Preparation of the next stable Debian GNU/Linux update ======================================================
An up-to-date version is at <http://people.debian.org/~joey/3.0r6/>. I am preparing the next revision of the current stable Debian distribution (woody) and will frequently send reports so people can actually comment on it and intervene whenever this is required. It is scheduled for any time now. If you disagree with one bit or another, please reply to this mail and explain why these things should be handled differently. There is still time to reconsider. The plan is to release this revision roughly two months after the last update. It is required that this happens before the release of sarge since the Debian archive infrastructure can't cope with updates of stable and oldstable. Hence, this update is planned for the end of May. An ftpmaster still has to give the final approval for each package since ftpmasters are responsible for the archive. However, I'm trying to make their work as easy as possible in the hope to get the next revision out properly and without too much hassle. The regulations for updates to the stable Debian release are quite conservative. The requirements for packages to get updated in stable are: 1. The package fixes a security problem. An advisory by our own Security Team is required. Updates need to be approved by the Security Team. 2. The package fixes a critical bug which can lead into data loss, data corruption, or an overly broken system, or the package is broken or not usable (anymore). 3. The stable version of the package is not installable at all due to broken or unmet dependencies or broken installation scripts. 4. All released architectures have to be in sync. 5. The package gets all released architectures back in sync. It is (or (and (or 1 2 3) 4) 5) Regular bugs and upgrade problems don't get fixed in new revisions for the stable distribution. They should instead be documented in the Release Notes which are maintained by Rob Bradford <mailto:[EMAIL PROTECTED]> and are found at <http://www.debian.org/releases/woody/releasenotes>. Packages, which will most probably be rejected: . Packages that fix non-critical bugs. . Misplaced uploads, i.e. packages that were uploaded to 'stable unstable' or `frozen unstable' or similar. . Packages for which its binary packages are out of sync with regard to all supported architectures in the stable distribution. . Binary packages for which the source got lost somehow. . Packages that fix an unusable minor part of a package. If you would like to get a package updated in the stable release, you are advised to talk to the stable release manager first (see <http://www.debian.org/intro/organization>). Accepted Packages ----------------- These packages will be installed into the stable Debian distribution and will be part of the next revision. cvs stable 1.11.1p1debian-9woody7 alpha arm hppa i386 ia64 m68k mips mipsel powerpc s390 sparc source cvs updates 1.11.1p1debian-10 alpha arm hppa i386 ia64 m68k mips mipsel powerpc s390 sparc source DSA 715 cvs - several vulnerabilities ethereal-common stable 0.9.4-1woody11 alpha arm hppa i386 ia64 m68k mips mipsel powerpc s390 sparc ethereal-common updates 