[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

[debian-users:35984] Forward: [SECURITY] [DSA 232-1] New CUPS packages fix several vulnerabilities



ã“ã®DSAã¯potatoã«ã‚‚é©ç”¨ã•ã‚Œã¾ã™ã€‚

ç¾åœ¨ã® Debian 安定版 (3.0 woody) ã«ã‚»ã‚­ãƒ¥ãƒªãƒ†ã‚£ã«é–¢ã™ã‚‹æ·±åˆ»ãªå•é¡ŒãŒç™ºè¦‹
ã•ã‚Œã¾ã—ãŸã€‚

対象パッケージ: cupsys

対処済ã¿ã®ãƒ‘ッケージã«æ›´æ–°ã™ã‚‹ã«ã¯ã€

deb http://security.debian.org/ stable/updates main contrib non-free

ã‚’ /etc/apt/sources.list ã«è¿½åŠ ã—ã€

apt-get update ; apt-get upgrade

を実行ã—ã¦ãã ã•ã„。

詳細ã«ã¤ã„ã¦ã¯æ·»ä»˜ã®ã‚¢ãƒŠã‚¦ãƒ³ã‚¹ã‚’ã”覧ãã ã•ã„。

--- Begin Message ---
-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

- --------------------------------------------------------------------------
Debian Security Advisory DSA 232-1                     security@debian.org
http://www.debian.org/security/                             Martin Schulze
January 20th, 2003                      http://www.debian.org/security/faq
- --------------------------------------------------------------------------

Package        : cupsys
Vulnerability  : several
Problem-type   : remote
Debian-specific: no
CVE Id         : CAN-2002-1366 CAN-2002-1367 CAN-2002-1368 CAN-2002-1369 CAN-2002-1371 CAN-2002-1372 CAN-2002-1383 CAN-2002-1384

Multiple vulnerabilities were discovered in the Common Unix Printing
System (CUPS).  Several of these issues represent the potential for a
remote compromise or denial of service.  The Common Vulnerabilities
and Exposures project identifies the following problems:

 . CAN-2002-1383: Multiple integer overflows allow a remote attacker
   to execute arbitrary code via the CUPSd HTTP interface and the
   image handling code in CUPS filters.

 . CAN-2002-1366: Race conditions in connection with /etc/cups/certs/
   allow local users with lp privileges to create or overwrite
   arbitrary files.  This is not present in the potato version.

 . CAN-2002-1367: This vulnerabilities allows a remote attacker to add
   printers without authentication via a certain UDP packet, which can
   then be used to perform unauthorized activities such as stealing
   the local root certificate for the administration server via a
   "need authorization" page.

 . CAN-2002-1368: Negative lengths fed into memcpy() can cause a
   denial of service and possibly execute arbitrary code.

 . CAN-2002-1369: An unsafe strncat() function call processing the
   options string allows a remote attacker to execute arbitrary code
   via a buffer overflow.

 . CAN-2002-1371: Zero width images allows a remote attacker to
   execute arbitrary code via modified chunk headers.

 . CAN-2002-1372: CUPS does not properly check the return values of
   various file and socket operations, which could allow a remote
   attacker to cause a denial of service.

 . CAN-2002-1384: The cupsys package contains some code from the xpdf
   package, used to convert PDF files for printing, which contains an
   exploitable integer overflow bug.  This is not present in the
   potato version.

Even though we tried very hard to fix all problems in the packages for
potato as well, the packages may still contain other security related
problems.  Hence, we advise users of potato systems using CUPS to
upgrade to woody soon.

For the current stable distribution (woody), these problems have been fixed
in version 1.1.14-4.3.

For the old stable distribution (potato), these problems have been fixed
in version 1.0.4-12.1.

For the unstable distribution (sid), these problems have been fixed in
version 1.1.18-1.

We recommend that you upgrade your CUPS packages immediately.


Upgrade Instructions
- --------------------

wget url
        will fetch the file for you
dpkg -i file.deb
        will install the referenced file.

If you are using the apt-get package manager, use the line for
sources.list as given below:

apt-get update
        will update the internal database
apt-get upgrade
        will install corrected packages

You may use an automated update by adding the resources from the
footer to the proper configuration.


