsearch2" crash fixes. - Fix potential-data-corruption bug in how "VACUUM FULL" handles "UPDATE" chains. - Fix PANIC during enlargement of a hash index. stable/main/binary-ia64/postgresql-contrib-7.4_7.4.17-0etch1_ia64.deb stable/main/binary-ia64/postgresql-plperl-7.4_7.4.17-0etch1_ia64.deb stable/main/binary-ia64/postgresql-plpython-7.4_7.4.17-0etch1_ia64.deb stable/main/binary-ia64/postgresql-client-7.4_7.4.17-0etch1_ia64.deb stable/main/binary-ia64/postgresql-pltcl-7.4_7.4.17-0etch1_ia64.deb stable/main/binary-ia64/postgresql-7.4_7.4.17-0etch1_ia64.deb postgresql-7.4 (1:7.4.17-0etch1) stable-security; urgency=low * New upstream security/bugfix release: - Support explicit placement of the temporary-table schema within search_path, and disable searching it for functions and operators This is needed to allow a security-definer function to set a truly secure value of search_path. Without it, an unprivileged SQL user can use temporary objects to execute code with the privileges of the security-definer function (CVE-2007-2138). See "CREATE FUNCTION" for more information. - "/contrib/tsearch2" crash fixes. - Fix potential-data-corruption bug in how "VACUUM FULL" handles "UPDATE" chains. - Fix PANIC during enlargement of a hash index. stable/main/binary-hppa/postgresql-pltcl-7.4_7.4.17-0etch1_hppa.deb stable/main/binary-hppa/postgresql-plperl-7.4_7.4.17-0etch1_hppa.deb stable/main/binary-hppa/postgresql-contrib-7.4_7.4.17-0etch1_hppa.deb stable/main/binary-hppa/postgresql-client-7.4_7.4.17-0etch1_hppa.deb stable/main/binary-hppa/postgresql-7.4_7.4.17-0etch1_hppa.deb stable/main/binary-hppa/postgresql-plpython-7.4_7.4.17-0etch1_hppa.deb postgresql-7.4 (1:7.4.17-0etch1) stable-security; urgency=low * New upstream security/bugfix release: - Support explicit placement of the temporary-table schema within search_path, and disable searching it for functions and operators This is needed to allow a security-definer function to set a truly secure value of search_path. Without it, an unprivileged SQL user can use temporary objects to execute code with the privileges of the security-definer function (CVE-2007-2138). See "CREATE FUNCTION" for more information. - "/contrib/tsearch2" crash fixes. - Fix potential-data-corruption bug in how "VACUUM FULL" handles "UPDATE" chains. - Fix PANIC during enlargement of a hash index. stable/main/binary-arm/postgresql-pltcl-7.4_7.4.17-0etch1_arm.deb stable/main/binary-arm/postgresql-plpython-7.4_7.4.17-0etch1_arm.deb stable/main/binary-arm/postgresql-7.4_7.4.17-0etch1_arm.deb stable/main/binary-arm/postgresql-plperl-7.4_7.4.17-0etch1_arm.deb stable/main/binary-arm/postgresql-client-7.4_7.4.17-0etch1_arm.deb stable/main/binary-arm/postgresql-contrib-7.4_7.4.17-0etch1_arm.deb postgresql-7.4 (1:7.4.17-0etch1) stable-security; urgency=low * New upstream security/bugfix release: - Support explicit placement of the temporary-table schema within search_path, and disable searching it for functions and operators This is needed to allow a security-definer function to set a truly secure value of search_path. Without it, an unprivileged SQL user can use temporary objects to execute code with the privileges of the security-definer function (CVE-2007-2138). See "CREATE FUNCTION" for more information. - "/contrib/tsearch2" crash fixes. - Fix potential-data-corruption bug in how "VACUUM FULL" handles "UPDATE" chains. - Fix PANIC during enlargement of a hash index. stable/main/binary-amd64/postgresql-7.4_7.4.17-0etch1_amd64.deb stable/main/binary-amd64/postgresql-plperl-7.4_7.4.17-0etch1_amd64.deb stable/main/binary-amd64/postgresql-plpython-7.4_7.4.17-0etch1_amd64.deb stable/main/binary-amd64/postgresql-client-7.4_7.4.17-0etch1_amd64.deb stable/main/binary-amd64/postgresql-contrib-7.4_7.4.17-0etch1_amd64.deb stable/main/binary-amd64/postgresql-pltcl-7.4_7.4.17-0etch1_amd64.deb postgresql-7.4 (1:7.4.17-0etch1) stable-security; urgency=low * New upstream security/bugfix release: - Support explicit placement of the temporary-table schema within search_path, and disable searching it for functions and operators This is needed to allow a security-definer function to set a truly secure value of search_path. Without it, an unprivileged SQL user can use temporary objects to execute code with the privileges of the security-definer function (CVE-2007-2138). See "CREATE FUNCTION" for more information. - "/contrib/tsearch2" crash fixes. - Fix potential-data-corruption bug in how "VACUUM FULL" handles "UPDATE" chains. - Fix PANIC during enlargement of a hash index. stable/main/binary-alpha/postgresql-client-7.4_7.4.17-0etch1_alpha.deb stable/main/binary-alpha/postgresql-7.4_7.4.17-0etch1_alpha.deb stable/main/binary-alpha/postgresql-plperl-7.4_7.4.17-0etch1_alpha.deb stable/main/binary-alpha/postgresql-pltcl-7.4_7.4.17-0etch1_alpha.deb stable/main/binary-alpha/postgresql-contrib-7.4_7.4.17-0etch1_alpha.deb stable/main/binary-alpha/postgresql-plpython-7.4_7.4.17-0etch1_alpha.deb postgresql-7.4 (1:7.4.17-0etch1) stable-security; urgency=low * New upstream security/bugfix release: - Support explicit placement of the temporary-table schema within search_path, and disable searching it for functions and operators This is needed to allow a security-definer function to set a truly secure value of search_path. Without it, an unprivileged SQL user can use temporary objects to execute code with the privileges of the security-definer function (CVE-2007-2138). See "CREATE FUNCTION" for more information. - "/contrib/tsearch2" crash fixes. - Fix potential-data-corruption bug in how "VACUUM FULL" handles "UPDATE" chains. - Fix PANIC during enlargement of a hash index. stable/main/binary-i386/postgresql-7.4_7.4.17-0etch1_i386.deb stable/main/binary-i386/postgresql-plpython-7.4_7.4.17-0etch1_i386.deb stable/main/source/postgresql-7.4_7.4.17-0etch1.diff.gz stable/main/binary-all/postgresql-doc-7.4_7.4.17-0etch1_all.deb stable/main/source/postgresql-7.4_7.4.17-0etch1.dsc stable/main/binary-i386/postgresql-client-7.4_7.4.17-0etch1_i386.deb stable/main/binary-i386/postgresql-contrib-7.4_7.4.17-0etch1_i386.deb stable/main/binary-i386/postgresql-plperl-7.4_7.4.17-0etch1_i386.deb stable/main/binary-all/postgresql-server-dev-7.4_7.4.17-0etch1_all.deb stable/main/binary-i386/postgresql-pltcl-7.4_7.4.17-0etch1_i386.deb postgresql-7.4 (1:7.4.17-0etch1) stable-security; urgency=low * New upstream security/bugfix release: - Support explicit placement of the temporary-table schema within search_path, and disable searching it for functions and operators This is needed to allow a security-definer function to set a truly secure value of search_path. Without it, an unprivileged SQL user can use temporary objects to execute code with the privileges of the security-definer function (CVE-2007-2138). See "CREATE FUNCTION" for more information. - "/contrib/tsearch2" crash fixes. - Fix potential-data-corruption bug in how "VACUUM FULL" handles "UPDATE" chains. - Fix PANIC during enlargement of a hash index. stable/main/binary-sparc/php5-ldap_5.2.0-8+etch5~pu1_sparc.deb stable/main/binary-sparc/php5-xsl_5.2.0-8+etch5~pu1_sparc.deb stable/main/binary-sparc/php5-pgsql_5.2.0-8+etch5~pu1_sparc.deb stable/main/binary-sparc/php5-curl_5.2.0-8+etch5~pu1_sparc.deb stable/main/binary-sparc/php5-mysql_5.2.0-8+etch5~pu1_sparc.deb stable/main/binary-sparc/libapache2-mod-php5_5.2.0-8+etch5~pu1_sparc.deb stable/main/binary-sparc/php5-xmlrpc_5.2.0-8+etch5~pu1_sparc.deb stable/main/binary-sparc/php5-common_5.2.0-8+etch5~pu1_sparc.deb stable/main/binary-sparc/php5-pspell_5.2.0-8+etch5~pu1_sparc.deb stable/main/binary-sparc/php5-recode_5.2.0-8+etch5~pu1_sparc.deb stable/main/binary-sparc/php5-imap_5.2.0-8+etch5~pu1_sparc.deb stable/main/binary-sparc/php5-gd_5.2.0-8+etch5~pu1_sparc.deb stable/main/binary-sparc/php5-sybase_5.2.0-8+etch5~pu1_sparc.deb stable/main/binary-sparc/php5-dev_5.2.0-8+etch5~pu1_sparc.deb stable/main/binary-sparc/php5-odbc_5.2.0-8+etch5~pu1_sparc.deb stable/main/binary-sparc/libapache-mod-php5_5.2.0-8+etch5~pu1_sparc.deb stable/main/binary-sparc/php5-snmp_5.2.0-8+etch5~pu1_sparc.deb stable/main/binary-sparc/php5-cli_5.2.0-8+etch5~pu1_sparc.deb stable/main/binary-sparc/php5-sqlite_5.2.0-8+etch5~pu1_sparc.deb stable/main/binary-sparc/php5-mcrypt_5.2.0-8+etch5~pu1_sparc.deb stable/main/binary-sparc/php5-mhash_5.2.0-8+etch5~pu1_sparc.deb stable/main/binary-sparc/php5-tidy_5.2.0-8+etch5~pu1_sparc.deb stable/main/binary-sparc/php5-cgi_5.2.0-8+etch5~pu1_sparc.deb php5 (5.2.0-8+etch5~pu1) proposed-updates; urgency=low * fix for regression in single quote escaping (closes: #422567). stable/main/binary-s390/php5-mysql_5.2.0-8+etch5~pu1_s390.deb stable/main/binary-s390/php5-cli_5.2.0-8+etch5~pu1_s390.deb stable/main/binary-s390/libapache-mod-php5_5.2.0-8+etch5~pu1_s390.deb stable/main/binary-s390/php5-pspell_5.2.0-8+etch5~pu1_s390.deb stable/main/binary-s390/php5-odbc_5.2.0-8+etch5~pu1_s390.deb stable/main/binary-s390/php5-tidy_5.2.0-8+etch5~pu1_s390.deb stable/main/binary-s390/php5-ldap_5.2.0-8+etch5~pu1_s390.deb stable/main/binary-s390/php5-recode_5.2.0-8+etch5~pu1_s390.deb stable/main/binary-s390/php5-imap_5.2.0-8+etch5~pu1_s390.deb stable/main/binary-s390/php5-curl_5.2.0-8+etch5~pu1_s390.deb stable/main/binary-s390/php5-xsl_5.2.0-8+etch5~pu1_s390.deb stable/main/binary-s390/php5-gd_5.2.0-8+etch5~pu1_s390.deb stable/main/binary-s390/php5-cgi_5.2.0-8+etch5~pu1_s390.deb stable/main/binary-s390/php5-mhash_5.2.0-8+etch5~pu1_s390.deb stable/main/binary-s390/php5-pgsql_5.2.0-8+etch5~pu1_s390.deb stable/main/binary-s390/php5-dev_5.2.0-8+etch5~pu1_s390.deb stable/main/binary-s390/php5-sqlite_5.2.0-8+etch5~pu1_s390.deb stable/main/binary-s390/php5-snmp_5.2.0-8+etch5~pu1_s390.deb stable/main/binary-s390/libapache2-mod-php5_5.2.0-8+etch5~pu1_s390.deb stable/main/binary-s390/php5-xmlrpc_5.2.0-8+etch5~pu1_s390.deb stable/main/binary-s390/php5-common_5.2.0-8+etch5~pu1_s390.deb stable/main/binary-s390/php5-sybase_5.2.0-8+etch5~pu1_s390.deb stable/main/binary-s390/php5-mcrypt_5.2.0-8+etch5~pu1_s390.deb php5 (5.2.0-8+etch5~pu1) proposed-updates; urgency=low * fix for regression in single quote escaping (closes: #422567). stable/main/binary-powerpc/php5-snmp_5.2.0-8+etch5~pu1_powerpc.deb stable/main/binary-powerpc/php5-cli_5.2.0-8+etch5~pu1_powerpc.deb stable/main/binary-powerpc/libapache-mod-php5_5.2.0-8+etch5~pu1_powerpc.deb stable/main/binary-powerpc/php5-sqlite_5.2.0-8+etch5~pu1_powerpc.deb stable/main/binary-powerpc/php5-recode_5.2.0-8+etch5~pu1_powerpc.deb stable/main/binary-powerpc/php5-xmlrpc_5.2.0-8+etch5~pu1_powerpc.deb stable/main/binary-powerpc/php5-pspell_5.2.0-8+etch5~pu1_powerpc.deb stable/main/binary-powerpc/php5-cgi_5.2.0-8+etch5~pu1_powerpc.deb stable/main/binary-powerpc/php5-xsl_5.2.0-8+etch5~pu1_powerpc.deb stable/main/binary-powerpc/php5-mcrypt_5.2.0-8+etch5~pu1_powerpc.deb stable/main/binary-powerpc/php5-gd_5.2.0-8+etch5~pu1_powerpc.deb stable/main/binary-powerpc/php5-sybase_5.2.0-8+etch5~pu1_powerpc.deb stable/main/binary-powerpc/php5-curl_5.2.0-8+etch5~pu1_powerpc.deb stable/main/binary-powerpc/libapache2-mod-php5_5.2.0-8+etch5~pu1_powerpc.deb stable/main/binary-powerpc/php5-ldap_5.2.0-8+etch5~pu1_powerpc.deb stable/main/binary-powerpc/php5-odbc_5.2.0-8+etch5~pu1_powerpc.deb stable/main/binary-powerpc/php5-mysql_5.2.0-8+etch5~pu1_powerpc.deb stable/main/binary-powerpc/php5-mhash_5.2.0-8+etch5~pu1_powerpc.deb stable/main/binary-powerpc/php5-dev_5.2.0-8+etch5~pu1_powerpc.deb stable/main/binary-powerpc/php5-common_5.2.0-8+etch5~pu1_powerpc.deb stable/main/binary-powerpc/php5-tidy_5.2.0-8+etch5~pu1_powerpc.deb stable/main/binary-powerpc/php5-pgsql_5.2.0-8+etch5~pu1_powerpc.deb stable/main/binary-powerpc/php5-imap_5.2.0-8+etch5~pu1_powerpc.deb php5 (5.2.0-8+etch5~pu1) proposed-updates; urgency=low * fix for regression in single quote escaping (closes: #422567). stable/main/binary-mipsel/php5-cgi_5.2.0-8+etch5~pu1_mipsel.deb stable/main/binary-mipsel/php5-ldap_5.2.0-8+etch5~pu1_mipsel.deb stable/main/binary-mipsel/php5-pspell_5.2.0-8+etch5~pu1_mipsel.deb stable/main/binary-mipsel/php5-mhash_5.2.0-8+etch5~pu1_mipsel.deb stable/main/binary-mipsel/php5-cli_5.2.0-8+etch5~pu1_mipsel.deb stable/main/binary-mipsel/php5-mcrypt_5.2.0-8+etch5~pu1_mipsel.deb stable/main/binary-mipsel/php5-gd_5.2.0-8+etch5~pu1_mipsel.deb stable/main/binary-mipsel/php5-xsl_5.2.0-8+etch5~pu1_mipsel.deb stable/main/binary-mipsel/php5-imap_5.2.0-8+etch5~pu1_mipsel.deb stable/main/binary-mipsel/libapache-mod-php5_5.2.0-8+etch5~pu1_mipsel.deb stable/main/binary-mipsel/php5-xmlrpc_5.2.0-8+etch5~pu1_mipsel.deb stable/main/binary-mipsel/php5-sqlite_5.2.0-8+etch5~pu1_mipsel.deb stable/main/binary-mipsel/php5-sybase_5.2.0-8+etch5~pu1_mipsel.deb stable/main/binary-mipsel/php5-curl_5.2.0-8+etch5~pu1_mipsel.deb stable/main/binary-mipsel/php5-common_5.2.0-8+etch5~pu1_mipsel.deb stable/main/binary-mipsel/php5-pgsql_5.2.0-8+etch5~pu1_mipsel.deb stable/main/binary-mipsel/php5-snmp_5.2.0-8+etch5~pu1_mipsel.deb stable/main/binary-mipsel/php5-recode_5.2.0-8+etch5~pu1_mipsel.deb stable/main/binary-mipsel/php5-tidy_5.2.0-8+etch5~pu1_mipsel.deb stable/main/binary-mipsel/php5-odbc_5.2.0-8+etch5~pu1_mipsel.deb stable/main/binary-mipsel/libapache2-mod-php5_5.2.0-8+etch5~pu1_mipsel.deb stable/main/binary-mipsel/php5-mysql_5.2.0-8+etch5~pu1_mipsel.deb stable/main/binary-mipsel/php5-dev_5.2.0-8+etch5~pu1_mipsel.deb php5 (5.2.0-8+etch5~pu1) proposed-updates; urgency=low * fix for regression in single quote escaping (closes: #422567). stable/main/binary-mips/libapache-mod-php5_5.2.0-8+etch5~pu1_mips.deb stable/main/binary-mips/php5-sybase_5.2.0-8+etch5~pu1_mips.deb stable/main/binary-mips/php5-dev_5.2.0-8+etch5~pu1_mips.deb stable/main/binary-mips/php5-ldap_5.2.0-8+etch5~pu1_mips.deb stable/main/binary-mips/php5-xmlrpc_5.2.0-8+etch5~pu1_mips.deb stable/main/binary-mips/php5-sqlite_5.2.0-8+etch5~pu1_mips.deb stable/main/binary-mips/php5-xsl_5.2.0-8+etch5~pu1_mips.deb stable/main/binary-mips/php5-gd_5.2.0-8+etch5~pu1_mips.deb stable/main/binary-mips/php5-cli_5.2.0-8+etch5~pu1_mips.deb stable/main/binary-mips/php5-curl_5.2.0-8+etch5~pu1_mips.deb stable/main/binary-mips/php5-imap_5.2.0-8+etch5~pu1_mips.deb stable/main/binary-mips/php5-snmp_5.2.0-8+etch5~pu1_mips.deb stable/main/binary-mips/php5-mhash_5.2.0-8+etch5~pu1_mips.deb stable/main/binary-mips/php5-pspell_5.2.0-8+etch5~pu1_mips.deb stable/main/binary-mips/php5-cgi_5.2.0-8+etch5~pu1_mips.deb stable/main/binary-mips/php5-mysql_5.2.0-8+etch5~pu1_mips.deb stable/main/binary-mips/php5-odbc_5.2.0-8+etch5~pu1_mips.deb stable/main/binary-mips/php5-pgsql_5.2.0-8+etch5~pu1_mips.deb stable/main/binary-mips/php5-common_5.2.0-8+etch5~pu1_mips.deb stable/main/binary-mips/php5-mcrypt_5.2.0-8+etch5~pu1_mips.deb stable/main/binary-mips/php5-tidy_5.2.0-8+etch5~pu1_mips.deb stable/main/binary-mips/libapache2-mod-php5_5.2.0-8+etch5~pu1_mips.deb stable/main/binary-mips/php5-recode_5.2.0-8+etch5~pu1_mips.deb php5 (5.2.0-8+etch5~pu1) proposed-updates; urgency=low * fix for regression in single quote escaping (closes: #422567). stable/main/binary-ia64/libapache-mod-php5_5.2.0-8+etch5~pu1_ia64.deb stable/main/binary-ia64/php5-tidy_5.2.0-8+etch5~pu1_ia64.deb stable/main/binary-ia64/php5-dev_5.2.0-8+etch5~pu1_ia64.deb stable/main/binary-ia64/libapache2-mod-php5_5.2.0-8+etch5~pu1_ia64.deb stable/main/binary-ia64/php5-mysql_5.2.0-8+etch5~pu1_ia64.deb stable/main/binary-ia64/php5-ldap_5.2.0-8+etch5~pu1_ia64.deb stable/main/binary-ia64/php5-odbc_5.2.0-8+etch5~pu1_ia64.deb stable/main/binary-ia64/php5-mhash_5.2.0-8+etch5~pu1_ia64.deb stable/main/binary-ia64/php5-imap_5.2.0-8+etch5~pu1_ia64.deb stable/main/binary-ia64/php5-cgi_5.2.0-8+etch5~pu1_ia64.deb stable/main/binary-ia64/php5-curl_5.2.0-8+etch5~pu1_ia64.deb stable/main/binary-ia64/php5-sqlite_5.2.0-8+etch5~pu1_ia64.deb stable/main/binary-ia64/php5-snmp_5.2.0-8+etch5~pu1_ia64.deb stable/main/binary-ia64/php5-gd_5.2.0-8+etch5~pu1_ia64.deb stable/main/binary-ia64/php5-xsl_5.2.0-8+etch5~pu1_ia64.deb stable/main/binary-ia64/php5-xmlrpc_5.2.0-8+etch5~pu1_ia64.deb stable/main/binary-ia64/php5-pgsql_5.2.0-8+etch5~pu1_ia64.deb stable/main/binary-ia64/php5-cli_5.2.0-8+etch5~pu1_ia64.deb stable/main/binary-ia64/php5-mcrypt_5.2.0-8+etch5~pu1_ia64.deb stable/main/binary-ia64/php5-common_5.2.0-8+etch5~pu1_ia64.deb stable/main/binary-ia64/php5-sybase_5.2.0-8+etch5~pu1_ia64.deb stable/main/binary-ia64/php5-pspell_5.2.0-8+etch5~pu1_ia64.deb stable/main/binary-ia64/php5-recode_5.2.0-8+etch5~pu1_ia64.deb php5 (5.2.0-8+etch5~pu1) proposed-updates; urgency=low * fix for regression in single quote escaping (closes: #422567). stable/main/binary-i386/php5-mhash_5.2.0-8+etch5~pu1_i386.deb stable/main/binary-i386/php5-snmp_5.2.0-8+etch5~pu1_i386.deb stable/main/binary-i386/php5-cgi_5.2.0-8+etch5~pu1_i386.deb stable/main/binary-i386/php5-tidy_5.2.0-8+etch5~pu1_i386.deb stable/main/binary-i386/php5-interbase_5.2.0-8+etch5~pu1_i386.deb stable/main/binary-i386/php5-sybase_5.2.0-8+etch5~pu1_i386.deb stable/main/binary-i386/php5-common_5.2.0-8+etch5~pu1_i386.deb stable/main/binary-i386/php5-sqlite_5.2.0-8+etch5~pu1_i386.deb stable/main/binary-i386/php5-cli_5.2.0-8+etch5~pu1_i386.deb stable/main/binary-i386/php5-pgsql_5.2.0-8+etch5~pu1_i386.deb stable/main/binary-i386/php5-mysql_5.2.0-8+etch5~pu1_i386.deb stable/main/binary-i386/php5-curl_5.2.0-8+etch5~pu1_i386.deb stable/main/binary-i386/php5-mcrypt_5.2.0-8+etch5~pu1_i386.deb stable/main/binary-i386/php5-recode_5.2.0-8+etch5~pu1_i386.deb stable/main/binary-i386/php5-imap_5.2.0-8+etch5~pu1_i386.deb stable/main/binary-i386/php5-xmlrpc_5.2.0-8+etch5~pu1_i386.deb stable/main/binary-i386/php5-odbc_5.2.0-8+etch5~pu1_i386.deb stable/main/binary-i386/php5-ldap_5.2.0-8+etch5~pu1_i386.deb stable/main/binary-i386/libapache2-mod-php5_5.2.0-8+etch5~pu1_i386.deb stable/main/binary-i386/php5-pspell_5.2.0-8+etch5~pu1_i386.deb stable/main/binary-i386/php5-gd_5.2.0-8+etch5~pu1_i386.deb stable/main/binary-i386/php5-xsl_5.2.0-8+etch5~pu1_i386.deb stable/main/binary-i386/libapache-mod-php5_5.2.0-8+etch5~pu1_i386.deb stable/main/binary-i386/php5-dev_5.2.0-8+etch5~pu1_i386.deb php5 (5.2.0-8+etch5~pu1) proposed-updates; urgency=low * fix for regression in single quote escaping (closes: #422567). stable/main/binary-hppa/php5-odbc_5.2.0-8+etch5~pu1_hppa.deb stable/main/binary-hppa/php5-pgsql_5.2.0-8+etch5~pu1_hppa.deb stable/main/binary-hppa/php5-mysql_5.2.0-8+etch5~pu1_hppa.deb stable/main/binary-hppa/php5-ldap_5.2.0-8+etch5~pu1_hppa.deb stable/main/binary-hppa/php5-sybase_5.2.0-8+etch5~pu1_hppa.deb stable/main/binary-hppa/php5-mcrypt_5.2.0-8+etch5~pu1_hppa.deb stable/main/binary-hppa/php5-dev_5.2.0-8+etch5~pu1_hppa.deb stable/main/binary-hppa/php5-xmlrpc_5.2.0-8+etch5~pu1_hppa.deb stable/main/binary-hppa/php5-cli_5.2.0-8+etch5~pu1_hppa.deb stable/main/binary-hppa/php5-mhash_5.2.0-8+etch5~pu1_hppa.deb stable/main/binary-hppa/php5-tidy_5.2.0-8+etch5~pu1_hppa.deb stable/main/binary-hppa/php5-recode_5.2.0-8+etch5~pu1_hppa.deb stable/main/binary-hppa/libapache-mod-php5_5.2.0-8+etch5~pu1_hppa.deb stable/main/binary-hppa/php5-xsl_5.2.0-8+etch5~pu1_hppa.deb stable/main/binary-hppa/php5-gd_5.2.0-8+etch5~pu1_hppa.deb stable/main/binary-hppa/php5-curl_5.2.0-8+etch5~pu1_hppa.deb stable/main/binary-hppa/php5-pspell_5.2.0-8+etch5~pu1_hppa.deb stable/main/binary-hppa/libapache2-mod-php5_5.2.0-8+etch5~pu1_hppa.deb stable/main/binary-hppa/php5-imap_5.2.0-8+etch5~pu1_hppa.deb stable/main/binary-hppa/php5-common_5.2.0-8+etch5~pu1_hppa.deb stable/main/binary-hppa/php5-cgi_5.2.0-8+etch5~pu1_hppa.deb stable/main/binary-hppa/php5-sqlite_5.2.0-8+etch5~pu1_hppa.deb stable/main/binary-hppa/php5-snmp_5.2.0-8+etch5~pu1_hppa.deb php5 (5.2.0-8+etch5~pu1) proposed-updates; urgency=low * fix for regression in single quote escaping (closes: #422567). stable/main/binary-arm/php5-curl_5.2.0-8+etch5~pu1_arm.deb stable/main/binary-arm/php5-recode_5.2.0-8+etch5~pu1_arm.deb stable/main/binary-arm/php5-cgi_5.2.0-8+etch5~pu1_arm.deb stable/main/binary-arm/php5-pgsql_5.2.0-8+etch5~pu1_arm.deb stable/main/binary-arm/php5-tidy_5.2.0-8+etch5~pu1_arm.deb stable/main/binary-arm/php5-common_5.2.0-8+etch5~pu1_arm.deb stable/main/binary-arm/php5-pspell_5.2.0-8+etch5~pu1_arm.deb stable/main/binary-arm/php5-dev_5.2.0-8+etch5~pu1_arm.deb stable/main/binary-arm/libapache2-mod-php5_5.2.0-8+etch5~pu1_arm.deb stable/main/binary-arm/php5-mysql_5.2.0-8+etch5~pu1_arm.deb stable/main/binary-arm/php5-sybase_5.2.0-8+etch5~pu1_arm.deb stable/main/binary-arm/php5-xmlrpc_5.2.0-8+etch5~pu1_arm.deb stable/main/binary-arm/php5-ldap_5.2.0-8+etch5~pu1_arm.deb stable/main/binary-arm/php5-odbc_5.2.0-8+etch5~pu1_arm.deb stable/main/binary-arm/php5-imap_5.2.0-8+etch5~pu1_arm.deb stable/main/binary-arm/php5-snmp_5.2.0-8+etch5~pu1_arm.deb stable/main/binary-arm/php5-sqlite_5.2.0-8+etch5~pu1_arm.deb stable/main/binary-arm/php5-gd_5.2.0-8+etch5~pu1_arm.deb stable/main/binary-arm/php5-xsl_5.2.0-8+etch5~pu1_arm.deb stable/main/binary-arm/php5-mcrypt_5.2.0-8+etch5~pu1_arm.deb stable/main/binary-arm/php5-mhash_5.2.0-8+etch5~pu1_arm.deb stable/main/binary-arm/php5-cli_5.2.0-8+etch5~pu1_arm.deb stable/main/binary-arm/libapache-mod-php5_5.2.0-8+etch5~pu1_arm.deb php5 (5.2.0-8+etch5~pu1) proposed-updates; urgency=low * fix for regression in single quote escaping (closes: #422567). stable/main/binary-alpha/php5-cgi_5.2.0-8+etch5~pu1_alpha.deb stable/main/binary-alpha/php5-sqlite_5.2.0-8+etch5~pu1_alpha.deb stable/main/binary-alpha/php5-snmp_5.2.0-8+etch5~pu1_alpha.deb stable/main/binary-alpha/libapache-mod-php5_5.2.0-8+etch5~pu1_alpha.deb stable/main/binary-alpha/php5-pspell_5.2.0-8+etch5~pu1_alpha.deb stable/main/binary-alpha/php5-xmlrpc_5.2.0-8+etch5~pu1_alpha.deb stable/main/binary-alpha/php5-ldap_5.2.0-8+etch5~pu1_alpha.deb stable/main/binary-alpha/php5-recode_5.2.0-8+etch5~pu1_alpha.deb stable/main/binary-alpha/php5-cli_5.2.0-8+etch5~pu1_alpha.deb stable/main/binary-alpha/php5-curl_5.2.0-8+etch5~pu1_alpha.deb stable/main/binary-alpha/php5-xsl_5.2.0-8+etch5~pu1_alpha.deb stable/main/binary-alpha/php5-gd_5.2.0-8+etch5~pu1_alpha.deb stable/main/binary-alpha/php5-mysql_5.2.0-8+etch5~pu1_alpha.deb stable/main/binary-alpha/php5-dev_5.2.0-8+etch5~pu1_alpha.deb stable/main/binary-alpha/libapache2-mod-php5_5.2.0-8+etch5~pu1_alpha.deb stable/main/binary-alpha/php5-odbc_5.2.0-8+etch5~pu1_alpha.deb stable/main/binary-alpha/php5-imap_5.2.0-8+etch5~pu1_alpha.deb stable/main/binary-alpha/php5-tidy_5.2.0-8+etch5~pu1_alpha.deb stable/main/binary-alpha/php5-common_5.2.0-8+etch5~pu1_alpha.deb stable/main/binary-alpha/php5-mhash_5.2.0-8+etch5~pu1_alpha.deb stable/main/binary-alpha/php5-sybase_5.2.0-8+etch5~pu1_alpha.deb stable/main/binary-alpha/php5-pgsql_5.2.0-8+etch5~pu1_alpha.deb stable/main/binary-alpha/php5-mcrypt_5.2.0-8+etch5~pu1_alpha.deb php5 (5.2.0-8+etch5~pu1) proposed-updates; urgency=low * fix for regression in single quote escaping (closes: #422567). stable/main/binary-amd64/php5-sybase_5.2.0-8+etch5~pu1_amd64.deb stable/main/binary-amd64/php5-cgi_5.2.0-8+etch5~pu1_amd64.deb stable/main/binary-amd64/php5-xsl_5.2.0-8+etch5~pu1_amd64.deb stable/main/binary-amd64/php5-snmp_5.2.0-8+etch5~pu1_amd64.deb stable/main/binary-amd64/php5-recode_5.2.0-8+etch5~pu1_amd64.deb stable/main/binary-amd64/php5-cli_5.2.0-8+etch5~pu1_amd64.deb stable/main/binary-amd64/php5-common_5.2.0-8+etch5~pu1_amd64.deb stable/main/binary-amd64/php5-dev_5.2.0-8+etch5~pu1_amd64.deb stable/main/binary-amd64/libapache-mod-php5_5.2.0-8+etch5~pu1_amd64.deb stable/main/binary-amd64/php5-odbc_5.2.0-8+etch5~pu1_amd64.deb stable/main/source/php5_5.2.0-8+etch5~pu1.dsc stable/main/binary-amd64/php5-pgsql_5.2.0-8+etch5~pu1_amd64.deb stable/main/binary-amd64/php5-sqlite_5.2.0-8+etch5~pu1_amd64.deb stable/main/binary-amd64/php5-mcrypt_5.2.0-8+etch5~pu1_amd64.deb stable/main/binary-amd64/php5-xmlrpc_5.2.0-8+etch5~pu1_amd64.deb stable/main/binary-all/php5_5.2.0-8+etch5~pu1_all.deb stable/main/source/php5_5.2.0-8+etch5~pu1.diff.gz stable/main/binary-amd64/libapache2-mod-php5_5.2.0-8+etch5~pu1_amd64.deb stable/main/binary-amd64/php5-ldap_5.2.0-8+etch5~pu1_amd64.deb stable/main/binary-amd64/php5-imap_5.2.0-8+etch5~pu1_amd64.deb stable/main/binary-all/php-pear_5.2.0-8+etch5~pu1_all.deb stable/main/binary-amd64/php5-curl_5.2.0-8+etch5~pu1_amd64.deb stable/main/binary-amd64/php5-gd_5.2.0-8+etch5~pu1_amd64.deb stable/main/binary-amd64/php5-pspell_5.2.0-8+etch5~pu1_amd64.deb stable/main/binary-amd64/php5-interbase_5.2.0-8+etch5~pu1_amd64.deb stable/main/binary-amd64/php5-mhash_5.2.0-8+etch5~pu1_amd64.deb stable/main/binary-amd64/php5-tidy_5.2.0-8+etch5~pu1_amd64.deb stable/main/binary-amd64/php5-mysql_5.2.0-8+etch5~pu1_amd64.deb php5 (5.2.0-8+etch5~pu1) proposed-updates; urgency=low * fix for regression in single quote escaping (closes: #422567). stable/main/binary-sparc/php4-ldap_4.4.4-8+etch3_sparc.deb stable/main/binary-sparc/php4-imap_4.4.4-8+etch3_sparc.deb stable/main/binary-sparc/php4-xslt_4.4.4-8+etch3_sparc.deb stable/main/binary-sparc/php4-mcal_4.4.4-8+etch3_sparc.deb stable/main/binary-sparc/php4-domxml_4.4.4-8+etch3_sparc.deb stable/main/binary-sparc/php4-cgi_4.4.4-8+etch3_sparc.deb stable/main/binary-sparc/php4-common_4.4.4-8+etch3_sparc.deb stable/main/binary-sparc/php4-curl_4.4.4-8+etch3_sparc.deb stable/main/binary-sparc/php4-dev_4.4.4-8+etch3_sparc.deb stable/main/binary-sparc/php4-sybase_4.4.4-8+etch3_sparc.deb stable/main/binary-sparc/libapache-mod-php4_4.4.4-8+etch3_sparc.deb stable/main/binary-sparc/php4-snmp_4.4.4-8+etch3_sparc.deb stable/main/binary-sparc/libapache2-mod-php4_4.4.4-8+etch3_sparc.deb stable/main/binary-sparc/php4-gd_4.4.4-8+etch3_sparc.deb stable/main/binary-sparc/php4-mysql_4.4.4-8+etch3_sparc.deb stable/main/binary-sparc/php4-pspell_4.4.4-8+etch3_sparc.deb stable/main/binary-sparc/php4-cli_4.4.4-8+etch3_sparc.deb stable/main/binary-sparc/php4-mhash_4.4.4-8+etch3_sparc.deb stable/main/binary-sparc/php4-mcrypt_4.4.4-8+etch3_sparc.deb stable/main/binary-sparc/php4-odbc_4.4.4-8+etch3_sparc.deb stable/main/binary-sparc/php4-recode_4.4.4-8+etch3_sparc.deb stable/main/binary-sparc/php4-pgsql_4.4.4-8+etch3_sparc.deb php4 (6:4.4.4-8+etch3) stable-security; urgency=high * NMU prepared for the security team by the package maintainer. * The following security issue is addressed with this update: - CVE-2007-2509: CRLF injection in the ftp module stable/main/binary-s390/php4-mysql_4.4.4-8+etch3_s390.deb stable/main/binary-s390/php4-imap_4.4.4-8+etch3_s390.deb stable/main/binary-s390/php4-pspell_4.4.4-8+etch3_s390.deb stable/main/binary-s390/php4-mcrypt_4.4.4-8+etch3_s390.deb stable/main/binary-s390/php4-dev_4.4.4-8+etch3_s390.deb stable/main/binary-s390/php4-sybase_4.4.4-8+etch3_s390.deb stable/main/binary-s390/php4-snmp_4.4.4-8+etch3_s390.deb stable/main/binary-s390/php4-domxml_4.4.4-8+etch3_s390.deb stable/main/binary-s390/php4-mcal_4.4.4-8+etch3_s390.deb stable/main/binary-s390/php4-cgi_4.4.4-8+etch3_s390.deb stable/main/binary-s390/libapache-mod-php4_4.4.4-8+etch3_s390.deb stable/main/binary-s390/php4-cli_4.4.4-8+etch3_s390.deb stable/main/binary-s390/php4-odbc_4.4.4-8+etch3_s390.deb stable/main/binary-s390/php4-gd_4.4.4-8+etch3_s390.deb stable/main/binary-s390/php4-common_4.4.4-8+etch3_s390.deb stable/main/binary-s390/php4-recode_4.4.4-8+etch3_s390.deb stable/main/binary-s390/php4-curl_4.4.4-8+etch3_s390.deb stable/main/binary-s390/php4-mhash_4.4.4-8+etch3_s390.deb stable/main/binary-s390/php4-ldap_4.4.4-8+etch3_s390.deb stable/main/binary-s390/php4-pgsql_4.4.4-8+etch3_s390.deb stable/main/binary-s390/libapache2-mod-php4_4.4.4-8+etch3_s390.deb stable/main/binary-s390/php4-xslt_4.4.4-8+etch3_s390.deb php4 (6:4.4.4-8+etch3) stable-security; urgency=high * NMU prepared for the security team by the package maintainer. * The following security issue is addressed with this update: - CVE-2007-2509: CRLF injection in the ftp module stable/main/binary-powerpc/php4-recode_4.4.4-8+etch3_powerpc.deb stable/main/binary-powerpc/php4-sybase_4.4.4-8+etch3_powerpc.deb stable/main/binary-powerpc/php4-mysql_4.4.4-8+etch3_powerpc.deb stable/main/binary-powerpc/php4-snmp_4.4.4-8+etch3_powerpc.deb stable/main/binary-powerpc/php4-mhash_4.4.4-8+etch3_powerpc.deb stable/main/binary-powerpc/php4-curl_4.4.4-8+etch3_powerpc.deb stable/main/binary-powerpc/php4-cli_4.4.4-8+etch3_powerpc.deb stable/main/binary-powerpc/php4-imap_4.4.4-8+etch3_powerpc.deb stable/main/binary-powerpc/php4-dev_4.4.4-8+etch3_powerpc.deb stable/main/binary-powerpc/php4-common_4.4.4-8+etch3_powerpc.deb stable/main/binary-powerpc/libapache2-mod-php4_4.4.4-8+etch3_powerpc.deb stable/main/binary-powerpc/php4-pgsql_4.4.4-8+etch3_powerpc.deb stable/main/binary-powerpc/php4-pspell_4.4.4-8+etch3_powerpc.deb stable/main/binary-powerpc/php4-gd_4.4.4-8+etch3_powerpc.deb stable/main/binary-powerpc/php4-domxml_4.4.4-8+etch3_powerpc.deb stable/main/binary-powerpc/php4-ldap_4.4.4-8+etch3_powerpc.deb stable/main/binary-powerpc/php4-mcal_4.4.4-8+etch3_powerpc.deb stable/main/binary-powerpc/libapache-mod-php4_4.4.4-8+etch3_powerpc.deb stable/main/binary-powerpc/php4-cgi_4.4.4-8+etch3_powerpc.deb stable/main/binary-powerpc/php4-odbc_4.4.4-8+etch3_powerpc.deb stable/main/binary-powerpc/php4-xslt_4.4.4-8+etch3_powerpc.deb stable/main/binary-powerpc/php4-mcrypt_4.4.4-8+etch3_powerpc.deb php4 (6:4.4.4-8+etch3) stable-security; urgency=high * NMU prepared for the security team by the package maintainer. * The following security issue is addressed with this update: - CVE-2007-2509: CRLF injection in the ftp module stable/main/binary-mipsel/php4-recode_4.4.4-8+etch3_mipsel.deb stable/main/binary-mipsel/php4-snmp_4.4.4-8+etch3_mipsel.deb stable/main/binary-mipsel/php4-mysql_4.4.4-8+etch3_mipsel.deb stable/main/binary-mipsel/php4-pgsql_4.4.4-8+etch3_mipsel.deb stable/main/binary-mipsel/php4-dev_4.4.4-8+etch3_mipsel.deb stable/main/binary-mipsel/php4-domxml_4.4.4-8+etch3_mipsel.deb stable/main/binary-mipsel/libapache-mod-php4_4.4.4-8+etch3_mipsel.deb stable/main/binary-mipsel/php4-mcrypt_4.4.4-8+etch3_mipsel.deb stable/main/binary-mipsel/php4-curl_4.4.4-8+etch3_mipsel.deb stable/main/binary-mipsel/php4-imap_4.4.4-8+etch3_mipsel.deb stable/main/binary-mipsel/php4-cgi_4.4.4-8+etch3_mipsel.deb stable/main/binary-mipsel/php4-cli_4.4.4-8+etch3_mipsel.deb stable/main/binary-mipsel/php4-odbc_4.4.4-8+etch3_mipsel.deb stable/main/binary-mipsel/php4-mhash_4.4.4-8+etch3_mipsel.deb stable/main/binary-mipsel/php4-common_4.4.4-8+etch3_mipsel.deb stable/main/binary-mipsel/php4-pspell_4.4.4-8+etch3_mipsel.deb stable/main/binary-mipsel/php4-sybase_4.4.4-8+etch3_mipsel.deb stable/main/binary-mipsel/php4-xslt_4.4.4-8+etch3_mipsel.deb stable/main/binary-mipsel/php4-gd_4.4.4-8+etch3_mipsel.deb stable/main/binary-mipsel/libapache2-mod-php4_4.4.4-8+etch3_mipsel.deb stable/main/binary-mipsel/php4-mcal_4.4.4-8+etch3_mipsel.deb stable/main/binary-mipsel/php4-ldap_4.4.4-8+etch3_mipsel.deb php4 (6:4.4.4-8+etch3) stable-security; urgency=high * NMU prepared for the security team by the package maintainer. * The following security issue is addressed with this update: - CVE-2007-2509: CRLF injection in the ftp module stable/main/binary-mips/php4-odbc_4.4.4-8+etch3_mips.deb stable/main/binary-mips/php4-snmp_4.4.4-8+etch3_mips.deb stable/main/binary-mips/php4-recode_4.4.4-8+etch3_mips.deb stable/main/binary-mips/php4-mcrypt_4.4.4-8+etch3_mips.deb stable/main/binary-mips/php4-mcal_4.4.4-8+etch3_mips.deb stable/main/binary-mips/php4-common_4.4.4-8+etch3_mips.deb stable/main/binary-mips/php4-curl_4.4.4-8+etch3_mips.deb stable/main/binary-mips/libapache2-mod-php4_4.4.4-8+etch3_mips.deb stable/main/binary-mips/php4-pgsql_4.4.4-8+etch3_mips.deb stable/main/binary-mips/php4-mysql_4.4.4-8+etch3_mips.deb stable/main/binary-mips/php4-domxml_4.4.4-8+etch3_mips.deb stable/main/binary-mips/php4-cgi_4.4.4-8+etch3_mips.deb stable/main/binary-mips/php4-dev_4.4.4-8+etch3_mips.deb stable/main/binary-mips/php4-pspell_4.4.4-8+etch3_mips.deb stable/main/binary-mips/php4-mhash_4.4.4-8+etch3_mips.deb stable/main/binary-mips/php4-imap_4.4.4-8+etch3_mips.deb stable/main/binary-mips/libapache-mod-php4_4.4.4-8+etch3_mips.deb stable/main/binary-mips/php4-xslt_4.4.4-8+etch3_mips.deb stable/main/binary-mips/php4-cli_4.4.4-8+etch3_mips.deb stable/main/binary-mips/php4-gd_4.4.4-8+etch3_mips.deb stable/main/binary-mips/php4-sybase_4.4.4-8+etch3_mips.deb stable/main/binary-mips/php4-ldap_4.4.4-8+etch3_mips.deb php4 (6:4.4.4-8+etch3) stable-security; urgency=high * NMU prepared for the security team by the package maintainer. * The following security issue is addressed with this update: - CVE-2007-2509: CRLF injection in the ftp module stable/main/binary-ia64/php4-domxml_4.4.4-8+etch3_ia64.deb stable/main/binary-ia64/php4-recode_4.4.4-8+etch3_ia64.deb stable/main/binary-ia64/php4-mcal_4.4.4-8+etch3_ia64.deb stable/main/binary-ia64/php4-mcrypt_4.4.4-8+etch3_ia64.deb stable/main/binary-ia64/php4-mhash_4.4.4-8+etch3_ia64.deb stable/main/binary-ia64/php4-pgsql_4.4.4-8+etch3_ia64.deb stable/main/binary-ia64/php4-dev_4.4.4-8+etch3_ia64.deb stable/main/binary-ia64/libapache-mod-php4_4.4.4-8+etch3_ia64.deb stable/main/binary-ia64/php4-common_4.4.4-8+etch3_ia64.deb stable/main/binary-ia64/php4-pspell_4.4.4-8+etch3_ia64.deb stable/main/binary-ia64/libapache2-mod-php4_4.4.4-8+etch3_ia64.deb stable/main/binary-ia64/php4-gd_4.4.4-8+etch3_ia64.deb stable/main/binary-ia64/php4-mysql_4.4.4-8+etch3_ia64.deb stable/main/binary-ia64/php4-odbc_4.4.4-8+etch3_ia64.deb stable/main/binary-ia64/php4-curl_4.4.4-8+etch3_ia64.deb stable/main/binary-ia64/php4-cgi_4.4.4-8+etch3_ia64.deb stable/main/binary-ia64/php4-ldap_4.4.4-8+etch3_ia64.deb stable/main/binary-ia64/php4-imap_4.4.4-8+etch3_ia64.deb stable/main/binary-ia64/php4-sybase_4.4.4-8+etch3_ia64.deb stable/main/binary-ia64/php4-snmp_4.4.4-8+etch3_ia64.deb stable/main/binary-ia64/php4-xslt_4.4.4-8+etch3_ia64.deb stable/main/binary-ia64/php4-cli_4.4.4-8+etch3_ia64.deb php4 (6:4.4.4-8+etch3) stable-security; urgency=high * NMU prepared for the security team by the package maintainer. * The following security issue is addressed with this update: - CVE-2007-2509: CRLF injection in the ftp module stable/main/binary-i386/php4-domxml_4.4.4-8+etch3_i386.deb stable/main/binary-i386/php4-common_4.4.4-8+etch3_i386.deb stable/main/binary-i386/php4-recode_4.4.4-8+etch3_i386.deb stable/main/binary-i386/php4-snmp_4.4.4-8+etch3_i386.deb stable/main/binary-i386/php4-ldap_4.4.4-8+etch3_i386.deb stable/main/binary-i386/php4-dev_4.4.4-8+etch3_i386.deb stable/main/binary-i386/php4-mcrypt_4.4.4-8+etch3_i386.deb stable/main/binary-i386/php4-pspell_4.4.4-8+etch3_i386.deb stable/main/binary-i386/php4-curl_4.4.4-8+etch3_i386.deb stable/main/binary-i386/php4-mcal_4.4.4-8+etch3_i386.deb stable/main/binary-i386/libapache-mod-php4_4.4.4-8+etch3_i386.deb stable/main/binary-i386/php4-imap_4.4.4-8+etch3_i386.deb stable/main/binary-i386/php4-mysql_4.4.4-8+etch3_i386.deb stable/main/binary-i386/php4-xslt_4.4.4-8+etch3_i386.deb stable/main/binary-i386/php4-cli_4.4.4-8+etch3_i386.deb stable/main/binary-i386/php4-interbase_4.4.4-8+etch3_i386.deb stable/main/binary-i386/php4-sybase_4.4.4-8+etch3_i386.deb stable/main/binary-i386/php4-odbc_4.4.4-8+etch3_i386.deb stable/main/binary-i386/php4-pgsql_4.4.4-8+etch3_i386.deb stable/main/binary-i386/php4-mhash_4.4.4-8+etch3_i386.deb stable/main/binary-i386/php4-gd_4.4.4-8+etch3_i386.deb stable/main/binary-i386/php4-cgi_4.4.4-8+etch3_i386.deb stable/main/binary-i386/libapache2-mod-php4_4.4.4-8+etch3_i386.deb php4 (6:4.4.4-8+etch3) stable-security; urgency=high * NMU prepared for the security team by the package maintainer. * The following security issue is addressed with this update: - CVE-2007-2509: CRLF injection in the ftp module stable/main/binary-hppa/php4-odbc_4.4.4-8+etch3_hppa.deb stable/main/binary-hppa/libapache2-mod-php4_4.4.4-8+etch3_hppa.deb stable/main/binary-hppa/php4-sybase_4.4.4-8+etch3_hppa.deb stable/main/binary-hppa/php4-cgi_4.4.4-8+etch3_hppa.deb stable/main/binary-hppa/php4-mcrypt_4.4.4-8+etch3_hppa.deb stable/main/binary-hppa/libapache-mod-php4_4.4.4-8+etch3_hppa.deb stable/main/binary-hppa/php4-gd_4.4.4-8+etch3_hppa.deb stable/main/binary-hppa/php4-ldap_4.4.4-8+etch3_hppa.deb stable/main/binary-hppa/php4-mcal_4.4.4-8+etch3_hppa.deb stable/main/binary-hppa/php4-dev_4.4.4-8+etch3_hppa.deb stable/main/binary-hppa/php4-common_4.4.4-8+etch3_hppa.deb stable/main/binary-hppa/php4-xslt_4.4.4-8+etch3_hppa.deb stable/main/binary-hppa/php4-mysql_4.4.4-8+etch3_hppa.deb stable/main/binary-hppa/php4-snmp_4.4.4-8+etch3_hppa.deb stable/main/binary-hppa/php4-recode_4.4.4-8+etch3_hppa.deb stable/main/binary-hppa/php4-imap_4.4.4-8+etch3_hppa.deb stable/main/binary-hppa/php4-pgsql_4.4.4-8+etch3_hppa.deb stable/main/binary-hppa/php4-curl_4.4.4-8+etch3_hppa.deb stable/main/binary-hppa/php4-cli_4.4.4-8+etch3_hppa.deb stable/main/binary-hppa/php4-domxml_4.4.4-8+etch3_hppa.deb stable/main/binary-hppa/php4-pspell_4.4.4-8+etch3_hppa.deb stable/main/binary-hppa/php4-mhash_4.4.4-8+etch3_hppa.deb php4 (6:4.4.4-8+etch3) stable-security; urgency=high * NMU prepared for the security team by the package maintainer. * The following security issue is addressed with this update: - CVE-2007-2509: CRLF injection in the ftp module stable/main/binary-arm/php4-snmp_4.4.4-8+etch3_arm.deb stable/main/binary-arm/php4-odbc_4.4.4-8+etch3_arm.deb stable/main/binary-arm/php4-mhash_4.4.4-8+etch3_arm.deb stable/main/binary-arm/php4-ldap_4.4.4-8+etch3_arm.deb stable/main/binary-arm/php4-mcal_4.4.4-8+etch3_arm.deb stable/main/binary-arm/php4-cli_4.4.4-8+etch3_arm.deb stable/main/binary-arm/libapache-mod-php4_4.4.4-8+etch3_arm.deb stable/main/binary-arm/php4-sybase_4.4.4-8+etch3_arm.deb stable/main/binary-arm/php4-mcrypt_4.4.4-8+etch3_arm.deb stable/main/binary-arm/libapache2-mod-php4_4.4.4-8+etch3_arm.deb stable/main/binary-arm/php4-domxml_4.4.4-8+etch3_arm.deb stable/main/binary-arm/php4-xslt_4.4.4-8+etch3_arm.deb stable/main/binary-arm/php4-gd_4.4.4-8+etch3_arm.deb stable/main/binary-arm/php4-pspell_4.4.4-8+etch3_arm.deb stable/main/binary-arm/php4-common_4.4.4-8+etch3_arm.deb stable/main/binary-arm/php4-curl_4.4.4-8+etch3_arm.deb stable/main/binary-arm/php4-dev_4.4.4-8+etch3_arm.deb stable/main/binary-arm/php4-cgi_4.4.4-8+etch3_arm.deb stable/main/binary-arm/php4-mysql_4.4.4-8+etch3_arm.deb stable/main/binary-arm/php4-pgsql_4.4.4-8+etch3_arm.deb stable/main/binary-arm/php4-imap_4.4.4-8+etch3_arm.deb stable/main/binary-arm/php4-recode_4.4.4-8+etch3_arm.deb php4 (6:4.4.4-8+etch3) stable-security; urgency=high * NMU prepared for the security team by the package maintainer. * The following security issue is addressed with this update: - CVE-2007-2509: CRLF injection in the ftp module stable/main/binary-alpha/php4-snmp_4.4.4-8+etch3_alpha.deb stable/main/binary-alpha/php4-mcrypt_4.4.4-8+etch3_alpha.deb stable/main/binary-alpha/php4-recode_4.4.4-8+etch3_alpha.deb stable/main/binary-alpha/libapache2-mod-php4_4.4.4-8+etch3_alpha.deb stable/main/binary-alpha/php4-xslt_4.4.4-8+etch3_alpha.deb stable/main/binary-alpha/php4-imap_4.4.4-8+etch3_alpha.deb stable/main/binary-alpha/php4-curl_4.4.4-8+etch3_alpha.deb stable/main/binary-alpha/php4-ldap_4.4.4-8+etch3_alpha.deb stable/main/binary-alpha/php4-pspell_4.4.4-8+etch3_alpha.deb stable/main/binary-alpha/php4-common_4.4.4-8+etch3_alpha.deb stable/main/binary-alpha/php4-cli_4.4.4-8+etch3_alpha.deb stable/main/binary-alpha/libapache-mod-php4_4.4.4-8+etch3_alpha.deb stable/main/binary-alpha/php4-cgi_4.4.4-8+etch3_alpha.deb stable/main/binary-alpha/php4-sybase_4.4.4-8+etch3_alpha.deb stable/main/binary-alpha/php4-mysql_4.4.4-8+etch3_alpha.deb stable/main/binary-alpha/php4-dev_4.4.4-8+etch3_alpha.deb stable/main/binary-alpha/php4-domxml_4.4.4-8+etch3_alpha.deb stable/main/binary-alpha/php4-gd_4.4.4-8+etch3_alpha.deb stable/main/binary-alpha/php4-odbc_4.4.4-8+etch3_alpha.deb stable/main/binary-alpha/php4-mcal_4.4.4-8+etch3_alpha.deb stable/main/binary-alpha/php4-mhash_4.4.4-8+etch3_alpha.deb stable/main/binary-alpha/php4-pgsql_4.4.4-8+etch3_alpha.deb php4 (6:4.4.4-8+etch3) stable-security; urgency=high * NMU prepared for the security team by the package maintainer. * The following security issue is addressed with this update: - CVE-2007-2509: CRLF injection in the ftp module stable/main/binary-amd64/php4-pspell_4.4.4-8+etch3_amd64.deb stable/main/binary-amd64/libapache2-mod-php4_4.4.4-8+etch3_amd64.deb stable/main/binary-amd64/php4-mcal_4.4.4-8+etch3_amd64.deb stable/main/source/php4_4.4.4-8+etch3.diff.gz stable/main/binary-amd64/php4-mysql_4.4.4-8+etch3_amd64.deb stable/main/binary-amd64/php4-odbc_4.4.4-8+etch3_amd64.deb stable/main/binary-amd64/php4-xslt_4.4.4-8+etch3_amd64.deb stable/main/binary-amd64/php4-dev_4.4.4-8+etch3_amd64.deb stable/main/binary-amd64/php4-gd_4.4.4-8+etch3_amd64.deb stable/main/binary-amd64/php4-snmp_4.4.4-8+etch3_amd64.deb stable/main/binary-amd64/php4-sybase_4.4.4-8+etch3_amd64.deb stable/main/binary-amd64/php4-recode_4.4.4-8+etch3_amd64.deb stable/main/binary-amd64/php4-ldap_4.4.4-8+etch3_amd64.deb stable/main/binary-amd64/php4-interbase_4.4.4-8+etch3_amd64.deb stable/main/binary-amd64/php4-common_4.4.4-8+etch3_amd64.deb stable/main/binary-amd64/php4-mhash_4.4.4-8+etch3_amd64.deb stable/main/binary-amd64/php4-cli_4.4.4-8+etch3_amd64.deb stable/main/binary-amd64/php4-cgi_4.4.4-8+etch3_amd64.deb stable/main/binary-amd64/php4-domxml_4.4.4-8+etch3_amd64.deb stable/main/binary-amd64/libapache-mod-php4_4.4.4-8+etch3_amd64.deb stable/main/source/php4_4.4.4-8+etch3.dsc stable/main/binary-all/php4_4.4.4-8+etch3_all.deb stable/main/binary-amd64/php4-mcrypt_4.4.4-8+etch3_amd64.deb stable/main/binary-amd64/php4-curl_4.4.4-8+etch3_amd64.deb stable/main/binary-amd64/php4-pgsql_4.4.4-8+etch3_amd64.deb stable/main/binary-amd64/php4-imap_4.4.4-8+etch3_amd64.deb stable/main/binary-all/php4-pear_4.4.4-8+etch3_all.deb php4 (6:4.4.4-8+etch3) stable-security; urgency=high * NMU prepared for the security team by the package maintainer. * The following security issue is addressed with this update: - CVE-2007-2509: CRLF injection in the ftp module stable/main/binary-amd64/pekwm_0.1.5-1.1_amd64.deb pekwm (0.1.5-1.1) unstable; urgency=low * Non-maintainer upload. * Change architecture line to any (Closes: #370447) stable/main/binary-sparc/partman-partitioning_48etch1_sparc.udeb partman-partitioning (48etch1) stable; urgency=low * Fix serious translation error for Catalan reported by Robert Millan. stable/main/binary-s390/partman-partitioning_48etch1_s390.udeb partman-partitioning (48etch1) stable; urgency=low * Fix serious translation error for Catalan reported by Robert Millan. stable/main/binary-powerpc/partman-partitioning_48etch1_powerpc.udeb partman-partitioning (48etch1) stable; urgency=low * Fix serious translation error for Catalan reported by Robert Millan. stable/main/binary-mipsel/partman-partitioning_48etch1_mipsel.udeb partman-partitioning (48etch1) stable; urgency=low * Fix serious translation error for Catalan reported by Robert Millan. stable/main/binary-mips/partman-partitioning_48etch1_mips.udeb partman-partitioning (48etch1) stable; urgency=low * Fix serious translation error for Catalan reported by Robert Millan. stable/main/binary-ia64/partman-partitioning_48etch1_ia64.udeb partman-partitioning (48etch1) stable; urgency=low * Fix serious translation error for Catalan reported by Robert Millan. stable/main/binary-hppa/partman-partitioning_48etch1_hppa.udeb partman-partitioning (48etch1) stable; urgency=low * Fix serious translation error for Catalan reported by Robert Millan. stable/main/binary-arm/partman-partitioning_48etch1_arm.udeb partman-partitioning (48etch1) stable; urgency=low * Fix serious translation error for Catalan reported by Robert Millan. stable/main/binary-amd64/partman-partitioning_48etch1_amd64.udeb partman-partitioning (48etch1) stable; urgency=low * Fix serious translation error for Catalan reported by Robert Millan. stable/main/binary-alpha/partman-partitioning_48etch1_alpha.udeb partman-partitioning (48etch1) stable; urgency=low * Fix serious translation error for Catalan reported by Robert Millan. stable/main/source/partman-partitioning_48etch1.tar.gz stable/main/source/partman-partitioning_48etch1.dsc stable/main/binary-i386/partman-partitioning_48etch1_i386.udeb partman-partitioning (48etch1) stable; urgency=low * Fix serious translation error for Catalan reported by Robert Millan. stable/main/binary-sparc/partman-auto_68etch1_sparc.udeb partman-auto (68etch1) stable; urgency=low * Fix too long string in Romanian translation reported by Eddy Petrisor. stable/main/binary-s390/partman-auto_68etch1_s390.udeb partman-auto (68etch1) stable; urgency=low * Fix too long string in Romanian translation reported by Eddy Petrisor. stable/main/binary-powerpc/partman-auto_68etch1_powerpc.udeb partman-auto (68etch1) stable; urgency=low * Fix too long string in Romanian translation reported by Eddy Petrisor. stable/main/binary-mipsel/partman-auto_68etch1_mipsel.udeb partman-auto (68etch1) stable; urgency=low * Fix too long string in Romanian translation reported by Eddy Petrisor. stable/main/binary-mips/partman-auto_68etch1_mips.udeb partman-auto (68etch1) stable; urgency=low * Fix too long string in Romanian translation reported by Eddy Petrisor. stable/main/binary-ia64/partman-auto_68etch1_ia64.udeb partman-auto (68etch1) stable; urgency=low * Fix too long string in Romanian translation reported by Eddy Petrisor. stable/main/binary-hppa/partman-auto_68etch1_hppa.udeb partman-auto (68etch1) stable; urgency=low * Fix too long string in Romanian translation reported by Eddy Petrisor. stable/main/binary-arm/partman-auto_68etch1_arm.udeb partman-auto (68etch1) stable; urgency=low * Fix too long string in Romanian translation reported by Eddy Petrisor. stable/main/binary-amd64/partman-auto_68etch1_amd64.udeb partman-auto (68etch1) stable; urgency=low * Fix too long string in Romanian translation reported by Eddy Petrisor. stable/main/binary-alpha/partman-auto_68etch1_alpha.udeb partman-auto (68etch1) stable; urgency=low * Fix too long string in Romanian translation reported by Eddy Petrisor. stable/main/source/partman-auto_68etch1.tar.gz stable/main/binary-i386/partman-auto_68etch1_i386.udeb stable/main/source/partman-auto_68etch1.dsc partman-auto (68etch1) stable; urgency=low * Fix too long string in Romanian translation reported by Eddy Petrisor. stable/main/source/otrs2_2.0.4p01-18.dsc stable/main/binary-all/otrs2_2.0.4p01-18_all.deb stable/main/source/otrs2_2.0.4p01-18.diff.gz otrs2 (2.0.4p01-18) stable-security; urgency=high * Fix XSS in AgentTicketMailbox action. Based on update provided by Torsten Werner stable/main/binary-sparc/orbit2-nameserver_2.14.3-0.2_sparc.deb stable/main/binary-sparc/liborbit2-dev_2.14.3-0.2_sparc.deb stable/main/binary-sparc/liborbit2_2.14.3-0.2_sparc.deb stable/main/binary-sparc/orbit2_2.14.3-0.2_sparc.deb orbit2 (1:2.14.3-0.2) stable; urgency=low * New patch, 600-allow-non-local-ipv4, fixes non-local IPv4 connections; backport of SVN r1962; thanks Daniel Nilsson; closes: #425757. stable/main/binary-s390/orbit2-nameserver_2.14.3-0.2_s390.deb stable/main/binary-s390/liborbit2-dev_2.14.3-0.2_s390.deb stable/main/binary-s390/liborbit2_2.14.3-0.2_s390.deb stable/main/binary-s390/orbit2_2.14.3-0.2_s390.deb orbit2 (1:2.14.3-0.2) stable; urgency=low * New patch, 600-allow-non-local-ipv4, fixes non-local IPv4 connections; backport of SVN r1962; thanks Daniel Nilsson; closes: #425757. stable/main/binary-powerpc/liborbit2_2.14.3-0.2_powerpc.deb stable/main/binary-powerpc/orbit2_2.14.3-0.2_powerpc.deb stable/main/binary-powerpc/orbit2-nameserver_2.14.3-0.2_powerpc.deb stable/main/binary-powerpc/liborbit2-dev_2.14.3-0.2_powerpc.deb orbit2 (1:2.14.3-0.2) stable; urgency=low * New patch, 600-allow-non-local-ipv4, fixes non-local IPv4 connections; backport of SVN r1962; thanks Daniel Nilsson; closes: #425757. stable/main/binary-mipsel/orbit2-nameserver_2.14.3-0.2_mipsel.deb stable/main/binary-mipsel/liborbit2_2.14.3-0.2_mipsel.deb stable/main/binary-mipsel/liborbit2-dev_2.14.3-0.2_mipsel.deb stable/main/binary-mipsel/orbit2_2.14.3-0.2_mipsel.deb orbit2 (1:2.14.3-0.2) stable; urgency=low * New patch, 600-allow-non-local-ipv4, fixes non-local IPv4 connections; backport of SVN r1962; thanks Daniel Nilsson; closes: #425757. stable/main/binary-mips/liborbit2_2.14.3-0.2_mips.deb stable/main/binary-mips/orbit2_2.14.3-0.2_mips.deb stable/main/binary-mips/orbit2-nameserver_2.14.3-0.2_mips.deb stable/main/binary-mips/liborbit2-dev_2.14.3-0.2_mips.deb orbit2 (1:2.14.3-0.2) stable; urgency=low * New patch, 600-allow-non-local-ipv4, fixes non-local IPv4 connections; backport of SVN r1962; thanks Daniel Nilsson; closes: #425757. stable/main/binary-ia64/liborbit2_2.14.3-0.2_ia64.deb stable/main/binary-ia64/orbit2-nameserver_2.14.3-0.2_ia64.deb stable/main/binary-ia64/liborbit2-dev_2.14.3-0.2_ia64.deb stable/main/binary-ia64/orbit2_2.14.3-0.2_ia64.deb orbit2 (1:2.14.3-0.2) stable; urgency=low * New patch, 600-allow-non-local-ipv4, fixes non-local IPv4 connections; backport of SVN r1962; thanks Daniel Nilsson; closes: #425757. stable/main/binary-hppa/liborbit2_2.14.3-0.2_hppa.deb stable/main/binary-hppa/liborbit2-dev_2.14.3-0.2_hppa.deb stable/main/binary-hppa/orbit2-nameserver_2.14.3-0.2_hppa.deb stable/main/binary-hppa/orbit2_2.14.3-0.2_hppa.deb orbit2 (1:2.14.3-0.2) stable; urgency=low * New patch, 600-allow-non-local-ipv4, fixes non-local IPv4 connections; backport of SVN r1962; thanks Daniel Nilsson; closes: #425757. stable/main/binary-arm/liborbit2-dev_2.14.3-0.2_arm.deb stable/main/binary-arm/orbit2-nameserver_2.14.3-0.2_arm.deb stable/main/binary-arm/orbit2_2.14.3-0.2_arm.deb stable/main/binary-arm/liborbit2_2.14.3-0.2_arm.deb orbit2 (1:2.14.3-0.2) stable; urgency=low * New patch, 600-allow-non-local-ipv4, fixes non-local IPv4 connections; backport of SVN r1962; thanks Daniel Nilsson; closes: #425757. stable/main/binary-amd64/orbit2_2.14.3-0.2_amd64.deb stable/main/binary-amd64/liborbit2-dev_2.14.3-0.2_amd64.deb stable/main/binary-amd64/liborbit2_2.14.3-0.2_amd64.deb stable/main/binary-amd64/orbit2-nameserver_2.14.3-0.2_amd64.deb orbit2 (1:2.14.3-0.2) stable; urgency=low * New patch, 600-allow-non-local-ipv4, fixes non-local IPv4 connections; backport of SVN r1962; thanks Daniel Nilsson; closes: #425757. stable/main/binary-alpha/liborbit2_2.14.3-0.2_alpha.deb stable/main/binary-alpha/liborbit2-dev_2.14.3-0.2_alpha.deb stable/main/binary-alpha/orbit2_2.14.3-0.2_alpha.deb stable/main/binary-alpha/orbit2-nameserver_2.14.3-0.2_alpha.deb orbit2 (1:2.14.3-0.2) stable; urgency=low * New patch, 600-allow-non-local-ipv4, fixes non-local IPv4 connections; backport of SVN r1962; thanks Daniel Nilsson; closes: #425757. stable/main/binary-i386/orbit2_2.14.3-0.2_i386.deb stable/main/binary-i386/liborbit2-dev_2.14.3-0.2_i386.deb stable/main/binary-i386/orbit2-nameserver_2.14.3-0.2_i386.deb stable/main/source/orbit2_2.14.3-0.2.diff.gz stable/main/binary-i386/liborbit2_2.14.3-0.2_i386.deb stable/main/source/orbit2_2.14.3-0.2.dsc orbit2 (1:2.14.3-0.2) stable; urgency=low * New patch, 600-allow-non-local-ipv4, fixes non-local IPv4 connections; backport of SVN r1962; thanks Daniel Nilsson; closes: #425757. stable/main/binary-sparc/orage_4.3.99.1-2_sparc.deb orage (4.3.99.1-2) stable; urgency=low * Fix memory leak due to not freeing values returned from g_locale_from_utf8 (thanks Jason Kraftcheck) closes: #420759 stable/main/binary-s390/orage_4.3.99.1-2_s390.deb orage (4.3.99.1-2) stable; urgency=low * Fix memory leak due to not freeing values returned from g_locale_from_utf8 (thanks Jason Kraftcheck) closes: #420759 stable/main/binary-powerpc/orage_4.3.99.1-2_powerpc.deb orage (4.3.99.1-2) stable; urgency=low * Fix memory leak due to not freeing values returned from g_locale_from_utf8 (thanks Jason Kraftcheck) closes: #420759 stable/main/binary-mipsel/orage_4.3.99.1-2_mipsel.deb orage (4.3.99.1-2) stable; urgency=low * Fix memory leak due to not freeing values returned from g_locale_from_utf8 (thanks Jason Kraftcheck) closes: #420759 stable/main/binary-mips/orage_4.3.99.1-2_mips.deb orage (4.3.99.1-2) stable; urgency=low * Fix memory leak due to not freeing values returned from g_locale_from_utf8 (thanks Jason Kraftcheck) closes: #420759 stable/main/binary-ia64/orage_4.3.99.1-2_ia64.deb orage (4.3.99.1-2) stable; urgency=low * Fix memory leak due to not freeing values returned from g_locale_from_utf8 (thanks Jason Kraftcheck) closes: #420759 stable/main/binary-i386/orage_4.3.99.1-2_i386.deb orage (4.3.99.1-2) stable; urgency=low * Fix memory leak due to not freeing values returned from g_locale_from_utf8 (thanks Jason Kraftcheck) closes: #420759 stable/main/binary-hppa/orage_4.3.99.1-2_hppa.deb orage (4.3.99.1-2) stable; urgency=low * Fix memory leak due to not freeing values returned from g_locale_from_utf8 (thanks Jason Kraftcheck) closes: #420759 stable/main/binary-arm/orage_4.3.99.1-2_arm.deb orage (4.3.99.1-2) stable; urgency=low * Fix memory leak due to not freeing values returned from g_locale_from_utf8 (thanks Jason Kraftcheck) closes: #420759 stable/main/binary-alpha/orage_4.3.99.1-2_alpha.deb orage (4.3.99.1-2) stable; urgency=low * Fix memory leak due to not freeing values returned from g_locale_from_utf8 (thanks Jason Kraftcheck) closes: #420759 stable/main/source/orage_4.3.99.1-2.diff.gz stable/main/binary-amd64/orage_4.3.99.1-2_amd64.deb stable/main/source/orage_4.3.99.1-2.dsc orage (4.3.99.1-2) stable; urgency=low * Fix memory leak due to not freeing values returned from g_locale_from_utf8 (thanks Jason Kraftcheck) closes: #420759 stable/main/binary-s390/libmythes-dev_2.0.4.dfsg.2-7etch1_s390.deb openoffice.org (2.0.4.dfsg.2-7etch1) stable-security; urgency=high * ooo-build/patches/src680/sw.rtf.prtdata.diff: fix RTF parser heap overflow (CVE-2007-0244) stable/main/binary-mipsel/libmythes-dev_2.0.4.dfsg.2-7etch1_mipsel.deb openoffice.org (2.0.4.dfsg.2-7etch1) stable-security; urgency=high * ooo-build/patches/src680/sw.rtf.prtdata.diff: fix RTF parser heap overflow (CVE-2007-0244) stable/main/binary-mips/libmythes-dev_2.0.4.dfsg.2-7etch1_mips.deb openoffice.org (2.0.4.dfsg.2-7etch1) stable-security; urgency=high * ooo-build/patches/src680/sw.rtf.prtdata.diff: fix RTF parser heap overflow (CVE-2007-0244) stable/main/binary-ia64/libmythes-dev_2.0.4.dfsg.2-7etch1_ia64.deb openoffice.org (2.0.4.dfsg.2-7etch1) stable-security; urgency=high * ooo-build/patches/src680/sw.rtf.prtdata.diff: fix RTF parser heap overflow (CVE-2007-0244) stable/main/binary-i386/python-uno_2.0.4.dfsg.2-7etch1_i386.deb stable/main/binary-i386/openoffice.org-kde_2.0.4.dfsg.2-7etch1_i386.deb stable/main/binary-i386/openoffice.org-qa-tools_2.0.4.dfsg.2-7etch1_i386.deb stable/main/binary-i386/openoffice.org-calc_2.0.4.dfsg.2-7etch1_i386.deb stable/main/binary-i386/openoffice.org-dev_2.0.4.dfsg.2-7etch1_i386.deb stable/main/binary-i386/openoffice.org-base_2.0.4.dfsg.2-7etch1_i386.deb stable/main/binary-i386/openoffice.org-impress_2.0.4.dfsg.2-7etch1_i386.deb stable/main/binary-i386/openoffice.org_2.0.4.dfsg.2-7etch1_i386.deb stable/main/binary-i386/openoffice.org-gcj_2.0.4.dfsg.2-7etch1_i386.deb stable/main/binary-i386/openoffice.org-evolution_2.0.4.dfsg.2-7etch1_i386.deb stable/main/binary-i386/openoffice.org-gtk-gnome_2.0.4.dfsg.2-7etch1_i386.deb stable/main/binary-i386/openoffice.org-core_2.0.4.dfsg.2-7etch1_i386.deb stable/main/binary-i386/openoffice.org-gtk_2.0.4.dfsg.2-7etch1_i386.deb stable/main/binary-i386/openoffice.org-draw_2.0.4.dfsg.2-7etch1_i386.deb stable/main/binary-i386/openoffice.org-gnome_2.0.4.dfsg.2-7etch1_i386.deb stable/main/binary-i386/openoffice.org-dbg_2.0.4.dfsg.2-7etch1_i386.deb stable/main/binary-i386/openoffice.org-math_2.0.4.dfsg.2-7etch1_i386.deb stable/main/binary-i386/openoffice.org-officebean_2.0.4.dfsg.2-7etch1_i386.deb stable/main/binary-i386/openoffice.org-filter-so52_2.0.4.dfsg.2-7etch1_i386.deb stable/main/binary-i386/libmythes-dev_2.0.4.dfsg.2-7etch1_i386.deb stable/main/binary-i386/openoffice.org-writer_2.0.4.dfsg.2-7etch1_i386.deb openoffice.org (2.0.4.dfsg.2-7etch1) stable-security; urgency=high * ooo-build/patches/src680/sw.rtf.prtdata.diff: fix RTF parser heap overflow (CVE-2007-0244) stable/main/binary-hppa/libmythes-dev_2.0.4.dfsg.2-7etch1_hppa.deb openoffice.org (2.0.4.dfsg.2-7etch1) stable-security; urgency=high * ooo-build/patches/src680/sw.rtf.prtdata.diff: fix RTF parser heap overflow (CVE-2007-0244) stable/main/binary-arm/libmythes-dev_2.0.4.dfsg.2-7etch1_arm.deb openoffice.org (2.0.4.dfsg.2-7etch1) stable-security; urgency=high * ooo-build/patches/src680/sw.rtf.prtdata.diff: fix RTF parser heap overflow (CVE-2007-0244) stable/main/binary-amd64/libmythes-dev_2.0.4.dfsg.2-7etch1_amd64.deb stable/main/binary-amd64/openoffice.org-officebean_2.0.4.dfsg.2-7etch1_amd64.deb stable/main/binary-amd64/openoffice.org-gtk_2.0.4.dfsg.2-7etch1_amd64.deb stable/main/binary-amd64/openoffice.org_2.0.4.dfsg.2-7etch1_amd64.deb stable/main/binary-amd64/openoffice.org-gnome_2.0.4.dfsg.2-7etch1_amd64.deb stable/main/binary-amd64/openoffice.org-base_2.0.4.dfsg.2-7etch1_amd64.deb stable/main/binary-amd64/python-uno_2.0.4.dfsg.2-7etch1_amd64.deb stable/main/binary-amd64/openoffice.org-dbg_2.0.4.dfsg.2-7etch1_amd64.deb stable/main/binary-amd64/openoffice.org-filter-so52_2.0.4.dfsg.2-7etch1_amd64.deb stable/main/binary-amd64/openoffice.org-qa-tools_2.0.4.dfsg.2-7etch1_amd64.deb stable/main/binary-amd64/openoffice.org-writer_2.0.4.dfsg.2-7etch1_amd64.deb stable/main/binary-amd64/openoffice.org-math_2.0.4.dfsg.2-7etch1_amd64.deb stable/main/binary-amd64/openoffice.org-gcj_2.0.4.dfsg.2-7etch1_amd64.deb stable/main/binary-amd64/openoffice.org-impress_2.0.4.dfsg.2-7etch1_amd64.deb stable/main/binary-amd64/openoffice.org-calc_2.0.4.dfsg.2-7etch1_amd64.deb stable/main/binary-amd64/openoffice.org-dev_2.0.4.dfsg.2-7etch1_amd64.deb stable/main/binary-amd64/openoffice.org-core_2.0.4.dfsg.2-7etch1_amd64.deb stable/main/binary-amd64/openoffice.org-kde_2.0.4.dfsg.2-7etch1_amd64.deb stable/main/binary-amd64/openoffice.org-draw_2.0.4.dfsg.2-7etch1_amd64.deb stable/main/binary-amd64/openoffice.org-evolution_2.0.4.dfsg.2-7etch1_amd64.deb stable/main/binary-amd64/openoffice.org-gtk-gnome_2.0.4.dfsg.2-7etch1_amd64.deb openoffice.org (2.0.4.dfsg.2-7etch1) stable-security; urgency=high * ooo-build/patches/src680/sw.rtf.prtdata.diff: fix RTF parser heap overflow (CVE-2007-0244) stable/main/binary-alpha/libmythes-dev_2.0.4.dfsg.2-7etch1_alpha.deb openoffice.org (2.0.4.dfsg.2-7etch1) stable-security; urgency=high * ooo-build/patches/src680/sw.rtf.prtdata.diff: fix RTF parser heap overflow (CVE-2007-0244) stable/main/binary-all/openoffice.org-l10n-or-in_2.0.4.dfsg.2-7etch1_all.deb stable/main/binary-all/openoffice.org-l10n-mk_2.0.4.dfsg.2-7etch1_all.deb stable/main/binary-all/openoffice.org-l10n-zh-tw_2.0.4.dfsg.2-7etch1_all.deb stable/main/binary-powerpc/openoffice.org-gtk_2.0.4.dfsg.2-7etch1_powerpc.deb stable/main/binary-all/openoffice.org-l10n-ja_2.0.4.dfsg.2-7etch1_all.deb stable/main/binary-all/openoffice.org-l10n-es_2.0.4.dfsg.2-7etch1_all.deb stable/main/binary-powerpc/openoffice.org-filter-so52_2.0.4.dfsg.2-7etch1_powerpc.deb stable/main/binary-powerpc/openoffice.org-kde_2.0.4.dfsg.2-7etch1_powerpc.deb stable/main/binary-sparc/openoffice.org-evolution_2.0.4.dfsg.2-7etch1_sparc.deb stable/main/binary-sparc/openoffice.org-kde_2.0.4.dfsg.2-7etch1_sparc.deb stable/main/binary-all/openoffice.org-filter-mobiledev_2.0.4.dfsg.2-7etch1_all.deb