Matthias Sutter ist außer Haus. [Virus scanned]

2004-11-24 Thread Matthias . Sutter
Ich werde ab  19.11.2004 nicht im Büro sein. Ich kehre zurück am
27.11.2004.

Ich werde Ihre Nachricht nach meiner Rückkehr beantworten.
Bitte wenden Sie sich bei dringenden Angelegenheiten an Stefan Wiederoder
(-9611)



murphy in sbl.spamhaus.org

2004-11-24 Thread Robert Vangel
I have been seeing a few (quite a few.. due to the amount of lists I am 
subscribed to) messages in my postfix log's about 
murphy.debian.org[146.82.138.6] being blocked due to being present in 
spamhaus.org's SBL list.

Going to spamhaus and entering 146.82.138.6 shows that it isn't in fact 
in the list, and I am quite confused.

Has anyone else been getting this? Is there something odd going on my end...
This email is also a test to see if I get it back through to myself.


smime.p7s
Description: S/MIME Cryptographic Signature


Re: [SECURITY] [DSA 596-1] New sudo packages fix privilege escalation

2004-11-24 Thread David
Hi Martin,
This fix prints a bunch of debugging messages on sudo. Has it been tested!?
David
Martin Schulze wrote:
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1
- --
Debian Security Advisory DSA 596-1 [EMAIL PROTECTED]
http://www.debian.org/security/ Martin Schulze
November 24th, 2004 http://www.debian.org/security/faq
- --
Package: sudo
Vulnerability  : missing input sanitising
Problem-Type   : local
Debian-specific: no
CVE ID : CAN-2004-1051
Debian Bug : 281665
Liam Helmer noticed that sudo, a program that provides limited super
user privileges to specific users, does not clean the environment
sufficiently.  Bash functions and the CDPATH variable are still passed
through to the program running as privileged user, leaving
possibilities to overload system routines.  These vulnerabilities can
only be exploited by users who have been granted limited super user
privileges.
For the stable distribution (woody) these problems have been fixed in
version 1.6.6-1.2.
For the unstable distribution (sid) these problems have been fixed in
version 1.6.8p3.
We recommend that you upgrade your sudo package.
Upgrade Instructions
- 
wget url
will fetch the file for you
dpkg -i file.deb
will install the referenced file.
If you are using the apt-get package manager, use the line for
sources.list as given below:
apt-get update
will update the internal database
apt-get upgrade
will install corrected packages
You may use an automated update by adding the resources from the
footer to the proper configuration.
Debian GNU/Linux 3.0 alias woody
- 
  Source archives:
http://security.debian.org/pool/updates/main/s/sudo/sudo_1.6.6-1.2.dsc
  Size/MD5 checksum:  587 b4750887bf910de5d8bc4d4ef3f71b3b
http://security.debian.org/pool/updates/main/s/sudo/sudo_1.6.6-1.2.diff.gz
  Size/MD5 checksum:12251 e138445e17adf6eec25035bb8c1ef0c9
http://security.debian.org/pool/updates/main/s/sudo/sudo_1.6.6.orig.tar.gz
  Size/MD5 checksum:   333074 4da4bf6cf31634cc7a17ec3b69fdc333
  Alpha architecture:
http://security.debian.org/pool/updates/main/s/sudo/sudo_1.6.6-1.2_alpha.deb
  Size/MD5 checksum:   151386 841c5cfa5405fbef08d95fb7fcd50364
  ARM architecture:
http://security.debian.org/pool/updates/main/s/sudo/sudo_1.6.6-1.2_arm.deb
  Size/MD5 checksum:   141442 46d1faa34df223b014c3131879ccadff
  Intel IA-32 architecture:
http://security.debian.org/pool/updates/main/s/sudo/sudo_1.6.6-1.2_i386.deb
  Size/MD5 checksum:   135076 687519f374ef803d532e1a2c966322a6
  Intel IA-64 architecture:
http://security.debian.org/pool/updates/main/s/sudo/sudo_1.6.6-1.2_ia64.deb
  Size/MD5 checksum:   172442 8e0f391e39197f7911069210dae06da7
  HP Precision architecture:
http://security.debian.org/pool/updates/main/s/sudo/sudo_1.6.6-1.2_hppa.deb
  Size/MD5 checksum:   147512 b32938d0bf2d681b4556c64d7071187a
  Motorola 680x0 architecture:
http://security.debian.org/pool/updates/main/s/sudo/sudo_1.6.6-1.2_m68k.deb
  Size/MD5 checksum:   132698 63860473eb387086c4474acc395ff96e
  Big endian MIPS architecture:
http://security.debian.org/pool/updates/main/s/sudo/sudo_1.6.6-1.2_mips.deb
  Size/MD5 checksum:   144380 c1ffef369f073099d84704f24e2252f1
  Little endian MIPS architecture:

