Saturday, December 17, 2022

Updated Debian 11: 11.6 released

------------------------------------------------------------------------
The Debian Project https://www.debian.org/
Updated Debian 11: 11.6 released press@debian.org
December 17th, 2022 https://www.debian.org/News/2022/20221217
------------------------------------------------------------------------


The Debian project is pleased to announce the sixth update of its stable
distribution Debian 11 (codename "bullseye"). This point release mainly
adds corrections for security issues, along with a few adjustments for
serious problems. Security advisories have already been published
separately and are referenced where available.

Please note that the point release does not constitute a new version of
Debian 11 but only updates some of the packages included. There is no
need to throw away old "bullseye" media. After installation, packages
can be upgraded to the current versions using an up-to-date Debian
mirror.

Those who frequently install updates from security.debian.org won't have
to update many packages, and most such updates are included in the point
release.

New installation images will be available soon at the regular locations.

Upgrading an existing installation to this revision can be achieved by
pointing the package management system at one of Debian's many HTTP
mirrors. A comprehensive list of mirrors is available at:

https://www.debian.org/mirror/list



Miscellaneous Bugfixes
----------------------

This stable update adds a few important corrections to the following
packages:

+-------------------------+-------------------------------------------+
| Package | Reason |
+-------------------------+-------------------------------------------+
| awstats [1] | Fix cross site scripting issue [CVE-2022- |
| | 46391] |
| | |
| base-files [2] | Update /etc/debian_version for the 11.6 |
| | point release |
| | |
| binfmt-support [3] | Run binfmt-support.service after systemd- |
| | binfmt.service |
| | |
| clickhouse [4] | Fix out-of-bounds read issues [CVE-2021- |
| | 42387 CVE-2021-42388], buffer overflow |
| | issues [CVE-2021-43304 CVE-2021-43305] |
| | |
| containerd [5] | CRI plugin: Fix goroutine leak during |
| | Exec [CVE-2022-23471] |
| | |
| core-async-clojure [6] | Fix build failures in test suite |
| | |
| dcfldd [7] | Fix SHA1 output on big-endian |
| | architectures |
| | |
| debian-installer [8] | Rebuild against proposed-updates; |
| | increase Linux kernel ABI to 5.10.0-20 |
| | |
| debian-installer- | Rebuild against proposed-updates |
| netboot-images [9] | |
| | |
| debmirror [10] | Add non-free-firmware to the default |
| | section list |
| | |
| distro-info-data [11] | Add Ubuntu 23.04, Lunar Lobster; update |
| | Debian ELTS end dates; correct Debian 8 |
| | (jessie) release date |
| | |
| dojo [12] | Fix prototype pollution issue [CVE-2021- |
| | 23450] |
| | |
| dovecot-fts-xapian [13] | Generate dependency on dovecot ABI |
| | version in use during build |
| | |
| efitools [14] | Fix intermittent build failure due to |
| | incorrect dependency in makefile |
| | |
| evolution [15] | Move Google Contacts addressbooks to |
| | CalDAV since the Google Contacts API has |
| | been turned off |
| | |
| evolution-data- | Move Google Contacts addressbooks to |
| server [16] | CalDAV since the Google Contacts API has |
| | been turned off; fix compatibility with |
| | Gmail OAuth changes |
| | |
| evolution-ews [17] | Fix retrieval of user certificates |
| | belonging to contacts |
| | |
| g810-led [18] | Control device access with uaccess |
| | instead of making everything world- |
| | writable [CVE-2022-46338] |
| | |
| glibc [19] | Fix regression in wmemchr and wcslen on |
| | CPUs that have AVX2 but not BMI2 (e.g. |
| | Intel Haswell) |
| | |
| golang-github-go-chef- | Fix intermittent test failure |
| chef [20] | |
| | |
| grub-efi-amd64- | Don't strip Xen binaries, so they work |
| signed [21] | again; include fonts in the memdisk build |
| | for EFI images; fix bug in core file code |
| | so errors are handled better; bump Debian |
| | SBAT level to 4 |
| | |
| grub-efi-arm64- | Don't strip Xen binaries, so they work |
| signed [22] | again; include fonts in the memdisk build |
| | for EFI images; fix bug in core file code |
| | so errors are handled better; bump Debian |
| | SBAT level to 4 |
| | |
| grub-efi-ia32- | Don't strip Xen binaries, so they work |
| signed [23] | again; include fonts in the memdisk build |
| | for EFI images; fix bug in core file code |
| | so errors are handled better; bump Debian |
| | SBAT level to 4 |
| | |
| grub2 [24] | Don't strip Xen binaries, so they work |
| | again; include fonts in the memdisk build |
| | for EFI images; fix bug in core file code |
| | so errors are handled better; bump Debian |
| | SBAT level to 4 |
| | |
| hydrapaper [25] | Add missing dependeny on python3-pil |
| | |
| isoquery [26] | Fix test failure caused by a French |
| | translation change in the iso-codes |
| | package |
| | |
| jtreg6 [27] | New package, required to build newer |
| | openjdk-11 versions |
| | |
| lemonldap-ng [28] | Improve session destroy propagation |
| | [CVE-2022-37186] |
| | |
| leptonlib [29] | Fix divide-by-zero [CVE-2022-38266] |
| | |
| libapache2-mod-auth- | Fix open redirect issue [CVE-2021-3639] |
| mellon [30] | |
| | |
| libbluray [31] | Fix BD-J support with recent Oracle Java |
| | updates |
| | |
| libconfuse [32] | Fix a heap-based buffer over-read in |
| | cfg_tilde_expand [CVE-2022-40320] |
| | |
| libdatetime-timezone- | Update included data |
| perl [33] | |
| | |
| libtasn1-6 [34] | Fix out-of-bounds read issue [CVE-2021- |
| | 46848] |
| | |
| libvncserver [35] | Fix memory leak [CVE-2020-29260]; support |
| | larger screen sizes |
| | |
| linux [36] | New upstream stable release; increase ABI |
| | to 20; [rt] Update to 5.10.158-rt77 |
| | |
| linux-signed-amd64 [37] | New upstream stable release; increase ABI |
| | to 20; [rt] Update to 5.10.158-rt77 |
| | |
| linux-signed-arm64 [38] | New upstream stable release; increase ABI |
| | to 20; [rt] Update to 5.10.158-rt77 |
| | |
| linux-signed-i386 [39] | New upstream stable release; increase ABI |
| | to 20; [rt] Update to 5.10.158-rt77 |
| | |
| mariadb-10.5 [40] | New upstream stable release; security |
| | fixes [CVE-2018-25032 CVE-2021-46669 |
| | CVE-2022-27376 CVE-2022-27377 CVE-2022- |
| | 27378 CVE-2022-27379 CVE-2022-27380 |
| | CVE-2022-27381 CVE-2022-27382 CVE-2022- |
| | 27383 CVE-2022-27384 CVE-2022-27386 |
| | CVE-2022-27387 CVE-2022-27444 CVE-2022- |
| | 27445 CVE-2022-27446 CVE-2022-27447 |
| | CVE-2022-27448 CVE-2022-27449 CVE-2022- |
| | 27451 CVE-2022-27452 CVE-2022-27455 |
| | CVE-2022-27456 CVE-2022-27457 CVE-2022- |
| | 27458 CVE-2022-32081 CVE-2022-32082 |
| | CVE-2022-32083 CVE-2022-32084 CVE-2022- |
| | 32085 CVE-2022-32086 CVE-2022-32087 |
| | CVE-2022-32088 CVE-2022-32089 CVE-2022- |
| | 32091] |
| | |
| mod-wsgi [41] | Drop X-Client-IP header when it is not a |
| | trusted header [CVE-2022-2255] |
| | |
| mplayer [42] | Fix several security issues [CVE-2022- |
| | 38850 CVE-2022-38851 CVE-2022-38855 |
| | CVE-2022-38858 CVE-2022-38860 CVE-2022- |
| | 38861 CVE-2022-38863 CVE-2022-38864 |
| | CVE-2022-38865 CVE-2022-38866] |
| | |
| mutt [43] | Fix gpgme crash when listing keys in a |
| | public key block, and public key block |
| | listing for old versions of gpgme |
| | |
| nano [44] | Fix crashes and a potential data loss |
| | issue |
| | |
| nftables [45] | Fix off-by-one / double free error |
| | |
| node-hawk [46] | Parse URLs using stdlib [CVE-2022-29167] |
| | |
| node-loader-utils [47] | Fix prototype pollution issue [CVE-2022- |
| | 37599 CVE-2022-37601], regular |
| | expression-based denial of service issue |
| | [CVE-2022-37603] |
| | |
| node-minimatch [48] | Improve protection against regular |
| | expression-based denial of service |
| | [CVE-2022-3517]; fix regression in patch |
| | for CVE-2022-3517 |
| | |
| node-qs [49] | Fix prototype pollution issue [CVE-2022- |
| | 24999] |
| | |
| node-xmldom [50] | Fix prototype pollution issue [CVE-2022- |
| | 37616]; prevent insertion of non-well- |
| | formed nodes [CVE-2022-39353] |
| | |
| nvidia-graphics- | New upstream release; security fixes |
| drivers [51] | [CVE-2022-34670 CVE-2022-34674 CVE-2022- |
| | 34675 CVE-2022-34677 CVE-2022-34679 |
| | CVE-2022-34680 CVE-2022-34682 CVE-2022- |
| | 42254 CVE-2022-42255 CVE-2022-42256 |
| | CVE-2022-42257 CVE-2022-42258 CVE-2022- |
| | 42259 CVE-2022-42260 CVE-2022-42261 |
| | CVE-2022-42262 CVE-2022-42263 CVE-2022- |
| | 42264] |
| | |
| nvidia-graphics- | New upstream release; security fixes |
| drivers- | [CVE-2022-34670 CVE-2022-34674 CVE-2022- |
| legacy-390xx [52] | 34675 CVE-2022-34677 CVE-2022-34680 |
| | CVE-2022-42257 CVE-2022-42258 CVE-2022- |
| | 42259] |
| | |
| nvidia-graphics- | New upstream release; security fixes |
| drivers-tesla-450 [53] | [CVE-2022-34670 CVE-2022-34674 CVE-2022- |
| | 34675 CVE-2022-34677 CVE-2022-34679 |
| | CVE-2022-34680 CVE-2022-34682 CVE-2022- |
| | 42254 CVE-2022-42256 CVE-2022-42257 |
| | CVE-2022-42258 CVE-2022-42259 CVE-2022- |
| | 42260 CVE-2022-42261 CVE-2022-42262 |
| | CVE-2022-42263 CVE-2022-42264] |
| | |
| nvidia-graphics- | New upstream release; security fixes |
| drivers-tesla-470 [54] | [CVE-2022-34670 CVE-2022-34674 CVE-2022- |
| | 34675 CVE-2022-34677 CVE-2022-34679 |
| | CVE-2022-34680 CVE-2022-34682 CVE-2022- |
| | 42254 CVE-2022-42255 CVE-2022-42256 |
| | CVE-2022-42257 CVE-2022-42258 CVE-2022- |
| | 42259 CVE-2022-42260 CVE-2022-42261 |
| | CVE-2022-42262 CVE-2022-42263 CVE-2022- |
| | 42264] |
| | |
| omnievents [55] | Add missing dependency on libjs-jquery to |
| | the omnievents-doc package |
| | |
| onionshare [56] | Fix denial of service issue [CVE-2022- |
| | 21689], HTML injection issue [CVE-2022- |
| | 21690] |
| | |
| openvpn-auth- | Support verify-client-cert directive |
| radius [57] | |
| | |
| postfix [58] | New upstream stable release |
| | |
| postgresql-13 [59] | New upstream stable release |
| | |
| powerline- | Fix command injection via malicious |
| gitstatus [60] | repository config [CVE-2022-42906] |
| | |
| pysubnettree [61] | Fix module build |
| | |
| speech-dispatcher [62] | Reduce espeak buffer size to avoid synth |
| | artifacts |
| | |
| spf-engine [63] | Fix pyspf-milter failing to start due to |
| | an invalid import statement |
| | |
| tinyexr [64] | Fix heap overflow issues [CVE-2022-34300 |
| | CVE-2022-38529] |
| | |
| tinyxml [65] | Fix infinite loop [CVE-2021-42260] |
| | |
| tzdata [66] | Update data for Fiji, Mexico and |
| | Palestine; update leap seconds list |
| | |
| virglrenderer [67] | Fix out-of-bounds write issue [CVE-2022- |
| | 0135] |
| | |
| x2gothinclient [68] | Make the x2gothinclient-minidesktop |
| | package provide the lightdm-greeter |
| | virtual package |
| | |
| xfig [69] | Fix buffer overflow issue [CVE-2021- |
| | 40241] |
| | |
+-------------------------+-------------------------------------------+

1: https://packages.debian.org/src:awstats
2: https://packages.debian.org/src:base-files
3: https://packages.debian.org/src:binfmt-support
4: https://packages.debian.org/src:clickhouse
5: https://packages.debian.org/src:containerd
6: https://packages.debian.org/src:core-async-clojure
7: https://packages.debian.org/src:dcfldd
8: https://packages.debian.org/src:debian-installer
9: https://packages.debian.org/src:debian-installer-netboot-images
10: https://packages.debian.org/src:debmirror
11: https://packages.debian.org/src:distro-info-data
12: https://packages.debian.org/src:dojo
13: https://packages.debian.org/src:dovecot-fts-xapian
14: https://packages.debian.org/src:efitools
15: https://packages.debian.org/src:evolution
16: https://packages.debian.org/src:evolution-data-server
17: https://packages.debian.org/src:evolution-ews
18: https://packages.debian.org/src:g810-led
19: https://packages.debian.org/src:glibc
20: https://packages.debian.org/src:golang-github-go-chef-chef
21: https://packages.debian.org/src:grub-efi-amd64-signed
22: https://packages.debian.org/src:grub-efi-arm64-signed
23: https://packages.debian.org/src:grub-efi-ia32-signed
24: https://packages.debian.org/src:grub2
25: https://packages.debian.org/src:hydrapaper
26: https://packages.debian.org/src:isoquery
27: https://packages.debian.org/src:jtreg6
28: https://packages.debian.org/src:lemonldap-ng
29: https://packages.debian.org/src:leptonlib
30: https://packages.debian.org/src:libapache2-mod-auth-mellon
31: https://packages.debian.org/src:libbluray
32: https://packages.debian.org/src:libconfuse
33: https://packages.debian.org/src:libdatetime-timezone-perl
34: https://packages.debian.org/src:libtasn1-6
35: https://packages.debian.org/src:libvncserver
36: https://packages.debian.org/src:linux
37: https://packages.debian.org/src:linux-signed-amd64
38: https://packages.debian.org/src:linux-signed-arm64
39: https://packages.debian.org/src:linux-signed-i386
40: https://packages.debian.org/src:mariadb-10.5
41: https://packages.debian.org/src:mod-wsgi
42: https://packages.debian.org/src:mplayer
43: https://packages.debian.org/src:mutt
44: https://packages.debian.org/src:nano
45: https://packages.debian.org/src:nftables
46: https://packages.debian.org/src:node-hawk
47: https://packages.debian.org/src:node-loader-utils
48: https://packages.debian.org/src:node-minimatch
49: https://packages.debian.org/src:node-qs
50: https://packages.debian.org/src:node-xmldom
51: https://packages.debian.org/src:nvidia-graphics-drivers
52: https://packages.debian.org/src:nvidia-graphics-drivers-legacy-390xx
53: https://packages.debian.org/src:nvidia-graphics-drivers-tesla-450
54: https://packages.debian.org/src:nvidia-graphics-drivers-tesla-470
55: https://packages.debian.org/src:omnievents
56: https://packages.debian.org/src:onionshare
57: https://packages.debian.org/src:openvpn-auth-radius
58: https://packages.debian.org/src:postfix
59: https://packages.debian.org/src:postgresql-13
60: https://packages.debian.org/src:powerline-gitstatus
61: https://packages.debian.org/src:pysubnettree
62: https://packages.debian.org/src:speech-dispatcher
63: https://packages.debian.org/src:spf-engine
64: https://packages.debian.org/src:tinyexr
65: https://packages.debian.org/src:tinyxml
66: https://packages.debian.org/src:tzdata
67: https://packages.debian.org/src:virglrenderer
68: https://packages.debian.org/src:x2gothinclient
69: https://packages.debian.org/src:xfig

Security Updates
----------------

This revision adds the following security updates to the stable release.
The Security Team has already released an advisory for each of these
updates:

+----------------+------------------------------+
| Advisory ID | Package |
+----------------+------------------------------+
| DSA-5212 [70] | chromium [71] |
| | |
| DSA-5223 [72] | chromium [73] |
| | |
| DSA-5224 [74] | poppler [75] |
| | |
| DSA-5225 [76] | chromium [77] |
| | |
| DSA-5226 [78] | pcs [79] |
| | |
| DSA-5227 [80] | libgoogle-gson-java [81] |
| | |
| DSA-5228 [82] | gdk-pixbuf [83] |
| | |
| DSA-5229 [84] | freecad [85] |
| | |
| DSA-5230 [86] | chromium [87] |
| | |
| DSA-5231 [88] | connman [89] |
| | |
| DSA-5232 [90] | tinygltf [91] |
| | |
| DSA-5233 [92] | e17 [93] |
| | |
| DSA-5234 [94] | fish [95] |
| | |
| DSA-5235 [96] | bind9 [97] |
| | |
| DSA-5236 [98] | expat [99] |
| | |
| DSA-5239 [100] | gdal [101] |
| | |
| DSA-5240 [102] | webkit2gtk [103] |
| | |
| DSA-5241 [104] | wpewebkit [105] |
| | |
| DSA-5242 [106] | maven-shared-utils [107] |
| | |
| DSA-5243 [108] | lighttpd [109] |
| | |
| DSA-5244 [110] | chromium [111] |
| | |
| DSA-5245 [112] | chromium [113] |
| | |
| DSA-5246 [114] | mediawiki [115] |
| | |
| DSA-5247 [116] | barbican [117] |
| | |
| DSA-5248 [118] | php-twig [119] |
| | |
| DSA-5249 [120] | strongswan [121] |
| | |
| DSA-5250 [122] | dbus [123] |
| | |
| DSA-5251 [124] | isc-dhcp [125] |
| | |
| DSA-5252 [126] | libreoffice [127] |
| | |
| DSA-5253 [128] | chromium [129] |
| | |
| DSA-5254 [130] | python-django [131] |
| | |
| DSA-5255 [132] | libksba [133] |
| | |
| DSA-5256 [134] | bcel [135] |
| | |
| DSA-5257 [136] | linux-signed-arm64 [137] |
| | |
| DSA-5257 [138] | linux-signed-amd64 [139] |
| | |
| DSA-5257 [140] | linux-signed-i386 [141] |
| | |
| DSA-5257 [142] | linux [143] |
| | |
| DSA-5258 [144] | squid [145] |
| | |
| DSA-5260 [146] | lava [147] |
| | |
| DSA-5261 [148] | chromium [149] |
| | |
| DSA-5263 [150] | chromium [151] |
| | |
| DSA-5264 [152] | batik [153] |
| | |
| DSA-5265 [154] | tomcat9 [155] |
| | |
| DSA-5266 [156] | expat [157] |
| | |
| DSA-5267 [158] | pysha3 [159] |
| | |
| DSA-5268 [160] | ffmpeg [161] |
| | |
| DSA-5269 [162] | pypy3 [163] |
| | |
| DSA-5270 [164] | ntfs-3g [165] |
| | |
| DSA-5271 [166] | libxml2 [167] |
| | |
| DSA-5272 [168] | xen [169] |
| | |
| DSA-5273 [170] | webkit2gtk [171] |
| | |
| DSA-5274 [172] | wpewebkit [173] |
| | |
| DSA-5275 [174] | chromium [175] |
| | |
| DSA-5276 [176] | pixman [177] |
| | |
| DSA-5277 [178] | php7.4 [179] |
| | |
| DSA-5278 [180] | xorg-server [181] |
| | |
| DSA-5279 [182] | wordpress [183] |
| | |
| DSA-5280 [184] | grub-efi-amd64-signed [185] |
| | |
| DSA-5280 [186] | grub-efi-arm64-signed [187] |
| | |
| DSA-5280 [188] | grub-efi-ia32-signed [189] |
| | |
| DSA-5280 [190] | grub2 [191] |
| | |
| DSA-5281 [192] | nginx [193] |
| | |
| DSA-5283 [194] | jackson-databind [195] |
| | |
| DSA-5285 [196] | asterisk [197] |
| | |
| DSA-5286 [198] | krb5 [199] |
| | |
| DSA-5287 [200] | heimdal [201] |
| | |
| DSA-5288 [202] | graphicsmagick [203] |
| | |
| DSA-5289 [204] | chromium [205] |
| | |
| DSA-5290 [206] | commons-configuration2 [207] |
| | |
| DSA-5291 [208] | mujs [209] |
| | |
| DSA-5292 [210] | snapd [211] |
| | |
| DSA-5293 [212] | chromium [213] |
| | |
| DSA-5294 [214] | jhead [215] |
| | |
| DSA-5295 [216] | chromium [217] |
| | |
| DSA-5296 [218] | xfce4-settings [219] |
| | |
| DSA-5297 [220] | vlc [221] |
| | |
| DSA-5298 [222] | cacti [223] |
| | |
| DSA-5299 [224] | openexr [225] |
| | |
+----------------+------------------------------+

70: https://www.debian.org/security/2022/dsa-5212
71: https://packages.debian.org/src:chromium
72: https://www.debian.org/security/2022/dsa-5223
73: https://packages.debian.org/src:chromium
74: https://www.debian.org/security/2022/dsa-5224
75: https://packages.debian.org/src:poppler
76: https://www.debian.org/security/2022/dsa-5225
77: https://packages.debian.org/src:chromium
78: https://www.debian.org/security/2022/dsa-5226
79: https://packages.debian.org/src:pcs
80: https://www.debian.org/security/2022/dsa-5227
81: https://packages.debian.org/src:libgoogle-gson-java
82: https://www.debian.org/security/2022/dsa-5228
83: https://packages.debian.org/src:gdk-pixbuf
84: https://www.debian.org/security/2022/dsa-5229
85: https://packages.debian.org/src:freecad
86: https://www.debian.org/security/2022/dsa-5230
87: https://packages.debian.org/src:chromium
88: https://www.debian.org/security/2022/dsa-5231
89: https://packages.debian.org/src:connman
90: https://www.debian.org/security/2022/dsa-5232
91: https://packages.debian.org/src:tinygltf
92: https://www.debian.org/security/2022/dsa-5233
93: https://packages.debian.org/src:e17
94: https://www.debian.org/security/2022/dsa-5234
95: https://packages.debian.org/src:fish
96: https://www.debian.org/security/2022/dsa-5235
97: https://packages.debian.org/src:bind9
98: https://www.debian.org/security/2022/dsa-5236
99: https://packages.debian.org/src:expat
100: https://www.debian.org/security/2022/dsa-5239
101: https://packages.debian.org/src:gdal
102: https://www.debian.org/security/2022/dsa-5240
103: https://packages.debian.org/src:webkit2gtk
104: https://www.debian.org/security/2022/dsa-5241
105: https://packages.debian.org/src:wpewebkit
106: https://www.debian.org/security/2022/dsa-5242
107: https://packages.debian.org/src:maven-shared-utils
108: https://www.debian.org/security/2022/dsa-5243
109: https://packages.debian.org/src:lighttpd
110: https://www.debian.org/security/2022/dsa-5244
111: https://packages.debian.org/src:chromium
112: https://www.debian.org/security/2022/dsa-5245
113: https://packages.debian.org/src:chromium
114: https://www.debian.org/security/2022/dsa-5246
115: https://packages.debian.org/src:mediawiki
116: https://www.debian.org/security/2022/dsa-5247
117: https://packages.debian.org/src:barbican
118: https://www.debian.org/security/2022/dsa-5248
119: https://packages.debian.org/src:php-twig
120: https://www.debian.org/security/2022/dsa-5249
121: https://packages.debian.org/src:strongswan
122: https://www.debian.org/security/2022/dsa-5250
123: https://packages.debian.org/src:dbus
124: https://www.debian.org/security/2022/dsa-5251
125: https://packages.debian.org/src:isc-dhcp
126: https://www.debian.org/security/2022/dsa-5252
127: https://packages.debian.org/src:libreoffice
128: https://www.debian.org/security/2022/dsa-5253
129: https://packages.debian.org/src:chromium
130: https://www.debian.org/security/2022/dsa-5254
131: https://packages.debian.org/src:python-django
132: https://www.debian.org/security/2022/dsa-5255
133: https://packages.debian.org/src:libksba
134: https://www.debian.org/security/2022/dsa-5256
135: https://packages.debian.org/src:bcel
136: https://www.debian.org/security/2022/dsa-5257
137: https://packages.debian.org/src:linux-signed-arm64
138: https://www.debian.org/security/2022/dsa-5257
139: https://packages.debian.org/src:linux-signed-amd64
140: https://www.debian.org/security/2022/dsa-5257
141: https://packages.debian.org/src:linux-signed-i386
142: https://www.debian.org/security/2022/dsa-5257
143: https://packages.debian.org/src:linux
144: https://www.debian.org/security/2022/dsa-5258
145: https://packages.debian.org/src:squid
146: https://www.debian.org/security/2022/dsa-5260
147: https://packages.debian.org/src:lava
148: https://www.debian.org/security/2022/dsa-5261
149: https://packages.debian.org/src:chromium
150: https://www.debian.org/security/2022/dsa-5263
151: https://packages.debian.org/src:chromium
152: https://www.debian.org/security/2022/dsa-5264
153: https://packages.debian.org/src:batik
154: https://www.debian.org/security/2022/dsa-5265
155: https://packages.debian.org/src:tomcat9
156: https://www.debian.org/security/2022/dsa-5266
157: https://packages.debian.org/src:expat
158: https://www.debian.org/security/2022/dsa-5267
159: https://packages.debian.org/src:pysha3
160: https://www.debian.org/security/2022/dsa-5268
161: https://packages.debian.org/src:ffmpeg
162: https://www.debian.org/security/2022/dsa-5269
163: https://packages.debian.org/src:pypy3
164: https://www.debian.org/security/2022/dsa-5270
165: https://packages.debian.org/src:ntfs-3g
166: https://www.debian.org/security/2022/dsa-5271
167: https://packages.debian.org/src:libxml2
168: https://www.debian.org/security/2022/dsa-5272
169: https://packages.debian.org/src:xen
170: https://www.debian.org/security/2022/dsa-5273
171: https://packages.debian.org/src:webkit2gtk
172: https://www.debian.org/security/2022/dsa-5274
173: https://packages.debian.org/src:wpewebkit
174: https://www.debian.org/security/2022/dsa-5275
175: https://packages.debian.org/src:chromium
176: https://www.debian.org/security/2022/dsa-5276
177: https://packages.debian.org/src:pixman
178: https://www.debian.org/security/2022/dsa-5277
179: https://packages.debian.org/src:php7.4
180: https://www.debian.org/security/2022/dsa-5278
181: https://packages.debian.org/src:xorg-server
182: https://www.debian.org/security/2022/dsa-5279
183: https://packages.debian.org/src:wordpress
184: https://www.debian.org/security/2022/dsa-5280
185: https://packages.debian.org/src:grub-efi-amd64-signed
186: https://www.debian.org/security/2022/dsa-5280
187: https://packages.debian.org/src:grub-efi-arm64-signed
188: https://www.debian.org/security/2022/dsa-5280
189: https://packages.debian.org/src:grub-efi-ia32-signed
190: https://www.debian.org/security/2022/dsa-5280
191: https://packages.debian.org/src:grub2
192: https://www.debian.org/security/2022/dsa-5281
193: https://packages.debian.org/src:nginx
194: https://www.debian.org/security/2022/dsa-5283
195: https://packages.debian.org/src:jackson-databind
196: https://www.debian.org/security/2022/dsa-5285
197: https://packages.debian.org/src:asterisk
198: https://www.debian.org/security/2022/dsa-5286
199: https://packages.debian.org/src:krb5
200: https://www.debian.org/security/2022/dsa-5287
201: https://packages.debian.org/src:heimdal
202: https://www.debian.org/security/2022/dsa-5288
203: https://packages.debian.org/src:graphicsmagick
204: https://www.debian.org/security/2022/dsa-5289
205: https://packages.debian.org/src:chromium
206: https://www.debian.org/security/2022/dsa-5290
207: https://packages.debian.org/src:commons-configuration2
208: https://www.debian.org/security/2022/dsa-5291
209: https://packages.debian.org/src:mujs
210: https://www.debian.org/security/2022/dsa-5292
211: https://packages.debian.org/src:snapd
212: https://www.debian.org/security/2022/dsa-5293
213: https://packages.debian.org/src:chromium
214: https://www.debian.org/security/2022/dsa-5294
215: https://packages.debian.org/src:jhead
216: https://www.debian.org/security/2022/dsa-5295
217: https://packages.debian.org/src:chromium
218: https://www.debian.org/security/2022/dsa-5296
219: https://packages.debian.org/src:xfce4-settings
220: https://www.debian.org/security/2022/dsa-5297
221: https://packages.debian.org/src:vlc
222: https://www.debian.org/security/2022/dsa-5298
223: https://packages.debian.org/src:cacti
224: https://www.debian.org/security/2022/dsa-5299
225: https://packages.debian.org/src:openexr

Debian Installer
----------------

The installer has been updated to include the fixes incorporated into
stable by the point release.


URLs
----

The complete lists of packages that have changed with this revision:

https://deb.debian.org/debian/dists/bullseye/ChangeLog


The current stable distribution:

https://deb.debian.org/debian/dists/stable/


Proposed updates to the stable distribution:

https://deb.debian.org/debian/dists/proposed-updates


stable distribution information (release notes, errata etc.):

https://www.debian.org/releases/stable/


Security announcements and information:

https://www.debian.org/security/



About Debian
------------

The Debian Project is an association of Free Software developers who
volunteer their time and effort in order to produce the completely free
operating system Debian.


Contact Information
-------------------

For further information, please visit the Debian web pages at
https://www.debian.org/, send mail to <press@debian.org>, or contact the
stable release team at <debian-release@lists.debian.org>.

No comments:

Post a Comment