stable/main/binary-sparc/openoffice.org-impress_2.0.4.dfsg.2-7etch1_sparc.deb stable/main/binary-all/openoffice.org-l10n-bn_2.0.4.dfsg.2-7etch1_all.deb stable/main/binary-all/openoffice.org-l10n-it_2.0.4.dfsg.2-7etch1_all.deb stable/main/binary-powerpc/openoffice.org-dev_2.0.4.dfsg.2-7etch1_powerpc.deb stable/main/binary-sparc/openoffice.org-officebean_2.0.4.dfsg.2-7etch1_sparc.deb stable/main/binary-powerpc/openoffice.org-draw_2.0.4.dfsg.2-7etch1_powerpc.deb stable/main/binary-all/openoffice.org-l10n-ne_2.0.4.dfsg.2-7etch1_all.deb stable/main/binary-all/openoffice.org-l10n-ss_2.0.4.dfsg.2-7etch1_all.deb stable/main/binary-all/openoffice.org-help-zh-tw_2.0.4.dfsg.2-7etch1_all.deb stable/main/binary-all/openoffice.org-help-ko_2.0.4.dfsg.2-7etch1_all.deb stable/main/binary-powerpc/python-uno_2.0.4.dfsg.2-7etch1_powerpc.deb stable/main/binary-sparc/openoffice.org-dbg_2.0.4.dfsg.2-7etch1_sparc.deb stable/main/binary-powerpc/openoffice.org-dbg_2.0.4.dfsg.2-7etch1_powerpc.deb stable/main/binary-sparc/openoffice.org-filter-so52_2.0.4.dfsg.2-7etch1_sparc.deb stable/main/binary-powerpc/openoffice.org-calc_2.0.4.dfsg.2-7etch1_powerpc.deb stable/main/binary-powerpc/openoffice.org-base_2.0.4.dfsg.2-7etch1_powerpc.deb stable/main/binary-all/openoffice.org-l10n-sr-cs_2.0.4.dfsg.2-7etch1_all.deb stable/main/binary-all/openoffice.org-l10n-tr_2.0.4.dfsg.2-7etch1_all.deb stable/main/binary-powerpc/openoffice.org-evolution_2.0.4.dfsg.2-7etch1_powerpc.deb stable/main/binary-sparc/python-uno_2.0.4.dfsg.2-7etch1_sparc.deb stable/main/binary-all/openoffice.org-l10n-af_2.0.4.dfsg.2-7etch1_all.deb stable/main/binary-all/openoffice.org-common_2.0.4.dfsg.2-7etch1_all.deb stable/main/binary-all/openoffice.org-l10n-tg_2.0.4.dfsg.2-7etch1_all.deb stable/main/binary-all/openoffice.org-l10n-ru_2.0.4.dfsg.2-7etch1_all.deb stable/main/binary-sparc/libmythes-dev_2.0.4.dfsg.2-7etch1_sparc.deb stable/main/binary-all/openoffice.org-qa-api-tests_2.0.4.dfsg.2-7etch1_all.deb stable/main/binary-all/openoffice.org-l10n-fa_2.0.4.dfsg.2-7etch1_all.deb stable/main/binary-powerpc/openoffice.org-officebean_2.0.4.dfsg.2-7etch1_powerpc.deb stable/main/binary-all/openoffice.org-help-nl_2.0.4.dfsg.2-7etch1_all.deb stable/main/binary-all/openoffice.org-l10n-sl_2.0.4.dfsg.2-7etch1_all.deb stable/main/binary-all/openoffice.org-l10n-lt_2.0.4.dfsg.2-7etch1_all.deb stable/main/binary-all/openoffice.org-help-sl_2.0.4.dfsg.2-7etch1_all.deb stable/main/binary-sparc/openoffice.org-gcj_2.0.4.dfsg.2-7etch1_sparc.deb stable/main/binary-all/openoffice.org-l10n-ko_2.0.4.dfsg.2-7etch1_all.deb stable/main/binary-all/openoffice.org-l10n-hu_2.0.4.dfsg.2-7etch1_all.deb stable/main/binary-all/openoffice.org-help-hi-in_2.0.4.dfsg.2-7etch1_all.deb stable/main/binary-all/openoffice.org-help-en-gb_2.0.4.dfsg.2-7etch1_all.deb stable/main/binary-all/openoffice.org-help-fr_2.0.4.dfsg.2-7etch1_all.deb stable/main/binary-powerpc/openoffice.org-gtk-gnome_2.0.4.dfsg.2-7etch1_powerpc.deb stable/main/binary-all/openoffice.org-l10n-km_2.0.4.dfsg.2-7etch1_all.deb stable/main/binary-all/openoffice.org-l10n-ml-in_2.0.4.dfsg.2-7etch1_all.deb stable/main/binary-all/openoffice.org-help-it_2.0.4.dfsg.2-7etch1_all.deb stable/main/binary-all/openoffice.org-help-da_2.0.4.dfsg.2-7etch1_all.deb stable/main/binary-powerpc/openoffice.org-writer_2.0.4.dfsg.2-7etch1_powerpc.deb stable/main/binary-all/openoffice.org-l10n-ns_2.0.4.dfsg.2-7etch1_all.deb stable/main/binary-sparc/openoffice.org-gtk_2.0.4.dfsg.2-7etch1_sparc.deb stable/main/source/openoffice.org_2.0.4.dfsg.2-7etch1.dsc stable/main/binary-all/openoffice.org-l10n-pt_2.0.4.dfsg.2-7etch1_all.deb stable/main/binary-all/openoffice.org-l10n-hi-in_2.0.4.dfsg.2-7etch1_all.deb stable/main/binary-all/openoffice.org-l10n-el_2.0.4.dfsg.2-7etch1_all.deb stable/main/binary-powerpc/openoffice.org-math_2.0.4.dfsg.2-7etch1_powerpc.deb stable/main/binary-sparc/openoffice.org-core_2.0.4.dfsg.2-7etch1_sparc.deb stable/main/binary-all/openoffice.org-dtd-officedocument1.0_2.0.4.dfsg.2-7etch1_all.deb stable/main/binary-all/ttf-opensymbol_2.0.4.dfsg.2-7etch1_all.deb stable/main/binary-all/openoffice.org-l10n-in_2.0.4.dfsg.2-7etch1_all.deb stable/main/binary-all/openoffice.org-help-en_2.0.4.dfsg.2-7etch1_all.deb stable/main/binary-all/openoffice.org-l10n-st_2.0.4.dfsg.2-7etch1_all.deb stable/main/binary-all/openoffice.org-l10n-fi_2.0.4.dfsg.2-7etch1_all.deb stable/main/binary-sparc/openoffice.org-writer_2.0.4.dfsg.2-7etch1_sparc.deb stable/main/binary-all/openoffice.org-l10n-en-za_2.0.4.dfsg.2-7etch1_all.deb stable/main/binary-powerpc/openoffice.org-gcj_2.0.4.dfsg.2-7etch1_powerpc.deb stable/main/binary-powerpc/openoffice.org-qa-tools_2.0.4.dfsg.2-7etch1_powerpc.deb stable/main/binary-all/openoffice.org-l10n-rw_2.0.4.dfsg.2-7etch1_all.deb stable/main/binary-all/openoffice.org-l10n-zh-cn_2.0.4.dfsg.2-7etch1_all.deb stable/main/binary-sparc/openoffice.org-calc_2.0.4.dfsg.2-7etch1_sparc.deb stable/main/binary-powerpc/openoffice.org-gnome_2.0.4.dfsg.2-7etch1_powerpc.deb stable/main/binary-all/openoffice.org-l10n-gu-in_2.0.4.dfsg.2-7etch1_all.deb stable/main/binary-all/openoffice.org-l10n-uk_2.0.4.dfsg.2-7etch1_all.deb stable/main/binary-all/openoffice.org-l10n-br_2.0.4.dfsg.2-7etch1_all.deb stable/main/binary-all/openoffice.org-help-ja_2.0.4.dfsg.2-7etch1_all.deb stable/main/binary-all/openoffice.org-l10n-cs_2.0.4.dfsg.2-7etch1_all.deb stable/main/binary-all/openoffice.org-l10n-zu_2.0.4.dfsg.2-7etch1_all.deb stable/main/binary-sparc/openoffice.org-draw_2.0.4.dfsg.2-7etch1_sparc.deb stable/main/binary-all/openoffice.org-l10n-vi_2.0.4.dfsg.2-7etch1_all.deb stable/main/binary-all/openoffice.org-l10n-pa-in_2.0.4.dfsg.2-7etch1_all.deb stable/main/binary-sparc/openoffice.org-base_2.0.4.dfsg.2-7etch1_sparc.deb stable/main/binary-all/openoffice.org-l10n-za_2.0.4.dfsg.2-7etch1_all.deb stable/main/binary-all/openoffice.org-l10n-ca_2.0.4.dfsg.2-7etch1_all.deb stable/main/binary-all/openoffice.org-l10n-lv_2.0.4.dfsg.2-7etch1_all.deb stable/main/binary-all/openoffice.org-l10n-pt-br_2.0.4.dfsg.2-7etch1_all.deb stable/main/binary-all/openoffice.org-l10n-dz_2.0.4.dfsg.2-7etch1_all.deb stable/main/binary-sparc/openoffice.org-math_2.0.4.dfsg.2-7etch1_sparc.deb stable/main/binary-all/openoffice.org-help-et_2.0.4.dfsg.2-7etch1_all.deb stable/main/binary-all/openoffice.org-l10n-nl_2.0.4.dfsg.2-7etch1_all.deb stable/main/binary-sparc/openoffice.org_2.0.4.dfsg.2-7etch1_sparc.deb stable/main/binary-all/openoffice.org-l10n-sv_2.0.4.dfsg.2-7etch1_all.deb stable/main/binary-sparc/openoffice.org-gnome_2.0.4.dfsg.2-7etch1_sparc.deb stable/main/binary-all/openoffice.org-l10n-nb_2.0.4.dfsg.2-7etch1_all.deb stable/main/binary-sparc/openoffice.org-gtk-gnome_2.0.4.dfsg.2-7etch1_sparc.deb stable/main/source/openoffice.org_2.0.4.dfsg.2-7etch1.diff.gz stable/main/binary-all/openoffice.org-l10n-bg_2.0.4.dfsg.2-7etch1_all.deb stable/main/binary-all/openoffice.org-help-km_2.0.4.dfsg.2-7etch1_all.deb stable/main/binary-all/openoffice.org-l10n-sk_2.0.4.dfsg.2-7etch1_all.deb stable/main/binary-all/openoffice.org-l10n-fr_2.0.4.dfsg.2-7etch1_all.deb stable/main/binary-all/openoffice.org-help-en-us_2.0.4.dfsg.2-7etch1_all.deb stable/main/binary-all/openoffice.org-l10n-tn_2.0.4.dfsg.2-7etch1_all.deb stable/main/binary-powerpc/libmythes-dev_2.0.4.dfsg.2-7etch1_powerpc.deb stable/main/binary-all/openoffice.org-l10n-be-by_2.0.4.dfsg.2-7etch1_all.deb stable/main/binary-all/openoffice.org-help-zh-cn_2.0.4.dfsg.2-7etch1_all.deb stable/main/binary-all/openoffice.org-help-cs_2.0.4.dfsg.2-7etch1_all.deb stable/main/binary-all/openoffice.org-l10n-bs_2.0.4.dfsg.2-7etch1_all.deb stable/main/binary-powerpc/openoffice.org-impress_2.0.4.dfsg.2-7etch1_powerpc.deb stable/main/binary-sparc/openoffice.org-qa-tools_2.0.4.dfsg.2-7etch1_sparc.deb stable/main/binary-all/openoffice.org-dev-doc_2.0.4.dfsg.2-7etch1_all.deb stable/main/binary-all/openoffice.org-java-common_2.0.4.dfsg.2-7etch1_all.deb stable/main/binary-all/openoffice.org-l10n-da_2.0.4.dfsg.2-7etch1_all.deb stable/main/binary-all/openoffice.org-l10n-te-in_2.0.4.dfsg.2-7etch1_all.deb stable/main/binary-all/openoffice.org-l10n-nn_2.0.4.dfsg.2-7etch1_all.deb stable/main/binary-all/openoffice.org-l10n-cy_2.0.4.dfsg.2-7etch1_all.deb stable/main/binary-all/openoffice.org-l10n-ta-in_2.0.4.dfsg.2-7etch1_all.deb stable/main/binary-all/openoffice.org-l10n-en-gb_2.0.4.dfsg.2-7etch1_all.deb stable/main/binary-all/openoffice.org-l10n-ts_2.0.4.dfsg.2-7etch1_all.deb stable/main/binary-all/openoffice.org-l10n-ga_2.0.4.dfsg.2-7etch1_all.deb stable/main/binary-all/openoffice.org-l10n-he_2.0.4.dfsg.2-7etch1_all.deb stable/main/binary-all/openoffice.org-help-pt-br_2.0.4.dfsg.2-7etch1_all.deb stable/main/binary-all/openoffice.org-l10n-nr_2.0.4.dfsg.2-7etch1_all.deb stable/main/binary-all/openoffice.org-help-ru_2.0.4.dfsg.2-7etch1_all.deb stable/main/binary-all/openoffice.org-l10n-xh_2.0.4.dfsg.2-7etch1_all.deb stable/main/binary-all/openoffice.org-l10n-as-in_2.0.4.dfsg.2-7etch1_all.deb stable/main/binary-all/openoffice.org-l10n-lo_2.0.4.dfsg.2-7etch1_all.deb stable/main/binary-all/openoffice.org-help-hu_2.0.4.dfsg.2-7etch1_all.deb stable/main/binary-powerpc/openoffice.org_2.0.4.dfsg.2-7etch1_powerpc.deb stable/main/binary-all/openoffice.org-help-de_2.0.4.dfsg.2-7etch1_all.deb stable/main/binary-all/openoffice.org-l10n-th_2.0.4.dfsg.2-7etch1_all.deb stable/main/binary-all/openoffice.org-l10n-de_2.0.4.dfsg.2-7etch1_all.deb stable/main/binary-powerpc/openoffice.org-core_2.0.4.dfsg.2-7etch1_powerpc.deb stable/main/binary-all/openoffice.org-l10n-ve_2.0.4.dfsg.2-7etch1_all.deb stable/main/binary-all/openoffice.org-help-pl_2.0.4.dfsg.2-7etch1_all.deb stable/main/binary-all/openoffice.org-l10n-eo_2.0.4.dfsg.2-7etch1_all.deb stable/main/binary-all/openoffice.org-l10n-hr_2.0.4.dfsg.2-7etch1_all.deb stable/main/binary-all/openoffice.org-help-dz_2.0.4.dfsg.2-7etch1_all.deb stable/main/binary-all/openoffice.org-l10n-hi_2.0.4.dfsg.2-7etch1_all.deb stable/main/binary-all/openoffice.org-l10n-ku_2.0.4.dfsg.2-7etch1_all.deb stable/main/binary-sparc/openoffice.org-dev_2.0.4.dfsg.2-7etch1_sparc.deb stable/main/binary-all/broffice.org_2.0.4.dfsg.2-7etch1_all.deb stable/main/binary-all/openoffice.org-l10n-pl_2.0.4.dfsg.2-7etch1_all.deb stable/main/binary-all/openoffice.org-help-sv_2.0.4.dfsg.2-7etch1_all.deb stable/main/binary-all/openoffice.org-help-es_2.0.4.dfsg.2-7etch1_all.deb stable/main/binary-all/openoffice.org-l10n-et_2.0.4.dfsg.2-7etch1_all.deb stable/main/binary-all/openoffice.org-l10n-ka_2.0.4.dfsg.2-7etch1_all.deb openoffice.org (2.0.4.dfsg.2-7etch1) stable-security; urgency=high * ooo-build/patches/src680/sw.rtf.prtdata.diff: fix RTF parser heap overflow (CVE-2007-0244) stable/main/binary-sparc/open-iscsi_2.0.730-1etch1_sparc.deb open-iscsi (2.0.730-1etch1) stable-security; urgency=high * Fixed local and remote DoS vulnerabilities - CVE-2007-3100 - CVE-2007-3099 stable/main/binary-s390/open-iscsi_2.0.730-1etch1_s390.deb open-iscsi (2.0.730-1etch1) stable-security; urgency=high * Fixed local and remote DoS vulnerabilities - CVE-2007-3100 - CVE-2007-3099 stable/main/binary-powerpc/open-iscsi_2.0.730-1etch1_powerpc.deb open-iscsi (2.0.730-1etch1) stable-security; urgency=high * Fixed local and remote DoS vulnerabilities - CVE-2007-3100 - CVE-2007-3099 stable/main/binary-mipsel/open-iscsi_2.0.730-1etch1_mipsel.deb open-iscsi (2.0.730-1etch1) stable-security; urgency=high * Fixed local and remote DoS vulnerabilities - CVE-2007-3100 - CVE-2007-3099 stable/main/binary-mips/open-iscsi_2.0.730-1etch1_mips.deb open-iscsi (2.0.730-1etch1) stable-security; urgency=high * Fixed local and remote DoS vulnerabilities - CVE-2007-3100 - CVE-2007-3099 stable/main/binary-ia64/open-iscsi_2.0.730-1etch1_ia64.deb open-iscsi (2.0.730-1etch1) stable-security; urgency=high * Fixed local and remote DoS vulnerabilities - CVE-2007-3100 - CVE-2007-3099 stable/main/binary-hppa/open-iscsi_2.0.730-1etch1_hppa.deb open-iscsi (2.0.730-1etch1) stable-security; urgency=high * Fixed local and remote DoS vulnerabilities - CVE-2007-3100 - CVE-2007-3099 stable/main/binary-arm/open-iscsi_2.0.730-1etch1_arm.deb open-iscsi (2.0.730-1etch1) stable-security; urgency=high * Fixed local and remote DoS vulnerabilities - CVE-2007-3100 - CVE-2007-3099 stable/main/binary-amd64/open-iscsi_2.0.730-1etch1_amd64.deb open-iscsi (2.0.730-1etch1) stable-security; urgency=high * Fixed local and remote DoS vulnerabilities - CVE-2007-3100 - CVE-2007-3099 stable/main/binary-alpha/open-iscsi_2.0.730-1etch1_alpha.deb open-iscsi (2.0.730-1etch1) stable-security; urgency=high * Fixed local and remote DoS vulnerabilities - CVE-2007-3100 - CVE-2007-3099 stable/main/binary-i386/open-iscsi_2.0.730-1etch1_i386.deb stable/main/source/open-iscsi_2.0.730-1etch1.dsc stable/main/source/open-iscsi_2.0.730-1etch1.diff.gz open-iscsi (2.0.730-1etch1) stable-security; urgency=high * Fixed local and remote DoS vulnerabilities - CVE-2007-3100 - CVE-2007-3099 stable/main/binary-s390/opencubicplayer_0.1.11-1_s390.deb ocp (1:0.1.11-1) unstable; urgency=low * New upstream version. stable/non-free/source/nvidia-graphics-modules-i386_1.0.8776+6etch1.dsc stable/non-free/binary-i386/nvidia-kernel-2.6.18-5-686_1.0.8776+6etch1_i386.deb stable/non-free/binary-i386/nvidia-kernel-2.6.18-5-486_1.0.8776+6etch1_i386.deb stable/non-free/binary-i386/nvidia-kernel-2.6-686_1.0.8776+6etch1_i386.deb stable/non-free/source/nvidia-graphics-modules-i386_1.0.8776+6etch1.tar.gz stable/non-free/binary-i386/nvidia-kernel-2.6-486_1.0.8776+6etch1_i386.deb stable/non-free/binary-i386/nvidia-kernel-2.6-k7_1.0.8776+6etch1_i386.deb stable/non-free/binary-i386/nvidia-kernel-2.6.18-5-k7_1.0.8776+6etch1_i386.deb nvidia-graphics-modules-i386 (1.0.8776+6etch1) stable; urgency=low * build 2.6.18-5 * Fix FTBFS bug that resulted from an unnecessary unpacking of the legacy modules tarball. stable/non-free/binary-amd64/nvidia-kernel-2.6-amd64_1.0.8776+6etch1_amd64.deb stable/non-free/source/nvidia-graphics-modules-amd64_1.0.8776+6etch1.tar.gz stable/non-free/source/nvidia-graphics-modules-amd64_1.0.8776+6etch1.dsc stable/non-free/binary-amd64/nvidia-kernel-2.6.18-5-amd64_1.0.8776+6etch1_amd64.deb nvidia-graphics-modules-amd64 (1.0.8776+6etch1) stable; urgency=low * build 2.6.18-5 stable/non-free/binary-i386/nvidia-kernel-legacy-2.6-486_1.0.7184+6etch1_i386.deb stable/non-free/binary-i386/nvidia-kernel-legacy-2.6-k7_1.0.7184+6etch1_i386.deb stable/non-free/binary-i386/nvidia-kernel-legacy-2.6.18-5-k7_1.0.7184+6etch1_i386.deb stable/non-free/binary-i386/nvidia-kernel-legacy-2.6-686_1.0.7184+6etch1_i386.deb stable/non-free/binary-i386/nvidia-kernel-legacy-2.6.18-5-686_1.0.7184+6etch1_i386.deb stable/non-free/source/nvidia-graphics-legacy-modules-i386_1.0.7184+6etch1.tar.gz stable/non-free/source/nvidia-graphics-legacy-modules-i386_1.0.7184+6etch1.dsc stable/non-free/binary-i386/nvidia-kernel-legacy-2.6.18-5-486_1.0.7184+6etch1_i386.deb nvidia-graphics-legacy-modules-i386 (1.0.7184+6etch1) stable; urgency=low * build for 2.6.18-5 stable/non-free/source/nvidia-graphics-legacy-modules-amd64_1.0.7184+6etch1.tar.gz stable/non-free/source/nvidia-graphics-legacy-modules-amd64_1.0.7184+6etch1.dsc stable/non-free/binary-amd64/nvidia-kernel-legacy-2.6.18-5-amd64_1.0.7184+6etch1_amd64.deb stable/non-free/binary-amd64/nvidia-kernel-legacy-2.6-amd64_1.0.7184+6etch1_amd64.deb nvidia-graphics-legacy-modules-amd64 (1.0.7184+6etch1) stable; urgency=low * build for 2.6.18-5 stable/main/binary-sparc/nfs-common_1.0.10-6+etch.1_sparc.deb stable/main/binary-sparc/nfs-kernel-server_1.0.10-6+etch.1_sparc.deb stable/main/binary-sparc/nhfsstone_1.0.10-6+etch.1_sparc.deb nfs-utils (1:1.0.10-6+etch.1) stable; urgency=medium * Backport two memory leak fixes from unstable that together could bring down a busy rpc.mountd quite fast. (Closes: #423108) * In add_name(), free() the old pointer in all code branches. The old code did it only when the malloc() failed, which was an oversight. * In client_compose(), free() the hostent structure returned before exiting. Normally, gethostbyaddr() returns a pointer to a static struct, but this hostent comes from either get_reliable_hostbyaddr() or get_hostent(), both which return a pointer they privately xmalloc()ed, which thus can and should be free()d. stable/main/binary-s390/nfs-kernel-server_1.0.10-6+etch.1_s390.deb stable/main/binary-s390/nhfsstone_1.0.10-6+etch.1_s390.deb stable/main/binary-s390/nfs-common_1.0.10-6+etch.1_s390.deb nfs-utils (1:1.0.10-6+etch.1) stable; urgency=medium * Backport two memory leak fixes from unstable that together could bring down a busy rpc.mountd quite fast. (Closes: #423108) * In add_name(), free() the old pointer in all code branches. The old code did it only when the malloc() failed, which was an oversight. * In client_compose(), free() the hostent structure returned before exiting. Normally, gethostbyaddr() returns a pointer to a static struct, but this hostent comes from either get_reliable_hostbyaddr() or get_hostent(), both which return a pointer they privately xmalloc()ed, which thus can and should be free()d. stable/main/binary-powerpc/nhfsstone_1.0.10-6+etch.1_powerpc.deb stable/main/binary-powerpc/nfs-common_1.0.10-6+etch.1_powerpc.deb stable/main/binary-powerpc/nfs-kernel-server_1.0.10-6+etch.1_powerpc.deb nfs-utils (1:1.0.10-6+etch.1) stable; urgency=medium * Backport two memory leak fixes from unstable that together could bring down a busy rpc.mountd quite fast. (Closes: #423108) * In add_name(), free() the old pointer in all code branches. The old code did it only when the malloc() failed, which was an oversight. * In client_compose(), free() the hostent structure returned before exiting. Normally, gethostbyaddr() returns a pointer to a static struct, but this hostent comes from either get_reliable_hostbyaddr() or get_hostent(), both which return a pointer they privately xmalloc()ed, which thus can and should be free()d. stable/main/binary-mipsel/nfs-kernel-server_1.0.10-6+etch.1_mipsel.deb stable/main/binary-mipsel/nfs-common_1.0.10-6+etch.1_mipsel.deb stable/main/binary-mipsel/nhfsstone_1.0.10-6+etch.1_mipsel.deb nfs-utils (1:1.0.10-6+etch.1) stable; urgency=medium * Backport two memory leak fixes from unstable that together could bring down a busy rpc.mountd quite fast. (Closes: #423108) * In add_name(), free() the old pointer in all code branches. The old code did it only when the malloc() failed, which was an oversight. * In client_compose(), free() the hostent structure returned before exiting. Normally, gethostbyaddr() returns a pointer to a static struct, but this hostent comes from either get_reliable_hostbyaddr() or get_hostent(), both which return a pointer they privately xmalloc()ed, which thus can and should be free()d. stable/main/binary-mips/nfs-common_1.0.10-6+etch.1_mips.deb stable/main/binary-mips/nfs-kernel-server_1.0.10-6+etch.1_mips.deb stable/main/binary-mips/nhfsstone_1.0.10-6+etch.1_mips.deb nfs-utils (1:1.0.10-6+etch.1) stable; urgency=medium * Backport two memory leak fixes from unstable that together could bring down a busy rpc.mountd quite fast. (Closes: #423108) * In add_name(), free() the old pointer in all code branches. The old code did it only when the malloc() failed, which was an oversight. * In client_compose(), free() the hostent structure returned before exiting. Normally, gethostbyaddr() returns a pointer to a static struct, but this hostent comes from either get_reliable_hostbyaddr() or get_hostent(), both which return a pointer they privately xmalloc()ed, which thus can and should be free()d. stable/main/binary-ia64/nhfsstone_1.0.10-6+etch.1_ia64.deb stable/main/binary-ia64/nfs-common_1.0.10-6+etch.1_ia64.deb stable/main/binary-ia64/nfs-kernel-server_1.0.10-6+etch.1_ia64.deb nfs-utils (1:1.0.10-6+etch.1) stable; urgency=medium * Backport two memory leak fixes from unstable that together could bring down a busy rpc.mountd quite fast. (Closes: #423108) * In add_name(), free() the old pointer in all code branches. The old code did it only when the malloc() failed, which was an oversight. * In client_compose(), free() the hostent structure returned before exiting. Normally, gethostbyaddr() returns a pointer to a static struct, but this hostent comes from either get_reliable_hostbyaddr() or get_hostent(), both which return a pointer they privately xmalloc()ed, which thus can and should be free()d. stable/main/binary-hppa/nfs-kernel-server_1.0.10-6+etch.1_hppa.deb stable/main/binary-hppa/nfs-common_1.0.10-6+etch.1_hppa.deb stable/main/binary-hppa/nhfsstone_1.0.10-6+etch.1_hppa.deb nfs-utils (1:1.0.10-6+etch.1) stable; urgency=medium * Backport two memory leak fixes from unstable that together could bring down a busy rpc.mountd quite fast. (Closes: #423108) * In add_name(), free() the old pointer in all code branches. The old code did it only when the malloc() failed, which was an oversight. * In client_compose(), free() the hostent structure returned before exiting. Normally, gethostbyaddr() returns a pointer to a static struct, but this hostent comes from either get_reliable_hostbyaddr() or get_hostent(), both which return a pointer they privately xmalloc()ed, which thus can and should be free()d. stable/main/binary-arm/nfs-kernel-server_1.0.10-6+etch.1_arm.deb stable/main/binary-arm/nfs-common_1.0.10-6+etch.1_arm.deb stable/main/binary-arm/nhfsstone_1.0.10-6+etch.1_arm.deb nfs-utils (1:1.0.10-6+etch.1) stable; urgency=medium * Backport two memory leak fixes from unstable that together could bring down a busy rpc.mountd quite fast. (Closes: #423108) * In add_name(), free() the old pointer in all code branches. The old code did it only when the malloc() failed, which was an oversight. * In client_compose(), free() the hostent structure returned before exiting. Normally, gethostbyaddr() returns a pointer to a static struct, but this hostent comes from either get_reliable_hostbyaddr() or get_hostent(), both which return a pointer they privately xmalloc()ed, which thus can and should be free()d. stable/main/binary-amd64/nfs-kernel-server_1.0.10-6+etch.1_amd64.deb stable/main/binary-amd64/nfs-common_1.0.10-6+etch.1_amd64.deb stable/main/binary-amd64/nhfsstone_1.0.10-6+etch.1_amd64.deb nfs-utils (1:1.0.10-6+etch.1) stable; urgency=medium * Backport two memory leak fixes from unstable that together could bring down a busy rpc.mountd quite fast. (Closes: #423108) * In add_name(), free() the old pointer in all code branches. The old code did it only when the malloc() failed, which was an oversight. * In client_compose(), free() the hostent structure returned before exiting. Normally, gethostbyaddr() returns a pointer to a static struct, but this hostent comes from either get_reliable_hostbyaddr() or get_hostent(), both which return a pointer they privately xmalloc()ed, which thus can and should be free()d. stable/main/binary-alpha/nfs-kernel-server_1.0.10-6+etch.1_alpha.deb stable/main/binary-alpha/nfs-common_1.0.10-6+etch.1_alpha.deb stable/main/binary-alpha/nhfsstone_1.0.10-6+etch.1_alpha.deb nfs-utils (1:1.0.10-6+etch.1) stable; urgency=medium * Backport two memory leak fixes from unstable that together could bring down a busy rpc.mountd quite fast. (Closes: #423108) * In add_name(), free() the old pointer in all code branches. The old code did it only when the malloc() failed, which was an oversight. * In client_compose(), free() the hostent structure returned before exiting. Normally, gethostbyaddr() returns a pointer to a static struct, but this hostent comes from either get_reliable_hostbyaddr() or get_hostent(), both which return a pointer they privately xmalloc()ed, which thus can and should be free()d. stable/main/source/nfs-utils_1.0.10-6+etch.1.diff.gz stable/main/binary-i386/nfs-kernel-server_1.0.10-6+etch.1_i386.deb stable/main/binary-i386/nfs-common_1.0.10-6+etch.1_i386.deb stable/main/binary-i386/nhfsstone_1.0.10-6+etch.1_i386.deb stable/main/source/nfs-utils_1.0.10-6+etch.1.dsc nfs-utils (1:1.0.10-6+etch.1) stable; urgency=medium * Backport two memory leak fixes from unstable that together could bring down a busy rpc.mountd quite fast. (Closes: #423108) * In add_name(), free() the old pointer in all code branches. The old code did it only when the malloc() failed, which was an oversight. * In client_compose(), free() the hostent structure returned before exiting. Normally, gethostbyaddr() returns a pointer to a static struct, but this hostent comes from either get_reliable_hostbyaddr() or get_hostent(), both which return a pointer they privately xmalloc()ed, which thus can and should be free()d. stable/main/binary-sparc/libneon26-gnutls-dbg_0.26.2-4_sparc.deb stable/main/binary-sparc/libneon26-dev_0.26.2-4_sparc.deb stable/main/binary-sparc/libneon26-gnutls-dev_0.26.2-4_sparc.deb stable/main/binary-sparc/libneon26-dbg_0.26.2-4_sparc.deb stable/main/binary-sparc/libneon26-gnutls_0.26.2-4_sparc.deb stable/main/binary-sparc/libneon26_0.26.2-4_sparc.deb neon26 (0.26.2-4) stable; urgency=low * Fix Kerberos authentication (closes: #413194). stable/main/binary-s390/libneon26-gnutls-dev_0.26.2-4_s390.deb stable/main/binary-s390/libneon26-dev_0.26.2-4_s390.deb stable/main/binary-s390/libneon26-gnutls_0.26.2-4_s390.deb stable/main/binary-s390/libneon26_0.26.2-4_s390.deb stable/main/binary-s390/libneon26-gnutls-dbg_0.26.2-4_s390.deb stable/main/binary-s390/libneon26-dbg_0.26.2-4_s390.deb neon26 (0.26.2-4) stable; urgency=low * Fix Kerberos authentication (closes: #413194). stable/main/binary-powerpc/libneon26-gnutls-dbg_0.26.2-4_powerpc.deb stable/main/binary-powerpc/libneon26-dbg_0.26.2-4_powerpc.deb stable/main/binary-powerpc/libneon26-gnutls-dev_0.26.2-4_powerpc.deb stable/main/binary-powerpc/libneon26_0.26.2-4_powerpc.deb stable/main/binary-powerpc/libneon26-gnutls_0.26.2-4_powerpc.deb stable/main/binary-powerpc/libneon26-dev_0.26.2-4_powerpc.deb neon26 (0.26.2-4) stable; urgency=low * Fix Kerberos authentication (closes: #413194). stable/main/binary-mipsel/libneon26_0.26.2-4_mipsel.deb stable/main/binary-mipsel/libneon26-gnutls_0.26.2-4_mipsel.deb stable/main/binary-mipsel/libneon26-dbg_0.26.2-4_mipsel.deb stable/main/binary-mipsel/libneon26-gnutls-dbg_0.26.2-4_mipsel.deb stable/main/binary-mipsel/libneon26-dev_0.26.2-4_mipsel.deb stable/main/binary-mipsel/libneon26-gnutls-dev_0.26.2-4_mipsel.deb neon26 (0.26.2-4) stable; urgency=low * Fix Kerberos authentication (closes: #413194). stable/main/binary-mips/libneon26-gnutls-dbg_0.26.2-4_mips.deb stable/main/binary-mips/libneon26-dbg_0.26.2-4_mips.deb stable/main/binary-mips/libneon26-gnutls_0.26.2-4_mips.deb stable/main/binary-mips/libneon26_0.26.2-4_mips.deb stable/main/binary-mips/libneon26-gnutls-dev_0.26.2-4_mips.deb stable/main/binary-mips/libneon26-dev_0.26.2-4_mips.deb neon26 (0.26.2-4) stable; urgency=low * Fix Kerberos authentication (closes: #413194). stable/main/binary-ia64/libneon26-dbg_0.26.2-4_ia64.deb stable/main/binary-ia64/libneon26-gnutls-dbg_0.26.2-4_ia64.deb stable/main/binary-ia64/libneon26_0.26.2-4_ia64.deb stable/main/binary-ia64/libneon26-gnutls_0.26.2-4_ia64.deb stable/main/binary-ia64/libneon26-dev_0.26.2-4_ia64.deb stable/main/binary-ia64/libneon26-gnutls-dev_0.26.2-4_ia64.deb neon26 (0.26.2-4) stable; urgency=low * Fix Kerberos authentication (closes: #413194). stable/main/binary-hppa/libneon26-gnutls_0.26.2-4_hppa.deb stable/main/binary-hppa/libneon26_0.26.2-4_hppa.deb stable/main/binary-hppa/libneon26-gnutls-dev_0.26.2-4_hppa.deb stable/main/binary-hppa/libneon26-dev_0.26.2-4_hppa.deb stable/main/binary-hppa/libneon26-gnutls-dbg_0.26.2-4_hppa.deb stable/main/binary-hppa/libneon26-dbg_0.26.2-4_hppa.deb neon26 (0.26.2-4) stable; urgency=low * Fix Kerberos authentication (closes: #413194). stable/main/binary-arm/libneon26-gnutls_0.26.2-4_arm.deb stable/main/binary-arm/libneon26-dev_0.26.2-4_arm.deb stable/main/binary-arm/libneon26-gnutls-dev_0.26.2-4_arm.deb stable/main/binary-arm/libneon26_0.26.2-4_arm.deb stable/main/binary-arm/libneon26-dbg_0.26.2-4_arm.deb stable/main/binary-arm/libneon26-gnutls-dbg_0.26.2-4_arm.deb neon26 (0.26.2-4) stable; urgency=low * Fix Kerberos authentication (closes: #413194). stable/main/binary-amd64/libneon26-dev_0.26.2-4_amd64.deb stable/main/binary-amd64/libneon26-dbg_0.26.2-4_amd64.deb stable/main/binary-amd64/libneon26-gnutls_0.26.2-4_amd64.deb stable/main/binary-amd64/libneon26-gnutls-dbg_0.26.2-4_amd64.deb stable/main/binary-amd64/libneon26-gnutls-dev_0.26.2-4_amd64.deb stable/main/binary-amd64/libneon26_0.26.2-4_amd64.deb neon26 (0.26.2-4) stable; urgency=low * Fix Kerberos authentication (closes: #413194). stable/main/binary-alpha/libneon26_0.26.2-4_alpha.deb stable/main/binary-alpha/libneon26-gnutls_0.26.2-4_alpha.deb stable/main/binary-alpha/libneon26-dbg_0.26.2-4_alpha.deb stable/main/binary-alpha/libneon26-gnutls-dev_0.26.2-4_alpha.deb stable/main/binary-alpha/libneon26-dev_0.26.2-4_alpha.deb stable/main/binary-alpha/libneon26-gnutls-dbg_0.26.2-4_alpha.deb neon26 (0.26.2-4) stable; urgency=low * Fix Kerberos authentication (closes: #413194). stable/main/binary-i386/libneon26-gnutls-dev_0.26.2-4_i386.deb stable/main/binary-i386/libneon26-gnutls_0.26.2-4_i386.deb stable/main/binary-i386/libneon26-dbg_0.26.2-4_i386.deb stable/main/binary-i386/libneon26-gnutls-dbg_0.26.2-4_i386.deb stable/main/binary-i386/libneon26-dev_0.26.2-4_i386.deb stable/main/source/neon26_0.26.2-4.dsc stable/main/source/neon26_0.26.2-4.diff.gz stable/main/binary-i386/libneon26_0.26.2-4_i386.deb neon26 (0.26.2-4) stable; urgency=low * Fix Kerberos authentication (closes: #413194). stable/main/binary-sparc/nano-tiny_2.0.2-1etch1_sparc.deb stable/main/binary-sparc/nano-udeb_2.0.2-1etch1_sparc.udeb stable/main/binary-sparc/nano_2.0.2-1etch1_sparc.deb nano (2.0.2-1etch1) stable; urgency=low * The "Subestació de Patraix fora!" release. * Apply several important fixes from the 2.0 CVS branch: - 01_CVS_filebugs.dpatch: fixes several file-handling related bugs, including a segfault, when working with filenames starting with "~", and the lack of warning when overwriting a file (closes: #419353). From CVS; provided by David Lawrence Ramsey. - 02_CVS_justify_segfault.dpatch: fixes a segfault in the justify code when marking/cutting text. From CVS; provided by David Lawrence Ramsey. stable/main/binary-s390/nano-tiny_2.0.2-1etch1_s390.deb stable/main/binary-s390/nano_2.0.2-1etch1_s390.deb stable/main/binary-s390/nano-udeb_2.0.2-1etch1_s390.udeb nano (2.0.2-1etch1) stable; urgency=low * The "Subestació de Patraix fora!" release. * Apply several important fixes from the 2.0 CVS branch: - 01_CVS_filebugs.dpatch: fixes several file-handling related bugs, including a segfault, when working with filenames starting with "~", and the lack of warning when overwriting a file (closes: #419353). From CVS; provided by David Lawrence Ramsey. - 02_CVS_justify_segfault.dpatch: fixes a segfault in the justify code when marking/cutting text. From CVS; provided by David Lawrence Ramsey. stable/main/binary-powerpc/nano-tiny_2.0.2-1etch1_powerpc.deb stable/main/binary-powerpc/nano-udeb_2.0.2-1etch1_powerpc.udeb stable/main/binary-powerpc/nano_2.0.2-1etch1_powerpc.deb nano (2.0.2-1etch1) stable; urgency=low * The "SubestaciC3 de Patraix fora!" release. * Apply several important fixes from the 2.0 CVS branch: - 01_CVS_filebugs.dpatch: fixes several file-handling related bugs, including a segfault, when working with filenames starting with "~", and the lack of warning when overwriting a file (closes: #419353). From CVS; provided by David Lawrence Ramsey. - 02_CVS_justify_segfault.dpatch: fixes a segfault in the justify code when marking/cutting text. From CVS; provided by David Lawrence Ramsey. stable/main/binary-mipsel/nano-udeb_2.0.2-1etch1_mipsel.udeb stable/main/binary-mipsel/nano_2.0.2-1etch1_mipsel.deb stable/main/binary-mipsel/nano-tiny_2.0.2-1etch1_mipsel.deb nano (2.0.2-1etch1) stable; urgency=low * The "SubestaciC3 de Patraix fora!" release. * Apply several important fixes from the 2.0 CVS branch: - 01_CVS_filebugs.dpatch: fixes several file-handling related bugs, including a segfault, when working with filenames starting with "~", and the lack of warning when overwriting a file (closes: #419353). From CVS; provided by David Lawrence Ramsey. - 02_CVS_justify_segfault.dpatch: fixes a segfault in the justify code when marking/cutting text. From CVS; provided by David Lawrence Ramsey. stable/main/binary-mips/nano-tiny_2.0.2-1etch1_mips.deb stable/main/binary-mips/nano-udeb_2.0.2-1etch1_mips.udeb stable/main/binary-mips/nano_2.0.2-1etch1_mips.deb nano (2.0.2-1etch1) stable; urgency=low * The "SubestaciC3 de Patraix fora!" release. * Apply several important fixes from the 2.0 CVS branch: - 01_CVS_filebugs.dpatch: fixes several file-handling related bugs, including a segfault, when working with filenames starting with "~", and the lack of warning when overwriting a file (closes: #419353). From CVS; provided by David Lawrence Ramsey. - 02_CVS_justify_segfault.dpatch: fixes a segfault in the justify code when marking/cutting text. From CVS; provided by David Lawrence Ramsey. stable/main/binary-ia64/nano-tiny_2.0.2-1etch1_ia64.deb stable/main/binary-ia64/nano-udeb_2.0.2-1etch1_ia64.udeb stable/main/binary-ia64/nano_2.0.2-1etch1_ia64.deb nano (2.0.2-1etch1) stable; urgency=low * The "SubestaciC3 de Patraix fora!" release. * Apply several important fixes from the 2.0 CVS branch: - 01_CVS_filebugs.dpatch: fixes several file-handling related bugs, including a segfault, when working with filenames starting with "~", and the lack of warning when overwriting a file (closes: #419353). From CVS; provided by David Lawrence Ramsey. - 02_CVS_justify_segfault.dpatch: fixes a segfault in the justify code when marking/cutting text. From CVS; provided by David Lawrence Ramsey. stable/main/binary-hppa/nano_2.0.2-1etch1_hppa.deb stable/main/binary-hppa/nano-tiny_2.0.2-1etch1_hppa.deb stable/main/binary-hppa/nano-udeb_2.0.2-1etch1_hppa.udeb nano (2.0.2-1etch1) stable; urgency=low * The "SubestaciC3 de Patraix fora!" release. * Apply several important fixes from the 2.0 CVS branch: - 01_CVS_filebugs.dpatch: fixes several file-handling related bugs, including a segfault, when working with filenames starting with "~", and the lack of warning when overwriting a file (closes: #419353). From CVS; provided by David Lawrence Ramsey. - 02_CVS_justify_segfault.dpatch: fixes a segfault in the justify code when marking/cutting text. From CVS; provided by David Lawrence Ramsey. stable/main/binary-arm/nano_2.0.2-1etch1_arm.deb stable/main/binary-arm/nano-udeb_2.0.2-1etch1_arm.udeb stable/main/binary-arm/nano-tiny_2.0.2-1etch1_arm.deb nano (2.0.2-1etch1) stable; urgency=low * The "Subestació de Patraix fora!" release. * Apply several important fixes from the 2.0 CVS branch: - 01_CVS_filebugs.dpatch: fixes several file-handling related bugs, including a segfault, when working with filenames starting with "~", and the lack of warning when overwriting a file (closes: #419353). From CVS; provided by David Lawrence Ramsey. - 02_CVS_justify_segfault.dpatch: fixes a segfault in the justify code when marking/cutting text. From CVS; provided by David Lawrence Ramsey. stable/main/binary-amd64/nano-tiny_2.0.2-1etch1_amd64.deb stable/main/binary-amd64/nano_2.0.2-1etch1_amd64.deb stable/main/binary-amd64/nano-udeb_2.0.2-1etch1_amd64.udeb nano (2.0.2-1etch1) stable; urgency=low * The "SubestaciC3 de Patraix fora!" release. * Apply several important fixes from the 2.0 CVS branch: - 01_CVS_filebugs.dpatch: fixes several file-handling related bugs, including a segfault, when working with filenames starting with "~", and the lack of warning when overwriting a file (closes: #419353). From CVS; provided by David Lawrence Ramsey. - 02_CVS_justify_segfault.dpatch: fixes a segfault in the justify code when marking/cutting text. From CVS; provided by David Lawrence Ramsey. stable/main/binary-alpha/nano_2.0.2-1etch1_alpha.deb stable/main/binary-alpha/nano-udeb_2.0.2-1etch1_alpha.udeb stable/main/binary-alpha/nano-tiny_2.0.2-1etch1_alpha.deb nano (2.0.2-1etch1) stable; urgency=low * The "SubestaciC3 de Patraix fora!" release. * Apply several important fixes from the 2.0 CVS branch: - 01_CVS_filebugs.dpatch: fixes several file-handling related bugs, including a segfault, when working with filenames starting with "~", and the lack of warning when overwriting a file (closes: #419353). From CVS; provided by David Lawrence Ramsey. - 02_CVS_justify_segfault.dpatch: fixes a segfault in the justify code when marking/cutting text. From CVS; provided by David Lawrence Ramsey. stable/main/binary-i386/nano_2.0.2-1etch1_i386.deb stable/main/source/nano_2.0.2-1etch1.dsc stable/main/binary-i386/nano-tiny_2.0.2-1etch1_i386.deb stable/main/binary-i386/nano-udeb_2.0.2-1etch1_i386.udeb stable/main/source/nano_2.0.2-1etch1.diff.gz nano (2.0.2-1etch1) stable; urgency=low * The "Subestació de Patraix fora!" release. * Apply several important fixes from the 2.0 CVS branch: - 01_CVS_filebugs.dpatch: fixes several file-handling related bugs, including a segfault, when working with filenames starting with "~", and the lack of warning when overwriting a file (closes: #419353). From CVS; provided by David Lawrence Ramsey. - 02_CVS_justify_segfault.dpatch: fixes a segfault in the justify code when marking/cutting text. From CVS; provided by David Lawrence Ramsey. stable/main/binary-sparc/mutt_1.5.13-1.1etch1_sparc.deb mutt (1.5.13-1.1etch1) stable; urgency=low * Stable update. * Grab patch from upstream: Add imap_close_connection to fully reset IMAP state (Closes: #413715). * Add myself to Uploaders, thanks Dato. stable/main/binary-s390/mutt_1.5.13-1.1etch1_s390.deb mutt (1.5.13-1.1etch1) stable; urgency=low * Stable update. * Grab patch from upstream: Add imap_close_connection to fully reset IMAP state (Closes: #413715). * Add myself to Uploaders, thanks Dato. stable/main/binary-powerpc/mutt_1.5.13-1.1etch1_powerpc.deb mutt (1.5.13-1.1etch1) stable; urgency=low * Stable update. * Grab patch from upstream: Add imap_close_connection to fully reset IMAP state (Closes: #413715). * Add myself to Uploaders, thanks Dato. stable/main/binary-mipsel/mutt_1.5.13-1.1etch1_mipsel.deb mutt (1.5.13-1.1etch1) stable; urgency=low * Stable update. * Grab patch from upstream: Add imap_close_connection to fully reset IMAP state (Closes: #413715). * Add myself to Uploaders, thanks Dato. stable/main/binary-mips/mutt_1.5.13-1.1etch1_mips.deb mutt (1.5.13-1.1etch1) stable; urgency=low * Stable update. * Grab patch from upstream: Add imap_close_connection to fully reset IMAP state (Closes: #413715). * Add myself to Uploaders, thanks Dato. stable/main/binary-ia64/mutt_1.5.13-1.1etch1_ia64.deb mutt (1.5.13-1.1etch1) stable; urgency=low * Stable update. * Grab patch from upstream: Add imap_close_connection to fully reset IMAP state (Closes: #413715). * Add myself to Uploaders, thanks Dato. stable/main/binary-hppa/mutt_1.5.13-1.1etch1_hppa.deb mutt (1.5.13-1.1etch1) stable; urgency=low * Stable update. * Grab patch from upstream: Add imap_close_connection to fully reset IMAP state (Closes: #413715). * Add myself to Uploaders, thanks Dato. stable/main/binary-arm/mutt_1.5.13-1.1etch1_arm.deb mutt (1.5.13-1.1etch1) stable; urgency=low * Stable update. * Grab patch from upstream: Add imap_close_connection to fully reset IMAP state (Closes: #413715). * Add myself to Uploaders, thanks Dato. stable/main/binary-amd64/mutt_1.5.13-1.1etch1_amd64.deb mutt (1.5.13-1.1etch1) stable; urgency=low * Stable update. * Grab patch from upstream: Add imap_close_connection to fully reset IMAP state (Closes: #413715). * Add myself to Uploaders, thanks Dato. stable/main/binary-alpha/mutt_1.5.13-1.1etch1_alpha.deb mutt (1.5.13-1.1etch1) stable; urgency=low * Stable update. * Grab patch from upstream: Add imap_close_connection to fully reset IMAP state (Closes: #413715). * Add myself to Uploaders, thanks Dato. stable/main/source/mutt_1.5.13-1.1etch1.dsc stable/main/binary-i386/mutt_1.5.13-1.1etch1_i386.deb stable/main/source/mutt_1.5.13-1.1etch1.diff.gz mutt (1.5.13-1.1etch1) stable; urgency=low * Stable update. * Grab patch from upstream: Add imap_close_connection to fully reset IMAP state (Closes: #413715). * Add myself to Uploaders, thanks Dato. stable/main/binary-sparc/mpop_1.0.5-1etch1_sparc.deb mpop (1.0.5-1etch1) stable-security; urgency=high * Fix APOP weakness CVE-2007-1558 (Closes: #426077). stable/main/binary-s390/mpop_1.0.5-1etch1_s390.deb mpop (1.0.5-1etch1) stable-security; urgency=high * Fix APOP weakness CVE-2007-1558 (Closes: #426077). stable/main/binary-powerpc/mpop_1.0.5-1etch1_powerpc.deb mpop (1.0.5-1etch1) stable-security; urgency=high * Fix APOP weakness CVE-2007-1558 (Closes: #426077). stable/main/binary-mipsel/mpop_1.0.5-1etch1_mipsel.deb mpop (1.0.5-1etch1) stable-security; urgency=high * Fix APOP weakness CVE-2007-1558 (Closes: #426077). stable/main/binary-mips/mpop_1.0.5-1etch1_mips.deb mpop (1.0.5-1etch1) stable-security; urgency=high * Fix APOP weakness CVE-2007-1558 (Closes: #426077). stable/main/binary-ia64/mpop_1.0.5-1etch1_ia64.deb mpop (1.0.5-1etch1) stable-security; urgency=high * Fix APOP weakness CVE-2007-1558 (Closes: #426077). stable/main/binary-hppa/mpop_1.0.5-1etch1_hppa.deb mpop (1.0.5-1etch1) stable-security; urgency=high * Fix APOP weakness CVE-2007-1558 (Closes: #426077). stable/main/binary-arm/mpop_1.0.5-1etch1_arm.deb mpop (1.0.5-1etch1) stable-security; urgency=high * Fix APOP weakness CVE-2007-1558 (Closes: #426077). stable/main/binary-amd64/mpop_1.0.5-1etch1_amd64.deb mpop (1.0.5-1etch1) stable-security; urgency=high * Fix APOP weakness CVE-2007-1558 (Closes: #426077). stable/main/binary-alpha/mpop_1.0.5-1etch1_alpha.deb mpop (1.0.5-1etch1) stable-security; urgency=high * Fix APOP weakness CVE-2007-1558 (Closes: #426077). stable/main/binary-i386/mpop_1.0.5-1etch1_i386.deb stable/main/source/mpop_1.0.5-1etch1.dsc stable/main/source/mpop_1.0.5-1etch1.diff.gz mpop (1.0.5-1etch1) stable-security; urgency=high * Fix APOP weakness CVE-2007-1558 (Closes: #426077). stable/main/binary-sparc/mplayer_1.0~rc1-12etch1_sparc.deb mplayer (1.0~rc1-12etch1) stable-security; urgency=high * fix for stack overflow in the code used to handle cddb queries, CVE-2007-2948 and SAID 24302, thanks Stefan Cornelius of Secunia Research stable/main/binary-s390/mplayer_1.0~rc1-12etch1_s390.deb mplayer (1.0~rc1-12etch1) stable-security; urgency=high * fix for stack overflow in the code used to handle cddb queries, CVE-2007-2948 and SAID 24302, thanks Stefan Cornelius of Secunia Research stable/main/binary-powerpc/mplayer_1.0~rc1-12etch1_powerpc.deb mplayer (1.0~rc1-12etch1) stable-security; urgency=high * fix for stack overflow in the code used to handle cddb queries, CVE-2007-2948 and SAID 24302, thanks Stefan Cornelius of Secunia Research stable/main/binary-mipsel/mplayer_1.0~rc1-12etch1_mipsel.deb mplayer (1.0~rc1-12etch1) stable-security; urgency=high * fix for stack overflow in the code used to handle cddb queries, CVE-2007-2948 and SAID 24302, thanks Stefan Cornelius of Secunia Research stable/main/binary-mips/mplayer_1.0~rc1-12etch1_mips.deb mplayer (1.0~rc1-12etch1) stable-security; urgency=high * fix for stack overflow in the code used to handle cddb queries, CVE-2007-2948 and SAID 24302, thanks Stefan Cornelius of Secunia Research stable/main/binary-ia64/mplayer_1.0~rc1-12etch1_ia64.deb mplayer (1.0~rc1-12etch1) stable-security; urgency=high * fix for stack overflow in the code used to handle cddb queries, CVE-2007-2948 and SAID 24302, thanks Stefan Cornelius of Secunia Research stable/main/binary-i386/mplayer_1.0~rc1-12etch1_i386.deb mplayer (1.0~rc1-12etch1) stable-security; urgency=high * fix for stack overflow in the code used to handle cddb queries, CVE-2007-2948 and SAID 24302, thanks Stefan Cornelius of Secunia Research stable/main/binary-hppa/mplayer_1.0~rc1-12etch1_hppa.deb mplayer (1.0~rc1-12etch1) stable-security; urgency=high * fix for stack overflow in the code used to handle cddb queries, CVE-2007-2948 and SAID 24302, thanks Stefan Cornelius of Secunia Research stable/main/binary-arm/mplayer_1.0~rc1-12etch1_arm.deb mplayer (1.0~rc1-12etch1) stable-security; urgency=high * fix for stack overflow in the code used to handle cddb queries, CVE-2007-2948 and SAID 24302, thanks Stefan Cornelius of Secunia Research stable/main/binary-alpha/mplayer_1.0~rc1-12etch1_alpha.deb mplayer (1.0~rc1-12etch1) stable-security; urgency=high * fix for stack overflow in the code used to handle cddb queries, CVE-2007-2948 and SAID 24302, thanks Stefan Cornelius of Secunia Research stable/main/source/mplayer_1.0~rc1-12etch1.dsc stable/main/binary-amd64/mplayer_1.0~rc1-12etch1_amd64.deb stable/main/binary-all/mplayer-doc_1.0~rc1-12etch1_all.deb stable/main/source/mplayer_1.0~rc1-12etch1.diff.gz mplayer (1.0~rc1-12etch1) stable-security; urgency=high * fix for stack overflow in the code used to handle cddb queries, CVE-2007-2948 and SAID 24302, thanks Stefan Cornelius of Secunia Research stable/main/binary-sparc/icedove-traybiff_1.2.2-13etch1_sparc.deb mozilla-traybiff (1.2.2-13etch1) stable; urgency=low * Updated for new version of icedove in Etch. (Closes: #428779, #428767) * Fixed dependencies to better handle future icedove updates stable/main/binary-s390/icedove-traybiff_1.2.2-13etch1_s390.deb mozilla-traybiff (1.2.2-13etch1) stable; urgency=low * Updated for new version of icedove in Etch. (Closes: #428779, #428767) * Fixed dependencies to better handle future icedove updates stable/main/binary-powerpc/icedove-traybiff_1.2.2-13etch1_powerpc.deb mozilla-traybiff (1.2.2-13etch1) stable; urgency=low * Updated for new version of icedove in Etch. (Closes: #428779, #428767) * Fixed dependencies to better handle future icedove updates stable/main/binary-mipsel/icedove-traybiff_1.2.2-13etch1_mipsel.deb mozilla-traybiff (1.2.2-13etch1) stable; urgency=low * Updated for new version of icedove in Etch. (Closes: #428779, #428767) * Fixed dependencies to better handle future icedove updates stable/main/binary-mips/icedove-traybiff_1.2.2-13etch1_mips.deb mozilla-traybiff (1.2.2-13etch1) stable; urgency=low * Updated for new version of icedove in Etch. (Closes: #428779, #428767) * Fixed dependencies to better handle future icedove updates stable/main/binary-ia64/icedove-traybiff_1.2.2-13etch1_ia64.deb mozilla-traybiff (1.2.2-13etch1) stable; urgency=low * Updated for new version of icedove in Etch. (Closes: #428779, #428767) * Fixed dependencies to better handle future icedove updates stable/main/binary-hppa/icedove-traybiff_1.2.2-13etch1_hppa.deb mozilla-traybiff (1.2.2-13etch1) stable; urgency=low * Updated for new version of icedove in Etch. (Closes: #428779, #428767) * Fixed dependencies to better handle future icedove updates stable/main/binary-arm/icedove-traybiff_1.2.2-13etch1_arm.deb mozilla-traybiff (1.2.2-13etch1) stable; urgency=low * Updated for new version of icedove in Etch. (Closes: #428779, #428767) * Fixed dependencies to better handle future icedove updates stable/main/binary-amd64/icedove-traybiff_1.2.2-13etch1_amd64.deb mozilla-traybiff (1.2.2-13etch1) stable; urgency=low * Updated for new version of icedove in Etch. (Closes: #428779, #428767) * Fixed dependencies to better handle future icedove updates stable/main/binary-alpha/icedove-traybiff_1.2.2-13etch1_alpha.deb mozilla-traybiff (1.2.2-13etch1) stable; urgency=low * Updated for new version of icedove in Etch. (Closes: #428779, #428767) * Fixed dependencies to better handle future icedove updates stable/main/source/mozilla-traybiff_1.2.2-13etch1.diff.gz stable/main/binary-i386/icedove-traybiff_1.2.2-13etch1_i386.deb stable/main/source/mozilla-traybiff_1.2.2-13etch1.dsc stable/main/binary-all/thunderbird-traybiff_1.2.2-13etch1_all.deb mozilla-traybiff (1.2.2-13etch1) stable; urgency=low * Updated for new version of icedove in Etch. (Closes: #428779, #428767) * Fixed dependencies to better handle future icedove updates stable/main/binary-sparc/mixmaster_3.0b2-4.etch1_sparc.deb mixmaster (3.0b2-4.etch1) stable; urgency=high * Backport a fix from upstream: In two functions in keymgt.c we had allocated a buffer of 33 bytes when if fact we were using one more - 34 - bytes. This buffer overflow is exposed when building with gcc 4.x, it never was exposed with previous compilers because they apparently layed out the stack differently. The result of this buffer overflow is that a single 0-byte will be written at the end of the buffer. At that position on the stack there is (at least in the previous build) a saved local variable from a calling function. This local variable is a pointer to a BUFFER struct and this pointer has its least significant byte set to zero. This prevents mixmaster from properly decrypting incoming type2 messages. It's not likely that this can be exploited to execute arbitrary code, tho evidence or argument to the contrary are of course welcome. Upstream patch: http://svn.noreply.org/cgi-bin/viewcvs.cgi/trunk/Mix/Src/keymgt.c?rev=929&r1=766&r2=929 Closes: #418662 Thanks to Hauke Lampe and Colin Tuckley. stable/main/binary-s390/mixmaster_3.0b2-4.etch1_s390.deb mixmaster (3.0b2-4.etch1) stable; urgency=high * Backport a fix from upstream: In two functions in keymgt.c we had allocated a buffer of 33 bytes when if fact we were using one more - 34 - bytes. This buffer overflow is exposed when building with gcc 4.x, it never was exposed with previous compilers because they apparently layed out the stack differently. The result of this buffer overflow is that a single 0-byte will be written at the end of the buffer. At that position on the stack there is (at least in the previous build) a saved local variable from a calling function. This local variable is a pointer to a BUFFER struct and this pointer has its least significant byte set to zero. This prevents mixmaster from properly decrypting incoming type2 messages. It's not likely that this can be exploited to execute arbitrary code, tho evidence or argument to the contrary are of course welcome. Upstream patch: http://svn.noreply.org/cgi-bin/viewcvs.cgi/trunk/Mix/Src/keymgt.c?rev=929&r1=766&r2=929 Closes: #418662 Thanks to Hauke Lampe and Colin Tuckley. stable/main/binary-powerpc/mixmaster_3.0b2-4.etch1_powerpc.deb mixmaster (3.0b2-4.etch1) stable; urgency=high * Backport a fix from upstream: In two functions in keymgt.c we had allocated a buffer of 33 bytes when if fact we were using one more - 34 - bytes. This buffer overflow is exposed when building with gcc 4.x, it never was exposed with previous compilers because they apparently layed out the stack differently. The result of this buffer overflow is that a single 0-byte will be written at the end of the buffer. At that position on the stack there is (at least in the previous build) a saved local variable from a calling function. This local variable is a pointer to a BUFFER struct and this pointer has its least significant byte set to zero. This prevents mixmaster from properly decrypting incoming type2 messages. It's not likely that this can be exploited to execute arbitrary code, tho evidence or argument to the contrary are of course welcome. Upstream patch: http://svn.noreply.org/cgi-bin/viewcvs.cgi/trunk/Mix/Src/keymgt.c?rev=929&r1=766&r2=929 Closes: #418662 Thanks to Hauke Lampe and Colin Tuckley. stable/main/binary-mipsel/mixmaster_3.0b2-4.etch1_mipsel.deb mixmaster (3.0b2-4.etch1) stable; urgency=high * Backport a fix from upstream: In two functions in keymgt.c we had allocated a buffer of 33 bytes when if fact we were using one more - 34 - bytes. This buffer overflow is exposed when building with gcc 4.x, it never was exposed with previous compilers because they apparently layed out the stack differently. The result of this buffer overflow is that a single 0-byte will be written at the end of the buffer. At that position on the stack there is (at least in the previous build) a saved local variable from a calling function. This local variable is a pointer to a BUFFER struct and this pointer has its least significant byte set to zero. This prevents mixmaster from properly decrypting incoming type2 messages. It's not likely that this can be exploited to execute arbitrary code, tho evidence or argument to the contrary are of course welcome. Upstream patch: http://svn.noreply.org/cgi-bin/viewcvs.cgi/trunk/Mix/Src/keymgt.c?rev=929&r1=766&r2=929 Closes: #418662 Thanks to Hauke Lampe and Colin Tuckley. stable/main/binary-mips/mixmaster_3.0b2-4.etch1_mips.deb mixmaster (3.0b2-4.etch1) stable; urgency=high * Backport a fix from upstream: In two functions in keymgt.c we had allocated a buffer of 33 bytes when if fact we were using one more - 34 - bytes. This buffer overflow is exposed when building with gcc 4.x, it never was exposed with previous compilers because they apparently layed out the stack differently. The result of this buffer overflow is that a single 0-byte will be written at the end of the buffer. At that position on the stack there is (at least in the previous build) a saved local variable from a calling function. This local variable is a pointer to a BUFFER struct and this pointer has its least significant byte set to zero. This prevents mixmaster from properly decrypting incoming type2 messages. It's not likely that this can be exploited to execute arbitrary code, tho evidence or argument to the contrary are of course welcome. Upstream patch: http://svn.noreply.org/cgi-bin/viewcvs.cgi/trunk/Mix/Src/keymgt.c?rev=929&r1=766&r2=929 Closes: #418662 Thanks to Hauke Lampe and Colin Tuckley. stable/main/binary-ia64/mixmaster_3.0b2-4.etch1_ia64.deb mixmaster (3.0b2-4.etch1) stable; urgency=high * Backport a fix from upstream: In two functions in keymgt.c we had allocated a buffer of 33 bytes when if fact we were using one more - 34 - bytes. This buffer overflow is exposed when building with gcc 4.x, it never was exposed with previous compilers because they apparently layed out the stack differently. The result of this buffer overflow is that a single 0-byte will be written at the end of the buffer. At that position on the stack there is (at least in the previous build) a saved local variable from a calling function. This local variable is a pointer to a BUFFER struct and this pointer has its least significant byte set to zero. This prevents mixmaster from properly decrypting incoming type2 messages. It's not likely that this can be exploited to execute arbitrary code, tho evidence or argument to the contrary are of course welcome. Upstream patch: http://svn.noreply.org/cgi-bin/viewcvs.cgi/trunk/Mix/Src/keymgt.c?rev=929&r1=766&r2=929 Closes: #418662 Thanks to Hauke Lampe and Colin Tuckley. stable/main/binary-hppa/mixmaster_3.0b2-4.etch1_hppa.deb mixmaster (3.0b2-4.etch1) stable; urgency=high * Backport a fix from upstream: In two functions in keymgt.c we had allocated a buffer of 33 bytes when if fact we were using one more - 34 - bytes. This buffer overflow is exposed when building with gcc 4.x, it never was exposed with previous compilers because they apparently layed out the stack differently. The result of this buffer overflow is that a single 0-byte will be written at the end of the buffer. At that position on the stack there is (at least in the previous build) a saved local variable from a calling function. This local variable is a pointer to a BUFFER struct and this pointer has its least significant byte set to zero. This prevents mixmaster from properly decrypting incoming type2 messages. It's not likely that this can be exploited to execute arbitrary code, tho evidence or argument to the contrary are of course welcome. Upstream patch: http://svn.noreply.org/cgi-bin/viewcvs.cgi/trunk/Mix/Src/keymgt.c?rev=929&r1=766&r2=929 Closes: #418662 Thanks to Hauke Lampe and Colin Tuckley. stable/main/binary-arm/mixmaster_3.0b2-4.etch1_arm.deb mixmaster (3.0b2-4.etch1) stable; urgency=high * Backport a fix from upstream: In two functions in keymgt.c we had allocated a buffer of 33 bytes when if fact we were using one more - 34 - bytes. This buffer overflow is exposed when building with gcc 4.x, it never was exposed with previous compilers because they apparently layed out the stack differently. The result of this buffer overflow is that a single 0-byte will be written at the end of the buffer. At that position on the stack there is (at least in the previous build) a saved local variable from a calling function. This local variable is a pointer to a BUFFER struct and this pointer has its least significant byte set to zero. This prevents mixmaster from properly decrypting incoming type2 messages. It's not likely that this can be exploited to execute arbitrary code, tho evidence or argument to the contrary are of course welcome. Upstream patch: http://svn.noreply.org/cgi-bin/viewcvs.cgi/trunk/Mix/Src/keymgt.c?rev=929&r1=766&r2=929 Closes: #418662 Thanks to Hauke Lampe and Colin Tuckley. stable/main/binary-amd64/mixmaster_3.0b2-4.etch1_amd64.deb mixmaster (3.0b2-4.etch1) stable; urgency=high * Backport a fix from upstream: In two functions in keymgt.c we had allocated a buffer of 33 bytes when if fact we were using one more - 34 - bytes. This buffer overflow is exposed when building with gcc 4.x, it never was exposed with previous compilers because they apparently layed out the stack differently. The result of this buffer overflow is that a single 0-byte will be written at the end of the buffer. At that position on the stack there is (at least in the previous build) a saved local variable from a calling function. This local variable is a pointer to a BUFFER struct and this pointer has its least significant byte set to zero. This prevents mixmaster from properly decrypting incoming type2 messages. It's not likely that this can be exploited to execute arbitrary code, tho evidence or argument to the contrary are of course welcome. Upstream patch: http://svn.noreply.org/cgi-bin/viewcvs.cgi/trunk/Mix/Src/keymgt.c?rev=929&r1=766&r2=929 Closes: #418662 Thanks to Hauke Lampe and Colin Tuckley. stable/main/binary-alpha/mixmaster_3.0b2-4.etch1_alpha.deb mixmaster (3.0b2-4.etch1) stable; urgency=high * Backport a fix from upstream: In two functions in keymgt.c we had allocated a buffer of 33 bytes when if fact we were using one more - 34 - bytes. This buffer overflow is exposed when building with gcc 4.x, it never was exposed with previous compilers because they apparently layed out the stack differently. The result of this buffer overflow is that a single 0-byte will be written at the end of the buffer. At that position on the stack there is (at least in the previous build) a saved local variable from a calling function. This local variable is a pointer to a BUFFER struct and this pointer has its least significant byte set to zero. This prevents mixmaster from properly decrypting incoming type2 messages. It's not likely that this can be exploited to execute arbitrary code, tho evidence or argument to the contrary are of course welcome. Upstream patch: http://svn.noreply.org/cgi-bin/viewcvs.cgi/trunk/Mix/Src/keymgt.c?rev=929&r1=766&r2=929 Closes: #418662 Thanks to Hauke Lampe and Colin Tuckley. stable/main/binary-i386/mixmaster_3.0b2-4.etch1_i386.deb stable/main/source/mixmaster_3.0b2-4.etch1.diff.gz stable/main/source/mixmaster_3.0b2-4.etch1.dsc mixmaster (3.0b2-4.etch1) stable; urgency=high * Backport a fix from upstream: In two functions in keymgt.c we had allocated a buffer of 33 bytes when if fact we were using one more - 34 - bytes. This buffer overflow is exposed when building with gcc 4.x, it never was exposed with previous compilers because they apparently layed out the stack differently. The result of this buffer overflow is that a single 0-byte will be written at the end of the buffer. At that position on the stack there is (at least in the previous build) a saved local variable from a calling function. This local variable is a pointer to a BUFFER struct and this pointer has its least significant byte set to zero. This prevents mixmaster from properly decrypting incoming type2 messages. It's not likely that this can be exploited to execute arbitrary code, tho evidence or argument to the contrary are of course welcome. Upstream patch: http://svn.noreply.org/cgi-bin/viewcvs.cgi/trunk/Mix/Src/keymgt.c?rev=929&r1=766&r2=929 Closes: #418662 Thanks to Hauke Lampe and Colin Tuckley. stable/main/binary-s390/metar_20060405.1-1_s390.deb metar (20060405.1-1) unstable; urgency=low * strange ideas about air pressure (Closes: #347174) stable/main/binary-arm/mercurial_0.9.1-1+etch1_arm.deb mercurial (0.9.1-1+etch1) testing-proposed-updates; urgency=low * [debian/mercurial.postinst] remove old /usr/lib/python*/site-packages/{mercurial,hgext} directories if needed (Closes: #382252), backport from 0.9.3-2 * [debian/control] update maintainer field with my debian.org address stable/main/binary-sparc/mail-notification-evolution_3.0.dfsg.1-10+b2_sparc.deb stable/main/binary-sparc/mail-notification_3.0.dfsg.1-10+b2_sparc.deb mail-notification (3.0.dfsg.1-10+b2) stable; urgency=low * Binary-only non-maintainer upload for sparc; no source changes. * Rebuild against libeel2-2.14 stable/non-free/binary-all/madwifi-source_0.9.2+r1842.20061207-2etch1_all.deb stable/non-free/binary-all/madwifi-doc_0.9.2+r1842.20061207-2etch1_all.deb stable/non-free/source/madwifi_0.9.2+r1842.20061207-2etch1.dsc stable/non-free/source/madwifi_0.9.2+r1842.20061207-2etch1.diff.gz madwifi (1:0.9.2+r1842.20061207-2etch1) stable; urgency=high * Backport upstream security fixes; closes: #425738. - Remote DoS: insufficient input validation (beacon interval) debian/patches/03_secfix-0.9.3-beacon_interval_range.dpatch http://madwifi.org/ticket/1270 - Remote DoS: insufficient input validation (Fast Frame parsing) debian/patches/01_secfix-0.9.3-sizecheck-take3.dpatch http://madwifi.org/ticket/1335 - Local DoS: insufficient input validation (WMM parameters) debian/patches/02_secfix-0.9.3-wmmparams-take2.dpatch http://madwifi.org/ticket/1334 * Update Uploaders email address. stable/main/binary-sparc/lsb-graphics_3.1-23.2etch1_sparc.deb stable/main/binary-sparc/lsb-qt4_3.1-23.2etch1_sparc.deb stable/main/binary-sparc/lsb-core_3.1-23.2etch1_sparc.deb stable/main/binary-sparc/lsb-desktop_3.1-23.2etch1_sparc.deb stable/main/binary-sparc/lsb-cxx_3.1-23.2etch1_sparc.deb lsb (3.1-23.2etch1) stable; urgency=high * Don't remove PID files of daemons that aren't actually killed in killproc(). (Closes: #434756) stable/main/binary-s390/lsb-cxx_3.1-23.2etch1_s390.deb stable/main/binary-s390/lsb-graphics_3.1-23.2etch1_s390.deb stable/main/binary-s390/lsb-qt4_3.1-23.2etch1_s390.deb stable/main/binary-s390/lsb-desktop_3.1-23.2etch1_s390.deb stable/main/binary-s390/lsb-core_3.1-23.2etch1_s390.deb lsb (3.1-23.2etch1) stable; urgency=high * Don't remove PID files of daemons that aren't actually killed in killproc(). (Closes: #434756) stable/main/binary-powerpc/lsb-graphics_3.1-23.2etch1_powerpc.deb stable/main/binary-powerpc/lsb-cxx_3.1-23.2etch1_powerpc.deb stable/main/binary-powerpc/lsb-core_3.1-23.2etch1_powerpc.deb stable/main/binary-powerpc/lsb-qt4_3.1-23.2etch1_powerpc.deb stable/main/binary-powerpc/lsb-desktop_3.1-23.2etch1_powerpc.deb lsb (3.1-23.2etch1) stable; urgency=high * Don't remove PID files of daemons that aren't actually killed in killproc(). (Closes: #434756) stable/main/binary-mipsel/lsb-desktop_3.1-23.2etch1_mipsel.deb stable/main/binary-mipsel/lsb-core_3.1-23.2etch1_mipsel.deb stable/main/binary-mipsel/lsb-graphics_3.1-23.2etch1_mipsel.deb stable/main/binary-mipsel/lsb-cxx_3.1-23.2etch1_mipsel.deb stable/main/binary-mipsel/lsb-qt4_3.1-23.2etch1_mipsel.deb lsb (3.1-23.2etch1) stable; urgency=high * Don't remove PID files of daemons that aren't actually killed in killproc(). (Closes: #434756) stable/main/binary-mips/lsb-cxx_3.1-23.2etch1_mips.deb stable/main/binary-mips/lsb-graphics_3.1-23.2etch1_mips.deb stable/main/binary-mips/lsb-core_3.1-23.2etch1_mips.deb stable/main/binary-mips/lsb-desktop_3.1-23.2etch1_mips.deb stable/main/binary-mips/lsb-qt4_3.1-23.2etch1_mips.deb lsb (3.1-23.2etch1) stable; urgency=high * Don't remove PID files of daemons that aren't actually killed in killproc(). (Closes: #434756) stable/main/binary-ia64/lsb-graphics_3.1-23.2etch1_ia64.deb stable/main/binary-ia64/lsb-cxx_3.1-23.2etch1_ia64.deb stable/main/binary-ia64/lsb-core_3.1-23.2etch1_ia64.deb stable/main/binary-ia64/lsb-desktop_3.1-23.2etch1_ia64.deb stable/main/binary-ia64/lsb-qt4_3.1-23.2etch1_ia64.deb lsb (3.1-23.2etch1) stable; urgency=high * Don't remove PID files of daemons that aren't actually killed in killproc(). (Closes: #434756) stable/main/binary-i386/lsb-qt4_3.1-23.2etch1_i386.deb stable/main/binary-i386/lsb-desktop_3.1-23.2etch1_i386.deb stable/main/binary-i386/lsb-core_3.1-23.2etch1_i386.deb stable/main/binary-i386/lsb-graphics_3.1-23.2etch1_i386.deb stable/main/binary-i386/lsb-cxx_3.1-23.2etch1_i386.deb lsb (3.1-23.2etch1) stable; urgency=high * Don't remove PID files of daemons that aren't actually killed in killproc(). (Closes: #434756) stable/main/binary-hppa/lsb-core_3.1-23.2etch1_hppa.deb stable/main/binary-hppa/lsb-cxx_3.1-23.2etch1_hppa.deb stable/main/binary-hppa/lsb-graphics_3.1-23.2etch1_hppa.deb stable/main/binary-hppa/lsb-qt4_3.1-23.2etch1_hppa.deb stable/main/binary-hppa/lsb-desktop_3.1-23.2etch1_hppa.deb lsb (3.1-23.2etch1) stable; urgency=high * Don't remove PID files of daemons that aren't actually killed in killproc(). (Closes: #434756) stable/main/binary-arm/lsb-qt4_3.1-23.2etch1_arm.deb stable/main/binary-arm/lsb-desktop_3.1-23.2etch1_arm.deb stable/main/binary-arm/lsb-cxx_3.1-23.2etch1_arm.deb stable/main/binary-arm/lsb-core_3.1-23.2etch1_arm.deb stable/main/binary-arm/lsb-graphics_3.1-23.2etch1_arm.deb lsb (3.1-23.2etch1) stable; urgency=high * Don't remove PID files of daemons that aren't actually killed in killproc(). (Closes: #434756) stable/main/binary-alpha/lsb-cxx_3.1-23.2etch1_alpha.deb stable/main/binary-alpha/lsb-desktop_3.1-23.2etch1_alpha.deb stable/main/binary-alpha/lsb-core_3.1-23.2etch1_alpha.deb stable/main/binary-alpha/lsb-qt4_3.1-23.2etch1_alpha.deb stable/main/binary-alpha/lsb-graphics_3.1-23.2etch1_alpha.deb lsb (3.1-23.2etch1) stable; urgency=high * Don't remove PID files of daemons that aren't actually killed in killproc(). (Closes: #434756) stable/main/source/lsb_3.1-23.2etch1.dsc stable/main/binary-amd64/lsb-qt4_3.1-23.2etch1_amd64.deb stable/main/binary-all/lsb-release_3.1-23.2etch1_all.deb stable/main/binary-amd64/lsb-graphics_3.1-23.2etch1_amd64.deb stable/main/binary-amd64/lsb-core_3.1-23.2etch1_amd64.deb stable/main/binary-all/lsb_3.1-23.2etch1_all.deb stable/main/binary-all/lsb-base_3.1-23.2etch1_all.deb stable/main/source/lsb_3.1-23.2etch1.tar.gz stable/main/binary-amd64/lsb-cxx_3.1-23.2etch1_amd64.deb stable/main/binary-amd64/lsb-desktop_3.1-23.2etch1_amd64.deb lsb (3.1-23.2etch1) stable; urgency=high * Don't remove PID files of daemons that aren't actually killed in killproc(). (Closes: #434756) lsb (3.1-23.1) unstable; urgency=low * Non-maintainer upload to fix pending l10n issues. * Debconf translations: - Portuguese. Closes: #408177 - Convert PO files to UTF-8, except Japanese stable/main/binary-sparc/loop-aes-modules-2.6.18-5-sparc64-smp_3.1d-13etch1_sparc.deb stable/main/binary-sparc/loop-aes-modules-2.6.18-5-sparc32_3.1d-13etch1_sparc.deb stable/main/binary-sparc/loop-aes-modules-2.6-sparc64_3.1d-13etch1_sparc.deb stable/main/binary-sparc/loop-aes-modules-2.6.18-5-vserver-sparc64_3.1d-13etch1_sparc.deb stable/main/binary-sparc/loop-aes-modules-2.6-vserver-sparc64_3.1d-13etch1_sparc.deb stable/main/binary-sparc/loop-aes-modules-2.6.18-5-sparc64_3.1d-13etch1_sparc.deb stable/main/binary-sparc/loop-aes-modules-2.6-sparc64-smp_3.1d-13etch1_sparc.deb stable/main/binary-sparc/loop-aes-modules-2.6-sparc32_3.1d-13etch1_sparc.deb loop-aes (3.1d-13etch1) stable; urgency=high * Update modules to 2.6.18-5 stable/main/binary-s390/loop-aes-modules-2.6.18-5-s390_3.1d-13etch1_s390.deb stable/main/binary-s390/loop-aes-modules-2.6-vserver-s390x_3.1d-13etch1_s390.deb stable/main/binary-s390/loop-aes-modules-2.6-s390x_3.1d-13etch1_s390.deb stable/main/binary-s390/loop-aes-modules-2.6.18-5-s390x_3.1d-13etch1_s390.deb stable/main/binary-s390/loop-aes-modules-2.6-s390_3.1d-13etch1_s390.deb stable/main/binary-s390/loop-aes-modules-2.6.18-5-vserver-s390x_3.1d-13etch1_s390.deb loop-aes (3.1d-13etch1) stable; urgency=high * Update modules to 2.6.18-5 stable/main/binary-powerpc/loop-aes-modules-2.6-vserver-powerpc_3.1d-13etch1_powerpc.deb stable/main/binary-powerpc/loop-aes-modules-2.6-powerpc64_3.1d-13etch1_powerpc.deb stable/main/binary-powerpc/loop-aes-modules-2.6.18-5-vserver-powerpc_3.1d-13etch1_powerpc.deb stable/main/binary-powerpc/loop-aes-modules-2.6-prep_3.1d-13etch1_powerpc.deb stable/main/binary-powerpc/loop-aes-modules-2.6-vserver-powerpc64_3.1d-13etch1_powerpc.deb stable/main/binary-powerpc/loop-aes-modules-2.6.18-5-powerpc-miboot_3.1d-13etch1_powerpc.deb stable/main/binary-powerpc/loop-aes-modules-2.6-powerpc-smp_3.1d-13etch1_powerpc.deb stable/main/binary-powerpc/loop-aes-modules-2.6-powerpc_3.1d-13etch1_powerpc.deb stable/main/binary-powerpc/loop-aes-modules-2.6.18-5-powerpc64_3.1d-13etch1_powerpc.deb stable/main/binary-powerpc/loop-aes-modules-2.6.18-5-powerpc_3.1d-13etch1_powerpc.deb stable/main/binary-powerpc/loop-aes-modules-2.6.18-5-prep_3.1d-13etch1_powerpc.deb stable/main/binary-powerpc/loop-aes-modules-2.6.18-5-vserver-powerpc64_3.1d-13etch1_powerpc.deb stable/main/binary-powerpc/loop-aes-modules-2.6-powerpc-miboot_3.1d-13etch1_powerpc.deb stable/main/binary-powerpc/loop-aes-modules-2.6.18-5-powerpc-smp_3.1d-13etch1_powerpc.deb loop-aes (3.1d-13etch1) stable; urgency=high * Update modules to 2.6.18-5 stable/main/binary-mipsel/loop-aes-modules-2.6-r3k-kn02_3.1d-13etch1_mipsel.deb stable/main/binary-mipsel/loop-aes-modules-2.6.18-5-qemu_3.1d-13etch1_mipsel.deb stable/main/binary-mipsel/loop-aes-modules-2.6-sb1-bcm91250a_3.1d-13etch1_mipsel.deb stable/main/binary-mipsel/loop-aes-modules-2.6-r5k-cobalt_3.1d-13etch1_mipsel.deb stable/main/binary-mipsel/loop-aes-modules-2.6.18-5-r4k-kn04_3.1d-13etch1_mipsel.deb stable/main/binary-mipsel/loop-aes-modules-2.6-sb1a-bcm91480b_3.1d-13etch1_mipsel.deb stable/main/binary-mipsel/loop-aes-modules-2.6-r4k-kn04_3.1d-13etch1_mipsel.deb stable/main/binary-mipsel/loop-aes-modules-2.6.18-5-sb1a-bcm91480b_3.1d-13etch1_mipsel.deb stable/main/binary-mipsel/loop-aes-modules-2.6.18-5-r5k-cobalt_3.1d-13etch1_mipsel.deb stable/main/binary-mipsel/loop-aes-modules-2.6-qemu_3.1d-13etch1_mipsel.deb stable/main/binary-mipsel/loop-aes-modules-2.6.18-5-r3k-kn02_3.1d-13etch1_mipsel.deb stable/main/binary-mipsel/loop-aes-modules-2.6.18-5-sb1-bcm91250a_3.1d-13etch1_mipsel.deb loop-aes (3.1d-13etch1) stable; urgency=high * Update modules to 2.6.18-5 stable/main/binary-mips/loop-aes-modules-2.6-qemu_3.1d-13etch1_mips.deb stable/main/binary-mips/loop-aes-modules-2.6-r5k-ip32_3.1d-13etch1_mips.deb stable/main/binary-mips/loop-aes-modules-2.6-r4k-ip22_3.1d-13etch1_mips.deb stable/main/binary-mips/loop-aes-modules-2.6.18-5-sb1a-bcm91480b_3.1d-13etch1_mips.deb stable/main/binary-mips/loop-aes-modules-2.6.18-5-r4k-ip22_3.1d-13etch1_mips.deb stable/main/binary-mips/loop-aes-modules-2.6.18-5-qemu_3.1d-13etch1_mips.deb stable/main/binary-mips/loop-aes-modules-2.6-sb1-bcm91250a_3.1d-13etch1_mips.deb stable/main/binary-mips/loop-aes-modules-2.6.18-5-sb1-bcm91250a_3.1d-13etch1_mips.deb stable/main/binary-mips/loop-aes-modules-2.6-sb1a-bcm91480b_3.1d-13etch1_mips.deb stable/main/binary-mips/loop-aes-modules-2.6.18-5-r5k-ip32_3.1d-13etch1_mips.deb loop-aes (3.1d-13etch1) stable; urgency=high * Update modules to 2.6.18-5 stable/main/binary-i386/loop-aes-modules-2.6.18-5-xen-vserver-686_3.1d-13etch1_i386.deb stable/main/binary-i386/loop-aes-modules-2.6.18-5-k7_3.1d-13etch1_i386.deb stable/main/binary-i386/loop-aes-modules-2.6.18-5-xen-686_3.1d-13etch1_i386.deb stable/main/binary-i386/loop-aes-modules-2.6-amd64_3.1d-13etch1_i386.deb stable/main/binary-i386/loop-aes-modules-2.6.18-5-vserver-k7_3.1d-13etch1_i386.deb stable/main/binary-i386/loop-aes-modules-2.6.18-5-amd64_3.1d-13etch1_i386.deb stable/main/binary-i386/loop-aes-modules-2.6.18-5-486_3.1d-13etch1_i386.deb stable/main/binary-i386/loop-aes-modules-2.6-686-bigmem_3.1d-13etch1_i386.deb stable/main/binary-i386/loop-aes-modules-2.6-686_3.1d-13etch1_i386.deb stable/main/binary-i386/loop-aes-modules-2.6-486_3.1d-13etch1_i386.deb stable/main/binary-i386/loop-aes-modules-2.6.18-5-686-bigmem_3.1d-13etch1_i386.deb stable/main/binary-i386/loop-aes-modules-2.6-xen-vserver-686_3.1d-13etch1_i386.deb stable/main/binary-i386/loop-aes-modules-2.6.18-5-vserver-686_3.1d-13etch1_i386.deb stable/main/binary-i386/loop-aes-modules-2.6-vserver-k7_3.1d-13etch1_i386.deb stable/main/binary-i386/loop-aes-modules-2.6-k7_3.1d-13etch1_i386.deb stable/main/binary-i386/loop-aes-modules-2.6-vserver-686_3.1d-13etch1_i386.deb stable/main/binary-i386/loop-aes-modules-2.6-xen-686_3.1d-13etch1_i386.deb stable/main/binary-i386/loop-aes-modules-2.6.18-5-686_3.1d-13etch1_i386.deb loop-aes (3.1d-13etch1) stable; urgency=high * Update modules to 2.6.18-5 stable/main/binary-hppa/loop-aes-modules-2.6.18-5-parisc64_3.1d-13etch1_hppa.deb stable/main/binary-hppa/loop-aes-modules-2.6.18-5-parisc64-smp_3.1d-13etch1_hppa.deb stable/main/binary-hppa/loop-aes-modules-2.6-parisc_3.1d-13etch1_hppa.deb stable/main/binary-hppa/loop-aes-modules-2.6-parisc64_3.1d-13etch1_hppa.deb stable/main/binary-hppa/loop-aes-modules-2.6-parisc64-smp_3.1d-13etch1_hppa.deb stable/main/binary-hppa/loop-aes-modules-2.6-parisc-smp_3.1d-13etch1_hppa.deb stable/main/binary-hppa/loop-aes-modules-2.6.18-5-parisc_3.1d-13etch1_hppa.deb stable/main/binary-hppa/loop-aes-modules-2.6.18-5-parisc-smp_3.1d-13etch1_hppa.deb loop-aes (3.1d-13etch1) stable; urgency=high * Update modules to 2.6.18-5 stable/main/binary-arm/loop-aes-modules-2.6-ixp4xx_3.1d-13etch1_arm.deb stable/main/binary-arm/loop-aes-modules-2.6-iop32x_3.1d-13etch1_arm.deb stable/main/binary-arm/loop-aes-modules-2.6.18-5-ixp4xx_3.1d-13etch1_arm.deb stable/main/binary-arm/loop-aes-modules-2.6.18-5-iop32x_3.1d-13etch1_arm.deb stable/main/binary-arm/loop-aes-modules-2.6-s3c2410_3.1d-13etch1_arm.deb stable/main/binary-arm/loop-aes-modules-2.6.18-5-rpc_3.1d-13etch1_arm.deb stable/main/binary-arm/loop-aes-modules-2.6.18-5-footbridge_3.1d-13etch1_arm.deb stable/main/binary-arm/loop-aes-modules-2.6.18-5-s3c2410_3.1d-13etch1_arm.deb stable/main/binary-arm/loop-aes-modules-2.6-footbridge_3.1d-13etch1_arm.deb stable/main/binary-arm/loop-aes-modules-2.6-rpc_3.1d-13etch1_arm.deb loop-aes (3.1d-13etch1) stable; urgency=high * Update modules to 2.6.18-5 stable/main/binary-amd64/loop-aes-modules-2.6-xen-amd64_3.1d-13etch1_amd64.deb stable/main/binary-amd64/loop-aes-modules-2.6.18-5-amd64_3.1d-13etch1_amd64.deb stable/main/binary-amd64/loop-aes-modules-2.6-xen-vserver-amd64_3.1d-13etch1_amd64.deb stable/main/binary-amd64/loop-aes-modules-2.6-amd64_3.1d-13etch1_amd64.deb stable/main/binary-amd64/loop-aes-modules-2.6-vserver-amd64_3.1d-13etch1_amd64.deb stable/main/binary-amd64/loop-aes-modules-2.6.18-5-xen-vserver-amd64_3.1d-13etch1_amd64.deb stable/main/binary-amd64/loop-aes-modules-2.6.18-5-vserver-amd64_3.1d-13etch1_amd64.deb stable/main/binary-amd64/loop-aes-modules-2.6.18-5-xen-amd64_3.1d-13etch1_amd64.deb loop-aes (3.1d-13etch1) stable; urgency=high * Update modules to 2.6.18-5 stable/main/binary-alpha/loop-aes-modules-2.6-vserver-alpha_3.1d-13etch1_alpha.deb stable/main/binary-alpha/loop-aes-modules-2.6-alpha-generic_3.1d-13etch1_alpha.deb stable/main/binary-alpha/loop-aes-modules-2.6.18-5-alpha-legacy_3.1d-13etch1_alpha.deb stable/main/binary-alpha/loop-aes-modules-2.6.18-5-alpha-generic_3.1d-13etch1_alpha.deb stable/main/binary-alpha/loop-aes-modules-2.6-alpha-smp_3.1d-13etch1_alpha.deb stable/main/binary-alpha/loop-aes-modules-2.6-alpha-legacy_3.1d-13etch1_alpha.deb stable/main/binary-alpha/loop-aes-modules-2.6.18-5-vserver-alpha_3.1d-13etch1_alpha.deb stable/main/binary-alpha/loop-aes-modules-2.6.18-5-alpha-smp_3.1d-13etch1_alpha.deb loop-aes (3.1d-13etch1) stable; urgency=high * Update modules to 2.6.18-5 stable/main/binary-ia64/loop-aes-modules-2.6.18-5-itanium_3.1d-13etch1_ia64.deb stable/main/binary-all/loop-aes-testsuite_3.1d-13etch1_all.deb stable/main/binary-ia64/loop-aes-modules-2.6.18-5-mckinley_3.1d-13etch1_ia64.deb stable/main/binary-all/loop-aes-source_3.1d-13etch1_all.deb stable/main/binary-ia64/loop-aes-modules-2.6-itanium_3.1d-13etch1_ia64.deb stable/main/source/loop-aes_3.1d-13etch1.diff.gz stable/main/source/loop-aes_3.1d-13etch1.dsc stable/main/binary-ia64/loop-aes-modules-2.6-mckinley_3.1d-13etch1_ia64.deb loop-aes (3.1d-13etch1) stable; urgency=high * Update modules to 2.6.18-5 stable/non-free/binary-i386/kqemu-modules-2.6.18-5-k7_2.6.18+1.3.0~pre9-4etch1_i386.deb stable/non-free/binary-i386/kqemu-modules-2.6.18-5-686_2.6.18+1.3.0~pre9-4etch1_i386.deb stable/non-free/binary-i386/kqemu-modules-2.6-686_2.6.18-4etch1_i386.deb stable/non-free/binary-i386/kqemu-modules-2.6.18-5-686-bigmem_2.6.18+1.3.0~pre9-4etch1_i386.deb stable/non-free/source/linux-modules-nonfree-2.6_2.6.18-4etch1.dsc stable/non-free/binary-i386/kqemu-modules-2.6-686-bigmem_2.6.18-4etch1_i386.deb stable/non-free/binary-i386/kqemu-modules-2.6.18-5-486_2.6.18+1.3.0~pre9-4etch1_i386.deb stable/non-free/source/linux-modules-nonfree-2.6_2.6.18-4etch1.tar.gz stable/non-free/binary-i386/kqemu-modules-2.6-k7_2.6.18-4etch1_i386.deb stable/non-free/binary-i386/kqemu-modules-2.6-486_2.6.18-4etch1_i386.deb linux-modules-nonfree-2.6 (2.6.18-4etch1) stable; urgency=high [ Dann Frazier ] * Building against 2.6.18-5. [ Daniel Baumann ] * Excluding amd64 architecture and amd64 flavour, this version of kqemu is to old and does not work on amd64 anyway. stable/main/binary-s390/redhat-cluster-modules-2.6.18-5-s390x_2.6.18+1.03.00-7+etch3_s390.deb stable/main/binary-s390/redhat-cluster-modules-2.6.18-5-vserver-s390x_2.6.18+1.03.00-7+etch3_s390.deb stable/main/binary-s390/unionfs-modules-2.6-s390x_2.6.18-7+etch3_s390.deb stable/main/binary-s390/unionfs-modules-2.6.18-5-s390_2.6.18+1.4+debian-7+etch3_s390.deb stable/main/binary-s390/squashfs-modules-2.6-s390x_2.6.18-7+etch3_s390.deb stable/main/binary-s390/squashfs-modules-2.6.18-5-vserver-s390x_2.6.18+3.1r2-7+etch3_s390.deb stable/main/binary-s390/unionfs-modules-2.6.18-5-s390x_2.6.18+1.4+debian-7+etch3_s390.deb stable/main/binary-s390/squashfs-modules-2.6-s390_2.6.18-7+etch3_s390.deb stable/main/binary-s390/redhat-cluster-modules-2.6-s390_2.6.18-7+etch3_s390.deb stable/main/binary-s390/squashfs-modules-2.6.18-5-s390_2.6.18+3.1r2-7+etch3_s390.deb stable/main/binary-s390/redhat-cluster-modules-2.6-s390x_2.6.18-7+etch3_s390.deb stable/main/binary-s390/redhat-cluster-modules-2.6.18-5-s390_2.6.18+1.03.00-7+etch3_s390.deb stable/main/binary-s390/squashfs-modules-2.6-vserver-s390x_2.6.18-7+etch3_s390.deb stable/main/binary-s390/squashfs-modules-2.6.18-5-s390x_2.6.18+3.1r2-7+etch3_s390.deb stable/main/binary-s390/redhat-cluster-modules-2.6-vserver-s390x_2.6.18-7+etch3_s390.deb stable/main/binary-s390/unionfs-modules-2.6-s390_2.6.18-7+etch3_s390.deb linux-modules-extra-2.6 (2.6.18-7+etch3) stable; urgency=high * Building against 2.6.18-5 stable/main/binary-powerpc/redhat-cluster-modules-2.6.18-5-powerpc64_2.6.18+1.03.00-7+etch3_powerpc.deb stable/main/binary-powerpc/gspca-modules-2.6-powerpc-miboot_2.6.18-7+etch3_powerpc.deb stable/main/binary-powerpc/squashfs-modules-2.6.18-5-powerpc_2.6.18+3.1r2-7+etch3_powerpc.deb stable/main/binary-powerpc/gspca-modules-2.6.18-5-powerpc_2.6.18+01.00.04-7+etch3_powerpc.deb stable/main/binary-powerpc/squashfs-modules-2.6-powerpc-smp_2.6.18-7+etch3_powerpc.deb stable/main/binary-powerpc/redhat-cluster-modules-2.6.18-5-vserver-powerpc64_2.6.18+1.03.00-7+etch3_powerpc.deb stable/main/binary-powerpc/unionfs-modules-2.6.18-5-powerpc-smp_2.6.18+1.4+debian-7+etch3_powerpc.deb stable/main/binary-powerpc/gspca-modules-2.6.18-5-powerpc-smp_2.6.18+01.00.04-7+etch3_powerpc.deb stable/main/binary-powerpc/gspca-modules-2.6-powerpc_2.6.18-7+etch3_powerpc.deb stable/main/binary-powerpc/unionfs-modules-2.6-powerpc-smp_2.6.18-7+etch3_powerpc.deb stable/main/binary-powerpc/gspca-modules-2.6-prep_2.6.18-7+etch3_powerpc.deb stable/main/binary-powerpc/squashfs-modules-2.6.18-5-vserver-powerpc64_2.6.18+3.1r2-7+etch3_powerpc.deb stable/main/binary-powerpc/squashfs-modules-2.6-powerpc-miboot_2.6.18-7+etch3_powerpc.deb stable/main/binary-powerpc/unionfs-modules-2.6.18-5-powerpc64_2.6.18+1.4+debian-7+etch3_powerpc.deb stable/main/binary-powerpc/mol-modules-2.6.18-5-powerpc-smp_2.6.18+0.9.71.dfsg-7+etch3_powerpc.deb stable/main/binary-powerpc/squashfs-modules-2.6.18-5-powerpc-smp_2.6.18+3.1r2-7+etch3_powerpc.deb stable/main/binary-powerpc/unionfs-modules-2.6-powerpc64_2.6.18-7+etch3_powerpc.deb stable/main/binary-powerpc/squashfs-modules-2.6-powerpc64_2.6.18-7+etch3_powerpc.deb stable/main/binary-powerpc/squashfs-modules-2.6.18-5-powerpc64_2.6.18+3.1r2-7+etch3_powerpc.deb stable/main/binary-powerpc/redhat-cluster-modules-2.6.18-5-prep_2.6.18+1.03.00-7+etch3_powerpc.deb stable/main/binary-powerpc/redhat-cluster-modules-2.6.18-5-powerpc-miboot_2.6.18+1.03.00-7+etch3_powerpc.deb stable/main/binary-powerpc/redhat-cluster-modules-2.6-vserver-powerpc_2.6.18-7+etch3_powerpc.deb stable/main/binary-powerpc/gspca-modules-2.6-powerpc-smp_2.6.18-7+etch3_powerpc.deb stable/main/binary-powerpc/gspca-modules-2.6-powerpc64_2.6.18-7+etch3_powerpc.deb stable/main/binary-powerpc/mol-modules-2.6.18-5-powerpc-miboot_2.6.18+0.9.71.dfsg-7+etch3_powerpc.deb stable/main/binary-powerpc/squashfs-modules-2.6-powerpc_2.6.18-7+etch3_powerpc.deb stable/main/binary-powerpc/mol-modules-2.6.18-5-powerpc_2.6.18+0.9.71.dfsg-7+etch3_powerpc.deb stable/main/binary-powerpc/unionfs-modules-2.6-powerpc-miboot_2.6.18-7+etch3_powerpc.deb stable/main/binary-powerpc/squashfs-modules-2.6.18-5-prep_2.6.18+3.1r2-7+etch3_powerpc.deb stable/main/binary-powerpc/unionfs-modules-2.6.18-5-prep_2.6.18+1.4+debian-7+etch3_powerpc.deb stable/main/binary-powerpc/redhat-cluster-modules-2.6-prep_2.6.18-7+etch3_powerpc.deb stable/main/binary-powerpc/unionfs-modules-2.6.18-5-powerpc_2.6.18+1.4+debian-7+etch3_powerpc.deb stable/main/binary-powerpc/unionfs-modules-2.6.18-5-powerpc-miboot_2.6.18+1.4+debian-7+etch3_powerpc.deb stable/main/binary-powerpc/redhat-cluster-modules-2.6-powerpc-smp_2.6.18-7+etch3_powerpc.deb stable/main/binary-powerpc/mol-modules-2.6-powerpc-miboot_2.6.18-7+etch3_powerpc.deb stable/main/binary-powerpc/mol-modules-2.6-powerpc_2.6.18-7+etch3_powerpc.deb stable/main/binary-powerpc/redhat-cluster-modules-2.6-powerpc_2.6.18-7+etch3_powerpc.deb stable/main/binary-powerpc/gspca-modules-2.6-vserver-powerpc64_2.6.18-7+etch3_powerpc.deb stable/main/binary-powerpc/squashfs-modules-2.6-prep_2.6.18-7+etch3_powerpc.deb stable/main/binary-powerpc/squashfs-modules-2.6.18-5-vserver-powerpc_2.6.18+3.1r2-7+etch3_powerpc.deb stable/main/binary-powerpc/mol-modules-2.6-powerpc-smp_2.6.18-7+etch3_powerpc.deb stable/main/binary-powerpc/gspca-modules-2.6.18-5-prep_2.6.18+01.00.04-7+etch3_powerpc.deb stable/main/binary-powerpc/redhat-cluster-modules-2.6-powerpc64_2.6.18-7+etch3_powerpc.deb stable/main/binary-powerpc/redhat-cluster-modules-2.6-powerpc-miboot_2.6.18-7+etch3_powerpc.deb stable/main/binary-powerpc/redhat-cluster-modules-2.6.18-5-powerpc_2.6.18+1.03.00-7+etch3_powerpc.deb stable/main/binary-powerpc/gspca-modules-2.6.18-5-vserver-powerpc64_2.6.18+01.00.04-7+etch3_powerpc.deb stable/main/binary-powerpc/redhat-cluster-modules-2.6.18-5-powerpc-smp_2.6.18+1.03.00-7+etch3_powerpc.deb stable/main/binary-powerpc/gspca-modules-2.6.18-5-powerpc-miboot_2.6.18+01.00.04-7+etch3_powerpc.deb stable/main/binary-powerpc/redhat-cluster-modules-2.6.18-5-vserver-powerpc_2.6.18+1.03.00-7+etch3_powerpc.deb stable/main/binary-powerpc/mol-modules-2.6.18-5-vserver-powerpc_2.6.18+0.9.71.dfsg-7+etch3_powerpc.deb stable/main/binary-powerpc/gspca-modules-2.6-vserver-powerpc_2.6.18-7+etch3_powerpc.deb stable/main/binary-powerpc/gspca-modules-2.6.18-5-vserver-powerpc_2.6.18+01.00.04-7+etch3_powerpc.deb stable/main/binary-powerpc/squashfs-modules-2.6-vserver-powerpc_2.6.18-7+etch3_powerpc.deb stable/main/binary-powerpc/unionfs-modules-2.6-prep_2.6.18-7+etch3_powerpc.deb stable/main/binary-powerpc/redhat-cluster-modules-2.6-vserver-powerpc64_2.6.18-7+etch3_powerpc.deb stable/main/binary-powerpc/unionfs-modules-2.6-powerpc_2.6.18-7+etch3_powerpc.deb stable/main/binary-powerpc/squashfs-modules-2.6-vserver-powerpc64_2.6.18-7+etch3_powerpc.deb stable/main/binary-powerpc/mol-modules-2.6-vserver-powerpc_2.6.18-7+etch3_powerpc.deb stable/main/binary-powerpc/squashfs-modules-2.6.18-5-powerpc-miboot_2.6.18+3.1r2-7+etch3_powerpc.deb stable/main/binary-powerpc/gspca-modules-2.6.18-5-powerpc64_2.6.18+01.00.04-7+etch3_powerpc.deb linux-modules-extra-2.6 (2.6.18-7+etch3) stable; urgency=high * Building against 2.6.18-5 stable/main/binary-mipsel/squashfs-modules-2.6-r3k-kn02_2.6.18-7+etch3_mipsel.deb stable/main/binary-mipsel/unionfs-modules-2.6.18-5-sb1a-bcm91480b_2.6.18+1.4+debian-7+etch3_mipsel.deb stable/main/binary-mipsel/squashfs-modules-2.6.18-5-qemu_2.6.18+3.1r2-7+etch3_mipsel.deb stable/main/binary-mipsel/squashfs-modules-2.6-sb1a-bcm91480b_2.6.18-7+etch3_mipsel.deb stable/main/binary-mipsel/squashfs-modules-2.6-r5k-cobalt_2.6.18-7+etch3_mipsel.deb stable/main/binary-mipsel/unionfs-modules-2.6-r4k-kn04_2.6.18-7+etch3_mipsel.deb stable/main/binary-mipsel/unionfs-modules-2.6.18-5-qemu_2.6.18+1.4+debian-7+etch3_mipsel.deb stable/main/binary-mipsel/redhat-cluster-modules-2.6-qemu_2.6.18-7+etch3_mipsel.deb stable/main/binary-mipsel/unionfs-modules-2.6.18-5-r3k-kn02_2.6.18+1.4+debian-7+etch3_mipsel.deb stable/main/binary-mipsel/unionfs-modules-2.6-r5k-cobalt_2.6.18-7+etch3_mipsel.deb stable/main/binary-mipsel/squashfs-modules-2.6-r4k-kn04_2.6.18-7+etch3_mipsel.deb stable/main/binary-mipsel/unionfs-modules-2.6.18-5-r5k-cobalt_2.6.18+1.4+debian-7+etch3_mipsel.deb stable/main/binary-mipsel/redhat-cluster-modules-2.6-sb1-bcm91250a_2.6.18-7+etch3_mipsel.deb stable/main/binary-mipsel/squashfs-modules-2.6.18-5-r4k-kn04_2.6.18+3.1r2-7+etch3_mipsel.deb stable/main/binary-mipsel/squashfs-modules-2.6-sb1-bcm91250a_2.6.18-7+etch3_mipsel.deb stable/main/binary-mipsel/squashfs-modules-2.6-qemu_2.6.18-7+etch3_mipsel.deb stable/main/binary-mipsel/redhat-cluster-modules-2.6.18-5-sb1a-bcm91480b_2.6.18+1.03.00-7+etch3_mipsel.deb stable/main/binary-mipsel/redhat-cluster-modules-2.6-sb1a-bcm91480b_2.6.18-7+etch3_mipsel.deb stable/main/binary-mipsel/redhat-cluster-modules-2.6.18-5-r3k-kn02_2.6.18+1.03.00-7+etch3_mipsel.deb stable/main/binary-mipsel/squashfs-modules-2.6.18-5-r5k-cobalt_2.6.18+3.1r2-7+etch3_mipsel.deb stable/main/binary-mipsel/redhat-cluster-modules-2.6-r5k-cobalt_2.6.18-7+etch3_mipsel.deb stable/main/binary-mipsel/unionfs-modules-2.6.18-5-r4k-kn04_2.6.18+1.4+debian-7+etch3_mipsel.deb stable/main/binary-mipsel/redhat-cluster-modules-2.6.18-5-r4k-kn04_2.6.18+1.03.00-7+etch3_mipsel.deb stable/main/binary-mipsel/redhat-cluster-modules-2.6.18-5-r5k-cobalt_2.6.18+1.03.00-7+etch3_mipsel.deb stable/main/binary-mipsel/redhat-cluster-modules-2.6-r3k-kn02_2.6.18-7+etch3_mipsel.deb stable/main/binary-mipsel/redhat-cluster-modules-2.6-r4k-kn04_2.6.18-7+etch3_mipsel.deb stable/main/binary-mipsel/redhat-cluster-modules-2.6.18-5-qemu_2.6.18+1.03.00-7+etch3_mipsel.deb stable/main/binary-mipsel/unionfs-modules-2.6-qemu_2.6.18-7+etch3_mipsel.deb stable/main/binary-mipsel/unionfs-modules-2.6-sb1-bcm91250a_2.6.18-7+etch3_mipsel.deb stable/main/binary-mipsel/unionfs-modules-2.6.18-5-sb1-bcm91250a_2.6.18+1.4+debian-7+etch3_mipsel.deb stable/main/binary-mipsel/squashfs-modules-2.6.18-5-r3k-kn02_2.6.18+3.1r2-7+etch3_mipsel.deb stable/main/binary-mipsel/squashfs-modules-2.6.18-5-sb1a-bcm91480b_2.6.18+3.1r2-7+etch3_mipsel.deb stable/main/binary-mipsel/unionfs-modules-2.6-sb1a-bcm91480b_2.6.18-7+etch3_mipsel.deb stable/main/binary-mipsel/unionfs-modules-2.6-r3k-kn02_2.6.18-7+etch3_mipsel.deb stable/main/binary-mipsel/squashfs-modules-2.6.18-5-sb1-bcm91250a_2.6.18+3.1r2-7+etch3_mipsel.deb stable/main/binary-mipsel/redhat-cluster-modules-2.6.18-5-sb1-bcm91250a_2.6.18+1.03.00-7+etch3_mipsel.deb linux-modules-extra-2.6 (2.6.18-7+etch3) stable; urgency=high * Building against 2.6.18-5 stable/main/binary-mips/squashfs-modules-2.6-qemu_2.6.18-7+etch3_mips.deb stable/main/binary-mips/redhat-cluster-modules-2.6-r4k-ip22_2.6.18-7+etch3_mips.deb stable/main/binary-mips/redhat-cluster-modules-2.6.18-5-r4k-ip22_2.6.18+1.03.00-7+etch3_mips.deb stable/main/binary-mips/unionfs-modules-2.6-qemu_2.6.18-7+etch3_mips.deb stable/main/binary-mips/squashfs-modules-2.6-sb1a-bcm91480b_2.6.18-7+etch3_mips.deb stable/main/binary-mips/redhat-cluster-modules-2.6-qemu_2.6.18-7+etch3_mips.deb stable/main/binary-mips/redhat-cluster-modules-2.6.18-5-sb1a-bcm91480b_2.6.18+1.03.00-7+etch3_mips.deb stable/main/binary-mips/squashfs-modules-2.6-r5k-ip32_2.6.18-7+etch3_mips.deb stable/main/binary-mips/squashfs-modules-2.6.18-5-qemu_2.6.18+3.1r2-7+etch3_mips.deb stable/main/binary-mips/unionfs-modules-2.6-sb1a-bcm91480b_2.6.18-7+etch3_mips.deb stable/main/binary-mips/unionfs-modules-2.6.18-5-r5k-ip32_2.6.18+1.4+debian-7+etch3_mips.deb stable/main/binary-mips/unionfs-modules-2.6-r4k-ip22_2.6.18-7+etch3_mips.deb stable/main/binary-mips/unionfs-modules-2.6.18-5-r4k-ip22_2.6.18+1.4+debian-7+etch3_mips.deb stable/main/binary-mips/squashfs-modules-2.6.18-5-sb1a-bcm91480b_2.6.18+3.1r2-7+etch3_mips.deb stable/main/binary-mips/squashfs-modules-2.6.18-5-r4k-ip22_2.6.18+3.1r2-7+etch3_mips.deb stable/main/binary-mips/redhat-cluster-modules-2.6.18-5-r5k-ip32_2.6.18+1.03.00-7+etch3_mips.deb stable/main/binary-mips/unionfs-modules-2.6.18-5-qemu_2.6.18+1.4+debian-7+etch3_mips.deb stable/main/binary-mips/redhat-cluster-modules-2.6.18-5-qemu_2.6.18+1.03.00-7+etch3_mips.deb stable/main/binary-mips/unionfs-modules-2.6.18-5-sb1-bcm91250a_2.6.18+1.4+debian-7+etch3_mips.deb stable/main/binary-mips/unionfs-modules-2.6-sb1-bcm91250a_2.6.18-7+etch3_mips.deb stable/main/binary-mips/redhat-cluster-modules-2.6.18-5-sb1-bcm91250a_2.6.18+1.03.00-7+etch3_mips.deb stable/main/binary-mips/redhat-cluster-modules-2.6-r5k-ip32_2.6.18-7+etch3_mips.deb stable/main/binary-mips/squashfs-modules-2.6.18-5-r5k-ip32_2.6.18+3.1r2-7+etch3_mips.deb stable/main/binary-mips/unionfs-modules-2.6.18-5-sb1a-bcm91480b_2.6.18+1.4+debian-7+etch3_mips.deb stable/main/binary-mips/unionfs-modules-2.6-r5k-ip32_2.6.18-7+etch3_mips.deb stable/main/binary-mips/squashfs-modules-2.6-r4k-ip22_2.6.18-7+etch3_mips.deb stable/main/binary-mips/squashfs-modules-2.6-sb1-bcm91250a_2.6.18-7+etch3_mips.deb stable/main/binary-mips/redhat-cluster-modules-2.6-sb1-bcm91250a_2.6.18-7+etch3_mips.deb stable/main/binary-mips/redhat-cluster-modules-2.6-sb1a-bcm91480b_2.6.18-7+etch3_mips.deb stable/main/binary-mips/squashfs-modules-2.6.18-5-sb1-bcm91250a_2.6.18+3.1r2-7+etch3_mips.deb linux-modules-extra-2.6 (2.6.18-7+etch3) stable; urgency=high * Building against 2.6.18-5 stable/main/binary-ia64/squashfs-modules-2.6-itanium_2.6.18-7+etch3_ia64.deb stable/main/binary-ia64/redhat-cluster-modules-2.6-mckinley_2.6.18-7+etch3_ia64.deb stable/main/binary-ia64/squashfs-modules-2.6-mckinley_2.6.18-7+etch3_ia64.deb stable/main/binary-ia64/squashfs-modules-2.6.18-5-mckinley_2.6.18+3.1r2-7+etch3_ia64.deb stable/main/binary-ia64/redhat-cluster-modules-2.6.18-5-itanium_2.6.18+1.03.00-7+etch3_ia64.deb stable/main/binary-ia64/redhat-cluster-modules-2.6-itanium_2.6.18-7+etch3_ia64.deb stable/main/binary-ia64/squashfs-modules-2.6.18-5-itanium_2.6.18+3.1r2-7+etch3_ia64.deb stable/main/binary-ia64/unionfs-modules-2.6-mckinley_2.6.18-7+etch3_ia64.deb stable/main/binary-ia64/redhat-cluster-modules-2.6.18-5-mckinley_2.6.18+1.03.00-7+etch3_ia64.deb stable/main/binary-ia64/unionfs-modules-2.6-itanium_2.6.18-7+etch3_ia64.deb stable/main/binary-ia64/unionfs-modules-2.6.18-5-mckinley_2.6.18+1.4+debian-7+etch3_ia64.deb stable/main/binary-ia64/unionfs-modules-2.6.18-5-itanium_2.6.18+1.4+debian-7+etch3_ia64.deb linux-modules-extra-2.6 (2.6.18-7+etch3) stable; urgency=high * Building against 2.6.18-5 stable/main/binary-i386/redhat-cluster-modules-2.6-vserver-k7_2.6.18-7+etch3_i386.deb stable/main/binary-i386/gspca-modules-2.6-k7_2.6.18-7+etch3_i386.deb stable/main/binary-i386/unionfs-modules-2.6-686_2.6.18-7+etch3_i386.deb stable/main/binary-i386/gspca-modules-2.6.18-5-686-bigmem_2.6.18+01.00.04-7+etch3_i386.deb stable/main/binary-i386/gspca-modules-2.6.18-5-686_2.6.18+01.00.04-7+etch3_i386.deb stable/main/binary-i386/squashfs-modules-2.6-amd64_2.6.18-7+etch3_i386.deb stable/main/binary-i386/squashfs-modules-2.6.18-5-486_2.6.18+3.1r2-7+etch3_i386.deb stable/main/binary-i386/squashfs-modules-2.6.18-5-xen-vserver-686_2.6.18+3.1r2-7+etch3_i386.deb stable/main/binary-i386/redhat-cluster-modules-2.6-k7_2.6.18-7+etch3_i386.deb stable/main/binary-i386/redhat-cluster-modules-2.6-vserver-686_2.6.18-7+etch3_i386.deb stable/main/binary-i386/unionfs-modules-2.6-amd64_2.6.18-7+etch3_i386.deb stable/main/binary-i386/redhat-cluster-modules-2.6.18-5-k7_2.6.18+1.03.00-7+etch3_i386.deb stable/main/binary-i386/redhat-cluster-modules-2.6-xen-vserver-686_2.6.18-7+etch3_i386.deb stable/main/binary-i386/redhat-cluster-modules-2.6-xen-686_2.6.18-7+etch3_i386.deb stable/main/binary-i386/redhat-cluster-modules-2.6.18-5-xen-vserver-686_2.6.18+1.03.00-7+etch3_i386.deb stable/main/binary-i386/redhat-cluster-modules-2.6-686-bigmem_2.6.18-7+etch3_i386.deb stable/main/binary-i386/redhat-cluster-modules-2.6.18-5-xen-686_2.6.18+1.03.00-7+etch3_i386.deb stable/main/binary-i386/redhat-cluster-modules-2.6-686_2.6.18-7+etch3_i386.deb stable/main/binary-i386/squashfs-modules-2.6-486_2.6.18-7+etch3_i386.deb stable/main/binary-i386/gspca-modules-2.6-amd64_2.6.18-7+etch3_i386.deb stable/main/binary-i386/unionfs-modules-2.6-686-bigmem_2.6.18-7+etch3_i386.deb stable/main/binary-i386/squashfs-modules-2.6.18-5-k7_2.6.18+3.1r2-7+etch3_i386.deb stable/main/binary-i386/redhat-cluster-modules-2.6.18-5-amd64_2.6.18+1.03.00-7+etch3_i386.deb stable/main/binary-i386/squashfs-modules-2.6.18-5-vserver-k7_2.6.18+3.1r2-7+etch3_i386.deb stable/main/binary-i386/unionfs-modules-2.6.18-5-k7_2.6.18+1.4+debian-7+etch3_i386.deb stable/main/binary-i386/squashfs-modules-2.6.18-5-xen-686_2.6.18+3.1r2-7+etch3_i386.deb stable/main/binary-i386/squashfs-modules-2.6-vserver-686_2.6.18-7+etch3_i386.deb stable/main/binary-i386/gspca-modules-2.6-xen-686_2.6.18-7+etch3_i386.deb stable/main/binary-i386/gspca-modules-2.6.18-5-xen-vserver-686_2.6.18+01.00.04-7+etch3_i386.deb stable/main/binary-i386/redhat-cluster-modules-2.6-amd64_2.6.18-7+etch3_i386.deb stable/main/binary-i386/gspca-modules-2.6.18-5-amd64_2.6.18+01.00.04-7+etch3_i386.deb stable/main/binary-i386/unionfs-modules-2.6-486_2.6.18-7+etch3_i386.deb stable/main/binary-i386/squashfs-modules-2.6.18-5-vserver-686_2.6.18+3.1r2-7+etch3_i386.deb stable/main/binary-i386/redhat-cluster-modules-2.6.18-5-vserver-k7_2.6.18+1.03.00-7+etch3_i386.deb stable/main/binary-i386/squashfs-modules-2.6-vserver-k7_2.6.18-7+etch3_i386.deb stable/main/binary-i386/gspca-modules-2.6.18-5-vserver-k7_2.6.18+01.00.04-7+etch3_i386.deb stable/main/binary-i386/squashfs-modules-2.6.18-5-amd64_2.6.18+3.1r2-7+etch3_i386.deb stable/main/binary-i386/unionfs-modules-2.6.18-5-amd64_2.6.18+1.4+debian-7+etch3_i386.deb stable/main/binary-i386/redhat-cluster-modules-2.6.18-5-486_2.6.18+1.03.00-7+etch3_i386.deb stable/main/binary-i386/redhat-cluster-modules-2.6.18-5-vserver-686_2.6.18+1.03.00-7+etch3_i386.deb stable/main/binary-i386/gspca-modules-2.6-vserver-686_2.6.18-7+etch3_i386.deb stable/main/binary-i386/squashfs-modules-2.6.18-5-686-bigmem_2.6.18+3.1r2-7+etch3_i386.deb stable/main/binary-i386/gspca-modules-2.6-xen-vserver-686_2.6.18-7+etch3_i386.deb stable/main/binary-i386/unionfs-modules-2.6.18-5-486_2.6.18+1.4+debian-7+etch3_i386.deb stable/main/binary-i386/redhat-cluster-modules-2.6.18-5-686_2.6.18+1.03.00-7+etch3_i386.deb stable/main/binary-i386/gspca-modules-2.6.18-5-vserver-686_2.6.18+01.00.04-7+etch3_i386.deb stable/main/binary-i386/squashfs-modules-2.6-xen-vserver-686_2.6.18-7+etch3_i386.deb stable/main/binary-i386/gspca-modules-2.6.18-5-k7_2.6.18+01.00.04-7+etch3_i386.deb stable/main/binary-i386/gspca-modules-2.6.18-5-xen-686_2.6.18+01.00.04-7+etch3_i386.deb stable/main/binary-i386/squashfs-modules-2.6-686-bigmem_2.6.18-7+etch3_i386.deb stable/main/binary-i386/squashfs-modules-2.6-686_2.6.18-7+etch3_i386.deb stable/main/binary-i386/squashfs-modules-2.6-xen-686_2.6.18-7+etch3_i386.deb stable/main/binary-i386/squashfs-modules-2.6-k7_2.6.18-7+etch3_i386.deb stable/main/binary-i386/gspca-modules-2.6.18-5-486_2.6.18+01.00.04-7+etch3_i386.deb stable/main/binary-i386/gspca-modules-2.6-vserver-k7_2.6.18-7+etch3_i386.deb stable/main/binary-i386/gspca-modules-2.6-486_2.6.18-7+etch3_i386.deb stable/main/binary-i386/redhat-cluster-modules-2.6.18-5-686-bigmem_2.6.18+1.03.00-7+etch3_i386.deb stable/main/binary-i386/unionfs-modules-2.6-k7_2.6.18-7+etch3_i386.deb stable/main/binary-i386/redhat-cluster-modules-2.6-486_2.6.18-7+etch3_i386.deb stable/main/binary-i386/unionfs-modules-2.6.18-5-686-bigmem_2.6.18+1.4+debian-7+etch3_i386.deb stable/main/binary-i386/gspca-modules-2.6-686-bigmem_2.6.18-7+etch3_i386.deb stable/main/binary-i386/gspca-modules-2.6-686_2.6.18-7+etch3_i386.deb stable/main/binary-i386/unionfs-modules-2.6.18-5-686_2.6.18+1.4+debian-7+etch3_i386.deb stable/main/binary-i386/squashfs-modules-2.6.18-5-686_2.6.18+3.1r2-7+etch3_i386.deb linux-modules-extra-2.6 (2.6.18-7+etch3) stable; urgency=high * Building against 2.6.18-5 stable/main/binary-hppa/unionfs-modules-2.6-parisc-smp_2.6.18-7+etch3_hppa.deb stable/main/binary-hppa/redhat-cluster-modules-2.6-parisc64_2.6.18-7+etch3_hppa.deb stable/main/binary-hppa/unionfs-modules-2.6-parisc64_2.6.18-7+etch3_hppa.deb stable/main/binary-hppa/redhat-cluster-modules-2.6-parisc_2.6.18-7+etch3_hppa.deb stable/main/binary-hppa/redhat-cluster-modules-2.6.18-5-parisc_2.6.18+1.03.00-7+etch3_hppa.deb stable/main/binary-hppa/unionfs-modules-2.6.18-5-parisc64-smp_2.6.18+1.4+debian-7+etch3_hppa.deb stable/main/binary-hppa/redhat-cluster-modules-2.6-parisc64-smp_2.6.18-7+etch3_hppa.deb stable/main/binary-hppa/unionfs-modules-2.6-parisc64-smp_2.6.18-7+etch3_hppa.deb stable/main/binary-hppa/redhat-cluster-modules-2.6-parisc-smp_2.6.18-7+etch3_hppa.deb stable/main/binary-hppa/redhat-cluster-modules-2.6.18-5-parisc64-smp_2.6.18+1.03.00-7+etch3_hppa.deb stable/main/binary-hppa/unionfs-modules-2.6.18-5-parisc-smp_2.6.18+1.4+debian-7+etch3_hppa.deb stable/main/binary-hppa/unionfs-modules-2.6-parisc_2.6.18-7+etch3_hppa.deb stable/main/binary-hppa/unionfs-modules-2.6.18-5-parisc_2.6.18+1.4+debian-7+etch3_hppa.deb stable/main/binary-hppa/redhat-cluster-modules-2.6.18-5-parisc64_2.6.18+1.03.00-7+etch3_hppa.deb stable/main/binary-hppa/unionfs-modules-2.6.18-5-parisc64_2.6.18+1.4+debian-7+etch3_hppa.deb stable/main/binary-hppa/redhat-cluster-modules-2.6.18-5-parisc-smp_2.6.18+1.03.00-7+etch3_hppa.deb linux-modules-extra-2.6 (2.6.18-7+etch3) stable; urgency=high * Building against 2.6.18-5 stable/main/binary-arm/unionfs-modules-2.6-iop32x_2.6.18-7+etch3_arm.deb stable/main/binary-arm/unionfs-modules-2.6.18-5-rpc_2.6.18+1.4+debian-7+etch3_arm.deb stable/main/binary-arm/unionfs-modules-2.6.18-5-ixp4xx_2.6.18+1.4+debian-7+etch3_arm.deb stable/main/binary-arm/redhat-cluster-modules-2.6.18-5-iop32x_2.6.18+1.03.00-7+etch3_arm.deb stable/main/binary-arm/unionfs-modules-2.6.18-5-s3c2410_2.6.18+1.4+debian-7+etch3_arm.deb stable/main/binary-arm/unionfs-modules-2.6-s3c2410_2.6.18-7+etch3_arm.deb stable/main/binary-arm/unionfs-modules-2.6-rpc_2.6.18-7+etch3_arm.deb stable/main/binary-arm/redhat-cluster-modules-2.6-ixp4xx_2.6.18-7+etch3_arm.deb stable/main/binary-arm/redhat-cluster-modules-2.6-s3c2410_2.6.18-7+etch3_arm.deb stable/main/binary-arm/unionfs-modules-2.6-footbridge_2.6.18-7+etch3_arm.deb stable/main/binary-arm/redhat-cluster-modules-2.6.18-5-footbridge_2.6.18+1.03.00-7+etch3_arm.deb stable/main/binary-arm/unionfs-modules-2.6.18-5-footbridge_2.6.18+1.4+debian-7+etch3_arm.deb stable/main/binary-arm/redhat-cluster-modules-2.6-footbridge_2.6.18-7+etch3_arm.deb stable/main/binary-arm/redhat-cluster-modules-2.6.18-5-rpc_2.6.18+1.03.00-7+etch3_arm.deb stable/main/binary-arm/redhat-cluster-modules-2.6.18-5-s3c2410_2.6.18+1.03.00-7+etch3_arm.deb stable/main/binary-arm/unionfs-modules-2.6-ixp4xx_2.6.18-7+etch3_arm.deb stable/main/binary-arm/unionfs-modules-2.6.18-5-iop32x_2.6.18+1.4+debian-7+etch3_arm.deb stable/main/binary-arm/redhat-cluster-modules-2.6.18-5-ixp4xx_2.6.18+1.03.00-7+etch3_arm.deb stable/main/binary-arm/redhat-cluster-modules-2.6-rpc_2.6.18-7+etch3_arm.deb stable/main/binary-arm/redhat-cluster-modules-2.6-iop32x_2.6.18-7+etch3_arm.deb linux-modules-extra-2.6 (2.6.18-7+etch3) stable; urgency=high * Building against 2.6.18-5 stable/main/binary-amd64/squashfs-modules-2.6.18-5-xen-vserver-amd64_2.6.18+3.1r2-7+etch3_amd64.deb stable/main/binary-amd64/gspca-modules-2.6-xen-vserver-amd64_2.6.18-7+etch3_amd64.deb stable/main/binary-amd64/unionfs-modules-2.6.18-5-amd64_2.6.18+1.4+debian-7+etch3_amd64.deb stable/main/binary-amd64/squashfs-modules-2.6.18-5-amd64_2.6.18+3.1r2-7+etch3_amd64.deb stable/main/binary-amd64/redhat-cluster-modules-2.6-xen-vserver-amd64_2.6.18-7+etch3_amd64.deb stable/main/binary-amd64/gspca-modules-2.6-amd64_2.6.18-7+etch3_amd64.deb stable/main/binary-amd64/squashfs-modules-2.6-vserver-amd64_2.6.18-7+etch3_amd64.deb stable/main/binary-amd64/gspca-modules-2.6-vserver-amd64_2.6.18-7+etch3_amd64.deb stable/main/binary-amd64/unionfs-modules-2.6-amd64_2.6.18-7+etch3_amd64.deb stable/main/binary-amd64/squashfs-modules-2.6-amd64_2.6.18-7+etch3_amd64.deb stable/main/binary-amd64/squashfs-modules-2.6-xen-vserver-amd64_2.6.18-7+etch3_amd64.deb stable/main/binary-amd64/redhat-cluster-modules-2.6-amd64_2.6.18-7+etch3_amd64.deb stable/main/binary-amd64/squashfs-modules-2.6-xen-amd64_2.6.18-7+etch3_amd64.deb stable/main/binary-amd64/redhat-cluster-modules-2.6.18-5-xen-amd64_2.6.18+1.03.00-7+etch3_amd64.deb stable/main/binary-amd64/gspca-modules-2.6-xen-amd64_2.6.18-7+etch3_amd64.deb stable/main/binary-amd64/gspca-modules-2.6.18-5-xen-vserver-amd64_2.6.18+01.00.04-7+etch3_amd64.deb stable/main/binary-amd64/gspca-modules-2.6.18-5-amd64_2.6.18+01.00.04-7+etch3_amd64.deb stable/main/binary-amd64/redhat-cluster-modules-2.6.18-5-amd64_2.6.18+1.03.00-7+etch3_amd64.deb stable/main/binary-amd64/redhat-cluster-modules-2.6-vserver-amd64_2.6.18-7+etch3_amd64.deb stable/main/binary-amd64/gspca-modules-2.6.18-5-vserver-amd64_2.6.18+01.00.04-7+etch3_amd64.deb stable/main/binary-amd64/squashfs-modules-2.6.18-5-xen-amd64_2.6.18+3.1r2-7+etch3_amd64.deb stable/main/binary-amd64/squashfs-modules-2.6.18-5-vserver-amd64_2.6.18+3.1r2-7+etch3_amd64.deb stable/main/binary-amd64/redhat-cluster-modules-2.6-xen-amd64_2.6.18-7+etch3_amd64.deb stable/main/binary-amd64/redhat-cluster-modules-2.6.18-5-vserver-amd64_2.6.18+1.03.00-7+etch3_amd64.deb stable/main/binary-amd64/redhat-cluster-modules-2.6.18-5-xen-vserver-amd64_2.6.18+1.03.00-7+etch3_amd64.deb stable/main/binary-amd64/gspca-modules-2.6.18-5-xen-amd64_2.6.18+01.00.04-7+etch3_amd64.deb linux-modules-extra-2.6 (2.6.18-7+etch3) stable; urgency=high * Building against 2.6.18-5 stable/main/binary-alpha/squashfs-modules-2.6-alpha-generic_2.6.18-7+etch3_alpha.deb stable/main/binary-alpha/unionfs-modules-2.6.18-5-alpha-smp_2.6.18+1.4+debian-7+etch3_alpha.deb stable/main/binary-alpha/unionfs-modules-2.6.18-5-alpha-legacy_2.6.18+1.4+debian-7+etch3_alpha.deb stable/main/binary-alpha/redhat-cluster-modules-2.6.18-5-vserver-alpha_2.6.18+1.03.00-7+etch3_alpha.deb stable/main/binary-alpha/redhat-cluster-modules-2.6.18-5-alpha-legacy_2.6.18+1.03.00-7+etch3_alpha.deb stable/main/binary-alpha/unionfs-modules-2.6-alpha-legacy_2.6.18-7+etch3_alpha.deb stable/main/binary-alpha/squashfs-modules-2.6-alpha-legacy_2.6.18-7+etch3_alpha.deb stable/main/binary-alpha/redhat-cluster-modules-2.6.18-5-alpha-generic_2.6.18+1.03.00-7+etch3_alpha.deb stable/main/binary-alpha/redhat-cluster-modules-2.6-alpha-generic_2.6.18-7+etch3_alpha.deb stable/main/binary-alpha/squashfs-modules-2.6.18-5-vserver-alpha_2.6.18+3.1r2-7+etch3_alpha.deb stable/main/binary-alpha/redhat-cluster-modules-2.6-vserver-alpha_2.6.18-7+etch3_alpha.deb stable/main/binary-alpha/squashfs-modules-2.6.18-5-alpha-legacy_2.6.18+3.1r2-7+etch3_alpha.deb stable/main/binary-alpha/squashfs-modules-2.6-alpha-smp_2.6.18-7+etch3_alpha.deb stable/main/binary-alpha/redhat-cluster-modules-2.6-alpha-smp_2.6.18-7+etch3_alpha.deb stable/main/binary-alpha/unionfs-modules-2.6.18-5-alpha-generic_2.6.18+1.4+debian-7+etch3_alpha.deb stable/main/binary-alpha/redhat-cluster-modules-2.6.18-5-alpha-smp_2.6.18+1.03.00-7+etch3_alpha.deb stable/main/binary-alpha/squashfs-modules-2.6.18-5-alpha-smp_2.6.18+3.1r2-7+etch3_alpha.deb stable/main/binary-alpha/redhat-cluster-modules-2.6-alpha-legacy_2.6.18-7+etch3_alpha.deb stable/main/binary-alpha/unionfs-modules-2.6-alpha-generic_2.6.18-7+etch3_alpha.deb stable/main/binary-alpha/squashfs-modules-2.6-vserver-alpha_2.6.18-7+etch3_alpha.deb stable/main/binary-alpha/squashfs-modules-2.6.18-5-alpha-generic_2.6.18+3.1r2-7+etch3_alpha.deb stable/main/binary-alpha/unionfs-modules-2.6-alpha-smp_2.6.18-7+etch3_alpha.deb linux-modules-extra-2.6 (2.6.18-7+etch3) stable; urgency=high * Building against 2.6.18-5 stable/main/source/linux-modules-extra-2.6_2.6.18-7+etch3.dsc stable/main/binary-sparc/unionfs-modules-2.6.18-5-sparc64-smp_2.6.18+1.4+debian-7+etch3_sparc.deb stable/main/binary-sparc/unionfs-modules-2.6.18-5-sparc64_2.6.18+1.4+debian-7+etch3_sparc.deb stable/main/binary-sparc/squashfs-modules-2.6-sparc64_2.6.18-7+etch3_sparc.deb stable/main/binary-sparc/redhat-cluster-modules-2.6-sparc64_2.6.18-7+etch3_sparc.deb stable/main/binary-sparc/squashfs-modules-2.6.18-5-sparc64-smp_2.6.18+3.1r2-7+etch3_sparc.deb stable/main/binary-sparc/squashfs-modules-2.6.18-5-sparc32_2.6.18+3.1r2-7+etch3_sparc.deb stable/main/binary-sparc/squashfs-modules-2.6.18-5-sparc64_2.6.18+3.1r2-7+etch3_sparc.deb stable/main/binary-sparc/redhat-cluster-modules-2.6.18-5-sparc64-smp_2.6.18+1.03.00-7+etch3_sparc.deb stable/main/binary-sparc/redhat-cluster-modules-2.6-sparc32_2.6.18-7+etch3_sparc.deb stable/main/binary-sparc/unionfs-modules-2.6-sparc64_2.6.18-7+etch3_sparc.deb stable/main/binary-sparc/squashfs-modules-2.6-vserver-sparc64_2.6.18-7+etch3_sparc.deb stable/main/binary-sparc/redhat-cluster-modules-2.6-vserver-sparc64_2.6.18-7+etch3_sparc.deb stable/main/binary-sparc/squashfs-modules-2.6-sparc64-smp_2.6.18-7+etch3_sparc.deb stable/main/binary-sparc/unionfs-modules-2.6-sparc32_2.6.18-7+etch3_sparc.deb stable/main/binary-sparc/redhat-cluster-modules-2.6-sparc64-smp_2.6.18-7+etch3_sparc.deb stable/main/binary-sparc/redhat-cluster-modules-2.6.18-5-sparc32_2.6.18+1.03.00-7+etch3_sparc.deb stable/main/binary-sparc/redhat-cluster-modules-2.6.18-5-vserver-sparc64_2.6.18+1.03.00-7+etch3_sparc.deb stable/main/binary-sparc/squashfs-modules-2.6.18-5-vserver-sparc64_2.6.18+3.1r2-7+etch3_sparc.deb stable/main/source/linux-modules-extra-2.6_2.6.18-7+etch3.tar.gz stable/main/binary-sparc/squashfs-modules-2.6-sparc32_2.6.18-7+etch3_sparc.deb stable/main/binary-sparc/redhat-cluster-modules-2.6.18-5-sparc64_2.6.18+1.03.00-7+etch3_sparc.deb stable/main/binary-sparc/unionfs-modules-2.6-sparc64-smp_2.6.18-7+etch3_sparc.deb stable/main/binary-sparc/unionfs-modules-2.6.18-5-sparc32_2.6.18+1.4+debian-7+etch3_sparc.deb linux-modules-extra-2.6 (2.6.18-7+etch3) stable; urgency=high * Building against 2.6.18-5 stable/main/source/linux-modules-di-sparc-2.6_1.04etch1.tar.gz stable/main/source/linux-modules-di-sparc-2.6_1.04etch1.dsc stable/main/binary-sparc/loop-aes-modules-2.6.18-5-sparc64-di_1.04etch1_sparc.udeb stable/main/binary-sparc/loop-aes-modules-2.6.18-5-sparc32-di_1.04etch1_sparc.udeb linux-modules-di-sparc-2.6 (1.04etch1) stable; urgency=low * Update to loop-aes 3.1d-13etch1 (2.6.18-5) stable/main/source/linux-modules-di-s390-2.6_1.01etch1.tar.gz stable/main/binary-s390/loop-aes-modules-2.6.18-5-s390-di_1.01etch1_s390.udeb stable/main/source/linux-modules-di-s390-2.6_1.01etch1.dsc linux-modules-di-s390-2.6 (1.01etch1) stable; urgency=low * Update to loop-aes 3.1d-13etch1 (2.6.18-5) stable/main/binary-powerpc/loop-aes-modules-2.6.18-5-powerpc-miboot-di_1.03etch1_powerpc.udeb stable/main/binary-powerpc/loop-aes-modules-2.6.18-5-powerpc-di_1.03etch1_powerpc.udeb stable/main/binary-powerpc/loop-aes-modules-2.6.18-5-powerpc64-di_1.03etch1_powerpc.udeb stable/main/source/linux-modules-di-powerpc-2.6_1.03etch1.tar.gz stable/main/source/linux-modules-di-powerpc-2.6_1.03etch1.dsc stable/main/binary-powerpc/loop-aes-modules-2.6.18-5-prep-di_1.03etch1_powerpc.udeb linux-modules-di-powerpc-2.6 (1.03etch1) stable; urgency=low * Update to loop-aes 3.1d-13etch1 (2.6.18-5) stable/main/binary-mipsel/loop-aes-modules-2.6.18-5-r5k-cobalt-di_1.03etch1_mipsel.udeb stable/main/binary-mipsel/loop-aes-modules-2.6.18-5-sb1-bcm91250a-di_1.03etch1_mipsel.udeb stable/main/binary-mipsel/loop-aes-modules-2.6.18-5-r3k-kn02-di_1.03etch1_mipsel.udeb stable/main/source/linux-modules-di-mipsel-2.6_1.03etch1.tar.gz stable/main/source/linux-modules-di-mipsel-2.6_1.03etch1.dsc stable/main/binary-mipsel/loop-aes-modules-2.6.18-5-r4k-kn04-di_1.03etch1_mipsel.udeb stable/main/binary-mipsel/loop-aes-modules-2.6.18-5-qemu-di_1.03etch1_mipsel.udeb stable/main/binary-mipsel/loop-aes-modules-2.6.18-5-sb1a-bcm91480b-di_1.03etch1_mipsel.udeb linux-modules-di-mipsel-2.6 (1.03etch1) stable; urgency=low * Update to loop-aes 3.1d-13etch1 (2.6.18-5) stable/main/binary-mips/loop-aes-modules-2.6.18-5-sb1a-bcm91480b-di_1.01etch1_mips.udeb stable/main/binary-mips/loop-aes-modules-2.6.18-5-r4k-ip22-di_1.01etch1_mips.udeb stable/main/source/linux-modules-di-mips-2.6_1.01etch1.dsc stable/main/binary-mips/loop-aes-modules-2.6.18-5-r5k-ip32-di_1.01etch1_mips.udeb stable/main/binary-mips/loop-aes-modules-2.6.18-5-qemu-di_1.01etch1_mips.udeb stable/main/binary-mips/loop-aes-modules-2.6.18-5-sb1-bcm91250a-di_1.01etch1_mips.udeb stable/main/source/linux-modules-di-mips-2.6_1.01etch1.tar.gz linux-modules-di-mips-2.6 (1.01etch1) stable; urgency=low * Update to loop-aes 3.1d-13etch1 (2.6.18-5) stable/main/binary-ia64/loop-aes-modules-2.6.18-5-itanium-di_1.02etch1_ia64.udeb stable/main/source/linux-modules-di-ia64-2.6_1.02etch1.dsc stable/main/source/linux-modules-di-ia64-2.6_1.02etch1.tar.gz linux-modules-di-ia64-2.6 (1.02etch1) stable; urgency=low * Update to loop-aes 3.1d-13etch1 (2.6.18-5) stable/main/source/linux-modules-di-i386-2.6_1.03etch1.tar.gz stable/main/source/linux-modules-di-i386-2.6_1.03etch1.dsc stable/main/binary-i386/loop-aes-modules-2.6.18-5-486-di_1.03etch1_i386.udeb linux-modules-di-i386-2.6 (1.03etch1) stable; urgency=low * Update to loop-aes 3.1d-13etch1 (2.6.18-5) stable/main/binary-hppa/loop-aes-modules-2.6.18-5-parisc64-di_1.03etch1_hppa.udeb stable/main/source/linux-modules-di-hppa-2.6_1.03etch1.tar.gz stable/main/source/linux-modules-di-hppa-2.6_1.03etch1.dsc stable/main/binary-hppa/loop-aes-modules-2.6.18-5-parisc-di_1.03etch1_hppa.udeb linux-modules-di-hppa-2.6 (1.03etch1) stable; urgency=low * Update to loop-aes 3.1d-13etch1 (2.6.18-5) stable/main/source/linux-modules-di-arm-2.6_1.04etch1.tar.gz stable/main/binary-arm/loop-aes-modules-2.6.18-5-footbridge-di_1.04etch1_arm.udeb stable/main/binary-arm/loop-aes-modules-2.6.18-5-iop32x-di_1.04etch1_arm.udeb stable/main/source/linux-modules-di-arm-2.6_1.04etch1.dsc stable/main/binary-arm/loop-aes-modules-2.6.18-5-rpc-di_1.04etch1_arm.udeb stable/main/binary-arm/loop-aes-modules-2.6.18-5-ixp4xx-di_1.04etch1_arm.udeb linux-modules-di-arm-2.6 (1.04etch1) stable; urgency=low * Update to loop-aes 3.1d-13etch1 (2.6.18-5) stable/main/source/linux-modules-di-amd64-2.6_1.03etch1.dsc stable/main/binary-amd64/loop-aes-modules-2.6.18-5-amd64-di_1.03etch1_amd64.udeb stable/main/source/linux-modules-di-amd64-2.6_1.03etch1.tar.gz linux-modules-di-amd64-2.6 (1.03etch1) stable; urgency=low * Update to loop-aes 3.1d-13etch1 (2.6.18-5) stable/main/source/linux-modules-di-alpha-2.6_1.03etch1.tar.gz stable/main/source/linux-modules-di-alpha-2.6_1.03etch1.dsc stable/main/binary-alpha/loop-aes-modules-2.6.18-5-alpha-generic-di_1.03etch1_alpha.udeb linux-modules-di-alpha-2.6 (1.03etch1) stable; urgency=low * Update to loop-aes 3.1d-13etch1 (2.6.18-5) stable/contrib/binary-powerpc/ivtv-modules-2.6-powerpc64_2.6.18-4+etch2_powerpc.deb stable/contrib/binary-powerpc/ivtv-modules-2.6.18-5-prep_2.6.18+0.8.2-4+etch2_powerpc.deb stable/contrib/binary-powerpc/ivtv-modules-2.6.18-5-vserver-powerpc_2.6.18+0.8.2-4+etch2_powerpc.deb stable/contrib/binary-powerpc/ivtv-modules-2.6-vserver-powerpc_2.6.18-4+etch2_powerpc.deb stable/contrib/binary-powerpc/ivtv-modules-2.6.18-5-powerpc_2.6.18+0.8.2-4+etch2_powerpc.deb stable/contrib/binary-powerpc/ivtv-modules-2.6.18-5-powerpc-smp_2.6.18+0.8.2-4+etch2_powerpc.deb stable/contrib/binary-powerpc/ivtv-modules-2.6.18-5-powerpc64_2.6.18+0.8.2-4+etch2_powerpc.deb stable/contrib/binary-powerpc/ivtv-modules-2.6.18-5-powerpc-miboot_2.6.18+0.8.2-4+etch2_powerpc.deb stable/contrib/binary-powerpc/ivtv-modules-2.6.18-5-vserver-powerpc64_2.6.18+0.8.2-4+etch2_powerpc.deb stable/contrib/binary-powerpc/ivtv-modules-2.6-powerpc-smp_2.6.18-4+etch2_powerpc.deb stable/contrib/binary-powerpc/ivtv-modules-2.6-vserver-powerpc64_2.6.18-4+etch2_powerpc.deb stable/contrib/binary-powerpc/ivtv-modules-2.6-powerpc-miboot_2.6.18-4+etch2_powerpc.deb stable/contrib/binary-powerpc/ivtv-modules-2.6-powerpc_2.6.18-4+etch2_powerpc.deb stable/contrib/binary-powerpc/ivtv-modules-2.6-prep_2.6.18-4+etch2_powerpc.deb linux-modules-contrib-2.6 (2.6.18-4+etch2) stable; urgency=high * Building against 2.6.18-5. stable/contrib/binary-ia64/ivtv-modules-2.6-mckinley_2.6.18-4+etch2_ia64.deb stable/contrib/binary-ia64/ivtv-modules-2.6-itanium_2.6.18-4+etch2_ia64.deb stable/contrib/binary-ia64/ivtv-modules-2.6.18-5-mckinley_2.6.18+0.8.2-4+etch2_ia64.deb stable/contrib/binary-ia64/ivtv-modules-2.6.18-5-itanium_2.6.18+0.8.2-4+etch2_ia64.deb linux-modules-contrib-2.6 (2.6.18-4+etch2) stable; urgency=high * Building against 2.6.18-5. stable/contrib/binary-i386/ipw2200-modules-2.6.18-5-686-bigmem_2.6.18+1.2.0-4+etch2_i386.deb stable/contrib/binary-i386/ivtv-modules-2.6.18-5-686-bigmem_2.6.18+0.8.2-4+etch2_i386.deb stable/contrib/binary-i386/ipw2100-modules-2.6-vserver-k7_2.6.18-4+etch2_i386.deb stable/contrib/binary-i386/ivtv-modules-2.6.18-5-vserver-686_2.6.18+0.8.2-4+etch2_i386.deb stable/contrib/binary-i386/ipw3945-modules-2.6.18-5-686_2.6.18+1.1.2-4+etch2_i386.deb stable/contrib/binary-i386/ipw2200-modules-2.6.18-5-xen-vserver-686_2.6.18+1.2.0-4+etch2_i386.deb stable/contrib/binary-i386/ipw3945-modules-2.6-k7_2.6.18-4+etch2_i386.deb stable/contrib/binary-i386/ivtv-modules-2.6-686-bigmem_2.6.18-4+etch2_i386.deb stable/contrib/binary-i386/ipw2100-modules-2.6-xen-vserver-686_2.6.18-4+etch2_i386.deb stable/contrib/binary-i386/ipw2200-modules-2.6-vserver-k7_2.6.18-4+etch2_i386.deb stable/contrib/binary-i386/ivtv-modules-2.6-k7_2.6.18-4+etch2_i386.deb stable/contrib/binary-i386/ivtv-modules-2.6-amd64_2.6.18-4+etch2_i386.deb stable/contrib/binary-i386/ipw2100-modules-2.6-k7_2.6.18-4+etch2_i386.deb stable/contrib/binary-i386/ipw2200-modules-2.6-xen-vserver-686_2.6.18-4+etch2_i386.deb stable/contrib/binary-i386/ivtv-modules-2.6-xen-686_2.6.18-4+etch2_i386.deb stable/contrib/binary-i386/ipw2100-modules-2.6.18-5-686-bigmem_2.6.18+1.2.1-4+etch2_i386.deb stable/contrib/binary-i386/ivtv-modules-2.6.18-5-xen-686_2.6.18+0.8.2-4+etch2_i386.deb stable/contrib/binary-i386/ipw2100-modules-2.6-686_2.6.18-4+etch2_i386.deb stable/contrib/binary-i386/ipw2100-modules-2.6.18-5-vserver-k7_2.6.18+1.2.1-4+etch2_i386.deb stable/contrib/binary-i386/ipw2100-modules-2.6.18-5-xen-vserver-686_2.6.18+1.2.1-4+etch2_i386.deb stable/contrib/binary-i386/ivtv-modules-2.6.18-5-686_2.6.18+0.8.2-4+etch2_i386.deb stable/contrib/binary-i386/ipw3945-modules-2.6.18-5-486_2.6.18+1.1.2-4+etch2_i386.deb stable/contrib/binary-i386/ipw2100-modules-2.6.18-5-amd64_2.6.18+1.2.1-4+etch2_i386.deb stable/contrib/binary-i386/ivtv-modules-2.6-xen-vserver-686_2.6.18-4+etch2_i386.deb stable/contrib/binary-i386/ipw3945-modules-2.6-amd64_2.6.18-4+etch2_i386.deb stable/contrib/binary-i386/ivtv-modules-2.6-vserver-k7_2.6.18-4+etch2_i386.deb stable/contrib/binary-i386/ipw2200-modules-2.6-486_2.6.18-4+etch2_i386.deb stable/contrib/binary-i386/ipw3945-modules-2.6-486_2.6.18-4+etch2_i386.deb stable/contrib/binary-i386/ipw2200-modules-2.6.18-5-k7_2.6.18+1.2.0-4+etch2_i386.deb stable/contrib/binary-i386/ipw2200-modules-2.6-k7_2.6.18-4+etch2_i386.deb stable/contrib/binary-i386/ipw2100-modules-2.6-xen-686_2.6.18-4+etch2_i386.deb stable/contrib/binary-i386/ipw2200-modules-2.6.18-5-xen-686_2.6.18+1.2.0-4+etch2_i386.deb stable/contrib/binary-i386/ipw3945-modules-2.6.18-5-k7_2.6.18+1.1.2-4+etch2_i386.deb stable/contrib/binary-i386/ipw3945-modules-2.6.18-5-amd64_2.6.18+1.1.2-4+etch2_i386.deb stable/contrib/binary-i386/ipw2100-modules-2.6-686-bigmem_2.6.18-4+etch2_i386.deb stable/contrib/binary-i386/ipw2200-modules-2.6-686-bigmem_2.6.18-4+etch2_i386.deb stable/contrib/binary-i386/ipw2100-modules-2.6.18-5-vserver-686_2.6.18+1.2.1-4+etch2_i386.deb stable/contrib/binary-i386/ipw2200-modules-2.6-686_2.6.18-4+etch2_i386.deb stable/contrib/binary-i386/ipw3945-modules-2.6-686-bigmem_2.6.18-4+etch2_i386.deb stable/contrib/binary-i386/ipw2100-modules-2.6-486_2.6.18-4+etch2_i386.deb stable/contrib/binary-i386/ipw2200-modules-2.6-vserver-686_2.6.18-4+etch2_i386.deb stable/contrib/binary-i386/ipw2200-modules-2.6.18-5-686_2.6.18+1.2.0-4+etch2_i386.deb stable/contrib/binary-i386/ipw2100-modules-2.6.18-5-686_2.6.18+1.2.1-4+etch2_i386.deb stable/contrib/binary-i386/ivtv-modules-2.6.18-5-vserver-k7_2.6.18+0.8.2-4+etch2_i386.deb stable/contrib/binary-i386/ivtv-modules-2.6-686_2.6.18-4+etch2_i386.deb stable/contrib/binary-i386/ipw2100-modules-2.6-vserver-686_2.6.18-4+etch2_i386.deb stable/contrib/binary-i386/ipw2100-modules-2.6.18-5-486_2.6.18+1.2.1-4+etch2_i386.deb stable/contrib/binary-i386/ipw3945-modules-2.6.18-5-vserver-686_2.6.18+1.1.2-4+etch2_i386.deb stable/contrib/binary-i386/ipw2200-modules-2.6-xen-686_2.6.18-4+etch2_i386.deb stable/contrib/binary-i386/ipw3945-modules-2.6-vserver-k7_2.6.18-4+etch2_i386.deb stable/contrib/binary-i386/ipw3945-modules-2.6-xen-vserver-686_2.6.18-4+etch2_i386.deb stable/contrib/binary-i386/ipw2100-modules-2.6.18-5-xen-686_2.6.18+1.2.1-4+etch2_i386.deb stable/contrib/binary-i386/ipw3945-modules-2.6.18-5-xen-vserver-686_2.6.18+1.1.2-4+etch2_i386.deb stable/contrib/binary-i386/ipw2200-modules-2.6.18-5-486_2.6.18+1.2.0-4+etch2_i386.deb stable/contrib/binary-i386/ipw3945-modules-2.6.18-5-686-bigmem_2.6.18+1.1.2-4+etch2_i386.deb stable/contrib/binary-i386/ivtv-modules-2.6.18-5-xen-vserver-686_2.6.18+0.8.2-4+etch2_i386.deb stable/contrib/binary-i386/ipw3945-modules-2.6-vserver-686_2.6.18-4+etch2_i386.deb stable/contrib/binary-i386/ipw2200-modules-2.6.18-5-amd64_2.6.18+1.2.0-4+etch2_i386.deb stable/contrib/binary-i386/ipw3945-modules-2.6-xen-686_2.6.18-4+etch2_i386.deb stable/contrib/binary-i386/ivtv-modules-2.6-vserver-686_2.6.18-4+etch2_i386.deb stable/contrib/binary-i386/ivtv-modules-2.6.18-5-k7_2.6.18+0.8.2-4+etch2_i386.deb stable/contrib/binary-i386/ipw2200-modules-2.6.18-5-vserver-k7_2.6.18+1.2.0-4+etch2_i386.deb stable/contrib/binary-i386/ipw2200-modules-2.6-amd64_2.6.18-4+etch2_i386.deb stable/contrib/binary-i386/ivtv-modules-2.6.18-5-amd64_2.6.18+0.8.2-4+etch2_i386.deb stable/contrib/binary-i386/ivtv-modules-2.6-486_2.6.18-4+etch2_i386.deb stable/contrib/binary-i386/ipw2200-modules-2.6.18-5-vserver-686_2.6.18+1.2.0-4+etch2_i386.deb stable/contrib/binary-i386/ipw2100-modules-2.6-amd64_2.6.18-4+etch2_i386.deb stable/contrib/binary-i386/ipw3945-modules-2.6-686_2.6.18-4+etch2_i386.deb stable/contrib/binary-i386/ipw3945-modules-2.6.18-5-vserver-k7_2.6.18+1.1.2-4+etch2_i386.deb stable/contrib/binary-i386/ipw2100-modules-2.6.18-5-k7_2.6.18+1.2.1-4+etch2_i386.deb stable/contrib/binary-i386/ivtv-modules-2.6.18-5-486_2.6.18+0.8.2-4+etch2_i386.deb stable/contrib/binary-i386/ipw3945-modules-2.6.18-5-xen-686_2.6.18+1.1.2-4+etch2_i386.deb linux-modules-contrib-2.6 (2.6.18-4+etch2) stable; urgency=high * Building against 2.6.18-5. stable/contrib/binary-hppa/ivtv-modules-2.6-parisc64-smp_2.6.18-4+etch2_hppa.deb stable/contrib/binary-hppa/ivtv-modules-2.6.18-5-parisc-smp_2.6.18+0.8.2-4+etch2_hppa.deb stable/contrib/binary-hppa/ivtv-modules-2.6.18-5-parisc_2.6.18+0.8.2-4+etch2_hppa.deb stable/contrib/binary-hppa/ivtv-modules-2.6-parisc64_2.6.18-4+etch2_hppa.deb stable/contrib/binary-hppa/ivtv-modules-2.6-parisc-smp_2.6.18-4+etch2_hppa.deb stable/contrib/binary-hppa/ivtv-modules-2.6-parisc_2.6.18-4+etch2_hppa.deb stable/contrib/binary-hppa/ivtv-modules-2.6.18-5-parisc64-smp_2.6.18+0.8.2-4+etch2_hppa.deb stable/contrib/binary-hppa/ivtv-modules-2.6.18-5-parisc64_2.6.18+0.8.2-4+etch2_hppa.deb linux-modules-contrib-2.6 (2.6.18-4+etch2) stable; urgency=high * Building against 2.6.18-5. stable/contrib/binary-amd64/ivtv-modules-2.6-vserver-amd64_2.6.18-4+etch2_amd64.deb stable/contrib/binary-amd64/ipw3945-modules-2.6.18-5-xen-vserver-amd64_2.6.18+1.1.2-4+etch2_amd64.deb stable/contrib/binary-amd64/ipw3945-modules-2.6.18-5-amd64_2.6.18+1.1.2-4+etch2_amd64.deb stable/contrib/binary-amd64/ivtv-modules-2.6-amd64_2.6.18-4+etch2_amd64.deb stable/contrib/binary-amd64/ipw3945-modules-2.6-amd64_2.6.18-4+etch2_amd64.deb stable/contrib/binary-amd64/ipw2200-modules-2.6.18-5-amd64_2.6.18+1.2.0-4+etch2_amd64.deb stable/contrib/binary-amd64/ipw2100-modules-2.6.18-5-vserver-amd64_2.6.18+1.2.1-4+etch2_amd64.deb stable/contrib/binary-amd64/ivtv-modules-2.6-xen-amd64_2.6.18-4+etch2_amd64.deb stable/contrib/binary-amd64/ivtv-modules-2.6.18-5-xen-vserver-amd64_2.6.18+0.8.2-4+etch2_amd64.deb stable/contrib/binary-amd64/ivtv-modules-2.6-xen-vserver-amd64_2.6.18-4+etch2_amd64.deb stable/contrib/binary-amd64/ipw2200-modules-2.6-amd64_2.6.18-4+etch2_amd64.deb stable/contrib/binary-amd64/ipw2100-modules-2.6-xen-amd64_2.6.18-4+etch2_amd64.deb stable/contrib/binary-amd64/ipw3945-modules-2.6.18-5-xen-amd64_2.6.18+1.1.2-4+etch2_amd64.deb stable/contrib/binary-amd64/ipw2100-modules-2.6-xen-vserver-amd64_2.6.18-4+etch2_amd64.deb stable/contrib/binary-amd64/ipw3945-modules-2.6-vserver-amd64_2.6.18-4+etch2_amd64.deb stable/contrib/binary-amd64/ipw2200-modules-2.6.18-5-xen-vserver-amd64_2.6.18+1.2.0-4+etch2_amd64.deb stable/contrib/binary-amd64/ipw3945-modules-2.6.18-5-vserver-amd64_2.6.18+1.1.2-4+etch2_amd64.deb stable/contrib/binary-amd64/ivtv-modules-2.6.18-5-xen-amd64_2.6.18+0.8.2-4+etch2_amd64.deb stable/contrib/binary-amd64/ivtv-modules-2.6.18-5-amd64_2.6.18+0.8.2-4+etch2_amd64.deb stable/contrib/binary-amd64/ipw2100-modules-2.6-amd64_2.6.18-4+etch2_amd64.deb stable/contrib/binary-amd64/ipw2100-modules-2.6.18-5-amd64_2.6.18+1.2.1-4+etch2_amd64.deb stable/contrib/binary-amd64/ipw2200-modules-2.6-xen-amd64_2.6.18-4+etch2_amd64.deb stable/contrib/binary-amd64/ipw3945-modules-2.6-xen-vserver-amd64_2.6.18-4+etch2_amd64.deb stable/contrib/binary-amd64/ipw2100-modules-2.6.18-5-xen-amd64_2.6.18+1.2.1-4+etch2_amd64.deb stable/contrib/binary-amd64/ipw2200-modules-2.6-vserver-amd64_2.6.18-4+etch2_amd64.deb stable/contrib/binary-amd64/ivtv-modules-2.6.18-5-vserver-amd64_2.6.18+0.8.2-4+etch2_amd64.deb stable/contrib/binary-amd64/ipw2200-modules-2.6.18-5-vserver-amd64_2.6.18+1.2.0-4+etch2_amd64.deb stable/contrib/binary-amd64/ipw2100-modules-2.6-vserver-amd64_2.6.18-4+etch2_amd64.deb stable/contrib/binary-amd64/ipw2200-modules-2.6.18-5-xen-amd64_2.6.18+1.2.0-4+etch2_amd64.deb stable/contrib/binary-amd64/ipw2100-modules-2.6.18-5-xen-vserver-amd64_2.6.18+1.2.1-4+etch2_amd64.deb stable/contrib/binary-amd64/ipw3945-modules-2.6-xen-amd64_2.6.18-4+etch2_amd64.deb stable/contrib/binary-amd64/ipw2200-modules-2.6-xen-vserver-amd64_2.6.18-4+etch2_amd64.deb linux-modules-contrib-2.6 (2.6.18-4+etch2) stable; urgency=high * Building against 2.6.18-5. stable/contrib/binary-alpha/ivtv-modules-2.6-vserver-alpha_2.6.18-4+etch2_alpha.deb stable/contrib/binary-alpha/ivtv-modules-2.6.18-5-vserver-alpha_2.6.18+0.8.2-4+etch2_alpha.deb stable/contrib/binary-alpha/ivtv-modules-2.6.18-5-alpha-smp_2.6.18+0.8.2-4+etch2_alpha.deb stable/contrib/binary-alpha/ivtv-modules-2.6.18-5-alpha-generic_2.6.18+0.8.2-4+etch2_alpha.deb stable/contrib/binary-alpha/ivtv-modules-2.6-alpha-legacy_2.6.18-4+etch2_alpha.deb stable/contrib/binary-alpha/ivtv-modules-2.6-alpha-generic_2.6.18-4+etch2_alpha.deb stable/contrib/binary-alpha/ivtv-modules-2.6-alpha-smp_2.6.18-4+etch2_alpha.deb stable/contrib/binary-alpha/ivtv-modules-2.6.18-5-alpha-legacy_2.6.18+0.8.2-4+etch2_alpha.deb linux-modules-contrib-2.6 (2.6.18-4+etch2) stable; urgency=high * Building against 2.6.18-5. stable/contrib/binary-sparc/ivtv-modules-2.6.18-5-vserver-sparc64_2.6.18+0.8.2-4+etch2_sparc.deb stable/contrib/source/linux-modules-contrib-2.6_2.6.18-4+etch2.dsc stable/contrib/binary-sparc/ivtv-modules-2.6.18-5-sparc64_2.6.18+0.8.2-4+etch2_sparc.deb stable/contrib/binary-sparc/ivtv-modules-2.6.18-5-sparc64-smp_2.6.18+0.8.2-4+etch2_sparc.deb stable/contrib/binary-sparc/ivtv-modules-2.6-sparc64-smp_2.6.18-4+etch2_sparc.deb stable/contrib/source/linux-modules-contrib-2.6_2.6.18-4+etch2.tar.gz stable/contrib/binary-sparc/ivtv-modules-2.6.18-5-sparc32_2.6.18+0.8.2-4+etch2_sparc.deb stable/contrib/binary-sparc/ivtv-modules-2.6-vserver-sparc64_2.6.18-4+etch2_sparc.deb stable/contrib/binary-sparc/ivtv-modules-2.6-sparc32_2.6.18-4+etch2_sparc.deb stable/contrib/binary-sparc/ivtv-modules-2.6-sparc64_2.6.18-4+etch2_sparc.deb linux-modules-contrib-2.6 (2.6.18-4+etch2) stable; urgency=high * Building against 2.6.18-5. stable/main/binary-sparc/linux-headers-2.6-sparc64_2.6.18+6etch1_sparc.deb stable/main/binary-sparc/kernel-image-2.6-sparc64_2.6.18+6etch1_sparc.deb stable/main/binary-sparc/linux-image-2.6-sparc64_2.6.18+6etch1_sparc.deb stable/main/binary-sparc/linux-image-2.6-sparc32_2.6.18+6etch1_sparc.deb stable/main/binary-sparc/linux-headers-2.6-sparc32_2.6.18+6etch1_sparc.deb stable/main/binary-sparc/linux-image-sparc32_2.6.18+6etch1_sparc.deb stable/main/binary-sparc/linux-image-2.6-vserver-sparc64_2.6.18+6etch1_sparc.deb stable/main/binary-sparc/linux-image-vserver-sparc64_2.6.18+6etch1_sparc.deb stable/main/binary-sparc/linux-image-sparc64_2.6.18+6etch1_sparc.deb stable/main/binary-sparc/linux-headers-2.6-vserver-sparc64_2.6.18+6etch1_sparc.deb stable/main/binary-sparc/linux-image-sparc64-smp_2.6.18+6etch1_sparc.deb stable/main/binary-sparc/kernel-image-2.6-sparc64-smp_2.6.18+6etch1_sparc.deb stable/main/binary-sparc/linux-headers-2.6-sparc64-smp_2.6.18+6etch1_sparc.deb stable/main/binary-sparc/linux-image-2.6-sparc64-smp_2.6.18+6etch1_sparc.deb linux-latest-2.6 (6etch1) stable; urgency=high * Update to 2.6.18-5. stable/main/binary-s390/linux-image-s390x_2.6.18+6etch1_s390.deb stable/main/binary-s390/linux-image-2.6-vserver-s390x_2.6.18+6etch1_s390.deb stable/main/binary-s390/linux-image-2.6-s390-tape_2.6.18+6etch1_s390.deb stable/main/binary-s390/linux-headers-2.6-s390_2.6.18+6etch1_s390.deb stable/main/binary-s390/kernel-image-2.6-s390_2.6.18+6etch1_s390.deb stable/main/binary-s390/linux-image-2.6-s390x_2.6.18+6etch1_s390.deb stable/main/binary-s390/linux-headers-2.6-vserver-s390x_2.6.18+6etch1_s390.deb stable/main/binary-s390/linux-image-2.6-s390_2.6.18+6etch1_s390.deb stable/main/binary-s390/linux-image-vserver-s390x_2.6.18+6etch1_s390.deb stable/main/binary-s390/linux-image-s390-tape_2.6.18+6etch1_s390.deb stable/main/binary-s390/kernel-image-2.6-s390x_2.6.18+6etch1_s390.deb stable/main/binary-s390/linux-image-s390_2.6.18+6etch1_s390.deb stable/main/binary-s390/linux-headers-2.6-s390x_2.6.18+6etch1_s390.deb linux-latest-2.6 (6etch1) stable; urgency=high * Update to 2.6.18-5. stable/main/binary-powerpc/linux-headers-2.6-powerpc64_2.6.18+6etch1_powerpc.deb stable/main/binary-powerpc/linux-image-2.6-vserver-powerpc64_2.6.18+6etch1_powerpc.deb stable/main/binary-powerpc/linux-image-2.6-powerpc_2.6.18+6etch1_powerpc.deb stable/main/binary-powerpc/kernel-image-2.6-power3-smp_2.6.18+6etch1_powerpc.deb stable/main/binary-powerpc/kernel-image-2.6-powerpc-smp_2.6.18+6etch1_powerpc.deb stable/main/binary-powerpc/linux-headers-2.6-powerpc-smp_2.6.18+6etch1_powerpc.deb stable/main/binary-powerpc/kernel-image-power4_2.6.18+6etch1_powerpc.deb stable/main/binary-powerpc/linux-headers-2.6-prep_2.6.18+6etch1_powerpc.deb stable/main/binary-powerpc/linux-image-vserver-powerpc_2.6.18+6etch1_powerpc.deb stable/main/binary-powerpc/linux-headers-2.6-vserver-powerpc64_2.6.18+6etch1_powerpc.deb stable/main/binary-powerpc/kernel-image-powerpc-smp_2.6.18+6etch1_powerpc.deb stable/main/binary-powerpc/linux-image-prep_2.6.18+6etch1_powerpc.deb stable/main/binary-powerpc/linux-image-2.6-powerpc-smp_2.6.18+6etch1_powerpc.deb stable/main/binary-powerpc/linux-image-powerpc64_2.6.18+6etch1_powerpc.deb stable/main/binary-powerpc/kernel-image-2.6-power3_2.6.18+6etch1_powerpc.deb stable/main/binary-powerpc/kernel-image-powerpc_2.6.18+6etch1_powerpc.deb stable/main/binary-powerpc/linux-image-powerpc-miboot_2.6.18+6etch1_powerpc.deb stable/main/binary-powerpc/kernel-image-2.6-power4_2.6.18+6etch1_powerpc.deb stable/main/binary-powerpc/linux-image-powerpc_2.6.18+6etch1_powerpc.deb stable/main/binary-powerpc/linux-headers-2.6-vserver-powerpc_2.6.18+6etch1_powerpc.deb stable/main/binary-powerpc/kernel-image-power3-smp_2.6.18+6etch1_powerpc.deb stable/main/binary-powerpc/kernel-image-power4-smp_2.6.18+6etch1_powerpc.deb stable/main/binary-powerpc/linux-headers-2.6-powerpc_2.6.18+6etch1_powerpc.deb stable/main/binary-powerpc/kernel-image-2.6-powerpc_2.6.18+6etch1_powerpc.deb stable/main/binary-powerpc/kernel-image-2.6-power4-smp_2.6.18+6etch1_powerpc.deb stable/main/binary-powerpc/linux-image-vserver-powerpc64_2.6.18+6etch1_powerpc.deb stable/main/binary-powerpc/kernel-image-power3_2.6.18+6etch1_powerpc.deb stable/main/binary-powerpc/linux-image-2.6-powerpc64_2.6.18+6etch1_powerpc.deb stable/main/binary-powerpc/linux-image-2.6-powerpc-miboot_2.6.18+6etch1_powerpc.deb stable/main/binary-powerpc/linux-image-powerpc-smp_2.6.18+6etch1_powerpc.deb stable/main/binary-powerpc/linux-headers-2.6-powerpc-miboot_2.6.18+6etch1_powerpc.deb stable/main/binary-powerpc/linux-image-2.6-prep_2.6.18+6etch1_powerpc.deb stable/main/binary-powerpc/linux-image-2.6-vserver-powerpc_2.6.18+6etch1_powerpc.deb linux-latest-2.6 (6etch1) stable; urgency=high * Update to 2.6.18-5. stable/main/binary-mipsel/linux-headers-2.6-r3k-kn02_2.6.18+6etch1_mipsel.deb stable/main/binary-mipsel/linux-image-sb1a-bcm91480b_2.6.18+6etch1_mipsel.deb stable/main/binary-mipsel/linux-headers-2.6-r5k-cobalt_2.6.18+6etch1_mipsel.deb stable/main/binary-mipsel/linux-image-2.6-sb1a-bcm91480b_2.6.18+6etch1_mipsel.deb stable/main/binary-mipsel/linux-image-2.6-sb1-bcm91250a_2.6.18+6etch1_mipsel.deb stable/main/binary-mipsel/linux-headers-2.6-sb1a-bcm91480b_2.6.18+6etch1_mipsel.deb stable/main/binary-mipsel/linux-headers-2.6-r4k-kn04_2.6.18+6etch1_mipsel.deb stable/main/binary-mipsel/linux-image-2.6-r4k-kn04_2.6.18+6etch1_mipsel.deb stable/main/binary-mipsel/linux-image-r5k-cobalt_2.6.18+6etch1_mipsel.deb stable/main/binary-mipsel/linux-image-2.6-r5k-cobalt_2.6.18+6etch1_mipsel.deb stable/main/binary-mipsel/linux-image-qemu_2.6.18+6etch1_mipsel.deb stable/main/binary-mipsel/linux-headers-2.6-qemu_2.6.18+6etch1_mipsel.deb stable/main/binary-mipsel/linux-image-2.6-qemu_2.6.18+6etch1_mipsel.deb stable/main/binary-mipsel/linux-image-r4k-kn04_2.6.18+6etch1_mipsel.deb stable/main/binary-mipsel/linux-image-sb1-bcm91250a_2.6.18+6etch1_mipsel.deb stable/main/binary-mipsel/linux-headers-2.6-sb1-bcm91250a_2.6.18+6etch1_mipsel.deb stable/main/binary-mipsel/linux-image-r3k-kn02_2.6.18+6etch1_mipsel.deb stable/main/binary-mipsel/linux-image-2.6-r3k-kn02_2.6.18+6etch1_mipsel.deb linux-latest-2.6 (6etch1) stable; urgency=high * Update to 2.6.18-5. stable/main/binary-mips/linux-image-2.6-sb1a-bcm91480b_2.6.18+6etch1_mips.deb stable/main/binary-mips/linux-image-2.6-r4k-ip22_2.6.18+6etch1_mips.deb stable/main/binary-mips/linux-headers-2.6-sb1a-bcm91480b_2.6.18+6etch1_mips.deb stable/main/binary-mips/linux-image-sb1a-bcm91480b_2.6.18+6etch1_mips.deb stable/main/binary-mips/linux-image-2.6-qemu_2.6.18+6etch1_mips.deb stable/main/binary-mips/linux-headers-2.6-r4k-ip22_2.6.18+6etch1_mips.deb stable/main/binary-mips/linux-headers-2.6-sb1-bcm91250a_2.6.18+6etch1_mips.deb stable/main/binary-mips/linux-headers-2.6-r5k-ip32_2.6.18+6etch1_mips.deb stable/main/binary-mips/linux-headers-2.6-qemu_2.6.18+6etch1_mips.deb stable/main/binary-mips/linux-image-2.6-sb1-bcm91250a_2.6.18+6etch1_mips.deb stable/main/binary-mips/linux-image-2.6-r5k-ip32_2.6.18+6etch1_mips.deb stable/main/binary-mips/linux-image-r4k-ip22_2.6.18+6etch1_mips.deb stable/main/binary-mips/linux-image-sb1-bcm91250a_2.6.18+6etch1_mips.deb stable/main/binary-mips/linux-image-r5k-ip32_2.6.18+6etch1_mips.deb stable/main/binary-mips/linux-image-qemu_2.6.18+6etch1_mips.deb linux-latest-2.6 (6etch1) stable; urgency=high * Update to 2.6.18-5. stable/main/binary-i386/linux-image-2.6-486_2.6.18+6etch1_i386.deb stable/main/binary-i386/linux-image-486_2.6.18+6etch1_i386.deb stable/main/binary-i386/linux-headers-2.6-xen-686_2.6.18+6etch1_i386.deb stable/main/binary-i386/linux-image-amd64_2.6.18+6etch1_i386.deb stable/main/binary-i386/kernel-image-2.6-k7-smp_2.6.18+6etch1_i386.deb stable/main/binary-i386/linux-image-2.6-686-bigmem_2.6.18+6etch1_i386.deb stable/main/binary-i386/linux-image-2.6-k7-smp_2.6.18+6etch1_i386.deb stable/main/binary-i386/linux-image-xen-686_2.6.18+6etch1_i386.deb stable/main/binary-i386/kernel-image-2.6-686-smp_2.6.18+6etch1_i386.deb stable/main/binary-i386/linux-headers-2.6-xen-vserver-686_2.6.18+6etch1_i386.deb stable/main/binary-i386/kernel-image-2.6-amd64-k8-smp_2.6.18+6etch1_i386.deb stable/main/binary-i386/kernel-image-2.6-amd64-generic_2.6.18+6etch1_i386.deb stable/main/binary-i386/linux-headers-2.6-vserver-686_2.6.18+6etch1_i386.deb stable/main/binary-i386/linux-image-686_2.6.18+6etch1_i386.deb stable/main/binary-i386/kernel-image-2.6-em64t-p4_2.6.18+6etch1_i386.deb stable/main/binary-i386/linux-image-2.6-xen-vserver-686_2.6.18+6etch1_i386.deb stable/main/binary-i386/kernel-image-2.6-amd64-k8_2.6.18+6etch1_i386.deb stable/main/binary-i386/linux-headers-2.6-686_2.6.18+6etch1_i386.deb stable/main/binary-i386/kernel-image-2.6-686_2.6.18+6etch1_i386.deb stable/main/binary-i386/linux-image-2.6-686-smp_2.6.18+6etch1_i386.deb stable/main/binary-i386/linux-image-2.6-xen-686_2.6.18+6etch1_i386.deb stable/main/binary-i386/linux-image-vserver-k7_2.6.18+6etch1_i386.deb stable/main/binary-i386/kernel-image-2.6-386_2.6.18+6etch1_i386.deb stable/main/binary-i386/linux-image-686-bigmem_2.6.18+6etch1_i386.deb stable/main/binary-i386/kernel-image-2.6-em64t-p4-smp_2.6.18+6etch1_i386.deb stable/main/binary-i386/linux-headers-2.6-vserver-k7_2.6.18+6etch1_i386.deb stable/main/binary-i386/linux-image-vserver-686_2.6.18+6etch1_i386.deb stable/main/binary-i386/linux-image-2.6-686_2.6.18+6etch1_i386.deb stable/main/binary-i386/linux-image-xen-vserver-686_2.6.18+6etch1_i386.deb stable/main/binary-i386/linux-image-k7_2.6.18+6etch1_i386.deb stable/main/binary-i386/linux-image-2.6-vserver-686_2.6.18+6etch1_i386.deb stable/main/binary-i386/linux-headers-2.6-k7_2.6.18+6etch1_i386.deb stable/main/binary-i386/kernel-image-2.6-k7_2.6.18+6etch1_i386.deb stable/main/binary-i386/linux-image-2.6-vserver-k7_2.6.18+6etch1_i386.deb stable/main/binary-i386/linux-headers-2.6-amd64_2.6.18+6etch1_i386.deb stable/main/binary-i386/linux-headers-2.6-486_2.6.18+6etch1_i386.deb stable/main/binary-i386/linux-headers-2.6-686-bigmem_2.6.18+6etch1_i386.deb stable/main/binary-i386/linux-image-2.6-k7_2.6.18+6etch1_i386.deb stable/main/binary-i386/linux-image-2.6-amd64_2.6.18+6etch1_i386.deb linux-latest-2.6 (6etch1) stable; urgency=high * Update to 2.6.18-5. stable/main/binary-hppa/linux-image-2.6-parisc64-smp_2.6.18+6etch1_hppa.deb stable/main/binary-hppa/linux-image-parisc64_2.6.18+6etch1_hppa.deb stable/main/binary-hppa/linux-image-parisc64-smp_2.6.18+6etch1_hppa.deb stable/main/binary-hppa/linux-image-2.6-parisc64_2.6.18+6etch1_hppa.deb stable/main/binary-hppa/linux-headers-2.6-parisc-smp_2.6.18+6etch1_hppa.deb stable/main/binary-hppa/linux-headers-2.6-parisc_2.6.18+6etch1_hppa.deb stable/main/binary-hppa/linux-headers-2.6-parisc64_2.6.18+6etch1_hppa.deb stable/main/binary-hppa/linux-headers-2.6-parisc64-smp_2.6.18+6etch1_hppa.deb stable/main/binary-hppa/linux-image-2.6-parisc_2.6.18+6etch1_hppa.deb stable/main/binary-hppa/linux-image-2.6-parisc-smp_2.6.18+6etch1_hppa.deb stable/main/binary-hppa/linux-image-parisc-smp_2.6.18+6etch1_hppa.deb stable/main/binary-hppa/linux-image-parisc_2.6.18+6etch1_hppa.deb linux-latest-2.6 (6etch1) stable; urgency=high * Update to 2.6.18-5. stable/main/binary-amd64/linux-headers-2.6-vserver-amd64_2.6.18+6etch1_amd64.deb stable/main/binary-amd64/linux-image-2.6-xen-amd64_2.6.18+6etch1_amd64.deb stable/main/binary-amd64/linux-headers-2.6-xen-vserver-amd64_2.6.18+6etch1_amd64.deb stable/main/binary-amd64/kernel-image-2.6-amd64-k8-smp_2.6.18+6etch1_amd64.deb stable/main/binary-amd64/linux-image-2.6-vserver-amd64-k8-smp_2.6.18+6etch1_amd64.deb stable/main/binary-amd64/linux-image-xen-amd64_2.6.18+6etch1_amd64.deb stable/main/binary-amd64/linux-image-2.6-vserver-em64t-p4-smp_2.6.18+6etch1_amd64.deb stable/main/binary-amd64/linux-image-2.6-amd64-k8-smp_2.6.18+6etch1_amd64.deb stable/main/binary-amd64/linux-image-xen-vserver-amd64_2.6.18+6etch1_amd64.deb stable/main/binary-amd64/kernel-image-2.6-em64t-p4-smp_2.6.18+6etch1_amd64.deb stable/main/binary-amd64/linux-image-2.6-amd64-generic_2.6.18+6etch1_amd64.deb stable/main/binary-amd64/linux-headers-2.6-xen-amd64_2.6.18+6etch1_amd64.deb stable/main/binary-amd64/linux-image-2.6-amd64-k8_2.6.18+6etch1_amd64.deb stable/main/binary-amd64/linux-image-2.6-amd64_2.6.18+6etch1_amd64.deb stable/main/binary-amd64/linux-image-2.6-vserver-amd64_2.6.18+6etch1_amd64.deb stable/main/binary-amd64/linux-image-2.6-em64t-p4-smp_2.6.18+6etch1_amd64.deb stable/main/binary-amd64/linux-image-amd64_2.6.18+6etch1_amd64.deb stable/main/binary-amd64/kernel-image-2.6-amd64-k8_2.6.18+6etch1_amd64.deb stable/main/binary-amd64/kernel-image-2.6-em64t-p4_2.6.18+6etch1_amd64.deb stable/main/binary-amd64/linux-headers-2.6-amd64_2.6.18+6etch1_amd64.deb stable/main/binary-amd64/kernel-image-2.6-amd64-generic_2.6.18+6etch1_amd64.deb stable/main/binary-amd64/linux-image-vserver-amd64_2.6.18+6etch1_amd64.deb stable/main/binary-amd64/linux-image-2.6-em64t-p4_2.6.18+6etch1_amd64.deb stable/main/binary-amd64/linux-image-2.6-xen-vserver-amd64_2.6.18+6etch1_amd64.deb linux-latest-2.6 (6etch1) stable; urgency=high * Update to 2.6.18-5. stable/main/binary-alpha/linux-image-2.6-alpha-smp_2.6.18+6etch1_alpha.deb stable/main/binary-alpha/linux-headers-2.6-alpha-smp_2.6.18+6etch1_alpha.deb stable/main/binary-alpha/kernel-image-2.6-generic_2.6.18+6etch1_alpha.deb stable/main/binary-alpha/linux-image-2.6-alpha-legacy_2.6.18+6etch1_alpha.deb stable/main/binary-alpha/linux-image-2.6-vserver-alpha_2.6.18+6etch1_alpha.deb stable/main/binary-alpha/kernel-image-2.6-smp_2.6.18+6etch1_alpha.deb stable/main/binary-alpha/linux-image-alpha-generic_2.6.18+6etch1_alpha.deb stable/main/binary-alpha/linux-image-2.6-alpha-generic_2.6.18+6etch1_alpha.deb stable/main/binary-alpha/linux-headers-2.6-alpha-generic_2.6.18+6etch1_alpha.deb stable/main/binary-alpha/linux-image-alpha-legacy_2.6.18+6etch1_alpha.deb stable/main/binary-alpha/linux-image-vserver-alpha_2.6.18+6etch1_alpha.deb stable/main/binary-alpha/linux-headers-2.6-alpha-legacy_2.6.18+6etch1_alpha.deb stable/main/binary-alpha/linux-headers-2.6-vserver-alpha_2.6.18+6etch1_alpha.deb stable/main/binary-alpha/linux-image-alpha-smp_2.6.18+6etch1_alpha.deb linux-latest-2.6 (6etch1) stable; urgency=high * Update to 2.6.18-5. stable/main/binary-ia64/linux-image-itanium_2.6.18+6etch1_ia64.deb stable/main/binary-ia64/linux-headers-2.6-itanium_2.6.18+6etch1_ia64.deb stable/main/binary-ia64/linux-headers-2.6-mckinley_2.6.18+6etch1_ia64.deb stable/main/binary-ia64/kernel-image-2.6-mckinley_2.6.18+6etch1_ia64.deb stable/main/binary-ia64/linux-image-2.6-mckinley_2.6.18+6etch1_ia64.deb stable/main/source/linux-latest-2.6_6etch1.dsc stable/main/binary-ia64/linux-image-mckinley_2.6.18+6etch1_ia64.deb stable/main/binary-ia64/linux-image-2.6-itanium_2.6.18+6etch1_ia64.deb stable/main/binary-ia64/linux-image-2.6-mckinley-smp_2.6.18+6etch1_ia64.deb stable/main/binary-ia64/kernel-image-2.6-mckinley-smp_2.6.18+6etch1_ia64.deb stable/main/binary-ia64/linux-image-2.6-itanium-smp_2.6.18+6etch1_ia64.deb stable/main/binary-ia64/kernel-image-2.6-itanium-smp_2.6.18+6etch1_ia64.deb stable/main/binary-ia64/kernel-image-2.6-itanium_2.6.18+6etch1_ia64.deb stable/main/source/linux-latest-2.6_6etch1.tar.gz linux-latest-2.6 (6etch1) stable; urgency=high * Update to 2.6.18-5. stable/main/binary-sparc/ext3-modules-2.6.18-5-sparc32-di_1.20etch1_sparc.udeb stable/main/binary-sparc/scsi-core-modules-2.6.18-5-sparc64-di_1.20etch1_sparc.udeb stable/main/binary-sparc/crypto-modules-2.6.18-5-sparc32-di_1.20etch1_sparc.udeb stable/main/binary-sparc/jfs-modules-2.6.18-5-sparc64-di_1.20etch1_sparc.udeb stable/main/binary-sparc/ipv6-modules-2.6.18-5-sparc32-di_1.20etch1_sparc.udeb stable/main/binary-sparc/cdrom-core-modules-2.6.18-5-sparc32-di_1.20etch1_sparc.udeb stable/main/binary-sparc/reiserfs-modules-2.6.18-5-sparc32-di_1.20etch1_sparc.udeb stable/main/binary-sparc/scsi-common-modules-2.6.18-5-sparc64-di_1.20etch1_sparc.udeb stable/main/binary-sparc/crypto-modules-2.6.18-5-sparc64-di_1.20etch1_sparc.udeb stable/main/source/linux-kernel-di-sparc-2.6_1.20etch1.tar.gz stable/main/binary-sparc/plip-modules-2.6.18-5-sparc64-di_1.20etch1_sparc.udeb stable/main/binary-sparc/cdrom-core-modules-2.6.18-5-sparc64-di_1.20etch1_sparc.udeb stable/main/binary-sparc/ipv6-modules-2.6.18-5-sparc64-di_1.20etch1_sparc.udeb stable/main/binary-sparc/scsi-extra-modules-2.6.18-5-sparc64-di_1.20etch1_sparc.udeb stable/main/source/linux-kernel-di-sparc-2.6_1.20etch1.dsc stable/main/binary-sparc/ppp-modules-2.6.18-5-sparc64-di_1.20etch1_sparc.udeb stable/main/binary-sparc/md-modules-2.6.18-5-sparc64-di_1.20etch1_sparc.udeb stable/main/binary-sparc/reiserfs-modules-2.6.18-5-sparc64-di_1.20etch1_sparc.udeb stable/main/binary-sparc/fat-modules-2.6.18-5-sparc64-di_1.20etch1_sparc.udeb stable/main/binary-sparc/ext3-modules-2.6.18-5-sparc64-di_1.20etch1_sparc.udeb stable/main/binary-sparc/sata-modules-2.6.18-5-sparc64-di_1.20etch1_sparc.udeb stable/main/binary-sparc/nic-modules-2.6.18-5-sparc64-di_1.20etch1_sparc.udeb stable/main/binary-sparc/scsi-common-modules-2.6.18-5-sparc32-di_1.20etch1_sparc.udeb stable/main/binary-sparc/usb-modules-2.6.18-5-sparc64-di_1.20etch1_sparc.udeb stable/main/binary-sparc/kernel-image-2.6.18-5-sparc32-di_1.20etch1_sparc.udeb stable/main/binary-sparc/nic-modules-2.6.18-5-sparc32-di_1.20etch1_sparc.udeb stable/main/binary-sparc/ppp-modules-2.6.18-5-sparc32-di_1.20etch1_sparc.udeb stable/main/binary-sparc/kernel-image-2.6.18-5-sparc64-di_1.20etch1_sparc.udeb stable/main/binary-sparc/md-modules-2.6.18-5-sparc32-di_1.20etch1_sparc.udeb stable/main/binary-sparc/xfs-modules-2.6.18-5-sparc64-di_1.20etch1_sparc.udeb stable/main/binary-sparc/fat-modules-2.6.18-5-sparc32-di_1.20etch1_sparc.udeb stable/main/binary-sparc/scsi-core-modules-2.6.18-5-sparc32-di_1.20etch1_sparc.udeb stable/main/binary-sparc/ide-modules-2.6.18-5-sparc64-di_1.20etch1_sparc.udeb stable/main/binary-sparc/plip-modules-2.6.18-5-sparc32-di_1.20etch1_sparc.udeb stable/main/binary-sparc/xfs-modules-2.6.18-5-sparc32-di_1.20etch1_sparc.udeb linux-kernel-di-sparc-2.6 (1.20etch1) stable; urgency=low * Update to kernel image version 2.6.18.dfsg.1-13 (2.6.18-5). stable/main/binary-s390/md-modules-2.6.18-5-s390-di_0.13etch1_s390.udeb stable/main/binary-s390/crypto-modules-2.6.18-5-s390-di_0.13etch1_s390.udeb stable/main/binary-s390/xfs-modules-2.6.18-5-s390-di_0.13etch1_s390.udeb stable/main/binary-s390/kernel-image-2.6.18-5-s390-tape-di_0.13etch1_s390.udeb stable/main/binary-s390/fat-modules-2.6.18-5-s390-di_0.13etch1_s390.udeb stable/main/source/linux-kernel-di-s390-2.6_0.13etch1.tar.gz stable/main/binary-s390/kernel-image-2.6.18-5-s390-di_0.13etch1_s390.udeb stable/main/binary-s390/scsi-core-modules-2.6.18-5-s390-di_0.13etch1_s390.udeb stable/main/binary-s390/dasd-modules-2.6.18-5-s390-di_0.13etch1_s390.udeb stable/main/binary-s390/nic-modules-2.6.18-5-s390-di_0.13etch1_s390.udeb stable/main/binary-s390/scsi-modules-2.6.18-5-s390-di_0.13etch1_s390.udeb stable/main/source/linux-kernel-di-s390-2.6_0.13etch1.dsc linux-kernel-di-s390-2.6 (0.13etch1) stable; urgency=low * Update to kernel image version 2.6.18.dfsg.1-13 (2.6.18-5). stable/main/binary-powerpc/kernel-image-2.6.18-5-prep-di_1.29etch1_powerpc.udeb stable/main/binary-powerpc/nic-pcmcia-modules-2.6.18-5-powerpc-di_1.29etch1_powerpc.udeb stable/main/binary-powerpc/firewire-core-modules-2.6.18-5-prep-di_1.29etch1_powerpc.udeb stable/main/binary-powerpc/cdrom-core-modules-2.6.18-5-powerpc64-di_1.29etch1_powerpc.udeb stable/main/binary-powerpc/loop-modules-2.6.18-5-prep-di_1.29etch1_powerpc.udeb stable/main/binary-powerpc/pcmcia-storage-modules-2.6.18-5-prep-di_1.29etch1_powerpc.udeb stable/main/binary-powerpc/nic-shared-modules-2.6.18-5-powerpc64-di_1.29etch1_powerpc.udeb stable/main/binary-powerpc/serial-modules-2.6.18-5-prep-di_1.29etch1_powerpc.udeb stable/main/binary-powerpc/nic-extra-modules-2.6.18-5-prep-di_1.29etch1_powerpc.udeb stable/main/source/linux-kernel-di-powerpc-2.6_1.29etch1.dsc stable/main/binary-powerpc/ufs-modules-2.6.18-5-powerpc-miboot-di_1.29etch1_powerpc.udeb stable/main/binary-powerpc/loop-modules-2.6.18-5-powerpc-miboot-di_1.29etch1_powerpc.udeb stable/main/binary-powerpc/sata-modules-2.6.18-5-powerpc64-di_1.29etch1_powerpc.udeb stable/main/binary-powerpc/md-modules-2.6.18-5-powerpc-di_1.29etch1_powerpc.udeb stable/main/binary-powerpc/nic-shared-modules-2.6.18-5-prep-di_1.29etch1_powerpc.udeb stable/main/binary-powerpc/reiserfs-modules-2.6.18-5-prep-di_1.29etch1_powerpc.udeb stable/main/source/linux-kernel-di-powerpc-2.6_1.29etch1.tar.gz stable/main/binary-powerpc/nic-pcmcia-modules-2.6.18-5-powerpc64-di_1.29etch1_powerpc.udeb stable/main/binary-powerpc/firmware-modules-2.6.18-5-powerpc-miboot-di_1.29etch1_powerpc.udeb stable/main/binary-powerpc/fat-modules-2.6.18-5-powerpc64-di_1.29etch1_powerpc.udeb stable/main/binary-powerpc/affs-modules-2.6.18-5-powerpc-miboot-di_1.29etch1_powerpc.udeb stable/main/binary-powerpc/firewire-core-modules-2.6.18-5-powerpc-miboot-di_1.29etch1_powerpc.udeb stable/main/binary-powerpc/nic-modules-2.6.18-5-powerpc-di_1.29etch1_powerpc.udeb stable/main/binary-powerpc/nic-shared-modules-2.6.18-5-powerpc-miboot-di_1.29etch1_powerpc.udeb stable/main/binary-powerpc/scsi-extra-modules-2.6.18-5-powerpc64-di_1.29etch1_powerpc.udeb stable/main/binary-powerpc/hfs-modules-2.6.18-5-powerpc64-di_1.29etch1_powerpc.udeb stable/main/binary-powerpc/affs-modules-2.6.18-5-powerpc64-di_1.29etch1_powerpc.udeb stable/main/binary-powerpc/sata-modules-2.6.18-5-powerpc-miboot-di_1.29etch1_powerpc.udeb stable/main/binary-powerpc/floppy-modules-2.6.18-5-powerpc-miboot-di_1.29etch1_powerpc.udeb stable/main/binary-powerpc/crypto-modules-2.6.18-5-prep-di_1.29etch1_powerpc.udeb stable/main/binary-powerpc/nic-shared-modules-2.6.18-5-powerpc-di_1.29etch1_powerpc.udeb stable/main/binary-powerpc/kernel-image-2.6.18-5-powerpc-miboot-di_1.29etch1_powerpc.udeb stable/main/binary-powerpc/scsi-extra-modules-2.6.18-5-powerpc-di_1.29etch1_powerpc.udeb stable/main/binary-powerpc/usb-serial-modules-2.6.18-5-powerpc-di_1.29etch1_powerpc.udeb stable/main/binary-powerpc/nic-modules-2.6.18-5-powerpc-miboot-di_1.29etch1_powerpc.udeb stable/main/binary-powerpc/reiserfs-modules-2.6.18-5-powerpc64-di_1.29etch1_powerpc.udeb stable/main/binary-powerpc/ext2-modules-2.6.18-5-powerpc-di_1.29etch1_powerpc.udeb stable/main/binary-powerpc/mouse-modules-2.6.18-5-powerpc64-di_1.29etch1_powerpc.udeb stable/main/binary-powerpc/affs-modules-2.6.18-5-powerpc-di_1.29etch1_powerpc.udeb stable/main/binary-powerpc/sata-modules-2.6.18-5-prep-di_1.29etch1_powerpc.udeb stable/main/binary-powerpc/ppp-modules-2.6.18-5-powerpc-miboot-di_1.29etch1_powerpc.udeb stable/main/binary-powerpc/mouse-modules-2.6.18-5-powerpc-di_1.29etch1_powerpc.udeb stable/main/binary-powerpc/xfs-modules-2.6.18-5-powerpc-miboot-di_1.29etch1_powerpc.udeb stable/main/binary-powerpc/usb-storage-modules-2.6.18-5-prep-di_1.29etch1_powerpc.udeb stable/main/binary-powerpc/usb-storage-modules-2.6.18-5-powerpc-di_1.29etch1_powerpc.udeb stable/main/binary-powerpc/md-modules-2.6.18-5-powerpc-miboot-di_1.29etch1_powerpc.udeb stable/main/binary-powerpc/fat-modules-2.6.18-5-powerpc-di_1.29etch1_powerpc.udeb stable/main/binary-powerpc/ppp-modules-2.6.18-5-powerpc-di_1.29etch1_powerpc.udeb stable/main/binary-powerpc/nic-extra-modules-2.6.18-5-powerpc64-di_1.29etch1_powerpc.udeb stable/main/binary-powerpc/input-modules-2.6.18-5-powerpc-miboot-di_1.29etch1_powerpc.udeb stable/main/binary-powerpc/md-modules-2.6.18-5-powerpc64-di_1.29etch1_powerpc.udeb stable/main/binary-powerpc/input-modules-2.6.18-5-powerpc64-di_1.29etch1_powerpc.udeb stable/main/binary-powerpc/xfs-modules-2.6.18-5-powerpc-di_1.29etch1_powerpc.udeb stable/main/binary-powerpc/usb-modules-2.6.18-5-powerpc-miboot-di_1.29etch1_powerpc.udeb stable/main/binary-powerpc/loop-modules-2.6.18-5-powerpc64-di_1.29etch1_powerpc.udeb stable/main/binary-powerpc/nic-modules-2.6.18-5-powerpc64-di_1.29etch1_powerpc.udeb stable/main/binary-powerpc/cdrom-core-modules-2.6.18-5-powerpc-miboot-di_1.29etch1_powerpc.udeb stable/main/binary-powerpc/ipv6-modules-2.6.18-5-prep-di_1.29etch1_powerpc.udeb stable/main/binary-powerpc/ide-modules-2.6.18-5-powerpc-di_1.29etch1_powerpc.udeb stable/main/binary-powerpc/crypto-modules-2.6.18-5-powerpc-miboot-di_1.29etch1_powerpc.udeb stable/main/binary-powerpc/firmware-modules-2.6.18-5-powerpc64-di_1.29etch1_powerpc.udeb stable/main/binary-powerpc/affs-modules-2.6.18-5-prep-di_1.29etch1_powerpc.udeb stable/main/binary-powerpc/ext2-modules-2.6.18-5-powerpc64-di_1.29etch1_powerpc.udeb stable/main/binary-powerpc/pcmcia-storage-modules-2.6.18-5-powerpc64-di_1.29etch1_powerpc.udeb stable/main/binary-powerpc/firmware-modules-2.6.18-5-prep-di_1.29etch1_powerpc.udeb stable/main/binary-powerpc/scsi-core-modules-2.6.18-5-powerpc-miboot-di_1.29etch1_powerpc.udeb stable/main/binary-powerpc/ufs-modules-2.6.18-5-powerpc-di_1.29etch1_powerpc.udeb stable/main/binary-powerpc/input-modules-2.6.18-5-powerpc-di_1.29etch1_powerpc.udeb stable/main/binary-powerpc/firewire-core-modules-2.6.18-5-powerpc64-di_1.29etch1_powerpc.udeb stable/main/binary-powerpc/ppp-modules-2.6.18-5-prep-di_1.29etch1_powerpc.udeb stable/main/binary-powerpc/jfs-modules-2.6.18-5-powerpc64-di_1.29etch1_powerpc.udeb stable/main/binary-powerpc/pcmcia-modules-2.6.18-5-powerpc-di_1.29etch1_powerpc.udeb stable/main/binary-powerpc/pcmcia-storage-modules-2.6.18-5-powerpc-di_1.29etch1_powerpc.udeb stable/main/binary-powerpc/ipv6-modules-2.6.18-5-powerpc-miboot-di_1.29etch1_powerpc.udeb stable/main/binary-powerpc/nic-extra-modules-2.6.18-5-powerpc-miboot-di_1.29etch1_powerpc.udeb stable/main/binary-powerpc/ext3-modules-2.6.18-5-powerpc64-di_1.29etch1_powerpc.udeb stable/main/binary-powerpc/scsi-common-modules-2.6.18-5-prep-di_1.29etch1_powerpc.udeb stable/main/binary-powerpc/loop-modules-2.6.18-5-powerpc-di_1.29etch1_powerpc.udeb stable/main/binary-powerpc/hypervisor-modules-2.6.18-5-powerpc64-di_1.29etch1_powerpc.udeb stable/main/binary-powerpc/scsi-modules-2.6.18-5-prep-di_1.29etch1_powerpc.udeb stable/main/binary-powerpc/irda-modules-2.6.18-5-powerpc-di_1.29etch1_powerpc.udeb stable/main/binary-powerpc/floppy-modules-2.6.18-5-powerpc-di_1.29etch1_powerpc.udeb stable/main/binary-powerpc/sata-modules-2.6.18-5-powerpc-di_1.29etch1_powerpc.udeb stable/main/binary-powerpc/serial-modules-2.6.18-5-powerpc-di_1.29etch1_powerpc.udeb stable/main/binary-powerpc/fat-modules-2.6.18-5-prep-di_1.29etch1_powerpc.udeb stable/main/binary-powerpc/usb-storage-modules-2.6.18-5-powerpc64-di_1.29etch1_powerpc.udeb stable/main/binary-powerpc/kernel-image-2.6.18-5-powerpc64-di_1.29etch1_powerpc.udeb stable/main/binary-powerpc/fs-common-modules-2.6.18-5-powerpc-miboot-di_1.29etch1_powerpc.udeb stable/main/binary-powerpc/firewire-core-modules-2.6.18-5-powerpc-di_1.29etch1_powerpc.udeb stable/main/binary-powerpc/pcmcia-modules-2.6.18-5-powerpc-miboot-di_1.29etch1_powerpc.udeb stable/main/binary-powerpc/hfs-modules-2.6.18-5-powerpc-miboot-di_1.29etch1_powerpc.udeb stable/main/binary-powerpc/serial-modules-2.6.18-5-powerpc64-di_1.29etch1_powerpc.udeb stable/main/binary-powerpc/ipv6-modules-2.6.18-5-powerpc64-di_1.29etch1_powerpc.udeb stable/main/binary-powerpc/irda-modules-2.6.18-5-powerpc64-di_1.29etch1_powerpc.udeb stable/main/binary-powerpc/scsi-common-modules-2.6.18-5-powerpc-miboot-di_1.29etch1_powerpc.udeb stable/main/binary-powerpc/scsi-modules-2.6.18-5-powerpc-miboot-di_1.29etch1_powerpc.udeb stable/main/binary-powerpc/fs-common-modules-2.6.18-5-powerpc64-di_1.29etch1_powerpc.udeb stable/main/binary-powerpc/usb-serial-modules-2.6.18-5-powerpc-miboot-di_1.29etch1_powerpc.udeb stable/main/binary-powerpc/ipv6-modules-2.6.18-5-powerpc-di_1.29etch1_powerpc.udeb stable/main/binary-powerpc/nic-extra-modules-2.6.18-5-powerpc-di_1.29etch1_powerpc.udeb stable/main/binary-powerpc/firmware-modules-2.6.18-5-powerpc-di_1.29etch1_powerpc.udeb stable/main/binary-powerpc/pcmcia-storage-modules-2.6.18-5-powerpc-miboot-di_1.29etch1_powerpc.udeb stable/main/binary-powerpc/input-modules-2.6.18-5-prep-di_1.29etch1_powerpc.udeb stable/main/binary-powerpc/usb-storage-modules-2.6.18-5-powerpc-miboot-di_1.29etch1_powerpc.udeb stable/main/binary-powerpc/usb-serial-modules-2.6.18-5-powerpc64-di_1.29etch1_powerpc.udeb stable/main/binary-powerpc/scsi-modules-2.6.18-5-powerpc-di_1.29etch1_powerpc.udeb stable/main/binary-powerpc/scsi-modules-2.6.18-5-powerpc64-di_1.29etch1_powerpc.udeb stable/main/binary-powerpc/ufs-modules-2.6.18-5-prep-di_1.29etch1_powerpc.udeb stable/main/binary-powerpc/usb-serial-modules-2.6.18-5-prep-di_1.29etch1_powerpc.udeb stable/main/binary-powerpc/cdrom-core-modules-2.6.18-5-powerpc-di_1.29etch1_powerpc.udeb stable/main/binary-powerpc/scsi-core-modules-2.6.18-5-powerpc64-di_1.29etch1_powerpc.udeb stable/main/binary-powerpc/usb-modules-2.6.18-5-powerpc-di_1.29etch1_powerpc.udeb stable/main/binary-powerpc/reiserfs-modules-2.6.18-5-powerpc-miboot-di_1.29etch1_powerpc.udeb stable/main/binary-powerpc/scsi-extra-modules-2.6.18-5-powerpc-miboot-di_1.29etch1_powerpc.udeb stable/main/binary-powerpc/floppy-modules-2.6.18-5-prep-di_1.29etch1_powerpc.udeb stable/main/binary-powerpc/ide-modules-2.6.18-5-powerpc-miboot-di_1.29etch1_powerpc.udeb stable/main/binary-powerpc/cdrom-core-modules-2.6.18-5-prep-di_1.29etch1_powerpc.udeb stable/main/binary-powerpc/ext2-modules-2.6.18-5-prep-di_1.29etch1_powerpc.udeb stable/main/binary-powerpc/irda-modules-2.6.18-5-prep-di_1.29etch1_powerpc.udeb stable/main/binary-powerpc/ppp-modules-2.6.18-5-powerpc64-di_1.29etch1_powerpc.udeb stable/main/binary-powerpc/mouse-modules-2.6.18-5-prep-di_1.29etch1_powerpc.udeb stable/main/binary-powerpc/fs-common-modules-2.6.18-5-powerpc-di_1.29etch1_powerpc.udeb stable/main/binary-powerpc/usb-modules-2.6.18-5-powerpc64-di_1.29etch1_powerpc.udeb stable/main/binary-powerpc/md-modules-2.6.18-5-prep-di_1.29etch1_powerpc.udeb stable/main/binary-powerpc/fancontrol-modules-2.6.18-5-powerpc64-di_1.29etch1_powerpc.udeb stable/main/binary-powerpc/scsi-common-modules-2.6.18-5-powerpc-di_1.29etch1_powerpc.udeb stable/main/binary-powerpc/ext3-modules-2.6.18-5-powerpc-miboot-di_1.29etch1_powerpc.udeb stable/main/binary-powerpc/fat-modules-2.6.18-5-powerpc-miboot-di_1.29etch1_powerpc.udeb stable/main/binary-powerpc/kernel-image-2.6.18-5-powerpc-di_1.29etch1_powerpc.udeb stable/main/binary-powerpc/hfs-modules-2.6.18-5-powerpc-di_1.29etch1_powerpc.udeb stable/main/binary-powerpc/jfs-modules-2.6.18-5-powerpc-miboot-di_1.29etch1_powerpc.udeb stable/main/binary-powerpc/crypto-modules-2.6.18-5-powerpc-di_1.29etch1_powerpc.udeb stable/main/binary-powerpc/ext2-modules-2.6.18-5-powerpc-miboot-di_1.29etch1_powerpc.udeb stable/main/binary-powerpc/nic-pcmcia-modules-2.6.18-5-powerpc-miboot-di_1.29etch1_powerpc.udeb stable/main/binary-powerpc/usb-modules-2.6.18-5-prep-di_1.29etch1_powerpc.udeb stable/main/binary-powerpc/scsi-core-modules-2.6.18-5-prep-di_1.29etch1_powerpc.udeb stable/main/binary-powerpc/irda-modules-2.6.18-5-powerpc-miboot-di_1.29etch1_powerpc.udeb stable/main/binary-powerpc/reiserfs-modules-2.6.18-5-powerpc-di_1.29etch1_powerpc.udeb stable/main/binary-powerpc/hfs-modules-2.6.18-5-prep-di_1.29etch1_powerpc.udeb stable/main/binary-powerpc/scsi-common-modules-2.6.18-5-powerpc64-di_1.29etch1_powerpc.udeb stable/main/binary-powerpc/mouse-modules-2.6.18-5-powerpc-miboot-di_1.29etch1_powerpc.udeb stable/main/binary-powerpc/nic-pcmcia-modules-2.6.18-5-prep-di_1.29etch1_powerpc.udeb stable/main/binary-powerpc/xfs-modules-2.6.18-5-prep-di_1.29etch1_powerpc.udeb stable/main/binary-powerpc/serial-modules-2.6.18-5-powerpc-miboot-di_1.29etch1_powerpc.udeb stable/main/binary-powerpc/scsi-extra-modules-2.6.18-5-prep-di_1.29etch1_powerpc.udeb stable/main/binary-powerpc/ide-modules-2.6.18-5-powerpc64-di_1.29etch1_powerpc.udeb stable/main/binary-powerpc/jfs-modules-2.6.18-5-powerpc-di_1.29etch1_powerpc.udeb stable/main/binary-powerpc/ext3-modules-2.6.18-5-prep-di_1.29etch1_powerpc.udeb stable/main/binary-powerpc/floppy-modules-2.6.18-5-powerpc64-di_1.29etch1_powerpc.udeb stable/main/binary-powerpc/fs-common-modules-2.6.18-5-prep-di_1.29etch1_powerpc.udeb stable/main/binary-powerpc/ide-modules-2.6.18-5-prep-di_1.29etch1_powerpc.udeb stable/main/binary-powerpc/pcmcia-modules-2.6.18-5-powerpc64-di_1.29etch1_powerpc.udeb stable/main/binary-powerpc/xfs-modules-2.6.18-5-powerpc64-di_1.29etch1_powerpc.udeb stable/main/binary-powerpc/pcmcia-modules-2.6.18-5-prep-di_1.29etch1_powerpc.udeb stable/main/binary-powerpc/ufs-modules-2.6.18-5-powerpc64-di_1.29etch1_powerpc.udeb stable/main/binary-powerpc/scsi-core-modules-2.6.18-5-powerpc-di_1.29etch1_powerpc.udeb stable/main/binary-powerpc/nic-modules-2.6.18-5-prep-di_1.29etch1_powerpc.udeb stable/main/binary-powerpc/ext3-modules-2.6.18-5-powerpc-di_1.29etch1_powerpc.udeb stable/main/binary-powerpc/crypto-modules-2.6.18-5-powerpc64-di_1.29etch1_powerpc.udeb stable/main/binary-powerpc/jfs-modules-2.6.18-5-prep-di_1.29etch1_powerpc.udeb linux-kernel-di-powerpc-2.6 (1.29etch1) stable; urgency=low * Update to kernel image version 2.6.18.dfsg.1-13 (2.6.18-5). stable/main/binary-mipsel/ppp-modules-2.6.18-5-sb1-bcm91250a-di_0.13etch1_mipsel.udeb stable/main/binary-mipsel/xfs-modules-2.6.18-5-qemu-di_0.13etch1_mipsel.udeb stable/main/binary-mipsel/cdrom-core-modules-2.6.18-5-sb1-bcm91250a-di_0.13etch1_mipsel.udeb stable/main/binary-mipsel/kernel-image-2.6.18-5-r4k-kn04-di_0.13etch1_mipsel.udeb stable/main/binary-mipsel/kernel-image-2.6.18-5-r3k-kn02-di_0.13etch1_mipsel.udeb stable/main/binary-mipsel/fat-modules-2.6.18-5-sb1a-bcm91480b-di_0.13etch1_mipsel.udeb stable/main/binary-mipsel/crypto-modules-2.6.18-5-sb1-bcm91250a-di_0.13etch1_mipsel.udeb stable/main/binary-mipsel/scsi-modules-2.6.18-5-sb1-bcm91250a-di_0.13etch1_mipsel.udeb stable/main/binary-mipsel/crypto-modules-2.6.18-5-r5k-cobalt-di_0.13etch1_mipsel.udeb stable/main/binary-mipsel/md-modules-2.6.18-5-sb1-bcm91250a-di_0.13etch1_mipsel.udeb stable/main/binary-mipsel/fat-modules-2.6.18-5-qemu-di_0.13etch1_mipsel.udeb stable/main/binary-mipsel/md-modules-2.6.18-5-sb1a-bcm91480b-di_0.13etch1_mipsel.udeb stable/main/binary-mipsel/crypto-modules-2.6.18-5-sb1a-bcm91480b-di_0.13etch1_mipsel.udeb stable/main/binary-mipsel/reiserfs-modules-2.6.18-5-r3k-kn02-di_0.13etch1_mipsel.udeb stable/main/binary-mipsel/usb-modules-2.6.18-5-sb1a-bcm91480b-di_0.13etch1_mipsel.udeb stable/main/binary-mipsel/usb-storage-modules-2.6.18-5-sb1-bcm91250a-di_0.13etch1_mipsel.udeb stable/main/binary-mipsel/crypto-modules-2.6.18-5-r4k-kn04-di_0.13etch1_mipsel.udeb stable/main/binary-mipsel/reiserfs-modules-2.6.18-5-qemu-di_0.13etch1_mipsel.udeb stable/main/binary-mipsel/fb-modules-2.6.18-5-sb1-bcm91250a-di_0.13etch1_mipsel.udeb stable/main/binary-mipsel/reiserfs-modules-2.6.18-5-sb1a-bcm91480b-di_0.13etch1_mipsel.udeb stable/main/binary-mipsel/jfs-modules-2.6.18-5-sb1-bcm91250a-di_0.13etch1_mipsel.udeb stable/main/binary-mipsel/ipv6-modules-2.6.18-5-r5k-cobalt-di_0.13etch1_mipsel.udeb stable/main/binary-mipsel/loop-modules-2.6.18-5-sb1a-bcm91480b-di_0.13etch1_mipsel.udeb stable/main/binary-mipsel/xfs-modules-2.6.18-5-sb1a-bcm91480b-di_0.13etch1_mipsel.udeb stable/main/binary-mipsel/ppp-modules-2.6.18-5-sb1a-bcm91480b-di_0.13etch1_mipsel.udeb stable/main/binary-mipsel/cdrom-core-modules-2.6.18-5-r5k-cobalt-di_0.13etch1_mipsel.udeb stable/main/binary-mipsel/input-modules-2.6.18-5-sb1-bcm91250a-di_0.13etch1_mipsel.udeb stable/main/binary-mipsel/sata-modules-2.6.18-5-sb1a-bcm91480b-di_0.13etch1_mipsel.udeb stable/main/binary-mipsel/fat-modules-2.6.18-5-sb1-bcm91250a-di_0.13etch1_mipsel.udeb stable/main/binary-mipsel/ipv6-modules-2.6.18-5-sb1-bcm91250a-di_0.13etch1_mipsel.udeb stable/main/binary-mipsel/sata-modules-2.6.18-5-sb1-bcm91250a-di_0.13etch1_mipsel.udeb stable/main/binary-mipsel/ide-modules-2.6.18-5-sb1-bcm91250a-di_0.13etch1_mipsel.udeb stable/main/binary-mipsel/scsi-common-modules-2.6.18-5-sb1-bcm91250a-di_0.13etch1_mipsel.udeb stable/main/binary-mipsel/xfs-modules-2.6.18-5-r5k-cobalt-di_0.13etch1_mipsel.udeb stable/main/binary-mipsel/scsi-core-modules-2.6.18-5-sb1-bcm91250a-di_0.13etch1_mipsel.udeb stable/main/binary-mipsel/scsi-modules-2.6.18-5-sb1a-bcm91480b-di_0.13etch1_mipsel.udeb stable/main/binary-mipsel/kernel-image-2.6.18-5-r5k-cobalt-di_0.13etch1_mipsel.udeb stable/main/binary-mipsel/ppp-modules-2.6.18-5-r5k-cobalt-di_0.13etch1_mipsel.udeb stable/main/binary-mipsel/fb-modules-2.6.18-5-sb1a-bcm91480b-di_0.13etch1_mipsel.udeb stable/main/source/linux-kernel-di-mipsel-2.6_0.13etch1.tar.gz stable/main/binary-mipsel/jfs-modules-2.6.18-5-qemu-di_0.13etch1_mipsel.udeb stable/main/binary-mipsel/scsi-core-modules-2.6.18-5-sb1a-bcm91480b-di_0.13etch1_mipsel.udeb stable/main/binary-mipsel/loop-modules-2.6.18-5-qemu-di_0.13etch1_mipsel.udeb stable/main/binary-mipsel/kernel-image-2.6.18-5-sb1-bcm91250a-di_0.13etch1_mipsel.udeb stable/main/binary-mipsel/scsi-common-modules-2.6.18-5-sb1a-bcm91480b-di_0.13etch1_mipsel.udeb stable/main/binary-mipsel/kernel-image-2.6.18-5-sb1a-bcm91480b-di_0.13etch1_mipsel.udeb stable/main/binary-mipsel/loop-modules-2.6.18-5-r5k-cobalt-di_0.13etch1_mipsel.udeb stable/main/binary-mipsel/usb-storage-modules-2.6.18-5-sb1a-bcm91480b-di_0.13etch1_mipsel.udeb stable/main/binary-mipsel/jfs-modules-2.6.18-5-r5k-cobalt-di_0.13etch1_mipsel.udeb stable/main/binary-mipsel/fat-modules-2.6.18-5-r5k-cobalt-di_0.13etch1_mipsel.udeb stable/main/binary-mipsel/input-modules-2.6.18-5-sb1a-bcm91480b-di_0.13etch1_mipsel.udeb stable/main/binary-mipsel/kernel-image-2.6.18-5-qemu-di_0.13etch1_mipsel.udeb stable/main/binary-mipsel/ide-modules-2.6.18-5-sb1a-bcm91480b-di_0.13etch1_mipsel.udeb stable/main/binary-mipsel/crypto-modules-2.6.18-5-r3k-kn02-di_0.13etch1_mipsel.udeb stable/main/binary-mipsel/md-modules-2.6.18-5-qemu-di_0.13etch1_mipsel.udeb stable/main/binary-mipsel/reiserfs-modules-2.6.18-5-r4k-kn04-di_0.13etch1_mipsel.udeb stable/main/binary-mipsel/xfs-modules-2.6.18-5-sb1-bcm91250a-di_0.13etch1_mipsel.udeb stable/main/binary-mipsel/loop-modules-2.6.18-5-sb1-bcm91250a-di_0.13etch1_mipsel.udeb stable/main/binary-mipsel/ipv6-modules-2.6.18-5-r4k-kn04-di_0.13etch1_mipsel.udeb stable/main/binary-mipsel/ipv6-modules-2.6.18-5-r3k-kn02-di_0.13etch1_mipsel.udeb stable/main/binary-mipsel/nfs-modules-2.6.18-5-r5k-cobalt-di_0.13etch1_mipsel.udeb stable/main/binary-mipsel/usb-modules-2.6.18-5-sb1-bcm91250a-di_0.13etch1_mipsel.udeb stable/main/binary-mipsel/cdrom-core-modules-2.6.18-5-sb1a-bcm91480b-di_0.13etch1_mipsel.udeb stable/main/source/linux-kernel-di-mipsel-2.6_0.13etch1.dsc stable/main/binary-mipsel/reiserfs-modules-2.6.18-5-r5k-cobalt-di_0.13etch1_mipsel.udeb stable/main/binary-mipsel/reiserfs-modules-2.6.18-5-sb1-bcm91250a-di_0.13etch1_mipsel.udeb stable/main/binary-mipsel/ipv6-modules-2.6.18-5-sb1a-bcm91480b-di_0.13etch1_mipsel.udeb stable/main/binary-mipsel/md-modules-2.6.18-5-r5k-cobalt-di_0.13etch1_mipsel.udeb stable/main/binary-mipsel/jfs-modules-2.6.18-5-sb1a-bcm91480b-di_0.13etch1_mipsel.udeb linux-kernel-di-mipsel-2.6 (0.13etch1) stable; urgency=low * Update to kernel image version 2.6.18.dfsg.1-13 (2.6.18-5). stable/main/binary-mips/md-modules-2.6.18-5-sb1-bcm91250a-di_0.13etch1_mips.udeb stable/main/binary-mips/xfs-modules-2.6.18-5-r4k-ip22-di_0.13etch1_mips.udeb stable/main/binary-mips/reiserfs-modules-2.6.18-5-sb1a-bcm91480b-di_0.13etch1_mips.udeb stable/main/binary-mips/jfs-modules-2.6.18-5-sb1-bcm91250a-di_0.13etch1_mips.udeb stable/main/binary-mips/fb-modules-2.6.18-5-sb1a-bcm91480b-di_0.13etch1_mips.udeb stable/main/binary-mips/ppp-modules-2.6.18-5-sb1-bcm91250a-di_0.13etch1_mips.udeb stable/main/binary-mips/cdrom-core-modules-2.6.18-5-sb1a-bcm91480b-di_0.13etch1_mips.udeb stable/main/binary-mips/scsi-core-modules-2.6.18-5-sb1a-bcm91480b-di_0.13etch1_mips.udeb stable/main/binary-mips/fat-modules-2.6.18-5-qemu-di_0.13etch1_mips.udeb stable/main/binary-mips/loop-modules-2.6.18-5-r5k-ip32-di_0.13etch1_mips.udeb stable/main/binary-mips/ide-modules-2.6.18-5-sb1a-bcm91480b-di_0.13etch1_mips.udeb stable/main/binary-mips/ipv6-modules-2.6.18-5-sb1-bcm91250a-di_0.13etch1_mips.udeb stable/main/binary-mips/jfs-modules-2.6.18-5-r4k-ip22-di_0.13etch1_mips.udeb stable/main/binary-mips/crypto-modules-2.6.18-5-r5k-ip32-di_0.13etch1_mips.udeb stable/main/binary-mips/usb-storage-modules-2.6.18-5-sb1-bcm91250a-di_0.13etch1_mips.udeb stable/main/binary-mips/reiserfs-modules-2.6.18-5-qemu-di_0.13etch1_mips.udeb stable/main/source/linux-kernel-di-mips-2.6_0.13etch1.dsc stable/main/binary-mips/ipv6-modules-2.6.18-5-r5k-ip32-di_0.13etch1_mips.udeb stable/main/binary-mips/jfs-modules-2.6.18-5-sb1a-bcm91480b-di_0.13etch1_mips.udeb stable/main/binary-mips/fb-modules-2.6.18-5-sb1-bcm91250a-di_0.13etch1_mips.udeb stable/main/binary-mips/loop-modules-2.6.18-5-r4k-ip22-di_0.13etch1_mips.udeb stable/main/binary-mips/xfs-modules-2.6.18-5-qemu-di_0.13etch1_mips.udeb stable/main/binary-mips/usb-storage-modules-2.6.18-5-sb1a-bcm91480b-di_0.13etch1_mips.udeb stable/main/source/linux-kernel-di-mips-2.6_0.13etch1.tar.gz stable/main/binary-mips/usb-modules-2.6.18-5-sb1-bcm91250a-di_0.13etch1_mips.udeb stable/main/binary-mips/md-modules-2.6.18-5-sb1a-bcm91480b-di_0.13etch1_mips.udeb stable/main/binary-mips/jfs-modules-2.6.18-5-qemu-di_0.13etch1_mips.udeb stable/main/binary-mips/usb-modules-2.6.18-5-sb1a-bcm91480b-di_0.13etch1_mips.udeb stable/main/binary-mips/md-modules-2.6.18-5-r4k-ip22-di_0.13etch1_mips.udeb stable/main/binary-mips/input-modules-2.6.18-5-sb1a-bcm91480b-di_0.13etch1_mips.udeb stable/main/binary-mips/reiserfs-modules-2.6.18-5-sb1-bcm91250a-di_0.13etch1_mips.udeb stable/main/binary-mips/loop-modules-2.6.18-5-qemu-di_0.13etch1_mips.udeb stable/main/binary-mips/xfs-modules-2.6.18-5-r5k-ip32-di_0.13etch1_mips.udeb stable/main/binary-mips/crypto-modules-2.6.18-5-sb1a-bcm91480b-di_0.13etch1_mips.udeb stable/main/binary-mips/reiserfs-modules-2.6.18-5-r4k-ip22-di_0.13etch1_mips.udeb stable/main/binary-mips/xfs-modules-2.6.18-5-sb1-bcm91250a-di_0.13etch1_mips.udeb stable/main/binary-mips/sata-modules-2.6.18-5-sb1-bcm91250a-di_0.13etch1_mips.udeb stable/main/binary-mips/jfs-modules-2.6.18-5-r5k-ip32-di_0.13etch1_mips.udeb stable/main/binary-mips/ide-modules-2.6.18-5-sb1-bcm91250a-di_0.13etch1_mips.udeb stable/main/binary-mips/kernel-image-2.6.18-5-r5k-ip32-di_0.13etch1_mips.udeb stable/main/binary-mips/kernel-image-2.6.18-5-qemu-di_0.13etch1_mips.udeb stable/main/binary-mips/loop-modules-2.6.18-5-sb1a-bcm91480b-di_0.13etch1_mips.udeb stable/main/binary-mips/crypto-modules-2.6.18-5-r4k-ip22-di_0.13etch1_mips.udeb stable/main/binary-mips/scsi-common-modules-2.6.18-5-sb1a-bcm91480b-di_0.13etch1_mips.udeb stable/main/binary-mips/input-modules-2.6.18-5-sb1-bcm91250a-di_0.13etch1_mips.udeb stable/main/binary-mips/fat-modules-2.6.18-5-sb1a-bcm91480b-di_0.13etch1_mips.udeb stable/main/binary-mips/ppp-modules-2.6.18-5-r5k-ip32-di_0.13etch1_mips.udeb stable/main/binary-mips/kernel-image-2.6.18-5-sb1a-bcm91480b-di_0.13etch1_mips.udeb stable/main/binary-mips/ipv6-modules-2.6.18-5-r4k-ip22-di_0.13etch1_mips.udeb stable/main/binary-mips/scsi-common-modules-2.6.18-5-sb1-bcm91250a-di_0.13etch1_mips.udeb stable/main/binary-mips/ppp-modules-2.6.18-5-r4k-ip22-di_0.13etch1_mips.udeb stable/main/binary-mips/loop-modules-2.6.18-5-sb1-bcm91250a-di_0.13etch1_mips.udeb stable/main/binary-mips/ppp-modules-2.6.18-5-sb1a-bcm91480b-di_0.13etch1_mips.udeb stable/main/binary-mips/cdrom-core-modules-2.6.18-5-sb1-bcm91250a-di_0.13etch1_mips.udeb stable/main/binary-mips/scsi-core-modules-2.6.18-5-sb1-bcm91250a-di_0.13etch1_mips.udeb stable/main/binary-mips/xfs-modules-2.6.18-5-sb1a-bcm91480b-di_0.13etch1_mips.udeb stable/main/binary-mips/md-modules-2.6.18-5-r5k-ip32-di_0.13etch1_mips.udeb stable/main/binary-mips/crypto-modules-2.6.18-5-sb1-bcm91250a-di_0.13etch1_mips.udeb stable/main/binary-mips/scsi-modules-2.6.18-5-sb1a-bcm91480b-di_0.13etch1_mips.udeb stable/main/binary-mips/reiserfs-modules-2.6.18-5-r5k-ip32-di_0.13etch1_mips.udeb stable/main/binary-mips/scsi-modules-2.6.18-5-sb1-bcm91250a-di_0.13etch1_mips.udeb stable/main/binary-mips/kernel-image-2.6.18-5-sb1-bcm91250a-di_0.13etch1_mips.udeb stable/main/binary-mips/sata-modules-2.6.18-5-sb1a-bcm91480b-di_0.13etch1_mips.udeb stable/main/binary-mips/ipv6-modules-2.6.18-5-sb1a-bcm91480b-di_0.13etch1_mips.udeb stable/main/binary-mips/kernel-image-2.6.18-5-r4k-ip22-di_0.13etch1_mips.udeb stable/main/binary-mips/fat-modules-2.6.18-5-sb1-bcm91250a-di_0.13etch1_mips.udeb stable/main/binary-mips/md-modules-2.6.18-5-qemu-di_0.13etch1_mips.udeb linux-kernel-di-mips-2.6 (0.13etch1) stable; urgency=low * Update to kernel image version 2.6.18.dfsg.1-13 (2.6.18-5). stable/main/binary-ia64/scsi-common-modules-2.6.18-5-itanium-di_1.18etch1_ia64.udeb stable/main/binary-ia64/fb-modules-2.6.18-5-itanium-di_1.18etch1_ia64.udeb stable/main/binary-ia64/nic-usb-modules-2.6.18-5-itanium-di_1.18etch1_ia64.udeb stable/main/binary-ia64/ext3-modules-2.6.18-5-itanium-di_1.18etch1_ia64.udeb stable/main/binary-ia64/firmware-modules-2.6.18-5-itanium-di_1.18etch1_ia64.udeb stable/main/binary-ia64/ppp-modules-2.6.18-5-itanium-di_1.18etch1_ia64.udeb stable/main/binary-ia64/ide-modules-2.6.18-5-itanium-di_1.18etch1_ia64.udeb stable/main/binary-ia64/acpi-modules-2.6.18-5-itanium-di_1.18etch1_ia64.udeb stable/main/binary-ia64/ide-core-modules-2.6.18-5-itanium-di_1.18etch1_ia64.udeb stable/main/binary-ia64/loop-modules-2.6.18-5-itanium-di_1.18etch1_ia64.udeb stable/main/binary-ia64/kernel-image-2.6.18-5-itanium-di_1.18etch1_ia64.udeb stable/main/binary-ia64/usb-storage-modules-2.6.18-5-itanium-di_1.18etch1_ia64.udeb stable/main/binary-ia64/ntfs-modules-2.6.18-5-itanium-di_1.18etch1_ia64.udeb stable/main/binary-ia64/input-modules-2.6.18-5-itanium-di_1.18etch1_ia64.udeb stable/main/binary-ia64/crypto-modules-2.6.18-5-itanium-di_1.18etch1_ia64.udeb stable/main/binary-ia64/fat-modules-2.6.18-5-itanium-di_1.18etch1_ia64.udeb stable/main/binary-ia64/firewire-core-modules-2.6.18-5-itanium-di_1.18etch1_ia64.udeb stable/main/binary-ia64/reiserfs-modules-2.6.18-5-itanium-di_1.18etch1_ia64.udeb stable/main/binary-ia64/ufs-modules-2.6.18-5-itanium-di_1.18etch1_ia64.udeb stable/main/binary-ia64/mouse-modules-2.6.18-5-itanium-di_1.18etch1_ia64.udeb stable/main/binary-ia64/pcmcia-modules-2.6.18-5-itanium-di_1.18etch1_ia64.udeb stable/main/source/linux-kernel-di-ia64-2.6_1.18etch1.dsc stable/main/binary-ia64/parport-modules-2.6.18-5-itanium-di_1.18etch1_ia64.udeb stable/main/binary-ia64/jfs-modules-2.6.18-5-itanium-di_1.18etch1_ia64.udeb stable/main/source/linux-kernel-di-ia64-2.6_1.18etch1.tar.gz stable/main/binary-ia64/sata-modules-2.6.18-5-itanium-di_1.18etch1_ia64.udeb stable/main/binary-ia64/serial-modules-2.6.18-5-itanium-di_1.18etch1_ia64.udeb stable/main/binary-ia64/irda-modules-2.6.18-5-itanium-di_1.18etch1_ia64.udeb stable/main/binary-ia64/scsi-core-modules-2.6.18-5-itanium-di_1.18etch1_ia64.udeb stable/main/binary-ia64/nic-shared-modules-2.6.18-5-itanium-di_1.18etch1_ia64.udeb stable/main/binary-ia64/scsi-modules-2.6.18-5-itanium-di_1.18etch1_ia64.udeb stable/main/binary-ia64/md-modules-2.6.18-5-itanium-di_1.18etch1_ia64.udeb stable/main/binary-ia64/ipv6-modules-2.6.18-5-itanium-di_1.18etch1_ia64.udeb stable/main/binary-ia64/crc-modules-2.6.18-5-itanium-di_1.18etch1_ia64.udeb stable/main/binary-ia64/plip-modules-2.6.18-5-itanium-di_1.18etch1_ia64.udeb stable/main/binary-ia64/cdrom-core-modules-2.6.18-5-itanium-di_1.18etch1_ia64.udeb stable/main/binary-ia64/nic-modules-2.6.18-5-itanium-di_1.18etch1_ia64.udeb stable/main/binary-ia64/usb-modules-2.6.18-5-itanium-di_1.18etch1_ia64.udeb stable/main/binary-ia64/xfs-modules-2.6.18-5-itanium-di_1.18etch1_ia64.udeb stable/main/binary-ia64/sn-modules-2.6.18-5-itanium-di_1.18etch1_ia64.udeb stable/main/binary-ia64/efi-modules-2.6.18-5-itanium-di_1.18etch1_ia64.udeb linux-kernel-di-ia64-2.6 (1.18etch1) stable; urgency=low * Update to kernel image version 2.6.18.dfsg.1-13 (2.6.18-5). stable/main/binary-i386/crypto-modules-2.6.18-5-486-di_1.44etch1_i386.udeb stable/main/binary-i386/nic-pcmcia-modules-2.6.18-5-486-di_1.44etch1_i386.udeb stable/main/binary-i386/parport-modules-2.6.18-5-486-di_1.44etch1_i386.udeb stable/main/binary-i386/scsi-extra-modules-2.6.18-5-486-di_1.44etch1_i386.udeb stable/main/binary-i386/jfs-modules-2.6.18-5-486-di_1.44etch1_i386.udeb stable/main/binary-i386/ipv6-modules-2.6.18-5-486-di_1.44etch1_i386.udeb stable/main/binary-i386/usb-serial-modules-2.6.18-5-486-di_1.44etch1_i386.udeb stable/main/binary-i386/loop-modules-2.6.18-5-486-di_1.44etch1_i386.udeb stable/main/binary-i386/scsi-modules-2.6.18-5-486-di_1.44etch1_i386.udeb stable/main/binary-i386/reiserfs-modules-2.6.18-5-486-di_1.44etch1_i386.udeb stable/main/binary-i386/md-modules-2.6.18-5-486-di_1.44etch1_i386.udeb stable/main/source/linux-kernel-di-i386-2.6_1.44etch1.tar.gz stable/main/binary-i386/scsi-core-modules-2.6.18-5-486-di_1.44etch1_i386.udeb stable/main/binary-i386/pcmcia-modules-2.6.18-5-486-di_1.44etch1_i386.udeb stable/main/binary-i386/cdrom-core-modules-2.6.18-5-486-di_1.44etch1_i386.udeb stable/main/binary-i386/ppp-modules-2.6.18-5-486-di_1.44etch1_i386.udeb stable/main/binary-i386/ide-modules-2.6.18-5-486-di_1.44etch1_i386.udeb stable/main/binary-i386/xfs-modules-2.6.18-5-486-di_1.44etch1_i386.udeb stable/main/source/linux-kernel-di-i386-2.6_1.44etch1.dsc stable/main/binary-i386/nic-usb-modules-2.6.18-5-486-di_1.44etch1_i386.udeb stable/main/binary-i386/fat-modules-2.6.18-5-486-di_1.44etch1_i386.udeb stable/main/binary-i386/sata-modules-2.6.18-5-486-di_1.44etch1_i386.udeb stable/main/binary-i386/acpi-modules-2.6.18-5-486-di_1.44etch1_i386.udeb stable/main/binary-i386/plip-modules-2.6.18-5-486-di_1.44etch1_i386.udeb stable/main/binary-i386/kernel-image-2.6.18-5-486-di_1.44etch1_i386.udeb stable/main/binary-i386/ext3-modules-2.6.18-5-486-di_1.44etch1_i386.udeb stable/main/binary-i386/pcmcia-storage-modules-2.6.18-5-486-di_1.44etch1_i386.udeb stable/main/binary-i386/ufs-modules-2.6.18-5-486-di_1.44etch1_i386.udeb stable/main/binary-i386/ide-core-modules-2.6.18-5-486-di_1.44etch1_i386.udeb stable/main/binary-i386/input-modules-2.6.18-5-486-di_1.44etch1_i386.udeb stable/main/binary-i386/scsi-common-modules-2.6.18-5-486-di_1.44etch1_i386.udeb stable/main/binary-i386/fb-modules-2.6.18-5-486-di_1.44etch1_i386.udeb stable/main/binary-i386/firewire-core-modules-2.6.18-5-486-di_1.44etch1_i386.udeb stable/main/binary-i386/ntfs-modules-2.6.18-5-486-di_1.44etch1_i386.udeb stable/main/binary-i386/nic-extra-modules-2.6.18-5-486-di_1.44etch1_i386.udeb stable/main/binary-i386/qnx4-modules-2.6.18-5-486-di_1.44etch1_i386.udeb stable/main/binary-i386/floppy-modules-2.6.18-5-486-di_1.44etch1_i386.udeb stable/main/binary-i386/cdrom-modules-2.6.18-5-486-di_1.44etch1_i386.udeb stable/main/binary-i386/nic-shared-modules-2.6.18-5-486-di_1.44etch1_i386.udeb stable/main/binary-i386/efi-modules-2.6.18-5-486-di_1.44etch1_i386.udeb stable/main/binary-i386/usb-storage-modules-2.6.18-5-486-di_1.44etch1_i386.udeb stable/main/binary-i386/mouse-modules-2.6.18-5-486-di_1.44etch1_i386.udeb stable/main/binary-i386/nic-modules-2.6.18-5-486-di_1.44etch1_i386.udeb stable/main/binary-i386/firmware-modules-2.6.18-5-486-di_1.44etch1_i386.udeb stable/main/binary-i386/serial-modules-2.6.18-5-486-di_1.44etch1_i386.udeb stable/main/binary-i386/usb-modules-2.6.18-5-486-di_1.44etch1_i386.udeb stable/main/binary-i386/irda-modules-2.6.18-5-486-di_1.44etch1_i386.udeb stable/main/binary-i386/crc-modules-2.6.18-5-486-di_1.44etch1_i386.udeb linux-kernel-di-i386-2.6 (1.44etch1) stable; urgency=low * Update to kernel image version 2.6.18.dfsg.1-13 (2.6.18-5). stable/main/source/linux-kernel-di-hppa-2.6_1.17etch1.tar.gz stable/main/binary-hppa/md-modules-2.6.18-5-parisc-di_1.17etch1_hppa.udeb stable/main/binary-hppa/loop-modules-2.6.18-5-parisc64-di_1.17etch1_hppa.udeb stable/main/binary-hppa/ppp-modules-2.6.18-5-parisc-di_1.17etch1_hppa.udeb stable/main/binary-hppa/crypto-modules-2.6.18-5-parisc-di_1.17etch1_hppa.udeb stable/main/binary-hppa/input-modules-2.6.18-5-parisc-di_1.17etch1_hppa.udeb stable/main/binary-hppa/nic-modules-2.6.18-5-parisc64-di_1.17etch1_hppa.udeb stable/main/binary-hppa/usb-modules-2.6.18-5-parisc-di_1.17etch1_hppa.udeb stable/main/binary-hppa/ipv6-modules-2.6.18-5-parisc-di_1.17etch1_hppa.udeb stable/main/binary-hppa/ide-modules-2.6.18-5-parisc64-di_1.17etch1_hppa.udeb stable/main/binary-hppa/cdrom-core-modules-2.6.18-5-parisc64-di_1.17etch1_hppa.udeb