The Debian Security Team published a new security update for Debian GNU/Linux. Here the announcement:
-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1
- --------------------------------------------------------------------------
Debian Security Advisory DSA 950-1 security@debian.org
http://www.debian.org/security/ Martin Schulze
January 23rd, 2006 http://www.debian.org/security/faq
- --------------------------------------------------------------------------
Package : cupsys
Vulnerability : buffer overflows
Problem type : remote
Debian-specific: no
CVE IDs : CVE-2005-3191 CVE-2005-3192 CVE-2005-3193 CVE-2005-3624
CVE-2005-3625 CVE-2005-3626 CVE-2005-3627 CVE-2005-3628
"infamous41md" and Chris Evans discovered several heap based buffer
overflows in xpdf which are also present in CUPS, the Common UNIX
Printing System, and which can lead to a denial of service by crashing
the application or possibly to the execution of arbitrary code.
For the old stable distribution (woody) these problems have been fixed in
version 1.1.14-5woody14.
For the stable distribution (sarge) these problems have been fixed in
version 1.1.23-10sarge1.
For the unstable distribution (sid) these problems will be fixed soon.
We recommend that you upgrade your CUPS packages.
Upgrade Instructions
- --------------------
wget url
will fetch the file for you
dpkg -i file.deb
will install the referenced file.
If you are using the apt-get package manager, use the line for
sources.list as given below:
apt-get update
will update the internal database
apt-get upgrade
will install corrected packages
You may use an automated update by adding the resources from the
footer to the proper configuration.
Debian GNU/Linux 3.0 alias woody
- --------------------------------
Source archives:
http://security.debian.org/pool/updates/main/c/cupsys/cupsys_1.1.14-5woody14.dsc
Size/MD5 checksum: 712 87055bd9647d440b8ce56afc1c53c062
http://security.debian.org/pool/updates/main/c/cupsys/cupsys_1.1.14-5woody14.diff.gz
Size/MD5 checksum: 41961 2d996ab8926c30dda9b4b1da5db2dcf5
http://security.debian.org/pool/updates/main/c/cupsys/cupsys_1.1.14.orig.tar.gz
Size/MD5 checksum: 6150756 0dfa41f29fa73e7744903b2471d2ca2f
Alpha architecture:
http://security.debian.org/pool/updates/main/c/cupsys/cupsys_1.1.14-5woody14_alpha.deb
Size/MD5 checksum: 1901460 d9c2716ed4e3eb17551e93bd09ef3cb1
http://security.debian.org/pool/updates/main/c/cupsys/cupsys-bsd_1.1.14-5woody14_alpha.deb
Size/MD5 checksum: 74640 ecc0016c60f37d7b99c4d8848588a4d1
http://security.debian.org/pool/updates/main/c/cupsys/cupsys-client_1.1.14-5woody14_alpha.deb
Size/MD5 checksum: 93286 9f018be9b70c2dc86ee7d022b92ff102
http://security.debian.org/pool/updates/main/c/cupsys/cupsys-pstoraster_1.1.14-5woody14_alpha.deb
Size/MD5 checksum: 2446114 c097158954ffc328f578dea763337440
http://security.debian.org/pool/updates/main/c/cupsys/libcupsys2_1.1.14-5woody14_alpha.deb
Size/MD5 checksum: 138306 3d938cc09f9b17c65c79a4b7c4c7474a
http://security.debian.org/pool/updates/main/c/cupsys/libcupsys2-dev_1.1.14-5woody14_alpha.deb
Size/MD5 checksum: 181258 db9cc1c0273d516386ccf2be873166a0
ARM architecture:
http://security.debian.org/pool/updates/main/c/cupsys/cupsys_1.1.14-5woody14_arm.deb
Size/MD5 checksum: 1822154 a6c2a7bc9ed9a2daf492474dfbfee387
http://security.debian.org/pool/updates/main/c/cupsys/cupsys-bsd_1.1.14-5woody14_arm.deb
