Security update for Debian Testing - 2008-12-06
This automatic mail gives an overview over security issues that were recently
fixed in Debian Testing. The majority of fixed packages migrate to testing
from unstable. If this would take too long, fixed packages are uploaded to the
testing-security repository instead. It can also happen that vulnerable
packages are removed from Debian testing.
Migrated from unstable:
=======================
cups 1.3.8-1lenny4:
CVE-2008-5286: http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-5286
http://bugs.debian.org/507183
flamethrower 0.1.8-2:
CVE-2008-5141: http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-5141
http://bugs.debian.org/506350
iceape 1.1.13-1:
CVE-2008-0017: http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-0017
CVE-2008-4582: http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-4582
CVE-2008-5012: http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-5012
CVE-2008-5013: http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-5013
CVE-2008-5014: http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-5014
CVE-2008-5016: http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-5016
CVE-2008-5017: http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-5017
CVE-2008-5018: http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-5018
CVE-2008-5021: http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-5021
CVE-2008-5022: http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-5022
CVE-2008-5023: http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-5023
CVE-2008-5024: http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-5024
p3nfs 5.19-1.2:
CVE-2008-5154: http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-5154
http://bugs.debian.org/506270
wordpress 2.5.1-11:
CVE-2008-5278: http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-5278
http://bugs.debian.org/507193
Removed from testing:
=====================
The following issues have been "fixed" by removing the (source) packages from
testing. This probably means that you have to manually uninstall the
corresponding binary packages to fix the issues.
It can also mean that the packages have been replaced, or that they have been
temporarily removed by the release team to make transitions from unstable
easier.
quassel:
<no CVE yet> : Quassel CTCP Handling Arbitrary Message Manipulation Vulnerability
http://bugs.debian.org/506550
verlihub:
<no CVE yet> : verlihub remote command execution and the possibility of attack with the help of symlinks
http://bugs.debian.org/506530
How to update:
--------------
Make sure the line
deb http://security.debian.org lenny/updates main contrib non-free
is present in your /etc/apt/sources.list. Of course, you also need the line
pointing to your normal lenny mirror. You can use
aptitude update && aptitude dist-upgrade
to install the updates.
More information:
-----------------
More information about which security issues affect Debian can be found in the
security tracker:
http://security-tracker.debian.net/tracker/
A list of all known unfixed security issues is at
http://security-tracker.debian.net/tracker/status/release/testing
Reply to: