This automatic mail gives an overview over security issues that were recently fixed in Debian Testing. The majority of fixed packages migrate to testing from unstable. If this would take too long, fixed packages are uploaded to the testing-security repository instead. It can also happen that vulnerable packages are removed from Debian testing.
Migrated from unstable: ======================= openswan 1:2.4.12+dfsg-1.3: CVE-2008-4190: http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-4190 http://bugs.debian.org/496374 xulrunner 1.9.0.3-1: CVE-2008-3837: http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-3837 CVE-2008-4058: http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-4058 CVE-2008-4059: http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-4059 CVE-2008-4060: http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-4060 CVE-2008-4061: http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-4061 CVE-2008-4062: http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-4062 CVE-2008-4063: http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-4063 CVE-2008-4064: http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-4064 CVE-2008-4065: http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-4065 CVE-2008-4067: http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-4067 CVE-2008-4068: http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-4068 How to update: -------------- Make sure the line deb http://security.debian.org lenny/updates main contrib non-free is present in your /etc/apt/sources.list. Of course, you also need the line pointing to your normal lenny mirror. You can use aptitude update && aptitude dist-upgrade to install the updates. More information: ----------------- More information about which security issues affect Debian can be found in the security tracker: http://security-tracker.debian.net/tracker/ A list of all known unfixed security issues is at http://security-tracker.debian.net/tracker/status/release/testing -- To UNSUBSCRIBE, email to [EMAIL PROTECTED] with a subject of "unsubscribe". Trouble? Contact [EMAIL PROTECTED]