Size/MD5 checksum: 68790 a6504ee333ddb3bea747835678a025f3
http://security.debian.org/pool/updates/main/c/cupsys/cupsys-client_1.1.14-5woody14_arm.deb
Size/MD5 checksum: 85976 20b1bc34eee904186892e47522024266
http://security.debian.org/pool/updates/main/c/cupsys/cupsys-pstoraster_1.1.14-5woody14_arm.deb
Size/MD5 checksum: 2346140 ed23313e05032089bb5cee70cd914711
http://security.debian.org/pool/updates/main/c/cupsys/libcupsys2_1.1.14-5woody14_arm.deb
Size/MD5 checksum: 113304 9ffcce59eb3f9b306dbd661fe9b28760
http://security.debian.org/pool/updates/main/c/cupsys/libcupsys2-dev_1.1.14-5woody14_arm.deb
Size/MD5 checksum: 150704 be20a14dfa2fb2251d9a046159a4ac9e
Intel IA-32 architecture:
http://security.debian.org/pool/updates/main/c/cupsys/cupsys_1.1.14-5woody14_i386.deb
Size/MD5 checksum: 1788452 f920699db4f6756a27ef73c00d41cb1c
http://security.debian.org/pool/updates/main/c/cupsys/cupsys-bsd_1.1.14-5woody14_i386.deb
Size/MD5 checksum: 68280 728e5ab852df891dbb094c877d5d26f2
http://security.debian.org/pool/updates/main/c/cupsys/cupsys-client_1.1.14-5woody14_i386.deb
Size/MD5 checksum: 84416 352934f7cabf8e8835cbe685e136ab69
http://security.debian.org/pool/updates/main/c/cupsys/cupsys-pstoraster_1.1.14-5woody14_i386.deb
Size/MD5 checksum: 2312294 656e02e4f86107449f528789393bf3d4
http://security.debian.org/pool/updates/main/c/cupsys/libcupsys2_1.1.14-5woody14_i386.deb
Size/MD5 checksum: 111268 cdd8f173a676c42e1e6f800757777e44
http://security.debian.org/pool/updates/main/c/cupsys/libcupsys2-dev_1.1.14-5woody14_i386.deb
Size/MD5 checksum: 136824 3762ca0a2e9f04e82c69de42bee5c6d1
Intel IA-64 architecture:
http://security.debian.org/pool/updates/main/c/cupsys/cupsys_1.1.14-5woody14_ia64.deb
Size/MD5 checksum: 2009046 515a82e65816d7306a0eed23eb81eca7
http://security.debian.org/pool/updates/main/c/cupsys/cupsys-bsd_1.1.14-5woody14_ia64.deb
Size/MD5 checksum: 77740 1934f438e856d54966bd86d1e575185c
http://security.debian.org/pool/updates/main/c/cupsys/cupsys-client_1.1.14-5woody14_ia64.deb
Size/MD5 checksum: 97452 b74539e18af4838477d91c604d8a92ed
http://security.debian.org/pool/updates/main/c/cupsys/cupsys-pstoraster_1.1.14-5woody14_ia64.deb
Size/MD5 checksum: 2657094 64e4f7fef054d690c03ca3753742a762
http://security.debian.org/pool/updates/main/c/cupsys/libcupsys2_1.1.14-5woody14_ia64.deb
Size/MD5 checksum: 156328 82d9922dc92754c43bf39e8f4cc77928
http://security.debian.org/pool/updates/main/c/cupsys/libcupsys2-dev_1.1.14-5woody14_ia64.deb
Size/MD5 checksum: 183270 6a90afecd9464585d98e294ff73929c7
HP Precision architecture:
http://security.debian.org/pool/updates/main/c/cupsys/cupsys_1.1.14-5woody14_hppa.deb
Size/MD5 checksum: 1882286 4ec8f0298dc7249fa9ca70017b324de2
http://security.debian.org/pool/updates/main/c/cupsys/cupsys-bsd_1.1.14-5woody14_hppa.deb
Size/MD5 checksum: 71102 4fe9e3556038e7ad2a5f98b93293a37a
http://security.debian.org/pool/updates/main/c/cupsys/cupsys-client_1.1.14-5woody14_hppa.deb
Size/MD5 checksum: 90130 eeb463655e9c4d920e9bd9bf6f59fc2e
http://security.debian.org/pool/updates/main/c/cupsys/cupsys-pstoraster_1.1.14-5woody14_hppa.deb
Size/MD5 checksum: 2456368 06cd1008318bbb3508f78208360c25dd
http://security.debian.org/pool/updates/main/c/cupsys/libcupsys2_1.1.14-5woody14_hppa.deb
Size/MD5 checksum: 126830 9438fad24f29a082acf3af12f1b78ba2
