Accepted libreoffice 1:3.5.4+dfsg2-0+deb7u9 (source all amd64) into oldstable
-BEGIN PGP SIGNED MESSAGE- Hash: SHA256 Format: 1.8 Date: Sun, 23 Apr 2017 17:42:11 +0200 Source: libreoffice Binary: libreoffice libreoffice-l10n-za libreoffice-l10n-in libreoffice-core libreoffice-common libreoffice-java-common libreoffice-writer libreoffice-calc libreoffice-impress libreoffice-draw libreoffice-math libreoffice-base-core libreoffice-base libreoffice-style-crystal libreoffice-style-oxygen libreoffice-style-tango libreoffice-style-hicontrast libreoffice-style-galaxy libreoffice-gtk libreoffice-gtk3 libreoffice-gnome libreoffice-emailmerge python-uno python3-uno libreoffice-officebean libreoffice-filter-mobiledev openoffice.org-dtd-officedocument1.0 libreoffice-script-provider-python libreoffice-script-provider-bsh libreoffice-script-provider-js libreoffice-l10n-af libreoffice-l10n-ar libreoffice-l10n-as libreoffice-l10n-ast libreoffice-l10n-be libreoffice-l10n-bg libreoffice-l10n-bn libreoffice-l10n-br libreoffice-l10n-bs libreoffice-l10n-ca libreoffice-l10n-cs libreoffice-l10n-cy libreoffice-l10n-da libreoffice-l10n-de libreoffice-l10n-dz libreoffice-l10n-el libreoffice-l10n-en-gb libreoffice-l10n-en-za libreoffice-l10n-eo libreoffice-l10n-es libreoffice-l10n-et libreoffice-l10n-eu libreoffice-l10n-fa libreoffice-l10n-fi libreoffice-l10n-fr libreoffice-l10n-ga libreoffice-l10n-gl libreoffice-l10n-gu libreoffice-l10n-he libreoffice-l10n-hi libreoffice-l10n-hr libreoffice-l10n-hu libreoffice-l10n-id libreoffice-l10n-is libreoffice-l10n-it libreoffice-l10n-ja libreoffice-l10n-ka libreoffice-l10n-km libreoffice-l10n-ko libreoffice-l10n-ku libreoffice-l10n-lt libreoffice-l10n-lv libreoffice-l10n-mk libreoffice-l10n-mn libreoffice-l10n-ml libreoffice-l10n-mr libreoffice-l10n-nb libreoffice-l10n-ne libreoffice-l10n-nl libreoffice-l10n-nn libreoffice-l10n-nr libreoffice-l10n-nso libreoffice-l10n-oc libreoffice-l10n-om libreoffice-l10n-or libreoffice-l10n-pa-in libreoffice-l10n-pl libreoffice-l10n-pt libreoffice-l10n-pt-br libreoffice-l10n-ro libreoffice-l10n-ru libreoffice-l10n-rw libreoffice-l10n-si libreoffice-l10n-sk libreoffice-l10n-sl libreoffice-l10n-sr libreoffice-l10n-ss libreoffice-l10n-st libreoffice-l10n-sv libreoffice-l10n-ta libreoffice-l10n-te libreoffice-l10n-tg libreoffice-l10n-th libreoffice-l10n-tn libreoffice-l10n-tr libreoffice-l10n-ts libreoffice-l10n-ug libreoffice-l10n-uk libreoffice-l10n-uz libreoffice-l10n-ve libreoffice-l10n-vi libreoffice-l10n-xh libreoffice-l10n-zh-cn libreoffice-l10n-zh-tw libreoffice-l10n-zu libreoffice-help-en-us libreoffice-help-ca libreoffice-help-cs libreoffice-help-da libreoffice-help-de libreoffice-help-dz libreoffice-help-el libreoffice-help-en-gb libreoffice-help-es libreoffice-help-et libreoffice-help-eu libreoffice-help-fi libreoffice-help-fr libreoffice-help-gl libreoffice-help-hi libreoffice-help-hu libreoffice-help-it libreoffice-help-ja libreoffice-help-km libreoffice-help-ko libreoffice-help-nl libreoffice-help-om libreoffice-help-pl libreoffice-help-pt libreoffice-help-pt-br libreoffice-help-ru libreoffice-help-sk libreoffice-help-sl libreoffice-help-sv libreoffice-help-zh-cn libreoffice-help-zh-tw uno-libs3 uno-libs3-dbg ure ure-dbg libreoffice-gcj libreoffice-ogltrans libreoffice-wiki-publisher libreoffice-report-builder libreoffice-report-builder-bin libreoffice-presentation-minimizer libreoffice-presenter-console libreoffice-pdfimport fonts-opensymbol ttf-opensymbol libreoffice-dbg libreoffice-dev libreoffice-dev-doc libreoffice-kde libreoffice-sdbc-postgresql libreoffice-mysql-connector libreoffice-evolution libreoffice-filter-binfilter Architecture: source all amd64 Version: 1:3.5.4+dfsg2-0+deb7u9 Distribution: wheezy-security Urgency: high Maintainer: Debian LibreOffice MaintainersChanged-By: Emilio Pozuelo Monfort Description: fonts-opensymbol - OpenSymbol TrueType font libreoffice - office productivity suite libreoffice-base - office productivity suite -- database libreoffice-base-core - office productivity suite -- shared library libreoffice-calc - office productivity suite -- spreadsheet libreoffice-common - office productivity suite -- arch-independent files libreoffice-core - office productivity suite -- arch-dependent files libreoffice-dbg - office productivity suite -- debug symbols libreoffice-dev - office productivity suite -- SDK libreoffice-dev-doc - office productivity suite -- SDK documentation libreoffice-draw - office productivity suite -- drawing libreoffice-emailmerge - office productivity suite -- email mail merge libreoffice-evolution - office productivity suite -- Evolution addressbook support libreoffice-filter-binfilter - office productivity suite -- legacy filters (e.g. StarOffice 5.2) libreoffice-filter-mobiledev - office productivity suite -- mobile devices filters libreoffice-gcj - office productivity suite -- Java libraries for GIJ libreoffice-gnome - office
Re: Wheezy update of batik?
On 23/04/17 21:50, Ola Lundqvist wrote: > Dear maintainer(s), > > The Debian LTS team would like to fix the security issues which are > currently open in the Wheezy version of batik: > https://security-tracker.debian.org/tracker/CVE-2017-5662 FWIW I investigated this a bit and there doesn't seem to be any details other than what is in the advisory: i.e. I couldn't find the commit that fixes this (looking at the svn repository) or an upstream bug report. I found a security-related one, reported by Lars Krapf (as mentioned in the oss-security mail) but that seemed different than CVE-2017-5662 and much older (see [1]). Also our 1.8 and the upstream 1.9 tarballs have different layouts so it's hard to compare them. Cheers, Emilio [1] https://issues.apache.org/jira/browse/BATIK-1139
Wheezy update of botan1.10?
Dear maintainer(s), The Debian LTS team would like to fix the security issues which are currently open in the Wheezy version of botan1.10: https://security-tracker.debian.org/tracker/CVE-2017-2801 Would you like to take care of this yourself? If yes, please follow the workflow we have defined here: https://wiki.debian.org/LTS/Development If that workflow is a burden to you, feel free to just prepare an updated source package and send it to debian-lts@lists.debian.org (via a debdiff, or with an URL pointing to the source package, or even with a pointer to your packaging repository), and the members of the LTS team will take care of the rest. Indicate clearly whether you have tested the updated package or not. If you don't want to take care of this update, it's not a problem, we will do our best with your package. Just let us know whether you would like to review and/or test the updated package before it gets released. You can also opt-out from receiving future similar emails in your answer and then the LTS Team will take care of botan1.10 updates for the LTS releases. Thank you very much. Ola Lundqvist, on behalf of the Debian LTS team. PS: A member of the LTS team might start working on this update at any point in time. You can verify whether someone is registered on this update in this file: https://anonscm.debian.org/viewvc/secure-testing/data/dla-needed.txt?view=markup
Wheezy update of minicom?
