[RFR] wml://News/2011/20110625.wml
Salve.
Come da oggetto richiedo la revisione per la News (che trovate in coda)
Per tenere sotto controllo lo stato delle traduzioni, vi ricordo che
potete consultare [1], appena churro ritorna in piedi ;)
Grazie in anticipo.
Mandi.
Mirco aka scottmir
[1] http://i18n.debian.net/debian-l10n/italian/it.by_status.html
--
Ha senso lamentarsi
se le cose in cui non crediamo
non si realizzano?
GNU/Linux User: 410619 (https://linuxcounter.net/)
8<--------8<--------8<--------8<--------8<--------8<--------8<--------8<--------
<define-tag pagetitle>Aggiornata Debian 6.0: rilasciata la versione
6.0.2</define-tag>
<define-tag release_date>2011-06-25</define-tag>
#use wml::debian::translation-check translation="1.2" maintainer="Mirco
Scottà"
#use wml::debian::news
# $Id:
<define-tag release>6.0</define-tag>
<define-tag codename>squeeze</define-tag>
<define-tag revision>6.0.2</define-tag>
<define-tag dsa>
<tr><td align="center"><a href="$(HOME)/security/%0/dsa-%1">DSA-%1</a></td>
<td align="center"><:
my @p = ();
for my $p (split (/,\s*/, "%2")) {
push (@p, sprintf ('<a
href="http://packages.debian.org/src:%s">%s</a>', $p, $p));
}
print join (", ", @p);
:></td><td align="left">%3</td></tr>
</define-tag>
<define-tag correction>
<tr><td><a href="http://packages.debian.org/src:%0">%0</a></td>
<td>%1</td></tr>
</define-tag>
<define-tag srcpkg><a
href="http://packages.debian.org/src:%0">%0</a></define-tag>
<p>Il progetto Debian è lieto di annunciare il secondo aggiornamento
della sua
distribuzione stabile Debian 6.0 (nome in codice <q><codename></q>). Questo
aggiornamento aggiunge per lo più delle correzioni a problemi di
sicurezza del
rilascio stabile, insieme ad alcune sistemazioni di problemi seri. Gli
avvisi
di sicurezza sono già stati pubblicati separatamente e maggiori
informazioni,
laddove disponibili, sono presenti nelle pagine ad essi dedicate.</p>
<p>Da notare che questo aggiornamento non costituisce una nuova versione di
Debian 6.0 ma aggiorna solamente alcuni dei pacchetti inclusi. Non c'è alcun
bisogno di gettare i CD o i DVD della versione 6.0, ma è sufficiente
connettersi
dopo l'installazione ad un mirror Debian aggiornato per provocare
l'avanzamento
di tutti i pacchetti datati.</p>
<p>Coloro che aggiornano di frequente tramite security.debian.org non
dovranno
aggiornare molti pacchetti poiché la maggior parte di quelli provenienti da
security.debian.org sono compresi in questo aggiornamento.</p>
<p>I nuovi supporti di installazione e le nuove immagini dei CD e DVD che
contengono i pacchetti aggiornati saranno presto disponibili agli indirizzi
consueti.</p>
<p>L'aggiornamento in linea a questa revisione viene di solito fatto
puntando il
gestore dei pacchetti aptitude (o apt) (vedere la pagina di manuale
sources.list(5)) a uno dei molti mirror FTP o HTTP di Debian. Una lista
esaustiva dei mirror è disponibile qui:</p>
<div class="center">
<a href="$(HOME)/mirror/list">http://www.debian.org/mirror/list</a>
</div>
<h2>Correzioni varie</h2>
<p>L'aggiornamento della versione stabile aggiunge alcune importanti
correzioni
ai seguenti pacchetti:</p>
<table border=0>
<tr><th>Package</th> <th>Reason</th></tr>
<correction aide "Properly support large
files on 32-bit systems; fix group for bind9 log files">
<correction approx "Don't try caching
InRelease or non-.gz compressed files">
<correction apr "Fix apr_ino_t changing
size depending on -D_FILE_OFFSET_BITS on kfreebsd-*">
<correction apt "Fix file size calculation
on big-endian arches; don't prompt for CD re-insertion on <q>apt-get
update</q>; add XZ support">
<correction apt-listchanges "Correctly handle NEWS
files containing only one entry">
<correction base-files "Update /etc/debian_version">
<correction clive "Adapt for liveleak.com
changes">
<correction dbus "Fix local DoS for system
services (CVE-2011-2200)">
<correction deborphan "Exclude libreoffice from
--guess-section output; trap WINCH in a POSIX way; minor translation fixes">
<correction dokuwiki "Fix an ACL bypass issue in
the XMLRPC interface">
<correction dpkg "Fix regression in
'dpkg-divert --rename'; dpkg-split: don't corrupt metadata on 32-bit
systems; fix vsnprintf() compat declaration">
<correction e2fsprogs "Various bug fixes">
<correction fakechroot "Fix 'debootstrap
--variant=fakechroot'">
<correction fcgiwrap "Fix init script's 'stop'
target">
<correction gdm3 "Reset SIGPIPE handler
before starting the session; execute the PostSession script even when
GDM is killed or shut down">
<correction git "Allow remove and purge in
one step by terminating the git-daemon/log service before removing the
gitlog user">
<correction gnome-settings-daemon "Work around possible race
condition when starting Xsettings manager">
<correction ia32-libs "Refresh packages from
stable and proposed-updates.">
<correction iceowl "Security updates">
<correction im-config "Avoid breaking login via
GDM if im-config is removed but not purged">
<correction inn "Stop using 'sort +1n' in
makehistory; disable outdated CHECK_INCLUDED_TEXT option by default">
<correction josm "Give more verbose
explanation to users who haven't agreed to the new OSM license">
<correction kde4libs "Wildcard SSL certificate
and XSS security fixes; ktar checksum and UTF-8 longlink fixes">
<correction kdenetwork "Improve fix for
CVE-2010-1000 directory traversal issue">
<correction kernel-wedge "Add hpsa and pm8001 to
scsi-extra-modules; add bna to nic-extra-modules">
<correction kerneltop "Increase line buffer size
to 1024 bytes">
<correction klibc "ipconfig: escape DHCP
options and correctly handle multiple connected network devices
(CVE-2011-1930)">
<correction krb5 "Fix DoS; fix
interoperability with w2k8r2 KDCs; fix invalid free and double free;
don't make authentication fail if PAC verification fails">
<correction kupfer "Use correct parameter type
to allow keybindings to work again">
<correction libapache2-mod-perl2 "Rebuild against apr
1.4.2-6+squeeze3 to pick up apr_ino_t size fix on kFreeBSD">
<correction libburn "Don't create images with
overly-restrictive permissions">
<correction libfinance-quotehist-perl "Disable test suite, broken
by website changes">
<correction libmms "Fix alignment issues on arm">
<correction linux-2.6 "New hardware support; add
longterm 2.6.32.41; fix oops via corrupted partition tables">
<correction linux-kernel-di-amd64-2.6 "Rebuild against
kernel-wedge 2.74+squeeze3">
<correction linux-kernel-di-armel-2.6 "Rebuild against
kernel-wedge 2.74+squeeze3">
<correction linux-kernel-di-i386-2.6 "Rebuild against
kernel-wedge 2.74+squeeze3">
<correction linux-kernel-di-ia64-2.6 "Rebuild against
kernel-wedge 2.74+squeeze3">
<correction linux-kernel-di-mips-2.6 "Rebuild against
kernel-wedge 2.74+squeeze3">
<correction linux-kernel-di-mipsel-2.6 "Rebuild against
kernel-wedge 2.74+squeeze3">
<correction linux-kernel-di-powerpc-2.6 "Rebuild against
kernel-wedge 2.74+squeeze3">
<correction linux-kernel-di-s390-2.6 "Rebuild against
kernel-wedge 2.74+squeeze3">
<correction linux-kernel-di-sparc-2.6 "Rebuild against
kernel-wedge 2.74+squeeze3">
<correction lua-expat "Fix the 'billion laughs'
DoS attack">
<correction monkeysphere "Fix monkeysphere-host
revoke-key">
<correction nagios-plugins "Allocate a big enough
buffer to handle all IPs of hosts being pinged">
<correction nsd3 "Remove statoverride before
removing the package's user">
<correction openldap "Fix possible database
corruption issues, several security issues and dpkg-reconfigure">
<correction php-svn "Rebuild against apr
1.4.2-6+squeeze3 to pick up apr_ino_t size fix on kFreeBSD">
<correction php5 "Rebuild against apr
1.4.2-6+squeeze3 to pick up apr_ino_t size fix on kFreeBSD">
<correction pianobar "Update API keys for XMLRPC
v30">
<correction postgresql-8.4 "New upstream bugfix
release; fix pg_upgrade use with TOAST tables">
<correction prosody "Fix the 'billion laughs'
DoS attack">
<correction puppet "Fix service provider to
properly use update-rc.d disable API">
<correction python-apt "Strip multiarch by default
in RealParseDepends; add XZ support">
<correction python-gudev "Add missing dependency on
python-gobject">
<correction q4wine "Stop shipping the library
in lib64">
<correction qemu "Don't register
qemu-mips(el) with binfmt on mips(el)">
<correction qemu-kvm "Fix division by 0 with
some guests; fix vnc zlib overflow; don't abort on user hardware errors;
fix migration on 32-bit">
<correction qt4-x11 "Blacklist some fraudulent
SSL certificates; fix weakness in wildcard certificate verification">
<correction rapidsvn "Rebuild against apr
1.4.2-6+squeeze3 to pick up apr_ino_t size fix on kFreeBSD">
<correction refpolicy "Various permissions fixes">
<correction reprepro "Handle Release files which
don't contain md5sums">
<correction ruby1.8 "Fix upgrades from lenny by
making libruby1.8 conflict/replace irb1.8 and rdoc1.8">
<correction samba "Fix undefined symbol error
from tdb2.so; several printing related bugs and a gid leak in winbind /
idmap. Document the new and potentially disruptive 'map untrusted to
domain'">
<correction schroot "Fix loading of dchroot.conf">
<correction softhsm "Remove statoverride
entries before the package's user">
<correction sun-java6 "New upstream security update">
<correction tzdata "New upstream version">
<correction vimperator "Resolve compatibility
issues with iceweasel">
<correction widelands "Fix potential security
issue in Internet games">
<correction xenomai "Adapt kernel patch to
apply cleanly to squeeze's kernel">
<correction xserver-xorg-video-tseng "Fix driver initialisation">
</table>
<h2>Installatore Debian</h2>
<p>L'immagine del kernel usata dall'installatore è stata aggiornata per
incorporare
un certo numero di correzioni importanti e relative alla sicurezza, oltre al
supporto per ulteriore hardware.</p>
<h2>Aggiornamenti di sicurezza</h2>
<p>Questa revisione aggiunge i seguenti aggiornamenti di sicurezza al
rilascio
stabile. Il team della sicurezza ha già rilasciato un avviso per ciascuno di
questi aggiornamenti:</p>
<table border=0>
<tr><th>Advisory ID</th> <th>Package</th> <th>Correction(s)</th></tr>
<dsa 2011 2161 openjdk-6 "Denial of service">
<dsa 2011 2193 libcgroup "Several">
<dsa 2011 2194 libvirt "Privilege escalation">
<dsa 2011 2195 php5 "Several">
<dsa 2011 2197 quagga "Denial of service">
<dsa 2011 2198 tex-common "Insufficient input sanitizing">
<dsa 2011 2199 iceape "Update HTTPS certificate blacklist">
<dsa 2011 2200 iceweasel "Update HTTPS certificate blacklist">
<dsa 2011 2201 wireshark "Several">
<dsa 2011 2202 apache2 "Failure to drop root privileges">
<dsa 2011 2203 nss "Update HTTPS certificate blacklist">
<dsa 2011 2205 gdm3 "Privilege escalation">
<dsa 2011 2206 mahara "Several">
<dsa 2011 2208 bind9 "Denial of service">
<dsa 2011 2209 tgt "Double free">
<dsa 2011 2211 vlc "Missing input sanitising">
<dsa 2011 2212 tmux "Privilege escalation">
<dsa 2011 2213 x11-xserver-utils "Missing input sanitizing">
<dsa 2011 2214 ikiwiki "Missing input validation">
<dsa 2011 2215 gitolite "Directory traversal">
<dsa 2011 2216 isc-dhcp "Missing input sanitizing">
<dsa 2011 2218 vlc "Heap-based buffer overflow">
<dsa 2011 2219 xmlsec1 "File overwrite">
<dsa 2011 2220 request-tracker3.8 "Several">
<dsa 2011 2221 libmojolicious-perl "Directory traversal">
<dsa 2011 2222 tinyproxy "Incorrect ACL processing">
<dsa 2011 2223 doctrine "SQL injection">
<dsa 2011 2224 openjdk-6 "Several">
<dsa 2011 2225 asterisk "Several">
<dsa 2011 2226 libmodplug "Buffer overflow">
<dsa 2011 2227 iceape "Several">
<dsa 2011 2229 spip "Denial of service">
<dsa 2011 2230 qemu-kvm "Several">
<dsa 2011 2231 otrs2 "Cross-site scripting">
<dsa 2011 2232 exim4 "Format string vulnerability">
<dsa 2011 2233 postfix "Several">
<dsa 2011 2235 icedove "Several">
<dsa 2011 2236 exim4 "Command injection">
<dsa 2011 2237 apr "Denial of service">
<dsa 2011 2238 vino "Denial of service">
<dsa 2011 2239 libmojolicious-perl "Several">
<dsa 2011 2240 user-mode-linux "Several issues">
<dsa 2011 2240 linux-2.6 "Several issues">
<dsa 2011 2241 qemu-kvm "Implementation error">
<dsa 2011 2242 cyrus-imapd-2.2 "Implementation error">
<dsa 2011 2244 bind9 "Wrong boundary condition">
<dsa 2011 2245 chromium-browser "Several vulnerabilities">
<dsa 2011 2246 mahara "Several vulnerabilities">
<dsa 2011 2247 rails "Several vulnerabilities">
<dsa 2011 2249 jabberd14 "Denial of service">
<dsa 2011 2250 citadel "Denial of service">
<dsa 2011 2254 oprofile "Command injection">
<dsa 2011 2255 libxml2 "Buffer overflow">
<dsa 2011 2257 vlc "Buffer overflow">
<dsa 2011 2259 fex "Authentication bypass">
<dsa 2011 2261 redmine "Several">
<dsa 2011 2262 moodle "Several">
<dsa 2011 2263 movabletype-opensource "Several">
<dsa 2011 2265 perl "Missing taint check">
</table>
<h2>Pacchetti rimossi</h2>
<p>I seguenti pacchetti sono stati rimossi a causa di circostanze al di
fuori
del nostro controllo:</p>
<table border=0>
<tr><th>Package</th> <th>Reason</th></tr>
<correction ktsuss "security issues; unmaintained">
</table><h2>URL</h2>
<p>La lista completa di pacchetti modificati con questa revisione:</p>
<div class="center">
<url "http://ftp.debian.org/debian/dists/<downcase <codename>>/ChangeLog">
</div>
<p>L'attuale distribuzione stabile:</p>
<div class="center">
<url "http://ftp.debian.org/debian/dists/stable/">
</div>
<p>Aggiornamenti proposti per la distribuzione stabile:</p>
<div class="center">
<url "http://ftp.debian.org/debian/dists/proposed-updates">
</div>
<p>Informazioni sulla distribuzione stabile (note di rilascio, errata,
ecc.):</p>
<div class="center">
<a
href="$(HOME)/releases/stable/">http://www.debian.org/releases/stable/</a>
</div>
<p>Annunci e informazioni sulla sicurezza:</p>
<div class="center">
<a href="$(HOME)/security/">http://security.debian.org/</a>
</div>
<h2>Informazioni su Debian</h2>
<p>Il progetto Debian è un'associazione di sviluppatori di software
libero che
volontariamente mettono a disposizione il loro tempo e le loro capacità per
creare il sistema operativo completamente libero Debian.</p>
<h2>Contatti</h2>
<p>Per ulteriori informazioni, visita il sito web all'indirizzo
<a href="$(HOME)/">http://www.debian.org/</a>, invia una email a
<press@debian.org>, oppure contatta il team del rilascio stabile
inviando una mail a <debian-release@lists.debian.org>.</p>
8<--------8<--------8<--------8<--------8<--------8<--------8<--------8<--------
Reply to: