Debian Bullseye 11.5 é lançado


Lançado o quinto pacote de correções do Debian Bullseye a  versão 11.5, confira os detalhes das 54 correções de segurança e 58 bugs corrigidos.

Debian Bullseye 11.5 é lançado

O anúncio foi feito em 10 de Setembro  de 2022.

"O projeto Debian tem o prazer de anunciar a quinta atualização de sua distribuição estável Debian 11 (codinome "bullseye"). Esta versão pontual adiciona principalmente correções para problemas de segurança, juntamente com alguns ajustes para problemas sérios. Os avisos de segurança já foram publicados separadamente e são referenciados quando disponíveis. "

Os bugs corrigidos podem ser conferidos no quadro abaixo.

Package Reason avahi Fix display of URLs containing in avahi-discover; do not disable timeout cleanup on watch cleanup; fix NULL pointer crashes when trying to resolve badly-formatted hostnames [CVE-2021-3502] base-files Update /etc/debian_version for the 11.5 point release cargo-mozilla New source package to support building of newer firefox-esr and thunderbird versions clamav New upstream stable release commons-daemon Fix JVM detection curl Reject cookies with "control bytes" [CVE-2022-35252] dbus-broker Fix assertion failure when disconnecting peer groups; fix memory leak; fix null pointer dereference [CVE-2022-31213] debian-installer Rebuild against proposed-updates; increase Linux kernel ABI to 5.10.0-18 debian-installer-netboot-images Rebuild against proposed-updates; increase Linux kernel ABI to 5.10.0-18 debian-security-support Update support status of various packages debootstrap Ensure non-merged-usr chroots can continue to be created for older releases and buildd chroots dlt-daemon Fix double free issue [CVE-2022-31291] dnsproxy Listen on localhost by default, rather than the possibly unavailable 192.168.168.1 dovecot Fix possible security issues when two passdb configuration entries exist with the same driver and args settings [CVE-2022-30550] dpkg Fix conffile removal-on-upgrade handling, memory leak in remove-on-upgrade handling; Dpkg::Shlibs::Objdump: Fix apply_relocations to work with versioned symbols; add support for ARCv2 CPU; several updates and fixes to dpkg-fsys-usrunmess fig2dev Fix double free issue [CVE-2021-37529], denial of service issue [CVE-2021-37530]; stop misplacement of embedded eps images foxtrotgps Fix crash by ensuring that threads are always unreferenced gif2apng Fix heap-based buffer overflows [CVE-2021-45909 CVE-2021-45910 CVE-2021-45911] glibc Fix an off-by-one buffer overflow/underflow in getcwd() [CVE-2021-3999]; fix several overflows in wide character functions; add a few EVEX optimized string functions to fix a performance issue (up to 40%) with Skylake-X processors; make grantpt usable after multi-threaded fork; ensure that libio vtable protection is enabled golang-github-pkg-term Fix building on newer Linux kernels gri Use "ps2pdf" instead of "convert" for converting from PS to PDF grub-efi-amd64-signed New upstream release grub-efi-arm64-signed New upstream release grub-efi-ia32-signed New upstream release grub2 New upstream release http-parser Unset F_CHUNKED on new Transfer-Encoding, fixing possible HTTP request smuggling issue [CVE-2020-8287] ifenslave Fix bonded interface configurations inetutils Fix buffer overflow issue [CVE-2019-0053], stack exhaustion issue, handling of FTP PASV responses [CVE-2021-40491], denial of service issue [CVE-2022-39028] knot Fix IXFR to AXFR fallback with dnsmasq krb5 Use SHA256 as Pkinit CMS Digest libayatana-appindicator Provide compatibility for software that depends on libappindicator libdatetime-timezone-perl Update included data libhttp-daemon-perl Improve handling of Content-Length header [CVE-2022-31081] libreoffice Support EUR in .hr locale; add HRK<->EUR conversion rate to Calc and the Euro Wizard; security fixes [CVE-2021-25636 CVE-2022-26305 CVE-2022-26306 CVE-2022-26307]; fix hang accessing Evolution address books linux New upstream stable release linux-signed-amd64 New upstream stable release linux-signed-arm64 New upstream stable release linux-signed-i386 New upstream stable release llvm-toolchain-13 New source package to support building of newer firefox-esr and thunderbird versions lwip Fix buffer overflow issues [CVE-2020-22283 CVE-2020-22284] mokutil New upstream version, to allow for SBAT management node-log4js Do not create world-readable files by default [CVE-2022-21704] node-moment Fix regular expression-based denial of service issue [CVE-2022-31129] nvidia-graphics-drivers New upstream release; security fixes [CVE-2022-31607 CVE-2022-31608 CVE-2022-31615] nvidia-graphics-drivers-legacy-390xx New upstream release; security fixes [CVE-2022-31607 CVE-2022-31608 CVE-2022-31615] nvidia-graphics-drivers-tesla-450 New upstream release; security fixes [CVE-2022-31607 CVE-2022-31608 CVE-2022-31615] nvidia-graphics-drivers-tesla-470 New upstream release; security fixes [CVE-2022-31607 CVE-2022-31608 CVE-2022-31615] nvidia-settings New upstream release; fix cross-building nvidia-settings-tesla-470 New upstream release; fix cross-building pcre2 Fix out-of-bounds read issues [CVE-2022-1586 CVE-2022-1587] postgresql-13 Do not let extension scripts replace objects not already belonging to the extension [CVE-2022-2625] publicsuffix Update included data rocksdb Fix illegal instruction on arm64 sbuild Buildd::Mail: support MIME encoded Subject: header, also copy the Content-Type: header when forwarding mail systemd Drop bundled copy of linux/if_arp.h, fixing build failures with newer kernel headers; support detection for ARM64 Hyper-V guests; detect OpenStack instance as KVM on arm twitter-bootstrap4 Actually install CSS map files tzdata Update timezone data for Iran and Chile xtables-addons Support both old and new versions of security_skb_classify_flow()

As correções de segurança no próximo quadro.


Advisory ID Package DSA-5175 thunderbird DSA-5176 blender DSA-5177 ldap-account-manager DSA-5178 intel-microcode DSA-5179 php7.4 DSA-5180 chromium DSA-5181 request-tracker4 DSA-5182 webkit2gtk DSA-5183 wpewebkit DSA-5184 xen DSA-5185 mat2 DSA-5187 chromium DSA-5188 openjdk-11 DSA-5189 gsasl DSA-5190 spip DSA-5191 linux-signed-amd64 DSA-5191 linux-signed-arm64 DSA-5191 linux-signed-i386 DSA-5191 linux DSA-5192 openjdk-17 DSA-5193 firefox-esr DSA-5194 booth DSA-5195 thunderbird DSA-5196 libpgjava DSA-5197 curl DSA-5198 jetty9 DSA-5199 xorg-server DSA-5200 libtirpc DSA-5201 chromium DSA-5202 unzip DSA-5203 gnutls28 DSA-5204 gst-plugins-good1.0 DSA-5205 ldb DSA-5205 samba DSA-5206 trafficserver DSA-5207 linux-signed-amd64 DSA-5207 linux-signed-arm64 DSA-5207 linux-signed-i386 DSA-5207 linux DSA-5208 epiphany-browser DSA-5209 net-snmp DSA-5210 webkit2gtk DSA-5211 wpewebkit DSA-5213 schroot DSA-5214 kicad DSA-5215 open-vm-tools DSA-5216 libxslt DSA-5217 firefox-esr DSA-5218 zlib DSA-5219 webkit2gtk DSA-5220 wpewebkit DSA-5221 thunderbird DSA-5222 dpdk

Atualizar o sistema

Para atualizar o seu sistema atualize a lista de pacotes executando no terminal.

sudo apt update

Atualize o sistema.

sudo apt full-upgrade

Ao final confira a versão do seu Debian.

cat /etc/debian_version



Fonte

Comentários

Você precisa ver isso

Todos os arquivos do blog

Mostrar mais