[SUA 107-1] Upcoming Debian 8 Update (8.6)
-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA256
- -------------------------------------------------------------------------
Debian Stable Updates Announcement SUA 107-1 https://www.debian.org/
debian-release@lists.debian.org Adam D. Barratt
September 13th, 2016
- -------------------------------------------------------------------------
Upcoming Debian 8 Update (8.6)
An update to Debian 8 is scheduled for Saturday, September 17th, 2016.
As of now it will include the following bug fixes. They can be found in
"jessie-proposed-updates", which is carried by all official mirrors.
Please note that packages published through security.debian.org are not
listed, but will be included if possible. Some of the updates below are
also already available through "jessie-updates".
Testing and feedback would be appreciated. Bugs should be filed in the
Debian Bug Tracking System, but please make the Release Team aware of
them by copying "debian-release@lists.debian.org" on your mails.
The point release will also include a rebuild of debian-installer.
Miscellaneous Bugfixes
- ----------------------
This stable update adds a few important corrections to the following
packages:
Package Reason
adblock-plus New upstream release, compatible with firefox-esr
apache2 Fix race condition and logical error in init script; remove links to manpages.debian.org in default index.html; mod_socache_memcache: Increase idle timeout to 15s to allow keep-alive connections; mod_proxy_fcgi: Fix wrong behaviour with 304 responses; correct systemd-sysv-generator behaviour; mod_proxy_html: Add missing config file mods-available/proxy_html.conf
audiofile Fix buffer overflow when changing both sample format and number of channels [CVE-2015-7747]
automake-1.14 Avoid insecure use of /tmp/ in install-sh
backintime Add missing dependency on python-dbus
backuppc Fix regressions from samba update to 4.2
base-files Update for the point release
biber Fix breakage triggered by point release update of perl
cacti Fix SQL injection in tree.php [CVE-2016-3172] and graph_view.php [CVE-2016-3659]; fix authentication bypass [CVE-2016-2313]; fix regression in the fix for CVE-2016-2313 that broke guest user logins
ccache Upstream bug-fix release
clamav Don't fail if AllowSupplementaryGroups is still set in the config file
cmake Fix FindOpenSSL module to detect OpenSSL 1.0.1t
conkeror Support Firefox 44 and later
debian-edu-config Move from Iceweasel to Firefox ESR; adjust ldap-tools/ldap-debian-edu-install to be compliant with systemd now that unit samba.service is masked; dhclient-exit-hooks.d/hostname: adjust for the case of a dedicated LTSP server; adjust cf.krb5client to ensure that cfengine runs are idempotent; move code to cleanup /usr/share/pam-configs/krb5 diversion from postinst to preinst to ease upgrades from old wheezy installations; don't purge libnss-mdns as cups now needs mdns for automatic printer detection
debian-edu-doc Update Debian Edu Jessie and Wheezy manuals from the wiki
debian-security-support Update included support data; add support for marking packages as losing support at a future date
dietlibc Fix insecure default PATH
dwarfutils Security fixes [CVE-2015-8538 CVE-2015-8750 CVE-2016-2050 CVE-2016-2091 CVE-2016-5034 CVE-2016-5036 CVE-2016-5038 CVE-2016-5039 CVE-2016-5042]
e2fsprogs Disable prompts for time skew which is fudged in e2fsck; fix potential corruption of Hurd file systems by e2fsck, pointer bugs that could cause crashes in e2fsck and resize2fs
exim4 Fix cutthrough bug with body lines having a single dot; fix crash on "exim -be '${if crypteq{xxx}{\$aaa}{yes}{no}}'"; improve NEWS file; backport missing upstream patch to actually make $initial_cwd expansion work
file Fix buffer over-write in finfo_open with malformed magic file [CVE-2015-8865]
firegestures New upstream release, compatible with firefox-esr
flashplugin-nonfree update-flashplugin-nonfree: Delete old get-upstream-version.pl from cache
fusionforge Remove dependency on Mediawiki plugin from fusionforge-full metapackage
glibc Fix assertion failure with unconnectable name server addresses (regression introduced by CVE-2015-7547 fix); fix *context functions on s390x; fix a buffer overflow in the glob function [CVE-2016-1234], a stack overflow in nss_dns_getnetbyname_r [CVE-2016-3075], a stack overflow in getaddrinfo function [CVE-2016-3706], a stack overflow in Sun RPC clntudp_call() [CVE-2016-4429]; update from upstream stable branch; fix open and openat functions with O_TMPFILE; fix backtrace hang on armel/armhf, possibly causing a minor denial-of-service vulnerability [CVE-2016-6323]; fix mtr on systems using only IPv6 nameservers
gnome-maps New upstream release; use the Mapbox tile server, instead of the no longer supported MapQuest server
gnome-sudoku Don't generate the same puzzle sequence every time
gnupg gpgv: Tweak default options for extra security; g10: Fix checking key for signature validation
gnupg2 gpgv: Tweak default options for extra security; g10: Fix checking key for signature validation
greasemonkey New upstream release, compatible with firefox-esr
intel-microcode New upstream release
jakarta-jmeter Really install the templates; fix an error with libxstream-java >= 1.4.9 when loading the templates
javatools Return correct architecture string for ppc64el in java-arch.sh
kamailio Fix libssl version check
libbusiness-creditcard-perl Adjust to changes in credit card ranges and processing of various companies
libcss-dom-perl Work around Encode changes included in perl and libencode-perl stable updates
libdatetime-timezone-perl Update included data to 2016e
libdevel-declare-perl Fix breakage caused by change in perl stable update
libnet-ssleay-perl Fix build failure with openssl 1.0.1t-1+deb8u1
libquota-perl Adapt platform detection to work with Linux 4.x
libtool Fix multi-arch co-installability [amd64 i386]
libxml2 Fix a problem unparsing URIs without a host part like qemu:///system; this unbreaks libvirt, libsys-virt-perl and others
linux New upstream stable release
lxc Make sure stretch/sid containers have an init system, after init 1.34 dropped the `Essential: yes` header
mozilla-noscript New upstream release, compatible with firefox-esr
nullmailer Do not keep relayhost data in debconf database longer than strictly needed
open-iscsi Init script: wait a bit after iSCSI devices have appeared, working around a race condition in which dependent devices can appear only after the initial udev settle has returned; open-iscsi-udeb: update initramfs after copying configuration to target system
openssl Fix length check for CRLs; enable asm optimisation for s390x
ovirt-guest-agent Install ovirt-guest-agent.py executable; change owner of log directory to ovirtagent in postinst
piuparts Fix build failure (don't test the current Debian release status, tracking that is distro-info-data's problem)
policykit-1 several bug-fixes; fix heap corruption [CVE-2015-3255], local authenticated denial of service [CVE-2015-4625] and issue with invalid object paths in RegisterAuthenticationAgent [CVE-2015-3218]
publicsuffix New upstream release
pypdf2 Fix infinite loop in readObject() function
python-django Bugfix update to 1.7.11
python2.7 Address StartTLS stripping attack in smtplib [CVE-2016-0772], integer overflow in zipimporter [CVE-2016-5636], HTTP header injection [CVE-2016-5699]
quassel Fix remote DoS in quassel core with invalid handshake data [CVE-2016-4414]
ruby-eventmachine Fix remotely triggerable crash due to FD handling
ruby2.1 DL::dlopen should not open a library with tainted library name in safe mode [CVE-2009-5147]; Fiddle handles should not call functions with tainted function names [CVE-2015-7551]
sendmail Do not abort with an assertion if the connection to an LDAP server is lost; ensure sendmail {client_port} is set correctly on little endian machines
sqlite3 Fix tempdir selection vulnerability [CVE-2016-6153], segfault following heavy SAVEPOINT usage
systemd Use the right timeout for stop processes we fork; don't reset log level to NOTICE if we get quiet on the kernel cmdline; fix prepare priority queue comparison function in sd-event; update links to kernel.org cgroup documentation; don't start console-getty.service when /dev/console is missing; order systemd-user-sessions.service after nss-user-lookup.target and network.target
tabmixplus New upstream release, compatible with firefox-esr
tcpreplay Handle frames of 65535 octets size, add a size check [CVE-2016-6160]
tor Update the set of authority directory servers
tzdata New upstream release; update to 2016e
unbound Init script fixes: add "pidfile" magic comment; call start-stop-daemon with --retry for 'stop' action
util-vserver Rebuild against dietlibc 0.33~cvs20120325-6+deb8u1, fixing insecure default PATH
vorbis-tools Fix large alloca on bad AIFF input to oggenc [CVE-2015-6749], Validate count of channels in the header [CVE-2014-9638 CVE-2014-9639], fix segmentation fault in vcut
wget By default, on server redirects to a FTP resource, use the original URL to get the local file name [CVE-2016-4971]
wpa Security updates relating to invalid characters [CVE-2016-4476, CVE-2016-4477]
yaws Fix HTTP_PROXY cgi env injection [CVE-2016-1000108]
zabbix Fix mysql.size shell command injection in zabbix-agent [CVE-2016-4338]
A complete list of all accepted and rejected packages together with
rationale is on the preparation page for this revision:
<https://release.debian.org/proposed-updates/stable.html>
Removed packages
- ----------------
The following packages will be removed due to circumstances beyond our
control:
Package Reason
minit Unmaintained and outdated
trn Security issues; replaced by trn4
If you encounter any issues, please don't hesitate to get in touch with
the Debian Release Team at "debian-release@lists.debian.org".
-----BEGIN PGP SIGNATURE-----
Version: GnuPG v2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=l+5d
-----END PGP SIGNATURE-----
Reply to: