Updated Debian 7: 7.11 released

June 4th, 2016

The Debian project is pleased to announce the eleventh (and final) update of its oldstable distribution Debian 7 (codename wheezy ). This update mainly adds corrections for security problems to the oldstable release, along with a few adjustments for serious problems. Security advisories were already published separately and are referenced where available.

The packages from DSA 3548 are not included in this point release for technical reasons, as are some architectures for DSA 3547, DSA 3219, DSA 3482 and DSA 3246. All other security updates released during the lifetime of wheezy that have not previously been part of a point release are included in this update.

Please note that this update does not constitute a new version of Debian 7 but only updates some of the packages included. There is no need to throw away old wheezy CDs or DVDs but only to update via an up-to-date Debian mirror after an installation, to cause any out of date packages to be updated.

Those who frequently install updates from security.debian.org won't have to update many packages and most updates from security.debian.org are included in this update.

New installation media and CD and DVD images containing updated packages will be available soon at the regular locations.

Upgrading to this revision online is usually done by pointing the aptitude (or apt) package tool (see the sources.list(5) manual page) to one of Debian's many FTP or HTTP mirrors. A comprehensive list of mirrors is available at:

Miscellaneous Bugfixes

This oldstable update adds a few important corrections to the following packages:

Package Reason base-files Update for the point release debian-installer Rebuild for the point release debian-installer-netboot-images Rebuild for the point release; swap the d-i Built-Using with the installer fetching, to fail on version mismatches earlier dpkg Remove trailing space before handling blank line dot-separator in Dpkg::Control::HashCore. Regression introduced in dpkg 1.16.16; only use the SHELL environment variable for interactive shells; move tar option --no-recursion before -T in dpkg-deb; initialize Config-Version also for packages previously in triggers-pending state; fix memory leak in dpkg infodb format upgrade logic; fix physical file offset comparison in dpkg groovy Fix remote execution of untrusted code and possible DoS vulnerability [CVE-2015-3253] gtk+3.0 Fix integer overflow when allocating a large block of memory in gdk_cairo_set_source_pixbuf [CVE-2013-7447] highlight Avoid segfault with undefined syntax icecast2 Security fix [CVE-2014-9018] libcrypto++ Fix Rijndael timing attack counter measure [CVE-2016-3995] libdatetime-timezone-perl Update to tzdata 2016d openldap Disable the back-mdb test suite on powerpc to work around back-mdb tests failing on buildds running the jessie ppc64 kernel, which uses 64KB pages optipng Fix use-after-free vulnerability [CVE-2015-7801] postgresql-9.1 New upstream release tzdata New upstream version xapian-core Fix possible database corruption, especially with recoll zendframework Fix regression from ZF2015-08: binary data corruption; fix ZF2016-01: Potential Insufficient Entropy Vulnerability in ZF1

Security Updates

This revision adds the following security updates to the oldstable release. The Security Team has already released an advisory for each of these updates:

Debian Installer

URLs

The installer has been updated to include the fixes incorporated into oldstable by the point release.

The complete lists of packages that have changed with this revision:

The current oldstable distribution:

Proposed updates to the oldstable distribution:

oldstable distribution information (release notes, errata etc.):

Security announcements and information:

About Debian

The Debian Project is an association of Free Software developers who volunteer their time and effort in order to produce the completely free operating system Debian.

Contact Information

For further information, please visit the Debian web pages at https://www.debian.org/, send mail to <press@debian.org>, or contact the stable release team at <debian-release@lists.debian.org>.