---

Debian GNU/Linux Advisories: libpng3, libpng, ecartis


Debian Security Advisory DSA 571-1 security@debian.org
http://www.debian.org/security/
Martin Schulze
October 20th, 2004 http://www.debian.org/security/faq


Package : libpng3
Vulnerability : buffer overflows, integer overflow
Problem-Type : remote
Debian-specific: no
CVE ID : CAN-2004-0955

Several integer overflows have been discovered by its upstream
developers in libpng, a commonly used library to display PNG
graphics. They could be exploited to cause arbitrary code to be
executed when a specially crafted PNG image is processed.

For the stable distribution (woody) these problems have been
fixed in version 1.2.1-1.1.woody.9.

For the unstable distribution (sid) these problems have been
fixed in version 1.2.5.0-9.

We recommend that you upgrade your libpng3 packages.

Upgrade Instructions


wget url

will fetch the file for you
dpkg -i file.deb

will install the referenced file.

If you are using the apt-get package manager, use the line for
sources.list as given below:

apt-get update

will update the internal database apt-get upgrade

will install corrected packages

You may use an automated update by adding the resources from the
footer to the proper configuration.

Debian GNU/Linux 3.0 alias woody


Source archives:


http://security.debian.org/pool/updates/main/libp/libpng3/libpng3_1.2.1-1.1.woody.9.dsc

Size/MD5 checksum: 583 a11e8a7d236ca98e6581b6066a35c7f9

http://security.debian.org/pool/updates/main/libp/libpng3/libpng3_1.2.1-1.1.woody.9.diff.gz

Size/MD5 checksum: 10791 a68eee4690473d8402743f30d431db4d

http://security.debian.org/pool/updates/main/libp/libpng3/libpng3_1.2.1.orig.tar.gz

Size/MD5 checksum: 493105 75a21cbfae566158a0ac6d9f39087c4d

Alpha architecture:


http://security.debian.org/pool/updates/main/libp/libpng3/libpng-dev_1.2.1-1.1.woody.9_alpha.deb

Size/MD5 checksum: 276634 dc9d30c7bb1213bf339e96a9d9b4c4ad

http://security.debian.org/pool/updates/main/libp/libpng3/libpng3_1.2.1-1.1.woody.9_alpha.deb

Size/MD5 checksum: 133666 1441a7afe56c6d0b01c09b635026a2b4

ARM architecture:


http://security.debian.org/pool/updates/main/libp/libpng3/libpng-dev_1.2.1-1.1.woody.9_arm.deb

Size/MD5 checksum: 247780 97f36aa3e35547e3b095999fcf3fb694

http://security.debian.org/pool/updates/main/libp/libpng3/libpng3_1.2.1-1.1.woody.9_arm.deb

Size/MD5 checksum: 112314 2f5c3fe3190ce8d52836cfe682236cbb

Intel IA-32 architecture:


http://security.debian.org/pool/updates/main/libp/libpng3/libpng-dev_1.2.1-1.1.woody.9_i386.deb

Size/MD5 checksum: 233356 480296fd503d8de105716bca44c59136

http://security.debian.org/pool/updates/main/libp/libpng3/libpng3_1.2.1-1.1.woody.9_i386.deb

Size/MD5 checksum: 110678 60cbe7dcb206efcc95add2e83b1e06e5

Intel IA-64 architecture:


http://security.debian.org/pool/updates/main/libp/libpng3/libpng-dev_1.2.1-1.1.woody.9_ia64.deb

Size/MD5 checksum: 279022 22c86cf1b67c6a1d162eb42a9202a237

http://security.debian.org/pool/updates/main/libp/libpng3/libpng3_1.2.1-1.1.woody.9_ia64.deb

Size/MD5 checksum: 151874 82e6a6772fe5506c93cb90c52de2891e

HP Precision architecture:


http://security.debian.org/pool/updates/main/libp/libpng3/libpng-dev_1.2.1-1.1.woody.9_hppa.deb

Size/MD5 checksum: 269872 036ce4ca8f8934b00d4b2af6f05ff552

http://security.debian.org/pool/updates/main/libp/libpng3/libpng3_1.2.1-1.1.woody.9_hppa.deb

Size/MD5 checksum: 133022 ee3c8bb4e5b820be62d1efd8c708559c

Motorola 680×0 architecture:


http://security.debian.org/pool/updates/main/libp/libpng3/libpng-dev_1.2.1-1.1.woody.9_m68k.deb

Size/MD5 checksum: 226502 8ba581615baf0983b2e86c2b9ccfc187

http://security.debian.org/pool/updates/main/libp/libpng3/libpng3_1.2.1-1.1.woody.9_m68k.deb

Size/MD5 checksum: 107094 7923c57162269188601cb00763465584

Big endian MIPS architecture:


http://security.debian.org/pool/updates/main/libp/libpng3/libpng-dev_1.2.1-1.1.woody.9_mips.deb

Size/MD5 checksum: 247200 0aa9e85a752c4759a43c591a97655208

http://security.debian.org/pool/updates/main/libp/libpng3/libpng3_1.2.1-1.1.woody.9_mips.deb

Size/MD5 checksum: 112508 5fa27ff5c3bef5f58be7337468c21f76

Little endian MIPS architecture:


http://security.debian.org/pool/updates/main/libp/libpng3/libpng-dev_1.2.1-1.1.woody.9_mipsel.deb

Size/MD5 checksum: 247134 f1b8922fff3d7ae70201b07697c97a92

http://security.debian.org/pool/updates/main/libp/libpng3/libpng3_1.2.1-1.1.woody.9_mipsel.deb

Size/MD5 checksum: 112416 eea654666ee8a3402f3bd3af95bdbfe3

PowerPC architecture:


http://security.debian.org/pool/updates/main/libp/libpng3/libpng-dev_1.2.1-1.1.woody.9_powerpc.deb

Size/MD5 checksum: 240886 9ad9c699045cea5f31c9e49ef8625583

http://security.debian.org/pool/updates/main/libp/libpng3/libpng3_1.2.1-1.1.woody.9_powerpc.deb

Size/MD5 checksum: 113642 763d6a6a326a7fcb81d94ad630594aee

IBM S/390 architecture:


http://security.debian.org/pool/updates/main/libp/libpng3/libpng-dev_1.2.1-1.1.woody.9_s390.deb

Size/MD5 checksum: 235188 c94798e9f884e98276544afbda776a10

http://security.debian.org/pool/updates/main/libp/libpng3/libpng3_1.2.1-1.1.woody.9_s390.deb

Size/MD5 checksum: 113662 f0d50c1b3b29347e0cc36a6eee2171f3

Sun Sparc architecture:


http://security.debian.org/pool/updates/main/libp/libpng3/libpng-dev_1.2.1-1.1.woody.9_sparc.deb

Size/MD5 checksum: 237942 17fbcdce55e78974c9cc0d6003905e92

http://security.debian.org/pool/updates/main/libp/libpng3/libpng3_1.2.1-1.1.woody.9_sparc.deb

Size/MD5 checksum: 114004 57b22ae95161928ff01797cb823efdfc

These files will probably be moved into the stable distribution
on its next update.



Debian Security Advisory DSA 570-1 security@debian.org
http://www.debian.org/security/
Martin Schulze
October 20th, 2004 http://www.debian.org/security/faq


Package : libpng
Vulnerability : integer overflow
Problem-Type : remote
Debian-specific: no
CVE ID : CAN-2004-0955

Several integer overflows have been discovered by its upstream
developers in libpng, a commonly used library to display PNG
graphics. They could be exploited to cause arbitrary code to be
executed when a specially crafted PNG image is processed.

For the stable distribution (woody) this problem has been fixed
in version 1.0.12-3.woody.9.

For the unstable distribution (sid) this problem has been fixed
in version 1.0.15-8.

We recommend that you upgrade your libpng packages.

Upgrade Instructions


wget url

will fetch the file for you
dpkg -i file.deb

will install the referenced file.

If you are using the apt-get package manager, use the line for
sources.list as given below:

apt-get update

will update the internal database apt-get upgrade

will install corrected packages

You may use an automated update by adding the resources from the
footer to the proper configuration.

