This automatic mail gives an overview over security issues that were recently fixed in Debian Testing. The majority of fixed packages migrate to testing from unstable. If this would take too long, fixed packages are uploaded to the testing-security repository instead. It can also happen that vulnerable packages are removed from Debian testing.
Migrated from unstable: ======================= fetchmail 6.3.16-2: CVE-2010-1167: http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-1167 gource 0.26-2: <no CVE yet> : gource: predictable log file located in /tmp http://bugs.debian.org/577958 iceape 2.0.4-1: CVE-2010-0173: http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-0173 CVE-2010-0174: http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-0174 CVE-2010-0175: http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-0175 CVE-2010-0176: http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-0176 CVE-2010-0177: http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-0177 CVE-2010-0178: http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-0178 CVE-2010-0179: http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-0179 CVE-2010-0181: http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-0181 CVE-2010-0182: http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-0182 xulrunner 1.9.1.9-6: CVE-2010-0173: http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-0173 CVE-2010-0174: http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-0174 CVE-2010-0175: http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-0175 CVE-2010-0176: http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-0176 CVE-2010-0177: http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-0177 CVE-2010-0178: http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-0178 CVE-2010-0179: http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-0179 CVE-2010-0182: http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-0182 How to update: -------------- Make sure the line deb http://security.debian.org squeeze/updates main contrib non-free is present in your /etc/apt/sources.list. Of course, you also need the line pointing to your normal squeeze mirror. You can use aptitude update && aptitude dist-upgrade to install the updates. More information: ----------------- More information about which security issues affect Debian can be found in the security tracker: http://security-tracker.debian.org/tracker/ A list of all known unfixed security issues is at http://security-tracker.debian.org/tracker/status/release/testing -- To UNSUBSCRIBE, email to debian-testing-security-announce-requ...@lists.debian.org with a subject of "unsubscribe". Trouble? Contact listmas...@lists.debian.org Archive: http://lists.debian.org/e1o6ckr-0001r7...@soler.debian.org