Debian 6.0.8 is here, and still first on GNU / Linux distros for servers

Greetings to all. Today I took a look at the Debian page to see what's new, and the great news is this: Debian Squeeze has received your eighth update.

The updates that have come to Debian Squeeze mainly focus on server applications, especially web servers. Among them are:

Package Reason
base files Update version for point release
clamav New upstream release; security fixes
dpkg-ruby Close files once they're parsed, preventing trouble on dist-upgrades
gdm3 Fix potential security issue with partial upgrades to wheezy
graph viz use system ltdl
grep Fix CVE-2012-5667
ia32-libs Update included packages from oldstable / security.do
ia32-libs-gtk Update included packages from oldstable / security.do
inform Remove broken calls to update-alternatives
ldap2dns Do not unnecessarily include / usr / share / debconf / confmodule in postinst
libapache-mod-security Fix NULL pointer reference. CVE-2013-2765
libmodule-signature-perl CVE-2013-2145: Fixes arbitrary code execution when verifying SIGNATURE
libopenid-ruby Fix CVE-2013-1812
libspf2 IPv6 fixes
lm-sensors-3 Skip probing for EDID or graphics cards, as it might cause hardware issues
moin Do not create empty pagedir (with empty edit-log)
net-snmp Fix CVE-2012-2141
openssh Fix potential int overflow when using gssapi-with-mac authentication (CVE-2011-5000)
openvpn Fix use of non-constant-time memcmp in HMAC comparison. CVE-2013-2061
pcp Fix insecure tempfile handling
pigz Use more restrictive permissions for in-progress files
policyd-weight Remove shutdown njabl DNSBL
pyopencl Remove non-free file from examples
pyramid Use a better random number generator to prevent predictable password hashing and packet IDs (CVE-2013-0294)
python-qt4 Fix crash in uic file with radio buttons
request-tracker3.8 Move non-cache data to / var / lib
samba Fix CVE-2013-4124: Denial of service - CPU loop and memory allocation
smarty Fix CVE-2012-4437
spamassassin Remove shutdown njabl DNSBL; fix RCVD_ILLEGAL_IP to not consider 5.0.0.0/8 as invalid
nice Fix endless loop in wwsympa while loading session data including metacharacters
texlive-extra Fix predictable temp file names in latex2man
tntnet Fix insecure default tntnet.conf
tzdata New upstream version
wv2 Really remove src / generator / generator_wword {6,8} .htm
xorg server Link against -lbsd on kfreebsd to make MIT-SHM work with non-world-accessible segments
xview Fix alternative handling
zabbix Fix SQL injection, zabbix_agentd DoS, possible path disclosure, field name parameter checking bypass, ability to override LDAP configuration when calling user.login via API

Regarding security recommendations, applications for web servers stand out. They are between them:

Recommendation ID Package Fixes)
DSA-2628 nss-pam-ldapd buffer overflow
DSA-2629 openjpeg multiple issues
DSA-2630 postgresql-8.4 programming error
DSA-2631 squid3 Denial of service
DSA-2632 user-mode-linux multiple issues
DSA-2632 linux-2.6 multiple issues
DSA-2633 fusionforge privilege escalation
DSA-2634 python-django multiple issues
DSA-2635 cfingerd buffer overflow
DSA-2636 xen multiple issues
DSA-2637 apache2 multiple issues
DSA-2638 openafs buffer overflow
DSA-2639 php5 multiple issues
DSA-2640 zoneminder multiple issues
DSA-2641 perl Rehashing flaw
DSA-2641 libapache2-mod-perl2 FTBFS with updated perl
DSA-2642 sudo multiple issues
DSA-2643 puppet multiple issues
DSA-2644 wireshark multiple issues
DSA-2645 inetutils Denial of service
DSA-2646 typo3-src multiple issues
DSA-2647 firebird2.1 buffer overflow
DSA-2648 firebird2.5 multiple issues
DSA-2649 lighttpd Fixed socket name in world-writable directory
DSA-2650 libvirt Files and device nodes ownership change to kvm group
DSA-2651 smoking Cross-site scripting vulnerability
DSA-2652 libxml2 External entity expansion
DSA-2653 searching buffer overflow
DSA-2654 libxslt Denial of service
DSA-2655 rails multiple issues
DSA-2656 bind9 Denial of service
DSA-2657 postgresql-8.4 Guessable random numbers
DSA-2659 libapache-mod-security XML external entity processing vulnerability
DSA-2660 curl Cookie leak vulnerability
DSA-2661 xorg server Information disclosure
DSA-2662 xen multiple issues
DSA-2663 tinc Stack-based buffer overflow
DSA-2664 stunnel4 buffer overflow
DSA-2665 strongswan Authentication bypass
DSA-2666 xen multiple issues
DSA-2668 linux-2.6 multiple issues
DSA-2668 user-mode-linux multiple issues
DSA-2670 request-tracker3.8 multiple issues
DSA-2673 libdmx multiple issues
DSA-2674 libxv multiple issues
DSA-2675 libxvmc multiple issues
DSA-2676 libxfixes multiple issues
DSA-2677 libxrender multiple issues
DSA-2678 table multiple issues
DSA-2679 xserver-xorg-video-openchrome multiple issues
DSA-2680 libxt multiple issues
DSA-2681 libxcursor multiple issues
DSA-2682 libxext multiple issues
DSA-2683 libxi multiple issues
DSA-2684 libxrandr multiple issues
DSA-2685 libxp multiple issues
DSA-2686 libxcb multiple issues
DSA-2687 libfs multiple issues
DSA-2688 libxres multiple issues
DSA-2689 libxtst multiple issues
DSA-2690 libxxf86dga multiple issues
DSA-2691 libxinerama multiple issues
DSA-2692 libxxf86vm multiple issues
DSA-2693 libx11 multiple issues
DSA-2694 spip privilege escalation
DSA-2698 tiff buffer overflow
DSA-2701 krb5 Denial of service
DSA-2702 telepathy-gabble TLS verification bypass
DSA-2703 subversion multiple issues
DSA-2708 fail2ban Denial of service
DSA-2710 xml-security-c multiple issues
DSA-2711 haproxy multiple issues
DSA-2713 curl heap overflow
DSA-2715 puppet code execution
DSA-2717 xml-security-c heap overflow
DSA-2718 wordpress multiple issues
DSA-2719 poppler multiple issues
DSA-2723 php5 Heap corruption
DSA-2725 tomcat6 multiple issues
DSA-2726 php-radius buffer overflow
DSA-2727 openjdk-6 multiple issues
DSA-2728 bind9 Denial of service
DSA-2729 openafs multiple issues
DSA-2730 gnupg Information leak
DSA-2731 libgcrypt11 Information leak
DSA-2733 others2 SQL injection
DSA-2734 wireshark multiple issues
DSA-2736 putty multiple issues
DSA-2739 cacti multiple issues
DSA-2740 python-django Cross-site scripting vulnerability
DSA-2742 php5 interpretation conflict
DSA-2744 tiff multiple issues
DSA-2747 cacti multiple issues
DSA-2748 exact image Denial of service
DSA-2749 asterisk multiple issues
DSA-2751 libmodplug multiple issues
DSA-2752 phpbb3 Too wide permissions
DSA-2753 mediawiki Cross-site request forgery token disclosure
DSA-2754 exact image Denial of service
DSA-2755 python-django directory traverse
DSA-2756 wireshark multiple issues
DSA-2758 python-django Denial of service
DSA-2760 chrony multiple issues
DSA-2763 pyopenssl Hostname check bypassing
DSA-2766 user-mode-linux multiple issues
DSA-2766 linux-2.6 multiple issues
DSA-2767 proftpd-dfsg Denial of service
DSA-2770 torsion Authentication bypass
DSA-2773 gnupg multiple issues
DSA-2775 ejabberd Insecure SSL usage
DSA-2776 drupal6 multiple issues
DSA-2778 libapache2-mod-fcgid Heap-based buffer overflow

And as if that were not enough, the packages removed are:

Package Reason
irssi-plugin-otr security issues
libpam-rsa Broken, causes security problems

Although it has been the good news for those users who use precisely that version of Debian both in data centers and for experiments in virtual machines, the other good news comes from the hand of W3Techs, which has shown the most recent survey on servers web that use Linux, highlighting Debian on the podium next to Ubuntu, contrasting the 2010 survey in which RHEL / CentOS were at the top of the web servers running under GNU / Linux around the globe. Also, it highlights the fact that queb servers running under Debian use the HTTP server NginX; while, in the case of Ubuntu, with Apache.

os-linux-1310

That is all for now. And remember, the GNUPanel Crowfunding campaign is still available for those who are interested in contributing to its version 2.0 release. For more information, read this post.

That is all for now. I hope you were happy with the news. I'll tell you more about my experience working with GNUPanel soon.

Until the next post.


Leave a Comment

Your email address will not be published. Required fields are marked with *

*

*

  1. Responsible for the data: Miguel Ángel Gatón
  2. Purpose of the data: Control SPAM, comment management.
  3. Legitimation: Your consent
  4. Communication of the data: The data will not be communicated to third parties except by legal obligation.
  5. Data storage: Database hosted by Occentus Networks (EU)
  6. Rights: At any time you can limit, recover and delete your information.

  1.   Rolo said

    because the title "..and still first ..." sounds like it is descending but is still first when in reality it is on a ceiling and with a projection that it is not going to decrease. that is if the projection of ubuntu suggests that in the next few years it will surpass debian.
    Now the cases to be analyzed are those of Red hat and CentOS that their future projection is downward, but taking into account that Red Hat is a distro designed for servers with technical support.
    Another interesting thing is that debian uses gnome3 and red hat uses gnome3 with the classic desktop

    1.    Rolo said

      sorry debian version 6 uses gnome2 but to date it is the oldstable version. version 7 which to date is the stable version if you use gnome3

      1.    Cristian Sacristan said

        Unfortunately for many 🙁

      2.    eliotime3000 said

        So far the best version of GNOME. Too bad it has become so obsolete that even XFCE has outgrown it.

    2.    eliotime3000 said

      The reason why I put "And still first"It was because the graph shows that Ubuntu Server is shaping up to take the throne away from Debian, as RHEL / CentOS once did.

  2.   f3niX said

    These debian folks can't get enough of updating squeeze xD.

    1.    cat said

      I have come across servers that use up to Debian Etch xD (usually games).

      1.    Federico A. Valdes Toujague said

        I have two servers with Etch and VMware 1.08. I use them to virtualize. The servers are old. :-). Imagine that one is a Proliant G4 with a single mic, and the other has a Pentium IV processor. Each has only 2 Gigs of RAM. But buddy, they work wonders.

        1.    eliotime3000 said

          In that you are right, but I already suggest you change it to Wheezy with only TTY and / or LXDE. Anyway, I still have my old Lentium 4 with mainboard PC Chips and it is already much better than with Windows XP (I installed Windows Vista last year, but in the finals, it ended in a reserved forecast).

  3.   ferchmetal said

    as always, they should have a big solid rock in this distro!

    1.    eliotime3000 said

      And the easiest to do when making an authentic dist-upgrade.

  4.   dean said

    Users of older versions of Debian6, especially those with kernel 2.6.39, should update their systems as this has a known bug since January 2012 (well it had been reported but not corrected 7 years before) that allows any user to write to Arbitrary memory addresses and taking advantage of the fact that in Debian as in almost all distributions some console commands are not correctly compiled, it allows to achieve root privileges by just typing some commands ...

    More information here http://blog.zx2c4.com/749

    1.    elav said

      Incredible Who would say that the friend Dean years later, would be a user of the Operating System that he criticized so much? XDDD

      1.    eliotime3000 said

        Karma, karma everywhere.

    2.    eliotime3000 said

      Interesting, tell me more.

    3.    mario said

      if memory serves me correctly, debian 6 starts with 2.6.32, and is kept separately, away from kernel.org (apart from they take out a lot of firmware and non-free blob). Official versions other than longterm (2.6.39 for example), are always prone to bugs, as they are for testing only.

    4.    Federico A. Valdes Toujague said

      I don't go straight to the internet. I have a protected ISP I think by three routers. Under your LAN, a private network that is the one that I connect to through a router with a firewall for hard plus my firewall for soft.

      I am aware of the problems of old versions of Debian.

      If it were facing the Internet ... Another rooster would crow. 🙂

      1.    eliotime3000 said

        And by the way ... I've seen that many hosts still use Debian Squeeze.