Debian Security Advisory DSA 571-1 security@debian.org
http://www.debian.org/security/
Martin Schulze
October 20th, 2004 http://www.debian.org/security/faq
Package : libpng3
Vulnerability : buffer overflows, integer overflow
Problem-Type : remote
Debian-specific: no
CVE ID : CAN-2004-0955
Several integer overflows have been discovered by its upstream
developers in libpng, a commonly used library to display PNG
graphics. They could be exploited to cause arbitrary code to be
executed when a specially crafted PNG image is processed.
For the stable distribution (woody) these problems have been
fixed in version 1.2.1-1.1.woody.9.
For the unstable distribution (sid) these problems have been
fixed in version 1.2.5.0-9.
We recommend that you upgrade your libpng3 packages.
Upgrade Instructions
wget url
will fetch the file for you
dpkg -i file.deb
will install the referenced file.
If you are using the apt-get package manager, use the line for
sources.list as given below:
apt-get update
will update the internal database apt-get upgrade
will install corrected packages
You may use an automated update by adding the resources from the
footer to the proper configuration.
Debian GNU/Linux 3.0 alias woody
Source archives:
http://security.debian.org/pool/updates/main/libp/libpng3/libpng3_1.2.1-1.1.woody.9.dsc
Size/MD5 checksum: 583 a11e8a7d236ca98e6581b6066a35c7f9
http://security.debian.org/pool/updates/main/libp/libpng3/libpng3_1.2.1-1.1.woody.9.diff.gz
Size/MD5 checksum: 10791 a68eee4690473d8402743f30d431db4d
http://security.debian.org/pool/updates/main/libp/libpng3/libpng3_1.2.1.orig.tar.gz
Size/MD5 checksum: 493105 75a21cbfae566158a0ac6d9f39087c4d
Alpha architecture:
http://security.debian.org/pool/updates/main/libp/libpng3/libpng-dev_1.2.1-1.1.woody.9_alpha.deb
Size/MD5 checksum: 276634 dc9d30c7bb1213bf339e96a9d9b4c4ad
http://security.debian.org/pool/updates/main/libp/libpng3/libpng3_1.2.1-1.1.woody.9_alpha.deb
Size/MD5 checksum: 133666 1441a7afe56c6d0b01c09b635026a2b4
ARM architecture:
http://security.debian.org/pool/updates/main/libp/libpng3/libpng-dev_1.2.1-1.1.woody.9_arm.deb
Size/MD5 checksum: 247780 97f36aa3e35547e3b095999fcf3fb694
http://security.debian.org/pool/updates/main/libp/libpng3/libpng3_1.2.1-1.1.woody.9_arm.deb
Size/MD5 checksum: 112314 2f5c3fe3190ce8d52836cfe682236cbb
Intel IA-32 architecture:
http://security.debian.org/pool/updates/main/libp/libpng3/libpng-dev_1.2.1-1.1.woody.9_i386.deb
Size/MD5 checksum: 233356 480296fd503d8de105716bca44c59136
http://security.debian.org/pool/updates/main/libp/libpng3/libpng3_1.2.1-1.1.woody.9_i386.deb
Size/MD5 checksum: 110678 60cbe7dcb206efcc95add2e83b1e06e5
Intel IA-64 architecture:
http://security.debian.org/pool/updates/main/libp/libpng3/libpng-dev_1.2.1-1.1.woody.9_ia64.deb
Size/MD5 checksum: 279022 22c86cf1b67c6a1d162eb42a9202a237
http://security.debian.org/pool/updates/main/libp/libpng3/libpng3_1.2.1-1.1.woody.9_ia64.deb
Size/MD5 checksum: 151874 82e6a6772fe5506c93cb90c52de2891e
HP Precision architecture:
http://security.debian.org/pool/updates/main/libp/libpng3/libpng-dev_1.2.1-1.1.woody.9_hppa.deb
Size/MD5 checksum: 269872 036ce4ca8f8934b00d4b2af6f05ff552
http://security.debian.org/pool/updates/main/libp/libpng3/libpng3_1.2.1-1.1.woody.9_hppa.deb
Size/MD5 checksum: 133022 ee3c8bb4e5b820be62d1efd8c708559c
Motorola 680×0 architecture:
http://security.debian.org/pool/updates/main/libp/libpng3/libpng-dev_1.2.1-1.1.woody.9_m68k.deb
Size/MD5 checksum: 226502 8ba581615baf0983b2e86c2b9ccfc187
http://security.debian.org/pool/updates/main/libp/libpng3/libpng3_1.2.1-1.1.woody.9_m68k.deb
Size/MD5 checksum: 107094 7923c57162269188601cb00763465584
Big endian MIPS architecture:
http://security.debian.org/pool/updates/main/libp/libpng3/libpng-dev_1.2.1-1.1.woody.9_mips.deb
Size/MD5 checksum: 247200 0aa9e85a752c4759a43c591a97655208
http://security.debian.org/pool/updates/main/libp/libpng3/libpng3_1.2.1-1.1.woody.9_mips.deb
Size/MD5 checksum: 112508 5fa27ff5c3bef5f58be7337468c21f76
Little endian MIPS architecture:
http://security.debian.org/pool/updates/main/libp/libpng3/libpng-dev_1.2.1-1.1.woody.9_mipsel.deb
Size/MD5 checksum: 247134 f1b8922fff3d7ae70201b07697c97a92
http://security.debian.org/pool/updates/main/libp/libpng3/libpng3_1.2.1-1.1.woody.9_mipsel.deb
Size/MD5 checksum: 112416 eea654666ee8a3402f3bd3af95bdbfe3
PowerPC architecture:
http://security.debian.org/pool/updates/main/libp/libpng3/libpng-dev_1.2.1-1.1.woody.9_powerpc.deb
Size/MD5 checksum: 240886 9ad9c699045cea5f31c9e49ef8625583
http://security.debian.org/pool/updates/main/libp/libpng3/libpng3_1.2.1-1.1.woody.9_powerpc.deb
Size/MD5 checksum: 113642 763d6a6a326a7fcb81d94ad630594aee
IBM S/390 architecture:
http://security.debian.org/pool/updates/main/libp/libpng3/libpng-dev_1.2.1-1.1.woody.9_s390.deb
Size/MD5 checksum: 235188 c94798e9f884e98276544afbda776a10
http://security.debian.org/pool/updates/main/libp/libpng3/libpng3_1.2.1-1.1.woody.9_s390.deb
Size/MD5 checksum: 113662 f0d50c1b3b29347e0cc36a6eee2171f3
Sun Sparc architecture:
http://security.debian.org/pool/updates/main/libp/libpng3/libpng-dev_1.2.1-1.1.woody.9_sparc.deb
Size/MD5 checksum: 237942 17fbcdce55e78974c9cc0d6003905e92
http://security.debian.org/pool/updates/main/libp/libpng3/libpng3_1.2.1-1.1.woody.9_sparc.deb
Size/MD5 checksum: 114004 57b22ae95161928ff01797cb823efdfc
These files will probably be moved into the stable distribution
on its next update.
–
Debian Security Advisory DSA 570-1 security@debian.org
http://www.debian.org/security/
Martin Schulze
October 20th, 2004 http://www.debian.org/security/faq
Package : libpng
Vulnerability : integer overflow
Problem-Type : remote
Debian-specific: no
CVE ID : CAN-2004-0955
Several integer overflows have been discovered by its upstream
developers in libpng, a commonly used library to display PNG
graphics. They could be exploited to cause arbitrary code to be
executed when a specially crafted PNG image is processed.
For the stable distribution (woody) this problem has been fixed
in version 1.0.12-3.woody.9.
For the unstable distribution (sid) this problem has been fixed
in version 1.0.15-8.
We recommend that you upgrade your libpng packages.
Upgrade Instructions
wget url
will fetch the file for you
dpkg -i file.deb
will install the referenced file.
If you are using the apt-get package manager, use the line for
sources.list as given below:
apt-get update
will update the internal database apt-get upgrade
will install corrected packages
You may use an automated update by adding the resources from the
footer to the proper configuration.
Debian GNU/Linux 3.0 alias woody
Source archives:
http://security.debian.org/pool/updates/main/libp/libpng/libpng_1.0.12-3.woody.9.dsc
Size/MD5 checksum: 580 7df7d1e0bbd2332551a14cc0a21dddf7
http://security.debian.org/pool/updates/main/libp/libpng/libpng_1.0.12-3.woody.9.diff.gz
Size/MD5 checksum: 10396 dbf46963e7b26473fffba63a92791286
http://security.debian.org/pool/updates/main/libp/libpng/libpng_1.0.12.orig.tar.gz
Size/MD5 checksum: 481387 3329b745968e41f6f9e55a4d04a4964c
Alpha architecture:
http://security.debian.org/pool/updates/main/libp/libpng/libpng2_1.0.12-3.woody.9_alpha.deb
Size/MD5 checksum: 130374 1044ec55646f8e94e218bf4613db1f60
http://security.debian.org/pool/updates/main/libp/libpng/libpng2-dev_1.0.12-3.woody.9_alpha.deb
Size/MD5 checksum: 270440 74a5b9e3bc1b2fc2648133e196894b4f
ARM architecture:
http://security.debian.org/pool/updates/main/libp/libpng/libpng2_1.0.12-3.woody.9_arm.deb
Size/MD5 checksum: 109148 60e7475df4f824043242559b7d64322e
http://security.debian.org/pool/updates/main/libp/libpng/libpng2-dev_1.0.12-3.woody.9_arm.deb
Size/MD5 checksum: 241496 f9ad072eb50a9391ce4b105eff9b2cba
Intel IA-32 architecture:
http://security.debian.org/pool/updates/main/libp/libpng/libpng2_1.0.12-3.woody.9_i386.deb
Size/MD5 checksum: 107434 e81d90d93fc69329f1fc842666ab8bf2
http://security.debian.org/pool/updates/main/libp/libpng/libpng2-dev_1.0.12-3.woody.9_i386.deb
Size/MD5 checksum: 227648 a5495e210300e511e7c265e86303c909
Intel IA-64 architecture:
http://security.debian.org/pool/updates/main/libp/libpng/libpng2_1.0.12-3.woody.9_ia64.deb
Size/MD5 checksum: 147520 5292b0c17956697fa682a95be34abc0d
http://security.debian.org/pool/updates/main/libp/libpng/libpng2-dev_1.0.12-3.woody.9_ia64.deb
Size/MD5 checksum: 271938 ae7b7fed469735915bbdf87ab02f80a3
HP Precision architecture:
http://security.debian.org/pool/updates/main/libp/libpng/libpng2_1.0.12-3.woody.9_hppa.deb
Size/MD5 checksum: 128830 b1937fc261ba66c8b69605c0f8df9305
http://security.debian.org/pool/updates/main/libp/libpng/libpng2-dev_1.0.12-3.woody.9_hppa.deb
Size/MD5 checksum: 262630 be93d764c002923fb1e6d5385b12e200
Motorola 680×0 architecture:
http://security.debian.org/pool/updates/main/libp/libpng/libpng2_1.0.12-3.woody.9_m68k.deb
Size/MD5 checksum: 104172 86a18a750a19efbe94f8b79d9e4e89c8
http://security.debian.org/pool/updates/main/libp/libpng/libpng2-dev_1.0.12-3.woody.9_m68k.deb
Size/MD5 checksum: 220804 d4b278997d86fe7cd824f2ad820a8466
Big endian MIPS architecture:
http://security.debian.org/pool/updates/main/libp/libpng/libpng2_1.0.12-3.woody.9_mips.deb
Size/MD5 checksum: 109184 b825d9e4e59ed06f5ff718d86c078714
http://security.debian.org/pool/updates/main/libp/libpng/libpng2-dev_1.0.12-3.woody.9_mips.deb
Size/MD5 checksum: 240698 883d442e57eef30ad86251ce2ffed701
Little endian MIPS architecture:
http://security.debian.org/pool/updates/main/libp/libpng/libpng2_1.0.12-3.woody.9_mipsel.deb
