Debian Sarge release patches security, fixes "serious" problems |
Apr. 19, 2006
The Debian project team has released a second revision of Debian GNU/Linux 3.1 "Sarge." The release adds security updates to the stable version, along with corrections for some "serious problems," the team said. The distro uses a 2.6.16 kernel and the GNOME desktop environment as default.
"Those who frequently update from security.debian.org won't have to update many packages, and most updates from security.debian.org are included in this update," said Martin Schulze, primary maintainer of the Sarge distro. "There is no need to throw away 3.1 CDs, but only to update against ftp.debian.org after an installation, in order to incorporate those late changes."
Upgrading to this revision online can be done by pointing the standard Debian "apt" package tool to one of the distro's many FTP or HTTP mirrors, Schulze said. A list of mirrors is available here.
This revision adds a number of security updates and problem fixes to the stable release, including buffer overflow, insecure temporary file, missing input sanitizing (new revision), programming errors, and others.
The Security Team has already released an advisory for each of these updates. Security fixes to the kernel have been delayed to the next point release due to constraints with the installer. The team advises users to update the kernel images from security.debian.org.
Debian comes with a choice of more than 8,000 free software packages.
Read the rest of the release announcement for a complete list of changes.
Screenshots are available here.
Related Stories:
(Click here for further information)
|
|
|
|
|
|
|