proudly powered by 3dfxzone.it
News Headlines Ricerca

Release Notes - Debian 6.0.6

Condividi su Facebook Condividi su Twitter Condividi su WhatsApp Condividi su reddit

Debian 6.0.6

The Debian project is pleased to announce the sixth update of its
stable distribution Debian 6.0 (codename "squeeze"). This update
mainly adds corrections for security problems to the stable release,
along with a few adjustments for serious problems. Security advisories
were already published separately and are referenced where available.

Please note that this update does not constitute a new version of
Debian 6.0 but only updates some of the packages included. There is no
need to throw away 6.0 CDs or DVDs but only to update via an up-to-date
Debian mirror after an installation, to cause any out of date packages
to be updated.

Those who frequently install updates from security.debian.org won't
have to update many packages and most updates from security.debian.org
are included in this update.

New installation media and CD and DVD images containing updated
packages will be available soon at the regular locations.

Upgrading to this revision online is usually done by pointing the
aptitude (or apt) package tool (see the sources.list(5) manual page) to
one of Debian's many FTP or HTTP mirrors. A comprehensive list of
mirrors is available at:

<http://www.debian.org/mirror/list>

Miscellaneous Bugfixes
----------------------

This stable update adds a few important corrections to the following
packages:


Package Reason
alpine Fix crash in embedded UW-IMAP copy
apache2 mod_negotiation - fix CVE-2012-2687;
mod_cache - don't cache partial
connections; read timeouts should
result in a 408
automake1.10 Fix CVE-2012-3386
automake1.11 Fix CVE-2012-3386
automake1.7 Fix CVE-2012-3386
automake1.9 Fix CVE-2012-3386
base-files Update /etc/debian_version for the point
release
checkgmail Fix GMail authentication issues
clamav New upstream release
debian-archive-keyring Add wheezy stable and archive signing
keys
dpkg Ensure a reliable unpack on SELinux
systems
eglibc Really enable
patches/any/cvs-dlopen-tls.diff;
fix FORTIFY_SOURCE format string
protection bypass;
fix a DoS in RPC implementation
emesene Update contact end-point to
local-bay.contacts.msn.com
geshi Fix 'Local File Inclusion Vulnerability
in contrib script'
gosa Security fix (missing escaping)
ia32-libs Update packages
libconfig-inifiles-perl Fix insecure temporary file use
libgc Check for integer overflow in internal
malloc and calloc routines
libmtp Fix device flags for some devices; add
support for new devices
libxslt Fix CVE-2011-1202, CVE-2011-3970,
CVE-2012-2825
links2 Security fixes
linux-2.6 DRM fixes; leap second fix; security
fixes; various driver fixes
linux-kernel-di-amd64-2.6 Rebuild against linux-2.6 2.6.32-46
linux-kernel-di-armel-2.6 Rebuild against linux-2.6 2.6.32-46
linux-kernel-di-i386-2.6 Rebuild against linux-2.6 2.6.32-46
linux-kernel-di-ia64-2.6 Rebuild against linux-2.6 2.6.32-46
linux-kernel-di-mips-2.6 Rebuild against linux-2.6 2.6.32-46
linux-kernel-di-mipsel-2.6 Rebuild against linux-2.6 2.6.32-46
linux-kernel-di-powerpc-2.6 Rebuild against linux-2.6 2.6.32-46
linux-kernel-di-s390-2.6 Rebuild against linux-2.6 2.6.32-46
linux-kernel-di-sparc-2.6 Rebuild against linux-2.6 2.6.32-46
lockfile-progs Ensure the correct PID is used when
creating lockfiles
mysql-mmm Add dependency on libpath-class-perl
network-manager Stop allowing ad-hoc WPA networks to
be created; kernel bugs mean they get
created as open networks
nss-pam-ldapd Support larger gecos values;
reliability fixes
nvidia-graphics-drivers Fix information leak in the kernel
module; fix arbitrary memory access
vulnerability; fix local privilege
escalation through VGA window
manipulation
nvidia-graphics-modules Rebuild against 195.36.31-6squeeze1
kernel modules for security fixes;
rebuild to fix CVE-2012-4225
php-memcached Fix session.gc_maxlifetime handling
plymouth Fix the init script to not fail when
the package is removed
policyd-weight Remove rfc-ignorant.org RBLs (due to
upcoming shutdown) and
rbl.ipv6-world.net
postgresql-common Do not remove the PID file after
SIGKILLing the postmaster in the
last-ditch
powertop Fix segfault on newer kernels with
large config files
publican Add dependency and build-dependency on
libio-string-perl
rstatd Support Linux 3.x kernels
spip Fix base name disclosure; security
fixes
tor New upstream; fix TLS 1.1/1.2
renegotiation with openssl 1.0.1;
fix potential DOS; fix two crashes and
an information disclosure issue
ttb Add dependency on python-glade2
vte Fix a memory exhaustion vulnerability
wims Fix installation problem
wireshark Fix crashes in ANSI A detector and
pcap / pcap-ng parsers
xserver-xorg-video-intel UXA/glyphs: fall back instead of
crashing on large strings
yaws Fix RNG strength; fix mail config
loading

Security Updates
----------------

This revision adds the following security updates to the stable
release. The Security Team has already released an advisory for each of
these updates:


Advisory ID Package Correction(s)
DSA-2457 iceweasel Regression fix
DSA-2458 iceape Regression fix
DSA-2465 php5 Multiple issues
DSA-2466 rails Cross site scripting
DSA-2467 mahara Insecure defaults
DSA-2468 libjakarta-poi-java Unbounded memory allocation
DSA-2470 wordpress Multiple issues
DSA-2471 ffmpeg Multiple issues
DSA-2472 gridengine Privilege escalation
DSA-2473 openoffice.org Buffer overflow
DSA-2474 ikiwiki Cross-site scripting
DSA-2475 openssl Integer underflow
DSA-2476 pidgin-otr Format string vulnerability
DSA-2477 sympa Authorization bypass
DSA-2478 sudo Parsing error
DSA-2479 libxml2 Off-by-one
DSA-2480 request-tracker3.8 Regression
DSA-2481 arpwatch Fails to drop supplementary groups
DSA-2482 libgdata No verification of TLS certificates against system root CA
DSA-2483 strongswan Authentication bypass
DSA-2484 nut Denial of service
DSA-2485 imp4 Cross site scripting
DSA-2486 bind9 Denial of service
DSA-2487 openoffice.org Buffer overflow
DSA-2488 iceweasel Multiple issues
DSA-2489 iceape Multiple issues
DSA-2490 nss Denial of service
DSA-2491 postgresql-8.4 Multiple issues
DSA-2492 php5 Buffer overflow
DSA-2493 asterisk Denial of service
DSA-2494 ffmpeg Multiple issues
DSA-2495 openconnect Buffer overflow
DSA-2497 quagga Denial of service
DSA-2498 dhcpcd Remote stack overflow
DSA-2499 icedove Multiple issues
DSA-2500 mantis Multiple issues
DSA-2501 xen Multiple issues
DSA-2502 python-crypto Programming error
DSA-2503 bcfg2 Shell command injection
DSA-2504 libspring-2.5-java Information disclosure
DSA-2505 zendframework Information disclosure
DSA-2506 libapache-mod-security Modsecurity bypass
DSA-2507 openjdk-6 Multiple issues
DSA-2508 kfreebsd-8 Privilege escalation
DSA-2509 pidgin Remote code execution
DSA-2510 extplorer Cross-site request forgery
DSA-2511 puppet Multiple issues
DSA-2512 mono Missing input sanitising
DSA-2513 iceape Multiple issues
DSA-2514 iceweasel Multiple issues
DSA-2515 nsd3 Null pointer dereference
DSA-2516 isc-dhcp Denial of service
DSA-2517 bind9 Denial of service
DSA-2518 krb5 Denial of service
DSA-2519 isc-dhcp Denial of service
DSA-2520 openoffice.org Multiple heap-based buffer overflows
DSA-2521 libxml2 Integer overflows
DSA-2522 fckeditor Cross site scripting
DSA-2523 globus-gridftp-server Programming error
DSA-2524 openttd Multiple issues
DSA-2525 expat Multiple issues
DSA-2526 libotr Buffer overflow
DSA-2527 php5 Multiple issues
DSA-2528 icedove Multiple issues
DSA-2529 python-django Multiple issues
DSA-2530 rssh Shell command injection
DSA-2531 xen Denial of service
DSA-2532 libapache2-mod-rpaf Denial of service
DSA-2533 pcp Multiple issues
DSA-2534 postgresql-8.4 Multiple issues
DSA-2535 rtfm Cross-site scripting
DSA-2536 otrs2 Cross-site scripting
DSA-2537 typo3-src Multiple issues
DSA-2538 moin Privilege escalation
DSA-2539 zabbix SQL injection
DSA-2540 mahara Cross-site scripting
DSA-2541 beaker Information disclosure
DSA-2542 qemu-kvm Multiple issues
DSA-2543 xen-qemu-dm-4.0 Multiple issues
DSA-2544 xen Denial of service
DSA-2545 qemu Multiple issues
DSA-2546 freeradius Code execution
DSA-2547 bind9 Improper assert
DSA-2548 tor Multiple issues
DSA-2549 devscripts Multiple issues

Debian Installer
----------------

The installer has been rebuilt to include the fixes incorporated into
stable by the point release.

Removed packages
----------------
The following packages were removed due to circumstances beyond our
control:


Package Reason
blockade Non-distributable data files
kcheckgmail Unmaintained; broken by Google changes
libtrash Unmaintained; broken

URLs
----
The complete lists of packages that have changed with this revision:

<http://ftp.debian.org/debian/dists/squeeze/ChangeLog>

The current stable distribution:

<http://ftp.debian.org/debian/dists/stable/>

Proposed updates to the stable distribution:

<http://ftp.debian.org/debian/dists/proposed-updates>

stable distribution information (release notes, errata etc.):

<http://www.debian.org/releases/stable/>

Security announcements and information:

<http://security.debian.org/>

About Debian
------------
The Debian Project is an association of Free Software developers who
volunteer their time and effort in order to produce the completely free
operating system Debian.

Description Download

Dimensione: N/A Annuncio

Tipologia: Applicazione Indice Altre Applicazioni


Versione per desktop di unixzone.it


Copyright 2024 - unixzone.it - E' vietata la riproduzione del contenuto informativo e grafico. Note Legali. Privacy