debsecan-0.4.18/0000755000000000000000000000000012315633246010243 5ustar debsecan-0.4.18/.git/0000755000000000000000000000000012472425113011100 5ustar debsecan-0.4.18/.git/branches/0000755000000000000000000000000010601557757012701 5ustar debsecan-0.4.18/.git/hooks/0000755000000000000000000000000010601557757012237 5ustar debsecan-0.4.18/.git/hooks/applypatch-msg0000644000000000000000000000067110601557757015117 0ustar #!/bin/sh # # An example hook script to check the commit log message taken by # applypatch from an e-mail message. # # The hook should exit with non-zero status after issuing an # appropriate message if it wants to stop the commit. The hook is # allowed to edit the commit message file. # # To enable this hook, make this file executable. . git-sh-setup test -x "$GIT_DIR/hooks/commit-msg" && exec "$GIT_DIR/hooks/commit-msg" ${1+"$@"} : debsecan-0.4.18/.git/hooks/commit-msg0000644000000000000000000000141510601557757014237 0ustar #!/bin/sh # # An example hook script to check the commit log message. # Called by git-commit with one argument, the name of the file # that has the commit message. The hook should exit with non-zero # status after issuing an appropriate message if it wants to stop the # commit. The hook is allowed to edit the commit message file. # # To enable this hook, make this file executable. # Uncomment the below to add a Signed-off-by line to the message. # SOB=$(git var GIT_AUTHOR_IDENT | sed -n 's/^\(.*>\).*$/Signed-off-by: \1/p') # grep -qs "^$SOB" "$1" || echo "$SOB" >> "$1" # This example catches duplicate Signed-off-by lines. test "" = "$(grep '^Signed-off-by: ' "$1" | sort | uniq -c | sed -e '/^[ ]*1[ ]/d')" || { echo >&2 Duplicate Signed-off-by lines. exit 1 } debsecan-0.4.18/.git/hooks/post-commit0000644000000000000000000000023010601557757014430 0ustar #!/bin/sh # # An example hook script that is called after a successful # commit is made. # # To enable this hook, make this file executable. : Nothing debsecan-0.4.18/.git/hooks/post-update0000644000000000000000000000031710601557757014430 0ustar #!/bin/sh # # An example hook script to prepare a packed repository for use over # dumb transports. # # To enable this hook, make this file executable by "chmod +x post-update". exec git-update-server-info debsecan-0.4.18/.git/hooks/pre-applypatch0000644000000000000000000000060410601557757015113 0ustar #!/bin/sh # # An example hook script to verify what is about to be committed # by applypatch from an e-mail message. # # The hook should exit with non-zero status after issuing an # appropriate message if it wants to stop the commit. # # To enable this hook, make this file executable. . git-sh-setup test -x "$GIT_DIR/hooks/pre-commit" && exec "$GIT_DIR/hooks/pre-commit" ${1+"$@"} : debsecan-0.4.18/.git/hooks/pre-commit0000644000000000000000000000324010601557757014235 0ustar #!/bin/sh # # An example hook script to verify what is about to be committed. # Called by git-commit with no arguments. The hook should # exit with non-zero status after issuing an appropriate message if # it wants to stop the commit. # # To enable this hook, make this file executable. # This is slightly modified from Andrew Morton's Perfect Patch. # Lines you introduce should not have trailing whitespace. # Also check for an indentation that has SP before a TAB. if git-rev-parse --verify HEAD 2>/dev/null then git-diff-index -p -M --cached HEAD else # NEEDSWORK: we should produce a diff with an empty tree here # if we want to do the same verification for the initial import. : fi | perl -e ' my $found_bad = 0; my $filename; my $reported_filename = ""; my $lineno; sub bad_line { my ($why, $line) = @_; if (!$found_bad) { print STDERR "*\n"; print STDERR "* You have some suspicious patch lines:\n"; print STDERR "*\n"; $found_bad = 1; } if ($reported_filename ne $filename) { print STDERR "* In $filename\n"; $reported_filename = $filename; } print STDERR "* $why (line $lineno)\n"; print STDERR "$filename:$lineno:$line\n"; } while (<>) { if (m|^diff --git a/(.*) b/\1$|) { $filename = $1; next; } if (/^@@ -\S+ \+(\d+)/) { $lineno = $1 - 1; next; } if (/^ /) { $lineno++; next; } if (s/^\+//) { $lineno++; chomp; if (/\s$/) { bad_line("trailing whitespace", $_); } if (/^\s* /) { bad_line("indent SP followed by a TAB", $_); } if (/^(?:[<>=]){7}/) { bad_line("unresolved merge conflict", $_); } } } exit($found_bad); ' debsecan-0.4.18/.git/hooks/pre-rebase0000644000000000000000000001024610601557757014212 0ustar #!/bin/sh # # Copyright (c) 2006 Junio C Hamano # publish=next basebranch="$1" if test "$#" = 2 then topic="refs/heads/$2" else topic=`git symbolic-ref HEAD` fi case "$basebranch,$topic" in master,refs/heads/??/*) ;; *) exit 0 ;# we do not interrupt others. ;; esac # Now we are dealing with a topic branch being rebased # on top of master. Is it OK to rebase it? # Is topic fully merged to master? not_in_master=`git-rev-list --pretty=oneline ^master "$topic"` if test -z "$not_in_master" then echo >&2 "$topic is fully merged to master; better remove it." exit 1 ;# we could allow it, but there is no point. fi # Is topic ever merged to next? If so you should not be rebasing it. only_next_1=`git-rev-list ^master "^$topic" ${publish} | sort` only_next_2=`git-rev-list ^master ${publish} | sort` if test "$only_next_1" = "$only_next_2" then not_in_topic=`git-rev-list "^$topic" master` if test -z "$not_in_topic" then echo >&2 "$topic is already up-to-date with master" exit 1 ;# we could allow it, but there is no point. else exit 0 fi else not_in_next=`git-rev-list --pretty=oneline ^${publish} "$topic"` perl -e ' my $topic = $ARGV[0]; my $msg = "* $topic has commits already merged to public branch:\n"; my (%not_in_next) = map { /^([0-9a-f]+) /; ($1 => 1); } split(/\n/, $ARGV[1]); for my $elem (map { /^([0-9a-f]+) (.*)$/; [$1 => $2]; } split(/\n/, $ARGV[2])) { if (!exists $not_in_next{$elem->[0]}) { if ($msg) { print STDERR $msg; undef $msg; } print STDERR " $elem->[1]\n"; } } ' "$topic" "$not_in_next" "$not_in_master" exit 1 fi exit 0 ################################################################ This sample hook safeguards topic branches that have been published from being rewound. The workflow assumed here is: * Once a topic branch forks from "master", "master" is never merged into it again (either directly or indirectly). * Once a topic branch is fully cooked and merged into "master", it is deleted. If you need to build on top of it to correct earlier mistakes, a new topic branch is created by forking at the tip of the "master". This is not strictly necessary, but it makes it easier to keep your history simple. * Whenever you need to test or publish your changes to topic branches, merge them into "next" branch. The script, being an example, hardcodes the publish branch name to be "next", but it is trivial to make it configurable via $GIT_DIR/config mechanism. With this workflow, you would want to know: (1) ... if a topic branch has ever been merged to "next". Young topic branches can have stupid mistakes you would rather clean up before publishing, and things that have not been merged into other branches can be easily rebased without affecting other people. But once it is published, you would not want to rewind it. (2) ... if a topic branch has been fully merged to "master". Then you can delete it. More importantly, you should not build on top of it -- other people may already want to change things related to the topic as patches against your "master", so if you need further changes, it is better to fork the topic (perhaps with the same name) afresh from the tip of "master". Let's look at this example: o---o---o---o---o---o---o---o---o---o "next" / / / / / a---a---b A / / / / / / / / c---c---c---c B / / / / \ / / / / b---b C \ / / / / / \ / ---o---o---o---o---o---o---o---o---o---o---o "master" A, B and C are topic branches. * A has one fix since it was merged up to "next". * B has finished. It has been fully merged up to "master" and "next", and is ready to be deleted. * C has not merged to "next" at all. We would want to allow C to be rebased, refuse A, and encourage B to be deleted. To compute (1): git-rev-list ^master ^topic next git-rev-list ^master next if these match, topic has not merged in next at all. To compute (2): git-rev-list master..topic if this is empty, it is fully merged to "master". debsecan-0.4.18/.git/hooks/update0000644000000000000000000002064310601557757013451 0ustar #!/bin/sh # # An example hook script to mail out commit update information. # It can also blocks tags that aren't annotated. # Called by git-receive-pack with arguments: refname sha1-old sha1-new # # To enable this hook, make this file executable by "chmod +x update". # # Config # ------ # hooks.mailinglist # This is the list that all pushes will go to; leave it blank to not send # emails frequently. The log email will list every log entry in full between # the old ref value and the new ref value. # hooks.announcelist # This is the list that all pushes of annotated tags will go to. Leave it # blank to just use the mailinglist field. The announce emails list the # short log summary of the changes since the last annotated tag # hooks.allowunannotated # This boolean sets whether unannotated tags will be allowed into the # repository. By default they won't be. # # Notes # ----- # All emails have their subjects prefixed with "[SCM]" to aid filtering. # All emails include the headers "X-Git-Refname", "X-Git-Oldrev", # "X-Git-Newrev", and "X-Git-Reftype" to enable fine tuned filtering and info. # --- Constants EMAILPREFIX="[SCM] " LOGBEGIN="- Log -----------------------------------------------------------------" LOGEND="-----------------------------------------------------------------------" DATEFORMAT="%F %R %z" # --- Command line refname="$1" oldrev="$2" newrev="$3" # --- Safety check if [ -z "$GIT_DIR" ]; then echo "Don't run this script from the command line." >&2 echo " (if you want, you could supply GIT_DIR then run" >&2 echo " $0 )" >&2 exit 1 fi if [ -z "$refname" -o -z "$oldrev" -o -z "$newrev" ]; then echo "Usage: $0 " >&2 exit 1 fi # --- Config projectdesc=$(cat $GIT_DIR/description) recipients=$(git-repo-config hooks.mailinglist) announcerecipients=$(git-repo-config hooks.announcelist) allowunannotated=$(git-repo-config --bool hooks.allowunannotated) # --- Check types newrev_type=$(git-cat-file -t "$newrev") case "$refname","$newrev_type" in refs/tags/*,commit) # un-annotated tag refname_type="tag" short_refname=${refname##refs/tags/} if [ "$allowunannotated" != "true" ]; then echo "*** The un-annotated tag, $short_refname is not allowed in this repository" >&2 echo "*** Use 'git tag [ -a | -s ]' for tags you want to propagate." >&2 exit 1 fi ;; refs/tags/*,tag) # annotated tag refname_type="annotated tag" short_refname=${refname##refs/tags/} # change recipients if [ -n "$announcerecipients" ]; then recipients="$announcerecipients" fi ;; refs/heads/*,commit) # branch refname_type="branch" short_refname=${refname##refs/heads/} ;; refs/remotes/*,commit) # tracking branch refname_type="tracking branch" short_refname=${refname##refs/remotes/} # Should this even be allowed? echo "*** Push-update of tracking branch, $refname. No email generated." >&2 exit 0 ;; *) # Anything else (is there anything else?) echo "*** Update hook: unknown type of update, \"$newrev_type\", to ref $refname" >&2 exit 1 ;; esac # Check if we've got anyone to send to if [ -z "$recipients" ]; then # If the email isn't sent, then at least give the user some idea of what command # would generate the email at a later date echo "*** No recipients found - no email will be sent, but the push will continue" >&2 echo "*** for $0 $1 $2 $3" >&2 exit 0 fi # --- Email parameters committer=$(git show --pretty=full -s $newrev | grep "^Commit: " | sed -e "s/^Commit: //") describe=$(git describe $newrev 2>/dev/null) if [ -z "$describe" ]; then describe=$newrev fi # --- Email (all stdout will be the email) ( # Generate header cat <<-EOF From: $committer To: $recipients Subject: ${EMAILPREFIX}$projectdesc $refname_type, $short_refname now at $describe X-Git-Refname: $refname X-Git-Reftype: $refname_type X-Git-Oldrev: $oldrev X-Git-Newrev: $newrev Hello, This is an automated email from the git hooks/update script, it was generated because a ref change was pushed to the repository. Updating $refname_type, $short_refname, EOF case "$refname_type" in "tracking branch"|branch) if expr "$oldrev" : '0*$' >/dev/null then # If the old reference is "0000..0000" then this is a new branch # and so oldrev is not valid echo " as a new $refname_type" echo " to $newrev ($newrev_type)" echo "" echo $LOGBEGIN # This shows all log entries that are not already covered by # another ref - i.e. commits that are now accessible from this # ref that were previously not accessible git-rev-parse --not --all | git-rev-list --stdin --pretty $newref echo $LOGEND else # oldrev is valid oldrev_type=$(git-cat-file -t "$oldrev") # Now the problem is for cases like this: # * --- * --- * --- * (oldrev) # \ # * --- * --- * (newrev) # i.e. there is no guarantee that newrev is a strict subset # of oldrev - (would have required a force, but that's allowed). # So, we can't simply say rev-list $oldrev..$newrev. Instead # we find the common base of the two revs and list from there baserev=$(git-merge-base $oldrev $newrev) # Commit with a parent for rev in $(git-rev-list $newrev ^$baserev) do revtype=$(git-cat-file -t "$rev") echo " via $rev ($revtype)" done if [ "$baserev" = "$oldrev" ]; then echo " from $oldrev ($oldrev_type)" else echo " based on $baserev" echo " from $oldrev ($oldrev_type)" echo "" echo "This ref update crossed a branch point; i.e. the old rev is not a strict subset" echo "of the new rev. This occurs, when you --force push a change in a situation" echo "like this:" echo "" echo " * -- * -- B -- O -- O -- O ($oldrev)" echo " \\" echo " N -- N -- N ($newrev)" echo "" echo "Therefore, we assume that you've already had alert emails for all of the O" echo "revisions, and now give you all the revisions in the N branch from the common" echo "base, B ($baserev), up to the new revision." fi echo "" echo $LOGBEGIN git-rev-list --pretty $newrev ^$baserev echo $LOGEND echo "" echo "Diffstat:" git-diff-tree --no-color --stat -M -C --find-copies-harder $newrev ^$baserev fi ;; "annotated tag") # Should we allow changes to annotated tags? if expr "$oldrev" : '0*$' >/dev/null then # If the old reference is "0000..0000" then this is a new atag # and so oldrev is not valid echo " to $newrev ($newrev_type)" else echo " to $newrev ($newrev_type)" echo " from $oldrev" fi # If this tag succeeds another, then show which tag it replaces prevtag=$(git describe $newrev^ 2>/dev/null | sed 's/-g.*//') if [ -n "$prevtag" ]; then echo " replaces $prevtag" fi # Read the tag details eval $(git cat-file tag $newrev | \ sed -n '4s/tagger \([^>]*>\)[^0-9]*\([0-9]*\).*/tagger="\1" ts="\2"/p') tagged=$(date --date="1970-01-01 00:00:00 +0000 $ts seconds" +"$DATEFORMAT") echo " tagged by $tagger" echo " on $tagged" echo "" echo $LOGBEGIN echo "" if [ -n "$prevtag" ]; then git rev-list --pretty=short "$prevtag..$newrev" | git shortlog else git rev-list --pretty=short $newrev | git shortlog fi echo $LOGEND echo "" ;; *) # By default, unannotated tags aren't allowed in; if # they are though, it's debatable whether we would even want an # email to be generated; however, I don't want to add another config # option just for that. # # Unannotated tags are more about marking a point than releasing # a version; therefore we don't do the shortlog summary that we # do for annotated tags above - we simply show that the point has # been marked, and print the log message for the marked point for # reference purposes # # Note this section also catches any other reference type (although # there aren't any) and deals with them in the same way. if expr "$oldrev" : '0*$' >/dev/null then # If the old reference is "0000..0000" then this is a new tag # and so oldrev is not valid echo " as a new $refname_type" echo " to $newrev ($newrev_type)" else echo " to $newrev ($newrev_type)" echo " from $oldrev" fi echo "" echo $LOGBEGIN git-show --no-color --root -s $newrev echo $LOGEND echo "" ;; esac # Footer cat <<-EOF hooks/update --- Git Source Code Management System $0 $1 \\ $2 \\ $3 EOF #) | cat >&2 ) | /usr/sbin/sendmail -t # --- Finished exit 0 debsecan-0.4.18/.git/info/0000755000000000000000000000000011345002266012031 5ustar debsecan-0.4.18/.git/info/exclude0000644000000000000000000000035610654704436013423 0ustar # git-ls-files --others --exclude-from=.git/info/exclude # Lines that start with '#' are comments. # For a project mostly in C, the following would be a good set of # exclude patterns (uncomment them if you want to use them): # *.[oa] *~ debsecan-0.4.18/.git/info/refs0000644000000000000000000000652111345002266012717 0ustar c9471aaeed8994d10cdeba2cdcc12dadc89f91a0 refs/heads/master dc7041a6840c6fab9dd39dcc7f407dea90eae95d refs/tags/v0.1 64655b70c5e1afde33d9233529bf502e8c6b1281 refs/tags/v0.1^{} 932698ebe20b4b5b649b10dc34cf9fddf5692904 refs/tags/v0.2 e98a18baeb9d7c3bfc4e558ef9ce31d92fdd3a5d refs/tags/v0.2^{} fa2417883f851b7c7083aa5492c8383927a2f04e refs/tags/v0.2.1 9d4a85c3314615fc00d13634850faa58503e005d refs/tags/v0.2.1^{} 0706c27d523a981a51df9bb62d541ca23381c661 refs/tags/v0.3 d983d0d1c7934eae96836209edab3da6e97132bd refs/tags/v0.3^{} 7af641b7e13591142c2e230f4bd63e2c0f43705a refs/tags/v0.3.1 793b3a97a28f49dcc4b140b40b2b27224cea613d refs/tags/v0.3.1^{} c76a5c7ac9f290e58ec925a15d2593540f1efe9e refs/tags/v0.3.2 9d276a2d9a700c66d2fb46947dba88daedac2b71 refs/tags/v0.3.2^{} 4d6a3a8c5e578726207e6b13260c1c437c662d96 refs/tags/v0.3.3 3c23f6ca48900c953c283bba462880be6a0df104 refs/tags/v0.3.3^{} 9aa24c92e28eefb25d9b3a63b58a11ef3e9aadf8 refs/tags/v0.3.4 a3c677df4a3be4d55f5acf8285d89ed9d40b55a2 refs/tags/v0.3.4^{} 258e786dad74e210220ef03e45cc69700523fdb7 refs/tags/v0.4.0 8eb4230f8e7a7bdccff459b837f940c3f345671d refs/tags/v0.4.0^{} 99790f3024479201159665bf852f6eebca7d760f refs/tags/v0.4.1 258e9dc312f4bba5b0fdd6b80eb8fa230095f520 refs/tags/v0.4.1^{} cf65f7d94693bd9298779c32e99d4d739cec6c9d refs/tags/v0.4.10 0f370ed2c4e20c993ddac86e8fc9f839b0dff715 refs/tags/v0.4.10^{} f3e193797d675ee2d25e14eadf4a11d3fae2bb70 refs/tags/v0.4.11 105115c8ff6fa9934f201b664e8078be21379c61 refs/tags/v0.4.11^{} becdbf48182172fc827808f6fb7641cc68b503f1 refs/tags/v0.4.12 41bcaf86725e62f4bbc39fe0309aebe5d57657ee refs/tags/v0.4.12^{} 6a4c784e9ef2b1cd25ccf1ff5a1ea6cf4811dfe5 refs/tags/v0.4.13 74dbc385473a4ac011a30b0c33cce23724c3f552 refs/tags/v0.4.13^{} 63fe29062fd793f7f7bcd4fba1933bafe70c0d0c refs/tags/v0.4.14 c9471aaeed8994d10cdeba2cdcc12dadc89f91a0 refs/tags/v0.4.14^{} 2804aee6b542c2622c7b1bac59d4374053917fa0 refs/tags/v0.4.2 5908bc3b264ad5dc9e3d7634260182562cf0b988 refs/tags/v0.4.2^{} 11c7d9cf7390a08880e3c2100a1321599a063ade refs/tags/v0.4.3 3a468ddd113db6f0a752dd43064f584cbb97e79c refs/tags/v0.4.3^{} bbf07d9ce1f7ae531e7d294f16ebb532d54a2311 refs/tags/v0.4.3.1 50cbb68bf84331b83f0799d33d1cff1a93bbfbed refs/tags/v0.4.3.1^{} 109e0531e3634e9d7849033999487684d1d001a4 refs/tags/v0.4.3.2 a2bc4bd58b03f5fa0e3b9ef257d583d9a3f99851 refs/tags/v0.4.3.2^{} e18f51a40ab2b17ab172b8fa7803f72d77f8cca1 refs/tags/v0.4.3.3 97e11eb6c1d73cd53bee74d671f0094cf944478e refs/tags/v0.4.3.3^{} 110ea031bb828ce2824a43076446740775983af4 refs/tags/v0.4.3.4 a1cfe3c9b7c8ef598678436db79690d62b54642f refs/tags/v0.4.3.4^{} bb9d3a5df5f3779c703966fbf824cae20601db8f refs/tags/v0.4.3.5 1ed1217e5cd587ed588b56462b8e956b094dd109 refs/tags/v0.4.3.5^{} d8e1d1f289461b06ec34fd751769ccd99fd07c92 refs/tags/v0.4.4 070f684f69d566628447a4b4215245e13e853660 refs/tags/v0.4.4^{} b97a0c5f6a3a367f0a10719f59b418e01eb61b55 refs/tags/v0.4.5 79e79312437df8a0116b2c97e08cfbb2fb7d6404 refs/tags/v0.4.5^{} b7cec35037161eb50e865d6231f18c5183de1b44 refs/tags/v0.4.6 fad8f40227a899ca0f0b8da24a1b9c8d61ddc6dd refs/tags/v0.4.6^{} 956e3b99c3fbf0cd5d4819e7424f4fc7f823157f refs/tags/v0.4.7 32c474ad5f00d898dfae9b590d994cfb432d7529 refs/tags/v0.4.7^{} 2a7d6ce71248be312cb6574e3ba578e24c0455bc refs/tags/v0.4.8 51bc2b20b922a5207bf00f895eacbececa2d5436 refs/tags/v0.4.8^{} 932e1be1081f9fbca94da58adf6b8f624183c57b refs/tags/v0.4.9 9c74e702d840fc583b6772c661757f84c2fc9b08 refs/tags/v0.4.9^{} debsecan-0.4.18/.git/logs/0000755000000000000000000000000011345002266012042 5ustar debsecan-0.4.18/.git/logs/refs/0000755000000000000000000000000012472424063013006 5ustar debsecan-0.4.18/.git/logs/refs/heads/0000755000000000000000000000000012311570567014075 5ustar debsecan-0.4.18/.git/logs/refs/heads/git-darcs0000644000000000000000000000000011345002266015653 0ustar debsecan-0.4.18/.git/logs/refs/heads/master0000644000000000000000000001221512472425113015306 0ustar 3dd88923e26a11950801f6faadc10c001f9be45b 671334cb4f904484a5b843382e576eb20d216cc9 Florian Weimer 1267977171 +0100 commit: Try both version_compare and VersionCompare 671334cb4f904484a5b843382e576eb20d216cc9 ba08e97eeee927abc665efa161c4a5b593933741 Florian Weimer 1267977332 +0100 commit: Adjust test suite URLs ba08e97eeee927abc665efa161c4a5b593933741 3565f17bafbd42853857afcb988dd78c90d54bf4 Florian Weimer 1267978696 +0100 commit: Remove old upgrade code from postinst 3565f17bafbd42853857afcb988dd78c90d54bf4 05facbfc873bf53d4b930310497e3a223cda618c Florian Weimer 1267979481 +0100 commit: Update debconf parser for lenny, squeeze 05facbfc873bf53d4b930310497e3a223cda618c 72143648e8ee558d83d4455f7959738c58c83cdb Florian Weimer 1267979500 +0100 commit: Remove debconf migration code 72143648e8ee558d83d4455f7959738c58c83cdb a38ad2de4ea153f3e0bbc0b40c08dfe9693b0157 Florian Weimer 1267980618 +0100 commit: /etc/default/debsecan is no longer a conffile a38ad2de4ea153f3e0bbc0b40c08dfe9693b0157 762ff5cf80a9aeaeda59d43e8bce53b4ed74b6d1 Florian Weimer 1267981063 +0100 commit: Further fixes for configuration file handling 762ff5cf80a9aeaeda59d43e8bce53b4ed74b6d1 2c93826b81d19c8cc6f47ead23ff2974064ca50e Florian Weimer 1267981720 +0100 commit: Bump Standards-Version 2c93826b81d19c8cc6f47ead23ff2974064ca50e fa9b7c99c11f00d7caf655083237f554fccc2f7d Florian Weimer 1267982391 +0100 commit: Update tracker URL in README fa9b7c99c11f00d7caf655083237f554fccc2f7d c9471aaeed8994d10cdeba2cdcc12dadc89f91a0 Florian Weimer 1267982460 +0100 commit: Update Debian changelog c9471aaeed8994d10cdeba2cdcc12dadc89f91a0 1ed6b5f3dda5a4711cac070eeac696b7c1aef659 Florian Weimer 1307016657 +0200 commit: Actually support recent python-apt 1ed6b5f3dda5a4711cac070eeac696b7c1aef659 a6146271c0d958a21a6ed57a5eab03c273e383e8 Florian Weimer 1307016747 +0200 commit: Update Debian changelog a6146271c0d958a21a6ed57a5eab03c273e383e8 208ee045639a7efc4d8b3807471d7dcbccf80e75 Florian Weimer 1317906199 +0200 commit: Patch from Paul Wise to support wheezy 208ee045639a7efc4d8b3807471d7dcbccf80e75 6e07c04a46590ed195c824fbe797f02ca168ef62 Florian Weimer 1327521196 +0100 commit: Update Debian changelog 6e07c04a46590ed195c824fbe797f02ca168ef62 4795aab0e6c51692455583d263b79cab0be41f5a Florian Weimer 1390759780 +0100 commit: testsuite/show-compressed: only use URL prefix if not already supplied 4795aab0e6c51692455583d263b79cab0be41f5a b3b3c752ccca522c05fb7c3c0baeaf15c3770db1 Florian Weimer 1395061103 +0100 rebase finished: refs/heads/master onto 3ba94bb9719994f78104ab12e9aae2c26a5f6c94 b3b3c752ccca522c05fb7c3c0baeaf15c3770db1 d28d0f557dfc9f5f9ea8f326ceaa1395cb020fc4 Florian Weimer 1395062242 +0100 commit: Patch from Stephen Kitt to support jessie (#709562) d28d0f557dfc9f5f9ea8f326ceaa1395cb020fc4 0fca4c0af14fdd2fab74982985dd2387df3af26c Florian Weimer 1395062701 +0100 commit: Patch from Paul Wise to switch the URL of the default data source 0fca4c0af14fdd2fab74982985dd2387df3af26c 0a0014f852006bfa5d80ef0e24aafff342652557 Florian Weimer 1395133992 +0100 commit: Fix error reporting in configuration file parsing 0a0014f852006bfa5d80ef0e24aafff342652557 405d56a6146a65d4223631952ce0fec69ac3ac9f Florian Weimer 1395134237 +0100 commit: Support underscores in configuration file keys 405d56a6146a65d4223631952ce0fec69ac3ac9f 9e83df0434551c8a11732aa0c58252db5ac93cfb Florian Weimer 1395134306 +0100 commit: Implement HTTPS certificate checks 9e83df0434551c8a11732aa0c58252db5ac93cfb 8431c54cefc040359d7bb45c4ed8cadf7b4e6831 Florian Weimer 1395155991 +0100 commit: Update Debian changelog 8431c54cefc040359d7bb45c4ed8cadf7b4e6831 138c543593f8b17a2c3186a349d93766cc805ddd Florian Weimer 1395156844 +0100 commit: Increase compatibility with Python 2.6 in squeeze 138c543593f8b17a2c3186a349d93766cc805ddd 8524f815bfcd0342d52976ed076bb893f3cb0691 Florian Weimer 1395169679 +0100 commit: Add dependency on package ca-certificates 8524f815bfcd0342d52976ed076bb893f3cb0691 fa0c4ba47b23a4735c49e8580a276177ad0a4747 Florian Weimer 1396127398 +0100 am: Use https in links where available fa0c4ba47b23a4735c49e8580a276177ad0a4747 09efc0d6e81bbaaa58b543e9634a1be7831de5f3 Florian Weimer 1396127620 +0100 commit: Remaining test suite changes for https:// URLs 09efc0d6e81bbaaa58b543e9634a1be7831de5f3 6235aa0b405379406237fb8dd9167f7d8d429cb9 Florian Weimer 1396127852 +0100 commit: Add version control URL to the control file 6235aa0b405379406237fb8dd9167f7d8d429cb9 dbc5cca844136f8c8ab8ed5a60b740063913ee1d Florian Weimer 1424631979 +0100 commit: Update Vcs-Git URL to Gitorious dbc5cca844136f8c8ab8ed5a60b740063913ee1d 3be9cfede853372ee27e9c5988569dc8603daf7c Florian Weimer 1424632395 +0100 commit: Update Debian changelog debsecan-0.4.18/.git/logs/refs/heads/xml0000644000000000000000000000051011571677224014621 0ustar 0000000000000000000000000000000000000000 a6146271c0d958a21a6ed57a5eab03c273e383e8 Florian Weimer 1307016821 +0200 branch: Created from HEAD a6146271c0d958a21a6ed57a5eab03c273e383e8 0b7f25d2cc25c781be9e114f0874e445584dc951 Florian Weimer 1307016847 +0200 commit: Initial work on XML support debsecan-0.4.18/.git/logs/refs/remotes/0000755000000000000000000000000012472424063014464 5ustar debsecan-0.4.18/.git/logs/refs/remotes/gitorious/0000755000000000000000000000000012472424063016510 5ustar debsecan-0.4.18/.git/logs/refs/remotes/gitorious/master0000644000000000000000000000045012472424276017733 0ustar 0000000000000000000000000000000000000000 6235aa0b405379406237fb8dd9167f7d8d429cb9 Florian Weimer 1424631859 +0100 update by push 6235aa0b405379406237fb8dd9167f7d8d429cb9 dbc5cca844136f8c8ab8ed5a60b740063913ee1d Florian Weimer 1424631998 +0100 update by push debsecan-0.4.18/.git/logs/HEAD0000644000000000000000000001525412472425113012477 0ustar 3dd88923e26a11950801f6faadc10c001f9be45b 671334cb4f904484a5b843382e576eb20d216cc9 Florian Weimer 1267977171 +0100 commit: Try both version_compare and VersionCompare 671334cb4f904484a5b843382e576eb20d216cc9 ba08e97eeee927abc665efa161c4a5b593933741 Florian Weimer 1267977332 +0100 commit: Adjust test suite URLs ba08e97eeee927abc665efa161c4a5b593933741 3565f17bafbd42853857afcb988dd78c90d54bf4 Florian Weimer 1267978696 +0100 commit: Remove old upgrade code from postinst 3565f17bafbd42853857afcb988dd78c90d54bf4 05facbfc873bf53d4b930310497e3a223cda618c Florian Weimer 1267979481 +0100 commit: Update debconf parser for lenny, squeeze 05facbfc873bf53d4b930310497e3a223cda618c 72143648e8ee558d83d4455f7959738c58c83cdb Florian Weimer 1267979500 +0100 commit: Remove debconf migration code 72143648e8ee558d83d4455f7959738c58c83cdb a38ad2de4ea153f3e0bbc0b40c08dfe9693b0157 Florian Weimer 1267980618 +0100 commit: /etc/default/debsecan is no longer a conffile a38ad2de4ea153f3e0bbc0b40c08dfe9693b0157 762ff5cf80a9aeaeda59d43e8bce53b4ed74b6d1 Florian Weimer 1267981063 +0100 commit: Further fixes for configuration file handling 762ff5cf80a9aeaeda59d43e8bce53b4ed74b6d1 2c93826b81d19c8cc6f47ead23ff2974064ca50e Florian Weimer 1267981720 +0100 commit: Bump Standards-Version 2c93826b81d19c8cc6f47ead23ff2974064ca50e fa9b7c99c11f00d7caf655083237f554fccc2f7d Florian Weimer 1267982391 +0100 commit: Update tracker URL in README fa9b7c99c11f00d7caf655083237f554fccc2f7d c9471aaeed8994d10cdeba2cdcc12dadc89f91a0 Florian Weimer 1267982460 +0100 commit: Update Debian changelog c9471aaeed8994d10cdeba2cdcc12dadc89f91a0 1ed6b5f3dda5a4711cac070eeac696b7c1aef659 Florian Weimer 1307016657 +0200 commit: Actually support recent python-apt 1ed6b5f3dda5a4711cac070eeac696b7c1aef659 a6146271c0d958a21a6ed57a5eab03c273e383e8 Florian Weimer 1307016747 +0200 commit: Update Debian changelog a6146271c0d958a21a6ed57a5eab03c273e383e8 a6146271c0d958a21a6ed57a5eab03c273e383e8 Florian Weimer 1307016821 +0200 checkout: moving from master to xml a6146271c0d958a21a6ed57a5eab03c273e383e8 0b7f25d2cc25c781be9e114f0874e445584dc951 Florian Weimer 1307016847 +0200 commit: Initial work on XML support 0b7f25d2cc25c781be9e114f0874e445584dc951 a6146271c0d958a21a6ed57a5eab03c273e383e8 Florian Weimer 1307016855 +0200 checkout: moving from xml to master a6146271c0d958a21a6ed57a5eab03c273e383e8 208ee045639a7efc4d8b3807471d7dcbccf80e75 Florian Weimer 1317906199 +0200 commit: Patch from Paul Wise to support wheezy 208ee045639a7efc4d8b3807471d7dcbccf80e75 6e07c04a46590ed195c824fbe797f02ca168ef62 Florian Weimer 1327521196 +0100 commit: Update Debian changelog 6e07c04a46590ed195c824fbe797f02ca168ef62 4795aab0e6c51692455583d263b79cab0be41f5a Florian Weimer 1390759780 +0100 commit: testsuite/show-compressed: only use URL prefix if not already supplied 4795aab0e6c51692455583d263b79cab0be41f5a 4795aab0e6c51692455583d263b79cab0be41f5a Florian Weimer 1395060889 +0100 checkout: moving from master to tmp 4795aab0e6c51692455583d263b79cab0be41f5a 6e07c04a46590ed195c824fbe797f02ca168ef62 Florian Weimer 1395060896 +0100 reset: moving to HEAD^ 6e07c04a46590ed195c824fbe797f02ca168ef62 3ba94bb9719994f78104ab12e9aae2c26a5f6c94 Florian Weimer 1395061042 +0100 commit: Apply changes in debsecan 0.4.16+nmu1 3ba94bb9719994f78104ab12e9aae2c26a5f6c94 4795aab0e6c51692455583d263b79cab0be41f5a Florian Weimer 1395061101 +0100 checkout: moving from tmp to master 4795aab0e6c51692455583d263b79cab0be41f5a 3ba94bb9719994f78104ab12e9aae2c26a5f6c94 Florian Weimer 1395061103 +0100 checkout: moving from master to 3ba94bb9719994f78104ab12e9aae2c26a5f6c94^0 3ba94bb9719994f78104ab12e9aae2c26a5f6c94 b3b3c752ccca522c05fb7c3c0baeaf15c3770db1 Florian Weimer 1395061103 +0100 rebase: testsuite/show-compressed: only use URL prefix if not already supplied b3b3c752ccca522c05fb7c3c0baeaf15c3770db1 b3b3c752ccca522c05fb7c3c0baeaf15c3770db1 Florian Weimer 1395061103 +0100 rebase finished: returning to refs/heads/master b3b3c752ccca522c05fb7c3c0baeaf15c3770db1 d28d0f557dfc9f5f9ea8f326ceaa1395cb020fc4 Florian Weimer 1395062242 +0100 commit: Patch from Stephen Kitt to support jessie (#709562) d28d0f557dfc9f5f9ea8f326ceaa1395cb020fc4 0fca4c0af14fdd2fab74982985dd2387df3af26c Florian Weimer 1395062701 +0100 commit: Patch from Paul Wise to switch the URL of the default data source 0fca4c0af14fdd2fab74982985dd2387df3af26c 0a0014f852006bfa5d80ef0e24aafff342652557 Florian Weimer 1395133992 +0100 commit: Fix error reporting in configuration file parsing 0a0014f852006bfa5d80ef0e24aafff342652557 405d56a6146a65d4223631952ce0fec69ac3ac9f Florian Weimer 1395134237 +0100 commit: Support underscores in configuration file keys 405d56a6146a65d4223631952ce0fec69ac3ac9f 9e83df0434551c8a11732aa0c58252db5ac93cfb Florian Weimer 1395134306 +0100 commit: Implement HTTPS certificate checks 9e83df0434551c8a11732aa0c58252db5ac93cfb 8431c54cefc040359d7bb45c4ed8cadf7b4e6831 Florian Weimer 1395155991 +0100 commit: Update Debian changelog 8431c54cefc040359d7bb45c4ed8cadf7b4e6831 138c543593f8b17a2c3186a349d93766cc805ddd Florian Weimer 1395156844 +0100 commit: Increase compatibility with Python 2.6 in squeeze 138c543593f8b17a2c3186a349d93766cc805ddd 8524f815bfcd0342d52976ed076bb893f3cb0691 Florian Weimer 1395169679 +0100 commit: Add dependency on package ca-certificates 8524f815bfcd0342d52976ed076bb893f3cb0691 fa0c4ba47b23a4735c49e8580a276177ad0a4747 Florian Weimer 1396127398 +0100 am: Use https in links where available fa0c4ba47b23a4735c49e8580a276177ad0a4747 09efc0d6e81bbaaa58b543e9634a1be7831de5f3 Florian Weimer 1396127620 +0100 commit: Remaining test suite changes for https:// URLs 09efc0d6e81bbaaa58b543e9634a1be7831de5f3 6235aa0b405379406237fb8dd9167f7d8d429cb9 Florian Weimer 1396127852 +0100 commit: Add version control URL to the control file 6235aa0b405379406237fb8dd9167f7d8d429cb9 dbc5cca844136f8c8ab8ed5a60b740063913ee1d Florian Weimer 1424631979 +0100 commit: Update Vcs-Git URL to Gitorious dbc5cca844136f8c8ab8ed5a60b740063913ee1d 3be9cfede853372ee27e9c5988569dc8603daf7c Florian Weimer 1424632395 +0100 commit: Update Debian changelog debsecan-0.4.18/.git/objects/0000755000000000000000000000000012472424262012535 5ustar debsecan-0.4.18/.git/objects/08/0000755000000000000000000000000011571677217012775 5ustar debsecan-0.4.18/.git/objects/08/8f2aa8720e6706650fbedc00b9537acfe835d10000644000000000000000000000022311571677217020204 0ustar x+)JMU047a040031QHIM*NMNc |cb_-F7(5$H1|^s4 MKGW_[?Hı_NW߯R|:U9!y_kӽ5/`yE;-u'z-Yǁ`XU1{;Y^rt9aq%,W$hdebsecan-0.4.18/.git/objects/16/976c33f0980975eb03fea2fd0d4deccb017fbf0000644000000000000000000000100412271247544020417 0ustar x+)JMU04f040031QK,L/Je6wOj i21CjeggT_.۫ZltP/LֈϱCWsrmFݮTW)0Yc?S}p 량\vdML\񵲸 'dM?r9dJ?ly9PX򫅀'CQdKsNm*i;z&kpsz~;y$.2Ӂ?PYC[* ,z̞/m2?|Er-ڷdD^hvj3Wo|;L֘[mj8V}kS6Lքለf_T^95qB+иJM,M-(J-.NMa -A.ss#S۫˷]*M)I-BV|{m}Vq㷇PEyz =~8IY"_)8#0FyZ%dw'~$1debsecan-0.4.18/.git/objects/16/23cd7a35832e2d96147099ab10306a51e1c4f40000644000000000000000000000031712315633246017662 0ustar xU=KADWT`fpn8 ݽ Asn?\4¶Ad14#'BP+TsMDG6&ےWZfo=^0ܶ,4Y &D>Gt*8f[4]9a1+zzVAا.{FnLui^)2%åg6C+~;^debsecan-0.4.18/.git/objects/18/0000755000000000000000000000000012311573636012767 5ustar debsecan-0.4.18/.git/objects/18/6124adb66531aab48b12a5a330857baa65559c0000644000000000000000000000041411571677053020021 0ustar x+)JMU027b040031QK,L/Je8lj~sbkt]Mm0,rsgؾGGݏ%,-|n-*MNMIeX9sT_Þ1Yz/TM+CݜK<^P˙RR2^26r TA~2CS4Mn欧n-.Jf8$|c͇Ois)=`-I-.).,Iep]_)C4odebsecan-0.4.18/.git/objects/18/a6cbe3ff667a190850a38680f5fe1a80a2c23c0000644000000000000000000000075112311573636020177 0ustar xڽ_@}O1FJ7& BU(''BfۆqfZ?֫ vK ;3;ecK߼}ˬ#d>Й_M]^6, bB?=~O?ξ;Z*ڝGz1tY+ZfU*vS&ChE:˳!SmF2Up{\Aԑi$rk2_,Ɔ&Rr jNj>[t ҹirXt7ۖi1r-H?Kzm-j"٥U%8=zije26/fw!0QU1=8jx?SQ=X<(I?IɜK<uİ˕`_>G`r+>ao'Ozbij 7%U4jK T%IJmxdg~LUB4?#okʛe^W;$| ]9{왼 Adebsecan-0.4.18/.git/objects/1e/0000755000000000000000000000000012311570462013036 5ustar debsecan-0.4.18/.git/objects/1e/d6b5f3dda5a4711cac070eeac696b7c1aef6590000644000000000000000000000026411571676730020562 0ustar xJ0ay$iD܋yvf6 1E>pS~]rVin gN䜈_b 4hT%W*^wѢ^Dzh9DxFh8?fsqж}V oS^ sPdebsecan-0.4.18/.git/objects/1e/c0359fdf7df4a81ff45df41ae7e8f14c4743ee0000644000000000000000000000115612311570462020516 0ustar x+)JMU071f040031Qqq cpܖsQo6hk*KN+gcrJ= 9ʹJŸ^w8U6ay離3e޸߱ޥe0 6\Zz#P`+͙6im>Zs,^OR'5ʛ'=\7ŝqPi 9-m*T`m>L J^v,TA^H;n7oEVe.}rY#{$zn:#CzKל9; _sڙYx׳;EL9]N}pNA 5~l<ϫ%g*ni)G$9/o䄆Pe舖X[`wm^UA*3JRs rK_lEΩ&Y-1^Y[O΄@_jb=54<ӝ= tY9nG8+M.+L۾TzG.Xndebsecan-0.4.18/.git/objects/48/0000755000000000000000000000000011710056654012770 5ustar debsecan-0.4.18/.git/objects/48/4c14624f42fec27827f6bebb2e927a22c11e400000644000000000000000000000735011710056654020116 0ustar xZrFgEWMDWde;Uʒוc~> @ISrp>}t7&2;'YYI*,^GD?y+EiZ]:OTi*v7]iySh&Zzڋe#әyS5 ;[G3wpUE5`<ӔXhؽXTF.+{]ᗢH^s3ֶD2c%5@r4o5TU+xNdp]&KQ0rc'#ݓ5Qp5m^'UoeL DqKt1;وK #\I}gFx8R;jąUFNm"?x+[E$6h88=vע:#oHrb^0vs~q GY <"1<رzhcd96M]¥-l= z%BuO&&6\D5f:Ck<ӽfrڱ^yDjp) sq[|-f>Ves]O*=f{fHc$gp:G37 py;N@@6ߦQX܃}j%G2/D }1W9؈{¨F!J+2M 'w lp̎Ps==6VdbSt]*=ul>gchW]/eT6y{ޯ`JMC([ 1H}ol.6ۃ to9GX]WO;#2ExHUP h SV,J( ` mFa(I=.XY}RA- 4-q? q 2gO,w %_\ik`|}?| )ༀ|?T^+ I; h`: Fs?&N~3J~&dF(h0S0 j慌E$=d%#6 ZmIS+̰ fetr~ܢEH+uc Hn`F 4ŽOL{8 +=ȮOTu D263NI 1 KBlm¯ѲA8zݘV]Ch]|K6{GD& ^\,&P*Uklb(v:to"nBqzbsBnJ;»qk+T/a7*B;yʉjLWsCL'7)nb2lfA1ڲj{$ψDg`Ɛ/~x3 <^GhM@sAd ?"l"uh}Qm~拁ӽ`E/vx87;8V{$σ;\u3,D9gyF-w8vѨqy⣺/8bAk]{aa>b`y5vhx %L!8־vD&R VKs>n"y+8@v=䓘vt!냱s sA # lUpk. Y!Sz!+szP6 8|ԋ lx{y >۷1fmr I2n6^oT5JZSm?u@A\{Q(8{w7M& 5 ?اosX׌~,qe7Jvm>K0w6Δ=SL`PȀ 4Kee( YlYeĹ aj>)/O~G]X20)a"a)ޚ?`ɨ |0tey KFߝ~S6^Cidebsecan-0.4.18/.git/objects/51/0000755000000000000000000000000012311570462012756 5ustar debsecan-0.4.18/.git/objects/51/1154599aa7b183f2d13b28da5de9e89b1562260000644000000000000000000003210411571676721017773 0ustar x}sǑ3=T-;(]"źȒJ(K'pH3)<=_ 7Wo([wgzzkzzzfNiŗ{YY^ֽld\d~U5[dx~B'⦚_,῿=.Y5/fuj|YY]-U\elʧzYNW<-q1+천nV4E-3O/dʋϳ׫lMγ1Z"fψa=+w|UvW5>wM$ %Ѯrj&9y4E@o.il5AK F^9^%_`WB].3TVO|>/?{ӣ٫ {}pxɛ7_=f`^lq]eq.=Axβ\dאJ`X nvN w/D?BgEvozY;YG>GٛOzg/z[[ rY-'[gUyM Wrkb\A+|T9`e~ ݯ|̗_c -s7ܿXUs/-1`{kY<1MK dV$_,Ӫ*ۀUzз}OB8ejöe^/-墬g˲iMa:dP)&XsA_A& FBo|U( o5h_"*&7;4aQY>oHRu' -^_@u7̊zv50BXM/[[3 fH L9Cv}1\4ʔԳss ym[{>8b|cT/|,SyQ-dVШ ](S:˼Bce%q4l's-:I1r"~Xlgw=|^,BPda:h3-`ٷӗ>q1ƈeGUrUAf<$o}^Nv^v?|HzaڷUOD>@[Z-#.E]Cq!_br6>PɅ!eu@u׏O @Buʓz{;u6_m6fzߙ*j :G|FM9x} O[8P9^-/.=k2̓* i:sOId[N^<,p4 lG[e:m[s}!M. t"2nnappX/zexDxRSQz%1gfTezjbSةp-Wg1X|f-U>:p1 )ax?589xw?~<`7߼?~ Ic6YyDD\*q3H>?9{w羼u~Pk<\pZ??2(#Aσ! !@bT-2O/x dP~VHߌGlmh0nǎe(>rK`?{_Cݓ,ŢioA mh?+K6X]jZ_S mۃZ LMq A)K)4UR|ʺ8So7&&t`ޙ_ZZ<͢=v)d I9e jL?L-pfBaP0"ҡ^ճOEg8gXZbdaB8S4;4wYfWy^0qNt?lU+)˄Hp*+fJc2|rM;`;ה F* |eYKZTfIV/p֏,׭Dqm v( C}Y q m3% 6Zfȑ/Ws~Qa D,-nB!ȩt4l"9p"d3Yfրj"|$L>& %/֡pj[w1‡$Sw.<{϶ۜHQ3}[U{* |۝LK7l#McJ<<˹'N|- ,i ~/JAJoz` !iˤL >BoqoJD5{FӖ)^:+#w,]oUgg&+=.q"q#FB&7x W߃;D&gn~̽ p@656Ura^|b8Č+#JYrh}$š`CKIJ,~}$X 8jJmm(6F%!V4WZ&HFm$nt,kb㹛"Fd-[N]{0ϊ0+,:6t5u8kxݝ:jo nC猴@W07MTR*R|l.Azؑ)U~9FvSL_bXâvyyT&] C"JM4Y"CG;k /-X :q=]%UX_{2)-K)5bNįĪ΅G]d>[Bs[Ȕ"\3"iYlWNƋ]{z}eͣph]:t-歇 x~O{M'"/{u9zګZ( c|9ٳ KD^!l ߛ\XیOe9)נqh߈o<;%N׳ib@28X`ta 2Ƭysbmg}(ǯVs&Nx x9mޱ!Rq= {e QXX+ZP~|i8]佅0wV" pA sbbF^*Z"S,XkqDF (H͌QH9w͹ -Orn(GxފA՞QT̃ s +05@H(\3D{P fnTfD<Y;;_$HB@GwsQ(L0rO>\y_72i@3B)@X$]N|>iH\dÀc.]E01OQ̒h& @8ш_g҂赧6e=Yx!9\"#ror,NMDԝNkl|$yz$ FX-A/_1{EJ*FY l*e_i,ݢfFћOA ӗO?h Q{ U|䘝wQ=sUJ?v6mi)VF9L=\E؂,g6\ND/tŸضU&ˮEc+dRBKKM従ra)֍VF-G |sD.k}ȲN*)U$~脕Udj v>>G#+n@0kdb'&8(U/ROdw _- /daH pR3ktYCts[oy,=)5LEVmoŤr[/N vC~31ZED1&­#k=e}rz:GNŞd{m<>>KP6 eR>`" Uv.K/G!#+ !a -%})ET\tؒYe#IAްJ2򾩖$"JOk&(*|Rj;3` gD7ͬBd` TƔڒ:qsxPxZg}$Y[Qw%dKC1|~BSD߮`67w0]awuDiGfBoL)G)VȌ|*R^c" fHD䰩QHpFPR:AhVMKǷa} Ax`]?Bkhr--pWGR"d'yYOOݯϏw_=}\c*l&BMXEp՛'XV;5(׻X.]C,V`ȗ\ݴ6 x z,pث9{tE \>d/7a셒?i, &oV&.;`euUZ*I@JG^ oyu,u>6خs$"+ =ְM#3As - 6aQ!v"T{ks2SṬF_ ݳuG_Ka.j#11fa_6Bŧu1/Ȋ;GcnD ƣKٛx\sH[QKmB]Dָ_ x7b[Y1`mS56̖b~-[݉-9R+`yp|U񱀾S6(t ShPRbQfHW k@Rn0*(DB/gNdNnH60? mB|Ds|˨>(vu3)Μ\![w޻GIf߈ \\p^IFr8 ۠^_bs*\4HI`;91m]_S #bHYbFgPEN)2W 0īa:I{@5KB36{p^f]Nzu_XU̳qj0@h kiwni4b:^}5mYt?~ðR/%F(L†?n$NZ:Q D\}$67xpt-B߾xcL-^|2CD ;<4,4H oVFc4Ѧ:ĖaRɂB((&B@b  rc K s)`u"`cT,M>ƱSO&.5`*jYUe_g{b&g5E8gtV{=ШBgۘ.Z*kn ߲dږitLV@ߊ\lExUa]p;;>̆R!уj 6 9Sgۃkufl{%h~Q f,b[RpYJ CtID Q~`hǍ<mO2{f$MwA`l^rh6h;n!Ǻ%5jgG;ΒIR Ī0Yv<[Jb9J<#]ְ:|eFGWJŭE )LPKU|oW[.v|GGTE%yKF8tTY  QY$UΩi XX8Pɣ- []RFY闊񼹸9Y//3lidi xRa{6ס Tn|]p #n ɤޯN ˌkjwN烠.ϖfZ扡3 OvjfjNP%^t"LnvSߊ>4eT+1s{!M9$<nLp:/ mexÆ?ޘ/˟pII c:rS70m&,i) )tKx9!JǰIbICeojY5l E j5¬.ۖ};O\lHOw$Ecp9 &6Ȇc Bp*oZy[`uK@t5gF; 0 f d<7v dYxu5A}~ߖOdx S0Z^P&j-L9Uq`lL M!3! vNSI!L{ȲwI:hnv`d mt5VǮH:6}1 y&Μd>E&C/Lăsc1c VhKZǗSLCgLV -Rf!P}C;Ps?lPءJT(x:h]V"6j#jJɗP'Dy(}`X]-ހK+}b.A@pxQ=NZ3ޢdHFLh1Im6Zvq1}2x.+_xV"cN`PIӮu'm:t/w:עQywCZE0D)sVŬ\h[G"x-9b<8)vE/<ZGj8!DNMU5 Ni}9 oK*T mzh)@oDgq kͧ Q/H\4Of׆{񮆈7PDw5)]8uG5cM`ЄӛpU`gks?6 /+ˆ iQwb<; -8*{2,P==M|=_9I.w|]!ѦauzBƘ[h-[*8e $nBFY.|pH\O+ 9B%|Yx9H^^;Ґ=/d:>k#NnL|-{ܶd #Ѱ"iomVitR$'IVаqI0٥t{"b!> "PQJ [A"- t+'*쪯1)Ɔ=S{aVj9Yq'o.ݓaFܑef4\2>UC.}q-FS 'a}-ܸc.N;D-wOS֚sYndD~>Ž>N2i8;g8X0Դkj)u:|>;l .JZS=OmW[WSuy( R"o=/6Ez;rLqk Wo9KSO6+`#rs7X#lq{Yx/=&yWX!vG.Va zeQpM[s#4 0tpqd]|m R$XH17~" g}Kد!\q3"8KӖT}co !elYA]mdzIܗǝp&rw_K* U8H\xt%qc" !v>(t1ߘ.pC&"ז&@ T|dv!q ;S=|}(WC/IvZC;~ Kqoc yJ?1FHa(A9^ӻe%$5 S=^[k5m`2$_4ON:LJX8?؍IdBhNuCXJE_FRݗ |j7'"TX&mɄݧܹ`M8 QE`,v`xM&M~<@>jtDvvIW*8vv4B:%ˬ& 8RWδm ib]Yklr[)S-?" <.t˲C0*Gio&=ڻ_MVjS4 x~YMho)d0"s Vd#`N#EQrD-.~$҄V`!TNJwc.nu@3lӄ玓=!IZ9lWGMwE{^Sn>W,}@woK<L zi 5' ։TOӑ, +arb||)uJ\|7s K eV 7XaÎ'qng;-sZv`i4 [/oDq \.8Zxs˕,HȱMb#<@]rk,Uh1 E݉ 3I@,>hH~It o0Pvݕ]cX| uN Rqp\Q;NjB5 =B *8N[ ((;~VMH7:'4fuj"p=G]kqmuvܷtI Zuml6?(HlaA1"[{W!_ uL_$>Ƣwcr5q;x՗n6I<6 n!s!|NsDmIN[; `{Fje%۶m˚K+ X)z Ԗp[W]W``Ӫv^+iyʷѾN=s`Zm(.whU.GfVI]'g٪8^=vBh1RŒtQC? }w)%K_mmi(O[>'i?[˔=aa -Kr3=[mTzv 42jp9\VExR,ϓJiȐx;OA(c~8ڊd 9Nznd@%$Re UK3d}zec?C;N(:-2SiK7M#wL%\u7fS[_XV<%Ğ;J_qV{D&4q)<{ 'ȂkaM9wbx 0+{.w+y}?kdYPM<(Bվwpﷱ{ܚ]BA`R'"NYHުj${*.o]GVRr;$j블/SP_|X6(Ҳ;< n|a"C LΈFG<@WϐQ45ٜA5,ϲ4z.,R#ZaA!ee :M[a2΃uU"x8j]9:n" r4@DApP䵝jd* &,[P!Zsn Cנ-p;dhPR%v@/Yח MdP;+l`7 lm/g^ZP_osƱDPC) jêIs$4o|nLk>m]*:f"&Lot@!Ͼ4v 3vEwK[bbk 721#I]SaC=:o5y @;:ju@3Ay/Cy2p0r@WR}sZSQrop;l&&&'od4z#,!9U4IOK: ϫre}PK'Zik:z+fveVd#ޏT֤O~'kmM2(hCN[ )j\2@™3=0K41n [\D:%Sdk/>|kqyLF+=H"(DžLھD,Bnm 5:dT,T8-HKdrիD2^k6psc:~]y6e-p^:W:V[J{y:R-1;]"RQH"f."ی4Atm  Bp쥼cRi }ɽ]Ƿt n'=񚎿,Й L)m:p0Q@s_φdةG@mٛpb0"U.@q aG#f'C( -3]"0`N*pZ!p.?~ux̀ я:GO; +ɝ%W\myГ.!u*Bp>r/R#<`WlBS]m=1CmDpIGK&@Wj$Wq$%3):X[`shP*0GR/]$=+<o\g \H,n ԇAǜ\:%S33\7`E|CxOÁ;V!fgdzgR&&  $hN=1ǔlIA@2C¥,.>{ !ZL^>ل:_nw>Y}G{@)zg`rzR}hā_='D7.'sX#[~_52'Mfpo&CtUi*]WjmzH !yъ2nPeAO$P -xխ>M-U7?VDE?3ľ$*"IX'84eTW?a|0!C(V;^HfW#!H[οv6VvXp ,l| Yn=f}=`ߓw<27BH|) -Kz{^+I/^+fvc$^ cX'̧א*W^O^<̮w"p/ULZfV!9S3Ÿ*d^$\9X{|X p|A'lꑆ`uv87՛ 6Q \OY@L&(u~sZkKCCFDtijMF Z㼎жaP7l 7v>Db^̓ 5di( ӲhdėFf6``ݯ {e.~ }d9Ru)<debsecan-0.4.18/.git/objects/53/0000755000000000000000000000000011710056654012764 5ustar debsecan-0.4.18/.git/objects/53/b54ef6187857ef7ecdb2053b50596f768f94fc0000644000000000000000000000041311710056654020160 0ustar x+)JMU027b040031QK,L/Je8lj~sbkt]Mm0,rsgؾGGݏ%,-|n-*MNMIeX9sT_Þ1Yz/TM+CݜK<^P˙RR2d`9ZDzP Oz#7麙UD(Aյf-[VIl`-I-.).,Iep]_)C5ajdebsecan-0.4.18/.git/objects/65/0000755000000000000000000000000012311572651012765 5ustar debsecan-0.4.18/.git/objects/65/599ea78f32438c539806c8a22dd3f7757c80500000644000000000000000000000041411571676721017663 0ustar x+)JMU027b040031QK,L/Je8lj~sbkt]Mm0,rsgؾGGݏ%,-|n-*MNMIeX9sT_Þ1Yz/TM+CݜK<^P˙RR2*"_N 5音mOW[U*ͯ?r9[~@d X!S"AJnX@dKRKK3KRdp߶W'%g okn]debsecan-0.4.18/.git/objects/65/c0629d47385235cb427148710127a1cd471c340000644000000000000000000000065112311572651017446 0ustar x+)JMU050f040031QK,L/Jeha;Ux (.ļԜt{쟠ʨR5 (? {g*TOFV&\E^IQ~WM]~|}dg?D^+),L(a8ч_$ߪUT40-3EӢ^+A>t)E 7M(=;τ/(?o#Zd0oP֧t[f\'~OT-?sEJR*٦i/S`"S=ʒ܂ĒbS+?3sXd̺Éo-31|~Y!%}ܝ275U(*>i5]'3|Vye667Gժdebsecan-0.4.18/.git/objects/6e/0000755000000000000000000000000012315633604013045 5ustar debsecan-0.4.18/.git/objects/6e/07c04a46590ed195c824fbe797f02ca168ef620000644000000000000000000000025511710056661020133 0ustar xKJ1Eg KRЈq8y.JwoKpz9s6b6{L!%/ɯruuU= Cŕm$vl "5ث5}[[jێ!~E_Y~&C<^҄~C~d~Qc"Kxdebsecan-0.4.18/.git/objects/6e/b7f4c7b184fb1402284c86dd033e90990d79420000644000000000000000000000073412315633604017775 0ustar xŖMo@{c6&zˡ4hmcCYڐ"լ*|G zhOPLEn*SL d^g-3)7~> QSYZKbTk""S؅ ٔVKhmX $ xAhDU ]PD'+ZI&l `ޖeZD.HȎgUCbjp3@!IY~ LNCej\Ŀܥ0O([$.PC C$WɚEJe fu%Ǖ  ߦĸf^%5|jaϓjML9nn[ڬgxat#ycj æp Fdebsecan-0.4.18/.git/objects/6f/0000755000000000000000000000000012315633604013046 5ustar debsecan-0.4.18/.git/objects/6f/3af03b2c7acb08498ba88e7d3abc930c8af8d60000644000000000000000000000100311571677210020500 0ustar xT_o0k),ud])jmRҩ}1+ OZgc;@DnyH;eE.\ngz]o>'g5]W? 6E%: 79?ㆥ@rTpc:Ɋ)V@9$D/v$9+}"ƅN>k/̃I71'cFJmCBo"1C9X2N =a\ķ򙊼gxm<~NQ!i_uK[ݵOk{L2epaa3Z &nY5/b$_j6(R"Sq$GFjG};eVC#t}Q3}y&Qy6c9F?wdebsecan-0.4.18/.git/objects/6f/f1e360838c6a66ad70bf902ff07a32792555460000644000000000000000000000704512311572651017777 0ustar xڭZɒFs$AZݡn'G(%U%s?qe 6lutג̗Y$z{I."C,'xJ|Ẍ́O.4YќM3dׅHB(ؓ|DɕSVhi}y.s{\c}*6_\=pKbKz %Ϙk;s!vlm߫eU'K.Upk&ǖ+BRX؊3+^&{Ws!ɛyc$F{0D%O e#M&" 9ӂ݊,'?JsV̹Z䤀1HK^d"cw{ub.{WZ1@yG(V:[>E8Sx9SLih5xD2m? ꫖V0=u" aYx?E:fç4XȖ,ǥSD(K LT/e^By)?^}!7n5ho^j?߽~37svmWow\{44w0UJx" rIIRhs^#_c-,?)*m4 4I m 9,ְҭHF.q6sFcCop\F~Yf-DfIE 8NZsfwзCR} }{Q%(I@c:o;#7˴MB,S$q${*&{U~ ;vcgtΉPzx&O ^hNH*;ʘ`*= ܰZRqB1 J^L֊/z.#⳥TT6o8C)ؾm{#{++L%G&SL|E?VvĴ`mzSD.'UŕNz#cW G8~ƶww6q!&)Lj<` (pcot%Uir6a{5;PZJ$IǨ(^p.@y(~GgcI]eF<爯:S-[W ߷Ck5m IbV[F_DVbF7>׋%O55 ;"N缜u"ՑV}FgO =ٶu6YY@ǻK>q"'"&Dr[<KRѝPx(` {t&d-PAUGP>Jo68J 4=z㞡ZI+ǿhѦXf7}6/%jko{ѝ |l U47;p]ͮ]6rHO4JRRmK^dDnL̞=GSZXʈxQ #{Ek[j(|^?!zG!g㛏%Y_+h{%vW:ol^l6@ >S{$5dwPop;~ {k.{Gu$CoXSԼz=$Ұ5 SvjPF3L} !͠,6Ilp&xN J2yN#hjy;Q7}wH ) o,LtNJY ET2Pz#w9Fs}ZK9UWԑ]#t)z#n+]{cop@S `y Oٴ N*h$5EDDv3P]cUS6s|XQPx,% Er*UȖ/O06*P  Čt?ס]~8~yQP݂)fбW0 䏘i}Y,YRCoI5T'ViC!`{cMNܹ-T=Kd)=_(Qt/{.g>uG7"\ DM@D3dݑwCz_Q.9/fK)) iVHK\O:v/ݭ\QY;K1jƸL@MXeYf<_Jb{RoPϢW9}FZ5ϗ`wԻe4qY%akQV0~f%=8m3Ee1쪆J9ͺZ3Yt&#l5pLj"F#<в;`2,<jӆw~Ӛ []G0D2BWhNZ4gou2^*p] lGMLm\'yٵTQRD;W%Ĝ-U>qi^\lEDe=?<'UípL])[;RPћ 777WMCyjj&յ;# `ڮPy"]qOj9v5ۣUmTˣL;@x.*P=?Y:`W*c,(]C˜l6jxO~{~PCPim_Bi>[4G > H<dK}Rɬ}(\sO?7L.@7Pѵk֯7ܐəcV@[λRjg2lϝ-oQdh ;csn 똱ޏ%;E6x'm5WSD*zTzL'qs K'}C))[&C6P&8XxE<2D'}Ee]64,P] ryIrFH{cnEo;in:pdebsecan-0.4.18/.git/objects/6f/f5dade7f39a424dcc2b8be478067711b63fc370000644000000000000000000000013012312007435020335 0ustar x+)JMU0a040031QHIM*NMNc1R{mӢ2y. ,F7(5$H1|^s4 MKj#debsecan-0.4.18/.git/objects/6f/df1670488fb912bdc9ac5f382168d8bc4fb72d0000644000000000000000000000040612315633604020357 0ustar x+)JMU04d040031QH(K*M/f2/^zH✄#Z p#II-IaXݼʬVjD($Uى  ~?0mܿm%0tlܣЩg廈iHKss*/͠EtgOܮ>UY\TrnHP[߇];83!Ӌ2Y-cIn4%&]XRZ [YI']_xP udebsecan-0.4.18/.git/objects/7b/0000755000000000000000000000000011643323400013034 5ustar debsecan-0.4.18/.git/objects/7b/5293607548b929a0a87ad68f28dd7ddcebffa60000644000000000000000000000125211643323400020355 0ustar xuOo@9SzJrTpʁ*̧4mU(Q6㙷o~/ӆ>^_z 8ɖZiR08mTvqviK)d~$`doi4i؅RRM􌟫KF(ZM)Gn>5QM51zM汨d?Dj&37u5WgE:GSn):Y's!9{!gcQh8ؔV(aSU\Dn9`rPM/\-mޚ{ͮ-r`~ھ:8fbO81+~340 "fʨ>.mkh4_Cgm"򙐎˸ [o\nQ@3:3i|_K*ʫg& NVhWY`mz@v8<~͋ׯ30H娿g*,dzy} Y4_`$]q68F8 <fgYQ.wkH%0, 7Q;s'{^L;oD?BgEvozY;YG>GٛOzg/z[[ rY-'[gUyM Wrkb\A+|T9`e~ ݯ|̗_c -s7ܿXUs'~֖Ίrnoe&%{Wf+q/iUm@ުr=Q[[>ɇ'C``Fj!25a[U2rQֳeY@_0R?CUr\9K ~by#!7*gmW/|L0(,7lZ֓jD}/:@fED!Z^|\יHP{Tx@3zE M.VeJ 99V<6-geXy11*ȗ\> Щ(?buy +hT.s)e^\Y1ϲш8 |~wtQdc9tb?P,}>/x!(0ADH[Kvb8c2#̪| BlQB/bz'?v/ >$=qcnHUϪm xl\Z-_?8אBK9T(2: ĺzAwP !R:I: 6S3=^QLJ5jk#s>>ŧ-P5KRIx4E~'KEA C {'`?~[]{}UWh8kyrѭ26vZyV >Đ& oJ:dM m7F088j=2z< y }( 3BU=5``kj糘 WExhF*r8J0Tu{~~~0~ezX E_E*bROq4Oh)ù//(hPKBh[PC~Ͱ(2>l`)AXTG! YM!nDOW@L Wv-\IY\^ N9T: Jm2u"\fAhPXŲcyUu$ ,튡 b*!ժ!!|IID0<|O[dc[Gdl7(K>zq[\~{}޸* {{ eYϡV+;T&y}V3AS`P RJM.ιԛÍ 6bwxwDh]k:/<2{ dRNsO5DK.䦙DLHt(~@hWlmr V+1;Y$b]ctL#u<$AJG2!?"9 o:_/dbS7X5e³ G]<.P_q\dL r-ǕtTA`| Kh聥krI&DKKK~R囶ƂpHZ2)~%>[Bg^@´e "HK[DYɊsKsů&M~/Uj5>0 @5Ҷ6uz# RՐJsX+O-C$z#6k7: 5zUqMhM_#-gW} `l:xwvVf Rq% m#ËqM>$?IYe,]2H(kqF:5Nv77sF qvܛ&*)]i>o6 =Hփ *# wp)/1aL;<<~*.! %&,Hȡ#,i 8*RGL{/jg=Axwƈ҈K1'W_bUIޣh2 -EUdJC.l4,B'.\^>Ʋp8kx:E{U Wj^s:_jN[UHdb-^_%u[Z\M.JmF_'벜k84|oD }U$Tjl' m!+L61I1Xm߰E3 :G՜)93>fw(ll}9^uzkwAh7Ea@YCTE:'ʴ&?_.NW5^Ay+ Mz pZ1E#_/:Z2*A&*Zk M(| b?b<-){,'Bʵ8M#Kf?Ȉt\ۄ\Qu9E7`WPp zR|pҠʺOx*fD Ms9ބO$ QI=_Zo=7FC3ʼns"̝͂s\d=9Zqˋ񹳠hjAX{RZCGvI`knzBwJSs=5Y-,F*hDj| /gI0+5_ c+F|eot1VHiRwN8"S~ĺf,zY(wSuDۭ`՝nD6b5ʷxqחyRGVꕙ(!HU܁;}M[^ Ov Zc+3T-"9r1xd-N5֮c%NˢTSg#_#>tHB @GwsQ(L!0rO>zd_72}@sC3@Xt]N}Ȁ%4我\713r%寣*8]k,y8`c)%qM4|pZK%[qlOm6z8C%=D*kG5ְgX&sQBGj>cqKg4bl4”^&\gtEtjH2)Wݫ 8,p@(.܅% ebBQQ,yyȀO3{s*H$:lZ0 <$:(TԆxadSrҝbKf$ٗ& {* Z(?1Ưuw($^LIcwπ&M> .oK7 U RS^kK[vO[3_ϵAE$mLjTdmUNVDW-K6 %; M5}.!ht}V% 1h?[!G2Kzl$!æF#AIyY5-Ŗ:[@֥@MwBH b`8ضQ4g\qsMӋ4#:4dh>xof_e/z ƺi#/$V 3ѫ7OwdkPw\.qXa/ҏi=l:Y9Ws\}^y>  %}XL )MH_`-Thq䎼`FĐtŌϚ['ReaWtLkх&fmrႽͺp?*+D!g8+&`!85Ҝ4K=i}t lk߲Z MðR/%F(L†?n$NZ:Q D\y|o:8~{!o^< c1&cmW>V_}RCTg~@KN+#h HbK jX)dgG_H! l1CyfR^Jy9u0ހm:itDU1 &*y#t|CGtz0_k,N窲=1f3tIZd:a+fh]{ Fl3{umvQbro5soYZm4:My{+oE^.l "*d0wP.Us{tfC)Ej yǐAdCEtr`sӜIA5i|:B64?_Omjp -)NzQG[UBb,!$"(ڇ Fc'=3Kzئ 0ăs6D9юU4ZechcBPFLX $I bK ,p-%1Vph %V ~ty DUUAkX2G+@%֝o&(إ*DI>7֫ K .Hs{##"݋A\jGѥ@̐ЈStMcXW$⤡2ǻ75,ךFq[ ^5['a wm˾H.6 Qo@U[v1}N_{~ C i(gioQ2nny\jvT4Cw6gnA`r<}T/m.{FhӎS:=ߍKlc--AWtOBp7Q~!x‚r>J`YW' h,<_$/|iȞU2m'J7&=Dn[2ŅhX7R6ey+4Hm:V`"V8y r&PlІ֯n[vM0DDVXߕAHԜfð. Pq*\d#`IHV쥲H 5ʙ?kM%5RJdk\9mU `#(Mr]{ XyuRKZ%m(노YVp)YړӂAƤWi+hظ$R=tFbcDE(%\n-߃p KYz_cpBvWؘԔrcÞsf0Amg70C23F.{!f8˓ƾnͱO"w_^;f)xk͹,Ji72k"?\RseU[4N3,DaH]njv:v>6o%p)σh6)ht޺B`֊ X)r=c층SlGë)`'nMƌE,ZOЁ,!^NĞr]G`+|x ;#uq[ 0Kxp (8&߭`*ujX q:Gx.>&k=EGF] ~zfQqY"-rԨ-*nw1T QS۴*@g"Dǫ0\<L@MeR Uքrx,Vmf>uk%iK>pܱA26@,|k62vE$jN8 X|Ïx%ת[LYq$.x;㐸{Cm{_é\>>oءoPv2$>; ~bpt/Q ]!s+:wJ+#HXk82&L{m>a;0Z+aA`73N'& ; a) }IAdv_2ݜ֊Pa޶%vBSp5 7GcoF8M]-m4dNRv4+KY)*%&Y^8 褗,,K]9&% 3quel]zm%cPL[ƷP4Chf,˾M¨?'qTV{h~}1[i B:!8SEԮrh2.J۶-ޓnF#HZPmNg;*ݍyV ca0BDM;Np$iTM^Q7qwCyZO^p[YTi,qP01QR>n(X'2R?MG0ɉ5Nd+q),1YT6`ӇVo;ޞ̕kӃmѸnnp-p9LKLk}u~I,WJ("!V7 aRIw鿮E~_CNHWe28v'Z4$mףe#'сqMCپvWva})5:CHJIq Fa@D:j~ $d7ȫ;KnY[5M 蜘VoڻWuŵOԵڕr[$F*^kU׵R Z C#Vƈ@na& ^6wC|2_~vT4L jߍ)Fu#U_وVg0&l0vX6j-g o̥*@i4:u'9mp0l#Dnۢ_79,k.0 3c ^$ZW8ԮMc (]阱=I=<)m}7༦k mj]#1b19A%$'o^/꧁D+v_ƹ"i]ޖe!PP:⡴߲\mIHC!9G]ӕSw-"ζ[Ijentǵk$dMk ! >LǑ9kr\-AMxJmuqRӁyZ -CPdf,3_"V.Mf0B$h6"800: T|- é,O=;c´k#GLxGF`eȃwV0DHH:oa_M~?A: W=w"ň2`N)N]tr]Gύyz\kDz-HR({tD\ї鱡n {Yi[\/݀FȮqFJZK2:l`rH۝+3ʆ΂m3NR[n_w^MjڹzGdBp( vЧ=+DK;o4́ivlsCL͢鶆VIX% Z%u}jdⰾ{A F!<İokK 3Ei &ݥTX0/~ߦEZO>I '٢\ x+dȜ$ooY*6Aނmгq!T+jx*Ǔf|$~PHC|7Nv~@Fa+}Vt& vs#*90&*$nZ8!+|x! v2E1GֱlywJ[ҽmz`*ҭ[-1{? ԝ ')!ADWg%jF87Q$.&OyeE9^ 8A^kʹ#c0wǬOІU]s3^1Č\#˂jAQ*NUd?'~8`rkt )">K|8f!z{ګ쉫@qw[Iu픒TR8NA}}cI@hJF0 #a%H2w;# ]=CZGY ~WF4[gsUװ<˶l蹬HkKhc ͣ. @4m8^"w( #VDప w{ 踉J/g +D2VmdAAtvJ)2.F. VoAh̹55_>v8?BIQ$ pg]_.P4BAKT`в_?~W?x7;zn{N{i N'C}A $ :$̑HCӼ1aƶvUWp;x$VT0y"v#Vp,><>#%poL-!?lQ%8P$Ut OUF!l55HI$ Fʑ]J͕j;8OF)GƲX``;P=U@.凎HӆT!T'q<-Y0<A!//Djn@ԢY'{v&y&D4xǼ.oS9!]l РׄcgY 6 jҮwN|:ٚ*|,HE(,0C!D)+:cE{DxU!RNa'y.:V{+N[i` $jB5ע> Aƴ-n m$DQ)0>oѝcŎdHޠGKJ7JO$րb&#ח]de|tD~uxiQ^%?eY|_[]C@bjL% lznJh̼F;eu5( Z\.fi24]T: H)灓igȪhu 8pfl0 Pdebsecan-0.4.18/.git/objects/8a/0000755000000000000000000000000011710056654013045 5ustar debsecan-0.4.18/.git/objects/8a/1dfe87e97804cd0083fd003b1c3cc41008a6c00000644000000000000000000000065211710056654020157 0ustar x+)JMU050f040031QK,L/Jeha;Ux (.ļԜt$*Կۭ7J頜LQ~nAb CݵMhU؟jA[~-0UM>^#D {t%9% AJ=vj.XQu_nBA>Cyu'׿_ Q榦 E9@݇W7~dO>̆f\debsecan-0.4.18/.git/objects/91/0000755000000000000000000000000011643323400012755 5ustar debsecan-0.4.18/.git/objects/91/45afa4889001eb337c45ce9da8d37f13577d400000644000000000000000000000110411643323400020033 0ustar xSMo@+j9R* ^*Kv%!wן>k潝yo&HDo_߽oyO@˔T$yHמmE%Q .`2#thk%,p(Eڏ(BnYRׄ.>+d.K<G19$>&OG踏| |(s֟O'ufb!Hbъ<ݬl|IHr5)4EU-q:&S[ZfYwT4- d͗ -k$M28k4?ӛm-(PLuVݒ8m-$a؀'i? cEY5pw2?_DJզmزV мQP(rPZMgbS:%b߀J/PkuBZ{A?HNdHusf/:(*Tw;7Ï8vb\:n\ˇ *K=rݺg\_[Yydebsecan-0.4.18/.git/objects/a3/0000755000000000000000000000000011571677053013047 5ustar debsecan-0.4.18/.git/objects/a3/2f4a84af7c63aaf08faa57f705590c8d1fe4000000644000000000000000000000727511571677053020352 0ustar xZrFgEWMDWde;Uʒ7c~> @ISr䲀ӧOwc H䤔nOTDu1Y9G~E\2YE'dQ*gT՜nK4]x.du^t"O"ե,>]P8R-dAOg/'y}FGoU$SQ~6R%eRp) *Щbڶ!˯P @J#PQ#{!-!䩜Nugg3lhg:/>6ߥQX܃}j%G2/D }1W9؈7¨FRV%-en99,k ഑1!z{mxD/kg0bU ]d2Uti7kHZ+=F]Gt3v! :9K7կ] L uKX%\oH,N]Rd50Q^e)7v8 yR!AlPviP{s= ]Jځ|{.뉦'G l^F7.ExSUF ;夐K{NvFk[ױ 0|(b!t]*=|Ƣ?P;5w Ly[]/eP6DTc+؃ԹR 7@Vzp R{[#۹v[(0 >mjg!4h7 @SrjJE ?",WrrHV#%IQ5+K+ Tp@SH@NsrPŕ& PGzC=Ѽ"i C:򑛐[À6nn_5+΍,O3>NmAj2!Fto8iQ!zBF`FK,=8@6/&]# m/"S`eݵp1 =ޝ|5zͻ嚘 9]ܒ&p1 GU_鲖s4sz:Wi7mFsOIPZ%ڇ[hny2S7Vـp[x n@QqǴ0ZxDeqZ'<@)cs9 :p /:- ڍinE5Uŷn3wč7oB77W-! d b%: N&2[8=!c%~mI~5ڰq8@\˯0߄ ]d*3nevK gSβՍ!A7r] 4f* @#54 mL. ^{=I1RD /NmN<9tLDXI<7bls0嘽k sE>vԂu d"XFڡ춏s\q xe Akk[n"pmf<&RZ4i8C>i>Me2>f&wa7` 40U:0d1L녬1AucH TMQ/.$})\{l_"s6$5˸hx1RƠ*YkN<8Lƣ`Q qΰoL&6k:N;&m;`lCodebsecan-0.4.18/.git/objects/a6/0000755000000000000000000000000012311570220013027 5ustar debsecan-0.4.18/.git/objects/a6/146271c0d958a21a6ed57a5eab03c273e383e80000644000000000000000000000025211571677053020115 0ustar xK 0@]$4D\7דd6oo㽐uИnW`Gش=5cÖѝu}P.*Dv01nLɻ,^NuewW)p^(IA;#^7Z[nU" Q<Kdebsecan-0.4.18/.git/objects/a6/42b44cc291a61da9d9130f03bb557d4b909fd20000644000000000000000000000021212311570220020143 0ustar x- 0]+^75\qR*,fZIi{Ȁmb=#+'a-ܥC1h=׿$V@o5ԤjA[~-0UM>^#D {t%9% AJ=vj.XQu_nBA>Cyu'׿_ Q榦 E9@݇W7~dO>̆fa?debsecan-0.4.18/.git/objects/c2/0000755000000000000000000000000011571676721013051 5ustar debsecan-0.4.18/.git/objects/c2/13d8acf052f266b3f7140708522246e00594840000644000000000000000000000013011571676721017530 0ustar x+)JMU0a040031QHIM*NMNc |cb_-F7(5$H1|^s4 MK#debsecan-0.4.18/.git/objects/e7/0000755000000000000000000000000011643323427013050 5ustar debsecan-0.4.18/.git/objects/e7/46a1bd3327020deaa329fd775e2956d5c7dcba0000644000000000000000000000041411571677217020343 0ustar x+)JMU027b040031QK,L/Je8lj~sbkt]Mm0,rsgؾGGݏ%,-|n-*MNMIeX9sT_Þ1Yz/TM+CݜK<^P˙RR2^26r TA~2CS4Mn欧n-.JfZQėΖʿ/L/BdKRKK3KRdp߶W'%g oodebsecan-0.4.18/.git/objects/e7/57cad2ee29d75bdfde7a4ab1d7b9efa7803ed00000644000000000000000000000041311643323427020725 0ustar x+)JMU027b040031QK,L/Je8lj~sbkt]Mm0,rsgؾGGݏ%,-|n-*MNMIeX9sT_Þ1Yz/TM+CݜK<^P˙RR2W'X8 * =׿$V@o5Ԥ.EJvYAbxV4gY/v4\ȵl"2L]1K9]s*A!n_JD4c1}tAnYDsI0Z;=wWXy]`ajK6ց;JB(8G- (N*lkV$BEtqA77:HNGӫǗEp*Hכ$ |! 8N_ /П..GtJNG݌]1G]Hta(cGSA$U\[MJ\\&YKfyd w. yХK>`.T]z{Jt|08 ~8z>脼j-d0Mk3n:<k%ϯ8w޲jB&I<{ _Zy*E>8v{gR(8zLiM8BA H| |--KwS'#󺚆/jy"EV[to4 EjĂ8W"Yt}S6Ku %c<3)T<4\~Q apFO#-]Z$Y"0pp_U>=!PH^^tJ*Xi- fFc-ݕ1XLAU:M253 yg.yIZnNNq%ۆPs # w+nMieְHP8k0fo?7ވI&ν0Q⫽yEynQ~e?.PةBG>3/N|%7k$Brh+ڈyx_{U˳˺;et :P+AԈ%<`j^ :Sй~0hfѓ8%HX6^O)hb*!rkH&07 vYr5+f3%"wer?ç r$qȔJ>N_ZŌ$=56TL,d/2INg(޹Mos8?K.1kE,˫%M56Gu/ O'4A~@=*tB0Ƅ;hlU`: >cdS15қd?5(-:\{K o#Íou@MAjqY_|Xa :En!%<+@sLw}{syu>2|\(b A`)r=:!еWy91\RМwaĤ":A]/Ymܾ̐1SR$"T?u@uzO?S߮6|¿9ҞaTK>ˆgpkFnIaMW"D{7J):}WZdÕK3R=1e0\bnЌ񀗹l0N֘s𿄄T3!MP`TR0SVǷaAQG} t7ɻsK{F|~YIEhbNы*":Gv*P9<'=mm1=b=Q&YV:~>mS9IѕQ*Q7ftmMӎY{9_ 8 =W] l1ag@gqu?| 9{2=}޻a^2Lą!##RFƒpQEx_nϛToltm=/5SEwl|넵 :y]Be:p-ze<޴HS;oTY]z5BC{bXˬ| PR:eiCuwe5x*Gtv,-Ѝμ)x^TfEh^,uoU򿵒{[(2 =qnkם3}[rJSǞθ0:ml'j= +#mjcvr_>|G>O2:LZ{mq1uqZ,AցqيYݱSmDnwZLdebsecan-0.4.18/.git/objects/info/0000755000000000000000000000000011345002266013462 5ustar debsecan-0.4.18/.git/objects/info/packs0000644000000000000000000000006611345002266014510 0ustar P pack-0c94e785ba4434e80bfe218c693f51d7926ec4db.pack debsecan-0.4.18/.git/objects/pack/0000755000000000000000000000000011345002266013445 5ustar debsecan-0.4.18/.git/objects/pack/pack-0c94e785ba4434e80bfe218c693f51d7926ec4db.idx0000644000000000000000000011024011345002266022543 0ustar tOc #&.38=CIOSZaint~  $)05;BMPT\ejos{  %',06?BHLOWZaem{  $*2:AFJPTWY^bejlpsz !'+.17:?BJNV]dhjmw}~翨;bF O2> <)ӺJ '[f 7?wE$!KT[/ I oeCxxɫj}DY[.9&M<6XRZϓaPӠM  [[\YԓPg_bP̢{$tk4}ht`$oKw|V"l \j7M{Yz  j=_&p"#A[Igy2*" >+e )ăf1ΑkހhL;pQXDt^=j d K69x`d a|YqB`"pf#J ;|6Oښ }o(@t cQr+ ("p|zS@|xQ+$R/V j*0X[6{$M|@޻;=KI~:"\+t_}Hc4*C?}R:Qߛ-T3ahOifbG!RE>6`6{^Ȧ=?KCSOwdfQG֮#5ãbM=a֐CސUKt[ |z.&"f_ lʵq+;rx7[,/vdz_wJ) ?d2z4Bu?}5sҾ~;!||F9da,bvB%][ ㌲& 2kd"F{ ecf ñUC'w{ 04!zl"2M i?c3}GXV Dg|y/? P620F54 S[YLrJ0 oKϳi^ 0 QFIA#6;Oӿ j py݅[}f Hndu >_^BL Rpl?Gwޒ]2 Rތ#X=]X"Fq iՐEi50 \g֡% bt,2IPNNpֺmaYՏÇTcebc6Nj3ޭsʶ=[Kl餭YU:s !Y:)4gK(@T,xT6mTaצ,]_,SJ"!3* \$z VrGAT2|X4IչiJ?TȅW^D G{A0jT0gM<`L,99"O,}$h<ݩ.cK镠aƏ`XP{ f'|%7TA'Wnֻ\Ϟр6~g<ϔg\Ԟ*Oi5 M0UeW8Fj;P'DhbTY-Q$qb{Wۙ-aLHP+8#=M <,Mp봡"7U1%;bwk.NOz^>,P>gDYDxl: I H# `tLؼ!!|r "z,I Eo VA} ϺnؑLm~zԇH qKSvӽ!~\ՇXVF+k M Z- ^&T@4.Afɑ:W[9Bfv|FnxhS&PY?LҼ3z yu]?!@6eSS2 =m1hW!i+V>se)k t!$mh |6hR_!KE 5XsT@"N __hyzf os"6fՇ~;g"3}|y^PW $ Iy# )ZH78l4Bd7#tiG~LD>~# Vt9^|қ#JG<?z( I#a97SlJج $m-oP]. t𢗥$ $]W^$?䍑yLh!u1$= =Ɇu<2Fٰ$Jᯘ0yaP%lE.w%`%ndѳdi~lp%{%xmt">Eip#%ָ# &厘ebWe3&"UEk :<k YM"&;^l\UWJ<'(^BWI'44+(Bb,{Y7@S(E*(f =J^D pޮ:(j3irQ2t(v3bۿ^a(^cl x`2N)q6j…( ]lN)fE Kׅ, )s6 ʅIHI()On[sjro#[<)İOvmi5pV* =cB,Ybն*,+#.}3f*- OzL#y]Wt*HՄl[.T8_V*e8*D퐱 BP*jr] , *Ncq*}lH1,WN;xLU* j>r1i$U+"\n􊟟XOw+h[bDoQC,^W._+m12+>O +Jj@ٲ/tw|+ BK[&6 4z{C+&GsU4,Sb)m=}`Ǐ,kќ~#)tL,-F&MpV\e1u8,Gs@-1Ax߹@?=md-:h5K[Q.e@E6=-TU[\ڢZ@D--$kr #J!C-c+B+e kY-Wϰ"j%6/ FP 9d?}L50#4;GkT'O!L4NI;yX4 ւFeKf~44/Jhhhu5*?dO*Ft7SWi5TS&`59W85e{B8W˘׌K5 9Y!"|lOv(Q5V( j35 )@8 ÚӐ6 HR q-e_4%6y>Z)Ht(O:6_v%֌y}aiH$63h_u&p햨Tp{7q/Kʲ=?l8f玕7 R $8'+6ss`&)!8pzXyQX:38dύб3 PgӰj9#$[=Wi~u8=,9=8u[tƏ~5Y9B[ ̫c{m+2>W>KGڙ=@ ̔5>feb(5@cDœ>LlZƪN}?^ͻ`N @+)~?K?΍ΒTe}%ߪ?`'pS:*4[(? { rpRו29Z?6NzEc,h*GogŽRrZckUG.Oԟsxx_NSGw>Jo! q@λH`6G[OɿT9Ȳ+%HmLɉN+ IbхHxTWYBu@a(BHņ9 )}QI0ň.aD+ kjI4ޙF.g2|II2j'FrDQ~IWԲz>m&=riImriuLO{o5IX ?~U)I͠y <.t-(IW}UX]P7M J GU,t5\p JjJ`v9$zJgR㡚#|m #JW" Gg$J L^s_ZJSJ~4cHkB92K,U\sg@ӽf9'KS4?F庙&NAmE?KwuLP {@7KvO=K~K_"OEgɽeL=f; 8} )LL7QdG]%LFo+}+?vx:6^L0Pg;'ۂ յL˯&Kw_*jLۇ7I[MGU5F=^L]B 2Oi6~-nyoBVP˶C1?=Q yc1uPhC|Q3O^jC eE9 Q:]߰Q <3ܓ𥼖"Qa^;C ;IQxQ+ " {^-T6RO{$!uIjbl?##{Blpόc:E\DSLDnIc_K_Wⵣ;zcvcվdz٨v{cBCe0]#1%j VcԐZcr|}Iب(sMcP _Y{pk[c)/ד; de[p3#5)P.kdl#A pP- gfe(5qv' %1گe ry1Fp@eUlX# HfQ HG\/f '%zhYӺٳ",lbQ_$.9O lCŅ,cxz l3lNJ $ܻ i&xuOl}ϳ=5˜VE z1|lg5s)#Q`]m '6)I2womGOV#AeܧU}mo#kVͤ*b>mjfƞl7 ne7b_P{ o]nq̔v%ŸD?wv"an*J* _%]-9#nOI$r.m8nVx_}wWn2':Zo  ͑U6 9N*oqf7:y+oo-&fD\ o>kفoG_ W[o@qoWu{M]Oko$$Q0oEhy Jo'f}Lu+o~v46vfU{pYJUho"spc)th+GV4/Pp{T@/c60CJyjqJ7p_Ѱ%_qO 5DXY`@hgђq^8_}}q8WoLP &'<qU0Kq?iͪkqGHZ$]ζ#o"jwr6HUE_yYsX(}/ri~MY@Ads"`FM˶(#L:/sYu.ӑzZm8s;*,]n_D.RtBRlI]׷UϪtA9w^s١tC(#I?7GE/ItX ;'%zXtBh Ro7 +*t# TO CާIt٧.Swy7nPotÅG:J 37$RuR*_5z;h?x'u" 6Zd§p^HBur{}jUFv/πY>StvVR860:Fv[-6{tk[kvw#%Y_'v-+EN3jAvK6tAr4Ü@RMv\GR,aw5 RjGGAϬ_wK,ΰ>.y)гwV3ϠH wKSܷwzibx/Db7r ĮxYe=ȿ!x_ўL foU RjxL W/=U(]x1Ls7hx yk-Rx,!<"D}T5x· aqXsЈnyN83a2G`k|yۅЏ8H#S3y#*Au bIHHOy,-X*4Ky;:Iı@ +'"La=yX<ޯ LyuG^6ŅCϟ|yz@ CYRÓ#yzBtlRQݙڞyyX,2,^&Ҷ>ey5++^*FT|@(PyxÆܔͼJyʽ͸E(ozܱ9myC}k,}dz1׫uf9Ā6 zG%<ݒLź=CGּzMuswzCR[z@56 !z7wEgぎzA5,.#K>,CpZ{Za3[,dp{%AxVt&!'{(xi~cCra ?7[i;~޺k<4b1[N$LSݼaRhg֟Y|^OUIL%bv Iy>q~5:Ζ{U&ӬN%@R(fqk?lմ !Zjob-R9Z:bWbGB<I:fNY-F7˿jnK狰=HUԁ$ ʸ ,抃Nx˱f&&.A5~>`mO&8~l#dbF %{97ȼvO;ʱ̂)@.}nؤdY[\"P4\/jRq/uv];9'ȃֆsTOvP1<U`&Ȥi6N. κ ?X86zs'ќ/auhNo`7,$S:D6FgG`'b+s>AQo1-~’_z6I RU_ #XܨхbCAfO΅-FnHFS߆=kQnW LIu :C;+DjNb0cJ*E{Yå !)f5dGgiSR99YWc|%bw|qK|ف sE0Jپ9S 3Xӡi0Y2|\pg䮈fH .(GfΈqVʆ»Kͯ'}6ሃ t{vwbPz& lCn֢avfY Ny;vOxqΔ[ύ/Jxía&; %' fh~M)7Ċ Tc&VƢg ׊Dm8 .ZË˽]045$*.MpwMZ([3)DG5H‹hGq B'A*Hj9ދ@Աu@ь_TǝɣС-G/ >\jy_;Dpz3D`P[L `PҢ+g!@Fs Tg 9ȍP0t4ګR]?5e)qMDŽ->vZ7#eHK;dkAJc=h~eG|dd]J1[k\kZIb,I[)P<#z{Y7@Eg^id~*ժ \C#ѥWţ3nd?aX$鶐qk,m5GaŸy쀽#uo$]@WqBA8SA~PᆂELbn[YՖfw*~8%./运GJ}>%2w׮& ,q)nwm욘㺠6Մy'exD**҃,UpFQ*ȯ.{LPV53ntP~gKeZGdj/̚Z]iN~\j ho:Ɨ6 a &|I=Y& K[d4ϟi).MkbA{2:^%Wqt-F* @9.QҔ5 4țʛ"yW 5T|Mg#Ug:PW>|E`l((ZK-`E_;8)E5n;]HBOO#j-KsnAH^Nֻ)'( q3&ڄN2dm\ki2\ٖ֓6eB䖌1D"?l廠^}y,)w3$ļ2g2㫪+1ɰH!dNYz#)),݋[ל嗂{&|w6aFo#LぜX%[<;tq LDG1Cɾӹزv`WSsFzag!0'쯀e.wP^‚"isTB r:g֙y0$Ge/n}vRbTi;i '8j/XY(>i(>ۄxS׈IŁ <ǥLZJ‰ Ι⻐`-4zeP 5a>B deqUNgz ^tA)wnwMsښL]:c>_V9E 9ԶbeH =Ynƚ~U6wb+<#A7j۾:}ʚ2pzb;[1O~߭dqFD ldTߦhg }a#tޜt@X;grau'j-p fF}+q2ExZԖ}ܮsJ1F64XP>]KqK i?CugS_[[-P浞 Bt' !HO~!$rO({Ϟ$ q5;} ӹ-(mj*^CΤIrpIZtײJI5[Ql9ښK3 ;̧P T80S9.נyP^kh!Io );Crx.&qߣ]cIן?sh\U?O+*5h\{Ɵkn; USLJ%M~ў)&9~Ym6\Ur6ϙ== RH0_AG Ri3;j! ^4+B뼠O5 "9נW?9{<1 9~``/m'bBⲇ2Ez8CwEK9I~eyW1Gsuߡ{bn_d^Z%UAG2QO\EDɷYxCm+Td/@EX$V7 >5C.P}\aڔ!2Fud+5KՋ;WՃ٣Qiө՜IC=l^` UUT`W)$NS i;WO &6ݏ/VУdի~ SaɐbwJ;_Zς؞ U|}f5z~GHOW;ByF? ӤRRjSd=c9#4tAl=/^#hIj* ˆ 'pHƶrPL/1,L9=oMn.IŔ}Aaqm2͆,Yc\t~8$?I㛔c,P7& kvNrq1ཱ9oZzSʏɫ|;cG7z6}%l Z1+{Ciáh!Q U4 N%u ذٷJ /B^)8>7sg .(T쨫i&4rkcLJ) mOxt@E'ε Ub=+z̩% eh V*6z!j1$ˌC0Q u#K@ IFɪ&Cf164ZT#«V%؋廓^Ǧ{ ھ.<̦1mR,E,TY^Zʃ6Dgp$^Ӟf:a VmZ}VskӶßgɴXB%UkTqn7ז_^HOEAAGT,m"`nJ5woa;#hDJ-A%'Jem$A{$EbtNȻbY3JaN#{f9SL4@%SlHxuEp/bIl,tޯL HD0 F-,r}1gY6HE GOA޶KwnBAj ڷx8) v-.բ̯c g5cL1Rp`ihO^C2T?[0rPl&:+VM('r@N#qUB:TQ,QpjT':X.D(̒0ttOD'; ؙ̣}Eʱzי^F&fg:3Bw*Kz 7QnkrZmG7w^:!1Kd,4Y-P )g[)E| #pz#Ƽe`a}b]p\MO|Ml[M3MoqΝ#XRD j]sU> &v͘yϧ%u/ RSM44D 5r2pto$c ZO?R)0Jt%`E2jalqxz|h *˸ψzc*3Ѷ&A(rRL!} L=뚯\êǰO '+iy*oB|a:+RDFq&m(445kvU:՜)=A-`8[9LڢP7]b1QD_a6@θsG aN1{p!KL#DqpM$ӥ7rT1!`'.>M4up2^Adc\>0]YA;&CJC LhH.1P܌#g]a0 fx;X ;[z _j:6 qYU粘%ԋO$<Qno@ ^*@~'eaĥ7A$7&T)%%0 j&5]+-/W,R4(bW"Hd]Z S_3bztTxF\aT'c7l\>:]wp9f$ۏt*tOL܆;:X: t A}S})O2J#;CB3 (ocd6PHyskQ*..|i& $Y)eɾ%dqx9]Ų+RViazB),h󉽤p^꾒 ydFKE߶r@ZžC;0Jw?u[gTo4GmQhțBa}'NcͿH!rxvAh9@yjW,w#L,KA-v~Q'HzMkOń™MMę\^lQg3;jVub), [DCx᾿)s?OY ݮL%IN Cy|+dοI <-tME(,XS5_++pq-f&ApucһRQU0y$F*v=?wC]A.Ya]uyJ)XRe12]M%Ǿ,S+n .i1vśGsN [BS'j/%kI0јPWklU1﷭~/K=C j1P2ZܺuCj >cm1@\nJ7gCamg5=Í@Hs15EÐs܃6p8*|k/ë^hLjJiU1l~Ñ2+yZA4H4|}N 0x^&4#yNHk44!πYMK?_ %=4mԩ޲: Dy:?˟*.MA}t`&ڶ\!?CIM@{W¾apܱ5!c[8rńӺ \8ϣyn0Yn\ٙQ{i<(w˘4K[g!5IUJ۾x zWi1Ƃ s`m+Wsr ơU59AXt~-7h=? 9.#`}( j\z%]%Tj3|;i̯]S<H 'h@ۻ3Pn訩#^^;Zs ڌSD diB[|NpLGɣ"CȢj I>>t%u ɜwņPw봬fY ()xh}(NL49AwMLEG퉔 ޺,-ȟɌXRՈ b1߁R#^vdEzs9 I, Jh:.7Dvm+w+m2%Q6'{w*q!朵[h}#8hPSfkTYdyMMU-ˏzUkoeSz 4Ώ)b*QK&)*{t fC!fEtXey\fp Ԩ> SVin\#-u5] [;̀f#RU KR)8KqTY [t* >>ueFw2MslЫ{&jJfVafk#mYAbnb| 7`X+F1}}xuчl5/o w+B[kO u;dV ~h)h [՗4V;ݛo4ι[ٕZ8`4ѹ4r΂QxT8]LNUnx[_s.e;;U ga݁JBc*Zѹb'TDғ㳛oS asҘm S(-Oͱ$F:(m!@3ݥw?`TH¨"X~?Wljk삶TeuH֡{cH?v^wA&qass5rի擷 yZJ=7p %L'%TRiU4^j4λYrGՖOa5!a'U?/Moi]sɆ+4:TT5 y֋2bc9V֛I\❓dΚr֬7TӇzѪs6ÜZOR[/g(K.RX_[9*̚"4YFObH6'<"۪3`vJ6P^-CFw3uڑ>Kd5R3pł)B'--gyUDZl}2w7$dRՌ0y;#Î67IQDx\ el9.oSh'BIPGOX3!IG?ײoxֆ`Vs-`YtϥƻJ; W#!^ r+5re AnpA oӝ@}]}0$ہ, sL}Yfs[¢t3pGT{6O♠\|lzu("+Zqﮃ.UBjݏɋCu] ݤ0'F}* )⠽ח>,p\~z$[{F";= :LHQ^cq !gg.tmLLPlZ:cb<<1ވ^<߈)IC#Ly %\LdQ((W*jzKucwC`N]7$Gp˽V) Q=_k|hc.udI7*fw%.Y|l+V pC4Pp)L,6d: @pD/ॳEV\Ñ1Θ B涖n%#g|T Xh cpf_+o8QЬ7&ۨLZ=.K6.VU똆>xGU 8#dKJ%ኊm±$%YAQ zrx-w̡RV}=ͼOuWޝZFR0돹Ȫ7QS'(1{ʌ%_(d5"CB2A<'N9T#h{GڇPD{^64»5TXmk3h"6{m 袐#cxWv^7NEa2OF00S8cA>rB}}1TZڏN@LL/}: u;5'C%o5NM k1]R0id82PI1 bW.Vlp?ghl#2]{s‹5o`u.CqQav⛲CK)wZS-soc1mT,p!_?WY7\Y +h Lcr`#{ ?bNqրx-b 9$i[`>Dbn\Ȫ{`5)T߼躜{MeH,v9\HؼޣdZy[Hi\$bzlN@y|;NU1/:]诮EC1>n5NVerK˪\dk6gT޿7~č.W) -x?L|SpDoK4&qM \@fe,/\Hn Mb-T*>Y:f2JB9QLU ksk+)$'@n r$2 mbIA$s!\oJ#_?( L~1,/QepQf6k5Or-QI>$2-VB7IK Zj-A~I++F̞yk !τ>+8͗ P||&g46\JVZO%^ ;=ۗ i!A N Ā̌<kt S\y tuu5_!^ʻ85#p,m:lp\_E"3-nmn#_G'KcA\?~S7d7;]i+>vſ.6W;w^v5 DfJ=A/v:̔g{@ħաtD-I#Dn.~IkGn_e pFo~g#Szh6:~>#2anb f }]rf OcIH>O Tr!:7:zNons 13C l,e=drªwӑ69Lm%] >{j0sɿQ@!?_2١ ;9a2U\$wZʋP*)hMӯBSy ~gKJ:Mm(IO4hcm(D9& *Q*d;ޣzrZd9eFNj4Ȫ?ny}g^^Jp䵲#ۻ{3 ЂQn]_Pa\l d/4@!p&קˬ.B#; '2z1I")SU`רac]YIh͜9<\]`ȕlh1 (]3'tSh Hhw0ϙ YT,ךM*s0HNmYv 4I6 *B3żIr!WdcGӋ"؁'+YOy[?~dȁ-Ij_C.ӻuB]).} jHi1KL\mm4zk|EL\2庻GVL=v |nvQ (N? rh!T 0OTxPv&%v Sc58jdGw1[s/! ÉSex|R%ܛ$?|pT89'Ncf\VmA,,@J 3g/K.ycSq|U27T/}' Ja/52hne7by!!69LE)yJЌJ?3')Rz \@.џ?7$gh[(߽yk_UaȀކ,&XXxmp.iD7[n>Y??OC  nxbwuiZ\ToH\?*ti3&=|%:G̣3OMWqiP!vї5{*397ϺPriq ^Lஎ3DE_?sICldҲ{-O%ص&mhp.L<Tʗ2bSµ0ˮF %s|:| bsh_Vc\#{ CZU=Ř2"=^*,ŞNjFpi~Qks]GJZM甦MwnbƳlB`%Gafk*m0zOsc^=֋JtYw%_`G3#5U E`cS${ghsml }$ox:h`|?_6&{ "0'˱%4k=l5E㧲0c g#=4tSRrw(XۯCL&g1T }"t+\[^ 2H@,XsS&9l9N2jZyʛ80V@Ʃ;>Q"$Fdde;ΖQe!4H= Jr*kz0Oz{C禾Eki+Ghwf]'B8{?DwF~6h`L֫SI}_#"!uUoʾX2Z7 ٭;0.#>' =Q5Z8zky sO5>ԁ?({Xаxg vi8;׎Rh(-Et7 |&͒-*ա'@]!Qpؕ"#({p 8U &йX"=sYZf_Z39=wJdt"[$?rGV 2^ĵSUoW/"KlAt՟S28RpeD*PLK b8WacԿ 2qCgX~n>ِC+PLD r] Tp fB) H0Xq(XzX4e"zAcc`>4Ipx@|9Z\1˴rzQ"<$ XEf{8y34IbVC&%ihO,E%ֶ.Tn[5?O VovZ5Aًn>,;gV'Ƭ^ :^zYk\+YtU#e83Q_9Z?O- i/ R,lkzyNQ }m\ˬ ԓa/>&kA!*7Ց]C,?"wЌJ58  fVIO3F$.4hj.Ꚃ]&ڇaCOPOBAs_Hc *UQV.6*ڙxyN𢟏'dVies55S;%r6I&< ^oLn͢mz-aazԼ;W/۟jxV({{^(ipA֥u,cr+ @V!;1Tl\$ilnȀG(b.U=.wX.w#S8!c߃@Jt]2KMX=#:D4({XT$2`"5:$Ok^"ё]( υ' -DHl R_?Ƚry3ۤ칊 z,.d&hDܗt]F0Nd'IcM cM46'洭.yt/nNA[4Qb:UoKjZe0.jw4%j'bDUWYgܿ2P{$?`xQdk&g/HAS3Ia#%yoGu&-GCs̻ ]xON.yUQFNƫ{Qy~[D5E?Iby|y4vs!{djx2}AMEdѨͨU|BjhEqzuPnOJG9+s֩()AZܨ7wNmԿ{hK;[9$x9']#$9ᩦ;:=Zu4kc}YPBJ&ǒFR#WGҺ?E#2Ws;Q>8E gy"SzRd[8z^HrTDh\R6I3}Ӊ?n^79ܿ-ڌdh6.]nct3R7g/W8^ i ~[V8ע:VޠVP7'm}M>-dx]3-+X^0\n~DHiވMפ5(B_z.s oqW`Qˮuv3qٛx֤d{;#F X"cymJ k2T gDxk{Dr7DG'p;JIc23jFu)?6f$F6~X 5,Yi0xD.Pa2ఛ]j4Ί/#΢lϛ0B&ECX gY Gg<8HH'GI y>i37"'>iݭmצkP 22*7x*#[^!Vs:9YibB%gvÃ{d(mi=CaeyCQ}ׂ!$,I(HetGጷ]$0U8 !k=\̤H* ]k+v ( ; vV3"qqpwNˮtA@Lͅ a:x8 mQcC4CGyC=kH+Џy.kfިlr qa&ŰA>;P @nv)ˡl;~GlqlTc "\pS`GK|Tx is 6ؼݔ.*lfgwwTr\<NISDNχƯU0?VyQ ׹Z?܌tƪIY}GXdJ4=;l_ðr)b&NQ˿UU2CG*2B¬uRdapJ4oo*`#>,!__d dDG|p1D%il]'=8a[BQu1>#6Pk:ڥgI|ŻSa0G Sȷ"M[AV !bAu2 &~n*1>"is nte_2vv7]~EyFTtܟK&DpEKMRC-c<B7;,W8&"F7ہ\0> Ѫ0_ZH|&AT'Rֺ .:H |R ?4TD )q,^.fz4 xJ^_v%OLr8j" 6^eD;Sy>i  `o7jOO9y k0(B.4=ٌzp}b7C L}^r\l!_C/*F<@HWx~F$r2gAz{={~E 7^׃AM|& 95vHP?"9@m ^sZr&c ) 77+nTa?ZWqڔ/.Fi_DI:]sMrtQs X=:XAYY{Nokj+=˥N?:|paԓ{lBGf.* ]<43BN$H?ї (Tb=z:Tł6+A ~VUqP r)n;nC_0jQ hmlnB| njih%Z15)bu= `Pع~ @Gw@;Xhtt  hB =Z@ =ڼJVG>wuz%f #4oQGql|ײxdzJAn4)@e@8ri>"bŪ?:uC*Sg4Q72os͓S k-"pw{e`pm*2R3|q;S mv9A iyya` 4`|5Ҋ6^7VG$=:V|X^I V5#WiI~3@0(BDcMZPkɄ@a]0EuQ_&wBw.}7q!55SI;,v +4f|'.KefL_ 6s#E;`tc0__s;J:Edͩ2>Sl<dXX&sR4R.$eqOFcGFU ]oYWF֝A5`W>q[_!W\~u&F Ny#$ L)&Yyw5mijKr?0J(IRlQ{2{&D^1f<Cu r=:d'CZmj07Oo; #:Dw+"p/(|rUE` ua1[!ZƔ7~O{R8odoHIH۰9(lBmP3 YyDRvF pM]Gg* SKsaC h- 3 p5g_p5>Ak7G&nnPUƻM ] 5|$j EDWʫiWyvX}XEKynME>YUp_Y3Rɵ8-UP9&Iz6XE$.Jfw-yqGȢngVlTQ82K~ r:|nV.KGUwБ[erTZ aC]G7W=\h8B:rp|%g%51"waV#zb`!%^K:rNC"Ej4{#Tcq]@E*ix(vW)/lntĕ}LNZ3cYmxwV4''K 3 H';&w1}T N  K 6xr?#Ț3: %{:6aáE%}j{ 8m,QCHuiY1+ni|94+G-@ i;{z`PaolNʹIa7zdPFzwDn}lmPq Sj9T"t_]*>UDK w#ZTIPWzBE*S${-Ŋu/FLRHxC8,ev3x5۫`Gjvlj({1w- k+xvN&|) \]8vsjPTW{}EOxPI.SQ] 1F1E/E~3"4lJ^V2Co/aiQ_'8u2h*Lw&k)o `˜Nlnq"Q?]^JyU^ aw>o't|_}ӧXμn7zؓloJ+kP Z%b<`[d$debsecan-0.4.18/.git/objects/pack/pack-0c94e785ba4434e80bfe218c693f51d7926ec4db.pack0000644000000000000000000055621011345002266022710 0ustar PACKx; 1>H/$D,d2 nx{ ά1ɑC$L1P9:(HڰsZ0H)1P"a{'Dd%h]_/X>Trs}664[@(j뺌eu gοIw~`Hx !л_1`qFs" S]#-n}}CZG!eL9б$&/Ji@'7xL.^b"3jg9.j118IU~o:)K$O& ,4jx5+3&j\G i3H[xA !ཧp"Ej@aFtзz%o#I ,ɹaem.80.8` n#d󣶅aY>C֝ࠍSdIoTueuzO}\WR IgxAn b5HQSKdCE>~CiFtKdckőuF"ifi!Gꗻl)ֳF0bDx&X[z ?Rvp$UU&=F2pAb2|zʹ[qtՓo+״PoDP3xKJ1}NQRɫ:҉3 s{ *@9z/e6lolZY,11#R&E,GJHLQ>ۘ5tr9^?%(6O)gi{]5+t\­t >}:B|qOh8-7SxAN!=I(!ogߚ1xd`ݾA93P4_2Y_$x=EXǘ9fNo HqQێCғu֚>Cf[m gJ1H\5gD+Y8'7s+jd5ce[}d'A^Б.r)x#^~sыfU9Y]$Bkrit}>MMx; 1>^|&?JL2+FYl^zc9Rr.PLQFBC)V]HYR㹃̄C;&-V.(Yۘf8q><v>zoTR\iXҡe;r^{FxJ0yentEYXA(dIIҷ7oɯf6#HU˵XpЇ`zV(DKx?8A_ L <ğ]i]#Hh4v(<ײ\)vݼ{Z*`gPmt+B/o_JxMj0 @O}algzKf 2 }+{L"۸I0ʔgZ4+,jB#ٺr Х1kQoiLx?,]֛縱|1›͔MU C:mp>@]38S zOהx1n0 @]4l Ȕ mg:Pd ޾9C~of9RDQô2#HC I&JHIEyVՋ)9{ ?e)iy[V~Q ~ap|nu]s/7n֥4_?~jmwGOxAj!@ѽ}`- [aV@man?}:EĴZ.lktb "+Sv(j4Ppƕ|S˒в͈9|JLmLctC.>^"_8" H2y{Sal7(›RLڸ/'t7l NxK 0FyV ͣ-8w oh q-xU@'r:N>D7lbp:@ 6'W& Ñ%:Xx=RD#^/Rm-u,X6TyߗpDcYo:[#jOIJmKk 3q"d9OX$5fFȑxN0|ȱv"!tUTH' >->{4L; _lٸn6ba(jyIex[[ 3 3?&ްPz*?8ۘLevaes0[W<\Y:BENH7O9VtO}[{xK 0@9EBI2D\7Ifڤx{ܾOoD3N3낋޸Hoh8}-+=/h ZW-/<LtxK 0}N1{L>MRq uԀMJgp6otfQ&2";+RƠ"͒ C:g㢢3>bvHA:^PeWo/ N(EjV࿲ôQ:C./?aEGxAn =}%k`*Wb)6)!J}@VNIcf^Q}6jξ,ˆba$E<%bYꈉÔaŅ8|mM;]nh]^; 붭_ٜ7=~ԏ{5f~DxA !нp _:Dnht#}u,lm~7%42<\r6)0=[ű 9⒏X] EWzJϳ!x:ӃYYr?:'Uz4@{+4Efҝު\S?GQxM1@ừ;Rߍ-!DǞbȎ:9hK\tΓɉ1PXp˄9RjBbIK2Eyg㥏'n+xwbcB.~ܨ׵O@&Ҷ3ҥ(ٺ@0o6uRRxj FOqAFtavu}DM1a޾ }wFxQKR:$~V-~  AIm6cjROv.>ǶwpN.hAJO봤7qzrO+v Z8Fx6~vcCQK+mn)uX1xAj0нN1Bi,GRMFE *29}з$DG,{)YzSڼm}mДT+9[Y<%,$54Wq;}XVtzoO=aOAbbOo]ubFc6kGx;O0w;6*D~$M"URb1mȾQ'lL,yPFޛ¾֙vSF()57l#mPr; 9mWNL/4 kAG0a=;hjT;|!U7\pl@AahXH+2v&kJ0YMA@G^0f#l>U%i;oؔ4a3FG0˹0Pw0e~wpyxA 0{_PMl@ănڂMJWyVE#IpCn*)!00$"k3AC/wlK(unR1,YB/]z@tƨbٶ5+wH͸PQ=dHxMj0нO1ƣ?( d=>ՆZ6B%C=VV jhK]|O.CK;ڠV9ɋiS/5dApw]ݱY *:@c. jF xKJ0}N1R(5IEDAqz2hMJ*^r4&Emf N-v=2%'c:*벎>hw}0h\ʥ:<e6q8qiSP*oC.RP۶2 s[!v@|j.gQZ/Bܯ .1^tUxA 0@}O1{A&IIDĕpRf4"ނ7po #*4i0j$ܠ{1$2{zTƯ%'gѢ#J)HWWӣJ.gا1rPZ-ԈT9]2v]rUHrϿPgxN {b m1&&M2 e~z)xϱN0FOq%F7ir+(`aN4RcQշ$^HpJHWN0:؎0(hڦW\XH6F0lܠ*^j#Z0Kp_)e:SHfdzקCxKՈGbVi[tokkO<`nz3>H-eJј};qJW*2Ճ 2RɗRӂeKwvN* L]x=n!EU>` Œ.M\fDqv֐|1IF&J9iJA шo(غ0+0H%[mtYk[|/,{BAء]ɱך^ +f-_X|+%˃JHyG*"NxJ1 .Őg{AGtu7c 42~\8 ^Hidα`gEX$۰t3 b Jy>dWsbYڒ-i!`AG\+ xg53f[&#kO{m}?!tK7͖mT !+<yf@`[ɏ;_߿>j)bec*vjb"ƾ;`^6Ur:@_,d:mpXrevY [{K3ExNQ+pxA 0{_wlM҂^MvS6 .2F0 C`*_"{;MK4Oi Y)NVWQ&+~ 2i޵1}΢Eè[G8 Y$!}Ͻ_y垷RB}JGxKj0нN1B˒g%^!k}F!<rO8'LR(s!yQ1>R <㐦29!yN 2.ۚCB6>deg*$]K+LxBw)[ ׺nm 9rhMxA1}N 0 JՏ6؉0o,jPf9fjjTp*QE JOM2zvfV_ U‘V$bZ Y*ξp5'/8"!Dk%yCn}lێ?!~KODVk}߷9~?{ }Dz|v_GxAj1 BB,]C &WZӁ'8!o=@P'V%jTʦSazGgɂw 5\SE->~NWouC,hXhPp$E$o:^ρsW)tAkOׁn|DxKJ1}NQRh*|aq+tUD 2w|7MƘՇ7&dFȬQb\]VԥNd"r*X9]5#G;UR%/Rmay.x ys?`JYv٩*,yk)cЗ ިO^p=ڐOV;iQXx9N1ܧi4BDdUoѢq =9.B9Aq.)"k}R-ȚzW*Z5.1x-W|?Xx7,׳b\9Ws&O[kڱm˜W6<>H!q+w79YV_K6xK 0}N M& B~~&"+8iU$z(LC`D]PeKdX57;$c20]#t |T{b7]70NYi]G\u_˶_\MY7y<HxJ1Fy . Cb~P\u}{3:I$I)}{WqFc>#E +7h8Ehe $SRNQH^k-۸筶 |k ˣNo{콕p;"֜1_˟^7 Kp@M@b- 2 w!> S[?o2Γ$`xj!O1c`oWP zv5gwfgs: zgWf; g+vCH(P[T1$O"JǼ{+|q99W g[_A)gtv]$Ԏ󎵌̎u8K2joB'|`};r}p/V)/"~^\xAjC!ཧp_3j'E B7yA,%O{~o"R@4VǪTi(9W}! ܶ}RYxA 0F}N tҴ B$j&%D۫W*SOCS2"d=G&O#$IEn1Y62Z36F]v!$^<۽T}yH7,+>)"eqDgY뾩Pui auݢ43O28HxKj1:E F*!k}4 Ʒ y7P,gLz^3&lvKJ∃ڄdy39-*s>>jlCu7~~j^Z^)X+"ωI:Izhw|= Rt#Sx;j1^>`h!Tr4d1Ʒϐ?"@"[56\)5%M Z g+˕GocuF~2>t'q*r;|78+_Q>tSJP$tR_IR1<\QxKj1EѹVQQ22.-ǻא;?plu.>XY`m@1).QV'Z=xM ^`ݲzDkEEuàhH'W?e\hYVNI߶:'յ8FNj2VhngMSxAN!F=Ic2 W\tS0fn]|s<)V5;m+ {?hjFosBVC8PLsKMʍ^t_ ҂v ֜}:'Յ'oxH*,Ҏ1 Ctg^d#gLvQYfxjC!@O1˖BB)]u$½/m޾ywd۔fr%E1X-+,J4e4Vq}IWG+K6$c zYӉU:&\1us(9?Ʃ;(*|& K=nIpʣWX}F+SyFؼP4xJ!Oqe037hݮ[Œz }o4RJ/)0f#S_P!Y(va Ĥem!ZEu|FGm #h~# „rSw6t(pF"ԒDT[rDrԎ@w֘mZxAJ1yEGaH8I {";II$"{/Xj4p2Ϟt[4]<1{6hes&e qZ ָWD&`Oy5=|-sOɇ4xџ$E$V$q[-3<;&cȿdqM<$wKȵ@UHb- _ҍ 78-zֲ t]3</ =h) E VxMj0:Ń. Ʋg(ȦtY~>5[ >Cg;38{-z ZQ-0qq`rE>4/.X\4,43C94*kT:o J/-"ȏ2DV.Yx BwkNs۸%SICɉvhB}͝oi+ ZA [xJ0}bR:Ap΍er IRWFNkmVYKOjz\4ɤ )i0IiFks*h%+O9К+Q٩}~LT)LT<%z9󙈼e Gf4_G !Q\3ԻPpx៍&;uшFIXhxMJ1@}NQRhDAt)+UmN$[7Lyc}t$֕BQx߭>e;Cyb׶<1Ѥb{}KQ;mNVg) ?;;ֱZV%Sd(v!VB-{2iQu[ixj >=.hbPJaK~vD,y:^ ZcdhoѸxFQU)]VU0yVj~&ڨ[|R}+5qo5 G^HJ#tO/zǿduڍz6d*/9ҎMw焍>s@[ih4 j^0xMJ1@}NQRh5R\W%'I$3ߛ[# 4 1IGL֚ˋxquºq)w )'bBilym3V\S}\D~ڔ<au89;rٱgnZZMPx !fq xZEC2]ixAJ0}N1R(&iRׂf I"o^ :3e]%&Ckv%ɋ據ȉ(i#.s }m|h+T]) ,Uxz) F\2gC eKQt,i"+m oZ .n.崶V(0)ߵe-S/;7xI?ȅ^ȯh#spZ=-zpgJhZ&Z;] ?ƱNo[ܟI#j]xA 0}N 3#o '-ؤx{ klS"ajG ےt["74n$($ ;Bg]b!IbQ>F~Gį2Sk+bOoxBIxKn #E`R׼*j ƪr ̌ hEɣRl 9 %GZšcŮat-.sX-2[Ȥc|?TS˦nM*]Uέ9m|[V%n5}Vwдt GHUSxA!ᄁ q` {Zm":ò C jZCɠl,q MAC-^%vaBt~&ٜ-7Ey> 5H23~4'irWOT굖9XcZMr} 7e8FOrvUNLxKJ1yV q @ q<3sjxA5ZjPJ,BdR7-œ$G$8>۽~`׋ANhd8i[/897{JHxKJ1}NQR$|ED뤪iNL3O&3x^5-RF2pi1ǖZP: TQJKy %ǔ[Uqs>yyJܹi_XRDx4c7WVoDpb5mQƼ 3õwb ~7=7-I?RfxK 0EYEByIyq>/mMJ7n3i+oh|)!i1AzprIyLGGBQ' Hs[IN)(…0fBitX(FqD׈ʰu߷寬SW*<뢾ZE͐xMj0EWdYB:RYC@*2i9 . O. DÏk(M"&d0 yQvՖ]oq(#ʳBk^ KKjusnͰR$͕cs=AI_sѯ~H[=pmfɓ?8WxJ1F}֊C%@d\Np!/lC:23x9*h9._$cji8.yO ئIMZ_ET_}' zn('DZ{v!=Ru߶uN hTBǕ>^ x1IxJ0@}b啒߶($3Doooy Hdq51Oiѥ`=jCI.d<'햳hSq ޷2sB\8L\u"R'+"O"}cfJs#a\#;|>-}xjV*IWxA 0EyVPҴM@āq6)!"޺rkPn-{! RmO:D%㢂 4wFY ~9y_sY8' EOn.m͠'u>oR+c\!opϜ&y_pwHx1n!FSLba,Rdr.5;c#y!bl>>C^B^ة)2):$k6ah)? Fqak:nTeCVTW;(4MSoiVJxJ0yJIiŋM@H"gp"ivZtN :30‹gc~K!{{cL0a9HR|mmpO)txȿOIIMIgIBnmY=ﭏ]`tʣz G6mnSx !FO>::^hA_ 4:} |:%0gK 21#KhmcŋZtMC 1LӔ";4Fa:%~MRw! nQuD~ :Teau^t#O>H}x;j1@^xdF}T^@z4 &א[. f[|l*>D!Ԗ:.uGf62sXffgweSHc[ۣ5WufԿ6\)j۶!Տ R9>јOMJrxKj0:BjYKz-lɃ,gH/jUsW2bU*8GB-^貮@Hb4'Z[d=c :F DI T tuvǖ:0{$t/.ieX[Ŀbv;\/ԗy1tz?QxAn =}ilU۷gۿ9V$$ka/8Iz$M\-կ9ؒu^R V{G>Q z/Ϗ/Wbv$hMQGV_8}AѼ2[/OTxAj!/u4vM0k4؆0>Cj]5:@⣋W5YֻlC&YQs!kl) Ć8둼;~Z5Vc-tFEPmb1~>QꓙʾŁc Y7Ћ3[*8U=OxAN!M&Lt\d x{ ֦VZ %DZ5;orѰnZ'`ԷLEɞYI@T9 gƤtĶcK{Vt T\ΝOTVxnǍ֔~emhTv|A;NxKj1EѹVQѧނǥ֫-BWo!wpfw RZ}Ԣ NDV<&ybFM55HYRAϼA[7`1U~+ *iz}Gyz97[oԅ*ڛЎ/NxAj0E:egtQr.H†X2BI7Gqt$OD$zO9]JזJ L g`\,yfYɥ/㹶UźP{4,QT۶dSe{> ~[5umUpƠPߟx Ew@b>b<=1&/U.Dm˰D;9=냨8w$SMJv58l9(_}-m O^6npI̙y/WPjN)#䁈eۖ/Y.>/IMGxKJ1}NQ{ɣ xyT@wҔoPkzDbs)bT0R M>JcueK^KdW=9M;t!t_SӀ/' {y;o`  ~<Ͼ )e Xi\ƛK&xA 0@}N1{LZۀn$3MJLoo߿ߪ* &rʊ6%"NO2Y}8Ɖ}DRDt>ىVNgp: pNhiNDD=N4L,2asEC,9{[R[g~;GxM1}N(N:? 2b. 躺 6I#237@Ґ$alR.Ja@gabb"h$OS^j.eELz4dS4Ḟ.㫬~ϝpXjQoGex; 1F> &@:L2{u 7:@.x9&hfWY+ RPd5ibGؤ -IMAOYr]JVbTh.Kstüӑ_炊G}}K7ۺcY\;~TʏXXڝxnKE|p!KFxAj0E: AƖtg[FQ}}[m]1E(ݗmcJVxK 0}N1t+LAD7^u`IJg_o̠AT äIEiffr1y%iB ivq [m/5ss\ ˷ҠTh byFkڲvEӔx1n!=#[)8WH͇@8} zF3@2h^C"bx0&ĂUgL&9I$m\W|Y>>G >Q*{B~9፤NJq^kǶJ@~cv#oT4P7+ ?uVxA!ᄁuu /Y݌` ~ )c̀tĨ9Q|>dGbr$fJK,i0Hdm8Ly~FTu?[//;eW'D|c\>#Ѷ_F^>k,5JTIxAj0E: A$[ AWk0U}}۽(@5ym5g_LuG_C\V{VAmb̞U4Ir999?]wr/lCW\H6FsdDT>eGN x; 1>H/,"V{dwz{=s0K1|*X8d3YEI8x6fmNB@O3 YS>>h<׵yӗ ` ȓԷe/BTxK =Iç $Ƹ\0Xjz{=oFF3g#ZB},c)'vi8;cLtaP,ho}ܷc\T^&4IlqѤhmQy[:R@ ھtTExKj0:EF@YeY#%Ӗ }tԶLٸ0 VRV3LQvp-Q`l#CsiLXt֢7Jī?ck\bo*;17JDMH7Pjq^xھ_x==m+>?GuL CURGx=n!EU>5RMyFl!4lEٰ(1%x$mX`mҊh^ >J16U m2 ~kQ7AOh?ARjo3JJuN s4׭ f@Ӎ/]Oxj E/F_&B)Bf}_]ιkHi(y],a^Vk(7 ZC4J9hЛfg^mP3_3>H)V)V,V =##Sz?A8+j4o URxA0 _{XVDPeXRv30[ș}jAhe^sRR;nB,If[HB&8/# ++>ǭu^~nR^_jvDc4G8'mUu1<և{{ Gxj!л_1q]sn=:3XJ>]' ꬲ>2'%YIc **[S6JqsVs6d_[f B ~Tpҿ&$M,g@ap2+Of( JqvyJVx1j1{b, qe Z^,Y&&A12#Rt cDē5QI&&R4XhƉ׬f: iި2זcE3KK{h=:5R]ܻM:,ekͥB#^vqSxKj0нN10{ d+t-yFP}{CH"mV6d19 LCbgb%K(M\ {C@.hcTzgQS/ IHhmƒ~uNWVfX6Yvi 7 GVxMj0:ۗI/UoPLl%ϐYn>-X8Ngu CCQ: I<'h zBf)}fU~s{-:]A_ОEp#cN7}}x)V_<Bok-[KxMJ1}NQ{aH:xו/mp:i2%3.xu,Qb(uXI[RWS.g9y+ٚRVK\e$ݕc2cmƝ>Lz?rA 9Sk =GfTټFu[A4qt T?:Ix1N0b{/;Ǝ^{~2Bܞpf4sd.8ނ֔drBZ%j[4[ʺ2&[Z̅%FָCI̲.5}ۣ*>P z.߯tC7 Yw's~uN+^Q$|裶O:GmOjIGW,KPPxA F=`oj`ZĂA ͷzZ)9eK03AFa%te9#w{vSdx9df$Q룶%}òc dvtR;%%= U^~wESxAn ~ܣ]0()_y~lÅ^s:qo` zc#c*ֶ9_~q w:d(NsxJ0E %ɤi "ĥדdJmӔ" sMA1:Nn`.6p#/nUV.;`㇨dF֟x=n {Ѯ̏HQj&5H X/lV}|L=Sx6@gV6 R:hl nCRq: Y'^9F%/ָl7?UO1.tw)'J+?3+ofRfYe>Rj ^=2}tJtp .v|Ux;n0ឧ>A/R/!D@" f#ϐ)~8|[47eSluXh=Qwh2tKHцh[-AG}Z ۯo,ƅWҋSg#gbj]@r)},4pC蹣3<U*Y@WgxAj!Fὧ}`бDz! !\!MdqBn>C7@rԔ-geq+ۂ2/"2&uU/bC1XQY9٥꼑>}TiakyhH'~ʸs|^{do[;h4C<ܣh(㡣0S?x !O1 5]!ӾBg,0b2diIcTRDA=LGp1Y FkZz )t8 ~ڞL6/ں1/Sn Jj.Wx^C}7M\xj0{=#^+pJy]HOD`KZ>so?Cf3sJ#=a3]06zxAp.9Q/.lӈqf򜑝GmB_k+lgBEP_mH1/N/TlVzǿdHJװJ'9NgNiT2%JjT" \ҐxAJ1F}NQ{aHu'jA7^uuDB3^vop8۾XTsXETuMJ-)€ME9YcJNozjwϋḠJkvϼӓr?:'5W32BԏY{swUIʓxAn! *)KгYLԅ(~sF%њE1Zlkʖ-:\9Hx(lR)79pX GB6ti'.Vyp9ʯ1=^}ؼ өMIA蕅`۽+ko0;M NxPKj0 ڗ|UOPZ/%V5=B!af$f1K=[oqp=aX#fՃ3{Lf:T2,_[K}O9pO^a+5UiYS[KtA"+S`9> Ԗ"ՙb:)}#9?-kP@*{/$K\T@;q1,_trUt>;BQIvxAj! Ն! rL7u0!O!]ACE,c6+YfD6!h!mRZ,%={:#MPpQ[.>t?tEׂW2Ʋ.^89Xm>As6H9z\.4c?vNrxQN wN1ccb >e%Rh=: ph.Fu6j6^WX)$7X(50h[-4[kiĭ8eg?#Z |\&Q((yp Bi^T_'ޏyBk/#OhW Ӂvc{ĐԼdbؐ=^{_;>!vDmw|w5egr_/݇typxMj1 @O}qJVB[j 3V0.inߜo5 EŘL !-76of}9u/ȅwk9&fU~ַL8d2I5_h<Ym{g_,, &e.(2K !2u?Pxj!FOq pǁ B%!wgw_o)=`ulJsPɏ :%cNγ v4xY,Y o\_k˾F/QQq"̸syOw )k>dʿIyr=rDNלx=n!{NHk@TsK3d443@p.3ѐs)Hc`_xM ɉƻO%g/k9b>?>膺bQ 'W?\,1$M׵ΉZiNQ?0AoN+hkMx=N0E>x=(vGBP?"#35pOgt;I%iFKXW:xtHG$@Yy1,}eg^ʎN5"\P%ᅔZGO)}/c_Avl%ؤ(ԱJO6<%+ȞVݗxJ0F}/ IKǝA\ۤd"oor8g>}KMhr/o胏K/Ӊmkv"v*0j ;asRx;n0D{b(AAj~a+}"ȔofWDGۛNQiJd σ~TJlba2X9G9&6Oq+ $p;/TA5_W u@JeԨd?"kfgC2;HTWB\cgھmTasn[.%V*!"cO 7zO: >nҜxAj0N1౤TJH79Ak)LdGgxZDq `V`rS1԰w$Qsf#jb!Ui)^yo8(ZW@nMxxMj0:~,Y*t~'u 2|3|¤'7P ώW(0mg$jbaaT]a%TZb QkH|ł-p*:yqf_Ww!!S9Óh[n&ݧߺ <}{3<7@S~O̒x0{'!?X:!OzFƀ70L1e'bLYg'&4Ǩ5vE⠅%L~ʳx^QԶ!#I~ʹ.pCY*>q- O޹ PVxKj0 >ϋ B׶%QC<o̘2y)R_qe:7̭/{5SOcF蛬b*l-]=sWxu <6VxWwRc'mÌ%S1&9Px9N1Eܫ9 !DDFLYXP-Kk&'kQBHiul!L2&Ƣ7]]45Fg\EvيԢ Vk}o= @?0V /*^H)kkBt$¿f@DIc+i:x&\my<uSx;1 D=9z?!h8 7v`%6A!q{+0ToU{`qtKDQ+ R71h\4Uគi-ŀ(ַ #3-r=\t.IǍOވZOص:XA^/ FJ[}O*.1l7pȖxMj0:ۇ$\맧KFV}|V!ɲ9ȑŅ^;ꠥD+poq`CaƜ1SJAsNG+WƺZP'Կ6|1kOm[fu+ !0Zzp0-n2 4wW +jEL|ktJ?vt\PNv*"Y=}&}[|Ak;*_uħxFxK 0}N1{iɣd@D7^u,ؤx{{@DVb5I Z vJ2^sY %*l&o=B=*m'EQ* dz`#Uys=9i|4Hꏆ f/ѸL y ;I4%8Ey>*5J]egy~/$q/:ĐPusʿfu8TÓ6ȣJ,LM7Kf/RGRx=n!ОSLɂ]`A,W@̇?7:@,S*5ɬ:X&63:D,9;w샬 KTir/ `hb.c|>֣7 mCsS(㢸ss6<ћcض6J8mji^I xM @=I3H)41UzA'i ^7f֏B]l37OL 5.DCuL#f SvHZ,kmB,78)q0p!6qrXMz翰Z ou)9nd.|W_RMx˱N0OqUd;qH1U ϾsZ#Uʿ3ڎ]H!iO㜖h'MՆcdgcVj )Ӳ:.{,Ψ?k󭶌 7xI7b0u ~cFӳg; s / V[rQ]~J%>2S`;(HV((㖅A}Df&x=j1{B<,0ƕ&ӷ +Bg4S 3iIRHR፰ɑ.HVu@R<Ц_bBt>ZYKA̱d?Q7 }] |F{sMc= !(VĿb5<Ϻz}KK/PKxA @=} $MӕWzAI Ŵ}=C z$%QVt v**d0ΛڮoUmFvޑCdlIQ\`\sq{N<5|ĶRk%"τkf1QNI3Bɯ1 INxAj0FN1BRME\1oΐ&@SF)-pEx,^BM%6~tb% 52kMX"> W)QbmNO'}~Ib~/oBLuazܺo[7S g7Pma\pYJxMj0@N1BR.d=F!Yu I*Ȉ:zC6J*FKAkch z+͠KD|t_D<~g\_!(5 '2SՑa[w@Tr9Ck_^KxJ1{bbIv&iD6 aS<x;j1^HZB* 4 "fcr ~ aa/͵dźRJm}dN7Re5h5WgЇL=e>ۯ\s>-?SeU曇0cA>eeRTOxJ1E2W\N8餉Ŀw?. R)kp\drѤ>rX2&%og63vUMqCEn\ uǠhNhx"k}`ܷuN+^^/ko4/] dC򇼃y]~kRxA0}N(I ~lRbDz%xf/pS#I>" QmP"d"c!sF7$fE~Mk[+M'(p:\;󡤮;nܩ$j鱿=Z|eIۜx˱J1>O1pp$7 ⊅XO .&Ko=u'E)0g&BJ2tbrObTf L,'A|*uݴm9gZ18> [GpcԶmC5< ~ 1Z?QŤM@]$$tZi.:+n\l\"k 36T'dHsnr>/},;q|7ں`S ^U."/Y-u}W{ ^&(M!PxAn D1HQU7(TYCΣED" 'rsGM(Q"5zgbdvQg98=sdqJPqQ:}n􅲣{~~*im, ߦ{{ Zm\6sE{-6xJ+o`4SܞxA 0F}N1{QvLRэWp=ŀM$D3tj1h.@u yIC4f>.DqAY66=kR莼i\[397;K;eR];JW^ziHXxAj!{EG{Za 9 9M]Đ7 HQUKRJVK̃>-H 9&J0j̇7>DŽs>]2oUUy|8,1e\W[KͶ~>7m?R{)1/(2YAMGxK B!@yW"k O}:39p %]!\29Y$m(*YCVVj0E.GZ=D3>yƯT* ~SFaO\|`Z椿bvJZZ?+1K7i8KĜxK 0}N1ti " ' lRBDlH2g(1}tGc!j&@g%6K2N8dyNŒKTmwY7ip K8Jԑ dzGmkWVWf8 CmMA} G9x=n S>ʊc@ZERK̓Ad ZqrL9(yh.c-*Q_\8&e>uZ_$2x'څ">A|h wdRf!8cE{:xKĖ_@>koN*}O۹?Rx 0E LӀ+\O;,Fﭿ{vND~![φgGDCFȼQ{'ʙ;va6`xkR,u:ZE.r=s)% c2SkܪRajmU"SNtJx!{\8Gb,z~&tstINfD}ҀMIK>9 aZi #d  &ނW&Ϗf*M4p!Q*5 ('w!b]wKXO5嶊/UHJx1!{N{Bb~Jof G'4]&x?ŤAP;`A9 Vh&BB.ߠKsi+]Qf4:)G.#cGvzC2ϥw5Koe޸ h8=̑2ͨmmlT]$N,g099􏢺mKWVWfƱԶa:/9GLxPn oM6MӤI{i;0 jVyߟ품`Bz; ɥ chP۱ r!šW|Pm(gHR> >ФKf{Pz0 D#Zcaor˛@+ |=/ziXV ؘ<>@mpAP, w[Pj_hⶑEk&( 7`u'Zw(֫Bc. \5ic ?C#6gN\߱exAn =}1UͦWz|K6D3 > q xAg @GxA @=`oRg`hibn BC0߼VE#8L{ɍh$NUrcBALoG cLVM,U^Sw>,-T,2&aue,agX֭ΏgS_YF xM B!йÖ́FA+h']xChYzsVirYSp%ŗ>\1\׌}q!N[ys,'}L&8x;0{HI$?(Q@=V3l/Jzb1Ø`Fwْ_联^`A\>[;N۔b?*f x%K 1D9Eߘ ӝ!b27bQWW L|hc̋ ȡv G o#GmZ)Wx+i\m˱s|.+7 Zi}jDb * x%A Eb&h %1ƕWp=0#TW-ޯ',蔊֒Yh(<2a4iю!֜S Wx+9HÕw=랰Sz^>WAr9$dj88f+~ x% 0E a<+u1MAYƒb'M:p+CLb 1ec#Y K.sn϶JzΟkh<zvgK^_P* x%A Eb& Bb+z`ƖMoo0pxF,H. (ٛHj*v"Z FjLRgY;^ȖcH1欍 VavZD6GI{eWx J\}+JzʟKFS;Ot)eqps% /3?}+5 x% B!E~ ֎#5^Rr.t8@[>Et^%)!ADo(d2+Q.Rp ƥyʟK$]&>R)?k3B$) +H x- 0 aTۀ'sR*)5({+x9̔TZziYb t'tYbBL9h궀LXMzmX,t8zΟbFbrއٹH( G4+ x- 0 ay4O<6%bRҿLN I[J)Z"F, s ($ܞma;s\3/%/{/@2N[NHBd/NG_}m* x- 0ۂ+u'bA[b;r'Rvڔ* @ m.zJV 7)KdY%iYc@2`ʒ^2~)v x%!D{b{Gb`raNLxαzF?ic'LyJkG&zd5Ld2arVY'Cl.zX୤.ѶVqcxeM&>h :8!ӋO_* x% !E~"BD~Ԙb>:gqnN2V!*zBcQǐ<9MNj!ZWx+iܞ}+ΥN=ϕq܎./b &X89!iF/+ x%K!&#Ӊ1k F3^oUS6Jь3*B)Gk4yQɐZx+i\m+a:?╣uo jL4+x%K 19EN "|:È&Zs2Yr ڢ3iWrtEWf1oVgh*xy=%s(Mf>RWQiD/), x%A b&dYO~3 cT6si|NĄ#x\[sȕ~]zTEs&(LiHʎM1pр4K ^lRIfLݧ;?X~}|][o8ŕ>-rgZ~b+ӗueϯ/#{[:gŪzKJgo:_&QH$,tUmVe^W??>X4;|u [WnҪrK[vZl/2UY;Ǿz:ol_fe7.x.I/6hleś[ xx,]g +y*JևcΧ/PX%[. gpotUxWa/]dcksi^|)[ [AV߿+x6m-]>(=OHfiv9e*bZy#|$ߔv[/eoVuQzpi=">t>-6N?;- 7ߙt^&Ξ8Y%EmI·Y!Y{H(5_.o`%߈@IE[*ٖ'|)4H+:y Gَ}\u|aU0lOPWlm-mR5[, "uL {qʄc)F|峠q!T"ݛ~)Joͺ˂2Y:>ܢaY*xY:Ԃ`<](+'buY'QAR)pK>73 LgIŋ/\Y%80a:OJQsT1'{DS,/f%}r^mX^O>î}jTڑb!rJfdIWbe:XQHDuPJMPDA( --M ٰ;%{D 2b?\p\:Ҝ`&Qdz[`*̽9yzX~L %$1vzZgk g.DW7w(-t`AV1O]\%l3-|A WEbނrN;I'Y{ȑ(ȀeB.kH$h-^GQ[zzI있j HЍB^Wgw[ك_w,`A(28az9iL_eMDbΎD6i ,>`k8n?\W uYydI`.2(`Ho`;3y/a`lKo,Sפ5Pp^T׍hB 7;Ogof4=a?>>Ɵzf4MFWO_p3]">#cPIՑy+oBl$,Q}%hκ(dv ~ci&N>/G فq=Ø!Btt2OĚy簚89R>r֠uAj Ax!=p"62-89wmΝ(Y Ltrؼ$Ag Y'/IJ;xF8Xk> /;mQԤ뀴87A2,\Zd(`3 2{P(_ X!LlhåXFeuS6yDPT%!o2e^r@:nSƫ "' I؍GD{h&|7rJై>gDžso 5mZ.!4\N"d$2|cH1&؜l!D@ 7Zk5tQdw]%CG!#([4q0"`ĥ#&]I &V xBJkNڭ81wWJ gRFvQUsU3B:BySjJgC.yy!.e5sW-d;H;H"B뫢Db>=` "mNSr4P}S )4?jޢ";4Xeu DPLmJJ@ -o# -sJ)s 2S0'"@IHOm>XmTTX= Xj&)S CmK Ó%=1$Ke9,w&ڹFMV0@b) WS;K й4i+d\2.Ga=(F #~=濜?v9@ؿׇ:qd(\=K2В?Sm[)|%Okk65ir}@B.٪u*RZ-(4^fVj[Nb"טnxw2cؤ\)mdvY93I/i(R|JTjgt+e &/".:gYD8JL'lgֱ]->Zn7ROj)mr 91$6?lьND7xrzBUJwt"9)SWq le'j\hrA~u bE@>yk`th+ԊjW:\3Q`Ãq7`eKRq|{s)rnHhrQ X-f -Bkq]kZ:Xˆ߷TJC}pTn&0yc4X?$:Ƚ0Pi0( ;}#d BsSqRbf6;"D@hQM鿅ɅlotXLސ/ F3,Y ydG]HlTr[`>dhN;YũB)m\- Ճ*xܤ[R}5{M# ԛ1+ޟkdB;p\4Z#'ZȸbKmj81OcO(n7{LKqtO}T)@'⡆=R9Xcpi&4LwkQ?f_TQ;۝h uO)"V.Wu`mQmMuX5kI:"( -Arj-P[J;sedӷv.Dd/\es6@q\xi s6oR-~5̵vg"-d0|dE 9:PLjrظ!NӨ̤Rlg#=i-S'ۄȅ?qMP4ijML4򢸲&nDz{!y863E Q[; á4;%]ik;[q.>#D9:r)uR5w;G^פg7GhfRu?\rN `TQ{-)$ҜZ$]#_ _E١G$Ρy<2`s'aNE^SފiUn`x?1.P,Mll<)9wicp Aw>X:X.^xfRPDdpJF!d\y 1WsV{H4ҞA2pk8aF-G.CbC*05*#u0GmCC;Ƃ&ٮa)Pnzcw2dt~a5 '< '7BڿXM13LZa~d;e|822o84EFL<5 bwa˖)m| j'.q^|pçsoFV*6EmXhi>yګNu0 Ƴg^C;çMT썽 ^ &=zo27hF6Zo= 38|fX~h_߯3n86hlNF/Hѧ{NxZGd6N 2l0ghv4k oMG7X{p4A+0~O8=0k»auWl-xx _?ptHb!'`j= ]y0fA k(j7 /fx;@xL>3ގנw0y`&ɄVyo'AK_Ht'&O6bf$wuIB'x j`?e0Yd6]R9z \B!$g%ug C { '"~E⤣IAG]{Ô )?d8؜OA_m4f:/[hrloɁad]klzc[lu}ҳ}w n>0)Ot#;6͊Gi^1gRaqǏp;_e_K Dy_6;R^ 籛dfZ4Pj/R} UλSq+VӰ5MT`VgOEЄNN( `Ц%4oc=1oRTX̉^X#6fKg߃O.}~cR"*fIhѨZY8K3{v5:㩽íX6YMG˕Π+,8էU}?3gfk| \M=c|:`|w]5}.}{WЛTM($dvw1!}\Yﶔq1 תmnI'{-.(bԬC=25g3ޒ [m:݅8L^8Nh^8zAp%Ơ]\INؓs:2YL|ӨJ"& HVÖi*7V)-H,a^ G} WWRÐ7Lqkj;˙7 WRPYQpɣg!IU+[ (%58591Oh`‚9\1Ym#)Lgٱ~-]iJfQ1Í}S9J3 }t%y% Tc'Jٳ 㷎'+).ezDP{3l_(m? &r?Hأ,I-I,I-fHpm%E"k2 |&xdͫ;9ϼT275U(*ꎟy@lO2|5%n&W*:xg7־M 8ߑK1 J|*{́Yґ9Yo'f}Lu+_ë^hLjJiUX6axKIMH)H-GsũɉyzťI%eE1.̜b.{,xZݖF)do`3lYCr pasrӖv3Z1be/MbUdYό^$ CWU_U+B4/J.bSpkd˹.p\i,\K%72\%+WT 嫫٧ FoLKv't {iuan*rK:凷Cߝ]LUl^)ǽ~]'3pή%\0nuKD.jse$-E6FRd* t'R1:UZ‡gs&f6IO]W w=yNs=JWZvV J[q 91%J/q %܈ %J_rk%2ep6 (pW+,՚@m\/d{5iMEa-^h UKEMB #0 }PF -Vk ba!k_?jȨȫ=KPl`lIe醉w)XucD* X/ wjdW{p}3ҟ>)@B!/? ѡXդHie`k8‡ ~SԑRBCG1 ƊnoQ#^*Tv9hkHZm=IlE Iz-t u郵~e ;"NIZt"ՑNTࡇ_FkՌ%M\LX֬,NWI]AHOS9k{,KMȉ8 8&TGDoz:A=6|əl腚L^U-AB'}\BzSyɑxf6 x6ݥXEv76$jk;A0n6Y4;8P_,o.xf@%z{FT=h㊗ U*g6{ވkD|Ǒ6VV#*^Xb6ۂ5!{ y[|?A;-Uw}FfZ$e>ɞG$5dPop8"HPr1GxTGr7kZ4]U.$CӀBFCk0Bꔠ4ԅ̢ٽsMvЁcVD $6b8 bCGzg5hϘ)'ͼ1i<{4>=ܱI쨲mSK%DYZ̜xSCtk ?GMq=i |$(] drnZyh{ϾVl.RG?: d]e6?2tNG#2ĘR+r|ʦDo THj\NkDv;P`SpaR07+6 K'ũm`˸ jWIfԦ%.?P3`6㏒z=J)_Ѹ9˲BMavj& {0ܙse1+#س[z^;2;UR'SCy-K72U9=_d^8 \϶#11}U '"hbAkX`DG_̖SϺs&k(hHB-.9uw/ V (fL) n0:Mfl脎d$ϗg{O YT*o89ûvFmjdGfx'[id4mD +XQ#cadg%=8mU0Ǖ|ia"RPf-1 {z:6& błV]H{5\Khj(8Ʈ*LETyÌCÿ́. uA0D2BhNZ4go]W7 kԱFED[ -oF6YV 4eX:ef0g4.mk֝s+VmZA~D$4; wpM?8>X_l&͇&ˡqT5"]Wdj}"]qOjN׎hys זmyV:(heVu]v]LDgsIԗ\әlД[m@]dz҆aB@oiC2.T2 f\s }&ޛS|/[n"cZRW ;λR;d=#q鈿cQ<L=!c!6л~;t3cKv^t#q݆rX;i"f2z:12S@`*MC׀?\_:'NȚl1O(vw*+QU:ʺmiX¡z6У437:7h}pC5,zp'a$ꞿx)2x3v@-xeOk@ )t衁)I ŴKRBaЅ,ȱXc4n|jviB6FiA>Gq[tabqI:HsctCh]FMӉ5 ;OƜcS%IKcv);kNR[K=΀PR#b!+E%Zϑ S~[܌Z/ƒB t v d=?RXe!%& чig5RbzU-[bDŽ*krp{܃ Q 퇤|qEͱƴqg*Gj̃ظ?xRю0|WcOP9zpHtI6:c#徾pj+}b{vvfgZye*()WҨ7*jRrRd(ɴ6.k$εsH-BMh>8&BLuj_B0o SEbn]0pxuO";w܎+GophmR&7)`KU/SN| wU-['5MU*xӮ;YeP֌AN7c-XhD\(9ү Y}b7\ڀs6 dplUI<kDXF^'o~d57mbyc5n..X|;CvoA 4<`-Bs3AHP2B-,dB.@͡ӸRf1T|{.R<ǐu+1lLe=~ߝi7LMu3Դq95L޴yH!!rN]SZPUSɔG=KCr=ܭV}z*0RIv; XP-u8&-מU%g՗D͏d%UyGmZə6WrM;ק Cui`)pRT\&8/'tj1ޟ}z-3!WܢjIw3JS՝oU%_=F",Iv 4Kmr%"Ye9-N<Tcgbnm? eHsEWx^ Wr՝F#WZ-9&[ɵlXa{)\ψhkv>1ǟ,x{s73u0ne fd;xK-IO.K}axunFŧ.,VQeZNr%w(.@K g)%?ŋ6U,plI|:\7ζ;=0hT`/،'f7zftR옴Dd'˚#yₚN>tfXm;ĻS6P/s?3K 46BB76|'3ٳY KG|EAkXb:)-L3 \']iɠlǁ,vMpd(=Q'Aw\iKAd#-u䍔AM? CTZIIiZӕ, b~zuQE4,jqP mIUx=ȱ0)g6c$ZH?&$~jL H0tmhNu/=_j'b-’tu4:SpwcOb!'x10 ݧ$bF,H 4(h*Vo_qVLi9pF2͋Ua' ?-56j>?KE5]nHH+*|xUMoFW CDT$M[c, eIŭ~Xa~}gW-0Ay͛ fjWyz@dxtS4_7Lm2 Hj2:9O~Ytyu9\,$;y \ gōռp+pB A0EDi g}NذWf&2b&YV::@Z꟎KUtp%J7IJw2(mO&U K&zPfH'ɡpjGSRh,a4:ƣhƟ⏧FtG>p)De4|"}2 sflk&`V\p9F D.׎F96S< "yb<*iQRnC,~7q+ oӋIJ]:Jd*.1!J dДoTG'1 -TТǣxșN92i;VAYAŸ@?{:ʼncjߙKXfUF Jryź0)usX&;/$7ADdO_(EcfXa$ JX L LoE4Ъ-!TC@@u/Y%0OɃ$3:LsʙT!Y;u:O@pBɧ Pޢѧ,bd;Bi$1 פGUjڨ bPylΪ'#T%eL,%~elK:T>İ1J10S c%(Xd/`Jd6dM=;}0{>n=YXi샹w]1_ *x340031Qqq cpܖsQo6hk3(KN+g0_ֻMZO%LbA)Ym=Q|ڮ RRA >2żt,?D3vCMzno,'$l#|UceENie5nPi 7['6=B BXΉotaZlG P9 e~N*d[?fUE eLu8Im,Tn`7*,)䩼lXSRj^*߯[~>Ae;TA^HiBuz6g2՞);2"gÔ+t'z^`JP`7`#ܛ^2:K ❂@jomz4!ѣ'V/TM87LfsQ_y~aNV, Pe *,;b.shR܂p0xq?[stVKLW֖}0h)Iey< 0x.,HRHO-)I(/JK02JIMUũɉyz%9%\{>gxW]o}ׯJhj# ) K[I۱*E 0.w/ɍ{"G--}?˦A3KriǩA{Μ3sf@qWg2Mru#Ҏ V%{!^45LSn/Z.\k76imX}@+6o߼EY]ęQ5Eq5X)nkTG9:4H Uζji{n'G͟}CWݻ(ϷB\'jy..|Zw?0Bu&|2iE֖O^xX [rlޖjZUZժ-Rm~UME3{?VX/>^*QQlmGכHNhcZjBekv(E\A1 6q$M%X: /fuF;:%L 8:2G G 8/gDg0v`'8'[~x#k\7Qx==ML#+7{L#̥qPqBf<D\P8%/oKuV@ wC(JXS34q%bh.rdG~! ! O8*RPψb/ :(%Evp^A!/ u*AI jTŪT֮]U \ @%7Fe; X.hEEܬZ#y= c¥J iNG\)~|B=DX srgEdgϏB`v==ʃy?Xsq$E[TxޞKUڷ;?Ȯ_)qK0˟Dz2IRn )R\eM?l*xUAoEVHQAK=:&EPM(@U[.g{ffסT_NQU*.\Ư@k'ꡒ%{g}?>Y>90e^`Ts?pGA~F(ԐCM;.}pUZ>5 ݒ/9v&-keӬ @mmͲPWTYTt33ڈX3y hQ|XxLcz#!SQaqSE<>ȵU' GXZu3YUWL{+P'e2<-Pp)Lc%≛GꈥZT,)RF cX^hBhI8(2b62ʄ4U:vZiϻ6fi'@KcNe*..~~;>m(F:L)l2Eœ'w%J=\`3HW7PYuh9iPT_dKpTr',eݬa}'.*Pj{z|R-hM/wٽwggE("KtV;耭1 jfU ~y{A󤓩2z&#X EkDu(/iY = qX]OEB4CFͥp;llϛoo7q sqn,槯k 6'ϛKa"tˋaNr^b w2yey4v0'X WxFv2ﰘt0hAq2H1 ch3T{$)kJ&ym5'PJ[UtlFlLOr5 Tܞ1SIzP[cxuTKo[EVUb_Q+%mצB{gnfZ!%Rt@vPr+-BX V|3v픪 /̙|ssnZW4Ֆ|ޒɬ\m'vmd^إƋns۬.96^sn gג^)z1DՖV>lrSR^%C/9RoP<_zr;,#84Ad=l*e*F25Aۤؠ*^jBR8%_ ɨ{. Нl=SCCO*UGH2EGp"#H` m>9x0|+7_-4F;\5M_S?7K;~G]T:erUU .`ΨsmCз3lyj~ Jv'I4f$zPPe@)!>av?}靅YF\{ڭǿ҅jl["B!Z~U(_Zlj^Wp X*5kdѻcb~zh1)<#-WZN|04>8!o+pi,^J ר(orG/.$Y$sff{8P2>yAG6⸧㕝z󝴽2y ?'fhnN>28.EQ Ҏ٢R[p8:\]c8SB/tjMdpP xSMkY(qp(]v!Q8~ B]u{E{] Q\HVz& fS]%W6a4ͫ9k~mfrrBSzME 1!>#gnJfp$!F7x0@_-XtK3+?:KŻݟl\gIۏ 2X RG]{TrEqΚ`߄瘖#O,GrX ^/(.x9jGT@NPjH5+RxKTXʑkX{.xBe00Atss0Ʉ5h+>52N]ݺF&=%RX_(Y =i(z95|62><4̀H;}>΍Vfҕo;]:`uN& K[j[1ޕoT~tg^XcM kiAUX^tetƲ]^-/?oS5=zLY+<}%RgBt bܫ]겤91iȆv2!I=M&ٰZ#2yB)Gd˄hTMźI#iӝGThl#QsEENI 5q2;hDմ s\yf߰Wky&0x@+/\-|ή(V^2g#枀c镂Rs$@5~(4c?»0.Hۤ8Ou{D)kk'{cUljgz)*?twx{;v^JW V _R1w1PtaJ;(tZ( 4r> i&$6S,[ 6EWMȸ0+sw|څ{!]>D еX̃Pݩw!4Q\y|zs!egMUl锛?rjwoN"lFIaDGC_8]h7nRZ, ZSy*8jͶR3#Ŏ%>DV%0B QX//6xWnG+ !%ً8L6]`łKLqqO 79/|X90,zP^y] 8vWW!. FE(4x\ZD:<;gWnW3=w-]b=7 h >Ky$dOqTdt605x*9wla vu {TeCW{XbLT4JYvUy# YW0aZ!⫗#3E [EQbtE[Л_-`c84\9Z0v(?%=W<ѯ% f?qwL`taQx6rsgkMmVCpj5w_8RPݚݳ9Z흚XL'j5.ӊDh&}NҺ.4=ǚOv^([oܣt̠~]&m&cҸzr=,K5bNq|+j8F.Q`j~˃&V2 U0^] U+fPrFɷ&>[:1вgb" A*]<@+;P"fe:Mwbu<~2~b5lcv)Unn^QmW/o3IHsy*4;9NNώ_]RgǧώOwpޣOoղ{}|VJq{jCvênq~աIq2tyrd9|@& 4Fi%<Ϟ쳙-\m51urDG9S)ǓmQ)%>eW4~9ǖw.7o9IEɶO)P=+.x58qM`Llyzp!2 T%5ʮ%)_cܦR8^Czs"e`6pOJU`%ߢ-gD%)#YͻhA߀\" T2aӃpOH (*՘F <6|2Ư<{F*"q^XpEuhp_v-?^y5K!.y8ALJMm.`G$k|&Mu%[ 8heemLO_61ۏUSrLO D^ 1M+v.qLctcC8g]ǃ*ZnO7MQI!R'rݺ i1OF;>{L]\X\FQфEis U >c4f0"$52PoWo\Y>䛃ݩ# P)]쁓Um$Ejďk*̋ϸ$%&tޠPx05h+UtkCNcVȓsv"7tn|_ƺo<vW}zm0{;.9nxh>23.‚8HRI6I}uV\FyOSRb D\Q mpp;X=;gYjZ4xuTME!.pBK*"5Y%lo)vܙn?<$p/@C~7~BP5BnWz_z}?NGa/E?BbxvއV흴;~<?ov[ .߬'=l47_j|.Sc5*56#16'.3t'zog'tDEBGq$Z:*o\; Z# 䝭Ry+Cb:5֣CAY"pRT9/|p0Pv0K[hQI#33UF  Z§R*2Ś.+{c#DPM2JMԉND(usQTdzO-ܡ)V.$ps͟z:ĢbYfVA wD]>+i1Q/*AT̐g#1%U~oW(H`KO sСrCyHnlݸP_)6}zm9)^Nv|wi)3Z*aI2ˠ^-(=r<و(;F7ӎ*SHZ>ZΜerQΧ2 ,@\lɧe0 T'@PZkwv~C1L,0k훟ݮ'4$fRP4( , sQer@ y*Yw1#5tMVT"$3޳hrMcH !- NlGosRxUoAA^DJd[@H(8&Ʒ=tC(ÖMH#ZZ$z f`7yng}3s^=ѝ]tZY/N@>ǸR..6<*MeRJ ˊOV37~ty=-4ueSXpKGM+P#APE G\d"`Lz,摊6gQ}c^7܏A.K2ᜅJHflpKaTvA w5*Ծ >#Eo٥*k,Cp}hOuY QN#.Q,_(e{AzdݧdP42>1PH@`̱ni|[iʬ5bg,F[12- @X,Cq|;H_ >Ot0dhڤd(.~0t9Ut"10@Ģ;6k\r(_jW3遤4N7ܳuw6Ss?gnnmg؝\[=8ĖZD! ֶ(]]hMKPAL+uAW}?= U&~^#7X ݴ~w!DyQNnRې")=*hGd5?ʚljA eYxTk\U&2.\ ".b<-4CmI6%.ts{\.\pbQFy;nDϹoLB7ar|3k[^ &o`ߢƽuL>jbh\=/RhxevG7sԘ&'& VGsh4A)cG]?X#zQ);" HB6qjaO! ]}xe8PG5~6O+/҉@2ԛ5/ߔ >x&DсUewT`%jSbVSm>nVLUcڃs/im7;͏oC8,Y~K 9vO%|- 7ZS=螐F@tMUko,~p^)ױ΢ "uNk';{?]?Z( 6F+orc@VFg'2OK3:h5Ag@eBM/}0 I&*N=JmSS{PVD)'OU_,1Q((c:]YQ= _d?Nxx}TMoGeɡde$@V AHNBMO騧kY9\/R"r\9z\f^c͉˞>:zE1쿌iԏDg37htCJ~:j6аyO gkN-\Hڷ ?-{ӹ裠ۅ3ʠ[b*]uj8?ߩ%=e&ď]!G $WNj7lYebY3>LEam=S0> FvJWj ):J'0Ef}ͶX1iillK46'AWY@lЃ46 [Dل%++!<#MeI0XD?yOb"H1QQ?mȍme(yB|ڿ*$IGg)FH/׺}؟ϹZr+G_X>˽@OK@#m 臔U j M2lr"nbg8lħ#Z)>Ht.WabF1d,tGfQ$O|Zk~9xy4c3뺭FPn4럾0Ka1Y)d!xTkQ?E"(MWJ,Zbբ \umi$)X9p ԡ\xu "{ :.Ѹ.ɃĴR_vl) x#9iɩ _d!xT͋Eg6.AAHN".̎JGVbĬF{tuUSUaFc k =^ { 3y>w=|ca SV2'6Cu>1";@ӹ gs#gP{j_6 Spjt”O$S17p7bG۫6èSۛg.t;ǝNc7 #Q_rV,uyhRXMֽ:s磏pS!%0V\M~ 1KH8nW_l=nݘ΂U}J_Rrw딛1w: Qkema_I*vb$G,*6B% <̵uQnEӭ~5iWa|e-QC`\`+ăTg_oXuBR8B,dp"H;-{帿]rw,8"r'*^~RSņEI)dWbaQ-E`WO/>~{Yp,qĈ4\Jqi\bDŽ{|c>LAyxtC+S֕n 6 (+R5i-@o☫铋UxfI|r<uIQRJ##IpP54&"@:DD`!KG")E}IaF$Za|<v("(6s:i8 ҅Je"7Vԕ'Ϋw#;7 dcZ^k#[ޙo(njr"3 XdzƧLbA$z^9',A3)CK<16 yv ղ{Cܜ62`$1zjap1!Ƥz+=;Q1N{/ !,POt=Hz9l#/>@[~DG^9xMoEe'!8)96Rb+DX[ĒF6v@B򥷷v]ROg!53$~RqfC"q꩷.?GeDYZN+, yQ,)9NkeWЮ˿2>N7:fkVtZhೝ(AV[GMo/"QZ]z2ޣn׽wtmkB|4uG_nvώ 5G޼ 1yA`ogGUy$T0@bK| yΝ4-7*{i^M%NFg2B>(.]utTƲWIW~nO-o\sZ'Ԇ+y6V>-Ǥkz>+pXL늄I4[[:&QZ _&)xV]sE}_Ȭ`E QcRTԲޙ![=!1hDJPb +(B~L3/g?&`IA$۷o{VK8D>RN`npy8+o}7XՕzoǕwKb TIkx͸dJ氒d6$S{VXs}:l%_9JppqߵP償;]w=[_&+C_Ps/N3[Y9+xwt>?W`蓬.|eTAEZc]uN|:f *oS y0D oܗNuMr[!+_H@qN1*5S.=_|a:ix%ڭ1FkE1n4:^8Al?>z|`!׮nXp8ب5JY&vw>:)3p\^)%W heJBxrrIw/|.\NWrLdD8*HCdrD2^ g:o]^nݹ;:YxVG utNG:/^iXTO|W5TTY 6#uC]PnA07?LJ jFO8 Vt|UGẎ讎ugttss4 rDH$W`[z*L&?@o@l..㑈6hWtMݩ蕃;Z6Bژ0I{|t=8b{:Y`M1~)feI #kBgm'/:KǀHAkr1Gr~t?mAtI.膎l~JG0a|tlb8>m"g:xCf:oR!|48ysqGmPg#HSBgR"U0R&*AA窘v5󽢑x =,$K+H4c!}L /vR%!(&{ս|_N'Ɨ#>5@X; t^Dᓃ)Ȏ<חXa{* ǯ}" -3ֈiln%ij./ f>Z 0Q sSPЙy:vO22Z*c( _dz^$0e=Y|Nkuq+~7Y\9{oݾkא6L)KYlcuf;xM@ oފ}x9%Ț.|QGߟg'82xeh5í33ZS+ lﷰ*gSf]sKm Ιx-`zCT ? dbkB'lꑚ7٪rb+0I)p=e 6Y! P8Bdfz eϞ;'KjRxSjGFm %\vfe-acR0JAzj{[=tLb'I5M^!|Zt%nOW}ԼͣOn\C1U)?p:OwF{Gntk+64ܺshz*n[N7JjKz~fm斶Gð6Nʹw}sMTǑ_=RdW0J[v˒)|)J hvpGآ\pqNszxNkPhӂc2dJקS~19.d5I?tf0ONo6Qa\ 4|ɿ!h~Q}EPPu`CQ/.t>ؼ"6`{kj2Pe flNu`  e0%xfT<^O B)+|c>h6P7kv9[,Ja[]6.=y +K}]khg__nWP IJAҡqβ9^p9MW%!%jLإaf 0{vvx6*!]!i6Ǩ7%ǡd:(݄Y jg $@MLUe[!cOaHJ!>Ļ?.nwW׾X$X7`9OkVf4pr(9ePoRxDfL0WR]>-=S|E( t1U}j"LJ~LF,84eB'ڍVtxSQkUfkbEDB ]gmڤ!mZ5JIa!ܹs6{ν3C[? B@y/>>?ܙl Zٙ{w_~rEH0v(MVt^.»6{HjoC_(c%{Rg66RAhrte}4krmH$Bi0wV2 l [Jns(\Wwo5At%Ʀm 0NVw..QdRqiٯ ? bl(IBᦈQ(屩ݮ~:ww|z鹿m"Zb8pW_EZEs@[p6&B{HcAܯG'rG7v`(!^!# ^*UZ^#OndͅL#B7 KQT( uOBv>! |L˔uk/oUV-T2ReLj9l 72Bǒ(^֓gx)`+Sǝfu/g"!<U"f¨q}ZrFT65'+YS 7;]L'[tH\LOA?a$х>Cbb)?xmd̔b@`}&&K` bg5Wz\VP>Nx0clkv/<|L']y+.AYhMb "'Qߺ*{}N%SG܆kx-" Ǿ麂S|G^TA{ T^|tZ?>l:tpkwo<ΩJ<>s,(a$Y9\oV?9TRa.HWҔ?  eYPiiRNRM+7NW2;vHr|_s"rRn.a3,PIΦr4׷ʳ՟>8C3ۼIzi)82\_G[̍ e0EfTkt=6Ѕ6NËT$$+`Lnb" "Ő2SMS SMɣZI0|s틧4Fg쏛g_=zp)g)]9zB>t+ Cv$u*ȕ K ؏$'$2YaBa GzbRG4dA\xP۳aTW$KW AK`4 xǖo=~'IaO"B%Vc/O6^-_9_`ZHw>zmQݧO6َ:qD,Y&>86ncu)+UD[6u@] Gs^Y7G]xXܑ(7g8kxUn0}bPxlBURTRسN=\Zt'sx.ɟweL5Bb9pP#xa۩@7p/!aF< s&RܠGVxZcUyD>b/ c,XJ!D!m1rq/˟tqpv9aAn ,sndFF2d4c&ON($C=(MtAb)ߎJ5'BNWQ>lTUGA9ܣNx' ˲tS+LW< >Nbo;)`?Pp _^_OMXvD \,"=h*f<ԘOh$jnص5.ǧoY(it3,V} ;.gZ\x43ѤʖKLʨ0M8XAʮeї K .0G ?mNq،&<ȿ?=Ѕwz   Kެz6$x) x& )[|9;s6QOxxλw1)N9y  i%E % I9) Eɩz\ʺ*ޮ `)%W+$)X'0In8q2VFYXM&ntxƻw1#Փ2KnNaèW\뢠``fbS&`I-I%e'g޶x #9jx[{glɏX6g8cרx340031QHIM*NMNM.JM,IRyz J1y_od5U!ÛTe4/ \a! {xUao8_1ˁrħ6R J$vZe>;rwR$H2KG%Z^05, gG+= (Eck)UL?~ J1чֈQ2ۛ/4g.jn|T\;jpNVW>V7*dx),6pT6TRTmF7%]o }&il(Q\YN g'vKv@>eYG4@fNh5&.7tq1&j>s!}0nIBRK*U:߅X^52lج)sZnK) S褮t5y@Nz=fTBl=9+JidhY-4!̃'¿(]nA̒;&=U[0%G .Q1.&څZ}sL"]LZ0o?8LIL_FcU9f8Xu>)%n?nFӮO$װp'z$y4~k߇4 YmS3/yG/8J2 D -y?'l[v GXfi!3߈hӎ/D9pə HULP^XlUcd9/-rYaPW&eǪҏV0 ؞إ6t{sCd_!աBӃ1.7á9aE+K&a4L#!flEhz*@m>v#\(W* o.O>ehwB1A/ !kUx{B$f\ E)XX&b9k ,V(-NMQ+I-KɩT(W*$)礤)$)UNf%=xZmo8_AwX{[n>$a;+P@K͋$!f']`u%r8yfQz"RB6?V*,s]$*Xwm\ow_ě_o&19mtN[68WJXhJA*Ҷ,ЅYtarHGe\;% VA|Re"&ѡաʬgS8A冴Xy-čdYhJ}.Tnw:K З) h|,Wm\5:c;ǭv{tUq YV/ZL/rr[, Ѹ[.38,n=+n"nfj%nK1r=~,acb%1{ ƌT!ub-4L"O ~~R{d[+V7|/t,2S XܿP̲p<\a`7:pC؂M|suu9J<&^jz=W77?^gq?uX}Q\a|:ˎc^q^R:YodVB& Lq rڛLBc}Lfv٣-TPw EF#[ų[o"C1(^:Cy͸8!Nb 8J&}IixlIN3 8C;B" x#%JBDJd2E!7-.̢߳: &bR`^I$77>puܽeq{=E-IaRΟ#`EnOsv[n4:+N)L!6ț;ѣivI?OŗϳvZ8 &2EZ  eAȈI"2)DdYbd$=; Īl,dQڶO2)o/ԈXYm ![,8νf1k-ɰe[7f$%^u w'w U5ÂD?z7CC/\0Yrd7 o›TӪ2_N°ꄹzð[ iBݲ2((jckW ^dKJ kɀq+!bͣ娖(pSlmHjlNi'sD[ʧ*gf-ՙEC Ru<kcI׸z, 9/9jllYx]YvƾR87bz]J)̈1HDɄ\>{]Pc '!_sgoNC R*(~D =% 'rBU4vR|lC03rby)!"%3٪`2w@0h[QQb?!ݱ T\*$}`"us /QXA(9Q^J?39Liw|6ֻ=cffTau؞DnϪ@JBln&%J쩻ךb)۴cj%-s9:XwhEey$KOdpS[dC Y0C"*i `WYm O/V?2i2/L$gsg(˜[#065v6Gg`YN&}(ŹuTDGHB\ضbmw|J*eJGm rQU@ɳYMUa6y Q]xA*#&I\-|aKd/\`<%-=Bs[ܫZ2>• _N8>G0PHa ;Iwz8S.iW WV|"}w]}r/5&!c(rGͱ25hN .m[<˥&îiݙ/uwMOT> ?)CQaFwP zko\-s5MJ;7W^}nul/UPVW|rpum/@\"EI>d4}b`1ԞNI=s%f4E0G(wŮbd+h؅iR!o˼I(cq|/e]igGUWE= -0sCQ o0wL=!ڣV~zvxtX/t^aSPKbaRA ϒ:+7EgoU0^,͌'Y ` (U;Nn PO8 ˣ2p?tSkT' v1ӐPc4mAfTx6Ic/)r՘ ~:j騌5aVln8IđYTkh30b뾤0TIzy}1ssèTDs΃:Wt43sjH;yAS: &?M]AIw YIV5Eu{r\Ӹ+mv3=Ggn%j0hQڰd%<scRr*0F2u8͵Uj~);%]kToӫ?4 I<* D:1$C#-uۯ8nz6AQO͸$]:">[-۟*{ؕfcY٧v-i0U3!㪴Yw,o6TˋT;&i1p }şAq 7l nh֚iv9}c2&fǓYj:ռ`D5^I8G`6 `x340031QHIM*NMNc~oW43UnrQjbI*c]dyѽ.hǭ "Ҳx}sF+ѧ"QMnQRWNT.INjW J8RfT:T%gpUWӬ8\n=cI:Y\ttfΊ8VPET}âCg/ª?Cf˪*MY]ΛǸJ6aUduSeUaq[I6x*b}ʚZԬ߿~ǾOsv5ͳ{ҢNY ->M`,ndegfb봪o\6!X4ѮXjCu5&,+}@clUW @Yo]c?]^۟, |M)-yOU\sw.ׯϯ7쌽=x%{훫1GRA90I8kpրYx°l xl}FjesV͈=W?P[]}u !_A@Ո}W 񌱣G8:fz/.޼f4˪U`+ 302T~}C _UXY_e?7W]FQ5ef*ϳs/G,:kjl:Mm.V)fl8ϱT3 y3teLjCj@(f @# ֨VY-DyA`*`$*E@(t1z |h]I4("eBU ]ESKMN*4\j.i ڬJckE(f?Yc)+$$-,b>ܺٯa`b$9 ( awo˓Dnng22d`B-%j ToKZ,А/RPsqA;Pě\!#-a]X#&\"%E:NT0#q~\d,w3H#$zOF7g~9:xvKbjz6d[ ,§1Tҡl: jg8X?+q3jMM%# q%wU # FRuKX'xCwT%ZN#"8ݩ$]ԧa4bZ[*ZL!ȭ,X> FGM.C1,qU5v*]$?|p1ayx:xk0n 0gV?%(^ݞ- Y9(A+$n:V \4x, ef$ +9D+5Hdp7`Ų9Pz!Fї0u$%j$ p(D;Bʃ]jF kj;U:gi a  9}KRSel:p%~Kkqn H=* "X2CgHh*^x% ,܋Ԣŀ}]$d'읹I,+Z;eàR7Ƿ߆~ʌ|@W>(ܝ.Ϡ[u@qFn]rO(>}**OjUwz8n(lPpڜV%hI-MwHdGKp +M"0:'L  FR@eQu b!6e#+fxn%TFUq3-KUp-:ӽTNMW> MݓhTvXa\"ń_@ĸNtdQ TnF>%,֦z܃=JC/"&|q_4j)%[ʼnP 4} 8TjШ4.SZ' #&] jJKj,5&o:a9k2tT7}PT2r YB(i])Mr As,EaYЇK2 &"ƵQ r nSÙIW smJ>oks9Sc&BglZ4y5Ӆ)WG'B6TٕE>9Ё1(ySrXi1%è *Ui]w.H'XMkɺ|Hn9a6)NOrn[e=8FcY!]:f "ڀY}B4 Y*+GᏲckҌ_f~Yߪ۩3%ުmT%aǎuz ˭,|p4e2e,M,TCaϢeFO&LubDHɂQx8 ͙G d0$GHGQ`1`HZgh_ }e%`).]V^<@IiQ50rGɨ~bRlb ܎ 1ڑ+=Ѱ,d哀沺]zBF7( ;ay%lJ \FĬ|3"۽kHil cb)< 1,ߌC6Dơ9Fl kĄ̡r@|* H?ig@ҘZP|rQj LXKͻ^O'rh,s{stkz*u 'ʗđPgP}eW;z!yzn@(ƍq )#;ÊQ8c8$AƂW?uAf?"#[Y}pEP2sWsMP&gz޳=z"B.]" _wnj|gOK=>U8Ud)TϹFі519UElN  2o,H¾׳7 'gFXWAEPVm`'F0Py%.UPW W_ŨT+}  &!Ԍ *>"]حIYkIZn?!kcQu6/W]:9H_`6o⻠QŔyԞA#K09-{ȁ~VSZEwuZfqѣg␕@ʀR8qy(hNJG1p4cqNnX,MUB)8Ag8ݦ UMԗָsqR[?lh bل/p־ElL"/{ 00%@'s:UonNL)9<ϥgyA`AǙFŮHCM:ɮ-8")g+ >4vZE<ņ5JqRhH8ϋu} ;?$վz2^±1/Y9- ڌ@I&ީ @kǗTeUvؓHE_鏖d\#@N˓"<< 7ld66oZi[$RVb9F PVC͉G/ig"L/G-FD,3qFH|d4w,!;MOsCS]ptk_{uJI>;sܬet+n\!_M :̤)'`![T/A_>KXSJ8MB?& oo(kQtS:盨`8ȉ5q>uK 7ђUzcōmY=cotR!Y1`8I*3oM&+D&w/ḧ́֠?~ytd;]3D&̱xi;VA=?#Q/gg?]:չ^q$HAcT2twQ[C Yi`~\f0sw-S;c9ԈJD=N|J: ,W䍒sHױ`6$j[ߌdƠ3vWo<d 0sI|oN1bЁ* S u!<2jX!mh͖X׼V^,khS[&ٔjފ! o\UEP~D?4r}|LؾH[Iު,҅7NPndJ[q)T5*-ftƮE힩J̽%q.a D݈u8KmP={cCx8P0sk~Q%h{LgBF +eg쭢(~0vA;[8YUC ]j<lK< |h. #b:8Ğfq5  rE'#8΃o5<*9VU J7gQ1p`YjC}g٬!Fj0X6 oVkHi@{ x3(@(wzs!H QW_a>@0ObOEo BC@U#cѹkɍ"^ͽA {Ti7E6|-(Xinl=cV-^N e[ fzYf[F0{=l;1栂4#(Z(<1q ɦ aPb~M`  UVcD3JI2s.Pt7䩀O A!;6h ڠ\-}M"HZO  - 99x K,}BbUljٓwn'g(HxsTvZ:08+Z.ey; u_Gi… ~ ,[Z%^-Ҟ~h..09^< PEtw[B4X[{[9O=jut jB$']GG Jn M<^L0uN˄:M]>5@ okŽTAI!r:Q0^75xEF/n r<-'~ٟR`-/Uu",~3Hvf a ?AG roaPZrfW[,}8R7j0̞gҎՍZ3޶5>&%Qb%#wvE~찾bunitҀ FƔ6fEʒsJ}PdP I/&[cĽ]DG 0OվSR2gh7"Φm} ^Fa<Ց+*;F[٢*1.bˬ2|»ͪ4K{k#gȎ{f϶}JwS2=dziRxctNbjֈ\}Vt?,0` H l%r,Y@~GEU#8 d8kz*wu !*E*\( ӑl{Y0+b̪iA7' 6ԑqRt͂ofFԑq:f,Czf* ];֝S[iOݘ0K9~RyPXNDdƮ9*C.$+fEݔr=F됃yw uWzkU]=O~]mݖ!S@H.Pݷ#3 FB ] .qrve) q/D}jk?v5CQFv ȊAY`Arŏ}(vXPq* 4nD~Dw˱M 3B|OV]LUG.ѯšIYR8-68I kZߨ\Gnk7ztLrbņ_ p:Y39̳|}c[[Ͳ2uM&hiat8! ﷩Eo4S c7-ɲk0 !WhV~vHUzroe lssɧ]`+Eҭ ꈥT#O@Y߾ĕ|$15Ac>܀"5)Gơj<Vrn 'J.H ~x0 GlgK`FdFݥԤI?6\n7-w#}aZolE8#:u-~Ch+(Qg> |C. xݘXH/e,BMEpN~H46(v8z&|܅lı@S0q7:r<4M=Qx1",M̓wr,%e}^D;Pk$W(ň5">c buv>k/'[17ZvP0P ѹ}T⪭2cJI J([Ts~J_IQ{qzmg=-ڝV%[ z {콹 $]DNL-wF_St#ʺ)0~Y~k9Jt(x%bP҉O)|@%?[UKչ<%q?뷅ו{.;DItyM!n<WuuXOP}>wwIUphf7:л.13BC}Y7z8<7ɩl6ə^Y§u[_ FۘMhi^49-{}V9y>?B)…pT3ȍʖ'+>Ç2-fj)h}T._|+;tB% ;M \*Bdua#!PJ2GoOp w]%#cEI~Əѩ'⢭SWS\$uZ0UIy(+:ӢNɐ//F%V(W0E :0Uʹ@=Q+N #ӛH-dJ3jErqp?Y2< 4'c9bd/?LQK*WKC v|rE}=:)u%rk^&w?lilZIQ).v{xrwML߳ -ŗ ׈t`*`I y0\xO0W ֓+78AD=:SDطbukw4ǂ0[TG0"vZ쐕Z[_1pCf8GRBAE z$M&,N&X[مwMfy& cc5[wc^Lk^]l^vy5FO3/KBGf dTq]8f^;>ۺ1(n]f2F^7#{Y݌R3i]ZeXZ6p87&MǕV'`QxxuSoFI"ĮDkTVK6YkwfĴt9TuzADTCR8 q /#Wn,~~7{?vOǻ,PĪv^<1e;Hta֩GU1/oD7}+RE/HwBS@ML巉J?g|x Z$\EA-9Ɗ;i9?gߞG035B}ڝ)''Ydqc*W.81, E_ylZ;!6X5);uWoUO[od䛝TŲͺV/;=h_fqռ/+hYz2]p@>,X ,[#OS)DbRE$,>7T.*JEW=.O.~s(mhަOe:B_u*A=9VQ Xn?ԣ<$9Q<1bkxAU[;O%$jE|#2F$Q`2ЏK#(_Ea߸]\ @xKңOɟѴ.֝wOg@Y4'wnMlQ@.Z]s7咾*m7<0TuhN码Y|O147" 0 7 HxC $Snz%!am_8ܴI{,|+R?no)炐a䓱wX;sDx}So0-d=$ P{dNK69Ll!wץ&]H.[3CMH59. +_!;=(q_&qTvCfL.^Cz'+ר~Kϖ7!]YW0MHMAYUWքa:O>l8oG S](uyFbIk%J€[p,YSMjRtXnE1bHQ|6I5W!58ԹA*+7"}@2:.8. 'W++cw%Fs~hځѪ1F /w!Y+HgQls1FlQ+n;bD©f _q\WagaJLai>wici1/4KfTy OL$9SJL$ gǟ CXKX<8*B(mw*~?$"4U2Z06WW ]'Ikِ2QXON9f1T-˙ LaHm9Uej\i0|h M At d""w] ˼~y КFT$4B4z}³gn[Հr7߶+5d4`jƣm*w q!vk%T$17̴.n0PH_+CvVH &V0W,4v14y=POA ŵb_ZCGᤙ% pOe~2fL)tBRHiLfq5Ks2UO|+8Hɤ_>˗Q9cf,*ֽ'B!;R95Tcs(Rg4; SΚbi?Ρ)(nnZU+9huUXH?nPl^sG*ݬ/}hܛO騚ּQ?> mߥm{#OsyObt`Bڧ/94C19$tj,cCL 396d:ȐjRgȆn @u3~`BA!{F,7XD@SDH<A*!scD $虞̒_Xi5x}K`Z$ɋFmn((!CEh6Nuvd@tұkuY<}uV/Nha:yxK]߅jd 'Y~{m΍5˞!GR^l#f9?psjs*'' NL*Q$#;1w X۫r;P <3E ?"$'U+tñ*-qRvCȯfƒ*nOIhkk6Jٮ S7ddLg$ԗ STĤYFd9:q$dIVS2$̖M + HJcrܟ6uͨ[d ,;8Ӝ-άx;aݑ!o-sN~"ٌF'|QMF#'ױ+ddgL^ϔ) "'Mdei$0%mNmMYx&,t(Bt\"[77d?e;xx'rxlruqI Y%+yZp1d,?Kx!of:7HH xK-H-JMJ2tssJ`\ 'xŗQo0P`4P6U-"+[$XuqJs2Iy:ws⢟ *7 0BG G W Tjfp ~GDbRctn u)z:E(GY2B@Dri?܆EaQ\,IjR $y*Kdq*ǰ!KM:O]p{ܹLNGuQ޽Q/{Wyvw27{硇F&>|"$)h,D/G'E( \ 1ꥋ o(ҰYSVrQ UnT ;tOipsG50gG!H#_$6z+*z%5I3̛wltLK=6((Iի@] HB” rKY+U]pYNȉq@r8SUspP<>`61ի@Wۃ.]x|R|Sկ@r>[T eQ\mY+~2s7OeϱXζIg#TwZF*z%WfxۥLdlpMeS8xM0ὧRH G%i!5 +X>4ReE*U rikWĽ?ӵWc{hfA:V*c63CZ*^Qy8:j`@ s#@AD rՀ$L9N 0^9HΉ@ T1&!ACP##_L@P?4#3gj9掞.x(69UTDa l\x&R|Mfr3d'n}0-i"3TLMRK2RRs&3O^,"~Y &l [< U/KFfzP#X +2QCA#-"5EGLLIR79?77?C 9),,0 QN1 Yf Y\@7N`aD9Hϖ`=6BҚm3[8V.V3SCox_דדד= ׳ ` >x; @EUdGUK"ƀdH q0W\i\SwiTVk\/룼w8d0i;KpH W+%֊wX;%DA}兩I^u Ov}Qv,H}n x{ǾqdFLf)Ȱwxpx͙[s8)֒|}I ƀ M_ن Hr(CGnGʧm4&4!D=C0.6AH*{*@AyOr9 qJhxE+n /Ӻ1F]#j9dW:Єh;F0%tJf쬖qCc؅- õn㲛T} y}+iğB<6-nh}nYk7a83t\K|DWzLF@~LR4dXo#GTWM>6cB}ݎ; n!De +]&nBv%RɕTT N`Ӽc7S0R;cPS]|K[ ٫tS*VP{`!Hz lCɓl╏-C8y)|c]S.֗Tqp%qpw{Uxn))nx6O?;koؚǗsU'o v4]pENiHm:ɚl%?ij|v|B,Plq7́Xl U43p>koMmht_Q/C /o򷬊JOWhkIQH6iIX-y&խLXaFí`47`-0=/ forxY ANE*f.7v\;+y ln)lnUsA@Q;ߑIKƗ3aGTۗ"$Q 5z\7-I# t$TAn4bSFg"zRȵ:7-/kTxvPn! aЭ vl܏]fG^M_(YA~j:"Rtqۇdy_n`4#lBJpo9V,Y$d~xn^bEݾ$ O1}P :BuwR$dӼv AZgJ]^d)ٱ颋*fVG<E򭆾yy4ܾ3?RS͟7CN /bhqElp%+y\߫{^%3{C'{uB2 W_ItJQ* D!>aS5 TBOZӣtU`pWVgrMH="h̀e1'ȑ\L!r̸8 &$7aɒlt\7a 94y拶Z,S†x +l`+|IFߕ5\-u5lS[jk m hkhcjkcjӘ^he%ytK(dlh*>utKttGǵtٖ|x /6aRlQm? e+v?Go=j2vggC|8?斨74ͱ6t=v'Pp:" >{}//Gju4}{xt9(#d 7Kxej1ơ6D)M=цXަKJjtF+I^ ~[!>@k彄1|3_}`p8:YdOM)͖hUso;#3%tN'#[U3DUo1 s$&g'Z)d&Mg/-JFXRY { u3BlOx; _h>fV6esxۥFdcYbfNbRNDCق9'˺; x340031QH(K*M/f`dO`sir5)%9 uߒ: %r1Dtf5b?{p}6߁ْHR Jn~roj%TT&U2$ >;u[DOS22KJ$_VwE6wW.||83_tMΜl o K4uS1 j[KRK2RRs U_/^yv>'& xۥpw[fEjd6icC Ɂܖc'RPU(I-H-JMrs52005621*7)!i27'?!`+4;Ä4g5yRd6ٌ4%n B~> -ΰpVpMe]k&x(<1L_rN~n0ٔr `Sx;*LpBNf׉+u '.9ٜQbr c!Hh uLf7ߙw115MZXT6 q32rAx340031QH(K*M/fXtl!>3?(hPZð觾=F!W 6M ~# 19;1=[~&/d&&Ms~sHR J*ܾsB缢ۧ7.(Rb477A;#:IhK@gp22KJn(rg^[=!J3Sh YIkQ0ĒbY%Eqw6sD>xss52005047ֶxŏn@D{ŔPdHn!R: gNVYN{@QhfQo}9&l~ZWFϤ R?-<&LQqHO TuspE#*:B}6zj&GޗM|7ѰϞ徾v~q`xݏCkAx;7q>of Z0%VxƜ-e0sbcR|e3lu Fṿ~ E+$I4$(vpƊ"x{լ M?HB3싼'4|hT^Io)΄>QA50':w\,xss52005047U/H+.ML+Q(J/IͩTH(,ILIrƪ8,њ"x s S00310rs52005047/H+.ML+Q!]ZTZ$- xmxEA 0D9?@Rx-Bݧc7by3 40vjcLLIysIB! BDr#LX a܀ZT4R9x~H jH9~dǬn1=Q 9 H(xV[o6~ׯc )YeņnP,aoEɄ%R .wHINRtEP 4o8v ;s?Qyu#*c?)]N;' j>zJ{ݑo`u?ݿP+Sc۷VGE *ߖތV<6nf[ɯ0t\: ۔kuu}Rt 1G[yPrV@iEI^}C4OU 4ӃY|`i4 5&{F"M7Ds)=~`3o]G*^xdv>B.ZV T|SWU^2y1`gt9mu!KYP( Ym+"+pl;' QÙ 8S_bqtT; @&2Fc%^V/ | ?Ӫ% M_ ˺gm'RU^S)7,ּBPHɛ *KCP# ^˿/8*~h)r8?P&ddW)YϏs-r3# ُDE7 0yYRѪm(G?A_x340031QH(K*M/fH0s^/!?Z4[[&%$13;- Wr:-8N#b`"&5YuDI]QjA~Q [O/=⽻nw7|VIUqinnbQ% Ŧ޽?er3z ,#$$pao_vi6dtP%ř) g헙~#:a%% d un3xt7 {Z{Jxss52005006rFLVOx=O0P#+IKQvv>S8m=Ж'Kw~&-,Ͳ(Obm<pjCWe' j\[Oy5V*o֐$ͳ IP<^xKKL,N6*HI+(it(xOoA )|B4j6Q)ET-pABݻZO=ބ&)$p}~?|nT APS&>q4]A?n3O`1}b= D\pKuWOQ8 3ۏ!bˁk/a8K &lrJD`+Wl=Ԝ:S9m?,6#. xss52005006QHKTHˬHMQ(J/IͩTH(,ILIrFёYlWB~Rq~Nj n3v5x s S0rs52005006L,N6qCOKD53)HI+(Rs#xxmKo0>d[CJ q~4V;#Q} B/3vggwyB{DHт⃶y/yUivڂXKPXwѢR*Y>))%=pʸ"XM%79߮,k+ Hl֐1=:1;'L|¦Ѭ*:6S Q G.K6M "3<\kЁ3ܒ34Fe?U^exTn0 }Wm qM:E1{Nʒ!˲%7eVl(:$u-_Z)/Xxk vgdWNYvtb$wU(&xvs*Pr.2 k|=,5ohVJq[~9qavx*9A2rξ)^e> [CSlD {K_d`MxTWsV};pV-t6-?^*{z3 9Rsc͒*3v[ͦp}6͊9A=,ɭ rHsl4|iV a[br3؟z]$[o^y~<կG굔ĻDŽԋlxwxUz>ЎaLZdv»4$UA&4E3?VG-:% CTnberc}k!tS,|BR~=_eړ܄m;ŭ5bZ}!^W.&% N]Nsy\y9=Mq54I~/k!ں!tx340031QH(K*M/fqXIۅn[uÑ jRRK3s_[:S]SZ.ހ 19;1={ϵ\wm|$ԂߓV Y{g/T}yU?T&U27b:r!LoNӰ,#$f-5%i?j{AwwTIqf éےly~/iKKJ={{p!+5阼w^O/;ux^x͙Ms68uJ%~NV5̚$HD&UlЊ䐉} 6ތ< > z4Q4bAr=|ʞ `Pޓ+`tH.^F 'YI@\+ 902 hS MA_9IVKpzhyRdVf9XSq!mmVe^ ,ɒ)eJ)) @<ˋWW!㉍u03Mۻ,KPy.f<&|$+V+ע?٢V(\h4.LGz|w=̲9iٯȃ@7[,z^NvBsB٨TwϨ c5͞vP_0_gPcid7PA- )@fCXP@dIILLؤ2R~PY"+{eL}5 γ5WφwI}ٝN$cl[tɮ.:Єh;F0%4Y %BovVKɸ!1–EZtqEaކ>ĕw!k7l=~JKʂɬ͵0GlL;3{qMth $EC u6xJezt-lo8J,׭FrKDZ&2!Dvi|w@+u"*+M뎗܄* O&u͝HncXRn^VZ@*$DuUlCɓ,╏-C8y)zjc]S.֗Tqp%qp_6]_ o'oyNm uv.wK?ױ5/w.{vhŻ*yr4/ד5J~ga pNhM^N'w(N$=h3p>kϧ茖6]BoCB¨qח! /o򷬊JUOWh޽? ǒځ6ɟ|1mra;BZGzUSb;6 lA挃v̓DWW8/uFw`^g&ȲV ɮ6whnA%y}gŽ*/E !)(j"$ieo$[F2pAZAuI"hĖXD,ku_ oZ_FJ qT]"/ a;6{GpoQBR-&II&)'%W}^&M O]DEN#%Fd!Yޗ["jj?>\tk2K qXGguw#2hhLp;TPv~24-/۠YR2pYJvltQeS@r̊b'|HГIӈ;l hgvzoG?Z#om6pO.qON5ީzlw,:Z?3g~y8PGJ)r,MLB| jJ @GW u~g3'x Hf2#kM Pfav|N rdM`:0wOaE[G-)ZPaC턅6Kq$\ [ۢi[m-ֶv-11iL_[42֒SFtWv rHЄJhɧA bPB S$ k]u8ж~xxݙ[s8)֒|}IM c@O&iӯ|!H2̦)∟::::R> 7O2M3= l\ $[Ӈ $#}o(Yeִ]ZE4J} C۔"hӯ$1VKpF(8ɼH386Blۆ1ޮx&Xǫ,dY廡.f$_"p4=n.*@^dquBhⱔ)YE/O_Jyx5zB7$fQN`vӓq`.H~5E\9ɿrٛ=҄pcҎ=eVQ#gZ3$}HN-g>^+p K={C}$?$!E|Dl0 /5MW&uxc6q:IYorIVDtZ@6Y!>~,Ӿ1Fո!MCEgsLhBL 3B7+Dhj)?>]20\fM 31!.U رk)Z϶G-nN&Wf"ޖrg r@E@QNDN0OMK$rs6n8ɡ`"x'ay֩TáT X7qPɠumݴjmpt$M7<6Y!Lnpp^dHUb!ľ8 bHҢ+rlΝ77J T%RѕT8TriiQW T'}PQ]]\݆Ji\K[ EBze ThjB9$z= lKɓל{A80p+Xה s\݉s\A7H rl8m8l=d0uq)p2A|9UM?+J+ vGB5~oZ7jڝ [5SJ/X鍷o iteQ.O /oⷴJy嘭]^M>|$ZVLK jIw'M2/ʹTq`RhA|n7{ˌb4ۅHŌܥ9Dkz?m-\MA.LA ]F@'pKX;Eu,_mKk>O_;uGG1"vtUI%`WIrE_KW"9$"p̖XDku_Zg_Ɨ(K @X0j76G`Q ͋qG^NMsRL 48**߃mS =.(YA~-'Uc=+2=Oɸ+mV*5>d7LSV;/fYXlAeKfe1?,LdqGd _cSnrLǚ{f l.[nr&Wn&_0{Q{c)lX}4K19y-zvߕ==ak{8֧֧C}zyQ_پmk;K 0cs^jPK4./%xeE V,VU<͗] r]Ϳ x340031QH(K*M/fx6M9{wk+qIODCԒB S VZ_T`Z4~Ɣ3OSBal8 'I7qi.y\UR ڣ[QH+:Y5xK!x s S00310#!xuPMO0 W46Ap@(➹^g-KדK󳟟wO ,GɄ, j1 E1ւ?Ԩ]`X*wƪp}Q=RuPφPl< J 7ݩͦCz'{g9JƲnFݨG$ׇ˫}0zS&7JPg RӭRG-ԫ,]Xh^-B|pGQUyGN"|Pv-}c5 Cߨ~Px340031QH(K*M/fH0s^/!?Z4[[&%$13!Dk]v)aܤݶ릤{$Uى :_(xu ^Ӑ0/|g_uclI2s2!*.M,d8\qz9UY\Th0/;޴\2GtQb _Y|0lOuOf@g0ʞaַ_ffz{I$3L/ֹt{s+4rkxuB LL!ͰxKK*HI+(1d ix{#xO*I-I#̣x340031QH(K*M/fqXIۅn[uÑ jRRK3s}R%ttKңy1}H Slh0Bo/Ő0jYmY*U"&b}W$UťE &>yC [22KJmR jPtwG@g0Tk/q]e"&]XRZ0_Tl&kO_ݕ,VǦxxK-H-JMJ2tss|# &Ur Ixۥ0Y|lX$tRK2RRst'nALP(-JOKԜȞ4O2< LxO(mr#b;ن=<\}YnIӷxxxx͙r6y : EǦ[%fP$s"*Iu )Y(6Yd"qp;?wA&qY,H'/Vs x̾߷@UB+Z 1+ 2}%y>FmJY)'0'iB \lWz'0'EAfe)9b6fU&,i"Yd$ϳع OlD#0izt>dc\̓t 64Y%K%i]^;6FB7k{Ӹ s0=(B0g"lM_zYJ8 i=eVS#gZ3O4{NAz LgBoA- )@fCTP@˧dIILLؤ2R~PY";JsF2XٚC>%NN$ulk,]: cB|]H&ÔJ(}ZJ a,2 עn S1! X۴avZQ$Jfm݄|8nDq%{e\]19E1Iѐqc@4R^5]ˇ<, !u;0U)\Wv"s5^߇*1PJ+ufMҝynaw“Ǡ p=ws'X9W$U-P ByUk';+[$pdSpDUǺ\p/J. u7sR>WzUSb;6 lA猃v!͓DW8/yFw亨HMxȲf(ɮ647<>3aGTۗ"$Q 5z\7I# t$TAn4bSFg"zRȵ:-_F7R TB?à[I G O2$%yo>|r7iR=hN(|RJ~ \d4?`Jy)RJ[nCU.&ӌ *վIX&dzUz\w6,&.? C5 %nIw ӓM!`{/je+%wydǦ.l?P쮛Y^L$sRZB5iDQlhovzWD|E+Ffs%+\J^5ޫzlw,:Y?O3g~N8P'JKTR% #t(aL(5O+p};]}g>kBG̀d,3X>a~،>7@M` `f`(7! Md 㺉Xlȡ{6_ubr6NXXa[Kհ5jaP[ik`m mLmmLmG[CS[SF/u-h,q,#$f-5%i?j{AwwTIqf ÿ3v?#9x.I,)-fHm|YTP[ ~;w<zx;a}v3<%X2O>'=^ 9JxۥpAxl3&HL^#;08{:8;s"gsO?pԯE+7k3N5ٗu~D.UxĿo9Bdk6lXXL " xMPMK@E- ~8eeݽL$P^xKOԿ FehLx340031QH(K*M/f}s4Pa+5<;Lv%"Ԥ$f0paS`ЭQ$Uى  ~?0mܿm%0ZuntȘǣZ *.M,dX-a6~z$Gڍ\`22KJmR jPtwG@g0;c3޿əMqaG0ĒbCgpM:&WӋP%9@ϥԅlVm^!g-xb8, D ix;aks-53x'1Ne,ad]H̝H\F$=\;}(rpVJV09xۥpRxM3O,(9yف ɾ- X$&/IU(H,Q(MU(+K-JL,L-VH,KUHJMS(,I,.IMQHT̼Ҕ<1 EE%z\I_1L+x/8ZB䃌Γ'2پ'gl `le?M"fP63Dfs({ megrMgme528Njl2ۚm3[. W-kx s S0rs5200560Aꤖd& {x340031QH(K*M/f8n:s/?f62DII-IaXҋڿe;0IUAbrvbzj1kO=>Ls@lI$uEE% Ls)m*3尹Xv:IUqinnbQ%Vܥ?eh;Pe%@%+_M-KdVP%ř) =ZY}rYl,u.I,)-f8\ay פcy?x-rp x q 5200560 ApL QF\cT.^ST*kʵDXdfj&4% Ah՘PGɌS V.0t?0y%>|NP7Mw&70͞, 9< 2 ^@Mwf$8*HB]t i>FXNd,adDȑqPdtt!p{ ] Q '2 zHbxQ,v P +xۥXd Kol8FƆ&rCwBZFG!j##4<:'T5W *m;Y SϹ !h<!/Td*o~ ,>nA) !P3X!Q_ Ax'kd``klh19ɒ$2SEDdAFs>$A#ɁL7Q7ňc! LNF2de7`dє"+d*[ Y/2{4eʺY.+@V*s^})wv {HQOwԴrIR94WiI΢u6,ek֟dYjn@t5 7YG{<dAvNe,^c,K/ '<")pJ2tz;kP9)'q3E;CɥѝHТ$z dTXQtEi\Ͳt5床]ps0 !"f\QTqm],TeEnn(es?ŻotᳳlGfӟ7sVQlYB <.ɖ/.8"gf ]|>n.{-]-~Ӊ7-6k˶%kE3x> :I7ۘ4JՅO&iA6KilM۞q4Rzp&KW/wfFS_UeԲ2 ;=`:F<;IU-SBh0 rK^6.ny$obbB]P6pMc [ߑ"J(WF%9r7*0[b(8Ѷ6ѓPaK$W r\8?+ #9#tߠ7c3J#z 6:G {FE 8M(V H%;@-(؞P|-̓iiFiNŰ-3nox R%?,񀂑MgʢH F2N Q4D٨CIsB\te2Yx\l^S ^{\T]lhz)G GwjΓ;=ReF:$,Ox.)2zu![I}k{$Y@`r3:A_|\J6Wr{PCd0Nϓ::f $;?49T@fB|0&S ?fkVn'UX?\>Xw~5!tƣfPd@" `Wl?L Kl&f `f`(6! MdLu[ؐCHlnQoc;a`ͨٲ0]Qwi [p5\U SWրHY+k(cj*cjZʘʘ475|k穥[26t48ytK:q-m%1[m.A IlXb3$6Sb$2.@c?9O2`7OP^'Kn'@x]On1 +BzI*+ %U54"/%ޢa [e;3㙏U?ܟlӄ_10f}y,+ӫEb1B3|_asdACOJUA.$3A*$q*R{i8=!(wگg ewvX4%])`3|`fxO=w|;S嫦B`{!cp6I 7__xTn 4FqXFc+HMՋcYݥv[;q6mNdx3 }^oZ'{B;mjw<~e0{y]gW*A]7.SҼ iHsy@je;Qm&' ) bp3D>}*Ch;j)bY?gtCeVy5ɸظ@ЃW[b-/^)fGF56ϊD){_DMUj>2ρf<"v]/xS5B P t8*3H[ jՌ$k~Y- =~B|It7['O4evwL2ϚEԏGO8Mm$HȂ9_UyBfoKph/hks044$[|VT2^gJUQ`Cvc$ߌrEH=C V\5*}M;2[f1sihu.*Y]~H~2#Ȟ3cOrK;gQBʺd>(4VM<*U Q*;[=٩x-˺%q&=jRב/-q gmowt\UGx&XjSZ (YF_XHȜm+4(?yxɱQSKK3RSRS2'0Jl>@x `:BĘolmV|׸`N xNKsTB r:g֓_IW}UX]P7M #a97SlJج |$D)DxQN1.E]uiu1"]TA XTVXd@HX H`ϐJYz=q?>Xm8WhZV5# Bit rIL ,%b$uCɪΠ>z{|0H(>G!Kaҩ҂2KPi%_GWzP::RvBќEݚiE}Er=ﯿ~_eN<r|ټyBAi<_>ǑpRwtfMj3ˇϟƷa7O[?7(ƟZMߗrJȄ"L==PcgQ Z "? @[cQSXWasұh8ddEX|8~c 9ixŽ}CfGf;ɝ,7'gHx 10:kbC;tpA,d^p.+ ɔuT*{vpMNO64Jp$@G\~U$8x4iގ_}-0qCz (x[eW,үZ­N.|S\ٔ9K =x4iu:fw*WH[ O x[eWJm|u/D,8l7˖?9޻ jtx{sg΍Bx<)Ӻ)5fx|7K~kr&kghRQbA e>v0YSOn{WۻW?ɚ3h-W?{dd-R/_BH턍nd-nNa?}\E&}:*khKKpA/h5d( ex7=5b}=Ig4LzϽ]}&kwb<MYalh°qsZULL5~Hf=6>{p_ < kQTb?qƤ,UUQ_lX,CU"ޗ<,zGx粘%ԋO$<.x[̴i[yg~F79s)9.,h2#f 7 'xۥKa2ԒE'[cN`\g0!BٛbQ,l֩`wpElKl/`ڟGt18s/s7 S.fŋa PzxۥLdlpMeS8rxVM*s0HNm63O,}$h<ݩ100644 sid[n>Y??OC  "/'D~xۥFdcYbfNbRNDCق9'˺; 2x  j=_wYxۥpw[fEjd6icC Ɂܖc'RPU(I-H-JMrs52005621*7)!i27'?!`+4;Ä4g5yRd6ٌ4%n B~> -ΰpVpMe]kix[̴iBђjomyh/ mxee9/d`"%Nnx#*dM$Ԇ`-=n xkbmb9/d js5#;#b0>x[̴iB~̍',HY偉3f@UxbN?DKՐ@Hӕړjyxkbad x[̴iBHm칱^n\am[rʼn3> $xۥ0Y|lX$tRK2RRst'nALP(-JOKԜȞ4O2< LxO(mr#b;ن=<\}YnInx[̴iBHt] Iͮ6lfq\gt- JxۥpAxl3&HL^#;08{:8;s"gsO?pԯE+7k3N5ٗu~D.0x;tiB!GIp'Yy j JxۥpRxM3O,(9yف ɾ- X$&/IU(H,Q(MU(+K-JL,L-VH,KUHJMS(,I,.IMQHT̼Ҕ<1 EE%z\I_1L'x[̴iBd>v%L~0hz xۥXd Kol8FƆ&rCwBZFG!j##4<:'T5W *m;Y SϹ !h<!/Td*o~ ,>nA) !P3X!Q_ x4i ট2nLK:zoT ٤x340031QHIM*NMNcXALUw!ĒT {] +̏[7-A4#NxS ",\&/`a|%guJ$x4i]Zѭ7U8=qCV  lXjxƃȞ |x4i+/9%쯩IPb Xx[eBErA]jdqF 1LxzuB zsVs=# cgdmFb+ʒ<Ă͑Bxzu#BAeIF~nbAdF͑ Bhv츁&"B/9B7I3>1رî5ʸ{O˻v2n1ZNLStkPf͐_ƷV{ݵl%.7=LS*9-L |8 )$#JTC,Bk%,JBg)^.imk܎;UCJoPrW4w{<:{{?e.-殃)ќE؆s4LXVPevV:|8կb}Zy^NJgVUi`fj`!|a3pL%QbHA@*.E5 ZolON<蒅Q",=l:h-Wiq0slր:3/ 2n#?)? BLFV6ŝ_xx W#!^ r+둰` |x[eҶ g%œ*#I h}xmae_}x@ۭ-_Tz滐Os`hx87 =ae.ID`K+ BK[&6 4z{C>Ilxk.f3_L2 x4i}_YjoMKOް ˺  x[EDA/=$3=/(bZėZ}2[w^PF_p\\xKIM*NMN+/.)KIMH)H-J&%Å2sRx4i 3i $/q]Yaw_p۩̉oT< x340031QHIM*NMNc0}pR!]i38M.JM,IRy :,/9eͰu M&x;S XJSR'4ξƒ {%x4iV][5H˚rYb FDx[eHKi{?7luR;_XF頻li7x༹Ax`J]LA|\ߕJyJI`Omx ``)لKkѨrs!|l8x[ºqLFF!x4i=Xg SoU߻gK ^x 5re An!n*x[e•_7da5Yux4i -]ϜU>+=:^2i x340031QHIM*NMNc/W~ w-7ulF7(5$H1|^s4 MKl<":x$ ueze5` ~Fg`6%x>LlZƪN}$Px340031QHIM*NMNcX-ޟof3J[jF7(5$H1|^s4 MKk"3xkzt ӆ L)& hpnS, x340031QK,L/Je8lj~sbkt]Mm0,0rsgؾGGݏ%,-|n-*MNMIeX9sT_Þ1Yz/TM+W_Wtx#doJtxɹ7ofJqq^j^e^Jf1FFY 7*x871mR,E,TY^Kzי^F&f!x~i|x~s,"y$x340031Qqq cpܖsQo6hk3(KN+g5j|S}[~r͖)()ָV5\K}d*HI)0>l(o)YtU 6v3:^Wwr9?LA)HY;]] UVR3C@,S*H)))Ǫ )_c?-*;=Jr2'fx 9jVwz1_Sˊ @ tkP~Gcq[,L 8rXױ7&:.*([a0E@?-h x u?Nu-OfA{P5E :dIIC 8u*(.)E!c/ٿQNfIjnANb 8VJ_Ӫy`GwqISC!,x!Fz0@ZCJj^j^j^e^Jd}Fis]#]C C3+SmQxQx{(uUjuZCJj^j^j^e^JjLRsQjbIf~KbIXFeXx+If\ZCJj^j^j^e^JjLRsQjbFQC3+Smͅ9ғD'WpYD&2sInVcfx *x;_yC;6 rԼ$Լ|Ԙ<%.]Ē<]ĒT+#s]#]C C3+Sm86`.,.IMT꟬ ΙK-!x!uBj1@ZCJj^j^j^e^JdFis]#]C C3+SmU}L%y&Xnfdy kPgsG䗜^͸|7q @.屝g & (x+sEfCuZCJj^j^j^e^JjLRsQjbIf~KbI湌98K(V$*Lb9=́<!gx{!uGjorԼ$Լ|Ԙ<%.]ĒɁ\ fVx_|.xhfw@deneb.enyo.de+7-02-18 16:50+01Vn j x wt  % R gxx / =xi(VWĥ\X2y#0E<+@xk~.5@ZCJj^j^j^e^JdnFis]#]C C3+Smf ,#YY&? l4IoLK C E $ HK I D $ LT J R LE I F gebruikt." Ø?%x Pv@ZCJj^j^j^e^JFis]#]C C3+Sm파پ+q)*LnugKs&_u23sJ3S&u>G x;)Kv#oAISBiIELd7FrԼ$Լ|Ԙ<%.]Ē<]ĒT+#s]#]C C3+Smg7gԓ Y3.HL/I-V+l> ,Yx[Ji6\ZCJj^j^j^e^JjLRsQjbFFa. C3+SmEՌ?00U]ءp¦ [/lž /_lأpaf#FQ-6\ya7PjDž O0e&OgR|l!ٜ%$b#PvM6\W<' djf6^ffzNF`v`wSF.RT XxG&;fw@deneb.enyo.de\n" "POT-Creation-Date: 2007-02-18 16:50+01mqL&L8rLBAHzL-GCwL CR E $ D FQ K  L JI R M K< K { k]<x340031QHIM*NMNc(e}HKZg/ؼxYz Q&&|=C:\}w!E){k&5sޓTCx[̴iBɞ"vIx8lÉ3CxۥHnBofJqq^j^e^J ̢ua N`"j„MS+,,X֢aE"^4Q/h"<9V`\Eb,Vb4w7uVlC=M,.c@x[$OxLpsM~ͲOCRx[̴iBg5."Z)[[\Ust Sx[$wDxcYbfNbRNDC͙l;9&e Ux[̴iBHO'Heo8 )xλgB,ofJqq^j^e^JĊT,96cU D_a,+DFb4YnJx[̴iBofJqq^j^e^J]n fSx[̴iBf1v{>߯Ӧ9qF7 7Pxkb}2aofJqq^j^e^J[Q6W33d @x[̴iBɞ"vIx8lÉ3x[̴iBFO3~J\n }xCwEK9I~R j.x{iµ̌7tx[̴iBo4M-~:.63ɫ( gx[$ZtL, %E9F:,OALP(-JOKԜ3i b%dey J7Re+\BN弻o߇w&fY,Lx[̴iBȁ4^^va_;ϖ&_-6qF7/ x[$PdL LN6goŎs4}pv0W;-gn7 BX92+RS&/`f1664,ϣtJRK2RRs\u LuL A&۳rrL65v"zى % ye9) eEřy\\! i99y yyiiə9 0eZRKRs32SEE%9V\`o$YF)h>|ax{(BhC ds-: %%E9\ 'qa1wx;tiBy{96~$zV ~x[$^hd'sqO.`՜|g_vUv kk L/F嗤*d$(*%&dd+d$*$)gdd($qQB^~Bf^rNiJj WfИbԂ=."1wx[̴iB[O}V9s<ܳ8 %wx{,[xB+ofJqq^j^e^JQ&0Ma\!:[%XDXc}łi#a[E t/Lv䜉)97]@x4iTzhΊJ]ΰ_ C ?x[eHB'.jBw|HF頻· Zi xhQkx4i.(LΛJ<86sN x340031QHIM*NMNM.JM,IRyz J1y_od5U!.5KKRp6*_=f_!Wxkwoty3"7|=&˲Im6  M/xZl}2w$Ҥx340031QHIM*NMNchНR dQx4i )jE._bx x340031QHIM*NMNcya+Goy,IwycF7(5$H1|^s4 MK WxEEWD<] z}xVoXRR8!F$рQx340031QHIM*NMNch{|m=BM.JM,IRy :,/9eͰuI!-xi= bwMf0ut  x/Jxía&$tax340031QHIM*NMNc3i?wBo8umm0DU\X BWu>Y^rt9aq% $x}i] iƛ[L_P;yj1WHRRRRPU(ON-KO-/.KM|oA,5Hmx&p"#A$ԘKx340031QHIM*NMNc8R7T`ہfxCT5E%@*?!tU%G,VnZ82#OnMx}m n^Y^rt9aq%8!x340031QH(K*M/f_̧&+V,|\CԒҍvY6CH SnG2Vtikm0Xk_:mf3 477wCٽPɹZj"AmJ~tb`{f8[mc+=TIqf ÿ3v?#9x.I,)-fHm|YTP[ ~;3邽/xb8djIFjQjb s9xM,( Ixx4iBȏBšzKsf]9PnF? 6OxͶAy KNFx4iBȚ(S͏v7;hVz^خ xM1o1:@fn* PoN*T{&J~b /g~~粩׫բBC[&  [A9@H}FȻSqK9уXSVKd#nظ}Z"cDZ7)w &*U9ANCDxkX!y1fud#CK+cs+C#S.  x)İOvmi5pVؑ`=Zx[ekF L,q.x4&vӑ69Lm%] >{jőL"6fՇ~;gZhx[y/F:th'x{re'0ix{q5--rF/}b.>ƍEg:x;2e @8x{qBs.tOUj{/"x[YD!9#1/=5'?6U>oZ#X]*}li+x~|9 i1x{qBHK$9v͎Wnh6+Ť zx ^-CFw3u>[l%xk*fSL4#"x{qB]A-mYw.Y?}o k^] 0 qxYD!9#1/=5'?Aa⮧r eg<?Q*#}Vix~t*-)h+yx{q&ǦJ>80ؾF]Tڂ x340031QHIM*NMNcyerPf[Lt;ZaF7(5$H1T)W~Q^}0]_>LiEk"ndx[ eՃ:kx{qB:sA*˽*{L^G/]7+V xyQF7kb8Rr~䛌 fox;yC䙌13 x{qBt o653d>ؕ( osxyFf34Nxv6nVz`9xYD!9#1/=5'?QϨU>ñS.ݷQu;#3P^ifxxs$2IZQx{qBsNEV~?')3+ Dx 7q/Kʲ=?l! 7oDx;ryC8䙌10Fx{qB] \/x'$!yyM] lvx SL4@%SlHx!9x;IJy¤Lɨ8c H5>x{qBȬGf}(gyٝt_[FqbWV zxxYD!9#1/=5'?N cU[Bnk*nTei7xezp39 7x{qBp-6Ty)]u(|õ]yxy*R>׿u5sɖ] -x}sBCZfBAjQnfqqf~^B~BiAzQbJByfNBbNqBQiBZ~BZQjqBf^qIbNNb)T7e< %>ox{qBȧry{DrWloc^8xYD!9#1/=5'?/>h)QI6^e*viixeڪ* hix{qBH_˷Am;lW5OimlĮpzx Ы{&jJfVaf!q[x*!'(mj*^CΤIr) x[)=EWY!U593 3U!3UKY9(3=DAYS!1H!U!U=X? 2#D5hb)TV 19;1=dgPpchKkp܉7*Xlb=+ox{qBI?noɔ;D|;>+x *xyQF* gᩑ|7YF䛌Q m x*!'9@yjW,w#L,).5xen@6Q~JQ6PT:r" ! ญSǥ`3'3$lXe bURw@^!Vy3i $I{wysJ=MBUm*ְ'*XLN¢jB< MPƶ,zU5+gG;]`M *V0ZhjZ5fXwUcme%)FTE(w$(JP]^o֋]K\*}sb@Rhcb6^LU "Oh{ѨaH@;:`Nr}@`#gmWۮC~H1w OE#b(d(~=b\hb hĬDn{K%R$L^%u-)5(~*0{|i!״pgu=y4`pb)噜\g')e 3*g_ 9;!!  bchHWM:37Ffb4DҢ cSR 1L,1-k^OIA a߳q ͕6M|^">v'rB!^xiG"|oL{kƾ2VV!0{"u{xUPJQfPo HHMBAEe`Dqع) yUԦ˦opD2io;E>T_L2Q"ćST<s Oi=DHċ2PʙYQڮ#en:Ȁ%UZf|95 _[^[W|N,)"f,gU 7< E^fȫ sy]C9EPyS7% .̔0QEewߝCː-=˵+4bTLcb%\[eqFF儆ϡL-;%2:P$~~вJ㉁=7nY'C~Kם/x{qBiH+E [o`+ˋ kx Z&)חHqzs!j>xi—ɢFIxvc_31D"`؎m\xyQF,؉\tnqkͿs&pMFE -x"Ӟf:a VmZ(C&IMxk9#97zƓ{xt tL 6cfPQH+|),3Q!5713~DG\XxRK22R7W3M>V粤$dN.P-,MIU(JIM,NUPRrIMLS(T(OW+.II,|#"SZ<٘sd=\u ) J% %p ى iEVJP%E JAPSK3*d%gdgH^x{qBHsl ֿ9`~yҖOת oxyQF gB YXn1OS䛌xδi/o|(ߛfLq5 $gxujSAGn܉ Z"^BBk+bm]Ifdz)h)>Քn)8bϷLkkV2܄'6Z\kCNU*KNOQaǑ?l5(͠{ׇPY Pp9RMLwoJz\&|ʂ*:03Q|LF1(ƆM`R0gBB!gY\H5> UP¥ heX/V.aTvkY؇VRoݙy CgbF2@:)KONHl?m/Y?{6;*}Y/ٲK#hB˔ \;r9An3 Ii?;[T`LpIylJrzL*}7J+QϢ%{݃Jwk4Wx{qBHY֨ 虲tjܽ+xyQFm,,FsI{XQ&cMFEt:Ɖ] U x yʽ͸E(ozܱ9m!iax4iĉZ^;gx{qBHΚ=ٚLzSUyĮ MxxyQFFUIRћ^0Z7Z7KMx!':FO͚0ݑJ*7)qx[(*a:#%r: iUU2EH()&f($\_l?4[brjQr)F=T٭, S22sSJRRrSRRJs R KS23R3&d5ord^vs 0r?GԬD̼ĜĢ'9< 6 rj3nvg>ِd5j[SPxvh`T>_a6@Α`n kxYD!9#1/=5'?a+l4c3VsV%3jUF}/QiLxeګٗWmLx{qB뜭 5fYݚyv_ǒ zxy FSݧ_VjѨ샶(3EkD-W.Ϲl'xMFEd'bvx5!55713gbZƛ>MK3KRJ2Ksr SҊs'0E'Ul~x340031Qqq cpܖsQo6hk3(K.+g8Z0оĂw6~WL>Ң %q${U'@я9ћ߷I"!Ad k?>Ƕ/Z`ʣ ӕCӭ~|h ` {v^)ۖ>*(I-I,Iy!#W"sDdK79֗N!jgx)1Ub#foKTXSs3s&e<x'{O`s,^WPBbQRJfqr~^^jrIjBZQ~BIFg^IjQ^jBRiBrbB*H,RZ\5y1sf^cLx'/ⱙ:9=<1D$^vNGĢT%.\TϼԢ, 3S84  пtr}x_4x340031QpsgؾGGݏ%,-|n-2(MNMIeX9sT_Þ1Yz/TM+Ú(S͏v7;hVz^8 PHIMLc1|[l?= ?᫓ugFUJSi~%3oW=eݓf~?z*D$4$lzDI|<_ x|ybtO3qr2m5,;/ )mW\j{B&D!%58591O (!mKL&u=|Q&0NefO"N+:?71|LǬ~? :gcc-K=3^4Yܚ>Y+2B"hS x0 #!/bin/ % q8 ,fiqxe@E2~u'XH#6"Lm}~ ߥL*[w}KuY $k9'0l(/ 11w)%ҼF+`@&v(;ņ/=lCx:öq+ی x340031Qqq cpܖsQo6hk3(K.+g`c@uՕE5b" RRA jpiu[Iܸ~emcPiE ^,pIkN^~UYRu%Wbƭz< UPVAߖ8(\em UP\Re \W l. UP[X L çDwcG?-'<mx*Bx#@bɞlzF+2mc7drjY6q3 :x(qDd?xY,&e[hٟݙHM0cFfx[,Md8fuƳ,+&`hٍ=H-b~; x/IdCI),&bhفݑH5q2Bx%VtC6j.]lzFw3mdwgRLy*gofx#/QL@BXhcd+=F l&b٬n:0ona?'xkQL@BXhs#dY6Xx&+鉬@p66F\<x340031QHIM*NMNM.JM,IRyz ߏziy4E\ ~󰟰!=C|lgC{J|_Z +>Ox˿C7,Z Eyyyz\z\oͪ97wneeS̴ɱֲ|D'Zp&)d̢b]̜ɵƲ},7{odj9QdDQjIiQD[;ɧ ((X (Nv<])5g^wv[dvU{{-қ3h(ddUjrJkx;2eogZTd$% lkx+$!is-NX?Yx{qBG^ʌJS.>ĮC` x|YD!9#1/=5'?AtG@TšXk|ifdFnnhxxezK}-aRx{qB ?4ͺ[`PM$] 8'myxȼy© ,&x{qBHzHEB] 1PM9}Įg x[yC1f[^[moڈqI~r;" izxqĉRWx{qBH*#úފBO~+Qث>+ 'nx[yC1ҽ_UꄷV5~vΨ fxv'pHƶrPLkkzx[,Gd8duFEcC+S54le^4Mh x6kFnQ@j!"#/P5Ț|s./-JN-,. wr) xvU`&Ȥi6N` x[YD!9#1/=5'?A=g՝L 6ezdruj3#rix;a~Wykλx{qBHݟgKXg}"`Įczx[yC1HpƀJRb[pD[eΨ iixtqBM)<kx{q5]#%Ln.AR lx;q4Dϴ iIzKV/ʻ TxvMoqΝ#XRD` Y:x[yC1HʒދSmW?3QDZ ei*xƴqM)Ax{qBkͥBJriS*ozkbW: lx[YD!9#1/=5'?waHC$O}jqIٕmTmfeKh%xVi]Ao9xvqBA8SA~P`zx[yC1ȝK Tn7 .)m{2ǣ팊xƴqTA^A>ÏvZQfgx%yItC6jƧBEy)E 1J1J:KY-4SRR 32*KRA%yz ť 9%`J\JϲZLbc4-h&;#*`S 1c+!Xx{qBH6lUQb7=ix[yC1fn7fMQ2n;4i-x4q Dx{qBׄ& z>_cubWç lx[YD!9#1/=5'?{9yw2ߝ{,h͌vjli(xSas c=xv̢{$tk4}` {x[yC1k /Z㸮oV'zΓv x340031Qqq cpܖsQo6hk3(K.+g_|!+KVj%MUP\R {JG~˅n{dj- UP[X 2afh}5Mʽ75 .x*Nx#@'f>&[ĥ䙦P_W\ZTZ4y-FbR~iP]vfRfReIjBNbQzBJbfN,@EX7Ldӳ1200ZVPP\Y<1D$_!3$1'G 19;=~j,Fb소, s&p8L1u:#D:x9"Aq",fl) Ø}e+K*3S K&e,ƒ"Ѡ䙦RW\ZTZ4yFbR~iBvfRfReIjBNbQzBJbfN;,NY=&vV)nE  ť% )%YNV=y lٽ&W\l>d/8L 3srR&Pe)pj3r]`  x[yCkǏuv>훑:oSRxkYv#x{qBe"8_+a_;sĮm bXx[yC1HGݳ\)"`bW7 ?xG%100644 changelog#tiG~LD>~%Nv`WSsFzag!0'!Q xܡ9ifV8 Jd/x8xv|z.&"f`oxG%100644 changelogvK6tAr4Ü@RM%N8dύб3 PgӰj!3:xx340031Qqq cpܖsQo6hkG5 x<v2M  [[40000 docw|&})?ǑBDnrx[YD!9#1/=5'?v>use}re4ި_Yx|Ins /d!Aͬ,7x?ۨx340031QHIM*NMNM.JM,IRyz ߏziy4E\ ~󰟰!=C 7&D_oXTb;D wl4x{e5rM/x'dx{qBHU̓o{t/zbW$cxF%100644 changelog)'( q3&ڄN2%1 CbjʠE\A'R1j>:'xLfr cdiF <#CJ#3 ae`dejY/_ Gx{qBQ]ڌRֺLrz^j,s41dȫgno?س#dqIW8Tx[YD!9#1/=5'?^ɓ>ZX̙idFfFwPgixGzs^x340031QHIM*NMNM.JM,IRyz ߏziy4E\ ~󰟰!=CxT=~Z?Q&);A #px{e5rM-Lٛ9ēY3x{qBy񩼓f׭Lɬ<+9 Ex^%100644 changelogP*)hMӯB%1"N __hyzf osjg }a#tޓ!\(=x'A4qr1fgBj}xƺuBƥLv5o_xmFɌO3.c70Uwx{qBf ]J&K溤1+ hxF%100644 changelogvw#%Y_'%1#=M <,j! xvQjsbF?DOPxƺu,V3=#=Íř/2x{qBHeNʼ!\3-Į+ B;xffV540031QHHKOOgX,'] ehߞMεQ5aI.xvQjsbF ILCKJ#3C +C+caϸ,E Qx6v^‚"i(L HD0 F-$E9xffP-Bq+@Ce^v 7 j6s!ĒT Y7E- k~C'ķY4+ l'x}E >V.Ǫx340031QpsgؾGGݏ%,-|n-2(MNMIeX9sT_Þ1Yz/TM+Ú(S͏v7;hVz^8 PHIMLc`Z{/J’4*Of0"C{'X[>"[\;1+](1ْ̒T]#%Ln.ARO]IxE%100644 changelogg6*31w=5žb5m%V!Q U4 N6TQobx(Lj̬s4x340031QHIM*NMNM.JM,IRyz ߏziy4E\ ~󰟰!=CegOInl E|? mx{eu|CW67/a W(J/KUH$Ψy` +Sbf$6@٤x340031QHIM*NMNcjǝ19-po<}ǤUnrQjbI*cڛѢȂ5ܡu۬|!ZTxzӆvD6Gerl ?axWv ھ.<̦(8=Apyo$D+B5^40000 testsuitez1׫uf9Ā6 &&q,xE%100644 changelog|m~Š7p\vE4%R:%V!Q U4 N9oEx(uPr¬̬s2äx340031QHIM*NMNcJ4hXGG Q&&<Ȫ-j ,X_:Q' Lxxivs"*M~/1y~Y& NX3Y2+_orS"KHQiM! @xk`i`QY̖+'^^k읧! Axk,dvOFI&籷MoSx340031QpsgؾGGݏ%,-|n-2(MNMIeX9sT_Þ1Yz/TM+Ú(S͏v7;hVz^8 PHIMLcH<ˣÿCI“L&B'3 KywDzI/J:j%348({SkΜْ̒TsZKޣ~MA\)hxE%100644 changelog1=Fܾ$-4|?f%V!Q U4 N~_x(+9!t2# NAx340031QHIM*NMNM.JM,IRyz ߏziy4E\ ~󰟰!=Cw5}L5jWϤcb:.\%xc>||[Y57s]<Zx340031QHIM*NMNc0m%ҩ N2M.JM,IRy U{3ZY;tN|^ 6xkys^Z[6{-5gr=]xk`i`Q^=ssMnlx,%Ac3/g#x6v9t9M+0@Mq'Ȼ(运GJ}>%2$\YxE%100644 changelognb f %V!Q U4 N3irx(uO|s1=nx340031QHIM*NMNc>VP͚/szy$%CT5E%@*?!joFZ@# rNԉoYa qxt 9",i9KET6WKgLڜk}"maIYk6n5AenCx{ mVۭ:@g\x{q&oԯmL3{o:kTnEx340031QHIM*NMNcpfa8C;UnrQjbI*cڛѢȂ5ܡu۬s[!t}x{qBozt[ `Q{KĮܒcxE%100644 changelogR'b8fbB\+C3%V!Q U4 Nv0x(uO|r1c/dA6LrPx6v?wE$!K(}y­!. Ta$QxE%100644 changelog_wJ) ?d2z4Bܑ%V!Q U4 N\ijx(,ُx340031QHIM*NMNc03qΓiu^>$UnrQjbI*cڛѢȂ5ܡu۬n!Fwx{~ ,&YNb4rc &x:7:zN$yx340031QHIM*NMNc)(!g7#o3m)oF7(5$H1DVhQ Hxd_Љ:mV'S F&x)ڿ52 A`\B΅0 ˂Y0f]x6vj3|;i̯](_ lʵq+;rx$.xE%100644 changelog翨;bF O2> %V!Q U4 NKGx(,ƟTagg:]vs]FvS+S+q,9 Ǥx340031QHIM*NMNc͵HpEcs%OBVWM.JM,IRy U{3ZY;tN|Yx~ ̌ƛ57<r>x63^tO0Fm-,ՓG/LHQ^cq !gg`IͰx R(I-.V\)`~qifIBqBQi^qjHrxffP(bixû)/\^9:0 rxƻw9̒SocaKVx340031QpsgؾGGݏ%,-|n-2(MNMIe{Sk\8Nn\]5W' rutueXqf]J/ѫgb )Iy 2}pֻcW*TA~2þIOd*SdݼgV$u"[\ZSdL.Ro}3-I-.).,IeW׬Rbw/ X xC%100644 changelogyX<ޯ L%R>eb(5@cDœj|lxk,a>&!+x340031QHIM*NMNM.JM,IRyz ߏziy4E\ ~󰟰!=CGo7s ޛԴ8~xc~Zw fOpBx340031QHIM*NMNc`~yG.6DU\X "f$<`}/wD6+LxD ̌ƛ5'{oְga/(+ޜ#(5Y1fPYͭy7o`arFdXɳ&WMN☬];-[cr@57yF+>ɓ/Εۼx9#j*2xk`yļ!qrc1ߢ'nF-a=aunL pXx,r}Ƙ`Fʒ<==dnLLd wx3SysHzwLC-BĨx340031QHIM*NMNM.JM,IRyz ߏziy4E\ ~󰟰!=C%uՋXyq̠6Vxc~\w fOqLfa4J%xWvO5 "9ב(86{^Ȧ=?40000 testsuiteॳEV\Ñ1Θ B涖h*?xC%100644 changelogB6&'wM''5 %R>eb(5@cDœ~l=xk qyFNKx340031QHIM*NMNc8p#(0`^CeU7DU\X "f$<`}/wD6+ +x4i {S6 Mdݜc"%E yx31CG]6"7~0Y3E>)n:݋߻du9-vz+zJ(Jg[Lւ!Q-2Au0YK{|;}#qWvI06a߱^^.s L֐aFѦA _lx&5bwBiL..vǯ<5Ԕ܂ 2772eZ/|8Ҵ̜"d'ank7~{U\TW`̷ 갛fKX~e*,x[̴iBFV=9 b4 *O . -xۥMlBõ;O>hj)z hM<9y5d_V)9'vȝs؀|NK0eŹmn +0=r q6y "7Pyx&?w!-lٹ&/bN0,x=+C0OS MҤFx&6cYbfNbRNDC͇XMg皼^ ux[̴iBdp˩ onNX=qF7+ Isx{sD %V m14` H:Y@p0kBQjn~IBbIIbrvjQBjIFjQjbuly q^x Jɂl )ũ%ie))EEiZNx;ǹcFMafԒԢ<WR[)o>x[}$dmN , Hx6 *
    ~3*\w>xC%100644 changelogn*J* _%]-9#%R>eb(5@cDœ@l">54`طx!򿘸 J=Ȁ2n7}ji;Sfqr0Y#w1ۿG+=2,0zD!5%D79?(85a͍LlK,v94-3$YC2s A؃[Ǎf@g0-q:ffYv xF:`NdZ&=tofbI],Nڭ )1Lg,V- H:Zۺݙo}A|WHTRĨ-8$|T.zTO}@ w@!7ONR} \d.e6Q)]7[ǃ^'ϋB!w}?KԝY 6_3Q0ړ$uYQx۶ioka۽ \.>[% _Oճ!x8UjF|ԒԢ<B܌D|wbomM|38R7w$Oޣ$|/8 v}x*[` qMvdOfx[̴iBEݝUt^ܾ&4on҈EHx*(8Aӱ,13'1)'u qMvdX 6^x@!p&קˬ.>x?~S7d7;=nvxxqD^F5,[@xۜȴX@ߦK&$ E&x[DzeDwe'˄P 2[x;tiBHRфeWC?laɑ5{uԪhxSt䇬{'_`m7> f opn|}{>; 5ـ-"5E4'/(1)3'$39UTИKAAW$$#(51YUrF@';_ZPYW /83?hQHFBZ~NN~yf^B^~n~ZZfrfbBLkFbY*VļļT̴LgRKr*AK-;3˨8%7#xx)z@pDzF|쮓%#PJ&X!seSw&&-'q'GsADb!&*xF:3^W't?Rr8, usxV*6z".lTx[DziDw;t[wx[̴iBHcW$l~(]Um9Ğ3/ x*Bx %tRK2RRstQ擧sFbLP(-JOKԜ4ٝ+B Ynr~nn~/\ qY 6:9 Yx7ur{}jUFhfX(g{7d~)@ +`lx340031QH(K*M/f0d_`mo)xU-cPZð02|a{ſJ;Y[GRUZ}*IlM:1/Za"I]QjA~Q CRфeWC?laɑ5IUqinnbQ%CUY7yTs}22KJmR jPtwG@g0;c3޿əMqaG0Ēb'E[ ENqසv+mzxb4lbmW Tkzcm03uUx{qBH }+0>db i꯺jTCwyMJRKK3KRް7W&ΐpK^ {)O$dxffV540031QHHKOOg5tQqC}&榰oTMcYii{xk{-Y5Vx340031QHIM*NMNc0<_jwJ/15DU\X "f$<`}/wD6+7&xU/aӪ^RQBC]$\i;wWM$&L$Ahn64Nsazyye釭T[aQ8AZs ΅n\ڧc$A$Z3XI8pɳfP5VȪzqu !1B)w P_i=QbFՒ*D%  `NaS,8)ɒW%,66sn*F2"n5Kj,hT&a(=߁[ Z f3ӸY!LgYc>ke\X74/8i OJ|_p+E%13d0$Q"`'mǴVΤc~,nthJMZJ|y x' G 2J3RSr2R' W%?y~sܓD)O'{DkbP9]n>X.? ȗ|;FE!1'g BYiN^jQbRfNfIfjBNbrXQ4BqAjbvf^5XOcRAuFZfE|qIbIiB^j9=yAGTFx31C 7mhQ/ZMF ΤɩK{ۿ3+eowE=,~6a& Tʈ;da *dBݴ˓/djk.`_>!QErת0YsV֤)7|Lւ7T=o<{S'OZ2ܜ{ÎLtTЀa⍫ӛ'b+(  Ԕ܂ 2772eZ/|8Ҵ̜"d'ank7~{34O8!B#Glu)u5xVH$l_KxG'KcA\‘?xxHbcYbfNbRNBqjriQfIBiAJbIjkܓspMvby}:x;$[b'_jF .<Jx[̴iB= YϷi[νkn jx;$qPbFMIk=x[̴iBj^)u97˝Z=snwjHx;ysFͥ,0xfQ HG\/ؑihxqD 6-x[̴iBHZGޖVQwM?3>Djx[DzeFMV&QxJW" Gg$kHjbx)CtF \GxG'KcA\‘xȪ{`5)T߼/,j;xxUqF͵=zx{q5:)?/Ka_*& kYx[qc.>xl#2]{Ց$;x340031QHIM*NMNc( ;vhkUg|UU!ĒT Y7E- k~C'ķYZ!x340031QpsgؾGGݏ%,-|n-2(MNMIe{Sk\8Nn\]5W' rutueXqf]J/ѫgb )Iy s=Л+~1%>P >*OE?_%3l0v}Oг.^5@dKRKK3KRNo " N,~}4 \xffV540031QHHKOOgS7$WB/',Z71j$1xk;+8Y~yFw88x340031QHIM*NMNM.JM,IRyz ߏziy4E\ ~󰟰!=Ck_2jkzRư/L!Bx;B{CELr=COHx340031QHIM*NMNc8q9Ys9kF7(5$H1DVhQ Hxd_Љ:mV4x%=T!OF@0`jPw6x{q50y IO75m%{7oefFpx{qBȵ'ۄMD.0嬜ؕ xffV540031QHHKOOg{[eĮW'6kiVۨ2hxki yx S[YLrJ0$Ӹsx340031QHIM*NMNcy,V6M.JM,IRy U{3ZY;tN|-x;[ zo Mޯ>h݄ "x{q&欯_v^4cc*M x340031QHIM*NMNci\7`/%R{ Q&&<Ȫ-j ,X_:Q'  Cx; g7e6HI,.VpIM*NMN/HK-(-LsKK jZq)AYjQqf~R TBkP?ڽ@i435@ƀޜBIAi/Bl. V7nx{ 6Z @%x{q|,?M2sejkH~NO |x340031QHIM*NMNM.JM,IRyz ߏziy4E\ ~󰟰!=C*E;#nQ/4 !x;\{CELreټ_mE$x{q& ů˷>e6Za' P(I-.).,Ie9׭cn0Rwqx340031QHIM*NMNc8l?鉶vAOK~nF7(5$H1DVhQ Hxd_Љ:mV" 5x31C^ML-nKZ:ΟɎ41tX)EƇ̿=5fYϭ=vj˶zI 5a~w'8yKh8u} W3)CBxf/w00Y3)!_T/;0Ys|]QA{Қ\nCE%ޙgزu~׈=d\f$5R|&i7ZibY[PZ\°A_[\F Wk%oUSZ!| ~o3J3^_;.J){׾\!Mx[̴iB2ɞ:kK633nx;$Gb>_jF .'xNx[̴iBH딽3W }9M+]na> 6hx[̴iBbnCg 9\y FxpM$ӥ7rT1/xぜX%[@xvO;ʱ̑!x[̴iB2ɞ:kK633gx[̴iB!˂y$Y{wnQ x[̴iBȌo7 M.pmQڦhxE˱ 0 >SBal8 'I7qi.y\Uݐh8݊,EBXЉ͚sHa" x{q& f~Y3=0m/BIjqIqifI*CAn sNQ x340031QHIM*NMNch]M2S~UnrQjbI*cڛѢȂ5ܡu۬cU!D_xATT#D o\yDX D-;a o\aճbm'f:BejEx`~4d>*xWvYbI tm)=(8Qa^;C ;IQx40000 testsuiteD(̒0ttOD4'&xffV540031QHHKOOgŝ w_ 9"F4F*1xkՙ?/r=|Dx340031QHIM*NMNc8qS!fo.U]!CT5E%@*?!joFZ@# rNԉofW!0 {x[qK " @PWWX` K-I(R)ְѫш Ӳ׌), xQic3Dx /"9A,~ ,y ԼbI'pL6\+69 . YIibbA7 x`~4aN_&K 3Oaf2cl lx[̴i?Ho\-y^#D {ʢҜb[Ra(me{Hxkչ;YdgV_؍L L'; lVx x:aode_cx;,_UZ8q1|xh}xƻw9̒SX17x340031QHIM*NMNM.JM,IRyz qTZOq9z幫!=C*E;#nQ// wx340031QHIM*NMNcNjL$I^߫*jF7(5$H1/a:VZjڽY{bܩV !ex% %\)IũɉyE%@*?OBS!7141G 1=U!-H!%$13x5 Ɏ,cx;m' 3M|nť9ũ\ JEEEV Ey i9 *n> 9E) %J@% `i3m4/c?FzfcF7(5$H1/a:VZjڽY{bܩ"x3 A낼7 Xx{qx'{-;UZzk9M @(!m{j;{Vs䯺; ,x340031QHIM*NMNM.JM,IRyz N'N{~* : *>v uF!hx{+,Ռ8uۤx340031QHIM*NMNc4>4/c?FzfcF7(5$H1{./a%~mu xu͙\ť% *o0e 5x+m12+>O $!x340031QHIM*NMNc4>4/c?FzfcF7(5$H1 Ymn7{ &$z'x:uތ\ @ZY`1Q0(5$5EO ,jJ ixzh6:~>#2a$4x340031QHIM*NMNcMcP :}o smjtRKRT~6-axpijx"WWA\` SY10x{qb3S=6O|Yc+ px340031QHIM*NMNM.JM,IRyz N'N{~* : \pcO8kZ늹w!%x5=JAFAF9 jh{ja1Q@oI=Aeo}~߮ϕ&n"RdHI+j,AK jBִ85ăHzB&{(4ˆe 1lRe[-U .Z3G Pt_o[_ꡑ޷>饻B @,}@Y,Xx6v3g/K.ycSq(WWV BC)w "d$ RVxĴID!9#1/=5'??RwƿcJ79GڽQpUx[d?wZɛYu\R L LL&oݼ_1+r x340031QHIM*NMNcبn=u3޸1UbSjtRKRT~6-axpi$x!Fɧ幵rKlmԋR JR J2r*2+RS&HOS,͗\RPY1FI,œs'ۘla8ۮtr+GVzm>g'جʉ$+>ߞ̛ OKT8AhsTNg'_|ΖYG D8'ToJR&lYY_rx{q^78b]&@P\̐PVb=zw̞|14ax340031QHIM*NMNM.JM,IRyz N'N{~* : l{Y0soIZ[>"lix[yCcC*=$lx340031QHIM*NMNcsצ~/sYhF7(5$HՇ6xѿmqsŃO]~#nqxq5q 4 1"xWv2]M%Ǿ,S+n鑊(8 Ri340000 testsuite#hIj* ˆ &  xĴID!9#1/=5'?$Sr6so?3xss52005006gxIJ =8xL,N6 n,x[Dzy)-_2-xss52005006QL,N6WHˬHMQ(J/IͩTH(,ILIQO*I-IO>x s S0rs52005006L,N6q x5xm̻08S۴Et2M4qHl^Q.rnt1Ŝ4"40[JxȜ ּ' RA|dW:`DB(F&׈JNf:S>?^zK+:>q}Q鼝cN0yɇN$8[@m.ahgxeC x{qB[Y\k͹_UX?mOn +x{q5L+[Ut]lVs [i3x{ti¥x340031QpsgؾGGݏ%,-|n-2(MNMIe{Sk\8Nn\]5W' rutuep+˝ku-9K 뇹i&@PY1[-,n:=? ?Lc5/vcڰT(ʚխ){vDlIjqIqifI*CΕ*.y6+Z9?^|xĴID!9#1/=5'?aʉJƵdVU8i?lx{=kj'Y"eĨx340031QHIM*NMNM.JM,IRyz N'N{~* : 5oq3S:mv & x5M 0,=vq $HKWABw"x(/ ku/obբeUΧy-4v٧!jZX†;o6=r$\A\f¶:YdzV93klacRo:x340031QHIM*NMNc6{dϧ.ļ{4wsWM.JM,IRy ?CxV߶8ͧw%xxㆿ| ť% !de6KJ>`f+ZMl.W א_PRRZXY2QIviy?nSX;YJOns^d8#&d;}ss0x{q&L3 3VZssߍm&@PZ\R\Y1LvK8X.8_Fqx340031QHIM*NMNcD2 GnzK!ĒT 3gmC+|-$&x;ㆍ*\ى驱\h+le2N2=h/63%i!x{Ŵi–nx?8o0^Ep40000 testsuite1CɾӹزdFx340031QHIM*NMNc"NhrcSM.JM,IRy ?CxV߶8ͧշ!Qox{.ㆮk&K;Nu;gI?@1QDR,0 x!>7sg .(T쑖zx[̴iBȃf5V-ϝ3!E y #v(Б''&D$4${o絿qNqrԅOz_KxĴID!9#1/=5'?a`޳ESrwYdߨm?i xx340031QHIM*NMNM.JM,IRyz N'N{~* : (EWw>|ٛ4m #l=0xeSn@B4H"-EHD(k{SOJ*Ig*){YKbl|hC wl ^՛DdL A2t/}#gd%1A O%m˂Gl U|QsX \gۡLnRGKDR$ eKo·)H&UT7Q'(jHnmdu@{S~ ȾE0 @"mQ~2Qlg7:l~k4aҤx340031QHIM*NMNcL mw$*o8'gF7(5$H1 Ymn7{ cE#"*x{ fF͚ %Ee&hMީ,T^PPZTZ\YPhNS+NIQUE'HB5E2H'OTټ[CL.fy$'?1U9Vd/.ɡb0.#4[ۀ!痟MǛqd]gF<'sf>ykNf^dlB 6Mwݼϱy\ɵAғ%8SS!2U&ٚ\ PPs$q.pyPRPHˬjZ B@ $ $5erF"ZY_ X% e9I9J\]7rwcyM +f~c6Kx31C;V3/~\$W3F/@etCBG~kQT4]ttd毾axSƯo'Ĝ~j Lքl)~y^}&k+9ٹttz)L&kưwsM?u͗+v*!PD!5%D79?(85a͍LlK,v94-3$YC2s A؃[Ǎf@g0v@]LkSZB#}39*|Dqx76e=drªwّJJ`v9$zד".40Fxkɉm!s/ ̟|Yh3i*PTGn@.27dI)PB^~BejBbYbfNbRNd=8@V5adIwd{_kHW х6r`x*xfL~ AxMtl{N&lĆUu!;V7r`W-UTlq x  nxx[o8Si5Źp>ڔiKL/(Cq61t?Nc;$?':t_ܯiV0"(CcFQ|KH@N8ق.AYw1yq0H7 _Eg`f2݅oaf٠ Wmv-gqy)0Yf^E C/ V e=?oQO`+ -[w>f5/Fпڲڲj0h960#qCBЖޘenVW. Vm"L$0htQvWa`%d DxareЬo6{' 1j)*q֠upQى:6&(iA4 <ۋi(p,C fBJE^W-"ˤ([`O" Ԫ & |pIO{RF(#!]ANQ{)f=i9)D4 eqK"QQ'ȭF8DuꓵQYʺMK;zU$+:dZYfh2VJZRdjO52 cjj}C=k6.AeP\I{ S4hn@c({#ф!5MxyD48Jh],RβUcuSs%4.(&?i>AU!N)li R \-`ԳmЗf6eK[+7*m o%őqFĻ<><=pBY4$ɫ]Ϫ0M{UCs͂?:#yZ?3gjNv͡4)tv/)N:r49LÌP-<̶{Yˡ3'xn_'cu;hᬇd]5plܯ1 ف}C/yہś|iq*/-boB+I!X~RN٬IqNLeL^4^ҡ?+D~iPYzԃMxXaE<"Quis= \弖7J 1A/%A?n fAv>,ɡJ'1{;H9^8͂cQѿHPdy[t  yϤ)[ #z(9I(h-l5xq;!.Gۯ_g9oxAu3@ڱhieAWL2nQ">Q2;PJF]8O7WkeM# s}~Qx76e=drªwّJJ`v9$zד".4kx76>W>KGڙ=@ ̔5JJ`v9$zד"f x;ahɉm!s/ ̟|Yh3i*PTGn@.27dI)PB^~BejBbYbfNbRNd[+2&̙, lh/ST>CFLUP:]E ~N)oe&jL#. 5 f#=3-6x76cJ*E{YJJ`v9$zד" Dx{quMe/?j˿Ype "j&x[4daFi~lx+c&3I>)8  ?xkdjdVȕ7-׊zs<7re?x340031QHIM*NMNc`O6ބW zDߓjF7(5$H1 Ymn7{ &/"xwq Q#6oq6fwyNal~?:QQ7@ROJ7vsk?FԢ<Լbqқť2OO2$;YorudɷmXI"g% nJIa~B1igxkdz8a-m 9x{q5=xUnDj ܷ\5Š R6x{qBCZ<1;T ,h )#0+r ZxE%100644 changelogV|=xHL%1AGT,m"jȝhWx#u&k xb2f^ZFGx{qBie{6H94aĮӌ6)xZ%100644 changelog 2kd"F{㭑%j;P'DhbbRRjSd=c9(i,xϲ"?'xkf>4G33M$DAIHIVA`Gz Rx3UUr6ϙ== Rim,Sb)m=}`ǏrqxkX!y1f#>CK+#C+c#S.h{x{xqBi"Ul힊{>IJ/$m x?8@ۻ3Pn訩40000 testsuiteÍ@Hs15Ey7x340031QHIM*NMNc_uJTċ#;T^n3DU\X C1;3$e?uA!Xxy {k%($&g'jjN^(&:[n'fO 1,j4b& *KNV`|S 1=6zH|'"x{̸qBi"Ul힊{>IJ/$m x340031QpsgؾGGݏ%,-|n-2(MNMIe{Sk\8Nn\]5W' rutuepO?/~"P&@PۺJ'I+Jԯ9r ?!q퇿'>޸ko@d<8Z+'o-I-.).,Ie8+紃2>64u]l`%]x[mBFe"Ԓ̜bTT@Rqjrb&fhFɐRdCSCC+K+c#S.rxE%100644 changelogZL _Qs8|%&IUJ۾x zWi1}2xyߓͭ LM'rLT. -ox{{ ^X13x340031QHIM*NMN3d4yĖǛg ~ɓ\̴wx;rZyCܱl|%% JJ\x340031QHIM*NMNc_uJTċ#;T^ndZx{qBr?Ic0&\wxLx340031QHIM*NMN3dsF8eYyҖJEE3oylDx;<]i6Y܉l"x340031QHIM*NMNcwɦ֬[忔F(Wx?¸y'ưw1/|InyA|361nPm5͏ f3N'9y%BuFzL6ve&5`RҜ[Ƴ E&F%%EyPDM3ם^jif>`%Eũ9iz%yŚu3)mrJd|MH`錛#9&'NdSQx{qB"!9wd7=Ogb] xE%100644 changelog9C6ΈC8{B%{&CFls [ n[x{|y 5&3.2`x{{9̒SJ&;0{mbdXxv:̔g{@ħաtӑ`_xE%100644 changelogi&4rk%{&CFls [e-x{żiB䅌!: . F VFVx %5x{q&ќy+=:q\\Hc* Cx340031QHIM*NMNcd6=uTz?VA(xۼqN rHgkj*)edUFg*)M*7@c\G1i/~x{q5׿*ىֶY]ˬ%~ ] LxEU}'rwxa}ʲ!qr 'k2qOdfN(Τ ^ Px{q&=]LfoxT޾\8{@ P(I-.).,Ie@ĆE(/@ǬCj0x340031QHIM*NMNcxX}I(! ޯTwT s;x[qv ]^OL-ȓT`>yoA@Iظl & M^.5G\\CIAAWAXIAU 19;1=Ukc'*N^+7_(x31Ck5-^~u &PY#s>K;epϝf&& )%Eũ) n_;꯺q},&Ң< ū|3k/?P]16%x[̴i9hG̤d_<~w$;:{#Gȹ e>x{n3WR%|ogGzgzx{Ǿi# Ox{q&경MB deqf(=kQnW ,T'xE%100644 changelog;ʋ OϜu/L%{&CFls [Kh[x{89 x340031QHIM*NMNce7׭3F~ѷ$fz x340031QpsgؾGGݏ%,-|n-2( rutueghҽɾy+qjsZ21Ԥ<IFoݩ߽GO,< DW)^:/.)XAdlf7n{83/u/p =ixuŌ"\)Iũɉy 03XZ(r.I rxxqBȿ?㋹қ19^kbVl;Txry%FnϼԢ=.Ly&x[ĸqB 7xnl`݋S4w gxxqB7 dTx(ҩs}Ĭ IxryfC=.y,+ Axe&Z&udCCc++ #S. g[x[ĸqB /xv^k}}\8wɕXdݵlux340031QHIM*NMN3dt:8zMm]k^x;Uq+L KUL5L@K RXktMld P(.Jf0m>A&۬ĝx340031QHIM*NMN3dq^h1}124x;WnRvْTԼҒĒ+e78͸9[1`r`x340031QHIM*NMNcxՕ{h["Oqv._xZx` mR-7 *L㚬8YGH M>9Δkkɻ'e($MNԱW(L~s*^F6gr:#bR %bb%U2t̼JA@jjiRR2 J20d$䤦X)@aΏtl#EfI#X“ LTX4z&O>k,=*\ʌ !q.LTP-lj ua0_lєnvfIw ;9En;LQh$Ht;z09X4vTi:8'7eN e8'{Lbg).J썥a 2TPwrI@m|Un4!E+Fb1`s[@JjBQbIj|qeqIji?a)ĊYjrN*=?x[ĸqBH{eONs v1 y x340031QHIM*NMNc`9nwZ;us44M4 n,x;q| ȷ/բ x340031QpsgؾGGݏ%,-|n-2( rutueHfrYy%X̧%ϓe3&@/\t7@ ?ǟ~Yv޶;JlqQ2wP77op`=fxqn-VPv&(7_\ ^l;x;ǽis6S$3̦x340031QHIM*NMN3dxnk_:4 tlMx+Bf5ͫ9''7lx340031QHIM*NMNc` !ux'+LbBWLd/0uNG J3d'93&Kjr)@Aqrb[bNq-=\Zh1x[ĸqBF>׍^{< P(.Jft̽Lyv@GM!ק,x340031QHIM*NMN3d{<f;$95gWcx+7_fC/k쌛WsNb:fZx340031QHIM*NMNcZ&`ǼN>+:x#tcmQEF Lux[ĸqBkK܅vܛsURܥl x340031QHIM*NMNcL5ׅ>v xUrxfɳ&WlƸS fA#N Bwx[ĸqBȅC\Nyг$ٻ ͤx340031QHIM*NMNcؓʖc{፡'˫ -ox\xC~K+->#hx[ĸqBHDEO=`AQS6J x340031QHIM*NMNc~|N`gcw*usx\Y8!Qab/F_6{31(d~AYMֱa/*9U$cCֲ' o~&;c,E 9`s+bWZj Qox,|W0!vbܯɑ_611o^osZ c'[x[ĸqBHLӧhώZR3R Yx340031QHIM*NMNcxƙw릊#m )2xnxbwx340031QHIM*NMNc0ݥ C<d}Lx,, 'x340031QHIM*NMNcȟ캯1H|D Klx,|A]ztd Osb2ex[ĸqBȔ%jn'iqCFFL x340031QHIM*NMNch1QUwqi}OEK3W_ | ex,A]zIKY7/ue=3Gx;'GbUټ~J\zNA E%%Ey Jƚ:J\i g1x#Tb* sex[ĸqB1υ[ּk9 \&@P\0}?&aZax340031QHIM*NMN3dp4eo4>I'S68,ot\x[ĸqBQ]⛍£6ȲM>4<-VJ9fS$x340031QHIM*NMN3d1`Mwݛ~MbSA ?l/x#qLl+fkF|x340031QHIM*NMNcչEV"u1MKNOwx#qCfurτ&2,g::x[ĸqBmr8_.Yz(%3(siFy[sdWsIjx340031QHIM*NMN3d qsle>  x#qLl+dk%Ԋɩf@z Zx[ĸqB$XK q?-e61d U/wivi|6GOKԦx340031QHIM*NMN3dp9ȜЦD'BS ;zl x;&v@d=fWvFx340031QHIM*NMNcu:/ oj+_s ux2'rfK:FԴҜ+U(+v4 Fa6[jMV4(NKMQR3& N7YAu4L4NcWuU~lz uD'M%e\a4yP$s;NB,x91r$Gy~~Jf}z͇n  {ix[ĸqBCљ7Ѷb(%3LoR~KKSh~[25i$x8p4)7zؓloJ+kdebsecan-0.4.18/.git/objects/01/0000755000000000000000000000000012312063554012751 5ustar debsecan-0.4.18/.git/objects/01/1f457d2202c5c0461dbb7362abe06219e536e30000644000000000000000000000076012271247544017733 0ustar xڽQ0 yΧ0ESSѵt U!MB8Nime]Rt8$$.T;IѨ7޾x2NZ=(X}j``nb;ݐ7c;NP~y3vtesֶy,;Sƒ,L$ڴ7Oi,}"B, t JNs?,g@% AgsX..xMuU}% mͥ8 I^?)xKŸs#֍W-U n4RZ.(*ENSKb^|N=2B-Ls0Ϩ'+kA-G.vJ""<]#8!͖wus%f[Uɰ^OiVi =Na׈BSF"i 0Y&\lFVGzinzܹvz'&_=LNH+debsecan-0.4.18/.git/objects/01/1539fc4aeb6ac0d6e0acfedb13185dcd9e64a20000644000000000000000000000013012312063554020522 0ustar x+)JMU0a040031QHIM*NMNc*ze||Q7kCĒT {] +̏[7-A&Rdebsecan-0.4.18/.git/objects/80/0000755000000000000000000000000012271247544012767 5ustar debsecan-0.4.18/.git/objects/80/44656f347bce92d5ba9abf2a18317fcb4ff8a50000644000000000000000000000041312271247544020347 0ustar x+)JMU027b040031QK,L/Je8lj~sbkt]Mm0,rsgؾGGݏ%,-|n-*MNMIeX9sT_Þ1Yz/TM+CݜK<^P˙RR2d`9ZDzP Oz#7麙UD(Aյf-[VIl`-I-.).,Iecagk9X*givdebsecan-0.4.18/.git/objects/47/0000755000000000000000000000000012271247544012772 5ustar debsecan-0.4.18/.git/objects/47/95aab0e6c51692455583d263b79cab0be41f5a0000644000000000000000000000031612271247544020120 0ustar xڝN ]go7ƸrĸqN.I \6~If2k ~ ,Wj3MʄN&vbPDkeD)9I8T8C\F/f4Kq ޗڲ/y/tKX0\X\pl`}ޟְwLWe9`_pR? J>m[2& =]debsecan-0.4.18/.git/objects/8d/0000755000000000000000000000000012315633604013046 5ustar debsecan-0.4.18/.git/objects/8d/161babd18f8b16c5242e82ca193dc14bcf90f40000644000000000000000000000021212311570206020310 0ustar x- 0=).M"|ϛTl#5(}{+x94aWx.tF< mQ uƦxq?QQfb6=>Ic^.8Ǟc`ڳaV [-debsecan-0.4.18/.git/objects/8d/32191296bf4ae73598681bb48a9c6e9c01bb880000644000000000000000000000307012311570462020061 0ustar xڭVnGgEA~hQvM\X)(ډt=ڏ˩-˜ԩS﾿szpx3?LF4OoGg-7^NozBw#zыG8}7ww h /u^M[` f2`THkMZRsOt~~BGw7dyaK:9p&NEe}K~r+#yėuS8K=RT^.*ۧ?x35WcmBl9&U9]#Ȉ-s?Ǣ wiy:Wk=&-@}7AVG^FFMFqX~įc ' S, '*|ۄbo3B\j.%*WaԌq؎ VP9_,ʣ Ⰶ8 a7='debsecan-0.4.18/.git/objects/8d/6f176fad0127951fe0d4e87ea9ed6882c1ff5e0000644000000000000000000000100512315633604020363 0ustar x+)JMU04f040031QK,L/Je6wOj i21C׽[RQL`F '/l8 凱d2M&G4zvdǾ>$W}Kk*S\I1;8Ǻi|OJ64,A">88ے4wxN ҲAhoF eݫgn,/KLfse*pTZ NϜj˽7: rd2]Ҷt-Lj&XI9QzI.?٪ah` !?QjUJr=+ ga|U21YTX"lW&0d@mU, ~ FH%9Lfߚ_萳ZcLɫtT2֬:ZnP!H(GdK޸T 0JJ%iucr6#pɤrw^~g<"ؘaҚr{m9 sу"Ymb`A`:.(ù lWT$e4W;4;d`cD~- !X6,##Q:Ulh17RXaV f5gS}8C"ϝTVNʶ:g$̶ž'"ջl^jg?-o+@>~+_tANt;zᮀWinhbi#1܇x '׉t]<#ov)W00ƭnRז)@_EʹJא/uڜA{90aÀ?f|#3?rvy~zuB:܇ mYEk2Nh6aT/R-aG7U4[ KfM։Υ)xmf-=ݦ戌F7|16G$}=7#8 Z_= {{ItbzuS +VoX3AThʮ}QE J]v>9d .ɂVv^L`8IO1#1> >m6҉TE [N‘{; _Hfa#õu7~$ r{HiugB/=?s圍]f`Zn6#m2끍I k?q:@3{ eXVa|ru)>V՗bV(ߟ w! ?Ki[߱F,Mc<`sUK'd~O7pdebsecan-0.4.18/.git/objects/a7/7cccd29f12e4516627f12c44d53dd934206e910000644000000000000000000000740612472425113020044 0ustar xڭZɒFBs$AвBݡnᓣA)0OyYKsf:k,L5a㍼bRmy3zȪ($߳*4Zս{M\BH-3^ʉLdf+Y府֐ɔ_*! ^Ɗ"V9~/T%ViTJ숕(XJV`ݏd6yq|V-EZZgqb4&vFSRz'H7/ˬ?z>}P0q# '4/Ubx:DE,\EY:t^\.yfT!KK^ORUEgk0 W C*Rt%ҵb񄱫*1eĄc;.vl޽oG,˒59jɮJ˦,KX0PgOH2( ),6vg_*aJXq'ŭs#XZ|8RBUy$YzQ/s@ɭI&.DPXlE)ו1g.xNcxtY9GJK.*KȯWF Y)EQ DK1T:e5-NPe%Oe1g)"}ZC^{BFs}"FeHHB-Y'gptQ".y- cw{ub.{WbqbQ>H>p:N(c{$Q3%a2KT:x\D2(p0t{%*ux?E*3hex^ҩY"tkI֟BE%?>{y|G'רiU>A[uɍ*A.n 8\|1 TwhyمA `s UKYAзӫ&HB>X݀Ђ$r#::Am+ rȨU=$e5#ZRS1"䍉MŪ1 V sn}"52[O pGF 0fuOc.g{/4۫I݁xV"I:FEqs{? 5 >:(8c&+nU^#xm<ȯ*OZo>k/j!<0p WbF7>W%O55 ;"N缚uբ3#3]if<)ypgdIJfeUvs]n{pɦ+6Y@Fĩн%΃$թIՁ@gMj?:U閁tPI码P0 Ъ1M)tmgB& |l@\Łvr]9]6rHMJRL{z/A2DVn\=oaFU)xQ #{EЊtf>c/ Wu+7h6\DTh{~ZCs@M;h7 Q{ {k.{Gu$CoXSԢz>$R5%X6RԺ.f?!vЁcD $69 bCGzgR6m1#8?$wR:!4ܣM?g)l4,k"NgAK]$""4\LJ;*{ lk݃\Z?ʧ+Z.G|gA~x{"*Klw-`ѹkc@x}AT~E٥+qz@]e6o!Xݍٵ^0d>*11A+2|BSA7B f;PH]Nk f"y6K)_C0+lJ<`N"h&:eWIy2%J<@+'4&1c*]&uhw_:~GMaz?5alM9fٷ?-V5LVĊ=z(Dln;sZD E*we!Swt8mzȦO~>KXKbӱG=ZN=s3}# g\<7_Eo3iC)debsecan-0.4.18/.git/objects/df/0000755000000000000000000000000012315633246013126 5ustar debsecan-0.4.18/.git/objects/df/d642fb6fa50444fbad99b704d44b8dcd95b6800000644000000000000000000000320412311570455020426 0ustar xڭWn6sbE];hMܤum{BI]$R )47J{kS @ k-Eg9C'Iݏn҅+(=#/ #o)[7n҉Z ONnx| h I)Jj/3u&-$'JIJv c=+b.UWmz%=(yGR"NMO[sk2Y(CSzⅬ9.0M&L\%tl<,{Etbe+z Xh2&43=#腼Tnw0E/hta3|> c^\k$]HQNs}Q1 cw_?g[&q^j$V3Cܬ'ѽ\LT&Sz>{aS+~frQNb[)*|uG<'ƄO_'w?LƄx^m,`׍1E%Rhx,]jUg}5?*7YSﱡle8l{eIn'ֵ8?puJj- ^>DfiSU%煯[/dt*3юH&m-׍BL PҒ ,"V;%;[Yd=ȮR2wRLu97|pUGtm *hddX;9Alw 4C)Agn(YTCtL^k=|\:t dRNQyff}*C vZ,mH]4$Cr0 WɔMN_<[5i&K"Jujvh>82kR[kcLb STZ"7}k0dptiD&J QWSfAbVxdItQC܌ :8ígHmbqgEbq-e$ayI4CwvËgܨ//^ t9cᩛ\rr}q zzM Mf37ZX`2.T֐Kjn7k'y$`TTT*k` iwk wq;I )Vn.ECυUQ&d9WVJ)b9--DtlkQVu)M9݂/嚅}&5+2A>0F[M$unڲ{M+1'debsecan-0.4.18/.git/objects/df/316cc985fd77181a229e4dfb04e014088bd4930000644000000000000000000000117012315633246020126 0ustar xuT[k0޳~ylYl7[({,Klj,eqɹ4e4ح-ן>|@lde~|ᤪw~JYn3f$kf2i=hŁƑwYTyuމL۵3k]F0INhﵸ JCäf@ޖɬ<l~vS?AS|4Xj{•vœr6ga;y@Ӊɺl 6cFU>6l,kb[ϵRw,83Iz =4JxI* d[ԚĻ@(!ػ2 9HDŽݣU9OP6K8ѭ\*@V(ta`V\X& RD7k͢i;\^#T4J-i-MEtpi|JD1J$il;U?*w5-Â~ ˲Kw`FV'$θ^PO~`;Cnοǂ~X]Na1M qGc6mF׿ Z&^Cx;)*з\Z=9Z`{~ o8,`T:îMf51"=~̿rX5]}/debsecan-0.4.18/.git/objects/d1/0000755000000000000000000000000012311570462013035 5ustar debsecan-0.4.18/.git/objects/d1/7aa33970f98f6cf6b87389760c7a2b9a1de9710000644000000000000000000000676612311570462020165 0ustar xڭZɒFs$A6koCj'G( ,MQ9K0*$\3s]K./3_fa a%R$\8{Ve'LdL/cog .UD<]gn4ƾ˾w}׽woLG-$ϳyٴ v}`fe纨r.ķE r|JLVID=/IE"z `<1jAVB$BU,_UsEI~걥欚su]"3.y)(QxΙMłłK]\N3>U0Sz>SLii5xD2Jk~4W-`zRLT쓳0f 9k~Jt*̆yʱ-EK`PjcbZbTaz'Ҭ*Vl[%zs=ꙛv댌O._o$(hhzaՀ!Dp傮lyFVTP|30\d9lcDfZJ7";Cܨ ly1v py{58 F#X5v$#%עpa-A޹d3$%nLJqHQ?%hZmoGf6i[E$~g^d/co8F^J/3cB#R 2&J#? _@*3N(f3@)J@eV#lQb!:K:-DY:]71^He]]yb2d~*5{R1]?+QIId*%#8w+S_Ixc78;8zvA\5L<` (`t%Ut< }3g'ǘbk3H78j.?Ts]Ϗ*!HKa138T~ݣhĂ'.$\\|QwvlPE,jeܢ$$R{"Y2*QF.@1D-dNZ L^v ,{5jKҧaNSrzAlB&L l&mi8d*JQd6oWL))H9BK$Q' 0P ?/&"/e@b 2#Z詘NycJ,[#$Pt}mP#S ~j)=r y 8H/>r6a{ ;PZ/RdYǨ(At@yȎ(~Gĝ&r]eVk<刯gP-[W0tcg5m IbF[F_D.bF7> Ykj`AvDZk:%zUDFn[߻~U .T3U{7r]lbٰ*;_ُw}!LN6=_%&DJ[uGW"l.@o3AL$[u 7˹^st} q˃vJ4;gar *DAFlqIm4k]i̡f̄yՆ8;n0Rܓ~ fսs'.jԪyt3ޭ d .! [ װbO񓝁FG`Ets U r螛u״T6/kM@5E٬3jZv!5DFxp-ewdTC7vQy&\O-3 7 $T`dfW/h^k2n@rQ^oGMLm\'}ٵTIVD;bΛaOh\چפ;0WxGh Ihvm"Swtq6>XzKr(oUBͤvkdѶ+WGq6ZơkGx{~[Jݰ ۼ2)d TSa_A M]Y6zU]LgsQCԗ C(=Z'HEo}mAif'"n}U@6FVP:}?X9VN|0a3b{DhccanYF-ܒw4Ш{R \ǛfFba6ҺwW n05}Q kk=6l63-@lObڱ`!}>@oiC2.R߰T2k j}&ޛS wgknL1RW ]sjg2ϝ[u#Nߢı=5vnύowKXό~,H9ra;9l3i"&Rbq}d,2Dc:KC?\j^:N5O٢O6Qn=duF'?WģDtmT6%lMRc@sH-gY7OpY6Ý{z+ddebsecan-0.4.18/.git/objects/52/0000755000000000000000000000000012311570462012757 5ustar debsecan-0.4.18/.git/objects/52/958351f8af4343ec7da8e00ec50ac90afeff790000644000000000000000000000304012311570462020343 0ustar xڭWMoE_QNd12J2NR.53to{^~Mnq@ܲW=_H`{gޫW˅qa[tȑ [m04t*UU  xkKG5PM/`q(! 43j62)! 9.8NT&Z`?B"gS Hq^S_p*`_n}u-%CnL D8ll)DZ'G8XO\=H`ͱ+kO@ULQJg̭f\F $+<:N&flli +!tC,z=趸촖&EpQŊu&.w)tnIˊp`YѪeG{3+}T; ʺHȴ%)nK4:E""ߦ- V*7+*8&4gFܑS˧s֪BTXOe{}7 >@  "ߛgk)ny|H{p@6M"v`bط^i& ALƕpZKu$Z|m1@퓈Ib61v)(V=LL}QbŭĴX.k _V'J{jig##퓘HT .p}]s4i6ydebsecan-0.4.18/.git/objects/52/a40ee297e59292e8ce03cbb0c34fa56398e4150000644000000000000000000000041412311570462020117 0ustar x+)JMU027b040031QK,L/Je8lj~sbkt]Mm0,rsgؾGGݏ%,-|n-*MNMIeX9sT_Þ1Yz/TM+CݜK<^P˙RR2kxf;Qwb/8U*ͯ?r9[~@d>Z]j`"eĖ |~ْ̒T)t~tmdebsecan-0.4.18/.git/objects/45/0000755000000000000000000000000012311570462012761 5ustar debsecan-0.4.18/.git/objects/45/eba92e18339c236d223f7013f332e97388c8c80000644000000000000000000000304712311570462017715 0ustar xڭWn_Q#ƍüH+&o3MN=݃~B? JK/|A_93I$@D4Ns5vL=:>-d^Rpx- 92;5-}r^ Ξ}٫gG9Ji$-NcESHGE%I\/I>jTYTIj*T/xSUi ~Σ! em]Nyo]ld7!O:|;кivr9ʎE.qvǟc eNav??b_Q7 ~L#FRTn_A>7YKO4>-7pʎ Ҡy  Z(%p^7{ˍLˆ&2=1M5VKaxXܩQw@gD qA:XF&l,yi *sri /\#1o6-_^kbJZ]I|0ǥRV 2N9 B@^.dM.h 1Gؠ&sB:yD%$+4{I0˽޼嬶\ACc,- ͛u7o W>^h&V;ZT7o9UmF8ٿCO&iyi-l#ؔ4ڊJ`!QS0}^fC,v3)V*qvRn_4=cףq,\ kԵc3raDEc|{=[3Ȕifu”ԲAL1[yh$IRFvDDQ n#8 aXT4!5<7pSUIBZb0X.ydӣLmtatUZAmIwE[|6Ri"3c/ c*ZE[G="Kܧ0ʖz޵~6`Z֫+`ĺJ0چo`d 2~ͺ/nBy{C_˜޳{IÃ,WI49'40VDFp'#H$DK(vdd$Ȓ[3QDkP%6xүt;Edj2"1 dhu|H˫ֆvo/,8 ژQ6mm#X^ʹ(X HPfy*"*n Nv![pGdkJ ly(317# wAi/ I=+R97hU?˵H'*qck[RѴnC-Jھ'OFKf eUS ԷNsk['y%}#HJ9g'+R ٹ: 9Q)fJH8`O6z9Fb`8k|=]]~^G`E[FOEbZp-;6ʸz. خ̙debsecan-0.4.18/.git/objects/57/0000755000000000000000000000000012311570462012764 5ustar debsecan-0.4.18/.git/objects/57/7d3769f6b0d7f57b25d858c4cb83542f7fe81f0000644000000000000000000000307112311570462020161 0ustar xڭWMs͙H)"iʕT21;% Sx]d1%:R:w{¸=~#^`TΒe3,):zžQr)Gtb 6ցf0!z]+jmŞbTdt60fW#{Cv㶦/B'Zy:7ٙdvܦi6gcLy'qvͷ:~)O'l{bvӷf7iE<3 &햴^O..M.3g#[$^430G/zsmvo+gt):&eز* d냣Hs9s(^ GSφt2On;ZV- Ji&j󾬑>SV!g%{-ft 7*k0\.y:)DA ̲<]lɴUj="z&`ZeAl* |P֢l}:>h\h^ ֶQэss?)HTDZ) LΜo4{'r^AuKF>1T5NU(ӉYQ 9I vdu(buM>}BA(YcG J]m魴9>2-LNtM^tY{jQΡ];Sr/ {؋GC}TUU12cU#Q]k*AC[0R@țƍV쥢 K࣋xSBh]0RW[ bV;M6wee{ qw5,8?%n"DjmZ\EC}\,[%ž+]F -^?7 }|@xawd&}DM.Mb/Zəjp>?d aɥW?\\_='fZ PAۊf-%2pR`* CSyOרX֘>y֗8IuM[:)ijҩµ3DH 灷Ii+Xi !_KO~u6rd)"m'&H,$6wfdh'l}BsPI.A3 } Ɩ :]yP9Y$REq_t"0$L丝`G\/5r*tbNwwTFL.j/p>2cp`|qA]9{£mk'B'(m1y) F%(Oһ'EƕXyq&b+Pvoˈ(Zmb0),.BfsWŏT5w,w8c,d:,T+?'+4HPH7˥9jPwGSy.`<\=6M8DCLcWi3debsecan-0.4.18/.git/objects/e6/0000755000000000000000000000000012311570462013043 5ustar debsecan-0.4.18/.git/objects/e6/9c9697e7cb22c986ea95e2acb649a5ad6a0d490000644000000000000000000000363012311570462020370 0ustar xڭWnGݳ ,!Rf+V,JtO{0s"!cg(kZ᰻իWչq9|gzH% e)zeQQ;<; :0v(h?={W}Jp>ѯ% hu^LL-0MnVCpj5w_8RӹƻgZ휚L'r9.ӊDh&= 'iݻ@[w4=퇚Ov+7Q:fYI$Q 1i\=>y8bq|+JQ q_ T_D];؊B sbvWqkL0Z({rK_t1fZcTLA_[:O^Y,f6fb!G[m>ex^v&;$;S"O蘎N|r7:<;<Ύ??rxԯ}z˷ qE6_m"U=C> CSJ//[hƝeªBIcͳZ w>;+$Qx80Gb9ZABb[R V߶z;aE?v~I1}- N}OYwA߽+B;K.DrM`j5"lz"Vٕd@:"+đ9ۜ۴\JP\y)|Q2)2j8pOJU`%E[ORpyUm~B3rR(@lF2(V-ЅD4/f)9 Q t-Km z`" Y%Iε~3f$16#Jʹ.jeR]!lt k)럁* BIbn<^ A guځX+[}0υGQs]wkܵPpq܋Rqmt'd#x<Dr3> Xc~]j`IH*>ndc9ߠ<@)g-|PQ d˔-)q }0ׅ.*2G~ =a1 vf޷$h`kYb݈Ry`KaPzs e<({H"?Ͽ>8}GY3Q`I0 B,u!Xn9F2uuvuv8əsM'gGO'gW|0;pvt\^]YnU]3f{]8u~ v(^_mG'6pjw͏T6y?}%;]+eg6 Қ?wl؍Y$#{rN*X8e_:(ϟg@p©tLذ l*VR m-qm-;j .ȨFz(_ɽpet:';O "kJ%RRؠ+9 kYI KŊx*َFU'w7ZF1X\ٞ1:R rܓ]BD>zQSZJ&먲"E~0*aɜ$?mtk)V#A2:RC ]lVpkT$P/ ATӭ g}\MU_!+S`NxEyHSOukw-67|TUA|-#]%lٗ*I q<0NȢf;s-fߏ|P͝]U@vFqeBȃ-"YɹYEҪlDԛ Ԑ!V)#"\ChMBw5zVh#ڃbE5F=t=TbltPfЄAm8sAQKŏ~=:?O+\.<9@{txM)ǁ!)*E݀@$zD %iG?%PN+rV5H6sK6HDExC$A(/ƔX(q*α wt .<6ɖ (-n!#1垬6߷Q 6;N|:^K'D@aI+Q'F-dk>\y;3)і2\Hai`A]mz9aB2FHuT-s։df킕ˀk(BͺQU_x(s~RIm>F|h^K!V* I' Rwpݶ -6׽R=S8Ļ`zC/ #ʉ c{?k_debsecan-0.4.18/.git/objects/e3/0000755000000000000000000000000012311570462013040 5ustar debsecan-0.4.18/.git/objects/e3/fe42a611c52b8f16fe8b1dd524b33126f716760000644000000000000000000000265012311570462020113 0ustar xڭVKnFZ( av$9!9" MY{HvC\$;$yhH D fw{zY%ii֙e3ljA9/-gB}Ppkm\r&?[ݖWkUm)Tm:VaIi$Emʨ+$>=. fB*n;^JSشv8GTMH f&c;wed, $v=Ԗ6+8m@(j*!8.FcGz}kkF,eǨ#+ELV|(k"X8{ϒ$Lh2O}+Crۧƺwr5eɭtaFJK_moŎqڡ:&H`B/Pg+ (oJ%3 BrJ spRw^f¹S hJix+ k&V0a`KSP!^)/vx!\࣐o+*9ҽ/f{aT2w!Ʃ"DhP%֦ٚpHv%H& OYv^Y  8vѹy˘\4ڊZ`!SӻJmwیgQ&;U`$뛚ԮL T Ck3NvQbZA08J#sD-q.3* H(C=فMTOT_|H㗕B|e]0SLHyf*=˾AvaߍdD4sd}cK?)|vݙ ☁m?(wT[BHW1)"<i@%8{'G]m`o߾K9+U EgE nRၠQA&w-hJIw\$s?~!=膋htxx!*=e֘}hqihQWy_C/@pJnL#e0]ݜ%2ۀ6n3?ĉ[yFBI1@$|Sy?np7JL˒G d7dp1keKj7" o媁 |H>>U[K::3txSKV93.# >ϛWYF\ځyp(7MP9Kϰ$H\ ai< + zs` p붂=+ͅZ9?pX%ݠhM^ 5J3H8`%o9Y$Fqoo^:乺a}Ƕygz9SRτRw]|7?tE׵hփo%[e!hSIc}>C}:8z ,}i1Zٻ~ݹrWRn%[|debsecan-0.4.18/.git/objects/a1/0000755000000000000000000000000012311570462013032 5ustar debsecan-0.4.18/.git/objects/a1/cd8a8a2e881ebaac8a5d10c1ef4abe7166eb870000644000000000000000000000312112311570462020616 0ustar xڭWMoGٿ  %'`A_zfjȎ{g kt ,rX^ 06>"5U{ݬ᣿=>El0*jgɵw=ltUZO]z6c:Lar0CJJaOqTdt60ך1/~fH8=?o6l*.]G$%{%JU2zl,F^0bOl O+J۲y 3A'w?r7Ww>/dWMM7=[ 嶠.SLEJOIq|BǟM>d1x bdBӇ>U8R Ҹ-.Yuӑ(xb6=v{߿ŋ-bP⩳-\S7JۿS=W>pgœXe_5ΦQb/iHU9gXYY8P{ O,?]q}h])Ą ۆ͒|ujKg*BOJiaw .F %C6e9oqK QDj!HWsԵ/- sL#`Awq뼍 ]ÈZ4V2Yum nLaލAZEdcP&lɱͻjJkMź\jUHҥϪX)6[[z׋f~aUoiV_}V]*VQlm;Ϡ`#hbpE*ZϬHH g_NHz1_2L4HDƑdi!f"3a``9w(WpΟp!nRo (w~iC˥f6OcyÓL.e\Iwy+{?6 ?aB噰QAH:'\=E9z.(ꕇ\='&ĹJ>~>+@LoS CKE ߝP0h$[(B_(vSEA?]~\e6SJ2 %b>#qto8/JqF+Lu)Ič#)ڢ\ҾAvL1t[pQ^$YMr+dPLkx/debsecan-0.4.18/.git/objects/bb/0000755000000000000000000000000012311570462013114 5ustar debsecan-0.4.18/.git/objects/bb/8c91132b9a8a096d284941b89f930cf35a72c60000644000000000000000000000267312311570462020056 0ustar xڭVMo6ٿ>E,_hmE@\(Fېڛc>R:ZۂL=Λ73dQqAGG?ۡUW.T*ZvҦT % ESϱl ᯶!z[4hj6PP!7.R![W*_QGUr4V[GK+g?v`VV<`Oy~wSLgt+f>fm}3 ٘%;(!wLi=&18?Ûnqva6l}diootսn3b6f?wni66{4|1f/F4ҋӞ]4s,*Ǡʙo^Ȏ7 ٩+Y[7qaɩ-U0WF9yqbB\Q_  g|´.l"S0NVZO r iZ3nP݄}mD gw~f|ZqI!񕼞qĮ44WZBS, qUn)p'K257kHPbkZ+W4)sha(^յ%U`݈Wx 2v6I-g̈(q©n?K[_j)u{JI`ƍ_ BA)ͶF (H_/ W Jz?D4(? h710asOk.#KZ#2'RY~dU75Oބ ]_r9fTZ(gTbܼeAU0C>hH~8~hhpS+@ITôD4al@Pbc9qT3P5LVE53F'_;L;I?k>MhrMj}`LjBID M"Hϓy)q-\Gl!ՎH?$2;",sC~zɫm5LTS/wa{R`˾IJaLUEeTOOU,gSm@XdjCU{{=R7BHps"MW WVJuRg:mK>hhS4{  )/9i-ƉRBHGb.H]9Kȿ*h=^*{gDJCVI o.%յ_WuH+h-,ij͹h]4 Wؤ"KmapAwpã}b S0Imqd:4Q/6L!!f  y5b—cV M]BX\܏w ߸Xb |#pj2ԵW%Awxk[ufx_^qKV-H[[^aeTr1[ʹ*Y/*}%QO0MY e^lJ,.hő4 @3xvvט} ̳¥51H|A)*?{kW^Y2D5{\p ~*4۩*e̙ui|ÛẄXЖ 2af%~k.BYAY.I{i' k Yt^c=τrt۪!o? ;5 Qi6$L HphB.ò4Q L6&I)_)5,Uxiq,"킅CH0Zé|ɏ鹃 }3H){+:)&4JK܉s[yfY4D{2dgF(\0c塈% n2g!gk)ѽ}*w܌ $2Sp5G wBwGDi'5!Exǀ q?`i|"8=8=NCdvl &SΓ9E!_A^& Cŵ&QИ'LCRN8X/3}*8'^^¥xGW WZ$$2jJ6ڦG 0Ǥ@1Ks&4Œѡ&F z3zm8v"=A)1DZg&8m<^' U1+ nO+ Ow9d[2-<=qS= !!E8P{3ffR#,Zڿ=3-;Y(RZ{wҐXt\[KD@ oe]d,% -M+`Ia@ZTOsTMw[dUh[tȪFň3f[CR6"W2U=*<LgzCJ;?t}1iBMmzJNvQR$ vھ 9>]qrb3*_[*mg#:dW;{%e{b.ta8wFTOV%(g[aQPJh$J^msi'Rۅ4[ৼ~PoMn%[B ܻ|T#qUuf Ձ^PաV:1qmZ| p``qMZh@JV kѡФ-b! s /jA'4ɑI>]'a^ {䡃B%n<vEN*" SWі^r5B(fX=v5Vye=9壾O %L :}3Ҭ#Li7eGwy]?-t3;hw<{7debsecan-0.4.18/.git/objects/ee/0000755000000000000000000000000012472425113013122 5ustar debsecan-0.4.18/.git/objects/ee/13e546d9414103da597a69a6def793682315cd0000644000000000000000000000272212311570462020054 0ustar xڭV]o6~IKi^&$$pBID":~YJRԀtrvvv={=*de.LG'[:UՁ<ÃxyU+OҒY( M!Z$ri$).u"oD%9{aS_G;TANv?;{#鼲f:` MOzOF!y몸I19Aq2;Hf4{6?:~r7R.Z"98Jf3:8>r0~>$Wj7.:[Yds+KLn =L^/VKaũS74}Rb- lVW)J/ŢWk|Q7AҪD{P`A[˼zESaI>{e|][Ț\R*r26rIǹc0Kv)[lxsNF6 Ujp4TZ4?ba$IV2ř;IRu^浵0ccunF)V$ȷ//ESd;0l!< U- jh-/zZHy81> sp VP%DZ6MHlTS512M VE"]Tg,Emz׶X|7-HjfӘo6_J𓝓p\$Z߃bƐ;f Qi5.x(,>j-`zAlH*4F1ƉJ% r|~ߢ&H,C@+okhj b@R.;0(97ɊA&֥h 9g'׻hf>\d«|OٛW,ti &z(VF] JnMމF:Df{(I}q%Eh,FcrX MG'~+]W)Gko ኅU1.I]oU|c<ʂU@?4k˩${}svdgh{\Bp[dt6" !T/V<.!MQBqx ~װ\(n8 /e{w.qn$5 <㼔$` nkQ( lЕx&}$|'~dE9LU\Fϯ~ؚtpYtHacP+_A=@R0*&bo&53ASȖ/IyVOe*m1xC쇨Z{1ȶ+c/ٲ~|F _֥odebsecan-0.4.18/.git/objects/ee/64bd175c6ab79b8ac7ae7939f6e5d7667df7f90000644000000000000000000000071412472425113020472 0ustar x+)JMU051b040031QK,L/Jeha;Ux (.*?`=Ԥ<r^?xGA%g$楧3,9siГ4:.Wmo(M)-H,a^ G} WWR@tρ۳XcH^m(3=GΞ_EC|V TQJjRqjrbtM>zr|wFۋf Еd37<GohAWX_\W\AJZnUrjlr}IPշٍ275U(*>i5]'3|Vye667v%debsecan-0.4.18/.git/objects/eb/0000755000000000000000000000000012311570462013117 5ustar debsecan-0.4.18/.git/objects/eb/9b88a258748c97ec6dbf036723dc56df4417f30000644000000000000000000000307012311570462020226 0ustar xڭWMOG͙_QClY/`qb;#$##EgvL?/,E)%cy3ή)鮏W^yesjά q3T:*9\(󵗏5C{5bEv2sz4!ҩ^ZVfz֍~ۋ4~hJvL^L. 2" a`n>S67ʧ3gq2G򃥣~qosT,d?Ƒ.6"k܊Ev8 g;xwM'윧گKCvV̺hߚQDzХpf@NON ll?GJic<\VJCvٱ)lh@N^6zԘʭX98b_8=H7=Z~,}dif#]) J@pea]+jJڦ~*Ϥr@JI(?v`WhE1 *iP͂m ,G/[\@w'\ξ÷V*V!23'W^NU"0$$Wyh5IOj1R%=Ҵss ҩi`sy dpҳ< VMP齶e?#g)4%V04U$Id QJV5OSM* ( S>ޒfͩba2 +]ФYU[\vnU1e=T%̚H2 $@1 v)΅CX/ޜ>u"QZTS`e`*b +.{-뙇/dĢPt=A;n|BC F- v)n iӕTOb# q2[Xu}GhV"ײgzik^5kq>l{'ik ̤}M?` xld/{2% 9X oZ[-w&z# debsecan-0.4.18/.git/objects/96/0000755000000000000000000000000012315633246012773 5ustar debsecan-0.4.18/.git/objects/96/fdebe6e6bd9e49d5741fcc78d93d5350ce7c860000644000000000000000000000315312311570462020464 0ustar xڭW]oGs~U@fRH]"BQ D!Vfwivg̬5Z/}빳k{݂JH{$+mF{϶s =p.5N f2TA[Ev2sz4Э^NNb]n)KнRȮNj 8nϯ,1Mp^;f ';cY3MpfAgs*3qӵz?[ptgx,0Q;%JQ5z]k)QDծ& ϯ10UeƔ `<ckE[ElR%ҔVW Q"JMIrnK$mF] ~5rSv?gFv![`.״_QP\`f,R詍p`*FP(aA+1H]Xȵ}2:JIc˱F~lЇaBPE5X*!4Z+I!6&(kip!iq #_I,E`3,<\Oo!4,r4g3`P3 TYX{ֈAaa.ba.<}ʷ\tP=fa'R'FD~ؗk;p l!-kZfYQVrY5>[<|||PeA2d|հ6S4!y5UV2d֣JDT*cvH+ o^ R tGdfxըRh5e]`'ё) z5a~$&ya*_ +SsOPU-@ELvK*^,Q)z]jt)t^ mak]5=쑼ܽt2oD§4JSno6o(:Vp_t/!2\r\Gm7 "1>Q{U(7%debsecan-0.4.18/.git/objects/96/ba9c3f78441d193a92dab54e5c73764af361c70000644000000000000000000002664012315633246020145 0ustar x}kwF_C$O2;É8rJrrgd- M#`P2UFlgw>Iw}?=,ivT<.$SxuVv%/RզHo}Ξ/%Wd"-%Y9+YlZiZVE:^WKa^e>Mgh^)/X5Ųd~| gHzH'E:YY=rΧl`=ϡݤJ쯌`(7{Ys%]|buIej#74 F3a|bƜK>[/e?_};}w˫²W~EKrHaSdh PWg v^^\?{~sـ#PV&pʫ$]b,Ŕ͓{:= 56E¿tƲJ0&6gdg_C$[_B T͋>&/+,)cGOxt\v:?]\zNXhyӁI΋FҙM.aEWL~Rg@UR\}}E_4OURO|*Q.ϛbӑ4K(TfaOh/WANTObD볢ȋm(-ƈ=w8 Un [&:Y,T 9"A)6Lo+d*lH ;"g<)7XXK&Ea2H벲~arw:ER0f;:5@2$&fx:c@UA9f` :T[/e9/fgɒé@r,[/@BJp-yY&S>cbh|1>6#`DHɉ󬺂]豜r0'G#a!. +x.2].\k-^g{SlE;zf +oիue5XП8_d2Nϒ: ut6p& JOuMrm#I(7_NmR#sN9}}KK(,nS5_j+ɟ;3 ILڪ%Aw;baY }Zp}taaʬ!PM *;lkR7>j|Q0wV/]dtJbu>}C+Yd۴ʹMIX ŁܗFHk:i!97[ؕ @dgcp6M)?jPb&D ( ~wpܣ:,~-rJm3ϬbQx}Fgּ@8()teb0xT eshAPc}ZEOi.,]HJ-$% Up;D*O0G$AX˪us޼D}B*%19})![`2J@>+U+;cBĕfM:E@IЩx*IM,ʹLX$w"劁k`|}A  =f5*+UB+̬zMŦܑaLs1LcAX;Ub&Gf)Fa]F呬X'DxnCO*e/fI*(:eCPnjN!y5V;W{4|udSJ N'r|#0 !^ZP< pU 4剗oq}Xc ޠJaz5:\W r{oD,IJQRh6SBHO:/W"i&)+֑'v%1ĝGՉb/M^%[W w=<)D_]MY_~%o4<;+IG iF}l.v`f۶p`DeiKdA dMLgs^$NxvDs^ahy-%{M,G/$&7|a_v0izFxaC&\L|U*GhDDNE΄ i +Ÿ"uwpn.C^MCzw8I/[,=;]o]Qݖ6w|x}z|4%/H96PS2krT$|:L<a hDxz ;Wc*m%6f[D8_q^[ AbQ|mbķ"|o@LE}mIה`m#r8,Kw!GlZ\($o6U'S_9k^4Ͱ:6zJ۰F) 8 WA7C6#QE'^fu^{}ł*–tNNtZl0K+L߷S}~9/Z<0i[)5x4}"ɵA6 ^SJR):I+FEEIL-{Kt(ќ$\Jz*mOh:W_ ut:F݃,j-Og&/V'@.f&3HCI"P9Z-zh!>Ny:iF|.O{y>݀+a9>@sY&0'x?wuh Fm9^7/v]-(JD T:>_nXuieBC8 CJ+6fa-&j jQ2^ߖ`EqA!|v@ t**4c͖ s S@^fr-g,}ϧ0 U|T5S^BXn$u]/R XM=`ڀ|\ N, Ms:J2<,ohEAA}Jt 5n[ۙP( r&X(oYwm5ONZ620R-kO8D !Ӓ6HZ~B*UUۖJ6+YA,G2CGg3mrT-+[5SJ(PGXNg}~XjCؽǭ1T] V+ nɝ=[,2 NPE! -SAmmCشV{; u9 ulFjd3ۀ&O[zLsJt (Z$eh H0/#DZ5Z,yspw,9`j7/I%f[G*s<>' 0V5 {<0k9ET+$̱B:C[s,WسZʣ!A?L4vǖs+%ZFtV]EZ?jO}` xG.r&1>!fS7iVENyen@Sz4^+)3RdPVp;y\zTwpq DV m"K'|DlC_ע 2D~}h݈ ,T="ƿ>}76p=?=-#=80>] b"sׅ49@rܒi2ĕ C c1=(mGAsZloDaYPe9%pdC]SpD(WCUYЁmV. _rqqmpcor _#ZD@6jNgQ8ҩv휓vXAv{VORoQBiP-:M uA .AJA`nSPX!5%аs7yd@8C<\0}oߝ؋˫W~|mR/ȺX؜vY7κh :)<<Yq~k}K1WElfdx#Sg=pY %/l[&dcp]r(e5z)3&UjGetM$ ʍ3$}#(Bc`#[bBcD |[Fs6i-d˽r7@fuK虧EplІ78 n:noȩ {`hƘ bB̠&erk+WpMM>ysTJi5(_۹LcZīxݧ0f.pØ( 7A8+SNFE3[0@~u"Y:Vv4ux'hG@dY|WrMqG"{~ؒ⟶`e*VٮNc$Җ3OűPO&Hu'4ncC)ieT"Mf-aCݧRN4VE@5 jS]eT0 %2F*4nMyZ ^A7jVat D{ Qt/2mQ~UQP£xʅ/z- '|(1΄Xrپ:ٽ|ЋĶԈQOߧ$.g˜fB]J/^#G+ۨf2IY-Iё kbDvr ޾.G7k#oWg?@M9Ѯ ] E+ 2VN hzp4;[Ȑ*-L" 5SEC(ྔLkA%2BafST[%Ԇ^-#,Q7*AjP-GHK4Ԙl%KIM;9&T=m! @Pj5zR|$NH NK:JY}=?Rߊk*7Nl",0AgV.hz+PD ҇ԶH჈ai9N}mєXR|H;SYk~RY(}d*vRZGZttLϚ.(v*7[Ք`T,(h'hm> ab@|CˉnJGaj JAaC.Ӛ–+.J˻z `dcA9[u`HP5ܡIN]r<(GlͧS-YtTưb҄ y4+TBҦ i?a 2m ֊SҼV˃^dhMӢHXEZd@VI-U5mmG-U:k6q 7-MK|jO-XG͔Ԃ/p :tt:T.8u7gY4"='N9*qNjIcNTحޙv(~`)Brwk,a$ɌA"J= S 3zCmvq7Cg7miN8 cƳPnaW g!ƿLWM*P338[\ˑܡ+Kfx%l-yрªoYC\f@I\PQbc R_ԣ(ͩH l4%3bVC8&ez`.#Y_C)S Շw++3X“QdWuuj贻WA\Ɵx;/kl!_`neMKh>y ,B;:1c=w ,Q{a%25 N9rZG\'}7`c]ۆZSĻ)ݷ tś̻3WWz90 ʡe508~6LMG *%~ۻvz6е7V{['9٫]s3C^]*i`$g7!o]n ::*.`F؍de{rl[^K/}]T v+@^ xYk6Eح-tڪ -,rLVd@PK3 *"T`ߌ!iuZ=U29BgJGo#w ќEz:Sո cL-u@P({Mמ.t؀#^۠y:^qh Ĉ(kYQ*&dAAGK>ɢ\@4-l~>mP,{/ggxAI6chG;vF{rr805(-㊰h *&J5n…ϒqč/ ܫ2b( ='4"(>fT2xcC4*r':9ϯ-̗\M ϱy.1"'ܭ͋t89.<\tB7_۲eeTяXGW<*SkIJ]ekYYfZ3p5yv8OHF؉Ni@򜈾z2 (6ԤRލDd3 lR8$ Va T Ag wdT+z8 3}XIUfCt<8*,01u $%ղ`J]S9Jm0ًSx[mOo3cE,pLꮱ<XÄuXSmcF#陱ktb[e IpAew}ݜ;Ho3UR8 E8Qn/;ЊWa,5PiP͌6 RP%R{pP||w O\'+mmʻYCl'Lo:h蘱M4䋻H"!PyrE6)(H :CX2ts#( _cnx6Fw#q{w Fqy gBii:K#' H.'Z#7hdslȎT:(EC(KvgG<]#R=F!կG4'uPo'zGv:tL7*x $![y`Я隽%-Ѱ }A2g[i#,H5[LޏcB^Vt Lq8xZ>C}eR_Z`qrNtNwn~E Sk/I 3:l/cXIrE">ET<P%c2$_i]%nG9*ӌE~YZH8?C018$dMdSjKo+÷UG-G<=a5AH;(r-9a_=`8:r~$BWc;D6vcJ(뱼:LvJLFxhnZ%NIW5dk7Ӱ8fSNWtU 'sG7GpuqF4Y ϡedlċi޷r0-J0"ZfmĴ]I[5Caa$ rRNqKsԨ+A7McY ~-dLFKG;7{T2ܷ$ OErQ*@(ȶ4Z:<]gwl4} nX[qVqF~It*fma  J JWxǢ?H倨iI}38z!`uaz 0'Po\hT_IpA^&×GdS9u|MJjeTdJk9o et,wMnE ) Pk-)i2I5t $>#V"%{kY\=cBSy6ml䦛BLKQ+ Y;ejzޝ4[ N\jv5h6̤S]',nwݦuƉA>F`Q 1j0VM)(&%)ݞtxޒA>䜠IQZlq`V[sF[",6Ý>֊K6IEWTm6dưC=s ڦZܭp`FgL|uZA"БQaZwzͤPo6ڎõ}5沿 / v< w!Bx}w{g-WnPЏ>VCY?"^VŎEݸZIy; j%efPsW ÛHoMMHXqnឺ ,ЀF7yE l:ẗz7ntf#}T$%(CWfD!qeSK >fsso<9ѿ@zHU.\[.%dn;]_pLH庇8,iv? yqv^ չS-IߟdѠςG \qрځVY/ՅцuO:9g^դiZFNva|DX2Q-NT~Jyxt|^Ux4-'nx G)UpR( tO} 9w= %7>*|fsUƷl?nNNt4BѺ ;=~}=|[8ߤR <ݦ7Q{ I9"GU=U2!o^.ZKÝE))&`cjvm?#Ϫ2RVO Us\KÍ 6CYuC򺦆whf+#3:7GTjP0E=4_zA-ziELNX5w5mdԂyzU5o''0jx2ksAiogֺWZ#:y랶=uF'TK⚳jpe8f%KAxE(˗(ԎOY[Fqz[afGTl7A@kdm po%RŽt6d+\6)G nnmۜ+t+a5K]Vֽ/cYT /S1$,]'E4ѱ8B?pq6݇\|4Y*tO-y$//F8{  銛ю+(nj]'2kk>6q *6+QC鞕S%re4hVMHjΜgƽBrʷ4-fZ\'[debsecan-0.4.18/.git/objects/86/0000755000000000000000000000000012311573655012775 5ustar debsecan-0.4.18/.git/objects/86/c4ddf2e049f6b2eb793f8237b9c7d990ba6c190000644000000000000000000000300712311570462020306 0ustar xڭVMoFٿb "9>8j@R@.Kr$nCg|ٗ|vOA68j8o޼\^|FUN /&3sDž0zL)~#:1IS:邭SieGt4 y+๤K+&'&% ֎It9E-&)/j\7FH+LA ˽MdI{kge[چ(Qo0a|Sc}vd?FfcfD 3v>{(;N0 G8YgN.*c%>jI6JQi2$A8HŔ7TtOʹFf`S;c O[ `01k;~~ɖK4ѸWu{QO %-(D]ܩFQy䫁=,DYZv.zUɢڝr .?@t 9D!;3W'b+ (БilM{$,FX8^ 3ʰ e~/hFAF8‹-j2a_kss- 8T֮J\׽KSQ jV-hzb#Vjږ4DԬђ1>KXpJ})yu&lQ>rݔxߞrvy~qt׊?=\8Yl0]pBEi;ȇ"W{= |"W#|Qa ^INI=6nW"7C{>ABRAR|x*O#nюrf[}c}jݻ_"9#p)mjCcMuvҾXvpɥξF:n}HURq>iѕ^_-?%nst){;{,MPA#n{ MQhPZdebsecan-0.4.18/.git/objects/3b/6c641a3aa5912859d4dff0e7369999bce4448b0000644000000000000000000000071512315633604020146 0ustar xŖKo@{cam^B9@ ^=8߅NQrpp=F;O؉5(ނ C,-@95:Z- ؃FYzd:nGbԃrDfiX靖ڛX3[s鳑 X< <:U/Nt J~ em=j0#F]hR,cm0UeYal*(aOԬ vG1y@zXcXMj4 OA2u&Т׌*Z]j`"eĖ |~ْ̒T9fpf/ӌszldebsecan-0.4.18/.git/objects/b3/0000755000000000000000000000000012311570557013042 5ustar debsecan-0.4.18/.git/objects/b3/b3c752ccca522c05fb7c3c0baeaf15c3770db10000644000000000000000000000032512311570557020515 0ustar xڍJ1D]Wܽ8&#+Wq}T@w$i{[ڜSp @%aV?+`G^+m\)F[k&ialeÌ#atFwK.9'BO`OH|x&3͂s)bR?k^ j?SNˍ x bRFu߶%wn^Pdebsecan-0.4.18/.git/objects/e8/0000755000000000000000000000000012312062027013037 5ustar debsecan-0.4.18/.git/objects/e8/82a26e8af1fae924ce779bf7013dd13600c10e0000644000000000000000000000106712311572542020254 0ustar xڍSMo@+nE\'=TBHETHi\zAk{/]@޵C>μ73ѻvcyLE4v TIWELd毵Ә 1 'Q%΁pju8" ($BYP)ׄ_0Eضg<K1̰DYLISJl.CJqr^OoO~4p!x=syZU*"iKԤPVMLWYZѐ`U4- d:59wRʕR7`-yCT4kc-P XŴ2i(a:8cw(9*WȺ{헖9|+ ښ mXO lRxbjN:+W/1mojZfgώ$m&L4(? {g*TOFV&\E^IQ~WM]~|}dg?D^+),L(a8ч_$ߪUT40-3EӢ^+A>t)E 7M(=;τ/(?o#Zd0oP֧t[f\'~OT-?sEJR*٦i/S`"S=ʒ܂ĒbS+?3sXd̺Éo-31|~Y!%}ܝ275U(*>i5]'3|Vye667E;debsecan-0.4.18/.git/objects/ca/0000755000000000000000000000000012315633604013116 5ustar debsecan-0.4.18/.git/objects/ca/a9f157f631fcc314ba997ec361502bec96a53e0000644000000000000000000000123612311572542020336 0ustar xuTM1 <HZ 8'I5!&G&) pW=Kj!)*شTuS-&°#vw5B^`<PTRw swI*h}{]` (~BPw&cL>g _<,10즁GQ``=B])ag DJ|R$j_(d0=:տ0dnNnuAsoVj hQ9QiV֓:rF yúp.GBq-g݋Q}VtOUܓ՚mQl5M뮜\w勑~R}?<[IY7yT&P:rܟ桪Lh(USYznYpEW]Q~XH"x6ap1r⳱U/F YBjZҮkާdebsecan-0.4.18/.git/objects/ca/b820737cd2f25093e8b0c18673d2bf1be2c1900000644000000000000000000000041112315633604020153 0ustar x+)JMU04d040031QH(K*M/fqXIۅn[uÑԤ$f0}t 黂{㣧\>IUAbrvbzj1kO=>Ls@lI$uEE% ƁYvױ)~IHKss*ڛt1t|wj 'iXUY\TrnHP[߇];83mI?ͼ XM`%% ==8ϐtL;0debsecan-0.4.18/.git/objects/55/0000755000000000000000000000000012311572542012763 5ustar debsecan-0.4.18/.git/objects/55/9d49d7bc8b959b361f6eefb1d598840ad9f3f40000644000000000000000000002537612311572542020337 0ustar x}w6Dֲlg۽Z:?&yӼ]ǧP$qMZ HIz?kC`0 '٘}~="?j[.M(eG/|5ܲ4JJ=VD9m5Vs>2뒳dQ:=r̦l `: J/ Ǐ/߰y(a$go1 k{ܨc ͞&$>ːAT"9VX-\,ʪSx7 {9[|Nʲ7?zs_=:yo, |. U`S0h |q'q˛ˋk;gϯn.yq~^zb`)[h;NyI!70Klm8 +b`c0$KC([X}\ fфxe:WP(J 5T4jYQbџ;yzzzrtSKvƺ'/9KIggK6M痯~ (/5\Td{^_[]Y+?$O_zVhu?t N2;evIM 'ș2pt _켔l}Y /3 #ŧ$FzEӬ@IƏJ^0:@UVeo_r>-=!Ul [F:J,F_crh@֥1JFO`@ߢp.d!E : ttx,NiR jE=zL|3IA <ƙr 1P8J\,5Ϧ̳G4)PȰl>)-2 U-d>{/?w*4E,=+{vO:hw7!M+M :cIXua|=Cޕ]?wF[G@65fۣӻfoB>j<)x31hAAzݯڮz{V3 \v MY lL"bKir#yX+4Z5s屽/}$iM9-Dfs4,"Mj 3 l;H!{) u$h 3|E=3n!U2)C<^P2: JtA[ơjNGC\Oϲt9R»f G”1ܭ<Ѹ*QIע,b ܴ7O"6"i.jh^[|zZdGN[h8X.`ˁR_9N(12x)`5-ZĔbUW^yd/*`c|K\!C]̚y`.-Xy EZ:\ ; -j ZW&*oD,IK)JQOhH&9:oAlwq*e*֑COXj%9ĦjDi|fٝ`(Y/nWb`No[8ÒwvPֽY7icv*VL_a^qde =dAMg{koiӅfHB KRy~XJUP_HMMNálͅZT'Rs;CqbR$FzT{aQkUh4IM(o QZEMx ׀,B'MgcFY}W/캨3ӑt#e&‚'nˢf) F(x;X:V t5 `Fdœfe-^4 /߄5ҷ<]^1U)in'шN M=g $ڵ žEyNpw;Sxzl=I<> J+&ga-&j jAQ2^ Hib 8'{zRrfԑ ds ɺn"K,@45h@.5Д:r l&FOp𨁚@"N؆\e"K8MlTl@o6.`~C#5*>Ӱ +.@8W c]a$uN(ȟ(oRaYwݼ\j@S-!~-r럨!x SxVLkJpD38^҆1.IjXi ;$ *b.9HGXGk&S - -9NOjn?;e<~4#W(`ǔhU-HBmS@ہ(b=|.l.Um52j/TЪ P"#U 9$B}Ǘ,Q_ɽ䀱ߒēRX[PӹeH&:-k(nU7Y`eqlCq 1,L[s;;VU];v]va%p!ͥNqsV$|jJ-Siرh+-ޛ F#4Fhci슈1{~"btm7~Ces ޓʃ5+"DG17I'J_c:[DCŐ^^hZzs:r@x.4Pk"HCX#켇,*AkGԽ&'a3X1|>'I,du ՒAV cј8dCd&^XJzT{}CnHOCE #`uwv~MbLy7){t&[y~>|q =+ĭ:85<䜷wi5-\\g/!/^^\]>;Za2]աų켲l*aA-EOTV^miͦNQ0O۪m 4jM8NW92 Ǩ3[ƬY_轠^ -a ^/D|17žɊ2ovI!bKaUpzt me͒h.;NHRF9x0 ^jj x(eNxMںX.Lٹ(1zeGPgP}eW;szl1zn{;OM[pNwm@+'@DLV j`$@~}lndAͽl~m>udmg={ޫP\\HTN<>]|"וtJ65 cu+lh,8?ruXӚ"t˛L%.ZesZ_^o'T$aᚕn*J""ğa9^M{EH#r?陆wp$ z#Mqqlp{Oo.rtȕQjUdm'b:'|Ul֚okVO$+T꽄 ZbW~69̾gE)kQ;yVA`R`k n^*Ei"2kZZ8ňz}?^؋뛣WϏ~yTc>~yqd'-2l{ճԾ Y庋\ ܁؆ .pܵEVwg(! ~|zU>ઃP j(bz7!yԞD6 6|Џ~ː2_/`S9h+!@8'2%OS::XfH,\J`s^S J4E1l ?d.15>Ma< f񧛛xv}`3sIʲNi&Y4EA1 @aQ%19{s7kC(fr`zy.El`g?t6 jIvmr&i6Yc\u˭(zi$\_&>wBLiռӾkE:[U=[tBlZk'T 5n_|gKkڠ Peq0QYX. ZH$S6Nٍst P} ˄&[Êzf¬%/2lrT3-{M4Ra7hZ *Euѽ(^NifcǿZKٙۍݩRoHZ@ l3*ܰ-(V:KXSJ8mB9=#oo%((tP &/{vl}bwXђU{Mkjz^|g찜cNr TTa=Ȁ1Mnvj䎊r$|%(_8K+`ȗFW~xc_i!o^?hD8h"B%×hU ־<:B-*6wvL QF"a €) l%F^aױ`϶iPvіG3vimklii-f0|Z1=m qb 08н03ZުmI]5SF'}h+HZP7`v}Z+pGƴjZ$3';2)gctBtY0t賮co騒qV=|2l: d9ln:Tzx0JWri(VYstJh*ZDpmG Uak*a 7.*H|jxb& ޺O(/V$3CZ;P3julrګ FI+*i=nyoQ|aR!F+s"H&pvsz٥%R%u N(sYqݍ?-%@(9Iz+/]@tvObO1q~AfP+ptŕH-NC~濽YM&X4FBFsKHf^_0mՔ{ DLVl}2=ZR 'TdHJdSr((lcVCCUYL d CO1>' Mw#- ) A!8{~=d~sCA%}}CVe[({kbJdѳ~6b7 OVP&=J~'FH#/Ι4v@:bQEcNnl*C޼ԳfBE3#%l({[ZpႧ{!y?A~F{ϰ!퉶~'\]aF3mz4h;Aيno$uc.T{کbthhSA7:FEUg;gLVf$ǮqYqCN͔@ w9 pslVѻMqQh9;mDdq IơFjˠ!Bڹ`*VA҆D)ELqݣ.,PW(GO w9<@}Šh)ⱏ/t*͋?b^|Vvcme1w96Cao4ʎ6ljH;h'vae8Yoan-D赌({ìB^FK1ɢ@4 ~6oz}h/Ҫ6NF.nGd oi:4PgAiqv@8PֹՂA|Zh0]gq-h2/~g}R#(؈ U4tD[A-{Y;c(54"[r6Hxϱt1#wS?~Nd_=pDct&ԤBK@5gA (a%&!3Y60b$ ʞ5k:l2U" .LJ]Ca(H,R+b̪qJ .ԑqRtW΂H8^r BL6S% 279{uNUo.Oa?1a,jtzjKHFf@2-aUD`2۱{@O3UR ESf0;i w杊~k,6N Ի?%a^{4zN[txLeGN:)y8*{P.V`}h9R7tt-:=;G_#!X9YOvr>rʾv -1dPߘAٲ#'s\ZeۘœpWp}v"Gs觽%45z-RUV#Xl\QH1ZjCN[:0ءE.t3O@)#^}O~k$_|^cXpyϒ8GGyy Lv,frR`jZj1!|H^4ݣ+ -튁dcؐRAN^>;q421 Kqbj}{U=]Ѷ݆!@:+13 5[3x4'v.C_0̚1ƍqP|O\vXFFSS?J#RA /tGHdu{{dHV٧f }1J"ؗN6 q'A}&oC`;*s(VrUgtYHĺ?x`oh1݀HM~ 60N#S~Yeaj#>Hv T>fY&z#Ѭwq0:*$滕%C5O'mn>j-#(qmN:"3=ݴK,j-DW5ndk?wXSN7XS&eG#n&\bVDrhOcQE{i7X1^9nbpe$`6&Bl'wwn`yZh`{C?Z$R(%qw)5*RM~{zXVf°n0Y.=ɘKMŻ9*6-zmlTa 6<`€AkQK&*m04e!]=ʁPq;U?30ǃ$ޣۺX+X@0JyH'yuP-2޷)}S5d5^RKD>`gEx4V֫yMVG#7FЍBADwz([ +qQܚ.Fm)4 TԱtni(kL̻.Mj(^Pͥ1N춂]J'(uA-pmtԴ.Hc^z_IKE9(N;k%[4K,-HbRsЋT <{qt$l1ѹ2=*aq0"+? y`/桞W8 T qYٞs͓'5>݀xcТH(tkTxm^hlءfpS@wucGB£aCD+uvH݁uޙ`K}lhm~o(& S/+ƢvZCXJ:/(D?i|J*Mf$HSR!"Wm{NSI{GX-Up5) ;2HUb^E[FQH\Dp'K>}`5z8I;el{IOUu&AKsR=s<}_xUt*r PZ ?dc0?w{T=9Nun͂R8>_y4٪ka2 - `]y4AW~ѓuz6~# Q Apzr]3}UG@dg] T{.b󑸯$NMF:E)ΐ]( oZ5rkbDjGZYޥp6i\F-99&Is߳9B ji dRu3)utf0 fWQ“*T8 u!Oȋ}7k IC`NoB}(LP2HUt'vʹ 7xF#`M,w xw} ]UUŭ}]О@BqDU=M2o^K-F)' /0E/.L;`UpiYig β \#kq B  U=5QN#Л@g'v ^u4GL~h0tNBv'@%,=fڠⲾBe 0zUاOk~g0{2kq!johխ5@mV=멛*l(Q. vg\G-'[FW졺-xŗ !_|YnŒ:m vZanBE5pcEF _g*~;E3|JS2nQzv W_PG7+,/.+.aߠ~%iO_n*9u56E WO>jA[~-0UM>^#D {t%9% V~ fȮuL[jgb  rL߯BK/>;enjPT}xugqkNfdlmns%debsecan-0.4.18/.git/objects/27/0000755000000000000000000000000012312007475012761 5ustar debsecan-0.4.18/.git/objects/27/5260daeb934648eb315677a42dfccd31117b300000644000000000000000000000041312311572742020020 0ustar x+)JMU027b040031QK,L/Je8lj~sbkt]Mm0,rsgؾGGݏ%,-|n-*MNMIeX9sT_Þ1Yz/TM+CݜK<^P˙RR2Hɤϱ{RT #TA~2CS4Mn欧n-.Jf`k W"O~-I-.).,Iecagk9XVmkdebsecan-0.4.18/.git/objects/27/f5f56776867c5ef4b817bb6a3f7523e9ba3aeb0000644000000000000000000002660012312007475020306 0ustar x}kwF~衯$O2Q9юc{%9Yɦ0Hߪ {93~TWWW$_Nד?xǫm6㓂Oo$W|r(sh<[mnQyȞ| _ً$˱O<^b{q ʳ2'뒳dQ:;rf| u:9+<_,߽z˾)ϣYOx^SE03>)|&8 vx\I؋ ƍ8Kx sygj 9^e *e+[Des]ySx`5 ' p.|ah~kv짳˳Wm|Hr00)Rشlp~{qˋ+%;co./}yv޼||`([p;xI! Kflm8l+bS {cDI m¿xҬJ0&.>?FQzүxCfy}%6ጱg'G>9eo:/.^b#=|tY^J:<[hzwWodWo_G,+_UT.ԟȦmuN]qb'Ig1Rx<}9G\} Zl4`pC7!z-#=@.f$g_"F 10t Yu^f{]c[>;XZZZ [z]d6'd2.`#hpi@u݃A1< R€(0'bc#Y>(o&ފǤ A.Ɠr 68JUXj=+ٟ9jRa_|ZZh0I[TѶb|D/b8*@ϲݣh`o]=@͑˕FdY} Kp*Qʅp3g\ FG4 ;rĊh8wF Fj%@C9 E z8bHUV?N`aS{ 1шޥa 09v< ~M胸z CQY>녵AD(ojKy v"J7R׼cYF%9:zJF5iEh>쐽y(#<-tpgU_5V'\VA!XT+CYܜܢxeʮRc txm;m37QuBo7y ֘AAzܯ殣y|wE+LBWB;{jVjq$u4$OT8h~lGs1ٌE(fiPj&D`(~wCUGuDV yϙZlT/^(J\&zG r&GA$Bu`}yuNqBQ0e wK!.M4^ F( qY7_y97͇@tR@uNı3&qڗ iv;z:=߂Z%kxV©HZG1OfĒ+Nax,%=S3Tz9kiHB TmdK d4_Wn!O =HnRN.t Ϊ]8ԝ;Dc^j0/[ݪJL&²TpE\E呢؅O'B!8i7Oc^Oe ʁD:EnM-Vx; #` > 5Jp {Co,d]ҋK0Wg?m/|KR!~M]8gC)̲ޢJefw ;u-z \Wr[һV$:K*1,E 8rt@Ik4xx~+by3Ij.I!6$J4%@BZWbEA"^6R~gj%۱Xa3qCi۠%/#BhlX [ `ka<[~J$Ah'$lZ=^Rʽ.݆r@mw外nj:;bT9cj5M2h!/rUу9(2 EV7]=nj!]RilT"!]M﫷 ~}XFʉAh51Q.XxƳ鳧Q~ӧ8MwqEYtcO#+`b}{qym}Z\NwzOWozsl 4Ih 4:Ҙy63]47 ⟰ EK.-˭=#5+s|j!SH $o [x7N2A'v0uS`}=e'RP*IAKc솏>Z!][%]W#AlG4Hc3h~m@p.-t *$qQ+g@E]hCLxt>a xAw/ GӇ} H^\}|ޑϟru^v {/K{> 1tWb$9W{uYzAl{_twsAWR- /h'zѫصIdq|R&Xutm[N~2 >vW\ Rl9SJaYwꈇD%د=cC fZjclk=[wo 11PVy[6 Jk]1T'#]/lD]7ZbF$?AzYWz} *nC8-dL֔ϥymnoNnfjSGcX[)G*qWGv{x­j|ޮ#*[O nmgᠲRέ6D`n+/ {D^?73 Ď~}dn$%6A.܄19Akk^ٟ^#cub0.gE>>ץt=@zNNq gu03(H={Zl%xcYpeZr ˯ JIjˢD)Pu*G1DB/}I7x=)^ηOd7UrtfQhU5"E$9釭ji!)id]}ZT5n*:'ie R7cO-xغe ~T҆ :cc]) Pbo9{WG?} (/sq~7d'$/2mQ{ ^AJ$}T@K<AG]OiqDqL1!vJESRL+"BxGQIf\Bˋ2eH-t<-x~tbD)rE=vdYO<4Sr8S,J Vi(&\Z&^ʒE%7[S9$BqsCdk3M*d= pB"Q`vΌN>aή,3eiE34_C̴ L6/ks6i)q5ӱ|CAM@ 6 LHoCO*{eVp)g :e5*|& רAUƱLkQw Yæ /ya^aQ^yHR4z:&J%ͧGAɴ6IOܟAX5%r|KDv$q$F?kJ3W>t[^o,NljC3UĒUɭS+At L>e"uXa 1kp e< &DҊZk(4 yK/ʩP)2w(@Z4/iRnҍ֨iH[.!l, dUQ' HC _8)V^h3xD"e>Jsb7Sgyʅ NlN+5 {M 2r q:ͅ5t1]nj)XU|vr7!9@>4B)HQ^>w}%ڇ(ۿ}ُg/_. ( f4[*ΥN! -3;DC(#LpWKg{PILXZq@i(+}k}Sc7m  A9(-@fKTįY ?8@K-Nk!%5X{@{J*fH J"3]&#u~;q迓TƠ7N"//BF ,z'PIJ ͰԎႈi*h> |u>ף9QIN%mVne⵮U D敩ƓڍKu1,;ji5=o*|ر4SvisoYUL߃Dmb7-m'qH/^EbVP Mk٘: T'.u꬘uDapluW>ǵWZI+:OxpP YЦȧ;ب]fcEqӌO} Ph[64 ղt|:l* (W+NUZ[oFN5r 5bI=ef3dB{WQ+j4jxHޱ^U ݼqQgF +F +zyiBI-y:7F}`v^*&O'SlΉ(G#ٽY-_ևto0uعNM[ˀݙ,܉Rob  I2W/?wi9䟳T04z 6vᆣ4f+-2~vhud Ek= gGh922[|E 0;l-к<HXu-cIB? r=1p砀W#(j("cs^!L UQL?7>d0DE[}̲+Bd)D͡nfI IENoY| %Wp lb٣wbT3nE9=#* }<\d3 xR yT2 "w g;/‹ ~ ,v5r]Ȏ'R92ßwjtKV.{xVo:zDwViF6i"RrP^cWJP/"D%Hۦ¡d*1Ֆ:#uh9]lX*TLͥ䀍z2ltmv x+*ߢBax!-G}esǣ%N_WBɷ,ü*AUjftQuE@ }(Y>˱l+: {uwHpgJrNJV0R7cjG(:;yent=Y ^]cb/?{-턏 έl &@qll$KߨLuƞ'I*q s2sI@AkYHE/l?.B 7OVpf+U%pchͦ$@`eTbxDmq1|wCrMQa|A{ m+ZNw A΢{J=IR-<@>ozׁ Ċ}cTT} 0qC?ʌص/+/W^T8L v+@/N0 8ec6E-tں,.Sz2nXSzxmĞjm8A0RݽB5g>bzĸ.gPxaEdtw-isGߕ]r"a0rňuBPMc۟'N;&l1]P<]z/sEb{O4(5:M! /BdWn RVxvy?+mP, |CRI^&yNNlv&:M Z"?ASքhPKUVFvZ5ϯ/Ȗ\M09.31&'y[Ë Y!UUy̖>=mކwuKf^ql*"X(uTrko,E]ʸ-B˚ͺ5Ȏ{iyb@*@('PW@40<<1{ҕ[ȏї2O1)`XMBglaU+)<̕=bk"td!: :\]PICّk[Y08U7Wd_SYJ]9 "x1v/"adϸ M`aSuSX9uL?>ݰ6xu͈+w,#3|†.{N] u}˱*Ht*E0tcn&krFse?`'Qq=:(/31Lj* im*!ͧT:-cd~lHxE]Kb :0ٯӓ.U|7JىA٘Lgmbհn>bpĞ}^k}maB{ a mr w@󕘉GBR,. ]  .θQQ:6[ y ч~4;;bO)Ȯa=Z1W8 _S±he/ S?ӓWC?# 詽Sd z}Jn_i`ZIz&"!>$kh+$Y JG:/JіVEX>7XZGL * D.4eeQzL)dajcXMڎ\z&=?lWCx$uWRA,<%$t5ߧ-QTɤMu$G%{% [w}g'DWhZ>n%.7ԲUX,H/tS&kGGvumƮ\dVHrhOc˱QE:,%zXX2n1-0 [7-@RVС.orRNԸJ7mc[ ~ĺ-dhzgT1lZjx0JY:( r _T Gq61Y}Ԓ'AN|c|稢c,VE?zWwy4AG1$t{M@qWA8R5/)R{Ut6JD@!Hsר653^ZL գxC48 w 4 =4r[6AQӺe#bP2G'xA |u+j'V,/e垾Ѭ$Y3ݦ%yIK(cM,8F-58'Q":v7tz;۱k(FtLmXG VsC ŎMZKwh$ZoAK'Z7n!N#UNh4pJ#nhXd{^J= B1o,8ut5M/^n9dK:M5aGnQ̫ ]Y+? /9Qa4c{XĉHڙ/+;' {*U?˫()AJ: =ٹ@-xߗ aں@ )|D\]jTK1p3|\㟻{T=>=ls d~V}#Nh!`] ʣ)e> sYb藓/n^3~*tDv6EV@vu8=֯x^ L\gSlIŁ PЍUqтځVwi/7͜цL6yfޠפ~hZVN~{L4ǻX2A-MLny$cPձtd0)fWQ“*D8 u!⧾O= -07>&lnse 7l= 4|ѩ{Dn Ue?`:2򥓣0CH5`/d{ELTTP\H< l*Ӛ^s3]<5˸`7 ZukӫD?5ykg*h(V.=Ϊ•Z?rz*؃u-y/c"_}8?n25茧B>ƺanBEuz h A&Qx Y)Uld!W-[Jx,5YaXY-|i}≠Y)uNDr~։Qt-QOcy16|7>|]a,i~KYTV76' ˯ͼfxЯW7Ui7j5۳ *Sp w|12AVhQMhjUk]8ϰX`ك;ͅ doUiZiHj1debsecan-0.4.18/.git/objects/d2/0000755000000000000000000000000012311572742013041 5ustar debsecan-0.4.18/.git/objects/d2/8d0f557dfc9f5f9ea8f326ceaa1395cb020fc40000644000000000000000000000030312311572742020501 0ustar xڝAJ1@Q9EE*Nb+7nS ݃4 <x/m@Sg7QYbL"6Cu;vr5"нRTAdebsecan-0.4.18/.git/objects/e9/0000755000000000000000000000000012311573636013054 5ustar debsecan-0.4.18/.git/objects/e9/668fdcd7563c9acaadc00361a646e73924ee5d0000644000000000000000000002535712311573636020371 0ustar x}mw6Yr}Dֲlg۽ڪ=nilN{v_ kԒAJn{9m( `^IM_Og=$NO׻rgl'F);ant]QPEbYEȞ}eXG<Ը]["V 9c]ajgqQdSr,JgYV, ڤ3rYU9;-Oy%fS*,M36A0X%bp#1`/3ql~ 2Avβ5V K9)^fkB$a6o>@ǫ޼e~x}@Y6ʷ\@W$Ч%B6i0J[xЅ@edgFE#vb8@䩮ek5賣W]vĂV>u=ՃaՇ5ȷͦ4F ( U4]B'g$6 +bN/Hݣbx4ާD}Sah'bi#E(7_LiR"q\eB|*+y)" M2,OK &k+Ho%ٻ>ܺJ+f&:Q!`?rO ݓ{0@LHZ2CY^g1D%G%0ƻHeĨH$^&rAXbe^󘃢4yᅡD'?N|r`a腍SLl:0z~+Rpzm v`k BP5iq'/F<$-A##Eªh5Vw4F@G2 ;.D8bE4cl;@h=eQ_1ӰYdOZ=Gr B/;@wH2@ ڽjF> k$@Hli\O(..-bkMgրQ uԺ%f)ޱlCM%#ti ʚ4FnDF-R@LeęeyYNU1(a 7|Zpwva/~J.Pί *;lkRw'߄DU}xRf JT_]'}spqg EXłڗFWk9i0Sck~Gc{_Hv <k4qZoD4]m&D( 쥤6,>]I6gFi1(r{}zg`C8(4eRy4duJ C՜Ǹ -_d<^lr2w-R)c_ qyqY+U4 EYźAŹieoDfmD\yB&1I ־!fB=l+dJI+sf64,Yq)4PD,Pд6N2қId&SA gנ;XTAB[&+S U®bj)&s&*bZT'tQZX=Ou#'V-s\4rh# b0[)' HzI9t`ǚ-Tb~ kb:RSx,rsV-ʼnԜ*bp4Q^^XkZO8mA<[ChQ5 Il>/y{{`0]ul6Pɉ ^v$Q>꾼zumr!,yu ^5Ka]6BQST&Z-60-G2͈e^4 /߄ ?ѷ%<}O^1U)Y~/шN M=g $ڵ աEyIpw;Sxzl=I<9 J+&ga-&j jAQ2, Hib8'zRjfԑ!t ɦn"K +.@8W S]a$uN(ȟ(oRaYwݢ\j@S-!~j럨!x SxVLoJpDs8^҆1.IjXi ;$ *b.9H'XGk6{3 - -9NOjn?{e<~2cW(`ǔhU-HBmoUQHcK02{EX6.IPBV>hAZ n/'; ` tb\_oOV%.t$z<߁z.,۴E26iY>~Dq1ؽhV/c[zSe ߚٱ_sZk +/IK i.uބbͧ<3kWjÎE[il0)l<@+keWD=/ {o- T9g]!>!I=@=)W6&J-E"՛-jug1EZSDa=e T Ҩ^;r59 A_> 8Njh|`!`\T bAmTAInpW[bV'h|c@6k/3id c {_C6Dơ_iWIW@==)iU@FBh|f;Kib[L?&1lɛ=ɖ ^/^ݾAGϊ2q+N8N l/29ib]Zr wWAKחW/zVt@̮vuuhw;z*Jnaos,A !c|vxr7UUW"`[Ztpi&T|1Ӷa*Zl5SU!| 1*x~˜5 WT˶BSU[2^,{4b YQmѮ6)\l"S$ty- e' KȘc6=]a =>qZD~N6yebjPG@+;60'ʸ=B+q ]fo=166rj5:߷}B8ᛞC1TZ}^܉N351R{X"4^FEmTAeBq1Vs!Qa8 w!+xΞ^)k,!QaMLk~-o23h^`iQyRY}wkVҺ(jB+D PUI4t+oܮ m h~Nꏹ72  b10sIZص^s#Igt}|&U :w̴Z}LdRWp1q*^v0P,Nt؜Y TnQfȯ6#P~9}PiX?1\TozFH7|~?Z*Tܬ *H6ζ8 2%4ra,R qb Ę%н0W~T LkZxɁ@Oߏ94VDܡ o ǂlV8χi?DJ;>Iyƃ@)V`ozO#9i*PR`g]mҹ$C`{ttC7Z`u:`H(Z8/Q9"= ؤ E-uߊۮ/Rw,@j]>D7o\TĴxs5ڹ^HroGlf'rb~pit빬%zxӦJHA @zUJu&A-@d}\(Cmy$ID 6UφЊ %Қؠ'D46aBV h V|I Kh(?rc@C1=.=:5S~y*]  3B‘"qXE6QF][$U%-$Y\'i(2!.X炩DZ=JNE# 1y]rؚ@?Ŀ=7@ +&~#w^7h SհcLfF:f(m&^ӆOc= 6ӄ> g>-mE> bbOs51ȋh)&Yԕ7<ďmP,~|KZI9_M(.15=MxY'45(-nL^Y:7Z_S8迷_m+B=RM\-OdOJB8Q1q{^^qcT 2dgb4*r#;fB\C[+mCgKP  w">ݰZfĒ;f>Э=\ |KX&q:"vl}@s|qfHcVN63n/o]>SK 8v7&BgPV6t\=\Eg\z&ioɄ Mť"G Td֪!ATm&'REڐ.l&9vhuk LP|9@bʈ4ijWߓ/hi,Igװ?qGT$Fd? a'I0=:gQ^f5S !a'3tLD6.SiE|"b'?Kb :096dggiuP拆"Pl|( dz >\z=X:ZklvٶР=dHXGC=|%fb扁Bfkvt/.e Ys8Q;2[ yyXjj?bUidװd=kt*6i=lG*nWc/ 3:loa`ZIf">n$<$%tIGW:Bב~QzJ*bI'yQEk-&* D)4`1L6&jl1FAbck_ ie!<:MpWYxOIj+(-Q2T3t&:֒6#*M=MĢBtUJ6cpy i:t]9lRXv48 vj%fE$'Q84;^e}㈵X& ;FB fk"$vwvWVH :]Eҹ-+wR,wee/ *ۓٸTo"aṛ*,†gsL\;8h-jjVYLõ:Q7al>Ft=LD3Utxg0ǯ顉Je$ MSYHoer t܎~0 K~mtr`,M\T_g<:(zx[T G>ɩmbd%O"]QAN0sܢcPnur+jI䏇Z"f\ޡqT# ֠kTX= IDpu| Mi䅕۸(L`6*AX:B_Uf=h&SB5/Q'@[Af%ǠFnk86hw:jZl$ 1B[{ /=AZ~nrElӷZt55m}cX'|Sl $1j9Cpq8AE:t`pSQ\۰2K=)JCy8qlՂaul4s4u\IlW k7 ^צ( uۧ,ۮ`3v1<|.}=╏oݰؑhmo?ypg+w`zw*ؒtqy7Zy[ߦ Go(&ˊP+)oN2A J:Ѫ`vq<ﴊFS 4҆ TȦDz_.o`>V wxݻ\Muj$Î RբWA@讼@79IҀ}`ͣ7ND|Yy h:sRspye*I霄n| -З(q޺@ )~>\}a0>-{랔|gܾ+Ƹ8ǭO@W|MwowB q=bhWMQߨ.cg$/(AA}{BwE'?>>zª̣D 3.D*=i1SD\N u~FP'T6pgH. L@7W9?b1#,e^xh4. ٜy^i9YYb42T:P3+]XyI*azŦF}^>뛗3 ڤ!07>&lnse{Wo$*}OՓp;\ƌ<g0?` O}9߇!UGsqgy'.GQUOEӸ5pe~ LQ X(yZ uT9\]YvXkr#.C5 y[S!jy {}zh ֋> +ޣv0a5KMVth`_ZDzW2+9~*%dyH:1nC1-cTX. fuy$Uc{.I?tk||y/7׷lʹ¿R~5t[\yWUi՚Y+\=7Y&Ȫ nJ ; ).@V-M˝V4;debsecan-0.4.18/.git/objects/15/0000755000000000000000000000000012472424253012762 5ustar debsecan-0.4.18/.git/objects/15/a5416c74f9dbc170541456ea961af7f749e2680000644000000000000000000000013012311573655017774 0ustar x+)JMU0a040031QHIM*NMNcxzͬSk0'.s{n.MnrQjbI*c]dyѽ.hǭ @$debsecan-0.4.18/.git/objects/15/4469d44f3edc012d493ffcc52157bd6edfc2ef0000644000000000000000000000041412472424253020423 0ustar x+)JMU027b040031QK,L/Je8lj~sbkt]Mm0,rsgؾGGݏ%,-|n-*MNMIeX9sT_Þ1Yz/TM+}Ü%fy }e(&e&1.Ur`r5|I!~淫M< Up񹞽*L__ge3ۼ"[\-1r_睼p -9D$4$7_<-TW^ԭ|tfobdebsecan-0.4.18/.git/objects/0f/0000755000000000000000000000000012311573716013043 5ustar debsecan-0.4.18/.git/objects/0f/ca4c0af14fdd2fab74982985dd2387df3af26c0000644000000000000000000000031012311573716020476 0ustar xڝj0D{WV%YJO= %j b2_'3\tp#&! 6RJ984K$hwPCvcF>f^ШGX1yC֧V[.Rfip{EY~!<, .WK6g<:Ù\*+($ U1~:ZbYdebsecan-0.4.18/.git/objects/25/0000755000000000000000000000000012312007036012750 5ustar debsecan-0.4.18/.git/objects/25/f571eafb6e71802fce12bde0a241d4095d2cd70000644000000000000000000002536312312007036020317 0ustar x}mw6_G>"kYu{ܬ4ɱ: %A%)9jOAJN{9m( `^qٗ_'x]8=^mEv)|cxu[vFCgjEɂg!{zrUG$˱[/<ԸY[< g9fC6[3l5Ӹ(x.9K,gl϶^)Y`ٌ~ <z=N {OxZpAX)#18Kf<9jB iD%lBu˒j=:8eqJ zп8Iؘug,{{y777°WR\%1>Q OW~_;Ϟ_޼f_]sٛWׯ/ P3 Q,dцðNx"6=f#JtN= fYgaVM]g]A}u >_C @fy}%霱'G89eo;//_dg{2tfydkt~O 򂫯a^\ˊiʅ OE65Jey:OxT~hUVNG> 4.Sa$[p*KUKy廀,<0:O>J# ZX\VIdF$:]-'dX@n iVz*=¶"JYB1gfCÒWB3EM{`fvjbe lE[Xx'ngV /(O_߁ndPSuhPHmJYɝ]vE[UR1;5vRiư$Ӳ0T-JKԦ°TspŬ[A呚O'>ߡ8f7O٣]6{Ynk}2ïr!9*GdK`q>1/JG8|0$ЫO:;=ִv73?Ko^]v{/F(~-r+c}7n恹Sd-Ctjt8r) -h^VԪH􆾵6&e(FQպ"lGLJǩXGIr+?a}X?JewETd лkʊ[a+A^QXͪ'۩XQ3qCimz͗pd4Z,D%H42UﭥRZ#A{hg$,ZK=c)5{{BK|!69QK=7jR]H ljJMLRmbU$[4ɣ|1Di5.\; 4}MgtWo._  NGj=:Ƅ&Ϻ/_\t< κ/.HYcX(Z-0-ϺEOCM J{И4˿֜B/wɋ?yQTD#:Ic4D۝Oh6\°jכ%:M8N0$NrweT u\vs'x+(H%Eяsx=/p 鎞5L㜸CDA|KU›BSG6 E΁$&B,MG1"Ԡ2BS^@Xn$uM'gXM±jNUk8A`riv,4[KQUiFڸRV&؂ mըL6`"b5^\)uoj839ZX JI9d]ע#vratOOLZ&2B)ZFz)?QCdNCXB6FJ}P dו./+f%p cP]2Lհ.v2\QITah]s걜*֒MvϧbA[[r:"0=^ЕwxehЕGjP)Gq'cҪ[6υUQHcK7"{\"] $jde(^JU׏DFH srI4/+f&U){ec7 %:' ϷsDmLuZ֬Pܪn ,vk8>wbfY8·}v1ɻZYRCKl 7XI<ڕZӰcVZ0c7Fh ucE6 tnf@'kYWEbodh#P{O b *vh@ vsnw梫uxKyA_iLE'FFy;xYV964c5׎\{MNfb|ŗOXf9X#%UxfjU+akvP\ՖUK'uy$ߘ'MZL,0ؼ|"^1qȆ84[M 1 9"8P?2G,1n1&o SL42t~%Y]v𑤌 =V?asӥ3laӽ>Ǘ@P N¶u7oɝ]L ꙲s9Pbʎ ̉s2nϠʮ`wBub[zwPZNaF5N>!VRD}!*V>/nE;H+,zKs{#&| HZu zWM0Z}лD|gO+5mj JW(YV~&5E7K\d/洨 _NH,I¾5+iTDD?3r(M4T~3 #`HFT}%z%>\PW_+}  &!Ԍ >"ZOĶuNzTC٬56׬Y{ BcŮlsmwUOR/'{Ӥ>v4*ɏܼ-U6w՛g]}ue*J->*s%D qזSڥqG?>=*'F "|xۀZAk>:U%=/~U/`9p"!瞨b'2%9S:zXH,\J`'^ʓ J;kF-z0K .fǛv}`n*p#ʌi&Y4E[A1Ą  @a%۱9{s7kCfcJy.=l`?f'>Xt6 jvmi6Yc|t 3V9z$\L&>w/LԼ2&6gE:v[bT1[NBlZk'O ՛\5k_取YKXdؐ/&s䨔fXiI+ZC 4 <5-'* {!DҲHv83 S]78Ǐ@ r eTf#;7![P@_u4pӟbr>GJr!Q6>:(kˣ9JP/cvsbw1OђUYvMiz^|g낌cNr TT1<Q1MnFrjގr$#(/ONI?0aK#t>ʫ߿Tu7z~sqt_\Tk4:yA˜|ba˰kf!{H{arO! -S; C(#Jpwhv'N^I6| jdڰEg4(F#HPh#q945_Qx>@-la}{ƞ@pcJ:HvB.DfZ;MF.=f+caw Q'oԖIimqމ!ڔ.B*oW}=ZUn_4/VEmU^{wЀd*ReGU:mZgM$v,3$Ýfʎ7d=Eh'hlyu8MmppbL^+oU6~G.Ӛ^gr`a#Г~w(0>[8cbyFOt" Pؙ^d|ij1yT+8YWe~ہt<8Ğf*s>6V67Xio=<R+94Kn;HO9=|:EQ %|y-K* \۰O$>5:1m^o]v|Go+ܙQ-p :69^F$Ҵ7U(I0XM9h$89F28wGSZ߹R Dy s$OE֕.{. Oqꤶ't'Cgf3V8::Jrc{Pg!Y^&n,Z tvY`!%WS [6jjJ"Zgy jetIh[qq-k*H}?2ENE%d`):1s! *jcX R2ՆNsCI=l n!٠\ v>ҡGSn2WN-x=5 Y?›'T+f`P%#exJL; iB1ߎXE6Go^)2zU"4ߙxb6_ z= -WpSbj Y=֐D[An..0^Sy|=5<7"U[|4#V{[9S?JOJP/$Hۚd~ Y-D5 h9ZPӔ7SZ&@J}d82AJ/\cax.޴pWq]u rh&%Q^]7F{2ڎHuneű<,zfL40NE,Si"R!pLHB/rl?.bǵl`} wV[Ļ526ɃOCS )JcKg'& ^~2 [3Eat[V lEt7IηO:m1=Z3:Cl|T N Q3fh 3&+3c׸\ӈšGfo OPŶ\`dw@H8R9#ݦ8(kjDŸ$K# E&e\0H Ti h"&޸KQ[skhף'>xadoW:1/>+G1LLU6a2ݘ;넚0ڷxeG?5N w4^2y`cAx\" ZF=Ma /BdQW r~?VA=> iU'go|a7ΣtԄOwlK4eԠ8E$;xUgmbjA~E ~vU38fQ4q==) eD? {NlDxQ~*S)|:㭉Ѡʝ1sH_^-hNx<ˏXZLjX`g ڮF ̳Bj8UMp \fxB7L{oYl҃cVG8>JU;FO*͸-B˚ͺ4Ȏ{iybTYU;Q)p?'iayBy1:Lp jRJWn!/! I ELϼ@ș,tv@~GEJ 1O:seOؚ56jG&!a0xPvdVL@1f8 t~8PB+gA$/ٸxv! ^VEz`qYfқ:]7r0K5~J}a ẍ%w$#3|{ιj*Lt"E0tcn½y*)")o^>4h[EQ5GuUg ]0=C=a-:Ai<2#'IkuhrùTLޒ AK=EAZ*+]UC6YVN-[!]B|Ms'r\Ĕwig'5^Y/`/af1H8獼g~Nģc{Zu~<̄kX;ZCH3V)Nf05hk-ݓm>YbHxO~v@u`_slNON'pW E~t/P8Ptl|EzD]tn>bk=ޞ׮hnCi a mr w`󕘉G BRZ@/\fqF8(R>n' .;,#uvPşPT]zb)pzMˇCp(!ss #$^h2$+`SVJui%KsΓ|@7xBҞ$]GE~+9Ҫ3O:,΋r$b]kU<07WIn@$JAǦY?F_]G `im5Q[eNXm$v;*jM,~|^_=hiuD]JHW]Aiia짓6V7Yx~g'TWhꙞn%TSX,L)*)f²]l}SW.1+"9a4u‰(݂=4G7d2Z^0!Aۓ;7Z-BRVСj-mo)̈ ]XC)&=k,+a؏XE, ܞd%Ħ]y 3۝C6 HxDz?H@IaKnmtr`,M\T_f<:(zx[T G>ɩmb/d%O"]QAN03ܢcPnur+jI䏇Z<\ޡrT# ֠kTX= IDpu| Mi䅕۸(nM`6*AX:B_Ufk&SB5/Qv'@v[Af%Fnk86hw:jZl$ 1B[y /=AZ~nrElZt55m}cXGlSl $1j9Csq8AE:tpopSQ\۰rF6{RzZŕT<0Pϫq8٬uiliꈹɓؚn@M1hQ$:5*[%xi3Ni `My+6Eٿ]}n{wG@[H܅ E1"-t]y($nr>Go6~u{h*:T~g%9 ٹ@Z/QuC*:R|AR-`21|D[㟻=*}WdAQuq[ Y/:m vZanBE5pcEF _g*~qci~9zwyX,xgg_{d9V+,5nqyȣy9+ylmY\y<ٔ%iU6;6\rV|UlN?}}SG {$񔽊<-8e|S,M VxH Fef<9jB iD%lBuǒj=:8cqJzп8I؄M盤,7n뿱//^P -:0)Rl~Ը {]׷W/޽fo]}ss9`0-g} g%3u-)1Q !HgY}\ fфxU:P(J T4j7YQb/;{~~~vrsk6bݳN%3ϳ7L~Rg`u\}}C _ XVTOuT.O|*/Q,ϻ56yēOC=Gr~Xt:aq2 ; $jd /q%(%[_yBg1rx6 @KЈiH*jQꅰ3Zg~QaБ Î ?XZhOjW h4&g(ӄVQs/ xЪݽ~ ¢voO{P9vד< ~KXzCqY>5 ;b{TB/<@{ Y zw//Ps@oI]Z&* ;[#g en(SqiY`EmօU JGXt{=Cn V,0>ܝݣzeˮR T|x-#}37!QUB}o5jEE UGWmIf=wEkܙ.;r6jjVj4uw<,ZNTؚ>]4f"g3[4,"Mj 3 l;H!{) yWDo }QZ ^_A7r*u!tM/(h%Ҡ?P5#D1.DY: )b] ԣDaB\h\Vg($kQbnrqnZٛ'Y4wjcsL/wk Y|g|ۊ(fE Ŝ K>pv\q 3. 4큝ک6S"Ila l^P > B5 Рߣ8fO9]6{Yn9k}2ïs!9*DdGaq>1/J@8|0$ЫO:͡%A !a8-`"X׸Ůy/B`|GJ\!~ELy`.3$YYyE^Z:p ;j-j Zmְ&*oD,Ic)JQhH{&9:/AWq*+֑ ONX%9ĦjDi۽`(^/n]b`Jog87:*@?D Y) {;+j&ns2Ͱ ^\*= @Ġ&_꽵^귴C$팄%Bk|y,`}({/&'|X6jjZEU81Pi BZ}֮>4&q`ۂ&y/(-к&<хkL@1ؠ}=B*{` . l,ݓA.Nxm|}yNXd=,jVú l"킣)/שS赠[l`([4eO]1f;h^ OSoKxE(bRij^Ez1Hk.a]5CG vNw'~2*7:.u{{ eOxr:[?,NVMZL|Ղ9dY8~GqN!B!` @`:\#C2J@M l!D&yπijTV]d/u,7:ؐ3,gqM^&]5'5EW 4;&Ep-إٸ*؀,#\`) +;lkT|faV01tqNPh65Iby-Q,o%Qߤk HE4:LZ&2B+ZEf%?QCdSC;XB6FJ}P d7./+%p cP]2Lհ.w2\QITah]sO걜*Ə֒mgbA[[r:"0=]ЕxedЕjP)Gq'Ӫ[6 OmƖ`|e[a1l\hP*V]|%2P@*9__N!w|X3Ÿ꿬8%>8.K]I<-oy0]Xvj+dmҲfVuc`{_ Ѭ^Ƕ8X35cZ%b]޵nV\g+ gŚOyg֮ԲgҌ`<8]sκ.B${D{RmP1LBV7P-To4SۨZ [4Ĭg*>ѮU&?l&^f`11JlC/D?+[Ijz(z RPo+`uwv~MbLy7){4-  z_\}qVlМ^er[軴 7n/J3ڗ/^S萀].7-v^YTfܰ(XBnDDl@glM7bȧm6OU@mjdU7cTpc=61kzmB+X7rQeX~i ~'@"_mREX=H:Afg$Z@#N>'l{49{|^M  щl(v[wߝԠˁWvm`N q{Wv8'ު#v{mjm9kt:o#pX1T7=$b"fP#skdcv#-Eh`l&&cmk=^5bBbq l>@BxWS=S ״Y'&(_aCdgYÚ[d"g,qђ.Ӣ2|};!$ _׬uSQ$ՄWD,ixxG 7"ޤ+''+ ズ *GMg]kpU0 fLPN( "sWf%fDBK(e+vgrnLzx9ٛ+k'O*dlK*Z?(mSDrу=#W4C Zo/^Kv{uus{^j,Rɯ.olԽE|wo޼~qٕڷ!k\wYbxz2^@p|q*_vm9]9OxTӮR1qrj #| Z_;!A(*45xQ[ϐz ;0wO.@(YǎLADl /8=cW)uȑgѳĢ,0mENf&P;JOP-_ n&0m"#ǜ4Yoq6޾sS;gVf<Ͳ4ɢ!fUH @--qގ}ܻW޾]4S;vo(dd -(4<bsa Pk+GpβL$ti(6W bTL1 $aʧY69+Ա bQ_mFr*mgZOg=~b &n(i+OT !YUJl\s 1neK iPY*D:^܊l8@1@y!i>0eL g!Z, Æ1(G03ϲDH#OZpJY๡o.8\TWYث %*E*0 4vę۪mн/_82^K(,2قb 5#/k/_<_N MEY[͹W_ }i[gS[yŌ =ʲkNm368dt,@ts\g|'mrewڔP+N wTcAQ1ni^@4 HJ}ͻoJQ/'?\\eF$LA+*F ;Z6io4q.Ђ=9Ԉ2wwlw">Ac;,Lĉmj;wc@L_Qp.hwD2)u&6=)?.gX:pa># Z?+ mT+$I)XE>ݓȧM<8CKuqCuUhKg CJo3a1 hes鄚VÃ!UhD$Ȋ#.f3PB{Q+n34ZIF2;.mD-*shxt:լE^Ϛ~,~h)BDyXT0H2+\d]鲇_~<xNj+~L{24{`6#Xap-$7G~v5j2Ǣ @gO5 2[rE*0{l[ uy7f[F(f|0TE[ukPJ2st7rЩn"GMc77:{TQWY:h՚ ^ѩ&vTA="Vxj uljٓwbW4^Ic>#6U9׶f?4K=E&4\/Xj_;3O,Qҁ|AǾ .xYWm!kGҞh!~~w¥F`͕MPdP* ZENgE츶͓5oᾠjђxCfSv}8y2bihA1=) eDDZ?{IlDxQ~*S)|6Ѡʍ9 q Fo/V\MaJU;FO*͸-B˚ͺ4Ȏ{hyfTYU;Q)p?'iayFy1:LpjZJWn!o"[I4gA (a%y&!3Y61bdtʞy5k:l2U .LJ]C®a(,R+b̪IJ >ԑqRtW΂H8^̳qBL6#$ 279{uNUzh.Oa?1a,jtzjKXFf@7s1-aUT`2۱@O3UR?E?P/;i We~k,6 Ի?a^{4zN[txLeGN:7L)y$* P.V`/Eh9GR7tt/::G_"!X9̸vrrʾv L-1dAߘAٲ#.#s\ZeۘcOpp}v"=s觽%45z-RUV#XlZQ H1ZjCN[:0ء֭-t3O@)#^}O~k$g}^SSp.y{Ȓ4'{Fyy Lv,frR`jZj'1!|L^4=+),튁d?3ؐORA/B^>;s421 pbj}=ޞ׮dnCi a mr `󕘉' BRZ@/\fqF8(R>n' .;cuvPşRT]zb)pzMˇcp#(!ss $^h2$+`RVJui%Kg ɓ|DxBҁ$_]GEa+9Ҫ'xE9*cL$@7 cӬ#. Ԇs0Yشm#VݎʯY|5} ?l>D44]\: "d>%I4GP0I,hOZKJj[{X|*H4LO7mZ U;*d:]`),uzIa.o۩+0Fzl@xv#zxbX2 -/ X^Z!+^ЏwI綷 fDD{]JKrߝ7ٿ0'"LVhnO2fbS}۟x&*m04Oe!]ʁPq;U?7`G;8H^,}@uӱVȁ4:paP}NG[U%oQG#,3%$kjꓥ }QV]L PD٣KcoOPZx?W۠i]0l#3  j*rLjQ՜vLKaidyL Z$ĨyŽIvÃN]cD1smzTlʈ.m0"+v8 y`/桞W8 T qYٞs͓'5_5݀x]cТH(tkTxm^hlءf]W>ucGB£a{BDuH݁u?ޙ`Klhm~fo(& S/+.ƢvZCEJ:b/(Di|N*Mf,HS7P!">Wm{RIKGX-up5Nv);2HUb^E[QHDp'K>}d5z8I{e%lIϭUu&AKsRs?_E4ݩ;a2 - `]y4EW~ѓuy6~# Q Qptvgy 2. \tS$NOq9m7W1AIPیuS!40Q8\>jwň:ԎO{lfӸ64[gss-zMꓦgg!Ds\*Ȥf:S<S?A8|_4VUŝ}}О@BqDU=M2o^KÕE)ʧK/0E/.L;`UpiYi#PpungaʍpDS !րmM ꆨDIM3JgA:S&@tr4Z@:T{!;:NT3mPqYq!]t,l.ӧ5/s3]=5˸j7֚WZ#ju5u6AϔTKbjp壖n+PK^|/Q OP܌bI uvo c07\^1"Z#3=NƆ}S+Z/2Z+&xڭä?<,5YcXY-|i˂Zf\}Ȭ:Tw"9BĸǴ,QOc06ܛM!O8Tɺ$ ӭmY%潈חo\}b,z4 BYtnl' ulq`6c_5VoTWkgTp ܘg f*X *3Z6pY[4-wfZe_űdebsecan-0.4.18/.git/objects/24/0000755000000000000000000000000012315633246012762 5ustar debsecan-0.4.18/.git/objects/24/aaafbcc03d03b00e9538777a9ff28a6b465f8b0000644000000000000000000000012712312007050020315 0ustar x+)JMU0a040031QHIM*NMNcZskFK*M.JM,IRy :,/9eͰu"Ydebsecan-0.4.18/.git/objects/24/b46efa680bd378d4cec8d0ca30ab90cb712fd40000644000000000000000000000363112315633246020464 0ustar xڭWnGݳ ,!Rfޕ+d%tO{0s"!cy3kZ᰻իWչq9|zH% e)zeQQ;<; :0v(h?={W}Jp>ѯ% hu^LL-0MnVCpj5w_8RӹƻgZ휚؄d\.eZ2vhͤ$-|i"G`PsEU~C{N0hj? sL_Ovvy%֦ΘC{vx){ Ckr"8v|<6Q(hP5\`m@\1h23J5]`?aWPr!O{Wޡ*bvQf߱V'Wˮ̍٥XV!qۅO{Q]N='-ThƓ0;:'M8;k?OOwp#Qo4n~}{Vf\ޢZĐݰ_vh҇AchJu Ѹԡ,BX5X(z2iT_y=]+gpՔ:ʚԙʝeg Nǧ4O6GD@hC3G+4YSlK*֊|ACo9臖.o8EĴɶ)P=+ιxݵ_$ k debsecan-0.4.18/.git/objects/84/31c54cefc040359d7bb45c4ed8cadf7b4e68310000644000000000000000000000025312312062027020330 0ustar xڝAj1 @Ѯ} AF tzҵ,iKKzn?<}1Q~=.'S4V Zg!dK.یQVXhaF͂x$9qʢtA浏~c?}}ėͼy=zG׈TKx8_8|Mdzׇԫ%-sK:debsecan-0.4.18/.git/objects/0a/0000755000000000000000000000000012312007542013024 5ustar debsecan-0.4.18/.git/objects/0a/0014f852006bfa5d80ef0e24aafff3426525570000644000000000000000000000027512312007050020057 0ustar xڝKj1D)zo0HmG2',Uv!D}vjhA↎q֮q .); 3R MqP!5+|k8ߺTlMu'~~jSO0.-ƹ,ZAo\Dfн˨A!8joF0LW.fVedebsecan-0.4.18/.git/objects/0a/4baae31dc3057a2260f81789a6ad3146ef73ca0000644000000000000000000000041412312007542020221 0ustar x+)JMU027b040031QK,L/Je8lj~sbkt]Mm0,rsgؾGGݏ%,-|n-*MNMIeX9sT_Þ1Yz/TM+CݜK<^P˙RR2,Z}@,*qQK ξ1>׳WwClf7@dEW˓x}^Dz"!%%ť% ms*G:o'mdebsecan-0.4.18/.git/objects/14/0000755000000000000000000000000012312007425012750 5ustar debsecan-0.4.18/.git/objects/14/3226ef6dad46b2a2761f4ef844a160c250a0f00000644000000000000000000002536612312007425020072 0ustar x}w6DֲlޭZ:?&yӼ]ǧP$qMZ HIz?kC`0 '٘}{E~<ն\di q'Qʎ_8k>Yqeil9zy<_,x''_{d9V}%7`<ђ,٬|r fk|e%gqɢtzlMu:9+<_,я_a?Q^Iec#<Qg7=g=UMHx}! DsZnYÚU,N "[Ao' s.leo/o~z憝{{~uuo@Y67\@$Ч{~sŀ#RvF2Bo0`L"p 7W&: `DIΩP"7,4+0 t2賯OP'@k<h`,Ģ?3v˓SKvƺ'9KIggK6M痯~ (/5\Td{^_[]Y+?$O_zVhu?t N2;evIM 'ș2pt _켔l}Y /3 #ŧ$FzEӬ@IƏJ^0:@UVeo_r>-=!Ul [F:J,F_crh@֥1JFO`@ߢp.d!E : ttx,NiR jE=zL|3IA <ƙr 1P8J\,5Ϧ̳G4)PȰl>)-2 U-d>{/?w*4E,=+{vO:hw7!M+M :¶SF0:S`Vk iBYs/ UA;$E5DCg. k$@Hdi\O(.6-b+MgրlQ uԺ$d)kޱ,lCM%#ti ʚ4GnDFR{@Leęey^NU1(a |ǒZp{ra+~J.P᝷ *;lkRGw߄DU}xRfc JT_]'}sppg EXłڗFWk9i0Sck~Gc{_Hv<k$rZiYD.6f"~wBRG?]I6gFi1(r{}zg`C8()4eRy4duJ~/C՜ -e,s2w%R)c[ qyqY+U4 EYźAŹieoDfmD\yB&%1I ־!fB-l+d JI+sf64,Yq)4OQD,Pдvjj&^fzO\$w"vfkŠdE=(F=05iFO6 }J4r+@_~ ɉWq 8'[حy9V 6=+ 9F ^}Rj/ JH {iCo$ɺM/v#(^|&R4[W&Qwes1&˪[(xV,*7jp S1kQ[j -7U }k%mgiKL*KQDuE"ؤ4} 2g,nA 1hx&K Ѯmy7W/-(J,ϛu[q` H˨\f1=Ntu??VPZ69 k1QKU z^@J=k9q؃%%7slfA&(I%LvYlf>bDASeZuֱHN`Gΰ51{ Ԝqn6(Yi2`f`zӌTr,  ZQmXDjƹR8B pf&sD@ΕDq sȺ&EG hAZ n1'; ș tbT_OV%,t$z7<߂z-CR2iY3A~@q1ؽhV/c[z,Teg ߚ1߱S0k +IK i.u%ޘb',SkWjOÎE[iƌl0)l4@KkeWD3/C}Љ[-3T9g]!HI=@=)W6&J-E"՛- jɧ1ZSDa=e t[Ќب^;r;9 A_> 8Njh|`!`\T bAmTAI upW[bV4h+|c@6s/3id c {!"4V+Ĥ+r@|*BHHΧĘ&#hfʛ)0OO٣3`ˠ勛WhY!'n%։ͩY&5MKYnp048} xY1Պ > /`UOV ;mh!d/zOJ Jv_lKt6vڄ|/|V=lXEVk-qJv*^u19FEzdž0fBTh kzV'*ѯؿHVy[M a>[ԣI'h#]/lDshdvqG22Y;Oΰlp`N_USC8-|t@k ݼ2w'wv15g@+;60'څʸ=B+q ]fo3vynjm:%kt:k#pX1V=$b"OfP#[{dcv#-Eh=`l&&#mk=RyBq1Rs!Q8 w!+xΞ^W)k,񯰡QaMLk`-o23h^`iQyRY}믷kVҺ(fx5!Q"h*gGÑ0덐7Jű EJ}¸/Qi|#WDLB8T}D* 㟈mU YkmHYm?P}J+ji;Ɗ]h?_ۦ2"%^N&K}iZUF}L=5y[FmxPzG`jfh#Vxc/.o^=? PE.ŵuH7W.R6d .rU Z|TK<AϏ-K8 ~|zU= #ND yN}He1u;J"{p;^3d^AMsP#JD=C&s=Q)k>KyxOeJnrpu,(!'L[Y14.82NbhwFtM n[.1)>Ma\uO77@T"!2NiGW;l=r!Mhbi2Pf nKcs:ꅷon׆4T?'d] ~l }@dmԤ3. /9\l>>Y*@;fZ>&|!+H8/M } ;hyeM:lΊ,u*ŨW(odޫ @ٴYO.7=#k :,yjFH*fnچCS$W]xiGzdq`0vj$#8g7P m^4@gZ) .{8B+꙱} Ȱ!kLfQ)+7L5HVܵixj[ NBUjC/Cw{ e Lj-qfgn7jtnKqW5!i  ˨Frw/BXn*,aMi( ? |׿Bl0|Du@Q֖Gs&C_cr1%C욦j&]9 8(bxa? zc~\ݼ6(ԊH8FPT矾:9qd&9/(RǾRC߼//xqQ.3qЊEJ/ΪMyh[! U=$`O,@5(]E<۝H:Q$$J)jzScmӠ  A9(-@g%n4֔Z|E:_{"`1]y+"*F Wh4Ӛ݉B.DF6S[&öyz'R$b;jS^Ϻ(b '9_-'hITӼH[yUYf0{k3q撩ƓڊKIVi5rرL w);X]U}A6[ @xGÉ1 K{aU LkxɁ@OJ揋4VDܡ o ǂlV8i?DJ;>Iyƃ@)V`gzOv䬫9I*PR`g]m!%C{dt8Z`u:`H(Z8/Q9"= E-Uߊ./Rw,@rUn>D7o\TĴxu5!^HrgGsf-lk `~!d<r$Hx gChBNSĒOiMllГn"k!+y4Ru+eӍ xr]EWv91 ʡ5,q\)ܲߎU7.BϬU(tk|Buι*,ߡ9šC+ʙ]7XHnbI7EǹGFg6WW4GEzGGw9Fh;#q:SԹ_R:  F荛)3l3:R M5((a,8iS, ?zmS)˄2طnm}niXѲw]$;>I괅\":h\:P:Dot8&w<{ϘH]r-N#j)vj/`>NxpŽF[=r(kQ*&4=Y[ bE]9izóAXm^7Um]8S>߱.ӄuBNSUqsk+Va"Ee^$ 0N$FP'9EA'?J#RA /tGHduo{dHV٧f }%J"ؗN6 q'A}&o=H:(VrUgtYHĺ?x`oh1݀HM~ 60S~daj#>Hv T>fY&z#Ѭwq0:*$滇%C5O'mn>j-#(rqamN:"3=ݴK,j-DW5ndk?wXSNUS&eG#n&\bVDrhOcQE{i7X1^9nbpe$`6&Bl'wwn`yZh`{C?Z$R(qw)5*RM~{zXVf°n0Y.=ɘKMŻ9*6-gxmlTa 6<㞫`€AkQK۝C6 HxDz?H@IaKnmtr`,M\T_f<:(zx[T G>ɩmb/d%O"]QAN0~3ܢcPnur+jI䏇Z<\ޡrT# ֠kTX= IDpu| Mi䅕۸(nM`6*AX:B_Ufk&SB5/Qv'@v[Af%Fnk86hw:jZl$ 1B[y /=AZ~nrElZt55m}cXGlSl $1j9Csq8AE:tpopSQ\۰rF6{RzZŕT<0Pϫq8٬uiliꈹɓؚn@M1hQ$:5*[%xi3Ni `My+6E?]}n{wG@[H܅ E1"-t]y($nr>Go6~u{h*:T~g%9 ٹ@Z/QuC*:R|AR-a21|D[㟻=*}WdAQuq[ Y/:m vZanBE5pcEF _g*~"cY[n:ߦIoU( H=)IiC xggɟeq8NզY q'Iط|%ڰ,Yl~z6Ez;XB+{ OXj\ӒH ggCR/&_3lӴt8K+dü`|6^)/X5Ųd~|-gHzH'e:YY-rΧl` {ܤJ S^{^=SMHx}#n,_aa25NYy !],ؘugE @Y^W`?^\P {. "0"`PWW./ً씽9:{˳Nq߂ pʫ$]b,g)'u{W&@: `$<BY/X:cY^P%0&6gdgC$[/tTϾ pѳ㣃?Ώg_=|tyQH:"_%hv{O J`BK4X%\ȧ2J2Yqa], Pɪn;0HNUlG|r /aW;$YE^l\<$8)Q^`2+񃊗`vi WOK$1Rjl–IN ,%6u΀I%y -bC\tŁMeMY#vƓr5ѤHWr>PHy]VV.\ޔ_NgHʒ3dCn4c\dLez :-(skp3Pm=P %K#/ﰦxW|`z9.( -[(l2Y036!%FQn/#9Hۛee{,z}_ۣW#x1Uו5KH`BB\}-=@:K "V {+{! ]FpwQ.b]#l$ EfX)LJ^dnS\)o`ci -|KJby?ΰ|/>4ؤ [ wuWLxRzEΤݓ{0=@mHJ#2G^"gXaJ]xD^HaبԈN%^ ȺpdAXry^Gt |FקL~f?F_ߕqF) 8ygq+zi %`g BP5eq'/ G_|.A"#E)®Mi7R3H0 +aB%#wA=:Q`v#g eB牁9@—QŽ~ E6DC'. k(HhiO$-&b+EM Ŵ׀lQԆmEȁkq, lC-%#q š4솢n EF.gﱝnCXgUeB6:-ƯA)nUPU?ՊPƇ] SWf joqTa\c>8i&NC%o8ZtQ+IQ:۬d''PiVfa5H_JRI@"AELfΑ h I>yOuDT]c&D`(p ܭ:,~-%m3άbR5,pPVShV$\azAD(F~/CՂ[.,]HJ-% UpD*w0G$U)6+7禝yٵ` 8$.Zlxȴ+ooX,Uhb̆% x'4f)JZ@NSVL)doaR1 ?<?B5P #OHnRs^.T̬T,Nd ڮ6E@O5 j"5*,|d; -b(͞l> !;Ri/˭x1yOzU< ZţsZ6rdi`ΫARtarAs'fp'v0FbGa <g@ۨ"epJI!)PxQy_}Z,MP XT֩U3x SܱkQ[j-eP"t$&GIڠ#&{vz_Oz}LrV#w&yKRGՈ/E%M[g w=<)D_Y+ZN"jr$9R&EխC,@`ߞ]\.o՜Ͽ~ۗ/x3ӛ˿ۘ9༜'wp@4!`V/Q3uB ཏ- ;W ѲZCh18Q-ny2AdŐN҅oEzG7|: ˪)+m״#OİX0 ,jҒ,لGVGޞty#_9k^}4Ͱ:`i^u=6l%Npo恳FN3C5#QG=x}bAӎtp NN4:,0K-K߷⩎iK׵ mXЀu㘂31^$޵Ѣ>(ur4ZO"\$˽%hOo@e%Z<ׯ.kEA2Ԩ{p vk %88ym2`bu*kvEZNz_3r {?M'Z{*uEۦJtvmGdƢpk1U=UJ{pqA% F#Fhc̺0|KgciCb?S=)DQ&Y<$ (%Mv&Շ#~H OSGp^0(W81"!H'ZcCEмJX7,|p\!~W7P,1 b⁛cT+ٚ) 9 /Nmn)28la^>#YwCv_i+WH7bk>EuE3莦jNM*k߷ 6mחщl QWQs|J[W\2.fӅ˷Wg#YKWg{V1| ;d]=+v8E&oӆ_R**+y~t5-:Vi% djC-lSrf3bT8 zls,/^R / @m徧rv17‘ʪhpQ!H`U4rt$mde Z֨/HbFFp8xp`M@@U>zq5E a^c4:0LGeA![8I.s@ n6":Ekx:iC:!ഢs<2ozJBP.uq-x͠F HƈFR]`[#og~ Ubd/zf H1%g]YL;|wF)<_ӡfn❕2'S05(l?0MKl/+H%p|$ j IjpE F,ϓe+`0=XKW. .@C7 upyUΚע `#뚵@89FĢRp mV>.u=5'B̷(P-NڱN]cr$H߻xvABa ܼ-U6EK -#hH۵@QO;c_W_%"y٥ueoo o/umt!h24ȋC)m8,'%?<>*:]-G>:uǀZAk>>:E%cp;^V QmɋS#*aD#}& |Bj:ȬC>{LdAOX" @P'R&ĩP隒,`6rNGtY]SUG{#Q`ǔNd}Ekxh"O+']O+xܬm,c^ ՀfpL&72r{hƘhbD̠&%Urk~):5#HTOMG(_e 7Yv˜BH7]B`UHNM+We$% %<~\x\H7]{txPXcќ {%0|sl>{F[TٵU)}KRralR(iJƀjPG/iHRV#aAVё ռTG6́|il_?G蛷hlͷWg?<٣ ]I+ VvfZpiv"oqz?BiwP${:`AP" ?%:s͉t?o@Afݵaq6iTōJTц' 3riljEM;9=kap JGa%ÆH]5)Iȁ-GOw,hGv!'oXƂlW<AH'@x( lMR-IRTBbDy'+}Pp5іb X2@ OmOJSNVӃ.U'hMӢ:MXEZd@ҾY-U5_CmF-U:k6q 7- $>:1l^o|5*H%؆:j\CNwg[zA8;)U ],X4'd[iEzND9*Dբ1CHbʀTʭޞ^ 㺥!X<$ɄA"J= s 弡zS`yBԳ ;^l8EBiȞo'Un{/ZU@wY#c!WU16JjIvn9ϋV\y2DZ %j|r&S2((n5c M71C,9Pmh[IOb$DE6_YPlmPqF{e_Yd8 Uk)AC|Y3cW>ixMYvBcz . ,Q{a17 "^ɜsZG<96ϧчzLl^i_Qn#GKP܁lQǾ 7.xYWm#k{:MIOt|?o;f`N@m%1#m XmiheHAL@; T#E 6B@d}֜q`~.*Q[m,x o3!b``Ǵ&667͵-؁:SȫJ WN_0^7-U+LQi{@_|À(czxh6r2l]J<-^-#HU vAGrvM N%gJ\l½{61iϊLt9qfG":QĹ+ߟS8rF );lsˆг"N;'g:s3(| 'ˆd6zG;(Qxx[i5Z]G81w?>eԘI,EY sDjg1|{C&4ukhC(߶ОwMӊ-H!ޅIR-1@uF]o纋MבrĊC}TT]vde{rlK}^<|tjDƷ] k3L"^RRO"Q:mDyZY4FAE VwAҖD)O.,R)gO@CbCdw.>)E{mdzoG$n)jBiߦ/k-mt!m^|+˘6BLz-3Jękk`PB%dQWN R>l~=۠Y|=IU^SܸHC>cxOS :L J"?B{*f-Dkt uZ˾cP& 2{R+ȈEAL+BtDGZ*w̑QJ|E۔};}jN#">xF^G1q5~HCUL't}lv.ۛ }9`g^eʼc1UƥoZlm֥YŶG/cmmG57!ѪuSZ yND_=pKDcLp jRISn){WA 'd*y*!3y>lQbEGpfOؚT6bGv&!`RPDZ @V8p t|8GQ\ ;7n oKl`rm)$8fYܛ TS:15LX?>^l3bIό]#CmIM.&(ܙGz‘N/"w}!᝷}HV̾ +|e95a]$zNwxlaqD^:* 6NJ!#A-2qWoNHvt1c|-37hWQ?"l$V zmSۤ[sJ9Ĕ DC٪#.#( Ze4{ NEp-qG2H3ks&H;ie)e|f1xI8e~\GwhFqy ׌^h ! [8 3S!X|2Y4%ZG" .'Y#oЀ~9ؐ3pluP"QlώPtH݇$tn>Zcjm=^PhnCi qZoIVbfX]t]EѰ }A2g[9#,uqk4!/Oa|OM/* Lq8xϡnZ>CV/n j:'a>7܋&c .e%7;Vtz"<P%%fH1A^_.xX.EYk-|Cg " z:zpul`S@bimUQ;eNOX$N;VW~7lqsz#Y 0JDۄ$ؑ%A5M&mn'>j/)i:3dm :  42ܴKlj-HW5dk7YXfSNUQ&mG#@iƮ|d$yn4uq$34[)z0bZA0vڮnn|r[hZp^$ 7>RNqocjTi?`f\&#Tp՘-Mq -9xkonB x b@}=q~]ià􄡅7|, P7O@svl&oHuB*dNkGeR%o)O:SWۤ5^ISKD>`|gxDx4V[֫"ryܔAn@_dQn^ o-gKh #/#Gymf0PRi1l!/kLMͻ)Mj(Alͥ2NlׂMBGuQ-ܕp6HwkZlD 1B[ ^Z[dڊJ0D9o4+IjN7j4[ư,,%cBsЊXگ(f?O3E[G;8-\U@՝;HUKRn<-teB讼@79Qa=Tc=G|y$mM@gNry$$H'!s!:=Ȥ>m]?(Wg-RC$G1oݣ18" j p.yf}*82dňg''0ݽ.vyX_YwF/R Է YŨE/G{}!*;upD&Gf@ruY4;ԟ8\]w/&qAur) O(3Qw.x،h@VwY/ՃnцuK:7fޠդhZFNva{LX2Q-LT~i~_JJӴ`Ժ%,T!Q@XBi3~M^}9PؠM{ySׇBE,qJ* [%`[-S(ݮ9P>%N lpG_ߕ~.T5<1{M@B싪qk7|/'-"yN*Ñ9*` mD9]ݰYXkr). $. [H}Obt@o"GTj\(OE=, _z1- "`/f{;‰\ȢF> ӕZmW}ZK89!yUÓXӜ v{;Uּ ; Vwi XO]SgzDJui(9f W6j6_q.[ 'ȾQ|Mpd}JBr35}tZ"a~@Y\A9 v R"67O^[ cJ0n&$ӭ׭YjBf[xeҹ=Eȸ9!u^SJ ;uR3?(&%$13aO}{B컯Fm FIUAbrvbzj1C wL^L0Lp0)2mӝ&R0sAV#_T&U2hgD' Mrɗ<"TYFfqI>Pɍz{Bn|zkDz>D3TIqf Ã5a߹?+p6 `-<&]XRZ +>7(.XNrdebsecan-0.4.18/.git/objects/56/0000755000000000000000000000000012312007474012762 5ustar debsecan-0.4.18/.git/objects/56/aa1f4301fda520369ae7c120245d8d92e70d1b0000644000000000000000000002646012312007474020075 0ustar x}kwF~衯$O2DQ9юc{%9Yɦ 0(ߪwRvr|:'1tWE>f}ɟeq8NզY q'Iط|%ڰ,Yl~z6Ez;XBXVK,5iVE~[$KsV!)&_3lӴt8K+dü`|6^)/X5Ųd~|-gHzH'e:YY-rΧl` {ܤJo`(7{,9 ]|b-Gn8eiF F30t`c%}eOW߿~{N_tzqqls)])1IgϿߜ<8zuvy^`/O/؛o^_ ,5*eyúX,3U5Zv:afiŝ ; $&rDUx_:Ä*vZI>+G幄yOt+YT`u`fWyVydDd#ဠV&lddROkb _r0ERl8l# wDxRnF=Jn߇9z# څ]қALIY2 ɐn{1t2G@U؃2r9 s3PmP %K#/ﰧxW|`z9*(g]ZPcْer;agl4BL/f}r_G0r%GDNN6g<rr`NdG 1tagEk+te+lo q3}]w?kl^}lưV^W*Y# s L&sh,/Xy8 QwM02gΠTDZ jXHoIzF*v lw+&XZBdq R<3?ΰ|/>iQ[A2-D>{/?*˯i4JJY{N;vO:j!M+=92duxyd=E:'w~/= TJ|#G2@FXF4v*aJ`Fń#'ŒM >xH{T3>=grˍ70z܏OߕO7ROIEɫp;ΗeRm9`\&* ;MQ6EF.gﱝnCgUeL6:-ƯA)nU`U?v!/G7vٻƮ8 F.u}p|ӌM0ՇP?X/J p xjEFg$VGSf=J&NM+ TMjX-7E4XI yǮ\r$;iO9D0{I %fNwg=J'ݢ+D ?*-Ei}fB]&zG R&:G6{!:0U *o>B*zFsJ% JqX7_y87͛Ȯ4OHű=&/%d+L&PĊdwE+{g64,Q IH"|(i:5O%6)doy;qb`x~2x /B5@G=,@yŽ]wEUԝ;21t.$SU)fxQZh=(lUԨWАpElx!p:i`ͫARtar@kOLͮ%A *.8`4 zqhB3mT2CRl '^jT>LFYD9cmO!k(xZ,*uj :wZs^@2SN$RV0GIL#=Mf_XGLR}bCGwU#t7}x4n]%dDqPv5e~ hx]d|')sM3phfs73 u͗ 0r!Z,F%%52yߒ:I! Kyye~ZJ]X_HMnþlaZT''2;C‚C&\L|U*GhDDNE΄ i+pmԴkҴVFܠW] hI * >?COE%Pfг#2!~naJLe"l9&#*rKhˍdNE 9XIs\~"]J[ fn]LMs:JD/eae+YD4nlDtVk+ӡ.԰Zm og@HȚP$3gPjn gj@S-!q-r矨!JqSV#=mK%:6#YA,G2COcgz ʡjY 9(M/TB8.?jr(r:K;aVΧPu7,`t4~9~4~#Pe$wR7mt^жtUҽ߹<z!lZѝ;us@?T I0:M(C?i2PH ni_Fgi>AY.Y?\HLYr՜o_Jh=/6fT\N@`j&x:a gCsV/Xv,83 ߚgz%bǞ7V. hg :B"Oc=dW[iK(9T4 r(!rW|t:f0qh]NU-EY%*S@ˏᛞ7%b#(Տof#kkDcFT]`[#Cog~jXbd/zf H텅rV`b0Fûwu!mh(_P3'&fZLJ@hge2lLg`8mF"o-В!ۢ&>`eTYN 2\o% 1G;:*Ȇ9/-rTy]_1o|{zuvpo^3@e\r ae^rGH*~ =J )HB !GLp_Jt&5'A0b2){jySmӨ Q5 Og% riljޒlYͿ |Z{~už f(5g2i6'^BfcӤҫNgRo_vi LڲRKPl♕ @oX!;Umˋ~1fAyXО7m=⯿ui'ΰv*XvO5 㱏L4N\JQkYSNexVx}g$Llcv7 z& I9pt6D29TH(lR'ms~F6YN֞ &U: ǃ@W`kvlW&UjYَLG׹~khe|dؔ'k{V4PR^tҕ9&=FSAFzg{" 4)wM$.4ï0ui^ ? =y0pQL/ņrpcܽRh?; >4djRmEkr-?k$,4wd`5F.^m -[`Gh@aU巬! .3 $.1ZbAGQPD?$BF6@1@q!Svnzg|XEu$d)jCϻ Y,BDd()ϺDgkr54+ KZO Η5qfu u0S%4,B;:1c=w ,Q{a15 N9rZG}]u ÛS?Th"[my Q"u g;/ƒ zdnU;)Fb2Nx4eF.kFoz Ew;B=VG4Z#s PN=@o{B@d}֜q`~.*R[m,x ·ZqDk*X)I MDsmv hN,+B;e:MK [TWz90 ʡe508~6LMG *%~ۻvz6е ꎊ{['ū]s3C^]7hHnBޤtts(9(Uz`ܻr=HHYhl|$n PV4;rsű<-YR$&2Q>"1 v[SE[nBtkZVoي I.$'I KVl.6# RZk _>&+ۓcۺ\IGoX`hHxTˡU)2/nmVMXloapICA-`tTD:!iuĞ*mA3ɣ7}Յh"uY"zx!4/6HFG}\e/}bT5nF&{;"qKyP3J6}^liõ ic- 6׶^Y<.myb^(kYQ*&dA |E]iZf |4۠Y|=qU^)n\$d ߱ۿm_NBCEXmU=Gp{ {3hpdq6+e+) <0 =a/_q,x*OGT`{4*r': -̗\Mهϱy.1"'/͋t89.R\tB0۲ee] lﲽЗ Vx6JU;3ZQ0.}ײfk.z-gbk,wPuؤ !:]]KQCjY0VU.qmGEr6ƂD^T)-ŶˍFfL+eQo26; k'Sk,O?0ajtzps̈#w$=3v|.{^^ u|KX'i6"躌opgrmJ G;avG;-|Wz!Z1ʾm8V.c`֠>pJ};m㱙yA ^R28){h wuVg;y f}ACnjmܠ!_e@>W$Frd?^ģ~Zcjm=^PhnCi qZoIVbfX]ta>rhX^sǭōH5w=L>sB^Vt Lq8x-nZ>C}_R_Z6,圄n܀~E Sk/I 3:l,cXIrE">ET<P%%fH1A^_v.xXJEYk-C2H=f=@t6R)?,n:{[UNrVcuc_ Iβqf}NP3(UuocDZfs c7dam?7("Dv.qLqM%^!4r`4);֥'LFS(<M /ayJ4^(ĒvÈhv}ts;B3$ug m"inw+wFP ɯo_Xm!&e2B7[?>fvWfPz>tRDw(DMLqsvl&o puB*dNk"2)N ' ɩmR/%K"]QAF03ѱ7;5$CH\ޡ;7FAA$p([K'Q(m`#7݌2A*-?F0e픩ywdH-T 7ZаiI!NYN{M뒍|V~DaĨV-?7Ίcl\7t5mR{cXglo& D1j9hŁY vpu߽3s?xNQx$}. o<:uwÈi){]=mh^ss{ ZMꛦedggAD <+HG:,4!g0M F^r(_yaI, u):>Bmۛ>*|fsUtƷl?nN>ts4BѺ ;='~}=|Ww8?R <=7Q{ I9"EU=U2!o^.ZKÕE))& 05; _|êpGȳT`rufg9`ʥp: DN %!րmM wuIDM'-/'FQϤ(^FC/؋ގp"Qi#et׫>%|Q?9!yUÓXӜ N{;Uּ ; Vwi XO]SgzDJuti(9f W6j6_q`]O|Y%fj謷D!9a~@\A5 v6Av"67O^[ cJ0n&$ӭ׭{xnE;f ʺs{,jq%sB;dw"8B(F#:Gg<ͦ됋&4TEɹ$ 1u^ċ7/Pho)>֭~"cKK\;?1+oQC鞕S%rc4hVv)Yz[.p"M˝WCdebsecan-0.4.18/.git/objects/13/0000755000000000000000000000000012312063554012754 5ustar debsecan-0.4.18/.git/objects/13/ddc66c6b8eae0c9ba3222f9947339eefa3c5be0000644000000000000000000000044012312007503020466 0ustar xEN0EY+G:PRBB *bؓjjG~DVsCՙ&Jd}wSMO(qOޜ0Vp]GgX5R(>?鄆#.,r%`9Pv˭^=. bmDŽ!(~c(f:3˜g:昶x3t& +274Bt 1'1a|!҇UERv|䩑O{n٠=uĵWZݬok\Zdebsecan-0.4.18/.git/objects/13/8c543593f8b17a2c3186a349d93766cc805ddd0000644000000000000000000000035512312063554017774 0ustar xڝJ0E]+niW;KyyaIMR-~{+i]Cw5v<v :ekfQgJvV0ObrVdz"|xK̈́'jStĊ5JСٸ.Bo)i @Tʥf>K3*{P(J { ۂ\׾4Amdebsecan-0.4.18/.git/objects/4b/0000755000000000000000000000000012312007506013031 5ustar debsecan-0.4.18/.git/objects/4b/5bb3c8de5cfbb8dc56b18443f2b305925f84ed0000644000000000000000000000715612312007506020423 0ustar xڕZmo8quy۷uwIl Xes#({fHIwXt]gyfUbV◫_.6ZYTŵZiXt~T&,u#;dzEwt&..~џ?d[/7ڊ]f֙ 35qz/tj"mL\ F&[H#|D&||xU2YJt(tRnT$VNm!-^ qc YڤxgY]\x=a2'3av D"zMWNYp {$bDaU\$=dy;}\gi8cu1xDC441G30,?&f|/f:C1Ηp.ft1S,r[3\la|Vpu3"؋,E&&]]6{c'*45{bd 1&~(EK{-ob<>KU{`qP՗oV/>?Lg"|b1L<`0eh>-'ӇJdY=Yujs$0NOrAd*;˱djg܊"!ts1e6W[Ȕu)ۂ%ؒghc Š;5cT8Sh 7'4LHfeMpJy3>34O(*]$ MD*8ŅYt;VGɧ-L0n c9ԗopuܽeq{=뵴2E IaY>G(0(jflۇRB4?R&7."of/EGOnXv8 &f0EZ  EAȈI""Edibd$w=;Īle^ئ2)o/ԈXYu7 ![,9ν&1k-ɰv+Cm಼|Q2݉<TK.RV M_z .we¤Ɂ^: oVPM+| :P V0 l\. JtRHxM]5@zZ(-:(-#)Ƒ|5o+uboGjWDk$vL%ڒ>E93nN,g8t4ӯy!^m8'਱-escw=d &s)QNw)1?S#B8^#:'grI dT`tG LևdΜZ~9!2J᪠98(R3Xl'tFӇ hx4.lCЏ rbi(!"% ٪`2 7@04[QQb?!ް T\*$+}`"us/QXA(9V^J;39LwJm,w{28~Ydk=ܞT_%ϱ?Π#In* pnm;nP,^ {ٖ=;],M3Kq!.W2C3E:Gp|vrH;7*| EBj,Bp1Mr9[4+x俲^bKXň N^8U4 d{Y'Xm]Jf%1:8hDa:XȸcPzqVLP^XgSΤ`{Jnc#':4maX8Y(_o)niyoF%Z]V2z(P:-e j&V>zv4v\Yeb$>Kt氇%Rp\%]2=@KܫJ2G• hz&` -J JWW@*9*rZ;U1 .]$W+F|b]u|<Ηo31AU#,4+'ݙʶ:i۾%K{u^Lqݙy4~w#MaT r>'? W .+JO! ?OꜸٹ74ko ڜ>Nv:oYrI2"Yb<ûŴ`D{y pߗH:ęNdebsecan-0.4.18/.git/objects/c1/0000755000000000000000000000000012315633604013036 5ustar debsecan-0.4.18/.git/objects/c1/74a5faeb27ac105d064f729d8fb524635e5aa40000644000000000000000000000071412312007542020240 0ustar x+)JMU051b040031QK,L/Jeha;Ux (.*?`=Ԥ<r^?xGA%g$楧3\ZlY?ێ2*Y/ as Ko}FBQ_kDneU0xu'OV_{xC%ʢoL}8{IZ,jPE)Iũɉyz@2^4-ʹm/1CWYTpcTҳLb>"]aA~qIf^q C+iOk}JWuoVɩ).ezDP{3l_(m? &r?Hأ,I-I,I-f8c7?Evͬ;fR; P(g;`:~_bH=(sSSëf?[u2'keWfChs3Odebsecan-0.4.18/.git/objects/c1/73684d2f7373373d4e878611d491a343053c110000644000000000000000000000041012315633604017452 0ustar x+)JMU04d040031QH(K*M/fqXIۅn[uÑԤ$f0P%ř) K:o|_WuEHI$3LWw%&gsFձ}Ydebsecan-0.4.18/.git/objects/cd/0000755000000000000000000000000012312007542013112 5ustar debsecan-0.4.18/.git/objects/cd/ec33ce8cbd240d96344febc2ff7e3a3c9b37800000644000000000000000000000013312312007542020545 0ustar x+)JMU`040031QHIM*NMNM.JM,IRyz J1y_od5M!wb~fI-oI%debsecan-0.4.18/.git/objects/23/0000755000000000000000000000000012312007542012750 5ustar debsecan-0.4.18/.git/objects/23/0315a37ac9dd0c6b4dfb73bae3be694ac66a590000644000000000000000000000013012312007542020366 0ustar x+)JMU0a040031QHIM*NMNcP5&Y/wYFS\X BWu>Y^rt9aq%:$debsecan-0.4.18/.git/objects/9e/0000755000000000000000000000000012312007542013041 5ustar debsecan-0.4.18/.git/objects/9e/83df0434551c8a11732aa0c58252db5ac93cfb0000644000000000000000000000035212312007542020151 0ustar xڝJ0])^Z&:̠ a .G|{k \~;n5ޤ$ )Ik+N,yTP#1CBo,5 k|5ZTюe`g+rH R;ҍs>8<]>xys2 nRM1OǺ~?9%ײ\[^VZj:p,MiZ"#ϧᲭ^5?g[debsecan-0.4.18/.git/objects/ef/0000755000000000000000000000000012315633246013127 5ustar debsecan-0.4.18/.git/objects/ef/14c791fcb8e74ffa193c9130967933ffc18c3e0000644000000000000000000000712112312062027020276 0ustar xڭZɒFs$5 mv5EH ,MQ9K0*usf:ke,L5ac_b1)DSж< *-J>Ig"OƞeYf/9jɮKE˲dy%O-ϞR2( ),؋Dvg_*aB{$--b>:%gHO?"rYeΣȭI2KR%eV/.X4BXUrla9{<]ATL,{M%zK3v]VIs˴c#+e"!"K;e(*QX쥘D*2 /JL,;%Y3;^J%zy4nzC5z1eQDK2ҤTI":s7frkL!3-hZ[ͅ'UCsTs=0<$ZĨx)irԲu9yV[ <]6HK^d"cw{ub.{WbqbI>>8'1]2bs,XXZ'8h+naP_TIQ OΪ\Û-)R>eb#[NU+TY,\%+WT 㳗?R)|& [8, 󫞾2Sɶ5:?zxڣ륂JVS|NxKN,S68u?<.<=ƍndIa6$m6V \&m1vx$ Nֈ2c9<p҆=% IɄ`SpO*AI+יx_]VgqCW*sGZjx&O ^hNH*=et0unhTgPfRuʗ=IZRT6o8!m{#{++zK"tُBg9ǿ[v=x* =W:鍌B_9sG_7 k^JLjc!T;M/`Rkq&YGو8;{#u/)_,-Om_\0(Av\~.@\~q@mwҒ]g_5X(Wgo?So9@ ;2f gw+!rU懋{l ]]C1RUu(%$a΂Wq-r!j!pgBShe؜QKӪ }: lo%7L V\:Lsl&miu0f9*JQլd&ë,HCãGHh(uusȨȫ=PliZ-S)詘NykX5F4I"?8H`F| ~j( =2 9 wHx(>r6f{5;RZ/J$IǨ(^png7PBCu Θc[VoP#^<hٺjZhI ڢ0w$|%ftsXZS #\.xΫYW-_i}{%O+`pxÝm[g˚T ~`Hl{,kCuȈ8yP5:;:Qj>LZzt|^|P0$/mpҕ9h {. l=C?=/8Ow@Fc}DY eAGw.a0Lޱǁvr6^sv#5Q*I3ZG$XԊOv9=]L;mS?9jyEUc%@ZGs Hmz{P}%bSe:9UWԑ]#t)ټ`uFf{ ƔXS65$z#`0I5Q촖!Ld75_Jc 6(M,S՞7![mJ|>I6/U@gW7ThD!f,@YRNK#oh)LoRfбW0 䏘,{Yi/iQCotjUJۓBƚq!`.] 9x2zHEٽpLmFCby:У0\qDM@D3dݑwC/j_Q.9/zK)9 S5E4hY!O:v/ݭ\QY͘S5cܠ't & ,ײ{d$ϗL0ԳU`d;Qֵwn##M\s iZsD}$ 62<- ȮjCܬ59?uOO'ߦ5Tcr1n ^MhZvLZ5Y~c'"aݡߴfd ߢٛ|mVՍHn5 vtĴfȵB 뛧]4JH~2By25A659VMZAsn-\c."#ႽjGU+Q3,=j"Uq(.xVط֨_l4or\P=?Y؜+Sm,([. YetKx65'H}=~PCPimo "H>ͬDDWdcDlE;w>b&t#WYBl bpQz[ܞmF?(ޗeR?3D =W7RvP #jYgH@8f(cӄ϶h2-q[apN;q$l ;wQG uHم D]kJfCl=5\}O{y ]p]~~LR:fkU dzy7\UmLeQ[?x-ܙ8Cl07>7햰X=/3n͌wrv^|5EMdQA]$n]pݺ~餏w(Y;EV?e>}DzȦO~ZNv>*a1ASsH–3B,>wkpY{f@oddebsecan-0.4.18/.git/objects/ef/866159be6f4fe7e7890dc3a40aae56fb1bebe70000644000000000000000000000013012315633246020573 0ustar x+)JMU0a040031QHIM*NMNck}դ[[b˼>'GS\X BWu>Y^rt9aq%#=debsecan-0.4.18/.git/objects/e1/0000755000000000000000000000000012312062042013025 5ustar debsecan-0.4.18/.git/objects/e1/47433a432ceb98bfe6bdd7e30b3d2ea1296e090000644000000000000000000000021212312062042020311 0ustar x-A 0={®4-<7mDjP{+x9ap(ReGYtdtK!FšZ"k:2u{*HY?hR+\e 7]sI5Z[I@I_*{_}C-debsecan-0.4.18/.git/objects/b5/0000755000000000000000000000000012312063554013037 5ustar debsecan-0.4.18/.git/objects/b5/15c2e985f19f2de2bcf1e18ff7412d6df580880000644000000000000000000002664212312063554020311 0ustar x}kwF_C$O2Nő8$'wF 1"%39﷪h·9@"r?'8\8Wjg'l%$;`q |.jNdPYbѳ==:"/O<]byq5OK*"Y2x2UI6aeUuYZ$[tf:Us*^,Kw/߰xƋd^Njt^%3)| Vx\JM4x vϋ~ ^8QR!WX-X7lT 8r3)K3jx`4sh.lٺ-@Y\ӗ`?^\ߠ,,|\.W1IϠ.}5N9q~=?zyvyɞ`7/N/7_] ,<š~hu`JE)X [L<簬\ l_3h#Y-ʚ)Kg,˫>{jBm}vM}1JL%TΠi@ռo¢?2vGiuw;伨h$Y/V4='[|Y%EW0UK4X%\ȧ2J2Yqa], Pɪn;0HNUl$&rDUx_:*vZI>+ȏ3F' 3>%5*+f%R2~PՁ]eZ%isZ&eKE?aM`3 }"jI!*@ɦ$ #rƓr5hR+}?(荴.++vM.Koʊ/q3Y$eh3Z$CbiƸz 96 Te-sZ` .͠CRCb.x,9 G_|MaO,r TPκ.,oGxْer; X036!&FQ/c3rKDm08Ϫ+xЅɁˉn- s"{t? Nb ` W"ӵyֲ}7ʸX?klN]lưVZW*Y# s L&s,/Xy8 QwM0o3gΠTDZl.6"3U&%a/02)WL>U<3?(`X>T4بZ2-D>{'?*˯0h gYQ8m{rqV;r'2GޞwD^s";@`*w%>  &Q rS# ;mJ`Fń#d%Z4+hr`Nq#Q/7_nam >:~[~zM=N^oE{ !;)3BnC3ق;TMpIK|t\GLGRQ/S5i<%3p ha[ď'Lf|}GZnyjO D5p9P&tz6Q2c*{}_%;Z zchѰxIZMV%ʼnW7 ϋi/5!G&Rc&hD<>p;ΗeR}9`\&* ;MQ6EGBK]a?܎"fUeLv:-ƯA)nU`Uw!/G7v۪Ʈ8 F.u}p|ӌM@C%onp xjEFg$VGSg?J&NM+ۤ٩հZ8})N?n$i2{M]Hv8g$r:ߧUYuAqBQPe s!>N4 |JJqX7_y87͛Ȯ@t\'Xsڗ &Ӯw T;"Y]bڊ3:(xI\iݤS$> ^L˔EZ8x'bN\^` >dP #Oo\s^.TK̪TlNd:4$SU)fxQZhj6*EjT:UHx;@-l)>1!;^[bZhHAsZ64xt W`辿x:!HW]K6%t!7? p.PšQE@JI!.PxQy0&~g猵 ?X> jA֩W3x SܱkQ[z-gL:I$ΒHL,KY%Vk3E 4٫hx}+fby2Ij ]CyT(Uxuy#̓KAՔ WAοXtp^f$gnfm K4_&ȑZA@tf;~K$hG$,;Rw*rBmrwen֪:9lV;TjD Hh^Ur\HDX1^TL؞ɜOp5TiHe Қ4+Q*)nUch}rg"Џk*'z/}(H/GQG~\ q UIda 7`E~cэ"ϰ",!^\w')=;wr0)n(1*Ϣ ۳}s~q5Aأے&`?o^/^<)5wjPf-xYOG<'@?,mYo\a隲~@e7䈍W ݜd&<yJ8>;+pmԴkRVFܠW]\iQH=EU|qWv꣞=fQF{1(KnkX0@E`?Q҃rɉn1|^+ fiy4Q+[&m W0u£3^$޵66ҦDk!B\*EV'ihH#W(ro%U[OEгi|CG"@ NGը{p @%?Iq}~d?EUduƿi;A$*Ǽ^ X-'nxTe#Z` #B븖t^O2-OhiT(G+RUmkr$3tt01*Hղ.Us6MK`7XPR'!fVJ6 hrEW@4L7@ERFQ?BCH2r[ Er9Gz wgʒƮ|C,"TByn6u2scUA c>xzYDź0`@B+$351K~Ŏ=o}u<<Ѫ8D :Jc|lɮ8ʘjQr0j4@KgP?=q>l vp^wġ"wmb;œ6LT,jL8*IfC^h$]- upH!gF\P8@|R0WM|(^%=6*k]fZ_>qԡ. ZLkӅ\P LI}.#j+ҬƍF*|'RH=M?Se&%rHaZ%}0$޴!0ޜre E)v>!y| `dKZY. a晷qS@^ߞrD''DN_\BL+l^rϫoҚW8On" 痧߼8urg3xخ{BV^ɿ<ݸ$4'oĞ7WgP߰$` ;{yvqW}Ջ6vEWϳgWҔlyq/B?˞!6V&v#l6Gwls`թy~tua:Vj%%]qG^X8A.n17w:aX MY *,B[؎Tn{5F8*ڂqܩ!&X}.l!}de eר9Dž3#COb"(^sC y(fU^`xMdzX N1'J鵒Hk)=C*GWnwÝj̥|'@Uz7ZAd_pmo&TpY1z7=oJFP>}q-x I׈8ۍ޻"HE#b'pc# #Bi9R{a܃# #3|,&>;w{]H!$-9 )J\02F9ك"v[K<(pAUS¾ YL6صA19ş`^MIr9T؆m, `%/7| 8&Hvq,pyUN,0򩯅AT4kq#j'9i5)d~'.iD,V%Vۄ!`?_`28DALoi:Uu]^ ;gpLVя>31˳E S,ק~;8:x7/m.ɋl^zs+yy֠CdT/"laץStXOJ~x|U8}`-Xx]AVک/,#$2 .@eoK9zoJ^Q 3Q3''ڇsUĶ_`F72ug% R¶i"J6%RV I2cRvTMהMb8N8Lwk;N"d=>%&8F)w}Em4h3"O+)}(#fvP >EUrOm8ou"8rUq$r DANݍ,~hϛd׶M%:͇Y;eKP'嚅 Gbj'.pJM)Rb2qCUM F΂ZxV~v3}& ^; 7!z& It6D2YkH(lRzs|ֵ~F6YN_מ|&U: ǃ{|:e1ْEGe +&M80/ OK(t])mʛVVɰ)3`hn:%koP}yP;#EH,<Ev_YQlPQN{e_Yd8Uk)&ά5_^Qִ泞"3cpbEV!c P+s8!ua1uҧy>G /2`mӿpͣ/Gҗ>y?rYS_h7f@4j/6HFG}RǾ 1U0ގHR^ ҾM_ׄ+[pBةxK 88 *˘S6BxbBy_p,DL6=vqd9&|4cm .'S"?돶bjB~A ~$Z+\,Gx*.JʽJA(+?®`OsB#8nVO 76DZ*w̑J|Eߔp ;}jN#B>xڼHcRk(3UL't-{[VOj`;~MȍUxztųQj2eޱޘċԅq[渖5[uik= XcggQ́d* T(ω@n)cP`=NaCM*i-HtQO>.&L`@Й<t@~GF @8'`\lTUa6DǃB Sk)Ja([}]- ԊXzuI?hT.XË86zI>8fYԛ TS:15LXZ?E>^ָ9fđ;F>l`A=//:e[4gt]F}׷ɸ396S%#0Z;_EBK= }eVb+;10xkPj8 \þp6h㈼ uj ^ U2i8){h wu94v@̴k韹AC/X)YNoo3t%I7k1:ˁ:⺈U1.]LIT]n + BYK=DA:H++M UC6YĈU)F>uK( s#*9_'2v/+>˩KO>7i#ntw9(xw^op3\J*vn7y&d6oY"ctR\zDCqrXjk ž~Q/}nCwt#q r@؁[B2L. ]t.s;2[ yHj?|'UiEװ^`ZG8a>T.X,gA-$LtGPd=˘0AKYI1$ No]$XDuU_b$_i]%n'9ҌEzYZH??07$cMTiKg+⦳UE-G;=a59HH;(r,9__=`8:R~$B7c;D6vI(q:KvpJL~XhnZ%IW5dk78fSN7tQ&cG7GzpuiF49 ϟclċdi޷R0- 0"ZfmĴ] IYBaY$ wrRNqIsԨ+A7McY ~-dLFKG;7{T1ܷ OErQ&@ȶ4Z:,]gwl4}nX[qVqF~It*fm`  J JOxǢߊH倨iI}38:!`uaz 0'Po\(T_LIpA^&^×?d39u|MJZe4dI[9o Et,WMjnE (Pk-)i1I5t$>#Vw%{k\=[BSy6ml䦛BLJKQg+ yY;ejjޝ4[ N\*v-h4̤S]',nwuƉA>F`Q1jUMX)(&%)]Ftx^A>䛠IQZhZq`V[sFZ"4,6Ý>֊GʶIEWTm6d°C= ڦZܭp\Fg|6 uZA"БQaYwmzͤPo6ڎõ]5岿 vVCY? ^V\ŎEݰZIy; j%]fPV Ho|MMHqnឺ ,~F7yE l:ẗz7ntf#]T$#(CW&D!q%3K>&sSo<9ѿI@zTI.<[.$dn;D]_pUt(D:n`3D1~D__W=*s+'bg֧B# ~L6Vv،(;8uѵH&HoU3zoPP_ĨE/G{}5~*;upDџ>̀H庇8,iv?xq^ չS-IߟdѠπG \qрځVY/ՃцuO:7g^դiZFNva{DX2Q-LT~yxt|NUx4-'nx E|%UpR( tO} 9W= %7>*|fsUtƷl?nN>ts4BѺ ;='~}=|[8?R <զ7Q{ I9"EU=U2!o^.ZKÕE))&`cjvm=#Ϫ2RVO Us\;Í 6CIuC򶦆whf+e#3:7GTjO0OE=,_z1-zYELNX5w5mdԂyzU٧5/''0jx2ksAio'ֺWZ#6y랶5uF'TK⚳jpef%KAxE(ɗ(ԎOI[nFqz[KafTl7A@kdmۋpo%RŽ6d+T6)G nnmۜ+t+a5K]V֝/cYT/R1$,]'E4ѱ8B?po6]\|4Y*tO%y#E8{ 銋+(nj'[k:6q߸ *6+oQC鞕S%rc4hVMHjNgƽBrʷ4-wfZ\. [Jdebsecan-0.4.18/.git/objects/ea/0000755000000000000000000000000012312063554013116 5ustar debsecan-0.4.18/.git/objects/ea/8a71822a8cb2aaf04c46482bc67284a50aace20000644000000000000000000000041312312063554020304 0ustar x+)JMU027b040031QK,L/Je8lj~sbkt]Mm0,rsgؾGGݏ%,-|n-*MNMIeX9sT_Þ1Yz/TM+CݜK<^P˙RR2^TŊԅX;H.?W Up񹞽*L__ge3ۼ"[\(juցk-,{v^"lIjqIqifI*Cۜ.rzNE=ladebsecan-0.4.18/.git/objects/69/0000755000000000000000000000000012312114617012764 5ustar debsecan-0.4.18/.git/objects/69/936e9e69d4c04aa377973cea9fc80968b595810000644000000000000000000000071412312114617020031 0ustar xeMo@ 9ϯ6jEBRE%8;3:D.dzB+"yׯzx~.-ꩃ@}&N*'r ͵}DbiuQ D o@B}KrHm{p $!9#fm6qJ956 T}&GgWv-{-1F[l`>1yy Ź\Vw4~xlώ$m&L4(? {g*TOFV&\E^IQ~CyWx-.nj ΌSJ *23JN1yW4?$ɷjxA&&' LLgxѴ(㯗*gghp]iJfQ1Í}S9J3 }t%y% ԯ=)]q@-Y%Ʀ(C?4>hܳE~ҢTJiKz$7r!a$5 '$ʏ 5pbiKL @ A_V"Gww@MMJsn,nM }^ |debsecan-0.4.18/.git/objects/54/0000755000000000000000000000000012312114617012756 5ustar debsecan-0.4.18/.git/objects/54/8669e56e7a2bc41cacd5489c5aebf1a475babf0000644000000000000000000000041412312114617020475 0ustar x+)JMU027b040031QK,L/Je8lj~sbkt]Mm0,rsgؾGGݏ%,-|n-*MNMIeX9sT_Þ1Yz/TM+CݜK<^P˙RR2~D{{g…eӳ$doUf:+ dFQ?^\{maسRAdKRKK3KRloUt{u"/>ndebsecan-0.4.18/.git/objects/85/0000755000000000000000000000000012312114617012762 5ustar debsecan-0.4.18/.git/objects/85/24f815bfcd0342d52976ed076bb893f3cb06910000644000000000000000000000026612312114617020047 0ustar xڝAN!E]sO4ECb̸ BAn_yܷN`xCbЕ.eb9`b$Œ_1S.fmu;LlOs\PD }Ϗ>J ޴n:\E泶{?> mHaMpZK/ټXzF LcR~_&qR\debsecan-0.4.18/.git/objects/33/0000755000000000000000000000000012315633246012762 5ustar debsecan-0.4.18/.git/objects/33/51cae23ad94b472c3cd917da76090683fdee920000644000000000000000000000073312315633246020205 0ustar xŖKo0 wq b'0P7ɚV6MCOymM7A$TQ `0jkXfH^";BgVwsU.%u}?G=9jgsE+xD-R6Nrٖ2ӵ y\O!ZdOS)ʀ7u^9oЅ(TQQP>XA bTk""U؆si zexIBeI@@y-(dB+D)h`JS,j,Vzܐ+n\'K dt\4fr.9-%0Ok 46ܶT.**xݞ5 `a]8jm<2{u$/H>2IĔtw[ e=~ͺwϵW7^Z.ř0~irdebsecan-0.4.18/.git/objects/2c/0000755000000000000000000000000012472425113013035 5ustar debsecan-0.4.18/.git/objects/2c/56d7ee8d5a832679a35cd18d1076150892f0f90000644000000000000000000000073712315633246020010 0ustar xŖKo@9W؉$MB&*['ɊڝMɿg$%7F<>c'UB4_0Z4VRa0*WFNfyD(}[b|;y/Z[slIjqIqifI*CoxZF[68rdebsecan-0.4.18/.git/objects/93/0000755000000000000000000000000012315633246012770 5ustar debsecan-0.4.18/.git/objects/93/4ed486b75b4f3c6ca649616705f21a913ccb7c0000644000000000000000000000053012315633246020126 0ustar xڵMo@sl|MӋI.,Y?}4[셁ه7 D<[a;M'pZGP+  rF#?A m4i+debsecan-0.4.18/.git/objects/1c/0000755000000000000000000000000012315633246013040 5ustar debsecan-0.4.18/.git/objects/1c/3ef21aeb1e8848246e4d9a8ea8c7ca9b81ceee0000644000000000000000000000115612315633246020575 0ustar x+)JMU071f040031Qqq cpܖsQo6hk*KN+gcrJ= 9ʹJŸ^w8U6ay離3e޸߱ޥe0 6\Zz#P`+T\q܉ VO8]I{M gx|qgE\TAZ&HNj떽P iE  vuuZ+p׾´P9 {& kt12稢cP`_(9Qyk-'~_\eCv?x[ }ۆSd(|R URNMGG[U},z^#IiȐ5'oל~/eqvv+޽gnk);E%=gNWvE3\ASHʹ=;jjڠjѱ0~N 3$n)9a'TAq8:%dlaWU` 挒܂pė0xq?[stVKLW֖}0xk;ro^W7<~s®I2ndebsecan-0.4.18/.git/objects/5b/0000755000000000000000000000000012315633246013043 5ustar debsecan-0.4.18/.git/objects/5b/9ace24eda78f37436980dd75ca79642ba98bbc0000644000000000000000000000071412315633246020365 0ustar x+)JMU051b040031QK,L/Jeha;Ux (.*?`=Ԥ<r^?xGA%g$楧39>ώ$m&L4(? {g*TOFV&\E^IQ~CyWx-.nj ΌSJ *23JN1yW4?$ɷjxA&&' LLgxѴ(㯗*gghp]iJfQ1Í}S9J3 }t%y% ԯ=)]q@-Y%Ʀ(C?4>hܳE~ҢTJiKz$7r!a$5 '$ʏ 5pbiKL @ Akdebsecan-0.4.18/.git/objects/4c/0000755000000000000000000000000012472424253013043 5ustar debsecan-0.4.18/.git/objects/4c/d3dfaeedf761fb1547cf9b7516e0895a5daa340000644000000000000000000000041112315633246020503 0ustar x+)JMU04d040031QH(K*M/fqXIۅn[uÑԤ$f0}t 黂{㣧\>IUAbrvbzj1kO=>Ls@lI$uEE% ƁYvױ)~IHKss*ڛt1t|wj 'iXUY\TrnHP[߇];83_tMΜl o K{boex?l?: Էvu2fD=H>W9yoQ F/s+fQ.{eg|a`I[.YTLKhޘkxe#{Tl}15N۳$ xsb,6!`s <+˄JYD9Jƭ%͵Bv?(G?$F/Pʪ#E }Y lG#0hF%Tvlh.X%)ϡ!#Td-@+Gt噂1O{p1:@|kV4}B뚊;? Rw19Z*b7ʂNdebsecan-0.4.18/.git/objects/c8/0000755000000000000000000000000012315633246013047 5ustar debsecan-0.4.18/.git/objects/c8/2fd32eb869845cb396b2b6c798ce6f4dfdae850000644000000000000000000000041112315633246020454 0ustar x+)JMU04d040031QH(K*M/fqXIۅn[uÑԤ$f0}t 黂{㣧\>IUAbrvbzj1kO=>Ls@lI$uEE% :aF5U.+P&1O$UťE _\H:S;54,*,.*c=Zb{]Myg~F79s)9.,&]XRZp܃ YIzdebsecan-0.4.18/.git/objects/bc/0000755000000000000000000000000012315633246013121 5ustar debsecan-0.4.18/.git/objects/bc/722cf06ca4a21d7a9d972218ad8cf9543975ec0000644000000000000000000000040612315633246020267 0ustar x+)JMU04d040031QH(K*M/f`dO`sirHjRRK3s%t,J>a/b>sӉvk$Uى  ~?0mܿm%0LҶ=&ggb:'6kT&U2$ >;u[DOS22KJ$_VwE6wW.||83_tMΜl o Khk%w>>瑸+ȤO@e fnx'xۮ3{>t&kȐ򥇯h5bY{a۩Aj ψ^"0YcOt"n޷4[-N90Y#"FڛE~Ryt ]S@*5%D79?(85a͍LlK,v94-3$YC2s A؃[Ǎf@g0^s6&e|rrd$~?J#`q[R 5debsecan-0.4.18/.git/objects/1a/0000755000000000000000000000000012315633246013036 5ustar debsecan-0.4.18/.git/objects/1a/b8f15e4de8fb0e5f0500e4697fc70aa469aa020000644000000000000000000000041412315633246020324 0ustar x+)JMU027b040031QK,L/Je8lj~sbkt]Mm0,rsgؾGGݏ%,-|n-*MNMIeX9sT_Þ1Yz/TM+}Ü%fy }e(&e&1D:vysfS)+@'3}c|g 4ׇY6o%3oKܗy'%\~K~-I-.).,Iep>^@oĶKw jqUdebsecan-0.4.18/.git/objects/fa/0000755000000000000000000000000012315633246013123 5ustar debsecan-0.4.18/.git/objects/fa/0c4ba47b23a4735c49e8580a276177ad0a47470000644000000000000000000000031612315633246020032 0ustar x%νj0~JR_^YXĖˑHy߶@NUf\.dP#dME~\8-i&pDkBp^%54^ h^Fdη!S ByơUpA85y]#}ʻEGYZ;N\Nx.\JaM>debsecan-0.4.18/.git/objects/62/0000755000000000000000000000000012315634154012763 5ustar debsecan-0.4.18/.git/objects/62/670609d26e731c9cf43cfbfeb83dbe0f17d55d0000644000000000000000000000056112315633604020350 0ustar xڥAo19W̩D% j@H- Plvc٤&i)y| wj:B$Yb!A{®Ɦfl6=G)7$JŘOW||?[əZ,eIYi|4ЫY,皱QnYH.Ukzי(1yan}s4x\w\"_Wp7te=|4SǤM}aO_in@3PrJ |bTpK ]}H,d GOf?H-{V\QT T`ZvQ'2ў)p'%Bc/-qdebsecan-0.4.18/.git/objects/62/35aa0b405379406237fb8dd9167f7d8d429cb90000644000000000000000000000027012315634154017773 0ustar xڝνJ1a\%g2Xdm>IDQ /ԏNZl }Y]6lч~MbfQ2& %8F!`sfp-FǼAO{Ut._xBb9^| kZʼna3}bjozLӼ/CrtSdebsecan-0.4.18/.git/objects/88/0000755000000000000000000000000012315633604012772 5ustar debsecan-0.4.18/.git/objects/88/b1bc2f5fbc3142848e878ca9ee585c3754968b0000644000000000000000000000115212315633604020155 0ustar xŗ[o0̯8H .IRiYY*'9U'?(M 'e۟AF\HpI> !gjf x"|"1Ffv:]ʹzxB=a! RNnXm"P~sM ⽡}t) u.폡IjH Pu6"Ʃ$.0D,16Sl,j(rڭnjD6xdebsecan-0.4.18/.git/objects/64/0000755000000000000000000000000012315633604012764 5ustar debsecan-0.4.18/.git/objects/64/24a1549237b2659840f2332230c38be1acbed30000644000000000000000000000077712315633604017670 0ustar xVMo@_12؀GUCI#q{Uqj&U 4};ى7sKi "1'&.,5AwEe\%*B9*qecɻhc@DZ>D~sؤX`YHBf h2g2d:FB 3I(6? !9H`2LxAVǛw̼ W ^.iBep&=Whv 즪(FB-R(N,؇3^Pt* ӂ&F˴ǔ (#,|OR-֢֨ 2 ;P-/d kB up4:0Ep/M)_r{"mmi Ru 5vՔᜯbUpuq{L=d]u>_?}-y-U7R՝yn8媢SM:æNb("*ҽiUl+]IG>=cu}Z[1g(gFϥ}s-Q&67dE=4Td52̜ 9*WAdebsecan-0.4.18/.git/objects/1b/0000755000000000000000000000000012315633604013035 5ustar debsecan-0.4.18/.git/objects/1b/2b86c27e3554c644063adc63537ac70cdd64490000644000000000000000000000041012315633604020025 0ustar x+)JMU04d040031QH(K*M/fH0s^/!?Z4[[IMJjIbfCwFm[tZp?G$Uى E,Ljfxu5ai Ԃt6Ky2svX$UťE +LzvQ:p7|D%9}I(az$UťE 'V2Nϛ:y22KJ eǛkO&N? U_PWp2딏}{m= W3Lzoyݑz0Ēb :7rߙuOP -jy+9:TIqf CGs}V%#nV+K.¤KKJ={{p!+5阼w^O/oBxdebsecan-0.4.18/.git/objects/10/0000755000000000000000000000000012315633604012753 5ustar debsecan-0.4.18/.git/objects/10/c4d9a12ef6be1eede68e014e4bef2b65349f530000644000000000000000000000041412315633604020413 0ustar x+)JMU027b040031QK,L/Je8lj~sbkt]Mm0,rsgؾGGݏ%,-|n-*MNMIeX9sT_Þ1Yz/TM+}Ü%fy }e(&e&1D:vysfS)+@'3}c|g 4ׇY6o%3oKܗy'%\~K~-I-.).,Ie_˨>Uu+f4pdebsecan-0.4.18/.git/objects/09/0000755000000000000000000000000012315633617012767 5ustar debsecan-0.4.18/.git/objects/09/efc0d6e81bbaaa58b543e9634a1be7831de5f30000644000000000000000000000027612315633617020424 0ustar xڝνJ1a\ ̌XYY-d'd$x/xñ﹓vW 64P@[ Hڻ5MFܸtJ#C^+@v5cṁn(Qpe'}jRtЙ`pwG.@/ea]wWaWmcn>c,yZFcܪ QT;8/ΖBIV60~ X,e- l1p,$c()fTgUSltf8e;epjsG?Z,L=tFV;z "$).Bz>* [ۓ}  \<ѕ' <[(mʁD[эyjSr' `si(>4[%Mb Fq,zoLdebsecan-0.4.18/.git/objects/b0/0000755000000000000000000000000012315634154013035 5ustar debsecan-0.4.18/.git/objects/b0/82738344ccb6256ca347a6e15370f552d1a1290000644000000000000000000000071412315634154017665 0ustar x+)JMU051b040031QK,L/Jeha;Ux (.*?`=Ԥ<r^?xGA%g$楧39>ώ$m&L4(? {g*TOFV&\E^IQ~Ccu[)//Z!\IAeQfzF 7&>=׿$V@o5Ԥ<=i /u}R\+M,*fo*Gy&\}Ay[Ђ $3!>+hݺ72\=xzFm{/PZ T6MxIZdZ?$U$3Z1"fN ~3m(3}z-ᡒ;oSϽenjPT}xugqkNfdlmn}debsecan-0.4.18/.git/objects/2d/0000755000000000000000000000000012472424253013042 5ustar debsecan-0.4.18/.git/objects/2d/a52240024536b3caf1b792549ef96f872691c50000644000000000000000000000071412472424253017707 0ustar x+)JMU051b040031QK,L/Jeha;Ux (.*?`=Ԥ<r^?xGA%g$楧39>ώ$m&L4(? {g*TOFV&\E^IQ~х>ztob9 yI?ʢoL}8{IZ,jPE)Iũɉyz@2^4-ʹm/1CWYTpcTҳLb>"]aA~qIf^q C+iOk}JWuoVɩ).ezDP{3l_(m? &r?Hأ,I-I,I-f8c7?Evͬ;fR; P(g$ZC%wVߊf7{4T4tZ Vmsdebsecan-0.4.18/.git/objects/db/0000755000000000000000000000000012472424262013122 5ustar debsecan-0.4.18/.git/objects/db/c5cca844136f8c8ab8ed5a60b740063913ee1d0000644000000000000000000000026612472424262020334 0ustar xڝj1])6YI*iRlגv|C y{ ?b>uݦ7fPB,)K )%gSɚXc㥃(Jk|@9/iOӞP~ oMq O378/ӎ#Cƨ|H%/oiGO_F'!Mdebsecan-0.4.18/.git/refs/0000755000000000000000000000000012472424063012042 5ustar debsecan-0.4.18/.git/refs/heads/0000755000000000000000000000000012472425113013123 5ustar debsecan-0.4.18/.git/refs/heads/master0000644000000000000000000000005112472425113014335 0ustar 3be9cfede853372ee27e9c5988569dc8603daf7c debsecan-0.4.18/.git/refs/heads/xml0000644000000000000000000000005111571677224013655 0ustar 0b7f25d2cc25c781be9e114f0874e445584dc951 debsecan-0.4.18/.git/refs/tags/0000755000000000000000000000000012312062042012764 5ustar debsecan-0.4.18/.git/refs/tags/v0.4.150000644000000000000000000000005112311570206013623 0ustar 8d161babd18f8b16c5242e82ca193dc14bcf90f4 debsecan-0.4.18/.git/refs/tags/v0.4.160000644000000000000000000000005112311570220013620 0ustar a642b44cc291a61da9d9130f03bb557d4b909fd2 debsecan-0.4.18/.git/refs/tags/v0.4.16+nmu10000644000000000000000000000005112311570540014501 0ustar 4635fec96e41876ae044de57f9aa2cd5f506ecdf debsecan-0.4.18/.git/refs/tags/v0.4.170000644000000000000000000000005112312062042013620 0ustar e147433a432ceb98bfe6bdd7e30b3d2ea1296e09 debsecan-0.4.18/.git/refs/remotes/0000755000000000000000000000000012472424063013520 5ustar debsecan-0.4.18/.git/refs/remotes/gitorious/0000755000000000000000000000000012472424276015552 5ustar debsecan-0.4.18/.git/refs/remotes/gitorious/master0000644000000000000000000000005112472424276016764 0ustar dbc5cca844136f8c8ab8ed5a60b740063913ee1d debsecan-0.4.18/.git/HEAD0000644000000000000000000000002712311570557011530 0ustar ref: refs/heads/master debsecan-0.4.18/.git/ORIG_HEAD0000644000000000000000000000005112315633246012344 0ustar 8524f815bfcd0342d52976ed076bb893f3cb0691 debsecan-0.4.18/.git/description0000644000000000000000000000007210601557757013361 0ustar Unnamed repository; edit this file to name it for gitweb. debsecan-0.4.18/.git/gitk.cache0000644000000000000000000002321112472424607013031 0ustar 1 14 0f370ed2c4e20c993ddac86e8fc9f839b0dff715 0d08cbc30d4bce7e102639309612221fb8e28ed3 {14d142ccb28658bfaa638a673dc101b9060ccbad 75b48de922920c3619be5a64c2a7c2705e48428f 4ca146946f2bae7d2b3f76e7783a36fb16dffd5e 939b14ad323aad5ef93c680978012fcfaf19ed77 ffe9942176a7d19735f57be1fd2ab7c03339d51c 033cfa9aa636e5cd58f4525acf9361cf5082d3a0 c27ea1b92fcf4b3d43e20a960e6a315032c7cd5a 43fa07dde7797bafea6f59060c532a77f894a2a8 74d9a72e530fb49b88778c7988376e506fe117f9 089b4225f35d5b0de38cb28ee6942610aa9d90ef f8e24bffd44c5c6d0f7fbe916d34167a6b7c4511 814ed678dccbb1cadb66260326922e4135127e3e ba2437265429b82525fc30a5e90dde6a2635db5d 9c74e702d840fc583b6772c661757f84c2fc9b08 df5a3a6389623cc53c911494ea31de885e3cadd6 51bc2b20b922a5207bf00f895eacbececa2d5436 1321d3221d33fcb6a943ecda778985ba7e408874 ea0191e8afae12f245fb43313efda6d3f9a46ea2 6a244e10ee84bf7aab9f0f451b7d43867101d0dd 32c474ad5f00d898dfae9b590d994cfb432d7529 95bdc6646dad5cc56bca14dd6980c8328c935c82 1b0e03bc4f69ffd835da0dd54d161dbf9330c5de fad8f40227a899ca0f0b8da24a1b9c8d61ddc6dd 6d1de20ab520b70ad12736298a19e14932776fd7 79e79312437df8a0116b2c97e08cfbb2fb7d6404 741542a8526c49e45dd7b703c4eb559896cfaaa1 b416743c640f11f915d4fc0796921293936e29a2 c682cffda30c73606d2bc05789c7731bfa02720d 65c1a8a79ae2eea38417556c0058cc230d48a3c6 fd2729527aabe78520e05cba9c402ef7d19f9ed6 3b06f5a26148b7582dc32db343760df52be1fe95 ef4e0dc480b5b5cdf0d4cc8c3c066bbacc740c53 0bc3cec8008bfb5c987f11a8eab0f867d6a1a225 57485f1091c95f2e6be7f0addc4de7751476917e d45465a98c75ceef48d6a17be163ae48883f0476 d0166b998223d56d5941626e62c5dbc77c0be8d6 ec32b30c86ad9b6df262b9494124732190955c6f 968cf8851d3144223fc3e797f9f2bb6cd5e5bba0 393d38ffe8755bbb741afb1ec68fbeba067e3559 1b8aa854b5140e9159bf2d51b308241471627b57 070f684f69d566628447a4b4215245e13e853660 c6f72dd8f0ef848237c868fab90e3d013f1800db 7ecdcef9fc6072b891bf0841fc57d808cc0383bb 1ed1217e5cd587ed588b56462b8e956b094dd109 96d0eeeac4bc3212ce6792ad32e3abaa2b31c9b0 a1cfe3c9b7c8ef598678436db79690d62b54642f f4b8f180d082825193b8146e5d5f50e58061fc84 b5b1aec74fe53f5229cb0f304a119574256092ab 97e11eb6c1d73cd53bee74d671f0094cf944478e ccfb4be47f69b006ba09a3745c99d46a30894d80 22a288337d7c1f7913e75e5008570db324094979 f79b0e28d5039b811c91f39735b4e336cfff668d a2bc4bd58b03f5fa0e3b9ef257d583d9a3f99851 1482df92d8a29b86986bf0e059735878a360f920 cc6edf5c232df6afe67503de358d5d09c25b3b9c 50cbb68bf84331b83f0799d33d1cff1a93bbfbed c63c081a2812db77cb9834a74b5b111967de2135 3a468ddd113db6f0a752dd43064f584cbb97e79c 03353ea57d44595b2e39978e00b92613bc18dc4d 161d2a493abd6767da193fcc3569059fff194600 714a37c0f2d17082d25fd1b004fbd1d5f425eb5f 35940be9294038b30cc39acae0f9d390d6ea82c5 50879e9f3e7eb5162d9dc86efb79f86f8542ae56 2845822afeaeb5d8088984de04c8fa1c8684be98 334f392efb0a8a24ff766666cf7425ad7fa878b5 5908bc3b264ad5dc9e3d7634260182562cf0b988 9177c82af3117e1c0091a30f1cb938252e2fa2f0 e6752e170743e0888d08109a80acad715161b776 7f5b4e7fa6db24934cff1f9f0f53ddbc618d52be 618e7986347c64358e33b6be75f10f54a88bd444 63ed0672c27cfa858a7df149d8a828d6734db5ff cdb0b8724babf425de3b5d8b0e0d0d247c3792b6 2defb6d9f25715a7157fafcfb022f46ab325361a 4ca83050db6701d63b271fdb82d81aaf830bd5b5 e95b48695cfb246292aac77a6c4eb1ac4089fc79 258e9dc312f4bba5b0fdd6b80eb8fa230095f520 5ed29a1f74c874760e9307f48f0cae04d544d631 8eb4230f8e7a7bdccff459b837f940c3f345671d fb46ea18df4649e911ae395745e3c35a40389d15 b8b72160e92704942ea7f23efaec4d168c001005 c3f39c316c7e83c4f3ecfe9b89d4c3911c9d9d12 1830fa674d3ccff1b1c4604c2c8339392297a6e6 9fd54ab98b254dc410147e81d19e81b6b79c2984 01e355d90f3ebd4a0e20278fd55b660df037f0a6 d8b65b85f0d62529b03512ed20971c029daec59b 0f778d079a32646fae8af2b630a05d8ee3a14a67 8daa50ebbbc3d2a2ce2bb4fcd7e4e8678312808c a3c677df4a3be4d55f5acf8285d89ed9d40b55a2 fb3cffea976777964c998be029372be049408edb 31c3af5518ed29558cb0d6642e6e1da07d63208c a288e92e8550a0a97d9f101ca6c75ce50e8af561 9528285a9a4bf0d62d60e645885f3b3810294535 3c23f6ca48900c953c283bba462880be6a0df104 e0e36305708c665fb52b9ca26f38b351d0ac9a37 af7f2cf5727dd831dde5d86759e436cff4b70782 5f8b317cb47bead06e30e73ac95a6406afa8bf4f b6bfaf99c3aa06fd860701ee08c7c7b04fc3e913 9d276a2d9a700c66d2fb46947dba88daedac2b71 5e989d90e206f7637a574ccd2e395bb163f4fef9 7a4d14aad275821ee0dfea7fa173c8e5f8b41577 c220c15bda4253a6276a2f25e4ef96ba6be51849 291be19c19d7d21471366ac28528205da06c4ede afe6efb6429641bb8b6a09dedab7783884fc290b b27a23edc6bc6560941a93bf61e67d62ca15925d 9ab25fb71756bffaf739450bd139d4b6f262abf7 312f709d1be8621c6e46c1e5b24f4995c8bf78ff 28d006075e636c0bb87860e632b2d0140097ba4e 793b3a97a28f49dcc4b140b40b2b27224cea613d a17b6286f96e1e875ff364db5e5a25ef9dfc8fa9 d792b9f8eef5102c4f7b720921ef05ba25a90c14 d983d0d1c7934eae96836209edab3da6e97132bd 381c66e78e9537dd09165291f9ef0aac99cb240f 17c856d5de72e30ffc47d74154b1327ca6583498 bb0f5c146154279c631ffc1737c36c95895c993e 71c71938578bd16f4ca450208d2627133ce49f14 744139a79dbb14f905e9da11775ed77386b2d9a1 e759b2375c048a590a2b68ae204c631ea87260e2 a718c239f1e8d76f89c15acce08a7a9391b7e09f 52acd50ec317bcbab46f7e4d84ae2f08c203dbd4 94c4d2de359f930bf7d43482c89be2fbca9b22bc 95f2d693d99636def09481650fc0d342af9381e4 9d4a85c3314615fc00d13634850faa58503e005d e98a18baeb9d7c3bfc4e558ef9ce31d92fdd3a5d 34ab4ecb14c649b496103bac799158f516aa04aa ec4a23f61af7015f113f280d864c7e9631c72c2f 7d83c5ee463153014ab4ee366062e2b911a89996 90f7e18682454c626efbf75b1959d5961806f066 c230d198bc50939f576b886c8655e731d8efb7ad 419ffa5ec2bf91288f89309eeb75c1410d2bcaf2 4e3a05396830a807715bdf670c641d6e36d39958 53b6e825f7297bbbb92c5a320ae1c6d97c1c5c77 015762cbfd4821d4c47aee950bc4f5abd8a4d15e 16a80bbb301b5182269a4035845f7c3a7c1df70a 4ccbaf26119590dbfc1ca489a94b8282775f2a6a 315894e216745760f525bc94945134625e0bb7da 6cf0f6cd67edcb3573292351605dcac1eda69f1b 5465ea6a64a44af6f949e138901c5e297393aecf 4624bc845d13f4860532b7c971ca9e65b769278d e5b3256f35b44ed14d0a6b315d52307fedc969aa 64655b70c5e1afde33d9233529bf502e8c6b1281 9307d636a71ca20a61be1d0c0f26baa47c493d59 fcc0a2c8cbca6709ebe83b3ecc2fb91b3532d068 b609cdc0f32acbb8cf887a63b0a59a2a339fd7d1 ecf33e248d322d56114237494b8f0aed5ad96ac6 59c776740431e8d3fffe1c3153aad48a317ab680 3bbe616adff9415a9accd7403dcfe094d24d1220 16923a7b4768b806be178a17d444aec18dc44c12 3870c57a1a5814bbb604a7795158fb3aa6339df3 6954e4dce21092c9fc8cd3f5264a05a4bd91bbba 238ab6f30caeea5674ad39c35ed8f20f7cedd29b db378cec246452038f0edbfab7d58c1a308279fb 44d422d2922d25ffa6a108701464098d97dac873 8d7a9933a444e212601850f59c5bf04c0aa88860 d8151ed0f8201f58803c7912dd736a3ec8f35fbe 1fc27a980debc5d9c8c779755d3f21cfddda12f3 416a13d8a9294d248fc6eda1d9b984d4bd8cbc5a 8830e4e559321e7ca25cb8f6bc70f3c2671ee4ae 9b1f37bd6a90dbbefda316f7f63ae7e87d11ca9a 3c0da2b939780959f994d646f88027e6273fe273 a01348dfd71883300eadc5cf5fdb41e9e7d24717 7b07f5c9f65a61f133ae5b2c1a9264198070b19a dda4f78030c827a5f446fd9af27d2ae995ca2029 d6ac8ae637efb754dad3877ad1aa04ff733616ee a1faf7d940c94558ff8924561d37980a3e35e543 8ea7f5922c49b8a207999cf85bfa29503c0200a1 5fedc154320e81ccd53057a85dffcb77c41bffe0 0d08cbc30d4bce7e102639309612221fb8e28ed3} 3ae525474210eb7e4e62c8e2e0427d8d2fa86136 0f370ed2c4e20c993ddac86e8fc9f839b0dff715 {41bcaf86725e62f4bbc39fe0309aebe5d57657ee 4674d50af065df535fc27d3936588df7bbb2d6e4 9c02a5f6830171f046894487efe71a096c92ed64 44285d60fb92b74fec3b08bb0c737cd9c00d5737 105115c8ff6fa9934f201b664e8078be21379c61 0a5036e3d3d4d7c4c61c32b5307fdd4635003402 75529c2aaf5f35d7e77acb0f3b68cee13f7827aa 5be9372d5b86f3acf159e2b31969fe9bd8df5343 ca772b886deb0732bc25f4facb519fce0236277b 49c3cda08d7909d23c2e90b0748bbf2d28bdefd3 0f370ed2c4e20c993ddac86e8fc9f839b0dff715} 3dd88923e26a11950801f6faadc10c001f9be45b 3ae525474210eb7e4e62c8e2e0427d8d2fa86136 {844e6f60a3372c24a0fbd5dc53d1c13ade443646 6e96fa00569d818978d75f7d1aded2fff9771757 74dbc385473a4ac011a30b0c33cce23724c3f552 3ae525474210eb7e4e62c8e2e0427d8d2fa86136} 762ff5cf80a9aeaeda59d43e8bce53b4ed74b6d1 3dd88923e26a11950801f6faadc10c001f9be45b {a38ad2de4ea153f3e0bbc0b40c08dfe9693b0157 72143648e8ee558d83d4455f7959738c58c83cdb 05facbfc873bf53d4b930310497e3a223cda618c 3565f17bafbd42853857afcb988dd78c90d54bf4 ba08e97eeee927abc665efa161c4a5b593933741 671334cb4f904484a5b843382e576eb20d216cc9 3dd88923e26a11950801f6faadc10c001f9be45b} c9471aaeed8994d10cdeba2cdcc12dadc89f91a0 762ff5cf80a9aeaeda59d43e8bce53b4ed74b6d1 {fa9b7c99c11f00d7caf655083237f554fccc2f7d 2c93826b81d19c8cc6f47ead23ff2974064ca50e 762ff5cf80a9aeaeda59d43e8bce53b4ed74b6d1} 4795aab0e6c51692455583d263b79cab0be41f5a 6e07c04a46590ed195c824fbe797f02ca168ef62 6e07c04a46590ed195c824fbe797f02ca168ef62 0b7f25d2cc25c781be9e114f0874e445584dc951 a6146271c0d958a21a6ed57a5eab03c273e383e8 a6146271c0d958a21a6ed57a5eab03c273e383e8 a6146271c0d958a21a6ed57a5eab03c273e383e8 c9471aaeed8994d10cdeba2cdcc12dadc89f91a0 {1ed6b5f3dda5a4711cac070eeac696b7c1aef659 c9471aaeed8994d10cdeba2cdcc12dadc89f91a0} 3ba94bb9719994f78104ab12e9aae2c26a5f6c94 6e07c04a46590ed195c824fbe797f02ca168ef62 6e07c04a46590ed195c824fbe797f02ca168ef62 6e07c04a46590ed195c824fbe797f02ca168ef62 a6146271c0d958a21a6ed57a5eab03c273e383e8 {208ee045639a7efc4d8b3807471d7dcbccf80e75 a6146271c0d958a21a6ed57a5eab03c273e383e8} b3b3c752ccca522c05fb7c3c0baeaf15c3770db1 3ba94bb9719994f78104ab12e9aae2c26a5f6c94 3ba94bb9719994f78104ab12e9aae2c26a5f6c94 fa0c4ba47b23a4735c49e8580a276177ad0a4747 b3b3c752ccca522c05fb7c3c0baeaf15c3770db1 {8524f815bfcd0342d52976ed076bb893f3cb0691 138c543593f8b17a2c3186a349d93766cc805ddd 8431c54cefc040359d7bb45c4ed8cadf7b4e6831 9e83df0434551c8a11732aa0c58252db5ac93cfb 405d56a6146a65d4223631952ce0fec69ac3ac9f 0a0014f852006bfa5d80ef0e24aafff342652557 0fca4c0af14fdd2fab74982985dd2387df3af26c d28d0f557dfc9f5f9ea8f326ceaa1395cb020fc4 b3b3c752ccca522c05fb7c3c0baeaf15c3770db1} 6235aa0b405379406237fb8dd9167f7d8d429cb9 fa0c4ba47b23a4735c49e8580a276177ad0a4747 {09efc0d6e81bbaaa58b543e9634a1be7831de5f3 fa0c4ba47b23a4735c49e8580a276177ad0a4747} dbc5cca844136f8c8ab8ed5a60b740063913ee1d 6235aa0b405379406237fb8dd9167f7d8d429cb9 6235aa0b405379406237fb8dd9167f7d8d429cb9 1 debsecan-0.4.18/.git/index0000644000000000000000000003253212472425113012137 0ustar DIRCR M3FnT7gCamg5= .gitignoreR M3FnTFE=A-`8[9LڢCOPYINGR M3FnT% eh MakefileS76 S76 nT1lɅw"MԓREADMER NDI$IvC?5e)qMDŽ->vZ7debian/.gitignoreS( aES( aERlk "/G3ždebian/NEWS.DebianT*Ci debian/compatT(7 T(7%wa~LLn-ۚ\-debian/controlR NFIz4Ώ)b*QK&debian/copyrightS&b"n4S&b"n4I{肢n$w=6debian/debsecan.configR N$FI| ؾu͞4 R]K;debian/debsecan.dirsR N86KI}o'f}Lu+debian/debsecan.postinstR N86KQI~sa'U?/Moidebian/debsecan.postrmR N86FI+t_}Hc4*C?debian/debsecan.prermS&b"n4S&b"n4I@ʩW1~aP+얥>debian/debsecan.templatesR Nu?FnT-Bb.l.Z(5'*debian/po/POTFILES.inS&o ES&o EnTRQCC} ydebian/po/ca.poS&o ES&o EnT rE.3#m"?p2sdebian/po/cs.poS&o ES&o E5 r%/j=A{нvdebian/po/da.poS&o ES&o E5NW}7i{%X˃T/debian/po/de.poS76 S76 nT$nh x0q/debian/po/es.poS&o ES&o E5 B+Y#`~#ѹx^Pdebian/po/eu.poS&o ES&o E5 B+$1&vdebian/po/fi.poS&o ES&o E5q͊.]Jqfdebian/po/fr.poS&o ES&o E5 y+ m(IA Zrdebian/po/gl.poS&o ES&o E5,"@#քSȀٝ#debian/po/he.poS&o ES&o E5a CAoU debian/po/it.poS&o ES&o E5cQmPN"T}.k]debian/po/ja.poS&o ES&o E5e FAAYzih#debian/po/nb.poS&o ES&o Ej 2J5hndebian/po/nl.poS&o ES&o EjBoDK͕debian/po/pl.poS&o ES&o Ej뛈Xtmg#VDdebian/po/pt.poS&o ES&o Ejؖ潞Itx=SP|debian/po/pt_BR.poS&o ES&o Ej=b SFa9Ydebian/po/ru.poS&o ES&o Ej[-p> zpS 0debian/po/sv.poR N,ZHnT *J GU,t5\p Jjdebian/po/templates.potS&o ES&o Ej Iy?7ِldebian/po/tr.poR N86KIPë^hLjJiU debian/rulesR N,ZFPD+"\n􊟟XOwdoc/debsecan-create-cron.8S(Y??OC  testsuite/001/sidR N Ha_< ?m1@\nJtestsuite/001/statusS77e7›;S77e7›;tڱH!dNYtestsuite/002/exp.bugsS77e7S77e7I+;ugS_[[testsuite/002/exp.detailS77e7S77e7I#Gp˽V) Q=_ktestsuite/002/exp.packagesS77e7S77e7I x,VZ&y\эvtestsuite/002/exp.reportS77e8Y??OC  testsuite/002/sidR N HaI ?m1@\nJtestsuite/002/statusS77e8Y??OC  testsuite/003/sidR N HaPRq^8_}}testsuite/003/statusS77e8bg ns<=]testsuite/005/exp.reportS77e8Y??OC  testsuite/009/sidR NShHanUNRO{$!uDbn\testsuite/011/exp.detailS77e8y+S77e8y+I>)yJЌJ?3testsuite/011/exp.packagesS77e8S77e8I d$T7e@3"0Ëᬾtestsuite/011/exp.reportS77e8S77e8I ]4ydttestsuite/011/exp.summaryR NGHaIγ*&R]b+=-Xtestsuite/011/historyR NHaI{+π -testsuite/011/sidR NHaI @Z]iN~\j ho:Ɨtestsuite/011/statusS77e8S77e8PMH!dNYtestsuite/012/exp.bugsS77e8S77e8PS}}1TZڏN@LL/testsuite/012/exp.detailS77e8S77e8PT#Gp˽V) Q=_ktestsuite/012/exp.packagesS77e8S77e8PU nDZ(L> yBtestsuite/012/exp.reportS77e8S77e8PV.-soctestsuite/012/exp.summaryR NHaPγ*&R]b+=-Xtestsuite/012/historyR N;HaPp[n>Y??OC  testsuite/012/sidR N;HaP e ry1Fp@testsuite/012/statusS77e8S77e8nUCM,Q#* 4`|testsuite/013/exp.bugsS77e8S77e8nUD%/ Rތ#X=]X"Fqtestsuite/013/exp.detailS77e8S77e8nUE#Gp˽V) Q=_ktestsuite/013/exp.packagesS77e8S77e8nUF ԝ*zl^Yw}testsuite/013/exp.reportS77e8S77e8nUH``/m'bBⲇ2Ez8testsuite/013/exp.summaryR N;HanUTγ*&R]b+=-Xtestsuite/013/historyR NHanUZp[n>Y??OC  testsuite/013/sidR NHanU[ ?m1@\nJtestsuite/013/statusR NHanU\HAd~Tϱ湵n*<testsuite/013/whitelistS77e8S77e8_g:t}AI2testsuite/014/exp.bugsS77e8S77e8_+_1+{Ciáhtestsuite/014/exp.detailS77e8S77e8_#Gp˽V) Q=_ktestsuite/014/exp.packagesS77e8S77e8_ o;ld:(Y6Dtestsuite/014/exp.reportS77e8S77e8_ }: u;5'Ctestsuite/014/exp.summaryR NHa_x.&qߣ]cItestsuite/014/historyR NHa_t*Hj9ދ@Աu@testsuite/014/sidR NHa_ ?m1@\nJtestsuite/014/statusR NF_+`ihO^testsuite/edit-compressedR NF_,S<H 'htestsuite/filter-compressedR NיF_- qGHZ$]ζ#o"jwtestsuite/run.shS&ΚS&Κȿt7!fzP<testsuite/show-compressedTREEJ-1 4 doc2 0 3Ό$ 4O~:<7src2 0 aYoO ä Vdebian-1 1 po22 0 >H$nMʛtestsuite-1 13 0018 0 L߮aGϛuZ]40028 0 /.i\ǘoM0038 0 r,lz"T9u0048 0 ֘/R$ , pj005-1 0 007-1 0 008-1 0 0098 0 ٗNALE010-1 0 011-1 0 012-1 0 013-1 0 014-1 0 K\|-:w?VI/؛debsecan-0.4.18/.git/packed-refs0000644000000000000000000000551611345002266013214 0ustar # pack-refs with: peeled c9471aaeed8994d10cdeba2cdcc12dadc89f91a0 refs/heads/master dc7041a6840c6fab9dd39dcc7f407dea90eae95d refs/tags/v0.1 ^64655b70c5e1afde33d9233529bf502e8c6b1281 932698ebe20b4b5b649b10dc34cf9fddf5692904 refs/tags/v0.2 ^e98a18baeb9d7c3bfc4e558ef9ce31d92fdd3a5d fa2417883f851b7c7083aa5492c8383927a2f04e refs/tags/v0.2.1 ^9d4a85c3314615fc00d13634850faa58503e005d 0706c27d523a981a51df9bb62d541ca23381c661 refs/tags/v0.3 ^d983d0d1c7934eae96836209edab3da6e97132bd 7af641b7e13591142c2e230f4bd63e2c0f43705a refs/tags/v0.3.1 ^793b3a97a28f49dcc4b140b40b2b27224cea613d c76a5c7ac9f290e58ec925a15d2593540f1efe9e refs/tags/v0.3.2 ^9d276a2d9a700c66d2fb46947dba88daedac2b71 4d6a3a8c5e578726207e6b13260c1c437c662d96 refs/tags/v0.3.3 ^3c23f6ca48900c953c283bba462880be6a0df104 9aa24c92e28eefb25d9b3a63b58a11ef3e9aadf8 refs/tags/v0.3.4 ^a3c677df4a3be4d55f5acf8285d89ed9d40b55a2 258e786dad74e210220ef03e45cc69700523fdb7 refs/tags/v0.4.0 ^8eb4230f8e7a7bdccff459b837f940c3f345671d 99790f3024479201159665bf852f6eebca7d760f refs/tags/v0.4.1 ^258e9dc312f4bba5b0fdd6b80eb8fa230095f520 cf65f7d94693bd9298779c32e99d4d739cec6c9d refs/tags/v0.4.10 ^0f370ed2c4e20c993ddac86e8fc9f839b0dff715 f3e193797d675ee2d25e14eadf4a11d3fae2bb70 refs/tags/v0.4.11 ^105115c8ff6fa9934f201b664e8078be21379c61 becdbf48182172fc827808f6fb7641cc68b503f1 refs/tags/v0.4.12 ^41bcaf86725e62f4bbc39fe0309aebe5d57657ee 6a4c784e9ef2b1cd25ccf1ff5a1ea6cf4811dfe5 refs/tags/v0.4.13 ^74dbc385473a4ac011a30b0c33cce23724c3f552 63fe29062fd793f7f7bcd4fba1933bafe70c0d0c refs/tags/v0.4.14 ^c9471aaeed8994d10cdeba2cdcc12dadc89f91a0 2804aee6b542c2622c7b1bac59d4374053917fa0 refs/tags/v0.4.2 ^5908bc3b264ad5dc9e3d7634260182562cf0b988 11c7d9cf7390a08880e3c2100a1321599a063ade refs/tags/v0.4.3 ^3a468ddd113db6f0a752dd43064f584cbb97e79c bbf07d9ce1f7ae531e7d294f16ebb532d54a2311 refs/tags/v0.4.3.1 ^50cbb68bf84331b83f0799d33d1cff1a93bbfbed 109e0531e3634e9d7849033999487684d1d001a4 refs/tags/v0.4.3.2 ^a2bc4bd58b03f5fa0e3b9ef257d583d9a3f99851 e18f51a40ab2b17ab172b8fa7803f72d77f8cca1 refs/tags/v0.4.3.3 ^97e11eb6c1d73cd53bee74d671f0094cf944478e 110ea031bb828ce2824a43076446740775983af4 refs/tags/v0.4.3.4 ^a1cfe3c9b7c8ef598678436db79690d62b54642f bb9d3a5df5f3779c703966fbf824cae20601db8f refs/tags/v0.4.3.5 ^1ed1217e5cd587ed588b56462b8e956b094dd109 d8e1d1f289461b06ec34fd751769ccd99fd07c92 refs/tags/v0.4.4 ^070f684f69d566628447a4b4215245e13e853660 b97a0c5f6a3a367f0a10719f59b418e01eb61b55 refs/tags/v0.4.5 ^79e79312437df8a0116b2c97e08cfbb2fb7d6404 b7cec35037161eb50e865d6231f18c5183de1b44 refs/tags/v0.4.6 ^fad8f40227a899ca0f0b8da24a1b9c8d61ddc6dd 956e3b99c3fbf0cd5d4819e7424f4fc7f823157f refs/tags/v0.4.7 ^32c474ad5f00d898dfae9b590d994cfb432d7529 2a7d6ce71248be312cb6574e3ba578e24c0455bc refs/tags/v0.4.8 ^51bc2b20b922a5207bf00f895eacbececa2d5436 932e1be1081f9fbca94da58adf6b8f624183c57b refs/tags/v0.4.9 ^9c74e702d840fc583b6772c661757f84c2fc9b08 debsecan-0.4.18/.git/config0000644000000000000000000000060512472424032012270 0ustar [core] repositoryformatversion = 0 filemode = true bare = false logallrefupdates = true [remote "origin"] url = ssh://www-on-albireo/home/www/git.enyo.de/fw/debian/debsecan.git push = master:master [gui] geometry = 1029x913+853+109 290 207 wmstate = normal [remote "gitorious"] url = git@gitorious.org:debsecan/debsecan.git fetch = +refs/heads/*:refs/remotes/gitorious/* debsecan-0.4.18/.git/COMMIT_EDITMSG0000644000000000000000000000003012472425113013160 0ustar Update Debian changelog debsecan-0.4.18/debian/0000755000000000000000000000000012472425103011460 5ustar debsecan-0.4.18/debian/po/0000755000000000000000000000000012315633246012103 5ustar debsecan-0.4.18/debian/po/POTFILES.in0000644000000000000000000000005510601557775013670 0ustar [type: gettext/rfc822deb] debsecan.templates debsecan-0.4.18/debian/po/templates.pot0000644000000000000000000000445211074367720014634 0ustar # SOME DESCRIPTIVE TITLE. # Copyright (C) YEAR THE PACKAGE'S COPYRIGHT HOLDER # This file is distributed under the same license as the PACKAGE package. # FIRST AUTHOR , YEAR. # #, fuzzy msgid "" msgstr "" "Project-Id-Version: PACKAGE VERSION\n" "Report-Msgid-Bugs-To: debsecan@packages.debian.org\n" "POT-Creation-Date: 2008-10-12 14:38+0200\n" "PO-Revision-Date: YEAR-MO-DA HO:MI+ZONE\n" "Last-Translator: FULL NAME \n" "Language-Team: LANGUAGE \n" "MIME-Version: 1.0\n" "Content-Type: text/plain; charset=CHARSET\n" "Content-Transfer-Encoding: 8bit\n" #. Type: boolean #. Description #: ../debsecan.templates:1001 msgid "Do you want debsecan to send daily reports?" msgstr "" #. Type: boolean #. Description #: ../debsecan.templates:1001 msgid "" "debsecan can check the security status of the host once per day, and notify " "you of any changes by email." msgstr "" #. Type: boolean #. Description #: ../debsecan.templates:1001 msgid "" "If you choose this option, debsecan will download a small file once a day. " "Your package list will not be transmitted to the server." msgstr "" #. Type: string #. Description #: ../debsecan.templates:2001 msgid "Email address to which daily reports should be sent:" msgstr "" #. Type: select #. Description #: ../debsecan.templates:3001 msgid "Main suite from which packages are installed:" msgstr "" #. Type: select #. Description #: ../debsecan.templates:3001 msgid "" "To present more useful data, debsecan needs to know the Debian release from " "which you usually install packages." msgstr "" #. Type: select #. Description #: ../debsecan.templates:3001 msgid "" "If you specify \"GENERIC\" (the default), only basic debsecan functionality " "is available. If you specify the suite matching your sources.list " "configuration, information about fixed and obsolete packages will be " "included in email reports." msgstr "" #. Type: string #. Description #: ../debsecan.templates:4001 msgid "URL of vulnerability information:" msgstr "" #. Type: string #. Description #: ../debsecan.templates:4001 msgid "" "debsecan fetches vulnerability information from the network. If your system " "is not connected to the Internet, you can enter the URL of a local mirror " "here. If you leave this option empty, the built-in default URL is used." msgstr "" debsecan-0.4.18/debian/po/ca.po0000644000000000000000000000700712311570557013033 0ustar # # Catalan translation for debsecan package. # Copyright (C) 2007 Florian Weimer. # This file is distributed under the same license as the debsecan # package. # # Jordà Polo , 2007. # msgid "" msgstr "" "Project-Id-Version: 0.4.4\n" "Report-Msgid-Bugs-To: debsecan@packages.debian.org\n" "POT-Creation-Date: 2008-10-12 14:38+0200\n" "PO-Revision-Date: 2007-02-21 19:04+0100\n" "Last-Translator: Jordà Polo \n" "Language-Team: Català \n" "Language: \n" "MIME-Version: 1.0\n" "Content-Type: text/plain; charset=UTF-8\n" "Content-Transfer-Encoding: 8bit\n" #. Type: boolean #. Description #: ../debsecan.templates:1001 msgid "Do you want debsecan to send daily reports?" msgstr "Voleu que debsecan enviï informes diaris?" #. Type: boolean #. Description #: ../debsecan.templates:1001 msgid "" "debsecan can check the security status of the host once per day, and notify " "you of any changes by email." msgstr "" "debsecan pot comprovar l'estat de la seguretat de la màquina una vegada al " "dia, i notificar qualsevol canvi per correu electrònic." #. Type: boolean #. Description #: ../debsecan.templates:1001 msgid "" "If you choose this option, debsecan will download a small file once a day. " "Your package list will not be transmitted to the server." msgstr "" "Si trieu aquesta opció, debsecan descarregarà un petit fitxer cada dia. La " "llista dels paquets que tingueu instal·lats no s'enviarà al servidor." #. Type: string #. Description #: ../debsecan.templates:2001 msgid "Email address to which daily reports should be sent:" msgstr "Adreça de correu electrònic on s'haurien d'enviar els informes diaris:" #. Type: select #. Description #: ../debsecan.templates:3001 msgid "Main suite from which packages are installed:" msgstr "Col·lecció principal des de la qual s'instal·len els paquets:" #. Type: select #. Description #: ../debsecan.templates:3001 msgid "" "To present more useful data, debsecan needs to know the Debian release from " "which you usually install packages." msgstr "" "Per tal de presentar dades més útils, debsecan necessita saber quina versió " "de Debian utilitzeu normalment per a instal·lar paquets." #. Type: select #. Description #: ../debsecan.templates:3001 msgid "" "If you specify \"GENERIC\" (the default), only basic debsecan functionality " "is available. If you specify the suite matching your sources.list " "configuration, information about fixed and obsolete packages will be " "included in email reports." msgstr "" "Si trieu «GENERIC» (que és l'opció predeterminada), només disposareu de la " "funcionalitat més bàsica de debsecan. Si especifiqueu la versió d'acord amb " "la configuració del vostre sources.list, en els informes també s'inclourà " "informació referent a errors solucionats i paquets obsolets." #. Type: string #. Description #: ../debsecan.templates:4001 msgid "URL of vulnerability information:" msgstr "URL amb informació de la vulnerabilitat:" #. Type: string #. Description #: ../debsecan.templates:4001 msgid "" "debsecan fetches vulnerability information from the network. If your system " "is not connected to the Internet, you can enter the URL of a local mirror " "here. If you leave this option empty, the built-in default URL is used." msgstr "" "debsecan obté la informació de les vulnerabilitats des de la xarxa. Si el " "vostre sistema no està connectat a Internet, podeu introduir l'URL d'una " "rèplica local. Si deixeu aquesta opció en blanc, s'utilitzarà l'URL " "predeterminada." debsecan-0.4.18/debian/po/cs.po0000644000000000000000000000656212311570557013062 0ustar # Czech translation of debsecan. # Copyright (C) YEAR THE PACKAGE'S COPYRIGHT HOLDER # This file is distributed under the same license as the debsecan package. # Miroslav Kure , 2006. # msgid "" msgstr "" "Project-Id-Version: debsecan\n" "Report-Msgid-Bugs-To: debsecan@packages.debian.org\n" "POT-Creation-Date: 2008-10-12 14:38+0200\n" "PO-Revision-Date: 2007-02-19 22:02+0100\n" "Last-Translator: Miroslav Kure \n" "Language-Team: Czech \n" "Language: cs\n" "MIME-Version: 1.0\n" "Content-Type: text/plain; charset=UTF-8\n" "Content-Transfer-Encoding: 8bit\n" #. Type: boolean #. Description #: ../debsecan.templates:1001 msgid "Do you want debsecan to send daily reports?" msgstr "Chcete, aby debsecan zasílal denní hlášení?" #. Type: boolean #. Description #: ../debsecan.templates:1001 msgid "" "debsecan can check the security status of the host once per day, and notify " "you of any changes by email." msgstr "" "debsecan může jednou denně kontrolovat stav bezpečnosti tohoto počítače a " "při každé změně vás emailem varovat." #. Type: boolean #. Description #: ../debsecan.templates:1001 msgid "" "If you choose this option, debsecan will download a small file once a day. " "Your package list will not be transmitted to the server." msgstr "" "Zvolíte-li tuto možnost, bude debsecan denně stahovat malý soubor. Váš " "seznam balíků se nebude kopírovat na server." #. Type: string #. Description #: ../debsecan.templates:2001 msgid "Email address to which daily reports should be sent:" msgstr "Emailová adresa, na kterou se mají zasílat denní hlášení:" #. Type: select #. Description #: ../debsecan.templates:3001 msgid "Main suite from which packages are installed:" msgstr "Hlavní větev, ze které instalujete balíky:" #. Type: select #. Description #: ../debsecan.templates:3001 msgid "" "To present more useful data, debsecan needs to know the Debian release from " "which you usually install packages." msgstr "" "Aby mohl debsecan poskytovat lepší informace, potřebuje vědět, ze které " "větve Debianu nejčastěji instalujete balíky." #. Type: select #. Description #: ../debsecan.templates:3001 msgid "" "If you specify \"GENERIC\" (the default), only basic debsecan functionality " "is available. If you specify the suite matching your sources.list " "configuration, information about fixed and obsolete packages will be " "included in email reports." msgstr "" "Zadáte-li \"GENERIC\" (výchozí hodnota), bude dostupná pouze základní " "funkcionalita debsecanu. Pokud ovšem zadáte větev odpovídající vašemu " "souboru sources.list, budou v hlášeních zahrnuty informace o opravených a " "zastaralých balících." #. Type: string #. Description #: ../debsecan.templates:4001 msgid "URL of vulnerability information:" msgstr "URL informací o zranitelnostech:" #. Type: string #. Description #: ../debsecan.templates:4001 msgid "" "debsecan fetches vulnerability information from the network. If your system " "is not connected to the Internet, you can enter the URL of a local mirror " "here. If you leave this option empty, the built-in default URL is used." msgstr "" "debsecan stahuje informace o zranitelnostech ze sítě. Pokud není váš systém " "připojen k Internetu, můžete zde zadat URL lokálního zrcadla. Ponecháte-li " "prázdné, použije se výchozí URL." debsecan-0.4.18/debian/po/da.po0000644000000000000000000000667712311570557013050 0ustar # Danish translation debsecan. # Copyright (C) 2012 debsecan & nedenstående oversættere. # This file is distributed under the same license as the debsecan package. # Joe Hansen , 2012. # msgid "" msgstr "" "Project-Id-Version: debsecan\n" "Report-Msgid-Bugs-To: debsecan@packages.debian.org\n" "POT-Creation-Date: 2008-10-12 14:38+0200\n" "PO-Revision-Date: 2012-01-03 17:34+0000\n" "Last-Translator: Joe Hansen \n" "Language-Team: Danish \n" "Language: da\n" "MIME-Version: 1.0\n" "Content-Type: text/plain; charset=UTF-8\n" "Content-Transfer-Encoding: 8bit\n" #. Type: boolean #. Description #: ../debsecan.templates:1001 msgid "Do you want debsecan to send daily reports?" msgstr "Ønsker du at debsecan skal sende daglige rapporter?" #. Type: boolean #. Description #: ../debsecan.templates:1001 msgid "" "debsecan can check the security status of the host once per day, and notify " "you of any changes by email." msgstr "" "debsecan kan kontrollere sikkerhedsstatussen for værten en gang per dag, og " "give dig besked om ændringer via e-post." #. Type: boolean #. Description #: ../debsecan.templates:1001 msgid "" "If you choose this option, debsecan will download a small file once a day. " "Your package list will not be transmitted to the server." msgstr "" "Hvis du vælger denne indstilling, så vil debsecan hente en lille fil en gang " "om dagen. Din pakkeliste vil ikke blive sendt til serveren." #. Type: string #. Description #: ../debsecan.templates:2001 msgid "Email address to which daily reports should be sent:" msgstr "E-post-adresse hvortil der skal sendes daglige rapporter:" #. Type: select #. Description #: ../debsecan.templates:3001 msgid "Main suite from which packages are installed:" msgstr "Hovedversion hvorfra pakker er installeret:" #. Type: select #. Description #: ../debsecan.templates:3001 msgid "" "To present more useful data, debsecan needs to know the Debian release from " "which you usually install packages." msgstr "" "For at præsentere mere brugbare data har debsecan brug for at vide hvilken " "Debianudgivelse, du normalt installerer pakker fra." #. Type: select #. Description #: ../debsecan.templates:3001 msgid "" "If you specify \"GENERIC\" (the default), only basic debsecan functionality " "is available. If you specify the suite matching your sources.list " "configuration, information about fixed and obsolete packages will be " "included in email reports." msgstr "" "Hvis du angiver »GENERIC« (standarden), vil kun grundlæggende funktionalitet " "for debsecan være tilgængelig. Hvis du angiver versionen, der matcher din " "sources.list-konfiguration, så vil information om faste og forældede pakker " "blive inkluderet i e-post-rapporterne." #. Type: string #. Description #: ../debsecan.templates:4001 msgid "URL of vulnerability information:" msgstr "Adresse for information om sårbarheder:" #. Type: string #. Description #: ../debsecan.templates:4001 msgid "" "debsecan fetches vulnerability information from the network. If your system " "is not connected to the Internet, you can enter the URL of a local mirror " "here. If you leave this option empty, the built-in default URL is used." msgstr "" "debsecan henter information om sårbarheder fra netværket. Hvis dit system " "ikke er forbundet til internettet, så kan du indtaste adressen for et lokalt " "spejl her. Hvis du efterlader denne indstilling tom, så bruges den " "indbyggede standardadresse." debsecan-0.4.18/debian/po/de.po0000644000000000000000000000711612311570557013041 0ustar # translation of po-debconf template to German # Copyright (C) 2006, Matthias Julius # This file is distributed under the same license as the debsecan package. # # Matthias Julius , 2006, 2007. msgid "" msgstr "" "Project-Id-Version: debsecan 0.4.3.2\n" "Report-Msgid-Bugs-To: debsecan@packages.debian.org\n" "POT-Creation-Date: 2008-10-12 14:38+0200\n" "PO-Revision-Date: 2007-02-18 21:41-0500\n" "Last-Translator: Matthias Julius \n" "Language-Team: German \n" "Language: de\n" "MIME-Version: 1.0\n" "Content-Type: text/plain; charset=UTF-8\n" "Content-Transfer-Encoding: 8bit\n" "X-Generator: KBabel 1.11.4\n" #. Type: boolean #. Description #: ../debsecan.templates:1001 msgid "Do you want debsecan to send daily reports?" msgstr "Möchten Sie, dass debsecan tägliche Berichte versendet?" #. Type: boolean #. Description #: ../debsecan.templates:1001 msgid "" "debsecan can check the security status of the host once per day, and notify " "you of any changes by email." msgstr "" "Debsecan kann den Sicherheitsstatus des Rechners einmal pro Tag prüfen und " "Sie bei Änderungen per Email informieren." #. Type: boolean #. Description #: ../debsecan.templates:1001 msgid "" "If you choose this option, debsecan will download a small file once a day. " "Your package list will not be transmitted to the server." msgstr "" "Falls Sie diese Möglichkeit wählen, wird debsecan einmal pro Tag eine kleine " "Datei herunterladen. Ihre Paketliste wird nicht an den Server übermittelt." #. Type: string #. Description #: ../debsecan.templates:2001 msgid "Email address to which daily reports should be sent:" msgstr "Email-Adresse, an die tägliche Berichte gesendet werden sollen:" #. Type: select #. Description #: ../debsecan.templates:3001 msgid "Main suite from which packages are installed:" msgstr "Hauptsächliche Release, von der Pakete installiert werden:" #. Type: select #. Description #: ../debsecan.templates:3001 msgid "" "To present more useful data, debsecan needs to know the Debian release from " "which you usually install packages." msgstr "" "Um nützlichere Daten zu präsentieren, muss debsecan die Debian-Release " "kennen, von der Sie gewöhnlich Pakete installieren." #. Type: select #. Description #: ../debsecan.templates:3001 msgid "" "If you specify \"GENERIC\" (the default), only basic debsecan functionality " "is available. If you specify the suite matching your sources.list " "configuration, information about fixed and obsolete packages will be " "included in email reports." msgstr "" "Falls Sie »GENERIC« (Voreinstellung) angeben, ist nur die " "Basisfunktionalität von debsecan verfügbar. Falls Sie die Release angeben, " "die zu Ihrer souces.list-Konfiguration passt, werden die Email-Berichte " "Informationen bezüglich aktualisierter und veralteter Pakete enthalten." #. Type: string #. Description #: ../debsecan.templates:4001 msgid "URL of vulnerability information:" msgstr "URL für Informationen über Sicherheitslücken:" #. Type: string #. Description #: ../debsecan.templates:4001 msgid "" "debsecan fetches vulnerability information from the network. If your system " "is not connected to the Internet, you can enter the URL of a local mirror " "here. If you leave this option empty, the built-in default URL is used." msgstr "" "Debsecan lädt Informationen über Sicherheitslücken aus dem Netzerk. Falls " "Ihr System nicht mit dem Internet verbunden ist, können Sie die URL eines " "lokalen Spiegel-Servers hier angeben. Falls Sie diese Einstellung leer " "lassen, wird eine voreingestellte URL verwendet." debsecan-0.4.18/debian/po/eu.po0000644000000000000000000000660712311570557013066 0ustar # debsecan debconf template translation to basque # Copyright (C) 2007 Piarres Beobide # This file is distributed under the same license as the debsecan package. # Piarres Beobide , 2007. # msgid "" msgstr "" "Project-Id-Version: debsecan-debconf\n" "Report-Msgid-Bugs-To: debsecan@packages.debian.org\n" "POT-Creation-Date: 2008-10-12 14:38+0200\n" "PO-Revision-Date: 2007-02-20 12:39+0100\n" "Last-Translator: Piarres Beobide \n" "Language-Team: Librezale \n" "Language: \n" "MIME-Version: 1.0\n" "Content-Type: text/plain; charset=UTF-8\n" "Content-Transfer-Encoding: 8bit\n" "X-Generator: Pootle 0.10.1\n" #. Type: boolean #. Description #: ../debsecan.templates:1001 msgid "Do you want debsecan to send daily reports?" msgstr "debsecan-ek eguneroko txostenak bidaltzea nahi?" #. Type: boolean #. Description #: ../debsecan.templates:1001 msgid "" "debsecan can check the security status of the host once per day, and notify " "you of any changes by email." msgstr "" "debsecan-ek ostalariaren segurtasun egoera egunean behin egiazta eta " "egondako edozein aldaketa posta bidez ohartu dezake ." #. Type: boolean #. Description #: ../debsecan.templates:1001 msgid "" "If you choose this option, debsecan will download a small file once a day. " "Your package list will not be transmitted to the server." msgstr "" "Aukera hau hautatuaz debsecan-ek egunero fitxategi txiki bat deskargatuko " "du. Zure pakete zerrenda ez da zerbitzarira bidaliko." #. Type: string #. Description #: ../debsecan.templates:2001 msgid "Email address to which daily reports should be sent:" msgstr "Eguneroko txostenak bidali behar diren eposta helbidea:" #. Type: select #. Description #: ../debsecan.templates:3001 msgid "Main suite from which packages are installed:" msgstr "Paketeak instalaturik dauden suite orokorra:" #. Type: select #. Description #: ../debsecan.templates:3001 msgid "" "To present more useful data, debsecan needs to know the Debian release from " "which you usually install packages." msgstr "" "Datu erabilgarriagoak erakusteko, debsecan-ek arruntean instalatzen dituzun " "paketeen Debian banaketa bertsioa ezagutu behar du." #. Type: select #. Description #: ../debsecan.templates:3001 msgid "" "If you specify \"GENERIC\" (the default), only basic debsecan functionality " "is available. If you specify the suite matching your sources.list " "configuration, information about fixed and obsolete packages will be " "included in email reports." msgstr "" "\"GENERIC\" (lehenespena) hautatuaz gero, debsecan ezaugarri oinarrizkoak " "daude erabilgarri. sources.list konfigurazioko suitea ezarriaz konpondutako " "eta zaharkituriko paketeen argibideak ere agertuko dira eposta txostenetan." #. Type: string #. Description #: ../debsecan.templates:4001 msgid "URL of vulnerability information:" msgstr "Ahultasunen argibide URL-a:" #. Type: string #. Description #: ../debsecan.templates:4001 msgid "" "debsecan fetches vulnerability information from the network. If your system " "is not connected to the Internet, you can enter the URL of a local mirror " "here. If you leave this option empty, the built-in default URL is used." msgstr "" "debsecan-ek saretik jasotzen du ahultasunen informazioa. Zure sistema ez " "badago internetera konektaturik, ispilu lokal baten helbidea ipini dezakezu " "hemen. Aukera hau hutsik utziaz lehenetsiriko URL-a erabiliko da." debsecan-0.4.18/debian/po/fi.po0000644000000000000000000000636012311570557013047 0ustar msgid "" msgstr "" "Project-Id-Version: debsecan\n" "Report-Msgid-Bugs-To: debsecan@packages.debian.org\n" "POT-Creation-Date: 2008-10-12 14:38+0200\n" "PO-Revision-Date: \n" "Last-Translator: Esko Arajärvi \n" "Language-Team: Finnish \n" "Language: fi\n" "MIME-Version: 1.0\n" "Content-Type: text/plain; charset=UTF-8\n" "Content-Transfer-Encoding: 8bit\n" "X-Poedit-Language: Finnish\n" "X-Poedit-Country: FINLAND\n" #. Type: boolean #. Description #: ../debsecan.templates:1001 msgid "Do you want debsecan to send daily reports?" msgstr "Tulisiko debsecanin lähettää raportteja päivittäin?" #. Type: boolean #. Description #: ../debsecan.templates:1001 msgid "" "debsecan can check the security status of the host once per day, and notify " "you of any changes by email." msgstr "" "debsecan voi tarkistaa koneen turvatilanteen päivittäin ja lähettää viestin " "muutoksista sähköpostilla." #. Type: boolean #. Description #: ../debsecan.templates:1001 msgid "" "If you choose this option, debsecan will download a small file once a day. " "Your package list will not be transmitted to the server." msgstr "" "Jos valitset tämän vaihtoehdon, debsecan lataa päivittäin pienen tiedoston. " "Pakettilistaasi ei lähetetä palvelimelle." #. Type: string #. Description #: ../debsecan.templates:2001 msgid "Email address to which daily reports should be sent:" msgstr "Sähköpostiosoite, johon päivittäiset raportit tulisi lähettää:" #. Type: select #. Description #: ../debsecan.templates:3001 msgid "Main suite from which packages are installed:" msgstr "Jakelu, jonka paketteja oletuksena asennetaan:" #. Type: select #. Description #: ../debsecan.templates:3001 msgid "" "To present more useful data, debsecan needs to know the Debian release from " "which you usually install packages." msgstr "" "Jotta esitetyt tiedot olisivat käyttökelpoisempia, debsecanin täytyy tietää " "minkä Debian-jakelun paketteja yleensä asennetaan." #. Type: select #. Description #: ../debsecan.templates:3001 msgid "" "If you specify \"GENERIC\" (the default), only basic debsecan functionality " "is available. If you specify the suite matching your sources.list " "configuration, information about fixed and obsolete packages will be " "included in email reports." msgstr "" "Jos valitset ”GENERIC” (oletus), vain debsecanin perustoiminnallisuudet ovat " "käytettävissä. Jos valitset tiedoston sources.list asetuksiin täsmäävän " "jakelun, sähköpostiraportteihin sisällytetään tiedot korjatuista ja " "vanhentuneista paketeista." #. Type: string #. Description #: ../debsecan.templates:4001 msgid "URL of vulnerability information:" msgstr "Haavoittuvuustietojen URL:" #. Type: string #. Description #: ../debsecan.templates:4001 msgid "" "debsecan fetches vulnerability information from the network. If your system " "is not connected to the Internet, you can enter the URL of a local mirror " "here. If you leave this option empty, the built-in default URL is used." msgstr "" "debsecan hakee tiedot haavoittuvuuksista verkosta. Jos järjestelmä ei ole " "yhteydessä Internetiin, voit antaa tässä paikallisen peilin URLin. Jos jätät " "kentän tyhjäksi, käytetään ohjelman sisäänrakennettua oletusarvoa." debsecan-0.4.18/debian/po/fr.po0000644000000000000000000000716112311570557013060 0ustar # translation of fr.po to French # Debsecan. # Copyright (C) 2006 # This file is distributed under the same license as the debsecan package. # # Florian Weimer , 2006. # Christian Perrier , 2007. # Steve Petruzzello msgid "" msgstr "" "Project-Id-Version: fr\n" "Report-Msgid-Bugs-To: debsecan@packages.debian.org\n" "POT-Creation-Date: 2008-10-12 14:38+0200\n" "PO-Revision-Date: 2007-02-20 07:36+0100\n" "Last-Translator: Christian Perrier \n" "Language-Team: French \n" "Language: fr\n" "MIME-Version: 1.0\n" "Content-Type: text/plain; charset=UTF-8\n" "Content-Transfer-Encoding: 8bit\n" #. Type: boolean #. Description #: ../debsecan.templates:1001 msgid "Do you want debsecan to send daily reports?" msgstr "Faut-il que Debsecan envoie des rapports quotidiens par courriel ?" #. Type: boolean #. Description #: ../debsecan.templates:1001 msgid "" "debsecan can check the security status of the host once per day, and notify " "you of any changes by email." msgstr "" "Debsecan peut vérifier quotidiennement l'état de sécurité de l'hôte et vous " "informer de tout changement." #. Type: boolean #. Description #: ../debsecan.templates:1001 msgid "" "If you choose this option, debsecan will download a small file once a day. " "Your package list will not be transmitted to the server." msgstr "" "En choisissant cette option, Debsecan téléchargera quotidiennement un petit " "fichier. La liste des paquets ne sera pas transmise au serveur." #. Type: string #. Description #: ../debsecan.templates:2001 msgid "Email address to which daily reports should be sent:" msgstr "Adresse électronique où seront envoyés les rapports quotidiens :" #. Type: select #. Description #: ../debsecan.templates:3001 msgid "Main suite from which packages are installed:" msgstr "Version de la distribution utilisée :" #. Type: select #. Description #: ../debsecan.templates:3001 msgid "" "To present more useful data, debsecan needs to know the Debian release from " "which you usually install packages." msgstr "" "Afin de présenter des données utiles, Debsecan a besoin de connaître la " "version de la distribution que vous utilisez." #. Type: select #. Description #: ../debsecan.templates:3001 msgid "" "If you specify \"GENERIC\" (the default), only basic debsecan functionality " "is available. If you specify the suite matching your sources.list " "configuration, information about fixed and obsolete packages will be " "included in email reports." msgstr "" "En indiquant « GENERIC » (valeur par défaut), seules des fonctionnalités " "très basiques de Debsecan seront disponibles. En revanche, si vous indiquez " "la version correspondant au fichier « sources.list », des informations sur " "les paquets corrigés et obsolètes seront ajoutées au rapport envoyé par " "courriel." #. Type: string #. Description #: ../debsecan.templates:4001 msgid "URL of vulnerability information:" msgstr "URL donnant les informations sur les vulnérabilités :" #. Type: string #. Description #: ../debsecan.templates:4001 msgid "" "debsecan fetches vulnerability information from the network. If your system " "is not connected to the Internet, you can enter the URL of a local mirror " "here. If you leave this option empty, the built-in default URL is used." msgstr "" "Debsecan récupère les informations sur les vulnérabilités via le réseau. Si " "votre système n'est pas connecté à l'Internet, vous pouvez indiquer l'URL " "d'un miroir local. Si vous laissez ce champ vide, l'adresse par défaut " "configurée dans le programme sera utilisée." debsecan-0.4.18/debian/po/gl.po0000644000000000000000000000657112311570557013057 0ustar # Galician translation of debsecan's debconf templates # This file is distributed under the same license as the debsecan package. # Jacobo Tarrio , 2007. # msgid "" msgstr "" "Project-Id-Version: debsecan\n" "Report-Msgid-Bugs-To: debsecan@packages.debian.org\n" "POT-Creation-Date: 2008-10-12 14:38+0200\n" "PO-Revision-Date: 2007-02-19 00:36+0100\n" "Last-Translator: Jacobo Tarrio \n" "Language-Team: Galician \n" "Language: gl\n" "MIME-Version: 1.0\n" "Content-Type: text/plain; charset=UTF-8\n" "Content-Transfer-Encoding: 8bit\n" #. Type: boolean #. Description #: ../debsecan.templates:1001 msgid "Do you want debsecan to send daily reports?" msgstr "¿Quere que debsecan envíe informes diarios?" #. Type: boolean #. Description #: ../debsecan.templates:1001 msgid "" "debsecan can check the security status of the host once per day, and notify " "you of any changes by email." msgstr "" "debsecan pode comprobar a seguridade da máquina unha vez cada día, e avisalo " "por email de calquera cambio." #. Type: boolean #. Description #: ../debsecan.templates:1001 msgid "" "If you choose this option, debsecan will download a small file once a day. " "Your package list will not be transmitted to the server." msgstr "" "Se escolle esta opción, debsecan ha descargar un pequeno ficheiro cada día. " "Non se ha transmitir a lista de paquetes ao servidor." #. Type: string #. Description #: ../debsecan.templates:2001 msgid "Email address to which daily reports should be sent:" msgstr "Enderezo de email ao que enviar os informes diarios:" #. Type: select #. Description #: ../debsecan.templates:3001 msgid "Main suite from which packages are installed:" msgstr "Versión da que se instalan os paquetes:" #. Type: select #. Description #: ../debsecan.templates:3001 msgid "" "To present more useful data, debsecan needs to know the Debian release from " "which you usually install packages." msgstr "" "Para lle presentar datos máis útiles, debsecan precisa de coñecer a versión " "de Debian da que adoita instalar os paquetes." #. Type: select #. Description #: ../debsecan.templates:3001 msgid "" "If you specify \"GENERIC\" (the default), only basic debsecan functionality " "is available. If you specify the suite matching your sources.list " "configuration, information about fixed and obsolete packages will be " "included in email reports." msgstr "" "Se indica \"GENERIC\" (o valor por defecto), só ha estar dispoñible a " "funcionalidade básica de debsecan. Se especifica a versión que encaixa coa " "configuración armacenada no ficheiro sources.list, hase incluír información " "sobre paquetes arranxados e obsoletos nos informes por email." #. Type: string #. Description #: ../debsecan.templates:4001 msgid "URL of vulnerability information:" msgstr "URL da información sobre vulnerabilidades:" #. Type: string #. Description #: ../debsecan.templates:4001 msgid "" "debsecan fetches vulnerability information from the network. If your system " "is not connected to the Internet, you can enter the URL of a local mirror " "here. If you leave this option empty, the built-in default URL is used." msgstr "" "debsecan descarga a información sobre vulnerabilidades da rede. Se o seu " "sistema non está conectado a Internet, pode introducir o URL dunha réplica " "local aquí. Se deixa esta opción en branco, hase empregar o URL por defecto." debsecan-0.4.18/debian/po/he.po0000644000000000000000000000731712311570557013050 0ustar # translation of he.po to Hebrew # Copyright (C) YEAR THE PACKAGE'S COPYRIGHT HOLDER # This file is distributed under the same license as the PACKAGE package. # # Lior Kaplan , 2007. msgid "" msgstr "" "Project-Id-Version: he\n" "Report-Msgid-Bugs-To: debsecan@packages.debian.org\n" "POT-Creation-Date: 2008-10-12 14:38+0200\n" "PO-Revision-Date: 2007-02-19 22:16+0100\n" "Last-Translator: Lior Kaplan \n" "Language-Team: Hebrew \n" "Language: he\n" "MIME-Version: 1.0\n" "Content-Type: text/plain; charset=UTF-8\n" "Content-Transfer-Encoding: 8bit\n" "X-Generator: KBabel 1.11.4\n" #. Type: boolean #. Description #: ../debsecan.templates:1001 msgid "Do you want debsecan to send daily reports?" msgstr "האם אתה רוצה ש-debsecan ישלח דוחות יומיים בדואר?" #. Type: boolean #. Description #: ../debsecan.templates:1001 msgid "" "debsecan can check the security status of the host once per day, and notify " "you of any changes by email." msgstr "" "debsecan יכול לבדוק את מצב האבטחה של המחשב פעם ביום ולהודיע לך על השינויים " "דרך דואר אלקטרוני." #. Type: boolean #. Description #: ../debsecan.templates:1001 msgid "" "If you choose this option, debsecan will download a small file once a day. " "Your package list will not be transmitted to the server." msgstr "" "אם תבחר באפשרות זאת, debsecan יוריד קובץ קטן פעם ביום. רשימת החבילות שלך לא " "תשלח לשרת." #. Type: string #. Description #: ../debsecan.templates:2001 msgid "Email address to which daily reports should be sent:" msgstr "כתובת דואר אלקטרוני ש אליה ישלחו הדוחות היומיים:" #. Type: select #. Description #: ../debsecan.templates:3001 msgid "Main suite from which packages are installed:" msgstr "המאגר הראשי ממנו מותקנות חבילות:" #. Type: select #. Description #: ../debsecan.templates:3001 msgid "" "To present more useful data, debsecan needs to know the Debian release from " "which you usually install packages." msgstr "" "כדי להציג מידע יותר שימושי debsecan צריך להכיר את הפצת דביאן ממנה אתה בדרך " "כלל מתקין חבילות." #. Type: select #. Description #: ../debsecan.templates:3001 msgid "" "If you specify \"GENERIC\" (the default), only basic debsecan functionality " "is available. If you specify the suite matching your sources.list " "configuration, information about fixed and obsolete packages will be " "included in email reports." msgstr "" "אם תציין \"GENERIC\" (בררת המחדל), תופיע רק פונקציונליות בסיסית של debsecan. " "אם תציין את המאגר שתואם להגדרות בקובץ sources.list שלך, המידע על חבילות " "מתוקנות או ישנות יכלל בדוחות הדואר." #. Type: string #. Description #: ../debsecan.templates:4001 msgid "URL of vulnerability information:" msgstr "כתובת של מידע על הרגישויות:" #. Type: string #. Description #: ../debsecan.templates:4001 msgid "" "debsecan fetches vulnerability information from the network. If your system " "is not connected to the Internet, you can enter the URL of a local mirror " "here. If you leave this option empty, the built-in default URL is used." msgstr "" "debsecan מביא מידע על הרגישויות מהרשת. אם המערכת שלך אינה מחוברת לאינטנרט, " "תוכל להכניס כתובת של אתר מראה מקומי. אם תשאיר את שדה זה ריק, יבוצע שימוש " "בכתובת ברירת המחדל." debsecan-0.4.18/debian/po/it.po0000644000000000000000000000704012311570557013061 0ustar # Italian (it) translation of debconf templates for debsecan # Copyright (C) 2006 Free Software Foundation, Inc. # This file is distributed under the same license as the debsecan package. # Luca Monducci , 2006, 2007. # msgid "" msgstr "" "Project-Id-Version: debsecan 0.4.4 italian debconf templates\n" "Report-Msgid-Bugs-To: debsecan@packages.debian.org\n" "POT-Creation-Date: 2008-10-12 14:38+0200\n" "PO-Revision-Date: 2007-02-19 11:19+0100\n" "Last-Translator: Luca Monducci \n" "Language-Team: Italian \n" "Language: it\n" "MIME-Version: 1.0\n" "Content-Type: text/plain; charset=ISO-8859-1\n" "Content-Transfer-Encoding: 8bit\n" #. Type: boolean #. Description #: ../debsecan.templates:1001 msgid "Do you want debsecan to send daily reports?" msgstr "Si vuole che debsecan invii dei report giornalieri?" #. Type: boolean #. Description #: ../debsecan.templates:1001 msgid "" "debsecan can check the security status of the host once per day, and notify " "you of any changes by email." msgstr "" "debsecan pu verificare lo stato della sicurezza della macchina e, una volta " "al giorno, notificare via email qualsiasi cambiamento." #. Type: boolean #. Description #: ../debsecan.templates:1001 msgid "" "If you choose this option, debsecan will download a small file once a day. " "Your package list will not be transmitted to the server." msgstr "" "Se si attiva questa opzione, debsecan scarica un piccolo file una volta al " "giorno; il proprio elenco dei pacchetti non viene trasmesso al server." #. Type: string #. Description #: ../debsecan.templates:2001 msgid "Email address to which daily reports should be sent:" msgstr "Indirizzo email a cui devono essere inviati i report giornalieri:" #. Type: select #. Description #: ../debsecan.templates:3001 msgid "Main suite from which packages are installed:" msgstr "Release dalla quale abitualmente si installano i pacchetti:" #. Type: select #. Description #: ../debsecan.templates:3001 msgid "" "To present more useful data, debsecan needs to know the Debian release from " "which you usually install packages." msgstr "" "Per presentare dei informazioni ancora pi utili, debsecan deve conoscere da " "quale release Debian si installano solitamente i pacchetti." #. Type: select #. Description #: ../debsecan.templates:3001 msgid "" "If you specify \"GENERIC\" (the default), only basic debsecan functionality " "is available. If you specify the suite matching your sources.list " "configuration, information about fixed and obsolete packages will be " "included in email reports." msgstr "" "Se si indica \"GENERIC\" (il valore predefinito) sono disponibili solo le " "funzionalit di base di debsecan. Se si specifica la stessa release indicata " "in sources.list, le informazioni su pacchetti per i quali esistono delle " "correzioni o obsoleti vengono inserite nei report via email." #. Type: string #. Description #: ../debsecan.templates:4001 msgid "URL of vulnerability information:" msgstr "URL delle informazioni sulle vulnerabilit:" #. Type: string #. Description #: ../debsecan.templates:4001 msgid "" "debsecan fetches vulnerability information from the network. If your system " "is not connected to the Internet, you can enter the URL of a local mirror " "here. If you leave this option empty, the built-in default URL is used." msgstr "" "debsecan prende le informazioni sulle vulnerabilit dalla rete. Se il " "proprio sistema non connesso a Internet si pu inserire l'URL di un mirror " "locale. Se si lascia vuota questa voce, viene usata l'URL predefinita." debsecan-0.4.18/debian/po/ja.po0000644000000000000000000000743112311570557013043 0ustar # Copyright (C) 2008-2009 Florian Weimer # This file is distributed under the same license as the debsecan package. # Hideki Yamane (Debian-JP) , 2009. # msgid "" msgstr "" "Project-Id-Version: debsecan 0.4.10+nmu2\n" "Report-Msgid-Bugs-To: debsecan@packages.debian.org\n" "POT-Creation-Date: 2008-10-12 14:38+0200\n" "PO-Revision-Date: 2009-01-06 06:26+0900\n" "Last-Translator: Hideki Yamane (Debian-JP) \n" "Language-Team: Japanese \n" "Language: ja\n" "MIME-Version: 1.0\n" "Content-Type: text/plain; charset=UTF-8\n" "Content-Transfer-Encoding: 8bit\n" #. Type: boolean #. Description #: ../debsecan.templates:1001 msgid "Do you want debsecan to send daily reports?" msgstr "debsecan が日次レポートを送るようにしますか?" #. Type: boolean #. Description #: ../debsecan.templates:1001 msgid "" "debsecan can check the security status of the host once per day, and notify " "you of any changes by email." msgstr "" "debsecan でホストのセキュリティ状態を日に 1 回チェックして、変化をメールで通" "知するようにできます。" #. Type: boolean #. Description #: ../debsecan.templates:1001 msgid "" "If you choose this option, debsecan will download a small file once a day. " "Your package list will not be transmitted to the server." msgstr "" "このオプションを選択した場合、debsecan は日に 1 回小さなファイルをダウンロー" "ドします。あなたのパッケージのリストはサーバへは送られません。" #. Type: string #. Description #: ../debsecan.templates:2001 msgid "Email address to which daily reports should be sent:" msgstr "日次レポートが送られるアドレス:" #. Type: select #. Description #: ../debsecan.templates:3001 msgid "Main suite from which packages are installed:" msgstr "どのパッケージがインストールされているか、主要パッケージ群の指定:" #. Type: select #. Description #: ../debsecan.templates:3001 msgid "" "To present more useful data, debsecan needs to know the Debian release from " "which you usually install packages." msgstr "" "より役立つデータを表示するには、debsecan は大抵インストールされているであろう" "パッケージの Debian でのリリース状態を知る必要があります。" #. Type: select #. Description #: ../debsecan.templates:3001 msgid "" "If you specify \"GENERIC\" (the default), only basic debsecan functionality " "is available. If you specify the suite matching your sources.list " "configuration, information about fixed and obsolete packages will be " "included in email reports." msgstr "" "\"GENERIC\" を指定した場合 (デフォルト値) は debsecan の基本機能のみが利用可" "能です。sources.list 設定にマッチするパッケージ群を指定した場合は、修正された" "パッケージと古くなったパッケージの情報がメールレポートに含められます。" #. Type: string #. Description #: ../debsecan.templates:4001 msgid "URL of vulnerability information:" msgstr "脆弱性情報の URL:" #. Type: string #. Description #: ../debsecan.templates:4001 msgid "" "debsecan fetches vulnerability information from the network. If your system " "is not connected to the Internet, you can enter the URL of a local mirror " "here. If you leave this option empty, the built-in default URL is used." msgstr "" "debsecan はネットワークから脆弱性情報を取得します。システムがインターネットに" "接続されていない場合は、ここでローカルミラーの URL を入力できます。このオプ" "ションを空のままにしておく場合は、内蔵されているデフォルトの URL が使われま" "す。" debsecan-0.4.18/debian/po/nb.po0000644000000000000000000000662412311570557013053 0ustar # debsecan. # Copyright (C) 2007 # This file is distributed under the same license as the debsecan package. # Hans Fredrik Nordhaug , 2007 # msgid "" msgstr "" "Project-Id-Version: debsecan\n" "Report-Msgid-Bugs-To: debsecan@packages.debian.org\n" "POT-Creation-Date: 2008-10-12 14:38+0200\n" "PO-Revision-Date: 2007-03-11 08:26+0100\n" "Last-Translator: Hans Fredrik Nordhaug \n" "Language-Team: Norwegian Bokml \n" "Language: \n" "MIME-Version: 1.0\n" "Content-Type: text/plain; charset=ISO-8859-1\n" "Content-Transfer-Encoding: 8bit\n" #. Type: boolean #. Description #: ../debsecan.templates:1001 msgid "Do you want debsecan to send daily reports?" msgstr "Vil du at debsecan skal sende daglige rapporter?" #. Type: boolean #. Description #: ../debsecan.templates:1001 msgid "" "debsecan can check the security status of the host once per day, and notify " "you of any changes by email." msgstr "" "debsecan kan sjekke sikkerhetsstatusen for tjeneren en gang daglig og\n" "sende deg endringer p e-post." #. Type: boolean #. Description #: ../debsecan.templates:1001 msgid "" "If you choose this option, debsecan will download a small file once a day. " "Your package list will not be transmitted to the server." msgstr "" "Hvis du velger denne innstillingen, vil debsecan laste ned en liten fil en " "gang daglig.\n" "Pakkelisten din vil ikke bli overfrt til tjeneren." #. Type: string #. Description #: ../debsecan.templates:2001 msgid "Email address to which daily reports should be sent:" msgstr "E-postadressen som de daglige rapportene skal sendes til:" #. Type: select #. Description #: ../debsecan.templates:3001 msgid "Main suite from which packages are installed:" msgstr "Hovedsuite som pakkene er installert fra:" #. Type: select #. Description #: ../debsecan.templates:3001 msgid "" "To present more useful data, debsecan needs to know the Debian release from " "which you usually install packages." msgstr "" "For presentere mer nyttig informasjon, m debsecan vite fra hvilken \n" "Debian-utgivelsen du vanligvis installerer pakker." #. Type: select #. Description #: ../debsecan.templates:3001 msgid "" "If you specify \"GENERIC\" (the default), only basic debsecan functionality " "is available. If you specify the suite matching your sources.list " "configuration, information about fixed and obsolete packages will be " "included in email reports." msgstr "" "Hvis du oppgir \\\"GENERIC\\\" (standardvalget), s vil kun grunnleggende " "debsecan\n" "funksjonalitet vre tilgjengelig. Hvis du oppgir suiten som samsvarer med " "din\n" "sources.list-konfigurasjon, s vil informasjon om fiksede og foreldede \n" "pakker bli inkludert i e-postrapportene." #. Type: string #. Description #: ../debsecan.templates:4001 msgid "URL of vulnerability information:" msgstr "URL til srbarhetsinformasjon:" #. Type: string #. Description #: ../debsecan.templates:4001 msgid "" "debsecan fetches vulnerability information from the network. If your system " "is not connected to the Internet, you can enter the URL of a local mirror " "here. If you leave this option empty, the built-in default URL is used." msgstr "" "debseccan henter srbarhetsinformasjon fra nettverket. Hvis ditt system " "ikke \n" "er tilknyttet Internett, kan du oppgi en URL til et lokalt speil her. Hvis " "du \n" "lar denne innstillingen vre tom, s vil den innebygde standard URL-en bli " "brukt." debsecan-0.4.18/debian/po/nl.po0000644000000000000000000000676412311570557013072 0ustar # SOME DESCRIPTIVE TITLE. # Copyright (C) YEAR THE PACKAGE'S COPYRIGHT HOLDER # This file is distributed under the same license as the PACKAGE package. # FIRST AUTHOR , YEAR. # msgid "" msgstr "" "Project-Id-Version: debsecan\n" "Report-Msgid-Bugs-To: debsecan@packages.debian.org\n" "POT-Creation-Date: 2008-10-12 14:38+0200\n" "PO-Revision-Date: 2007-03-08 21:11+0100\n" "Last-Translator: Bart Cornelis \n" "Language-Team: debian-l10n-dutch \n" "Language: \n" "MIME-Version: 1.0\n" "Content-Type: text/plain; charset=utf-8\n" "Content-Transfer-Encoding: 8bit\n" "X-Poedit-Language: Dutch\n" #. Type: boolean #. Description #: ../debsecan.templates:1001 msgid "Do you want debsecan to send daily reports?" msgstr "Wilt u dat debsecan dagelijkse rapporten stuurt?" #. Type: boolean #. Description #: ../debsecan.templates:1001 msgid "" "debsecan can check the security status of the host once per day, and notify " "you of any changes by email." msgstr "" "debsecan kan de beveiligingsstatus van uw computer eens per dag controleren, " "en u vervolgens per e-mail over veranderingen verwittigen." #. Type: boolean #. Description #: ../debsecan.templates:1001 msgid "" "If you choose this option, debsecan will download a small file once a day. " "Your package list will not be transmitted to the server." msgstr "" "Als u voor deze optie kiest zal debsecan elke dag een klein bestand ophalen. " "Uw pakketlijst wordt niet doorgestuurd naar de server." #. Type: string #. Description #: ../debsecan.templates:2001 msgid "Email address to which daily reports should be sent:" msgstr "" "E-mailadres waar de dagelijkse rapporten naar toe verstuurd moeten worden:" #. Type: select #. Description #: ../debsecan.templates:3001 msgid "Main suite from which packages are installed:" msgstr "Van welke uitgave u de meeste pakketten geïnstalleerd heeft:" #. Type: select #. Description #: ../debsecan.templates:3001 msgid "" "To present more useful data, debsecan needs to know the Debian release from " "which you usually install packages." msgstr "" "Om nuttiger data te presenteren dient debsecan te weten van welke Debian-" "uitgave u normaal pakketten installeert." #. Type: select #. Description #: ../debsecan.templates:3001 msgid "" "If you specify \"GENERIC\" (the default), only basic debsecan functionality " "is available. If you specify the suite matching your sources.list " "configuration, information about fixed and obsolete packages will be " "included in email reports." msgstr "" "Als u de standaardwaarde ('GENERIC') opgeeft is enkel de basis-debsecan-" "functionaliteit beschikbaar. Als u de met uw sources.list overeenkomende " "uitgave opgeeft, wordt er informatie over vastgezette en verouderde " "pakketten bijgesloten in de (per e-mail verstuurde) rapporten." #. Type: string #. Description #: ../debsecan.templates:4001 msgid "URL of vulnerability information:" msgstr "Adres (URL) van de veiligheidslek-informatie:" #. Type: string #. Description #: ../debsecan.templates:4001 msgid "" "debsecan fetches vulnerability information from the network. If your system " "is not connected to the Internet, you can enter the URL of a local mirror " "here. If you leave this option empty, the built-in default URL is used." msgstr "" "debsecan haalt veiligheidslek-informatie op via het netwerk. Als uw systeem " "niet met Internet verbonden is kunt u hier het adres (URL) van de lokale " "spiegelserver opgeven. Als u dit leeg laat wordt het ingebouwde adres " "gebruikt." debsecan-0.4.18/debian/po/pl.po0000644000000000000000000000723112311570557013062 0ustar # Translation of debsecan debconf templates to Polish. # Copyright (C) 2008 # This file is distributed under the same license as the debsecan package. # # Michał Kułach , 2012. msgid "" msgstr "" "Project-Id-Version: \n" "Report-Msgid-Bugs-To: debsecan@packages.debian.org\n" "POT-Creation-Date: 2008-10-12 14:38+0200\n" "PO-Revision-Date: 2012-03-19 16:08+0100\n" "Last-Translator: Michał Kułach \n" "Language-Team: Polish \n" "Language: pl\n" "MIME-Version: 1.0\n" "Content-Type: text/plain; charset=UTF-8\n" "Content-Transfer-Encoding: 8bit\n" "X-Generator: Lokalize 1.2\n" "Plural-Forms: nplurals=3; plural=(n==1 ? 0 : n%10>=2 && n%10<=4 && (n%100<10 " "|| n%100>=20) ? 1 : 2);\n" #. Type: boolean #. Description #: ../debsecan.templates:1001 msgid "Do you want debsecan to send daily reports?" msgstr "Czy debsecan ma wysyłać codzienne raporty?" #. Type: boolean #. Description #: ../debsecan.templates:1001 msgid "" "debsecan can check the security status of the host once per day, and notify " "you of any changes by email." msgstr "" "Program debsecan może sprawdzać status bezpieczeństwa hosta codziennie i " "powiadamiać o wszystkich zmianach za pośrednictwem poczty elektronicznej." #. Type: boolean #. Description #: ../debsecan.templates:1001 msgid "" "If you choose this option, debsecan will download a small file once a day. " "Your package list will not be transmitted to the server." msgstr "" "Jeśli tak opcja zostanie wybrana, debsecan będzie codziennie pobierał " "niewielki plik. Lista pakietów nie będzie wysyłana na serwer." #. Type: string #. Description #: ../debsecan.templates:2001 msgid "Email address to which daily reports should be sent:" msgstr "Adres poczty elektronicznej, na który będą wysyłane codzienne raporty:" #. Type: select #. Description #: ../debsecan.templates:3001 msgid "Main suite from which packages are installed:" msgstr "Główny zestaw, z którego instalowane są pakiety:" #. Type: select #. Description #: ../debsecan.templates:3001 msgid "" "To present more useful data, debsecan needs to know the Debian release from " "which you usually install packages." msgstr "" "Aby przedstawiać użyteczniejsze dane, debsecan musi znać wydanie Debiana, z " "którego najczęściej są instalowane pakiety." #. Type: select #. Description #: ../debsecan.templates:3001 msgid "" "If you specify \"GENERIC\" (the default), only basic debsecan functionality " "is available. If you specify the suite matching your sources.list " "configuration, information about fixed and obsolete packages will be " "included in email reports." msgstr "" "Jeśli zostanie wpisane \"GENERIC\" (domyślnie), dostępne będą tylko " "podstawowe funkcje debsecan. W przypadku wpisania zestawu pasującego do " "bieżącej konfiguracji sources.list, w wiadomościach będą załączone " "informacje o naprawionych i przestarzałych pakietach." #. Type: string #. Description #: ../debsecan.templates:4001 msgid "URL of vulnerability information:" msgstr "URL informacji o zagrożeniach bezpieczeństwa:" #. Type: string #. Description #: ../debsecan.templates:4001 msgid "" "debsecan fetches vulnerability information from the network. If your system " "is not connected to the Internet, you can enter the URL of a local mirror " "here. If you leave this option empty, the built-in default URL is used." msgstr "" "Program debsecan może pobierać informacje o błędach bezpieczeństwa z sieci. " "Jeśli komputer nie jest podłączony do Internetu, można podać URL lokalnego " "serwera lustrzanego. W przypadku pozostawienia pola pustego, zostanie użyty " "wbudowany, domyślny URL." debsecan-0.4.18/debian/po/pt.po0000644000000000000000000000730112311570557013070 0ustar # Portuguese translation for debsecan's debconf messages # Copyright (C) 2006 Miguel Figueiredo # This file is distributed under the same license as the debsecan package. # Miguel Figueiredo , 2006 msgid "" msgstr "" "Project-Id-Version: debsecan 0.4.3\n" "Report-Msgid-Bugs-To: debsecan@packages.debian.org\n" "POT-Creation-Date: 2008-10-12 14:38+0200\n" "PO-Revision-Date: 2007-02-18 22:38+0000\n" "Last-Translator: Miguel Figueiredo \n" "Language-Team: Portuguese \n" "Language: pt\n" "MIME-Version: 1.0\n" "Content-Type: text/plain; charset=UTF-8\n" "Content-Transfer-Encoding: 8bit\n" #. Type: boolean #. Description #: ../debsecan.templates:1001 msgid "Do you want debsecan to send daily reports?" msgstr "Deseja que o debsecan envie relatórios diários?" #. Type: boolean #. Description #: ../debsecan.templates:1001 msgid "" "debsecan can check the security status of the host once per day, and notify " "you of any changes by email." msgstr "" "O debsecan pode verificar o estado de segurança da máquina uma vez por dia, " "e notifica-lo de quaisquer alterações por email." #. Type: boolean #. Description #: ../debsecan.templates:1001 msgid "" "If you choose this option, debsecan will download a small file once a day. " "Your package list will not be transmitted to the server." msgstr "" "Se escolher esta opção o debsecan irá fazer o download de um pequeno " "ficheiro uma vez por dia. A sua lista de pacotes não será transmitida ao " "servidor." #. Type: string #. Description #: ../debsecan.templates:2001 msgid "Email address to which daily reports should be sent:" msgstr "" "Endereço de email para o qual devem ser enviados os relatórios diários:" #. Type: select #. Description #: ../debsecan.templates:3001 msgid "Main suite from which packages are installed:" msgstr "Conjunto principal a partir do qual são instalados pacotes:" #. Type: select #. Description #: ../debsecan.templates:3001 msgid "" "To present more useful data, debsecan needs to know the Debian release from " "which you usually install packages." msgstr "" "Para apresentar dados mais úteis, o debsecan necessita saber a a partir de " "qual lançamento Debian normalmente você instala pacotes." #. Type: select #. Description #: ../debsecan.templates:3001 msgid "" "If you specify \"GENERIC\" (the default), only basic debsecan functionality " "is available. If you specify the suite matching your sources.list " "configuration, information about fixed and obsolete packages will be " "included in email reports." msgstr "" "Se especificar \"GENERIC\" (o valor por omissão), apenas fica disponível a " "funcionalidade básica do debsecan. Se especificar o conjunto que coincide " "com a sua configuração no sources.list, será incluída, nos relatórios por " "email, a informação acerca dos pacotes corrigidos e obsoletos." #. Type: string #. Description #: ../debsecan.templates:4001 msgid "URL of vulnerability information:" msgstr "URL da informação da vulnerabilidade:" #. Type: string #. Description #: ../debsecan.templates:4001 msgid "" "debsecan fetches vulnerability information from the network. If your system " "is not connected to the Internet, you can enter the URL of a local mirror " "here. If you leave this option empty, the built-in default URL is used." msgstr "" "O debsecan procura informação de vulnerabilidades a partir da rede. Se o seu " "sistema não estiver ligado à Internet, pode introduzir aqui o URL de um " "mirror local. Se deixar esta opção em branco, será utilizado o URL incluido " "por omissão." #~ msgid "From which suite do you want to install packges?" #~ msgstr "A partir de que conjunto deseja instalar pacotes?" debsecan-0.4.18/debian/po/pt_BR.po0000644000000000000000000000733012311570557013455 0ustar # debsecan Brazilian Portuguese translation # Copyright (c) 2006-2007 Florian Weimer # Copyright (c) 2006, Herbert Parentes Fortes Neto (hpfn) # Copyright (c) 2007, Eder L. Marques # This file is distributed under the same license as the debsecan package. # msgid "" msgstr "" "Project-Id-Version: debsecan_0.4.9\n" "Report-Msgid-Bugs-To: debsecan@packages.debian.org\n" "POT-Creation-Date: 2008-10-12 14:38+0200\n" "PO-Revision-Date: 2007-08-06 00:45-0300\n" "Last-Translator: Eder L. Marques \n" "Language-Team: l10n Portuguese \n" "Language: \n" "MIME-Version: 1.0\n" "Content-Type: text/plain; charset=UTF-8\n" "Content-Transfer-Encoding: 8bit\n" "pt_BR utf-8\n" "X-Generator: KBabel 1.11.4\n" #. Type: boolean #. Description #: ../debsecan.templates:1001 msgid "Do you want debsecan to send daily reports?" msgstr "Você quer que o debsecan envie relatórios diários?" #. Type: boolean #. Description #: ../debsecan.templates:1001 msgid "" "debsecan can check the security status of the host once per day, and notify " "you of any changes by email." msgstr "" "O debsecan pode checar o estado de segurança de uma máquina uma vez por dia, " "e notificá-lo sobre qualquer mudança por e-mail." #. Type: boolean #. Description #: ../debsecan.templates:1001 msgid "" "If you choose this option, debsecan will download a small file once a day. " "Your package list will not be transmitted to the server." msgstr "" "Se você escolher esta opção, o debsecan irá baixar um pequeno arquivo uma " "vez por dia. Sua lista de pacotes não será transmitida para o servidor." #. Type: string #. Description #: ../debsecan.templates:2001 msgid "Email address to which daily reports should be sent:" msgstr "Endereço de e-mail para o qual os relatórios devem ser enviados:" #. Type: select #. Description #: ../debsecan.templates:3001 msgid "Main suite from which packages are installed:" msgstr "Suite principal de onde os pacotes são instalados:" #. Type: select #. Description #: ../debsecan.templates:3001 msgid "" "To present more useful data, debsecan needs to know the Debian release from " "which you usually install packages." msgstr "" "Para apresentar dados mais úteis, o debsecan precisa saber a versão do " "Debian de onde você geralmente instala pacotes." #. Type: select #. Description #: ../debsecan.templates:3001 msgid "" "If you specify \"GENERIC\" (the default), only basic debsecan functionality " "is available. If you specify the suite matching your sources.list " "configuration, information about fixed and obsolete packages will be " "included in email reports." msgstr "" "Se você especificar \"GENERIC\" (o padrão), apenas as funcionalidades " "básicas do debsecan estarão disponíveis. Se você especificar a suite de " "acordo com a configuração do seu sources.list, informações sobre pacotes " "consertados ('fixed') e obsoletos ('obsolete') serão incluídas nos " "relatórios enviados por email." #. Type: string #. Description #: ../debsecan.templates:4001 msgid "URL of vulnerability information:" msgstr "URL das informações de vulnerabilidade:" #. Type: string #. Description #: ../debsecan.templates:4001 msgid "" "debsecan fetches vulnerability information from the network. If your system " "is not connected to the Internet, you can enter the URL of a local mirror " "here. If you leave this option empty, the built-in default URL is used." msgstr "" "O debsecan busca informações de vulnerabilidade através da rede. Se o seu " "sistema não está conectado à Internet, você deve informar a URL do espelho " "(\"mirror\") local aqui. Se você deixar esta opção em branco, a URL padrão " "interna será usada." debsecan-0.4.18/debian/po/ru.po0000644000000000000000000001047512311570557013101 0ustar # translation of debsecan_0.4.4_debconf_ru.po to Russian # Copyright (C) YEAR THE PACKAGE'S COPYRIGHT HOLDER # This file is distributed under the same license as the PACKAGE package. # # Yuri Kozlov , 2007. msgid "" msgstr "" "Project-Id-Version: 0.4.4\n" "Report-Msgid-Bugs-To: debsecan@packages.debian.org\n" "POT-Creation-Date: 2008-10-12 14:38+0200\n" "PO-Revision-Date: 2007-02-19 21:41+0300\n" "Last-Translator: Yuri Kozlov \n" "Language-Team: Russian \n" "Language: ru\n" "MIME-Version: 1.0\n" "Content-Type: text/plain; charset=UTF-8\n" "Content-Transfer-Encoding: 8bit\n" "X-Generator: KBabel 1.11.4\n" "Plural-Forms: nplurals=3; plural=(n%10==1 && n%100!=11 ? 0 : n%10>=2 && n" "%10<=4 && (n%100<10 || n%100>=20) ? 1 : 2);\n" #. Type: boolean #. Description #: ../debsecan.templates:1001 msgid "Do you want debsecan to send daily reports?" msgstr "Должен ли debsecan посылать ежедневные отчёты?" #. Type: boolean #. Description #: ../debsecan.templates:1001 msgid "" "debsecan can check the security status of the host once per day, and notify " "you of any changes by email." msgstr "" "debsecan может проверять отчёты безопасности один раз в день, и уведомлять о " "любых изменениях по почте." #. Type: boolean #. Description #: ../debsecan.templates:1001 msgid "" "If you choose this option, debsecan will download a small file once a day. " "Your package list will not be transmitted to the server." msgstr "" "Если вы ответите утвердительно, debsecan будет скачивать маленький файл один " "раз в день. Список ваших пакетов не будет передаваться на сервер." #. Type: string #. Description #: ../debsecan.templates:2001 msgid "Email address to which daily reports should be sent:" msgstr "Адрес электронной почты, на который нужно посылать ежедневный отчёт:" #. Type: select #. Description #: ../debsecan.templates:3001 msgid "Main suite from which packages are installed:" msgstr "Главный выпуск, из которого установлены пакеты:" #. Type: select #. Description #: ../debsecan.templates:3001 msgid "" "To present more useful data, debsecan needs to know the Debian release from " "which you usually install packages." msgstr "" "Для предоставления более полезных данных, для debsecan нужно указать выпуск " "Debian, из которого вы обычно устанавливаете пакеты." #. Type: select #. Description #: ../debsecan.templates:3001 msgid "" "If you specify \"GENERIC\" (the default), only basic debsecan functionality " "is available. If you specify the suite matching your sources.list " "configuration, information about fixed and obsolete packages will be " "included in email reports." msgstr "" "Если вы выберете \"GENERIC\" (по умолчанию), будет доступна только базовая " "функциональность debsecan. Если вы укажите выпуск, совпадающий с " "конфигурацией вашего sources.list, то в отчёт будет включена информация об " "исправленных и устаревших пакетах." #. Type: string #. Description #: ../debsecan.templates:4001 msgid "URL of vulnerability information:" msgstr "URL с информацией об уязвимостях:" #. Type: string #. Description #: ../debsecan.templates:4001 msgid "" "debsecan fetches vulnerability information from the network. If your system " "is not connected to the Internet, you can enter the URL of a local mirror " "here. If you leave this option empty, the built-in default URL is used." msgstr "" "debsecan получает информацию об уязвимостях из сети. Если ваша система не " "подключена к Интернет, вы можете ввести URL локального сервера-зеркала. Если " "вы оставите поле пустым, будет использован URL по умолчанию." debsecan-0.4.18/debian/po/sv.po0000644000000000000000000000702612311570557013101 0ustar # Swedish translation for debsecan. # Copyright (C) 2007 Free Software Foundation, Inc. # This file is distributed under the same license as the debsecan package. # Daniel Nylander , 2007. # msgid "" msgstr "" "Project-Id-Version: debsecan 0.4.2\n" "Report-Msgid-Bugs-To: debsecan@packages.debian.org\n" "POT-Creation-Date: 2008-10-12 14:38+0200\n" "PO-Revision-Date: 2007-02-22 22:13+0100\n" "Last-Translator: Daniel Nylander \n" "Language-Team: Swedish \n" "Language: sv\n" "MIME-Version: 1.0\n" "Content-Type: text/plain; charset=iso-8859-1\n" "Content-Transfer-Encoding: 8bit\n" #. Type: boolean #. Description #: ../debsecan.templates:1001 msgid "Do you want debsecan to send daily reports?" msgstr "Vill du att debsecan ska skicka dagliga rapporter?" #. Type: boolean #. Description #: ../debsecan.templates:1001 msgid "" "debsecan can check the security status of the host once per day, and notify " "you of any changes by email." msgstr "" "debsecan kan kontrollera skerhetsstatusen fr vrdmaskinen en gng per dag " "och notifiera dig om ndringar via e-post." #. Type: boolean #. Description #: ../debsecan.templates:1001 msgid "" "If you choose this option, debsecan will download a small file once a day. " "Your package list will not be transmitted to the server." msgstr "" "Om du vljer det hr alternativet kommer debsecan att dagligen hmta en " "liten fil. Din paketlista kommer inte att verfras till servern." #. Type: string #. Description #: ../debsecan.templates:2001 msgid "Email address to which daily reports should be sent:" msgstr "E-postadress till vilken dagliga rapporter ska skickas:" #. Type: select #. Description #: ../debsecan.templates:3001 msgid "Main suite from which packages are installed:" msgstr "Huvudsvit frn vilken paket installeras:" #. Type: select #. Description #: ../debsecan.templates:3001 msgid "" "To present more useful data, debsecan needs to know the Debian release from " "which you usually install packages." msgstr "" "Fr att presentera mer anvndbar data behver debsecan veta den Debian-" "utgva som du vanligtvis installerar paket frn." #. Type: select #. Description #: ../debsecan.templates:3001 msgid "" "If you specify \"GENERIC\" (the default), only basic debsecan functionality " "is available. If you specify the suite matching your sources.list " "configuration, information about fixed and obsolete packages will be " "included in email reports." msgstr "" "Om du anger \"GENERIC\" (standardvalet) kommer endast grundlggande " "funktionalitet finnas tillgnglig i debsecan. Om du anger sviten som " "matchar konfigurationsfilen sources.list kommer information om rttade och " "frldrade paket att inkluderas i e-postrapporterna." #. Type: string #. Description #: ../debsecan.templates:4001 msgid "URL of vulnerability information:" msgstr "URL fr srbarhetsinformation:" #. Type: string #. Description #: ../debsecan.templates:4001 msgid "" "debsecan fetches vulnerability information from the network. If your system " "is not connected to the Internet, you can enter the URL of a local mirror " "here. If you leave this option empty, the built-in default URL is used." msgstr "" "debsecan hmtar srbarhetsinformation frn ntverket. Om ditt system inte r " "anslutet till Internet kan du ange url:en till en lokal spegelserver hr. " "Om du lmnar det hr alternativet tomt kommer den inbyggda standard-url:en " "att anvndas." #, fuzzy #~ msgid "Suite to install packages from:" #~ msgstr "Frn vilken svit vill du installera paket?" debsecan-0.4.18/debian/po/tr.po0000644000000000000000000000664312311570557013102 0ustar # Turkish translation of debsecan debconf template. # Copyright (C) 2008 Mert Dirik # This file is distributed under the same license as the debsecan package. # Mert Dirik , 2008. # msgid "" msgstr "" "Project-Id-Version: debsecan 0.4.10+nmu1\n" "Report-Msgid-Bugs-To: debsecan@packages.debian.org\n" "POT-Creation-Date: 2008-10-12 14:38+0200\n" "PO-Revision-Date: 2008-09-28 19:22+0200\n" "Last-Translator: Mert Dirik \n" "Language-Team: Debian L10n Turkish \n" "Language: \n" "MIME-Version: 1.0\n" "Content-Type: text/plain; charset=UTF-8\n" "Content-Transfer-Encoding: 8bit\n" #. Type: boolean #. Description #: ../debsecan.templates:1001 msgid "Do you want debsecan to send daily reports?" msgstr "debsecan'ın günlük raporlar göndermesini ister misiniz?" #. Type: boolean #. Description #: ../debsecan.templates:1001 msgid "" "debsecan can check the security status of the host once per day, and notify " "you of any changes by email." msgstr "" "debsecan her gün makinenin güvenlik durumunu denetleyip değişiklikleri size " "e-posta ile bildirebilir." #. Type: boolean #. Description #: ../debsecan.templates:1001 msgid "" "If you choose this option, debsecan will download a small file once a day. " "Your package list will not be transmitted to the server." msgstr "" "Bu seçeneği tercih ederseniz debsecan her gün küçük bir dosya indirecek. " "Paket listeniz sunucuya aktarılmayacak." #. Type: string #. Description #: ../debsecan.templates:2001 msgid "Email address to which daily reports should be sent:" msgstr "Günlük raporların gönderileceği e-posta adresi:" #. Type: select #. Description #: ../debsecan.templates:3001 msgid "Main suite from which packages are installed:" msgstr "Paketlerin kurulu olduğu ana süit:" #. Type: select #. Description #: ../debsecan.templates:3001 msgid "" "To present more useful data, debsecan needs to know the Debian release from " "which you usually install packages." msgstr "" "Daha yararlı veriler sunabilmek için debsecan'ın, sisteminize paketlerini " "kurduğunuz Debian sürümünü bilmesi gereklidir." #. Type: select #. Description #: ../debsecan.templates:3001 msgid "" "If you specify \"GENERIC\" (the default), only basic debsecan functionality " "is available. If you specify the suite matching your sources.list " "configuration, information about fixed and obsolete packages will be " "included in email reports." msgstr "" "Eğer \"GENERIC\"i seçerseniz (öntanımlı), yalnızca temel debsecan " "işlevlerini kullanabilirsiniz. Eğer sources.list yapılandırmanıza en uygun " "süiti seçerseniz e-posta raporlarına açıkları giderilmiş paketler ve eski " "paketler hakkındaki bilgiler de eklenir." #. Type: string #. Description #: ../debsecan.templates:4001 msgid "URL of vulnerability information:" msgstr "Güvenlik açığı bilgilerinin URL'si:" #. Type: string #. Description #: ../debsecan.templates:4001 msgid "" "debsecan fetches vulnerability information from the network. If your system " "is not connected to the Internet, you can enter the URL of a local mirror " "here. If you leave this option empty, the built-in default URL is used." msgstr "" "debsecan güvenlik açıkları bilgisini ağdan edinir. Eğer sisteminiz " "Internet'e bağlı değilse, yerel yansının adresini buraya girebilirsiniz. Bu " "seçeneği boş bırakırsanız öntanımlı yerleşik URL kullanılır." debsecan-0.4.18/debian/po/es.po0000644000000000000000000001073112315633246013054 0ustar # debsecan translation to spanish # Copyright (C) 2007 Free Software Foundation, Inc. # This file is distributed under the same license as the package. # # Changes: # - Initial translation # Manuel Porras Peralta , 2007 # # # Traductores, si no conoce el formato PO, merece la pena leer la # documentación de gettext, especialmente las secciones dedicadas a este # formato, por ejemplo ejecutando: # info -n '(gettext)PO Files' # info -n '(gettext)Header Entry' # # Equipo de traducción al español, por favor lean antes de traducir # los siguientes documentos: # # - El proyecto de traducción de Debian al español # https://www.debian.org/intl/spanish/ # especialmente las notas y normas de traducción en # https://www.debian.org/intl/spanish/notas # # - La guía de traducción de po's de debconf: # /usr/share/doc/po-debconf/README-trans # o https://www.debian.org/intl/l10n/po-debconf/README-trans # # Si tiene dudas o consultas sobre esta traducción consulte con el último # traductor (campo Last-Translator) y ponga en copia a la lista de # traducción de Debian al español () msgid "" msgstr "" "Project-Id-Version: debsecan 0.4.4\n" "Report-Msgid-Bugs-To: debsecan@packages.debian.org\n" "POT-Creation-Date: 2008-10-12 14:38+0200\n" "PO-Revision-Date: 2007-02-25 13:29+0100\n" "Last-Translator: Manuel Porras Peralta «Venturi» \n" "Language-Team: Debian Spanish \n" "Language: \n" "MIME-Version: 1.0\n" "Content-Type: text/plain; charset=UTF-8\n" "Content-Transfer-Encoding: 8bit\n" #. Type: boolean #. Description #: ../debsecan.templates:1001 msgid "Do you want debsecan to send daily reports?" msgstr "¿Desea que debsecan envíe informes diarios?" #. Type: boolean #. Description #: ../debsecan.templates:1001 msgid "" "debsecan can check the security status of the host once per day, and notify " "you of any changes by email." msgstr "" "Debsecan puede comprobar el estado de la seguridad del servidor una vez al " "día, y notificarle cualquier cambio por correo electrónico." #. Type: boolean #. Description #: ../debsecan.templates:1001 msgid "" "If you choose this option, debsecan will download a small file once a day. " "Your package list will not be transmitted to the server." msgstr "" "Si elige esta opción, debsecan descargará un pequeño archivo una vez al día. " "Su lista de paquetes no se enviará al servidor." #. Type: string #. Description #: ../debsecan.templates:2001 msgid "Email address to which daily reports should be sent:" msgstr "Correo electrónico al que se enviarán los informes diarios:" #. Type: select #. Description #: ../debsecan.templates:3001 msgid "Main suite from which packages are installed:" msgstr "Distribución principal de la que se instalan los paquetes:" #. Type: select #. Description #: ../debsecan.templates:3001 msgid "" "To present more useful data, debsecan needs to know the Debian release from " "which you usually install packages." msgstr "" "Debsecan necesita saber la distribución de Debian de la que instala los " "paquetes normalmente, para mostrar datos más útiles." #. Type: select #. Description #: ../debsecan.templates:3001 msgid "" "If you specify \"GENERIC\" (the default), only basic debsecan functionality " "is available. If you specify the suite matching your sources.list " "configuration, information about fixed and obsolete packages will be " "included in email reports." msgstr "" "Si especifica «GENERIC» (predeterminado) sólo estarán disponibles las " "funciones básicas de debsecan. Si especifica una distribución que coincida " "con la configuración del «sources.list», se incluirá en los informes por " "correo electrónico información sobre los paquetes actualizados y obsoletos." #. Type: string #. Description #: ../debsecan.templates:4001 msgid "URL of vulnerability information:" msgstr "URL de información de vulnerabilidades:" #. Type: string #. Description #: ../debsecan.templates:4001 msgid "" "debsecan fetches vulnerability information from the network. If your system " "is not connected to the Internet, you can enter the URL of a local mirror " "here. If you leave this option empty, the built-in default URL is used." msgstr "" "Debsecan descarga información de vulnerabilidades desde la red. Si su " "sistema no está conectado a internet, puede introducir aquí la URL del sitio " "local equivalente. Si lo deja en blanco, se usará la URL que viene como " "predeterminada." debsecan-0.4.18/debian/.gitignore0000644000000000000000000000010311154311044013434 0ustar /*.debhelper /*.debhelper.log /debsecan.substvars /debsecan /files debsecan-0.4.18/debian/compat0000644000000000000000000000000211264675234012670 0ustar 5 debsecan-0.4.18/debian/copyright0000644000000000000000000000177010601557775013435 0ustar This package was debianized by Florian Weimer , who is also the upstream author. Copyright: debsecan - Debian Security Analyzer Copyright (C) 2005, 2006 Florian Weimer This program is free software; you can redistribute it and/or modify it under the terms of the GNU General Public License as published by the Free Software Foundation; either version 2 of the License, or (at your option) any later version. This program is distributed in the hope that it will be useful, but WITHOUT ANY WARRANTY; without even the implied warranty of MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the GNU General Public License for more details. You should have received a copy of the GNU General Public License along with this program; if not, write to the Free Software Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA A copy of the GNU General Public License, version 2, can be found in /usr/share/common-licenses/GPL or in the COPYING file included with the source. debsecan-0.4.18/debian/debsecan.dirs0000644000000000000000000000001310601557775014116 0ustar etc/cron.d debsecan-0.4.18/debian/debsecan.postinst0000644000000000000000000000302011344755351015034 0ustar #!/bin/bash set -e . /usr/share/debconf/confmodule case "$1" in configure) # If the directory is owned by root, change ownership. This # happens for fresh installations, and re-installations after # removal (and purge, of course). find /var/lib/debsecan -maxdepth 0 -user root | while read dir ; do chown daemon:daemon "$dir" done if ! test -e /etc/default/debsecan ; then cat > /etc/default/debsecan <. install -d debian/`dh_listpackages`/var/lib/debsecan install -D -m 0755 src/debsecan \ debian/`dh_listpackages`/usr/bin/debsecan install -D -m 0755 src/debsecan-create-cron \ debian/`dh_listpackages`/usr/sbin/debsecan-create-cron install -D -m 0755 doc/debsecan.1 \ debian/`dh_listpackages`/usr/share/man/man1/debsecan.1 install -D -m 0755 doc/debsecan-create-cron.8 \ debian/`dh_listpackages`/usr/share/man/man8/debsecan-create-cron.8 # Build architecture-independent files here. binary-indep: build install dh_testdir dh_testroot dh_installchangelogs dh_installdocs README dh_installexamples # dh_installmenu dh_installdebconf # dh_installlogrotate # dh_installemacsen # dh_installcatalogs # dh_installpam # dh_installmime # dh_installinit # dh_installcron # dh_installinfo # dh_undocumented dh_installman dh_link dh_compress dh_fixperms # dh_perl # dh_python dh_installdeb dh_gencontrol dh_md5sums dh_builddeb # Build architecture-dependent files here. binary-arch: build install # We have nothing to do by default. binary: binary-indep binary-arch .PHONY: build clean binary-indep binary-arch binary install debsecan-0.4.18/debian/changelog0000644000000000000000000002633412472425103013342 0ustar debsecan (0.4.18) unstable; urgency=low * Increase compatibility with Python 2.6 in squeeze. The ssl.wrap_socket function does not take a "ciphers" argument. * Add dependency on ca-certificates * Use https:// URLs everywhere. Closes: #749421 * Add Vcs-Git heheader. Closes: #761344 * Move primary repository to Gitorious. Closes: #778798 -- Florian Weimer Sun, 22 Feb 2015 20:09:52 +0100 debsecan (0.4.17) unstable; urgency=low * Apply patch from Stephen Kitt to support jessie. Closes: #709562 * Apply patch from Paul Wise to switch the default data source URL to security-tracker.debian.org. * Implement https:// checking. -- Florian Weimer Tue, 18 Mar 2014 10:18:37 +0100 debsecan (0.4.16+nmu1) unstable; urgency=low * Non-maintainer upload. * Fix pending l10n issues. Debconf translations: - Danish (Joe Hansen). Closes: #654514 - Polish (Michał Kułach). Closes: #664652 -- Christian Perrier Wed, 28 Mar 2012 07:38:20 +0200 debsecan (0.4.16) unstable; urgency=low * Apply patch from Paul Wise to support wheezy -- Florian Weimer Thu, 06 Oct 2011 15:03:37 +0200 debsecan (0.4.15) unstable; urgency=low * Actually support recent python-apt versions, with thanks to Michael Gilbert. Closes: #628541. -- Florian Weimer Thu, 02 Jun 2011 14:11:56 +0200 debsecan (0.4.14) unstable; urgency=low * Rework debconf handling. /etc/default/debsecan is no longer a conffile. Closes: #545362, #545363 * Remove obsolete configuration migration code * Update debconf parser for lenny, squeeze * Adjust test suite and README URLs * Try both version_compare and VersionCompare, for the python-apt 0.8 API migration. Closes: #572086 * Do not use full path to command in postinst * Update Standards-Version, adjust dependencies * Switch debhelper compatibility level to 5 -- Florian Weimer Sun, 07 Mar 2010 18:07:39 +0100 debsecan (0.4.13) unstable; urgency=low * Update URL from security-tracker.debian.net to security-tracker.debian.org -- Florian Weimer Mon, 12 Oct 2009 18:23:57 +0000 debsecan (0.4.12) unstable; urgency=low * Fix squeeze typo. Closes: #518276 * Add squeeze to the debconf templates. -- Florian Weimer Fri, 06 Mar 2009 22:16:18 +0100 debsecan (0.4.11) unstable; urgency=low * Acknowledge NMUs. Closes: #490719, #465293. * Add squeeze suite. Closes: #516729. * Guard against gethostbyname failure when determining the IP address. Closes: #500480. * Add Finnish debconf transaction by Esko Arajärvi. Closes: #502734. * Add Japanese debconf translation by Hideki Yamane. Closes: #512986. -- Florian Weimer Sat, 28 Feb 2009 19:24:04 +0100 debsecan (0.4.10+nmu2) unstable; urgency=low * Non-maintainer upload. * Fix pending l10n bugs. Debconf translations: - Turkish. Closes: #490719 -- Christian Perrier Sat, 18 Oct 2008 07:26:48 +0200 debsecan (0.4.10+nmu1) unstable; urgency=low * Non-maintainer upload with maintainer approval. * Update URLs to point to security-tracker.debian.net (closes: #465293). -- Thijs Kinkhorst Sat, 26 Apr 2008 21:22:46 +0200 debsecan (0.4.10) unstable; urgency=low * Support macros in MAILTO configuration variable Closes: #433728. * Make subject line configurable through /etc/default/debsecan. Closes: #437762. * Remove support for running without python-apt installed. This produces more useful error messages in case python-apt is installed, but unusable. Closes: #435795. * Document how to reduce the freqency of reports. Closes: #422997. * Add Brazilian Portuguese debconf templates translation, by Eder L. Marques . Closes: #437632. * Set MAILTO=root in generated cron file. This change is only effective on new installations. Suggested by Bastian Kleineidam. Closes: #435791. -- Florian Weimer Sun, 02 Sep 2007 17:27:52 +0200 debsecan (0.4.9) unstable; urgency=high * Add lenny suite to the debconf template as well. Closes: #418247. -- Florian Weimer Tue, 10 Apr 2007 07:16:24 +0200 debsecan (0.4.8) unstable; urgency=high * Dutch translation of debconf messages, by Bart Cornelis. Closes: #415509. * Add lenny suite. Closes: #418247. -- Florian Weimer Mon, 9 Apr 2007 11:46:19 +0200 debsecan (0.4.7) unstable; urgency=low * Norwegian Bokmal translation of debconf messages, by Hans Fredrik Nordhaug. Closes: #414357. * Spanish translation of debconf messages, by Manuel Porras Peralta. Closes: #411800. -- Florian Weimer Mon, 12 Mar 2007 19:17:22 +0100 debsecan (0.4.6) unstable; urgency=low * Migrate /var/lib/debsecan away from root permissions unconditionally. Closes: #344117 (again). -- Florian Weimer Fri, 2 Mar 2007 21:58:39 +0100 debsecan (0.4.5) unstable; urgency=low * debconf translation uppdates: - Basque, by Piarres Beobide. Closes: #411659. - Catalan, by Jordà Polo. Closes: 411992. - Czecj, by Miroslav Kure. Closes: #411556. - French, by Christian Perrier. Closes: #411616. - Galician, by Jacobo Tarrio. Closes: #411428. - German, by Matthias Julius. Closes: #411440. - Hebrew, by Lior Kaplan. Closes: #411572. - Italian, by Luca Monducci. Closes: #411478. - Portuguese, by Miguel Figueiredo. Closes: #411419. - Russian, by Yuri Kozlov. Closes: #411543. - Swedish, by Daniel Nylander. Closes: #411447. -- Florian Weimer Fri, 23 Feb 2007 08:35:10 +0100 debsecan (0.4.4) unstable; urgency=high * Add the configuration file /etc/default/debsecan. Closes: #410946. * Using the new configuration file, it is possible to control where daily reports are sent. Closes: #398199. * Try to make debconf questions easier to understand. Closes: #407186. -- Florian Weimer Sun, 18 Feb 2007 16:52:59 +0100 debsecan (0.4.3.5) unstable; urgency=low * Add /etc/cron.d directory to the package. Closes: #408237. -- Florian Weimer Thu, 25 Jan 2007 21:49:17 +0100 debsecan (0.4.3.4) unstable; urgency=low * Add Italian debconf translation, by Luca Monducci. Closes: #404418. * Fix the fr.po file and remove strange characters. -- Florian Weimer Sun, 24 Dec 2006 18:52:21 +0100 debsecan (0.4.3.3) unstable; urgency=low * German debconf translation, by Matthias Julius. Closes: #401497. * French debconf translation, by Steve . Closes: #403025. -- Florian Weimer Thu, 14 Dec 2006 14:06:11 +0100 debsecan (0.4.3.2) unstable; urgency=low * Portuguese translation, by Rui Branco. Closes: #400988. -- Florian Weimer Fri, 1 Dec 2006 09:08:56 +0100 debsecan (0.4.3.1) unstable; urgency=low * More fixes for debconf templates. Closes: #400811, #368376. -- Florian Weimer Wed, 29 Nov 2006 20:47:43 +0100 debsecan (0.4.3) unstable; urgency=low * Correct spelling error in manpage. Closes: #368376. * Promote python-apt to a full dependency. Package versions containing the ~ characters lack a clear specification, and reusing the existing implementation in APT is the best way to deal with this issue. Closes: #390596. * Document the http_proxy environment variable. Closes: #376773. * Add Czech translation of debconf messages, by Miroslav Kure . Closes: #369098. * Add Swedish translation of debconf message, by Daniel Nylander . Closes: #387520. -- Florian Weimer Mon, 2 Oct 2006 19:46:10 +0200 debsecan (0.4.2) unstable; urgency=low * Handle file open errors more gracefully. Closes: #352925. * Add --show-whitelist option. Closes: #352927. * Show an error message if a non-existing bug is removed from the whitelist. Closes: #352952. * Add "simple" format. Closes: #352929. * Upgraded to policy version 3.7.2.0, no changes required. * Add po-debconf support. Closes: #351380. -- Florian Weimer Sat, 20 May 2006 17:38:05 +0200 debsecan (0.4.1) unstable; urgency=low * urllib2 raises yet another exception when networking problems occur; handle it. Closes: #349760. -- Florian Weimer Wed, 25 Jan 2006 14:15:53 +0100 debsecan (0.4.0) unstable; urgency=low * In report mode, aggregate similar packages into lists. Suggested by Moritz Muehlenhoff. * Use python-apt if it is available, which allows us to deal with versions which do not conform to policy. Closes: #346179. * Add --line-length option. Closes: #346193. * In report mode, include an URL which has more information about the bug. Closes: #346191. * Add whitelisting support. Closes: #345920. -- Florian Weimer Tue, 17 Jan 2006 19:21:52 +0100 debsecan (0.3.4) unstable; urgency=low * Switch to urllib2, which handles HTTP errors in a better way. Closes: #345308. * Add --no-obsolete option. -- Florian Weimer Sun, 1 Jan 2006 13:50:24 +0100 debsecan (0.3.3) unstable; urgency=low * Fix syntax error in config script. Closes: #344976. * Be more tolerant about broken package descriptions in /var/lib/dpkg/status. Closes: #344996. -- Florian Weimer Wed, 28 Dec 2005 09:52:53 +0100 debsecan (0.3.2) unstable; urgency=low * Fix typo in obsolete packages message. Closes: #344778. * --format report and --only-fixed no longer conflict. * Add debconf configuration. -- Florian Weimer Tue, 27 Dec 2005 14:23:03 +0100 debsecan (0.3.1) unstable; urgency=low * Remove duplicate explanations regarding obsolete packages. -- Florian Weimer Sun, 25 Dec 2005 18:12:25 +0100 debsecan (0.3) unstable; urgency=low * Support package pinning. * The --suite option is no longer mandatory. * When the user selected a specific suite, flag packages which have been removed as obsolete. Closes: #344241. -- Florian Weimer Fri, 23 Dec 2005 15:35:46 +0100 debsecan (0.2.2) unstable; urgency=low * Add Recommends: for cron and mail-transport-agent. * Make debsecan-create-cron more robust to a --suite option. Closes: #344204. * Gracefully ignore packages with invalid version information. Closes: #344106. -- Florian Weimer Thu, 22 Dec 2005 10:27:54 +0100 debsecan (0.2.1) unstable; urgency=low * Fix permissions of /var/lib/debsecan. Closes: #344117. -- Florian Weimer Tue, 20 Dec 2005 11:17:28 +0100 debsecan (0.2) unstable; urgency=low * Remove duplicate output from --format report. * Fix handling of binary packages (important fix, old output was very incomplete). * Switch to secure-testing.debian.net as vulnerability data source. * Add debsecan-create-cron script. * Use daemon:daemon for history data. -- Florian Weimer Mon, 19 Dec 2005 19:26:06 +0100 debsecan (0.1) unstable; urgency=low * First version. -- Florian Weimer Wed, 14 Dec 2005 16:09:20 +0100 debsecan-0.4.18/debian/debsecan.config0000644000000000000000000000240312311572542014414 0ustar #!/bin/bash set -e . /usr/share/debconf/confmodule db_capb backup CONFFILE=/etc/default/debsecan CRONFILE=/etc/cron.d/debsecan normalize_suite () { case "$SUITE" in sarge|etch|lenny|squeeze|wheezy|jessie|sid) ;; *) SUITE=GENERIC ;; esac } read_existing_configuration () { if test -r "$CONFFILE" ; then . "$CONFFILE" || true normalize_suite if test ! -z "$REPORT" ; then db_set debsecan/report "$REPORT" fi if test -z "$MAILTO" ; then db_set debsecan/mailto root else db_set debsecan/mailto "$MAILTO" fi for var in SUITE SOURCE ; do db_set debsecan/$(echo $var | tr A-Z a-z) ${!var} done fi } read_existing_configuration maybe_input () { db_get debsecan/report if test "$RET" = true ; then db_input "$@" || true fi } STATE=1 while true; do case "$STATE" in 1) db_input medium debsecan/suite || true ;; 2) db_input low debsecan/report || true ;; 3) db_get debsecan/report maybe_input low debsecan/mailto || true ;; 4) db_get debsecan/report db_input low debsecan/source || true ;; *) break ;; esac if db_go; then STATE=$(($STATE + 1)) else STATE=$(($STATE - 1)) fi done if test $STATE -eq 1 ; then exit 10 fi debsecan-0.4.18/debian/debsecan.templates0000644000000000000000000000250012311572542015143 0ustar Template: debsecan/report Type: boolean Default: true _Description: Do you want debsecan to send daily reports? debsecan can check the security status of the host once per day, and notify you of any changes by email. . If you choose this option, debsecan will download a small file once a day. Your package list will not be transmitted to the server. Template: debsecan/mailto Type: string Default: root _Description: Email address to which daily reports should be sent: Template: debsecan/suite Type: select Choices: GENERIC, sarge, etch, lenny, squeeze, wheezy, jessie, sid Default: GENERIC _Description: Main suite from which packages are installed: To present more useful data, debsecan needs to know the Debian release from which you usually install packages. . If you specify "GENERIC" (the default), only basic debsecan functionality is available. If you specify the suite matching your sources.list configuration, information about fixed and obsolete packages will be included in email reports. Template: debsecan/source Type: string Default: _Description: URL of vulnerability information: debsecan fetches vulnerability information from the network. If your system is not connected to the Internet, you can enter the URL of a local mirror here. If you leave this option empty, the built-in default URL is used. debsecan-0.4.18/debian/NEWS.Debian0000644000000000000000000000061212312006141013325 0ustar debsecan (0.4.17) unstable; urgency=low * The default data source URL has been switched to . In addition, debsecan now performs proper server certificate checks for https:// URLs. This functionality can be switched off with the new --disable-https-check option. -- Florian Weimer Tue, 18 Mar 2014 10:03:51 +0100 debsecan-0.4.18/debian/control0000644000000000000000000000143712472424244013075 0ustar Source: debsecan Section: admin Priority: optional Maintainer: Florian Weimer Build-Depends: debhelper (>> 5) Build-Depends-Indep: po-debconf Standards-Version: 3.8.4 Vcs-Git: https://gitorious.org/debsecan/debsecan.git Package: debsecan Architecture: all Depends: debconf | debconf-2.0, python (>= 2.3), python-apt, ${misc:Depends}, ca-certificates Recommends: cron, exim4 | mail-transport-agent Description: Debian Security Analyzer debsecan is a tool to generate a list of vulnerabilities which affect a particular Debian installation. debsecan runs on the host which is to be checked, and downloads vulnerability information over the Internet. It can send mail to interested parties when new vulnerabilities are discovered or when security updates become available. debsecan-0.4.18/doc/0000755000000000000000000000000012312007362010777 5ustar debsecan-0.4.18/doc/debsecan-create-cron.80000644000000000000000000000275510601557775015066 0ustar .\" debsecan-create-cron - Debian Security Analyzer (cron entries) .\" Copyright (C) 2005, 2007 Florian Weimer .\" .\" This program is free software; you can redistribute it and/or modify .\" it under the terms of the GNU General Public License as published by .\" the Free Software Foundation; either version 2 of the License, or .\" (at your option) any later version. .\" .\" This program is distributed in the hope that it will be useful, .\" but WITHOUT ANY WARRANTY; without even the implied warranty of .\" MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the .\" GNU General Public License for more details. .\" .\" You should have received a copy of the GNU General Public License .\" along with this program; if not, write to the Free Software .\" Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA .\" .TH DEBSECAN 8 2005-12-19 "" "" .SH NAME debsecan-create-cron \- Create cron entry for the Debian Security Analyzer .SH SYNOPSIS .B debsecan-create-cron .br .B debsecan-create-cron --upgrade .SH DESCRIPTION .B debsecan-create-cron creates a cron entry for .BR debsecan , the Debian security analyzer. .P The cron entry runs hourly, but .B debsecan itself restricts actually processing to once a day. The minute the cron job runs is selected randomly, to reduce peak server load. .P .B debsecan-create-cron --upgrade is used internally to upgrade an older cron entry. .SH AUTHOR .B debsecan was written by Florian Weimer. .SH "SEE ALSO" .BR debsecan "(1)," .BR cron "(8)" debsecan-0.4.18/doc/debsecan.10000644000000000000000000002211312312007362012624 0ustar .\" debsecan - Debian Security Analyzer .\" Copyright (C) 2005, 2007 Florian Weimer .\" .\" This program is free software; you can redistribute it and/or modify .\" it under the terms of the GNU General Public License as published by .\" the Free Software Foundation; either version 2 of the License, or .\" (at your option) any later version. .\" .\" This program is distributed in the hope that it will be useful, .\" but WITHOUT ANY WARRANTY; without even the implied warranty of .\" MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the .\" GNU General Public License for more details. .\" .\" You should have received a copy of the GNU General Public License .\" along with this program; if not, write to the Free Software .\" Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA .\" .TH DEBSECAN 1 2005-12-23 "" "" .SH NAME debsecan \- Debian Security Analyzer .SH SYNOPSIS .B debsecan .I options... .SH DESCRIPTION .B debsecan analyzes the list of installed packages on the current host and reports vulnerabilities found on the system. .SH OPTIONS .TP .B --suite \fIcount\fP Choose a specific suite. .B debsecan produces more informative output (including obsolete packages) if the correct suite is specified. The release code name has to be used ("sid"), not the temporal name ("unstable"). .TP .B --whitelist \fIfile\fP Change the name of the whitelist file. .TP .BR --add-whitelist ", " --remove-whitelist ", " --show-whitelist Add or remove entries from the whitelist, or print the whitelist to standard output. See the .SM "CHANGING THE WHITELIST" section below. .TP .B --source \fIurl\fP Override the default download URL for vulnerability data. .TP .B --status \fIfile\fP Evaluate a different .B dpkg status file. .TP .B --format \fIformat\fP Change the output format. If .I format is .B summary (the default), a short summary for each vulnerability is printed. The .B simple format is like the .B summary format, except that only the bug packages names are printed. For .B bugs and .BR packages , .B debsecan lists the names of vulnerabilities and binary packages, respectively. .B --format detail requests a verbose output format, showing all available data. The .B report format is used for email reports. .TP .B --line-length \fIcharacters\fP Specifies the line length in report mode. The default is 72. .TP .B --mailto \fImailbox\fP The .B --mailto option instructions .B debsecan to the send the report to the email address .IR mailbox . No report is sent if there where no changes since the last invocation with .BR --update-history . This option requires the .B --format report output format. The option value may contain macros, see the section .SM CONFIGURATION FILE MACROS below. .TP .B --only-fixed Only list vulnerabilities for which a fix is available in the archive. Note that it can happen that a fix is listed, although the package has not been built for the system's architecture and is not yet available for download. (If you use this option, you also must specify the correct suite using .BR --suite .) .TP .B --no-obsolete Do not list any obsolete packages (see below). Using this option is not recommended because it hides real vulnerabilities on some systems, not just false positives. .TP .B --history \fIfile\fP Change the name of the history file used by .BR "--format report" . .TP .B --disable-https-check Turn off certificate validation for HTTPS. .TP .B --update-history Update the vulnerability status information after reporting it using .BR "--format report" . .TP .B --cron Internal option used for invocations from .BR cron . Checks if the vulnerability data has already been downloaded today. In this case, further processing is skipped. See .BR debsecan-create-cron (8) for instructions how to create a suitable cron entry. .TP .B --config \fIfile\fP Sets the location of the configuration file. .TP .B --help Display a short help message and exit. .TP .B --version Display version information and exit. .SH "CONFIGURATION FILE" The configuration file contains the following variables. It follows .IR name = value shell syntax. If .I value contains white space, it must be surrounded by double quotes. Some variables may contain macros; see the section .SM "CONFIGURATION FILE MACROS" below. .TP .B MAILTO Sets the email address to which reports are sent in .B --cron mode. May contain macros. .TP .B REPORT Controls whether .B debsecan does any processing whatsoever in .B --cron mode. (Permitted values: .B true and .BR false .) .TP .B SOURCE Controls the URL from which vulnerability information is fetched. If empty, the built-in default is used. .TP .B SUITE Sets the default value of the .B --suite option (see there). .TP .B SUBJECT Changes the subject line of reports. May contain macros. .TP .B DISABLE_HTTPS_CHECK Disables HTTPS certificate checking, just like the .B --disable-https-check command line option. .SH "CONFIGURATION FILE MACROS" Macro processing replaces strings of the form .BI %s( key )s with system-dependent values. Support keys are: .TP .B hostname The host name on which .B debsecan runs, without the domain name part. .TP .B fqdn The fully-qualified domain name of the host on which .B debsecan runs. .TP .B ip The IP address of the host on which .B debsecan runs. This may be inaccurate on multi-homed systems. .SH "CHANGING THE WHITELIST" You can use the .B --add-whitelist and .B --remove-whitelist options to change the whitelist. Whitelisted vulnerabilities are not included in the reports. For example, .IP .B debsecan --add-whitelist CVE-2005-4601 .PP ignores the vulnerability CVE-2005-4601 completely, while .IP .B debsecan --add-whitelist CVE-2005-4601 perlmagick .PP ignores it only as far as the perlmagick is concerned. (This is the same format that is produced by the .B --format simple option.) To remove all whitelist entries for the CVE-2005-4601 vulnerability, use: .IP .B debsecan --remove-whitelist CVE-2005-4601 .PP If you want to remove an entry for a specific vulnerability/package pair, list the package name explicitly, as in: .IP .B debsecan --remove-whitelist CVE-2005-4601 imagemagick .PP You can list multiple vulnerability and packages. For example, .IP .PD 0 .B debsecan --add-whitelist CVE-2005-4601 \e .IP "" 1in .B CVE-2006-0082 imagemagick perlmagick .PD .PP whitelists CVE-2005-4601 for all packages, and CVE-2006-0082 for the imagemagick and perlmagick packages only. .SH "CAVEATS" Much like the official Debian security advisories, .BR debsecan 's vulnerability tracking is mostly based on source packages. This can be confusing because tools like .B dpkg only display binary package names. Therefore, .B debsecan displays the more familiar binary package names. This has the unfortunate effect that all binary packages (including packages containing only documentation, for example) are flagged as vulnerable, and not only those packages which actually contain the vulnerable code. .P If the correct .B --suite option is specified, .B debsecan may mark some packages as .BR obsolete . This means that the binary package in question has been removed from the archive. In this case, you need to update all the packages depending on the obsolete package, and subsequently remove the obsolete package. .P For certain architectures, build daemons may lag considerably. In such case, .B debsecan may incorrectly mark a package as fixed, even if an update is not yet available in the Debian archive. .P Note that .B debsecan version uses the .B --suite option only to determine the availability of corrected packages and to detect obsolete packages. If you specify the wrong suite, only the information on available security updates and obsolete packages is wrong, but the list of vulnerabilities is correct. .P Mixing packages from different Debian releases is supported, as long as the packages still carry their official version numbers. Unknown package versions (from backported packages, for example) are compared to the version in Debian unstable only, which may lead to incorrect reports. .SH EXAMPLES This command prints all package names for which security fixes are available: .IP .B debsecan --suite .I suite .B --format packages --only-fixed .PP If you pass this output to .BR apt-get , you can download new packages which contain security fixes. For example, if you are running sid: .IP .PD 0 .B apt-get install \e .IP "" 1in .B $(debsecan --suite sid --format packages --only-fixed) .PD .PP The following command can be invoked periodically, to get notifications of new security issues: .IP .PD 0 .B debsecan --suite .I suite .B --format report \e .IP "" 1in .B --update-history --mailto root .PD .PP See .BR debsecan-create-cron (8) for a tool which creates a suitable cron entry. .SH ENVIRONMENT .TP .B http_proxy This environment variable instructs .B debsecan to use a proxy server to fetch the vulnerability data. It must be of the form .B http://proxy.example.net:8080/ (mimicking a URL). .SH FILES .TP .I /etc/default/debsecan Built-in location of the configuration file. .TP .I /var/lib/dpkg/status File from which the package information is fetched by default. .SH AUTHOR .B debsecan was written by Florian Weimer. .SH "SEE ALSO" .BR dpkg "(1)," .BR debsecan-create-cron "(8)," .BR apt-get "(8)" debsecan-0.4.18/src/0000755000000000000000000000000012315633246011032 5ustar debsecan-0.4.18/src/debsecan-create-cron0000644000000000000000000000167510662112021014714 0ustar #!/bin/bash set -e FILE=/etc/cron.d/debsecan usage () { echo "usage: $0 [--upgrade]" exit 1 } if test -e "$FILE" ; then if grep '^# AUTOMATICALLY GENERATED$' "$FILE" > /dev/null ; then may_overwrite=true else may_overwrite=false fi else may_overwrite=true fi case "$1" in --upgrade) if $may_overwrite ; then : else echo "warning: /etc/cron.d/debsecan already exists with unexpected content" echo "warning: You can regenerated it with /usr/sbin/debsecan-create-cron." exit 0 fi ;; -*) echo "error: illegal option '$1'" exit 1 ;; *) if test "$#" -ne 0 ; then echo "error: illegal positional argument" exit 1 fi ;; esac MIN=$(($RANDOM % 60)) cat > "$FILE" < "" self.__asString = version def __str__(self): return self.__asString def __repr__(self): return 'Version(%s)' % `self.__asString` def __cmp__(self, other): return version_compare(self.__asString, other.__asString) class PackageFile: """A Debian package file. Objects of this class can be used to read Debian's Source and Packages files.""" re_field = re.compile(r'^([A-Za-z][A-Za-z0-9-]+):(?:\s+(.*?))?\s*$') def __init__(self, name, fileObj=None): """Creates a new package file object. name - the name of the file the data comes from fileObj - an alternate data source; the default is to open the file with the indicated name. """ if fileObj is None: fileObj = safe_open(name) self.name = name self.file = fileObj self.lineno = 0 def __iter__(self): line = self.file.readline() self.lineno += 1 pkg = [] while line: if line == '\n': if len(pkg) == 0: self.raiseSyntaxError('expected package record') yield pkg pkg = [] line = self.file.readline() self.lineno += 1 continue match = self.re_field.match(line) if not match: self.raiseSyntaxError("expected package field, got " + `line`) (name, contents) = match.groups() contents = contents or '' while True: line = self.file.readline() self.lineno += 1 if line and line[0] in " \t": ncontents = line[1:] if ncontents: if ncontents[-1] == '\n': ncontents = ncontents[:-1] else: break contents = "%s\n%s" % (contents, ncontents) else: break pkg.append((name, contents)) if pkg: yield pkg def raiseSyntaxError(self, msg, lineno=None): if lineno is None: lineno = self.lineno raise ParseError(self.name, lineno, msg) # End of code from debian_support ###################################################################### # General support routines def safe_open(name, mode="r"): try: return file(name, mode) except IOError, e: sys.stdout.write("error: could not open %s: %s\n" % (`name`, e.strerror)) sys.exit(2) # Configuration file parser class ConfigParser: def __init__(self, name, file=None): self.name = name if file is None: if os.path.exists(name): self.file = safe_open(name) else: self.file = None else: self.file = file def onComment(self, line, number): pass def onKey(self, line, number, key, value, trailer): pass def onError(self, line, number): sys.stderr.write("%s:%d: invalid configuration file syntax\n" % (self.name, number)) sys.exit(2) def parse(self, re_comment=re.compile(r'^\s*(?:#.*)?$'), re_key=re.compile(r'^\s*([A-Z_]+)=(.*?)\s*$'), re_quote=re.compile(r'^"(.*)"\s*$')): if self.file is None: return lineno = 0 for line in self.file: lineno += 1 match = re_comment.match(line) if match is not None: self.onComment(line, lineno) continue match = re_key.match(line) if match is not None: (k, v) = match.groups() match = re_quote.match(v) if match is not None: # This is not perfect, but proper parsing is # probably not worth the effort. (v,) = match.groups() self.onKey(line, lineno, k, v, '\n') continue self.onError(line, lineno) def read_config(name, file=None): """Read the configuration file NAME into a dictionary and return it.""" config = {} class Parser(ConfigParser): def onKey(self, line, number, key, value, trailer): config[key] = value Parser(name, file).parse() return config def update_config(name): """Update the configuration file NAME with data from standard input.""" new_config = read_config('', sys.stdin) new_file = [] class Parser(ConfigParser): def onComment(self, line, lineno): new_file.append(line) def onKey(self, line, lineno, key, value, trailer): if new_config.has_key(key): if new_config[key] <> value: new_file.append("%s=%s%s" % (key, new_config[key], trailer)) else: new_file.append(line) del new_config[key] else: new_file.append(line) Parser(name).parse() remaining = new_config.keys() remaining.sort() if remaining: if remaining[-1] <> "\n": new_file.append("\n") for k in remaining: new_file.append("%s=%s\n" % (k, new_config[k])) conf = file(name, "w+") try: for line in new_file: conf.write(line) finally: conf.close() def patch_https_implementation(): "Add certificate and host name checking to the standard library." import ssl from inspect import getargspec from inspect import stack from httplib import HTTPConnection wrap_socket_orig = ssl.wrap_socket set_ciphers = "ciphers" in getargspec(wrap_socket_orig)[0] def wrap_socket(sock, *args, **kwargs): kwargs["ca_certs"] = "/etc/ssl/certs/ca-certificates.crt" kwargs["cert_reqs"] = ssl.CERT_REQUIRED if set_ciphers: kwargs["ciphers"] = "HIGH:!aNULL:!SRP:!PSK" kwargs["do_handshake_on_connect"] = True kwargs["suppress_ragged_eofs"] = False secsock = wrap_socket_orig(sock, *args, **kwargs) # Implement host name check for httplib cert = secsock.getpeercert() caller = stack()[1] caller_locals = caller[0].f_locals try: caller_self = caller_locals["self"] except KeyError: caller_self = None if caller_self is not None and isinstance(caller_self, HTTPConnection): expected_host = caller_self.host try: subject_dn = cert["subject"] except KeyError: raise IOError("invalid X.509 certificate for " + expected_host) found = False expected = (("commonName", expected_host),) for entry in subject_dn: if entry == expected: found = True if not found: raise IOError("X.509 certificate does not match host name " + expected_host) else: raise IOError("ssl.wrap_socket called from unexpected place") return secsock ssl.wrap_socket = wrap_socket # Command line parser def parse_cli(): """Reads sys.argv and returns an options object.""" parser = OptionParser(usage="%prog OPTIONS...") parser.add_option("--config", metavar="FILE", help="sets the name of the configuration file", default='/etc/default/debsecan') parser.add_option("--suite", type="choice", choices=['woody', 'sarge', 'etch', 'lenny', 'squeeze', 'wheezy', 'jessie', 'sid'], help="set the Debian suite of this installation") parser.add_option("--source", metavar="URL", help="sets the URL for the vulnerability information") parser.add_option("--status", metavar="NAME", default="/var/lib/dpkg/status", help="name of the dpkg status file") parser.add_option("--format", type="choice", choices=['bugs', 'packages', 'summary', 'detail', 'report', 'simple'], default="summary", help="change output format") parser.add_option("--only-fixed", action="store_true", dest="only_fixed", help="list only vulnerabilities for which a fix is available") parser.add_option("--no-obsolete", action="store_true", dest="no_obsolete", help="do not list obsolete packages (not recommend)") parser.add_option("--history", default="/var/lib/debsecan/history", metavar="NAME", help="sets the file name of debsecan's internal status " + "file") parser.add_option("--line-length", default=72, type="int", dest="line_length", help="maximum line length in report mode") parser.add_option("--update-history", action="store_true", dest="update_history", help="update the history file after reporting") parser.add_option("--mailto", help="send report to an email address") parser.add_option("--cron", action="store_true", help="debsecan is invoked from cron") parser.add_option("--whitelist", metavar="NAME", default="/var/lib/debsecan/whitelist", help="sets the name of the whitelist file") parser.add_option("--add-whitelist", action="store_true", dest="whitelist_add", help="add entries to the whitelist") parser.add_option("--remove-whitelist", action="store_true", dest="whitelist_remove", help="remove entries from the whitelist") parser.add_option("--show-whitelist", action="store_true", dest="whitelist_show", help="display entries on the whitelist") parser.add_option("--disable-https-check", action="store_true", dest="disable_https_check", help="disable certificate checks") parser.add_option("--update-config", action="store_true", dest="update_config", help=None) (options, args) = parser.parse_args() def process_whitelist_options(): """Check the whitelist options. They conflict with everything else.""" count = 0 for x in (options.whitelist_add, options.whitelist_remove, options.whitelist_show): if x: count += 1 if count == 0: return if count > 1: sys.stderr.write( "error: at most one whitelist option may be specified\n") sys.exit(1) for (k, v) in options.__dict__.items(): if type(v) == types.MethodType or v is None: continue if k not in ("whitelist", "whitelist_add", "whitelist_remove", # The following options have defaults and are # always present. "history", "status", "format", "line_length"): sys.stderr.write( "error: when editing the whitelist, no other options are allowed\n") sys.exit(1) if options.whitelist_add: whitelist_add(options, args) sys.exit(0) if options.whitelist_remove: whitelist_remove(options, args) sys.exit(0) if options.whitelist_show: whitelist_show(options, args) sys.exit(0) process_whitelist_options() if options.cron: options.format = 'report' options.update_history = True if options.only_fixed and not options.suite: sys.stderr.write("error: --only-fixed requires --suite\n") sys.exit(1) if options.no_obsolete and not options.suite: sys.stderr.write("error: --no-obsolete requires --suite\n") sys.exit(1) if options.update_history and options.format <> 'report': sys.stderr.write("error: --update-history requires report format\n") sys.exit(1) if options.cron and options.format <> 'report': sys.stderr.write("error: --cron requires report format\n") sys.exit(1) if options.mailto and options.format <> 'report': sys.stderr.write("error: --mailto requires report format\n") sys.exit(1) options.need_history = options.format == 'report' config = read_config(options.config) if options.cron and not options.mailto: options.mailto = config.get('MAILTO', '') if options.mailto == '': options.mailto = 'root' options.disable_https_check = options.disable_https_check or \ (config.get("DISABLE_HTTPS_CHECK", False) in ['yes', 'true', 'True', '1', 'on']) options.suite = options.suite or config.get('SUITE', None) if options.suite == 'GENERIC': options.suite = None options.subject = config.get( 'SUBJECT', 'Debian security status of %(hostname)s') if not options.disable_https_check: patch_https_implementation() return (options, config, args) # Vulnerabilities class Vulnerability: """Stores a vulnerability name/package name combination.""" urgency_conversion = {' ' : '', 'L' : 'low', 'M' : 'medium', 'H' : 'high'} def __init__(self, vuln_names, str): """Creates a new vulnerability object from a string.""" (package, vnum, flags, unstable_version, other_versions) \ = str.split(',', 4) vnum = int(vnum) self.bug = vuln_names[vnum][0] self.package = package self.binary_packages = None self.unstable_version = unstable_version self.other_versions = other_versions.split(' ') if self.other_versions == ['']: self.other_versions = [] self.description = vuln_names[vnum][1] self.binary_package = flags[0] == 'B' self.urgency = self.urgency_conversion[flags[1]] self.remote = {'?' : None, 'R' : True, ' ' : False}[flags[2]] self.fix_available = flags[3] == 'F' def is_vulnerable(self, (bin_pkg, bin_ver), (src_pkg, src_ver)): """Returns true if the specified binary package is subject to this vulnerability.""" self._parse() if self.binary_package and bin_pkg == self.package: if self.unstable_version: return bin_ver < self.unstable_version else: return True elif src_pkg == self.package: if self.unstable_version: return src_ver < self.unstable_version \ and src_ver not in self.other_versions else: return src_ver not in self.other_versions else: return False def obsolete(self, bin_name=None): if self.binary_packages is None: return if bin_name is None: bin_name = self.installed_package return bin_name not in self.binary_packages def installed(self, src_name, bin_name): """Returns a new vulnerability object for the installed package.""" v = copy.copy(self) v.installed_package = bin_name return v def _parse(self): """Further parses the object.""" if type(self.unstable_version) == types.StringType: if self.unstable_version: self.unstable_version = Version(self.unstable_version) else: self.unstable_version = None self.other_versions = map(Version, self.other_versions) def fetch_data(options, config): """Returns a dictionary PACKAGE -> LIST-OF-VULNERABILITIES.""" url = options.source or config.get("SOURCE", None) \ or "https://security-tracker.debian.org/tracker/" \ "debsecan/release/1/" if url[-1] <> "/": url += "/" if options.suite: url += options.suite else: url += 'GENERIC' r = urllib2.Request(url) r.add_header('User-Agent', 'debsecan/' + VERSION) try: u = urllib2.urlopen(r) # In cron mode, we suppress almost all errors because we # assume that they are due to lack of Internet connectivity. except urllib2.HTTPError, e: if (not options.cron) or e.code == 404: sys.stderr.write("error: while downloading %s:\n%s\n" % (url, e)) sys.exit(1) else: sys.exit(0) except urllib2.URLError, e: if not options.cron: # no e.code check here # Be conservative about the attributes offered by # URLError. They are undocumented, and strerror is not # available even though it is documented for # EnvironmentError. msg = e.__dict__.get('reason', '') if msg: msg = "error: while downloading %s:\nerror: %s\n" % (url, msg) else: msg = "error: while downloading %s:\n" % url sys.stderr.write(msg) sys.exit(1) else: sys.exit(0) data = [] while 1: d = u.read(4096) if d: data.append(d) else: break data = StringIO(zlib.decompress(''.join(data))) if data.readline() <> "VERSION 1\n": sys.stderr.write("error: server sends data in unknown format\n") sys.exit(1) vuln_names = [] for line in data: if line[-1:] == '\n': line = line[:-1] if line == '': break (name, flags, desc) = line.split(',', 2) vuln_names.append((name, desc)) packages = {} for line in data: if line[-1:] == '\n': line = line[:-1] if line == '': break v = Vulnerability(vuln_names, line) try: packages[v.package].append(v) except KeyError: packages[v.package] = [v] source_to_binary = {} for line in data: if line[-1:] == '\n': line = line[:-1] if line == '': break (sp, bps) = line.split(',') if bps: source_to_binary[sp] = bps.split(' ') else: source_to_binary[sp] = [] for vs in packages.values(): for v in vs: if not v.binary_package: v.binary_packages = source_to_binary.get(v.package, None) return packages # Previous state (for incremental reporting) class History: def __init__(self, options): self.options = options self.last_updated = 86400 self._read_history(self.options.history) def data(self): """Returns a dictionary (BUG, PACKAGE) -> UPDATE-AVAILABLE. The result is not shared with the internal dictionary.""" return self.history.copy() def expired(self): """Returns true if the stored history file is out of date.""" if self.options.cron: old = time.localtime(self.last_updated) now = time.localtime() def ymd(t): return (t.tm_year, t.tm_mon, t.tm_mday) if ymd(old) == ymd(now): return False return now.tm_hour >= 2 else: # If we aren't run from cron, we always download new data. return True def known(self, v): """Returns true if the vulnerability is known.""" return self.history.has_key(v) def fixed(self, v): """Returns true if the vulnerability is known and has been fixed.""" return self.history.get(v, False) def _read_history(self, name): """Reads the named history file. Returns a dictionary (BUG, PACKAGE) -> UPDATE-AVAILABLE.""" self.history = {} try: f = file(name) except IOError: return line = f.readline() if line == 'VERSION 0\n': pass elif line == 'VERSION 1\n': line = f.readline() self.last_updated = int(line) else: return for line in f: if line[-1:] == '\n': line = line[:-1] (bug, package, fixed) = line.split(',') self.history[(bug, package)] = fixed == 'F' f.close() # Whitelisting vulnerabilities class Whitelist: def __init__(self, name): """Read a whitelist from disk. name - file name of the white list. If None, no file is read. """ self.name = name self.bug_dict = {} self.bug_package_dict = {} if name and os.path.exists(name): src = safe_open(name) line = src.readline() if line <> 'VERSION 0\n': raise SyntaxError, "invalid whitelist file, got: " + `line` for line in src: if line[-1] == '\n': line = line[:-1] (bug, pkg) = line.split(',') self.add(bug, pkg) self._dirty = False def add(self, bug, pkg=None): """Adds a bug/package pair to the whitelist. If the package is not specified (or empty), the bug is whitelisted completely.""" if pkg: self.bug_package_dict[(bug, pkg)] = True else: self.bug_dict[bug] = True self._dirty = True def remove(self, bug, pkg=None): """Removes a bug/package pair from the whitelist. If the package is not specified, *all* whitelisted packages for that bug are removed.""" removed = False if pkg: try: del self.bug_package_dict[(bug, pkg)] removed = True except KeyError: pass else: try: del self.bug_dict[bug] removed = True except KeyError: pass for bug_pkg in self.bug_package_dict.keys(): if bug_pkg[0] == bug: del self.bug_package_dict[bug_pkg] removed = True if removed: self._dirty = True else: if pkg: sys.stderr.write( "error: no matching whitelist entry for %s %s\n" % (bug, pkg)) else: sys.stderr.write("error: no matching whitelist entry for %s\n" % bug) sys.exit(1) def check(self, bug, package): """Returns true if the bug/package pair is whitelisted.""" return self.bug_dict.has_key(bug) \ or self.bug_package_dict.has_key((bug, package)) def update(self): """Write the whitelist file back to disk, if the data has changed.""" if not (self._dirty and self.name): return new_name = self.name + '.new' f = safe_open(new_name, "w+") f.write("VERSION 0\n") l = self.bug_dict.keys() l.sort() for bug in l: f.write(bug + ",\n") l = self.bug_package_dict.keys() l.sort() for bug_pkg in l: f.write("%s,%s\n" % bug_pkg) f.close() os.rename(new_name, self.name) def show(self, file): l = [] for bug in self.bug_dict.keys(): file.write("%s (all packages)\n" % bug) for (bug, pkg) in self.bug_package_dict.keys(): l.append("%s %s\n" % (bug, pkg)) l.sort() for line in l: file.write(line) def __whitelist_edit(options, args, method): w = Whitelist(options.whitelist) while args: bug = args[0] if bug == '' or (not ('A' <= bug[0] <= 'Z')) or ',' in bug: sys.stderr.write("error: %s is not a bug name\n" % `bug`) sys.exit(1) del args[0] pkg_found = False while args: pkg = args[0] if (not pkg) or ',' in pkg: sys.stderr.write("error: %s is not a package name\n" % `bug`) sys.exit(1) if 'A' <= pkg[0] <= 'Z': break method(w, bug, pkg) del args[0] pkg_found = True if not pkg_found: method(w, bug, None) w.update() def whitelist_add(options, args): __whitelist_edit(options, args, lambda w, bug, pkg: w.add(bug, pkg)) def whitelist_remove(options, args): __whitelist_edit(options, args, lambda w, bug, pkg: w.remove(bug, pkg)) def whitelist_show(options, args): Whitelist(options.whitelist).show(sys.stdout) # Classes for output formatting class Formatter: def __init__(self, target, options, history): self.target = target self.options = options self.history = history self.whitelist = Whitelist(self.options.whitelist) self._invalid_versions = False def invalid_version(self, package, version): sys.stdout.flush() sys.stderr.write("error: invalid version %s of package %s\n" % (version, package)) if not self._invalid_versions: sys.stderr.write( "error: install the python-apt package for invalid versions support\n") self._invalid_versions = True sys.stderr.flush() def invalid_source_version(self, package, version): sys.stdout.flush() sys.stderr.write("error: invalid source version %s of package %s\n" % (version, package)) if not self._invalid_versions: sys.stderr.write( "error: install the python-apt package for invalid versions support\n") self._invalid_versions = True sys.stderr.flush() def maybe_record(self, v, bp, sp): """Invoke self.record, honouring --only-fixed. Can be overridden to implement a different form of --only-fixed processing.""" if self.whitelist.check(v.bug, bp[0]): return if not (self.options.only_fixed and not v.fix_available): if self.options.no_obsolete and v.obsolete(bp[0]): return self.record(v, bp, sp) def finish(self): pass class BugFormatter(Formatter): def __init__(self, target, options, history): Formatter.__init__(self, target, options, history) self.bugs = {} def record(self, v, bp, sp): self.bugs[v.bug] = 1 def finish(self): bugs = self.bugs.keys() bugs.sort() for b in bugs: self.target.write(b) class PackageFormatter(Formatter): def __init__(self, target, options, history): Formatter.__init__(self, target, options, history) self.packages = {} def record(self, v, (bin_name, bin_version), sp): self.packages[bin_name] = 1 def finish(self): packages = self.packages.keys() packages.sort() for p in packages: self.target.write(p) class SummaryFormatter(Formatter): def record(self, v, (bin_name, bin_version), (src_name, src_version)): notes = [] if v.fix_available: notes.append("fixed") if v.remote: notes.append("remotely exploitable") if v.urgency: notes.append(v.urgency + " urgency") if v.obsolete(bin_name): notes.append('obsolete') notes = ', '.join(notes) if notes: self.target.write("%s %s (%s)" % (v.bug, bin_name, notes)) else: self.target.write("%s %s" % (v.bug, bin_name)) class SimpleFormatter(Formatter): def record(self, v, (bin_name, bin_version), (src_name, src_version)): self.target.write("%s %s" % (v.bug, bin_name)) class DetailFormatter(Formatter): def record(self, v, (bin_name, bin_version), (src_name, src_version)): notes = [] if v.fix_available: notes.append("fixed") if v.remote: notes.append("remotely exploitable") if v.urgency: notes.append(v.urgency + " urgency") notes = ', '.join(notes) if notes: self.target.write("%s (%s)" % (v.bug, notes)) else: self.target.write(v.bug) self.target.write(" " + v.description) self.target.write(" installed: %s %s" % (bin_name, bin_version)) self.target.write(" (built from %s %s)" % (src_name, src_version)) if v.obsolete(bin_name): self.target.write(" package is obsolete") if v.binary_package: k = 'binary' else: k = 'source' if v.unstable_version: self.target.write(" fixed in unstable: %s %s (%s package)" % (v.package, v.unstable_version, k)) for vb in v.other_versions: self.target.write(" fixed on branch: %s %s (%s package)" % (v.package, vb, k)) if v.fix_available: self.target.write(" fix is available for the selected suite (%s)" % self.options.suite) self.target.write("") class ReportFormatter(Formatter): def __init__(self, target, options, history): Formatter.__init__(self, target, options, history) self.bugs = {} self.invalid = [] # self.record will put new package status information here. self.new_history = {} # Fixed bugs are deleted from self.fixed_bugs by self.record. self.fixed_bugs = self.history.data() # True if some bugs have been whitelisted. self._whitelisted = False def _write_history(self, name): """Writes self.new_history to the named history file. The file is replaced atomically.""" new_name = name + '.new' f = safe_open(new_name, "w+") f.write("VERSION 1\n%d\n" % int(time.time())) for ((bug, package), fixed) in self.new_history.items(): if fixed: fixed = 'F' else: fixed = ' ' f.write("%s,%s,%s\n" % (bug, package, fixed)) f.close() os.rename(new_name, name) def maybe_record(self, v, bp, sp): # --only-fixed processing happens in self.finish, and we need # all records to detect changes properly. Whitelisted bugs # need special treatment, too. self.record(v, bp, sp) def record(self, v, (bin_name, bin_version), (src_name, src_version)): v = v.installed(src_name, bin_name) bn = (v.bug, bin_name) if not self.whitelist.check(v.bug, bin_name): if self.bugs.has_key(v.bug): self.bugs[v.bug].append(v) else: self.bugs[v.bug] = [v] self.new_history[bn] = v.fix_available else: self._whitelisted = True # If we whitelist a bug, do not list it as fixed, so we always # remove it from the fixed_bugs dict. try: del self.fixed_bugs[bn] except KeyError: pass def invalid_version(self, package, version): self.invalid.append(package) def invalid_source_version(self, package, version): self.invalid.append(package) def _status_changed(self): """Returns true if the system's vulnerability status changed since the last run.""" for (k, v) in self.new_history.items(): if (not self.history.known(k)) or self.history.fixed(k) <> v: return True return len(self.fixed_bugs.keys()) > 0 def finish(self): if self.options.mailto and not self._status_changed(): if options.update_history: self._write_history(self.options.history) return w = self.target.write if self.options.suite: w("Security report based on the %s release" % self.options.suite) else: w("Security report based on general data") w("") w( """If you specify a proper suite, this report will include information regarding available security updates and obsolete packages. To set the correct suite, run "dpkg-reconfigure debsecan" as root.""") w("") for vlist in self.bugs.values(): vlist.sort(lambda a, b: cmp(a.package, b.package)) blist = self.bugs.items() blist.sort() self._bug_found = False def print_headline(fix_status, new_status): if fix_status: if new_status: w("*** New security updates") else: w("*** Available security updates") else: if new_status: w("*** New vulnerabilities") else: if self.options.suite: w("*** Vulnerabilities without updates") else: # If no suite has been specified, all # vulnerabilities lack updates, technically # speaking. w("*** Vulnerabilities") w("") def score_urgency(urgency): return {'high' : 100, 'medium' : 50, }.get(urgency, 0) def vuln_to_notes(v): notes = [] notes_score = 0 if v.remote: notes.append("remotely exploitable") notes_score += 25 if v.urgency: notes.append(v.urgency + " urgency") notes_score += score_urgency(v.urgency) if v.obsolete(): notes.append('obsolete') return (-notes_score, ', '.join(notes)) def truncate(line): if len(line) <= self.options.line_length: return line result = [] length = 0 max_length = self.options.line_length - 3 for c in line.split(' '): l = len(c) new_length = length + l + 1 if new_length < max_length: result.append(c) length = new_length else: return ' '.join(result) + '...' return ' '.join(result) # should not be reachedg def write_url(bug): w(" " % bug) def scan(fix_status, new_status): have_obsolete = False first_bug = True for (bug, vlist) in blist: pkg_vulns = {} for v in vlist: bug_package = (v.bug, v.installed_package) if v.fix_available: is_new = not self.history.fixed(bug_package) else: is_new = (not self.history.known(bug_package)) \ or self.history.fixed(bug_package) if v.fix_available <> fix_status or is_new <> new_status: continue if first_bug: print_headline(fix_status, new_status) first_bug = False if v.obsolete(): if self.options.no_obsolete: continue have_obsolete = True notes = vuln_to_notes(v) if pkg_vulns.has_key(notes): pkg_vulns[notes].append(v) else: pkg_vulns[notes] = [v] indent = " " if len(pkg_vulns) > 0: self._bug_found = True notes = pkg_vulns.keys() notes.sort() # any v will do, because we've aggregated by v.bug v = pkg_vulns[notes[0]][0] w(truncate("%s %s" % (v.bug, v.description))) write_url(v.bug) for note in notes: note_text = note[1] line = " - " comma_needed = False for v in pkg_vulns[note]: pkg = v.installed_package # Wrap the package list if the line length # is exceeded. if len(line) + len(pkg) + 3 \ > self.options.line_length: w(line + ',') line = indent + pkg comma_needed = True else: if comma_needed: line += ", " else: comma_needed = True line += pkg if note_text: if len(line) + len(note_text) + 3 \ > self.options.line_length: w(line) w("%s(%s)" % (indent, note_text)) else: w("%s (%s)" % (line, note_text)) else: w(line) w("") if have_obsolete: w( """Note that some packages were marked as obsolete. To deal with the vulnerabilities in them, you need to remove them. Before you can do this, you may have to upgrade other packages depending on them. """) def scan_fixed(): bugs = {} for (bug, package) in self.fixed_bugs.keys(): if bugs.has_key(bug): bugs[bug].append(package) else: bugs[bug] = [package] bug_names = bugs.keys() bug_names.sort() first_bug = True for bug in bug_names: if first_bug: w("*** Fixed vulnerabilities") w("") first_bug = False self._bug_found = True w(bug) write_url(bug) bugs[bug].sort() for p in bugs[bug]: w(" - %s" % p) w("") def scan_invalid(): if self.invalid: self._bug_found = True self.invalid.sort() w("*** Packages with invalid versions") w("") w("The following non-official packages have invalid versions and cannot") w("be classified correctly:") w("") for p in self.invalid: w(" - " + p) scan(fix_status=True, new_status=True) scan_fixed() scan(fix_status=True, new_status=False) if not self.options.only_fixed: scan(fix_status=False, new_status=True) scan(fix_status=False, new_status=False) scan_invalid() if not self._bug_found: if self.options.only_fixed: w( """No known vulnerabilities for which updates are available were found on the system.""") else: w("No known vulnerabilities were found on the system.") if self._whitelisted: w("") w("However, some bugs have been whitelisted.") else: if self._whitelisted: w( """Note that some vulnerablities have been whitelisted and are not included in this report.""") if options.update_history: self._write_history(self.options.history) formatters = {'bugs' : BugFormatter, 'packages' : PackageFormatter, 'summary' : SummaryFormatter, 'simple' : SimpleFormatter, 'detail' : DetailFormatter, 'report' : ReportFormatter} # Mini-template processing format_values = { 'hostname' : socket.gethostname(), 'fqdn' : socket.getfqdn() } try: format_values['ip'] = socket.gethostbyname(format_values['hostname']) except socket.gaierror: format_values['ip'] = "unknown" def format_string(msg): try: return msg % format_values except ValueError: sys.stderr.write("error: invalid format string: %s\n" % `msg`) sys.exit(2) except KeyError, e: sys.stderr.write("error: invalid key %s in format string %s\n" % (`e.args[0]`, `msg`)) sys.exit(2) # Targets class Target: def __init__(self, options): pass def finish(self): pass class TargetMail(Target): def __init__(self, options): assert options.mailto self.options = options self.sendmail = None self.opt_subject = format_string(self.options.subject) # Legacy addresses may contain "%" characters, without # proper template syntax. self.opt_mailto = format_string( re.sub(r'%([a-z0-9])', r'%%\1', self.options.mailto)) def _open(self): self.sendmail = os.popen("/usr/sbin/sendmail -t", "w") self.sendmail.write("""Subject: %s To: %s """ % (self.opt_subject, self.opt_mailto)) def write(self, line): if self.sendmail is None: self._open() self.sendmail.write(line + '\n') def finish(self): if self.sendmail is not None: self.sendmail.close() class TargetPrint(Target): def write(self, line): print line def rate_system(target, options, vulns, history): """Read /var/lib/dpkg/status and discover vulnerable packages. The results are printed using one of the formatter classes. options: command line options vulns: list of vulnerabiltiies""" packages = PackageFile(options.status) re_source = re.compile\ (r'^([a-zA-Z0-9.+-]+)(?:\s+\((\S+)\))?$') formatter = formatters[options.format](target, options, history) for pkg in packages: pkg_name = None pkg_status = None pkg_version = None pkg_arch = None pkg_source = None pkg_source_version = None for (name, contents) in pkg: if name == "Package": pkg_name = contents if name == "Status": pkg_status = contents elif name == "Version": pkg_version = contents elif name == "Source": match = re_source.match(contents) if match is None: raise SyntaxError(('package %s references ' + 'invalid source package %s') % (pkg_name, `contents`)) (pkg_source, pkg_source_version) = match.groups() if pkg_name is None: raise SyntaxError\ ("package record does not contain package name") if pkg_status is None: raise SyntaxError\ ("package record does not contain status") if 'installed' not in pkg_status.split(' '): # Package is not installed. continue if pkg_version is None: raise SyntaxError\ ("package record does not contain version information") if pkg_source_version is None: pkg_source_version = pkg_version if not pkg_source: pkg_source = pkg_name try: pkg_version = Version(pkg_version) except ValueError: formatter.invalid_version(pkg_name, pkg_version) continue try: pkg_source_version = Version(pkg_source_version) except ValueError: formatter.invalid_source_version(pkg_name, pkg_source_version) continue try: vlist = vulns[pkg_source] except KeyError: try: vlist = vulns[pkg_name] except: continue for v in vlist: bp = (pkg_name, pkg_version) sp = (pkg_source, pkg_source_version) if v.is_vulnerable (bp, sp): formatter.maybe_record(v, bp, sp) formatter.finish() target.finish() if __name__ == "__main__": (options, config, args) = parse_cli() if (options.update_config): update_config(options.config) sys.exit(0) if options.cron and config.get("REPORT", "true") <> "true": # Do nothing in cron mode if reporting is disabled. sys.exit(0) if options.need_history: history = History(options) if not history.expired(): sys.exit(0) else: history = None if options.mailto: target = TargetMail(options) else: target = TargetPrint(options) rate_system(target, options, fetch_data(options, config), history) debsecan-0.4.18/testsuite/0000755000000000000000000000000012472425124012272 5ustar debsecan-0.4.18/testsuite/001/0000755000000000000000000000000012315633552012574 5ustar debsecan-0.4.18/testsuite/001/exp.bugs0000644000000000000000000000025012315633545014251 0ustar CVE-2005-3184 CVE-2005-3241 CVE-2005-3242 CVE-2005-3243 CVE-2005-3244 CVE-2005-3245 CVE-2005-3246 CVE-2005-3247 CVE-2005-3248 CVE-2005-3249 CVE-2005-3313 CVE-2005-3651 debsecan-0.4.18/testsuite/001/exp.detail0000644000000000000000000002547312315633545014571 0ustar CVE-2005-3184 (fixed, remotely exploitable, medium urgency) Buffer overflow vulnerability in the unicode_to_bytes in the Service ... installed: ethereal 0.10.12-6 (built from ethereal 0.10.12-6) fixed in unstable: ethereal 0.10.13-1 (source package) fix is available for the selected suite (sid) CVE-2005-3241 (fixed, remotely exploitable, medium urgency) Multiple vulnerabilities in Ethereal 0.10.12 and earlier allow remote ... installed: ethereal 0.10.12-6 (built from ethereal 0.10.12-6) fixed in unstable: ethereal 0.10.13-1 (source package) fix is available for the selected suite (sid) CVE-2005-3242 (fixed, remotely exploitable, medium urgency) Ethereal 0.10.12 and earlier allows remote attackers to cause a denial ... installed: ethereal 0.10.12-6 (built from ethereal 0.10.12-6) fixed in unstable: ethereal 0.10.13-1 (source package) fix is available for the selected suite (sid) CVE-2005-3243 (fixed, remotely exploitable, medium urgency) Multiple buffer overflows in Ethereal 0.10.12 and earlier might allow ... installed: ethereal 0.10.12-6 (built from ethereal 0.10.12-6) fixed in unstable: ethereal 0.10.13-1 (source package) fix is available for the selected suite (sid) CVE-2005-3244 (fixed, remotely exploitable, medium urgency) The BER dissector in Ethereal 0.10.3 to 0.10.12 allows remote ... installed: ethereal 0.10.12-6 (built from ethereal 0.10.12-6) fixed in unstable: ethereal 0.10.13-1 (source package) fix is available for the selected suite (sid) CVE-2005-3245 (fixed, remotely exploitable, medium urgency) Unspecified vulnerability in the ONC RPC dissector in Ethereal 0.10.3 ... installed: ethereal 0.10.12-6 (built from ethereal 0.10.12-6) fixed in unstable: ethereal 0.10.13-1 (source package) fix is available for the selected suite (sid) CVE-2005-3246 (fixed, remotely exploitable, medium urgency) Ethereal 0.10.12 and earlier allows remote attackers to cause a denial ... installed: ethereal 0.10.12-6 (built from ethereal 0.10.12-6) fixed in unstable: ethereal 0.10.13-1 (source package) fix is available for the selected suite (sid) CVE-2005-3247 (fixed, remotely exploitable, medium urgency) The SigComp UDVM in Ethereal 0.10.12 allows remote attackers to cause ... installed: ethereal 0.10.12-6 (built from ethereal 0.10.12-6) fixed in unstable: ethereal 0.10.13-1 (source package) fix is available for the selected suite (sid) CVE-2005-3248 (fixed, remotely exploitable, medium urgency) Unspecified vulnerability in the X11 dissector in Ethereal 0.10.12 and ... installed: ethereal 0.10.12-6 (built from ethereal 0.10.12-6) fixed in unstable: ethereal 0.10.13-1 (source package) fix is available for the selected suite (sid) CVE-2005-3249 (fixed, remotely exploitable, medium urgency) Unspecified vulnerability in the WSP dissector in Ethereal 0.10.1 to ... installed: ethereal 0.10.12-6 (built from ethereal 0.10.12-6) fixed in unstable: ethereal 0.10.13-1 (source package) fix is available for the selected suite (sid) CVE-2005-3313 (remotely exploitable, medium urgency) The IRC protocol dissector in Ethereal 0.10.13 allows remote attackers ... installed: ethereal 0.10.12-6 (built from ethereal 0.10.12-6) CVE-2005-3651 (remotely exploitable, medium urgency) Stack-based buffer overflow in the dissect_ospf_v3_address_prefix ... installed: ethereal 0.10.12-6 (built from ethereal 0.10.12-6) fixed on branch: ethereal 0.10.10-2sarge4 (source package) CVE-2005-3184 (fixed, remotely exploitable, medium urgency) Buffer overflow vulnerability in the unicode_to_bytes in the Service ... installed: ethereal-common 0.10.12-6 (built from ethereal 0.10.12-6) fixed in unstable: ethereal 0.10.13-1 (source package) fix is available for the selected suite (sid) CVE-2005-3241 (fixed, remotely exploitable, medium urgency) Multiple vulnerabilities in Ethereal 0.10.12 and earlier allow remote ... installed: ethereal-common 0.10.12-6 (built from ethereal 0.10.12-6) fixed in unstable: ethereal 0.10.13-1 (source package) fix is available for the selected suite (sid) CVE-2005-3242 (fixed, remotely exploitable, medium urgency) Ethereal 0.10.12 and earlier allows remote attackers to cause a denial ... installed: ethereal-common 0.10.12-6 (built from ethereal 0.10.12-6) fixed in unstable: ethereal 0.10.13-1 (source package) fix is available for the selected suite (sid) CVE-2005-3243 (fixed, remotely exploitable, medium urgency) Multiple buffer overflows in Ethereal 0.10.12 and earlier might allow ... installed: ethereal-common 0.10.12-6 (built from ethereal 0.10.12-6) fixed in unstable: ethereal 0.10.13-1 (source package) fix is available for the selected suite (sid) CVE-2005-3244 (fixed, remotely exploitable, medium urgency) The BER dissector in Ethereal 0.10.3 to 0.10.12 allows remote ... installed: ethereal-common 0.10.12-6 (built from ethereal 0.10.12-6) fixed in unstable: ethereal 0.10.13-1 (source package) fix is available for the selected suite (sid) CVE-2005-3245 (fixed, remotely exploitable, medium urgency) Unspecified vulnerability in the ONC RPC dissector in Ethereal 0.10.3 ... installed: ethereal-common 0.10.12-6 (built from ethereal 0.10.12-6) fixed in unstable: ethereal 0.10.13-1 (source package) fix is available for the selected suite (sid) CVE-2005-3246 (fixed, remotely exploitable, medium urgency) Ethereal 0.10.12 and earlier allows remote attackers to cause a denial ... installed: ethereal-common 0.10.12-6 (built from ethereal 0.10.12-6) fixed in unstable: ethereal 0.10.13-1 (source package) fix is available for the selected suite (sid) CVE-2005-3247 (fixed, remotely exploitable, medium urgency) The SigComp UDVM in Ethereal 0.10.12 allows remote attackers to cause ... installed: ethereal-common 0.10.12-6 (built from ethereal 0.10.12-6) fixed in unstable: ethereal 0.10.13-1 (source package) fix is available for the selected suite (sid) CVE-2005-3248 (fixed, remotely exploitable, medium urgency) Unspecified vulnerability in the X11 dissector in Ethereal 0.10.12 and ... installed: ethereal-common 0.10.12-6 (built from ethereal 0.10.12-6) fixed in unstable: ethereal 0.10.13-1 (source package) fix is available for the selected suite (sid) CVE-2005-3249 (fixed, remotely exploitable, medium urgency) Unspecified vulnerability in the WSP dissector in Ethereal 0.10.1 to ... installed: ethereal-common 0.10.12-6 (built from ethereal 0.10.12-6) fixed in unstable: ethereal 0.10.13-1 (source package) fix is available for the selected suite (sid) CVE-2005-3313 (remotely exploitable, medium urgency) The IRC protocol dissector in Ethereal 0.10.13 allows remote attackers ... installed: ethereal-common 0.10.12-6 (built from ethereal 0.10.12-6) CVE-2005-3651 (remotely exploitable, medium urgency) Stack-based buffer overflow in the dissect_ospf_v3_address_prefix ... installed: ethereal-common 0.10.12-6 (built from ethereal 0.10.12-6) fixed on branch: ethereal 0.10.10-2sarge4 (source package) CVE-2005-3184 (fixed, remotely exploitable, medium urgency) Buffer overflow vulnerability in the unicode_to_bytes in the Service ... installed: tethereal 0.10.12-6 (built from ethereal 0.10.12-6) fixed in unstable: ethereal 0.10.13-1 (source package) fix is available for the selected suite (sid) CVE-2005-3241 (fixed, remotely exploitable, medium urgency) Multiple vulnerabilities in Ethereal 0.10.12 and earlier allow remote ... installed: tethereal 0.10.12-6 (built from ethereal 0.10.12-6) fixed in unstable: ethereal 0.10.13-1 (source package) fix is available for the selected suite (sid) CVE-2005-3242 (fixed, remotely exploitable, medium urgency) Ethereal 0.10.12 and earlier allows remote attackers to cause a denial ... installed: tethereal 0.10.12-6 (built from ethereal 0.10.12-6) fixed in unstable: ethereal 0.10.13-1 (source package) fix is available for the selected suite (sid) CVE-2005-3243 (fixed, remotely exploitable, medium urgency) Multiple buffer overflows in Ethereal 0.10.12 and earlier might allow ... installed: tethereal 0.10.12-6 (built from ethereal 0.10.12-6) fixed in unstable: ethereal 0.10.13-1 (source package) fix is available for the selected suite (sid) CVE-2005-3244 (fixed, remotely exploitable, medium urgency) The BER dissector in Ethereal 0.10.3 to 0.10.12 allows remote ... installed: tethereal 0.10.12-6 (built from ethereal 0.10.12-6) fixed in unstable: ethereal 0.10.13-1 (source package) fix is available for the selected suite (sid) CVE-2005-3245 (fixed, remotely exploitable, medium urgency) Unspecified vulnerability in the ONC RPC dissector in Ethereal 0.10.3 ... installed: tethereal 0.10.12-6 (built from ethereal 0.10.12-6) fixed in unstable: ethereal 0.10.13-1 (source package) fix is available for the selected suite (sid) CVE-2005-3246 (fixed, remotely exploitable, medium urgency) Ethereal 0.10.12 and earlier allows remote attackers to cause a denial ... installed: tethereal 0.10.12-6 (built from ethereal 0.10.12-6) fixed in unstable: ethereal 0.10.13-1 (source package) fix is available for the selected suite (sid) CVE-2005-3247 (fixed, remotely exploitable, medium urgency) The SigComp UDVM in Ethereal 0.10.12 allows remote attackers to cause ... installed: tethereal 0.10.12-6 (built from ethereal 0.10.12-6) fixed in unstable: ethereal 0.10.13-1 (source package) fix is available for the selected suite (sid) CVE-2005-3248 (fixed, remotely exploitable, medium urgency) Unspecified vulnerability in the X11 dissector in Ethereal 0.10.12 and ... installed: tethereal 0.10.12-6 (built from ethereal 0.10.12-6) fixed in unstable: ethereal 0.10.13-1 (source package) fix is available for the selected suite (sid) CVE-2005-3249 (fixed, remotely exploitable, medium urgency) Unspecified vulnerability in the WSP dissector in Ethereal 0.10.1 to ... installed: tethereal 0.10.12-6 (built from ethereal 0.10.12-6) fixed in unstable: ethereal 0.10.13-1 (source package) fix is available for the selected suite (sid) CVE-2005-3313 (remotely exploitable, medium urgency) The IRC protocol dissector in Ethereal 0.10.13 allows remote attackers ... installed: tethereal 0.10.12-6 (built from ethereal 0.10.12-6) CVE-2005-3651 (remotely exploitable, medium urgency) Stack-based buffer overflow in the dissect_ospf_v3_address_prefix ... installed: tethereal 0.10.12-6 (built from ethereal 0.10.12-6) fixed on branch: ethereal 0.10.10-2sarge4 (source package) debsecan-0.4.18/testsuite/001/exp.packages0000644000000000000000000000004312315633545015067 0ustar ethereal ethereal-common tethereal debsecan-0.4.18/testsuite/001/exp.summary0000644000000000000000000000475212315633545015021 0ustar CVE-2005-3184 ethereal (fixed, remotely exploitable, medium urgency) CVE-2005-3184 ethereal-common (fixed, remotely exploitable, medium urgency) CVE-2005-3184 tethereal (fixed, remotely exploitable, medium urgency) CVE-2005-3241 ethereal (fixed, remotely exploitable, medium urgency) CVE-2005-3241 ethereal-common (fixed, remotely exploitable, medium urgency) CVE-2005-3241 tethereal (fixed, remotely exploitable, medium urgency) CVE-2005-3242 ethereal (fixed, remotely exploitable, medium urgency) CVE-2005-3242 ethereal-common (fixed, remotely exploitable, medium urgency) CVE-2005-3242 tethereal (fixed, remotely exploitable, medium urgency) CVE-2005-3243 ethereal (fixed, remotely exploitable, medium urgency) CVE-2005-3243 ethereal-common (fixed, remotely exploitable, medium urgency) CVE-2005-3243 tethereal (fixed, remotely exploitable, medium urgency) CVE-2005-3244 ethereal (fixed, remotely exploitable, medium urgency) CVE-2005-3244 ethereal-common (fixed, remotely exploitable, medium urgency) CVE-2005-3244 tethereal (fixed, remotely exploitable, medium urgency) CVE-2005-3245 ethereal (fixed, remotely exploitable, medium urgency) CVE-2005-3245 ethereal-common (fixed, remotely exploitable, medium urgency) CVE-2005-3245 tethereal (fixed, remotely exploitable, medium urgency) CVE-2005-3246 ethereal (fixed, remotely exploitable, medium urgency) CVE-2005-3246 ethereal-common (fixed, remotely exploitable, medium urgency) CVE-2005-3246 tethereal (fixed, remotely exploitable, medium urgency) CVE-2005-3247 ethereal (fixed, remotely exploitable, medium urgency) CVE-2005-3247 ethereal-common (fixed, remotely exploitable, medium urgency) CVE-2005-3247 tethereal (fixed, remotely exploitable, medium urgency) CVE-2005-3248 ethereal (fixed, remotely exploitable, medium urgency) CVE-2005-3248 ethereal-common (fixed, remotely exploitable, medium urgency) CVE-2005-3248 tethereal (fixed, remotely exploitable, medium urgency) CVE-2005-3249 ethereal (fixed, remotely exploitable, medium urgency) CVE-2005-3249 ethereal-common (fixed, remotely exploitable, medium urgency) CVE-2005-3249 tethereal (fixed, remotely exploitable, medium urgency) CVE-2005-3313 ethereal (remotely exploitable, medium urgency) CVE-2005-3313 ethereal-common (remotely exploitable, medium urgency) CVE-2005-3313 tethereal (remotely exploitable, medium urgency) CVE-2005-3651 ethereal (remotely exploitable, medium urgency) CVE-2005-3651 ethereal-common (remotely exploitable, medium urgency) CVE-2005-3651 tethereal (remotely exploitable, medium urgency) debsecan-0.4.18/testsuite/001/history0000644000000000000000000000026011004700541014201 0ustar VERSION 0 CVE-2005-3651,ethereal, CVE-2005-3313,ethereal, CVE-2005-3651,tethereal, CVE-2005-3313,tethereal, CVE-2005-3651,ethereal-common, CVE-2005-3313,ethereal-common, debsecan-0.4.18/testsuite/001/sid0000644000000000000000000000356011004700541013265 0ustar x͙[s8)֒|}I ƀ M_ن Hr(CGnGʧm4&4!D=C0.6AH*{*@AyOr9 qJhxE+n /Ӻ1F]#j9dW:Єh;F0%tJf쬖qCc؅- õn㲛T} y}+iğB<6-nh}nYk7a83t\K|DWzLF@~LR4dXo#GTWM>6cB}ݎ; n!De +]&nBv%RɕTT N`Ӽc7S0R;cPS]|K[ ٫tS*VP{`!Hz lCɓl╏-C8y)|c]S.֗Tqp%qpw{Uxn))nx6O?;koؚǗsU'o v4]pENiHm:ɚl%?ij|v|B,Plq7́Xl U43p>koMmht_Q/C /o򷬊JOWhkIQH6iIX-y&խLXaFí`47`-0=/ forxY ANE*f.7v\;+y ln)lnUsA@Q;ߑIKƗ3aGTۗ"$Q 5z\7-I# t$TAn4bSFg"zRȵ:7-/kTxvPn! aЭ vl܏]fG^M_(YA~j:"Rtqۇdy_n`4#lBJpo9V,Y$d~xn^bEݾ$ O1}P :BuwR$dӼv AZgJ]^d)ٱ颋*fVG<E򭆾yy4ܾ3?RS͟7CN /bhqElp%+y\߫{^%3{C'{uB2 W_ItJQ* D!>aS5 TBOZӣtU`pWVgrMH="h̀e1'ȑ\L!r̸8 &$7aɒlt\7a 94y拶Z,S†x +l`+|IFߕ5\-u5lS[jk m hkhcjkcjӘ^he%ytK(dlh*>utKttGǵtٖ|x /6aRlQm? e+v?Go= Architecture: i386 Version: 0.10.12-6 Depends: libadns1, libatk1.0-0 (>= 1.9.0), libc6 (>= 2.3.5-1), libcap1, libcomerr2 (>= 1.33-3), libglib2.0-0 (>= 2.8.0), libgtk2.0-0 (>= 2.6.0), libkrb53 (>= 1.3.2), libpango1.0-0 (>= 1.8.2), libpcap0.8 (>= 0.9.3-1), libpcre3 (>= 4.5), zlib1g (>= 1:1.2.1), ethereal-common (= 0.10.12-6) Recommends: gksu Description: network traffic analyzer Ethereal is a network traffic analyzer, or "sniffer", for Unix and Unix-like operating systems. A sniffer is a tool used to capture packets off the wire. Ethereal decodes numerous protocols (too many to list). . This package provides ethereal (the GTK+ version) Package: ethereal-common Status: install ok installed Priority: optional Section: net Installed-Size: 20320 Maintainer: Frederic Peters Architecture: i386 Source: ethereal Version: 0.10.12-6 Depends: libc6 (>= 2.3.5-1), libcap1, libglib2.0-0 (>= 2.8.0), libpcre3 (>= 4.5), zlib1g (>= 1:1.2.1) Recommends: ethereal (>= 0.9.1-3) | tethereal (>= 0.9.1-3) Conflicts: ethereal (<< 0.9.1-3), tethereal (<< 0.9.1-3) Description: network traffic analyser (common files) Ethereal is a network traffic analyzer, or "sniffer", for Unix and Unix-like operating systems. A sniffer is a tool used to capture packets off the wire. Ethereal decodes numerous protocols (too many to list). . This package provides files common to both ethereal (the GTK+ version) and tethereal (the console version). Package: tethereal Status: install ok installed Priority: optional Section: net Installed-Size: 240 Maintainer: Frederic Peters Architecture: i386 Source: ethereal Version: 0.10.12-6 Depends: libadns1, libc6 (>= 2.3.5-1), libcap1, libcomerr2 (>= 1.33-3), libglib2.0-0 (>= 2.8.0), libkrb53 (>= 1.3.2), libpcap0.8 (>= 0.9.3-1), libpcre3 (>= 4.5), zlib1g (>= 1:1.2.1), ethereal-common (= 0.10.12-6) Description: network traffic analyzer (console) Ethereal is a network traffic analyzer, or "sniffer", for Unix and Unix-like operating systems. A sniffer is a tool used to capture packets off the wire. Ethereal decodes numerous protocols (too many to list). . This package provides the console version of ethereal, named "tethereal". debsecan-0.4.18/testsuite/001/out.summary0000644000000000000000000000475212315633552015032 0ustar CVE-2005-3184 ethereal (fixed, remotely exploitable, medium urgency) CVE-2005-3184 ethereal-common (fixed, remotely exploitable, medium urgency) CVE-2005-3184 tethereal (fixed, remotely exploitable, medium urgency) CVE-2005-3241 ethereal (fixed, remotely exploitable, medium urgency) CVE-2005-3241 ethereal-common (fixed, remotely exploitable, medium urgency) CVE-2005-3241 tethereal (fixed, remotely exploitable, medium urgency) CVE-2005-3242 ethereal (fixed, remotely exploitable, medium urgency) CVE-2005-3242 ethereal-common (fixed, remotely exploitable, medium urgency) CVE-2005-3242 tethereal (fixed, remotely exploitable, medium urgency) CVE-2005-3243 ethereal (fixed, remotely exploitable, medium urgency) CVE-2005-3243 ethereal-common (fixed, remotely exploitable, medium urgency) CVE-2005-3243 tethereal (fixed, remotely exploitable, medium urgency) CVE-2005-3244 ethereal (fixed, remotely exploitable, medium urgency) CVE-2005-3244 ethereal-common (fixed, remotely exploitable, medium urgency) CVE-2005-3244 tethereal (fixed, remotely exploitable, medium urgency) CVE-2005-3245 ethereal (fixed, remotely exploitable, medium urgency) CVE-2005-3245 ethereal-common (fixed, remotely exploitable, medium urgency) CVE-2005-3245 tethereal (fixed, remotely exploitable, medium urgency) CVE-2005-3246 ethereal (fixed, remotely exploitable, medium urgency) CVE-2005-3246 ethereal-common (fixed, remotely exploitable, medium urgency) CVE-2005-3246 tethereal (fixed, remotely exploitable, medium urgency) CVE-2005-3247 ethereal (fixed, remotely exploitable, medium urgency) CVE-2005-3247 ethereal-common (fixed, remotely exploitable, medium urgency) CVE-2005-3247 tethereal (fixed, remotely exploitable, medium urgency) CVE-2005-3248 ethereal (fixed, remotely exploitable, medium urgency) CVE-2005-3248 ethereal-common (fixed, remotely exploitable, medium urgency) CVE-2005-3248 tethereal (fixed, remotely exploitable, medium urgency) CVE-2005-3249 ethereal (fixed, remotely exploitable, medium urgency) CVE-2005-3249 ethereal-common (fixed, remotely exploitable, medium urgency) CVE-2005-3249 tethereal (fixed, remotely exploitable, medium urgency) CVE-2005-3313 ethereal (remotely exploitable, medium urgency) CVE-2005-3313 ethereal-common (remotely exploitable, medium urgency) CVE-2005-3313 tethereal (remotely exploitable, medium urgency) CVE-2005-3651 ethereal (remotely exploitable, medium urgency) CVE-2005-3651 ethereal-common (remotely exploitable, medium urgency) CVE-2005-3651 tethereal (remotely exploitable, medium urgency) debsecan-0.4.18/testsuite/001/out.packages0000644000000000000000000000004312315633552015100 0ustar ethereal ethereal-common tethereal debsecan-0.4.18/testsuite/001/out.bugs0000644000000000000000000000025012315633552014262 0ustar CVE-2005-3184 CVE-2005-3241 CVE-2005-3242 CVE-2005-3243 CVE-2005-3244 CVE-2005-3245 CVE-2005-3246 CVE-2005-3247 CVE-2005-3248 CVE-2005-3249 CVE-2005-3313 CVE-2005-3651 debsecan-0.4.18/testsuite/001/out.detail0000644000000000000000000002547312315633552014602 0ustar CVE-2005-3184 (fixed, remotely exploitable, medium urgency) Buffer overflow vulnerability in the unicode_to_bytes in the Service ... installed: ethereal 0.10.12-6 (built from ethereal 0.10.12-6) fixed in unstable: ethereal 0.10.13-1 (source package) fix is available for the selected suite (sid) CVE-2005-3241 (fixed, remotely exploitable, medium urgency) Multiple vulnerabilities in Ethereal 0.10.12 and earlier allow remote ... installed: ethereal 0.10.12-6 (built from ethereal 0.10.12-6) fixed in unstable: ethereal 0.10.13-1 (source package) fix is available for the selected suite (sid) CVE-2005-3242 (fixed, remotely exploitable, medium urgency) Ethereal 0.10.12 and earlier allows remote attackers to cause a denial ... installed: ethereal 0.10.12-6 (built from ethereal 0.10.12-6) fixed in unstable: ethereal 0.10.13-1 (source package) fix is available for the selected suite (sid) CVE-2005-3243 (fixed, remotely exploitable, medium urgency) Multiple buffer overflows in Ethereal 0.10.12 and earlier might allow ... installed: ethereal 0.10.12-6 (built from ethereal 0.10.12-6) fixed in unstable: ethereal 0.10.13-1 (source package) fix is available for the selected suite (sid) CVE-2005-3244 (fixed, remotely exploitable, medium urgency) The BER dissector in Ethereal 0.10.3 to 0.10.12 allows remote ... installed: ethereal 0.10.12-6 (built from ethereal 0.10.12-6) fixed in unstable: ethereal 0.10.13-1 (source package) fix is available for the selected suite (sid) CVE-2005-3245 (fixed, remotely exploitable, medium urgency) Unspecified vulnerability in the ONC RPC dissector in Ethereal 0.10.3 ... installed: ethereal 0.10.12-6 (built from ethereal 0.10.12-6) fixed in unstable: ethereal 0.10.13-1 (source package) fix is available for the selected suite (sid) CVE-2005-3246 (fixed, remotely exploitable, medium urgency) Ethereal 0.10.12 and earlier allows remote attackers to cause a denial ... installed: ethereal 0.10.12-6 (built from ethereal 0.10.12-6) fixed in unstable: ethereal 0.10.13-1 (source package) fix is available for the selected suite (sid) CVE-2005-3247 (fixed, remotely exploitable, medium urgency) The SigComp UDVM in Ethereal 0.10.12 allows remote attackers to cause ... installed: ethereal 0.10.12-6 (built from ethereal 0.10.12-6) fixed in unstable: ethereal 0.10.13-1 (source package) fix is available for the selected suite (sid) CVE-2005-3248 (fixed, remotely exploitable, medium urgency) Unspecified vulnerability in the X11 dissector in Ethereal 0.10.12 and ... installed: ethereal 0.10.12-6 (built from ethereal 0.10.12-6) fixed in unstable: ethereal 0.10.13-1 (source package) fix is available for the selected suite (sid) CVE-2005-3249 (fixed, remotely exploitable, medium urgency) Unspecified vulnerability in the WSP dissector in Ethereal 0.10.1 to ... installed: ethereal 0.10.12-6 (built from ethereal 0.10.12-6) fixed in unstable: ethereal 0.10.13-1 (source package) fix is available for the selected suite (sid) CVE-2005-3313 (remotely exploitable, medium urgency) The IRC protocol dissector in Ethereal 0.10.13 allows remote attackers ... installed: ethereal 0.10.12-6 (built from ethereal 0.10.12-6) CVE-2005-3651 (remotely exploitable, medium urgency) Stack-based buffer overflow in the dissect_ospf_v3_address_prefix ... installed: ethereal 0.10.12-6 (built from ethereal 0.10.12-6) fixed on branch: ethereal 0.10.10-2sarge4 (source package) CVE-2005-3184 (fixed, remotely exploitable, medium urgency) Buffer overflow vulnerability in the unicode_to_bytes in the Service ... installed: ethereal-common 0.10.12-6 (built from ethereal 0.10.12-6) fixed in unstable: ethereal 0.10.13-1 (source package) fix is available for the selected suite (sid) CVE-2005-3241 (fixed, remotely exploitable, medium urgency) Multiple vulnerabilities in Ethereal 0.10.12 and earlier allow remote ... installed: ethereal-common 0.10.12-6 (built from ethereal 0.10.12-6) fixed in unstable: ethereal 0.10.13-1 (source package) fix is available for the selected suite (sid) CVE-2005-3242 (fixed, remotely exploitable, medium urgency) Ethereal 0.10.12 and earlier allows remote attackers to cause a denial ... installed: ethereal-common 0.10.12-6 (built from ethereal 0.10.12-6) fixed in unstable: ethereal 0.10.13-1 (source package) fix is available for the selected suite (sid) CVE-2005-3243 (fixed, remotely exploitable, medium urgency) Multiple buffer overflows in Ethereal 0.10.12 and earlier might allow ... installed: ethereal-common 0.10.12-6 (built from ethereal 0.10.12-6) fixed in unstable: ethereal 0.10.13-1 (source package) fix is available for the selected suite (sid) CVE-2005-3244 (fixed, remotely exploitable, medium urgency) The BER dissector in Ethereal 0.10.3 to 0.10.12 allows remote ... installed: ethereal-common 0.10.12-6 (built from ethereal 0.10.12-6) fixed in unstable: ethereal 0.10.13-1 (source package) fix is available for the selected suite (sid) CVE-2005-3245 (fixed, remotely exploitable, medium urgency) Unspecified vulnerability in the ONC RPC dissector in Ethereal 0.10.3 ... installed: ethereal-common 0.10.12-6 (built from ethereal 0.10.12-6) fixed in unstable: ethereal 0.10.13-1 (source package) fix is available for the selected suite (sid) CVE-2005-3246 (fixed, remotely exploitable, medium urgency) Ethereal 0.10.12 and earlier allows remote attackers to cause a denial ... installed: ethereal-common 0.10.12-6 (built from ethereal 0.10.12-6) fixed in unstable: ethereal 0.10.13-1 (source package) fix is available for the selected suite (sid) CVE-2005-3247 (fixed, remotely exploitable, medium urgency) The SigComp UDVM in Ethereal 0.10.12 allows remote attackers to cause ... installed: ethereal-common 0.10.12-6 (built from ethereal 0.10.12-6) fixed in unstable: ethereal 0.10.13-1 (source package) fix is available for the selected suite (sid) CVE-2005-3248 (fixed, remotely exploitable, medium urgency) Unspecified vulnerability in the X11 dissector in Ethereal 0.10.12 and ... installed: ethereal-common 0.10.12-6 (built from ethereal 0.10.12-6) fixed in unstable: ethereal 0.10.13-1 (source package) fix is available for the selected suite (sid) CVE-2005-3249 (fixed, remotely exploitable, medium urgency) Unspecified vulnerability in the WSP dissector in Ethereal 0.10.1 to ... installed: ethereal-common 0.10.12-6 (built from ethereal 0.10.12-6) fixed in unstable: ethereal 0.10.13-1 (source package) fix is available for the selected suite (sid) CVE-2005-3313 (remotely exploitable, medium urgency) The IRC protocol dissector in Ethereal 0.10.13 allows remote attackers ... installed: ethereal-common 0.10.12-6 (built from ethereal 0.10.12-6) CVE-2005-3651 (remotely exploitable, medium urgency) Stack-based buffer overflow in the dissect_ospf_v3_address_prefix ... installed: ethereal-common 0.10.12-6 (built from ethereal 0.10.12-6) fixed on branch: ethereal 0.10.10-2sarge4 (source package) CVE-2005-3184 (fixed, remotely exploitable, medium urgency) Buffer overflow vulnerability in the unicode_to_bytes in the Service ... installed: tethereal 0.10.12-6 (built from ethereal 0.10.12-6) fixed in unstable: ethereal 0.10.13-1 (source package) fix is available for the selected suite (sid) CVE-2005-3241 (fixed, remotely exploitable, medium urgency) Multiple vulnerabilities in Ethereal 0.10.12 and earlier allow remote ... installed: tethereal 0.10.12-6 (built from ethereal 0.10.12-6) fixed in unstable: ethereal 0.10.13-1 (source package) fix is available for the selected suite (sid) CVE-2005-3242 (fixed, remotely exploitable, medium urgency) Ethereal 0.10.12 and earlier allows remote attackers to cause a denial ... installed: tethereal 0.10.12-6 (built from ethereal 0.10.12-6) fixed in unstable: ethereal 0.10.13-1 (source package) fix is available for the selected suite (sid) CVE-2005-3243 (fixed, remotely exploitable, medium urgency) Multiple buffer overflows in Ethereal 0.10.12 and earlier might allow ... installed: tethereal 0.10.12-6 (built from ethereal 0.10.12-6) fixed in unstable: ethereal 0.10.13-1 (source package) fix is available for the selected suite (sid) CVE-2005-3244 (fixed, remotely exploitable, medium urgency) The BER dissector in Ethereal 0.10.3 to 0.10.12 allows remote ... installed: tethereal 0.10.12-6 (built from ethereal 0.10.12-6) fixed in unstable: ethereal 0.10.13-1 (source package) fix is available for the selected suite (sid) CVE-2005-3245 (fixed, remotely exploitable, medium urgency) Unspecified vulnerability in the ONC RPC dissector in Ethereal 0.10.3 ... installed: tethereal 0.10.12-6 (built from ethereal 0.10.12-6) fixed in unstable: ethereal 0.10.13-1 (source package) fix is available for the selected suite (sid) CVE-2005-3246 (fixed, remotely exploitable, medium urgency) Ethereal 0.10.12 and earlier allows remote attackers to cause a denial ... installed: tethereal 0.10.12-6 (built from ethereal 0.10.12-6) fixed in unstable: ethereal 0.10.13-1 (source package) fix is available for the selected suite (sid) CVE-2005-3247 (fixed, remotely exploitable, medium urgency) The SigComp UDVM in Ethereal 0.10.12 allows remote attackers to cause ... installed: tethereal 0.10.12-6 (built from ethereal 0.10.12-6) fixed in unstable: ethereal 0.10.13-1 (source package) fix is available for the selected suite (sid) CVE-2005-3248 (fixed, remotely exploitable, medium urgency) Unspecified vulnerability in the X11 dissector in Ethereal 0.10.12 and ... installed: tethereal 0.10.12-6 (built from ethereal 0.10.12-6) fixed in unstable: ethereal 0.10.13-1 (source package) fix is available for the selected suite (sid) CVE-2005-3249 (fixed, remotely exploitable, medium urgency) Unspecified vulnerability in the WSP dissector in Ethereal 0.10.1 to ... installed: tethereal 0.10.12-6 (built from ethereal 0.10.12-6) fixed in unstable: ethereal 0.10.13-1 (source package) fix is available for the selected suite (sid) CVE-2005-3313 (remotely exploitable, medium urgency) The IRC protocol dissector in Ethereal 0.10.13 allows remote attackers ... installed: tethereal 0.10.12-6 (built from ethereal 0.10.12-6) CVE-2005-3651 (remotely exploitable, medium urgency) Stack-based buffer overflow in the dissect_ospf_v3_address_prefix ... installed: tethereal 0.10.12-6 (built from ethereal 0.10.12-6) fixed on branch: ethereal 0.10.10-2sarge4 (source package) debsecan-0.4.18/testsuite/001/out.report0000644000000000000000000000516212315633552014644 0ustar Security report based on the sid release *** New security updates CVE-2005-3184 Buffer overflow vulnerability in the unicode_to_bytes... - ethereal, ethereal-common, tethereal (remotely exploitable, medium urgency) CVE-2005-3241 Multiple vulnerabilities in Ethereal 0.10.12 and... - ethereal, ethereal-common, tethereal (remotely exploitable, medium urgency) CVE-2005-3242 Ethereal 0.10.12 and earlier allows remote attackers... - ethereal, ethereal-common, tethereal (remotely exploitable, medium urgency) CVE-2005-3243 Multiple buffer overflows in Ethereal 0.10.12 and... - ethereal, ethereal-common, tethereal (remotely exploitable, medium urgency) CVE-2005-3244 The BER dissector in Ethereal 0.10.3 to 0.10.12... - ethereal, ethereal-common, tethereal (remotely exploitable, medium urgency) CVE-2005-3245 Unspecified vulnerability in the ONC RPC dissector in... - ethereal, ethereal-common, tethereal (remotely exploitable, medium urgency) CVE-2005-3246 Ethereal 0.10.12 and earlier allows remote attackers... - ethereal, ethereal-common, tethereal (remotely exploitable, medium urgency) CVE-2005-3247 The SigComp UDVM in Ethereal 0.10.12 allows remote... - ethereal, ethereal-common, tethereal (remotely exploitable, medium urgency) CVE-2005-3248 Unspecified vulnerability in the X11 dissector in... - ethereal, ethereal-common, tethereal (remotely exploitable, medium urgency) CVE-2005-3249 Unspecified vulnerability in the WSP dissector in... - ethereal, ethereal-common, tethereal (remotely exploitable, medium urgency) *** Vulnerabilities without updates CVE-2005-3313 The IRC protocol dissector in Ethereal 0.10.13 allows... - ethereal, ethereal-common, tethereal (remotely exploitable, medium urgency) CVE-2005-3651 Stack-based buffer overflow in the... - ethereal, ethereal-common, tethereal (remotely exploitable, medium urgency) debsecan-0.4.18/testsuite/001/exp.report0000644000000000000000000000516212315633545014633 0ustar Security report based on the sid release *** New security updates CVE-2005-3184 Buffer overflow vulnerability in the unicode_to_bytes... - ethereal, ethereal-common, tethereal (remotely exploitable, medium urgency) CVE-2005-3241 Multiple vulnerabilities in Ethereal 0.10.12 and... - ethereal, ethereal-common, tethereal (remotely exploitable, medium urgency) CVE-2005-3242 Ethereal 0.10.12 and earlier allows remote attackers... - ethereal, ethereal-common, tethereal (remotely exploitable, medium urgency) CVE-2005-3243 Multiple buffer overflows in Ethereal 0.10.12 and... - ethereal, ethereal-common, tethereal (remotely exploitable, medium urgency) CVE-2005-3244 The BER dissector in Ethereal 0.10.3 to 0.10.12... - ethereal, ethereal-common, tethereal (remotely exploitable, medium urgency) CVE-2005-3245 Unspecified vulnerability in the ONC RPC dissector in... - ethereal, ethereal-common, tethereal (remotely exploitable, medium urgency) CVE-2005-3246 Ethereal 0.10.12 and earlier allows remote attackers... - ethereal, ethereal-common, tethereal (remotely exploitable, medium urgency) CVE-2005-3247 The SigComp UDVM in Ethereal 0.10.12 allows remote... - ethereal, ethereal-common, tethereal (remotely exploitable, medium urgency) CVE-2005-3248 Unspecified vulnerability in the X11 dissector in... - ethereal, ethereal-common, tethereal (remotely exploitable, medium urgency) CVE-2005-3249 Unspecified vulnerability in the WSP dissector in... - ethereal, ethereal-common, tethereal (remotely exploitable, medium urgency) *** Vulnerabilities without updates CVE-2005-3313 The IRC protocol dissector in Ethereal 0.10.13 allows... - ethereal, ethereal-common, tethereal (remotely exploitable, medium urgency) CVE-2005-3651 Stack-based buffer overflow in the... - ethereal, ethereal-common, tethereal (remotely exploitable, medium urgency) debsecan-0.4.18/testsuite/002/0000755000000000000000000000000012315633552012575 5ustar debsecan-0.4.18/testsuite/002/exp.bugs0000644000000000000000000000025012315633545014252 0ustar CVE-2005-3184 CVE-2005-3241 CVE-2005-3242 CVE-2005-3243 CVE-2005-3244 CVE-2005-3245 CVE-2005-3246 CVE-2005-3247 CVE-2005-3248 CVE-2005-3249 CVE-2005-3313 CVE-2005-3651 debsecan-0.4.18/testsuite/002/exp.detail0000644000000000000000000002547312315633545014572 0ustar CVE-2005-3184 (fixed, remotely exploitable, medium urgency) Buffer overflow vulnerability in the unicode_to_bytes in the Service ... installed: ethereal 0.10.12-6 (built from ethereal 0.10.12-6) fixed in unstable: ethereal 0.10.13-1 (source package) fix is available for the selected suite (sid) CVE-2005-3241 (fixed, remotely exploitable, medium urgency) Multiple vulnerabilities in Ethereal 0.10.12 and earlier allow remote ... installed: ethereal 0.10.12-6 (built from ethereal 0.10.12-6) fixed in unstable: ethereal 0.10.13-1 (source package) fix is available for the selected suite (sid) CVE-2005-3242 (fixed, remotely exploitable, medium urgency) Ethereal 0.10.12 and earlier allows remote attackers to cause a denial ... installed: ethereal 0.10.12-6 (built from ethereal 0.10.12-6) fixed in unstable: ethereal 0.10.13-1 (source package) fix is available for the selected suite (sid) CVE-2005-3243 (fixed, remotely exploitable, medium urgency) Multiple buffer overflows in Ethereal 0.10.12 and earlier might allow ... installed: ethereal 0.10.12-6 (built from ethereal 0.10.12-6) fixed in unstable: ethereal 0.10.13-1 (source package) fix is available for the selected suite (sid) CVE-2005-3244 (fixed, remotely exploitable, medium urgency) The BER dissector in Ethereal 0.10.3 to 0.10.12 allows remote ... installed: ethereal 0.10.12-6 (built from ethereal 0.10.12-6) fixed in unstable: ethereal 0.10.13-1 (source package) fix is available for the selected suite (sid) CVE-2005-3245 (fixed, remotely exploitable, medium urgency) Unspecified vulnerability in the ONC RPC dissector in Ethereal 0.10.3 ... installed: ethereal 0.10.12-6 (built from ethereal 0.10.12-6) fixed in unstable: ethereal 0.10.13-1 (source package) fix is available for the selected suite (sid) CVE-2005-3246 (fixed, remotely exploitable, medium urgency) Ethereal 0.10.12 and earlier allows remote attackers to cause a denial ... installed: ethereal 0.10.12-6 (built from ethereal 0.10.12-6) fixed in unstable: ethereal 0.10.13-1 (source package) fix is available for the selected suite (sid) CVE-2005-3247 (fixed, remotely exploitable, medium urgency) The SigComp UDVM in Ethereal 0.10.12 allows remote attackers to cause ... installed: ethereal 0.10.12-6 (built from ethereal 0.10.12-6) fixed in unstable: ethereal 0.10.13-1 (source package) fix is available for the selected suite (sid) CVE-2005-3248 (fixed, remotely exploitable, medium urgency) Unspecified vulnerability in the X11 dissector in Ethereal 0.10.12 and ... installed: ethereal 0.10.12-6 (built from ethereal 0.10.12-6) fixed in unstable: ethereal 0.10.13-1 (source package) fix is available for the selected suite (sid) CVE-2005-3249 (fixed, remotely exploitable, medium urgency) Unspecified vulnerability in the WSP dissector in Ethereal 0.10.1 to ... installed: ethereal 0.10.12-6 (built from ethereal 0.10.12-6) fixed in unstable: ethereal 0.10.13-1 (source package) fix is available for the selected suite (sid) CVE-2005-3313 (remotely exploitable, medium urgency) The IRC protocol dissector in Ethereal 0.10.13 allows remote attackers ... installed: ethereal 0.10.12-6 (built from ethereal 0.10.12-6) CVE-2005-3651 (remotely exploitable, medium urgency) Stack-based buffer overflow in the dissect_ospf_v3_address_prefix ... installed: ethereal 0.10.12-6 (built from ethereal 0.10.12-6) fixed on branch: ethereal 0.10.10-2sarge4 (source package) CVE-2005-3184 (fixed, remotely exploitable, medium urgency) Buffer overflow vulnerability in the unicode_to_bytes in the Service ... installed: ethereal-common 0.10.12-6 (built from ethereal 0.10.12-6) fixed in unstable: ethereal 0.10.13-1 (source package) fix is available for the selected suite (sid) CVE-2005-3241 (fixed, remotely exploitable, medium urgency) Multiple vulnerabilities in Ethereal 0.10.12 and earlier allow remote ... installed: ethereal-common 0.10.12-6 (built from ethereal 0.10.12-6) fixed in unstable: ethereal 0.10.13-1 (source package) fix is available for the selected suite (sid) CVE-2005-3242 (fixed, remotely exploitable, medium urgency) Ethereal 0.10.12 and earlier allows remote attackers to cause a denial ... installed: ethereal-common 0.10.12-6 (built from ethereal 0.10.12-6) fixed in unstable: ethereal 0.10.13-1 (source package) fix is available for the selected suite (sid) CVE-2005-3243 (fixed, remotely exploitable, medium urgency) Multiple buffer overflows in Ethereal 0.10.12 and earlier might allow ... installed: ethereal-common 0.10.12-6 (built from ethereal 0.10.12-6) fixed in unstable: ethereal 0.10.13-1 (source package) fix is available for the selected suite (sid) CVE-2005-3244 (fixed, remotely exploitable, medium urgency) The BER dissector in Ethereal 0.10.3 to 0.10.12 allows remote ... installed: ethereal-common 0.10.12-6 (built from ethereal 0.10.12-6) fixed in unstable: ethereal 0.10.13-1 (source package) fix is available for the selected suite (sid) CVE-2005-3245 (fixed, remotely exploitable, medium urgency) Unspecified vulnerability in the ONC RPC dissector in Ethereal 0.10.3 ... installed: ethereal-common 0.10.12-6 (built from ethereal 0.10.12-6) fixed in unstable: ethereal 0.10.13-1 (source package) fix is available for the selected suite (sid) CVE-2005-3246 (fixed, remotely exploitable, medium urgency) Ethereal 0.10.12 and earlier allows remote attackers to cause a denial ... installed: ethereal-common 0.10.12-6 (built from ethereal 0.10.12-6) fixed in unstable: ethereal 0.10.13-1 (source package) fix is available for the selected suite (sid) CVE-2005-3247 (fixed, remotely exploitable, medium urgency) The SigComp UDVM in Ethereal 0.10.12 allows remote attackers to cause ... installed: ethereal-common 0.10.12-6 (built from ethereal 0.10.12-6) fixed in unstable: ethereal 0.10.13-1 (source package) fix is available for the selected suite (sid) CVE-2005-3248 (fixed, remotely exploitable, medium urgency) Unspecified vulnerability in the X11 dissector in Ethereal 0.10.12 and ... installed: ethereal-common 0.10.12-6 (built from ethereal 0.10.12-6) fixed in unstable: ethereal 0.10.13-1 (source package) fix is available for the selected suite (sid) CVE-2005-3249 (fixed, remotely exploitable, medium urgency) Unspecified vulnerability in the WSP dissector in Ethereal 0.10.1 to ... installed: ethereal-common 0.10.12-6 (built from ethereal 0.10.12-6) fixed in unstable: ethereal 0.10.13-1 (source package) fix is available for the selected suite (sid) CVE-2005-3313 (remotely exploitable, medium urgency) The IRC protocol dissector in Ethereal 0.10.13 allows remote attackers ... installed: ethereal-common 0.10.12-6 (built from ethereal 0.10.12-6) CVE-2005-3651 (remotely exploitable, medium urgency) Stack-based buffer overflow in the dissect_ospf_v3_address_prefix ... installed: ethereal-common 0.10.12-6 (built from ethereal 0.10.12-6) fixed on branch: ethereal 0.10.10-2sarge4 (source package) CVE-2005-3184 (fixed, remotely exploitable, medium urgency) Buffer overflow vulnerability in the unicode_to_bytes in the Service ... installed: tethereal 0.10.12-6 (built from ethereal 0.10.12-6) fixed in unstable: ethereal 0.10.13-1 (source package) fix is available for the selected suite (sid) CVE-2005-3241 (fixed, remotely exploitable, medium urgency) Multiple vulnerabilities in Ethereal 0.10.12 and earlier allow remote ... installed: tethereal 0.10.12-6 (built from ethereal 0.10.12-6) fixed in unstable: ethereal 0.10.13-1 (source package) fix is available for the selected suite (sid) CVE-2005-3242 (fixed, remotely exploitable, medium urgency) Ethereal 0.10.12 and earlier allows remote attackers to cause a denial ... installed: tethereal 0.10.12-6 (built from ethereal 0.10.12-6) fixed in unstable: ethereal 0.10.13-1 (source package) fix is available for the selected suite (sid) CVE-2005-3243 (fixed, remotely exploitable, medium urgency) Multiple buffer overflows in Ethereal 0.10.12 and earlier might allow ... installed: tethereal 0.10.12-6 (built from ethereal 0.10.12-6) fixed in unstable: ethereal 0.10.13-1 (source package) fix is available for the selected suite (sid) CVE-2005-3244 (fixed, remotely exploitable, medium urgency) The BER dissector in Ethereal 0.10.3 to 0.10.12 allows remote ... installed: tethereal 0.10.12-6 (built from ethereal 0.10.12-6) fixed in unstable: ethereal 0.10.13-1 (source package) fix is available for the selected suite (sid) CVE-2005-3245 (fixed, remotely exploitable, medium urgency) Unspecified vulnerability in the ONC RPC dissector in Ethereal 0.10.3 ... installed: tethereal 0.10.12-6 (built from ethereal 0.10.12-6) fixed in unstable: ethereal 0.10.13-1 (source package) fix is available for the selected suite (sid) CVE-2005-3246 (fixed, remotely exploitable, medium urgency) Ethereal 0.10.12 and earlier allows remote attackers to cause a denial ... installed: tethereal 0.10.12-6 (built from ethereal 0.10.12-6) fixed in unstable: ethereal 0.10.13-1 (source package) fix is available for the selected suite (sid) CVE-2005-3247 (fixed, remotely exploitable, medium urgency) The SigComp UDVM in Ethereal 0.10.12 allows remote attackers to cause ... installed: tethereal 0.10.12-6 (built from ethereal 0.10.12-6) fixed in unstable: ethereal 0.10.13-1 (source package) fix is available for the selected suite (sid) CVE-2005-3248 (fixed, remotely exploitable, medium urgency) Unspecified vulnerability in the X11 dissector in Ethereal 0.10.12 and ... installed: tethereal 0.10.12-6 (built from ethereal 0.10.12-6) fixed in unstable: ethereal 0.10.13-1 (source package) fix is available for the selected suite (sid) CVE-2005-3249 (fixed, remotely exploitable, medium urgency) Unspecified vulnerability in the WSP dissector in Ethereal 0.10.1 to ... installed: tethereal 0.10.12-6 (built from ethereal 0.10.12-6) fixed in unstable: ethereal 0.10.13-1 (source package) fix is available for the selected suite (sid) CVE-2005-3313 (remotely exploitable, medium urgency) The IRC protocol dissector in Ethereal 0.10.13 allows remote attackers ... installed: tethereal 0.10.12-6 (built from ethereal 0.10.12-6) CVE-2005-3651 (remotely exploitable, medium urgency) Stack-based buffer overflow in the dissect_ospf_v3_address_prefix ... installed: tethereal 0.10.12-6 (built from ethereal 0.10.12-6) fixed on branch: ethereal 0.10.10-2sarge4 (source package) debsecan-0.4.18/testsuite/002/exp.packages0000644000000000000000000000004312315633545015070 0ustar ethereal ethereal-common tethereal debsecan-0.4.18/testsuite/002/exp.summary0000644000000000000000000000475212315633545015022 0ustar CVE-2005-3184 ethereal (fixed, remotely exploitable, medium urgency) CVE-2005-3184 ethereal-common (fixed, remotely exploitable, medium urgency) CVE-2005-3184 tethereal (fixed, remotely exploitable, medium urgency) CVE-2005-3241 ethereal (fixed, remotely exploitable, medium urgency) CVE-2005-3241 ethereal-common (fixed, remotely exploitable, medium urgency) CVE-2005-3241 tethereal (fixed, remotely exploitable, medium urgency) CVE-2005-3242 ethereal (fixed, remotely exploitable, medium urgency) CVE-2005-3242 ethereal-common (fixed, remotely exploitable, medium urgency) CVE-2005-3242 tethereal (fixed, remotely exploitable, medium urgency) CVE-2005-3243 ethereal (fixed, remotely exploitable, medium urgency) CVE-2005-3243 ethereal-common (fixed, remotely exploitable, medium urgency) CVE-2005-3243 tethereal (fixed, remotely exploitable, medium urgency) CVE-2005-3244 ethereal (fixed, remotely exploitable, medium urgency) CVE-2005-3244 ethereal-common (fixed, remotely exploitable, medium urgency) CVE-2005-3244 tethereal (fixed, remotely exploitable, medium urgency) CVE-2005-3245 ethereal (fixed, remotely exploitable, medium urgency) CVE-2005-3245 ethereal-common (fixed, remotely exploitable, medium urgency) CVE-2005-3245 tethereal (fixed, remotely exploitable, medium urgency) CVE-2005-3246 ethereal (fixed, remotely exploitable, medium urgency) CVE-2005-3246 ethereal-common (fixed, remotely exploitable, medium urgency) CVE-2005-3246 tethereal (fixed, remotely exploitable, medium urgency) CVE-2005-3247 ethereal (fixed, remotely exploitable, medium urgency) CVE-2005-3247 ethereal-common (fixed, remotely exploitable, medium urgency) CVE-2005-3247 tethereal (fixed, remotely exploitable, medium urgency) CVE-2005-3248 ethereal (fixed, remotely exploitable, medium urgency) CVE-2005-3248 ethereal-common (fixed, remotely exploitable, medium urgency) CVE-2005-3248 tethereal (fixed, remotely exploitable, medium urgency) CVE-2005-3249 ethereal (fixed, remotely exploitable, medium urgency) CVE-2005-3249 ethereal-common (fixed, remotely exploitable, medium urgency) CVE-2005-3249 tethereal (fixed, remotely exploitable, medium urgency) CVE-2005-3313 ethereal (remotely exploitable, medium urgency) CVE-2005-3313 ethereal-common (remotely exploitable, medium urgency) CVE-2005-3313 tethereal (remotely exploitable, medium urgency) CVE-2005-3651 ethereal (remotely exploitable, medium urgency) CVE-2005-3651 ethereal-common (remotely exploitable, medium urgency) CVE-2005-3651 tethereal (remotely exploitable, medium urgency) debsecan-0.4.18/testsuite/002/history0000644000000000000000000000175611004700541014215 0ustar VERSION 0 CVE-2005-3651,ethereal, CVE-2005-3313,ethereal, CVE-2005-3184,ethereal,F CVE-2005-3241,ethereal,F CVE-2005-3242,ethereal,F CVE-2005-3243,ethereal,F CVE-2005-3244,ethereal,F CVE-2005-3245,ethereal,F CVE-2005-3246,ethereal,F CVE-2005-3247,ethereal,F CVE-2005-3248,ethereal,F CVE-2005-3249,ethereal,F CVE-2005-3651,tethereal, CVE-2005-3313,tethereal, CVE-2005-3184,tethereal,F CVE-2005-3241,tethereal,F CVE-2005-3242,tethereal,F CVE-2005-3243,tethereal,F CVE-2005-3244,tethereal,F CVE-2005-3245,tethereal,F CVE-2005-3246,tethereal,F CVE-2005-3247,tethereal,F CVE-2005-3248,tethereal,F CVE-2005-3249,tethereal,F CVE-2005-3651,ethereal-common, CVE-2005-3313,ethereal-common, CVE-2005-3184,ethereal-common,F CVE-2005-3241,ethereal-common,F CVE-2005-3242,ethereal-common,F CVE-2005-3243,ethereal-common,F CVE-2005-3244,ethereal-common,F CVE-2005-3245,ethereal-common,F CVE-2005-3246,ethereal-common,F CVE-2005-3247,ethereal-common,F CVE-2005-3248,ethereal-common,F CVE-2005-3249,ethereal-common,F debsecan-0.4.18/testsuite/002/sid0000644000000000000000000000356011004700541013266 0ustar x͙[s8)֒|}I ƀ M_ن Hr(CGnGʧm4&4!D=C0.6AH*{*@AyOr9 qJhxE+n /Ӻ1F]#j9dW:Єh;F0%tJf쬖qCc؅- õn㲛T} y}+iğB<6-nh}nYk7a83t\K|DWzLF@~LR4dXo#GTWM>6cB}ݎ; n!De +]&nBv%RɕTT N`Ӽc7S0R;cPS]|K[ ٫tS*VP{`!Hz lCɓl╏-C8y)|c]S.֗Tqp%qpw{Uxn))nx6O?;koؚǗsU'o v4]pENiHm:ɚl%?ij|v|B,Plq7́Xl U43p>koMmht_Q/C /o򷬊JOWhkIQH6iIX-y&խLXaFí`47`-0=/ forxY ANE*f.7v\;+y ln)lnUsA@Q;ߑIKƗ3aGTۗ"$Q 5z\7-I# t$TAn4bSFg"zRȵ:7-/kTxvPn! aЭ vl܏]fG^M_(YA~j:"Rtqۇdy_n`4#lBJpo9V,Y$d~xn^bEݾ$ O1}P :BuwR$dӼv AZgJ]^d)ٱ颋*fVG<E򭆾yy4ܾ3?RS͟7CN /bhqElp%+y\߫{^%3{C'{uB2 W_ItJQ* D!>aS5 TBOZӣtU`pWVgrMH="h̀e1'ȑ\L!r̸8 &$7aɒlt\7a 94y拶Z,S†x +l`+|IFߕ5\-u5lS[jk m hkhcjkcjӘ^he%ytK(dlh*>utKttGǵtٖ|x /6aRlQm? e+v?Go= Architecture: i386 Version: 0.10.12-6 Depends: libadns1, libatk1.0-0 (>= 1.9.0), libc6 (>= 2.3.5-1), libcap1, libcomerr2 (>= 1.33-3), libglib2.0-0 (>= 2.8.0), libgtk2.0-0 (>= 2.6.0), libkrb53 (>= 1.3.2), libpango1.0-0 (>= 1.8.2), libpcap0.8 (>= 0.9.3-1), libpcre3 (>= 4.5), zlib1g (>= 1:1.2.1), ethereal-common (= 0.10.12-6) Recommends: gksu Description: network traffic analyzer Ethereal is a network traffic analyzer, or "sniffer", for Unix and Unix-like operating systems. A sniffer is a tool used to capture packets off the wire. Ethereal decodes numerous protocols (too many to list). . This package provides ethereal (the GTK+ version) Package: ethereal-common Status: install ok installed Priority: optional Section: net Installed-Size: 20320 Maintainer: Frederic Peters Architecture: i386 Source: ethereal Version: 0.10.12-6 Depends: libc6 (>= 2.3.5-1), libcap1, libglib2.0-0 (>= 2.8.0), libpcre3 (>= 4.5), zlib1g (>= 1:1.2.1) Recommends: ethereal (>= 0.9.1-3) | tethereal (>= 0.9.1-3) Conflicts: ethereal (<< 0.9.1-3), tethereal (<< 0.9.1-3) Description: network traffic analyser (common files) Ethereal is a network traffic analyzer, or "sniffer", for Unix and Unix-like operating systems. A sniffer is a tool used to capture packets off the wire. Ethereal decodes numerous protocols (too many to list). . This package provides files common to both ethereal (the GTK+ version) and tethereal (the console version). Package: tethereal Status: install ok installed Priority: optional Section: net Installed-Size: 240 Maintainer: Frederic Peters Architecture: i386 Source: ethereal Version: 0.10.12-6 Depends: libadns1, libc6 (>= 2.3.5-1), libcap1, libcomerr2 (>= 1.33-3), libglib2.0-0 (>= 2.8.0), libkrb53 (>= 1.3.2), libpcap0.8 (>= 0.9.3-1), libpcre3 (>= 4.5), zlib1g (>= 1:1.2.1), ethereal-common (= 0.10.12-6) Description: network traffic analyzer (console) Ethereal is a network traffic analyzer, or "sniffer", for Unix and Unix-like operating systems. A sniffer is a tool used to capture packets off the wire. Ethereal decodes numerous protocols (too many to list). . This package provides the console version of ethereal, named "tethereal". debsecan-0.4.18/testsuite/002/out.summary0000644000000000000000000000475212315633552015033 0ustar CVE-2005-3184 ethereal (fixed, remotely exploitable, medium urgency) CVE-2005-3184 ethereal-common (fixed, remotely exploitable, medium urgency) CVE-2005-3184 tethereal (fixed, remotely exploitable, medium urgency) CVE-2005-3241 ethereal (fixed, remotely exploitable, medium urgency) CVE-2005-3241 ethereal-common (fixed, remotely exploitable, medium urgency) CVE-2005-3241 tethereal (fixed, remotely exploitable, medium urgency) CVE-2005-3242 ethereal (fixed, remotely exploitable, medium urgency) CVE-2005-3242 ethereal-common (fixed, remotely exploitable, medium urgency) CVE-2005-3242 tethereal (fixed, remotely exploitable, medium urgency) CVE-2005-3243 ethereal (fixed, remotely exploitable, medium urgency) CVE-2005-3243 ethereal-common (fixed, remotely exploitable, medium urgency) CVE-2005-3243 tethereal (fixed, remotely exploitable, medium urgency) CVE-2005-3244 ethereal (fixed, remotely exploitable, medium urgency) CVE-2005-3244 ethereal-common (fixed, remotely exploitable, medium urgency) CVE-2005-3244 tethereal (fixed, remotely exploitable, medium urgency) CVE-2005-3245 ethereal (fixed, remotely exploitable, medium urgency) CVE-2005-3245 ethereal-common (fixed, remotely exploitable, medium urgency) CVE-2005-3245 tethereal (fixed, remotely exploitable, medium urgency) CVE-2005-3246 ethereal (fixed, remotely exploitable, medium urgency) CVE-2005-3246 ethereal-common (fixed, remotely exploitable, medium urgency) CVE-2005-3246 tethereal (fixed, remotely exploitable, medium urgency) CVE-2005-3247 ethereal (fixed, remotely exploitable, medium urgency) CVE-2005-3247 ethereal-common (fixed, remotely exploitable, medium urgency) CVE-2005-3247 tethereal (fixed, remotely exploitable, medium urgency) CVE-2005-3248 ethereal (fixed, remotely exploitable, medium urgency) CVE-2005-3248 ethereal-common (fixed, remotely exploitable, medium urgency) CVE-2005-3248 tethereal (fixed, remotely exploitable, medium urgency) CVE-2005-3249 ethereal (fixed, remotely exploitable, medium urgency) CVE-2005-3249 ethereal-common (fixed, remotely exploitable, medium urgency) CVE-2005-3249 tethereal (fixed, remotely exploitable, medium urgency) CVE-2005-3313 ethereal (remotely exploitable, medium urgency) CVE-2005-3313 ethereal-common (remotely exploitable, medium urgency) CVE-2005-3313 tethereal (remotely exploitable, medium urgency) CVE-2005-3651 ethereal (remotely exploitable, medium urgency) CVE-2005-3651 ethereal-common (remotely exploitable, medium urgency) CVE-2005-3651 tethereal (remotely exploitable, medium urgency) debsecan-0.4.18/testsuite/002/out.packages0000644000000000000000000000004312315633553015102 0ustar ethereal ethereal-common tethereal debsecan-0.4.18/testsuite/002/out.bugs0000644000000000000000000000025012315633553014264 0ustar CVE-2005-3184 CVE-2005-3241 CVE-2005-3242 CVE-2005-3243 CVE-2005-3244 CVE-2005-3245 CVE-2005-3246 CVE-2005-3247 CVE-2005-3248 CVE-2005-3249 CVE-2005-3313 CVE-2005-3651 debsecan-0.4.18/testsuite/002/out.detail0000644000000000000000000002547312315633553014604 0ustar CVE-2005-3184 (fixed, remotely exploitable, medium urgency) Buffer overflow vulnerability in the unicode_to_bytes in the Service ... installed: ethereal 0.10.12-6 (built from ethereal 0.10.12-6) fixed in unstable: ethereal 0.10.13-1 (source package) fix is available for the selected suite (sid) CVE-2005-3241 (fixed, remotely exploitable, medium urgency) Multiple vulnerabilities in Ethereal 0.10.12 and earlier allow remote ... installed: ethereal 0.10.12-6 (built from ethereal 0.10.12-6) fixed in unstable: ethereal 0.10.13-1 (source package) fix is available for the selected suite (sid) CVE-2005-3242 (fixed, remotely exploitable, medium urgency) Ethereal 0.10.12 and earlier allows remote attackers to cause a denial ... installed: ethereal 0.10.12-6 (built from ethereal 0.10.12-6) fixed in unstable: ethereal 0.10.13-1 (source package) fix is available for the selected suite (sid) CVE-2005-3243 (fixed, remotely exploitable, medium urgency) Multiple buffer overflows in Ethereal 0.10.12 and earlier might allow ... installed: ethereal 0.10.12-6 (built from ethereal 0.10.12-6) fixed in unstable: ethereal 0.10.13-1 (source package) fix is available for the selected suite (sid) CVE-2005-3244 (fixed, remotely exploitable, medium urgency) The BER dissector in Ethereal 0.10.3 to 0.10.12 allows remote ... installed: ethereal 0.10.12-6 (built from ethereal 0.10.12-6) fixed in unstable: ethereal 0.10.13-1 (source package) fix is available for the selected suite (sid) CVE-2005-3245 (fixed, remotely exploitable, medium urgency) Unspecified vulnerability in the ONC RPC dissector in Ethereal 0.10.3 ... installed: ethereal 0.10.12-6 (built from ethereal 0.10.12-6) fixed in unstable: ethereal 0.10.13-1 (source package) fix is available for the selected suite (sid) CVE-2005-3246 (fixed, remotely exploitable, medium urgency) Ethereal 0.10.12 and earlier allows remote attackers to cause a denial ... installed: ethereal 0.10.12-6 (built from ethereal 0.10.12-6) fixed in unstable: ethereal 0.10.13-1 (source package) fix is available for the selected suite (sid) CVE-2005-3247 (fixed, remotely exploitable, medium urgency) The SigComp UDVM in Ethereal 0.10.12 allows remote attackers to cause ... installed: ethereal 0.10.12-6 (built from ethereal 0.10.12-6) fixed in unstable: ethereal 0.10.13-1 (source package) fix is available for the selected suite (sid) CVE-2005-3248 (fixed, remotely exploitable, medium urgency) Unspecified vulnerability in the X11 dissector in Ethereal 0.10.12 and ... installed: ethereal 0.10.12-6 (built from ethereal 0.10.12-6) fixed in unstable: ethereal 0.10.13-1 (source package) fix is available for the selected suite (sid) CVE-2005-3249 (fixed, remotely exploitable, medium urgency) Unspecified vulnerability in the WSP dissector in Ethereal 0.10.1 to ... installed: ethereal 0.10.12-6 (built from ethereal 0.10.12-6) fixed in unstable: ethereal 0.10.13-1 (source package) fix is available for the selected suite (sid) CVE-2005-3313 (remotely exploitable, medium urgency) The IRC protocol dissector in Ethereal 0.10.13 allows remote attackers ... installed: ethereal 0.10.12-6 (built from ethereal 0.10.12-6) CVE-2005-3651 (remotely exploitable, medium urgency) Stack-based buffer overflow in the dissect_ospf_v3_address_prefix ... installed: ethereal 0.10.12-6 (built from ethereal 0.10.12-6) fixed on branch: ethereal 0.10.10-2sarge4 (source package) CVE-2005-3184 (fixed, remotely exploitable, medium urgency) Buffer overflow vulnerability in the unicode_to_bytes in the Service ... installed: ethereal-common 0.10.12-6 (built from ethereal 0.10.12-6) fixed in unstable: ethereal 0.10.13-1 (source package) fix is available for the selected suite (sid) CVE-2005-3241 (fixed, remotely exploitable, medium urgency) Multiple vulnerabilities in Ethereal 0.10.12 and earlier allow remote ... installed: ethereal-common 0.10.12-6 (built from ethereal 0.10.12-6) fixed in unstable: ethereal 0.10.13-1 (source package) fix is available for the selected suite (sid) CVE-2005-3242 (fixed, remotely exploitable, medium urgency) Ethereal 0.10.12 and earlier allows remote attackers to cause a denial ... installed: ethereal-common 0.10.12-6 (built from ethereal 0.10.12-6) fixed in unstable: ethereal 0.10.13-1 (source package) fix is available for the selected suite (sid) CVE-2005-3243 (fixed, remotely exploitable, medium urgency) Multiple buffer overflows in Ethereal 0.10.12 and earlier might allow ... installed: ethereal-common 0.10.12-6 (built from ethereal 0.10.12-6) fixed in unstable: ethereal 0.10.13-1 (source package) fix is available for the selected suite (sid) CVE-2005-3244 (fixed, remotely exploitable, medium urgency) The BER dissector in Ethereal 0.10.3 to 0.10.12 allows remote ... installed: ethereal-common 0.10.12-6 (built from ethereal 0.10.12-6) fixed in unstable: ethereal 0.10.13-1 (source package) fix is available for the selected suite (sid) CVE-2005-3245 (fixed, remotely exploitable, medium urgency) Unspecified vulnerability in the ONC RPC dissector in Ethereal 0.10.3 ... installed: ethereal-common 0.10.12-6 (built from ethereal 0.10.12-6) fixed in unstable: ethereal 0.10.13-1 (source package) fix is available for the selected suite (sid) CVE-2005-3246 (fixed, remotely exploitable, medium urgency) Ethereal 0.10.12 and earlier allows remote attackers to cause a denial ... installed: ethereal-common 0.10.12-6 (built from ethereal 0.10.12-6) fixed in unstable: ethereal 0.10.13-1 (source package) fix is available for the selected suite (sid) CVE-2005-3247 (fixed, remotely exploitable, medium urgency) The SigComp UDVM in Ethereal 0.10.12 allows remote attackers to cause ... installed: ethereal-common 0.10.12-6 (built from ethereal 0.10.12-6) fixed in unstable: ethereal 0.10.13-1 (source package) fix is available for the selected suite (sid) CVE-2005-3248 (fixed, remotely exploitable, medium urgency) Unspecified vulnerability in the X11 dissector in Ethereal 0.10.12 and ... installed: ethereal-common 0.10.12-6 (built from ethereal 0.10.12-6) fixed in unstable: ethereal 0.10.13-1 (source package) fix is available for the selected suite (sid) CVE-2005-3249 (fixed, remotely exploitable, medium urgency) Unspecified vulnerability in the WSP dissector in Ethereal 0.10.1 to ... installed: ethereal-common 0.10.12-6 (built from ethereal 0.10.12-6) fixed in unstable: ethereal 0.10.13-1 (source package) fix is available for the selected suite (sid) CVE-2005-3313 (remotely exploitable, medium urgency) The IRC protocol dissector in Ethereal 0.10.13 allows remote attackers ... installed: ethereal-common 0.10.12-6 (built from ethereal 0.10.12-6) CVE-2005-3651 (remotely exploitable, medium urgency) Stack-based buffer overflow in the dissect_ospf_v3_address_prefix ... installed: ethereal-common 0.10.12-6 (built from ethereal 0.10.12-6) fixed on branch: ethereal 0.10.10-2sarge4 (source package) CVE-2005-3184 (fixed, remotely exploitable, medium urgency) Buffer overflow vulnerability in the unicode_to_bytes in the Service ... installed: tethereal 0.10.12-6 (built from ethereal 0.10.12-6) fixed in unstable: ethereal 0.10.13-1 (source package) fix is available for the selected suite (sid) CVE-2005-3241 (fixed, remotely exploitable, medium urgency) Multiple vulnerabilities in Ethereal 0.10.12 and earlier allow remote ... installed: tethereal 0.10.12-6 (built from ethereal 0.10.12-6) fixed in unstable: ethereal 0.10.13-1 (source package) fix is available for the selected suite (sid) CVE-2005-3242 (fixed, remotely exploitable, medium urgency) Ethereal 0.10.12 and earlier allows remote attackers to cause a denial ... installed: tethereal 0.10.12-6 (built from ethereal 0.10.12-6) fixed in unstable: ethereal 0.10.13-1 (source package) fix is available for the selected suite (sid) CVE-2005-3243 (fixed, remotely exploitable, medium urgency) Multiple buffer overflows in Ethereal 0.10.12 and earlier might allow ... installed: tethereal 0.10.12-6 (built from ethereal 0.10.12-6) fixed in unstable: ethereal 0.10.13-1 (source package) fix is available for the selected suite (sid) CVE-2005-3244 (fixed, remotely exploitable, medium urgency) The BER dissector in Ethereal 0.10.3 to 0.10.12 allows remote ... installed: tethereal 0.10.12-6 (built from ethereal 0.10.12-6) fixed in unstable: ethereal 0.10.13-1 (source package) fix is available for the selected suite (sid) CVE-2005-3245 (fixed, remotely exploitable, medium urgency) Unspecified vulnerability in the ONC RPC dissector in Ethereal 0.10.3 ... installed: tethereal 0.10.12-6 (built from ethereal 0.10.12-6) fixed in unstable: ethereal 0.10.13-1 (source package) fix is available for the selected suite (sid) CVE-2005-3246 (fixed, remotely exploitable, medium urgency) Ethereal 0.10.12 and earlier allows remote attackers to cause a denial ... installed: tethereal 0.10.12-6 (built from ethereal 0.10.12-6) fixed in unstable: ethereal 0.10.13-1 (source package) fix is available for the selected suite (sid) CVE-2005-3247 (fixed, remotely exploitable, medium urgency) The SigComp UDVM in Ethereal 0.10.12 allows remote attackers to cause ... installed: tethereal 0.10.12-6 (built from ethereal 0.10.12-6) fixed in unstable: ethereal 0.10.13-1 (source package) fix is available for the selected suite (sid) CVE-2005-3248 (fixed, remotely exploitable, medium urgency) Unspecified vulnerability in the X11 dissector in Ethereal 0.10.12 and ... installed: tethereal 0.10.12-6 (built from ethereal 0.10.12-6) fixed in unstable: ethereal 0.10.13-1 (source package) fix is available for the selected suite (sid) CVE-2005-3249 (fixed, remotely exploitable, medium urgency) Unspecified vulnerability in the WSP dissector in Ethereal 0.10.1 to ... installed: tethereal 0.10.12-6 (built from ethereal 0.10.12-6) fixed in unstable: ethereal 0.10.13-1 (source package) fix is available for the selected suite (sid) CVE-2005-3313 (remotely exploitable, medium urgency) The IRC protocol dissector in Ethereal 0.10.13 allows remote attackers ... installed: tethereal 0.10.12-6 (built from ethereal 0.10.12-6) CVE-2005-3651 (remotely exploitable, medium urgency) Stack-based buffer overflow in the dissect_ospf_v3_address_prefix ... installed: tethereal 0.10.12-6 (built from ethereal 0.10.12-6) fixed on branch: ethereal 0.10.10-2sarge4 (source package) debsecan-0.4.18/testsuite/002/out.report0000644000000000000000000000517012315633553014645 0ustar Security report based on the sid release *** Available security updates CVE-2005-3184 Buffer overflow vulnerability in the unicode_to_bytes... - ethereal, ethereal-common, tethereal (remotely exploitable, medium urgency) CVE-2005-3241 Multiple vulnerabilities in Ethereal 0.10.12 and... - ethereal, ethereal-common, tethereal (remotely exploitable, medium urgency) CVE-2005-3242 Ethereal 0.10.12 and earlier allows remote attackers... - ethereal, ethereal-common, tethereal (remotely exploitable, medium urgency) CVE-2005-3243 Multiple buffer overflows in Ethereal 0.10.12 and... - ethereal, ethereal-common, tethereal (remotely exploitable, medium urgency) CVE-2005-3244 The BER dissector in Ethereal 0.10.3 to 0.10.12... - ethereal, ethereal-common, tethereal (remotely exploitable, medium urgency) CVE-2005-3245 Unspecified vulnerability in the ONC RPC dissector in... - ethereal, ethereal-common, tethereal (remotely exploitable, medium urgency) CVE-2005-3246 Ethereal 0.10.12 and earlier allows remote attackers... - ethereal, ethereal-common, tethereal (remotely exploitable, medium urgency) CVE-2005-3247 The SigComp UDVM in Ethereal 0.10.12 allows remote... - ethereal, ethereal-common, tethereal (remotely exploitable, medium urgency) CVE-2005-3248 Unspecified vulnerability in the X11 dissector in... - ethereal, ethereal-common, tethereal (remotely exploitable, medium urgency) CVE-2005-3249 Unspecified vulnerability in the WSP dissector in... - ethereal, ethereal-common, tethereal (remotely exploitable, medium urgency) *** Vulnerabilities without updates CVE-2005-3313 The IRC protocol dissector in Ethereal 0.10.13 allows... - ethereal, ethereal-common, tethereal (remotely exploitable, medium urgency) CVE-2005-3651 Stack-based buffer overflow in the... - ethereal, ethereal-common, tethereal (remotely exploitable, medium urgency) debsecan-0.4.18/testsuite/002/exp.report0000644000000000000000000000517012315633545014633 0ustar Security report based on the sid release *** Available security updates CVE-2005-3184 Buffer overflow vulnerability in the unicode_to_bytes... - ethereal, ethereal-common, tethereal (remotely exploitable, medium urgency) CVE-2005-3241 Multiple vulnerabilities in Ethereal 0.10.12 and... - ethereal, ethereal-common, tethereal (remotely exploitable, medium urgency) CVE-2005-3242 Ethereal 0.10.12 and earlier allows remote attackers... - ethereal, ethereal-common, tethereal (remotely exploitable, medium urgency) CVE-2005-3243 Multiple buffer overflows in Ethereal 0.10.12 and... - ethereal, ethereal-common, tethereal (remotely exploitable, medium urgency) CVE-2005-3244 The BER dissector in Ethereal 0.10.3 to 0.10.12... - ethereal, ethereal-common, tethereal (remotely exploitable, medium urgency) CVE-2005-3245 Unspecified vulnerability in the ONC RPC dissector in... - ethereal, ethereal-common, tethereal (remotely exploitable, medium urgency) CVE-2005-3246 Ethereal 0.10.12 and earlier allows remote attackers... - ethereal, ethereal-common, tethereal (remotely exploitable, medium urgency) CVE-2005-3247 The SigComp UDVM in Ethereal 0.10.12 allows remote... - ethereal, ethereal-common, tethereal (remotely exploitable, medium urgency) CVE-2005-3248 Unspecified vulnerability in the X11 dissector in... - ethereal, ethereal-common, tethereal (remotely exploitable, medium urgency) CVE-2005-3249 Unspecified vulnerability in the WSP dissector in... - ethereal, ethereal-common, tethereal (remotely exploitable, medium urgency) *** Vulnerabilities without updates CVE-2005-3313 The IRC protocol dissector in Ethereal 0.10.13 allows... - ethereal, ethereal-common, tethereal (remotely exploitable, medium urgency) CVE-2005-3651 Stack-based buffer overflow in the... - ethereal, ethereal-common, tethereal (remotely exploitable, medium urgency) debsecan-0.4.18/testsuite/003/0000755000000000000000000000000012315633553012577 5ustar debsecan-0.4.18/testsuite/003/exp.bugs0000644000000000000000000000003412315633545014253 0ustar CVE-2005-3313 CVE-2005-3651 debsecan-0.4.18/testsuite/003/exp.detail0000644000000000000000000000263612315633545014567 0ustar CVE-2005-3313 (remotely exploitable, medium urgency) The IRC protocol dissector in Ethereal 0.10.13 allows remote attackers ... installed: ethereal 0.10.13-1 (built from ethereal 0.10.13-1) CVE-2005-3651 (remotely exploitable, medium urgency) Stack-based buffer overflow in the dissect_ospf_v3_address_prefix ... installed: ethereal 0.10.13-1 (built from ethereal 0.10.13-1) fixed on branch: ethereal 0.10.10-2sarge4 (source package) CVE-2005-3313 (remotely exploitable, medium urgency) The IRC protocol dissector in Ethereal 0.10.13 allows remote attackers ... installed: ethereal-common 0.10.13-1 (built from ethereal 0.10.13-1) CVE-2005-3651 (remotely exploitable, medium urgency) Stack-based buffer overflow in the dissect_ospf_v3_address_prefix ... installed: ethereal-common 0.10.13-1 (built from ethereal 0.10.13-1) fixed on branch: ethereal 0.10.10-2sarge4 (source package) CVE-2005-3313 (remotely exploitable, medium urgency) The IRC protocol dissector in Ethereal 0.10.13 allows remote attackers ... installed: tethereal 0.10.13-1 (built from ethereal 0.10.13-1) CVE-2005-3651 (remotely exploitable, medium urgency) Stack-based buffer overflow in the dissect_ospf_v3_address_prefix ... installed: tethereal 0.10.13-1 (built from ethereal 0.10.13-1) fixed on branch: ethereal 0.10.10-2sarge4 (source package) debsecan-0.4.18/testsuite/003/exp.packages0000644000000000000000000000004312315633545015071 0ustar ethereal ethereal-common tethereal debsecan-0.4.18/testsuite/003/exp.summary0000644000000000000000000000060412315633545015013 0ustar CVE-2005-3313 ethereal (remotely exploitable, medium urgency) CVE-2005-3313 ethereal-common (remotely exploitable, medium urgency) CVE-2005-3313 tethereal (remotely exploitable, medium urgency) CVE-2005-3651 ethereal (remotely exploitable, medium urgency) CVE-2005-3651 ethereal-common (remotely exploitable, medium urgency) CVE-2005-3651 tethereal (remotely exploitable, medium urgency) debsecan-0.4.18/testsuite/003/history0000644000000000000000000000175611004700541014216 0ustar VERSION 0 CVE-2005-3651,ethereal, CVE-2005-3313,ethereal, CVE-2005-3184,ethereal,F CVE-2005-3241,ethereal,F CVE-2005-3242,ethereal,F CVE-2005-3243,ethereal,F CVE-2005-3244,ethereal,F CVE-2005-3245,ethereal,F CVE-2005-3246,ethereal,F CVE-2005-3247,ethereal,F CVE-2005-3248,ethereal,F CVE-2005-3249,ethereal,F CVE-2005-3651,tethereal, CVE-2005-3313,tethereal, CVE-2005-3184,tethereal,F CVE-2005-3241,tethereal,F CVE-2005-3242,tethereal,F CVE-2005-3243,tethereal,F CVE-2005-3244,tethereal,F CVE-2005-3245,tethereal,F CVE-2005-3246,tethereal,F CVE-2005-3247,tethereal,F CVE-2005-3248,tethereal,F CVE-2005-3249,tethereal,F CVE-2005-3651,ethereal-common, CVE-2005-3313,ethereal-common, CVE-2005-3184,ethereal-common,F CVE-2005-3241,ethereal-common,F CVE-2005-3242,ethereal-common,F CVE-2005-3243,ethereal-common,F CVE-2005-3244,ethereal-common,F CVE-2005-3245,ethereal-common,F CVE-2005-3246,ethereal-common,F CVE-2005-3247,ethereal-common,F CVE-2005-3248,ethereal-common,F CVE-2005-3249,ethereal-common,F debsecan-0.4.18/testsuite/003/sid0000644000000000000000000000356011004700541013267 0ustar x͙[s8)֒|}I ƀ M_ن Hr(CGnGʧm4&4!D=C0.6AH*{*@AyOr9 qJhxE+n /Ӻ1F]#j9dW:Єh;F0%tJf쬖qCc؅- õn㲛T} y}+iğB<6-nh}nYk7a83t\K|DWzLF@~LR4dXo#GTWM>6cB}ݎ; n!De +]&nBv%RɕTT N`Ӽc7S0R;cPS]|K[ ٫tS*VP{`!Hz lCɓl╏-C8y)|c]S.֗Tqp%qpw{Uxn))nx6O?;koؚǗsU'o v4]pENiHm:ɚl%?ij|v|B,Plq7́Xl U43p>koMmht_Q/C /o򷬊JOWhkIQH6iIX-y&խLXaFí`47`-0=/ forxY ANE*f.7v\;+y ln)lnUsA@Q;ߑIKƗ3aGTۗ"$Q 5z\7-I# t$TAn4bSFg"zRȵ:7-/kTxvPn! aЭ vl܏]fG^M_(YA~j:"Rtqۇdy_n`4#lBJpo9V,Y$d~xn^bEݾ$ O1}P :BuwR$dӼv AZgJ]^d)ٱ颋*fVG<E򭆾yy4ܾ3?RS͟7CN /bhqElp%+y\߫{^%3{C'{uB2 W_ItJQ* D!>aS5 TBOZӣtU`pWVgrMH="h̀e1'ȑ\L!r̸8 &$7aɒlt\7a 94y拶Z,S†x +l`+|IFߕ5\-u5lS[jk m hkhcjkcjӘ^he%ytK(dlh*>utKttGǵtٖ|x /6aRlQm? e+v?Go= Architecture: i386 Version: 0.10.13-1 Depends: libadns1, libatk1.0-0 (>= 1.9.0), libc6 (>= 2.3.5-1), libcap1, libglib2.0-0 (>= 2.8.0), libgtk2.0-0 (>= 2.6.0), libpango1.0-0 (>= 1.8.2), libpcap0.8 (>= 0.9.3-1), libpcre3 (>= 4.5), zlib1g (>= 1:1.2.1), ethereal-common (= 0.10.13-1) Recommends: gksu Description: network traffic analyzer Ethereal is a network traffic analyzer, or "sniffer", for Unix and Unix-like operating systems. A sniffer is a tool used to capture packets off the wire. Ethereal decodes numerous protocols (too many to list). . This package provides ethereal (the GTK+ version) Package: ethereal-common Status: install ok installed Priority: optional Section: net Installed-Size: 20960 Maintainer: Frederic Peters Architecture: i386 Source: ethereal Version: 0.10.13-1 Depends: libc6 (>= 2.3.5-1), libcap1, libglib2.0-0 (>= 2.8.0), libpcre3 (>= 4.5), zlib1g (>= 1:1.2.1) Recommends: ethereal (>= 0.9.1-3) | tethereal (>= 0.9.1-3) Conflicts: ethereal (<< 0.9.1-3), tethereal (<< 0.9.1-3) Description: network traffic analyser (common files) Ethereal is a network traffic analyzer, or "sniffer", for Unix and Unix-like operating systems. A sniffer is a tool used to capture packets off the wire. Ethereal decodes numerous protocols (too many to list). . This package provides files common to both ethereal (the GTK+ version) and tethereal (the console version). Package: tethereal Status: install ok installed Priority: optional Section: net Installed-Size: 244 Maintainer: Frederic Peters Architecture: i386 Source: ethereal Version: 0.10.13-1 Depends: libadns1, libc6 (>= 2.3.5-1), libcap1, libglib2.0-0 (>= 2.8.0), libpcap0.8 (>= 0.9.3-1), libpcre3 (>= 4.5), zlib1g (>= 1:1.2.1), ethereal-common (= 0.10.13-1) Description: network traffic analyzer (console) Ethereal is a network traffic analyzer, or "sniffer", for Unix and Unix-like operating systems. A sniffer is a tool used to capture packets off the wire. Ethereal decodes numerous protocols (too many to list). . This package provides the console version of ethereal, named "tethereal". debsecan-0.4.18/testsuite/003/out.summary0000644000000000000000000000060412315633553015025 0ustar CVE-2005-3313 ethereal (remotely exploitable, medium urgency) CVE-2005-3313 ethereal-common (remotely exploitable, medium urgency) CVE-2005-3313 tethereal (remotely exploitable, medium urgency) CVE-2005-3651 ethereal (remotely exploitable, medium urgency) CVE-2005-3651 ethereal-common (remotely exploitable, medium urgency) CVE-2005-3651 tethereal (remotely exploitable, medium urgency) debsecan-0.4.18/testsuite/003/out.packages0000644000000000000000000000004312315633553015103 0ustar ethereal ethereal-common tethereal debsecan-0.4.18/testsuite/003/out.bugs0000644000000000000000000000003412315633553014265 0ustar CVE-2005-3313 CVE-2005-3651 debsecan-0.4.18/testsuite/003/out.detail0000644000000000000000000000263612315633553014601 0ustar CVE-2005-3313 (remotely exploitable, medium urgency) The IRC protocol dissector in Ethereal 0.10.13 allows remote attackers ... installed: ethereal 0.10.13-1 (built from ethereal 0.10.13-1) CVE-2005-3651 (remotely exploitable, medium urgency) Stack-based buffer overflow in the dissect_ospf_v3_address_prefix ... installed: ethereal 0.10.13-1 (built from ethereal 0.10.13-1) fixed on branch: ethereal 0.10.10-2sarge4 (source package) CVE-2005-3313 (remotely exploitable, medium urgency) The IRC protocol dissector in Ethereal 0.10.13 allows remote attackers ... installed: ethereal-common 0.10.13-1 (built from ethereal 0.10.13-1) CVE-2005-3651 (remotely exploitable, medium urgency) Stack-based buffer overflow in the dissect_ospf_v3_address_prefix ... installed: ethereal-common 0.10.13-1 (built from ethereal 0.10.13-1) fixed on branch: ethereal 0.10.10-2sarge4 (source package) CVE-2005-3313 (remotely exploitable, medium urgency) The IRC protocol dissector in Ethereal 0.10.13 allows remote attackers ... installed: tethereal 0.10.13-1 (built from ethereal 0.10.13-1) CVE-2005-3651 (remotely exploitable, medium urgency) Stack-based buffer overflow in the dissect_ospf_v3_address_prefix ... installed: tethereal 0.10.13-1 (built from ethereal 0.10.13-1) fixed on branch: ethereal 0.10.10-2sarge4 (source package) debsecan-0.4.18/testsuite/003/out.report0000644000000000000000000000334312315633553014646 0ustar Security report based on the sid release *** Fixed vulnerabilities CVE-2005-3184 - ethereal - ethereal-common - tethereal CVE-2005-3241 - ethereal - ethereal-common - tethereal CVE-2005-3242 - ethereal - ethereal-common - tethereal CVE-2005-3243 - ethereal - ethereal-common - tethereal CVE-2005-3244 - ethereal - ethereal-common - tethereal CVE-2005-3245 - ethereal - ethereal-common - tethereal CVE-2005-3246 - ethereal - ethereal-common - tethereal CVE-2005-3247 - ethereal - ethereal-common - tethereal CVE-2005-3248 - ethereal - ethereal-common - tethereal CVE-2005-3249 - ethereal - ethereal-common - tethereal *** Vulnerabilities without updates CVE-2005-3313 The IRC protocol dissector in Ethereal 0.10.13 allows... - ethereal, ethereal-common, tethereal (remotely exploitable, medium urgency) CVE-2005-3651 Stack-based buffer overflow in the... - ethereal, ethereal-common, tethereal (remotely exploitable, medium urgency) debsecan-0.4.18/testsuite/003/exp.report0000644000000000000000000000334312315633545014634 0ustar Security report based on the sid release *** Fixed vulnerabilities CVE-2005-3184 - ethereal - ethereal-common - tethereal CVE-2005-3241 - ethereal - ethereal-common - tethereal CVE-2005-3242 - ethereal - ethereal-common - tethereal CVE-2005-3243 - ethereal - ethereal-common - tethereal CVE-2005-3244 - ethereal - ethereal-common - tethereal CVE-2005-3245 - ethereal - ethereal-common - tethereal CVE-2005-3246 - ethereal - ethereal-common - tethereal CVE-2005-3247 - ethereal - ethereal-common - tethereal CVE-2005-3248 - ethereal - ethereal-common - tethereal CVE-2005-3249 - ethereal - ethereal-common - tethereal *** Vulnerabilities without updates CVE-2005-3313 The IRC protocol dissector in Ethereal 0.10.13 allows... - ethereal, ethereal-common, tethereal (remotely exploitable, medium urgency) CVE-2005-3651 Stack-based buffer overflow in the... - ethereal, ethereal-common, tethereal (remotely exploitable, medium urgency) debsecan-0.4.18/testsuite/004/0000755000000000000000000000000012315633553012600 5ustar debsecan-0.4.18/testsuite/004/exp.bugs0000644000000000000000000000001612315633545014254 0ustar CVE-2004-0175 debsecan-0.4.18/testsuite/004/exp.detail0000644000000000000000000000060012315633545014555 0ustar CVE-2004-0175 (remotely exploitable) Directory traversal vulnerability in scp for OpenSSH before 3.4p1 ... installed: openssh-server 1:4.2p1-5 (built from openssh 1:4.2p1-5) CVE-2004-0175 (remotely exploitable) Directory traversal vulnerability in scp for OpenSSH before 3.4p1 ... installed: openssh-client 1:4.2p1-5 (built from openssh 1:4.2p1-5) debsecan-0.4.18/testsuite/004/exp.packages0000644000000000000000000000003612315633545015074 0ustar openssh-client openssh-server debsecan-0.4.18/testsuite/004/exp.summary0000644000000000000000000000015012315633545015010 0ustar CVE-2004-0175 openssh-client (remotely exploitable) CVE-2004-0175 openssh-server (remotely exploitable) debsecan-0.4.18/testsuite/004/history0000644000000000000000000000011611004700541014204 0ustar VERSION 1 86400 CVE-2004-0175,openssh-client, CVE-2004-0175,openssh-server, debsecan-0.4.18/testsuite/004/sid0000644000000000000000000000022211004700541013260 0ustar xEA 0D9?@Rx-Bݧc7by3 40vjcLLIysIB! BDr#LX a܀ZT4R9x~H jH9~dǬn1=Q 9debsecan-0.4.18/testsuite/004/status0000644000000000000000000000701011004700541014026 0ustar Package: openssh-server Status: install ok installed Priority: optional Section: net Installed-Size: 448 Maintainer: Matthew Vernon Architecture: i386 Source: openssh Version: 1:4.2p1-5 Replaces: ssh (<< 1:3.8.1p1-9), openssh-client (<< 1:3.8.1p1-11), ssh-krb5 Provides: ssh-server Depends: libc6 (>= 2.3.5-1), libcomerr2 (>= 1.33-3), libkrb53 (>= 1.3.2), libpam0g (>= 0.76), libselinux1 (>= 1.26), libssl0.9.8, libwrap0, zlib1g (>= 1:1.2.1), debconf (>= 1.2.0) | debconf-2.0, libpam-runtime (>= 0.76-14), libpam-modules (>= 0.72-9), adduser (>= 3.9), dpkg (>= 1.9.0), openssh-client (= 1:4.2p1-5) Suggests: ssh-askpass, xbase-clients, rssh Conflicts: ssh (<< 1:3.8.1p1-9), ssh-nonfree (<< 2), ssh-socks, ssh2, sftp, rsh-client (<< 0.16.1-1), ssh-krb5 Conffiles: /etc/init.d/ssh 60c7f78120c01b393255eb7619886d96 /etc/default/ssh 500e3cf069fe9a7b9936108eb9d9c035 /etc/pam.d/ssh 19d07aa0f645d6d50e55d989761d9afa Description: Secure shell server, an rshd replacement This is the portable version of OpenSSH, a free implementation of the Secure Shell protocol as specified by the IETF secsh working group. . Ssh (Secure Shell) is a program for logging into a remote machine and for executing commands on a remote machine. It provides secure encrypted communications between two untrusted hosts over an insecure network. X11 connections and arbitrary TCP/IP ports can also be forwarded over the secure channel. It is intended as a replacement for rlogin, rsh and rcp, and can be used to provide applications with a secure communication channel. . This package provides the sshd server. . -------------------------------------------------------------------- . In some countries it may be illegal to use any encryption at all without a special permit. Package: openssh-client Status: install ok installed Priority: standard Section: net Installed-Size: 1172 Maintainer: Matthew Vernon Architecture: i386 Source: openssh Version: 1:4.2p1-5 Replaces: ssh (<< 1:3.8.1p1-9), ssh-krb5 Provides: rsh-client, ssh-client Depends: libc6 (>= 2.3.5-1), libcomerr2 (>= 1.33-3), libedit2 (>= 2.5.cvs.20010821-1), libkrb53 (>= 1.3.2), libncurses5 (>= 5.4-5), libselinux1 (>= 1.26), libssl0.9.8, zlib1g (>= 1:1.2.1), debconf (>= 1.2.0) | debconf-2.0, adduser (>= 3.10), dpkg (>= 1.7.0) Suggests: ssh-askpass, xbase-clients Conflicts: ssh (<< 1:3.8.1p1-9), sftp, rsh-client (<< 0.16.1-1), ssh-krb5 Conffiles: /etc/ssh/ssh_config 790070e72fb5a4ce36b50a151a2882a6 /etc/ssh/moduli d93b0dd7a654a68e39361caff3f3061e Description: Secure shell client, an rlogin/rsh/rcp replacement This is the portable version of OpenSSH, a free implementation of the Secure Shell protocol as specified by the IETF secsh working group. . Ssh (Secure Shell) is a program for logging into a remote machine and for executing commands on a remote machine. It provides secure encrypted communications between two untrusted hosts over an insecure network. X11 connections and arbitrary TCP/IP ports can also be forwarded over the secure channel. It is intended as a replacement for rlogin, rsh and rcp, and can be used to provide applications with a secure communication channel. . This package provides the ssh, scp and sftp clients, the ssh-agent and ssh-add programs to make public key authentication more convenient, and the ssh-keygen, ssh-keyscan, ssh-copy-id and ssh-argv0 utilities. . -------------------------------------------------------------------- . In some countries it may be illegal to use any encryption at all without a special permit. debsecan-0.4.18/testsuite/004/out.summary0000644000000000000000000000015012315633553015022 0ustar CVE-2004-0175 openssh-client (remotely exploitable) CVE-2004-0175 openssh-server (remotely exploitable) debsecan-0.4.18/testsuite/004/out.packages0000644000000000000000000000003612315633553015106 0ustar openssh-client openssh-server debsecan-0.4.18/testsuite/004/out.bugs0000644000000000000000000000001612315633553014266 0ustar CVE-2004-0175 debsecan-0.4.18/testsuite/004/out.detail0000644000000000000000000000060012315633553014567 0ustar CVE-2004-0175 (remotely exploitable) Directory traversal vulnerability in scp for OpenSSH before 3.4p1 ... installed: openssh-server 1:4.2p1-5 (built from openssh 1:4.2p1-5) CVE-2004-0175 (remotely exploitable) Directory traversal vulnerability in scp for OpenSSH before 3.4p1 ... installed: openssh-client 1:4.2p1-5 (built from openssh 1:4.2p1-5) debsecan-0.4.18/testsuite/004/out.report0000644000000000000000000000041612315633553014645 0ustar Security report based on the sid release *** Vulnerabilities without updates CVE-2004-0175 Directory traversal vulnerability in scp for OpenSSH... - openssh-server, openssh-client (remotely exploitable) debsecan-0.4.18/testsuite/004/exp.report0000644000000000000000000000041612315633545014633 0ustar Security report based on the sid release *** Vulnerabilities without updates CVE-2004-0175 Directory traversal vulnerability in scp for OpenSSH... - openssh-server, openssh-client (remotely exploitable) debsecan-0.4.18/testsuite/005/0000755000000000000000000000000012315633553012601 5ustar debsecan-0.4.18/testsuite/005/exp.bugs0000644000000000000000000000003412315633545014255 0ustar CVE-2005-0034 CVE-2005-0064 debsecan-0.4.18/testsuite/005/exp.detail0000644000000000000000000000237112315633545014565 0ustar CVE-2005-0034 (fixed, remotely exploitable) An "incorrect assumption" in the authvalidated validator function in ... installed: libisc7 1:9.3.0-1 (built from bind9 1:9.3.0-1) package is obsolete fixed in unstable: bind9 1:9.3.1 (source package) fixed on branch: bind9 1:9.2.1-2.woody.1 (source package) fixed on branch: bind9 1:9.2.1-2.woody.2 (source package) fixed on branch: bind9 1:9.2.4-1 (source package) fix is available for the selected suite (sid) CVE-2005-0034 (fixed, remotely exploitable) An "incorrect assumption" in the authvalidated validator function in ... installed: bind9 1:9.3.0-1 (built from bind9 1:9.3.0-1) fixed in unstable: bind9 1:9.3.1 (source package) fixed on branch: bind9 1:9.2.1-2.woody.1 (source package) fixed on branch: bind9 1:9.2.1-2.woody.2 (source package) fixed on branch: bind9 1:9.2.4-1 (source package) fix is available for the selected suite (sid) CVE-2005-0064 (fixed, remotely exploitable) Buffer overflow in the Decrypt::makeFileKey2 function installed: pdftohtml 0.36-10 (built from pdftohtml 0.36-10) fixed in unstable: pdftohtml 0.36-11 (source package) fix is available for the selected suite (sid) debsecan-0.4.18/testsuite/005/exp.packages0000644000000000000000000000003012315633545015067 0ustar bind9 libisc7 pdftohtml debsecan-0.4.18/testsuite/005/exp.summary0000644000000000000000000000024612315633545015017 0ustar CVE-2005-0034 bind9 (fixed, remotely exploitable) CVE-2005-0034 libisc7 (fixed, remotely exploitable, obsolete) CVE-2005-0064 pdftohtml (fixed, remotely exploitable) debsecan-0.4.18/testsuite/005/history0000644000000000000000000000012211004700541014202 0ustar VERSION 0 CVE-2005-0034,libisc7,F CVE-2005-0034,bind9,F CVE-2005-0064,pdftohtml,F debsecan-0.4.18/testsuite/005/sid0000644000000000000000000000040311004700541013262 0ustar xmKo0>d[CJ q~4V;#Q} B/3vggwyB{DHт⃶y/yUivڂXKPXwѢR*Y>))%=pʸ"XM%79߮,k+ Hl֐1=:1;'L|¦Ѭ*:6S Q G.K6M "3<\kЁ3ܒ34Fe?Udebsecan-0.4.18/testsuite/005/status0000644000000000000000000000312211004700541014027 0ustar Package: libisc7 Status: install ok installed Priority: standard Section: libs Installed-Size: 332 Maintainer: LaMont Jones Architecture: i386 Source: bind9 Version: 1:9.3.0-1 Replaces: libbind0 Depends: libc6 (>= 2.3.2.ds1-4) Conflicts: libbind0 Description: ISC Shared Library used by BIND The Berkeley Internet Name Domain (BIND) implements an Internet domain name server. BIND is the most widely-used name server software on the Internet, and is supported by the Internet Software Consortium, www.isc.org. . This package delivers the libisc shared library used by BIND's daemons and clients. Package: bind9 Status: install ok installed Priority: optional Section: net Installed-Size: 616 Maintainer: LaMont Jones Architecture: i386 Version: 1:9.3.0-1 Replaces: bind, dnsutils (<< 1:9.1.0-3) Depends: libbind9-0, libc6 (>= 2.3.5-1), libdns20, libisc9, libisccc0, libisccfg1, liblwres1, libssl0.9.8, netbase, adduser, libdns20 (= 1:9.3.1-2.0.1), libisccfg1 (= 1:9.3.1-2.0.1), libisc9 (= 1:9.3.1-2.0.1), libisccc0 (= 1:9.3.1-2.0.1) Suggests: dnsutils, bind9-doc Description: Internet Domain Name Server Package: pdftohtml Status: install ok installed Priority: optional Section: text Installed-Size: 696 Maintainer: Frederic Peters Architecture: i386 Version: 0.36-10 Depends: libc6 (>= 2.3.2.ds1-4), libgcc1 (>= 1:3.4.1-3), libstdc++5 (>= 1:3.3.4-1), gs Recommends: xpdf-common Filename: pool/main/p/pdftohtml/pdftohtml_0.36-11_i386.deb Size: 253142 MD5sum: 6db7eb4ac43616f355cf2ad8fc935865 Description: Translates pdf documents into html format debsecan-0.4.18/testsuite/005/out.summary0000644000000000000000000000024612315633553015031 0ustar CVE-2005-0034 bind9 (fixed, remotely exploitable) CVE-2005-0034 libisc7 (fixed, remotely exploitable, obsolete) CVE-2005-0064 pdftohtml (fixed, remotely exploitable) debsecan-0.4.18/testsuite/005/out.packages0000644000000000000000000000003012315633553015101 0ustar bind9 libisc7 pdftohtml debsecan-0.4.18/testsuite/005/out.bugs0000644000000000000000000000003412315633553014267 0ustar CVE-2005-0034 CVE-2005-0064 debsecan-0.4.18/testsuite/005/out.detail0000644000000000000000000000237112315633553014577 0ustar CVE-2005-0034 (fixed, remotely exploitable) An "incorrect assumption" in the authvalidated validator function in ... installed: libisc7 1:9.3.0-1 (built from bind9 1:9.3.0-1) package is obsolete fixed in unstable: bind9 1:9.3.1 (source package) fixed on branch: bind9 1:9.2.1-2.woody.1 (source package) fixed on branch: bind9 1:9.2.1-2.woody.2 (source package) fixed on branch: bind9 1:9.2.4-1 (source package) fix is available for the selected suite (sid) CVE-2005-0034 (fixed, remotely exploitable) An "incorrect assumption" in the authvalidated validator function in ... installed: bind9 1:9.3.0-1 (built from bind9 1:9.3.0-1) fixed in unstable: bind9 1:9.3.1 (source package) fixed on branch: bind9 1:9.2.1-2.woody.1 (source package) fixed on branch: bind9 1:9.2.1-2.woody.2 (source package) fixed on branch: bind9 1:9.2.4-1 (source package) fix is available for the selected suite (sid) CVE-2005-0064 (fixed, remotely exploitable) Buffer overflow in the Decrypt::makeFileKey2 function installed: pdftohtml 0.36-10 (built from pdftohtml 0.36-10) fixed in unstable: pdftohtml 0.36-11 (source package) fix is available for the selected suite (sid) debsecan-0.4.18/testsuite/005/out.report0000644000000000000000000000120412315633553014642 0ustar Security report based on the sid release *** Available security updates CVE-2005-0034 An "incorrect assumption" in the... - bind9 (remotely exploitable) - libisc7 (remotely exploitable, obsolete) CVE-2005-0064 Buffer overflow in the Decrypt::makeFileKey2 function - pdftohtml (remotely exploitable) Note that some packages were marked as obsolete. To deal with the vulnerabilities in them, you need to remove them. Before you can do this, you may have to upgrade other packages depending on them. debsecan-0.4.18/testsuite/005/exp.report0000644000000000000000000000120412315633545014630 0ustar Security report based on the sid release *** Available security updates CVE-2005-0034 An "incorrect assumption" in the... - bind9 (remotely exploitable) - libisc7 (remotely exploitable, obsolete) CVE-2005-0064 Buffer overflow in the Decrypt::makeFileKey2 function - pdftohtml (remotely exploitable) Note that some packages were marked as obsolete. To deal with the vulnerabilities in them, you need to remove them. Before you can do this, you may have to upgrade other packages depending on them. debsecan-0.4.18/testsuite/007/0000755000000000000000000000000012315633554012604 5ustar debsecan-0.4.18/testsuite/007/exp.bugs0000644000000000000000000000025012315633545014257 0ustar CVE-2005-3184 CVE-2005-3241 CVE-2005-3242 CVE-2005-3243 CVE-2005-3244 CVE-2005-3245 CVE-2005-3246 CVE-2005-3247 CVE-2005-3248 CVE-2005-3249 CVE-2005-3313 CVE-2005-3651 debsecan-0.4.18/testsuite/007/exp.detail0000644000000000000000000002547312315633545014577 0ustar CVE-2005-3184 (fixed, remotely exploitable, medium urgency) Buffer overflow vulnerability in the unicode_to_bytes in the Service ... installed: ethereal 0.10.12-6 (built from ethereal 0.10.12-6) fixed in unstable: ethereal 0.10.13-1 (source package) fix is available for the selected suite (sid) CVE-2005-3241 (fixed, remotely exploitable, medium urgency) Multiple vulnerabilities in Ethereal 0.10.12 and earlier allow remote ... installed: ethereal 0.10.12-6 (built from ethereal 0.10.12-6) fixed in unstable: ethereal 0.10.13-1 (source package) fix is available for the selected suite (sid) CVE-2005-3242 (fixed, remotely exploitable, medium urgency) Ethereal 0.10.12 and earlier allows remote attackers to cause a denial ... installed: ethereal 0.10.12-6 (built from ethereal 0.10.12-6) fixed in unstable: ethereal 0.10.13-1 (source package) fix is available for the selected suite (sid) CVE-2005-3243 (fixed, remotely exploitable, medium urgency) Multiple buffer overflows in Ethereal 0.10.12 and earlier might allow ... installed: ethereal 0.10.12-6 (built from ethereal 0.10.12-6) fixed in unstable: ethereal 0.10.13-1 (source package) fix is available for the selected suite (sid) CVE-2005-3244 (fixed, remotely exploitable, medium urgency) The BER dissector in Ethereal 0.10.3 to 0.10.12 allows remote ... installed: ethereal 0.10.12-6 (built from ethereal 0.10.12-6) fixed in unstable: ethereal 0.10.13-1 (source package) fix is available for the selected suite (sid) CVE-2005-3245 (fixed, remotely exploitable, medium urgency) Unspecified vulnerability in the ONC RPC dissector in Ethereal 0.10.3 ... installed: ethereal 0.10.12-6 (built from ethereal 0.10.12-6) fixed in unstable: ethereal 0.10.13-1 (source package) fix is available for the selected suite (sid) CVE-2005-3246 (fixed, remotely exploitable, medium urgency) Ethereal 0.10.12 and earlier allows remote attackers to cause a denial ... installed: ethereal 0.10.12-6 (built from ethereal 0.10.12-6) fixed in unstable: ethereal 0.10.13-1 (source package) fix is available for the selected suite (sid) CVE-2005-3247 (fixed, remotely exploitable, medium urgency) The SigComp UDVM in Ethereal 0.10.12 allows remote attackers to cause ... installed: ethereal 0.10.12-6 (built from ethereal 0.10.12-6) fixed in unstable: ethereal 0.10.13-1 (source package) fix is available for the selected suite (sid) CVE-2005-3248 (fixed, remotely exploitable, medium urgency) Unspecified vulnerability in the X11 dissector in Ethereal 0.10.12 and ... installed: ethereal 0.10.12-6 (built from ethereal 0.10.12-6) fixed in unstable: ethereal 0.10.13-1 (source package) fix is available for the selected suite (sid) CVE-2005-3249 (fixed, remotely exploitable, medium urgency) Unspecified vulnerability in the WSP dissector in Ethereal 0.10.1 to ... installed: ethereal 0.10.12-6 (built from ethereal 0.10.12-6) fixed in unstable: ethereal 0.10.13-1 (source package) fix is available for the selected suite (sid) CVE-2005-3313 (remotely exploitable, medium urgency) The IRC protocol dissector in Ethereal 0.10.13 allows remote attackers ... installed: ethereal 0.10.12-6 (built from ethereal 0.10.12-6) CVE-2005-3651 (remotely exploitable, medium urgency) Stack-based buffer overflow in the dissect_ospf_v3_address_prefix ... installed: ethereal 0.10.12-6 (built from ethereal 0.10.12-6) fixed on branch: ethereal 0.10.10-2sarge4 (source package) CVE-2005-3184 (fixed, remotely exploitable, medium urgency) Buffer overflow vulnerability in the unicode_to_bytes in the Service ... installed: ethereal-common 0.10.12-6 (built from ethereal 0.10.12-6) fixed in unstable: ethereal 0.10.13-1 (source package) fix is available for the selected suite (sid) CVE-2005-3241 (fixed, remotely exploitable, medium urgency) Multiple vulnerabilities in Ethereal 0.10.12 and earlier allow remote ... installed: ethereal-common 0.10.12-6 (built from ethereal 0.10.12-6) fixed in unstable: ethereal 0.10.13-1 (source package) fix is available for the selected suite (sid) CVE-2005-3242 (fixed, remotely exploitable, medium urgency) Ethereal 0.10.12 and earlier allows remote attackers to cause a denial ... installed: ethereal-common 0.10.12-6 (built from ethereal 0.10.12-6) fixed in unstable: ethereal 0.10.13-1 (source package) fix is available for the selected suite (sid) CVE-2005-3243 (fixed, remotely exploitable, medium urgency) Multiple buffer overflows in Ethereal 0.10.12 and earlier might allow ... installed: ethereal-common 0.10.12-6 (built from ethereal 0.10.12-6) fixed in unstable: ethereal 0.10.13-1 (source package) fix is available for the selected suite (sid) CVE-2005-3244 (fixed, remotely exploitable, medium urgency) The BER dissector in Ethereal 0.10.3 to 0.10.12 allows remote ... installed: ethereal-common 0.10.12-6 (built from ethereal 0.10.12-6) fixed in unstable: ethereal 0.10.13-1 (source package) fix is available for the selected suite (sid) CVE-2005-3245 (fixed, remotely exploitable, medium urgency) Unspecified vulnerability in the ONC RPC dissector in Ethereal 0.10.3 ... installed: ethereal-common 0.10.12-6 (built from ethereal 0.10.12-6) fixed in unstable: ethereal 0.10.13-1 (source package) fix is available for the selected suite (sid) CVE-2005-3246 (fixed, remotely exploitable, medium urgency) Ethereal 0.10.12 and earlier allows remote attackers to cause a denial ... installed: ethereal-common 0.10.12-6 (built from ethereal 0.10.12-6) fixed in unstable: ethereal 0.10.13-1 (source package) fix is available for the selected suite (sid) CVE-2005-3247 (fixed, remotely exploitable, medium urgency) The SigComp UDVM in Ethereal 0.10.12 allows remote attackers to cause ... installed: ethereal-common 0.10.12-6 (built from ethereal 0.10.12-6) fixed in unstable: ethereal 0.10.13-1 (source package) fix is available for the selected suite (sid) CVE-2005-3248 (fixed, remotely exploitable, medium urgency) Unspecified vulnerability in the X11 dissector in Ethereal 0.10.12 and ... installed: ethereal-common 0.10.12-6 (built from ethereal 0.10.12-6) fixed in unstable: ethereal 0.10.13-1 (source package) fix is available for the selected suite (sid) CVE-2005-3249 (fixed, remotely exploitable, medium urgency) Unspecified vulnerability in the WSP dissector in Ethereal 0.10.1 to ... installed: ethereal-common 0.10.12-6 (built from ethereal 0.10.12-6) fixed in unstable: ethereal 0.10.13-1 (source package) fix is available for the selected suite (sid) CVE-2005-3313 (remotely exploitable, medium urgency) The IRC protocol dissector in Ethereal 0.10.13 allows remote attackers ... installed: ethereal-common 0.10.12-6 (built from ethereal 0.10.12-6) CVE-2005-3651 (remotely exploitable, medium urgency) Stack-based buffer overflow in the dissect_ospf_v3_address_prefix ... installed: ethereal-common 0.10.12-6 (built from ethereal 0.10.12-6) fixed on branch: ethereal 0.10.10-2sarge4 (source package) CVE-2005-3184 (fixed, remotely exploitable, medium urgency) Buffer overflow vulnerability in the unicode_to_bytes in the Service ... installed: tethereal 0.10.12-6 (built from ethereal 0.10.12-6) fixed in unstable: ethereal 0.10.13-1 (source package) fix is available for the selected suite (sid) CVE-2005-3241 (fixed, remotely exploitable, medium urgency) Multiple vulnerabilities in Ethereal 0.10.12 and earlier allow remote ... installed: tethereal 0.10.12-6 (built from ethereal 0.10.12-6) fixed in unstable: ethereal 0.10.13-1 (source package) fix is available for the selected suite (sid) CVE-2005-3242 (fixed, remotely exploitable, medium urgency) Ethereal 0.10.12 and earlier allows remote attackers to cause a denial ... installed: tethereal 0.10.12-6 (built from ethereal 0.10.12-6) fixed in unstable: ethereal 0.10.13-1 (source package) fix is available for the selected suite (sid) CVE-2005-3243 (fixed, remotely exploitable, medium urgency) Multiple buffer overflows in Ethereal 0.10.12 and earlier might allow ... installed: tethereal 0.10.12-6 (built from ethereal 0.10.12-6) fixed in unstable: ethereal 0.10.13-1 (source package) fix is available for the selected suite (sid) CVE-2005-3244 (fixed, remotely exploitable, medium urgency) The BER dissector in Ethereal 0.10.3 to 0.10.12 allows remote ... installed: tethereal 0.10.12-6 (built from ethereal 0.10.12-6) fixed in unstable: ethereal 0.10.13-1 (source package) fix is available for the selected suite (sid) CVE-2005-3245 (fixed, remotely exploitable, medium urgency) Unspecified vulnerability in the ONC RPC dissector in Ethereal 0.10.3 ... installed: tethereal 0.10.12-6 (built from ethereal 0.10.12-6) fixed in unstable: ethereal 0.10.13-1 (source package) fix is available for the selected suite (sid) CVE-2005-3246 (fixed, remotely exploitable, medium urgency) Ethereal 0.10.12 and earlier allows remote attackers to cause a denial ... installed: tethereal 0.10.12-6 (built from ethereal 0.10.12-6) fixed in unstable: ethereal 0.10.13-1 (source package) fix is available for the selected suite (sid) CVE-2005-3247 (fixed, remotely exploitable, medium urgency) The SigComp UDVM in Ethereal 0.10.12 allows remote attackers to cause ... installed: tethereal 0.10.12-6 (built from ethereal 0.10.12-6) fixed in unstable: ethereal 0.10.13-1 (source package) fix is available for the selected suite (sid) CVE-2005-3248 (fixed, remotely exploitable, medium urgency) Unspecified vulnerability in the X11 dissector in Ethereal 0.10.12 and ... installed: tethereal 0.10.12-6 (built from ethereal 0.10.12-6) fixed in unstable: ethereal 0.10.13-1 (source package) fix is available for the selected suite (sid) CVE-2005-3249 (fixed, remotely exploitable, medium urgency) Unspecified vulnerability in the WSP dissector in Ethereal 0.10.1 to ... installed: tethereal 0.10.12-6 (built from ethereal 0.10.12-6) fixed in unstable: ethereal 0.10.13-1 (source package) fix is available for the selected suite (sid) CVE-2005-3313 (remotely exploitable, medium urgency) The IRC protocol dissector in Ethereal 0.10.13 allows remote attackers ... installed: tethereal 0.10.12-6 (built from ethereal 0.10.12-6) CVE-2005-3651 (remotely exploitable, medium urgency) Stack-based buffer overflow in the dissect_ospf_v3_address_prefix ... installed: tethereal 0.10.12-6 (built from ethereal 0.10.12-6) fixed on branch: ethereal 0.10.10-2sarge4 (source package) debsecan-0.4.18/testsuite/007/exp.packages0000644000000000000000000000004312315633545015075 0ustar ethereal ethereal-common tethereal debsecan-0.4.18/testsuite/007/exp.report0000644000000000000000000000516212315633545014641 0ustar Security report based on the sid release *** New security updates CVE-2005-3184 Buffer overflow vulnerability in the unicode_to_bytes... - ethereal, ethereal-common, tethereal (remotely exploitable, medium urgency) CVE-2005-3241 Multiple vulnerabilities in Ethereal 0.10.12 and... - ethereal, ethereal-common, tethereal (remotely exploitable, medium urgency) CVE-2005-3242 Ethereal 0.10.12 and earlier allows remote attackers... - ethereal, ethereal-common, tethereal (remotely exploitable, medium urgency) CVE-2005-3243 Multiple buffer overflows in Ethereal 0.10.12 and... - ethereal, ethereal-common, tethereal (remotely exploitable, medium urgency) CVE-2005-3244 The BER dissector in Ethereal 0.10.3 to 0.10.12... - ethereal, ethereal-common, tethereal (remotely exploitable, medium urgency) CVE-2005-3245 Unspecified vulnerability in the ONC RPC dissector in... - ethereal, ethereal-common, tethereal (remotely exploitable, medium urgency) CVE-2005-3246 Ethereal 0.10.12 and earlier allows remote attackers... - ethereal, ethereal-common, tethereal (remotely exploitable, medium urgency) CVE-2005-3247 The SigComp UDVM in Ethereal 0.10.12 allows remote... - ethereal, ethereal-common, tethereal (remotely exploitable, medium urgency) CVE-2005-3248 Unspecified vulnerability in the X11 dissector in... - ethereal, ethereal-common, tethereal (remotely exploitable, medium urgency) CVE-2005-3249 Unspecified vulnerability in the WSP dissector in... - ethereal, ethereal-common, tethereal (remotely exploitable, medium urgency) *** Vulnerabilities without updates CVE-2005-3313 The IRC protocol dissector in Ethereal 0.10.13 allows... - ethereal, ethereal-common, tethereal (remotely exploitable, medium urgency) CVE-2005-3651 Stack-based buffer overflow in the... - ethereal, ethereal-common, tethereal (remotely exploitable, medium urgency) debsecan-0.4.18/testsuite/007/exp.summary0000644000000000000000000000475212315633545015027 0ustar CVE-2005-3184 ethereal (fixed, remotely exploitable, medium urgency) CVE-2005-3184 ethereal-common (fixed, remotely exploitable, medium urgency) CVE-2005-3184 tethereal (fixed, remotely exploitable, medium urgency) CVE-2005-3241 ethereal (fixed, remotely exploitable, medium urgency) CVE-2005-3241 ethereal-common (fixed, remotely exploitable, medium urgency) CVE-2005-3241 tethereal (fixed, remotely exploitable, medium urgency) CVE-2005-3242 ethereal (fixed, remotely exploitable, medium urgency) CVE-2005-3242 ethereal-common (fixed, remotely exploitable, medium urgency) CVE-2005-3242 tethereal (fixed, remotely exploitable, medium urgency) CVE-2005-3243 ethereal (fixed, remotely exploitable, medium urgency) CVE-2005-3243 ethereal-common (fixed, remotely exploitable, medium urgency) CVE-2005-3243 tethereal (fixed, remotely exploitable, medium urgency) CVE-2005-3244 ethereal (fixed, remotely exploitable, medium urgency) CVE-2005-3244 ethereal-common (fixed, remotely exploitable, medium urgency) CVE-2005-3244 tethereal (fixed, remotely exploitable, medium urgency) CVE-2005-3245 ethereal (fixed, remotely exploitable, medium urgency) CVE-2005-3245 ethereal-common (fixed, remotely exploitable, medium urgency) CVE-2005-3245 tethereal (fixed, remotely exploitable, medium urgency) CVE-2005-3246 ethereal (fixed, remotely exploitable, medium urgency) CVE-2005-3246 ethereal-common (fixed, remotely exploitable, medium urgency) CVE-2005-3246 tethereal (fixed, remotely exploitable, medium urgency) CVE-2005-3247 ethereal (fixed, remotely exploitable, medium urgency) CVE-2005-3247 ethereal-common (fixed, remotely exploitable, medium urgency) CVE-2005-3247 tethereal (fixed, remotely exploitable, medium urgency) CVE-2005-3248 ethereal (fixed, remotely exploitable, medium urgency) CVE-2005-3248 ethereal-common (fixed, remotely exploitable, medium urgency) CVE-2005-3248 tethereal (fixed, remotely exploitable, medium urgency) CVE-2005-3249 ethereal (fixed, remotely exploitable, medium urgency) CVE-2005-3249 ethereal-common (fixed, remotely exploitable, medium urgency) CVE-2005-3249 tethereal (fixed, remotely exploitable, medium urgency) CVE-2005-3313 ethereal (remotely exploitable, medium urgency) CVE-2005-3313 ethereal-common (remotely exploitable, medium urgency) CVE-2005-3313 tethereal (remotely exploitable, medium urgency) CVE-2005-3651 ethereal (remotely exploitable, medium urgency) CVE-2005-3651 ethereal-common (remotely exploitable, medium urgency) CVE-2005-3651 tethereal (remotely exploitable, medium urgency) debsecan-0.4.18/testsuite/007/history0000644000000000000000000000026011004700541014207 0ustar VERSION 0 CVE-2005-3651,ethereal, CVE-2005-3313,ethereal, CVE-2005-3651,tethereal, CVE-2005-3313,tethereal, CVE-2005-3651,ethereal-common, CVE-2005-3313,ethereal-common, debsecan-0.4.18/testsuite/007/sid0000644000000000000000000000353611004700541013276 0ustar x͙Ms68uJ%~NV5̚$HD&UlЊ䐉} 6ތ< > z4Q4bAr=|ʞ `Pޓ+`tH.^F 'YI@\+ 902 hS MA_9IVKpzhyRdVf9XSq!mmVe^ ,ɒ)eJ)) @<ˋWW!㉍u03Mۻ,KPy.f<&|$+V+ע?٢V(\h4.LGz|w=̲9iٯȃ@7[,z^NvBsB٨TwϨ c5͞vP_0_gPcid7PA- )@fCXP@dIILLؤ2R~PY"+{eL}5 γ5WφwI}ٝN$cl[tɮ.:Єh;F0%4Y %BovVKɸ!1–EZtqEaކ>ĕw!k7l=~JKʂɬ͵0GlL;3{qMth $EC u6xJezt-lo8J,׭FrKDZ&2!Dvi|w@+u"*+M뎗܄* O&u͝HncXRn^VZ@*$DuUlCɓ,╏-C8y)zjc]S.֗Tqp%qp_6]_ o'oyNm uv.wK?ױ5/w.{vhŻ*yr4/ד5J~ga pNhM^N'w(N$=h3p>kϧ茖6]BoCB¨qח! /o򷬊JUOWh޽? ǒځ6ɟ|1mra;BZGzUSb;6 lA挃v̓DWW8/uFw`^g&ȲV ɮ6whnA%y}gŽ*/E !)(j"$ieo$[F2pAZAuI"hĖXD,ku_ oZ_FJ qT]"/ a;6{GpoQBR-&II&)'%W}^&M O]DEN#%Fd!Yޗ["jj?>\tk2K qXGguw#2hhLp;TPv~24-/۠YR2pYJvltQeS@r̊b'|HГIӈ;l hgvzoG?Z#om6pO.qON5ީzlw,:Z?3g~y8PGJ)r,MLB| jJ @GW u~g3'x Hf2#kM Pfav|N rdM`:0wOaE[G-)ZPaC턅6Kq$\ [ۢi[m-ֶv-11iL_[42֒S Architecture: i386 Version: 0.10.12-6 Depends: libadns1, libatk1.0-0 (>= 1.9.0), libc6 (>= 2.3.5-1), libcap1, libcomerr2 (>= 1.33-3), libglib2.0-0 (>= 2.8.0), libgtk2.0-0 (>= 2.6.0), libkrb53 (>= 1.3.2), libpango1.0-0 (>= 1.8.2), libpcap0.8 (>= 0.9.3-1), libpcre3 (>= 4.5), zlib1g (>= 1:1.2.1), ethereal-common (= 0.10.12-6) Recommends: gksu Description: network traffic analyzer Ethereal is a network traffic analyzer, or "sniffer", for Unix and Unix-like operating systems. A sniffer is a tool used to capture packets off the wire. Ethereal decodes numerous protocols (too many to list). . This package provides ethereal (the GTK+ version) Package: ethereal-common Status: install ok installed Priority: optional Section: net Installed-Size: 20320 Maintainer: Frederic Peters Architecture: i386 Source: ethereal Version: 0.10.12-6 Depends: libc6 (>= 2.3.5-1), libcap1, libglib2.0-0 (>= 2.8.0), libpcre3 (>= 4.5), zlib1g (>= 1:1.2.1) Recommends: ethereal (>= 0.9.1-3) | tethereal (>= 0.9.1-3) Conflicts: ethereal (<< 0.9.1-3), tethereal (<< 0.9.1-3) Description: network traffic analyser (common files) Ethereal is a network traffic analyzer, or "sniffer", for Unix and Unix-like operating systems. A sniffer is a tool used to capture packets off the wire. Ethereal decodes numerous protocols (too many to list). . This package provides files common to both ethereal (the GTK+ version) and tethereal (the console version). Package: tethereal Status: install ok installed Priority: optional Section: net Installed-Size: 240 Maintainer: Frederic Peters Architecture: i386 Source: ethereal Version: 0.10.12-6 Depends: libadns1, libc6 (>= 2.3.5-1), libcap1, libcomerr2 (>= 1.33-3), libglib2.0-0 (>= 2.8.0), libkrb53 (>= 1.3.2), libpcap0.8 (>= 0.9.3-1), libpcre3 (>= 4.5), zlib1g (>= 1:1.2.1), ethereal-common (= 0.10.12-6) Description: network traffic analyzer (console) Ethereal is a network traffic analyzer, or "sniffer", for Unix and Unix-like operating systems. A sniffer is a tool used to capture packets off the wire. Ethereal decodes numerous protocols (too many to list). . This package provides the console version of ethereal, named "tethereal". debsecan-0.4.18/testsuite/007/out.summary0000644000000000000000000000475212315633554015042 0ustar CVE-2005-3184 ethereal (fixed, remotely exploitable, medium urgency) CVE-2005-3184 ethereal-common (fixed, remotely exploitable, medium urgency) CVE-2005-3184 tethereal (fixed, remotely exploitable, medium urgency) CVE-2005-3241 ethereal (fixed, remotely exploitable, medium urgency) CVE-2005-3241 ethereal-common (fixed, remotely exploitable, medium urgency) CVE-2005-3241 tethereal (fixed, remotely exploitable, medium urgency) CVE-2005-3242 ethereal (fixed, remotely exploitable, medium urgency) CVE-2005-3242 ethereal-common (fixed, remotely exploitable, medium urgency) CVE-2005-3242 tethereal (fixed, remotely exploitable, medium urgency) CVE-2005-3243 ethereal (fixed, remotely exploitable, medium urgency) CVE-2005-3243 ethereal-common (fixed, remotely exploitable, medium urgency) CVE-2005-3243 tethereal (fixed, remotely exploitable, medium urgency) CVE-2005-3244 ethereal (fixed, remotely exploitable, medium urgency) CVE-2005-3244 ethereal-common (fixed, remotely exploitable, medium urgency) CVE-2005-3244 tethereal (fixed, remotely exploitable, medium urgency) CVE-2005-3245 ethereal (fixed, remotely exploitable, medium urgency) CVE-2005-3245 ethereal-common (fixed, remotely exploitable, medium urgency) CVE-2005-3245 tethereal (fixed, remotely exploitable, medium urgency) CVE-2005-3246 ethereal (fixed, remotely exploitable, medium urgency) CVE-2005-3246 ethereal-common (fixed, remotely exploitable, medium urgency) CVE-2005-3246 tethereal (fixed, remotely exploitable, medium urgency) CVE-2005-3247 ethereal (fixed, remotely exploitable, medium urgency) CVE-2005-3247 ethereal-common (fixed, remotely exploitable, medium urgency) CVE-2005-3247 tethereal (fixed, remotely exploitable, medium urgency) CVE-2005-3248 ethereal (fixed, remotely exploitable, medium urgency) CVE-2005-3248 ethereal-common (fixed, remotely exploitable, medium urgency) CVE-2005-3248 tethereal (fixed, remotely exploitable, medium urgency) CVE-2005-3249 ethereal (fixed, remotely exploitable, medium urgency) CVE-2005-3249 ethereal-common (fixed, remotely exploitable, medium urgency) CVE-2005-3249 tethereal (fixed, remotely exploitable, medium urgency) CVE-2005-3313 ethereal (remotely exploitable, medium urgency) CVE-2005-3313 ethereal-common (remotely exploitable, medium urgency) CVE-2005-3313 tethereal (remotely exploitable, medium urgency) CVE-2005-3651 ethereal (remotely exploitable, medium urgency) CVE-2005-3651 ethereal-common (remotely exploitable, medium urgency) CVE-2005-3651 tethereal (remotely exploitable, medium urgency) debsecan-0.4.18/testsuite/007/out.packages0000644000000000000000000000004312315633554015110 0ustar ethereal ethereal-common tethereal debsecan-0.4.18/testsuite/007/out.bugs0000644000000000000000000000025012315633554014272 0ustar CVE-2005-3184 CVE-2005-3241 CVE-2005-3242 CVE-2005-3243 CVE-2005-3244 CVE-2005-3245 CVE-2005-3246 CVE-2005-3247 CVE-2005-3248 CVE-2005-3249 CVE-2005-3313 CVE-2005-3651 debsecan-0.4.18/testsuite/007/out.detail0000644000000000000000000002547312315633554014612 0ustar CVE-2005-3184 (fixed, remotely exploitable, medium urgency) Buffer overflow vulnerability in the unicode_to_bytes in the Service ... installed: ethereal 0.10.12-6 (built from ethereal 0.10.12-6) fixed in unstable: ethereal 0.10.13-1 (source package) fix is available for the selected suite (sid) CVE-2005-3241 (fixed, remotely exploitable, medium urgency) Multiple vulnerabilities in Ethereal 0.10.12 and earlier allow remote ... installed: ethereal 0.10.12-6 (built from ethereal 0.10.12-6) fixed in unstable: ethereal 0.10.13-1 (source package) fix is available for the selected suite (sid) CVE-2005-3242 (fixed, remotely exploitable, medium urgency) Ethereal 0.10.12 and earlier allows remote attackers to cause a denial ... installed: ethereal 0.10.12-6 (built from ethereal 0.10.12-6) fixed in unstable: ethereal 0.10.13-1 (source package) fix is available for the selected suite (sid) CVE-2005-3243 (fixed, remotely exploitable, medium urgency) Multiple buffer overflows in Ethereal 0.10.12 and earlier might allow ... installed: ethereal 0.10.12-6 (built from ethereal 0.10.12-6) fixed in unstable: ethereal 0.10.13-1 (source package) fix is available for the selected suite (sid) CVE-2005-3244 (fixed, remotely exploitable, medium urgency) The BER dissector in Ethereal 0.10.3 to 0.10.12 allows remote ... installed: ethereal 0.10.12-6 (built from ethereal 0.10.12-6) fixed in unstable: ethereal 0.10.13-1 (source package) fix is available for the selected suite (sid) CVE-2005-3245 (fixed, remotely exploitable, medium urgency) Unspecified vulnerability in the ONC RPC dissector in Ethereal 0.10.3 ... installed: ethereal 0.10.12-6 (built from ethereal 0.10.12-6) fixed in unstable: ethereal 0.10.13-1 (source package) fix is available for the selected suite (sid) CVE-2005-3246 (fixed, remotely exploitable, medium urgency) Ethereal 0.10.12 and earlier allows remote attackers to cause a denial ... installed: ethereal 0.10.12-6 (built from ethereal 0.10.12-6) fixed in unstable: ethereal 0.10.13-1 (source package) fix is available for the selected suite (sid) CVE-2005-3247 (fixed, remotely exploitable, medium urgency) The SigComp UDVM in Ethereal 0.10.12 allows remote attackers to cause ... installed: ethereal 0.10.12-6 (built from ethereal 0.10.12-6) fixed in unstable: ethereal 0.10.13-1 (source package) fix is available for the selected suite (sid) CVE-2005-3248 (fixed, remotely exploitable, medium urgency) Unspecified vulnerability in the X11 dissector in Ethereal 0.10.12 and ... installed: ethereal 0.10.12-6 (built from ethereal 0.10.12-6) fixed in unstable: ethereal 0.10.13-1 (source package) fix is available for the selected suite (sid) CVE-2005-3249 (fixed, remotely exploitable, medium urgency) Unspecified vulnerability in the WSP dissector in Ethereal 0.10.1 to ... installed: ethereal 0.10.12-6 (built from ethereal 0.10.12-6) fixed in unstable: ethereal 0.10.13-1 (source package) fix is available for the selected suite (sid) CVE-2005-3313 (remotely exploitable, medium urgency) The IRC protocol dissector in Ethereal 0.10.13 allows remote attackers ... installed: ethereal 0.10.12-6 (built from ethereal 0.10.12-6) CVE-2005-3651 (remotely exploitable, medium urgency) Stack-based buffer overflow in the dissect_ospf_v3_address_prefix ... installed: ethereal 0.10.12-6 (built from ethereal 0.10.12-6) fixed on branch: ethereal 0.10.10-2sarge4 (source package) CVE-2005-3184 (fixed, remotely exploitable, medium urgency) Buffer overflow vulnerability in the unicode_to_bytes in the Service ... installed: ethereal-common 0.10.12-6 (built from ethereal 0.10.12-6) fixed in unstable: ethereal 0.10.13-1 (source package) fix is available for the selected suite (sid) CVE-2005-3241 (fixed, remotely exploitable, medium urgency) Multiple vulnerabilities in Ethereal 0.10.12 and earlier allow remote ... installed: ethereal-common 0.10.12-6 (built from ethereal 0.10.12-6) fixed in unstable: ethereal 0.10.13-1 (source package) fix is available for the selected suite (sid) CVE-2005-3242 (fixed, remotely exploitable, medium urgency) Ethereal 0.10.12 and earlier allows remote attackers to cause a denial ... installed: ethereal-common 0.10.12-6 (built from ethereal 0.10.12-6) fixed in unstable: ethereal 0.10.13-1 (source package) fix is available for the selected suite (sid) CVE-2005-3243 (fixed, remotely exploitable, medium urgency) Multiple buffer overflows in Ethereal 0.10.12 and earlier might allow ... installed: ethereal-common 0.10.12-6 (built from ethereal 0.10.12-6) fixed in unstable: ethereal 0.10.13-1 (source package) fix is available for the selected suite (sid) CVE-2005-3244 (fixed, remotely exploitable, medium urgency) The BER dissector in Ethereal 0.10.3 to 0.10.12 allows remote ... installed: ethereal-common 0.10.12-6 (built from ethereal 0.10.12-6) fixed in unstable: ethereal 0.10.13-1 (source package) fix is available for the selected suite (sid) CVE-2005-3245 (fixed, remotely exploitable, medium urgency) Unspecified vulnerability in the ONC RPC dissector in Ethereal 0.10.3 ... installed: ethereal-common 0.10.12-6 (built from ethereal 0.10.12-6) fixed in unstable: ethereal 0.10.13-1 (source package) fix is available for the selected suite (sid) CVE-2005-3246 (fixed, remotely exploitable, medium urgency) Ethereal 0.10.12 and earlier allows remote attackers to cause a denial ... installed: ethereal-common 0.10.12-6 (built from ethereal 0.10.12-6) fixed in unstable: ethereal 0.10.13-1 (source package) fix is available for the selected suite (sid) CVE-2005-3247 (fixed, remotely exploitable, medium urgency) The SigComp UDVM in Ethereal 0.10.12 allows remote attackers to cause ... installed: ethereal-common 0.10.12-6 (built from ethereal 0.10.12-6) fixed in unstable: ethereal 0.10.13-1 (source package) fix is available for the selected suite (sid) CVE-2005-3248 (fixed, remotely exploitable, medium urgency) Unspecified vulnerability in the X11 dissector in Ethereal 0.10.12 and ... installed: ethereal-common 0.10.12-6 (built from ethereal 0.10.12-6) fixed in unstable: ethereal 0.10.13-1 (source package) fix is available for the selected suite (sid) CVE-2005-3249 (fixed, remotely exploitable, medium urgency) Unspecified vulnerability in the WSP dissector in Ethereal 0.10.1 to ... installed: ethereal-common 0.10.12-6 (built from ethereal 0.10.12-6) fixed in unstable: ethereal 0.10.13-1 (source package) fix is available for the selected suite (sid) CVE-2005-3313 (remotely exploitable, medium urgency) The IRC protocol dissector in Ethereal 0.10.13 allows remote attackers ... installed: ethereal-common 0.10.12-6 (built from ethereal 0.10.12-6) CVE-2005-3651 (remotely exploitable, medium urgency) Stack-based buffer overflow in the dissect_ospf_v3_address_prefix ... installed: ethereal-common 0.10.12-6 (built from ethereal 0.10.12-6) fixed on branch: ethereal 0.10.10-2sarge4 (source package) CVE-2005-3184 (fixed, remotely exploitable, medium urgency) Buffer overflow vulnerability in the unicode_to_bytes in the Service ... installed: tethereal 0.10.12-6 (built from ethereal 0.10.12-6) fixed in unstable: ethereal 0.10.13-1 (source package) fix is available for the selected suite (sid) CVE-2005-3241 (fixed, remotely exploitable, medium urgency) Multiple vulnerabilities in Ethereal 0.10.12 and earlier allow remote ... installed: tethereal 0.10.12-6 (built from ethereal 0.10.12-6) fixed in unstable: ethereal 0.10.13-1 (source package) fix is available for the selected suite (sid) CVE-2005-3242 (fixed, remotely exploitable, medium urgency) Ethereal 0.10.12 and earlier allows remote attackers to cause a denial ... installed: tethereal 0.10.12-6 (built from ethereal 0.10.12-6) fixed in unstable: ethereal 0.10.13-1 (source package) fix is available for the selected suite (sid) CVE-2005-3243 (fixed, remotely exploitable, medium urgency) Multiple buffer overflows in Ethereal 0.10.12 and earlier might allow ... installed: tethereal 0.10.12-6 (built from ethereal 0.10.12-6) fixed in unstable: ethereal 0.10.13-1 (source package) fix is available for the selected suite (sid) CVE-2005-3244 (fixed, remotely exploitable, medium urgency) The BER dissector in Ethereal 0.10.3 to 0.10.12 allows remote ... installed: tethereal 0.10.12-6 (built from ethereal 0.10.12-6) fixed in unstable: ethereal 0.10.13-1 (source package) fix is available for the selected suite (sid) CVE-2005-3245 (fixed, remotely exploitable, medium urgency) Unspecified vulnerability in the ONC RPC dissector in Ethereal 0.10.3 ... installed: tethereal 0.10.12-6 (built from ethereal 0.10.12-6) fixed in unstable: ethereal 0.10.13-1 (source package) fix is available for the selected suite (sid) CVE-2005-3246 (fixed, remotely exploitable, medium urgency) Ethereal 0.10.12 and earlier allows remote attackers to cause a denial ... installed: tethereal 0.10.12-6 (built from ethereal 0.10.12-6) fixed in unstable: ethereal 0.10.13-1 (source package) fix is available for the selected suite (sid) CVE-2005-3247 (fixed, remotely exploitable, medium urgency) The SigComp UDVM in Ethereal 0.10.12 allows remote attackers to cause ... installed: tethereal 0.10.12-6 (built from ethereal 0.10.12-6) fixed in unstable: ethereal 0.10.13-1 (source package) fix is available for the selected suite (sid) CVE-2005-3248 (fixed, remotely exploitable, medium urgency) Unspecified vulnerability in the X11 dissector in Ethereal 0.10.12 and ... installed: tethereal 0.10.12-6 (built from ethereal 0.10.12-6) fixed in unstable: ethereal 0.10.13-1 (source package) fix is available for the selected suite (sid) CVE-2005-3249 (fixed, remotely exploitable, medium urgency) Unspecified vulnerability in the WSP dissector in Ethereal 0.10.1 to ... installed: tethereal 0.10.12-6 (built from ethereal 0.10.12-6) fixed in unstable: ethereal 0.10.13-1 (source package) fix is available for the selected suite (sid) CVE-2005-3313 (remotely exploitable, medium urgency) The IRC protocol dissector in Ethereal 0.10.13 allows remote attackers ... installed: tethereal 0.10.12-6 (built from ethereal 0.10.12-6) CVE-2005-3651 (remotely exploitable, medium urgency) Stack-based buffer overflow in the dissect_ospf_v3_address_prefix ... installed: tethereal 0.10.12-6 (built from ethereal 0.10.12-6) fixed on branch: ethereal 0.10.10-2sarge4 (source package) debsecan-0.4.18/testsuite/007/out.report0000644000000000000000000000516212315633554014654 0ustar Security report based on the sid release *** New security updates CVE-2005-3184 Buffer overflow vulnerability in the unicode_to_bytes... - ethereal, ethereal-common, tethereal (remotely exploitable, medium urgency) CVE-2005-3241 Multiple vulnerabilities in Ethereal 0.10.12 and... - ethereal, ethereal-common, tethereal (remotely exploitable, medium urgency) CVE-2005-3242 Ethereal 0.10.12 and earlier allows remote attackers... - ethereal, ethereal-common, tethereal (remotely exploitable, medium urgency) CVE-2005-3243 Multiple buffer overflows in Ethereal 0.10.12 and... - ethereal, ethereal-common, tethereal (remotely exploitable, medium urgency) CVE-2005-3244 The BER dissector in Ethereal 0.10.3 to 0.10.12... - ethereal, ethereal-common, tethereal (remotely exploitable, medium urgency) CVE-2005-3245 Unspecified vulnerability in the ONC RPC dissector in... - ethereal, ethereal-common, tethereal (remotely exploitable, medium urgency) CVE-2005-3246 Ethereal 0.10.12 and earlier allows remote attackers... - ethereal, ethereal-common, tethereal (remotely exploitable, medium urgency) CVE-2005-3247 The SigComp UDVM in Ethereal 0.10.12 allows remote... - ethereal, ethereal-common, tethereal (remotely exploitable, medium urgency) CVE-2005-3248 Unspecified vulnerability in the X11 dissector in... - ethereal, ethereal-common, tethereal (remotely exploitable, medium urgency) CVE-2005-3249 Unspecified vulnerability in the WSP dissector in... - ethereal, ethereal-common, tethereal (remotely exploitable, medium urgency) *** Vulnerabilities without updates CVE-2005-3313 The IRC protocol dissector in Ethereal 0.10.13 allows... - ethereal, ethereal-common, tethereal (remotely exploitable, medium urgency) CVE-2005-3651 Stack-based buffer overflow in the... - ethereal, ethereal-common, tethereal (remotely exploitable, medium urgency) debsecan-0.4.18/testsuite/008/0000755000000000000000000000000012315633554012605 5ustar debsecan-0.4.18/testsuite/008/exp.bugs0000644000000000000000000000043012315633545014260 0ustar CVE-2005-2360 CVE-2005-2361 CVE-2005-2362 CVE-2005-2363 CVE-2005-2364 CVE-2005-2365 CVE-2005-2366 CVE-2005-2367 CVE-2005-3184 CVE-2005-3241 CVE-2005-3242 CVE-2005-3243 CVE-2005-3244 CVE-2005-3245 CVE-2005-3246 CVE-2005-3247 CVE-2005-3248 CVE-2005-3249 CVE-2005-3313 CVE-2005-3651 debsecan-0.4.18/testsuite/008/exp.detail0000644000000000000000000003420512315633545014571 0ustar CVE-2005-3184 (remotely exploitable, medium urgency) Buffer overflow vulnerability in the unicode_to_bytes in the Service ... installed: ethereal 0.10.12-6 (built from ethereal 0.10.12-6) fixed in unstable: ethereal 0.10.13-1 (source package) CVE-2005-3241 (remotely exploitable, medium urgency) Multiple vulnerabilities in Ethereal 0.10.12 and earlier allow remote ... installed: ethereal 0.10.12-6 (built from ethereal 0.10.12-6) fixed in unstable: ethereal 0.10.13-1 (source package) CVE-2005-3242 (remotely exploitable, medium urgency) Ethereal 0.10.12 and earlier allows remote attackers to cause a denial ... installed: ethereal 0.10.12-6 (built from ethereal 0.10.12-6) fixed in unstable: ethereal 0.10.13-1 (source package) CVE-2005-3243 (remotely exploitable, medium urgency) Multiple buffer overflows in Ethereal 0.10.12 and earlier might allow ... installed: ethereal 0.10.12-6 (built from ethereal 0.10.12-6) fixed in unstable: ethereal 0.10.13-1 (source package) CVE-2005-3244 (remotely exploitable, medium urgency) The BER dissector in Ethereal 0.10.3 to 0.10.12 allows remote ... installed: ethereal 0.10.12-6 (built from ethereal 0.10.12-6) fixed in unstable: ethereal 0.10.13-1 (source package) CVE-2005-3245 (remotely exploitable, medium urgency) Unspecified vulnerability in the ONC RPC dissector in Ethereal 0.10.3 ... installed: ethereal 0.10.12-6 (built from ethereal 0.10.12-6) fixed in unstable: ethereal 0.10.13-1 (source package) CVE-2005-3246 (remotely exploitable, medium urgency) Ethereal 0.10.12 and earlier allows remote attackers to cause a denial ... installed: ethereal 0.10.12-6 (built from ethereal 0.10.12-6) fixed in unstable: ethereal 0.10.13-1 (source package) CVE-2005-3247 (remotely exploitable, medium urgency) The SigComp UDVM in Ethereal 0.10.12 allows remote attackers to cause ... installed: ethereal 0.10.12-6 (built from ethereal 0.10.12-6) fixed in unstable: ethereal 0.10.13-1 (source package) CVE-2005-3248 (remotely exploitable, medium urgency) Unspecified vulnerability in the X11 dissector in Ethereal 0.10.12 and ... installed: ethereal 0.10.12-6 (built from ethereal 0.10.12-6) fixed in unstable: ethereal 0.10.13-1 (source package) CVE-2005-3249 (remotely exploitable, medium urgency) Unspecified vulnerability in the WSP dissector in Ethereal 0.10.1 to ... installed: ethereal 0.10.12-6 (built from ethereal 0.10.12-6) fixed in unstable: ethereal 0.10.13-1 (source package) CVE-2005-3313 (remotely exploitable, medium urgency) The IRC protocol dissector in Ethereal 0.10.13 allows remote attackers ... installed: ethereal 0.10.12-6 (built from ethereal 0.10.12-6) CVE-2005-3651 (fixed, remotely exploitable, medium urgency) Stack-based buffer overflow in the dissect_ospf_v3_address_prefix ... installed: ethereal 0.10.12-6 (built from ethereal 0.10.12-6) fixed on branch: ethereal 0.10.10-2sarge3 (source package) fixed on branch: ethereal 0.10.10-2sarge4 (source package) fixed on branch: ethereal 0.9.4-1woody14 (source package) fix is available for the selected suite (sid) CVE-2005-2360 (fixed, remotely exploitable, low urgency) Unknown vulnerability in the LDAP dissector in Ethereal 0.8.5 through ... installed: ethereal-common 0.10.10-2sarge2 (built from ethereal 0.10.10-2sarge2) fixed in unstable: ethereal 0.10.12-1 (source package) fixed on branch: ethereal 0.10.10-2sarge3 (source package) fixed on branch: ethereal 0.10.10-2sarge4 (source package) fixed on branch: ethereal 0.9.4-1woody13 (source package) fixed on branch: ethereal 0.9.4-1woody14 (source package) fix is available for the selected suite (sid) CVE-2005-2361 (fixed, remotely exploitable, low urgency) Unknown vulnerability in the (1) AgentX dissector, (2) PER dissector, ... installed: ethereal-common 0.10.10-2sarge2 (built from ethereal 0.10.10-2sarge2) fixed in unstable: ethereal 0.10.12-1 (source package) fixed on branch: ethereal 0.10.10-2sarge3 (source package) fixed on branch: ethereal 0.10.10-2sarge4 (source package) fixed on branch: ethereal 0.9.4-1woody13 (source package) fixed on branch: ethereal 0.9.4-1woody14 (source package) fix is available for the selected suite (sid) CVE-2005-2362 (remotely exploitable, low urgency) Unknown vulnerability several dissectors in Ethereal 0.9.0 through ... installed: ethereal-common 0.10.10-2sarge2 (built from ethereal 0.10.10-2sarge2) fixed in unstable: ethereal 0.10.12-1 (source package) CVE-2005-2363 (fixed, remotely exploitable, low urgency) Unknown vulnerability in the (1) SMPP dissector, (2) 802.3 dissector, ... installed: ethereal-common 0.10.10-2sarge2 (built from ethereal 0.10.10-2sarge2) fixed in unstable: ethereal 0.10.12-1 (source package) fixed on branch: ethereal 0.10.10-2sarge3 (source package) fixed on branch: ethereal 0.10.10-2sarge4 (source package) fixed on branch: ethereal 0.9.4-1woody13 (source package) fixed on branch: ethereal 0.9.4-1woody14 (source package) fix is available for the selected suite (sid) CVE-2005-2364 (fixed, remotely exploitable, low urgency) Unknown vulnerability in the (1) GIOP dissector, (2) WBXML, or (3) ... installed: ethereal-common 0.10.10-2sarge2 (built from ethereal 0.10.10-2sarge2) fixed in unstable: ethereal 0.10.12-1 (source package) fixed on branch: ethereal 0.10.10-2sarge3 (source package) fixed on branch: ethereal 0.10.10-2sarge4 (source package) fixed on branch: ethereal 0.9.4-1woody13 (source package) fixed on branch: ethereal 0.9.4-1woody14 (source package) fix is available for the selected suite (sid) CVE-2005-2365 (fixed, remotely exploitable, low urgency) Unknown vulnerability in the SMB dissector in Ethereal 0.9.0 through ... installed: ethereal-common 0.10.10-2sarge2 (built from ethereal 0.10.10-2sarge2) fixed in unstable: ethereal 0.10.12-1 (source package) fixed on branch: ethereal 0.10.10-2sarge3 (source package) fixed on branch: ethereal 0.10.10-2sarge4 (source package) fixed on branch: ethereal 0.9.4-1woody13 (source package) fixed on branch: ethereal 0.9.4-1woody14 (source package) fix is available for the selected suite (sid) CVE-2005-2366 (fixed, remotely exploitable, low urgency) Unknown vulnerability in the BER dissector in Ethereal 0.10.11 allows ... installed: ethereal-common 0.10.10-2sarge2 (built from ethereal 0.10.10-2sarge2) fixed in unstable: ethereal 0.10.12-1 (source package) fixed on branch: ethereal 0.10.10-2sarge3 (source package) fixed on branch: ethereal 0.10.10-2sarge4 (source package) fixed on branch: ethereal 0.9.4-1woody13 (source package) fixed on branch: ethereal 0.9.4-1woody14 (source package) fix is available for the selected suite (sid) CVE-2005-2367 (fixed, remotely exploitable, medium urgency) Format string vulnerability in the proto_item_set_text function in ... installed: ethereal-common 0.10.10-2sarge2 (built from ethereal 0.10.10-2sarge2) fixed in unstable: ethereal 0.10.12-1 (source package) fixed on branch: ethereal 0.10.10-2sarge3 (source package) fixed on branch: ethereal 0.10.10-2sarge4 (source package) fixed on branch: ethereal 0.9.4-1woody13 (source package) fixed on branch: ethereal 0.9.4-1woody14 (source package) fix is available for the selected suite (sid) CVE-2005-3184 (remotely exploitable, medium urgency) Buffer overflow vulnerability in the unicode_to_bytes in the Service ... installed: ethereal-common 0.10.10-2sarge2 (built from ethereal 0.10.10-2sarge2) fixed in unstable: ethereal 0.10.13-1 (source package) CVE-2005-3241 (remotely exploitable, medium urgency) Multiple vulnerabilities in Ethereal 0.10.12 and earlier allow remote ... installed: ethereal-common 0.10.10-2sarge2 (built from ethereal 0.10.10-2sarge2) fixed in unstable: ethereal 0.10.13-1 (source package) CVE-2005-3242 (remotely exploitable, medium urgency) Ethereal 0.10.12 and earlier allows remote attackers to cause a denial ... installed: ethereal-common 0.10.10-2sarge2 (built from ethereal 0.10.10-2sarge2) fixed in unstable: ethereal 0.10.13-1 (source package) CVE-2005-3243 (remotely exploitable, medium urgency) Multiple buffer overflows in Ethereal 0.10.12 and earlier might allow ... installed: ethereal-common 0.10.10-2sarge2 (built from ethereal 0.10.10-2sarge2) fixed in unstable: ethereal 0.10.13-1 (source package) CVE-2005-3244 (remotely exploitable, medium urgency) The BER dissector in Ethereal 0.10.3 to 0.10.12 allows remote ... installed: ethereal-common 0.10.10-2sarge2 (built from ethereal 0.10.10-2sarge2) fixed in unstable: ethereal 0.10.13-1 (source package) CVE-2005-3245 (remotely exploitable, medium urgency) Unspecified vulnerability in the ONC RPC dissector in Ethereal 0.10.3 ... installed: ethereal-common 0.10.10-2sarge2 (built from ethereal 0.10.10-2sarge2) fixed in unstable: ethereal 0.10.13-1 (source package) CVE-2005-3246 (remotely exploitable, medium urgency) Ethereal 0.10.12 and earlier allows remote attackers to cause a denial ... installed: ethereal-common 0.10.10-2sarge2 (built from ethereal 0.10.10-2sarge2) fixed in unstable: ethereal 0.10.13-1 (source package) CVE-2005-3247 (remotely exploitable, medium urgency) The SigComp UDVM in Ethereal 0.10.12 allows remote attackers to cause ... installed: ethereal-common 0.10.10-2sarge2 (built from ethereal 0.10.10-2sarge2) fixed in unstable: ethereal 0.10.13-1 (source package) CVE-2005-3248 (remotely exploitable, medium urgency) Unspecified vulnerability in the X11 dissector in Ethereal 0.10.12 and ... installed: ethereal-common 0.10.10-2sarge2 (built from ethereal 0.10.10-2sarge2) fixed in unstable: ethereal 0.10.13-1 (source package) CVE-2005-3249 (remotely exploitable, medium urgency) Unspecified vulnerability in the WSP dissector in Ethereal 0.10.1 to ... installed: ethereal-common 0.10.10-2sarge2 (built from ethereal 0.10.10-2sarge2) fixed in unstable: ethereal 0.10.13-1 (source package) CVE-2005-3313 (remotely exploitable, medium urgency) The IRC protocol dissector in Ethereal 0.10.13 allows remote attackers ... installed: ethereal-common 0.10.10-2sarge2 (built from ethereal 0.10.10-2sarge2) CVE-2005-3651 (fixed, remotely exploitable, medium urgency) Stack-based buffer overflow in the dissect_ospf_v3_address_prefix ... installed: ethereal-common 0.10.10-2sarge2 (built from ethereal 0.10.10-2sarge2) fixed on branch: ethereal 0.10.10-2sarge3 (source package) fixed on branch: ethereal 0.10.10-2sarge4 (source package) fixed on branch: ethereal 0.9.4-1woody14 (source package) fix is available for the selected suite (sid) CVE-2005-3184 (remotely exploitable, medium urgency) Buffer overflow vulnerability in the unicode_to_bytes in the Service ... installed: tethereal 0.10.12-6 (built from ethereal 0.10.12-6) fixed in unstable: ethereal 0.10.13-1 (source package) CVE-2005-3241 (remotely exploitable, medium urgency) Multiple vulnerabilities in Ethereal 0.10.12 and earlier allow remote ... installed: tethereal 0.10.12-6 (built from ethereal 0.10.12-6) fixed in unstable: ethereal 0.10.13-1 (source package) CVE-2005-3242 (remotely exploitable, medium urgency) Ethereal 0.10.12 and earlier allows remote attackers to cause a denial ... installed: tethereal 0.10.12-6 (built from ethereal 0.10.12-6) fixed in unstable: ethereal 0.10.13-1 (source package) CVE-2005-3243 (remotely exploitable, medium urgency) Multiple buffer overflows in Ethereal 0.10.12 and earlier might allow ... installed: tethereal 0.10.12-6 (built from ethereal 0.10.12-6) fixed in unstable: ethereal 0.10.13-1 (source package) CVE-2005-3244 (remotely exploitable, medium urgency) The BER dissector in Ethereal 0.10.3 to 0.10.12 allows remote ... installed: tethereal 0.10.12-6 (built from ethereal 0.10.12-6) fixed in unstable: ethereal 0.10.13-1 (source package) CVE-2005-3245 (remotely exploitable, medium urgency) Unspecified vulnerability in the ONC RPC dissector in Ethereal 0.10.3 ... installed: tethereal 0.10.12-6 (built from ethereal 0.10.12-6) fixed in unstable: ethereal 0.10.13-1 (source package) CVE-2005-3246 (remotely exploitable, medium urgency) Ethereal 0.10.12 and earlier allows remote attackers to cause a denial ... installed: tethereal 0.10.12-6 (built from ethereal 0.10.12-6) fixed in unstable: ethereal 0.10.13-1 (source package) CVE-2005-3247 (remotely exploitable, medium urgency) The SigComp UDVM in Ethereal 0.10.12 allows remote attackers to cause ... installed: tethereal 0.10.12-6 (built from ethereal 0.10.12-6) fixed in unstable: ethereal 0.10.13-1 (source package) CVE-2005-3248 (remotely exploitable, medium urgency) Unspecified vulnerability in the X11 dissector in Ethereal 0.10.12 and ... installed: tethereal 0.10.12-6 (built from ethereal 0.10.12-6) fixed in unstable: ethereal 0.10.13-1 (source package) CVE-2005-3249 (remotely exploitable, medium urgency) Unspecified vulnerability in the WSP dissector in Ethereal 0.10.1 to ... installed: tethereal 0.10.12-6 (built from ethereal 0.10.12-6) fixed in unstable: ethereal 0.10.13-1 (source package) CVE-2005-3313 (remotely exploitable, medium urgency) The IRC protocol dissector in Ethereal 0.10.13 allows remote attackers ... installed: tethereal 0.10.12-6 (built from ethereal 0.10.12-6) CVE-2005-3651 (fixed, remotely exploitable, medium urgency) Stack-based buffer overflow in the dissect_ospf_v3_address_prefix ... installed: tethereal 0.10.12-6 (built from ethereal 0.10.12-6) fixed on branch: ethereal 0.10.10-2sarge3 (source package) fixed on branch: ethereal 0.10.10-2sarge4 (source package) fixed on branch: ethereal 0.9.4-1woody14 (source package) fix is available for the selected suite (sid) debsecan-0.4.18/testsuite/008/exp.packages0000644000000000000000000000004312315633545015076 0ustar ethereal ethereal-common tethereal debsecan-0.4.18/testsuite/008/exp.report0000644000000000000000000001011612315633545014635 0ustar Security report based on the sid release *** New security updates CVE-2005-2360 Unknown vulnerability in the LDAP dissector in... - ethereal-common (remotely exploitable, low urgency) CVE-2005-2361 Unknown vulnerability in the (1) AgentX dissector,... - ethereal-common (remotely exploitable, low urgency) CVE-2005-2363 Unknown vulnerability in the (1) SMPP dissector, (2)... - ethereal-common (remotely exploitable, low urgency) CVE-2005-2364 Unknown vulnerability in the (1) GIOP dissector, (2)... - ethereal-common (remotely exploitable, low urgency) CVE-2005-2365 Unknown vulnerability in the SMB dissector in... - ethereal-common (remotely exploitable, low urgency) CVE-2005-2366 Unknown vulnerability in the BER dissector in... - ethereal-common (remotely exploitable, low urgency) CVE-2005-2367 Format string vulnerability in the... - ethereal-common (remotely exploitable, medium urgency) CVE-2005-3651 Stack-based buffer overflow in the... - ethereal, ethereal-common, tethereal (remotely exploitable, medium urgency) *** New vulnerabilities CVE-2005-2362 Unknown vulnerability several dissectors in Ethereal... - ethereal-common (remotely exploitable, low urgency) CVE-2005-3184 Buffer overflow vulnerability in the unicode_to_bytes... - ethereal, ethereal-common, tethereal (remotely exploitable, medium urgency) CVE-2005-3241 Multiple vulnerabilities in Ethereal 0.10.12 and... - ethereal, ethereal-common, tethereal (remotely exploitable, medium urgency) CVE-2005-3242 Ethereal 0.10.12 and earlier allows remote attackers... - ethereal, ethereal-common, tethereal (remotely exploitable, medium urgency) CVE-2005-3243 Multiple buffer overflows in Ethereal 0.10.12 and... - ethereal, ethereal-common, tethereal (remotely exploitable, medium urgency) CVE-2005-3244 The BER dissector in Ethereal 0.10.3 to 0.10.12... - ethereal, ethereal-common, tethereal (remotely exploitable, medium urgency) CVE-2005-3245 Unspecified vulnerability in the ONC RPC dissector in... - ethereal, ethereal-common, tethereal (remotely exploitable, medium urgency) CVE-2005-3246 Ethereal 0.10.12 and earlier allows remote attackers... - ethereal, ethereal-common, tethereal (remotely exploitable, medium urgency) CVE-2005-3247 The SigComp UDVM in Ethereal 0.10.12 allows remote... - ethereal, ethereal-common, tethereal (remotely exploitable, medium urgency) CVE-2005-3248 Unspecified vulnerability in the X11 dissector in... - ethereal, ethereal-common, tethereal (remotely exploitable, medium urgency) CVE-2005-3249 Unspecified vulnerability in the WSP dissector in... - ethereal, ethereal-common, tethereal (remotely exploitable, medium urgency) *** Vulnerabilities without updates CVE-2005-3313 The IRC protocol dissector in Ethereal 0.10.13 allows... - ethereal, ethereal-common, tethereal (remotely exploitable, medium urgency) debsecan-0.4.18/testsuite/008/exp.summary0000644000000000000000000000556112315633545015027 0ustar CVE-2005-2360 ethereal-common (fixed, remotely exploitable, low urgency) CVE-2005-2361 ethereal-common (fixed, remotely exploitable, low urgency) CVE-2005-2362 ethereal-common (remotely exploitable, low urgency) CVE-2005-2363 ethereal-common (fixed, remotely exploitable, low urgency) CVE-2005-2364 ethereal-common (fixed, remotely exploitable, low urgency) CVE-2005-2365 ethereal-common (fixed, remotely exploitable, low urgency) CVE-2005-2366 ethereal-common (fixed, remotely exploitable, low urgency) CVE-2005-2367 ethereal-common (fixed, remotely exploitable, medium urgency) CVE-2005-3184 ethereal (remotely exploitable, medium urgency) CVE-2005-3184 ethereal-common (remotely exploitable, medium urgency) CVE-2005-3184 tethereal (remotely exploitable, medium urgency) CVE-2005-3241 ethereal (remotely exploitable, medium urgency) CVE-2005-3241 ethereal-common (remotely exploitable, medium urgency) CVE-2005-3241 tethereal (remotely exploitable, medium urgency) CVE-2005-3242 ethereal (remotely exploitable, medium urgency) CVE-2005-3242 ethereal-common (remotely exploitable, medium urgency) CVE-2005-3242 tethereal (remotely exploitable, medium urgency) CVE-2005-3243 ethereal (remotely exploitable, medium urgency) CVE-2005-3243 ethereal-common (remotely exploitable, medium urgency) CVE-2005-3243 tethereal (remotely exploitable, medium urgency) CVE-2005-3244 ethereal (remotely exploitable, medium urgency) CVE-2005-3244 ethereal-common (remotely exploitable, medium urgency) CVE-2005-3244 tethereal (remotely exploitable, medium urgency) CVE-2005-3245 ethereal (remotely exploitable, medium urgency) CVE-2005-3245 ethereal-common (remotely exploitable, medium urgency) CVE-2005-3245 tethereal (remotely exploitable, medium urgency) CVE-2005-3246 ethereal (remotely exploitable, medium urgency) CVE-2005-3246 ethereal-common (remotely exploitable, medium urgency) CVE-2005-3246 tethereal (remotely exploitable, medium urgency) CVE-2005-3247 ethereal (remotely exploitable, medium urgency) CVE-2005-3247 ethereal-common (remotely exploitable, medium urgency) CVE-2005-3247 tethereal (remotely exploitable, medium urgency) CVE-2005-3248 ethereal (remotely exploitable, medium urgency) CVE-2005-3248 ethereal-common (remotely exploitable, medium urgency) CVE-2005-3248 tethereal (remotely exploitable, medium urgency) CVE-2005-3249 ethereal (remotely exploitable, medium urgency) CVE-2005-3249 ethereal-common (remotely exploitable, medium urgency) CVE-2005-3249 tethereal (remotely exploitable, medium urgency) CVE-2005-3313 ethereal (remotely exploitable, medium urgency) CVE-2005-3313 ethereal-common (remotely exploitable, medium urgency) CVE-2005-3313 tethereal (remotely exploitable, medium urgency) CVE-2005-3651 ethereal (fixed, remotely exploitable, medium urgency) CVE-2005-3651 ethereal-common (fixed, remotely exploitable, medium urgency) CVE-2005-3651 tethereal (fixed, remotely exploitable, medium urgency) debsecan-0.4.18/testsuite/008/history0000644000000000000000000000026011004700541014210 0ustar VERSION 0 CVE-2005-3651,ethereal, CVE-2005-3313,ethereal, CVE-2005-3651,tethereal, CVE-2005-3313,tethereal, CVE-2005-3651,ethereal-common, CVE-2005-3313,ethereal-common, debsecan-0.4.18/testsuite/008/sid0000644000000000000000000000374611004700541013302 0ustar xݙ[s8)֒|}IM c@O&iӯ|!H2̦)∟::::R> 7O2M3= l\ $[Ӈ $#}o(Yeִ]ZE4J} C۔"hӯ$1VKpF(8ɼH386Blۆ1ޮx&Xǫ,dY廡.f$_"p4=n.*@^dquBhⱔ)YE/O_Jyx5zB7$fQN`vӓq`.H~5E\9ɿrٛ=҄pcҎ=eVQ#gZ3$}HN-g>^+p K={C}$?$!E|Dl0 /5MW&uxc6q:IYorIVDtZ@6Y!>~,Ӿ1Fո!MCEgsLhBL 3B7+Dhj)?>]20\fM 31!.U رk)Z϶G-nN&Wf"ޖrg r@E@QNDN0OMK$rs6n8ɡ`"x'ay֩TáT X7qPɠumݴjmpt$M7<6Y!Lnpp^dHUb!ľ8 bHҢ+rlΝ77J T%RѕT8TriiQW T'}PQ]]\݆Ji\K[ EBze ThjB9$z= lKɓל{A80p+Xה s\݉s\A7H rl8m8l=d0uq)p2A|9UM?+J+ vGB5~oZ7jڝ [5SJ/X鍷o iteQ.O /oⷴJy嘭]^M>|$ZVLK jIw'M2/ʹTq`RhA|n7{ˌb4ۅHŌܥ9Dkz?m-\MA.LA ]F@'pKX;Eu,_mKk>O_;uGG1"vtUI%`WIrE_KW"9$"p̖XDku_Zg_Ɨ(K @X0j76G`Q ͋qG^NMsRL 48**߃mS =.(YA~-'Uc=+2=Oɸ+mV*5>d7LSV;/fYXlAeKfe1?,LdqGd _cSnrLǚ{f l.[nr&Wn&_0{Q{c)lX}4K19y-zvߕ==ak{8֧֧C}zyQ_پmk;K 0cs^jPK4./%xeE V,VU<͗] r]Ϳdebsecan-0.4.18/testsuite/008/status0000644000000000000000000000450511004700541014040 0ustar Package: ethereal Status: install ok installed Priority: optional Section: net Installed-Size: 1264 Maintainer: Frederic Peters Architecture: i386 Version: 0.10.12-6 Depends: libadns1, libatk1.0-0 (>= 1.9.0), libc6 (>= 2.3.5-1), libcap1, libcomerr2 (>= 1.33-3), libglib2.0-0 (>= 2.8.0), libgtk2.0-0 (>= 2.6.0), libkrb53 (>= 1.3.2), libpango1.0-0 (>= 1.8.2), libpcap0.8 (>= 0.9.3-1), libpcre3 (>= 4.5), zlib1g (>= 1:1.2.1), ethereal-common (= 0.10.12-6) Recommends: gksu Description: network traffic analyzer Ethereal is a network traffic analyzer, or "sniffer", for Unix and Unix-like operating systems. A sniffer is a tool used to capture packets off the wire. Ethereal decodes numerous protocols (too many to list). . This package provides ethereal (the GTK+ version) Package: ethereal-common Status: install ok installed Priority: optional Section: net Installed-Size: 20320 Maintainer: Frederic Peters Architecture: i386 Source: ethereal Version: 0.10.10-2sarge2 Depends: libc6 (>= 2.3.5-1), libcap1, libglib2.0-0 (>= 2.8.0), libpcre3 (>= 4.5), zlib1g (>= 1:1.2.1) Recommends: ethereal (>= 0.9.1-3) | tethereal (>= 0.9.1-3) Conflicts: ethereal (<< 0.9.1-3), tethereal (<< 0.9.1-3) Description: network traffic analyser (common files) Ethereal is a network traffic analyzer, or "sniffer", for Unix and Unix-like operating systems. A sniffer is a tool used to capture packets off the wire. Ethereal decodes numerous protocols (too many to list). . This package provides files common to both ethereal (the GTK+ version) and tethereal (the console version). Package: tethereal Status: install ok installed Priority: optional Section: net Installed-Size: 240 Maintainer: Frederic Peters Architecture: i386 Source: ethereal Version: 0.10.12-6 Depends: libadns1, libc6 (>= 2.3.5-1), libcap1, libcomerr2 (>= 1.33-3), libglib2.0-0 (>= 2.8.0), libkrb53 (>= 1.3.2), libpcap0.8 (>= 0.9.3-1), libpcre3 (>= 4.5), zlib1g (>= 1:1.2.1), ethereal-common (= 0.10.12-6) Description: network traffic analyzer (console) Ethereal is a network traffic analyzer, or "sniffer", for Unix and Unix-like operating systems. A sniffer is a tool used to capture packets off the wire. Ethereal decodes numerous protocols (too many to list). . This package provides the console version of ethereal, named "tethereal". debsecan-0.4.18/testsuite/008/out.summary0000644000000000000000000000556112315633554015042 0ustar CVE-2005-2360 ethereal-common (fixed, remotely exploitable, low urgency) CVE-2005-2361 ethereal-common (fixed, remotely exploitable, low urgency) CVE-2005-2362 ethereal-common (remotely exploitable, low urgency) CVE-2005-2363 ethereal-common (fixed, remotely exploitable, low urgency) CVE-2005-2364 ethereal-common (fixed, remotely exploitable, low urgency) CVE-2005-2365 ethereal-common (fixed, remotely exploitable, low urgency) CVE-2005-2366 ethereal-common (fixed, remotely exploitable, low urgency) CVE-2005-2367 ethereal-common (fixed, remotely exploitable, medium urgency) CVE-2005-3184 ethereal (remotely exploitable, medium urgency) CVE-2005-3184 ethereal-common (remotely exploitable, medium urgency) CVE-2005-3184 tethereal (remotely exploitable, medium urgency) CVE-2005-3241 ethereal (remotely exploitable, medium urgency) CVE-2005-3241 ethereal-common (remotely exploitable, medium urgency) CVE-2005-3241 tethereal (remotely exploitable, medium urgency) CVE-2005-3242 ethereal (remotely exploitable, medium urgency) CVE-2005-3242 ethereal-common (remotely exploitable, medium urgency) CVE-2005-3242 tethereal (remotely exploitable, medium urgency) CVE-2005-3243 ethereal (remotely exploitable, medium urgency) CVE-2005-3243 ethereal-common (remotely exploitable, medium urgency) CVE-2005-3243 tethereal (remotely exploitable, medium urgency) CVE-2005-3244 ethereal (remotely exploitable, medium urgency) CVE-2005-3244 ethereal-common (remotely exploitable, medium urgency) CVE-2005-3244 tethereal (remotely exploitable, medium urgency) CVE-2005-3245 ethereal (remotely exploitable, medium urgency) CVE-2005-3245 ethereal-common (remotely exploitable, medium urgency) CVE-2005-3245 tethereal (remotely exploitable, medium urgency) CVE-2005-3246 ethereal (remotely exploitable, medium urgency) CVE-2005-3246 ethereal-common (remotely exploitable, medium urgency) CVE-2005-3246 tethereal (remotely exploitable, medium urgency) CVE-2005-3247 ethereal (remotely exploitable, medium urgency) CVE-2005-3247 ethereal-common (remotely exploitable, medium urgency) CVE-2005-3247 tethereal (remotely exploitable, medium urgency) CVE-2005-3248 ethereal (remotely exploitable, medium urgency) CVE-2005-3248 ethereal-common (remotely exploitable, medium urgency) CVE-2005-3248 tethereal (remotely exploitable, medium urgency) CVE-2005-3249 ethereal (remotely exploitable, medium urgency) CVE-2005-3249 ethereal-common (remotely exploitable, medium urgency) CVE-2005-3249 tethereal (remotely exploitable, medium urgency) CVE-2005-3313 ethereal (remotely exploitable, medium urgency) CVE-2005-3313 ethereal-common (remotely exploitable, medium urgency) CVE-2005-3313 tethereal (remotely exploitable, medium urgency) CVE-2005-3651 ethereal (fixed, remotely exploitable, medium urgency) CVE-2005-3651 ethereal-common (fixed, remotely exploitable, medium urgency) CVE-2005-3651 tethereal (fixed, remotely exploitable, medium urgency) debsecan-0.4.18/testsuite/008/out.packages0000644000000000000000000000004312315633554015111 0ustar ethereal ethereal-common tethereal debsecan-0.4.18/testsuite/008/out.bugs0000644000000000000000000000043012315633554014273 0ustar CVE-2005-2360 CVE-2005-2361 CVE-2005-2362 CVE-2005-2363 CVE-2005-2364 CVE-2005-2365 CVE-2005-2366 CVE-2005-2367 CVE-2005-3184 CVE-2005-3241 CVE-2005-3242 CVE-2005-3243 CVE-2005-3244 CVE-2005-3245 CVE-2005-3246 CVE-2005-3247 CVE-2005-3248 CVE-2005-3249 CVE-2005-3313 CVE-2005-3651 debsecan-0.4.18/testsuite/008/out.detail0000644000000000000000000003420512315633554014604 0ustar CVE-2005-3184 (remotely exploitable, medium urgency) Buffer overflow vulnerability in the unicode_to_bytes in the Service ... installed: ethereal 0.10.12-6 (built from ethereal 0.10.12-6) fixed in unstable: ethereal 0.10.13-1 (source package) CVE-2005-3241 (remotely exploitable, medium urgency) Multiple vulnerabilities in Ethereal 0.10.12 and earlier allow remote ... installed: ethereal 0.10.12-6 (built from ethereal 0.10.12-6) fixed in unstable: ethereal 0.10.13-1 (source package) CVE-2005-3242 (remotely exploitable, medium urgency) Ethereal 0.10.12 and earlier allows remote attackers to cause a denial ... installed: ethereal 0.10.12-6 (built from ethereal 0.10.12-6) fixed in unstable: ethereal 0.10.13-1 (source package) CVE-2005-3243 (remotely exploitable, medium urgency) Multiple buffer overflows in Ethereal 0.10.12 and earlier might allow ... installed: ethereal 0.10.12-6 (built from ethereal 0.10.12-6) fixed in unstable: ethereal 0.10.13-1 (source package) CVE-2005-3244 (remotely exploitable, medium urgency) The BER dissector in Ethereal 0.10.3 to 0.10.12 allows remote ... installed: ethereal 0.10.12-6 (built from ethereal 0.10.12-6) fixed in unstable: ethereal 0.10.13-1 (source package) CVE-2005-3245 (remotely exploitable, medium urgency) Unspecified vulnerability in the ONC RPC dissector in Ethereal 0.10.3 ... installed: ethereal 0.10.12-6 (built from ethereal 0.10.12-6) fixed in unstable: ethereal 0.10.13-1 (source package) CVE-2005-3246 (remotely exploitable, medium urgency) Ethereal 0.10.12 and earlier allows remote attackers to cause a denial ... installed: ethereal 0.10.12-6 (built from ethereal 0.10.12-6) fixed in unstable: ethereal 0.10.13-1 (source package) CVE-2005-3247 (remotely exploitable, medium urgency) The SigComp UDVM in Ethereal 0.10.12 allows remote attackers to cause ... installed: ethereal 0.10.12-6 (built from ethereal 0.10.12-6) fixed in unstable: ethereal 0.10.13-1 (source package) CVE-2005-3248 (remotely exploitable, medium urgency) Unspecified vulnerability in the X11 dissector in Ethereal 0.10.12 and ... installed: ethereal 0.10.12-6 (built from ethereal 0.10.12-6) fixed in unstable: ethereal 0.10.13-1 (source package) CVE-2005-3249 (remotely exploitable, medium urgency) Unspecified vulnerability in the WSP dissector in Ethereal 0.10.1 to ... installed: ethereal 0.10.12-6 (built from ethereal 0.10.12-6) fixed in unstable: ethereal 0.10.13-1 (source package) CVE-2005-3313 (remotely exploitable, medium urgency) The IRC protocol dissector in Ethereal 0.10.13 allows remote attackers ... installed: ethereal 0.10.12-6 (built from ethereal 0.10.12-6) CVE-2005-3651 (fixed, remotely exploitable, medium urgency) Stack-based buffer overflow in the dissect_ospf_v3_address_prefix ... installed: ethereal 0.10.12-6 (built from ethereal 0.10.12-6) fixed on branch: ethereal 0.10.10-2sarge3 (source package) fixed on branch: ethereal 0.10.10-2sarge4 (source package) fixed on branch: ethereal 0.9.4-1woody14 (source package) fix is available for the selected suite (sid) CVE-2005-2360 (fixed, remotely exploitable, low urgency) Unknown vulnerability in the LDAP dissector in Ethereal 0.8.5 through ... installed: ethereal-common 0.10.10-2sarge2 (built from ethereal 0.10.10-2sarge2) fixed in unstable: ethereal 0.10.12-1 (source package) fixed on branch: ethereal 0.10.10-2sarge3 (source package) fixed on branch: ethereal 0.10.10-2sarge4 (source package) fixed on branch: ethereal 0.9.4-1woody13 (source package) fixed on branch: ethereal 0.9.4-1woody14 (source package) fix is available for the selected suite (sid) CVE-2005-2361 (fixed, remotely exploitable, low urgency) Unknown vulnerability in the (1) AgentX dissector, (2) PER dissector, ... installed: ethereal-common 0.10.10-2sarge2 (built from ethereal 0.10.10-2sarge2) fixed in unstable: ethereal 0.10.12-1 (source package) fixed on branch: ethereal 0.10.10-2sarge3 (source package) fixed on branch: ethereal 0.10.10-2sarge4 (source package) fixed on branch: ethereal 0.9.4-1woody13 (source package) fixed on branch: ethereal 0.9.4-1woody14 (source package) fix is available for the selected suite (sid) CVE-2005-2362 (remotely exploitable, low urgency) Unknown vulnerability several dissectors in Ethereal 0.9.0 through ... installed: ethereal-common 0.10.10-2sarge2 (built from ethereal 0.10.10-2sarge2) fixed in unstable: ethereal 0.10.12-1 (source package) CVE-2005-2363 (fixed, remotely exploitable, low urgency) Unknown vulnerability in the (1) SMPP dissector, (2) 802.3 dissector, ... installed: ethereal-common 0.10.10-2sarge2 (built from ethereal 0.10.10-2sarge2) fixed in unstable: ethereal 0.10.12-1 (source package) fixed on branch: ethereal 0.10.10-2sarge3 (source package) fixed on branch: ethereal 0.10.10-2sarge4 (source package) fixed on branch: ethereal 0.9.4-1woody13 (source package) fixed on branch: ethereal 0.9.4-1woody14 (source package) fix is available for the selected suite (sid) CVE-2005-2364 (fixed, remotely exploitable, low urgency) Unknown vulnerability in the (1) GIOP dissector, (2) WBXML, or (3) ... installed: ethereal-common 0.10.10-2sarge2 (built from ethereal 0.10.10-2sarge2) fixed in unstable: ethereal 0.10.12-1 (source package) fixed on branch: ethereal 0.10.10-2sarge3 (source package) fixed on branch: ethereal 0.10.10-2sarge4 (source package) fixed on branch: ethereal 0.9.4-1woody13 (source package) fixed on branch: ethereal 0.9.4-1woody14 (source package) fix is available for the selected suite (sid) CVE-2005-2365 (fixed, remotely exploitable, low urgency) Unknown vulnerability in the SMB dissector in Ethereal 0.9.0 through ... installed: ethereal-common 0.10.10-2sarge2 (built from ethereal 0.10.10-2sarge2) fixed in unstable: ethereal 0.10.12-1 (source package) fixed on branch: ethereal 0.10.10-2sarge3 (source package) fixed on branch: ethereal 0.10.10-2sarge4 (source package) fixed on branch: ethereal 0.9.4-1woody13 (source package) fixed on branch: ethereal 0.9.4-1woody14 (source package) fix is available for the selected suite (sid) CVE-2005-2366 (fixed, remotely exploitable, low urgency) Unknown vulnerability in the BER dissector in Ethereal 0.10.11 allows ... installed: ethereal-common 0.10.10-2sarge2 (built from ethereal 0.10.10-2sarge2) fixed in unstable: ethereal 0.10.12-1 (source package) fixed on branch: ethereal 0.10.10-2sarge3 (source package) fixed on branch: ethereal 0.10.10-2sarge4 (source package) fixed on branch: ethereal 0.9.4-1woody13 (source package) fixed on branch: ethereal 0.9.4-1woody14 (source package) fix is available for the selected suite (sid) CVE-2005-2367 (fixed, remotely exploitable, medium urgency) Format string vulnerability in the proto_item_set_text function in ... installed: ethereal-common 0.10.10-2sarge2 (built from ethereal 0.10.10-2sarge2) fixed in unstable: ethereal 0.10.12-1 (source package) fixed on branch: ethereal 0.10.10-2sarge3 (source package) fixed on branch: ethereal 0.10.10-2sarge4 (source package) fixed on branch: ethereal 0.9.4-1woody13 (source package) fixed on branch: ethereal 0.9.4-1woody14 (source package) fix is available for the selected suite (sid) CVE-2005-3184 (remotely exploitable, medium urgency) Buffer overflow vulnerability in the unicode_to_bytes in the Service ... installed: ethereal-common 0.10.10-2sarge2 (built from ethereal 0.10.10-2sarge2) fixed in unstable: ethereal 0.10.13-1 (source package) CVE-2005-3241 (remotely exploitable, medium urgency) Multiple vulnerabilities in Ethereal 0.10.12 and earlier allow remote ... installed: ethereal-common 0.10.10-2sarge2 (built from ethereal 0.10.10-2sarge2) fixed in unstable: ethereal 0.10.13-1 (source package) CVE-2005-3242 (remotely exploitable, medium urgency) Ethereal 0.10.12 and earlier allows remote attackers to cause a denial ... installed: ethereal-common 0.10.10-2sarge2 (built from ethereal 0.10.10-2sarge2) fixed in unstable: ethereal 0.10.13-1 (source package) CVE-2005-3243 (remotely exploitable, medium urgency) Multiple buffer overflows in Ethereal 0.10.12 and earlier might allow ... installed: ethereal-common 0.10.10-2sarge2 (built from ethereal 0.10.10-2sarge2) fixed in unstable: ethereal 0.10.13-1 (source package) CVE-2005-3244 (remotely exploitable, medium urgency) The BER dissector in Ethereal 0.10.3 to 0.10.12 allows remote ... installed: ethereal-common 0.10.10-2sarge2 (built from ethereal 0.10.10-2sarge2) fixed in unstable: ethereal 0.10.13-1 (source package) CVE-2005-3245 (remotely exploitable, medium urgency) Unspecified vulnerability in the ONC RPC dissector in Ethereal 0.10.3 ... installed: ethereal-common 0.10.10-2sarge2 (built from ethereal 0.10.10-2sarge2) fixed in unstable: ethereal 0.10.13-1 (source package) CVE-2005-3246 (remotely exploitable, medium urgency) Ethereal 0.10.12 and earlier allows remote attackers to cause a denial ... installed: ethereal-common 0.10.10-2sarge2 (built from ethereal 0.10.10-2sarge2) fixed in unstable: ethereal 0.10.13-1 (source package) CVE-2005-3247 (remotely exploitable, medium urgency) The SigComp UDVM in Ethereal 0.10.12 allows remote attackers to cause ... installed: ethereal-common 0.10.10-2sarge2 (built from ethereal 0.10.10-2sarge2) fixed in unstable: ethereal 0.10.13-1 (source package) CVE-2005-3248 (remotely exploitable, medium urgency) Unspecified vulnerability in the X11 dissector in Ethereal 0.10.12 and ... installed: ethereal-common 0.10.10-2sarge2 (built from ethereal 0.10.10-2sarge2) fixed in unstable: ethereal 0.10.13-1 (source package) CVE-2005-3249 (remotely exploitable, medium urgency) Unspecified vulnerability in the WSP dissector in Ethereal 0.10.1 to ... installed: ethereal-common 0.10.10-2sarge2 (built from ethereal 0.10.10-2sarge2) fixed in unstable: ethereal 0.10.13-1 (source package) CVE-2005-3313 (remotely exploitable, medium urgency) The IRC protocol dissector in Ethereal 0.10.13 allows remote attackers ... installed: ethereal-common 0.10.10-2sarge2 (built from ethereal 0.10.10-2sarge2) CVE-2005-3651 (fixed, remotely exploitable, medium urgency) Stack-based buffer overflow in the dissect_ospf_v3_address_prefix ... installed: ethereal-common 0.10.10-2sarge2 (built from ethereal 0.10.10-2sarge2) fixed on branch: ethereal 0.10.10-2sarge3 (source package) fixed on branch: ethereal 0.10.10-2sarge4 (source package) fixed on branch: ethereal 0.9.4-1woody14 (source package) fix is available for the selected suite (sid) CVE-2005-3184 (remotely exploitable, medium urgency) Buffer overflow vulnerability in the unicode_to_bytes in the Service ... installed: tethereal 0.10.12-6 (built from ethereal 0.10.12-6) fixed in unstable: ethereal 0.10.13-1 (source package) CVE-2005-3241 (remotely exploitable, medium urgency) Multiple vulnerabilities in Ethereal 0.10.12 and earlier allow remote ... installed: tethereal 0.10.12-6 (built from ethereal 0.10.12-6) fixed in unstable: ethereal 0.10.13-1 (source package) CVE-2005-3242 (remotely exploitable, medium urgency) Ethereal 0.10.12 and earlier allows remote attackers to cause a denial ... installed: tethereal 0.10.12-6 (built from ethereal 0.10.12-6) fixed in unstable: ethereal 0.10.13-1 (source package) CVE-2005-3243 (remotely exploitable, medium urgency) Multiple buffer overflows in Ethereal 0.10.12 and earlier might allow ... installed: tethereal 0.10.12-6 (built from ethereal 0.10.12-6) fixed in unstable: ethereal 0.10.13-1 (source package) CVE-2005-3244 (remotely exploitable, medium urgency) The BER dissector in Ethereal 0.10.3 to 0.10.12 allows remote ... installed: tethereal 0.10.12-6 (built from ethereal 0.10.12-6) fixed in unstable: ethereal 0.10.13-1 (source package) CVE-2005-3245 (remotely exploitable, medium urgency) Unspecified vulnerability in the ONC RPC dissector in Ethereal 0.10.3 ... installed: tethereal 0.10.12-6 (built from ethereal 0.10.12-6) fixed in unstable: ethereal 0.10.13-1 (source package) CVE-2005-3246 (remotely exploitable, medium urgency) Ethereal 0.10.12 and earlier allows remote attackers to cause a denial ... installed: tethereal 0.10.12-6 (built from ethereal 0.10.12-6) fixed in unstable: ethereal 0.10.13-1 (source package) CVE-2005-3247 (remotely exploitable, medium urgency) The SigComp UDVM in Ethereal 0.10.12 allows remote attackers to cause ... installed: tethereal 0.10.12-6 (built from ethereal 0.10.12-6) fixed in unstable: ethereal 0.10.13-1 (source package) CVE-2005-3248 (remotely exploitable, medium urgency) Unspecified vulnerability in the X11 dissector in Ethereal 0.10.12 and ... installed: tethereal 0.10.12-6 (built from ethereal 0.10.12-6) fixed in unstable: ethereal 0.10.13-1 (source package) CVE-2005-3249 (remotely exploitable, medium urgency) Unspecified vulnerability in the WSP dissector in Ethereal 0.10.1 to ... installed: tethereal 0.10.12-6 (built from ethereal 0.10.12-6) fixed in unstable: ethereal 0.10.13-1 (source package) CVE-2005-3313 (remotely exploitable, medium urgency) The IRC protocol dissector in Ethereal 0.10.13 allows remote attackers ... installed: tethereal 0.10.12-6 (built from ethereal 0.10.12-6) CVE-2005-3651 (fixed, remotely exploitable, medium urgency) Stack-based buffer overflow in the dissect_ospf_v3_address_prefix ... installed: tethereal 0.10.12-6 (built from ethereal 0.10.12-6) fixed on branch: ethereal 0.10.10-2sarge3 (source package) fixed on branch: ethereal 0.10.10-2sarge4 (source package) fixed on branch: ethereal 0.9.4-1woody14 (source package) fix is available for the selected suite (sid) debsecan-0.4.18/testsuite/008/out.report0000644000000000000000000001011612315633554014650 0ustar Security report based on the sid release *** New security updates CVE-2005-2360 Unknown vulnerability in the LDAP dissector in... - ethereal-common (remotely exploitable, low urgency) CVE-2005-2361 Unknown vulnerability in the (1) AgentX dissector,... - ethereal-common (remotely exploitable, low urgency) CVE-2005-2363 Unknown vulnerability in the (1) SMPP dissector, (2)... - ethereal-common (remotely exploitable, low urgency) CVE-2005-2364 Unknown vulnerability in the (1) GIOP dissector, (2)... - ethereal-common (remotely exploitable, low urgency) CVE-2005-2365 Unknown vulnerability in the SMB dissector in... - ethereal-common (remotely exploitable, low urgency) CVE-2005-2366 Unknown vulnerability in the BER dissector in... - ethereal-common (remotely exploitable, low urgency) CVE-2005-2367 Format string vulnerability in the... - ethereal-common (remotely exploitable, medium urgency) CVE-2005-3651 Stack-based buffer overflow in the... - ethereal, ethereal-common, tethereal (remotely exploitable, medium urgency) *** New vulnerabilities CVE-2005-2362 Unknown vulnerability several dissectors in Ethereal... - ethereal-common (remotely exploitable, low urgency) CVE-2005-3184 Buffer overflow vulnerability in the unicode_to_bytes... - ethereal, ethereal-common, tethereal (remotely exploitable, medium urgency) CVE-2005-3241 Multiple vulnerabilities in Ethereal 0.10.12 and... - ethereal, ethereal-common, tethereal (remotely exploitable, medium urgency) CVE-2005-3242 Ethereal 0.10.12 and earlier allows remote attackers... - ethereal, ethereal-common, tethereal (remotely exploitable, medium urgency) CVE-2005-3243 Multiple buffer overflows in Ethereal 0.10.12 and... - ethereal, ethereal-common, tethereal (remotely exploitable, medium urgency) CVE-2005-3244 The BER dissector in Ethereal 0.10.3 to 0.10.12... - ethereal, ethereal-common, tethereal (remotely exploitable, medium urgency) CVE-2005-3245 Unspecified vulnerability in the ONC RPC dissector in... - ethereal, ethereal-common, tethereal (remotely exploitable, medium urgency) CVE-2005-3246 Ethereal 0.10.12 and earlier allows remote attackers... - ethereal, ethereal-common, tethereal (remotely exploitable, medium urgency) CVE-2005-3247 The SigComp UDVM in Ethereal 0.10.12 allows remote... - ethereal, ethereal-common, tethereal (remotely exploitable, medium urgency) CVE-2005-3248 Unspecified vulnerability in the X11 dissector in... - ethereal, ethereal-common, tethereal (remotely exploitable, medium urgency) CVE-2005-3249 Unspecified vulnerability in the WSP dissector in... - ethereal, ethereal-common, tethereal (remotely exploitable, medium urgency) *** Vulnerabilities without updates CVE-2005-3313 The IRC protocol dissector in Ethereal 0.10.13 allows... - ethereal, ethereal-common, tethereal (remotely exploitable, medium urgency) debsecan-0.4.18/testsuite/009/0000755000000000000000000000000012315633554012606 5ustar debsecan-0.4.18/testsuite/009/exp.bugs0000644000000000000000000000000012315633545014252 0ustar debsecan-0.4.18/testsuite/009/exp.detail0000644000000000000000000000000012315633545014554 0ustar debsecan-0.4.18/testsuite/009/exp.packages0000644000000000000000000000000012315633545015070 0ustar debsecan-0.4.18/testsuite/009/exp.report0000644000000000000000000000013512315633545014636 0ustar Security report based on the sid release No known vulnerabilities were found on the system. debsecan-0.4.18/testsuite/009/exp.summary0000644000000000000000000000000012315633545015007 0ustar debsecan-0.4.18/testsuite/009/history0000644000000000000000000000002011004700541014203 0ustar VERSION 1 86400 debsecan-0.4.18/testsuite/009/sid0000644000000000000000000000356011004700541013275 0ustar x͙[s8)֒|}I ƀ M_ن Hr(CGnGʧm4&4!D=C0.6AH*{*@AyOr9 qJhxE+n /Ӻ1F]#j9dW:Єh;F0%tJf쬖qCc؅- õn㲛T} y}+iğB<6-nh}nYk7a83t\K|DWzLF@~LR4dXo#GTWM>6cB}ݎ; n!De +]&nBv%RɕTT N`Ӽc7S0R;cPS]|K[ ٫tS*VP{`!Hz lCɓl╏-C8y)|c]S.