Updated Debian 7: 7.11 released
June 4th, 2016
The Debian project is pleased to announce the eleventh (and final) update of its
oldstable distribution Debian 7 (codename
This update mainly adds corrections for security problems to the oldstable
release, along with a few adjustments for serious problems. Security advisories
were already published separately and are referenced where available.
The packages from DSA 3548 are not included
in this point release for technical reasons, as are some architectures for
DSA 3547, DSA 3219, DSA 3482 and DSA 3246. All other security updates
released during the lifetime of
wheezy that have not previously been
part of a point release are included in this update.
Please note that this update does not constitute a new version of Debian
7 but only updates some of the packages included. There is
no need to throw away old
wheezy CDs or DVDs but only to update
via an up-to-date Debian mirror after an installation, to cause any out of
date packages to be updated.
Those who frequently install updates from security.debian.org won't have to update many packages and most updates from security.debian.org are included in this update.
New installation media and CD and DVD images containing updated packages will be available soon at the regular locations.
Upgrading to this revision online is usually done by pointing the aptitude (or apt) package tool (see the sources.list(5) manual page) to one of Debian's many FTP or HTTP mirrors. A comprehensive list of mirrors is available at:
This oldstable update adds a few important corrections to the following packages:
|base-files||Update for the point release|
|debian-installer||Rebuild for the point release|
|debian-installer-netboot-images||Rebuild for the point release; swap the d-i Built-Using with the installer fetching, to fail on version mismatches earlier|
|dpkg||Remove trailing space before handling blank line dot-separator in Dpkg::Control::HashCore. Regression introduced in dpkg 1.16.16; only use the SHELL environment variable for interactive shells; move tar option --no-recursion before -T in dpkg-deb; initialize Config-Version also for packages previously in triggers-pending state; fix memory leak in dpkg infodb format upgrade logic; fix physical file offset comparison in dpkg|
|groovy||Fix remote execution of untrusted code and possible DoS vulnerability [CVE-2015-3253]|
|gtk+3.0||Fix integer overflow when allocating a large block of memory in gdk_cairo_set_source_pixbuf [CVE-2013-7447]|
|highlight||Avoid segfault with undefined syntax|
|icecast2||Security fix [CVE-2014-9018]|
|libcrypto++||Fix Rijndael timing attack counter measure [CVE-2016-3995]|
|libdatetime-timezone-perl||Update to tzdata 2016d|
|openldap||Disable the back-mdb test suite on powerpc to work around back-mdb tests failing on buildds running the jessie ppc64 kernel, which uses 64KB pages|
|optipng||Fix use-after-free vulnerability [CVE-2015-7801]|
|postgresql-9.1||New upstream release|
|tzdata||New upstream version|
|xapian-core||Fix possible database corruption, especially with recoll|
|zendframework||Fix regression from ZF2015-08: binary data corruption; fix ZF2016-01: Potential Insufficient Entropy Vulnerability in ZF1|
This revision adds the following security updates to the oldstable release. The Security Team has already released an advisory for each of these updates:
Debian InstallerThe installer has been updated to include the fixes incorporated into oldstable by the point release.
The complete lists of packages that have changed with this revision:
The current oldstable distribution:
Proposed updates to the oldstable distribution:
oldstable distribution information (release notes, errata etc.):
Security announcements and information:
The Debian Project is an association of Free Software developers who volunteer their time and effort in order to produce the completely free operating system Debian.
For further information, please visit the Debian web pages at https://www.debian.org/, send mail to <email@example.com>, or contact the stable release team at <firstname.lastname@example.org>.