23.02.2013 20:58, ????? ???????? ?????:
> good
>
>
> 2013/2/23 Francesca Ciceri <madame...@debian.org
> <mailto:madame...@debian.org>>
>
>     ------------------------------------------------------------------------
>     The Debian Project                              
>      http://www.debian.org/
>     Updated Debian 6.0: 6.0.7 released                    
>      pr...@debian.org <mailto:pr...@debian.org>
>     February 23rd, 2013            
>     http://www.debian.org/News/2013/20130223
>     ------------------------------------------------------------------------
>
>
>     The Debian project is pleased to announce the seventh update of its
>     stable distribution Debian 6.0 (codename "squeeze"). This update
>     mainly
>     adds corrections for security problems to the stable release,
>     along with
>     a few adjustments for serious problems. Security advisories were
>     already
>     published separately and are referenced where available.
>
>     Please note that this update does not constitute a new version of
>     Debian
>     6.0 but only updates some of the packages included. There is no
>     need to
>     throw away 6.0 CDs or DVDs but only to update via an up-to-date Debian
>     mirror after an installation, to cause any out of date packages to be
>     updated.
>
>     Those who frequently install updates from security.debian.org
>     <http://security.debian.org> won't have
>     to update many packages and most updates from security.debian.org
>     <http://security.debian.org> are
>     included in this update.
>
>     New installation media and CD and DVD images containing updated
>     packages
>     will be available soon at the regular locations.
>
>     Upgrading to this revision online is usually done by pointing the
>     aptitude (or apt) package tool (see the sources.list(5) manual
>     page) to
>     one of Debian's many FTP or HTTP mirrors. A comprehensive list of
>     mirrors is available at:
>
>     http://www.debian.org/mirror/list
>
>
>
>     Miscellaneous Bugfixes
>     ----------------------
>
>     This stable update adds a few important corrections to the following
>     packages:
>
>      Package                       Reason
>
>      apt-show-versions             Fix detection of squeeze-updates and
>                                    squeeze; update official
>                                    distribution list
>
>      base-files                    Update for the point release
>
>      bcron                         Don't allow jobs access to other
>                                    jobs' temporary files
>
>      bind9                         Update IP for  "D"  root server
>
>      bugzilla                      Add dependency on liburi-perl, used
>                                    during package configuration
>
>      choose-mirror                 Update URL for master mirror list
>
>      clamav                        New upstream version
>
>      claws-mail                    Fix NULL pointer dereference
>
>      clive                         Adapt for youtube.com
>     <http://youtube.com> changes
>
>      cups                          Ship cups-files.conf's manpage
>
>      dbus                          Avoid code execution in setuid/
>                                    setgid binaries
>
>      dbus-glib                     Fix authentication bypass through
>                                    insufficient checks (CVE-2013-0292)
>
>      debian-installer              Rebuild for 6.0.7
>
>      debian-installer-netboot-     Rebuild against debian-installer
>      images                        20110106+squeeze4+b3
>
>      dtach                         Properly handle close request
>                                    (CVE-2012-3368)
>
>      ettercap                      Fix hosts list parsing (CVE-2013-
>                                    0722)
>
>      fglrx-driver                  Fix diversion-related issues with
>                                    upgrades from lenny
>
>      flashplugin-nonfree           Use gpg --verify
>
>      fusionforge                   Lenny to squeeze upgrade fix
>
>      gmime2.2                      Add Conflicts: libgmime2.2-cil to
>                                    fix upgrades from lenny
>
>      gzip                          Avoid using memcpy on overlapping
>                                    regions
>
>      ia32-libs                     Update included packages from
>                                    stable / security.d.o
>
>      ia32-libs-core                Update included packages from
>                                    stable / security.d.o
>
>      kfreebsd-8                    Fix CVE-2012-4576: memory access
>                                    without proper validation in linux
>                                    compat system
>
>      libbusiness-onlinepayment-    Backport changes to IPPay gateway's
>      ippay-perl                    server name and path
>
>      libproc-processtable-         Fix unsafe temporary file usage
>      perl                          (CVE-2011-4363)
>
>      libzorpll                     Add missing Breaks/Replaces:
>                                    libzorp2-dev to libzorpll-dev
>
>      linux-2.6                     Update to stable release 2.6.32.60.
>                                    Backport hpsa, isci and megaraid_sas
>                                    driver updates. Fix r8169 hangs
>
>      linux-kernel-di-amd64-        Rebuild against linux-2.6 2.6.32-48
>      2.6 
>
>      linux-kernel-di-              Rebuild against linux-2.6 2.6.32-48
>      armel-2.6 
>
>      linux-kernel-di-i386-         Rebuild against linux-2.6 2.6.32-48
>      2.6 
>
>      linux-kernel-di-ia64-         Rebuild against linux-2.6 2.6.32-48
>      2.6 
>
>      linux-kernel-di-              Rebuild against linux-2.6 2.6.32-48
>      mips-2.6 
>
>      linux-kernel-di-              Rebuild against linux-2.6 2.6.32-48
>      mipsel-2.6 
>
>      linux-kernel-di-              Rebuild against linux-2.6 2.6.32-48
>      powerpc-2.6 
>
>      linux-kernel-di-s390-         Rebuild against linux-2.6 2.6.32-48
>      2.6 
>
>      linux-kernel-di-              Rebuild against linux-2.6 2.6.32-48
>      sparc-2.6 
>
>      magpierss                     Fix upgrade issue
>
>      maradns                       Fix CVE-2012-1570 (deleted domain
>                                    record cache persistence flaw)
>
>      mediawiki                     Prevent session fixation in
>                                    Special:UserLogin (CVE-2012-5391);
>                                    prevent linker regex from exceeding
>                                    backtrack limit
>
>      moodle                        Multiple security fixes
>
>      nautilus                      Add Breaks: samba-common (<< 2:3.5)
>                                    to fix a lenny to squeeze upgrade
>                                    issue
>
>      openldap                      Dump the database in prerm on
>                                    upgrades to help upgrades to
>                                    releases with newer libdb versions
>
>      openssh                       Improve DoS resistance (CVE-2010-
>                                    5107)
>
>      pam-pgsql                     Fix issue with NULL passwords
>
>      pam-shield                    Correctly block IPs when
>                                    allow_missing_dns is  "no"
>
>      perl                          Fix misparsing of maketext strings
>                                    (CVE-2012-6329)
>
>      poppler                       Security fixes; CVE-2010-0206,
>                                    CVE-2010-0207, CVE-2012-4653; fix
>                                    GooString::insert, correctly
>                                    initialise variables
>
>      portmidi                      Fix crash
>
>      postgresql-8.4                New upstream micro-release
>
>      sdic                          Move bzip2 from Suggests to Depends
>                                    as it is used during installation
>
>      snack                         Fix buffer overflow (CVE-2012-6303)
>
>      sphinx                        Fix incompatibility with jQuery>=
>                                    1.4
>
>      swath                         Fix potential buffer overflow in
>                                    Mule mode
>
>      swi-prolog                    Fix buffer overruns
>
>      ttf-ipafont                   Fix removal of alternatives
>
>      tzdata                        New upstream version; fix DST for
>                                    America/Bahia (Brazil)
>
>      unbound                       Update IP address hints for D.ROOT-
>                                    SERVERS.NET <http://SERVERS.NET>
>
>      xen                           Fix clock breakage
>
>      xnecview                      Fix FTBFS on armel
>
>
>
>
>     Security Updates
>     ----------------
>
>     This revision adds the following security updates to the stable
>     release.
>     The Security Team has already released an advisory for each of these
>     updates:
>
>
>      Advisory ID     Package         Correction(s)
>
>      DSA-2550    asterisk            Multiple issues
>
>      DSA-2551    isc-dhcp            Denial of service
>
>      DSA-2552    tiff                Multiple issues
>
>      DSA-2553    iceweasel           Multiple issues
>
>      DSA-2554    iceape              Multiple issues
>
>      DSA-2555    libxslt             Multiple issues
>
>      DSA-2556    icedove             Multiple issues
>
>      DSA-2557    hostapd             Denial of service
>
>      DSA-2558    bacula              Information disclosure
>
>      DSA-2559    libexif             Multiple issues
>
>      DSA-2560    bind9               Denial of service
>
>      DSA-2561    tiff                Buffer overflow
>
>      DSA-2562    cups-pk-helper      Privilege escalation
>
>      DSA-2563    viewvc              Multiple issues
>
>      DSA-2564    tinyproxy           Denial of service
>
>      DSA-2565    iceweasel           Multiple issues
>
>      DSA-2566    exim4               Heap overflow
>
>      DSA-2567    request-tracker3.8  Multiple issues
>
>      DSA-2568    rtfm                Privilege escalation
>
>      DSA-2569    icedove             Multiple issues
>
>      DSA-2570   openoffice.org <http://openoffice.org>       Multiple
>     issues
>
>      DSA-2571   libproxy             Buffer overflow
>
>      DSA-2572   iceape               Multiple issues
>
>      DSA-2573   radsecproxy          SSL certificate
