Security update for Debian Testing - 2010-08-04
This automatic mail gives an overview over security issues that were recently 
fixed in Debian Testing. The majority of fixed packages migrate to testing 
from unstable. If this would take too long, fixed packages are uploaded to the 
testing-security repository instead. It can also happen that vulnerable 
packages are removed from Debian testing.
Migrated from unstable:
=======================
linux-2.6 2.6.32-18:
CVE-2010-1641: http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-1641
CVE-2010-2071: http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-2071
xmlrpc-c 1.06.27-1.1:
CVE-2009-3560: http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-3560
               http://bugs.debian.org/560942
CVE-2009-3720: http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-3720
Removed from testing:
=====================
The following issues have been "fixed" by removing the (source) packages from 
testing. This probably means that you have to manually uninstall the 
corresponding binary packages to fix the issues.
It can also mean that the packages have been replaced, or that they have been 
temporarily removed by the release team to make transitions from unstable 
easier.
lxr:
CVE-2010-1448: http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-1448
               http://bugs.debian.org/585411
CVE-2010-1625: http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-1625
               http://bugs.debian.org/588138
CVE-2010-1738: http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-1738
lxr-cvs:
CVE-2009-4497: http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-4497
               http://bugs.debian.org/575745
CVE-2010-1448: http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-1448
               http://bugs.debian.org/588036
CVE-2010-1625: http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-1625
               http://bugs.debian.org/588137
CVE-2010-1738: http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-1738
               http://bugs.debian.org/585412
How to update:
--------------
Make sure the line
	deb http://security.debian.org squeeze/updates main contrib non-free
is present in your /etc/apt/sources.list. Of course, you also need the line
pointing to your normal squeeze mirror. You can use
	aptitude update && aptitude dist-upgrade
to install the updates.
More information:
-----------------
More information about which security issues affect Debian can be found in the 
security tracker:
	http://security-tracker.debian.org/tracker/
A list of all known unfixed security issues is at
	http://security-tracker.debian.org/tracker/status/release/testing
Reply to: