=========================================
Mon,  25 Oct 2004 - Debian 3.0r3 released
=========================================


stable/non-US/main/binary-sparc/proftpd-common_1.2.4+1.2.5rc1-5woody2_sparc.deb
stable/non-US/main/binary-sparc/proftpd_1.2.4+1.2.5rc1-5woody2_sparc.deb
stable/non-US/main/binary-sparc/proftpd-ldap_1.2.4+1.2.5rc1-5woody2_sparc.deb
stable/non-US/main/binary-sparc/proftpd-pgsql_1.2.4+1.2.5rc1-5woody2_sparc.deb
stable/non-US/main/binary-sparc/proftpd-mysql_1.2.4+1.2.5rc1-5woody2_sparc.deb
proftpd (1.2.4+1.2.5rc1-5woody2) stable-security; urgency=high
  * Touch configure in debian/rules so that autoconf doesn't try to
    run automatically


stable/non-US/main/binary-s390/proftpd-common_1.2.4+1.2.5rc1-5woody2_s390.deb
stable/non-US/main/binary-s390/proftpd-ldap_1.2.4+1.2.5rc1-5woody2_s390.deb
stable/non-US/main/binary-s390/proftpd-pgsql_1.2.4+1.2.5rc1-5woody2_s390.deb
stable/non-US/main/binary-s390/proftpd-mysql_1.2.4+1.2.5rc1-5woody2_s390.deb
stable/non-US/main/binary-s390/proftpd_1.2.4+1.2.5rc1-5woody2_s390.deb
proftpd (1.2.4+1.2.5rc1-5woody2) stable-security; urgency=high
  * Touch configure in debian/rules so that autoconf doesn't try to
    run automatically


stable/non-US/main/binary-powerpc/proftpd-mysql_1.2.4+1.2.5rc1-5woody2_powerpc.deb
stable/non-US/main/binary-powerpc/proftpd_1.2.4+1.2.5rc1-5woody2_powerpc.deb
stable/non-US/main/binary-powerpc/proftpd-common_1.2.4+1.2.5rc1-5woody2_powerpc.deb
stable/non-US/main/binary-powerpc/proftpd-ldap_1.2.4+1.2.5rc1-5woody2_powerpc.deb
stable/non-US/main/binary-powerpc/proftpd-pgsql_1.2.4+1.2.5rc1-5woody2_powerpc.deb
proftpd (1.2.4+1.2.5rc1-5woody2) stable-security; urgency=high
  * Touch configure in debian/rules so that autoconf doesn't try to
    run automatically


stable/non-US/main/binary-mipsel/proftpd-pgsql_1.2.4+1.2.5rc1-5woody2_mipsel.deb
stable/non-US/main/binary-mipsel/proftpd-common_1.2.4+1.2.5rc1-5woody2_mipsel.deb
stable/non-US/main/binary-mipsel/proftpd-mysql_1.2.4+1.2.5rc1-5woody2_mipsel.deb
stable/non-US/main/binary-mipsel/proftpd_1.2.4+1.2.5rc1-5woody2_mipsel.deb
stable/non-US/main/binary-mipsel/proftpd-ldap_1.2.4+1.2.5rc1-5woody2_mipsel.deb
proftpd (1.2.4+1.2.5rc1-5woody2) stable-security; urgency=high
  * Touch configure in debian/rules so that autoconf doesn't try to
    run automatically


stable/non-US/main/binary-mips/proftpd_1.2.4+1.2.5rc1-5woody2_mips.deb
stable/non-US/main/binary-mips/proftpd-mysql_1.2.4+1.2.5rc1-5woody2_mips.deb
stable/non-US/main/binary-mips/proftpd-common_1.2.4+1.2.5rc1-5woody2_mips.deb
stable/non-US/main/binary-mips/proftpd-pgsql_1.2.4+1.2.5rc1-5woody2_mips.deb
stable/non-US/main/binary-mips/proftpd-ldap_1.2.4+1.2.5rc1-5woody2_mips.deb
proftpd (1.2.4+1.2.5rc1-5woody2) stable-security; urgency=high
  * Touch configure in debian/rules so that autoconf doesn't try to
    run automatically


stable/non-US/main/binary-m68k/proftpd-mysql_1.2.4+1.2.5rc1-5woody2_m68k.deb
stable/non-US/main/binary-m68k/proftpd_1.2.4+1.2.5rc1-5woody2_m68k.deb
stable/non-US/main/binary-m68k/proftpd-ldap_1.2.4+1.2.5rc1-5woody2_m68k.deb
stable/non-US/main/binary-m68k/proftpd-pgsql_1.2.4+1.2.5rc1-5woody2_m68k.deb
stable/non-US/main/binary-m68k/proftpd-common_1.2.4+1.2.5rc1-5woody2_m68k.deb
proftpd (1.2.4+1.2.5rc1-5woody2) stable-security; urgency=high
  * Touch configure in debian/rules so that autoconf doesn't try to
    run automatically


stable/non-US/main/binary-ia64/proftpd-pgsql_1.2.4+1.2.5rc1-5woody2_ia64.deb
stable/non-US/main/binary-ia64/proftpd-common_1.2.4+1.2.5rc1-5woody2_ia64.deb
stable/non-US/main/binary-ia64/proftpd-ldap_1.2.4+1.2.5rc1-5woody2_ia64.deb
stable/non-US/main/binary-ia64/proftpd_1.2.4+1.2.5rc1-5woody2_ia64.deb
stable/non-US/main/binary-ia64/proftpd-mysql_1.2.4+1.2.5rc1-5woody2_ia64.deb
proftpd (1.2.4+1.2.5rc1-5woody2) stable-security; urgency=high
  * Touch configure in debian/rules so that autoconf doesn't try to
    run automatically


stable/non-US/main/binary-hppa/proftpd-common_1.2.4+1.2.5rc1-5woody2_hppa.deb
stable/non-US/main/binary-hppa/proftpd-ldap_1.2.4+1.2.5rc1-5woody2_hppa.deb
stable/non-US/main/binary-hppa/proftpd_1.2.4+1.2.5rc1-5woody2_hppa.deb
stable/non-US/main/binary-hppa/proftpd-mysql_1.2.4+1.2.5rc1-5woody2_hppa.deb
stable/non-US/main/binary-hppa/proftpd-pgsql_1.2.4+1.2.5rc1-5woody2_hppa.deb
proftpd (1.2.4+1.2.5rc1-5woody2) stable-security; urgency=high
  * Touch configure in debian/rules so that autoconf doesn't try to
    run automatically


stable/non-US/main/binary-arm/proftpd-common_1.2.4+1.2.5rc1-5woody2_arm.deb
stable/non-US/main/binary-arm/proftpd-ldap_1.2.4+1.2.5rc1-5woody2_arm.deb
stable/non-US/main/binary-arm/proftpd_1.2.4+1.2.5rc1-5woody2_arm.deb
stable/non-US/main/binary-arm/proftpd-mysql_1.2.4+1.2.5rc1-5woody2_arm.deb
stable/non-US/main/binary-arm/proftpd-pgsql_1.2.4+1.2.5rc1-5woody2_arm.deb
proftpd (1.2.4+1.2.5rc1-5woody2) stable-security; urgency=high
  * Touch configure in debian/rules so that autoconf doesn't try to
    run automatically


stable/non-US/main/binary-alpha/proftpd-mysql_1.2.4+1.2.5rc1-5woody2_alpha.deb
stable/non-US/main/binary-alpha/proftpd_1.2.4+1.2.5rc1-5woody2_alpha.deb
stable/non-US/main/binary-alpha/proftpd-common_1.2.4+1.2.5rc1-5woody2_alpha.deb
stable/non-US/main/binary-alpha/proftpd-ldap_1.2.4+1.2.5rc1-5woody2_alpha.deb
stable/non-US/main/binary-alpha/proftpd-pgsql_1.2.4+1.2.5rc1-5woody2_alpha.deb
proftpd (1.2.4+1.2.5rc1-5woody2) stable-security; urgency=high
  * Touch configure in debian/rules so that autoconf doesn't try to
    run automatically


stable/non-US/main/binary-i386/proftpd-ldap_1.2.4+1.2.5rc1-5woody2_i386.deb
stable/non-US/main/binary-i386/proftpd-common_1.2.4+1.2.5rc1-5woody2_i386.deb
stable/non-US/main/binary-i386/proftpd-mysql_1.2.4+1.2.5rc1-5woody2_i386.deb
stable/non-US/main/source/proftpd_1.2.4+1.2.5rc1-5woody2.tar.gz
stable/non-US/main/source/proftpd_1.2.4+1.2.5rc1-5woody2.dsc
stable/non-US/main/binary-all/proftpd-doc_1.2.4+1.2.5rc1-5woody2_all.deb
stable/non-US/main/binary-i386/proftpd-pgsql_1.2.4+1.2.5rc1-5woody2_i386.deb
stable/non-US/main/binary-i386/proftpd_1.2.4+1.2.5rc1-5woody2_i386.deb
proftpd (1.2.4+1.2.5rc1-5woody2) stable-security; urgency=high
  * Touch configure in debian/rules so that autoconf doesn't try to
    run automatically


stable/non-US/main/binary-s390/libmcrypt-dev_2.5.0-1woody1_s390.deb
stable/non-US/main/binary-s390/libmcrypt4_2.5.0-1woody1_s390.deb
libmcrypt (2.5.0-1woody1) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Backport buffer overflow fixes from version 2.5.5
    - lib/mcrypt_extra.c: calloc->strdup, strcpy->strncpy
    - lib/mcrypt_modules.c: mcrypt_dlopen() buffer increased,
      checks for NULL, ensure null termination


stable/non-US/main/binary-powerpc/libmcrypt4_2.5.0-1woody1_powerpc.deb
stable/non-US/main/binary-powerpc/libmcrypt-dev_2.5.0-1woody1_powerpc.deb
libmcrypt (2.5.0-1woody1) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Backport buffer overflow fixes from version 2.5.5
    - lib/mcrypt_extra.c: calloc->strdup, strcpy->strncpy
    - lib/mcrypt_modules.c: mcrypt_dlopen() buffer increased,
      checks for NULL, ensure null termination


stable/non-US/main/binary-mipsel/libmcrypt-dev_2.5.0-1woody1_mipsel.deb
stable/non-US/main/binary-mipsel/libmcrypt4_2.5.0-1woody1_mipsel.deb
libmcrypt (2.5.0-1woody1) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Backport buffer overflow fixes from version 2.5.5
    - lib/mcrypt_extra.c: calloc->strdup, strcpy->strncpy
    - lib/mcrypt_modules.c: mcrypt_dlopen() buffer increased,
      checks for NULL, ensure null termination


stable/non-US/main/binary-mips/libmcrypt-dev_2.5.0-1woody1_mips.deb
stable/non-US/main/binary-mips/libmcrypt4_2.5.0-1woody1_mips.deb
libmcrypt (2.5.0-1woody1) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Backport buffer overflow fixes from version 2.5.5
    - lib/mcrypt_extra.c: calloc->strdup, strcpy->strncpy
    - lib/mcrypt_modules.c: mcrypt_dlopen() buffer increased,
      checks for NULL, ensure null termination


stable/non-US/main/binary-m68k/libmcrypt4_2.5.0-1woody1_m68k.deb
stable/non-US/main/binary-m68k/libmcrypt-dev_2.5.0-1woody1_m68k.deb
libmcrypt (2.5.0-1woody1) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Backport buffer overflow fixes from version 2.5.5
    - lib/mcrypt_extra.c: calloc->strdup, strcpy->strncpy
    - lib/mcrypt_modules.c: mcrypt_dlopen() buffer increased,
      checks for NULL, ensure null termination


stable/non-US/main/binary-ia64/libmcrypt-dev_2.5.0-1woody1_ia64.deb
stable/non-US/main/binary-ia64/libmcrypt4_2.5.0-1woody1_ia64.deb
libmcrypt (2.5.0-1woody1) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Backport buffer overflow fixes from version 2.5.5
    - lib/mcrypt_extra.c: calloc->strdup, strcpy->strncpy
    - lib/mcrypt_modules.c: mcrypt_dlopen() buffer increased,
      checks for NULL, ensure null termination


stable/non-US/main/binary-i386/libmcrypt4_2.5.0-1woody1_i386.deb
stable/non-US/main/binary-i386/libmcrypt-dev_2.5.0-1woody1_i386.deb
libmcrypt (2.5.0-1woody1) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Backport buffer overflow fixes from version 2.5.5
    - lib/mcrypt_extra.c: calloc->strdup, strcpy->strncpy
    - lib/mcrypt_modules.c: mcrypt_dlopen() buffer increased,
      checks for NULL, ensure null termination


stable/non-US/main/binary-hppa/libmcrypt-dev_2.5.0-1woody1_hppa.deb
stable/non-US/main/binary-hppa/libmcrypt4_2.5.0-1woody1_hppa.deb
libmcrypt (2.5.0-1woody1) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Backport buffer overflow fixes from version 2.5.5
    - lib/mcrypt_extra.c: calloc->strdup, strcpy->strncpy
    - lib/mcrypt_modules.c: mcrypt_dlopen() buffer increased,
      checks for NULL, ensure null termination


stable/non-US/main/binary-arm/libmcrypt4_2.5.0-1woody1_arm.deb
stable/non-US/main/binary-arm/libmcrypt-dev_2.5.0-1woody1_arm.deb
libmcrypt (2.5.0-1woody1) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Backport buffer overflow fixes from version 2.5.5
    - lib/mcrypt_extra.c: calloc->strdup, strcpy->strncpy
    - lib/mcrypt_modules.c: mcrypt_dlopen() buffer increased,
      checks for NULL, ensure null termination


stable/non-US/main/binary-alpha/libmcrypt4_2.5.0-1woody1_alpha.deb
stable/non-US/main/binary-alpha/libmcrypt-dev_2.5.0-1woody1_alpha.deb
libmcrypt (2.5.0-1woody1) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Backport buffer overflow fixes from version 2.5.5
    - lib/mcrypt_extra.c: calloc->strdup, strcpy->strncpy
    - lib/mcrypt_modules.c: mcrypt_dlopen() buffer increased,
      checks for NULL, ensure null termination


stable/non-US/main/binary-sparc/libmcrypt4_2.5.0-1woody1_sparc.deb
stable/non-US/main/binary-sparc/libmcrypt-dev_2.5.0-1woody1_sparc.deb
stable/non-US/main/source/libmcrypt_2.5.0-1woody1.dsc
stable/non-US/main/source/libmcrypt_2.5.0-1woody1.diff.gz
libmcrypt (2.5.0-1woody1) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Backport buffer overflow fixes from version 2.5.5
    - lib/mcrypt_extra.c: calloc->strdup, strcpy->strncpy
    - lib/mcrypt_modules.c: mcrypt_dlopen() buffer increased,
      checks for NULL, ensure null termination


stable/non-US/main/binary-s390/kerberos4kth-servers_1.1-8-2.3_s390.deb
stable/non-US/main/binary-s390/kerberos4kth-servers-x_1.1-8-2.3_s390.deb
stable/non-US/main/binary-s390/kerberos4kth-dev_1.1-8-2.3_s390.deb
stable/non-US/main/binary-s390/kerberos4kth-kip_1.1-8-2.3_s390.deb
stable/non-US/main/binary-s390/libacl1-kerberos4kth_1.1-8-2.3_s390.deb
stable/non-US/main/binary-s390/kerberos4kth-kdc_1.1-8-2.3_s390.deb
stable/non-US/main/binary-s390/libkdb-1-kerberos4kth_1.1-8-2.3_s390.deb
stable/non-US/main/binary-s390/libkadm1-kerberos4kth_1.1-8-2.3_s390.deb
stable/non-US/main/binary-s390/kerberos4kth-dev-common_1.1-8-2.3_s390.deb
stable/non-US/main/binary-s390/libkrb-1-kerberos4kth_1.1-8-2.3_s390.deb
stable/non-US/main/binary-s390/kerberos4kth-clients_1.1-8-2.3_s390.deb
stable/non-US/main/binary-s390/kerberos4kth-clients-x_1.1-8-2.3_s390.deb
krb4 (1.1-8-2.3) stable-security; urgency=high
  * Backport of patches from 1.2.1 to 1.2.2
    Fix security bug in kerberos4 cross realm by disabling it.
    For more information see
    /usr/share/doc/kerberos4kth-kdc/kerberos4kth-kdc.README


stable/non-US/main/binary-powerpc/kerberos4kth-clients_1.1-8-2.3_powerpc.deb
stable/non-US/main/binary-powerpc/libkdb-1-kerberos4kth_1.1-8-2.3_powerpc.deb
stable/non-US/main/binary-powerpc/kerberos4kth-kdc_1.1-8-2.3_powerpc.deb
stable/non-US/main/binary-powerpc/kerberos4kth-kip_1.1-8-2.3_powerpc.deb
stable/non-US/main/binary-powerpc/libkrb-1-kerberos4kth_1.1-8-2.3_powerpc.deb
stable/non-US/main/binary-powerpc/kerberos4kth-clients-x_1.1-8-2.3_powerpc.deb
stable/non-US/main/binary-powerpc/libacl1-kerberos4kth_1.1-8-2.3_powerpc.deb
stable/non-US/main/binary-powerpc/libkadm1-kerberos4kth_1.1-8-2.3_powerpc.deb
stable/non-US/main/binary-powerpc/kerberos4kth-dev-common_1.1-8-2.3_powerpc.deb
stable/non-US/main/binary-powerpc/kerberos4kth-servers-x_1.1-8-2.3_powerpc.deb
stable/non-US/main/binary-powerpc/kerberos4kth-servers_1.1-8-2.3_powerpc.deb
stable/non-US/main/binary-powerpc/kerberos4kth-dev_1.1-8-2.3_powerpc.deb
krb4 (1.1-8-2.3) stable-security; urgency=high
  * Backport of patches from 1.2.1 to 1.2.2
    Fix security bug in kerberos4 cross realm by disabling it.
    For more information see
    /usr/share/doc/kerberos4kth-kdc/kerberos4kth-kdc.README


stable/non-US/main/binary-mipsel/kerberos4kth-kip_1.1-8-2.3_mipsel.deb
stable/non-US/main/binary-mipsel/kerberos4kth-clients-x_1.1-8-2.3_mipsel.deb
stable/non-US/main/binary-mipsel/libacl1-kerberos4kth_1.1-8-2.3_mipsel.deb
stable/non-US/main/binary-mipsel/kerberos4kth-dev_1.1-8-2.3_mipsel.deb
stable/non-US/main/binary-mipsel/libkadm1-kerberos4kth_1.1-8-2.3_mipsel.deb
stable/non-US/main/binary-mipsel/kerberos4kth-kdc_1.1-8-2.3_mipsel.deb
stable/non-US/main/binary-mipsel/kerberos4kth-servers_1.1-8-2.3_mipsel.deb
stable/non-US/main/binary-mipsel/kerberos4kth-clients_1.1-8-2.3_mipsel.deb
stable/non-US/main/binary-mipsel/kerberos4kth-dev-common_1.1-8-2.3_mipsel.deb
stable/non-US/main/binary-mipsel/libkrb-1-kerberos4kth_1.1-8-2.3_mipsel.deb
stable/non-US/main/binary-mipsel/libkdb-1-kerberos4kth_1.1-8-2.3_mipsel.deb
stable/non-US/main/binary-mipsel/kerberos4kth-servers-x_1.1-8-2.3_mipsel.deb
krb4 (1.1-8-2.3) stable-security; urgency=high
  * Backport of patches from 1.2.1 to 1.2.2
    Fix security bug in kerberos4 cross realm by disabling it.
    For more information see
    /usr/share/doc/kerberos4kth-kdc/kerberos4kth-kdc.README


stable/non-US/main/binary-mips/libkadm1-kerberos4kth_1.1-8-2.3_mips.deb
stable/non-US/main/binary-mips/kerberos4kth-kdc_1.1-8-2.3_mips.deb
stable/non-US/main/binary-mips/kerberos4kth-clients_1.1-8-2.3_mips.deb
stable/non-US/main/binary-mips/kerberos4kth-dev-common_1.1-8-2.3_mips.deb
stable/non-US/main/binary-mips/libacl1-kerberos4kth_1.1-8-2.3_mips.deb
stable/non-US/main/binary-mips/libkrb-1-kerberos4kth_1.1-8-2.3_mips.deb
stable/non-US/main/binary-mips/kerberos4kth-clients-x_1.1-8-2.3_mips.deb
stable/non-US/main/binary-mips/kerberos4kth-servers-x_1.1-8-2.3_mips.deb
stable/non-US/main/binary-mips/kerberos4kth-dev_1.1-8-2.3_mips.deb
stable/non-US/main/binary-mips/kerberos4kth-kip_1.1-8-2.3_mips.deb
stable/non-US/main/binary-mips/kerberos4kth-servers_1.1-8-2.3_mips.deb
stable/non-US/main/binary-mips/libkdb-1-kerberos4kth_1.1-8-2.3_mips.deb
krb4 (1.1-8-2.3) stable-security; urgency=high
  * Backport of patches from 1.2.1 to 1.2.2
    Fix security bug in kerberos4 cross realm by disabling it.
    For more information see
    /usr/share/doc/kerberos4kth-kdc/kerberos4kth-kdc.README


stable/non-US/main/binary-m68k/kerberos4kth-clients_1.1-8-2.3_m68k.deb
stable/non-US/main/binary-m68k/libkrb-1-kerberos4kth_1.1-8-2.3_m68k.deb
stable/non-US/main/binary-m68k/libacl1-kerberos4kth_1.1-8-2.3_m68k.deb
stable/non-US/main/binary-m68k/kerberos4kth-dev-common_1.1-8-2.3_m68k.deb
stable/non-US/main/binary-m68k/kerberos4kth-servers-x_1.1-8-2.3_m68k.deb
stable/non-US/main/binary-m68k/libkdb-1-kerberos4kth_1.1-8-2.3_m68k.deb
stable/non-US/main/binary-m68k/kerberos4kth-kdc_1.1-8-2.3_m68k.deb
stable/non-US/main/binary-m68k/kerberos4kth-servers_1.1-8-2.3_m68k.deb
stable/non-US/main/binary-m68k/libkadm1-kerberos4kth_1.1-8-2.3_m68k.deb
stable/non-US/main/binary-m68k/kerberos4kth-dev_1.1-8-2.3_m68k.deb
stable/non-US/main/binary-m68k/kerberos4kth-clients-x_1.1-8-2.3_m68k.deb
stable/non-US/main/binary-m68k/kerberos4kth-kip_1.1-8-2.3_m68k.deb
krb4 (1.1-8-2.3) stable-security; urgency=high
  * Backport of patches from 1.2.1 to 1.2.2
    Fix security bug in kerberos4 cross realm by disabling it.
    For more information see
    /usr/share/doc/kerberos4kth-kdc/kerberos4kth-kdc.README


stable/non-US/main/binary-ia64/kerberos4kth-dev-common_1.1-8-2.3_ia64.deb
stable/non-US/main/binary-ia64/kerberos4kth-servers-x_1.1-8-2.3_ia64.deb
stable/non-US/main/binary-ia64/kerberos4kth-servers_1.1-8-2.3_ia64.deb
stable/non-US/main/binary-ia64/libkrb-1-kerberos4kth_1.1-8-2.3_ia64.deb
stable/non-US/main/binary-ia64/kerberos4kth-kip_1.1-8-2.3_ia64.deb
stable/non-US/main/binary-ia64/kerberos4kth-clients_1.1-8-2.3_ia64.deb
stable/non-US/main/binary-ia64/kerberos4kth-kdc_1.1-8-2.3_ia64.deb
stable/non-US/main/binary-ia64/kerberos4kth-dev_1.1-8-2.3_ia64.deb
stable/non-US/main/binary-ia64/libkdb-1-kerberos4kth_1.1-8-2.3_ia64.deb
stable/non-US/main/binary-ia64/libkadm1-kerberos4kth_1.1-8-2.3_ia64.deb
stable/non-US/main/binary-ia64/kerberos4kth-clients-x_1.1-8-2.3_ia64.deb
stable/non-US/main/binary-ia64/libacl1-kerberos4kth_1.1-8-2.3_ia64.deb
krb4 (1.1-8-2.3) stable-security; urgency=high
  * Backport of patches from 1.2.1 to 1.2.2
    Fix security bug in kerberos4 cross realm by disabling it.
    For more information see
    /usr/share/doc/kerberos4kth-kdc/kerberos4kth-kdc.README