Size/MD5 checksum: 109102 eb85fee5ef0e9516372a7e245fd781ce
http://security.debian.org/pool/updates/main/libp/libpng/libpng2-dev_1.0.12-3.woody.9_mipsel.deb
Size/MD5 checksum: 240576 da9b75f48689e9277b8a053c014e8ddc
PowerPC architecture:
http://security.debian.org/pool/updates/main/libp/libpng/libpng2_1.0.12-3.woody.9_powerpc.deb
Size/MD5 checksum: 110504 b7ab6493588e05c09811e3f58fa747b2
http://security.debian.org/pool/updates/main/libp/libpng/libpng2-dev_1.0.12-3.woody.9_powerpc.deb
Size/MD5 checksum: 234800 1e1bacb0bbe2d80166d4ce9f96348828
IBM S/390 architecture:
http://security.debian.org/pool/updates/main/libp/libpng/libpng2_1.0.12-3.woody.9_s390.deb
Size/MD5 checksum: 110520 29172e2fc592785d44b5779ed7787f08
http://security.debian.org/pool/updates/main/libp/libpng/libpng2-dev_1.0.12-3.woody.9_s390.deb
Size/MD5 checksum: 229560 2577f1ecee02f71af34ca9aecbd70dd7
Sun Sparc architecture:
http://security.debian.org/pool/updates/main/libp/libpng/libpng2_1.0.12-3.woody.9_sparc.deb
Size/MD5 checksum: 110564 2eac357f311054279ef941a87befb62f
http://security.debian.org/pool/updates/main/libp/libpng/libpng2-dev_1.0.12-3.woody.9_sparc.deb
Size/MD5 checksum: 232302 7691bd27595acd87249be24746f47186
These files will probably be moved into the stable distribution
on its next update.
–
Debian Security Advisory DSA 572-1 security@debian.org
http://www.debian.org/security/
Martin Schulze
October 21st, 2004 http://www.debian.org/security/faq
Package : ecartis
Vulnerability : several
Problem-Type : remote
Debian-specific: no
CVE ID : CAN-2004-0913
A problem has been discovered in ecartis, a mailing-list
manager, which allows an attacker in the same domain as the list
admin to gain administrator privileges and alter list settings.
For the stable distribution (woody) this problem has been fixed
in version 0.129a+1.0.0-snap20020514-1.3.
For the unstable distribution (sid) this problem has been fixed
in version 1.0.0+cvs.20030911-8.
We recommend that you upgrade your ecartis package.
Upgrade Instructions
wget url
will fetch the file for you
dpkg -i file.deb
will install the referenced file.
If you are using the apt-get package manager, use the line for
sources.list as given below:
apt-get update
will update the internal database apt-get upgrade
will install corrected packages
You may use an automated update by adding the resources from the
footer to the proper configuration.
Debian GNU/Linux 3.0 alias woody
Source archives:
http://security.debian.org/pool/updates/main/e/ecartis/ecartis_0.129a+1.0.0-snap20020514-1.3.dsc
Size/MD5 checksum: 633 3c5b01ccdb8efdd3f0b01ab1c420f0bd
http://security.debian.org/pool/updates/main/e/ecartis/ecartis_0.129a+1.0.0-snap20020514-1.3.diff.gz
Size/MD5 checksum: 11136 deb52dba3044f51a775687dc3de435d4
http://security.debian.org/pool/updates/main/e/ecartis/ecartis_0.129a+1.0.0-snap20020514.orig.tar.gz
Size/MD5 checksum: 326215 2772a595a3fe7ea5073874113da813ec
