Updated Debian 7: 7.4 released

February 8th, 2014

The Debian project is pleased to announce the fourth update of its stable distribution Debian 7 (codename wheezy). This update mainly adds corrections for security problems to the stable release, along with a few adjustments for serious problems. Security advisories were already published separately and are referenced where available.

Please note that this update does not constitute a new version of Debian 7 but only updates some of the packages included. There is no need to throw away old wheezy CDs or DVDs but only to update via an up-to-date Debian mirror after an installation, to cause any out of date packages to be updated.

Those who frequently install updates from security.debian.org won't have to update many packages and most updates from security.debian.org are included in this update.

New installation media and CD and DVD images containing updated packages will be available soon at the regular locations.

Upgrading to this revision online is usually done by pointing the aptitude (or apt) package tool (see the sources.list(5) manual page) to one of Debian's many FTP or HTTP mirrors. A comprehensive list of mirrors is available at:


Miscellaneous Bugfixes

This stable update adds a few important corrections to the following packages:

Package Reason
apache2 Fix mod_rewrite log escaping (CVE-2013-1862), mod_dav denial of service (CVE-2013-1896) and segfaults in certain error conditions
base-files Update for the point release
ctdb Fix service stop and restart failing when trying to remove a public IP address not assigned locally
debian-handbook Update for wheezy
debian-installer Rebuild for the point release
eglibc Several security fixes; fix SIGFPE when locale-archive has been corrupted to all zeros; kfreebsd: always put supplied extra gid as the first entry of group list in setgroups(); fix sys_ktimer_settime
gatling Restore compatibility with PolarSSL security update
gnash Fix playing youtube movies using the ffmpeg media handler
kexec-tools Handle x.y kernel versions
kfreebsd-8 Several security fixes
kfreebsd-9 Disable VIA hardware RNG by default; fix lseek ENXIO error condition with ZFS
lazr.restfulclient Fix some concurrency issues
libapache2-mod-rpaf Restore accidentally dropped IPv6 patch
libglib-object-introspection-perl Fix incorrect memory allocation that causes segfaults in reverse-dependencies
libhtml-formhandler-perl Fix FTBFS
libmicrohttpd Various security issues
libnet-mac-vendor-perl Fix FTBFS due to failing t/fetch_oui.t test
libotr Disable insecure OTRv1 protocol
linux Update to stable 3.2.54; update drm, agp to 3.4.76; fix CVE-2013-4579, CVE-2013-6368, CVE-2014-1446
localepurge Fix CVE-2014-1638, unsafe tempfile creation
lxc Use latest upstream provided lxc-debian; add rsync to Recommends
mapserver Fix CVE-2013-7262, an SQL injection vulnerability in the msPostGISLayerSetTimeFilter function
nut Reset USB timeout to standard 5 seconds
openssl Enable assembler for the arm targets; enable ec_nistp_64_gcc_128 on *-amd64
pdns Fix lengths of the records.content and supermasters.ip columns
ruby-gsl Remove non-free documentation
ruby-opengl Remove example with unclear license
rush Fix CVE-2013-6889, file access escalation
samhain Disable dnmalloc for all architectures expect those known to work; fix mail sending from default configuration
spip Fix XSS on signature from author [CVE-2013-7303]
tuxguitar Update list of supported xulrunner versions
tzdata New upstream release
user-mode-linux Rebuild against Linux kernel 3.2.54-2
vips Fix crash on TIFF with JPEG compression
wget Add support for SNI
whois New upstream release; update various TLDs
xfce4-weather-plugin Fix abort when <hi> element is empty

Security Updates

This revision adds the following security updates to the stable release. The Security Team has already released an advisory for each of these updates:

Advisory ID Package Correction(s)
DSA-2749 asteriskMultiple issues
DSA-2757 wordpressMultiple issues
DSA-2793 libavMultiple issues
DSA-2812 sambaMultiple issues
DSA-2813 gimpMultiple issues
DSA-2814 varnishDenial of service
DSA-2815 muninDenial of service
DSA-2816 php5Multiple issues
DSA-2817 libtarMultiple integer overflows
DSA-2818 mysql-5.5Multiple issues
DSA-2820 nsprInteger overflow
DSA-2821 gnupgSide channel attack
DSA-2822 xorg-serverInteger underflow
DSA-2823 pixmanInteger underflow
DSA-2824 curlUnchecked TLS/SSL certificate host name
DSA-2825 wiresharkMultiple issues
DSA-2826 denyhostsRemote denial of ssh service
DSA-2827 libcommons-fileupload-javaArbitrary file upload via deserialization
DSA-2829 hplipMultiple issues
DSA-2830 ruby-i18nCross-site scripting
DSA-2831 puppetInsecure temporary files
DSA-2832 memcachedMultiple issues
DSA-2833 opensslMultiple issues
DSA-2834 typo3-srcMultiple issues
DSA-2835 asteriskBuffer overflow
DSA-2836 devscriptsArbitrary code execution
DSA-2837 opensslProgramming error
DSA-2838 libxfontBuffer overflow
DSA-2839 spiceDenial of service
DSA-2840 srtpBuffer overflow
DSA-2841 movabletype-opensourceCross-site scripting
DSA-2842 libspring-javaMultiple issues
DSA-2843 graphvizBuffer overflow
DSA-2846 libvirtMultiple issues
DSA-2847 drupal7Multiple issues
DSA-2849 curlInformation disclosure
DSA-2850 libyamlHeap-based buffer overflow

Removed packages

The following packages were removed due to circumstances beyond our control:

Package Reason
iceape Security support removed

Debian Installer

The installer has been rebuilt to include the fixes incorporated into stable by the point release.


The complete lists of packages that have changed with this revision:


The current stable distribution:


Proposed updates to the stable distribution:


stable distribution information (release notes, errata etc.):


Security announcements and information:


About Debian

The Debian Project is an association of Free Software developers who volunteer their time and effort in order to produce the completely free operating system Debian.

Contact Information

For further information, please visit the Debian web pages at https://www.debian.org/, send mail to <press@debian.org>, or contact the stable release team at <debian-release@lists.debian.org>.