Dear maintainer(s), The Debian LTS team would like to fix the security issues which are currently open in the Wheezy version of minicom: https://security-tracker.debian.org/tracker/CVE-2017-7467 Would you like to take care of this yourself? If yes, please follow the workflow we have defined here: https://wiki.debian.org/LTS/Development If that workflow is a burden to you, feel free to just prepare an updated source package and send it to debian-lts@lists.debian.org (via a debdiff, or with an URL pointing to the source package, or even with a pointer to your packaging repository), and the members of the LTS team will take care of the rest. Indicate clearly whether you have tested the updated package or not. If you don't want to take care of this update, it's not a problem, we will do our best with your package. Just let us know whether you would like to review and/or test the updated package before it gets released. You can also opt-out from receiving future similar emails in your answer and then the LTS Team will take care of minicom updates for the LTS releases. Thank you very much. Ola Lundqvist, on behalf of the Debian LTS team. PS: A member of the LTS team might start working on this update at any point in time. You can verify whether someone is registered on this update in this file: https://anonscm.debian.org/viewvc/secure-testing/data/dla-needed.txt?view=markup
Wheezy update of batik?
Dear maintainer(s), The Debian LTS team would like to fix the security issues which are currently open in the Wheezy version of batik: https://security-tracker.debian.org/tracker/CVE-2017-5662 Would you like to take care of this yourself? If yes, please follow the workflow we have defined here: https://wiki.debian.org/LTS/Development If that workflow is a burden to you, feel free to just prepare an updated source package and send it to debian-lts@lists.debian.org (via a debdiff, or with an URL pointing to the source package, or even with a pointer to your packaging repository), and the members of the LTS team will take care of the rest. Indicate clearly whether you have tested the updated package or not. If you don't want to take care of this update, it's not a problem, we will do our best with your package. Just let us know whether you would like to review and/or test the updated package before it gets released. You can also opt-out from receiving future similar emails in your answer and then the LTS Team will take care of batik updates for the LTS releases. Thank you very much. Ola Lundqvist, on behalf of the Debian LTS team. PS: A member of the LTS team might start working on this update at any point in time. You can verify whether someone is registered on this update in this file: https://anonscm.debian.org/viewvc/secure-testing/data/dla-needed.txt?view=markup
Wheezy update of fop?
