it-securitynotifies AT lists.piratenpartei.de
Betreff: Sicherheitsankündigungen
Listenarchiv
- From: Testing Security Team <secure-testing-team AT lists.alioth.debian.org>
- To: debian-testing-security-announce AT lists.debian.org
- Subject: [IT-SecurityNotifies] Security update for Debian Testing - 2010-09-06
- Date: Mon, 06 Sep 2010 00:38:34 +0000
- List-archive: <https://service.piratenpartei.de/pipermail/it-securitynotifies>
- List-id: Sicherheitsankündigungen <it-securitynotifies.lists.piratenpartei.de>
- List-url: <http://lists.debian.org/debian-testing-security-announce/>
- Old-return-path: <sectracker AT soler.debian.org>
- Resent-date: Mon, 6 Sep 2010 00:38:45 +0000 (UTC)
- Resent-from: debian-testing-security-announce AT lists.debian.org
- Resent-message-id: <Lpyy12lyZwN.A.tMF.VgDhMB@liszt>
- Resent-sender: debian-testing-security-announce-request AT lists.debian.org
This automatic mail gives an overview over security issues that were recently
fixed in Debian Testing. The majority of fixed packages migrate to testing
from unstable. If this would take too long, fixed packages are uploaded to
the
testing-security repository instead. It can also happen that vulnerable
packages are removed from Debian testing.
Migrated from unstable:
=======================
lynx-cur 2.8.8dev.5-1:
CVE-2010-2810: http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-2810
http://bugs.debian.org/594300
openjdk-6 6b18-1.8.1-1:
CVE-2010-2783: http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-2783
<no CVE yet> : flaw that allows unsigned code to access any file on the
machine (accessible to the user) and write to it.
<no CVE yet> : flaw in NetX that allows arbitrary unsigned apps to set any
java property
Removed from testing:
=====================
The following issues have been "fixed" by removing the (source) packages from
testing. This probably means that you have to manually uninstall the
corresponding binary packages to fix the issues.
It can also mean that the packages have been replaced, or that they have been
temporarily removed by the release team to make transitions from unstable
easier.
babiloo:
<no CVE yet> : babiloo insecure downloading and unpacking of dictionary files
http://bugs.debian.org/591995
How to update:
--------------
Make sure the line
deb http://security.debian.org squeeze/updates main contrib non-free
is present in your /etc/apt/sources.list. Of course, you also need the line
pointing to your normal squeeze mirror. You can use
aptitude update && aptitude dist-upgrade
to install the updates.
More information:
-----------------
More information about which security issues affect Debian can be found in
the
security tracker:
http://security-tracker.debian.org/tracker/
A list of all known unfixed security issues is at
http://security-tracker.debian.org/tracker/status/release/testing
--
To UNSUBSCRIBE, email to
debian-testing-security-announce-request AT lists.debian.org
with a subject of "unsubscribe". Trouble? Contact listmaster AT lists.debian.org
Archive: E1OsPjG-0008DW-6f AT soler.debian.org">http://lists.debian.org/E1OsPjG-0008DW-6f AT soler.debian.org
- [IT-SecurityNotifies] Security update for Debian Testing - 2010-09-06, Testing Security Team, 06.09.2010
Archiv bereitgestellt durch MHonArc 2.6.19.