stable/non-US/main/binary-i386/kerberos4kth-kdc_1.1-8-2.3_i386.deb
stable/non-US/main/binary-i386/kerberos4kth-clients-x_1.1-8-2.3_i386.deb
stable/non-US/main/binary-i386/libkrb-1-kerberos4kth_1.1-8-2.3_i386.deb
stable/non-US/main/binary-i386/libkadm1-kerberos4kth_1.1-8-2.3_i386.deb
stable/non-US/main/binary-i386/libkdb-1-kerberos4kth_1.1-8-2.3_i386.deb
stable/non-US/main/binary-i386/kerberos4kth-clients_1.1-8-2.3_i386.deb
stable/non-US/main/binary-i386/kerberos4kth-servers-x_1.1-8-2.3_i386.deb
stable/non-US/main/binary-i386/libacl1-kerberos4kth_1.1-8-2.3_i386.deb
stable/non-US/main/binary-i386/kerberos4kth-dev_1.1-8-2.3_i386.deb
stable/non-US/main/binary-i386/kerberos4kth-dev-common_1.1-8-2.3_i386.deb
stable/non-US/main/binary-i386/kerberos4kth-kip_1.1-8-2.3_i386.deb
stable/non-US/main/binary-i386/kerberos4kth-servers_1.1-8-2.3_i386.deb
krb4 (1.1-8-2.3) stable-security; urgency=high
  * Backport of patches from 1.2.1 to 1.2.2
    Fix security bug in kerberos4 cross realm by disabling it.
    For more information see
    /usr/share/doc/kerberos4kth-kdc/kerberos4kth-kdc.README


stable/non-US/main/binary-hppa/kerberos4kth-clients-x_1.1-8-2.3_hppa.deb
stable/non-US/main/binary-hppa/kerberos4kth-clients_1.1-8-2.3_hppa.deb
stable/non-US/main/binary-hppa/libkdb-1-kerberos4kth_1.1-8-2.3_hppa.deb
stable/non-US/main/binary-hppa/kerberos4kth-servers_1.1-8-2.3_hppa.deb
stable/non-US/main/binary-hppa/kerberos4kth-dev_1.1-8-2.3_hppa.deb
stable/non-US/main/binary-hppa/libkadm1-kerberos4kth_1.1-8-2.3_hppa.deb
stable/non-US/main/binary-hppa/kerberos4kth-dev-common_1.1-8-2.3_hppa.deb
stable/non-US/main/binary-hppa/kerberos4kth-servers-x_1.1-8-2.3_hppa.deb
stable/non-US/main/binary-hppa/kerberos4kth-kdc_1.1-8-2.3_hppa.deb
stable/non-US/main/binary-hppa/libacl1-kerberos4kth_1.1-8-2.3_hppa.deb
stable/non-US/main/binary-hppa/kerberos4kth-kip_1.1-8-2.3_hppa.deb
stable/non-US/main/binary-hppa/libkrb-1-kerberos4kth_1.1-8-2.3_hppa.deb
krb4 (1.1-8-2.3) stable-security; urgency=high
  * Backport of patches from 1.2.1 to 1.2.2
    Fix security bug in kerberos4 cross realm by disabling it.
    For more information see
    /usr/share/doc/kerberos4kth-kdc/kerberos4kth-kdc.README


stable/non-US/main/binary-arm/libacl1-kerberos4kth_1.1-8-2.3_arm.deb
stable/non-US/main/binary-arm/kerberos4kth-dev-common_1.1-8-2.3_arm.deb
stable/non-US/main/binary-arm/kerberos4kth-servers-x_1.1-8-2.3_arm.deb
stable/non-US/main/binary-arm/libkdb-1-kerberos4kth_1.1-8-2.3_arm.deb
stable/non-US/main/binary-arm/libkadm1-kerberos4kth_1.1-8-2.3_arm.deb
stable/non-US/main/binary-arm/kerberos4kth-dev_1.1-8-2.3_arm.deb
stable/non-US/main/binary-arm/kerberos4kth-kdc_1.1-8-2.3_arm.deb
stable/non-US/main/binary-arm/kerberos4kth-kip_1.1-8-2.3_arm.deb
stable/non-US/main/binary-arm/kerberos4kth-clients-x_1.1-8-2.3_arm.deb
stable/non-US/main/binary-arm/kerberos4kth-servers_1.1-8-2.3_arm.deb
stable/non-US/main/binary-arm/libkrb-1-kerberos4kth_1.1-8-2.3_arm.deb
stable/non-US/main/binary-arm/kerberos4kth-clients_1.1-8-2.3_arm.deb
krb4 (1.1-8-2.3) stable-security; urgency=high
  * Backport of patches from 1.2.1 to 1.2.2
    Fix security bug in kerberos4 cross realm by disabling it.
    For more information see
    /usr/share/doc/kerberos4kth-kdc/kerberos4kth-kdc.README


stable/non-US/main/binary-alpha/libacl1-kerberos4kth_1.1-8-2.3_alpha.deb
stable/non-US/main/binary-alpha/kerberos4kth-servers_1.1-8-2.3_alpha.deb
stable/non-US/main/binary-alpha/kerberos4kth-dev_1.1-8-2.3_alpha.deb
stable/non-US/main/binary-alpha/kerberos4kth-clients_1.1-8-2.3_alpha.deb
stable/non-US/main/binary-alpha/kerberos4kth-dev-common_1.1-8-2.3_alpha.deb
stable/non-US/main/binary-alpha/kerberos4kth-servers-x_1.1-8-2.3_alpha.deb
stable/non-US/main/binary-alpha/kerberos4kth-kdc_1.1-8-2.3_alpha.deb
stable/non-US/main/binary-alpha/libkdb-1-kerberos4kth_1.1-8-2.3_alpha.deb
stable/non-US/main/binary-alpha/kerberos4kth-kip_1.1-8-2.3_alpha.deb
stable/non-US/main/binary-alpha/kerberos4kth-clients-x_1.1-8-2.3_alpha.deb
stable/non-US/main/binary-alpha/libkadm1-kerberos4kth_1.1-8-2.3_alpha.deb
stable/non-US/main/binary-alpha/libkrb-1-kerberos4kth_1.1-8-2.3_alpha.deb
krb4 (1.1-8-2.3) stable-security; urgency=high
  * Backport of patches from 1.2.1 to 1.2.2
    Fix security bug in kerberos4 cross realm by disabling it.
    For more information see
    /usr/share/doc/kerberos4kth-kdc/kerberos4kth-kdc.README


stable/non-US/main/binary-all/kerberos4kth-services_1.1-8-2.3_all.deb
stable/non-US/main/binary-all/kerberos4kth-user_1.1-8-2.3_all.deb
stable/non-US/main/binary-all/kerberos4kth-docs_1.1-8-2.3_all.deb
stable/non-US/main/binary-sparc/kerberos4kth-dev_1.1-8-2.3_sparc.deb
stable/non-US/main/binary-sparc/kerberos4kth-dev-common_1.1-8-2.3_sparc.deb
stable/non-US/main/binary-sparc/kerberos4kth-kdc_1.1-8-2.3_sparc.deb
stable/non-US/main/binary-sparc/kerberos4kth-kip_1.1-8-2.3_sparc.deb
stable/non-US/main/binary-sparc/kerberos4kth-clients-x_1.1-8-2.3_sparc.deb
stable/non-US/main/binary-sparc/libacl1-kerberos4kth_1.1-8-2.3_sparc.deb
stable/non-US/main/binary-sparc/libkrb-1-kerberos4kth_1.1-8-2.3_sparc.deb
stable/non-US/main/binary-sparc/libkadm1-kerberos4kth_1.1-8-2.3_sparc.deb
stable/non-US/main/binary-all/kerberos4kth1_1.1-8-2.3_all.deb
stable/non-US/main/binary-sparc/kerberos4kth-servers-x_1.1-8-2.3_sparc.deb
stable/non-US/main/binary-sparc/kerberos4kth-servers_1.1-8-2.3_sparc.deb
stable/non-US/main/binary-sparc/kerberos4kth-clients_1.1-8-2.3_sparc.deb
stable/non-US/main/binary-sparc/libkdb-1-kerberos4kth_1.1-8-2.3_sparc.deb
stable/non-US/main/source/krb4_1.1-8-2.3.tar.gz
stable/non-US/main/source/krb4_1.1-8-2.3.dsc
stable/non-US/main/binary-all/kerberos4kth-x11_1.1-8-2.3_all.deb
krb4 (1.1-8-2.3) stable-security; urgency=high
  * Backport of patches from 1.2.1 to 1.2.2
    Fix security bug in kerberos4 cross realm by disabling it.
    For more information see
    /usr/share/doc/kerberos4kth-kdc/kerberos4kth-kdc.README


stable/non-US/main/binary-sparc/ircii_20020322-1.1_sparc.deb
ircii (20020322-1.1) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Applied upstream patch partially to fix problems reported by Timo
    Sirainen <tss@iki.fi>


stable/non-US/main/binary-s390/ircii_20020322-1.1_s390.deb
ircii (20020322-1.1) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Applied upstream patch partially to fix problems reported by Timo
    Sirainen <tss@iki.fi>


stable/non-US/main/binary-powerpc/ircii_20020322-1.1_powerpc.deb
ircii (20020322-1.1) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Applied upstream patch partially to fix problems reported by Timo
    Sirainen <tss@iki.fi>


stable/non-US/main/binary-mipsel/ircii_20020322-1.1_mipsel.deb
ircii (20020322-1.1) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Applied upstream patch partially to fix problems reported by Timo
    Sirainen <tss@iki.fi>


stable/non-US/main/binary-mips/ircii_20020322-1.1_mips.deb
ircii (20020322-1.1) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Applied upstream patch partially to fix problems reported by Timo
    Sirainen <tss@iki.fi>


stable/non-US/main/binary-m68k/ircii_20020322-1.1_m68k.deb
ircii (20020322-1.1) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Applied upstream patch partially to fix problems reported by Timo
    Sirainen <tss@iki.fi>


stable/non-US/main/binary-ia64/ircii_20020322-1.1_ia64.deb
ircii (20020322-1.1) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Applied upstream patch partially to fix problems reported by Timo
    Sirainen <tss@iki.fi>


stable/non-US/main/binary-i386/ircii_20020322-1.1_i386.deb
ircii (20020322-1.1) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Applied upstream patch partially to fix problems reported by Timo
    Sirainen <tss@iki.fi>


stable/non-US/main/binary-hppa/ircii_20020322-1.1_hppa.deb
ircii (20020322-1.1) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Applied upstream patch partially to fix problems reported by Timo
    Sirainen <tss@iki.fi>


stable/non-US/main/binary-arm/ircii_20020322-1.1_arm.deb
ircii (20020322-1.1) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Applied upstream patch partially to fix problems reported by Timo
    Sirainen <tss@iki.fi>


stable/non-US/main/source/ircii_20020322-1.1.diff.gz
stable/non-US/main/binary-alpha/ircii_20020322-1.1_alpha.deb
stable/non-US/main/source/ircii_20020322-1.1.dsc
ircii (20020322-1.1) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Applied upstream patch partially to fix problems reported by Timo
    Sirainen <tss@iki.fi>


stable/non-US/main/binary-s390/libsl0-heimdal_0.4e-7.woody.8_s390.deb
stable/non-US/main/binary-s390/libkrb5-17-heimdal_0.4e-7.woody.8_s390.deb
stable/non-US/main/binary-s390/libss0-heimdal_0.4e-7.woody.8_s390.deb
stable/non-US/main/binary-s390/libkafs0-heimdal_0.4e-7.woody.8_s390.deb
stable/non-US/main/binary-s390/heimdal-servers_0.4e-7.woody.8_s390.deb
stable/non-US/main/binary-s390/heimdal-servers-x_0.4e-7.woody.8_s390.deb
stable/non-US/main/binary-s390/heimdal-clients_0.4e-7.woody.8_s390.deb
stable/non-US/main/binary-s390/libroken9-heimdal_0.4e-7.woody.8_s390.deb
stable/non-US/main/binary-s390/libkadm5srv7-heimdal_0.4e-7.woody.8_s390.deb
stable/non-US/main/binary-s390/heimdal-dev_0.4e-7.woody.8_s390.deb
stable/non-US/main/binary-s390/libotp0-heimdal_0.4e-7.woody.8_s390.deb
stable/non-US/main/binary-s390/libasn1-5-heimdal_0.4e-7.woody.8_s390.deb
stable/non-US/main/binary-s390/heimdal-kdc_0.4e-7.woody.8_s390.deb
stable/non-US/main/binary-s390/libgssapi1-heimdal_0.4e-7.woody.8_s390.deb
stable/non-US/main/binary-s390/libcomerr1-heimdal_0.4e-7.woody.8_s390.deb
stable/non-US/main/binary-s390/libkadm5clnt4-heimdal_0.4e-7.woody.8_s390.deb
stable/non-US/main/binary-s390/heimdal-clients-x_0.4e-7.woody.8_s390.deb
stable/non-US/main/binary-s390/libhdb7-heimdal_0.4e-7.woody.8_s390.deb
heimdal (0.4e-7.woody.8) stable-security; urgency=medium
  * Non-maintainer upload by the Security Team
  * Added special detection routine for big/little endianess on MIPS since
    the line "byteorder : {big|little} endian" from /proc/cpuinfo was
    removed as of Linux 2.4.20, resulting in the mipsel buildd being
    unable to build this package. (032_autotools_mips)


stable/non-US/main/binary-powerpc/heimdal-kdc_0.4e-7.woody.8_powerpc.deb
stable/non-US/main/binary-powerpc/libroken9-heimdal_0.4e-7.woody.8_powerpc.deb
stable/non-US/main/binary-powerpc/heimdal-servers_0.4e-7.woody.8_powerpc.deb
stable/non-US/main/binary-powerpc/libkafs0-heimdal_0.4e-7.woody.8_powerpc.deb
stable/non-US/main/binary-powerpc/heimdal-servers-x_0.4e-7.woody.8_powerpc.deb
stable/non-US/main/binary-powerpc/libss0-heimdal_0.4e-7.woody.8_powerpc.deb
stable/non-US/main/binary-powerpc/libkrb5-17-heimdal_0.4e-7.woody.8_powerpc.deb
stable/non-US/main/binary-powerpc/libkadm5clnt4-heimdal_0.4e-7.woody.8_powerpc.deb
stable/non-US/main/binary-powerpc/heimdal-clients_0.4e-7.woody.8_powerpc.deb
stable/non-US/main/binary-powerpc/libcomerr1-heimdal_0.4e-7.woody.8_powerpc.deb
stable/non-US/main/binary-powerpc/libasn1-5-heimdal_0.4e-7.woody.8_powerpc.deb
stable/non-US/main/binary-powerpc/heimdal-clients-x_0.4e-7.woody.8_powerpc.deb
stable/non-US/main/binary-powerpc/libotp0-heimdal_0.4e-7.woody.8_powerpc.deb
stable/non-US/main/binary-powerpc/libgssapi1-heimdal_0.4e-7.woody.8_powerpc.deb
stable/non-US/main/binary-powerpc/heimdal-dev_0.4e-7.woody.8_powerpc.deb
stable/non-US/main/binary-powerpc/libkadm5srv7-heimdal_0.4e-7.woody.8_powerpc.deb
stable/non-US/main/binary-powerpc/libhdb7-heimdal_0.4e-7.woody.8_powerpc.deb
stable/non-US/main/binary-powerpc/libsl0-heimdal_0.4e-7.woody.8_powerpc.deb
heimdal (0.4e-7.woody.8) stable-security; urgency=medium
  * Non-maintainer upload by the Security Team
  * Added special detection routine for big/little endianess on MIPS since
    the line "byteorder : {big|little} endian" from /proc/cpuinfo was
    removed as of Linux 2.4.20, resulting in the mipsel buildd being
    unable to build this package. (032_autotools_mips)


stable/non-US/main/binary-mipsel/heimdal-clients_0.4e-7.woody.8_mipsel.deb
stable/non-US/main/binary-mipsel/libss0-heimdal_0.4e-7.woody.8_mipsel.deb
stable/non-US/main/binary-mipsel/libkrb5-17-heimdal_0.4e-7.woody.8_mipsel.deb
stable/non-US/main/binary-mipsel/libroken9-heimdal_0.4e-7.woody.8_mipsel.deb
stable/non-US/main/binary-mipsel/libhdb7-heimdal_0.4e-7.woody.8_mipsel.deb
stable/non-US/main/binary-mipsel/libgssapi1-heimdal_0.4e-7.woody.8_mipsel.deb
stable/non-US/main/binary-mipsel/libkadm5srv7-heimdal_0.4e-7.woody.8_mipsel.deb
stable/non-US/main/binary-mipsel/heimdal-servers_0.4e-7.woody.8_mipsel.deb
stable/non-US/main/binary-mipsel/libkafs0-heimdal_0.4e-7.woody.8_mipsel.deb
stable/non-US/main/binary-mipsel/libsl0-heimdal_0.4e-7.woody.8_mipsel.deb
stable/non-US/main/binary-mipsel/heimdal-kdc_0.4e-7.woody.8_mipsel.deb
stable/non-US/main/binary-mipsel/heimdal-clients-x_0.4e-7.woody.8_mipsel.deb
stable/non-US/main/binary-mipsel/libotp0-heimdal_0.4e-7.woody.8_mipsel.deb
stable/non-US/main/binary-mipsel/heimdal-dev_0.4e-7.woody.8_mipsel.deb
stable/non-US/main/binary-mipsel/heimdal-servers-x_0.4e-7.woody.8_mipsel.deb
stable/non-US/main/binary-mipsel/libkadm5clnt4-heimdal_0.4e-7.woody.8_mipsel.deb
stable/non-US/main/binary-mipsel/libcomerr1-heimdal_0.4e-7.woody.8_mipsel.deb
stable/non-US/main/binary-mipsel/libasn1-5-heimdal_0.4e-7.woody.8_mipsel.deb
heimdal (0.4e-7.woody.8) stable-security; urgency=medium
  * Non-maintainer upload by the Security Team
  * Added special detection routine for big/little endianess on MIPS since
    the line "byteorder : {big|little} endian" from /proc/cpuinfo was
    removed as of Linux 2.4.20, resulting in the mipsel buildd being
    unable to build this package. (032_autotools_mips)


stable/non-US/main/binary-mips/libotp0-heimdal_0.4e-7.woody.8_mips.deb
stable/non-US/main/binary-mips/libasn1-5-heimdal_0.4e-7.woody.8_mips.deb
stable/non-US/main/binary-mips/libkrb5-17-heimdal_0.4e-7.woody.8_mips.deb
stable/non-US/main/binary-mips/libsl0-heimdal_0.4e-7.woody.8_mips.deb
stable/non-US/main/binary-mips/heimdal-clients_0.4e-7.woody.8_mips.deb
stable/non-US/main/binary-mips/libroken9-heimdal_0.4e-7.woody.8_mips.deb
stable/non-US/main/binary-mips/libcomerr1-heimdal_0.4e-7.woody.8_mips.deb
stable/non-US/main/binary-mips/libkadm5clnt4-heimdal_0.4e-7.woody.8_mips.deb
stable/non-US/main/binary-mips/heimdal-clients-x_0.4e-7.woody.8_mips.deb
stable/non-US/main/binary-mips/heimdal-kdc_0.4e-7.woody.8_mips.deb
stable/non-US/main/binary-mips/libkadm5srv7-heimdal_0.4e-7.woody.8_mips.deb
stable/non-US/main/binary-mips/heimdal-servers-x_0.4e-7.woody.8_mips.deb
stable/non-US/main/binary-mips/libkafs0-heimdal_0.4e-7.woody.8_mips.deb
stable/non-US/main/binary-mips/libgssapi1-heimdal_0.4e-7.woody.8_mips.deb
stable/non-US/main/binary-mips/libss0-heimdal_0.4e-7.woody.8_mips.deb
stable/non-US/main/binary-mips/heimdal-servers_0.4e-7.woody.8_mips.deb
stable/non-US/main/binary-mips/heimdal-dev_0.4e-7.woody.8_mips.deb
stable/non-US/main/binary-mips/libhdb7-heimdal_0.4e-7.woody.8_mips.deb
heimdal (0.4e-7.woody.8) stable-security; urgency=medium
  * Non-maintainer upload by the Security Team
  * Added special detection routine for big/little endianess on MIPS since
    the line "byteorder : {big|little} endian" from /proc/cpuinfo was
    removed as of Linux 2.4.20, resulting in the mipsel buildd being
    unable to build this package. (032_autotools_mips)


stable/non-US/main/binary-m68k/libcomerr1-heimdal_0.4e-7.woody.8_m68k.deb
stable/non-US/main/binary-m68k/libasn1-5-heimdal_0.4e-7.woody.8_m68k.deb
stable/non-US/main/binary-m68k/heimdal-servers-x_0.4e-7.woody.8_m68k.deb
stable/non-US/main/binary-m68k/heimdal-clients_0.4e-7.woody.8_m68k.deb
stable/non-US/main/binary-m68k/libroken9-heimdal_0.4e-7.woody.8_m68k.deb
stable/non-US/main/binary-m68k/libkadm5clnt4-heimdal_0.4e-7.woody.8_m68k.deb
stable/non-US/main/binary-m68k/libkrb5-17-heimdal_0.4e-7.woody.8_m68k.deb
stable/non-US/main/binary-m68k/heimdal-kdc_0.4e-7.woody.8_m68k.deb
stable/non-US/main/binary-m68k/libkadm5srv7-heimdal_0.4e-7.woody.8_m68k.deb
stable/non-US/main/binary-m68k/heimdal-dev_0.4e-7.woody.8_m68k.deb
stable/non-US/main/binary-m68k/heimdal-servers_0.4e-7.woody.8_m68k.deb
stable/non-US/main/binary-m68k/libkafs0-heimdal_0.4e-7.woody.8_m68k.deb
stable/non-US/main/binary-m68k/libgssapi1-heimdal_0.4e-7.woody.8_m68k.deb
stable/non-US/main/binary-m68k/libsl0-heimdal_0.4e-7.woody.8_m68k.deb
stable/non-US/main/binary-m68k/libotp0-heimdal_0.4e-7.woody.8_m68k.deb
stable/non-US/main/binary-m68k/libhdb7-heimdal_0.4e-7.woody.8_m68k.deb
stable/non-US/main/binary-m68k/heimdal-clients-x_0.4e-7.woody.8_m68k.deb
stable/non-US/main/binary-m68k/libss0-heimdal_0.4e-7.woody.8_m68k.deb
heimdal (0.4e-7.woody.8) stable-security; urgency=medium
  * Non-maintainer upload by the Security Team
  * Added special detection routine for big/little endianess on MIPS since
    the line "byteorder : {big|little} endian" from /proc/cpuinfo was
    removed as of Linux 2.4.20, resulting in the mipsel buildd being
    unable to build this package. (032_autotools_mips)


stable/non-US/main/binary-ia64/heimdal-clients_0.4e-7.woody.8_ia64.deb
stable/non-US/main/binary-ia64/libkafs0-heimdal_0.4e-7.woody.8_ia64.deb
stable/non-US/main/binary-ia64/heimdal-servers-x_0.4e-7.woody.8_ia64.deb
stable/non-US/main/binary-ia64/libss0-heimdal_0.4e-7.woody.8_ia64.deb
stable/non-US/main/binary-ia64/heimdal-clients-x_0.4e-7.woody.8_ia64.deb
stable/non-US/main/binary-ia64/libotp0-heimdal_0.4e-7.woody.8_ia64.deb
stable/non-US/main/binary-ia64/libcomerr1-heimdal_0.4e-7.woody.8_ia64.deb
stable/non-US/main/binary-ia64/libsl0-heimdal_0.4e-7.woody.8_ia64.deb
stable/non-US/main/binary-ia64/libkadm5clnt4-heimdal_0.4e-7.woody.8_ia64.deb
stable/non-US/main/binary-ia64/libkadm5srv7-heimdal_0.4e-7.woody.8_ia64.deb
stable/non-US/main/binary-ia64/heimdal-dev_0.4e-7.woody.8_ia64.deb
stable/non-US/main/binary-ia64/heimdal-kdc_0.4e-7.woody.8_ia64.deb
stable/non-US/main/binary-ia64/libkrb5-17-heimdal_0.4e-7.woody.8_ia64.deb
stable/non-US/main/binary-ia64/libasn1-5-heimdal_0.4e-7.woody.8_ia64.deb
stable/non-US/main/binary-ia64/libgssapi1-heimdal_0.4e-7.woody.8_ia64.deb
stable/non-US/main/binary-ia64/libroken9-heimdal_0.4e-7.woody.8_ia64.deb
stable/non-US/main/binary-ia64/libhdb7-heimdal_0.4e-7.woody.8_ia64.deb
stable/non-US/main/binary-ia64/heimdal-servers_0.4e-7.woody.8_ia64.deb
heimdal (0.4e-7.woody.8) stable-security; urgency=medium
  * Non-maintainer upload by the Security Team
  * Added special detection routine for big/little endianess on MIPS since
    the line "byteorder : {big|little} endian" from /proc/cpuinfo was
    removed as of Linux 2.4.20, resulting in the mipsel buildd being
    unable to build this package. (032_autotools_mips)


