Didn't take long to release new updated version.
The Debian project is pleased to announce the sixth update of its stable distribution Debian GNU/Linux 4.0 (codename "etch"). This update mainly adds corrections for security problems to the stable release, along with a few adjustment to serious problems. This update has been rated as having important security impact. You are advised to upgrade system ASAP.
Those who frequently install updates from security.debian.org won't have to update many packages and most updates from security.debian.org are included in this update.
New CD and DVD images containing updated packages and the regular installation media accompanied with the package archive respectively will be available soon at the regular locations.
Upgrading to this revision online is usually done by pointing the aptitude (or apt) package tool to one of Debian's many FTP or HTTP mirrors. Type the following command as root user to fetch and install all Debian 4 update 6 upgrades:
# apt-get update
# apt-get upgrade
This stable update adds several binary updates for various architectures
to packages whose version was not synchronised across all architectures.
It also adds a few important corrections to the following packages:
Package Reason blender Sanitise Python's default import path devscripts Allow current signed changes files dpkg Improved symlink handling, reenable no-debsig epiphany-browser Allow the deletion of certificates glibc Keep ld.so in optimised libraries graphviz Fix potential arbitrary code execution libhdate Drop binary package libhdate-pascal perl Fix Time::HiRes with kernels >= 2.6.22 postgresql-7.4 Incorporate bug fix releases up to 7.4.23 postgresql-8.1 Incorporate bug fix releases up to 8.1.15 reportbug Support new bugs.debian.org structure spamassassin Fix for denial of service, remove blacklists tdiary Fix a Cross Site Scripting vulnerability websvn Fix potential PHP code execution
This revision adds the following security updates to the stable release. The Security Team has already released an advisory for each of these updates:
Advisory ID Package Correction(s) DSA 1617 refpolicy Incompatible policy DSA 1622 newsx Arbitrary code execution DSA 1635 freetype Several vulnerabilities DSA 1656 cupsys Several vulnerabilities DSA 1657 qemu Denial of service DSA 1658 dbus Denial of service DSA 1659 libspf2 Potential remote code execution DSA 1660 clamav Denial of service DSA 1661 openoffice.org Several vulnerabilities DSA 1662 mysql-dfsg-5.0 Authorization bypass DSA 1663 net-snmp Several vulnerabilities DSA 1665 libcdaudio Arbitrary code execution DSA 1666 libxml2 Several vulnerabilities DSA 1667 python2.4 Several vulnerabilities DSA 1668 hf Arbitrary code execution DSA 1669 xulrunner Several vulnerabilities DSA 1670 enscript Arbitrary code execution DSA 1671 iceweasel Several vulnerabilities DSA 1672 imlib2 Arbitrary code execution DSA 1673 wireshark Several vulnerabilities DSA 1674 jailer Denial of service DSA 1675 phpmyadmin Cross-site scripting DSA 1676 flamethrower Denial of service DSA 1677 cupsys Arbitrary code execution DSA 1679 awstats Cross-site scripting DSA 1681 linux-2.6.24 Several vulnerabilities DSA 1682 squirrelmail Cross site scripting DSA 1683 streamripper Potential code execution DSA 1687 fai-kernels Several vulnerabilities DSA 1687 linux-2.6 Several vulnerabilities DSA 1687 user-mode-linux Several vulnerabilities