Debian ziņas
#1
## Introduction
###############

The Debian Social Team maintains a variety of services under the
debian.social domain. These services aim to make it easier for Debian
contributors to share content and collaborate.
- https://wiki.debian.org/Teams/DebianSocial

Here are some examples of services that the Debian Social Team intend to run:

* Pleroma, a federated microblogging platform. Similar to Mastodon, Gnu Social
  and Statusnet.
* Peertube, a federated video publishing platform. Debian contributors can use
  this to share content like howtos, interviews, podcasts, etc. It will also
  be a friendly interface for browsing and viewing the DebConf videos and from
  other Debian meetings.
* Pixelfed, a federated image publishing platform. This is a friendly and
  modern site that makes it easier to share photos at Debian events where they
  can be easily found by other Debianites (as apposed to Signal, WhatsApp,
  Facebook, Instagram which has sadly become a norm for those).
* Jitsi meet, a web-based videoconferencing site (currently needs no
  authentication).

Federation means that these services can communicate with other instances on
the Internet. From a pleroma account, you can follow videos on peertube or
images on pixelfed, or other accounts anywhere in the fediverse and leave
comments on them. Not only can they interface with other instances of the same
software, but also with completely different software (if based on
ActivityPub.)

Here's a nice video that explains both Peertube and the Fediverse:
- https://peertube.debian.social/videos/wa...2039a1acc4


## How to get an account on debian.social services
##################################################

It's still early days for us and there's still a lot of work that needs to be
done. If you're a brave soul who doesn't mind occasional errors, crashes,
explosions and even (brace yourself...) spelling mistakes, then you can help us
test these services before we open then up for wider beta testing.

Long-term, we plan to authenticate these services against the salsa.debian.org
service. Some services are part of the way there, others may take some more
time and collaboration with upstream.

In the meantime, you can request an account for one or more of the services by
creating a ticket in salsa.debian.org:
- https://salsa.debian.org/debiansocial-te...issues/new
You need a salsa account in order to do this, your username on Debian
Social platforms will match your salsa account. We'll gradually add
accounts as we feel more confident in the service on a first come, first
serve basis.


## More information
###################

* For the most up-to-date information, see our wiki page:
  https://wiki.debian.org/Teams/DebianSocial
* If you need some help, try us on #debian-social (but please be patient,
  we're not always there and usually very busy)


## Current Known issues we aim to resolve before entering a proper beta phase
#############################################################################

* We're still working on moderation policies, CoC text on sites, etc.
  If you'd like to help with moderation, please join our IRC channel
  and tell us so!
* Server load is currently higher than normal, we're just about to
  finish importing all the last Debconf videos into the Peertube
  instance
* Pleroma has some suggestive images that we'd rather remove
* Peertube gives an internal server error when you upload an avatar
  that contains transparency
* We still need to figure out how to deal with some GDPR style requests
  better. For example, if a user requests a copy of all their data. For
  now we expect such requests to be few enough that we can deal with
  them manually.
* Various small CSS issues

We hope that some of our work might be useful to you,

- Debian Social Team
"Kā cilvēks, kam trūkst pašcieņas, nav dīdzējs, bet nīcējs, tā arī tauta, kurai nav pašapziņas." K.Mīlenbahs
Atbilde
#2
------------------------------------------------------------------------
The Debian Project                              https://www.debian.org/
Debian 8 Long Term Support reaching end-of-life        press@debian.org
July 9th, 2020                https://www.debian.org/News/2020/20200709
------------------------------------------------------------------------


The Debian Long Term Support (LTS) Team hereby announces that Debian 8
"jessie" support has reached its end-of-life on June 30, 2020, five
years after its initial release on April 26, 2015.

Debian will not provide further security updates for Debian 8. A subset
of "jessie" packages will be supported by external parties. Detailed
information can be found at Extended LTS [1].

    1: https://wiki.debian.org/LTS/Extended

The LTS Team will prepare the transition to Debian 9 "stretch", which is
the current oldstable release. The LTS Team has taken over support from
the Security Team on July 6, 2020 while the final point update for
"stretch" will be released on July 18, 2020.

Debian 9 will also receive Long Term Support for five years after its
initial release with support ending on June 30, 2022. The supported
architectures remain amd64, i386, armel and armhf. In addition we are
pleased to announce, for the first time support will be extended to
include the arm64 architecture.

For further information about using "stretch" LTS and upgrading from
"jessie" LTS, please refer to LTS/Using [2].

    2: https://wiki.debian.org/LTS/Using

Debian and its LTS Team would like to thank all contributing users,
developers and sponsors who are making it possible to extend the life of
previous stable releases, and who have made this LTS a success.

If you rely on Debian LTS, please consider joining the team [3],
providing patches, testing or funding the efforts [4].

    3: https://wiki.debian.org/LTS/Development
    4: https://wiki.debian.org/LTS/Funding


About Debian
------------

The Debian Project was founded in 1993 by Ian Murdock to be a truly free
community project. Since then the project has grown to be one of the
largest and most influential open source projects. Thousands of
volunteers from all over the world work together to create and maintain
Debian software. Available in 70 languages, and supporting a huge range
of computer types, Debian calls itself the "universal operating system".


More Information
----------------

More information about Debian Long Term Support can be found at
https://wiki.debian.org/LTS/.



Contact Information
-------------------

For further information, please visit the Debian web pages at
https://www.debian.org/ or send mail to <press@debian.org>.


"Kā cilvēks, kam trūkst pašcieņas, nav dīdzējs, bet nīcējs, tā arī tauta, kurai nav pašapziņas." K.Mīlenbahs
Atbilde
#3
Updated Debian 10: 10.5 released
August 1st, 2020
The Debian project is pleased to announce the fifth update of its stable distribution Debian 10 (codename buster). This point release mainly adds corrections for security issues, along with a few adjustments for serious problems. Security advisories have already been published separately and are referenced where available.
This point release also addresses Debian Security Advisory: DSA-4735-1 grub2 -- security update which covers multiple CVE issues regarding the GRUB2 UEFI SecureBoot 'BootHole' vulnerability.
Please note that the point release does not constitute a new version of Debian 10 but only updates some of the packages included. There is no need to throw away old buster media. After installation, packages can be upgraded to the current versions using an up-to-date Debian mirror.
Those who frequently install updates from security.debian.org won't have to update many packages, and most such updates are included in the point release.
New installation images will be available soon at the regular locations.
Upgrading an existing installation to this revision can be achieved by pointing the package management system at one of Debian's many HTTP mirrors. A comprehensive list of mirrors is available at:
https://www.debian.org/mirror/list
"Kā cilvēks, kam trūkst pašcieņas, nav dīdzējs, bet nīcējs, tā arī tauta, kurai nav pašapziņas." K.Mīlenbahs
Atbilde
#4
Announcement of LibreOffice 7.0
Posted in Announcements LibreOffice By Italo Vignoli On August 5, 2020
LibreOffice 7.0: the new major release of the best FOSS office suite ever is available on all OSes and platforms, and provides significant new features
Berlin, August 5, 2020 – The LibreOffice Project announces the availability of LibreOffice 7.0, a new major release providing significant new features: support for OpenDocument Format (ODF) 1.3; Skia graphics engine and Vulkan GPU-based acceleration for better performance; and carefully improved compatibility with DOCX, XLSX and PPTX files.
  • Support for ODF 1.3. OpenDocument, LibreOffice’s native open and standardised format for office documents, has recently been updated to version 1.3 as an OASIS Technical Committee Specification. The most important new features are digital signatures for documents and OpenPGP-based encryption of XML documents, with improvements in areas such as change tracking, and additional details in the description of elements in first pages, text, numbers and charts. The development of ODF 1.3 features has been funded by donations to The Document Foundation.
  • Skia graphics engine and Vulkan GPU-based acceleration. The Skia graphics engine has been implemented thanks to sponsorship by AMD, and is now the default on Windows, for faster performance. Skia is an open source 2D graphics library which provides common APIs that work across a variety of hardware and software platforms, and can be used for drawing text, shapes and images. Vulkan is a new-generation graphics and compute API with high-efficiency and cross-platform access to modern GPUs.
  • Better compatibility with DOCX, XLSX and PPTX files. DOCX now saves in native 2013/2016/2019 mode, instead of 2007 compatibility mode, to improve interoperability with multiple versions of MS Office, based on the same Microsoft approach. Export to XLSX files with sheet names longer than 31 characters is now possible, along with exporting checkboxes in XLSX. The “invalid content error” message was resolved when opening exported XLSX files with shapes. Finally, there were improvements to the PPTX import/export filter.
    LibreOffice offers the highest level of compatibility in the office suite arena, starting from native support for the OpenDocument Format (ODF) – with better security and interoperability features over proprietary formats – to almost perfect support for DOCX, XLSX and PPTX files. In addition, LibreOffice includes filters for many legacy document formats, and as such is the best interoperability tool in the market.
Summary of Other New Features [1]
GENERAL
  • New icon theme, the default on macOS: Sukapura
  • New shapes galleries: arrows, diagrams, icons and more…
  • Glow and soft edge effects for objects
WRITER
  • Navigator is easier to use, with more context menus
  • Semi-transparent text is now supported
  • Bookmarks can now be displayed in-line in text
  • Padded numbering in lists, for consistency
  • Better handling of quotation marks and apostrophes
CALC
  • New functions for non-volatile random number generation
  • Keyboard shortcut added for autosum
IMPRESS & DRAW
  • Semi-transparent text is supported here too
  • Subscripts now return to the default of 8%
  • PDFs larger than 500 cm can now be generated
LibreOffice Technology
LibreOffice 7.0’s new features have been developed by a large community of code contributors: 74% of commits are from developers employed by companies sitting in the Advisory Board, such as Collabora, Red Hat and CIB, plus several other organizations, and 26% are from individual volunteers.
In addition, there is a global community of individual volunteers taking care of other fundamental activities, such as quality assurance, software localization, user interface design and user experience, editing of help content and documentation, along with free software and open document standards advocacy.
A video summarizing the top new features in LibreOffice 7.0 is available on YouTube: https://www.youtube.com/watch?v=XusjjbBm81s and also on PeerTube: https://tdf.io/lo70peertube
Products based on LibreOffice Technology are available for all major desktop operating systems (Windows, macOS, Linux and ChromeOS), for the cloud and for mobile platforms. They are released by The Document Foundation, and by ecosystem companies contributing to software development.
LibreOffice for End Users
LibreOffice 7.0 represents the bleeding edge in term of features for open source office suites, and as such is targeted at technology enthusiasts, early adopters and power users. The Document Foundation does not provide any technical support for users, although they can get help from other users on mailing lists and the Ask LibreOffice website: https://ask.libreoffice.org
For users whose main objective is personal productivity and therefore prefer a release that has undergone more testing and bug fixing over the new features, The Document Foundation maintains the LibreOffice 6.4 family, which includes some months of back-ported fixes. The current version is LibreOffice 6.4.5.
LibreOffice in Business
For enterprise-class deployments, TDF strongly recommends sourcing LibreOffice from one of the ecosystem partners, to get long-term supported releases, dedicated assistance, custom new features and other benefits, including SLA (Service Level Agreements): https://www.libreoffice.org/download/lib...-business/. The work done by ecosystem partners is an integral part of LibreOffice Technology.
For migrations from proprietary office suites and training, professional support should be sourced from certified professionals who provide value-added services which extend the reach of the community to the corporate world, and offer CIOs and IT managers a solution in line with proprietary offerings. Reference page: https://www.libreoffice.org/get-help/pro...l-support/.
In fact, LibreOffice – thanks to its mature codebase, rich feature set, strong support for open standards, excellent compatibility and long-term support options from certified partners – represents the ideal solution for businesses that want to regain control of their data and free themselves from vendor lock-in.
Availability of LibreOffice 7.0
LibreOffice 7.0 is immediately available from the following link: https://www.libreoffice.org/download/. Minimum requirements for proprietary operating systems are Microsoft Windows 7 SP1 and Apple macOS 10.12. Builds of the latest LibreOffice Online source code are available as Docker images from TDF: https://hub.docker.com/r/libreoffice/online/
LibreOffice Technology based products for Android and iOS are listed here: https://www.libreoffice.org/download/android-and-ios/, while for App Stores and ChromeOS are listed here: https://www.libreoffice.org/download/lib...pp-stores/
LibreOffice users, free software advocates and community members can support The Document Foundation with a donation at https://www.libreoffice.org/donate
LibreOffice 7.0 is built with document conversion libraries from the Document Liberation Project: https://www.documentliberation.org
[1] A more comprehensive list of LibreOffice 7.0 new features is available on the Release Notes wiki page: https://wiki.documentfoundation.org/ReleaseNotes/7.0
"Kā cilvēks, kam trūkst pašcieņas, nav dīdzējs, bet nīcējs, tā arī tauta, kurai nav pašapziņas." K.Mīlenbahs
Atbilde
#5
------------------------------------------------------------------------
The Debian Project                              https://www.debian.org/
Debian 11 "bullseye" released                          press@debian.org
August 14th, 2021              https://www.debian.org/News/2021/20210814
------------------------------------------------------------------------


After 2 years, 1 month, and 9 days of development, the Debian project is
proud to present its new stable version 11 (code name "bullseye"), which
will be supported for the next 5 years thanks to the combined work of
the Debian Security team [1] and the Debian Long Term Support [2] team.

    1: https://security-team.debian.org/
    2: https://wiki.debian.org/LTS

Debian 11 "bullseye" ships with several desktop applications and
environments. Amongst others it now includes the desktop environments:

  * Gnome 3.38,
  * KDE Plasma 5.20,
  * LXDE 11,
  * LXQt 0.16,
  * MATE 1.24,
  * Xfce 4.16.

This release contains over 11,294 new packages for a total count of
59,551 packages, along with a significant reduction of over 9,519
packages which were marked as "obsolete" and removed. 42,821 packages
were updated and 5,434 packages remained unchanged.

"bullseye" becomes our first release to provide a Linux kernel with
support for the exFAT filesystem and defaults to using it for mount
exFAT filesystems. Consequently it is no longer required to use the
filesystem-in-userspace implementation provided via the exfat-fuse
package. Tools for creating and checking an exFAT filesystem are
provided in the exfatprogs package.

Most modern printers are able to use driverless printing and scanning
without the need for vendor specific (often non-free) drivers.
"bullseye" brings forward a new package, ipp-usb, which uses the vendor
neutral IPP-over-USB protocol supported by many modern printers. This
allows a USB device to be treated as a network device. The official SANE
driverless backend is provided by sane-escl in libsane1, which uses the
eSCL protocol.

Systemd in "bullseye" activates its persistent journal functionality, by
default, with an implicit fallback to volatile storage. This allows
users that are not relying on special features to uninstall traditional
logging daemons and switch over to using only the systemd journal.

The Debian Med team has been taking part in the fight against COVID-19
by packaging software for researching the virus on the sequence level
and for fighting the pandemic with the tools used in epidemiology; this
work will continue with focus on machine learning tools for both fields.
The team's work with Quality Assurance and Continuous integration is
critical to the consistent reproducible results required in the
sciences. Debian Med Blend has a range of performance critical
applications which now benefit from SIMD Everywhere. To install packages
maintained by the Debian Med team, install the metapackages named med-*,
which are at version 3.6.x.

Chinese, Japanese, Korean, and many other languages now have a new Fcitx
5 input method, which is the successor of the popular Fcitx4 in
"buster" ; this new version has much better Wayland (default display
manager) addon support.

Debian 11 "bullseye" includes numerous updated software packages (over
72% of all packages in the previous release), such as:

  * Apache 2.4.48
  * BIND DNS Server 9.16
  * Calligra 3.2
  * Cryptsetup 2.3
  * Emacs 27.1
  * GIMP 2.10.22
  * GNU Compiler Collection 10.2
  * GnuPG 2.2.20
  * Inkscape 1.0.2
  * LibreOffice 7.0
  * Linux kernel 5.10 series
  * MariaDB 10.5
  * OpenSSH 8.4p1
  * Perl 5.32
  * PHP 7.4
  * PostgreSQL 13
  * Python 3, 3.9.1
  * Rustc 1.48
  * Samba 4.13
  * Vim 8.2
  * more than 59,000 other ready-to-use software packages, built from
more than 30,000 source packages.

With this broad selection of packages and its traditional wide
architecture support, Debian once again stays true to its goal of being
"The Universal Operating System". It is suitable for many different use
cases: from desktop systems to netbooks; from development servers to
cluster systems; and for database, web, and storage servers. At the same
time, additional quality assurance efforts like automatic installation
and upgrade tests for all packages in Debian's archive ensure that
"bullseye" fulfills the high expectations that users have of a stable
Debian release.

A total of nine architectures are supported: 64-bit PC / Intel EM64T /
x86-64 (amd64), 32-bit PC / Intel IA-32 (i386), 64-bit little-endian
Motorola/IBM PowerPC (ppc64el), 64-bit IBM S/390 (s390x), for ARM, armel
and armhf for older and more recent 32-bit hardware, plus arm64 for the
64-bit "AArch64" architecture, and for MIPS, mipsel (little-endian)
architectures for 32-bit hardware and mips64el architecture for 64-bit
little-endian hardware.

If you simply want to try Debian 11 "bullseye" without installing it,
you can use one of the available live images [3] which load and run the
complete operating system in a read-only state via your computer's
memory.

    3: https://www.debian.org/CD/live/

These live images are provided for the amd64 and i386 architectures and
are available for DVDs, USB sticks, and netboot setups. The user can
choose among different desktop environments to try: GNOME, KDE Plasma,
LXDE, LXQt, MATE, and Xfce. Debian Live "bullseye" has a standard live
image, so it is also possible to try a base Debian system without any of
the graphical user interfaces.

Should you enjoy the operating system you have the option of installing
from the live image onto your computer's hard disk. The live image
includes the Calamares independent installer as well as the standard
Debian Installer. More information is available in the release notes [4]
and the live install images [5] sections of the Debian website.

    4: https://www.debian.org/releases/bullseye/releasenotes
    5: https://www.debian.org/CD/live/

To install Debian 11 "bullseye" directly onto your computer's hard disk
you can choose from a variety of installation media such as Blu-ray
Disc, DVD, CD, USB stick, or via a network connection. Several desktop
environments — Cinnamon, GNOME, KDE Plasma Desktop and Applications,
LXDE, LXQt, MATE and Xfce — may be installed through those images. In
addition, "multi-architecture" CDs are available which support
installation from a choice of architectures from a single disc. Or you
can always create bootable USB installation media (see the Installation
Guide [6] for more details).

    6: https://www.debian.org/releases/bullseye/installmanual

There has been a lot of development on the Debian Installer, resulting
in improved hardware support and other new features.

In some cases, a successful installation can still have display issues
when rebooting into the installed system; for those cases there are a
few workarounds [7] that might help log in anyway. There is also an
isenkram-based procedure [7] which lets users detect and fix missing
firmware on their systems, in an automated fashion. Of course, one has
to weigh the pros and cons of using that tool since it's very likely
that it will need to install non-free packages.

    7:
https://www.debian.org/releases/bullseye...led-system

In addition to this, the non-free installer images that include firmware
packages [8] have been improved so that they can anticipate the need for
firmware in the installed system (e.g. firmware for AMD or Nvidia
graphics cards, or newer generations of Intel audio hardware).

    8:
https://cdimage.debian.org/cdimage/unoff...-firmware/

For cloud users, Debian offers direct support for many of the best-known
cloud platforms. Official Debian images are easily selected through each
image marketplace. Debian also publishes pre-built OpenStack images [9]
for the amd64 and arm64 architectures, ready to download and use in
local cloud setups.

    9: https://cloud.debian.org/images/openstack/current/

Debian can now be installed in 76 languages, with most of them available
in both text-based and graphical user interfaces.

The installation images may be downloaded right now via bittorrent [10]
(the recommended method), jigdo [11], or HTTP [12]; see Debian on
CDs [13] for further information. "bullseye" will soon be available on
physical DVD, CD-ROM, and Blu-ray Discs from numerous vendors [14] too.

  10: https://www.debian.org/CD/torrent-cd/
  11: https://www.debian.org/CD/jigdo-cd/#which
  12: https://www.debian.org/CD/http-ftp/
  13: https://www.debian.org/CD/
  14: https://www.debian.org/CD/vendors

Upgrades to Debian 11 from the previous release, Debian 10 (code name
"buster") are automatically handled by the APT package management tool
for most configurations.

For bullseye, the security suite is now named bullseye-security and
users should adapt their APT source-list files accordingly when
upgrading. If your APT configuration also involves pinning or
APT:Big Grinefault-Release, it is likely to require adjustments too. See the
Changed security archive layout [15] section of the release notes for
more details.

  15:
https://www.debian.org/releases/bullseye...ty-archive

If you are upgrading remotely, be aware of the section No new SSH
connections possible during upgrade [16].

  16:
https://www.debian.org/releases/bullseye...-available

As always, Debian systems may be upgraded painlessly, in place, without
any forced downtime, but it is strongly recommended to read the release
notes [17] as well as the installation guide [18] for possible issues,
and for detailed instructions on installing and upgrading. The release
notes will be further improved and translated to additional languages in
the weeks after the release.

  17: https://www.debian.org/releases/bullseye/releasenotes
  18: https://www.debian.org/releases/bullseye/installmanual


About Debian
------------

Debian is a free operating system, developed by thousands of volunteers
from all over the world who collaborate via the Internet. The Debian
project's key strengths are its volunteer base, its dedication to the
Debian Social Contract and Free Software, and its commitment to provide
the best operating system possible. This new release is another
important step in that direction.


Contact Information
-------------------

For further information, please visit the Debian web pages at
https://www.debian.org/ or send mail to <press@debian.org>.
"Kā cilvēks, kam trūkst pašcieņas, nav dīdzējs, bet nīcējs, tā arī tauta, kurai nav pašapziņas." K.Mīlenbahs
Atbilde
#6
------------------------------------------------------------------------
The Debian Project                              https://www.debian.org/
Updated Debian 10: 10.11 released                      press@debian.org
October 9th, 2021            https://www.debian.org/News/2021/2021100902
------------------------------------------------------------------------


The Debian project is pleased to announce the eleventh update of its
oldstable distribution Debian 10 (codename "buster"). This point release
mainly adds corrections for security issues, along with a few
adjustments for serious problems. Security advisories have already been
published separately and are referenced where available.

Please note that the point release does not constitute a new version of
Debian 10 but only updates some of the packages included. There is no
need to throw away old "buster" media. After installation, packages can
be upgraded to the current versions using an up-to-date Debian mirror.

Those who frequently install updates from security.debian.org won't have
to update many packages, and most such updates are included in the point
release.

New installation images will be available soon at the regular locations.

Upgrading an existing installation to this revision can be achieved by
pointing the package management system at one of Debian's many HTTP
mirrors. A comprehensive list of mirrors is available at:

https://www.debian.org/mirror/list



Miscellaneous Bugfixes
----------------------

This oldstable update adds a few important corrections to the following
packages:

+---------------------------+-----------------------------------------+
| Package                  | Reason                                  |
+---------------------------+-----------------------------------------+
| atftp [1]                | Fix buffer overflow [CVE-2021-41054]    |
|                          |                                        |
| base-files [2]            | Update for the 10.11 point release      |
|                          |                                        |
| btrbk [3]                | Fix arbitrary code execution issue      |
|                          | [CVE-2021-38173]                        |
|                          |                                        |
| clamav [4]                | New upstream stable release; fix        |
|                          | clamdscan segfaults when --fdpass and  |
|                          | --multipass are used together with      |
|                          | ExcludePath                            |
|                          |                                        |
| commons-io [5]            | Fix path traversal issue [CVE-2021-    |
|                          | 29425]                                  |
|                          |                                        |
| cyrus-imapd [6]          | Fix denial-of-service issue [CVE-2021-  |
|                          | 33582]                                  |
|                          |                                        |
| debconf [7]              | Check that whiptail or dialog is        |
|                          | actually usable                        |
|                          |                                        |
| debian-installer [8]      | Rebuild against buster-proposed-        |
|                          | updates; update Linux ABI to 4.19.0-18  |
|                          |                                        |
| debian-installer-netboot- | Rebuild against buster-proposed-updates |
| images [9]                |                                        |
|                          |                                        |
| distcc [10]              | Fix GCC cross-compiler links in update- |
|                          | distcc-symlinks and add support for    |
|                          | clang and CUDA (nvcc)                  |
|                          |                                        |
| distro-info-data [11]    | Update included data for several        |
|                          | releases                                |
|                          |                                        |
| dwarf-fortress [12]      | Remove undistributable prebuilt shared  |
|                          | libraries from the source tarball      |
|                          |                                        |
| espeak-ng [13]            | Fix using espeak with mbrola-fr4 when  |
|                          | mbrola-fr1 is not installed            |
|                          |                                        |
| gcc-mingw-w64 [14]        | Fix gcov handling                      |
|                          |                                        |
| gthumb [15]              | Fix heap-based buffer overflow issue    |
|                          | [CVE-2019-20326]                        |
|                          |                                        |
| hg-git [16]              | Fix test failures with recent git      |
|                          | versions                                |
|                          |                                        |
| htslib [17]              | Fix autopkgtest on i386                |
|                          |                                        |
| http-parser [18]          | Fix HTTP request smuggling issue        |
|                          | [CVE-2019-15605]                        |
|                          |                                        |
| irssi [19]                | Fix use after free issue when sending  |
|                          | SASL login to the server [CVE-2019-    |
|                          | 13045]                                  |
|                          |                                        |
| java-atk-wrapper [20]    | Also use dbus to detect accessibility  |
|                          | being enabled                          |
|                          |                                        |
| krb5 [21]                | Fix KDC null dereference crash on FAST  |
|                          | request with no server field [CVE-2021- |
|                          | 37750]; fix memory leak in              |
|                          | krb5_gss_inquire_cred                  |
|                          |                                        |
| libdatetime-timezone-perl | New upstream stable release; update DST |
| [22]                      | rules for Samoa and Jordon;            |
|                          | confirmation of no leap second on 2021- |
|                          | 12-31                                  |
|                          |                                        |
| libpam-tacplus [23]      | Prevent shared secrets from being added |
|                          | in plaintext to the system log          |
|                          | [CVE-2020-13881]                        |
|                          |                                        |
| linux [24]                | "proc: Track /proc/$pid/attr/ opener    |
|                          | mm_struct" , fixing issues with lxc-    |
|                          | attach; new upstream stable release;    |
|                          | increase ABI version to 18; [rt] Update |
|                          | to 4.19.207-rt88; usb: hso: fix error  |
|                          | handling code of hso_create_net_device  |
|                          | [CVE-2021-37159]                        |
|                          |                                        |
| linux-latest [25]        | Update to 4.19.0-18 kernel ABI          |
|                          |                                        |
| linux-signed-amd64 [26]  | "proc: Track /proc/$pid/attr/ opener    |
|                          | mm_struct" , fixing issues with lxc-    |
|                          | attach; new upstream stable release;    |
|                          | increase ABI version to 18; [rt] Update |
|                          | to 4.19.207-rt88; usb: hso: fix error  |
|                          | handling code of hso_create_net_device  |
|                          | [CVE-2021-37159]                        |
|                          |                                        |
| linux-signed-arm64 [27]  | "proc: Track /proc/$pid/attr/ opener    |
|                          | mm_struct" , fixing issues with lxc-    |
|                          | attach; new upstream stable release;    |
|                          | increase ABI version to 18; [rt] Update |
|                          | to 4.19.207-rt88; usb: hso: fix error  |
|                          | handling code of hso_create_net_device  |
|                          | [CVE-2021-37159]                        |
|                          |                                        |
| linux-signed-i386 [28]    | "proc: Track /proc/$pid/attr/ opener    |
|                          | mm_struct" , fixing issues with lxc-    |
|                          | attach; new upstream stable release;    |
|                          | increase ABI version to 18; [rt] Update |
|                          | to 4.19.207-rt88; usb: hso: fix error  |
|                          | handling code of hso_create_net_device  |
|                          | [CVE-2021-37159]                        |
|                          |                                        |
| mariadb-10.3 [29]        | New upstream stable release; security  |
|                          | fixes [CVE-2021-2389 CVE-2021-2372];    |
|                          | fix Perl executable path in scripts    |
|                          |                                        |
| modsecurity-crs [30]      | Fix request body bypass issue          |
|                          | [CVE-2021-35368]                        |
|                          |                                        |
| node-ansi-regex [31]      | Fix regular expression-based denial of  |
|                          | service issue [CVE-2021-3807]          |
|                          |                                        |
| node-axios [32]          | Fix regular expression-based denial of  |
|                          | service issue [CVE-2021-3749]          |
|                          |                                        |
| node-jszip [33]          | Use a null prototype object for        |
|                          | this.files [CVE-2021-23413]            |
|                          |                                        |
| node-tar [34]            | Remove non-directory paths from the    |
|                          | directory cache [CVE-2021-32803]; strip |
|                          | absolute paths more comprehensively    |
|                          | [CVE-2021-32804]                        |
|                          |                                        |
| nvidia-cuda-toolkit [35]  | Fix setting of NVVMIR_LIBRARY_DIR on    |
|                          | ppc64el                                |
|                          |                                        |
| nvidia-graphics-drivers  | New upstream stable release; fix denial |
| [36]                      | of service issues [CVE-2021-1093        |
|                          | CVE-2021-1094 CVE-2021-1095]; nvidia-  |
|                          | driver-libs: Add Recommends: libnvidia- |
|                          | encode1                                |
|                          |                                        |
| nvidia-graphics-drivers-  | New upstream stable release; fix denial |
| legacy-390xx [37]        | of service issues [CVE-2021-1093        |
|                          | CVE-2021-1094 CVE-2021-1095]; nvidia-  |
|                          | legacy-390xx-driver-libs: Add          |
|                          | Recommends: libnvidia-legacy-390xx-    |
|                          | encode1                                |
|                          |                                        |
| postgresql-11 [38]        | New upstream stable release; fix mis-  |
|                          | planning of repeated application of a  |
|                          | projection step [CVE-2021-3677];        |
|                          | disallow SSL renegotiation more        |
|                          | completely                              |
|                          |                                        |
| proftpd-dfsg [39]        | Fix  "mod_radius leaks memory contents  |
|                          | to radius server" ,  "cannot disable    |
|                          | client-initiated renegotiation for      |
|                          | FTPS" , navigation into symlinked      |
|                          | directories, mod_sftp crash when using  |
|                          | pubkey-auth with DSA keys              |
|                          |                                        |
| psmisc [40]              | Fix regression in killall not matching  |
|                          | process with names longer than 15      |
|                          | characters                              |
|                          |                                        |
| python-uflash [41]        | Update firmware URL                    |
|                          |                                        |
| request-tracker4 [42]    | Fix login timing side-channel attack    |
|                          | issue [CVE-2021-38562]                  |
|                          |                                        |
| ring [43]                | Fix denial of service issue in the      |
|                          | embedded copy of pjproject [CVE-2021-  |
|                          | 21375]                                  |
|                          |                                        |
| sabnzbdplus [44]          | Prevent directory escape in renamer    |
|                          | function [CVE-2021-29488]              |
|                          |                                        |
| shim [45]                | Add arm64 patch to tweak section layout |
|                          | and stop crashing problems; in insecure |
|                          | mode, don't abort if we can't create    |
|                          | the MokListXRT variable; don't abort on |
|                          | grub installation failures; warn        |
|                          | instead                                |
|                          |                                        |
| shim-helpers-amd64-signed | Add arm64 patch to tweak section layout |
| [46]                      | and stop crashing problems; in insecure |
|                          | mode, don't abort if we can't create    |
|                          | the MokListXRT variable; don't abort on |
|                          | grub installation failures; warn        |
|                          | instead                                |
|                          |                                        |
| shim-helpers-arm64-signed | Add arm64 patch to tweak section layout |
| [47]                      | and stop crashing problems; in insecure |
|                          | mode, don't abort if we can't create    |
|                          | the MokListXRT variable; don't abort on |
|                          | grub installation failures; warn        |
|                          | instead                                |
|                          |                                        |
| shim-helpers-i386-signed  | Add arm64 patch to tweak section layout |
| [48]                      | and stop crashing problems; in insecure |
|                          | mode, don't abort if we can't create    |
|                          | the MokListXRT variable; don't abort on |
|                          | grub installation failures; warn        |
|                          | instead                                |
|                          |                                        |
| shim-signed [49]          | Work around boot-breaking issues on    |
|                          | arm64 by including an older known      |
|                          | working version of unsigned shim on    |
|                          | that platform; switch arm64 back to    |
|                          | using a current unsigned build; add    |
|                          | arm64 patch to tweak section layout and |
|                          | stop crashing problems; in insecure    |
|                          | mode, don't abort if we can't create    |
|                          | the MokListXRT variable; don't abort on |
|                          | grub installation failures; warn        |
|                          | instead                                |
|                          |                                        |
| shiro [50]                | Fix authentication bypass issues        |
|                          | [CVE-2020-1957 CVE-2020-11989 CVE-2020- |
|                          | 13933 CVE-2020-17510]; update Spring    |
|                          | Framework compatibility patch; support  |
|                          | Guice 4                                |
|                          |                                        |
| tzdata [51]              | Update DST rules for Samoa and Jordan;  |
|                          | confirm the absence of a leap second on |
|                          | 2021-12-31                              |
|                          |                                        |
| ublock-origin [52]        | New upstream stable release; fix denial |
|                          | of service issue [CVE-2021-36773]      |
|                          |                                        |
| ulfius [53]              | Ensure memory is initialised before use |
|                          | [CVE-2021-40540]                        |
|                          |                                        |
| xmlgraphics-commons [54]  | Fix Server-Side Request Forgery issue  |
|                          | [CVE-2020-11988]                        |
|                          |                                        |
| yubikey-manager [55]      | Add missing dependency on python3-pkg-  |
|                          | resources to yubikey-manager            |
|                          |                                        |
+---------------------------+-----------------------------------------+
"Kā cilvēks, kam trūkst pašcieņas, nav dīdzējs, bet nīcējs, tā arī tauta, kurai nav pašapziņas." K.Mīlenbahs
Atbilde
#7
------------------------------------------------------------------------
The Debian Project                              https://www.debian.org/
Updated Debian 11: 11.2 released                        press@debian.org
December 18th, 2021            https://www.debian.org/News/2021/20211218
------------------------------------------------------------------------


The Debian project is pleased to announce the second update of its
stable distribution Debian 11 (codename "bullseye"). This point release
mainly adds corrections for security issues, along with a few
adjustments for serious problems. Security advisories have already been
published separately and are referenced where available.

Please note that the point release does not constitute a new version of
Debian 11 but only updates some of the packages included. There is no
need to throw away old "bullseye" media. After installation, packages
can be upgraded to the current versions using an up-to-date Debian
mirror.

Those who frequently install updates from security.debian.org won't have
to update many packages, and most such updates are included in the point
release.

New installation images will be available soon at the regular locations.

Upgrading an existing installation to this revision can be achieved by
pointing the package management system at one of Debian's many HTTP
mirrors. A comprehensive list of mirrors is available at:

https://www.debian.org/mirror/list



Miscellaneous Bugfixes
----------------------

This stable update adds a few important corrections to the following
packages:

+--------------------------+------------------------------------------+
| Package                  | Reason                                  |
+--------------------------+------------------------------------------+
| authheaders [1]          | New upstream bug-fix release            |
|                          |                                          |
| base-files [2]          | Update /etc/debian_version for the 11.2  |
|                          | point release                            |
|                          |                                          |
| bpftrace [3]            | Fix array indexing                      |
|                          |                                          |
| brltty [4]              | Fix operation under X when using        |
|                          | sysvinit                                |
|                          |                                          |
| btrbk [5]                | Fix regression in the update for        |
|                          | CVE-2021-38173                          |
|                          |                                          |
| calibre [6]              | Fix syntax error                        |
|                          |                                          |
| chrony [7]              | Fix binding a socket to a network device |
|                          | with a name longer than 3 characters    |
|                          | when the system call filter is enabled  |
|                          |                                          |
| cmake [8]                | Add PostgreSQL 13 to known versions      |
|                          |                                          |
| containerd [9]          | New upstream stable release; handle      |
|                          | ambiguous OCI manifest parsing          |
|                          | [CVE-2021-41190]; support  "clone3"  in  |
|                          | default seccomp profile                  |
|                          |                                          |
| curl [10]                | Remove -ffile-prefix-map from curl-      |
|                          | config, fixing co-installability of      |
|                          | libcurl4-gnutls-dev under multiarch      |
|                          |                                          |
| datatables.js [11]      | Fix insufficient escaping of arrays      |
|                          | passed to the HTML escape entities      |
|                          | function [CVE-2021-23445]                |
|                          |                                          |
| debian-edu-config [12]  | pxe-addfirmware: Fix TFTP server path;  |
|                          | improve support for LTSP chroot setup    |
|                          | and maintenance                          |
|                          |                                          |
| debian-edu-doc [13]      | Update Debian Edu Bullseye manual from  |
|                          | the wiki; update translations            |
|                          |                                          |
| debian-installer [14]    | Rebuild against proposed-updates; update |
|                          | kernel ABI to -10                        |
|                          |                                          |
| debian-installer-        | Rebuild against proposed-updates        |
| netboot-images [15]      |                                          |
|                          |                                          |
| distro-info-data [16]    | Update included data for Ubuntu 14.04    |
|                          | and 16.04 ESM; add Ubuntu 22.04 LTS      |
|                          |                                          |
| docker.io [17]          | Fix possible change of host file system  |
|                          | permissions [CVE-2021-41089]; lock down  |
|                          | file permissions in /var/lib/docker      |
|                          | [CVE-2021-41091]; prevent credentials    |
|                          | being sent to the default registry      |
|                          | [CVE-2021-41092]; add support for        |
|                          | "clone3"  syscall in default seccomp    |
|                          | policy                                  |
|                          |                                          |
| edk2 [18]                | Address Boot Guard TOCTOU vulnerability  |
|                          | [CVE-2019-11098]                        |
|                          |                                          |
| freeipmi [19]            | Install pkgconfig files to correct      |
|                          | location                                |
|                          |                                          |
| gdal [20]                | Fix BAG 2.0 Extract support in LVBAG    |
|                          | driver                                  |
|                          |                                          |
| gerbv [21]              | Fix out-of-bounds write issue [CVE-2021- |
|                          | 40391]                                  |
|                          |                                          |
| gmp [22]                | Fix integer and buffer overflow issue    |
|                          | [CVE-2021-43618]                        |
|                          |                                          |
| golang-1.15 [23]        | New upstream stable release; fix  "net/  |
|                          | http: panic due to racy read of          |
|                          | persistConn after handler                |
|                          | panic"  [CVE-2021-36221]; fix  "archive/ |
|                          | zip: overflow in preallocation check can |
|                          | cause OOM panic"  [CVE-2021-39293]; fix  |
|                          | buffer over-run issue [CVE-2021-38297],  |
|                          | out of bounds read issue [CVE-2021-      |
|                          | 41771], denial of service issues        |
|                          | [CVE-2021-44716 CVE-2021-44717]          |
|                          |                                          |
| grass [24]              | Fix parsing of GDAL formats where the    |
|                          | description contains a colon            |
|                          |                                          |
| horizon [25]            | Re-enable translations                  |
|                          |                                          |
| htmldoc [26]            | Fix buffer overflow issues [CVE-2021-    |
|                          | 40985 CVE-2021-43579]                    |
|                          |                                          |
| im-config [27]          | Prefer Fcitx5 over Fcitx4                |
|                          |                                          |
| isync [28]              | Fix multiple buffer overflow issues      |
|                          | [CVE-2021-3657]                          |
|                          |                                          |
| jqueryui [29]            | Fix untrusted code execution issues      |
|                          | [CVE-2021-41182 CVE-2021-41183 CVE-2021- |
|                          | 41184]                                  |
|                          |                                          |
| jwm [30]                | Fix crash when using  "Move"  menu item  |
|                          |                                          |
| keepalived [31]          | Fix overly broad DBus policy [CVE-2021-  |
|                          | 44225]                                  |
|                          |                                          |
| keystone [32]            | Resolve information leak allowing        |
|                          | determination of whether users exist    |
|                          | [CVE-2021-38155]; apply some performance |
|                          | improvements to the default keystone-    |
|                          | uwsgi.ini                                |
|                          |                                          |
| kodi [33]                | Fix buffer overflow in PLS playlists    |
|                          | [CVE-2021-42917]                        |
|                          |                                          |
| libayatana-              | Scale icons when loading from file;      |
| indicator [34]          | prevent regular crashes in indicator    |
|                          | applets                                  |
|                          |                                          |
| libdatetime-timezone-    | Update included data                    |
| perl [35]                |                                          |
|                          |                                          |
| libencode-perl [36]      | Fix a memory leak in Encode.xs          |
|                          |                                          |
| libseccomp [37]          | Add support for syscalls up to Linux    |
|                          | 5.15                                    |
|                          |                                          |
| linux [38]              | New upstream release; increase ABI to    |
|                          | 10; RT: update to 5.10.83-rt58          |
|                          |                                          |
| linux-signed-amd64 [39]  | New upstream release; increase ABI to    |
|                          | 10; RT: update to 5.10.83-rt58          |
|                          |                                          |
| linux-signed-arm64 [40]  | New upstream release; increase ABI to    |
|                          | 10; RT: update to 5.10.83-rt58          |
|                          |                                          |
| linux-signed-i386 [41]  | New upstream release; increase ABI to    |
|                          | 10; RT: update to 5.10.83-rt58          |
|                          |                                          |
| lldpd [42]              | Fix heap overflow issue [CVE-2021-      |
|                          | 43612]; do not set VLAN tag if client    |
|                          | did not set it                          |
|                          |                                          |
| mrtg [43]                | Correct errors in variable names        |
|                          |                                          |
| node-getobject [44]      | Resolve prototype pollution issue        |
|                          | [CVE-2020-28282]                        |
|                          |                                          |
| node-json-schema [45]    | Resolve prototype pollution issue        |
|                          | [CVE-2021-3918]                          |
|                          |                                          |
| open3d [46]              | Ensure that python3-open3d depends on    |
|                          | python3-numpy                            |
|                          |                                          |
| opendmarc [47]          | Fix opendmarc-import; increase maximum  |
|                          | supported length of tokens in ARC_Seal  |
|                          | headers, resolving crashes              |
|                          |                                          |
| plib [48]                | Fix integer overflow issue [CVE-2021-    |
|                          | 38714]                                  |
|                          |                                          |
| plocate [49]            | Fix an issue where non-ASCII characters  |
|                          | would be wrongly escaped                |
|                          |                                          |
| poco [50]                | Fix installation of CMake files          |
|                          |                                          |
| privoxy [51]            | Fix memory leaks [CVE-2021-44540        |
|                          | CVE-2021-44541 CVE-2021-44542]; fix      |
|                          | cross-site scripting issue [CVE-2021-    |
|                          | 44543]                                  |
|                          |                                          |
| publicsuffix [52]        | Update included data                    |
|                          |                                          |
| python-django [53]      | New upstream security release: fix      |
|                          | potential bypass of an upstream access  |
|                          | control based on URL paths [CVE-2021-    |
|                          | 44420]                                  |
|                          |                                          |
| python-eventlet [54]    | Fix compatibility with dnspython 2      |
|                          |                                          |
| python-virtualenv [55]  | Fix crash when using --no-setuptools    |
|                          |                                          |
| ros-ros-comm [56]        | Fix denial of service issue [CVE-2021-  |
|                          | 37146]                                  |
|                          |                                          |
| ruby-httpclient [57]    | Use system certificate store            |
|                          |                                          |
| rustc-mozilla [58]      | New source package to support building  |
|                          | of newer firefox-esr and thunderbird    |
|                          | versions                                |
|                          |                                          |
| supysonic [59]          | Symlink jquery instead of loading it    |
|                          | directly; correctly symlink minimized    |
|                          | bootstrap CSS files                      |
|                          |                                          |
| tzdata [60]              | Update data for Fiji and Palestine      |
|                          |                                          |
| udisks2 [61]            | Mount options: Always use                |
|                          | errors=remount-ro for ext filesystems    |
|                          | [CVE-2021-3802]; use the mkfs command to |
|                          | format exfat partitions; add Recommends  |
|                          | exfatprogs as preferred alternative      |
|                          |                                          |
| ulfius [62]              | Fix use of custom allocators with        |
|                          | ulfius_url_decode and ulfius_url_encode  |
|                          |                                          |
| vim [63]                | Fix heap overflows [CVE-2021-3770        |
|                          | CVE-2021-3778], use after free issue    |
|                          | [CVE-2021-3796]; remove vim-gtk          |
|                          | alternatives during vim-gtk -> vim-gtk3  |
|                          | transition, easing upgrades from buster  |
|                          |                                          |
| wget [64]                | Fix downloads over 2GB on 32-bit systems |
|                          |                                          |
+--------------------------+------------------------------------------+

    1: https://packages.debian.org/src:authheaders
    2: https://packages.debian.org/src:base-files
    3: https://packages.debian.org/src:bpftrace
    4: https://packages.debian.org/src:brltty
    5: https://packages.debian.org/src:btrbk
    6: https://packages.debian.org/src:calibre
    7: https://packages.debian.org/src:chrony
    8: https://packages.debian.org/src:cmake
    9: https://packages.debian.org/src:containerd
  10: https://packages.debian.org/src:curl
  11: https://packages.debian.org/src:datatables.js
  12: https://packages.debian.org/src:debian-edu-config
  13: https://packages.debian.org/src:debian-edu-doc
  14: https://packages.debian.org/src:debian-installer
  15: https://packages.debian.org/src:debian-i...oot-images
  16: https://packages.debian.org/src:distro-info-data
  17: https://packages.debian.org/src:docker.io
  18: https://packages.debian.org/src:edk2
  19: https://packages.debian.org/src:freeipmi
  20: https://packages.debian.org/src:gdal
  21: https://packages.debian.org/src:gerbv
  22: https://packages.debian.org/src:gmp
  23: https://packages.debian.org/src:golang-1.15
  24: https://packages.debian.org/src:grass
  25: https://packages.debian.org/src:horizon
  26: https://packages.debian.org/src:htmldoc
  27: https://packages.debian.org/src:im-config
  28: https://packages.debian.org/src:isync
  29: https://packages.debian.org/src:jqueryui
  30: https://packages.debian.org/src:jwm
  31: https://packages.debian.org/src:keepalived
  32: https://packages.debian.org/src:keystone
  33: https://packages.debian.org/src:kodi
  34: https://packages.debian.org/src:libayatana-indicator
  35: https://packages.debian.org/src:libdatet...ezone-perl
  36: https://packages.debian.org/src:libencode-perl
  37: https://packages.debian.org/src:libseccomp
  38: https://packages.debian.org/src:linux
  39: https://packages.debian.org/src:linux-signed-amd64
  40: https://packages.debian.org/src:linux-signed-arm64
  41: https://packages.debian.org/src:linux-signed-i386
  42: https://packages.debian.org/src:lldpd
  43: https://packages.debian.org/src:mrtg
  44: https://packages.debian.org/src:node-getobject
  45: https://packages.debian.org/src:node-json-schema
  46: https://packages.debian.org/src:open3d
  47: https://packages.debian.org/src:opendmarc
  48: https://packages.debian.org/src:plib
  49: https://packages.debian.org/src:plocate
  50: https://packages.debian.org/src:poco
  51: https://packages.debian.org/src:privoxy
  52: https://packages.debian.org/src:publicsuffix
  53: https://packages.debian.org/src:python-django
  54: https://packages.debian.org/src:python-eventlet
  55: https://packages.debian.org/src:python-virtualenv
  56: https://packages.debian.org/src:ros-ros-comm
  57: https://packages.debian.org/src:ruby-httpclient
  58: https://packages.debian.org/src:rustc-mozilla
  59: https://packages.debian.org/src:supysonic
  60: https://packages.debian.org/src:tzdata
  61: https://packages.debian.org/src:udisks2
  62: https://packages.debian.org/src:ulfius
  63: https://packages.debian.org/src:vim
  64: https://packages.debian.org/src:wget

Security Updates
----------------

This revision adds the following security updates to the stable release.
The Security Team has already released an advisory for each of these
updates:

+----------------+----------------------------+
| Advisory ID    | Package                    |
+----------------+----------------------------+
| DSA-4980 [65]  | qemu [66]                  |
|                |                            |
| DSA-4981 [67]  | firefox-esr [68]          |
|                |                            |
| DSA-4982 [69]  | apache2 [70]              |
|                |                            |
| DSA-4983 [71]  | neutron [72]              |
|                |                            |
| DSA-4984 [73]  | flatpak [74]              |
|                |                            |
| DSA-4985 [75]  | wordpress [76]            |
|                |                            |
| DSA-4986 [77]  | tomcat9 [78]              |
|                |                            |
| DSA-4987 [79]  | squashfs-tools [80]        |
|                |                            |
| DSA-4988 [81]  | libreoffice [82]          |
|                |                            |
| DSA-4989 [83]  | strongswan [84]            |
|                |                            |
| DSA-4992 [85]  | php7.4 [86]                |
|                |                            |
| DSA-4994 [87]  | bind9 [88]                |
|                |                            |
| DSA-4995 [89]  | webkit2gtk [90]            |
|                |                            |
| DSA-4996 [91]  | wpewebkit [92]            |
|                |                            |
| DSA-4998 [93]  | ffmpeg [94]                |
|                |                            |
| DSA-5002 [95]  | containerd [96]            |
|                |                            |
| DSA-5003 [97]  | ldb [98]                  |
|                |                            |
| DSA-5003 [99]  | samba [100]                |
|                |                            |
| DSA-5004 [101] | libxstream-java [102]      |
|                |                            |
| DSA-5007 [103] | postgresql-13 [104]        |
|                |                            |
| DSA-5008 [105] | node-tar [106]            |
|                |                            |
| DSA-5009 [107] | tomcat9 [108]              |
|                |                            |
| DSA-5010 [109] | libxml-security-java [110] |
|                |                            |
| DSA-5011 [111] | salt [112]                |
|                |                            |
| DSA-5013 [113] | roundcube [114]            |
|                |                            |
| DSA-5016 [115] | nss [116]                  |
|                |                            |
| DSA-5017 [117] | xen [118]                  |
|                |                            |
| DSA-5019 [119] | wireshark [120]            |
|                |                            |
| DSA-5020 [121] | apache-log4j2 [122]        |
|                |                            |
| DSA-5022 [123] | apache-log4j2 [124]        |
|                |                            |
+----------------+----------------------------+

  65: https://www.debian.org/security/2021/dsa-4980
  66: https://packages.debian.org/src:qemu
  67: https://www.debian.org/security/2021/dsa-4981
  68: https://packages.debian.org/src:firefox-esr
  69: https://www.debian.org/security/2021/dsa-4982
  70: https://packages.debian.org/src:apache2
  71: https://www.debian.org/security/2021/dsa-4983
  72: https://packages.debian.org/src:neutron
  73: https://www.debian.org/security/2021/dsa-4984
  74: https://packages.debian.org/src:flatpak
  75: https://www.debian.org/security/2021/dsa-4985
  76: https://packages.debian.org/src:wordpress
  77: https://www.debian.org/security/2021/dsa-4986
  78: https://packages.debian.org/src:tomcat9
  79: https://www.debian.org/security/2021/dsa-4987
  80: https://packages.debian.org/src:squashfs-tools
  81: https://www.debian.org/security/2021/dsa-4988
  82: https://packages.debian.org/src:libreoffice
  83: https://www.debian.org/security/2021/dsa-4989
  84: https://packages.debian.org/src:strongswan
  85: https://www.debian.org/security/2021/dsa-4992
  86: https://packages.debian.org/src:php7.4
  87: https://www.debian.org/security/2021/dsa-4994
  88: https://packages.debian.org/src:bind9
  89: https://www.debian.org/security/2021/dsa-4995
  90: https://packages.debian.org/src:webkit2gtk
  91: https://www.debian.org/security/2021/dsa-4996
  92: https://packages.debian.org/src:wpewebkit
  93: https://www.debian.org/security/2021/dsa-4998
  94: https://packages.debian.org/src:ffmpeg
  95: https://www.debian.org/security/2021/dsa-5002
  96: https://packages.debian.org/src:containerd
  97: https://www.debian.org/security/2021/dsa-5003
  98: https://packages.debian.org/src:ldb
  99: https://www.debian.org/security/2021/dsa-5003
  100: https://packages.debian.org/src:samba
  101: https://www.debian.org/security/2021/dsa-5004
  102: https://packages.debian.org/src:libxstream-java
  103: https://www.debian.org/security/2021/dsa-5007
  104: https://packages.debian.org/src:postgresql-13
  105: https://www.debian.org/security/2021/dsa-5008
  106: https://packages.debian.org/src:node-tar
  107: https://www.debian.org/security/2021/dsa-5009
  108: https://packages.debian.org/src:tomcat9
  109: https://www.debian.org/security/2021/dsa-5010
  110: https://packages.debian.org/src:libxml-security-java
  111: https://www.debian.org/security/2021/dsa-5011
  112: https://packages.debian.org/src:salt
  113: https://www.debian.org/security/2021/dsa-5013
  114: https://packages.debian.org/src:roundcube
  115: https://www.debian.org/security/2021/dsa-5016
  116: https://packages.debian.org/src:nss
  117: https://www.debian.org/security/2021/dsa-5017
  118: https://packages.debian.org/src:xen
  119: https://www.debian.org/security/2021/dsa-5019
  120: https://packages.debian.org/src:wireshark
  121: https://www.debian.org/security/2021/dsa-5020
  122: https://packages.debian.org/src:apache-log4j2
  123: https://www.debian.org/security/2021/dsa-5022
  124: https://packages.debian.org/src:apache-log4j2

Debian Installer
----------------

The installer has been updated to include the fixes incorporated into
stable by the point release.


URLs
----

The complete lists of packages that have changed with this revision:

https://deb.debian.org/debian/dists/bullseye/ChangeLog


The current stable distribution:

https://deb.debian.org/debian/dists/stable/


Proposed updates to the stable distribution:

https://deb.debian.org/debian/dists/proposed-updates


stable distribution information (release notes, errata etc.):

https://www.debian.org/releases/stable/


Security announcements and information:

https://www.debian.org/security/



About Debian
------------

The Debian Project is an association of Free Software developers who
volunteer their time and effort in order to produce the completely free
operating system Debian.
"Kā cilvēks, kam trūkst pašcieņas, nav dīdzējs, bet nīcējs, tā arī tauta, kurai nav pašapziņas." K.Mīlenbahs
Atbilde
#8
https://www.debian.org/News/2023/20230610
Citāts:Debian 12 bookworm released
June 10th, 2023
After 1 year, 9 months, and 28 days of development, the Debian project is proud to present its new stable version 12 (code name bookworm).
bookworm will be supported for the next 5 years thanks to the combined work of the Debian Security team and the Debian Long Term Support team.
Following the 2022 General Resolution about non-free firmware, we have introduced a new archive area making it possible to separate non-free firmware from the other non-free packages:
  • non-free-firmware
Most non-free firmware packages have been moved from non-free to non-free-firmware. This separation makes it possible to build a variety of official installation images.
"Kā cilvēks, kam trūkst pašcieņas, nav dīdzējs, bet nīcējs, tā arī tauta, kurai nav pašapziņas." K.Mīlenbahs
Atbilde
#9
Viena birokrātiska īpatnība ir ka Debian pamatkokā ir atteicies no lielo burtu lietošanas, lai nemulsinātu m$ lietotājus, ka linux m atšķiras no M Smile
"Kā cilvēks, kam trūkst pašcieņas, nav dīdzējs, bet nīcējs, tā arī tauta, kurai nav pašapziņas." K.Mīlenbahs
Atbilde
#10
Updated Debian 12: 12.1 released

July 22nd, 2023

The Debian project is pleased to announce the first update of its stable distribution Debian 12 (codename "bookworm"). This point release mainly adds corrections for security issues, along with a few adjustments for serious problems. Security advisories have already been published separately and are referenced where available.

Please note that the point release does not constitute a new version of Debian 12 but only updates some of the packages included. There is no need to throw away old "bookworm" media. After installation, packages can be upgraded to the current versions using an up-to-date Debian mirror.

Those who frequently install updates from security.debian.org won't have to update many packages, and most such updates are included in the point release.

New installation images will be available soon at the regular locations.
"Kā cilvēks, kam trūkst pašcieņas, nav dīdzējs, bet nīcējs, tā arī tauta, kurai nav pašapziņas." K.Mīlenbahs
Atbilde
« Vecāks | Jaunāks »


Pārlēkt uz:


Users browsing this thread: 3 Guest(s)