2008年12月19日 星期五 13:43
---------- Forwarded message ---------- From: Joey Schulze <joey at infodrom.org> Date: Thu, Dec 18, 2008 at 7:18 PM Subject: Debian GNU/Linux 4.0 updated To: Debian Announcements <debian-announce at lists.debian.org> ------------------------------------------------------------------------ The Debian Project http://www.debian.org/ Debian GNU/Linux 4.0 updated press at debian.org December 18th, 2008 http://www.debian.org/News/2008/20081218 ------------------------------------------------------------------------ Debian GNU/Linux 4.0 updated The Debian project is pleased to announce the sixth update of its stable distribution Debian GNU/Linux 4.0 (codename "etch"). This update mainly adds corrections for security problems to the stable release, along with a few adjustment to serious problems. Please note that this update does not constitute a new version of Debian GNU/Linux 4.0 but only updates some of the packages included. There is no need to throw away 4.0 CDs or DVDs but only to update via an up-to-date Debian mirror after an installation, to cause any out of date packages to be updated. Those who frequently install updates from security.debian.org won't have to update many packages and most updates from security.debian.org are included in this update. New CD and DVD images containing updated packages and the regular installation media accompanied with the package archive respectively will be available soon at the regular locations. Upgrading to this revision online is usually done by pointing the aptitude (or apt) package tool (see the sources.list(5) manual page) to one of Debian's many FTP or HTTP mirrors. A comprehensive list of mirrors is available at: <http://www.debian.org/distrib/ftplist> Miscellaneous Bugfixes ---------------------- This stable update adds several binary updates for various architectures to packages whose version was not synchronised across all architectures. It also adds a few important corrections to the following packages: Package Reason blender Sanitise Python's default import path devscripts Allow current signed changes files dpkg Improved symlink handling, reenable no-debsig epiphany-browser Allow the deletion of certificates glibc Keep ld.so in optimised libraries graphviz Fix potential arbitrary code execution libhdate Drop binary package libhdate-pascal perl Fix Time::HiRes with kernels >= 2.6.22 postgresql-7.4 Incorporate bug fix releases up to 7.4.23 postgresql-8.1 Incorporate bug fix releases up to 8.1.15 reportbug Support new bugs.debian.org structure spamassassin Fix for denial of service, remove blacklists tdiary Fix a Cross Site Scripting vulnerability websvn Fix potential PHP code execution Security Updates ---------------- This revision adds the following security updates to the stable release. The Security Team has already released an advisory for each of these updates: Advisory ID Package Correction(s) DSA 1617 refpolicy Incompatible policy DSA 1622 newsx Arbitrary code execution DSA 1635 freetype Several vulnerabilities DSA 1656 cupsys Several vulnerabilities DSA 1657 qemu Denial of service DSA 1658 dbus Denial of service DSA 1659 libspf2 Potential remote code execution DSA 1660 clamav Denial of service DSA 1661 openoffice.org Several vulnerabilities DSA 1662 mysql-dfsg-5.0 Authorization bypass DSA 1663 net-snmp Several vulnerabilities DSA 1665 libcdaudio Arbitrary code execution DSA 1666 libxml2 Several vulnerabilities DSA 1667 python2.4 Several vulnerabilities DSA 1668 hf Arbitrary code execution DSA 1669 xulrunner Several vulnerabilities DSA 1670 enscript Arbitrary code execution DSA 1671 iceweasel Several vulnerabilities DSA 1672 imlib2 Arbitrary code execution DSA 1673 wireshark Several vulnerabilities DSA 1674 jailer Denial of service DSA 1675 phpmyadmin Cross-site scripting DSA 1676 flamethrower Denial of service DSA 1677 cupsys Arbitrary code execution DSA 1679 awstats Cross-site scripting DSA 1681 linux-2.6.24 Several vulnerabilities DSA 1682 squirrelmail Cross site scripting DSA 1683 streamripper Potential code execution DSA 1687 fai-kernels Several vulnerabilities DSA 1687 linux-2.6 Several vulnerabilities DSA 1687 user-mode-linux Several vulnerabilities A complete list of all accepted and rejected packages together with rationale is on the preparation page for this revision: <http://release.debian.org/stable/4.0/4.0r6/> Removed packages ---------------- The following packages were removed due to circumstances beyond our control: Package Reason fpc Copyright infringement gearhead Depends on non-free fpc imapcopy: Depends on non-free fpc astrolog Contains potentially undistributable code youtube-dl Not suited for stable release URLs ---- The complete lists of packages that have changed with this revision: <http://ftp.debian.org/debian/dists/etch/ChangeLog> The current stable distribution: <http://ftp.debian.org/debian/dists/stable> Proposed updates to the stable distribution: <http://ftp.debian.org/debian/dists/proposed-updates> Stable distribution information (release notes, errata etc.): <http://www.debian.org/releases/stable/> Security announcements and information: <http://www.debian.org/security/> About Debian ------------ The Debian Project is an association of Free Software developers who volunteer their time and effort in order to produce the completely free operating systems Debian GNU/Linux. Contact Information ------------------- For further information, please visit the Debian web pages at <http://www.debian.org/>, send mail to <press at debian.org>, or contact the stable release team at <debian-release at lists.debian.org>. -- To UNSUBSCRIBE, email to debian-announce-REQUEST at lists.debian.org with a subject of "unsubscribe". Trouble? Contact listmaster at lists.debian.org -- $B2F at 6A3(B Xia Qingran qingran.xia at gmail.com Jay London - "I was going to buy a book on hair loss, but the pages kept falling out." -------------- next part -------------- An HTML attachment was scrubbed... URL: <http://www.zeuux.org/pipermail/zeuux-linux/attachments/20081219/761537e3/attachment.html>
2008年12月19日 星期五 14:30
On Fri, Dec 19, 2008 at 01:43:38PM +0800, Xia Qingran wrote: > > > ---------- Forwarded message ---------- > From: Joey Schulze <joey在infodrom.org> > Date: Thu, Dec 18, 2008 at 7:18 PM > Subject: Debian GNU/Linux 4.0 updated > To: Debian Announcements <debian-announce在lists.debian.org> 问一下,这个邮件列表中的同仁们,还有谁在使用Debian的系, 我使用的就是Debian的系统,感觉这个发行版真是太棒了。 > > > ------------------------------------------------------------------------ > The Debian Project http://www.debian.org/ > Debian GNU/Linux 4.0 updated press在debian.org > December 18th, 2008 http://www.debian.org/News/2008/20081218 > ------------------------------------------------------------------------ > > Debian GNU/Linux 4.0 updated > > The Debian project is pleased to announce the sixth update of its stable > distribution Debian GNU/Linux 4.0 (codename "etch"). This update mainly > adds corrections for security problems to the stable release, along with > a few adjustment to serious problems. > > Please note that this update does not constitute a new version of Debian > GNU/Linux 4.0 but only updates some of the packages included. There is > no need to throw away 4.0 CDs or DVDs but only to update via an > up-to-date Debian mirror after an installation, to cause any out of date > packages to be updated. > > Those who frequently install updates from security.debian.org won't have > to update many packages and most updates from security.debian.org are > included in this update. > > New CD and DVD images containing updated packages and the regular > installation media accompanied with the package archive respectively will > be available soon at the regular locations. > > Upgrading to this revision online is usually done by pointing the > aptitude (or apt) package tool (see the sources.list(5) manual page) to > one of Debian's many FTP or HTTP mirrors. A comprehensive list of > mirrors is available at: > > <http://www.debian.org/distrib/ftplist> > > > Miscellaneous Bugfixes > ---------------------- > > This stable update adds several binary updates for various architectures > to packages whose version was not synchronised across all architectures. > It also adds a few important corrections to the following packages: > > Package Reason > > blender Sanitise Python's default import path > devscripts Allow current signed changes files > dpkg Improved symlink handling, reenable no-debsig > epiphany-browser Allow the deletion of certificates > glibc Keep ld.so in optimised libraries > graphviz Fix potential arbitrary code execution > libhdate Drop binary package libhdate-pascal > perl Fix Time::HiRes with kernels >= 2.6.22 > postgresql-7.4 Incorporate bug fix releases up to 7.4.23 > postgresql-8.1 Incorporate bug fix releases up to 8.1.15 > reportbug Support new bugs.debian.org structure > spamassassin Fix for denial of service, remove blacklists > tdiary Fix a Cross Site Scripting vulnerability > websvn Fix potential PHP code execution > > > Security Updates > ---------------- > > This revision adds the following security updates to the stable release. > The Security Team has already released an advisory for each of these > updates: > > Advisory ID Package Correction(s) > > DSA 1617 refpolicy Incompatible policy > DSA 1622 newsx Arbitrary code execution > DSA 1635 freetype Several vulnerabilities > DSA 1656 cupsys Several vulnerabilities > DSA 1657 qemu Denial of service > DSA 1658 dbus Denial of service > DSA 1659 libspf2 Potential remote code execution > DSA 1660 clamav Denial of service > DSA 1661 openoffice.org Several vulnerabilities > DSA 1662 mysql-dfsg-5.0 Authorization bypass > DSA 1663 net-snmp Several vulnerabilities > DSA 1665 libcdaudio Arbitrary code execution > DSA 1666 libxml2 Several vulnerabilities > DSA 1667 python2.4 Several vulnerabilities > DSA 1668 hf Arbitrary code execution > DSA 1669 xulrunner Several vulnerabilities > DSA 1670 enscript Arbitrary code execution > DSA 1671 iceweasel Several vulnerabilities > DSA 1672 imlib2 Arbitrary code execution > DSA 1673 wireshark Several vulnerabilities > DSA 1674 jailer Denial of service > DSA 1675 phpmyadmin Cross-site scripting > DSA 1676 flamethrower Denial of service > DSA 1677 cupsys Arbitrary code execution > DSA 1679 awstats Cross-site scripting > DSA 1681 linux-2.6.24 Several vulnerabilities > DSA 1682 squirrelmail Cross site scripting > DSA 1683 streamripper Potential code execution > DSA 1687 fai-kernels Several vulnerabilities > DSA 1687 linux-2.6 Several vulnerabilities > DSA 1687 user-mode-linux Several vulnerabilities > > > A complete list of all accepted and rejected packages together with > rationale is on the preparation page for this revision: > > <http://release.debian.org/stable/4.0/4.0r6/> > > > Removed packages > ---------------- > > The following packages were removed due to circumstances beyond our control: > > Package Reason > > fpc Copyright infringement > gearhead Depends on non-free fpc > imapcopy: Depends on non-free fpc > astrolog Contains potentially undistributable code > youtube-dl Not suited for stable release > > > URLs > ---- > > The complete lists of packages that have changed with this revision: > > <http://ftp.debian.org/debian/dists/etch/ChangeLog> > > The current stable distribution: > > <http://ftp.debian.org/debian/dists/stable> > > Proposed updates to the stable distribution: > > <http://ftp.debian.org/debian/dists/proposed-updates> > > Stable distribution information (release notes, errata etc.): > > <http://www.debian.org/releases/stable/> > > Security announcements and information: > > <http://www.debian.org/security/> > > > About Debian > ------------ > > The Debian Project is an association of Free Software developers who > volunteer their time and effort in order to produce the completely > free operating systems Debian GNU/Linux. > > > Contact Information > ------------------- > > For further information, please visit the Debian web pages at > <http://www.debian.org/>, send mail to <press在debian.org>, or > contact the stable release team at <debian-release在lists.debian.org>. > > > -- > To UNSUBSCRIBE, email to debian-announce-REQUEST在lists.debian.org > with a subject of "unsubscribe". Trouble? Contact listmaster在lists.debian.org > > > > > -- > 夏清然 > Xia Qingran > qingran.xia在gmail.com > Jay London - "I was going to buy a book on hair loss, but the pages kept > falling out." > _______________________________________________ > zeuux-linux mailing list > zeuux-linux在zeuux.org > http://www.zeuux.org/mailman/listinfo/zeuux-linux -- --------------------------------- Zhenwen Xu - Open and Free Home Page: http://zhwen.org My Studio: http://dim4.cn
2008年12月19日 星期五 15:08
Zhenwen Xu wrote: > On Fri, Dec 19, 2008 at 01:43:38PM +0800, Xia Qingran wrote: > >> ---------- Forwarded message ---------- >> From: Joey Schulze <joey at infodrom.org> >> Date: Thu, Dec 18, 2008 at 7:18 PM >> Subject: Debian GNU/Linux 4.0 updated >> To: Debian Announcements <debian-announce at lists.debian.org> >> > 问一下,这个邮件列表中的同仁们,还有谁在使用Debian的系, > 我使用的就是Debian的系统,感觉这个发行版真是太棒了。 > 哈,我现在桌面用的ubuntu 8.10,也算是debian系的。 -- 夏清然 Xia Qingran E-mail: qingran at zeuux.org Gtalk: qingran.xia at gmail.com MSN: supermanxqr at msn.com
2008年12月19日 星期五 17:21
On Fri, Dec 19, 2008 at 03:08:35PM +0800, Xia Qingran wrote: > Zhenwen Xu wrote: >> On Fri, Dec 19, 2008 at 01:43:38PM +0800, Xia Qingran wrote: >> >>> ---------- Forwarded message ---------- >>> From: Joey Schulze <joey在infodrom.org> >>> Date: Thu, Dec 18, 2008 at 7:18 PM >>> Subject: Debian GNU/Linux 4.0 updated >>> To: Debian Announcements <debian-announce在lists.debian.org> >>> >> 问一下,这个邮件列表中的同仁们,还有谁在使用Debian的系, >> 我使用的就是Debian的系统,感觉这个发行版真是太棒了。 >> > 哈,我现在桌面用的ubuntu 8.10,也算是debian系的。 是debian系的,但是个人感觉还是debian要比ubuntu好。 先声明阿!这个是个人感觉!我以前用的就是ubuntu,后来用了Debian了, > > -- > 夏清然 > Xia Qingran > E-mail: qingran在zeuux.org > Gtalk: qingran.xia在gmail.com > MSN: supermanxqr在msn.com -- --------------------------------- Zhenwen Xu - Open and Free Home Page: http://zhwen.org My Studio: http://dim4.cn
Zeuux © 2024
京ICP备05028076号