Google Groups no longer supports new Usenet posts or subscriptions. Historical content remains viewable.
Dismiss

Updated Debian 10: 10.12 released

1 view
Skip to first unread message

Laura Arjona Reina

unread,
Mar 26, 2022, 1:30:03ā€ÆPM3/26/22
to
------------------------------------------------------------------------
The Debian Project https://www.debian.org/
Updated Debian 10: 10.12 released pr...@debian.org
March 26th, 2022 https://www.debian.org/News/2022/2022032602
------------------------------------------------------------------------


The Debian project is pleased to announce the twelfth update of its
oldstable distribution Debian 10 (codename "buster"). This point release
mainly adds corrections for security issues, along with a few
adjustments for serious problems. Security advisories have already been
published separately and are referenced where available.

Please note that the point release does not constitute a new version of
Debian 10 but only updates some of the packages included. There is no
need to throw away old "buster" media. After installation, packages can
be upgraded to the current versions using an up-to-date Debian mirror.

Those who frequently install updates from security.debian.org won't have
to update many packages, and most such updates are included in the point
release.

New installation images will be available soon at the regular locations.

Upgrading an existing installation to this revision can be achieved by
pointing the package management system at one of Debian's many HTTP
mirrors. A comprehensive list of mirrors is available at:

https://www.debian.org/mirror/list



OpenSSL signature algorithm check tightening
--------------------------------------------

The OpenSSL update provided in this point release includes a change to
ensure that the requested signature algorithm is supported by the active
security level.

Although this will not affect most use-cases, it could lead to error
messages being generated if a non-supported algorithm is requested - for
example, use of RSA+SHA1 signatures with the default security level of
2.

In such cases, the security level will need to be explicitly lowered,
either for individual requests or more globally. This may require
changes to the configuration of applications. For OpenSSL itself, per-
request lowering can be achieved using a command-line option such as:

-cipher "ALL:@SECLEVEL=1"

with the relevant system-level configuration being found in /etc/ssl/
openssl.cnf


Miscellaneous Bugfixes
----------------------

This oldstable update adds a few important corrections to the following
packages:

+--------------------------+------------------------------------------+
| Package | Reason |
+--------------------------+------------------------------------------+
| apache-log4j1.2Ā [1] | Resolve security issues [CVE-2021-4104 |
| | CVE-2022-23302 CVE-2022-23305 CVE-2022- |
| | 23307], by removing support for the |
| | JMSSink, JDBCAppender, JMSAppender and |
| | Apache Chainsaw modules |
| | |
| apache-log4j2Ā [2] | Fix remote code execution issue |
| | [CVE-2021-44832] |
| | |
| atftpĀ [3] | Fix information leak issue [CVE-2021- |
| | 46671] |
| | |
| base-filesĀ [4] | Update for the 10.12 point release |
| | |
| beadsĀ [5] | Rebuild against updated cimg to fix |
| | multiple heap buffer overflows |
| | [CVE-2020-25693] |
| | |
| btrbkĀ [6] | Fix regression in the update for |
| | CVE-2021-38173 |
| | |
| cargo-mozillaĀ [7] | New package, backported from Debian 11, |
| | to help build new rust versions |
| | |
| chronyĀ [8] | Allow reading the chronyd configuration |
| | file that timemaster(8) generates |
| | |
| cimgĀ [9] | Fix heap buffer overflow issues |
| | [CVE-2020-25693] |
| | |
| clamavĀ [10] | New upstream stable release; fix denial |
| | of service issue [CVE-2022-20698] |
| | |
| cupsĀ [11] | Fix "an input validation issue might |
| | allow a malicious application to read |
| | restricted memory" [CVE-2020-10001] |
| | |
| debian-installerĀ [12] | Rebuild against oldstable-proposed- |
| | updates; update kernel ABI to -20 |
| | |
| debian-installer- | Rebuild against oldstable-proposed- |
| netboot-imagesĀ [13] | updates |
| | |
| detoxĀ [14] | Fix processing of large files on ARM |
| | architectures |
| | |
| evolution-data- | Fix crash on malformed server reponse |
| serverĀ [15] | [CVE-2020-16117] |
| | |
| flacĀ [16] | Fix out of bounds read issue [CVE-2020- |
| | 0499] |
| | |
| gerbvĀ [17] | Fix code execution issue [CVE-2021- |
| | 40391] |
| | |
| glibcĀ [18] | Import several fixes from upstream's |
| | stable branch; simplify the check for |
| | supported kernel versions, as 2.x |
| | kernels are no longer supported; support |
| | installation on kernels with a release |
| | number greater than 255 |
| | |
| gmpĀ [19] | Fix integer and buffer overflow issue |
| | [CVE-2021-43618] |
| | |
| graphicsmagickĀ [20] | Fix buffer overflow issue [CVE-2020- |
| | 12672] |
| | |
| htmldocĀ [21] | Fix out-of-bounds read issue [CVE-2022- |
| | 0534], buffer overflow issues [CVE-2021- |
| | 43579 CVE-2021-40985] |
| | |
| http-parserĀ [22] | Resolve inadvertent ABI break |
| | |
| icuĀ [23] | Fix "pkgdata" utility |
| | |
| intel-microcodeĀ [24] | Update included microcode; mitigate some |
| | security issues [CVE-2020-8694 CVE-2020- |
| | 8695 CVE-2021-0127 CVE-2021-0145 |
| | CVE-2021-0146 CVE-2021-33120] |
| | |
| jbig2decĀ [25] | Fix buffer overflow issue [CVE-2020- |
| | 12268] |
| | |
| jtharnessĀ [26] | New upstream version to support builds |
| | of newer OpenJDK-11 versions |
| | |
| jtregĀ [27] | New upstream version to support builds |
| | of newer OpenJDK-11 versions |
| | |
| lemonldap-ngĀ [28] | Fix auth process in password-testing |
| | plugins [CVE-2021-20874]; add recommends |
| | on gsfonts, fixing captcha |
| | |
| leptonlibĀ [29] | Fix denial of service issue [CVE-2020- |
| | 36277], buffer over-read issues |
| | [CVE-2020-36278 CVE-2020-36279 CVE-2020- |
| | 36280 CVE-2020-36281] |
| | |
| libdatetime-timezone- | Update included data |
| perlĀ [30] | |
| | |
| libencode-perlĀ [31] | Fix a memory leak in Encode.xs |
| | |
| libetpanĀ [32] | Fix STARTTLS response injection issue |
| | [CVE-2020-15953] |
| | |
| libextractorĀ [33] | Fix invalid read issue [CVE-2019-15531] |
| | |
| libjackson-json- | Fix code execution issues [CVE-2017- |
| javaĀ [34] | 15095 CVE-2017-7525], XML external |
| | entity issues [CVE-2019-10172] |
| | |
| libmodbusĀ [35] | Fix out of bound read issues [CVE-2019- |
| | 14462 CVE-2019-14463] |
| | |
| libpcapĀ [36] | Check PHB header length before using it |
| | to allocate memory [CVE-2019-15165] |
| | |
| libsdl1.2Ā [37] | Properly handle input focus events; fix |
| | buffer overflow issues [CVE-2019-13616 |
| | CVE-2019-7637], buffer over-read issues |
| | [CVE-2019-7572 CVE-2019-7573 CVE-2019- |
| | 7574 CVE-2019-7575 CVE-2019-7576 |
| | CVE-2019-7577 CVE-2019-7578 CVE-2019- |
| | 7635 CVE-2019-7636 CVE-2019-7638] |
| | |
| libxml2Ā [38] | Fix use-after-free issue [CVE-2022- |
| | 23308] |
| | |
| linuxĀ [39] | New upstream stable release; [rt] Update |
| | to 4.19.233-rt105; increase ABI to 20 |
| | |
| linux-latestĀ [40] | Update to 4.19.0-20 ABI |
| | |
| linux-signed-amd64Ā [41] | New upstream stable release; [rt] Update |
| | to 4.19.233-rt105; increase ABI to 20 |
| | |
| linux-signed-arm64Ā [42] | New upstream stable release; [rt] Update |
| | to 4.19.233-rt105; increase ABI to 20 |
| | |
| linux-signed-i386Ā [43] | New upstream stable release; [rt] Update |
| | to 4.19.233-rt105; increase ABI to 20 |
| | |
| llvm-toolchain-11Ā [44] | New package, backported from Debian 11, |
| | to help build new rust versions |
| | |
| lxcfsĀ [45] | Fix misreporting of swap usage |
| | |
| mailmanĀ [46] | Fix cross-site scripting issue |
| | [CVE-2021-43331]; fix "a list moderator |
| | can crack the list admin password |
| | encrypted in a CSRF token" [CVE-2021- |
| | 43332]; fix potential CSRF attack |
| | against a list admin from a list member |
| | or moderator [CVE-2021-44227]; fix |
| | regressions in fixes for CVE-2021-42097 |
| | and CVE-2021-44227 |
| | |
| mariadb-10.3Ā [47] | New upstream stable release; security |
| | fixes [CVE-2021-35604 CVE-2021-46659 |
| | CVE-2021-46661 CVE-2021-46662 CVE-2021- |
| | 46663 CVE-2021-46664 CVE-2021-46665 |
| | CVE-2021-46667 CVE-2021-46668 CVE-2022- |
| | 24048 CVE-2022-24050 CVE-2022-24051 |
| | CVE-2022-24052] |
| | |
| node-getobjectĀ [48] | Fix prototype pollution issue [CVE-2020- |
| | 28282] |
| | |
| openscĀ [49] | Fix out-of-bounds access issues |
| | [CVE-2019-15945 CVE-2019-15946], crash |
| | due to read of unknown memory [CVE-2019- |
| | 19479], double free issue [CVE-2019- |
| | 20792], buffer overflow issues |
| | [CVE-2020-26570 CVE-2020-26571 CVE-2020- |
| | 26572] |
| | |
| openscadĀ [50] | Fix buffer overflows in STL parser |
| | [CVE-2020-28599 CVE-2020-28600] |
| | |
| opensslĀ [51] | New upstream release |
| | |
| php-illuminate- | Fix query binding issue [CVE-2021- |
| databaseĀ [52] | 21263], SQL injection issue when used |
| | with Microsoft SQL Server |
| | |
| phpliteadminĀ [53] | Fix cross-site scripting issue |
| | [CVE-2021-46709] |
| | |
| plibĀ [54] | Fix integer overflow issue [CVE-2021- |
| | 38714] |
| | |
| privoxyĀ [55] | Fix memory leak [CVE-2021-44540] and |
| | cross-site scripting issue [CVE-2021- |
| | 44543] |
| | |
| publicsuffixĀ [56] | Update included data |
| | |
| python-virtualenvĀ [57] | Avoid attempting to install |
| | pkg_resources from PyPI |
| | |
| raptor2Ā [58] | Fix out of bounds array access issue |
| | [CVE-2020-25713] |
| | |
| ros-ros-commĀ [59] | Fix denial of service issue [CVE-2021- |
| | 37146] |
| | |
| rsyslogĀ [60] | Fix heap overflow issues [CVE-2019-17041 |
| | CVE-2019-17042] |
| | |
| ruby-httpclientĀ [61] | Use system certificate store |
| | |
| rust-cbindgenĀ [62] | New upstream stable release to support |
| | builds of newer firefox-esr and |
| | thunderbird versions |
| | |
| rustc-mozillaĀ [63] | New source package to support building |
| | of newer firefox-esr and thunderbird |
| | versions |
| | |
| s390-dasdĀ [64] | Stop passing deprecated -f option to |
| | dasdfmt |
| | |
| spipĀ [65] | Fix cross-site scripting issue |
| | |
| tzdataĀ [66] | Update data for Fiji and Palestine |
| | |
| vimĀ [67] | Fix ability to execute code while in |
| | restricted mode [CVE-2019-20807], buffer |
| | overflow issues [CVE-2021-3770 CVE-2021- |
| | 3778 CVE-2021-3875], use after free |
| | issue [CVE-2021-3796]; remove |
| | accidentally included patch |
| | |
| wavpackĀ [68] | Fix use of uninitialized values |
| | [CVE-2019-1010317 CVE-2019-1010319] |
| | |
| weechatĀ [69] | Fix several denial of service issues |
| | [CVE-2020-8955 CVE-2020-9759 CVE-2020- |
| | 9760 CVE-2021-40516] |
| | |
| wiresharkĀ [70] | Fix several security issues in |
| | dissectors [CVE-2021-22207 CVE-2021- |
| | 22235 CVE-2021-39921 CVE-2021-39922 |
| | CVE-2021-39923 CVE-2021-39924 CVE-2021- |
| | 39928 CVE-2021-39929] |
| | |
| xtermĀ [71] | Fix buffer overflow issue [CVE-2022- |
| | 24130] |
| | |
| zziplibĀ [72] | Fix denial of service issue [CVE-2020- |
| | 18442] |
| | |
+--------------------------+------------------------------------------+

1: https://packages.debian.org/src:apache-log4j1.2
2: https://packages.debian.org/src:apache-log4j2
3: https://packages.debian.org/src:atftp
4: https://packages.debian.org/src:base-files
5: https://packages.debian.org/src:beads
6: https://packages.debian.org/src:btrbk
7: https://packages.debian.org/src:cargo-mozilla
8: https://packages.debian.org/src:chrony
9: https://packages.debian.org/src:cimg
10: https://packages.debian.org/src:clamav
11: https://packages.debian.org/src:cups
12: https://packages.debian.org/src:debian-installer
13: https://packages.debian.org/src:debian-installer-netboot-images
14: https://packages.debian.org/src:detox
15: https://packages.debian.org/src:evolution-data-server
16: https://packages.debian.org/src:flac
17: https://packages.debian.org/src:gerbv
18: https://packages.debian.org/src:glibc
19: https://packages.debian.org/src:gmp
20: https://packages.debian.org/src:graphicsmagick
21: https://packages.debian.org/src:htmldoc
22: https://packages.debian.org/src:http-parser
23: https://packages.debian.org/src:icu
24: https://packages.debian.org/src:intel-microcode
25: https://packages.debian.org/src:jbig2dec
26: https://packages.debian.org/src:jtharness
27: https://packages.debian.org/src:jtreg
28: https://packages.debian.org/src:lemonldap-ng
29: https://packages.debian.org/src:leptonlib
30: https://packages.debian.org/src:libdatetime-timezone-perl
31: https://packages.debian.org/src:libencode-perl
32: https://packages.debian.org/src:libetpan
33: https://packages.debian.org/src:libextractor
34: https://packages.debian.org/src:libjackson-json-java
35: https://packages.debian.org/src:libmodbus
36: https://packages.debian.org/src:libpcap
37: https://packages.debian.org/src:libsdl1.2
38: https://packages.debian.org/src:libxml2
39: https://packages.debian.org/src:linux
40: https://packages.debian.org/src:linux-latest
41: https://packages.debian.org/src:linux-signed-amd64
42: https://packages.debian.org/src:linux-signed-arm64
43: https://packages.debian.org/src:linux-signed-i386
44: https://packages.debian.org/src:llvm-toolchain-11
45: https://packages.debian.org/src:lxcfs
46: https://packages.debian.org/src:mailman
47: https://packages.debian.org/src:mariadb-10.3
48: https://packages.debian.org/src:node-getobject
49: https://packages.debian.org/src:opensc
50: https://packages.debian.org/src:openscad
51: https://packages.debian.org/src:openssl
52: https://packages.debian.org/src:php-illuminate-database
53: https://packages.debian.org/src:phpliteadmin
54: https://packages.debian.org/src:plib
55: https://packages.debian.org/src:privoxy
56: https://packages.debian.org/src:publicsuffix
57: https://packages.debian.org/src:python-virtualenv
58: https://packages.debian.org/src:raptor2
59: https://packages.debian.org/src:ros-ros-comm
60: https://packages.debian.org/src:rsyslog
61: https://packages.debian.org/src:ruby-httpclient
62: https://packages.debian.org/src:rust-cbindgen
63: https://packages.debian.org/src:rustc-mozilla
64: https://packages.debian.org/src:s390-dasd
65: https://packages.debian.org/src:spip
66: https://packages.debian.org/src:tzdata
67: https://packages.debian.org/src:vim
68: https://packages.debian.org/src:wavpack
69: https://packages.debian.org/src:weechat
70: https://packages.debian.org/src:wireshark
71: https://packages.debian.org/src:xterm
72: https://packages.debian.org/src:zziplib

Security Updates
----------------

This revision adds the following security updates to the oldstable
release. The Security Team has already released an advisory for each of
these updates:

+----------------+----------------------------+
| Advisory ID | Package |
+----------------+----------------------------+
| DSA-4513Ā [73] | sambaĀ [74] |
| | |
| DSA-4982Ā [75] | apache2Ā [76] |
| | |
| DSA-4983Ā [77] | neutronĀ [78] |
| | |
| DSA-4985Ā [79] | wordpressĀ [80] |
| | |
| DSA-4986Ā [81] | tomcat9Ā [82] |
| | |
| DSA-4987Ā [83] | squashfs-toolsĀ [84] |
| | |
| DSA-4989Ā [85] | strongswanĀ [86] |
| | |
| DSA-4990Ā [87] | ffmpegĀ [88] |
| | |
| DSA-4991Ā [89] | mailmanĀ [90] |
| | |
| DSA-4993Ā [91] | php7.3Ā [92] |
| | |
| DSA-4994Ā [93] | bind9Ā [94] |
| | |
| DSA-4995Ā [95] | webkit2gtkĀ [96] |
| | |
| DSA-4997Ā [97] | tiffĀ [98] |
| | |
| DSA-5000Ā [99] | openjdk-11Ā [100] |
| | |
| DSA-5001Ā [101] | redisĀ [102] |
| | |
| DSA-5004Ā [103] | libxstream-javaĀ [104] |
| | |
| DSA-5005Ā [105] | ruby-kaminariĀ [106] |
| | |
| DSA-5006Ā [107] | postgresql-11Ā [108] |
| | |
| DSA-5010Ā [109] | libxml-security-javaĀ [110] |
| | |
| DSA-5011Ā [111] | saltĀ [112] |
| | |
| DSA-5013Ā [113] | roundcubeĀ [114] |
| | |
| DSA-5014Ā [115] | icuĀ [116] |
| | |
| DSA-5015Ā [117] | sambaĀ [118] |
| | |
| DSA-5016Ā [119] | nssĀ [120] |
| | |
| DSA-5018Ā [121] | python-babelĀ [122] |
| | |
| DSA-5019Ā [123] | wiresharkĀ [124] |
| | |
| DSA-5020Ā [125] | apache-log4j2Ā [126] |
| | |
| DSA-5021Ā [127] | mediawikiĀ [128] |
| | |
| DSA-5022Ā [129] | apache-log4j2Ā [130] |
| | |
| DSA-5023Ā [131] | modsecurity-apacheĀ [132] |
| | |
| DSA-5024Ā [133] | apache-log4j2Ā [134] |
| | |
| DSA-5027Ā [135] | xorg-serverĀ [136] |
| | |
| DSA-5028Ā [137] | spipĀ [138] |
| | |
| DSA-5029Ā [139] | sogoĀ [140] |
| | |
| DSA-5030Ā [141] | webkit2gtkĀ [142] |
| | |
| DSA-5032Ā [143] | djvulibreĀ [144] |
| | |
| DSA-5035Ā [145] | apache2Ā [146] |
| | |
| DSA-5036Ā [147] | sphinxsearchĀ [148] |
| | |
| DSA-5037Ā [149] | roundcubeĀ [150] |
| | |
| DSA-5038Ā [151] | ghostscriptĀ [152] |
| | |
| DSA-5039Ā [153] | wordpressĀ [154] |
| | |
| DSA-5040Ā [155] | lighttpdĀ [156] |
| | |
| DSA-5043Ā [157] | lxmlĀ [158] |
| | |
| DSA-5047Ā [159] | prosodyĀ [160] |
| | |
| DSA-5051Ā [161] | aideĀ [162] |
| | |
| DSA-5052Ā [163] | usbviewĀ [164] |
| | |
| DSA-5053Ā [165] | pillowĀ [166] |
| | |
| DSA-5056Ā [167] | strongswanĀ [168] |
| | |
| DSA-5057Ā [169] | openjdk-11Ā [170] |
| | |
| DSA-5059Ā [171] | policykit-1Ā [172] |
| | |
| DSA-5060Ā [173] | webkit2gtkĀ [174] |
| | |
| DSA-5062Ā [175] | nssĀ [176] |
| | |
| DSA-5063Ā [177] | uriparserĀ [178] |
| | |
| DSA-5065Ā [179] | ipythonĀ [180] |
| | |
| DSA-5066Ā [181] | ruby2.5Ā [182] |
| | |
| DSA-5071Ā [183] | sambaĀ [184] |
| | |
| DSA-5072Ā [185] | debian-edu-configĀ [186] |
| | |
| DSA-5073Ā [187] | expatĀ [188] |
| | |
| DSA-5075Ā [189] | minetestĀ [190] |
| | |
| DSA-5076Ā [191] | h2databaseĀ [192] |
| | |
| DSA-5078Ā [193] | zshĀ [194] |
| | |
| DSA-5081Ā [195] | redisĀ [196] |
| | |
| DSA-5083Ā [197] | webkit2gtkĀ [198] |
| | |
| DSA-5085Ā [199] | expatĀ [200] |
| | |
| DSA-5087Ā [201] | cyrus-sasl2Ā [202] |
| | |
| DSA-5088Ā [203] | varnishĀ [204] |
| | |
| DSA-5093Ā [205] | spipĀ [206] |
| | |
| DSA-5096Ā [207] | linux-latestĀ [208] |
| | |
| DSA-5096Ā [209] | linux-signed-amd64Ā [210] |
| | |
| DSA-5096Ā [211] | linux-signed-arm64Ā [212] |
| | |
| DSA-5096Ā [213] | linux-signed-i386Ā [214] |
| | |
| DSA-5096Ā [215] | linuxĀ [216] |
| | |
| DSA-5098Ā [217] | tryton-serverĀ [218] |
| | |
| DSA-5099Ā [219] | tryton-proteusĀ [220] |
| | |
| DSA-5100Ā [221] | nbdĀ [222] |
| | |
| DSA-5101Ā [223] | libphp-adodbĀ [224] |
| | |
| DSA-5103Ā [225] | opensslĀ [226] |
| | |
| DSA-5105Ā [227] | bind9Ā [228] |
| | |
+----------------+----------------------------+

