-
Search Results
-
For a long time now I have been using the /etc/fstab file to mount shared folders on my NAS when booting. In combination with a few symbolic links in my home folder, I find this a very convenient and flexible way to organize my filesystem tree. Yesterday however I experienced some problems with my Synology NAS, and in the course of solving them, an upgrade of the NAS OS from DSM6 to DSM7 was made. The result was that my shared folders on the NAS were no longer mounted. The error messages I saw were not very informative, and even downright confusing. It took some googling to find out how to remedy this problem, so I decided to put it on the forum, in case someone is interested.
To mount a share //<NAS>/<SHARE> at (e.g.) /mnt/<MNT-point> every time I boot up the system, I include the following line in my /etc/fstab file.
//<NAS>/<SHARE> /mnt/<MNT-point> cifs user=<NAME>,password=<PASSWD>,vers=2.0,iocharset=utf8,sec=ntlmsspi 0 0In the line above, <NAS> is the host name of the server, <SHARE> the name of a shared folder on that server, <NAME> is a user-account on that server (who – of course – must have sufficient rights on that shared folder) and <PASSWD> the password (on the server) associated with the account <NAME>. The parameter ‘vers=’ specifies the version of the SMB-protocol used for the communication between client and server machine, while ‘sec=’ specifies the security method that is being used. Before the upgrade to DSM7, I used the parameter ‘sec=ntlm’, which no longer works. Apparently, security has been tightened on the new version of Synology’s OS.
For this to work the package cifs-utils must be installed.
Keep in mind that /etc/fstab is readable, so if security is a concern, you should replace the ‘user=’ and ‘password=’ parameters with ‘credentials=<PATH-TO-TXT-file>’, and write the ‘user=’ and ‘password=’ parameters on separate lines in that text-file, that only you can read. (I didn’t try this however).
There’s another useful trick to mount a share ‘on the fly’. Open the file manager and type the following in the address bar:
//<NAME>:<PASSWD>@<NAS>/<SHARE>The share is then mounted in a subfolder of /media/, automatically created by the system. This folder is also automatically removed when unmounting the folder (right-click on it in the menu >Devices and choose [Unmount] in the context menu). If you omit the part :<PASSWD> from the address bar, you are prompted for the password of <NAME> on the server. This works on SpaceFM, but should work on zzzFM as well.
- This topic was modified 9 months, 1 week ago by dirkd.
- This topic was modified 9 months, 1 week ago by dirkd.
Greetings
My OS: Antix 19.1 Marielle Franco
My Kernel: Linux antix1 4.9.200-antix.1-amd64-smp
My File Manager: SpaceFM
My Windows Manager: IceWM
My Theme: Ultrablack-Large
My Look and feel: Niroki (dark theme)
My Icon theme: Numix square antixi) PROBLEM
Trying to connect my antix 19.1 (CLIENT) to a shared folder “Public” on custom ubuntu 20.04 Laptop (SERVER) but you require smb 2.0 protocol
If you are trying to connect to a PC on local network and connectshares gui is no longer working, for whatever reason, nor is the ‘File > Open URL’ option within SpaceFM working to the smb2.0 PC, instead you get
“mount error(95): Operation not supported
Refer to the mount.cifs(8) manual page (e.g. man mount.cifs)
[ Finished ] Press Enter to close:”
then read on:ii) SOLUTION
Prerequisites
1) You need to know your sudo passwords on CLIENT and SERVER, created at time of installing your linux OS, and terminal
to enter commands2) cifs must be installed on CLIENT and SERVER
if not installed, then install it by typing command: sudo apt install cifs-utils3) samba is working on SERVER > type following command to confirm: service smbd status
if not installed, then install it by typing command: sudo apt install samba4) Public is shared on SERVER, if no then > type command: sudo pico /etc/samba/smb.conf
Add in the following under the paragraph [profiles]:
[Public]
comment = network share
browseable = yes
path = /home/live/Public
guest ok = yes
read only = noThen save and exit out of pico (text editor) by typing the following commands:
Ctrl o
Enter (press Enter key on your keyboard)
Ctrl xRestart smbd
sudo service smbd restart
(refer to screenshot antix-forum-smb2.0_1-server….)5) samba password / smbpasswd for user is setup on SERVER, where username is ‘live’ (or your own username,
open terminal and see command prompt, example live@win7-laptop:~) > type the following command: sudo smbpasswd -a live
enter the password of your choice, re-enter password, example opensaysme.6) ip address of SERVER by typing the following command on CLIENT: nbtscan 192.168.1.1-200
OR
typing following command on SERVER: ifconfig
if not installed, then install it by typing command: sudo apt install net-tools
and reading off the inet number, example 192.168.1.66, listed under enpXX..(or en…) or wlpXX..(or wlan…)Commands
A) Usage: sudo mount.cifs -o username=<user/username on SERVER>,password=<samba password on SERVER>,vers=x.0
//192.168.x.xxx/<shared samba folder on SERVER>/<mounting point used on CLIENT>B) Enter the following example on the CLIENT’s terminal:
sudo mount.cifs -o username=live,vers=2.0 //192.168.1.66/Public /mnt
OR
sudo mount -t cifs -o username=live,vers=2.0 //192.168.1.66/Public /mnt (refer to screenshots antix-forum-
smb2.0_2b…c..)C) Now open SpaceFM on CLIENT > Open a new tab (where the + sign is) > in the address box, where you normally enter the path,
example /home/live, type: /mnt (refer to screenshot antix-forum-smb2.0_3-client….)
Enter (press Enter key on your keyboard)
you should now see the contents in the shared folder ‘Public’ of SERVERD) to unmount type the command on the CLIENT’s terminal: sudo umount /mnt
Other Alternatives
sudo mount -t cifs -o username=live,password=opensaysme,vers=2.0 //192.168.1.66/Public /mnt
sudo mount -t cifs -o username=live,password=opensaysme,vers=2.0 //win7-laptop.local/Public /mnt
where win7-laptop is the name of SERVER obtained by opening terminal on SERVER and reading the prompt, example live@win7-laptop:~NOTE:
for security purposes you may want to leave out “password=opensaysme,” from the mount command and then instead separately type the samba password that is setup on SERVER, after typing in your sudo password that is setup on CLIENT!
example: sudo mount -t cifs -o username=live,vers=2.0 //192.168.1.66/Public /mntTips
While you have the CLIENT connected to SERVER, run the command on SERVER: sudo smbstatus
(this will confirm the smb protocol that CLIENT’s ip address (will display) is connecting to SERVER’s ip address (example 192.168.1.66). In this exercise the following smb protocol that is displayed is SMB2_02)
Once you unmount (on CLIENT side) the status will only show the Samba version on SERVER, the rest of the information will go blank.Hope this is helpful to some one
I received an Email with the following update:
-
Updated Debian 11: 11.4 released
————————————————————————
The Debian Project https://www.debian.org/
Updated Debian 11: 11.4 released press@debian.org
July 9th, 2022 https://www.debian.org/News/2022/20220709
————————————————————————The Debian project is pleased to announce the fourth update of its
stable distribution Debian 11 (codename “bullseye”). This point release
mainly adds corrections for security issues, along with a few
adjustments for serious problems. Security advisories have already been
published separately and are referenced where available.Please note that the point release does not constitute a new version of
Debian 11 but only updates some of the packages included. There is no
need to throw away old “bullseye” media. After installation, packages
can be upgraded to the current versions using an up-to-date Debian
mirror.Those who frequently install updates from security.debian.org won’t have
to update many packages, and most such updates are included in the point
release.New installation images will be available soon at the regular locations.
