This automatic mail gives an overview over security issues that were recently 
fixed in Debian Testing. The majority of fixed packages migrate to testing 
from unstable. If this would take too long, fixed packages are uploaded to the 
testing-security repository instead. It can also happen that vulnerable 
packages are removed from Debian testing.

Migrated from unstable:
=======================
cups 1.3.8-1lenny4:
CVE-2008-5286: http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-5286
               http://bugs.debian.org/507183

flamethrower 0.1.8-2:
CVE-2008-5141: http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-5141
               http://bugs.debian.org/506350

iceape 1.1.13-1:
CVE-2008-0017: http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-0017
CVE-2008-4582: http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-4582
CVE-2008-5012: http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-5012
CVE-2008-5013: http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-5013
CVE-2008-5014: http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-5014
CVE-2008-5016: http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-5016
CVE-2008-5017: http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-5017
CVE-2008-5018: http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-5018
CVE-2008-5021: http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-5021
CVE-2008-5022: http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-5022
CVE-2008-5023: http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-5023
CVE-2008-5024: http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-5024

p3nfs 5.19-1.2:
CVE-2008-5154: http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-5154
               http://bugs.debian.org/506270

wordpress 2.5.1-11:
CVE-2008-5278: http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-5278
               http://bugs.debian.org/507193

Removed from testing:
=====================
The following issues have been "fixed" by removing the (source) packages from 
testing. This probably means that you have to manually uninstall the 
corresponding binary packages to fix the issues.
It can also mean that the packages have been replaced, or that they have been 
temporarily removed by the release team to make transitions from unstable 
easier.

quassel:
<no CVE yet> : Quassel CTCP Handling Arbitrary Message Manipulation 
Vulnerability
               http://bugs.debian.org/506550

verlihub:
<no CVE yet> : verlihub remote command execution and the possibility of attack 
with the help of symlinks
               http://bugs.debian.org/506530



How to update:
--------------
Make sure the line

        deb http://security.debian.org lenny/updates main contrib non-free

is present in your /etc/apt/sources.list. Of course, you also need the line
pointing to your normal lenny mirror. You can use

        aptitude update && aptitude dist-upgrade

to install the updates.


More information:
-----------------
More information about which security issues affect Debian can be found in the 
security tracker:

        http://security-tracker.debian.net/tracker/

A list of all known unfixed security issues is at

        http://security-tracker.debian.net/tracker/status/release/testing


-- 
To UNSUBSCRIBE, email to [EMAIL PROTECTED]
with a subject of "unsubscribe". Trouble? Contact [EMAIL PROTECTED]

Reply via email to