Debian GNU/Linux 3.0 updated (r1)

December 16th, 2002

This is the first update of Debian GNU/Linux 3.0 (codename ‘woody’) which mainly adds security updates to the stable release, along with a few corrections of serious bugs. Those who frequently update from won't have to update many packages and most updates from are included in this update.

Please note that this update does not produce a new version of Debian GNU/Linux 3.0 but only adds a few updated packages to it. There is no need to throw away 3.0r0 CDs but only to update against after an installation.

Upgrading to this revision online is usually done by pointing the ‘apt’ package tool (see the sources.list(5) manual page) to one of Debian's many FTP or HTTP mirrors. A comprehensive list of mirrors is available at:

Security Updates

This revision adds the following security updates to the stable release. The Security Team has already released an advisory for each of these updates.

Debian Security Advisory ID Package(s)
DSA 137 mm
DSA 138 gallery
DSA 139 super
DSA 140 libpng
DSA 141 mpack
DSA 142 openafs
DSA 143 krb5
DSA 144 wwwoffle
DSA 145 tinyproxy
DSA 146 dietlibc
DSA 147 mailman
DSA 148 hylafax
DSA 149 glibc
DSA 150 interchange
DSA 151 xinetd
DSA 152 l2tpd
DSA 153 mantis
DSA 154 fam
DSA 155 kdelibs
DSA 156 epic4-script-light
DSA 157 irssi-text
DSA 158 gaim
DSA 159 python 1.5
DSA 160 scrollkeeper
DSA 161 mantis
DSA 162 ethereal
DSA 163 mhonarc
DSA 166 purity
DSA 167 kdelibs
DSA 168 php3, php4
DSA 169 htcheck
DSA 170 tomcat4
DSA 171 fetchmail, fetchmail-ssl
DSA 172 tkmail
DSA 173 Bugzilla
DSA 174 heartbeat
DSA 176 gv
DSA 179 gnome-gv
DSA 180 nis
DSA 182 kdegraphics
DSA 183 krb5
DSA 186 log2mail
DSA 187 Apache
DSA 188 Apache-SSL
DSA 189 luxman
DSA 191 squirrelmail
DSA 192 html2ps
DSA 194 masqmail
DSA 195 Apache-Perl
DSA 197 Courier sqwebmail
DSA 198 nullmailer
DSA 199 mhonarc
DSA 200 samba
DSA 201 Free/SWan
DSA 202 im
DSA 204 kdelibs
DSA 205 gtetrinet
DSA 206 tcpdump
DSA 207 tetex-bin

Miscellaneous Bugfixes

This revision adds important corrections to the following packages. Most of them don't affect the security of the system, but may affect data integrity.

arcboot, tip22 tftp loader for SGI MIPS machines
bastille Fixes a broken package
cron-apt Important correction
debiandoc-sgml Correct a broken upgrade
defrag Fix filesystem corruption in connection with a journal
docbook-xml-slides Fix broken dependency
eroaster Important correction
gnome-pim Important correction
initrd-tools Added support for newer kernels
kernel-image-2.2.22-alpha Security updates
kernel-image-sparc-2.4 Security updates
kernel-patch-2.4.17-s390 Important corrections
kernel-patch-2.4.19-mips Security updates
kernel-source-2.2.22 Security updates
libgd Fixes a broken package
libquota-perl Important correction
logtool Fixes a broken package
mpqc Fix broken dependency
msttcorefonts Fix path to the fonts
muddleftpd Security fix correction
murasaki Important correction
ocaml Important correction
octave2.1 Fix broken dependency
pcmcia-modules-2.2.22 Built against kernel-source-2.2.22
qpopper Important correction
rio500 Important correction
silo Add support to UltraSPARC III+ machines
snort Important corrections
sympa Fix broken dependency
tendra Fix license violation
uptimed Fix upgrade path
weex Important correction
yaclc Important correction

Removed Packages

The following packages had to be removed from the distribution:
cdrdao, gcdmaster License problems

A complete list of all accepted and rejected packages together with rationale is on the preparation page for this revision:


The complete lists of packages that have changed with this release:

The current stable distribution:

Proposed updates to the stable distribution:

Stable distribution information (release notes, errata, etc.):

Security announcements and information:

About Debian

The Debian Project is an organization of free software developers who volunteer their time and effort in order to produce the completely free operating systems Debian GNU/Linux and Debian GNU/Hurd.

Contact Information

For further information, please visit the Debian web pages at or send mail to <>.