- -------------------------------------------------------------------------- Debian-Edu/Skolelinux Security Advisory DESA 2007-003 http://www.skolelinux.no/security/ Steffen Joeris Jun 18th, 2007 debian-edu-security@lists.alioth.debian.org - -------------------------------------------------------------------------- This DESA deals with severel packages that the Debian Security Team has fixed. Each section starts with "Package" and includes a link to the Debian Security Team's announce for the security upgrade. Package : libexif Vulnerability : integer overflow Need reboot : no Debian-Edu-specific : no CVE ID : CVE-2006-4168 DSA ID : DSA-1310-1 DSA URL : http://www.debian.org/security/2007/dsa-1310 Package : xfree86 (x-window-system, xfonts-100dpi-transcoded, xfonts-100dpi, xfonts-75dpi-transcoded, xfonts-75dpi, xfonts-base-transcoded, xfonts-base, xfonts-scalable, xfree86-common, xlibs-data, xlibs, libdps1, libice6, libsm6, libx11, libxaw7, libxext6, libxft1, libxft2, libxi6, libxmu6, libxmuu1, libxp6, libxpm4, libxrandr2, libxt6, libxtrap6, libxtst6, libxv1, x-window-system-core, xbase-clients, xfs, xlibmesa-dri, xlibmesa-gl, xlibmesa-glu, xserver-common, xserver-xfree86, xterm, xutils, rdesktop) Vulnerability : several vulnerabilities Need reboot : no Debian-Edu-specific : no CVE ID : CVE-2007-1003, CVE-2007-1351, CVE-2007-1352, CVE-2007-1667 DSA ID : DSA-1294-1 DSA URL : http://www.debian.org/security/2007/dsa-1294 Package : gimp (libgimp2.0, gimp) Vulnerability : buffer overflow Need reboot : no Debian-Edu-specific : no CVE ID : CVE-2007-2356 DSA ID : DSA-1301-1 DSA URL : http://www.debian.org/security/2007/dsa-1301 Package : openoffice.org (openoffice.org-l10n-ca, openoffice.org-l10n-de, openoffice.org-l10n-en, openoffice.org-l10n-es, openoffice.org-l10n-fr, openoffice.org-l10n-nb, openoffice.org-l10n-nl, openoffice.org-l10n-nn, openoffice.org, ttf-opensymbol, openoffice.org-bin) Vulnerability : heap overflow Need reboot : no Debian-Edu-specific : no CVE ID : CVE-2007-0245 DSA ID : DSA-1307-1 DSA URL : http://www.debian.org/security/2007/dsa-1307 Upgrade Instructions - -------------------- Make sure the line deb http://security.debian.org/ sarge/updates main contrib non-free is present in your /etc/apt/sources.list and run 'apt-get update' to update your package lists. Then run 'apt-get upgrade' to upgrade all the packages mentioned above. This might upgrade other packages too, and if you only want to upgrade the packages above, you should run 'apt-get install <pkg1> ... <pkgN>' where <pkg1> to <pkgN> is the package names in paranthesis from each package section above. - -------------------------------------------------------------------------- Mailing lists: bruker@skolelinux.no, debian-edu@lists.debian.org, linuxiskolen@skolelinux.no, user@skolelinux.de, admin-discuss@skolelinux.org, debian-edu-french@lists.debian.org Package info: `apt-cache show <pkg>'
Attachment:
signature.asc
Description: This is a digitally signed message part.