Updated Debian 8: 8.3 released

January 23rd, 2016

The Debian project is pleased to announce the third update of its stable distribution Debian 8 (codename jessie ). This update mainly adds corrections for security problems to the stable release, along with a few adjustments for serious problems. Security advisories were published separately and are referenced where applicable.

Please note that this update does not constitute a new version of Debian 8 but only updates some of the packages included. There is no need to throw away old jessie CDs or DVDs but only to update via an up-to-date Debian mirror after an installation, to cause any out of date packages to be updated.

Those who frequently install updates from security.debian.org won't have to update many packages and most updates from security.debian.org are included in this update.

New installation media and CD and DVD images containing updated packages will be available soon at the regular locations.

Upgrading to this revision online is usually done by pointing the aptitude (or apt) package tool (see the sources.list(5) manual page) to one of Debian's many FTP or HTTP mirrors. A comprehensive list of mirrors is available at:

Miscellaneous Bugfixes

This stable update adds important corrections to the following packages:

Package Reason android-platform-frameworks-base [i386] rebuild to fix dependency on android-libhost apache2 Fix split-logfile to work with current perl, secondary-init-script to not source the main init script with 'set -e', tests on deferred MPM switch; add versioned Replaces / Breaks for libapache2-mod-macro apt Hide first pdiff merge failure debug message; fix marking of deps of pkgs in APT::Never-MarkAuto-Sections as manual; do not parse Status fields from remote sources apt-dater-host Fix kernel version detection apt-offline Add missing dependency on python-apt arb Skip compiler version check augeas HTTPD lense: include /etc/apache2/conf-available directory, allow EOL comments after section tags base-files Update for the 8.3 point release; os-release: drop trailing slash in SUPPORT_URL variable bcfg2 Support Django 1.7 ben Fix buildd.debian.org compact links; ignore potential errors when deleting lock file; call dose-debcheck with --deb-native-arch ca-certificates Update Mozilla certificate authority bundle to version 2.6 ceph URL-encode bucket name [CVE-2015-5245] charybdis Security fix [CVE-2015-5290]; initialise gnutls properly chrony Build depend on libcap-dev, to allow dropping of privileges commons-httpclient Ensure HTTPS calls use http.socket.timeout during SSL Handshake [CVE-2015-5262] cpuset Update filesystem namespace prefix patch curlftpfs Avoid unsafe cast for getpass() on 64-bit architectures dbconfig-common Fix permissions of PostgreSQL backup files debian-handbook Update for Jessie debian-installer Re-introduce installer images for QNAP TS-x09; provide u-boot images for plug computers; add the part_gpt module into the core grub image; add beep to UEFI x86 boot menu; add 's' shortcut for speech to UEFI x86 boot menu; exclude usb-serial-modules from the armel network-console image and usb-modules explicitly on armel/orion5x network-console; drop the file extension from the initrd for QNAP devices; adjust p-u support to handle file:// instead of (f|ht)tp:// only debian-installer-netboot-images Rebuild for the point release docbook2x Do not install info/dir.gz files doctrine Fix directory permissions issue [CVE-2015-5723] drbd-utils Fix drbdadm adjust with IPv6 peer addresses ejabberd Fix broken LDAP queries exfat-utils Fix buffer overflow and infinite loop exim4 Fix some MIME ACL related crashes; fix a bug causing duplicate deliveries, especially on TLS connections fglrx-driver New upstream release; fix security issue [CVE-2015-7724] file Fix --parameter handling flash-kernel Avoid waiting for Ctrl-C if any debconf frontend is in use fuse-exfat Fix buffer overflow and infinite loop ganglia-modules-linux Only restart the ganglia service after installation if it was previously running getmail4 Set poplib._MAXLINE=1MB glance Prevent image status being directly modified via v1 API [CVE-2015-5251] glibc Fix getaddrinfo sometimes returning uninitialized data with nscd; fix data corruption while reading the NSS files database [CVE-2015-5277]; fix buffer overflow (read past end of buffer) in internal_fnmatch; fix _IO_wstr_overflow integer overflow; fix unexpected closing of nss_files databases after lookups, causing denial of service [CVE-2014-8121]; fix NSCD netgroup cache; unconditionally disable LD_POINTER_GUARD; mangle function pointers in tls_dtor_list; fix memory allocations issues that can lead to buffer overflows on the stack; update TSX blacklist to also include some Broadwell CPUs gnome-orca Ensure correct focus on password entry, so characters are not echoed gnome-shell-extension-weather Display a warning if API key has not been supplied by the user, since querying openweathermap.org no longer works without such a key gummi Avoid predictable naming of temporary files [CVE 2015-7758] human-icon-theme debian/clean-up.sh: do not run processes in background ieee-data Update included data files, adding mam.txt and oui36.txt; stop downloading via HTTPS, as neither wget nor curl support TLS AIA, as now used by standards.ieee.org intel-microcode Update included microcode iptables-persistent Stop rules files being world-readable; rewrite README isc-dhcp Fix error when maximum lease time is used on 64-bit systems keepassx Fix storage of passwords in clear text [CVE-2015-8378] libapache-mod-fastcgi Switch B-D from libtool to libtool-bin to fix build failure libapache2-mod-perl2 Fix crashes in modperl_interp_unselect() libcgi-session-perl Untaint raw data coming from session storage backends, fixing a regression caused by CVE-2015-8607 fixes in perl libdatetime-timezone-perl New upstream release libencode-perl Correctly handle a lack of BOM when decoding libhtml-scrubber-perl Fix cross-site scripting vulnerability in comments [CVE-2015-5667] libinfinity Fix possible crashes when an entry is removed from the document browser and when access control lists are enabled libiptables-parse-perl Fix use of predictable names for temporary files [CVE-2015-8326] libraw Fix index overflow in smal_decode_segment [CVE-2015-8366]; fix memory objects are not initialized properly [CVE-2015-8367] libssh Fix null pointer dereference due to a logical error in the handling of a SSH_MSG_NEWKEYS and KEXDH_REPLY packets [CVE-2015-3146] linux Update to upstream release 3.16.7-ctk20; nbd: restore request timeout detection; [x86] enable PINCTRL_BAYTRAIL; [mips*/octeon] enable CAVIUM_CN63XXP1; firmware_class: fix condition in directory search loop; [x86] KVM: svm: unconditionally intercept #DB [CVE-2015-8104] linux-tools Add new hyperv-daemons package lldpd Fix a segfault and an assertion error when receiving incorrectly formed LLDP management addresses madfuload Use autoreconf -fi to fix build failure with automake 1.14 mdadm Disable incremental assembly, as it can cause issues booting a degraded RAID mkvmlinuz Direct run-parts output to stderr monit Fix umask-related regression from 5.8.1 mpm-itk Fix an issue where closing of connections was attempted in the parent. This would result in Connection: close not being honoured, and various odd effects with SSL keepalive in certain browsers multipath-tools Fix discovery of devices with blank sysfs attribute; add documentation to cover additional friendly names scenarios; init: fix stop failure when no root device is found; use 'SCSI_IDENT_.*' as the default property whitelist netcfg Fix is_layer3_qeth on s390x to avoid bailing out if the network driver is not qeth nvidia-graphics-drivers New upstream release [CVE-2015-5950]; fix Unsanitized User Mode Input issue [CVE-2015-7869] nvidia-graphics-drivers-legacy-304xx New upstream release; fix unsanitized User Mode Input issue [CVE-2015-7869] nvidia-graphics-modules Rebuild against nvidia-kernel-source 340.96 openldap Fix a crash when adding a large attribute value with the auditlog overlay enabled openvpn Add --no-block to if-up.d script to avoid hanging boot on interfaces with openvpn instances owncloud Fix local file inclusion on Microsoft Windows Platform [CVE-2015-4716], resource exhaustion when sanitizing filenames [CVE-2015-4717], command injection when using external SMB storage [CVE-2015-4718], calendar export: Authorization Bypass Through User-Controlled Key [CVE-2015-6670]; fix reflected XSS in OCS provider discovery [oc-sa-2016-001] [CVE-2016-1498], disclosure of files that begin with \ .v\ due to unchecked return value [oc-sa-2016-003] [CVE-2016-1500], information exposure via directory listing in the file scanner [oc-sa-2016-002] [CVE-2016-1499], installation path disclosure through error message [oc-sa-2016-004] [CVE-2016-1501] pam Fix DoS / user enumeration due to blocking pipe in pam_unix [CVE-2015-3238] pcre3 Fix security issues [CVE-2015-2325 CVE-2015-2326 CVE-2015-3210 CVE-2015-5073 CVE-2015-8384 CVE-2015-8388] pdns Fix upgrades with default configuration perl Correctly handle a lack of BOM when decoding php-auth-sasl Rebuild with pkg-php-tools 1.28 to correct PHP dependencies php-doctrine-annotations Fix directory permissions issue [CVE-2015-5723] php-doctrine-cache Fix file / directory permissions issue [CVE-2015-5723] php-doctrine-common Fix file permissions issue [CVE-2015-5723] php-dropbox Refuse to handle any files containing an @ [CVE-2015-4715] php-mail-mimedecode Rebuild with pkg-php-tools 1.28 to correct PHP dependencies php5 New upstream release plowshare4 Disable Javascript support postgresql-9.1 New upstream release pykerberos Add KDC authenticity verification support [CVE-2015-3206] python-yaql Remove broken python3-yaql package qpsmtpd Fix compatibility issue with newer Net::DNS versions quassel Fix remote DoS in quassel core, using /op * command [CVE-2015-8547] redis Ensure that a valid runtime directory is created when running under systemd redmine Fix upgrades when there are locally-installed plugins; fix moving issues across projects rsyslog Fix crash in imfile module when using inotify mode; prevent a segfault in dynafile creation ruby-bson Fix DoS and possible injection [CVE-2015-4410] s390-dasd If no channel is found, exit cleanly. This allows s390-dasd to step out of the way on VMs with virtio disks shadow Fix error handling in busy user detection sparse Fix build failure with llvm-3.5 spip Fix cross-site scripting issue stk Install missing SKINI.{msg,tbl} include files sus Update checksums for upstream tarball swift Fix unauthorized delete of versioned Swift object [CVE-2015-1856]; fix information leak via Swift tempurls [CVE-2015-5223]; fix service name of object-expirer in init script; add container-sync init script; standardise user addition systemd Fix namespace breakage due to incorrect path sorting; don't timeout after 90 seconds when no password was entered for cryptsetup devices; only set the kernel's timezone when the RTC runs in local time, avoiding possible jumps backward in time; fix incorrect handling of comma separator in systemd-delta; make DHCP broadcast behaviour configurable in systemd-networkd tangerine-icon-theme debian/clean-up.sh: do not run processes in background torbrowser-launcher Really apply patches from 0.1.9-1+deb8u1; stop confining start-tor-browser script with AppArmor; set usr.bin.torbrowser-launcher AppArmor profiles to complain mode ttylog Fix truncation of device name when selecting device tzdata New upstream release uqm Add missing -lm flag, fixing build failure vlc New upstream stable release webkitgtk New upstream stable release; fix late TLS certificate verification [CVE-2015-2330] wxmaxima Prevent crash on encountering parenthesis in dialogues zendframework Fix entropy issue with captcha [ZF2015-09]

Security Updates

This revision adds the following security updates to the stable release. The Security Team has already released an advisory for each of these updates:

Removed packages

The following packages were removed due to circumstances beyond our control:

Package Reason core-network Security issues elasticsearch No longer supported googlecl Broken due to relying on obsolete APIs libnsbmp Security issues, unmaintained libnsgif Security issues, unmaintained vimperator Incompatible with newer iceweasel versions

Debian Installer

URLs

The installer has been updated to re-introduce support for QNAP TS-x09 devices and to include the fixes incorporated into stable by the point release.

The complete lists of packages that have changed with this revision:

The current stable distribution:

Proposed updates to the stable distribution:

stable distribution information (release notes, errata etc.):

Security announcements and information:

About Debian

The Debian Project is an association of Free Software developers who volunteer their time and effort in order to produce the completely free operating system Debian.

Contact Information

For further information, please visit the Debian web pages at https://www.debian.org/, send mail to <press@debian.org>, or contact the stable release team at <debian-release@lists.debian.org>.