[Date Prev][Date Next] [Thread Prev][Thread Next] [Date Index] [Thread Index]

Debian GNU/Linux 4.0 updated

The Debian Project                                http://www.debian.org/
Debian GNU/Linux 4.0 updated                            press@debian.org
December 18th, 2008             http://www.debian.org/News/2008/20081218

Debian GNU/Linux 4.0 updated

The Debian project is pleased to announce the sixth update of its stable
distribution Debian GNU/Linux 4.0 (codename "etch").  This update mainly
adds corrections for security problems to the stable release, along with
a few adjustment to serious problems.

Please note that this update does not constitute a new version of Debian
GNU/Linux 4.0 but only updates some of the packages included.  There is
no need to throw away 4.0 CDs or DVDs but only to update via an
up-to-date Debian mirror after an installation, to cause any out of date
packages to be updated.

Those who frequently install updates from security.debian.org won't have
to update many packages and most updates from security.debian.org are
included in this update.

New CD and DVD images containing updated packages and the regular
installation media accompanied with the package archive respectively will
be available soon at the regular locations.

Upgrading to this revision online is usually done by pointing the
aptitude (or apt) package tool (see the sources.list(5) manual page) to
one of Debian's many FTP or HTTP mirrors.  A comprehensive list of
mirrors is available at:


Miscellaneous Bugfixes

This stable update adds several binary updates for various architectures
to packages whose version was not synchronised across all architectures.
It also adds a few important corrections to the following packages:

    Package                     Reason

    blender                     Sanitise Python's default import path
    devscripts                  Allow current signed changes files
    dpkg                        Improved symlink handling, reenable no-debsig
    epiphany-browser            Allow the deletion of certificates
    glibc                       Keep ld.so in optimised libraries
    graphviz                    Fix potential arbitrary code execution
    libhdate                    Drop binary package libhdate-pascal
    perl                        Fix Time::HiRes with kernels >= 2.6.22
    postgresql-7.4              Incorporate bug fix releases up to 7.4.23
    postgresql-8.1              Incorporate bug fix releases up to 8.1.15
    reportbug                   Support new bugs.debian.org structure
    spamassassin                Fix for denial of service, remove blacklists
    tdiary                      Fix a Cross Site Scripting vulnerability
    websvn                      Fix potential PHP code execution

Security Updates

This revision adds the following security updates to the stable release.
The Security Team has already released an advisory for each of these

    Advisory ID         Package                 Correction(s)

    DSA 1617            refpolicy               Incompatible policy
    DSA 1622            newsx                   Arbitrary code execution
    DSA 1635            freetype                Several vulnerabilities
    DSA 1656            cupsys                  Several vulnerabilities
    DSA 1657            qemu                    Denial of service
    DSA 1658            dbus                    Denial of service
    DSA 1659            libspf2                 Potential remote code execution
    DSA 1660            clamav                  Denial of service
    DSA 1661            openoffice.org          Several vulnerabilities
    DSA 1662            mysql-dfsg-5.0          Authorization bypass
    DSA 1663            net-snmp                Several vulnerabilities
    DSA 1665            libcdaudio              Arbitrary code execution
    DSA 1666            libxml2                 Several vulnerabilities
    DSA 1667            python2.4               Several vulnerabilities
    DSA 1668            hf                      Arbitrary code execution
    DSA 1669            xulrunner               Several vulnerabilities
    DSA 1670            enscript                Arbitrary code execution
    DSA 1671            iceweasel               Several vulnerabilities
    DSA 1672            imlib2                  Arbitrary code execution
    DSA 1673            wireshark               Several vulnerabilities
    DSA 1674            jailer                  Denial of service
    DSA 1675            phpmyadmin              Cross-site scripting
    DSA 1676            flamethrower            Denial of service
    DSA 1677            cupsys                  Arbitrary code execution
    DSA 1679            awstats                 Cross-site scripting
    DSA 1681            linux-2.6.24            Several vulnerabilities
    DSA 1682            squirrelmail            Cross site scripting
    DSA 1683            streamripper            Potential code execution
    DSA 1687            fai-kernels             Several vulnerabilities
    DSA 1687            linux-2.6               Several vulnerabilities
    DSA 1687            user-mode-linux         Several vulnerabilities

A complete list of all accepted and rejected packages together with
rationale is on the preparation page for this revision:


Removed packages

The following packages were removed due to circumstances beyond our control:

    Package                     Reason

    fpc                         Copyright infringement
    gearhead                    Depends on non-free fpc
    imapcopy:                   Depends on non-free fpc
    astrolog                    Contains potentially undistributable code
    youtube-dl                  Not suited for stable release


The complete lists of packages that have changed with this revision:


The current stable distribution:


Proposed updates to the stable distribution:


Stable distribution information (release notes, errata etc.):


Security announcements and information:


About Debian

The Debian Project is an association of Free Software developers who
volunteer their time and effort in order to produce the completely
free operating systems Debian GNU/Linux.

Contact Information

For further information, please visit the Debian web pages at
<http://www.debian.org/>, send mail to <press@debian.org>, or
contact the stable release team at <debian-release@lists.debian.org>.

Reply to: