Debian GNU/Linux 4.0 updated

This entry was posted by Sunday, 12 April, 2009
Read the rest of this entry »

The Debian Project
Debian GNU/Linux 4.0 updated
April 8th, 2009

Debian GNU/Linux 4.0 updated

The Debian project is pleased to announce the eighth update of its
oldstable distribution Debian GNU/Linux 4.0 (codename “etch”). This
update mainly adds corrections for security problems to the oldstable
release, along with a few adjustment to serious problems.

Please note that this update does not constitute a new version of Debian
GNU/Linux 4.0 but only updates some of the packages included. There is
no need to throw away 4.0 CDs or DVDs but only to update via an up-to-
date Debian mirror after an installation, to cause any out of date
packages to be updated.

Those who frequently install updates from won’t have
to update many packages and most updates from are
included in this update.

New CD and DVD images containing updated packages and the regular
installation media accompanied with the package archive respectively will
be available soon at the regular locations.

Upgrading to this revision online is usually done by pointing the
aptitude (or apt) package tool (see the sources.list(5) manual page) to
one of Debian’s many FTP or HTTP mirrors. A comprehensive list of
mirrors is available at:


Miscellaneous Bugfixes

This oldstable update adds a few important corrections to the following

Package Reason

libweather-com-perl Adopt to’s interface changes
optipng Fix array overflow vulnerability
pam Fix signedness error in _pam_StrTok
postgresql-8.1 New upstream bugfix release 8.1.17
sleuthkit Fix license issue
debian-installer Include the updated archive key.
debian-archive-keyring Add new archive key

Security Updates

This revision adds the following security updates to the stable release.
The Security Team has already released an advisory for each of these

Advisory ID Package Correction(s)

DSA-1622 newsx Arbitrary code execution
DSA-1712 rt2400 Arbitrary code execution
DSA-1713 rt2500 Arbitrary code execution
DSA-1714 rt2570 Arbitrary code execution
DSA-1716 vnc4 Remote code execution
DSA-1717 devil Buffer overflow
DSA-1718 boinc Validation bypass
DSA-1719 gnutls13 Certificate validation
DSA-1720 typo3-src Several vulnerabilities
DSA-1721 libpam-krb5 Local privilege escalation
DSA-1722 libpam-heimdal Local privilege escalation
DSA-1723 phpmyadmin Arbitrary code execution
DSA-1724 moodle Several vulnerabilities
DSA-1726 python-crypto Denial of service
DSA-1729 gst-plugins-bad0.10 Multiple vulnerabilities
DSA-1731 ndiswrapper Arbitrary code execution vulnerability
DSA-1732 squid3 Denial of service
DSA-1733 vim Multiple vulnerabilities
DSA-1735 znc Privelege escalation
DSA-1737 wesnoth Several vulnerabilities
DSA-1738 curl Arbitrary file access
DSA-1740 yaws Denial of service
DSA-1742 libsndfile Arbitrary code execution
DSA-1743 libtk-img Arbitrary code execution
DSA-1746 gs-gpl Arbitrary code execution
DSA-1747 glib2.0 Arbitrary code execution
DSA-1750 libpng Several vulnerabilities
DSA-1759 strongswan Denial of service
DSA-1760 openswan Denial of service

A complete list of all accepted and rejected packages together with
rationale is on the preparation page for this revision:



The complete lists of packages that have changed with this revision:


The current oldstable distribution:


Proposed updates to the stable distribution:


oldstable distribution information (release notes, errata etc.):


Security announcements and information:

About Debian

The Debian Project is an association of Free Software developers who
volunteer their time and effort in order to produce the completely free
operating systems Debian GNU/Linux.

Leave a Reply