Debian GNU/Linux 3.1 updated
April 13th, 2008
The Debian project is pleased to announce the eighth and final update of its
old stable distribution Debian GNU/Linux 3.1 (codename
This update mainly adds
corrections for security problems to the oldstable release, along with
a few adjustments to serious problems.
Please note that this update does not constitute a new version of Debian GNU/Linux 3.1 but only updates some of the packages included. There is no need to throw away 3.1 CDs or DVDs but only to update against ftp.debian.org after an installation, in order to incorporate those late changes.
Those who frequently install updates from security.debian.org won't have to update many packages and all updates from security.debian.org are included in this update.
New CD and DVD images containing updated packages and the regular installation media accompanied with the package archive respectively will be available soon at the regular locations.
Upgrading to this revision online is usually done by pointing the
apt) package tool (see the sources.list(5) manual
page) to one of Debian's many FTP or HTTP mirrors. A comprehensive
list of mirrors is available at:
This update adds several binary-only updates for various architectures to packages whose version was not synchronised across all architectures. It also adds a few important corrections to the following packages:
|unrar-nonfree||Fix a buffer overflow (CVE-2007-0855)|
|wesnoth||Bring architectures back in sync|
|pwlib||Bring architectures back in sync|
|sing||Fix privilege escalation|
|alsa-modules-i386||Built against the fixed 2.6 ABI, but the old 2.4 ABI|
|fai-kernels||Built against the fixed 2.6 ABI, but the old 2.4 ABI|
Please note that updated packages for alsa-modules-i386 and fai-kernels for the 2.4 Kernel-Series are available via security.debian.org but could not be added to this upgrade to prevent the Debian Installer for Sarge breaking as a result of the ABI change in that kernel update.
This revision adds the following security updates to the old stable release. The Security Team has already released an advisory for each of these updates:
|DSA-1438||tar||Fix several vulnerabilities|
|DSA-1445||maradns||Fix denial of service vulnerability|
|DSA-1446||ethereal||Fix denial of service vulnerability|
|DSA-1448||eggdrop||Fix execution of arbitrary code|
|DSA-1449||loop-aes-utils||Fix programming error|
|DSA-1450||util-linux||Fix programming error|
|DSA-1452||wzdftpd||Fix denial of service vulnerability|
|DSA-1458||openafs||Fix denial of service vulnerability|
|DSA-1459||gforge||Fix SQL injection|
|DSA-1461||libxml2||Fix denial of service vulnerability|
|DSA-1463||postgresql||Fix several vulnerabilities|
|DSA-1466||xfree86||Fix several vulnerabilities|
|DSA-1467||mantis||Fix several vulnerabilities|
|DSA-1469||flac||Fix arbitrary code execution|
|DSA-1471||libvorbis||Fix several vulnerabilities|
|DSA-1472||xine-lib||Fix arbitrary code execution|
|DSA-1473||scponly||Fix arbitrary code execution|
|DSA-1482||squid||Fix denial of service vulnerability|
|DSA-1487||libexif||Fix several vulnerabilities|
|DSA-1488||phpbb||Fix several vulnerabilities|
|DSA-1490||tk8.3||Fix arbitrary code execution|
|DSA-1491||tk8.4||Fix arbitrary code execution|
|DSA-1493||sdl-image1.2||Fix arbitrary code execution|
|DSA-1495||nagios-plugins||Fix several vulnerabilities|
|DSA-1499||pcre3||Fix arbitrary code execution|
|DSA-1504||kernel-source-2.6.8||Fix several issues|
|DSA-1505||alsa-driver||Fix kernel memory leak|
|DSA-1507||turba2||Fix permission testing|
|DSA-1508||sword||Fix arbitrary shell command execution|
|DSA-1510||gs-esp||Fix arbitrary code execution|
|DSA-1510||gs-gpl||Fix arbitrary code execution|
|DSA-1512||evolution||Fix arbitrary code execution|
|DSA-1515||libnet-dns-perl||Fix several vulnerabilities|
|DSA-1518||backup-manager||Fix information disclosure|
|DSA-1519||horde3||Fix information disclosure|
|DSA-1520||smarty||Fix arbitrary code execution|
|DSA-1522||unzip||Fix potential code execution|
|DSA-1524||krb5||Fix several vulnerabilities|
|DSA-1527||debian-goodies||Fix privilege escalation|
|DSA-1533||exiftags||Fix several vulnerabilities|
|DSA-1536||xine-lib||Fix several vulnerabilities|
A complete list of all accepted and rejected packages together with rationale is on the preparation page for this revision:
Flashplugin-nonfree has been removed, as this is closed source and we don't get security support for it. For security reasons, we recommend to immediately remove any version of flashplugin-nonfree and any remaining files of the Adobe Flash Player.
Flyspray has been removed since it has proven to be to buggy and not well enough supported for a stable release.
A complete overview of packages that have changed with this release:
The current old stable distribution:
Proposed updates to the oldstable distribution:
Oldstable distribution information (release notes, errata, etc.):
Security announcements and information:
The Debian Project is an association of Free Software developers who volunteer their time and effort in order to produce the completely free operating system Debian GNU/Linux.
For further information, please visit the Debian web pages at https://www.debian.org/, send mail to <firstname.lastname@example.org>, or contact the stable release team at <email@example.com>.