Updated Debian 7: 7.4 released

February 8th, 2014

The Debian project is pleased to announce the fourth update of its stable distribution Debian 7 (codename wheezy ). This update mainly adds corrections for security problems to the stable release, along with a few adjustments for serious problems. Security advisories were already published separately and are referenced where available.

Please note that this update does not constitute a new version of Debian 7 but only updates some of the packages included. There is no need to throw away old wheezy CDs or DVDs but only to update via an up-to-date Debian mirror after an installation, to cause any out of date packages to be updated.

Those who frequently install updates from security.debian.org won't have to update many packages and most updates from security.debian.org are included in this update.

New installation media and CD and DVD images containing updated packages will be available soon at the regular locations.

Upgrading to this revision online is usually done by pointing the aptitude (or apt) package tool (see the sources.list(5) manual page) to one of Debian's many FTP or HTTP mirrors. A comprehensive list of mirrors is available at:

Miscellaneous Bugfixes

This stable update adds a few important corrections to the following packages:

Package Reason apache2 Fix mod_rewrite log escaping (CVE-2013-1862), mod_dav denial of service (CVE-2013-1896) and segfaults in certain error conditions base-files Update for the point release ctdb Fix service stop and restart failing when trying to remove a public IP address not assigned locally debian-handbook Update for wheezy debian-installer Rebuild for the point release eglibc Several security fixes; fix SIGFPE when locale-archive has been corrupted to all zeros; kfreebsd: always put supplied extra gid as the first entry of group list in setgroups(); fix sys_ktimer_settime gatling Restore compatibility with PolarSSL security update gnash Fix playing youtube movies using the ffmpeg media handler kexec-tools Handle x.y kernel versions kfreebsd-8 Several security fixes kfreebsd-9 Disable VIA hardware RNG by default; fix lseek ENXIO error condition with ZFS lazr.restfulclient Fix some concurrency issues libapache2-mod-rpaf Restore accidentally dropped IPv6 patch libglib-object-introspection-perl Fix incorrect memory allocation that causes segfaults in reverse-dependencies libhtml-formhandler-perl Fix FTBFS libmicrohttpd Various security issues libnet-mac-vendor-perl Fix FTBFS due to failing t/fetch_oui.t test libotr Disable insecure OTRv1 protocol linux Update to stable 3.2.54; update drm, agp to 3.4.76; fix CVE-2013-4579, CVE-2013-6368, CVE-2014-1446 localepurge Fix CVE-2014-1638, unsafe tempfile creation lxc Use latest upstream provided lxc-debian; add rsync to Recommends mapserver Fix CVE-2013-7262, an SQL injection vulnerability in the msPostGISLayerSetTimeFilter function nut Reset USB timeout to standard 5 seconds openssl Enable assembler for the arm targets; enable ec_nistp_64_gcc_128 on *-amd64 pdns Fix lengths of the records.content and supermasters.ip columns ruby-gsl Remove non-free documentation ruby-opengl Remove example with unclear license rush Fix CVE-2013-6889, file access escalation samhain Disable dnmalloc for all architectures expect those known to work; fix mail sending from default configuration spip Fix XSS on signature from author [CVE-2013-7303] tuxguitar Update list of supported xulrunner versions tzdata New upstream release user-mode-linux Rebuild against Linux kernel 3.2.54-2 vips Fix crash on TIFF with JPEG compression wget Add support for SNI whois New upstream release; update various TLDs xfce4-weather-plugin Fix abort when <hi> element is empty

Security Updates

This revision adds the following security updates to the stable release. The Security Team has already released an advisory for each of these updates:

Advisory ID Package Correction(s) DSA-2749 asterisk Multiple issues DSA-2757 wordpress Multiple issues DSA-2793 libav Multiple issues DSA-2812 samba Multiple issues DSA-2813 gimp Multiple issues DSA-2814 varnish Denial of service DSA-2815 munin Denial of service DSA-2816 php5 Multiple issues DSA-2817 libtar Multiple integer overflows DSA-2818 mysql-5.5 Multiple issues DSA-2820 nspr Integer overflow DSA-2821 gnupg Side channel attack DSA-2822 xorg-server Integer underflow DSA-2823 pixman Integer underflow DSA-2824 curl Unchecked TLS/SSL certificate host name DSA-2825 wireshark Multiple issues DSA-2826 denyhosts Remote denial of ssh service DSA-2827 libcommons-fileupload-java Arbitrary file upload via deserialization DSA-2829 hplip Multiple issues DSA-2830 ruby-i18n Cross-site scripting DSA-2831 puppet Insecure temporary files DSA-2832 memcached Multiple issues DSA-2833 openssl Multiple issues DSA-2834 typo3-src Multiple issues DSA-2835 asterisk Buffer overflow DSA-2836 devscripts Arbitrary code execution DSA-2837 openssl Programming error DSA-2838 libxfont Buffer overflow DSA-2839 spice Denial of service DSA-2840 srtp Buffer overflow DSA-2841 movabletype-opensource Cross-site scripting DSA-2842 libspring-java Multiple issues DSA-2843 graphviz Buffer overflow DSA-2846 libvirt Multiple issues DSA-2847 drupal7 Multiple issues DSA-2849 curl Information disclosure DSA-2850 libyaml Heap-based buffer overflow

Removed packages

The following packages were removed due to circumstances beyond our control:

Package Reason iceape Security support removed

Debian Installer

URLs

The installer has been rebuilt to include the fixes incorporated into stable by the point release.

The complete lists of packages that have changed with this revision:

The current stable distribution:

Proposed updates to the stable distribution:

stable distribution information (release notes, errata etc.):

Security announcements and information:

About Debian

The Debian Project is an association of Free Software developers who volunteer their time and effort in order to produce the completely free operating system Debian.

Contact Information

For further information, please visit the Debian web pages at https://www.debian.org/, send mail to <press@debian.org>, or contact the stable release team at <debian-release@lists.debian.org>.