• moderiert von:
  • Forenmoderatoren
Zum aktuellsten Beitrag
desa-2007-016: several vulnerabilities in sarge
  • verfasst: 13.12.2007, 18:00
     
    registriert:
     November 2007
    Status:
    offline
    letzter Besuch:
    21.08.08
    Beiträge:
    2474
    Absender: steffen joeris
    1. --nextPart2731652.sD9sC00cK6
    2. Content-Type: text/plain;
    3.   charset="us-ascii"
    4. Content-Transfer-Encoding: quoted-printable
    5. Content-Disposition: inline
    6.  
    7. =2D -----------------------------------------------------------------------=
    8. =2D--
    9. Debian-Edu/Skolelinux Security Advisory DESA 2007-016
    10. http://www.skolelinux.org/security/                      Steffen Joeris
    11. December 13th, 2007              debian-edu-security@lists.alioth.debian.org
    12. =2D -----------------------------------------------------------------------=
    13. =2D--
    14.  
    15. This DESA deals with packages that the Debian Security Team
    16. has fixed. Each section starts with "Package" and includes a link to
    17. the Debian Security Team's announce for the security upgrade.
    18.  
    19. Package             : samba (samba-doc, winbind, smbclient, samba-common,
    20.                       smbfs, libsmbclient, samba)
    21. Vulnerability       : several
    22. Need reboot         : no
    23. Debian-Edu-specific : no
    24. CVE ID              : CVE-2007-4572, CVE-2007-5398, CVE-2007-6015
    25. DSA ID              : DSA-1409-2, DSA-1427-1
    26. DSA URL             : http://www.debian.org/security/2007/dsa-1409
    27. DSA URL             : http://www.debian.org/security/2007/dsa-1427
    28.  
    29. Package             : mysql-dfsg (mysql-common, libmysqlclient12)
    30. Vulnerability       : multiple
    31. Need reboot         : no
    32. Debian-Edu-specific : no
    33. CVE ID              : CVE-2007-2583, CVE-2007-2691, CVE-2007-2692=20
    34. CVE-2007-3780, CVE-2007-3782, CVE-2007-5925
    35. DSA ID              : DSA-1413-1
    36. DSA URL             : http://www.debian.org/security/2007/dsa-1413
    37.  
    38. Package             : tk8.3 (tk8.3)
    39. Vulnerability       : buffer overflow
    40. Need reboot         : no
    41. Debian-Edu-specific : no
    42. CVE ID              : CVE-2007-5378
    43. DSA ID              : DSA-1416-1
    44. DSA URL             : http://www.debian.org/security/2007/dsa-1416
    45.  
    46. Package             : qt-x11-free (libqt3c102-mt)
    47. Vulnerability       : several vulnerabilities
    48. Need reboot         : no
    49. Debian-Edu-specific : no
    50. CVE ID              : CVE-2007-3388 CVE-2007-4137
    51. DSA ID              : DSA-1426-1
    52. DSA URL             : http://www.debian.org/security/2007/dsa-1426
    53.  
    54. Package             : libnss-ldap (libnss-ldap)
    55. Vulnerability       : denial of service
    56. Need reboot         : no
    57. Debian-Edu-specific : no
    58. CVE ID              : CVE-2007-5794
    59. DSA ID              : DSA-1430-1
    60. DSA URL             : http://www.debian.org/security/2007/dsa-1430
    61.  
    62.  
    63. Upgrade Instructions
    64. =2D --------------------
    65.  
    66. Make sure the line
    67.  
    68.   deb http://security.debian.org/ sarge/updates main contrib non-free
    69.  
    70. is present in your /etc/apt/sources.list and run 'apt-get update' to
    71. update your package lists. Then run
    72.  
    73.   'apt-get upgrade'
    74.  
    75. to upgrade all the packages mentioned above. This might upgrade other
    76. packages too, and if you only want to upgrade the packages above, you
    77. should run
    78.  
    79.   'apt-get install <pkg1> ... <pkgN>'
    80.  
    81. where <pkg1> to <pkgN> is the package names in paranthesis
    82. from each package section above.
    83.  
    84. =2D -----------------------------------------------------------------------=
    85. =2D--
    86. Mailing lists: debian-edu-announce@lists.debian.org
    87. Package info: `apt-cache show <pkg>'
    88.  
    89. --nextPart2731652.sD9sC00cK6
    90. Content-Type: application/pgp-signature; name=signature.asc
    91. Content-Description: This is a digitally signed message part.
    92.  
    93. -----BEGIN PGP SIGNATURE-----
    94. Version: GnuPG v1.4.6 (GNU/Linux)
    95.  
    96. iD8DBQBHYXBe62zWxYk/rQcRAnaxAKCf126Ig/DXVxB4N9TxNk16tXgtfQCgo/gL
    97. bj1aSTqzgFTCRJwGEndRzYg=
    98. =GO7h
    99. -----END PGP SIGNATURE-----
    100.  
    101. --nextPart2731652.sD9sC00cK6--
    102.  
    103.  
    104. --
    105. To UNSUBSCRIBE, email to debian-edu-announce-request@lists.debian.org
    106. with a subject of "unsubscribe". Trouble? Contact listmaster@lists.debian.org

 Suchen:


 Umfrage

(Nur für angemeldete Benutzer)

Was wird hier am meisten vermisst?

[ Ergebnis | Umfragen ]

Stimmen: 621
Kommentare: 0

 Zitate

Unix IS user friendly - it's just selective about who its friends are !

-- unbekannt