stable/non-US/main/binary-i386/libss0-heimdal_0.4e-7.woody.8_i386.deb
stable/non-US/main/binary-i386/libkadm5clnt4-heimdal_0.4e-7.woody.8_i386.deb
stable/non-US/main/binary-i386/libcomerr1-heimdal_0.4e-7.woody.8_i386.deb
stable/non-US/main/binary-i386/libotp0-heimdal_0.4e-7.woody.8_i386.deb
stable/non-US/main/binary-i386/heimdal-clients-x_0.4e-7.woody.8_i386.deb
stable/non-US/main/binary-i386/libroken9-heimdal_0.4e-7.woody.8_i386.deb
stable/non-US/main/binary-i386/libasn1-5-heimdal_0.4e-7.woody.8_i386.deb
stable/non-US/main/binary-i386/heimdal-kdc_0.4e-7.woody.8_i386.deb
stable/non-US/main/binary-i386/heimdal-dev_0.4e-7.woody.8_i386.deb
stable/non-US/main/binary-i386/heimdal-servers_0.4e-7.woody.8_i386.deb
stable/non-US/main/binary-i386/libkadm5srv7-heimdal_0.4e-7.woody.8_i386.deb
stable/non-US/main/binary-i386/libhdb7-heimdal_0.4e-7.woody.8_i386.deb
stable/non-US/main/binary-i386/libgssapi1-heimdal_0.4e-7.woody.8_i386.deb
stable/non-US/main/binary-i386/libsl0-heimdal_0.4e-7.woody.8_i386.deb
stable/non-US/main/binary-i386/libkrb5-17-heimdal_0.4e-7.woody.8_i386.deb
stable/non-US/main/binary-i386/heimdal-clients_0.4e-7.woody.8_i386.deb
stable/non-US/main/binary-i386/heimdal-servers-x_0.4e-7.woody.8_i386.deb
stable/non-US/main/binary-i386/libkafs0-heimdal_0.4e-7.woody.8_i386.deb
heimdal (0.4e-7.woody.8) stable-security; urgency=medium
  * Non-maintainer upload by the Security Team
  * Added special detection routine for big/little endianess on MIPS since
    the line "byteorder : {big|little} endian" from /proc/cpuinfo was
    removed as of Linux 2.4.20, resulting in the mipsel buildd being
    unable to build this package. (032_autotools_mips)


stable/non-US/main/binary-hppa/libhdb7-heimdal_0.4e-7.woody.8_hppa.deb
stable/non-US/main/binary-hppa/heimdal-dev_0.4e-7.woody.8_hppa.deb
stable/non-US/main/binary-hppa/libroken9-heimdal_0.4e-7.woody.8_hppa.deb
stable/non-US/main/binary-hppa/libkadm5srv7-heimdal_0.4e-7.woody.8_hppa.deb
stable/non-US/main/binary-hppa/libkadm5clnt4-heimdal_0.4e-7.woody.8_hppa.deb
stable/non-US/main/binary-hppa/libasn1-5-heimdal_0.4e-7.woody.8_hppa.deb
stable/non-US/main/binary-hppa/libsl0-heimdal_0.4e-7.woody.8_hppa.deb
stable/non-US/main/binary-hppa/heimdal-servers-x_0.4e-7.woody.8_hppa.deb
stable/non-US/main/binary-hppa/libcomerr1-heimdal_0.4e-7.woody.8_hppa.deb
stable/non-US/main/binary-hppa/libotp0-heimdal_0.4e-7.woody.8_hppa.deb
stable/non-US/main/binary-hppa/libgssapi1-heimdal_0.4e-7.woody.8_hppa.deb
stable/non-US/main/binary-hppa/libss0-heimdal_0.4e-7.woody.8_hppa.deb
stable/non-US/main/binary-hppa/heimdal-clients-x_0.4e-7.woody.8_hppa.deb
stable/non-US/main/binary-hppa/heimdal-servers_0.4e-7.woody.8_hppa.deb
stable/non-US/main/binary-hppa/libkrb5-17-heimdal_0.4e-7.woody.8_hppa.deb
stable/non-US/main/binary-hppa/heimdal-kdc_0.4e-7.woody.8_hppa.deb
stable/non-US/main/binary-hppa/libkafs0-heimdal_0.4e-7.woody.8_hppa.deb
stable/non-US/main/binary-hppa/heimdal-clients_0.4e-7.woody.8_hppa.deb
heimdal (0.4e-7.woody.8) stable-security; urgency=medium
  * Non-maintainer upload by the Security Team
  * Added special detection routine for big/little endianess on MIPS since
    the line "byteorder : {big|little} endian" from /proc/cpuinfo was
    removed as of Linux 2.4.20, resulting in the mipsel buildd being
    unable to build this package. (032_autotools_mips)


stable/non-US/main/binary-arm/libgssapi1-heimdal_0.4e-7.woody.8_arm.deb
stable/non-US/main/binary-arm/libkadm5clnt4-heimdal_0.4e-7.woody.8_arm.deb
stable/non-US/main/binary-arm/libroken9-heimdal_0.4e-7.woody.8_arm.deb
stable/non-US/main/binary-arm/libcomerr1-heimdal_0.4e-7.woody.8_arm.deb
stable/non-US/main/binary-arm/libasn1-5-heimdal_0.4e-7.woody.8_arm.deb
stable/non-US/main/binary-arm/libss0-heimdal_0.4e-7.woody.8_arm.deb
stable/non-US/main/binary-arm/libsl0-heimdal_0.4e-7.woody.8_arm.deb
stable/non-US/main/binary-arm/libhdb7-heimdal_0.4e-7.woody.8_arm.deb
stable/non-US/main/binary-arm/heimdal-servers-x_0.4e-7.woody.8_arm.deb
stable/non-US/main/binary-arm/heimdal-servers_0.4e-7.woody.8_arm.deb
stable/non-US/main/binary-arm/libkafs0-heimdal_0.4e-7.woody.8_arm.deb
stable/non-US/main/binary-arm/heimdal-clients-x_0.4e-7.woody.8_arm.deb
stable/non-US/main/binary-arm/heimdal-clients_0.4e-7.woody.8_arm.deb
stable/non-US/main/binary-arm/heimdal-dev_0.4e-7.woody.8_arm.deb
stable/non-US/main/binary-arm/libotp0-heimdal_0.4e-7.woody.8_arm.deb
stable/non-US/main/binary-arm/heimdal-kdc_0.4e-7.woody.8_arm.deb
stable/non-US/main/binary-arm/libkadm5srv7-heimdal_0.4e-7.woody.8_arm.deb
stable/non-US/main/binary-arm/libkrb5-17-heimdal_0.4e-7.woody.8_arm.deb
heimdal (0.4e-7.woody.8) stable-security; urgency=medium
  * Non-maintainer upload by the Security Team
  * Added special detection routine for big/little endianess on MIPS since
    the line "byteorder : {big|little} endian" from /proc/cpuinfo was
    removed as of Linux 2.4.20, resulting in the mipsel buildd being
    unable to build this package. (032_autotools_mips)


stable/non-US/main/binary-alpha/libkrb5-17-heimdal_0.4e-7.woody.8_alpha.deb
stable/non-US/main/binary-alpha/heimdal-kdc_0.4e-7.woody.8_alpha.deb
stable/non-US/main/binary-alpha/heimdal-clients_0.4e-7.woody.8_alpha.deb
stable/non-US/main/binary-alpha/libasn1-5-heimdal_0.4e-7.woody.8_alpha.deb
stable/non-US/main/binary-alpha/heimdal-servers-x_0.4e-7.woody.8_alpha.deb
stable/non-US/main/binary-alpha/libsl0-heimdal_0.4e-7.woody.8_alpha.deb
stable/non-US/main/binary-alpha/libhdb7-heimdal_0.4e-7.woody.8_alpha.deb
stable/non-US/main/binary-alpha/libss0-heimdal_0.4e-7.woody.8_alpha.deb
stable/non-US/main/binary-alpha/libroken9-heimdal_0.4e-7.woody.8_alpha.deb
stable/non-US/main/binary-alpha/libkadm5srv7-heimdal_0.4e-7.woody.8_alpha.deb
stable/non-US/main/binary-alpha/libcomerr1-heimdal_0.4e-7.woody.8_alpha.deb
stable/non-US/main/binary-alpha/libotp0-heimdal_0.4e-7.woody.8_alpha.deb
stable/non-US/main/binary-alpha/libgssapi1-heimdal_0.4e-7.woody.8_alpha.deb
stable/non-US/main/binary-alpha/heimdal-dev_0.4e-7.woody.8_alpha.deb
stable/non-US/main/binary-alpha/heimdal-servers_0.4e-7.woody.8_alpha.deb
stable/non-US/main/binary-alpha/libkafs0-heimdal_0.4e-7.woody.8_alpha.deb
stable/non-US/main/binary-alpha/heimdal-clients-x_0.4e-7.woody.8_alpha.deb
stable/non-US/main/binary-alpha/libkadm5clnt4-heimdal_0.4e-7.woody.8_alpha.deb
heimdal (0.4e-7.woody.8) stable-security; urgency=medium
  * Non-maintainer upload by the Security Team
  * Added special detection routine for big/little endianess on MIPS since
    the line "byteorder : {big|little} endian" from /proc/cpuinfo was
    removed as of Linux 2.4.20, resulting in the mipsel buildd being
    unable to build this package. (032_autotools_mips)


stable/non-US/main/binary-sparc/heimdal-kdc_0.4e-7.woody.8_sparc.deb
stable/non-US/main/binary-sparc/libroken9-heimdal_0.4e-7.woody.8_sparc.deb
stable/non-US/main/binary-sparc/heimdal-dev_0.4e-7.woody.8_sparc.deb
stable/non-US/main/binary-sparc/libotp0-heimdal_0.4e-7.woody.8_sparc.deb
stable/non-US/main/binary-sparc/heimdal-servers_0.4e-7.woody.8_sparc.deb
stable/non-US/main/binary-sparc/heimdal-clients-x_0.4e-7.woody.8_sparc.deb
stable/non-US/main/binary-sparc/heimdal-clients_0.4e-7.woody.8_sparc.deb
stable/non-US/main/binary-sparc/heimdal-servers-x_0.4e-7.woody.8_sparc.deb
stable/non-US/main/source/heimdal_0.4e-7.woody.8.dsc
stable/non-US/main/binary-sparc/libkadm5clnt4-heimdal_0.4e-7.woody.8_sparc.deb
stable/non-US/main/binary-sparc/libcomerr1-heimdal_0.4e-7.woody.8_sparc.deb
stable/non-US/main/binary-all/heimdal-lib_0.4e-7.woody.8_all.deb
stable/non-US/main/binary-sparc/libasn1-5-heimdal_0.4e-7.woody.8_sparc.deb
stable/non-US/main/binary-sparc/libkadm5srv7-heimdal_0.4e-7.woody.8_sparc.deb
stable/non-US/main/source/heimdal_0.4e-7.woody.8.diff.gz
stable/non-US/main/binary-sparc/libkrb5-17-heimdal_0.4e-7.woody.8_sparc.deb
stable/non-US/main/binary-sparc/libsl0-heimdal_0.4e-7.woody.8_sparc.deb
stable/non-US/main/binary-sparc/libkafs0-heimdal_0.4e-7.woody.8_sparc.deb
stable/non-US/main/binary-sparc/libhdb7-heimdal_0.4e-7.woody.8_sparc.deb
stable/non-US/main/binary-all/heimdal-docs_0.4e-7.woody.8_all.deb
stable/non-US/main/binary-sparc/libgssapi1-heimdal_0.4e-7.woody.8_sparc.deb
stable/non-US/main/binary-sparc/libss0-heimdal_0.4e-7.woody.8_sparc.deb
heimdal (0.4e-7.woody.8) stable-security; urgency=medium
  * Non-maintainer upload by the Security Team
  * Added special detection routine for big/little endianess on MIPS since
    the line "byteorder : {big|little} endian" from /proc/cpuinfo was
    removed as of Linux 2.4.20, resulting in the mipsel buildd being
    unable to build this package. (032_autotools_mips)


stable/non-US/main/binary-s390/courier-imap-ssl_1.4.3-3.3_s390.deb
stable/non-US/main/binary-s390/courier-pop-ssl_0.37.3-3.3_s390.deb
stable/non-US/main/binary-s390/courier-authpostgresql_0.37.3-3.3_s390.deb
stable/non-US/main/binary-s390/courier-ssl_0.37.3-3.3_s390.deb
stable/non-US/main/binary-s390/courier-mta-ssl_0.37.3-3.3_s390.deb
courier-ssl (0.37.3-3.3) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Added special detection routine for big/little endianess on MIPS since
    the line "byteorder : {big|little} endian" from /proc/cpuinfo was
    removed as of Linux 2.4.20, resulting in the mipsel buildd being
    unable to build this package.


stable/non-US/main/binary-powerpc/courier-ssl_0.37.3-3.3_powerpc.deb
stable/non-US/main/binary-powerpc/courier-mta-ssl_0.37.3-3.3_powerpc.deb
stable/non-US/main/binary-powerpc/courier-pop-ssl_0.37.3-3.3_powerpc.deb
stable/non-US/main/binary-powerpc/courier-authpostgresql_0.37.3-3.3_powerpc.deb
stable/non-US/main/binary-powerpc/courier-imap-ssl_1.4.3-3.3_powerpc.deb
courier-ssl (0.37.3-3.3) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Added special detection routine for big/little endianess on MIPS since
    the line "byteorder : {big|little} endian" from /proc/cpuinfo was
    removed as of Linux 2.4.20, resulting in the mipsel buildd being
    unable to build this package.


stable/non-US/main/binary-mipsel/courier-imap-ssl_1.4.3-3.3_mipsel.deb
stable/non-US/main/binary-mipsel/courier-ssl_0.37.3-3.3_mipsel.deb
stable/non-US/main/binary-mipsel/courier-mta-ssl_0.37.3-3.3_mipsel.deb
stable/non-US/main/binary-mipsel/courier-authpostgresql_0.37.3-3.3_mipsel.deb
stable/non-US/main/binary-mipsel/courier-pop-ssl_0.37.3-3.3_mipsel.deb
courier-ssl (0.37.3-3.3) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Added special detection routine for big/little endianess on MIPS since
    the line "byteorder : {big|little} endian" from /proc/cpuinfo was
    removed as of Linux 2.4.20, resulting in the mipsel buildd being
    unable to build this package.


stable/non-US/main/binary-mips/courier-ssl_0.37.3-3.3_mips.deb
stable/non-US/main/binary-mips/courier-pop-ssl_0.37.3-3.3_mips.deb
stable/non-US/main/binary-mips/courier-authpostgresql_0.37.3-3.3_mips.deb
stable/non-US/main/binary-mips/courier-imap-ssl_1.4.3-3.3_mips.deb
stable/non-US/main/binary-mips/courier-mta-ssl_0.37.3-3.3_mips.deb
courier-ssl (0.37.3-3.3) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Added special detection routine for big/little endianess on MIPS since
    the line "byteorder : {big|little} endian" from /proc/cpuinfo was
    removed as of Linux 2.4.20, resulting in the mipsel buildd being
    unable to build this package.


stable/non-US/main/binary-m68k/courier-authpostgresql_0.37.3-3.3_m68k.deb
stable/non-US/main/binary-m68k/courier-pop-ssl_0.37.3-3.3_m68k.deb
stable/non-US/main/binary-m68k/courier-ssl_0.37.3-3.3_m68k.deb
stable/non-US/main/binary-m68k/courier-mta-ssl_0.37.3-3.3_m68k.deb
stable/non-US/main/binary-m68k/courier-imap-ssl_1.4.3-3.3_m68k.deb
courier-ssl (0.37.3-3.3) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Added special detection routine for big/little endianess on MIPS since
    the line "byteorder : {big|little} endian" from /proc/cpuinfo was
    removed as of Linux 2.4.20, resulting in the mipsel buildd being
    unable to build this package.


stable/non-US/main/binary-ia64/courier-imap-ssl_1.4.3-3.3_ia64.deb
stable/non-US/main/binary-ia64/courier-ssl_0.37.3-3.3_ia64.deb
stable/non-US/main/binary-ia64/courier-authpostgresql_0.37.3-3.3_ia64.deb
stable/non-US/main/binary-ia64/courier-pop-ssl_0.37.3-3.3_ia64.deb
stable/non-US/main/binary-ia64/courier-mta-ssl_0.37.3-3.3_ia64.deb
courier-ssl (0.37.3-3.3) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Added special detection routine for big/little endianess on MIPS since
    the line "byteorder : {big|little} endian" from /proc/cpuinfo was
    removed as of Linux 2.4.20, resulting in the mipsel buildd being
    unable to build this package.


stable/non-US/main/binary-i386/courier-mta-ssl_0.37.3-3.3_i386.deb
stable/non-US/main/binary-i386/courier-imap-ssl_1.4.3-3.3_i386.deb
stable/non-US/main/binary-i386/courier-authpostgresql_0.37.3-3.3_i386.deb
stable/non-US/main/binary-i386/courier-pop-ssl_0.37.3-3.3_i386.deb
stable/non-US/main/binary-i386/courier-ssl_0.37.3-3.3_i386.deb
courier-ssl (0.37.3-3.3) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Added special detection routine for big/little endianess on MIPS since
    the line "byteorder : {big|little} endian" from /proc/cpuinfo was
    removed as of Linux 2.4.20, resulting in the mipsel buildd being
    unable to build this package.


stable/non-US/main/binary-hppa/courier-ssl_0.37.3-3.3_hppa.deb
stable/non-US/main/binary-hppa/courier-imap-ssl_1.4.3-3.3_hppa.deb
stable/non-US/main/binary-hppa/courier-mta-ssl_0.37.3-3.3_hppa.deb
stable/non-US/main/binary-hppa/courier-pop-ssl_0.37.3-3.3_hppa.deb
stable/non-US/main/binary-hppa/courier-authpostgresql_0.37.3-3.3_hppa.deb
courier-ssl (0.37.3-3.3) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Added special detection routine for big/little endianess on MIPS since
    the line "byteorder : {big|little} endian" from /proc/cpuinfo was
    removed as of Linux 2.4.20, resulting in the mipsel buildd being
    unable to build this package.


stable/non-US/main/binary-arm/courier-mta-ssl_0.37.3-3.3_arm.deb
stable/non-US/main/binary-arm/courier-imap-ssl_1.4.3-3.3_arm.deb
stable/non-US/main/binary-arm/courier-pop-ssl_0.37.3-3.3_arm.deb
stable/non-US/main/binary-arm/courier-ssl_0.37.3-3.3_arm.deb
stable/non-US/main/binary-arm/courier-authpostgresql_0.37.3-3.3_arm.deb
courier-ssl (0.37.3-3.3) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Added special detection routine for big/little endianess on MIPS since
    the line "byteorder : {big|little} endian" from /proc/cpuinfo was
    removed as of Linux 2.4.20, resulting in the mipsel buildd being
    unable to build this package.


stable/non-US/main/binary-alpha/courier-mta-ssl_0.37.3-3.3_alpha.deb
stable/non-US/main/binary-alpha/courier-authpostgresql_0.37.3-3.3_alpha.deb
stable/non-US/main/binary-alpha/courier-pop-ssl_0.37.3-3.3_alpha.deb
stable/non-US/main/binary-alpha/courier-imap-ssl_1.4.3-3.3_alpha.deb
stable/non-US/main/binary-alpha/courier-ssl_0.37.3-3.3_alpha.deb
courier-ssl (0.37.3-3.3) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Added special detection routine for big/little endianess on MIPS since
    the line "byteorder : {big|little} endian" from /proc/cpuinfo was
    removed as of Linux 2.4.20, resulting in the mipsel buildd being
    unable to build this package.


stable/non-US/main/binary-sparc/courier-imap-ssl_1.4.3-3.3_sparc.deb
stable/non-US/main/binary-sparc/courier-authpostgresql_0.37.3-3.3_sparc.deb
stable/non-US/main/binary-sparc/courier-mta-ssl_0.37.3-3.3_sparc.deb
stable/non-US/main/binary-sparc/courier-ssl_0.37.3-3.3_sparc.deb
stable/non-US/main/source/courier-ssl_0.37.3-3.3.dsc
stable/non-US/main/binary-sparc/courier-pop-ssl_0.37.3-3.3_sparc.deb
stable/non-US/main/source/courier-ssl_0.37.3-3.3.diff.gz
courier-ssl (0.37.3-3.3) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Added special detection routine for big/little endianess on MIPS since
    the line "byteorder : {big|little} endian" from /proc/cpuinfo was
    removed as of Linux 2.4.20, resulting in the mipsel buildd being
    unable to build this package.


=========================================
Thu,  20 Nov 2003 - Debian 3.0r2 released
=========================================

stable/non-US/main/binary-sparc/python-pgsql_2.0-3.2_sparc.deb
stable/non-US/main/binary-sparc/python2.1-pgsql_2.0-3.2_sparc.deb
stable/non-US/main/binary-sparc/python2.2-pgsql_2.0-3.2_sparc.deb
python-pgsql (2.0-3.2) stable; urgency=high
  * When calculating how much memory to allocate for the new string in
    libPQquoteBytea():
      - Do not recalculate the string length using strlen().  We already
        have the string length stored in slen, and since the string may
        contain null bytes, using strlen() may return incorrect results.
        This in turn can lead to the unexpected truncation of binary data
        and subsequent data loss.
      - Allocate up to 5 bytes per character (not 4).  Each null byte in
        the original string is converted to '\\000', and so allocating just
        4 bytes per character can lead to a segfault if the input string
        contains lots of null bytes.
    These patches are taken directly from upstream CVS and are already
    incorporated into newer upstream releases.
    Closes: #204342


stable/non-US/main/binary-s390/python2.1-pgsql_2.0-3.2_s390.deb
stable/non-US/main/binary-s390/python-pgsql_2.0-3.2_s390.deb
stable/non-US/main/binary-s390/python2.2-pgsql_2.0-3.2_s390.deb
python-pgsql (2.0-3.2) stable; urgency=high
  * When calculating how much memory to allocate for the new string in
    libPQquoteBytea():
      - Do not recalculate the string length using strlen().  We already
        have the string length stored in slen, and since the string may
        contain null bytes, using strlen() may return incorrect results.
        This in turn can lead to the unexpected truncation of binary data
        and subsequent data loss.
      - Allocate up to 5 bytes per character (not 4).  Each null byte in
        the original string is converted to '\\000', and so allocating just
        4 bytes per character can lead to a segfault if the input string
        contains lots of null bytes.
    These patches are taken directly from upstream CVS and are already
    incorporated into newer upstream releases.
    Closes: #204342


stable/non-US/main/binary-powerpc/python2.1-pgsql_2.0-3.2_powerpc.deb
stable/non-US/main/binary-powerpc/python-pgsql_2.0-3.2_powerpc.deb
stable/non-US/main/binary-powerpc/python2.2-pgsql_2.0-3.2_powerpc.deb
python-pgsql (2.0-3.2) stable; urgency=high
  * When calculating how much memory to allocate for the new string in
    libPQquoteBytea():
      - Do not recalculate the string length using strlen().  We already
        have the string length stored in slen, and since the string may
        contain null bytes, using strlen() may return incorrect results.
        This in turn can lead to the unexpected truncation of binary data
        and subsequent data loss.
      - Allocate up to 5 bytes per character (not 4).  Each null byte in
        the original string is converted to '\\000', and so allocating just
        4 bytes per character can lead to a segfault if the input string
        contains lots of null bytes.
    These patches are taken directly from upstream CVS and are already
    incorporated into newer upstream releases.
    Closes: #204342


stable/non-US/main/binary-mipsel/python-pgsql_2.0-3.2_mipsel.deb
stable/non-US/main/binary-mipsel/python2.2-pgsql_2.0-3.2_mipsel.deb
stable/non-US/main/binary-mipsel/python2.1-pgsql_2.0-3.2_mipsel.deb
python-pgsql (2.0-3.2) stable; urgency=high
  * When calculating how much memory to allocate for the new string in
    libPQquoteBytea():
      - Do not recalculate the string length using strlen().  We already
        have the string length stored in slen, and since the string may
        contain null bytes, using strlen() may return incorrect results.
        This in turn can lead to the unexpected truncation of binary data
        and subsequent data loss.
      - Allocate up to 5 bytes per character (not 4).  Each null byte in
        the original string is converted to '\\000', and so allocating just
        4 bytes per character can lead to a segfault if the input string
        contains lots of null bytes.
    These patches are taken directly from upstream CVS and are already
    incorporated into newer upstream releases.
    Closes: #204342


stable/non-US/main/binary-mips/python2.2-pgsql_2.0-3.2_mips.deb
stable/non-US/main/binary-mips/python-pgsql_2.0-3.2_mips.deb
stable/non-US/main/binary-mips/python2.1-pgsql_2.0-3.2_mips.deb
python-pgsql (2.0-3.2) stable; urgency=high
  * When calculating how much memory to allocate for the new string in
    libPQquoteBytea():
      - Do not recalculate the string length using strlen().  We already
        have the string length stored in slen, and since the string may
        contain null bytes, using strlen() may return incorrect results.
        This in turn can lead to the unexpected truncation of binary data
        and subsequent data loss.
      - Allocate up to 5 bytes per character (not 4).  Each null byte in
        the original string is converted to '\\000', and so allocating just
        4 bytes per character can lead to a segfault if the input string
        contains lots of null bytes.
    These patches are taken directly from upstream CVS and are already
    incorporated into newer upstream releases.
    Closes: #204342


stable/non-US/main/binary-m68k/python2.2-pgsql_2.0-3.2_m68k.deb
stable/non-US/main/binary-m68k/python2.1-pgsql_2.0-3.2_m68k.deb
stable/non-US/main/binary-m68k/python-pgsql_2.0-3.2_m68k.deb
python-pgsql (2.0-3.2) stable; urgency=high
  * When calculating how much memory to allocate for the new string in
    libPQquoteBytea():
      - Do not recalculate the string length using strlen().  We already
        have the string length stored in slen, and since the string may
        contain null bytes, using strlen() may return incorrect results.
        This in turn can lead to the unexpected truncation of binary data
        and subsequent data loss.
      - Allocate up to 5 bytes per character (not 4).  Each null byte in
        the original string is converted to '\\000', and so allocating just
        4 bytes per character can lead to a segfault if the input string
        contains lots of null bytes.
    These patches are taken directly from upstream CVS and are already
    incorporated into newer upstream releases.
    Closes: #204342


stable/non-US/main/binary-ia64/python2.2-pgsql_2.0-3.2_ia64.deb
stable/non-US/main/binary-ia64/python2.1-pgsql_2.0-3.2_ia64.deb
stable/non-US/main/binary-ia64/python-pgsql_2.0-3.2_ia64.deb
python-pgsql (2.0-3.2) stable; urgency=high
  * When calculating how much memory to allocate for the new string in
    libPQquoteBytea():
      - Do not recalculate the string length using strlen().  We already
        have the string length stored in slen, and since the string may
        contain null bytes, using strlen() may return incorrect results.
        This in turn can lead to the unexpected truncation of binary data
        and subsequent data loss.
      - Allocate up to 5 bytes per character (not 4).  Each null byte in
        the original string is converted to '\\000', and so allocating just
        4 bytes per character can lead to a segfault if the input string
        contains lots of null bytes.
    These patches are taken directly from upstream CVS and are already
    incorporated into newer upstream releases.
    Closes: #204342


stable/non-US/main/binary-hppa/python-pgsql_2.0-3.2_hppa.deb
stable/non-US/main/binary-hppa/python2.1-pgsql_2.0-3.2_hppa.deb
stable/non-US/main/binary-hppa/python2.2-pgsql_2.0-3.2_hppa.deb
python-pgsql (2.0-3.2) stable; urgency=high
  * When calculating how much memory to allocate for the new string in
    libPQquoteBytea():
      - Do not recalculate the string length using strlen().  We already
        have the string length stored in slen, and since the string may
        contain null bytes, using strlen() may return incorrect results.
        This in turn can lead to the unexpected truncation of binary data
        and subsequent data loss.
      - Allocate up to 5 bytes per character (not 4).  Each null byte in
        the original string is converted to '\\000', and so allocating just
        4 bytes per character can lead to a segfault if the input string
        contains lots of null bytes.
    These patches are taken directly from upstream CVS and are already
    incorporated into newer upstream releases.
    Closes: #204342


stable/non-US/main/binary-arm/python-pgsql_2.0-3.2_arm.deb
stable/non-US/main/binary-arm/python2.2-pgsql_2.0-3.2_arm.deb
stable/non-US/main/binary-arm/python2.1-pgsql_2.0-3.2_arm.deb
python-pgsql (2.0-3.2) stable; urgency=high
  * When calculating how much memory to allocate for the new string in
    libPQquoteBytea():
      - Do not recalculate the string length using strlen().  We already
        have the string length stored in slen, and since the string may
        contain null bytes, using strlen() may return incorrect results.
        This in turn can lead to the unexpected truncation of binary data
        and subsequent data loss.
      - Allocate up to 5 bytes per character (not 4).  Each null byte in
        the original string is converted to '\\000', and so allocating just
        4 bytes per character can lead to a segfault if the input string
        contains lots of null bytes.
    These patches are taken directly from upstream CVS and are already
    incorporated into newer upstream releases.
    Closes: #204342


stable/non-US/main/binary-alpha/python2.1-pgsql_2.0-3.2_alpha.deb
stable/non-US/main/binary-alpha/python2.2-pgsql_2.0-3.2_alpha.deb
stable/non-US/main/binary-alpha/python-pgsql_2.0-3.2_alpha.deb
python-pgsql (2.0-3.2) stable; urgency=high
  * When calculating how much memory to allocate for the new string in
    libPQquoteBytea():
      - Do not recalculate the string length using strlen().  We already
        have the string length stored in slen, and since the string may
        contain null bytes, using strlen() may return incorrect results.
        This in turn can lead to the unexpected truncation of binary data
        and subsequent data loss.
      - Allocate up to 5 bytes per character (not 4).  Each null byte in
        the original string is converted to '\\000', and so allocating just
        4 bytes per character can lead to a segfault if the input string
        contains lots of null bytes.
    These patches are taken directly from upstream CVS and are already
    incorporated into newer upstream releases.
    Closes: #204342


stable/non-US/main/binary-i386/python2.1-pgsql_2.0-3.2_i386.deb
stable/non-US/main/source/python-pgsql_2.0-3.2.dsc
stable/non-US/main/source/python-pgsql_2.0-3.2.diff.gz
stable/non-US/main/binary-i386/python2.2-pgsql_2.0-3.2_i386.deb
stable/non-US/main/binary-i386/python-pgsql_2.0-3.2_i386.deb
python-pgsql (2.0-3.2) stable; urgency=high
  * When calculating how much memory to allocate for the new string in
    libPQquoteBytea():
      - Do not recalculate the string length using strlen().  We already
        have the string length stored in slen, and since the string may
        contain null bytes, using strlen() may return incorrect results.
        This in turn can lead to the unexpected truncation of binary data
        and subsequent data loss.
      - Allocate up to 5 bytes per character (not 4).  Each null byte in
        the original string is converted to '\\000', and so allocating just
        4 bytes per character can lead to a segfault if the input string
        contains lots of null bytes.
    These patches are taken directly from upstream CVS and are already
    incorporated into newer upstream releases.
    Closes: #204342


stable/non-US/main/binary-sparc/libpam-pgsql_0.5.2-3woody1_sparc.deb
pam-pgsql (0.5.2-3woody1) stable-security; urgency=high
  * Security fix in logging function handles format string vulnerability.
    Thanks to Florian Zumbiehl for pointing this out. (CAN-2003-0672)


stable/non-US/main/binary-s390/libpam-pgsql_0.5.2-3woody1_s390.deb
pam-pgsql (0.5.2-3woody1) stable-security; urgency=high
  * Security fix in logging function handles format string vulnerability.
    Thanks to Florian Zumbiehl for pointing this out. (CAN-2003-0672)


stable/non-US/main/binary-powerpc/libpam-pgsql_0.5.2-3woody1_powerpc.deb
pam-pgsql (0.5.2-3woody1) stable-security; urgency=high
  * Security fix in logging function handles format string vulnerability.
    Thanks to Florian Zumbiehl for pointing this out. (CAN-2003-0672)


stable/non-US/main/binary-mipsel/libpam-pgsql_0.5.2-3woody1_mipsel.deb
pam-pgsql (0.5.2-3woody1) stable-security; urgency=high
  * Security fix in logging function handles format string vulnerability.
    Thanks to Florian Zumbiehl for pointing this out. (CAN-2003-0672)


stable/non-US/main/binary-mips/libpam-pgsql_0.5.2-3woody1_mips.deb
pam-pgsql (0.5.2-3woody1) stable-security; urgency=high
  * Security fix in logging function handles format string vulnerability.
    Thanks to Florian Zumbiehl for pointing this out. (CAN-2003-0672)


stable/non-US/main/binary-m68k/libpam-pgsql_0.5.2-3woody1_m68k.deb
pam-pgsql (0.5.2-3woody1) stable-security; urgency=high
  * Security fix in logging function handles format string vulnerability.
    Thanks to Florian Zumbiehl for pointing this out. (CAN-2003-0672)


stable/non-US/main/binary-ia64/libpam-pgsql_0.5.2-3woody1_ia64.deb
pam-pgsql (0.5.2-3woody1) stable-security; urgency=high
  * Security fix in logging function handles format string vulnerability.
    Thanks to Florian Zumbiehl for pointing this out. (CAN-2003-0672)


stable/non-US/main/binary-hppa/libpam-pgsql_0.5.2-3woody1_hppa.deb
pam-pgsql (0.5.2-3woody1) stable-security; urgency=high
  * Security fix in logging function handles format string vulnerability.
    Thanks to Florian Zumbiehl for pointing this out. (CAN-2003-0672)


stable/non-US/main/binary-arm/libpam-pgsql_0.5.2-3woody1_arm.deb
pam-pgsql (0.5.2-3woody1) stable-security; urgency=high
  * Security fix in logging function handles format string vulnerability.
    Thanks to Florian Zumbiehl for pointing this out. (CAN-2003-0672)


stable/non-US/main/binary-alpha/libpam-pgsql_0.5.2-3woody1_alpha.deb
pam-pgsql (0.5.2-3woody1) stable-security; urgency=high
  * Security fix in logging function handles format string vulnerability.
    Thanks to Florian Zumbiehl for pointing this out. (CAN-2003-0672)


stable/non-US/main/source/pam-pgsql_0.5.2-3woody1.diff.gz
stable/non-US/main/binary-i386/libpam-pgsql_0.5.2-3woody1_i386.deb
stable/non-US/main/source/pam-pgsql_0.5.2-3woody1.dsc
pam-pgsql (0.5.2-3woody1) stable-security; urgency=high
  * Security fix in logging function handles format string vulnerability.
    Thanks to Florian Zumbiehl for pointing this out. (CAN-2003-0672)