Dear maintainer(s), The Debian LTS team would like to fix the security issues which are currently open in the Wheezy version of fop: https://security-tracker.debian.org/tracker/CVE-2017-5661 Would you like to take care of this yourself? If yes, please follow the workflow we have defined here: https://wiki.debian.org/LTS/Development If that workflow is a burden to you, feel free to just prepare an updated source package and send it to debian-lts@lists.debian.org (via a debdiff, or with an URL pointing to the source package, or even with a pointer to your packaging repository), and the members of the LTS team will take care of the rest. Indicate clearly whether you have tested the updated package or not. If you don't want to take care of this update, it's not a problem, we will do our best with your package. Just let us know whether you would like to review and/or test the updated package before it gets released. You can also opt-out from receiving future similar emails in your answer and then the LTS Team will take care of fop updates for the LTS releases. Thank you very much. Ola Lundqvist, on behalf of the Debian LTS team. PS: A member of the LTS team might start working on this update at any point in time. You can verify whether someone is registered on this update in this file: https://anonscm.debian.org/viewvc/secure-testing/data/dla-needed.txt?view=markup
Mysql 5.5.55
Hi Lars, I see that you already started preparing MySQL 5.5.55 for wheezy in https://anonscm.debian.org/cgit/pkg-mysql/mysql-5.5.git/log/?h=debian/wheezy If you want I can upload the package and send the announcement. Just let me know when you're done with the update (at least I think the changelog needs to be updated). Cheers, Emilio
testing jasper for Wheezy LTS
Hi everybody, I uploaded version 1.900.1-13+deb7u6 of jasper to: https://people.debian.org/~alteholz/packages/wheezy-lts/jasper/amd64/ Please give it a try and tell me about any problems you met. If you use jasper for your own projects, I would be also interested whether you can still build it with that new version. Thanks! Thorsten * CVE-2016-9591 Use-after-free on heap in jas_matrix_destroy The vulnerability exists in code responsible for re-encoding the decoded input image file to a JP2 image. The vulnerability is caused by not setting related pointers to be null after the pointers are freed (i.e. missing Setting-Pointer-Null operations after free). The vulnerability can further cause double-free. * CVE-2016-10251 Integer overflow in the jpc_pi_nextcprl function in jpc_t2cod.c in JasPer before 1.900.20 allows remote attackers to have unspecified impact via a crafted file, which triggers use of an uninitialized value. * fix for TEMP-CVE from last upload to avoid hassle with SIZE_MAX
[SECURITY] [DLA 909-1] libcroco security update
-BEGIN PGP SIGNED MESSAGE- Hash: SHA256 Package: libcroco Version: 0.6.6-2+deb7u1 CVE ID : CVE-2017-7960 CVE-2017-7961 Debian Bug : 860961 CVE-2017-7960 A heap-based buffer over-read vulnerability could be triggered remotely via a crafted CSS file to cause a denial of service. CVE-2017-7961 An "outside the range of representable values of type long" undefined behavior issue was found in libcroco, which might allow remote attackers to cause a denial of service (application crash) or possibly have unspecified other impact via a crafted CSS file. For Debian 7 "Wheezy", these problems have been fixed in version 0.6.6-2+deb7u1. We recommend that you upgrade your libcroco packages. Further information about Debian LTS security advisories, how to apply these updates to your system and frequently asked questions can be found at: https://wiki.debian.org/LTS -BEGIN PGP SIGNATURE- iQIzBAEBCAAdFiEEcJymx+vmJZxd92Q+nUbEiOQ2gwIFAlj8lAcACgkQnUbEiOQ2 gwKfrA//QTmxVgaeY2VZ5wEz5LgLHX7J/0LD4p5TOt0Bmuehk6Iqa5k3dF9Wa/EJ TFG1/Q1h6ehED3UX/qvQChQo1ZPrf/R5hEdgTvKm/UOWPj+c+0COsT2eYwmwGjGx XlqBe19ChgfbJSyUdDogG/jIr4DXVfi8Lsmk22fJUzMNE0HTFRWoA+NaWiO96/IX A4j3f0G9Ujfxmpz0nLV7x52oVxnYgIzC8jBSA2dJ/J0fGeOXqK1ULSpzdmP57DPe GZiYyaVcFrz0QnD2sXygjO9Tiwzk9KzrdAxjKLkoT3LhoXHjF0keMoC1ILoEEQSX wh8Orc4Iap6MbL1OPessn2VsoISqnxwffOidMRq2yt2k3qAz2YFWuDhb96hmI/9r zWMLQ9XHavo2aQl+gtJrXBsqjYCkkndHLORkzNP+FT65bss3c4MXj3fe+QvcLBWu ffzW5gByfdZVeIFH8bti4M8Y3INC2e7Hx+gSJhA6Myxz9p02iPgcKMp0EFhgM3rD CYCm4RR6tHnl387kwp9fl00mSf0JlFftxvMNxY6ynfvNiQ9xefRUlIghCoMG8zLX HAKpNYyBdrk/YviPdz3kFwtw6WVb6TR8o7ons2aLvDS1u1UbYVB1EOzZrv4i8dPd vE/c9TrNHpqawvLoUUOFH/KmnYxueIK5iUJFEbSAPDi6VlQ2ehY= =I3WB -END PGP SIGNATURE-
Accepted libcroco 0.6.6-2+deb7u1 (source amd64) into oldstable
-BEGIN PGP SIGNED MESSAGE- Hash: SHA256 Format: 1.8 Date: Sun, 23 Apr 2017 13:12:05 +0200 Source: libcroco Binary: libcroco3-dev libcroco3 libcroco-tools Architecture: source amd64 Version: 0.6.6-2+deb7u1 Distribution: wheezy-security Urgency: medium Maintainer: Debian GNOME MaintainersChanged-By: Emilio Pozuelo Monfort Description: libcroco-tools - Cascading Style Sheet (CSS) parsing and manipulation toolkit - ut libcroco3 - Cascading Style Sheet (CSS) parsing and manipulation toolkit libcroco3-dev - Cascading Style Sheet (CSS) parsing and manipulation toolkit Closes: 860961 Changes: libcroco (0.6.6-2+deb7u1) wheezy-security; urgency=medium . * CVE-2017-7960-heap-buffer-overflow.patch: - CVE-2017-7960: check end of input before reading from buffer. * CVE-2017-7961-double-to-long-check.patch: - CVE-2017-7961: check color value before converting to long. * The above closes: #860961. Checksums-Sha1: ec0e72c88d4c989dd3581d3f627c2224aee58999 2346 libcroco_0.6.6-2+deb7u1.dsc 62a2a27bbb180d23b55c65d0349a3cb2f4222df8 463920 libcroco_0.6.6.orig.tar.xz 5d7699e39fb36dc6ee0ba7a00f897d17d9483bfd 8224 libcroco_0.6.6-2+deb7u1.debian.tar.gz 447af4ef9cf9bccb8ee0cd8ce6f8ebcbff8546e8 155904 libcroco3-dev_0.6.6-2+deb7u1_amd64.deb 78a1468830415bc13e2e3ea756d8de549daecbd3 133738 libcroco3_0.6.6-2+deb7u1_amd64.deb d63ae3e0f879c04cdcb7e941314ed9c079e045fe 64890 libcroco-tools_0.6.6-2+deb7u1_amd64.deb Checksums-Sha256: c62438cb7a1fcaed368b031fbb5f35e159efb5f8b004857e0faa1241b7b6a898 2346 libcroco_0.6.6-2+deb7u1.dsc 72ecace2f3d016a25f2b923c6d0cc76cced823e94171692c533f6c2088086bd9 463920 libcroco_0.6.6.orig.tar.xz 4375f95f208719c6795ce3fb70cb22bc5b07c2c51d19c9e50193331b66a4a621 8224 libcroco_0.6.6-2+deb7u1.debian.tar.gz 59f304572901a5449ed1f7df2b7b2d673afd5d8578e59cbcda766c89d69e65d8 155904 libcroco3-dev_0.6.6-2+deb7u1_amd64.deb d9497de32a1ab1e657349ff5db96b2531757e17ee60a6d3f620c09a56912f610 133738 libcroco3_0.6.6-2+deb7u1_amd64.deb d0a678333cbdf509265c76fcf4ddc5c102c5cda31da45afdd9b366198f694174 