0.9.4-1woody12 alpha arm hppa i386 ia64 m68k mips mipsel powerpc s390 sparc ethereal-dev stable 0.9.4-1woody11 alpha arm hppa i386 ia64 m68k mips mipsel powerpc s390 sparc ethereal-dev updates 0.9.4-1woody12 alpha arm hppa i386 ia64 m68k mips mipsel powerpc s390 sparc ethereal stable 0.9.4-1woody11 alpha arm hppa i386 ia64 m68k mips mipsel powerpc s390 sparc source ethereal updates 0.9.4-1woody12 alpha arm hppa i386 ia64 m68k mips mipsel powerpc s390 sparc source tethereal stable 0.9.4-1woody11 alpha arm hppa i386 ia64 m68k mips mipsel powerpc s390 sparc tethereal updates 0.9.4-1woody12 alpha arm hppa i386 ia64 m68k mips mipsel powerpc s390 sparc DSA 718 ethereal - buffer overflow f2c stable 20010821-3.1 alpha arm hppa i386 ia64 m68k mips mipsel powerpc s390 sparc source f2c updates 20010821-3.2 alpha arm hppa i386 ia64 m68k mips mipsel powerpc s390 sparc source Fix bug in DSA-661 gaim-common stable 1:0.58-2.4 alpha arm hppa i386 ia64 m68k mips mipsel powerpc s390 sparc gaim-common updates 1:0.58-2.5 alpha arm hppa i386 ia64 m68k mips mipsel powerpc s390 sparc gaim-gnome stable 1:0.58-2.4 alpha arm hppa i386 ia64 m68k mips mipsel powerpc s390 sparc gaim-gnome updates 1:0.58-2.5 alpha arm hppa i386 ia64 m68k mips mipsel powerpc s390 sparc gaim stable 1:0.58-2.4 alpha arm hppa i386 ia64 m68k mips mipsel powerpc s390 sparc source gaim updates 1:0.58-2.5 alpha arm hppa i386 ia64 m68k mips mipsel powerpc s390 sparc source DSA 716 gaim - denial of service geneweb stable 4.06-2 alpha arm hppa i386 ia64 m68k mips mipsel powerpc s390 sparc source geneweb updates 4.06-2woody1 alpha arm hppa i386 ia64 m68k mips mipsel powerpc s390 sparc source gwtp stable 4.06-2 alpha arm hppa i386 ia64 m68k mips mipsel powerpc s390 sparc gwtp updates 4.06-2woody1 alpha arm hppa i386 ia64 m68k mips mipsel powerpc s390 sparc DSA 712 geneweb - insecure file operations gtkhtml stable 1.0.2-1 alpha i386 ia64 m68k mips mipsel powerpc s390 source gtkhtml stable 1.0.2-1.0.1 arm hppa sparc gtkhtml updates 1.0.2-1.woody1 alpha arm hppa i386 ia64 m68k mips mipsel powerpc s390 sparc source libgtkhtml-data stable 1.0.2-1 all libgtkhtml-data updates 1.0.2-1.woody1 all libgtkhtml-dev stable 1.0.2-1 alpha i386 ia64 m68k mips mipsel powerpc s390 libgtkhtml-dev stable 1.0.2-1.0.1 arm hppa sparc libgtkhtml-dev updates 1.0.2-1.woody1 alpha arm hppa i386 ia64 m68k mips mipsel powerpc s390 sparc libgtkhtml20 stable 1.0.2-1 alpha i386 ia64 m68k mips mipsel powerpc s390 libgtkhtml20 stable 1.0.2-1.0.1 arm hppa sparc libgtkhtml20 updates 1.0.2-1.woody1 alpha arm hppa i386 ia64 m68k mips mipsel powerpc s390 sparc DSA 710 gtkhtml - null pointer dereference info2www stable 1.2.2.9-20 all source info2www updates 1.2.2.9-20woody1 all source DSA 711 info2www - missing input sanitising junkbuster stable 2.0.2-0.2 alpha arm hppa i386 ia64 m68k mips mipsel powerpc s390 sparc source junkbuster updates 2.0.2-0.2woody1 alpha arm hppa i386 ia64 m68k mips mipsel powerpc s390 sparc source DSA 713 junkbuster - several vulnerabilities kdelibs-dev stable 4:2.2.2-13.woody.13 alpha arm hppa i386 ia64 m68k mips mipsel powerpc s390 sparc kdelibs-dev updates 4:2.2.2-13.woody.14 alpha arm hppa i386 ia64 m68k mips mipsel powerpc s390 sparc