aboutsummaryrefslogtreecommitdiffstats
path: root/english/News/2011/20110319.wml
blob: 9bdaba42220e3ae52403a7d9a0519d1227012c6d (plain) (blame)
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
66
67
68
69
70
71
72
73
74
75
76
77
78
79
80
81
82
83
84
85
86
87
88
89
90
91
92
93
94
95
96
97
98
99
100
101
102
103
104
105
106
107
108
109
110
111
112
113
114
115
116
117
118
119
120
121
122
123
124
125
126
127
128
129
130
131
132
133
134
135
136
137
138
139
140
141
142
143
144
145
146
147
148
149
150
151
152
153
154
155
156
157
158
159
160
161
162
163
164
165
166
167
168
169
170
171
172
173
174
175
176
177
178
179
180
181
182
183
184
185
186
187
188
189
190
191
192
193
194
195
196
197
198
199
200
201
202
203
204
205
206
207
208
209
210
211
212
213
214
215
216
217
218
219
220
221
222
223
224
225
226
227
228
229
230
231
232
233
234
235
236
237
238
239
240
241
242
243
244
245
246
247
248
249
<define-tag pagetitle>Updated Debian 6.0: 6.0.1 released</define-tag>
<define-tag release_date>2011-03-19</define-tag>
#use wml::debian::news
# $Id:

<define-tag release>6.0</define-tag>
<define-tag codename>squeeze</define-tag>
<define-tag revision>6.0.1</define-tag>

<define-tag dsa>
    <tr><td align="center"><a href="$(HOME)/security/%0/dsa-%1">DSA-%1</a></td>
        <td align="center"><:
    my @p = ();
    for my $p (split (/,\s*/, "%2")) {
	push (@p, sprintf ('<a href="https://packages.debian.org/src:%s">%s</a>', $p, $p));
    }
    print join (", ", @p);
:></td><td align="left">%3</td></tr>
</define-tag>

<define-tag correction>
    <tr><td><a href="https://packages.debian.org/src:%0">%0</a></td>              <td>%1</td></tr>
</define-tag>

<define-tag srcpkg><a href="https://packages.debian.org/src:%0">%0</a></define-tag>

<p>The Debian project is pleased to announce the first update of its
stable distribution Debian 6.0 (codename <q><codename></q>).
This update mainly adds corrections for security problems to the stable release,
along with a few adjustment to serious problems.</p>

<p>Please note that this update does not constitute a new version of Debian
6.0 but only updates some of the packages included.  There is
no need to throw away 6.0 CDs or DVDs but only to update via an
up-to-date Debian mirror after an installation, to cause any out of date
packages to be updated.</p>

<p>Those who frequently install updates from security.debian.org won't have
to update many packages and most updates from security.debian.org are
included in this update.</p>

<p>New CD and DVD images containing updated packages and the regular
installation media accompanied with the package archive respectively will
be available soon at the regular locations.</p>

<p>Upgrading to this revision online is usually done by pointing the
aptitude (or apt) package tool (see the sources.list(5) manual page) to
one of Debian's many FTP or HTTP mirrors.  A comprehensive list of
mirrors is available at:</p>

<div class="center">
  <a href="$(HOME)/mirror/list">https://www.debian.org/mirror/list</a>
</div>

<h2>Miscellaneous Bugfixes</h2>

<p>This stable update adds a few important corrections to the following
packages:</p>
<table border=0>
<tr><th>Package</th>               <th>Reason</th></tr>
<correction apt-dater                        "Correct syntax of default configuration file">
<correction base-files                       "Update /etc/debian_version for the point release">
<correction cdebconf                         "Allow the GTK frontend to be used in a window managed environment">
<correction clamav                           "New upstream bugfix release">
<correction clive                            "Adapt for youtube.com changes">
<correction cmake                            "Rebuild upstream tarball to remove undistributable Windows build systems files">
<correction console-setup                    "Fix Swiss German, Bulgarian and Swedish keymaps in the installer">
<correction cryptsetup                       "Install cryptkeyctl initramfs hook; lukadmin: avoid possible race conditions by invoking udevadm settle">
<correction dbconfig-common                  "Fix version sorting logic bug on upgrade files in postinst">
<correction debian-reference                 "Refer to squeeze-updates rather than volatile; fix URL for Debian Mirror Checker">
<correction debootstrap                      "Fix --private-key and ar usage">
<correction deluge                           "Fix hang on quit">
<correction desktop-base                     "Fix plymouth output in dual-screen configurations">
<correction devscripts                       "Make squeeze the default backports target; add wheezy{,-ignore} tags">
<correction eclipse                          "Fix XSS in help browser application">
<correction exuberant-ctags                  "Use memmove rather than strcpy on overlapping strings">
<correction ganeti                           "Don't break permissions of /var/lock when running <q>gnt-node add</q>">
<correction gdm3                             "Handle del{group,user} failures gracefully; fix grep usage; use correct names for UTF-8 locales">
<correction gedit                            "Fix important mistake in the Brazilian Portuguese translation">
<correction git                              "Fix escaping in gitweb, new add.ignoreErrors variable">
<correction gnome-screensaver                "Disable non-functional libnotify support">
<correction gnumed-client                    "Install translations to the correct location">
<correction grub-installer                   "Set debconf title to avoid reusing a previous one">
<correction ia32-libs                        "Refresh packages from stable and proposed-updates">
<correction ia32-libs-core                   "Refresh packages from stable and proposed-updates">
<correction ia32-libs-gtk                    "Refresh packages from stable and proposed-updates">
<correction installation-guide               "Update content for squeeze">
<correction katoob                           "Fix crash when setting tooltips">
<correction kde4libs                         "Add a kconf_update script to migrate away from old KDE3 icon themes">
<correction kdebase-workspace                "Fix random but common krunner crashes">
<correction kernel-wedge                     "Add hid-cherry and sdhci_pci modules">
<correction kfreebsd-8                       "Fix local DoS in TCP stack; emulate Catalan's middle-dot l/L characters by ASCII l/L">
<correction kgb-bot                          "Fix version check to allow possible future security updates">
<correction krusader                         "Properly fix problems terminating the application">
<correction libapache-mod-jk                 "Ease upgrades from lenny by disabling SOCK_CLOEXEC use">
<correction libemail-mime-createhtml-perl    "Add missing dependency on libfile-policy-perl">
<correction libvirt                          "Make init script <q>status</q> target exit statuses LSB-compliant to assist monitoring">
<correction linux-2.6                        "Several fixes">
<correction linux-kernel-di-amd64-2.6        "Rebuild against linux-2.6 2.6.32-31">
<correction linux-kernel-di-armel-2.6        "Rebuild against linux-2.6 2.6.32-31">
<correction linux-kernel-di-i386-2.6         "Rebuild against linux-2.6 2.6.32-31">
<correction linux-kernel-di-ia64-2.6         "Rebuild against linux-2.6 2.6.32-31">
<correction linux-kernel-di-mips-2.6         "Rebuild against linux-2.6 2.6.32-31">
<correction linux-kernel-di-mipsel-2.6       "Rebuild against linux-2.6 2.6.32-31">
<correction linux-kernel-di-powerpc-2.6      "Rebuild against linux-2.6 2.6.32-31">
<correction linux-kernel-di-s390-2.6         "Rebuild against linux-2.6 2.6.32-31">
<correction linux-kernel-di-sparc-2.6        "Rebuild against linux-2.6 2.6.32-31">
<correction magpierss                        "Fix cross-site scripting vulnerability (CVE-2011-0740)">
<correction mcabber                          "Fix crash, segfault, command-line corruption and FD leaks">
<correction mediawiki                        "Fix a CSS injection vulnerability">
<correction mediawiki-extensions             "PHP 5.3 compatibility fixes for the confirmedit plugin">
<correction nautilus                         "Fix crash in nautilus_file_peek_display_name()">
<correction network-manager                  "Only comment out exact matches in /etc/network/interfaces; normalise keys in ifupdown parser; correctly handle device removal">
<correction ocrodjvu                         "Fix upside-down generation of hocr data">
<correction ocsigen                          "Add missing dependencies on lib{lwt-ssl,ocsigen-xhtml}-ocaml-dev">
<correction pdftk                            "Support prompting for both owner and user passwords; allow filenames to start with <q>odd</q>, <q>even</q> or <q>end</q>">
<correction pulseaudio                       "Fix pacmd hanging in poll() when reading from stdin very early">
<correction python-defaults                  "Use full path to Python interpreters in pycompile to ease lenny to squeeze upgrades">
<correction samba                            "Missing input sanitising">
<correction sobby                            "Ensure session files are writable by the sobby user">
<correction sudo                             "Resolve interoperability issues between -H and HOME in env_keep">
<correction sun-java6                        "Several security fixes">
<correction ttf-liberation                   "Correctly flag Liberation Mono as monospaced">
<correction tzdata                           "New upstream release; update Chilean DST">
<correction usb-modeswitch-data              "Fix modeswitching lines for Huawei devices; add support for more devices">
<correction why                              "Mark Squeeze's Coq version as a compatible prover">
<correction xorg-server                      "Fix crashes with MCE remotes; fix rotation [nvidia]; drop support for XF86Config-4">
<correction xserver-xorg-video-intel         "Fix null pointer dereference and SDL-related issues">
</table>

<h2>Debian Installer</h2>

<p>The Debian Installer has been updated in this point release to
correct the following issues (among others):</p>

<ul>
 <li>the activation of squeeze-updates on installations without a
  network mirror caused a failure to be shown,</li>
 <li>the Swiss German, Bulgarian and Swedish keyboard layouts were
  unusable during installation and</li>
 <li>wait longer for disks to initialize.</li>
</ul>

<p>Furthermore it now supports installation on the following hardware:</p>

<ul>
 <li>QNAP TS-112, TS-212 and TS-412 (new)</li>
 <li>QNAP TS-419P+ (new)</li>
 <li>Buffalo Linkstation LiveV3 (new)</li>
 <li>Buffalo Linkstation Mini (new)</li>
 <li>iBook G4 (restored)</li>
 <li>Cobalt (restored)</li>
 <li>SPARC hardware (restored functionality using CD-ROM installation media and atyfb graphics cards)</li>
</ul>

<p>The kernel image used by the installer has been updated to incorporate a
number of important and security-related fixes together with support for
additional hardware.</p>


<h2>Security Updates</h2>


<p>This revision adds the following security updates to the stable
release. The Security Team has already released an advisory for each of
these updates:</p>

<table border=0>
<tr><th>Advisory ID</th>  <th>Package</th>    <th>Correction(s)</th></tr>


<dsa 2011 2157 postgresql-8.4          "Buffer overflow">
<dsa 2011 2158 cgiirc                  "Cross-site scripting flaw">
<dsa 2011 2160 tomcat6                 "Several issues">
<dsa 2011 2162 openssl                 "Invalid memory access">
<dsa 2011 2163 python-django           "Cross-site scripting and CSRF protection improvements">
<dsa 2011 2163 dajaxice                "Compatibility fix for CSRF protection improvements">
<dsa 2011 2164 shadow                  "Missing input sanitization">
<dsa 2011 2166 chromium-browser        "Several vulnerabilities">
<dsa 2011 2167 phpmyadmin              "SQL injection">
<dsa 2011 2168 openafs                 "Several vulnerabilities">
<dsa 2011 2169 telepathy-gabble        "Missing input validation">
<dsa 2011 2170 mailman                 "Several vulnerabilities">
<dsa 2011 2171 asterisk                "Buffer overflow">
<dsa 2011 2173 pam-pgsql               "Buffer overflow">
<dsa 2011 2174 avahi                   "Denial of service">
<dsa 2011 2175 samba                   "Missing input sanitising">
<dsa 2011 2177 pywebdav                "SQL injection">
<dsa 2011 2178 pango1.0                "NULL pointer dereference">
<dsa 2011 2180 iceape                  "Several vulnerabilities">
<dsa 2011 2182 logwatch                "Remote code execution">
<dsa 2011 2184 isc-dhcp                "Denial of service">
<dsa 2011 2185 proftpd-dfsg            "Integer overflow">
<dsa 2011 2186 iceweasel               "Several vulnerabilities">
<dsa 2011 2187 icedove                 "Several vulnerabilities">
<dsa 2011 2189 chromium-browser        "Several vulnerabilities">
<dsa 2011 2190 wordpress               "Several vulnerabilities">
<dsa 2011 2192 chromium-browser        "Several vulnerabilities">

</table>

<h2>URLs</h2>

<p>The complete lists of packages that have changed with this
revision:</p>

<div class="center">
  <url "http://ftp.debian.org/debian/dists/<downcase <codename>>/ChangeLog">
</div>

<p>The current stable distribution:</p>

<div class="center">
  <url "http://ftp.debian.org/debian/dists/stable/">
</div>

<p>Proposed updates to the stable distribution:</p>

<div class="center">
  <url "http://ftp.debian.org/debian/dists/proposed-updates">
</div>

<p>Stable distribution information (release notes, errata etc.):</p>

<div class="center">
  <a
  href="$(HOME)/releases/stable/">https://www.debian.org/releases/stable</a>
</div>

<p>Security announcements and information:</p>

<div class="center">
  <a href="$(HOME)/security/">http://security.debian.org/</a>
</div>


<h2>About Debian</h2>

<p>The Debian Project is an association of Free Software developers who
volunteer their time and effort in order to produce the completely free
operating system Debian.</p>


<h2>Contact Information</h2>

<p>For further information, please visit the Debian web pages at <a
href="$(HOME)/">https://www.debian.org/</a>, send mail to
&lt;press@debian.org&gt;, or contact the stable release team at
&lt;debian-release@lists.debian.org&gt;.</p>

© 2014-2024 Faster IT GmbH | imprint | privacy policy