Debian GNU/Linux 4.0 Update 6 Released

Didn’t take long to release new updated version.

The Debian project is pleased to announce the sixth update of its stable distribution Debian GNU/Linux 4.0 (codename “etch”). This update mainly adds corrections for security problems to the stable release, along with a few adjustment to serious problems. This update has been rated as having important security impact. You are advised to upgrade system ASAP.

Those who frequently install updates from won’t have to update many packages and most updates from are included in this update.

New CD and DVD images containing updated packages and the regular installation media accompanied with the package archive respectively will be available soon at the regular locations.

Upgrading to this revision online is usually done by pointing the aptitude (or apt) package tool to one of Debian’s many FTP or HTTP mirrors. Type the following command as root user to fetch and install all Debian 4 update 6 upgrades:
# apt-get update
# apt-get upgrade

Miscellaneous Bugfixes

This stable update adds several binary updates for various architectures
to packages whose version was not synchronised across all architectures.
It also adds a few important corrections to the following packages:

    Package                     Reason

    blender                     Sanitise Python's default import path
    devscripts                  Allow current signed changes files
    dpkg                        Improved symlink handling, reenable no-debsig
    epiphany-browser            Allow the deletion of certificates
    glibc                       Keep in optimised libraries
    graphviz                    Fix potential arbitrary code execution
    libhdate                    Drop binary package libhdate-pascal
    perl                        Fix Time::HiRes with kernels >= 2.6.22
    postgresql-7.4              Incorporate bug fix releases up to 7.4.23
    postgresql-8.1              Incorporate bug fix releases up to 8.1.15
    reportbug                   Support new structure
    spamassassin                Fix for denial of service, remove blacklists
    tdiary                      Fix a Cross Site Scripting vulnerability
    websvn                      Fix potential PHP code execution

Security Updates

This revision adds the following security updates to the stable release. The Security Team has already released an advisory for each of these updates:

    Advisory ID         Package                 Correction(s)

    DSA 1617            refpolicy               Incompatible policy
    DSA 1622            newsx                   Arbitrary code execution
    DSA 1635            freetype                Several vulnerabilities
    DSA 1656            cupsys                  Several vulnerabilities
    DSA 1657            qemu                    Denial of service
    DSA 1658            dbus                    Denial of service
    DSA 1659            libspf2                 Potential remote code execution
    DSA 1660            clamav                  Denial of service
    DSA 1661            Several vulnerabilities
    DSA 1662            mysql-dfsg-5.0          Authorization bypass
    DSA 1663            net-snmp                Several vulnerabilities
    DSA 1665            libcdaudio              Arbitrary code execution
    DSA 1666            libxml2                 Several vulnerabilities
    DSA 1667            python2.4               Several vulnerabilities
    DSA 1668            hf                      Arbitrary code execution
    DSA 1669            xulrunner               Several vulnerabilities
    DSA 1670            enscript                Arbitrary code execution
    DSA 1671            iceweasel               Several vulnerabilities
    DSA 1672            imlib2                  Arbitrary code execution
    DSA 1673            wireshark               Several vulnerabilities
    DSA 1674            jailer                  Denial of service
    DSA 1675            phpmyadmin              Cross-site scripting
    DSA 1676            flamethrower            Denial of service
    DSA 1677            cupsys                  Arbitrary code execution
    DSA 1679            awstats                 Cross-site scripting
    DSA 1681            linux-2.6.24            Several vulnerabilities
    DSA 1682            squirrelmail            Cross site scripting
    DSA 1683            streamripper            Potential code execution
    DSA 1687            fai-kernels             Several vulnerabilities
    DSA 1687            linux-2.6               Several vulnerabilities
    DSA 1687            user-mode-linux         Several vulnerabilities

Debian GNU/Linux 4.0 updated

🐧 Get the latest tutorials on Linux, Open Source & DevOps via RSS feed or Weekly email newsletter.

🐧 0 comments... add one
CategoryList of Unix and Linux commands
Disk space analyzersncdu pydf
File Managementcat
FirewallAlpine Awall CentOS 8 OpenSUSE RHEL 8 Ubuntu 16.04 Ubuntu 18.04 Ubuntu 20.04
Network UtilitiesNetHogs dig host ip nmap
OpenVPNCentOS 7 CentOS 8 Debian 10 Debian 8/9 Ubuntu 18.04 Ubuntu 20.04
Package Managerapk apt
Processes Managementbg chroot cron disown fg jobs killall kill pidof pstree pwdx time
Searchinggrep whereis which
User Informationgroups id lastcomm last lid/libuser-lid logname members users whoami who w
WireGuard VPNAlpine CentOS 8 Debian 10 Firewall Ubuntu 20.04
0 comments… add one

Leave a Reply

Your email address will not be published.

Use HTML <pre>...</pre> for code samples. Still have questions? Post it on our forum