Uppdaterad Debian 11; 11.6 utgiven
17 december 2022
Debianprojektet presenterar stolt sin sjätte uppdatering till dess
stabila utgåva Debian 11 (med kodnamnet bullseye
).
Denna punktutgåva lägger huvudsakligen till rättningar för säkerhetsproblem,
tillsammans med ytterligare rättningar för allvarliga problem. Säkerhetsbulletiner
har redan publicerats separat och refereras när de finns tillgängliga.
Vänligen notera att punktutgåvan inte innebär en ny version av Debian
11 utan endast uppdaterar några av de inkluderade paketen. Det behövs
inte kastas bort gamla media av bullseye
. Efter installationen
kan paket uppgraderas till de aktuella versionerna genom att använda en uppdaterad
Debianspegling..
De som frekvent installerar uppdateringar från security.debian.org kommer inte att behöva uppdatera många paket, och de flesta av sådana uppdateringar finns inkluderade i punktutgåvan.
Nya installationsavbildningar kommer snart att finnas tillgängliga på de vanliga platserna.
En uppgradering av en existerande installation till denna revision kan utföras genom att peka pakethanteringssystemet på en av Debians många HTTP-speglingar. En utförlig lista på speglingar finns på:
Blandade felrättningar
Denna uppdatering av den stabila utgåvan lägger till några viktiga felrättningar till följande paket:
Paket | Orsak |
---|---|
awstats | Fix cross site scripting issue [CVE-2022-46391] |
base-files | Update /etc/debian_version for the 11.6 point release |
binfmt-support | Run binfmt-support.service after systemd-binfmt.service |
clickhouse | Fix out-of-bounds read issues [CVE-2021-42387 CVE-2021-42388], buffer overflow issues [CVE-2021-43304 CVE-2021-43305] |
containerd | CRI plugin: Fix goroutine leak during Exec [CVE-2022-23471] |
core-async-clojure | Fix build failures in test suite |
dcfldd | Fix SHA1 output on big-endian architectures |
debian-installer | Rebuild against proposed-updates; increase Linux kernel ABI to 5.10.0-20 |
debian-installer-netboot-images | Rebuild against proposed-updates |
debmirror | Add non-free-firmware to the default section list |
distro-info-data | Add Ubuntu 23.04, Lunar Lobster; update Debian ELTS end dates; correct Debian 8 (jessie) release date |
dojo | Fix prototype pollution issue [CVE-2021-23450] |
dovecot-fts-xapian | Generate dependency on dovecot ABI version in use during build |
efitools | Fix intermittent build failure due to incorrect dependency in makefile |
evolution | Move Google Contacts addressbooks to CalDAV since the Google Contacts API has been turned off |
evolution-data-server | Move Google Contacts addressbooks to CalDAV since the Google Contacts API has been turned off; fix compatibility with Gmail OAuth changes |
evolution-ews | Fix retrieval of user certificates belonging to contacts |
g810-led | Control device access with uaccess instead of making everything world-writable [CVE-2022-46338] |
glibc | Fix regression in wmemchr and wcslen on CPUs that have AVX2 but not BMI2 (e.g. Intel Haswell) |
golang-github-go-chef-chef | Fix intermittent test failure |
grub-efi-amd64-signed | Don't strip Xen binaries, so they work again; include fonts in the memdisk build for EFI images; fix bug in core file code so errors are handled better; bump Debian SBAT level to 4 |
grub-efi-arm64-signed | Don't strip Xen binaries, so they work again; include fonts in the memdisk build for EFI images; fix bug in core file code so errors are handled better; bump Debian SBAT level to 4 |
grub-efi-ia32-signed | Don't strip Xen binaries, so they work again; include fonts in the memdisk build for EFI images; fix bug in core file code so errors are handled better; bump Debian SBAT level to 4 |
grub2 | Don't strip Xen binaries, so they work again; include fonts in the memdisk build for EFI images; fix bug in core file code so errors are handled better; bump Debian SBAT level to 4 |
hydrapaper | Add missing dependeny on python3-pil |
isoquery | Fix test failure caused by a French translation change in the iso-codes package |
jtreg6 | New package, required to build newer openjdk-11 versions |
lemonldap-ng | Improve session destroy propagation [CVE-2022-37186] |
leptonlib | Fix divide-by-zero [CVE-2022-38266] |
libapache2-mod-auth-mellon | Fix open redirect issue [CVE-2021-3639] |
libbluray | Fix BD-J support with recent Oracle Java updates |
libconfuse | Fix a heap-based buffer over-read in cfg_tilde_expand [CVE-2022-40320] |
libdatetime-timezone-perl | Update included data |
libtasn1-6 | Fix out-of-bounds read issue [CVE-2021-46848] |
libvncserver | Fix memory leak [CVE-2020-29260]; support larger screen sizes |
linux | New upstream stable release; increase ABI to 20; [rt] Update to 5.10.158-rt77 |
linux-signed-amd64 | New upstream stable release; increase ABI to 20; [rt] Update to 5.10.158-rt77 |
linux-signed-arm64 | New upstream stable release; increase ABI to 20; [rt] Update to 5.10.158-rt77 |
