[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

[debian-users:54278] Fw: Debian GNU/Linux 5.0 updated



 やまねです。
 安定版 5.0 "lenny" のアップデートがあったようです。


Begin forwarded message:

Date: Sat, 26 Jun 2010 18:05:45 +0200
From: Joey Schulze <joey@xxxxxxxxxxxx>
To: debian-announce@lists.debian.org
Subject: Debian GNU/Linux 5.0 updated


-------------------------------------------------------------------------
The Debian Project                                 http://www.debian.org/
Debian GNU/Linux 5.0 updated                             press@debian.org
June 26th, 2010                  http://www.debian.org/News/2010/20100626
-------------------------------------------------------------------------

Debian GNU/Linux 5.0 updated

The Debian project is pleased to announce the fifth update of its stable
distribution Debian GNU/Linux 5.0 (codename "lenny").  This update mainly
adds corrections for security problems to the stable release, along with
a few adjustment to serious problems.

Please note that this update does not constitute a new version of Debian
GNU/Linux 5.0 but only updates some of the packages included.  There is
no need to throw away 5.0 CDs or DVDs but only to update via an up-to-
date Debian mirror after an installation, to cause any out of date
packages to be updated.

Those who frequently install updates from security.debian.org won't have
to update many packages and most updates from security.debian.org are
included in this update.

New CD and DVD images containing updated packages and the regular
installation media accompanied with the package archive respectively will
be available soon at the regular locations.

Upgrading to this revision online is usually done by pointing the
aptitude (or apt) package tool (see the sources.list(5) manual page) to
one of Debian's many FTP or HTTP mirrors.  A comprehensive list of
mirrors is available at:

    <http://www.debian.org/distrib/ftplist>


Miscellaneous Bugfixes
----------------------

This stable update adds a few important corrections to the following
packages:

    Package                          Reason

    alien-arena                      Fix a buffer overflow and a denial of service
    apache2                          Add missing psmisc dependency; fix memory leak in brigade cleanup
    apache2-mpm-itk                  Ensure child processes get correctly reaped on reload
    apr                              Set FD_CLOEXEC on file descriptors to avoid potential leaks
    apt                              Allow Files sections to contain more than 999 characters
    base-files                       Update /etc/debian_version for the point release
    cpio                             Fix buffer overflow in rmt_read__
    dia2code                         Fix segfault parsing large files
    gtk+2.0                          Fix hang when printing large documents
    libapache-dbi-perl               Fix loading of module from Apache startup files
    libapache2-mod-perl2             Fix XSS in Apache2::Status
    libjavascript-perl               Fix segfault when calling non-existent function
    libjson-ruby                     Fix parser DoS and use libjs-prototype rather than embedding the library
    liblog-handler-perl              Add missing dependency on libuniversal-require-perl
    libmediawiki-perl                Update to match mediawiki changes
    libnamespace-clean-perl          Add missing dependency on libscope-guard-perl
    libnet-smtp-server-perl          Add missing dependency on libnet-dns-perl
    libxext                          Ensure display lock is held before calling XAllocID
    linux-2.6                        Several fixes and driver updates
    mailman                          Don't add multiple Mime-Version headers
    mpg123                           Allow modules to be located again (broken by libltdl security fix)
    nano                             Fix symlink attack and arbitrary file ownership change issue
    nfs-utils                        Update test for NFS kernel server support in init script to support partial upgrades
    nut                              Move library to /lib to allow power-down with separated /usr
    open-iscsi                       Fix temporary file vulnerability
    openssl                          Check return value of bn_wexpand() (CVE-2009-3245)
    openttd                          Fix several DoS and crash vulnerabilities
    php5                             Fix overflows, add missing sybase aliases, improve e-mail validation
    poppler                          Fix remote code execution via crafted PDF files
    postgresql-8.3                   Several vulnerabilities
    pyftpd                           Security fixes - disable default users, anonymous access and logging to /tmp
    python-support                   Use sane default umask in update-python-modules
    request-tracker3.6               Fix login problem introduced in security update
    samba                            Fix memory leaks with domain trust passwords; fix interdomain trust with Windows 2008 r2 servers
    slim                             Make magic cookie less predictable; don't save screenshots in /tmp
    sun-java5                        Update to new upstream release to fix security issues
    sun-java6                        Update to new upstream release to fix security issues
    tar                              Security fix in rmt
    texlive-bin                      Security fixes in dvips
    tla                              Fix DoS in embedded expat library
    tzdata                           Update timezone data
    usbutils                         Update USB ID list
    user-mode-linux                  Rebuild against linux-2.6 2.6.26-24
    wordpress                        Fix DoS
    xerces-c2                        Fix DoS attack with nested DTDs
    xmonad-contrib                   Fix installability on 64-bit architectures
    xserver-xorg-input-elographics   Prevent X server hangs when using the touchscreen
    xserver-xorg-video-intel         Add support for ASUS eeetop LVDS output

Note that due to problems with the package build process, updated sun-java5
and sun-java6 packages for the ia64 architecture are not included in this
point release.  These packages will be provided in proposed-updates as soon
as they are available and included in a future point release.


Kernel Updates
--------------

The kernel images included in this point release incorporate a number of
important and security-related fixes together with support for additional
hardware.

On the amd64 and i386 architectures, support has been re-introduced for
automatically running the lilo bootloader when a kernel image is added,
updated or removed in order to ensure that this is correctly registered
with the bootloader.


Debian Installer
----------------

The Debian Installer has been updated in this point release to correct
an issue with the display of the "BIOS boot area" partitioner option
when using GPT partitions and to update the list of available mirror
servers for package installation.

The kernel image used by the installer has been updated to incorporate a
number of important and security-related fixes together with support for
additional hardware.


Security Updates
----------------

This revision adds the following security updates to the stable release.
The Security Team has already released an advisory for each of these
updates:

    Advisory ID    Package                 Correction(s)

    DSA 1841       git-core                Denial of service
    DSA 1955       network-manager-applet  Information disclosure
    DSA 1973       glibc                   Information disclosure
    DSA 1977       python2.4               Several vulnerabilities
    DSA 1977       python2.5               Several vulnerabilities
    DSA 1980       ircd-ratbox             Arbitrary code execution
    DSA 1981       maildrop                Privilege escalation
    DSA 1982       hybserv                 Denial of service
    DSA 1983       wireshark               Several vulnerabilities
    DSA 1984       libxerces2-java         Denial of service
    DSA 1985       sendmail                Insufficient input validation
    DSA 1986       moodle                  Several vulnerabilities
    DSA 1987       lighttpd                Denial of service
    DSA 1988       qt4-x11                 Several vulnerabilities
    DSA 1989       fuse                    Denial of service
    DSA 1990       trac-git                Code execution
    DSA 1991       squid3                  Denial of service
    DSA 1992       chrony                  Denial of service
    DSA 1993       otrs2                   SQL injection
    DSA 1994       ajaxterm                Session hijacking
    DSA 1995       openoffice.org          Several vulnerabilities
    DSA 1996       linux-2.6               Several vulnerabilities
    DSA 1997       mysql-dfsg-5.0          Several vulnerabilities
    DSA 1998       kdelibs                 Arbitrary code execution
    DSA 1999       xulrunner               Several vulnerabilities
    DSA 2000       ffmpeg-debian           Several vulnerabilities
    DSA 2001       php5                    Multiple vulnerabilities
    DSA 2002       polipo                  Denial of service
    DSA 2004       samba                   Several vulnerabilities
    DSA 2006       sudo                    Several vulnerabilities
    DSA 2007       cups                    Arbitrary code execution
    DSA 2008       typo3-src               Several vulnerabilities
    DSA 2009       tdiary                  Cross-site scripting
    DSA 2010       kvm                     Several vulnerabilities
    DSA 2011       dpkg                    Path traversal
    DSA 2012       user-mode-linux         Several vulnerabilities
    DSA 2012       linux-2.6               Several vulnerabilities
    DSA 2013       egroupware              Several vulnerabilities
    DSA 2014       moin                    Several vulnerabilities
    DSA 2015       drbd8                   Privilege escalation
    DSA 2015       linux-modules-extra-2.6 Privilege escalation
    DSA 2016       drupal6                 Several vulnerabilities
    DSA 2017       pulseaudio              Insecure temporary directory
    DSA 2018       php5                    Null pointer dereference
    DSA 2019       pango1.0                Denial of service
    DSA 2020       ikiwiki                 Cross-site scripting
    DSA 2021       spamass-milter          Missing input sanitization
    DSA 2022       mediawiki               Several vulnerabilities
    DSA 2023       curl                    Arbitrary code execution
    DSA 2024       moin                    Cross-site scripting
    DSA 2025       icedove                 Several vulnerabilities
    DSA 2026       netpbm-free             Denial of service
    DSA 2027       xulrunner               Several vulnerabilities
    DSA 2028       xpdf                    Several vulnerabilities
    DSA 2029       imlib2                  Arbitrary code execution
    DSA 2030       mahara                  SQL injection
    DSA 2031       krb5                    Denial of service
    DSA 2032       libpng                  Several vulnerabilities
    DSA 2033       ejabberd                Denial of service
    DSA 2034       phpmyadmin              Several vulnerabilities
    DSA 2035       apache2                 Several vulnerabilities
    DSA 2036       jasper                  Denial of service
    DSA 2037       kdebase                 Privilege escalation
    DSA 2038       pidgin                  Denial of service
    DSA 2039       cacti                   Missing input sanitising
    DSA 2040       squidguard              Several vulnerabilities
    DSA 2041       mediawiki               Cross-site request forgery
    DSA 2042       iscsitarget             Arbitrary code execution
    DSA 2044       mplayer                 Arbitrary code execution
    DSA 2045       libtheora               Arbitrary code execution
    DSA 2046       phpgroupware            Several vulnerabilities
    DSA 2047       aria2                   Directory traversal
    DSA 2048       dvipng                  Arbitrary code execution
    DSA 2049       barnowl                 Arbitrary code execution
    DSA 2050       postgresql-8.3          Several vulnerabilities
    DSA 2052       krb5                    Denial of service
    DSA 2053       linux-2.6               Several issues
    DSA 2054       bind9                   Cache poisoning
    DSA 2055       openoffice.org          Arbitrary code execution
    DSA 2056       zonecheck               Cross-site scripting
    DSA 2057       mysql-dfsg-5.0          Several vulnerabilities
    DSA 2058       pcsc-lite               Privilege escalation
    DSA 2058       glibc                   Several vulnerabilities
    DSA 2060       cacti                   SQL injection
    DSA 2062       sudo                    Missing input sanitization
    DSA 2063       pmount                  Denial of service


Removed packages
----------------

The following packages were removed due to circumstances beyond our
control:

    Package             Reason

    eclipse             incompatible with stable's xulrunner; not easily fixable
    eclipse-cdt         depends on removed eclipse
    eclipse-nls-sdk     depends on removed eclipse


URLs
----

The complete list of packages that have changed with this revision:

  <http://ftp.debian.org/debian/dists/lenny/ChangeLog>

The current stable distribution:

  <http://ftp.debian.org/debian/dists/stable>

Proposed updates to the stable distribution:

  <http://ftp.debian.org/debian/dists/proposed-updates>

Stable distribution information (release notes, errata etc.):

  <http://www.debian.org/releases/stable/>

Security announcements and information:

  <http://www.debian.org/security/>


About Debian
------------

The Debian Project is an association of Free Software developers who
volunteer their time and effort in order to produce the completely free
operating systems Debian GNU/Linux.


Contact Information
-------------------

For further information, please visit the Debian web pages at
<http://www.debian.org/>, send mail to <press@debian.org>, or contact the
stable release team at <debian-release@lists.debian.org>


-- 
To UNSUBSCRIBE, email to debian-announce-REQUEST@lists.debian.org
with a subject of "unsubscribe". Trouble? Contact listmaster@lists.debian.org
Archive: http://lists.debian.org/20100626160545.GK31750@xxxxxxxxxxxxxxxxxxxxxxxxxxx



-- 
Regards,

 Hideki Yamane     henrich @ debian.or.jp/org
 http://wiki.debian.org/HidekiYamane