------------------------------------------------------------------------
The Debian Project
https://www.debian.org/ Updated Debian 11: 11.11 released
press@debian.org
August 31st, 2024
https://www.debian.org/News/2024/2024083102 ------------------------------------------------------------------------
The Debian project is pleased to announce the eleventh and final update
of its oldstable distribution Debian 11 (codename "bullseye"). This
point release mainly adds corrections for security issues, along with a
few adjustments for serious problems. Security advisories have already
been published separately and are referenced where available.
Please note that the point release does not constitute a new version of
Debian 11 but only updates some of the packages included. There is no
need to throw away old "bullseye" media. After installation, packages
can be upgraded to the current versions using an up-to-date Debian
mirror.
Those who frequently install updates from security.debian.org won't have
to update many packages, and most such updates are included in the point release.
New installation images will be available soon at the regular locations.
Upgrading an existing installation to this revision can be achieved by
pointing the package management system at one of Debian's many HTTP
mirrors. A comprehensive list of mirrors is available at:
https://www.debian.org/mirror/list
Secure Boot and other operating systems
---------------------------------------
Users who boot other operating systems on the same hardware, and who
have Secure Boot enabled, should be aware that shim 15.8 (included with
Debian 11.11) revokes signatures across older versions of shim in the
UEFI firmware. This may leave other operating systems using shim before
15.8 unable to boot.
Affected users can temporarily disable Secure Boot before updating other operating systems.
Miscellaneous Bugfixes
----------------------
This oldstable update adds a few important corrections to the following packages:
+----------------------+------------------------------------------------+
| Package | Reason | +----------------------+------------------------------------------------+
| amd64-microcode [1] | New upstream release; security fixes |
| | [CVE-2023-31315]; SEV firmware fixes |
| | [CVE-2023-20584 CVE-2023-31356] |
| | |
| ansible [2] | New usptream stable release; fix template |
| | injection issue [CVE-2021-3583], information |
| | disclosure issue [CVE-2021-3620], file |
| | overwrite issue [CVE-2023-5115], template |
| | injection issue [CVE-2023-5764], information |
| | disclosure issues [CVE-2024-0690 CVE-2022- |
| | 3697]; document workaround for ec2 private key |
| | leak [CVE-2023-4237] |
| | |
| apache2 [3] | New upstream stable release; fix content |
| | disclosure issue [CVE-2024-40725] |
| | |
| base-files [4] | Update for the point release |
| | |
| bind9 [5] | Allow the limits introduced to fix CVE-2024- |
| | 1737 to be configured |
| | |
| calibre [6] | Fix cross site scripting issue [CVE-2024- |
| | 7008], SQL injection issue [CVE-2024-7009] |
| | |
| choose-mirror [7] | Update list of available mirrors |
| | |
| cjson [8] | Add NULL checks to cJSON_SetValuestring and |
| | cJSON_InsertItemInArray [CVE-2023-50472 |
| | CVE-2023-50471 CVE-2024-31755] |
| | |
| cups [9] | Fix issues with domain socket handling |
| | [CVE-2024-35235]; fix regression when domain |
| | sockets only are used |
| | |
| curl [10] | Fix ASN.1 date parser overread issue |
| | [CVE-2024-7264] |
| | |
| debian- | Increase Linux kernel ABI to 5.10.0-32; |
| installer [11] | rebuild against proposed-updates |
| | |
| debian-installer- | Rebuild against proposed-updates |
| netboot-images [12] | |
| | |
| dropbear [13] | Fix "noremotetcp" behaviour of keepalive |
| | packets in combination with the "no-port- |
| | forwarding" authorized_keys(5) restriction |
| | |
| fusiondirectory [14] | Backport compatibility with php-cas version |
| | addressing CVE 2022-39369; fix improper |
| | session handling issue [CVE-2022-36179]; fix |
| | cross site scripting issue [CVE-2022-36180] |
| | |
| gettext.js [15] | Fix server side request forgery issue |
| | [CVE-2024-43370] |
| | |
| glewlwyd [16] | Fix buffer overflow during webauthn signature |
| | assertion [CVE-2022-27240]; prevent directory |
| | traversal in |
| | static_compressed_inmemory_website_callback.c |
| | [CVE-2022-29967]; copy bootstrap, jquery, |
| | fork-awesome instead of linking them; buffer |
| | overflow during FIDO2 signature validation |
| | [CVE-2023-49208] |
| | |
| glibc [17] | Fix ffsll() performance issue depending on |
| | code alignment; performance improvements for |
| | memcpy() on arm64; fix y2038 regression in |
| | nscd following CVE-2024-33601 and CVE-2024- |
| | 33602 fix |
| | |
| graphviz [18] | Fix broken scaling |
| | |
| gtk+2.0 [19] | Avoid looking for modules in current working |
| | directory [CVE-2024-6655] |
| | |
| gtk+3.0 [20] | Avoid looking for modules in current working |
| | directory [CVE-2024-6655] |
| | |
| healpix-java [21] | Fix build failure |
| | |
| imagemagick [22] | Fix divide by zero issues [CVE-2021-20312 |
| | CVE-2021-20313]; fix incomplete fix for |
| | CVE-2023-34151 |
| | |
| indent [23] | Reinstate ROUND_UP macro and adjust the |
| | initial buffer size to fix memory handling |
| | problems; fix out-of-buffer read in |
| | search_brace()/lexi(); fix heap buffer |
| | overwrite in search_brace() [CVE-2023-40305]; |
| | heap buffer underread in set_buf_break() |
| | [CVE-2024-0911] |
| | |
| intel-microcode [24] | New upstream release; security fixes |
| | [CVE-2023-42667 CVE-2023-49141 CVE-2024-24853 |
| | CVE-2024-24980 CVE-2024-25939] |
| | |
| libvirt [25] | Fix sVirt confinement issue [CVE-2021-3631], |
| | use after free issue [CVE-2021-3975], denial |
| | of service issues [CVE-2021-3667 CVE-2021-4147 |
| | CVE-2022-0897 CVE-2024-1441 CVE-2024-2494 |
| | CVE-2024-2496] |
| | |
| midge [26] | Exclude examples/covers/* for DFSG-compliance; |
| | add build-arch/build-indep build targets; use |
| | quilt (3.0) source package format |
| | |
| mlpost [27] | Fix build failure with newer ImageMagick |
| | versions |
| | |
| net-tools [28] | Drop build-dependency on libdnet-dev |
| | |
| nfs-utils [29] | Pass all valid export flags to nfsd |
| | |
| ntfs-3g [30] | Fix use-after-free in |
| | "ntfs_uppercase_mbs" [CVE-2023-52890] |
| | |
| nvidia-graphics- | Fix use of GPL-only symbols causing build |
| drivers- | failures |
| tesla-418 [31] | |
| | |
| nvidia-graphics- | New upstream stable release |
| drivers- | |
| tesla-450 [32] | |
| | |
| nvidia-graphics- | New upstream stable release |
| drivers- | |
| tesla-460 [33] | |
| | |
| ocsinventory- | Backport compatibility with php-cas version |
| server [34] | addressing CVE 2022-39369 |
| | |
| onionshare [35] | Demote obfs4proxy dependency to Recommends, to |
| | allow removal of obfs4proxy |
| | |
| php-cas [36] | Fix Service Hostname Discovery Exploitation |
| | issue [CVE-2022-39369] |
| | |
| poe.app [37] | Make comment cells editable; fix drawing when |
| | an NSActionCell in the preferences is acted on |
| | to change state |
| | |
| putty [38] | Fix weak ECDSA nonce generation allowing |
| | secret key recovery [CVE-2024-31497] |
| | |
| riemann-c- | Prevent malformed payload in GnuTLS send/ |
| client [39] | receive operations |
| | |
| runc [40] | Fix busybox tarball url; prevent buffer |
| | overflow writing netlink messages [CVE-2021- |
| | 43784]; fix tests on newer kernels; prevent |
| | write access to user-owned cgroup hierarchy |
| | "/sys/fs/cgroup/user.slice/..." [CVE-2023- |
| | 25809]; fix access control regression |
| | [CVE-2023-27561 CVE-2023-28642] |
| | |
| rustc-web [41] | New upstream stable release, to support |
| | building new chromium and firefox-esr versions |
| | |
| shim [42] | New upstream release |
| | |
| shim-helpers-amd64- | Rebuild against shim 15.8.1 |
| signed [43] | |
| | |
| shim-helpers-arm64- | Rebuild against shim 15.8.1 |
| signed [44] | |
| | |
| shim-helpers-i386- | Rebuild against shim 15.8.1 |
| signed [45] | |
| | |
| shim-signed [46] | New upstream stable release |
| | |
| symfony [47] | Fix autoloading of HttpClient |
| | |
| trinity [48] | Fix build failure by dropping support for |
| | DECNET |
| | |
| usb.ids [49] | Update included data list |
| | |
| xmedcon [50] | Fix heap overflow [CVE-2024-29421] |
| | | +----------------------+------------------------------------------------+
1:
https://packages.debian.org/src:amd64-microcode
2:
https://packages.debian.org/src:ansible
3:
https://packages.debian.org/src:apache2
4:
https://packages.debian.org/src:base-files
5:
https://packages.debian.org/src:bind9
6:
https://packages.debian.org/src:calibre
7:
https://packages.debian.org/src:choose-mirror
8:
https://packages.debian.org/src:cjson
9:
https://packages.debian.org/src:cups
10:
https://packages.debian.org/src:curl
11:
https://packages.debian.org/src:debian-installer
12:
https://packages.debian.org/src:debian-installer-netboot-images
13:
https://packages.debian.org/src:dropbear
14:
https://packages.debian.org/src:fusiondirectory
15:
https://packages.debian.org/src:gettext.js
16:
https://packages.debian.org/src:glewlwyd
17:
https://packages.debian.org/src:glibc
18:
https://packages.debian.org/src:graphviz
19:
https://packages.debian.org/src:gtk+2.0
20:
https://packages.debian.org/src:gtk+3.0
21:
https://packages.debian.org/src:healpix-java
22:
https://packages.debian.org/src:imagemagick
23:
https://packages.debian.org/src:indent
24:
https://packages.debian.org/src:intel-microcode
25:
https://packages.debian.org/src:libvirt
26:
https://packages.debian.org/src:midge
27:
https://packages.debian.org/src:mlpost
28:
https://packages.debian.org/src:net-tools
29:
https://packages.debian.org/src:nfs-utils
30:
https://packages.debian.org/src:ntfs-3g
31:
https://packages.debian.org/src:nvidia-graphics-drivers-tesla-418
32:
https://packages.debian.org/src:nvidia-graphics-drivers-tesla-450
33:
https://packages.debian.org/src:nvidia-graphics-drivers-tesla-460
34:
https://packages.debian.org/src:ocsinventory-server
35:
https://packages.debian.org/src:onionshare
36:
https://packages.debian.org/src:php-cas
37:
https://packages.debian.org/src:poe.app
38:
https://packages.debian.org/src:putty
39:
https://packages.debian.org/src:riemann-c-client
40:
https://packages.debian.org/src:runc
41:
https://packages.debian.org/src:rustc-web
42:
https://packages.debian.org/src:shim
43:
https://packages.debian.org/src:shim-helpers-amd64-signed
44:
https://packages.debian.org/src:shim-helpers-arm64-signed
45:
https://packages.debian.org/src:shim-helpers-i386-signed
46:
https://packages.debian.org/src:shim-signed
47:
https://packages.debian.org/src:symfony
48:
https://packages.debian.org/src:trinity
49:
https://packages.debian.org/src:usb.ids
50:
https://packages.debian.org/src:xmedcon
Security Updates
----------------
This revision adds the following security updates to the oldstable
release. The Security Team has already released an advisory for each of
these updates:
+----------------+--------------------------+
| Advisory ID | Package | +----------------+--------------------------+
| DSA-5718 [51] | org-mode [52] |
| | |
| DSA-5719 [53] | emacs [54] |
| | |
| DSA-5721 [55] | ffmpeg [56] |
| | |
| DSA-5722 [57] | libvpx [58] |
| | |
| DSA-5723 [59] | plasma-workspace [60] |
| | |
| DSA-5725 [61] | znc [62] |
| | |
| DSA-5726 [63] | krb5 [64] |
| | |
| DSA-5727 [65] | firefox-esr [66] |
| | |
| DSA-5728 [67] | exim4 [68] |
| | |
| DSA-5729 [69] | apache2 [70] |
| | |
| DSA-5730 [71] | linux-signed-amd64 [72] |
| | |
| DSA-5730 [73] | linux-signed-arm64 [74] |
| | |
| DSA-5730 [75] | linux-signed-i386 [76] |
| | |
| DSA-5730 [77] | linux [78] |
| | |
| DSA-5734 [79] | bind9 [80] |
| | |
| DSA-5736 [81] | openjdk-11 [82] |
| | |
| DSA-5737 [83] | libreoffice [84] |
| | |
| DSA-5738 [85] | openjdk-17 [86] |
| | |
| DSA-5739 [87] | wpa [88] |
| | |
| DSA-5740 [89] | firefox-esr [90] |
| | |
| DSA-5742 [91] | odoo [92] |
| | |
| DSA-5743 [93] | roundcube [94] |
| | |
| DSA-5746 [95] | postgresql-13 [96] |
| | |
| DSA-5747 [97] | linux-signed-amd64 [98] |
| | |
| DSA-5747 [99] | linux-signed-arm64 [100] |
| | |
| DSA-5747 [101] | linux-signed-i386 [102] |
| | |
| DSA-5747 [103] | linux [104] |
| | | +----------------+--------------------------+
51:
https://www.debian.org/security/2024/dsa-5718
52:
https://packages.debian.org/src:org-mode
53:
https://www.debian.org/security/2024/dsa-5719
54:
https://packages.debian.org/src:emacs
55:
https://www.debian.org/security/2024/dsa-5721
56:
https://packages.debian.org/src:ffmpeg
57:
https://www.debian.org/security/2024/dsa-5722
58:
https://packages.debian.org/src:libvpx
59:
https://www.debian.org/security/2024/dsa-5723
60:
https://packages.debian.org/src:plasma-workspace
61:
https://www.debian.org/security/2024/dsa-5725
62:
https://packages.debian.org/src:znc
63:
https://www.debian.org/security/2024/dsa-5726
64:
https://packages.debian.org/src:krb5
65:
https://www.debian.org/security/2024/dsa-5727
66:
https://packages.debian.org/src:firefox-esr
67:
https://www.debian.org/security/2024/dsa-5728
68:
https://packages.debian.org/src:exim4
69:
https://www.debian.org/security/2024/dsa-5729
70:
https://packages.debian.org/src:apache2
71:
https://www.debian.org/security/2024/dsa-5730
72:
https://packages.debian.org/src:linux-signed-amd64
73:
https://www.debian.org/security/2024/dsa-5730
74:
https://packages.debian.org/src:linux-signed-arm64
75:
https://www.debian.org/security/2024/dsa-5730
76:
https://packages.debian.org/src:linux-signed-i386
77:
https://www.debian.org/security/2024/dsa-5730
78:
https://packages.debian.org/src:linux
79:
https://www.debian.org/security/2024/dsa-5734
80:
https://packages.debian.org/src:bind9
81:
https://www.debian.org/security/2024/dsa-5736
82:
https://packages.debian.org/src:openjdk-11
83:
https://www.debian.org/security/2024/dsa-5737
84:
https://packages.debian.org/src:libreoffice
85:
https://www.debian.org/security/2024/dsa-5738
86:
https://packages.debian.org/src:openjdk-17
87:
https://www.debian.org/security/2024/dsa-5739
88:
https://packages.debian.org/src:wpa
89:
https://www.debian.org/security/2024/dsa-5740
90:
https://packages.debian.org/src:firefox-esr
91:
https://www.debian.org/security/2024/dsa-5742
92:
https://packages.debian.org/src:odoo
93:
https://www.debian.org/security/2024/dsa-5743
94:
https://packages.debian.org/src:roundcube
95:
https://www.debian.org/security/2024/dsa-5746
96:
https://packages.debian.org/src:postgresql-13
97:
https://www.debian.org/security/2024/dsa-5747
98:
https://packages.debian.org/src:linux-signed-amd64
99:
https://www.debian.org/security/2024/dsa-5747
100:
https://packages.debian.org/src:linux-signed-arm64
101:
https://www.debian.org/security/2024/dsa-5747
102:
https://packages.debian.org/src:linux-signed-i386
103:
https://www.debian.org/security/2024/dsa-5747
104:
https://packages.debian.org/src:linux
Removed packages
----------------
The following packages were removed due to circumstances beyond our
control:
+----------------------+---------------------------------+
| Package | Reason | +----------------------+---------------------------------+
| bcachefs-tools [105] | Buggy, obsolete |
| | |
| dnprogs [106] | Buggy, obsolete |
| | |
| iotjs [107] | Unmaintained, security concerns |
| | |
| obfs4proxy [108] | Security issues |
| | | +----------------------+---------------------------------+
105:
https://packages.debian.org/src:bcachefs-tools
106:
https://packages.debian.org/src:dnprogs
107:
https://packages.debian.org/src:iotjs
108:
https://packages.debian.org/src:obfs4proxy
Debian Installer
----------------
The installer has been updated to include the fixes incorporated into
oldstable by the point release.
URLs
----
The complete lists of packages that have changed with this revision:
https://deb.debian.org/debian/dists/bullseye/ChangeLog
The current oldstable distribution:
https://deb.debian.org/debian/dists/oldstable/
Proposed updates to the oldstable distribution:
https://deb.debian.org/debian/dists/oldstable-proposed-updates
oldstable distribution information (release notes, errata etc.):
https://www.debian.org/releases/oldstable/
Security announcements and information:
https://www.debian.org/security/
About Debian
------------
The Debian Project is an association of Free Software developers who
volunteer their time and effort in order to produce the completely free operating system Debian.
Contact Information
-------------------
For further information, please visit the Debian web pages at
https://www.debian.org/, send mail to <
press@debian.org>, or contact the
stable release team at <
debian-release@lists.debian.org>.
-----BEGIN PGP SIGNATURE-----
iQIzBAABCgAdFiEEcH/R3vmpi4JWBoDfeBP2a44wMXIFAmbTIDEACgkQeBP2a44w MXIHsA//TZPd0BeqHqJyUbb4JS78I3vHSlzK7DkBgy6EzAgSzREdERCl0Qdt9CW6 vVHJpjP1CmFro+EGmModTVXPp4utKtTQharjB52Ar9L+hx6jV6miBme0AsEgWYux ige2Tvfl2JSsFRnbgqGTN28GAY0Gm8DShnp+e8gBckU0MnOBcxYLTLH7znd+8swL +IPXJ47jZ9nCuCs7Xry78KK5BB5nmaBOh3Ip9qQRNv6jy/nCne4v3OiBW4b1ogex 9r5101yzkLFPg9WCe4mOk9kchFK0GtEWdXvPSortvgxzgoZEpZOAt+c2aH2Vi/n0 lLG+BHznNQ3sfOtvaTJNyHOkeRg32//1/Pr3TPmebexY1Rm/d5c0X5zkxR2ViEw7 l77MuSjbAbwsiIoQO0TSDGW8132vlwd8deMSlnSmK0GDEoYWPLm2nKDbI2reAG5p 2llLE/Q7ifv0keTZOIVaL6BygPNEOn065v8cyA1xAfSAlkXmHDEMMGXMkUeQEAJS ox3xjxWnU0XazueafqxpwQc3KR8Wxk7qT0DSXH0AHPmbeDwOjt1+AKZdCAatYWRu YzQMCSKqFasJumcpi1OP5cAJKf//SaVOIHFo8neE8aA3bbboxJsepKvMqwaA0XPK gfNhGrSixgUEpKCOngL9CaGf1K0czxP2HCuvuuEX3w85WtvCzMY=
=0ptm
-----END PGP SIGNATURE-----
--- SoupGate-Win32 v1.05
* Origin: fsxNet Usenet Gateway (21:1/5)