stable/main/binary-hppa/kernel-image-2.6.18-5-parisc-di_1.17etch1_hppa.udeb stable/main/binary-hppa/ext3-modules-2.6.18-5-parisc-di_1.17etch1_hppa.udeb stable/main/binary-hppa/input-modules-2.6.18-5-parisc64-di_1.17etch1_hppa.udeb stable/main/source/linux-kernel-di-hppa-2.6_1.17etch1.dsc stable/main/binary-hppa/usb-storage-modules-2.6.18-5-parisc-di_1.17etch1_hppa.udeb stable/main/binary-hppa/md-modules-2.6.18-5-parisc64-di_1.17etch1_hppa.udeb stable/main/binary-hppa/scsi-modules-2.6.18-5-parisc-di_1.17etch1_hppa.udeb stable/main/binary-hppa/crypto-modules-2.6.18-5-parisc64-di_1.17etch1_hppa.udeb stable/main/binary-hppa/scsi-modules-2.6.18-5-parisc64-di_1.17etch1_hppa.udeb stable/main/binary-hppa/ppp-modules-2.6.18-5-parisc64-di_1.17etch1_hppa.udeb stable/main/binary-hppa/kernel-image-2.6.18-5-parisc64-di_1.17etch1_hppa.udeb stable/main/binary-hppa/ide-modules-2.6.18-5-parisc-di_1.17etch1_hppa.udeb stable/main/binary-hppa/usb-modules-2.6.18-5-parisc64-di_1.17etch1_hppa.udeb stable/main/binary-hppa/ipv6-modules-2.6.18-5-parisc64-di_1.17etch1_hppa.udeb stable/main/binary-hppa/usb-storage-modules-2.6.18-5-parisc64-di_1.17etch1_hppa.udeb stable/main/binary-hppa/loop-modules-2.6.18-5-parisc-di_1.17etch1_hppa.udeb stable/main/binary-hppa/nic-modules-2.6.18-5-parisc-di_1.17etch1_hppa.udeb stable/main/binary-hppa/cdrom-core-modules-2.6.18-5-parisc-di_1.17etch1_hppa.udeb stable/main/binary-hppa/ext3-modules-2.6.18-5-parisc64-di_1.17etch1_hppa.udeb linux-kernel-di-hppa-2.6 (1.17etch1) stable; urgency=low * Update to kernel image version 2.6.18.dfsg.1-13 (2.6.18-5). stable/main/binary-arm/fat-modules-2.6.18-5-rpc-di_1.10etch1_arm.udeb stable/main/binary-arm/scsi-core-modules-2.6.18-5-iop32x-di_1.10etch1_arm.udeb stable/main/source/linux-kernel-di-arm-2.6_1.10etch1.dsc stable/main/binary-arm/cdrom-core-modules-2.6.18-5-iop32x-di_1.10etch1_arm.udeb stable/main/binary-arm/md-modules-2.6.18-5-ixp4xx-di_1.10etch1_arm.udeb stable/main/binary-arm/scsi-core-modules-2.6.18-5-rpc-di_1.10etch1_arm.udeb stable/main/binary-arm/usb-storage-modules-2.6.18-5-ixp4xx-di_1.10etch1_arm.udeb stable/main/binary-arm/kernel-image-2.6.18-5-iop32x-di_1.10etch1_arm.udeb stable/main/binary-arm/scsi-core-modules-2.6.18-5-footbridge-di_1.10etch1_arm.udeb stable/main/binary-arm/nic-usb-modules-2.6.18-5-iop32x-di_1.10etch1_arm.udeb stable/main/binary-arm/nic-modules-2.6.18-5-footbridge-di_1.10etch1_arm.udeb stable/main/binary-arm/reiserfs-modules-2.6.18-5-footbridge-di_1.10etch1_arm.udeb stable/main/binary-arm/loop-modules-2.6.18-5-ixp4xx-di_1.10etch1_arm.udeb stable/main/binary-arm/usb-storage-modules-2.6.18-5-iop32x-di_1.10etch1_arm.udeb stable/main/binary-arm/sata-modules-2.6.18-5-iop32x-di_1.10etch1_arm.udeb stable/main/binary-arm/input-modules-2.6.18-5-ixp4xx-di_1.10etch1_arm.udeb stable/main/binary-arm/usb-modules-2.6.18-5-iop32x-di_1.10etch1_arm.udeb stable/main/binary-arm/md-modules-2.6.18-5-iop32x-di_1.10etch1_arm.udeb stable/main/binary-arm/fat-modules-2.6.18-5-iop32x-di_1.10etch1_arm.udeb stable/main/binary-arm/kernel-image-2.6.18-5-footbridge-di_1.10etch1_arm.udeb stable/main/binary-arm/kernel-image-2.6.18-5-rpc-di_1.10etch1_arm.udeb stable/main/binary-arm/scsi-core-modules-2.6.18-5-ixp4xx-di_1.10etch1_arm.udeb stable/main/binary-arm/loop-modules-2.6.18-5-footbridge-di_1.10etch1_arm.udeb stable/main/binary-arm/usb-storage-modules-2.6.18-5-footbridge-di_1.10etch1_arm.udeb stable/main/binary-arm/crc-modules-2.6.18-5-iop32x-di_1.10etch1_arm.udeb stable/main/binary-arm/ext3-modules-2.6.18-5-iop32x-di_1.10etch1_arm.udeb stable/main/source/linux-kernel-di-arm-2.6_1.10etch1.tar.gz stable/main/binary-arm/usb-modules-2.6.18-5-footbridge-di_1.10etch1_arm.udeb stable/main/binary-arm/nic-usb-modules-2.6.18-5-ixp4xx-di_1.10etch1_arm.udeb stable/main/binary-arm/nic-modules-2.6.18-5-iop32x-di_1.10etch1_arm.udeb stable/main/binary-arm/fat-modules-2.6.18-5-ixp4xx-di_1.10etch1_arm.udeb stable/main/binary-arm/crc-modules-2.6.18-5-ixp4xx-di_1.10etch1_arm.udeb stable/main/binary-arm/loop-modules-2.6.18-5-iop32x-di_1.10etch1_arm.udeb stable/main/binary-arm/crc-modules-2.6.18-5-footbridge-di_1.10etch1_arm.udeb stable/main/binary-arm/kernel-image-2.6.18-5-ixp4xx-di_1.10etch1_arm.udeb stable/main/binary-arm/usb-modules-2.6.18-5-ixp4xx-di_1.10etch1_arm.udeb stable/main/binary-arm/ide-modules-2.6.18-5-iop32x-di_1.10etch1_arm.udeb stable/main/binary-arm/loop-modules-2.6.18-5-rpc-di_1.10etch1_arm.udeb stable/main/binary-arm/nic-shared-modules-2.6.18-5-footbridge-di_1.10etch1_arm.udeb stable/main/binary-arm/ext3-modules-2.6.18-5-ixp4xx-di_1.10etch1_arm.udeb stable/main/binary-arm/cdrom-core-modules-2.6.18-5-footbridge-di_1.10etch1_arm.udeb stable/main/binary-arm/reiserfs-modules-2.6.18-5-iop32x-di_1.10etch1_arm.udeb stable/main/binary-arm/fat-modules-2.6.18-5-footbridge-di_1.10etch1_arm.udeb stable/main/binary-arm/nic-modules-2.6.18-5-ixp4xx-di_1.10etch1_arm.udeb stable/main/binary-arm/md-modules-2.6.18-5-footbridge-di_1.10etch1_arm.udeb stable/main/binary-arm/reiserfs-modules-2.6.18-5-ixp4xx-di_1.10etch1_arm.udeb stable/main/binary-arm/ide-core-modules-2.6.18-5-iop32x-di_1.10etch1_arm.udeb stable/main/binary-arm/ide-modules-2.6.18-5-footbridge-di_1.10etch1_arm.udeb stable/main/binary-arm/reiserfs-modules-2.6.18-5-rpc-di_1.10etch1_arm.udeb linux-kernel-di-arm-2.6 (1.10etch1) stable; urgency=low * Update to kernel image version 2.6.18.dfsg.1-13 (2.6.18-5). stable/main/binary-amd64/scsi-extra-modules-2.6.18-5-amd64-di_1.21etch1_amd64.udeb stable/main/binary-amd64/fat-modules-2.6.18-5-amd64-di_1.21etch1_amd64.udeb stable/main/binary-amd64/nic-modules-2.6.18-5-amd64-di_1.21etch1_amd64.udeb stable/main/binary-amd64/loop-modules-2.6.18-5-amd64-di_1.21etch1_amd64.udeb stable/main/binary-amd64/scsi-modules-2.6.18-5-amd64-di_1.21etch1_amd64.udeb stable/main/binary-amd64/ipv6-modules-2.6.18-5-amd64-di_1.21etch1_amd64.udeb stable/main/binary-amd64/plip-modules-2.6.18-5-amd64-di_1.21etch1_amd64.udeb stable/main/binary-amd64/jfs-modules-2.6.18-5-amd64-di_1.21etch1_amd64.udeb stable/main/binary-amd64/ufs-modules-2.6.18-5-amd64-di_1.21etch1_amd64.udeb stable/main/binary-amd64/usb-serial-modules-2.6.18-5-amd64-di_1.21etch1_amd64.udeb stable/main/binary-amd64/crypto-modules-2.6.18-5-amd64-di_1.21etch1_amd64.udeb stable/main/binary-amd64/xfs-modules-2.6.18-5-amd64-di_1.21etch1_amd64.udeb stable/main/binary-amd64/parport-modules-2.6.18-5-amd64-di_1.21etch1_amd64.udeb stable/main/binary-amd64/core-modules-2.6.18-5-amd64-di_1.21etch1_amd64.udeb stable/main/binary-amd64/nic-shared-modules-2.6.18-5-amd64-di_1.21etch1_amd64.udeb stable/main/binary-amd64/ppp-modules-2.6.18-5-amd64-di_1.21etch1_amd64.udeb stable/main/binary-amd64/usb-modules-2.6.18-5-amd64-di_1.21etch1_amd64.udeb stable/main/binary-amd64/nic-usb-modules-2.6.18-5-amd64-di_1.21etch1_amd64.udeb stable/main/source/linux-kernel-di-amd64-2.6_1.21etch1.dsc stable/main/binary-amd64/floppy-modules-2.6.18-5-amd64-di_1.21etch1_amd64.udeb stable/main/binary-amd64/cdrom-core-modules-2.6.18-5-amd64-di_1.21etch1_amd64.udeb stable/main/binary-amd64/pcmcia-storage-modules-2.6.18-5-amd64-di_1.21etch1_amd64.udeb stable/main/binary-amd64/acpi-modules-2.6.18-5-amd64-di_1.21etch1_amd64.udeb stable/main/binary-amd64/scsi-core-modules-2.6.18-5-amd64-di_1.21etch1_amd64.udeb stable/main/binary-amd64/kernel-image-2.6.18-5-amd64-di_1.21etch1_amd64.udeb stable/main/binary-amd64/usb-storage-modules-2.6.18-5-amd64-di_1.21etch1_amd64.udeb stable/main/binary-amd64/ntfs-modules-2.6.18-5-amd64-di_1.21etch1_amd64.udeb stable/main/binary-amd64/input-modules-2.6.18-5-amd64-di_1.21etch1_amd64.udeb stable/main/binary-amd64/nic-extra-modules-2.6.18-5-amd64-di_1.21etch1_amd64.udeb stable/main/binary-amd64/ide-core-modules-2.6.18-5-amd64-di_1.21etch1_amd64.udeb stable/main/binary-amd64/md-modules-2.6.18-5-amd64-di_1.21etch1_amd64.udeb stable/main/binary-amd64/nic-pcmcia-modules-2.6.18-5-amd64-di_1.21etch1_amd64.udeb stable/main/binary-amd64/qnx4-modules-2.6.18-5-amd64-di_1.21etch1_amd64.udeb stable/main/binary-amd64/crc-modules-2.6.18-5-amd64-di_1.21etch1_amd64.udeb stable/main/binary-amd64/ext3-modules-2.6.18-5-amd64-di_1.21etch1_amd64.udeb stable/main/binary-amd64/mouse-modules-2.6.18-5-amd64-di_1.21etch1_amd64.udeb stable/main/binary-amd64/ext2-modules-2.6.18-5-amd64-di_1.21etch1_amd64.udeb stable/main/binary-amd64/sata-modules-2.6.18-5-amd64-di_1.21etch1_amd64.udeb stable/main/binary-amd64/reiserfs-modules-2.6.18-5-amd64-di_1.21etch1_amd64.udeb stable/main/binary-amd64/firewire-core-modules-2.6.18-5-amd64-di_1.21etch1_amd64.udeb stable/main/binary-amd64/fb-modules-2.6.18-5-amd64-di_1.21etch1_amd64.udeb stable/main/binary-amd64/pcmcia-modules-2.6.18-5-amd64-di_1.21etch1_amd64.udeb stable/main/binary-amd64/scsi-common-modules-2.6.18-5-amd64-di_1.21etch1_amd64.udeb stable/main/binary-amd64/serial-modules-2.6.18-5-amd64-di_1.21etch1_amd64.udeb stable/main/binary-amd64/ide-modules-2.6.18-5-amd64-di_1.21etch1_amd64.udeb stable/main/source/linux-kernel-di-amd64-2.6_1.21etch1.tar.gz stable/main/binary-amd64/irda-modules-2.6.18-5-amd64-di_1.21etch1_amd64.udeb linux-kernel-di-amd64-2.6 (1.21etch1) stable; urgency=low [ Joey Hess ] * Add ext2-modules udeb. The kernel-image had been providing ext2-modules, but while that's correct for the i386 (-486) kernel, which has ext2 built-in, it's wrong for amd64, which has it modular. [ Frans Pop ] * Add missing usbhid modules in input-modules. * Rename firmware-modules to core-modules and add mbcache.ko which is needed by both ext2 and ext3 on amd64. * Update to kernel image version 2.6.18.dfsg.1-13 (2.6.18-5). stable/main/binary-alpha/cdrom-core-modules-2.6.18-5-alpha-generic-di_0.17etch1_alpha.udeb stable/main/source/linux-kernel-di-alpha-2.6_0.17etch1.tar.gz stable/main/binary-alpha/nic-extra-modules-2.6.18-5-alpha-generic-di_0.17etch1_alpha.udeb stable/main/binary-alpha/ide-modules-2.6.18-5-alpha-generic-di_0.17etch1_alpha.udeb stable/main/binary-alpha/ide-core-modules-2.6.18-5-alpha-generic-di_0.17etch1_alpha.udeb stable/main/binary-alpha/xfs-modules-2.6.18-5-alpha-generic-di_0.17etch1_alpha.udeb stable/main/binary-alpha/scsi-core-modules-2.6.18-5-alpha-generic-di_0.17etch1_alpha.udeb stable/main/binary-alpha/usb-serial-modules-2.6.18-5-alpha-generic-di_0.17etch1_alpha.udeb stable/main/binary-alpha/nic-modules-2.6.18-5-alpha-generic-di_0.17etch1_alpha.udeb stable/main/binary-alpha/fb-modules-2.6.18-5-alpha-generic-di_0.17etch1_alpha.udeb stable/main/binary-alpha/sata-modules-2.6.18-5-alpha-generic-di_0.17etch1_alpha.udeb stable/main/binary-alpha/reiserfs-modules-2.6.18-5-alpha-generic-di_0.17etch1_alpha.udeb stable/main/binary-alpha/crc-modules-2.6.18-5-alpha-generic-di_0.17etch1_alpha.udeb stable/main/binary-alpha/ipv6-modules-2.6.18-5-alpha-generic-di_0.17etch1_alpha.udeb stable/main/binary-alpha/nic-shared-modules-2.6.18-5-alpha-generic-di_0.17etch1_alpha.udeb stable/main/binary-alpha/plip-modules-2.6.18-5-alpha-generic-di_0.17etch1_alpha.udeb stable/main/binary-alpha/md-modules-2.6.18-5-alpha-generic-di_0.17etch1_alpha.udeb stable/main/binary-alpha/srm-modules-2.6.18-5-alpha-generic-di_0.17etch1_alpha.udeb stable/main/binary-alpha/scsi-extra-modules-2.6.18-5-alpha-generic-di_0.17etch1_alpha.udeb stable/main/binary-alpha/scsi-common-modules-2.6.18-5-alpha-generic-di_0.17etch1_alpha.udeb stable/main/binary-alpha/cdrom-modules-2.6.18-5-alpha-generic-di_0.17etch1_alpha.udeb stable/main/binary-alpha/crypto-modules-2.6.18-5-alpha-generic-di_0.17etch1_alpha.udeb stable/main/binary-alpha/jfs-modules-2.6.18-5-alpha-generic-di_0.17etch1_alpha.udeb stable/main/binary-alpha/usb-modules-2.6.18-5-alpha-generic-di_0.17etch1_alpha.udeb stable/main/binary-alpha/fat-modules-2.6.18-5-alpha-generic-di_0.17etch1_alpha.udeb stable/main/binary-alpha/ppp-modules-2.6.18-5-alpha-generic-di_0.17etch1_alpha.udeb stable/main/binary-alpha/firmware-modules-2.6.18-5-alpha-generic-di_0.17etch1_alpha.udeb stable/main/binary-alpha/usb-storage-modules-2.6.18-5-alpha-generic-di_0.17etch1_alpha.udeb stable/main/binary-alpha/kernel-image-2.6.18-5-alpha-generic-di_0.17etch1_alpha.udeb stable/main/source/linux-kernel-di-alpha-2.6_0.17etch1.dsc stable/main/binary-alpha/ext3-modules-2.6.18-5-alpha-generic-di_0.17etch1_alpha.udeb stable/main/binary-alpha/scsi-modules-2.6.18-5-alpha-generic-di_0.17etch1_alpha.udeb stable/main/binary-alpha/parport-modules-2.6.18-5-alpha-generic-di_0.17etch1_alpha.udeb linux-kernel-di-alpha-2.6 (0.17etch1) stable; urgency=low * Update to kernel image version 2.6.18.dfsg.1-13 (2.6.18-5). stable/main/binary-s390/linux-headers-2.6.18-5-s390x_2.6.18.dfsg.1-13_s390.deb stable/main/binary-s390/linux-image-2.6.18-5-s390x_2.6.18.dfsg.1-13_s390.deb stable/main/binary-s390/linux-image-2.6.18-5-vserver-s390x_2.6.18.dfsg.1-13_s390.deb stable/main/binary-s390/linux-headers-2.6.18-5-vserver_2.6.18.dfsg.1-13_s390.deb stable/main/binary-s390/linux-headers-2.6.18-5-all_2.6.18.dfsg.1-13_s390.deb stable/main/binary-s390/linux-headers-2.6.18-5-s390_2.6.18.dfsg.1-13_s390.deb stable/main/binary-s390/linux-image-2.6.18-5-s390_2.6.18.dfsg.1-13_s390.deb stable/main/binary-s390/linux-image-2.6.18-5-s390-tape_2.6.18.dfsg.1-13_s390.deb stable/main/binary-s390/linux-headers-2.6.18-5_2.6.18.dfsg.1-13_s390.deb stable/main/binary-s390/linux-headers-2.6.18-5-vserver-s390x_2.6.18.dfsg.1-13_s390.deb stable/main/binary-s390/linux-headers-2.6.18-5-all-s390_2.6.18.dfsg.1-13_s390.deb linux-2.6 (2.6.18.dfsg.1-13) stable; urgency=high [ Bastian Blank ] * [vserver] Fix overflow in network accounting. (closes: #412132) * [vserver] Fix lock accounting. (closes: #417631) * Bump ABI to 5. * Make modules packages binnmuable. * [sparc] Enable Qlogic QLA SCSI support. (closes: #417629) [ dann frazier ] * bugfix/listxattr-mem-corruption.patch [SECURITY] Fix userspace corruption vulnerability caused by incorrectly promoted return values in bad_inode_ops This patch changes the kernel ABI. See CVE-2006-5753 * bugfix/all/vserver/net-mount-fix.patch Fix mounting of network filesystems with VX_BINARY_MOUNT caps (closes: #418076) * Disable broken CONFIG_IP_ROUTE_MULTIPATH_CACHED setting. (closes: #418344) * bugfix/ipv6-disallow-RH0-by-default.patch [SECURITY] Avoid a remote DoS (network amplification between two routers) by disabling type0 IPv6 route headers by default. Can be re-enabled via a sysctl interface. Thanks to Vlad Yasevich for porting help. This patch changes the kernel ABI. See CVE-2007-2242 * Fix an oops which potentially results in data corruption in the gdth driver. (closes: #412092) * bugfix/amd64-make-gart-ptes-uncacheable.patch Fix silent data corruption using GART iommu (closes: #404148) [ maximilian attems ] * Backport support for i965 to agp too. (closes: #406111) * Compile fix for UML CONFIG_MODE_TT=y. (closes: #412957) * Fix ide-generic jmicron device conflict. (closes: #421281) [ Martin Michlmayr ] * Fix wrong checksum for split TCP packets on 64-bit MIPS. (closes: #421283) stable/main/binary-powerpc/linux-headers-2.6.18-5_2.6.18.dfsg.1-13_powerpc.deb stable/main/binary-powerpc/linux-image-2.6.18-5-powerpc64_2.6.18.dfsg.1-13_powerpc.deb stable/main/binary-powerpc/linux-headers-2.6.18-5-powerpc-miboot_2.6.18.dfsg.1-13_powerpc.deb stable/main/binary-powerpc/linux-headers-2.6.18-5-powerpc-smp_2.6.18.dfsg.1-13_powerpc.deb stable/main/binary-powerpc/linux-headers-2.6.18-5-powerpc64_2.6.18.dfsg.1-13_powerpc.deb stable/main/binary-powerpc/linux-image-2.6.18-5-vserver-powerpc64_2.6.18.dfsg.1-13_powerpc.deb stable/main/binary-powerpc/linux-headers-2.6.18-5-powerpc_2.6.18.dfsg.1-13_powerpc.deb stable/main/binary-powerpc/linux-headers-2.6.18-5-all_2.6.18.dfsg.1-13_powerpc.deb stable/main/binary-powerpc/linux-image-2.6.18-5-powerpc_2.6.18.dfsg.1-13_powerpc.deb stable/main/binary-powerpc/linux-image-2.6.18-5-powerpc-miboot_2.6.18.dfsg.1-13_powerpc.deb stable/main/binary-powerpc/linux-headers-2.6.18-5-vserver-powerpc_2.6.18.dfsg.1-13_powerpc.deb stable/main/binary-powerpc/linux-image-2.6.18-5-vserver-powerpc_2.6.18.dfsg.1-13_powerpc.deb stable/main/binary-powerpc/linux-headers-2.6.18-5-vserver-powerpc64_2.6.18.dfsg.1-13_powerpc.deb stable/main/binary-powerpc/linux-image-2.6.18-5-powerpc-smp_2.6.18.dfsg.1-13_powerpc.deb stable/main/binary-powerpc/linux-image-2.6.18-5-prep_2.6.18.dfsg.1-13_powerpc.deb stable/main/binary-powerpc/linux-headers-2.6.18-5-all-powerpc_2.6.18.dfsg.1-13_powerpc.deb stable/main/binary-powerpc/linux-headers-2.6.18-5-prep_2.6.18.dfsg.1-13_powerpc.deb stable/main/binary-powerpc/linux-headers-2.6.18-5-vserver_2.6.18.dfsg.1-13_powerpc.deb linux-2.6 (2.6.18.dfsg.1-13) stable; urgency=high [ Bastian Blank ] * [vserver] Fix overflow in network accounting. (closes: #412132) * [vserver] Fix lock accounting. (closes: #417631) * Bump ABI to 5. * Make modules packages binnmuable. * [sparc] Enable Qlogic QLA SCSI support. (closes: #417629) [ dann frazier ] * bugfix/listxattr-mem-corruption.patch [SECURITY] Fix userspace corruption vulnerability caused by incorrectly promoted return values in bad_inode_ops This patch changes the kernel ABI. See CVE-2006-5753 * bugfix/all/vserver/net-mount-fix.patch Fix mounting of network filesystems with VX_BINARY_MOUNT caps (closes: #418076) * Disable broken CONFIG_IP_ROUTE_MULTIPATH_CACHED setting. (closes: #418344) * bugfix/ipv6-disallow-RH0-by-default.patch [SECURITY] Avoid a remote DoS (network amplification between two routers) by disabling type0 IPv6 route headers by default. Can be re-enabled via a sysctl interface. Thanks to Vlad Yasevich for porting help. This patch changes the kernel ABI. See CVE-2007-2242 * Fix an oops which potentially results in data corruption in the gdth driver. (closes: #412092) * bugfix/amd64-make-gart-ptes-uncacheable.patch Fix silent data corruption using GART iommu (closes: #404148) [ maximilian attems ] * Backport support for i965 to agp too. (closes: #406111) * Compile fix for UML CONFIG_MODE_TT=y. (closes: #412957) * Fix ide-generic jmicron device conflict. (closes: #421281) [ Martin Michlmayr ] * Fix wrong checksum for split TCP packets on 64-bit MIPS. (closes: #421283) stable/main/binary-mipsel/linux-image-2.6.18-5-r3k-kn02_2.6.18.dfsg.1-13_mipsel.deb stable/main/binary-mipsel/linux-image-2.6.18-5-qemu_2.6.18.dfsg.1-13_mipsel.deb stable/main/binary-mipsel/linux-headers-2.6.18-5-r4k-kn04_2.6.18.dfsg.1-13_mipsel.deb stable/main/binary-mipsel/linux-headers-2.6.18-5-r3k-kn02_2.6.18.dfsg.1-13_mipsel.deb stable/main/binary-mipsel/linux-headers-2.6.18-5-sb1a-bcm91480b_2.6.18.dfsg.1-13_mipsel.deb stable/main/binary-mipsel/linux-image-2.6.18-5-sb1a-bcm91480b_2.6.18.dfsg.1-13_mipsel.deb stable/main/binary-mipsel/linux-image-2.6.18-5-r5k-cobalt_2.6.18.dfsg.1-13_mipsel.deb stable/main/binary-mipsel/linux-headers-2.6.18-5_2.6.18.dfsg.1-13_mipsel.deb stable/main/binary-mipsel/linux-headers-2.6.18-5-all-mipsel_2.6.18.dfsg.1-13_mipsel.deb stable/main/binary-mipsel/linux-headers-2.6.18-5-all_2.6.18.dfsg.1-13_mipsel.deb stable/main/binary-mipsel/linux-headers-2.6.18-5-sb1-bcm91250a_2.6.18.dfsg.1-13_mipsel.deb stable/main/binary-mipsel/linux-headers-2.6.18-5-qemu_2.6.18.dfsg.1-13_mipsel.deb stable/main/binary-mipsel/linux-image-2.6.18-5-sb1-bcm91250a_2.6.18.dfsg.1-13_mipsel.deb stable/main/binary-mipsel/linux-headers-2.6.18-5-r5k-cobalt_2.6.18.dfsg.1-13_mipsel.deb stable/main/binary-mipsel/linux-image-2.6.18-5-r4k-kn04_2.6.18.dfsg.1-13_mipsel.deb linux-2.6 (2.6.18.dfsg.1-13) stable; urgency=high [ Bastian Blank ] * [vserver] Fix overflow in network accounting. (closes: #412132) * [vserver] Fix lock accounting. (closes: #417631) * Bump ABI to 5. * Make modules packages binnmuable. * [sparc] Enable Qlogic QLA SCSI support. (closes: #417629) [ dann frazier ] * bugfix/listxattr-mem-corruption.patch [SECURITY] Fix userspace corruption vulnerability caused by incorrectly promoted return values in bad_inode_ops This patch changes the kernel ABI. See CVE-2006-5753 * bugfix/all/vserver/net-mount-fix.patch Fix mounting of network filesystems with VX_BINARY_MOUNT caps (closes: #418076) * Disable broken CONFIG_IP_ROUTE_MULTIPATH_CACHED setting. (closes: #418344) * bugfix/ipv6-disallow-RH0-by-default.patch [SECURITY] Avoid a remote DoS (network amplification between two routers) by disabling type0 IPv6 route headers by default. Can be re-enabled via a sysctl interface. Thanks to Vlad Yasevich for porting help. This patch changes the kernel ABI. See CVE-2007-2242 * Fix an oops which potentially results in data corruption in the gdth driver. (closes: #412092) * bugfix/amd64-make-gart-ptes-uncacheable.patch Fix silent data corruption using GART iommu (closes: #404148) [ maximilian attems ] * Backport support for i965 to agp too. (closes: #406111) * Compile fix for UML CONFIG_MODE_TT=y. (closes: #412957) * Fix ide-generic jmicron device conflict. (closes: #421281) [ Martin Michlmayr ] * Fix wrong checksum for split TCP packets on 64-bit MIPS. (closes: #421283) stable/main/binary-mips/linux-image-2.6.18-5-r4k-ip22_2.6.18.dfsg.1-13_mips.deb stable/main/binary-mips/linux-headers-2.6.18-5-sb1a-bcm91480b_2.6.18.dfsg.1-13_mips.deb stable/main/binary-mips/linux-headers-2.6.18-5-all_2.6.18.dfsg.1-13_mips.deb stable/main/binary-mips/linux-headers-2.6.18-5-all-mips_2.6.18.dfsg.1-13_mips.deb stable/main/binary-mips/linux-headers-2.6.18-5-r4k-ip22_2.6.18.dfsg.1-13_mips.deb stable/main/binary-mips/linux-headers-2.6.18-5-sb1-bcm91250a_2.6.18.dfsg.1-13_mips.deb stable/main/binary-mips/linux-image-2.6.18-5-sb1a-bcm91480b_2.6.18.dfsg.1-13_mips.deb stable/main/binary-mips/linux-headers-2.6.18-5-r5k-ip32_2.6.18.dfsg.1-13_mips.deb stable/main/binary-mips/linux-headers-2.6.18-5-qemu_2.6.18.dfsg.1-13_mips.deb stable/main/binary-mips/linux-image-2.6.18-5-r5k-ip32_2.6.18.dfsg.1-13_mips.deb stable/main/binary-mips/linux-image-2.6.18-5-sb1-bcm91250a_2.6.18.dfsg.1-13_mips.deb stable/main/binary-mips/linux-headers-2.6.18-5_2.6.18.dfsg.1-13_mips.deb stable/main/binary-mips/linux-image-2.6.18-5-qemu_2.6.18.dfsg.1-13_mips.deb linux-2.6 (2.6.18.dfsg.1-13) stable; urgency=high [ Bastian Blank ] * [vserver] Fix overflow in network accounting. (closes: #412132) * [vserver] Fix lock accounting. (closes: #417631) * Bump ABI to 5. * Make modules packages binnmuable. * [sparc] Enable Qlogic QLA SCSI support. (closes: #417629) [ dann frazier ] * bugfix/listxattr-mem-corruption.patch [SECURITY] Fix userspace corruption vulnerability caused by incorrectly promoted return values in bad_inode_ops This patch changes the kernel ABI. See CVE-2006-5753 * bugfix/all/vserver/net-mount-fix.patch Fix mounting of network filesystems with VX_BINARY_MOUNT caps (closes: #418076) * Disable broken CONFIG_IP_ROUTE_MULTIPATH_CACHED setting. (closes: #418344) * bugfix/ipv6-disallow-RH0-by-default.patch [SECURITY] Avoid a remote DoS (network amplification between two routers) by disabling type0 IPv6 route headers by default. Can be re-enabled via a sysctl interface. Thanks to Vlad Yasevich for porting help. This patch changes the kernel ABI. See CVE-2007-2242 * Fix an oops which potentially results in data corruption in the gdth driver. (closes: #412092) * bugfix/amd64-make-gart-ptes-uncacheable.patch Fix silent data corruption using GART iommu (closes: #404148) [ maximilian attems ] * Backport support for i965 to agp too. (closes: #406111) * Compile fix for UML CONFIG_MODE_TT=y. (closes: #412957) * Fix ide-generic jmicron device conflict. (closes: #421281) [ Martin Michlmayr ] * Fix wrong checksum for split TCP packets on 64-bit MIPS. (closes: #421283) stable/main/binary-ia64/linux-image-2.6.18-5-mckinley_2.6.18.dfsg.1-13_ia64.deb stable/main/binary-ia64/linux-headers-2.6.18-5-itanium_2.6.18.dfsg.1-13_ia64.deb stable/main/binary-ia64/linux-headers-2.6.18-5-all-ia64_2.6.18.dfsg.1-13_ia64.deb stable/main/binary-ia64/linux-headers-2.6.18-5-all_2.6.18.dfsg.1-13_ia64.deb stable/main/binary-ia64/linux-image-2.6.18-5-itanium_2.6.18.dfsg.1-13_ia64.deb stable/main/binary-ia64/linux-headers-2.6.18-5-mckinley_2.6.18.dfsg.1-13_ia64.deb stable/main/binary-ia64/linux-headers-2.6.18-5_2.6.18.dfsg.1-13_ia64.deb linux-2.6 (2.6.18.dfsg.1-13) stable; urgency=high [ Bastian Blank ] * [vserver] Fix overflow in network accounting. (closes: #412132) * [vserver] Fix lock accounting. (closes: #417631) * Bump ABI to 5. * Make modules packages binnmuable. * [sparc] Enable Qlogic QLA SCSI support. (closes: #417629) [ dann frazier ] * bugfix/listxattr-mem-corruption.patch [SECURITY] Fix userspace corruption vulnerability caused by incorrectly promoted return values in bad_inode_ops This patch changes the kernel ABI. See CVE-2006-5753 * bugfix/all/vserver/net-mount-fix.patch Fix mounting of network filesystems with VX_BINARY_MOUNT caps (closes: #418076) * Disable broken CONFIG_IP_ROUTE_MULTIPATH_CACHED setting. (closes: #418344) * bugfix/ipv6-disallow-RH0-by-default.patch [SECURITY] Avoid a remote DoS (network amplification between two routers) by disabling type0 IPv6 route headers by default. Can be re-enabled via a sysctl interface. Thanks to Vlad Yasevich for porting help. This patch changes the kernel ABI. See CVE-2007-2242 * Fix an oops which potentially results in data corruption in the gdth driver. (closes: #412092) * bugfix/amd64-make-gart-ptes-uncacheable.patch Fix silent data corruption using GART iommu (closes: #404148) [ maximilian attems ] * Backport support for i965 to agp too. (closes: #406111) * Compile fix for UML CONFIG_MODE_TT=y. (closes: #412957) * Fix ide-generic jmicron device conflict. (closes: #421281) [ Martin Michlmayr ] * Fix wrong checksum for split TCP packets on 64-bit MIPS. (closes: #421283) stable/main/binary-i386/linux-headers-2.6.18-5-xen-vserver_2.6.18.dfsg.1-13_i386.deb stable/main/binary-i386/linux-headers-2.6.18-5-xen_2.6.18.dfsg.1-13_i386.deb stable/main/binary-i386/linux-image-2.6.18-5-vserver-686_2.6.18.dfsg.1-13_i386.deb stable/main/binary-i386/linux-image-2.6.18-5-vserver-k7_2.6.18.dfsg.1-13_i386.deb stable/main/binary-i386/linux-headers-2.6.18-5-686_2.6.18.dfsg.1-13_i386.deb stable/main/binary-i386/linux-modules-2.6.18-5-xen-686_2.6.18.dfsg.1-13_i386.deb stable/main/binary-i386/linux-headers-2.6.18-5-xen-vserver-686_2.6.18.dfsg.1-13_i386.deb stable/main/binary-i386/linux-headers-2.6.18-5-486_2.6.18.dfsg.1-13_i386.deb stable/main/binary-i386/linux-image-2.6.18-5-686_2.6.18.dfsg.1-13_i386.deb stable/main/binary-i386/linux-headers-2.6.18-5-vserver_2.6.18.dfsg.1-13_i386.deb stable/main/binary-i386/xen-linux-system-2.6.18-5-xen-686_2.6.18.dfsg.1-13_i386.deb stable/main/binary-i386/linux-headers-2.6.18-5-686-bigmem_2.6.18.dfsg.1-13_i386.deb stable/main/binary-i386/linux-headers-2.6.18-5-vserver-686_2.6.18.dfsg.1-13_i386.deb stable/main/binary-i386/linux-image-2.6.18-5-486_2.6.18.dfsg.1-13_i386.deb stable/main/binary-i386/linux-headers-2.6.18-5-k7_2.6.18.dfsg.1-13_i386.deb stable/main/binary-i386/linux-image-2.6.18-5-686-bigmem_2.6.18.dfsg.1-13_i386.deb stable/main/binary-i386/linux-headers-2.6.18-5-all-i386_2.6.18.dfsg.1-13_i386.deb stable/main/binary-i386/linux-headers-2.6.18-5-amd64_2.6.18.dfsg.1-13_i386.deb stable/main/binary-i386/linux-image-2.6.18-5-amd64_2.6.18.dfsg.1-13_i386.deb stable/main/binary-i386/xen-linux-system-2.6.18-5-xen-vserver-686_2.6.18.dfsg.1-13_i386.deb stable/main/binary-i386/linux-headers-2.6.18-5_2.6.18.dfsg.1-13_i386.deb stable/main/binary-i386/linux-headers-2.6.18-5-xen-686_2.6.18.dfsg.1-13_i386.deb stable/main/binary-i386/linux-image-2.6.18-5-xen-vserver-686_2.6.18.dfsg.1-13_i386.deb stable/main/binary-i386/linux-headers-2.6.18-5-all_2.6.18.dfsg.1-13_i386.deb stable/main/binary-i386/linux-image-2.6.18-5-k7_2.6.18.dfsg.1-13_i386.deb stable/main/binary-i386/linux-modules-2.6.18-5-xen-vserver-686_2.6.18.dfsg.1-13_i386.deb stable/main/binary-i386/linux-image-2.6.18-5-xen-686_2.6.18.dfsg.1-13_i386.deb stable/main/binary-i386/linux-headers-2.6.18-5-vserver-k7_2.6.18.dfsg.1-13_i386.deb linux-2.6 (2.6.18.dfsg.1-13) stable; urgency=high [ Bastian Blank ] * [vserver] Fix overflow in network accounting. (closes: #412132) * [vserver] Fix lock accounting. (closes: #417631) * Bump ABI to 5. * Make modules packages binnmuable. * [sparc] Enable Qlogic QLA SCSI support. (closes: #417629) [ dann frazier ] * bugfix/listxattr-mem-corruption.patch [SECURITY] Fix userspace corruption vulnerability caused by incorrectly promoted return values in bad_inode_ops This patch changes the kernel ABI. See CVE-2006-5753 * bugfix/all/vserver/net-mount-fix.patch Fix mounting of network filesystems with VX_BINARY_MOUNT caps (closes: #418076) * Disable broken CONFIG_IP_ROUTE_MULTIPATH_CACHED setting. (closes: #418344) * bugfix/ipv6-disallow-RH0-by-default.patch [SECURITY] Avoid a remote DoS (network amplification between two routers) by disabling type0 IPv6 route headers by default. Can be re-enabled via a sysctl interface. Thanks to Vlad Yasevich for porting help. This patch changes the kernel ABI. See CVE-2007-2242 * Fix an oops which potentially results in data corruption in the gdth driver. (closes: #412092) * bugfix/amd64-make-gart-ptes-uncacheable.patch Fix silent data corruption using GART iommu (closes: #404148) [ maximilian attems ] * Backport support for i965 to agp too. (closes: #406111) * Compile fix for UML CONFIG_MODE_TT=y. (closes: #412957) * Fix ide-generic jmicron device conflict. (closes: #421281) [ Martin Michlmayr ] * Fix wrong checksum for split TCP packets on 64-bit MIPS. (closes: #421283) stable/main/binary-hppa/linux-headers-2.6.18-5-all_2.6.18.dfsg.1-13_hppa.deb stable/main/binary-hppa/linux-image-2.6.18-5-parisc-smp_2.6.18.dfsg.1-13_hppa.deb stable/main/binary-hppa/linux-image-2.6.18-5-parisc_2.6.18.dfsg.1-13_hppa.deb stable/main/binary-hppa/linux-headers-2.6.18-5-parisc-smp_2.6.18.dfsg.1-13_hppa.deb stable/main/binary-hppa/linux-image-2.6.18-5-parisc64-smp_2.6.18.dfsg.1-13_hppa.deb stable/main/binary-hppa/linux-headers-2.6.18-5-parisc_2.6.18.dfsg.1-13_hppa.deb stable/main/binary-hppa/linux-image-2.6.18-5-parisc64_2.6.18.dfsg.1-13_hppa.deb stable/main/binary-hppa/linux-headers-2.6.18-5-parisc64-smp_2.6.18.dfsg.1-13_hppa.deb stable/main/binary-hppa/linux-headers-2.6.18-5_2.6.18.dfsg.1-13_hppa.deb stable/main/binary-hppa/linux-headers-2.6.18-5-parisc64_2.6.18.dfsg.1-13_hppa.deb stable/main/binary-hppa/linux-headers-2.6.18-5-all-hppa_2.6.18.dfsg.1-13_hppa.deb linux-2.6 (2.6.18.dfsg.1-13) stable; urgency=high [ Bastian Blank ] * [vserver] Fix overflow in network accounting. (closes: #412132) * [vserver] Fix lock accounting. (closes: #417631) * Bump ABI to 5. * Make modules packages binnmuable. * [sparc] Enable Qlogic QLA SCSI support. (closes: #417629) [ dann frazier ] * bugfix/listxattr-mem-corruption.patch [SECURITY] Fix userspace corruption vulnerability caused by incorrectly promoted return values in bad_inode_ops This patch changes the kernel ABI. See CVE-2006-5753 * bugfix/all/vserver/net-mount-fix.patch Fix mounting of network filesystems with VX_BINARY_MOUNT caps (closes: #418076) * Disable broken CONFIG_IP_ROUTE_MULTIPATH_CACHED setting. (closes: #418344) * bugfix/ipv6-disallow-RH0-by-default.patch [SECURITY] Avoid a remote DoS (network amplification between two routers) by disabling type0 IPv6 route headers by default. Can be re-enabled via a sysctl interface. Thanks to Vlad Yasevich for porting help. This patch changes the kernel ABI. See CVE-2007-2242 * Fix an oops which potentially results in data corruption in the gdth driver. (closes: #412092) * bugfix/amd64-make-gart-ptes-uncacheable.patch Fix silent data corruption using GART iommu (closes: #404148) [ maximilian attems ] * Backport support for i965 to agp too. (closes: #406111) * Compile fix for UML CONFIG_MODE_TT=y. (closes: #412957) * Fix ide-generic jmicron device conflict. (closes: #421281) [ Martin Michlmayr ] * Fix wrong checksum for split TCP packets on 64-bit MIPS. (closes: #421283) stable/main/binary-arm/linux-image-2.6.18-5-iop32x_2.6.18.dfsg.1-13_arm.deb stable/main/binary-arm/linux-headers-2.6.18-5-all_2.6.18.dfsg.1-13_arm.deb stable/main/binary-arm/linux-image-2.6.18-5-ixp4xx_2.6.18.dfsg.1-13_arm.deb stable/main/binary-arm/linux-headers-2.6.18-5-all-arm_2.6.18.dfsg.1-13_arm.deb stable/main/binary-arm/linux-image-2.6.18-5-footbridge_2.6.18.dfsg.1-13_arm.deb stable/main/binary-arm/linux-headers-2.6.18-5-footbridge_2.6.18.dfsg.1-13_arm.deb stable/main/binary-arm/linux-headers-2.6.18-5_2.6.18.dfsg.1-13_arm.deb stable/main/binary-arm/linux-headers-2.6.18-5-rpc_2.6.18.dfsg.1-13_arm.deb stable/main/binary-arm/linux-headers-2.6.18-5-iop32x_2.6.18.dfsg.1-13_arm.deb stable/main/binary-arm/linux-headers-2.6.18-5-s3c2410_2.6.18.dfsg.1-13_arm.deb stable/main/binary-arm/linux-image-2.6.18-5-s3c2410_2.6.18.dfsg.1-13_arm.deb stable/main/binary-arm/linux-image-2.6.18-5-rpc_2.6.18.dfsg.1-13_arm.deb stable/main/binary-arm/linux-headers-2.6.18-5-ixp4xx_2.6.18.dfsg.1-13_arm.deb linux-2.6 (2.6.18.dfsg.1-13) stable; urgency=high [ Bastian Blank ] * [vserver] Fix overflow in network accounting. (closes: #412132) * [vserver] Fix lock accounting. (closes: #417631) * Bump ABI to 5. * Make modules packages binnmuable. * [sparc] Enable Qlogic QLA SCSI support. (closes: #417629) [ dann frazier ] * bugfix/listxattr-mem-corruption.patch [SECURITY] Fix userspace corruption vulnerability caused by incorrectly promoted return values in bad_inode_ops This patch changes the kernel ABI. See CVE-2006-5753 * bugfix/all/vserver/net-mount-fix.patch Fix mounting of network filesystems with VX_BINARY_MOUNT caps (closes: #418076) * Disable broken CONFIG_IP_ROUTE_MULTIPATH_CACHED setting. (closes: #418344) * bugfix/ipv6-disallow-RH0-by-default.patch [SECURITY] Avoid a remote DoS (network amplification between two routers) by disabling type0 IPv6 route headers by default. Can be re-enabled via a sysctl interface. Thanks to Vlad Yasevich for porting help. This patch changes the kernel ABI. See CVE-2007-2242 * Fix an oops which potentially results in data corruption in the gdth driver. (closes: #412092) * bugfix/amd64-make-gart-ptes-uncacheable.patch Fix silent data corruption using GART iommu (closes: #404148) [ maximilian attems ] * Backport support for i965 to agp too. (closes: #406111) * Compile fix for UML CONFIG_MODE_TT=y. (closes: #412957) * Fix ide-generic jmicron device conflict. (closes: #421281) [ Martin Michlmayr ] * Fix wrong checksum for split TCP packets on 64-bit MIPS. (closes: #421283) stable/main/binary-amd64/linux-headers-2.6.18-5_2.6.18.dfsg.1-13_amd64.deb stable/main/binary-amd64/linux-headers-2.6.18-5-xen-vserver-amd64_2.6.18.dfsg.1-13_amd64.deb stable/main/binary-amd64/linux-headers-2.6.18-5-all-amd64_2.6.18.dfsg.1-13_amd64.deb stable/main/binary-amd64/linux-image-2.6.18-5-vserver-amd64_2.6.18.dfsg.1-13_amd64.deb stable/main/binary-amd64/linux-image-2.6.18-5-xen-vserver-amd64_2.6.18.dfsg.1-13_amd64.deb stable/main/binary-amd64/xen-linux-system-2.6.18-5-xen-amd64_2.6.18.dfsg.1-13_amd64.deb stable/main/binary-amd64/xen-linux-system-2.6.18-5-xen-vserver-amd64_2.6.18.dfsg.1-13_amd64.deb stable/main/binary-amd64/linux-headers-2.6.18-5-all_2.6.18.dfsg.1-13_amd64.deb stable/main/binary-amd64/linux-modules-2.6.18-5-xen-amd64_2.6.18.dfsg.1-13_amd64.deb stable/main/binary-amd64/linux-image-2.6.18-5-xen-amd64_2.6.18.dfsg.1-13_amd64.deb stable/main/binary-amd64/linux-headers-2.6.18-5-amd64_2.6.18.dfsg.1-13_amd64.deb stable/main/binary-amd64/linux-modules-2.6.18-5-xen-vserver-amd64_2.6.18.dfsg.1-13_amd64.deb stable/main/binary-amd64/linux-headers-2.6.18-5-xen-vserver_2.6.18.dfsg.1-13_amd64.deb stable/main/binary-amd64/linux-headers-2.6.18-5-vserver_2.6.18.dfsg.1-13_amd64.deb stable/main/binary-amd64/linux-headers-2.6.18-5-xen-amd64_2.6.18.dfsg.1-13_amd64.deb stable/main/binary-amd64/linux-headers-2.6.18-5-xen_2.6.18.dfsg.1-13_amd64.deb stable/main/binary-amd64/linux-headers-2.6.18-5-vserver-amd64_2.6.18.dfsg.1-13_amd64.deb stable/main/binary-amd64/linux-image-2.6.18-5-amd64_2.6.18.dfsg.1-13_amd64.deb linux-2.6 (2.6.18.dfsg.1-13) stable; urgency=high [ Bastian Blank ] * [vserver] Fix overflow in network accounting. (closes: #412132) * [vserver] Fix lock accounting. (closes: #417631) * Bump ABI to 5. * Make modules packages binnmuable. * [sparc] Enable Qlogic QLA SCSI support. (closes: #417629) [ dann frazier ] * bugfix/listxattr-mem-corruption.patch [SECURITY] Fix userspace corruption vulnerability caused by incorrectly promoted return values in bad_inode_ops This patch changes the kernel ABI. See CVE-2006-5753 * bugfix/all/vserver/net-mount-fix.patch Fix mounting of network filesystems with VX_BINARY_MOUNT caps (closes: #418076) * Disable broken CONFIG_IP_ROUTE_MULTIPATH_CACHED setting. (closes: #418344) * bugfix/ipv6-disallow-RH0-by-default.patch [SECURITY] Avoid a remote DoS (network amplification between two routers) by disabling type0 IPv6 route headers by default. Can be re-enabled via a sysctl interface. Thanks to Vlad Yasevich for porting help. This patch changes the kernel ABI. See CVE-2007-2242 * Fix an oops which potentially results in data corruption in the gdth driver. (closes: #412092) * bugfix/amd64-make-gart-ptes-uncacheable.patch Fix silent data corruption using GART iommu (closes: #404148) [ maximilian attems ] * Backport support for i965 to agp too. (closes: #406111) * Compile fix for UML CONFIG_MODE_TT=y. (closes: #412957) * Fix ide-generic jmicron device conflict. (closes: #421281) [ Martin Michlmayr ] * Fix wrong checksum for split TCP packets on 64-bit MIPS. (closes: #421283) stable/main/binary-alpha/linux-headers-2.6.18-5-all_2.6.18.dfsg.1-13_alpha.deb stable/main/binary-alpha/linux-headers-2.6.18-5-vserver_2.6.18.dfsg.1-13_alpha.deb stable/main/binary-alpha/linux-image-2.6.18-5-alpha-legacy_2.6.18.dfsg.1-13_alpha.deb stable/main/binary-alpha/linux-headers-2.6.18-5_2.6.18.dfsg.1-13_alpha.deb stable/main/binary-alpha/linux-headers-2.6.18-5-alpha-smp_2.6.18.dfsg.1-13_alpha.deb stable/main/binary-alpha/linux-image-2.6.18-5-vserver-alpha_2.6.18.dfsg.1-13_alpha.deb stable/main/binary-alpha/linux-headers-2.6.18-5-all-alpha_2.6.18.dfsg.1-13_alpha.deb stable/main/binary-alpha/linux-headers-2.6.18-5-alpha-generic_2.6.18.dfsg.1-13_alpha.deb stable/main/binary-alpha/linux-headers-2.6.18-5-alpha-legacy_2.6.18.dfsg.1-13_alpha.deb stable/main/binary-alpha/linux-headers-2.6.18-5-vserver-alpha_2.6.18.dfsg.1-13_alpha.deb stable/main/binary-alpha/linux-image-2.6.18-5-alpha-smp_2.6.18.dfsg.1-13_alpha.deb stable/main/binary-alpha/linux-image-2.6.18-5-alpha-generic_2.6.18.dfsg.1-13_alpha.deb linux-2.6 (2.6.18.dfsg.1-13) stable; urgency=high [ Bastian Blank ] * [vserver] Fix overflow in network accounting. (closes: #412132) * [vserver] Fix lock accounting. (closes: #417631) * Bump ABI to 5. * Make modules packages binnmuable. * [sparc] Enable Qlogic QLA SCSI support. (closes: #417629) [ dann frazier ] * bugfix/listxattr-mem-corruption.patch [SECURITY] Fix userspace corruption vulnerability caused by incorrectly promoted return values in bad_inode_ops This patch changes the kernel ABI. See CVE-2006-5753 * bugfix/all/vserver/net-mount-fix.patch Fix mounting of network filesystems with VX_BINARY_MOUNT caps (closes: #418076) * Disable broken CONFIG_IP_ROUTE_MULTIPATH_CACHED setting. (closes: #418344) * bugfix/ipv6-disallow-RH0-by-default.patch [SECURITY] Avoid a remote DoS (network amplification between two routers) by disabling type0 IPv6 route headers by default. Can be re-enabled via a sysctl interface. Thanks to Vlad Yasevich for porting help. This patch changes the kernel ABI. See CVE-2007-2242 * Fix an oops which potentially results in data corruption in the gdth driver. (closes: #412092) * bugfix/amd64-make-gart-ptes-uncacheable.patch Fix silent data corruption using GART iommu (closes: #404148) [ maximilian attems ] * Backport support for i965 to agp too. (closes: #406111) * Compile fix for UML CONFIG_MODE_TT=y. (closes: #412957) * Fix ide-generic jmicron device conflict. (closes: #421281) [ Martin Michlmayr ] * Fix wrong checksum for split TCP packets on 64-bit MIPS. (closes: #421283) stable/main/binary-all/linux-manual-2.6.18_2.6.18.dfsg.1-13_all.deb stable/main/binary-sparc/linux-headers-2.6.18-5-vserver_2.6.18.dfsg.1-13_sparc.deb stable/main/binary-sparc/linux-image-2.6.18-5-sparc64_2.6.18.dfsg.1-13_sparc.deb stable/main/binary-sparc/linux-headers-2.6.18-5-sparc64-smp_2.6.18.dfsg.1-13_sparc.deb stable/main/binary-all/linux-support-2.6.18-5_2.6.18.dfsg.1-13_all.deb stable/main/source/linux-2.6_2.6.18.dfsg.1-13.diff.gz stable/main/binary-sparc/linux-headers-2.6.18-5-sparc32_2.6.18.dfsg.1-13_sparc.deb stable/main/binary-all/linux-source-2.6.18_2.6.18.dfsg.1-13_all.deb stable/main/binary-sparc/linux-image-2.6.18-5-sparc64-smp_2.6.18.dfsg.1-13_sparc.deb stable/main/binary-sparc/linux-headers-2.6.18-5-sparc64_2.6.18.dfsg.1-13_sparc.deb stable/main/binary-sparc/linux-image-2.6.18-5-vserver-sparc64_2.6.18.dfsg.1-13_sparc.deb stable/main/source/linux-2.6_2.6.18.dfsg.1-13.dsc stable/main/binary-sparc/linux-headers-2.6.18-5-all-sparc_2.6.18.dfsg.1-13_sparc.deb stable/main/binary-sparc/linux-headers-2.6.18-5_2.6.18.dfsg.1-13_sparc.deb stable/main/binary-sparc/linux-image-2.6.18-5-sparc32_2.6.18.dfsg.1-13_sparc.deb stable/main/binary-all/linux-patch-debian-2.6.18_2.6.18.dfsg.1-13_all.deb stable/main/binary-sparc/linux-headers-2.6.18-5-all_2.6.18.dfsg.1-13_sparc.deb stable/main/binary-sparc/linux-headers-2.6.18-5-vserver-sparc64_2.6.18.dfsg.1-13_sparc.deb stable/main/binary-all/linux-doc-2.6.18_2.6.18.dfsg.1-13_all.deb stable/main/binary-all/linux-tree-2.6.18_2.6.18.dfsg.1-13_all.deb linux-2.6 (2.6.18.dfsg.1-13) stable; urgency=high [ Bastian Blank ] * [vserver] Fix overflow in network accounting. (closes: #412132) * [vserver] Fix lock accounting. (closes: #417631) * Bump ABI to 5. * Make modules packages binnmuable. * [sparc] Enable Qlogic QLA SCSI support. (closes: #417629) [ dann frazier ] * bugfix/listxattr-mem-corruption.patch [SECURITY] Fix userspace corruption vulnerability caused by incorrectly promoted return values in bad_inode_ops This patch changes the kernel ABI. See CVE-2006-5753 * bugfix/all/vserver/net-mount-fix.patch Fix mounting of network filesystems with VX_BINARY_MOUNT caps (closes: #418076) * Disable broken CONFIG_IP_ROUTE_MULTIPATH_CACHED setting. (closes: #418344) * bugfix/ipv6-disallow-RH0-by-default.patch [SECURITY] Avoid a remote DoS (network amplification between two routers) by disabling type0 IPv6 route headers by default. Can be re-enabled via a sysctl interface. Thanks to Vlad Yasevich for porting help. This patch changes the kernel ABI. See CVE-2007-2242 * Fix an oops which potentially results in data corruption in the gdth driver. (closes: #412092) * bugfix/amd64-make-gart-ptes-uncacheable.patch Fix silent data corruption using GART iommu (closes: #404148) [ maximilian attems ] * Backport support for i965 to agp too. (closes: #406111) * Compile fix for UML CONFIG_MODE_TT=y. (closes: #412957) * Fix ide-generic jmicron device conflict. (closes: #421281) [ Martin Michlmayr ] * Fix wrong checksum for split TCP packets on 64-bit MIPS. (closes: #421283) stable/main/binary-amd64/lilo-installer_1.20etch1_amd64.udeb lilo-installer (1.20etch1) stable; urgency=low * Support multiple disks when devfs device names are used. Closes: #432314. stable/main/source/lilo-installer_1.20etch1.tar.gz stable/main/source/lilo-installer_1.20etch1.dsc stable/main/binary-i386/lilo-installer_1.20etch1_i386.udeb lilo-installer (1.20etch1) stable; urgency=low * Support multiple disks when devfs device names are used. Closes: #432314. stable/main/binary-sparc/lighttpd-mod-mysql-vhost_1.4.13-4etch1_sparc.deb stable/main/binary-sparc/lighttpd-mod-cml_1.4.13-4etch1_sparc.deb stable/main/binary-sparc/lighttpd-mod-trigger-b4-dl_1.4.13-4etch1_sparc.deb stable/main/binary-sparc/lighttpd_1.4.13-4etch1_sparc.deb stable/main/binary-sparc/lighttpd-mod-magnet_1.4.13-4etch1_sparc.deb stable/main/binary-sparc/lighttpd-mod-webdav_1.4.13-4etch1_sparc.deb lighttpd (1.4.13-4etch1) stable; urgency=low * Non-maintainer upload by The Security Team. * Avoid local users from creating a DOS by creating files with a bogus mtime. [CVE-2007-1870] * Avoid a potential DOS when parsing malformed CRLF sequences [CVE-2007-1869] stable/main/binary-s390/lighttpd-mod-webdav_1.4.13-4etch1_s390.deb stable/main/binary-s390/lighttpd-mod-trigger-b4-dl_1.4.13-4etch1_s390.deb stable/main/binary-s390/lighttpd-mod-cml_1.4.13-4etch1_s390.deb stable/main/binary-s390/lighttpd-mod-magnet_1.4.13-4etch1_s390.deb stable/main/binary-s390/lighttpd_1.4.13-4etch1_s390.deb stable/main/binary-s390/lighttpd-mod-mysql-vhost_1.4.13-4etch1_s390.deb lighttpd (1.4.13-4etch1) stable; urgency=low * Non-maintainer upload by The Security Team. * Avoid local users from creating a DOS by creating files with a bogus mtime. [CVE-2007-1870] * Avoid a potential DOS when parsing malformed CRLF sequences [CVE-2007-1869] stable/main/binary-powerpc/lighttpd-mod-cml_1.4.13-4etch1_powerpc.deb stable/main/binary-powerpc/lighttpd-mod-mysql-vhost_1.4.13-4etch1_powerpc.deb stable/main/binary-powerpc/lighttpd-mod-magnet_1.4.13-4etch1_powerpc.deb stable/main/binary-powerpc/lighttpd_1.4.13-4etch1_powerpc.deb stable/main/binary-powerpc/lighttpd-mod-trigger-b4-dl_1.4.13-4etch1_powerpc.deb stable/main/binary-powerpc/lighttpd-mod-webdav_1.4.13-4etch1_powerpc.deb lighttpd (1.4.13-4etch1) stable; urgency=low * Non-maintainer upload by The Security Team. * Avoid local users from creating a DOS by creating files with a bogus mtime. [CVE-2007-1870] * Avoid a potential DOS when parsing malformed CRLF sequences [CVE-2007-1869] stable/main/binary-mipsel/lighttpd_1.4.13-4etch1_mipsel.deb stable/main/binary-mipsel/lighttpd-mod-trigger-b4-dl_1.4.13-4etch1_mipsel.deb stable/main/binary-mipsel/lighttpd-mod-mysql-vhost_1.4.13-4etch1_mipsel.deb stable/main/binary-mipsel/lighttpd-mod-cml_1.4.13-4etch1_mipsel.deb stable/main/binary-mipsel/lighttpd-mod-magnet_1.4.13-4etch1_mipsel.deb stable/main/binary-mipsel/lighttpd-mod-webdav_1.4.13-4etch1_mipsel.deb lighttpd (1.4.13-4etch1) stable; urgency=low * Non-maintainer upload by The Security Team. * Avoid local users from creating a DOS by creating files with a bogus mtime. [CVE-2007-1870] * Avoid a potential DOS when parsing malformed CRLF sequences [CVE-2007-1869] stable/main/binary-mips/lighttpd-mod-trigger-b4-dl_1.4.13-4etch1_mips.deb stable/main/binary-mips/lighttpd-mod-mysql-vhost_1.4.13-4etch1_mips.deb stable/main/binary-mips/lighttpd-mod-cml_1.4.13-4etch1_mips.deb stable/main/binary-mips/lighttpd-mod-webdav_1.4.13-4etch1_mips.deb stable/main/binary-mips/lighttpd-mod-magnet_1.4.13-4etch1_mips.deb stable/main/binary-mips/lighttpd_1.4.13-4etch1_mips.deb lighttpd (1.4.13-4etch1) stable; urgency=low * Non-maintainer upload by The Security Team. * Avoid local users from creating a DOS by creating files with a bogus mtime. [CVE-2007-1870] * Avoid a potential DOS when parsing malformed CRLF sequences [CVE-2007-1869] stable/main/binary-ia64/lighttpd-mod-webdav_1.4.13-4etch1_ia64.deb stable/main/binary-ia64/lighttpd-mod-cml_1.4.13-4etch1_ia64.deb stable/main/binary-ia64/lighttpd-mod-magnet_1.4.13-4etch1_ia64.deb stable/main/binary-ia64/lighttpd-mod-trigger-b4-dl_1.4.13-4etch1_ia64.deb stable/main/binary-ia64/lighttpd_1.4.13-4etch1_ia64.deb stable/main/binary-ia64/lighttpd-mod-mysql-vhost_1.4.13-4etch1_ia64.deb lighttpd (1.4.13-4etch1) stable; urgency=low * Non-maintainer upload by The Security Team. * Avoid local users from creating a DOS by creating files with a bogus mtime. [CVE-2007-1870] * Avoid a potential DOS when parsing malformed CRLF sequences [CVE-2007-1869] stable/main/binary-i386/lighttpd-mod-cml_1.4.13-4etch1_i386.deb stable/main/binary-i386/lighttpd-mod-magnet_1.4.13-4etch1_i386.deb stable/main/binary-i386/lighttpd-mod-trigger-b4-dl_1.4.13-4etch1_i386.deb stable/main/binary-i386/lighttpd-mod-mysql-vhost_1.4.13-4etch1_i386.deb stable/main/binary-i386/lighttpd_1.4.13-4etch1_i386.deb stable/main/binary-i386/lighttpd-mod-webdav_1.4.13-4etch1_i386.deb lighttpd (1.4.13-4etch1) stable; urgency=low * Non-maintainer upload by The Security Team. * Avoid local users from creating a DOS by creating files with a bogus mtime. [CVE-2007-1870] * Avoid a potential DOS when parsing malformed CRLF sequences [CVE-2007-1869] stable/main/binary-hppa/lighttpd-mod-mysql-vhost_1.4.13-4etch1_hppa.deb stable/main/binary-hppa/lighttpd_1.4.13-4etch1_hppa.deb stable/main/binary-hppa/lighttpd-mod-magnet_1.4.13-4etch1_hppa.deb stable/main/binary-hppa/lighttpd-mod-cml_1.4.13-4etch1_hppa.deb stable/main/binary-hppa/lighttpd-mod-trigger-b4-dl_1.4.13-4etch1_hppa.deb stable/main/binary-hppa/lighttpd-mod-webdav_1.4.13-4etch1_hppa.deb lighttpd (1.4.13-4etch1) stable; urgency=low * Non-maintainer upload by The Security Team. * Avoid local users from creating a DOS by creating files with a bogus mtime. [CVE-2007-1870] * Avoid a potential DOS when parsing malformed CRLF sequences [CVE-2007-1869] stable/main/binary-arm/lighttpd_1.4.13-4etch1_arm.deb stable/main/binary-arm/lighttpd-mod-mysql-vhost_1.4.13-4etch1_arm.deb stable/main/binary-arm/lighttpd-mod-webdav_1.4.13-4etch1_arm.deb stable/main/binary-arm/lighttpd-mod-trigger-b4-dl_1.4.13-4etch1_arm.deb stable/main/binary-arm/lighttpd-mod-cml_1.4.13-4etch1_arm.deb stable/main/binary-arm/lighttpd-mod-magnet_1.4.13-4etch1_arm.deb lighttpd (1.4.13-4etch1) stable; urgency=low * Non-maintainer upload by The Security Team. * Avoid local users from creating a DOS by creating files with a bogus mtime. [CVE-2007-1870] * Avoid a potential DOS when parsing malformed CRLF sequences [CVE-2007-1869] stable/main/binary-alpha/lighttpd_1.4.13-4etch1_alpha.deb stable/main/binary-alpha/lighttpd-mod-webdav_1.4.13-4etch1_alpha.deb stable/main/binary-alpha/lighttpd-mod-trigger-b4-dl_1.4.13-4etch1_alpha.deb stable/main/binary-alpha/lighttpd-mod-cml_1.4.13-4etch1_alpha.deb stable/main/binary-alpha/lighttpd-mod-magnet_1.4.13-4etch1_alpha.deb stable/main/binary-alpha/lighttpd-mod-mysql-vhost_1.4.13-4etch1_alpha.deb lighttpd (1.4.13-4etch1) stable; urgency=low * Non-maintainer upload by The Security Team. * Avoid local users from creating a DOS by creating files with a bogus mtime. [CVE-2007-1870] * Avoid a potential DOS when parsing malformed CRLF sequences [CVE-2007-1869] stable/main/binary-amd64/lighttpd_1.4.13-4etch1_amd64.deb stable/main/source/lighttpd_1.4.13-4etch1.diff.gz stable/main/binary-amd64/lighttpd-mod-cml_1.4.13-4etch1_amd64.deb stable/main/binary-amd64/lighttpd-mod-magnet_1.4.13-4etch1_amd64.deb stable/main/binary-amd64/lighttpd-mod-webdav_1.4.13-4etch1_amd64.deb stable/main/binary-amd64/lighttpd-mod-mysql-vhost_1.4.13-4etch1_amd64.deb stable/main/binary-all/lighttpd-doc_1.4.13-4etch1_all.deb stable/main/source/lighttpd_1.4.13-4etch1.dsc stable/main/binary-amd64/lighttpd-mod-trigger-b4-dl_1.4.13-4etch1_amd64.deb lighttpd (1.4.13-4etch1) stable; urgency=low * Non-maintainer upload by The Security Team. * Avoid local users from creating a DOS by creating files with a bogus mtime. [CVE-2007-1870] * Avoid a potential DOS when parsing malformed CRLF sequences [CVE-2007-1869] stable/main/binary-sparc/lifelines_3.0.50-2etch1_sparc.deb lifelines (3.0.50-2etch1) stable; urgency=low * Changing docs/ll-reportmanual.xml and docs/ll-userguide.xml to fix documentation build problems (Closes: #418347). * lifelines-reports - Adding a dependency to lifelines >= 3.0.50 to prevent file conflict. (Closes: #405500). * Updating French translation. Thanks to Bernard Adrian. (Closes: #356671). stable/main/binary-s390/lifelines_3.0.50-2etch1_s390.deb lifelines (3.0.50-2etch1) stable; urgency=low * Changing docs/ll-reportmanual.xml and docs/ll-userguide.xml to fix documentation build problems (Closes: #418347). * lifelines-reports - Adding a dependency to lifelines >= 3.0.50 to prevent file conflict. (Closes: #405500). * Updating French translation. Thanks to Bernard Adrian. (Closes: #356671). stable/main/binary-powerpc/lifelines_3.0.50-2etch1_powerpc.deb lifelines (3.0.50-2etch1) stable; urgency=low * Changing docs/ll-reportmanual.xml and docs/ll-userguide.xml to fix documentation build problems (Closes: #418347). * lifelines-reports - Adding a dependency to lifelines >= 3.0.50 to prevent file conflict. (Closes: #405500). * Updating French translation. Thanks to Bernard Adrian. (Closes: #356671). stable/main/binary-mipsel/lifelines_3.0.50-2etch1_mipsel.deb lifelines (3.0.50-2etch1) stable; urgency=low * Changing docs/ll-reportmanual.xml and docs/ll-userguide.xml to fix documentation build problems (Closes: #418347). * lifelines-reports - Adding a dependency to lifelines >= 3.0.50 to prevent file conflict. (Closes: #405500). * Updating French translation. Thanks to Bernard Adrian. (Closes: #356671). stable/main/binary-mips/lifelines_3.0.50-2etch1_mips.deb lifelines (3.0.50-2etch1) stable; urgency=low * Changing docs/ll-reportmanual.xml and docs/ll-userguide.xml to fix documentation build problems (Closes: #418347). * lifelines-reports - Adding a dependency to lifelines >= 3.0.50 to prevent file conflict. (Closes: #405500). * Updating French translation. Thanks to Bernard Adrian. (Closes: #356671). stable/main/binary-ia64/lifelines_3.0.50-2etch1_ia64.deb lifelines (3.0.50-2etch1) stable; urgency=low * Changing docs/ll-reportmanual.xml and docs/ll-userguide.xml to fix documentation build problems (Closes: #418347). * lifelines-reports - Adding a dependency to lifelines >= 3.0.50 to prevent file conflict. (Closes: #405500). * Updating French translation. Thanks to Bernard Adrian. (Closes: #356671). stable/main/binary-i386/lifelines_3.0.50-2etch1_i386.deb lifelines (3.0.50-2etch1) stable; urgency=low * Changing docs/ll-reportmanual.xml and docs/ll-userguide.xml to fix documentation build problems (Closes: #418347). * lifelines-reports - Adding a dependency to lifelines >= 3.0.50 to prevent file conflict. (Closes: #405500). * Updating French translation. Thanks to Bernard Adrian. (Closes: #356671). stable/main/binary-hppa/lifelines_3.0.50-2etch1_hppa.deb lifelines (3.0.50-2etch1) stable; urgency=low * Changing docs/ll-reportmanual.xml and docs/ll-userguide.xml to fix documentation build problems (Closes: #418347). * lifelines-reports - Adding a dependency to lifelines >= 3.0.50 to prevent file conflict. (Closes: #405500). * Updating French translation. Thanks to Bernard Adrian. (Closes: #356671). stable/main/binary-arm/lifelines_3.0.50-2etch1_arm.deb lifelines (3.0.50-2etch1) stable; urgency=low * Changing docs/ll-reportmanual.xml and docs/ll-userguide.xml to fix documentation build problems (Closes: #418347). * lifelines-reports - Adding a dependency to lifelines >= 3.0.50 to prevent file conflict. (Closes: #405500). * Updating French translation. Thanks to Bernard Adrian. (Closes: #356671). stable/main/binary-alpha/lifelines_3.0.50-2etch1_alpha.deb lifelines (3.0.50-2etch1) stable; urgency=low * Changing docs/ll-reportmanual.xml and docs/ll-userguide.xml to fix documentation build problems (Closes: #418347). * lifelines-reports - Adding a dependency to lifelines >= 3.0.50 to prevent file conflict. (Closes: #405500). * Updating French translation. Thanks to Bernard Adrian. (Closes: #356671). stable/main/binary-all/lifelines-doc_3.0.50-2etch1_all.deb stable/main/binary-all/lifelines-doc-sv_3.0.50-2etch1_all.deb stable/main/source/lifelines_3.0.50-2etch1.diff.gz stable/main/binary-all/lifelines-reports_3.0.50-2etch1_all.deb stable/main/binary-amd64/lifelines_3.0.50-2etch1_amd64.deb stable/main/source/lifelines_3.0.50-2etch1.dsc lifelines (3.0.50-2etch1) stable; urgency=low * Changing docs/ll-reportmanual.xml and docs/ll-userguide.xml to fix documentation build problems (Closes: #418347). * lifelines-reports - Adding a dependency to lifelines >= 3.0.50 to prevent file conflict. (Closes: #405500). * Updating French translation. Thanks to Bernard Adrian. (Closes: #356671). stable/main/binary-sparc/librsvg2-2_2.14.4-3_sparc.deb stable/main/binary-sparc/librsvg2-bin_2.14.4-3_sparc.deb stable/main/binary-sparc/librsvg2-common_2.14.4-3_sparc.deb stable/main/binary-sparc/librsvg2-dev_2.14.4-3_sparc.deb librsvg (2.14.4-3) stable; urgency=low * Make librsvg2-common depend on libgtk2.0-bin 2.8 (closes: #403977). stable/main/binary-s390/librsvg2-2_2.14.4-3_s390.deb stable/main/binary-s390/librsvg2-bin_2.14.4-3_s390.deb stable/main/binary-s390/librsvg2-dev_2.14.4-3_s390.deb stable/main/binary-s390/librsvg2-common_2.14.4-3_s390.deb librsvg (2.14.4-3) stable; urgency=low * Make librsvg2-common depend on libgtk2.0-bin 2.8 (closes: #403977). stable/main/binary-powerpc/librsvg2-dev_2.14.4-3_powerpc.deb stable/main/binary-powerpc/librsvg2-2_2.14.4-3_powerpc.deb stable/main/binary-powerpc/librsvg2-bin_2.14.4-3_powerpc.deb stable/main/binary-powerpc/librsvg2-common_2.14.4-3_powerpc.deb librsvg (2.14.4-3) stable; urgency=low * Make librsvg2-common depend on libgtk2.0-bin 2.8 (closes: #403977). stable/main/binary-mipsel/librsvg2-bin_2.14.4-3_mipsel.deb stable/main/binary-mipsel/librsvg2-dev_2.14.4-3_mipsel.deb stable/main/binary-mipsel/librsvg2-common_2.14.4-3_mipsel.deb stable/main/binary-mipsel/librsvg2-2_2.14.4-3_mipsel.deb librsvg (2.14.4-3) stable; urgency=low * Make librsvg2-common depend on libgtk2.0-bin 2.8 (closes: #403977). stable/main/binary-mips/librsvg2-dev_2.14.4-3_mips.deb stable/main/binary-mips/librsvg2-2_2.14.4-3_mips.deb stable/main/binary-mips/librsvg2-bin_2.14.4-3_mips.deb stable/main/binary-mips/librsvg2-common_2.14.4-3_mips.deb librsvg (2.14.4-3) stable; urgency=low * Make librsvg2-common depend on libgtk2.0-bin 2.8 (closes: #403977). stable/main/binary-ia64/librsvg2-dev_2.14.4-3_ia64.deb stable/main/binary-ia64/librsvg2-common_2.14.4-3_ia64.deb stable/main/binary-ia64/librsvg2-2_2.14.4-3_ia64.deb stable/main/binary-ia64/librsvg2-bin_2.14.4-3_ia64.deb librsvg (2.14.4-3) stable; urgency=low * Make librsvg2-common depend on libgtk2.0-bin 2.8 (closes: #403977). stable/main/binary-hppa/librsvg2-bin_2.14.4-3_hppa.deb stable/main/binary-hppa/librsvg2-dev_2.14.4-3_hppa.deb stable/main/binary-hppa/librsvg2-2_2.14.4-3_hppa.deb stable/main/binary-hppa/librsvg2-common_2.14.4-3_hppa.deb librsvg (2.14.4-3) stable; urgency=low * Make librsvg2-common depend on libgtk2.0-bin 2.8 (closes: #403977). stable/main/binary-arm/librsvg2-bin_2.14.4-3_arm.deb stable/main/binary-arm/librsvg2-common_2.14.4-3_arm.deb stable/main/binary-arm/librsvg2-2_2.14.4-3_arm.deb stable/main/binary-arm/librsvg2-dev_2.14.4-3_arm.deb librsvg (2.14.4-3) stable; urgency=low * Make librsvg2-common depend on libgtk2.0-bin 2.8 (closes: #403977). stable/main/binary-amd64/librsvg2-bin_2.14.4-3_amd64.deb stable/main/binary-amd64/librsvg2-2_2.14.4-3_amd64.deb stable/main/binary-amd64/librsvg2-dev_2.14.4-3_amd64.deb stable/main/binary-amd64/librsvg2-common_2.14.4-3_amd64.deb librsvg (2.14.4-3) stable; urgency=low * Make librsvg2-common depend on libgtk2.0-bin 2.8 (closes: #403977). stable/main/binary-alpha/librsvg2-2_2.14.4-3_alpha.deb stable/main/binary-alpha/librsvg2-dev_2.14.4-3_alpha.deb stable/main/binary-alpha/librsvg2-bin_2.14.4-3_alpha.deb stable/main/binary-alpha/librsvg2-common_2.14.4-3_alpha.deb librsvg (2.14.4-3) stable; urgency=low * Make librsvg2-common depend on libgtk2.0-bin 2.8 (closes: #403977). stable/main/binary-i386/librsvg2-common_2.14.4-3_i386.deb stable/main/source/librsvg_2.14.4-3.dsc stable/main/binary-i386/librsvg2-2_2.14.4-3_i386.deb stable/main/binary-i386/librsvg2-dev_2.14.4-3_i386.deb stable/main/source/librsvg_2.14.4-3.diff.gz stable/main/binary-i386/librsvg2-bin_2.14.4-3_i386.deb librsvg (2.14.4-3) stable; urgency=low * Make librsvg2-common depend on libgtk2.0-bin 2.8 (closes: #403977). stable/main/source/libphp-phpmailer_1.73-2etch1.dsc stable/main/source/libphp-phpmailer_1.73-2etch1.diff.gz stable/main/binary-all/libphp-phpmailer_1.73-2etch1_all.deb libphp-phpmailer (1.73-2etch1) stable-security; urgency=high * Fix shell command execution [CVE-2007-3215] stable/main/binary-alpha/libofa0-dev_0.9.3-1+b1_alpha.deb stable/main/binary-alpha/libofa0_0.9.3-1+b1_alpha.deb libofa (0.9.3-1+b1) stable; urgency=low * Binary-only non-maintainer upload for alpha; no source changes. * Rebuild in a clean unstable environment to replace broken porter upload stable/main/binary-sparc/libexif-dev_0.6.13-5etch1_sparc.deb stable/main/binary-sparc/libexif12_0.6.13-5etch1_sparc.deb libexif (0.6.13-5etch1) stable-security; urgency=high * Non-maintainer upload by The Security Team * Fix integer overflow in loading images. [CVE-2006-4168] stable/main/binary-s390/libexif-dev_0.6.13-5etch1_s390.deb stable/main/binary-s390/libexif12_0.6.13-5etch1_s390.deb libexif (0.6.13-5etch1) stable-security; urgency=high * Non-maintainer upload by The Security Team * Fix integer overflow in loading images. [CVE-2006-4168] stable/main/binary-powerpc/libexif-dev_0.6.13-5etch1_powerpc.deb stable/main/binary-powerpc/libexif12_0.6.13-5etch1_powerpc.deb libexif (0.6.13-5etch1) stable-security; urgency=high * Non-maintainer upload by The Security Team * Fix integer overflow in loading images. [CVE-2006-4168] stable/main/binary-mipsel/libexif12_0.6.13-5etch1_mipsel.deb stable/main/binary-mipsel/libexif-dev_0.6.13-5etch1_mipsel.deb libexif (0.6.13-5etch1) stable-security; urgency=high * Non-maintainer upload by The Security Team * Fix integer overflow in loading images. [CVE-2006-4168] stable/main/binary-mips/libexif12_0.6.13-5etch1_mips.deb stable/main/binary-mips/libexif-dev_0.6.13-5etch1_mips.deb libexif (0.6.13-5etch1) stable-security; urgency=high * Non-maintainer upload by The Security Team * Fix integer overflow in loading images. [CVE-2006-4168] stable/main/binary-ia64/libexif12_0.6.13-5etch1_ia64.deb stable/main/binary-ia64/libexif-dev_0.6.13-5etch1_ia64.deb libexif (0.6.13-5etch1) stable-security; urgency=high * Non-maintainer upload by The Security Team * Fix integer overflow in loading images. [CVE-2006-4168] stable/main/binary-i386/libexif-dev_0.6.13-5etch1_i386.deb stable/main/binary-i386/libexif12_0.6.13-5etch1_i386.deb libexif (0.6.13-5etch1) stable-security; urgency=high * Non-maintainer upload by The Security Team * Fix integer overflow in loading images. [CVE-2006-4168] stable/main/binary-hppa/libexif12_0.6.13-5etch1_hppa.deb stable/main/binary-hppa/libexif-dev_0.6.13-5etch1_hppa.deb libexif (0.6.13-5etch1) stable-security; urgency=high * Non-maintainer upload by The Security Team * Fix integer overflow in loading images. [CVE-2006-4168] stable/main/binary-arm/libexif-dev_0.6.13-5etch1_arm.deb stable/main/binary-arm/libexif12_0.6.13-5etch1_arm.deb libexif (0.6.13-5etch1) stable-security; urgency=high * Non-maintainer upload by The Security Team * Fix integer overflow in loading images. [CVE-2006-4168] stable/main/binary-alpha/libexif-dev_0.6.13-5etch1_alpha.deb stable/main/binary-alpha/libexif12_0.6.13-5etch1_alpha.deb libexif (0.6.13-5etch1) stable-security; urgency=high * Non-maintainer upload by The Security Team * Fix integer overflow in loading images. [CVE-2006-4168] stable/main/source/libexif_0.6.13-5etch1.dsc stable/main/source/libexif_0.6.13-5etch1.diff.gz stable/main/binary-amd64/libexif12_0.6.13-5etch1_amd64.deb stable/main/binary-amd64/libexif-dev_0.6.13-5etch1_amd64.deb libexif (0.6.13-5etch1) stable-security; urgency=high * Non-maintainer upload by The Security Team * Fix integer overflow in loading images. [CVE-2006-4168] stable/main/binary-sparc/libapache2-mod-jk_1.2.18-3etch1_sparc.deb stable/main/binary-sparc/libapache-mod-jk_1.2.18-3etch1_sparc.deb libapache-mod-jk (1:1.2.18-3etch1) stable-security; urgency=high * Forward unparsed URI to tomcat. Closes: #425836. CVE-2007-1860 stable/main/binary-s390/libapache-mod-jk_1.2.18-3etch1_s390.deb stable/main/binary-s390/libapache2-mod-jk_1.2.18-3etch1_s390.deb libapache-mod-jk (1:1.2.18-3etch1) stable-security; urgency=high * Forward unparsed URI to tomcat. Closes: #425836. CVE-2007-1860 stable/main/binary-powerpc/libapache-mod-jk_1.2.18-3etch1_powerpc.deb stable/main/binary-powerpc/libapache2-mod-jk_1.2.18-3etch1_powerpc.deb libapache-mod-jk (1:1.2.18-3etch1) stable-security; urgency=high * Forward unparsed URI to tomcat. Closes: #425836. CVE-2007-1860 stable/main/binary-mipsel/libapache2-mod-jk_1.2.18-3etch1_mipsel.deb stable/main/binary-mipsel/libapache-mod-jk_1.2.18-3etch1_mipsel.deb libapache-mod-jk (1:1.2.18-3etch1) stable-security; urgency=high * Forward unparsed URI to tomcat. Closes: #425836. CVE-2007-1860 stable/main/binary-mips/libapache2-mod-jk_1.2.18-3etch1_mips.deb stable/main/binary-mips/libapache-mod-jk_1.2.18-3etch1_mips.deb libapache-mod-jk (1:1.2.18-3etch1) stable-security; urgency=high * Forward unparsed URI to tomcat. Closes: #425836. CVE-2007-1860 stable/main/binary-ia64/libapache-mod-jk_1.2.18-3etch1_ia64.deb stable/main/binary-ia64/libapache2-mod-jk_1.2.18-3etch1_ia64.deb libapache-mod-jk (1:1.2.18-3etch1) stable-security; urgency=high * Forward unparsed URI to tomcat. Closes: #425836. CVE-2007-1860 stable/main/binary-hppa/libapache-mod-jk_1.2.18-3etch1_hppa.deb stable/main/binary-hppa/libapache2-mod-jk_1.2.18-3etch1_hppa.deb libapache-mod-jk (1:1.2.18-3etch1) stable-security; urgency=high * Forward unparsed URI to tomcat. Closes: #425836. CVE-2007-1860 stable/main/binary-arm/libapache-mod-jk_1.2.18-3etch1_arm.deb stable/main/binary-arm/libapache2-mod-jk_1.2.18-3etch1_arm.deb libapache-mod-jk (1:1.2.18-3etch1) stable-security; urgency=high * Forward unparsed URI to tomcat. Closes: #425836. CVE-2007-1860 stable/main/binary-amd64/libapache-mod-jk_1.2.18-3etch1_amd64.deb stable/main/binary-amd64/libapache2-mod-jk_1.2.18-3etch1_amd64.deb libapache-mod-jk (1:1.2.18-3etch1) stable-security; urgency=high * Forward unparsed URI to tomcat. Closes: #425836. CVE-2007-1860 stable/main/binary-alpha/libapache-mod-jk_1.2.18-3etch1_alpha.deb stable/main/binary-alpha/libapache2-mod-jk_1.2.18-3etch1_alpha.deb libapache-mod-jk (1:1.2.18-3etch1) stable-security; urgency=high * Forward unparsed URI to tomcat. Closes: #425836. CVE-2007-1860 stable/main/binary-all/libapache-mod-jk-doc_1.2.18-3etch1_all.deb stable/main/binary-i386/libapache-mod-jk_1.2.18-3etch1_i386.deb stable/main/source/libapache-mod-jk_1.2.18-3etch1.dsc stable/main/source/libapache-mod-jk_1.2.18-3etch1.diff.gz stable/main/binary-i386/libapache2-mod-jk_1.2.18-3etch1_i386.deb libapache-mod-jk (1:1.2.18-3etch1) stable-security; urgency=high * Forward unparsed URI to tomcat. Closes: #425836. CVE-2007-1860 stable/main/source/kernel-wedge_2.31.1.tar.gz stable/main/source/kernel-wedge_2.31.1.dsc stable/main/binary-all/kernel-wedge_2.31.1_all.deb kernel-wedge (2.31.1) proposed-updates; urgency=low * Re-upload to proposed-updates from the etch branch, so that the version of kernel-wedge in etch r1 matches the packages built against it. stable/main/source/kernel-patch-openvz_028.18.1etch2.tar.gz stable/main/binary-all/kernel-patch-openvz_028.18.1etch2_all.deb stable/main/source/kernel-patch-openvz_028.18.1etch2.dsc kernel-patch-openvz (028.18.1etch2) stable; urgency=medium * Applied patch for (Closes: #420708) oops bug. Thanks to Alexey Dobriyan for the fix and to "Joao Sousa" for good help. * Correction to make it compile on ia64. stable/contrib/binary-s390/ivtv-utils_0.8.2-2_s390.deb ivtv (0.8.2-2) unstable; urgency=low * Backout help2man as it was causing buildd segfaults :-( stable/main/binary-sparc/ipsec-tools_0.6.6-3.1etch1_sparc.deb stable/main/binary-sparc/racoon_0.6.6-3.1etch1_sparc.deb ipsec-tools (1:0.6.6-3.1etch1) stable-security; urgency=high * NMU by the Security Team * Fix remote DoS condition that makes it possible for remote attackers to crash a tunnel. See CVE-2007-1841 stable/main/binary-s390/ipsec-tools_0.6.6-3.1etch1_s390.deb stable/main/binary-s390/racoon_0.6.6-3.1etch1_s390.deb ipsec-tools (1:0.6.6-3.1etch1) stable-security; urgency=high * NMU by the Security Team * Fix remote DoS condition that makes it possible for remote attackers to crash a tunnel. See CVE-2007-1841 stable/main/binary-powerpc/ipsec-tools_0.6.6-3.1etch1_powerpc.deb stable/main/binary-powerpc/racoon_0.6.6-3.1etch1_powerpc.deb ipsec-tools (1:0.6.6-3.1etch1) stable-security; urgency=high * NMU by the Security Team * Fix remote DoS condition that makes it possible for remote attackers to crash a tunnel. See CVE-2007-1841 stable/main/binary-mipsel/ipsec-tools_0.6.6-3.1etch1_mipsel.deb stable/main/binary-mipsel/racoon_0.6.6-3.1etch1_mipsel.deb ipsec-tools (1:0.6.6-3.1etch1) stable-security; urgency=high * NMU by the Security Team * Fix remote DoS condition that makes it possible for remote attackers to crash a tunnel. See CVE-2007-1841 stable/main/binary-mips/ipsec-tools_0.6.6-3.1etch1_mips.deb stable/main/binary-mips/racoon_0.6.6-3.1etch1_mips.deb ipsec-tools (1:0.6.6-3.1etch1) stable-security; urgency=high * NMU by the Security Team * Fix remote DoS condition that makes it possible for remote attackers to crash a tunnel. See CVE-2007-1841 stable/main/binary-i386/racoon_0.6.6-3.1etch1_i386.deb stable/main/binary-i386/ipsec-tools_0.6.6-3.1etch1_i386.deb ipsec-tools (1:0.6.6-3.1etch1) stable-security; urgency=high * NMU by the Security Team * Fix remote DoS condition that makes it possible for remote attackers to crash a tunnel. See CVE-2007-1841 stable/main/binary-hppa/ipsec-tools_0.6.6-3.1etch1_hppa.deb stable/main/binary-hppa/racoon_0.6.6-3.1etch1_hppa.deb ipsec-tools (1:0.6.6-3.1etch1) stable-security; urgency=high * NMU by the Security Team * Fix remote DoS condition that makes it possible for remote attackers to crash a tunnel. See CVE-2007-1841 stable/main/binary-arm/racoon_0.6.6-3.1etch1_arm.deb stable/main/binary-arm/ipsec-tools_0.6.6-3.1etch1_arm.deb ipsec-tools (1:0.6.6-3.1etch1) stable-security; urgency=high * NMU by the Security Team * Fix remote DoS condition that makes it possible for remote attackers to crash a tunnel. See CVE-2007-1841 stable/main/binary-amd64/ipsec-tools_0.6.6-3.1etch1_amd64.deb stable/main/binary-amd64/racoon_0.6.6-3.1etch1_amd64.deb ipsec-tools (1:0.6.6-3.1etch1) stable-security; urgency=high * NMU by the Security Team * Fix remote DoS condition that makes it possible for remote attackers to crash a tunnel. See CVE-2007-1841 stable/main/binary-alpha/racoon_0.6.6-3.1etch1_alpha.deb stable/main/binary-alpha/ipsec-tools_0.6.6-3.1etch1_alpha.deb ipsec-tools (1:0.6.6-3.1etch1) stable-security; urgency=high * NMU by the Security Team * Fix remote DoS condition that makes it possible for remote attackers to crash a tunnel. See CVE-2007-1841 stable/main/binary-ia64/ipsec-tools_0.6.6-3.1etch1_ia64.deb stable/main/source/ipsec-tools_0.6.6-3.1etch1.diff.gz stable/main/source/ipsec-tools_0.6.6-3.1etch1.dsc stable/main/binary-ia64/racoon_0.6.6-3.1etch1_ia64.deb ipsec-tools (1:0.6.6-3.1etch1) stable-security; urgency=high * NMU by the Security Team * Fix remote DoS condition that makes it possible for remote attackers to crash a tunnel. See CVE-2007-1841 stable/main/source/initramfs-tools_0.85h.dsc stable/main/binary-all/initramfs-tools_0.85h_all.deb stable/main/source/initramfs-tools_0.85h.tar.gz initramfs-tools (0.85h) stable; urgency=low * hook-functions: Add missing esp module to scsi modules list. Thanks Vincent Bernat for patch. (closes: 418977) stable/main/binary-sparc/icedove_1.5.0.12.dfsg1-0etch1_sparc.deb stable/main/binary-sparc/icedove-dev_1.5.0.12.dfsg1-0etch1_sparc.deb stable/main/binary-sparc/icedove-dbg_1.5.0.12.dfsg1-0etch1_sparc.deb stable/main/binary-sparc/icedove-inspector_1.5.0.12.dfsg1-0etch1_sparc.deb stable/main/binary-sparc/icedove-gnome-support_1.5.0.12.dfsg1-0etch1_sparc.deb stable/main/binary-sparc/icedove-typeaheadfind_1.5.0.12.dfsg1-0etch1_sparc.deb icedove (1.5.0.12.dfsg1-0etch1) stable-security; urgency=low * security stability update 1.5.0.12: - CVE-2007-1558 aka MFSA 2007-15: Security Vulnerability in APOP Authentication - CVE-2007-2867 aka MFSA 2007-12: Crashes with evidence of memory corruption (rv:1.8.0.12/1.8.1.4) in layout engine - CVE-2007-2868 aka MFSA 2007-12: Crashes with evidence of memory corruption (rv:1.8.0.12/1.8.1.4) in javascript engine stable/main/binary-s390/icedove-gnome-support_1.5.0.12.dfsg1-0etch1_s390.deb stable/main/binary-s390/icedove_1.5.0.12.dfsg1-0etch1_s390.deb stable/main/binary-s390/icedove-dev_1.5.0.12.dfsg1-0etch1_s390.deb stable/main/binary-s390/icedove-inspector_1.5.0.12.dfsg1-0etch1_s390.deb stable/main/binary-s390/icedove-typeaheadfind_1.5.0.12.dfsg1-0etch1_s390.deb stable/main/binary-s390/icedove-dbg_1.5.0.12.dfsg1-0etch1_s390.deb icedove (1.5.0.12.dfsg1-0etch1) stable-security; urgency=low * security stability update 1.5.0.12: - CVE-2007-1558 aka MFSA 2007-15: Security Vulnerability in APOP Authentication - CVE-2007-2867 aka MFSA 2007-12: Crashes with evidence of memory corruption (rv:1.8.0.12/1.8.1.4) in layout engine - CVE-2007-2868 aka MFSA 2007-12: Crashes with evidence of memory corruption (rv:1.8.0.12/1.8.1.4) in javascript engine stable/main/binary-powerpc/icedove-gnome-support_1.5.0.12.dfsg1-0etch1_powerpc.deb stable/main/binary-powerpc/icedove_1.5.0.12.dfsg1-0etch1_powerpc.deb stable/main/binary-powerpc/icedove-dev_1.5.0.12.dfsg1-0etch1_powerpc.deb stable/main/binary-powerpc/icedove-dbg_1.5.0.12.dfsg1-0etch1_powerpc.deb stable/main/binary-powerpc/icedove-typeaheadfind_1.5.0.12.dfsg1-0etch1_powerpc.deb stable/main/binary-powerpc/icedove-inspector_1.5.0.12.dfsg1-0etch1_powerpc.deb icedove (1.5.0.12.dfsg1-0etch1) stable-security; urgency=low * security stability update 1.5.0.12: - CVE-2007-1558 aka MFSA 2007-15: Security Vulnerability in APOP Authentication - CVE-2007-2867 aka MFSA 2007-12: Crashes with evidence of memory corruption (rv:1.8.0.12/1.8.1.4) in layout engine - CVE-2007-2868 aka MFSA 2007-12: Crashes with evidence of memory corruption (rv:1.8.0.12/1.8.1.4) in javascript engine stable/main/binary-mipsel/icedove-gnome-support_1.5.0.12.dfsg1-0etch1_mipsel.deb stable/main/binary-mipsel/icedove-inspector_1.5.0.12.dfsg1-0etch1_mipsel.deb stable/main/binary-mipsel/icedove-typeaheadfind_1.5.0.12.dfsg1-0etch1_mipsel.deb stable/main/binary-mipsel/icedove-dbg_1.5.0.12.dfsg1-0etch1_mipsel.deb stable/main/binary-mipsel/icedove_1.5.0.12.dfsg1-0etch1_mipsel.deb stable/main/binary-mipsel/icedove-dev_1.5.0.12.dfsg1-0etch1_mipsel.deb icedove (1.5.0.12.dfsg1-0etch1) stable-security; urgency=low * security stability update 1.5.0.12: - CVE-2007-1558 aka MFSA 2007-15: Security Vulnerability in APOP Authentication - CVE-2007-2867 aka MFSA 2007-12: Crashes with evidence of memory corruption (rv:1.8.0.12/1.8.1.4) in layout engine - CVE-2007-2868 aka MFSA 2007-12: Crashes with evidence of memory corruption (rv:1.8.0.12/1.8.1.4) in javascript engine stable/main/binary-mips/icedove-dbg_1.5.0.12.dfsg1-0etch1_mips.deb stable/main/binary-mips/icedove-gnome-support_1.5.0.12.dfsg1-0etch1_mips.deb stable/main/binary-mips/icedove-typeaheadfind_1.5.0.12.dfsg1-0etch1_mips.deb stable/main/binary-mips/icedove_1.5.0.12.dfsg1-0etch1_mips.deb stable/main/binary-mips/icedove-dev_1.5.0.12.dfsg1-0etch1_mips.deb stable/main/binary-mips/icedove-inspector_1.5.0.12.dfsg1-0etch1_mips.deb icedove (1.5.0.12.dfsg1-0etch1) stable-security; urgency=low * security stability update 1.5.0.12: - CVE-2007-1558 aka MFSA 2007-15: Security Vulnerability in APOP Authentication - CVE-2007-2867 aka MFSA 2007-12: Crashes with evidence of memory corruption (rv:1.8.0.12/1.8.1.4) in layout engine - CVE-2007-2868 aka MFSA 2007-12: Crashes with evidence of memory corruption (rv:1.8.0.12/1.8.1.4) in javascript engine stable/main/binary-ia64/icedove-dev_1.5.0.12.dfsg1-0etch1_ia64.deb stable/main/binary-ia64/icedove-typeaheadfind_1.5.0.12.dfsg1-0etch1_ia64.deb stable/main/binary-ia64/icedove-inspector_1.5.0.12.dfsg1-0etch1_ia64.deb stable/main/binary-ia64/icedove_1.5.0.12.dfsg1-0etch1_ia64.deb stable/main/binary-ia64/icedove-gnome-support_1.5.0.12.dfsg1-0etch1_ia64.deb stable/main/binary-ia64/icedove-dbg_1.5.0.12.dfsg1-0etch1_ia64.deb icedove (1.5.0.12.dfsg1-0etch1) stable-security; urgency=low * security stability update 1.5.0.12: - CVE-2007-1558 aka MFSA 2007-15: Security Vulnerability in APOP Authentication - CVE-2007-2867 aka MFSA 2007-12: Crashes with evidence of memory corruption (rv:1.8.0.12/1.8.1.4) in layout engine - CVE-2007-2868 aka MFSA 2007-12: Crashes with evidence of memory corruption (rv:1.8.0.12/1.8.1.4) in javascript engine stable/main/binary-i386/icedove-inspector_1.5.0.12.dfsg1-0etch1_i386.deb stable/main/binary-i386/icedove-gnome-support_1.5.0.12.dfsg1-0etch1_i386.deb stable/main/binary-i386/icedove_1.5.0.12.dfsg1-0etch1_i386.deb stable/main/binary-i386/icedove-typeaheadfind_1.5.0.12.dfsg1-0etch1_i386.deb stable/main/binary-i386/icedove-dev_1.5.0.12.dfsg1-0etch1_i386.deb stable/main/binary-i386/icedove-dbg_1.5.0.12.dfsg1-0etch1_i386.deb icedove (1.5.0.12.dfsg1-0etch1) stable-security; urgency=low * security stability update 1.5.0.12: - CVE-2007-1558 aka MFSA 2007-15: Security Vulnerability in APOP Authentication - CVE-2007-2867 aka MFSA 2007-12: Crashes with evidence of memory corruption (rv:1.8.0.12/1.8.1.4) in layout engine - CVE-2007-2868 aka MFSA 2007-12: Crashes with evidence of memory corruption (rv:1.8.0.12/1.8.1.4) in javascript engine stable/main/binary-hppa/icedove-typeaheadfind_1.5.0.12.dfsg1-0etch1_hppa.deb stable/main/binary-hppa/icedove-dev_1.5.0.12.dfsg1-0etch1_hppa.deb stable/main/binary-hppa/icedove-gnome-support_1.5.0.12.dfsg1-0etch1_hppa.deb stable/main/binary-hppa/icedove_1.5.0.12.dfsg1-0etch1_hppa.deb stable/main/binary-hppa/icedove-inspector_1.5.0.12.dfsg1-0etch1_hppa.deb stable/main/binary-hppa/icedove-dbg_1.5.0.12.dfsg1-0etch1_hppa.deb icedove (1.5.0.12.dfsg1-0etch1) stable-security; urgency=low * security stability update 1.5.0.12: - CVE-2007-1558 aka MFSA 2007-15: Security Vulnerability in APOP Authentication - CVE-2007-2867 aka MFSA 2007-12: Crashes with evidence of memory corruption (rv:1.8.0.12/1.8.1.4) in layout engine - CVE-2007-2868 aka MFSA 2007-12: Crashes with evidence of memory corruption (rv:1.8.0.12/1.8.1.4) in javascript engine stable/main/binary-arm/icedove-typeaheadfind_1.5.0.12.dfsg1-0etch1_arm.deb stable/main/binary-arm/icedove-inspector_1.5.0.12.dfsg1-0etch1_arm.deb stable/main/binary-arm/icedove-dbg_1.5.0.12.dfsg1-0etch1_arm.deb stable/main/binary-arm/icedove-dev_1.5.0.12.dfsg1-0etch1_arm.deb stable/main/binary-arm/icedove_1.5.0.12.dfsg1-0etch1_arm.deb stable/main/binary-arm/icedove-gnome-support_1.5.0.12.dfsg1-0etch1_arm.deb icedove (1.5.0.12.dfsg1-0etch1) stable-security; urgency=low * security stability update 1.5.0.12: - CVE-2007-1558 aka MFSA 2007-15: Security Vulnerability in APOP Authentication - CVE-2007-2867 aka MFSA 2007-12: Crashes with evidence of memory corruption (rv:1.8.0.12/1.8.1.4) in layout engine - CVE-2007-2868 aka MFSA 2007-12: Crashes with evidence of memory corruption (rv:1.8.0.12/1.8.1.4) in javascript engine stable/main/binary-alpha/icedove-typeaheadfind_1.5.0.12.dfsg1-0etch1_alpha.deb stable/main/binary-alpha/icedove_1.5.0.12.dfsg1-0etch1_alpha.deb stable/main/binary-alpha/icedove-gnome-support_1.5.0.12.dfsg1-0etch1_alpha.deb stable/main/binary-alpha/icedove-inspector_1.5.0.12.dfsg1-0etch1_alpha.deb stable/main/binary-alpha/icedove-dev_1.5.0.12.dfsg1-0etch1_alpha.deb stable/main/binary-alpha/icedove-dbg_1.5.0.12.dfsg1-0etch1_alpha.deb icedove (1.5.0.12.dfsg1-0etch1) stable-security; urgency=low * security stability update 1.5.0.12: - CVE-2007-1558 aka MFSA 2007-15: Security Vulnerability in APOP Authentication - CVE-2007-2867 aka MFSA 2007-12: Crashes with evidence of memory corruption (rv:1.8.0.12/1.8.1.4) in layout engine - CVE-2007-2868 aka MFSA 2007-12: Crashes with evidence of memory corruption (rv:1.8.0.12/1.8.1.4) in javascript engine stable/main/source/icedove_1.5.0.12.dfsg1-0etch1.dsc stable/main/binary-amd64/icedove-gnome-support_1.5.0.12.dfsg1-0etch1_amd64.deb stable/main/binary-all/thunderbird-typeaheadfind_1.5.0.12.dfsg1-0etch1_all.deb stable/main/binary-amd64/icedove-typeaheadfind_1.5.0.12.dfsg1-0etch1_amd64.deb stable/main/binary-amd64/icedove-dbg_1.5.0.12.dfsg1-0etch1_amd64.deb stable/main/binary-all/thunderbird-inspector_1.5.0.12.dfsg1-0etch1_all.deb stable/main/binary-all/mozilla-thunderbird-dev_1.5.0.12.dfsg1-0etch1_all.deb stable/main/binary-all/mozilla-thunderbird-typeaheadfind_1.5.0.12.dfsg1-0etch1_all.deb stable/main/binary-all/thunderbird_1.5.0.12.dfsg1-0etch1_all.deb stable/main/binary-all/mozilla-thunderbird_1.5.0.12.dfsg1-0etch1_all.deb stable/main/binary-all/thunderbird-dev_1.5.0.12.dfsg1-0etch1_all.deb stable/main/binary-amd64/icedove_1.5.0.12.dfsg1-0etch1_amd64.deb stable/main/binary-amd64/icedove-dev_1.5.0.12.dfsg1-0etch1_amd64.deb stable/main/binary-amd64/icedove-inspector_1.5.0.12.dfsg1-0etch1_amd64.deb stable/main/binary-all/thunderbird-gnome-support_1.5.0.12.dfsg1-0etch1_all.deb stable/main/source/icedove_1.5.0.12.dfsg1-0etch1.diff.gz stable/main/binary-all/mozilla-thunderbird-inspector_1.5.0.12.dfsg1-0etch1_all.deb stable/main/binary-all/thunderbird-dbg_1.5.0.12.dfsg1-0etch1_all.deb stable/main/source/icedove_1.5.0.12.dfsg1.orig.tar.gz icedove (1.5.0.12.dfsg1-0etch1) stable-security; urgency=low * security stability update 1.5.0.12: - CVE-2007-1558 aka MFSA 2007-15: Security Vulnerability in APOP Authentication - CVE-2007-2867 aka MFSA 2007-12: Crashes with evidence of memory corruption (rv:1.8.0.12/1.8.1.4) in layout engine - CVE-2007-2868 aka MFSA 2007-12: Crashes with evidence of memory corruption (rv:1.8.0.12/1.8.1.4) in javascript engine stable/main/binary-sparc/iceape-browser_1.0.9-0etch1_sparc.deb stable/main/binary-sparc/iceape-calendar_1.0.9-0etch1_sparc.deb stable/main/binary-sparc/iceape-gnome-support_1.0.9-0etch1_sparc.deb stable/main/binary-sparc/iceape-dbg_1.0.9-0etch1_sparc.deb stable/main/binary-sparc/iceape-dom-inspector_1.0.9-0etch1_sparc.deb stable/main/binary-sparc/iceape-mailnews_1.0.9-0etch1_sparc.deb iceape (1.0.9-0etch1) stable-security; urgency=low * New upstream release. * Fixes mfsa-2007-12, mfsa-2007-{14-17}, also known as CVE-2007-1362, CVE-2007-1558, CVE-2007-2867, CVE-2007-2868, CVE-2007-2870, CVE-2007-2871. * debian/patches/15_gecko_1.8.0.11.dpatch: Removed, as being applied upstream. * debian/patches/00list: Updated accordingly. * debian/control: Update dependencies for iceape-dev and iceape-chatzilla so that they don't depend on iceape-browser >= 1.0.9-1. stable/main/binary-s390/iceape-dom-inspector_1.0.9-0etch1_s390.deb stable/main/binary-s390/iceape-calendar_1.0.9-0etch1_s390.deb stable/main/binary-s390/iceape-dbg_1.0.9-0etch1_s390.deb stable/main/binary-s390/iceape-mailnews_1.0.9-0etch1_s390.deb stable/main/binary-s390/iceape-gnome-support_1.0.9-0etch1_s390.deb stable/main/binary-s390/iceape-browser_1.0.9-0etch1_s390.deb iceape (1.0.9-0etch1) stable-security; urgency=low * New upstream release. * Fixes mfsa-2007-12, mfsa-2007-{14-17}, also known as CVE-2007-1362, CVE-2007-1558, CVE-2007-2867, CVE-2007-2868, CVE-2007-2870, CVE-2007-2871. * debian/patches/15_gecko_1.8.0.11.dpatch: Removed, as being applied upstream. * debian/patches/00list: Updated accordingly. * debian/control: Update dependencies for iceape-dev and iceape-chatzilla so that they don't depend on iceape-browser >= 1.0.9-1. stable/main/binary-powerpc/iceape-browser_1.0.9-0etch1_powerpc.deb stable/main/binary-powerpc/iceape-gnome-support_1.0.9-0etch1_powerpc.deb stable/main/binary-powerpc/iceape-calendar_1.0.9-0etch1_powerpc.deb stable/main/binary-powerpc/iceape-mailnews_1.0.9-0etch1_powerpc.deb stable/main/binary-powerpc/iceape-dom-inspector_1.0.9-0etch1_powerpc.deb stable/main/binary-powerpc/iceape-dbg_1.0.9-0etch1_powerpc.deb iceape (1.0.9-0etch1) stable-security; urgency=low * New upstream release. * Fixes mfsa-2007-12, mfsa-2007-{14-17}, also known as CVE-2007-1362, CVE-2007-1558, CVE-2007-2867, CVE-2007-2868, CVE-2007-2870, CVE-2007-2871. * debian/patches/15_gecko_1.8.0.11.dpatch: Removed, as being applied upstream. * debian/patches/00list: Updated accordingly. * debian/control: Update dependencies for iceape-dev and iceape-chatzilla so that they don't depend on iceape-browser >= 1.0.9-1. stable/main/binary-mipsel/iceape-dom-inspector_1.0.9-0etch1_mipsel.deb stable/main/binary-mipsel/iceape-dbg_1.0.9-0etch1_mipsel.deb stable/main/binary-mipsel/iceape-browser_1.0.9-0etch1_mipsel.deb stable/main/binary-mipsel/iceape-mailnews_1.0.9-0etch1_mipsel.deb stable/main/binary-mipsel/iceape-gnome-support_1.0.9-0etch1_mipsel.deb stable/main/binary-mipsel/iceape-calendar_1.0.9-0etch1_mipsel.deb iceape (1.0.9-0etch1) stable-security; urgency=low * New upstream release. * Fixes mfsa-2007-12, mfsa-2007-{14-17}, also known as CVE-2007-1362, CVE-2007-1558, CVE-2007-2867, CVE-2007-2868, CVE-2007-2870, CVE-2007-2871. * debian/patches/15_gecko_1.8.0.11.dpatch: Removed, as being applied upstream. * debian/patches/00list: Updated accordingly. * debian/control: Update dependencies for iceape-dev and iceape-chatzilla so that they don't depend on iceape-browser >= 1.0.9-1. stable/main/binary-mips/iceape-calendar_1.0.9-0etch1_mips.deb stable/main/binary-mips/iceape-dom-inspector_1.0.9-0etch1_mips.deb stable/main/binary-mips/iceape-browser_1.0.9-0etch1_mips.deb stable/main/binary-mips/iceape-gnome-support_1.0.9-0etch1_mips.deb stable/main/binary-mips/iceape-mailnews_1.0.9-0etch1_mips.deb stable/main/binary-mips/iceape-dbg_1.0.9-0etch1_mips.deb iceape (1.0.9-0etch1) stable-security; urgency=low * New upstream release. * Fixes mfsa-2007-12, mfsa-2007-{14-17}, also known as CVE-2007-1362, CVE-2007-1558, CVE-2007-2867, CVE-2007-2868, CVE-2007-2870, CVE-2007-2871. * debian/patches/15_gecko_1.8.0.11.dpatch: Removed, as being applied upstream. * debian/patches/00list: Updated accordingly. * debian/control: Update dependencies for iceape-dev and iceape-chatzilla so that they don't depend on iceape-browser >= 1.0.9-1. stable/main/binary-ia64/iceape-calendar_1.0.9-0etch1_ia64.deb stable/main/binary-ia64/iceape-gnome-support_1.0.9-0etch1_ia64.deb stable/main/binary-ia64/iceape-dom-inspector_1.0.9-0etch1_ia64.deb stable/main/binary-ia64/iceape-dbg_1.0.9-0etch1_ia64.deb stable/main/binary-ia64/iceape-mailnews_1.0.9-0etch1_ia64.deb stable/main/binary-ia64/iceape-browser_1.0.9-0etch1_ia64.deb iceape (1.0.9-0etch1) stable-security; urgency=low * New upstream release. * Fixes mfsa-2007-12, mfsa-2007-{14-17}, also known as CVE-2007-1362, CVE-2007-1558, CVE-2007-2867, CVE-2007-2868, CVE-2007-2870, CVE-2007-2871. * debian/patches/15_gecko_1.8.0.11.dpatch: Removed, as being applied upstream. * debian/patches/00list: Updated accordingly. * debian/control: Update dependencies for iceape-dev and iceape-chatzilla so that they don't depend on iceape-browser >= 1.0.9-1. stable/main/binary-hppa/iceape-dom-inspector_1.0.9-0etch1_hppa.deb stable/main/binary-hppa/iceape-browser_1.0.9-0etch1_hppa.deb stable/main/binary-hppa/iceape-calendar_1.0.9-0etch1_hppa.deb stable/main/binary-hppa/iceape-gnome-support_1.0.9-0etch1_hppa.deb stable/main/binary-hppa/iceape-mailnews_1.0.9-0etch1_hppa.deb stable/main/binary-hppa/iceape-dbg_1.0.9-0etch1_hppa.deb iceape (1.0.9-0etch1) stable-security; urgency=low * New upstream release. * Fixes mfsa-2007-12, mfsa-2007-{14-17}, also known as CVE-2007-1362, CVE-2007-1558, CVE-2007-2867, CVE-2007-2868, CVE-2007-2870, CVE-2007-2871. * debian/patches/15_gecko_1.8.0.11.dpatch: Removed, as being applied upstream. * debian/patches/00list: Updated accordingly. * debian/control: Update dependencies for iceape-dev and iceape-chatzilla so that they don't depend on iceape-browser >= 1.0.9-1. stable/main/binary-arm/iceape-dbg_1.0.9-0etch1_arm.deb stable/main/binary-arm/iceape-mailnews_1.0.9-0etch1_arm.deb stable/main/binary-arm/iceape-gnome-support_1.0.9-0etch1_arm.deb stable/main/binary-arm/iceape-dom-inspector_1.0.9-0etch1_arm.deb stable/main/binary-arm/iceape-browser_1.0.9-0etch1_arm.deb stable/main/binary-arm/iceape-calendar_1.0.9-0etch1_arm.deb iceape (1.0.9-0etch1) stable-security; urgency=low * New upstream release. * Fixes mfsa-2007-12, mfsa-2007-{14-17}, also known as CVE-2007-1362, CVE-2007-1558, CVE-2007-2867, CVE-2007-2868, CVE-2007-2870, CVE-2007-2871. * debian/patches/15_gecko_1.8.0.11.dpatch: Removed, as being applied upstream. * debian/patches/00list: Updated accordingly. * debian/control: Update dependencies for iceape-dev and iceape-chatzilla so that they don't depend on iceape-browser >= 1.0.9-1. stable/main/binary-amd64/iceape-gnome-support_1.0.9-0etch1_amd64.deb stable/main/binary-amd64/iceape-mailnews_1.0.9-0etch1_amd64.deb stable/main/binary-amd64/iceape-dom-inspector_1.0.9-0etch1_amd64.deb stable/main/binary-amd64/iceape-calendar_1.0.9-0etch1_amd64.deb stable/main/binary-amd64/iceape-browser_1.0.9-0etch1_amd64.deb stable/main/binary-amd64/iceape-dbg_1.0.9-0etch1_amd64.deb iceape (1.0.9-0etch1) stable-security; urgency=low * New upstream release. * Fixes mfsa-2007-12, mfsa-2007-{14-17}, also known as CVE-2007-1362, CVE-2007-1558, CVE-2007-2867, CVE-2007-2868, CVE-2007-2870, CVE-2007-2871. * debian/patches/15_gecko_1.8.0.11.dpatch: Removed, as being applied upstream. * debian/patches/00list: Updated accordingly. * debian/control: Update dependencies for iceape-dev and iceape-chatzilla so that they don't depend on iceape-browser >= 1.0.9-1. stable/main/binary-alpha/iceape-dom-inspector_1.0.9-0etch1_alpha.deb stable/main/binary-alpha/iceape-dbg_1.0.9-0etch1_alpha.deb stable/main/binary-alpha/iceape-mailnews_1.0.9-0etch1_alpha.deb stable/main/binary-alpha/iceape-gnome-support_1.0.9-0etch1_alpha.deb stable/main/binary-alpha/iceape-calendar_1.0.9-0etch1_alpha.deb stable/main/binary-alpha/iceape-browser_1.0.9-0etch1_alpha.deb iceape (1.0.9-0etch1) stable-security; urgency=low * New upstream release. * Fixes mfsa-2007-12, mfsa-2007-{14-17}, also known as CVE-2007-1362, CVE-2007-1558, CVE-2007-2867, CVE-2007-2868, CVE-2007-2870, CVE-2007-2871. * debian/patches/15_gecko_1.8.0.11.dpatch: Removed, as being applied upstream. * debian/patches/00list: Updated accordingly. * debian/control: Update dependencies for iceape-dev and iceape-chatzilla so that they don't depend on iceape-browser >= 1.0.9-1. stable/main/binary-all/mozilla-js-debugger_1.8+1.0.9-0etch1_all.deb stable/main/binary-all/mozilla-browser_1.8+1.0.9-0etch1_all.deb stable/main/binary-all/iceape-chatzilla_1.0.9-0etch1_all.deb stable/main/binary-all/iceape_1.0.9-0etch1_all.deb stable/main/source/iceape_1.0.9.orig.tar.gz stable/main/binary-all/mozilla-psm_1.8+1.0.9-0etch1_all.deb stable/main/binary-i386/iceape-dbg_1.0.9-0etch1_i386.deb stable/main/binary-i386/iceape-mailnews_1.0.9-0etch1_i386.deb stable/main/binary-i386/iceape-calendar_1.0.9-0etch1_i386.deb stable/main/binary-all/mozilla-dev_1.8+1.0.9-0etch1_all.deb stable/main/source/iceape_1.0.9-0etch1.diff.gz stable/main/binary-all/mozilla-dom-inspector_1.8+1.0.9-0etch1_all.deb stable/main/binary-i386/iceape-gnome-support_1.0.9-0etch1_i386.deb stable/main/binary-i386/iceape-browser_1.0.9-0etch1_i386.deb stable/main/binary-all/mozilla_1.8+1.0.9-0etch1_all.deb stable/main/binary-all/mozilla-chatzilla_1.8+1.0.9-0etch1_all.deb stable/main/binary-i386/iceape-dom-inspector_1.0.9-0etch1_i386.deb stable/main/binary-all/iceape-dev_1.0.9-0etch1_all.deb stable/main/binary-all/mozilla-calendar_1.8+1.0.9-0etch1_all.deb stable/main/binary-all/mozilla-mailnews_1.8+1.0.9-0etch1_all.deb stable/main/source/iceape_1.0.9-0etch1.dsc iceape (1.0.9-0etch1) stable-security; urgency=low * New upstream release. * Fixes mfsa-2007-12, mfsa-2007-{14-17}, also known as CVE-2007-1362, CVE-2007-1558, CVE-2007-2867, CVE-2007-2868, CVE-2007-2870, CVE-2007-2871. * debian/patches/15_gecko_1.8.0.11.dpatch: Removed, as being applied upstream. * debian/patches/00list: Updated accordingly. * debian/control: Update dependencies for iceape-dev and iceape-chatzilla so that they don't depend on iceape-browser >= 1.0.9-1. stable/main/binary-arm/hpodder_0.5.8_arm.deb hpodder (0.5.8) unstable; urgency=low * Update for GHC 6.6. stable/main/binary-arm/gnome-mount_0.5-3+b2_arm.deb gnome-mount (0.5-3+b2) stable; urgency=low * Binary-only non-maintainer upload for arm; no source changes. * Rebuild against libeel2-2.14 stable/main/binary-sparc/locales-all_2.3.6.ds1-13etch2_sparc.deb stable/main/binary-sparc/libnss-dns-udeb_2.3.6.ds1-13etch2_sparc.udeb stable/main/binary-sparc/libc6-dev-sparc64_2.3.6.ds1-13etch2_sparc.deb stable/main/binary-sparc/nscd_2.3.6.ds1-13etch2_sparc.deb stable/main/binary-sparc/libc6-dbg_2.3.6.ds1-13etch2_sparc.deb stable/main/binary-sparc/libc6_2.3.6.ds1-13etch2_sparc.deb stable/main/binary-sparc/libc6-prof_2.3.6.ds1-13etch2_sparc.deb stable/main/binary-sparc/libc6-dev_2.3.6.ds1-13etch2_sparc.deb stable/main/binary-sparc/libc6-udeb_2.3.6.ds1-13etch2_sparc.udeb stable/main/binary-sparc/libc6-sparcv9_2.3.6.ds1-13etch2_sparc.deb stable/main/binary-sparc/libc6-pic_2.3.6.ds1-13etch2_sparc.deb stable/main/binary-sparc/libc6-sparc64_2.3.6.ds1-13etch2_sparc.deb stable/main/binary-sparc/libnss-files-udeb_2.3.6.ds1-13etch2_sparc.udeb stable/main/binary-sparc/libc6-sparcv9b_2.3.6.ds1-13etch2_sparc.deb glibc (2.3.6.ds1-13etch2) stable; urgency=low * patches/any/cvs-vfprintf-stack-smashing.diff: fix issue with 8bits locales and printf exploding the stack with large width specifiers. * patches/any/cvs-getnetgrent_r-memory-leak.diff: fix memory leak in getnetgrent_r. Closes: #423369. stable/main/binary-s390/libc6-prof_2.3.6.ds1-13etch2_s390.deb stable/main/binary-s390/libnss-files-udeb_2.3.6.ds1-13etch2_s390.udeb stable/main/binary-s390/libc6_2.3.6.ds1-13etch2_s390.deb stable/main/binary-s390/libc6-udeb_2.3.6.ds1-13etch2_s390.udeb stable/main/binary-s390/nscd_2.3.6.ds1-13etch2_s390.deb stable/main/binary-s390/libc6-s390x_2.3.6.ds1-13etch2_s390.deb stable/main/binary-s390/libc6-dbg_2.3.6.ds1-13etch2_s390.deb stable/main/binary-s390/locales-all_2.3.6.ds1-13etch2_s390.deb stable/main/binary-s390/libc6-dev_2.3.6.ds1-13etch2_s390.deb stable/main/binary-s390/libnss-dns-udeb_2.3.6.ds1-13etch2_s390.udeb stable/main/binary-s390/libc6-dev-s390x_2.3.6.ds1-13etch2_s390.deb stable/main/binary-s390/libc6-pic_2.3.6.ds1-13etch2_s390.deb glibc (2.3.6.ds1-13etch2) stable; urgency=low * patches/any/cvs-vfprintf-stack-smashing.diff: fix issue with 8bits locales and printf exploding the stack with large width specifiers. * patches/any/cvs-getnetgrent_r-memory-leak.diff: fix memory leak in getnetgrent_r. Closes: #423369. stable/main/binary-powerpc/libnss-dns-udeb_2.3.6.ds1-13etch2_powerpc.udeb stable/main/binary-powerpc/libc6-prof_2.3.6.ds1-13etch2_powerpc.deb stable/main/binary-powerpc/libnss-files-udeb_2.3.6.ds1-13etch2_powerpc.udeb stable/main/binary-powerpc/libc6_2.3.6.ds1-13etch2_powerpc.deb stable/main/binary-powerpc/libc6-pic_2.3.6.ds1-13etch2_powerpc.deb stable/main/binary-powerpc/libc6-dev_2.3.6.ds1-13etch2_powerpc.deb stable/main/binary-powerpc/libc6-udeb_2.3.6.ds1-13etch2_powerpc.udeb stable/main/binary-powerpc/libc6-ppc64_2.3.6.ds1-13etch2_powerpc.deb stable/main/binary-powerpc/libc6-dev-ppc64_2.3.6.ds1-13etch2_powerpc.deb stable/main/binary-powerpc/libc6-dbg_2.3.6.ds1-13etch2_powerpc.deb stable/main/binary-powerpc/locales-all_2.3.6.ds1-13etch2_powerpc.deb stable/main/binary-powerpc/nscd_2.3.6.ds1-13etch2_powerpc.deb glibc (2.3.6.ds1-13etch2) stable; urgency=low * patches/any/cvs-vfprintf-stack-smashing.diff: fix issue with 8bits locales and printf exploding the stack with large width specifiers. * patches/any/cvs-getnetgrent_r-memory-leak.diff: fix memory leak in getnetgrent_r. Closes: #423369. stable/main/binary-mipsel/libc6-prof_2.3.6.ds1-13etch2_mipsel.deb stable/main/binary-mipsel/libc6-dev_2.3.6.ds1-13etch2_mipsel.deb stable/main/binary-mipsel/libc6_2.3.6.ds1-13etch2_mipsel.deb stable/main/binary-mipsel/libnss-files-udeb_2.3.6.ds1-13etch2_mipsel.udeb stable/main/binary-mipsel/nscd_2.3.6.ds1-13etch2_mipsel.deb stable/main/binary-mipsel/libc6-dbg_2.3.6.ds1-13etch2_mipsel.deb stable/main/binary-mipsel/libnss-dns-udeb_2.3.6.ds1-13etch2_mipsel.udeb stable/main/binary-mipsel/libc6-pic_2.3.6.ds1-13etch2_mipsel.deb stable/main/binary-mipsel/locales-all_2.3.6.ds1-13etch2_mipsel.deb stable/main/binary-mipsel/libc6-udeb_2.3.6.ds1-13etch2_mipsel.udeb glibc (2.3.6.ds1-13etch2) stable; urgency=low * patches/any/cvs-vfprintf-stack-smashing.diff: fix issue with 8bits locales and printf exploding the stack with large width specifiers. * patches/any/cvs-getnetgrent_r-memory-leak.diff: fix memory leak in getnetgrent_r. Closes: #423369. stable/main/binary-mips/libc6-dbg_2.3.6.ds1-13etch2_mips.deb stable/main/binary-mips/libc6-prof_2.3.6.ds1-13etch2_mips.deb stable/main/binary-mips/libc6_2.3.6.ds1-13etch2_mips.deb stable/main/binary-mips/nscd_2.3.6.ds1-13etch2_mips.deb stable/main/binary-mips/libc6-udeb_2.3.6.ds1-13etch2_mips.udeb stable/main/binary-mips/libnss-dns-udeb_2.3.6.ds1-13etch2_mips.udeb stable/main/binary-mips/libc6-pic_2.3.6.ds1-13etch2_mips.deb stable/main/binary-mips/libnss-files-udeb_2.3.6.ds1-13etch2_mips.udeb stable/main/binary-mips/locales-all_2.3.6.ds1-13etch2_mips.deb stable/main/binary-mips/libc6-dev_2.3.6.ds1-13etch2_mips.deb glibc (2.3.6.ds1-13etch2) stable; urgency=low * patches/any/cvs-vfprintf-stack-smashing.diff: fix issue with 8bits locales and printf exploding the stack with large width specifiers. * patches/any/cvs-getnetgrent_r-memory-leak.diff: fix memory leak in getnetgrent_r. Closes: #423369. stable/main/binary-ia64/libc6.1-udeb_2.3.6.ds1-13etch2_ia64.udeb stable/main/binary-ia64/libc6.1-pic_2.3.6.ds1-13etch2_ia64.deb stable/main/binary-ia64/libc6.1_2.3.6.ds1-13etch2_ia64.deb stable/main/binary-ia64/libc6.1-dev_2.3.6.ds1-13etch2_ia64.deb stable/main/binary-ia64/nscd_2.3.6.ds1-13etch2_ia64.deb stable/main/binary-ia64/libc6.1-prof_2.3.6.ds1-13etch2_ia64.deb stable/main/binary-ia64/libc6.1-dbg_2.3.6.ds1-13etch2_ia64.deb stable/main/binary-ia64/libnss-files-udeb_2.3.6.ds1-13etch2_ia64.udeb stable/main/binary-ia64/libnss-dns-udeb_2.3.6.ds1-13etch2_ia64.udeb stable/main/binary-ia64/locales-all_2.3.6.ds1-13etch2_ia64.deb glibc (2.3.6.ds1-13etch2) stable; urgency=low * patches/any/cvs-vfprintf-stack-smashing.diff: fix issue with 8bits locales and printf exploding the stack with large width specifiers. * patches/any/cvs-getnetgrent_r-memory-leak.diff: fix memory leak in getnetgrent_r. Closes: #423369. stable/main/binary-i386/nscd_2.3.6.ds1-13etch2_i386.deb stable/main/binary-i386/libc6-xen_2.3.6.ds1-13etch2_i386.deb stable/main/binary-i386/libnss-files-udeb_2.3.6.ds1-13etch2_i386.udeb stable/main/binary-i386/libc6-dev_2.3.6.ds1-13etch2_i386.deb stable/main/binary-i386/libc6-pic_2.3.6.ds1-13etch2_i386.deb stable/main/binary-i386/libc6-dev-amd64_2.3.6.ds1-13etch2_i386.deb stable/main/binary-i386/libc6-udeb_2.3.6.ds1-13etch2_i386.udeb stable/main/binary-i386/libc6-i686_2.3.6.ds1-13etch2_i386.deb stable/main/binary-i386/libc6-dbg_2.3.6.ds1-13etch2_i386.deb stable/main/binary-i386/libc6-amd64_2.3.6.ds1-13etch2_i386.deb stable/main/binary-i386/libnss-dns-udeb_2.3.6.ds1-13etch2_i386.udeb stable/main/binary-i386/locales-all_2.3.6.ds1-13etch2_i386.deb stable/main/binary-i386/libc6_2.3.6.ds1-13etch2_i386.deb stable/main/binary-i386/libc6-prof_2.3.6.ds1-13etch2_i386.deb glibc (2.3.6.ds1-13etch2) stable; urgency=low * patches/any/cvs-vfprintf-stack-smashing.diff: fix issue with 8bits locales and printf exploding the stack with large width specifiers. * patches/any/cvs-getnetgrent_r-memory-leak.diff: fix memory leak in getnetgrent_r. Closes: #423369. stable/main/binary-hppa/libnss-dns-udeb_2.3.6.ds1-13etch2_hppa.udeb stable/main/binary-hppa/libc6-dbg_2.3.6.ds1-13etch2_hppa.deb stable/main/binary-hppa/locales-all_2.3.6.ds1-13etch2_hppa.deb stable/main/binary-hppa/libc6-udeb_2.3.6.ds1-13etch2_hppa.udeb stable/main/binary-hppa/nscd_2.3.6.ds1-13etch2_hppa.deb stable/main/binary-hppa/libc6-dev_2.3.6.ds1-13etch2_hppa.deb stable/main/binary-hppa/libnss-files-udeb_2.3.6.ds1-13etch2_hppa.udeb stable/main/binary-hppa/libc6_2.3.6.ds1-13etch2_hppa.deb stable/main/binary-hppa/libc6-pic_2.3.6.ds1-13etch2_hppa.deb stable/main/binary-hppa/libc6-prof_2.3.6.ds1-13etch2_hppa.deb glibc (2.3.6.ds1-13etch2) stable; urgency=low * patches/any/cvs-vfprintf-stack-smashing.diff: fix issue with 8bits locales and printf exploding the stack with large width specifiers. * patches/any/cvs-getnetgrent_r-memory-leak.diff: fix memory leak in getnetgrent_r. Closes: #423369. stable/main/binary-arm/libc6-dev_2.3.6.ds1-13etch2_arm.deb stable/main/binary-arm/libc6_2.3.6.ds1-13etch2_arm.deb stable/main/binary-arm/locales-all_2.3.6.ds1-13etch2_arm.deb stable/main/binary-arm/libc6-dbg_2.3.6.ds1-13etch2_arm.deb stable/main/binary-arm/nscd_2.3.6.ds1-13etch2_arm.deb stable/main/binary-arm/libc6-pic_2.3.6.ds1-13etch2_arm.deb stable/main/binary-arm/libnss-dns-udeb_2.3.6.ds1-13etch2_arm.udeb stable/main/binary-arm/libnss-files-udeb_2.3.6.ds1-13etch2_arm.udeb stable/main/binary-arm/libc6-udeb_2.3.6.ds1-13etch2_arm.udeb stable/main/binary-arm/libc6-prof_2.3.6.ds1-13etch2_arm.deb glibc (2.3.6.ds1-13etch2) stable; urgency=low * patches/any/cvs-vfprintf-stack-smashing.diff: fix issue with 8bits locales and printf exploding the stack with large width specifiers. * patches/any/cvs-getnetgrent_r-memory-leak.diff: fix memory leak in getnetgrent_r. Closes: #423369. stable/main/binary-alpha/locales-all_2.3.6.ds1-13etch2_alpha.deb stable/main/binary-alpha/libc6.1-pic_2.3.6.ds1-13etch2_alpha.deb stable/main/binary-alpha/nscd_2.3.6.ds1-13etch2_alpha.deb stable/main/binary-alpha/libc6.1-prof_2.3.6.ds1-13etch2_alpha.deb stable/main/binary-alpha/libnss-files-udeb_2.3.6.ds1-13etch2_alpha.udeb stable/main/binary-alpha/libc6.1-dbg_2.3.6.ds1-13etch2_alpha.deb stable/main/binary-alpha/libc6.1-dev_2.3.6.ds1-13etch2_alpha.deb stable/main/binary-alpha/libnss-dns-udeb_2.3.6.ds1-13etch2_alpha.udeb stable/main/binary-alpha/libc6.1_2.3.6.ds1-13etch2_alpha.deb stable/main/binary-alpha/libc6.1-udeb_2.3.6.ds1-13etch2_alpha.udeb glibc (2.3.6.ds1-13etch2) stable; urgency=low * patches/any/cvs-vfprintf-stack-smashing.diff: fix issue with 8bits locales and printf exploding the stack with large width specifiers. * patches/any/cvs-getnetgrent_r-memory-leak.diff: fix memory leak in getnetgrent_r. Closes: #423369. stable/main/binary-amd64/libc6-dev-i386_2.3.6.ds1-13etch2_amd64.deb stable/main/binary-all/locales_2.3.6.ds1-13etch2_all.deb stable/main/binary-amd64/libc6-prof_2.3.6.ds1-13etch2_amd64.deb stable/main/binary-amd64/libc6-udeb_2.3.6.ds1-13etch2_amd64.udeb stable/main/binary-amd64/libc6-pic_2.3.6.ds1-13etch2_amd64.deb stable/main/source/glibc_2.3.6.ds1-13etch2.diff.gz stable/main/binary-amd64/libc6-dbg_2.3.6.ds1-13etch2_amd64.deb stable/main/binary-amd64/libnss-files-udeb_2.3.6.ds1-13etch2_amd64.udeb stable/main/binary-all/glibc-doc_2.3.6.ds1-13etch2_all.deb stable/main/binary-amd64/libc6_2.3.6.ds1-13etch2_amd64.deb stable/main/binary-amd64/libc6-dev_2.3.6.ds1-13etch2_amd64.deb stable/main/binary-amd64/nscd_2.3.6.ds1-13etch2_amd64.deb stable/main/binary-amd64/locales-all_2.3.6.ds1-13etch2_amd64.deb stable/main/binary-amd64/libnss-dns-udeb_2.3.6.ds1-13etch2_amd64.udeb stable/main/source/glibc_2.3.6.ds1-13etch2.dsc stable/main/binary-amd64/libc6-i386_2.3.6.ds1-13etch2_amd64.deb glibc (2.3.6.ds1-13etch2) stable; urgency=low * patches/any/cvs-vfprintf-stack-smashing.diff: fix issue with 8bits locales and printf exploding the stack with large width specifiers. * patches/any/cvs-getnetgrent_r-memory-leak.diff: fix memory leak in getnetgrent_r. Closes: #423369. stable/main/binary-sparc/gimp-helpbrowser_2.2.13-1etch1_sparc.deb stable/main/binary-sparc/libgimp2.0_2.2.13-1etch1_sparc.deb stable/main/binary-sparc/libgimp2.0-dev_2.2.13-1etch1_sparc.deb stable/main/binary-sparc/gimp-python_2.2.13-1etch1_sparc.deb stable/main/binary-sparc/gimp-svg_2.2.13-1etch1_sparc.deb stable/main/binary-sparc/gimp-dbg_2.2.13-1etch1_sparc.deb stable/main/binary-sparc/gimp_2.2.13-1etch1_sparc.deb gimp (2.2.13-1etch1) stable-security; urgency=high * Non-maintainer upload by the security team. * Apply upstream patch to fix stack overflow in sunras plugin. (CVE-2007-2356) stable/main/binary-s390/gimp-python_2.2.13-1etch1_s390.deb stable/main/binary-s390/gimp-helpbrowser_2.2.13-1etch1_s390.deb stable/main/binary-s390/libgimp2.0-dev_2.2.13-1etch1_s390.deb stable/main/binary-s390/libgimp2.0_2.2.13-1etch1_s390.deb stable/main/binary-s390/gimp-svg_2.2.13-1etch1_s390.deb stable/main/binary-s390/gimp_2.2.13-1etch1_s390.deb stable/main/binary-s390/gimp-dbg_2.2.13-1etch1_s390.deb gimp (2.2.13-1etch1) stable-security; urgency=high * Non-maintainer upload by the security team. * Apply upstream patch to fix stack overflow in sunras plugin. (CVE-2007-2356) stable/main/binary-powerpc/gimp-dbg_2.2.13-1etch1_powerpc.deb stable/main/binary-powerpc/gimp-helpbrowser_2.2.13-1etch1_powerpc.deb stable/main/binary-powerpc/libgimp2.0_2.2.13-1etch1_powerpc.deb stable/main/binary-powerpc/libgimp2.0-dev_2.2.13-1etch1_powerpc.deb stable/main/binary-powerpc/gimp-python_2.2.13-1etch1_powerpc.deb stable/main/binary-powerpc/gimp-svg_2.2.13-1etch1_powerpc.deb stable/main/binary-powerpc/gimp_2.2.13-1etch1_powerpc.deb gimp (2.2.13-1etch1) stable-security; urgency=high * Non-maintainer upload by the security team. * Apply upstream patch to fix stack overflow in sunras plugin. (CVE-2007-2356) stable/main/binary-mipsel/gimp-python_2.2.13-1etch1_mipsel.deb stable/main/binary-mipsel/gimp-svg_2.2.13-1etch1_mipsel.deb stable/main/binary-mipsel/libgimp2.0_2.2.13-1etch1_mipsel.deb stable/main/binary-mipsel/gimp_2.2.13-1etch1_mipsel.deb stable/main/binary-mipsel/gimp-helpbrowser_2.2.13-1etch1_mipsel.deb stable/main/binary-mipsel/gimp-dbg_2.2.13-1etch1_mipsel.deb stable/main/binary-mipsel/libgimp2.0-dev_2.2.13-1etch1_mipsel.deb gimp (2.2.13-1etch1) stable-security; urgency=high * Non-maintainer upload by the security team. * Apply upstream patch to fix stack overflow in sunras plugin. (CVE-2007-2356) stable/main/binary-mips/gimp-svg_2.2.13-1etch1_mips.deb stable/main/binary-mips/gimp-python_2.2.13-1etch1_mips.deb stable/main/binary-mips/gimp-dbg_2.2.13-1etch1_mips.deb stable/main/binary-mips/libgimp2.0-dev_2.2.13-1etch1_mips.deb stable/main/binary-mips/gimp-helpbrowser_2.2.13-1etch1_mips.deb stable/main/binary-mips/libgimp2.0_2.2.13-1etch1_mips.deb stable/main/binary-mips/gimp_2.2.13-1etch1_mips.deb gimp (2.2.13-1etch1) stable-security; urgency=high * Non-maintainer upload by the security team. * Apply upstream patch to fix stack overflow in sunras plugin. (CVE-2007-2356) stable/main/binary-ia64/gimp-python_2.2.13-1etch1_ia64.deb stable/main/binary-ia64/gimp-svg_2.2.13-1etch1_ia64.deb stable/main/binary-ia64/gimp-helpbrowser_2.2.13-1etch1_ia64.deb stable/main/binary-ia64/libgimp2.0_2.2.13-1etch1_ia64.deb stable/main/binary-ia64/gimp-dbg_2.2.13-1etch1_ia64.deb stable/main/binary-ia64/gimp_2.2.13-1etch1_ia64.deb stable/main/binary-ia64/libgimp2.0-dev_2.2.13-1etch1_ia64.deb gimp (2.2.13-1etch1) stable-security; urgency=high * Non-maintainer upload by the security team. * Apply upstream patch to fix stack overflow in sunras plugin. (CVE-2007-2356) stable/main/binary-hppa/gimp-svg_2.2.13-1etch1_hppa.deb stable/main/binary-hppa/gimp-dbg_2.2.13-1etch1_hppa.deb stable/main/binary-hppa/libgimp2.0-dev_2.2.13-1etch1_hppa.deb stable/main/binary-hppa/gimp_2.2.13-1etch1_hppa.deb stable/main/binary-hppa/gimp-python_2.2.13-1etch1_hppa.deb stable/main/binary-hppa/libgimp2.0_2.2.13-1etch1_hppa.deb stable/main/binary-hppa/gimp-helpbrowser_2.2.13-1etch1_hppa.deb gimp (2.2.13-1etch1) stable-security; urgency=high * Non-maintainer upload by the security team. * Apply upstream patch to fix stack overflow in sunras plugin. (CVE-2007-2356) stable/main/binary-arm/gimp-svg_2.2.13-1etch1_arm.deb stable/main/binary-arm/gimp-helpbrowser_2.2.13-1etch1_arm.deb stable/main/binary-arm/gimp-dbg_2.2.13-1etch1_arm.deb stable/main/binary-arm/gimp_2.2.13-1etch1_arm.deb stable/main/binary-arm/gimp-python_2.2.13-1etch1_arm.deb stable/main/binary-arm/libgimp2.0-dev_2.2.13-1etch1_arm.deb stable/main/binary-arm/libgimp2.0_2.2.13-1etch1_arm.deb gimp (2.2.13-1etch1) stable-security; urgency=high * Non-maintainer upload by the security team. * Apply upstream patch to fix stack overflow in sunras plugin. (CVE-2007-2356) stable/main/binary-amd64/gimp_2.2.13-1etch1_amd64.deb stable/main/binary-amd64/gimp-python_2.2.13-1etch1_amd64.deb stable/main/binary-amd64/libgimp2.0-dev_2.2.13-1etch1_amd64.deb stable/main/binary-amd64/gimp-helpbrowser_2.2.13-1etch1_amd64.deb stable/main/binary-amd64/gimp-svg_2.2.13-1etch1_amd64.deb stable/main/binary-amd64/libgimp2.0_2.2.13-1etch1_amd64.deb stable/main/binary-amd64/gimp-dbg_2.2.13-1etch1_amd64.deb gimp (2.2.13-1etch1) stable-security; urgency=high * Non-maintainer upload by the security team. * Apply upstream patch to fix stack overflow in sunras plugin. (CVE-2007-2356) stable/main/binary-alpha/gimp_2.2.13-1etch1_alpha.deb stable/main/binary-alpha/gimp-dbg_2.2.13-1etch1_alpha.deb stable/main/binary-alpha/gimp-python_2.2.13-1etch1_alpha.deb stable/main/binary-alpha/gimp-svg_2.2.13-1etch1_alpha.deb stable/main/binary-alpha/libgimp2.0_2.2.13-1etch1_alpha.deb stable/main/binary-alpha/gimp-helpbrowser_2.2.13-1etch1_alpha.deb stable/main/binary-alpha/libgimp2.0-dev_2.2.13-1etch1_alpha.deb gimp (2.2.13-1etch1) stable-security; urgency=high * Non-maintainer upload by the security team. * Apply upstream patch to fix stack overflow in sunras plugin. (CVE-2007-2356) stable/main/binary-all/libgimp2.0-doc_2.2.13-1etch1_all.deb stable/main/binary-i386/libgimp2.0_2.2.13-1etch1_i386.deb stable/main/binary-i386/gimp-python_2.2.13-1etch1_i386.deb stable/main/binary-all/gimp-data_2.2.13-1etch1_all.deb stable/main/binary-i386/libgimp2.0-dev_2.2.13-1etch1_i386.deb stable/main/binary-i386/gimp-helpbrowser_2.2.13-1etch1_i386.deb stable/main/binary-i386/gimp-dbg_2.2.13-1etch1_i386.deb stable/main/binary-i386/gimp_2.2.13-1etch1_i386.deb stable/main/source/gimp_2.2.13-1etch1.diff.gz stable/main/source/gimp_2.2.13-1etch1.dsc stable/main/binary-i386/gimp-svg_2.2.13-1etch1_i386.deb gimp (2.2.13-1etch1) stable-security; urgency=high * Non-maintainer upload by the security team. * Apply upstream patch to fix stack overflow in sunras plugin. (CVE-2007-2356) stable/main/source/gforge-plugin-scmcvs_4.5.14-5etch1.tar.gz stable/main/source/gforge-plugin-scmcvs_4.5.14-5etch1.dsc stable/main/binary-all/gforge-plugin-scmcvs_4.5.14-5etch1_all.deb gforge-plugin-scmcvs (4.5.14-5etch1) stable-security; urgency=high * [Roland] Fixed shell code injection vulnerability discovered by Bernhard R. Link in the CVS browsing interface. stable/main/binary-sparc/libfreetype6_2.2.1-5+etch1_sparc.deb stable/main/binary-sparc/libfreetype6-dev_2.2.1-5+etch1_sparc.deb stable/main/binary-sparc/freetype2-demos_2.2.1-5+etch1_sparc.deb stable/main/binary-sparc/libfreetype6-udeb_2.2.1-5+etch1_sparc.udeb freetype (2.2.1-5+etch1) stable-security; urgency=high * debian/patches-freetype/CVE-2007-2754_ttgfload: address CVE-2007-2754, a bug allowing execution of arbitrary code via a crafted TTF image by way of an integer overflow. Closes: #425625. stable/main/binary-s390/libfreetype6_2.2.1-5+etch1_s390.deb stable/main/binary-s390/libfreetype6-dev_2.2.1-5+etch1_s390.deb stable/main/binary-s390/freetype2-demos_2.2.1-5+etch1_s390.deb stable/main/binary-s390/libfreetype6-udeb_2.2.1-5+etch1_s390.udeb freetype (2.2.1-5+etch1) stable-security; urgency=high * debian/patches-freetype/CVE-2007-2754_ttgfload: address CVE-2007-2754, a bug allowing execution of arbitrary code via a crafted TTF image by way of an integer overflow. Closes: #425625. stable/main/binary-powerpc/freetype2-demos_2.2.1-5+etch1_powerpc.deb stable/main/binary-powerpc/libfreetype6_2.2.1-5+etch1_powerpc.deb stable/main/binary-powerpc/libfreetype6-udeb_2.2.1-5+etch1_powerpc.udeb stable/main/binary-powerpc/libfreetype6-dev_2.2.1-5+etch1_powerpc.deb freetype (2.2.1-5+etch1) stable-security; urgency=high * debian/patches-freetype/CVE-2007-2754_ttgfload: address CVE-2007-2754, a bug allowing execution of arbitrary code via a crafted TTF image by way of an integer overflow. Closes: #425625. stable/main/binary-mipsel/libfreetype6-dev_2.2.1-5+etch1_mipsel.deb stable/main/binary-mipsel/freetype2-demos_2.2.1-5+etch1_mipsel.deb stable/main/binary-mipsel/libfreetype6_2.2.1-5+etch1_mipsel.deb stable/main/binary-mipsel/libfreetype6-udeb_2.2.1-5+etch1_mipsel.udeb freetype (2.2.1-5+etch1) stable-security; urgency=high * debian/patches-freetype/CVE-2007-2754_ttgfload: address CVE-2007-2754, a bug allowing execution of arbitrary code via a crafted TTF image by way of an integer overflow. Closes: #425625. stable/main/binary-mips/freetype2-demos_2.2.1-5+etch1_mips.deb stable/main/binary-mips/libfreetype6_2.2.1-5+etch1_mips.deb stable/main/binary-mips/libfreetype6-dev_2.2.1-5+etch1_mips.deb stable/main/binary-mips/libfreetype6-udeb_2.2.1-5+etch1_mips.udeb freetype (2.2.1-5+etch1) stable-security; urgency=high * debian/patches-freetype/CVE-2007-2754_ttgfload: address CVE-2007-2754, a bug allowing execution of arbitrary code via a crafted TTF image by way of an integer overflow. Closes: #425625. stable/main/binary-ia64/libfreetype6-udeb_2.2.1-5+etch1_ia64.udeb stable/main/binary-ia64/freetype2-demos_2.2.1-5+etch1_ia64.deb stable/main/binary-ia64/libfreetype6-dev_2.2.1-5+etch1_ia64.deb stable/main/binary-ia64/libfreetype6_2.2.1-5+etch1_ia64.deb freetype (2.2.1-5+etch1) stable-security; urgency=high * debian/patches-freetype/CVE-2007-2754_ttgfload: address CVE-2007-2754, a bug allowing execution of arbitrary code via a crafted TTF image by way of an integer overflow. Closes: #425625. stable/main/binary-hppa/libfreetype6-dev_2.2.1-5+etch1_hppa.deb stable/main/binary-hppa/freetype2-demos_2.2.1-5+etch1_hppa.deb stable/main/binary-hppa/libfreetype6-udeb_2.2.1-5+etch1_hppa.udeb stable/main/binary-hppa/libfreetype6_2.2.1-5+etch1_hppa.deb freetype (2.2.1-5+etch1) stable-security; urgency=high * debian/patches-freetype/CVE-2007-2754_ttgfload: address CVE-2007-2754, a bug allowing execution of arbitrary code via a crafted TTF image by way of an integer overflow. Closes: #425625. stable/main/binary-arm/libfreetype6_2.2.1-5+etch1_arm.deb stable/main/binary-arm/libfreetype6-dev_2.2.1-5+etch1_arm.deb stable/main/binary-arm/freetype2-demos_2.2.1-5+etch1_arm.deb stable/main/binary-arm/libfreetype6-udeb_2.2.1-5+etch1_arm.udeb freetype (2.2.1-5+etch1) stable-security; urgency=high * debian/patches-freetype/CVE-2007-2754_ttgfload: address CVE-2007-2754, a bug allowing execution of arbitrary code via a crafted TTF image by way of an integer overflow. Closes: #425625. stable/main/binary-amd64/libfreetype6_2.2.1-5+etch1_amd64.deb stable/main/binary-amd64/freetype2-demos_2.2.1-5+etch1_amd64.deb stable/main/binary-amd64/libfreetype6-udeb_2.2.1-5+etch1_amd64.udeb stable/main/binary-amd64/libfreetype6-dev_2.2.1-5+etch1_amd64.deb freetype (2.2.1-5+etch1) stable-security; urgency=high * debian/patches-freetype/CVE-2007-2754_ttgfload: address CVE-2007-2754, a bug allowing execution of arbitrary code via a crafted TTF image by way of an integer overflow. Closes: #425625. stable/main/binary-alpha/libfreetype6_2.2.1-5+etch1_alpha.deb stable/main/binary-alpha/freetype2-demos_2.2.1-5+etch1_alpha.deb stable/main/binary-alpha/libfreetype6-dev_2.2.1-5+etch1_alpha.deb stable/main/binary-alpha/libfreetype6-udeb_2.2.1-5+etch1_alpha.udeb freetype (2.2.1-5+etch1) stable-security; urgency=high * debian/patches-freetype/CVE-2007-2754_ttgfload: address CVE-2007-2754, a bug allowing execution of arbitrary code via a crafted TTF image by way of an integer overflow. Closes: #425625. stable/main/binary-i386/libfreetype6_2.2.1-5+etch1_i386.deb stable/main/binary-i386/libfreetype6-dev_2.2.1-5+etch1_i386.deb stable/main/source/freetype_2.2.1-5+etch1.dsc stable/main/binary-i386/libfreetype6-udeb_2.2.1-5+etch1_i386.udeb stable/main/source/freetype_2.2.1-5+etch1.diff.gz stable/main/binary-i386/freetype2-demos_2.2.1-5+etch1_i386.deb freetype (2.2.1-5+etch1) stable-security; urgency=high * debian/patches-freetype/CVE-2007-2754_ttgfload: address CVE-2007-2754, a bug allowing execution of arbitrary code via a crafted TTF image by way of an integer overflow. Closes: #425625. stable/main/binary-sparc/libmagic1_4.17-5etch2_sparc.deb stable/main/binary-sparc/file_4.17-5etch2_sparc.deb stable/main/binary-sparc/python-magic_4.17-5etch2_sparc.deb stable/main/binary-sparc/libmagic-dev_4.17-5etch2_sparc.deb file (4.17-5etch2) stable; urgency=medium * Applied patch from Werner Fink from OpenSuse to fix OS2 REXX magic in magic/Magdir/msdos which can lead to a DoS CVE-2007-2026. stable/main/binary-s390/python-magic_4.17-5etch2_s390.deb stable/main/binary-s390/libmagic-dev_4.17-5etch2_s390.deb stable/main/binary-s390/file_4.17-5etch2_s390.deb stable/main/binary-s390/libmagic1_4.17-5etch2_s390.deb file (4.17-5etch2) stable; urgency=medium * Applied patch from Werner Fink from OpenSuse to fix OS2 REXX magic in magic/Magdir/msdos which can lead to a DoS CVE-2007-2026. stable/main/binary-powerpc/file_4.17-5etch2_powerpc.deb stable/main/binary-powerpc/libmagic-dev_4.17-5etch2_powerpc.deb stable/main/binary-powerpc/python-magic_4.17-5etch2_powerpc.deb stable/main/binary-powerpc/libmagic1_4.17-5etch2_powerpc.deb file (4.17-5etch2) stable; urgency=medium * Applied patch from Werner Fink from OpenSuse to fix OS2 REXX magic in magic/Magdir/msdos which can lead to a DoS CVE-2007-2026. stable/main/binary-mipsel/libmagic1_4.17-5etch2_mipsel.deb stable/main/binary-mipsel/libmagic-dev_4.17-5etch2_mipsel.deb stable/main/binary-mipsel/file_4.17-5etch2_mipsel.deb stable/main/binary-mipsel/python-magic_4.17-5etch2_mipsel.deb file (4.17-5etch2) stable; urgency=medium * Applied patch from Werner Fink from OpenSuse to fix OS2 REXX magic in magic/Magdir/msdos which can lead to a DoS CVE-2007-2026. stable/main/binary-mips/file_4.17-5etch2_mips.deb stable/main/binary-mips/libmagic-dev_4.17-5etch2_mips.deb stable/main/binary-mips/libmagic1_4.17-5etch2_mips.deb stable/main/binary-mips/python-magic_4.17-5etch2_mips.deb file (4.17-5etch2) stable; urgency=medium * Applied patch from Werner Fink from OpenSuse to fix OS2 REXX magic in magic/Magdir/msdos which can lead to a DoS CVE-2007-2026. stable/main/binary-ia64/file_4.17-5etch2_ia64.deb stable/main/binary-ia64/libmagic1_4.17-5etch2_ia64.deb stable/main/binary-ia64/libmagic-dev_4.17-5etch2_ia64.deb stable/main/binary-ia64/python-magic_4.17-5etch2_ia64.deb file (4.17-5etch2) stable; urgency=medium * Applied patch from Werner Fink from OpenSuse to fix OS2 REXX magic in magic/Magdir/msdos which can lead to a DoS CVE-2007-2026. stable/main/binary-hppa/file_4.17-5etch2_hppa.deb stable/main/binary-hppa/python-magic_4.17-5etch2_hppa.deb stable/main/binary-hppa/libmagic1_4.17-5etch2_hppa.deb stable/main/binary-hppa/libmagic-dev_4.17-5etch2_hppa.deb file (4.17-5etch2) stable; urgency=medium * Applied patch from Werner Fink from OpenSuse to fix OS2 REXX magic in magic/Magdir/msdos which can lead to a DoS CVE-2007-2026. stable/main/binary-arm/libmagic1_4.17-5etch2_arm.deb stable/main/binary-arm/python-magic_4.17-5etch2_arm.deb stable/main/binary-arm/libmagic-dev_4.17-5etch2_arm.deb stable/main/binary-arm/file_4.17-5etch2_arm.deb file (4.17-5etch2) stable; urgency=medium * Applied patch from Werner Fink from OpenSuse to fix OS2 REXX magic in magic/Magdir/msdos which can lead to a DoS CVE-2007-2026. stable/main/binary-amd64/file_4.17-5etch2_amd64.deb stable/main/binary-amd64/python-magic_4.17-5etch2_amd64.deb stable/main/binary-amd64/libmagic-dev_4.17-5etch2_amd64.deb stable/main/binary-amd64/libmagic1_4.17-5etch2_amd64.deb file (4.17-5etch2) stable; urgency=medium * Applied patch from Werner Fink from OpenSuse to fix OS2 REXX magic in magic/Magdir/msdos which can lead to a DoS CVE-2007-2026. stable/main/binary-alpha/python-magic_4.17-5etch2_alpha.deb stable/main/binary-alpha/file_4.17-5etch2_alpha.deb stable/main/binary-alpha/libmagic-dev_4.17-5etch2_alpha.deb stable/main/binary-alpha/libmagic1_4.17-5etch2_alpha.deb file (4.17-5etch2) stable; urgency=medium * Applied patch from Werner Fink from OpenSuse to fix OS2 REXX magic in magic/Magdir/msdos which can lead to a DoS CVE-2007-2026. stable/main/binary-i386/libmagic1_4.17-5etch2_i386.deb stable/main/binary-i386/python-magic_4.17-5etch2_i386.deb stable/main/binary-i386/file_4.17-5etch2_i386.deb stable/main/binary-i386/libmagic-dev_4.17-5etch2_i386.deb stable/main/source/file_4.17-5etch2.dsc stable/main/source/file_4.17-5etch2.diff.gz file (4.17-5etch2) stable; urgency=medium * Applied patch from Werner Fink from OpenSuse to fix OS2 REXX magic in magic/Magdir/msdos which can lead to a DoS CVE-2007-2026. stable/main/binary-powerpc/fai-kernels_1.17+etch3_powerpc.deb fai-kernels (1.17+etch3) stable; urgency=low * build arcmsr scsi-driver as module on all three archs (Closes: #417752) * updated maintainer address stable/main/binary-amd64/fai-kernels_1.17+etch3_amd64.deb fai-kernels (1.17+etch3) stable; urgency=low * build arcmsr scsi-driver as module on all three archs (Closes: #417752) * updated maintainer address stable/main/binary-i386/fai-kernels_1.17+etch3_i386.deb stable/main/source/fai-kernels_1.17+etch3.dsc stable/main/source/fai-kernels_1.17+etch3.tar.gz fai-kernels (1.17+etch3) stable; urgency=low * build arcmsr scsi-driver as module on all three archs (Closes: #417752) * updated maintainer address stable/main/binary-sparc/epiphany-browser_2.14.3-7_sparc.deb epiphany-browser (2.14.3-7) stable; urgency=low * epiphany-browser.gconf-defaults: set the default language to "system" to enable content negociation by default for the user's locale. stable/main/binary-s390/epiphany-browser_2.14.3-7_s390.deb epiphany-browser (2.14.3-7) stable; urgency=low * epiphany-browser.gconf-defaults: set the default language to "system" to enable content negociation by default for the user's locale. stable/main/binary-powerpc/epiphany-browser_2.14.3-7_powerpc.deb epiphany-browser (2.14.3-7) stable; urgency=low * epiphany-browser.gconf-defaults: set the default language to "system" to enable content negociation by default for the user's locale. stable/main/binary-mipsel/epiphany-browser_2.14.3-7_mipsel.deb epiphany-browser (2.14.3-7) stable; urgency=low * epiphany-browser.gconf-defaults: set the default language to "system" to enable content negociation by default for the user's locale. stable/main/binary-mips/epiphany-browser_2.14.3-7_mips.deb epiphany-browser (2.14.3-7) stable; urgency=low * epiphany-browser.gconf-defaults: set the default language to "system" to enable content negociation by default for the user's locale. stable/main/binary-ia64/epiphany-browser_2.14.3-7_ia64.deb epiphany-browser (2.14.3-7) stable; urgency=low * epiphany-browser.gconf-defaults: set the default language to "system" to enable content negociation by default for the user's locale. stable/main/binary-hppa/epiphany-browser_2.14.3-7_hppa.deb epiphany-browser (2.14.3-7) stable; urgency=low * epiphany-browser.gconf-defaults: set the default language to "system" to enable content negociation by default for the user's locale. stable/main/binary-arm/epiphany-browser_2.14.3-7_arm.deb epiphany-browser (2.14.3-7) stable; urgency=low * epiphany-browser.gconf-defaults: set the default language to "system" to enable content negociation by default for the user's locale. stable/main/binary-amd64/epiphany-browser_2.14.3-7_amd64.deb epiphany-browser (2.14.3-7) stable; urgency=low * epiphany-browser.gconf-defaults: set the default language to "system" to enable content negociation by default for the user's locale. stable/main/binary-alpha/epiphany-browser_2.14.3-7_alpha.deb epiphany-browser (2.14.3-7) stable; urgency=low * epiphany-browser.gconf-defaults: set the default language to "system" to enable content negociation by default for the user's locale. stable/main/binary-i386/epiphany-browser_2.14.3-7_i386.deb stable/main/source/epiphany-browser_2.14.3-7.dsc stable/main/binary-all/epiphany-browser-dev_2.14.3-7_all.deb stable/main/source/epiphany-browser_2.14.3-7.diff.gz epiphany-browser (2.14.3-7) stable; urgency=low * epiphany-browser.gconf-defaults: set the default language to "system" to enable content negociation by default for the user's locale. stable/main/binary-sparc/emacs21_21.4a+1-3etch1_sparc.deb stable/main/binary-sparc/emacs21-bin-common_21.4a+1-3etch1_sparc.deb stable/main/binary-sparc/emacs21-nox_21.4a+1-3etch1_sparc.deb emacs21 (21.4a+1-3etch1) stable-security; urgency=high * Non-maintainer upload by The Security Team. * Fix a crash when determining the size of some GIF images. [CVE-2007-2833]. stable/main/binary-s390/emacs21_21.4a+1-3etch1_s390.deb stable/main/binary-s390/emacs21-nox_21.4a+1-3etch1_s390.deb stable/main/binary-s390/emacs21-bin-common_21.4a+1-3etch1_s390.deb emacs21 (21.4a+1-3etch1) stable-security; urgency=high * Non-maintainer upload by The Security Team. * Fix a crash when determining the size of some GIF images. [CVE-2007-2833]. stable/main/binary-powerpc/emacs21_21.4a+1-3etch1_powerpc.deb stable/main/binary-powerpc/emacs21-nox_21.4a+1-3etch1_powerpc.deb stable/main/binary-powerpc/emacs21-bin-common_21.4a+1-3etch1_powerpc.deb emacs21 (21.4a+1-3etch1) stable-security; urgency=high * Non-maintainer upload by The Security Team. * Fix a crash when determining the size of some GIF images. [CVE-2007-2833]. stable/main/binary-mipsel/emacs21_21.4a+1-3etch1_mipsel.deb stable/main/binary-mipsel/emacs21-bin-common_21.4a+1-3etch1_mipsel.deb stable/main/binary-mipsel/emacs21-nox_21.4a+1-3etch1_mipsel.deb emacs21 (21.4a+1-3etch1) stable-security; urgency=high * Non-maintainer upload by The Security Team. * Fix a crash when determining the size of some GIF images. [CVE-2007-2833]. stable/main/binary-mips/emacs21_21.4a+1-3etch1_mips.deb stable/main/binary-mips/emacs21-nox_21.4a+1-3etch1_mips.deb stable/main/binary-mips/emacs21-bin-common_21.4a+1-3etch1_mips.deb emacs21 (21.4a+1-3etch1) stable-security; urgency=high * Non-maintainer upload by The Security Team. * Fix a crash when determining the size of some GIF images. [CVE-2007-2833]. stable/main/binary-ia64/emacs21-bin-common_21.4a+1-3etch1_ia64.deb stable/main/binary-ia64/emacs21_21.4a+1-3etch1_ia64.deb stable/main/binary-ia64/emacs21-nox_21.4a+1-3etch1_ia64.deb emacs21 (21.4a+1-3etch1) stable-security; urgency=high * Non-maintainer upload by The Security Team. * Fix a crash when determining the size of some GIF images. [CVE-2007-2833]. stable/main/binary-i386/emacs21-bin-common_21.4a+1-3etch1_i386.deb stable/main/binary-i386/emacs21_21.4a+1-3etch1_i386.deb stable/main/binary-i386/emacs21-nox_21.4a+1-3etch1_i386.deb emacs21 (21.4a+1-3etch1) stable-security; urgency=high * Non-maintainer upload by The Security Team. * Fix a crash when determining the size of some GIF images. [CVE-2007-2833]. stable/main/binary-hppa/emacs21_21.4a+1-3etch1_hppa.deb stable/main/binary-hppa/emacs21-nox_21.4a+1-3etch1_hppa.deb stable/main/binary-hppa/emacs21-bin-common_21.4a+1-3etch1_hppa.deb emacs21 (21.4a+1-3etch1) stable-security; urgency=high * Non-maintainer upload by The Security Team. * Fix a crash when determining the size of some GIF images. [CVE-2007-2833]. stable/main/binary-arm/emacs21_21.4a+1-3etch1_arm.deb stable/main/binary-arm/emacs21-nox_21.4a+1-3etch1_arm.deb stable/main/binary-arm/emacs21-bin-common_21.4a+1-3etch1_arm.deb emacs21 (21.4a+1-3etch1) stable-security; urgency=high * Non-maintainer upload by The Security Team. * Fix a crash when determining the size of some GIF images. [CVE-2007-2833]. stable/main/binary-alpha/emacs21_21.4a+1-3etch1_alpha.deb stable/main/binary-alpha/emacs21-nox_21.4a+1-3etch1_alpha.deb stable/main/binary-alpha/emacs21-bin-common_21.4a+1-3etch1_alpha.deb emacs21 (21.4a+1-3etch1) stable-security; urgency=high * Non-maintainer upload by The Security Team. * Fix a crash when determining the size of some GIF images. [CVE-2007-2833]. stable/main/binary-all/emacs21-el_21.4a+1-3etch1_all.deb stable/main/binary-amd64/emacs21_21.4a+1-3etch1_amd64.deb stable/main/binary-all/emacs21-common_21.4a+1-3etch1_all.deb stable/main/source/emacs21_21.4a+1-3etch1.dsc stable/main/binary-amd64/emacs21-nox_21.4a+1-3etch1_amd64.deb stable/main/source/emacs21_21.4a+1-3etch1.diff.gz stable/main/binary-all/emacs_21.4a+1-3etch1_all.deb stable/main/binary-amd64/emacs21-bin-common_21.4a+1-3etch1_amd64.deb emacs21 (21.4a+1-3etch1) stable-security; urgency=high * Non-maintainer upload by The Security Team. * Fix a crash when determining the size of some GIF images. [CVE-2007-2833]. stable/main/binary-sparc/libgadu-dev_1.7~rc2-1etch1_sparc.deb stable/main/binary-sparc/libgadu3_1.7~rc2-1etch1_sparc.deb stable/main/binary-sparc/ekg_1.7~rc2-1etch1_sparc.deb ekg (1:1.7~rc2-1etch1) stable-security; urgency=high * Security upload for etch (same as 1:1.7~rc2-2, which didn't make it into etch before the release) * Patched three medium severity security issues in src/events.c: - CVE-2007-1663 A memory leak in handling image messages, which may cause memory exhaustion resulting in a DoS (ekg program crash). Exploitable by a hostile GG user. - CVE-2007-1664 off-by-one in token OCR function, which may cause a null pointer dereference resulting in a DoS (ekg program crash). Exploitable by MiTM (hostile HTTP proxy or TCP stream injection) or a hostile GG server. - CVE-2007-1665 potential memory exhaust in token OCR function, which may cause memory exhaustion resulting in a DoS (ekg program crash). Exploitable by MiTM (hostile HTTP proxy or TCP stream injection) or a hostile GG server. stable/main/binary-s390/ekg_1.7~rc2-1etch1_s390.deb stable/main/binary-s390/libgadu-dev_1.7~rc2-1etch1_s390.deb stable/main/binary-s390/libgadu3_1.7~rc2-1etch1_s390.deb ekg (1:1.7~rc2-1etch1) stable-security; urgency=high * Security upload for etch (same as 1:1.7~rc2-2, which didn't make it into etch before the release) * Patched three medium severity security issues in src/events.c: - CVE-2007-1663 A memory leak in handling image messages, which may cause memory exhaustion resulting in a DoS (ekg program crash). Exploitable by a hostile GG user. - CVE-2007-1664 off-by-one in token OCR function, which may cause a null pointer dereference resulting in a DoS (ekg program crash). Exploitable by MiTM (hostile HTTP proxy or TCP stream injection) or a hostile GG server. - CVE-2007-1665 potential memory exhaust in token OCR function, which may cause memory exhaustion resulting in a DoS (ekg program crash). Exploitable by MiTM (hostile HTTP proxy or TCP stream injection) or a hostile GG server. stable/main/binary-powerpc/libgadu-dev_1.7~rc2-1etch1_powerpc.deb stable/main/binary-powerpc/libgadu3_1.7~rc2-1etch1_powerpc.deb stable/main/binary-powerpc/ekg_1.7~rc2-1etch1_powerpc.deb ekg (1:1.7~rc2-1etch1) stable-security; urgency=high * Security upload for etch (same as 1:1.7~rc2-2, which didn't make it into etch before the release) * Patched three medium severity security issues in src/events.c: - CVE-2007-1663 A memory leak in handling image messages, which may cause memory exhaustion resulting in a DoS (ekg program crash). Exploitable by a hostile GG user. - CVE-2007-1664 off-by-one in token OCR function, which may cause a null pointer dereference resulting in a DoS (ekg program crash). Exploitable by MiTM (hostile HTTP proxy or TCP stream injection) or a hostile GG server. - CVE-2007-1665 potential memory exhaust in token OCR function, which may cause memory exhaustion resulting in a DoS (ekg program crash). Exploitable by MiTM (hostile HTTP proxy or TCP stream injection) or a hostile GG server. stable/main/binary-mipsel/ekg_1.7~rc2-1etch1_mipsel.deb stable/main/binary-mipsel/libgadu-dev_1.7~rc2-1etch1_mipsel.deb stable/main/binary-mipsel/libgadu3_1.7~rc2-1etch1_mipsel.deb ekg (1:1.7~rc2-1etch1) stable-security; urgency=high * Security upload for etch (same as 1:1.7~rc2-2, which didn't make it into etch before the release) * Patched three medium severity security issues in src/events.c: - CVE-2007-1663 A memory leak in handling image messages, which may cause memory exhaustion resulting in a DoS (ekg program crash). Exploitable by a hostile GG user. - CVE-2007-1664 off-by-one in token OCR function, which may cause a null pointer dereference resulting in a DoS (ekg program crash). Exploitable by MiTM (hostile HTTP proxy or TCP stream injection) or a hostile GG server. - CVE-2007-1665 potential memory exhaust in token OCR function, which may cause memory exhaustion resulting in a DoS (ekg program crash). Exploitable by MiTM (hostile HTTP proxy or TCP stream injection) or a hostile GG server. stable/main/binary-mips/ekg_1.7~rc2-1etch1_mips.deb stable/main/binary-mips/libgadu-dev_1.7~rc2-1etch1_mips.deb stable/main/binary-mips/libgadu3_1.7~rc2-1etch1_mips.deb ekg (1:1.7~rc2-1etch1) stable-security; urgency=high * Security upload for etch (same as 1:1.7~rc2-2, which didn't make it into etch before the release) * Patched three medium severity security issues in src/events.c: - CVE-2007-1663 A memory leak in handling image messages, which may cause memory exhaustion resulting in a DoS (ekg program crash). Exploitable by a hostile GG user. - CVE-2007-1664 off-by-one in token OCR function, which may cause a null pointer dereference resulting in a DoS (ekg program crash). Exploitable by MiTM (hostile HTTP proxy or TCP stream injection) or a hostile GG server. - CVE-2007-1665 potential memory exhaust in token OCR function, which may cause memory exhaustion resulting in a DoS (ekg program crash). Exploitable by MiTM (hostile HTTP proxy or TCP stream injection) or a hostile GG server. stable/main/binary-ia64/libgadu-dev_1.7~rc2-1etch1_ia64.deb stable/main/binary-ia64/ekg_1.7~rc2-1etch1_ia64.deb stable/main/binary-ia64/libgadu3_1.7~rc2-1etch1_ia64.deb ekg (1:1.7~rc2-1etch1) stable-security; urgency=high * Security upload for etch (same as 1:1.7~rc2-2, which didn't make it into etch before the release) * Patched three medium severity security issues in src/events.c: - CVE-2007-1663 A memory leak in handling image messages, which may cause memory exhaustion resulting in a DoS (ekg program crash). Exploitable by a hostile GG user. - CVE-2007-1664 off-by-one in token OCR function, which may cause a null pointer dereference resulting in a DoS (ekg program crash). Exploitable by MiTM (hostile HTTP proxy or TCP stream injection) or a hostile GG server. - CVE-2007-1665 potential memory exhaust in token OCR function, which may cause memory exhaustion resulting in a DoS (ekg program crash). Exploitable by MiTM (hostile HTTP proxy or TCP stream injection) or a hostile GG server. stable/main/binary-hppa/ekg_1.7~rc2-1etch1_hppa.deb stable/main/binary-hppa/libgadu3_1.7~rc2-1etch1_hppa.deb stable/main/binary-hppa/libgadu-dev_1.7~rc2-1etch1_hppa.deb ekg (1:1.7~rc2-1etch1) stable-security; urgency=high * Security upload for etch (same as 1:1.7~rc2-2, which didn't make it into etch before the release) * Patched three medium severity security issues in src/events.c: - CVE-2007-1663 A memory leak in handling image messages, which may cause memory exhaustion resulting in a DoS (ekg program crash). Exploitable by a hostile GG user. - CVE-2007-1664 off-by-one in token OCR function, which may cause a null pointer dereference resulting in a DoS (ekg program crash). Exploitable by MiTM (hostile HTTP proxy or TCP stream injection) or a hostile GG server. - CVE-2007-1665 potential memory exhaust in token OCR function, which may cause memory exhaustion resulting in a DoS (ekg program crash). Exploitable by MiTM (hostile HTTP proxy or TCP stream injection) or a hostile GG server. stable/main/binary-arm/ekg_1.7~rc2-1etch1_arm.deb stable/main/binary-arm/libgadu3_1.7~rc2-1etch1_arm.deb stable/main/binary-arm/libgadu-dev_1.7~rc2-1etch1_arm.deb ekg (1:1.7~rc2-1etch1) stable-security; urgency=high * Security upload for etch (same as 1:1.7~rc2-2, which didn't make it into etch before the release) * Patched three medium severity security issues in src/events.c: - CVE-2007-1663 A memory leak in handling image messages, which may cause memory exhaustion resulting in a DoS (ekg program crash). Exploitable by a hostile GG user. - CVE-2007-1664 off-by-one in token OCR function, which may cause a null pointer dereference resulting in a DoS (ekg program crash). Exploitable by MiTM (hostile HTTP proxy or TCP stream injection) or a hostile GG server. - CVE-2007-1665 potential memory exhaust in token OCR function, which may cause memory exhaustion resulting in a DoS (ekg program crash). Exploitable by MiTM (hostile HTTP proxy or TCP stream injection) or a hostile GG server. stable/main/binary-amd64/libgadu3_1.7~rc2-1etch1_amd64.deb stable/main/binary-amd64/libgadu-dev_1.7~rc2-1etch1_amd64.deb stable/main/binary-amd64/ekg_1.7~rc2-1etch1_amd64.deb ekg (1:1.7~rc2-1etch1) stable-security; urgency=high * Security upload for etch (same as 1:1.7~rc2-2, which didn't make it into etch before the release) * Patched three medium severity security issues in src/events.c: - CVE-2007-1663 A memory leak in handling image messages, which may cause memory exhaustion resulting in a DoS (ekg program crash). Exploitable by a hostile GG user. - CVE-2007-1664 off-by-one in token OCR function, which may cause a null pointer dereference resulting in a DoS (ekg program crash). Exploitable by MiTM (hostile HTTP proxy or TCP stream injection) or a hostile GG server. - CVE-2007-1665 potential memory exhaust in token OCR function, which may cause memory exhaustion resulting in a DoS (ekg program crash). Exploitable by MiTM (hostile HTTP proxy or TCP stream injection) or a hostile GG server. stable/main/binary-alpha/libgadu3_1.7~rc2-1etch1_alpha.deb stable/main/binary-alpha/ekg_1.7~rc2-1etch1_alpha.deb stable/main/binary-alpha/libgadu-dev_1.7~rc2-1etch1_alpha.deb ekg (1:1.7~rc2-1etch1) stable-security; urgency=high * Security upload for etch (same as 1:1.7~rc2-2, which didn't make it into etch before the release) * Patched three medium severity security issues in src/events.c: - CVE-2007-1663 A memory leak in handling image messages, which may cause memory exhaustion resulting in a DoS (ekg program crash). Exploitable by a hostile GG user. - CVE-2007-1664 off-by-one in token OCR function, which may cause a null pointer dereference resulting in a DoS (ekg program crash). Exploitable by MiTM (hostile HTTP proxy or TCP stream injection) or a hostile GG server. - CVE-2007-1665 potential memory exhaust in token OCR function, which may cause memory exhaustion resulting in a DoS (ekg program crash). Exploitable by MiTM (hostile HTTP proxy or TCP stream injection) or a hostile GG server. stable/main/source/ekg_1.7~rc2-1etch1.diff.gz stable/main/binary-i386/libgadu3_1.7~rc2-1etch1_i386.deb stable/main/source/ekg_1.7~rc2-1etch1.dsc stable/main/binary-i386/libgadu-dev_1.7~rc2-1etch1_i386.deb stable/main/binary-i386/ekg_1.7~rc2-1etch1_i386.deb ekg (1:1.7~rc2-1etch1) stable-security; urgency=high * Security upload for etch (same as 1:1.7~rc2-2, which didn't make it into etch before the release) * Patched three medium severity security issues in src/events.c: - CVE-2007-1663 A memory leak in handling image messages, which may cause memory exhaustion resulting in a DoS (ekg program crash). Exploitable by a hostile GG user. - CVE-2007-1664 off-by-one in token OCR function, which may cause a null pointer dereference resulting in a DoS (ekg program crash). Exploitable by MiTM (hostile HTTP proxy or TCP stream injection) or a hostile GG server. - CVE-2007-1665 potential memory exhaust in token OCR function, which may cause memory exhaustion resulting in a DoS (ekg program crash). Exploitable by MiTM (hostile HTTP proxy or TCP stream injection) or a hostile GG server. stable/main/binary-i386/libgadu3_1.7~rc2-1etch1+b1_i386.deb stable/main/binary-i386/libgadu-dev_1.7~rc2-1etch1+b1_i386.deb stable/main/binary-i386/ekg_1.7~rc2-1etch1+b1_i386.deb ekg (1:1.7~rc2-1etch1+b1) stable; urgency=low * Binary-only non-maintainer upload for i386; no source changes. * Rebuild against pristine stable environment stable/main/binary-alpha/dwm-tools_2-3_alpha.deb dwm-tools (2-3) testing; urgency=high * Applied 98-slock-bo.patch from slock 0.4 to fix potential buffer overflow. stable/main/binary-arm/dwm_2.1-2_arm.deb dwm (2.1-2) testing; urgency=medium * Applied 99-utf.patch from dwm 2.6 to fix utf support (Closes: #402671). stable/main/binary-amd64/dwm_2.1-2_amd64.deb dwm (2.1-2) testing; urgency=medium * Applied 99-utf.patch from dwm 2.6 to fix utf support (Closes: #402671). stable/main/binary-powerpc/dfsbuild_0.99.3_powerpc.deb dfsbuild (0.99.3) testing-proposed-updates; urgency=high * Scan both /usr/lib/grub and /lib/grub for grub bootloader files. Patch from Lars Kruse. Closes: #404563, #390801. * Guess name of Release file. Patch from Lars Kruse. Closes: #404555, #399861. stable/main/binary-alpha/dfsbuild_0.99.3_alpha.deb dfsbuild (0.99.3) testing-proposed-updates; urgency=high * Scan both /usr/lib/grub and /lib/grub for grub bootloader files. Patch from Lars Kruse. Closes: #404563, #390801. * Guess name of Release file. Patch from Lars Kruse. Closes: #404555, #399861. stable/main/source/desktop-base_4.0.1etch2.dsc stable/main/binary-all/desktop-base_4.0.1etch2_all.deb stable/main/source/desktop-base_4.0.1etch2.tar.gz desktop-base (4.0.1etch2) stable; urgency=low * Fix kde default wallpaper appearance between kdm to ksplash switch. stable/main/binary-mips/democracyplayer_0.9.1-1.1_mips.deb democracyplayer (0.9.1-1.1) testing-proposed-updates; urgency=low * Non-maintainer upload. * Fix incorrect plural form for Romanian (Closes: #401569) * Correct typos and also update both, the Brazilian Portuguese and the Spanish translations (Closes: #402262). Patches were took from 0.9.2.1-2.1. Also modifed a little the Spanish one to remove a couple of warnings during package build * ugly fix to install all available translations in the package, not only ones that have .mo files already compiled in the upstream source (Closes: #402262, #401569) - this works around the broken upstream build system that is present in the upstream source * add gettext as a build dependency to allow the former stable/main/binary-hppa/democracyplayer_0.9.1-1.1_hppa.deb democracyplayer (0.9.1-1.1) testing-proposed-updates; urgency=low * Non-maintainer upload. * Fix incorrect plural form for Romanian (Closes: #401569) * Correct typos and also update both, the Brazilian Portuguese and the Spanish translations (Closes: #402262). Patches were took from 0.9.2.1-2.1. Also modifed a little the Spanish one to remove a couple of warnings during package build * ugly fix to install all available translations in the package, not only ones that have .mo files already compiled in the upstream source (Closes: #402262, #401569) - this works around the broken upstream build system that is present in the upstream source * add gettext as a build dependency to allow the former stable/main/binary-sparc/debootstrap-udeb_0.3.3.2etch1_sparc.udeb debootstrap (0.3.3.2etch1) stable; urgency=low [ Joey Hess ] * Add support for lenny. [ Frans Pop ] * NMU * Upload to stable to make creating lenny chroots from etch possible and to support installing lenny using the etch installer. stable/main/binary-powerpc/debootstrap-udeb_0.3.3.2etch1_powerpc.udeb debootstrap (0.3.3.2etch1) stable; urgency=low [ Joey Hess ] * Add support for lenny. [ Frans Pop ] * NMU * Upload to stable to make creating lenny chroots from etch possible and to support installing lenny using the etch installer. stable/main/binary-mipsel/debootstrap-udeb_0.3.3.2etch1_mipsel.udeb debootstrap (0.3.3.2etch1) stable; urgency=low [ Joey Hess ] * Add support for lenny. [ Frans Pop ] * NMU * Upload to stable to make creating lenny chroots from etch possible and to support installing lenny using the etch installer. stable/main/binary-mips/debootstrap-udeb_0.3.3.2etch1_mips.udeb debootstrap (0.3.3.2etch1) stable; urgency=low [ Joey Hess ] * Add support for lenny. [ Frans Pop ] * NMU * Upload to stable to make creating lenny chroots from etch possible and to support installing lenny using the etch installer. stable/main/binary-ia64/debootstrap-udeb_0.3.3.2etch1_ia64.udeb debootstrap (0.3.3.2etch1) stable; urgency=low [ Joey Hess ] * Add support for lenny. [ Frans Pop ] * NMU * Upload to stable to make creating lenny chroots from etch possible and to support installing lenny using the etch installer. stable/main/binary-i386/debootstrap-udeb_0.3.3.2etch1_i386.udeb debootstrap (0.3.3.2etch1) stable; urgency=low [ Joey Hess ] * Add support for lenny. [ Frans Pop ] * NMU * Upload to stable to make creating lenny chroots from etch possible and to support installing lenny using the etch installer. stable/main/binary-hppa/debootstrap-udeb_0.3.3.2etch1_hppa.udeb debootstrap (0.3.3.2etch1) stable; urgency=low [ Joey Hess ] * Add support for lenny. [ Frans Pop ] * NMU * Upload to stable to make creating lenny chroots from etch possible and to support installing lenny using the etch installer. stable/main/binary-arm/debootstrap-udeb_0.3.3.2etch1_arm.udeb debootstrap (0.3.3.2etch1) stable; urgency=low [ Joey Hess ] * Add support for lenny. [ Frans Pop ] * NMU * Upload to stable to make creating lenny chroots from etch possible and to support installing lenny using the etch installer. stable/main/binary-amd64/debootstrap-udeb_0.3.3.2etch1_amd64.udeb debootstrap (0.3.3.2etch1) stable; urgency=low [ Joey Hess ] * Add support for lenny. [ Frans Pop ] * NMU * Upload to stable to make creating lenny chroots from etch possible and to support installing lenny using the etch installer. stable/main/binary-alpha/debootstrap-udeb_0.3.3.2etch1_alpha.udeb debootstrap (0.3.3.2etch1) stable; urgency=low [ Joey Hess ] * Add support for lenny. [ Frans Pop ] * NMU * Upload to stable to make creating lenny chroots from etch possible and to support installing lenny using the etch installer. stable/main/source/debootstrap_0.3.3.2etch1.tar.gz stable/main/source/debootstrap_0.3.3.2etch1.dsc stable/main/binary-all/debootstrap_0.3.3.2etch1_all.deb stable/main/binary-s390/debootstrap-udeb_0.3.3.2etch1_s390.udeb debootstrap (0.3.3.2etch1) stable; urgency=low [ Joey Hess ] * Add support for lenny. [ Frans Pop ] * NMU * Upload to stable to make creating lenny chroots from etch possible and to support installing lenny using the etch installer. stable/main/binary-sparc/di-utils_1.45etch1_sparc.udeb stable/main/binary-sparc/di-utils-mapdevfs_1.45etch1_sparc.udeb debian-installer-utils (1.45etch1) stable; urgency=low * list-devices: add maybe-usb-floppy parameter to allow to also scan for USB-devices (sticks, CD drives) that are misdetected as floppy. stable/main/binary-s390/di-utils-mapdevfs_1.45etch1_s390.udeb stable/main/binary-s390/di-utils_1.45etch1_s390.udeb debian-installer-utils (1.45etch1) stable; urgency=low * list-devices: add maybe-usb-floppy parameter to allow to also scan for USB-devices (sticks, CD drives) that are misdetected as floppy. stable/main/binary-powerpc/di-utils_1.45etch1_powerpc.udeb stable/main/binary-powerpc/di-utils-mapdevfs_1.45etch1_powerpc.udeb debian-installer-utils (1.45etch1) stable; urgency=low * list-devices: add maybe-usb-floppy parameter to allow to also scan for USB-devices (sticks, CD drives) that are misdetected as floppy. stable/main/binary-mipsel/di-utils_1.45etch1_mipsel.udeb stable/main/binary-mipsel/di-utils-mapdevfs_1.45etch1_mipsel.udeb debian-installer-utils (1.45etch1) stable; urgency=low * list-devices: add maybe-usb-floppy parameter to allow to also scan for USB-devices (sticks, CD drives) that are misdetected as floppy. stable/main/binary-mips/di-utils_1.45etch1_mips.udeb stable/main/binary-mips/di-utils-mapdevfs_1.45etch1_mips.udeb debian-installer-utils (1.45etch1) stable; urgency=low * list-devices: add maybe-usb-floppy parameter to allow to also scan for USB-devices (sticks, CD drives) that are misdetected as floppy. stable/main/binary-ia64/di-utils-mapdevfs_1.45etch1_ia64.udeb stable/main/binary-ia64/di-utils_1.45etch1_ia64.udeb debian-installer-utils (1.45etch1) stable; urgency=low * list-devices: add maybe-usb-floppy parameter to allow to also scan for USB-devices (sticks, CD drives) that are misdetected as floppy. stable/main/binary-hppa/di-utils_1.45etch1_hppa.udeb stable/main/binary-hppa/di-utils-mapdevfs_1.45etch1_hppa.udeb debian-installer-utils (1.45etch1) stable; urgency=low * list-devices: add maybe-usb-floppy parameter to allow to also scan for USB-devices (sticks, CD drives) that are misdetected as floppy. stable/main/binary-arm/di-utils-mapdevfs_1.45etch1_arm.udeb stable/main/binary-arm/di-utils_1.45etch1_arm.udeb debian-installer-utils (1.45etch1) stable; urgency=low * list-devices: add maybe-usb-floppy parameter to allow to also scan for USB-devices (sticks, CD drives) that are misdetected as floppy. stable/main/binary-amd64/di-utils-mapdevfs_1.45etch1_amd64.udeb stable/main/binary-amd64/di-utils_1.45etch1_amd64.udeb debian-installer-utils (1.45etch1) stable; urgency=low * list-devices: add maybe-usb-floppy parameter to allow to also scan for USB-devices (sticks, CD drives) that are misdetected as floppy. stable/main/binary-alpha/di-utils-mapdevfs_1.45etch1_alpha.udeb stable/main/binary-alpha/di-utils_1.45etch1_alpha.udeb debian-installer-utils (1.45etch1) stable; urgency=low * list-devices: add maybe-usb-floppy parameter to allow to also scan for USB-devices (sticks, CD drives) that are misdetected as floppy. stable/main/binary-all/di-utils-shell_1.45etch1_all.udeb stable/main/binary-i386/di-utils-mapdevfs_1.45etch1_i386.udeb stable/main/binary-all/di-utils-terminfo_1.45etch1_all.udeb stable/main/binary-i386/di-utils_1.45etch1_i386.udeb stable/main/binary-all/di-utils-reboot_1.45etch1_all.udeb stable/main/source/debian-installer-utils_1.45etch1.tar.gz stable/main/source/debian-installer-utils_1.45etch1.dsc stable/main/binary-all/di-utils-exit-installer_1.45etch1_all.udeb debian-installer-utils (1.45etch1) stable; urgency=low * list-devices: add maybe-usb-floppy parameter to allow to also scan for USB-devices (sticks, CD drives) that are misdetected as floppy. stable/main/binary-sparc/debian-installer_20070308etch1_sparc.deb debian-installer (20070308etch1) stable; urgency=low * Excluding non-us for sources.list.udeb should no longer be needed; add exclusion for volatile.debian.{org,net}. * Support distribution equal to stable and oldstable. * Update all architectures to use 2.6.18-5 kernels. * Use keyring from debian-archive-keyring if it is available even if KEYRING is not set. Needed to work around a build error for the i386 boot floppy target. stable/main/binary-s390/debian-installer_20070308etch1_s390.deb debian-installer (20070308etch1) stable; urgency=low * Excluding non-us for sources.list.udeb should no longer be needed; add exclusion for volatile.debian.{org,net}. * Support distribution equal to stable and oldstable. * Update all architectures to use 2.6.18-5 kernels. * Use keyring from debian-archive-keyring if it is available even if KEYRING is not set. Needed to work around a build error for the i386 boot floppy target. stable/main/binary-powerpc/debian-installer_20070308etch1_powerpc.deb debian-installer (20070308etch1) stable; urgency=low * Excluding non-us for sources.list.udeb should no longer be needed; add exclusion for volatile.debian.{org,net}. * Support distribution equal to stable and oldstable. * Update all architectures to use 2.6.18-5 kernels. * Use keyring from debian-archive-keyring if it is available even if KEYRING is not set. Needed to work around a build error for the i386 boot floppy target. stable/main/binary-mipsel/debian-installer_20070308etch1_mipsel.deb debian-installer (20070308etch1) stable; urgency=low * Excluding non-us for sources.list.udeb should no longer be needed; add exclusion for volatile.debian.{org,net}. * Support distribution equal to stable and oldstable. * Update all architectures to use 2.6.18-5 kernels. * Use keyring from debian-archive-keyring if it is available even if KEYRING is not set. Needed to work around a build error for the i386 boot floppy target. stable/main/binary-mips/debian-installer_20070308etch1_mips.deb debian-installer (20070308etch1) stable; urgency=low * Excluding non-us for sources.list.udeb should no longer be needed; add exclusion for volatile.debian.{org,net}. * Support distribution equal to stable and oldstable. * Update all architectures to use 2.6.18-5 kernels. * Use keyring from debian-archive-keyring if it is available even if KEYRING is not set. Needed to work around a build error for the i386 boot floppy target. stable/main/binary-ia64/debian-installer_20070308etch1_ia64.deb debian-installer (20070308etch1) stable; urgency=low * Excluding non-us for sources.list.udeb should no longer be needed; add exclusion for volatile.debian.{org,net}. * Support distribution equal to stable and oldstable. * Update all architectures to use 2.6.18-5 kernels. * Use keyring from debian-archive-keyring if it is available even if KEYRING is not set. Needed to work around a build error for the i386 boot floppy target. stable/main/binary-hppa/debian-installer_20070308etch1_hppa.deb debian-installer (20070308etch1) stable; urgency=low * Excluding non-us for sources.list.udeb should no longer be needed; add exclusion for volatile.debian.{org,net}. * Support distribution equal to stable and oldstable. * Update all architectures to use 2.6.18-5 kernels. * Use keyring from debian-archive-keyring if it is available even if KEYRING is not set. Needed to work around a build error for the i386 boot floppy target. stable/main/binary-arm/debian-installer_20070308etch1_arm.deb debian-installer (20070308etch1) stable; urgency=low * Excluding non-us for sources.list.udeb should no longer be needed; add exclusion for volatile.debian.{org,net}. * Support distribution equal to stable and oldstable. * Update all architectures to use 2.6.18-5 kernels. * Use keyring from debian-archive-keyring if it is available even if KEYRING is not set. Needed to work around a build error for the i386 boot floppy target. stable/main/binary-amd64/debian-installer_20070308etch1_amd64.deb debian-installer (20070308etch1) stable; urgency=low * Excluding non-us for sources.list.udeb should no longer be needed; add exclusion for volatile.debian.{org,net}. * Support distribution equal to stable and oldstable. * Update all architectures to use 2.6.18-5 kernels. * Use keyring from debian-archive-keyring if it is available even if KEYRING is not set. Needed to work around a build error for the i386 boot floppy target. stable/main/binary-alpha/debian-installer_20070308etch1_alpha.deb debian-installer (20070308etch1) stable; urgency=low * Excluding non-us for sources.list.udeb should no longer be needed; add exclusion for volatile.debian.{org,net}. * Support distribution equal to stable and oldstable. * Update all architectures to use 2.6.18-5 kernels. * Use keyring from debian-archive-keyring if it is available even if KEYRING is not set. Needed to work around a build error for the i386 boot floppy target. stable/main/binary-i386/debian-installer_20070308etch1_i386.deb stable/main/source/debian-installer_20070308etch1.dsc stable/main/source/debian-installer_20070308etch1.tar.gz debian-installer (20070308etch1) stable; urgency=low * Excluding non-us for sources.list.udeb should no longer be needed; add exclusion for volatile.debian.{org,net}. * Support distribution equal to stable and oldstable. * Update all architectures to use 2.6.18-5 kernels. * Use keyring from debian-archive-keyring if it is available even if KEYRING is not set. Needed to work around a build error for the i386 boot floppy target. stable/main/binary-all/debian-archive-keyring_2007.07.31~etch1_all.deb stable/main/binary-all/debian-archive-keyring-udeb_2007.07.31~etch1_all.udeb stable/main/source/debian-archive-keyring_2007.07.31~etch1.tar.gz stable/main/source/debian-archive-keyring_2007.07.31~etch1.dsc debian-archive-keyring (2007.07.31~etch1) stable; urgency=low * added 'volatile' signing key (ID: BBE55AB3) stable/main/binary-s390/python-codespeak-lib_0.7-svn20060621-1_s390.deb codespeak-lib (0.7-svn20060621-1) unstable; urgency=low * New upstream version. * Split the patches inside debian/patches/ and use dpatch. stable/main/binary-sparc/clamav-daemon_0.90.1-3etch2_sparc.deb stable/main/binary-sparc/libclamav-dev_0.90.1-3etch2_sparc.deb stable/main/binary-sparc/clamav-freshclam_0.90.1-3etch2_sparc.deb stable/main/binary-sparc/libclamav2_0.90.1-3etch2_sparc.deb stable/main/binary-sparc/clamav-dbg_0.90.1-3etch2_sparc.deb stable/main/binary-sparc/clamav_0.90.1-3etch2_sparc.deb stable/main/binary-sparc/clamav-milter_0.90.1-3etch2_sparc.deb clamav (0.90.1-3etch2) stable-security; urgency=high * fix debian/patch/27_pdf.c.CVE-2007-2029 so it actually applies and fixes the security issue documented in 0.90.1-3etch1 stable/main/binary-s390/clamav_0.90.1-3etch2_s390.deb stable/main/binary-s390/clamav-dbg_0.90.1-3etch2_s390.deb stable/main/binary-s390/clamav-freshclam_0.90.1-3etch2_s390.deb stable/main/binary-s390/libclamav2_0.90.1-3etch2_s390.deb stable/main/binary-s390/clamav-daemon_0.90.1-3etch2_s390.deb stable/main/binary-s390/libclamav-dev_0.90.1-3etch2_s390.deb stable/main/binary-s390/clamav-milter_0.90.1-3etch2_s390.deb clamav (0.90.1-3etch2) stable-security; urgency=high * fix debian/patch/27_pdf.c.CVE-2007-2029 so it actually applies and fixes the security issue documented in 0.90.1-3etch1 stable/main/binary-powerpc/clamav-dbg_0.90.1-3etch2_powerpc.deb stable/main/binary-powerpc/clamav_0.90.1-3etch2_powerpc.deb stable/main/binary-powerpc/clamav-milter_0.90.1-3etch2_powerpc.deb stable/main/binary-powerpc/clamav-freshclam_0.90.1-3etch2_powerpc.deb stable/main/binary-powerpc/clamav-daemon_0.90.1-3etch2_powerpc.deb stable/main/binary-powerpc/libclamav-dev_0.90.1-3etch2_powerpc.deb stable/main/binary-powerpc/libclamav2_0.90.1-3etch2_powerpc.deb clamav (0.90.1-3etch2) stable-security; urgency=high * fix debian/patch/27_pdf.c.CVE-2007-2029 so it actually applies and fixes the security issue documented in 0.90.1-3etch1 stable/main/binary-mipsel/clamav_0.90.1-3etch2_mipsel.deb stable/main/binary-mipsel/clamav-daemon_0.90.1-3etch2_mipsel.deb stable/main/binary-mipsel/libclamav2_0.90.1-3etch2_mipsel.deb stable/main/binary-mipsel/libclamav-dev_0.90.1-3etch2_mipsel.deb stable/main/binary-mipsel/clamav-freshclam_0.90.1-3etch2_mipsel.deb stable/main/binary-mipsel/clamav-dbg_0.90.1-3etch2_mipsel.deb stable/main/binary-mipsel/clamav-milter_0.90.1-3etch2_mipsel.deb clamav (0.90.1-3etch2) stable-security; urgency=high * fix debian/patch/27_pdf.c.CVE-2007-2029 so it actually applies and fixes the security issue documented in 0.90.1-3etch1 stable/main/binary-mips/clamav-dbg_0.90.1-3etch2_mips.deb stable/main/binary-mips/clamav_0.90.1-3etch2_mips.deb stable/main/binary-mips/libclamav2_0.90.1-3etch2_mips.deb stable/main/binary-mips/clamav-daemon_0.90.1-3etch2_mips.deb stable/main/binary-mips/clamav-milter_0.90.1-3etch2_mips.deb stable/main/binary-mips/clamav-freshclam_0.90.1-3etch2_mips.deb stable/main/binary-mips/libclamav-dev_0.90.1-3etch2_mips.deb clamav (0.90.1-3etch2) stable-security; urgency=high * fix debian/patch/27_pdf.c.CVE-2007-2029 so it actually applies and fixes the security issue documented in 0.90.1-3etch1 stable/main/binary-ia64/clamav-dbg_0.90.1-3etch2_ia64.deb stable/main/binary-ia64/clamav-freshclam_0.90.1-3etch2_ia64.deb stable/main/binary-ia64/clamav_0.90.1-3etch2_ia64.deb stable/main/binary-ia64/clamav-milter_0.90.1-3etch2_ia64.deb stable/main/binary-ia64/clamav-daemon_0.90.1-3etch2_ia64.deb stable/main/binary-ia64/libclamav2_0.90.1-3etch2_ia64.deb stable/main/binary-ia64/libclamav-dev_0.90.1-3etch2_ia64.deb clamav (0.90.1-3etch2) stable-security; urgency=high * fix debian/patch/27_pdf.c.CVE-2007-2029 so it actually applies and fixes the security issue documented in 0.90.1-3etch1 stable/main/binary-hppa/clamav-milter_0.90.1-3etch2_hppa.deb stable/main/binary-hppa/clamav-dbg_0.90.1-3etch2_hppa.deb stable/main/binary-hppa/clamav_0.90.1-3etch2_hppa.deb stable/main/binary-hppa/libclamav2_0.90.1-3etch2_hppa.deb stable/main/binary-hppa/clamav-daemon_0.90.1-3etch2_hppa.deb stable/main/binary-hppa/libclamav-dev_0.90.1-3etch2_hppa.deb stable/main/binary-hppa/clamav-freshclam_0.90.1-3etch2_hppa.deb clamav (0.90.1-3etch2) stable-security; urgency=high * fix debian/patch/27_pdf.c.CVE-2007-2029 so it actually applies and fixes the security issue documented in 0.90.1-3etch1 stable/main/binary-arm/libclamav2_0.90.1-3etch2_arm.deb stable/main/binary-arm/clamav-milter_0.90.1-3etch2_arm.deb stable/main/binary-arm/clamav-freshclam_0.90.1-3etch2_arm.deb stable/main/binary-arm/clamav-daemon_0.90.1-3etch2_arm.deb stable/main/binary-arm/libclamav-dev_0.90.1-3etch2_arm.deb stable/main/binary-arm/clamav_0.90.1-3etch2_arm.deb stable/main/binary-arm/clamav-dbg_0.90.1-3etch2_arm.deb clamav (0.90.1-3etch2) stable-security; urgency=high * fix debian/patch/27_pdf.c.CVE-2007-2029 so it actually applies and fixes the security issue documented in 0.90.1-3etch1 stable/main/binary-amd64/clamav-milter_0.90.1-3etch2_amd64.deb stable/main/binary-amd64/clamav-freshclam_0.90.1-3etch2_amd64.deb stable/main/binary-amd64/libclamav2_0.90.1-3etch2_amd64.deb stable/main/binary-amd64/clamav-daemon_0.90.1-3etch2_amd64.deb stable/main/binary-amd64/libclamav-dev_0.90.1-3etch2_amd64.deb stable/main/binary-amd64/clamav-dbg_0.90.1-3etch2_amd64.deb stable/main/binary-amd64/clamav_0.90.1-3etch2_amd64.deb clamav (0.90.1-3etch2) stable-security; urgency=high * fix debian/patch/27_pdf.c.CVE-2007-2029 so it actually applies and fixes the security issue documented in 0.90.1-3etch1 stable/main/binary-alpha/libclamav2_0.90.1-3etch2_alpha.deb stable/main/binary-alpha/clamav_0.90.1-3etch2_alpha.deb stable/main/binary-alpha/clamav-dbg_0.90.1-3etch2_alpha.deb stable/main/binary-alpha/libclamav-dev_0.90.1-3etch2_alpha.deb stable/main/binary-alpha/clamav-milter_0.90.1-3etch2_alpha.deb stable/main/binary-alpha/clamav-freshclam_0.90.1-3etch2_alpha.deb stable/main/binary-alpha/clamav-daemon_0.90.1-3etch2_alpha.deb clamav (0.90.1-3etch2) stable-security; urgency=high * fix debian/patch/27_pdf.c.CVE-2007-2029 so it actually applies and fixes the security issue documented in 0.90.1-3etch1 stable/main/binary-i386/libclamav-dev_0.90.1-3etch2_i386.deb stable/main/binary-all/clamav-testfiles_0.90.1-3etch2_all.deb stable/main/binary-i386/clamav-freshclam_0.90.1-3etch2_i386.deb stable/main/binary-i386/clamav-daemon_0.90.1-3etch2_i386.deb stable/main/binary-all/clamav-docs_0.90.1-3etch2_all.deb stable/main/source/clamav_0.90.1-3etch2.diff.gz stable/main/binary-i386/libclamav2_0.90.1-3etch2_i386.deb stable/main/binary-i386/clamav-dbg_0.90.1-3etch2_i386.deb stable/main/binary-i386/clamav-milter_0.90.1-3etch2_i386.deb stable/main/binary-all/clamav-base_0.90.1-3etch2_all.deb stable/main/binary-i386/clamav_0.90.1-3etch2_i386.deb stable/main/source/clamav_0.90.1-3etch2.dsc clamav (0.90.1-3etch2) stable-security; urgency=high * fix debian/patch/27_pdf.c.CVE-2007-2029 so it actually applies and fixes the security issue documented in 0.90.1-3etch1 stable/main/binary-sparc/choose-mirror-bin_2.13etch1_sparc.udeb choose-mirror (2.13etch1) stable; urgency=low * Update mirrorlist. stable/main/binary-s390/choose-mirror-bin_2.13etch1_s390.udeb choose-mirror (2.13etch1) stable; urgency=low * Update mirrorlist. stable/main/binary-powerpc/choose-mirror-bin_2.13etch1_powerpc.udeb choose-mirror (2.13etch1) stable; urgency=low * Update mirrorlist. stable/main/binary-mipsel/choose-mirror-bin_2.13etch1_mipsel.udeb choose-mirror (2.13etch1) stable; urgency=low * Update mirrorlist. stable/main/binary-mips/choose-mirror-bin_2.13etch1_mips.udeb choose-mirror (2.13etch1) stable; urgency=low * Update mirrorlist. stable/main/binary-ia64/choose-mirror-bin_2.13etch1_ia64.udeb choose-mirror (2.13etch1) stable; urgency=low * Update mirrorlist. stable/main/binary-hppa/choose-mirror-bin_2.13etch1_hppa.udeb choose-mirror (2.13etch1) stable; urgency=low * Update mirrorlist. stable/main/binary-arm/choose-mirror-bin_2.13etch1_arm.udeb choose-mirror (2.13etch1) stable; urgency=low * Update mirrorlist. stable/main/binary-amd64/choose-mirror-bin_2.13etch1_amd64.udeb choose-mirror (2.13etch1) stable; urgency=low * Update mirrorlist. stable/main/binary-alpha/choose-mirror-bin_2.13etch1_alpha.udeb choose-mirror (2.13etch1) stable; urgency=low * Update mirrorlist. stable/main/source/choose-mirror_2.13etch1.dsc stable/main/binary-all/choose-mirror_2.13etch1_all.udeb stable/main/binary-i386/choose-mirror-bin_2.13etch1_i386.udeb stable/main/source/choose-mirror_2.13etch1.tar.gz choose-mirror (2.13etch1) stable; urgency=low * Update mirrorlist. stable/main/source/cdrom-detect_1.20etch1.tar.gz stable/main/source/cdrom-detect_1.20etch1.dsc stable/main/binary-all/cdrom-detect_1.20etch1_all.udeb cdrom-detect (1.20etch1) stable; urgency=low [ Joey Hess ] * After scanning CDs, scan for things that look like USB floppies to list-devices, since these can sometimes really be USB CD drives. (Which is probably a udev or kernel bug). Closes: #410006, 418850 * Needs di-utils 1.45etch1. stable/main/binary-arm/banshee_0.11.2+dfsg-1_arm.deb banshee (0.11.2+dfsg-1) unstable; urgency=low * New upstream release (Closes: #394059): + Fixes FTBFS with newer mono releases (Closes: #397940) + Don't segfault on disposing Avahi.Client object (Closes: #388548) + Can't import files with acents in the filename (Closes: #379206) + Can't connect to iTunes 7 daap shared (Closes: #391386) + Crashes when trying to open Audioscrobbler group (Closes: #392100) + Show GUI message for unplayable files (Closes: #354597) + Allow downloading of file from daap shares (Closes: #362548) * debian/control: + Update build-depends + Suggest banshee-official-plugins * debian/patches/* + Dropped, merged upstream * debian/copyright: + Updated * debian/banshee.install: + Update path for the audioscrobbler plugin * debian/rules: + Disable mtp support for now until libgphoto-sharp is released + Remove banshee-import utility as it is not meant to be shipped stable/main/binary-s390/asterisk-chan-capi_0.7.1-1.1_s390.deb asterisk-chan-capi (0.7.1-1.1) unstable; urgency=high * Non-maintainer upload * Protect calls to capi_cmsg2str and use of its buffer with a mutex. (Closes: #411293) stable/main/source/apt-setup_0.20etch1.dsc stable/main/binary-all/apt-cdrom-setup_0.20etch1_all.udeb stable/main/source/apt-setup_0.20etch1.tar.gz stable/main/binary-all/apt-mirror-setup_0.20etch1_all.udeb stable/main/binary-all/apt-setup-udeb_0.20etch1_all.udeb apt-setup (1:0.20etch1) stable; urgency=low * 50mirror: default suite to codename, similar to what we already do for network-based installs; choose-mirror will determine the actual suite from the codename. Closes: #422442. stable/main/binary-i386/apache2-mpm-itk_2.2.3-01-1+b7_i386.deb apache2-mpm-itk (2.2.3-01-1+b7) stable; urgency=low * Binary-only non-maintainer upload for i386; no source changes. * Rebuild against apache2 2.2.3-4+etch1 stable/main/binary-sparc/apache2-mpm-itk_2.2.3-01-1+b6_sparc.deb apache2-mpm-itk (2.2.3-01-1+b6) stable; urgency=low * Binary-only non-maintainer upload for sparc; no source changes. * Rebuild against apache2 2.2.3-4+etch1 stable/main/binary-s390/apache2-mpm-itk_2.2.3-01-1+b6_s390.deb apache2-mpm-itk (2.2.3-01-1+b6) stable; urgency=low * Binary-only non-maintainer upload for s390; no source changes. * Rebuild against apache2 2.2.3-4+etch1 stable/main/binary-powerpc/apache2-mpm-itk_2.2.3-01-1+b6_powerpc.deb apache2-mpm-itk (2.2.3-01-1+b6) stable; urgency=low * Binary-only non-maintainer upload for powerpc; no source changes. * Rebuild against apache2 2.2.3-4+etch1 stable/main/binary-mipsel/apache2-mpm-itk_2.2.3-01-1+b6_mipsel.deb apache2-mpm-itk (2.2.3-01-1+b6) stable; urgency=low * Binary-only non-maintainer upload for mipsel; no source changes. * Rebuild against apache2 2.2.3-4+etch1 stable/main/binary-mips/apache2-mpm-itk_2.2.3-01-1+b6_mips.deb apache2-mpm-itk (2.2.3-01-1+b6) stable; urgency=low * Binary-only non-maintainer upload for mips; no source changes. * Rebuild against apache2 2.2.3-4+etch1 stable/main/binary-ia64/apache2-mpm-itk_2.2.3-01-1+b6_ia64.deb apache2-mpm-itk (2.2.3-01-1+b6) stable; urgency=low * Binary-only non-maintainer upload for ia64; no source changes. * Rebuild against apache2 2.2.3-4+etch1 stable/main/binary-hppa/apache2-mpm-itk_2.2.3-01-1+b6_hppa.deb apache2-mpm-itk (2.2.3-01-1+b6) stable; urgency=low * Binary-only non-maintainer upload for hppa; no source changes. * Rebuild against apache2 2.2.3-4+etch1 stable/main/binary-arm/apache2-mpm-itk_2.2.3-01-1+b6_arm.deb apache2-mpm-itk (2.2.3-01-1+b6) stable; urgency=low * Binary-only non-maintainer upload for arm; no source changes. * Rebuild against apache2 2.2.3-4+etch1 stable/main/binary-amd64/apache2-mpm-itk_2.2.3-01-1+b6_amd64.deb apache2-mpm-itk (2.2.3-01-1+b6) stable; urgency=low * Binary-only non-maintainer upload for amd64; no source changes. * Rebuild against apache2 2.2.3-4+etch1 stable/main/binary-alpha/apache2-mpm-itk_2.2.3-01-1+b6_alpha.deb apache2-mpm-itk (2.2.3-01-1+b6) stable; urgency=low * Binary-only non-maintainer upload for alpha; no source changes. * Rebuild against apache2 2.2.3-4+etch1 stable/main/binary-sparc/apache2-mpm-event_2.2.3-4+etch1_sparc.deb stable/main/binary-sparc/apache2-threaded-dev_2.2.3-4+etch1_sparc.deb stable/main/binary-sparc/apache2-utils_2.2.3-4+etch1_sparc.deb stable/main/binary-sparc/apache2-mpm-prefork_2.2.3-4+etch1_sparc.deb stable/main/binary-sparc/apache2-prefork-dev_2.2.3-4+etch1_sparc.deb stable/main/binary-sparc/apache2.2-common_2.2.3-4+etch1_sparc.deb stable/main/binary-sparc/apache2-mpm-worker_2.2.3-4+etch1_sparc.deb apache2 (2.2.3-4+etch1) stable; urgency=low * Comment out CacheEnable by default, to prevent filling up /var. Document the problem in README.Debian and NEWS.Debian, point to htcacheclean and give a warning when doing a2enmod disk_cache (Closes: #423653). * Re-add README.Debian and describe - how to change "restart" to "reload" in the logrotate script when using SSL keys with passwords - the config dir layout (closes: #419552) - which files are ignored by Include * When doing a restart, wait for the server to die before trying to start it again. Together with the README.Debian, this closes: #298689 and friends. * Ship apache2(8) manpage stable/main/binary-s390/apache2-mpm-worker_2.2.3-4+etch1_s390.deb stable/main/binary-s390/apache2-prefork-dev_2.2.3-4+etch1_s390.deb stable/main/binary-s390/apache2-threaded-dev_2.2.3-4+etch1_s390.deb stable/main/binary-s390/apache2-mpm-event_2.2.3-4+etch1_s390.deb stable/main/binary-s390/apache2-utils_2.2.3-4+etch1_s390.deb stable/main/binary-s390/apache2-mpm-prefork_2.2.3-4+etch1_s390.deb stable/main/binary-s390/apache2.2-common_2.2.3-4+etch1_s390.deb apache2 (2.2.3-4+etch1) stable; urgency=low * Comment out CacheEnable by default, to prevent filling up /var. Document the problem in README.Debian and NEWS.Debian, point to htcacheclean and give a warning when doing a2enmod disk_cache (Closes: #423653). * Re-add README.Debian and describe - how to change "restart" to "reload" in the logrotate script when using SSL keys with passwords - the config dir layout (closes: #419552) - which files are ignored by Include * When doing a restart, wait for the server to die before trying to start it again. Together with the README.Debian, this closes: #298689 and friends. * Ship apache2(8) manpage stable/main/binary-powerpc/apache2-mpm-worker_2.2.3-4+etch1_powerpc.deb stable/main/binary-powerpc/apache2.2-common_2.2.3-4+etch1_powerpc.deb stable/main/binary-powerpc/apache2-utils_2.2.3-4+etch1_powerpc.deb stable/main/binary-powerpc/apache2-threaded-dev_2.2.3-4+etch1_powerpc.deb stable/main/binary-powerpc/apache2-mpm-event_2.2.3-4+etch1_powerpc.deb stable/main/binary-powerpc/apache2-prefork-dev_2.2.3-4+etch1_powerpc.deb stable/main/binary-powerpc/apache2-mpm-prefork_2.2.3-4+etch1_powerpc.deb apache2 (2.2.3-4+etch1) stable; urgency=low * Comment out CacheEnable by default, to prevent filling up /var. Document the problem in README.Debian and NEWS.Debian, point to htcacheclean and give a warning when doing a2enmod disk_cache (Closes: #423653). * Re-add README.Debian and describe - how to change "restart" to "reload" in the logrotate script when using SSL keys with passwords - the config dir layout (closes: #419552) - which files are ignored by Include * When doing a restart, wait for the server to die before trying to start it again. Together with the README.Debian, this closes: #298689 and friends. * Ship apache2(8) manpage stable/main/binary-mipsel/apache2-mpm-event_2.2.3-4+etch1_mipsel.deb stable/main/binary-mipsel/apache2-mpm-prefork_2.2.3-4+etch1_mipsel.deb stable/main/binary-mipsel/apache2-prefork-dev_2.2.3-4+etch1_mipsel.deb stable/main/binary-mipsel/apache2.2-common_2.2.3-4+etch1_mipsel.deb stable/main/binary-mipsel/apache2-mpm-worker_2.2.3-4+etch1_mipsel.deb stable/main/binary-mipsel/apache2-utils_2.2.3-4+etch1_mipsel.deb stable/main/binary-mipsel/apache2-threaded-dev_2.2.3-4+etch1_mipsel.deb apache2 (2.2.3-4+etch1) stable; urgency=low * Comment out CacheEnable by default, to prevent filling up /var. Document the problem in README.Debian and NEWS.Debian, point to htcacheclean and give a warning when doing a2enmod disk_cache (Closes: #423653). * Re-add README.Debian and describe - how to change "restart" to "reload" in the logrotate script when using SSL keys with passwords - the config dir layout (closes: #419552) - which files are ignored by Include * When doing a restart, wait for the server to die before trying to start it again. Together with the README.Debian, this closes: #298689 and friends. * Ship apache2(8) manpage stable/main/binary-mips/apache2-utils_2.2.3-4+etch1_mips.deb stable/main/binary-mips/apache2-mpm-worker_2.2.3-4+etch1_mips.deb stable/main/binary-mips/apache2-prefork-dev_2.2.3-4+etch1_mips.deb stable/main/binary-mips/apache2.2-common_2.2.3-4+etch1_mips.deb stable/main/binary-mips/apache2-mpm-prefork_2.2.3-4+etch1_mips.deb stable/main/binary-mips/apache2-threaded-dev_2.2.3-4+etch1_mips.deb stable/main/binary-mips/apache2-mpm-event_2.2.3-4+etch1_mips.deb apache2 (2.2.3-4+etch1) stable; urgency=low * Comment out CacheEnable by default, to prevent filling up /var. Document the problem in README.Debian and NEWS.Debian, point to htcacheclean and give a warning when doing a2enmod disk_cache (Closes: #423653). * Re-add README.Debian and describe - how to change "restart" to "reload" in the logrotate script when using SSL keys with passwords - the config dir layout (closes: #419552) - which files are ignored by Include * When doing a restart, wait for the server to die before trying to start it again. Together with the README.Debian, this closes: #298689 and friends. * Ship apache2(8) manpage stable/main/binary-ia64/apache2-utils_2.2.3-4+etch1_ia64.deb stable/main/binary-ia64/apache2-mpm-worker_2.2.3-4+etch1_ia64.deb stable/main/binary-ia64/apache2-prefork-dev_2.2.3-4+etch1_ia64.deb stable/main/binary-ia64/apache2-threaded-dev_2.2.3-4+etch1_ia64.deb stable/main/binary-ia64/apache2-mpm-prefork_2.2.3-4+etch1_ia64.deb stable/main/binary-ia64/apache2.2-common_2.2.3-4+etch1_ia64.deb stable/main/binary-ia64/apache2-mpm-event_2.2.3-4+etch1_ia64.deb apache2 (2.2.3-4+etch1) stable; urgency=low * Comment out CacheEnable by default, to prevent filling up /var. Document the problem in README.Debian and NEWS.Debian, point to htcacheclean and give a warning when doing a2enmod disk_cache (Closes: #423653). * Re-add README.Debian and describe - how to change "restart" to "reload" in the logrotate script when using SSL keys with passwords - the config dir layout (closes: #419552) - which files are ignored by Include * When doing a restart, wait for the server to die before trying to start it again. Together with the README.Debian, this closes: #298689 and friends. * Ship apache2(8) manpage stable/main/binary-hppa/apache2-prefork-dev_2.2.3-4+etch1_hppa.deb stable/main/binary-hppa/apache2.2-common_2.2.3-4+etch1_hppa.deb stable/main/binary-hppa/apache2-mpm-event_2.2.3-4+etch1_hppa.deb stable/main/binary-hppa/apache2-utils_2.2.3-4+etch1_hppa.deb stable/main/binary-hppa/apache2-threaded-dev_2.2.3-4+etch1_hppa.deb stable/main/binary-hppa/apache2-mpm-prefork_2.2.3-4+etch1_hppa.deb stable/main/binary-hppa/apache2-mpm-worker_2.2.3-4+etch1_hppa.deb apache2 (2.2.3-4+etch1) stable; urgency=low * Comment out CacheEnable by default, to prevent filling up /var. Document the problem in README.Debian and NEWS.Debian, point to htcacheclean and give a warning when doing a2enmod disk_cache (Closes: #423653). * Re-add README.Debian and describe - how to change "restart" to "reload" in the logrotate script when using SSL keys with passwords - the config dir layout (closes: #419552) - which files are ignored by Include * When doing a restart, wait for the server to die before trying to start it again. Together with the README.Debian, this closes: #298689 and friends. * Ship apache2(8) manpage stable/main/binary-arm/apache2-mpm-prefork_2.2.3-4+etch1_arm.deb stable/main/binary-arm/apache2-mpm-worker_2.2.3-4+etch1_arm.deb stable/main/binary-arm/apache2-utils_2.2.3-4+etch1_arm.deb stable/main/binary-arm/apache2-threaded-dev_2.2.3-4+etch1_arm.deb stable/main/binary-arm/apache2-mpm-event_2.2.3-4+etch1_arm.deb stable/main/binary-arm/apache2.2-common_2.2.3-4+etch1_arm.deb stable/main/binary-arm/apache2-prefork-dev_2.2.3-4+etch1_arm.deb apache2 (2.2.3-4+etch1) stable; urgency=low * Comment out CacheEnable by default, to prevent filling up /var. Document the problem in README.Debian and NEWS.Debian, point to htcacheclean and give a warning when doing a2enmod disk_cache (Closes: #423653). * Re-add README.Debian and describe - how to change "restart" to "reload" in the logrotate script when using SSL keys with passwords - the config dir layout (closes: #419552) - which files are ignored by Include * When doing a restart, wait for the server to die before trying to start it again. Together with the README.Debian, this closes: #298689 and friends. * Ship apache2(8) manpage stable/main/binary-amd64/apache2-utils_2.2.3-4+etch1_amd64.deb stable/main/binary-amd64/apache2-mpm-event_2.2.3-4+etch1_amd64.deb stable/main/binary-amd64/apache2-mpm-prefork_2.2.3-4+etch1_amd64.deb stable/main/binary-amd64/apache2-prefork-dev_2.2.3-4+etch1_amd64.deb stable/main/binary-amd64/apache2-threaded-dev_2.2.3-4+etch1_amd64.deb stable/main/binary-amd64/apache2-mpm-worker_2.2.3-4+etch1_amd64.deb stable/main/binary-amd64/apache2.2-common_2.2.3-4+etch1_amd64.deb apache2 (2.2.3-4+etch1) stable; urgency=low * Comment out CacheEnable by default, to prevent filling up /var. Document the problem in README.Debian and NEWS.Debian, point to htcacheclean and give a warning when doing a2enmod disk_cache (Closes: #423653). * Re-add README.Debian and describe - how to