kdelibs3-bin stable 4:2.2.2-13.woody.13 alpha arm hppa i386 ia64 m68k mips mipsel powerpc s390 sparc kdelibs3-bin updates 4:2.2.2-13.woody.14 alpha arm hppa i386 ia64 m68k mips mipsel powerpc s390 sparc kdelibs3-cups stable 4:2.2.2-13.woody.13 alpha arm hppa i386 ia64 m68k mips mipsel powerpc s390 sparc kdelibs3-cups updates 4:2.2.2-13.woody.14 alpha arm hppa i386 ia64 m68k mips mipsel powerpc s390 sparc kdelibs3-doc stable 4:2.2.2-13.woody.13 all kdelibs3-doc updates 4:2.2.2-13.woody.14 all kdelibs3 stable 4:2.2.2-13.woody.13 alpha arm hppa i386 ia64 m68k mips mipsel powerpc s390 sparc kdelibs3 updates 4:2.2.2-13.woody.14 alpha arm hppa i386 ia64 m68k mips mipsel powerpc s390 sparc kdelibs stable 4:2.2.2-13.woody.13 source kdelibs updates 4:2.2.2-13.woody.14 source libarts-alsa stable 4:2.2.2-13.woody.13 alpha arm hppa i386 ia64 m68k mips mipsel powerpc s390 sparc libarts-alsa updates 4:2.2.2-13.woody.14 alpha arm hppa i386 ia64 m68k mips mipsel powerpc s390 sparc libarts-dev stable 4:2.2.2-13.woody.13 alpha arm hppa i386 ia64 m68k mips mipsel powerpc s390 sparc libarts-dev updates 4:2.2.2-13.woody.14 alpha arm hppa i386 ia64 m68k mips mipsel powerpc s390 sparc libarts stable 4:2.2.2-13.woody.13 alpha arm hppa i386 ia64 m68k mips mipsel powerpc s390 sparc libarts updates 4:2.2.2-13.woody.14 alpha arm hppa i386 ia64 m68k mips mipsel powerpc s390 sparc libkmid-alsa stable 4:2.2.2-13.woody.13 alpha arm hppa i386 ia64 m68k mips mipsel powerpc s390 sparc libkmid-alsa updates 4:2.2.2-13.woody.14 alpha arm hppa i386 ia64 m68k mips mipsel powerpc s390 sparc libkmid-dev stable 4:2.2.2-13.woody.13 alpha arm hppa i386 ia64 m68k mips mipsel powerpc s390 sparc libkmid-dev updates 4:2.2.2-13.woody.14 alpha arm hppa i386 ia64 m68k mips mipsel powerpc s390 sparc libkmid stable 4:2.2.2-13.woody.13 alpha arm hppa i386 ia64 m68k mips mipsel powerpc s390 sparc libkmid updates 4:2.2.2-13.woody.14 alpha arm hppa i386 ia64 m68k mips mipsel powerpc s390 sparc DSA 714 kdelibs - several vulnerabilities libexif-dev stable 0.5.0-1 alpha arm hppa i386 ia64 m68k mips mipsel powerpc s390 sparc libexif-dev updates 0.5.0-1woody1 alpha arm hppa i386 ia64 m68k mips mipsel powerpc s390 sparc libexif5 stable 0.5.0-1 alpha arm hppa i386 ia64 m68k mips mipsel powerpc s390 sparc libexif5 updates 0.5.0-1woody1 alpha arm hppa i386 ia64 m68k mips mipsel powerpc s390 sparc libexif stable 0.5.0-1 source libexif updates 0.5.0-1woody1 source DSA 709 libexif - buffer overflow lsh-client stable 1.2.5-2 alpha arm hppa i386 ia64 m68k mips mipsel powerpc s390 sparc lsh-client updates 1.2.5-2woody3 alpha arm hppa i386 m68k mips mipsel powerpc s390 sparc lsh-server stable 1.2.5-2 alpha arm hppa i386 ia64 m68k mips mipsel powerpc s390 sparc lsh-server updates 1.2.5-2woody3 alpha arm hppa i386 m68k mips mipsel powerpc s390 sparc lsh-utils-doc stable 1.2.5-2 all lsh-utils-doc updates 1.2.5-2woody3 all lsh-utils stable 1.2.5-2 alpha arm hppa i386 ia64 m68k mips mipsel powerpc s390 sparc source lsh-utils updates 1.2.5-2woody3 alpha arm hppa i386 m68k mips mipsel powerpc s390 sparc source DSA 717 lsh-utils - buffer overflow, typo Intel IA-64: Package does not build anymore and hence cannot be updated. netkit-telnet stable 0.17-18woody3 source telnetd stable 0.17-18woody2 arm telnetd stable 0.17-18woody3 alpha hppa i386 ia64 m68k mips mipsel powerpc s390 sparc telnetd updates 0.17-18woody3 arm telnet stable 0.17-18woody2 arm telnet stable 0.17-18woody3 alpha hppa i386 ia64 m68k mips mipsel powerpc s390 sparc telnet updates 0.17-18woody3 arm DSA 697 netkit-telnet - buffer overflow Get architectures back in sync prozilla stable 1:1.3.6-3woody1 alpha arm hppa i386 ia64 m68k mips mipsel powerpc s390 sparc source prozilla updates 1:1.3.6-3woody2 alpha arm hppa i386 ia64 m68k mips mipsel powerpc s390 sparc source DSA 719 prozilla - format string problems libpam-smbpass stable 2.2.3a-14.1 alpha arm hppa i386 ia64 m68k mips mipsel powerpc s390 sparc libpam-smbpass updates 2.2.3a-14.2 alpha arm hppa i386 ia64 m68k mips mipsel powerpc s390 sparc libsmbclient-dev stable 2.2.3a-14.1 alpha arm hppa i386 ia64 m68k mips mipsel powerpc s390 sparc libsmbclient-dev updates 2.2.3a-14.2 alpha arm hppa i386 ia64 m68k mips mipsel powerpc s390 sparc libsmbclient stable 2.2.3a-14.1 alpha arm hppa i386 ia64 m68k mips mipsel powerpc s390 sparc libsmbclient updates 2.2.3a-14.2 alpha arm hppa i386 ia64 m68k mips mipsel powerpc s390 sparc samba-common stable 2.2.3a-14.1 alpha arm hppa i386 ia64 m68k mips mipsel powerpc s390 sparc samba-common updates 2.2.3a-14.2 alpha arm hppa i386 ia64 m68k mips mipsel powerpc s390 sparc samba-doc stable 2.2.3a-14.1 all samba-doc updates 2.2.3a-14.2 all samba stable 2.2.3a-14.1 alpha arm hppa i386 ia64 m68k mips mipsel powerpc s390 sparc source samba updates 2.2.3a-14.2 alpha arm hppa i386 ia64 m68k mips mipsel powerpc s390 sparc source smbclient stable 2.2.3a-14.1 alpha arm hppa i386 ia64 m68k mips mipsel powerpc s390 sparc smbclient updates 2.2.3a-14.2 alpha arm hppa i386 ia64 m68k mips mipsel powerpc s390 sparc smbfs stable 2.2.3a-14.1 alpha arm hppa i386 ia64 m68k mips mipsel powerpc s390 sparc smbfs updates 2.2.3a-14.2 alpha arm hppa i386 ia64 m68k mips mipsel powerpc s390 sparc swat stable 2.2.3a-14.1 alpha arm hppa i386 ia64 m68k mips mipsel powerpc s390 sparc swat updates 2.2.3a-14.2 alpha arm hppa i386 ia64 m68k mips mipsel powerpc s390 sparc winbind stable 2.2.3a-14.1 alpha arm hppa i386 ia64 m68k mips mipsel powerpc s390 sparc winbind updates 2.2.3a-14.2 alpha arm hppa i386 ia64 m68k mips mipsel powerpc s390 sparc DSA 701 samba - integer overflows Problem occurred (Bug#302378) and fixed in 2.2.3a-15 smartlist stable 3.15-5 alpha arm hppa i386 ia64 m68k mips mipsel powerpc s390 sparc source smartlist updates 3.15-5.woody.1 alpha arm hppa i386 ia64 m68k mips mipsel powerpc s390 sparc source DSA 720 smartlist - wrong input processing Requires further Investigation ------------------------------ These packages need further investigation. One reason the package is listed here could be that I'm not yet convinced this package should go into stable, but don't want to reject it entirely at the moment. Another reason could be that released and updated architectures are not yet in sync. acorn-fdisk stable 3.0.6-4 alpha arm hppa i386 ia64 m68k mips mipsel powerpc s390 sparc source acorn-fdisk updates 3.0.6-4woody1 alpha arm hppa i386 ia64 m68k mips mipsel powerpc s390 sparc source Rebuilt for stable since required for working boot-floppies; otherwise identical to 3.0.6-5. Probably only required for updated boot-floppies console-common stable 0.7.14 all source console-common updates 0.7.14woody1 all source dh-consoledata stable 0.7.14 all dh-consoledata updates 0.7.14woody1 all Support the Acorn RiscStation architecture. Alastair McKinstry: The console-common change for Acorn RiscStation is included in the current boot-floppies since 2002/08/12; it is in kbdconfig.c 1.68; boot-floppies 3.0.23 shipped with kbdconfig.c 1.66. As I understand it, this is not the current shipping woody, but these machines only boot with this updated, modified boot-floppies and console-common. Hence, only needed for updated boot-floppies, probably for r3 then. kernel-headers-2.2.20-reiserfs stable 2.2.20-4 i386 kernel-headers-2.2.20-reiserfs updates 2.2.20-4woody1 i386 kernel-image-2.2.20-reiserfs-i386 stable 2.2.20-4 source kernel-image-2.2.20-reiserfs-i386 updates 2.2.20-4woody1 source kernel-image-2.2.20-reiserfs stable 2.2.20-4 i386 kernel-image-2.2.20-reiserfs updates 2.2.20-4woody1 i386 DSA 453 linux-kernel-2.2.20 - failing function and TLB flush pcmcia-modules-2.2.20-reiserfs: Depends: kernel-image-2.2.20-reiserfs (= 2.2.20-4) *Bummer* kernel-headers-2.4.18-1-generic updates 2.4.18-15 alpha kernel-headers-2.4.18-1-smp updates 2.4.18-15 alpha kernel-headers-2.4.18-1 updates 2.4.18-15 alpha kernel-image-2.4.18-1-alpha updates 2.4.18-15 source kernel-image-2.4.18-1-generic updates 2.4.18-15 alpha kernel-image-2.4.18-1-smp updates 2.4.18-15 alpha DSA 479 linux-kernel-2.4.18 - several vulnerabilities DSA 438 linux-kernel-2.4.18 - missing function return value check DSA 417 linux-kernel-2.4.18 - missing boundary check New package + incompatible ABI = *Bummer* kernel-headers-2.4.18-1-386 updates 2.4.18-13.1 i386 kernel-headers-2.4.18-1-586tsc updates 2.4.18-13.1 i386 kernel-headers-2.4.18-1-686-smp updates 2.4.18-13.1 i386 kernel-headers-2.4.18-1-686 updates 2.4.18-13.1 i386 kernel-headers-2.4.18-1-k6 updates 2.4.18-13.1 i386 kernel-headers-2.4.18-1-k7 updates 2.4.18-13.1 i386 kernel-headers-2.4.18-1 updates 2.4.18-13.1 i386 kernel-image-2.4.18-1-386 updates 2.4.18-13.1 i386 kernel-image-2.4.18-1-586tsc updates 2.4.18-13.1 i386 kernel-image-2.4.18-1-686-smp updates 2.4.18-13.1 i386 kernel-image-2.4.18-1-686 updates 2.4.18-13.1 i386 kernel-image-2.4.18-1-i386 updates 2.4.18-13.1 source kernel-image-2.4.18-1-k6 updates 2.4.18-13.1 i386 kernel-image-2.4.18-1-k7 updates 2.4.18-13.1 i386 kernel-pcmcia-modules-2.4.18-1-386 updates 2.4.18-13.1 i386 kernel-pcmcia-modules-2.4.18-1-586tsc updates 2.4.18-13.1 i386 kernel-pcmcia-modules-2.4.18-1-686-smp updates 2.4.18-13.1 i386 kernel-pcmcia-modules-2.4.18-1-686 updates 2.4.18-13.1 i386 kernel-pcmcia-modules-2.4.18-1-k6 updates 2.4.18-13.1 i386 kernel-pcmcia-modules-2.4.18-1-k7 updates 2.4.18-13.1 i386 DSA 479 linux-kernel-2.4.18 - several vulnerabilities DSA 438 linux-kernel-2.4.18 - missing function return value check New package + incompatible ABI = *Bummer* kernel-headers-2.4.18-bf2.4 stable 2.4.18-5 i386 kernel-headers-2.4.18-bf2.4 updates 2.4.18-5woody8 i386 kernel-image-2.4.18-bf2.4 stable 2.4.18-5 i386 kernel-image-2.4.18-bf2.4 updates 2.4.18-5woody8 i386 kernel-image-2.4.18-i386bf stable 2.4.18-5 source kernel-image-2.4.18-i386bf updates 2.4.18-5woody8 source DSA 479 linux-kernel-2.4.18 - several vulnerabilities DSA 403 - kernel-image-2.4.18-1 - local root exploit But: pcmcia-modules-2.4.18-bf2.4 Depends: kernel-image-2.4.18-bf2.4 (= 2.4.18-5) *Bummer* kernel-headers-2.4.17-ia64 stable 011226.13 ia64 kernel-image-2.4.17-ia64 stable 011226.13 source kernel-image-2.4.17-itanium-smp stable 011226.13 ia64 kernel-image-2.4.17-itanium stable 011226.13 ia64 kernel-image-2.4.17-mckinley-smp stable 011226.13 ia64 kernel-image-2.4.17-mckinley stable 011226.13 ia64 kernel-source-2.4.17-ia64 stable 011226.13 all kernel-headers-2.4.19-ia64 updates 020821.1 ia64 kernel-image-2.4.19-ia64 updates 020821.1 source kernel-image-2.4.19-itanium-smp updates 020821.1 ia64 kernel-image-2.4.19-itanium updates 020821.1 ia64 kernel-image-2.4.19-mckinley-smp updates 020821.1 ia64 kernel-image-2.4.19-mckinley updates 020821.1 ia64 kernel-source-2.4.19-ia64 updates 020821.1 all * initial release of kernel image packages for ia64 based on 2.4.19 * turn off broadcom gigE driver, change tg3 from module to built-in * lose several patches from previous kernel builds now merged upstream * update config files for 2.4.19 New packages, rationale still: The 2.4.17 bits which were used to generate the original woody boot floppies have some ugly bugs, are not being updated, and generally are not useful any more. Every problem reported on debian-ia64 starts with a request that the user move to at least 2.4.19. HP has shipped products using the 2.4.19 and 2.4.20 kernel images currently in Debian's mirror network, which means they've been through serious testing and meet HP product quality standards. The same is not true of the 2.4.17 images, as woody was released before HP shipped our first Itanium 2 products. Some newer systems cannot even be installed with 2.4.17 based boot floppies, we work around that by making alternate installation media available from HP based on fresher kernels. Even on the systems where 2.4.17 is ok for install, I don't recommend anyone run a 2.4.17 kernel on any real system. When new boot-floppies are uploaded, they'll use this kernel, then the kernel will be updated as well. TODO: New boot-floppies, contact Bdale TODO: Apply security fixes TODO: remove actual kernel source and use a kernel-patch instead TODO: Build now boot-floppies kernel-patch-2.4-grsecurity stable 1.9.4-1 all source kernel-patch-2.4-grsecurity updates 1.9.4-3 all source -3: * Removed patch bit that sets EXTRAVERSION. (closes: Bug#182183) * Fix to work with ptrace fixed 2.4.18 (otherwise the patch fails to apply rendering it useless, hence medium urgency). (closes: Bug#194523) -4: * Fixed around some security patches in 2.4.18 kernel (otherwise the patch fails to apply rendering it useless, hence medium urgency). (refer to Bug#231858). -5: * Fixed a stupid cut'n'paste bug in the patch for the 2.4.18 kernel, which renders the patch unappliable. ptrace/2.4 can't go into stable due to binary-incompatibility. lha stable 1.14i-2 alpha arm i386 ia64 m68k powerpc s390 sparc source lha stable 1.14i-2.0.1 hppa lha updates 1.14i-2.woody4 alpha arm hppa i386 ia64 m68k powerpc s390 sparc source DSA 515 lha - several vulnerabilities Security update for non-free debian/patch.CAN-2004-0234_0235: Add to fix CAN-2004-0234 (buffer overflows), CAN-2004-0235 (directory traversal). See: http://marc.theaimsgroup.com/?l=full-disclosure&m=108345064008698&w=2 * debian/control: Change my mail address. 