֗Tqp%qpw{Uxn))nx6O?;koؚǗsU'o v4]pENiHm:ɚl%?ij|v|B,Plq7́Xl U43p>koMmht_Q/C /o򷬊JOWhkIQH6iIX-y&խLXaFí`47`-0=/ forxY ANE*f.7v\;+y ln)lnUsA@Q;ߑIKƗ3aGTۗ"$Q 5z\7-I# t$TAn4bSFg"zRȵ:7-/kTxvPn! aЭ vl܏]fG^M_(YA~j:"Rtqۇdy_n`4#lBJpo9V,Y$d~xn^bEݾ$ O1}P :BuwR$dӼv AZgJ]^d)ٱ颋*fVG<E򭆾yy4ܾ3?RS͟7CN /bhqElp%+y\߫{^%3{C'{uB2 W_ItJQ* D!>aS5 TBOZӣtU`pWVgrMH="h̀e1'ȑ\L!r̸8 &$7aɒlt\7a 94y拶Z,S†x +l`+|IFߕ5\-u5lS[jk m hkhcjkcjӘ^he%ytK(dlh*>utKttGǵtٖ|x /6aRlQm? e+v?Go= Architecture: i386 Source: boost Version: 1.33.0-5 Replaces: libboost-test1.33.0 Depends: libc6 (>= 2.3.5-1), libgcc1 (>= 1:4.0.2), libstdc++6 (>= 4.0.2-4) Conflicts: libboost-test1.33.0 Description: components for writing and executing test suites debsecan-0.4.18/testsuite/009/out.summary0000644000000000000000000000000012315633554015022 0ustar debsecan-0.4.18/testsuite/009/out.packages0000644000000000000000000000000012315633554015103 0ustar debsecan-0.4.18/testsuite/009/out.bugs0000644000000000000000000000000012315633554014265 0ustar debsecan-0.4.18/testsuite/009/out.detail0000644000000000000000000000000012315633554014567 0ustar debsecan-0.4.18/testsuite/009/out.report0000644000000000000000000000013512315633554014651 0ustar Security report based on the sid release No known vulnerabilities were found on the system. debsecan-0.4.18/testsuite/010/0000755000000000000000000000000012315633554012576 5ustar debsecan-0.4.18/testsuite/010/exp.bugs0000644000000000000000000000003412315633545014251 0ustar CVE-2005-0034 CVE-2005-0064 debsecan-0.4.18/testsuite/010/exp.detail0000644000000000000000000000136712315633545014565 0ustar CVE-2005-0034 (fixed, remotely exploitable) An "incorrect assumption" in the authvalidated validator function in ... installed: bind9 1:9.3.0-1 (built from bind9 1:9.3.0-1) fixed in unstable: bind9 1:9.3.1 (source package) fixed on branch: bind9 1:9.2.1-2.woody.1 (source package) fixed on branch: bind9 1:9.2.1-2.woody.2 (source package) fixed on branch: bind9 1:9.2.4-1 (source package) fix is available for the selected suite (sid) CVE-2005-0064 (fixed, remotely exploitable) Buffer overflow in the Decrypt::makeFileKey2 function installed: pdftohtml 0.36-10 (built from pdftohtml 0.36-10) fixed in unstable: pdftohtml 0.36-11 (source package) fix is available for the selected suite (sid) debsecan-0.4.18/testsuite/010/exp.packages0000644000000000000000000000002012315633545015062 0ustar bind9 pdftohtml debsecan-0.4.18/testsuite/010/exp.report0000644000000000000000000000061612315633545014632 0ustar Security report based on the sid release *** Available security updates CVE-2005-0034 An "incorrect assumption" in the... - bind9 (remotely exploitable) CVE-2005-0064 Buffer overflow in the Decrypt::makeFileKey2 function - pdftohtml (remotely exploitable) debsecan-0.4.18/testsuite/010/exp.summary0000644000000000000000000000015012315633545015005 0ustar CVE-2005-0034 bind9 (fixed, remotely exploitable) CVE-2005-0064 pdftohtml (fixed, remotely exploitable) debsecan-0.4.18/testsuite/010/history0000644000000000000000000000012211004700541014176 0ustar VERSION 0 CVE-2005-0034,libisc7,F CVE-2005-0034,bind9,F CVE-2005-0064,pdftohtml,F debsecan-0.4.18/testsuite/010/options0000644000000000000000000000001611004700541014172 0ustar --no-obsolete debsecan-0.4.18/testsuite/010/sid0000644000000000000000000000040311004700541013256 0ustar xmKo0>d[CJ q~4V;#Q} B/3vggwyB{DHт⃶y/yUivڂXKPXwѢR*Y>))%=pʸ"XM%79߮,k+ Hl֐1=:1;'L|¦Ѭ*:6S Q G.K6M "3<\kЁ3ܒ34Fe?Udebsecan-0.4.18/testsuite/010/status0000644000000000000000000000312211004700541014023 0ustar Package: libisc7 Status: install ok installed Priority: standard Section: libs Installed-Size: 332 Maintainer: LaMont Jones Architecture: i386 Source: bind9 Version: 1:9.3.0-1 Replaces: libbind0 Depends: libc6 (>= 2.3.2.ds1-4) Conflicts: libbind0 Description: ISC Shared Library used by BIND The Berkeley Internet Name Domain (BIND) implements an Internet domain name server. BIND is the most widely-used name server software on the Internet, and is supported by the Internet Software Consortium, www.isc.org. . This package delivers the libisc shared library used by BIND's daemons and clients. Package: bind9 Status: install ok installed Priority: optional Section: net Installed-Size: 616 Maintainer: LaMont Jones Architecture: i386 Version: 1:9.3.0-1 Replaces: bind, dnsutils (<< 1:9.1.0-3) Depends: libbind9-0, libc6 (>= 2.3.5-1), libdns20, libisc9, libisccc0, libisccfg1, liblwres1, libssl0.9.8, netbase, adduser, libdns20 (= 1:9.3.1-2.0.1), libisccfg1 (= 1:9.3.1-2.0.1), libisc9 (= 1:9.3.1-2.0.1), libisccc0 (= 1:9.3.1-2.0.1) Suggests: dnsutils, bind9-doc Description: Internet Domain Name Server Package: pdftohtml Status: install ok installed Priority: optional Section: text Installed-Size: 696 Maintainer: Frederic Peters Architecture: i386 Version: 0.36-10 Depends: libc6 (>= 2.3.2.ds1-4), libgcc1 (>= 1:3.4.1-3), libstdc++5 (>= 1:3.3.4-1), gs Recommends: xpdf-common Filename: pool/main/p/pdftohtml/pdftohtml_0.36-11_i386.deb Size: 253142 MD5sum: 6db7eb4ac43616f355cf2ad8fc935865 Description: Translates pdf documents into html format debsecan-0.4.18/testsuite/010/out.summary0000644000000000000000000000015012315633554015020 0ustar CVE-2005-0034 bind9 (fixed, remotely exploitable) CVE-2005-0064 pdftohtml (fixed, remotely exploitable) debsecan-0.4.18/testsuite/010/out.packages0000644000000000000000000000002012315633554015075 0ustar bind9 pdftohtml debsecan-0.4.18/testsuite/010/out.bugs0000644000000000000000000000003412315633554014264 0ustar CVE-2005-0034 CVE-2005-0064 debsecan-0.4.18/testsuite/010/out.detail0000644000000000000000000000136712315633554014600 0ustar CVE-2005-0034 (fixed, remotely exploitable) An "incorrect assumption" in the authvalidated validator function in ... installed: bind9 1:9.3.0-1 (built from bind9 1:9.3.0-1) fixed in unstable: bind9 1:9.3.1 (source package) fixed on branch: bind9 1:9.2.1-2.woody.1 (source package) fixed on branch: bind9 1:9.2.1-2.woody.2 (source package) fixed on branch: bind9 1:9.2.4-1 (source package) fix is available for the selected suite (sid) CVE-2005-0064 (fixed, remotely exploitable) Buffer overflow in the Decrypt::makeFileKey2 function installed: pdftohtml 0.36-10 (built from pdftohtml 0.36-10) fixed in unstable: pdftohtml 0.36-11 (source package) fix is available for the selected suite (sid) debsecan-0.4.18/testsuite/010/out.report0000644000000000000000000000061612315633554014645 0ustar Security report based on the sid release *** Available security updates CVE-2005-0034 An "incorrect assumption" in the... - bind9 (remotely exploitable) CVE-2005-0064 Buffer overflow in the Decrypt::makeFileKey2 function - pdftohtml (remotely exploitable) debsecan-0.4.18/testsuite/011/0000755000000000000000000000000012315633555012600 5ustar debsecan-0.4.18/testsuite/011/exp.bugs0000644000000000000000000000025012315633545014252 0ustar CVE-2005-3184 CVE-2005-3241 CVE-2005-3242 CVE-2005-3243 CVE-2005-3244 CVE-2005-3245 CVE-2005-3246 CVE-2005-3247 CVE-2005-3248 CVE-2005-3249 CVE-2005-3313 CVE-2005-3651 debsecan-0.4.18/testsuite/011/exp.detail0000644000000000000000000003361012315633545014562 0ustar CVE-2005-3184 (fixed, remotely exploitable, medium urgency) Buffer overflow vulnerability in the unicode_to_bytes in the Service ... installed: ethereal 0.10.12-6 (built from ethereal 0.10.12-6) fixed in unstable: ethereal 0.10.13-1 (source package) fix is available for the selected suite (sid) CVE-2005-3241 (fixed, remotely exploitable, medium urgency) Multiple vulnerabilities in Ethereal 0.10.12 and earlier allow remote ... installed: ethereal 0.10.12-6 (built from ethereal 0.10.12-6) fixed in unstable: ethereal 0.10.13-1 (source package) fix is available for the selected suite (sid) CVE-2005-3242 (fixed, remotely exploitable, medium urgency) Ethereal 0.10.12 and earlier allows remote attackers to cause a denial ... installed: ethereal 0.10.12-6 (built from ethereal 0.10.12-6) fixed in unstable: ethereal 0.10.13-1 (source package) fix is available for the selected suite (sid) CVE-2005-3243 (fixed, remotely exploitable, medium urgency) Multiple buffer overflows in Ethereal 0.10.12 and earlier might allow ... installed: ethereal 0.10.12-6 (built from ethereal 0.10.12-6) fixed in unstable: ethereal 0.10.13-1 (source package) fix is available for the selected suite (sid) CVE-2005-3244 (fixed, remotely exploitable, medium urgency) The BER dissector in Ethereal 0.10.3 to 0.10.12 allows remote ... installed: ethereal 0.10.12-6 (built from ethereal 0.10.12-6) fixed in unstable: ethereal 0.10.13-1 (source package) fix is available for the selected suite (sid) CVE-2005-3245 (fixed, remotely exploitable, medium urgency) Unspecified vulnerability in the ONC RPC dissector in Ethereal 0.10.3 ... installed: ethereal 0.10.12-6 (built from ethereal 0.10.12-6) fixed in unstable: ethereal 0.10.13-1 (source package) fix is available for the selected suite (sid) CVE-2005-3246 (fixed, remotely exploitable, medium urgency) Ethereal 0.10.12 and earlier allows remote attackers to cause a denial ... installed: ethereal 0.10.12-6 (built from ethereal 0.10.12-6) fixed in unstable: ethereal 0.10.13-1 (source package) fix is available for the selected suite (sid) CVE-2005-3247 (fixed, remotely exploitable, medium urgency) The SigComp UDVM in Ethereal 0.10.12 allows remote attackers to cause ... installed: ethereal 0.10.12-6 (built from ethereal 0.10.12-6) fixed in unstable: ethereal 0.10.13-1 (source package) fix is available for the selected suite (sid) CVE-2005-3248 (fixed, remotely exploitable, medium urgency) Unspecified vulnerability in the X11 dissector in Ethereal 0.10.12 and ... installed: ethereal 0.10.12-6 (built from ethereal 0.10.12-6) fixed in unstable: ethereal 0.10.13-1 (source package) fix is available for the selected suite (sid) CVE-2005-3249 (fixed, remotely exploitable, medium urgency) Unspecified vulnerability in the WSP dissector in Ethereal 0.10.1 to ... installed: ethereal 0.10.12-6 (built from ethereal 0.10.12-6) fixed in unstable: ethereal 0.10.13-1 (source package) fix is available for the selected suite (sid) CVE-2005-3313 (remotely exploitable, medium urgency) The IRC protocol dissector in Ethereal 0.10.13 allows remote attackers ... installed: ethereal 0.10.12-6 (built from ethereal 0.10.12-6) CVE-2005-3651 (remotely exploitable, medium urgency) Stack-based buffer overflow in the dissect_ospf_v3_address_prefix ... installed: ethereal 0.10.12-6 (built from ethereal 0.10.12-6) fixed on branch: ethereal 0.10.10-2sarge4 (source package) CVE-2005-3245 (fixed, remotely exploitable, low urgency) Unspecified vulnerability in the ONC RPC dissector in Ethereal 0.10.3 ... installed: ethereal2 0.10.12-6 (built from ethereal2 0.10.12-6) fixed in unstable: ethereal2 0.10.13-1 (source package) fix is available for the selected suite (sid) CVE-2005-3246 (fixed, remotely exploitable, high urgency) Ethereal 0.10.12 and earlier allows remote attackers to cause a denial ... installed: ethereal2 0.10.12-6 (built from ethereal2 0.10.12-6) fixed in unstable: ethereal2 0.10.13-1 (source package) fix is available for the selected suite (sid) CVE-2005-3247 (fixed, high urgency) The SigComp UDVM in Ethereal 0.10.12 allows remote attackers to cause ... installed: ethereal2 0.10.12-6 (built from ethereal2 0.10.12-6) fixed in unstable: ethereal2 0.10.13-1 (source package) fix is available for the selected suite (sid) CVE-2005-3248 (fixed, medium urgency) Unspecified vulnerability in the X11 dissector in Ethereal 0.10.12 and ... installed: ethereal2 0.10.12-6 (built from ethereal2 0.10.12-6) fixed in unstable: ethereal2 0.10.13-1 (source package) fix is available for the selected suite (sid) CVE-2005-3249 (fixed, remotely exploitable, low urgency) Unspecified vulnerability in the WSP dissector in Ethereal 0.10.1 to ... installed: ethereal2 0.10.12-6 (built from ethereal2 0.10.12-6) fixed in unstable: ethereal2 0.10.13-1 (source package) fix is available for the selected suite (sid) CVE-2005-3245 (fixed, remotely exploitable, low urgency) Unspecified vulnerability in the ONC RPC dissector in Ethereal 0.10.3 ... installed: ethereal2-common 0.10.12-6 (built from ethereal2 0.10.12-6) fixed in unstable: ethereal2 0.10.13-1 (source package) fix is available for the selected suite (sid) CVE-2005-3246 (fixed, remotely exploitable, high urgency) Ethereal 0.10.12 and earlier allows remote attackers to cause a denial ... installed: ethereal2-common 0.10.12-6 (built from ethereal2 0.10.12-6) fixed in unstable: ethereal2 0.10.13-1 (source package) fix is available for the selected suite (sid) CVE-2005-3247 (fixed, high urgency) The SigComp UDVM in Ethereal 0.10.12 allows remote attackers to cause ... installed: ethereal2-common 0.10.12-6 (built from ethereal2 0.10.12-6) fixed in unstable: ethereal2 0.10.13-1 (source package) fix is available for the selected suite (sid) CVE-2005-3248 (fixed, medium urgency) Unspecified vulnerability in the X11 dissector in Ethereal 0.10.12 and ... installed: ethereal2-common 0.10.12-6 (built from ethereal2 0.10.12-6) fixed in unstable: ethereal2 0.10.13-1 (source package) fix is available for the selected suite (sid) CVE-2005-3249 (fixed, remotely exploitable, low urgency) Unspecified vulnerability in the WSP dissector in Ethereal 0.10.1 to ... installed: ethereal2-common 0.10.12-6 (built from ethereal2 0.10.12-6) fixed in unstable: ethereal2 0.10.13-1 (source package) fix is available for the selected suite (sid) CVE-2005-3184 (fixed, remotely exploitable, medium urgency) Buffer overflow vulnerability in the unicode_to_bytes in the Service ... installed: ethereal-common 0.10.12-6 (built from ethereal 0.10.12-6) fixed in unstable: ethereal 0.10.13-1 (source package) fix is available for the selected suite (sid) CVE-2005-3241 (fixed, remotely exploitable, medium urgency) Multiple vulnerabilities in Ethereal 0.10.12 and earlier allow remote ... installed: ethereal-common 0.10.12-6 (built from ethereal 0.10.12-6) fixed in unstable: ethereal 0.10.13-1 (source package) fix is available for the selected suite (sid) CVE-2005-3242 (fixed, remotely exploitable, medium urgency) Ethereal 0.10.12 and earlier allows remote attackers to cause a denial ... installed: ethereal-common 0.10.12-6 (built from ethereal 0.10.12-6) fixed in unstable: ethereal 0.10.13-1 (source package) fix is available for the selected suite (sid) CVE-2005-3243 (fixed, remotely exploitable, medium urgency) Multiple buffer overflows in Ethereal 0.10.12 and earlier might allow ... installed: ethereal-common 0.10.12-6 (built from ethereal 0.10.12-6) fixed in unstable: ethereal 0.10.13-1 (source package) fix is available for the selected suite (sid) CVE-2005-3244 (fixed, remotely exploitable, medium urgency) The BER dissector in Ethereal 0.10.3 to 0.10.12 allows remote ... installed: ethereal-common 0.10.12-6 (built from ethereal 0.10.12-6) fixed in unstable: ethereal 0.10.13-1 (source package) fix is available for the selected suite (sid) CVE-2005-3245 (fixed, remotely exploitable, medium urgency) Unspecified vulnerability in the ONC RPC dissector in Ethereal 0.10.3 ... installed: ethereal-common 0.10.12-6 (built from ethereal 0.10.12-6) fixed in unstable: ethereal 0.10.13-1 (source package) fix is available for the selected suite (sid) CVE-2005-3246 (fixed, remotely exploitable, medium urgency) Ethereal 0.10.12 and earlier allows remote attackers to cause a denial ... installed: ethereal-common 0.10.12-6 (built from ethereal 0.10.12-6) fixed in unstable: ethereal 0.10.13-1 (source package) fix is available for the selected suite (sid) CVE-2005-3247 (fixed, remotely exploitable, medium urgency) The SigComp UDVM in Ethereal 0.10.12 allows remote attackers to cause ... installed: ethereal-common 0.10.12-6 (built from ethereal 0.10.12-6) fixed in unstable: ethereal 0.10.13-1 (source package) fix is available for the selected suite (sid) CVE-2005-3248 (fixed, remotely exploitable, medium urgency) Unspecified vulnerability in the X11 dissector in Ethereal 0.10.12 and ... installed: ethereal-common 0.10.12-6 (built from ethereal 0.10.12-6) fixed in unstable: ethereal 0.10.13-1 (source package) fix is available for the selected suite (sid) CVE-2005-3249 (fixed, remotely exploitable, medium urgency) Unspecified vulnerability in the WSP dissector in Ethereal 0.10.1 to ... installed: ethereal-common 0.10.12-6 (built from ethereal 0.10.12-6) fixed in unstable: ethereal 0.10.13-1 (source package) fix is available for the selected suite (sid) CVE-2005-3313 (remotely exploitable, medium urgency) The IRC protocol dissector in Ethereal 0.10.13 allows remote attackers ... installed: ethereal-common 0.10.12-6 (built from ethereal 0.10.12-6) CVE-2005-3651 (remotely exploitable, medium urgency) Stack-based buffer overflow in the dissect_ospf_v3_address_prefix ... installed: ethereal-common 0.10.12-6 (built from ethereal 0.10.12-6) fixed on branch: ethereal 0.10.10-2sarge4 (source package) CVE-2005-3184 (fixed, remotely exploitable, medium urgency) Buffer overflow vulnerability in the unicode_to_bytes in the Service ... installed: tethereal 0.10.12-6 (built from ethereal 0.10.12-6) fixed in unstable: ethereal 0.10.13-1 (source package) fix is available for the selected suite (sid) CVE-2005-3241 (fixed, remotely exploitable, medium urgency) Multiple vulnerabilities in Ethereal 0.10.12 and earlier allow remote ... installed: tethereal 0.10.12-6 (built from ethereal 0.10.12-6) fixed in unstable: ethereal 0.10.13-1 (source package) fix is available for the selected suite (sid) CVE-2005-3242 (fixed, remotely exploitable, medium urgency) Ethereal 0.10.12 and earlier allows remote attackers to cause a denial ... installed: tethereal 0.10.12-6 (built from ethereal 0.10.12-6) fixed in unstable: ethereal 0.10.13-1 (source package) fix is available for the selected suite (sid) CVE-2005-3243 (fixed, remotely exploitable, medium urgency) Multiple buffer overflows in Ethereal 0.10.12 and earlier might allow ... installed: tethereal 0.10.12-6 (built from ethereal 0.10.12-6) fixed in unstable: ethereal 0.10.13-1 (source package) fix is available for the selected suite (sid) CVE-2005-3244 (fixed, remotely exploitable, medium urgency) The BER dissector in Ethereal 0.10.3 to 0.10.12 allows remote ... installed: tethereal 0.10.12-6 (built from ethereal 0.10.12-6) fixed in unstable: ethereal 0.10.13-1 (source package) fix is available for the selected suite (sid) CVE-2005-3245 (fixed, remotely exploitable, medium urgency) Unspecified vulnerability in the ONC RPC dissector in Ethereal 0.10.3 ... installed: tethereal 0.10.12-6 (built from ethereal 0.10.12-6) fixed in unstable: ethereal 0.10.13-1 (source package) fix is available for the selected suite (sid) CVE-2005-3246 (fixed, remotely exploitable, medium urgency) Ethereal 0.10.12 and earlier allows remote attackers to cause a denial ... installed: tethereal 0.10.12-6 (built from ethereal 0.10.12-6) fixed in unstable: ethereal 0.10.13-1 (source package) fix is available for the selected suite (sid) CVE-2005-3247 (fixed, remotely exploitable, medium urgency) The SigComp UDVM in Ethereal 0.10.12 allows remote attackers to cause ... installed: tethereal 0.10.12-6 (built from ethereal 0.10.12-6) fixed in unstable: ethereal 0.10.13-1 (source package) fix is available for the selected suite (sid) CVE-2005-3248 (fixed, remotely exploitable, medium urgency) Unspecified vulnerability in the X11 dissector in Ethereal 0.10.12 and ... installed: tethereal 0.10.12-6 (built from ethereal 0.10.12-6) fixed in unstable: ethereal 0.10.13-1 (source package) fix is available for the selected suite (sid) CVE-2005-3249 (fixed, remotely exploitable, medium urgency) Unspecified vulnerability in the WSP dissector in Ethereal 0.10.1 to ... installed: tethereal 0.10.12-6 (built from ethereal 0.10.12-6) fixed in unstable: ethereal 0.10.13-1 (source package) fix is available for the selected suite (sid) CVE-2005-3313 (remotely exploitable, medium urgency) The IRC protocol dissector in Ethereal 0.10.13 allows remote attackers ... installed: tethereal 0.10.12-6 (built from ethereal 0.10.12-6) CVE-2005-3651 (remotely exploitable, medium urgency) Stack-based buffer overflow in the dissect_ospf_v3_address_prefix ... installed: tethereal 0.10.12-6 (built from ethereal 0.10.12-6) fixed on branch: ethereal 0.10.10-2sarge4 (source package) debsecan-0.4.18/testsuite/011/exp.packages0000644000000000000000000000007612315633545015076 0ustar ethereal ethereal-common ethereal2 ethereal2-common tethereal debsecan-0.4.18/testsuite/011/exp.report0000644000000000000000000000563712315633545014643 0ustar Security report based on the sid release *** New security updates CVE-2005-3184 Buffer overflow vulnerability in the unicode_to_bytes... - ethereal, ethereal-common, tethereal (remotely exploitable, medium urgency) CVE-2005-3241 Multiple vulnerabilities in Ethereal 0.10.12 and... - ethereal, ethereal-common, tethereal (remotely exploitable, medium urgency) CVE-2005-3242 Ethereal 0.10.12 and earlier allows remote attackers... - ethereal, ethereal-common, tethereal (remotely exploitable, medium urgency) CVE-2005-3243 Multiple buffer overflows in Ethereal 0.10.12 and... - ethereal, ethereal-common, tethereal (remotely exploitable, medium urgency) CVE-2005-3244 The BER dissector in Ethereal 0.10.3 to 0.10.12... - ethereal, ethereal-common, tethereal (remotely exploitable, medium urgency) CVE-2005-3245 Unspecified vulnerability in the ONC RPC dissector in... - ethereal, ethereal-common, tethereal (remotely exploitable, medium urgency) - ethereal2, ethereal2-common (remotely exploitable, low urgency) CVE-2005-3246 Ethereal 0.10.12 and earlier allows remote attackers... - ethereal2, ethereal2-common (remotely exploitable, high urgency) - ethereal, ethereal-common, tethereal (remotely exploitable, medium urgency) CVE-2005-3247 The SigComp UDVM in Ethereal 0.10.12 allows remote... - ethereal2, ethereal2-common (high urgency) - ethereal, ethereal-common, tethereal (remotely exploitable, medium urgency) CVE-2005-3248 Unspecified vulnerability in the X11 dissector in... - ethereal, ethereal-common, tethereal (remotely exploitable, medium urgency) - ethereal2, ethereal2-common (medium urgency) CVE-2005-3249 Unspecified vulnerability in the WSP dissector in... - ethereal, ethereal-common, tethereal (remotely exploitable, medium urgency) - ethereal2, ethereal2-common (remotely exploitable, low urgency) *** Vulnerabilities without updates CVE-2005-3313 The IRC protocol dissector in Ethereal 0.10.13 allows... - ethereal, ethereal-common, tethereal (remotely exploitable, medium urgency) CVE-2005-3651 Stack-based buffer overflow in the... - ethereal, ethereal-common, tethereal (remotely exploitable, medium urgency) debsecan-0.4.18/testsuite/011/exp.summary0000644000000000000000000000613512315633545015017 0ustar CVE-2005-3184 ethereal (fixed, remotely exploitable, medium urgency) CVE-2005-3184 ethereal-common (fixed, remotely exploitable, medium urgency) CVE-2005-3184 tethereal (fixed, remotely exploitable, medium urgency) CVE-2005-3241 ethereal (fixed, remotely exploitable, medium urgency) CVE-2005-3241 ethereal-common (fixed, remotely exploitable, medium urgency) CVE-2005-3241 tethereal (fixed, remotely exploitable, medium urgency) CVE-2005-3242 ethereal (fixed, remotely exploitable, medium urgency) CVE-2005-3242 ethereal-common (fixed, remotely exploitable, medium urgency) CVE-2005-3242 tethereal (fixed, remotely exploitable, medium urgency) CVE-2005-3243 ethereal (fixed, remotely exploitable, medium urgency) CVE-2005-3243 ethereal-common (fixed, remotely exploitable, medium urgency) CVE-2005-3243 tethereal (fixed, remotely exploitable, medium urgency) CVE-2005-3244 ethereal (fixed, remotely exploitable, medium urgency) CVE-2005-3244 ethereal-common (fixed, remotely exploitable, medium urgency) CVE-2005-3244 tethereal (fixed, remotely exploitable, medium urgency) CVE-2005-3245 ethereal (fixed, remotely exploitable, medium urgency) CVE-2005-3245 ethereal-common (fixed, remotely exploitable, medium urgency) CVE-2005-3245 ethereal2 (fixed, remotely exploitable, low urgency) CVE-2005-3245 ethereal2-common (fixed, remotely exploitable, low urgency) CVE-2005-3245 tethereal (fixed, remotely exploitable, medium urgency) CVE-2005-3246 ethereal (fixed, remotely exploitable, medium urgency) CVE-2005-3246 ethereal-common (fixed, remotely exploitable, medium urgency) CVE-2005-3246 ethereal2 (fixed, remotely exploitable, high urgency) CVE-2005-3246 ethereal2-common (fixed, remotely exploitable, high urgency) CVE-2005-3246 tethereal (fixed, remotely exploitable, medium urgency) CVE-2005-3247 ethereal (fixed, remotely exploitable, medium urgency) CVE-2005-3247 ethereal-common (fixed, remotely exploitable, medium urgency) CVE-2005-3247 ethereal2 (fixed, high urgency) CVE-2005-3247 ethereal2-common (fixed, high urgency) CVE-2005-3247 tethereal (fixed, remotely exploitable, medium urgency) CVE-2005-3248 ethereal (fixed, remotely exploitable, medium urgency) CVE-2005-3248 ethereal-common (fixed, remotely exploitable, medium urgency) CVE-2005-3248 ethereal2 (fixed, medium urgency) CVE-2005-3248 ethereal2-common (fixed, medium urgency) CVE-2005-3248 tethereal (fixed, remotely exploitable, medium urgency) CVE-2005-3249 ethereal (fixed, remotely exploitable, medium urgency) CVE-2005-3249 ethereal-common (fixed, remotely exploitable, medium urgency) CVE-2005-3249 ethereal2 (fixed, remotely exploitable, low urgency) CVE-2005-3249 ethereal2-common (fixed, remotely exploitable, low urgency) CVE-2005-3249 tethereal (fixed, remotely exploitable, medium urgency) CVE-2005-3313 ethereal (remotely exploitable, medium urgency) CVE-2005-3313 ethereal-common (remotely exploitable, medium urgency) CVE-2005-3313 tethereal (remotely exploitable, medium urgency) CVE-2005-3651 ethereal (remotely exploitable, medium urgency) CVE-2005-3651 ethereal-common (remotely exploitable, medium urgency) CVE-2005-3651 tethereal (remotely exploitable, medium urgency) debsecan-0.4.18/testsuite/011/history0000644000000000000000000000026011004700541014202 0ustar VERSION 0 CVE-2005-3651,ethereal, CVE-2005-3313,ethereal, CVE-2005-3651,tethereal, CVE-2005-3313,tethereal, CVE-2005-3651,ethereal-common, CVE-2005-3313,ethereal-common, debsecan-0.4.18/testsuite/011/sid0000644000000000000000000000360711004700541013270 0ustar x͙r6y : EǦ[%fP$s"*Iu )Y(6Yd"qp;?wA&qY,H'/Vs x̾߷@UB+Z 1+ 2}%y>FmJY)'0'iB \lWz'0'EAfe)9b6fU&,i"Yd$ϳع OlD#0izt>dc\̓t 64Y%K%i]^;6FB7k{Ӹ s0=(B0g"lM_zYJ8 i=eVS#gZ3O4{NAz LgBoA- )@fCTP@˧dIILLؤ2R~PY";JsF2XٚC>%NN$ulk,]: cB|]H&ÔJ(}ZJ a,2 עn S1! X۴avZQ$Jfm݄|8nDq%{e\]19E1Iѐqc@4R^5]ˇ<, !u;0U)\Wv"s5^߇*1PJ+ufMҝynaw“Ǡ p=ws'X9W$U-P ByUk';+[$pdSpDUǺ\p/J. u7sR>WzUSb;6 lA猃v!͓DW8/yFw亨HMxȲf(ɮ647<>3aGTۗ"$Q 5z\7I# t$TAn4bSFg"zRȵ:-_F7R TB?à[I G O2$%yo>|r7iR=hN(|RJ~ \d4?`Jy)RJ[nCU.&ӌ *վIX&dzUz\w6,&.? C5 %nIw ӓM!`{/je+%wydǦ.l?P쮛Y^L$sRZB5iDQlhovzWD|E+Ffs%+\J^5ޫzlw,:Y?O3g~N8P'JKTR% #t(aL(5O+p};]}g>kBG̀d,3X>a~،>7@M` `f`(7! Md 㺉Xlȡ{6_ubr6NXXa[Kհ5jaP[ik`m mLmmLmG[CS[SF/u- Architecture: i386 Version: 0.10.12-6 Depends: libadns1, libatk1.0-0 (>= 1.9.0), libc6 (>= 2.3.5-1), libcap1, libcomerr2 (>= 1.33-3), libglib2.0-0 (>= 2.8.0), libgtk2.0-0 (>= 2.6.0), libkrb53 (>= 1.3.2), libpango1.0-0 (>= 1.8.2), libpcap0.8 (>= 0.9.3-1), libpcre3 (>= 4.5), zlib1g (>= 1:1.2.1), ethereal-common (= 0.10.12-6) Recommends: gksu Description: network traffic analyzer Ethereal is a network traffic analyzer, or "sniffer", for Unix and Unix-like operating systems. A sniffer is a tool used to capture packets off the wire. Ethereal decodes numerous protocols (too many to list). . This package provides ethereal (the GTK+ version) Package: ethereal2 Status: install ok installed Priority: optional Section: net Installed-Size: 1264 Maintainer: Frederic Peters Architecture: i386 Version: 0.10.12-6 Recommends: gksu Description: network traffic analyzer Package: ethereal2-common Status: install ok installed Priority: optional Source: ethereal2 Section: net Installed-Size: 1264 Maintainer: Frederic Peters Architecture: i386 Version: 0.10.12-6 Recommends: gksu Description: network traffic analyzer Package: ethereal-common Status: install ok installed Priority: optional Section: net Installed-Size: 20320 Maintainer: Frederic Peters Architecture: i386 Source: ethereal Version: 0.10.12-6 Depends: libc6 (>= 2.3.5-1), libcap1, libglib2.0-0 (>= 2.8.0), libpcre3 (>= 4.5), zlib1g (>= 1:1.2.1) Recommends: ethereal (>= 0.9.1-3) | tethereal (>= 0.9.1-3) Conflicts: ethereal (<< 0.9.1-3), tethereal (<< 0.9.1-3) Description: network traffic analyser (common files) Ethereal is a network traffic analyzer, or "sniffer", for Unix and Unix-like operating systems. A sniffer is a tool used to capture packets off the wire. Ethereal decodes numerous protocols (too many to list). . This package provides files common to both ethereal (the GTK+ version) and tethereal (the console version). Package: tethereal Status: install ok installed Priority: optional Section: net Installed-Size: 240 Maintainer: Frederic Peters Architecture: i386 Source: ethereal Version: 0.10.12-6 Depends: libadns1, libc6 (>= 2.3.5-1), libcap1, libcomerr2 (>= 1.33-3), libglib2.0-0 (>= 2.8.0), libkrb53 (>= 1.3.2), libpcap0.8 (>= 0.9.3-1), libpcre3 (>= 4.5), zlib1g (>= 1:1.2.1), ethereal-common (= 0.10.12-6) Description: network traffic analyzer (console) Ethereal is a network traffic analyzer, or "sniffer", for Unix and Unix-like operating systems. A sniffer is a tool used to capture packets off the wire. Ethereal decodes numerous protocols (too many to list). . This package provides the console version of ethereal, named "tethereal". debsecan-0.4.18/testsuite/011/out.summary0000644000000000000000000000613512315633555015033 0ustar CVE-2005-3184 ethereal (fixed, remotely exploitable, medium urgency) CVE-2005-3184 ethereal-common (fixed, remotely exploitable, medium urgency) CVE-2005-3184 tethereal (fixed, remotely exploitable, medium urgency) CVE-2005-3241 ethereal (fixed, remotely exploitable, medium urgency) CVE-2005-3241 ethereal-common (fixed, remotely exploitable, medium urgency) CVE-2005-3241 tethereal (fixed, remotely exploitable, medium urgency) CVE-2005-3242 ethereal (fixed, remotely exploitable, medium urgency) CVE-2005-3242 ethereal-common (fixed, remotely exploitable, medium urgency) CVE-2005-3242 tethereal (fixed, remotely exploitable, medium urgency) CVE-2005-3243 ethereal (fixed, remotely exploitable, medium urgency) CVE-2005-3243 ethereal-common (fixed, remotely exploitable, medium urgency) CVE-2005-3243 tethereal (fixed, remotely exploitable, medium urgency) CVE-2005-3244 ethereal (fixed, remotely exploitable, medium urgency) CVE-2005-3244 ethereal-common (fixed, remotely exploitable, medium urgency) CVE-2005-3244 tethereal (fixed, remotely exploitable, medium urgency) CVE-2005-3245 ethereal (fixed, remotely exploitable, medium urgency) CVE-2005-3245 ethereal-common (fixed, remotely exploitable, medium urgency) CVE-2005-3245 ethereal2 (fixed, remotely exploitable, low urgency) CVE-2005-3245 ethereal2-common (fixed, remotely exploitable, low urgency) CVE-2005-3245 tethereal (fixed, remotely exploitable, medium urgency) CVE-2005-3246 ethereal (fixed, remotely exploitable, medium urgency) CVE-2005-3246 ethereal-common (fixed, remotely exploitable, medium urgency) CVE-2005-3246 ethereal2 (fixed, remotely exploitable, high urgency) CVE-2005-3246 ethereal2-common (fixed, remotely exploitable, high urgency) CVE-2005-3246 tethereal (fixed, remotely exploitable, medium urgency) CVE-2005-3247 ethereal (fixed, remotely exploitable, medium urgency) CVE-2005-3247 ethereal-common (fixed, remotely exploitable, medium urgency) CVE-2005-3247 ethereal2 (fixed, high urgency) CVE-2005-3247 ethereal2-common (fixed, high urgency) CVE-2005-3247 tethereal (fixed, remotely exploitable, medium urgency) CVE-2005-3248 ethereal (fixed, remotely exploitable, medium urgency) CVE-2005-3248 ethereal-common (fixed, remotely exploitable, medium urgency) CVE-2005-3248 ethereal2 (fixed, medium urgency) CVE-2005-3248 ethereal2-common (fixed, medium urgency) CVE-2005-3248 tethereal (fixed, remotely exploitable, medium urgency) CVE-2005-3249 ethereal (fixed, remotely exploitable, medium urgency) CVE-2005-3249 ethereal-common (fixed, remotely exploitable, medium urgency) CVE-2005-3249 ethereal2 (fixed, remotely exploitable, low urgency) CVE-2005-3249 ethereal2-common (fixed, remotely exploitable, low urgency) CVE-2005-3249 tethereal (fixed, remotely exploitable, medium urgency) CVE-2005-3313 ethereal (remotely exploitable, medium urgency) CVE-2005-3313 ethereal-common (remotely exploitable, medium urgency) CVE-2005-3313 tethereal (remotely exploitable, medium urgency) CVE-2005-3651 ethereal (remotely exploitable, medium urgency) CVE-2005-3651 ethereal-common (remotely exploitable, medium urgency) CVE-2005-3651 tethereal (remotely exploitable, medium urgency) debsecan-0.4.18/testsuite/011/out.packages0000644000000000000000000000007612315633555015112 0ustar ethereal ethereal-common ethereal2 ethereal2-common tethereal debsecan-0.4.18/testsuite/011/out.bugs0000644000000000000000000000025012315633555014266 0ustar CVE-2005-3184 CVE-2005-3241 CVE-2005-3242 CVE-2005-3243 CVE-2005-3244 CVE-2005-3245 CVE-2005-3246 CVE-2005-3247 CVE-2005-3248 CVE-2005-3249 CVE-2005-3313 CVE-2005-3651 debsecan-0.4.18/testsuite/011/out.detail0000644000000000000000000003361012315633555014576 0ustar CVE-2005-3184 (fixed, remotely exploitable, medium urgency) Buffer overflow vulnerability in the unicode_to_bytes in the Service ... installed: ethereal 0.10.12-6 (built from ethereal 0.10.12-6) fixed in unstable: ethereal 0.10.13-1 (source package) fix is available for the selected suite (sid) CVE-2005-3241 (fixed, remotely exploitable, medium urgency) Multiple vulnerabilities in Ethereal 0.10.12 and earlier allow remote ... installed: ethereal 0.10.12-6 (built from ethereal 0.10.12-6) fixed in unstable: ethereal 0.10.13-1 (source package) fix is available for the selected suite (sid) CVE-2005-3242 (fixed, remotely exploitable, medium urgency) Ethereal 0.10.12 and earlier allows remote attackers to cause a denial ... installed: ethereal 0.10.12-6 (built from ethereal 0.10.12-6) fixed in unstable: ethereal 0.10.13-1 (source package) fix is available for the selected suite (sid) CVE-2005-3243 (fixed, remotely exploitable, medium urgency) Multiple buffer overflows in Ethereal 0.10.12 and earlier might allow ... installed: ethereal 0.10.12-6 (built from ethereal 0.10.12-6) fixed in unstable: ethereal 0.10.13-1 (source package) fix is available for the selected suite (sid) CVE-2005-3244 (fixed, remotely exploitable, medium urgency) The BER dissector in Ethereal 0.10.3 to 0.10.12 allows remote ... installed: ethereal 0.10.12-6 (built from ethereal 0.10.12-6) fixed in unstable: ethereal 0.10.13-1 (source package) fix is available for the selected suite (sid) CVE-2005-3245 (fixed, remotely exploitable, medium urgency) Unspecified vulnerability in the ONC RPC dissector in Ethereal 0.10.3 ... installed: ethereal 0.10.12-6 (built from ethereal 0.10.12-6) fixed in unstable: ethereal 0.10.13-1 (source package) fix is available for the selected suite (sid) CVE-2005-3246 (fixed, remotely exploitable, medium urgency) Ethereal 0.10.12 and earlier allows remote attackers to cause a denial ... installed: ethereal 0.10.12-6 (built from ethereal 0.10.12-6) fixed in unstable: ethereal 0.10.13-1 (source package) fix is available for the selected suite (sid) CVE-2005-3247 (fixed, remotely exploitable, medium urgency) The SigComp UDVM in Ethereal 0.10.12 allows remote attackers to cause ... installed: ethereal 0.10.12-6 (built from ethereal 0.10.12-6) fixed in unstable: ethereal 0.10.13-1 (source package) fix is available for the selected suite (sid) CVE-2005-3248 (fixed, remotely exploitable, medium urgency) Unspecified vulnerability in the X11 dissector in Ethereal 0.10.12 and ... installed: ethereal 0.10.12-6 (built from ethereal 0.10.12-6) fixed in unstable: ethereal 0.10.13-1 (source package) fix is available for the selected suite (sid) CVE-2005-3249 (fixed, remotely exploitable, medium urgency) Unspecified vulnerability in the WSP dissector in Ethereal 0.10.1 to ... installed: ethereal 0.10.12-6 (built from ethereal 0.10.12-6) fixed in unstable: ethereal 0.10.13-1 (source package) fix is available for the selected suite (sid) CVE-2005-3313 (remotely exploitable, medium urgency) The IRC protocol dissector in Ethereal 0.10.13 allows remote attackers ... installed: ethereal 0.10.12-6 (built from ethereal 0.10.12-6) CVE-2005-3651 (remotely exploitable, medium urgency) Stack-based buffer overflow in the dissect_ospf_v3_address_prefix ... installed: ethereal 0.10.12-6 (built from ethereal 0.10.12-6) fixed on branch: ethereal 0.10.10-2sarge4 (source package) CVE-2005-3245 (fixed, remotely exploitable, low urgency) Unspecified vulnerability in the ONC RPC dissector in Ethereal 0.10.3 ... installed: ethereal2 0.10.12-6 (built from ethereal2 0.10.12-6) fixed in unstable: ethereal2 0.10.13-1 (source package) fix is available for the selected suite (sid) CVE-2005-3246 (fixed, remotely exploitable, high urgency) Ethereal 0.10.12 and earlier allows remote attackers to cause a denial ... installed: ethereal2 0.10.12-6 (built from ethereal2 0.10.12-6) fixed in unstable: ethereal2 0.10.13-1 (source package) fix is available for the selected suite (sid) CVE-2005-3247 (fixed, high urgency) The SigComp UDVM in Ethereal 0.10.12 allows remote attackers to cause ... installed: ethereal2 0.10.12-6 (built from ethereal2 0.10.12-6) fixed in unstable: ethereal2 0.10.13-1 (source package) fix is available for the selected suite (sid) CVE-2005-3248 (fixed, medium urgency) Unspecified vulnerability in the X11 dissector in Ethereal 0.10.12 and ... installed: ethereal2 0.10.12-6 (built from ethereal2 0.10.12-6) fixed in unstable: ethereal2 0.10.13-1 (source package) fix is available for the selected suite (sid) CVE-2005-3249 (fixed, remotely exploitable, low urgency) Unspecified vulnerability in the WSP dissector in Ethereal 0.10.1 to ... installed: ethereal2 0.10.12-6 (built from ethereal2 0.10.12-6) fixed in unstable: ethereal2 0.10.13-1 (source package) fix is available for the selected suite (sid) CVE-2005-3245 (fixed, remotely exploitable, low urgency) Unspecified vulnerability in the ONC RPC dissector in Ethereal 0.10.3 ... installed: ethereal2-common 0.10.12-6 (built from ethereal2 0.10.12-6) fixed in unstable: ethereal2 0.10.13-1 (source package) fix is available for the selected suite (sid) CVE-2005-3246 (fixed, remotely exploitable, high urgency) Ethereal 0.10.12 and earlier allows remote attackers to cause a denial ... installed: ethereal2-common 0.10.12-6 (built from ethereal2 0.10.12-6) fixed in unstable: ethereal2 0.10.13-1 (source package) fix is available for the selected suite (sid) CVE-2005-3247 (fixed, high urgency) The SigComp UDVM in Ethereal 0.10.12 allows remote attackers to cause ... installed: ethereal2-common 0.10.12-6 (built from ethereal2 0.10.12-6) fixed in unstable: ethereal2 0.10.13-1 (source package) fix is available for the selected suite (sid) CVE-2005-3248 (fixed, medium urgency) Unspecified vulnerability in the X11 dissector in Ethereal 0.10.12 and ... installed: ethereal2-common 0.10.12-6 (built from ethereal2 0.10.12-6) fixed in unstable: ethereal2 0.10.13-1 (source package) fix is available for the selected suite (sid) CVE-2005-3249 (fixed, remotely exploitable, low urgency) Unspecified vulnerability in the WSP dissector in Ethereal 0.10.1 to ... installed: ethereal2-common 0.10.12-6 (built from ethereal2 0.10.12-6) fixed in unstable: ethereal2 0.10.13-1 (source package) fix is available for the selected suite (sid) CVE-2005-3184 (fixed, remotely exploitable, medium urgency) Buffer overflow vulnerability in the unicode_to_bytes in the Service ... installed: ethereal-common 0.10.12-6 (built from ethereal 0.10.12-6) fixed in unstable: ethereal 0.10.13-1 (source package) fix is available for the selected suite (sid) CVE-2005-3241 (fixed, remotely exploitable, medium urgency) Multiple vulnerabilities in Ethereal 0.10.12 and earlier allow remote ... installed: ethereal-common 0.10.12-6 (built from ethereal 0.10.12-6) fixed in unstable: ethereal 0.10.13-1 (source package) fix is available for the selected suite (sid) CVE-2005-3242 (fixed, remotely exploitable, medium urgency) Ethereal 0.10.12 and earlier allows remote attackers to cause a denial ... installed: ethereal-common 0.10.12-6 (built from ethereal 0.10.12-6) fixed in unstable: ethereal 0.10.13-1 (source package) fix is available for the selected suite (sid) CVE-2005-3243 (fixed, remotely exploitable, medium urgency) Multiple buffer overflows in Ethereal 0.10.12 and earlier might allow ... installed: ethereal-common 0.10.12-6 (built from ethereal 0.10.12-6) fixed in unstable: ethereal 0.10.13-1 (source package) fix is available for the selected suite (sid) CVE-2005-3244 (fixed, remotely exploitable, medium urgency) The BER dissector in Ethereal 0.10.3 to 0.10.12 allows remote ... installed: ethereal-common 0.10.12-6 (built from ethereal 0.10.12-6) fixed in unstable: ethereal 0.10.13-1 (source package) fix is available for the selected suite (sid) CVE-2005-3245 (fixed, remotely exploitable, medium urgency) Unspecified vulnerability in the ONC RPC dissector in Ethereal 0.10.3 ... installed: ethereal-common 0.10.12-6 (built from ethereal 0.10.12-6) fixed in unstable: ethereal 0.10.13-1 (source package) fix is available for the selected suite (sid) CVE-2005-3246 (fixed, remotely exploitable, medium urgency) Ethereal 0.10.12 and earlier allows remote attackers to cause a denial ... installed: ethereal-common 0.10.12-6 (built from ethereal 0.10.12-6) fixed in unstable: ethereal 0.10.13-1 (source package) fix is available for the selected suite (sid) CVE-2005-3247 (fixed, remotely exploitable, medium urgency) The SigComp UDVM in Ethereal 0.10.12 allows remote attackers to cause ... installed: ethereal-common 0.10.12-6 (built from ethereal 0.10.12-6) fixed in unstable: ethereal 0.10.13-1 (source package) fix is available for the selected suite (sid) CVE-2005-3248 (fixed, remotely exploitable, medium urgency) Unspecified vulnerability in the X11 dissector in Ethereal 0.10.12 and ... installed: ethereal-common 0.10.12-6 (built from ethereal 0.10.12-6) fixed in unstable: ethereal 0.10.13-1 (source package) fix is available for the selected suite (sid) CVE-2005-3249 (fixed, remotely exploitable, medium urgency) Unspecified vulnerability in the WSP dissector in Ethereal 0.10.1 to ... installed: ethereal-common 0.10.12-6 (built from ethereal 0.10.12-6) fixed in unstable: ethereal 0.10.13-1 (source package) fix is available for the selected suite (sid) CVE-2005-3313 (remotely exploitable, medium urgency) The IRC protocol dissector in Ethereal 0.10.13 allows remote attackers ... installed: ethereal-common 0.10.12-6 (built from ethereal 0.10.12-6) CVE-2005-3651 (remotely exploitable, medium urgency) Stack-based buffer overflow in the dissect_ospf_v3_address_prefix ... installed: ethereal-common 0.10.12-6 (built from ethereal 0.10.12-6) fixed on branch: ethereal 0.10.10-2sarge4 (source package) CVE-2005-3184 (fixed, remotely exploitable, medium urgency) Buffer overflow vulnerability in the unicode_to_bytes in the Service ... installed: tethereal 0.10.12-6 (built from ethereal 0.10.12-6) fixed in unstable: ethereal 0.10.13-1 (source package) fix is available for the selected suite (sid) CVE-2005-3241 (fixed, remotely exploitable, medium urgency) Multiple vulnerabilities in Ethereal 0.10.12 and earlier allow remote ... installed: tethereal 0.10.12-6 (built from ethereal 0.10.12-6) fixed in unstable: ethereal 0.10.13-1 (source package) fix is available for the selected suite (sid) CVE-2005-3242 (fixed, remotely exploitable, medium urgency) Ethereal 0.10.12 and earlier allows remote attackers to cause a denial ... installed: tethereal 0.10.12-6 (built from ethereal 0.10.12-6) fixed in unstable: ethereal 0.10.13-1 (source package) fix is available for the selected suite (sid) CVE-2005-3243 (fixed, remotely exploitable, medium urgency) Multiple buffer overflows in Ethereal 0.10.12 and earlier might allow ... installed: tethereal 0.10.12-6 (built from ethereal 0.10.12-6) fixed in unstable: ethereal 0.10.13-1 (source package) fix is available for the selected suite (sid) CVE-2005-3244 (fixed, remotely exploitable, medium urgency) The BER dissector in Ethereal 0.10.3 to 0.10.12 allows remote ... installed: tethereal 0.10.12-6 (built from ethereal 0.10.12-6) fixed in unstable: ethereal 0.10.13-1 (source package) fix is available for the selected suite (sid) CVE-2005-3245 (fixed, remotely exploitable, medium urgency) Unspecified vulnerability in the ONC RPC dissector in Ethereal 0.10.3 ... installed: tethereal 0.10.12-6 (built from ethereal 0.10.12-6) fixed in unstable: ethereal 0.10.13-1 (source package) fix is available for the selected suite (sid) CVE-2005-3246 (fixed, remotely exploitable, medium urgency) Ethereal 0.10.12 and earlier allows remote attackers to cause a denial ... installed: tethereal 0.10.12-6 (built from ethereal 0.10.12-6) fixed in unstable: ethereal 0.10.13-1 (source package) fix is available for the selected suite (sid) CVE-2005-3247 (fixed, remotely exploitable, medium urgency) The SigComp UDVM in Ethereal 0.10.12 allows remote attackers to cause ... installed: tethereal 0.10.12-6 (built from ethereal 0.10.12-6) fixed in unstable: ethereal 0.10.13-1 (source package) fix is available for the selected suite (sid) CVE-2005-3248 (fixed, remotely exploitable, medium urgency) Unspecified vulnerability in the X11 dissector in Ethereal 0.10.12 and ... installed: tethereal 0.10.12-6 (built from ethereal 0.10.12-6) fixed in unstable: ethereal 0.10.13-1 (source package) fix is available for the selected suite (sid) CVE-2005-3249 (fixed, remotely exploitable, medium urgency) Unspecified vulnerability in the WSP dissector in Ethereal 0.10.1 to ... installed: tethereal 0.10.12-6 (built from ethereal 0.10.12-6) fixed in unstable: ethereal 0.10.13-1 (source package) fix is available for the selected suite (sid) CVE-2005-3313 (remotely exploitable, medium urgency) The IRC protocol dissector in Ethereal 0.10.13 allows remote attackers ... installed: tethereal 0.10.12-6 (built from ethereal 0.10.12-6) CVE-2005-3651 (remotely exploitable, medium urgency) Stack-based buffer overflow in the dissect_ospf_v3_address_prefix ... installed: tethereal 0.10.12-6 (built from ethereal 0.10.12-6) fixed on branch: ethereal 0.10.10-2sarge4 (source package) debsecan-0.4.18/testsuite/011/out.report0000644000000000000000000000563712315633555014657 0ustar Security report based on the sid release *** New security updates CVE-2005-3184 Buffer overflow vulnerability in the unicode_to_bytes... - ethereal, ethereal-common, tethereal (remotely exploitable, medium urgency) CVE-2005-3241 Multiple vulnerabilities in Ethereal 0.10.12 and... - ethereal, ethereal-common, tethereal (remotely exploitable, medium urgency) CVE-2005-3242 Ethereal 0.10.12 and earlier allows remote attackers... - ethereal, ethereal-common, tethereal (remotely exploitable, medium urgency) CVE-2005-3243 Multiple buffer overflows in Ethereal 0.10.12 and... - ethereal, ethereal-common, tethereal (remotely exploitable, medium urgency) CVE-2005-3244 The BER dissector in Ethereal 0.10.3 to 0.10.12... - ethereal, ethereal-common, tethereal (remotely exploitable, medium urgency) CVE-2005-3245 Unspecified vulnerability in the ONC RPC dissector in... - ethereal, ethereal-common, tethereal (remotely exploitable, medium urgency) - ethereal2, ethereal2-common (remotely exploitable, low urgency) CVE-2005-3246 Ethereal 0.10.12 and earlier allows remote attackers... - ethereal2, ethereal2-common (remotely exploitable, high urgency) - ethereal, ethereal-common, tethereal (remotely exploitable, medium urgency) CVE-2005-3247 The SigComp UDVM in Ethereal 0.10.12 allows remote... - ethereal2, ethereal2-common (high urgency) - ethereal, ethereal-common, tethereal (remotely exploitable, medium urgency) CVE-2005-3248 Unspecified vulnerability in the X11 dissector in... - ethereal, ethereal-common, tethereal (remotely exploitable, medium urgency) - ethereal2, ethereal2-common (medium urgency) CVE-2005-3249 Unspecified vulnerability in the WSP dissector in... - ethereal, ethereal-common, tethereal (remotely exploitable, medium urgency) - ethereal2, ethereal2-common (remotely exploitable, low urgency) *** Vulnerabilities without updates CVE-2005-3313 The IRC protocol dissector in Ethereal 0.10.13 allows... - ethereal, ethereal-common, tethereal (remotely exploitable, medium urgency) CVE-2005-3651 Stack-based buffer overflow in the... - ethereal, ethereal-common, tethereal (remotely exploitable, medium urgency) debsecan-0.4.18/testsuite/012/0000755000000000000000000000000012315633555012601 5ustar debsecan-0.4.18/testsuite/012/exp.bugs0000644000000000000000000000025012315633545014253 0ustar CVE-2005-3184 CVE-2005-3241 CVE-2005-3242 CVE-2005-3243 CVE-2005-3244 CVE-2005-3245 CVE-2005-3246 CVE-2005-3247 CVE-2005-3248 CVE-2005-3249 CVE-2005-3313 CVE-2005-3651 debsecan-0.4.18/testsuite/012/exp.detail0000644000000000000000000001730212315633545014563 0ustar CVE-2005-3184 (fixed, remotely exploitable, medium urgency) Buffer overflow vulnerability in the unicode_to_bytes in the Service ... installed: ethereal 0.10.12-6 (built from ethereal 0.10.12-6) fixed in unstable: ethereal 0.10.13-1 (source package) fix is available for the selected suite (sid) CVE-2005-3241 (fixed, remotely exploitable, medium urgency) Multiple vulnerabilities in Ethereal 0.10.12 and earlier allow remote ... installed: ethereal 0.10.12-6 (built from ethereal 0.10.12-6) fixed in unstable: ethereal 0.10.13-1 (source package) fix is available for the selected suite (sid) CVE-2005-3242 (fixed, remotely exploitable, medium urgency) Ethereal 0.10.12 and earlier allows remote attackers to cause a denial ... installed: ethereal 0.10.12-6 (built from ethereal 0.10.12-6) fixed in unstable: ethereal 0.10.13-1 (source package) fix is available for the selected suite (sid) CVE-2005-3243 (fixed, remotely exploitable, medium urgency) Multiple buffer overflows in Ethereal 0.10.12 and earlier might allow ... installed: ethereal 0.10.12-6 (built from ethereal 0.10.12-6) fixed in unstable: ethereal 0.10.13-1 (source package) fix is available for the selected suite (sid) CVE-2005-3244 (fixed, remotely exploitable, medium urgency) The BER dissector in Ethereal 0.10.3 to 0.10.12 allows remote ... installed: ethereal 0.10.12-6 (built from ethereal 0.10.12-6) fixed in unstable: ethereal 0.10.13-1 (source package) fix is available for the selected suite (sid) CVE-2005-3245 (fixed, remotely exploitable, medium urgency) Unspecified vulnerability in the ONC RPC dissector in Ethereal 0.10.3 ... installed: ethereal 0.10.12-6 (built from ethereal 0.10.12-6) fixed in unstable: ethereal 0.10.13-1 (source package) fix is available for the selected suite (sid) CVE-2005-3246 (fixed, remotely exploitable, medium urgency) Ethereal 0.10.12 and earlier allows remote attackers to cause a denial ... installed: ethereal 0.10.12-6 (built from ethereal 0.10.12-6) fixed in unstable: ethereal 0.10.13-1 (source package) fix is available for the selected suite (sid) CVE-2005-3247 (fixed, remotely exploitable, medium urgency) The SigComp UDVM in Ethereal 0.10.12 allows remote attackers to cause ... installed: ethereal 0.10.12-6 (built from ethereal 0.10.12-6) fixed in unstable: ethereal 0.10.13-1 (source package) fix is available for the selected suite (sid) CVE-2005-3248 (fixed, remotely exploitable, medium urgency) Unspecified vulnerability in the X11 dissector in Ethereal 0.10.12 and ... installed: ethereal 0.10.12-6 (built from ethereal 0.10.12-6) fixed in unstable: ethereal 0.10.13-1 (source package) fix is available for the selected suite (sid) CVE-2005-3249 (fixed, remotely exploitable, medium urgency) Unspecified vulnerability in the WSP dissector in Ethereal 0.10.1 to ... installed: ethereal 0.10.12-6 (built from ethereal 0.10.12-6) fixed in unstable: ethereal 0.10.13-1 (source package) fix is available for the selected suite (sid) CVE-2005-3313 (remotely exploitable, medium urgency) The IRC protocol dissector in Ethereal 0.10.13 allows remote attackers ... installed: ethereal 0.10.12-6 (built from ethereal 0.10.12-6) CVE-2005-3651 (remotely exploitable, medium urgency) Stack-based buffer overflow in the dissect_ospf_v3_address_prefix ... installed: ethereal 0.10.12-6 (built from ethereal 0.10.12-6) fixed on branch: ethereal 0.10.10-2sarge4 (source package) CVE-2005-3184 (fixed, remotely exploitable, medium urgency) Buffer overflow vulnerability in the unicode_to_bytes in the Service ... installed: ethereal-common 0.10.12-6 (built from ethereal 0.10.12-6) fixed in unstable: ethereal 0.10.13-1 (source package) fix is available for the selected suite (sid) CVE-2005-3241 (fixed, remotely exploitable, medium urgency) Multiple vulnerabilities in Ethereal 0.10.12 and earlier allow remote ... installed: ethereal-common 0.10.12-6 (built from ethereal 0.10.12-6) fixed in unstable: ethereal 0.10.13-1 (source package) fix is available for the selected suite (sid) CVE-2005-3242 (fixed, remotely exploitable, medium urgency) Ethereal 0.10.12 and earlier allows remote attackers to cause a denial ... installed: ethereal-common 0.10.12-6 (built from ethereal 0.10.12-6) fixed in unstable: ethereal 0.10.13-1 (source package) fix is available for the selected suite (sid) CVE-2005-3243 (fixed, remotely exploitable, medium urgency) Multiple buffer overflows in Ethereal 0.10.12 and earlier might allow ... installed: ethereal-common 0.10.12-6 (built from ethereal 0.10.12-6) fixed in unstable: ethereal 0.10.13-1 (source package) fix is available for the selected suite (sid) CVE-2005-3244 (fixed, remotely exploitable, medium urgency) The BER dissector in Ethereal 0.10.3 to 0.10.12 allows remote ... installed: ethereal-common 0.10.12-6 (built from ethereal 0.10.12-6) fixed in unstable: ethereal 0.10.13-1 (source package) fix is available for the selected suite (sid) CVE-2005-3245 (fixed, remotely exploitable, medium urgency) Unspecified vulnerability in the ONC RPC dissector in Ethereal 0.10.3 ... installed: ethereal-common 0.10.12-6 (built from ethereal 0.10.12-6) fixed in unstable: ethereal 0.10.13-1 (source package) fix is available for the selected suite (sid) CVE-2005-3246 (fixed, remotely exploitable, medium urgency) Ethereal 0.10.12 and earlier allows remote attackers to cause a denial ... installed: ethereal-common 0.10.12-6 (built from ethereal 0.10.12-6) fixed in unstable: ethereal 0.10.13-1 (source package) fix is available for the selected suite (sid) CVE-2005-3247 (fixed, remotely exploitable, medium urgency) The SigComp UDVM in Ethereal 0.10.12 allows remote attackers to cause ... installed: ethereal-common 0.10.12-6 (built from ethereal 0.10.12-6) fixed in unstable: ethereal 0.10.13-1 (source package) fix is available for the selected suite (sid) CVE-2005-3248 (fixed, remotely exploitable, medium urgency) Unspecified vulnerability in the X11 dissector in Ethereal 0.10.12 and ... installed: ethereal-common 0.10.12-6 (built from ethereal 0.10.12-6) fixed in unstable: ethereal 0.10.13-1 (source package) fix is available for the selected suite (sid) CVE-2005-3249 (fixed, remotely exploitable, medium urgency) Unspecified vulnerability in the WSP dissector in Ethereal 0.10.1 to ... installed: ethereal-common 0.10.12-6 (built from ethereal 0.10.12-6) fixed in unstable: ethereal 0.10.13-1 (source package) fix is available for the selected suite (sid) CVE-2005-3313 (remotely exploitable, medium urgency) The IRC protocol dissector in Ethereal 0.10.13 allows remote attackers ... installed: ethereal-common 0.10.12-6 (built from ethereal 0.10.12-6) CVE-2005-3651 (remotely exploitable, medium urgency) Stack-based buffer overflow in the dissect_ospf_v3_address_prefix ... installed: ethereal-common 0.10.12-6 (built from ethereal 0.10.12-6) fixed on branch: ethereal 0.10.10-2sarge4 (source package) CVE-2005-3313 (remotely exploitable, medium urgency) The IRC protocol dissector in Ethereal 0.10.13 allows remote attackers ... installed: tethereal 0.10.12-6 (built from ethereal 0.10_12-6) CVE-2005-3651 (remotely exploitable, medium urgency) Stack-based buffer overflow in the dissect_ospf_v3_address_prefix ... installed: tethereal 0.10.12-6 (built from ethereal 0.10_12-6) fixed on branch: ethereal 0.10.10-2sarge4 (source package) debsecan-0.4.18/testsuite/012/exp.packages0000644000000000000000000000004312315633545015071 0ustar ethereal ethereal-common tethereal debsecan-0.4.18/testsuite/012/exp.report0000644000000000000000000000473412315633545014641 0ustar Security report based on the sid release *** New security updates CVE-2005-3184 Buffer overflow vulnerability in the unicode_to_bytes... - ethereal, ethereal-common (remotely exploitable, medium urgency) CVE-2005-3241 Multiple vulnerabilities in Ethereal 0.10.12 and... - ethereal, ethereal-common (remotely exploitable, medium urgency) CVE-2005-3242 Ethereal 0.10.12 and earlier allows remote attackers... - ethereal, ethereal-common (remotely exploitable, medium urgency) CVE-2005-3243 Multiple buffer overflows in Ethereal 0.10.12 and... - ethereal, ethereal-common (remotely exploitable, medium urgency) CVE-2005-3244 The BER dissector in Ethereal 0.10.3 to 0.10.12... - ethereal, ethereal-common (remotely exploitable, medium urgency) CVE-2005-3245 Unspecified vulnerability in the ONC RPC dissector in... - ethereal, ethereal-common (remotely exploitable, medium urgency) CVE-2005-3246 Ethereal 0.10.12 and earlier allows remote attackers... - ethereal, ethereal-common (remotely exploitable, medium urgency) CVE-2005-3247 The SigComp UDVM in Ethereal 0.10.12 allows remote... - ethereal, ethereal-common (remotely exploitable, medium urgency) CVE-2005-3248 Unspecified vulnerability in the X11 dissector in... - ethereal, ethereal-common (remotely exploitable, medium urgency) CVE-2005-3249 Unspecified vulnerability in the WSP dissector in... - ethereal, ethereal-common (remotely exploitable, medium urgency) *** Vulnerabilities without updates CVE-2005-3313 The IRC protocol dissector in Ethereal 0.10.13 allows... - ethereal, ethereal-common, tethereal (remotely exploitable, medium urgency) CVE-2005-3651 Stack-based buffer overflow in the... - ethereal, ethereal-common, tethereal (remotely exploitable, medium urgency) debsecan-0.4.18/testsuite/012/exp.summary0000644000000000000000000000345612315633545015023 0ustar CVE-2005-3184 ethereal (fixed, remotely exploitable, medium urgency) CVE-2005-3184 ethereal-common (fixed, remotely exploitable, medium urgency) CVE-2005-3241 ethereal (fixed, remotely exploitable, medium urgency) CVE-2005-3241 ethereal-common (fixed, remotely exploitable, medium urgency) CVE-2005-3242 ethereal (fixed, remotely exploitable, medium urgency) CVE-2005-3242 ethereal-common (fixed, remotely exploitable, medium urgency) CVE-2005-3243 ethereal (fixed, remotely exploitable, medium urgency) CVE-2005-3243 ethereal-common (fixed, remotely exploitable, medium urgency) CVE-2005-3244 ethereal (fixed, remotely exploitable, medium urgency) CVE-2005-3244 ethereal-common (fixed, remotely exploitable, medium urgency) CVE-2005-3245 ethereal (fixed, remotely exploitable, medium urgency) CVE-2005-3245 ethereal-common (fixed, remotely exploitable, medium urgency) CVE-2005-3246 ethereal (fixed, remotely exploitable, medium urgency) CVE-2005-3246 ethereal-common (fixed, remotely exploitable, medium urgency) CVE-2005-3247 ethereal (fixed, remotely exploitable, medium urgency) CVE-2005-3247 ethereal-common (fixed, remotely exploitable, medium urgency) CVE-2005-3248 ethereal (fixed, remotely exploitable, medium urgency) CVE-2005-3248 ethereal-common (fixed, remotely exploitable, medium urgency) CVE-2005-3249 ethereal (fixed, remotely exploitable, medium urgency) CVE-2005-3249 ethereal-common (fixed, remotely exploitable, medium urgency) CVE-2005-3313 ethereal (remotely exploitable, medium urgency) CVE-2005-3313 ethereal-common (remotely exploitable, medium urgency) CVE-2005-3313 tethereal (remotely exploitable, medium urgency) CVE-2005-3651 ethereal (remotely exploitable, medium urgency) CVE-2005-3651 ethereal-common (remotely exploitable, medium urgency) CVE-2005-3651 tethereal (remotely exploitable, medium urgency) debsecan-0.4.18/testsuite/012/history0000644000000000000000000000026011004700541014203 0ustar VERSION 0 CVE-2005-3651,ethereal, CVE-2005-3313,ethereal, CVE-2005-3651,tethereal, CVE-2005-3313,tethereal, CVE-2005-3651,ethereal-common, CVE-2005-3313,ethereal-common, debsecan-0.4.18/testsuite/012/sid0000644000000000000000000000356011004700541013267 0ustar x͙[s8)֒|}I ƀ M_ن Hr(CGnGʧm4&4!D=C0.6AH*{*@AyOr9 qJhxE+n /Ӻ1F]#j9dW:Єh;F0%tJf쬖qCc؅- õn㲛T} y}+iğB<6-nh}nYk7a83t\K|DWzLF@~LR4dXo#GTWM>6cB}ݎ; n!De +]&nBv%RɕTT N`Ӽc7S0R;cPS]|K[ ٫tS*VP{`!Hz lCɓl╏-C8y)|c]S.֗Tqp%qpw{Uxn))nx6O?;koؚǗsU'o v4]pENiHm:ɚl%?ij|v|B,Plq7́Xl U43p>koMmht_Q/C /o򷬊JOWhkIQH6iIX-y&խLXaFí`47`-0=/ forxY ANE*f.7v\;+y ln)lnUsA@Q;ߑIKƗ3aGTۗ"$Q 5z\7-I# t$TAn4bSFg"zRȵ:7-/kTxvPn! aЭ vl܏]fG^M_(YA~j:"Rtqۇdy_n`4#lBJpo9V,Y$d~xn^bEݾ$ O1}P :BuwR$dӼv AZgJ]^d)ٱ颋*fVG<E򭆾yy4ܾ3?RS͟7CN /bhqElp%+y\߫{^%3{C'{uB2 W_ItJQ* D!>aS5 TBOZӣtU`pWVgrMH="h̀e1'ȑ\L!r̸8 &$7aɒlt\7a 94y拶Z,S†x +l`+|IFߕ5\-u5lS[jk m hkhcjkcjӘ^he%ytK(dlh*>utKttGǵtٖ|x /6aRlQm? e+v?Go== 2.2.4-4), libglib1.2 (>= 1.2.0), libgtk1.2 (>= 1.2.10-4), xlibs (>= 4.1.0) Description: NeroLINUX CD/DVD Burning Software Copyright: Nero AG NeroLINUX uses Nero 6.6's embedded API to bring Nero's powerful CD/DVD-writer functions to the Linux Desktop. Package: ethereal Status: install ok installed Priority: optional Section: net Installed-Size: 1264 Maintainer: Frederic Peters Architecture: i386 Version: 0.10.12-6 Depends: libadns1, libatk1.0-0 (>= 1.9.0), libc6 (>= 2.3.5-1), libcap1, libcomerr2 (>= 1.33-3), libglib2.0-0 (>= 2.8.0), libgtk2.0-0 (>= 2.6.0), libkrb53 (>= 1.3.2), libpango1.0-0 (>= 1.8.2), libpcap0.8 (>= 0.9.3-1), libpcre3 (>= 4.5), zlib1g (>= 1:1.2.1), ethereal-common (= 0.10.12-6) Recommends: gksu Description: network traffic analyzer Ethereal is a network traffic analyzer, or "sniffer", for Unix and Unix-like operating systems. A sniffer is a tool used to capture packets off the wire. Ethereal decodes numerous protocols (too many to list). . This package provides ethereal (the GTK+ version) Package: ethereal-common Status: install ok installed Priority: optional Section: net Installed-Size: 20320 Maintainer: Frederic Peters Architecture: i386 Source: ethereal Version: 0.10.12-6 Depends: libc6 (>= 2.3.5-1), libcap1, libglib2.0-0 (>= 2.8.0), libpcre3 (>= 4.5), zlib1g (>= 1:1.2.1) Recommends: ethereal (>= 0.9.1-3) | tethereal (>= 0.9.1-3) Conflicts: ethereal (<< 0.9.1-3), tethereal (<< 0.9.1-3) Description: network traffic analyser (common files) Ethereal is a network traffic analyzer, or "sniffer", for Unix and Unix-like operating systems. A sniffer is a tool used to capture packets off the wire. Ethereal decodes numerous protocols (too many to list). . This package provides files common to both ethereal (the GTK+ version) and tethereal (the console version). Package: tethereal Status: install ok installed Priority: optional Section: net Installed-Size: 240 Maintainer: Frederic Peters Architecture: i386 Source: ethereal (0.10_12-6) Version: 0.10.12-6 Depends: libadns1, libc6 (>= 2.3.5-1), libcap1, libcomerr2 (>= 1.33-3), libglib2.0-0 (>= 2.8.0), libkrb53 (>= 1.3.2), libpcap0.8 (>= 0.9.3-1), libpcre3 (>= 4.5), zlib1g (>= 1:1.2.1), ethereal-common (= 0.10.12-6) Description: network traffic analyzer (console) Ethereal is a network traffic analyzer, or "sniffer", for Unix and Unix-like operating systems. A sniffer is a tool used to capture packets off the wire. Ethereal decodes numerous protocols (too many to list). . This package provides the console version of ethereal, named "tethereal". Package: amsn Status: install ok installed Priority: optional Section: x11 Installed-Size: 6908 Maintainer: Bruno Gonçalves Architecture: i386 Version: 0_95B-1 Description: AMSN é um clone do MSN Messenger para Linux Package: j2sdk Status: install ok installed Priority: extra Section: alien Installed-Size: 68560 Maintainer: root Version: 1.4.2_04-1 Depends: libasound2 (>> 0.9.3), libc6 (>= 2.3.2.ds1-4), libgcc1 (>= 1:3.3.2-1), xlibs (>> 4.1.0) Description: Java(TM) 2 Software Development Kit, Standard Edition debsecan-0.4.18/testsuite/012/out.summary0000644000000000000000000000345612315633555015037 0ustar CVE-2005-3184 ethereal (fixed, remotely exploitable, medium urgency) CVE-2005-3184 ethereal-common (fixed, remotely exploitable, medium urgency) CVE-2005-3241 ethereal (fixed, remotely exploitable, medium urgency) CVE-2005-3241 ethereal-common (fixed, remotely exploitable, medium urgency) CVE-2005-3242 ethereal (fixed, remotely exploitable, medium urgency) CVE-2005-3242 ethereal-common (fixed, remotely exploitable, medium urgency) CVE-2005-3243 ethereal (fixed, remotely exploitable, medium urgency) CVE-2005-3243 ethereal-common (fixed, remotely exploitable, medium urgency) CVE-2005-3244 ethereal (fixed, remotely exploitable, medium urgency) CVE-2005-3244 ethereal-common (fixed, remotely exploitable, medium urgency) CVE-2005-3245 ethereal (fixed, remotely exploitable, medium urgency) CVE-2005-3245 ethereal-common (fixed, remotely exploitable, medium urgency) CVE-2005-3246 ethereal (fixed, remotely exploitable, medium urgency) CVE-2005-3246 ethereal-common (fixed, remotely exploitable, medium urgency) CVE-2005-3247 ethereal (fixed, remotely exploitable, medium urgency) CVE-2005-3247 ethereal-common (fixed, remotely exploitable, medium urgency) CVE-2005-3248 ethereal (fixed, remotely exploitable, medium urgency) CVE-2005-3248 ethereal-common (fixed, remotely exploitable, medium urgency) CVE-2005-3249 ethereal (fixed, remotely exploitable, medium urgency) CVE-2005-3249 ethereal-common (fixed, remotely exploitable, medium urgency) CVE-2005-3313 ethereal (remotely exploitable, medium urgency) CVE-2005-3313 ethereal-common (remotely exploitable, medium urgency) CVE-2005-3313 tethereal (remotely exploitable, medium urgency) CVE-2005-3651 ethereal (remotely exploitable, medium urgency) CVE-2005-3651 ethereal-common (remotely exploitable, medium urgency) CVE-2005-3651 tethereal (remotely exploitable, medium urgency) debsecan-0.4.18/testsuite/012/out.packages0000644000000000000000000000004312315633555015105 0ustar ethereal ethereal-common tethereal debsecan-0.4.18/testsuite/012/out.bugs0000644000000000000000000000025012315633555014267 0ustar CVE-2005-3184 CVE-2005-3241 CVE-2005-3242 CVE-2005-3243 CVE-2005-3244 CVE-2005-3245 CVE-2005-3246 CVE-2005-3247 CVE-2005-3248 CVE-2005-3249 CVE-2005-3313 CVE-2005-3651 debsecan-0.4.18/testsuite/012/out.detail0000644000000000000000000001730212315633555014577 0ustar CVE-2005-3184 (fixed, remotely exploitable, medium urgency) Buffer overflow vulnerability in the unicode_to_bytes in the Service ... installed: ethereal 0.10.12-6 (built from ethereal 0.10.12-6) fixed in unstable: ethereal 0.10.13-1 (source package) fix is available for the selected suite (sid) CVE-2005-3241 (fixed, remotely exploitable, medium urgency) Multiple vulnerabilities in Ethereal 0.10.12 and earlier allow remote ... installed: ethereal 0.10.12-6 (built from ethereal 0.10.12-6) fixed in unstable: ethereal 0.10.13-1 (source package) fix is available for the selected suite (sid) CVE-2005-3242 (fixed, remotely exploitable, medium urgency) Ethereal 0.10.12 and earlier allows remote attackers to cause a denial ... installed: ethereal 0.10.12-6 (built from ethereal 0.10.12-6) fixed in unstable: ethereal 0.10.13-1 (source package) fix is available for the selected suite (sid) CVE-2005-3243 (fixed, remotely exploitable, medium urgency) Multiple buffer overflows in Ethereal 0.10.12 and earlier might allow ... installed: ethereal 0.10.12-6 (built from ethereal 0.10.12-6) fixed in unstable: ethereal 0.10.13-1 (source package) fix is available for the selected suite (sid) CVE-2005-3244 (fixed, remotely exploitable, medium urgency) The BER dissector in Ethereal 0.10.3 to 0.10.12 allows remote ... installed: ethereal 0.10.12-6 (built from ethereal 0.10.12-6) fixed in unstable: ethereal 0.10.13-1 (source package) fix is available for the selected suite (sid) CVE-2005-3245 (fixed, remotely exploitable, medium urgency) Unspecified vulnerability in the ONC RPC dissector in Ethereal 0.10.3 ... installed: ethereal 0.10.12-6 (built from ethereal 0.10.12-6) fixed in unstable: ethereal 0.10.13-1 (source package) fix is available for the selected suite (sid) CVE-2005-3246 (fixed, remotely exploitable, medium urgency) Ethereal 0.10.12 and earlier allows remote attackers to cause a denial ... installed: ethereal 0.10.12-6 (built from ethereal 0.10.12-6) fixed in unstable: ethereal 0.10.13-1 (source package) fix is available for the selected suite (sid) CVE-2005-3247 (fixed, remotely exploitable, medium urgency) The SigComp UDVM in Ethereal 0.10.12 allows remote attackers to cause ... installed: ethereal 0.10.12-6 (built from ethereal 0.10.12-6) fixed in unstable: ethereal 0.10.13-1 (source package) fix is available for the selected suite (sid) CVE-2005-3248 (fixed, remotely exploitable, medium urgency) Unspecified vulnerability in the X11 dissector in Ethereal 0.10.12 and ... installed: ethereal 0.10.12-6 (built from ethereal 0.10.12-6) fixed in unstable: ethereal 0.10.13-1 (source package) fix is available for the selected suite (sid) CVE-2005-3249 (fixed, remotely exploitable, medium urgency) Unspecified vulnerability in the WSP dissector in Ethereal 0.10.1 to ... installed: ethereal 0.10.12-6 (built from ethereal 0.10.12-6) fixed in unstable: ethereal 0.10.13-1 (source package) fix is available for the selected suite (sid) CVE-2005-3313 (remotely exploitable, medium urgency) The IRC protocol dissector in Ethereal 0.10.13 allows remote attackers ... installed: ethereal 0.10.12-6 (built from ethereal 0.10.12-6) CVE-2005-3651 (remotely exploitable, medium urgency) Stack-based buffer overflow in the dissect_ospf_v3_address_prefix ... installed: ethereal 0.10.12-6 (built from ethereal 0.10.12-6) fixed on branch: ethereal 0.10.10-2sarge4 (source package) CVE-2005-3184 (fixed, remotely exploitable, medium urgency) Buffer overflow vulnerability in the unicode_to_bytes in the Service ... installed: ethereal-common 0.10.12-6 (built from ethereal 0.10.12-6) fixed in unstable: ethereal 0.10.13-1 (source package) fix is available for the selected suite (sid) CVE-2005-3241 (fixed, remotely exploitable, medium urgency) Multiple vulnerabilities in Ethereal 0.10.12 and earlier allow remote ... installed: ethereal-common 0.10.12-6 (built from ethereal 0.10.12-6) fixed in unstable: ethereal 0.10.13-1 (source package) fix is available for the selected suite (sid) CVE-2005-3242 (fixed, remotely exploitable, medium urgency) Ethereal 0.10.12 and earlier allows remote attackers to cause a denial ... installed: ethereal-common 0.10.12-6 (built from ethereal 0.10.12-6) fixed in unstable: ethereal 0.10.13-1 (source package) fix is available for the selected suite (sid) CVE-2005-3243 (fixed, remotely exploitable, medium urgency) Multiple buffer overflows in Ethereal 0.10.12 and earlier might allow ... installed: ethereal-common 0.10.12-6 (built from ethereal 0.10.12-6) fixed in unstable: ethereal 0.10.13-1 (source package) fix is available for the selected suite (sid) CVE-2005-3244 (fixed, remotely exploitable, medium urgency) The BER dissector in Ethereal 0.10.3 to 0.10.12 allows remote ... installed: ethereal-common 0.10.12-6 (built from ethereal 0.10.12-6) fixed in unstable: ethereal 0.10.13-1 (source package) fix is available for the selected suite (sid) CVE-2005-3245 (fixed, remotely exploitable, medium urgency) Unspecified vulnerability in the ONC RPC dissector in Ethereal 0.10.3 ... installed: ethereal-common 0.10.12-6 (built from ethereal 0.10.12-6) fixed in unstable: ethereal 0.10.13-1 (source package) fix is available for the selected suite (sid) CVE-2005-3246 (fixed, remotely exploitable, medium urgency) Ethereal 0.10.12 and earlier allows remote attackers to cause a denial ... installed: ethereal-common 0.10.12-6 (built from ethereal 0.10.12-6) fixed in unstable: ethereal 0.10.13-1 (source package) fix is available for the selected suite (sid) CVE-2005-3247 (fixed, remotely exploitable, medium urgency) The SigComp UDVM in Ethereal 0.10.12 allows remote attackers to cause ... installed: ethereal-common 0.10.12-6 (built from ethereal 0.10.12-6) fixed in unstable: ethereal 0.10.13-1 (source package) fix is available for the selected suite (sid) CVE-2005-3248 (fixed, remotely exploitable, medium urgency) Unspecified vulnerability in the X11 dissector in Ethereal 0.10.12 and ... installed: ethereal-common 0.10.12-6 (built from ethereal 0.10.12-6) fixed in unstable: ethereal 0.10.13-1 (source package) fix is available for the selected suite (sid) CVE-2005-3249 (fixed, remotely exploitable, medium urgency) Unspecified vulnerability in the WSP dissector in Ethereal 0.10.1 to ... installed: ethereal-common 0.10.12-6 (built from ethereal 0.10.12-6) fixed in unstable: ethereal 0.10.13-1 (source package) fix is available for the selected suite (sid) CVE-2005-3313 (remotely exploitable, medium urgency) The IRC protocol dissector in Ethereal 0.10.13 allows remote attackers ... installed: ethereal-common 0.10.12-6 (built from ethereal 0.10.12-6) CVE-2005-3651 (remotely exploitable, medium urgency) Stack-based buffer overflow in the dissect_ospf_v3_address_prefix ... installed: ethereal-common 0.10.12-6 (built from ethereal 0.10.12-6) fixed on branch: ethereal 0.10.10-2sarge4 (source package) CVE-2005-3313 (remotely exploitable, medium urgency) The IRC protocol dissector in Ethereal 0.10.13 allows remote attackers ... installed: tethereal 0.10.12-6 (built from ethereal 0.10_12-6) CVE-2005-3651 (remotely exploitable, medium urgency) Stack-based buffer overflow in the dissect_ospf_v3_address_prefix ... installed: tethereal 0.10.12-6 (built from ethereal 0.10_12-6) fixed on branch: ethereal 0.10.10-2sarge4 (source package) debsecan-0.4.18/testsuite/012/out.report0000644000000000000000000000473412315633555014655 0ustar Security report based on the sid release *** New security updates CVE-2005-3184 Buffer overflow vulnerability in the unicode_to_bytes... - ethereal, ethereal-common (remotely exploitable, medium urgency) CVE-2005-3241 Multiple vulnerabilities in Ethereal 0.10.12 and... - ethereal, ethereal-common (remotely exploitable, medium urgency) CVE-2005-3242 Ethereal 0.10.12 and earlier allows remote attackers... - ethereal, ethereal-common (remotely exploitable, medium urgency) CVE-2005-3243 Multiple buffer overflows in Ethereal 0.10.12 and... - ethereal, ethereal-common (remotely exploitable, medium urgency) CVE-2005-3244 The BER dissector in Ethereal 0.10.3 to 0.10.12... - ethereal, ethereal-common (remotely exploitable, medium urgency) CVE-2005-3245 Unspecified vulnerability in the ONC RPC dissector in... - ethereal, ethereal-common (remotely exploitable, medium urgency) CVE-2005-3246 Ethereal 0.10.12 and earlier allows remote attackers... - ethereal, ethereal-common (remotely exploitable, medium urgency) CVE-2005-3247 The SigComp UDVM in Ethereal 0.10.12 allows remote... - ethereal, ethereal-common (remotely exploitable, medium urgency) CVE-2005-3248 Unspecified vulnerability in the X11 dissector in... - ethereal, ethereal-common (remotely exploitable, medium urgency) CVE-2005-3249 Unspecified vulnerability in the WSP dissector in... - ethereal, ethereal-common (remotely exploitable, medium urgency) *** Vulnerabilities without updates CVE-2005-3313 The IRC protocol dissector in Ethereal 0.10.13 allows... - ethereal, ethereal-common, tethereal (remotely exploitable, medium urgency) CVE-2005-3651 Stack-based buffer overflow in the... - ethereal, ethereal-common, tethereal (remotely exploitable, medium urgency) debsecan-0.4.18/testsuite/013/0000755000000000000000000000000012315633555012602 5ustar debsecan-0.4.18/testsuite/013/exp.bugs0000644000000000000000000000023212315633545014254 0ustar CVE-2005-3241 CVE-2005-3242 CVE-2005-3243 CVE-2005-3244 CVE-2005-3245 CVE-2005-3246 CVE-2005-3247 CVE-2005-3248 CVE-2005-3249 CVE-2005-3313 CVE-2005-3651 debsecan-0.4.18/testsuite/013/exp.detail0000644000000000000000000002245712315633545014573 0ustar CVE-2005-3242 (fixed, remotely exploitable, medium urgency) Ethereal 0.10.12 and earlier allows remote attackers to cause a denial ... installed: ethereal 0.10.12-6 (built from ethereal 0.10.12-6) fixed in unstable: ethereal 0.10.13-1 (source package) fix is available for the selected suite (sid) CVE-2005-3243 (fixed, remotely exploitable, medium urgency) Multiple buffer overflows in Ethereal 0.10.12 and earlier might allow ... installed: ethereal 0.10.12-6 (built from ethereal 0.10.12-6) fixed in unstable: ethereal 0.10.13-1 (source package) fix is available for the selected suite (sid) CVE-2005-3244 (fixed, remotely exploitable, medium urgency) The BER dissector in Ethereal 0.10.3 to 0.10.12 allows remote ... installed: ethereal 0.10.12-6 (built from ethereal 0.10.12-6) fixed in unstable: ethereal 0.10.13-1 (source package) fix is available for the selected suite (sid) CVE-2005-3245 (fixed, remotely exploitable, medium urgency) Unspecified vulnerability in the ONC RPC dissector in Ethereal 0.10.3 ... installed: ethereal 0.10.12-6 (built from ethereal 0.10.12-6) fixed in unstable: ethereal 0.10.13-1 (source package) fix is available for the selected suite (sid) CVE-2005-3246 (fixed, remotely exploitable, medium urgency) Ethereal 0.10.12 and earlier allows remote attackers to cause a denial ... installed: ethereal 0.10.12-6 (built from ethereal 0.10.12-6) fixed in unstable: ethereal 0.10.13-1 (source package) fix is available for the selected suite (sid) CVE-2005-3247 (fixed, remotely exploitable, medium urgency) The SigComp UDVM in Ethereal 0.10.12 allows remote attackers to cause ... installed: ethereal 0.10.12-6 (built from ethereal 0.10.12-6) fixed in unstable: ethereal 0.10.13-1 (source package) fix is available for the selected suite (sid) CVE-2005-3248 (fixed, remotely exploitable, medium urgency) Unspecified vulnerability in the X11 dissector in Ethereal 0.10.12 and ... installed: ethereal 0.10.12-6 (built from ethereal 0.10.12-6) fixed in unstable: ethereal 0.10.13-1 (source package) fix is available for the selected suite (sid) CVE-2005-3249 (fixed, remotely exploitable, medium urgency) Unspecified vulnerability in the WSP dissector in Ethereal 0.10.1 to ... installed: ethereal 0.10.12-6 (built from ethereal 0.10.12-6) fixed in unstable: ethereal 0.10.13-1 (source package) fix is available for the selected suite (sid) CVE-2005-3313 (remotely exploitable, medium urgency) The IRC protocol dissector in Ethereal 0.10.13 allows remote attackers ... installed: ethereal 0.10.12-6 (built from ethereal 0.10.12-6) CVE-2005-3651 (remotely exploitable, medium urgency) Stack-based buffer overflow in the dissect_ospf_v3_address_prefix ... installed: ethereal 0.10.12-6 (built from ethereal 0.10.12-6) fixed on branch: ethereal 0.10.10-2sarge4 (source package) CVE-2005-3241 (fixed, remotely exploitable, medium urgency) Multiple vulnerabilities in Ethereal 0.10.12 and earlier allow remote ... installed: ethereal-common 0.10.12-6 (built from ethereal 0.10.12-6) fixed in unstable: ethereal 0.10.13-1 (source package) fix is available for the selected suite (sid) CVE-2005-3242 (fixed, remotely exploitable, medium urgency) Ethereal 0.10.12 and earlier allows remote attackers to cause a denial ... installed: ethereal-common 0.10.12-6 (built from ethereal 0.10.12-6) fixed in unstable: ethereal 0.10.13-1 (source package) fix is available for the selected suite (sid) CVE-2005-3243 (fixed, remotely exploitable, medium urgency) Multiple buffer overflows in Ethereal 0.10.12 and earlier might allow ... installed: ethereal-common 0.10.12-6 (built from ethereal 0.10.12-6) fixed in unstable: ethereal 0.10.13-1 (source package) fix is available for the selected suite (sid) CVE-2005-3244 (fixed, remotely exploitable, medium urgency) The BER dissector in Ethereal 0.10.3 to 0.10.12 allows remote ... installed: ethereal-common 0.10.12-6 (built from ethereal 0.10.12-6) fixed in unstable: ethereal 0.10.13-1 (source package) fix is available for the selected suite (sid) CVE-2005-3245 (fixed, remotely exploitable, medium urgency) Unspecified vulnerability in the ONC RPC dissector in Ethereal 0.10.3 ... installed: ethereal-common 0.10.12-6 (built from ethereal 0.10.12-6) fixed in unstable: ethereal 0.10.13-1 (source package) fix is available for the selected suite (sid) CVE-2005-3246 (fixed, remotely exploitable, medium urgency) Ethereal 0.10.12 and earlier allows remote attackers to cause a denial ... installed: ethereal-common 0.10.12-6 (built from ethereal 0.10.12-6) fixed in unstable: ethereal 0.10.13-1 (source package) fix is available for the selected suite (sid) CVE-2005-3247 (fixed, remotely exploitable, medium urgency) The SigComp UDVM in Ethereal 0.10.12 allows remote attackers to cause ... installed: ethereal-common 0.10.12-6 (built from ethereal 0.10.12-6) fixed in unstable: ethereal 0.10.13-1 (source package) fix is available for the selected suite (sid) CVE-2005-3248 (fixed, remotely exploitable, medium urgency) Unspecified vulnerability in the X11 dissector in Ethereal 0.10.12 and ... installed: ethereal-common 0.10.12-6 (built from ethereal 0.10.12-6) fixed in unstable: ethereal 0.10.13-1 (source package) fix is available for the selected suite (sid) CVE-2005-3249 (fixed, remotely exploitable, medium urgency) Unspecified vulnerability in the WSP dissector in Ethereal 0.10.1 to ... installed: ethereal-common 0.10.12-6 (built from ethereal 0.10.12-6) fixed in unstable: ethereal 0.10.13-1 (source package) fix is available for the selected suite (sid) CVE-2005-3313 (remotely exploitable, medium urgency) The IRC protocol dissector in Ethereal 0.10.13 allows remote attackers ... installed: ethereal-common 0.10.12-6 (built from ethereal 0.10.12-6) CVE-2005-3651 (remotely exploitable, medium urgency) Stack-based buffer overflow in the dissect_ospf_v3_address_prefix ... installed: ethereal-common 0.10.12-6 (built from ethereal 0.10.12-6) fixed on branch: ethereal 0.10.10-2sarge4 (source package) CVE-2005-3241 (fixed, remotely exploitable, medium urgency) Multiple vulnerabilities in Ethereal 0.10.12 and earlier allow remote ... installed: tethereal 0.10.12-6 (built from ethereal 0.10.12-6) fixed in unstable: ethereal 0.10.13-1 (source package) fix is available for the selected suite (sid) CVE-2005-3242 (fixed, remotely exploitable, medium urgency) Ethereal 0.10.12 and earlier allows remote attackers to cause a denial ... installed: tethereal 0.10.12-6 (built from ethereal 0.10.12-6) fixed in unstable: ethereal 0.10.13-1 (source package) fix is available for the selected suite (sid) CVE-2005-3243 (fixed, remotely exploitable, medium urgency) Multiple buffer overflows in Ethereal 0.10.12 and earlier might allow ... installed: tethereal 0.10.12-6 (built from ethereal 0.10.12-6) fixed in unstable: ethereal 0.10.13-1 (source package) fix is available for the selected suite (sid) CVE-2005-3244 (fixed, remotely exploitable, medium urgency) The BER dissector in Ethereal 0.10.3 to 0.10.12 allows remote ... installed: tethereal 0.10.12-6 (built from ethereal 0.10.12-6) fixed in unstable: ethereal 0.10.13-1 (source package) fix is available for the selected suite (sid) CVE-2005-3245 (fixed, remotely exploitable, medium urgency) Unspecified vulnerability in the ONC RPC dissector in Ethereal 0.10.3 ... installed: tethereal 0.10.12-6 (built from ethereal 0.10.12-6) fixed in unstable: ethereal 0.10.13-1 (source package) fix is available for the selected suite (sid) CVE-2005-3246 (fixed, remotely exploitable, medium urgency) Ethereal 0.10.12 and earlier allows remote attackers to cause a denial ... installed: tethereal 0.10.12-6 (built from ethereal 0.10.12-6) fixed in unstable: ethereal 0.10.13-1 (source package) fix is available for the selected suite (sid) CVE-2005-3247 (fixed, remotely exploitable, medium urgency) The SigComp UDVM in Ethereal 0.10.12 allows remote attackers to cause ... installed: tethereal 0.10.12-6 (built from ethereal 0.10.12-6) fixed in unstable: ethereal 0.10.13-1 (source package) fix is available for the selected suite (sid) CVE-2005-3248 (fixed, remotely exploitable, medium urgency) Unspecified vulnerability in the X11 dissector in Ethereal 0.10.12 and ... installed: tethereal 0.10.12-6 (built from ethereal 0.10.12-6) fixed in unstable: ethereal 0.10.13-1 (source package) fix is available for the selected suite (sid) CVE-2005-3249 (fixed, remotely exploitable, medium urgency) Unspecified vulnerability in the WSP dissector in Ethereal 0.10.1 to ... installed: tethereal 0.10.12-6 (built from ethereal 0.10.12-6) fixed in unstable: ethereal 0.10.13-1 (source package) fix is available for the selected suite (sid) CVE-2005-3313 (remotely exploitable, medium urgency) The IRC protocol dissector in Ethereal 0.10.13 allows remote attackers ... installed: tethereal 0.10.12-6 (built from ethereal 0.10.12-6) debsecan-0.4.18/testsuite/013/exp.packages0000644000000000000000000000004312315633545015072 0ustar ethereal ethereal-common tethereal debsecan-0.4.18/testsuite/013/exp.report0000644000000000000000000000472412315633545014641 0ustar Security report based on the sid release *** New security updates CVE-2005-3241 Multiple vulnerabilities in Ethereal 0.10.12 and... - ethereal-common, tethereal (remotely exploitable, medium urgency) CVE-2005-3242 Ethereal 0.10.12 and earlier allows remote attackers... - ethereal, ethereal-common, tethereal (remotely exploitable, medium urgency) CVE-2005-3243 Multiple buffer overflows in Ethereal 0.10.12 and... - ethereal, ethereal-common, tethereal (remotely exploitable, medium urgency) CVE-2005-3244 The BER dissector in Ethereal 0.10.3 to 0.10.12... - ethereal, ethereal-common, tethereal (remotely exploitable, medium urgency) CVE-2005-3245 Unspecified vulnerability in the ONC RPC dissector in... - ethereal, ethereal-common, tethereal (remotely exploitable, medium urgency) CVE-2005-3246 Ethereal 0.10.12 and earlier allows remote attackers... - ethereal, ethereal-common, tethereal (remotely exploitable, medium urgency) CVE-2005-3247 The SigComp UDVM in Ethereal 0.10.12 allows remote... - ethereal, ethereal-common, tethereal (remotely exploitable, medium urgency) CVE-2005-3248 Unspecified vulnerability in the X11 dissector in... - ethereal, ethereal-common, tethereal (remotely exploitable, medium urgency) CVE-2005-3249 Unspecified vulnerability in the WSP dissector in... - ethereal, ethereal-common, tethereal (remotely exploitable, medium urgency) *** Vulnerabilities without updates CVE-2005-3313 The IRC protocol dissector in Ethereal 0.10.13 allows... - ethereal, ethereal-common, tethereal (remotely exploitable, medium urgency) CVE-2005-3651 Stack-based buffer overflow in the... - ethereal, ethereal-common (remotely exploitable, medium urgency) Note that some vulnerablities have been whitelisted and are not included in this report. debsecan-0.4.18/testsuite/013/exp.summary0000644000000000000000000000421712315633545015020 0ustar CVE-2005-3241 ethereal-common (fixed, remotely exploitable, medium urgency) CVE-2005-3241 tethereal (fixed, remotely exploitable, medium urgency) CVE-2005-3242 ethereal (fixed, remotely exploitable, medium urgency) CVE-2005-3242 ethereal-common (fixed, remotely exploitable, medium urgency) CVE-2005-3242 tethereal (fixed, remotely exploitable, medium urgency) CVE-2005-3243 ethereal (fixed, remotely exploitable, medium urgency) CVE-2005-3243 ethereal-common (fixed, remotely exploitable, medium urgency) CVE-2005-3243 tethereal (fixed, remotely exploitable, medium urgency) CVE-2005-3244 ethereal (fixed, remotely exploitable, medium urgency) CVE-2005-3244 ethereal-common (fixed, remotely exploitable, medium urgency) CVE-2005-3244 tethereal (fixed, remotely exploitable, medium urgency) CVE-2005-3245 ethereal (fixed, remotely exploitable, medium urgency) CVE-2005-3245 ethereal-common (fixed, remotely exploitable, medium urgency) CVE-2005-3245 tethereal (fixed, remotely exploitable, medium urgency) CVE-2005-3246 ethereal (fixed, remotely exploitable, medium urgency) CVE-2005-3246 ethereal-common (fixed, remotely exploitable, medium urgency) CVE-2005-3246 tethereal (fixed, remotely exploitable, medium urgency) CVE-2005-3247 ethereal (fixed, remotely exploitable, medium urgency) CVE-2005-3247 ethereal-common (fixed, remotely exploitable, medium urgency) CVE-2005-3247 tethereal (fixed, remotely exploitable, medium urgency) CVE-2005-3248 ethereal (fixed, remotely exploitable, medium urgency) CVE-2005-3248 ethereal-common (fixed, remotely exploitable, medium urgency) CVE-2005-3248 tethereal (fixed, remotely exploitable, medium urgency) CVE-2005-3249 ethereal (fixed, remotely exploitable, medium urgency) CVE-2005-3249 ethereal-common (fixed, remotely exploitable, medium urgency) CVE-2005-3249 tethereal (fixed, remotely exploitable, medium urgency) CVE-2005-3313 ethereal (remotely exploitable, medium urgency) CVE-2005-3313 ethereal-common (remotely exploitable, medium urgency) CVE-2005-3313 tethereal (remotely exploitable, medium urgency) CVE-2005-3651 ethereal (remotely exploitable, medium urgency) CVE-2005-3651 ethereal-common (remotely exploitable, medium urgency) debsecan-0.4.18/testsuite/013/history0000644000000000000000000000026011004700541014204 0ustar VERSION 0 CVE-2005-3651,ethereal, CVE-2005-3313,ethereal, CVE-2005-3651,tethereal, CVE-2005-3313,tethereal, CVE-2005-3651,ethereal-common, CVE-2005-3313,ethereal-common, debsecan-0.4.18/testsuite/013/sid0000644000000000000000000000356011004700541013270 0ustar x͙[s8)֒|}I ƀ M_ن Hr(CGnGʧm4&4!D=C0.6AH*{*@AyOr9 qJhxE+n /Ӻ1F]#j9dW:Єh;F0%tJf쬖qCc؅- õn㲛T} y}+iğB<6-nh}nYk7a83t\K|DWzLF@~LR4dXo#GTWM>6cB}ݎ; n!De +]&nBv%RɕTT N`Ӽc7S0R;cPS]|K[ ٫tS*VP{`!Hz lCɓl╏-C8y)|c]S.