aboutsummaryrefslogtreecommitdiffstats
path: root/arabic/News
diff options
context:
space:
mode:
authorMed <2029-med@users.noreply.salsa.debian.org>2021-10-10 09:13:01 +0000
committerMed <2029-med@users.noreply.salsa.debian.org>2021-10-10 09:13:01 +0000
commitd8d0ddc2eb268ede76ea8efaaa49a648c8ef3f71 (patch)
tree35b260ea1ed4d8db99966574391a6c9ce945acc9 /arabic/News
parentd0c5f310bce71e9cb8a6ca551c37533c17b3a8e1 (diff)
(ar) News/2021, add translations of announcements for 11.1 and 10.11
Diffstat (limited to 'arabic/News')
-rw-r--r--arabic/News/2021/20211009.wml254
-rw-r--r--arabic/News/2021/2021100902.wml253
2 files changed, 507 insertions, 0 deletions
diff --git a/arabic/News/2021/20211009.wml b/arabic/News/2021/20211009.wml
new file mode 100644
index 00000000000..84ad2814e8d
--- /dev/null
+++ b/arabic/News/2021/20211009.wml
@@ -0,0 +1,254 @@
+#use wml::debian::translation-check
+translation="d9e5cd3d7df23feb17458b95c465e062e9cd6e5a" maintainer="med"
+
+<define-tag pagetitle>تحديث دبيان 11 : الإصدار 11.1</define-tag>
+<define-tag release_date>2021-10-09</define-tag>
+#use wml::debian::news
+# $Id:
+
+<define-tag release>11</define-tag>
+<define-tag codename>bullseye</define-tag>
+<define-tag revision>11.1</define-tag>
+
+<define-tag dsa>
+ <tr><td align="center"><a href="$(HOME)/security/%0/dsa-%1">DSA-%1</a></td>
+ <td align="center"><:
+ my @p = ();
+ for my $p (split (/,\s*/, "%2")) {
+ push (@p, sprintf ('<a href="https://packages.debian.org/src:%s">%s</a>', $p, $p));
+ }
+ print join (", ", @p);
+:></td></tr>
+</define-tag>
+
+<define-tag correction>
+ <tr><td><a href="https://packages.debian.org/src:%0">%0</a></td> <td>%1</td></tr>
+</define-tag>
+
+<define-tag srcpkg><a href="https://packages.debian.org/src:%0">%0</a></define-tag>
+
+<p>
+يُسعد مشروع دبيان الإعلان عن التحديث الأول لتوزيعته المستقرة دبيان <release> (الاسم الرمزي <q><codename></q>).
+بالإضافة إلى تسوية بعض المشكلات الحرجة يُصلح هذا التحديث بالأساس مشاكلات الأمان. تنبيهات الأمان أُعلنت بشكل منفصِل وفقط مُشار إليها في هذا الإعلان.
+</p>
+
+<p>
+يُرجى ملاحظة أن هذا التحديث لا يُشكّل إصدار جديد لدبيان <release> بل فقط تحديثات لبعض الحُزم المُضمّنة
+وبالتالي ليس بالضرورة رميُ الوسائط القديمة للإصدار <q><codename></q>، يمكن تحديث الحُزم باستخدام مرآة دبيان مُحدّثة.
+</p>
+
+<p>
+الذين يُثبّتون التحديثات من security.debian.org باستمرار لن يكون عليهم تحديث العديد من الحُزم،
+أغلب التحديثات مُضمّنة في هذا التحديث.
+</p>
+
+<p>
+صور جديدة لأقراص التثبيت ستكون متوفرة في موضِعها المعتاد.
+</p>
+
+<p>
+يمكن الترقية من تثبيت آنِيّ إلى هذه المراجعة بتوجيه نظام إدارة الحُزم إلى إحدى مرايا HTTP الخاصة بدبيان.
+قائمة شاملة لمرايا دبيان على المسار :
+</p>
+
+<div class="center">
+ <a href="$(HOME)/mirror/list">https://www.debian.org/mirror/list</a>
+</div>
+
+
+<h2>إصلاح العديد من العِلاّت</h2>
+
+<p>هذا التحديث للإصدار المستقر أضاف بعض الإصلاحات المهمة للحُزم التالية :</p>
+
+<table border=0>
+<tr><th>الحزمة</th> <th>السبب</th></tr>
+<correction apr "Prevent out-of-bounds array dereference">
+<correction atftp "Fix buffer overflow [CVE-2021-41054]">
+<correction automysqlbackup "Fix crash when using <q>LATEST=yes</q>">
+<correction base-files "Update for the 11.1 point release">
+<correction clamav "New upstream stable release; fix clamdscan segfaults when --fdpass and --multipass are used together with ExcludePath">
+<correction cloud-init "Avoid duplicate includedir in /etc/sudoers">
+<correction cyrus-imapd "Fix denial-of-service issue [CVE-2021-33582]">
+<correction dazzdb "Fix a use-after-free in DBstats">
+<correction debian-edu-config "debian-edu-ltsp-install: extend main server related exclude list; add slapd and xrdp-sesman to the list of masked services">
+<correction debian-installer "Rebuild against proposed updates; update Linux ABI to 5.10.0-9; use udebs from proposed-updates">
+<correction debian-installer-netboot-images "Rebuild against proposed-updates; use udebs from proposed-updates and stable; use xz-compressed Packages files">
+<correction detox "Fix handling of large files">
+<correction devscripts "Make the --bpo option target bullseye-backports">
+<correction dlt-viewer "Add missing qdlt/qdlt*.h header files to dev package">
+<correction dpdk "New upstream stable release">
+<correction fetchmail "Fix segmentation fault and security regression">
+<correction flatpak "New upstream stable release; don't inherit an unusual $XDG_RUNTIME_DIR setting into the sandbox">
+<correction freeradius "Fix thread crash and sample configuration">
+<correction galera-3 "New upstream stable release">
+<correction galera-4 "New upstream stable release; solve circular Conflicts with galera-3 by no longer providing a virtual <q>galera</q> package">
+<correction glewlwyd "Fix possible buffer overflow during FIDO2 signature validation in webauthn registration [CVE-2021-40818]">
+<correction glibc "Restart openssh-server even if it has been deconfigured during the upgrade; fix text fallback when debconf is unusable">
+<correction gnome-maps "New upstream stable release; fix a crash when starting up with last-used map type being aerial, and no aerial tile definition is found; don't sometimes write broken last view position on exit; fix hang when dragging around route markers">
+<correction gnome-shell "New upstream stable release; fix freeze after cancelling (some) system-modal dialogs; fix word suggestions in on-screen keyboard; fix crashes">
+<correction hdf5 "Adjust package dependencies to improve upgrade paths from older releases">
+<correction iotop-c "Properly handle UTF-8 process names">
+<correction jailkit "Fix creation of jails that need to use /dev; fix library presence check">
+<correction java-atk-wrapper "Also use dbus to detect accessibility being enabled">
+<correction krb5 "Fix KDC null dereference crash on FAST request with no server field [CVE-2021-37750]; fix memory leak in krb5_gss_inquire_cred">
+<correction libavif "Use correct libdir in libavif.pc pkgconfig file">
+<correction libbluray "Switch to embedded libasm; the version from libasm-java is too new">
+<correction libdatetime-timezone-perl "New upstream stable release; update DST rules for Samoa and Jordon; confirmation of no leap second on 2021-12-31">
+<correction libslirp "Fix multiple buffer overflow issues [CVE-2021-3592 CVE-2021-3593 CVE-2021-3594 CVE-2021-3595]">
+<correction linux "New upstream stable release; increase ABI to 9; [rt] Update to 5.10.65-rt53; [mipsel] bpf, mips: Validate conditional branch offsets [CVE-2021-38300]">
+<correction linux-signed-amd64 "New upstream stable release; increase ABI to 9; [rt] Update to 5.10.65-rt53; [mipsel] bpf, mips: Validate conditional branch offsets [CVE-2021-38300]">
+<correction linux-signed-arm64 "New upstream stable release; increase ABI to 9; [rt] Update to 5.10.65-rt53; [mipsel] bpf, mips: Validate conditional branch offsets [CVE-2021-38300]">
+<correction linux-signed-i386 "New upstream stable release; increase ABI to 9; [rt] Update to 5.10.65-rt53; [mipsel] bpf, mips: Validate conditional branch offsets [CVE-2021-38300]">
+<correction mariadb-10.5 "New upstream stable release; security fixes [CVE-2021-2372 CVE-2021-2389]">
+<correction mbrola "Fix end of file detection">
+<correction modsecurity-crs "Fix request body bypass issue [CVE-2021-35368]">
+<correction mtr "Fix regression in JSON output">
+<correction mutter "New upstream stable release; kms: Improve handling of common video modes that might exceed the possible bandwidth; ensure valid window texture size after viewport changes">
+<correction nautilus "Avoid opening multiple selected files in multiple application instances; don't save window size and position when tiled; fix some memory leaks; update translations">
+<correction node-ansi-regex "Fix regular expression-based denial of service issue [CVE-2021-3807]">
+<correction node-axios "Fix regular expression-based denial of service issue [CVE-2021-3749]">
+<correction node-object-path "Fix prototype pollution issues [CVE-2021-23434 CVE-2021-3805]">
+<correction node-prismjs "Fix regular expression-based denial of service issue [CVE-2021-3801]">
+<correction node-set-value "Fix prototype pollution [CVE-2021-23440]">
+<correction node-tar "Remove non-directory paths from the directory cache [CVE-2021-32803]; strip absolute paths more comprehensively [CVE-2021-32804]">
+<correction osmcoastline "Fix projections other than WGS84">
+<correction osmpbf "Rebuild against protobuf 3.12.4">
+<correction pam "Fix syntax error in libpam0g.postinst when a systemd unit fails">
+<correction perl "Security update; fix a regular expression memory leak">
+<correction pglogical "Update for PostgreSQL 13.4 snapshot handling fixes">
+<correction pmdk "Fix missing barriers after non-temporal memcpy">
+<correction postgresql-13 "New upstream stable release; fix mis-planning of repeated application of a projection step [CVE-2021-3677]; disallow SSL renegotiation more completely">
+<correction proftpd-dfsg "Fix <q>mod_radius leaks memory contents to radius server</q> and <q>sftp connection aborts with </q>Corrupted MAC on input""; skip escaping of already-escaped SQL text">
+<correction pyx3 "Fix horizontal font alignment issue with texlive 2020">
+<correction reportbug "Update suite names following bullseye release">
+<correction request-tracker4 "Fix login timing side-channel attack issue [CVE-2021-38562]">
+<correction rhonabwy "Fix JWE CBC tag computation and JWS alg:none signature verification">
+<correction rpki-trust-anchors "Add HTTPS URL to the LACNIC TAL">
+<correction rsync "Re-add --copy-devices; fix regression in --delay-updates; fix edge case in --mkpath; fix rsync-ssl; fix --sparce and --inplace; update options available to rrsync; documentation fixes">
+<correction ruby-rqrcode-rails3 "Fix for ruby-rqrcode 1.0 compatibility">
+<correction sabnzbdplus "Prevent directory escape in renamer function [CVE-2021-29488]">
+<correction shellcheck "Fix rendering of long options in manpage">
+<correction shiro "Fix authentication bypass issues [CVE-2020-1957 CVE-2020-11989 CVE-2020-13933 CVE-2020-17510]; update Spring Framework compatibility patch; support Guice 4">
+<correction speech-dispatcher "Fix setting of voice name for the generic module">
+<correction telegram-desktop "Avoid crash when auto-delete is enabled">
+<correction termshark "Include themes in package">
+<correction tmux "Fix a race condition which results in the config not being loaded if several clients are interacting with the server while it's initializing">
+<correction txt2man "Fix regression in handling display blocks">
+<correction tzdata "Update DST rules for Samoa and Jordan; confirm the absence of a leap second on 2021-12-31">
+<correction ublock-origin "New upstream stable release; fix denial of service issue [CVE-2021-36773]">
+<correction ulfius "Ensure memory is initialised before use [CVE-2021-40540]">
+</table>
+
+
+<h2>تحديثات الأمان</h2>
+
+
+<p>
+أضافت هذه المراجعة تحديثات الأمان التالية للإصدار المستقر.
+سبَق لفريق الأمان نشر تنبيه لكل تحديث :
+</p>
+
+<table border=0>
+<tr><th>مُعرَّف التنبيه</th> <th>الحزمة</th></tr>
+<dsa 2021 4959 thunderbird>
+<dsa 2021 4960 haproxy>
+<dsa 2021 4961 tor>
+<dsa 2021 4962 ledgersmb>
+<dsa 2021 4963 openssl>
+<dsa 2021 4964 grilo>
+<dsa 2021 4965 libssh>
+<dsa 2021 4966 gpac>
+<dsa 2021 4967 squashfs-tools>
+<dsa 2021 4968 haproxy>
+<dsa 2021 4969 firefox-esr>
+<dsa 2021 4970 postorius>
+<dsa 2021 4971 ntfs-3g>
+<dsa 2021 4972 ghostscript>
+<dsa 2021 4973 thunderbird>
+<dsa 2021 4974 nextcloud-desktop>
+<dsa 2021 4975 webkit2gtk>
+<dsa 2021 4976 wpewebkit>
+<dsa 2021 4977 xen>
+<dsa 2021 4978 linux-signed-amd64>
+<dsa 2021 4978 linux-signed-arm64>
+<dsa 2021 4978 linux-signed-i386>
+<dsa 2021 4978 linux>
+<dsa 2021 4979 mediawiki>
+</table>
+
+<p>
+خلال مرحلة تجميد bullseye، بعض التحديثات أُصدرت عبر
+<a href="https://security.debian.org/">أرشيف الأمان</a>
+دون إرفاقها بتنبيهات أمان دبيان (DSA)
+هذه التحديثات مفصلة أدناه :
+</p>
+
+<table border=0>
+<tr><th>الحزمة</th> <th>السبب</th></tr>
+<correction apache2 "Fix mod_proxy HTTP2 request line injection [CVE-2021-33193]">
+<correction btrbk "Fix arbitrary code execution issue [CVE-2021-38173]">
+<correction c-ares "Fix missing input validation on hostnames returned by DNS servers [CVE-2021-3672]">
+<correction exiv2 "Fix overflow issues [CVE-2021-29457 CVE-2021-31292]">
+<correction firefox-esr "New upstream stable release [CVE-2021-29980 CVE-2021-29984 CVE-2021-29985 CVE-2021-29986 CVE-2021-29988 CVE-2021-29989]">
+<correction libencode-perl "Encode: mitigate @INC pollution when loading ConfigLocal [CVE-2021-36770]">
+<correction libspf2 "spf_compile.c: Correct size of ds_avail [CVE-2021-20314]; fix <q>reverse</q> macro modifier">
+<correction lynx "Fix leakage of credentials if SNI was used together with a URL containing credentials [CVE-2021-38165]">
+<correction nodejs "New upstream stable release; fix use after free issue [CVE-2021-22930]">
+<correction tomcat9 "Fix authentication bypass issue [CVE-2021-30640] and request smuggling issue [CVE-2021-33037]">
+<correction xmlgraphics-commons "Fix server side request forgery issue [CVE-2020-11988]">
+</table>
+
+
+<h2>مُثبِّت دبيان</h2>
+<p>
+حُدِّث المُثبِّت ليتضمن الإصلاحات المندرجة في هذا الإصدار المستقر.
+</p>
+
+<h2>المسارات</h2>
+
+<p>
+القائمة الكاملة للحُزم المُغيّرة في هذه المراجعة :
+</p>
+
+<div class="center">
+ <url "https://deb.debian.org/debian/dists/<downcase <codename>>/ChangeLog">
+</div>
+
+<p>التوزيعة المستقرة الحالية :</p>
+
+<div class="center">
+ <url "https://deb.debian.org/debian/dists/stable/">
+</div>
+
+<p>التحديثات المقترحة للتوزيعة المستقرة :</p>
+
+<div class="center">
+ <url "https://deb.debian.org/debian/dists/proposed-updates">
+</div>
+
+<p>معلومات حول التوزيعة المستقرة (ملاحظات الإصدار والأخطاء إلخ) :</p>
+
+<div class="center">
+ <a
+ href="$(HOME)/releases/stable/">https://www.debian.org/releases/stable/</a>
+</div>
+
+<p>معلومات وإعلانات الأمان :</p>
+
+<div class="center">
+ <a href="$(HOME)/security/">https://www.debian.org/security/</a>
+</div>
+
+<h2>حول دبيان</h2>
+
+<p>
+مشروع دبيان هو اتحاد لمطوري البرمجيات الحُرّة تطوعوا بالوقت والمجهود لإنتاج نظام تشعيل دبيان حُر بالكامل.
+</p>
+
+<h2>معلومات الاتصال</h2>
+
+<p>
+لمزيد من المعلومات يُرجى زيارة موقع دبيان
+<a href="$(HOME)/">https://www.debian.org/</a>
+أو الاتصال بفريق إصدار المستقرة على
+&lt;debian-release@lists.debian.org&gt;.</p>
diff --git a/arabic/News/2021/2021100902.wml b/arabic/News/2021/2021100902.wml
new file mode 100644
index 00000000000..e80093b16a7
--- /dev/null
+++ b/arabic/News/2021/2021100902.wml
@@ -0,0 +1,253 @@
+#use wml::debian::translation-check
+translation="d9e5cd3d7df23feb17458b95c465e062e9cd6e5a" maintainer="med"
+
+<define-tag pagetitle>تحديث دبيان 10 : الإصدار 10.11</define-tag>
+<define-tag release_date>2021-10-09</define-tag>
+#use wml::debian::news
+# $Id:
+
+<define-tag release>10</define-tag>
+<define-tag codename>buster</define-tag>
+<define-tag revision>10.11</define-tag>
+
+<define-tag dsa>
+ <tr><td align="center"><a href="$(HOME)/security/%0/dsa-%1">DSA-%1</a></td>
+ <td align="center"><:
+ my @p = ();
+ for my $p (split (/,\s*/, "%2")) {
+ push (@p, sprintf ('<a href="https://packages.debian.org/src:%s">%s</a>', $p, $p));
+ }
+ print join (", ", @p);
+:></td></tr>
+</define-tag>
+
+<define-tag correction>
+ <tr><td><a href="https://packages.debian.org/src:%0">%0</a></td> <td>%1</td></tr>
+</define-tag>
+
+<define-tag srcpkg><a href="https://packages.debian.org/src:%0">%0</a></define-tag>
+
+<p>
+يُسعد مشروع دبيان الإعلان عن التحديث الحادي عشر لتوزيعته المستقرة القديمة دبيان <release> (الاسم الرمزي <q><codename></q>).
+بالإضافة إلى تسوية بعض المشكلات الحرجة يُصلح هذا التحديث بالأساس مشاكلات الأمان. تنبيهات الأمان أُعلنت بشكل منفصِل وفقط مُشار إليها في هذا الإعلان.
+</p>
+
+<p>
+يُرجى ملاحظة أن هذا التحديث لا يُشكّل إصدار جديد لدبيان <release> بل فقط تحديثات لبعض الحُزم المُضمّنة
+وبالتالي ليس بالضرورة رميُ الوسائط القديمة للإصدار <q><codename></q>، يمكن تحديث الحُزم باستخدام مرآة دبيان مُحدّثة.
+</p>
+
+<p>
+الذين يُثبّتون التحديثات من security.debian.org باستمرار لن يكون عليهم تحديث العديد من الحُزم،
+أغلب التحديثات مُضمّنة في هذا التحديث.
+</p>
+
+<p>
+صور جديدة لأقراص التثبيت ستكون متوفرة في موضِعها المعتاد.
+</p>
+
+<p>
+يمكن الترقية من تثبيت آنِيّ إلى هذه المراجعة بتوجيه نظام إدارة الحُزم إلى إحدى مرايا HTTP الخاصة بدبيان.
+قائمة شاملة لمرايا دبيان على المسار :
+</p>
+
+<div class="center">
+ <a href="$(HOME)/mirror/list">https://www.debian.org/mirror/list</a>
+</div>
+
+
+<h2>إصلاح العديد من العِلاّت</h2>
+
+<p>هذا التحديث للإصدار المستقر القديم أضاف بعض الإصلاحات المهمة للحُزم التالية :</p>
+
+<table border=0>
+<tr><th>الحزمة</th> <th>السبب</th></tr>
+<correction atftp "Fix buffer overflow [CVE-2021-41054]">
+<correction base-files "Update for the 10.11 point release">
+<correction btrbk "Fix arbitrary code execution issue [CVE-2021-38173]">
+<correction clamav "New upstream stable release; fix clamdscan segfaults when --fdpass and --multipass are used together with ExcludePath">
+<correction commons-io "Fix path traversal issue [CVE-2021-29425]">
+<correction cyrus-imapd "Fix denial-of-service issue [CVE-2021-33582]">
+<correction debconf "Check that whiptail or dialog is actually usable">
+<correction debian-installer "Rebuild against buster-proposed-updates; update Linux ABI to 4.19.0-18">
+<correction debian-installer-netboot-images "Rebuild against buster-proposed-updates">
+<correction distcc "Fix GCC cross-compiler links in update-distcc-symlinks and add support for clang and CUDA (nvcc)">
+<correction distro-info-data "Update included data for several releases">
+<correction dwarf-fortress "Remove undistributable prebuilt shared libraries from the source tarball">
+<correction espeak-ng "Fix using espeak with mbrola-fr4 when mbrola-fr1 is not installed">
+<correction gcc-mingw-w64 "Fix gcov handling">
+<correction gthumb "Fix heap-based buffer overflow issue [CVE-2019-20326]">
+<correction hg-git "Fix test failures with recent git versions">
+<correction htslib "Fix autopkgtest on i386">
+<correction http-parser "Fix HTTP request smuggling issue [CVE-2019-15605]">
+<correction irssi "Fix use after free issue when sending SASL login to the server [CVE-2019-13045]">
+<correction java-atk-wrapper "Also use dbus to detect accessibility being enabled">
+<correction krb5 "Fix KDC null dereference crash on FAST request with no server field [CVE-2021-37750]; fix memory leak in krb5_gss_inquire_cred">
+<correction libdatetime-timezone-perl "New upstream stable release; update DST rules for Samoa and Jordon; confirmation of no leap second on 2021-12-31">
+<correction libpam-tacplus "Prevent shared secrets from being added in plaintext to the system log [CVE-2020-13881]">
+<correction linux "<q>proc: Track /proc/$pid/attr/ opener mm_struct</q>, fixing issues with lxc-attach; new upstream stable release; increase ABI version to 18; [rt] Update to 4.19.207-rt88; usb: hso: fix error handling code of hso_create_net_device [CVE-2021-37159]">
+<correction linux-latest "Update to 4.19.0-18 kernel ABI">
+<correction linux-signed-amd64 "<q>proc: Track /proc/$pid/attr/ opener mm_struct</q>, fixing issues with lxc-attach; new upstream stable release; increase ABI version to 18; [rt] Update to 4.19.207-rt88; usb: hso: fix error handling code of hso_create_net_device [CVE-2021-37159]">
+<correction linux-signed-arm64 "<q>proc: Track /proc/$pid/attr/ opener mm_struct</q>, fixing issues with lxc-attach; new upstream stable release; increase ABI version to 18; [rt] Update to 4.19.207-rt88; usb: hso: fix error handling code of hso_create_net_device [CVE-2021-37159]">
+<correction linux-signed-i386 "<q>proc: Track /proc/$pid/attr/ opener mm_struct</q>, fixing issues with lxc-attach; new upstream stable release; increase ABI version to 18; [rt] Update to 4.19.207-rt88; usb: hso: fix error handling code of hso_create_net_device [CVE-2021-37159]">
+<correction mariadb-10.3 "New upstream stable release; security fixes [CVE-2021-2389 CVE-2021-2372]; fix Perl executable path in scripts">
+<correction modsecurity-crs "Fix request body bypass issue [CVE-2021-35368]">
+<correction node-ansi-regex "Fix regular expression-based denial of service issue [CVE-2021-3807]">
+<correction node-axios "Fix regular expression-based denial of service issue [CVE-2021-3749]">
+<correction node-jszip "Use a null prototype object for this.files [CVE-2021-23413]">
+<correction node-tar "Remove non-directory paths from the directory cache [CVE-2021-32803]; strip absolute paths more comprehensively [CVE-2021-32804]">
+<correction nvidia-cuda-toolkit "Fix setting of NVVMIR_LIBRARY_DIR on ppc64el">
+<correction nvidia-graphics-drivers "New upstream stable release; fix denial of service issues [CVE-2021-1093 CVE-2021-1094 CVE-2021-1095]; nvidia-driver-libs: Add Recommends: libnvidia-encode1">
+<correction nvidia-graphics-drivers-legacy-390xx "New upstream stable release; fix denial of service issues [CVE-2021-1093 CVE-2021-1094 CVE-2021-1095]; nvidia-legacy-390xx-driver-libs: Add Recommends: libnvidia-legacy-390xx-encode1">
+<correction postgresql-11 "New upstream stable release; fix mis-planning of repeated application of a projection step [CVE-2021-3677]; disallow SSL renegotiation more completely">
+<correction proftpd-dfsg "Fix <q>mod_radius leaks memory contents to radius server</q>, <q>cannot disable client-initiated renegotiation for FTPS</q>, navigation into symlinked directories, mod_sftp crash when using pubkey-auth with DSA keys">
+<correction psmisc "Fix regression in killall not matching process with names longer than 15 characters">
+<correction python-uflash "Update firmware URL">
+<correction request-tracker4 "Fix login timing side-channel attack issue [CVE-2021-38562]">
+<correction ring "Fix denial of service issue in the embedded copy of pjproject [CVE-2021-21375]">
+<correction sabnzbdplus "Prevent directory escape in renamer function [CVE-2021-29488]">
+<correction shim "Add arm64 patch to tweak section layout and stop crashing problems; in insecure mode, don't abort if we can't create the MokListXRT variable; don't abort on grub installation failures; warn instead">
+<correction shim-helpers-amd64-signed "Add arm64 patch to tweak section layout and stop crashing problems; in insecure mode, don't abort if we can't create the MokListXRT variable; don't abort on grub installation failures; warn instead">
+<correction shim-helpers-arm64-signed "Add arm64 patch to tweak section layout and stop crashing problems; in insecure mode, don't abort if we can't create the MokListXRT variable; don't abort on grub installation failures; warn instead">
+<correction shim-helpers-i386-signed "Add arm64 patch to tweak section layout and stop crashing problems; in insecure mode, don't abort if we can't create the MokListXRT variable; don't abort on grub installation failures; warn instead">
+<correction shim-signed "Work around boot-breaking issues on arm64 by including an older known working version of unsigned shim on that platform; switch arm64 back to using a current unsigned build; add arm64 patch to tweak section layout and stop crashing problems; in insecure mode, don't abort if we can't create the MokListXRT variable; don't abort on grub installation failures; warn instead">
+<correction shiro "Fix authentication bypass issues [CVE-2020-1957 CVE-2020-11989 CVE-2020-13933 CVE-2020-17510]; update Spring Framework compatibility patch; support Guice 4">
+<correction tzdata "Update DST rules for Samoa and Jordan; confirm the absence of a leap second on 2021-12-31">
+<correction ublock-origin "New upstream stable release; fix denial of service issue [CVE-2021-36773]">
+<correction ulfius "Ensure memory is initialised before use [CVE-2021-40540]">
+<correction xmlgraphics-commons "Fix Server-Side Request Forgery issue [CVE-2020-11988]">
+<correction yubikey-manager "Add missing dependency on python3-pkg-resources to yubikey-manager">
+</table>
+
+
+<h2>تحديثات الأمان</h2>
+
+
+<p>
+أضافت هذه المراجعة تحديثات الأمان التالية للإصدار المستقر القديم.
+سبَق لفريق الأمان نشر تنبيه لكل تحديث :
+</p>
+
+<table border=0>
+<tr><th>مُعرَّف التنبيه</th> <th>الحزمة</th></tr>
+<dsa 2021 4842 thunderbird>
+<dsa 2021 4866 thunderbird>
+<dsa 2021 4876 thunderbird>
+<dsa 2021 4897 thunderbird>
+<dsa 2021 4927 thunderbird>
+<dsa 2021 4931 xen>
+<dsa 2021 4932 tor>
+<dsa 2021 4933 nettle>
+<dsa 2021 4934 intel-microcode>
+<dsa 2021 4935 php7.3>
+<dsa 2021 4936 libuv1>
+<dsa 2021 4937 apache2>
+<dsa 2021 4938 linuxptp>
+<dsa 2021 4939 firefox-esr>
+<dsa 2021 4940 thunderbird>
+<dsa 2021 4941 linux-signed-amd64>
+<dsa 2021 4941 linux-signed-arm64>
+<dsa 2021 4941 linux-signed-i386>
+<dsa 2021 4941 linux>
+<dsa 2021 4942 systemd>
+<dsa 2021 4943 lemonldap-ng>
+<dsa 2021 4944 krb5>
+<dsa 2021 4945 webkit2gtk>
+<dsa 2021 4946 openjdk-11-jre-dcevm>
+<dsa 2021 4946 openjdk-11>
+<dsa 2021 4947 libsndfile>
+<dsa 2021 4948 aspell>
+<dsa 2021 4949 jetty9>
+<dsa 2021 4950 ansible>
+<dsa 2021 4951 bluez>
+<dsa 2021 4952 tomcat9>
+<dsa 2021 4953 lynx>
+<dsa 2021 4954 c-ares>
+<dsa 2021 4955 libspf2>
+<dsa 2021 4956 firefox-esr>
+<dsa 2021 4957 trafficserver>
+<dsa 2021 4958 exiv2>
+<dsa 2021 4959 thunderbird>
+<dsa 2021 4961 tor>
+<dsa 2021 4962 ledgersmb>
+<dsa 2021 4963 openssl>
+<dsa 2021 4964 grilo>
+<dsa 2021 4967 squashfs-tools>
+<dsa 2021 4969 firefox-esr>
+<dsa 2021 4970 postorius>
+<dsa 2021 4971 ntfs-3g>
+<dsa 2021 4973 thunderbird>
+<dsa 2021 4974 nextcloud-desktop>
+<dsa 2021 4975 webkit2gtk>
+<dsa 2021 4979 mediawiki>
+</table>
+
+
+<h2>الحُزم المزالة</h2>
+
+<p>
+الحُزم التالية أزيلت لأسباب خارجة عن سيطرتنا :
+</p>
+
+<table border=0>
+<tr><th>الحزمة</th> <th>السبب</th></tr>
+<correction birdtray "Incompatible with newer Thunderbird versions">
+<correction libprotocol-acme-perl "Only supports obsolete ACME version 1">
+
+</table>
+
+<h2>مُثبِّت دبيان</h2>
+<p>
+حُدِّث المُثبِّت ليتضمن الإصلاحات المندرجة في هذا الإصدار المستقر.
+</p>
+
+<h2>المسارات</h2>
+
+<p>
+القائمة الكاملة للحُزم المُغيّرة في هذه المراجعة :
+</p>
+
+<div class="center">
+ <url "https://deb.debian.org/debian/dists/<downcase <codename>>/ChangeLog">
+</div>
+
+<p>التوزيعة المستقرة الحالية :</p>
+
+<div class="center">
+ <url "https://deb.debian.org/debian/dists/oldstable/">
+</div>
+
+<p>التحديثات المقترحة للتوزيعة المستقرة القديمة :</p>
+
+<div class="center">
+ <url "https://deb.debian.org/debian/dists/oldstable-proposed-updates">
+</div>
+
+<p>معلومات حول التوزيعة المستقرة القديمة (ملاحظات الإصدار والأخطاء إلخ) :</p>
+
+<div class="center">
+ <a
+ href="$(HOME)/releases/oldstable/">https://www.debian.org/releases/oldstable/</a>
+</div>
+
+<p>معلومات وإعلانات الأمان :</p>
+
+<div class="center">
+ <a href="$(HOME)/security/">https://www.debian.org/security/</a>
+</div>
+
+<h2>حول دبيان</h2>
+
+<p>
+مشروع دبيان هو اتحاد لمطوري البرمجيات الحُرّة تطوعوا بالوقت والمجهود لإنتاج نظام تشعيل دبيان حُر بالكامل.
+</p>
+
+<h2>معلومات الاتصال</h2>
+
+<p>
+لمزيد من المعلومات يُرجى زيارة موقع دبيان
+<a href="$(HOME)/">https://www.debian.org/</a>
+أو الاتصال بفريق إصدار المستقرة على
+&lt;debian-release@lists.debian.org&gt;.</p>
+
+

© 2014-2024 Faster IT GmbH | imprint | privacy policy