Debian GNU/Linux 3.0 alias woody


Source archives:


http://security.debian.org/pool/updates/main/libp/libpng/libpng_1.0.12-3.woody.9.dsc

Size/MD5 checksum: 580 7df7d1e0bbd2332551a14cc0a21dddf7

http://security.debian.org/pool/updates/main/libp/libpng/libpng_1.0.12-3.woody.9.diff.gz

Size/MD5 checksum: 10396 dbf46963e7b26473fffba63a92791286

http://security.debian.org/pool/updates/main/libp/libpng/libpng_1.0.12.orig.tar.gz

Size/MD5 checksum: 481387 3329b745968e41f6f9e55a4d04a4964c

Alpha architecture:


http://security.debian.org/pool/updates/main/libp/libpng/libpng2_1.0.12-3.woody.9_alpha.deb

Size/MD5 checksum: 130374 1044ec55646f8e94e218bf4613db1f60

http://security.debian.org/pool/updates/main/libp/libpng/libpng2-dev_1.0.12-3.woody.9_alpha.deb

Size/MD5 checksum: 270440 74a5b9e3bc1b2fc2648133e196894b4f

ARM architecture:


http://security.debian.org/pool/updates/main/libp/libpng/libpng2_1.0.12-3.woody.9_arm.deb

Size/MD5 checksum: 109148 60e7475df4f824043242559b7d64322e

http://security.debian.org/pool/updates/main/libp/libpng/libpng2-dev_1.0.12-3.woody.9_arm.deb

Size/MD5 checksum: 241496 f9ad072eb50a9391ce4b105eff9b2cba

Intel IA-32 architecture:


http://security.debian.org/pool/updates/main/libp/libpng/libpng2_1.0.12-3.woody.9_i386.deb

Size/MD5 checksum: 107434 e81d90d93fc69329f1fc842666ab8bf2

http://security.debian.org/pool/updates/main/libp/libpng/libpng2-dev_1.0.12-3.woody.9_i386.deb

Size/MD5 checksum: 227648 a5495e210300e511e7c265e86303c909

Intel IA-64 architecture:


http://security.debian.org/pool/updates/main/libp/libpng/libpng2_1.0.12-3.woody.9_ia64.deb

Size/MD5 checksum: 147520 5292b0c17956697fa682a95be34abc0d

http://security.debian.org/pool/updates/main/libp/libpng/libpng2-dev_1.0.12-3.woody.9_ia64.deb

Size/MD5 checksum: 271938 ae7b7fed469735915bbdf87ab02f80a3

HP Precision architecture:


http://security.debian.org/pool/updates/main/libp/libpng/libpng2_1.0.12-3.woody.9_hppa.deb

Size/MD5 checksum: 128830 b1937fc261ba66c8b69605c0f8df9305

http://security.debian.org/pool/updates/main/libp/libpng/libpng2-dev_1.0.12-3.woody.9_hppa.deb

Size/MD5 checksum: 262630 be93d764c002923fb1e6d5385b12e200

Motorola 680×0 architecture:


http://security.debian.org/pool/updates/main/libp/libpng/libpng2_1.0.12-3.woody.9_m68k.deb

Size/MD5 checksum: 104172 86a18a750a19efbe94f8b79d9e4e89c8

http://security.debian.org/pool/updates/main/libp/libpng/libpng2-dev_1.0.12-3.woody.9_m68k.deb

Size/MD5 checksum: 220804 d4b278997d86fe7cd824f2ad820a8466

Big endian MIPS architecture:


http://security.debian.org/pool/updates/main/libp/libpng/libpng2_1.0.12-3.woody.9_mips.deb

Size/MD5 checksum: 109184 b825d9e4e59ed06f5ff718d86c078714

http://security.debian.org/pool/updates/main/libp/libpng/libpng2-dev_1.0.12-3.woody.9_mips.deb

Size/MD5 checksum: 240698 883d442e57eef30ad86251ce2ffed701

Little endian MIPS architecture:


http://security.debian.org/pool/updates/main/libp/libpng/libpng2_1.0.12-3.woody.9_mipsel.deb

Size/MD5 checksum: 109102 eb85fee5ef0e9516372a7e245fd781ce

http://security.debian.org/pool/updates/main/libp/libpng/libpng2-dev_1.0.12-3.woody.9_mipsel.deb

Size/MD5 checksum: 240576 da9b75f48689e9277b8a053c014e8ddc

PowerPC architecture:


http://security.debian.org/pool/updates/main/libp/libpng/libpng2_1.0.12-3.woody.9_powerpc.deb

Size/MD5 checksum: 110504 b7ab6493588e05c09811e3f58fa747b2

http://security.debian.org/pool/updates/main/libp/libpng/libpng2-dev_1.0.12-3.woody.9_powerpc.deb

Size/MD5 checksum: 234800 1e1bacb0bbe2d80166d4ce9f96348828

IBM S/390 architecture:


http://security.debian.org/pool/updates/main/libp/libpng/libpng2_1.0.12-3.woody.9_s390.deb

Size/MD5 checksum: 110520 29172e2fc592785d44b5779ed7787f08

http://security.debian.org/pool/updates/main/libp/libpng/libpng2-dev_1.0.12-3.woody.9_s390.deb

Size/MD5 checksum: 229560 2577f1ecee02f71af34ca9aecbd70dd7

Sun Sparc architecture:


http://security.debian.org/pool/updates/main/libp/libpng/libpng2_1.0.12-3.woody.9_sparc.deb

Size/MD5 checksum: 110564 2eac357f311054279ef941a87befb62f

http://security.debian.org/pool/updates/main/libp/libpng/libpng2-dev_1.0.12-3.woody.9_sparc.deb

Size/MD5 checksum: 232302 7691bd27595acd87249be24746f47186

These files will probably be moved into the stable distribution
on its next update.



Debian Security Advisory DSA 572-1 security@debian.org
http://www.debian.org/security/
Martin Schulze
October 21st, 2004 http://www.debian.org/security/faq


Package : ecartis
Vulnerability : several
Problem-Type : remote
Debian-specific: no
CVE ID : CAN-2004-0913

A problem has been discovered in ecartis, a mailing-list
manager, which allows an attacker in the same domain as the list
admin to gain administrator privileges and alter list settings.

For the stable distribution (woody) this problem has been fixed
in version 0.129a+1.0.0-snap20020514-1.3.

For the unstable distribution (sid) this problem has been fixed
in version 1.0.0+cvs.20030911-8.

We recommend that you upgrade your ecartis package.

Upgrade Instructions


wget url

will fetch the file for you
dpkg -i file.deb

will install the referenced file.

If you are using the apt-get package manager, use the line for
sources.list as given below:

apt-get update

will update the internal database apt-get upgrade

will install corrected packages

You may use an automated update by adding the resources from the
footer to the proper configuration.

Debian GNU/Linux 3.0 alias woody


Source archives:


http://security.debian.org/pool/updates/main/e/ecartis/ecartis_0.129a+1.0.0-snap20020514-1.3.dsc

Size/MD5 checksum: 633 3c5b01ccdb8efdd3f0b01ab1c420f0bd

http://security.debian.org/pool/updates/main/e/ecartis/ecartis_0.129a+1.0.0-snap20020514-1.3.diff.gz

Size/MD5 checksum: 11136 deb52dba3044f51a775687dc3de435d4

http://security.debian.org/pool/updates/main/e/ecartis/ecartis_0.129a+1.0.0-snap20020514.orig.tar.gz

Size/MD5 checksum: 326215 2772a595a3fe7ea5073874113da813ec

Alpha architecture:


http://security.debian.org/pool/updates/main/e/ecartis/ecartis_0.129a+1.0.0-snap20020514-1.3_alpha.deb

Size/MD5 checksum: 256810 0756e2937a73c64e06a65001d7955877

http://security.debian.org/pool/updates/main/e/ecartis/ecartis-cgi_0.129a+1.0.0-snap20020514-1.3_alpha.deb

Size/MD5 checksum: 34084 ef3ac15efae9aaa6ef01083e535d96a6

ARM architecture:


http://security.debian.org/pool/updates/main/e/ecartis/ecartis_0.129a+1.0.0-snap20020514-1.3_arm.deb

Size/MD5 checksum: 238590 c039d61d90f7163d0a5ae3a964fa28c6

http://security.debian.org/pool/updates/main/e/ecartis/ecartis-cgi_0.129a+1.0.0-snap20020514-1.3_arm.deb

Size/MD5 checksum: 34256 27530fa34db9ccfce0dea27d2367a581

Intel IA-32 architecture:


http://security.debian.org/pool/updates/main/e/ecartis/ecartis_0.129a+1.0.0-snap20020514-1.3_i386.deb