http://security.debian.org/pool/updates/main/s/sudo/sudo_1.6.6-1.2_mipsel.deb
  Size/MD5 checksum:   144250 bdb34c5adaf5562908d6df4517bf0cd3
  PowerPC architecture:

http://security.debian.org/pool/updates/main/s/sudo/sudo_1.6.6-1.2_powerpc.deb
  Size/MD5 checksum:   140566 ff92e82812ef08d35b51239099efaca3
  IBM S/390 architecture:
http://security.debian.org/pool/updates/main/s/sudo/sudo_1.6.6-1.2_s390.deb
  Size/MD5 checksum:   140222 f327c3436a5a103b1d028dc2e045c226
  Sun Sparc architecture:
http://security.debian.org/pool/updates/main/s/sudo/sudo_1.6.6-1.2_sparc.deb
  Size/MD5 checksum:   143004 6c4300c125317a6faf9e154803552485
  These files will probably be moved into the stable distribution on
  its next update.
- 
-
For apt-get: deb http://security.debian.org/ stable/updates main
For dpkg-ftp: ftp://security.debian.org/debian-security 
dists/stable/updates/main
Mailing list: [EMAIL PROTECTED]
Package info: `apt-cache show pkg' and http://packages.debian.org/pkg
-BEGIN PGP SIGNATURE-
Version: GnuPG v1.2.5 (GNU/Linux)
iD8DBQFBpHn2W5ql+IAeqTIRAsbeAJ93UCDKx39/3F123rZPt4B+CpYN5wCcD01g
heOiCeKmYQUJoqWasNWbWB0=
=qta2
-END PGP SIGNATURE-

--
| /+\ \| | |
--
To UNSUBSCRIBE, email to [EMAIL PROTECTED]
with a subject of unsubscribe. Trouble? Contact [EMAIL PROTECTED]


Re: [SECURITY] [DSA 596-1] New sudo packages fix privilege escalation

2004-11-24 Thread Ramon Kagan
Must be something in your environment, I don't get anything of the sort.

Ramon Kagan
York University, Computing and Network Services
Information Security  -  Senior Information Security Analyst
(416)736-2100 #20263
[EMAIL PROTECTED]

---   
I have not failed.  I have justI don't know the secret to success,
found 10,000 ways that don't work. but the secret to failure is
   trying to please everybody.
- Thomas Edison - Bill Cosby
---   

On Wed, 24 Nov 2004, David wrote:

 Hi Martin,

 This fix prints a bunch of debugging messages on sudo. Has it been tested!?

 David

 Martin Schulze wrote:
  -BEGIN PGP SIGNED MESSAGE-
  Hash: SHA1
 
  - --
  Debian Security Advisory DSA 596-1 [EMAIL PROTECTED]
  http://www.debian.org/security/ Martin Schulze
  November 24th, 2004 http://www.debian.org/security/faq
  - --
 
  Package: sudo
  Vulnerability  : missing input sanitising
  Problem-Type   : local
  Debian-specific: no
  CVE ID : CAN-2004-1051
  Debian Bug : 281665
 
  Liam Helmer noticed that sudo, a program that provides limited super
  user privileges to specific users, does not clean the environment
  sufficiently.  Bash functions and the CDPATH variable are still passed
  through to the program running as privileged user, leaving
  possibilities to overload system routines.  These vulnerabilities can
  only be exploited by users who have been granted limited super user
  privileges.
 
  For the stable distribution (woody) these problems have been fixed in
  version 1.6.6-1.2.
 
  For the unstable distribution (sid) these problems have been fixed in
  version 1.6.8p3.
 
  We recommend that you upgrade your sudo package.
 
 
  Upgrade Instructions
  - 
 
  wget url
  will fetch the file for you
  dpkg -i file.deb
  will install the referenced file.
 
  If you are using the apt-get package manager, use the line for
  sources.list as given below:
 
  apt-get update
  will update the internal database
  apt-get upgrade
  will install corrected packages
 
  You may use an automated update by adding the resources from the
  footer to the proper configuration.
 
 
  Debian GNU/Linux 3.0 alias woody
  - 
 
Source archives:
 
  http://security.debian.org/pool/updates/main/s/sudo/sudo_1.6.6-1.2.dsc
Size/MD5 checksum:  587 b4750887bf910de5d8bc4d4ef3f71b3b
  
  http://security.debian.org/pool/updates/main/s/sudo/sudo_1.6.6-1.2.diff.gz
Size/MD5 checksum:12251 e138445e17adf6eec25035bb8c1ef0c9
  
  http://security.debian.org/pool/updates/main/s/sudo/sudo_1.6.6.orig.tar.gz
Size/MD5 checksum:   333074 4da4bf6cf31634cc7a17ec3b69fdc333
 
Alpha architecture:
 
  
  http://security.debian.org/pool/updates/main/s/sudo/sudo_1.6.6-1.2_alpha.deb
Size/MD5 checksum:   151386 841c5cfa5405fbef08d95fb7fcd50364
 
ARM architecture:
 
  
  http://security.debian.org/pool/updates/main/s/sudo/sudo_1.6.6-1.2_arm.deb
Size/MD5 checksum:   141442 46d1faa34df223b014c3131879ccadff
 
Intel IA-32 architecture:
 
  
  http://security.debian.org/pool/updates/main/s/sudo/sudo_1.6.6-1.2_i386.deb
Size/MD5 checksum:   135076 687519f374ef803d532e1a2c966322a6
 
Intel IA-64 architecture:
 
  
  http://security.debian.org/pool/updates/main/s/sudo/sudo_1.6.6-1.2_ia64.deb
Size/MD5 checksum:   172442 8e0f391e39197f7911069210dae06da7
 
HP Precision architecture:
 
  
  http://security.debian.org/pool/updates/main/s/sudo/sudo_1.6.6-1.2_hppa.deb
Size/MD5 checksum:   147512 b32938d0bf2d681b4556c64d7071187a
 
Motorola 680x0 architecture:
 
  
  http://security.debian.org/pool/updates/main/s/sudo/sudo_1.6.6-1.2_m68k.deb
Size/MD5 checksum:   132698 63860473eb387086c4474acc395ff96e
 
Big endian MIPS architecture:
 
  
  http://security.debian.org/pool/updates/main/s/sudo/sudo_1.6.6-1.2_mips.deb
Size/MD5 checksum:   144380 c1ffef369f073099d84704f24e2252f1
 
Little endian MIPS architecture:
 
  
  http://security.debian.org/pool/updates/main/s/sudo/sudo_1.6.6-1.2_mipsel.deb
Size/MD5 checksum:   144250 bdb34c5adaf5562908d6df4517bf0cd3
 
PowerPC architecture:
 
  
  http://security.debian.org/pool/updates/main/s/sudo/sudo_1.6.6-1.2_powerpc.deb
Size/MD5 checksum:   140566 ff92e82812ef08d35b51239099efaca3
 
IBM S/390 architecture:
 
  
  http://security.debian.org/pool/updates/main/s/sudo/sudo_1.6.6-1.2_s390.deb
Size/MD5 checksum:   140222 

Re: [SECURITY] [DSA 596-1] New sudo packages fix privilege escalation

2004-11-24 Thread Ramon Kagan
Ok now I see it.  The stable package the unstable package is fine.

Ramon Kagan
York University, Computing and Network Services
Information Security  -  Senior Information Security Analyst
(416)736-2100 #20263
[EMAIL PROTECTED]

---   
I have not failed.  I have justI don't know the secret to success,
found 10,000 ways that don't work. but the secret to failure is
   trying to please everybody.
- Thomas Edison - Bill Cosby
---   

On Wed, 24 Nov 2004, David wrote:


 This is what I get on all the 3.0 installations I've upgraded this
 package on (attached file).

 David

 On Wed, 24 Nov 2004, Ramon Kagan wrote:

  Must be something in your environment, I don't get anything of the sort.
 
  Ramon Kagan
  York University, Computing and Network Services
  Information Security  -  Senior Information Security Analyst
  (416)736-2100 #20263
  [EMAIL PROTECTED]
 
  ---   
  I have not failed.  I have justI don't know the secret to 
  success,
  found 10,000 ways that don't work. but the secret to failure is
 trying to please everybody.
  - Thomas Edison - Bill Cosby
  ---   
 
  On Wed, 24 Nov 2004, David wrote:
 
   Hi Martin,
  
   This fix prints a bunch of debugging messages on sudo. Has it been 
   tested!?
  
   David
  
   Martin Schulze wrote:
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1
   
- 
--
Debian Security Advisory DSA 596-1 [EMAIL PROTECTED]
http://www.debian.org/security/ Martin 
Schulze
November 24th, 2004 
http://www.debian.org/security/faq
- 
--
   
Package: sudo
Vulnerability  : missing input sanitising
Problem-Type   : local
Debian-specific: no
CVE ID : CAN-2004-1051
Debian Bug : 281665
   
Liam Helmer noticed that sudo, a program that provides limited super
user privileges to specific users, does not clean the environment
sufficiently.  Bash functions and the CDPATH variable are still passed
through to the program running as privileged user, leaving
possibilities to overload system routines.  These vulnerabilities can
only be exploited by users who have been granted limited super user
privileges.
   
For the stable distribution (woody) these problems have been fixed in
version 1.6.6-1.2.
   
For the unstable distribution (sid) these problems have been fixed in
version 1.6.8p3.
   
We recommend that you upgrade your sudo package.
   
   
Upgrade Instructions
- 
   
wget url
will fetch the file for you
dpkg -i file.deb
will install the referenced file.
   
If you are using the apt-get package manager, use the line for
sources.list as given below:
   
apt-get update
will update the internal database
apt-get upgrade
will install corrected packages
   
You may use an automated update by adding the resources from the
footer to the proper configuration.
   
   
Debian GNU/Linux 3.0 alias woody
- 
   
  Source archives:
   

http://security.debian.org/pool/updates/main/s/sudo/sudo_1.6.6-1.2.dsc
  Size/MD5 checksum:  587 b4750887bf910de5d8bc4d4ef3f71b3b

http://security.debian.org/pool/updates/main/s/sudo/sudo_1.6.6-1.2.diff.gz
  Size/MD5 checksum:12251 e138445e17adf6eec25035bb8c1ef0c9

http://security.debian.org/pool/updates/main/s/sudo/sudo_1.6.6.orig.tar.gz
  Size/MD5 checksum:   333074 4da4bf6cf31634cc7a17ec3b69fdc333
   
  Alpha architecture:
   

http://security.debian.org/pool/updates/main/s/sudo/sudo_1.6.6-1.2_alpha.deb
  Size/MD5 checksum:   151386 841c5cfa5405fbef08d95fb7fcd50364
   
  ARM architecture:
   

http://security.debian.org/pool/updates/main/s/sudo/sudo_1.6.6-1.2_arm.deb
  Size/MD5 checksum:   141442 46d1faa34df223b014c3131879ccadff
   
  Intel IA-32 architecture:
   

http://security.debian.org/pool/updates/main/s/sudo/sudo_1.6.6-1.2_i386.deb
  Size/MD5 checksum:   135076 687519f374ef803d532e1a2c966322a6
   
  Intel IA-64 architecture:
   

http://security.debian.org/pool/updates/main/s/sudo/sudo_1.6.6-1.2_ia64.deb
  Size/MD5 checksum:   172442 8e0f391e39197f7911069210dae06da7
   
  HP 

Re: [SECURITY] [DSA 596-1] New sudo packages fix privilege escalation

2004-11-24 Thread David

This is what I get on all the 3.0 installations I've upgraded this
package on (attached file).

David

On Wed, 24 Nov 2004, Ramon Kagan wrote:

 Must be something in your environment, I don't get anything of the sort.

 Ramon Kagan
 York University, Computing and Network Services
 Information Security  -  Senior Information Security Analyst
 (416)736-2100 #20263
 [EMAIL PROTECTED]

 ---   
 I have not failed.  I have just  I don't know the secret to 
 success,
 found 10,000 ways that don't work. but the secret to failure is
  trying to please everybody.
   - Thomas Edison - Bill Cosby
 ---   

 On Wed, 24 Nov 2004, David wrote:

  Hi Martin,
 
  This fix prints a bunch of debugging messages on sudo. Has it been tested!?
 
  David
 
  Martin Schulze wrote:
   -BEGIN PGP SIGNED MESSAGE-
   Hash: SHA1
  
   - 
   --
   Debian Security Advisory DSA 596-1 [EMAIL PROTECTED]
   http://www.debian.org/security/ Martin Schulze
   November 24th, 2004 http://www.debian.org/security/faq
   - 
   --
  
   Package: sudo
   Vulnerability  : missing input sanitising
   Problem-Type   : local
   Debian-specific: no
   CVE ID : CAN-2004-1051
   Debian Bug : 281665
  
   Liam Helmer noticed that sudo, a program that provides limited super
   user privileges to specific users, does not clean the environment
   sufficiently.  Bash functions and the CDPATH variable are still passed
   through to the program running as privileged user, leaving
   possibilities to overload system routines.  These vulnerabilities can
   only be exploited by users who have been granted limited super user
   privileges.
  
   For the stable distribution (woody) these problems have been fixed in
   version 1.6.6-1.2.
  
   For the unstable distribution (sid) these problems have been fixed in
   version 1.6.8p3.
  
   We recommend that you upgrade your sudo package.
  
  
   Upgrade Instructions
   - 
  
   wget url
   will fetch the file for you
   dpkg -i file.deb
   will install the referenced file.
  
   If you are using the apt-get package manager, use the line for
   sources.list as given below:
  
   apt-get update
   will update the internal database
   apt-get upgrade
   will install corrected packages
  
   You may use an automated update by adding the resources from the
   footer to the proper configuration.
  
  
   Debian GNU/Linux 3.0 alias woody
   - 
  
 Source archives:
  
   http://security.debian.org/pool/updates/main/s/sudo/sudo_1.6.6-1.2.dsc
 Size/MD5 checksum:  587 b4750887bf910de5d8bc4d4ef3f71b3b
   
   http://security.debian.org/pool/updates/main/s/sudo/sudo_1.6.6-1.2.diff.gz
 Size/MD5 checksum:12251 e138445e17adf6eec25035bb8c1ef0c9
   
   http://security.debian.org/pool/updates/main/s/sudo/sudo_1.6.6.orig.tar.gz
 Size/MD5 checksum:   333074 4da4bf6cf31634cc7a17ec3b69fdc333
  
 Alpha architecture:
  
   
   http://security.debian.org/pool/updates/main/s/sudo/sudo_1.6.6-1.2_alpha.deb
 Size/MD5 checksum:   151386 841c5cfa5405fbef08d95fb7fcd50364
  
 ARM architecture:
  
   
   http://security.debian.org/pool/updates/main/s/sudo/sudo_1.6.6-1.2_arm.deb
 Size/MD5 checksum:   141442 46d1faa34df223b014c3131879ccadff
  
 Intel IA-32 architecture:
  
   
   http://security.debian.org/pool/updates/main/s/sudo/sudo_1.6.6-1.2_i386.deb
 Size/MD5 checksum:   135076 687519f374ef803d532e1a2c966322a6
  
 Intel IA-64 architecture:
  
   
   http://security.debian.org/pool/updates/main/s/sudo/sudo_1.6.6-1.2_ia64.deb
 Size/MD5 checksum:   172442 8e0f391e39197f7911069210dae06da7
  
 HP Precision architecture:
  
   
   http://security.debian.org/pool/updates/main/s/sudo/sudo_1.6.6-1.2_hppa.deb
 Size/MD5 checksum:   147512 b32938d0bf2d681b4556c64d7071187a
  
 Motorola 680x0 architecture:
  
   
   http://security.debian.org/pool/updates/main/s/sudo/sudo_1.6.6-1.2_m68k.deb
 Size/MD5 checksum:   132698 63860473eb387086c4474acc395ff96e
  
 Big endian MIPS architecture:
  
   
   http://security.debian.org/pool/updates/main/s/sudo/sudo_1.6.6-1.2_mips.deb
 Size/MD5 checksum:   144380 c1ffef369f073099d84704f24e2252f1
  
 Little endian MIPS architecture:
  
   
   http://security.debian.org/pool/updates/main/s/sudo/sudo_1.6.6-1.2_mipsel.deb
 Size/MD5 checksum:   144250 bdb34c5adaf5562908d6df4517bf0cd3
  
 PowerPC architecture:
  
   
   

Re: [SECURITY] [DSA 596-1] New sudo packages fix privilege escalation

2004-11-24 Thread Steve Kemp
On Wed, Nov 24, 2004 at 09:15:41AM -0500, Ramon Kagan wrote:

 Ok now I see it.  The stable package the unstable package is fine.

  Yes the diff.gz available from the DSA shows the problem:

+   printf (Looking at %s...\n, *ep);

  Rebuilding from the source with that commented out fixes it for me.

Steve
--


-- 
To UNSUBSCRIBE, email to [EMAIL PROTECTED]
with a subject of unsubscribe. Trouble? Contact [EMAIL PROTECTED]



Re: [SECURITY] [DSA 596-1] New sudo packages fix privilege escalation

2004-11-24 Thread Andreas Hellmer
Hallo Frau Carstens,

sind wir da auf dem aktuellen Stand ? Sonst bitte bei nächster
Wartungsaufgabe mit machen.

---
Andreas Hellmer - [EMAIL PROTECTED]
Hamburger Pensionsverwaltung eG


MS -BEGIN PGP SIGNED MESSAGE-
MS Hash: SHA1

MS - --
MS Debian Security Advisory DSA 596-1 [EMAIL PROTECTED]
MS http://www.debian.org/security/ Martin Schulze
MS November 24th, 2004 http://www.debian.org/security/faq
MS - --

MS Package: sudo
MS Vulnerability  : missing input sanitising
MS Problem-Type   : local
MS Debian-specific: no
MS CVE ID : CAN-2004-1051
MS Debian Bug : 281665

MS Liam Helmer noticed that sudo, a program that provides limited super
MS user privileges to specific users, does not clean the environment
MS sufficiently.  Bash functions and the CDPATH variable are still passed
MS through to the program running as privileged user, leaving
MS possibilities to overload system routines.  These vulnerabilities can
MS only be exploited by users who have been granted limited super user
MS privileges.

MS For the stable distribution (woody) these problems have been fixed in
MS version 1.6.6-1.2.

MS For the unstable distribution (sid) these problems have been fixed in
MS version 1.6.8p3.

MS We recommend that you upgrade your sudo package.


MS Upgrade Instructions
MS - 

MS wget url
MS will fetch the file for you
MS dpkg -i file.deb
MS will install the referenced file.

MS If you are using the apt-get package manager, use the line for
MS sources.list as given below:

MS apt-get update
MS will update the internal database
MS apt-get upgrade
MS will install corrected packages

MS You may use an automated update by adding the resources from the
MS footer to the proper configuration.


MS Debian GNU/Linux 3.0 alias woody
MS - 

MS   Source archives:

MS http://security.debian.org/pool/updates/main/s/sudo/sudo_1.6.6-1.2.dsc
MS   Size/MD5 checksum:  587 b4750887bf910de5d8bc4d4ef3f71b3b
MS 
http://security.debian.org/pool/updates/main/s/sudo/sudo_1.6.6-1.2.diff.gz
MS   Size/MD5 checksum:12251 e138445e17adf6eec25035bb8c1ef0c9
MS 
http://security.debian.org/pool/updates/main/s/sudo/sudo_1.6.6.orig.tar.gz
MS   Size/MD5 checksum:   333074 4da4bf6cf31634cc7a17ec3b69fdc333

MS   Alpha architecture:

MS 
http://security.debian.org/pool/updates/main/s/sudo/sudo_1.6.6-1.2_alpha.deb
MS   Size/MD5 checksum:   151386 841c5cfa5405fbef08d95fb7fcd50364

MS   ARM architecture:

MS 
http://security.debian.org/pool/updates/main/s/sudo/sudo_1.6.6-1.2_arm.deb
MS   Size/MD5 checksum:   141442 46d1faa34df223b014c3131879ccadff

MS   Intel IA-32 architecture:

MS 
http://security.debian.org/pool/updates/main/s/sudo/sudo_1.6.6-1.2_i386.deb
MS   Size/MD5 checksum:   135076 687519f374ef803d532e1a2c966322a6

MS   Intel IA-64 architecture:

MS 
http://security.debian.org/pool/updates/main/s/sudo/sudo_1.6.6-1.2_ia64.deb
MS   Size/MD5 checksum:   172442 8e0f391e39197f7911069210dae06da7

MS   HP Precision architecture:

MS 
http://security.debian.org/pool/updates/main/s/sudo/sudo_1.6.6-1.2_hppa.deb
MS   Size/MD5 checksum:   147512 b32938d0bf2d681b4556c64d7071187a

MS   Motorola 680x0 architecture:

MS 
http://security.debian.org/pool/updates/main/s/sudo/sudo_1.6.6-1.2_m68k.deb
MS   Size/MD5 checksum:   132698 63860473eb387086c4474acc395ff96e

MS   Big endian MIPS architecture:

MS 
http://security.debian.org/pool/updates/main/s/sudo/sudo_1.6.6-1.2_mips.deb
MS   Size/MD5 checksum:   144380 c1ffef369f073099d84704f24e2252f1

MS   Little endian MIPS architecture:

MS 
http://security.debian.org/pool/updates/main/s/sudo/sudo_1.6.6-1.2_mipsel.deb
MS   Size/MD5 checksum:   144250 bdb34c5adaf5562908d6df4517bf0cd3

MS   PowerPC architecture:

MS 
http://security.debian.org/pool/updates/main/s/sudo/sudo_1.6.6-1.2_powerpc.deb
MS   Size/MD5 checksum:   140566 ff92e82812ef08d35b51239099efaca3

MS   IBM S/390 architecture:

MS 
http://security.debian.org/pool/updates/main/s/sudo/sudo_1.6.6-1.2_s390.deb
MS   Size/MD5 checksum:   140222 f327c3436a5a103b1d028dc2e045c226

MS   Sun Sparc architecture:

MS 
http://security.debian.org/pool/updates/main/s/sudo/sudo_1.6.6-1.2_sparc.deb
MS   Size/MD5 checksum:   143004 6c4300c125317a6faf9e154803552485


MS   These files will probably be moved into the stable distribution on
MS   its next update.

MS - 
-
MS For apt-get: deb http://security.debian.org/ stable/updates main
MS For dpkg-ftp: ftp://security.debian.org/debian-security 
dists/stable/updates/main
MS Mailing list: [EMAIL PROTECTED]
MS Package info: 

debian security support history

2004-11-24 Thread Robert Lemmen
hi folks,

i am trying to sum up some facts about debian and created a graphic showing
the timeline of debian releases and security support, you can have a look
at a preliminary version [0]. i took the data from the debian news site [1]
but i am not sure everything is correct, so i wanted to ask:
- was there really no 2.1r1 to 2.1r3? the first point release i can see there 
 is r4...
- was there any security support for releases before slink?
- any other comments?

thanks a lot
robert

[0] http://www.semistable.com/files/releases.gif
[1] http://www.debian.org/News/

-- 
Robert Lemmen   http://www.semistable.com 


signature.asc
Description: Digital signature


Re: debian security support history

2004-11-24 Thread Frans Pop
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1

On Wednesday 24 November 2004 16:50, Robert Lemmen wrote:
 - was there really no 2.1r1 to 2.1r3? the first point release i can see
 there is r4...

Guess no formal announcements for point releases were made back then.

[1] will give you an approximate date for 2.1r2 (end of April 1999 
probably) and an explanation why there really was no r1.
The earliest messages in the list archives for 2.1r3 are from Sept 1999.

[1] http://lists.debian.org/debian-user/1999/05/msg01451.html

Cheers,
FJP
-BEGIN PGP SIGNATURE-
Version: GnuPG v1.2.4 (GNU/Linux)

iD8DBQFBpLergm/Kwh6ICoQRAtwdAJ49cDxwu3+oPZiGhLWSYIFzBMaiYQCfVh2y
5gHJOhL5x4kPbZADQoX2Y4E=
=LKkY
-END PGP SIGNATURE-