Download Debian GNU/Linux 5.0.10

Spread the love

Version 5.0 of the Debian GNU/Linux operating system includes a new release, which has been given 5.0.10 as the version designation. The changes are mainly security updates and bug fixes in the included packages. As usual, the update is available for various hardware platforms such as Alpha, ARM, i386, x86-64, ia64, MIPS, PowerPC, and Sparc. The announcement looks like this:

Updated Debian 5.0: 5.0.10 released

The Debian project is pleased to announce the tenth and final update of its oldstable distribution Debian 5.0 (codename “lenny”). This update mainly adds corrections for security problems to the oldstable release, along with a few adjustments for serious problems. Security advisories were already published separately and are referenced where available.

The alpha and ia64 packages from DSA 1769 are not included in this point release for technical reasons. All other security updates released during the lifetime of “lenny” that have not previously been part of a point release are included in this update.

Please note that the security support for the oldstable distribution ended in February 2012 and no updates have been released since that point.

Those who frequently install updates from security.debian.org won’t have to update many packages and most updates from security.debian.org are included in this update.

New installation media and CD and DVD images containing updated packages will be available soon at the regular locations.

Upgrading to this revision online is usually done by pointing the aptitude (or apt) package tool (see the sources.list(5) manual page) to one of Debian’s many FTP or HTTP mirrors. A comprehensive list of mirrors is available at: http://www.debian.org/mirror/list

Please note that the oldstable distribution will be moved from the main archive to the archive.debian.org repository after March 24th 2012. After this move, it will no longer be available from the main mirror network. More information about the distribution archive and a list of mirrors is available at: archive

Miscellaneous Bug Fixes

This oldstable update adds a few important corrections to the following packages:

PackageReason

AprilDisable robust pthread mutexes on alpha, arm, and armel
base filesUpdate /etc/debian_version for the point release
ia32-libsRefresh packages to include recent security updates
libdigest-perlFix unsafe use of eval in Digest->new()
linux-2.6Various security fixes
phppgadminFix XSS
postgresql-8.3New upstream micro release
typo3-srcFix cache flooding via improper error handling
xapian-omegaFix escaping issues in templates
xpdfInsecure tempfile usage in zxpdf
user-mode-linuxRebuild against linux-source-2.6.26 (2.6.26-29)

Security Updates

This revision adds the following security updates to the oldstable release. The Security Team has already released an advisory for each of these updates:

Advisory IDPackageCorrection(s)

DSA-1769openjdk-6Arbitrary code execution
DSA-2161openjdk-6Multiple issues
DSA-2224openjdk-6Multiple issues
DSA-2237AprilDenial of service
DSA-2251subversionMultiple issues
DSA-2258kolab-cyrus-imapdImplementation error
DSA-2263movabletype-opensourceMultiple issues
DSA-2265perlMissing taint check
DSA-2267perlrestriction bypass
DSA-2271curlImproper delegation of client credentials
DSA-2281opieMultiple issues
DSA-2284opensaml2Implementation error
DSA-2285map serverMultiple issues
DSA-2287libpngMultiple issues
DSA-2301railsMultiple issues
DSA-2305vsftpdDenial of service
DSA-2313xulrunnerMultiple issues
DSA-2315openoffice.orgMultiple issues
DSA-2316quaggaMultiple issues
DSA-2318cyrus-imapd-2.2Multiple issues
DSA-2320dokuwikiRegression fix
DSA-2321moinCross site scripting
DSA-2323radvdMultiple issues
DSA-2324wiresharkprogramming error
DSA-2328freetypeMissing input sanitation
DSA-2332python-djangoMultiple issues
DSA-2333phpldapadminMultiple issues
DSA-2334maharaMultiple issues
DSA-2335man2htmlMissing input sanitization
DSA-2339nssMultiple issues
DSA-2340postgresql-8.3weak password hashing
DSA-2341xulrunnerMultiple issues
DSA-2343opensslCA trust revocation
DSA-2346proftpd-dfsgMultiple issues
DSA-2347bind9Improperly assert
DSA-2350freetypeMissing input sanitation
DSA-2351wiresharkBuffer overflow
DSA-2352puppetprogramming error
DSA-2354cupsMultiple issues
DSA-2355clear silverFormat string vulnerability
DSA-2357evinceMultiple issues
DSA-2358openjdk-6Multiple issues
DSA-2361chasenBuffer overflow
DSA-2362acpidMultiple issues
DSA-2363torBuffer overflow
DSA-2365dtcMultiple issues
DSA-2366media wikiMultiple issues
DSA-2367asteriskMultiple issues
DSA-2368lighttpdMultiple issues
DSA-2369libsoup2.4Directory traversal
DSA-2370unboundMultiple issues
DSA-2371JasperBuffer overflows
DSA-2372heimdalBuffer overflow
DSA-2373inetutilsBuffer overflow
DSA-2374openswanImplementation error
DSA-2375krb5Buffer overflow
DSA-2376ipmitoolInsecure pid file
DSA-2377cyrus-imapd-2.2Denial of service
DSA-2380foomatic filtersShell command injection
DSA-2382ecryptfs-utilsMultiple issues
DSA-2383superBuffer overflow
DSA-2384cactusMultiple issues
DSA-2385pdnspacket loop
DSA-2386opentdMultiple issues
DSA-2388t1libMultiple issues
DSA-2390opensslMultiple issues
DSA-2392opensslOut of bounds read
DSA-2394libxml2Multiple issues
DSA-2397icuBuffer underflow
DSA-2398curlMultiple issues
DSA-2399php5Multiple issues
DSA-2400xulrunnerMultiple issues
DSA-2403php5code injection
DSA-2405apache2Multiple issues
DSA-2405apache2-mpm-itkMultiple issues

Debian Installer / Kernel

The kernel included in this point release has been updated to incorporate fixes for a number of security issues. The installer has been rebuilt to use the new kernel.

Removed packages

The following packages were removed due to circumstances beyond our control:

PackageReason

qcadNon-distributable
part libraryNon-distributable

Version number5.0.10
Release statusFinal
Operating systemsLinux
WebsiteDebian
Download
License typeConditions (GNU/BSD/etc.)
You might also like