diff options
author | Med <2029-med@users.noreply.salsa.debian.org> | 2021-10-10 09:13:01 +0000 |
---|---|---|
committer | Med <2029-med@users.noreply.salsa.debian.org> | 2021-10-10 09:13:01 +0000 |
commit | d8d0ddc2eb268ede76ea8efaaa49a648c8ef3f71 (patch) | |
tree | 35b260ea1ed4d8db99966574391a6c9ce945acc9 /arabic/News | |
parent | d0c5f310bce71e9cb8a6ca551c37533c17b3a8e1 (diff) |
(ar) News/2021, add translations of announcements for 11.1 and 10.11
Diffstat (limited to 'arabic/News')
-rw-r--r-- | arabic/News/2021/20211009.wml | 254 | ||||
-rw-r--r-- | arabic/News/2021/2021100902.wml | 253 |
2 files changed, 507 insertions, 0 deletions
diff --git a/arabic/News/2021/20211009.wml b/arabic/News/2021/20211009.wml new file mode 100644 index 00000000000..84ad2814e8d --- /dev/null +++ b/arabic/News/2021/20211009.wml @@ -0,0 +1,254 @@ +#use wml::debian::translation-check +translation="d9e5cd3d7df23feb17458b95c465e062e9cd6e5a" maintainer="med" + +<define-tag pagetitle>تحديث دبيان 11 : الإصدار 11.1</define-tag> +<define-tag release_date>2021-10-09</define-tag> +#use wml::debian::news +# $Id: + +<define-tag release>11</define-tag> +<define-tag codename>bullseye</define-tag> +<define-tag revision>11.1</define-tag> + +<define-tag dsa> + <tr><td align="center"><a href="$(HOME)/security/%0/dsa-%1">DSA-%1</a></td> + <td align="center"><: + my @p = (); + for my $p (split (/,\s*/, "%2")) { + push (@p, sprintf ('<a href="https://packages.debian.org/src:%s">%s</a>', $p, $p)); + } + print join (", ", @p); +:></td></tr> +</define-tag> + +<define-tag correction> + <tr><td><a href="https://packages.debian.org/src:%0">%0</a></td> <td>%1</td></tr> +</define-tag> + +<define-tag srcpkg><a href="https://packages.debian.org/src:%0">%0</a></define-tag> + +<p> +يُسعد مشروع دبيان الإعلان عن التحديث الأول لتوزيعته المستقرة دبيان <release> (الاسم الرمزي <q><codename></q>). +بالإضافة إلى تسوية بعض المشكلات الحرجة يُصلح هذا التحديث بالأساس مشاكلات الأمان. تنبيهات الأمان أُعلنت بشكل منفصِل وفقط مُشار إليها في هذا الإعلان. +</p> + +<p> +يُرجى ملاحظة أن هذا التحديث لا يُشكّل إصدار جديد لدبيان <release> بل فقط تحديثات لبعض الحُزم المُضمّنة +وبالتالي ليس بالضرورة رميُ الوسائط القديمة للإصدار <q><codename></q>، يمكن تحديث الحُزم باستخدام مرآة دبيان مُحدّثة. +</p> + +<p> +الذين يُثبّتون التحديثات من security.debian.org باستمرار لن يكون عليهم تحديث العديد من الحُزم، +أغلب التحديثات مُضمّنة في هذا التحديث. +</p> + +<p> +صور جديدة لأقراص التثبيت ستكون متوفرة في موضِعها المعتاد. +</p> + +<p> +يمكن الترقية من تثبيت آنِيّ إلى هذه المراجعة بتوجيه نظام إدارة الحُزم إلى إحدى مرايا HTTP الخاصة بدبيان. +قائمة شاملة لمرايا دبيان على المسار : +</p> + +<div class="center"> + <a href="$(HOME)/mirror/list">https://www.debian.org/mirror/list</a> +</div> + + +<h2>إصلاح العديد من العِلاّت</h2> + +<p>هذا التحديث للإصدار المستقر أضاف بعض الإصلاحات المهمة للحُزم التالية :</p> + +<table border=0> +<tr><th>الحزمة</th> <th>السبب</th></tr> +<correction apr "Prevent out-of-bounds array dereference"> +<correction atftp "Fix buffer overflow [CVE-2021-41054]"> +<correction automysqlbackup "Fix crash when using <q>LATEST=yes</q>"> +<correction base-files "Update for the 11.1 point release"> +<correction clamav "New upstream stable release; fix clamdscan segfaults when --fdpass and --multipass are used together with ExcludePath"> +<correction cloud-init "Avoid duplicate includedir in /etc/sudoers"> +<correction