Warning: Invalid argument supplied for foreach() in /web/website/www.ownlinux.cn/www/wp-content/plugins/alimama-deluxe/alimama-deluxe.php on line 925 Debian GNU/Linux 3.1 最后一次更新今天发布| OwnLinux.org
14
4月

Debian GNU/Linux 3.1 最后一次更新今天发布

Debian今天宣布第八次也是最后一次更新其以前发布的稳定版Debian GNU / Linux 3.1 (代号” sarge”),此次日更新主要是对老版本增加了一些安全上的修正,对一系列的问题都做了一定的调整.用户可能通过”apt”进行在线升级.那些经常从security.debian.org安装更新的用户,此次不会有太多的软件包需要更新,所有的更新都能从security.debian.org下载,包括在此次更新.

BUG修正

软件包 原因
unrar-nonfree Fix a buffer overflow (CVE-2007-0855)
wesnoth Bring architectures back in sync
pwlib Bring architectures back in sync
sing Fix privilege escalation
alsa-modules-i386 Built against the fixed 2.6 ABI, but the old 2.4 ABI
fai-kernels Built against the fixed 2.6 ABI, but the old 2.4 ABI

安全更新

这次对旧的稳定版增加了以下的安全更新。安全小组已经发布了一份公告,分别为以下的更新:

Advisory ID Package Correction(s)
DSA-1438 tar

Fix several vulnerabilities

DSA-1445

maradns

Fix denial of service vulnerability

DSA-1446

ethereal

Fix denial of service vulnerability

DSA-1448

eggdrop

Fix execution of arbitrary code

DSA-1449

loop-aes-utils

Fix programming error

DSA-1450

util-linux

Fix programming error

DSA-1452

wzdftpd

Fix denial of service vulnerability

DSA-1458

openafs

Fix denial of service vulnerability

DSA-1459

gforge

Fix SQL injection

DSA-1461

libxml2

Fix denial of service vulnerability

DSA-1463

postgresql

Fix several vulnerabilities

DSA-1466

xfree86

Fix several vulnerabilities

DSA-1467

mantis

Fix several vulnerabilities

DSA-1469

flac

Fix arbitrary code execution

DSA-1471

libvorbis

Fix several vulnerabilities

DSA-1472

xine-lib

Fix arbitrary code execution

DSA-1473

scponly

Fix arbitrary code execution

DSA-1482

squid

Fix denial of service vulnerability

DSA-1487

libexif

Fix several vulnerabilities

DSA-1488

phpbb

Fix several vulnerabilities

DSA-1490

tk8.3

Fix arbitrary code execution

DSA-1491

tk8.4

Fix arbitrary code execution

DSA-1493

sdl-image1.2

Fix arbitrary code execution

DSA-1495

nagios-plugins

Fix several vulnerabilities

DSA-1499

pcre3

Fix arbitrary code execution

DSA-1504

kernel-source-2.6.8

Fix several issues

DSA-1505

alsa-driver

Fix kernel memory leak

DSA-1507

turba2

Fix permission testing

DSA-1508

sword

Fix arbirary shell command execution

DSA-1510

gs-esp

Fix arbitrary code execution

DSA-1510

gs-gpl

Fix arbitrary code execution

DSA-1512

evolution

Fix arbitrary code execution

DSA-1515

libnet-dns-perl

Fix several vulnerabilities

DSA-1518

backup-manager

Fix information disclosure

DSA-1519

horde3

Fix information disclosure

DSA-1520

smarty

Fix arbitrary code execution

DSA-1522

unzip

Fix potential code execution

DSA-1524

krb5

Fix multiple vulnerabilities

DSA-1527

debian-goodies

Fix privilege escalation

DSA-1533

exiftags

Fix several vulnerabilities

DSA-1536

xine-lib

Fix several vulnerabilities

完整的清单:

http://release.debian.org/stable/3.1/3.1r8/

删除的软件包:

flashplugin-nonfree已被删除,因为这它是没有开放闭源代码,我们不能得到它的安全支持。出于安全考虑,我们建议立即删除任何版本的flashplugin-nonfree和其余下的任何文件。

详情请看Debian官方网站:

http://www.debian.org/News/2008/20080413

原载: OwnLinux.org
原文标题: Debian GNU/Linux 3.1 最后一次更新今天发布
原文链接:http://www.ownlinux.org/2008/04/14/debian-gnulinux-31.html
OwnLinux.org 版权所有,转载时必须以链接形式注明作者和原始出处及本声明。否则,请勿转载!!


任何商业网站未经许可请勿转摘!本站将保留追究其法律责任的权利。

没有评论

第一个在本文留言。

发表评论

名字(必须)
邮箱(不会被公布)(必须)
网址

字体为 粗体 是必填项目,邮箱地址 永远不会 公布。

允许部分 HTML 代码:
<a href="" title=""> <abbr title=""> <acronym title=""> <b> <blockquote cite=""> <cite> <code> <del datetime=""> <em> <i> <q cite=""> <s> <strike> <strong>
URLs(网站链接)必须完整有效 (比如: http://www.ownlinux.org),所有标签都必须完整的关闭。

超出部分系统将会自动分段及换行。

请保证评论内容是与日志或 Blog 内容相关的,灌水、攻击性或不恰当的评论 可能 会被编辑或删除。

    站内搜索

    赞助商

    标签

    最近访问