Updated Debian 9: 9.2 released 2017-10-07 #use wml::debian::news # $Id: 9 stretch 9.2 DSA-%1 <: my @p = (); for my $p (split (/,\s*/, "%2")) { push (@p, sprintf ('%s', $p, $p)); } print join (", ", @p); :> %0 %1 %0

The Debian project is pleased to announce the second update of its stable distribution Debian (codename ). This point release mainly adds corrections for security issues, along with a few adjustments for serious problems. Security advisories have already been published separately and are referenced where available.

Please note that the point release does not constitute a new version of Debian but only updates some of the packages included. There is no need to throw away old media. After installation, packages can be upgraded to the current versions using an up-to-date Debian mirror.

Those who frequently install updates from security.debian.org won't have to update many packages, and most such updates are included in the point release.

New installation images will be available soon at the regular locations.

Upgrading an existing installation to this revision can be achieved by pointing the package management system at one of Debian's many HTTP mirrors. A comprehensive list of mirrors is available at:

https://www.debian.org/mirror/list

As a special case for this point release, those using the apt-get tool to perform the upgrade will need to ensure that the dist-upgrade command is used, in order to update to the latest kernel packages. Users of other tools such as apt and aptitude should use the upgrade command.

Miscellaneous Bugfixes

Due to an oversight while preparing the point release, the usual update to the base-files package to reflect the new version was unfortunately not included. An updated package will be made available via stretch-updates in the near future.

This stable update adds a few important corrections to the following packages:

tofu-default-policy ask, multiple issues with scdaemon, avoid spurious warnings when sharing a keybox with gpg >= 2.1.20"> send Later with Delay bypasses OpenPGP [CVE-2017-9604]"> send Later with Delay bypasses OpenPGP [CVE-2017-9604]"> DB_CONFIG file"> Non-kerberos logins fails on winbind 4.X when krb5_auth is configured in PAM">
Package Reason

Security Updates

This revision adds the following security updates to the stable release. The Security Team has already released an advisory for each of these updates:

Advisory ID Package

Removed packages

The following packages were removed due to circumstances beyond our control:

Package Reason

Debian Installer

The installer has been updated to include the fixes incorporated into stable by the point release.

URLs

The complete lists of packages that have changed with this revision:

>/ChangeLog">

The current stable distribution:

Proposed updates to the stable distribution:

stable distribution information (release notes, errata etc.):

https://www.debian.org/releases/stable/

Security announcements and information:

https://www.debian.org/security/

About Debian

The Debian Project is an association of Free Software developers who volunteer their time and effort in order to produce the completely free operating system Debian.

Contact Information

For further information, please visit the Debian web pages at https://www.debian.org/, send mail to <press@debian.org>, or contact the stable release team at <debian-release@lists.debian.org>.