cyrus-imapd "Fix denial-of-service issue [CVE-2021-33582]"> +<correction dazzdb "Fix a use-after-free in DBstats"> +<correction debian-edu-config "debian-edu-ltsp-install: extend main server related exclude list; add slapd and xrdp-sesman to the list of masked services"> +<correction debian-installer "Rebuild against proposed updates; update Linux ABI to 5.10.0-9; use udebs from proposed-updates"> +<correction debian-installer-netboot-images "Rebuild against proposed-updates; use udebs from proposed-updates and stable; use xz-compressed Packages files"> +<correction detox "Fix handling of large files"> +<correction devscripts "Make the --bpo option target bullseye-backports"> +<correction dlt-viewer "Add missing qdlt/qdlt*.h header files to dev package"> +<correction dpdk "New upstream stable release"> +<correction fetchmail "Fix segmentation fault and security regression"> +<correction flatpak "New upstream stable release; don't inherit an unusual $XDG_RUNTIME_DIR setting into the sandbox"> +<correction freeradius "Fix thread crash and sample configuration"> +<correction galera-3 "New upstream stable release"> +<correction galera-4 "New upstream stable release; solve circular Conflicts with galera-3 by no longer providing a virtual <q>galera</q> package"> +<correction glewlwyd "Fix possible buffer overflow during FIDO2 signature validation in webauthn registration [CVE-2021-40818]"> +<correction glibc "Restart openssh-server even if it has been deconfigured during the upgrade; fix text fallback when debconf is unusable"> +<correction gnome-maps "New upstream stable release; fix a crash when starting up with last-used map type being aerial, and no aerial tile definition is found; don't sometimes write broken last view position on exit; fix hang when dragging around route markers"> +<correction gnome-shell "New upstream stable release; fix freeze after cancelling (some) system-modal dialogs; fix word suggestions in on-screen keyboard; fix crashes"> +<correction hdf5 "Adjust package dependencies to improve upgrade paths from older releases"> +<correction iotop-c "Properly handle UTF-8 process names"> +<correction jailkit "Fix creation of jails that need to use /dev; fix library presence check"> +<correction java-atk-wrapper "Also use dbus to detect accessibility being enabled"> +<correction krb5 "Fix KDC null dereference crash on FAST request with no server field [CVE-2021-37750]; fix memory leak in krb5_gss_inquire_cred"> +<correction libavif "Use correct libdir in libavif.pc pkgconfig file"> +<correction libbluray "Switch to embedded libasm; the version from libasm-java is too new"> +<correction libdatetime-timezone-perl "New upstream stable release; update DST rules for Samoa and Jordon; confirmation of no leap second on 2021-12-31"> +<correction libslirp "Fix multiple buffer overflow issues [CVE-2021-3592 CVE-2021-3593 CVE-2021-3594 CVE-2021-3595]"> +<correction linux "New upstream stable release; increase ABI to 9; [rt] Update to 5.10.65-rt53; [mipsel] bpf, mips: Validate conditional branch offsets [CVE-2021-38300]"> +<correction linux-signed-amd64 "New upstream stable release; increase ABI to 9; [rt] Update to 5.10.65-rt53; [mipsel] bpf, mips: Validate conditional branch offsets [CVE-2021-38300]"> +<correction linux-signed-arm64 "New upstream stable release; increase ABI to 9; [rt] Update to 5.10.65-rt53; [mipsel] bpf, mips: Validate conditional branch offsets [CVE-2021-38300]"> +<correction linux-signed-i386 "New upstream stable release; increase ABI to 9; [rt] Update to 5.10.65-rt53; [mipsel] bpf, mips: Validate conditional branch offsets [CVE-2021-38300]"> +<correction mariadb-10.5 "New upstream stable release; security fixes [CVE-2021-2372 CVE-2021-2389]"> +<correction mbrola "Fix end of file detection"> +<correction modsecurity-crs "Fix request body bypass issue [CVE-2021-35368]"> +<correction mtr "Fix regression in JSON output"> +<correction mutter "New upstream stable release; kms: Improve handling of common video modes that might exceed the possible bandwidth; ensure valid window texture size after viewport changes"> +<correction nautilus "Avoid opening multiple selected files in multiple application instances; don't save window size and position when tiled; fix some memory leaks; update translations"> +<correction node-ansi-regex "Fix regular expression-based denial of service issue [CVE-2021-3807]"> +<correction node-axios "Fix regular expression-based denial of service issue [CVE-2021-3749]"> +<correction node-object-path "Fix prototype pollution issues [CVE-2021-23434 CVE-2021-3805]"> +<correction node-prismjs "Fix regular expression-based denial of service issue [CVE-2021-3801]"> +<correction node-set-value "Fix prototype pollution [CVE-2021-23440]"> +<correction node-tar "Remove non-directory paths from the directory cache [CVE-2021-32803]; strip absolute paths more comprehensively [CVE-2021-32804]"> +<correction osmcoastline "Fix projections other than WGS84"> +<correction osmpbf "Rebuild against protobuf 3.12.4"> +<correction pam "Fix syntax error in libpam0g.postinst when a systemd unit fails"> +<correction perl "Security update; fix a regular expression memory leak"> +<correction pglogical "Update for PostgreSQL 13.4 snapshot handling fixes"> +<correction pmdk "Fix missing barriers after non-temporal memcpy"> +<correction postgresql-13 "New upstream stable release; fix mis-planning of repeated application of a projection step [CVE-2021-3677]; disallow SSL renegotiation more completely"> +<correction proftpd-dfsg "Fix <q>mod_radius leaks memory contents to radius server</q> and <q>sftp connection aborts with </q>Corrupted MAC on input""; skip escaping of already-escaped SQL text"> +<correction pyx3 "Fix horizontal font alignment issue with texlive 2020"> +<correction reportbug "Update suite names following bullseye release"> +<correction request-tracker4 "Fix login timing side-channel attack issue [CVE-2021-38562]"> +<correction rhonabwy "Fix JWE CBC tag computation and JWS alg:none signature verification"> +<correction rpki-trust-anchors "Add HTTPS URL to the LACNIC TAL"> +<correction rsync "Re-add --copy-devices; fix regression in --delay-updates; fix edge case in --mkpath; fix rsync-ssl; fix --sparce and --inplace; update options available to rrsync; documentation fixes"> +<correction ruby-rqrcode-rails3 "Fix for ruby-rqrcode 1.0 compatibility"> +<correction sabnzbdplus "Prevent directory escape in renamer function [CVE-2021-29488]"> +<correction shellcheck "Fix rendering of long options in manpage"> +<correction shiro "Fix authentication bypass issues [CVE-2020-1957 CVE-2020-11989 CVE-2020-13933 CVE-2020-17510]; update Spring Framework compatibility patch; support Guice 4"> +<correction speech-dispatcher "Fix setting of voice name for the generic module"> +<correction telegram-desktop "Avoid crash when auto-delete is enabled"> +<correction termshark "Include themes in package"> +<correction tmux "Fix a race condition which results in the config not being loaded if several clients are interacting with the server while it's initializing"> +<correction txt2man "Fix regression in handling display blocks"> +<correction tzdata "Update DST rules for Samoa and Jordan; confirm the absence of a leap second on 2021-12-31"> +<correction ublock-origin "New upstream stable release; fix denial of service issue [CVE-2021-36773]"> +<correction ulfius "Ensure memory is initialised before use [CVE-2021-40540]"> +</table> + + +<h2>تحديثات الأمان</h2> + + +<p> +أضافت هذه المراجعة تحديثات الأمان التالية للإصدار المستقر. +سبَق لفريق الأمان نشر تنبيه لكل تحديث : +</p> + +<table border=0> +<tr><th>مُعرَّف التنبيه</th> <th>الحزمة</th></tr> +<dsa 2021 4959 thunderbird> +<dsa 2021 4960 haproxy> +<dsa 2021 4961 tor> +<dsa 2021 4962 ledgersmb> +<dsa 2021 4963 openssl> +<dsa 2021 4964 grilo> +<dsa 2021 4965 libssh> +<dsa 2021 4966 gpac> +<dsa 2021 4967 squashfs-tools> +<dsa 2021 4968 haproxy> +<dsa 2021 4969 firefox-esr> +<dsa 2021 4970 postorius> +<dsa 2021 4971 ntfs-3g> +<dsa 2021 4972 ghostscript> +<dsa 2021 4973 thunderbird> +<dsa 2021 4974 nextcloud-desktop> +<dsa 2021 4975 webkit2gtk> +<dsa 2021 4976 wpewebkit> +<dsa 2021 4977 xen> +<dsa 2021 4978 linux-signed-amd64> +<dsa 2021 4978 linux-signed-arm64> +<dsa 2021 4978 linux-signed-i386> +<dsa 2021 4978 linux> +<dsa 2021 4979 mediawiki> +</table> + +<p> +خلال مرحلة تجميد bullseye، بعض التحديثات أُصدرت عبر +<a href="https://security.debian.org/">أرشيف الأمان</a> +دون إرفاقها بتنبيهات أمان دبيان (DSA) +هذه التحديثات مفصلة أدناه : +</p> + +<table border=0> +<tr><th>الحزمة</th> <th>السبب</th></tr> +<correction apache2 "Fix mod_proxy HTTP2 request line injection [CVE-2021-33193]"> +<correction btrbk "Fix arbitrary code execution issue [CVE-2021-38173]"> +<correction c-ares "Fix missing input validation on hostnames returned by DNS servers [CVE-2021-3672]"> +<correction exiv2 "Fix overflow issues [CVE-2021-29457 CVE-2021-31292]"> +<correction firefox-esr "New upstream stable release [CVE-2021-29980 CVE-2021-29984 CVE-2021-29985 CVE-2021-29986 CVE-2021-29988 CVE-2021-29989]"> +<correction libencode-perl "Encode: mitigate @INC pollution when loading ConfigLocal [CVE-2021-36770]"> +<correction libspf2 "spf_compile.c: Correct size of ds_avail [CVE-2021-20314]; fix <q>reverse</q> macro modifier"> +<correction lynx "Fix leakage of credentials if SNI was used together with a URL containing credentials [CVE-2021-38165]"> +<correction nodejs "New upstream stable release; fix use after free issue [CVE-2021-22930]"> +<correction tomcat9 "Fix authentication bypass issue [CVE-2021-30640] and request smuggling issue [CVE-2021-33037]"> +<correction xmlgraphics-commons "Fix server side request forgery issue [CVE-2020-11988]"> +</table> + + +<h2>مُثبِّت دبيان</h2> +<p> +حُدِّث المُثبِّت ليتضمن الإصلاحات المندرجة في هذا الإصدار المستقر. +</p> + +<h2>المسارات</h2> + +<p> +القائمة الكاملة للحُزم المُغيّرة في هذه المراجعة : +</p> + +<div class="center"> + <url "https://deb.debian.org/debian/dists/<downcase <codename>>/ChangeLog"> +</div> + +<p>التوزيعة المستقرة الحالية :</p> + +<div class="center"> + <url "https://deb.debian.org/debian/dists/stable/"> +</div> + +<p>التحديثات