>                                      verification weakness
>
>      DSA-2574   typo3-src            Multiple issues
>
>      DSA-2575   tiff                 Heap overflow
>
>      DSA-2576   trousers             Denial of service
>
>      DSA-2577   libssh               Multiple issues
>
>      DSA-2578   rssh                 Multiple issues
>
>      DSA-2579   apache2              Multiple issues
>
>      DSA-2580   libxml2              Buffer overflow
>
>      DSA-2582   xen                  Denial of service
>
>      DSA-2583   iceweasel            Multiple issues
>
>      DSA-2584   iceape               Multiple issues
>
>      DSA-2585   bogofilter           Heap-based buffer
>                                      overflow
>
>      DSA-2586   perl                 Multiple issues
>
>      DSA-2587   libcgi-pm-perl       HTTP header injection
>
>      DSA-2588   icedove              Multiple issues
>
>      DSA-2589   tiff                 Buffer overflow
>
>      DSA-2590   wireshark            Multiple issues
>
>      DSA-2591   mahara               Multiple issues
>
>      DSA-2592   elinks               Programming error
>
>      DSA-2593   moin                 Multiple issues
>
>      DSA-2594   virtualbox-ose       Programming error
>
>      DSA-2595   ghostscript          Buffer overflow
>
>      DSA-2596   mediawiki-           Cross-site scripting in
>                      extensions      RSSReader extension
>
>      DSA-2597   rails                Input validation error
>
>      DSA-2598   weechat              Multiple issues
>
>      DSA-2599   nss                  Mis-issued intermediates
>
>      DSA-2600   cups                 Privilege escalation
>
>      DSA-2601   gnupg2               Missing input sanitation
>
>      DSA-2601   gnupg                Missing input sanitation
>
>      DSA-2602   zendframework        XML external entity
>                                      inclusion
>
>      DSA-2603   emacs23              Programming error
>
>      DSA-2604   rails                Insufficient input
>                                      validation
>
>      DSA-2605   asterisk             Multiple issues
>
>      DSA-2606   proftpd-dfsg         Symlink race
>
>      DSA-2607   qemu-kvm             Buffer overflow
>
>      DSA-2608   qemu                 Buffer overflow
>
>      DSA-2609   rails                SQL query manipulation
>
>      DSA-2610   ganglia              Remote code execution
>
>      DSA-2611   movabletype-         Multiple issues
>                      opensource 
>
>      DSA-2612   ircd-ratbox          Remote crash
>
>      DSA-2613   rails                Insufficient input
>                                      validation
>
>      DSA-2614   libupnp              Multiple issues
>
>      DSA-2615   libupnp4             Multiple issues
>
>      DSA-2616   nagios3              Buffer overflow
>                                      vulnerability
>
>      DSA-2617   samba                Multiple issues
>
>      DSA-2618   ircd-hybrid          Denial of service
>
>      DSA-2619   xen-qemu-dm-4.0      Buffer overflow
>
>      DSA-2620   rails                Multiple issues
>
>      DSA-2621   openssl              Multiple issues
>
>      DSA-2622   polarssl             Multiple issues
>
>      DSA-2623   openconnect          Buffer overflow
>
>      DSA-2624   ffmpeg               Multiple issues
>
>      DSA-2625   wireshark            Multiple issues
>
>      DSA-2626   lighttpd             Multiple issues
>
>      DSA-2627   nginx                Information leak
>
>
>     Debian Installer
>     ----------------
>
>     The installer has been rebuilt to include the fixes incorporated into
>     stable by the point release.
>
>     Removed packages
>     ----------------
>
>     The following packages were removed due to circumstances beyond our
>     control:
>
>      Package         Reason
>
>      elmerfem       License problems (GPL + non-GPL)
>
>
>     URLs
>     ----
>
>     The complete lists of packages that have changed with this revision:
>
>     http://ftp.debian.org/debian/dists/squeeze/ChangeLog
>
>
>     The current stable distribution:
>
>     http://ftp.debian.org/debian/dists/stable/
>
>
>     Proposed updates to the stable distribution:
>
>     http://ftp.debian.org/debian/dists/proposed-updates/
>
>
>     stable distribution information (release notes, errata etc.):
>
>     http://www.debian.org/releases/stable/
>
>
>     Security announcements and information:
>
>     http://security.debian.org/ 
>
>
>     About Debian
>     ------------
>
>     The Debian Project is an association of Free Software developers who
>     volunteer their time and effort in order to produce the completely
>     free
>     operating system Debian.
>
>
>     Contact Information
>     -------------------
>
>     For further information, please visit the Debian web pages at
>     http://www.debian.org/, send mail to <pr...@debian.org
>     <mailto:pr...@debian.org>>, or contact the
>     stable release team at <debian-rele...@lists.debian.org
>     <mailto:debian-rele...@lists.debian.org>>.
>
>
>
>
> -- 
> Fedor Elizarov
> web 
> http://www.blogdron.blogspot.co.uk/
>
> e-mail 
> YmxvZ2Ryb25AZ21haWwuY29tCg==
>
> icq
> NDc2MDQxMzA0Cg==
>
> jabber 
> YmxvZ2Ryb25AY2xpbW0ub3JnCg==
>
> p.s base64 -d 
? ??? ?? ??????? ??? ?? ? ?)

Attachment: signature.asc
Description: OpenPGP digital signature

Ответить