Debian GNU/Linux 2.2 updated (r7)
July 13th, 2002
This is the seventh revision of Debian GNU/Linux 2.2 (codename `potato') which mainly adds security updates to the stable release, along with a few corrections of serious bugs. Those who frequently update from security.debian.org won't have to update many packages.
Upgrading to this revision online is usually done by pointing the `apt' package tool (see the sources.list(5) manual page) to one of Debian's many FTP or HTTP mirrors. A comprehensive list of mirrors is available at:
Security Updates
This revision adds the following security updates to the stable release. The Security Team has already released an advisory for each of these updates.
| Debian Security Advisory ID | Package(s) |
|---|---|
| DSA 110 | CUPS |
| DSA 118 | xsane |
| DSA 123 | listar |
| DSA 125 | analog |
| DSA 126 | IMP/Horde |
| DSA 128 | sudo |
| DSA 129 | UUCP |
| DSA 130 | ethereal |
| DSA 131 | Apache |
| DSA 132 | Apache-SSL |
| DSA 133 | Apache-Perl |
| DSA 135 | libapache-mod-ssl |
Miscellaneous Bugfixes
This revision adds important corrections to the following packages. Most of them don't affect the security of the system, but may affect data integrity.
| byacc | Fix timestamps in .deb file |
| custom | Fix timestamps in .deb file |
| erlang | Fix potential zlib problem |
| qpopper | Fix potential data lossage |
| snake4 | Fix timestamps in .deb file |
| vrweb | Fix potential zlib problem |
A complete list of all accepted and rejected packages together with rationale is on the preparation page for this revision:
URLs
The complete lists of packages that have changed with this release:
The current stable distribution:
Proposed updates to the stable distribution:
Stable distribution information (release notes, errata, etc.):
Security announcements and information:
About Debian
The Debian Project is an organization of free software developers who volunteer their time and effort in order to produce the completely free operating systems Debian GNU/Linux and Debian GNU/Hurd.
Contact Information
For further information, please visit the Debian web pages at https://www.debian.org/ or send mail to <press@debian.org>.