http://security.debian.org/pool/updates/main/c/cupsys/libcupsys2-dev_1.1.14-5woody14_hppa.deb
Size/MD5 checksum: 159848 992335895e6d5f9507cd5f261bab3083
Motorola 680x0 architecture:
http://security.debian.org/pool/updates/main/c/cupsys/cupsys_1.1.14-5woody14_m68k.deb
Size/MD5 checksum: 1756060 ab11910eddafa259de3bd745b44bf3da
http://security.debian.org/pool/updates/main/c/cupsys/cupsys-bsd_1.1.14-5woody14_m68k.deb
Size/MD5 checksum: 66570 e2c198da29470435c7728c04ec1dddcd
http://security.debian.org/pool/updates/main/c/cupsys/cupsys-client_1.1.14-5woody14_m68k.deb
Size/MD5 checksum: 81710 aba951dcf7e9b48289d66d28b52a8fe1
http://security.debian.org/pool/updates/main/c/cupsys/cupsys-pstoraster_1.1.14-5woody14_m68k.deb
Size/MD5 checksum: 2261686 aba414903aed1f525daddefc42d9cb0f
http://security.debian.org/pool/updates/main/c/cupsys/libcupsys2_1.1.14-5woody14_m68k.deb
Size/MD5 checksum: 106548 52dd393183f425b3cfd7dfb424a83df8
http://security.debian.org/pool/updates/main/c/cupsys/libcupsys2-dev_1.1.14-5woody14_m68k.deb
Size/MD5 checksum: 129094 4348111e8d1be636745d7871e8891948
Big endian MIPS architecture:
http://security.debian.org/pool/updates/main/c/cupsys/cupsys_1.1.14-5woody14_mips.deb
Size/MD5 checksum: 1812104 dd3a152cc6f60aee92caf1b1d48be116
http://security.debian.org/pool/updates/main/c/cupsys/cupsys-bsd_1.1.14-5woody14_mips.deb
Size/MD5 checksum: 68192 471231e45b6758318b09593584561492
http://security.debian.org/pool/updates/main/c/cupsys/cupsys-client_1.1.14-5woody14_mips.deb
Size/MD5 checksum: 81620 20a54b310accf0c618ae17b1939928d6
http://security.debian.org/pool/updates/main/c/cupsys/cupsys-pstoraster_1.1.14-5woody14_mips.deb
Size/MD5 checksum: 2404894 e5448e7a68d1b9b2faffe6250e293504
http://security.debian.org/pool/updates/main/c/cupsys/libcupsys2_1.1.14-5woody14_mips.deb
Size/MD5 checksum: 113064 bef1f42d86e8f491fc3c01eab9d1978d
http://security.debian.org/pool/updates/main/c/cupsys/libcupsys2-dev_1.1.14-5woody14_mips.deb
Size/MD5 checksum: 151504 bea406cc6863a488054206378e8fb04c
Little endian MIPS architecture:
http://security.debian.org/pool/updates/main/c/cupsys/cupsys_1.1.14-5woody14_mipsel.deb
Size/MD5 checksum: 1812764 83e4dac89074dcb5adeeadc94e1b77fc
http://security.debian.org/pool/updates/main/c/cupsys/cupsys-bsd_1.1.14-5woody14_mipsel.deb
Size/MD5 checksum: 68190 8a5f9228fd00e1f2010b4ecc3192043f
http://security.debian.org/pool/updates/main/c/cupsys/cupsys-client_1.1.14-5woody14_mipsel.deb
Size/MD5 checksum: 81664 c7329620731adcafa54c76956c7570fa
http://security.debian.org/pool/updates/main/c/cupsys/cupsys-pstoraster_1.1.14-5woody14_mipsel.deb
Size/MD5 checksum: 2407286 597914ee83c1d95f071f3f9cc2a712c4
http://security.debian.org/pool/updates/main/c/cupsys/libcupsys2_1.1.14-5woody14_mipsel.deb
Size/MD5 checksum: 112850 b0ba6a07c9ae3dd1265428e591c46e97
http://security.debian.org/pool/updates/main/c/cupsys/libcupsys2-dev_1.1.14-5woody14_mipsel.deb
Size/MD5 checksum: 151320 08f9b0bd3e63b83e4486a736f4183c80
PowerPC architecture:
http://security.debian.org/pool/updates/main/c/cupsys/cupsys_1.1.14-5woody14_powerpc.deb
Size/MD5 checksum: 1801230 7ae9ff1ad1a2b39bcac9caf0a1ea84bf
http://security.debian.org/pool/updates/main/c/cupsys/cupsys-bsd_1.1.14-5woody14_powerpc.deb
Size/MD5 checksum: 68216 c4a5278ee7b0decab415799498ec4c0e
http://security.debian.org/pool/updates/main/c/cupsys/cupsys-client_1.1.14-5woody14_powerpc.deb