Debian GNU/Linux 2.2 alias potato
- ---------------------------------

  Source archives:

    http://security.debian.org/pool/updates/main/c/cupsys/cupsys_1.0.4-12.1.dsc
      Size/MD5 checksum:      640 4dc208e40f63d9489096094c816e0aab
    http://security.debian.org/pool/updates/main/c/cupsys/cupsys_1.0.4-12.1.diff.gz
      Size/MD5 checksum:    31087 d27ef43f96213e35a3fcd43aa14a4b5a
    http://security.debian.org/pool/updates/main/c/cupsys/cupsys_1.0.4.orig.tar.gz
      Size/MD5 checksum:  3147998 d753d8b3c2506a9b97bf4f22ca53f38b

  Alpha architecture:

    http://security.debian.org/pool/updates/main/c/cupsys/cupsys_1.0.4-12.1_alpha.deb
      Size/MD5 checksum:  2438248 aaa4524a445c43d51d45325f18a21a0e
    http://security.debian.org/pool/updates/main/c/cupsys/cupsys-bsd_1.0.4-12.1_alpha.deb
      Size/MD5 checksum:    18050 34e299da4303b82a38a897d3574a430a
    http://security.debian.org/pool/updates/main/c/cupsys/libcupsys1_1.0.4-12.1_alpha.deb
      Size/MD5 checksum:    87808 d7c294281899ab7a8e8d8158ff3d19bc
    http://security.debian.org/pool/updates/main/c/cupsys/libcupsys1-dev_1.0.4-12.1_alpha.deb
      Size/MD5 checksum:   117740 6342f1a851a3075493f277548613fb91

  ARM architecture:

    http://security.debian.org/pool/updates/main/c/cupsys/cupsys_1.0.4-12.1_arm.deb
      Size/MD5 checksum:  2335642 eb5abc77ec982a103cb99fd1ae44fb8e
    http://security.debian.org/pool/updates/main/c/cupsys/cupsys-bsd_1.0.4-12.1_arm.deb
      Size/MD5 checksum:    17042 54db853e04f164bdb6f7c3780a770f45
    http://security.debian.org/pool/updates/main/c/cupsys/libcupsys1_1.0.4-12.1_arm.deb
      Size/MD5 checksum:    64726 cac8881dd707af979bcc3b2c0774f7ad
    http://security.debian.org/pool/updates/main/c/cupsys/libcupsys1-dev_1.0.4-12.1_arm.deb
      Size/MD5 checksum:    92574 f493560542d625644d3675fbf31a5c32

  Intel IA-32 architecture:

    http://security.debian.org/pool/updates/main/c/cupsys/cupsys_1.0.4-12.1_i386.deb
      Size/MD5 checksum:  2295330 3e977f66990a5d169d24088c22ffba34
    http://security.debian.org/pool/updates/main/c/cupsys/cupsys-bsd_1.0.4-12.1_i386.deb
      Size/MD5 checksum:    16746 d101cceb0b1929b21e8fa16b688b43aa
    http://security.debian.org/pool/updates/main/c/cupsys/libcupsys1_1.0.4-12.1_i386.deb
      Size/MD5 checksum:    64790 9db4d79646e4e69a763f9f73d87124a1
    http://security.debian.org/pool/updates/main/c/cupsys/libcupsys1-dev_1.0.4-12.1_i386.deb
      Size/MD5 checksum:    83146 d62c83955dfb01d44c95a4e0066f4760

  Motorola 680x0 architecture:

    http://security.debian.org/pool/updates/main/c/cupsys/cupsys_1.0.4-12.1_m68k.deb
      Size/MD5 checksum:  2244722 e16fc52c24c8c89151e104292a6c598c
    http://security.debian.org/pool/updates/main/c/cupsys/cupsys-bsd_1.0.4-12.1_m68k.deb
      Size/MD5 checksum:    16246 94271dc6ccfd72526b5a991b6506fd93
    http://security.debian.org/pool/updates/main/c/cupsys/libcupsys1_1.0.4-12.1_m68k.deb
      Size/MD5 checksum:    60086 91f8d44a474e0258ab10c307ffe0099e
    http://security.debian.org/pool/updates/main/c/cupsys/libcupsys1-dev_1.0.4-12.1_m68k.deb
      Size/MD5 checksum:    76130 28bb402a4bcf5ed618089e7ef7d99650

  PowerPC architecture:

    http://security.debian.org/pool/updates/main/c/cupsys/cupsys_1.0.4-12.1_powerpc.deb
      Size/MD5 checksum:  2331374 889a07299be40970d018fc3a1415dbb4
    http://security.debian.org/pool/updates/main/c/cupsys/cupsys-bsd_1.0.4-12.1_powerpc.deb
      Size/MD5 checksum:    16620 40f83566033cc2e9485a706839415f85
    http://security.debian.org/pool/updates/main/c/cupsys/libcupsys1_1.0.4-12.1_powerpc.deb
      Size/MD5 checksum:    68346 ee6b562330731a40feee359827c2ec32
    http://security.debian.org/pool/updates/main/c/cupsys/libcupsys1-dev_1.0.4-12.1_powerpc.deb
      Size/MD5 checksum:    89548 1eae59dd93ac2f66f0450ca6993fc076

  Sun Sparc architecture:

    http://security.debian.org/pool/updates/main/c/cupsys/cupsys_1.0.4-12.1_sparc.deb
      Size/MD5 checksum:  2348864 9c7717d9a987f034145e8a5de53e5cfa
    http://security.debian.org/pool/updates/main/c/cupsys/cupsys-bsd_1.0.4-12.1_sparc.deb
      Size/MD5 checksum:    16860 7f89e6c646e2fd71fdc64f377d994359
    http://security.debian.org/pool/updates/main/c/cupsys/libcupsys1_1.0.4-12.1_sparc.deb
      Size/MD5 checksum:    71318 654ebb56f716c96073902a978cc3b463
    http://security.debian.org/pool/updates/main/c/cupsys/libcupsys1-dev_1.0.4-12.1_sparc.deb
      Size/MD5 checksum:    89346 06d607a21e84d6fb1b938ea3fcf48d43


Debian GNU/Linux 3.0 alias woody
- --------------------------------

  Source archives:

    http://security.debian.org/pool/updates/main/c/cupsys/cupsys_1.1.14-4.3.dsc
      Size/MD5 checksum:      703 731309263ec48b95ae0cb591d0ee59b4
    http://security.debian.org/pool/updates/main/c/cupsys/cupsys_1.1.14-4.3.diff.gz
      Size/MD5 checksum:    35406 11bfd58a768374b366c6d96f3f94cf7e
    http://security.debian.org/pool/updates/main/c/cupsys/cupsys_1.1.14.orig.tar.gz
      Size/MD5 checksum:  6150756 0dfa41f29fa73e7744903b2471d2ca2f

  Alpha architecture:

    http://security.debian.org/pool/updates/main/c/cupsys/cupsys_1.1.14-4.3_alpha.deb
      Size/MD5 checksum:  1899754 a0b0c290488522117526ae202a7ae2ff
    http://security.debian.org/pool/updates/main/c/cupsys/cupsys-bsd_1.1.14-4.3_alpha.deb
      Size/MD5 checksum:    73784 5f1ce0319d6705a0675fb107f1494697
    http://security.debian.org/pool/updates/main/c/cupsys/cupsys-client_1.1.14-4.3_alpha.deb
      Size/MD5 checksum:    92426 334048c0e66cf45b751209d41b131cef
    http://security.debian.org/pool/updates/main/c/cupsys/cupsys-pstoraster_1.1.14-4.3_alpha.deb
      Size/MD5 checksum:  2445268 02a0f9b14cfd0406b47b4e07699af0ab
    http://security.debian.org/pool/updates/main/c/cupsys/libcupsys2_1.1.14-4.3_alpha.deb
      Size/MD5 checksum:   137294 180a41e8d487fa823428ff6b5feab0e3
    http://security.debian.org/pool/updates/main/c/cupsys/libcupsys2-dev_1.1.14-4.3_alpha.deb
      Size/MD5 checksum:   180072 366b240f494c595371ebf0aa76495968

  ARM architecture:

    http://security.debian.org/pool/updates/main/c/cupsys/cupsys_1.1.14-4.3_arm.deb
      Size/MD5 checksum:  1821218 1a5a7b2f99adf59214af6310b528aaca
    http://security.debian.org/pool/updates/main/c/cupsys/cupsys-bsd_1.1.14-4.3_arm.deb
      Size/MD5 checksum:    67920 2e131a508ef69a99d4f31e00accd613f
    http://security.debian.org/pool/updates/main/c/cupsys/cupsys-client_1.1.14-4.3_arm.deb
      Size/MD5 checksum:    85106 89733fd8e141b714612e3fbe88aaf618
    http://security.debian.org/pool/updates/main/c/cupsys/cupsys-pstoraster_1.1.14-4.3_arm.deb
      Size/MD5 checksum:  2345270 1fd92dd3592d46102c123525ffba924f
    http://security.debian.org/pool/updates/main/c/cupsys/libcupsys2_1.1.14-4.3_arm.deb
      Size/MD5 checksum:   112238 37ba72995818f8d118ef364f8457361c
    http://security.debian.org/pool/updates/main/c/cupsys/libcupsys2-dev_1.1.14-4.3_arm.deb
      Size/MD5 checksum:   149648 c0bcd3073c939bfe51c2ef6cc9271302