stable/non-US/main/binary-powerpc/libssl095a_0.9.5a-6.woody.3_powerpc.deb
openssl095 (0.9.5a-6.woody.3) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Applied upstream patch by Steve Henson from the upstream CVS
    http://cvs.openssl.org/chngview?cn=11470 (CAN-2003-0544,
    CAN-2003-0543, crypto/x509/x509_vfy.c, crypto/asn1/asn1_lib.c)


stable/non-US/main/binary-mipsel/libssl095a_0.9.5a-6.woody.3_mipsel.deb
openssl095 (0.9.5a-6.woody.3) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Applied upstream patch by Steve Henson from the upstream CVS
    http://cvs.openssl.org/chngview?cn=11470 (CAN-2003-0544,
    CAN-2003-0543, crypto/x509/x509_vfy.c, crypto/asn1/asn1_lib.c)


stable/non-US/main/binary-mips/libssl095a_0.9.5a-6.woody.3_mips.deb
openssl095 (0.9.5a-6.woody.3) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Applied upstream patch by Steve Henson from the upstream CVS
    http://cvs.openssl.org/chngview?cn=11470 (CAN-2003-0544,
    CAN-2003-0543, crypto/x509/x509_vfy.c, crypto/asn1/asn1_lib.c)


stable/non-US/main/binary-m68k/libssl095a_0.9.5a-6.woody.3_m68k.deb
openssl095 (0.9.5a-6.woody.3) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Applied upstream patch by Steve Henson from the upstream CVS
    http://cvs.openssl.org/chngview?cn=11470 (CAN-2003-0544,
    CAN-2003-0543, crypto/x509/x509_vfy.c, crypto/asn1/asn1_lib.c)


stable/non-US/main/binary-i386/libssl095a_0.9.5a-6.woody.3_i386.deb
openssl095 (0.9.5a-6.woody.3) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Applied upstream patch by Steve Henson from the upstream CVS
    http://cvs.openssl.org/chngview?cn=11470 (CAN-2003-0544,
    CAN-2003-0543, crypto/x509/x509_vfy.c, crypto/asn1/asn1_lib.c)


stable/non-US/main/binary-arm/libssl095a_0.9.5a-6.woody.3_arm.deb
openssl095 (0.9.5a-6.woody.3) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Applied upstream patch by Steve Henson from the upstream CVS
    http://cvs.openssl.org/chngview?cn=11470 (CAN-2003-0544,
    CAN-2003-0543, crypto/x509/x509_vfy.c, crypto/asn1/asn1_lib.c)


stable/non-US/main/binary-alpha/libssl095a_0.9.5a-6.woody.3_alpha.deb
openssl095 (0.9.5a-6.woody.3) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Applied upstream patch by Steve Henson from the upstream CVS
    http://cvs.openssl.org/chngview?cn=11470 (CAN-2003-0544,
    CAN-2003-0543, crypto/x509/x509_vfy.c, crypto/asn1/asn1_lib.c)


stable/non-US/main/source/openssl095_0.9.5a-6.woody.3.dsc
stable/non-US/main/binary-sparc/libssl095a_0.9.5a-6.woody.3_sparc.deb
stable/non-US/main/source/openssl095_0.9.5a-6.woody.3.diff.gz
openssl095 (0.9.5a-6.woody.3) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Applied upstream patch by Steve Henson from the upstream CVS
    http://cvs.openssl.org/chngview?cn=11470 (CAN-2003-0544,
    CAN-2003-0543, crypto/x509/x509_vfy.c, crypto/asn1/asn1_lib.c)


stable/non-US/main/binary-sparc/kdelibs3-crypto_2.2.2-6woody2_sparc.deb
kdelibs-crypto (4:2.2.2-6woody2) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Update config.guess and config.sub to fix build on mips, mipsel


stable/non-US/main/binary-s390/kdelibs3-crypto_2.2.2-6woody2_s390.deb
kdelibs-crypto (4:2.2.2-6woody2) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Update config.guess and config.sub to fix build on mips, mipsel


stable/non-US/main/binary-powerpc/kdelibs3-crypto_2.2.2-6woody2_powerpc.deb
kdelibs-crypto (4:2.2.2-6woody2) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Update config.guess and config.sub to fix build on mips, mipsel


stable/non-US/main/binary-mipsel/kdelibs3-crypto_2.2.2-6woody2_mipsel.deb
kdelibs-crypto (4:2.2.2-6woody2) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Update config.guess and config.sub to fix build on mips, mipsel


stable/non-US/main/binary-mips/kdelibs3-crypto_2.2.2-6woody2_mips.deb
kdelibs-crypto (4:2.2.2-6woody2) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Update config.guess and config.sub to fix build on mips, mipsel


stable/non-US/main/binary-m68k/kdelibs3-crypto_2.2.2-6woody2_m68k.deb
kdelibs-crypto (4:2.2.2-6woody2) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Update config.guess and config.sub to fix build on mips, mipsel


stable/non-US/main/binary-ia64/kdelibs3-crypto_2.2.2-6woody2_ia64.deb
kdelibs-crypto (4:2.2.2-6woody2) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Update config.guess and config.sub to fix build on mips, mipsel


stable/non-US/main/binary-hppa/kdelibs3-crypto_2.2.2-6woody2_hppa.deb
kdelibs-crypto (4:2.2.2-6woody2) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Update config.guess and config.sub to fix build on mips, mipsel


stable/non-US/main/binary-arm/kdelibs3-crypto_2.2.2-6woody2_arm.deb
kdelibs-crypto (4:2.2.2-6woody2) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Update config.guess and config.sub to fix build on mips, mipsel


stable/non-US/main/binary-alpha/kdelibs3-crypto_2.2.2-6woody2_alpha.deb
kdelibs-crypto (4:2.2.2-6woody2) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Update config.guess and config.sub to fix build on mips, mipsel


stable/non-US/main/binary-i386/kdelibs3-crypto_2.2.2-6woody2_i386.deb
stable/non-US/main/source/kdelibs-crypto_2.2.2-6woody2.diff.gz
stable/non-US/main/source/kdelibs-crypto_2.2.2-6woody2.dsc
kdelibs-crypto (4:2.2.2-6woody2) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Update config.guess and config.sub to fix build on mips, mipsel


stable/non-US/main/binary-sparc/exim-tls_3.35-3woody1_sparc.deb
exim-tls (3.35-3woody1) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Fix buffer overflow in HELO/EHLO processing (CAN-2003-0698)
    Probably could not be used to execute arbitrary code


stable/non-US/main/binary-s390/exim-tls_3.35-3woody1_s390.deb
exim-tls (3.35-3woody1) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Fix buffer overflow in HELO/EHLO processing (CAN-2003-0698)
    Probably could not be used to execute arbitrary code


stable/non-US/main/binary-powerpc/exim-tls_3.35-3woody1_powerpc.deb
exim-tls (3.35-3woody1) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Fix buffer overflow in HELO/EHLO processing (CAN-2003-0698)
    Probably could not be used to execute arbitrary code


stable/non-US/main/binary-mipsel/exim-tls_3.35-3woody1_mipsel.deb
exim-tls (3.35-3woody1) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Fix buffer overflow in HELO/EHLO processing (CAN-2003-0698)
    Probably could not be used to execute arbitrary code


stable/non-US/main/binary-mips/exim-tls_3.35-3woody1_mips.deb
exim-tls (3.35-3woody1) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Fix buffer overflow in HELO/EHLO processing (CAN-2003-0698)
    Probably could not be used to execute arbitrary code


stable/non-US/main/binary-m68k/exim-tls_3.35-3woody1_m68k.deb
exim-tls (3.35-3woody1) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Fix buffer overflow in HELO/EHLO processing (CAN-2003-0698)
    Probably could not be used to execute arbitrary code


stable/non-US/main/binary-ia64/exim-tls_3.35-3woody1_ia64.deb
exim-tls (3.35-3woody1) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Fix buffer overflow in HELO/EHLO processing (CAN-2003-0698)
    Probably could not be used to execute arbitrary code


stable/non-US/main/binary-hppa/exim-tls_3.35-3woody1_hppa.deb
exim-tls (3.35-3woody1) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Fix buffer overflow in HELO/EHLO processing (CAN-2003-0698)
    Probably could not be used to execute arbitrary code


stable/non-US/main/binary-arm/exim-tls_3.35-3woody1_arm.deb
exim-tls (3.35-3woody1) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Fix buffer overflow in HELO/EHLO processing (CAN-2003-0698)
    Probably could not be used to execute arbitrary code


stable/non-US/main/binary-alpha/exim-tls_3.35-3woody1_alpha.deb
exim-tls (3.35-3woody1) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Fix buffer overflow in HELO/EHLO processing (CAN-2003-0698)
    Probably could not be used to execute arbitrary code


stable/non-US/main/source/exim-tls_3.35-3woody1.dsc
stable/non-US/main/binary-i386/exim-tls_3.35-3woody1_i386.deb
stable/non-US/main/source/exim-tls_3.35-3woody1.diff.gz
exim-tls (3.35-3woody1) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Fix buffer overflow in HELO/EHLO processing (CAN-2003-0698)
    Probably could not be used to execute arbitrary code


=========================================
Sun,  15 Dec 2002 - Debian 3.0r1 released
=========================================

Removed the following packages from stable:

 libgnupg-perl |      0.9-1 | source, all
 (Reason: requested by Stable Release Manager)
   "Moved to ftp-master."

----
	        
stable/non-US/main/binary-sparc/freeswan_1.96-1.4_sparc.deb
freeswan (1.96-1.4) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Second injection into the security build network since 8 buildds
    refuse to upload the binary packages and the maintainer refuses to
    answer.  *sigh*


stable/non-US/main/binary-s390/freeswan_1.96-1.4_s390.deb
freeswan (1.96-1.4) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Second injection into the security build network since 8 buildds
    refuse to upload the binary packages and the maintainer refuses to
    answer.  *sigh*


stable/non-US/main/binary-powerpc/freeswan_1.96-1.4_powerpc.deb
freeswan (1.96-1.4) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Second injection into the security build network since 8 buildds
    refuse to upload the binary packages and the maintainer refuses to
    answer.  *sigh*


stable/non-US/main/binary-mips/freeswan_1.96-1.4_mips.deb
freeswan (1.96-1.4) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Second injection into the security build network since 8 buildds
    refuse to upload the binary packages and the maintainer refuses to
    answer.  *sigh*


stable/non-US/main/binary-m68k/freeswan_1.96-1.4_m68k.deb
freeswan (1.96-1.4) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Second injection into the security build network since 8 buildds
    refuse to upload the binary packages and the maintainer refuses to
    answer.  *sigh*


stable/non-US/main/binary-ia64/freeswan_1.96-1.4_ia64.deb
freeswan (1.96-1.4) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Second injection into the security build network since 8 buildds
    refuse to upload the binary packages and the maintainer refuses to
    answer.  *sigh*


stable/non-US/main/binary-i386/freeswan_1.96-1.4_i386.deb
freeswan (1.96-1.4) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Second injection into the security build network since 8 buildds
    refuse to upload the binary packages and the maintainer refuses to
    answer.  *sigh*


stable/non-US/main/binary-hppa/freeswan_1.96-1.4_hppa.deb
freeswan (1.96-1.4) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Second injection into the security build network since 8 buildds
    refuse to upload the binary packages and the maintainer refuses to
    answer.  *sigh*


stable/non-US/main/binary-arm/freeswan_1.96-1.4_arm.deb
freeswan (1.96-1.4) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Second injection into the security build network since 8 buildds
    refuse to upload the binary packages and the maintainer refuses to
    answer.  *sigh*


stable/non-US/main/binary-alpha/freeswan_1.96-1.4_alpha.deb
freeswan (1.96-1.4) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Second injection into the security build network since 8 buildds
    refuse to upload the binary packages and the maintainer refuses to
    answer.  *sigh*


stable/non-US/main/source/freeswan_1.96-1.4.dsc
stable/non-US/main/binary-all/kernel-patch-freeswan_1.96-1.4_all.deb
stable/non-US/main/binary-mipsel/freeswan_1.96-1.4_mipsel.deb
stable/non-US/main/source/freeswan_1.96-1.4.diff.gz
freeswan (1.96-1.4) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Second injection into the security build network since 8 buildds
    refuse to upload the binary packages and the maintainer refuses to
    answer.  *sigh*

=========================================
Sat,  20 Jul 2002 - Debian 3.0r0 released
=========================================
