[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

[riminilug-general] Fwd: [SUA 119-1] Upcoming Debian 8 Update (8.8)



Per domani è previsto il rilascio 8.8 di Linux Debian Jessie.
Non si tratta di una vera e propria release, ma di una bug fixes.

Buon aggiornamento.
UmbertoZ.



---------- Forwarded message ----------
From: Adam D. Barratt <adam@xxxxxxxxxxxxxxxxxxx>
Date: 2017-05-01 23:22 GMT+02:00
Subject: [SUA 119-1] Upcoming Debian 8 Update (8.8)
To: debian-stable-announce@xxxxxxxxxxxxxxxx


-------------------------------------------------------------------------
Debian Stable Updates Announcement SUA 119-1      https://www.debian.org/
debian-release@xxxxxxxxxxxxxxxx                           Adam D. Barratt
May 1st, 2017
-------------------------------------------------------------------------

Upcoming Debian 8 Update (8.8)

An update to Debian 8 is scheduled for Saturday, May 6th, 2017. As of
now it will include the following bug fixes. They can be found in
"jessie-proposed-updates", which is carried by all official mirrors.

Please note that packages published through security.debian.org are not
listed, but will be included if possible. Some of the updates below are
also already available through "jessie-updates".

Testing and feedback would be appreciated. Bugs should be filed in the
Debian Bug Tracking System, but please make the Release Team aware of
them by copying "debian-release@xxxxxxxxxxxxxxxx" on your mails.

The point release will also include a rebuild of debian-installer.

Miscellaneous Bugfixes
----------------------

This stable update adds a few important corrections to the following
packages:

    Package                       Reason

    activemq                      Fix DoS in activemq-core via
shutdown command [CVE-2015-7559]
    apf-firewall                  Add compatibility with kernels >= 3.X
    apt-xapian-index              Remove call to update-python-modules
    base-files                    Update for the point release
    binutils                      Apply patch from upstream to fix gold on arm64
    ca-certificates               Update-ca-certificates: update local
certificates directory when calling --fresh; support running without
hooks
    commons-daemon                Fix ppc64el support
    crafty                        Do not generate CPU specific code
    debian-edu-doc                Update translations
    debian-installer              Rebuild for the point release
    debian-installer-netboot-     Rebuild for the point release
        images
    dropbear                      Fix command restriction bypass in
authorized_keys [CVE-2016-3116], format string injection
[CVE-2016-7406] and arbitrary code execution issues [CVE-2016-7407
CVE-2016-7408]
    erlang                        Fix heap overflow vulnerability in
regular expression parsing [CVE-2016-10253]
    glibc                         Fix PowerPC sqrt inaccuracy
    gnome-media                   Add missing Breaks:
gnome-media-common, libgnome-media-dev, libgnome-media0 to match
Replaces
    gnome-screenshot              Use dash for time format separator
    gnome-settings-daemon         Use dash for time format separator
    gnutls28                      Fix truncation issue in PKCS#12
password encoding; fix double free in certificate information printing
[CVE-2017-5334]; fix memory leak in server side error path; fix memory
leaks and an infinite loop in OpenPGP certificate parsing
[CVE-2017-5335 CVE-2017-5336 CVE-2017-5337]; fix integer overflow in
OpenPGP certificate parsing [CVE-2017-7869]; fix read past the end of
buffer in OpenPGP certificate parsing; fix crashes in OpenPGP
certificate parsing, related to private key parsing
[GNUTLS-SA-2017-3B]; fix possible OOM in OpenPGP certificate parsing
[GNUTLS-SA-2017-3C]
    groovy                        Fix remote code execution
vulnerability via crafted serialized object [CVE-2016-6814]
    groovy2                       Fix remote code execution
vulnerability via crafted serialized object [CVE-2016-6814]
    guile-2.0                     Fix REPL server vulnerability
[CVE-2016-8606], mkdir umask-related vulnerability [CVE-2016-8605]
    initramfs-tools               Include drivers for all keyboards
when MODULES=dep; include most USB host drivers and all bus driver
modules; remove code that prunes 'broken' symlinks and sometimes
/etc/mtab; add all I2C bus and mux drivers when MODULES=most; stop
force-loading drivers found through sysfs when MODULES=dep
    installation-guide            Fix Instructions for creating
syslinux.cfg to work with syslinux 5
    irqbalance                    Only warn once for affinity hint
subset empty irqs
    kup                           Backport changes needed to work with
kernel.org in future
    libdatetime-timezone-perl     Update included data to 2017b;
update included data to 2017a
    libindicate                   libindicate-gtk3-dev: Depend on
libindicate-gtk3-3 instead of libindicate-gtk3
    libmateweather                Rename Rangoon timezone to Yangon
(follow tzdata 2016g change)
    libvirt                       Improve qemu v2.6+ compatibility
    libvorbisidec                 Add libogg-dev dependency to libvorbisidec-dev
    libxslt                       Check for integer overflow in
xsltAddTextString [CVE-2017-5029]
    linux                         Update to new stable release
3.16.43; mm/huge_memory.c: fix up "mm/huge_memory.c: respect
FOLL_FORCE/FOLL_COW for thp" backort
    logback                       Don't deserialize data from
untrusted sockets [CVE-2017-5929]
    lxc                           Ensure target netns is caller-owned
[CVE-2017-5985]
    mariadb-10.0                  Remove the excessive server stopping
and only-cleanup on purge when this is the last MySQL package
    minicom                       Fix out of bounds write in vt100.c
[CVE-2017-7467]
    modsecurity-crs               Fix typo in
modsecurity_crs_16_session_hijacking.conf
    mongodb                       Fix permissions on .dbshell
[CVE-2016-6494]; redact key and nonce from auth attempt logs
    ndisc6                        Use upstream default merge hook when
resolvconf is not available
    ndoutils                      Postrm purge: Check for ucf before calling it
    nvidia-graphics-drivers       New upstream version (340.102)
containing security fixes [CVE-2017-0309 CVE-2017-0310 CVE-2017-0311
CVE-2017-0318 CVE-2017-0321]; fix module build on Linux 4.10 and newer
    nvidia-graphics-drivers-      New upstream version (304.135)
containing security fixes [CVE-2017-0309 CVE-2017-0310 CVE-2017-0311
CVE-2017-0318 CVE-2017-0321]; fix module build on Linux 4.10 and newer
        legacy-304xx
    nvidia-graphics-modules       Rebuild using nvidia-kernel-source 340.102
    openchange                    Fix build failure with samba 4.2
    openmpi                       Libopenmpi1.6: Fix two incorrect
soname links, Use versioned Conflicts: libopenmpi2 (<< 1.6) to not
interfere with upgrades to stretch
    plv8                          Check for permission to call functions
    postfix                       Fix build failure with Linux 4.x
kernels; add delmap to .prerm for all packages that contain map data
types exposed through external .so files so that upgrades to stretch
(where the associated files have moved) will be functional
    postgresql-9.4                New upstream release
    python-cryptography           Fix HKDF issue with small key sizes
[CVE-2016-9243]; fix FTBFS due to SSL2 method detection
    radare2                       Fix denial of service vulnerability
[CVE-2017-6197]
    sane-backends                 Fix security issue [CVE-2017-6318]
    sendmail                      Only touch files as smmsp:smmsp in
/var/run/sendmail/stampdir to avoid possible privilege escalation; use
lockfile-create (from lockfile-progs) instead of touch to manage the
cronjob lockfiles; sendmail-base: Add Depends: netbase for
/etc/services
    sitesummary                   Fix d/sitesummary.prerm and provide
mandatory facilities
    smemstat                      Fix null ptr dereference when UID
can't be read
    spip                          Fix multiple XSS issues, server side
request forgery attacks [CVE-2016-7999], directory traversal
[CVE-2016-7982], arbitrary code execution [CVE-2016-7998], cross-site
request forgery [CVE-2016-7980], cross-site scripting vulnerabilities
[CVE-2016-7981 CVE-2016-9997 CVE-2016-9998 CVE-2016-9152]
    sus                           Update for SUSv4 TC2
    synergy                       Fix a crash when synergyc starts
    systemd                       Fix boolean properties retrieved via
sd-bus on big-endian architectures; systemctl: Add is-enabled support
for SysV init scripts; if the start command vanishes during runtime
don't hit an assert; if an automount unit is masked, don't react to
activation
    transmissionrpc               Add missing dependency from Python
modules to python-six
    tzdata                        Update included data to 2017b;
enable partial translations of debconf templates
    unzip                         Fix buffer overflows in unzip
[CVE-2014-9913] and zipinfo [CVE-2016-9844]
    uwsgi                         Fix compilation with recent glibc
    vim                           Fix buffer overflows when reading
corrupted undo files [CVE-2017-6349 CVE-2017-6350]
    vlc                           New upstream release
    webissues-server              postrm purge: Check for ucf before calling it
    wget                          Fix CRLF injection in URL host parts
[CVE-2017-6508]
    xmobar                        Update weather feed URL
    xshisen                       Fix frequent segfault on start
    yara                          Fix several security issues
[CVE-2016-10210 CVE-2016-10211 CVE-2017-5923 CVE-2017-5924]

A complete list of all accepted and rejected packages together with
rationale is on the preparation page for this revision:

  <https://release.debian.org/proposed-updates/stable.html>

Removed packages
----------------

The following packages will be removed due to circumstances beyond our
control:

    Package                     Reason

    cgiemail                    RC-buggy, unmaintained
    grive                       Broken due to Google API changes
    libapache2-authenntlm-perl  Broken with Apache 2.4
    libwww-dict-leo-org-perl    Broken due to upstream changes
    live-f1                     Broken due to third party changes
    owncloud                    Unsupportable
    owncloud-apps               Unsupportable


If you encounter any issues, please don't hesitate to get in touch with
the Debian Release Team at "debian-release@xxxxxxxxxxxxxxxx".

Attachment: signature.asc
Description: PGP signature

---------------------------------------------------------------------
Per cancellarsi, scrivi a: riminilug-general-unsubscribe@xxxxxxxxxxxx
Se vuoi conoscere altri comandi, scrivi a: riminilug-general-help@xxxxxxxxxxxx