Size/MD5 checksum: 199458 b486c027d445489c6fb27a705133e65f

http://security.debian.org/pool/updates/main/e/ecartis/ecartis-cgi_0.129a+1.0.0-snap20020514-1.3_i386.deb

Size/MD5 checksum: 26382 1a46d1a71f53b9cbe8ce774c308e0b63

Intel IA-64 architecture:


http://security.debian.org/pool/updates/main/e/ecartis/ecartis_0.129a+1.0.0-snap20020514-1.3_ia64.deb

Size/MD5 checksum: 338176 f34f303a82c07e94fbc4f740615b285a

http://security.debian.org/pool/updates/main/e/ecartis/ecartis-cgi_0.129a+1.0.0-snap20020514-1.3_ia64.deb

Size/MD5 checksum: 44402 3d96424af960b67c1eff7ed8281a28cc

HP Precision architecture:


http://security.debian.org/pool/updates/main/e/ecartis/ecartis_0.129a+1.0.0-snap20020514-1.3_hppa.deb

Size/MD5 checksum: 237276 86be667295c0110787c48483935304a9

http://security.debian.org/pool/updates/main/e/ecartis/ecartis-cgi_0.129a+1.0.0-snap20020514-1.3_hppa.deb

Size/MD5 checksum: 34186 0427d04c72cd89788d7662e7ba84713b

Motorola 680×0 architecture:


http://security.debian.org/pool/updates/main/e/ecartis/ecartis_0.129a+1.0.0-snap20020514-1.3_m68k.deb

Size/MD5 checksum: 210846 6ef4f00bcf7eb6855dff350f4ed2d6eb

http://security.debian.org/pool/updates/main/e/ecartis/ecartis-cgi_0.129a+1.0.0-snap20020514-1.3_m68k.deb

Size/MD5 checksum: 29470 cfdbd27c6f172a1fa75890d7bab9be26

Big endian MIPS architecture:


http://security.debian.org/pool/updates/main/e/ecartis/ecartis_0.129a+1.0.0-snap20020514-1.3_mips.deb

Size/MD5 checksum: 203434 37c63c68433b47af4773d9fd1620bd6d

http://security.debian.org/pool/updates/main/e/ecartis/ecartis-cgi_0.129a+1.0.0-snap20020514-1.3_mips.deb

Size/MD5 checksum: 26454 7b1212a12d462e5d02c59e4c80fb6120

Little endian MIPS architecture:


http://security.debian.org/pool/updates/main/e/ecartis/ecartis_0.129a+1.0.0-snap20020514-1.3_mipsel.deb

Size/MD5 checksum: 203806 29b30b1f6a89f5f738fd6e2a25ce8e3f

http://security.debian.org/pool/updates/main/e/ecartis/ecartis-cgi_0.129a+1.0.0-snap20020514-1.3_mipsel.deb

Size/MD5 checksum: 26660 64352b9de65a0f873aa9bf8c3759b3df

PowerPC architecture:


http://security.debian.org/pool/updates/main/e/ecartis/ecartis_0.129a+1.0.0-snap20020514-1.3_powerpc.deb

Size/MD5 checksum: 231174 d50df0172c5dc7c7e00e8f195d2dedc2

http://security.debian.org/pool/updates/main/e/ecartis/ecartis-cgi_0.129a+1.0.0-snap20020514-1.3_powerpc.deb

Size/MD5 checksum: 33622 aeef33a2acbc11169f13a009fb44ca26

IBM S/390 architecture:


http://security.debian.org/pool/updates/main/e/ecartis/ecartis_0.129a+1.0.0-snap20020514-1.3_s390.deb

Size/MD5 checksum: 205476 c11ac6b9025f9579f5827f76521be398

http://security.debian.org/pool/updates/main/e/ecartis/ecartis-cgi_0.129a+1.0.0-snap20020514-1.3_s390.deb

Size/MD5 checksum: 28148 800f8d66e58b75a5d3348cea3758aedd

Sun Sparc architecture:


http://security.debian.org/pool/updates/main/e/ecartis/ecartis_0.129a+1.0.0-snap20020514-1.3_sparc.deb

Size/MD5 checksum: 244678 41a082da574d539b8fa9df57903ef0b9

http://security.debian.org/pool/updates/main/e/ecartis/ecartis-cgi_0.129a+1.0.0-snap20020514-1.3_sparc.deb

Size/MD5 checksum: 33772 28eadac58294fe1a73f95fb709619e27

These files will probably be moved into the stable distribution
on its next update.


Size/MD5 checksum: 150474 c8c4653a290a66724d717a709ae18a66

Intel IA-32 architecture:


http://security.debian.org/pool/updates/main/c/cupsys/cupsys_1.1.14-5woody10_i386.deb

Size/MD5 checksum: 1788626 9cb6367a1455987dfbbc03e26d4a0ab9

http://security.debian.org/pool/updates/main/c/cupsys/cupsys-bsd_1.1.14-5woody10_i386.deb

Size/MD5 checksum: 68074 d5b263fabbe23c5714d43770ea81b612

http://security.debian.org/pool/updates/main/c/cupsys/cupsys-client_1.1.14-5woody10_i386.deb

Size/MD5 checksum: 84244 e6cb1b13280664e12ded8709cfefebcc

http://security.debian.org/pool/updates/main/c/cupsys/cupsys-pstoraster_1.1.14-5woody10_i386.deb

Size/MD5 checksum: 2312054 ab9511108a2281079e86da8e9e450349

http://security.debian.org/pool/updates/main/c/cupsys/libcupsys2_1.1.14-5woody10_i386.deb

Size/MD5 checksum: 111096 7eb7f16bd74c6dba80c1dd3b39b697db

http://security.debian.org/pool/updates/main/c/cupsys/libcupsys2-dev_1.1.14-5woody10_i386.deb

Size/MD5 checksum: 136658 7c186791884a0733fea8f63c3bb189f5

Intel IA-64 architecture:


http://security.debian.org/pool/updates/main/c/cupsys/cupsys_1.1.14-5woody10_ia64.deb

Size/MD5 checksum: 2008270 ec8aeb2946896bbd26708b8adb539604

http://security.debian.org/pool/updates/main/c/cupsys/cupsys-bsd_1.1.14-5woody10_ia64.deb

Size/MD5 checksum: 77478 148442739408fc6255d39292f135bec3

http://security.debian.org/pool/updates/main/c/cupsys/cupsys-client_1.1.14-5woody10_ia64.deb

Size/MD5 checksum: 97202 8172c2f63908fb6cb23dbee41f8e2bec

http://security.debian.org/pool/updates/main/c/cupsys/cupsys-pstoraster_1.1.14-5woody10_ia64.deb

Size/MD5 checksum: 2656844 b125add104054e6db76625fa0f661206

http://security.debian.org/pool/updates/main/c/cupsys/libcupsys2_1.1.14-5woody10_ia64.deb

Size/MD5 checksum: 156076 9e2a814e3565a0303074baa1fec3a8ad

http://security.debian.org/pool/updates/main/c/cupsys/libcupsys2-dev_1.1.14-5woody10_ia64.deb

Size/MD5 checksum: 183024 0e6b10d730a19628fb5982e62cc9a037

HP Precision architecture:


http://security.debian.org/pool/updates/main/c/cupsys/cupsys_1.1.14-5woody10_hppa.deb

Size/MD5 checksum: 1881842 30933a611e124b53496a1eaa6e78ead6

http://security.debian.org/pool/updates/main/c/cupsys/cupsys-bsd_1.1.14-5woody10_hppa.deb

Size/MD5 checksum: 70888 a627539e4c17fcb53c81a4a524aa9b6d

http://security.debian.org/pool/updates/main/c/cupsys/cupsys-client_1.1.14-5woody10_hppa.deb

Size/MD5 checksum: 89912 2121010bef372effdc7b5df87f19c14c

http://security.debian.org/pool/updates/main/c/cupsys/cupsys-pstoraster_1.1.14-5woody10_hppa.deb

Size/MD5 checksum: 2456114 d7f144753a6ef2dfd30b804a496b266a

http://security.debian.org/pool/updates/main/c/cupsys/libcupsys2_1.1.14-5woody10_hppa.deb

Size/MD5 checksum: 126552 59a4876e8430211df619bfbba7192c4f

http://security.debian.org/pool/updates/main/c/cupsys/libcupsys2-dev_1.1.14-5woody10_hppa.deb

Size/MD5 checksum: 159622 14750861065ede6ba4fb1779385125ee

Motorola 680×0 architecture:


http://security.debian.org/pool/updates/main/c/cupsys/cupsys_1.1.14-5woody10_m68k.deb

Size/MD5 checksum: 1755320 e772fc6e575816204d24d65b93b233d5

http://security.debian.org/pool/updates/main/c/cupsys/cupsys-bsd_1.1.14-5woody10_m68k.deb

Size/MD5 checksum: 66368 ae622df8d8310ed713e21fcff06e861b

http://security.debian.org/pool/updates/main/c/cupsys/cupsys-client_1.1.14-5woody10_m68k.deb

Size/MD5 checksum: 81460 316c268fe6263463ffa70650cf0b727a

http://security.debian.org/pool/updates/main/c/cupsys/cupsys-pstoraster_1.1.14-5woody10_m68k.deb

Size/MD5 checksum: 2261474 6f73920c2550f1f49fe4e8c93d6bc836

http://security.debian.org/pool/updates/main/c/cupsys/libcupsys2_1.1.14-5woody10_m68k.deb

Size/MD5 checksum: 106314 001809ddc9a6e03054e096b6f4f30885

http://security.debian.org/pool/updates/main/c/cupsys/libcupsys2-dev_1.1.14-5woody10_m68k.deb

Size/MD5 checksum: 128858 17e57bbefae47ff07db3e6eac08fd651

Big endian MIPS architecture:


http://security.debian.org/pool/updates/main/c/cupsys/cupsys_1.1.14-5woody10_mips.deb

Size/MD5 checksum: 1811706 356e49aca2dd13198f1e8528bd410d53

http://security.debian.org/pool/updates/main/c/cupsys/cupsys-bsd_1.1.14-5woody10_mips.deb

Size/MD5 checksum: 67978 5f0a6cbf68d05696537ab036c877baf3

http://security.debian.org/pool/updates/main/c/cupsys/cupsys-client_1.1.14-5woody10_mips.deb

Size/MD5 checksum: 81422 fd91fe740b055e8ea764a2309704c385

http://security.debian.org/pool/updates/main/c/cupsys/cupsys-pstoraster_1.1.14-5woody10_mips.deb

Size/MD5 checksum: 2404692 f5a42ecff952b876db268ba46b1f9297

http://security.debian.org/pool/updates/main/c/cupsys/libcupsys2_1.1.14-5woody10_mips.deb

Size/MD5 checksum: 112844 a957508600052e33c04372114ba0d6e8

http://security.debian.org/pool/updates/main/c/cupsys/libcupsys2-dev_1.1.14-5woody10_mips.deb

Size/MD5 checksum: 151276 c36b4acdd08b3dbfc20f6d8e20f72684

Little endian MIPS architecture:


http://security.debian.org/pool/updates/main/c/cupsys/cupsys_1.1.14-5woody10_mipsel.deb

Size/MD5 checksum: 1812220 1c1515aa26c641f7a0c652187a763b3f

http://security.debian.org/pool/updates/main/c/cupsys/cupsys-bsd_1.1.14-5woody10_mipsel.deb

Size/MD5 checksum: 67954 7704b6cda625f1543cfed3fa7807a71d

http://security.debian.org/pool/updates/main/c/cupsys/cupsys-client_1.1.14-5woody10_mipsel.deb

Size/MD5 checksum: 81446 fb012b9d0b1f016820be28c237c1d1c7

http://security.debian.org/pool/updates/main/c/cupsys/cupsys-pstoraster_1.1.14-5woody10_mipsel.deb

Size/MD5 checksum: 2407024 9ff53f42aff59fbf5050e7bf045af0c7

http://security.debian.org/pool/updates/main/c/cupsys/libcupsys2_1.1.14-5woody10_mipsel.deb

Size/MD5 checksum: 112630 6b96071e8be67ad72ccd14395e472224

http://security.debian.org/pool/updates/main/c/cupsys/libcupsys2-dev_1.1.14-5woody10_mipsel.deb

Size/MD5 checksum: 151098 f6bfedf92870b76638ef16f52c8f185f

PowerPC architecture:


http://security.debian.org/pool/updates/main/c/cupsys/cupsys_1.1.14-5woody10_powerpc.deb

