[Date Prev][Date Next] [Thread Prev][Thread Next] [Date Index] [Thread Index]

[RFR] wml://publicity/announcements/pt/2025/202509{06,0602}.wml



Boa noite, pessoal.

Mais uma vez teremos o lançamento da versão pontual 12.12 e 13.1 no
próximo fim de semana. Então seguem as traduções feitas com base no
nosso template padrão para revisão.

Abraços,
Charles
<define-tag pagetitle>Atualização Debian 13: 13.1 lançado</define-tag>
<define-tag release_date>2025-09-06</define-tag>
#use wml::debian::news
# $Id:

<define-tag release>13</define-tag>
<define-tag codename>trixie</define-tag>
<define-tag revision>13.1</define-tag>

<define-tag dsa>
    <tr><td align="center"><a href="$(HOME)/security/%0/dsa-%1">DSA-%1</a></td>
        <td align="center"><:
    my @p = ();
    for my $p (split (/,\s*/, "%2")) {
	push (@p, sprintf ('<a href="https://packages.debian.org/src:%s";>%s</a>', $p, $p));
    }
    print join (", ", @p);
:></td></tr>
</define-tag>

<define-tag correction>
    <tr><td><a href="https://packages.debian.org/src:%0";>%0</a></td>              <td>%1</td></tr>
</define-tag>

<define-tag srcpkg><a href="https://packages.debian.org/src:%0";>%0</a></define-tag>

<p>O projeto Debian está feliz em anunciar a primeira atualização de sua
versão estável (stable) do Debian <release> (codinome <q><codename></q>).
Esta versão pontual adiciona principalmente correções para problemas de
segurança, além de pequenos ajustes para problemas mais sérios. Avisos de
segurança já foram publicados em separado e são referenciados quando
necessário.</p>

<p>Por favor, note que a versão pontual não constitui uma nova versão do Debian
<release>, mas apenas atualiza alguns dos pacotes já incluídos. Não há
necessidade de jogar fora as antigas mídias da <q><codename></q>. Após a
instalação, os pacotes podem ser atualizados para as versões atuais usando um
espelho atualizado do Debian.</p>

<p>Aquelas pessoas que frequentemente instalam atualizações a partir de
security.debian.org não terão que atualizar muitos pacotes, e a maioria de tais
atualizações estão incluídas na versão pontual.</p>

<p>Novas imagens de instalação logo estarão disponíveis nos locais
habituais.</p>

<p>A atualização de uma instalação existente para esta revisão pode ser feita
apontando o sistema de gerenciamento de pacotes para um dos muitos espelhos
HTTP do Debian. Uma lista abrangente de espelhos está disponível em:</p>

<div class="center">
  <a href="$(HOME)/mirror/list">https://www.debian.org/mirror/list</a>
</div>


<h2>Correções gerais de bugs</h2>

<p>Esta atualização da versão estável (stable) adiciona algumas correções
importantes para os seguintes pacotes:</p>

