Debian GNU/Linux 3.1 updated
November 6th, 2006
The Debian project is pleased to announce the fourth update of its stable distribution Debian GNU/Linux 3.1 (codename `sarge'). This update mainly adds corrections for security problems to the stable release, along with a few adjustment to serious problems. Those who frequently update from security.debian.org won't have to update many packages and most updates from security.debian.org are included in this update.
Please note that this update does not constitute a new version of Debian GNU/Linux 3.1 but only updates some of the packages included in the stable release. There is no need to throw away 3.1 CDs or DVDs but only to update against ftp.debian.org after an installation, in order to incorporate those late changes.
Upgrade CD and DVD images will be created soon. No new installation images will be created. Users are advised to update their system against an official Debian mirror after a new installation and update the kernel instead. For the next update new images are anticipated.
Upgrading to this revision online is usually done by pointing the
apt package tool (see the sources.list(5) manual page) to one of
Debian's many FTP or HTTP mirrors. A comprehensive list of mirrors is
This stable update adds a few important corrections to the following packages:
|deal||Fixes segfault on 64bit platforms|
|devmapper||Creates LVM devices with appropriate permissions|
This update also fixes an error in Debian-Installer for Sparc32 that was introduced with the last stable update (r3).
This revision adds the following security updates to the stable release. The Security Team has already released an advisory for each of these updates:
|DSA-1158||streamripper||Arbitrary code execution|
|DSA-1162||libmusicbrainz||Arbitrary code execution|
|DSA-1163||gtetrinet||Arbitrary code execution|
|DSA-1164||sendmail||Denial of service|
|DSA-1165||capi4hylafax||Arbitrary command execution|
|DSA-1166||cheesetracker||Arbitrary code execution|
|DSA-1168||imagemagick||Arbitrary code execution|
|DSA-1170||gcc-3.4||Directory traversal in fastjar|
|DSA-1171||ethereal||Arbitrary code execution|
|DSA-1172||bind9||Denial of service|
|DSA-1173||openssl||RSA signature forgery cryptographic weakness|
|DSA-1174||openssl096||RSA signature forgery cryptographic weakness|
|DSA-1175||isakmpd||Replay protection bypass|
|DSA-1177||usermin||Denial of service|
|DSA-1178||freetype||Arbitrary code execution|
|DSA-1179||alsaplayer||Denial of service|
|DSA-1181||gzip||Arbitrary code execution|
|DSA-1182||gnutls11||RSA signature forgery cryptographic weakness|
|DSA-1185||openssl||Arbitrary code execution|
|DSA-1186||cscope||Arbitrary code execution|
|DSA-1187||migrationtools||Denial of service|
|DSA-1189||openssh-krb5||Potential arbitrary code execution|
|DSA-1190||maxdb-7.5.00||Arbitrary code execution|
|DSA-1194||libwmf||Arbitrary code execution|
|DSA-1195||openssl096||Denial of service|
A complete list of all accepted and rejected packages together with rationale is on the preparation page for this revision:
The complete lists of packages that have changed with this release:
The current stable distribution:
Proposed updates to the stable distribution:
Stable distribution information (release notes, errata, etc.):
Security announcements and information:
The Debian Project is an association of Free Software developers who volunteer their time and effort in order to produce the completely free operating system Debian GNU/Linux.
For further information, please visit the Debian web pages at https://www.debian.org/, send mail to <email@example.com>, or contact the stable release team at <firstname.lastname@example.org>.