------------------------------------------------------------------------
The Debian Project
https://www.debian.org/ Updated Debian 12: 12.7 released
press@debian.org
August 31st, 2024
https://www.debian.org/News/2024/20240831 ------------------------------------------------------------------------
The Debian project is pleased to announce the seventh update of its
stable distribution Debian 12 (codename "bookworm"). This point release
mainly adds corrections for security issues, along with a few
adjustments for serious problems. Security advisories have already been published separately and are referenced where available.
Please note that the point release does not constitute a new version of
Debian 12 but only updates some of the packages included. There is no
need to throw away old "bookworm" media. After installation, packages
can be upgraded to the current versions using an up-to-date Debian
mirror.
Those who frequently install updates from security.debian.org won't have
to update many packages, and most such updates are included in the point release.
New installation images will be available soon at the regular locations.
Upgrading an existing installation to this revision can be achieved by
pointing the package management system at one of Debian's many HTTP
mirrors. A comprehensive list of mirrors is available at:
https://www.debian.org/mirror/list
Secure Boot and other operating systems
---------------------------------------
Users who boot other operating systems on the same hardware, and who
have Secure Boot enabled, should be aware that shim 15.8 (included with
Debian 12.7) revokes signatures across older versions of shim in the
UEFI firmware. This may leave other operating systems using shim before
15.8 unable to boot.
Affected users can temporarily disable Secure Boot before updating other operating systems.
Miscellaneous Bugfixes
----------------------
This stable update adds a few important corrections to the following
packages:
+--------------------------+------------------------------------------+
| Package | Reason | +--------------------------+------------------------------------------+
| amd64-microcode [1] | New upstream release; security fixes |
| | [CVE-2023-31315]; SEV firmware fixes |
| | [CVE-2023-20584 CVE-2023-31356] |
| | |
| ansible [2] | New upstream stable release; fix key |
| | leakage issue [CVE-2023-4237] |
| | |
| ansible-core [3] | New upstream stable release; fix |
| | information disclosure issue [CVE-2024- |
| | 0690]; fix template injection issue |
| | [CVE-2023-5764]; fix path traversal |
| | issue [CVE-2023-5115] |
| | |
| apache2 [4] | New upstream stable release; fix content |
| | disclosure issue [CVE-2024-40725] |
| | |
| base-files [5] | Update for the point release |
| | |
| cacti [6] | Fix remote code execution issues |
| | [CVE-2024-25641 CVE-2024-31459], cross |
| | site scripting issues [CVE-2024-29894 |
| | CVE-2024-31443 CVE-2024-31444], SQL |
| | injection issues [CVE-2024-31445 |
| | CVE-2024-31458 CVE-2024-31460], "type |
| | juggling" issue [CVE-2024-34340]; fix |
| | autopkgtest failure |
| | |
| calamares-settings- | Fix Xfce launcher permission issue |
| debian [7] | |
| | |
| calibre [8] | Fix remote code execution issue |
| | [CVE-2024-6782, cross site scripting |
| | issue [CVE-2024-7008], SQL injection |
| | issue [CVE-2024-7009] |
| | |
| choose-mirror [9] | Update list of available mirrors |
| | |
| cockpit [10] | Fix denial of service issue [CVE-2024- |
| | 6126] |
| | |
| cups [11] | Fix issues with domain socket handling |
| | [CVE-2024-35235] |
| | |
| curl [12] | Fix ASN.1 date parser overread issue |
| | [CVE-2024-7264] |
| | |
| cyrus-imapd [13] | Fix regression introduced in CVE-2024- |
| | 34055 fix |
| | |
| dcm2niix [14] | Fix potential code execution issue |
| | [CVE-2024-27629] |
| | |
| debian-installer [15] | Increase Linux kernel ABI to 6.1.0-25; |
| | rebuild against proposed-updates |
| | |
| debian-installer- | Rebuild against proposed-updates |
| netboot-images [16] | |
| | |
| dmitry [17] | Security fixes [CVE-2024-31837 CVE-2020- |
| | 14931 CVE-2017-7938] |
| | |
| dropbear [18] | Fix "noremotetcp" behaviour of |
| | keepalive packets in combination with |
| | the "no-port-forwarding" |
| | authorized_keys(5) restriction |
| | |
| gettext.js [19] | Fix server side request forgery issue |
| | [CVE-2024-43370] |
| | |
| glibc [20] | Fix freeing uninitialized memory in |
| | libc_freeres_fn(); fix several |
| | performance issues and possible crashses |
| | |
| glogic [21] | Require Gtk 3.0 and PangoCairo 1.0 |
| | |
| graphviz [22] | Fix broken scale |
| | |
| gtk+2.0 [23] | Avoid looking for modules in the current |
| | working directory [CVE-2024-6655] |
| | |
| gtk+3.0 [24] | Avoid looking for modules in the current |
| | working directory [CVE-2024-6655] |
| | |
| imagemagick [25] | Fix segmentation fault issue; fix |
| | incomplete fix for CVE-2023-34151 |
| | |
| initramfs-tools [26] | hook_functions: Fix copy_file with |
| | source including a directory symlink; |
| | hook-functions: copy_file: Canonicalise |
| | target filename; install hid-multitouch |
| | module for Surface Pro 4 Keyboard; add |
| | hyper-keyboard module, needed to enter |
| | LUKS password in Hyper-V; |
| | auto_add_modules: Add onboard_usb_hub, |
| | onboard_usb_dev |
| | |
| intel-microcode [27] | New upstream release; security fixes |
| | [CVE-2023-42667 CVE-2023-49141 CVE-2024- |
| | 24853 CVE-2024-24980 CVE-2024-25939] |
| | |
| ipmitool [28] | Add missing enterprise-numbers.txt file |
| | |
| libapache2-mod-auth- | Avoid crash when the Forwarded header is |
| openidc [29] | not present but OIDCXForwardedHeaders is |
| | configured for it |
| | |
| libnvme [30] | Fix buffer overflow during scanning |
| | devices that do not support sub-4k reads |
| | |
| libvirt [31] | birsh: Make domif-setlink work more than |
| | once; qemu: domain: Fix logic when |
| | tainting domain; fix denial of service |
| | issues [CVE-2023-3750 CVE-2024-1441 |
| | CVE-2024-2494 CVE-2024-2496] |
| | |
| linux [32] | New upstream release; bump ABI to 25 |
| | |
| linux-signed-amd64 [33] | New upstream release; bump ABI to 25 |
| | |
| linux-signed-arm64 [34] | New upstream release; bump ABI to 25 |
| | |
| linux-signed-i386 [35] | New upstream release; bump ABI to 25 |
| | |
| newlib [36] | Fix buffer overflow issue [CVE-2021- |
| | 3420] |
| | |
| numpy [37] | Conflict with python-numpy |
| | |
| openssl [38] | New upstream stable release; fix denial |
| | of service issues [CVE-2024-2511 |
| | CVE-2024-4603]; fix use after free issue |
| | [CVE-2024-4741] |
| | |
| poe.app [39] | Make comment cells editable; fix drawing |
| | when an NSActionCell in the preferences |
| | is acted on to change state |
| | |
| putty [40] | Fix weak ECDSA nonce generation allowing |
| | secret key recovery [CVE-2024-31497] |
| | |
| qemu [41] | New upstream stable release; fix denial |
| | of service issue [CVE-2024-4467] |
| | |
| riemann-c-client [42] | Prevent malformed payload in GnuTLS |
| | send/receive operations |
| | |
| rustc-web [43] | New upstream stable release, to support |
| | building new chromium and firefox-esr |
| | versions |
| | |
| shim [44] | New upstream release |
| | |
| shim-helpers-amd64- | Rebuild against shim 15.8.1 |
| signed [45] | |
| | |
| shim-helpers-arm64- | Rebuild against shim 15.8.1 |
| signed [46] | |
| | |
| shim-helpers-i386- | Rebuild against shim 15.8.1 |
| signed [47] | |
| | |
| shim-signed [48] | New upstream stable release |
| | |
| systemd [49] | New upstream stable release; update hwdb |
| | |
| usb.ids [50] | Update included data list |
| | |
| xmedcon [51] | Fix buffer overflow issue [CVE-2024- |
| | 29421] |
| | | +--------------------------+------------------------------------------+
1:
https://packages.debian.org/src:amd64-microcode
2:
https://packages.debian.org/src:ansible
3:
https://packages.debian.org/src:ansible-core
4:
https://packages.debian.org/src:apache2
5:
https://packages.debian.org/src:base-files
6:
https://packages.debian.org/src:cacti
7:
https://packages.debian.org/src:calamares-settings-debian
8:
https://packages.debian.org/src:calibre
9:
https://packages.debian.org/src:choose-mirror
10:
https://packages.debian.org/src:cockpit
11:
https://packages.debian.org/src:cups
12:
https://packages.debian.org/src:curl
13:
https://packages.debian.org/src:cyrus-imapd
14:
https://packages.debian.org/src:dcm2niix
15:
https://packages.debian.org/src:debian-installer
16:
https://packages.debian.org/src:debian-installer-netboot-images
17:
https://packages.debian.org/src:dmitry
18:
https://packages.debian.org/src:dropbear
19:
https://packages.debian.org/src:gettext.js
20:
https://packages.debian.org/src:glibc
21:
https://packages.debian.org/src:glogic
22:
https://packages.debian.org/src:graphviz
23:
https://packages.debian.org/src:gtk+2.0
24:
https://packages.debian.org/src:gtk+3.0
25:
https://packages.debian.org/src:imagemagick
26:
https://packages.debian.org/src:initramfs-tools
27:
https://packages.debian.org/src:intel-microcode
28:
https://packages.debian.org/src:ipmitool
29:
https://packages.debian.org/src:libapache2-mod-auth-openidc
30:
https://packages.debian.org/src:libnvme
31:
https://packages.debian.org/src:libvirt
32:
https://packages.debian.org/src:linux
33:
https://packages.debian.org/src:linux-signed-amd64
34:
https://packages.debian.org/src:linux-signed-arm64
35:
https://packages.debian.org/src:linux-signed-i386
36:
https://packages.debian.org/src:newlib
37:
https://packages.debian.org/src:numpy
38:
https://packages.debian.org/src:openssl
39:
https://packages.debian.org/src:poe.app
40:
https://packages.debian.org/src:putty
41:
https://packages.debian.org/src:qemu
42:
https://packages.debian.org/src:riemann-c-client
43:
https://packages.debian.org/src:rustc-web
44:
https://packages.debian.org/src:shim
45:
https://packages.debian.org/src:shim-helpers-amd64-signed
46:
https://packages.debian.org/src:shim-helpers-arm64-signed
47:
https://packages.debian.org/src:shim-helpers-i386-signed
48:
https://packages.debian.org/src:shim-signed
49:
https://packages.debian.org/src:systemd
50:
https://packages.debian.org/src:usb.ids
51:
https://packages.debian.org/src:xmedcon
Security Updates
----------------
This revision adds the following security updates to the stable release.
The Security Team has already released an advisory for each of these
updates:
+----------------+--------------------------+
| Advisory ID | Package | +----------------+--------------------------+
| DSA-5617 [52] | chromium [53] |
| | |
| DSA-5629 [54] | chromium [55] |
| | |
| DSA-5634 [56] | chromium [57] |
| | |
| DSA-5636 [58] | chromium [59] |
| | |
| DSA-5639 [60] | chromium [61] |
| | |
| DSA-5648 [62] | chromium [63] |
| | |
| DSA-5654 [64] | chromium [65] |
| | |
| DSA-5656 [66] | chromium [67] |
| | |
| DSA-5668 [68] | chromium [69] |
| | |
| DSA-5675 [70] | chromium [71] |
| | |
| DSA-5676 [72] | chromium [73] |
| | |
| DSA-5683 [74] | chromium [75] |
| | |
| DSA-5687 [76] | chromium [77] |
| | |
| DSA-5689 [78] | chromium [79] |
| | |
| DSA-5694 [80] | chromium [81] |
| | |
| DSA-5696 [82] | chromium [83] |
| | |
| DSA-5697 [84] | chromium [85] |
| | |
| DSA-5701 [86] | chromium [87] |
| | |
| DSA-5710 [88] | chromium [89] |
| | |
| DSA-5716 [90] | chromium [91] |
| | |
| DSA-5719 [92] | emacs [93] |
| | |
| DSA-5720 [94] | chromium [95] |
| | |
| DSA-5722 [96] | libvpx [97] |
| | |
| DSA-5723 [98] | plasma-workspace [99] |
| | |
| DSA-5724 [100] | openssh [101] |
| | |
| DSA-5725 [102] | znc [103] |
| | |
| DSA-5726 [104] | krb5 [105] |
| | |
| DSA-5727 [106] | firefox-esr [107] |
| | |
| DSA-5728 [108] | exim4 [109] |
| | |
| DSA-5729 [110] | apache2 [111] |
| | |
| DSA-5731 [112] | linux-signed-amd64 [113] |
| | |
| DSA-5731 [114] | linux-signed-arm64 [115] |
| | |
| DSA-5731 [116] | linux-signed-i386 [117] |
| | |
| DSA-5731 [118] | linux [119] |
| | |
| DSA-5732 [120] | chromium [121] |
| | |
| DSA-5734 [122] | bind9 [123] |
| | |
| DSA-5735 [124] | chromium [125] |
| | |
| DSA-5737 [126] | libreoffice [127] |
| | |
| DSA-5738 [128] | openjdk-17 [129] |
| | |
| DSA-5739 [130] | wpa [131] |
| | |
| DSA-5740 [132] | firefox-esr [133] |
| | |
| DSA-5741 [134] | chromium [135] |
| | |
| DSA-5743 [136] | roundcube [137] |
| | |
| DSA-5745 [138] | postgresql-15 [139] |
| | |
| DSA-5748 [140] | ffmpeg [141] |
| | |
| DSA-5749 [142] | bubblewrap [143] |
| | |
| DSA-5749 [144] | flatpak [145] |
| | |
| DSA-5750 [146] | python-asyncssh [147] |
| | |
| DSA-5751 [148] | squid [149] |
| | |
| DSA-5752 [150] | dovecot [151] |
| | |
| DSA-5753 [152] | aom [153] |
| | |
| DSA-5754 [154] | cinder [155] |
| | |
| DSA-5755 [156] | glance [157] |
| | |
| DSA-5756 [158] | nova [159] |
| | |
| DSA-5757 [160] | chromium [161] |
| | | +----------------+--------------------------+
52:
https://www.debian.org/security/2024/dsa-5617
53:
https://packages.debian.org/src:chromium
54:
https://www.debian.org/security/2024/dsa-5629
55:
https://packages.debian.org/src:chromium
56:
https://www.debian.org/security/2024/dsa-5634
57:
https://packages.debian.org/src:chromium
58:
https://www.debian.org/security/2024/dsa-5636
59:
https://packages.debian.org/src:chromium
60:
https://www.debian.org/security/2024/dsa-5639
61:
https://packages.debian.org/src:chromium
62:
https://www.debian.org/security/2024/dsa-5648
63:
https://packages.debian.org/src:chromium
64:
https://www.debian.org/security/2024/dsa-5654
65:
https://packages.debian.org/src:chromium
66:
https://www.debian.org/security/2024/dsa-5656
67:
https://packages.debian.org/src:chromium
68:
https://www.debian.org/security/2024/dsa-5668
69:
https://packages.debian.org/src:chromium
70:
https://www.debian.org/security/2024/dsa-5675
71:
https://packages.debian.org/src:chromium
72:
https://www.debian.org/security/2024/dsa-5676
73:
https://packages.debian.org/src:chromium
74:
https://www.debian.org/security/2024/dsa-5683
75:
https://packages.debian.org/src:chromium
76:
https://www.debian.org/security/2024/dsa-5687
77:
https://packages.debian.org/src:chromium
78:
https://www.debian.org/security/2024/dsa-5689
79:
https://packages.debian.org/src:chromium
80:
https://www.debian.org/security/2024/dsa-5694
81:
https://packages.debian.org/src:chromium
82:
https://www.debian.org/security/2024/dsa-5696
83:
https://packages.debian.org/src:chromium
84:
https://www.debian.org/security/2024/dsa-5697
85:
https://packages.debian.org/src:chromium
86:
https://www.debian.org/security/2024/dsa-5701
87:
https://packages.debian.org/src:chromium
88:
https://www.debian.org/security/2024/dsa-5710
89:
https://packages.debian.org/src:chromium
90:
https://www.debian.org/security/2024/dsa-5716
91:
https://packages.debian.org/src:chromium
92:
https://www.debian.org/security/2024/dsa-5719
93:
https://packages.debian.org/src:emacs
94:
https://www.debian.org/security/2024/dsa-5720
95:
https://packages.debian.org/src:chromium
96:
https://www.debian.org/security/2024/dsa-5722
97:
https://packages.debian.org/src:libvpx
98:
https://www.debian.org/security/2024/dsa-5723
99:
https://packages.debian.org/src:plasma-workspace
100:
https://www.debian.org/security/2024/dsa-5724
101:
https://packages.debian.org/src:openssh
102:
https://www.debian.org/security/2024/dsa-5725
103:
https://packages.debian.org/src:znc
104:
https://www.debian.org/security/2024/dsa-5726
105:
https://packages.debian.org/src:krb5
106:
https://www.debian.org/security/2024/dsa-5727
107:
https://packages.debian.org/src:firefox-esr
108:
https://www.debian.org/security/2024/dsa-5728
109:
https://packages.debian.org/src:exim4
110:
https://www.debian.org/security/2024/dsa-5729
111:
https://packages.debian.org/src:apache2
112:
https://www.debian.org/security/2024/dsa-5731
113:
https://packages.debian.org/src:linux-signed-amd64
114:
https://www.debian.org/security/2024/dsa-5731
115:
https://packages.debian.org/src:linux-signed-arm64
116:
https://www.debian.org/security/2024/dsa-5731
117:
https://packages.debian.org/src:linux-signed-i386
118:
https://www.debian.org/security/2024/dsa-5731
119:
https://packages.debian.org/src:linux
120:
https://www.debian.org/security/2024/dsa-5732
121:
https://packages.debian.org/src:chromium
122:
https://www.debian.org/security/2024/dsa-5734
123:
https://packages.debian.org/src:bind9
124:
https://www.debian.org/security/2024/dsa-5735
125:
https://packages.debian.org/src:chromium
126:
https://www.debian.org/security/2024/dsa-5737
127:
https://packages.debian.org/src:libreoffice
128:
https://www.debian.org/security/2024/dsa-5738
129:
https://packages.debian.org/src:openjdk-17
130:
https://www.debian.org/security/2024/dsa-5739
131:
https://packages.debian.org/src:wpa
132:
https://www.debian.org/security/2024/dsa-5740
133:
https://packages.debian.org/src:firefox-esr
134:
https://www.debian.org/security/2024/dsa-5741
135:
https://packages.debian.org/src:chromium
136:
https://www.debian.org/security/2024/dsa-5743
137:
https://packages.debian.org/src:roundcube
138:
https://www.debian.org/security/2024/dsa-5745
139:
https://packages.debian.org/src:postgresql-15
140:
https://www.debian.org/security/2024/dsa-5748
141:
https://packages.debian.org/src:ffmpeg
142:
https://www.debian.org/security/2024/dsa-5749
143:
https://packages.debian.org/src:bubblewrap
144:
https://www.debian.org/security/2024/dsa-5749
145:
https://packages.debian.org/src:flatpak
146:
https://www.debian.org/security/2024/dsa-5750
147:
https://packages.debian.org/src:python-asyncssh
148:
https://www.debian.org/security/2024/dsa-5751
149:
https://packages.debian.org/src:squid
150:
https://www.debian.org/security/2024/dsa-5752
151:
https://packages.debian.org/src:dovecot
152:
https://www.debian.org/security/2024/dsa-5753
153:
https://packages.debian.org/src:aom
154:
https://www.debian.org/security/2024/dsa-5754
155:
https://packages.debian.org/src:cinder
156:
https://www.debian.org/security/2024/dsa-5755
157:
https://packages.debian.org/src:glance
158:
https://www.debian.org/security/2024/dsa-5756
159:
https://packages.debian.org/src:nova
160:
https://www.debian.org/security/2024/dsa-5757
161:
https://packages.debian.org/src:chromium
Removed packages
----------------
The following packages were removed due to circumstances beyond our
control:
+----------------------+-----------------+
| Package | Reason | +----------------------+-----------------+
| bcachefs-tools [162] | Buggy; obsolete |
| | | +----------------------+-----------------+
162:
https://packages.debian.org/src:bcachefs-tools
Debian Installer
----------------
The installer has been updated to include the fixes incorporated into
stable by the point release.
URLs
----
The complete lists of packages that have changed with this revision:
https://deb.debian.org/debian/dists/bookworm/ChangeLog
The current stable distribution:
https://deb.debian.org/debian/dists/stable/
Proposed updates to the stable distribution:
https://deb.debian.org/debian/dists/proposed-updates
stable distribution information (release notes, errata etc.):
https://www.debian.org/releases/stable/
Security announcements and information:
https://www.debian.org/security/
About Debian
------------
The Debian Project is an association of Free Software developers who
volunteer their time and effort in order to produce the completely free operating system Debian.
Contact Information
-------------------
For further information, please visit the Debian web pages at
https://www.debian.org/, send mail to <
press@debian.org>, or contact the
stable release team at <
debian-release@lists.debian.org>.
-----BEGIN PGP SIGNATURE-----
iQIzBAABCgAdFiEEcH/R3vmpi4JWBoDfeBP2a44wMXIFAmbTHDQACgkQeBP2a44w MXLRvg//ad7Pi+TajdIFYmVPrVUEPfK2f5PxpcAdsbTLCwCumxiWVgDBPR6qDrcu YdIHp1894fph9xO3YzH4vNVFG0XLB5rst3qmkNg7Lh7AqdCatxfqbFjrgG1trBVu M+9fpCZ4Xfu8bMpIvJbY4QAPPpvtXhjvFRUD4DFht+qI61SsRXaymdO6y6N8yfo1 2dPZ1pdaH4RyWp/QUEpDUmexggl6BFC4lsWnWtPofU4FRlapv4vquie4GwP+WN12 sM70OnUrIsCBlBt8feuEWMFXPe8PkfZZkWtjPxrVSjYvZVlvRpjDiXZfQ2gZjfz5 vSn2yTXD8UoZdarQ9mDwX4oD+8/eR1RDw1VamQ7iS1044EljNZtYKuHlMmg2fJfl zMW1ZHxWT2yNTAIQAr19xc71Hk3iSKj1OMjFTloCwX42+9ib6bjsYJJkXwAsTSbD S4z3Xvn4pH8v/expHZVuvtkx+9GXiijHSOQpR0MUfvHV+EYREfpcQDuo1P2no9ZB hpJ8WTnV4eKJZnWD97p6wlNa+BZJCs0H5yxIjEn4n9u+C6fh7YXYqH2yQD5HeXnr BHKHs8Djsh58amUMqTSshxGzMh9O+5iU2EhGI9vvi5YRLeKCOlrEG7ldGNp3NiZn pxW7pqhxkncelf2MRoc1br+QeMCiYMH+NLOoBqUSNc38TnUVSgI=
=HHKx
-----END PGP SIGNATURE-----
--- SoupGate-Win32 v1.05
* Origin: fsxNet Usenet Gateway (21:1/5)