Alpha architecture:
Size/MD5 checksum: 256810 0756e2937a73c64e06a65001d7955877
http://security.debian.org/pool/updates/main/e/ecartis/ecartis-cgi_0.129a+1.0.0-snap20020514-1.3_alpha.deb
Size/MD5 checksum: 34084 ef3ac15efae9aaa6ef01083e535d96a6
ARM architecture:
http://security.debian.org/pool/updates/main/e/ecartis/ecartis_0.129a+1.0.0-snap20020514-1.3_arm.deb
Size/MD5 checksum: 238590 c039d61d90f7163d0a5ae3a964fa28c6
http://security.debian.org/pool/updates/main/e/ecartis/ecartis-cgi_0.129a+1.0.0-snap20020514-1.3_arm.deb
Size/MD5 checksum: 34256 27530fa34db9ccfce0dea27d2367a581
Intel IA-32 architecture:
Size/MD5 checksum: 199458 b486c027d445489c6fb27a705133e65f
http://security.debian.org/pool/updates/main/e/ecartis/ecartis-cgi_0.129a+1.0.0-snap20020514-1.3_i386.deb
Size/MD5 checksum: 26382 1a46d1a71f53b9cbe8ce774c308e0b63
Intel IA-64 architecture:
Size/MD5 checksum: 338176 f34f303a82c07e94fbc4f740615b285a
http://security.debian.org/pool/updates/main/e/ecartis/ecartis-cgi_0.129a+1.0.0-snap20020514-1.3_ia64.deb
Size/MD5 checksum: 44402 3d96424af960b67c1eff7ed8281a28cc
HP Precision architecture:
Size/MD5 checksum: 237276 86be667295c0110787c48483935304a9
http://security.debian.org/pool/updates/main/e/ecartis/ecartis-cgi_0.129a+1.0.0-snap20020514-1.3_hppa.deb
Size/MD5 checksum: 34186 0427d04c72cd89788d7662e7ba84713b
Motorola 680×0 architecture:
Size/MD5 checksum: 210846 6ef4f00bcf7eb6855dff350f4ed2d6eb
http://security.debian.org/pool/updates/main/e/ecartis/ecartis-cgi_0.129a+1.0.0-snap20020514-1.3_m68k.deb
Size/MD5 checksum: 29470 cfdbd27c6f172a1fa75890d7bab9be26
Big endian MIPS architecture:
Size/MD5 checksum: 203434 37c63c68433b47af4773d9fd1620bd6d
http://security.debian.org/pool/updates/main/e/ecartis/ecartis-cgi_0.129a+1.0.0-snap20020514-1.3_mips.deb
Size/MD5 checksum: 26454 7b1212a12d462e5d02c59e4c80fb6120
Little endian MIPS architecture:
Size/MD5 checksum: 203806 29b30b1f6a89f5f738fd6e2a25ce8e3f
http://security.debian.org/pool/updates/main/e/ecartis/ecartis-cgi_0.129a+1.0.0-snap20020514-1.3_mipsel.deb
Size/MD5 checksum: 26660 64352b9de65a0f873aa9bf8c3759b3df
PowerPC architecture:
Size/MD5 checksum: 231174 d50df0172c5dc7c7e00e8f195d2dedc2
http://security.debian.org/pool/updates/main/e/ecartis/ecartis-cgi_0.129a+1.0.0-snap20020514-1.3_powerpc.deb
Size/MD5 checksum: 33622 aeef33a2acbc11169f13a009fb44ca26
IBM S/390 architecture:
Size/MD5 checksum: 205476 c11ac6b9025f9579f5827f76521be398
http://security.debian.org/pool/updates/main/e/ecartis/ecartis-cgi_0.129a+1.0.0-snap20020514-1.3_s390.deb
Size/MD5 checksum: 28148 800f8d66e58b75a5d3348cea3758aedd
Sun Sparc architecture:
Size/MD5 checksum: 244678 41a082da574d539b8fa9df57903ef0b9
http://security.debian.org/pool/updates/main/e/ecartis/ecartis-cgi_0.129a+1.0.0-snap20020514-1.3_sparc.deb
Size/MD5 checksum: 33772 28eadac58294fe1a73f95fb709619e27
These files will probably be moved into the stable distribution
on its next update.