  Intel IA-32 architecture:

    http://security.debian.org/pool/updates/main/c/cupsys/cupsys_1.1.14-4.3_i386.deb
      Size/MD5 checksum:  1787724 09165107e5638a2ea9bafe23d12dbc22
    http://security.debian.org/pool/updates/main/c/cupsys/cupsys-bsd_1.1.14-4.3_i386.deb
      Size/MD5 checksum:    67420 c9b102f68e45060fc20b0453f2e985c2
    http://security.debian.org/pool/updates/main/c/cupsys/cupsys-client_1.1.14-4.3_i386.deb
      Size/MD5 checksum:    83568 b7b51133931295233b995a986acf730b
    http://security.debian.org/pool/updates/main/c/cupsys/cupsys-pstoraster_1.1.14-4.3_i386.deb
      Size/MD5 checksum:  2311406 cad54ef5642381a95566137fc5e490e9
    http://security.debian.org/pool/updates/main/c/cupsys/libcupsys2_1.1.14-4.3_i386.deb
      Size/MD5 checksum:   110296 cbbb26f20387c8045599bba4d5067541
    http://security.debian.org/pool/updates/main/c/cupsys/libcupsys2-dev_1.1.14-4.3_i386.deb
      Size/MD5 checksum:   135740 b75c3c6e99eb435e55a20b2633edcae5

  Intel IA-64 architecture:

    http://security.debian.org/pool/updates/main/c/cupsys/cupsys_1.1.14-4.3_ia64.deb
      Size/MD5 checksum:  2007820 1c6de4f61f495706a1e7e0e3e5bcf8b2
    http://security.debian.org/pool/updates/main/c/cupsys/cupsys-bsd_1.1.14-4.3_ia64.deb
      Size/MD5 checksum:    76856 af4f10ddbbf39d2192b42c6b0e16cfe7
    http://security.debian.org/pool/updates/main/c/cupsys/cupsys-client_1.1.14-4.3_ia64.deb
      Size/MD5 checksum:    96580 0204b611074a972894e8a3b3c2c4eaee
    http://security.debian.org/pool/updates/main/c/cupsys/cupsys-pstoraster_1.1.14-4.3_ia64.deb
      Size/MD5 checksum:  2656224 6572d4626c36636f5479b852472a154c
    http://security.debian.org/pool/updates/main/c/cupsys/libcupsys2_1.1.14-4.3_ia64.deb
      Size/MD5 checksum:   155042 f1cf6145bec0858378f78e65ff2a079c
    http://security.debian.org/pool/updates/main/c/cupsys/libcupsys2-dev_1.1.14-4.3_ia64.deb
      Size/MD5 checksum:   181986 09e81033fb7faf00339955ac17e493c5

  HP Precision architecture:

    http://security.debian.org/pool/updates/main/c/cupsys/cupsys_1.1.14-4.3_hppa.deb
      Size/MD5 checksum:  1881256 ee399012eb45487e1e83d30c9a10174b
    http://security.debian.org/pool/updates/main/c/cupsys/cupsys-bsd_1.1.14-4.3_hppa.deb
      Size/MD5 checksum:    70232 a3949939d591d301d7e209c6ea5a36ed
    http://security.debian.org/pool/updates/main/c/cupsys/cupsys-client_1.1.14-4.3_hppa.deb
      Size/MD5 checksum:    89246 0b2314247edf8a9476392b7bc67c2ac0
    http://security.debian.org/pool/updates/main/c/cupsys/cupsys-pstoraster_1.1.14-4.3_hppa.deb
      Size/MD5 checksum:  2455474 c1792566e4cc052c7ca7b88bed96424a
    http://security.debian.org/pool/updates/main/c/cupsys/libcupsys2_1.1.14-4.3_hppa.deb
      Size/MD5 checksum:   125938 58143366bbacda6689e29612a05acd9b
    http://security.debian.org/pool/updates/main/c/cupsys/libcupsys2-dev_1.1.14-4.3_hppa.deb
      Size/MD5 checksum:   158762 5836cf0d3768ede7d67a23523457baa2

  Motorola 680x0 architecture:

    http://security.debian.org/pool/updates/main/c/cupsys/cupsys_1.1.14-4.3_m68k.deb
      Size/MD5 checksum:  1754948 d6640d147a05f075158590191e80af7c
    http://security.debian.org/pool/updates/main/c/cupsys/cupsys-bsd_1.1.14-4.3_m68k.deb
      Size/MD5 checksum:    65696 667e3dd5023a876908702c5f2e0071e8
    http://security.debian.org/pool/updates/main/c/cupsys/cupsys-client_1.1.14-4.3_m68k.deb
      Size/MD5 checksum:    80820 2c71139899e3d9e9b992c230f4a5c97e
    http://security.debian.org/pool/updates/main/c/cupsys/cupsys-pstoraster_1.1.14-4.3_m68k.deb
      Size/MD5 checksum:  2260812 73049e9e3f2ad0fdfab6beb1a7d1cf0e
    http://security.debian.org/pool/updates/main/c/cupsys/libcupsys2_1.1.14-4.3_m68k.deb
      Size/MD5 checksum:   105532 2cbfd4ba400ca04caa39cba0a0f747c7
    http://security.debian.org/pool/updates/main/c/cupsys/libcupsys2-dev_1.1.14-4.3_m68k.deb
      Size/MD5 checksum:   128090 3947055497519ffaa0890036e93fc24a

  Big endian MIPS architecture:

    http://security.debian.org/pool/updates/main/c/cupsys/cupsys_1.1.14-4.3_mips.deb
      Size/MD5 checksum:  1811434 e9da6135a9df048682b179d2908fa8d7
    http://security.debian.org/pool/updates/main/c/cupsys/cupsys-bsd_1.1.14-4.3_mips.deb
      Size/MD5 checksum:    67348 ed057f08a3bafd3634a2ef6e7eab5b5a
    http://security.debian.org/pool/updates/main/c/cupsys/cupsys-client_1.1.14-4.3_mips.deb
      Size/MD5 checksum:    80794 ec9c303425b6c7ca0bedb340a8201f97
    http://security.debian.org/pool/updates/main/c/cupsys/cupsys-pstoraster_1.1.14-4.3_mips.deb
      Size/MD5 checksum:  2404100 12f65dac839b6d2d55a1f0276e7977ee
    http://security.debian.org/pool/updates/main/c/cupsys/libcupsys2_1.1.14-4.3_mips.deb
      Size/MD5 checksum:   112088 819aeef46301ba2c8166af1cad942ff0
    http://security.debian.org/pool/updates/main/c/cupsys/libcupsys2-dev_1.1.14-4.3_mips.deb
      Size/MD5 checksum:   150376 b733e7eb1639ecae09a7c2c4f6ea9843

  Little endian MIPS architecture:

    http://security.debian.org/pool/updates/main/c/cupsys/cupsys_1.1.14-4.3_mipsel.deb
      Size/MD5 checksum:  1812224 719c8d133b723c67ccfef6a900f7e2ef
    http://security.debian.org/pool/updates/main/c/cupsys/cupsys-bsd_1.1.14-4.3_mipsel.deb
      Size/MD5 checksum:    67320 6162a88599d2bc21cead4e3ee5b831cf
    http://security.debian.org/pool/updates/main/c/cupsys/cupsys-client_1.1.14-4.3_mipsel.deb
      Size/MD5 checksum:    80814 9b42a74de3e7e01b9987b4f53f860364
    http://security.debian.org/pool/updates/main/c/cupsys/cupsys-pstoraster_1.1.14-4.3_mipsel.deb
      Size/MD5 checksum:  2406454 52841d08e5547fd033b0166c841ca5b8
    http://security.debian.org/pool/updates/main/c/cupsys/libcupsys2_1.1.14-4.3_mipsel.deb
      Size/MD5 checksum:   111808 461bc2686de9f820e838bace6bcc1ffb
    http://security.debian.org/pool/updates/main/c/cupsys/libcupsys2-dev_1.1.14-4.3_mipsel.deb
      Size/MD5 checksum:   150196 7efb68d1171369bb54c9e782928d5497

  PowerPC architecture:

    http://security.debian.org/pool/updates/main/c/cupsys/cupsys_1.1.14-4.3_powerpc.deb
      Size/MD5 checksum:  1799712 5e5226117797dbdf5d7689303596a394
    http://security.debian.org/pool/updates/main/c/cupsys/cupsys-bsd_1.1.14-4.3_powerpc.deb
      Size/MD5 checksum:    67330 86410befd2ea69507a51f71ed823f918
    http://security.debian.org/pool/updates/main/c/cupsys/cupsys-client_1.1.14-4.3_powerpc.deb
      Size/MD5 checksum:    82924 4744992e3df7a94df6a3f4cbbe023c28
    http://security.debian.org/pool/updates/main/c/cupsys/cupsys-pstoraster_1.1.14-4.3_powerpc.deb
      Size/MD5 checksum:  2359234 fd1f62c0a8f9a323739193101094490d
    http://security.debian.org/pool/updates/main/c/cupsys/libcupsys2_1.1.14-4.3_powerpc.deb
      Size/MD5 checksum:   116026 818379da14940b9ea9005194b648af65
    http://security.debian.org/pool/updates/main/c/cupsys/libcupsys2-dev_1.1.14-4.3_powerpc.deb
      Size/MD5 checksum:   144332 d7d5380c7ae4cfce492702f1db4b9376

  IBM S/390 architecture:

    http://security.debian.org/pool/updates/main/c/cupsys/cupsys_1.1.14-4.3_s390.deb
      Size/MD5 checksum:  1794976 48433fc4e46a79f6ae5fda1188ef876e
    http://security.debian.org/pool/updates/main/c/cupsys/cupsys-bsd_1.1.14-4.3_s390.deb
      Size/MD5 checksum:    68726 77be9718f9b8e591741de9593376e487
    http://security.debian.org/pool/updates/main/c/cupsys/cupsys-client_1.1.14-4.3_s390.deb
      Size/MD5 checksum:    85452 63aa415bcc67611fd6e1cc1878997c99
    http://security.debian.org/pool/updates/main/c/cupsys/cupsys-pstoraster_1.1.14-4.3_s390.deb
      Size/MD5 checksum:  2337080 22caf75ee1a362e738dd213d404a93ab
    http://security.debian.org/pool/updates/main/c/cupsys/libcupsys2_1.1.14-4.3_s390.deb
      Size/MD5 checksum:   114600 82d05e55a06f699d03eae259fb36e4b8
    http://security.debian.org/pool/updates/main/c/cupsys/libcupsys2-dev_1.1.14-4.3_s390.deb
      Size/MD5 checksum:   140140 bf46320d0fe2af6de8461bcfeea5165b

  Sun Sparc architecture:

    http://security.debian.org/pool/updates/main/c/cupsys/cupsys_1.1.14-4.3_sparc.deb
      Size/MD5 checksum:  1844650 ac5ea5b374299e68779dcbbfa6d25423
    http://security.debian.org/pool/updates/main/c/cupsys/cupsys-bsd_1.1.14-4.3_sparc.deb
      Size/MD5 checksum:    70292 12590365cf4023189e815371d4099e33
    http://security.debian.org/pool/updates/main/c/cupsys/cupsys-client_1.1.14-4.3_sparc.deb
      Size/MD5 checksum:    83726 9bde67d3c4d371d41f0a332a263240ee
    http://security.debian.org/pool/updates/main/c/cupsys/cupsys-pstoraster_1.1.14-4.3_sparc.deb
      Size/MD5 checksum:  2354114 8525f1296681d5e77d5c0c64b9554576
    http://security.debian.org/pool/updates/main/c/cupsys/libcupsys2_1.1.14-4.3_sparc.deb
      Size/MD5 checksum:   119750 894d0f5c439332d26d85c2aa3bee2693
    http://security.debian.org/pool/updates/main/c/cupsys/libcupsys2-dev_1.1.14-4.3_sparc.deb
      Size/MD5 checksum:   145916 ef0a899b95e949cb3991ffb81a29110c


  These files will probably be moved into the stable distribution on
  its next revision.

- ---------------------------------------------------------------------------------
For apt-get: deb http://security.debian.org/ stable/updates main
For dpkg-ftp: ftp://security.debian.org/debian-security dists/stable/updates/main
Mailing list: debian-security-announce@lists.debian.org
Package info: `apt-cache show <pkg>' and http://packages.debian.org/<pkg>

-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.2.1 (GNU/Linux)

iD8DBQE+LBpTW5ql+IAeqTIRAreNAJ45+921LpFIYI/b6pDwaQx7dj346QCeLfrp
7daTEgL4smJLWi/6/A2tN5w=
=FTml
-----END PGP SIGNATURE-----


-- 
To UNSUBSCRIBE, email to debian-security-announce-request@lists.debian.org
with a subject of "unsubscribe". Trouble? Contact listmaster@lists.debian.org

--- End Message ---