This automatic mail gives an overview over security issues that were recently 
fixed in Debian Testing. The majority of fixed packages migrate to testing 
from unstable. If this would take too long, fixed packages are uploaded to the 
testing-security repository instead. It can also happen that vulnerable 
packages are removed from Debian testing.

Migrated from unstable:
=======================
network-manager-applet 0.7.999-2:
CVE-2009-4144: http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-4144
               http://bugs.debian.org/560067
CVE-2009-4145: http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-4145
               http://bugs.debian.org/563371

redmine 0.9.1-1:
CVE-2009-4459: http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-4459
               http://bugs.debian.org/563940

Removed from testing:
=====================
The following issues have been "fixed" by removing the (source) packages from 
testing. This probably means that you have to manually uninstall the 
corresponding binary packages to fix the issues.
It can also mean that the packages have been replaced, or that they have been 
temporarily removed by the release team to make transitions from unstable 
easier.

camserv:
CVE-2009-3736: http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-3736
               http://bugs.debian.org/559800

libphp-jpgraph:
CVE-2009-4422: http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-4422
               http://bugs.debian.org/562633

serendipity:
CVE-2007-2385: http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-2385
               http://bugs.debian.org/557746
CVE-2009-4412: http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-4412
               http://bugs.debian.org/562634

siproxd:
CVE-2009-3736: http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-3736
               http://bugs.debian.org/559827



How to update:
--------------
Make sure the line

        deb http://security.debian.org squeeze/updates main contrib non-free

is present in your /etc/apt/sources.list. Of course, you also need the line
pointing to your normal squeeze mirror. You can use

        aptitude update && aptitude dist-upgrade

to install the updates.


More information:
-----------------
More information about which security issues affect Debian can be found in the 
security tracker:

        http://security-tracker.debian.org/tracker/

A list of all known unfixed security issues is at

        http://security-tracker.debian.org/tracker/status/release/testing


-- 
To UNSUBSCRIBE, email to 
debian-testing-security-announce-requ...@lists.debian.org
with a subject of "unsubscribe". Trouble? Contact listmas...@lists.debian.org

Reply via email to