Upgrading an existing installation to this revision can be achieved by
pointing the package management system at one of Debian’s many HTTP
mirrors. A comprehensive list of mirrors is available at:https://www.debian.org/mirror/list
Miscellaneous Bugfixes
———————-This stable update adds a few important corrections to the following
packages:+—————————+—————————————–+
| Package | Reason |
+—————————+—————————————–+
| apache2 [1] | New upstream stable release; fix HTTP |
| | request smuggling issue [CVE-2022- |
| | 26377], out-of-bounds read issues |
| | [CVE-2022-28330 CVE-2022-28614 |
| | CVE-2022-28615], denial of service |
| | issues [CVE-2022-29404 CVE-2022-30522], |
| | possible out-of-bounds read issue |
| | [CVE-2022-30556], possible IP-based |
| | authentication bypass issue [CVE-2022- |
| | 31813] |
| | |
| base-files [2] | Update /etc/debian_version for the 11.4 |
| | point release |
| | |
| bash [3] | Fix 1-byte buffer overflow read, |
| | causing corrupted multibyte characters |
| | in command substitutions |
| | |
| clamav [4] | New upstream stable release; security |
| | fixes [CVE-2022-20770 CVE-2022-20771 |
| | CVE-2022-20785 CVE-2022-20792 CVE-2022- |
| | 20796] |
| | |
| clementine [5] | Add missing dependency on libqt5sql5- |
| | sqlite |
| | |
| composer [6] | Fix code injection issue [CVE-2022- |
| | 24828]; update GitHub token pattern |
| | |
| cyrus-imapd [7] | Ensure that all mailboxes have a |
| | “uniqueid” field, fixing upgrades to |
| | version 3.6 |
| | |
| dbus-broker [8] | Fix buffer overflow issue [CVE-2022- |
| | 31212] |
| | |
| debian-edu-config [9] | Accept mail from the local network sent |
| | to root@; only create |
| | Kerberos host and service principals if |
| | they don’t yet exist; ensure libsss- |
| | sudo is installed on Roaming |
| | Workstations; fix naming and visibility |
| | of print queues; support krb5i on |
| | Diskless Workstations; squid: prefer |
| | DNSv4 lookups over DNSv6 |
| | |
| debian-installer [10] | Rebuild against proposed-updates; |
| | increase Linux kernel ABI to 16; |
| | reinstate some armel netboot targets |
| | (openrd) |
| | |
| debian-installer-netboot- | Rebuild against proposed-updates; |
| images [11] | increase Linux kernel ABI to 16; |
| | reinstate some armel netboot targets |
| | (openrd) |
| | |
| distro-info-data [12] | Add Ubuntu 22.10, Kinetic Kudu |
| | |
| docker.io [13] | Order docker.service after |
| | containerd.service to fix shutdown of |
| | containers; explicitly pass the |
| | containerd socket path to dockerd to |
| | make sure it doesn’t start containerd |
| | on its own |
| | |
| dpkg [14] | dpkg-deb: Fix unexpected end of file |
| | conditions on .deb extract; libdpkg: Do |
| | not restrict source:* virtual fields to |
| | installed packages; |
| | Dpkg::Source::Package::V2: Always fix |
| | the permissions for upstream tarballs |
| | (regression from DSA-5147-1] |
| | |
| freetype [15] | Fix buffer overflow issue [CVE-2022- |
| | 27404]; fix crashes [CVE-2022-27405 |
| | CVE-2022-27406] |
| | |
| fribidi [16] | Fix buffer overflow issues [CVE-2022- |
| | 25308 CVE-2022-25309]; fix crash |
| | [CVE-2022-25310] |
| | |
| ganeti [17] | New upstream release; fix several |
| | upgrade issues; fix live migration with |
| | QEMU 4 and “security_model” of |
| | “user” or “pool” |
| | |
| geeqie [18] | Fix Ctrl click inside of a block |
| | selection |
| | |
| gnutls28 [19] | Fix SSSE3 SHA384 miscalculation; fix |
| | null pointer deference issue [CVE-2021- |
| | 4209] |
| | |
| golang-github- | Fix null pointer dereference caused by |
| russellhaering- | crafted XML signatures [CVE-2020-7711] |
| goxmldsig [20] | |
| | |
| grunt [21] | Fix path traversal issue [CVE-2022- |
| | 0436] |
| | |
| hdmi2usb-mode-switch [22] | udev: Add a suffix to /dev/video device |
| | nodes to disambiguate them; move udev |
| | rules to priority 70, to come after 60- |
| | persistent-v4l.rules |
| | |
| hexchat [23] | Add missing dependency on python3-cffi- |
| | backend |
| | |
| htmldoc [24] | Fix infinite loop [CVE-2022-24191], |
| | integer overflow issues [CVE-2022- |
| | 27114] and heap buffer overflow issue |
| | [CVE-2022-28085] |
| | |
| knot-resolver [25] | Fix possible assertion failure in NSEC3 |
| | edge-case [CVE-2021-40083] |
| | |
| libapache2-mod-auth- | New upstream stable release; fix open |
| openidc [26] | redirect issue [CVE-2021-39191]; fix |
| | crash on reload / restart |
| | |
| libintl-perl [27] | Really install gettext_xs.pm |
| | |
| libsdl2 [28] | Avoid out-of-bounds read while loading |
| | malformed BMP file [CVE-2021-33657], |
| | and during YUV to RGB conversion |
| | |
| libtgowt [29] | New upstream stable release, to support |
| | newer telegram-desktop |
| | |
| linux [30] | New upstream stable release; increase |
| | ABI to 16 |
| | |
| linux-signed-amd64 [31] | New upstream stable release; increase |
| | ABI to 16 |
| | |
| linux-signed-arm64 [32] | New upstream stable release; increase |
| | ABI to 16 |
| | |
| linux-signed-i386 [33] | New upstream stable release; increase |
| | ABI to 16 |
| | |
| logrotate [34] | Skip locking if state file is world- |
| | readable [CVE-2022-1348]; make |
| | configuration parsing stricter in order |
| | to avoid parsing foreign files such as |
| | core dumps |
| | |
| lxc [35] | Update default GPG key server, fixing |
| | creating of containers using the |
| | “download” template |
| | |
| minidlna [36] | Validate HTTP requests to protect |
| | against DNS rebinding attacks |
| | [CVE-2022-26505] |
| | |
| mutt [37] | Fix uudecode buffer overflow issue |
| | [CVE-2022-1328] |
| | |
| nano [38] | Several bug fixes, including fixes for |
| | crashes |
| | |
| needrestart [39] | Make cgroup detection for services and |
| | user sessions cgroup v2 aware |
| | |
| network-manager [40] | New upstream stable release |
| | |
| nginx [41] | Fix crash when libnginx-mod-http-lua is |
| | loaded and init_worker_by_lua* is used; |
| | mitigate application layer protocol |
| | content confusion attack in the Mail |
| | module [CVE-2021-3618] |
| | |
| node-ejs [42] | Fix server-side template injection |
| | issue [CVE-2022-29078] |
| | |
| node-eventsource [43] | Strip sensitive headers on redirect to |
| | different origin [CVE-2022-1650] |
| | |
| node-got [44] | Don’t allow redirection to Unix socket |
| | [CVE-2022-33987] |
| | |
| node-mermaid [45] | Fix cross-site scripting issues |
| | [CVE-2021-23648 CVE-2021-43861] |
| | |
| node-minimist [46] | Fix prototype pollution issue |
| | [CVE-2021-44906] |
| | |
| node-moment [47] | Fix path traversal issue [CVE-2022- |
| | 24785] |
| | |
| node-node-forge [48] | Fix signature verification issues |
| | [CVE-2022-24771 CVE-2022-24772 |
| | CVE-2022-24773] |
| | |
| node-raw-body [49] | Fix potential denial of service issue |
| | in node-express, by using node-iconv- |
| | lite rather than node-iconv |
| | |
| node-sqlite3 [50] | Fix denial of service issue [CVE-2022- |
| | 21227] |
| | |
| node-url-parse [51] | Fix authentication bypass issues |
| | [CVE-2022-0686 CVE-2022-0691] |
| | |
| nvidia-cuda-toolkit [52] | Use OpenJDK8 snapshots for amd64 and |
| | ppc64el; check usability of the java |
| | binary; nsight-compute: Move the |
| | ‘sections’ folder to a multiarch |
| | location; fix nvidia-openjdk-8-jre |
| | version ordering |
| | |
| nvidia-graphics- | New upstream release; switch to |
| drivers [53] | upstream 470 tree; fix denial of |
| | service issues [CVE-2022-21813 |
| | CVE-2022-21814]; fix out-of-bounds |
| | write issue [CVE-2022-28181], out-of- |
| | bounds read issue [CVE-2022-28183], |
| | denial of service issues [CVE-2022- |
| | 28184 CVE-2022-28191 CVE-2022-28192] |
| | |
| nvidia-graphics-drivers- | New upstream release; fix out-of-bound |
| legacy-390xx [54] | write issues [CVE-2022-28181 CVE-2022- |
| | 28185] |
| | |
| nvidia-graphics-drivers- | New upstream stable release |
| tesla-418 [55] | |
| | |
| nvidia-graphics-drivers- | New upstream stable release; fix out- |
| tesla-450 [56] | of-bounds write issues [CVE-2022-28181 |
| | CVE-2022-28185], denial of service |
| | issue [CVE-2022-28192] |
| | |
| nvidia-graphics-drivers- | New upstream stable release |
| tesla-460 [57] | |
| | |
| nvidia-graphics-drivers- | New package, switching Tesla support to |
| tesla-470 [58] | upstream 470 tree; fix out-of-bounds |
| | write issue [CVE-2022-28181], out-of- |
| | bounds read issue [CVE-2022-28183], |