Size/MD5 checksum: 83804 1f0e2917e7bbfa3c41b42a8706aa4dbc
http://security.debian.org/pool/updates/main/c/cupsys/cupsys-pstoraster_1.1.14-5woody14_powerpc.deb
Size/MD5 checksum: 2360122 0205d9a7e7294b1c5df64b7b5aeef414
http://security.debian.org/pool/updates/main/c/cupsys/libcupsys2_1.1.14-5woody14_powerpc.deb
Size/MD5 checksum: 117102 75a66b72bc9f3de5db50bab7c0fd877d
http://security.debian.org/pool/updates/main/c/cupsys/libcupsys2-dev_1.1.14-5woody14_powerpc.deb
Size/MD5 checksum: 145562 d77e1f716df37e1e1f4fa0408adaa2d7
IBM S/390 architecture:
http://security.debian.org/pool/updates/main/c/cupsys/cupsys_1.1.14-5woody14_s390.deb
Size/MD5 checksum: 1796146 6fa046122e3b7f1c3d8d4b5d74ab4f44
http://security.debian.org/pool/updates/main/c/cupsys/cupsys-bsd_1.1.14-5woody14_s390.deb
Size/MD5 checksum: 69592 f2f9bf8682b4cb7fc45daddff2643bf2
http://security.debian.org/pool/updates/main/c/cupsys/cupsys-client_1.1.14-5woody14_s390.deb
Size/MD5 checksum: 86316 b48887446a27a55d25ac400c1aac22ce
http://security.debian.org/pool/updates/main/c/cupsys/cupsys-pstoraster_1.1.14-5woody14_s390.deb
Size/MD5 checksum: 2337954 7a17b6c38961912f5c8ac1d3a93df115
http://security.debian.org/pool/updates/main/c/cupsys/libcupsys2_1.1.14-5woody14_s390.deb
Size/MD5 checksum: 115630 c441bc67529c0ca9d65b2ecf7ae77a22
http://security.debian.org/pool/updates/main/c/cupsys/libcupsys2-dev_1.1.14-5woody14_s390.deb
Size/MD5 checksum: 141154 6c1045dab37cd0c2de8ea9521fb15ce5
Sun Sparc architecture:
http://security.debian.org/pool/updates/main/c/cupsys/cupsys_1.1.14-5woody14_sparc.deb
Size/MD5 checksum: 1845976 02c8158a514550f09e71440b57bbe091
http://security.debian.org/pool/updates/main/c/cupsys/cupsys-bsd_1.1.14-5woody14_sparc.deb
Size/MD5 checksum: 71162 e80f373008dae5e4c53f573cb8211742
http://security.debian.org/pool/updates/main/c/cupsys/cupsys-client_1.1.14-5woody14_sparc.deb
Size/MD5 checksum: 84582 9a972b8f43a72a85b83deaca3fd33dd9
http://security.debian.org/pool/updates/main/c/cupsys/cupsys-pstoraster_1.1.14-5woody14_sparc.deb
Size/MD5 checksum: 2354982 984c7d23e08833f26d1cd63e54292a41
http://security.debian.org/pool/updates/main/c/cupsys/libcupsys2_1.1.14-5woody14_sparc.deb
Size/MD5 checksum: 120776 704f789385683f359cc6ed1328892516
http://security.debian.org/pool/updates/main/c/cupsys/libcupsys2-dev_1.1.14-5woody14_sparc.deb
Size/MD5 checksum: 147072 e9aabfc1246767e35667aeed061f0184
Debian GNU/Linux 3.1 alias sarge
- --------------------------------
Source archives:
http://security.debian.org/pool/updates/main/c/cupsys/cupsys_1.1.23-10sarge1.dsc
Size/MD5 checksum: 843 149c91767477b75a0cf7db28c6129b30
http://security.debian.org/pool/updates/main/c/cupsys/cupsys_1.1.23-10sarge1.diff.gz
Size/MD5 checksum: 1273227 8e6fbc6b8ca8d4588d90312a3a7c2199
http://security.debian.org/pool/updates/main/c/cupsys/cupsys_1.1.23.orig.tar.gz
Size/MD5 checksum: 10071818 d6995f493129e9637581f3a717c8345e
Architecture independent components:
http://security.debian.org/pool/updates/main/c/cupsys/libcupsys2_1.1.23-10sarge1_all.deb
Size/MD5 checksum: 972 0f85b73fa4d13914cf8f50dc2dc1910f
Alpha architecture:
http://security.debian.org/pool/updates/main/c/cupsys/cupsys_1.1.23-10sarge1_alpha.deb
Size/MD5 checksum: 8998558 547b44162becac3729e55a1efa9bf526
http://security.debian.org/pool/updates/main/c/cupsys/cupsys-bsd_1.1.23-10sarge1_alpha.deb
Size/MD5 checksum: 51964 4961aed776b96ad6201d56a9d2405a2f
