News for package musl

-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

Format: 3.0 (quilt)
Source: musl
Binary: musl, musl-dev, musl-tools
Architecture: armel armhf i386 amd64 mips mipsel
Version: 1.1.5-2
Maintainer: Kevin Bortis <[email protected]>
Homepage: http://www.musl-libc.org/
Standards-Version: 3.9.6
Vcs-Browser: https://github.com/wermut/musl/
Vcs-Git: https://github.com/wermut/musl.git
Testsuite: autopkgtest
Build-Depends: debhelper (>= 9), dh-exec (>= 0.6)
Package-List:
 musl deb libs extra arch=armel,armhf,i386,amd64,mips,mipsel
 musl-dev deb libdevel extra arch=armel,armhf,i386,amd64,mips,mipsel
 musl-tools deb devel extra arch=armel,armhf,i386,amd64,mips,mipsel
Checksums-Sha1:
 5be2642367c9a47ae752ae6df24263fd00301ab9 872924 musl_1.1.5.orig.tar.gz
 b381775341ee7e6f742efce8e5976bb4d88f567e 7928 musl_1.1.5-2.debian.tar.xz
Checksums-Sha256:
 352362b1724cc9740f4c3ce0fe02aae45e4de9809ea4ac961f31aedc11b87393 872924 musl_1.1.5.orig.tar.gz
 e524dd432def05628cb9d448871c63019f19d391981966bbdabdd45391262aac 7928 musl_1.1.5-2.debian.tar.xz
Files:
 94f8aa9dab80229fed68991bb9984cc5 872924 musl_1.1.5.orig.tar.gz
 8fdba59ba79f334dc2cd871f8da82ab5 7928 musl_1.1.5-2.debian.tar.xz

-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1

iQIcBAEBAgAGBQJVGxB9AAoJENPhc4PPp/8G9+0P/2E8qw4HuElE8LHz8K5ddm/F
grgDqUPMAVTbPPrSfhAfneTSvACN0hJ+8gTlV3W1sJw15mQhqg/6/NTSYsFBArU5
fyNuFZmLUDCdxCbKPPAjdQlCRD62EPLg45T36WXF38FCkg3VpgOsOTEK+1eFOiA4
DvFRtI72kOaAN+d15bwERAKZwIQmsBb6HAQafASyVOrN77FhooY7iUOtylQ97LAa
HbZxluS1aNwaV1nBuuB7Zm9qJCldY1DLedvxp6lh4ndorH9vNzkPtZLjMchAvED3
Zakj/e2hN+QhveXz55UG4AcnjeDlpJeAnYvWh35Yg/VBdvplxN6OoFhVc5nz2T6W
Sv5BVvpGCUtY5ynuYSBBzdhSZbT+HmM2VM4T7Mra47EO1obaZ96IL9NTU3bczAT4
djVX58sn+ULG12Uv2Z1z4bkXNgm0sXlFRSM4IJjqlZKnae2vSnpXJ1A3kUAli/9d
S7KIR+9FeWyIZ9benfzoZIDUMuuig7xIaanmhdJXHQRmMAngQXkcaS5knTc3tsda
Ey3O52KqgLCZxEIdvr6LE78yZL8KcAyYG65qvZ0g8bOQamo6Bz2iY07wjzXpAb65
F/jcx7avH/RszJ2Y+rCJQgEdV+6+cQgXo637G/bdY6e8l+SGbzC1VKUyTf1D4H1p
z4kmbtz3S3L1UI97w8Ni
=4Mwp
-----END PGP SIGNATURE-----

Changes:
musl (1.1.5-2) unstable; urgency=low

  * Fixes possible stack-based buffer overflow CVE-2015-1817 (Closes: #781497)

 -- Kevin Bortis <[email protected]>  Tue, 31 Mar 2015 22:42:17 +0200