64890 libcroco-tools_0.6.6-2+deb7u1_amd64.deb Files: 6a439901130c554812e77397df06e2ff 2346 libs optional libcroco_0.6.6-2+deb7u1.dsc bc2b2bb80f14e76caed4f76aa3a01070 463920 libs optional libcroco_0.6.6.orig.tar.xz d1a30c679064f5d45c6c7c2ca91154b8 8224 libs optional libcroco_0.6.6-2+deb7u1.debian.tar.gz b76fc85d8f93d75f0f1c4397725edb1e 155904 libdevel optional libcroco3-dev_0.6.6-2+deb7u1_amd64.deb e92bd8a2ad30cd41c2f7974b2406b5e6 133738 libs optional libcroco3_0.6.6-2+deb7u1_amd64.deb 01ad1b8451935bc811e3718933a4e45c 64890 libs optional libcroco-tools_0.6.6-2+deb7u1_amd64.deb -BEGIN PGP SIGNATURE- iQIzBAEBCAAdFiEEcJymx+vmJZxd92Q+nUbEiOQ2gwIFAlj8jw8ACgkQnUbEiOQ2 gwLQ8w/+K/LG1yv3ni2RcbhbM8H10qKLazt/AaWOVVqmgQWTBs3qjP8hIWBz6qYR R4+3y2gojRV8a9F8UZg3k6os8CjbBWrb7fTCy7QO1umUtDCPtOj58+ct8kg4kaAt eS+SK2UqfSkVmBgd4dda2Oj4wKZxAbzL5EWO/D+9kKafmha2vc9VAeFfWrHv5Er5 G41hTRO395DG84g3CR41Qma665rj80wBWTjVQDk8UV6bK6145RbiEztFDGJxIQuH KcmZq3PemvgYD7d9cuNG8eZeTalWMfs0X02dUWUdg4aTxREJuoettDfO0ruww/iA A3KjOJVz38Wa5AB/h2h8FG05eWLLfcl8gKyRjrXdtVOJ3O8Z+RJr/vNKPf4GxSv3 08QJeQOngb1KYDrjkbi18HlOuw7XDGx4IeqmI5QhEBiye+smnjsLkG+FTE595EKb ZEq0OwKsHk28HVqFc6NZaJvnl6n7Z62lMJ4T5DJQC4yYOgS5RPm4ro9lgTBReqKv 33v8B2kFPycyubSsL+dzbH4Fm/g2Bm1q/GklglGo0nr2y78PHkLTehjlTU8fz6Rw oiJfSD9pWBokV7U2Ko19s42+lY3lzec7lHE00XbGrGbKrhA1r/oHLI6pnIDoFpp6 V/fFxM/oMYTqTkSluOfXdFUKVB8nq+4l/u+Izb/g156/LAXRDA0= =oL3h -END PGP SIGNATURE-
[SECURITY] [DLA 908-1] chicken security update
-BEGIN PGP SIGNED MESSAGE- Hash: SHA256 Package: chicken Version: 4.7.0-1+deb7u2 CVE ID : CVE-2017-6949 Debian Bug : 858057 It was found that CHICKEN did not sanitize the size argument when allocating SRFI-4 vectors, which could lead to segfaults or buffer overflows with some sizes. For Debian 7 "Wheezy", these problems have been fixed in version 4.7.0-1+deb7u2. We recommend that you upgrade your chicken packages. Further information about Debian LTS security advisories, how to apply these updates to your system and frequently asked questions can be found at: https://wiki.debian.org/LTS -BEGIN PGP SIGNATURE- iQIzBAEBCAAdFiEEcJymx+vmJZxd92Q+nUbEiOQ2gwIFAlj8f+8ACgkQnUbEiOQ2 gwI2uw/+IQZYxo4VZ+OcHlucFqIv5kOa8A5Tb8quJL5/WW7IL8xva1dWCDgMhP2S 6gZBzJlp+EJBKDCwAujpw+tpYOQN2orKG7WqqtuQZTVOSA6m7A52UuIBnW9xC+qU WqmXvIzEXp6Jt/p71xP7YRcYpy4mbK67DfI8LLIkIMseTu3BAUIZkOLATceAGRZO X27yxn6rtIt6dSw74sG4gRkO8M6Eb7cxETqgV2EDZfcDOaupFtv63CfzG6fuAoEC 9PemSap5Rmv0auJNV7m30YP9/J4xbCoxBNpZrmX/PrFfmE2WeojPmHe6AfMYI9em +oQRm/rRG+Iz13ZNpqxi8oZwD47rhSuZE9R/G8kiMLsRWEbjyqyg5PDwU4UQ7KkH kHuL+X9l/efBqHucnfGRk99DAVMHcyNS3Ik/SpfOcLKLua0JbKetRvO9OB/7nRet uorQ1jcQomYgDPjAvFweGOjhfwXZOuCod0S4cbVrIkvnYSBzaot8XJZQGKEgNy8e vUTSADHAqv3ov5ahw2ttqKf5aNy6LhWJ5icaz6653IaxSFlAoByWYAIj9GQbXA2U 33q2MTqYp9IjdYNP7T7ZPNo1+4JscvdgCf8vTWyrMIFQZ1arCIZn6hS5xR/RcAZg XIEjvxHMi5HSMfk2T7b1LPJ7JZsNj+gvP9AZd/eaYZw3NXTujPI= =FI3f -END PGP SIGNATURE-
Accepted chicken 4.7.0-1+deb7u2 (source amd64) into oldstable
-BEGIN PGP SIGNED MESSAGE- Hash: SHA256 Format: 1.8 Date: Sat, 22 Apr 2017 15:46:59 +0200 Source: chicken Binary: chicken-bin libchicken6 libchicken-dev Architecture: source amd64 Version: 4.7.0-1+deb7u2 Distribution: wheezy-security Urgency: medium Maintainer: Davide Puricelli (evo)Changed-By: Emilio Pozuelo Monfort Description: chicken-bin - Practical and portable Scheme system - compiler libchicken-dev - Practical and portable Scheme system - development libchicken6 - Practical and portable Scheme system - runtime Changes: chicken (4.7.0-1+deb7u2) wheezy-security; urgency=medium . * Non-maintainer upload by the LTS team. * CVE-2017-6949-vector-allocations.patch: range check vector allocations to avoid crashes or buffer overreads. CVE-2017-6949. Checksums-Sha1: cc63df003f34d3bd0cbe7cbbb95a87d12b10965f 1867 chicken_4.7.0-1+deb7u2.dsc a5de10ac27b756d2f60a03f0799ef444becfb675 3390484 chicken_4.7.0.orig.tar.gz 8dae457922e04432737d1ce1aa35e68f4e980859 144059 chicken_4.7.0-1+deb7u2.debian.tar.gz b11637426c4400a494814f639760474246e9731e 1342750 chicken-bin_4.7.0-1+deb7u2_amd64.deb f57ec6ed3c61b9d3aa7c783c2f1f30a8b31407a0 1305930 libchicken6_4.7.0-1+deb7u2_amd64.deb aa7faee00a3b195c189072a46adcd02b87fd8d98 1621564 libchicken-dev_4.7.0-1+deb7u2_amd64.deb Checksums-Sha256: 27875304eccce73c0be119adf02a353880d442a5768d515f56cab5cbde1cf3ee 1867 chicken_4.7.0-1+deb7u2.dsc e1719fa404e73bc95023d54e0d09688329f7da2f217734d27dc6487baf163300 3390484 chicken_4.7.0.orig.tar.gz d473fd6719d43b9ffb09cd67c1af5702a7d1ec5e73addc71f7f6c041472ecfe5 144059 chicken_4.7.0-1+deb7u2.debian.tar.gz 3a5bd5ea725506311cd038e495bf1c040fc9106e71de30756422986662f16548 1342750 chicken-bin_4.7.0-1+deb7u2_amd64.deb 6279b5fe28eecb263274ecfa6262bec6afc636deed2ad4e2ad2ea4fc5ca7d98e 1305930 libchicken6_4.7.0-1+deb7u2_amd64.deb b271cb6f8bac1ae3cd2b82c432dd5e81194b5b195376bf070fcfbe82fb8b8a5b 1621564 libchicken-dev_4.7.0-1+deb7u2_amd64.deb Files: 89a2e551f9e95b0c47f059657b5631f8 1867 interpreters optional chicken_4.7.0-1+deb7u2.dsc 69ee35a78c52b37b84178ffd93d324e9 3390484 interpreters optional chicken_4.7.0.orig.tar.gz 767257638c4e986f8282be6a1cb5ca88 144059 interpreters optional chicken_4.7.0-1+deb7u2.debian.tar.gz 04291453c5d36d3d248dbb1d89cdc792 1342750 lisp optional chicken-bin_4.7.0-1+deb7u2_amd64.deb a20d4207e07385d2d3ad141e49f9610c 1305930 libs optional libchicken6_4.7.0-1+deb7u2_amd64.deb d533b0a1d091e1ceed3a1a8f0dc0804a 1621564 libdevel optional libchicken-dev_4.7.0-1+deb7u2_amd64.deb -BEGIN PGP SIGNATURE- iQIzBAEBCAAdFiEEcJymx+vmJZxd92Q+nUbEiOQ2gwIFAlj8dJsACgkQnUbEiOQ2 gwIX+xAArZBmg4hTkl/2xBQt88cXt+ls2QowepxoeJxBpwOyGUfJ3EOtl7u5UXRW fEN0l7g6xgFImi8xlO8uKc+p3YV4CAVwvTsXu9Kmr3Z3LO+o+v5RcJwsKo+DDNt6 Hy6kbpfFlFjEZNs4NgWwqzAfIdJvUtNY5biFihnsx+hl1vtv7mjWc27EgNyOjxBR gKpJFP5FiKOYy6dIkQ2yqkUi3tYXYvNNsFu1N4adCLWp/87BD0fhr6lQE/ehvsIm S3ny0XFbhKcbaJBql7a8MAo13Yq9rEXhxo1wM1ntdQxO8VwuCyiTSzHkL9OCv+2O NdYlGIL/Zh13qbnzCFFq1KYlSbjftgUn7ypLtr6/RkiNEMfXlc0AfbhoP4oDALmI xDlum1eccH30gGI3bBw/vBha2TzBmHxySa/mecBdQ0hIVKWHZeLV8t9B0Nfwp5jM 0h1Ah/fs7YOaoU7z5AhRFr19DqDu03fVGOe8imSocbTu5SBXJNXRSYE7QSxXx1f3 RhnHSC6AuO48ZJzGVZs/vXyIqVEZhwoNopg0x523GwHmi3rzYMXkEx8dQ3wKdmvE XHCkQYrzYpWIDnUIUcA0JTxMwzWi+7CaDba0N3bQqM/2/Qe+quWupy+MGddYAUE7 Quk8rKgYWFTTUD6arNCDTmsV5Aom04ORxAK9hGi9qVNQLGaYPM0= =QIkO -END PGP SIGNATURE-