This automatic mail gives an overview over security issues that were recently fixed in Debian Testing. The majority of fixed packages migrate to testing from unstable. If this would take too long, fixed packages are uploaded to the testing-security repository instead. It can also happen that vulnerable packages are removed from Debian testing.
Migrated from unstable: ======================= tiff 3.9.4-1: CVE-2010-1411: http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-1411 CVE-2010-2065: http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-2065 CVE-2010-2067: http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-2067 xulrunner 1.9.1.10-1: CVE-2010-0183: http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-0183 CVE-2010-1196: http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-1196 CVE-2010-1197: http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-1197 CVE-2010-1198: http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-1198 CVE-2010-1199: http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-1199 CVE-2010-1200: http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-1200 CVE-2010-1201: http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-1201 CVE-2010-1202: http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-1202 Removed from testing: ===================== The following issues have been "fixed" by removing the (source) packages from testing. This probably means that you have to manually uninstall the corresponding binary packages to fix the issues. It can also mean that the packages have been replaced, or that they have been temporarily removed by the release team to make transitions from unstable easier. viewvc: CVE-2010-0004: http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-0004 http://bugs.debian.org/575777 CVE-2010-0005: http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-0005 CVE-2010-0132: http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-0132 http://bugs.debian.org/576307 CVE-2010-0736: http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-0736 http://bugs.debian.org/575787 How to update: -------------- Make sure the line deb http://security.debian.org squeeze/updates main contrib non-free is present in your /etc/apt/sources.list. Of course, you also need the line pointing to your normal squeeze mirror. You can use aptitude update && aptitude dist-upgrade to install the updates. More information: ----------------- More information about which security issues affect Debian can be found in the security tracker: http://security-tracker.debian.org/tracker/ A list of all known unfixed security issues is at http://security-tracker.debian.org/tracker/status/release/testing -- To UNSUBSCRIBE, email to debian-testing-security-announce-requ...@lists.debian.org with a subject of "unsubscribe". Trouble? Contact listmas...@lists.debian.org Archive: http://lists.debian.org/e1otljs-00043h...@soler.debian.org