http://security.debian.org/pool/updates/main/c/cupsys/cupsys-client_1.1.23-10sarge1_alpha.deb
Size/MD5 checksum: 116824 732753a8cfbd0eeb5f52b8686948f6b6
http://security.debian.org/pool/updates/main/c/cupsys/libcupsimage2_1.1.23-10sarge1_alpha.deb
Size/MD5 checksum: 61186 e6dab465c327d8b5769a406130e47216
http://security.debian.org/pool/updates/main/c/cupsys/libcupsimage2-dev_1.1.23-10sarge1_alpha.deb
Size/MD5 checksum: 61054 d6261652e2a0cbb4d396411f224a0322
http://security.debian.org/pool/updates/main/c/cupsys/libcupsys2-dev_1.1.23-10sarge1_alpha.deb
Size/MD5 checksum: 112100 28f6458e3a69ee997b3dee07b7c2b616
http://security.debian.org/pool/updates/main/c/cupsys/libcupsys2-gnutls10_1.1.23-10sarge1_alpha.deb
Size/MD5 checksum: 83694 433ccca31f21ee3d1b726acc36fe3350
AMD64 architecture:
http://security.debian.org/pool/updates/main/c/cupsys/cupsys_1.1.23-10sarge1_amd64.deb
Size/MD5 checksum: 8965490 0ed3172129be9fac870f3c27c16d9b6b
http://security.debian.org/pool/updates/main/c/cupsys/cupsys-bsd_1.1.23-10sarge1_amd64.deb
Size/MD5 checksum: 48912 481fb3ff53dcea0ab7675e2935d0c4b5
http://security.debian.org/pool/updates/main/c/cupsys/cupsys-client_1.1.23-10sarge1_amd64.deb
Size/MD5 checksum: 111480 0d29c73380d005759e830a560765115b
http://security.debian.org/pool/updates/main/c/cupsys/libcupsimage2_1.1.23-10sarge1_amd64.deb
Size/MD5 checksum: 54140 7aa240c5363d73169f72ced83b9418f9
http://security.debian.org/pool/updates/main/c/cupsys/libcupsimage2-dev_1.1.23-10sarge1_amd64.deb
Size/MD5 checksum: 45302 4bf1056c7dbfb8f8ca5418b2bd0da446
http://security.debian.org/pool/updates/main/c/cupsys/libcupsys2-dev_1.1.23-10sarge1_amd64.deb
Size/MD5 checksum: 88114 31b7feb9363003f66f67f957e4933e9a
http://security.debian.org/pool/updates/main/c/cupsys/libcupsys2-gnutls10_1.1.23-10sarge1_amd64.deb
Size/MD5 checksum: 76420 b550d92e77c52790bf5a58031f605c8d
ARM architecture:
http://security.debian.org/pool/updates/main/c/cupsys/cupsys_1.1.23-10sarge1_arm.deb
Size/MD5 checksum: 8957012 915fdb81401cd63d854e5cf40605a797
http://security.debian.org/pool/updates/main/c/cupsys/cupsys-bsd_1.1.23-10sarge1_arm.deb
Size/MD5 checksum: 47944 7464b760910c7eec6450fb3608a54845
http://security.debian.org/pool/updates/main/c/cupsys/cupsys-client_1.1.23-10sarge1_arm.deb
Size/MD5 checksum: 108064 f6f2d9a1dbefa5bb4adfeec4592df8af
http://security.debian.org/pool/updates/main/c/cupsys/libcupsimage2_1.1.23-10sarge1_arm.deb
Size/MD5 checksum: 52704 67a5ae9c5dcdf9a5a86f7d64292bf967
http://security.debian.org/pool/updates/main/c/cupsys/libcupsimage2-dev_1.1.23-10sarge1_arm.deb
Size/MD5 checksum: 47096 9fa5503ff99ecfb041243039362b3a2a
http://security.debian.org/pool/updates/main/c/cupsys/libcupsys2-dev_1.1.23-10sarge1_arm.deb
Size/MD5 checksum: 88946 ecdf555d38255fd39a08ee1387013f1b
http://security.debian.org/pool/updates/main/c/cupsys/libcupsys2-gnutls10_1.1.23-10sarge1_arm.deb
Size/MD5 checksum: 70916 10e8a947858a4707236de9e2006e3907
Intel IA-32 architecture:
http://security.debian.org/pool/updates/main/c/cupsys/cupsys_1.1.23-10sarge1_i386.deb
Size/MD5 checksum: 8956128 da71b0801cba48f1cb692d93297abc2b
http://security.debian.org/pool/updates/main/c/cupsys/cupsys-bsd_1.1.23-10sarge1_i386.deb
Size/MD5 checksum: 48344 41ebb63f63a0f2dae4312cb0618114fa
http://security.debian.org/pool/updates/main/c/cupsys/cupsys-client_1.1.23-10sarge1_i386.deb
Size/MD5 checksum: 109956 fbc4c77291e86a1ef4cbba36cfa54b7d
http://security.debian.org/pool/updates/main/c/cupsys/libcupsimage2_1.1.23-10sarge1_i386.deb
Size/MD5 checksum: 54588 140f3a9b6f693b7d5cfc5666b1ca9811
http://security.debian.org/pool/updates/main/c/cupsys/libcupsimage2-dev_1.1.23-10sarge1_i386.deb
Size/MD5 checksum: 45896 45916eeaf110d91dfffd39ce25f0b36a
http://security.debian.org/pool/updates/main/c/cupsys/libcupsys2-dev_1.1.23-10sarge1_i386.deb
Size/MD5 checksum: 86752 04ef904ec3d610eca55a8c4c27126dc5
http://security.debian.org/pool/updates/main/c/cupsys/libcupsys2-gnutls10_1.1.23-10sarge1_i386.deb
Size/MD5 checksum: 75220 f5dcffc2f6f71ccc85c939001d84a3b7
Intel IA-64 architecture:
http://security.debian.org/pool/updates/main/c/cupsys/cupsys_1.1.23-10sarge1_ia64.deb
Size/MD5 checksum: 9097650 7833e9cdda700ca59e4ca74c68c8c94f
http://security.debian.org/pool/updates/main/c/cupsys/cupsys-bsd_1.1.23-10sarge1_ia64.deb
Size/MD5 checksum: 57190 05e645e5af8ea79fffe60985668f4d1a
http://security.debian.org/pool/updates/main/c/cupsys/cupsys-client_1.1.23-10sarge1_ia64.deb
Size/MD5 checksum: 131422 72e92715d0f7c044313dce896e32327d
http://security.debian.org/pool/updates/main/c/cupsys/libcupsimage2_1.1.23-10sarge1_ia64.deb
Size/MD5 checksum: 68416 744165acbbe1ab96f53d8e4d91346367
http://security.debian.org/pool/updates/main/c/cupsys/libcupsimage2-dev_1.1.23-10sarge1_ia64.deb
Size/MD5 checksum: 59894 1d3e91c509a4e0f790b7abbbf379d623
http://security.debian.org/pool/updates/main/c/cupsys/libcupsys2-dev_1.1.23-10sarge1_ia64.deb
Size/MD5 checksum: 112768 96f6ecd302463e5a401f52c3e060b498
http://security.debian.org/pool/updates/main/c/cupsys/libcupsys2-gnutls10_1.1.23-10sarge1_ia64.deb
Size/MD5 checksum: 97514 612eb7ff11d4f89e9c03224917586fa3
HP Precision architecture:
http://security.debian.org/pool/updates/main/c/cupsys/cupsys_1.1.23-10sarge1_hppa.deb
Size/MD5 checksum: 9010754 0c11b272d05a6f65c3665ac8b15b8947
http://security.debian.org/pool/updates/main/c/cupsys/cupsys-bsd_1.1.23-10sarge1_hppa.deb
Size/MD5 checksum: 52902 84620c8436668790219d44c1cf7373b4
http://security.debian.org/pool/updates/main/c/cupsys/cupsys-client_1.1.23-10sarge1_hppa.deb
Size/MD5 checksum: 117598 4c4500d88ed256ef352e59849cf8a286
http://security.debian.org/pool/updates/main/c/cupsys/libcupsimage2_1.1.23-10sarge1_hppa.deb
Size/MD5 checksum: 59694 7917b68267148a9f0c82e55e4a759783
http://security.debian.org/pool/updates/main/c/cupsys/libcupsimage2-dev_1.1.23-10sarge1_hppa.deb
Size/MD5 checksum: 51240 2c078aa79136b3ace1c2d28b94da9256
http://security.debian.org/pool/updates/main/c/cupsys/libcupsys2-dev_1.1.23-10sarge1_hppa.deb
Size/MD5 checksum: 95354 203442791f4f1d2ecd1e70e3279dbfd5
http://security.debian.org/pool/updates/main/c/cupsys/libcupsys2-gnutls10_1.1.23-10sarge1_hppa.deb
Size/MD5 checksum: 82904 bd10a9918c341f9614f68a3ee81683db
Motorola 680x0 architecture:
http://security.debian.org/pool/updates/main/c/cupsys/cupsys_1.1.23-10sarge1_m68k.deb
Size/MD5 checksum: 8925186 a926ab8492abf60434ffdadfb307b9e8
http://security.debian.org/pool/updates/main/c/cupsys/cupsys-bsd_1.1.23-10sarge1_m68k.deb
Size/MD5 checksum: 46966 6562751ea50409726f36af2016408821
http://security.debian.org/pool/updates/main/c/cupsys/cupsys-client_1.1.23-10sarge1_m68k.deb
Size/MD5 checksum: 104484 0318d6db604c936380a4fdfb3482eac8
http://security.debian.org/pool/updates/main/c/cupsys/libcupsimage2_1.1.23-10sarge1_m68k.deb
Size/MD5 checksum: 49714 272c0080ae763db015e2199c39c72220
http://security.debian.org/pool/updates/main/c/cupsys/libcupsimage2-dev_1.1.23-10sarge1_m68k.deb
Size/MD5 checksum: 37408 3179193900762362145cd7b45e91cbf2
http://security.debian.org/pool/updates/main/c/cupsys/libcupsys2-dev_1.1.23-10sarge1_m68k.deb
Size/MD5 checksum: 75744 f898ee020d7f540eafdabf95decc768f
http://security.debian.org/pool/updates/main/c/cupsys/libcupsys2-gnutls10_1.1.23-10sarge1_m68k.deb
Size/MD5 checksum: 70676 8882d7075c9cb16ee51ba2051c6e801c
Big endian MIPS architecture:
http://security.debian.org/pool/updates/main/c/cupsys/cupsys_1.1.23-10sarge1_mips.deb
Size/MD5 checksum: 8994246 e0b394ae2fe5dd1bd72750cfad52de53
http://security.debian.org/pool/updates/main/c/cupsys/cupsys-bsd_1.1.23-10sarge1_mips.deb
Size/MD5 checksum: 54694 a3a93dad227e79d81be0f9db867afc6d
http://security.debian.org/pool/updates/main/c/cupsys/cupsys-client_1.1.23-10sarge1_mips.deb
Size/MD5 checksum: 121500 e41d68c6950a41cf7ce208a6ac0bc3de
http://security.debian.org/pool/updates/main/c/cupsys/libcupsimage2_1.1.23-10sarge1_mips.deb
Size/MD5 checksum: 53986 b511a7cb6c46058ea49a621dcc3c4988
http://security.debian.org/pool/updates/main/c/cupsys/libcupsimage2-dev_1.1.23-10sarge1_mips.deb
Size/MD5 checksum: 48646 e54608c8ff507c59f73d6bf47f4f5b7e
http://security.debian.org/pool/updates/main/c/cupsys/libcupsys2-dev_1.1.23-10sarge1_mips.deb
Size/MD5 checksum: 88824 3f494a70d277f0f7340860d9e9898fe6
http://security.debian.org/pool/updates/main/c/cupsys/libcupsys2-gnutls10_1.1.23-10sarge1_mips.deb
Size/MD5 checksum: 72820 67af0adb3c1e2ce71c4f3810c80c6338
Little endian MIPS architecture:
http://security.debian.org/pool/updates/main/c/cupsys/cupsys_1.1.23-10sarge1_mipsel.deb
Size/MD5 checksum: 8995140 195358c1b1afbde4fc6c8335efaa4181
http://security.debian.org/pool/updates/main/c/cupsys/cupsys-bsd_1.1.23-10sarge1_mipsel.deb
Size/MD5 checksum: 54840 959fc8269f565b6a60b90ac6216da171
http://security.debian.org/pool/updates/main/c/cupsys/cupsys-client_1.1.23-10sarge1_mipsel.deb
Size/MD5 checksum: 121638 8102c77355666f900144bbbf06a6e737
http://security.debian.org/pool/updates/main/c/cupsys/libcupsimage2_1.1.23-10sarge1_mipsel.deb
Size/MD5 checksum: 54148 31231eb300e28dd7b27acd92b6118e81
http://security.debian.org/pool/updates/main/c/cupsys/libcupsimage2-dev_1.1.23-10sarge1_mipsel.deb
Size/MD5 checksum: 48762 45222e32a7a0ae9de9882a73d6008342
http://security.debian.org/pool/updates/main/c/cupsys/libcupsys2-dev_1.1.23-10sarge1_mipsel.deb
Size/MD5 checksum: 88954 41584ce383f4282195d63c627eaa724a
http://security.debian.org/pool/updates/main/c/cupsys/libcupsys2-gnutls10_1.1.23-10sarge1_mipsel.deb
Size/MD5 checksum: 72696 5d14ee7a81b0a0e083210b82ddca20c7
PowerPC architecture:
http://security.debian.org/pool/updates/main/c/cupsys/cupsys_1.1.23-10sarge1_powerpc.deb
Size/MD5 checksum: 8969934 4e344b217f6ef0a9c8e60358023b31ee
http://security.debian.org/pool/updates/main/c/cupsys/cupsys-bsd_1.1.23-10sarge1_powerpc.deb
Size/MD5 checksum: 53294 d37e799234391a7d8a7aea39feb77e17
http://security.debian.org/pool/updates/main/c/cupsys/cupsys-client_1.1.23-10sarge1_powerpc.deb
Size/MD5 checksum: 119228 77809235fdf58d3f061514fc0cd8a6d1
http://security.debian.org/pool/updates/main/c/cupsys/libcupsimage2_1.1.23-10sarge1_powerpc.deb
Size/MD5 checksum: 56414 27ca9a1284d4d61c61d1f3cd8ec8ac2b
http://security.debian.org/pool/updates/main/c/cupsys/libcupsimage2-dev_1.1.23-10sarge1_powerpc.deb
Size/MD5 checksum: 44490 28e399b1d223a87154c0121b7d03d611
http://security.debian.org/pool/updates/main/c/cupsys/libcupsys2-dev_1.1.23-10sarge1_powerpc.deb
Size/MD5 checksum: 87470 2568624e044d49e0941b8ad30871eb3b
http://security.debian.org/pool/updates/main/c/cupsys/libcupsys2-gnutls10_1.1.23-10sarge1_powerpc.deb
Size/MD5 checksum: 76432 56bf5eca39b58eaf2ed3979b30a327f0
IBM S/390 architecture:
http://security.debian.org/pool/updates/main/c/cupsys/cupsys_1.1.23-10sarge1_s390.deb
Size/MD5 checksum: 8970048 9cc28b376bc998fcb677d07560578af5
http://security.debian.org/pool/updates/main/c/cupsys/cupsys-bsd_1.1.23-10sarge1_s390.deb
Size/MD5 checksum: 49436 551d0048566181bac7df0649d07d5612
http://security.debian.org/pool/updates/main/c/cupsys/cupsys-client_1.1.23-10sarge1_s390.deb
Size/MD5 checksum: 110080 2e8273c064ed8274fcbefb76ba7e658d
http://security.debian.org/pool/updates/main/c/cupsys/libcupsimage2_1.1.23-10sarge1_s390.deb
Size/MD5 checksum: 55788 92ca368281195401f5df2b49e739804d
http://security.debian.org/pool/updates/main/c/cupsys/libcupsimage2-dev_1.1.23-10sarge1_s390.deb
Size/MD5 checksum: 44886 5391354597b49101acd2c6a30dd3ab4b
http://security.debian.org/pool/updates/main/c/cupsys/libcupsys2-dev_1.1.23-10sarge1_s390.deb
Size/MD5 checksum: 90062 222e90ed6137450d20d2cdd6b22987a4
http://security.debian.org/pool/updates/main/c/cupsys/libcupsys2-gnutls10_1.1.23-10sarge1_s390.deb
Size/MD5 checksum: 78542 c6da804896bc9fb88c39b0bb1c53ce26
Sun Sparc architecture:
http://security.debian.org/pool/updates/main/c/cupsys/cupsys_1.1.23-10sarge1_sparc.deb
Size/MD5 checksum: 8972432 c4ecce3bcfadaeda1503afe260d84b7f
http://security.debian.org/pool/updates/main/c/cupsys/cupsys-bsd_1.1.23-10sarge1_sparc.deb
Size/MD5 checksum: 47664 6d5c126bdc8ba8581b8e197468577934
http://security.debian.org/pool/updates/main/c/cupsys/cupsys-client_1.1.23-10sarge1_sparc.deb
Size/MD5 checksum: 108100 c0b006f4a79340275585150450e91f0b
http://security.debian.org/pool/updates/main/c/cupsys/libcupsimage2_1.1.23-10sarge1_sparc.deb
Size/MD5 checksum: 54544 4e81501aee3e095dc6c0dcb44c1d15ce
http://security.debian.org/pool/updates/main/c/cupsys/libcupsimage2-dev_1.1.23-10sarge1_sparc.deb
Size/MD5 checksum: 46028 5ceccb76a01d1a1b0fba31d4d80539aa
http://security.debian.org/pool/updates/main/c/cupsys/libcupsys2-dev_1.1.23-10sarge1_sparc.deb
Size/MD5 checksum: 86606 7444f4cf093195c09db2e53fe8f45636
http://security.debian.org/pool/updates/main/c/cupsys/libcupsys2-gnutls10_1.1.23-10sarge1_sparc.deb
Size/MD5 checksum: 74404 d30b3e52cb5948f869332d91eb89c850
These files will probably be moved into the stable distribution on
its next update.
- ---------------------------------------------------------------------------------
For apt-get: deb http://security.debian.org/ stable/updates main
For dpkg-ftp: ftp://security.debian.org/debian-security dists/stable/updates/main
Mailing list: debian-security-announce@lists.debian.org
Package info: `apt-cache show <pkg>' and http://packages.debian.org/<pkg>
-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.4.2 (GNU/Linux)
iD8DBQFD1I+XW5ql+IAeqTIRAu+tAKCn6zP6GLx6yBNHo0v6lQLJ1MVzjwCfbdlw
H5tTNJAKyaZCWlnJ7PvH+9I=
=ZBTX
-----END PGP SIGNATURE-----