Updated Debian 8: 8.10 released
December 9th, 2017
The Debian project is pleased to announce the tenth update of its
oldstable distribution Debian 8 (codename jessie
).
This point release mainly adds corrections for security issues,
along with a few adjustments for serious problems. Security advisories
have already been published separately and are referenced where available.
Please note that the point release does not constitute a new version of Debian
8 but only updates some of the packages included. There is
no need to throw away old jessie
media. After installation,
packages can be upgraded to the current versions using an up-to-date Debian
mirror.
Those who frequently install updates from security.debian.org won't have to update many packages, and most such updates are included in the point release.
New installation images will be available soon at the regular locations.
Upgrading an existing installation to this revision can be achieved by pointing the package management system at one of Debian's many HTTP mirrors. A comprehensive list of mirrors is available at:
Miscellaneous Bugfixes
This oldstable update adds a few important corrections to the following packages:
Package | Reason |
---|---|
bareos | Fix permissions of bareos-dir logrotate config; fix file corruption when using SHA1 signature |
base-files | Update for the point release |
bind9 | Import upcoming DNSSEC KSK-2017 |
cups | Disable SSLv3 and RC4 by default to address POODLE vulnerability |
db | Do not access DB_CONFIG when db_home is not set [CVE-2017-10140] |
db5.3 | Do not access DB_CONFIG when db_home is not set [CVE-2017-10140] |
debian-installer | Rebuild for the point release |
debian-installer-netboot-images | Rebuild for the point release |
debmirror | Tolerate unknown lines in *.diff/Index; mirror DEP-11 metadata files; prefer xz over gz, and cope with either being missing; mirror and validate InRelease files |
dns-root-data | Update root.hints to 2017072601 version; add KSK-2017 to root.key file |
dput | dput.cf: replace security-master.debian.org with ftp.upload.security.debian.org |
dwww | Fix Last-Modifiedheader name |
elog | Update patch 0005_elogd_CVE-2016-6342_fix to grant access as normal user |
flightgear | Fix arbitrary file overwrite vulnerability [CVE-2017-13709] |
gsoap | Fix integer overflow via large XML document [CVE-2017-9765] |
hexchat | Fix segmentation fault following /server command |
icu | Fix double free in createMetazoneMappings() [CVE-2017-14952] |
kdepim | Fix send Later with Delay bypasses OpenPGP[CVE-2017-9604] |
kedpm | Fix information leak via command history file [CVE-2017-8296] |
keyringer | Handle subkeys without expiration date and public keys listed multiple times |
krb5 | Security fixes - remote authenticated attackers can crash the KDC [CVE-2017-11368]; kdc crash on restrict_anon_to_tgt [CVE-2016-3120]; remote DOS with ldap for authenticated attackers [CVE-2016-3119]; prevent requires_preauth bypass [CVE-2015-2694] |
libdatetime-timezone-perl | Update included data |
libdbi | Re-enable error handler call in dbi_result_next_row() |
libembperl-perl | Change hard dependency on mod_perl in zembperl.load to Recommends, fixing an installation failure when libapache2-mod-perl2 is not installed |
libio-socket-ssl-perl | Fix segfault using malformed client certificates |
liblouis | Fix multiple stack-based buffer overflows [CVE-2014-8184] |
libofx | Security fixes [CVE-2017-2816 CVE-2017-14731] |
libwnckmm | Tighten dependencies between packages; use jquery.js from libjs-jquery |
libwpd | Security fix [CVE-2017-14226] |
libx11 | Fix insufficient validation of data from the X server can cause out of boundary memory read (XGetImage()) or write (XListFonts())[CVE-2016-7942 CVE-2016-7943] |
libxfixes | Fix integer overflow on illegal server response [CVE-2016-7944] |
libxi | Fix insufficient validation of data from the X server can cause out of boundary memory access or endless loops[CVE-2016-7945 CVE-2016-7946] |
libxrandr | Avoid out of boundary accesses on illegal responses [CVE-2016-7947 CVE-2016-7948] |
libxtst | Fix insufficient validation of data from the X server can cause out of boundary memory access or endless loops[CVE-2016-7951 CVE-2016-7952] |
libxv | Fix protocol handling issues in libXv [CVE-2016-5407] |
libxvmc | Avoid buffer underflow on empty strings [CVE-2016-7953] |
linux | New stable kernel version 3.16.51 |
ncurses | Fix various crash bugs in the tic library and the tic binary [CVE-2017-10684 CVE-2017-10685 CVE-2017-11112 CVE-2017-11113 CVE-2017-13728 CVE-2017-13729 CVE-2017-13730 CVE-2017-13731 CVE-2017-13732 CVE-2017-13734 CVE-2017-13733] |
openssh | Test configuration before starting or reloading sshd under systemd; make --before the hostname terminate argument processing after the hostname too |
pdns | Add missing check on API operations [CVE-2017-15091] |
pdns-recursor | Fix configuration file injection in the API [CVE-2017-15093] |
postgresql-9.4 | New upstream bugfix release |
python-tablib | Securely load YAML [CVE-2017-2810] |
request-tracker4 | Fix regression in previous security release where incorrect SHA256 passwords could trigger an error |
ruby-ox | Avoid crash with invalid XML passed to Oj.parse_obj() [CVE-2017-15928] |
sam2p | Fix several integer overflow or heap-based buffer overflow issues [CVE-2017-14628 CVE-2017-14629 CVE-2017-14630 CVE-2017-14631 CVE-2017-14636 CVE-2017-14637 CVE-2017-16663] |
slurm-llnl | Fix security issue caused by insecure file path handling triggered by the failure of a Prolog script [CVE-2016-10030] |
sudo | Fix arbitrary terminal access [CVE-2017-1000368] |
syslinux | Fix boot problem for old BIOS firmware by correcting C/H/S order |
tor | Add Bastetdirectory authority; update geoip and geoip6 to the October 4 2017 Maxmind GeoLite2 country database; fix a memset() off the end of an array when packing cells |
transfig | Add input sanitisation on FIG files [CVE-2017-16899]; sanitize input of fill patterns |
tzdata | New upstream release |
unbound | Fix install of trust anchor when two anchors are present; include root trust anchor id 20326 |
weechat | logger: call strftime before replacing buffer local variables[CVE-2017-14727] |
Security Updates
This revision adds the following security updates to the oldstable release. The Security Team has already released an advisory for each of these updates:
Removed packages
The following packages were removed due to circumstances beyond our control:
Package | Reason |
---|---|
libnet-ping-external-perl | Unmaintained, security issues |
aiccu | Useless since shutdown of SixXS |
Debian Installer
The installer has been updated to include the fixes incorporated into stable by the point release.
URLs
The complete lists of packages that have changed with this revision:
The current oldstable distribution:
Proposed updates to the oldstable distribution:
oldstable distribution information (release notes, errata etc.):
Security announcements and information:
About Debian
The Debian Project is an association of Free Software developers who volunteer their time and effort in order to produce the completely free operating system Debian.
Contact Information
For further information, please visit the Debian web pages at https://www.debian.org/, send mail to <press@debian.org>, or contact the stable release team at <debian-release@lists.debian.org>.