Lançado o Debian 10.7 Buster

A comunidade Debian lançou o seu 7º pacote de correções para o Debian 10 Buster, confira os detalhes e como atualizar o seu sistema operacional Debian GNU Linux.




Debian 10.7 Buster


O anúncio foi feito em 05 de Dezembro de 2020 pela comunidade Debian.


"O projeto Debian tem o prazer de anunciar a sétima atualização de sua distribuição estável Debian 10 (codinome "buster"). Esta versão pontual adiciona principalmente correções para problemas de segurança, junto com alguns ajustes para problemas sérios. Os avisos de segurança já foram publicados separadamente e são referenciados quando disponíveis."



Correção de bugs


Os programas do quadro abaixo receberam correções para bugs.


base-files Update for the point release choose-mirror Update mirror list cups Fix 'printer-alert' invalid free dav4tbsync New upstream release, compatible with newer Thunderbird versions debian-installer Use 4.19.0-13 Linux kernel ABI; add grub2 to Built-Using debian-installer-netboot-images Rebuild against proposed-updates distro-info-data Add Ubuntu 21.04, Hirsute Hippo dpdk New upstream stable release; fix remote code execution issue [CVE-2020-14374], TOCTOU issues [CVE-2020-14375], buffer overflow [CVE-2020-14376], buffer over read [CVE-2020-14377] and integer underflow [CVE-2020-14377]; fix armhf build with NEON eas4tbsync New upstream release, compatible with newer Thunderbird versions edk2 Fix integer overflow in DxeImageVerificationHandler [CVE-2019-14562] efivar Add support for nvme-fabrics and nvme-subsystem devices; fix uninitialized variable in parse_acpi_root, avoiding possible segfault enigmail Introduce migration assistant to Thunderbird's built-in GPG support espeak Fix using espeak with mbrola-fr4 when mbrola-fr1 is not installed fastd Fix memory leak when receiving too many invalid packets [CVE-2020-27638] fish Ensure TTY options are restored on exit freecol Fix XML External Entity vulnerability [CVE-2018-1000825] gajim-omemo Use 12-byte IV, for better compatibility with iOS clients glances Listen only on localhost by default iptables-persistent Don't force-load kernel modules; improve rule flushing logic lacme Use upstream certificate chain instead of an hardcoded one, easing support for new Let's Encrypt root and intermediate certificates libdatetime-timezone-perl Update included data to tzdata 2020d libimobiledevice Add partial support for iOS 14 libjpeg-turbo Fix denial of service [CVE-2018-1152], buffer over read [CVE-2018-14498], possible remote code execution [CVE-2019-2201], buffer over read [CVE-2020-13790] libxml2 Fix denial of service [CVE-2017-18258], NULL pointer dereference [CVE-2018-14404], infinite loop [CVE-2018-14567], memory leak [CVE-2019-19956 CVE-2019-20388], infinite loop [CVE-2020-7595] linux New upstream stable release linux-latest Update for 4.19.0-13 kernel ABI linux-signed-amd64 New upstream stable release linux-signed-arm64 New upstream stable release linux-signed-i386 New upstream stable release lmod Change architecture to "any" - required due to LUA_PATH and LUA_CPATH being determined at build time mariadb-10.3 New upstream stable release; security fixes [CVE-2020-14765 CVE-2020-14776 CVE-2020-14789 CVE-2020-14812 CVE-2020-28912] mutt Ensure IMAP connection is closed after a connection error [CVE-2020-28896] neomutt Ensure IMAP connection is closed after a connection error [CVE-2020-28896] node-object-path Fix prototype pollution in set() [CVE-2020-15256] node-pathval Fix prototype pollution [CVE-2020-7751] okular Fix code execution via action link [CVE-2020-9359] openjdk-11 New upstream release; fix JVM crash partman-auto Increase /boot sizes in most recipes to between 512 and 768M, to better handle kernel ABI changes and larger initramfses; cap RAM size as used for swap partition calculations, resolving issues on machines with more RAM than disk space pcaudiolib Cap cancellation latency to 10ms plinth Apache: Disable mod_status [CVE-2020-25073] puma Fix HTTP injection and HTTP smuggling issues [CVE-2020-5247 CVE-2020-5249 CVE-2020-11076 CVE-2020-11077] ros-ros-comm Fix integer overflow [CVE-2020-16124] ruby2.5 Fix potential HTTP request smuggling vulnerability in WEBrick [CVE-2020-25613] sleuthkit Fix stack buffer overflow in yaffsfs_istat [CVE-2020-10232] sqlite3 Fix division by zero [CVE-2019-16168], NULL pointer dereference [CVE-2019-19923], mishandling of NULL pathname during an update of a ZIP archive [CVE-2019-19925], mishandling of embedded NULs in filenames [CVE-2019-19959], possible crash (unwinding WITH stack [CVE-2019-20218], integer overflow [CVE-2020-13434], segmentation fault [CVE-2020-13435], use-after-free issue [CVE-2020-13630], NULL pointer dereference [CVE-2020-13632], heap overflow [CVE-2020-15358] systemd Basic/cap-list: parse/print numerical capabilities; recognise new capabilities from Linux kernel 5.8; networkd: do not generate MAC for bridge device tbsync New upstream release, compatible with newer Thunderbird versions tcpdump Fix untrusted input issue in the PPP printer [CVE-2020-8037] tigervnc Properly store certificate exceptions in native and java VNC viewer [CVE-2020-26117] tor New upstream stable release; multiple security, usability, portability, and reliability fixes transmission Fix memory leak tzdata New upstream release ublock-origin New upstream version; split plugin to browser-specific packages vips Fix use of uninitialised variable [CVE-2020-20739]  