1.14i-2.woody4: said security update, too many changes lsb stable 1.1.0-11 all source lsb updates 1.2-5.woody.1 all source Support LSB 1.2 in woody. Includes all changes through 1.2-6 in sid. This package is not sufficient to make Debian stable LSB 1.3 compliant. The only approved LSB version is 1.3. According to Anthony also required: alien, kernel-(headers|source|image) 2.4.19 and glibc, pax. According to Tobias Burnus start-stop-daemon needs to be altered as well. lsb.deb needs another backport. Matt Taggart wrote: The separate OpenI18N standard was merged into the LSB at 1.3 so there are additional requirements that are being tested for now. These are mostly requirements on the commands provided by the LSB and _will_ require patches to fix. I do not know if the patches have been accepted upstream yet. There's a rumor that they affect performance. there may need to be additional changes to glibc for the new test suites. I don't think that we can meet the LSB 1.3 with Debian stable without too many changes, hence LSB updates will be rejected. Newsflash: Maybe it's still possible to meet the LSB testsuite. To be discussed after 3.0r2. libparted1.4-dbg stable 1.4.24-4 alpha arm hppa i386 ia64 m68k mips mipsel powerpc s390 sparc libparted1.4-dbg updates 1.4.24-4.woody.1 alpha arm hppa i386 ia64 m68k mips mipsel powerpc s390 sparc libparted1.4-dev stable 1.4.24-4 alpha arm hppa i386 ia64 m68k mips mipsel powerpc s390 sparc libparted1.4-dev updates 1.4.24-4.woody.1 alpha arm hppa i386 ia64 m68k mips mipsel powerpc s390 sparc libparted1.4-i18n stable 1.4.24-4 all libparted1.4-i18n updates 1.4.24-4.woody.1 all libparted1.4 stable 1.4.24-4 alpha arm hppa i386 ia64 m68k mips mipsel powerpc s390 sparc libparted1.4 updates 1.4.24-4.woody.1 alpha arm hppa i386 ia64 m68k mips mipsel powerpc s390 sparc parted-bf stable 1.4.24-4 alpha arm hppa i386 ia64 m68k mips mipsel powerpc s390 sparc parted-bf updates 1.4.24-4.woody.1 alpha arm hppa i386 ia64 m68k mips mipsel powerpc s390 sparc parted-doc stable 1.4.24-4 all parted-doc updates 1.4.24-4.woody.1 all parted stable 1.4.24-4 alpha arm hppa i386 ia64 m68k mips mipsel powerpc s390 sparc source parted updates 1.4.24-4.woody.1 alpha arm hppa i386 ia64 m68k mips mipsel powerpc s390 sparc source TODO: Why should this be added to Debian stable? spellcast stable 1.0-12 alpha arm hppa i386 ia64 m68k mips mipsel powerpc s390 sparc source spellcast updates 1.0-12.1 i386 source * Moved to non-free due to licensing which was incorrectly considered free by the previous maintainer. See http://lists.debian.org/debian-legal/2003/debian-legal-200310/msg00136.html * Added a rant on why spellcast is not GPL describing the issue in the README.Debian file with more detail than the information available in the copyright file. MISSING alpha MISSING arm MISSING hppa MISSING ia64 MISSING m68k MISSING mips MISSING mipsel MISSING powerpc MISSING s390 MISSING sparc spellcast-doc stable 1.0 alpha arm hppa i386 ia64 m68k mips mipsel powerpc s390 sparc source spellcast-doc updates 1.0.1 i386 source * Moved to non-free due to licensing which was incorrectly considered free by the previous maintainer. See http://lists.debian.org/debian-legal/2003/debian-legal-200310/msg00136.html * Added a rant on why spellcast is not GPL describing the issue in the README.Debian file with more detail than the information available in the copyright file. MISSING alpha MISSING arm MISSING hppa MISSING ia64 MISSING m68k MISSING mips MISSING mipsel MISSING powerpc MISSING s390 MISSING sparc syslog-ng stable 1.5.15-1 alpha arm hppa i386 ia64 m68k mips mipsel powerpc s390 sparc source syslog-ng updates 1.5.15-1.2 hppa syslog-ng updates 1.5.15-1.3 mipsel source 1.5.15-1.2 would be DSA 175 syslog-ng - buffer overflow 1.5.15-1.3 has the security update again vim-gtk stable 6.1.018-1 alpha arm hppa i386 ia64 m68k mips mipsel powerpc s390 sparc vim-gtk updates 6.1.018-1woody1 alpha hppa i386 ia64 m68k mips mipsel powerpc s390 sparc vim-perl stable 6.1.018-1 alpha arm hppa i386 ia64 m68k mips mipsel powerpc s390 sparc vim-perl updates 6.1.018-1woody1 alpha hppa i386 ia64 m68k mips mipsel powerpc s390 sparc vim-python stable 6.1.018-1 alpha arm hppa i386 ia64 m68k mips mipsel powerpc s390 sparc vim-python updates 6.1.018-1woody1 alpha hppa i386 ia64 m68k mips mipsel powerpc s390 sparc vim-ruby stable 6.1.018-1 alpha arm hppa i386 ia64 m68k mips mipsel powerpc s390 sparc vim-ruby updates 6.1.018-1woody1 alpha hppa i386 ia64 m68k mips mipsel powerpc s390 sparc vim-tcl stable 6.1.018-1 alpha arm hppa i386 ia64 m68k mips mipsel powerpc s390 sparc vim-tcl updates 6.1.018-1woody1 alpha hppa i386 ia64 m68k mips mipsel powerpc s390 sparc vim stable 6.1.018-1 alpha arm hppa i386 ia64 m68k mips mipsel powerpc s390 sparc source vim updates 6.1.018-1woody1 alpha hppa i386 ia64 m68k mips mipsel powerpc s390 sparc source Minor security updates that don't warrant an advisory MISSING arm yaboot stable 1.3.6-1 powerpc source yaboot updates 1.3.10-0woody1 powerpc source * Backport yaboot 1.3.10 to stable (See bug #190439). - This is necessary to boot/install on recent Apple hardware. - Ethan reports that the one line change between 1.3.9 and 1.3.10 is critical. Unly required for new boot-floppies Rejected Packages ----------------- These packages don't meet the requirements and will be rejected (if katie supports that, otherwise we'll just carry them with us until the end of time). Removed Packages ---------------- These packages will be removed from the stable Debian distribution. This normally only a result of license problems when the license prohibits their distribution. Disclaimer ---------- This list intends to help the ftp-masters releasing 3.0r6. They have the final power to accept a package or not. If you want to comment on this list, please send a mail to Martin Schulze <[EMAIL PROTECTED]>. Last updated 2005/05/06 08:52 MET -- If nothing changes, everything will remain the same. -- Barne's Law -- To UNSUBSCRIBE, email to [EMAIL PROTECTED] with a subject of "unsubscribe". Trouble? Contact [EMAIL PROTECTED]