aboutsummaryrefslogtreecommitdiffstats
path: root/english/News/2008/20081218.wml
blob: a8692f9a13072b907671ae30a93b7c834018d695 (plain) (blame)
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
66
67
68
69
70
71
72
73
74
75
76
77
78
79
80
81
82
83
84
85
86
87
88
89
90
91
92
93
94
95
96
97
98
99
100
101
102
103
104
105
106
107
108
109
110
111
112
113
114
115
116
117
118
119
120
121
122
123
124
125
126
127
128
129
130
131
132
133
134
135
136
137
138
139
140
141
142
143
144
145
146
147
148
149
150
151
152
153
154
155
156
157
158
159
160
161
162
163
164
165
166
167
168
169
170
171
172
173
174
175
176
177
178
179
180
181
182
183
184
185
186
187
188
189
190
191
<define-tag pagetitle>Debian GNU/Linux 4.0 updated</define-tag>
<define-tag release_date>2008-12-18</define-tag>
#use wml::debian::news
# $Id$

<define-tag release>4.0</define-tag>
<define-tag codename>etch</define-tag>
<define-tag revision>4.0r6</define-tag>

<define-tag dsa>
    <tr><td align="center"><a href="$(HOME)/security/%0/dsa-%1">DSA-%1</a></td>
        <td align="center"><:
    my @p = ();
    for my $p (split (/,\s*/, "%2")) {
	push (@p, sprintf ('<a href="https://packages.debian.org/src:%s">%s</a>', $p, $p));
    }
    print join (", ", @p);
:></td><td align="left">%3</td></tr>
</define-tag>

<define-tag correction>
    <tr><td><a href="https://packages.debian.org/src:%0">%0</a></td>              <td>%1</td></tr>
</define-tag>

<define-tag srcpkg><a href="https://packages.debian.org/src:%0">%0</a></define-tag>

<p>The Debian project is pleased to announce the sixth update of its
stable distribution Debian GNU/Linux 4.0 (codename <codename>).  This update
mainly adds corrections for security problems to the stable release,
along with a few adjustment to serious problems.</p>

<p>Please note that this update does not constitute a new version of Debian
GNU/Linux 4.0 but only updates some of the packages included.  There is
no need to throw away 4.0 CDs or DVDs but only to update via an up-to-date
Debian mirror after an installation, to cause any out of date packages to
be updated.</p>

<p>Those who frequently install updates from security.debian.org won't have
to update many packages and most updates from security.debian.org are
included in this update.</p>

<p>New CD and DVD images containing updated packages and the regular
installation media accompanied with the package archive respectively
will be available soon at the regular locations.</p>

<p>Upgrading to this revision online is usually done by pointing the
aptitude (or apt) package tool (see the sources.list(5) manual page) to
one of Debian's many FTP or HTTP mirrors.  A comprehensive list of
mirrors is available at:</p>

<div class="center">
  <a href="$(HOME)/mirror/list">https://www.debian.org/mirror/list</a>
</div>


<h2>Miscellaneous Bugfixes</h2>

<p>This stable update adds several binary updates for various architectures
to packages whose version was not synchronised across all architectures.
It also adds a few important corrections to the following packages:</p>

<table border=0>
<tr><th>Package</th>               <th>Reason</th></tr>

<correction blender                "Sanitise Python's default import path">
<correction devscripts             "Allow current signed changes files">
<correction dpkg                   "Improved symlink handling, reenable no-debsig">
<correction epiphany-browser       "Allow the deletion of certificates">
<correction glibc                  "Keep ld.so in optimised libraries">
<correction graphviz               "Fix potential arbitrary code execution">
<correction libhdate               "Drop binary package libhdate-pascal">
<correction perl                   "Fix Time::HiRes with kernels >= 2.6.22">
<correction postgresql-7.4         "Incorporate bug fix releases up to 7.4.23">
<correction postgresql-8.1         "Incorporate bug fix releases up to 8.1.15">
<correction reportbug              "Support new bugs.debian.org structure">
<correction spamassassin           "Fix for denial of service, remove blacklists">
<correction tdiary                 "Fix a Cross Site Scripting vulnerability">
<correction websvn                 "Fix potential PHP code execution">

</table>

<h2>Security Updates</h2>

<p>This revision adds the following security updates to the stable release.
The Security Team has already released an advisory for each of these
updates:</p>

<table border=0>
<tr><th>Advisory ID</th>  <th>Package</th>    <th>Correction(s)</th></tr>

<dsa 2008 1617          refpolicy               "Incompatible policy">
<dsa 2008 1622          newsx                   "Arbitrary code execution">
<dsa 2008 1635          freetype                "Several vulnerabilities">
<dsa 2008 1656          cupsys                  "Several vulnerabilities">
<dsa 2008 1657          qemu                    "Denial of service">
<dsa 2008 1658          dbus                    "Denial of service">
<dsa 2008 1659          libspf2                 "Potential remote code execution">
<dsa 2008 1660          clamav                  "Denial of service">
<dsa 2008 1661          openoffice.org          "Several vulnerabilities">
<dsa 2008 1662          mysql-dfsg-5.0          "Authorization bypass">
<dsa 2008 1663          net-snmp                "Several vulnerabilities">
<dsa 2008 1665          libcdaudio              "Arbitrary code execution">
<dsa 2008 1666          libxml2                 "Several vulnerabilities">
<dsa 2008 1667          python2.4               "Several vulnerabilities">
<dsa 2008 1668          hf                      "Arbitrary code execution">
<dsa 2008 1669          xulrunner               "Several vulnerabilities">
<dsa 2008 1670          enscript                "Arbitrary code execution">
<dsa 2008 1671          iceweasel               "Several vulnerabilities">
<dsa 2008 1672          imlib2                  "Arbitrary code execution">
<dsa 2008 1673          wireshark               "Several vulnerabilities">
<dsa 2008 1674          jailer                  "Denial of service">
<dsa 2008 1675          phpmyadmin              "Cross-site scripting">
<dsa 2008 1676          flamethrower            "Denial of service">
<dsa 2008 1677          cupsys                  "Arbitrary code execution">
<dsa 2008 1679          awstats                 "Cross-site scripting">
<dsa 2008 1681          linux-2.6.24            "Several vulnerabilities">
<dsa 2008 1682          squirrelmail            "Cross site scripting">
<dsa 2008 1683          streamripper            "Potential code execution">
<dsa 2008 1687          fai-kernels             "Several vulnerabilities">
<dsa 2008 1687          linux-2.6               "Several vulnerabilities">
<dsa 2008 1687          user-mode-linux         "Several vulnerabilities">

</table>

<p>A complete list of all accepted and rejected packages together with
rationale is on the preparation page for this revision:</p>

<div class="center">
  <url "https://release.debian.org/stable/<release>/<revision>/">
</div>

<h2>Removed packages</h2>

<p>The following packages were removed due to circumstances beyond our control:</p>
<table border=0>
<tr><th>Package</th>                    <th>Reason</th></tr>

<correction fpc                         "Copyright infringement">
<correction gearhead                    "Depends on non-free fpc">
<correction imapcopy                   "Depends on non-free fpc">
<correction astrolog                    "Contains potentially undistributable code">
<correction youtube-dl                  "Not suited for stable release">

</table>

<h2>URLs</h2>

<p>The complete lists of packages that have changed with this
release:</p>

<div class="center">
  <url "http://ftp.debian.org/debian/dists/<downcase <codename>>/ChangeLog">
</div>

<p>The current stable distribution:</p>

<div class="center">
  <url "http://ftp.debian.org/debian/dists/stable/">
</div>

<p>Proposed updates to the stable distribution:</p>

<div class="center">
  <url "http://ftp.debian.org/debian/dists/proposed-updates/">
</div>

<p>Stable distribution information (release notes, errata, etc.):</p>

<div class="center">
  <a
  href="$(HOME)/releases/stable/">https://www.debian.org/releases/stable/</a>
</div>

<p>Security announcements and information:</p>

<div class="center">
  <a href="$(HOME)/security/">http://security.debian.org/</a>
</div>

<h2>About Debian</h2>

<p>The Debian Project is an association of Free Software developers who
volunteer their time and effort in order to produce the completely
free operating system Debian GNU/Linux.</p>

<h2>Contact Information</h2>

<p>For further information, please visit the Debian web pages at
<a href="$(HOME)/">https://www.debian.org/</a>, send mail to
&lt;press@debian.org&gt;, or contact the stable release team at
&lt;debian-release@lists.debian.org&gt;.</p>

© 2014-2024 Faster IT GmbH | imprint | privacy policy