Debian 10173 Published by

The Debian Project has released the final update of its oldstable distribution Debian GNU/Linux 4.0



The Debian project is pleased to announce the ninth and final update of
its oldstable distribution Debian GNU/Linux 4.0 (codename "etch").

This update incorporates all security updates which have been released
for the oldstable release since the previous point release, with one
exception which it was unfortunately not possible to include, together
with a few adjustments to serious problems.

PLEASE NOTE: Security support for the oldstable distribution ended in
February 2010 [1] and no updates have been released since that point.

1: Debian -- News -- Security Support for Debian 4.0 to be terminated

Those who frequently install updates from security.debian.org won't
have to update many packages and most updates from security.debian.org
are included in this update.

New CD and DVD images containing updated packages and the regular
installation media accompanied with the package archive respectively
will be available soon at the regular locations.

Upgrading to this revision online is usually done by pointing the
aptitude (or apt) package tool (see the sources.list(5) manual page) to
one of Debian's many FTP or HTTP mirrors. A comprehensive list of
mirrors is available at:

Getting Debian from the Internet

Please note that the oldstable distribution will be moved from the main
archive to the archive.debian.org repository after June 6th 2010.
After this move, it will no longer be available from the main mirror
network. More information about the distribution archive and a list of
mirrors is available at:

Debian -- Distribution Archives


Miscellaneous Bugfixes
----------------------

This oldstable update adds a few important corrections to the following
packages:

Package Reason

backup-manager Fix disclosure of MySQL passwords to local users
binutils Add mips support for ".set symbol,value" gas syntax
fam Fix 100% CPU usage in famd
fetchmail Fix potential MITM against APOP and potential DoS
freedoom Remove copyright-violating material
glibc Fix incorrect libc6-amd64 dependency
gnupg Fix memory leak and cleanup terminal on interrupt
irssi Fix out of bounds access
kazehakase Disallow adding bookmarks for data:/javascript: URIs
linux-2.6 Several vulnerabilities
linux-2.6.24 Several vulnerabilities
mksh Fix unauthenticated local privilege escalation
mt-daapd Update the embedded prototype.js to fix security issues
openafs Don't create invalid pointers to kernel memory when handling errors
openssl Deprecate MD2 hash signatures and fix several DoS vulnerabilities
serveez Fix remote buffer overflow
tetex-bin Don't fail when LaTeX is more than five years old
texlive-bin Don't fail when LaTeX is more than five years old
texlive-extra Don't fail when LaTeX is more than five years old
texlive-lang Don't fail when LaTeX is more than five years old
wordpress Fix DoS via long title and specially constructed charset parameter
xcftools Fix crash with files containing negative co-ordinates


Debian Installer
----------------

The Debian Installer has been updated in this point release to offer
better support for installation of the "oldstable" distribution and
from archive.debian.org and to resolve issues with checking the GPG
signatures of some files on mirror servers.

The kernel image used by the installer has been updated to incorporate
a number of important and security-related fixes.


Security Updates
----------------

This revision adds the following security updates to the oldstable
release. The Security Team has already released an advisory for each
of these updates:

Advisory ID Package Correction(s)

DSA-1617 refpolicy Incompatible policy from previous DSA
DSA-1622 newsx Arbitrary code execution
DSA-1748 libsoup Arbitrary code execution
DSA-1754 roundup Privilege escalation
DSA-1761 moodle File disclosure
DSA-1762 icu Cross site scripting
DSA-1763 openssl Denial of service
DSA-1763 openssl097 Denial of service
DSA-1765 horde3 Several vulnerabilities
DSA-1766 krb5 Several vulnerabilities
DSA-1767 multipath-tools Denial of service
DSA-1768 openafs Arbitrary code execution
DSA-1770 imp4 Cross-site scripting
DSA-1771 clamav Several vulnerabilities
DSA-1772 udev Privilege escalation
DSA-1773 cupsys Arbitrary code execution
DSA-1775 php-json-ext Denial of service
DSA-1777 git-core Privilege escalation
DSA-1779 apt Several vulnerabilities
DSA-1780 libdbd-pg-perl Arbitrary code execution
DSA-1781 ffmpeg Arbitrary code execution
DSA-1782 mplayer Arbitrary code execution
DSA-1783 mysql-dfsg-5.0 Several vulnerabilities
DSA-1784 freetype Arbitrary code execution
DSA-1786 acpid Denial of service
DSA-1787 linux-2.6.24 Several vulnerabilities
DSA-1789 php5 Several vulnerabilities
DSA-1790 xpdf Several vulnerabilities
DSA-1793 kdegraphics Several vulnerabilities
DSA-1794 user-mode-linux Several vulnerabilities
DSA-1794 fai-kernels Several vulnerabilities
DSA-1794 linux-2.6 Several vulnerabilities
DSA-1796 libwmf Denial of service
DSA-1798 pango1.0 Arbitrary code execution
DSA-1799 qemu Several vulnerabilites
DSA-1801 ntp Buffer overflows allowing DoS or code execution
DSA-1802 squirrelmail Code execution vulnerability in map_yp_alias function
DSA-1803 nsd Denial of service
DSA-1804 ipsec-tools Denial of service
DSA-1805 gaim Several vulnerabilities
DSA-1806 cscope Arbitrary code execution
DSA-1807 cyrus-sasl2 Fixes arbirary code execution
DSA-1810 cupsys Denial of service
DSA-1810 libapache-mod-jk Information disclosure
DSA-1812 apr-util Several vulnerabilities
DSA-1813 evolution-data-server Regressions in previous security update
DSA-1814 libsndfile Arbitrary code execution
DSA-1816 apache2 Privilege escalation
DSA-1816 apache2-mpm-itk Rebuild against apache2 2.2.3-4+etch8
DSA-1818 gforge Insufficient input sanitising
DSA-1819 vlc Several vulnerabilities
DSA-1824 phpmyadmin Several vulnerabilities
DSA-1825 nagios2 Arbitrary code execution
DSA-1826 eggdrop Several vulnerabilities
DSA-1829 sork-passwd-h3 Regression in previous security update
DSA-1832 camlimages Arbitrary code execution
DSA-1833 dhcp3 Arbitrary code execution
DSA-1834 apache2 Denial of service
DSA-1834 apache2-mpm-itk Denial of service
DSA-1835 tiff Several vulnerabilities
DSA-1837 dbus Denial of service
DSA-1839 gst-plugins-good0.10 Arbitrary code execution
DSA-1841 git-core Denial of service
DSA-1842 openexr Several vulnerabilities
DSA-1847 bind9 Denial of service
DSA-1848 znc Remote code execution
DSA-1849 xml-security-c Signature forgery
DSA-1850 libmodplug Arbitrary code execution
DSA-1851 gst-plugins-bad0.10 Arbitrary code execution
DSA-1852 fetchmail SSL certificate verification weakness
DSA-1853 memcached Arbitrary code execution
DSA-1854 apr-util Arbitrary code execution
DSA-1854 apr Arbitrary code execution
DSA-1855 subversion Arbitrary code execution
DSA-1857 camlimages Arbitrary code execution
DSA-1858 imagemagick Several vulnerabilities
DSA-1859 libxml2 Several issues
DSA-1860 ruby1.8 Several issues
DSA-1860 ruby1.9 Several issues
DSA-1861 libxml Several issues
DSA-1863 zope2.9 Arbitrary code execution
DSA-1865 fai-kernels Several vulnerabilities
DSA-1865 user-mode-linux Several vulnerabilities
DSA-1866 kdegraphics Several vulnerabilities
DSA-1867 kdelibs Several vulnerabilities
DSA-1869 curl SSL certificate verification weakness
DSA-1871 wordpress Regression fix
DSA-1872 fai-kernels Several vulnerabilities
DSA-1872 user-mode-linux Several vulnerabilities
DSA-1877 mysql-dfsg-5.0 Arbitrary code
DSA-1878 devscripts Remote code execution
DSA-1880 openoffice.org Arbitrary code execution
DSA-1882 xapian-omega Cross-site scripting
DSA-1883 nagios2 Several cross-site scriptings
DSA-1884 nginx Arbitrary code execution
DSA-1888 openssl Deprecate MD2 hash signatures and fix several DoS vulnerabilities
DSA-1888 openssl097 Deprecate MD2 hash signatures
DSA-1889 icu Security bypass due to multibyte sequence parsing
DSA-1890 wxwindows2.4 Arbitrary code execution
DSA-1890 wxwidgets2.6 Arbitrary code execution
DSA-1891 changetrack Arbitrary code execution
DSA-1892 dovecot Arbitrary code execution
DSA-1893 cyrus-imapd-2.2 Arbitrary code execution
DSA-1893 kolab-cyrus-imapd Arbitrary code execution
DSA-1894 newt Arbitrary code execution
DSA-1896 opensaml Potential code execution
DSA-1896 shibboleth-sp Potential code execution
DSA-1897 horde3 Arbitrary code execution
DSA-1898 openswan Denial of service
DSA-1899 strongswan Denial of service
DSA-1900 postgresql-7.4 Various problems
DSA-1900 postgresql-8.1 Various problems
DSA-1901 mediawiki1.7 Several vulnerabilities
DSA-1902 elinks Arbitrary code execution
DSA-1903 graphicsmagick Several vulnerabilities
DSA-1904 wget SSL certificate verification weakness
DSA-1909 postgresql-ocaml Missing escape function
DSA-1910 mysql-ocaml Missing escape function
DSA-1911 pygresql Missing escape function
DSA-1912 camlimages Arbitrary code execution
DSA-1912 advi Arbitrary code execution
DSA-1914 mapserver Serveral vulnerabilities
DSA-1916 kdelibs SSL certificate verification weakness
DSA-1917 mimetex Several vulnerabilities
DSA-1918 phpmyadmin Several vulnerabilities
DSA-1919 smarty Several vulnerabilities
DSA-1920 nginx Denial of service
DSA-1921 expat Denial of service
DSA-1923 libhtml-parser-perl Denial of service
DSA-1925 proftpd-dfsg SSL certificate verification weakness
DSA-1926 typo3-src Several vulnerabilities
DSA-1928 linux-2.6.24 Several vulnerabilities
DSA-1929 linux-2.6 Several vulnerabilities
DSA-1933 cupsys Cross-site scripting
DSA-1934 apache2 Several issues
DSA-1934 apache2-mpm-itk Several issues
DSA-1935 gnutls13 SSL certificate
DSA-1936 libgd2 Several vulnerabilities
DSA-1937 gforge Cross-site scripting
DSA-1938 php-mail Insufficient input sanitising
DSA-1939 libvorbis Several vulnerabilities
DSA-1940 php5 Multiple issues
DSA-1942 wireshark Several vulnerabilities
DSA-1943 openldap2.3 SSL certificate
DSA-1944 request-tracker3.6 Session hijack vulnerability
DSA-1944 request-tracker3.4 Session hijack vulnerability
DSA-1945 gforge Denial of service
DSA-1946 belpic Cryptographic weakness
DSA-1947 shibboleth-sp Cross-site scripting
DSA-1948 ntp Denial of service
DSA-1951 firefox-sage Insufficient input sanitizing
DSA-1953 expat Regression fix
DSA-1954 cacti Insufficient input sanitising
DSA-1955 network-manager Information disclosure
DSA-1958 libtool Privilege escalation
DSA-1960 acpid Weak file permissions
DSA-1961 bind9 Cache poisoning
DSA-1964 postgresql-8.1 Several vulnerabilities
DSA-1964 postgresql-7.4 Several vulnerabilities
DSA-1966 horde3 Cross-site scripting
DSA-1968 pdns-recursor Cache poisoning
DSA-1969 krb5 Denial of service
DSA-1971 libthai Arbitrary code execution
DSA-1972 audiofile Buffer overflow
DSA-1973 glibc Information disclosure
DSA-1974 gzip Arbitrary code execution
DSA-1977 python2.4 Several vulnerabilities
DSA-1977 python2.5 Several vulnerabilities
DSA-1979 lintian Multiple vulnerabilities
DSA-1980 ircd-hybrid Arbitrary code execution
DSA-1981 maildrop Privilege escalation
DSA-1982 hybserv Denial of service
DSA-1984 libxerces2-java Denial of service
DSA-1985 sendmail Insufficient input validation
DSA-1987 lighttpd Denial of service
DSA-1989 fuse Denial of service
DSA-1991 squid3 Denial of service
DSA-1991 squid Denial of service
DSA-1992 chrony Denial of service
DSA-1994 ajaxterm Session hijacking
DSA-1995 openoffice.org Several vulnerabilities
DSA-1997 mysql-dfsg-5.0 Several vulnerabilities
DSA-2003 fai-kernels Several vulnerabilities
DSA-2003 user-mode-linux Several vulnerabilities
DSA-2003 linux-2.6 Several vulnerabilities
DSA-2004 linux-2.6.24 Several vulnerabilities


Unfortunately it was not possible to include the security updates for
the lcms package in this point release due to a mismatch between the
upstream tarball used for the security update and that already present
in the oldstable distribution.


Removed packages
----------------

The following packages were removed due to circumstances beyond our
control:

Package Reason

destar Security issues
libclass-dbi-loader-relationship-perl License problems
libhdate-pascal [source:hdate] Licensing issues
loop-aes-modules-2.6-sparc32 [source:loop-aes] Corresponding source / kernel no longer in the archive
loop-aes-modules-2.6-sparc64 [source:loop-aes] Corresponding source / kernel no longer in the archive
loop-aes-modules-2.6-sparc64-smp [source:loop-aes] Corresponding source / kernel no longer in the archive
loop-aes-modules-2.6-vserver-sparc64 [source:loop-aes] Corresponding source / kernel no longer in the archive
rails Security and usability issues

A few further packages were removed as a result, as they depend on
libclass-dbi-loader-relationship-perl; these packages are:

maypole
maypole-authentication-usersession-cookie
maypole-plugin-upload
memories


Additionally those parts of the libwww-search-perl and
libperl4caml-ocaml-dev packages which rely on the Google SOAP search
API (provided by libnet-google-perl) are no longer functional as the
API has been retired by Google. The remaining portions of the packages
will continue to function as before.


About Debian
------------

The Debian project is an organisation of Free Software developers who
volunteer their time and effort, collaborating via the Internet. Their
tasks include maintaining and updating Debian GNU/Linux which is a free
distribution of the GNU/Linux operating system. Debian's dedication to
Free Software, its non-profit nature, and its open development model
makes it unique among GNU/Linux distributions.