Size/MD5 checksum: 150474 c8c4653a290a66724d717a709ae18a66
Intel IA-32 architecture:
http://security.debian.org/pool/updates/main/c/cupsys/cupsys_1.1.14-5woody10_i386.deb
Size/MD5 checksum: 1788626 9cb6367a1455987dfbbc03e26d4a0ab9
http://security.debian.org/pool/updates/main/c/cupsys/cupsys-bsd_1.1.14-5woody10_i386.deb
Size/MD5 checksum: 68074 d5b263fabbe23c5714d43770ea81b612
http://security.debian.org/pool/updates/main/c/cupsys/cupsys-client_1.1.14-5woody10_i386.deb
Size/MD5 checksum: 84244 e6cb1b13280664e12ded8709cfefebcc
http://security.debian.org/pool/updates/main/c/cupsys/cupsys-pstoraster_1.1.14-5woody10_i386.deb
Size/MD5 checksum: 2312054 ab9511108a2281079e86da8e9e450349
http://security.debian.org/pool/updates/main/c/cupsys/libcupsys2_1.1.14-5woody10_i386.deb
Size/MD5 checksum: 111096 7eb7f16bd74c6dba80c1dd3b39b697db
http://security.debian.org/pool/updates/main/c/cupsys/libcupsys2-dev_1.1.14-5woody10_i386.deb
Size/MD5 checksum: 136658 7c186791884a0733fea8f63c3bb189f5
Intel IA-64 architecture:
http://security.debian.org/pool/updates/main/c/cupsys/cupsys_1.1.14-5woody10_ia64.deb
Size/MD5 checksum: 2008270 ec8aeb2946896bbd26708b8adb539604
http://security.debian.org/pool/updates/main/c/cupsys/cupsys-bsd_1.1.14-5woody10_ia64.deb
Size/MD5 checksum: 77478 148442739408fc6255d39292f135bec3
http://security.debian.org/pool/updates/main/c/cupsys/cupsys-client_1.1.14-5woody10_ia64.deb
Size/MD5 checksum: 97202 8172c2f63908fb6cb23dbee41f8e2bec
http://security.debian.org/pool/updates/main/c/cupsys/cupsys-pstoraster_1.1.14-5woody10_ia64.deb
Size/MD5 checksum: 2656844 b125add104054e6db76625fa0f661206
http://security.debian.org/pool/updates/main/c/cupsys/libcupsys2_1.1.14-5woody10_ia64.deb
Size/MD5 checksum: 156076 9e2a814e3565a0303074baa1fec3a8ad
http://security.debian.org/pool/updates/main/c/cupsys/libcupsys2-dev_1.1.14-5woody10_ia64.deb
Size/MD5 checksum: 183024 0e6b10d730a19628fb5982e62cc9a037
HP Precision architecture:
http://security.debian.org/pool/updates/main/c/cupsys/cupsys_1.1.14-5woody10_hppa.deb
Size/MD5 checksum: 1881842 30933a611e124b53496a1eaa6e78ead6
http://security.debian.org/pool/updates/main/c/cupsys/cupsys-bsd_1.1.14-5woody10_hppa.deb
Size/MD5 checksum: 70888 a627539e4c17fcb53c81a4a524aa9b6d
http://security.debian.org/pool/updates/main/c/cupsys/cupsys-client_1.1.14-5woody10_hppa.deb
Size/MD5 checksum: 89912 2121010bef372effdc7b5df87f19c14c
http://security.debian.org/pool/updates/main/c/cupsys/cupsys-pstoraster_1.1.14-5woody10_hppa.deb
Size/MD5 checksum: 2456114 d7f144753a6ef2dfd30b804a496b266a
http://security.debian.org/pool/updates/main/c/cupsys/libcupsys2_1.1.14-5woody10_hppa.deb
Size/MD5 checksum: 126552 59a4876e8430211df619bfbba7192c4f
http://security.debian.org/pool/updates/main/c/cupsys/libcupsys2-dev_1.1.14-5woody10_hppa.deb
Size/MD5 checksum: 159622 14750861065ede6ba4fb1779385125ee
Motorola 680×0 architecture:
http://security.debian.org/pool/updates/main/c/cupsys/cupsys_1.1.14-5woody10_m68k.deb
Size/MD5 checksum: 1755320 e772fc6e575816204d24d65b93b233d5
http://security.debian.org/pool/updates/main/c/cupsys/cupsys-bsd_1.1.14-5woody10_m68k.deb
Size/MD5 checksum: 66368 ae622df8d8310ed713e21fcff06e861b
http://security.debian.org/pool/updates/main/c/cupsys/cupsys-client_1.1.14-5woody10_m68k.deb
Size/MD5 checksum: 81460 316c268fe6263463ffa70650cf0b727a
http://security.debian.org/pool/updates/main/c/cupsys/cupsys-pstoraster_1.1.14-5woody10_m68k.deb
Size/MD5 checksum: 2261474 6f73920c2550f1f49fe4e8c93d6bc836
http://security.debian.org/pool/updates/main/c/cupsys/libcupsys2_1.1.14-5woody10_m68k.deb
Size/MD5 checksum: 106314 001809ddc9a6e03054e096b6f4f30885
http://security.debian.org/pool/updates/main/c/cupsys/libcupsys2-dev_1.1.14-5woody10_m68k.deb
Size/MD5 checksum: 128858 17e57bbefae47ff07db3e6eac08fd651
Big endian MIPS architecture:
http://security.debian.org/pool/updates/main/c/cupsys/cupsys_1.1.14-5woody10_mips.deb
Size/MD5 checksum: 1811706 356e49aca2dd13198f1e8528bd410d53
http://security.debian.org/pool/updates/main/c/cupsys/cupsys-bsd_1.1.14-5woody10_mips.deb
Size/MD5 checksum: 67978 5f0a6cbf68d05696537ab036c877baf3
http://security.debian.org/pool/updates/main/c/cupsys/cupsys-client_1.1.14-5woody10_mips.deb
Size/MD5 checksum: 81422 fd91fe740b055e8ea764a2309704c385
http://security.debian.org/pool/updates/main/c/cupsys/cupsys-pstoraster_1.1.14-5woody10_mips.deb
Size/MD5 checksum: 2404692 f5a42ecff952b876db268ba46b1f9297
http://security.debian.org/pool/updates/main/c/cupsys/libcupsys2_1.1.14-5woody10_mips.deb
Size/MD5 checksum: 112844 a957508600052e33c04372114ba0d6e8
http://security.debian.org/pool/updates/main/c/cupsys/libcupsys2-dev_1.1.14-5woody10_mips.deb
Size/MD5 checksum: 151276 c36b4acdd08b3dbfc20f6d8e20f72684
Little endian MIPS architecture:
http://security.debian.org/pool/updates/main/c/cupsys/cupsys_1.1.14-5woody10_mipsel.deb
Size/MD5 checksum: 1812220 1c1515aa26c641f7a0c652187a763b3f
http://security.debian.org/pool/updates/main/c/cupsys/cupsys-bsd_1.1.14-5woody10_mipsel.deb
Size/MD5 checksum: 67954 7704b6cda625f1543cfed3fa7807a71d
http://security.debian.org/pool/updates/main/c/cupsys/cupsys-client_1.1.14-5woody10_mipsel.deb
Size/MD5 checksum: 81446 fb012b9d0b1f016820be28c237c1d1c7
http://security.debian.org/pool/updates/main/c/cupsys/cupsys-pstoraster_1.1.14-5woody10_mipsel.deb
Size/MD5 checksum: 2407024 9ff53f42aff59fbf5050e7bf045af0c7
http://security.debian.org/pool/updates/main/c/cupsys/libcupsys2_1.1.14-5woody10_mipsel.deb
Size/MD5 checksum: 112630 6b96071e8be67ad72ccd14395e472224
http://security.debian.org/pool/updates/main/c/cupsys/libcupsys2-dev_1.1.14-5woody10_mipsel.deb
Size/MD5 checksum: 151098 f6bfedf92870b76638ef16f52c8f185f
PowerPC architecture:
http://security.debian.org/pool/updates/main/c/cupsys/cupsys_1.1.14-5woody10_powerpc.deb
Size/MD5 checksum: 1800710 3b1a280e2c0504303fcefed1f1487540
http://security.debian.org/pool/updates/main/c/cupsys/cupsys-bsd_1.1.14-5woody10_powerpc.deb