change "restart" to "reload" in the logrotate script when using SSL keys with passwords - the config dir layout (closes: #419552) - which files are ignored by Include * When doing a restart, wait for the server to die before trying to start it again. Together with the README.Debian, this closes: #298689 and friends. * Ship apache2(8) manpage stable/main/binary-alpha/apache2-mpm-prefork_2.2.3-4+etch1_alpha.deb stable/main/binary-alpha/apache2-threaded-dev_2.2.3-4+etch1_alpha.deb stable/main/binary-alpha/apache2.2-common_2.2.3-4+etch1_alpha.deb stable/main/binary-alpha/apache2-prefork-dev_2.2.3-4+etch1_alpha.deb stable/main/binary-alpha/apache2-mpm-worker_2.2.3-4+etch1_alpha.deb stable/main/binary-alpha/apache2-utils_2.2.3-4+etch1_alpha.deb stable/main/binary-alpha/apache2-mpm-event_2.2.3-4+etch1_alpha.deb apache2 (2.2.3-4+etch1) stable; urgency=low * Comment out CacheEnable by default, to prevent filling up /var. Document the problem in README.Debian and NEWS.Debian, point to htcacheclean and give a warning when doing a2enmod disk_cache (Closes: #423653). * Re-add README.Debian and describe - how to change "restart" to "reload" in the logrotate script when using SSL keys with passwords - the config dir layout (closes: #419552) - which files are ignored by Include * When doing a restart, wait for the server to die before trying to start it again. Together with the README.Debian, this closes: #298689 and friends. * Ship apache2(8) manpage stable/main/binary-i386/apache2.2-common_2.2.3-4+etch1_i386.deb stable/main/binary-i386/apache2-prefork-dev_2.2.3-4+etch1_i386.deb stable/main/binary-all/apache2_2.2.3-4+etch1_all.deb stable/main/binary-i386/apache2-threaded-dev_2.2.3-4+etch1_i386.deb stable/main/binary-i386/apache2-mpm-worker_2.2.3-4+etch1_i386.deb stable/main/binary-i386/apache2-mpm-prefork_2.2.3-4+etch1_i386.deb stable/main/source/apache2_2.2.3-4+etch1.dsc stable/main/binary-i386/apache2-mpm-event_2.2.3-4+etch1_i386.deb stable/main/binary-all/apache2-doc_2.2.3-4+etch1_all.deb stable/main/binary-all/apache2-mpm-perchild_2.2.3-4+etch1_all.deb stable/main/binary-all/apache2-src_2.2.3-4+etch1_all.deb stable/main/source/apache2_2.2.3-4+etch1.diff.gz stable/main/binary-i386/apache2-utils_2.2.3-4+etch1_i386.deb apache2 (2.2.3-4+etch1) stable; urgency=low * Comment out CacheEnable by default, to prevent filling up /var. Document the problem in README.Debian and NEWS.Debian, point to htcacheclean and give a warning when doing a2enmod disk_cache (Closes: #423653). * Re-add README.Debian and describe - how to change "restart" to "reload" in the logrotate script when using SSL keys with passwords - the config dir layout (closes: #419552) - which files are ignored by Include * When doing a restart, wait for the server to die before trying to start it again. Together with the README.Debian, this closes: #298689 and friends. * Ship apache2(8) manpage stable/main/binary-sparc/aircrack-ng_0.6.2-7etch1_sparc.deb aircrack-ng (1:0.6.2-7etch1) stable-security; urgency=HIGH * Update 02-airodump-ng_wepwedgie to fix a remote exploitable buffer overflow. See: Secunia #SA24880. stable/main/binary-s390/aircrack-ng_0.6.2-7etch1_s390.deb aircrack-ng (1:0.6.2-7etch1) stable-security; urgency=HIGH * Update 02-airodump-ng_wepwedgie to fix a remote exploitable buffer overflow. See: Secunia #SA24880. stable/main/binary-powerpc/aircrack-ng_0.6.2-7etch1_powerpc.deb aircrack-ng (1:0.6.2-7etch1) stable-security; urgency=HIGH * Update 02-airodump-ng_wepwedgie to fix a remote exploitable buffer overflow. See: Secunia #SA24880. stable/main/binary-mipsel/aircrack-ng_0.6.2-7etch1_mipsel.deb aircrack-ng (1:0.6.2-7etch1) stable-security; urgency=HIGH * Update 02-airodump-ng_wepwedgie to fix a remote exploitable buffer overflow. See: Secunia #SA24880. stable/main/binary-mips/aircrack-ng_0.6.2-7etch1_mips.deb aircrack-ng (1:0.6.2-7etch1) stable-security; urgency=HIGH * Update 02-airodump-ng_wepwedgie to fix a remote exploitable buffer overflow. See: Secunia #SA24880. stable/main/binary-ia64/aircrack-ng_0.6.2-7etch1_ia64.deb aircrack-ng (1:0.6.2-7etch1) stable-security; urgency=HIGH * Update 02-airodump-ng_wepwedgie to fix a remote exploitable buffer overflow. See: Secunia #SA24880. stable/main/binary-hppa/aircrack-ng_0.6.2-7etch1_hppa.deb aircrack-ng (1:0.6.2-7etch1) stable-security; urgency=HIGH * Update 02-airodump-ng_wepwedgie to fix a remote exploitable buffer overflow. See: Secunia #SA24880. stable/main/binary-arm/aircrack-ng_0.6.2-7etch1_arm.deb aircrack-ng (1:0.6.2-7etch1) stable-security; urgency=HIGH * Update 02-airodump-ng_wepwedgie to fix a remote exploitable buffer overflow. See: Secunia #SA24880. stable/main/binary-amd64/aircrack-ng_0.6.2-7etch1_amd64.deb aircrack-ng (1:0.6.2-7etch1) stable-security; urgency=HIGH * Update 02-airodump-ng_wepwedgie to fix a remote exploitable buffer overflow. See: Secunia #SA24880. stable/main/binary-alpha/aircrack-ng_0.6.2-7etch1_alpha.deb aircrack-ng (1:0.6.2-7etch1) stable-security; urgency=HIGH * Update 02-airodump-ng_wepwedgie to fix a remote exploitable buffer overflow. See: Secunia #SA24880. stable/main/source/aircrack-ng_0.6.2-7etch1.diff.gz stable/main/source/aircrack-ng_0.6.2-7etch1.dsc stable/main/binary-i386/aircrack-ng_0.6.2-7etch1_i386.deb stable/main/binary-all/aircrack_0.6.2-7etch1_all.deb * Update 02-airodump-ng_wepwedgie to fix a remote exploitable buffer overflow. See: Secunia #SA24880. Removed the following packages from stable: vdrift | 0.0.2006.10.06-1 | source, amd64, i386, ia64, powerpc vdrift-full | 0.0.2006.10.06-1 | all vdrift-minimal | 0.0.2006.10.06-1 | all [Because of license issues; requested by SRM.] acpi-modules-2.6.18-4-486-di | 1.44 | i386 acpi-modules-2.6.18-4-amd64-di | 1.21 | amd64 acpi-modules-2.6.18-4-itanium-di | 1.18 | ia64 affs-modules-2.6.18-4-powerpc-di | 1.29 | powerpc affs-modules-2.6.18-4-powerpc-miboot-di | 1.29 | powerpc affs-modules-2.6.18-4-powerpc64-di | 1.29 | powerpc affs-modules-2.6.18-4-prep-di | 1.29 | powerpc cdrom-core-modules-2.6.18-4-486-di | 1.44 | i386 cdrom-core-modules-2.6.18-4-alpha-generic-di | 0.17 | alpha cdrom-core-modules-2.6.18-4-amd64-di | 1.21 | amd64 cdrom-core-modules-2.6.18-4-footbridge-di | 1.10 | arm cdrom-core-modules-2.6.18-4-iop32x-di | 1.10 | arm cdrom-core-modules-2.6.18-4-itanium-di | 1.18 | ia64 cdrom-core-modules-2.6.18-4-parisc-di | 1.17 | hppa cdrom-core-modules-2.6.18-4-parisc64-di | 1.17 | hppa cdrom-core-modules-2.6.18-4-powerpc-di | 1.29 | powerpc cdrom-core-modules-2.6.18-4-powerpc-miboot-di | 1.29 | powerpc cdrom-core-modules-2.6.18-4-powerpc64-di | 1.29 | powerpc cdrom-core-modules-2.6.18-4-prep-di | 1.29 | powerpc cdrom-core-modules-2.6.18-4-r5k-cobalt-di | 0.13 | mipsel cdrom-core-modules-2.6.18-4-sb1-bcm91250a-di | 0.13 | mips, mipsel cdrom-core-modules-2.6.18-4-sb1a-bcm91480b-di | 0.13 | mips, mipsel cdrom-core-modules-2.6.18-4-sparc32-di | 1.20 | sparc cdrom-core-modules-2.6.18-4-sparc64-di | 1.20 | sparc cdrom-modules-2.6.18-4-486-di | 1.44 | i386 cdrom-modules-2.6.18-4-alpha-generic-di | 0.17 | alpha crc-modules-2.6.18-4-486-di | 1.44 | i386 crc-modules-2.6.18-4-alpha-generic-di | 0.17 | alpha crc-modules-2.6.18-4-amd64-di | 1.21 | amd64 crc-modules-2.6.18-4-footbridge-di | 1.10 | arm crc-modules-2.6.18-4-iop32x-di | 1.10 | arm crc-modules-2.6.18-4-itanium-di | 1.18 | ia64 crc-modules-2.6.18-4-ixp4xx-di | 1.10 | arm crypto-modules-2.6.18-4-486-di | 1.44 | i386 crypto-modules-2.6.18-4-alpha-generic-di | 0.17 | alpha crypto-modules-2.6.18-4-amd64-di | 1.21 | amd64 crypto-modules-2.6.18-4-itanium-di | 1.18 | ia64 crypto-modules-2.6.18-4-parisc-di | 1.17 | hppa crypto-modules-2.6.18-4-parisc64-di | 1.17 | hppa crypto-modules-2.6.18-4-powerpc-di | 1.29 | powerpc crypto-modules-2.6.18-4-powerpc-miboot-di | 1.29 | powerpc crypto-modules-2.6.18-4-powerpc64-di | 1.29 | powerpc crypto-modules-2.6.18-4-prep-di | 1.29 | powerpc crypto-modules-2.6.18-4-r3k-kn02-di | 0.13 | mipsel crypto-modules-2.6.18-4-r4k-ip22-di | 0.13 | mips crypto-modules-2.6.18-4-r4k-kn04-di | 0.13 | mipsel crypto-modules-2.6.18-4-r5k-cobalt-di | 0.13 | mipsel crypto-modules-2.6.18-4-r5k-ip32-di | 0.13 | mips crypto-modules-2.6.18-4-s390-di | 0.13 | s390 crypto-modules-2.6.18-4-sb1-bcm91250a-di | 0.13 | mips, mipsel crypto-modules-2.6.18-4-sb1a-bcm91480b-di | 0.13 | mips, mipsel crypto-modules-2.6.18-4-sparc32-di | 1.20 | sparc crypto-modules-2.6.18-4-sparc64-di | 1.20 | sparc dasd-modules-2.6.18-4-s390-di | 0.13 | s390 efi-modules-2.6.18-4-486-di | 1.44 | i386 efi-modules-2.6.18-4-itanium-di | 1.18 | ia64 ext2-modules-2.6.18-4-powerpc-di | 1.29 | powerpc ext2-modules-2.6.18-4-powerpc-miboot-di | 1.29 | powerpc ext2-modules-2.6.18-4-powerpc64-di | 1.29 | powerpc ext2-modules-2.6.18-4-prep-di | 1.29 | powerpc ext3-modules-2.6.18-4-486-di | 1.44 | i386 ext3-modules-2.6.18-4-alpha-generic-di | 0.17 | alpha ext3-modules-2.6.18-4-amd64-di | 1.21 | amd64 ext3-modules-2.6.18-4-iop32x-di | 1.10 | arm ext3-modules-2.6.18-4-itanium-di | 1.18 | ia64 ext3-modules-2.6.18-4-ixp4xx-di | 1.10 | arm ext3-modules-2.6.18-4-parisc-di | 1.17 | hppa ext3-modules-2.6.18-4-parisc64-di | 1.17 | hppa ext3-modules-2.6.18-4-powerpc-di | 1.29 | powerpc ext3-modules-2.6.18-4-powerpc-miboot-di | 1.29 | powerpc ext3-modules-2.6.18-4-powerpc64-di | 1.29 | powerpc ext3-modules-2.6.18-4-prep-di | 1.29 | powerpc ext3-modules-2.6.18-4-sparc32-di | 1.20 | sparc ext3-modules-2.6.18-4-sparc64-di | 1.20 | sparc fancontrol-modules-2.6.18-4-powerpc64-di | 1.29 | powerpc fat-modules-2.6.18-4-486-di | 1.44 | i386 fat-modules-2.6.18-4-alpha-generic-di | 0.17 | alpha fat-modules-2.6.18-4-amd64-di | 1.21 | amd64 fat-modules-2.6.18-4-footbridge-di | 1.10 | arm fat-modules-2.6.18-4-iop32x-di | 1.10 | arm fat-modules-2.6.18-4-itanium-di | 1.18 | ia64 fat-modules-2.6.18-4-ixp4xx-di | 1.10 | arm fat-modules-2.6.18-4-powerpc-di | 1.29 | powerpc fat-modules-2.6.18-4-powerpc-miboot-di | 1.29 | powerpc fat-modules-2.6.18-4-powerpc64-di | 1.29 | powerpc fat-modules-2.6.18-4-prep-di | 1.29 | powerpc fat-modules-2.6.18-4-qemu-di | 0.13 | mips, mipsel fat-modules-2.6.18-4-r5k-cobalt-di | 0.13 | mipsel fat-modules-2.6.18-4-rpc-di | 1.10 | arm fat-modules-2.6.18-4-s390-di | 0.13 | s390 fat-modules-2.6.18-4-sb1-bcm91250a-di | 0.13 | mips, mipsel fat-modules-2.6.18-4-sb1a-bcm91480b-di | 0.13 | mips, mipsel fat-modules-2.6.18-4-sparc32-di | 1.20 | sparc fat-modules-2.6.18-4-sparc64-di | 1.20 | sparc fb-modules-2.6.18-4-486-di | 1.44 | i386 fb-modules-2.6.18-4-alpha-generic-di | 0.17 | alpha fb-modules-2.6.18-4-amd64-di | 1.21 | amd64 fb-modules-2.6.18-4-itanium-di | 1.18 | ia64 fb-modules-2.6.18-4-sb1-bcm91250a-di | 0.13 | mips, mipsel fb-modules-2.6.18-4-sb1a-bcm91480b-di | 0.13 | mips, mipsel firewire-core-modules-2.6.18-4-486-di | 1.44 | i386 firewire-core-modules-2.6.18-4-amd64-di | 1.21 | amd64 firewire-core-modules-2.6.18-4-itanium-di | 1.18 | ia64 firewire-core-modules-2.6.18-4-powerpc-di | 1.29 | powerpc firewire-core-modules-2.6.18-4-powerpc-miboot-di | 1.29 | powerpc firewire-core-modules-2.6.18-4-powerpc64-di | 1.29 | powerpc firewire-core-modules-2.6.18-4-prep-di | 1.29 | powerpc firmware-modules-2.6.18-4-486-di | 1.44 | i386 firmware-modules-2.6.18-4-alpha-generic-di | 0.17 | alpha firmware-modules-2.6.18-4-amd64-di | 1.21 | amd64 firmware-modules-2.6.18-4-itanium-di | 1.18 | ia64 firmware-modules-2.6.18-4-powerpc-di | 1.29 | powerpc firmware-modules-2.6.18-4-powerpc-miboot-di | 1.29 | powerpc firmware-modules-2.6.18-4-powerpc64-di | 1.29 | powerpc firmware-modules-2.6.18-4-prep-di | 1.29 | powerpc floppy-modules-2.6.18-4-486-di | 1.44 | i386 floppy-modules-2.6.18-4-amd64-di | 1.21 | amd64 floppy-modules-2.6.18-4-powerpc-di | 1.29 | powerpc floppy-modules-2.6.18-4-powerpc-miboot-di | 1.29 | powerpc floppy-modules-2.6.18-4-powerpc64-di | 1.29 | powerpc floppy-modules-2.6.18-4-prep-di | 1.29 | powerpc fs-common-modules-2.6.18-4-powerpc-di | 1.29 | powerpc fs-common-modules-2.6.18-4-powerpc-miboot-di | 1.29 | powerpc fs-common-modules-2.6.18-4-powerpc64-di | 1.29 | powerpc fs-common-modules-2.6.18-4-prep-di | 1.29 | powerpc gspca-modules-2.6.18-4-486 | 2.6.18+01.00.04-7+etch2 | i386 gspca-modules-2.6.18-4-686 | 2.6.18+01.00.04-7+etch2 | i386 gspca-modules-2.6.18-4-686-bigmem | 2.6.18+01.00.04-7+etch2 | i386 gspca-modules-2.6.18-4-amd64 | 2.6.18+01.00.04-7+etch2 | amd64, i386 gspca-modules-2.6.18-4-k7 | 2.6.18+01.00.04-7+etch2 | i386 gspca-modules-2.6.18-4-powerpc | 2.6.18+01.00.04-7+etch2 | powerpc gspca-modules-2.6.18-4-powerpc-miboot | 2.6.18+01.00.04-7+etch2 | powerpc gspca-modules-2.6.18-4-powerpc-smp | 2.6.18+01.00.04-7+etch2 | powerpc gspca-modules-2.6.18-4-powerpc64 | 2.6.18+01.00.04-7+etch2 | powerpc gspca-modules-2.6.18-4-prep | 2.6.18+01.00.04-7+etch2 | powerpc gspca-modules-2.6.18-4-vserver-686 | 2.6.18+01.00.04-7+etch2 | i386 gspca-modules-2.6.18-4-vserver-amd64 | 2.6.18+01.00.04-7+etch2 | amd64 gspca-modules-2.6.18-4-vserver-k7 | 2.6.18+01.00.04-7+etch2 | i386 gspca-modules-2.6.18-4-vserver-powerpc | 2.6.18+01.00.04-7+etch2 | powerpc gspca-modules-2.6.18-4-vserver-powerpc64 | 2.6.18+01.00.04-7+etch2 | powerpc gspca-modules-2.6.18-4-xen-686 | 2.6.18+01.00.04-7+etch2 | i386 gspca-modules-2.6.18-4-xen-amd64 | 2.6.18+01.00.04-7+etch2 | amd64 gspca-modules-2.6.18-4-xen-vserver-686 | 2.6.18+01.00.04-7+etch2 | i386 gspca-modules-2.6.18-4-xen-vserver-amd64 | 2.6.18+01.00.04-7+etch2 | amd64 hfs-modules-2.6.18-4-powerpc-di | 1.29 | powerpc hfs-modules-2.6.18-4-powerpc-miboot-di | 1.29 | powerpc hfs-modules-2.6.18-4-powerpc64-di | 1.29 | powerpc hfs-modules-2.6.18-4-prep-di | 1.29 | powerpc hypervisor-modules-2.6.18-4-powerpc64-di | 1.29 | powerpc ide-core-modules-2.6.18-4-486-di | 1.44 | i386 ide-core-modules-2.6.18-4-alpha-generic-di | 0.17 | alpha ide-core-modules-2.6.18-4-amd64-di | 1.21 | amd64 ide-core-modules-2.6.18-4-iop32x-di | 1.10 | arm ide-core-modules-2.6.18-4-itanium-di | 1.18 | ia64 ide-modules-2.6.18-4-486-di | 1.44 | i386 ide-modules-2.6.18-4-alpha-generic-di | 0.17 | alpha ide-modules-2.6.18-4-amd64-di | 1.21 | amd64 ide-modules-2.6.18-4-footbridge-di | 1.10 | arm ide-modules-2.6.18-4-iop32x-di | 1.10 | arm ide-modules-2.6.18-4-itanium-di | 1.18 | ia64 ide-modules-2.6.18-4-parisc-di | 1.17 | hppa ide-modules-2.6.18-4-parisc64-di | 1.17 | hppa ide-modules-2.6.18-4-powerpc-di | 1.29 | powerpc ide-modules-2.6.18-4-powerpc-miboot-di | 1.29 | powerpc ide-modules-2.6.18-4-powerpc64-di | 1.29 | powerpc ide-modules-2.6.18-4-prep-di | 1.29 | powerpc ide-modules-2.6.18-4-sb1-bcm91250a-di | 0.13 | mips, mipsel ide-modules-2.6.18-4-sb1a-bcm91480b-di | 0.13 | mips, mipsel ide-modules-2.6.18-4-sparc64-di | 1.20 | sparc input-modules-2.6.18-4-486-di | 1.44 | i386 input-modules-2.6.18-4-amd64-di | 1.21 | amd64 input-modules-2.6.18-4-itanium-di | 1.18 | ia64 input-modules-2.6.18-4-ixp4xx-di | 1.10 | arm input-modules-2.6.18-4-parisc-di | 1.17 | hppa input-modules-2.6.18-4-parisc64-di | 1.17 | hppa input-modules-2.6.18-4-powerpc-di | 1.29 | powerpc input-modules-2.6.18-4-powerpc-miboot-di | 1.29 | powerpc input-modules-2.6.18-4-powerpc64-di | 1.29 | powerpc input-modules-2.6.18-4-prep-di | 1.29 | powerpc input-modules-2.6.18-4-sb1-bcm91250a-di | 0.13 | mips, mipsel input-modules-2.6.18-4-sb1a-bcm91480b-di | 0.13 | mips, mipsel ipv6-modules-2.6.18-4-486-di | 1.44 | i386 ipv6-modules-2.6.18-4-alpha-generic-di | 0.17 | alpha ipv6-modules-2.6.18-4-amd64-di | 1.21 | amd64 ipv6-modules-2.6.18-4-itanium-di | 1.18 | ia64 ipv6-modules-2.6.18-4-parisc-di | 1.17 | hppa ipv6-modules-2.6.18-4-parisc64-di | 1.17 | hppa ipv6-modules-2.6.18-4-powerpc-di | 1.29 | powerpc ipv6-modules-2.6.18-4-powerpc-miboot-di | 1.29 | powerpc ipv6-modules-2.6.18-4-powerpc64-di | 1.29 | powerpc ipv6-modules-2.6.18-4-prep-di | 1.29 | powerpc ipv6-modules-2.6.18-4-r3k-kn02-di | 0.13 | mipsel ipv6-modules-2.6.18-4-r4k-ip22-di | 0.13 | mips ipv6-modules-2.6.18-4-r4k-kn04-di | 0.13 | mipsel ipv6-modules-2.6.18-4-r5k-cobalt-di | 0.13 | mipsel ipv6-modules-2.6.18-4-r5k-ip32-di | 0.13 | mips ipv6-modules-2.6.18-4-sb1-bcm91250a-di | 0.13 | mips, mipsel ipv6-modules-2.6.18-4-sb1a-bcm91480b-di | 0.13 | mips, mipsel ipv6-modules-2.6.18-4-sparc32-di | 1.20 | sparc ipv6-modules-2.6.18-4-sparc64-di | 1.20 | sparc ipw2100-modules-2.6.18-4-486 | 2.6.18+1.2.1-4+etch1 | i386 ipw2100-modules-2.6.18-4-686 | 2.6.18+1.2.1-4+etch1 | i386 ipw2100-modules-2.6.18-4-686-bigmem | 2.6.18+1.2.1-4+etch1 | i386 ipw2100-modules-2.6.18-4-amd64 | 2.6.18+1.2.1-4+etch1 | amd64, i386 ipw2100-modules-2.6.18-4-k7 | 2.6.18+1.2.1-4+etch1 | i386 ipw2100-modules-2.6.18-4-vserver-686 | 2.6.18+1.2.1-4+etch1 | i386 ipw2100-modules-2.6.18-4-vserver-amd64 | 2.6.18+1.2.1-4+etch1 | amd64 ipw2100-modules-2.6.18-4-vserver-k7 | 2.6.18+1.2.1-4+etch1 | i386 ipw2100-modules-2.6.18-4-xen-686 | 2.6.18+1.2.1-4+etch1 | i386 ipw2100-modules-2.6.18-4-xen-amd64 | 2.6.18+1.2.1-4+etch1 | amd64 ipw2100-modules-2.6.18-4-xen-vserver-686 | 2.6.18+1.2.1-4+etch1 | i386 ipw2100-modules-2.6.18-4-xen-vserver-amd64 | 2.6.18+1.2.1-4+etch1 | amd64 ipw2200-modules-2.6.18-4-486 | 2.6.18+1.2.0-4+etch1 | i386 ipw2200-modules-2.6.18-4-686 | 2.6.18+1.2.0-4+etch1 | i386 ipw2200-modules-2.6.18-4-686-bigmem | 2.6.18+1.2.0-4+etch1 | i386 ipw2200-modules-2.6.18-4-amd64 | 2.6.18+1.2.0-4+etch1 | amd64, i386 ipw2200-modules-2.6.18-4-k7 | 2.6.18+1.2.0-4+etch1 | i386 ipw2200-modules-2.6.18-4-vserver-686 | 2.6.18+1.2.0-4+etch1 | i386 ipw2200-modules-2.6.18-4-vserver-amd64 | 2.6.18+1.2.0-4+etch1 | amd64 ipw2200-modules-2.6.18-4-vserver-k7 | 2.6.18+1.2.0-4+etch1 | i386 ipw2200-modules-2.6.18-4-xen-686 | 2.6.18+1.2.0-4+etch1 | i386 ipw2200-modules-2.6.18-4-xen-amd64 | 2.6.18+1.2.0-4+etch1 | amd64 ipw2200-modules-2.6.18-4-xen-vserver-686 | 2.6.18+1.2.0-4+etch1 | i386 ipw2200-modules-2.6.18-4-xen-vserver-amd64 | 2.6.18+1.2.0-4+etch1 | amd64 ipw3945-modules-2.6.18-4-486 | 2.6.18+1.1.2-4+etch1 | i386 ipw3945-modules-2.6.18-4-686 | 2.6.18+1.1.2-4+etch1 | i386 ipw3945-modules-2.6.18-4-686-bigmem | 2.6.18+1.1.2-4+etch1 | i386 ipw3945-modules-2.6.18-4-amd64 | 2.6.18+1.1.2-4+etch1 | amd64, i386 ipw3945-modules-2.6.18-4-k7 | 2.6.18+1.1.2-4+etch1 | i386 ipw3945-modules-2.6.18-4-vserver-686 | 2.6.18+1.1.2-4+etch1 | i386 ipw3945-modules-2.6.18-4-vserver-amd64 | 2.6.18+1.1.2-4+etch1 | amd64 ipw3945-modules-2.6.18-4-vserver-k7 | 2.6.18+1.1.2-4+etch1 | i386 ipw3945-modules-2.6.18-4-xen-686 | 2.6.18+1.1.2-4+etch1 | i386 ipw3945-modules-2.6.18-4-xen-amd64 | 2.6.18+1.1.2-4+etch1 | amd64 ipw3945-modules-2.6.18-4-xen-vserver-686 | 2.6.18+1.1.2-4+etch1 | i386 ipw3945-modules-2.6.18-4-xen-vserver-amd64 | 2.6.18+1.1.2-4+etch1 | amd64 irda-modules-2.6.18-4-486-di | 1.44 | i386 irda-modules-2.6.18-4-amd64-di | 1.21 | amd64 irda-modules-2.6.18-4-itanium-di | 1.18 | ia64 irda-modules-2.6.18-4-powerpc-di | 1.29 | powerpc irda-modules-2.6.18-4-powerpc-miboot-di | 1.29 | powerpc irda-modules-2.6.18-4-powerpc64-di | 1.29 | powerpc irda-modules-2.6.18-4-prep-di | 1.29 | powerpc ivtv-modules-2.6.18-4-486 | 2.6.18+0.8.2-4+etch1 | i386 ivtv-modules-2.6.18-4-686 | 2.6.18+0.8.2-4+etch1 | i386 ivtv-modules-2.6.18-4-686-bigmem | 2.6.18+0.8.2-4+etch1 | i386 ivtv-modules-2.6.18-4-alpha-generic | 2.6.18+0.8.2-4+etch1 | alpha ivtv-modules-2.6.18-4-alpha-legacy | 2.6.18+0.8.2-4+etch1 | alpha ivtv-modules-2.6.18-4-alpha-smp | 2.6.18+0.8.2-4+etch1 | alpha ivtv-modules-2.6.18-4-amd64 | 2.6.18+0.8.2-4+etch1 | amd64, i386 ivtv-modules-2.6.18-4-itanium | 2.6.18+0.8.2-4+etch1 | ia64 ivtv-modules-2.6.18-4-k7 | 2.6.18+0.8.2-4+etch1 | i386 ivtv-modules-2.6.18-4-mckinley | 2.6.18+0.8.2-4+etch1 | ia64 ivtv-modules-2.6.18-4-parisc | 2.6.18+0.8.2-4+etch1 | hppa ivtv-modules-2.6.18-4-parisc-smp | 2.6.18+0.8.2-4+etch1 | hppa ivtv-modules-2.6.18-4-parisc64 | 2.6.18+0.8.2-4+etch1 | hppa ivtv-modules-2.6.18-4-parisc64-smp | 2.6.18+0.8.2-4+etch1 | hppa ivtv-modules-2.6.18-4-powerpc | 2.6.18+0.8.2-4+etch1 | powerpc ivtv-modules-2.6.18-4-powerpc-miboot | 2.6.18+0.8.2-4+etch1 | powerpc ivtv-modules-2.6.18-4-powerpc-smp | 2.6.18+0.8.2-4+etch1 | powerpc ivtv-modules-2.6.18-4-powerpc64 | 2.6.18+0.8.2-4+etch1 | powerpc ivtv-modules-2.6.18-4-prep | 2.6.18+0.8.2-4+etch1 | powerpc ivtv-modules-2.6.18-4-sparc32 | 2.6.18+0.8.2-4+etch1 | sparc ivtv-modules-2.6.18-4-sparc64 | 2.6.18+0.8.2-4+etch1 | sparc ivtv-modules-2.6.18-4-sparc64-smp | 2.6.18+0.8.2-4+etch1 | sparc ivtv-modules-2.6.18-4-vserver-686 | 2.6.18+0.8.2-4+etch1 | i386 ivtv-modules-2.6.18-4-vserver-alpha | 2.6.18+0.8.2-4+etch1 | alpha ivtv-modules-2.6.18-4-vserver-amd64 | 2.6.18+0.8.2-4+etch1 | amd64 ivtv-modules-2.6.18-4-vserver-k7 | 2.6.18+0.8.2-4+etch1 | i386 ivtv-modules-2.6.18-4-vserver-powerpc | 2.6.18+0.8.2-4+etch1 | powerpc ivtv-modules-2.6.18-4-vserver-powerpc64 | 2.6.18+0.8.2-4+etch1 | powerpc ivtv-modules-2.6.18-4-vserver-sparc64 | 2.6.18+0.8.2-4+etch1 | sparc ivtv-modules-2.6.18-4-xen-686 | 2.6.18+0.8.2-4+etch1 | i386 ivtv-modules-2.6.18-4-xen-amd64 | 2.6.18+0.8.2-4+etch1 | amd64 ivtv-modules-2.6.18-4-xen-vserver-686 | 2.6.18+0.8.2-4+etch1 | i386 ivtv-modules-2.6.18-4-xen-vserver-amd64 | 2.6.18+0.8.2-4+etch1 | amd64 jfs-modules-2.6.18-4-486-di | 1.44 | i386 jfs-modules-2.6.18-4-alpha-generic-di | 0.17 | alpha jfs-modules-2.6.18-4-amd64-di | 1.21 | amd64 jfs-modules-2.6.18-4-itanium-di | 1.18 | ia64 jfs-modules-2.6.18-4-powerpc-di | 1.29 | powerpc jfs-modules-2.6.18-4-powerpc-miboot-di | 1.29 | powerpc jfs-modules-2.6.18-4-powerpc64-di | 1.29 | powerpc jfs-modules-2.6.18-4-prep-di | 1.29 | powerpc jfs-modules-2.6.18-4-qemu-di | 0.13 | mips, mipsel jfs-modules-2.6.18-4-r4k-ip22-di | 0.13 | mips jfs-modules-2.6.18-4-r5k-cobalt-di | 0.13 | mipsel jfs-modules-2.6.18-4-r5k-ip32-di | 0.13 | mips jfs-modules-2.6.18-4-sb1-bcm91250a-di | 0.13 | mips, mipsel jfs-modules-2.6.18-4-sb1a-bcm91480b-di | 0.13 | mips, mipsel jfs-modules-2.6.18-4-sparc64-di | 1.20 | sparc kernel-image-2.6.18-4-486-di | 1.44 | i386 kernel-image-2.6.18-4-alpha-generic-di | 0.17 | alpha kernel-image-2.6.18-4-amd64-di | 1.21 | amd64 kernel-image-2.6.18-4-footbridge-di | 1.10 | arm kernel-image-2.6.18-4-iop32x-di | 1.10 | arm kernel-image-2.6.18-4-itanium-di | 1.18 | ia64 kernel-image-2.6.18-4-ixp4xx-di | 1.10 | arm kernel-image-2.6.18-4-parisc-di | 1.17 | hppa kernel-image-2.6.18-4-parisc64-di | 1.17 | hppa kernel-image-2.6.18-4-powerpc-di | 1.29 | powerpc kernel-image-2.6.18-4-powerpc-miboot-di | 1.29 | powerpc kernel-image-2.6.18-4-powerpc64-di | 1.29 | powerpc kernel-image-2.6.18-4-prep-di | 1.29 | powerpc kernel-image-2.6.18-4-qemu-di | 0.13 | mips, mipsel kernel-image-2.6.18-4-r3k-kn02-di | 0.13 | mipsel kernel-image-2.6.18-4-r4k-ip22-di | 0.13 | mips kernel-image-2.6.18-4-r4k-kn04-di | 0.13 | mipsel kernel-image-2.6.18-4-r5k-cobalt-di | 0.13 | mipsel kernel-image-2.6.18-4-r5k-ip32-di | 0.13 | mips kernel-image-2.6.18-4-rpc-di | 1.10 | arm kernel-image-2.6.18-4-s390-di | 0.13 | s390 kernel-image-2.6.18-4-s390-tape-di | 0.13 | s390 kernel-image-2.6.18-4-sb1-bcm91250a-di | 0.13 | mips, mipsel kernel-image-2.6.18-4-sb1a-bcm91480b-di | 0.13 | mips, mipsel kernel-image-2.6.18-4-sparc32-di | 1.20 | sparc kernel-image-2.6.18-4-sparc64-di | 1.20 | sparc kqemu-modules-2.6.18-4-486 | 2.6.18+1.3.0~pre9-4 | i386 kqemu-modules-2.6.18-4-686 | 2.6.18+1.3.0~pre9-4 | i386 kqemu-modules-2.6.18-4-686-bigmem | 2.6.18+1.3.0~pre9-4 | i386 kqemu-modules-2.6.18-4-k7 | 2.6.18+1.3.0~pre9-4 | i386 linux-headers-2.6.18-4 | 2.6.18.dfsg.1-12 | alpha, amd64, arm, hppa, i386, ia64, mips, mipsel, powerpc, s390, sparc linux-headers-2.6.18-4-486 | 2.6.18.dfsg.1-12 | i386 linux-headers-2.6.18-4-686 | 2.6.18.dfsg.1-12 | i386 linux-headers-2.6.18-4-686-bigmem | 2.6.18.dfsg.1-12 | i386 linux-headers-2.6.18-4-all | 2.6.18.dfsg.1-12 | alpha, amd64, arm, hppa, i386, ia64, mips, mipsel, powerpc, s390, sparc linux-headers-2.6.18-4-all-alpha | 2.6.18.dfsg.1-12 | alpha linux-headers-2.6.18-4-all-amd64 | 2.6.18.dfsg.1-12 | amd64 linux-headers-2.6.18-4-all-arm | 2.6.18.dfsg.1-12 | arm linux-headers-2.6.18-4-all-hppa | 2.6.18.dfsg.1-12 | hppa linux-headers-2.6.18-4-all-i386 | 2.6.18.dfsg.1-12 | i386 linux-headers-2.6.18-4-all-ia64 | 2.6.18.dfsg.1-12 | ia64 linux-headers-2.6.18-4-all-mips | 2.6.18.dfsg.1-12 | mips linux-headers-2.6.18-4-all-mipsel | 2.6.18.dfsg.1-12 | mipsel linux-headers-2.6.18-4-all-powerpc | 2.6.18.dfsg.1-12 | powerpc linux-headers-2.6.18-4-all-s390 | 2.6.18.dfsg.1-12 | s390 linux-headers-2.6.18-4-all-sparc | 2.6.18.dfsg.1-12 | sparc linux-headers-2.6.18-4-alpha-generic | 2.6.18.dfsg.1-12 | alpha linux-headers-2.6.18-4-alpha-legacy | 2.6.18.dfsg.1-12 | alpha linux-headers-2.6.18-4-alpha-smp | 2.6.18.dfsg.1-12 | alpha linux-headers-2.6.18-4-amd64 | 2.6.18.dfsg.1-12 | amd64, i386 linux-headers-2.6.18-4-footbridge | 2.6.18.dfsg.1-12 | arm linux-headers-2.6.18-4-iop32x | 2.6.18.dfsg.1-12 | arm linux-headers-2.6.18-4-itanium | 2.6.18.dfsg.1-12 | ia64 linux-headers-2.6.18-4-ixp4xx | 2.6.18.dfsg.1-12 | arm linux-headers-2.6.18-4-k7 | 2.6.18.dfsg.1-12 | i386 linux-headers-2.6.18-4-mckinley | 2.6.18.dfsg.1-12 | ia64 linux-headers-2.6.18-4-parisc | 2.6.18.dfsg.1-12 | hppa linux-headers-2.6.18-4-parisc-smp | 2.6.18.dfsg.1-12 | hppa linux-headers-2.6.18-4-parisc64 | 2.6.18.dfsg.1-12 | hppa linux-headers-2.6.18-4-parisc64-smp | 2.6.18.dfsg.1-12 | hppa linux-headers-2.6.18-4-powerpc | 2.6.18.dfsg.1-12 | powerpc linux-headers-2.6.18-4-powerpc-miboot | 2.6.18.dfsg.1-12 | powerpc linux-headers-2.6.18-4-powerpc-smp | 2.6.18.dfsg.1-12 | powerpc linux-headers-2.6.18-4-powerpc64 | 2.6.18.dfsg.1-12 | powerpc linux-headers-2.6.18-4-prep | 2.6.18.dfsg.1-12 | powerpc linux-headers-2.6.18-4-qemu | 2.6.18.dfsg.1-12 | mips, mipsel linux-headers-2.6.18-4-r3k-kn02 | 2.6.18.dfsg.1-12 | mipsel linux-headers-2.6.18-4-r4k-ip22 | 2.6.18.dfsg.1-12 | mips linux-headers-2.6.18-4-r4k-kn04 | 2.6.18.dfsg.1-12 | mipsel linux-headers-2.6.18-4-r5k-cobalt | 2.6.18.dfsg.1-12 | mipsel linux-headers-2.6.18-4-r5k-ip32 | 2.6.18.dfsg.1-12 | mips linux-headers-2.6.18-4-rpc | 2.6.18.dfsg.1-12 | arm linux-headers-2.6.18-4-s390 | 2.6.18.dfsg.1-12 | s390 linux-headers-2.6.18-4-s390x | 2.6.18.dfsg.1-12 | s390 linux-headers-2.6.18-4-s3c2410 | 2.6.18.dfsg.1-12 | arm linux-headers-2.6.18-4-sb1-bcm91250a | 2.6.18.dfsg.1-12 | mips, mipsel linux-headers-2.6.18-4-sb1a-bcm91480b | 2.6.18.dfsg.1-12 | mips, mipsel linux-headers-2.6.18-4-sparc32 | 2.6.18.dfsg.1-12 | sparc linux-headers-2.6.18-4-sparc64 | 2.6.18.dfsg.1-12 | sparc linux-headers-2.6.18-4-sparc64-smp | 2.6.18.dfsg.1-12 | sparc linux-headers-2.6.18-4-vserver | 2.6.18.dfsg.1-12 | alpha, amd64, i386, powerpc, s390, sparc linux-headers-2.6.18-4-vserver-686 | 2.6.18.dfsg.1-12 | i386 linux-headers-2.6.18-4-vserver-alpha | 2.6.18.dfsg.1-12 | alpha linux-headers-2.6.18-4-vserver-amd64 | 2.6.18.dfsg.1-12 | amd64 linux-headers-2.6.18-4-vserver-k7 | 2.6.18.dfsg.1-12 | i386 linux-headers-2.6.18-4-vserver-powerpc | 2.6.18.dfsg.1-12 | powerpc linux-headers-2.6.18-4-vserver-powerpc64 | 2.6.18.dfsg.1-12 | powerpc linux-headers-2.6.18-4-vserver-s390x | 2.6.18.dfsg.1-12 | s390 linux-headers-2.6.18-4-vserver-sparc64 | 2.6.18.dfsg.1-12 | sparc linux-headers-2.6.18-4-xen | 2.6.18.dfsg.1-12 | amd64, i386 linux-headers-2.6.18-4-xen-686 | 2.6.18.dfsg.1-12 | i386 linux-headers-2.6.18-4-xen-amd64 | 2.6.18.dfsg.1-12 | amd64 linux-headers-2.6.18-4-xen-vserver | 2.6.18.dfsg.1-12 | amd64, i386 linux-headers-2.6.18-4-xen-vserver-686 | 2.6.18.dfsg.1-12 | i386 linux-headers-2.6.18-4-xen-vserver-amd64 | 2.6.18.dfsg.1-12 | amd64 linux-image-2.6.18-4-486 | 2.6.18.dfsg.1-12 | i386 linux-image-2.6.18-4-686 | 2.6.18.dfsg.1-12 | i386 linux-image-2.6.18-4-686-bigmem | 2.6.18.dfsg.1-12 | i386 linux-image-2.6.18-4-alpha-generic | 2.6.18.dfsg.1-12 | alpha linux-image-2.6.18-4-alpha-legacy | 2.6.18.dfsg.1-12 | alpha linux-image-2.6.18-4-alpha-smp | 2.6.18.dfsg.1-12 | alpha linux-image-2.6.18-4-amd64 | 2.6.18.dfsg.1-12 | amd64, i386 linux-image-2.6.18-4-footbridge | 2.6.18.dfsg.1-12 | arm linux-image-2.6.18-4-iop32x | 2.6.18.dfsg.1-12 | arm linux-image-2.6.18-4-itanium | 2.6.18.dfsg.1-12 | ia64 linux-image-2.6.18-4-ixp4xx | 2.6.18.dfsg.1-12 | arm linux-image-2.6.18-4-k7 | 2.6.18.dfsg.1-12 | i386 linux-image-2.6.18-4-mckinley | 2.6.18.dfsg.1-12 | ia64 linux-image-2.6.18-4-parisc | 2.6.18.dfsg.1-12 | hppa linux-image-2.6.18-4-parisc-smp | 2.6.18.dfsg.1-12 | hppa linux-image-2.6.18-4-parisc64 | 2.6.18.dfsg.1-12 | hppa linux-image-2.6.18-4-parisc64-smp | 2.6.18.dfsg.1-12 | hppa linux-image-2.6.18-4-powerpc | 2.6.18.dfsg.1-12 | powerpc linux-image-2.6.18-4-powerpc-miboot | 2.6.18.dfsg.1-12 | powerpc linux-image-2.6.18-4-powerpc-smp | 2.6.18.dfsg.1-12 | powerpc linux-image-2.6.18-4-powerpc64 | 2.6.18.dfsg.1-12 | powerpc linux-image-2.6.18-4-prep | 2.6.18.dfsg.1-12 | powerpc linux-image-2.6.18-4-qemu | 2.6.18.dfsg.1-12 | mips, mipsel linux-image-2.6.18-4-r3k-kn02 | 2.6.18.dfsg.1-12 | mipsel linux-image-2.6.18-4-r4k-ip22 | 2.6.18.dfsg.1-12 | mips linux-image-2.6.18-4-r4k-kn04 | 2.6.18.dfsg.1-12 | mipsel linux-image-2.6.18-4-r5k-cobalt | 2.6.18.dfsg.1-12 | mipsel linux-image-2.6.18-4-r5k-ip32 | 2.6.18.dfsg.1-12 | mips linux-image-2.6.18-4-rpc | 2.6.18.dfsg.1-12 | arm linux-image-2.6.18-4-s390 | 2.6.18.dfsg.1-12 | s390 linux-image-2.6.18-4-s390-tape | 2.6.18.dfsg.1-12 | s390 linux-image-2.6.18-4-s390x | 2.6.18.dfsg.1-12 | s390 linux-image-2.6.18-4-s3c2410 | 2.6.18.dfsg.1-12 | arm linux-image-2.6.18-4-sb1-bcm91250a | 2.6.18.dfsg.1-12 | mips, mipsel linux-image-2.6.18-4-sb1a-bcm91480b | 2.6.18.dfsg.1-12 | mips, mipsel linux-image-2.6.18-4-sparc32 | 2.6.18.dfsg.1-12 | sparc linux-image-2.6.18-4-sparc64 | 2.6.18.dfsg.1-12 | sparc linux-image-2.6.18-4-sparc64-smp | 2.6.18.dfsg.1-12 | sparc linux-image-2.6.18-4-vserver-686 | 2.6.18.dfsg.1-12 | i386 linux-image-2.6.18-4-vserver-alpha | 2.6.18.dfsg.1-12 | alpha linux-image-2.6.18-4-vserver-amd64 | 2.6.18.dfsg.1-12 | amd64 linux-image-2.6.18-4-vserver-k7 | 2.6.18.dfsg.1-12 | i386 linux-image-2.6.18-4-vserver-powerpc | 2.6.18.dfsg.1-12 | powerpc linux-image-2.6.18-4-vserver-powerpc64 | 2.6.18.dfsg.1-12 | powerpc linux-image-2.6.18-4-vserver-s390x | 2.6.18.dfsg.1-12 | s390 linux-image-2.6.18-4-vserver-sparc64 | 2.6.18.dfsg.1-12 | sparc linux-image-2.6.18-4-xen-686 | 2.6.18.dfsg.1-12 | i386 linux-image-2.6.18-4-xen-amd64 | 2.6.18.dfsg.1-12 | amd64 linux-image-2.6.18-4-xen-vserver-686 | 2.6.18.dfsg.1-12 | i386 linux-image-2.6.18-4-xen-vserver-amd64 | 2.6.18.dfsg.1-12 | amd64 linux-modules-2.6.18-4-xen-686 | 2.6.18.dfsg.1-12 | i386 linux-modules-2.6.18-4-xen-amd64 | 2.6.18.dfsg.1-12 | amd64 linux-modules-2.6.18-4-xen-vserver-686 | 2.6.18.dfsg.1-12 | i386 linux-modules-2.6.18-4-xen-vserver-amd64 | 2.6.18.dfsg.1-12 | amd64 linux-support-2.6.18-4 | 2.6.18.dfsg.1-12 | all loop-aes-modules-2.6.18-4-486 | 3.1d-13 | i386 loop-aes-modules-2.6.18-4-486-di | 1.03 | i386 loop-aes-modules-2.6.18-4-686 | 3.1d-13 | i386 loop-aes-modules-2.6.18-4-686-bigmem | 3.1d-13 | i386 loop-aes-modules-2.6.18-4-alpha-generic | 3.1d-13 | alpha loop-aes-modules-2.6.18-4-alpha-generic-di | 1.03 | alpha loop-aes-modules-2.6.18-4-alpha-legacy | 3.1d-13 | alpha loop-aes-modules-2.6.18-4-alpha-smp | 3.1d-13 | alpha loop-aes-modules-2.6.18-4-amd64 | 3.1d-13 | amd64 loop-aes-modules-2.6.18-4-amd64-di | 1.03 | amd64 loop-aes-modules-2.6.18-4-footbridge | 3.1d-13 | arm loop-aes-modules-2.6.18-4-footbridge-di | 1.04 | arm loop-aes-modules-2.6.18-4-iop32x | 3.1d-13 | arm loop-aes-modules-2.6.18-4-iop32x-di | 1.04 | arm loop-aes-modules-2.6.18-4-itanium | 3.1d-13 | ia64 loop-aes-modules-2.6.18-4-itanium-di | 1.02 | ia64 loop-aes-modules-2.6.18-4-ixp4xx | 3.1d-13 | arm loop-aes-modules-2.6.18-4-ixp4xx-di | 1.04 | arm loop-aes-modules-2.6.18-4-k7 | 3.1d-13 | i386 loop-aes-modules-2.6.18-4-mckinley | 3.1d-13 | ia64 loop-aes-modules-2.6.18-4-parisc | 3.1d-13 | hppa loop-aes-modules-2.6.18-4-parisc-di | 1.03 | hppa loop-aes-modules-2.6.18-4-parisc-smp | 3.1d-13 | hppa loop-aes-modules-2.6.18-4-parisc64 | 3.1d-13 | hppa loop-aes-modules-2.6.18-4-parisc64-di | 1.03 | hppa loop-aes-modules-2.6.18-4-parisc64-smp | 3.1d-13 | hppa loop-aes-modules-2.6.18-4-powerpc | 3.1d-13 | powerpc loop-aes-modules-2.6.18-4-powerpc-di | 1.03 | powerpc loop-aes-modules-2.6.18-4-powerpc-miboot | 3.1d-13 | powerpc loop-aes-modules-2.6.18-4-powerpc-miboot-di | 1.03 | powerpc loop-aes-modules-2.6.18-4-powerpc-smp | 3.1d-13 | powerpc loop-aes-modules-2.6.18-4-powerpc64 | 3.1d-13 | powerpc loop-aes-modules-2.6.18-4-powerpc64-di | 1.03 | powerpc loop-aes-modules-2.6.18-4-prep | 3.1d-13 | powerpc loop-aes-modules-2.6.18-4-prep-di | 1.03 | powerpc loop-aes-modules-2.6.18-4-qemu | 3.1d-13 | mips, mipsel loop-aes-modules-2.6.18-4-qemu-di | 1.01 | mips loop-aes-modules-2.6.18-4-qemu-di | 1.03 | mipsel loop-aes-modules-2.6.18-4-r3k-kn02 | 3.1d-13 | mipsel loop-aes-modules-2.6.18-4-r3k-kn02-di | 1.03 | mipsel loop-aes-modules-2.6.18-4-r4k-ip22 | 3.1d-13 | mips loop-aes-modules-2.6.18-4-r4k-ip22-di | 1.01 | mips loop-aes-modules-2.6.18-4-r4k-kn04 | 3.1d-13 | mipsel loop-aes-modules-2.6.18-4-r4k-kn04-di | 1.03 | mipsel loop-aes-modules-2.6.18-4-r5k-cobalt | 3.1d-13 | mipsel loop-aes-modules-2.6.18-4-r5k-cobalt-di | 1.03 | mipsel loop-aes-modules-2.6.18-4-r5k-ip32 | 3.1d-13 | mips loop-aes-modules-2.6.18-4-r5k-ip32-di | 1.01 | mips loop-aes-modules-2.6.18-4-rpc | 3.1d-13 | arm loop-aes-modules-2.6.18-4-rpc-di | 1.04 | arm loop-aes-modules-2.6.18-4-s390 | 3.1d-13 | s390 loop-aes-modules-2.6.18-4-s390-di | 1.01 | s390 loop-aes-modules-2.6.18-4-s390x | 3.1d-13 | s390 loop-aes-modules-2.6.18-4-s3c2410 | 3.1d-13 | arm loop-aes-modules-2.6.18-4-sb1-bcm91250a | 3.1d-13 | mips, mipsel loop-aes-modules-2.6.18-4-sb1-bcm91250a-di | 1.01 | mips loop-aes-modules-2.6.18-4-sb1-bcm91250a-di | 1.03 | mipsel loop-aes-modules-2.6.18-4-sb1a-bcm91480b | 3.1d-13 | mips, mipsel loop-aes-modules-2.6.18-4-sb1a-bcm91480b-di | 1.01 | mips loop-aes-modules-2.6.18-4-sb1a-bcm91480b-di | 1.03 | mipsel loop-aes-modules-2.6.18-4-sparc32 | 3.1d-13+b1 | sparc loop-aes-modules-2.6.18-4-sparc32-di | 1.04 | sparc loop-aes-modules-2.6.18-4-sparc64 | 3.1d-13+b1 | sparc loop-aes-modules-2.6.18-4-sparc64-di | 1.04 | sparc loop-aes-modules-2.6.18-4-sparc64-smp | 3.1d-13+b1 | sparc loop-aes-modules-2.6.18-4-vserver-686 | 3.1d-13 | i386 loop-aes-modules-2.6.18-4-vserver-alpha | 3.1d-13 | alpha loop-aes-modules-2.6.18-4-vserver-amd64 | 3.1d-13 | amd64 loop-aes-modules-2.6.18-4-vserver-k7 | 3.1d-13 | i386 loop-aes-modules-2.6.18-4-vserver-powerpc | 3.1d-13 | powerpc loop-aes-modules-2.6.18-4-vserver-powerpc64 | 3.1d-13 | powerpc loop-aes-modules-2.6.18-4-vserver-s390x | 3.1d-13 | s390 loop-aes-modules-2.6.18-4-vserver-sparc64 | 3.1d-13+b1 | sparc loop-aes-modules-2.6.18-4-xen-686 | 3.1d-13 | i386 loop-aes-modules-2.6.18-4-xen-amd64 | 3.1d-13 | amd64 loop-aes-modules-2.6.18-4-xen-vserver-686 | 3.1d-13 | i386 loop-aes-modules-2.6.18-4-xen-vserver-amd64 | 3.1d-13 | amd64 loop-modules-2.6.18-4-486-di | 1.44 | i386 loop-modules-2.6.18-4-amd64-di | 1.21 | amd64 loop-modules-2.6.18-4-footbridge-di | 1.10 | arm loop-modules-2.6.18-4-iop32x-di | 1.10 | arm loop-modules-2.6.18-4-itanium-di | 1.18 | ia64 loop-modules-2.6.18-4-ixp4xx-di | 1.10 | arm loop-modules-2.6.18-4-parisc-di | 1.17 | hppa loop-modules-2.6.18-4-parisc64-di | 1.17 | hppa loop-modules-2.6.18-4-powerpc-di | 1.29 | powerpc loop-modules-2.6.18-4-powerpc-miboot-di | 1.29 | powerpc loop-modules-2.6.18-4-powerpc64-di | 1.29 | powerpc loop-modules-2.6.18-4-prep-di | 1.29 | powerpc loop-modules-2.6.18-4-qemu-di | 0.13 | mips, mipsel loop-modules-2.6.18-4-r4k-ip22-di | 0.13 | mips loop-modules-2.6.18-4-r5k-cobalt-di | 0.13 | mipsel loop-modules-2.6.18-4-r5k-ip32-di | 0.13 | mips loop-modules-2.6.18-4-rpc-di | 1.10 | arm loop-modules-2.6.18-4-sb1-bcm91250a-di | 0.13 | mips, mipsel loop-modules-2.6.18-4-sb1a-bcm91480b-di | 0.13 | mips, mipsel md-modules-2.6.18-4-486-di | 1.44 | i386 md-modules-2.6.18-4-alpha-generic-di | 0.17 | alpha md-modules-2.6.18-4-amd64-di | 1.21 | amd64 md-modules-2.6.18-4-footbridge-di | 1.10 | arm md-modules-2.6.18-4-iop32x-di | 1.10 | arm md-modules-2.6.18-4-itanium-di | 1.18 | ia64 md-modules-2.6.18-4-ixp4xx-di | 1.10 | arm md-modules-2.6.18-4-parisc-di | 1.17 | hppa md-modules-2.6.18-4-parisc64-di | 1.17 | hppa md-modules-2.6.18-4-powerpc-di | 1.29 | powerpc md-modules-2.6.18-4-powerpc-miboot-di | 1.29 | powerpc md-modules-2.6.18-4-powerpc64-di | 1.29 | powerpc md-modules-2.6.18-4-prep-di | 1.29 | powerpc md-modules-2.6.18-4-qemu-di | 0.13 | mips, mipsel md-modules-2.6.18-4-r4k-ip22-di | 0.13 | mips md-modules-2.6.18-4-r5k-cobalt-di | 0.13 | mipsel md-modules-2.6.18-4-r5k-ip32-di | 0.13 | mips md-modules-2.6.18-4-s390-di | 0.13 | s390 md-modules-2.6.18-4-sb1-bcm91250a-di | 0.13 | mips, mipsel md-modules-2.6.18-4-sb1a-bcm91480b-di | 0.13 | mips, mipsel md-modules-2.6.18-4-sparc32-di | 1.20 | sparc md-modules-2.6.18-4-sparc64-di | 1.20 | sparc mol-modules-2.6.18-4-powerpc | 2.6.18+0.9.71.dfsg-7+etch2 | powerpc mol-modules-2.6.18-4-powerpc-miboot | 2.6.18+0.9.71.dfsg-7+etch2 | powerpc mol-modules-2.6.18-4-powerpc-smp | 2.6.18+0.9.71.dfsg-7+etch2 | powerpc mol-modules-2.6.18-4-vserver-powerpc | 2.6.18+0.9.71.dfsg-7+etch2 | powerpc mouse-modules-2.6.18-4-486-di | 1.44 | i386 mouse-modules-2.6.18-4-amd64-di | 1.21 | amd64 mouse-modules-2.6.18-4-itanium-di | 1.18 | ia64 mouse-modules-2.6.18-4-powerpc-di | 1.29 | powerpc mouse-modules-2.6.18-4-powerpc-miboot-di | 1.29 | powerpc mouse-modules-2.6.18-4-powerpc64-di | 1.29 | powerpc mouse-modules-2.6.18-4-prep-di | 1.29 | powerpc nfs-modules-2.6.18-4-r5k-cobalt-di | 0.13 | mipsel nic-extra-modules-2.6.18-4-486-di | 1.44 | i386 nic-extra-modules-2.6.18-4-alpha-generic-di | 0.17 | alpha nic-extra-modules-2.6.18-4-amd64-di | 1.21 | amd64 nic-extra-modules-2.6.18-4-powerpc-di | 1.29 | powerpc nic-extra-modules-2.6.18-4-powerpc-miboot-di | 1.29 | powerpc nic-extra-modules-2.6.18-4-powerpc64-di | 1.29 | powerpc nic-extra-modules-2.6.18-4-prep-di | 1.29 | powerpc nic-modules-2.6.18-4-486-di | 1.44 | i386 nic-modules-2.6.18-4-alpha-generic-di | 0.17 | alpha nic-modules-2.6.18-4-amd64-di | 1.21 | amd64 nic-modules-2.6.18-4-footbridge-di | 1.10 | arm nic-modules-2.6.18-4-iop32x-di | 1.10 | arm nic-modules-2.6.18-4-itanium-di | 1.18 | ia64 nic-modules-2.6.18-4-ixp4xx-di | 1.10 | arm nic-modules-2.6.18-4-parisc-di | 1.17 | hppa nic-modules-2.6.18-4-parisc64-di | 1.17 | hppa nic-modules-2.6.18-4-powerpc-di | 1.29 | powerpc nic-modules-2.6.18-4-powerpc-miboot-di | 1.29 | powerpc nic-modules-2.6.18-4-powerpc64-di | 1.29 | powerpc nic-modules-2.6.18-4-prep-di | 1.29 | powerpc nic-modules-2.6.18-4-s390-di | 0.13 | s390 nic-modules-2.6.18-4-sparc32-di | 1.20 | sparc nic-modules-2.6.18-4-sparc64-di | 1.20 | sparc nic-pcmcia-modules-2.6.18-4-486-di | 1.44 | i386 nic-pcmcia-modules-2.6.18-4-amd64-di | 1.21 | amd64 nic-pcmcia-modules-2.6.18-4-powerpc-di | 1.29 | powerpc nic-pcmcia-modules-2.6.18-4-powerpc-miboot-di | 1.29 | powerpc nic-pcmcia-modules-2.6.18-4-powerpc64-di | 1.29 | powerpc nic-pcmcia-modules-2.6.18-4-prep-di | 1.29 | powerpc nic-shared-modules-2.6.18-4-486-di | 1.44 | i386 nic-shared-modules-2.6.18-4-alpha-generic-di | 0.17 | alpha nic-shared-modules-2.6.18-4-amd64-di | 1.21 | amd64 nic-shared-modules-2.6.18-4-footbridge-di | 1.10 | arm nic-shared-modules-2.6.18-4-itanium-di | 1.18 | ia64 nic-shared-modules-2.6.18-4-powerpc-di | 1.29 | powerpc nic-shared-modules-2.6.18-4-powerpc-miboot-di | 1.29 | powerpc nic-shared-modules-2.6.18-4-powerpc64-di | 1.29 | powerpc nic-shared-modules-2.6.18-4-prep-di | 1.29 | powerpc nic-usb-modules-2.6.18-4-486-di | 1.44 | i386 nic-usb-modules-2.6.18-4-amd64-di | 1.21 | amd64 nic-usb-modules-2.6.18-4-iop32x-di | 1.10 | arm nic-usb-modules-2.6.18-4-itanium-di | 1.18 | ia64 nic-usb-modules-2.6.18-4-ixp4xx-di | 1.10 | arm ntfs-modules-2.6.18-4-486-di | 1.44 | i386 ntfs-modules-2.6.18-4-amd64-di | 1.21 | amd64 ntfs-modules-2.6.18-4-itanium-di | 1.18 | ia64 nvidia-kernel-2.6.18-4-486 | 1.0.8776+6 | i386 nvidia-kernel-2.6.18-4-686 | 1.0.8776+6 | i386 nvidia-kernel-2.6.18-4-amd64 | 1.0.8776+6 | amd64 nvidia-kernel-2.6.18-4-k7 | 1.0.8776+6 | i386 nvidia-kernel-legacy-2.6.18-4-486 | 1.0.7184+6 | i386 nvidia-kernel-legacy-2.6.18-4-686 | 1.0.7184+6 | i386 nvidia-kernel-legacy-2.6.18-4-amd64 | 1.0.7184+6 | amd64 nvidia-kernel-legacy-2.6.18-4-k7 | 1.0.7184+6 | i386 parport-modules-2.6.18-4-486-di | 1.44 | i386 parport-modules-2.6.18-4-alpha-generic-di | 0.17 | alpha parport-modules-2.6.18-4-amd64-di | 1.21 | amd64 parport-modules-2.6.18-4-itanium-di | 1.18 | ia64 pcmcia-modules-2.6.18-4-486-di | 1.44 | i386 pcmcia-modules-2.6.18-4-amd64-di | 1.21 | amd64 pcmcia-modules-2.6.18-4-itanium-di | 1.18 | ia64 pcmcia-modules-2.6.18-4-powerpc-di | 1.29 | powerpc pcmcia-modules-2.6.18-4-powerpc-miboot-di | 1.29 | powerpc pcmcia-modules-2.6.18-4-powerpc64-di | 1.29 | powerpc pcmcia-modules-2.6.18-4-prep-di | 1.29 | powerpc pcmcia-storage-modules-2.6.18-4-486-di | 1.44 | i386 pcmcia-storage-modules-2.6.18-4-amd64-di | 1.21 | amd64 pcmcia-storage-modules-2.6.18-4-powerpc-di | 1.29 | powerpc pcmcia-storage-modules-2.6.18-4-powerpc-miboot-di | 1.29 | powerpc pcmcia-storage-modules-2.6.18-4-powerpc64-di | 1.29 | powerpc pcmcia-storage-modules-2.6.18-4-prep-di | 1.29 | powerpc plip-modules-2.6.18-4-486-di | 1.44 | i386 plip-modules-2.6.18-4-alpha-generic-di | 0.17 | alpha plip-modules-2.6.18-4-amd64-di | 1.21 | amd64 plip-modules-2.6.18-4-itanium-di | 1.18 | ia64 plip-modules-2.6.18-4-sparc32-di | 1.20 | sparc plip-modules-2.6.18-4-sparc64-di | 1.20 | sparc ppp-modules-2.6.18-4-486-di | 1.44 | i386 ppp-modules-2.6.18-4-alpha-generic-di | 0.17 | alpha ppp-modules-2.6.18-4-amd64-di | 1.21 | amd64 ppp-modules-2.6.18-4-itanium-di | 1.18 | ia64 ppp-modules-2.6.18-4-parisc-di | 1.17 | hppa ppp-modules-2.6.18-4-parisc64-di | 1.17 | hppa ppp-modules-2.6.18-4-powerpc-di | 1.29 | powerpc ppp-modules-2.6.18-4-powerpc-miboot-di | 1.29 | powerpc ppp-modules-2.6.18-4-powerpc64-di | 1.29 | powerpc ppp-modules-2.6.18-4-prep-di | 1.29 | powerpc ppp-modules-2.6.18-4-r4k-ip22-di | 0.13 | mips ppp-modules-2.6.18-4-r5k-cobalt-di | 0.13 | mipsel ppp-modules-2.6.18-4-r5k-ip32-di | 0.13 | mips ppp-modules-2.6.18-4-sb1-bcm91250a-di | 0.13 | mips, mipsel ppp-modules-2.6.18-4-sb1a-bcm91480b-di | 0.13 | mips, mipsel ppp-modules-2.6.18-4-sparc32-di | 1.20 | sparc ppp-modules-2.6.18-4-sparc64-di | 1.20 | sparc qnx4-modules-2.6.18-4-486-di | 1.44 | i386 qnx4-modules-2.6.18-4-amd64-di | 1.21 | amd64 redhat-cluster-modules-2.6.18-4-486 | 2.6.18+1.03.00-7+etch2 | i386 redhat-cluster-modules-2.6.18-4-686 | 2.6.18+1.03.00-7+etch2 | i386 redhat-cluster-modules-2.6.18-4-686-bigmem | 2.6.18+1.03.00-7+etch2 | i386 redhat-cluster-modules-2.6.18-4-alpha-generic | 2.6.18+1.03.00-7+etch2 | alpha redhat-cluster-modules-2.6.18-4-alpha-legacy | 2.6.18+1.03.00-7+etch2 | alpha redhat-cluster-modules-2.6.18-4-alpha-smp | 2.6.18+1.03.00-7+etch2 | alpha redhat-cluster-modules-2.6.18-4-amd64 | 2.6.18+1.03.00-7+etch2 | amd64, i386 redhat-cluster-modules-2.6.18-4-footbridge | 2.6.18+1.03.00-7+etch2 | arm redhat-cluster-modules-2.6.18-4-iop32x | 2.6.18+1.03.00-7+etch2 | arm redhat-cluster-modules-2.6.18-4-itanium | 2.6.18+1.03.00-7+etch2 | ia64 redhat-cluster-modules-2.6.18-4-ixp4xx | 2.6.18+1.03.00-7+etch2 | arm redhat-cluster-modules-2.6.18-4-k7 | 2.6.18+1.03.00-7+etch2 | i386 redhat-cluster-modules-2.6.18-4-mckinley | 2.6.18+1.03.00-7+etch2 | ia64 redhat-cluster-modules-2.6.18-4-parisc | 2.6.18+1.03.00-7+etch2 | hppa redhat-cluster-modules-2.6.18-4-parisc-smp | 2.6.18+1.03.00-7+etch2 | hppa redhat-cluster-modules-2.6.18-4-parisc64 | 2.6.18+1.03.00-7+etch2 | hppa redhat-cluster-modules-2.6.18-4-parisc64-smp | 2.6.18+1.03.00-7+etch2 | hppa redhat-cluster-modules-2.6.18-4-powerpc | 2.6.18+1.03.00-7+etch2 | powerpc redhat-cluster-modules-2.6.18-4-powerpc-miboot | 2.6.18+1.03.00-7+etch2 | powerpc redhat-cluster-modules-2.6.18-4-powerpc-smp | 2.6.18+1.03.00-7+etch2 | powerpc redhat-cluster-modules-2.6.18-4-powerpc64 | 2.6.18+1.03.00-7+etch2 | powerpc redhat-cluster-modules-2.6.18-4-prep | 2.6.18+1.03.00-7+etch2 | powerpc redhat-cluster-modules-2.6.18-4-qemu | 2.6.18+1.03.00-7+etch2 | mipsel redhat-cluster-modules-2.6.18-4-r3k-kn02 | 2.6.18+1.03.00-7+etch2 | mipsel redhat-cluster-modules-2.6.18-4-r4k-kn04 | 2.6.18+1.03.00-7+etch2 | mipsel redhat-cluster-modules-2.6.18-4-r5k-cobalt | 2.6.18+1.03.00-7+etch2 | mipsel redhat-cluster-modules-2.6.18-4-rpc | 2.6.18+1.03.00-7+etch2 | arm redhat-cluster-modules-2.6.18-4-s390 | 2.6.18+1.03.00-7+etch2 | s390 redhat-cluster-modules-2.6.18-4-s390x | 2.6.18+1.03.00-7+etch2 | s390 redhat-cluster-modules-2.6.18-4-s3c2410 | 2.6.18+1.03.00-7+etch2 | arm redhat-cluster-modules-2.6.18-4-sb1-bcm91250a | 2.6.18+1.03.00-7+etch2 | mipsel redhat-cluster-modules-2.6.18-4-sb1a-bcm91480b | 2.6.18+1.03.00-7+etch2 | mipsel redhat-cluster-modules-2.6.18-4-sparc32 | 2.6.18+1.03.00-7+etch2 | sparc redhat-cluster-modules-2.6.18-4-sparc64 | 2.6.18+1.03.00-7+etch2 | sparc redhat-cluster-modules-2.6.18-4-sparc64-smp | 2.6.18+1.03.00-7+etch2 | sparc redhat-cluster-modules-2.6.18-4-vserver-686 | 2.6.18+1.03.00-7+etch2 | i386 redhat-cluster-modules-2.6.18-4-vserver-alpha | 2.6.18+1.03.00-7+etch2 | alpha redhat-cluster-modules-2.6.18-4-vserver-amd64 | 2.6.18+1.03.00-7+etch2 | amd64 redhat-cluster-modules-2.6.18-4-vserver-k7 | 2.6.18+1.03.00-7+etch2 | i386 redhat-cluster-modules-2.6.18-4-vserver-powerpc | 2.6.18+1.03.00-7+etch2 | powerpc redhat-cluster-modules-2.6.18-4-vserver-powerpc64 | 2.6.18+1.03.00-7+etch2 | powerpc redhat-cluster-modules-2.6.18-4-vserver-s390x | 2.6.18+1.03.00-7+etch2 | s390 redhat-cluster-modules-2.6.18-4-vserver-sparc64 | 2.6.18+1.03.00-7+etch2 | sparc redhat-cluster-modules-2.6.18-4-xen-686 | 2.6.18+1.03.00-7+etch2 | i386 redhat-cluster-modules-2.6.18-4-xen-amd64 | 2.6.18+1.03.00-7+etch2 | amd64 redhat-cluster-modules-2.6.18-4-xen-vserver-686 | 2.6.18+1.03.00-7+etch2 | i386 redhat-cluster-modules-2.6.18-4-xen-vserver-amd64 | 2.6.18+1.03.00-7+etch2 | amd64 reiserfs-modules-2.6.18-4-486-di | 1.44 | i386 reiserfs-modules-2.6.18-4-alpha-generic-di | 0.17 | alpha reiserfs-modules-2.6.18-4-amd64-di | 1.21 | amd64 reiserfs-modules-2.6.18-4-footbridge-di | 1.10 | arm reiserfs-modules-2.6.18-4-iop32x-di | 1.10 | arm reiserfs-modules-2.6.18-4-itanium-di | 1.18 | ia64 reiserfs-modules-2.6.18-4-ixp4xx-di | 1.10 | arm reiserfs-modules-2.6.18-4-powerpc-di | 1.29 | powerpc reiserfs-modules-2.6.18-4-powerpc-miboot-di | 1.29 | powerpc reiserfs-modules-2.6.18-4-powerpc64-di | 1.29 | powerpc reiserfs-modules-2.6.18-4-prep-di | 1.29 | powerpc reiserfs-modules-2.6.18-4-qemu-di | 0.13 | mips, mipsel reiserfs-modules-2.6.18-4-r3k-kn02-di | 0.13 | mipsel reiserfs-modules-2.6.18-4-r4k-ip22-di | 0.13 | mips reiserfs-modules-2.6.18-4-r4k-kn04-di | 0.13 | mipsel reiserfs-modules-2.6.18-4-r5k-cobalt-di | 0.13 | mipsel reiserfs-modules-2.6.18-4-r5k-ip32-di | 0.13 | mips reiserfs-modules-2.6.18-4-rpc-di | 1.10 | arm reiserfs-modules-2.6.18-4-sb1-bcm91250a-di | 0.13 | mips, mipsel reiserfs-modules-2.6.18-4-sb1a-bcm91480b-di | 0.13 | mips, mipsel reiserfs-modules-2.6.18-4-sparc32-di | 1.20 | sparc reiserfs-modules-2.6.18-4-sparc64-di | 1.20 | sparc sata-modules-2.6.18-4-486-di | 1.44 | i386 sata-modules-2.6.18-4-alpha-generic-di | 0.17 | alpha sata-modules-2.6.18-4-amd64-di | 1.21 | amd64 sata-modules-2.6.18-4-iop32x-di | 1.10 | arm sata-modules-2.6.18-4-itanium-di | 1.18 | ia64 sata-modules-2.6.18-4-powerpc-di | 1.29 | powerpc sata-modules-2.6.18-4-powerpc-miboot-di | 1.29 | powerpc sata-modules-2.6.18-4-powerpc64-di | 1.29 | powerpc sata-modules-2.6.18-4-prep-di | 1.29 | powerpc sata-modules-2.6.18-4-sb1-bcm91250a-di | 0.13 | mips, mipsel sata-modules-2.6.18-4-sb1a-bcm91480b-di | 0.13 | mips, mipsel sata-modules-2.6.18-4-sparc64-di | 1.20 | sparc scsi-common-modules-2.6.18-4-486-di | 1.44 | i386 scsi-common-modules-2.6.18-4-alpha-generic-di | 0.17 | alpha scsi-common-modules-2.6.18-4-amd64-di | 1.21 | amd64 scsi-common-modules-2.6.18-4-itanium-di | 1.18 | ia64 scsi-common-modules-2.6.18-4-powerpc-di | 1.29 | powerpc scsi-common-modules-2.6.18-4-powerpc-miboot-di | 1.29 | powerpc scsi-common-modules-2.6.18-4-powerpc64-di | 1.29 | powerpc scsi-common-modules-2.6.18-4-prep-di | 1.29 | powerpc scsi-common-modules-2.6.18-4-sb1-bcm91250a-di | 0.13 | mips, mipsel scsi-common-modules-2.6.18-4-sb1a-bcm91480b-di | 0.13 | mips, mipsel scsi-common-modules-2.6.18-4-sparc32-di | 1.20 | sparc scsi-common-modules-2.6.18-4-sparc64-di | 1.20 | sparc scsi-core-modules-2.6.18-4-486-di | 1.44 | i386 scsi-core-modules-2.6.18-4-alpha-generic-di | 0.17 | alpha scsi-core-modules-2.6.18-4-amd64-di | 1.21 | amd64 scsi-core-modules-2.6.18-4-footbridge-di | 1.10 | arm scsi-core-modules-2.6.18-4-iop32x-di | 1.10 | arm scsi-core-modules-2.6.18-4-itanium-di | 1.18 | ia64 scsi-core-modules-2.6.18-4-ixp4xx-di | 1.10 | arm scsi-core-modules-2.6.18-4-powerpc-di | 1.29 | powerpc scsi-core-modules-2.6.18-4-powerpc-miboot-di | 1.29 | powerpc scsi-core-modules-2.6.18-4-powerpc64-di | 1.29 | powerpc scsi-core-modules-2.6.18-4-prep-di | 1.29 | powerpc scsi-core-modules-2.6.18-4-rpc-di | 1.10 | arm scsi-core-modules-2.6.18-4-s390-di | 0.13 | s390 scsi-core-modules-2.6.18-4-sb1-bcm91250a-di | 0.13 | mips, mipsel scsi-core-modules-2.6.18-4-sb1a-bcm91480b-di | 0.13 | mips, mipsel scsi-core-modules-2.6.18-4-sparc32-di | 1.20 | sparc scsi-core-modules-2.6.18-4-sparc64-di | 1.20 | sparc scsi-extra-modules-2.6.18-4-486-di | 1.44 | i386 scsi-extra-modules-2.6.18-4-alpha-generic-di | 0.17 | alpha scsi-extra-modules-2.6.18-4-amd64-di | 1.21 | amd64 scsi-extra-modules-2.6.18-4-powerpc-di | 1.29 | powerpc scsi-extra-modules-2.6.18-4-powerpc-miboot-di | 1.29 | powerpc scsi-extra-modules-2.6.18-4-powerpc64-di | 1.29 | powerpc scsi-extra-modules-2.6.18-4-prep-di | 1.29 | powerpc scsi-extra-modules-2.6.18-4-sparc64-di | 1.20 | sparc scsi-modules-2.6.18-4-486-di | 1.44 | i386 scsi-modules-2.6.18-4-alpha-generic-di | 0.17 | alpha scsi-modules-2.6.18-4-amd64-di | 1.21 | amd64 scsi-modules-2.6.18-4-itanium-di | 1.18 | ia64 scsi-modules-2.6.18-4-parisc-di | 1.17 | hppa scsi-modules-2.6.18-4-parisc64-di | 1.17 | hppa scsi-modules-2.6.18-4-powerpc-di | 1.29 | powerpc scsi-modules-2.6.18-4-powerpc-miboot-di | 1.29 | powerpc scsi-modules-2.6.18-4-powerpc64-di | 1.29 | powerpc scsi-modules-2.6.18-4-prep-di | 1.29 | powerpc scsi-modules-2.6.18-4-s390-di | 0.13 | s390 scsi-modules-2.6.18-4-sb1-bcm91250a-di | 0.13 | mips, mipsel scsi-modules-2.6.18-4-sb1a-bcm91480b-di | 0.13 | mips, mipsel serial-modules-2.6.18-4-486-di | 1.44 | i386 serial-modules-2.6.18-4-amd64-di | 1.21 | amd64 serial-modules-2.6.18-4-itanium-di | 1.18 | ia64 serial-modules-2.6.18-4-powerpc-di | 1.29 | powerpc serial-modules-2.6.18-4-powerpc-miboot-di | 1.29 | powerpc serial-modules-2.6.18-4-powerpc64-di | 1.29 | powerpc serial-modules-2.6.18-4-prep-di | 1.29 | powerpc sn-modules-2.6.18-4-itanium-di | 1.18 | ia64 squashfs-modules-2.6.18-4-486 | 2.6.18+3.1r2-7+etch2 | i386 squashfs-modules-2.6.18-4-686 | 2.6.18+3.1r2-7+etch2 | i386 squashfs-modules-2.6.18-4-686-bigmem | 2.6.18+3.1r2-7+etch2 | i386 squashfs-modules-2.6.18-4-alpha-generic | 2.6.18+3.1r2-7+etch2 | alpha squashfs-modules-2.6.18-4-alpha-legacy | 2.6.18+3.1r2-7+etch2 | alpha squashfs-modules-2.6.18-4-alpha-smp | 2.6.18+3.1r2-7+etch2 | alpha squashfs-modules-2.6.18-4-amd64 | 2.6.18+3.1r2-7+etch2 | amd64, i386 squashfs-modules-2.6.18-4-itanium | 2.6.18+3.1r2-7+etch2 | ia64 squashfs-modules-2.6.18-4-k7 | 2.6.18+3.1r2-7+etch2 | i386 squashfs-modules-2.6.18-4-mckinley | 2.6.18+3.1r2-7+etch2 | ia64 squashfs-modules-2.6.18-4-powerpc | 2.6.18+3.1r2-7+etch2 | powerpc squashfs-modules-2.6.18-4-powerpc-miboot | 2.6.18+3.1r2-7+etch2 | powerpc squashfs-modules-2.6.18-4-powerpc-smp | 2.6.18+3.1r2-7+etch2 | powerpc squashfs-modules-2.6.18-4-powerpc64 | 2.6.18+3.1r2-7+etch2 | powerpc squashfs-modules-2.6.18-4-prep | 2.6.18+3.1r2-7+etch2 | powerpc squashfs-modules-2.6.18-4-qemu | 2.6.18+3.1r2-7+etch2 | mipsel squashfs-modules-2.6.18-4-r3k-kn02 | 2.6.18+3.1r2-7+etch2 | mipsel squashfs-modules-2.6.18-4-r4k-kn04 | 2.6.18+3.1r2-7+etch2 | mipsel squashfs-modules-2.6.18-4-r5k-cobalt | 2.6.18+3.1r2-7+etch2 | mipsel squashfs-modules-2.6.18-4-s390 | 2.6.18+3.1r2-7+etch2 | s390 squashfs-modules-2.6.18-4-s390x | 2.6.18+3.1r2-7+etch2 | s390 squashfs-modules-2.6.18-4-sb1-bcm91250a | 2.6.18+3.1r2-7+etch2 | mipsel squashfs-modules-2.6.18-4-sb1a-bcm91480b | 2.6.18+3.1r2-7+etch2 | mipsel squashfs-modules-2.6.18-4-sparc32 | 2.6.18+3.1r2-7+etch2 | sparc squashfs-modules-2.6.18-4-sparc64 | 2.6.18+3.1r2-7+etch2 | sparc squashfs-modules-2.6.18-4-sparc64-smp | 2.6.18+3.1r2-7+etch2 | sparc squashfs-modules-2.6.18-4-vserver-686 | 2.6.18+3.1r2-7+etch2 | i386 squashfs-modules-2.6.18-4-vserver-alpha | 2.6.18+3.1r2-7+etch2 | alpha squashfs-modules-2.6.18-4-vserver-amd64 | 2.6.18+3.1r2-7+etch2 | amd64 squashfs-modules-2.6.18-4-vserver-k7 | 2.6.18+3.1r2-7+etch2 | i386 squashfs-modules-2.6.18-4-vserver-powerpc | 2.6.18+3.1r2-7+etch2 | powerpc squashfs-modules-2.6.18-4-vserver-powerpc64 | 2.6.18+3.1r2-7+etch2 | powerpc squashfs-modules-2.6.18-4-vserver-s390x | 2.6.18+3.1r2-7+etch2 | s390 squashfs-modules-2.6.18-4-vserver-sparc64 | 2.6.18+3.1r2-7+etch2 | sparc squashfs-modules-2.6.18-4-xen-686 | 2.6.18+3.1r2-7+etch2 | i386 squashfs-modules-2.6.18-4-xen-amd64 | 2.6.18+3.1r2-7+etch2 | amd64 squashfs-modules-2.6.18-4-xen-vserver-686 | 2.6.18+3.1r2-7+etch2 | i386 squashfs-modules-2.6.18-4-xen-vserver-amd64 | 2.6.18+3.1r2-7+etch2 | amd64 srm-modules-2.6.18-4-alpha-generic-di | 0.17 | alpha ufs-modules-2.6.18-4-486-di | 1.44 | i386 ufs-modules-2.6.18-4-amd64-di | 1.21 | amd64 ufs-modules-2.6.18-4-itanium-di | 1.18 | ia64 ufs-modules-2.6.18-4-powerpc-di | 1.29 | powerpc ufs-modules-2.6.18-4-powerpc-miboot-di | 1.29 | powerpc ufs-modules-2.6.18-4-powerpc64-di | 1.29 | powerpc ufs-modules-2.6.18-4-prep-di | 1.29 | powerpc unionfs-modules-2.6.18-4-486 | 2.6.18+1.4+debian-7+etch2 | i386 unionfs-modules-2.6.18-4-686 | 2.6.18+1.4+debian-7+etch2 | i386 unionfs-modules-2.6.18-4-686-bigmem | 2.6.18+1.4+debian-7+etch2 | i386 unionfs-modules-2.6.18-4-alpha-generic | 2.6.18+1.4+debian-7+etch2 | alpha unionfs-modules-2.6.18-4-alpha-legacy | 2.6.18+1.4+debian-7+etch2 | alpha unionfs-modules-2.6.18-4-alpha-smp | 2.6.18+1.4+debian-7+etch2 | alpha unionfs-modules-2.6.18-4-amd64 | 2.6.18+1.4+debian-7+etch2 | amd64, i386 unionfs-modules-2.6.18-4-footbridge | 2.6.18+1.4+debian-7+etch2 | arm unionfs-modules-2.6.18-4-iop32x | 2.6.18+1.4+debian-7+etch2 | arm unionfs-modules-2.6.18-4-itanium | 2.6.18+1.4+debian-7+etch2 | ia64 unionfs-modules-2.6.18-4-ixp4xx | 2.6.18+1.4+debian-7+etch2 | arm unionfs-modules-2.6.18-4-k7 | 2.6.18+1.4+debian-7+etch2 | i386 unionfs-modules-2.6.18-4-mckinley | 2.6.18+1.4+debian-7+etch2 | ia64 unionfs-modules-2.6.18-4-parisc | 2.6.18+1.4+debian-7+etch2 | hppa unionfs-modules-2.6.18-4-parisc-smp | 2.6.18+1.4+debian-7+etch2 | hppa unionfs-modules-2.6.18-4-parisc64 | 2.6.18+1.4+debian-7+etch2 | hppa unionfs-modules-2.6.18-4-parisc64-smp | 2.6.18+1.4+debian-7+etch2 | hppa unionfs-modules-2.6.18-4-powerpc | 2.6.18+1.4+debian-7+etch2 | powerpc unionfs-modules-2.6.18-4-powerpc-miboot | 2.6.18+1.4+debian-7+etch2 | powerpc unionfs-modules-2.6.18-4-powerpc-smp | 2.6.18+1.4+debian-7+etch2 | powerpc unionfs-modules-2.6.18-4-powerpc64 | 2.6.18+1.4+debian-7+etch2 | powerpc unionfs-modules-2.6.18-4-prep | 2.6.18+1.4+debian-7+etch2 | powerpc unionfs-modules-2.6.18-4-qemu | 2.6.18+1.4+debian-7+etch2 | mipsel unionfs-modules-2.6.18-4-r3k-kn02 | 2.6.18+1.4+debian-7+etch2 | mipsel unionfs-modules-2.6.18-4-r4k-kn04 | 2.6.18+1.4+debian-7+etch2 | mipsel unionfs-modules-2.6.18-4-r5k-cobalt | 2.6.18+1.4+debian-7+etch2 | mipsel unionfs-modules-2.6.18-4-rpc | 2.6.18+1.4+debian-7+etch2 | arm unionfs-modules-2.6.18-4-s390 | 2.6.18+1.4+debian-7+etch2 | s390 unionfs-modules-2.6.18-4-s390x | 2.6.18+1.4+debian-7+etch2 | s390 unionfs-modules-2.6.18-4-s3c2410 | 2.6.18+1.4+debian-7+etch2 | arm unionfs-modules-2.6.18-4-sb1-bcm91250a | 2.6.18+1.4+debian-7+etch2 | mipsel unionfs-modules-2.6.18-4-sb1a-bcm91480b | 2.6.18+1.4+debian-7+etch2 | mipsel unionfs-modules-2.6.18-4-sparc32 | 2.6.18+1.4+debian-7+etch2 | sparc unionfs-modules-2.6.18-4-sparc64 | 2.6.18+1.4+debian-7+etch2 | sparc unionfs-modules-2.6.18-4-sparc64-smp | 2.6.18+1.4+debian-7+etch2 | sparc usb-modules-2.6.18-4-486-di | 1.44 | i386 usb-modules-2.6.18-4-alpha-generic-di | 0.17 | alpha usb-modules-2.6.18-4-amd64-di | 1.21 | amd64 usb-modules-2.6.18-4-footbridge-di | 1.10 | arm usb-modules-2.6.18-4-iop32x-di | 1.10 | arm usb-modules-2.6.18-4-itanium-di | 1.18 | ia64 usb-modules-2.6.18-4-ixp4xx-di | 1.10 | arm usb-modules-2.6.18-4-parisc-di | 1.17 | hppa usb-modules-2.6.18-4-parisc64-di | 1.17 | hppa usb-modules-2.6.18-4-powerpc-di | 1.29 | powerpc usb-modules-2.6.18-4-powerpc-miboot-di | 1.29 | powerpc usb-modules-2.6.18-4-powerpc64-di | 1.29 | powerpc usb-modules-2.6.18-4-prep-di | 1.29 | powerpc usb-modules-2.6.18-4-sb1-bcm91250a-di | 0.13 | mips, mipsel usb-modules-2.6.18-4-sb1a-bcm91480b-di | 0.13 | mips, mipsel usb-modules-2.6.18-4-sparc64-di | 1.20 | sparc usb-serial-modules-2.6.18-4-486-di | 1.44 | i386 usb-serial-modules-2.6.18-4-alpha-generic-di | 0.17 | alpha usb-serial-modules-2.6.18-4-amd64-di | 1.21 | amd64 usb-serial-modules-2.6.18-4-powerpc-di | 1.29 | powerpc usb-serial-modules-2.6.18-4-powerpc-miboot-di | 1.29 | powerpc usb-serial-modules-2.6.18-4-powerpc64-di | 1.29 | powerpc usb-serial-modules-2.6.18-4-prep-di | 1.29 | powerpc usb-storage-modules-2.6.18-4-486-di | 1.44 | i386 usb-storage-modules-2.6.18-4-alpha-generic-di | 0.17 | alpha usb-storage-modules-2.6.18-4-amd64-di | 1.21 | amd64 usb-storage-modules-2.6.18-4-footbridge-di | 1.10 | arm usb-storage-modules-2.6.18-4-iop32x-di | 1.10 | arm usb-storage-modules-2.6.18-4-itanium-di | 1.18 | ia64 usb-storage-modules-2.6.18-4-ixp4xx-di | 1.10 | arm usb-storage-modules-2.6.18-4-parisc-di | 1.17 | hppa usb-storage-modules-2.6.18-4-parisc64-di | 1.17 | hppa usb-storage-modules-2.6.18-4-powerpc-di | 1.29 | powerpc usb-storage-modules-2.6.18-4-powerpc-miboot-di | 1.29 | powerpc usb-storage-modules-2.6.18-4-powerpc64-di | 1.29 | powerpc usb-storage-modules-2.6.18-4-prep-di | 1.29 | powerpc usb-storage-modules-2.6.18-4-sb1-bcm91250a-di | 0.13 | mips, mipsel usb-storage-modules-2.6.18-4-sb1a-bcm91480b-di | 0.13 | mips, mipsel xen-linux-system-2.6.18-4-xen-686 | 2.6.18.dfsg.1-12 | i386 xen-linux-system-2.6.18-4-xen-amd64 | 2.6.18.dfsg.1-12 | amd64 xen-linux-system-2.6.18-4-xen-vserver-686 | 2.6.18.dfsg.1-12 | i386 xen-linux-system-2.6.18-4-xen-vserver-amd64 | 2.6.18.dfsg.1-12 | amd64 xfs-modules-2.6.18-4-486-di | 1.44 | i386 xfs-modules-2.6.18-4-alpha-generic-di | 0.17 | alpha xfs-modules-2.6.18-4-amd64-di | 1.21 | amd64 xfs-modules-2.6.18-4-itanium-di | 1.18 | ia64 xfs-modules-2.6.18-4-powerpc-di | 1.29 | powerpc xfs-modules-2.6.18-4-powerpc-miboot-di | 1.29 | powerpc xfs-modules-2.6.18-4-powerpc64-di | 1.29 | powerpc xfs-modules-2.6.18-4-prep-di | 1.29 | powerpc xfs-modules-2.6.18-4-qemu-di | 0.13 | mips, mipsel xfs-modules-2.6.18-4-r4k-ip22-di | 0.13 | mips xfs-modules-2.6.18-4-r5k-cobalt-di | 0.13 | mipsel xfs-modules-2.6.18-4-r5k-ip32-di | 0.13 | mips xfs-modules-2.6.18-4-s390-di | 0.13 | s390 xfs-modules-2.6.18-4-sb1-bcm91250a-di | 0.13 | mips, mipsel xfs-modules-2.6.18-4-sb1a-bcm91480b-di | 0.13 | mips, mipsel xfs-modules-2.6.18-4-sparc32-di | 1.20 | sparc xfs-modules-2.6.18-4-sparc64-di | 1.20 | sparc [Because they are superseded by -5- ABI and no longer built from source] ========================================= Sun, 8 Apr 2007 - Debian 4.0r0 released =========================================