Friday, November 20, 2015
Debian 7.7 "Wheezy" released with Security Updates & Numerous Bugfixes

Debian Project development team officially announces the release of Debian 7.7 "Wheezy" which is the seventh update of its stable Debian 7 branch. Like earlier releases under Debian 7.x series, this release is just an update under 7.x series and doesn't consitute a new version of Debian 7.
According to official announcement, Debian 7.7 release primarily includes corrections for security issues to stable release along with few adjustments for serious problems. The team also provides security advisories through which anyone can downloaded latest security updates. If you have already installed Debian 7.6 then you can easily upgrade your system to Debian 7.7 without installing it via any media. Also, review recent Linux Distro News to know what's new in them ?
The Debian 7.7 comes with addition of several updated security packages like libstruts 1.2-java, vlc, php5, phpmyadmin, eglibc, libav, libxml2, fail2ban, polarssl, drupal7, acpi-support, mysql-5.5, transmission, apache2, cups, modsecurity-apache, nss, openssl, drupal7, krb5, wordpress and wireshark. You can also download the ISO Image of Debian 7.7 "Wheezy" from the list of available mirrors which is nearby your location.
Apart from these security updates, this release also includes some miscellaneous bugfixes such as fixed MITM attack on SSL caused by incomplete fix for CVE-2012-5784, fixed illegal hardware instruction, add Jessie stable release key, fixed broken patch headers, fixed invalid patch header, fixed crash on "end game" when gnubg is run with the -t option. You might also like to check out other latest Software News on our website.
Keep reading and stay tuned with us to get latest software updates. Don't forget to subscribe us and share your reviews about this post among other readers via comments.
Subscribe to:
Post Comments (Atom)
No comments:
Post a Comment