73: https://www.debian.org/security/2019/dsa-4513
74: https://packages.debian.org/src:samba
75: https://www.debian.org/security/2021/dsa-4982
76: https://packages.debian.org/src:apache2
77: https://www.debian.org/security/2021/dsa-4983
78: https://packages.debian.org/src:neutron
79: https://www.debian.org/security/2021/dsa-4985
80: https://packages.debian.org/src:wordpress
81: https://www.debian.org/security/2021/dsa-4986
82: https://packages.debian.org/src:tomcat9
83: https://www.debian.org/security/2021/dsa-4987
84: https://packages.debian.org/src:squashfs-tools
85: https://www.debian.org/security/2021/dsa-4989
86: https://packages.debian.org/src:strongswan
87: https://www.debian.org/security/2021/dsa-4990
88: https://packages.debian.org/src:ffmpeg
89: https://www.debian.org/security/2021/dsa-4991
90: https://packages.debian.org/src:mailman
91: https://www.debian.org/security/2021/dsa-4993
92: https://packages.debian.org/src:php7.3
93: https://www.debian.org/security/2021/dsa-4994
94: https://packages.debian.org/src:bind9
95: https://www.debian.org/security/2021/dsa-4995
96: https://packages.debian.org/src:webkit2gtk
97: https://www.debian.org/security/2021/dsa-4997
98: https://packages.debian.org/src:tiff
99: https://www.debian.org/security/2021/dsa-5000
100: https://packages.debian.org/src:openjdk-11
101: https://www.debian.org/security/2021/dsa-5001
102: https://packages.debian.org/src:redis
103: https://www.debian.org/security/2021/dsa-5004
104: https://packages.debian.org/src:libxstream-java
105: https://www.debian.org/security/2021/dsa-5005
106: https://packages.debian.org/src:ruby-kaminari
107: https://www.debian.org/security/2021/dsa-5006
108: https://packages.debian.org/src:postgresql-11
109: https://www.debian.org/security/2021/dsa-5010
110: https://packages.debian.org/src:libxml-security-java
111: https://www.debian.org/security/2021/dsa-5011
112: https://packages.debian.org/src:salt
113: https://www.debian.org/security/2021/dsa-5013
114: https://packages.debian.org/src:roundcube
115: https://www.debian.org/security/2021/dsa-5014
116: https://packages.debian.org/src:icu
117: https://www.debian.org/security/2021/dsa-5015
118: https://packages.debian.org/src:samba
119: https://www.debian.org/security/2021/dsa-5016
120: https://packages.debian.org/src:nss
121: https://www.debian.org/security/2021/dsa-5018
122: https://packages.debian.org/src:python-babel
123: https://www.debian.org/security/2021/dsa-5019
124: https://packages.debian.org/src:wireshark
125: https://www.debian.org/security/2021/dsa-5020
126: https://packages.debian.org/src:apache-log4j2
127: https://www.debian.org/security/2021/dsa-5021
128: https://packages.debian.org/src:mediawiki
129: https://www.debian.org/security/2021/dsa-5022
130: https://packages.debian.org/src:apache-log4j2
131: https://www.debian.org/security/2021/dsa-5023
132: https://packages.debian.org/src:modsecurity-apache
133: https://www.debian.org/security/2021/dsa-5024
134: https://packages.debian.org/src:apache-log4j2
135: https://www.debian.org/security/2021/dsa-5027
136: https://packages.debian.org/src:xorg-server
137: https://www.debian.org/security/2021/dsa-5028
138: https://packages.debian.org/src:spip
139: https://www.debian.org/security/2021/dsa-5029
140: https://packages.debian.org/src:sogo
141: https://www.debian.org/security/2021/dsa-5030
142: https://packages.debian.org/src:webkit2gtk
143: https://www.debian.org/security/2021/dsa-5032
144: https://packages.debian.org/src:djvulibre
145: https://www.debian.org/security/2022/dsa-5035
146: https://packages.debian.org/src:apache2
147: https://www.debian.org/security/2022/dsa-5036
148: https://packages.debian.org/src:sphinxsearch
149: https://www.debian.org/security/2022/dsa-5037
150: https://packages.debian.org/src:roundcube
151: https://www.debian.org/security/2022/dsa-5038
152: https://packages.debian.org/src:ghostscript
153: https://www.debian.org/security/2022/dsa-5039
154: https://packages.debian.org/src:wordpress
155: https://www.debian.org/security/2022/dsa-5040
156: https://packages.debian.org/src:lighttpd
157: https://www.debian.org/security/2022/dsa-5043
158: https://packages.debian.org/src:lxml
159: https://www.debian.org/security/2022/dsa-5047
160: https://packages.debian.org/src:prosody
161: https://www.debian.org/security/2022/dsa-5051
162: https://packages.debian.org/src:aide
163: https://www.debian.org/security/2022/dsa-5052
164: https://packages.debian.org/src:usbview
165: https://www.debian.org/security/2022/dsa-5053
166: https://packages.debian.org/src:pillow
167: https://www.debian.org/security/2022/dsa-5056
168: https://packages.debian.org/src:strongswan
169: https://www.debian.org/security/2022/dsa-5057
170: https://packages.debian.org/src:openjdk-11
171: https://www.debian.org/security/2022/dsa-5059
172: https://packages.debian.org/src:policykit-1
173: https://www.debian.org/security/2022/dsa-5060
174: https://packages.debian.org/src:webkit2gtk
175: https://www.debian.org/security/2022/dsa-5062
176: https://packages.debian.org/src:nss
177: https://www.debian.org/security/2022/dsa-5063
178: https://packages.debian.org/src:uriparser
179: https://www.debian.org/security/2022/dsa-5065
180: https://packages.debian.org/src:ipython
181: https://www.debian.org/security/2022/dsa-5066
182: https://packages.debian.org/src:ruby2.5
183: https://www.debian.org/security/2022/dsa-5071
184: https://packages.debian.org/src:samba
185: https://www.debian.org/security/2022/dsa-5072
186: https://packages.debian.org/src:debian-edu-config
187: https://www.debian.org/security/2022/dsa-5073
188: https://packages.debian.org/src:expat
189: https://www.debian.org/security/2022/dsa-5075
190: https://packages.debian.org/src:minetest
191: https://www.debian.org/security/2022/dsa-5076
192: https://packages.debian.org/src:h2database
193: https://www.debian.org/security/2022/dsa-5078
194: https://packages.debian.org/src:zsh
195: https://www.debian.org/security/2022/dsa-5081
196: https://packages.debian.org/src:redis
197: https://www.debian.org/security/2022/dsa-5083
198: https://packages.debian.org/src:webkit2gtk
199: https://www.debian.org/security/2022/dsa-5085
200: https://packages.debian.org/src:expat
201: https://www.debian.org/security/2022/dsa-5087
202: https://packages.debian.org/src:cyrus-sasl2
203: https://www.debian.org/security/2022/dsa-5088
204: https://packages.debian.org/src:varnish
205: https://www.debian.org/security/2022/dsa-5093
206: https://packages.debian.org/src:spip
207: https://www.debian.org/security/2022/dsa-5096
208: https://packages.debian.org/src:linux-latest
209: https://www.debian.org/security/2022/dsa-5096
210: https://packages.debian.org/src:linux-signed-amd64
211: https://www.debian.org/security/2022/dsa-5096
212: https://packages.debian.org/src:linux-signed-arm64
213: https://www.debian.org/security/2022/dsa-5096
214: https://packages.debian.org/src:linux-signed-i386
215: https://www.debian.org/security/2022/dsa-5096
216: https://packages.debian.org/src:linux
217: https://www.debian.org/security/2022/dsa-5098
218: https://packages.debian.org/src:tryton-server
219: https://www.debian.org/security/2022/dsa-5099
220: https://packages.debian.org/src:tryton-proteus
221: https://www.debian.org/security/2022/dsa-5100
222: https://packages.debian.org/src:nbd
223: https://www.debian.org/security/2022/dsa-5101
224: https://packages.debian.org/src:libphp-adodb
225: https://www.debian.org/security/2022/dsa-5103
226: https://packages.debian.org/src:openssl
227: https://www.debian.org/security/2022/dsa-5105
228: https://packages.debian.org/src:bind9

Removed packages
----------------

The following packages were removed due to circumstances beyond our
control:

+----------------------------+------------------+
| Package | Reason |
+----------------------------+------------------+
| angular-maven-pluginĀ [229] | No longer useful |
| | |
| minify-maven-pluginĀ [230] | No longer useful |
| | |
+----------------------------+------------------+

229: https://packages.debian.org/src:angular-maven-plugin
230: https://packages.debian.org/src:minify-maven-plugin

Debian Installer
----------------

The installer has been updated to include the fixes incorporated into
oldstable by the point release.


URLs
----

The complete lists of packages that have changed with this revision:

https://deb.debian.org/debian/dists/buster/ChangeLog


The current oldstable distribution:

https://deb.debian.org/debian/dists/oldstable/


Proposed updates to the oldstable distribution:

https://deb.debian.org/debian/dists/oldstable-proposed-updates


oldstable distribution information (release notes, errata etc.):

https://www.debian.org/releases/oldstable/


Security announcements and information:

https://www.debian.org/security/



About Debian
------------

The Debian Project is an association of Free Software developers who
volunteer their time and effort in order to produce the completely free
operating system Debian.


Contact Information
-------------------

For further information, please visit the Debian web pages at
https://www.debian.org/, send mail to <pr...@debian.org>, or contact the
stable release team at <debian-...@lists.debian.org>.
0 new messages