| | denial of service issues [CVE-2022- |
| | 28184 CVE-2022-28191 CVE-2022-28192] |
| | |
| nvidia-persistenced [59] | New upstream release; switch to |
| | upstream 470 tree |
| | |
| nvidia-settings [60] | New upstream release; switch to |
| | upstream 470 tree |
| | |
| nvidia-settings- | New package, switching Tesla support to |
| tesla-470 [61] | upstream 470 tree |
| | |
| nvidia-xconfig [62] | New upstream release |
| | |
| openssh [63] | seccomp: add pselect6_time64 syscall on |
| | 32-bit architectures |
| | |
| orca [64] | Fix usage with webkitgtk 2.36 |
| | |
| php-guzzlehttp-psr7 [65] | Fix improper header parsing [CVE-2022- |
| | 24775] |
| | |
| phpmyadmin [66] | Fix some SQL queries generating a |
| | server error |
| | |
| postfix [67] | New upstream stable release; do not |
| | override user set default_transport in |
| | postinst; if-up.d: do not error out if |
| | postfix can’t send mail yet |
| | |
| procmail [68] | Fix null pointer dereference |
| | |
| python-scrapy [69] | Don’t send authentication data with all |
| | requests [CVE-2021-41125]; don’t expose |
| | cookies cross-domain when redirecting |
| | [CVE-2022-0577] |
| | |
| ruby-net-ssh [70] | Fix authentication against systems |
| | using OpenSSH 8.8 |
| | |
| runc [71] | Honour seccomp defaultErrnoRet; do not |
| | set inheritable capabilities [CVE-2022- |
| | 29162] |
| | |
| samba [72] | Fix winbind start failure when “allow |
| | trusted domains = no” is used; fix MIT |
| | Kerberos authentication; fix share |
| | escape issue via mkdir race condition |
| | [CVE-2021-43566]; fix possible serious |
| | data corruption issue due to Windows |
| | client cache poisoning; fix |
| | installation on non-systemd systems |
| | |
| tcpdump [73] | Update AppArmor profile to allow access |
| | to *.cap files, and handle numerical |
| | suffix in filenames added by -W |
| | |
| telegram-desktop [74] | New upstream stable release, restoring |
| | functionality |
| | |
| tigervnc [75] | Fix GNOME desktop start up when using |
| | tigervncserver@.service; fix colour |
| | display when vncviewer and X11 server |
| | use different endianness |
| | |
| twisted [76] | Fix information disclosure issue with |
| | cross-domain redirects [CVE-2022- |
| | 21712], denial of service issue during |
| | SSH handshakes [CVE-2022-21716], HTTP |
| | request smuggling issues [CVE-2022- |
| | 24801] |
| | |
| tzdata [77] | Update timezone data for Palestine; |
| | update leap second list |
| | |
| ublock-origin [78] | New upstream stable release |
| | |
| unrar-nonfree [79] | Fix directory traversal issue |
| | [CVE-2022-30333] |
| | |
| usb.ids [80] | New upstream release; update included |
| | data |
| | |
| wireless-regdb [81] | New upstream release; remove diversion |
| | added by the installer, ensuring that |
| | files from the package are used |
| | |
+—————————+—————————————–+1: https://packages.debian.org/src:apache2
2: https://packages.debian.org/src:base-files
3: https://packages.debian.org/src:bash
4: https://packages.debian.org/src:clamav
5: https://packages.debian.org/src:clementine
6: https://packages.debian.org/src:composer
7: https://packages.debian.org/src:cyrus-imapd
8: https://packages.debian.org/src:dbus-broker
9: https://packages.debian.org/src:debian-edu-config
10: https://packages.debian.org/src:debian-installer
11: https://packages.debian.org/src:debian-installer-netboot-images
12: https://packages.debian.org/src:distro-info-data
13: https://packages.debian.org/src:docker.io
14: https://packages.debian.org/src:dpkg
15: https://packages.debian.org/src:freetype
16: https://packages.debian.org/src:fribidi
17: https://packages.debian.org/src:ganeti
18: https://packages.debian.org/src:geeqie
19: https://packages.debian.org/src:gnutls28
20: https://packages.debian.org/src:golang-github-russellhaering-goxmldsig
21: https://packages.debian.org/src:grunt
22: https://packages.debian.org/src:hdmi2usb-mode-switch
23: https://packages.debian.org/src:hexchat
24: https://packages.debian.org/src:htmldoc
25: https://packages.debian.org/src:knot-resolver
26: https://packages.debian.org/src:libapache2-mod-auth-openidc
27: https://packages.debian.org/src:libintl-perl
28: https://packages.debian.org/src:libsdl2
29: https://packages.debian.org/src:libtgowt
30: https://packages.debian.org/src:linux
31: https://packages.debian.org/src:linux-signed-amd64
32: https://packages.debian.org/src:linux-signed-arm64
33: https://packages.debian.org/src:linux-signed-i386
34: https://packages.debian.org/src:logrotate
35: https://packages.debian.org/src:lxc
36: https://packages.debian.org/src:minidlna
37: https://packages.debian.org/src:mutt
38: https://packages.debian.org/src:nano
39: https://packages.debian.org/src:needrestart
40: https://packages.debian.org/src:network-manager
41: https://packages.debian.org/src:nginx
42: https://packages.debian.org/src:node-ejs
43: https://packages.debian.org/src:node-eventsource
44: https://packages.debian.org/src:node-got
45: https://packages.debian.org/src:node-mermaid
46: https://packages.debian.org/src:node-minimist
47: https://packages.debian.org/src:node-moment
48: https://packages.debian.org/src:node-node-forge
49: https://packages.debian.org/src:node-raw-body
50: https://packages.debian.org/src:node-sqlite3
51: https://packages.debian.org/src:node-url-parse
52: https://packages.debian.org/src:nvidia-cuda-toolkit
53: https://packages.debian.org/src:nvidia-graphics-drivers
54: https://packages.debian.org/src:nvidia-graphics-drivers-legacy-390xx
55: https://packages.debian.org/src:nvidia-graphics-drivers-tesla-418
56: https://packages.debian.org/src:nvidia-graphics-drivers-tesla-450
57: https://packages.debian.org/src:nvidia-graphics-drivers-tesla-460
58: https://packages.debian.org/src:nvidia-graphics-drivers-tesla-470
59: https://packages.debian.org/src:nvidia-persistenced
60: https://packages.debian.org/src:nvidia-settings
61: https://packages.debian.org/src:nvidia-settings-tesla-470
62: https://packages.debian.org/src:nvidia-xconfig
63: https://packages.debian.org/src:openssh
64: https://packages.debian.org/src:orca
65: https://packages.debian.org/src:php-guzzlehttp-psr7
66: https://packages.debian.org/src:phpmyadmin
67: https://packages.debian.org/src:postfix
68: https://packages.debian.org/src:procmail
69: https://packages.debian.org/src:python-scrapy
70: https://packages.debian.org/src:ruby-net-ssh
71: https://packages.debian.org/src:runc
72: https://packages.debian.org/src:samba
73: https://packages.debian.org/src:tcpdump
74: https://packages.debian.org/src:telegram-desktop
75: https://packages.debian.org/src:tigervnc
76: https://packages.debian.org/src:twisted
77: https://packages.debian.org/src:tzdata
78: https://packages.debian.org/src:ublock-origin
79: https://packages.debian.org/src:unrar-nonfree
80: https://packages.debian.org/src:usb.ids
81: https://packages.debian.org/src:wireless-regdbSecurity Updates
—————-This revision adds the following security updates to the stable release.
The Security Team has already released an advisory for each of these
updates:+—————-+————————–+
| Advisory ID | Package |
+—————-+————————–+
| DSA-4999 [82] | asterisk [83] |
| | |
| DSA-5026 [84] | firefox-esr [85] |
| | |
| DSA-5034 [86] | thunderbird [87] |
| | |
| DSA-5044 [88] | firefox-esr [89] |
| | |
| DSA-5045 [90] | thunderbird [91] |
| | |
| DSA-5069 [92] | firefox-esr [93] |
| | |
| DSA-5074 [94] | thunderbird [95] |
| | |
| DSA-5086 [96] | thunderbird [97] |
| | |
| DSA-5090 [98] | firefox-esr [99] |
| | |
| DSA-5094 [100] | thunderbird [101] |
| | |
| DSA-5097 [102] | firefox-esr [103] |
| | |
| DSA-5106 [104] | thunderbird [105] |
| | |
| DSA-5107 [106] | php-twig [107] |
| | |
| DSA-5108 [108] | tiff [109] |
| | |
| DSA-5110 [110] | chromium [111] |
| | |
| DSA-5111 [112] | zlib [113] |
| | |
| DSA-5112 [114] | chromium [115] |
| | |
| DSA-5113 [116] | firefox-esr [117] |
| | |
| DSA-5114 [118] | chromium [119] |
| | |
| DSA-5115 [120] | webkit2gtk [121] |
| | |
| DSA-5116 [122] | wpewebkit [123] |
| | |
| DSA-5117 [124] | xen [125] |
| | |
| DSA-5118 [126] | thunderbird [127] |
| | |
| DSA-5119 [128] | subversion [129] |
| | |
| DSA-5120 [130] | chromium [131] |
| | |
| DSA-5121 [132] | chromium [133] |
| | |
| DSA-5122 [134] | gzip [135] |
| | |
| DSA-5123 [136] | xz-utils [137] |
| | |
| DSA-5124 [138] | ffmpeg [139] |
| | |
| DSA-5125 [140] | chromium [141] |
| | |
| DSA-5127 [142] | linux-signed-amd64 [143] |
| | |
| DSA-5127 [144] | linux-signed-arm64 [145] |
| | |
| DSA-5127 [146] | linux-signed-i386 [147] |
| | |
| DSA-5127 [148] | linux [149] |
| | |
| DSA-5128 [150] | openjdk-17 [151] |
| | |
| DSA-5129 [152] | firefox-esr [153] |
| | |
| DSA-5130 [154] | dpdk [155] |
| | |
| DSA-5131 [156] | openjdk-11 [157] |
| | |
| DSA-5132 [158] | ecdsautils [159] |
| | |
| DSA-5133 [160] | qemu [161] |
| | |
| DSA-5134 [162] | chromium [163] |
| | |
| DSA-5136 [164] | postgresql-13 [165] |
| | |
| DSA-5137 [166] | needrestart [167] |
| | |
| DSA-5138 [168] | waitress [169] |
| | |
| DSA-5139 [170] | openssl [171] |
| | |
| DSA-5140 [172] | openldap [173] |
| | |
| DSA-5141 [174] | thunderbird [175] |
| | |
| DSA-5142 [176] | libxml2 [177] |
| | |
| DSA-5143 [178] | firefox-esr [179] |
| | |
| DSA-5145 [180] | lrzip [181] |
| | |
| DSA-5147 [182] | dpkg [183] |
| | |
| DSA-5148 [184] | chromium [185] |
| | |
| DSA-5149 [186] | cups [187] |
| | |
| DSA-5150 [188] | rsyslog [189] |
| | |
| DSA-5151 [190] | smarty3 [191] |
| | |
| DSA-5152 [192] | spip [193] |
| | |
| DSA-5153 [194] | trafficserver [195] |
| | |
| DSA-5154 [196] | webkit2gtk [197] |
| | |
| DSA-5155 [198] | wpewebkit [199] |
| | |
| DSA-5156 [200] | firefox-esr [201] |
| | |
| DSA-5157 [202] | cifs-utils [203] |
| | |
| DSA-5158 [204] | thunderbird [205] |
| | |
| DSA-5159 [206] | python-bottle [207] |
| | |
| DSA-5160 [208] | ntfs-3g [209] |
| | |
| DSA-5161 [210] | linux-signed-amd64 [211] |
| | |
| DSA-5161 [212] | linux-signed-arm64 [213] |
| | |
| DSA-5161 [214] | linux-signed-i386 [215] |
| | |
| DSA-5161 [216] | linux [217] |
| | |
| DSA-5162 [218] | containerd [219] |
| | |
| DSA-5163 [220] | chromium [221] |
| | |
| DSA-5164 [222] | exo [223] |
| | |
| DSA-5165 [224] | vlc [225] |
| | |
| DSA-5166 [226] | slurm-wlm [227] |
| | |
| DSA-5167 [228] | firejail [229] |
| | |
| DSA-5168 [230] | chromium [231] |
| | |
| DSA-5169 [232] | openssl [233] |
| | |
| DSA-5171 [234] | squid [235] |
| | |
| DSA-5172 [236] | firefox-esr [237] |
| | |
| DSA-5174 [238] | gnupg2 [239] |
| | |
+—————-+————————–+82: https://www.debian.org/security/2021/dsa-4999
83: https://packages.debian.org/src:asterisk
84: https://www.debian.org/security/2021/dsa-5026
85: https://packages.debian.org/src:firefox-esr
86: https://www.debian.org/security/2022/dsa-5034
87: https://packages.debian.org/src:thunderbird
88: https://www.debian.org/security/2022/dsa-5044
89: https://packages.debian.org/src:firefox-esr
90: https://www.debian.org/security/2022/dsa-5045
91: https://packages.debian.org/src:thunderbird
92: https://www.debian.org/security/2022/dsa-5069
93: https://packages.debian.org/src:firefox-esr
94: https://www.debian.org/security/2022/dsa-5074
95: https://packages.debian.org/src:thunderbird
96: https://www.debian.org/security/2022/dsa-5086
97: https://packages.debian.org/src:thunderbird
98: https://www.debian.org/security/2022/dsa-5090
99: https://packages.debian.org/src:firefox-esr
100: https://www.debian.org/security/2022/dsa-5094
101: https://packages.debian.org/src:thunderbird
102: https://www.debian.org/security/2022/dsa-5097
103: https://packages.debian.org/src:firefox-esr
104: https://www.debian.org/security/2022/dsa-5106
105: https://packages.debian.org/src:thunderbird
106: https://www.debian.org/security/2022/dsa-5107
107: https://packages.debian.org/src:php-twig
108: https://www.debian.org/security/2022/dsa-5108
109: https://packages.debian.org/src:tiff
110: https://www.debian.org/security/2022/dsa-5110
111: https://packages.debian.org/src:chromium
112: https://www.debian.org/security/2022/dsa-5111
113: https://packages.debian.org/src:zlib
114: https://www.debian.org/security/2022/dsa-5112
115: https://packages.debian.org/src:chromium
116: https://www.debian.org/security/2022/dsa-5113
117: https://packages.debian.org/src:firefox-esr
118: https://www.debian.org/security/2022/dsa-5114
119: https://packages.debian.org/src:chromium
120: https://www.debian.org/security/2022/dsa-5115
121: https://packages.debian.org/src:webkit2gtk
122: https://www.debian.org/security/2022/dsa-5116
123: https://packages.debian.org/src:wpewebkit
124: https://www.debian.org/security/2022/dsa-5117
125: https://packages.debian.org/src:xen
126: https://www.debian.org/security/2022/dsa-5118
127: https://packages.debian.org/src:thunderbird
128: https://www.debian.org/security/2022/dsa-5119
129: https://packages.debian.org/src:subversion
130: https://www.debian.org/security/2022/dsa-5120
131: https://packages.debian.org/src:chromium
132: https://www.debian.org/security/2022/dsa-5121
133: https://packages.debian.org/src:chromium
134: https://www.debian.org/security/2022/dsa-5122
135: https://packages.debian.org/src:gzip
136: https://www.debian.org/security/2022/dsa-5123
137: https://packages.debian.org/src:xz-utils
138: https://www.debian.org/security/2022/dsa-5124
139: https://packages.debian.org/src:ffmpeg
140: https://www.debian.org/security/2022/dsa-5125
141: https://packages.debian.org/src:chromium
142: https://www.debian.org/security/2022/dsa-5127
143: https://packages.debian.org/src:linux-signed-amd64
144: https://www.debian.org/security/2022/dsa-5127
145: https://packages.debian.org/src:linux-signed-arm64
146: https://www.debian.org/security/2022/dsa-5127
147: https://packages.debian.org/src:linux-signed-i386
148: https://www.debian.org/security/2022/dsa-5127
149: https://packages.debian.org/src:linux
150: https://www.debian.org/security/2022/dsa-5128
151: https://packages.debian.org/src:openjdk-17
152: https://www.debian.org/security/2022/dsa-5129
153: https://packages.debian.org/src:firefox-esr
154: https://www.debian.org/security/2022/dsa-5130
155: https://packages.debian.org/src:dpdk
156: https://www.debian.org/security/2022/dsa-5131
157: https://packages.debian.org/src:openjdk-11
158: https://www.debian.org/security/2022/dsa-5132
159: https://packages.debian.org/src:ecdsautils
160: https://www.debian.org/security/2022/dsa-5133
161: https://packages.debian.org/src:qemu
162: https://www.debian.org/security/2022/dsa-5134
163: https://packages.debian.org/src:chromium
164: https://www.debian.org/security/2022/dsa-5136
165: https://packages.debian.org/src:postgresql-13
166: https://www.debian.org/security/2022/dsa-5137
167: https://packages.debian.org/src:needrestart
168: https://www.debian.org/security/2022/dsa-5138
169: https://packages.debian.org/src:waitress
170: https://www.debian.org/security/2022/dsa-5139
171: https://packages.debian.org/src:openssl
172: https://www.debian.org/security/2022/dsa-5140
173: https://packages.debian.org/src:openldap
174: https://www.debian.org/security/2022/dsa-5141
175: https://packages.debian.org/src:thunderbird
176: https://www.debian.org/security/2022/dsa-5142
177: https://packages.debian.org/src:libxml2
178: https://www.debian.org/security/2022/dsa-5143
179: https://packages.debian.org/src:firefox-esr
180: https://www.debian.org/security/2022/dsa-5145
181: https://packages.debian.org/src:lrzip
182: https://www.debian.org/security/2022/dsa-5147
183: https://packages.debian.org/src:dpkg
184: https://www.debian.org/security/2022/dsa-5148
185: https://packages.debian.org/src:chromium
186: https://www.debian.org/security/2022/dsa-5149
187: https://packages.debian.org/src:cups
188: https://www.debian.org/security/2022/dsa-5150
189: https://packages.debian.org/src:rsyslog
190: https://www.debian.org/security/2022/dsa-5151
191: https://packages.debian.org/src:smarty3
192: https://www.debian.org/security/2022/dsa-5152
193: https://packages.debian.org/src:spip
194: https://www.debian.org/security/2022/dsa-5153
195: https://packages.debian.org/src:trafficserver
196: https://www.debian.org/security/2022/dsa-5154
197: https://packages.debian.org/src:webkit2gtk
198: https://www.debian.org/security/2022/dsa-5155
199: https://packages.debian.org/src:wpewebkit
200: https://www.debian.org/security/2022/dsa-5156
201: https://packages.debian.org/src:firefox-esr
202: https://www.debian.org/security/2022/dsa-5157
203: https://packages.debian.org/src:cifs-utils
204: https://www.debian.org/security/2022/dsa-5158
205: https://packages.debian.org/src:thunderbird
206: https://www.debian.org/security/2022/dsa-5159
207: https://packages.debian.org/src:python-bottle
208: https://www.debian.org/security/2022/dsa-5160
209: https://packages.debian.org/src:ntfs-3g
210: https://www.debian.org/security/2022/dsa-5161
211: https://packages.debian.org/src:linux-signed-amd64
212: https://www.debian.org/security/2022/dsa-5161
213: https://packages.debian.org/src:linux-signed-arm64
214: https://www.debian.org/security/2022/dsa-5161
215: https://packages.debian.org/src:linux-signed-i386
216: https://www.debian.org/security/2022/dsa-5161
217: https://packages.debian.org/src:linux
218: https://www.debian.org/security/2022/dsa-5162
219: https://packages.debian.org/src:containerd
220: https://www.debian.org/security/2022/dsa-5163
221: https://packages.debian.org/src:chromium
222: https://www.debian.org/security/2022/dsa-5164
223: https://packages.debian.org/src:exo
224: https://www.debian.org/security/2022/dsa-5165
225: https://packages.debian.org/src:vlc
226: https://www.debian.org/security/2022/dsa-5166
227: https://packages.debian.org/src:slurm-wlm
228: https://www.debian.org/security/2022/dsa-5167
229: https://packages.debian.org/src:firejail
230: https://www.debian.org/security/2022/dsa-5168
231: https://packages.debian.org/src:chromium
232: https://www.debian.org/security/2022/dsa-5169
233: https://packages.debian.org/src:openssl
234: https://www.debian.org/security/2022/dsa-5171
235: https://packages.debian.org/src:squid
236: https://www.debian.org/security/2022/dsa-5172
237: https://packages.debian.org/src:firefox-esr
238: https://www.debian.org/security/2022/dsa-5174
239: https://packages.debian.org/src:gnupg2Removed packages
—————-The following packages were removed due to circumstances beyond our
control:+———————+——————————-+
| Package | Reason |
+———————+——————————-+
| elog [240] | Unmaintained; security issues |
| | |
| python-hbmqtt [241] | Unamintained and broken |
| | |
+———————+——————————-+240: https://packages.debian.org/src:elog
241: https://packages.debian.org/src:python-hbmqttDebian Installer
—————-The installer has been updated to include the fixes incorporated into
stable by the point release.URLs
—-The complete lists of packages that have changed with this revision:
https://deb.debian.org/debian/dists/bullseye/ChangeLog
The current stable distribution:
https://deb.debian.org/debian/dists/stable/
Proposed updates to the stable distribution:
https://deb.debian.org/debian/dists/proposed-updates
stable distribution information (release notes, errata etc.):
https://www.debian.org/releases/stable/
Security announcements and information:
https://www.debian.org/security/
About Debian
————The Debian Project is an association of Free Software developers who
volunteer their time and effort in order to produce the completely free
operating system Debian.Contact Information
——————-For further information, please visit the Debian web pages at
https://www.debian.org/, send mail to, or contact the
stable release team at. --
Brian MasinickFrom an Email I received early this afternoon:
Laura Arjona Reina
To:debian-announce@lists.debian.org————————————————————————
The Debian Project https://www.debian.org/
Updated Debian 11: 11.3 released press@debian.org
March 26th, 2022 https://www.debian.org/News/2022/20220326
————————————————————————The Debian project is pleased to announce the third update of its stable
distribution Debian 11 (codename “bullseye”). This point release mainly
adds corrections for security issues, along with a few adjustments for
serious problems. Security advisories have already been published
separately and are referenced where available.Please note that the point release does not constitute a new version of
Debian 11 but only updates some of the packages included. There is no
need to throw away old “bullseye” media. After installation, packages
can be upgraded to the current versions using an up-to-date Debian
mirror.Those who frequently install updates from security.debian.org won’t have
to update many packages, and most such updates are included in the point
release.New installation images will be available soon at the regular locations.
Upgrading an existing installation to this revision can be achieved by
pointing the package management system at one of Debian’s many HTTP
mirrors. A comprehensive list of mirrors is available at:https://www.debian.org/mirror/list
Miscellaneous Bugfixes
———————-This stable update adds a few important corrections to the following
packages:+————————–+——————————————+
| Package | Reason |
+————————–+——————————————+
| apache-log4j1.2 [1] | Resolve security issues [CVE-2021-4104 |
| | CVE-2022-23302 CVE-2022-23305 CVE-2022- |
| | 23307], by removing support for the |
| | JMSSink, JDBCAppender, JMSAppender and |
| | Apache Chainsaw modules |
| | |
| apache-log4j2 [2] | Fix remote code execution issue |
| | [CVE-2021-44832] |
| | |
| apache2 [3] | New upstream release; fix crash due to |
| | random memory read [CVE-2022-22719]; fix |
| | HTTP request smuggling issue [CVE-2022- |
| | 22720]; fix out-of-bounds write issues |
| | [CVE-2022-22721 CVE-2022-23943] |
| | |
| atftp [4] | Fix information leak issue [CVE-2021- |
| | 46671] |
| | |
| base-files [5] | Update for the 11.3 point release |
| | |
| bible-kjv [6] | Fix off-by-one-error in search |
| | |
| chrony [7] | Allow reading the chronyd configuration |
| | file that timemaster(8) generates |
| | |
| cinnamon [8] | Fix crash when adding an online account |
| | with login |
| | |
| clamav [9] | New upstream stable release; fix denial |
| | of service issue [CVE-2022-20698] |
| | |
| cups-filters [10] | Apparmor: allow reading from Debian |
| | Edu’s cups-browsed configuration file |
| | |
| dask.distributed [11] | Fix undesired listening of workers on |
| | public interfaces [CVE-2021-42343]; fix |
| | compatibility with Python 3.9 |
| | |
| debian-installer [12] | Rebuild against proposed-updates; update |
| | Linux kernel ABI to 5.10.0-13 |
| | |
| debian-installer- | Rebuild against proposed-updates |
| netboot-images [13] | |
| | |
| debian-ports-archive- | Add “Debian Ports Archive Automatic |
| keyring [14] | Signing Key (2023)” ; move the |
| | 2021 signing key to the removed keyring |
| | |
| django-allauth [15] | Fix OpenID support |
| | |
| djbdns [16] | Raise the axfrdns, dnscache, and tinydns |
| | data limit |
| | |
| dpdk [17] | New upstream stable release |
| | |
| e2guardian [18] | Fix missing SSL certificate validation |
| | issue [CVE-2021-44273] |
| | |
| epiphany-browser [19] | Work around a bug in GLib, fixing a UI |
| | process crash |
| | |
| espeak-ng [20] | Drop spurious 50ms delay while |
| | processing events |
| | |
| espeakup [21] | debian/espeakup.service: Protect |
| | espeakup from system overloads |
| | |
| fcitx5-chinese- | fcitx5-table: add missing dependencies |
| addons [22] | on fcitx5-module-pinyinhelper and |
| | fcitx5-module-punctuation |
| | |
| flac [23] | Fix out-of-bounds write issue [CVE-2021- |
| | 0561] |
| | |
| freerdp2 [24] | Disable additional debug logging |
| | |
| galera-3 [25] | New upstream release |
| | |
| galera-4 [26] | New upstream release |
| | |
| gbonds [27] | Use Treasury API for redemption data |
| | |
| glewlwyd [28] | Fix possible privilege escalation |
| | |
| glibc [29] | Fix bad conversion from ISO-2022-JP-3 |
| | with iconv [CVE-2021-43396]; fix buffer |
| | overflow issues [CVE-2022-23218 |
| | CVE-2022-23219]; fix use-after-free |
| | issue [CVE-2021-33574]; stop replacing |
| | older versions of /etc/nsswitch.conf; |
| | simplify the check for supported kernel |
| | versions, as 2.x kernels are no longer |
| | supported; support installation on |
| | kernels with a release number greater |
| | than 255 |
| | |
| glx-alternatives [30] | After initial setup of the diversions, |
| | install a minimal alternative to the |
| | diverted files so that libraries are not |
| | missing until glx-alternative-mesa |
| | processes its triggers |
| | |
| gnupg2 [31] | scd: Fix CCID driver for SCM SPR332/ |
| | SPR532; avoid network interaction in |
| | generator, which can lead to hangs |
| | |
| gnuplot [32] | Fix division by zero [CVE-2021-44917] |
| | |
| golang-1.15 [33] | Fix IsOnCurve for big.Int values that |
| | are not valid coordinates [CVE-2022- |
| | 23806]; math/big: prevent large memory |
| | consumption in Rat.SetString [CVE-2022- |
| | 23772]; cmd/go: prevent branches from |
| | materializing into versions [CVE-2022- |
| | 23773]; fix stack exhaustion compiling |
| | deeply nested expressions [CVE-2022- |
| | 24921] |
| | |
| golang-github- | Update seccomp support to enable use of |
| containers-common [34] | newer kernel versions |
| | |
| golang-github- | Update seccomp support to enable use of |
| opencontainers- | newer kernel versions |
| specs [35] | |
| | |
| gtk+3.0 [36] | Fix missing search results when using |
| | NFS; prevent Wayland clipboard handling |
| | from locking up in certain corner cases; |
| | improve printing to mDNS-discovered |
| | printers |
| | |
| heartbeat [37] | Fix creation of /run/heartbeat on |
| | systems using systemd |
| | |
| htmldoc [38] | Fix out-of-bounds read issue [CVE-2022- |
| | 0534] |
| | |
| installation-guide [39] | Update documentation and translations |
| | |
| intel-microcode [40] | Update included microcode; mitigate some |
| | security issues [CVE-2020-8694 CVE-2020- |
| | 8695 CVE-2021-0127 CVE-2021-0145 |
| | CVE-2021-0146 CVE-2021-33120] |
| | |
| ldap2zone [41] | Use “mktemp” rather than the |
| | deprecated “tempfile” , avoiding |
| | warnings |
| | |
| lemonldap-ng [42] | Fix auth process in password-testing |
| | plugins [CVE-2021-40874] |
| | |
| libarchive [43] | Fix extracting hardlinks to symlinks; |
| | fix handling of symlink ACLs [CVE-2021- |
| | 23177]; never follow symlinks when |
| | setting file flags [CVE-2021-31566] |
| | |
| libdatetime-timezone- | Update included data |
| perl [44] | |
| | |
| libgdal-grass [45] | Rebuild against grass 7.8.5-1+deb11u1 |
| | |
| libpod [46] | Update seccomp support to enable use of |
| | newer kernel versions |
| | |
| libxml2 [47] | Fix use-after-free issue [CVE-2022- |
| | 23308] |
| | |
| linux [48] | New upstream stable release; [rt] Update |
| | to 5.10.106-rt64; increase ABI to 13 |
| | |
| linux-signed-amd64 [49] | New upstream stable release; [rt] Update |
| | to 5.10.106-rt64; increase ABI to 13 |
| | |
| linux-signed-arm64 [50] | New upstream stable release; [rt] Update |
| | to 5.10.106-rt64; increase ABI to 13 |
| | |
| linux-signed-i386 [51] | New upstream stable release; [rt] Update |
| | to 5.10.106-rt64; increase ABI to 13 |
| | |
| mariadb-10.5 [52] | New upstream release; security fixes |
| | [CVE-2021-35604 CVE-2021-46659 CVE-2021- |
| | 46661 CVE-2021-46662 CVE-2021-46663 |
| | CVE-2021-46664 CVE-2021-46665 CVE-2021- |
| | 46667 CVE-2021-46668 CVE-2022-24048 |
| | CVE-2022-24050 CVE-2022-24051 CVE-2022- |
| | 24052] |
| | |
| mpich [53] | Add Breaks: on older versions of |
| | libmpich1.0-dev, resolving some upgrade |
| | issues |
| | |
| mujs [54] | Fix buffer overflow issue [CVE-2021- |
| | 45005] |
| | |
| mutter [55] | Backport various fixes from upstream’s |
| | stable branch |
| | |
| node-cached-path- | Fix prototype pollution issue [CVE-2021- |
| relative [56] | 23518] |
| | |
| node-fetch [57] | Don’t forward secure headers to third |
| | party domains [CVE-2022-0235] |
| | |
| node-follow- | Don’t send Cookie header across domains |
| redirects [58] | [CVE-2022-0155]; don’t send confidential |
| | headers across schemes [CVE-2022-0536] |
| | |
| node-markdown-it [59] | Fix regular expression-based denial of |
| | service issue [CVE-2022-21670] |
| | |
| node-nth-check [60] | Fix regular expression-based denial of |
| | service issue [CVE-2021-3803] |
| | |
| node-prismjs [61] | Escape markup in command line output |
| | [CVE-2022-23647]; update minified files |
| | to ensure that Regular Expression Denial |
| | of Service issue is resolved [CVE-2021- |
| | 3801] |
| | |
| node-trim-newlines [62] | Fix regular expression-based denial of |
| | service issue [CVE-2021-33623] |
| | |
| nvidia-cuda-toolkit [63] | cuda-gdb: Disable non-functional python |
| | support causing segmentation faults; use |
| | a snapshot of openjdk-8-jre (8u312-b07- |
| | 1) |
| | |
| nvidia-graphics-drivers- | New upstream release; fix denial of |
| tesla-450 [64] | service issues [CVE-2022-21813 CVE-2022- |
| | 21814]; nvidia-kernel-support: Provide / |
| | etc/modprobe.d/nvidia-options.conf as a |
| | template |
| | |
| nvidia-modprobe [65] | New upstream release |
| | |
| openboard [66] | Fix application icon |
| | |
| openssl [67] | New upstream release; fix armv8 pointer |
| | authentication |
| | |
| openvswitch [68] | Fix use-after-free issue [CVE-2021- |
| | 36980]; fix installation of libofproto |
| | |
| ostree [69] | Fix compatibility with eCryptFS; avoid |
| | infinite recursion when recovering from |
| | certain errors; mark commits as partial |
| | before downloading; fix an assertion |
| | failure when using a backport or local |
| | build of GLib >= 2.71; fix the ability |
| | to fetch OSTree content from paths |
| | containing non-URI characters (such as |
| | backslashes) or non-ASCII |
| | |
| pdb2pqr [70] | Fix compatibility of propka with Python |
| | 3.8 or above |
| | |
| php-crypt-gpg [71] | Prevent additional options being passed |
| | to GPG [CVE-2022-24953] |
| | |
| php-laravel- | Fix cross-site scripting issue |
| framework [72] | [CVE-2021-43808], missing blocking of |
| | executable content upload [CVE-2021- |
| | 43617] |
| | |
| phpliteadmin [73] | Fix cross-site scripting issue |
| | [CVE-2021-46709] |
| | |
| prips [74] | Fix infinite wrapping if a range reaches |
| | 255.255.255.255; fix CIDR output with |
| | addresses that differ in their first bit |
| | |
| pypy3 [75] | Fix build failures by removing |
| | extraneous #endif from import.h |
| | |
| python-django [76] | Fix denial of service issue [CVE-2021- |
| | 45115], information disclosure issue |
| | [CVE-2021-45116], directory traversal |
| | issue [CVE-2021-45452]; fix a traceback |
| | around the handling of RequestSite/ |
| | get_current_site() due to a circular |
| | import |
| | |
| python-pip [77] | Avoid a race-condition when using zip- |
| | imported dependencies |
| | |
| rust-cbindgen [78] | New upstream stable release to support |
| | builds of newer firefox-esr and |
| | thunderbird versions |
| | |
| s390-dasd [79] | Stop passing deprecated -f option to |
| | dasdfmt |
| | |
| schleuder [80] | Migrate boolean values to integers, if |
| | the ActiveRecord SQLite3 connection |
| | adapter is in use, restoring |
| | functionality |
| | |
| sphinx-bootstrap- | Fix search functionality |
| theme [81] | |
| | |
| spip [82] | Fix several cross-site scripting issues |
| | |
| symfony [83] | Fix CVE injection issue [CVE-2021-41270] |
| | |
| systemd [84] | Fix uncontrolled recursion in systemd- |
| | tmpfiles [CVE-2021-3997]; demote |
| | systemd-timesyncd from Depends to |
| | Recommends, removing a dependency cycle; |
| | fix failure to bind mount a directory |
| | into a container using machinectl; fix |
| | regression in udev resulting in long |
| | delays when processing partitions with |
| | the same label; fix a regression when |
| | using systemd-networkd in an |
| | unprivileged LXD container |
| | |
| sysvinit [85] | Fix parsing of “shutdown +0” ; clarify |
| | that when called with a “time” |
| | shutdown will not exit |
| | |
| tasksel [86] | Install CUPS for all *-desktop tasks, as |
| | task-print-service no longer exists |
| | |
| usb.ids [87] | Update included data |
| | |
| weechat [88] | Fix denial of service issue [CVE-2021- |
| | 40516] |
| | |
| wolfssl [89] | Fix several issues related to OCSP- |
| | handling [CVE-2021-3336 CVE-2021-37155 |
| | CVE-2021-38597] and TLS1.3 support |
| | [CVE-2021-44718 CVE-2022-25638 CVE-2022- |
| | 25640] |
| | |
| xserver-xorg-video- | Fix SIGILL crash on non-SSE2 CPUs |
| intel [90] | |
| | |
| xterm [91] | Fix buffer overflow issue [CVE-2022- |
| | 24130] |
| | |
| zziplib [92] | Fix denial of service issue [CVE-2020- |
| | 18442] |
| | |
+————————–+——————————————+1: https://packages.debian.org/src:apache-log4j1.2
2: https://packages.debian.org/src:apache-log4j2
3: https://packages.debian.org/src:apache2
4: https://packages.debian.org/src:atftp
5: https://packages.debian.org/src:base-files
6: https://packages.debian.org/src:bible-kjv
7: https://packages.debian.org/src:chrony
8: https://packages.debian.org/src:cinnamon
9: https://packages.debian.org/src:clamav
10: https://packages.debian.org/src:cups-filters
11: https://packages.debian.org/src:dask.distributed
12: https://packages.debian.org/src:debian-installer
13: https://packages.debian.org/src:debian-installer-netboot-images
14: https://packages.debian.org/src:debian-ports-archive-keyring
15: https://packages.debian.org/src:django-allauth
16: https://packages.debian.org/src:djbdns
17: https://packages.debian.org/src:dpdk
18: https://packages.debian.org/src:e2guardian
19: https://packages.debian.org/src:epiphany-browser
20: https://packages.debian.org/src:espeak-ng
21: https://packages.debian.org/src:espeakup
22: https://packages.debian.org/src:fcitx5-chinese-addons
23: https://packages.debian.org/src:flac
24: https://packages.debian.org/src:freerdp2
25: https://packages.debian.org/src:galera-3
26: https://packages.debian.org/src:galera-4
27: https://packages.debian.org/src:gbonds
28: https://packages.debian.org/src:glewlwyd
29: https://packages.debian.org/src:glibc
30: https://packages.debian.org/src:glx-alternatives
31: https://packages.debian.org/src:gnupg2
32: https://packages.debian.org/src:gnuplot
33: https://packages.debian.org/src:golang-1.15
34: https://packages.debian.org/src:golang-github-containers-common
35: https://packages.debian.org/src:golang-github-opencontainers-specs
36: https://packages.debian.org/src:gtk+3.0
37: https://packages.debian.org/src:heartbeat
38: https://packages.debian.org/src:htmldoc
39: https://packages.debian.org/src:installation-guide
40: https://packages.debian.org/src:intel-microcode
41: https://packages.debian.org/src:ldap2zone
42: https://packages.debian.org/src:lemonldap-ng
43: https://packages.debian.org/src:libarchive
44: https://packages.debian.org/src:libdatetime-timezone-perl
45: https://packages.debian.org/src:libgdal-grass
46: https://packages.debian.org/src:libpod
47: https://packages.debian.org/src:libxml2
48: https://packages.debian.org/src:linux
49: https://packages.debian.org/src:linux-signed-amd64
50: https://packages.debian.org/src:linux-signed-arm64
51: https://packages.debian.org/src:linux-signed-i386
52: https://packages.debian.org/src:mariadb-10.5
53: https://packages.debian.org/src:mpich
54: https://packages.debian.org/src:mujs
55: https://packages.debian.org/src:mutter
56: https://packages.debian.org/src:node-cached-path-relative
57: https://packages.debian.org/src:node-fetch
58: https://packages.debian.org/src:node-follow-redirects
59: https://packages.debian.org/src:node-markdown-it
60: https://packages.debian.org/src:node-nth-check
61: https://packages.debian.org/src:node-prismjs
62: https://packages.debian.org/src:node-trim-newlines
63: https://packages.debian.org/src:nvidia-cuda-toolkit
64: https://packages.debian.org/src:nvidia-graphics-drivers-tesla-450
65: https://packages.debian.org/src:nvidia-modprobe
66: https://packages.debian.org/src:openboard
67: https://packages.debian.org/src:openssl
68: https://packages.debian.org/src:openvswitch
69: https://packages.debian.org/src:ostree
70: https://packages.debian.org/src:pdb2pqr
71: https://packages.debian.org/src:php-crypt-gpg
72: https://packages.debian.org/src:php-laravel-framework
73: https://packages.debian.org/src:phpliteadmin
74: https://packages.debian.org/src:prips
75: https://packages.debian.org/src:pypy3
76: https://packages.debian.org/src:python-django
77: https://packages.debian.org/src:python-pip
78: https://packages.debian.org/src:rust-cbindgen
79: https://packages.debian.org/src:s390-dasd
80: https://packages.debian.org/src:schleuder
81: https://packages.debian.org/src:sphinx-bootstrap-theme
82: https://packages.debian.org/src:spip
83: https://packages.debian.org/src:symfony
84: https://packages.debian.org/src:systemd
85: https://packages.debian.org/src:sysvinit
86: https://packages.debian.org/src:tasksel
87: https://packages.debian.org/src:usb.ids
88: https://packages.debian.org/src:weechat
89: https://packages.debian.org/src:wolfssl
90: https://packages.debian.org/src:xserver-xorg-video-intel
91: https://packages.debian.org/src:xterm
92: https://packages.debian.org/src:zziplibSecurity Updates
—————-This revision adds the following security updates to the stable release.
The Security Team has already released an advisory for each of these
updates:+—————-+————————–+
| Advisory ID | Package |
+—————-+————————–+
| DSA-5000 [93] | openjdk-11 [94] |
| | |
| DSA-5001 [95] | redis [96] |
| | |
| DSA-5012 [97] | openjdk-17 [98] |
| | |
| DSA-5021 [99] | mediawiki [100] |
| | |
| DSA-5023 [101] | modsecurity-apache [102] |
| | |
| DSA-5024 [103] | apache-log4j2 [104] |
| | |
| DSA-5025 [105] | tang [106] |
| | |
| DSA-5027 [107] | xorg-server [108] |
| | |
| DSA-5028 [109] | spip [110] |
| | |
| DSA-5029 [111] | sogo [112] |
| | |
| DSA-5030 [113] | webkit2gtk [114] |
| | |
| DSA-5031 [115] | wpewebkit [116] |
| | |
| DSA-5033 [117] | fort-validator [118] |
| | |
| DSA-5035 [119] | apache2 [120] |
| | |
| DSA-5037 [121] | roundcube [122] |
| | |
| DSA-5038 [123] | ghostscript [124] |
| | |
| DSA-5039 [125] | wordpress [126] |
| | |
| DSA-5040 [127] | lighttpd [128] |
| | |
| DSA-5041 [129] | cfrpki [130] |
| | |
| DSA-5042 [131] | epiphany-browser [132] |
| | |
| DSA-5043 [133] | lxml [134] |
| | |
| DSA-5046 [135] | chromium [136] |
| | |
| DSA-5047 [137] | prosody [138] |
| | |
| DSA-5048 [139] | libreswan [140] |
| | |
| DSA-5049 [141] | flatpak-builder [142] |
| | |
| DSA-5049 [143] | flatpak [144] |
| | |
| DSA-5050 [145] | linux-signed-amd64 [146] |
| | |
| DSA-5050 [147] | linux-signed-arm64 [148] |
| | |
| DSA-5050 [149] | linux-signed-i386 [150] |
| | |
| DSA-5050 [151] | linux [152] |
| | |
| DSA-5051 [153] | aide [154] |
| | |
| DSA-5052 [155] | usbview [156] |
| | |
| DSA-5053 [157] | pillow [158] |
| | |
| DSA-5054 [159] | chromium [160] |
| | |
| DSA-5055 [161] | util-linux [162] |
| | |
| DSA-5056 [163] | strongswan [164] |
| | |
| DSA-5057 [165] | openjdk-11 [166] |
| | |
| DSA-5058 [167] | openjdk-17 [168] |
| | |
| DSA-5059 [169] | policykit-1 [170] |
| | |
| DSA-5060 [171] | webkit2gtk [172] |
| | |
| DSA-5061 [173] | wpewebkit [174] |
| | |
| DSA-5062 [175] | nss [176] |
| | |
| DSA-5063 [177] | uriparser [178] |
| | |
| DSA-5064 [179] | python-nbxmpp [180] |
| | |
| DSA-5065 [181] | ipython [182] |
| | |
| DSA-5067 [183] | ruby2.7 [184] |
| | |
| DSA-5068 [185] | chromium [186] |
| | |
| DSA-5070 [187] | cryptsetup [188] |
| | |
| DSA-5071 [189] | samba [190] |
| | |
| DSA-5072 [191] | debian-edu-config [192] |
| | |
| DSA-5073 [193] | expat [194] |
| | |
| DSA-5075 [195] | minetest [196] |
| | |
| DSA-5076 [197] | h2database [198] |
| | |
| DSA-5077 [199] | librecad [200] |
| | |
| DSA-5078 [201] | zsh [202] |
| | |
| DSA-5079 [203] | chromium [204] |
| | |
| DSA-5080 [205] | snapd [206] |
| | |
| DSA-5081 [207] | redis [208] |
| | |
| DSA-5082 [209] | php7.4 [210] |
| | |
| DSA-5083 [211] | webkit2gtk [212] |
| | |
| DSA-5084 [213] | wpewebkit [214] |
| | |
| DSA-5085 [215] | expat [216] |
| | |
| DSA-5087 [217] | cyrus-sasl2 [218] |
| | |
| DSA-5088 [219] | varnish [220] |
| | |
| DSA-5089 [221] | chromium [222] |
| | |
| DSA-5091 [223] | containerd [224] |
| | |
| DSA-5092 [225] | linux-signed-amd64 [226] |
| | |
| DSA-5092 [227] | linux-signed-arm64 [228] |
| | |
| DSA-5092 [229] | linux-signed-i386 [230] |
| | |
| DSA-5092 [231] | linux [232] |
| | |
| DSA-5093 [233] | spip [234] |
| | |
| DSA-5095 [235] | linux-signed-amd64 [236] |
| | |
| DSA-5095 [237] | linux-signed-arm64 [238] |
| | |
| DSA-5095 [239] | linux-signed-i386 [240] |
| | |
| DSA-5095 [241] | linux [242] |
| | |
| DSA-5098 [243] | tryton-server [244] |
| | |
| DSA-5099 [245] | tryton-proteus [246] |
| | |
| DSA-5100 [247] | nbd [248] |
| | |
| DSA-5101 [249] | libphp-adodb [250] |
| | |
| DSA-5102 [251] | haproxy [252] |
| | |
| DSA-5103 [253] | openssl [254] |
| | |
| DSA-5104 [255] | chromium [256] |
| | |
| DSA-5105 [257] | bind9 [258] |
| | |
+—————-+————————–+93: https://www.debian.org/security/2021/dsa-5000
94: https://packages.debian.org/src:openjdk-11
95: https://www.debian.org/security/2021/dsa-5001
96: https://packages.debian.org/src:redis
97: https://www.debian.org/security/2021/dsa-5012
98: https://packages.debian.org/src:openjdk-17
99: https://www.debian.org/security/2021/dsa-5021
100: https://packages.debian.org/src:mediawiki
101: https://www.debian.org/security/2021/dsa-5023
102: https://packages.debian.org/src:modsecurity-apache
103: https://www.debian.org/security/2021/dsa-5024
104: https://packages.debian.org/src:apache-log4j2
105: https://www.debian.org/security/2021/dsa-5025
106: https://packages.debian.org/src:tang
107: https://www.debian.org/security/2021/dsa-5027
108: https://packages.debian.org/src:xorg-server
109: https://www.debian.org/security/2021/dsa-5028
110: https://packages.debian.org/src:spip
111: https://www.debian.org/security/2021/dsa-5029
112: https://packages.debian.org/src:sogo
113: https://www.debian.org/security/2021/dsa-5030
114: https://packages.debian.org/src:webkit2gtk
115: https://www.debian.org/security/2021/dsa-5031
116: https://packages.debian.org/src:wpewebkit
117: https://www.debian.org/security/2021/dsa-5033
118: https://packages.debian.org/src:fort-validator
119: https://www.debian.org/security/2022/dsa-5035
120: https://packages.debian.org/src:apache2
121: https://www.debian.org/security/2022/dsa-5037
122: https://packages.debian.org/src:roundcube
123: https://www.debian.org/security/2022/dsa-5038
124: https://packages.debian.org/src:ghostscript
125: https://www.debian.org/security/2022/dsa-5039
126: https://packages.debian.org/src:wordpress
127: https://www.debian.org/security/2022/dsa-5040
128: https://packages.debian.org/src:lighttpd
129: https://www.debian.org/security/2022/dsa-5041
130: https://packages.debian.org/src:cfrpki
131: https://www.debian.org/security/2022/dsa-5042
132: https://packages.debian.org/src:epiphany-browser
133: https://www.debian.org/security/2022/dsa-5043
134: https://packages.debian.org/src:lxml
135: https://www.debian.org/security/2022/dsa-5046
136: https://packages.debian.org/src:chromium
137: https://www.debian.org/security/2022/dsa-5047
138: https://packages.debian.org/src:prosody
139: https://www.debian.org/security/2022/dsa-5048
140: https://packages.debian.org/src:libreswan
141: https://www.debian.org/security/2022/dsa-5049
142: https://packages.debian.org/src:flatpak-builder
143: https://www.debian.org/security/2022/dsa-5049
144: https://packages.debian.org/src:flatpak
145: https://www.debian.org/security/2022/dsa-5050
146: https://packages.debian.org/src:linux-signed-amd64
147: https://www.debian.org/security/2022/dsa-5050
148: https://packages.debian.org/src:linux-signed-arm64
149: https://www.debian.org/security/2022/dsa-5050
150: https://packages.debian.org/src:linux-signed-i386
151: https://www.debian.org/security/2022/dsa-5050
152: https://packages.debian.org/src:linux
153: https://www.debian.org/security/2022/dsa-5051
154: https://packages.debian.org/src:aide
155: https://www.debian.org/security/2022/dsa-5052
156: https://packages.debian.org/src:usbview
157: https://www.debian.org/security/2022/dsa-5053
158: https://packages.debian.org/src:pillow
159: https://www.debian.org/security/2022/dsa-5054
160: https://packages.debian.org/src:chromium
161: https://www.debian.org/security/2022/dsa-5055
162: https://packages.debian.org/src:util-linux
163: https://www.debian.org/security/2022/dsa-5056
164: https://packages.debian.org/src:strongswan
165: https://www.debian.org/security/2022/dsa-5057
166: https://packages.debian.org/src:openjdk-11
167: https://www.debian.org/security/2022/dsa-5058
168: https://packages.debian.org/src:openjdk-17
169: https://www.debian.org/security/2022/dsa-5059
170: https://packages.debian.org/src:policykit-1
171: https://www.debian.org/security/2022/dsa-5060
172: https://packages.debian.org/src:webkit2gtk
173: https://www.debian.org/security/2022/dsa-5061
174: https://packages.debian.org/src:wpewebkit
175: https://www.debian.org/security/2022/dsa-5062
176: https://packages.debian.org/src:nss
177: https://www.debian.org/security/2022/dsa-5063
178: https://packages.debian.org/src:uriparser
179: https://www.debian.org/security/2022/dsa-5064
180: https://packages.debian.org/src:python-nbxmpp
181: https://www.debian.org/security/2022/dsa-5065
182: https://packages.debian.org/src:ipython
183: https://www.debian.org/security/2022/dsa-5067
184: https://packages.debian.org/src:ruby2.7
185: https://www.debian.org/security/2022/dsa-5068
186: https://packages.debian.org/src:chromium
187: https://www.debian.org/security/2022/dsa-5070
188: https://packages.debian.org/src:cryptsetup
189: https://www.debian.org/security/2022/dsa-5071
190: https://packages.debian.org/src:samba
191: https://www.debian.org/security/2022/dsa-5072
192: https://packages.debian.org/src:debian-edu-config
193: https://www.debian.org/security/2022/dsa-5073
194: https://packages.debian.org/src:expat
195: https://www.debian.org/security/2022/dsa-5075
196: https://packages.debian.org/src:minetest
197: https://www.debian.org/security/2022/dsa-5076
198: https://packages.debian.org/src:h2database
199: https://www.debian.org/security/2022/dsa-5077
200: https://packages.debian.org/src:librecad
201: https://www.debian.org/security/2022/dsa-5078
202: https://packages.debian.org/src:zsh
203: https://www.debian.org/security/2022/dsa-5079
204: https://packages.debian.org/src:chromium
205: https://www.debian.org/security/2022/dsa-5080
206: https://packages.debian.org/src:snapd
207: https://www.debian.org/security/2022/dsa-5081
208: https://packages.debian.org/src:redis
209: https://www.debian.org/security/2022/dsa-5082
210: https://packages.debian.org/src:php7.4
211: https://www.debian.org/security/2022/dsa-5083
212: https://packages.debian.org/src:webkit2gtk
213: https://www.debian.org/security/2022/dsa-5084
214: https://packages.debian.org/src:wpewebkit
215: https://www.debian.org/security/2022/dsa-5085
216: https://packages.debian.org/src:expat
217: https://www.debian.org/security/2022/dsa-5087
218: https://packages.debian.org/src:cyrus-sasl2
219: https://www.debian.org/security/2022/dsa-5088
220: https://packages.debian.org/src:varnish
221: https://www.debian.org/security/2022/dsa-5089
222: https://packages.debian.org/src:chromium
223: https://www.debian.org/security/2022/dsa-5091
224: https://packages.debian.org/src:containerd
225: https://www.debian.org/security/2022/dsa-5092
226: https://packages.debian.org/src:linux-signed-amd64
227: https://www.debian.org/security/2022/dsa-5092
228: https://packages.debian.org/src:linux-signed-arm64
229: https://www.debian.org/security/2022/dsa-5092
230: https://packages.debian.org/src:linux-signed-i386
231: https://www.debian.org/security/2022/dsa-5092
232: https://packages.debian.org/src:linux
233: https://www.debian.org/security/2022/dsa-5093
234: https://packages.debian.org/src:spip
235: https://www.debian.org/security/2022/dsa-5095
236: https://packages.debian.org/src:linux-signed-amd64
237: https://www.debian.org/security/2022/dsa-5095
238: https://packages.debian.org/src:linux-signed-arm64
239: https://www.debian.org/security/2022/dsa-5095
240: https://packages.debian.org/src:linux-signed-i386
241: https://www.debian.org/security/2022/dsa-5095
242: https://packages.debian.org/src:linux
243: https://www.debian.org/security/2022/dsa-5098
244: https://packages.debian.org/src:tryton-server
245: https://www.debian.org/security/2022/dsa-5099
246: https://packages.debian.org/src:tryton-proteus
247: https://www.debian.org/security/2022/dsa-5100
248: https://packages.debian.org/src:nbd
249: https://www.debian.org/security/2022/dsa-5101
250: https://packages.debian.org/src:libphp-adodb
251: https://www.debian.org/security/2022/dsa-5102
252: https://packages.debian.org/src:haproxy
253: https://www.debian.org/security/2022/dsa-5103
254: https://packages.debian.org/src:openssl
255: https://www.debian.org/security/2022/dsa-5104
256: https://packages.debian.org/src:chromium
257: https://www.debian.org/security/2022/dsa-5105
258: https://packages.debian.org/src:bind9Removed packages
—————-The following packages were removed due to circumstances beyond our
control:+—————————-+——————+
| Package | Reason |
+—————————-+——————+
| angular-maven-plugin [259] | No longer useful |
| | |
| minify-maven-plugin [260] | No longer useful |
| | |
+—————————-+——————+259: https://packages.debian.org/src:angular-maven-plugin
260: https://packages.debian.org/src:minify-maven-pluginDebian Installer
—————-The installer has been updated to include the fixes incorporated into
stable by the point release.URLs
—-The complete lists of packages that have changed with this revision:
https://deb.debian.org/debian/dists/bullseye/ChangeLog
The current stable distribution:
https://deb.debian.org/debian/dists/stable/
Proposed updates to the stable distribution:
https://deb.debian.org/debian/dists/proposed-updates
stable distribution information (release notes, errata etc.):
https://www.debian.org/releases/stable/
Security announcements and information:
https://www.debian.org/security/
About Debian
————The Debian Project is an association of Free Software developers who
volunteer their time and effort in order to produce the completely free
operating system Debian.Contact Information
——————-For further information, please visit the Debian web pages at
https://www.debian.org/, send mail to, or contact the
stable release team at. --
Brian Masinick