֗Tqp%qpw{Uxn))nx6O?;koؚǗsU'o v4]pENiHm:ɚl%?ij|v|B,Plq7́Xl U43p>koMmht_Q/C /o򷬊JOWhkIQH6iIX-y&խLXaFí`47`-0=/ forxY ANE*f.7v\;+y ln)lnUsA@Q;ߑIKƗ3aGTۗ"$Q 5z\7-I# t$TAn4bSFg"zRȵ:7-/kTxvPn! aЭ vl܏]fG^M_(YA~j:"Rtqۇdy_n`4#lBJpo9V,Y$d~xn^bEݾ$ O1}P :BuwR$dӼv AZgJ]^d)ٱ颋*fVG<E򭆾yy4ܾ3?RS͟7CN /bhqElp%+y\߫{^%3{C'{uB2 W_ItJQ* D!>aS5 TBOZӣtU`pWVgrMH="h̀e1'ȑ\L!r̸8 &$7aɒlt\7a 94y拶Z,S†x +l`+|IFߕ5\-u5lS[jk m hkhcjkcjӘ^he%ytK(dlh*>utKttGǵtٖ|x /6aRlQm? e+v?Go= Architecture: i386 Version: 0.10.12-6 Depends: libadns1, libatk1.0-0 (>= 1.9.0), libc6 (>= 2.3.5-1), libcap1, libcomerr2 (>= 1.33-3), libglib2.0-0 (>= 2.8.0), libgtk2.0-0 (>= 2.6.0), libkrb53 (>= 1.3.2), libpango1.0-0 (>= 1.8.2), libpcap0.8 (>= 0.9.3-1), libpcre3 (>= 4.5), zlib1g (>= 1:1.2.1), ethereal-common (= 0.10.12-6) Recommends: gksu Description: network traffic analyzer Ethereal is a network traffic analyzer, or "sniffer", for Unix and Unix-like operating systems. A sniffer is a tool used to capture packets off the wire. Ethereal decodes numerous protocols (too many to list). . This package provides ethereal (the GTK+ version) Package: ethereal-common Status: install ok installed Priority: optional Section: net Installed-Size: 20320 Maintainer: Frederic Peters Architecture: i386 Source: ethereal Version: 0.10.12-6 Depends: libc6 (>= 2.3.5-1), libcap1, libglib2.0-0 (>= 2.8.0), libpcre3 (>= 4.5), zlib1g (>= 1:1.2.1) Recommends: ethereal (>= 0.9.1-3) | tethereal (>= 0.9.1-3) Conflicts: ethereal (<< 0.9.1-3), tethereal (<< 0.9.1-3) Description: network traffic analyser (common files) Ethereal is a network traffic analyzer, or "sniffer", for Unix and Unix-like operating systems. A sniffer is a tool used to capture packets off the wire. Ethereal decodes numerous protocols (too many to list). . This package provides files common to both ethereal (the GTK+ version) and tethereal (the console version). Package: tethereal Status: install ok installed Priority: optional Section: net Installed-Size: 240 Maintainer: Frederic Peters Architecture: i386 Source: ethereal Version: 0.10.12-6 Depends: libadns1, libc6 (>= 2.3.5-1), libcap1, libcomerr2 (>= 1.33-3), libglib2.0-0 (>= 2.8.0), libkrb53 (>= 1.3.2), libpcap0.8 (>= 0.9.3-1), libpcre3 (>= 4.5), zlib1g (>= 1:1.2.1), ethereal-common (= 0.10.12-6) Description: network traffic analyzer (console) Ethereal is a network traffic analyzer, or "sniffer", for Unix and Unix-like operating systems. A sniffer is a tool used to capture packets off the wire. Ethereal decodes numerous protocols (too many to list). . This package provides the console version of ethereal, named "tethereal". debsecan-0.4.18/testsuite/013/whitelist0000644000000000000000000000011011004700541014511 0ustar VERSION 0 CVE-2005-3184, CVE-2005-3241,ethereal CVE-2005-3651,tethereal debsecan-0.4.18/testsuite/013/out.summary0000644000000000000000000000421712315633555015034 0ustar CVE-2005-3241 ethereal-common (fixed, remotely exploitable, medium urgency) CVE-2005-3241 tethereal (fixed, remotely exploitable, medium urgency) CVE-2005-3242 ethereal (fixed, remotely exploitable, medium urgency) CVE-2005-3242 ethereal-common (fixed, remotely exploitable, medium urgency) CVE-2005-3242 tethereal (fixed, remotely exploitable, medium urgency) CVE-2005-3243 ethereal (fixed, remotely exploitable, medium urgency) CVE-2005-3243 ethereal-common (fixed, remotely exploitable, medium urgency) CVE-2005-3243 tethereal (fixed, remotely exploitable, medium urgency) CVE-2005-3244 ethereal (fixed, remotely exploitable, medium urgency) CVE-2005-3244 ethereal-common (fixed, remotely exploitable, medium urgency) CVE-2005-3244 tethereal (fixed, remotely exploitable, medium urgency) CVE-2005-3245 ethereal (fixed, remotely exploitable, medium urgency) CVE-2005-3245 ethereal-common (fixed, remotely exploitable, medium urgency) CVE-2005-3245 tethereal (fixed, remotely exploitable, medium urgency) CVE-2005-3246 ethereal (fixed, remotely exploitable, medium urgency) CVE-2005-3246 ethereal-common (fixed, remotely exploitable, medium urgency) CVE-2005-3246 tethereal (fixed, remotely exploitable, medium urgency) CVE-2005-3247 ethereal (fixed, remotely exploitable, medium urgency) CVE-2005-3247 ethereal-common (fixed, remotely exploitable, medium urgency) CVE-2005-3247 tethereal (fixed, remotely exploitable, medium urgency) CVE-2005-3248 ethereal (fixed, remotely exploitable, medium urgency) CVE-2005-3248 ethereal-common (fixed, remotely exploitable, medium urgency) CVE-2005-3248 tethereal (fixed, remotely exploitable, medium urgency) CVE-2005-3249 ethereal (fixed, remotely exploitable, medium urgency) CVE-2005-3249 ethereal-common (fixed, remotely exploitable, medium urgency) CVE-2005-3249 tethereal (fixed, remotely exploitable, medium urgency) CVE-2005-3313 ethereal (remotely exploitable, medium urgency) CVE-2005-3313 ethereal-common (remotely exploitable, medium urgency) CVE-2005-3313 tethereal (remotely exploitable, medium urgency) CVE-2005-3651 ethereal (remotely exploitable, medium urgency) CVE-2005-3651 ethereal-common (remotely exploitable, medium urgency) debsecan-0.4.18/testsuite/013/out.packages0000644000000000000000000000004312315633555015106 0ustar ethereal ethereal-common tethereal debsecan-0.4.18/testsuite/013/out.bugs0000644000000000000000000000023212315633555014270 0ustar CVE-2005-3241 CVE-2005-3242 CVE-2005-3243 CVE-2005-3244 CVE-2005-3245 CVE-2005-3246 CVE-2005-3247 CVE-2005-3248 CVE-2005-3249 CVE-2005-3313 CVE-2005-3651 debsecan-0.4.18/testsuite/013/out.detail0000644000000000000000000002245712315633555014607 0ustar CVE-2005-3242 (fixed, remotely exploitable, medium urgency) Ethereal 0.10.12 and earlier allows remote attackers to cause a denial ... installed: ethereal 0.10.12-6 (built from ethereal 0.10.12-6) fixed in unstable: ethereal 0.10.13-1 (source package) fix is available for the selected suite (sid) CVE-2005-3243 (fixed, remotely exploitable, medium urgency) Multiple buffer overflows in Ethereal 0.10.12 and earlier might allow ... installed: ethereal 0.10.12-6 (built from ethereal 0.10.12-6) fixed in unstable: ethereal 0.10.13-1 (source package) fix is available for the selected suite (sid) CVE-2005-3244 (fixed, remotely exploitable, medium urgency) The BER dissector in Ethereal 0.10.3 to 0.10.12 allows remote ... installed: ethereal 0.10.12-6 (built from ethereal 0.10.12-6) fixed in unstable: ethereal 0.10.13-1 (source package) fix is available for the selected suite (sid) CVE-2005-3245 (fixed, remotely exploitable, medium urgency) Unspecified vulnerability in the ONC RPC dissector in Ethereal 0.10.3 ... installed: ethereal 0.10.12-6 (built from ethereal 0.10.12-6) fixed in unstable: ethereal 0.10.13-1 (source package) fix is available for the selected suite (sid) CVE-2005-3246 (fixed, remotely exploitable, medium urgency) Ethereal 0.10.12 and earlier allows remote attackers to cause a denial ... installed: ethereal 0.10.12-6 (built from ethereal 0.10.12-6) fixed in unstable: ethereal 0.10.13-1 (source package) fix is available for the selected suite (sid) CVE-2005-3247 (fixed, remotely exploitable, medium urgency) The SigComp UDVM in Ethereal 0.10.12 allows remote attackers to cause ... installed: ethereal 0.10.12-6 (built from ethereal 0.10.12-6) fixed in unstable: ethereal 0.10.13-1 (source package) fix is available for the selected suite (sid) CVE-2005-3248 (fixed, remotely exploitable, medium urgency) Unspecified vulnerability in the X11 dissector in Ethereal 0.10.12 and ... installed: ethereal 0.10.12-6 (built from ethereal 0.10.12-6) fixed in unstable: ethereal 0.10.13-1 (source package) fix is available for the selected suite (sid) CVE-2005-3249 (fixed, remotely exploitable, medium urgency) Unspecified vulnerability in the WSP dissector in Ethereal 0.10.1 to ... installed: ethereal 0.10.12-6 (built from ethereal 0.10.12-6) fixed in unstable: ethereal 0.10.13-1 (source package) fix is available for the selected suite (sid) CVE-2005-3313 (remotely exploitable, medium urgency) The IRC protocol dissector in Ethereal 0.10.13 allows remote attackers ... installed: ethereal 0.10.12-6 (built from ethereal 0.10.12-6) CVE-2005-3651 (remotely exploitable, medium urgency) Stack-based buffer overflow in the dissect_ospf_v3_address_prefix ... installed: ethereal 0.10.12-6 (built from ethereal 0.10.12-6) fixed on branch: ethereal 0.10.10-2sarge4 (source package) CVE-2005-3241 (fixed, remotely exploitable, medium urgency) Multiple vulnerabilities in Ethereal 0.10.12 and earlier allow remote ... installed: ethereal-common 0.10.12-6 (built from ethereal 0.10.12-6) fixed in unstable: ethereal 0.10.13-1 (source package) fix is available for the selected suite (sid) CVE-2005-3242 (fixed, remotely exploitable, medium urgency) Ethereal 0.10.12 and earlier allows remote attackers to cause a denial ... installed: ethereal-common 0.10.12-6 (built from ethereal 0.10.12-6) fixed in unstable: ethereal 0.10.13-1 (source package) fix is available for the selected suite (sid) CVE-2005-3243 (fixed, remotely exploitable, medium urgency) Multiple buffer overflows in Ethereal 0.10.12 and earlier might allow ... installed: ethereal-common 0.10.12-6 (built from ethereal 0.10.12-6) fixed in unstable: ethereal 0.10.13-1 (source package) fix is available for the selected suite (sid) CVE-2005-3244 (fixed, remotely exploitable, medium urgency) The BER dissector in Ethereal 0.10.3 to 0.10.12 allows remote ... installed: ethereal-common 0.10.12-6 (built from ethereal 0.10.12-6) fixed in unstable: ethereal 0.10.13-1 (source package) fix is available for the selected suite (sid) CVE-2005-3245 (fixed, remotely exploitable, medium urgency) Unspecified vulnerability in the ONC RPC dissector in Ethereal 0.10.3 ... installed: ethereal-common 0.10.12-6 (built from ethereal 0.10.12-6) fixed in unstable: ethereal 0.10.13-1 (source package) fix is available for the selected suite (sid) CVE-2005-3246 (fixed, remotely exploitable, medium urgency) Ethereal 0.10.12 and earlier allows remote attackers to cause a denial ... installed: ethereal-common 0.10.12-6 (built from ethereal 0.10.12-6) fixed in unstable: ethereal 0.10.13-1 (source package) fix is available for the selected suite (sid) CVE-2005-3247 (fixed, remotely exploitable, medium urgency) The SigComp UDVM in Ethereal 0.10.12 allows remote attackers to cause ... installed: ethereal-common 0.10.12-6 (built from ethereal 0.10.12-6) fixed in unstable: ethereal 0.10.13-1 (source package) fix is available for the selected suite (sid) CVE-2005-3248 (fixed, remotely exploitable, medium urgency) Unspecified vulnerability in the X11 dissector in Ethereal 0.10.12 and ... installed: ethereal-common 0.10.12-6 (built from ethereal 0.10.12-6) fixed in unstable: ethereal 0.10.13-1 (source package) fix is available for the selected suite (sid) CVE-2005-3249 (fixed, remotely exploitable, medium urgency) Unspecified vulnerability in the WSP dissector in Ethereal 0.10.1 to ... installed: ethereal-common 0.10.12-6 (built from ethereal 0.10.12-6) fixed in unstable: ethereal 0.10.13-1 (source package) fix is available for the selected suite (sid) CVE-2005-3313 (remotely exploitable, medium urgency) The IRC protocol dissector in Ethereal 0.10.13 allows remote attackers ... installed: ethereal-common 0.10.12-6 (built from ethereal 0.10.12-6) CVE-2005-3651 (remotely exploitable, medium urgency) Stack-based buffer overflow in the dissect_ospf_v3_address_prefix ... installed: ethereal-common 0.10.12-6 (built from ethereal 0.10.12-6) fixed on branch: ethereal 0.10.10-2sarge4 (source package) CVE-2005-3241 (fixed, remotely exploitable, medium urgency) Multiple vulnerabilities in Ethereal 0.10.12 and earlier allow remote ... installed: tethereal 0.10.12-6 (built from ethereal 0.10.12-6) fixed in unstable: ethereal 0.10.13-1 (source package) fix is available for the selected suite (sid) CVE-2005-3242 (fixed, remotely exploitable, medium urgency) Ethereal 0.10.12 and earlier allows remote attackers to cause a denial ... installed: tethereal 0.10.12-6 (built from ethereal 0.10.12-6) fixed in unstable: ethereal 0.10.13-1 (source package) fix is available for the selected suite (sid) CVE-2005-3243 (fixed, remotely exploitable, medium urgency) Multiple buffer overflows in Ethereal 0.10.12 and earlier might allow ... installed: tethereal 0.10.12-6 (built from ethereal 0.10.12-6) fixed in unstable: ethereal 0.10.13-1 (source package) fix is available for the selected suite (sid) CVE-2005-3244 (fixed, remotely exploitable, medium urgency) The BER dissector in Ethereal 0.10.3 to 0.10.12 allows remote ... installed: tethereal 0.10.12-6 (built from ethereal 0.10.12-6) fixed in unstable: ethereal 0.10.13-1 (source package) fix is available for the selected suite (sid) CVE-2005-3245 (fixed, remotely exploitable, medium urgency) Unspecified vulnerability in the ONC RPC dissector in Ethereal 0.10.3 ... installed: tethereal 0.10.12-6 (built from ethereal 0.10.12-6) fixed in unstable: ethereal 0.10.13-1 (source package) fix is available for the selected suite (sid) CVE-2005-3246 (fixed, remotely exploitable, medium urgency) Ethereal 0.10.12 and earlier allows remote attackers to cause a denial ... installed: tethereal 0.10.12-6 (built from ethereal 0.10.12-6) fixed in unstable: ethereal 0.10.13-1 (source package) fix is available for the selected suite (sid) CVE-2005-3247 (fixed, remotely exploitable, medium urgency) The SigComp UDVM in Ethereal 0.10.12 allows remote attackers to cause ... installed: tethereal 0.10.12-6 (built from ethereal 0.10.12-6) fixed in unstable: ethereal 0.10.13-1 (source package) fix is available for the selected suite (sid) CVE-2005-3248 (fixed, remotely exploitable, medium urgency) Unspecified vulnerability in the X11 dissector in Ethereal 0.10.12 and ... installed: tethereal 0.10.12-6 (built from ethereal 0.10.12-6) fixed in unstable: ethereal 0.10.13-1 (source package) fix is available for the selected suite (sid) CVE-2005-3249 (fixed, remotely exploitable, medium urgency) Unspecified vulnerability in the WSP dissector in Ethereal 0.10.1 to ... installed: tethereal 0.10.12-6 (built from ethereal 0.10.12-6) fixed in unstable: ethereal 0.10.13-1 (source package) fix is available for the selected suite (sid) CVE-2005-3313 (remotely exploitable, medium urgency) The IRC protocol dissector in Ethereal 0.10.13 allows remote attackers ... installed: tethereal 0.10.12-6 (built from ethereal 0.10.12-6) debsecan-0.4.18/testsuite/013/out.report0000644000000000000000000000472412315633555014655 0ustar Security report based on the sid release *** New security updates CVE-2005-3241 Multiple vulnerabilities in Ethereal 0.10.12 and... - ethereal-common, tethereal (remotely exploitable, medium urgency) CVE-2005-3242 Ethereal 0.10.12 and earlier allows remote attackers... - ethereal, ethereal-common, tethereal (remotely exploitable, medium urgency) CVE-2005-3243 Multiple buffer overflows in Ethereal 0.10.12 and... - ethereal, ethereal-common, tethereal (remotely exploitable, medium urgency) CVE-2005-3244 The BER dissector in Ethereal 0.10.3 to 0.10.12... - ethereal, ethereal-common, tethereal (remotely exploitable, medium urgency) CVE-2005-3245 Unspecified vulnerability in the ONC RPC dissector in... - ethereal, ethereal-common, tethereal (remotely exploitable, medium urgency) CVE-2005-3246 Ethereal 0.10.12 and earlier allows remote attackers... - ethereal, ethereal-common, tethereal (remotely exploitable, medium urgency) CVE-2005-3247 The SigComp UDVM in Ethereal 0.10.12 allows remote... - ethereal, ethereal-common, tethereal (remotely exploitable, medium urgency) CVE-2005-3248 Unspecified vulnerability in the X11 dissector in... - ethereal, ethereal-common, tethereal (remotely exploitable, medium urgency) CVE-2005-3249 Unspecified vulnerability in the WSP dissector in... - ethereal, ethereal-common, tethereal (remotely exploitable, medium urgency) *** Vulnerabilities without updates CVE-2005-3313 The IRC protocol dissector in Ethereal 0.10.13 allows... - ethereal, ethereal-common, tethereal (remotely exploitable, medium urgency) CVE-2005-3651 Stack-based buffer overflow in the... - ethereal, ethereal-common (remotely exploitable, medium urgency) Note that some vulnerablities have been whitelisted and are not included in this report. debsecan-0.4.18/testsuite/014/0000755000000000000000000000000012315633555012603 5ustar debsecan-0.4.18/testsuite/014/exp.bugs0000644000000000000000000000026412315633545014262 0ustar TEMP-2005-3184 TEMP-2005-3241 TEMP-2005-3242 TEMP-2005-3243 TEMP-2005-3244 TEMP-2005-3245 TEMP-2005-3246 TEMP-2005-3247 TEMP-2005-3248 TEMP-2005-3249 TEMP-2005-3313 TEMP-2005-3651 debsecan-0.4.18/testsuite/014/exp.detail0000644000000000000000000002553712315633545014576 0ustar TEMP-2005-3184 (fixed, remotely exploitable, medium urgency) Buffer overflow vulnerability in the unicode_to_bytes in the Service ... installed: ethereal 0.10.12-6 (built from ethereal 0.10.12-6) fixed in unstable: ethereal 0.10.13-1 (source package) fix is available for the selected suite (sid) TEMP-2005-3241 (fixed, remotely exploitable, medium urgency) Multiple vulnerabilities in Ethereal 0.10.12 and earlier allow remote ... installed: ethereal 0.10.12-6 (built from ethereal 0.10.12-6) fixed in unstable: ethereal 0.10.13-1 (source package) fix is available for the selected suite (sid) TEMP-2005-3242 (fixed, remotely exploitable, medium urgency) Ethereal 0.10.12 and earlier allows remote attackers to cause a denial ... installed: ethereal 0.10.12-6 (built from ethereal 0.10.12-6) fixed in unstable: ethereal 0.10.13-1 (source package) fix is available for the selected suite (sid) TEMP-2005-3243 (fixed, remotely exploitable, medium urgency) Multiple buffer overflows in Ethereal 0.10.12 and earlier might allow ... installed: ethereal 0.10.12-6 (built from ethereal 0.10.12-6) fixed in unstable: ethereal 0.10.13-1 (source package) fix is available for the selected suite (sid) TEMP-2005-3244 (fixed, remotely exploitable, medium urgency) The BER dissector in Ethereal 0.10.3 to 0.10.12 allows remote ... installed: ethereal 0.10.12-6 (built from ethereal 0.10.12-6) fixed in unstable: ethereal 0.10.13-1 (source package) fix is available for the selected suite (sid) TEMP-2005-3245 (fixed, remotely exploitable, medium urgency) Unspecified vulnerability in the ONC RPC dissector in Ethereal 0.10.3 ... installed: ethereal 0.10.12-6 (built from ethereal 0.10.12-6) fixed in unstable: ethereal 0.10.13-1 (source package) fix is available for the selected suite (sid) TEMP-2005-3246 (fixed, remotely exploitable, medium urgency) Ethereal 0.10.12 and earlier allows remote attackers to cause a denial ... installed: ethereal 0.10.12-6 (built from ethereal 0.10.12-6) fixed in unstable: ethereal 0.10.13-1 (source package) fix is available for the selected suite (sid) TEMP-2005-3247 (fixed, remotely exploitable, medium urgency) The SigComp UDVM in Ethereal 0.10.12 allows remote attackers to cause ... installed: ethereal 0.10.12-6 (built from ethereal 0.10.12-6) fixed in unstable: ethereal 0.10.13-1 (source package) fix is available for the selected suite (sid) TEMP-2005-3248 (fixed, remotely exploitable, medium urgency) Unspecified vulnerability in the X11 dissector in Ethereal 0.10.12 and ... installed: ethereal 0.10.12-6 (built from ethereal 0.10.12-6) fixed in unstable: ethereal 0.10.13-1 (source package) fix is available for the selected suite (sid) TEMP-2005-3249 (fixed, remotely exploitable, medium urgency) Unspecified vulnerability in the WSP dissector in Ethereal 0.10.1 to ... installed: ethereal 0.10.12-6 (built from ethereal 0.10.12-6) fixed in unstable: ethereal 0.10.13-1 (source package) fix is available for the selected suite (sid) TEMP-2005-3313 (remotely exploitable, medium urgency) The IRC protocol dissector in Ethereal 0.10.13 allows remote attackers ... installed: ethereal 0.10.12-6 (built from ethereal 0.10.12-6) TEMP-2005-3651 (remotely exploitable, medium urgency) Stack-based buffer overflow in the dissect_ospf_v3_address_prefix ... installed: ethereal 0.10.12-6 (built from ethereal 0.10.12-6) fixed on branch: ethereal 0.10.10-2sarge4 (source package) TEMP-2005-3184 (fixed, remotely exploitable, medium urgency) Buffer overflow vulnerability in the unicode_to_bytes in the Service ... installed: ethereal-common 0.10.12-6 (built from ethereal 0.10.12-6) fixed in unstable: ethereal 0.10.13-1 (source package) fix is available for the selected suite (sid) TEMP-2005-3241 (fixed, remotely exploitable, medium urgency) Multiple vulnerabilities in Ethereal 0.10.12 and earlier allow remote ... installed: ethereal-common 0.10.12-6 (built from ethereal 0.10.12-6) fixed in unstable: ethereal 0.10.13-1 (source package) fix is available for the selected suite (sid) TEMP-2005-3242 (fixed, remotely exploitable, medium urgency) Ethereal 0.10.12 and earlier allows remote attackers to cause a denial ... installed: ethereal-common 0.10.12-6 (built from ethereal 0.10.12-6) fixed in unstable: ethereal 0.10.13-1 (source package) fix is available for the selected suite (sid) TEMP-2005-3243 (fixed, remotely exploitable, medium urgency) Multiple buffer overflows in Ethereal 0.10.12 and earlier might allow ... installed: ethereal-common 0.10.12-6 (built from ethereal 0.10.12-6) fixed in unstable: ethereal 0.10.13-1 (source package) fix is available for the selected suite (sid) TEMP-2005-3244 (fixed, remotely exploitable, medium urgency) The BER dissector in Ethereal 0.10.3 to 0.10.12 allows remote ... installed: ethereal-common 0.10.12-6 (built from ethereal 0.10.12-6) fixed in unstable: ethereal 0.10.13-1 (source package) fix is available for the selected suite (sid) TEMP-2005-3245 (fixed, remotely exploitable, medium urgency) Unspecified vulnerability in the ONC RPC dissector in Ethereal 0.10.3 ... installed: ethereal-common 0.10.12-6 (built from ethereal 0.10.12-6) fixed in unstable: ethereal 0.10.13-1 (source package) fix is available for the selected suite (sid) TEMP-2005-3246 (fixed, remotely exploitable, medium urgency) Ethereal 0.10.12 and earlier allows remote attackers to cause a denial ... installed: ethereal-common 0.10.12-6 (built from ethereal 0.10.12-6) fixed in unstable: ethereal 0.10.13-1 (source package) fix is available for the selected suite (sid) TEMP-2005-3247 (fixed, remotely exploitable, medium urgency) The SigComp UDVM in Ethereal 0.10.12 allows remote attackers to cause ... installed: ethereal-common 0.10.12-6 (built from ethereal 0.10.12-6) fixed in unstable: ethereal 0.10.13-1 (source package) fix is available for the selected suite (sid) TEMP-2005-3248 (fixed, remotely exploitable, medium urgency) Unspecified vulnerability in the X11 dissector in Ethereal 0.10.12 and ... installed: ethereal-common 0.10.12-6 (built from ethereal 0.10.12-6) fixed in unstable: ethereal 0.10.13-1 (source package) fix is available for the selected suite (sid) TEMP-2005-3249 (fixed, remotely exploitable, medium urgency) Unspecified vulnerability in the WSP dissector in Ethereal 0.10.1 to ... installed: ethereal-common 0.10.12-6 (built from ethereal 0.10.12-6) fixed in unstable: ethereal 0.10.13-1 (source package) fix is available for the selected suite (sid) TEMP-2005-3313 (remotely exploitable, medium urgency) The IRC protocol dissector in Ethereal 0.10.13 allows remote attackers ... installed: ethereal-common 0.10.12-6 (built from ethereal 0.10.12-6) TEMP-2005-3651 (remotely exploitable, medium urgency) Stack-based buffer overflow in the dissect_ospf_v3_address_prefix ... installed: ethereal-common 0.10.12-6 (built from ethereal 0.10.12-6) fixed on branch: ethereal 0.10.10-2sarge4 (source package) TEMP-2005-3184 (fixed, remotely exploitable, medium urgency) Buffer overflow vulnerability in the unicode_to_bytes in the Service ... installed: tethereal 0.10.12-6 (built from ethereal 0.10.12-6) fixed in unstable: ethereal 0.10.13-1 (source package) fix is available for the selected suite (sid) TEMP-2005-3241 (fixed, remotely exploitable, medium urgency) Multiple vulnerabilities in Ethereal 0.10.12 and earlier allow remote ... installed: tethereal 0.10.12-6 (built from ethereal 0.10.12-6) fixed in unstable: ethereal 0.10.13-1 (source package) fix is available for the selected suite (sid) TEMP-2005-3242 (fixed, remotely exploitable, medium urgency) Ethereal 0.10.12 and earlier allows remote attackers to cause a denial ... installed: tethereal 0.10.12-6 (built from ethereal 0.10.12-6) fixed in unstable: ethereal 0.10.13-1 (source package) fix is available for the selected suite (sid) TEMP-2005-3243 (fixed, remotely exploitable, medium urgency) Multiple buffer overflows in Ethereal 0.10.12 and earlier might allow ... installed: tethereal 0.10.12-6 (built from ethereal 0.10.12-6) fixed in unstable: ethereal 0.10.13-1 (source package) fix is available for the selected suite (sid) TEMP-2005-3244 (fixed, remotely exploitable, medium urgency) The BER dissector in Ethereal 0.10.3 to 0.10.12 allows remote ... installed: tethereal 0.10.12-6 (built from ethereal 0.10.12-6) fixed in unstable: ethereal 0.10.13-1 (source package) fix is available for the selected suite (sid) TEMP-2005-3245 (fixed, remotely exploitable, medium urgency) Unspecified vulnerability in the ONC RPC dissector in Ethereal 0.10.3 ... installed: tethereal 0.10.12-6 (built from ethereal 0.10.12-6) fixed in unstable: ethereal 0.10.13-1 (source package) fix is available for the selected suite (sid) TEMP-2005-3246 (fixed, remotely exploitable, medium urgency) Ethereal 0.10.12 and earlier allows remote attackers to cause a denial ... installed: tethereal 0.10.12-6 (built from ethereal 0.10.12-6) fixed in unstable: ethereal 0.10.13-1 (source package) fix is available for the selected suite (sid) TEMP-2005-3247 (fixed, remotely exploitable, medium urgency) The SigComp UDVM in Ethereal 0.10.12 allows remote attackers to cause ... installed: tethereal 0.10.12-6 (built from ethereal 0.10.12-6) fixed in unstable: ethereal 0.10.13-1 (source package) fix is available for the selected suite (sid) TEMP-2005-3248 (fixed, remotely exploitable, medium urgency) Unspecified vulnerability in the X11 dissector in Ethereal 0.10.12 and ... installed: tethereal 0.10.12-6 (built from ethereal 0.10.12-6) fixed in unstable: ethereal 0.10.13-1 (source package) fix is available for the selected suite (sid) TEMP-2005-3249 (fixed, remotely exploitable, medium urgency) Unspecified vulnerability in the WSP dissector in Ethereal 0.10.1 to ... installed: tethereal 0.10.12-6 (built from ethereal 0.10.12-6) fixed in unstable: ethereal 0.10.13-1 (source package) fix is available for the selected suite (sid) TEMP-2005-3313 (remotely exploitable, medium urgency) The IRC protocol dissector in Ethereal 0.10.13 allows remote attackers ... installed: tethereal 0.10.12-6 (built from ethereal 0.10.12-6) TEMP-2005-3651 (remotely exploitable, medium urgency) Stack-based buffer overflow in the dissect_ospf_v3_address_prefix ... installed: tethereal 0.10.12-6 (built from ethereal 0.10.12-6) fixed on branch: ethereal 0.10.10-2sarge4 (source package) debsecan-0.4.18/testsuite/014/exp.packages0000644000000000000000000000004312315633545015073 0ustar ethereal ethereal-common tethereal debsecan-0.4.18/testsuite/014/exp.report0000644000000000000000000000515712315633545014643 0ustar Security report based on the sid release *** New security updates TEMP-2005-3184 Buffer overflow vulnerability in the... - ethereal, ethereal-common, tethereal (remotely exploitable, medium urgency) TEMP-2005-3241 Multiple vulnerabilities in Ethereal 0.10.12 and... - ethereal, ethereal-common, tethereal (remotely exploitable, medium urgency) TEMP-2005-3242 Ethereal 0.10.12 and earlier allows remote attackers... - ethereal, ethereal-common, tethereal (remotely exploitable, medium urgency) TEMP-2005-3243 Multiple buffer overflows in Ethereal 0.10.12 and... - ethereal, ethereal-common, tethereal (remotely exploitable, medium urgency) TEMP-2005-3244 The BER dissector in Ethereal 0.10.3 to 0.10.12... - ethereal, ethereal-common, tethereal (remotely exploitable, medium urgency) TEMP-2005-3245 Unspecified vulnerability in the ONC RPC dissector... - ethereal, ethereal-common, tethereal (remotely exploitable, medium urgency) TEMP-2005-3246 Ethereal 0.10.12 and earlier allows remote attackers... - ethereal, ethereal-common, tethereal (remotely exploitable, medium urgency) TEMP-2005-3247 The SigComp UDVM in Ethereal 0.10.12 allows remote... - ethereal, ethereal-common, tethereal (remotely exploitable, medium urgency) TEMP-2005-3248 Unspecified vulnerability in the X11 dissector in... - ethereal, ethereal-common, tethereal (remotely exploitable, medium urgency) TEMP-2005-3249 Unspecified vulnerability in the WSP dissector in... - ethereal, ethereal-common, tethereal (remotely exploitable, medium urgency) *** Vulnerabilities without updates TEMP-2005-3313 The IRC protocol dissector in Ethereal 0.10.13... - ethereal, ethereal-common, tethereal (remotely exploitable, medium urgency) TEMP-2005-3651 Stack-based buffer overflow in the... - ethereal, ethereal-common, tethereal (remotely exploitable, medium urgency) debsecan-0.4.18/testsuite/014/exp.summary0000644000000000000000000000501612315633545015017 0ustar TEMP-2005-3184 ethereal (fixed, remotely exploitable, medium urgency) TEMP-2005-3184 ethereal-common (fixed, remotely exploitable, medium urgency) TEMP-2005-3184 tethereal (fixed, remotely exploitable, medium urgency) TEMP-2005-3241 ethereal (fixed, remotely exploitable, medium urgency) TEMP-2005-3241 ethereal-common (fixed, remotely exploitable, medium urgency) TEMP-2005-3241 tethereal (fixed, remotely exploitable, medium urgency) TEMP-2005-3242 ethereal (fixed, remotely exploitable, medium urgency) TEMP-2005-3242 ethereal-common (fixed, remotely exploitable, medium urgency) TEMP-2005-3242 tethereal (fixed, remotely exploitable, medium urgency) TEMP-2005-3243 ethereal (fixed, remotely exploitable, medium urgency) TEMP-2005-3243 ethereal-common (fixed, remotely exploitable, medium urgency) TEMP-2005-3243 tethereal (fixed, remotely exploitable, medium urgency) TEMP-2005-3244 ethereal (fixed, remotely exploitable, medium urgency) TEMP-2005-3244 ethereal-common (fixed, remotely exploitable, medium urgency) TEMP-2005-3244 tethereal (fixed, remotely exploitable, medium urgency) TEMP-2005-3245 ethereal (fixed, remotely exploitable, medium urgency) TEMP-2005-3245 ethereal-common (fixed, remotely exploitable, medium urgency) TEMP-2005-3245 tethereal (fixed, remotely exploitable, medium urgency) TEMP-2005-3246 ethereal (fixed, remotely exploitable, medium urgency) TEMP-2005-3246 ethereal-common (fixed, remotely exploitable, medium urgency) TEMP-2005-3246 tethereal (fixed, remotely exploitable, medium urgency) TEMP-2005-3247 ethereal (fixed, remotely exploitable, medium urgency) TEMP-2005-3247 ethereal-common (fixed, remotely exploitable, medium urgency) TEMP-2005-3247 tethereal (fixed, remotely exploitable, medium urgency) TEMP-2005-3248 ethereal (fixed, remotely exploitable, medium urgency) TEMP-2005-3248 ethereal-common (fixed, remotely exploitable, medium urgency) TEMP-2005-3248 tethereal (fixed, remotely exploitable, medium urgency) TEMP-2005-3249 ethereal (fixed, remotely exploitable, medium urgency) TEMP-2005-3249 ethereal-common (fixed, remotely exploitable, medium urgency) TEMP-2005-3249 tethereal (fixed, remotely exploitable, medium urgency) TEMP-2005-3313 ethereal (remotely exploitable, medium urgency) TEMP-2005-3313 ethereal-common (remotely exploitable, medium urgency) TEMP-2005-3313 tethereal (remotely exploitable, medium urgency) TEMP-2005-3651 ethereal (remotely exploitable, medium urgency) TEMP-2005-3651 ethereal-common (remotely exploitable, medium urgency) TEMP-2005-3651 tethereal (remotely exploitable, medium urgency) debsecan-0.4.18/testsuite/014/history0000644000000000000000000000026611004700541014213 0ustar VERSION 0 TEMP-2005-3651,ethereal, TEMP-2005-3313,ethereal, TEMP-2005-3651,tethereal, TEMP-2005-3313,tethereal, TEMP-2005-3651,ethereal-common, TEMP-2005-3313,ethereal-common, debsecan-0.4.18/testsuite/014/sid0000644000000000000000000000356411004700541013275 0ustar x͙]s8+t֒9{7mfoxJl6I~ed[Cm/:E>s^})wv {HQOwԴrIR94WiI΢u6,ek֟dYjn@t5 7YG{<dAvNe,^c,K/ '<")pJ2tz;kP9)'q3E;CɥѝHТ$z dTXQtEi\Ͳt5床]ps0 !"f\QTqm],TeEnn(es?ŻotᳳlGfӟ7sVQlYB <.ɖ/.8"gf ]|>n.{-]-~Ӊ7-6k˶%kE3x> :I7ۘ4JՅO&iA6KilM۞q4Rzp&KW/wfFS_UeԲ2 ;=`:F<;IU-SBh0 rK^6.ny$obbB]P6pMc [ߑ"J(WF%9r7*0[b(8Ѷ6ѓPaK$W r\8?+ #9#tߠ7c3J#z 6:G {FE 8M(V H%;@-(؞P|-̓iiFiNŰ-3nox R%?,񀂑MgʢH F2N Q4D٨CIsB\te2Yx\l^S ^{\T]lhz)G GwjΓ;=ReF:$,Ox.)2zu![I}k{$Y@`r3:A_|\J6Wr{PCd0Nϓ::f $;?49T@fB|0&S ?fkVn'UX?\>Xw~5!tƣfPd@" `Wl?L Kl&f `f`(6! MdLu[ؐCHlnQoc;a`ͨٲ0]Qwi [p5\U SWրHY+k(cj*cjZʘʘ475|k穥[26t48ytK:q-m%1[m.A IlXb3$6Sb$2.@c?9O2`7OP^'Kn'@debsecan-0.4.18/testsuite/014/status0000644000000000000000000000447711004700541014045 0ustar Package: ethereal Status: install ok installed Priority: optional Section: net Installed-Size: 1264 Maintainer: Frederic Peters Architecture: i386 Version: 0.10.12-6 Depends: libadns1, libatk1.0-0 (>= 1.9.0), libc6 (>= 2.3.5-1), libcap1, libcomerr2 (>= 1.33-3), libglib2.0-0 (>= 2.8.0), libgtk2.0-0 (>= 2.6.0), libkrb53 (>= 1.3.2), libpango1.0-0 (>= 1.8.2), libpcap0.8 (>= 0.9.3-1), libpcre3 (>= 4.5), zlib1g (>= 1:1.2.1), ethereal-common (= 0.10.12-6) Recommends: gksu Description: network traffic analyzer Ethereal is a network traffic analyzer, or "sniffer", for Unix and Unix-like operating systems. A sniffer is a tool used to capture packets off the wire. Ethereal decodes numerous protocols (too many to list). . This package provides ethereal (the GTK+ version) Package: ethereal-common Status: install ok installed Priority: optional Section: net Installed-Size: 20320 Maintainer: Frederic Peters Architecture: i386 Source: ethereal Version: 0.10.12-6 Depends: libc6 (>= 2.3.5-1), libcap1, libglib2.0-0 (>= 2.8.0), libpcre3 (>= 4.5), zlib1g (>= 1:1.2.1) Recommends: ethereal (>= 0.9.1-3) | tethereal (>= 0.9.1-3) Conflicts: ethereal (<< 0.9.1-3), tethereal (<< 0.9.1-3) Description: network traffic analyser (common files) Ethereal is a network traffic analyzer, or "sniffer", for Unix and Unix-like operating systems. A sniffer is a tool used to capture packets off the wire. Ethereal decodes numerous protocols (too many to list). . This package provides files common to both ethereal (the GTK+ version) and tethereal (the console version). Package: tethereal Status: install ok installed Priority: optional Section: net Installed-Size: 240 Maintainer: Frederic Peters Architecture: i386 Source: ethereal Version: 0.10.12-6 Depends: libadns1, libc6 (>= 2.3.5-1), libcap1, libcomerr2 (>= 1.33-3), libglib2.0-0 (>= 2.8.0), libkrb53 (>= 1.3.2), libpcap0.8 (>= 0.9.3-1), libpcre3 (>= 4.5), zlib1g (>= 1:1.2.1), ethereal-common (= 0.10.12-6) Description: network traffic analyzer (console) Ethereal is a network traffic analyzer, or "sniffer", for Unix and Unix-like operating systems. A sniffer is a tool used to capture packets off the wire. Ethereal decodes numerous protocols (too many to list). . This package provides the console version of ethereal, named "tethereal". debsecan-0.4.18/testsuite/014/out.summary0000644000000000000000000000501612315633555015033 0ustar TEMP-2005-3184 ethereal (fixed, remotely exploitable, medium urgency) TEMP-2005-3184 ethereal-common (fixed, remotely exploitable, medium urgency) TEMP-2005-3184 tethereal (fixed, remotely exploitable, medium urgency) TEMP-2005-3241 ethereal (fixed, remotely exploitable, medium urgency) TEMP-2005-3241 ethereal-common (fixed, remotely exploitable, medium urgency) TEMP-2005-3241 tethereal (fixed, remotely exploitable, medium urgency) TEMP-2005-3242 ethereal (fixed, remotely exploitable, medium urgency) TEMP-2005-3242 ethereal-common (fixed, remotely exploitable, medium urgency) TEMP-2005-3242 tethereal (fixed, remotely exploitable, medium urgency) TEMP-2005-3243 ethereal (fixed, remotely exploitable, medium urgency) TEMP-2005-3243 ethereal-common (fixed, remotely exploitable, medium urgency) TEMP-2005-3243 tethereal (fixed, remotely exploitable, medium urgency) TEMP-2005-3244 ethereal (fixed, remotely exploitable, medium urgency) TEMP-2005-3244 ethereal-common (fixed, remotely exploitable, medium urgency) TEMP-2005-3244 tethereal (fixed, remotely exploitable, medium urgency) TEMP-2005-3245 ethereal (fixed, remotely exploitable, medium urgency) TEMP-2005-3245 ethereal-common (fixed, remotely exploitable, medium urgency) TEMP-2005-3245 tethereal (fixed, remotely exploitable, medium urgency) TEMP-2005-3246 ethereal (fixed, remotely exploitable, medium urgency) TEMP-2005-3246 ethereal-common (fixed, remotely exploitable, medium urgency) TEMP-2005-3246 tethereal (fixed, remotely exploitable, medium urgency) TEMP-2005-3247 ethereal (fixed, remotely exploitable, medium urgency) TEMP-2005-3247 ethereal-common (fixed, remotely exploitable, medium urgency) TEMP-2005-3247 tethereal (fixed, remotely exploitable, medium urgency) TEMP-2005-3248 ethereal (fixed, remotely exploitable, medium urgency) TEMP-2005-3248 ethereal-common (fixed, remotely exploitable, medium urgency) TEMP-2005-3248 tethereal (fixed, remotely exploitable, medium urgency) TEMP-2005-3249 ethereal (fixed, remotely exploitable, medium urgency) TEMP-2005-3249 ethereal-common (fixed, remotely exploitable, medium urgency) TEMP-2005-3249 tethereal (fixed, remotely exploitable, medium urgency) TEMP-2005-3313 ethereal (remotely exploitable, medium urgency) TEMP-2005-3313 ethereal-common (remotely exploitable, medium urgency) TEMP-2005-3313 tethereal (remotely exploitable, medium urgency) TEMP-2005-3651 ethereal (remotely exploitable, medium urgency) TEMP-2005-3651 ethereal-common (remotely exploitable, medium urgency) TEMP-2005-3651 tethereal (remotely exploitable, medium urgency) debsecan-0.4.18/testsuite/014/out.packages0000644000000000000000000000004312315633555015107 0ustar ethereal ethereal-common tethereal debsecan-0.4.18/testsuite/014/out.bugs0000644000000000000000000000026412315633555014276 0ustar TEMP-2005-3184 TEMP-2005-3241 TEMP-2005-3242 TEMP-2005-3243 TEMP-2005-3244 TEMP-2005-3245 TEMP-2005-3246 TEMP-2005-3247 TEMP-2005-3248 TEMP-2005-3249 TEMP-2005-3313 TEMP-2005-3651 debsecan-0.4.18/testsuite/014/out.detail0000644000000000000000000002553712315633556014613 0ustar TEMP-2005-3184 (fixed, remotely exploitable, medium urgency) Buffer overflow vulnerability in the unicode_to_bytes in the Service ... installed: ethereal 0.10.12-6 (built from ethereal 0.10.12-6) fixed in unstable: ethereal 0.10.13-1 (source package) fix is available for the selected suite (sid) TEMP-2005-3241 (fixed, remotely exploitable, medium urgency) Multiple vulnerabilities in Ethereal 0.10.12 and earlier allow remote ... installed: ethereal 0.10.12-6 (built from ethereal 0.10.12-6) fixed in unstable: ethereal 0.10.13-1 (source package) fix is available for the selected suite (sid) TEMP-2005-3242 (fixed, remotely exploitable, medium urgency) Ethereal 0.10.12 and earlier allows remote attackers to cause a denial ... installed: ethereal 0.10.12-6 (built from ethereal 0.10.12-6) fixed in unstable: ethereal 0.10.13-1 (source package) fix is available for the selected suite (sid) TEMP-2005-3243 (fixed, remotely exploitable, medium urgency) Multiple buffer overflows in Ethereal 0.10.12 and earlier might allow ... installed: ethereal 0.10.12-6 (built from ethereal 0.10.12-6) fixed in unstable: ethereal 0.10.13-1 (source package) fix is available for the selected suite (sid) TEMP-2005-3244 (fixed, remotely exploitable, medium urgency) The BER dissector in Ethereal 0.10.3 to 0.10.12 allows remote ... installed: ethereal 0.10.12-6 (built from ethereal 0.10.12-6) fixed in unstable: ethereal 0.10.13-1 (source package) fix is available for the selected suite (sid) TEMP-2005-3245 (fixed, remotely exploitable, medium urgency) Unspecified vulnerability in the ONC RPC dissector in Ethereal 0.10.3 ... installed: ethereal 0.10.12-6 (built from ethereal 0.10.12-6) fixed in unstable: ethereal 0.10.13-1 (source package) fix is available for the selected suite (sid) TEMP-2005-3246 (fixed, remotely exploitable, medium urgency) Ethereal 0.10.12 and earlier allows remote attackers to cause a denial ... installed: ethereal 0.10.12-6 (built from ethereal 0.10.12-6) fixed in unstable: ethereal 0.10.13-1 (source package) fix is available for the selected suite (sid) TEMP-2005-3247 (fixed, remotely exploitable, medium urgency) The SigComp UDVM in Ethereal 0.10.12 allows remote attackers to cause ... installed: ethereal 0.10.12-6 (built from ethereal 0.10.12-6) fixed in unstable: ethereal 0.10.13-1 (source package) fix is available for the selected suite (sid) TEMP-2005-3248 (fixed, remotely exploitable, medium urgency) Unspecified vulnerability in the X11 dissector in Ethereal 0.10.12 and ... installed: ethereal 0.10.12-6 (built from ethereal 0.10.12-6) fixed in unstable: ethereal 0.10.13-1 (source package) fix is available for the selected suite (sid) TEMP-2005-3249 (fixed, remotely exploitable, medium urgency) Unspecified vulnerability in the WSP dissector in Ethereal 0.10.1 to ... installed: ethereal 0.10.12-6 (built from ethereal 0.10.12-6) fixed in unstable: ethereal 0.10.13-1 (source package) fix is available for the selected suite (sid) TEMP-2005-3313 (remotely exploitable, medium urgency) The IRC protocol dissector in Ethereal 0.10.13 allows remote attackers ... installed: ethereal 0.10.12-6 (built from ethereal 0.10.12-6) TEMP-2005-3651 (remotely exploitable, medium urgency) Stack-based buffer overflow in the dissect_ospf_v3_address_prefix ... installed: ethereal 0.10.12-6 (built from ethereal 0.10.12-6) fixed on branch: ethereal 0.10.10-2sarge4 (source package) TEMP-2005-3184 (fixed, remotely exploitable, medium urgency) Buffer overflow vulnerability in the unicode_to_bytes in the Service ... installed: ethereal-common 0.10.12-6 (built from ethereal 0.10.12-6) fixed in unstable: ethereal 0.10.13-1 (source package) fix is available for the selected suite (sid) TEMP-2005-3241 (fixed, remotely exploitable, medium urgency) Multiple vulnerabilities in Ethereal 0.10.12 and earlier allow remote ... installed: ethereal-common 0.10.12-6 (built from ethereal 0.10.12-6) fixed in unstable: ethereal 0.10.13-1 (source package) fix is available for the selected suite (sid) TEMP-2005-3242 (fixed, remotely exploitable, medium urgency) Ethereal 0.10.12 and earlier allows remote attackers to cause a denial ... installed: ethereal-common 0.10.12-6 (built from ethereal 0.10.12-6) fixed in unstable: ethereal 0.10.13-1 (source package) fix is available for the selected suite (sid) TEMP-2005-3243 (fixed, remotely exploitable, medium urgency) Multiple buffer overflows in Ethereal 0.10.12 and earlier might allow ... installed: ethereal-common 0.10.12-6 (built from ethereal 0.10.12-6) fixed in unstable: ethereal 0.10.13-1 (source package) fix is available for the selected suite (sid) TEMP-2005-3244 (fixed, remotely exploitable, medium urgency) The BER dissector in Ethereal 0.10.3 to 0.10.12 allows remote ... installed: ethereal-common 0.10.12-6 (built from ethereal 0.10.12-6) fixed in unstable: ethereal 0.10.13-1 (source package) fix is available for the selected suite (sid) TEMP-2005-3245 (fixed, remotely exploitable, medium urgency) Unspecified vulnerability in the ONC RPC dissector in Ethereal 0.10.3 ... installed: ethereal-common 0.10.12-6 (built from ethereal 0.10.12-6) fixed in unstable: ethereal 0.10.13-1 (source package) fix is available for the selected suite (sid) TEMP-2005-3246 (fixed, remotely exploitable, medium urgency) Ethereal 0.10.12 and earlier allows remote attackers to cause a denial ... installed: ethereal-common 0.10.12-6 (built from ethereal 0.10.12-6) fixed in unstable: ethereal 0.10.13-1 (source package) fix is available for the selected suite (sid) TEMP-2005-3247 (fixed, remotely exploitable, medium urgency) The SigComp UDVM in Ethereal 0.10.12 allows remote attackers to cause ... installed: ethereal-common 0.10.12-6 (built from ethereal 0.10.12-6) fixed in unstable: ethereal 0.10.13-1 (source package) fix is available for the selected suite (sid) TEMP-2005-3248 (fixed, remotely exploitable, medium urgency) Unspecified vulnerability in the X11 dissector in Ethereal 0.10.12 and ... installed: ethereal-common 0.10.12-6 (built from ethereal 0.10.12-6) fixed in unstable: ethereal 0.10.13-1 (source package) fix is available for the selected suite (sid) TEMP-2005-3249 (fixed, remotely exploitable, medium urgency) Unspecified vulnerability in the WSP dissector in Ethereal 0.10.1 to ... installed: ethereal-common 0.10.12-6 (built from ethereal 0.10.12-6) fixed in unstable: ethereal 0.10.13-1 (source package) fix is available for the selected suite (sid) TEMP-2005-3313 (remotely exploitable, medium urgency) The IRC protocol dissector in Ethereal 0.10.13 allows remote attackers ... installed: ethereal-common 0.10.12-6 (built from ethereal 0.10.12-6) TEMP-2005-3651 (remotely exploitable, medium urgency) Stack-based buffer overflow in the dissect_ospf_v3_address_prefix ... installed: ethereal-common 0.10.12-6 (built from ethereal 0.10.12-6) fixed on branch: ethereal 0.10.10-2sarge4 (source package) TEMP-2005-3184 (fixed, remotely exploitable, medium urgency) Buffer overflow vulnerability in the unicode_to_bytes in the Service ... installed: tethereal 0.10.12-6 (built from ethereal 0.10.12-6) fixed in unstable: ethereal 0.10.13-1 (source package) fix is available for the selected suite (sid) TEMP-2005-3241 (fixed, remotely exploitable, medium urgency) Multiple vulnerabilities in Ethereal 0.10.12 and earlier allow remote ... installed: tethereal 0.10.12-6 (built from ethereal 0.10.12-6) fixed in unstable: ethereal 0.10.13-1 (source package) fix is available for the selected suite (sid) TEMP-2005-3242 (fixed, remotely exploitable, medium urgency) Ethereal 0.10.12 and earlier allows remote attackers to cause a denial ... installed: tethereal 0.10.12-6 (built from ethereal 0.10.12-6) fixed in unstable: ethereal 0.10.13-1 (source package) fix is available for the selected suite (sid) TEMP-2005-3243 (fixed, remotely exploitable, medium urgency) Multiple buffer overflows in Ethereal 0.10.12 and earlier might allow ... installed: tethereal 0.10.12-6 (built from ethereal 0.10.12-6) fixed in unstable: ethereal 0.10.13-1 (source package) fix is available for the selected suite (sid) TEMP-2005-3244 (fixed, remotely exploitable, medium urgency) The BER dissector in Ethereal 0.10.3 to 0.10.12 allows remote ... installed: tethereal 0.10.12-6 (built from ethereal 0.10.12-6) fixed in unstable: ethereal 0.10.13-1 (source package) fix is available for the selected suite (sid) TEMP-2005-3245 (fixed, remotely exploitable, medium urgency) Unspecified vulnerability in the ONC RPC dissector in Ethereal 0.10.3 ... installed: tethereal 0.10.12-6 (built from ethereal 0.10.12-6) fixed in unstable: ethereal 0.10.13-1 (source package) fix is available for the selected suite (sid) TEMP-2005-3246 (fixed, remotely exploitable, medium urgency) Ethereal 0.10.12 and earlier allows remote attackers to cause a denial ... installed: tethereal 0.10.12-6 (built from ethereal 0.10.12-6) fixed in unstable: ethereal 0.10.13-1 (source package) fix is available for the selected suite (sid) TEMP-2005-3247 (fixed, remotely exploitable, medium urgency) The SigComp UDVM in Ethereal 0.10.12 allows remote attackers to cause ... installed: tethereal 0.10.12-6 (built from ethereal 0.10.12-6) fixed in unstable: ethereal 0.10.13-1 (source package) fix is available for the selected suite (sid) TEMP-2005-3248 (fixed, remotely exploitable, medium urgency) Unspecified vulnerability in the X11 dissector in Ethereal 0.10.12 and ... installed: tethereal 0.10.12-6 (built from ethereal 0.10.12-6) fixed in unstable: ethereal 0.10.13-1 (source package) fix is available for the selected suite (sid) TEMP-2005-3249 (fixed, remotely exploitable, medium urgency) Unspecified vulnerability in the WSP dissector in Ethereal 0.10.1 to ... installed: tethereal 0.10.12-6 (built from ethereal 0.10.12-6) fixed in unstable: ethereal 0.10.13-1 (source package) fix is available for the selected suite (sid) TEMP-2005-3313 (remotely exploitable, medium urgency) The IRC protocol dissector in Ethereal 0.10.13 allows remote attackers ... installed: tethereal 0.10.12-6 (built from ethereal 0.10.12-6) TEMP-2005-3651 (remotely exploitable, medium urgency) Stack-based buffer overflow in the dissect_ospf_v3_address_prefix ... installed: tethereal 0.10.12-6 (built from ethereal 0.10.12-6) fixed on branch: ethereal 0.10.10-2sarge4 (source package) debsecan-0.4.18/testsuite/014/out.report0000644000000000000000000000515712315633556014660 0ustar Security report based on the sid release *** New security updates TEMP-2005-3184 Buffer overflow vulnerability in the... - ethereal, ethereal-common, tethereal (remotely exploitable, medium urgency) TEMP-2005-3241 Multiple vulnerabilities in Ethereal 0.10.12 and... - ethereal, ethereal-common, tethereal (remotely exploitable, medium urgency) TEMP-2005-3242 Ethereal 0.10.12 and earlier allows remote attackers... - ethereal, ethereal-common, tethereal (remotely exploitable, medium urgency) TEMP-2005-3243 Multiple buffer overflows in Ethereal 0.10.12 and... - ethereal, ethereal-common, tethereal (remotely exploitable, medium urgency) TEMP-2005-3244 The BER dissector in Ethereal 0.10.3 to 0.10.12... - ethereal, ethereal-common, tethereal (remotely exploitable, medium urgency) TEMP-2005-3245 Unspecified vulnerability in the ONC RPC dissector... - ethereal, ethereal-common, tethereal (remotely exploitable, medium urgency) TEMP-2005-3246 Ethereal 0.10.12 and earlier allows remote attackers... - ethereal, ethereal-common, tethereal (remotely exploitable, medium urgency) TEMP-2005-3247 The SigComp UDVM in Ethereal 0.10.12 allows remote... - ethereal, ethereal-common, tethereal (remotely exploitable, medium urgency) TEMP-2005-3248 Unspecified vulnerability in the X11 dissector in... - ethereal, ethereal-common, tethereal (remotely exploitable, medium urgency) TEMP-2005-3249 Unspecified vulnerability in the WSP dissector in... - ethereal, ethereal-common, tethereal (remotely exploitable, medium urgency) *** Vulnerabilities without updates TEMP-2005-3313 The IRC protocol dissector in Ethereal 0.10.13... - ethereal, ethereal-common, tethereal (remotely exploitable, medium urgency) TEMP-2005-3651 Stack-based buffer overflow in the... - ethereal, ethereal-common, tethereal (remotely exploitable, medium urgency) debsecan-0.4.18/testsuite/.gitignore0000644000000000000000000000006110654704516014264 0ustar whitelist.exp whitelist.out whitelist.test out.* debsecan-0.4.18/testsuite/edit-compressed0000644000000000000000000000063110601557775015316 0ustar #!/usr/bin/python import os import sys import tempfile import zlib input_name = sys.argv[1] data = zlib.decompress(file(input_name).read()) (tmp, tmp_name) = tempfile.mkstemp() try: tmp = file(tmp_name, "w") tmp.write(data) tmp.close() os.system("editor " + tmp_name) data = zlib.compress(file(tmp_name).read(), 9) file(input_name, "w+").write(data) finally: os.unlink(tmp_name) debsecan-0.4.18/testsuite/filter-compressed0000644000000000000000000000276110601557775015664 0ustar #!/usr/bin/python import cStringIO import re import sys import zlib if sys.argv[1] == '-n': no_compress = True del sys.argv[1] else: no_compress = False re_filter = re.compile(sys.argv[1]) data = cStringIO.StringIO(zlib.decompress(sys.stdin.read())) line = data.readline() assert line == 'VERSION 1\n' bug_list = [] bugs = {} for line in data: assert line[-1] == '\n' line = line[:-1] if line: (name, flags, desc) = line.split(',', 2) bug_list.append(name) bugs[name] = desc else: break copied_bugs = [] copied_bugs_index = {} result_main = [] for line in data: assert line[-1] == '\n' line = line[:-1] if line: line = line.split(',') bug_name = line[1] = bug_list[int(line[1])] line_combined = ','.join(line) if re_filter.match(line_combined): if copied_bugs_index.has_key(bug_name): line[1] = str(copied_bugs_index[bug_name]) else: number = len(copied_bugs) copied_bugs.append("%s,,%s\n" % (bug_name, bugs[bug_name])) copied_bugs_index[bug_name] = number line[1] = str(number) line = ','.join(line) + '\n' result_main.append(line) else: break result = ['VERSION 1\n'] + copied_bugs + ['\n'] + result_main + ['\n'] for line in data: result.append(line) result = ''.join(result) if not no_compress: result = zlib.compress(result, 9) sys.stdout.write(result) debsecan-0.4.18/testsuite/run.sh0000644000000000000000000000603510601557775013450 0ustar #!/bin/bash set -e export LC_ALL=C url="file://$(pwd)" debsecan="python ../src/debsecan" # Check that python-apt is installed. python -c "import apt_pkg" for testcase in [0-9][0-9][0-9] ; do for format in summary packages bugs detail report ; do for suite in sid ; do if test -e $testcase/$suite ; then if test -e $testcase/options ; then options="$(cat $testcase/options)" else options="" fi if test -e $testcase/whitelist ; then options="$options --whitelist $testcase/whitelist" else options="$options --whitelist ''" fi if $debsecan $options \ --config /dev/null \ --suite $suite \ --source "$url/$testcase" \ --history $testcase/history \ --status $testcase/status \ --format $format > $testcase/out.$format 2>&1 ; then if test $format = summary ; then sort $testcase/out.$format > $testcase/out.$format.1 mv $testcase/out.$format.1 $testcase/out.$format fi diff -u $testcase/exp.$format $testcase/out.$format else echo "FAIL: debsecan failed. Output follows:" cat $testcase/out.$format exit 1 fi fi done done done # Test the whitelist editing functionality. rm -f whitelist.test $debsecan --whitelist whitelist.test --add-whitelist CAN-2006-0001 cat > whitelist.exp < whitelist.exp < whitelist.exp < whitelist.exp < whitelist.out cat > whitelist.exp <whitelist.out ; then echo "FAILURE: --remove-whitelist on unknown package" exit 1 else cat > whitelist.exp <whitelist.out ; then echo "FAILURE: --remove-whitelist on unknown bug" exit 1 else cat > whitelist.exp < whitelist.exp < 2: print "usage: %s SUITE" url = sys.argv[1] if not url.startswith("http"): url = URL_PREFIX + sys.argv[1] r = urllib2.Request(url) u = urllib2.urlopen(r) data = StringIO(zlib.decompress(u.read())) if data.readline() <> "VERSION 1\n": sys.stderr.write("error: server sends data in unknown format\n") sys.exit(1) vuln_names = [] for line in data: if line[-1:] == '\n': line = line[:-1] if line == '': break (name, flags, desc) = line.split(',', 2) vuln_names.append(name) for line in data: if line[-1:] == '\n': line = line[:-1] if line == '': break (package, vuln, rest) = line.split(',', 2) vuln = vuln_names[int(vuln)] print "%s,%s,%s" % (package, vuln, rest) for line in data: if line[-1:] == '\n': line = line[:-1] if line == '': break print line debsecan-0.4.18/testsuite/whitelist.out0000644000000000000000000000006512315633556015046 0ustar error: no matching whitelist entry for CAN-2006-9999 debsecan-0.4.18/.gitignore0000644000000000000000000000001010654704344012224 0ustar *-stamp debsecan-0.4.18/COPYING0000644000000000000000000004310510601557775011311 0ustar GNU GENERAL PUBLIC LICENSE Version 2, June 1991 Copyright (C) 1989, 1991 Free Software Foundation, Inc. 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA Everyone is permitted to copy and distribute verbatim copies of this license document, but changing it is not allowed. Preamble The licenses for most software are designed to take away your freedom to share and change it. By contrast, the GNU General Public License is intended to guarantee your freedom to share and change free software--to make sure the software is free for all its users. This General Public License applies to most of the Free Software Foundation's software and to any other program whose authors commit to using it. (Some other Free Software Foundation software is covered by the GNU Library General Public License instead.) You can apply it to your programs, too. When we speak of free software, we are referring to freedom, not price. Our General Public Licenses are designed to make sure that you have the freedom to distribute copies of free software (and charge for this service if you wish), that you receive source code or can get it if you want it, that you can change the software or use pieces of it in new free programs; and that you know you can do these things. To protect your rights, we need to make restrictions that forbid anyone to deny you these rights or to ask you to surrender the rights. These restrictions translate to certain responsibilities for you if you distribute copies of the software, or if you modify it. For example, if you distribute copies of such a program, whether gratis or for a fee, you must give the recipients all the rights that you have. You must make sure that they, too, receive or can get the source code. And you must show them these terms so they know their rights. We protect your rights with two steps: (1) copyright the software, and (2) offer you this license which gives you legal permission to copy, distribute and/or modify the software. Also, for each author's protection and ours, we want to make certain that everyone understands that there is no warranty for this free software. If the software is modified by someone else and passed on, we want its recipients to know that what they have is not the original, so that any problems introduced by others will not reflect on the original authors' reputations. Finally, any free program is threatened constantly by software patents. We wish to avoid the danger that redistributors of a free program will individually obtain patent licenses, in effect making the program proprietary. To prevent this, we have made it clear that any patent must be licensed for everyone's free use or not licensed at all. The precise terms and conditions for copying, distribution and modification follow. GNU GENERAL PUBLIC LICENSE TERMS AND CONDITIONS FOR COPYING, DISTRIBUTION AND MODIFICATION 0. This License applies to any program or other work which contains a notice placed by the copyright holder saying it may be distributed under the terms of this General Public License. The "Program", below, refers to any such program or work, and a "work based on the Program" means either the Program or any derivative work under copyright law: that is to say, a work containing the Program or a portion of it, either verbatim or with modifications and/or translated into another language. (Hereinafter, translation is included without limitation in the term "modification".) Each licensee is addressed as "you". Activities other than copying, distribution and modification are not covered by this License; they are outside its scope. The act of running the Program is not restricted, and the output from the Program is covered only if its contents constitute a work based on the Program (independent of having been made by running the Program). Whether that is true depends on what the Program does. 1. You may copy and distribute verbatim copies of the Program's source code as you receive it, in any medium, provided that you conspicuously and appropriately publish on each copy an appropriate copyright notice and disclaimer of warranty; keep intact all the notices that refer to this License and to the absence of any warranty; and give any other recipients of the Program a copy of this License along with the Program. You may charge a fee for the physical act of transferring a copy, and you may at your option offer warranty protection in exchange for a fee. 2. You may modify your copy or copies of the Program or any portion of it, thus forming a work based on the Program, and copy and distribute such modifications or work under the terms of Section 1 above, provided that you also meet all of these conditions: a) You must cause the modified files to carry prominent notices stating that you changed the files and the date of any change. b) You must cause any work that you distribute or publish, that in whole or in part contains or is derived from the Program or any part thereof, to be licensed as a whole at no charge to all third parties under the terms of this License. c) If the modified program normally reads commands interactively when run, you must cause it, when started running for such interactive use in the most ordinary way, to print or display an announcement including an appropriate copyright notice and a notice that there is no warranty (or else, saying that you provide a warranty) and that users may redistribute the program under these conditions, and telling the user how to view a copy of this License. (Exception: if the Program itself is interactive but does not normally print such an announcement, your work based on the Program is not required to print an announcement.) These requirements apply to the modified work as a whole. If identifiable sections of that work are not derived from the Program, and can be reasonably considered independent and separate works in themselves, then this License, and its terms, do not apply to those sections when you distribute them as separate works. But when you distribute the same sections as part of a whole which is a work based on the Program, the distribution of the whole must be on the terms of this License, whose permissions for other licensees extend to the entire whole, and thus to each and every part regardless of who wrote it. Thus, it is not the intent of this section to claim rights or contest your rights to work written entirely by you; rather, the intent is to exercise the right to control the distribution of derivative or collective works based on the Program. In addition, mere aggregation of another work not based on the Program with the Program (or with a work based on the Program) on a volume of a storage or distribution medium does not bring the other work under the scope of this License. 3. You may copy and distribute the Program (or a work based on it, under Section 2) in object code or executable form under the terms of Sections 1 and 2 above provided that you also do one of the following: a) Accompany it with the complete corresponding machine-readable source code, which must be distributed under the terms of Sections 1 and 2 above on a medium customarily used for software interchange; or, b) Accompany it with a written offer, valid for at least three years, to give any third party, for a charge no more than your cost of physically performing source distribution, a complete machine-readable copy of the corresponding source code, to be distributed under the terms of Sections 1 and 2 above on a medium customarily used for software interchange; or, c) Accompany it with the information you received as to the offer to distribute corresponding source code. (This alternative is allowed only for noncommercial distribution and only if you received the program in object code or executable form with such an offer, in accord with Subsection b above.) The source code for a work means the preferred form of the work for making modifications to it. For an executable work, complete source code means all the source code for all modules it contains, plus any associated interface definition files, plus the scripts used to control compilation and installation of the executable. However, as a special exception, the source code distributed need not include anything that is normally distributed (in either source or binary form) with the major components (compiler, kernel, and so on) of the operating system on which the executable runs, unless that component itself accompanies the executable. If distribution of executable or object code is made by offering access to copy from a designated place, then offering equivalent access to copy the source code from the same place counts as distribution of the source code, even though third parties are not compelled to copy the source along with the object code. 4. You may not copy, modify, sublicense, or distribute the Program except as expressly provided under this License. Any attempt otherwise to copy, modify, sublicense or distribute the Program is void, and will automatically terminate your rights under this License. However, parties who have received copies, or rights, from you under this License will not have their licenses terminated so long as such parties remain in full compliance. 5. You are not required to accept this License, since you have not signed it. However, nothing else grants you permission to modify or distribute the Program or its derivative works. These actions are prohibited by law if you do not accept this License. Therefore, by modifying or distributing the Program (or any work based on the Program), you indicate your acceptance of this License to do so, and all its terms and conditions for copying, distributing or modifying the Program or works based on it. 6. Each time you redistribute the Program (or any work based on the Program), the recipient automatically receives a license from the original licensor to copy, distribute or modify the Program subject to these terms and conditions. You may not impose any further restrictions on the recipients' exercise of the rights granted herein. You are not responsible for enforcing compliance by third parties to this License. 7. If, as a consequence of a court judgment or allegation of patent infringement or for any other reason (not limited to patent issues), conditions are imposed on you (whether by court order, agreement or otherwise) that contradict the conditions of this License, they do not excuse you from the conditions of this License. If you cannot distribute so as to satisfy simultaneously your obligations under this License and any other pertinent obligations, then as a consequence you may not distribute the Program at all. For example, if a patent license would not permit royalty-free redistribution of the Program by all those who receive copies directly or indirectly through you, then the only way you could satisfy both it and this License would be to refrain entirely from distribution of the Program. If any portion of this section is held invalid or unenforceable under any particular circumstance, the balance of the section is intended to apply and the section as a whole is intended to apply in other circumstances. It is not the purpose of this section to induce you to infringe any patents or other property right claims or to contest validity of any such claims; this section has the sole purpose of protecting the integrity of the free software distribution system, which is implemented by public license practices. Many people have made generous contributions to the wide range of software distributed through that system in reliance on consistent application of that system; it is up to the author/donor to decide if he or she is willing to distribute software through any other system and a licensee cannot impose that choice. This section is intended to make thoroughly clear what is believed to be a consequence of the rest of this License. 8. If the distribution and/or use of the Program is restricted in certain countries either by patents or by copyrighted interfaces, the original copyright holder who places the Program under this License may add an explicit geographical distribution limitation excluding those countries, so that distribution is permitted only in or among countries not thus excluded. In such case, this License incorporates the limitation as if written in the body of this License. 9. The Free Software Foundation may publish revised and/or new versions of the General Public License from time to time. Such new versions will be similar in spirit to the present version, but may differ in detail to address new problems or concerns. Each version is given a distinguishing version number. If the Program specifies a version number of this License which applies to it and "any later version", you have the option of following the terms and conditions either of that version or of any later version published by the Free Software Foundation. If the Program does not specify a version number of this License, you may choose any version ever published by the Free Software Foundation. 10. If you wish to incorporate parts of the Program into other free programs whose distribution conditions are different, write to the author to ask for permission. For software which is copyrighted by the Free Software Foundation, write to the Free Software Foundation; we sometimes make exceptions for this. Our decision will be guided by the two goals of preserving the free status of all derivatives of our free software and of promoting the sharing and reuse of software generally. NO WARRANTY 11. BECAUSE THE PROGRAM IS LICENSED FREE OF CHARGE, THERE IS NO WARRANTY FOR THE PROGRAM, TO THE EXTENT PERMITTED BY APPLICABLE LAW. EXCEPT WHEN OTHERWISE STATED IN WRITING THE COPYRIGHT HOLDERS AND/OR OTHER PARTIES PROVIDE THE PROGRAM "AS IS" WITHOUT WARRANTY OF ANY KIND, EITHER EXPRESSED OR IMPLIED, INCLUDING, BUT NOT LIMITED TO, THE IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE. THE ENTIRE RISK AS TO THE QUALITY AND PERFORMANCE OF THE PROGRAM IS WITH YOU. SHOULD THE PROGRAM PROVE DEFECTIVE, YOU ASSUME THE COST OF ALL NECESSARY SERVICING, REPAIR OR CORRECTION. 12. IN NO EVENT UNLESS REQUIRED BY APPLICABLE LAW OR AGREED TO IN WRITING WILL ANY COPYRIGHT HOLDER, OR ANY OTHER PARTY WHO MAY MODIFY AND/OR REDISTRIBUTE THE PROGRAM AS PERMITTED ABOVE, BE LIABLE TO YOU FOR DAMAGES, INCLUDING ANY GENERAL, SPECIAL, INCIDENTAL OR CONSEQUENTIAL DAMAGES ARISING OUT OF THE USE OR INABILITY TO USE THE PROGRAM (INCLUDING BUT NOT LIMITED TO LOSS OF DATA OR DATA BEING RENDERED INACCURATE OR LOSSES SUSTAINED BY YOU OR THIRD PARTIES OR A FAILURE OF THE PROGRAM TO OPERATE WITH ANY OTHER PROGRAMS), EVEN IF SUCH HOLDER OR OTHER PARTY HAS BEEN ADVISED OF THE POSSIBILITY OF SUCH DAMAGES. END OF TERMS AND CONDITIONS How to Apply These Terms to Your New Programs If you develop a new program, and you want it to be of the greatest possible use to the public, the best way to achieve this is to make it free software which everyone can redistribute and change under these terms. To do so, attach the following notices to the program. It is safest to attach them to the start of each source file to most effectively convey the exclusion of warranty; and each file should have at least the "copyright" line and a pointer to where the full notice is found. Copyright (C) This program is free software; you can redistribute it and/or modify it under the terms of the GNU General Public License as published by the Free Software Foundation; either version 2 of the License, or (at your option) any later version. This program is distributed in the hope that it will be useful, but WITHOUT ANY WARRANTY; without even the implied warranty of MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the GNU General Public License for more details. You should have received a copy of the GNU General Public License along with this program; if not, write to the Free Software Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA Also add information on how to contact you by electronic and paper mail. If the program is interactive, make it output a short notice like this when it starts in an interactive mode: Gnomovision version 69, Copyright (C) year name of author Gnomovision comes with ABSOLUTELY NO WARRANTY; for details type `show w'. This is free software, and you are welcome to redistribute it under certain conditions; type `show c' for details. The hypothetical commands `show w' and `show c' should show the appropriate parts of the General Public License. Of course, the commands you use may be called something other than `show w' and `show c'; they could even be mouse-clicks or menu items--whatever suits your program. You should also get your employer (if you work as a programmer) or your school, if any, to sign a "copyright disclaimer" for the program, if necessary. Here is a sample; alter the names: Yoyodyne, Inc., hereby disclaims all copyright interest in the program `Gnomovision' (which makes passes at compilers) written by James Hacker. , 1 April 1989 Ty Coon, President of Vice This General Public License does not permit incorporating your program into proprietary programs. If your program is a subroutine library, you may consider it more useful to permit linking proprietary applications with the library. If this is what you want to do, use the GNU Library General Public License instead of this License. debsecan-0.4.18/Makefile0000644000000000000000000000020110601557775011704 0ustar .PHONY: test test: cd testsuite && sh run.sh clean: -rm -f testsuite/*/*.out testsuite/whitelist.test testsuite/whitelist.expdebsecan-0.4.18/README0000644000000000000000000000223012315633246011120 0ustar Debian Security Analyzer ------------------------ debsecan, the Debian Security Analyzer, is a tool to generate a list of vulnerabilities which affect a particular Debian installation. debsecan runs on the host which is to be checked, and downloads vulnerability information over the Internet. It can send mail to interested parties when new vulnerabilities are discovered or when security updates become available. For details, see the debsecan(1) manual page. For instructions how to create a suitable, randomized cron entry, see the debsecan-create-cron(8) manual page. The vulnerability database is maintained by the Debian testing security team: A web interface to the database is available at: FAQ --- Q: How can I reduce the frequency of reports (e.g. weekly instead of daily reporting)? A: Just edit /etc/cron.d/debsecan to suit your needs. Note that debsecan internally limits the number of reports per day to 1, so you cannot increase the frequency of reports, only decrease it. -- Florian Weimer , Sun, 19 Aug 2007 21:17:44 +0200