Size/MD5 checksum: 1800710 3b1a280e2c0504303fcefed1f1487540

http://security.debian.org/pool/updates/main/c/cupsys/cupsys-bsd_1.1.14-5woody10_powerpc.deb

Size/MD5 checksum: 67996 6feace4eadb9a7e53d81fb6f77d1df59

http://security.debian.org/pool/updates/main/c/cupsys/cupsys-client_1.1.14-5woody10_powerpc.deb

Size/MD5 checksum: 83558 940e4461997283996cd62c07b9456f53

http://security.debian.org/pool/updates/main/c/cupsys/cupsys-pstoraster_1.1.14-5woody10_powerpc.deb

Size/MD5 checksum: 2359890 f612a6bcb3c52147398fd6b0b7972a2d

http://security.debian.org/pool/updates/main/c/cupsys/libcupsys2_1.1.14-5woody10_powerpc.deb

Size/MD5 checksum: 116866 9f1e4c94ce84e65f20ee7ac2a65d28bc

http://security.debian.org/pool/updates/main/c/cupsys/libcupsys2-dev_1.1.14-5woody10_powerpc.deb

Size/MD5 checksum: 145298 d5e77aad9f5e67acc715b4250d705873

IBM S/390 architecture:


http://security.debian.org/pool/updates/main/c/cupsys/cupsys_1.1.14-5woody10_s390.deb

Size/MD5 checksum: 1795792 08de62dd48dd94d3ff3b2fee9a7fc044

http://security.debian.org/pool/updates/main/c/cupsys/cupsys-bsd_1.1.14-5woody10_s390.deb

Size/MD5 checksum: 69368 eaa0849593f8132eb3128a4d5e91bb98

http://security.debian.org/pool/updates/main/c/cupsys/cupsys-client_1.1.14-5woody10_s390.deb

Size/MD5 checksum: 86100 7037788341cbf3a5294ac771bea83519

http://security.debian.org/pool/updates/main/c/cupsys/cupsys-pstoraster_1.1.14-5woody10_s390.deb

Size/MD5 checksum: 2337736 a11a41b78d3ee10608803b29d2ebdf2a

http://security.debian.org/pool/updates/main/c/cupsys/libcupsys2_1.1.14-5woody10_s390.deb

Size/MD5 checksum: 115398 40a4137f1dfc8beff7ef6ee20853e897

http://security.debian.org/pool/updates/main/c/cupsys/libcupsys2-dev_1.1.14-5woody10_s390.deb

Size/MD5 checksum: 140918 747abc057dccf3cc061f142ca16b8f20

Sun Sparc architecture:


http://security.debian.org/pool/updates/main/c/cupsys/cupsys_1.1.14-5woody10_sparc.deb

Size/MD5 checksum: 1845462 b413070f1f98f540a6a7cf78ad4cf1c0

http://security.debian.org/pool/updates/main/c/cupsys/cupsys-bsd_1.1.14-5woody10_sparc.deb

Size/MD5 checksum: 70948 c77a09b25782f511430ac73420358a35

http://security.debian.org/pool/updates/main/c/cupsys/cupsys-client_1.1.14-5woody10_sparc.deb

Size/MD5 checksum: 84376 1446a20a1664c349db050d90f8319580

http://security.debian.org/pool/updates/main/c/cupsys/cupsys-pstoraster_1.1.14-5woody10_sparc.deb

Size/MD5 checksum: 2354776 c430d70b36aaa7bc279fd9631658d713

http://security.debian.org/pool/updates/main/c/cupsys/libcupsys2_1.1.14-5woody10_sparc.deb

Size/MD5 checksum: 120548 c51a797aa901917d759ce116d3afd2ee

http://security.debian.org/pool/updates/main/c/cupsys/libcupsys2-dev_1.1.14-5woody10_sparc.deb

Size/MD5 checksum: 146862 92e2f650e7b8156b51c2d8d0bfb68e15

These files will probably be moved into the stable distribution
on its next update.


For apt-get: deb http://security.debian.org/
stable/updates main
For dpkg-ftp: ftp://security.debian.org/debian-security
dists/stable/updates/main
Mailing list: debian-security-announce@lists.debian.org

Package info: ‘apt-cache show <pkg>’ and http://packages.debian.org/<pkg>

Get the Free Newsletter!

Subscribe to Developer Insider for top news, trends, & analysis