Correções de segurança


Os pacotes abaixo receberam correções de segurança.


Advisory ID Package DSA-4766 rails DSA-4767 mediawiki DSA-4768 firefox-esr DSA-4769 xen DSA-4770 thunderbird DSA-4771 spice DSA-4772 httpcomponents-client DSA-4773 yaws DSA-4774 linux-latest DSA-4774 linux-signed-amd64 DSA-4774 linux-signed-arm64 DSA-4774 linux-signed-i386 DSA-4774 linux DSA-4775 python-flask-cors DSA-4776 mariadb-10.3 DSA-4777 freetype DSA-4778 firefox-esr DSA-4779 openjdk-11 DSA-4780 thunderbird DSA-4781 blueman DSA-4782 openldap DSA-4783 sddm DSA-4784 wordpress DSA-4785 raptor2 DSA-4786 libexif DSA-4787 moin DSA-4788 firefox-esr DSA-4789 codemirror-js DSA-4790 thunderbird DSA-4791 pacemaker DSA-4792 openldap DSA-4793 firefox-esr DSA-4794 mupdf DSA-4795 krb5 DSA-4796 thunderbird DSA-4798 spip DSA-4799 x11vnc DSA-4800 libproxy  

 

Removidos

 

Os pacotes abaixo foram removidos do repositório do Debian Buster por não atenderem as exigências necessárias. 


  • freshplayerplugin -  Não suportado por navegadores, descontinuado
  • nostalgy -  Incompatível com versões mais recentes do Thunderbird
  • sieve-extension - Incompatível com versões mais recentes do Thunderbird

 

Fonte

 Atualização

 

Para atualizar o seu Debian GNU Linux para a versão 10.7.0 execute os comandos abaixo no terminal

Atualize a lista de pacotes.

sudo apt update

Atualize o sistema operacional.

sudo apt full-upgrade

 

 OBS: Nunca deixe de atualizar o seu sistema operacional, no mundo Linux essa é a sua maior segurança.

 

Antes de atualizar.

 



 

 

Depois de atualizar.

 




Comentários

  1. Infelizmente não funcionou aqui..vou investigar

    ResponderExcluir
    Respostas
    1. A unica e absoluta forma de não funcionar é que vc estragou o seu sistema usando repositórios de terceiros, arrume seu erro e reverta.

      Excluir
    2. Eu geralmente rodo um update + upgrade semanalmente p/ manter o Debian/Ubuntu/Mint atualizados. Eu tive falhas de atualização ao usar fontes adicionais não oficiais. Reveja seus repositórios.

      Excluir

Postar um comentário

olá, seja bem vindo ao Linux Dicas e suporte !!

Você precisa ver isso

Todos os arquivos do blog

Mostrar mais