linux-signed-i386 | New upstream stable release; increase ABI to 20; [rt] Update to 5.10.158-rt77 |
mariadb-10.5 | New upstream stable release; security fixes [CVE-2018-25032 CVE-2021-46669 CVE-2022-27376 CVE-2022-27377 CVE-2022-27378 CVE-2022-27379 CVE-2022-27380 CVE-2022-27381 CVE-2022-27382 CVE-2022-27383 CVE-2022-27384 CVE-2022-27386 CVE-2022-27387 CVE-2022-27444 CVE-2022-27445 CVE-2022-27446 CVE-2022-27447 CVE-2022-27448 CVE-2022-27449 CVE-2022-27451 CVE-2022-27452 CVE-2022-27455 CVE-2022-27456 CVE-2022-27457 CVE-2022-27458 CVE-2022-32081 CVE-2022-32082 CVE-2022-32083 CVE-2022-32084 CVE-2022-32085 CVE-2022-32086 CVE-2022-32087 CVE-2022-32088 CVE-2022-32089 CVE-2022-32091] |
mod-wsgi | Drop X-Client-IP header when it is not a trusted header [CVE-2022-2255] |
mplayer | Fix several security issues [CVE-2022-38850 CVE-2022-38851 CVE-2022-38855 CVE-2022-38858 CVE-2022-38860 CVE-2022-38861 CVE-2022-38863 CVE-2022-38864 CVE-2022-38865 CVE-2022-38866] |
mutt | Fix gpgme crash when listing keys in a public key block, and public key block listing for old versions of gpgme |
nano | Fix crashes and a potential data loss issue |
nftables | Fix off-by-one / double free error |
node-hawk | Parse URLs using stdlib [CVE-2022-29167] |
node-loader-utils | Fix prototype pollution issue [CVE-2022-37599 CVE-2022-37601], regular expression-based denial of service issue [CVE-2022-37603] |
node-minimatch | Improve protection against regular expression-based denial of service [CVE-2022-3517]; fix regression in patch for CVE-2022-3517 |
node-qs | Fix prototype pollution issue [CVE-2022-24999] |
node-xmldom | Fix prototype pollution issue [CVE-2022-37616]; prevent insertion of non-well-formed nodes [CVE-2022-39353] |
nvidia-graphics-drivers | New upstream release; security fixes [CVE-2022-34670 CVE-2022-34674 CVE-2022-34675 CVE-2022-34677 CVE-2022-34679 CVE-2022-34680 CVE-2022-34682 CVE-2022-42254 CVE-2022-42255 CVE-2022-42256 CVE-2022-42257 CVE-2022-42258 CVE-2022-42259 CVE-2022-42260 CVE-2022-42261 CVE-2022-42262 CVE-2022-42263 CVE-2022-42264] |
nvidia-graphics-drivers-legacy-390xx | New upstream release; security fixes [CVE-2022-34670 CVE-2022-34674 CVE-2022-34675 CVE-2022-34677 CVE-2022-34680 CVE-2022-42257 CVE-2022-42258 CVE-2022-42259] |
nvidia-graphics-drivers-tesla-450 | New upstream release; security fixes [CVE-2022-34670 CVE-2022-34674 CVE-2022-34675 CVE-2022-34677 CVE-2022-34679 CVE-2022-34680 CVE-2022-34682 CVE-2022-42254 CVE-2022-42256 CVE-2022-42257 CVE-2022-42258 CVE-2022-42259 CVE-2022-42260 CVE-2022-42261 CVE-2022-42262 CVE-2022-42263 CVE-2022-42264] |
nvidia-graphics-drivers-tesla-470 | New upstream release; security fixes [CVE-2022-34670 CVE-2022-34674 CVE-2022-34675 CVE-2022-34677 CVE-2022-34679 CVE-2022-34680 CVE-2022-34682 CVE-2022-42254 CVE-2022-42255 CVE-2022-42256 CVE-2022-42257 CVE-2022-42258 CVE-2022-42259 CVE-2022-42260 CVE-2022-42261 CVE-2022-42262 CVE-2022-42263 CVE-2022-42264] |
omnievents | Add missing dependency on libjs-jquery to the omnievents-doc package |
onionshare | Fix denial of service issue [CVE-2022-21689], HTML injection issue [CVE-2022-21690] |
openvpn-auth-radius | Support verify-client-cert directive |
postfix | New upstream stable release |
postgresql-13 | New upstream stable release |
powerline-gitstatus | Fix command injection via malicious repository config [CVE-2022-42906] |
pysubnettree | Fix module build |
speech-dispatcher | Reduce espeak buffer size to avoid synth artifacts |
spf-engine | Fix pyspf-milter failing to start due to an invalid import statement |
tinyexr | Fix heap overflow issues [CVE-2022-34300 CVE-2022-38529] |
tinyxml | Fix infinite loop [CVE-2021-42260] |
tzdata | Update data for Fiji, Mexico and Palestine; update leap andras list |
virglrenderer | Fix out-of-bounds write issue [CVE-2022-0135] |
x2gothinclient | Make the x2gothinclient-minidesktop package provide the lightdm-greeter virtual package |
xfig | Fix buffer overflow issue [CVE-2021-40241] |
Säkerhetsuppdateringar
Denna revision lägger till följande säkerhetsuppdateringar till den stabila utgåvan. Säkerhetsgruppen har redan släppt bulletiner för alla dessa uppdateringar:
Debianinstalleraren
Installeraren har uppdaterats för att inkludera rättningarna som har inkluderats i den stabila utgåvan med denna punktutgåva.
URLer
Den fullständiga listan på paket som har förändrats i denna revision:
Den aktuella stabila utgåvan:
Föreslagna uppdateringar till den stabila utgåvan:
Information om den stabila utgåvan (versionsfakta, kända problem osv.):
Säkerhetsbulletiner och information:
Om Debian
Debianprojektet är en grupp utvecklare av Fri mjukvara som donerar sin tid och kraft för att producera det helt fria operativsystemet Debian.
Kontaktinformation
För ytterligare information, vänligen besök Debians webbplats på https://www.debian.org/, skicka e-post till <press@debian.org>, eller kontakta gruppen för stabila utgåvor på <debian-release@lists.debian.org>.