This automatic mail gives an overview over security issues that were recently 
fixed in Debian Testing. The majority of fixed packages migrate to testing 
from unstable. If this would take too long, fixed packages are uploaded to the 
testing-security repository instead. It can also happen that vulnerable 
packages are removed from Debian testing.

DTSA:
=====
The following issues have been fixed by uploads to testing-security:

r-base 2.7.1-1+lenny1:
DTSA-162-1    : r-base - symlink attack
<no CVE yet> : r-base: insecure temp file
               http://bugs.debian.org/496418

samba 2:3.2.1-1+lenny1:
DTSA-161-1    : samba - privilege escalation
CVE-2008-3789: http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-3789
               http://bugs.debian.org/496073

Migrated from unstable:
=======================
awstats 6.7.dfsg-5:
CVE-2008-3714: http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-3714

linux-2.6 2.6.26-3:
CVE-2007-6712: http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-6712
CVE-2008-2372: http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-2372
CVE-2008-2750: http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-2750
CVE-2008-3496: http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-3496
CVE-2008-3534: http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-3534
CVE-2008-3535: http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-3535

qemu 0.9.1-6:
<no CVE yet> : qemu: insecure temp file
               http://bugs.debian.org/496394

rancid 2.3.2~a8-2:
<no CVE yet> : rancid: insecure temp file
               http://bugs.debian.org/496426

realtimebattle 1.0.8-8:
<no CVE yet> : realtimebattle: insecure temp file
               http://bugs.debian.org/496385

sng 1.0.2-6:
<no CVE yet> : sng: insecure temp file
               http://bugs.debian.org/496407

xmcd 2.6-21:
<no CVE yet> : xmcd: insecure temp file
               http://bugs.debian.org/496416



How to update:
--------------
Make sure the line

        deb http://security.debian.org lenny/updates main contrib non-free

is present in your /etc/apt/sources.list. Of course, you also need the line
pointing to your normal lenny mirror. You can use

        aptitude update && aptitude dist-upgrade

to install the updates.


More information:
-----------------
More information about which security issues affect Debian can be found in the 
security tracker:

        http://security-tracker.debian.net/tracker/

A list of all known unfixed security issues is at

        http://security-tracker.debian.net/tracker/status/release/testing


-- 
To UNSUBSCRIBE, email to [EMAIL PROTECTED]
with a subject of "unsubscribe". Trouble? Contact [EMAIL PROTECTED]

Reply via email to