------------------------------------------------------------------------ The Debian Project https://www.debian.org/ Updated Debian 11: 11.6 released press@debian.org December 17th, 2022 https://www.debian.org/News/2022/20221217 ------------------------------------------------------------------------ The Debian project is pleased to announce the sixth update of its stable distribution Debian 11 (codename "bullseye"). This point release mainly adds corrections for security issues, along with a few adjustments for serious problems. Security advisories have already been published separately and are referenced where available. Please note that the point release does not constitute a new version of Debian 11 but only updates some of the packages included. There is no need to throw away old "bullseye" media. After installation, packages can be upgraded to the current versions using an up-to-date Debian mirror. Those who frequently install updates from security.debian.org won't have to update many packages, and most such updates are included in the point release. New installation images will be available soon at the regular locations. Upgrading an existing installation to this revision can be achieved by pointing the package management system at one of Debian's many HTTP mirrors. A comprehensive list of mirrors is available at: https://www.debian.org/mirror/list Miscellaneous Bugfixes ---------------------- This stable update adds a few important corrections to the following packages: +-------------------------+-------------------------------------------+ | Package | Reason | +-------------------------+-------------------------------------------+ | awstats [1] | Fix cross site scripting issue [CVE-2022- | | | 46391] | | | | | base-files [2] | Update /etc/debian_version for the 11.6 | | | point release | | | | | binfmt-support [3] | Run binfmt-support.service after systemd- | | | binfmt.service | | | | | clickhouse [4] | Fix out-of-bounds read issues [CVE-2021- | | | 42387 CVE-2021-42388], buffer overflow | | | issues [CVE-2021-43304 CVE-2021-43305] | | | | | containerd [5] | CRI plugin: Fix goroutine leak during | | | Exec [CVE-2022-23471] | | | | | core-async-clojure [6] | Fix build failures in test suite | | | | | dcfldd [7] | Fix SHA1 output on big-endian | | | architectures | | | | | debian-installer [8] | Rebuild against proposed-updates; | | | increase Linux kernel ABI to 5.10.0-20 | | | | | debian-installer- | Rebuild against proposed-updates | | netboot-images [9] | | | | | | debmirror [10] | Add non-free-firmware to the default | | | section list | | | | | distro-info-data [11] | Add Ubuntu 23.04, Lunar Lobster; update | | | Debian ELTS end dates; correct Debian 8 | | | (jessie) release date | | | | | dojo [12] | Fix prototype pollution issue [CVE-2021- | | | 23450] | | | | | dovecot-fts-xapian [13] | Generate dependency on dovecot ABI | | | version in use during build | | | | | efitools [14] | Fix intermittent build failure due to | | | incorrect dependency in makefile | | | | | evolution [15] | Move Google Contacts addressbooks to | | | CalDAV since the Google Contacts API has | | | been turned off | | | | | evolution-data- | Move Google Contacts addressbooks to | | server [16] | CalDAV since the Google Contacts API has | | | been turned off; fix compatibility with | | | Gmail OAuth changes | | | | | evolution-ews [17] | Fix retrieval of user certificates | | | belonging to contacts | | | | | g810-led [18] | Control device access with uaccess | | | instead of making everything world- | | | writable [CVE-2022-46338] | | | | | glibc [19] | Fix regression in wmemchr and wcslen on | | | CPUs that have AVX2 but not BMI2 (e.g. | | | Intel Haswell) | | | | | golang-github-go-chef- | Fix intermittent test failure | | chef [20] | | | | | | grub-efi-amd64- | Don't strip Xen binaries, so they work | | signed [21] | again; include fonts in the memdisk build | | | for EFI images; fix bug in core file code | | | so errors are handled better; bump Debian | | | SBAT level to 4 | | | | | grub-efi-arm64- | Don't strip Xen binaries, so they work | | signed [22] | again; include fonts in the memdisk build | | | for EFI images; fix bug in core file code | | | so errors are handled better; bump Debian | | | SBAT level to 4 | | | | | grub-efi-ia32- | Don't strip Xen binaries, so they work | | signed [23] | again; include fonts in the memdisk build | | | for EFI images; fix bug in core file code | | | so errors are handled better; bump Debian | | | SBAT level to 4 | | | | | grub2 [24] | Don't strip Xen binaries, so they work | | | again; include fonts in the memdisk build | | | for EFI images; fix bug in core file code | | | so errors are handled better; bump Debian | | | SBAT level to 4 | | | | | hydrapaper [25] | Add missing dependeny on python3-pil | | | | | isoquery [26] | Fix test failure caused by a French | | | translation change in the iso-codes | | | package | | | | | jtreg6 [27] | New package, required to build newer | | | openjdk-11 versions | | | | | lemonldap-ng [28] | Improve session destroy propagation | | | [CVE-2022-37186] | | | | | leptonlib [29] | Fix divide-by-zero [CVE-2022-38266] | | | | | libapache2-mod-auth- | Fix open redirect issue [CVE-2021-3639] | | mellon [30] | | | | | | libbluray [31] | Fix BD-J support with recent Oracle Java | | | updates | | | | | libconfuse [32] | Fix a heap-based buffer over-read in | | | cfg_tilde_expand [CVE-2022-40320] | | | | | libdatetime-timezone- | Update included data | | perl [33] | | | | | | libtasn1-6 [34] | Fix out-of-bounds read issue [CVE-2021- | | | 46848] | | | | | libvncserver [35] | Fix memory leak [CVE-2020-29260]; support | | | larger screen sizes | | | | | linux [36] | New upstream stable release; increase ABI | | | to 20; [rt] Update to 5.10.158-rt77 | | | | | linux-signed-amd64 [37] | New upstream stable release; increase ABI | | | to 20; [rt] Update to 5.10.158-rt77 | | | | | linux-signed-arm64 [38] | New upstream stable release; increase ABI | | | to 20; [rt] Update to 5.10.158-rt77 | | | | | linux-signed-i386 [39] | New upstream stable release; increase ABI | | | to 20; [rt] Update to 5.10.158-rt77 | | | | | mariadb-10.5 [40] | New upstream stable release; security | | | fixes [CVE-2018-25032 CVE-2021-46669 | | | CVE-2022-27376 CVE-2022-27377 CVE-2022- | | | 27378 CVE-2022-27379 CVE-2022-27380 | | | CVE-2022-27381 CVE-2022-27382 CVE-2022- | | | 27383 CVE-2022-27384 CVE-2022-27386 | | | CVE-2022-27387 CVE-2022-27444 CVE-2022- | | | 27445 CVE-2022-27446 CVE-2022-27447 | | | CVE-2022-27448 CVE-2022-27449 CVE-2022- | | | 27451 CVE-2022-27452 CVE-2022-27455 | | | CVE-2022-27456 CVE-2022-27457 CVE-2022- | | | 27458 CVE-2022-32081 CVE-2022-32082 | | | CVE-2022-32083 CVE-2022-32084 CVE-2022- | | | 32085 CVE-2022-32086 CVE-2022-32087 | | | CVE-2022-32088 CVE-2022-32089 CVE-2022- | | | 32091] | | | | | mod-wsgi [41] | Drop X-Client-IP header when it is not a | | | trusted header [CVE-2022-2255] | | | | | mplayer [42] | Fix several security issues [CVE-2022- | | | 38850 CVE-2022-38851 CVE-2022-38855 | | | CVE-2022-38858 CVE-2022-38860 CVE-2022- | | | 38861 CVE-2022-38863 CVE-2022-38864 | | | CVE-2022-38865 CVE-2022-38866] | | | | | mutt [43] | Fix gpgme crash when listing keys in a | | | public key block, and public key block | | | listing for old versions of gpgme | | | | | nano [44] | Fix crashes and a potential data loss | | | issue | | | | | nftables [45] | Fix off-by-one / double free error | | | | | node-hawk [46] | Parse URLs using stdlib [CVE-2022-29167] | | | | | node-loader-utils [47] | Fix prototype pollution issue [CVE-2022- | | | 37599 CVE-2022-37601], regular | | | expression-based denial of service issue | | | [CVE-2022-37603] | | | | | node-minimatch [48] | Improve protection against regular | | | expression-based denial of service | | | [CVE-2022-3517]; fix regression in patch | | | for CVE-2022-3517 | | | | | node-qs [49] | Fix prototype pollution issue [CVE-2022- | | | 24999] | | | | | node-xmldom [50] | Fix prototype pollution issue [CVE-2022- | | | 37616]; prevent insertion of non-well- | | | formed nodes [CVE-2022-39353] | | | | | nvidia-graphics- | New upstream release; security fixes | | drivers [51] | [CVE-2022-34670 CVE-2022-34674 CVE-2022- | | | 34675 CVE-2022-34677 CVE-2022-34679 | | | CVE-2022-34680 CVE-2022-34682 CVE-2022- | | | 42254 CVE-2022-42255 CVE-2022-42256 | | | CVE-2022-42257 CVE-2022-42258 CVE-2022- | | | 42259 CVE-2022-42260 CVE-2022-42261 | | | CVE-2022-42262 CVE-2022-42263 CVE-2022- | | | 42264] | | | | | nvidia-graphics- | New upstream release; security fixes | | drivers- | [CVE-2022-34670 CVE-2022-34674 CVE-2022- | | legacy-390xx [52] | 34675 CVE-2022-34677 CVE-2022-34680 | | | CVE-2022-42257 CVE-2022-42258 CVE-2022- | | | 42259] | | | | | nvidia-graphics- | New upstream release; security fixes | | drivers-tesla-450 [53] | [CVE-2022-34670 CVE-2022-34674 CVE-2022- | | | 34675 CVE-2022-34677 CVE-2022-34679 | | | CVE-2022-34680 CVE-2022-34682 CVE-2022- | | | 42254 CVE-2022-42256 CVE-2022-42257 | | | CVE-2022-42258 CVE-2022-42259 CVE-2022- | | | 42260 CVE-2022-42261 CVE-2022-42262 | | | CVE-2022-42263 CVE-2022-42264] | | | | | nvidia-graphics- | New upstream release; security fixes | | drivers-tesla-470 [54] | [CVE-2022-34670 CVE-2022-34674 CVE-2022- | | | 34675 CVE-2022-34677 CVE-2022-34679 | | | CVE-2022-34680 CVE-2022-34682 CVE-2022- | | | 42254 CVE-2022-42255 CVE-2022-42256 | | | CVE-2022-42257 CVE-2022-42258 CVE-2022- | | | 42259 CVE-2022-42260 CVE-2022-42261 | | | CVE-2022-42262 CVE-2022-42263 CVE-2022- | | | 42264] | | | | | omnievents [55] | Add missing dependency on libjs-jquery to | | | the omnievents-doc package | | | | | onionshare [56] | Fix denial of service issue [CVE-2022- | | | 21689], HTML injection issue [CVE-2022- | | | 21690] | | | | | openvpn-auth- | Support verify-client-cert directive | | radius [57] | | | | | | postfix [58] | New upstream stable release | | | | | postgresql-13 [59] | New upstream stable release | | | | | powerline- | Fix command injection via malicious | | gitstatus [60] | repository config [CVE-2022-42906] | | | | | pysubnettree [61] | Fix module build | | | | | speech-dispatcher [62] | Reduce espeak buffer size to avoid synth | | | artifacts | | | | | spf-engine [63] | Fix pyspf-milter failing to start due to | | | an invalid import statement | | | | | tinyexr [64] | Fix heap overflow issues [CVE-2022-34300 | | | CVE-2022-38529] | | | | | tinyxml [65] | Fix infinite loop [CVE-2021-42260] | | | | | tzdata [66] | Update data for Fiji, Mexico and | | | Palestine; update leap seconds list | | | | | virglrenderer [67] | Fix out-of-bounds write issue [CVE-2022- | | | 0135] | | | | | x2gothinclient [68] | Make the x2gothinclient-minidesktop | | | package provide the lightdm-greeter | | | virtual package | | | | | xfig [69] | Fix buffer overflow issue [CVE-2021- | | | 40241] | | | | +-------------------------+-------------------------------------------+ 1: https://packages.debian.org/src:awstats 2: https://packages.debian.org/src:base-files 3: https://packages.debian.org/src:binfmt-support 4: https://packages.debian.org/src:clickhouse 5: https://packages.debian.org/src:containerd 6: https://packages.debian.org/src:core-async-clojure 7: https://packages.debian.org/src:dcfldd 8: https://packages.debian.org/src:debian-installer 9: https://packages.debian.org/src:debian-installer-netboot-images 10: https://packages.debian.org/src:debmirror 11: https://packages.debian.org/src:distro-info-data 12: https://packages.debian.org/src:dojo 13: https://packages.debian.org/src:dovecot-fts-xapian 14: https://packages.debian.org/src:efitools 15: https://packages.debian.org/src:evolution 16: https://packages.debian.org/src:evolution-data-server 17: https://packages.debian.org/src:evolution-ews 18: https://packages.debian.org/src:g810-led 19: https://packages.debian.org/src:glibc 20: https://packages.debian.org/src:golang-github-go-chef-chef 21: https://packages.debian.org/src:grub-efi-amd64-signed 22: https://packages.debian.org/src:grub-efi-arm64-signed 23: https://packages.debian.org/src:grub-efi-ia32-signed 24: https://packages.debian.org/src:grub2 25: https://packages.debian.org/src:hydrapaper 26: https://packages.debian.org/src:isoquery 27: https://packages.debian.org/src:jtreg6 28: https://packages.debian.org/src:lemonldap-ng 29: https://packages.debian.org/src:leptonlib 30: https://packages.debian.org/src:libapache2-mod-auth-mellon 31: https://packages.debian.org/src:libbluray 32: https://packages.debian.org/src:libconfuse 33: https://packages.debian.org/src:libdatetime-timezone-perl 34: https://packages.debian.org/src:libtasn1-6 35: https://packages.debian.org/src:libvncserver 36: https://packages.debian.org/src:linux 37: https://packages.debian.org/src:linux-signed-amd64 38: https://packages.debian.org/src:linux-signed-arm64 39: https://packages.debian.org/src:linux-signed-i386 40: https://packages.debian.org/src:mariadb-10.5 41: https://packages.debian.org/src:mod-wsgi 42: https://packages.debian.org/src:mplayer 43: https://packages.debian.org/src:mutt 44: https://packages.debian.org/src:nano 45: https://packages.debian.org/src:nftables 46: https://packages.debian.org/src:node-hawk 47: https://packages.debian.org/src:node-loader-utils 48: https://packages.debian.org/src:node-minimatch 49: https://packages.debian.org/src:node-qs 50: https://packages.debian.org/src:node-xmldom 51: https://packages.debian.org/src:nvidia-graphics-drivers 52: https://packages.debian.org/src:nvidia-graphics-drivers-legacy-390xx 53: https://packages.debian.org/src:nvidia-graphics-drivers-tesla-450 54: https://packages.debian.org/src:nvidia-graphics-drivers-tesla-470 55: https://packages.debian.org/src:omnievents 56: https://packages.debian.org/src:onionshare 57: https://packages.debian.org/src:openvpn-auth-radius 58: https://packages.debian.org/src:postfix 59: https://packages.debian.org/src:postgresql-13 60: https://packages.debian.org/src:powerline-gitstatus 61: https://packages.debian.org/src:pysubnettree 62: https://packages.debian.org/src:speech-dispatcher 63: https://packages.debian.org/src:spf-engine 64: https://packages.debian.org/src:tinyexr 65: https://packages.debian.org/src:tinyxml 66: https://packages.debian.org/src:tzdata 67: https://packages.debian.org/src:virglrenderer 68: https://packages.debian.org/src:x2gothinclient 69: https://packages.debian.org/src:xfig Security Updates ---------------- This revision adds the following security updates to the stable release. The Security Team has already released an advisory for each of these updates: +----------------+------------------------------+ | Advisory ID | Package | +----------------+------------------------------+ | DSA-5212 [70] | chromium [71] | | | | | DSA-5223 [72] | chromium [73] | | | | | DSA-5224 [74] | poppler [75] | | | | | DSA-5225 [76] | chromium [77] | | | | | DSA-5226 [78] | pcs [79] | | | | | DSA-5227 [80] | libgoogle-gson-java [81] | | | | | DSA-5228 [82] | gdk-pixbuf [83] | | | | | DSA-5229 [84] | freecad [85] | | | | | DSA-5230 [86] | chromium [87] | | | | | DSA-5231 [88] | connman [89] | | | | | DSA-5232 [90] | tinygltf [91] | | | | | DSA-5233 [92] | e17 [93] | | | | | DSA-5234 [94] | fish [95] | | | | | DSA-5235 [96] | bind9 [97] | | | | | DSA-5236 [98] | expat [99] | | | | | DSA-5239 [100] | gdal [101] | | | | | DSA-5240 [102] | webkit2gtk [103] | | | | | DSA-5241 [104] | wpewebkit [105] | | | | | DSA-5242 [106] | maven-shared-utils [107] | | | | | DSA-5243 [108] | lighttpd [109] | | | | | DSA-5244 [110] | chromium [111] | | | | | DSA-5245 [112] | chromium [113] | | | | | DSA-5246 [114] | mediawiki [115] | | | | | DSA-5247 [116] | barbican [117] | | | | | DSA-5248 [118] | php-twig [119] | | | | | DSA-5249 [120] | strongswan [121] | | | | | DSA-5250 [122] | dbus [123] | | | | | DSA-5251 [124] | isc-dhcp [125] | | | | | DSA-5252 [126] | libreoffice [127] | | | | | DSA-5253 [128] | chromium [129] | | | | | DSA-5254 [130] | python-django [131] | | | | | DSA-5255 [132] | libksba [133] | | | | | DSA-5256 [134] | bcel [135] | | | | | DSA-5257 [136] | linux-signed-arm64 [137] | | | | | DSA-5257 [138] | linux-signed-amd64 [139] | | | | | DSA-5257 [140] | linux-signed-i386 [141] | | | | | DSA-5257 [142] | linux [143] | | | | | DSA-5258 [144] | squid [145] | | | | | DSA-5260 [146] | lava [147] | | | | | DSA-5261 [148] | chromium [149] | | | | | DSA-5263 [150] | chromium [151] | | | | | DSA-5264 [152] | batik [153] | | | | | DSA-5265 [154] | tomcat9 [155] | | | | | DSA-5266 [156] | expat [157] | | | | | DSA-5267 [158] | pysha3 [159] | | | | | DSA-5268 [160] | ffmpeg [161] | | | | | DSA-5269 [162] | pypy3 [163] | | | | | DSA-5270 [164] | ntfs-3g [165] | | | | | DSA-5271 [166] | libxml2 [167] | | | | | DSA-5272 [168] | xen [169] | | | | | DSA-5273 [170] | webkit2gtk [171] | | | | | DSA-5274 [172] | wpewebkit [173] | | | | | DSA-5275 [174] | chromium [175] | | | | | DSA-5276 [176] | pixman [177] | | | | | DSA-5277 [178] | php7.4 [179] | | | | | DSA-5278 [180] | xorg-server [181] | | | | | DSA-5279 [182] | wordpress [183] | | | | | DSA-5280 [184] | grub-efi-amd64-signed [185] | | | | | DSA-5280 [186] | grub-efi-arm64-signed [187] | | | | | DSA-5280 [188] | grub-efi-ia32-signed [189] | | | | | DSA-5280 [190] | grub2 [191] | | | | | DSA-5281 [192] | nginx [193] | | | | | DSA-5283 [194] | jackson-databind [195] | | | | | DSA-5285 [196] | asterisk [197] | | | | | DSA-5286 [198] | krb5 [199] | | | | | DSA-5287 [200] | heimdal [201] | | | | | DSA-5288 [202] | graphicsmagick [203] | | | | | DSA-5289 [204] | chromium [205] | | | | | DSA-5290 [206] | commons-configuration2 [207] | | | | | DSA-5291 [208] | mujs [209] | | | | | DSA-5292 [210] | snapd [211] | | | | | DSA-5293 [212] | chromium [213] | | | | | DSA-5294 [214] | jhead [215] | | | | | DSA-5295 [216] | chromium [217] | | | | | DSA-5296 [218] | xfce4-settings [219] | | | | | DSA-5297 [220] | vlc [221] | | | | | DSA-5298 [222] | cacti [223] | | | | | DSA-5299 [224] | openexr [225] | | | | +----------------+------------------------------+ 70: https://www.debian.org/security/2022/dsa-5212 71: https://packages.debian.org/src:chromium 72: https://www.debian.org/security/2022/dsa-5223 73: https://packages.debian.org/src:chromium 74: https://www.debian.org/security/2022/dsa-5224 75: https://packages.debian.org/src:poppler 76: https://www.debian.org/security/2022/dsa-5225 77: https://packages.debian.org/src:chromium 78: https://www.debian.org/security/2022/dsa-5226 79: https://packages.debian.org/src:pcs 80: https://www.debian.org/security/2022/dsa-5227 81: https://packages.debian.org/src:libgoogle-gson-java 82: https://www.debian.org/security/2022/dsa-5228 83: https://packages.debian.org/src:gdk-pixbuf 84: https://www.debian.org/security/2022/dsa-5229 85: https://packages.debian.org/src:freecad 86: https://www.debian.org/security/2022/dsa-5230 87: https://packages.debian.org/src:chromium 88: https://www.debian.org/security/2022/dsa-5231 89: https://packages.debian.org/src:connman 90: https://www.debian.org/security/2022/dsa-5232 91: https://packages.debian.org/src:tinygltf 92: https://www.debian.org/security/2022/dsa-5233 93: https://packages.debian.org/src:e17 94: https://www.debian.org/security/2022/dsa-5234 95: https://packages.debian.org/src:fish 96: https://www.debian.org/security/2022/dsa-5235 97: https://packages.debian.org/src:bind9 98: https://www.debian.org/security/2022/dsa-5236 99: https://packages.debian.org/src:expat 100: https://www.debian.org/security/2022/dsa-5239 101: https://packages.debian.org/src:gdal 102: https://www.debian.org/security/2022/dsa-5240 103: https://packages.debian.org/src:webkit2gtk 104: https://www.debian.org/security/2022/dsa-5241 105: https://packages.debian.org/src:wpewebkit 106: https://www.debian.org/security/2022/dsa-5242 107: https://packages.debian.org/src:maven-shared-utils 108: https://www.debian.org/security/2022/dsa-5243 109: https://packages.debian.org/src:lighttpd 110: https://www.debian.org/security/2022/dsa-5244 111: https://packages.debian.org/src:chromium 112: https://www.debian.org/security/2022/dsa-5245 113: https://packages.debian.org/src:chromium 114: https://www.debian.org/security/2022/dsa-5246 115: https://packages.debian.org/src:mediawiki 116: https://www.debian.org/security/2022/dsa-5247 117: https://packages.debian.org/src:barbican 118: https://www.debian.org/security/2022/dsa-5248 119: https://packages.debian.org/src:php-twig 120: https://www.debian.org/security/2022/dsa-5249 121: https://packages.debian.org/src:strongswan 122: https://www.debian.org/security/2022/dsa-5250 123: https://packages.debian.org/src:dbus 124: https://www.debian.org/security/2022/dsa-5251 125: https://packages.debian.org/src:isc-dhcp 126: https://www.debian.org/security/2022/dsa-5252 127: https://packages.debian.org/src:libreoffice 128: https://www.debian.org/security/2022/dsa-5253 129: https://packages.debian.org/src:chromium 130: https://www.debian.org/security/2022/dsa-5254 131: https://packages.debian.org/src:python-django 132: https://www.debian.org/security/2022/dsa-5255 133: https://packages.debian.org/src:libksba 134: https://www.debian.org/security/2022/dsa-5256 135: https://packages.debian.org/src:bcel 136: https://www.debian.org/security/2022/dsa-5257 137: https://packages.debian.org/src:linux-signed-arm64 138: https://www.debian.org/security/2022/dsa-5257 139: https://packages.debian.org/src:linux-signed-amd64 140: https://www.debian.org/security/2022/dsa-5257 141: https://packages.debian.org/src:linux-signed-i386 142: https://www.debian.org/security/2022/dsa-5257 143: https://packages.debian.org/src:linux 144: https://www.debian.org/security/2022/dsa-5258 145: https://packages.debian.org/src:squid 146: https://www.debian.org/security/2022/dsa-5260 147: https://packages.debian.org/src:lava 148: https://www.debian.org/security/2022/dsa-5261 149: https://packages.debian.org/src:chromium 150: https://www.debian.org/security/2022/dsa-5263 151: https://packages.debian.org/src:chromium 152: https://www.debian.org/security/2022/dsa-5264 153: https://packages.debian.org/src:batik 154: https://www.debian.org/security/2022/dsa-5265 155: https://packages.debian.org/src:tomcat9 156: https://www.debian.org/security/2022/dsa-5266 157: https://packages.debian.org/src:expat 158: https://www.debian.org/security/2022/dsa-5267 159: https://packages.debian.org/src:pysha3 160: https://www.debian.org/security/2022/dsa-5268 161: https://packages.debian.org/src:ffmpeg 162: https://www.debian.org/security/2022/dsa-5269 163: https://packages.debian.org/src:pypy3 164: https://www.debian.org/security/2022/dsa-5270 165: https://packages.debian.org/src:ntfs-3g 166: https://www.debian.org/security/2022/dsa-5271 167: https://packages.debian.org/src:libxml2 168: https://www.debian.org/security/2022/dsa-5272 169: https://packages.debian.org/src:xen 170: https://www.debian.org/security/2022/dsa-5273 171: https://packages.debian.org/src:webkit2gtk 172: https://www.debian.org/security/2022/dsa-5274 173: https://packages.debian.org/src:wpewebkit 174: https://www.debian.org/security/2022/dsa-5275 175: https://packages.debian.org/src:chromium 176: https://www.debian.org/security/2022/dsa-5276 177: https://packages.debian.org/src:pixman 178: https://www.debian.org/security/2022/dsa-5277 179: https://packages.debian.org/src:php7.4 180: https://www.debian.org/security/2022/dsa-5278 181: https://packages.debian.org/src:xorg-server 182: https://www.debian.org/security/2022/dsa-5279 183: https://packages.debian.org/src:wordpress 184: https://www.debian.org/security/2022/dsa-5280 185: https://packages.debian.org/src:grub-efi-amd64-signed 186: https://www.debian.org/security/2022/dsa-5280 187: https://packages.debian.org/src:grub-efi-arm64-signed 188: https://www.debian.org/security/2022/dsa-5280 189: https://packages.debian.org/src:grub-efi-ia32-signed 190: https://www.debian.org/security/2022/dsa-5280 191: https://packages.debian.org/src:grub2 192: https://www.debian.org/security/2022/dsa-5281 193: https://packages.debian.org/src:nginx 194: https://www.debian.org/security/2022/dsa-5283 195: https://packages.debian.org/src:jackson-databind 196: https://www.debian.org/security/2022/dsa-5285 197: https://packages.debian.org/src:asterisk 198: https://www.debian.org/security/2022/dsa-5286 199: https://packages.debian.org/src:krb5 200: https://www.debian.org/security/2022/dsa-5287 201: https://packages.debian.org/src:heimdal 202: https://www.debian.org/security/2022/dsa-5288 203: https://packages.debian.org/src:graphicsmagick 204: https://www.debian.org/security/2022/dsa-5289 205: https://packages.debian.org/src:chromium 206: https://www.debian.org/security/2022/dsa-5290 207: https://packages.debian.org/src:commons-configuration2 208: https://www.debian.org/security/2022/dsa-5291 209: https://packages.debian.org/src:mujs 210: https://www.debian.org/security/2022/dsa-5292 211: https://packages.debian.org/src:snapd 212: https://www.debian.org/security/2022/dsa-5293 213: https://packages.debian.org/src:chromium 214: https://www.debian.org/security/2022/dsa-5294 215: https://packages.debian.org/src:jhead 216: https://www.debian.org/security/2022/dsa-5295 217: https://packages.debian.org/src:chromium 218: https://www.debian.org/security/2022/dsa-5296 219: https://packages.debian.org/src:xfce4-settings 220: https://www.debian.org/security/2022/dsa-5297 221: https://packages.debian.org/src:vlc 222: https://www.debian.org/security/2022/dsa-5298 223: https://packages.debian.org/src:cacti 224: https://www.debian.org/security/2022/dsa-5299 225: https://packages.debian.org/src:openexr Debian Installer ---------------- The installer has been updated to include the fixes incorporated into stable by the point release. URLs ---- The complete lists of packages that have changed with this revision: https://deb.debian.org/debian/dists/bullseye/ChangeLog The current stable distribution: https://deb.debian.org/debian/dists/stable/ Proposed updates to the stable distribution: https://deb.debian.org/debian/dists/proposed-updates stable distribution information (release notes, errata etc.): https://www.debian.org/releases/stable/ Security announcements and information: https://www.debian.org/security/ About Debian ------------ The Debian Project is an association of Free Software developers who volunteer their time and effort in order to produce the completely free operating system Debian. Contact Information ------------------- For further information, please visit the Debian web pages at https://www.debian.org/, send mail to <press@debian.org>, or contact the stable release team at <debian-release@lists.debian.org>.
Attachment:
OpenPGP_signature
Description: OpenPGP digital signature