<table border=0>
<tr><th>Pacote</th>               <th>Justificativa</th></tr>
<correction auto-apt-proxy "Check explicitly configured proxies before network gateway">
<correction base-files "Update for the point release">
<correction courier "Fix courier-webmin">
<correction debian-installer "Increase Linux kernel ABI to 6.12.43+deb13; rebuild against proposed-updates; add a workaround for a GRUB graphics initialisation bug">
<correction debian-installer-netboot-images "Rebuild against proposed-updates">
<correction desktop-base "Fix placement of plymouth prompts in multi-monitor setups">
<correction devscripts "Update suite and codename mappings">
<correction dpdk "New upstream point release">
<correction ethtool "netlink: fix print_string when the value is NULL">
<correction firebird3.0 "Fix null pointer dereference in XDR message parsing [CVE-2025-54989]">
<correction flvstreamer "Stop installing rtmpsrv and rtmpsuck, avoiding file conflict with the rtmpdump package">
<correction galera-4 "New upstream stable release">
<correction git "New upstream bug-fix release; fix arbitrary file write issues [CVE-2025-27613 CVE-2025-46835]; fix code execution issues [CVE-2025-27614 CVE-2025-48384]; fix protocol injection issue, possibly leading to arbitrary code execution [CVE-2025-48385]">
<correction glib2.0 "New upstream bugfix release; fix a corner case when upgrading from bookworm">
<correction gnome-control-center "Fix a UI issue and an error display issue; translation updates">
<correction gnome-online-accounts "New upstream bug-fix release; update translations">
<correction gnome-shell "New upstream bugfix release">
<correction golang-github-gin-contrib-cors "Fix mishandling of wildcards [CVE-2019-25211]">
<correction gssdp "New upstream bug-fix release; fix issues with Since: and Deprecated: declarations in documentation">
<correction imagemagick "Security fixes: heap buffer overflow in the <q>InterpretImageFilename</q> function [CVE-2025-53014]; infinite loop when writing during a specific XMP file conversion command [CVE-2025-53015]; memory leak in the <q>magick stream</q> command [CVE-2025-53019]; stack overflow through <q>vsnprintf()</q> [CVE-2025-53101]; use-after-free when SetQuantumFormat is used [CVE-2025-43965]; in multispectral MIFF image processing, packet_size mishandling [CVE-2025-46393]">
<correction init-system-helpers "Fix handling of os-release diversions from live-build, ensuring they don't exist in non-live systems">
<correction installation-guide "Enable Hungarian and Ukrainian translations; fix boot-dev-select-arm64 and armhf-armmp-supported-platforms hyperlinks">
<correction iperf3 "Fix buffer overflow issue [CVE-2025-54349]; fix assertion failure [CVE-2025-54350]">
<correction kamailio "Relax OpenSSL version check to only match against major version">
<correction libadwaita-1 "New upstream bugfix release">
<correction libcgi-simple-perl "Fix HTTP response splitting issue [CVE-2025-40927]">
<correction libcoap3 "Fix buffer overflow issue [CVE-2024-0962]; fix integer overflow issue [CVE-2024-31031]">
<correction libreoffice "Add EUR support for Bulgaria; fix installation of Impress sound effects; fix playing of videos in Impress under Qt6">
<correction librepo "New upstream bug-fix release, fixing support for DNF5; improve handling of SELinux in the Debian packaging">
<correction linux "New upstream stable release">
<correction linux-signed-amd64 "New upstream stable release">
<correction linux-signed-arm64 "New upstream stable release">
<correction live-boot "Fix handling of os-release diversions from live-build, ensuring they don't exist in non-live systems">
<correction live-build "Fix handling of os-release diversions, ensuring they don't exist in non-live systems">
<correction mame "Fix translation building">
<correction mariadb "New upstream stable release">
<correction mate-sensors-applet "Fix crash at startup">
<correction mmdebstrap "Support numeric UID in /etc/subgid and /etc/subuid">
<correction modemmanager "Fix support for Fibocom FM350-GL">
<correction mozjs128 "New upstream stable release; fix uninitialised memory issue [CVE-2025-9181], memory safety issues [CVE-2025-9185]">
<correction network-manager-openvpn "New upstream stable release; fix multi-factor authentication in combination with non-ASCII characters">
<correction nginx "Fix potential information leak in ngx_mail_smtp_module [CVE-2025-53859]">
<correction node-tmp "Fix arbitrary file write issue [CVE-2025-54798]">
<correction open-iscsi "Ensure /var/lib exists in initramfs">
<correction openjpeg2 "Fix out-of-bounds write issue [CVE-2025-54874]">
<correction orca "Add dependencies on python3-setproctitle and python3-psutil">
<correction orphan-sysvinit-scripts "Fix installation of mdadm scripts">
<correction pcre2 "New upstream stable release; fix potential information disclosure issue [CVE-2025-58050]">
<correction postfix "New upstream stable release; fix copying of files to chroot">
<correction postgresql-17 "New upstream stable release; tighten security checks in planner estimation functions [CVE-2025-8713]; prevent pg_dump scripts from being used to attack the user running the restore [CVE-2025-8714]; convert newlines to spaces in names included in comments in pg_dump output [CVE-2025-8715]">
<correction ptyxis "New upstream bugfix release">
<correction pyraf "Ensure compatibility with Python 3.13">
<correction qemu "New upstream bugfix release">
<correction rabbitmq-server "Show proper plugin version numbers">
<correction remind "Fix buffer overflow in DUMPVARS">
<correction renpy "Fix font symlinks">
<correction resource-agents "Handle cases where more than one route for an IP address exists">
<correction rkward "Restore compatibility with R 4.5">
<correction samba "New upstream bugfix release">
<correction sbuild "Support UID in /etc/sub(u|g)id; fix build path permissions when building as root; always append newline in binNMU changelog; allow empty BUILD_PATH in command line options">
<correction shaarli "Fix cross site scripting issue [CVE-2025-55291]">
<correction sound-theme-freedesktop "Link front-center sample to audio-channel-mono">
<correction strongswan "Fix OpenSSL 3.5.1 support">
<correction systemd "New upstream stable release">
<correction systemd-boot-efi-amd64-signed "New upstream stable release">
<correction systemd-boot-efi-arm64-signed "New upstream stable release">
<correction thunar "Fix prompt before permanently deleting files">
<correction timescaledb "Disable test that fails with Postgresql 17.6">
<correction transmission "Fix GTK app crash when LANG=fr">
<correction tzdata "Confirm leap second status for 2025">
<correction wolfssl "Avoid weak and predictable random numbers [CVE-2025-7394]">
</table>


<h2>Atualizações de segurança</h2>

<p>Esta revisão adiciona as seguintes atualizações de segurança para a versão
estável (stable).
A equipe de segurança já lançou um aviso para cada uma dessas atualizações:</p>

<table border=0>
<tr><th>ID do aviso</th>  <th>Pacote</th></tr>
<dsa 2025 5975 linux-signed-amd64>
<dsa 2025 5975 linux-signed-arm64>
<dsa 2025 5975 linux>
<dsa 2025 5976 chromium>
<dsa 2025 5977 aide>
<dsa 2025 5978 webkit2gtk>
<dsa 2025 5979 libxslt>
<dsa 2025 5980 firefox-esr>
<dsa 2025 5981 chromium>
<dsa 2025 5983 qemu>
<dsa 2025 5984 thunderbird>
<dsa 2025 5986 node-cipher-base>
<dsa 2025 5988 chromium>
<dsa 2025 5989 udisks2>
<dsa 2025 5990 libxml2>
<dsa 2025 5992 firebird4.0>
</table>


<h2>Pacotes removidos</h2>

<p>Os seguintes pacotes foram removidos por circunstâncias fora de nosso
controle:</p>

<table border=0>
<tr><th>Pacote</th>               <th>Justificativa</th></tr>
<correction guix "Unsupportable; security issues">
</table>


<h2>Instalador do Debian</h2>

<p>O instalador foi atualizado para incluir as correções incorporadas
na versão estável (stable) pela versão pontual.</p>


<h2>URLs</h2>

<p>As listas completas dos pacotes que foram alterados por esta revisão:</p>

<div class="center">
  <url "https://deb.debian.org/debian/dists/<downcase <codename>>/ChangeLog">
</div>

<p>A atual versão estável (stable):</p>

<div class="center">
  <url "https://deb.debian.org/debian/dists/stable/";>
</div>

<p>Atualizações propostas (proposed updates) para a versão estável (stable):</p>

<div class="center">
  <url "https://deb.debian.org/debian/dists/proposed-updates";>
</div>

<p>Informações da versão estável (stable) (notas de lançamento, errata, etc):</p>

<div class="center">
  <a
  href="$(HOME)/releases/stable/">https://www.debian.org/releases/stable/</a>
</div>

<p>Anúncios de segurança e informações:</p>

<div class="center">
  <a href="$(HOME)/security/">https://www.debian.org/security/</a>
</div>


<h2>Sobre o Debian</h2>

<p>O projeto Debian é uma associação de desenvolvedores(as) de Software Livre
que dedicam seu tempo e esforço como voluntários(as) para produzir o sistema
operacional completamente livre Debian.</p>


<h2>Informações de contato</h2>

<p>Para mais informações, por favor visite as páginas web do Debian em
<a href="$(HOME)/">https://www.debian.org/</a>, envie um e-mail (em inglês) para
&lt;press@debian.org&gt;, ou entre em contato (em inglês) com a equipe de
lançamento da versão estável (stable) em
&lt;debian-release@lists.debian.org&gt;.</p>
<define-tag pagetitle>Atualização Debian 12: 12.12 lançado</define-tag>
<define-tag release_date>2025-09-06</define-tag>
#use wml::debian::news
# $Id:

<define-tag release>12</define-tag>
<define-tag codename>bookworm</define-tag>
<define-tag revision>12.12</define-tag>

<define-tag dsa>
    <tr><td align="center"><a href="$(HOME)/security/%0/dsa-%1">DSA-%1</a></td>
        <td align="center"><:
    my @p = ();
    for my $p (split (/,\s*/, "%2")) {
	push (@p, sprintf ('<a href="https://packages.debian.org/src:%s";>%s</a>', $p, $p));
    }
    print join (", ", @p);
:></td></tr>
</define-tag>

<define-tag correction>
    <tr><td><a href="https://packages.debian.org/src:%0";>%0</a></td>              <td>%1</td></tr>
</define-tag>

<define-tag srcpkg><a href="https://packages.debian.org/src:%0";>%0</a></define-tag>

<p>O projeto Debian está feliz em anunciar a décima segunda atualização de sua
versão estável (stable) do Debian <release> (codinome <q><codename></q>).
Esta versão pontual adiciona principalmente correções para problemas de
segurança, além de pequenos ajustes para problemas mais sérios. Avisos de
segurança já foram publicados em separado e são referenciados quando
necessário.</p>

<p>Por favor, note que a versão pontual não constitui uma nova versão do Debian
<release>, mas apenas atualiza alguns dos pacotes já incluídos. Não há
necessidade de jogar fora as antigas mídias do <q><codename></q>. Após a
instalação, os pacotes podem ser atualizados para as versões atuais usando um
espelho atualizado do Debian.</p>

<p>Aquelas pessoas que frequentemente instalam atualizações a partir de
security.debian.org não terão que atualizar muitos pacotes, e a maioria de tais
atualizações estão incluídas na versão pontual.</p>

<p>Novas imagens de instalação logo estarão disponíveis nos locais
habituais.</p>

<p>A atualização de uma instalação existente para esta revisão pode ser feita
apontando o sistema de gerenciamento de pacotes para um dos muitos espelhos
HTTP do Debian. Uma lista abrangente de espelhos está disponível em:</p>

<div class="center">
  <a href="$(HOME)/mirror/list">https://www.debian.org/mirror/list</a>
</div>


<h2>Correções gerais de bugs</h2>

<p>Esta atualização da versão estável (stable) adiciona algumas correções
importantes para os seguintes pacotes:</p>

<table border=0>
<tr><th>Pacote</th>               <th>Justificativa</th></tr>
<correction amd64-microcode "Update AMD-SEV firmware [CVE-2024-56161]; update included microcode">
<correction aom "Fix libaom encoder output validity">
<correction apache2 "New upstream stable release; fix HTTP response splitting issue [CVE-2024-42516]; fix server-side request forgery issue [CVE-2024-43204 CVE-2024-43394]; fix log injection issue [CVE-2024-47252]; fix access control bypass issue [CVE-2025-23048]; fix denial of service issue [CVE-2025-49630]; fix potential man-in-the-middle issue [CVE-2025-49812]; fix memory lifetime management issue [CVE-2025-53020]">
<correction b43-fwcutter "Update firmware URL">
<correction balboa "Rebuild against glibc 2.36-9+deb12u12">
<correction base-files "Update for the point release">
<correction bash "Rebuild against glibc 2.36-9+deb12u12">
<correction botan "Fix denial of service issues [CVE-2024-34702 CVE-2024-34703]; fix improper parsing of name constraints [CVE-2024-39312]; fix compiler-induced secret-dependent operation issue [CVE-2024-50383]">
<correction busybox "Rebuild against glibc 2.36-9+deb12u12">
<correction ca-certificates "Add Sectigo Public Server Authentication Root E46 and Sectigo Public Server Authentication Root R46">
<correction catatonit "Rebuild against glibc 2.36-9+deb12u12">
<correction cdebootstrap "Rebuild against glibc 2.36-9+deb12u12">
<correction chkrootkit "Rebuild against glibc 2.36-9+deb12u12">
<correction cjson "Fix denial of service issue [CVE-2023-26819]; fix buffer overflow issue [CVE-2023-53154]">
<correction clamav "New upstream stable release; fix buffer overflow issues [CVE-2025-20128 CVE-2025-20260]">
<correction cloud-init "Make hotplug socket writable only by root [CVE-2024-11584]; don't attempt to identify non-x86 OpenStack instances [CVE-2024-6174]">
<correction commons-beanutils "Fix improper access control issue [CVE-2025-48734]">
<correction commons-vfs "Fix path traversal issue [CVE-2025-27553]">
<correction corosync "Fix buffer overflow vulnerability on large UDP packets [CVE-2025-30472]">
<correction criu "Fix restore functionality of mount namespaces with newer kernel versions">
<correction curl "Fix regression handling sftp://host/~ URIs; fix a memory leak">
<correction dar "Rebuild against glibc 2.36-9+deb12u12">
<correction debian-edu-config "Fix quoting in Exim configuration; gosa-sync: fix password verification; fix quoting in gosa.conf">
<correction debian-installer "Increase Linux kernel ABI to 6.1.0-39; rebuild against oldstable-proposed-updates; add console-setup-pc-ekmap for arm64 and armhf CD images; use <q>nomodeset</q> rather than <q>fb=false</q> to disable framebuffer">
<correction debian-installer-netbook-images "Rebuild against oldstable-proposed-updates">
<correction debian-security-support "Query source:Package instead of Source to get the correct list of packages; fix typo related to gobgp">
<correction distro-info-data "Add Ubuntu end of Legacy Support dates; add release and estimated EoL for trixie">
<correction djvulibre "Fix denial of service issues [CVE-2021-46310 CVE-2021-46312]">
<correction docker.io "Rebuild against glibc 2.36-9+deb12u12">
<correction dpdk "New upstream stable release">
<correction dropbear "Fix shell injection vulnerability in multihop handling [CVE-2025-47203]">
<correction e2fsprogs "Rebuild against glibc 2.36-9+deb12u12">
<correction erlang "ssh: fix strict KEX hardening [CVE-2025-46712]; zip: sanitize pathnames when extracting files with absolute pathnames [CVE-2025-4748]; fix documentation build failure with newer xsltproc versions">
<correction expat "Fix denial of service issues [CVE-2023-52425 CVE-2024-8176]; fix parser crash [CVE-2024-50602]">
<correction fig2dev "Detect nan in spline control values [CVE-2025-46397]; permit \0 in 2nd line in fig file [CVE-2025-46398]; ge output: correct spline computation [CVE-2025-46399]; reject arcs with a radius smaller than 3 [CVE-2025-46400]">
<correction firebird3.0 "Fix NULL pointer dereference issue [CVE-2025-54989]">
<correction fort-validator "Fix denial of service issues [CVE-2024-45234 CVE-2024-45235 CVE-2024-45236 CVE-2024-45238 CVE-2024-45239 CVE-2024-48943]; fix buffer overflow issue [CVE-2024-45237]">
<correction galera-4 "New upstream stable release">
<correction glib2.0 "Fix buffer underflow issue [CVE-2025-4373 CVE-2025-7039]; improve upgrade safety">
<correction glibc "Fix incorrect LD_LIBRARY_PATH search in dlopen for static setuid binaries [CVE-2025-4802]; improve memory layout of structures in exp/exp10/expf functions; add an SVE implementation of memset on aarch64; improve generic implementation of memset on aarch64; fix double free issue [CVE-2025-8058]">
<correction gnupg2 "Rebuild against glibc 2.36-9+deb12u12; fix recommends of architecture-any packages on architecture-all package to support binNMUs">
<correction golang-github-gin-contrib-cors "Fix mishandling of wildcards [CVE-2019-25211]">
<correction gst-plugins-base1.0 "Fix buffer overrun issue [CVE-2025-47806]; fix NULL pointer dereference issues [CVE-2025-47807 CVE-2025-47808]">
<correction gst-plugins-good1.0 "Fix possible information disclosure issue [CVE-2025-47219]">
<correction init-system-helpers "Fix handling of os-release diversions from live-build, ensuring they don't exist in non-live systems">
<correction insighttoolkit4 "Fix build on systems with a single CPU">
<correction insighttoolkit5 "Fix build on systems with a single CPU">
<correction integrit "Rebuild against glibc 2.36-9+deb12u12">
<correction iperf3 "Fix buffer overflow issue [CVE-2025-54349]; fix assertion failure [CVE-2025-54350]">
<correction jinja2 "Fix arbitrary code execution issue [CVE-2025-27516]">
<correction jq "Zero-terminate string in jv.c [CVE-2025-48060]">
<correction kexec-tools "Remove no longer required dependencies">
<correction kmail-account-wizard "Fix man in the middle attack issue [CVE-2024-50624]">
<correction krb5 "Fix message tampering issue [CVE-2025-3576]; disable issuance of tickets using RC4 or triple-DES session keys by default">
<correction kubernetes "Sanitise raw data output to terminal [CVE-2021-25743]; hide long and multi-line strings when printing">
<correction libarchive "Fix integer overflow issues [CVE-2025-5914 CVE-2025-5916], buffer over read issue [CVE-2025-5915], buffer overlow issue [CVE-2025-5917]">
<correction libbpf "Fix operation with newer systemd versions">
<correction libcap2 "Rebuild against glibc 2.36-9+deb12u12; add missing Built-Using: glibc">
<correction libcgi-simple-perl "Fix HTTP response splitting issue [CVE-2025-40927]">
<correction libfcgi "Fix integer overflow issue [CVE-2025-23016]">
<correction libfile-tail-perl "Fix uninitialized variable issue">
<correction libphp-adodb "Fix SQL injection vulnerability in pg_insert_id() [CVE-2025-46337]">
<correction libraw "Fix out-of-bounds read issues [CVE-2025-43961 CVE-2025-43962 CVE-2025-43963]; enforce minimum w0 and w1 values [CVE-2025-43964]">
<correction libreoffice "Add EUR support for Bulgaria">
<correction libsndfile "Fix integer overflow issues [CVE-2022-33065]; fix out of bounds read issue [CVE-2024-50612]">
<correction libsoup3 "New upstream bug-fix release; fix buffer overrun issue [CVE-2024-52531]; fix denial of service issues [CVE-2024-52532 CVE-2025-32051]; fix heap overflow issues [CVE-2025-32052 CVE-2025-32053]; fix integer overflow issue [CVE-2025-32050]; fix heap buffer overflow issues [CVE-2025-2784]; reject HTTP headers if they contain null bytes [CVE-2024-52530]; fix denial of service issues [CVE-2025-32909 CVE-2025-32910 CVE-2025-46420 CVE-2025-32912 CVE-2025-32906]; fix memory management issues [CVE-2025-32911 CVE-2025-32913]; fix credential disclosure issue [CVE-2025-46421]; fix use-after-free during disconnection, which can cause GNOME Calculator to hang at startup; fix a test failure on some 32-bit systems">
<correction libtheora "Fix segfault during decoder initialisation; avoid possible bit-shifting in decoder">
<correction libtpms "Fix out of bounds read issue [CVE-2025-49133]">
<correction libxml2 "Fix integer overflow issue in xmlBuildQName [CVE-2025-6021]; fix potential buffer overflows in the interactive shell [CVE-2025-6170]; fix use-after-free issue in xmlSchematronReportOutput [CVE-2025-49794]; fix type confusion issue in xmlSchematronReportOutput [CVE-2025-49796]">
<correction libyaml-libyaml-perl "Fix arbitrary file edit issue [CVE-2025-40908]">
<correction lintian "Add bookworm to duke to the list of known Debian release names; don't emit source-nmu-has-incorrect-version-number for stable updates">
<correction linux "New upstream stable release; increase ABI to 39">
<correction linux-signed-amd64 "New upstream stable release; increase ABI to 39">
<correction linux-signed-arm64 "New upstream stable release; increase ABI to 39">
<correction linux-signed-i386 "New upstream stable release; increase ABI to 39">
<correction llvm-toolchain-19 "New upstream stable release">
<correction luajit "Fix buffer overflow issue [CVE-2024-25176]; fix denial of service issue [CVE-2024-25177]; fix out-of-bounds read issue [CVE-2024-25178]">
<correction lxc "Rebuild against glibc 2.36-9+deb12u12">
<correction mailgraph "Update embedded copy of Parse::Syslog, enabling support for RFC3339 dates">
<correction mariadb "New upstream stable release; security fixes [CVE-2023-52969 CVE-2023-52970 CVE-2023-52971 CVE-2025-30693 CVE-2025-30722]; fix restart after out of memory; new upstream stable release; fix variable name in debian-start.sh">
<correction mkchromecast "Replace youtube-dl with yt-dlp">
<correction mlt "Fix Python scripts">
<correction mono "Remove unneeded (and broken) mono-source package">
<correction mosquitto "Fix memory leak issue [CVE-2023-28366]; fix out of bounds memory access issue [CVE-2024-10525]; fix double free issue [CVE-2024-3935]; fix possible segmentation fault issue [CVE-2024-8376]">
<correction multipath-tools "Reinstate ANA prioritizer in build process">
<correction nextcloud-desktop "Fix share options in graphical interface">
<correction nginx "Fix potential information leak in ngx_mail_smtp_module [CVE-2025-53859]">
<correction node-addon-api "Add support for nodejs &gt;= 18.20">
<correction node-csstype "Fix build failure">
<correction node-form-data "Fix insufficient randomness issue [CVE-2025-7783]">
<correction node-minipass "Fix tap reporter in auto test and autopkgtest">
<correction node-nodeunit "Fix test flakiness">
<correction node-tar-fs "Fix path traversal issues [CVE-2024-12905 CVE-2025-48387]">
<correction node-tmp "Fix arbitrary file write issue [CVE-2025-54798]">
<correction nvda2speechd "Fix required rmp-serde version">
<correction openjpeg2 "Fix NULL pointer dereference issue [CVE-2025-50952]">
<correction openssh "Handle OpenSSL &gt;=3 ABI compatibility to avoid new SSH connections failing during upgrades to trixie">
<correction openssl "New upstream stable release; revert some upstream changes to avoid crashes in downstream software">
<correction perl "Fix TLS certificate verification issue [CVE-2023-31484]; fix non thread safe file access [CVE-2025-40909]">
<correction postgresql-15 "New upstream stable release; tighten security checks in planner estimation functions [CVE-2025-8713]; prevent pg_dump scripts from being used to attack the user running the restore [CVE-2025-8714]; convert newlines to spaces in names included in comments in pg_dump output [CVE-2025-8715]">
<correction postgresql-common "PgCommon.pm: Set defined path in prepare_exec. Fixes compatibility with trixie's perl version">
<correction prody "Fix build failure; add tolerance to some tests which now fail on i386">
<correction python-django "Fix regular expression-based denial of service issue [CVE-2023-36053], denial of service issues [CVE-2024-38875 CVE-2024-39614 CVE-2024-41990 CVE-2024-41991], user enumeration issue [CVE-2024-39329], directory traversal issue [CVE-2024-39330], excessive memory consumption issue [CVE-2024-41989], SQL injection issue [CVE-2024-42005]">
<correction python-flask-cors "Fix log data injection issue [CVE-2024-1681]; fix improper path processing issues [CVE-2024-6866 CVE-2024-6839 CVE-2024-6844]">
<correction python-mitogen "Support targets with Python &gt;= 3.12">
<correction python-zipp "Fix denial of service issue [CVE-2024-5569]">
<correction qemu "Rebuild against glibc 2.36-9+deb12u12; new upstream bugfix release">
<correction raptor2 "Fix integer underflow issue [CVE-2024-57823]; fix heap read buffer overflow issue [CVE-2024-57822]">
<correction rar "New upstream release; fix ANSI escape injection issue [CVE-2024-33899]">
<correction rubygems "Fix credential leak issue [CVE-2025-27221]; fix regular expression related denial of service issue [CVE-2023-28755]">
<correction rust-cbindgen-web "Rebuild against current rustc-web">
<correction rustc-web "New upstream stable release, to support building of newer Chromium versions">
<correction samba "Fix various bugs following a change to Microsoft Active Directory">
<correction sash "Rebuild against glibc 2.36-9+deb12u12">
<correction setuptools "Fix arbitrary file write issue [CVE-2025-47273]">
<correction shaarli "Fix cross site scripting issue [CVE-2025-55291]">
<correction simplesamlphp "Fix signature verification issue [CVE-2025-27773]">
<correction snapd "Rebuild against glibc 2.36-9+deb12u12">
<correction sqlite3 "Fix memory corruption issue [CVE-2025-6965]; fix bug in NOT NULL/IS NULL optimization that can cause invalid data">
<correction supermin "Rebuild against glibc 2.36-9+deb12u12">
<correction systemd "New upstream stable release">
<correction tini "Rebuild against glibc 2.36-9+deb12u12">
<correction tripwire "Rebuild against glibc 2.36-9+deb12u12">
<correction tsocks "Rebuild against glibc 2.36-9+deb12u12">
<correction tzdata "Confirm leap second status for 2025">
<correction usb.ids "New upstream update">
<correction waitress "Fix race condition in HTTP pipelining [CVE-2024-49768]; fix denial of service issue [CVE-2024-49769]">
<correction webpy "Fix SQL injection issue [CVE-2025-3818]">
<correction wireless-regdb "New upstream release, updating included regulatory data; permit 320 MHz bandwidth in 6 GHz band for GB">
<correction wolfssl "Fix insufficient randomisation issue [CVE-2025-7394]">
<correction wpa "Fix inappropriate reuse of PKEX elements [CVE-2022-37660]">
<correction xfce4-weather-plugin "Migrate to new APIs; update translations">
<correction xrdp "Fix session restrictions bypass issue [CVE-2023-40184]; fix out-of-bounds read issue [CVE-2023-42822]; fix login restrictions bypass issue [CVE-2024-39917]">
<correction ydotool "Rebuild against glibc 2.36-9+deb12u12">
<correction zsh "Rebuild against glibc 2.36-9+deb12u12">
</table>


<h2>Atualizações de segurança</h2>

<p>Esta revisão adiciona as seguintes atualizações de segurança para a versão
estável (stable).
A equipe de segurança já lançou um aviso para cada uma dessas atualizações:</p>

<table border=0>
<tr><th>ID do aviso</th>  <th>Pacote</th></tr>
<dsa 2025 5914 chromium>
<dsa 2025 5916 chromium>
<dsa 2025 5918 varnish>
<dsa 2025 5919 open-vm-tools>
<dsa 2025 5920 chromium>
<dsa 2025 5921 thunderbird>
<dsa 2025 5922 firefox-esr>
<dsa 2025 5923 net-tools>
<dsa 2025 5924 intel-microcode>
<dsa 2025 5925 linux-signed-amd64>
<dsa 2025 5925 linux-signed-arm64>
<dsa 2025 5925 linux-signed-i386>
<dsa 2025 5925 linux>
<dsa 2025 5926 firefox-esr>
<dsa 2025 5927 yelp-xsl>
<dsa 2025 5927 yelp>
<dsa 2025 5928 libvpx>
<dsa 2025 5929 chromium>
<dsa 2025 5930 libavif>
<dsa 2025 5931 systemd>
<dsa 2025 5932 thunderbird>
<dsa 2025 5933 tcpdf>
<dsa 2025 5934 roundcube>
<dsa 2025 5935 chromium>
<dsa 2025 5936 libfile-find-rule-perl>
<dsa 2025 5937 webkit2gtk>
<dsa 2025 5938 python-tornado>
<dsa 2025 5939 gimp>
<dsa 2025 5940 modsecurity-apache>
<dsa 2025 5941 gst-plugins-bad1.0>
<dsa 2025 5942 chromium>
<dsa 2025 5943 libblockdev>
<dsa 2025 5943 udisks2>
<dsa 2025 5944 chromium>
<dsa 2025 5945 konsole>
<dsa 2025 5946 gdk-pixbuf>
<dsa 2025 5947 xorg-server>
<dsa 2025 5948 trafficserver>
<dsa 2025 5949 libxml2>
<dsa 2025 5950 firefox-esr>
<dsa 2025 5951 icu>
<dsa 2025 5952 chromium>
<dsa 2025 5953 catdoc>
<dsa 2025 5954 sudo>
<dsa 2025 5955 chromium>
<dsa 2025 5956 ring>
<dsa 2025 5957 mediawiki>
<dsa 2025 5958 jpeg-xl>
<dsa 2025 5959 thunderbird>
<dsa 2025 5960 djvulibre>
<dsa 2025 5961 slurm-wlm>
<dsa 2025 5962 gnutls28>
<dsa 2025 5963 chromium>
<dsa 2025 5964 firefox-esr>
<dsa 2025 5965 chromium>
<dsa 2025 5966 thunderbird>
<dsa 2025 5967 php8.2>
<dsa 2025 5968 chromium>
<dsa 2025 5969 redis>
<dsa 2025 5970 sope>
<dsa 2025 5971 chromium>
<dsa 2025 5972 openjdk-17>
<dsa 2025 5973 linux-signed-amd64>
<dsa 2025 5973 linux-signed-arm64>
<dsa 2025 5973 linux-signed-i386>
<dsa 2025 5973 linux>
<dsa 2025 5974 pgpool2>
<dsa 2025 5976 chromium>
<dsa 2025 5977 aide>
<dsa 2025 5978 webkit2gtk>
<dsa 2025 5979 libxslt>
<dsa 2025 5980 firefox-esr>
<dsa 2025 5981 chromium>
<dsa 2025 5982 squid>
<dsa 2025 5983 qemu>
<dsa 2025 5984 thunderbird>
<dsa 2025 5985 ffmpeg>
<dsa 2025 5986 node-cipher-base>
<dsa 2025 5987 unbound>
<dsa 2025 5988 chromium>
<dsa 2025 5989 udisks2>
<dsa 2025 5990 libxml2>
<dsa 2025 5991 nodejs>
</table>


<h2>Pacotes removidos</h2>

<p>Os seguintes pacotes foram removidos por circunstâncias fora de nosso
controle:</p>

<table border=0>
<tr><th>Pacote</th>               <th>Justificativa</th></tr>
<correction guix "Unsupportable; security issues">
</table>


<h2>Instalador do Debian</h2>

<p>O instalador foi atualizado para incluir as correções incorporadas
na versão estável (stable) pela versão pontual.</p>


<h2>URLs</h2>

<p>As listas completas dos pacotes que foram alterados por esta revisão:</p>

<div class="center">
  <url "https://deb.debian.org/debian/dists/<downcase <codename>>/ChangeLog">
</div>

<p>A atual versão estável (stable):</p>

<div class="center">
  <url "https://deb.debian.org/debian/dists/stable/";>
</div>

<p>Atualizações propostas (proposed updates) para a versão estável (stable):</p>

<div class="center">
  <url "https://deb.debian.org/debian/dists/proposed-updates";>
</div>

<p>Informações da versão estável (stable) (notas de lançamento, errata, etc):</p>

<div class="center">
  <a
  href="$(HOME)/releases/stable/">https://www.debian.org/releases/stable/</a>
</div>

<p>Anúncios de segurança e informações:</p>

<div class="center">
  <a href="$(HOME)/security/">https://www.debian.org/security/</a>
</div>


<h2>Sobre o Debian</h2>

<p>O projeto Debian é uma associação de desenvolvedores(as) de Software Livre
que dedicam seu tempo e esforço como voluntários(as) para produzir o sistema
operacional completamente livre Debian.</p>


<h2>Informações de contato</h2>

<p>Para mais informações, por favor visite as páginas web do Debian em
<a href="$(HOME)/">https://www.debian.org/</a>, envie um e-mail (em inglês) para
&lt;press@debian.org&gt;, ou entre em contato (em inglês) com a equipe de
lançamento da versão estável (stable) em
&lt;debian-release@lists.debian.org&gt;.</p>

Reply to: