Debian 10219 Published by

Debian GNU/Linux 3.0r5 is now available:

This is the fifth update of Debian GNU/Linux 3.0 (codename ‘woody’) which mainly adds security updates to the stable release, along with a few corrections to serious problems. Those who frequently update from security.debian.org won't have to update many packages and most updates from security.debian.org are included in this update.

Please note that this update does not produce a new version of Debian GNU/Linux 3.0 but only adds a few updated packages to it. There is no need to throw away 3.0 CDs but only to update against ftp.debian.org after an installation, in order to incorporate those late changes.



Upgrading to this revision online is usually done by pointing the ‘apt’ package tool (see the sources.list(5) manual page) to one of Debian's many FTP or HTTP mirrors. A comprehensive list of mirrors is available at:
http://www.debian.org/mirror/list

Security Updates

This revision adds the following security updates to the stable release. The Security Team has already released an advisory for each of these updates.

Debian Security Advisory ID Package(s)
DSA 164 cacti
DSA 190 wmaker
DSA 259 qpopper
DSA 428 slocate
DSA 589 libgd1
DSA 601 libgd1
DSA 619 xpdf
DSA 620 perl
DSA 621 cupsys
DSA 622 htmlheadline
DSA 623 nasm
DSA 624 zip
DSA 625 pcal
DSA 626 tiff
DSA 627 namazu2
DSA 628 imlib2
DSA 629 krb5
DSA 630 lintian
DSA 631 kdelibs
DSA 632 linpopup
DSA 633 bmv
DSA 634 hylafax
DSA 635 exim
DSA 636 glibc
DSA 638 gopher
DSA 639 mc
DSA 640 gatos
DSA 641 playmidi
DSA 642 gallery
DSA 643 queue
DSA 644 chbg
DSA 645 cupsys
DSA 646 imagemagick
DSA 647 mysql
DSA 648 xpdf
DSA 649 xtrlock
DSA 650 sword
DSA 651 squid
DSA 652 unarj
DSA 653 ethereal
DSA 654 enscript
DSA 655 zhcon
DSA 656 vdr
DSA 657 xine-lib
DSA 658 libdbi-perl
DSA 659 libpam-radius-auth
DSA 660 kdebase
DSA 661 f2c
DSA 662 squirrelmail
DSA 663 prozilla
DSA 664 cpio
DSA 665 ncpfs
DSA 666 python2.2
DSA 667 squid
DSA 668 postgresql
DSA 669 php3
DSA 670 emacs20
DSA 671 xemacs21
DSA 672 xview
DSA 673 evolution
DSA 674 mailman
DSA 675 hztty
DSA 676 xpcd
DSA 677 sympa
DSA 678 netkit-rwho
DSA 679 toolchain-source
DSA 680 htdig
DSA 681 synaesthesia
DSA 682 awstats
DSA 683 postgresql
DSA 684 typespeed
DSA 685 emacs21
DSA 686 gftp
DSA 687 bidwatcher
DSA 688 squid
DSA 689 libapache-mod-python
DSA 690 bsmtpd
DSA 691 abuse
DSA 692 kdenetwork
DSA 693 luxman
DSA 694 xloadimage
DSA 695 xli
DSA 696 perl
DSA 697 netkit-telnet
DSA 698 mc
DSA 699 netkit-telnet-ssl
DSA 702 imagemagick
DSA 703 krb5
DSA 704 remstats
DSA 705 wu-ftpd
DSA 706 axel
DSA 707 mysql

Miscellaneous Bugfixes

This revision adds important corrections to the following packages. Most of them don't affect the security of the system, but may affect data integrity.

Package Reason
mm Fix crashing Apache
ssed Serious correction
webmin Fix a regression
Removed Packages

The following packages had to be removed from the distribution:

Package Reason
eemu License violation
gg Program doesn't work anymore
gstar License violation
xzx License violation

A complete list of all accepted and rejected packages together with rationale is on the preparation page for this revision:
http://people.debian.org/~joey/3.0r5/

URLs

The complete lists of packages that have changed with this release:
http://http.us.debian.org/debian/dists/woody/ChangeLog
http://non-us.debian.org/debian-non-US/dists/woody/non-US/ChangeLog

The current stable distribution:
http://ftp.debian.org/debian/dists/stable/
http://non-us.debian.org/debian-non-US/dists/stable/

Proposed updates to the stable distribution:
http://ftp.debian.org/debian/dists/proposed-updates/
http://non-us.debian.org/debian-non-US/dists/proposed-updates/

Stable distribution information (release notes, errata, etc.):
http://www.debian.org/releases/stable/

Security announcements and information:
http://security.debian.org/

About Debian

The Debian Project is an organization of free software developers who volunteer their time and effort in order to produce the completely free operating systems Debian GNU/Linux and Debian GNU/Hurd.