On Wed, Sep 05, 2007 at 07:56:21AM +0000, Moritz Muehlenhoff wrote: >-----BEGIN PGP SIGNED MESSAGE----- >Hash: SHA1 > >Format: 1.7 >Date: Sun, 26 Aug 2007 20:54:40 +0000 >Source: librpcsecgss >Binary: librpcsecgss-dev librpcsecgss3 >Architecture: source i386 >Version: 0.14-2etch1 >Distribution: stable-security >Urgency: high >Maintainer: Anibal Monsalve Salazar <[EMAIL PROTECTED]> >Changed-By: Moritz Muehlenhoff <[EMAIL PROTECTED]> >Description: > librpcsecgss-dev - header files and docs for librpcsecgss > librpcsecgss3 - allows secure rpc communication using the rpcsec_gss protocol >Changes: > librpcsecgss (0.14-2etch1) stable-security; urgency=high > . > * Fix buffer overflow in RPCSEC_GSS (CVE-2007-3799).
The line above has a typo, it should read CVE-2007-3999 [¹]. [¹] http://nvd.nist.gov/nvd.cfm?cvename=CVE-2007-3999 >Files: > 253bb12cce7ac18b200108dfcb430b6a 746 libs optional > librpcsecgss_0.14-2etch1.dsc > 0d4cdee46a98731b1b71e30504589281 363503 libs optional > librpcsecgss_0.14.orig.tar.gz > b655fc49163d87b9b0a61ae4ead7721b 1479 libs optional > librpcsecgss_0.14-2etch1.diff.gz > f5482b2709d90570e398c191ccd1893f 41846 libdevel optional > librpcsecgss-dev_0.14-2etch1_i386.deb > 56656d7169d4ac2339a1e5ec705ff68d 31140 libs standard > librpcsecgss3_0.14-2etch1_i386.deb > >-----BEGIN PGP SIGNATURE----- >Version: GnuPG v1.4.6 (GNU/Linux) > >iD8DBQFG0zzAXm3vHE4uyloRAgKoAJ98+SzGrYEQQxP6THvYjJ3WGYxwyQCgyT/f >tLLKzCYLk+I8zoxMuoabGLU= >=IgmG >-----END PGP SIGNATURE----- > > >Accepted: >librpcsecgss-dev_0.14-2etch1_i386.deb > to pool/main/libr/librpcsecgss/librpcsecgss-dev_0.14-2etch1_i386.deb >librpcsecgss3_0.14-2etch1_i386.deb > to pool/main/libr/librpcsecgss/librpcsecgss3_0.14-2etch1_i386.deb >librpcsecgss_0.14-2etch1.diff.gz > to pool/main/libr/librpcsecgss/librpcsecgss_0.14-2etch1.diff.gz >librpcsecgss_0.14-2etch1.dsc > to pool/main/libr/librpcsecgss/librpcsecgss_0.14-2etch1.dsc Aníbal Monsalve Salazar -- http://v7w.com/anibal
signature.asc
Description: Digital signature