المقترحة للتوزيعة المستقرة :</p> + +<div class="center"> + <url "https://deb.debian.org/debian/dists/proposed-updates"> +</div> + +<p>معلومات حول التوزيعة المستقرة (ملاحظات الإصدار والأخطاء إلخ) :</p> + +<div class="center"> + <a + href="$(HOME)/releases/stable/">https://www.debian.org/releases/stable/</a> +</div> + +<p>معلومات وإعلانات الأمان :</p> + +<div class="center"> + <a href="$(HOME)/security/">https://www.debian.org/security/</a> +</div> + +<h2>حول دبيان</h2> + +<p> +مشروع دبيان هو اتحاد لمطوري البرمجيات الحُرّة تطوعوا بالوقت والمجهود لإنتاج نظام تشعيل دبيان حُر بالكامل. +</p> + +<h2>معلومات الاتصال</h2> + +<p> +لمزيد من المعلومات يُرجى زيارة موقع دبيان +<a href="$(HOME)/">https://www.debian.org/</a> +أو الاتصال بفريق إصدار المستقرة على +<debian-release@lists.debian.org>.</p> diff --git a/arabic/News/2021/2021100902.wml b/arabic/News/2021/2021100902.wml new file mode 100644 index 00000000000..e80093b16a7 --- /dev/null +++ b/arabic/News/2021/2021100902.wml @@ -0,0 +1,253 @@ +#use wml::debian::translation-check +translation="d9e5cd3d7df23feb17458b95c465e062e9cd6e5a" maintainer="med" + +<define-tag pagetitle>تحديث دبيان 10 : الإصدار 10.11</define-tag> +<define-tag release_date>2021-10-09</define-tag> +#use wml::debian::news +# $Id: + +<define-tag release>10</define-tag> +<define-tag codename>buster</define-tag> +<define-tag revision>10.11</define-tag> + +<define-tag dsa> + <tr><td align="center"><a href="$(HOME)/security/%0/dsa-%1">DSA-%1</a></td> + <td align="center"><: + my @p = (); + for my $p (split (/,\s*/, "%2")) { + push (@p, sprintf ('<a href="https://packages.debian.org/src:%s">%s</a>', $p, $p)); + } + print join (", ", @p); +:></td></tr> +</define-tag> + +<define-tag correction> + <tr><td><a href="https://packages.debian.org/src:%0">%0</a></td> <td>%1</td></tr> +</define-tag> + +<define-tag srcpkg><a href="https://packages.debian.org/src:%0">%0</a></define-tag> + +<p> +يُسعد مشروع دبيان الإعلان عن التحديث الحادي عشر لتوزيعته المستقرة القديمة دبيان <release> (الاسم الرمزي <q><codename></q>). +بالإضافة إلى تسوية بعض المشكلات الحرجة يُصلح هذا التحديث بالأساس مشاكلات الأمان. تنبيهات الأمان أُعلنت بشكل منفصِل وفقط مُشار إليها في هذا الإعلان. +</p> + +<p> +يُرجى ملاحظة أن هذا التحديث لا يُشكّل إصدار جديد لدبيان <release> بل فقط تحديثات لبعض الحُزم المُضمّنة +وبالتالي ليس بالضرورة رميُ الوسائط القديمة للإصدار <q><codename></q>، يمكن تحديث الحُزم باستخدام مرآة دبيان مُحدّثة. +</p> + +<p> +الذين يُثبّتون التحديثات من security.debian.org باستمرار لن يكون عليهم تحديث العديد من الحُزم، +أغلب التحديثات مُضمّنة في هذا التحديث. +</p> + +<p> +صور جديدة لأقراص التثبيت ستكون متوفرة في موضِعها المعتاد. +</p> + +<p> +يمكن الترقية من تثبيت آنِيّ إلى هذه المراجعة بتوجيه نظام إدارة الحُزم إلى إحدى مرايا HTTP الخاصة بدبيان. +قائمة شاملة لمرايا دبيان على المسار : +</p> + +<div class="center"> + <a href="$(HOME)/mirror/list">https://www.debian.org/mirror/list</a> +</div> + + +<h2>إصلاح العديد من العِلاّت</h2> + +<p>هذا التحديث للإصدار المستقر القديم أضاف بعض الإصلاحات المهمة للحُزم التالية :</p> + +<table border=0> +<tr><th>الحزمة</th> <th>السبب</th></tr> +<correction atftp "Fix buffer overflow [CVE-2021-41054]"> +<correction base-files "Update for the 10.11 point release"> +<correction btrbk "Fix arbitrary code execution issue [CVE-2021-38173]"> +<correction clamav "New upstream stable release; fix clamdscan segfaults when --fdpass and --multipass are used together with ExcludePath"> +<correction commons-io "Fix path traversal issue [CVE-2021-29425]"> +<correction cyrus-imapd "Fix denial-of-service issue [CVE-2021-33582]"> +<correction debconf "Check that whiptail or dialog is actually usable"> +<correction debian-installer "Rebuild against buster-proposed-updates; update Linux ABI to 4.19.0-18"> +<correction debian-installer-netboot-images "Rebuild against buster-proposed-updates"> +<correction distcc "Fix GCC cross-compiler links in update-distcc-symlinks and add support for clang and CUDA (nvcc)"> +<correction distro-info-data "Update included data for several releases"> +<correction dwarf-fortress "Remove undistributable prebuilt shared libraries from the source tarball"> +<correction espeak-ng "Fix using espeak with mbrola-fr4 when mbrola-fr1 is not installed"> +<correction gcc-mingw-w64 "Fix gcov handling"> +<correction gthumb "Fix heap-based buffer overflow issue [CVE-2019-20326]"> +<correction hg-git "Fix test failures with recent git versions"> +<correction htslib "Fix autopkgtest on i386"> +<correction http-parser "Fix HTTP request smuggling issue [CVE-2019-15605]"> +<correction irssi "Fix use after free issue when sending SASL login to the server [CVE-2019-13045]"> +<correction java-atk-wrapper "Also use dbus to detect accessibility being enabled"> +<correction krb5 "Fix KDC null dereference crash on FAST request with no server field [CVE-2021-37750]; fix memory leak in krb5_gss_inquire_cred"> +<correction libdatetime-timezone-perl "New upstream stable release; update DST rules for Samoa and Jordon; confirmation of no leap second on 2021-12-31"> +<correction libpam-tacplus "Prevent shared secrets from being added in plaintext to the system log [CVE-2020-13881]"> +<correction linux "<q>proc: Track /proc/$pid/attr/ opener mm_struct</q>, fixing issues with lxc-attach; new upstream stable release; increase ABI version to 18; [rt] Update to 4.19.207-rt88; usb: hso: fix error handling code of hso_create_net_device [CVE-2021-37159]"> +<correction linux-latest "Update to 4.19.0-18 kernel ABI"> +<correction linux-signed-amd64 "<q>proc: Track /proc/$pid/attr/ opener mm_struct</q>, fixing issues with lxc-attach; new upstream stable release; increase ABI version to 18; [rt] Update to 4.19.207-rt88; usb: hso: fix error handling code of hso_create_net_device [CVE-2021-37159]"> +<correction linux-signed-arm64 "<q>proc: Track /proc/$pid/attr/ opener mm_struct</q>, fixing issues with lxc-attach; new upstream stable release; increase ABI version to 18; [rt] Update to 4.19.207-rt88; usb: hso: fix error handling code of hso_create_net_device [CVE-2021-37159]"> +<correction linux-signed-i386 "<q>proc: Track /proc/$pid/attr/ opener mm_struct</q>, fixing issues with lxc-attach; new upstream stable release; increase ABI version to 18; [rt] Update to 4.19.207-rt88; usb: hso: fix error handling code of hso_create_net_device [CVE-2021-37159]"> +<correction mariadb-10.3 "New upstream stable release; security fixes [CVE-2021-2389 CVE-2021-2372]; fix Perl executable path in scripts"> +<correction modsecurity-crs "Fix request body bypass issue [CVE-2021-35368]"> +<correction node-ansi-regex "Fix regular expression-based denial of service issue [CVE-2021-3807]"> +<correction node-axios "Fix regular expression-based denial of service issue [CVE-2021-3749]"> +<correction node-jszip "Use a null prototype object for this.files [CVE-2021-23413]"> +<correction node-tar "Remove non-directory paths from the directory cache [CVE-2021-32803]; strip absolute paths more comprehensively [CVE-2021-32804]"> +<correction nvidia-cuda-toolkit "Fix setting of NVVMIR_LIBRARY_DIR on ppc64el"> +<correction nvidia-graphics-drivers "New upstream stable release; fix denial of service issues [CVE-2021-1093 CVE-2021-1094 CVE-2021-1095]; nvidia-driver-libs: Add Recommends: libnvidia-encode1"> +<correction nvidia-graphics-drivers-legacy-390xx "New upstream stable release; fix denial of service issues [CVE-2021-1093 CVE-2021-1094 CVE-2021-1095]; nvidia-legacy-390xx-driver-libs: Add Recommends: libnvidia-legacy-390xx-encode1"> +<correction postgresql-11 "New upstream stable release; fix mis-planning of repeated application of a projection step [CVE-2021-3677]; disallow SSL renegotiation more completely"> +<correction proftpd-dfsg "Fix <q>mod_radius leaks memory contents to radius server</q>, <q>cannot disable client-initiated renegotiation for FTPS</q>, navigation into symlinked directories, mod_sftp crash when using pubkey-auth with DSA keys"> +<correction psmisc "Fix regression in killall not matching process with names longer than 15 characters"> +<correction python-uflash "Update firmware URL"> +<correction request-tracker4 "Fix login timing side-channel attack issue [CVE-2021-38562]"> +<correction ring "Fix denial of service issue in the embedded copy of pjproject [CVE-2021-21375]"> +<correction sabnzbdplus "Prevent directory escape in renamer function [CVE-2021-29488]"> +<correction shim "Add arm64 patch to tweak section layout and stop crashing problems; in insecure mode, don't abort if we can't create the MokListXRT variable; don't abort on grub installation failures; warn instead"> +<correction shim-helpers-amd64-signed "Add arm64 patch to tweak section layout and stop crashing problems; in insecure mode, don't abort if we can't create the MokListXRT variable; don't abort on grub installation failures; warn instead"> +<correction shim-helpers-arm64-signed "Add arm64 patch to tweak section layout and stop crashing problems; in insecure mode, don't abort if we can't create the MokListXRT variable; don't abort on grub installation failures; warn instead"> +<correction shim-helpers-i386-signed "Add arm64 patch to tweak section layout and stop crashing problems; in insecure mode, don't abort if we can't create the MokListXRT variable; don't abort on grub installation failures; warn instead"> +<correction shim-signed "Work around boot-breaking issues on arm64 by including an older known working version of unsigned shim on that platform; switch arm64 back to using a current unsigned build; add arm64 patch to tweak section layout and stop crashing problems; in insecure mode, don't abort if we can't create the MokListXRT variable; don't abort on grub installation failures; warn instead"> +<correction shiro "Fix authentication bypass issues [CVE-2020-1957 CVE-2020-11989 CVE-2020-13933 CVE-2020-17510]; update Spring Framework compatibility patch; support Guice 4"> +<correction tzdata "Update DST rules for Samoa and Jordan; confirm the absence of a leap second on 2021-12-31"> +<correction ublock-origin "New upstream stable release; fix denial of service issue [CVE-2021-36773]"> +<correction ulfius "Ensure memory is initialised before use [CVE-2021-40540]"> +<correction xmlgraphics-commons "Fix Server-Side Request Forgery issue [CVE-2020-11988]"> +<correction yubikey-manager "Add missing dependency on python3-pkg-resources to yubikey-manager"> +</table> + + +<h2>تحديثات الأمان</h2> + + +<p> +أضافت هذه المراجعة تحديثات الأمان التالية للإصدار المستقر القديم. +سبَق لفريق الأمان نشر تنبيه لكل تحديث : +</p> + +<table border=0> +<tr><th>مُعرَّف التنبيه</th> <th>الحزمة</th></tr> +<dsa 2021 4842 thunderbird> +<dsa 2021 4866 thunderbird> +<dsa 2021 4876 thunderbird> +<dsa 2021 4897 thunderbird> +<dsa 2021 4927 thunderbird> +<dsa 2021 4931 xen> +<dsa 2021 4932 tor> +<dsa 2021 4933 nettle> +<dsa 2021 4934 intel-microcode> +<dsa 2021 4935 php7.3> +<dsa 2021 4936 libuv1> +<dsa 2021 4937 apache2> +<dsa 2021 4938 linuxptp> +<dsa 2021 4939 firefox-esr> +<dsa 2021 4940 thunderbird> +<dsa 2021 4941 linux-signed-amd64> +<dsa 2021 4941 linux-signed-arm64> +<dsa 2021 4941 linux-signed-i386> +<dsa 2021 4941 linux> +<dsa 2021 4942 systemd> +<dsa 2021 4943 lemonldap-ng> +<dsa 2021 4944 krb5> +<dsa 2021 4945 webkit2gtk> +<dsa 2021 4946 openjdk-11-jre-dcevm> +<dsa 2021 4946 openjdk-11> +<dsa 2021 4947 libsndfile> +<dsa 2021 4948 aspell> +<dsa 2021 4949 jetty9> +<dsa 2021 4950 ansible> +<dsa 2021 4951 bluez> +<dsa 2021 4952 tomcat9> +<dsa 2021 4953 lynx> +<dsa 2021 4954 c-ares> +<dsa 2021 4955 libspf2> +<dsa 2021 4956 firefox-esr> +<dsa 2021 4957 trafficserver> +<dsa 2021 4958 exiv2> +<dsa 2021 4959 thunderbird> +<dsa 2021 4961 tor> +<dsa 2021 4962 ledgersmb> +<dsa 2021 4963 openssl> +<dsa 2021 4964 grilo> +<dsa 2021 4967 squashfs-tools> +<dsa 2021 4969 firefox-esr> +<dsa 2021 4970 postorius> +<dsa 2021 4971 ntfs-3g> +<dsa 2021 4973 thunderbird> +<dsa 2021 4974 nextcloud-desktop> +<dsa 2021 4975 webkit2gtk> +<dsa 2021 4979 mediawiki> +</table> + + +<h2>الحُزم المزالة</h2> + +<p> +الحُزم التالية أزيلت لأسباب خارجة عن سيطرتنا : +</p> + +<table border=0> +<tr><th>الحزمة</th> <th>السبب</th></tr> +<correction birdtray "Incompatible with newer Thunderbird versions"> +<correction libprotocol-acme-perl "Only supports obsolete ACME version 1"> + +</table> + +<h2>مُثبِّت دبيان</h2> +<p> +حُدِّث المُثبِّت ليتضمن الإصلاحات المندرجة في هذا الإصدار المستقر. +</p> + +<h2>المسارات</h2> + +<p> +القائمة الكاملة للحُزم المُغيّرة في هذه المراجعة : +</p> + +<div class="center"> + <url "https://deb.debian.org/debian/dists/<downcase <codename>>/ChangeLog"> +</div> + +<p>التوزيعة المستقرة الحالية :</p> + +<div class="center"> + <url "https://deb.debian.org/debian/dists/oldstable/"> +</div> + +<p>التحديثات المقترحة للتوزيعة المستقرة القديمة :</p> + +<div class="center"> + <url "https://deb.debian.org/debian/dists/oldstable-proposed-updates"> +</div> + +<p>معلومات حول التوزيعة المستقرة القديمة (ملاحظات الإصدار والأخطاء إلخ) :</p> + +<div class="center"> + <a + href="$(HOME)/releases/oldstable/">https://www.debian.org/releases/oldstable/</a> +</div> + +<p>معلومات وإعلانات الأمان :</p> + +<div class="center"> + <a href="$(HOME)/security/">https://www.debian.org/security/</a> +</div> + +<h2>حول دبيان</h2> + +<p> +مشروع دبيان هو اتحاد لمطوري البرمجيات الحُرّة تطوعوا بالوقت والمجهود لإنتاج نظام تشعيل دبيان حُر بالكامل. +</p> + +<h2>معلومات الاتصال</h2> + +<p> +لمزيد من المعلومات يُرجى زيارة موقع دبيان +<a href="$(HOME)/">https://www.debian.org/</a> +أو الاتصال بفريق إصدار المستقرة على +<debian-release@lists.debian.org>.</p> + + |