Size/MD5 checksum: 67996 6feace4eadb9a7e53d81fb6f77d1df59
http://security.debian.org/pool/updates/main/c/cupsys/cupsys-client_1.1.14-5woody10_powerpc.deb
Size/MD5 checksum: 83558 940e4461997283996cd62c07b9456f53
http://security.debian.org/pool/updates/main/c/cupsys/cupsys-pstoraster_1.1.14-5woody10_powerpc.deb
Size/MD5 checksum: 2359890 f612a6bcb3c52147398fd6b0b7972a2d
http://security.debian.org/pool/updates/main/c/cupsys/libcupsys2_1.1.14-5woody10_powerpc.deb
Size/MD5 checksum: 116866 9f1e4c94ce84e65f20ee7ac2a65d28bc
http://security.debian.org/pool/updates/main/c/cupsys/libcupsys2-dev_1.1.14-5woody10_powerpc.deb
Size/MD5 checksum: 145298 d5e77aad9f5e67acc715b4250d705873
IBM S/390 architecture:
http://security.debian.org/pool/updates/main/c/cupsys/cupsys_1.1.14-5woody10_s390.deb
Size/MD5 checksum: 1795792 08de62dd48dd94d3ff3b2fee9a7fc044
http://security.debian.org/pool/updates/main/c/cupsys/cupsys-bsd_1.1.14-5woody10_s390.deb
Size/MD5 checksum: 69368 eaa0849593f8132eb3128a4d5e91bb98
http://security.debian.org/pool/updates/main/c/cupsys/cupsys-client_1.1.14-5woody10_s390.deb
Size/MD5 checksum: 86100 7037788341cbf3a5294ac771bea83519
http://security.debian.org/pool/updates/main/c/cupsys/cupsys-pstoraster_1.1.14-5woody10_s390.deb
Size/MD5 checksum: 2337736 a11a41b78d3ee10608803b29d2ebdf2a
http://security.debian.org/pool/updates/main/c/cupsys/libcupsys2_1.1.14-5woody10_s390.deb
Size/MD5 checksum: 115398 40a4137f1dfc8beff7ef6ee20853e897
http://security.debian.org/pool/updates/main/c/cupsys/libcupsys2-dev_1.1.14-5woody10_s390.deb
Size/MD5 checksum: 140918 747abc057dccf3cc061f142ca16b8f20
Sun Sparc architecture:
http://security.debian.org/pool/updates/main/c/cupsys/cupsys_1.1.14-5woody10_sparc.deb
Size/MD5 checksum: 1845462 b413070f1f98f540a6a7cf78ad4cf1c0
http://security.debian.org/pool/updates/main/c/cupsys/cupsys-bsd_1.1.14-5woody10_sparc.deb
Size/MD5 checksum: 70948 c77a09b25782f511430ac73420358a35
http://security.debian.org/pool/updates/main/c/cupsys/cupsys-client_1.1.14-5woody10_sparc.deb
Size/MD5 checksum: 84376 1446a20a1664c349db050d90f8319580
http://security.debian.org/pool/updates/main/c/cupsys/cupsys-pstoraster_1.1.14-5woody10_sparc.deb
Size/MD5 checksum: 2354776 c430d70b36aaa7bc279fd9631658d713
http://security.debian.org/pool/updates/main/c/cupsys/libcupsys2_1.1.14-5woody10_sparc.deb
Size/MD5 checksum: 120548 c51a797aa901917d759ce116d3afd2ee
http://security.debian.org/pool/updates/main/c/cupsys/libcupsys2-dev_1.1.14-5woody10_sparc.deb
Size/MD5 checksum: 146862 92e2f650e7b8156b51c2d8d0bfb68e15
These files will probably be moved into the stable distribution
on its next update.
For apt-get: deb http://security.debian.org/
stable/updates main
For dpkg-ftp: ftp://security.debian.org/debian-security
dists/stable/updates/main
Mailing list: debian-security-announce@lists.debian.org
Package info: ‘apt-cache show <pkg>’ and http://packages.debian.org/<pkg>