========================================= Mon, 25 Oct 2004 - Debian 3.0r3 released ========================================= stable/non-US/main/binary-sparc/proftpd-common_1.2.4+1.2.5rc1-5woody2_sparc.deb stable/non-US/main/binary-sparc/proftpd_1.2.4+1.2.5rc1-5woody2_sparc.deb stable/non-US/main/binary-sparc/proftpd-ldap_1.2.4+1.2.5rc1-5woody2_sparc.deb stable/non-US/main/binary-sparc/proftpd-pgsql_1.2.4+1.2.5rc1-5woody2_sparc.deb stable/non-US/main/binary-sparc/proftpd-mysql_1.2.4+1.2.5rc1-5woody2_sparc.deb proftpd (1.2.4+1.2.5rc1-5woody2) stable-security; urgency=high * Touch configure in debian/rules so that autoconf doesn't try to run automatically stable/non-US/main/binary-s390/proftpd-common_1.2.4+1.2.5rc1-5woody2_s390.deb stable/non-US/main/binary-s390/proftpd-ldap_1.2.4+1.2.5rc1-5woody2_s390.deb stable/non-US/main/binary-s390/proftpd-pgsql_1.2.4+1.2.5rc1-5woody2_s390.deb stable/non-US/main/binary-s390/proftpd-mysql_1.2.4+1.2.5rc1-5woody2_s390.deb stable/non-US/main/binary-s390/proftpd_1.2.4+1.2.5rc1-5woody2_s390.deb proftpd (1.2.4+1.2.5rc1-5woody2) stable-security; urgency=high * Touch configure in debian/rules so that autoconf doesn't try to run automatically stable/non-US/main/binary-powerpc/proftpd-mysql_1.2.4+1.2.5rc1-5woody2_powerpc.deb stable/non-US/main/binary-powerpc/proftpd_1.2.4+1.2.5rc1-5woody2_powerpc.deb stable/non-US/main/binary-powerpc/proftpd-common_1.2.4+1.2.5rc1-5woody2_powerpc.deb stable/non-US/main/binary-powerpc/proftpd-ldap_1.2.4+1.2.5rc1-5woody2_powerpc.deb stable/non-US/main/binary-powerpc/proftpd-pgsql_1.2.4+1.2.5rc1-5woody2_powerpc.deb proftpd (1.2.4+1.2.5rc1-5woody2) stable-security; urgency=high * Touch configure in debian/rules so that autoconf doesn't try to run automatically stable/non-US/main/binary-mipsel/proftpd-pgsql_1.2.4+1.2.5rc1-5woody2_mipsel.deb stable/non-US/main/binary-mipsel/proftpd-common_1.2.4+1.2.5rc1-5woody2_mipsel.deb stable/non-US/main/binary-mipsel/proftpd-mysql_1.2.4+1.2.5rc1-5woody2_mipsel.deb stable/non-US/main/binary-mipsel/proftpd_1.2.4+1.2.5rc1-5woody2_mipsel.deb stable/non-US/main/binary-mipsel/proftpd-ldap_1.2.4+1.2.5rc1-5woody2_mipsel.deb proftpd (1.2.4+1.2.5rc1-5woody2) stable-security; urgency=high * Touch configure in debian/rules so that autoconf doesn't try to run automatically stable/non-US/main/binary-mips/proftpd_1.2.4+1.2.5rc1-5woody2_mips.deb stable/non-US/main/binary-mips/proftpd-mysql_1.2.4+1.2.5rc1-5woody2_mips.deb stable/non-US/main/binary-mips/proftpd-common_1.2.4+1.2.5rc1-5woody2_mips.deb stable/non-US/main/binary-mips/proftpd-pgsql_1.2.4+1.2.5rc1-5woody2_mips.deb stable/non-US/main/binary-mips/proftpd-ldap_1.2.4+1.2.5rc1-5woody2_mips.deb proftpd (1.2.4+1.2.5rc1-5woody2) stable-security; urgency=high * Touch configure in debian/rules so that autoconf doesn't try to run automatically stable/non-US/main/binary-m68k/proftpd-mysql_1.2.4+1.2.5rc1-5woody2_m68k.deb stable/non-US/main/binary-m68k/proftpd_1.2.4+1.2.5rc1-5woody2_m68k.deb stable/non-US/main/binary-m68k/proftpd-ldap_1.2.4+1.2.5rc1-5woody2_m68k.deb stable/non-US/main/binary-m68k/proftpd-pgsql_1.2.4+1.2.5rc1-5woody2_m68k.deb stable/non-US/main/binary-m68k/proftpd-common_1.2.4+1.2.5rc1-5woody2_m68k.deb proftpd (1.2.4+1.2.5rc1-5woody2) stable-security; urgency=high * Touch configure in debian/rules so that autoconf doesn't try to run automatically stable/non-US/main/binary-ia64/proftpd-pgsql_1.2.4+1.2.5rc1-5woody2_ia64.deb stable/non-US/main/binary-ia64/proftpd-common_1.2.4+1.2.5rc1-5woody2_ia64.deb stable/non-US/main/binary-ia64/proftpd-ldap_1.2.4+1.2.5rc1-5woody2_ia64.deb stable/non-US/main/binary-ia64/proftpd_1.2.4+1.2.5rc1-5woody2_ia64.deb stable/non-US/main/binary-ia64/proftpd-mysql_1.2.4+1.2.5rc1-5woody2_ia64.deb proftpd (1.2.4+1.2.5rc1-5woody2) stable-security; urgency=high * Touch configure in debian/rules so that autoconf doesn't try to run automatically stable/non-US/main/binary-hppa/proftpd-common_1.2.4+1.2.5rc1-5woody2_hppa.deb stable/non-US/main/binary-hppa/proftpd-ldap_1.2.4+1.2.5rc1-5woody2_hppa.deb stable/non-US/main/binary-hppa/proftpd_1.2.4+1.2.5rc1-5woody2_hppa.deb stable/non-US/main/binary-hppa/proftpd-mysql_1.2.4+1.2.5rc1-5woody2_hppa.deb stable/non-US/main/binary-hppa/proftpd-pgsql_1.2.4+1.2.5rc1-5woody2_hppa.deb proftpd (1.2.4+1.2.5rc1-5woody2) stable-security; urgency=high * Touch configure in debian/rules so that autoconf doesn't try to run automatically stable/non-US/main/binary-arm/proftpd-common_1.2.4+1.2.5rc1-5woody2_arm.deb stable/non-US/main/binary-arm/proftpd-ldap_1.2.4+1.2.5rc1-5woody2_arm.deb stable/non-US/main/binary-arm/proftpd_1.2.4+1.2.5rc1-5woody2_arm.deb stable/non-US/main/binary-arm/proftpd-mysql_1.2.4+1.2.5rc1-5woody2_arm.deb stable/non-US/main/binary-arm/proftpd-pgsql_1.2.4+1.2.5rc1-5woody2_arm.deb proftpd (1.2.4+1.2.5rc1-5woody2) stable-security; urgency=high * Touch configure in debian/rules so that autoconf doesn't try to run automatically stable/non-US/main/binary-alpha/proftpd-mysql_1.2.4+1.2.5rc1-5woody2_alpha.deb stable/non-US/main/binary-alpha/proftpd_1.2.4+1.2.5rc1-5woody2_alpha.deb stable/non-US/main/binary-alpha/proftpd-common_1.2.4+1.2.5rc1-5woody2_alpha.deb stable/non-US/main/binary-alpha/proftpd-ldap_1.2.4+1.2.5rc1-5woody2_alpha.deb stable/non-US/main/binary-alpha/proftpd-pgsql_1.2.4+1.2.5rc1-5woody2_alpha.deb proftpd (1.2.4+1.2.5rc1-5woody2) stable-security; urgency=high * Touch configure in debian/rules so that autoconf doesn't try to run automatically stable/non-US/main/binary-i386/proftpd-ldap_1.2.4+1.2.5rc1-5woody2_i386.deb stable/non-US/main/binary-i386/proftpd-common_1.2.4+1.2.5rc1-5woody2_i386.deb stable/non-US/main/binary-i386/proftpd-mysql_1.2.4+1.2.5rc1-5woody2_i386.deb stable/non-US/main/source/proftpd_1.2.4+1.2.5rc1-5woody2.tar.gz stable/non-US/main/source/proftpd_1.2.4+1.2.5rc1-5woody2.dsc stable/non-US/main/binary-all/proftpd-doc_1.2.4+1.2.5rc1-5woody2_all.deb stable/non-US/main/binary-i386/proftpd-pgsql_1.2.4+1.2.5rc1-5woody2_i386.deb stable/non-US/main/binary-i386/proftpd_1.2.4+1.2.5rc1-5woody2_i386.deb proftpd (1.2.4+1.2.5rc1-5woody2) stable-security; urgency=high * Touch configure in debian/rules so that autoconf doesn't try to run automatically stable/non-US/main/binary-s390/libmcrypt-dev_2.5.0-1woody1_s390.deb stable/non-US/main/binary-s390/libmcrypt4_2.5.0-1woody1_s390.deb libmcrypt (2.5.0-1woody1) stable-security; urgency=high * Non-maintainer upload by the Security Team * Backport buffer overflow fixes from version 2.5.5 - lib/mcrypt_extra.c: calloc->strdup, strcpy->strncpy - lib/mcrypt_modules.c: mcrypt_dlopen() buffer increased, checks for NULL, ensure null termination stable/non-US/main/binary-powerpc/libmcrypt4_2.5.0-1woody1_powerpc.deb stable/non-US/main/binary-powerpc/libmcrypt-dev_2.5.0-1woody1_powerpc.deb libmcrypt (2.5.0-1woody1) stable-security; urgency=high * Non-maintainer upload by the Security Team * Backport buffer overflow fixes from version 2.5.5 - lib/mcrypt_extra.c: calloc->strdup, strcpy->strncpy - lib/mcrypt_modules.c: mcrypt_dlopen() buffer increased, checks for NULL, ensure null termination stable/non-US/main/binary-mipsel/libmcrypt-dev_2.5.0-1woody1_mipsel.deb stable/non-US/main/binary-mipsel/libmcrypt4_2.5.0-1woody1_mipsel.deb libmcrypt (2.5.0-1woody1) stable-security; urgency=high * Non-maintainer upload by the Security Team * Backport buffer overflow fixes from version 2.5.5 - lib/mcrypt_extra.c: calloc->strdup, strcpy->strncpy - lib/mcrypt_modules.c: mcrypt_dlopen() buffer increased, checks for NULL, ensure null termination stable/non-US/main/binary-mips/libmcrypt-dev_2.5.0-1woody1_mips.deb stable/non-US/main/binary-mips/libmcrypt4_2.5.0-1woody1_mips.deb libmcrypt (2.5.0-1woody1) stable-security; urgency=high * Non-maintainer upload by the Security Team * Backport buffer overflow fixes from version 2.5.5 - lib/mcrypt_extra.c: calloc->strdup, strcpy->strncpy - lib/mcrypt_modules.c: mcrypt_dlopen() buffer increased, checks for NULL, ensure null termination stable/non-US/main/binary-m68k/libmcrypt4_2.5.0-1woody1_m68k.deb stable/non-US/main/binary-m68k/libmcrypt-dev_2.5.0-1woody1_m68k.deb libmcrypt (2.5.0-1woody1) stable-security; urgency=high * Non-maintainer upload by the Security Team * Backport buffer overflow fixes from version 2.5.5 - lib/mcrypt_extra.c: calloc->strdup, strcpy->strncpy - lib/mcrypt_modules.c: mcrypt_dlopen() buffer increased, checks for NULL, ensure null termination stable/non-US/main/binary-ia64/libmcrypt-dev_2.5.0-1woody1_ia64.deb stable/non-US/main/binary-ia64/libmcrypt4_2.5.0-1woody1_ia64.deb libmcrypt (2.5.0-1woody1) stable-security; urgency=high * Non-maintainer upload by the Security Team * Backport buffer overflow fixes from version 2.5.5 - lib/mcrypt_extra.c: calloc->strdup, strcpy->strncpy - lib/mcrypt_modules.c: mcrypt_dlopen() buffer increased, checks for NULL, ensure null termination stable/non-US/main/binary-i386/libmcrypt4_2.5.0-1woody1_i386.deb stable/non-US/main/binary-i386/libmcrypt-dev_2.5.0-1woody1_i386.deb libmcrypt (2.5.0-1woody1) stable-security; urgency=high * Non-maintainer upload by the Security Team * Backport buffer overflow fixes from version 2.5.5 - lib/mcrypt_extra.c: calloc->strdup, strcpy->strncpy - lib/mcrypt_modules.c: mcrypt_dlopen() buffer increased, checks for NULL, ensure null termination stable/non-US/main/binary-hppa/libmcrypt-dev_2.5.0-1woody1_hppa.deb stable/non-US/main/binary-hppa/libmcrypt4_2.5.0-1woody1_hppa.deb libmcrypt (2.5.0-1woody1) stable-security; urgency=high * Non-maintainer upload by the Security Team * Backport buffer overflow fixes from version 2.5.5 - lib/mcrypt_extra.c: calloc->strdup, strcpy->strncpy - lib/mcrypt_modules.c: mcrypt_dlopen() buffer increased, checks for NULL, ensure null termination stable/non-US/main/binary-arm/libmcrypt4_2.5.0-1woody1_arm.deb stable/non-US/main/binary-arm/libmcrypt-dev_2.5.0-1woody1_arm.deb libmcrypt (2.5.0-1woody1) stable-security; urgency=high * Non-maintainer upload by the Security Team * Backport buffer overflow fixes from version 2.5.5 - lib/mcrypt_extra.c: calloc->strdup, strcpy->strncpy - lib/mcrypt_modules.c: mcrypt_dlopen() buffer increased, checks for NULL, ensure null termination stable/non-US/main/binary-alpha/libmcrypt4_2.5.0-1woody1_alpha.deb stable/non-US/main/binary-alpha/libmcrypt-dev_2.5.0-1woody1_alpha.deb libmcrypt (2.5.0-1woody1) stable-security; urgency=high * Non-maintainer upload by the Security Team * Backport buffer overflow fixes from version 2.5.5 - lib/mcrypt_extra.c: calloc->strdup, strcpy->strncpy - lib/mcrypt_modules.c: mcrypt_dlopen() buffer increased, checks for NULL, ensure null termination stable/non-US/main/binary-sparc/libmcrypt4_2.5.0-1woody1_sparc.deb stable/non-US/main/binary-sparc/libmcrypt-dev_2.5.0-1woody1_sparc.deb stable/non-US/main/source/libmcrypt_2.5.0-1woody1.dsc stable/non-US/main/source/libmcrypt_2.5.0-1woody1.diff.gz libmcrypt (2.5.0-1woody1) stable-security; urgency=high * Non-maintainer upload by the Security Team * Backport buffer overflow fixes from version 2.5.5 - lib/mcrypt_extra.c: calloc->strdup, strcpy->strncpy - lib/mcrypt_modules.c: mcrypt_dlopen() buffer increased, checks for NULL, ensure null termination stable/non-US/main/binary-s390/kerberos4kth-servers_1.1-8-2.3_s390.deb stable/non-US/main/binary-s390/kerberos4kth-servers-x_1.1-8-2.3_s390.deb stable/non-US/main/binary-s390/kerberos4kth-dev_1.1-8-2.3_s390.deb stable/non-US/main/binary-s390/kerberos4kth-kip_1.1-8-2.3_s390.deb stable/non-US/main/binary-s390/libacl1-kerberos4kth_1.1-8-2.3_s390.deb stable/non-US/main/binary-s390/kerberos4kth-kdc_1.1-8-2.3_s390.deb stable/non-US/main/binary-s390/libkdb-1-kerberos4kth_1.1-8-2.3_s390.deb stable/non-US/main/binary-s390/libkadm1-kerberos4kth_1.1-8-2.3_s390.deb stable/non-US/main/binary-s390/kerberos4kth-dev-common_1.1-8-2.3_s390.deb stable/non-US/main/binary-s390/libkrb-1-kerberos4kth_1.1-8-2.3_s390.deb stable/non-US/main/binary-s390/kerberos4kth-clients_1.1-8-2.3_s390.deb stable/non-US/main/binary-s390/kerberos4kth-clients-x_1.1-8-2.3_s390.deb krb4 (1.1-8-2.3) stable-security; urgency=high * Backport of patches from 1.2.1 to 1.2.2 Fix security bug in kerberos4 cross realm by disabling it. For more information see /usr/share/doc/kerberos4kth-kdc/kerberos4kth-kdc.README stable/non-US/main/binary-powerpc/kerberos4kth-clients_1.1-8-2.3_powerpc.deb stable/non-US/main/binary-powerpc/libkdb-1-kerberos4kth_1.1-8-2.3_powerpc.deb stable/non-US/main/binary-powerpc/kerberos4kth-kdc_1.1-8-2.3_powerpc.deb stable/non-US/main/binary-powerpc/kerberos4kth-kip_1.1-8-2.3_powerpc.deb stable/non-US/main/binary-powerpc/libkrb-1-kerberos4kth_1.1-8-2.3_powerpc.deb stable/non-US/main/binary-powerpc/kerberos4kth-clients-x_1.1-8-2.3_powerpc.deb stable/non-US/main/binary-powerpc/libacl1-kerberos4kth_1.1-8-2.3_powerpc.deb stable/non-US/main/binary-powerpc/libkadm1-kerberos4kth_1.1-8-2.3_powerpc.deb stable/non-US/main/binary-powerpc/kerberos4kth-dev-common_1.1-8-2.3_powerpc.deb stable/non-US/main/binary-powerpc/kerberos4kth-servers-x_1.1-8-2.3_powerpc.deb stable/non-US/main/binary-powerpc/kerberos4kth-servers_1.1-8-2.3_powerpc.deb stable/non-US/main/binary-powerpc/kerberos4kth-dev_1.1-8-2.3_powerpc.deb krb4 (1.1-8-2.3) stable-security; urgency=high * Backport of patches from 1.2.1 to 1.2.2 Fix security bug in kerberos4 cross realm by disabling it. For more information see /usr/share/doc/kerberos4kth-kdc/kerberos4kth-kdc.README stable/non-US/main/binary-mipsel/kerberos4kth-kip_1.1-8-2.3_mipsel.deb stable/non-US/main/binary-mipsel/kerberos4kth-clients-x_1.1-8-2.3_mipsel.deb stable/non-US/main/binary-mipsel/libacl1-kerberos4kth_1.1-8-2.3_mipsel.deb stable/non-US/main/binary-mipsel/kerberos4kth-dev_1.1-8-2.3_mipsel.deb stable/non-US/main/binary-mipsel/libkadm1-kerberos4kth_1.1-8-2.3_mipsel.deb stable/non-US/main/binary-mipsel/kerberos4kth-kdc_1.1-8-2.3_mipsel.deb stable/non-US/main/binary-mipsel/kerberos4kth-servers_1.1-8-2.3_mipsel.deb stable/non-US/main/binary-mipsel/kerberos4kth-clients_1.1-8-2.3_mipsel.deb stable/non-US/main/binary-mipsel/kerberos4kth-dev-common_1.1-8-2.3_mipsel.deb stable/non-US/main/binary-mipsel/libkrb-1-kerberos4kth_1.1-8-2.3_mipsel.deb stable/non-US/main/binary-mipsel/libkdb-1-kerberos4kth_1.1-8-2.3_mipsel.deb stable/non-US/main/binary-mipsel/kerberos4kth-servers-x_1.1-8-2.3_mipsel.deb krb4 (1.1-8-2.3) stable-security; urgency=high * Backport of patches from 1.2.1 to 1.2.2 Fix security bug in kerberos4 cross realm by disabling it. For more information see /usr/share/doc/kerberos4kth-kdc/kerberos4kth-kdc.README stable/non-US/main/binary-mips/libkadm1-kerberos4kth_1.1-8-2.3_mips.deb stable/non-US/main/binary-mips/kerberos4kth-kdc_1.1-8-2.3_mips.deb stable/non-US/main/binary-mips/kerberos4kth-clients_1.1-8-2.3_mips.deb stable/non-US/main/binary-mips/kerberos4kth-dev-common_1.1-8-2.3_mips.deb stable/non-US/main/binary-mips/libacl1-kerberos4kth_1.1-8-2.3_mips.deb stable/non-US/main/binary-mips/libkrb-1-kerberos4kth_1.1-8-2.3_mips.deb stable/non-US/main/binary-mips/kerberos4kth-clients-x_1.1-8-2.3_mips.deb stable/non-US/main/binary-mips/kerberos4kth-servers-x_1.1-8-2.3_mips.deb stable/non-US/main/binary-mips/kerberos4kth-dev_1.1-8-2.3_mips.deb stable/non-US/main/binary-mips/kerberos4kth-kip_1.1-8-2.3_mips.deb stable/non-US/main/binary-mips/kerberos4kth-servers_1.1-8-2.3_mips.deb stable/non-US/main/binary-mips/libkdb-1-kerberos4kth_1.1-8-2.3_mips.deb krb4 (1.1-8-2.3) stable-security; urgency=high * Backport of patches from 1.2.1 to 1.2.2 Fix security bug in kerberos4 cross realm by disabling it. For more information see /usr/share/doc/kerberos4kth-kdc/kerberos4kth-kdc.README stable/non-US/main/binary-m68k/kerberos4kth-clients_1.1-8-2.3_m68k.deb stable/non-US/main/binary-m68k/libkrb-1-kerberos4kth_1.1-8-2.3_m68k.deb stable/non-US/main/binary-m68k/libacl1-kerberos4kth_1.1-8-2.3_m68k.deb stable/non-US/main/binary-m68k/kerberos4kth-dev-common_1.1-8-2.3_m68k.deb stable/non-US/main/binary-m68k/kerberos4kth-servers-x_1.1-8-2.3_m68k.deb stable/non-US/main/binary-m68k/libkdb-1-kerberos4kth_1.1-8-2.3_m68k.deb stable/non-US/main/binary-m68k/kerberos4kth-kdc_1.1-8-2.3_m68k.deb stable/non-US/main/binary-m68k/kerberos4kth-servers_1.1-8-2.3_m68k.deb stable/non-US/main/binary-m68k/libkadm1-kerberos4kth_1.1-8-2.3_m68k.deb stable/non-US/main/binary-m68k/kerberos4kth-dev_1.1-8-2.3_m68k.deb stable/non-US/main/binary-m68k/kerberos4kth-clients-x_1.1-8-2.3_m68k.deb stable/non-US/main/binary-m68k/kerberos4kth-kip_1.1-8-2.3_m68k.deb krb4 (1.1-8-2.3) stable-security; urgency=high * Backport of patches from 1.2.1 to 1.2.2 Fix security bug in kerberos4 cross realm by disabling it. For more information see /usr/share/doc/kerberos4kth-kdc/kerberos4kth-kdc.README stable/non-US/main/binary-ia64/kerberos4kth-dev-common_1.1-8-2.3_ia64.deb stable/non-US/main/binary-ia64/kerberos4kth-servers-x_1.1-8-2.3_ia64.deb stable/non-US/main/binary-ia64/kerberos4kth-servers_1.1-8-2.3_ia64.deb stable/non-US/main/binary-ia64/libkrb-1-kerberos4kth_1.1-8-2.3_ia64.deb stable/non-US/main/binary-ia64/kerberos4kth-kip_1.1-8-2.3_ia64.deb stable/non-US/main/binary-ia64/kerberos4kth-clients_1.1-8-2.3_ia64.deb stable/non-US/main/binary-ia64/kerberos4kth-kdc_1.1-8-2.3_ia64.deb stable/non-US/main/binary-ia64/kerberos4kth-dev_1.1-8-2.3_ia64.deb stable/non-US/main/binary-ia64/libkdb-1-kerberos4kth_1.1-8-2.3_ia64.deb stable/non-US/main/binary-ia64/libkadm1-kerberos4kth_1.1-8-2.3_ia64.deb stable/non-US/main/binary-ia64/kerberos4kth-clients-x_1.1-8-2.3_ia64.deb stable/non-US/main/binary-ia64/libacl1-kerberos4kth_1.1-8-2.3_ia64.deb krb4 (1.1-8-2.3) stable-security; urgency=high * Backport of patches from 1.2.1 to 1.2.2 Fix security bug in kerberos4 cross realm by disabling it. For more information see /usr/share/doc/kerberos4kth-kdc/kerberos4kth-kdc.README stable/non-US/main/binary-i386/kerberos4kth-kdc_1.1-8-2.3_i386.deb stable/non-US/main/binary-i386/kerberos4kth-clients-x_1.1-8-2.3_i386.deb stable/non-US/main/binary-i386/libkrb-1-kerberos4kth_1.1-8-2.3_i386.deb stable/non-US/main/binary-i386/libkadm1-kerberos4kth_1.1-8-2.3_i386.deb stable/non-US/main/binary-i386/libkdb-1-kerberos4kth_1.1-8-2.3_i386.deb stable/non-US/main/binary-i386/kerberos4kth-clients_1.1-8-2.3_i386.deb stable/non-US/main/binary-i386/kerberos4kth-servers-x_1.1-8-2.3_i386.deb stable/non-US/main/binary-i386/libacl1-kerberos4kth_1.1-8-2.3_i386.deb stable/non-US/main/binary-i386/kerberos4kth-dev_1.1-8-2.3_i386.deb stable/non-US/main/binary-i386/kerberos4kth-dev-common_1.1-8-2.3_i386.deb stable/non-US/main/binary-i386/kerberos4kth-kip_1.1-8-2.3_i386.deb stable/non-US/main/binary-i386/kerberos4kth-servers_1.1-8-2.3_i386.deb krb4 (1.1-8-2.3) stable-security; urgency=high * Backport of patches from 1.2.1 to 1.2.2 Fix security bug in kerberos4 cross realm by disabling it. For more information see /usr/share/doc/kerberos4kth-kdc/kerberos4kth-kdc.README stable/non-US/main/binary-hppa/kerberos4kth-clients-x_1.1-8-2.3_hppa.deb stable/non-US/main/binary-hppa/kerberos4kth-clients_1.1-8-2.3_hppa.deb stable/non-US/main/binary-hppa/libkdb-1-kerberos4kth_1.1-8-2.3_hppa.deb stable/non-US/main/binary-hppa/kerberos4kth-servers_1.1-8-2.3_hppa.deb stable/non-US/main/binary-hppa/kerberos4kth-dev_1.1-8-2.3_hppa.deb stable/non-US/main/binary-hppa/libkadm1-kerberos4kth_1.1-8-2.3_hppa.deb stable/non-US/main/binary-hppa/kerberos4kth-dev-common_1.1-8-2.3_hppa.deb stable/non-US/main/binary-hppa/kerberos4kth-servers-x_1.1-8-2.3_hppa.deb stable/non-US/main/binary-hppa/kerberos4kth-kdc_1.1-8-2.3_hppa.deb stable/non-US/main/binary-hppa/libacl1-kerberos4kth_1.1-8-2.3_hppa.deb stable/non-US/main/binary-hppa/kerberos4kth-kip_1.1-8-2.3_hppa.deb stable/non-US/main/binary-hppa/libkrb-1-kerberos4kth_1.1-8-2.3_hppa.deb krb4 (1.1-8-2.3) stable-security; urgency=high * Backport of patches from 1.2.1 to 1.2.2 Fix security bug in kerberos4 cross realm by disabling it. For more information see /usr/share/doc/kerberos4kth-kdc/kerberos4kth-kdc.README stable/non-US/main/binary-arm/libacl1-kerberos4kth_1.1-8-2.3_arm.deb stable/non-US/main/binary-arm/kerberos4kth-dev-common_1.1-8-2.3_arm.deb stable/non-US/main/binary-arm/kerberos4kth-servers-x_1.1-8-2.3_arm.deb stable/non-US/main/binary-arm/libkdb-1-kerberos4kth_1.1-8-2.3_arm.deb stable/non-US/main/binary-arm/libkadm1-kerberos4kth_1.1-8-2.3_arm.deb stable/non-US/main/binary-arm/kerberos4kth-dev_1.1-8-2.3_arm.deb stable/non-US/main/binary-arm/kerberos4kth-kdc_1.1-8-2.3_arm.deb stable/non-US/main/binary-arm/kerberos4kth-kip_1.1-8-2.3_arm.deb stable/non-US/main/binary-arm/kerberos4kth-clients-x_1.1-8-2.3_arm.deb stable/non-US/main/binary-arm/kerberos4kth-servers_1.1-8-2.3_arm.deb stable/non-US/main/binary-arm/libkrb-1-kerberos4kth_1.1-8-2.3_arm.deb stable/non-US/main/binary-arm/kerberos4kth-clients_1.1-8-2.3_arm.deb krb4 (1.1-8-2.3) stable-security; urgency=high * Backport of patches from 1.2.1 to 1.2.2 Fix security bug in kerberos4 cross realm by disabling it. For more information see /usr/share/doc/kerberos4kth-kdc/kerberos4kth-kdc.README stable/non-US/main/binary-alpha/libacl1-kerberos4kth_1.1-8-2.3_alpha.deb stable/non-US/main/binary-alpha/kerberos4kth-servers_1.1-8-2.3_alpha.deb stable/non-US/main/binary-alpha/kerberos4kth-dev_1.1-8-2.3_alpha.deb stable/non-US/main/binary-alpha/kerberos4kth-clients_1.1-8-2.3_alpha.deb stable/non-US/main/binary-alpha/kerberos4kth-dev-common_1.1-8-2.3_alpha.deb stable/non-US/main/binary-alpha/kerberos4kth-servers-x_1.1-8-2.3_alpha.deb stable/non-US/main/binary-alpha/kerberos4kth-kdc_1.1-8-2.3_alpha.deb stable/non-US/main/binary-alpha/libkdb-1-kerberos4kth_1.1-8-2.3_alpha.deb stable/non-US/main/binary-alpha/kerberos4kth-kip_1.1-8-2.3_alpha.deb stable/non-US/main/binary-alpha/kerberos4kth-clients-x_1.1-8-2.3_alpha.deb stable/non-US/main/binary-alpha/libkadm1-kerberos4kth_1.1-8-2.3_alpha.deb stable/non-US/main/binary-alpha/libkrb-1-kerberos4kth_1.1-8-2.3_alpha.deb krb4 (1.1-8-2.3) stable-security; urgency=high * Backport of patches from 1.2.1 to 1.2.2 Fix security bug in kerberos4 cross realm by disabling it. For more information see /usr/share/doc/kerberos4kth-kdc/kerberos4kth-kdc.README stable/non-US/main/binary-all/kerberos4kth-services_1.1-8-2.3_all.deb stable/non-US/main/binary-all/kerberos4kth-user_1.1-8-2.3_all.deb stable/non-US/main/binary-all/kerberos4kth-docs_1.1-8-2.3_all.deb stable/non-US/main/binary-sparc/kerberos4kth-dev_1.1-8-2.3_sparc.deb stable/non-US/main/binary-sparc/kerberos4kth-dev-common_1.1-8-2.3_sparc.deb stable/non-US/main/binary-sparc/kerberos4kth-kdc_1.1-8-2.3_sparc.deb stable/non-US/main/binary-sparc/kerberos4kth-kip_1.1-8-2.3_sparc.deb stable/non-US/main/binary-sparc/kerberos4kth-clients-x_1.1-8-2.3_sparc.deb stable/non-US/main/binary-sparc/libacl1-kerberos4kth_1.1-8-2.3_sparc.deb stable/non-US/main/binary-sparc/libkrb-1-kerberos4kth_1.1-8-2.3_sparc.deb stable/non-US/main/binary-sparc/libkadm1-kerberos4kth_1.1-8-2.3_sparc.deb stable/non-US/main/binary-all/kerberos4kth1_1.1-8-2.3_all.deb stable/non-US/main/binary-sparc/kerberos4kth-servers-x_1.1-8-2.3_sparc.deb stable/non-US/main/binary-sparc/kerberos4kth-servers_1.1-8-2.3_sparc.deb stable/non-US/main/binary-sparc/kerberos4kth-clients_1.1-8-2.3_sparc.deb stable/non-US/main/binary-sparc/libkdb-1-kerberos4kth_1.1-8-2.3_sparc.deb stable/non-US/main/source/krb4_1.1-8-2.3.tar.gz stable/non-US/main/source/krb4_1.1-8-2.3.dsc stable/non-US/main/binary-all/kerberos4kth-x11_1.1-8-2.3_all.deb krb4 (1.1-8-2.3) stable-security; urgency=high * Backport of patches from 1.2.1 to 1.2.2 Fix security bug in kerberos4 cross realm by disabling it. For more information see /usr/share/doc/kerberos4kth-kdc/kerberos4kth-kdc.README stable/non-US/main/binary-sparc/ircii_20020322-1.1_sparc.deb ircii (20020322-1.1) stable-security; urgency=high * Non-maintainer upload by the Security Team * Applied upstream patch partially to fix problems reported by Timo Sirainen stable/non-US/main/binary-s390/ircii_20020322-1.1_s390.deb ircii (20020322-1.1) stable-security; urgency=high * Non-maintainer upload by the Security Team * Applied upstream patch partially to fix problems reported by Timo Sirainen stable/non-US/main/binary-powerpc/ircii_20020322-1.1_powerpc.deb ircii (20020322-1.1) stable-security; urgency=high * Non-maintainer upload by the Security Team * Applied upstream patch partially to fix problems reported by Timo Sirainen stable/non-US/main/binary-mipsel/ircii_20020322-1.1_mipsel.deb ircii (20020322-1.1) stable-security; urgency=high * Non-maintainer upload by the Security Team * Applied upstream patch partially to fix problems reported by Timo Sirainen stable/non-US/main/binary-mips/ircii_20020322-1.1_mips.deb ircii (20020322-1.1) stable-security; urgency=high * Non-maintainer upload by the Security Team * Applied upstream patch partially to fix problems reported by Timo Sirainen stable/non-US/main/binary-m68k/ircii_20020322-1.1_m68k.deb ircii (20020322-1.1) stable-security; urgency=high * Non-maintainer upload by the Security Team * Applied upstream patch partially to fix problems reported by Timo Sirainen stable/non-US/main/binary-ia64/ircii_20020322-1.1_ia64.deb ircii (20020322-1.1) stable-security; urgency=high * Non-maintainer upload by the Security Team * Applied upstream patch partially to fix problems reported by Timo Sirainen stable/non-US/main/binary-i386/ircii_20020322-1.1_i386.deb ircii (20020322-1.1) stable-security; urgency=high * Non-maintainer upload by the Security Team * Applied upstream patch partially to fix problems reported by Timo Sirainen stable/non-US/main/binary-hppa/ircii_20020322-1.1_hppa.deb ircii (20020322-1.1) stable-security; urgency=high * Non-maintainer upload by the Security Team * Applied upstream patch partially to fix problems reported by Timo Sirainen stable/non-US/main/binary-arm/ircii_20020322-1.1_arm.deb ircii (20020322-1.1) stable-security; urgency=high * Non-maintainer upload by the Security Team * Applied upstream patch partially to fix problems reported by Timo Sirainen stable/non-US/main/source/ircii_20020322-1.1.diff.gz stable/non-US/main/binary-alpha/ircii_20020322-1.1_alpha.deb stable/non-US/main/source/ircii_20020322-1.1.dsc ircii (20020322-1.1) stable-security; urgency=high * Non-maintainer upload by the Security Team * Applied upstream patch partially to fix problems reported by Timo Sirainen stable/non-US/main/binary-s390/libsl0-heimdal_0.4e-7.woody.8_s390.deb stable/non-US/main/binary-s390/libkrb5-17-heimdal_0.4e-7.woody.8_s390.deb stable/non-US/main/binary-s390/libss0-heimdal_0.4e-7.woody.8_s390.deb stable/non-US/main/binary-s390/libkafs0-heimdal_0.4e-7.woody.8_s390.deb stable/non-US/main/binary-s390/heimdal-servers_0.4e-7.woody.8_s390.deb stable/non-US/main/binary-s390/heimdal-servers-x_0.4e-7.woody.8_s390.deb stable/non-US/main/binary-s390/heimdal-clients_0.4e-7.woody.8_s390.deb stable/non-US/main/binary-s390/libroken9-heimdal_0.4e-7.woody.8_s390.deb stable/non-US/main/binary-s390/libkadm5srv7-heimdal_0.4e-7.woody.8_s390.deb stable/non-US/main/binary-s390/heimdal-dev_0.4e-7.woody.8_s390.deb stable/non-US/main/binary-s390/libotp0-heimdal_0.4e-7.woody.8_s390.deb stable/non-US/main/binary-s390/libasn1-5-heimdal_0.4e-7.woody.8_s390.deb stable/non-US/main/binary-s390/heimdal-kdc_0.4e-7.woody.8_s390.deb stable/non-US/main/binary-s390/libgssapi1-heimdal_0.4e-7.woody.8_s390.deb stable/non-US/main/binary-s390/libcomerr1-heimdal_0.4e-7.woody.8_s390.deb stable/non-US/main/binary-s390/libkadm5clnt4-heimdal_0.4e-7.woody.8_s390.deb stable/non-US/main/binary-s390/heimdal-clients-x_0.4e-7.woody.8_s390.deb stable/non-US/main/binary-s390/libhdb7-heimdal_0.4e-7.woody.8_s390.deb heimdal (0.4e-7.woody.8) stable-security; urgency=medium * Non-maintainer upload by the Security Team * Added special detection routine for big/little endianess on MIPS since the line "byteorder : {big|little} endian" from /proc/cpuinfo was removed as of Linux 2.4.20, resulting in the mipsel buildd being unable to build this package. (032_autotools_mips) stable/non-US/main/binary-powerpc/heimdal-kdc_0.4e-7.woody.8_powerpc.deb stable/non-US/main/binary-powerpc/libroken9-heimdal_0.4e-7.woody.8_powerpc.deb stable/non-US/main/binary-powerpc/heimdal-servers_0.4e-7.woody.8_powerpc.deb stable/non-US/main/binary-powerpc/libkafs0-heimdal_0.4e-7.woody.8_powerpc.deb stable/non-US/main/binary-powerpc/heimdal-servers-x_0.4e-7.woody.8_powerpc.deb stable/non-US/main/binary-powerpc/libss0-heimdal_0.4e-7.woody.8_powerpc.deb stable/non-US/main/binary-powerpc/libkrb5-17-heimdal_0.4e-7.woody.8_powerpc.deb stable/non-US/main/binary-powerpc/libkadm5clnt4-heimdal_0.4e-7.woody.8_powerpc.deb stable/non-US/main/binary-powerpc/heimdal-clients_0.4e-7.woody.8_powerpc.deb stable/non-US/main/binary-powerpc/libcomerr1-heimdal_0.4e-7.woody.8_powerpc.deb stable/non-US/main/binary-powerpc/libasn1-5-heimdal_0.4e-7.woody.8_powerpc.deb stable/non-US/main/binary-powerpc/heimdal-clients-x_0.4e-7.woody.8_powerpc.deb stable/non-US/main/binary-powerpc/libotp0-heimdal_0.4e-7.woody.8_powerpc.deb stable/non-US/main/binary-powerpc/libgssapi1-heimdal_0.4e-7.woody.8_powerpc.deb stable/non-US/main/binary-powerpc/heimdal-dev_0.4e-7.woody.8_powerpc.deb stable/non-US/main/binary-powerpc/libkadm5srv7-heimdal_0.4e-7.woody.8_powerpc.deb stable/non-US/main/binary-powerpc/libhdb7-heimdal_0.4e-7.woody.8_powerpc.deb stable/non-US/main/binary-powerpc/libsl0-heimdal_0.4e-7.woody.8_powerpc.deb heimdal (0.4e-7.woody.8) stable-security; urgency=medium * Non-maintainer upload by the Security Team * Added special detection routine for big/little endianess on MIPS since the line "byteorder : {big|little} endian" from /proc/cpuinfo was removed as of Linux 2.4.20, resulting in the mipsel buildd being unable to build this package. (032_autotools_mips) stable/non-US/main/binary-mipsel/heimdal-clients_0.4e-7.woody.8_mipsel.deb stable/non-US/main/binary-mipsel/libss0-heimdal_0.4e-7.woody.8_mipsel.deb stable/non-US/main/binary-mipsel/libkrb5-17-heimdal_0.4e-7.woody.8_mipsel.deb stable/non-US/main/binary-mipsel/libroken9-heimdal_0.4e-7.woody.8_mipsel.deb stable/non-US/main/binary-mipsel/libhdb7-heimdal_0.4e-7.woody.8_mipsel.deb stable/non-US/main/binary-mipsel/libgssapi1-heimdal_0.4e-7.woody.8_mipsel.deb stable/non-US/main/binary-mipsel/libkadm5srv7-heimdal_0.4e-7.woody.8_mipsel.deb stable/non-US/main/binary-mipsel/heimdal-servers_0.4e-7.woody.8_mipsel.deb stable/non-US/main/binary-mipsel/libkafs0-heimdal_0.4e-7.woody.8_mipsel.deb stable/non-US/main/binary-mipsel/libsl0-heimdal_0.4e-7.woody.8_mipsel.deb stable/non-US/main/binary-mipsel/heimdal-kdc_0.4e-7.woody.8_mipsel.deb stable/non-US/main/binary-mipsel/heimdal-clients-x_0.4e-7.woody.8_mipsel.deb stable/non-US/main/binary-mipsel/libotp0-heimdal_0.4e-7.woody.8_mipsel.deb stable/non-US/main/binary-mipsel/heimdal-dev_0.4e-7.woody.8_mipsel.deb stable/non-US/main/binary-mipsel/heimdal-servers-x_0.4e-7.woody.8_mipsel.deb stable/non-US/main/binary-mipsel/libkadm5clnt4-heimdal_0.4e-7.woody.8_mipsel.deb stable/non-US/main/binary-mipsel/libcomerr1-heimdal_0.4e-7.woody.8_mipsel.deb stable/non-US/main/binary-mipsel/libasn1-5-heimdal_0.4e-7.woody.8_mipsel.deb heimdal (0.4e-7.woody.8) stable-security; urgency=medium * Non-maintainer upload by the Security Team * Added special detection routine for big/little endianess on MIPS since the line "byteorder : {big|little} endian" from /proc/cpuinfo was removed as of Linux 2.4.20, resulting in the mipsel buildd being unable to build this package. (032_autotools_mips) stable/non-US/main/binary-mips/libotp0-heimdal_0.4e-7.woody.8_mips.deb stable/non-US/main/binary-mips/libasn1-5-heimdal_0.4e-7.woody.8_mips.deb stable/non-US/main/binary-mips/libkrb5-17-heimdal_0.4e-7.woody.8_mips.deb stable/non-US/main/binary-mips/libsl0-heimdal_0.4e-7.woody.8_mips.deb stable/non-US/main/binary-mips/heimdal-clients_0.4e-7.woody.8_mips.deb stable/non-US/main/binary-mips/libroken9-heimdal_0.4e-7.woody.8_mips.deb stable/non-US/main/binary-mips/libcomerr1-heimdal_0.4e-7.woody.8_mips.deb stable/non-US/main/binary-mips/libkadm5clnt4-heimdal_0.4e-7.woody.8_mips.deb stable/non-US/main/binary-mips/heimdal-clients-x_0.4e-7.woody.8_mips.deb stable/non-US/main/binary-mips/heimdal-kdc_0.4e-7.woody.8_mips.deb stable/non-US/main/binary-mips/libkadm5srv7-heimdal_0.4e-7.woody.8_mips.deb stable/non-US/main/binary-mips/heimdal-servers-x_0.4e-7.woody.8_mips.deb stable/non-US/main/binary-mips/libkafs0-heimdal_0.4e-7.woody.8_mips.deb stable/non-US/main/binary-mips/libgssapi1-heimdal_0.4e-7.woody.8_mips.deb stable/non-US/main/binary-mips/libss0-heimdal_0.4e-7.woody.8_mips.deb stable/non-US/main/binary-mips/heimdal-servers_0.4e-7.woody.8_mips.deb stable/non-US/main/binary-mips/heimdal-dev_0.4e-7.woody.8_mips.deb stable/non-US/main/binary-mips/libhdb7-heimdal_0.4e-7.woody.8_mips.deb heimdal (0.4e-7.woody.8) stable-security; urgency=medium * Non-maintainer upload by the Security Team * Added special detection routine for big/little endianess on MIPS since the line "byteorder : {big|little} endian" from /proc/cpuinfo was removed as of Linux 2.4.20, resulting in the mipsel buildd being unable to build this package. (032_autotools_mips) stable/non-US/main/binary-m68k/libcomerr1-heimdal_0.4e-7.woody.8_m68k.deb stable/non-US/main/binary-m68k/libasn1-5-heimdal_0.4e-7.woody.8_m68k.deb stable/non-US/main/binary-m68k/heimdal-servers-x_0.4e-7.woody.8_m68k.deb stable/non-US/main/binary-m68k/heimdal-clients_0.4e-7.woody.8_m68k.deb stable/non-US/main/binary-m68k/libroken9-heimdal_0.4e-7.woody.8_m68k.deb stable/non-US/main/binary-m68k/libkadm5clnt4-heimdal_0.4e-7.woody.8_m68k.deb stable/non-US/main/binary-m68k/libkrb5-17-heimdal_0.4e-7.woody.8_m68k.deb stable/non-US/main/binary-m68k/heimdal-kdc_0.4e-7.woody.8_m68k.deb stable/non-US/main/binary-m68k/libkadm5srv7-heimdal_0.4e-7.woody.8_m68k.deb stable/non-US/main/binary-m68k/heimdal-dev_0.4e-7.woody.8_m68k.deb stable/non-US/main/binary-m68k/heimdal-servers_0.4e-7.woody.8_m68k.deb stable/non-US/main/binary-m68k/libkafs0-heimdal_0.4e-7.woody.8_m68k.deb stable/non-US/main/binary-m68k/libgssapi1-heimdal_0.4e-7.woody.8_m68k.deb stable/non-US/main/binary-m68k/libsl0-heimdal_0.4e-7.woody.8_m68k.deb stable/non-US/main/binary-m68k/libotp0-heimdal_0.4e-7.woody.8_m68k.deb stable/non-US/main/binary-m68k/libhdb7-heimdal_0.4e-7.woody.8_m68k.deb stable/non-US/main/binary-m68k/heimdal-clients-x_0.4e-7.woody.8_m68k.deb stable/non-US/main/binary-m68k/libss0-heimdal_0.4e-7.woody.8_m68k.deb heimdal (0.4e-7.woody.8) stable-security; urgency=medium * Non-maintainer upload by the Security Team * Added special detection routine for big/little endianess on MIPS since the line "byteorder : {big|little} endian" from /proc/cpuinfo was removed as of Linux 2.4.20, resulting in the mipsel buildd being unable to build this package. (032_autotools_mips) stable/non-US/main/binary-ia64/heimdal-clients_0.4e-7.woody.8_ia64.deb stable/non-US/main/binary-ia64/libkafs0-heimdal_0.4e-7.woody.8_ia64.deb stable/non-US/main/binary-ia64/heimdal-servers-x_0.4e-7.woody.8_ia64.deb stable/non-US/main/binary-ia64/libss0-heimdal_0.4e-7.woody.8_ia64.deb stable/non-US/main/binary-ia64/heimdal-clients-x_0.4e-7.woody.8_ia64.deb stable/non-US/main/binary-ia64/libotp0-heimdal_0.4e-7.woody.8_ia64.deb stable/non-US/main/binary-ia64/libcomerr1-heimdal_0.4e-7.woody.8_ia64.deb stable/non-US/main/binary-ia64/libsl0-heimdal_0.4e-7.woody.8_ia64.deb stable/non-US/main/binary-ia64/libkadm5clnt4-heimdal_0.4e-7.woody.8_ia64.deb stable/non-US/main/binary-ia64/libkadm5srv7-heimdal_0.4e-7.woody.8_ia64.deb stable/non-US/main/binary-ia64/heimdal-dev_0.4e-7.woody.8_ia64.deb stable/non-US/main/binary-ia64/heimdal-kdc_0.4e-7.woody.8_ia64.deb stable/non-US/main/binary-ia64/libkrb5-17-heimdal_0.4e-7.woody.8_ia64.deb stable/non-US/main/binary-ia64/libasn1-5-heimdal_0.4e-7.woody.8_ia64.deb stable/non-US/main/binary-ia64/libgssapi1-heimdal_0.4e-7.woody.8_ia64.deb stable/non-US/main/binary-ia64/libroken9-heimdal_0.4e-7.woody.8_ia64.deb stable/non-US/main/binary-ia64/libhdb7-heimdal_0.4e-7.woody.8_ia64.deb stable/non-US/main/binary-ia64/heimdal-servers_0.4e-7.woody.8_ia64.deb heimdal (0.4e-7.woody.8) stable-security; urgency=medium * Non-maintainer upload by the Security Team * Added special detection routine for big/little endianess on MIPS since the line "byteorder : {big|little} endian" from /proc/cpuinfo was removed as of Linux 2.4.20, resulting in the mipsel buildd being unable to build this package. (032_autotools_mips) stable/non-US/main/binary-i386/libss0-heimdal_0.4e-7.woody.8_i386.deb stable/non-US/main/binary-i386/libkadm5clnt4-heimdal_0.4e-7.woody.8_i386.deb stable/non-US/main/binary-i386/libcomerr1-heimdal_0.4e-7.woody.8_i386.deb stable/non-US/main/binary-i386/libotp0-heimdal_0.4e-7.woody.8_i386.deb stable/non-US/main/binary-i386/heimdal-clients-x_0.4e-7.woody.8_i386.deb stable/non-US/main/binary-i386/libroken9-heimdal_0.4e-7.woody.8_i386.deb stable/non-US/main/binary-i386/libasn1-5-heimdal_0.4e-7.woody.8_i386.deb stable/non-US/main/binary-i386/heimdal-kdc_0.4e-7.woody.8_i386.deb stable/non-US/main/binary-i386/heimdal-dev_0.4e-7.woody.8_i386.deb stable/non-US/main/binary-i386/heimdal-servers_0.4e-7.woody.8_i386.deb stable/non-US/main/binary-i386/libkadm5srv7-heimdal_0.4e-7.woody.8_i386.deb stable/non-US/main/binary-i386/libhdb7-heimdal_0.4e-7.woody.8_i386.deb stable/non-US/main/binary-i386/libgssapi1-heimdal_0.4e-7.woody.8_i386.deb stable/non-US/main/binary-i386/libsl0-heimdal_0.4e-7.woody.8_i386.deb stable/non-US/main/binary-i386/libkrb5-17-heimdal_0.4e-7.woody.8_i386.deb stable/non-US/main/binary-i386/heimdal-clients_0.4e-7.woody.8_i386.deb stable/non-US/main/binary-i386/heimdal-servers-x_0.4e-7.woody.8_i386.deb stable/non-US/main/binary-i386/libkafs0-heimdal_0.4e-7.woody.8_i386.deb heimdal (0.4e-7.woody.8) stable-security; urgency=medium * Non-maintainer upload by the Security Team * Added special detection routine for big/little endianess on MIPS since the line "byteorder : {big|little} endian" from /proc/cpuinfo was removed as of Linux 2.4.20, resulting in the mipsel buildd being unable to build this package. (032_autotools_mips) stable/non-US/main/binary-hppa/libhdb7-heimdal_0.4e-7.woody.8_hppa.deb stable/non-US/main/binary-hppa/heimdal-dev_0.4e-7.woody.8_hppa.deb stable/non-US/main/binary-hppa/libroken9-heimdal_0.4e-7.woody.8_hppa.deb stable/non-US/main/binary-hppa/libkadm5srv7-heimdal_0.4e-7.woody.8_hppa.deb stable/non-US/main/binary-hppa/libkadm5clnt4-heimdal_0.4e-7.woody.8_hppa.deb stable/non-US/main/binary-hppa/libasn1-5-heimdal_0.4e-7.woody.8_hppa.deb stable/non-US/main/binary-hppa/libsl0-heimdal_0.4e-7.woody.8_hppa.deb stable/non-US/main/binary-hppa/heimdal-servers-x_0.4e-7.woody.8_hppa.deb stable/non-US/main/binary-hppa/libcomerr1-heimdal_0.4e-7.woody.8_hppa.deb stable/non-US/main/binary-hppa/libotp0-heimdal_0.4e-7.woody.8_hppa.deb stable/non-US/main/binary-hppa/libgssapi1-heimdal_0.4e-7.woody.8_hppa.deb stable/non-US/main/binary-hppa/libss0-heimdal_0.4e-7.woody.8_hppa.deb stable/non-US/main/binary-hppa/heimdal-clients-x_0.4e-7.woody.8_hppa.deb stable/non-US/main/binary-hppa/heimdal-servers_0.4e-7.woody.8_hppa.deb stable/non-US/main/binary-hppa/libkrb5-17-heimdal_0.4e-7.woody.8_hppa.deb stable/non-US/main/binary-hppa/heimdal-kdc_0.4e-7.woody.8_hppa.deb stable/non-US/main/binary-hppa/libkafs0-heimdal_0.4e-7.woody.8_hppa.deb stable/non-US/main/binary-hppa/heimdal-clients_0.4e-7.woody.8_hppa.deb heimdal (0.4e-7.woody.8) stable-security; urgency=medium * Non-maintainer upload by the Security Team * Added special detection routine for big/little endianess on MIPS since the line "byteorder : {big|little} endian" from /proc/cpuinfo was removed as of Linux 2.4.20, resulting in the mipsel buildd being unable to build this package. (032_autotools_mips) stable/non-US/main/binary-arm/libgssapi1-heimdal_0.4e-7.woody.8_arm.deb stable/non-US/main/binary-arm/libkadm5clnt4-heimdal_0.4e-7.woody.8_arm.deb stable/non-US/main/binary-arm/libroken9-heimdal_0.4e-7.woody.8_arm.deb stable/non-US/main/binary-arm/libcomerr1-heimdal_0.4e-7.woody.8_arm.deb stable/non-US/main/binary-arm/libasn1-5-heimdal_0.4e-7.woody.8_arm.deb stable/non-US/main/binary-arm/libss0-heimdal_0.4e-7.woody.8_arm.deb stable/non-US/main/binary-arm/libsl0-heimdal_0.4e-7.woody.8_arm.deb stable/non-US/main/binary-arm/libhdb7-heimdal_0.4e-7.woody.8_arm.deb stable/non-US/main/binary-arm/heimdal-servers-x_0.4e-7.woody.8_arm.deb stable/non-US/main/binary-arm/heimdal-servers_0.4e-7.woody.8_arm.deb stable/non-US/main/binary-arm/libkafs0-heimdal_0.4e-7.woody.8_arm.deb stable/non-US/main/binary-arm/heimdal-clients-x_0.4e-7.woody.8_arm.deb stable/non-US/main/binary-arm/heimdal-clients_0.4e-7.woody.8_arm.deb stable/non-US/main/binary-arm/heimdal-dev_0.4e-7.woody.8_arm.deb stable/non-US/main/binary-arm/libotp0-heimdal_0.4e-7.woody.8_arm.deb stable/non-US/main/binary-arm/heimdal-kdc_0.4e-7.woody.8_arm.deb stable/non-US/main/binary-arm/libkadm5srv7-heimdal_0.4e-7.woody.8_arm.deb stable/non-US/main/binary-arm/libkrb5-17-heimdal_0.4e-7.woody.8_arm.deb heimdal (0.4e-7.woody.8) stable-security; urgency=medium * Non-maintainer upload by the Security Team * Added special detection routine for big/little endianess on MIPS since the line "byteorder : {big|little} endian" from /proc/cpuinfo was removed as of Linux 2.4.20, resulting in the mipsel buildd being unable to build this package. (032_autotools_mips) stable/non-US/main/binary-alpha/libkrb5-17-heimdal_0.4e-7.woody.8_alpha.deb stable/non-US/main/binary-alpha/heimdal-kdc_0.4e-7.woody.8_alpha.deb stable/non-US/main/binary-alpha/heimdal-clients_0.4e-7.woody.8_alpha.deb stable/non-US/main/binary-alpha/libasn1-5-heimdal_0.4e-7.woody.8_alpha.deb stable/non-US/main/binary-alpha/heimdal-servers-x_0.4e-7.woody.8_alpha.deb stable/non-US/main/binary-alpha/libsl0-heimdal_0.4e-7.woody.8_alpha.deb stable/non-US/main/binary-alpha/libhdb7-heimdal_0.4e-7.woody.8_alpha.deb stable/non-US/main/binary-alpha/libss0-heimdal_0.4e-7.woody.8_alpha.deb stable/non-US/main/binary-alpha/libroken9-heimdal_0.4e-7.woody.8_alpha.deb stable/non-US/main/binary-alpha/libkadm5srv7-heimdal_0.4e-7.woody.8_alpha.deb stable/non-US/main/binary-alpha/libcomerr1-heimdal_0.4e-7.woody.8_alpha.deb stable/non-US/main/binary-alpha/libotp0-heimdal_0.4e-7.woody.8_alpha.deb stable/non-US/main/binary-alpha/libgssapi1-heimdal_0.4e-7.woody.8_alpha.deb stable/non-US/main/binary-alpha/heimdal-dev_0.4e-7.woody.8_alpha.deb stable/non-US/main/binary-alpha/heimdal-servers_0.4e-7.woody.8_alpha.deb stable/non-US/main/binary-alpha/libkafs0-heimdal_0.4e-7.woody.8_alpha.deb stable/non-US/main/binary-alpha/heimdal-clients-x_0.4e-7.woody.8_alpha.deb stable/non-US/main/binary-alpha/libkadm5clnt4-heimdal_0.4e-7.woody.8_alpha.deb heimdal (0.4e-7.woody.8) stable-security; urgency=medium * Non-maintainer upload by the Security Team * Added special detection routine for big/little endianess on MIPS since the line "byteorder : {big|little} endian" from /proc/cpuinfo was removed as of Linux 2.4.20, resulting in the mipsel buildd being unable to build this package. (032_autotools_mips) stable/non-US/main/binary-sparc/heimdal-kdc_0.4e-7.woody.8_sparc.deb stable/non-US/main/binary-sparc/libroken9-heimdal_0.4e-7.woody.8_sparc.deb stable/non-US/main/binary-sparc/heimdal-dev_0.4e-7.woody.8_sparc.deb stable/non-US/main/binary-sparc/libotp0-heimdal_0.4e-7.woody.8_sparc.deb stable/non-US/main/binary-sparc/heimdal-servers_0.4e-7.woody.8_sparc.deb stable/non-US/main/binary-sparc/heimdal-clients-x_0.4e-7.woody.8_sparc.deb stable/non-US/main/binary-sparc/heimdal-clients_0.4e-7.woody.8_sparc.deb stable/non-US/main/binary-sparc/heimdal-servers-x_0.4e-7.woody.8_sparc.deb stable/non-US/main/source/heimdal_0.4e-7.woody.8.dsc stable/non-US/main/binary-sparc/libkadm5clnt4-heimdal_0.4e-7.woody.8_sparc.deb stable/non-US/main/binary-sparc/libcomerr1-heimdal_0.4e-7.woody.8_sparc.deb stable/non-US/main/binary-all/heimdal-lib_0.4e-7.woody.8_all.deb stable/non-US/main/binary-sparc/libasn1-5-heimdal_0.4e-7.woody.8_sparc.deb stable/non-US/main/binary-sparc/libkadm5srv7-heimdal_0.4e-7.woody.8_sparc.deb stable/non-US/main/source/heimdal_0.4e-7.woody.8.diff.gz stable/non-US/main/binary-sparc/libkrb5-17-heimdal_0.4e-7.woody.8_sparc.deb stable/non-US/main/binary-sparc/libsl0-heimdal_0.4e-7.woody.8_sparc.deb stable/non-US/main/binary-sparc/libkafs0-heimdal_0.4e-7.woody.8_sparc.deb stable/non-US/main/binary-sparc/libhdb7-heimdal_0.4e-7.woody.8_sparc.deb stable/non-US/main/binary-all/heimdal-docs_0.4e-7.woody.8_all.deb stable/non-US/main/binary-sparc/libgssapi1-heimdal_0.4e-7.woody.8_sparc.deb stable/non-US/main/binary-sparc/libss0-heimdal_0.4e-7.woody.8_sparc.deb heimdal (0.4e-7.woody.8) stable-security; urgency=medium * Non-maintainer upload by the Security Team * Added special detection routine for big/little endianess on MIPS since the line "byteorder : {big|little} endian" from /proc/cpuinfo was removed as of Linux 2.4.20, resulting in the mipsel buildd being unable to build this package. (032_autotools_mips) stable/non-US/main/binary-s390/courier-imap-ssl_1.4.3-3.3_s390.deb stable/non-US/main/binary-s390/courier-pop-ssl_0.37.3-3.3_s390.deb stable/non-US/main/binary-s390/courier-authpostgresql_0.37.3-3.3_s390.deb stable/non-US/main/binary-s390/courier-ssl_0.37.3-3.3_s390.deb stable/non-US/main/binary-s390/courier-mta-ssl_0.37.3-3.3_s390.deb courier-ssl (0.37.3-3.3) stable-security; urgency=high * Non-maintainer upload by the Security Team * Added special detection routine for big/little endianess on MIPS since the line "byteorder : {big|little} endian" from /proc/cpuinfo was removed as of Linux 2.4.20, resulting in the mipsel buildd being unable to build this package. stable/non-US/main/binary-powerpc/courier-ssl_0.37.3-3.3_powerpc.deb stable/non-US/main/binary-powerpc/courier-mta-ssl_0.37.3-3.3_powerpc.deb stable/non-US/main/binary-powerpc/courier-pop-ssl_0.37.3-3.3_powerpc.deb stable/non-US/main/binary-powerpc/courier-authpostgresql_0.37.3-3.3_powerpc.deb stable/non-US/main/binary-powerpc/courier-imap-ssl_1.4.3-3.3_powerpc.deb courier-ssl (0.37.3-3.3) stable-security; urgency=high * Non-maintainer upload by the Security Team * Added special detection routine for big/little endianess on MIPS since the line "byteorder : {big|little} endian" from /proc/cpuinfo was removed as of Linux 2.4.20, resulting in the mipsel buildd being unable to build this package. stable/non-US/main/binary-mipsel/courier-imap-ssl_1.4.3-3.3_mipsel.deb stable/non-US/main/binary-mipsel/courier-ssl_0.37.3-3.3_mipsel.deb stable/non-US/main/binary-mipsel/courier-mta-ssl_0.37.3-3.3_mipsel.deb stable/non-US/main/binary-mipsel/courier-authpostgresql_0.37.3-3.3_mipsel.deb stable/non-US/main/binary-mipsel/courier-pop-ssl_0.37.3-3.3_mipsel.deb courier-ssl (0.37.3-3.3) stable-security; urgency=high * Non-maintainer upload by the Security Team * Added special detection routine for big/little endianess on MIPS since the line "byteorder : {big|little} endian" from /proc/cpuinfo was removed as of Linux 2.4.20, resulting in the mipsel buildd being unable to build this package. stable/non-US/main/binary-mips/courier-ssl_0.37.3-3.3_mips.deb stable/non-US/main/binary-mips/courier-pop-ssl_0.37.3-3.3_mips.deb stable/non-US/main/binary-mips/courier-authpostgresql_0.37.3-3.3_mips.deb stable/non-US/main/binary-mips/courier-imap-ssl_1.4.3-3.3_mips.deb stable/non-US/main/binary-mips/courier-mta-ssl_0.37.3-3.3_mips.deb courier-ssl (0.37.3-3.3) stable-security; urgency=high * Non-maintainer upload by the Security Team * Added special detection routine for big/little endianess on MIPS since the line "byteorder : {big|little} endian" from /proc/cpuinfo was removed as of Linux 2.4.20, resulting in the mipsel buildd being unable to build this package. stable/non-US/main/binary-m68k/courier-authpostgresql_0.37.3-3.3_m68k.deb stable/non-US/main/binary-m68k/courier-pop-ssl_0.37.3-3.3_m68k.deb stable/non-US/main/binary-m68k/courier-ssl_0.37.3-3.3_m68k.deb stable/non-US/main/binary-m68k/courier-mta-ssl_0.37.3-3.3_m68k.deb stable/non-US/main/binary-m68k/courier-imap-ssl_1.4.3-3.3_m68k.deb courier-ssl (0.37.3-3.3) stable-security; urgency=high * Non-maintainer upload by the Security Team * Added special detection routine for big/little endianess on MIPS since the line "byteorder : {big|little} endian" from /proc/cpuinfo was removed as of Linux 2.4.20, resulting in the mipsel buildd being unable to build this package. stable/non-US/main/binary-ia64/courier-imap-ssl_1.4.3-3.3_ia64.deb stable/non-US/main/binary-ia64/courier-ssl_0.37.3-3.3_ia64.deb stable/non-US/main/binary-ia64/courier-authpostgresql_0.37.3-3.3_ia64.deb stable/non-US/main/binary-ia64/courier-pop-ssl_0.37.3-3.3_ia64.deb stable/non-US/main/binary-ia64/courier-mta-ssl_0.37.3-3.3_ia64.deb courier-ssl (0.37.3-3.3) stable-security; urgency=high * Non-maintainer upload by the Security Team * Added special detection routine for big/little endianess on MIPS since the line "byteorder : {big|little} endian" from /proc/cpuinfo was removed as of Linux 2.4.20, resulting in the mipsel buildd being unable to build this package. stable/non-US/main/binary-i386/courier-mta-ssl_0.37.3-3.3_i386.deb stable/non-US/main/binary-i386/courier-imap-ssl_1.4.3-3.3_i386.deb stable/non-US/main/binary-i386/courier-authpostgresql_0.37.3-3.3_i386.deb stable/non-US/main/binary-i386/courier-pop-ssl_0.37.3-3.3_i386.deb stable/non-US/main/binary-i386/courier-ssl_0.37.3-3.3_i386.deb courier-ssl (0.37.3-3.3) stable-security; urgency=high * Non-maintainer upload by the Security Team * Added special detection routine for big/little endianess on MIPS since the line "byteorder : {big|little} endian" from /proc/cpuinfo was removed as of Linux 2.4.20, resulting in the mipsel buildd being unable to build this package. stable/non-US/main/binary-hppa/courier-ssl_0.37.3-3.3_hppa.deb stable/non-US/main/binary-hppa/courier-imap-ssl_1.4.3-3.3_hppa.deb stable/non-US/main/binary-hppa/courier-mta-ssl_0.37.3-3.3_hppa.deb stable/non-US/main/binary-hppa/courier-pop-ssl_0.37.3-3.3_hppa.deb stable/non-US/main/binary-hppa/courier-authpostgresql_0.37.3-3.3_hppa.deb courier-ssl (0.37.3-3.3) stable-security; urgency=high * Non-maintainer upload by the Security Team * Added special detection routine for big/little endianess on MIPS since the line "byteorder : {big|little} endian" from /proc/cpuinfo was removed as of Linux 2.4.20, resulting in the mipsel buildd being unable to build this package. stable/non-US/main/binary-arm/courier-mta-ssl_0.37.3-3.3_arm.deb stable/non-US/main/binary-arm/courier-imap-ssl_1.4.3-3.3_arm.deb stable/non-US/main/binary-arm/courier-pop-ssl_0.37.3-3.3_arm.deb stable/non-US/main/binary-arm/courier-ssl_0.37.3-3.3_arm.deb stable/non-US/main/binary-arm/courier-authpostgresql_0.37.3-3.3_arm.deb courier-ssl (0.37.3-3.3) stable-security; urgency=high * Non-maintainer upload by the Security Team * Added special detection routine for big/little endianess on MIPS since the line "byteorder : {big|little} endian" from /proc/cpuinfo was removed as of Linux 2.4.20, resulting in the mipsel buildd being unable to build this package. stable/non-US/main/binary-alpha/courier-mta-ssl_0.37.3-3.3_alpha.deb stable/non-US/main/binary-alpha/courier-authpostgresql_0.37.3-3.3_alpha.deb stable/non-US/main/binary-alpha/courier-pop-ssl_0.37.3-3.3_alpha.deb stable/non-US/main/binary-alpha/courier-imap-ssl_1.4.3-3.3_alpha.deb stable/non-US/main/binary-alpha/courier-ssl_0.37.3-3.3_alpha.deb courier-ssl (0.37.3-3.3) stable-security; urgency=high * Non-maintainer upload by the Security Team * Added special detection routine for big/little endianess on MIPS since the line "byteorder : {big|little} endian" from /proc/cpuinfo was removed as of Linux 2.4.20, resulting in the mipsel buildd being unable to build this package. stable/non-US/main/binary-sparc/courier-imap-ssl_1.4.3-3.3_sparc.deb stable/non-US/main/binary-sparc/courier-authpostgresql_0.37.3-3.3_sparc.deb stable/non-US/main/binary-sparc/courier-mta-ssl_0.37.3-3.3_sparc.deb stable/non-US/main/binary-sparc/courier-ssl_0.37.3-3.3_sparc.deb stable/non-US/main/source/courier-ssl_0.37.3-3.3.dsc stable/non-US/main/binary-sparc/courier-pop-ssl_0.37.3-3.3_sparc.deb stable/non-US/main/source/courier-ssl_0.37.3-3.3.diff.gz courier-ssl (0.37.3-3.3) stable-security; urgency=high * Non-maintainer upload by the Security Team * Added special detection routine for big/little endianess on MIPS since the line "byteorder : {big|little} endian" from /proc/cpuinfo was removed as of Linux 2.4.20, resulting in the mipsel buildd being unable to build this package. ========================================= Thu, 20 Nov 2003 - Debian 3.0r2 released ========================================= stable/non-US/main/binary-sparc/python-pgsql_2.0-3.2_sparc.deb stable/non-US/main/binary-sparc/python2.1-pgsql_2.0-3.2_sparc.deb stable/non-US/main/binary-sparc/python2.2-pgsql_2.0-3.2_sparc.deb python-pgsql (2.0-3.2) stable; urgency=high * When calculating how much memory to allocate for the new string in libPQquoteBytea(): - Do not recalculate the string length using strlen(). We already have the string length stored in slen, and since the string may contain null bytes, using strlen() may return incorrect results. This in turn can lead to the unexpected truncation of binary data and subsequent data loss. - Allocate up to 5 bytes per character (not 4). Each null byte in the original string is converted to '\\000', and so allocating just 4 bytes per character can lead to a segfault if the input string contains lots of null bytes. These patches are taken directly from upstream CVS and are already incorporated into newer upstream releases. Closes: #204342 stable/non-US/main/binary-s390/python2.1-pgsql_2.0-3.2_s390.deb stable/non-US/main/binary-s390/python-pgsql_2.0-3.2_s390.deb stable/non-US/main/binary-s390/python2.2-pgsql_2.0-3.2_s390.deb python-pgsql (2.0-3.2) stable; urgency=high * When calculating how much memory to allocate for the new string in libPQquoteBytea(): - Do not recalculate the string length using strlen(). We already have the string length stored in slen, and since the string may contain null bytes, using strlen() may return incorrect results. This in turn can lead to the unexpected truncation of binary data and subsequent data loss. - Allocate up to 5 bytes per character (not 4). Each null byte in the original string is converted to '\\000', and so allocating just 4 bytes per character can lead to a segfault if the input string contains lots of null bytes. These patches are taken directly from upstream CVS and are already incorporated into newer upstream releases. Closes: #204342 stable/non-US/main/binary-powerpc/python2.1-pgsql_2.0-3.2_powerpc.deb stable/non-US/main/binary-powerpc/python-pgsql_2.0-3.2_powerpc.deb stable/non-US/main/binary-powerpc/python2.2-pgsql_2.0-3.2_powerpc.deb python-pgsql (2.0-3.2) stable; urgency=high * When calculating how much memory to allocate for the new string in libPQquoteBytea(): - Do not recalculate the string length using strlen(). We already have the string length stored in slen, and since the string may contain null bytes, using strlen() may return incorrect results. This in turn can lead to the unexpected truncation of binary data and subsequent data loss. - Allocate up to 5 bytes per character (not 4). Each null byte in the original string is converted to '\\000', and so allocating just 4 bytes per character can lead to a segfault if the input string contains lots of null bytes. These patches are taken directly from upstream CVS and are already incorporated into newer upstream releases. Closes: #204342 stable/non-US/main/binary-mipsel/python-pgsql_2.0-3.2_mipsel.deb stable/non-US/main/binary-mipsel/python2.2-pgsql_2.0-3.2_mipsel.deb stable/non-US/main/binary-mipsel/python2.1-pgsql_2.0-3.2_mipsel.deb python-pgsql (2.0-3.2) stable; urgency=high * When calculating how much memory to allocate for the new string in libPQquoteBytea(): - Do not recalculate the string length using strlen(). We already have the string length stored in slen, and since the string may contain null bytes, using strlen() may return incorrect results. This in turn can lead to the unexpected truncation of binary data and subsequent data loss. - Allocate up to 5 bytes per character (not 4). Each null byte in the original string is converted to '\\000', and so allocating just 4 bytes per character can lead to a segfault if the input string contains lots of null bytes. These patches are taken directly from upstream CVS and are already incorporated into newer upstream releases. Closes: #204342 stable/non-US/main/binary-mips/python2.2-pgsql_2.0-3.2_mips.deb stable/non-US/main/binary-mips/python-pgsql_2.0-3.2_mips.deb stable/non-US/main/binary-mips/python2.1-pgsql_2.0-3.2_mips.deb python-pgsql (2.0-3.2) stable; urgency=high * When calculating how much memory to allocate for the new string in libPQquoteBytea(): - Do not recalculate the string length using strlen(). We already have the string length stored in slen, and since the string may contain null bytes, using strlen() may return incorrect results. This in turn can lead to the unexpected truncation of binary data and subsequent data loss. - Allocate up to 5 bytes per character (not 4). Each null byte in the original string is converted to '\\000', and so allocating just 4 bytes per character can lead to a segfault if the input string contains lots of null bytes. These patches are taken directly from upstream CVS and are already incorporated into newer upstream releases. Closes: #204342 stable/non-US/main/binary-m68k/python2.2-pgsql_2.0-3.2_m68k.deb stable/non-US/main/binary-m68k/python2.1-pgsql_2.0-3.2_m68k.deb stable/non-US/main/binary-m68k/python-pgsql_2.0-3.2_m68k.deb python-pgsql (2.0-3.2) stable; urgency=high * When calculating how much memory to allocate for the new string in libPQquoteBytea(): - Do not recalculate the string length using strlen(). We already have the string length stored in slen, and since the string may contain null bytes, using strlen() may return incorrect results. This in turn can lead to the unexpected truncation of binary data and subsequent data loss. - Allocate up to 5 bytes per character (not 4). Each null byte in the original string is converted to '\\000', and so allocating just 4 bytes per character can lead to a segfault if the input string contains lots of null bytes. These patches are taken directly from upstream CVS and are already incorporated into newer upstream releases. Closes: #204342 stable/non-US/main/binary-ia64/python2.2-pgsql_2.0-3.2_ia64.deb stable/non-US/main/binary-ia64/python2.1-pgsql_2.0-3.2_ia64.deb stable/non-US/main/binary-ia64/python-pgsql_2.0-3.2_ia64.deb python-pgsql (2.0-3.2) stable; urgency=high * When calculating how much memory to allocate for the new string in libPQquoteBytea(): - Do not recalculate the string length using strlen(). We already have the string length stored in slen, and since the string may contain null bytes, using strlen() may return incorrect results. This in turn can lead to the unexpected truncation of binary data and subsequent data loss. - Allocate up to 5 bytes per character (not 4). Each null byte in the original string is converted to '\\000', and so allocating just 4 bytes per character can lead to a segfault if the input string contains lots of null bytes. These patches are taken directly from upstream CVS and are already incorporated into newer upstream releases. Closes: #204342 stable/non-US/main/binary-hppa/python-pgsql_2.0-3.2_hppa.deb stable/non-US/main/binary-hppa/python2.1-pgsql_2.0-3.2_hppa.deb stable/non-US/main/binary-hppa/python2.2-pgsql_2.0-3.2_hppa.deb python-pgsql (2.0-3.2) stable; urgency=high * When calculating how much memory to allocate for the new string in libPQquoteBytea(): - Do not recalculate the string length using strlen(). We already have the string length stored in slen, and since the string may contain null bytes, using strlen() may return incorrect results. This in turn can lead to the unexpected truncation of binary data and subsequent data loss. - Allocate up to 5 bytes per character (not 4). Each null byte in the original string is converted to '\\000', and so allocating just 4 bytes per character can lead to a segfault if the input string contains lots of null bytes. These patches are taken directly from upstream CVS and are already incorporated into newer upstream releases. Closes: #204342 stable/non-US/main/binary-arm/python-pgsql_2.0-3.2_arm.deb stable/non-US/main/binary-arm/python2.2-pgsql_2.0-3.2_arm.deb stable/non-US/main/binary-arm/python2.1-pgsql_2.0-3.2_arm.deb python-pgsql (2.0-3.2) stable; urgency=high * When calculating how much memory to allocate for the new string in libPQquoteBytea(): - Do not recalculate the string length using strlen(). We already have the string length stored in slen, and since the string may contain null bytes, using strlen() may return incorrect results. This in turn can lead to the unexpected truncation of binary data and subsequent data loss. - Allocate up to 5 bytes per character (not 4). Each null byte in the original string is converted to '\\000', and so allocating just 4 bytes per character can lead to a segfault if the input string contains lots of null bytes. These patches are taken directly from upstream CVS and are already incorporated into newer upstream releases. Closes: #204342 stable/non-US/main/binary-alpha/python2.1-pgsql_2.0-3.2_alpha.deb stable/non-US/main/binary-alpha/python2.2-pgsql_2.0-3.2_alpha.deb stable/non-US/main/binary-alpha/python-pgsql_2.0-3.2_alpha.deb python-pgsql (2.0-3.2) stable; urgency=high * When calculating how much memory to allocate for the new string in libPQquoteBytea(): - Do not recalculate the string length using strlen(). We already have the string length stored in slen, and since the string may contain null bytes, using strlen() may return incorrect results. This in turn can lead to the unexpected truncation of binary data and subsequent data loss. - Allocate up to 5 bytes per character (not 4). Each null byte in the original string is converted to '\\000', and so allocating just 4 bytes per character can lead to a segfault if the input string contains lots of null bytes. These patches are taken directly from upstream CVS and are already incorporated into newer upstream releases. Closes: #204342 stable/non-US/main/binary-i386/python2.1-pgsql_2.0-3.2_i386.deb stable/non-US/main/source/python-pgsql_2.0-3.2.dsc stable/non-US/main/source/python-pgsql_2.0-3.2.diff.gz stable/non-US/main/binary-i386/python2.2-pgsql_2.0-3.2_i386.deb stable/non-US/main/binary-i386/python-pgsql_2.0-3.2_i386.deb python-pgsql (2.0-3.2) stable; urgency=high * When calculating how much memory to allocate for the new string in libPQquoteBytea(): - Do not recalculate the string length using strlen(). We already have the string length stored in slen, and since the string may contain null bytes, using strlen() may return incorrect results. This in turn can lead to the unexpected truncation of binary data and subsequent data loss. - Allocate up to 5 bytes per character (not 4). Each null byte in the original string is converted to '\\000', and so allocating just 4 bytes per character can lead to a segfault if the input string contains lots of null bytes. These patches are taken directly from upstream CVS and are already incorporated into newer upstream releases. Closes: #204342 stable/non-US/main/binary-sparc/libpam-pgsql_0.5.2-3woody1_sparc.deb pam-pgsql (0.5.2-3woody1) stable-security; urgency=high * Security fix in logging function handles format string vulnerability. Thanks to Florian Zumbiehl for pointing this out. (CAN-2003-0672) stable/non-US/main/binary-s390/libpam-pgsql_0.5.2-3woody1_s390.deb pam-pgsql (0.5.2-3woody1) stable-security; urgency=high * Security fix in logging function handles format string vulnerability. Thanks to Florian Zumbiehl for pointing this out. (CAN-2003-0672) stable/non-US/main/binary-powerpc/libpam-pgsql_0.5.2-3woody1_powerpc.deb pam-pgsql (0.5.2-3woody1) stable-security; urgency=high * Security fix in logging function handles format string vulnerability. Thanks to Florian Zumbiehl for pointing this out. (CAN-2003-0672) stable/non-US/main/binary-mipsel/libpam-pgsql_0.5.2-3woody1_mipsel.deb pam-pgsql (0.5.2-3woody1) stable-security; urgency=high * Security fix in logging function handles format string vulnerability. Thanks to Florian Zumbiehl for pointing this out. (CAN-2003-0672) stable/non-US/main/binary-mips/libpam-pgsql_0.5.2-3woody1_mips.deb pam-pgsql (0.5.2-3woody1) stable-security; urgency=high * Security fix in logging function handles format string vulnerability. Thanks to Florian Zumbiehl for pointing this out. (CAN-2003-0672) stable/non-US/main/binary-m68k/libpam-pgsql_0.5.2-3woody1_m68k.deb pam-pgsql (0.5.2-3woody1) stable-security; urgency=high * Security fix in logging function handles format string vulnerability. Thanks to Florian Zumbiehl for pointing this out. (CAN-2003-0672) stable/non-US/main/binary-ia64/libpam-pgsql_0.5.2-3woody1_ia64.deb pam-pgsql (0.5.2-3woody1) stable-security; urgency=high * Security fix in logging function handles format string vulnerability. Thanks to Florian Zumbiehl for pointing this out. (CAN-2003-0672) stable/non-US/main/binary-hppa/libpam-pgsql_0.5.2-3woody1_hppa.deb pam-pgsql (0.5.2-3woody1) stable-security; urgency=high * Security fix in logging function handles format string vulnerability. Thanks to Florian Zumbiehl for pointing this out. (CAN-2003-0672) stable/non-US/main/binary-arm/libpam-pgsql_0.5.2-3woody1_arm.deb pam-pgsql (0.5.2-3woody1) stable-security; urgency=high * Security fix in logging function handles format string vulnerability. Thanks to Florian Zumbiehl for pointing this out. (CAN-2003-0672) stable/non-US/main/binary-alpha/libpam-pgsql_0.5.2-3woody1_alpha.deb pam-pgsql (0.5.2-3woody1) stable-security; urgency=high * Security fix in logging function handles format string vulnerability. Thanks to Florian Zumbiehl for pointing this out. (CAN-2003-0672) stable/non-US/main/source/pam-pgsql_0.5.2-3woody1.diff.gz stable/non-US/main/binary-i386/libpam-pgsql_0.5.2-3woody1_i386.deb stable/non-US/main/source/pam-pgsql_0.5.2-3woody1.dsc pam-pgsql (0.5.2-3woody1) stable-security; urgency=high * Security fix in logging function handles format string vulnerability. Thanks to Florian Zumbiehl for pointing this out. (CAN-2003-0672) stable/non-US/main/binary-powerpc/libssl095a_0.9.5a-6.woody.3_powerpc.deb openssl095 (0.9.5a-6.woody.3) stable-security; urgency=high * Non-maintainer upload by the Security Team * Applied upstream patch by Steve Henson from the upstream CVS http://cvs.openssl.org/chngview?cn=11470 (CAN-2003-0544, CAN-2003-0543, crypto/x509/x509_vfy.c, crypto/asn1/asn1_lib.c) stable/non-US/main/binary-mipsel/libssl095a_0.9.5a-6.woody.3_mipsel.deb openssl095 (0.9.5a-6.woody.3) stable-security; urgency=high * Non-maintainer upload by the Security Team * Applied upstream patch by Steve Henson from the upstream CVS http://cvs.openssl.org/chngview?cn=11470 (CAN-2003-0544, CAN-2003-0543, crypto/x509/x509_vfy.c, crypto/asn1/asn1_lib.c) stable/non-US/main/binary-mips/libssl095a_0.9.5a-6.woody.3_mips.deb openssl095 (0.9.5a-6.woody.3) stable-security; urgency=high * Non-maintainer upload by the Security Team * Applied upstream patch by Steve Henson from the upstream CVS http://cvs.openssl.org/chngview?cn=11470 (CAN-2003-0544, CAN-2003-0543, crypto/x509/x509_vfy.c, crypto/asn1/asn1_lib.c) stable/non-US/main/binary-m68k/libssl095a_0.9.5a-6.woody.3_m68k.deb openssl095 (0.9.5a-6.woody.3) stable-security; urgency=high * Non-maintainer upload by the Security Team * Applied upstream patch by Steve Henson from the upstream CVS http://cvs.openssl.org/chngview?cn=11470 (CAN-2003-0544, CAN-2003-0543, crypto/x509/x509_vfy.c, crypto/asn1/asn1_lib.c) stable/non-US/main/binary-i386/libssl095a_0.9.5a-6.woody.3_i386.deb openssl095 (0.9.5a-6.woody.3) stable-security; urgency=high * Non-maintainer upload by the Security Team * Applied upstream patch by Steve Henson from the upstream CVS http://cvs.openssl.org/chngview?cn=11470 (CAN-2003-0544, CAN-2003-0543, crypto/x509/x509_vfy.c, crypto/asn1/asn1_lib.c) stable/non-US/main/binary-arm/libssl095a_0.9.5a-6.woody.3_arm.deb openssl095 (0.9.5a-6.woody.3) stable-security; urgency=high * Non-maintainer upload by the Security Team * Applied upstream patch by Steve Henson from the upstream CVS http://cvs.openssl.org/chngview?cn=11470 (CAN-2003-0544, CAN-2003-0543, crypto/x509/x509_vfy.c, crypto/asn1/asn1_lib.c) stable/non-US/main/binary-alpha/libssl095a_0.9.5a-6.woody.3_alpha.deb openssl095 (0.9.5a-6.woody.3) stable-security; urgency=high * Non-maintainer upload by the Security Team * Applied upstream patch by Steve Henson from the upstream CVS http://cvs.openssl.org/chngview?cn=11470 (CAN-2003-0544, CAN-2003-0543, crypto/x509/x509_vfy.c, crypto/asn1/asn1_lib.c) stable/non-US/main/source/openssl095_0.9.5a-6.woody.3.dsc stable/non-US/main/binary-sparc/libssl095a_0.9.5a-6.woody.3_sparc.deb stable/non-US/main/source/openssl095_0.9.5a-6.woody.3.diff.gz openssl095 (0.9.5a-6.woody.3) stable-security; urgency=high * Non-maintainer upload by the Security Team * Applied upstream patch by Steve Henson from the upstream CVS http://cvs.openssl.org/chngview?cn=11470 (CAN-2003-0544, CAN-2003-0543, crypto/x509/x509_vfy.c, crypto/asn1/asn1_lib.c) stable/non-US/main/binary-sparc/kdelibs3-crypto_2.2.2-6woody2_sparc.deb kdelibs-crypto (4:2.2.2-6woody2) stable-security; urgency=high * Non-maintainer upload by the Security Team * Update config.guess and config.sub to fix build on mips, mipsel stable/non-US/main/binary-s390/kdelibs3-crypto_2.2.2-6woody2_s390.deb kdelibs-crypto (4:2.2.2-6woody2) stable-security; urgency=high * Non-maintainer upload by the Security Team * Update config.guess and config.sub to fix build on mips, mipsel stable/non-US/main/binary-powerpc/kdelibs3-crypto_2.2.2-6woody2_powerpc.deb kdelibs-crypto (4:2.2.2-6woody2) stable-security; urgency=high * Non-maintainer upload by the Security Team * Update config.guess and config.sub to fix build on mips, mipsel stable/non-US/main/binary-mipsel/kdelibs3-crypto_2.2.2-6woody2_mipsel.deb kdelibs-crypto (4:2.2.2-6woody2) stable-security; urgency=high * Non-maintainer upload by the Security Team * Update config.guess and config.sub to fix build on mips, mipsel stable/non-US/main/binary-mips/kdelibs3-crypto_2.2.2-6woody2_mips.deb kdelibs-crypto (4:2.2.2-6woody2) stable-security; urgency=high * Non-maintainer upload by the Security Team * Update config.guess and config.sub to fix build on mips, mipsel stable/non-US/main/binary-m68k/kdelibs3-crypto_2.2.2-6woody2_m68k.deb kdelibs-crypto (4:2.2.2-6woody2) stable-security; urgency=high * Non-maintainer upload by the Security Team * Update config.guess and config.sub to fix build on mips, mipsel stable/non-US/main/binary-ia64/kdelibs3-crypto_2.2.2-6woody2_ia64.deb kdelibs-crypto (4:2.2.2-6woody2) stable-security; urgency=high * Non-maintainer upload by the Security Team * Update config.guess and config.sub to fix build on mips, mipsel stable/non-US/main/binary-hppa/kdelibs3-crypto_2.2.2-6woody2_hppa.deb kdelibs-crypto (4:2.2.2-6woody2) stable-security; urgency=high * Non-maintainer upload by the Security Team * Update config.guess and config.sub to fix build on mips, mipsel stable/non-US/main/binary-arm/kdelibs3-crypto_2.2.2-6woody2_arm.deb kdelibs-crypto (4:2.2.2-6woody2) stable-security; urgency=high * Non-maintainer upload by the Security Team * Update config.guess and config.sub to fix build on mips, mipsel stable/non-US/main/binary-alpha/kdelibs3-crypto_2.2.2-6woody2_alpha.deb kdelibs-crypto (4:2.2.2-6woody2) stable-security; urgency=high * Non-maintainer upload by the Security Team * Update config.guess and config.sub to fix build on mips, mipsel stable/non-US/main/binary-i386/kdelibs3-crypto_2.2.2-6woody2_i386.deb stable/non-US/main/source/kdelibs-crypto_2.2.2-6woody2.diff.gz stable/non-US/main/source/kdelibs-crypto_2.2.2-6woody2.dsc kdelibs-crypto (4:2.2.2-6woody2) stable-security; urgency=high * Non-maintainer upload by the Security Team * Update config.guess and config.sub to fix build on mips, mipsel stable/non-US/main/binary-sparc/exim-tls_3.35-3woody1_sparc.deb exim-tls (3.35-3woody1) stable-security; urgency=high * Non-maintainer upload by the Security Team * Fix buffer overflow in HELO/EHLO processing (CAN-2003-0698) Probably could not be used to execute arbitrary code stable/non-US/main/binary-s390/exim-tls_3.35-3woody1_s390.deb exim-tls (3.35-3woody1) stable-security; urgency=high * Non-maintainer upload by the Security Team * Fix buffer overflow in HELO/EHLO processing (CAN-2003-0698) Probably could not be used to execute arbitrary code stable/non-US/main/binary-powerpc/exim-tls_3.35-3woody1_powerpc.deb exim-tls (3.35-3woody1) stable-security; urgency=high * Non-maintainer upload by the Security Team * Fix buffer overflow in HELO/EHLO processing (CAN-2003-0698) Probably could not be used to execute arbitrary code stable/non-US/main/binary-mipsel/exim-tls_3.35-3woody1_mipsel.deb exim-tls (3.35-3woody1) stable-security; urgency=high * Non-maintainer upload by the Security Team * Fix buffer overflow in HELO/EHLO processing (CAN-2003-0698) Probably could not be used to execute arbitrary code stable/non-US/main/binary-mips/exim-tls_3.35-3woody1_mips.deb exim-tls (3.35-3woody1) stable-security; urgency=high * Non-maintainer upload by the Security Team * Fix buffer overflow in HELO/EHLO processing (CAN-2003-0698) Probably could not be used to execute arbitrary code stable/non-US/main/binary-m68k/exim-tls_3.35-3woody1_m68k.deb exim-tls (3.35-3woody1) stable-security; urgency=high * Non-maintainer upload by the Security Team * Fix buffer overflow in HELO/EHLO processing (CAN-2003-0698) Probably could not be used to execute arbitrary code stable/non-US/main/binary-ia64/exim-tls_3.35-3woody1_ia64.deb exim-tls (3.35-3woody1) stable-security; urgency=high * Non-maintainer upload by the Security Team * Fix buffer overflow in HELO/EHLO processing (CAN-2003-0698) Probably could not be used to execute arbitrary code stable/non-US/main/binary-hppa/exim-tls_3.35-3woody1_hppa.deb exim-tls (3.35-3woody1) stable-security; urgency=high * Non-maintainer upload by the Security Team * Fix buffer overflow in HELO/EHLO processing (CAN-2003-0698) Probably could not be used to execute arbitrary code stable/non-US/main/binary-arm/exim-tls_3.35-3woody1_arm.deb exim-tls (3.35-3woody1) stable-security; urgency=high * Non-maintainer upload by the Security Team * Fix buffer overflow in HELO/EHLO processing (CAN-2003-0698) Probably could not be used to execute arbitrary code stable/non-US/main/binary-alpha/exim-tls_3.35-3woody1_alpha.deb exim-tls (3.35-3woody1) stable-security; urgency=high * Non-maintainer upload by the Security Team * Fix buffer overflow in HELO/EHLO processing (CAN-2003-0698) Probably could not be used to execute arbitrary code stable/non-US/main/source/exim-tls_3.35-3woody1.dsc stable/non-US/main/binary-i386/exim-tls_3.35-3woody1_i386.deb stable/non-US/main/source/exim-tls_3.35-3woody1.diff.gz exim-tls (3.35-3woody1) stable-security; urgency=high * Non-maintainer upload by the Security Team * Fix buffer overflow in HELO/EHLO processing (CAN-2003-0698) Probably could not be used to execute arbitrary code ========================================= Sun, 15 Dec 2002 - Debian 3.0r1 released ========================================= Removed the following packages from stable: libgnupg-perl | 0.9-1 | source, all (Reason: requested by Stable Release Manager) "Moved to ftp-master." ---- stable/non-US/main/binary-sparc/freeswan_1.96-1.4_sparc.deb freeswan (1.96-1.4) stable-security; urgency=high * Non-maintainer upload by the Security Team * Second injection into the security build network since 8 buildds refuse to upload the binary packages and the maintainer refuses to answer. *sigh* stable/non-US/main/binary-s390/freeswan_1.96-1.4_s390.deb freeswan (1.96-1.4) stable-security; urgency=high * Non-maintainer upload by the Security Team * Second injection into the security build network since 8 buildds refuse to upload the binary packages and the maintainer refuses to answer. *sigh* stable/non-US/main/binary-powerpc/freeswan_1.96-1.4_powerpc.deb freeswan (1.96-1.4) stable-security; urgency=high * Non-maintainer upload by the Security Team * Second injection into the security build network since 8 buildds refuse to upload the binary packages and the maintainer refuses to answer. *sigh* stable/non-US/main/binary-mips/freeswan_1.96-1.4_mips.deb freeswan (1.96-1.4) stable-security; urgency=high * Non-maintainer upload by the Security Team * Second injection into the security build network since 8 buildds refuse to upload the binary packages and the maintainer refuses to answer. *sigh* stable/non-US/main/binary-m68k/freeswan_1.96-1.4_m68k.deb freeswan (1.96-1.4) stable-security; urgency=high * Non-maintainer upload by the Security Team * Second injection into the security build network since 8 buildds refuse to upload the binary packages and the maintainer refuses to answer. *sigh* stable/non-US/main/binary-ia64/freeswan_1.96-1.4_ia64.deb freeswan (1.96-1.4) stable-security; urgency=high * Non-maintainer upload by the Security Team * Second injection into the security build network since 8 buildds refuse to upload the binary packages and the maintainer refuses to answer. *sigh* stable/non-US/main/binary-i386/freeswan_1.96-1.4_i386.deb freeswan (1.96-1.4) stable-security; urgency=high * Non-maintainer upload by the Security Team * Second injection into the security build network since 8 buildds refuse to upload the binary packages and the maintainer refuses to answer. *sigh* stable/non-US/main/binary-hppa/freeswan_1.96-1.4_hppa.deb freeswan (1.96-1.4) stable-security; urgency=high * Non-maintainer upload by the Security Team * Second injection into the security build network since 8 buildds refuse to upload the binary packages and the maintainer refuses to answer. *sigh* stable/non-US/main/binary-arm/freeswan_1.96-1.4_arm.deb freeswan (1.96-1.4) stable-security; urgency=high * Non-maintainer upload by the Security Team * Second injection into the security build network since 8 buildds refuse to upload the binary packages and the maintainer refuses to answer. *sigh* stable/non-US/main/binary-alpha/freeswan_1.96-1.4_alpha.deb freeswan (1.96-1.4) stable-security; urgency=high * Non-maintainer upload by the Security Team * Second injection into the security build network since 8 buildds refuse to upload the binary packages and the maintainer refuses to answer. *sigh* stable/non-US/main/source/freeswan_1.96-1.4.dsc stable/non-US/main/binary-all/kernel-patch-freeswan_1.96-1.4_all.deb stable/non-US/main/binary-mipsel/freeswan_1.96-1.4_mipsel.deb stable/non-US/main/source/freeswan_1.96-1.4.diff.gz freeswan (1.96-1.4) stable-security; urgency=high * Non-maintainer upload by the Security Team * Second injection into the security build network since 8 buildds refuse to upload the binary packages and the maintainer refuses to answer. *sigh* ========================================= Sat, 20 Jul 2002 - Debian 3.0r0 released =========================================