1. Dashboard
  2. Mitglieder
    1. Letzte Aktivitäten
    2. Benutzer online
    3. Team
    4. Mitgliedersuche
  3. Filebase
  4. Forum
  5. Zebradem-WIKI
  6. Foren-Regeln
  7. Spenden Liste
    1. Spenden
  • Anmelden
  • Registrieren
  • Suche
ZebraDem-Sponsoring
Dieses Thema
  • Alles
  • Dieses Thema
  • Dieses Forum
  • Seiten
  • Dateien
  • Forum
  • Erweiterte Suche
  1. Forum
  2. Computer Ecke
  3. Betriebssysteme
  4. Linux

Debian 5.0.8 released

  • ivan83
  • 23. Januar 2011 um 10:38
  • ivan83
    Gast
    • 23. Januar 2011 um 10:38
    • #1

    Updated Debian GNU/Linux: 5.0.8 released

    22.01.2011
    The Debian project is pleased to announce the eighth update of its stable distribution Debian GNU/Linux 5.0 (codename lenny). This update mainly adds corrections for security problems to the stable release, along with a few adjustment to serious problems.
    Please note that this update does not constitute a new version of Debian GNU/Linux 5.0 but only updates some of the packages included. There is no need to throw away 5.0 CDs or DVDs but only to update via an up-to-date Debian mirror after an installation, to cause any out of date packages to be updated.
    Those who frequently install updates from security.debian.org won't have to update many packages and most updates from security.debian.org are included in this update.
    New CD and DVD images containing updated packages and the regular installation media accompanied with the package archive respectively will be available soon at the regular locations.
    Upgrading to this revision online is usually done by pointing the aptitude (or apt) package tool (see the sources.list(5) manual page) to one of Debian's many FTP or HTTP mirrors. A comprehensive list of mirrors is available at:
    Debian worldwide mirror sites
    Miscellaneous Bugfixes

    This stable update adds a few important corrections to the following packages:
    Package Reason awstats Fix directory traversal via crafted LoadPlugin directory base-files Update debian_version for the point release boxbackup Reduce root CA expiration date to avoid overflow in 2038 git-core Fix cross-site scripting vulnerability gquilt Insecure setting of PYTHONPATH hamlib Use system libltdl rather than an internal copy vulnerable to CVE-2009-3736 ia32-libs Refresh with new packages from lenny and lenny-security ia32-libs-gtk Refresh with new packages from lenny and lenny-security ldap-account-manager Fix upgrades from lenny by dropping master password debconf question libcgi-pm-perl Fix header-parsing related security issues libcgi-simple-perl Fix header-parsing related security issues libgadu Fix memory corruption when removing dcc7 sessions man-db Suppress locale warnings when being run from a dpkg maintainer script mediawiki Deny framing on most pages to minimise risk of clickjacking movabletype-opensource Fix various XSS and SQL security issues mumble Don't make configuration file world-readable; delete /var/lib/mumble-server on purge opensc Protect against buffer overflow from rogue cards perl Fix header-parsing related security bugs; update to Safe-2.25 postgresql-8.3 New upstream bugfix release spamassassin Update list of ARIN netblock delegations to avoid false positives in RelayEval splashy Modify lsb-base-logging.sh to avoid issues if splashy is removed but not purged surfraw Update Debian security-tracker URL user-mode-linux Rebuild against linux-source-2.6.26 (2.6.26-26lenny1) xdigger Fix buffer overflow errors Security Updates

    This revision adds the following security updates to the stable release. The Security Team has already released an advisory for each of these updates:
    Advisory ID Package Correction(s) DSA-2110 linux-2.6Several issues DSA-2122 glibcPrivilege escalation DSA-2126 linux-2.6Several issues DSA-2127 wiresharkDenial of service DSA-2128 libxml2Potential code execution DSA-2129 krb5Checksum verification weakness DSA-2130 bind9Denial of service DSA-2131 exim4Remote code execution DSA-2132 xulrunnerSeveral vulnerabilities DSA-2133 collectdDenial of service DSA-2135 xpdfSeveral vulnerabilities DSA-2136 torPotential code execution DSA-2137 libxml2Several vulnerabilities DSA-2138 wordpressSQL injection DSA-2139 phpmyadminSeveral vulnerabilities DSA-2140 libapache2-mod-fcgidStack overflow DSA-2141 apache2Add backward compatibility options when used with new openssl DSA-2141 nssProtocol design flaw DSA-2141 apache2-mpm-itkRebuild with apache2-src 2.2.9-10+lenny9 DSA-2141 opensslProtocol design flaw DSA-2141 lighttpdCompatibility problem with updated openssl DSA-2142 dpkgDirectory traversal DSA-2143 mysql-dfsg-5.0Several vulnerabilities DSA-2144 wiresharkBuffer overflow DSA-2145 libsmiBuffer overflow DSA-2146 mydmsDirectory traversal problem DSA-2147 pimdInsecure temporary files DSA-2148 torSeveral vulnerabilities Removed packages

    The following packages were removed due to circumstances beyond our control:
    Package Reason pytris security issues; abandoned upstream python-gendoc broken with python>= 2.5 clive completely broken gmailfs broken due to gmail changes; abandoned upstream python-libgmail broken due to gmail changes; abandoned upstream URLs

    The complete lists of packages that have changed with this revision:
    http://ftp.debian.org/debian/dists/lenny/ChangeLog
    The current stable distribution:
    Index of /debian/dists/stable
    Proposed updates to the stable distribution:
    Index of /debian/dists/proposed-updates
    stable distribution information (release notes, errata etc.):
    http://www.debian.org/releases/stable />
    Security announcements and information:
    http://www.debian.org/security/
    About Debian

    The Debian Project is an association of Free Software developers who volunteer their time and effort in order to produce the completely free operating systems Debian GNU/Linux.
    Contact Information

    For further information, please visit the Debian web pages at Debian -- The Universal Operating System, send mail to <[email protected]>, or contact the stable release team at <[email protected]>.

    • Zitieren

Jetzt mitmachen!

Du hast noch kein Benutzerkonto auf unserer Seite? Registriere dich kostenlos und nimm an unserer Community teil!

Benutzerkonto erstellen Anmelden

Spenden

Vielen Dank für die Unterstützung!
Hiermit unterstützt du Zebradem.
Das beinhaltet überwiegend die Serverkosten und Lizenzgebühren.
Spenden

Letzte Beiträge

  • Glance AI und Samsung: Umstrittenes neues Feature für Werbung

    heugabel 6. Juni 2025 um 17:27
  • Der Hackerparagraf §202a StGB: Eine doppelte Herausforderung für Forscher

    heugabel 6. Juni 2025 um 12:27
  • Musik TV ( IPTV)

    Fellfresse 5. Juni 2025 um 20:00
  • BGH-Urteil: Fingerabdruck schützt dein Smartphone nicht mehr

    heugabel 5. Juni 2025 um 16:27
  • Pluto TV

    Fellfresse 4. Juni 2025 um 19:43
  • BGH-Urteil: Neue Richtlinien zur Entsperrung von Handys durch Ermittler

    Katze Flohli 4. Juni 2025 um 12:09
  • Plex Live TV / LG Channels / Wedo TV

    Fellfresse 3. Juni 2025 um 18:48
  • Amazon Fire TV und die Schatten der Piraterie

    heugabel 3. Juni 2025 um 09:27
  • IPTV-Pirat steht vor Rekordstrafe – 25 bis 30 Jahre Haft

    Morbid Angel 3. Juni 2025 um 07:44
  • ALDI TALK Unlimited: Ein GitHub-Skript für echte Unbegrenztheit

    heugabel 3. Juni 2025 um 07:27

Aktivste Themen

  • The Highway to Freedom is now Open for Everyone!!

    29 Antworten
  • iOmega sftp

    24 Antworten
  • Wo sind die Linux User ???

    20 Antworten
  • Erste Beta von Ubuntu 10.04 steht zum Download bereit

    19 Antworten
  • php webseiten script ubuntu reboot

    18 Antworten
  • Welches Linux auf alten Laptop?

    11 Antworten
  • kennt sich jemand mit SABnzbd aus?

    10 Antworten
  • Keybord Error bei Fujitsu Siemens Futro C 100

    9 Antworten
  • Debian Homeserver Anleitung

    9 Antworten
  • Debian 5.0.5

    9 Antworten

Benutzer online in diesem Thema

  • 1 Besucher
  1. Kontakt
© 2024 Zebradem - Software by WoltLab