![]() Update security status of various packagesĮnsure non-merged-usr chroots can continue to be created for older releases and buildd chrootsĪdd Ubuntu 22.04 LTS, Jammy Jellyfish and Ubuntu 22.10, Kinetic Kuduįix possible username enumeration issue įix testsuite failures on armhf and ppc64el caused by incorrect libffi usageįix build failure with recent kernel versionsįix out-of-bounds write issue įix build failure with newer imagemagick versionsįix side-channel leak where 1 in 2048 handshakes fail, denial of service issue due to multithreaded BN_CTX access, crash due to non-thread safe memory allocationįix buffer overflow issue fix crashes įix buffer overflow issues fix crash ĭon't try to convert PNG to EPS for latex, as our imagemagick has EPS disabled for security reasonsįix heap-based buffer overflows įix test suite when combined with OpenSSL 1.1.1e or newerįix NULL pointer dereference issue įix infinite loop, integer overflow issues and heap buffer overflow issue įix DKMS build failure regression caused by Linux upstream changes in the 4.19.191 kernelįix buffer overflow issues įix build failure by disabling generation of Postscript documentation Rebuild against buster-proposed-updates increase Linux ABI to 4.19.0-21 New upstream stable release security fixes įix code injection vulnerability update GitHub token pattern use Authorization header instead of deprecated access_token query parameter This oldstable update adds a few important corrections to the following packages: Packageįix open redirect issue, cross-site scripting issues elasticsearch: Do not print response if HTTP code is not 200 provide a compiled version and configuration filesįix denial of service issue, HTTP request smuggling issue, integer overflow issue, out-of-bounds write issue, HTTP request smuggling issue, out-of-bounds read issues, denial of service issue, out-of-bounds read issue, possible IP-based authentication bypass issue Pointing the package management system at one of Debian's many HTTP mirrors.Ī comprehensive list of mirrors is available at: Upgrading an existing installation to this revision can be achieved by New installation images will be available soon at the regular locations. To update many packages, and most such updates are Those who frequently install updates from won't have Packages can be upgraded to the current versions using an up-to-date Debian ![]() Please note that the point release does not constitute a new version of Debianġ0 but only updates some of the packages included. Should upgrade to Debian 11, or see for detailsĪbout the subset of architectures and packages covered by the Long Term Support Users wishing to continue to receive security support Have already been published separately and are referenced where available.Īfter this point release, Debian's Security and Release Teams will no longer be This point release mainly adds corrections for security issues,Īlong with a few adjustments for serious problems. Oldstable distribution Debian 10 (codename buster). The Debian project is pleased to announce the thirteenth (and final) update of its
0 Comments
Leave a Reply. |